<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2025-01-29T13:24:46</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:3925" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2022-3075" ref_url="https://www.suse.com/security/cve/CVE-2022-3075/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2022:10121-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N6OVSTQYBJJJ7LGB4PRJG4CP2G7JK35D/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

Update to 90.0.4480.84

- DNA-101690 Cherry-pick fix for CVE-2022-3075 from chromium

Update to 90.0.4480.80

- DNA-99188 Tab Tooltip doesn't disappear
- DNA-100664 Shopping corner widget
- DNA-100843 Options to install and update VPN Pro app, when
  it's not installed
- DNA-100901 Disappearing 'X' when closing tabs.
- DNA-101093 Changing News section is not working
- DNA-101246 Use long tail list for suggesting instead of
  current Speed Dial Suggestions
- DNA-101278 PDF don't work on Opera with CN location
- DNA-101312 Allow changing logged in user with BrowserAPI
- DNA-101315 Can not connect to free VPN in private window
- DNA-101411 [Linux] Clicking VpnPopup Settings to
  'vpnWithDisclaimer' leads to black popup
- DNA-101422 Crash at void content::NavigationControllerImpl::
  NavigateToExistingPendingEntry(content::ReloadType, int, bool)
- DNA-101429 News loads for Global-EN language by default
- DNA-101482 Crash at ProfileKey::GetProtoDatabaseProvider()
- DNA-101485 Crash at base::SequencedTaskRunnerHandle::Get()
  via extensions::OperaTouchPrivateGetImageFunction::PerformGetImage
- DNA-101524 [Mac] Tab should be highlighted again after
  dismissing context menu
- DNA-101549 Crash at views::View::IsMouseHovered()
		</description>
<advisory from="security@suse.de">
	<issued date="2022-09-15"/>
	<updated date="2022-09-15"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3075/">CVE-2022-3075 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3075">CVE-2022-3075 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771633" comment="opera-90.0.4480.84-lp155.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3926" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2022-3196" ref_url="https://www.suse.com/security/cve/CVE-2022-3196/" source="CVE"/>
		<reference ref_id="CVE-2022-3197" ref_url="https://www.suse.com/security/cve/CVE-2022-3197/" source="CVE"/>
		<reference ref_id="CVE-2022-3198" ref_url="https://www.suse.com/security/cve/CVE-2022-3198/" source="CVE"/>
		<reference ref_id="CVE-2022-3199" ref_url="https://www.suse.com/security/cve/CVE-2022-3199/" source="CVE"/>
		<reference ref_id="CVE-2022-3200" ref_url="https://www.suse.com/security/cve/CVE-2022-3200/" source="CVE"/>
		<reference ref_id="CVE-2022-3201" ref_url="https://www.suse.com/security/cve/CVE-2022-3201/" source="CVE"/>
		<reference ref_id="CVE-2022-3445" ref_url="https://www.suse.com/security/cve/CVE-2022-3445/" source="CVE"/>
		<reference ref_id="CVE-2022-3446" ref_url="https://www.suse.com/security/cve/CVE-2022-3446/" source="CVE"/>
		<reference ref_id="CVE-2022-3447" ref_url="https://www.suse.com/security/cve/CVE-2022-3447/" source="CVE"/>
		<reference ref_id="CVE-2022-3448" ref_url="https://www.suse.com/security/cve/CVE-2022-3448/" source="CVE"/>
		<reference ref_id="CVE-2022-3449" ref_url="https://www.suse.com/security/cve/CVE-2022-3449/" source="CVE"/>
		<reference ref_id="CVE-2022-3450" ref_url="https://www.suse.com/security/cve/CVE-2022-3450/" source="CVE"/>
		<reference ref_id="CVE-2022-3723" ref_url="https://www.suse.com/security/cve/CVE-2022-3723/" source="CVE"/>
		<reference ref_id="CVE-2022-3885" ref_url="https://www.suse.com/security/cve/CVE-2022-3885/" source="CVE"/>
		<reference ref_id="CVE-2022-3886" ref_url="https://www.suse.com/security/cve/CVE-2022-3886/" source="CVE"/>
		<reference ref_id="CVE-2022-3887" ref_url="https://www.suse.com/security/cve/CVE-2022-3887/" source="CVE"/>
		<reference ref_id="CVE-2022-3888" ref_url="https://www.suse.com/security/cve/CVE-2022-3888/" source="CVE"/>
		<reference ref_id="CVE-2022-3889" ref_url="https://www.suse.com/security/cve/CVE-2022-3889/" source="CVE"/>
		<reference ref_id="CVE-2022-4262" ref_url="https://www.suse.com/security/cve/CVE-2022-4262/" source="CVE"/>
		<reference ref_id="CVE-2022-4436" ref_url="https://www.suse.com/security/cve/CVE-2022-4436/" source="CVE"/>
		<reference ref_id="CVE-2022-4437" ref_url="https://www.suse.com/security/cve/CVE-2022-4437/" source="CVE"/>
		<reference ref_id="CVE-2022-4438" ref_url="https://www.suse.com/security/cve/CVE-2022-4438/" source="CVE"/>
		<reference ref_id="CVE-2022-4439" ref_url="https://www.suse.com/security/cve/CVE-2022-4439/" source="CVE"/>
		<reference ref_id="CVE-2022-4440" ref_url="https://www.suse.com/security/cve/CVE-2022-4440/" source="CVE"/>
		<reference ref_id="CVE-2023-0471" ref_url="https://www.suse.com/security/cve/CVE-2023-0471/" source="CVE"/>
		<reference ref_id="CVE-2023-0472" ref_url="https://www.suse.com/security/cve/CVE-2023-0472/" source="CVE"/>
		<reference ref_id="CVE-2023-0473" ref_url="https://www.suse.com/security/cve/CVE-2023-0473/" source="CVE"/>
		<reference ref_id="CVE-2023-0474" ref_url="https://www.suse.com/security/cve/CVE-2023-0474/" source="CVE"/>
		<reference ref_id="CVE-2023-0696" ref_url="https://www.suse.com/security/cve/CVE-2023-0696/" source="CVE"/>
		<reference ref_id="CVE-2023-0697" ref_url="https://www.suse.com/security/cve/CVE-2023-0697/" source="CVE"/>
		<reference ref_id="CVE-2023-0698" ref_url="https://www.suse.com/security/cve/CVE-2023-0698/" source="CVE"/>
		<reference ref_id="CVE-2023-0699" ref_url="https://www.suse.com/security/cve/CVE-2023-0699/" source="CVE"/>
		<reference ref_id="CVE-2023-0700" ref_url="https://www.suse.com/security/cve/CVE-2023-0700/" source="CVE"/>
		<reference ref_id="CVE-2023-0701" ref_url="https://www.suse.com/security/cve/CVE-2023-0701/" source="CVE"/>
		<reference ref_id="CVE-2023-0702" ref_url="https://www.suse.com/security/cve/CVE-2023-0702/" source="CVE"/>
		<reference ref_id="CVE-2023-0703" ref_url="https://www.suse.com/security/cve/CVE-2023-0703/" source="CVE"/>
		<reference ref_id="CVE-2023-0704" ref_url="https://www.suse.com/security/cve/CVE-2023-0704/" source="CVE"/>
		<reference ref_id="CVE-2023-0705" ref_url="https://www.suse.com/security/cve/CVE-2023-0705/" source="CVE"/>
		<reference ref_id="CVE-2023-0927" ref_url="https://www.suse.com/security/cve/CVE-2023-0927/" source="CVE"/>
		<reference ref_id="CVE-2023-0928" ref_url="https://www.suse.com/security/cve/CVE-2023-0928/" source="CVE"/>
		<reference ref_id="CVE-2023-0929" ref_url="https://www.suse.com/security/cve/CVE-2023-0929/" source="CVE"/>
		<reference ref_id="CVE-2023-0930" ref_url="https://www.suse.com/security/cve/CVE-2023-0930/" source="CVE"/>
		<reference ref_id="CVE-2023-0931" ref_url="https://www.suse.com/security/cve/CVE-2023-0931/" source="CVE"/>
		<reference ref_id="CVE-2023-0932" ref_url="https://www.suse.com/security/cve/CVE-2023-0932/" source="CVE"/>
		<reference ref_id="CVE-2023-0933" ref_url="https://www.suse.com/security/cve/CVE-2023-0933/" source="CVE"/>
		<reference ref_id="CVE-2023-0941" ref_url="https://www.suse.com/security/cve/CVE-2023-0941/" source="CVE"/>
		<reference ref_id="CVE-2023-1213" ref_url="https://www.suse.com/security/cve/CVE-2023-1213/" source="CVE"/>
		<reference ref_id="CVE-2023-1214" ref_url="https://www.suse.com/security/cve/CVE-2023-1214/" source="CVE"/>
		<reference ref_id="CVE-2023-1215" ref_url="https://www.suse.com/security/cve/CVE-2023-1215/" source="CVE"/>
		<reference ref_id="CVE-2023-1216" ref_url="https://www.suse.com/security/cve/CVE-2023-1216/" source="CVE"/>
		<reference ref_id="CVE-2023-1217" ref_url="https://www.suse.com/security/cve/CVE-2023-1217/" source="CVE"/>
		<reference ref_id="CVE-2023-1218" ref_url="https://www.suse.com/security/cve/CVE-2023-1218/" source="CVE"/>
		<reference ref_id="CVE-2023-1219" ref_url="https://www.suse.com/security/cve/CVE-2023-1219/" source="CVE"/>
		<reference ref_id="CVE-2023-1220" ref_url="https://www.suse.com/security/cve/CVE-2023-1220/" source="CVE"/>
		<reference ref_id="CVE-2023-1221" ref_url="https://www.suse.com/security/cve/CVE-2023-1221/" source="CVE"/>
		<reference ref_id="CVE-2023-1222" ref_url="https://www.suse.com/security/cve/CVE-2023-1222/" source="CVE"/>
		<reference ref_id="CVE-2023-1223" ref_url="https://www.suse.com/security/cve/CVE-2023-1223/" source="CVE"/>
		<reference ref_id="CVE-2023-1224" ref_url="https://www.suse.com/security/cve/CVE-2023-1224/" source="CVE"/>
		<reference ref_id="CVE-2023-1225" ref_url="https://www.suse.com/security/cve/CVE-2023-1225/" source="CVE"/>
		<reference ref_id="CVE-2023-1226" ref_url="https://www.suse.com/security/cve/CVE-2023-1226/" source="CVE"/>
		<reference ref_id="CVE-2023-1227" ref_url="https://www.suse.com/security/cve/CVE-2023-1227/" source="CVE"/>
		<reference ref_id="CVE-2023-1228" ref_url="https://www.suse.com/security/cve/CVE-2023-1228/" source="CVE"/>
		<reference ref_id="CVE-2023-1229" ref_url="https://www.suse.com/security/cve/CVE-2023-1229/" source="CVE"/>
		<reference ref_id="CVE-2023-1230" ref_url="https://www.suse.com/security/cve/CVE-2023-1230/" source="CVE"/>
		<reference ref_id="CVE-2023-1231" ref_url="https://www.suse.com/security/cve/CVE-2023-1231/" source="CVE"/>
		<reference ref_id="CVE-2023-1232" ref_url="https://www.suse.com/security/cve/CVE-2023-1232/" source="CVE"/>
		<reference ref_id="CVE-2023-1233" ref_url="https://www.suse.com/security/cve/CVE-2023-1233/" source="CVE"/>
		<reference ref_id="CVE-2023-1234" ref_url="https://www.suse.com/security/cve/CVE-2023-1234/" source="CVE"/>
		<reference ref_id="CVE-2023-1235" ref_url="https://www.suse.com/security/cve/CVE-2023-1235/" source="CVE"/>
		<reference ref_id="CVE-2023-1236" ref_url="https://www.suse.com/security/cve/CVE-2023-1236/" source="CVE"/>
		<reference ref_id="CVE-2023-1528" ref_url="https://www.suse.com/security/cve/CVE-2023-1528/" source="CVE"/>
		<reference ref_id="CVE-2023-1529" ref_url="https://www.suse.com/security/cve/CVE-2023-1529/" source="CVE"/>
		<reference ref_id="CVE-2023-1530" ref_url="https://www.suse.com/security/cve/CVE-2023-1530/" source="CVE"/>
		<reference ref_id="CVE-2023-1531" ref_url="https://www.suse.com/security/cve/CVE-2023-1531/" source="CVE"/>
		<reference ref_id="CVE-2023-1532" ref_url="https://www.suse.com/security/cve/CVE-2023-1532/" source="CVE"/>
		<reference ref_id="CVE-2023-1533" ref_url="https://www.suse.com/security/cve/CVE-2023-1533/" source="CVE"/>
		<reference ref_id="CVE-2023-1534" ref_url="https://www.suse.com/security/cve/CVE-2023-1534/" source="CVE"/>
		<reference ref_id="CVE-2023-2033" ref_url="https://www.suse.com/security/cve/CVE-2023-2033/" source="CVE"/>
		<reference ref_id="CVE-2023-2133" ref_url="https://www.suse.com/security/cve/CVE-2023-2133/" source="CVE"/>
		<reference ref_id="CVE-2023-2134" ref_url="https://www.suse.com/security/cve/CVE-2023-2134/" source="CVE"/>
		<reference ref_id="CVE-2023-2135" ref_url="https://www.suse.com/security/cve/CVE-2023-2135/" source="CVE"/>
		<reference ref_id="CVE-2023-2136" ref_url="https://www.suse.com/security/cve/CVE-2023-2136/" source="CVE"/>
		<reference ref_id="CVE-2023-2137" ref_url="https://www.suse.com/security/cve/CVE-2023-2137/" source="CVE"/>
		<reference ref_id="CVE-2023-2721" ref_url="https://www.suse.com/security/cve/CVE-2023-2721/" source="CVE"/>
		<reference ref_id="CVE-2023-2722" ref_url="https://www.suse.com/security/cve/CVE-2023-2722/" source="CVE"/>
		<reference ref_id="CVE-2023-2723" ref_url="https://www.suse.com/security/cve/CVE-2023-2723/" source="CVE"/>
		<reference ref_id="CVE-2023-2724" ref_url="https://www.suse.com/security/cve/CVE-2023-2724/" source="CVE"/>
		<reference ref_id="CVE-2023-2725" ref_url="https://www.suse.com/security/cve/CVE-2023-2725/" source="CVE"/>
		<reference ref_id="CVE-2023-2726" ref_url="https://www.suse.com/security/cve/CVE-2023-2726/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0115-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVMVZHYNGC7MNXWYYPCKCBLKKYAGFJPY/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

- Update to 99.0.4788.13
  * CHR-9290 Update Chromium on desktop-stable-113-4788 to
    113.0.5672.127
  * DNA-107317 __delayLoadHelper2 crash in crashreporter
- The update to chromium 113.0.5672.127 fixes following issues:
  CVE-2023-2721, CVE-2023-2722, CVE-2023-2723, CVE-2023-2724,
  CVE-2023-2725, CVE-2023-2726

- Update to 99.0.4788.9
  * CHR-9283 Update Chromium on desktop-stable-113-4788 to
    113.0.5672.93
  * DNA-107638 Translations for O99
  * DNA-107678 Crash Report [@ BrowserContextKeyedServiceFactory::
    BrowserContextKeyedServiceFactory(char const*,
    BrowserContextDependencyManager*) ]
  * DNA-107795 Fix wrong german translation of
    'Close All Duplicate Tabs'
  * DNA-107800 Fonts on section#folder and AddSitePanel not
    readable when animated wallpaper chosen
  * DNA-107840 Promote O99 to stable

- Update to 98.0.4759.39
  * DNA-102363 ChromeFileSystemAccessPermissionContextTest.
    ConfirmSensitiveEntryAccess_DangerousFile fails
  * DNA-105534 [Add to Opera] Incorrect scroll on modal when
    browser window size is too small
  * DNA-106649 Opening new tab when pinned tab is active gives
    2 active tabs
  * DNA-107226 Speed Dial freezes and empty space remains after
    Continue booking tile dragging
  * DNA-107435 Building archive_source_release target fails
  * DNA-107441 [Start page] Right mouse click on tile in continue
    on section opens target site in current tab
  * DNA-107508 Crash at permissions::PermissionRecoverySuccessRate
    Tracker::TrackUsage(ContentSettingsType)
  * DNA-107528 Handle real-time SD impression reporting
  * DNA-107546 Context menus broken with one workspace
  * DNA-107548 Paste from Context Menu doesn’t work for Search
    on StartPage
  * DNA-107560 Optimize real-time SD impression reporting
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-27"/>
	<updated date="2023-05-27"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3196/">CVE-2022-3196 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3196">CVE-2022-3196 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3197/">CVE-2022-3197 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3197">CVE-2022-3197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3198/">CVE-2022-3198 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3198">CVE-2022-3198 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3199/">CVE-2022-3199 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3199">CVE-2022-3199 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3200/">CVE-2022-3200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3200">CVE-2022-3200 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3201/">CVE-2022-3201 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3201">CVE-2022-3201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3445/">CVE-2022-3445 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3445">CVE-2022-3445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3446/">CVE-2022-3446 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3446">CVE-2022-3446 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3447/">CVE-2022-3447 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3447">CVE-2022-3447 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3448/">CVE-2022-3448 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3448">CVE-2022-3448 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3449/">CVE-2022-3449 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3449">CVE-2022-3449 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3450/">CVE-2022-3450 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3450">CVE-2022-3450 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3723/">CVE-2022-3723 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3723">CVE-2022-3723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3885/">CVE-2022-3885 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3885">CVE-2022-3885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3886/">CVE-2022-3886 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3886">CVE-2022-3886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3887/">CVE-2022-3887 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3887">CVE-2022-3887 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3888/">CVE-2022-3888 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3888">CVE-2022-3888 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3889/">CVE-2022-3889 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3889">CVE-2022-3889 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4262/">CVE-2022-4262 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4262">CVE-2022-4262 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4436/">CVE-2022-4436 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4436">CVE-2022-4436 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4437/">CVE-2022-4437 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4437">CVE-2022-4437 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4438/">CVE-2022-4438 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4438">CVE-2022-4438 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4439/">CVE-2022-4439 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4439">CVE-2022-4439 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4440/">CVE-2022-4440 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4440">CVE-2022-4440 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0471/">CVE-2023-0471 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0471">CVE-2023-0471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0472/">CVE-2023-0472 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0472">CVE-2023-0472 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0473/">CVE-2023-0473 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0473">CVE-2023-0473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0474/">CVE-2023-0474 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0474">CVE-2023-0474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0696/">CVE-2023-0696 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0696">CVE-2023-0696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0697/">CVE-2023-0697 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0697">CVE-2023-0697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0698/">CVE-2023-0698 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0698">CVE-2023-0698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0699/">CVE-2023-0699 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0699">CVE-2023-0699 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0700/">CVE-2023-0700 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0700">CVE-2023-0700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0701/">CVE-2023-0701 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0701">CVE-2023-0701 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0702/">CVE-2023-0702 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0702">CVE-2023-0702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0703/">CVE-2023-0703 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0703">CVE-2023-0703 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0704/">CVE-2023-0704 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0704">CVE-2023-0704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0705/">CVE-2023-0705 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0705">CVE-2023-0705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0927/">CVE-2023-0927 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0927">CVE-2023-0927 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0928/">CVE-2023-0928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0928">CVE-2023-0928 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0929/">CVE-2023-0929 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0929">CVE-2023-0929 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0930/">CVE-2023-0930 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0930">CVE-2023-0930 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0931/">CVE-2023-0931 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0931">CVE-2023-0931 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0932/">CVE-2023-0932 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0932">CVE-2023-0932 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0933/">CVE-2023-0933 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0933">CVE-2023-0933 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0941/">CVE-2023-0941 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0941">CVE-2023-0941 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1213/">CVE-2023-1213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1213">CVE-2023-1213 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1214/">CVE-2023-1214 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1214">CVE-2023-1214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1215/">CVE-2023-1215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1215">CVE-2023-1215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1216/">CVE-2023-1216 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1216">CVE-2023-1216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1217/">CVE-2023-1217 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1217">CVE-2023-1217 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1218/">CVE-2023-1218 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1218">CVE-2023-1218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1219/">CVE-2023-1219 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1219">CVE-2023-1219 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1220/">CVE-2023-1220 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1220">CVE-2023-1220 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1221/">CVE-2023-1221 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1221">CVE-2023-1221 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1222/">CVE-2023-1222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1222">CVE-2023-1222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1223/">CVE-2023-1223 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1223">CVE-2023-1223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1224/">CVE-2023-1224 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1224">CVE-2023-1224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1225/">CVE-2023-1225 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1225">CVE-2023-1225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1226/">CVE-2023-1226 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1226">CVE-2023-1226 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1227/">CVE-2023-1227 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1227">CVE-2023-1227 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1228/">CVE-2023-1228 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1228">CVE-2023-1228 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1229/">CVE-2023-1229 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1229">CVE-2023-1229 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1230/">CVE-2023-1230 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1230">CVE-2023-1230 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1231/">CVE-2023-1231 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1231">CVE-2023-1231 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1232/">CVE-2023-1232 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1232">CVE-2023-1232 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1233/">CVE-2023-1233 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1233">CVE-2023-1233 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1234/">CVE-2023-1234 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1234">CVE-2023-1234 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1235/">CVE-2023-1235 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1235">CVE-2023-1235 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1236/">CVE-2023-1236 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1236">CVE-2023-1236 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1528/">CVE-2023-1528 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1528">CVE-2023-1528 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1529/">CVE-2023-1529 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1529">CVE-2023-1529 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1530/">CVE-2023-1530 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1530">CVE-2023-1530 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1531/">CVE-2023-1531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1531">CVE-2023-1531 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1532/">CVE-2023-1532 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1532">CVE-2023-1532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1533/">CVE-2023-1533 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1533">CVE-2023-1533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1534/">CVE-2023-1534 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1534">CVE-2023-1534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2033/">CVE-2023-2033 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2033">CVE-2023-2033 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2133/">CVE-2023-2133 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2133">CVE-2023-2133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2134/">CVE-2023-2134 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2134">CVE-2023-2134 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2135/">CVE-2023-2135 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2135">CVE-2023-2135 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2136/">CVE-2023-2136 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2136">CVE-2023-2136 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2137/">CVE-2023-2137 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2137">CVE-2023-2137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2721/">CVE-2023-2721 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2721">CVE-2023-2721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2722/">CVE-2023-2722 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2722">CVE-2023-2722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2723/">CVE-2023-2723 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2723">CVE-2023-2723 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2724/">CVE-2023-2724 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2724">CVE-2023-2724 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2725/">CVE-2023-2725 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2725">CVE-2023-2725 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2726/">CVE-2023-2726 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2726">CVE-2023-2726 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771634" comment="opera-99.0.4788.13-lp155.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3927" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212044" ref_url="https://bugzilla.suse.com/1212044" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3079" ref_url="https://www.suse.com/security/cve/CVE-2023-3079/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IA26Y3VMMSTEUQFZAMJEZ2OBOPI3JTDH/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Update to version 114.0.5735.106:

- CVE-2023-3079: Type Confusion in V8 (boo#1212044)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-09"/>
	<updated date="2023-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212044">SUSE bug 1212044</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3079/">CVE-2023-3079 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3079">CVE-2023-3079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771635" comment="chromedriver-114.0.5735.106-bp155.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771636" comment="chromium-114.0.5735.106-bp155.2.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3928" version="1" class="patch">
	<metadata>
		<title>Security update for syncthing (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212085" ref_url="https://bugzilla.suse.com/1212085" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-46165" ref_url="https://www.suse.com/security/cve/CVE-2022-46165/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FSIGQKHWF6QOVLGHNMHBJX6N46RVSK5D/" source="SUSE-SU"/>
		<description>
This update for syncthing fixes the following issues:

- Update to 1.13.5

  * This release fixes CVE-2022-46165 “Cross-site Scripting (XSS) in Web GUI”

  * Bugfixes:

    #8503: 'syncthing cli config devices add' reflect error when using --addresses flag
    #8764: Ignore patterns creating during folder addition are not loaded
    #8778: Tests fail on Windows with Go 1.20
    #8779: Test cleanup fails all model tests on Windows on Go 1.20
    #8859: Incorrect handling of path for auto accepted folder

  * Other issues:

    #8799: 'fatal error: checkptr: converted pointer straddles multiple allocations' in crypto tests

- Update to 1.23.4

  - Bugfixes:

    #8851: 'Running global migration to fix encryption file sizes' on every start

- Update to 1.23.3

  * Bugfixes:

    #5408: Selection of time in versions GUI not possible without editing the string inside the textfield
    #8277: Mutual encrypted sharing doesn't work (both sides with password)
    #8556: Increased file size when sharing between encrypted devices
    #8599: Key generation at connect time is slow for encrypted connections

  * Enhancements:

    #7859: Allow sub-second watcher delay (use case: remote development)

  * Other issues:

    #8828: cmd/stdiscosrv: TestDatabaseGetSet flake

- Adding a desktop file for the Web UI

- Update to 1.23.2

  * Bugfixes:

    #8749: Relay listener does not restart sometimes

  * Enhancements:

    #8660: GUI editor for xattr filter patterns
    #8781: gui: Remove duplicate Spanish translation

  * Other issues:

    #8768: Update quic-go for Go 1.20
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-12"/>
	<updated date="2023-06-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212085">SUSE bug 1212085</bugzilla>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-46165/">CVE-2022-46165 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46165">CVE-2022-46165 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771637" comment="syncthing-1.23.5-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771638" comment="syncthing-relaysrv-1.23.5-bp155.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3929" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212302" ref_url="https://bugzilla.suse.com/1212302" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3214" ref_url="https://www.suse.com/security/cve/CVE-2023-3214/" source="CVE"/>
		<reference ref_id="CVE-2023-3215" ref_url="https://www.suse.com/security/cve/CVE-2023-3215/" source="CVE"/>
		<reference ref_id="CVE-2023-3216" ref_url="https://www.suse.com/security/cve/CVE-2023-3216/" source="CVE"/>
		<reference ref_id="CVE-2023-3217" ref_url="https://www.suse.com/security/cve/CVE-2023-3217/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6XOUMHRLZFACMSHLALXG5SSFCC2YA6X7/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 114.0.5735.133 (boo#1212302):

- CVE-2023-3214: Use after free in Autofill payments
- CVE-2023-3215: Use after free in WebRTC
- CVE-2023-3216: Type Confusion in V8
- CVE-2023-3217: Use after free in WebXR
- Various fixes from internal audits, fuzzing and other initiatives
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-16"/>
	<updated date="2023-06-16"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1212302">SUSE bug 1212302</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3214/">CVE-2023-3214 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3214">CVE-2023-3214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3215/">CVE-2023-3215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3215">CVE-2023-3215 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3216/">CVE-2023-3216 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3216">CVE-2023-3216 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3217/">CVE-2023-3217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3217">CVE-2023-3217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771639" comment="chromedriver-114.0.5735.133-bp155.2.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771640" comment="chromium-114.0.5735.133-bp155.2.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3930" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212755" ref_url="https://bugzilla.suse.com/1212755" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3420" ref_url="https://www.suse.com/security/cve/CVE-2023-3420/" source="CVE"/>
		<reference ref_id="CVE-2023-3421" ref_url="https://www.suse.com/security/cve/CVE-2023-3421/" source="CVE"/>
		<reference ref_id="CVE-2023-3422" ref_url="https://www.suse.com/security/cve/CVE-2023-3422/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0159-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZXPIYHPWZLJMX2WR46ZCSMZDCREMT6X/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

- Chromium 114.0.5735.198 (boo#1212755):

  * CVE-2023-3420: Type Confusion in V8
  * CVE-2023-3421: Use after free in Media
  * CVE-2023-3422: Use after free in Guest View

- Install Qt5 library &amp; prepare for Qt6 in 115

		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-29"/>
	<updated date="2023-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212755">SUSE bug 1212755</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3420/">CVE-2023-3420 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3420">CVE-2023-3420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3421/">CVE-2023-3421 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3421">CVE-2023-3421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3422/">CVE-2023-3422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3422">CVE-2023-3422 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771597" comment="chromedriver-114.0.5735.198-bp155.2.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771598" comment="chromium-114.0.5735.198-bp155.2.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3931" version="1" class="patch">
	<metadata>
		<title>Security update for gifsicle (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212645" ref_url="https://bugzilla.suse.com/1212645" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-36193" ref_url="https://www.suse.com/security/cve/CVE-2023-36193/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0160-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A6YPGYZ6O27S3AQ6TOJAEA66YTS4RIR3/" source="SUSE-SU"/>
		<description>
This update for gifsicle fixes the following issues:

- Update to version 1.94:

  * Fix some bugs, including fix for CVE-2023-36193: heap buffer overflow (read) via the ambiguity_error component at /src/clp.c  (boo#1212645). 

		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-29"/>
	<updated date="2023-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212645">SUSE bug 1212645</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-36193/">CVE-2023-36193 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36193">CVE-2023-36193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771599" comment="gifsicle-1.94-bp155.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3932" version="1" class="patch">
	<metadata>
		<title>Security update for libjxl (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212492" ref_url="https://bugzilla.suse.com/1212492" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-35790" ref_url="https://www.suse.com/security/cve/CVE-2023-35790/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0161-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/POMUDQH5YXS2RKRV7SGXIJ37BIK4ME5D/" source="SUSE-SU"/>
		<description>
This update for libjxl fixes the following issues:

Update to release 0.8.2

* CVE-2023-35790: Fix an integer underflow bug in patch decoding. (bsc#1212492)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-29"/>
	<updated date="2023-06-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212492">SUSE bug 1212492</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-35790/">CVE-2023-35790 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35790">CVE-2023-35790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771641" comment="libjxl-devel-0.8.2-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771642" comment="libjxl-tools-0.8.2-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771643" comment="libjxl0_8-0.8.2-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771644" comment="libjxl0_8-64bit-0.8.2-bp155.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3933" version="1" class="patch">
	<metadata>
		<title>Security update for xonotic (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212632" ref_url="https://bugzilla.suse.com/1212632" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2023:0162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZPASPRLDFLKIC2YTR7XLLGACF4JWOQYR/" source="SUSE-SU"/>
		<description>
This update for xonotic fixes the following issues:

Update to version 0.8.6

SECURITY ALERT: A bug was discovered in versions older than 0.8.6
that is believed to be exploitable by malicious server admins to
crash clients or, if they defeat mitigations, execute arbitrary code.
(boo#1212632)

update to 0.8.5:

  * https://xonotic.org/posts/2022/xonotic-0-8-5-release/ 

		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-29"/>
	<updated date="2023-06-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212632">SUSE bug 1212632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771600" comment="xonotic-0.8.6-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771601" comment="xonotic-data-0.8.6-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771602" comment="xonotic-server-0.8.6-bp155.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3934" version="1" class="patch">
	<metadata>
		<title>Security update for keepass (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211397" ref_url="https://bugzilla.suse.com/1211397" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32784" ref_url="https://www.suse.com/security/cve/CVE-2023-32784/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0163-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFQRNEAN42U36FDY44HBZDRFMS7QLMMZ/" source="SUSE-SU"/>
		<description>
This update for keepass fixes the following issues:

- Update to 2.54

  * Security:

    + Improved process memory protection of secure edit controls (CVE-2023-32784, boo#1211397).

  * New Features:

    + Triggers, global URL overrides, password generator profiles and a few more settings are now stored in the enforced configuration file.
    + Added dialog 'Enforce Options (All Users)' (menu 'Tools' → 'Advanced Tools' → 'Enforce Options'), which facilitates storing certain options in the enforced configuration file.
    + In report dialogs, passwords (and other sensitive data) are now hidden using asterisks by default (if hiding is activated in the main window); the hiding can be toggled using the new '***' button in the toolbar.
    + The 'Print' command in most report dialogs now requires the 'Print' application policy flag, and the master key must be entered if the 'Print - No Key Repeat' application policy flag is deactivated.
    + The 'Export' command in most report dialogs now requires the 'Export' application policy flag, and the master key must be entered.
    + Single line edit dialogs now support hiding the value using asterisks.
    + Commands that require elevation now have a shield icon like on Windows.
    + TrlUtil: added 'Move Selected Unused Text to Dialog Control' command.

  * Improvements:

    * The content mode of the configuration elements '/Configuration/Application/TriggerSystem', '/Configuration/Integration/UrlSchemeOverrides' and '/Configuration/PasswordGenerator/UserProfiles' is now 'Replace' by default.
    * The built-in override for the 'ssh' URI scheme is now deactivated by default (it can be activated in the 'URL Overrides' dialog).
    * When opening the password generator dialog without a derived profile, the '(Automatically generated passwords for new entries)' profile is now selected by default, if profiles are enabled (otherwise the default profile is used).
    * The clipboard workarounds are now disabled by default (they are not needed anymore on most systems).
    * Improved clipboard clearing.
    * Improved starting of an elevated process.

  * Bugfixes:

    + In report dialogs, the 'Print' and 'Export' commands now always use the actual data (in previous versions, asterisks were printed/exported when the application policy flag 'Unhide Passwords' was turned off).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-30"/>
	<updated date="2023-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211397">SUSE bug 1211397</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32784/">CVE-2023-32784 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32784">CVE-2023-32784 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771645" comment="keepass-2.54-bp155.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3935" version="1" class="patch">
	<metadata>
		<title>Security update for nextcloud-desktop (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1205798" ref_url="https://bugzilla.suse.com/1205798" source="BUGZILLA"/>
		<reference ref_id="1205799" ref_url="https://bugzilla.suse.com/1205799" source="BUGZILLA"/>
		<reference ref_id="1205800" ref_url="https://bugzilla.suse.com/1205800" source="BUGZILLA"/>
		<reference ref_id="1205801" ref_url="https://bugzilla.suse.com/1205801" source="BUGZILLA"/>
		<reference ref_id="1207976" ref_url="https://bugzilla.suse.com/1207976" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-39331" ref_url="https://www.suse.com/security/cve/CVE-2022-39331/" source="CVE"/>
		<reference ref_id="CVE-2022-39332" ref_url="https://www.suse.com/security/cve/CVE-2022-39332/" source="CVE"/>
		<reference ref_id="CVE-2022-39333" ref_url="https://www.suse.com/security/cve/CVE-2022-39333/" source="CVE"/>
		<reference ref_id="CVE-2022-39334" ref_url="https://www.suse.com/security/cve/CVE-2022-39334/" source="CVE"/>
		<reference ref_id="CVE-2023-23942" ref_url="https://www.suse.com/security/cve/CVE-2023-23942/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0171-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MYOV4BMU2LQGVZ5NTYTI7BA3XMRNOCDF/" source="SUSE-SU"/>
		<description>
This update for nextcloud-desktop fixes the following issues:

Update ot 3.8.0

  - Resize WebView widget once the loginpage rendered
  - Feature/secure file drop
  - Check German translation for wrong wording
  - L10n: Correct word
  - Fix displaying of file details button for local syncfileitem activities
  - Improve config upgrade warning dialog
  - Only accept folder setup page if overrideLocalDir is set
  - Update CHANGELOG.
  - Prevent ShareModel crash from accessing bad pointers
  - Bugfix/init value for pointers
  - Log to stdout when built in Debug config
  - Clean up account creation and deletion code
  - L10n: Added dot to end of sentence
  - L10n: Fixed grammar
  - Fix 'Create new folder' menu entries in settings not working correctly on macOS
  - Ci/clang tidy checks init variables
  - Fix share dialog infinite loading
  - Fix edit locally job not finding the user account: wrong user id
  - Skip e2e encrypted files with empty filename in metadata
  - Use new connect syntax
  - Fix avatars not showing up in settings dialog account actions until clicked on
  - Always discover blacklisted folders to avoid data loss when modifying selectivesync list.
  - Fix infinite loading in the share dialog when public link shares are disabled on the server
  - With cfapi when dehydrating files add missing flag
  - Fix text labels in Sync Status component
  - Display 'Search globally' as the last sharees list element
  - Fix display of 2FA notification.
  - Bugfix/do not restore virtual files
  - Show server name in tray main window
  - Add Ubuntu Lunar
  - Debian build classification 'beta' cannot override 'release'.
  - Update changelog
  - Follow shouldNotify flag to hide notifications when needed
  - Bugfix/stop after creating config file
  - E2EE cut extra zeroes from derypted byte array.
  - When local sync folder is overriden, respect this choice
  - Feature/e2ee fixes

- This update also fixes security issues:

  - (boo#1205798, CVE-2022-39331)
    - Arbitrary HyperText Markup Language injection in notifications 
  - (boo#1205799, CVE-2022-39332)
    - Arbitrary HyperText Markup Language injection in user status and information 
  - (boo#1205800, CVE-2022-39333)
    - Arbitrary HyperText Markup Language injection in desktop client application 
  - (boo#1205801, CVE-2022-39334)
    - Client incorrectly trusts invalid TLS certificates 
  - (boo#1207976, CVE-2023-23942)
    - missing sanitisation on qml labels leading to javascript injection 
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-10"/>
	<updated date="2023-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205798">SUSE bug 1205798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205799">SUSE bug 1205799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205800">SUSE bug 1205800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205801">SUSE bug 1205801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207976">SUSE bug 1207976</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-39331/">CVE-2022-39331 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39331">CVE-2022-39331 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-39332/">CVE-2022-39332 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39332">CVE-2022-39332 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-39333/">CVE-2022-39333 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39333">CVE-2022-39333 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-39334/">CVE-2022-39334 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39334">CVE-2022-39334 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23942/">CVE-2023-23942 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23942">CVE-2023-23942 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771714" comment="caja-extension-nextcloud-3.8.0-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771715" comment="cloudproviders-extension-nextcloud-3.8.0-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771716" comment="libnextcloudsync-devel-3.8.0-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771717" comment="libnextcloudsync0-3.8.0-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771718" comment="nautilus-extension-nextcloud-3.8.0-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771719" comment="nemo-extension-nextcloud-3.8.0-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771720" comment="nextcloud-desktop-3.8.0-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771721" comment="nextcloud-desktop-doc-3.8.0-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771722" comment="nextcloud-desktop-dolphin-3.8.0-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771723" comment="nextcloud-desktop-lang-3.8.0-bp155.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3936" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django1 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212742" ref_url="https://bugzilla.suse.com/1212742" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-36053" ref_url="https://www.suse.com/security/cve/CVE-2023-36053/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0176-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UBXKTUUAS6UCT4ZYIAJ5ZXS7DH2RYQQB/" source="SUSE-SU"/>
		<description>

This update of python-Django1 fixes the following issue:

- CVE-2023-36053: Fixed potential regular expression denial of service vulnerability in EmailValidator/URLValidator (boo#1212742)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-12"/>
	<updated date="2023-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212742">SUSE bug 1212742</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-36053/">CVE-2023-36053 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36053">CVE-2023-36053 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771840" comment="python3-Django1-1.11.29-bp155.4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3937" version="1" class="patch">
	<metadata>
		<title>Security update for zabbix (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213338" ref_url="https://bugzilla.suse.com/1213338" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-29454" ref_url="https://www.suse.com/security/cve/CVE-2023-29454/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0191-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KRA5YTSUD2DHLEZ2TCYBAPAMLWIIAZ3X/" source="SUSE-SU"/>
		<description>
This update for zabbix fixes the following issues:

Updated to latest release 4.0.47, this version fixes CVE-2023-29454 (boo#1213338):

- New Features and Improvements
  + ZBXNEXT-7694 Added 'utf8mb3' character set support for MySQL database
  + ZBX-20946 Enabled Bulgarian, Chinese (zh_TW), German, Greek, Indonesian,
    Romanian, Spanish and Vietnamese languages in frontend
- Bug Fixes
  + ZBX-22987 Fixed inefficient URL schema validation
  + ZBX-22688 Fixed AlertScriptPath not allowing links
  + ZBX-22386 Fixed encoding of HTML entities in the user interface
  + ZBX-22858 Fixed xss vulnerability in graph item properties
  + ZBX-22859 Fixed validation of input parameters in action configuration form
  + ZBX-22622 Fixed alert script path validation
  + ZBX-22520 Fixed versions of integrations
  + ZBX-22026 Fixed SNMP agent item going to unsupported state on NULL result
  + ZBX-22050 Fixed spoofing X-Forwarded-For request header allowing to access
    Zabbix frontend in maintenance mode
  + ZBX-21416 Fixed check now not working on calculated items,
    aggregate checks and some internal items
  + ZBX-21449 Fixed accessibility attributes
  + ZBX-21306 Fixed xss in discovery rules
  + ZBX-21305 Fixed xss in graph
  + ZBX-20600 Fixed vmware hv.datastore.latency item when multiple
    datastores with duplicate name
  + ZBX-20844 Fixed external check becoming unsupported when Zabbix
    server or Zabbix proxy is stopped
  + ZBX-19789 Added SourceIP support to ldap simple checks
  + ZBX-20680 Fixed reflected XSS issues
  + ZBX-20387 Fixed default language of the setup routine for logged in superadmin users
  + ZBX-19652 Fixed JavaScript syntax for Internet Explorer 11 compatibility 
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-25"/>
	<updated date="2023-07-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213338">SUSE bug 1213338</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29454/">CVE-2023-29454 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29454">CVE-2023-29454 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009773688" comment="zabbix-agent-4.0.47-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773689" comment="zabbix-java-gateway-4.0.47-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773690" comment="zabbix-phpfrontend-4.0.47-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773691" comment="zabbix-proxy-4.0.47-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773692" comment="zabbix-proxy-mysql-4.0.47-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773693" comment="zabbix-proxy-postgresql-4.0.47-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773694" comment="zabbix-proxy-sqlite-4.0.47-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773695" comment="zabbix-server-4.0.47-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773696" comment="zabbix-server-mysql-4.0.47-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773697" comment="zabbix-server-postgresql-4.0.47-bp155.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3938" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213462" ref_url="https://bugzilla.suse.com/1213462" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3727" ref_url="https://www.suse.com/security/cve/CVE-2023-3727/" source="CVE"/>
		<reference ref_id="CVE-2023-3728" ref_url="https://www.suse.com/security/cve/CVE-2023-3728/" source="CVE"/>
		<reference ref_id="CVE-2023-3730" ref_url="https://www.suse.com/security/cve/CVE-2023-3730/" source="CVE"/>
		<reference ref_id="CVE-2023-3732" ref_url="https://www.suse.com/security/cve/CVE-2023-3732/" source="CVE"/>
		<reference ref_id="CVE-2023-3733" ref_url="https://www.suse.com/security/cve/CVE-2023-3733/" source="CVE"/>
		<reference ref_id="CVE-2023-3734" ref_url="https://www.suse.com/security/cve/CVE-2023-3734/" source="CVE"/>
		<reference ref_id="CVE-2023-3735" ref_url="https://www.suse.com/security/cve/CVE-2023-3735/" source="CVE"/>
		<reference ref_id="CVE-2023-3736" ref_url="https://www.suse.com/security/cve/CVE-2023-3736/" source="CVE"/>
		<reference ref_id="CVE-2023-3737" ref_url="https://www.suse.com/security/cve/CVE-2023-3737/" source="CVE"/>
		<reference ref_id="CVE-2023-3738" ref_url="https://www.suse.com/security/cve/CVE-2023-3738/" source="CVE"/>
		<reference ref_id="CVE-2023-3740" ref_url="https://www.suse.com/security/cve/CVE-2023-3740/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7YFWX4SWCVBUO47OZ3HWZCBOE3G7ZGAE/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 115.0.5790.102:

* stability fix

Chromium 115.0.5790.98:

* Security: The Storage, Service Worker, and Communication APIs
  are now partitioned in third-party contexts to prevent certain
  types of side-channel cross-site tracking
* HTTPS: Automatically and optimistically upgrade all main-frame
  navigations to HTTPS, with fast fallback to HTTP.
* CSS: accept multiple values of the display property
* CSS: support boolean context style container queries
* CSS: support scroll-driven animations
* Increase the maximum size of a WebAssembly.Module() on the main
  thread to 8 MB
* FedCM: Support credential management mediation requirements for
  auto re-authentication
* Deprecate the document.domain setter
* Deprecate mutation events
* Security fixes (boo#1213462):

  - CVE-2023-3727: Use after free in WebRTC
  - CVE-2023-3728: Use after free in WebRTC
  - CVE-2023-3730: Use after free in Tab Groups
  - CVE-2023-3732: Out of bounds memory access in Mojo
  - CVE-2023-3733: Inappropriate implementation in WebApp Installs
  - CVE-2023-3734: Inappropriate implementation in Picture In Picture
  - CVE-2023-3735: Inappropriate implementation in Web API Permission Prompts
  - CVE-2023-3736: Inappropriate implementation in Custom Tabs
  - CVE-2023-3737: Inappropriate implementation in Notifications
  - CVE-2023-3738: Inappropriate implementation in Autofill
  - CVE-2023-3740: Insufficient validation of untrusted input in Themes
  - Various fixes from internal audits, fuzzing and other initiatives
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-26"/>
	<updated date="2023-07-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213462">SUSE bug 1213462</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3727/">CVE-2023-3727 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3727">CVE-2023-3727 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3728/">CVE-2023-3728 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3728">CVE-2023-3728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3730/">CVE-2023-3730 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3730">CVE-2023-3730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3732/">CVE-2023-3732 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3732">CVE-2023-3732 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3733/">CVE-2023-3733 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3733">CVE-2023-3733 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3734/">CVE-2023-3734 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3734">CVE-2023-3734 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3735/">CVE-2023-3735 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3735">CVE-2023-3735 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3736/">CVE-2023-3736 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3736">CVE-2023-3736 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3737/">CVE-2023-3737 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3737">CVE-2023-3737 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3738/">CVE-2023-3738 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3738">CVE-2023-3738 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3740/">CVE-2023-3740 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3740">CVE-2023-3740 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009774766" comment="chromedriver-115.0.5790.102-bp155.2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774767" comment="chromium-115.0.5790.102-bp155.2.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3939" version="1" class="patch">
	<metadata>
		<title>Security update for libredwg (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1200898" ref_url="https://bugzilla.suse.com/1200898" source="BUGZILLA"/>
		<reference ref_id="1212705" ref_url="https://bugzilla.suse.com/1212705" source="BUGZILLA"/>
		<reference ref_id="1212706" ref_url="https://bugzilla.suse.com/1212706" source="BUGZILLA"/>
		<reference ref_id="1212707" ref_url="https://bugzilla.suse.com/1212707" source="BUGZILLA"/>
		<reference ref_id="1212709" ref_url="https://bugzilla.suse.com/1212709" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-33025" ref_url="https://www.suse.com/security/cve/CVE-2022-33025/" source="CVE"/>
		<reference ref_id="CVE-2023-36271" ref_url="https://www.suse.com/security/cve/CVE-2023-36271/" source="CVE"/>
		<reference ref_id="CVE-2023-36272" ref_url="https://www.suse.com/security/cve/CVE-2023-36272/" source="CVE"/>
		<reference ref_id="CVE-2023-36273" ref_url="https://www.suse.com/security/cve/CVE-2023-36273/" source="CVE"/>
		<reference ref_id="CVE-2023-36274" ref_url="https://www.suse.com/security/cve/CVE-2023-36274/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0201-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5EOM2KLYJEVITQUC3RNZBNGK6DL4RR4C/" source="SUSE-SU"/>
		<description>
This update for libredwg fixes the following issues:

Update to version 0.12.5.5907

Security issues fixed:

* CVE-2022-33025: Fixed multiple security issues [boo#1200898]
* CVE-2023-36271: Fixed heap buffer overflow via the function bit_wcs2nlen [boo#1212709]
* CVE-2023-36272: Fixed heap buffer overflow via the function bit_utf8_to_TU [boo#1212707]
* CVE-2023-36273: Fixed heap buffer overflow via the function bit_calc_CRC [boo#1212706]
* CVE-2023-36274: Fixed heap buffer overflow via the function bit_write_TF [boo#1212705]
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-02"/>
	<updated date="2023-08-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200898">SUSE bug 1200898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212705">SUSE bug 1212705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212706">SUSE bug 1212706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212707">SUSE bug 1212707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212709">SUSE bug 1212709</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-33025/">CVE-2022-33025 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33025">CVE-2022-33025 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36271/">CVE-2023-36271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36271">CVE-2023-36271 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36272/">CVE-2023-36272 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36272">CVE-2023-36272 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36273/">CVE-2023-36273 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36273">CVE-2023-36273 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36274/">CVE-2023-36274 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36274">CVE-2023-36274 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009776231" comment="libredwg-devel-0.12.5.5907-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776232" comment="libredwg-tools-0.12.5.5907-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776233" comment="libredwg0-0.12.5.5907-bp155.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3940" version="1" class="patch">
	<metadata>
		<title>Security update for amanda (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213701" ref_url="https://bugzilla.suse.com/1213701" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-30577" ref_url="https://www.suse.com/security/cve/CVE-2023-30577/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4NPCCSSYWPKUVIJA5YEFQE4XY5DQ2LN/" source="SUSE-SU"/>
		<description>
This update for amanda fixes the following issues:

- CVE-2023-30577: Fixed improper argument checking for runtar.c [boo#1213701]
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-04"/>
	<updated date="2023-08-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213701">SUSE bug 1213701</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-30577/">CVE-2023-30577 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30577">CVE-2023-30577 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777076" comment="amanda-3.5.2-bp155.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3941" version="1" class="patch">
	<metadata>
		<title>Security update for trytond (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213869" ref_url="https://bugzilla.suse.com/1213869" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2023:0209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YUFLGKPVUPGW4X6X36COJENE3H6XECPA/" source="SUSE-SU"/>
		<description>
This update for trytond fixes the following issues:

- Version 6.0.34 - Security Bugfix Release
  
  See https://discuss.tryton.org/t/security-release-for-issue-12428/6397

- Version 6.0.33 - Bugfix Release
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-06"/>
	<updated date="2023-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213869">SUSE bug 1213869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777465" comment="trytond-6.0.34-bp155.2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3942" version="1" class="patch">
	<metadata>
		<title>Security update for virtualbox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1209727" ref_url="https://bugzilla.suse.com/1209727" source="BUGZILLA"/>
		<reference ref_id="1211941" ref_url="https://bugzilla.suse.com/1211941" source="BUGZILLA"/>
		<reference ref_id="1212209" ref_url="https://bugzilla.suse.com/1212209" source="BUGZILLA"/>
		<reference ref_id="1212761" ref_url="https://bugzilla.suse.com/1212761" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2023:0213-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2T52QSP4MHAV46AAS3WJ36W4QEVXV5NV/" source="SUSE-SU"/>
		<description>
This update for virtualbox fixes the following issues:

VirtualBox 7.0.10 (released July 18 2023)

This is a maintenance release. The following items were fixed and/or added:

- OCI: Introduced general improvements
- VMM: Fixed a bug while walking page tables while executing nested VMs causing flooding of the release log as a consequence (Intel hosts only, bug #21551)
- GUI: Added general improvements
- TPM: Fixed a crash when a VM has a TPM version 1.2 configured (bug #21622)
- 3D: Initial support for OpenGL 4.1
- 3D: Fixed various graphics issues with Windows 11 guests (bugs #21136, #21515)
- Guest Control/VBoxManage: Fixed parameter '--ignore-orphaned-processes'
- Guest Control/VBoxManage: Fixed behavior of how handling argument 0 for a started guest process works: One can now explicitly specify it with the newly added option '--arg0'. This will effectively restore the behavior of former VirtualBox versions
- Audio: Also use the PulseAudio backend when pipewire-pulse is running instead of falling back to ALSA (bug #21575)
- NAT: Adjusted UDP proxy timeout from 18-21 to 21-24 range to respect intended 20 second timeout (bug #21560)
- Linux Host: Added initial support for Indirect Branch Tracking (bug #21435)
- Linux Host: Added initial support for kernel 6.5 (NOTE: Guest Additions do not support kernel 6.5 yet)
- Linux Host and Guest: Improved condition check when kernel modules need to be signed
- Linux Host and Guest: Added initial support for RHEL 8.8 (bug #21692), 8.9 (bug #21690) and 9.3 (bugs #21598 and #21671) kernels
- Linux Guest Additions: Fixed issue when kernel modules were rebuilt on each boot when guest system has no X11 installed
- Linux Guest Additions: Added initial support for kernel 6.4
- Linux Guest Additions: Fixed issue when vboxvideo module reloading caused kernel panic in some guests (bug #21740)
- Linux Guest Additions: Introduced general improvements in the installer area
- Windows Guest Additions: Introduced general improvements in graphics drivers area 
- Fix issue with kernel on newer CPU (boo#1212209)
 
- Turn build of VBoxSDL back on. This update addresses boo#1211941.
- Detect vboxpython module with python 3.11
- Fix Vagrant/virtualbox startup problems boo#1209727

		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-06"/>
	<updated date="2023-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1209727">SUSE bug 1209727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211941">SUSE bug 1211941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212209">SUSE bug 1212209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212761">SUSE bug 1212761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009777466" comment="python3-virtualbox-7.0.10-lp155.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777467" comment="virtualbox-7.0.10-lp155.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777468" comment="virtualbox-devel-7.0.10-lp155.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777469" comment="virtualbox-guest-desktop-icons-7.0.10-lp155.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777470" comment="virtualbox-guest-source-7.0.10-lp155.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777471" comment="virtualbox-guest-tools-7.0.10-lp155.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777472" comment="virtualbox-host-source-7.0.10-lp155.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777473" comment="virtualbox-kmp-default-7.0.10_k5.14.21_150500.55.7-lp155.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777474" comment="virtualbox-qt-7.0.10-lp155.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777475" comment="virtualbox-vnc-7.0.10-lp155.2.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777476" comment="virtualbox-websrv-7.0.10-lp155.2.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3943" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213920" ref_url="https://bugzilla.suse.com/1213920" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4068" ref_url="https://www.suse.com/security/cve/CVE-2023-4068/" source="CVE"/>
		<reference ref_id="CVE-2023-4069" ref_url="https://www.suse.com/security/cve/CVE-2023-4069/" source="CVE"/>
		<reference ref_id="CVE-2023-4070" ref_url="https://www.suse.com/security/cve/CVE-2023-4070/" source="CVE"/>
		<reference ref_id="CVE-2023-4071" ref_url="https://www.suse.com/security/cve/CVE-2023-4071/" source="CVE"/>
		<reference ref_id="CVE-2023-4072" ref_url="https://www.suse.com/security/cve/CVE-2023-4072/" source="CVE"/>
		<reference ref_id="CVE-2023-4073" ref_url="https://www.suse.com/security/cve/CVE-2023-4073/" source="CVE"/>
		<reference ref_id="CVE-2023-4074" ref_url="https://www.suse.com/security/cve/CVE-2023-4074/" source="CVE"/>
		<reference ref_id="CVE-2023-4075" ref_url="https://www.suse.com/security/cve/CVE-2023-4075/" source="CVE"/>
		<reference ref_id="CVE-2023-4076" ref_url="https://www.suse.com/security/cve/CVE-2023-4076/" source="CVE"/>
		<reference ref_id="CVE-2023-4077" ref_url="https://www.suse.com/security/cve/CVE-2023-4077/" source="CVE"/>
		<reference ref_id="CVE-2023-4078" ref_url="https://www.suse.com/security/cve/CVE-2023-4078/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0216-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X3GLSBT6XDKXSXB6UIPTQP5IOTSHGFVJ/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 115.0.5790.170 (boo#1213920)

* CVE-2023-4068: Type Confusion in V8
* CVE-2023-4069: Type Confusion in V8
* CVE-2023-4070: Type Confusion in V8
* CVE-2023-4071: Heap buffer overflow in Visuals
* CVE-2023-4072: Out of bounds read and write in WebGL
* CVE-2023-4073: Out of bounds memory access in ANGLE
* CVE-2023-4074: Use after free in Blink Task Scheduling
* CVE-2023-4075: Use after free in Cast
* CVE-2023-4076: Use after free in WebRTC
* CVE-2023-4077: Insufficient data validation in Extensions
* CVE-2023-4078: Inappropriate implementation in Extensions

- Specify re2 build dependency in a way that makes Leap packages
  build in devel project and in Maintenance 

		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-07"/>
	<updated date="2023-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213920">SUSE bug 1213920</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4068/">CVE-2023-4068 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4068">CVE-2023-4068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4069/">CVE-2023-4069 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4069">CVE-2023-4069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4070/">CVE-2023-4070 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4070">CVE-2023-4070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4071/">CVE-2023-4071 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4071">CVE-2023-4071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4072/">CVE-2023-4072 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4072">CVE-2023-4072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4073/">CVE-2023-4073 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4073">CVE-2023-4073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4074/">CVE-2023-4074 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4074">CVE-2023-4074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4075/">CVE-2023-4075 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4075">CVE-2023-4075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4076/">CVE-2023-4076 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4076">CVE-2023-4076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4077/">CVE-2023-4077 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4077">CVE-2023-4077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4078/">CVE-2023-4078 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4078">CVE-2023-4078 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009777496" comment="chromedriver-115.0.5790.170-bp155.2.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777497" comment="chromium-115.0.5790.170-bp155.2.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3944" version="1" class="patch">
	<metadata>
		<title>Security update for perl-Net-Netmask (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1184425" ref_url="https://bugzilla.suse.com/1184425" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29424" ref_url="https://www.suse.com/security/cve/CVE-2021-29424/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0217-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6ZJZ52ER45AJ5J3AJXDBMK5W5ESAW6G5/" source="SUSE-SU"/>
		<description>
This update for perl-Net-Netmask fixes the following issues:

* CVE-2021-29424: Leading zeros are no longer allowed for IPv4 octets. This
  (in some situations) allows attackers to bypass access control
  that is based on IP addresses.  (boo#1184425)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-07"/>
	<updated date="2023-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184425">SUSE bug 1184425</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29424/">CVE-2021-29424 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29424">CVE-2021-29424 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777504" comment="perl-Net-Netmask-1.9022-bp155.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3945" version="1" class="patch">
	<metadata>
		<title>Recommended update for kitty (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="CVE-2008-2383" ref_url="https://www.suse.com/security/cve/CVE-2008-2383/" source="CVE"/>
		<description>
This update for kitty fixes the following issues:

- Update to 0.29.2:
  * Detect .tex and Makefiles as plain text files (#6492)
  * unicode_input kitten: Fix scrolling over multiple screens not working (#6497)

- Update to 0.29.1
  * A new value for background_image_layout to scale the background image while
    preserving its aspect ratio. Also have centered images work even for images
    larger than the window size (#6458)
  * Fix a regression that caused using unicode placeholders to display images to
    break and also partially offscreen images to sometimes be slightly
    distorted (#6467)
  * macOS: Fix a regression that caused rendering to hang when transitioning to
    full screen with macos_colorspace set to default (#6435)
  * macOS: Fix a regression causing burn-in of text when resizing semi-transparent
    OS windows (#6439)
  * macOS: Add a new value titlebar-and-corners for hide_window_decorations that
    emulates the behavior of hide_window_decorations yes in older versions of kitty
  * macOS: Fix a regression in the previous release that caused
    hide_window_decorations = yes to prevent window from being resizable (#6436)
  * macOS: Fix a regression that caused the titlebar to be translucent even for
    non-translucent windows (#6450)
  * GNOME: Fix wayland_titlebar_color not being applied until the color is changed
    at least once (#6447)
  * Remote control launch: Fix --env not implemented when using --cwd=current with
    the SSH kitten (#6438)
  * Allow using a custom OS window icon on X11 as well as macOS (#6475)

- Update to 0.29.0
  * A new escape code &lt;ESC&gt;[22J that moves the current contents of the screen
    into the scrollback before clearing it
  * A new kitten run-shell to allow creating sub-shells with shell integration
    enabled
  * A new option background_blur to blur the background for transparent
    windows (#6135)
  * The --hold flag now holds the window open at a shell prompt instead of
    asking the user to press a key
  * A new option text_fg_override_threshold to force text colors to have high
    contrast regardless of color scheme (#6283)
  * When resizing OS Windows make the animation less jerky. Also show the
    window size in cells during the resize (#6341)
  * unicode_input kitten: Fix a regression in 0.28.0 that caused the order of
    recent and favorites entries to not be respected (#6214)
  * unicode_input kitten: Fix a regression in 0.28.0 that caused editing of
    favorites to sometimes hang
  * clipboard kitten: Fix a bug causing the last MIME type available on the
    clipboard not being recognized when pasting
  * clipboard kitten: Dont set clipboard when getting clipboard in filter
    mode (#6302)
  * Fix regression in 0.28.0 causing color fringing when rendering in
    transparent windows on light backgrounds (#6209)
  * show_key kitten: In kitty mode show the actual bytes sent by the terminal
    rather than a re-encoding of the parsed key event
  * hints kitten: Fix a regression in 0.28.0 that broke using sub-groups in
    regexp captures (#6228)
  * hints kitten: Fix a regression in 0.28.0 that broke using
    lookahead/lookbehind in regexp captures (#6265)
  * diff kitten: Fix a regression in 0.28.0 that broke using relative paths
    as arguments to the kitten (#6325)
  * Fix re-using the image id of an animated image for a still image causing
    a crash (#6244)
  * kitty +open: Ask for permission before executing script files that are not
    marked as executable. This prevents accidental execution of script files
    via MIME type association from programs that unconditionally open
    attachments/downloaded files
  * edit-in-kitty: Fix running edit-in-kitty with elevated privileges to edit a
    restricted file not working (#6245)
  * ssh kitten: Fix a regression in 0.28.0 that caused interrupt during setup
    to not be handled gracefully (#6254)
  * ssh kitten: Allow configuring the ssh kitten to skip some hosts via a new
    delegate config directive
  * Graphics: Move images up along with text when the window is shrunk
    vertically (#6278)
  * Fix a regression in 0.28.0 that caused a buffer overflow when clearing the
    screen (#6306, #6308)
  * Fix a regression in 0.27.0 that broke setting of specific edge
    padding/margin via remote control (#6333)
  * macOS: Fix window shadows not being drawn for transparent
    windows (#2827, #6416)
  * Do not echo invalid DECRQSS queries back, behavior inherited from xterm
    (CVE-2008-2383). Similarly, fix an echo bug in the file transfer protocol
    due to insufficient sanitization of safe strings.

- Update to 0.28.1:
  * Fix a regression in the previous release that broke the remote file kitten (#6186)
  * Fix a regression in the previous release that broke handling of some keyboard
    shortcuts in some kittens on some keyboard layouts (#6189)
  * Fix a regression in the previous release that broke usage of custom themes (#6191)

- Update to 0.28.0:
  * Text rendering change: Use sRGB correct linear gamma blending
    for nicer font rendering and better color accuracy with
    transparent windows. See the option text_composition_strategy for details.
    The obsolete macos_thicken_font will make the font too thick
    and needs to be removed manually if it is configured. (#5969)
  * icat kitten: Support display of images inside tmux &gt;= 3.3 (#5664)
  * Graphics protocol: Add support for displaying images inside programs
    that do not support the protocol such as vim and tmux (#5664)
  * diff kitten: Add support for selecting multi-line text with the mouse
  * Fix a regression in 0.27.0 that broke kitty @ set-font-size 0 (#5992)
  * launch: When using --cwd=current for a remote system support
    running non shell commands as well (#5987)
  * When changing the cursor color via escape codes or remote control
    to a fixed color, do not reset cursor_text_color (#5994)
  * Input Method Extensions: Fix incorrect rendering of IME in-progress
    and committed text in some situations (#6049, #6087)
  * Linux: Reduce minimum required OpenGL version from 3.3
    to 3.1 + extensions (#2790)
  * Fix a regression that broke drawing of images below cell backgrounds (#6061)
  * When reloading configuration, also reload custom MIME types
    from mime.types config file (#6012)
  * launch: Allow specifying the state (full screen/maximized/minimized)
    for newly created OS Windows (#6026)
  * Sessions: Allow specifying the OS window state via
    the os_window_state directive (#5863)
  * Linux: A new option linux_bell_theme to control which sound theme
    is used for the bell sound (#4858)
  * ssh kitten: Change the syntax of glob patterns slightly to match common
    usage elsewhere. Now the syntax is the same as extendedglob in most shells.
  * hints kitten: Allow copying matches to named buffers (#6073)
  * Fix overlay windows not inheriting the per-window padding
    and margin settings of their parents (#6063)
  * Wayland KDE: Fix selecting in un-focused OS window not working correctly (#6095)
  * Linux X11: Fix a crash if the X server requests clipboard data
    after we have relinquished the clipboard (#5650)
  * Allow stopping of URL detection at newlines via url_excluded_characters (#6122)
  * Linux Wayland: Fix animated images not being animated continuously (#6126)
  * Keyboard input: Fix text not being reported as unicode codepoints
    for multi-byte characters in the kitty keyboard protocol (#6167)

- Update to 0.27.0 &amp; 0.27.1:
  * Fix modify_font not working for strikethrough position (#5946)
  * Fix a regression causing the edit-in-kitty command not working
    if kitten is not added to PATH (#5956)
  * icat kitten: Fix a regression that broke display of animated
    GIFs over SSH (#5958)
  * Wayland GNOME: Fix for ibus not working when using XWayland (#5967)
  * Fix regression in previous release that caused incorrect entries
    in terminfo for modifier+F3 key combinations (#5970)
  * Bring back the deprecated and removed kitty +complete and delegate
    it to kitten for backward compatibility (#5977)
  * Bump the version of Go needed to build kitty to 1.20 so we can
    use the Go stdlib ecdh package for crypto.
  * A new statically compiled, standalone executable, kitten (written in Go)
    that can be used on all UNIX-like servers for remote control (kitten @),
    viewing images (kitten icat), manipulating the
    clipboard (kitten clipboard), etc.
  * clipboard kitten: Allow copying arbitrary data types to/from
    the clipboard, not just plain text
  * Speed up the kitty @ executable by ~10x reducing the time for
    typical remote control commands from ~50ms to ~5ms
  * icat kitten: Speed up by using POSIX shared memory when possible
    to transfer image data to the terminal. Also support common image
    formats GIF/PNG/JPEG/WEBP/TIFF/BMP out of the box without needing ImageMagick.
  * Option show_hyperlink_targets to show the target of terminal
    hyperlinks when hovering over them with the mouse (#5830)
  * Keyboard protocol: Remove CSI R from the allowed encodings of
    the F3 key as it conflicts with the Cursor Position Report escape code (#5813)
  * Allow using the cwd of the original process for launch --cwd (#5672)
  * Session files: Expand environment variables (#5917)
  * Pass key events mapped to scroll actions to the program running in
    the terminal when the terminal is in alternate screen mode (#5839)
  * Implement edit-in-kitty using the new kitten static executable (#5546, #5630)
  * Add an option background_tint_gaps to control background image
    tinting for window gaps (#5596)
  * A new option undercurl_style to control the rendering of undercurls (#5883)
  * Bash integration: Fix clone-in-kitty not working on bash &gt;= 5.2 if environment
    variable values contain newlines or other special characters (#5629)
  * A new sleep action useful in combine based mappings to make
    kitty sleep before executing the next action
  * Wayland GNOME: Workaround for latest mutter release breaking full
    screen for semi-transparent kitty windows (#5677)
  * A new option tab_title_max_length to limit the length of tab (#5718)
  * When drawing the tab bar have the default left and right margins
    drawn in a color matching the neighboring tab (#5719)
  * When using the include directive in kitty.conf make the environment
    variable KITTY_OS available for OS specific config
  * Wayland: Fix signal handling not working with some GPU drivers (#4636)
  * Remote control: When matching windows allow using negative id numbers
    to match recently created windows (#5753)
  * ZSH Integration: Bind alt+left and alt+right to move by word if not already bound.
    This mimics the default bindings in Terminal.app (#5793)
  * When a multi-key sequence does not match any action,
    send all key events to the child program (#5841)
  * broadcast kitten: Allow pressing a key to stop echoing of
    input into the broadcast window itself (#5868)
  * When reporting unused activity in a window, ignore activity
    that occurs soon after a window resize (#5881)
  * Fix using cursor = none not working on text that has reverse video (#5897)		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-11"/>
	<updated date="2023-08-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2008-2383/">CVE-2008-2383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2008-2383">CVE-2008-2383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009778290" comment="kitty-0.29.2-bp155.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778291" comment="kitty-shell-integration-0.29.2-bp155.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778293" comment="kitty-terminfo-0.29.2-bp155.3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3946" version="1" class="patch">
	<metadata>
		<title>Security update for opensuse-welcome (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213708" ref_url="https://bugzilla.suse.com/1213708" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32184" ref_url="https://www.suse.com/security/cve/CVE-2023-32184/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0219-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HSVERGEID7EOMQUUGEUFM6IS7QB7YYU3/" source="SUSE-SU"/>
		<description>
This update for opensuse-welcome fixes the following issues:

Update to version 0.1.9+git.35.4b9444a:

* CVE-2023-32184: panellayouter: use QTemporaryFile for applyLayout() (boo#1213708).
* Translation updates.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-14"/>
	<updated date="2023-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213708">SUSE bug 1213708</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32184/">CVE-2023-32184 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32184">CVE-2023-32184 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009778591" comment="opensuse-welcome-0.1.9+git.35.4b9444a-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778592" comment="opensuse-welcome-lang-0.1.9+git.35.4b9444a-bp155.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3947" version="1" class="patch">
	<metadata>
		<title>Security update for perl-HTTP-Tiny (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211002" ref_url="https://bugzilla.suse.com/1211002" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-31486" ref_url="https://www.suse.com/security/cve/CVE-2023-31486/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3ZS64YN6IDP4X4L3RSPD77DZ3YJT32J/" source="SUSE-SU"/>
		<description>
This update for perl-HTTP-Tiny fixes the following issues:

perl-HTTP-Tiny was updated to 0.086:

see /usr/share/doc/packages/perl-HTTP-Tiny/Changes

0.086     2023-06-22 10:06:37-04:00 America/New_York

    - Fix code to use `$ENV{PERL_HTTP_TINY_SSL_INSECURE_BY_DEFAULT}` as documented.

0.084     2023-06-14 06:35:01-04:00 America/New_York

    - No changes from 0.083-TRIAL.

0.083     2023-06-11 07:05:45-04:00 America/New_York (TRIAL RELEASE)

    [!!! SECURITY !!!]
    - Changes the `verify_SSL` default parameter from `0` to `1`.
      Fixes CVE-2023-31486 (boo#1211002)
    - `$ENV{PERL_HTTP_TINY_SSL_INSECURE_BY_DEFAULT}` can be used to restore the
      old default if required.

0.081     2022-07-17 09:01:51-04:00 America/New_York (TRIAL RELEASE)

      [FIXED]
      - No longer deletes the 'headers' key from post_form arguments hashref.
      [DOCS]
      - Noted that request/response content are handled as raw bytes.

0.079     2021-11-04 12:33:43-04:00 America/New_York (TRIAL RELEASE)

      [FIXED]
      - Fixed uninitialized value warnings on older Perls when the REQUEST_METHOD
        environment variable is set and CGI_HTTP_PROXY is not.

0.077     2021-07-22 13:07:14-04:00 America/New_York (TRIAL RELEASE)

      [ADDED]

      - Added a `patch` helper method for the HTTP `PATCH` verb.
      - If the REQUEST_METHOD environment variable is set, then CGI_HTTP_PROXY
        replaces HTTP_PROXY.

      [FIXED]

      - Unsupported scheme errors early without giving an uninitialized value
        warning first.
      - Sends Content-Length: 0 on empty body PUT/POST.  This is not in the spec,
        but some servers require this.
      - Allows optional status line reason, as clarified in RFC 7230.
      - Ignore SIGPIPE on reads as well as writes, as IO::Socket::SSL says that
        SSL reads can also send writes as a side effect.
      - Check if a server has closed a connection before preserving it for reuse.

      [DOCS]

      - Clarified that exceptions/errors result in 599 status codes.

      [PREREQS]

      - Optional IO::Socket::IP prereq must be at least version 0.32 to be used.
        This ensures correct timeout support.

0.076     2018-08-05 21:07:38-04:00 America/New_York
  
      - No changes from 0.075-TRIAL.
  
0.075     2018-08-01 07:03:36-04:00 America/New_York (TRIAL RELEASE)
  
      [CHANGED] - The 'peer' option now also can take a code reference

0.073     2018-07-24 11:33:53-04:00 America/New_York (TRIAL RELEASE)
  
      [DOCS] - Documented 'protocol' field in response hash.
  
0.071     2018-04-22 14:45:43+02:00 Europe/Oslo (TRIAL RELEASE)
  
      [DOCS] - Documented that method argument to request() is case-sensitive.
  
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-15"/>
	<updated date="2023-08-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211002">SUSE bug 1211002</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31486/">CVE-2023-31486 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31486">CVE-2023-31486 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778856" comment="perl-HTTP-Tiny-0.086-bp155.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3948" version="1" class="patch">
	<metadata>
		<title>Security update for perl-Cpanel-JSON-XS (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="openSUSE-SU-2023:0225-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JGMKILPALPRKZKTSIFCNX34CXF3LRPOS/" source="SUSE-SU"/>
		<description>
This update for perl-Cpanel-JSON-XS fixes the following issues:

perl-Cpanel-JSON-XS was updated to 4.36

see /usr/share/doc/packages/perl-Cpanel-JSON-XS/Changes

* 4.36 2023-03-02 (rurban)

    - remove the SAVESTACK_POS noop. Merged from JSON-XS-3.02,
      removed there with 4.0. requested to remove with
      L&lt;https://github.com/Perl/perl5/pull/20858&gt;

* 4.35 2023-02-22 (rurban)

    - fix utf8 object stringification (jixam PR #212)

* 4.34 2023-02-21 (rurban)

    - fix c89 compilation regression, for loop init on centos. GH #211

* 4.33 2023-02-21 (rurban)

    - fix a security issue, decoding hash keys without ending :
      (GH #208)
    - check all bare hash keys for utf8 (GH #209)
    - improve overload warnings (Graham Knop PR #205)
    - fix a croak leak (GH #206)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-17"/>
	<updated date="2023-08-17"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779033" comment="perl-Cpanel-JSON-XS-4.36-bp155.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3949" version="1" class="patch">
	<metadata>
		<title>Security update for python-mitmproxy (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1190603" ref_url="https://bugzilla.suse.com/1190603" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39214" ref_url="https://www.suse.com/security/cve/CVE-2021-39214/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0233-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZHDPB364QC7VFC7NPS2RHUKOKVUELUD7/" source="SUSE-SU"/>
		<description>
This update for python-mitmproxy fixes the following issues:

- CVE-2021-39214: Fixed HTTP smuggling attacks (boo#1190603)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-20"/>
	<updated date="2023-08-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190603">SUSE bug 1190603</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2021-39214/">CVE-2021-39214 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39214">CVE-2021-39214 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779334" comment="python3-mitmproxy-3.0.4-bp155.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3950" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214003" ref_url="https://bugzilla.suse.com/1214003" source="BUGZILLA"/>
		<reference ref_id="1214301" ref_url="https://bugzilla.suse.com/1214301" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2312" ref_url="https://www.suse.com/security/cve/CVE-2023-2312/" source="CVE"/>
		<reference ref_id="CVE-2023-4349" ref_url="https://www.suse.com/security/cve/CVE-2023-4349/" source="CVE"/>
		<reference ref_id="CVE-2023-4350" ref_url="https://www.suse.com/security/cve/CVE-2023-4350/" source="CVE"/>
		<reference ref_id="CVE-2023-4351" ref_url="https://www.suse.com/security/cve/CVE-2023-4351/" source="CVE"/>
		<reference ref_id="CVE-2023-4352" ref_url="https://www.suse.com/security/cve/CVE-2023-4352/" source="CVE"/>
		<reference ref_id="CVE-2023-4353" ref_url="https://www.suse.com/security/cve/CVE-2023-4353/" source="CVE"/>
		<reference ref_id="CVE-2023-4354" ref_url="https://www.suse.com/security/cve/CVE-2023-4354/" source="CVE"/>
		<reference ref_id="CVE-2023-4355" ref_url="https://www.suse.com/security/cve/CVE-2023-4355/" source="CVE"/>
		<reference ref_id="CVE-2023-4356" ref_url="https://www.suse.com/security/cve/CVE-2023-4356/" source="CVE"/>
		<reference ref_id="CVE-2023-4357" ref_url="https://www.suse.com/security/cve/CVE-2023-4357/" source="CVE"/>
		<reference ref_id="CVE-2023-4358" ref_url="https://www.suse.com/security/cve/CVE-2023-4358/" source="CVE"/>
		<reference ref_id="CVE-2023-4359" ref_url="https://www.suse.com/security/cve/CVE-2023-4359/" source="CVE"/>
		<reference ref_id="CVE-2023-4360" ref_url="https://www.suse.com/security/cve/CVE-2023-4360/" source="CVE"/>
		<reference ref_id="CVE-2023-4361" ref_url="https://www.suse.com/security/cve/CVE-2023-4361/" source="CVE"/>
		<reference ref_id="CVE-2023-4362" ref_url="https://www.suse.com/security/cve/CVE-2023-4362/" source="CVE"/>
		<reference ref_id="CVE-2023-4363" ref_url="https://www.suse.com/security/cve/CVE-2023-4363/" source="CVE"/>
		<reference ref_id="CVE-2023-4364" ref_url="https://www.suse.com/security/cve/CVE-2023-4364/" source="CVE"/>
		<reference ref_id="CVE-2023-4365" ref_url="https://www.suse.com/security/cve/CVE-2023-4365/" source="CVE"/>
		<reference ref_id="CVE-2023-4366" ref_url="https://www.suse.com/security/cve/CVE-2023-4366/" source="CVE"/>
		<reference ref_id="CVE-2023-4367" ref_url="https://www.suse.com/security/cve/CVE-2023-4367/" source="CVE"/>
		<reference ref_id="CVE-2023-4368" ref_url="https://www.suse.com/security/cve/CVE-2023-4368/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0234-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BHGOO7OFVF75LWZYDKQO5H6ZBGN5JVTX/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 116.0.5845.96

* New CSS features: Motion Path, and 'display' and
  'content-visibility' animations
* Web APIs: AbortSignal.any(), BYOB support for Fetch, Back/
  forward cache NotRestoredReason API, Document Picture-in-
  Picture, Expanded Wildcards in Permissions Policy Origins,
  FedCM bundle: Login Hint API, User Info API, and RP Context API,
  Non-composed Mouse and Pointer enter/leave events, 
  Remove document.open sandbox inheritance, 
  Report Critical-CH caused restart in NavigationTiming

This update fixes a number of security issues (boo#1214301):

  * CVE-2023-2312: Use after free in Offline
  * CVE-2023-4349: Use after free in Device Trust Connectors
  * CVE-2023-4350: Inappropriate implementation in Fullscreen
  * CVE-2023-4351: Use after free in Network
  * CVE-2023-4352: Type Confusion in V8
  * CVE-2023-4353: Heap buffer overflow in ANGLE
  * CVE-2023-4354: Heap buffer overflow in Skia
  * CVE-2023-4355: Out of bounds memory access in V8
  * CVE-2023-4356: Use after free in Audio
  * CVE-2023-4357: Insufficient validation of untrusted input in XML
  * CVE-2023-4358: Use after free in DNS
  * CVE-2023-4359: Inappropriate implementation in App Launcher
  * CVE-2023-4360: Inappropriate implementation in Color
  * CVE-2023-4361: Inappropriate implementation in Autofill
  * CVE-2023-4362: Heap buffer overflow in Mojom IDL
  * CVE-2023-4363: Inappropriate implementation in WebShare
  * CVE-2023-4364: Inappropriate implementation in Permission Prompts
  * CVE-2023-4365: Inappropriate implementation in Fullscreen
  * CVE-2023-4366: Use after free in Extensions
  * CVE-2023-4367: Insufficient policy enforcement in Extensions API
  * CVE-2023-4368: Insufficient policy enforcement in Extensions API

- Fix crash with extensions (boo#1214003)

		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-21"/>
	<updated date="2023-08-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214003">SUSE bug 1214003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214301">SUSE bug 1214301</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2312/">CVE-2023-2312 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2312">CVE-2023-2312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4349/">CVE-2023-4349 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4349">CVE-2023-4349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4350/">CVE-2023-4350 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4350">CVE-2023-4350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4351/">CVE-2023-4351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4351">CVE-2023-4351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4352/">CVE-2023-4352 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4352">CVE-2023-4352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4353/">CVE-2023-4353 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4353">CVE-2023-4353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4354/">CVE-2023-4354 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4354">CVE-2023-4354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4355/">CVE-2023-4355 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4355">CVE-2023-4355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4356/">CVE-2023-4356 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4356">CVE-2023-4356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4357/">CVE-2023-4357 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4357">CVE-2023-4357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4358/">CVE-2023-4358 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4358">CVE-2023-4358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4359/">CVE-2023-4359 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4359">CVE-2023-4359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4360/">CVE-2023-4360 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4360">CVE-2023-4360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4361/">CVE-2023-4361 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4361">CVE-2023-4361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4362/">CVE-2023-4362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4362">CVE-2023-4362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4363/">CVE-2023-4363 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4363">CVE-2023-4363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4364/">CVE-2023-4364 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4364">CVE-2023-4364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4365/">CVE-2023-4365 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4365">CVE-2023-4365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4366/">CVE-2023-4366 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4366">CVE-2023-4366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4367/">CVE-2023-4367 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4367">CVE-2023-4367 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4368/">CVE-2023-4368 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4368">CVE-2023-4368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009779339" comment="chromedriver-116.0.5845.96-bp155.2.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779340" comment="chromium-116.0.5845.96-bp155.2.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3951" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214487" ref_url="https://bugzilla.suse.com/1214487" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4427" ref_url="https://www.suse.com/security/cve/CVE-2023-4427/" source="CVE"/>
		<reference ref_id="CVE-2023-4428" ref_url="https://www.suse.com/security/cve/CVE-2023-4428/" source="CVE"/>
		<reference ref_id="CVE-2023-4429" ref_url="https://www.suse.com/security/cve/CVE-2023-4429/" source="CVE"/>
		<reference ref_id="CVE-2023-4430" ref_url="https://www.suse.com/security/cve/CVE-2023-4430/" source="CVE"/>
		<reference ref_id="CVE-2023-4431" ref_url="https://www.suse.com/security/cve/CVE-2023-4431/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0237-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H37YYMY3746JCGEKWXZITPFMBMSHFECF/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 116.0.5845.110 (boo#1214487):

* CVE-2023-4427: Out of bounds memory access in V8
* CVE-2023-4428: Out of bounds memory access in CSS
* CVE-2023-4429: Use after free in Loader
* CVE-2023-4430: Use after free in Vulkan
* CVE-2023-4431: Out of bounds memory access in Fonts
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-28"/>
	<updated date="2023-08-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214487">SUSE bug 1214487</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4427/">CVE-2023-4427 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4427">CVE-2023-4427 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4428/">CVE-2023-4428 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4428">CVE-2023-4428 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4429/">CVE-2023-4429 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4429">CVE-2023-4429 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4430/">CVE-2023-4430 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4430">CVE-2023-4430 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4431/">CVE-2023-4431 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4431">CVE-2023-4431 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009779772" comment="chromedriver-116.0.5845.110-bp155.2.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779773" comment="chromium-116.0.5845.110-bp155.2.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3952" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214758" ref_url="https://bugzilla.suse.com/1214758" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4572" ref_url="https://www.suse.com/security/cve/CVE-2023-4572/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HZMEQAS2PLBSCP2ZX4YULEP43PA52CWG/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Update to version 116.0.5845.140 (boo#1214758):

* CVE-2023-4572: Use after free in MediaStream
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-06"/>
	<updated date="2023-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214758">SUSE bug 1214758</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4572/">CVE-2023-4572 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4572">CVE-2023-4572 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009781699" comment="chromedriver-116.0.5845.140-bp155.2.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781700" comment="chromium-116.0.5845.140-bp155.2.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3953" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215023" ref_url="https://bugzilla.suse.com/1215023" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4761" ref_url="https://www.suse.com/security/cve/CVE-2023-4761/" source="CVE"/>
		<reference ref_id="CVE-2023-4762" ref_url="https://www.suse.com/security/cve/CVE-2023-4762/" source="CVE"/>
		<reference ref_id="CVE-2023-4763" ref_url="https://www.suse.com/security/cve/CVE-2023-4763/" source="CVE"/>
		<reference ref_id="CVE-2023-4764" ref_url="https://www.suse.com/security/cve/CVE-2023-4764/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0245-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EK5CYLZ4C2MARJPZIDEMA6WV35L2EHUN/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 116.0.5845.179 (boo#1215023):

* CVE-2023-4761: Out of bounds memory access in FedCM
* CVE-2023-4762: Type Confusion in V8
* CVE-2023-4763: Use after free in Networks
* CVE-2023-4764: Incorrect security UI in BFCache
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-12"/>
	<updated date="2023-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215023">SUSE bug 1215023</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4761/">CVE-2023-4761 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4761">CVE-2023-4761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4762/">CVE-2023-4762 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4762">CVE-2023-4762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4763/">CVE-2023-4763 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4763">CVE-2023-4763 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4764/">CVE-2023-4764 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4764">CVE-2023-4764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009791588" comment="chromedriver-116.0.5845.179-bp155.2.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791589" comment="chromium-116.0.5845.179-bp155.2.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3954" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215231" ref_url="https://bugzilla.suse.com/1215231" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0246-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MR7EQOG2DAHINLCMYHZGRM66IUNSTTSW/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Update to version 116.0.5845.187 (boo#1215231):

* CVE-2023-4863: Heap buffer overflow in WebP
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-13"/>
	<updated date="2023-09-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215231">SUSE bug 1215231</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009794704" comment="chromedriver-116.0.5845.187-bp155.2.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794705" comment="chromium-116.0.5845.187-bp155.2.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3955" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215231" ref_url="https://bugzilla.suse.com/1215231" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0247-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/452ZGDR435PX435CLL4M7OFR4DCKZZWI/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

- CVE-2023-4863: temporary build with the bundled library on Leap (boo#1215231)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-15"/>
	<updated date="2023-09-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215231">SUSE bug 1215231</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009795739" comment="chromedriver-116.0.5845.187-bp155.2.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795740" comment="chromium-116.0.5845.187-bp155.2.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3956" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215279" ref_url="https://bugzilla.suse.com/1215279" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4900" ref_url="https://www.suse.com/security/cve/CVE-2023-4900/" source="CVE"/>
		<reference ref_id="CVE-2023-4901" ref_url="https://www.suse.com/security/cve/CVE-2023-4901/" source="CVE"/>
		<reference ref_id="CVE-2023-4902" ref_url="https://www.suse.com/security/cve/CVE-2023-4902/" source="CVE"/>
		<reference ref_id="CVE-2023-4903" ref_url="https://www.suse.com/security/cve/CVE-2023-4903/" source="CVE"/>
		<reference ref_id="CVE-2023-4904" ref_url="https://www.suse.com/security/cve/CVE-2023-4904/" source="CVE"/>
		<reference ref_id="CVE-2023-4905" ref_url="https://www.suse.com/security/cve/CVE-2023-4905/" source="CVE"/>
		<reference ref_id="CVE-2023-4906" ref_url="https://www.suse.com/security/cve/CVE-2023-4906/" source="CVE"/>
		<reference ref_id="CVE-2023-4907" ref_url="https://www.suse.com/security/cve/CVE-2023-4907/" source="CVE"/>
		<reference ref_id="CVE-2023-4908" ref_url="https://www.suse.com/security/cve/CVE-2023-4908/" source="CVE"/>
		<reference ref_id="CVE-2023-4909" ref_url="https://www.suse.com/security/cve/CVE-2023-4909/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0249-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MN26MICUYGDWUEPBBIGFRKH4W75UL6M2/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Update to verion 117.0.5938.88 (boo#1215279):

- CVE-2023-4900: Inappropriate implementation in Custom Tabs
- CVE-2023-4901: Inappropriate implementation in Prompts
- CVE-2023-4902: Inappropriate implementation in Input
- CVE-2023-4903: Inappropriate implementation in Custom Mobile Tabs
- CVE-2023-4904: Insufficient policy enforcement in Downloads
- CVE-2023-4905: Inappropriate implementation in Prompts
- CVE-2023-4906: Insufficient policy enforcement in Autofill
- CVE-2023-4907: Inappropriate implementation in Intents
- CVE-2023-4908: Inappropriate implementation in Picture in Picture
- CVE-2023-4909: Inappropriate implementation in Interstitials
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-19"/>
	<updated date="2023-09-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215279">SUSE bug 1215279</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4900/">CVE-2023-4900 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4900">CVE-2023-4900 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4901/">CVE-2023-4901 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4901">CVE-2023-4901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4902/">CVE-2023-4902 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4902">CVE-2023-4902 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4903/">CVE-2023-4903 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4903">CVE-2023-4903 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4904/">CVE-2023-4904 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4904">CVE-2023-4904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4905/">CVE-2023-4905 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4905">CVE-2023-4905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4906/">CVE-2023-4906 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4906">CVE-2023-4906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4907/">CVE-2023-4907 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4907">CVE-2023-4907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4908/">CVE-2023-4908 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4908">CVE-2023-4908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4909/">CVE-2023-4909 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4909">CVE-2023-4909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009796618" comment="chromedriver-117.0.5938.88-bp155.2.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796619" comment="chromium-117.0.5938.88-bp155.2.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3957" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2023-2312" ref_url="https://www.suse.com/security/cve/CVE-2023-2312/" source="CVE"/>
		<reference ref_id="CVE-2023-3420" ref_url="https://www.suse.com/security/cve/CVE-2023-3420/" source="CVE"/>
		<reference ref_id="CVE-2023-3421" ref_url="https://www.suse.com/security/cve/CVE-2023-3421/" source="CVE"/>
		<reference ref_id="CVE-2023-3422" ref_url="https://www.suse.com/security/cve/CVE-2023-3422/" source="CVE"/>
		<reference ref_id="CVE-2023-4068" ref_url="https://www.suse.com/security/cve/CVE-2023-4068/" source="CVE"/>
		<reference ref_id="CVE-2023-4069" ref_url="https://www.suse.com/security/cve/CVE-2023-4069/" source="CVE"/>
		<reference ref_id="CVE-2023-4070" ref_url="https://www.suse.com/security/cve/CVE-2023-4070/" source="CVE"/>
		<reference ref_id="CVE-2023-4071" ref_url="https://www.suse.com/security/cve/CVE-2023-4071/" source="CVE"/>
		<reference ref_id="CVE-2023-4072" ref_url="https://www.suse.com/security/cve/CVE-2023-4072/" source="CVE"/>
		<reference ref_id="CVE-2023-4073" ref_url="https://www.suse.com/security/cve/CVE-2023-4073/" source="CVE"/>
		<reference ref_id="CVE-2023-4074" ref_url="https://www.suse.com/security/cve/CVE-2023-4074/" source="CVE"/>
		<reference ref_id="CVE-2023-4075" ref_url="https://www.suse.com/security/cve/CVE-2023-4075/" source="CVE"/>
		<reference ref_id="CVE-2023-4076" ref_url="https://www.suse.com/security/cve/CVE-2023-4076/" source="CVE"/>
		<reference ref_id="CVE-2023-4077" ref_url="https://www.suse.com/security/cve/CVE-2023-4077/" source="CVE"/>
		<reference ref_id="CVE-2023-4078" ref_url="https://www.suse.com/security/cve/CVE-2023-4078/" source="CVE"/>
		<reference ref_id="CVE-2023-4349" ref_url="https://www.suse.com/security/cve/CVE-2023-4349/" source="CVE"/>
		<reference ref_id="CVE-2023-4350" ref_url="https://www.suse.com/security/cve/CVE-2023-4350/" source="CVE"/>
		<reference ref_id="CVE-2023-4351" ref_url="https://www.suse.com/security/cve/CVE-2023-4351/" source="CVE"/>
		<reference ref_id="CVE-2023-4352" ref_url="https://www.suse.com/security/cve/CVE-2023-4352/" source="CVE"/>
		<reference ref_id="CVE-2023-4353" ref_url="https://www.suse.com/security/cve/CVE-2023-4353/" source="CVE"/>
		<reference ref_id="CVE-2023-4354" ref_url="https://www.suse.com/security/cve/CVE-2023-4354/" source="CVE"/>
		<reference ref_id="CVE-2023-4355" ref_url="https://www.suse.com/security/cve/CVE-2023-4355/" source="CVE"/>
		<reference ref_id="CVE-2023-4356" ref_url="https://www.suse.com/security/cve/CVE-2023-4356/" source="CVE"/>
		<reference ref_id="CVE-2023-4357" ref_url="https://www.suse.com/security/cve/CVE-2023-4357/" source="CVE"/>
		<reference ref_id="CVE-2023-4358" ref_url="https://www.suse.com/security/cve/CVE-2023-4358/" source="CVE"/>
		<reference ref_id="CVE-2023-4359" ref_url="https://www.suse.com/security/cve/CVE-2023-4359/" source="CVE"/>
		<reference ref_id="CVE-2023-4360" ref_url="https://www.suse.com/security/cve/CVE-2023-4360/" source="CVE"/>
		<reference ref_id="CVE-2023-4361" ref_url="https://www.suse.com/security/cve/CVE-2023-4361/" source="CVE"/>
		<reference ref_id="CVE-2023-4362" ref_url="https://www.suse.com/security/cve/CVE-2023-4362/" source="CVE"/>
		<reference ref_id="CVE-2023-4363" ref_url="https://www.suse.com/security/cve/CVE-2023-4363/" source="CVE"/>
		<reference ref_id="CVE-2023-4364" ref_url="https://www.suse.com/security/cve/CVE-2023-4364/" source="CVE"/>
		<reference ref_id="CVE-2023-4365" ref_url="https://www.suse.com/security/cve/CVE-2023-4365/" source="CVE"/>
		<reference ref_id="CVE-2023-4366" ref_url="https://www.suse.com/security/cve/CVE-2023-4366/" source="CVE"/>
		<reference ref_id="CVE-2023-4367" ref_url="https://www.suse.com/security/cve/CVE-2023-4367/" source="CVE"/>
		<reference ref_id="CVE-2023-4368" ref_url="https://www.suse.com/security/cve/CVE-2023-4368/" source="CVE"/>
		<reference ref_id="CVE-2023-4572" ref_url="https://www.suse.com/security/cve/CVE-2023-4572/" source="CVE"/>
		<description>
This update for opera fixes the following issues:

- Update to 102.0.4880.40
  * DNA-111203 Prepare translations for home button in settings

- Changes in 102.0.4880.38
  * DNA-110720 [Sidebar] Sidebar app increase size every time
    it's reopened
  * DNA-110723 Music logo in light mode of 'Select service'
    unreadable on hover
  * DNA-110821 Run-if-alive callback missing in WMFDecoderImpl
  * DNA-110835 Search/copy popup issues
  * DNA-111038 Disable profile migration
  * DNA-111263 Tab island animation incorrect when tabstrip full

- Update to 102.0.4880.33
  * CHR-9411 Update Chromium on desktop-stable-116-4880 to
    116.0.5845.141
  * DNA-110172 [BUG] Images inside popup does not get rounded
    corner
  * DNA-110828 Update chess.com build
  * DNA-110834 Crash at opera::component_based::
    TabAnimationController::StartAnimatedLayout(opera::
    component_based::TabAnimationController::AnimationInfo,
    base::OnceCallback)
  * DNA-111144 Enable a new version of the extension.
- The update to chromium 116.0.5845.141 fixes following issues: 
  CVE-2023-4572

- Update to 102.0.4880.29
  * DNA-109498 Splash screen is shown on every restart of
    the browser
  * DNA-109698 Test Amazon Music support
  * DNA-109840 Amazon music logo is very small and unreadable
  * DNA-109841 Amazon music logo in player mode is too wide
  * DNA-109842 [opauto] Add tests for Amazon Music in Player
  * DNA-109937 Crash at opera::ComponentTabStripController::
    SetGroupCollapsed(tab_groups::TabGroupId const, bool)
  * DNA-110107 Clicking roblox link on page closes the tab
  * DNA-110110 [Tab strip][Tab island] Middle/right mouse click
    on top of the screen have no/wrong efect
  * DNA-110125 [Win/Lin] New design for default scrollbars on
    web page
  * DNA-110130 Capture mouse events on the 1-pixel edge to the
    right of the web view
  * DNA-110586 Shadow is clipped if first tab is selected
  * DNA-110637 Revert removal of start page button
  * DNA-110684 Add bookmarks permissions
  * DNA-110702 [Scrollable] Pin group is not aligned with
    address bar
  * DNA-110737 [OMenu] Menu button looks weird
  * DNA-110788 No 1-pixel edge in full screen mode
  * DNA-110828 Update chess.com build
  * DNA-110842 [Tab strip] Make + button round(er) again
  * DNA-110874 Bring back Home button
  * DNA-110876 Search box on Start page without transparency
  * DNA-110878 Turn on Amazon Music on developer
  * DNA-110905 Amazon Music for all given locales
  * DNA-110961 [WinLin] Remove 1-pixel edge in full screen mode
  * DNA-111038 Disable profile migration
  * DNA-111079 Improve user-profile migration
  * DNA-111092 Disable profile migration flag for
    desktop-stable-116-4880

- Update to 102.0.4880.16
  * CHR-9396 Update Chromium on desktop-stable-116-4880 to
    116.0.5845.97
  * DNA-110040 Crash at crash_reporter::(anonymous namespace)::
    AbslAbortHook(char const*, int, char const*, char const*,
    char const*)
  * DNA-110315 O-menu opening after pressing alt on site which
    have action for Alt press
  * DNA-110440 [Tab strip] Tab favicon not cropped when it does
    not fit in tab size
  * DNA-110469 Move Shopping corner and Loomi to
    'Special Features' section
  * DNA-110510 [Tab strip] Mute icon displayed over tab title
  * DNA-110526 If group is first the tab bar is not aligned
    with address bar
  * DNA-110828 Update chess.com build
  * DNA-110836 Promote 102 to stable
  * DNA-110892 Translations for O102
  * DNA-110962 Fix ab_tests.json preferences override not working
- The update to chromium 116.0.5845.97 fixes following issues: 
  CVE-2023-2312, CVE-2023-4349, CVE-2023-4350, CVE-2023-4351,
  CVE-2023-4352, CVE-2023-4353, CVE-2023-4354, CVE-2023-4355,
  CVE-2023-4356, CVE-2023-4357, CVE-2023-4358, CVE-2023-4359,
  CVE-2023-4360, CVE-2023-4361, CVE-2023-4362, CVE-2023-4362,
  CVE-2023-4363, CVE-2023-4364, CVE-2023-4365, CVE-2023-4366,
  CVE-2023-4367, CVE-2023-4368
- Complete Opera 102 changelog at:
  https://blogs.opera.com/desktop/changelog-for-102/

- Update to 101.0.4843.43
  * CHR-9381 Update Chromium on desktop-stable-115-4843 to
    115.0.5790.171
  * DNA-108919 Tab Island 'Move To Island' highlight color is the
    same as island color
  * DNA-109202 Often extension popup is not displayed
  * DNA-109454 Wallpaper customization with remote resource
  * DNA-109679 Fix typo in flags schema
  * DNA-109927 Add tooltips for visual or incomplete items in
    context menu
  * DNA-110225 Replace Twitter logo in Sidebar with the new one X
  * DNA-110244 Translations for O101
  * DNA-110276 Fix race condition in DeferredInstalledWallpapers
  * DNA-110400 teaser_event_impression counted when user closes
    baner
- The update to chromium 115.0.5790.171 fixes following issues:    
  CVE-2023-4068, CVE-2023-4069, CVE-2023-4070, CVE-2023-4071,
  CVE-2023-4072, CVE-2023-4073, CVE-2023-4074, CVE-2023-4075,
  CVE-2023-4076, CVE-2023-4077, CVE-2023-4078

- Update to 101.0.4843.23
  * DNA-109400 Enable #adblocker-anticv on developer stream
  * DNA-109423 Add histograms to help track 
    #platform-h264-decoder-in-gpu quality
  * DNA-109861 Crash on expading folder on bookmark bar containing
    unnamed subfolder
  * DNA-109872 WMFAudioDecoder reports spurious dry run if
    initialized during pipeline shutdown
  * DNA-109908 Crash at opera::(anonymous namespace)::
    AddNewTabToWorkspaceIfCurrent(Browser*, opera::WorkspaceId)
    (.llvm.13400399341940007321)
  * DNA-110005 Duplicated tabs indicator is not shown on tab bar
  * DNA-110062 [Linux] QT6 dependency issue with .rpm package
  * DNA-110210 Enable #adblocker-anticv on all streams
  * DNA-110244 Translations for O101

- Update to 101.0.4843.25
  * CHR-9357 Update Chromium on desktop-stable-115-4843 to
    115.0.5790.90
  * CHR-9362 Update Chromium on desktop-stable-115-4843 to
    115.0.5790.102
  * DNA-104841 Create a smooth corner background
  * DNA-108012 [Opera One] Misaligned inner bookmarks menu
    in Opera Menu
  * DNA-109129 Crash at opera::component_based::
    OperaOneIntroductionAnimationController::AnimateHideVisibility()
  * DNA-109209 Dragged island falls under island its being
    dragged over
  * DNA-109266 Crash at content::WebContentsImpl::
    SetDelegate(content::WebContentsDelegate*)
  * DNA-109310 Broken session files are not automatically
    recovered
  * DNA-109448 [AdBlock] Images from ads are missing with AA
    enabled
  * DNA-109587 'Show bookmarks bar' checkbox on bookmarks
    feature(Dark Mode)
  * DNA-109674 Closing the tabs in the workspace in the other
    window will close Opera
  * DNA-109694 Smooth corners on active tab
  * DNA-109774 Log when trying to switch workspace while
    closing browser
  * DNA-110005 Duplicated tabs indicator is not shown on tab bar
  * DNA-110244 Translations for O101
- Complete Opera 101 changelog at:
  https://blogs.opera.com/desktop/changelog-for-101/

- Update to 100.0.4815.76
  * DNA-109129 Crash at opera::component_based::Opera
    OneIntroductionAnimationController::AnimateHideVisibility()
  * DNA-109233 Crash at crash_reporter::(anonymous namespace)::
    AbslAbortHook(char const*, int, char const*, char const*,
    char const*)
  * DNA-109673 Session stat event teaser_tile_click is not sent
  * DNA-109897 Session is lost when new session file is created
- Changes in 100.0.4815.54
  * DNA-109148 Allow AI extension to change permissions during
    update
  * DNA-109172 WMFAudioDecoder fails with
    #platform-aac-decoder-in-gpu enabled
  * DNA-109633 Do not send TabStripEmpty multiple times
  * DNA-109674 Closing the tabs in the workspace in the other
    window will close Opera
  * DNA-109774 Log when trying to switch workspace while
    closing browser
- Changes in 100.0.4815.47
  * DNA-108456 WMFAudioDecoder dry run should include decoding
    one buffer
  * DNA-108478 Disable extension icon on the right side
    (where all normal extensions are)
  * DNA-108791 Give access to feedbackPopupPrivate
  * DNA-109134 Crash at media::FFmpegDemuxer::
    OnFindStreamInfoDone(int) if LD_PRELOAD set by user
  * DNA-109137 SD images/icons/logo not loading or loading
    really slow
  * DNA-109182 Please add an event when popup closes
  * DNA-109231 Extended click area does not work for groups
  * DNA-109242 Session unload kDisablePageLoadsOnStartup
    not working
  * DNA-109310 Broken session files are not automatically recovered
  * DNA-109618 Crash logger RestartAction should be set only
    after crash
  

- Update to 100.0.4815.30
  * CHR-9339 Update Chromium on desktop-stable-114-4815 to 
    114.0.5735.199
  * DNA-106986 [Tab strip][Tab islands] Reduce size of tab island
    handle
  * DNA-107205 Disable banner on fresh installation
    'Back up your Opera Browser'
  * DNA-107306 Update Contributors list Opera One
  * DNA-107337 NotReached in Browser::CloseContents
  * DNA-107673 Crash at static void 
    opera::ComponentTabStripController::ShowHoverCardForGroup()
  * DNA-108461 Distribute Aria with the Opera build
  * DNA-108540 [Rich Hints] Tab islands a trigger and anchor
  * DNA-108545 Track accelerated video decoding support
  * DNA-108606 [Mac] Opening context menu closes subfolders menu
    on bookmark bar
  * DNA-108664 Set minimum and maximum width for Aria extension
  * DNA-108702 Tab falls outside island with specific number of
    tabs on tab strip
  * DNA-108731 Add 'aria' stat to the schema
  * DNA-108760 Record tab islands events
  * DNA-108761 Implement Later functionality
  * DNA-108763 Implement Quit while showing onboarding
  * DNA-108806 Command Line not activated when sidebar panel
    is opened
  * DNA-108858 [Linux] Browser window corners are not rounded
    perfectly
  * DNA-108863 Sidebar panel isn't properly aligned with sidebar
  * DNA-108882 [Icon change] Sync icon without custom image
  * DNA-108898 [Autohide] Sidebar panel title bar is not tall
    enough
  * DNA-108906 Turn on #component-based-context-menu on all streams
  * DNA-108907 Empty text (button inactive) button color is wrong
  * DNA-108912 Implement rotating animation for Aria command line
  * DNA-108921 Enable #opera-one-introduction on all streams
  * DNA-108928 Show overlay only if command-line parameter was
    given
  * DNA-108933 Update repack script to handle introduction
    extension
  * DNA-108938 Translations for O100
  * DNA-108942 Remove Shopping Corner from the sidebar by default
  * DNA-108943 Crash at 
    opera::AriaCommandLineController::~AriaCommandLineController()
  * DNA-108949 Make opera://intro display introduction page from
    extension
  * DNA-108952 Implement splash screen
  * DNA-108955 Aria extension is moved to the right after sending
    prompt from Command Line when sidebar is set to autohide
  * DNA-108957 Opera crashes during shutdown after
    opera-one-introduction hid
  * DNA-108958 Commandline disappears after clicking Aria
    logo on Commandline bar
  * DNA-108959 Commandline does not have hover effect on Send
    button
  * DNA-108980 Add Control+Shift+7 / Command+Shift+7 as alternative
    shortcut for Aria command line
  * DNA-108992 Opera One introduction appears in every New Window
  * DNA-109009 Crash at
    opera::component_based::ComponentTabGroup::UpdateTabAppearances()
  * DNA-109021 [Stable] No Shopping corner icon in sidebar setup
  * DNA-109031 [Tab islands] Island can automatically re-collapse
    when clicking handle button to expand it
  * DNA-109036 [Private Mode] [Light Team] Icons in address bar
    flashed white when pressed
  * DNA-109037 [Private Mode][Light] Folders name are not
    readable in BB when highlighted
  * DNA-109085 Two separators after Search with' option
  * DNA-109091 Can't change tab when window is maximized on second
    display
  * DNA-109096 'Move to workspaces' doesn't fit all workspaces
  * DNA-109099 [WinLin] Add Aria command line to Opera menu
  * DNA-109102 [O-menu][History] Wrong layout of elements without
    icon in history submenu
  * DNA-109129 Crash at opera::component_based::OperaOneIntroduction
    AnimationController::AnimateHideVisibility()
  * DNA-109199 DCHECK when pinning tabs
  * DNA-108893 Promote 100 to stable
- Complete Opera 100 changelog at:
  https://blogs.opera.com/desktop/changelog-for-100/
- The update to chromium 114.0.5735.199 fixes following issues:
  CVE-2023-3420, CVE-2023-3421, CVE-2023-3422

- Update to 99.0.4788.31
  * DNA-107338 NotReached in SadTabView::OnPaint
  * DNA-107689 Crash at extensions::
    ShodanPrivateShowPopupForSelectedTextFunction::Run()
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-24"/>
	<updated date="2023-09-24"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2312/">CVE-2023-2312 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2312">CVE-2023-2312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3420/">CVE-2023-3420 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3420">CVE-2023-3420 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3421/">CVE-2023-3421 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3421">CVE-2023-3421 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3422/">CVE-2023-3422 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3422">CVE-2023-3422 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4068/">CVE-2023-4068 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4068">CVE-2023-4068 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4069/">CVE-2023-4069 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4069">CVE-2023-4069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4070/">CVE-2023-4070 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4070">CVE-2023-4070 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4071/">CVE-2023-4071 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4071">CVE-2023-4071 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4072/">CVE-2023-4072 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4072">CVE-2023-4072 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4073/">CVE-2023-4073 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4073">CVE-2023-4073 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4074/">CVE-2023-4074 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4074">CVE-2023-4074 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4075/">CVE-2023-4075 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4075">CVE-2023-4075 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4076/">CVE-2023-4076 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4076">CVE-2023-4076 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4077/">CVE-2023-4077 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4077">CVE-2023-4077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4078/">CVE-2023-4078 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4078">CVE-2023-4078 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4349/">CVE-2023-4349 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4349">CVE-2023-4349 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4350/">CVE-2023-4350 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4350">CVE-2023-4350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4351/">CVE-2023-4351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4351">CVE-2023-4351 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4352/">CVE-2023-4352 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4352">CVE-2023-4352 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4353/">CVE-2023-4353 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4353">CVE-2023-4353 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4354/">CVE-2023-4354 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4354">CVE-2023-4354 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4355/">CVE-2023-4355 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4355">CVE-2023-4355 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4356/">CVE-2023-4356 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4356">CVE-2023-4356 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4357/">CVE-2023-4357 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4357">CVE-2023-4357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4358/">CVE-2023-4358 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4358">CVE-2023-4358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4359/">CVE-2023-4359 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4359">CVE-2023-4359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4360/">CVE-2023-4360 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4360">CVE-2023-4360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4361/">CVE-2023-4361 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4361">CVE-2023-4361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4362/">CVE-2023-4362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4362">CVE-2023-4362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4363/">CVE-2023-4363 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4363">CVE-2023-4363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4364/">CVE-2023-4364 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4364">CVE-2023-4364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4365/">CVE-2023-4365 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4365">CVE-2023-4365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4366/">CVE-2023-4366 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4366">CVE-2023-4366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4367/">CVE-2023-4367 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4367">CVE-2023-4367 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4368/">CVE-2023-4368 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4368">CVE-2023-4368 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4572/">CVE-2023-4572 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4572">CVE-2023-4572 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798656" comment="opera-102.0.4880.40-lp155.3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3958" version="1" class="patch">
	<metadata>
		<title>Security update for renderdoc (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212086" ref_url="https://bugzilla.suse.com/1212086" source="BUGZILLA"/>
		<reference ref_id="1212088" ref_url="https://bugzilla.suse.com/1212088" source="BUGZILLA"/>
		<reference ref_id="1212089" ref_url="https://bugzilla.suse.com/1212089" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-33863" ref_url="https://www.suse.com/security/cve/CVE-2023-33863/" source="CVE"/>
		<reference ref_id="CVE-2023-33864" ref_url="https://www.suse.com/security/cve/CVE-2023-33864/" source="CVE"/>
		<reference ref_id="CVE-2023-33865" ref_url="https://www.suse.com/security/cve/CVE-2023-33865/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0253-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OUXFQKIACDXNDNRMXVBF6QD6SJQYGXBM/" source="SUSE-SU"/>
		<description>
This update for renderdoc fixes the following issues:

Security issues fixed:

* CVE-2023-33863: integer overflow to heap-based buffer overflow
* CVE-2023-33864: integer underflow to heap-based buffer overflow
* CVE-2023-33865: symlink vulnerability in /tmp/RenderDoc 
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-25"/>
	<updated date="2023-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212086">SUSE bug 1212086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212088">SUSE bug 1212088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212089">SUSE bug 1212089</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-33863/">CVE-2023-33863 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33863">CVE-2023-33863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-33864/">CVE-2023-33864 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33864">CVE-2023-33864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-33865/">CVE-2023-33865 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33865">CVE-2023-33865 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009798691" comment="renderdoc-1.24-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798692" comment="renderdoc-devel-1.24-bp155.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3959" version="1" class="patch">
	<metadata>
		<title>Security update for modsecurity (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210993" ref_url="https://bugzilla.suse.com/1210993" source="BUGZILLA"/>
		<reference ref_id="1213702" ref_url="https://bugzilla.suse.com/1213702" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15598" ref_url="https://www.suse.com/security/cve/CVE-2020-15598/" source="CVE"/>
		<reference ref_id="CVE-2021-42717" ref_url="https://www.suse.com/security/cve/CVE-2021-42717/" source="CVE"/>
		<reference ref_id="CVE-2023-28882" ref_url="https://www.suse.com/security/cve/CVE-2023-28882/" source="CVE"/>
		<reference ref_id="CVE-2023-38285" ref_url="https://www.suse.com/security/cve/CVE-2023-38285/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0257-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LIQVEGVX3JPH6JWIVOQVDUI4WMZNSIG4/" source="SUSE-SU"/>
		<description>
This update for modsecurity fixes the following issues:

Update to version 3.0.10:

* Security impacting issue (fix boo#1213702, CVE-2023-38285)

  - Fix: worst-case time in implementation of four transformations
  - Additional information on this issue is available at 
    https://www.trustwave.com/resources/blogs/spiderlabs-blog/modsecurity-v3-dos-vulnerability-in-four-transformations-cve-2023-38285/

* Enhancements and bug fixes
  - Add TX synonym for MSC_PCRE_LIMITS_EXCEEDED
  - Make MULTIPART_PART_HEADERS accessible to lua
  - Fix: Lua scripts cannot read whole collection at once
  - Fix: quoted Include config with wildcard
  - Support isolated PCRE match limits
  - Fix: meta actions not applied if multiMatch in first rule of chain
  - Fix: audit log may omit tags when multiMatch
  - Exclude CRLF from MULTIPART_PART_HEADER value
  - Configure: use AS_ECHO_N instead echo -n
  - Adjust position of memset from 2890

Update to version 3.0.9:

* Add some member variable inits in Transaction class (possible segfault)
* Fix: possible segfault on reload if duplicate ip+CIDR in ip match list
* Resolve memory leak on reload (bison-generated variable)
* Support equals sign in XPath expressions
* Encode two special chars in error.log output
* Add JIT support for PCRE2
* Support comments in ipMatchFromFile file via '#' token
* Use name package name libmaxminddb with pkg-config
* Fix: FILES_TMP_CONTENT collection key should use part name
* Use AS_HELP_STRING instead of obsolete AC_HELP_STRING macro
* During configure, do not check for pcre if pcre2 specified
* Use pkg-config to find libxml2 first
* Fix two rule-reload memory leak issues
* Correct whitespace handling for Include directive

- Fix CVE-2023-28882, a segfault and a resultant crash of a worker process
  in some configurations with certain inputs, boo#1210993

Update to version 3.0.8

* Adjust parser activation rules in modsecurity.conf-recommended [#2796]
* Multipart parsing fixes and new MULTIPART_PART_HEADERS collection [#2795]
* Prevent LMDB related segfault [#2755, #2761]
* Fix msc_transaction_cleanup function comment typo [#2788]
* Fix: MULTIPART_INVALID_PART connected to wrong internal variable [#2785]
* Restore Unique_id to include random portion after timestamp [#2752, #2758]

Update to version 3.0.7

* Support PCRE2
* Support SecRequestBodyNoFilesLimit
* Add ctl:auditEngine action support
* Move PCRE2 match block from member variable
* Add SecArgumentsLimit, 200007 to modsecurity.conf-recommended
* Fix memory leak when concurrent log includes REMOTE_USER
* Fix LMDB initialization issues
* Fix initcol error message wording
* Tolerate other parameters after boundary in multipart C-T
* Add DebugLog message for bad pattern in rx operator
* Fix misuses of LMDB API
* Fix duplication typo in code comment
* Fix multiMatch msg, etc, population in audit log
* Fix some name handling for ARGS_*NAMES: regex SecRuleUpdateTargetById, etc.
* Adjust confusing variable name in setRequestBody method
* Multipart names/filenames may include single quote if double-quote enclosed
* Add SecRequestBodyJsonDepthLimit to modsecurity.conf-recommended

Update to version 3.0.6

* Security issue: Support configurable limit on depth of JSON
  parsing, possible DoS issue. CVE-2021-42717

Update to version 3.0.5

* New: Having ARGS_NAMES, variables proxied
* Fix: FILES variable does not use multipart part name for key
* GeoIP: switch to GEOIP_MEMORY_CACHE from GEOIP_INDEX_CACHE
* Support configurable limit on number of arguments processed
* Adds support to lua 5.4
* Add support for new operator rxGlobal
* Fix: Replaces put with setenv in SetEnv action
* Fix: Regex key selection should not be case-sensitive
* Fix: Only delete Multipart tmp files after rules have run
* Fixed MatchedVar on chained rules
* Fix IP address logging in Section A
* Fix:  rx: exit after full match (remove /g emulation); ensure
  capture groups occuring after unused groups still populate TX vars
* Fix rule-update-target for non-regex
* Fix Security Impacting Issues:
* Handle URI received with uri-fragment, CVE-2020-15598

update to 3.0.4:

* Fix: audit log data omitted when nolog,auditlog
* Fix: ModSecurity 3.x inspectFile operator does not pass
* XML: Remove error messages from stderr
* Filter comment or blank line for pmFromFile operator
* Additional adjustment to Cookie header parsing
* Restore chained rule part H logging to be more like 2.9 behaviour
* Small fixes in log messages to help debugging the file upload
* Fix Cookie header parsing issues
* Fix rules with nolog are logging to part H
* Fix argument key-value pair parsing cases
* Fix: audit log part for response body for JSON format to be E
* Make sure m_rulesMessages is filled after successfull match
* Fix @pm lookup for possible matches on offset zero.
* Regex lookup on the key name instead of COLLECTION:key
* Missing throw in Operator::instantiate
* Making block action execution dependent of the SecEngine status
* Making block action execution dependent of the SecEngine status
* Having body limits to respect the rule engine state
* Fix SecRuleUpdateTargetById does not match regular expressions
* Adds missing check for runtime ctl:ruleRemoveByTag
* Adds a new operator verifySVNR that checks for Austrian social security numbers.
* Fix variables output in debug logs
* Correct typo validade in log output
* fix/minor: Error encoding hexa decimal.
* Limit more log variables to 200 characters.
* parser: fix parsed file names
* Allow empty anchored variable
* Fixed FILES_NAMES collection after the end of multipart parsing
* Fixed validateByteRange parsing method
* Removes a memory leak on the JSON parser
* Enables LMDB on the regression tests.
* Fix: Extra whitespace in some configuration directives causing error
* Refactoring on Regex and SMatch classes.
* Fixed buffer overflow in Utils::Md5::hexdigest()
* Implemented merge() method for ConfigInt, ConfigDouble, ConfigString
* Adds initially support to the drop action.
* Complete merging of particular rule properties
* Replaces AC_CHECK_FILE with 'test -f'
* Fix inet addr handling on 64 bit big endian systems
* Fix tests on FreeBSD
* Changes ENV test case to read the default MODSECURTIY env var
* Regression: Sets MODSECURITY env var during the tests execution
* Fix setenv action to strdup key=variable
* Allow 0 length JSON requests.
* Fix 'make dist' target to include default configuration
* Replaced log locking using mutex with fcntl lock
* Correct the usage of modsecurity::Phases::NUMBER_OF_PHASES
* Adds support to multiple ranges in ctl:ruleRemoveById
* Rule variable interpolation broken
* Make the boundary check less strict as per RFC2046
* Fix buffer size for utf8toUnicode transformation
* Fix double macros bug
* Override the default status code if not suitable to redirect action
* parser: Fix the support for CRLF configuration files
* Organizes the server logs
* m_lineNumber in Rule not mapping with the correct line number in file
* Using shared_ptr instead of unique_ptr on rules exceptions
* Changes debuglogs schema to avoid unecessary str allocation
* Fix the SecUnicodeMapFile and SecUnicodeCodePage
* Changes the timing to save the rule message
* Fix crash in msc_rules_add_file() when using disruptive action in chain
* Fix memory leak in AuditLog::init()
* Fix RulesProperties::appendRules()
* Fix RULE lookup in chained rules
* @ipMatch 'Could not add entry' on slash/32 notation in 2.9.0
* Using values after transformation at MATCHED_VARS
* Adds support to UpdateActionById.
* Add correct C function prototypes for msc_init and msc_create_rule_set
* Allow LuaJIT 2.1 to be used
* Match m_id JSON log with RuleMessage and v2 format
* Adds support to setenv action.
* Adds new transaction constructor that accepts the transaction id as parameter.
* Adds request IDs and URIs to the debug log
* Treating variables exception on load-time instead of run time.
* Fix: function m.setvar in Lua scripts and add testcases
* Fix SecResponseBodyAccess and ctl:requestBodyAccess directives
* Fix OpenBSD build
* Fix parser to support GeoLookup with MaxMind
* parser: Fix simple quote setvar in the end of the line
* Fix pc file
* modsec_rules_check: uses the gnu `.la' instead of `.a' file
* good practices: Initialize variables before use it
* Fix utf-8 character encoding conversion
* Adds support for ctl:requestBodyProcessor=URLENCODED
* Add LUA compatibility for CentOS and try to use LuaJIT first if available
* Allow LuaJIT to be used
* Implement support for Lua 5.1
* Variable names must match fully, not partially. Match should be case insensitive.
* Improves the performance while loading the rules
* Allow empty strings to be evaluated by regex::searchAll
* Adds basic pkg-config info
* Fixed LMDB collection errors
* Fixed false positive MULTIPART_UNMATCHED_BOUNDARY errors
* Fix ip tree lookup on netmask content
* Changes the behavior of the default sec actions
* Refactoring on {global,ip,resources,session,tx,user} collections
* Fix race condition in UniqueId::uniqueId()
* Fix memory leak in error message for msc_rules_merge C APIs
* Return false in SharedFiles::open() when an error happens
* Use rvalue reference in ModSecurity::serverLog
* Build System: Fix when multiple lines for curl version.
* Checks if response body inspection is enabled before process it
* Fix setvar parsing of quoted data
* Adds time stamp back to the audit logs
* Disables skip counter if debug log is disabled
* Cosmetics: Represents amount of skipped rules without decimal
* Add missing escapeSeqDecode, urlEncode and trimLeft/Right tfns to parser
* Fix STATUS var parsing and accept STATUS_LINE var for v2 backward comp.
* Fix memory leak in modsecurity::utils::expandEnv()
* Initialize m_dtd member in ValidateDTD class as NULL
* Fix broken @detectxss operator regression test case
* Fix utils::string::ssplit() to handle delimiter in the end of string
* Fix variable FILES_TMPNAMES 
* Fix memory leak in Collections
* Fix lib version information while generating the .so file
* Adds support for ctl:ruleRemoveByTag
* Fix SecUploadDir configuration merge
* Include all prerequisites for 'make check' into dist archive
* Fix: Reverse logic of checking output in @inspectFile
* Adds support to libMaxMind
* Adds capture action to detectXSS
* Temporarily accept invalid MULTIPART_SEMICOLON_MISSING operator
* Adds capture action to detectSQLi
* Adds capture action to rbl
* Adds capture action to verifyCC
* Adds capture action to verifySSN
* Adds capture action to verifyCPF
* Prettier error messages for unsupported configurations (UX)
* Add missing verify*** transformation statements to parser
* Fix a set of compilation warnings
* Check for disruptive action on SecDefaultAction.
* Fix block-block infinite loop.
* Correction remove_by_tag and remove_by_msg logic.
* Fix LMDB compile error
* Fix msc_who_am_i() to return pointer to a valid C string
* Added some cosmetics to autoconf related code
* Fix 'make dist' target to include necessary headers for Lua
* Fix 'include /foo/*.conf' for single matched object in directory
* Add missing Base64 transformation statements to parser
* Fixed resource load on ip match from file
* Fixed examples compilation while using disable-shared
* Fixed compilation issue while xml is disabled
* Having LDADD and LDFLAGS organized on Makefile.am
* Checking std::deque size before use it
* perf improvement: Added the concept of RunTimeString and removed all run time parser.
* perf improvement: Checks debuglog level before format debug msg
* perf. improvement/rx: Only compute dynamic regex in case of macro
* Fix uri on the benchmark utility
* disable Lua on systems with liblua5.1
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-25"/>
	<updated date="2023-09-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210993">SUSE bug 1210993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213702">SUSE bug 1213702</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-15598/">CVE-2020-15598 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15598">CVE-2020-15598 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42717/">CVE-2021-42717 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42717">CVE-2021-42717 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28882/">CVE-2023-28882 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28882">CVE-2023-28882 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38285/">CVE-2023-38285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38285">CVE-2023-38285 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009798693" comment="libmodsecurity3-3.0.10-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798694" comment="libmodsecurity3-32bit-3.0.10-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798695" comment="libmodsecurity3-64bit-3.0.10-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798696" comment="modsecurity-3.0.10-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798697" comment="modsecurity-devel-3.0.10-bp155.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3960" version="1" class="patch">
	<metadata>
		<title>Security update for python-GitPython (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214810" ref_url="https://bugzilla.suse.com/1214810" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-41040" ref_url="https://www.suse.com/security/cve/CVE-2023-41040/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0259-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZWCDOX67N4DIYNYFBVRBOV5ED6DNNQIW/" source="SUSE-SU"/>
		<description>
This update for python-GitPython fixes the following issues:

- CVE-2023-41040: Fixed directory traversal attack vulnerability (boo#1214810)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-25"/>
	<updated date="2023-09-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214810">SUSE bug 1214810</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-41040/">CVE-2023-41040 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41040">CVE-2023-41040 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798698" comment="python3-GitPython-3.1.12.1610074031.f653af66-bp155.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3961" version="1" class="patch">
	<metadata>
		<title>Security update for python-CairoSVG (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1180648" ref_url="https://bugzilla.suse.com/1180648" source="BUGZILLA"/>
		<reference ref_id="1209538" ref_url="https://bugzilla.suse.com/1209538" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21236" ref_url="https://www.suse.com/security/cve/CVE-2021-21236/" source="CVE"/>
		<reference ref_id="CVE-2023-27586" ref_url="https://www.suse.com/security/cve/CVE-2023-27586/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0260-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GIY4HBHI7WUBHUAMEZKWBMEPOUYNCTU/" source="SUSE-SU"/>
		<description>
This update for python-CairoSVG fixes the following issues:

- CVE-2023-27586: Don't allow fetching external files unless explicitly asked for. (boo#1209538)

- Update to version 2.5.2

  * Fix marker path scale

- Update to version 2.5.1 (boo#1180648, CVE-2021-21236):

  * Security fix: When processing SVG files, CairoSVG was using two
    regular expressions which are vulnerable to Regular Expression 
    Denial of Service (REDoS). If an attacker provided a malicious 
    SVG, it could make CairoSVG get stuck processing the file for a 
    very long time.
  * Fix marker positions for unclosed paths
  * Follow hint when only output_width or output_height is set
  * Handle opacity on raster images
  * Don’t crash when use tags reference unknown tags
  * Take care of the next letter when A/a is replaced by l
  * Fix misalignment in node.vertices

- Updates for version 2.5.0.

  * Drop support of Python 3.5, add support of Python 3.9.
  * Add EPS export
  * Add background-color, negate-colors, and invert-images options
  * Improve support for font weights
  * Fix opacity of patterns and gradients
  * Support auto-start-reverse value for orient
  * Draw images contained in defs
  * Add Exif transposition support
  * Handle dominant-baseline
  * Support transform-origin
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-25"/>
	<updated date="2023-09-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180648">SUSE bug 1180648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209538">SUSE bug 1209538</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2021-21236/">CVE-2021-21236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21236">CVE-2021-21236 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-27586/">CVE-2023-27586 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27586">CVE-2023-27586 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798699" comment="python3-CairoSVG-2.5.2-bp155.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3962" version="1" class="patch">
	<metadata>
		<title>Security update for tcpreplay (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1209413" ref_url="https://bugzilla.suse.com/1209413" source="BUGZILLA"/>
		<reference ref_id="1209416" ref_url="https://bugzilla.suse.com/1209416" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-27783" ref_url="https://www.suse.com/security/cve/CVE-2023-27783/" source="CVE"/>
		<reference ref_id="CVE-2023-27786" ref_url="https://www.suse.com/security/cve/CVE-2023-27786/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0267-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WHVN36IVFXJ2224ASIQPWW2NGLN7SXGF/" source="SUSE-SU"/>
		<description>
This update for tcpreplay fixes the following issues:

Update to 4.4.4:

* overflow check fix for parse_mpls.
* tcpreplay-edit: prevent L2 flooding of ipv6 unicast packets.
* CVE-2023-27786: bugs caused by strtok_r. (boo#1209416)
* CVE-2023-27783 reachable assert in tcpedit_dlt_cleanup (boo#1209413)
* reachable assert in fast_edit_packet.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-26"/>
	<updated date="2023-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209413">SUSE bug 1209413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209416">SUSE bug 1209416</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-27783/">CVE-2023-27783 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27783">CVE-2023-27783 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-27786/">CVE-2023-27786 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27786">CVE-2023-27786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798657" comment="tcpreplay-4.4.4-bp155.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3963" version="1" class="patch">
	<metadata>
		<title>Security update for cacti, cacti-spine (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215040" ref_url="https://bugzilla.suse.com/1215040" source="BUGZILLA"/>
		<reference ref_id="1215042" ref_url="https://bugzilla.suse.com/1215042" source="BUGZILLA"/>
		<reference ref_id="1215043" ref_url="https://bugzilla.suse.com/1215043" source="BUGZILLA"/>
		<reference ref_id="1215044" ref_url="https://bugzilla.suse.com/1215044" source="BUGZILLA"/>
		<reference ref_id="1215045" ref_url="https://bugzilla.suse.com/1215045" source="BUGZILLA"/>
		<reference ref_id="1215047" ref_url="https://bugzilla.suse.com/1215047" source="BUGZILLA"/>
		<reference ref_id="1215050" ref_url="https://bugzilla.suse.com/1215050" source="BUGZILLA"/>
		<reference ref_id="1215051" ref_url="https://bugzilla.suse.com/1215051" source="BUGZILLA"/>
		<reference ref_id="1215052" ref_url="https://bugzilla.suse.com/1215052" source="BUGZILLA"/>
		<reference ref_id="1215053" ref_url="https://bugzilla.suse.com/1215053" source="BUGZILLA"/>
		<reference ref_id="1215054" ref_url="https://bugzilla.suse.com/1215054" source="BUGZILLA"/>
		<reference ref_id="1215055" ref_url="https://bugzilla.suse.com/1215055" source="BUGZILLA"/>
		<reference ref_id="1215056" ref_url="https://bugzilla.suse.com/1215056" source="BUGZILLA"/>
		<reference ref_id="1215058" ref_url="https://bugzilla.suse.com/1215058" source="BUGZILLA"/>
		<reference ref_id="1215059" ref_url="https://bugzilla.suse.com/1215059" source="BUGZILLA"/>
		<reference ref_id="1215081" ref_url="https://bugzilla.suse.com/1215081" source="BUGZILLA"/>
		<reference ref_id="1215082" ref_url="https://bugzilla.suse.com/1215082" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-30534" ref_url="https://www.suse.com/security/cve/CVE-2023-30534/" source="CVE"/>
		<reference ref_id="CVE-2023-39357" ref_url="https://www.suse.com/security/cve/CVE-2023-39357/" source="CVE"/>
		<reference ref_id="CVE-2023-39358" ref_url="https://www.suse.com/security/cve/CVE-2023-39358/" source="CVE"/>
		<reference ref_id="CVE-2023-39359" ref_url="https://www.suse.com/security/cve/CVE-2023-39359/" source="CVE"/>
		<reference ref_id="CVE-2023-39360" ref_url="https://www.suse.com/security/cve/CVE-2023-39360/" source="CVE"/>
		<reference ref_id="CVE-2023-39361" ref_url="https://www.suse.com/security/cve/CVE-2023-39361/" source="CVE"/>
		<reference ref_id="CVE-2023-39362" ref_url="https://www.suse.com/security/cve/CVE-2023-39362/" source="CVE"/>
		<reference ref_id="CVE-2023-39364" ref_url="https://www.suse.com/security/cve/CVE-2023-39364/" source="CVE"/>
		<reference ref_id="CVE-2023-39365" ref_url="https://www.suse.com/security/cve/CVE-2023-39365/" source="CVE"/>
		<reference ref_id="CVE-2023-39366" ref_url="https://www.suse.com/security/cve/CVE-2023-39366/" source="CVE"/>
		<reference ref_id="CVE-2023-39510" ref_url="https://www.suse.com/security/cve/CVE-2023-39510/" source="CVE"/>
		<reference ref_id="CVE-2023-39511" ref_url="https://www.suse.com/security/cve/CVE-2023-39511/" source="CVE"/>
		<reference ref_id="CVE-2023-39512" ref_url="https://www.suse.com/security/cve/CVE-2023-39512/" source="CVE"/>
		<reference ref_id="CVE-2023-39513" ref_url="https://www.suse.com/security/cve/CVE-2023-39513/" source="CVE"/>
		<reference ref_id="CVE-2023-39514" ref_url="https://www.suse.com/security/cve/CVE-2023-39514/" source="CVE"/>
		<reference ref_id="CVE-2023-39515" ref_url="https://www.suse.com/security/cve/CVE-2023-39515/" source="CVE"/>
		<reference ref_id="CVE-2023-39516" ref_url="https://www.suse.com/security/cve/CVE-2023-39516/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0275-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JFJCU2NOOFCO7XJZOUW2BQ6HWJMHSYSN/" source="SUSE-SU"/>
		<description>
This update for cacti, cacti-spine fixes the following issues:

cacti-spine 1.2.25:

* Spine should see if script to be executed is executable
* Enhance number recognition
* When polling devices, sort by larger number of items first
* Log format may be corrupted when timeout occurs
* Compile warning appears due to GCC flag on RHEL7/RHEL8
* Downed device detection only checks one of the two uptime OIDs
* Compile error appears due to execinfo.h on FreeBSD
* Bootstrap shell script contains some PHP cruft
* Padding is not always removed from the start of non-numeric strings
* Improve SNMP result handling for non-numeric results
* Further improve SNMP result handling for non-numeric results
* Remove check for the max_oids column which has been present since Cacti v1.0
* Minimize Sorting when fetching poller records for maximum performance
* Spine should see if script to be executed is executable

cacti-spine 1.2.24:

* Fix segfault when ignoring older OIDs

cacti 1.2.25:

* CVE-2023-30534: Protect against Insecure deserialization of filter data (boo#1215082)
* CVE-2023-39360: Cross-Site Scripting vulnerability when creating new graphs (boo#1215044)
* CVE-2023-39361: Unauthenticated SQL Injection when viewing graphs (boo#1215045)
* CVE-2023-39357: SQL Injection when saving data with sql_save() (boo#1215040)
* CVE-2023-39362: Authenticated command injection when using SNMP options (boo#1215047)
* CVE-2023-39359: Authenticated SQL injection vulnerability when managing graphs (boo#1215043)
* CVE-2023-39358: Authenticated SQL injection vulnerability when managing reports (boo#1215042)
* CVE-2023-39365: SQL Injection when using regular expressions (boo#1215051)
* CVE-2023-39364: redirect in change password functionality (boo#1215050)
* CVE-2023-39366: Cross-Site Scripting vulnerability with Device Name when managing Data Sources (boo#1215052)
* CVE-2023-39510: Cross-Site Scripting vulnerability with Device Name when administrating Reports (boo#1215053)
* CVE-2023-39511: Cross-Site Scripting vulnerability with Device Name when editing Graphs whilst managing Reports (boo#1215081)
* CVE-2023-39512: Cross-Site Scripting vulnerability with Device Name when managing Data Sources (boo#1215054)
* CVE-2023-39513: Cross-Site Scripting vulnerability with Device Name when debugging data queries (boo#1215055)
* CVE-2023-39514: Cross-Site Scripting vulnerability with Data Source Name when managing Graphs (boo#1215056)
* CVE-2023-39515: Cross-Site Scripting vulnerability with Data Source Name when debugging Data Queries (boo#1215058)
* CVE-2023-39516: Cross-Site Scripting vulnerability with Data Source Information when managing Data Sources (boo#1215059)
* When rebuilding the Poller Cache from command line, allow it to be multi-threaded
* When searching tree or list views, the URL does not update after changes
* When creating a Data Source Template with a specific snmp port, the port is not always applied
* When a Data Query references a file, the filename should be trimmed to remove spurious spaces
* THold plugin may not always install or upgrade properly
* RRD file structures are not always updated properly, if there are more Data Sources in the Data Template than the Graph Template
* When reindexing devices, errors may sometimes be shown
* Boost may loose data when the database server is overloaded
* Boost can sometimes output unexpected or invalid values
* Boost should not attempt to start if there are no items to process
* Rebuilding the poller cache does not always work as expected
* Host CPU items may not work poll as expected when on a remote data collector where hmib is also enabled
* When creating new graphs, invalid offset errors may be generated
* When importing packages, SQL errors may be generated
* When managing plugins from command line, the --plugin option is not properly handled
* When automating an install of Cacti, error messages can be appear
* When performing automated install of a plugin, warnings can be thrown
* Automation references the wrong table name causing errors
* Data Source Info Mode produces invalid recommendations
* Data Source Debug 'Run All' generates too many log messages
* The description of rebuild poller cache in utilities does not display properly
* When reindexing a device, debug information may not always display properly
* Upon displaying a form with errors, the session error fields variable isn't cleared
* MariaDB clusters will no longer support exclusive locks
* RRDtool can fail to update when sources in Data Template and Graph Template data sources do not match
* Compatibility improvements for Boost under PHP 8.x
* When searching the tree, increase the time before querying for items
* Device Location drop down does not always populate correctly
* When viewing Realtime graphs, undefined variable errors may be reported
* SNMP Uptime is not always ignored for spikekills
* Improve detection of downed Devices
* When reporting missing functions from Plugins, ensure messages do not occur too often
* When starting the Cacti daemon, database errors may be reported when there is no problem
* When reporting from RRDcheck, ensure prefix is in the correct casing
* Improve Orphaned Data Source options and display
* Parsing the PHP Configuration may sometimes produce errors
* Security processes attempt to check for a user lockout even if there is no user logged in
* When attempting to edit a tree, the search filter for Graphs remains disabled
* When reindexing, a Data Source that could be un-orphaned may not always be unorphaned
* When parsing a date value, there could be more than 30 chars
* Untemplated Data Sources can fail to update due to lack of an assigned Graph
* When processing items to check, do not include disabled hosts
* When saving a Data Source Template, SQL errors may be reported
* When importing a Template, errors may be recorded
* Some display strings have invalid formatting that cannot be parsed
* When filtering with regular expressions, the 'does not match' option does not always function as expected
* When enabling a plugin, sometimes it can appear as if nothing happens
* Ensure the Rows Per Page option shows limitations set by configuration
* Plugins are unable to modify fields in the setting 'Change Device Settings'
* When reporting emails being sent, ensure BCC addresses are also included
* Improve compatibility of SNMP class trim handling under PHP 8.x
* When importing legacy Data Query Templates, the Template can become unusable
* Provide ability to raise an event when extending the settings form
* Prevent unsupported SQL Mode flags from being set
* The DSStats summary does not always display expected values
* When performing a fresh install, device classification may be missing.
* Duplication functions for Graph/Template and Data Source/Template do not return and id
* Duplication of Device Templates should be an API call
* Unable to convert database to latin1 instead of utf8 if desired
* When creating Graphs, the process may become slower over time as more items exist
* When a bulk walk size is set to automatic, this is not always set to the optimal value
* Update copyright notice on import packages
* When viewing Orphan Graphs, SQL errors may be reported
* When reindexing hosts from command line, ensure only one process runs at once
* When a Data Query has no Graphs, it may not be deletable
* When duplicating a Graph Template, provide an option to not duplicate Data Query association
* When duplicating a Data Template errors can appear in the Cacti log
* When importing a Package, previewing makes unexpected changes to Cacti Templates
* When enabling boost on a fresh install, an error may be reported
* Improve compatibility for backtrace logging under PHP 8.x
* Improve compatibility for Advanced Ping under PHP 8.x
* Provide new templates for Fortigate and Aruba Cluster to be available during install
* Provide new template for SNMP Printer to be available during install
* When importing devices, allow a device classification to be known
* Extend length of maximum name in settings table
* Extend length of maximum name in user settings table
* Data Queries do not have a Duplication function
* Upgrade d3.js v7.8.2 and billboard.js v3.7.4
* Upgrade ua-parser.js to version 1.0.35
* Update Cisco Device Template to include HSRP graph template
* New hook for device template change 'device_template_change'

cacti 1.2.24

* Fix: Unable to import Local Linux Machine template
* Fix multiple charting and display issues
* Compatibility changes for SNMP under PHP 8.2, and other PHP
  compatibility updates
* Fix multiple issues editing settings
* timeout fixes for Basic Auth
* multiple data poller bug fixes
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-26"/>
	<updated date="2023-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215040">SUSE bug 1215040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215042">SUSE bug 1215042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215043">SUSE bug 1215043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215044">SUSE bug 1215044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215045">SUSE bug 1215045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215047">SUSE bug 1215047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215050">SUSE bug 1215050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215051">SUSE bug 1215051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215052">SUSE bug 1215052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215053">SUSE bug 1215053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215054">SUSE bug 1215054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215055">SUSE bug 1215055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215056">SUSE bug 1215056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215058">SUSE bug 1215058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215059">SUSE bug 1215059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215081">SUSE bug 1215081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215082">SUSE bug 1215082</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-30534/">CVE-2023-30534 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30534">CVE-2023-30534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39357/">CVE-2023-39357 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39357">CVE-2023-39357 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39358/">CVE-2023-39358 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39358">CVE-2023-39358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39359/">CVE-2023-39359 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39359">CVE-2023-39359 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39360/">CVE-2023-39360 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39360">CVE-2023-39360 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39361/">CVE-2023-39361 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39361">CVE-2023-39361 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39362/">CVE-2023-39362 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39362">CVE-2023-39362 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39364/">CVE-2023-39364 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39364">CVE-2023-39364 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39365/">CVE-2023-39365 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39365">CVE-2023-39365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39366/">CVE-2023-39366 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39366">CVE-2023-39366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39510/">CVE-2023-39510 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39510">CVE-2023-39510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39511/">CVE-2023-39511 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39511">CVE-2023-39511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39512/">CVE-2023-39512 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39512">CVE-2023-39512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39513/">CVE-2023-39513 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39513">CVE-2023-39513 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39514/">CVE-2023-39514 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39514">CVE-2023-39514 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39515/">CVE-2023-39515 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39515">CVE-2023-39515 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39516/">CVE-2023-39516 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39516">CVE-2023-39516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009798879" comment="cacti-1.2.25-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798880" comment="cacti-spine-1.2.25-bp155.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3964" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215776" ref_url="https://bugzilla.suse.com/1215776" source="BUGZILLA"/>
		<reference ref_id="1215778" ref_url="https://bugzilla.suse.com/1215778" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5186" ref_url="https://www.suse.com/security/cve/CVE-2023-5186/" source="CVE"/>
		<reference ref_id="CVE-2023-5187" ref_url="https://www.suse.com/security/cve/CVE-2023-5187/" source="CVE"/>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVWTK2X25FKSQAO2JO5SKRXBOHGOHPUO/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

- Chromium 117.0.5938.132 (boo#1215776):
  * CVE-2023-5217: Heap buffer overflow in vp8 encoding in libvpx (boo#1215778)
  * CVE-2023-5186: Use after free in Passwords
  * CVE-2023-5187: Use after free in Extensions

- Chromium 117.0.5938.92:
  * stability improvements
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-29"/>
	<updated date="2023-09-29"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1215776">SUSE bug 1215776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215778">SUSE bug 1215778</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5186/">CVE-2023-5186 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5186">CVE-2023-5186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5187/">CVE-2023-5187 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5187">CVE-2023-5187 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799524" comment="chromedriver-117.0.5938.132-bp155.2.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799525" comment="chromium-117.0.5938.132-bp155.2.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3965" version="1" class="patch">
	<metadata>
		<title>Security update for seamonkey (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1207332" ref_url="https://bugzilla.suse.com/1207332" source="BUGZILLA"/>
		<reference ref_id="1209994" ref_url="https://bugzilla.suse.com/1209994" source="BUGZILLA"/>
		<reference ref_id="1213986" ref_url="https://bugzilla.suse.com/1213986" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0278-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5SOOP74GTYPZCPPWK473Q6QVJGSGCJQL/" source="SUSE-SU"/>
		<description>
This update for seamonkey fixes the following issues:

update to SeaMonkey 2.53.17.1

  * Upstream libwebp security fix bug 1852749.
  * CVE-2023-4863: Heap buffer overflow in libwebp bug 1852649.
  * Fix bad string encoded in ansi. l10n fr problem only bug 1847887.
  * SeaMonkey 2.53.17 uses the same backend as Firefox and contains
    the relevant Firefox 60.8 security fixes.
  * SeaMonkey 2.53.17 shares most parts of the mail and news code with
    Thunderbird. Please read the Thunderbird 60.8.0 release notes for
    specific security fixes in this release.
  * Additional important security fixes up to Current Firefox 115.3
    and Thunderbird 115.3 ESR plus many enhancements have been
    backported. We will continue to enhance SeaMonkey security in
    subsequent 2.53.x beta and release versions as fast as we are able
    to.

update to SeaMonkey 2.53.17

  * Fix macOS Contacts permission request bug 1826719.
  * Remove SeaMonkey 2.57 links from debugQA bug 1829683.
  * Treat opening urls from the library as external bug 1619108.
  * Disable spam warning for autogenerated links in plaintext messages
    bug 619031.
  * Switch SeaMonkey build files to Python 3 bug 1635849.
  * Remove empty overlays from Composer bug 1828533.
  * Move xpfe autocomplete to comm-central suite bug 1418512.
  * Remove nsIPrefBranch2 and nsIPrefBranchInternal bug 1374847.
  * SeaMonkey 2.53.17 uses the same backend as Firefox and contains
    the relevant Firefox 60.8 security fixes.
  * SeaMonkey 2.53.17 shares most parts of the mail and news code with
    Thunderbird. Please read the Thunderbird 60.8.0 release notes for
    specific security fixes in this release.
  * Additional important security fixes up to Current Firefox 102.11
    and Thunderbird 102.11 ESR plus many enhancements have been
    backported. We will continue to enhance SeaMonkey security in
    subsequent 2.53.x beta and release versions as fast as we are able
    to.

Update to SeaMonkey 2.53.16

  * No throbber in plaintext editor bug 85498.
  * Remove unused gridlines class from EdAdvancedEdit bug 1806632.
  * Remove ESR 91 links from debugQA bug 1804534.
  * Rename devtools/shim to devtools/startup bug 1812367.
  * Remove unused seltype=text|cell css bug 1806653.
  * Implement new shared tree styling bug 1807802.
  * Use `win.focus()` in macWindowMenu.js bug 1807817.
  * Remove WCAP provider bug 1579020.
  * Remove ftp/file tree view support bug 1239239.
  * Change calendar list tree to a list bug 1561530.
  * Various other updates to the calendar code.
  * Continue the switch from Python 2 to Python 3 in the build system.
  * Verified compatibility with Rust 1.66.1.
  * SeaMonkey 2.53.16 uses the same backend as Firefox and contains
    the relevant Firefox 60.8 security fixes.
  * SeaMonkey 2.53.16 shares most parts of the mail and news code with
    Thunderbird. Please read the Thunderbird 60.8.0 release notes for
    specific security fixes in this release.
  * Additional important security fixes up to Current Firefox 102.9
    and Thunderbird 102.9 ESR plus many enhancements have been
    backported. We will continue to enhance SeaMonkey security in
    subsequent 2.53.x beta and release versions as fast as we are able
    to.

Update to SeaMonkey 2.53.15

  * Microtasks and promises bug 1193394.
  * Implement queueMicrotask()bug 1480236.
  * Remove old synchronous contentPrefService from the tree bug 886907
    and bug 1392929.
  * Remove remaining uses of 'general.useragent.locale' bug 1410736
    and bug 1410738.
  * Migrate to intl.locale.requested.locale list from
    'general.useragent.locale' bug 1441016.
  * Introduce a pref to store BCP47 locale list bug 1414390, bug
    1423532 and bug 1441026.
  * Remove synchronous certificate verification APIs from
    nsIX509CertDB bug 1453741 and bug 1453778.
  * Taskbar preview's favicon appears blank bug 1475524.
  * Call Imagelibs decodeImageAsyncWindows using a callback bug
    1790695.
  * Remove PermissionsService from process Windows sandboxing code bug
    1788233, bug 1789782 and bug 1794394.
  * Security info dialog doesn't show cert status anymore bug 1293378.
  * Replace nsIPlatfromCharset in mailnews bug 1381762.
  * Replace use of nsMsgI18NFileSystemCharset() with
    NS_CopyUnicodeToNative/NS_CopyNativeToUnicode() bug 1506422.
  * Cater for Outlook's/Hotmail's 'Deleted' folder bug 1320191.
  * Make some filter methods scriptable bug 1497513.
  * Fix crash in nsMsgFilterAfterTheFact::ApplyFilter() caused by
    async reset of 'm_curFolder' bug 537017.
  * Localize messages from nsIMsgFolder.logRuleHitFail() bug 1352731.
  * Add logging of message filter runs and actions bug 697522.
  * Check that we got a non-null header before running a filter on it
    (and crashing) bug 1563959.
  * With CONDSTORE, eliminate unneeded flag fetches at startup bug
    1428097.
  * Fix so custom tags (keywords) are visible to all users bug 583677.
  * Improve handling of tags on shared folders bug 1596371.
  * Allow setting/resetting junk marking by user for yahoo/aol to
    stick bug 1260059.
  * Don't check subject if spellchecker is not ready bug 1069787.
  * Grammar issues in mailnews_account_settings.xhtml bug 1793291.
  * Remove use of nsIMemory bug 1792578.
  * Replace obsolete GetStringBundleService call in SeaMonkey bug
    1794400.
  * SeaMonkey crashes on MacOS Ventura 13.0 bug 1797696.
  * Continue the switch from Python 2 to Python 3 in the build system.
  * Added support for clang 15 and macOS SDK 11.3.
  * Verified compatibility with Rust 1.65.
  * SeaMonkey 2.53.15 uses the same backend as Firefox and contains
    the relevant Firefox 60.8 security fixes.
  * SeaMonkey 2.53.15 shares most parts of the mail and news code with
    Thunderbird. Please read the Thunderbird 60.8.0 release notes for
    specific security fixes in this release.
  * Additional important security fixes up to Current Firefox 102.6
    and Thunderbird 102.5 ESR plus many enhancements have been
    backported. We will continue to enhance SeaMonkey security in
    subsequent 2.53.x beta and release versions as fast as we are able
    to.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-02"/>
	<updated date="2023-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207332">SUSE bug 1207332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209994">SUSE bug 1209994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213986">SUSE bug 1213986</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799725" comment="seamonkey-2.53.17.1-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799726" comment="seamonkey-dom-inspector-2.53.17.1-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799727" comment="seamonkey-irc-2.53.17.1-bp155.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3966" version="1" class="patch">
	<metadata>
		<title>Security update for roundcubemail (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215433" ref_url="https://bugzilla.suse.com/1215433" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2023:0285-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FES4IKTZTYNBS3TCVPNOFHD7POSFJHYY/" source="SUSE-SU"/>
		<description>
This update for roundcubemail fixes the following issues:

Update to 1.6.3 (boo#1215433)

* Fix bug where installto.sh/update.sh scripts were removing some
  essential options from the config file (#9051)
* Update jQuery-UI to version 1.13.2 (#9041)
* Fix regression that broke use_secure_urls feature (#9052)
* Fix potential PHP fatal error when opening a message with
  message/rfc822 part (#8953)
* Fix bug where a duplicate &lt;title&gt; tag in HTML email could cause some
  parts being cut off (#9029)
* Fix bug where a list of folders could have been sorted
  incorrectly (#9057)
* Fix regression where LDAP addressbook 'filter' option was
  ignored (#9061)
* Fix wrong order of a multi-folder search result when sorting by
  size (#9065)
* Fix so install/update scripts do not require PEAR (#9037)
* Fix regression where some mail parts could have been decoded
  incorrectly, or not at all (#9096)
* Fix handling of an error case in Cyrus IMAP BINARY FETCH, fallback to
  non-binary FETCH (#9097)
* Fix PHP8 deprecation warning in the reconnect plugin (#9083)
* Fix 'Show source' on mobile with x_frame_options = deny (#9084)
* Fix various PHP warnings (#9098)
* Fix deprecated use of ldap_connect() in password's ldap_simple driver (#9060)
* Fix cross-site scripting (XSS) vulnerability in handling of linkrefs
  in plain text messages

Update to 1.6.2

* Add Uyghur localization
* Fix regression in OAuth request URI caused by use of REQUEST_URI
  instead of SCRIPT_NAME as a default (#8878)
* Fix bug where false attachment reminder was displayed on HTML mail
  with inline images (#8885)
* Fix bug where a non-ASCII character in app.js could cause error in
  javascript engine (#8894)
* Fix JWT decoding with url safe base64 schema (#8890)
* Fix bug where .wav instead of .mp3 file was used for the new mail
  notification in Firefox (#8895)
* Fix PHP8 warning (#8891)
* Fix support for Windows-31J charset (#8869)
* Fix so LDAP VLV option is disabled by default as documented (#8833)
* Fix so an email address with name is supported as input to the managesieve
  notify :from parameter (#8918)
* Fix Help plugin menu (#8898)
* Fix invalid onclick handler on the logo image when using non-array
  skin_logo setting (#8933)
* Fix duplicate recipients in 'To' and 'Cc' on reply (#8912)
* Fix bug where it wasn't possible to scroll lists by clicking middle
  mouse button (#8942)
* Fix bug where label text in a single-input dialog could be partially
  invisible in some locales (#8905)
* Fix bug where LDAP (fulltext) search didn't work without 'search_fields'
  in config (#8874)
* Fix extra leading newlines in plain text converted from HTML (#8973)
* Fix so recipients with a domain ending with .s are allowed (#8854)
* Fix so vCard output does not contain non-standard/redundant TYPE=OTHER
  and TYPE=INTERNET (#8838)
* Fix QR code images for contacts with non-ASCII characters (#9001)
* Fix PHP8 warnings when using list_flags and list_cols properties by
  plugins (#8998)
* Fix bug where subfolders could loose subscription on parent folder
  rename (#8892)
* Fix connecting to LDAP using an URI with ldapi:// scheme (#8990)
* Fix insecure shell command params handling in cmd_learn driver of markasjunk
  plugin (#9005)
* Fix bug where some mail headers didn't work in cmd_learn driver of markasjunk
  plugin (#9005)
* Fix PHP fatal error when importing vcf file using PHP 8.2 (#9025)
* Fix so output of log_date_format with microseconds contains time in server
  time zone, not UTC
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-02"/>
	<updated date="2023-10-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215433">SUSE bug 1215433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799728" comment="roundcubemail-1.6.3-bp155.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3967" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215924" ref_url="https://bugzilla.suse.com/1215924" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5346" ref_url="https://www.suse.com/security/cve/CVE-2023-5346/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E625YINTHPIYBDLQJVLFCD4HOD2ZSEWL/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 117.0.5938.149:

* CVE-2023-5346: Type Confusion in V8 (boo#1215924)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2023-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215924">SUSE bug 1215924</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5346/">CVE-2023-5346 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5346">CVE-2023-5346 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009800152" comment="chromedriver-117.0.5938.149-bp155.2.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800153" comment="chromium-117.0.5938.149-bp155.2.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3968" version="1" class="patch">
	<metadata>
		<title>Security update for exim (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215784" ref_url="https://bugzilla.suse.com/1215784" source="BUGZILLA"/>
		<reference ref_id="1215785" ref_url="https://bugzilla.suse.com/1215785" source="BUGZILLA"/>
		<reference ref_id="1215786" ref_url="https://bugzilla.suse.com/1215786" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-42114" ref_url="https://www.suse.com/security/cve/CVE-2023-42114/" source="CVE"/>
		<reference ref_id="CVE-2023-42115" ref_url="https://www.suse.com/security/cve/CVE-2023-42115/" source="CVE"/>
		<reference ref_id="CVE-2023-42116" ref_url="https://www.suse.com/security/cve/CVE-2023-42116/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0293-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5ULUNDOS6XEEFBG43DSBNULVEPHZ4YYJ/" source="SUSE-SU"/>
		<description>
This update for exim fixes the following issues:


* CVE-2023-42114: NTLM Challenge Out-Of-Bounds Read Information Disclosure Vulnerability  (boo#1215784)
* CVE-2023-42115: AUTH Out-Of-Bounds Write Remote Code Execution Vulnerability (boo#1215785)
* CVE-2023-42116: SMTP Challenge Stack-based Buffer Overflow Remote Code Execution Vulnerability (boo#1215786)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2023-10-05"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1215784">SUSE bug 1215784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215785">SUSE bug 1215785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215786">SUSE bug 1215786</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-42114/">CVE-2023-42114 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42114">CVE-2023-42114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-42115/">CVE-2023-42115 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42115">CVE-2023-42115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-42116/">CVE-2023-42116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42116">CVE-2023-42116 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009800127" comment="exim-4.94.2-bp155.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800128" comment="eximon-4.94.2-bp155.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800129" comment="eximstats-html-4.94.2-bp155.5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3969" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2023-5186" ref_url="https://www.suse.com/security/cve/CVE-2023-5186/" source="CVE"/>
		<reference ref_id="CVE-2023-5187" ref_url="https://www.suse.com/security/cve/CVE-2023-5187/" source="CVE"/>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0297-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SA3UIF6YUP4F422WZCCPKQ6TLSBG7YAK/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

- Update to 103.0.4928.16
  * CHR-9416 Updating Chromium on desktop-stable-* branches
  * CHR-9433 Update Chromium on desktop-stable-117-4928 to
    117.0.5938.89
  * CHR-9449 Update Chromium on desktop-stable-117-4928 to
    117.0.5938.132
  * DNA-110337 Opera Intro extension custom versions
  * DNA-111454 Player animations visual adjustments
  * DNA-111618 Turn on #password-generator on all streams
  * DNA-111645 Turn on flag #player-service-react on
    developer stream
  * DNA-111708 Player home page is shown while music service is
    being loaded
  * DNA-111722 [Tab strip][Tab island] Add tab in tab island
    button appears after size of tabs is changed
  * DNA-111727 JsonPrefStore is created twice for Local State file
  * DNA-111838 Promote 103.0 to stable
  * DNA-111845 Turn on flag #player-service-react on all streams
  * DNA-111868 Translations for O103
  * DNA-111874 OMenu and Context Menus has transparent few
    px border
- The update to chromium 117.0.5938.89 fixes following issues:
  CVE-2023-5217, CVE-2023-5186, CVE-2023-5187
- Complete Opera 103 changelog at:
  https://blogs.opera.com/desktop/changelog-for-103/

- Update to 102.0.4880.78
  * DNA-110952 Crash at base::subtle::RefCountedBase::
    ReleaseImpl() const

- Update to 102.0.4880.70
  * DNA-105016 Do not open file selector when closing easy files
    dialog with 'close this popup' option
  * DNA-110437 Extensions font color in dark mode makes the text
    not visible
  * DNA-110443 Crash at EasyFilesView::ShowFileSelector
  * DNA-111231 Amazon Music logo update in sidebar Player
  * DNA-111280 Make import from Crypto Browser to Opera Browser
    easier
  * DNA-111355 [Sidebar] DevTools is not working correctly in
    with sidebar panel
  * DNA-111708 Player home page is shown while music service is
    being loaded
  * DNA-111162 Refresh Player home page
  * DNA-111164 Implement animation in Player home page

- Update to 102.0.4880.56
  * DNA-110785 Crash at static void base::allocator::
    UnretainedDanglingRawPtrDetectedDumpWithoutCrashing
    (unsigned __int64)
  * DNA-110973 Crash after dragging tab from island to another
    screen
  * DNA-111199 Disable user_education tests from
    component_unittests
  * DNA-111369 Crash at views::View::DoRemoveChildView(views::
    View*, bool, bool, views::View*)
  * DNA-111538 All new open windows don`t have a close button 'x'
    in the right upper corner.
- Changes in 102.0.4880.51
  * CHR-9416 Automatic tries of updating Chromium on
    desktop-stable-* branches
  * DNA-110101 [Linux] Maximize/restore button does not work
    properly
  * DNA-110669 duplicated hints on system buttons
  * DNA-110823 Uninstallation Survey Countries
  * DNA-110881 Scroll bar doesn't change color in dark mode
  * DNA-110930 Capture mouse events on the 1-pixel edge for
    DevTools
  * DNA-110935 ChatSonic colors are unreadable in Dark Mode
  * DNA-111034 Dynamic icon does not look good in edit-tile-modal
  * DNA-111035 Removal custom-image should restore dynamic icon
  * DNA-111177 [Start page] Letter in SD is black on light
    wallpaper
  * DNA-111488 Improve profile migration for
    desktop-stable-116-4880

- Update to 102.0.4880.46
  * CHR-9416 Automatic tries of updating Chromium on
    desktop-stable-* branches
  * DNA-110216 [Sidebar] Straight lines instead of rounded corners
  * DNA-110539 [LIN] Crash at content::WebContentsImpl::
    GetLastCommittedURL()
  * DNA-110631 AB test mechanism for Speed Dial
  * DNA-110656 [TabStrip] Memory leak for tab group
  * DNA-111322 Only show splash screen on major version update
  * DNA-111417 Crash at opera::component_based::
    TabAnimationController::StartAnimatedLayout(opera::
    component_based::TabAnimationController::AnimationInfo,
    base::OnceCallback)
  * DNA-111420 Update continue on link for euro rtv agd
  * DNA-111440 Crash at opera::component_based::
    ComponentTabBar::GetActiveTab()
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-11"/>
	<updated date="2023-10-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5186/">CVE-2023-5186 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5186">CVE-2023-5186 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5187/">CVE-2023-5187 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5187">CVE-2023-5187 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801147" comment="opera-103.0.4928.16-lp155.3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3970" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216111" ref_url="https://bugzilla.suse.com/1216111" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5218" ref_url="https://www.suse.com/security/cve/CVE-2023-5218/" source="CVE"/>
		<reference ref_id="CVE-2023-5473" ref_url="https://www.suse.com/security/cve/CVE-2023-5473/" source="CVE"/>
		<reference ref_id="CVE-2023-5474" ref_url="https://www.suse.com/security/cve/CVE-2023-5474/" source="CVE"/>
		<reference ref_id="CVE-2023-5475" ref_url="https://www.suse.com/security/cve/CVE-2023-5475/" source="CVE"/>
		<reference ref_id="CVE-2023-5476" ref_url="https://www.suse.com/security/cve/CVE-2023-5476/" source="CVE"/>
		<reference ref_id="CVE-2023-5477" ref_url="https://www.suse.com/security/cve/CVE-2023-5477/" source="CVE"/>
		<reference ref_id="CVE-2023-5478" ref_url="https://www.suse.com/security/cve/CVE-2023-5478/" source="CVE"/>
		<reference ref_id="CVE-2023-5479" ref_url="https://www.suse.com/security/cve/CVE-2023-5479/" source="CVE"/>
		<reference ref_id="CVE-2023-5481" ref_url="https://www.suse.com/security/cve/CVE-2023-5481/" source="CVE"/>
		<reference ref_id="CVE-2023-5483" ref_url="https://www.suse.com/security/cve/CVE-2023-5483/" source="CVE"/>
		<reference ref_id="CVE-2023-5484" ref_url="https://www.suse.com/security/cve/CVE-2023-5484/" source="CVE"/>
		<reference ref_id="CVE-2023-5485" ref_url="https://www.suse.com/security/cve/CVE-2023-5485/" source="CVE"/>
		<reference ref_id="CVE-2023-5486" ref_url="https://www.suse.com/security/cve/CVE-2023-5486/" source="CVE"/>
		<reference ref_id="CVE-2023-5487" ref_url="https://www.suse.com/security/cve/CVE-2023-5487/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0300-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V6FXBWPURXQ5GA2B7HRPHLBGPNS46F3Y/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 118.0.5993.70 (boo#1216111)

- CVE-2023-5218: Use after free in Site Isolation
- CVE-2023-5487: Inappropriate implementation in Fullscreen
- CVE-2023-5484: Inappropriate implementation in Navigation
- CVE-2023-5475: Inappropriate implementation in DevTools
- CVE-2023-5483: Inappropriate implementation in Intents
- CVE-2023-5481: Inappropriate implementation in Downloads
- CVE-2023-5476: Use after free in Blink History
- CVE-2023-5474: Heap buffer overflow in PDF
- CVE-2023-5479: Inappropriate implementation in Extensions API
- CVE-2023-5485: Inappropriate implementation in Autofill
- CVE-2023-5478: Inappropriate implementation in Autofill
- CVE-2023-5477: Inappropriate implementation in Installer
- CVE-2023-5486: Inappropriate implementation in Input
- CVE-2023-5473: Use after free in Cast
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2023-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216111">SUSE bug 1216111</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5218/">CVE-2023-5218 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5218">CVE-2023-5218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5473/">CVE-2023-5473 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5473">CVE-2023-5473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5474/">CVE-2023-5474 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5474">CVE-2023-5474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5475/">CVE-2023-5475 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5475">CVE-2023-5475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5476/">CVE-2023-5476 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5476">CVE-2023-5476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5477/">CVE-2023-5477 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5477">CVE-2023-5477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5478/">CVE-2023-5478 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5478">CVE-2023-5478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5479/">CVE-2023-5479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5479">CVE-2023-5479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5481/">CVE-2023-5481 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5481">CVE-2023-5481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5483/">CVE-2023-5483 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5483">CVE-2023-5483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5484/">CVE-2023-5484 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5484">CVE-2023-5484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5485/">CVE-2023-5485 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5485">CVE-2023-5485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5486/">CVE-2023-5486 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5486">CVE-2023-5486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5487/">CVE-2023-5487 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5487">CVE-2023-5487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009801575" comment="chromedriver-118.0.5993.70-bp155.2.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801576" comment="chromium-118.0.5993.70-bp155.2.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3971" version="1" class="patch">
	<metadata>
		<title>Security update for exim (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215787" ref_url="https://bugzilla.suse.com/1215787" source="BUGZILLA"/>
		<reference ref_id="1215789" ref_url="https://bugzilla.suse.com/1215789" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-42117" ref_url="https://www.suse.com/security/cve/CVE-2023-42117/" source="CVE"/>
		<reference ref_id="CVE-2023-42119" ref_url="https://www.suse.com/security/cve/CVE-2023-42119/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JKELMGZRJK3EIUZLCIOOV4BH6OK7NGW5/" source="SUSE-SU"/>
		<description>
This update for exim fixes the following issues:

- CVE-2023-42117: Fixes Improper Neutralization of Special Elements Remote Code Execution Vulnerability (boo#1215787)
- CVE-2023-42119: Fixes dnsdb Out-Of-Bounds Read Information Disclosure Vulnerability (boo#1215789)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-18"/>
	<updated date="2023-10-18"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1215787">SUSE bug 1215787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215789">SUSE bug 1215789</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-42117/">CVE-2023-42117 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42117">CVE-2023-42117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-42119/">CVE-2023-42119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42119">CVE-2023-42119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009802335" comment="exim-4.94.2-bp155.5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802336" comment="eximon-4.94.2-bp155.5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802337" comment="eximstats-html-4.94.2-bp155.5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3972" version="1" class="patch">
	<metadata>
		<title>Security update for rxvt-unicode (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206069" ref_url="https://bugzilla.suse.com/1206069" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4170" ref_url="https://www.suse.com/security/cve/CVE-2022-4170/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0306-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HJFJQGRU5ZFB7SWTSO2FUE3CKDHSOPB7/" source="SUSE-SU"/>
		<description>
This update for rxvt-unicode fixes the following issues:

- Update to version 9.31: (CVE-2022-4170 boo#1206069)

  - implement a fix for CVE-2022-4170 (reported and analyzed by
    David Leadbeater). While present in version 9.30, it should not
    be exploitable. It is exploitable in versions 9.25 and 9.26, at
    least, and allows anybody controlling output to the terminal to
    execute arbitrary code in the urxvt process.
  - the background extension no longer requires off focus fading
    support to be compiled in.
  - the confirm-paste extension now offers a choice betwene pasting
    the original or a sanitized version, and also frees up memory
    used to store the paste text immediately.
  - fix compiling without frills.
  - fix rewrapMode: never.
  - fix regression that caused urxvt to no longer emit responses to
    OSC color queries other than OSC 4 ones.
  - fix regression that caused urxvt to no longer process OSC 705.
  - restore CENTURY to be 1900 to 'improve' year parsing in urclock
    (or at least go back to the old interpretation) (based on an
    analysis by Tommy Pettersson).
  - exec_async (used e.g. by the matcher extension to spawn
    processes) now sets the URXVT_EXT_WINDOWID variable to the
    window id of the terminal.
  - implement -fps option/refreshRate resource to change the
    default 60 Hz maximum refresh limiter. I always wanted an fps
    option, but had to wait for a user requesting it.
  - new clickthrough extension.
  - perl now also requires Xext.
  - X region and shape extension functionality has been exposed to
    perl extensions.
  - RENDER extension no longer depends on ENABLE_XIM_ONTHESPOT.

		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-20"/>
	<updated date="2023-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206069">SUSE bug 1206069</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-4170/">CVE-2022-4170 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4170">CVE-2022-4170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802507" comment="rxvt-unicode-9.31-bp155.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3973" version="1" class="patch">
	<metadata>
		<title>Security update for bluetuith (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="openSUSE-SU-2023:0307-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XURBPTX7HZIVH2DJR4DNKE2BL4MXQEKL/" source="SUSE-SU"/>
		<description>
This update for bluetuith fixes the following issues:

- Update to 0.1.7:

  * New HJSON-based configuration format
  * Adapter status indicators
  * Cancellable OBEX session creation
  * Enhanced popups
  * Major bugfixes and improvements

- Update to 0.1.5:
 
  * ui: device: Show address if name is empty 
  * agent: Display pincode in a modal #14

- Update to 0.1.5:

  * Update dependencies to resolve vulnerability

- Update to 0.1.4:

  * Minor bugfixes
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-20"/>
	<updated date="2023-10-20"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802520" comment="bluetuith-0.1.7-bp155.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3974" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216392" ref_url="https://bugzilla.suse.com/1216392" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2023:0308-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLVWWYHS4VZSNCPHM3U2TLSK3E467NHV/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

- Chromium 118.0.5993.88: 
  * unspecified security fix (boo#1216392)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-20"/>
	<updated date="2023-10-20"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1216392">SUSE bug 1216392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009802508" comment="chromedriver-118.0.5993.88-bp155.2.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802509" comment="chromium-118.0.5993.88-bp155.2.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3975" version="1" class="patch">
	<metadata>
		<title>Recommended update for gpp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1108673" ref_url="https://bugzilla.suse.com/1108673" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-17076" ref_url="https://www.suse.com/security/cve/CVE-2018-17076/" source="CVE"/>
		<description>
This update for gpp fixes the following issues:

Update to version 2.28:

* Fixed typos in documentation (Issues #57 and #61)
* Added #sinclude meta-macro for silent includes (Issue #63)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-21"/>
	<updated date="2023-10-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108673">SUSE bug 1108673</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-17076/">CVE-2018-17076 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17076">CVE-2018-17076 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802620" comment="gpp-2.28-bp155.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3976" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216549" ref_url="https://bugzilla.suse.com/1216549" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5472" ref_url="https://www.suse.com/security/cve/CVE-2023-5472/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0325-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZ3QKUQGRWZFIKHE6USYN3QNVTMQP47N/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

- Chromium 118.0.5993.117 (boo#1216549)

  * CVE-2023-5472: Use after free in Profiles
  * Various fixes from internal audits, fuzzing and other initiatives
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-26"/>
	<updated date="2023-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216549">SUSE bug 1216549</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5472/">CVE-2023-5472 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5472">CVE-2023-5472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009803328" comment="chromedriver-118.0.5993.117-bp155.2.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803329" comment="chromium-118.0.5993.117-bp155.2.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3977" version="1" class="patch">
	<metadata>
		<title>Security update for sox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212060" ref_url="https://bugzilla.suse.com/1212060" source="BUGZILLA"/>
		<reference ref_id="1212061" ref_url="https://bugzilla.suse.com/1212061" source="BUGZILLA"/>
		<reference ref_id="1212062" ref_url="https://bugzilla.suse.com/1212062" source="BUGZILLA"/>
		<reference ref_id="1212063" ref_url="https://bugzilla.suse.com/1212063" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13590" ref_url="https://www.suse.com/security/cve/CVE-2019-13590/" source="CVE"/>
		<reference ref_id="CVE-2021-23159" ref_url="https://www.suse.com/security/cve/CVE-2021-23159/" source="CVE"/>
		<reference ref_id="CVE-2021-33844" ref_url="https://www.suse.com/security/cve/CVE-2021-33844/" source="CVE"/>
		<reference ref_id="CVE-2021-3643" ref_url="https://www.suse.com/security/cve/CVE-2021-3643/" source="CVE"/>
		<reference ref_id="CVE-2021-40426" ref_url="https://www.suse.com/security/cve/CVE-2021-40426/" source="CVE"/>
		<reference ref_id="CVE-2022-31650" ref_url="https://www.suse.com/security/cve/CVE-2022-31650/" source="CVE"/>
		<reference ref_id="CVE-2022-31651" ref_url="https://www.suse.com/security/cve/CVE-2022-31651/" source="CVE"/>
		<reference ref_id="CVE-2023-32627" ref_url="https://www.suse.com/security/cve/CVE-2023-32627/" source="CVE"/>
		<reference ref_id="CVE-2023-34318" ref_url="https://www.suse.com/security/cve/CVE-2023-34318/" source="CVE"/>
		<reference ref_id="CVE-2023-34432" ref_url="https://www.suse.com/security/cve/CVE-2023-34432/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0329-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OWH3Y6RJSLCAZ7XAIEM2FMD5E6EQYZM5/" source="SUSE-SU"/>
		<description>
This update for sox fixes the following issues:

- Apply various fix patches taken from Debian package;
  it fixes also other entries (CVE-2022-31650 boo#1212060
  CVE-2023-34318 boo#1212062 CVE-2023-34432 boo#1212063)
- Fix floating point exception in src/voc.c (CVE-2023-32627 boo#1212061)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-26"/>
	<updated date="2023-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212060">SUSE bug 1212060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212061">SUSE bug 1212061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212062">SUSE bug 1212062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212063">SUSE bug 1212063</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-13590/">CVE-2019-13590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13590">CVE-2019-13590 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23159/">CVE-2021-23159 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23159">CVE-2021-23159 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33844/">CVE-2021-33844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33844">CVE-2021-33844 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3643/">CVE-2021-3643 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3643">CVE-2021-3643 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-40426/">CVE-2021-40426 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40426">CVE-2021-40426 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31650/">CVE-2022-31650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31650">CVE-2022-31650 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31651/">CVE-2022-31651 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31651">CVE-2022-31651 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32627/">CVE-2023-32627 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32627">CVE-2023-32627 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-34318/">CVE-2023-34318 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34318">CVE-2023-34318 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-34432/">CVE-2023-34432 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34432">CVE-2023-34432 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009803413" comment="libsox3-14.4.2-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803414" comment="sox-14.4.2-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803415" comment="sox-devel-14.4.2-bp155.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3978" version="1" class="patch">
	<metadata>
		<title>Security update for python-bugzilla (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215718" ref_url="https://bugzilla.suse.com/1215718" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2023:0334-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3M3FJ7K6HPLRGRL6HZBBOVGN5PXISJQK/" source="SUSE-SU"/>
		<description>
This update for python-bugzilla fixes the following issues:

- Fixed potential API Key leak (boo#1215718)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-27"/>
	<updated date="2023-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215718">SUSE bug 1215718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803768" comment="python3-bugzilla-3.2.0-bp155.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3979" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2023-5218" ref_url="https://www.suse.com/security/cve/CVE-2023-5218/" source="CVE"/>
		<reference ref_id="CVE-2023-5473" ref_url="https://www.suse.com/security/cve/CVE-2023-5473/" source="CVE"/>
		<reference ref_id="CVE-2023-5474" ref_url="https://www.suse.com/security/cve/CVE-2023-5474/" source="CVE"/>
		<reference ref_id="CVE-2023-5475" ref_url="https://www.suse.com/security/cve/CVE-2023-5475/" source="CVE"/>
		<reference ref_id="CVE-2023-5476" ref_url="https://www.suse.com/security/cve/CVE-2023-5476/" source="CVE"/>
		<reference ref_id="CVE-2023-5477" ref_url="https://www.suse.com/security/cve/CVE-2023-5477/" source="CVE"/>
		<reference ref_id="CVE-2023-5478" ref_url="https://www.suse.com/security/cve/CVE-2023-5478/" source="CVE"/>
		<reference ref_id="CVE-2023-5479" ref_url="https://www.suse.com/security/cve/CVE-2023-5479/" source="CVE"/>
		<reference ref_id="CVE-2023-5481" ref_url="https://www.suse.com/security/cve/CVE-2023-5481/" source="CVE"/>
		<reference ref_id="CVE-2023-5483" ref_url="https://www.suse.com/security/cve/CVE-2023-5483/" source="CVE"/>
		<reference ref_id="CVE-2023-5484" ref_url="https://www.suse.com/security/cve/CVE-2023-5484/" source="CVE"/>
		<reference ref_id="CVE-2023-5485" ref_url="https://www.suse.com/security/cve/CVE-2023-5485/" source="CVE"/>
		<reference ref_id="CVE-2023-5486" ref_url="https://www.suse.com/security/cve/CVE-2023-5486/" source="CVE"/>
		<reference ref_id="CVE-2023-5487" ref_url="https://www.suse.com/security/cve/CVE-2023-5487/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0338-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CBGGDMAKEIS7OWQIGRX4OQWPP7OTHLDW/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

- Update to 104.0.4944.23
  * DNA-110465 [Scrollable tab strip] Weird animation when
    closing tab
  * DNA-112021 Favicons disappear from history after being
    hovered over
  * DNA-112310 Put opening animation on start page behind a flag
  * DNA-112462 Crash at opera::SidebarItemViewImpl::
    StateChanged(views::Button::ButtonState)
  * DNA-112464 Crash at anonymous namespace::SwitchToTabButton::
    OnThemeChanged()
  * DNA-112518 Force Default as last used Profile
  * DNA-112534 Set profiles_order to Default dir

- Changes in 104.0.4944.18
  * CHR-9471 Update Chromium on desktop-stable-118-4944 to
    118.0.5993.71
  * DNA-111704 chrome.webRequest.onHeadersReceived event is not
    fired for extension if page opened from SpeedDial tile
  * DNA-111878 Highlighting of tabs and bookmarks in dark mode is
    almost invisible.
  * DNA-111883 [Address bar] Hover effect on page is placed
    too high
  * DNA-111922 [Linux] Change Opera beta application icon
  * DNA-111955 Reduce colors used in Opera as much as possible
  * DNA-112075 Rename palette colors in theme for better
    reusability
  * DNA-112108 Fix dangling WebContents ptr bound to
    TabSnoozeInfobarDelegate::Show callback
  * DNA-112222 Tab in island not marked as active
  * DNA-112242 Disable feature flag #platform-h264-decoder-in-gpu
    by default on stable channel
  * DNA-112265 Promote 104 to stable
  * DNA-112312 Turn on #wallet-selector on all streams
  * DNA-112313 Enable #pinboard-popup-refresh on all streams
  * DNA-112426 [profile migration] Renaming invalid Default to
    Default.old is not needed anymore
- The update to chromium 118.0.5993.71 fixes following issues:
  CVE-2023-5218, CVE-2023-5487, CVE-2023-5484, CVE-2023-5475,
  CVE-2023-5483, CVE-2023-5481, CVE-2023-5476, CVE-2023-5474,
  CVE-2023-5479, CVE-2023-5485, CVE-2023-5478, CVE-2023-5477,
  CVE-2023-5486, CVE-2023-5473
- Complete Opera 104 changelog at:
  https://blogs.opera.com/desktop/changelog-for-104/  

- Update to 103.0.4928.34
  * DNA-111680 Fix highlight of bookmarks bar folder elements
  * DNA-111703 O icon moves upon opening menu
  * DNA-111883 [Address bar] Hover effect on page is placed
    too high
  * DNA-111940 OMenu text displaced to the right without
    any indentation
  * DNA-112118 Crash at history::URLDatabase::
    CreateContinueOnIndexIfNeeded(std::__Cr::vector)

- Update to 103.0.4928.26
  * DNA-111681 Disappearing icons of bookmarks bar folders elements
  * DNA-112020 Enable #address-bar-dropdown-cities on all streams
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-29"/>
	<updated date="2023-10-29"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5218/">CVE-2023-5218 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5218">CVE-2023-5218 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5473/">CVE-2023-5473 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5473">CVE-2023-5473 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5474/">CVE-2023-5474 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5474">CVE-2023-5474 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5475/">CVE-2023-5475 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5475">CVE-2023-5475 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5476/">CVE-2023-5476 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5476">CVE-2023-5476 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5477/">CVE-2023-5477 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5477">CVE-2023-5477 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5478/">CVE-2023-5478 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5478">CVE-2023-5478 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5479/">CVE-2023-5479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5479">CVE-2023-5479 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5481/">CVE-2023-5481 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5481">CVE-2023-5481 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5483/">CVE-2023-5483 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5483">CVE-2023-5483 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5484/">CVE-2023-5484 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5484">CVE-2023-5484 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5485/">CVE-2023-5485 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5485">CVE-2023-5485 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5486/">CVE-2023-5486 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5486">CVE-2023-5486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5487/">CVE-2023-5487 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5487">CVE-2023-5487 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009804022" comment="opera-104.0.4944.23-lp155.3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3980" version="1" class="patch">
	<metadata>
		<title>Security update for roundcubemail (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216429" ref_url="https://bugzilla.suse.com/1216429" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5631" ref_url="https://www.suse.com/security/cve/CVE-2023-5631/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0345-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GGRBYUWS4WS3V7Z75JPLZ6VMUDQER3SA/" source="SUSE-SU"/>
		<description>
This update for roundcubemail fixes the following issues:

Update to version 1.6.4 (boo#1216429):

* CVE-2023-5631: Fix cross-site scripting vulnerability in handling of SVG in HTML messages 
* Fix PHP8 warnings
* Fix default 'mime.types' path on Windows
* Managesieve: Fix javascript error when relational or spamtest extension is not enabled
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-02"/>
	<updated date="2023-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216429">SUSE bug 1216429</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5631/">CVE-2023-5631 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5631">CVE-2023-5631 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808424" comment="roundcubemail-1.6.4-bp155.2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3981" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-railties-5.2 (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214807" ref_url="https://bugzilla.suse.com/1214807" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38037" ref_url="https://www.suse.com/security/cve/CVE-2023-38037/" source="CVE"/>
		<description>

This update for rubygem-railties-5.2 fixes the following issue:


- CVE-2023-38037: Fixed File Disclosure of Locally Encrypted [bsc#1214807]
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-03"/>
	<updated date="2023-11-03"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1214807">SUSE bug 1214807</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38037/">CVE-2023-38037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38037">CVE-2023-38037 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009808853" comment="ruby2.5-rubygem-railties-5.2-5.2.3-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808855" comment="ruby2.5-rubygem-railties-doc-5.2-5.2.3-bp155.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3982" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-activesupport-5.2 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214807" ref_url="https://bugzilla.suse.com/1214807" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38037" ref_url="https://www.suse.com/security/cve/CVE-2023-38037/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OBVOVSGAX2OPRG2RF5ECRNES7R32LDVM/" source="SUSE-SU"/>
		<description>

This update for rubygem-activesupport-5.2 fixes the following issue:

- CVE-2023-38037: fixed a File Disclosure of Locally Encrypted Files (bsc#1214807)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-04"/>
	<updated date="2023-11-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214807">SUSE bug 1214807</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38037/">CVE-2023-38037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38037">CVE-2023-38037 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009808849" comment="ruby2.5-rubygem-activesupport-5.2-5.2.3-bp155.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808850" comment="ruby2.5-rubygem-activesupport-doc-5.2-5.2.3-bp155.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3983" version="1" class="patch">
	<metadata>
		<title>Security update for virtualbox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215463" ref_url="https://bugzilla.suse.com/1215463" source="BUGZILLA"/>
		<reference ref_id="1216363" ref_url="https://bugzilla.suse.com/1216363" source="BUGZILLA"/>
		<reference ref_id="1216364" ref_url="https://bugzilla.suse.com/1216364" source="BUGZILLA"/>
		<reference ref_id="1216365" ref_url="https://bugzilla.suse.com/1216365" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-22098" ref_url="https://www.suse.com/security/cve/CVE-2023-22098/" source="CVE"/>
		<reference ref_id="CVE-2023-22099" ref_url="https://www.suse.com/security/cve/CVE-2023-22099/" source="CVE"/>
		<reference ref_id="CVE-2023-22100" ref_url="https://www.suse.com/security/cve/CVE-2023-22100/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0352-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SUZKE6ZA5IISV77TNIUMUZMZFQSXYHQ7/" source="SUSE-SU"/>
		<description>
This update for virtualbox fixes the following issues:

- Version bump to VirtualBox 7.0.12 (released October 17 2023 by Oracle)

  Fixes the following:
  - CVE-2023-22098 (boo#1216363)
  - CVE-2023-22099 (boo#1216364)
  - CVE-2023-22100 (boo#1216365)

This is a maintenance release. The following items were fixed and/or added:

- VMM: Fixed using a debugger inside the guest under certain circumstances (bugs #21413 and #21546)
- VMM: Fixed detection of VT-x being used by other hypervisors (bug #21867)
- VMM: Introduced additional improvements in Split Lock Detection feature of recent Intel CPUs on Linux hosts (bug #20180)
- GUI: Fixed issue when the nested hardware virtualization setting was not displayed in the VM details panel (bug #21707)
- GUI: Introduced NLS update for Croatian, Indonesian, Italian, Japanese, Korean, Dutch and Turkish languages as well as added general look-and-feel improvements
- Devices: Fixed black screen in Windows guests with multiple guest screens when 3D is disabled (7.0.10 regression)
- Devices: Fixed PCI device identifiers for the VirtIO network interface (bug #21516)
- Devices: Fixed VLAN support for the VirtIO network interface (bug #21778)
- Devices: Fixed loading saved states when a TPM is configured (7.0.10 regression, bug #21773)
- Networking: Fixed memory leaks in the VBoxIntNetSwitch process on macOS (bug #21752)
- Networking: Fixed TCP connections with IP addresses ending on .2 when the NAT network attachment is used (bug #21513)
- VRDP: Added general improvements
- VBoxManage: Added improvements for 'list usbfilters' command
- Unattended: Added kick start file support for Oracle Linux 8 and Oracle Linux 9.
- Main: Added more Linux OS subtypes
- Host Services: Fixed Guest Properties service crash under rare circumstance
- Linux Host and Guest: Fixed few 'field-spanning write' kernel warnings (bugs #21410 and #21862)
- Linux Guest Additions: Added more fixes for RHEL 8.9 and 9.3 kernel
- Linux Guest Additions: Added more fixes for kernel 6.4
- Linux Guest Additions: Added initial support for OpenSUSE 15.5 kernel
- Linux Guest Additions: Added initial support for kernels 6.5 and 6.6
- Linux Guest Additions: Added version reporting for 'rcvboxadd status-kernel' and 'rcvboxadd status-user' commands
- BIOS: Restored support for ISA SCSI HBAs in the BIOS (bug #21736)

- Convert to systemd-sysusers

- Fix problems with 6.5 kernels and shared folders. (boo#1215463).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-04"/>
	<updated date="2023-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215463">SUSE bug 1215463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216363">SUSE bug 1216363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216364">SUSE bug 1216364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216365">SUSE bug 1216365</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-22098/">CVE-2023-22098 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22098">CVE-2023-22098 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-22099/">CVE-2023-22099 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22099">CVE-2023-22099 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22100/">CVE-2023-22100 at SUSE</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22100">CVE-2023-22100 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009809021" comment="python3-virtualbox-7.0.12-lp155.2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809022" comment="virtualbox-7.0.12-lp155.2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809023" comment="virtualbox-devel-7.0.12-lp155.2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809024" comment="virtualbox-guest-desktop-icons-7.0.12-lp155.2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809025" comment="virtualbox-guest-source-7.0.12-lp155.2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809026" comment="virtualbox-guest-tools-7.0.12-lp155.2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809027" comment="virtualbox-host-source-7.0.12-lp155.2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809028" comment="virtualbox-kmp-default-7.0.12_k5.14.21_150500.55.31-lp155.2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809029" comment="virtualbox-qt-7.0.12-lp155.2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809030" comment="virtualbox-vnc-7.0.12-lp155.2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809031" comment="virtualbox-websrv-7.0.12-lp155.2.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3984" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2023-5472" ref_url="https://www.suse.com/security/cve/CVE-2023-5472/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0354-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2Y5GV5TH6NRTLTHJ4VYCUYSWH6XUX5TQ/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

- Update to 104.0.4944.36

  * CHR-9492 Update Chromium on desktop-stable-118-4944 to
    118.0.5993.118
  * DNA-112757 [Tab close button] Close button is cutted when
    a lot tabs are opened

- The update to chromium 118.0.5993.118 fixes following issues:
  CVE-2023-5472

- Update to 104.0.4944.33

  * CHR-9487 Update Chromium on desktop-stable-118-4944 to
    118.0.5993.96
  * DNA-111963 Show duplicate indicator when hovering tab in
    tab tooltip

- Changes in 104.0.4944.28

  * DNA-112454 [Start Page] No context menu in Search bar using
    right button of mouse
  * DNA-112053 Context menu is too large on Mac
  * DNA-111989 Favicons are displayed too close to titles in
    history menu
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-04"/>
	<updated date="2023-11-04"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5472/">CVE-2023-5472 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5472">CVE-2023-5472 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809032" comment="opera-104.0.4944.36-lp155.3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3985" version="1" class="patch">
	<metadata>
		<title>Security update for tor (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216873" ref_url="https://bugzilla.suse.com/1216873" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2023:0361-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6CUKHNCCOEC5HWMHMSYJY6GFFOSP2ZIL/" source="SUSE-SU"/>
		<description>
This update for tor fixes the following issues:

- tor 0.4.8.8:

  * Mitigate an issue when Tor compiled with OpenSSL can crash during
    handshake with a remote relay. (TROVE-2023-004, boo#1216873)
  * Regenerate fallback directories generated on November 03, 2023.
  * Update the geoip files to match the IPFire Location Database, as
    retrieved on 2023/11/03
  * directory authority: Look at the network parameter
    'maxunmeasuredbw' with the correct spelling
  * vanguards addon support: Count the conflux linked cell as
    valid when it is successfully processed. This will quiet a 
    spurious warn in the vanguards addon

- tor 0.4.8.7:

  * Fix an issue that prevented us from pre-building more conflux
    sets after existing sets had been used

- tor 0.4.8.6:

  * onion service: Fix a reliability issue where services were
    expiring their introduction points every consensus update.
    This caused connectivity issues for clients caching the old
    descriptor and intro points
  * Log the input and output buffer sizes when we detect a potential
    compression bomb
  * Disable multiple BUG warnings of a missing relay identity key when
    starting an instance of Tor compiled without relay support
  * When reporting a pseudo-networkstatus as a bridge authority, or
    answering 'ns/purpose/*' controller requests, include accurate
    published-on dates from our list of router descriptors
  * Use less frightening language and lower the log-level of our
    run-time ABI compatibility check message in our Zstd
    compression subsystem

- tor 0.4.8.5:

  * bugfixes creating log BUG stacktrace

- tor 0.4.8.4:

  * Extend DoS protection to partially opened channels and known
    relays
  * Dynamic Proof-Of-Work protocol to thwart flooding DoS attacks
    against hidden services. Disabled by default, enable via
    'HiddenServicePoW' in torrc
  * Implement conflux traffic splitting
  * Directory authorities and relays now interact properly with
    directory authorities if they change addresses

- tor 0.4.7.14:

  *  bugfix affecting vanguards (onion service), and minor fixes
  
- Enable support for scrypt()
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-10"/>
	<updated date="2023-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216873">SUSE bug 1216873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809612" comment="tor-0.4.8.8-bp155.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3986" version="1" class="patch">
	<metadata>
		<title>Security update for mupdf (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216728" ref_url="https://bugzilla.suse.com/1216728" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-31794" ref_url="https://www.suse.com/security/cve/CVE-2023-31794/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0363-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HH7LKRXVB7EGA3JI6NL5ZVYTPRFC3DKZ/" source="SUSE-SU"/>
		<description>
This update for mupdf fixes the following issues:

- CVE-2023-31794: Fixed denial of service via crafted pdf in pdf_mark_list_push() (boo#1216728)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-11"/>
	<updated date="2023-11-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216728">SUSE bug 1216728</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-31794/">CVE-2023-31794 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31794">CVE-2023-31794 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009809880" comment="mupdf-1.21.1-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809881" comment="mupdf-devel-static-1.21.1-bp155.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3987" version="1" class="patch">
	<metadata>
		<title>Security update for vlc (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206142" ref_url="https://bugzilla.suse.com/1206142" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-37434" ref_url="https://www.suse.com/security/cve/CVE-2022-37434/" source="CVE"/>
		<reference ref_id="CVE-2022-41325" ref_url="https://www.suse.com/security/cve/CVE-2022-41325/" source="CVE"/>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M45KVAFI32X55HONDKLE2FBN6GETMIUL/" source="SUSE-SU"/>
		<description>
This update for vlc fixes the following issues:

Update to version 3.0.20:

+ Video Output:
  - Fix green line in fullscreen in D3D11 video output
  - Fix crash with some AMD drivers old versions
  - Fix events propagation issue when double-clicking with mouse wheel
+ Decoders:
  - Fix crash when AV1 hardware decoder fails
+ Interface:
  - Fix annoying disappearance of the Windows fullscreen controller
+ Demuxers:
  - Fix potential security issue (OOB Write) on MMS:// by checking user size bounds

Update to version 3.0.19:

+ Core: 
  - Fix next-frame freezing in most scenarios
+ Demux: 
  - Support RIFF INFO tags for Wav files
  - Fix AVI files with flipped RAW video planes
  - Fix duration on short and small Ogg/Opus files
  - Fix some HLS/TS streams with ID3 prefix
  - Fix some HLS playlist refresh drift
  - Fix for GoPro MAX spatial metadata
  - Improve FFmpeg-muxed MP4 chapters handling
  - Improve playback for QNap-produced AVI files
  - Improve playback of some old RealVideo files
  - Fix duration probing on some MP4 with missing information
+ Decoders:
  - Multiple fixes on AAC handling
  - Activate hardware decoding of AV1 on Windows (DxVA)
  - Improve AV1 HDR support with software decoding
  - Fix some AV1 GBRP streams, AV1 super-resolution streams and monochrome ones
  - Fix black screen on poorly edited MP4 files on Android Mediacodec
  - Fix rawvid video in NV12
  - Fix several issues on Windows hardware decoding (including 'too large resolution in DxVA')
  - Improve crunchyroll-produced SSA rendering
+ Video Output:
  - Super Resolution scaling with nVidia and Intel GPUs
  - Fix for an issue when cropping on Direct3D9
  - Multiple fixes for hardware decoding on D3D11 and OpenGL interop
  - Fix an issue when playing -90?rotated video
  - Fix subtitles rendering blur on recent macOS
+ Input:
  - Improve SMB compatibility with Windows 11 hosts
+ Contribs:
  - Update of fluidlite, fixing some MIDI rendering on Windows
  - Update of zlib to 1.2.13 (CVE-2022-37434)
  - Update of FFmpeg, vpx (CVE-2023-5217), ebml, dav1d, libass
+ Misc:
  - Improve muxing timestamps in a few formats (reset to 0)
  - Fix some rendering issues on Linux with the fullscreen controller
  - Fix GOOM visualization
  - Fixes for Youtube playback
  - Fix some MPRIS inconsistencies that broke some OS widgets on Linux
  - Implement MPRIS TrackList signals
  - Fix opening files in read-only mode
  - Fix password search using the Kwallet backend
  - Fix some crashes on macOS when switching application
  - Fix 5.1/7.1 output on macOS and tvOS
  - Fix several crashes and bugs in the macOS preferences panel
  - Improvements on the threading of the MMDevice audio output on Windows
  - Fix a potential security issue on the uninstaller DLLs
  - Fix memory leaks when using the media_list_player libVLC APIs
+ Translations:
  - Update of most translations
  - New translations to Esperanto, Interlingue, Lao, Macedonian, Burmese, Odia, Samoan and Swahili
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-12"/>
	<updated date="2023-11-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206142">SUSE bug 1206142</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37434/">CVE-2022-37434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41325/">CVE-2022-41325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41325">CVE-2022-41325 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009809882" comment="libvlc5-3.0.20-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809883" comment="libvlccore9-3.0.20-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809884" comment="vlc-3.0.20-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809885" comment="vlc-codec-gstreamer-3.0.20-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809886" comment="vlc-devel-3.0.20-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809887" comment="vlc-jack-3.0.20-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809888" comment="vlc-lang-3.0.20-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809889" comment="vlc-noX-3.0.20-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809890" comment="vlc-opencv-3.0.20-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809891" comment="vlc-qt-3.0.20-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809892" comment="vlc-vdpau-3.0.20-bp155.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3988" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216783" ref_url="https://bugzilla.suse.com/1216783" source="BUGZILLA"/>
		<reference ref_id="1216978" ref_url="https://bugzilla.suse.com/1216978" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5480" ref_url="https://www.suse.com/security/cve/CVE-2023-5480/" source="CVE"/>
		<reference ref_id="CVE-2023-5482" ref_url="https://www.suse.com/security/cve/CVE-2023-5482/" source="CVE"/>
		<reference ref_id="CVE-2023-5849" ref_url="https://www.suse.com/security/cve/CVE-2023-5849/" source="CVE"/>
		<reference ref_id="CVE-2023-5850" ref_url="https://www.suse.com/security/cve/CVE-2023-5850/" source="CVE"/>
		<reference ref_id="CVE-2023-5851" ref_url="https://www.suse.com/security/cve/CVE-2023-5851/" source="CVE"/>
		<reference ref_id="CVE-2023-5852" ref_url="https://www.suse.com/security/cve/CVE-2023-5852/" source="CVE"/>
		<reference ref_id="CVE-2023-5853" ref_url="https://www.suse.com/security/cve/CVE-2023-5853/" source="CVE"/>
		<reference ref_id="CVE-2023-5854" ref_url="https://www.suse.com/security/cve/CVE-2023-5854/" source="CVE"/>
		<reference ref_id="CVE-2023-5855" ref_url="https://www.suse.com/security/cve/CVE-2023-5855/" source="CVE"/>
		<reference ref_id="CVE-2023-5856" ref_url="https://www.suse.com/security/cve/CVE-2023-5856/" source="CVE"/>
		<reference ref_id="CVE-2023-5857" ref_url="https://www.suse.com/security/cve/CVE-2023-5857/" source="CVE"/>
		<reference ref_id="CVE-2023-5858" ref_url="https://www.suse.com/security/cve/CVE-2023-5858/" source="CVE"/>
		<reference ref_id="CVE-2023-5859" ref_url="https://www.suse.com/security/cve/CVE-2023-5859/" source="CVE"/>
		<reference ref_id="CVE-2023-5996" ref_url="https://www.suse.com/security/cve/CVE-2023-5996/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0368-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KD6QFFZ2QOOLMG34Z7LCSOIITI7H7NZS/" source="SUSE-SU"/>
		<description>

This update for chromium fixes the following issues:

Chromium 119.0.6045.123 (boo#1216978)

* CVE-2023-5996: Use after free in WebAudio

Chromium 119.0.6045.105 (boo#1216783)

* CVE-2023-5480: Inappropriate implementation in Payments
* CVE-2023-5482: Insufficient data validation in USB
* CVE-2023-5849: Integer overflow in USB
* CVE-2023-5850: Incorrect security UI in Downloads
* CVE-2023-5851: Inappropriate implementation in Downloads
* CVE-2023-5852: Use after free in Printing
* CVE-2023-5853: Incorrect security UI in Downloads
* CVE-2023-5854: Use after free in Profiles
* CVE-2023-5855: Use after free in Reading Mode
* CVE-2023-5856: Use after free in Side Panel
* CVE-2023-5857: Inappropriate implementation in Downloads
* CVE-2023-5858: Inappropriate implementation in WebApp Provider
* CVE-2023-5859: Incorrect security UI in Picture In Picture


gn was updated to version 0.20231023:

* many updates to support Chromium 119 build

		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-14"/>
	<updated date="2023-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216783">SUSE bug 1216783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216978">SUSE bug 1216978</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5480/">CVE-2023-5480 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5480">CVE-2023-5480 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5482/">CVE-2023-5482 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5482">CVE-2023-5482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5849/">CVE-2023-5849 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5849">CVE-2023-5849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5850/">CVE-2023-5850 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5850">CVE-2023-5850 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5851/">CVE-2023-5851 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5851">CVE-2023-5851 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5852/">CVE-2023-5852 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5852">CVE-2023-5852 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5853/">CVE-2023-5853 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5853">CVE-2023-5853 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5854/">CVE-2023-5854 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5854">CVE-2023-5854 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5855/">CVE-2023-5855 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5855">CVE-2023-5855 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5856/">CVE-2023-5856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5856">CVE-2023-5856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5857/">CVE-2023-5857 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5857">CVE-2023-5857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5858/">CVE-2023-5858 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5858">CVE-2023-5858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5859/">CVE-2023-5859 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5859">CVE-2023-5859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5996/">CVE-2023-5996 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5996">CVE-2023-5996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810276" comment="chromedriver-119.0.6045.123-bp155.2.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810277" comment="chromium-119.0.6045.123-bp155.2.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810278" comment="gn-0.20231023-bp155.5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3989" version="1" class="patch">
	<metadata>
		<title>Security update for connman (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210395" ref_url="https://bugzilla.suse.com/1210395" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28488" ref_url="https://www.suse.com/security/cve/CVE-2023-28488/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0369-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JE33AUDBYZOO3LHUWP2WCZRW7H3IHMC5/" source="SUSE-SU"/>
		<description>
This update for connman fixes the following issues:

Update to 1.42

  * Fix issue with iwd and signal strength calculation.
  * Fix issue with iwd and handling service removal.
  * Fix issue with iwd and handling new connections.
  * Fix issue with handling default online check URL.
  * Fix issue with handling nameservers refresh.
  * Fix issue with handling proxy from DHCP lease. (boo#1210395 CVE-2023-28488)
  * Fix issue with handling multiple proxies from PAC.
  * Fix issue with handling manual time update changes.
  * Fix issue with handling invalid gateway routes.
  * Fix issue with handling hidden WiFi agent requests.
  * Fix issue with handling WiFi SAE authentication failure.
  * Fix issue with handling DNS Proxy and TCP server replies.
  * Add support for regulatory domain following timezone.
  * Add support for localtime configuration option.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-14"/>
	<updated date="2023-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210395">SUSE bug 1210395</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28488/">CVE-2023-28488 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28488">CVE-2023-28488 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810300" comment="connman-1.42-bp155.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810301" comment="connman-client-1.42-bp155.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810302" comment="connman-devel-1.42-bp155.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810303" comment="connman-doc-1.42-bp155.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810304" comment="connman-nmcompat-1.42-bp155.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810305" comment="connman-plugin-hh2serial-gps-1.42-bp155.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810306" comment="connman-plugin-iospm-1.42-bp155.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810307" comment="connman-plugin-l2tp-1.42-bp155.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810308" comment="connman-plugin-openvpn-1.42-bp155.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810309" comment="connman-plugin-polkit-1.42-bp155.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810310" comment="connman-plugin-pptp-1.42-bp155.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810311" comment="connman-plugin-tist-1.42-bp155.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810312" comment="connman-plugin-vpnc-1.42-bp155.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810313" comment="connman-plugin-wireguard-1.42-bp155.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810314" comment="connman-test-1.42-bp155.4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3990" version="1" class="patch">
	<metadata>
		<title>Security update for jhead (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1207150" ref_url="https://bugzilla.suse.com/1207150" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41751" ref_url="https://www.suse.com/security/cve/CVE-2022-41751/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0371-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5IWSVTWO7VWRRJGJWKXBTVIMTVRSDRBK/" source="SUSE-SU"/>
		<description>
This update for jhead fixes the following issues:

- Fixed autorotation problem caused by CVE-2022-41751 patch. [boo#1207150]
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-15"/>
	<updated date="2023-11-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1207150">SUSE bug 1207150</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41751/">CVE-2022-41751 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41751">CVE-2022-41751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810389" comment="jhead-3.06.0.1-bp155.5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3991" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217142" ref_url="https://bugzilla.suse.com/1217142" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5997" ref_url="https://www.suse.com/security/cve/CVE-2023-5997/" source="CVE"/>
		<reference ref_id="CVE-2023-6112" ref_url="https://www.suse.com/security/cve/CVE-2023-6112/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0372-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JILQXJ3DNE4GJU72FHTLKQFBFKZIZWSV/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 119.0.6045.159 (boo#1217142)

  * CVE-2023-5997: Use after free in Garbage Collection
  * CVE-2023-6112: Use after free in Navigation
  * Various fixes from internal audits, fuzzing and other initiatives
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-16"/>
	<updated date="2023-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217142">SUSE bug 1217142</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5997/">CVE-2023-5997 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5997">CVE-2023-5997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6112/">CVE-2023-6112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6112">CVE-2023-6112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810416" comment="chromedriver-119.0.6045.159-bp155.2.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810417" comment="chromium-119.0.6045.159-bp155.2.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3992" version="1" class="patch">
	<metadata>
		<title>Security update for yt-dlp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213124" ref_url="https://bugzilla.suse.com/1213124" source="BUGZILLA"/>
		<reference ref_id="1216467" ref_url="https://bugzilla.suse.com/1216467" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-35934" ref_url="https://www.suse.com/security/cve/CVE-2023-35934/" source="CVE"/>
		<reference ref_id="CVE-2023-46121" ref_url="https://www.suse.com/security/cve/CVE-2023-46121/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0374-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6MA5EHVFVH4HRBQQ5KZZ4YVOXJFQUG3W/" source="SUSE-SU"/>
		<description>
This update for yt-dlp fixes the following issues:

- Update to release 2023.11.14

  * Security: [CVE-2023-46121] Patch Generic Extractor MITM
    Vulnerability via Arbitrary Proxy Injection
  * Disallow smuggling of arbitrary http_headers; extractors now
    only use specific headers

- Make yt-dlp require the one pythonXX-yt-dlp that /usr/bin/yt-dlp
  was built with.

- Rework Python build procedure [boo#1216467]
- Enable Python library [boo#1216467]

- Update to release 2023.10.13

  * youtube: fix some bug with --extractor-retries inf

- Update to release 2023.10.07

  * yt: Fix heatmap extraction
  * yt: Raise a warning for Incomplete Data instead of an error

- Update to release 2023.09.24

  * Extract subtitles from SMIL manifests
  * fb: Add dash manifest URL
  * crunchyroll: Remove initial state extraction
  * youtube: Add player_params extractor arg

- remove suggests on brotlicffi - this is only for != cpython

- Update to release 2023.07.06

  * Prevent Cookie leaks on HTTP redirect [boo#1213124] [CVE-2023-35934]
  * yt: Avoid false DRM detection
  * yt: Process post_live over 2 hours
  * yt: Support shorts-only playlists

- Update to release 2023.06.22

   * youtube: add IOS to default clients used

- Update to release 2023.06.21

  * Add option --compat-option playlist-match-filter
  * Add options --no-quiet, option --color, --netrc-cmd, --xff
  * Auto-select default format in -f-
  * Improve HTTP redirect handling
  * Support decoding multiple content encodings

- Use python3.11 on Leap 15.5

  * python3.11 is the only python3 &gt; 3.6 version would be shipped
    in Leap 15.5

- Update to release 2023.03.04

  * A bunch of extractor fixes

- Update to release 2023.03.03

  * youtube: Construct dash formats with range query
  * yt: Detect and break on looping comments
  * yt: Extract channel view_count when /about tab is passed

- Update to release 2023.02.17

  * Merge youtube-dl: Upto commit/2dd6c6e (Feb 17 2023)
  * Fix --concat-playlist
  * Imply --no-progress when --print
  * Improve default subtitle language selection
  * Make title completely non-fatal
  * Sanitize formats before sorting
  * [hls] Allow extractors to provide AES key
  * [extractor/generic] Avoid catastrophic backtracking in KVS regex
  * [jsinterp] Support if statements
  * [plugins] Fix zip search paths
  * [utils] Don't use Content-length with encoding
  * [utils] Fix time_seconds to use the provided TZ
  * [utils] Fix race condition in make_dir
  * [extractor/anchorfm] Add episode
  * [extractor/boxcast] Add extractor
  * [extractor/ebay] Add extractor
  * [extractor/hypergryph] Add extractor
  * [extractor/NZOnScreen] Add extractor
  * [extractor/rozhlas] Add extractor
  * [extractor/tempo] Add IVXPlayer extractor
  * [extractor/txxx] Add extractors
  * [extractor/vocaroo] Add extractor
  * [extractor/wrestleuniverse] Add extractors
  * [extractor/yappy] Add extractor
  * [extractor/youtube] Fix uploader_id extraction
  * [extractor/youtube] Add hyperpipe instances
  * [extractor/youtube] Handle consent.youtube
  * [extractor/youtube] Support /live/ URL
  * [extractor/youtube] Update invidious and piped instances
  * [extractor/91porn] Fix title and comment extraction
  * [extractor/AbemaTV] Cache user token whenever appropriate
  * [extractor/bfmtv] Support rmc prefix
  * [extractor/biliintl] Add intro and ending chapters
  * [extractor/clyp] Support wav
  * [extractor/crunchyroll] Add intro chapter
  * [extractor/crunchyroll] Better message for premium videos
  * [extractor/crunchyroll] Fix incorrect premium-only error
  * [extractor/DouyuTV] Use new API
  * [extractor/embedly] Embedded links may be for other extractors
  * [extractor/freesound] Workaround invalid URL in webpage
  * [extractor/GoPlay] Use new API
  * [extractor/Hidive] Fix subtitles and age-restriction
  * [extractor/huya] Support HD streams
  * [extractor/moviepilot] Fix extractor
  * [extractor/nbc] Fix NBC and NBCStations extractors
  * [extractor/nbc] Fix XML parsing
  * [extractor/nebula] Remove broken cookie support
  * [extractor/nfl] Add NFLPlus extractor
  * [extractor/niconico] Add support for like history
  * [extractor/nitter] Update instance list by OIRNOIR
  * [extractor/npo] Fix extractor and add HD support
  * [extractor/odkmedia] Add OnDemandChinaEpisodeIE
  * [extractor/pornez] Handle relative URLs in iframe
  * [extractor/radiko] Fix format sorting for Time Free
  * [extractor/rcs] Fix extractors
  * [extractor/reddit] Support user posts
  * [extractor/rumble] Fix format sorting
  * [extractor/servus] Rewrite extractor
  * [extractor/slideslive] Fix slides and chapters/duration
  * [extractor/SportDeutschland] Fix extractor
  * [extractor/Stripchat] Fix extractor
  * [extractor/tnaflix] Fix extractor
  * [extractor/tvp] Support stream.tvp.pl
  * [extractor/twitter] Fix --no-playlist and add media
    view_count when using GraphQL
  * [extractor/twitter] Fix graphql extraction on some tweets
  * [extractor/vimeo] Fix playerConfig extraction
  * [extractor/viu] Add ViuOTTIndonesiaIE extractor
  * [extractor/vk] Fix playlists for new API
  * [extractor/vlive] Replace with VLiveWebArchiveIE
  * [extractor/ximalaya] Update album _VALID_URL
  * [extractor/zdf] Use android API endpoint for UHD downloads
  * [youtube] Improve description extraction
  * [youtube] Prevent excess HTTP 301
  * [bellmedia] Add support for cp24.com clip URLs		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2023-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213124">SUSE bug 1213124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216467">SUSE bug 1216467</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-35934/">CVE-2023-35934 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35934">CVE-2023-35934 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-46121/">CVE-2023-46121 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46121">CVE-2023-46121 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811246" comment="python311-yt-dlp-2023.11.14-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811247" comment="yt-dlp-2023.11.14-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811248" comment="yt-dlp-bash-completion-2023.11.14-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811249" comment="yt-dlp-fish-completion-2023.11.14-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811250" comment="yt-dlp-zsh-completion-2023.11.14-bp155.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3993" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-bad (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213126" ref_url="https://bugzilla.suse.com/1213126" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-37329" ref_url="https://www.suse.com/security/cve/CVE-2023-37329/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0379-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CSFFBYEDULWYXFDWGSSCUNFCWHMHPFMX/" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-bad fixes the following issues:

- CVE-2023-37329: Fixed GStreamer SRT File Parsing Heap-based Buffer Overflow (bsc#1213126).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-26"/>
	<updated date="2023-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213126">SUSE bug 1213126</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37329/">CVE-2023-37329 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37329">CVE-2023-37329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009813098" comment="gstreamer-plugins-bad-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813099" comment="gstreamer-plugins-bad-32bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813100" comment="gstreamer-plugins-bad-64bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813101" comment="gstreamer-plugins-bad-chromaprint-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813102" comment="gstreamer-plugins-bad-chromaprint-32bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813103" comment="gstreamer-plugins-bad-chromaprint-64bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813104" comment="gstreamer-plugins-bad-devel-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813105" comment="gstreamer-plugins-bad-fluidsynth-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813106" comment="gstreamer-plugins-bad-fluidsynth-32bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813107" comment="gstreamer-plugins-bad-fluidsynth-64bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813108" comment="gstreamer-plugins-bad-lang-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813109" comment="gstreamer-transcoder-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813110" comment="gstreamer-transcoder-devel-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813111" comment="libgstadaptivedemux-1_0-0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813112" comment="libgstadaptivedemux-1_0-0-32bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813113" comment="libgstadaptivedemux-1_0-0-64bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813114" comment="libgstbadaudio-1_0-0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813115" comment="libgstbadaudio-1_0-0-32bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813116" comment="libgstbadaudio-1_0-0-64bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813117" comment="libgstbasecamerabinsrc-1_0-0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813118" comment="libgstbasecamerabinsrc-1_0-0-32bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813119" comment="libgstbasecamerabinsrc-1_0-0-64bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813120" comment="libgstcodecparsers-1_0-0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813121" comment="libgstcodecparsers-1_0-0-32bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813122" comment="libgstcodecparsers-1_0-0-64bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813123" comment="libgstcodecs-1_0-0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813124" comment="libgstcodecs-1_0-0-32bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813125" comment="libgstcodecs-1_0-0-64bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813126" comment="libgstcuda-1_0-0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813127" comment="libgstcuda-1_0-0-32bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813128" comment="libgstcuda-1_0-0-64bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813129" comment="libgstinsertbin-1_0-0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813130" comment="libgstinsertbin-1_0-0-32bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813131" comment="libgstinsertbin-1_0-0-64bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813132" comment="libgstisoff-1_0-0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813133" comment="libgstisoff-1_0-0-32bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813134" comment="libgstisoff-1_0-0-64bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813135" comment="libgstmpegts-1_0-0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813136" comment="libgstmpegts-1_0-0-32bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813137" comment="libgstmpegts-1_0-0-64bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813138" comment="libgstphotography-1_0-0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813139" comment="libgstphotography-1_0-0-32bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813140" comment="libgstphotography-1_0-0-64bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813141" comment="libgstplay-1_0-0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813142" comment="libgstplay-1_0-0-32bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813143" comment="libgstplay-1_0-0-64bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813144" comment="libgstplayer-1_0-0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813145" comment="libgstplayer-1_0-0-32bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813146" comment="libgstplayer-1_0-0-64bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813147" comment="libgstsctp-1_0-0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813148" comment="libgstsctp-1_0-0-32bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813149" comment="libgstsctp-1_0-0-64bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813150" comment="libgsttranscoder-1_0-0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813151" comment="libgsturidownloader-1_0-0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813152" comment="libgsturidownloader-1_0-0-32bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813153" comment="libgsturidownloader-1_0-0-64bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813154" comment="libgstva-1_0-0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813155" comment="libgstva-1_0-0-32bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813156" comment="libgstva-1_0-0-64bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813157" comment="libgstvulkan-1_0-0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813158" comment="libgstvulkan-1_0-0-32bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813159" comment="libgstvulkan-1_0-0-64bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813160" comment="libgstwayland-1_0-0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813161" comment="libgstwayland-1_0-0-32bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813162" comment="libgstwayland-1_0-0-64bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813163" comment="libgstwebrtc-1_0-0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813164" comment="libgstwebrtc-1_0-0-32bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813165" comment="libgstwebrtc-1_0-0-64bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813166" comment="libgstwebrtcnice-1_0-0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813167" comment="libgstwebrtcnice-1_0-0-32bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813168" comment="libgstwebrtcnice-1_0-0-64bit-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813169" comment="typelib-1_0-CudaGst-1_0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813170" comment="typelib-1_0-GstBadAudio-1_0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813171" comment="typelib-1_0-GstCodecs-1_0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813172" comment="typelib-1_0-GstCuda-1_0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813173" comment="typelib-1_0-GstInsertBin-1_0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813174" comment="typelib-1_0-GstMpegts-1_0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813175" comment="typelib-1_0-GstPlay-1_0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813176" comment="typelib-1_0-GstPlayer-1_0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813177" comment="typelib-1_0-GstTranscoder-1_0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813178" comment="typelib-1_0-GstVa-1_0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813179" comment="typelib-1_0-GstVulkan-1_0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813180" comment="typelib-1_0-GstVulkanWayland-1_0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813181" comment="typelib-1_0-GstVulkanXCB-1_0-1.22.0-lp155.3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813182" comment="typelib-1_0-GstWebRTC-1_0-1.22.0-lp155.3.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3994" version="1" class="patch">
	<metadata>
		<title>Security update for optipng (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215937" ref_url="https://bugzilla.suse.com/1215937" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-43907" ref_url="https://www.suse.com/security/cve/CVE-2023-43907/" source="CVE"/>
		<description>
This update for optipng fixes the following issues:

optipng was updated to 0.7.8:

* Upgraded libpng to version 1.6.40.
* Upgraded zlib to version 1.3-optipng.
* Upgraded cexcept to version 2.0.2-optipng.

* Fixed a global-buffer-overflow vulnerability in the GIF reader (boo#1215937 CVE-2023-43907).
* Fixed a stack-print-after-scope defect in the error handler.
* Fixed an assertion failure in the image reduction module.
* Fixed the command-line wildargs expansion in the Windows port.
* Raised the minimum required libpng version from 1.2.9 to 1.6.35.
* Raised the minimum required zlib version from 1.2.1 to 1.2.8.
* Refactored the structured exception handling.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-29"/>
	<updated date="2023-11-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215937">SUSE bug 1215937</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-43907/">CVE-2023-43907 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43907">CVE-2023-43907 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813802" comment="optipng-0.7.8-bp155.5.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3995" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2023-5997" ref_url="https://www.suse.com/security/cve/CVE-2023-5997/" source="CVE"/>
		<reference ref_id="CVE-2023-6112" ref_url="https://www.suse.com/security/cve/CVE-2023-6112/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0386-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TS7DENNWXUXU3ROQQDHEYSOBWA6FR367/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

- Update to 105.0.4970.21
  * DNA-112425 Choosing Workspace Icons doesn’t work as expected
  * DNA-112787 glow around tiles in Top Sites section in BABE in
    dark theme
- The update to chromium 119.0.6045.159 fixes following issues:
  CVE-2023-5997, CVE-2023-6112

- Update to 105.0.4970.16
  * CHR-9416 Updating Chromium on desktop-stable-* branches
  * DNA-111903 [Lin] [Component-based-scrollbar] Old design is
    displayed on Ubuntu 20.04
  * DNA-112914 Visual glitch with HWA enabled in some random places
  * DNA-113137 [WinLin][Sidebar autohide] Sidebar panel is not
    connected with sidebar

- Update to 105.0.4970.13
  * CHR-9416 Updating Chromium on desktop-stable-* branches
  * DNA-111885 [Address bar] Hover effect on padlock icon is not
    rounded
  * DNA-112411 Active Tab in Tab Island in Dark Mode should have
    different colour
  * DNA-112431 Dragging tab quickly past last island on the right,
    causes tab to be dropped at the end of tab strip instead
    of at location of the cursor
  * DNA-112878 [Tab strip] Detached tab not restored after
    restarting browser
  * DNA-112900 Crash at opera::component_based::
    ComponentTabDragController::StopViewDragging
  * DNA-112996 Translations for O105
  * DNA-113213 Promote 105 to stable
- Complete Opera 105 changelog at:
  https://blogs.opera.com/desktop/changelog-for-105/

- Update to 104.0.4944.54
  * DNA-111938 Option 'Automatically hide sidebar' and Full screen
    makes Opera freeze
  * DNA-112241 Stuttering video on some systems with OOP
    SW H.264 decoding
  * DNA-112636 [Tab strip] Detach button on meeting tabs moves
    on hover and is replaced by close tab
  * DNA-112862 Crash at extensions::BookmarksPrivateAPI::
    OnListenerAdded(extensions::EventListenerInfo const&amp;)
  * DNA-112990 Crash when closing tab tooltip and opening
    Search tabs
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2023-11-30"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5997/">CVE-2023-5997 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5997">CVE-2023-5997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6112/">CVE-2023-6112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6112">CVE-2023-6112 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814077" comment="opera-105.0.4970.21-lp155.3.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3996" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217614" ref_url="https://bugzilla.suse.com/1217614" source="BUGZILLA"/>
		<reference ref_id="1217615" ref_url="https://bugzilla.suse.com/1217615" source="BUGZILLA"/>
		<reference ref_id="1217616" ref_url="https://bugzilla.suse.com/1217616" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-6345" ref_url="https://www.suse.com/security/cve/CVE-2023-6345/" source="CVE"/>
		<reference ref_id="CVE-2023-6346" ref_url="https://www.suse.com/security/cve/CVE-2023-6346/" source="CVE"/>
		<reference ref_id="CVE-2023-6347" ref_url="https://www.suse.com/security/cve/CVE-2023-6347/" source="CVE"/>
		<reference ref_id="CVE-2023-6348" ref_url="https://www.suse.com/security/cve/CVE-2023-6348/" source="CVE"/>
		<reference ref_id="CVE-2023-6350" ref_url="https://www.suse.com/security/cve/CVE-2023-6350/" source="CVE"/>
		<reference ref_id="CVE-2023-6351" ref_url="https://www.suse.com/security/cve/CVE-2023-6351/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0387-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNQU7JCLG7KXCWPX566ZOCJ7WKAX3OEI/" source="SUSE-SU"/>
		<description>

This update for Chromium fixes the following issue:

Chromium 119.0.6045.199 (boo#1217616)

* CVE-2023-6348: Type Confusion in Spellcheck
* CVE-2023-6347: Use after free in Mojo
* CVE-2023-6346: Use after free in WebAudio
* CVE-2023-6350: Out of bounds memory access in libavif (boo#1217614)
* CVE-2023-6351: Use after free in libavif (boo#1217615)
* CVE-2023-6345: Integer overflow in Skia
* Various fixes from internal audits, fuzzing and other initiatives.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2023-11-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217614">SUSE bug 1217614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217615">SUSE bug 1217615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217616">SUSE bug 1217616</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6345/">CVE-2023-6345 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6345">CVE-2023-6345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6346/">CVE-2023-6346 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6346">CVE-2023-6346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6347/">CVE-2023-6347 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6347">CVE-2023-6347 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6348/">CVE-2023-6348 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6348">CVE-2023-6348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6350/">CVE-2023-6350 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6350">CVE-2023-6350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6351/">CVE-2023-6351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6351">CVE-2023-6351 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009813982" comment="chromedriver-119.0.6045.199-bp155.2.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813983" comment="chromium-119.0.6045.199-bp155.2.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3997" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django1 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215978" ref_url="https://bugzilla.suse.com/1215978" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-43665" ref_url="https://www.suse.com/security/cve/CVE-2023-43665/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0390-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QWDJJLD7DQ27YGW6AITNG2E7XQXYCUY7/" source="SUSE-SU"/>
		<description>
This update for python-Django1 fixes the following issues:

- CVE-2023-43665: Fixed Denial-of-service vulnerability in django.utils.text.Truncator (boo#1215978).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-04"/>
	<updated date="2023-12-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215978">SUSE bug 1215978</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-43665/">CVE-2023-43665 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43665">CVE-2023-43665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814744" comment="python3-Django1-1.11.29-bp155.4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3998" version="1" class="patch">
	<metadata>
		<title>Security update for libtorrent-rasterbar, qbittorrent (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217677" ref_url="https://bugzilla.suse.com/1217677" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-30801" ref_url="https://www.suse.com/security/cve/CVE-2023-30801/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C23UTVCBL5APTKIVTETTSF3J62IAN2BP/" source="SUSE-SU"/>
		<description>
This update for libtorrent-rasterbar, qbittorrent fixes the following issues:

Changes in libtorrent-rasterbar:

- Update to version 2.0.9

  * fix issue with web seed connections when they close and
    re-open
  * fallocate() not supported is not a fatal error
  * fix proxying of IPv6 connections via IPv4 proxy
  * treat CGNAT address range as local IPs
  * add stricter checking of piece layers when loading torrents
  * add stricter checking of v1 and v2 hashes being consistent
  * cache failed DNS lookups as well as successful ones
  * add an i2p torrent state to control interactions with clear
    swarms
  * fix i2p SAM protocol parsing of quoted messages
  * expose i2p peer destination in peer_info
  * fix i2p tracker announces
  * fix issue with read_piece() stopping torrent on pieces not
    yet downloaded
  * improve handling of allow_i2p_mixed setting to work for
    magnet links
  * fix web seed request for renamed single-file torrents
  * fix issue where web seeds could disappear from resume data
  * extend save_resume with additional conditional flags
  * fix issue with retrying trackers in tiers &gt; 0
  * fix last_upload and last_download resume data fields to use
    posix time
  * improve error messages for no_connect_privileged_ports, by
    untangle it from the port filter
  * fix I2P issue introduced in 2.0.0
  * add async tracker status query, post_trackers()
  * add async torrent status query, post_status()
  * support loading version 2 of resume data format
  * fix issue with odd piece sizes
  * add async piece availability query, post_piece_availability()
  * add async download queue query, post_download_queue()
  * add async file_progress query, post_file_progress()
  * add async peer_info query, post_peer_info()

- Update to version 2.0.8

  * fix uTP streams timing out instead of closing cleanly
  * add write_torrent_file_buf() overload for generating
    .torrent files
  * add create_torrent::generate_buf() function to generate into
    a buffer
  * fix copy_file when the file ends with a sparse region
  * uTP performance, fix packet loss when sending is stalled
  * fix trackers being stuck after session pause/resume
  * fix bug in hash_picker with empty files
  * uTP performance, prevent premature timeouts/resends
  * add option to not memory map files below a certain size
  * settings_pack now returns default values when queried for
    missing settings
  * fix copy_file fall-back when SEEK_HOL/SEEK_DATA is not
    supported
  * improve error reporting from file copy and move
  * tweak pad file placement to match reference implementation
    (tail-padding)
  * uTP performance, more lenient nagle's algorithm to always
    allow one outstanding undersized packet
  * uTP performance, piggy-back held back undersized packet with
    ACKs
  * uTP performance, don't send redundant deferred ACKs
  * support incoming SOCKS5 packets with hostnames as source
    address, for UDP trackers
  * ignore duplicate network interface change notifications on
    linux
  * fix total_want/want accounting when forcing a recheck
  * fix merging metadata with magnet links added on top of
    existing torrents
  * add torrent_flag to default all file priorities to
    dont_download
  * fix &amp;so= feature in magnet links
  * improve compatibility of SOCKS5 UDP ASSOCIATE
  * fix madvise range for flushing cache in mmap_storage
  * open files with no_cache set in O_SYNC mode

- Update to version 2.0.7

  * fix issue in use of copy_file_range()
  * avoid open-file race in the file_view_pool
  * fix issue where stop-when-ready would not close files
  * fix issue with duplicate hybrid torrent via separate v1 and
    v2 magnet links
  * added new function to load torrent files, load_torrent_*()
  * support sync_file_range()
  * fix issue in write_torrent_file() when file size is exactly
    piece size
  * fix file_num_blocks() and file_num_pieces() for empty files
  * add new overload to make_magnet_uri()
  * add missing protocol version to tracker_reply_alert and
    tracker_error_alert
  * fix privilege issue with SetFileValidData()
  * add asynchronous overload of torrent_handle::add_piece()
  * default to a single hashing thread, for full checks
  * Fix bug when checking files and the first piece is invalid

Changes in qbittorrent, qbittorrent:

- Update to version 4.6.2

  Bug fixes:

  * Do not apply share limit if the previous one was applied
  * Show Add new torrent dialog on main window screen

  Web UI:

  * Fix JS memory leak
  * Disable stdout buffering for qbt-nox

  Wayland:

  * Fix parent widget of 'Lock qBittorrent' submenu

- Also fixes boo#1217677 (CVE-2023-30801, upstream reference
  gh#qbittorrent/qBittorrent#19738)

- Update to version 4.6.1

  New features:

  * Add option to enable previous Add new torrent dialog behavior

  Fixed bugs:

  * Prevent crash due to race condition when adding magnet link
  * Fix Enter key behavior when add new torrent
  * Add missing main window icon
  * Update size of selected files when selection is changed
  * Correctly handle changing save path of torrent w/o metadata
  * Use appropriate icon for 'moving' torrents in transfer list

  Web UI:

  * Drop WebUI default credentials
  * Add I2P settings to WebUI
  * Fix duplicate scrollbar on Transfer List
  * Fix incorrect subcategory sorting
  * Correctly set save path in RSS rules
  * Allow to request torrents count via WebAPI
  * Improve performance of getting torrent numbers via WebAPI
  * Improve free disk space checking for WebAPI

  Misc:

  * Fix invisible tray icon with Qt5 in Linux


- Update to version 4.6.0

  New features:

  * Add (experimental) I2P support
  * Provide UI editor for the default theme
  * Various UI theming improvements
  * Implement torrent tags editing dialog
  * Revamp 'Watched folder options' and 'Automated RSS
    downloader' dialog
  * Allow to use another icons in dark mode
  * Allow to add new torrents to queue top
  * Allow to filter torrent list by save path
  * Expose 'socket send/receive buffer size' options
  * Expose 'max torrent file size' setting
  * Expose 'bdecode limits' settings
  * Add options to adjust behavior of merging trackers to
    existing torrent
  * Add option to stop seeding when torrent has been inactive
  * Allow to use proxy per subsystem
  * Expand the scope of 'Proxy hostname lookup' option
  * Add shortcut for 'Ban peer permanently' function
  * Add option to auto hide zero status filters
  * Allow to disable confirmation of Pause/Resume All
  * Add alternative shortcut CTRL+E for CTRL+F
  * Show filtered port numbers in logs
  * Add button to copy library versions to clipboard

  Bug fixes:

  * Ensure ongoing storage moving job will be completed when
    shutting down
  * Refactored many areas to call non UI blocking code
  * Various improvements to the SQLite backend
  * Improve startup window state handling
  * Use tray icon from system theme only if option is set
  * Inhibit system sleep while torrents are moving
  * Use hostname instead of domain name in tracker filter list
  * Visually validate input path in torrent creator dialog
  * Disable symlink resolving in Torrent creator
  * Change default value for `file pool size` and `stop tracker
    timeout` settings
  * Log when duplicate torrents are being added
  * Inhibit suspend instead of screen idle
  * Ensure file name is valid when exporting torrents
  * Open 'Save path' if torrent has no metadata
  * Prevent torrent starting unexpectedly edge case with magnet
  * Better ergonomics of the 'Add new torrent' dialog

  WebUI:

  * Add log viewer
  * WebAPI: Allow to specify session cookie name
  * Improve sync API performance
  * Add filelog settings
  * Add multi-file renaming
  * Add 'Add to top of queue' option
  * Implement subcategories
  * Set 'SameSite=None' if CSRF Protection is disabled
  * Show only hosts in tracker filter list
  * Set Connection status and Speed limits tooltips
  * set Cross Origin Opener Policy to `same-origin`
  * Fix response for HTTP HEAD method
  * Preserve the network interfaces when connection is down
  * Add 'Add Tags' field for RSS rules
  * Fix missing error icon

  RSS:

  * Add 'Rename rule' button to RSS Downloader
  * Allow to edit RSS feed URL
  * Allow to assign priority to RSS download rule

  Search:

  * Use python isolate mode
  * Bump python version minimum requirement to 3.7.0

  Other:

  * Numerous code improvements and refactorings

- Update to version 4.5.5

  Bug fixes:

  * Fix transfer list tab hotkey
  * Don't forget to enable the Apply button in the Options dialog
  * Immediately update torrent status on moving files
  * Improve performance when scrolling the file list of large
    torrents
  * Don't operate on random torrents when multiple are selected
    and a sort/filter is applied

  RSS:

  * Fix overwriting feeds.json with an incomplete load of it

- Update to version 4.5.4

  Bug fixes:

  * Allow to disable confirmation of Pause/Resume All
  * Sync flag icons with upstream

  Web UI:

  * Fix category save path

- Update to version 4.5.3

  Bug fixes:

  * Correctly check if database needs to be updated
  * Prevent incorrect log message about torrent content deletion
  * Improve finished torrent handling
  * Correctly initialize group box children as disabled in
    Preferences
  * Don't miss saving 'download path' in SQLite storage
  * Improve logging of running external program

  Web UI:

  * Disable UPnP for web UI by default
  * Use workaround for IOS file picker
  * Work around Chrome download limit
  * Improve 'exporting torrent' behavior

- Update to version 4.5.2

  Bug fixes:

  * Don't unexpectedly activate queued torrents when prefetching
    metadata for added magnets
  * Update the cached torrent state once recheck is started
  * Be more likely to allow the system to use power saving modes

  Web UI:

  * Migrate away from unsafe function
  * Blacklist bad ciphers for TLS in the server
  * Allow only TLS 1.2+ in the server
  * Allow to set read-only directory as torrent location
  * Reject requests that contain backslash in path

  RSS:

  * Prevent RSS folder from being moved into itself

- Update to version 4.5.1

  New features:

  * Re-allow to use icons from system theme 

  Bug fixes:

  * Fix Speed limit icon size 
  * Revise and fix some text colors 
  * Correctly load folder based UI theme 
  * Fix crash due to invalid encoding of tracker URLs 
  * Don't drop !qB extension when renaming incomplete file 
  * Correctly count the number of torrents in subcategories 
  * Use 'additional trackers' when metadata retrieving 
  * Apply correct tab order to Category options dialog 
  * Add all torrents passed via the command line 
  * Fix startup performance on Qt5 
  * Automatic move will now overwrite existing files 
  * Some fixes for loading Chinese locales 
  * New Pause icon color for toolbar/menu 
  * Adjust env variable for PDB discovery 

  Web UI:

  * Fix missing 'queued' icon 
  * Return paths using platform-independent separator format 
  * Change order of accepted types of file input 
  * Add missing icons 
  * Add 'Resume data storage type' option 
  * Make rename file dialog resizable 
  * Prevent incorrect line breaking 
  * Improve hotkeys 
  * Remove suggestions while searching for torrents 
  * Expose 'IS PRIVATE' flag 
  * Return name/hash/infohash_v1/infohash_v2 torrent properties 

  Other:

  * Fix tray icon issues 

- Update to version 4.5.0

  New features:

  * Add `Auto resize columns` functionality
  * Allow to use Category paths in `Manual` mode
  * Allow to disable Automatic mode when default 'temp' path
    changed
  * Add tuning options related to performance warnings
  * Add right click menu for status filters
  * Allow setting the number of maximum active checking torrents
  * Add option to toggle filters sidebar
  * Allow to set `working set limit` on non-Windows OS
  * Add `Export .torrent` action
  * Add keyboard navigation keys
  * Allow to use POSIX-compliant disk IO type
  * Add `Filter files` field in new torrent dialog
  * Implement new icon/color theme
  * Add file name filter/blacklist
  * Add support for custom SMTP ports
  * Split the OS cache settings into Disk IO read/write modes
  * When duplicate torrent is added set metadata to existing one
  * Greatly improve startup time with many torrents
  * Add keyboard shortcut to Download URL dialog
  * Add ability to run external program on torrent added
  * Add infohash and download path columns
  * Allow to set torrent stop condition
  * Add a `Moving` status filter
  * Change color palettes for both dark, light themes
  * Add a `Use proxy for hostname lookup` option
  * Introduce a `change listen port` cmd option
  * Implement `Peer ID Client` column for `Peers` tab
  * Add port forwarding option for embedded tracker

  Bug fixes:

  * Store hybrid torrents using `torrent ID` as basename
  * Enable Combobox editor for the `Mixed` file download priority
  * Allow shortcut folders for the Open and Save directory
    dialogs
  * Rename content tab `Size` column to `Total Size`
  * Fix scrolling to the lowermost visible torrent
  * Allow changing file priorities for finished torrents
  * Focus save path when Manual mode is selected initially
  * Disable force reannounce when it is not possible
  * Add horizontal scrolling for tracker list and torrent content
  * Enlarge 'speed limits' icons
  * Change Downloaded to Times Downloaded in trackers tab
  * Remove artificial max limits from `Torrent Queueing` related
    options
  * Preserve `skip hash check` when there is no metadata
  * Fix DHT/PeX/LSD status when it is globally disabled
  * Fix rate calculation when interval is too low
  * Add tooltip message when system tray icon isn't available
  * Improve sender field in mail notifications
  * Fix 'Add torrent dialog' spill-over on smaller screens
  * Fix peer count issue when tracker responds with zero figure
  * Don't merge trackers by default
  * Don't inhibit system sleep/auto shutdown for torrents stuck
    at downloading metadata
  * Allow to pause a checking torrent from context menu
  * Allow to use subnet notation in reverse proxy list
  * Fine tune translations loading for Chinese locales
  * Fix torrent content checkboxes not updated properly
  * Correctly load state of `Use another path for incomplete
    torrents` in Watched folders
  * Add confirmation to resume/pause all
  * Fix wrong count of errored trackers

  WebUI:

  * Allow blank lines in multipart form-data input
  * Make various dialogs resizable
  * Fix wrong v2 hash string displayed
  * WebAPI: return correct status
  * Fix empty selection in language combobox
  * Store WebUI port setting in human readable number
  * Add support for exporting .torrent
  * WebAPI: Add endpoint to set speed limit mode
  * Improve progress bar rendering
  * Add transfer list refresh interval settings
  * Use natural sort
  * Apply i18n translation only to built-in WebUI
  * Alert when HTTPS settings are incomplete
  * Handle drag and drop events
  * Fix wrong behavior for shutdown action
  * Don't disable combobox for file priority

  RSS:

  * Increase limit of maximum number of articles per feed

  Other:

  * Mark as single window app in .desktop file
  * Add Dockerfile
  * Remove option of using icons from system theme

- Update to version 4.4.5

  Bug fixes:

  * Fix missing trackers when adding magnet link. Affects
    libtorrent 2.0.x builds.

- Update to version 4.4.4.

  * Improve D-Bus notifications handling

  Bug fixes:

  * Correctly handle data decompression with Qt 6.3
  * Fix wrong file names displayed in tooltip
  * Fix incorrect 'max outgoing port' setting
  * Make working set limit available only on libtorrent 2.0.x
    builds
  * Try to recover missing tags

  RSS:

  * Clear RSS parsing error after use

  Web API:

  * Set HTTP method restriction on WebAPI actions

- Update to version 4.4.3.1

  Bug fixes:

  * Fix broken translations

- Update to version 4.4.3

  Bug fixes:

  * Correctly handle changing of temp save path
  * Fix storage in SQLite
  * Correctly apply content layout when 'Skip hash check' is
    enabled
  * Don't corrupt IDs of v2 torrents
  * Reduce the number of hashing threads by default (improves
    hashing speed on HDDs)
  * Prevent the 'update dialog' from blocking input on other
    windows
  * Add trackers in exported .torrent files
  * Fix wrong GUI behavior in 'Optional IP address to bind to'
    setting

  Web UI:

  * Fix WebUI crash due to missing tags from config
  * Show correct location path

		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2023-12-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1217677">SUSE bug 1217677</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-30801/">CVE-2023-30801 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30801">CVE-2023-30801 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009815372" comment="libtorrent-rasterbar-devel-2.0.9-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815373" comment="libtorrent-rasterbar-doc-2.0.9-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815374" comment="libtorrent-rasterbar2_0-2.0.9-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815375" comment="python3-libtorrent-rasterbar-2.0.9-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815376" comment="qbittorrent-4.6.2-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815377" comment="qbittorrent-nox-4.6.2-bp155.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:3999" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2023-6345" ref_url="https://www.suse.com/security/cve/CVE-2023-6345/" source="CVE"/>
		<reference ref_id="CVE-2023-6346" ref_url="https://www.suse.com/security/cve/CVE-2023-6346/" source="CVE"/>
		<reference ref_id="CVE-2023-6347" ref_url="https://www.suse.com/security/cve/CVE-2023-6347/" source="CVE"/>
		<reference ref_id="CVE-2023-6348" ref_url="https://www.suse.com/security/cve/CVE-2023-6348/" source="CVE"/>
		<reference ref_id="CVE-2023-6350" ref_url="https://www.suse.com/security/cve/CVE-2023-6350/" source="CVE"/>
		<reference ref_id="CVE-2023-6351" ref_url="https://www.suse.com/security/cve/CVE-2023-6351/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5KYG44T7BT4X7NZ6LSLZ3V2IJ27BBBPS/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

- Update to 105.0.4970.34
  * DNA-112796 [Import] Import bookmarks and history don't work
  * DNA-113147 Add strength setting for Lucid Mode
  * DNA-113148 Update 'Lucid Mode' button on videos to enable / disable split preview
  * DNA-113287 Add strength setting for Lucid Mode in Easy Setup
  * DNA-113310 Remove Lucid Mode for Images
  * DNA-113360 [Lucid Mode] Shadow around lucid mode button
  * DNA-113447 Split preview line should be white
  * DNA-113630 Lucid Mode strength should default to highest (in desktop)
- Changes in 105.0.4970.29 
  * CHR-9416 Updating Chromium on desktop-stable-* branches
  * DNA-113292 Extension icons not shown after restart
- The update to chromium 119.0.6045.199 fixes following issues:
  CVE-2023-6348, CVE-2023-6347, CVE-2023-6346, CVE-2023-6350, 
  CVE-2023-6351, CVE-2023-6345
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-11"/>
	<updated date="2023-12-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6345/">CVE-2023-6345 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6345">CVE-2023-6345 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6346/">CVE-2023-6346 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6346">CVE-2023-6346 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6347/">CVE-2023-6347 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6347">CVE-2023-6347 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6348/">CVE-2023-6348 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6348">CVE-2023-6348 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6350/">CVE-2023-6350 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6350">CVE-2023-6350 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6351/">CVE-2023-6351 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6351">CVE-2023-6351 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815777" comment="opera-105.0.4970.34-lp155.3.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4000" version="1" class="patch">
	<metadata>
		<title>Security update for fish (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217808" ref_url="https://bugzilla.suse.com/1217808" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-49284" ref_url="https://www.suse.com/security/cve/CVE-2023-49284/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0405-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S6BKN7QOVK7LIAFEI3YVTBXDS7YGI6B3/" source="SUSE-SU"/>
		<description>
This update for fish fixes the following issues:

- CVE-2023-49284: Fixed shell expansion triggered by command substitution output (boo#1217808).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-16"/>
	<updated date="2023-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1217808">SUSE bug 1217808</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-49284/">CVE-2023-49284 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49284">CVE-2023-49284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816822" comment="fish-3.3.1-bp155.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816823" comment="fish-devel-3.3.1-bp155.4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4001" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-bad (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215793" ref_url="https://bugzilla.suse.com/1215793" source="BUGZILLA"/>
		<reference ref_id="1215796" ref_url="https://bugzilla.suse.com/1215796" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40474" ref_url="https://www.suse.com/security/cve/CVE-2023-40474/" source="CVE"/>
		<reference ref_id="CVE-2023-40476" ref_url="https://www.suse.com/security/cve/CVE-2023-40476/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0409-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NYQ73JMQYKYFAPDQHXO3OANFFF6OOUL6/" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-bad fixes the following issues:

- CVE-2023-40474: Fixed integer overflow causing out of bounds writes when handling invalid uncompressed video (bsc#1215796).
- CVE-2023-40476: Fixed possible overflow using max_sub_layers_minus1 (bsc#1215793).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-19"/>
	<updated date="2023-12-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215793">SUSE bug 1215793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215796">SUSE bug 1215796</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40474/">CVE-2023-40474 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40474">CVE-2023-40474 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-40476/">CVE-2023-40476 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40476">CVE-2023-40476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009817198" comment="gstreamer-plugins-bad-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817199" comment="gstreamer-plugins-bad-32bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817200" comment="gstreamer-plugins-bad-64bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817201" comment="gstreamer-plugins-bad-chromaprint-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817202" comment="gstreamer-plugins-bad-chromaprint-32bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817203" comment="gstreamer-plugins-bad-chromaprint-64bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817204" comment="gstreamer-plugins-bad-devel-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817205" comment="gstreamer-plugins-bad-fluidsynth-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817206" comment="gstreamer-plugins-bad-fluidsynth-32bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817207" comment="gstreamer-plugins-bad-fluidsynth-64bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817208" comment="gstreamer-plugins-bad-lang-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817209" comment="gstreamer-transcoder-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817210" comment="gstreamer-transcoder-devel-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817211" comment="libgstadaptivedemux-1_0-0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817212" comment="libgstadaptivedemux-1_0-0-32bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817213" comment="libgstadaptivedemux-1_0-0-64bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817214" comment="libgstbadaudio-1_0-0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817215" comment="libgstbadaudio-1_0-0-32bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817216" comment="libgstbadaudio-1_0-0-64bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817217" comment="libgstbasecamerabinsrc-1_0-0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817218" comment="libgstbasecamerabinsrc-1_0-0-32bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817219" comment="libgstbasecamerabinsrc-1_0-0-64bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817220" comment="libgstcodecparsers-1_0-0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817221" comment="libgstcodecparsers-1_0-0-32bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817222" comment="libgstcodecparsers-1_0-0-64bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817223" comment="libgstcodecs-1_0-0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817224" comment="libgstcodecs-1_0-0-32bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817225" comment="libgstcodecs-1_0-0-64bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817226" comment="libgstcuda-1_0-0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817227" comment="libgstcuda-1_0-0-32bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817228" comment="libgstcuda-1_0-0-64bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817229" comment="libgstinsertbin-1_0-0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817230" comment="libgstinsertbin-1_0-0-32bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817231" comment="libgstinsertbin-1_0-0-64bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817232" comment="libgstisoff-1_0-0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817233" comment="libgstisoff-1_0-0-32bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817234" comment="libgstisoff-1_0-0-64bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817235" comment="libgstmpegts-1_0-0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817236" comment="libgstmpegts-1_0-0-32bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817237" comment="libgstmpegts-1_0-0-64bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817238" comment="libgstphotography-1_0-0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817239" comment="libgstphotography-1_0-0-32bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817240" comment="libgstphotography-1_0-0-64bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817241" comment="libgstplay-1_0-0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817242" comment="libgstplay-1_0-0-32bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817243" comment="libgstplay-1_0-0-64bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817244" comment="libgstplayer-1_0-0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817245" comment="libgstplayer-1_0-0-32bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817246" comment="libgstplayer-1_0-0-64bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817247" comment="libgstsctp-1_0-0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817248" comment="libgstsctp-1_0-0-32bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817249" comment="libgstsctp-1_0-0-64bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817250" comment="libgsttranscoder-1_0-0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817251" comment="libgsturidownloader-1_0-0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817252" comment="libgsturidownloader-1_0-0-32bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817253" comment="libgsturidownloader-1_0-0-64bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817254" comment="libgstva-1_0-0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817255" comment="libgstva-1_0-0-32bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817256" comment="libgstva-1_0-0-64bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817257" comment="libgstvulkan-1_0-0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817258" comment="libgstvulkan-1_0-0-32bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817259" comment="libgstvulkan-1_0-0-64bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817260" comment="libgstwayland-1_0-0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817261" comment="libgstwayland-1_0-0-32bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817262" comment="libgstwayland-1_0-0-64bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817263" comment="libgstwebrtc-1_0-0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817264" comment="libgstwebrtc-1_0-0-32bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817265" comment="libgstwebrtc-1_0-0-64bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817266" comment="libgstwebrtcnice-1_0-0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817267" comment="libgstwebrtcnice-1_0-0-32bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817268" comment="libgstwebrtcnice-1_0-0-64bit-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817269" comment="typelib-1_0-CudaGst-1_0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817270" comment="typelib-1_0-GstBadAudio-1_0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817271" comment="typelib-1_0-GstCodecs-1_0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817272" comment="typelib-1_0-GstCuda-1_0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817273" comment="typelib-1_0-GstInsertBin-1_0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817274" comment="typelib-1_0-GstMpegts-1_0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817275" comment="typelib-1_0-GstPlay-1_0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817276" comment="typelib-1_0-GstPlayer-1_0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817277" comment="typelib-1_0-GstTranscoder-1_0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817278" comment="typelib-1_0-GstVa-1_0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817279" comment="typelib-1_0-GstVulkan-1_0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817280" comment="typelib-1_0-GstVulkanWayland-1_0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817281" comment="typelib-1_0-GstVulkanXCB-1_0-1.22.0-lp155.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817282" comment="typelib-1_0-GstWebRTC-1_0-1.22.0-lp155.3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4002" version="1" class="patch">
	<metadata>
		<title>Security update for putty (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218128" ref_url="https://bugzilla.suse.com/1218128" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0411-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S7UNBVBZXNPUVRYGXMQJVWO63X7TAJUV/" source="SUSE-SU"/>
		<description>

This update for putty fixes the following issues:

putty is updated to release 0.80

  * Fix CVE-2023-48795 [boo#1218128]

- Update to release 0.79

  * Terminal mouse tracking: support for mouse movements which are
    not drags, and support for horizontal scroll events (e.g.
    generated by trackpads).
  * Fixed: PuTTY could fail an assertion if a resize control
    sequence was sent by the server while the window was docked to
    one half of the screen in KDE.
  * Fixed: PuTTY could fail an assertion if you tried to change the
    font size while the window was maximised.		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-20"/>
	<updated date="2023-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218128">SUSE bug 1218128</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817683" comment="putty-0.80-bp155.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4003" version="1" class="patch">
	<metadata>
		<title>Security update for cppcheck (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215233" ref_url="https://bugzilla.suse.com/1215233" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39070" ref_url="https://www.suse.com/security/cve/CVE-2023-39070/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0413-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JPXYQJRDWA7KRE6MM4XEMXQLBO4V7XED/" source="SUSE-SU"/>
		<description>
This update for cppcheck fixes the following issues:

- CVE-2023-39070: Fixed heap use-after-free in removeContradiction() (boo#1215233)

- update to 2.12.1:

  * Support importing projects with project-name

- update to 2.12.0:

  * uselessOverride finds overriding functions that either
    duplicate code from or delegate back to the base class
    implementation
  * knownPointerToBool finds pointer to bool conversions that are
    always true or false
  * truncLongCastAssignment and truncLongCastReturn check
    additional types, including float/double/long double
  * duplInheritedMember also reports duplicated member functions
  * constParameter*/constVariable* checks find more instances of
    pointers/references that can be const, e.g. when calling
    library functions
  * Write how many checkers was activated after a run
  * Added --checkers-report that can be used to generate a report
    in a file that shows what checkers was activated and disabled
  * The qmake build system has been deprecated and will be
    removed in a future version.
  * Command-line option '--template

- update to 2.11:

  * pop_back on empty container is UB
  * Improve useStlAlgorithm check to handle many more conditions
    in the loop for any_of, all_of and none_of algorithms
  * ValueFlow can evaluate the return value of functions even
    when conditionals are used
  * ValueFlow will now forward the container sizes being returned
    from a function
  * ValueFlow can infer possible values from possible symbolic
    values
  * Improve valueflow after pushing to container
  * The new option --check-level= has been added that controls
    how much checking is made by Cppcheck. The default checking
    level is 'normal'. If you feel that you can wait longer on
    results you can use --check-level=exhaustive.
  * It is no longer necessary to run '--check-config' to get
    detailed 'missingInclude' and 'missingIncludeSystem'
    messages. They will always be issued in the regular analysis
    if 'missingInclude' is enabled.
  * 'missingInclude' and 'missingIncludeSystem' are reported with
    '-j' is &gt; 1 and processes are used in the backend (default in
    non-Windows binaries)
  * 'missingInclude' and 'missingIncludeSystem' will now cause
    the '--error-exitcode' to be applied
  * '--enable=information' will no longer implicitly enable
    'missingInclude' starting with 2.16. Please enable it
    explicitly if you require it.
  * The `constParameter` and `constVariable` checks have been
    split into 3 different IDs based on if the variable is a
    pointer, a reference, or local. The different IDs will allow
    users to suppress different const warning based on variable
    type.
  * `constParameter`
  * `constParameterReference`
  * `constParameterPointer`
  * `constVariable`
  * `constVariableReference`
  * `constVariablePointer`
  * More command-line parameters will now check if the given
    integer argument is actually valid. Several other internal
    string-to-integer conversions will now be error checked.
  * scanning projects (with -j1) will now defer the analysis of
    markup files until the whole code was processed

- update to 2.10.3:

  * SymbolDatabase: Fix handling of function pointer arguments

- update to 2.10.2:

  * GUI: Set proper title for compliance report dialog
  * GUI: Generate compliance report
  * Tokenizer: tweaked simplification of function pointers

  * fix whole program analysis
  * Import Project: Fix problem with define value with space
  * Fix execution of executable addons from GUI
  * fix for windows installer, no other changes
  * Fixes when importing AST from clang
  * comments can be added at end of suppression in suppressions file
    is similar to GCC. If you want to get warnings in the old
  * Added Cppcheck annotations cppcheck_low(VALUE) and
  * Added API01-C: Avoid laying out strings in memory directly
  * Duplicate expression for condition and assignment: if (x==3) x=3;
  * Patch was submitted (https://github.com/danmar/cppcheck/pull/1554)
    and accepted so this change should be reverted and replaced with a CMake compile definition
    - Multifile checking for buffer overruns and uninitialized
    - A bunch of additions to several Libraries, especially
  * Additionally, lots of false positives and bugs have been fixed
    and several existing checks have been improved.
    - Library files have now a 'format' attribute. Format version
    - Cppcheck does no longer abort checking if unhandled
    - Detect shift by too many bits, signed integer overflow and
    - Dead pointer usage when pointer alias local variable that
    - Improved AST creation (support placement new, C++-style
    - Support GCC extension __attriute__((used)) and MSVC
    - Better support for static member variables, inherited
    - Improved typedef support where multiple variables are
    - Avoid checking code multiple times by calculating a checksum.
    - HTML report: display 'verbose' message using clickable

  * Additionally, lots of false positives and bugs have been fixed

    - Returning references to literals or references to calculation
    - Enhanced support for commutative operators in duplicate
    - Definition of minsize for buffer arguments in .cfg files
    - Fixed handling of #error: Do not report them if -f and -D
    - Generate xml dump of AST/ValueFlow/SymbolDatabase/TokenList
    - Cppcheck requires a C++11 compiler supporting the common
      subset of features supported by GCC 4.4, Visual Studio 2010
    - Much improved support of complex combinations of function
    - More robust error detection in several checks due to usage
    - Allocation/Deallocation functions can be extend across
    - Better handling of some C++11 language features like enum
    - Check for unhandled exceptions when exception specifiers

  * Additionally, a large number of false positives and crashs
    has been fixed.

   - New option to enable warnings but not style messages:
   - Cppcheck used to skip includes where the header filename
     is enclosed in &lt;&gt;. You can now include these headers also by
     using -I.
   - New POSIX checks: pipe() buffer size, redundant calls of
     set/get user id, too big value passed to usleep(), buffer
   - Storing getc() return value in char variable and comparing
   - Portability check that warns when using NULL as argument to
     variadic function. It has undefined behaviour on some
   - Improved checking for uninitialized struct members,
  - Added --include to the cppcheck command line client. This forces
    inclusion of the given file. This can for instance be used
  - The threads handling has been improved. Using -jN now works in
  - NULL pointers: Improved checking of default function
    argument values.

- full change log
  http://raw.github.com/danmar/cppcheck/master/Changelog		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-24"/>
	<updated date="2023-12-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215233">SUSE bug 1215233</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-39070/">CVE-2023-39070 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39070">CVE-2023-39070 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009818010" comment="cppcheck-2.12.1-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818011" comment="cppcheck-gui-2.12.1-bp155.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4004" version="1" class="patch">
	<metadata>
		<title>Security update for zabbix (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218199" ref_url="https://bugzilla.suse.com/1218199" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32727" ref_url="https://www.suse.com/security/cve/CVE-2023-32727/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0418-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2JA2U5HZXB4P57NCP4OYCXTIJXPC56ZT/" source="SUSE-SU"/>
		<description>
This update for zabbix fixes the following issues:

Updated to latest release 4.0.50:

- CVE-2023-32727: Fixed potential arbitrary code execution in icmpping (boo#1218199)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-27"/>
	<updated date="2023-12-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218199">SUSE bug 1218199</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32727/">CVE-2023-32727 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32727">CVE-2023-32727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009818241" comment="zabbix-agent-4.0.50-bp155.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818242" comment="zabbix-java-gateway-4.0.50-bp155.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818243" comment="zabbix-phpfrontend-4.0.50-bp155.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818244" comment="zabbix-proxy-4.0.50-bp155.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818245" comment="zabbix-proxy-mysql-4.0.50-bp155.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818246" comment="zabbix-proxy-postgresql-4.0.50-bp155.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818247" comment="zabbix-proxy-sqlite-4.0.50-bp155.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818248" comment="zabbix-server-4.0.50-bp155.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818249" comment="zabbix-server-mysql-4.0.50-bp155.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818250" comment="zabbix-server-postgresql-4.0.50-bp155.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4005" version="1" class="patch">
	<metadata>
		<title>Security update for proftpd (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0421-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNYVAEZZNHEKG5C7JHU5U3MPN73U4OKG/" source="SUSE-SU"/>
		<description>
This update for proftpd fixes the following issues:

Update to version 1.3.8a

* Implemented mitigations for 'Terrapin' SSH attack (CVE-2023-48795).
* http://proftpd.org/docs/NEWS-1.3.8b
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-30"/>
	<updated date="2023-12-30"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009818362" comment="proftpd-1.3.8b-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818363" comment="proftpd-devel-1.3.8b-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818364" comment="proftpd-doc-1.3.8b-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818365" comment="proftpd-lang-1.3.8b-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818366" comment="proftpd-ldap-1.3.8b-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818367" comment="proftpd-mysql-1.3.8b-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818368" comment="proftpd-pgsql-1.3.8b-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818369" comment="proftpd-radius-1.3.8b-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818370" comment="proftpd-sqlite-1.3.8b-bp155.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4006" version="1" class="patch">
	<metadata>
		<title>Security update for deepin-compressor (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218428" ref_url="https://bugzilla.suse.com/1218428" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-50255" ref_url="https://www.suse.com/security/cve/CVE-2023-50255/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2023:0423-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E6RI57PVHBNFGBEIH77ZL73GRPMDNIGO/" source="SUSE-SU"/>
		<description>
This update for deepin-compressor fixes the following issues:

- CVE-2023-50255: Fix Zip Path Traversal (boo#1218428)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-30"/>
	<updated date="2023-12-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218428">SUSE bug 1218428</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50255/">CVE-2023-50255 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50255">CVE-2023-50255 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009818384" comment="deepin-compressor-5.12.13-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818385" comment="deepin-compressor-lang-5.12.13-bp155.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4007" version="1" class="patch">
	<metadata>
		<title>Security update for sngrep (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="CVE-2024-3119" ref_url="https://www.suse.com/security/cve/CVE-2024-3119/" source="CVE"/>
		<reference ref_id="CVE-2024-3120" ref_url="https://www.suse.com/security/cve/CVE-2024-3120/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIKQJYLNI5D5D5THR2I23E2KMGZKXH46/" source="SUSE-SU"/>
		<description>
This update for sngrep fixes the following issues:

- Update to version 1.8.1
  * Fix CVE-2024-3119: sngrep: buffer overflow due to improper
    handling of 'Call-ID' and 'X-Call-ID' SIP headers.
  * Fix CVE-2024-3120: sngrep: stack-buffer overflow due to
    inadequate bounds checking when copying 'Content-Length' and
    'Warning' headers into fixed-size buffers.

- Update to versino 1.8.0
  * fix typo in message, thanks to lintian.
  * fix compiler warnings about unused variables.
  * Fixed a typo in comment line in filter.c
  * Redefine usage of POSIX signals.
  * Support for building sngrep using CMake added.

- Update to version 1.7.0
  * save: add option --text to save captured data to plain text
  * capture: fix memory overflows while parsing IP headers
  * hep: fix hep listener enabled in offline mode
  * core: stop sngrep when parent process has ended
  * ssl: fix decrypt with AES256 GCM SHA384 cipher
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2024-04-10"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3119/">CVE-2024-3119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3119">CVE-2024-3119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3120/">CVE-2024-3120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3120">CVE-2024-3120 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854005" comment="sngrep-1.8.1-bp155.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4008" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2024-2883" ref_url="https://www.suse.com/security/cve/CVE-2024-2883/" source="CVE"/>
		<reference ref_id="CVE-2024-2885" ref_url="https://www.suse.com/security/cve/CVE-2024-2885/" source="CVE"/>
		<reference ref_id="CVE-2024-2886" ref_url="https://www.suse.com/security/cve/CVE-2024-2886/" source="CVE"/>
		<reference ref_id="CVE-2024-2887" ref_url="https://www.suse.com/security/cve/CVE-2024-2887/" source="CVE"/>
		<description>
This update for opera fixes the following issues:

- Update to 109.0.5097.38
  * CHR-9695 Update Chromium on desktop-stable-123-5097 to
    123.0.6312.87
  * DNA-115156 [Login and Password suggestion] Suggestions are
    bolded and highlight doesn`t fill all area
  * DNA-115313 No video playback on skyshowtime.com
  * DNA-115639 [Version 109][Detached window] Missing functions
    names in light mode
  * DNA-115812 Enable #startpage-opening-animation on all streams
  * DNA-115836 Lucid mode visual issues on H264 videos
- The update to chromium 109.0.5097.38 fixes following issues:
  CVE-2024-2883, CVE-2024-2885, CVE-2024-2886, CVE-2024-2887

- Update to 109.0.5097.33
  * CHR-9674 Update Chromium on desktop-stable-123-5097 to
    123.0.6312.46
  * DNA-115357 [Settings] Search toolbar has wrong position
  * DNA-115396 Bolded camera icon when camera access is allowed
  * DNA-115478 AI Prompts in text highlight popup not displayed
    properly
  * DNA-115563 Wallet selector not working
  * DNA-115601 Remove 'moving text' animation in the tab cycler
  * DNA-115645 Internal pages icons unreadable when highlight
  * DNA-115717 'Your extension was disabled because it is
    corrupted' message is displayed to user
  * DNA-115770 Promote 109 to stable
- Complete Opera 109 changelog at:
  https://blogs.opera.com/desktop/changelog-for-109/
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-13"/>
	<updated date="2024-04-13"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2883/">CVE-2024-2883 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2883">CVE-2024-2883 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2885/">CVE-2024-2885 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2885">CVE-2024-2885 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2886/">CVE-2024-2886 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2886">CVE-2024-2886 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2887/">CVE-2024-2887 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2887">CVE-2024-2887 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854690" comment="opera-109.0.5097.38-lp155.3.42.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4009" version="1" class="patch">
	<metadata>
		<title>Security update for putty (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="CVE-2024-31497" ref_url="https://www.suse.com/security/cve/CVE-2024-31497/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0111-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YWBLPFDJD74NA6KYAQIVS5LANZFUCGL2/" source="SUSE-SU"/>
		<description>
This update for putty fixes the following issues:

Update to release 0.81

* Fix CVE-2024-31497: NIST P521 / ecdsa-sha2-nistp521 signatures are no longer
  generated with biased values of k. The previous bias compromises private keys.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-04-19"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-31497/">CVE-2024-31497 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31497">CVE-2024-31497 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855406" comment="putty-0.81-bp155.2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4010" version="1" class="patch">
	<metadata>
		<title>Security update for perl-CryptX (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1221528" ref_url="https://bugzilla.suse.com/1221528" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25099" ref_url="https://www.suse.com/security/cve/CVE-2018-25099/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0112-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UPEJCYLFV3FPQUS5GF63SP3V7CRAO2RX/" source="SUSE-SU"/>
		<description>
This update for perl-CryptX fixes the following issues:

Updated to version 0.080:

  0.080   2023-10-04
          - fix #95 AES-NI troubles on MS Windows (gcc compiler)
          - fix #96 Tests failure with Math::BigInt &gt;= 1.999840
          - Enabled AES-NI for platforms with gcc/clang/llvm
  0.079   2023-10-01
           - fix #92 update libtomcrypt
           - bundled libtomcrypt update branch:develop (commit:1e629e6f 2023-06-22)
  0.078   2023-04-28
          - fix #89 Crypt::Mac::HMAC b64mac and b64umac object methods do not work
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-20"/>
	<updated date="2024-04-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1221528">SUSE bug 1221528</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-25099/">CVE-2018-25099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-25099">CVE-2018-25099 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855608" comment="perl-CryptX-0.80.0-bp155.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4011" version="1" class="patch">
	<metadata>
		<title>Security update for dcmtk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220809" ref_url="https://bugzilla.suse.com/1220809" source="BUGZILLA"/>
		<reference ref_id="1223324" ref_url="https://bugzilla.suse.com/1223324" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-28130" ref_url="https://www.suse.com/security/cve/CVE-2024-28130/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0113-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XXL36P7M6YZRV6UPSI2YMI4FH6YX6H24/" source="SUSE-SU"/>
		<description>
This update for dcmtk fixes the following issues:

* Fixed incorrect type conversion in the DVPSSoftcopyVOI_PList:createFromImage functionality of OFFIS DCMTK (boo#1223324, CVE-2024-28130)

- Add missing requirements for dcmtk-devel (boo#1220809)

- Update to 3.6.8
  See DOCS/CHANGES.368 for the full list of changes
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-25"/>
	<updated date="2024-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220809">SUSE bug 1220809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223324">SUSE bug 1223324</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28130/">CVE-2024-28130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28130">CVE-2024-28130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009857737" comment="dcmtk-3.6.8-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857738" comment="dcmtk-devel-3.6.8-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857739" comment="libdcmtk18-3.6.8-bp155.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4012" version="1" class="patch">
	<metadata>
		<title>Security update for pdns-recursor (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223262" ref_url="https://bugzilla.suse.com/1223262" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-25583" ref_url="https://www.suse.com/security/cve/CVE-2024-25583/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0114-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZZH2ONXJKWNVDG6IH66D5CLFDU6CHDXI/" source="SUSE-SU"/>
		<description>
This update for pdns-recursor fixes the following issues:

- update to 4.8.8:
  * fixes a case when a crafted responses can lead to a denial of
    service in Recursor if recursive forwarding is configured
    (boo#1223262, CVE-2024-25583)

- changes in 4.8.7:
  * If serving stale, wipe CNAME records from cache when we get
    a NODATA negative response for them
  * Fix the zoneToCache regression introduced by last security
    update
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-29"/>
	<updated date="2024-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223262">SUSE bug 1223262</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25583/">CVE-2024-25583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25583">CVE-2024-25583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858166" comment="pdns-recursor-4.8.8-bp155.2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4013" version="1" class="patch">
	<metadata>
		<title>Security update for php81 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222857" ref_url="https://bugzilla.suse.com/1222857" source="BUGZILLA"/>
		<reference ref_id="1222858" ref_url="https://bugzilla.suse.com/1222858" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31629" ref_url="https://www.suse.com/security/cve/CVE-2022-31629/" source="CVE"/>
		<reference ref_id="CVE-2024-2756" ref_url="https://www.suse.com/security/cve/CVE-2024-2756/" source="CVE"/>
		<reference ref_id="CVE-2024-3096" ref_url="https://www.suse.com/security/cve/CVE-2024-3096/" source="CVE"/>
		<description>
This update for php81 fixes the following issues:

Version update to 8.1.28

* Fixed bug GHSA-wpj3-hf5j-x4v4 (__Host-/__Secure- cookie bypass due to
  partial CVE-2022-31629 fix). (CVE-2024-2756) (nielsdos) [boo#1222857]
* Fixed bug GHSA-h746-cjrr-wfmr (password_verify can erroneously return true,
  opening ATO risk). (CVE-2024-3096) (Jakub Zelenka) [boo#1222858]
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-02"/>
	<updated date="2024-05-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222857">SUSE bug 1222857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222858">SUSE bug 1222858</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31629/">CVE-2022-31629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31629">CVE-2022-31629 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-2756/">CVE-2024-2756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2756">CVE-2024-2756 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3096/">CVE-2024-3096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3096">CVE-2024-3096 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858669" comment="apache2-mod_php81-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858670" comment="php81-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858671" comment="php81-bcmath-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858672" comment="php81-bz2-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858673" comment="php81-calendar-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858674" comment="php81-cli-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858675" comment="php81-ctype-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858676" comment="php81-curl-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858677" comment="php81-dba-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858678" comment="php81-devel-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858679" comment="php81-dom-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858680" comment="php81-embed-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858681" comment="php81-enchant-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858682" comment="php81-exif-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858683" comment="php81-fastcgi-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858684" comment="php81-ffi-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858685" comment="php81-fileinfo-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858686" comment="php81-fpm-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858687" comment="php81-fpm-apache-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858688" comment="php81-ftp-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858689" comment="php81-gd-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858690" comment="php81-gettext-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858691" comment="php81-gmp-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858692" comment="php81-iconv-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858693" comment="php81-intl-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858694" comment="php81-ldap-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858695" comment="php81-mbstring-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858696" comment="php81-mysql-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858697" comment="php81-odbc-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858698" comment="php81-opcache-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858699" comment="php81-openssl-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858700" comment="php81-pcntl-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858701" comment="php81-pdo-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858702" comment="php81-pgsql-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858703" comment="php81-phar-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858704" comment="php81-posix-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858705" comment="php81-readline-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858706" comment="php81-shmop-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858707" comment="php81-snmp-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858708" comment="php81-soap-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858709" comment="php81-sockets-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858710" comment="php81-sodium-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858711" comment="php81-sqlite-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858712" comment="php81-sysvmsg-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858713" comment="php81-sysvsem-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858714" comment="php81-sysvshm-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858715" comment="php81-test-8.1.28-bp155.8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858716" comment="php81-tidy-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858717" comment="php81-tokenizer-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858718" comment="php81-xmlreader-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858719" comment="php81-xmlwriter-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858720" comment="php81-xsl-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858721" comment="php81-zip-8.1.28-bp155.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858722" comment="php81-zlib-8.1.28-bp155.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4014" version="1" class="patch">
	<metadata>
		<title>Security update for python-python-jose (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223417" ref_url="https://bugzilla.suse.com/1223417" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-33663" ref_url="https://www.suse.com/security/cve/CVE-2024-33663/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0118-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2ZVFD2FXHXWGBVAQ2KKX4NJMNLPY2AYI/" source="SUSE-SU"/>
		<description>
This update for python-python-jose fixes the following issues:

CVE-2024-33663: Fixed algorithm confusion with OpenSSH ECDSA keys and other key formats (boo#1223417).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-07"/>
	<updated date="2024-05-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223417">SUSE bug 1223417</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-33663/">CVE-2024-33663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33663">CVE-2024-33663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859182" comment="python3-python-jose-3.0.1-bp155.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4015" version="1" class="patch">
	<metadata>
		<title>Security update for tinyproxy (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1200028" ref_url="https://bugzilla.suse.com/1200028" source="BUGZILLA"/>
		<reference ref_id="1203553" ref_url="https://bugzilla.suse.com/1203553" source="BUGZILLA"/>
		<reference ref_id="1223743" ref_url="https://bugzilla.suse.com/1223743" source="BUGZILLA"/>
		<reference ref_id="1223746" ref_url="https://bugzilla.suse.com/1223746" source="BUGZILLA"/>
		<reference ref_id="CVE-2012-3505" ref_url="https://www.suse.com/security/cve/CVE-2012-3505/" source="CVE"/>
		<reference ref_id="CVE-2017-11747" ref_url="https://www.suse.com/security/cve/CVE-2017-11747/" source="CVE"/>
		<reference ref_id="CVE-2022-40468" ref_url="https://www.suse.com/security/cve/CVE-2022-40468/" source="CVE"/>
		<reference ref_id="CVE-2023-40533" ref_url="https://www.suse.com/security/cve/CVE-2023-40533/" source="CVE"/>
		<reference ref_id="CVE-2023-49606" ref_url="https://www.suse.com/security/cve/CVE-2023-49606/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0119-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OM62U7F2OTTTTR4PTM6RV3UAOCUHRC75/" source="SUSE-SU"/>
		<description>
This update for tinyproxy fixes the following issues:

- Update to release 1.11.2
  * Fix potential use-after-free in header handling [CVE-2023-49606, boo#1223746]
  * Prevent junk from showing up in error page in invalid requests [CVE-2022-40468, CVE-2023-40533, boo#1223743]

- Move tinyproxy program to /usr/bin.

- Update to release 1.11.1
  * New fnmatch based filtertype

- Update to release 1.11
  * Support for multiple bind directives.

- update to 1.10.0:
  * Configuration file has moved from /etc/tinyproxy.conf to
    /etc/tinyproxy/tinyproxy.conf.
  * Add support for basic HTTP authentication
  * Add socks upstream support
  * Log to stdout if no logfile is specified
  * Activate reverse proxy by default
  * Support bind with transparent mode
  * Allow multiple listen statements in the configuration
  * Fix CVE-2017-11747: Create PID file before dropping privileges.
  * Fix CVE-2012-3505: algorithmic complexity DoS in hashmap
  * Bugfixes
  * BB#110: fix algorithmic complexity DoS in hashmap
  * BB#106: fix CONNECT requests with IPv6 literal addresses as host
  * BB#116: fix invalid free for GET requests to ipv6 literal address
  * BB#115: Drop supplementary groups
  * BB#109: Fix crash (infinite loop) when writing to log file fails
  * BB#74: Create log and pid files after we drop privs
  * BB#83: Use output of id instead of $USER
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-10"/>
	<updated date="2024-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200028">SUSE bug 1200028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203553">SUSE bug 1203553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223743">SUSE bug 1223743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223746">SUSE bug 1223746</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2012-3505/">CVE-2012-3505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2012-3505">CVE-2012-3505 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-11747/">CVE-2017-11747 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-11747">CVE-2017-11747 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40468/">CVE-2022-40468 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40468">CVE-2022-40468 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-40533/">CVE-2023-40533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-40533">CVE-2023-40533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-49606/">CVE-2023-49606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-49606">CVE-2023-49606 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860178" comment="tinyproxy-1.11.2-bp155.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4016" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219048" ref_url="https://bugzilla.suse.com/1219048" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-50447" ref_url="https://www.suse.com/security/cve/CVE-2023-50447/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0125-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GYSVBJPZSCRQ4QL45BINOZYP7XXBBK3C/" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

- CVE-2023-50447: Fixed arbitrary code execution via the environment parameter (boo#1219048)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-13"/>
	<updated date="2024-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219048">SUSE bug 1219048</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50447/">CVE-2023-50447 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50447">CVE-2023-50447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009860475" comment="python3-Pillow-8.4.0-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860476" comment="python3-Pillow-tk-8.4.0-bp155.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4017" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2024-3832" ref_url="https://www.suse.com/security/cve/CVE-2024-3832/" source="CVE"/>
		<reference ref_id="CVE-2024-3833" ref_url="https://www.suse.com/security/cve/CVE-2024-3833/" source="CVE"/>
		<reference ref_id="CVE-2024-3834" ref_url="https://www.suse.com/security/cve/CVE-2024-3834/" source="CVE"/>
		<reference ref_id="CVE-2024-3837" ref_url="https://www.suse.com/security/cve/CVE-2024-3837/" source="CVE"/>
		<reference ref_id="CVE-2024-3838" ref_url="https://www.suse.com/security/cve/CVE-2024-3838/" source="CVE"/>
		<reference ref_id="CVE-2024-3839" ref_url="https://www.suse.com/security/cve/CVE-2024-3839/" source="CVE"/>
		<reference ref_id="CVE-2024-3840" ref_url="https://www.suse.com/security/cve/CVE-2024-3840/" source="CVE"/>
		<reference ref_id="CVE-2024-3841" ref_url="https://www.suse.com/security/cve/CVE-2024-3841/" source="CVE"/>
		<reference ref_id="CVE-2024-3843" ref_url="https://www.suse.com/security/cve/CVE-2024-3843/" source="CVE"/>
		<reference ref_id="CVE-2024-3844" ref_url="https://www.suse.com/security/cve/CVE-2024-3844/" source="CVE"/>
		<reference ref_id="CVE-2024-3845" ref_url="https://www.suse.com/security/cve/CVE-2024-3845/" source="CVE"/>
		<reference ref_id="CVE-2024-3846" ref_url="https://www.suse.com/security/cve/CVE-2024-3846/" source="CVE"/>
		<reference ref_id="CVE-2024-3847" ref_url="https://www.suse.com/security/cve/CVE-2024-3847/" source="CVE"/>
		<reference ref_id="CVE-2024-3914" ref_url="https://www.suse.com/security/cve/CVE-2024-3914/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0128-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVLMJIQMVDQI2D33EDKB65KEXN6OMIRX/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

- Update to 110.0.5130.23

  * CHR-9706 Update Chromium on desktop-stable-124-5130 to
    124.0.6367.62
  * DNA-116450 Promote 110 to stable

- Complete Opera 110 changelog at:
  https://blogs.opera.com/desktop/changelog-for-110/

- The update to chromium 124.0.6367.62 fixes following issues: 

  CVE-2024-3832, CVE-2024-3833, CVE-2024-3914, CVE-2024-3834,
  CVE-2024-3837, CVE-2024-3838, CVE-2024-3839, CVE-2024-3840,
  CVE-2024-3841, CVE-2024-3843, CVE-2024-3844, CVE-2024-3845,
  CVE-2024-3846, CVE-2024-3847

- Update to 109.0.5097.80

  * DNA-115738 Crash at extensions::ExtensionRegistry::
    GetExtensionById(std::__Cr::basic_string const&amp;, int)
  * DNA-115797 [Flow] Never ending loading while connecting to flow
  * DNA-116315 Chat GPT in Sidebar Panel doesn’t work

- Update to 109.0.5097.59

  * CHR-9416 Updating Chromium on desktop-stable-* branches
  * DNA-115810 Enable #drag-multiple-tabs on all streams

- Update to 109.0.5097.45

  * CHR-9416 Updating Chromium on desktop-stable-* branches
  * DNA-114737 [Search box] It's getting blurred when click
    on it, also lower corners are not rounded sometimes
  * DNA-115042 '+' button is not responsive when 30+ tabs opened
  * DNA-115326 Wrong fonts and padding after intake
  * DNA-115392 [Badges] Text displayed in red
  * DNA-115501 'Review your payment' native popup has wrong colors
  * DNA-115809 Enable #show-duplicate-indicator-on-link on
    all streams
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-16"/>
	<updated date="2024-05-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3832/">CVE-2024-3832 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3832">CVE-2024-3832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3833/">CVE-2024-3833 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3833">CVE-2024-3833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3834/">CVE-2024-3834 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3834">CVE-2024-3834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3837/">CVE-2024-3837 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3837">CVE-2024-3837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3838/">CVE-2024-3838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3838">CVE-2024-3838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3839/">CVE-2024-3839 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3839">CVE-2024-3839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3840/">CVE-2024-3840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3840">CVE-2024-3840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3841/">CVE-2024-3841 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3841">CVE-2024-3841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3843/">CVE-2024-3843 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3843">CVE-2024-3843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3844/">CVE-2024-3844 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3844">CVE-2024-3844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3845/">CVE-2024-3845 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3845">CVE-2024-3845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3846/">CVE-2024-3846 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3846">CVE-2024-3846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3847/">CVE-2024-3847 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3847">CVE-2024-3847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3914/">CVE-2024-3914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3914">CVE-2024-3914 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861423" comment="opera-110.0.5130.23-lp155.3.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4018" version="1" class="patch">
	<metadata>
		<title>Security update for opusfile (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1207381" ref_url="https://bugzilla.suse.com/1207381" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-47021" ref_url="https://www.suse.com/security/cve/CVE-2022-47021/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0013-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OGZ3XSAOKYHWIRFP73YPJ33KTPBC6PEQ/" source="SUSE-SU"/>
		<description>
This update for opusfile fixes the following issues:

- CVE-2022-47021: Fixed a NULL pointer dereference (boo#1207381)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-07"/>
	<updated date="2024-01-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1207381">SUSE bug 1207381</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-47021/">CVE-2022-47021 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47021">CVE-2022-47021 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009818995" comment="libopusfile0-0.12-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818996" comment="opusfile-devel-0.12-bp155.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4019" version="1" class="patch">
	<metadata>
		<title>Security update for git-cliff (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223218" ref_url="https://bugzilla.suse.com/1223218" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-32650" ref_url="https://www.suse.com/security/cve/CVE-2024-32650/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0130-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RLZMKRAPDN7C43S56JAGULAWF4RXGB2S/" source="SUSE-SU"/>
		<description>
This update for git-cliff fixes the following issues:

- update to 2.2.2:
  * (changelog) Allow adding custom context
  * (changelog) Ignore empty lines when using split_commits
  * (parser) Allow matching empty commit body
  * Documentation updates

- update to 2.2.1:
  * Make rendering errors more verbose
  * Support detecting config from project manifest
  * Make the bump version rules configurable
  * bug fixes and documentation updates
- CVE-2024-32650: rust-rustls: Infinite loop with proper client
  input fixes (boo#1223218)

- Update to version 2.1.2:
  * feat(npm): add programmatic API for TypeScript
  * chore(fixtures): enable verbose logging for output
  * refactor(clippy): apply clippy suggestions
  * refactor(changelog): do not output to stdout when prepend is used
  * feat(args): add `--tag-pattern` argument
  * fix(config): fix commit parser regex in the default config
  * fix(github): sanitize the GitHub token in debug logs
  * chore(config): add animation to the header of the changelog
  * refactor(clippy): apply clippy suggestions
  * docs(security): update security policy
  * chore(project): add readme to core package
  * chore(embed): do not allow missing docs
  * chore(config): skip dependabot commits for dev updates
  * docs(readme): mention RustLab 2023 talk
  * chore(config): revamp the configuration files
  * chore(docker): update versions in Dockerfile
  * chore(example): use full links in GitHub templates
  * chore(project): bump MSRV to 1.74.1
  * revert(config): use postprocessors for checking the typos
  * feat(template): support using PR labels in the GitHub template
  * docs(configuration): fix typo
  * feat(args): add `--no-exec` flag for skipping command execution
  * chore(command): explicitly set the directory of command to current dir
  * refactor(ci): use hardcoded workspace members for cargo-msrv command
  * refactor(ci): simplify cargo-msrv installation
  * refactor(clippy): apply clippy suggestions
  * refactor(config): use postprocessors for checking the typos
  * chore(project): update copyright years
  * chore(github): update templates about GitHub integration
  * feat(changelog): set the timestamp of the previous release
  * feat(template): support using PR title in the GitHub template
  * feat(changelog): improve skipping via `.cliffignore` and `--skip-commit`
  * chore(changelog): disable the default behavior of next-version
  * fix(git): sort commits in topological order
  * test(changelog): use the correct version for missing tags
  * chore(changelog): use 0.1.0 as default next release if no tag is found
  * feat(github)!: support integration with GitHub repos
  * refactor(changelog): support `--bump` for processed releases
  * fix(cli): fix broken pipe when stdout is interrupted
  * test(fixtures): update the bumped value output to add prefix
  * feat(changelog): support tag prefixes with `--bump`
  * feat(changelog)!: set tag to `0.0.1` via `--bump` if no tags exist
  * fix(commit): trim the trailing newline from message
  * docs(readme): use the raw link for the animation
  * chore(example): remove limited commits example
  * feat(args): add `-x` short argument for `--context`
  * revert(deps): bump actions/upload-pages-artifact from 2 to 3
  * revert(deps): bump actions/deploy-pages from 3 to 4
  * chore(dependabot): group the dependency updates for creating less PRs
  * feat(parser): support using SHA1 of the commit
  * feat(commit): add merge_commit flag to the context
  * chore(mergify): don't update PRs for the main branch
  * fix(links): skip checking the GitHub commit URLs
  * fix(changelog): fix previous version links
  * feat(parser): support using regex scope values
  * test(fixture): update the date for example test fixture
  * docs(fixtures): add instructions for adding new fixtures
  * feat(args): support initialization with built-in templates
  * feat(changelog)!: support templating in the footer
  * feat(args): allow returning the bumped version
  * test(fixture): add test fixture for bumping version
  * fix: allow version bump with a single previous release
  * fix(changelog): set the correct previous tag when a custom tag is given
  * feat(args): set `CHANGELOG.md` as default missing value for output option
  * refactor(config): remove unnecessary newline from configs

- Update to version 1.4.0:
  * Support bumping the semantic version via `--bump`
  * Add 'typos' check
  * Log the output of failed external commands -
  * breaking change: Support regex in 'tag_pattern' configuration
  * Add field and value matchers to the commit parser

- Update to version 1.2.0:
  * Update clap and clap extras to v4 
  * Make the fields of Signature public
  * Add a custom configuration file for the repository
  * Support placing configuration inside pyproject.toml 
  * Generate SBOM/provenance for the Docker image
  * Support using regex group values 
  * [breaking] Nested environment config overrides 
  * Set max of limit_commits to the number of commits 
  * Set the node cache dependency path
  * Use the correct argument in release script

- Update to version 1.1.2:
  * Do not skip all tags when skip_tags is empty (#136)
  * Allow saving context to a file (#138)
  * Derive the tag order from commits instead of timestamp (#139)
  * Use timestamp for deriving the tag order (#139)

- Update to version 1.1.1:
  * Relevant change: Update README.md about the NPM package
  * Fix type casting in base NPM package
  * Rename the package on Windows
  * Disable liquid parsing in README.md by using raw blocks
  * Support for generating changelog for multiple git repositories
  * Publish binaries for more platforms/architectures

- Update to version 1.0.0:
  * Bug Fixes
    - Fix test fixture failures
  * Documentation
    - Fix GitHub badges in README.md
  * Features
    - [breaking] Replace --date-order by --topo-order
    - Allow running with --prepend and --output
    - [breaking] Use current time for --tag argument
    - Include completions and mangen in binary releases
    - Publish Debian package via release workflow
  * Miscellaneous Tasks
    - Run all test fixtures
    - Remove deprecated set-output usage
    - Update actions/checkout to v3
    - Comment out custom commit preprocessor
  * Refactor
    - Apply clippy suggestions
  * Styling
    - Update README.md about the styling of footer field
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-18"/>
	<updated date="2024-05-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223218">SUSE bug 1223218</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32650/">CVE-2024-32650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32650">CVE-2024-32650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861608" comment="git-cliff-2.2.2-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861609" comment="git-cliff-bash-completion-2.2.2-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861610" comment="git-cliff-fish-completion-2.2.2-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861611" comment="git-cliff-zsh-completion-2.2.2-bp155.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4020" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1194551" ref_url="https://bugzilla.suse.com/1194551" source="BUGZILLA"/>
		<reference ref_id="1194552" ref_url="https://bugzilla.suse.com/1194552" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22815" ref_url="https://www.suse.com/security/cve/CVE-2022-22815/" source="CVE"/>
		<reference ref_id="CVE-2022-22816" ref_url="https://www.suse.com/security/cve/CVE-2022-22816/" source="CVE"/>
		<description>
This update for python-Pillow fixes the following issues:

- Fixed ImagePath.Path array handling (boo#1194551, boo#1194552, CVE-2022-22815, CVE-2022-22816)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-19"/>
	<updated date="2024-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194551">SUSE bug 1194551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194552">SUSE bug 1194552</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22815/">CVE-2022-22815 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22815">CVE-2022-22815 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22816/">CVE-2022-22816 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22816">CVE-2022-22816 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861617" comment="python3-Pillow-8.4.0-bp155.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861618" comment="python3-Pillow-tk-8.4.0-bp155.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4021" version="1" class="patch">
	<metadata>
		<title>Security update for gitui (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218264" ref_url="https://bugzilla.suse.com/1218264" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0135-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NJ4UKYMVT5L6QOJVM6JMV6AQINAVT4JW/" source="SUSE-SU"/>
		<description>
This update for gitui fixes the following issues:

- update to version 0.26.2:
  * respect configuration for remote when fetching (also applies
    to pulling)
  * add : character to sign-off trailer to comply with Conventional
    Commits standard
  * support overriding build_date for reproducible builds
- update vendored dependencies for CVE-2023-48795 (boo#1218264)

- Update to version 0.26.1:
  Added:
  * sign commits using openpgp
  * support ssh commit signing (when user.signingKey and gpg.format
    = ssh of gitconfig are set; ssh-agent isn't yet supported)
  * provide nightly builds (see NIGHTLIES.md)
  * more version info in gitui -V and help popup (including git
    hash)
  * support core.commitChar filtering
  * allow reset in branch popup
  * respect configuration for remote when pushing
  Changed:
  * Make info and error message popups scrollable
  * clarify x86_64 linux binary in artifact names:
    gitui-linux-x86_64.tar.gz (formerly known as musl)
  Fixes:
  * add syntax highlighting support for more file types, e.g.
    Typescript, TOML, etc.

- Update to version 0.25.1:
  Added:
  * support for new-line in text-input (e.g. commit message editor)
  * add syntax highlighting for blame view
  * allow aborting pending commit log search
  * theme.ron now supports customizing line break symbol
  * add confirmation for dialog for undo commit
  * support prepare-commit-msg hook
  * new style block_title_focused to allow customizing title text
    of focused frame/block
  * allow fetch command in both tabs of branchlist popup
  * check branch name validity while typing
  Changed:
  * do not allow tagging when tag.gpgsign enabled until gpg-signing
    is supported
  Fixes:
  * bump yanked dependency bumpalo to fix build from source
  * pin ratatui version to fix building without locked cargo
    install gitui
  * stash window empty after file history popup closes
  * allow push to empty remote
  * better diagnostics for theme file loading
  * fix ordering of commits in diff view

- Update to version 0.24.3:
  * log: fix major lag when going beyond last search hit
  * parallelise log search - performance gain ~100%
  * search message body/summary separately
  * fix commit log not updating after branch switch
  * fix stashlist not updating after pop/drop
  * fix commit log corruption when tabbing in/out while parsing log
  * fix performance problem in big repo with a lot of incoming commits
  * fix error switching to a branch with '/' in the name
  * search commits by message, author or files in diff 
  * support 'n'/'p' key to move to the next/prev hunk in diff component
  * simplify theme overrides
  * support for sign-off of commits
  * switched from textwrap to bwrap for text wrapping
  * more logging diagnostics when a repo cannot be
  * added to anaconda
  * visualize empty line substituted with content in diff better 
  * checkout branch works with non-empty status report
  * jump to commit by SHA
  * fix commit dialog char count for multibyte characters
  * fix wrong hit highlighting in fuzzy find popup
  * fix symlink support for configuration files
  * fix expansion of ~ in commit.template
  * fix hunk (un)staging/reset for # of context lines != 3
  * fix delay when opening external editor

- Update to version 0.23.0
  - Breaking Change
    * focus_XYZ key bindings are merged into the move_XYZ set, so only one way to bind arrow-like keys from now on
  - Added
    * allow reset (soft,mixed,hard) from commit log
    * support reword of commit from log
    * fuzzy find branch
    * list changes in commit message inside external editor
    * allow detaching HEAD and checking out specific commit from log view
    * add no-verify option on commits to not run hooks
    * allow fetch on status tab
    * allow copy file path on revision files and status tree
    * print message of where log will be written if -l is set
    * show remote branches in log
  - Fixes
    * fixed side effect of crossterm 0.26 on windows that caused double input of all keys
    * commit msg history ordered the wrong way
    * improve help documentation for amend cmd
    * lag issue when showing files tab
    * fix key binding shown in bottom bar for stash_open
    * --bugreport does not require param
    * edit-file command shown on commits msg
    * crash on branches popup in small terminal
    * edit command duplication
    * syntax errors in key_bindings.ron will be logged
    * Fix UI freeze when copying with xclip installed on Linux
    * Fix UI freeze when copying with wl-copy installed on Linux
    * commit hooks report 'command not found' on Windows with wsl2 installed
    * crashes on entering submodules
    * fix race issue: revlog messages sometimes appear empty
    * default to tick-based updates
    * add support for options handling in log and stashes views
  - Changed
    * minimum supported rust version bumped to 1.65 (thank you time crate)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-22"/>
	<updated date="2024-05-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218264">SUSE bug 1218264</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861866" comment="gitui-0.26.2-bp155.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4022" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224208" ref_url="https://bugzilla.suse.com/1224208" source="BUGZILLA"/>
		<reference ref_id="1224294" ref_url="https://bugzilla.suse.com/1224294" source="BUGZILLA"/>
		<reference ref_id="1224341" ref_url="https://bugzilla.suse.com/1224341" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-4761" ref_url="https://www.suse.com/security/cve/CVE-2024-4761/" source="CVE"/>
		<reference ref_id="CVE-2024-4947" ref_url="https://www.suse.com/security/cve/CVE-2024-4947/" source="CVE"/>
		<reference ref_id="CVE-2024-4948" ref_url="https://www.suse.com/security/cve/CVE-2024-4948/" source="CVE"/>
		<reference ref_id="CVE-2024-4949" ref_url="https://www.suse.com/security/cve/CVE-2024-4949/" source="CVE"/>
		<reference ref_id="CVE-2024-4950" ref_url="https://www.suse.com/security/cve/CVE-2024-4950/" source="CVE"/>
		<description>
This update for chromium fixes the following issues:

- Chromium 125.0.6422.60 (boo#1224341)
  * CVE-2024-4947: Type Confusion in V8
  * CVE-2024-4948: Use after free in Dawn
  * CVE-2024-4949: Use after free in V8
  * CVE-2024-4950: Inappropriate implementation in Downloads

- Chromium 125.0.6422.41
  * New upstream (early) stable release.

- Chromium 124.0.6367.207 (boo#1224294)
  * CVE-2024-4761: Out of bounds write in V8

- Chromium 124.0.6367.201 (boo#1224208)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-22"/>
	<updated date="2024-05-22"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1224208">SUSE bug 1224208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224294">SUSE bug 1224294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224341">SUSE bug 1224341</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4761/">CVE-2024-4761 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4761">CVE-2024-4761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4947/">CVE-2024-4947 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4947">CVE-2024-4947 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4948/">CVE-2024-4948 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4948">CVE-2024-4948 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4949/">CVE-2024-4949 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4949">CVE-2024-4949 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4950/">CVE-2024-4950 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4950">CVE-2024-4950 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861867" comment="chromedriver-125.0.6422.60-bp155.2.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861868" comment="chromium-125.0.6422.60-bp155.2.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4023" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224818" ref_url="https://bugzilla.suse.com/1224818" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-5157" ref_url="https://www.suse.com/security/cve/CVE-2024-5157/" source="CVE"/>
		<reference ref_id="CVE-2024-5158" ref_url="https://www.suse.com/security/cve/CVE-2024-5158/" source="CVE"/>
		<reference ref_id="CVE-2024-5159" ref_url="https://www.suse.com/security/cve/CVE-2024-5159/" source="CVE"/>
		<reference ref_id="CVE-2024-5160" ref_url="https://www.suse.com/security/cve/CVE-2024-5160/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0137-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OUHQT3H7SVUMWPOBHPV62RCKTAJROHUB/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

- Chromium 125.0.6422.76 (boo#1224818)
  * CVE-2024-5157: Use after free in Scheduling
  * CVE-2024-5158: Type Confusion in V8
  * CVE-2024-5159: Heap buffer overflow in ANGLE
  * CVE-2024-5160: Heap buffer overflow in Dawn
  * Various fixes from internal audits, fuzzing and other initiatives
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1224818">SUSE bug 1224818</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5157/">CVE-2024-5157 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5157">CVE-2024-5157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5158/">CVE-2024-5158 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5158">CVE-2024-5158 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5159/">CVE-2024-5159 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5159">CVE-2024-5159 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5160/">CVE-2024-5160 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5160">CVE-2024-5160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861953" comment="chromedriver-125.0.6422.76-bp155.2.85.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861954" comment="chromium-125.0.6422.76-bp155.2.85.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4024" version="1" class="patch">
	<metadata>
		<title>Security update for qt6-networkauth (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224782" ref_url="https://bugzilla.suse.com/1224782" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-36048" ref_url="https://www.suse.com/security/cve/CVE-2024-36048/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/55ZLZN7U7KUGQ7YANJIPQP7R7ESP6B3L/" source="SUSE-SU"/>
		<description>
This update for qt6-networkauth fixes the following issues:

- CVE-2024-36048: Fixed data race and poor seeding in generateRandomString() (boo#1224782).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-05-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1224782">SUSE bug 1224782</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36048/">CVE-2024-36048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36048">CVE-2024-36048 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009862117" comment="libQt6NetworkAuth6-6.4.2-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862118" comment="qt6-networkauth-devel-6.4.2-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862119" comment="qt6-networkauth-docs-html-6.4.2-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862120" comment="qt6-networkauth-docs-qch-6.4.2-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862121" comment="qt6-networkauth-examples-6.4.2-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862122" comment="qt6-networkauth-private-devel-6.4.2-bp155.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4025" version="1" class="patch">
	<metadata>
		<title>Security update for cJSON (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218098" ref_url="https://bugzilla.suse.com/1218098" source="BUGZILLA"/>
		<reference ref_id="1218099" ref_url="https://bugzilla.suse.com/1218099" source="BUGZILLA"/>
		<reference ref_id="1223420" ref_url="https://bugzilla.suse.com/1223420" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-50471" ref_url="https://www.suse.com/security/cve/CVE-2023-50471/" source="CVE"/>
		<reference ref_id="CVE-2023-50472" ref_url="https://www.suse.com/security/cve/CVE-2023-50472/" source="CVE"/>
		<reference ref_id="CVE-2024-31755" ref_url="https://www.suse.com/security/cve/CVE-2024-31755/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/36QNMKFWNRJX3XHLNGZ3DNLMLIHSRF4U/" source="SUSE-SU"/>
		<description>
This update for cJSON fixes the following issues:

- Update to 1.7.18:
  * CVE-2024-31755: NULL pointer dereference via cJSON_SetValuestring() (boo#1223420)
  * Remove non-functional list handling of compiler flags
  * Fix heap buffer overflow
  * remove misused optimization flag -01
  * Set free'd pointers to NULL whenever they are not reassigned
    immediately after

- Update to version 1.7.17 (boo#1218098, CVE-2023-50472,
    boo#1218099, CVE-2023-50471):
  * Fix null reference in cJSON_SetValuestring (CVE-2023-50472).
  * Fix null reference in cJSON_InsertItemInArray (CVE-2023-50471).

- Update to 1.7.16:
  * Add an option for ENABLE_CJSON_VERSION_SO in CMakeLists.txt
  * Add cmake_policy to CMakeLists.txt
  * Add cJSON_SetBoolValue
  * Add meson documentation
  * Fix memory leak in merge_patch
  * Fix conflicting target names 'uninstall'
  * Bump cmake version to 3.0 and use new version syntax
  * Print int without decimal places
  * Fix 'cjson_utils-static' target not exist
  * Add allocate check for replace_item_in_object
  * Fix a null pointer crash in cJSON_ReplaceItemViaPointer
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-25"/>
	<updated date="2024-05-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218098">SUSE bug 1218098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218099">SUSE bug 1218099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223420">SUSE bug 1223420</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50471/">CVE-2023-50471 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50471">CVE-2023-50471 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50472/">CVE-2023-50472 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50472">CVE-2023-50472 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31755/">CVE-2024-31755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31755">CVE-2024-31755 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009862227" comment="cJSON-devel-1.7.18-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862228" comment="libcjson1-1.7.18-bp155.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4026" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1225199" ref_url="https://bugzilla.suse.com/1225199" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-5274" ref_url="https://www.suse.com/security/cve/CVE-2024-5274/" source="CVE"/>
		<description>
This update for chromium fixes the following issues:

- Chromium 125.0.6422.112
  * CVE-2024-5274: Type Confusion in V8 (boo#1225199)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-26"/>
	<updated date="2024-05-26"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1225199">SUSE bug 1225199</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5274/">CVE-2024-5274 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5274">CVE-2024-5274 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009862241" comment="chromedriver-125.0.6422.112-bp155.2.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862242" comment="chromium-125.0.6422.112-bp155.2.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4027" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2024-4671" ref_url="https://www.suse.com/security/cve/CVE-2024-4671/" source="CVE"/>
		<reference ref_id="CVE-2024-5274" ref_url="https://www.suse.com/security/cve/CVE-2024-5274/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0142-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IOFJ6G37BKT5DAX7IXPGENFSCVOOCGZH/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

- Update to 110.0.5130.39
  * DNA-115603 [Rich Hints] Pass trigger source to the Rich Hint
  * DNA-116680 Import 0-day fix for CVE-2024-5274

- Update to 110.0.5130.35
  * CHR-9721 Update Chromium on desktop-stable-124-5130 to
    124.0.6367.202
  * DNA-114787 Crash at views::View::DoRemoveChildView(views::
    View*, bool, bool, views::View*)
  * DNA-115640 Tab island is not properly displayed after
    drag&amp;drop in light theme
  * DNA-116191 Fix link in RTV Euro CoS
  * DNA-116218 Crash at SkGpuShaderImageFilter::onFilterImage
    (skif::Context const&amp;)
  * DNA-116241 Update affiliation link for media expert
    'Continue On'
  * DNA-116256 Crash at TabHoverCardController::UpdateHoverCard
    (opera::TabDataView*, TabHoverCardController::UpdateType,
    bool)
  * DNA-116270 Show 'Suggestions' inside expanding Speed Dial
    field
  * DNA-116474 Implement the no dynamic hover approach
  * DNA-116493 Make sure that additional elements like
    (Sync your browser) etc. doesn’t shift content down on page
  * DNA-116515 Import 0-day fix from Chromium '[wasm-gc] Only
    normalize JSObject targets in SetOrCopyDataProperties'
  * DNA-116543 Twitter migrate to x.com
  * DNA-116552 Change max width of the banner
  * DNA-116569 Twitter in Panel loading for the first time opens
    two Tabs automatically
  * DNA-116587 Translate settings strings for every language

- The update to chromium 124.0.6367.202 fixes following issues: 
  CVE-2024-4671
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-27"/>
	<updated date="2024-05-27"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4671/">CVE-2024-4671 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4671">CVE-2024-4671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5274/">CVE-2024-5274 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5274">CVE-2024-5274 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862243" comment="opera-110.0.5130.39-lp155.3.48.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4028" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtnetworkauth (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224782" ref_url="https://bugzilla.suse.com/1224782" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-36048" ref_url="https://www.suse.com/security/cve/CVE-2024-36048/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0143-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5URUTAIVXSJ76TICREGEFK7QSJ244FKX/" source="SUSE-SU"/>
		<description>
This update for libqt5-qtnetworkauth fixes the following issues:

- CVE-2024-36048: Fixed data race and poor seeding in generateRandomString() (boo#1224782).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-27"/>
	<updated date="2024-05-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1224782">SUSE bug 1224782</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36048/">CVE-2024-36048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36048">CVE-2024-36048 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009862244" comment="libQt5NetworkAuth5-5.15.2+kde2-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862245" comment="libQt5NetworkAuth5-32bit-5.15.2+kde2-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862246" comment="libQt5NetworkAuth5-64bit-5.15.2+kde2-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862247" comment="libqt5-qtnetworkauth-devel-5.15.2+kde2-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862248" comment="libqt5-qtnetworkauth-devel-32bit-5.15.2+kde2-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862249" comment="libqt5-qtnetworkauth-devel-64bit-5.15.2+kde2-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862250" comment="libqt5-qtnetworkauth-examples-5.15.2+kde2-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862251" comment="libqt5-qtnetworkauth-private-headers-devel-5.15.2+kde2-bp155.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4029" version="1" class="patch">
	<metadata>
		<title>Security update for gifsicle (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216403" ref_url="https://bugzilla.suse.com/1216403" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46009" ref_url="https://www.suse.com/security/cve/CVE-2023-46009/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0146-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XPBVCIDM6CP4OMGHYXCEAOVLORKQFQP4/" source="SUSE-SU"/>
		<description>
This update for gifsicle fixes the following issues:

Update to version 1.95:

- CVE-2023-46009: Fixed floating point exception vulnerability via resize_stream at src/xform.c (boo#1216403)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-05-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216403">SUSE bug 1216403</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-46009/">CVE-2023-46009 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46009">CVE-2023-46009 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862546" comment="gifsicle-1.95-bp155.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4030" version="1" class="patch">
	<metadata>
		<title>Security update for libredwg (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218473" ref_url="https://bugzilla.suse.com/1218473" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-26157" ref_url="https://www.suse.com/security/cve/CVE-2023-26157/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WJZKASYCXFRWLMBF4XUIYV5ZN2WMSZYO/" source="SUSE-SU"/>
		<description>
This update for libredwg fixes the following issues:

Update to tag 0.12.5.6924:

- CVE-2023-26157: Fixed out-of-bound read involving section-&gt;num_pages in decode_r2007.c (boo#1218473)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-05-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218473">SUSE bug 1218473</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-26157/">CVE-2023-26157 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26157">CVE-2023-26157 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009862547" comment="libredwg-devel-0.12.5.6924-bp155.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862548" comment="libredwg-tools-0.12.5.6924-bp155.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862549" comment="libredwg0-0.12.5.6924-bp155.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4031" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1225690" ref_url="https://bugzilla.suse.com/1225690" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-5493" ref_url="https://www.suse.com/security/cve/CVE-2024-5493/" source="CVE"/>
		<reference ref_id="CVE-2024-5494" ref_url="https://www.suse.com/security/cve/CVE-2024-5494/" source="CVE"/>
		<reference ref_id="CVE-2024-5495" ref_url="https://www.suse.com/security/cve/CVE-2024-5495/" source="CVE"/>
		<reference ref_id="CVE-2024-5496" ref_url="https://www.suse.com/security/cve/CVE-2024-5496/" source="CVE"/>
		<reference ref_id="CVE-2024-5497" ref_url="https://www.suse.com/security/cve/CVE-2024-5497/" source="CVE"/>
		<reference ref_id="CVE-2024-5498" ref_url="https://www.suse.com/security/cve/CVE-2024-5498/" source="CVE"/>
		<reference ref_id="CVE-2024-5499" ref_url="https://www.suse.com/security/cve/CVE-2024-5499/" source="CVE"/>
		<description>
This update for chromium fixes the following issues:

Chromium 125.0.6422.141 (boo#1225690)

* CVE-2024-5493: Heap buffer overflow in WebRTC
* CVE-2024-5494: Use after free in Dawn
* CVE-2024-5495: Use after free in Dawn
* CVE-2024-5496: Use after free in Media Session
* CVE-2024-5497: Out of bounds memory access in Keyboard Inputs
* CVE-2024-5498: Use after free in Presentation API
* CVE-2024-5499: Out of bounds write in Streams API
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-03"/>
	<updated date="2024-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1225690">SUSE bug 1225690</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5493/">CVE-2024-5493 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5493">CVE-2024-5493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5494/">CVE-2024-5494 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5494">CVE-2024-5494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5495/">CVE-2024-5495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5495">CVE-2024-5495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5496/">CVE-2024-5496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5496">CVE-2024-5496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5497/">CVE-2024-5497 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5497">CVE-2024-5497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5498/">CVE-2024-5498 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5498">CVE-2024-5498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5499/">CVE-2024-5499 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5499">CVE-2024-5499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009863568" comment="chromedriver-125.0.6422.141-bp155.2.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863569" comment="chromium-125.0.6422.141-bp155.2.91.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4032" version="1" class="patch">
	<metadata>
		<title>Security update for python-python-jose (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223422" ref_url="https://bugzilla.suse.com/1223422" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-33664" ref_url="https://www.suse.com/security/cve/CVE-2024-33664/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0149-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UVCLFV5BBDGCEQHAF5JUYYFSZFDLN3GJ/" source="SUSE-SU"/>
		<description>
This update for python-python-jose fixes the following issues:

- CVE-2024-33664: Fixed a denial of service via decoding of a JSON Web Encryption token with a high compression ratio (boo#1223422)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-03"/>
	<updated date="2024-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223422">SUSE bug 1223422</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33664/">CVE-2024-33664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33664">CVE-2024-33664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863570" comment="python3-python-jose-3.0.1-bp155.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4033" version="1" class="patch">
	<metadata>
		<title>Security update for libhtp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220403" ref_url="https://bugzilla.suse.com/1220403" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-23837" ref_url="https://www.suse.com/security/cve/CVE-2024-23837/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0150-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FG73M6UTBO6SVSDD77QUNSFAD243MM4V/" source="SUSE-SU"/>
		<description>
This update for libhtp fixes the following issues:

- CVE-2024-23837: excessive processing time of HTTP headers can
  lead to denial of service (boo#1220403)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-04"/>
	<updated date="2024-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1220403">SUSE bug 1220403</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-23837/">CVE-2024-23837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23837">CVE-2024-23837 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009864048" comment="libhtp-devel-0.5.42-bp156.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864049" comment="libhtp2-0.5.42-bp156.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4034" version="1" class="patch">
	<metadata>
		<title>Security update for plasma5-workspace (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1225774" ref_url="https://bugzilla.suse.com/1225774" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-36041" ref_url="https://www.suse.com/security/cve/CVE-2024-36041/" source="CVE"/>
		<description>
This update for plasma5-workspace fixes the following issues:

- CVE-2024-36041: Fixed an authentication issue where unauthorized users can access session manager (boo#1225774).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-06"/>
	<updated date="2024-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1225774">SUSE bug 1225774</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36041/">CVE-2024-36041 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36041">CVE-2024-36041 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009864161" comment="gmenudbusmenuproxy-5.27.9-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864162" comment="plasma5-session-5.27.9-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864163" comment="plasma5-session-wayland-5.27.9-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864164" comment="plasma5-workspace-5.27.9-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864165" comment="plasma5-workspace-devel-5.27.9-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864166" comment="plasma5-workspace-lang-5.27.9-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864167" comment="plasma5-workspace-libs-5.27.9-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864168" comment="xembedsniproxy-5.27.9-bp155.2.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4035" version="1" class="patch">
	<metadata>
		<title>Security update for nano (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226099" ref_url="https://bugzilla.suse.com/1226099" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-5742" ref_url="https://www.suse.com/security/cve/CVE-2024-5742/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0157-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GBANP4TJZOYQBX7QCCMXMTPLJ7XCVTTU/" source="SUSE-SU"/>
		<description>
This update for nano fixes the following issues:

- CVE-2024-5742: Avoid privilege escalations via symlink attacks on emergency save file (boo#1226099)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-11"/>
	<updated date="2024-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1226099">SUSE bug 1226099</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-5742/">CVE-2024-5742 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5742">CVE-2024-5742 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865335" comment="nano-7.2-bp156.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865336" comment="nano-lang-7.2-bp156.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4036" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2024-0222" ref_url="https://www.suse.com/security/cve/CVE-2024-0222/" source="CVE"/>
		<reference ref_id="CVE-2024-0223" ref_url="https://www.suse.com/security/cve/CVE-2024-0223/" source="CVE"/>
		<reference ref_id="CVE-2024-0224" ref_url="https://www.suse.com/security/cve/CVE-2024-0224/" source="CVE"/>
		<reference ref_id="CVE-2024-0225" ref_url="https://www.suse.com/security/cve/CVE-2024-0225/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0016-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UY4JPWBKZYYGRANOGGULA6VZCO66CVNC/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

opera was updated to 106.0.4998.28

  * CHR-9566 Update Chromium on desktop-stable-120-4998 to
    120.0.6099.200
  * DNA-113161 [Weather] 'Weather Location' description is almost
    invisible in dark mode
  * DNA-113351 'Previous tile' should be the same size
    as 'next tile'
  * DNA-113443 Crash at opera::ComponentTabCyclerView::
    HighlightContents(content::WebContents*, bool)
  * DNA-114170 [Google Meet][Tab] Links from Google Meet open
    as blank tabs till change workspace

- The update to chromium 120.0.6099.200 fixes following issues:
  CVE-2024-0222, CVE-2024-0223, CVE-2024-0224, CVE-2024-0225
    
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-10"/>
	<updated date="2024-01-10"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0222/">CVE-2024-0222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0222">CVE-2024-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0223/">CVE-2024-0223 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0223">CVE-2024-0223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0224/">CVE-2024-0224 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0224">CVE-2024-0224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0225/">CVE-2024-0225 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0225">CVE-2024-0225 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819171" comment="opera-106.0.4998.28-lp155.3.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4037" version="1" class="patch">
	<metadata>
		<title>Security update for gdcm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223398" ref_url="https://bugzilla.suse.com/1223398" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-22373" ref_url="https://www.suse.com/security/cve/CVE-2024-22373/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0167-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OVC3YQG7DFW4JG5KA2OTCA2FXYQHJQXJ/" source="SUSE-SU"/>
		<description>
This update for gdcm fixes the following issues:

- CVE-2024-22373: Fixed out-of-bounds write vulnerability in JPEG2000Codec::DecodeByStreamsCommon (boo#1223398).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-18"/>
	<updated date="2024-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223398">SUSE bug 1223398</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22373/">CVE-2024-22373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22373">CVE-2024-22373 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009867981" comment="gdcm-3.0.24-bp155.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867982" comment="gdcm-applications-3.0.24-bp155.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867983" comment="gdcm-devel-3.0.24-bp155.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867984" comment="gdcm-examples-3.0.24-bp155.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867985" comment="libgdcm3_0-3.0.24-bp155.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867986" comment="libsocketxx1_2-3.0.24-bp155.2.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867987" comment="python3-gdcm-3.0.24-bp155.2.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4038" version="1" class="patch">
	<metadata>
		<title>Security update for python-django-grappelli (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216481" ref_url="https://bugzilla.suse.com/1216481" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46898" ref_url="https://www.suse.com/security/cve/CVE-2021-46898/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0017-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GF4HWC4HAGFXA56AYL7TL7B3KA2SM45/" source="SUSE-SU"/>
		<description>
This update for python-django-grappelli fixes the following issues:

Update to 2.14.4:

- CVE-2021-46898: Fixed views/switch.py vulnerable to protocol-relative URL attacks (boo#1216481)
- Fixed: Redirect with switch user.
- Improved: Remove extra filtering in AutocompleteLookup.
- Improved: Added import statement with URLs for quickstart docs.
- Improved: Added additional blocks with inlines to allow override.
- Fixed: Compatibility with Django 3.1.
- Fixed: Docs about adding Grappelli documentation URLS.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-11"/>
	<updated date="2024-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216481">SUSE bug 1216481</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46898/">CVE-2021-46898 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46898">CVE-2021-46898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819233" comment="python3-django-grappelli-2.14.4-bp155.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4039" version="1" class="patch">
	<metadata>
		<title>Security update for python-Js2Py (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226660" ref_url="https://bugzilla.suse.com/1226660" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-28397" ref_url="https://www.suse.com/security/cve/CVE-2024-28397/" source="CVE"/>
		<description>
This update for python-Js2Py fixes the following issues:

- CVE-2024-28397: Fixed an issue in the component js2py.disable_pyimport() of js2py up to v0.74 allows attackers to execute arbitrary code via a crafted API call.
  (boo#1226660, gh#PiotrDabkowski/Js2Py#323)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-04"/>
	<updated date="2024-07-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1226660">SUSE bug 1226660</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-28397/">CVE-2024-28397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28397">CVE-2024-28397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871420" comment="python3-Js2Py-0.70-bp155.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4040" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2024-5493" ref_url="https://www.suse.com/security/cve/CVE-2024-5493/" source="CVE"/>
		<reference ref_id="CVE-2024-5494" ref_url="https://www.suse.com/security/cve/CVE-2024-5494/" source="CVE"/>
		<reference ref_id="CVE-2024-5495" ref_url="https://www.suse.com/security/cve/CVE-2024-5495/" source="CVE"/>
		<reference ref_id="CVE-2024-5496" ref_url="https://www.suse.com/security/cve/CVE-2024-5496/" source="CVE"/>
		<reference ref_id="CVE-2024-5497" ref_url="https://www.suse.com/security/cve/CVE-2024-5497/" source="CVE"/>
		<reference ref_id="CVE-2024-5498" ref_url="https://www.suse.com/security/cve/CVE-2024-5498/" source="CVE"/>
		<reference ref_id="CVE-2024-5499" ref_url="https://www.suse.com/security/cve/CVE-2024-5499/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0187-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6B5SLGYT6SKW4EUYZ5XLYQG66Y433XMH/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

- Update to 111.0.5168.43

  * DNA-115228 Adblocker is blocking ads when turned off
  * DNA-116605 Crash at opera::BrowserContentsView::
    NonClientHitTestPoint(gfx::Point const&amp;)
  * DNA-116855 Cannot close tab island’s tab when popup
    was hovered
  * DNA-116885 Add chrome.cookies api permission to Rich Hints
  * DNA-116948 [Linux] Theme toggle in settings is not working

- Update to 111.0.5168.25

  * CHR-9754 Update Chromium on desktop-stable-125-5168 to
    125.0.6422.142
  * DNA-116089 [Win/Lin] Fullscreen view has rounded corners
  * DNA-116208 The red dot on the Aria’s icon is misaligned
  * DNA-116693 X (twitter) logo is not available on
    opera:about page
  * DNA-116737 [Bookmarks] Bookmarks bar favicon have light
    theme color in new window
  * DNA-116769 Extension popup – pin icon is replaced
  * DNA-116850 Fix full package installer link
  * DNA-116852 Promote 111 to stable
  * DNA-116491 Site info popup is cut with dropdown opened
  * DNA-116661 [opera:settings] IPFS/IPNS Gateway box has the
    wrong design
  * DNA-116789 Translations for O111
  * DNA-116813 [React emoji picker] Flag emojis are not load
    correctly
  * DNA-116893 Put 'Show emojis in tab tooltip' in Settings
  * DNA-116918 Translations for 'Show emojis in tab tooltip'
- Complete Opera 111 changelog at:
  https://blogs.opera.com/desktop/changelog-for-111
- The update to chromium 125.0.6422.142 fixes following issues:
  CVE-2024-5493, CVE-2024-5494, CVE-2024-5495, CVE-2024-5496,
  CVE-2024-5497, CVE-2024-5498, CVE-2024-5499

- Update to 110.0.5130.64

  * CHR-9748 Update Chromium on desktop-stable-124-5130
    to 124.0.6367.243
  * DNA-116317 Create outline or shadow around emojis on tab strip
  * DNA-116320 Create animation for emoji disappearing from
    tab strip
  * DNA-116564 Assign custom emoji from emoji picker
  * DNA-116690 Make chrome://emoji-picker attachable by webdriver
  * DNA-116732 Introduce stat event for setting / unsetting emoji
    on a tab
  * DNA-116753 Emoji picker does not follow browser theme
  * DNA-116755 Record tab emojis added / removed
  * DNA-116777 Enable #tab-art on all streams

- Update to 110.0.5130.49

  * CHR-9416 Updating Chromium on desktop-stable-* branches
  * DNA-116706 [gpu-crash] Crash at SkGpuShaderImageFilter::
    onFilterImage(skif::Context const&amp;)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-06"/>
	<updated date="2024-07-06"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5493/">CVE-2024-5493 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5493">CVE-2024-5493 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5494/">CVE-2024-5494 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5494">CVE-2024-5494 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5495/">CVE-2024-5495 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5495">CVE-2024-5495 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5496/">CVE-2024-5496 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5496">CVE-2024-5496 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5497/">CVE-2024-5497 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5497">CVE-2024-5497 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5498/">CVE-2024-5498 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5498">CVE-2024-5498 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5499/">CVE-2024-5499 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5499">CVE-2024-5499 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871635" comment="opera-111.0.5168.43-lp155.3.51.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4041" version="1" class="patch">
	<metadata>
		<title>Security update for keybase-client (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213928" ref_url="https://bugzilla.suse.com/1213928" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-29408" ref_url="https://www.suse.com/security/cve/CVE-2023-29408/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0194-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKFUM343ZIFFU5562L2AAJWE2OVIJBOH/" source="SUSE-SU"/>
		<description>
This update for keybase-client fixes the following issues:

Update to version 6.2.8


  * Update client CA
  * Fix incomplete locking in config file handling.

- Update the Image dependency to address CVE-2023-29408 /
  boo#1213928. This is done via the new update-image-tiff.patch.
- Limit parallel test execution as that seems to cause failing
  builds on OBS that don't occur locally.
- Integrate KBFS packages previously build via own source package
  * Upstream integrated these into the same source.
  * Also includes adding kbfs-related patches
    ensure-mount-dir-exists.patch and
    ensure-service-stop-unmounts-filesystem.patch.
- Upgrade Go version used for compilation to 1.19.
- Use Systemd unit file from upstream source.

		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-08"/>
	<updated date="2024-07-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213928">SUSE bug 1213928</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-29408/">CVE-2023-29408 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29408">CVE-2023-29408 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009871645" comment="kbfs-6.2.8-bp156.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871646" comment="kbfs-git-6.2.8-bp156.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871647" comment="kbfs-tool-6.2.8-bp156.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871648" comment="keybase-client-6.2.8-bp156.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4042" version="1" class="patch">
	<metadata>
		<title>Security update for obs-service-download_url (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227203" ref_url="https://bugzilla.suse.com/1227203" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-22033" ref_url="https://www.suse.com/security/cve/CVE-2024-22033/" source="CVE"/>
		<description>
This update for obs-service-download_url fixes the following issues:

Update to version 0.2.1:

* CVE-2024-22033: fixed argument parsing to avoid argument injection (boo#1227203)

Update to version 0.2.0:

* BREAKING CHANGE: enable sslvalidation by default
* Fix filename option
* added new parameter 'download-manifest' for bulk downloads
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-15"/>
	<updated date="2024-07-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1227203">SUSE bug 1227203</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-22033/">CVE-2024-22033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22033">CVE-2024-22033 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873751" comment="obs-service-download_url-0.2.1-bp155.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4043" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2023-6702" ref_url="https://www.suse.com/security/cve/CVE-2023-6702/" source="CVE"/>
		<reference ref_id="CVE-2023-6703" ref_url="https://www.suse.com/security/cve/CVE-2023-6703/" source="CVE"/>
		<reference ref_id="CVE-2023-6704" ref_url="https://www.suse.com/security/cve/CVE-2023-6704/" source="CVE"/>
		<reference ref_id="CVE-2023-6705" ref_url="https://www.suse.com/security/cve/CVE-2023-6705/" source="CVE"/>
		<reference ref_id="CVE-2023-6706" ref_url="https://www.suse.com/security/cve/CVE-2023-6706/" source="CVE"/>
		<reference ref_id="CVE-2023-6707" ref_url="https://www.suse.com/security/cve/CVE-2023-6707/" source="CVE"/>
		<reference ref_id="CVE-2023-7024" ref_url="https://www.suse.com/security/cve/CVE-2023-7024/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0002-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VWYDR5IRDSRWPDVGKEHNOCDDHSTCOAQ7/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

- Update to 106.0.4998.19
  * CHR-9416 Updating Chromium on desktop-stable-* branches
  * DNA-113887 Translations for O106
- The update to chromium 120.0.6099.130 fixes following issues:
  CVE-2023-7024

- Update to 106.0.4998.16
  * CHR-9553 Update Chromium on desktop-stable-120-4998 to
    120.0.6099.109
  * DNA-112522 'Find in page' option does not show text cursor
  * DNA-113349 Lucid mode strength in full settings bar is
    visible only after change
  * DNA-113462 Crash at opera::fcm::FcmRegistrationServiceImpl::
    RemoveTokenObserverForClient(opera::fcm::FcmClient*,
    syncer::FCMRegistrationTokenObserver*)
  * DNA-113748 Split preview shows on videoconferencing
  * DNA-114091 Promote 106 to stable
- Complete Opera 106 changelog at:
  https://blogs.opera.com/desktop/changelog-for-106/
- The update to chromium 120.0.6099.109 fixes following issues: 
  CVE-2023-6702, CVE-2023-6703, CVE-2023-6704, CVE-2023-6705,
  CVE-2023-6706, CVE-2023-6707

- Update to 105.0.4970.48
  * DNA-112522 'Find in page' option does not show text cursor
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-01"/>
	<updated date="2024-01-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6702/">CVE-2023-6702 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6702">CVE-2023-6702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6703/">CVE-2023-6703 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6703">CVE-2023-6703 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6704/">CVE-2023-6704 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6704">CVE-2023-6704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6705/">CVE-2023-6705 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6705">CVE-2023-6705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6706/">CVE-2023-6706 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6706">CVE-2023-6706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6707/">CVE-2023-6707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6707">CVE-2023-6707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-7024/">CVE-2023-7024 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7024">CVE-2023-7024 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818387" comment="opera-106.0.4998.19-lp155.3.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4044" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217839" ref_url="https://bugzilla.suse.com/1217839" source="BUGZILLA"/>
		<reference ref_id="1218048" ref_url="https://bugzilla.suse.com/1218048" source="BUGZILLA"/>
		<reference ref_id="1218302" ref_url="https://bugzilla.suse.com/1218302" source="BUGZILLA"/>
		<reference ref_id="1218303" ref_url="https://bugzilla.suse.com/1218303" source="BUGZILLA"/>
		<reference ref_id="1218533" ref_url="https://bugzilla.suse.com/1218533" source="BUGZILLA"/>
		<reference ref_id="1218719" ref_url="https://bugzilla.suse.com/1218719" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-6508" ref_url="https://www.suse.com/security/cve/CVE-2023-6508/" source="CVE"/>
		<reference ref_id="CVE-2023-6509" ref_url="https://www.suse.com/security/cve/CVE-2023-6509/" source="CVE"/>
		<reference ref_id="CVE-2023-6510" ref_url="https://www.suse.com/security/cve/CVE-2023-6510/" source="CVE"/>
		<reference ref_id="CVE-2023-6511" ref_url="https://www.suse.com/security/cve/CVE-2023-6511/" source="CVE"/>
		<reference ref_id="CVE-2023-6512" ref_url="https://www.suse.com/security/cve/CVE-2023-6512/" source="CVE"/>
		<reference ref_id="CVE-2023-6702" ref_url="https://www.suse.com/security/cve/CVE-2023-6702/" source="CVE"/>
		<reference ref_id="CVE-2023-6703" ref_url="https://www.suse.com/security/cve/CVE-2023-6703/" source="CVE"/>
		<reference ref_id="CVE-2023-6704" ref_url="https://www.suse.com/security/cve/CVE-2023-6704/" source="CVE"/>
		<reference ref_id="CVE-2023-6705" ref_url="https://www.suse.com/security/cve/CVE-2023-6705/" source="CVE"/>
		<reference ref_id="CVE-2023-6706" ref_url="https://www.suse.com/security/cve/CVE-2023-6706/" source="CVE"/>
		<reference ref_id="CVE-2023-6707" ref_url="https://www.suse.com/security/cve/CVE-2023-6707/" source="CVE"/>
		<reference ref_id="CVE-2023-7024" ref_url="https://www.suse.com/security/cve/CVE-2023-7024/" source="CVE"/>
		<reference ref_id="CVE-2024-0222" ref_url="https://www.suse.com/security/cve/CVE-2024-0222/" source="CVE"/>
		<reference ref_id="CVE-2024-0223" ref_url="https://www.suse.com/security/cve/CVE-2024-0223/" source="CVE"/>
		<reference ref_id="CVE-2024-0224" ref_url="https://www.suse.com/security/cve/CVE-2024-0224/" source="CVE"/>
		<reference ref_id="CVE-2024-0225" ref_url="https://www.suse.com/security/cve/CVE-2024-0225/" source="CVE"/>
		<reference ref_id="CVE-2024-0333" ref_url="https://www.suse.com/security/cve/CVE-2024-0333/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2KWUFI7NWEEY53YIAANSM3OSYVP7LTDM/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

- Chromium 120.0.6099.216 (boo#1217839, boo#1218048, boo#1218302,
  boo#1218533, boo#1218719)

  * CVE-2024-0333: Insufficient data validation in Extensions
  * CVE-2024-0222: Use after free in ANGLE
  * CVE-2024-0223: Heap buffer overflow in ANGLE
  * CVE-2024-0224: Use after free in WebAudio
  * CVE-2024-0225: Use after free in WebGPU
  * CVE-2023-7024: Heap buffer overflow in WebRTC
  * CVE-2023-6702: Type Confusion in V8
  * CVE-2023-6703: Use after free in Blink
  * CVE-2023-6704: Use after free in libavif (boo#1218303)
  * CVE-2023-6705: Use after free in WebRTC
  * CVE-2023-6706: Use after free in FedCM
  * CVE-2023-6707: Use after free in CSS
  * CVE-2023-6508: Use after free in Media Stream
  * CVE-2023-6509: Use after free in Side Panel Search
  * CVE-2023-6510: Use after free in Media Capture
  * CVE-2023-6511: Inappropriate implementation in Autofill
  * CVE-2023-6512: Inappropriate implementation in Web Browser UI

		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-16"/>
	<updated date="2024-01-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217839">SUSE bug 1217839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218048">SUSE bug 1218048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218302">SUSE bug 1218302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218303">SUSE bug 1218303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218533">SUSE bug 1218533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218719">SUSE bug 1218719</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6508/">CVE-2023-6508 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6508">CVE-2023-6508 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6509/">CVE-2023-6509 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6509">CVE-2023-6509 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6510/">CVE-2023-6510 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6510">CVE-2023-6510 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6511/">CVE-2023-6511 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6511">CVE-2023-6511 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6512/">CVE-2023-6512 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6512">CVE-2023-6512 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6702/">CVE-2023-6702 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6702">CVE-2023-6702 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6703/">CVE-2023-6703 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6703">CVE-2023-6703 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6704/">CVE-2023-6704 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6704">CVE-2023-6704 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6705/">CVE-2023-6705 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6705">CVE-2023-6705 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6706/">CVE-2023-6706 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6706">CVE-2023-6706 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6707/">CVE-2023-6707 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6707">CVE-2023-6707 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-7024/">CVE-2023-7024 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7024">CVE-2023-7024 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0222/">CVE-2024-0222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0222">CVE-2024-0222 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0223/">CVE-2024-0223 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0223">CVE-2024-0223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0224/">CVE-2024-0224 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0224">CVE-2024-0224 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0225/">CVE-2024-0225 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0225">CVE-2024-0225 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0333/">CVE-2024-0333 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0333">CVE-2024-0333 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009819596" comment="chromedriver-120.0.6099.216-bp155.2.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819597" comment="chromium-120.0.6099.216-bp155.2.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4045" version="1" class="patch">
	<metadata>
		<title>Security update for Botan (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227238" ref_url="https://bugzilla.suse.com/1227238" source="BUGZILLA"/>
		<reference ref_id="1227607" ref_url="https://bugzilla.suse.com/1227607" source="BUGZILLA"/>
		<reference ref_id="1227608" ref_url="https://bugzilla.suse.com/1227608" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-34702" ref_url="https://www.suse.com/security/cve/CVE-2024-34702/" source="CVE"/>
		<reference ref_id="CVE-2024-34703" ref_url="https://www.suse.com/security/cve/CVE-2024-34703/" source="CVE"/>
		<reference ref_id="CVE-2024-39312" ref_url="https://www.suse.com/security/cve/CVE-2024-39312/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0201-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6IOSLFSD2TJGWL4XB37VIQSVW7SPG2IP/" source="SUSE-SU"/>
		<description>
This update for Botan fixes the following issues:

Update to 2.19.5:

* Fix multiple Denial of service attacks due to X.509 cert processing:
* CVE-2024-34702 - boo#1227238
* CVE-2024-34703 - boo#1227607
* CVE-2024-39312 - boo#1227608
* Fix a crash in OCB
* Fix a test failure in compression with certain versions of zlib 
* Fix some iterator debugging errors in TLS CBC decryption. 
* Avoid a miscompilation in ARIA when using XCode 14 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-16"/>
	<updated date="2024-07-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1227238">SUSE bug 1227238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227607">SUSE bug 1227607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227608">SUSE bug 1227608</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-34702/">CVE-2024-34702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34702">CVE-2024-34702 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-34703/">CVE-2024-34703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34703">CVE-2024-34703 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-39312/">CVE-2024-39312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39312">CVE-2024-39312 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874034" comment="Botan-2.19.5-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874035" comment="Botan-doc-2.19.5-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874036" comment="libbotan-2-19-2.19.5-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874037" comment="libbotan-2-19-32bit-2.19.5-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874038" comment="libbotan-2-19-64bit-2.19.5-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874039" comment="libbotan-devel-2.19.5-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874040" comment="libbotan-devel-32bit-2.19.5-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874041" comment="libbotan-devel-64bit-2.19.5-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874042" comment="python3-botan-2.19.5-bp155.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4046" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226170" ref_url="https://bugzilla.suse.com/1226170" source="BUGZILLA"/>
		<reference ref_id="1226205" ref_url="https://bugzilla.suse.com/1226205" source="BUGZILLA"/>
		<reference ref_id="1226504" ref_url="https://bugzilla.suse.com/1226504" source="BUGZILLA"/>
		<reference ref_id="1226933" ref_url="https://bugzilla.suse.com/1226933" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-5830" ref_url="https://www.suse.com/security/cve/CVE-2024-5830/" source="CVE"/>
		<reference ref_id="CVE-2024-5831" ref_url="https://www.suse.com/security/cve/CVE-2024-5831/" source="CVE"/>
		<reference ref_id="CVE-2024-5832" ref_url="https://www.suse.com/security/cve/CVE-2024-5832/" source="CVE"/>
		<reference ref_id="CVE-2024-5833" ref_url="https://www.suse.com/security/cve/CVE-2024-5833/" source="CVE"/>
		<reference ref_id="CVE-2024-5834" ref_url="https://www.suse.com/security/cve/CVE-2024-5834/" source="CVE"/>
		<reference ref_id="CVE-2024-5835" ref_url="https://www.suse.com/security/cve/CVE-2024-5835/" source="CVE"/>
		<reference ref_id="CVE-2024-5836" ref_url="https://www.suse.com/security/cve/CVE-2024-5836/" source="CVE"/>
		<reference ref_id="CVE-2024-5837" ref_url="https://www.suse.com/security/cve/CVE-2024-5837/" source="CVE"/>
		<reference ref_id="CVE-2024-5838" ref_url="https://www.suse.com/security/cve/CVE-2024-5838/" source="CVE"/>
		<reference ref_id="CVE-2024-5839" ref_url="https://www.suse.com/security/cve/CVE-2024-5839/" source="CVE"/>
		<reference ref_id="CVE-2024-5840" ref_url="https://www.suse.com/security/cve/CVE-2024-5840/" source="CVE"/>
		<reference ref_id="CVE-2024-5841" ref_url="https://www.suse.com/security/cve/CVE-2024-5841/" source="CVE"/>
		<reference ref_id="CVE-2024-5842" ref_url="https://www.suse.com/security/cve/CVE-2024-5842/" source="CVE"/>
		<reference ref_id="CVE-2024-5843" ref_url="https://www.suse.com/security/cve/CVE-2024-5843/" source="CVE"/>
		<reference ref_id="CVE-2024-5844" ref_url="https://www.suse.com/security/cve/CVE-2024-5844/" source="CVE"/>
		<reference ref_id="CVE-2024-5845" ref_url="https://www.suse.com/security/cve/CVE-2024-5845/" source="CVE"/>
		<reference ref_id="CVE-2024-5846" ref_url="https://www.suse.com/security/cve/CVE-2024-5846/" source="CVE"/>
		<reference ref_id="CVE-2024-5847" ref_url="https://www.suse.com/security/cve/CVE-2024-5847/" source="CVE"/>
		<reference ref_id="CVE-2024-6100" ref_url="https://www.suse.com/security/cve/CVE-2024-6100/" source="CVE"/>
		<reference ref_id="CVE-2024-6101" ref_url="https://www.suse.com/security/cve/CVE-2024-6101/" source="CVE"/>
		<reference ref_id="CVE-2024-6102" ref_url="https://www.suse.com/security/cve/CVE-2024-6102/" source="CVE"/>
		<reference ref_id="CVE-2024-6103" ref_url="https://www.suse.com/security/cve/CVE-2024-6103/" source="CVE"/>
		<reference ref_id="CVE-2024-6290" ref_url="https://www.suse.com/security/cve/CVE-2024-6290/" source="CVE"/>
		<reference ref_id="CVE-2024-6291" ref_url="https://www.suse.com/security/cve/CVE-2024-6291/" source="CVE"/>
		<reference ref_id="CVE-2024-6292" ref_url="https://www.suse.com/security/cve/CVE-2024-6292/" source="CVE"/>
		<reference ref_id="CVE-2024-6293" ref_url="https://www.suse.com/security/cve/CVE-2024-6293/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0204-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M5T6NMGYYELQHJOU75BSCQDFQVQRR5I7/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 126.0.6478.126 (boo#1226504, boo#1226205, boo#1226933)

  * CVE-2024-6290: Use after free in Dawn
  * CVE-2024-6291: Use after free in Swiftshader
  * CVE-2024-6292: Use after free in Dawn
  * CVE-2024-6293: Use after free in Dawn
  * CVE-2024-6100: Type Confusion in V8
  * CVE-2024-6101: Inappropriate implementation in WebAssembly
  * CVE-2024-6102: Out of bounds memory access in Dawn
  * CVE-2024-6103: Use after free in Dawn
  * CVE-2024-5830: Type Confusion in V8
  * CVE-2024-5831: Use after free in Dawn
  * CVE-2024-5832: Use after free in Dawn
  * CVE-2024-5833: Type Confusion in V8
  * CVE-2024-5834: Inappropriate implementation in Dawn
  * CVE-2024-5835: Heap buffer overflow in Tab Groups
  * CVE-2024-5836: Inappropriate Implementation in DevTools
  * CVE-2024-5837: Type Confusion in V8
  * CVE-2024-5838: Type Confusion in V8
  * CVE-2024-5839: Inappropriate Implementation in Memory Allocator
  * CVE-2024-5840: Policy Bypass in CORS
  * CVE-2024-5841: Use after free in V8
  * CVE-2024-5842: Use after free in Browser UI
  * CVE-2024-5843: Inappropriate implementation in Downloads
  * CVE-2024-5844: Heap buffer overflow in Tab Strip
  * CVE-2024-5845: Use after free in Audio
  * CVE-2024-5846: Use after free in PDFium
  * CVE-2024-5847: Use after free in PDFium

- Amend fix_building_widevinecdm_with_chromium.patch to allow
  Widevine on ARM64 (boo#1226170)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-18"/>
	<updated date="2024-07-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1226170">SUSE bug 1226170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226205">SUSE bug 1226205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226504">SUSE bug 1226504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226933">SUSE bug 1226933</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5830/">CVE-2024-5830 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5830">CVE-2024-5830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5831/">CVE-2024-5831 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5831">CVE-2024-5831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5832/">CVE-2024-5832 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5832">CVE-2024-5832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5833/">CVE-2024-5833 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5833">CVE-2024-5833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5834/">CVE-2024-5834 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5834">CVE-2024-5834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5835/">CVE-2024-5835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5835">CVE-2024-5835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5836/">CVE-2024-5836 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5836">CVE-2024-5836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5837/">CVE-2024-5837 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5837">CVE-2024-5837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5838/">CVE-2024-5838 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5838">CVE-2024-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5839/">CVE-2024-5839 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5839">CVE-2024-5839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5840/">CVE-2024-5840 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5840">CVE-2024-5840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5841/">CVE-2024-5841 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5841">CVE-2024-5841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5842/">CVE-2024-5842 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5842">CVE-2024-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5843/">CVE-2024-5843 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5843">CVE-2024-5843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5844/">CVE-2024-5844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5844">CVE-2024-5844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5845/">CVE-2024-5845 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5845">CVE-2024-5845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5846/">CVE-2024-5846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5846">CVE-2024-5846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5847/">CVE-2024-5847 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5847">CVE-2024-5847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6100/">CVE-2024-6100 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6100">CVE-2024-6100 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6101/">CVE-2024-6101 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6101">CVE-2024-6101 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6102/">CVE-2024-6102 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6102">CVE-2024-6102 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6103/">CVE-2024-6103 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6103">CVE-2024-6103 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6290/">CVE-2024-6290 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6290">CVE-2024-6290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6291/">CVE-2024-6291 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6291">CVE-2024-6291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6292/">CVE-2024-6292 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6292">CVE-2024-6292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6293/">CVE-2024-6293 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6293">CVE-2024-6293 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874751" comment="chromedriver-126.0.6478.126-bp156.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874752" comment="chromium-126.0.6478.126-bp156.2.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4047" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2024-5830" ref_url="https://www.suse.com/security/cve/CVE-2024-5830/" source="CVE"/>
		<reference ref_id="CVE-2024-5831" ref_url="https://www.suse.com/security/cve/CVE-2024-5831/" source="CVE"/>
		<reference ref_id="CVE-2024-5832" ref_url="https://www.suse.com/security/cve/CVE-2024-5832/" source="CVE"/>
		<reference ref_id="CVE-2024-5833" ref_url="https://www.suse.com/security/cve/CVE-2024-5833/" source="CVE"/>
		<reference ref_id="CVE-2024-5834" ref_url="https://www.suse.com/security/cve/CVE-2024-5834/" source="CVE"/>
		<reference ref_id="CVE-2024-5835" ref_url="https://www.suse.com/security/cve/CVE-2024-5835/" source="CVE"/>
		<reference ref_id="CVE-2024-5836" ref_url="https://www.suse.com/security/cve/CVE-2024-5836/" source="CVE"/>
		<reference ref_id="CVE-2024-5837" ref_url="https://www.suse.com/security/cve/CVE-2024-5837/" source="CVE"/>
		<reference ref_id="CVE-2024-5838" ref_url="https://www.suse.com/security/cve/CVE-2024-5838/" source="CVE"/>
		<reference ref_id="CVE-2024-5839" ref_url="https://www.suse.com/security/cve/CVE-2024-5839/" source="CVE"/>
		<reference ref_id="CVE-2024-5840" ref_url="https://www.suse.com/security/cve/CVE-2024-5840/" source="CVE"/>
		<reference ref_id="CVE-2024-5841" ref_url="https://www.suse.com/security/cve/CVE-2024-5841/" source="CVE"/>
		<reference ref_id="CVE-2024-5842" ref_url="https://www.suse.com/security/cve/CVE-2024-5842/" source="CVE"/>
		<reference ref_id="CVE-2024-5843" ref_url="https://www.suse.com/security/cve/CVE-2024-5843/" source="CVE"/>
		<reference ref_id="CVE-2024-5844" ref_url="https://www.suse.com/security/cve/CVE-2024-5844/" source="CVE"/>
		<reference ref_id="CVE-2024-5845" ref_url="https://www.suse.com/security/cve/CVE-2024-5845/" source="CVE"/>
		<reference ref_id="CVE-2024-5846" ref_url="https://www.suse.com/security/cve/CVE-2024-5846/" source="CVE"/>
		<reference ref_id="CVE-2024-5847" ref_url="https://www.suse.com/security/cve/CVE-2024-5847/" source="CVE"/>
		<reference ref_id="CVE-2024-6290" ref_url="https://www.suse.com/security/cve/CVE-2024-6290/" source="CVE"/>
		<reference ref_id="CVE-2024-6291" ref_url="https://www.suse.com/security/cve/CVE-2024-6291/" source="CVE"/>
		<reference ref_id="CVE-2024-6292" ref_url="https://www.suse.com/security/cve/CVE-2024-6292/" source="CVE"/>
		<reference ref_id="CVE-2024-6293" ref_url="https://www.suse.com/security/cve/CVE-2024-6293/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NHZIGJFBH37236FBCT6ZIM4Q4SHU345J/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

- Update to 112.0.5197.25

  * CHR-9787 Update Chromium on desktop-stable-126-5197 to
    126.0.6478.127

- The update to chromium 126.0.6478.127 fixes following issues:
  CVE-2024-6290, CVE-2024-6291, CVE-2024-6292, CVE-2024-6293

- Update to 112.0.5197.24

  * CHR-9762 Update Chromium on desktop-stable-126-5197 to
    126.0.6478.62
  * DNA-117001 Crash at base::internal::check_is_test_impl
    (base::NotFatalUntil)
  * DNA-117050 [Settings][Sync] Synchronization options aren't
    visible
  * DNA-117076 [Player] Background of the icons has changed and
    the Tidal icon is now missing
  * DNA-117109 Browser freezes when trying to remove a tab
  * DNA-117181 Translations for O112
  * DNA-117202 Crash at syncer::SyncServiceImpl::NotifyObservers()
  * DNA-117295 Remove emoji names field in picker
  * DNA-117347 Start page is not rendered on first switch to
    workspace after its creation 
  * DNA-117431 Promote 112 to stable

- Complete Opera 112 changelog at:
  https://blogs.opera.com/desktop/changelog-for-112

- The update to chromium &gt;= 126.0.6478.54 fixes following issues:
  CVE-2024-5830, CVE-2024-5831, CVE-2024-5832, CVE-2024-5833,
  CVE-2024-5834, CVE-2024-5835, CVE-2024-5836, CVE-2024-5837,
  CVE-2024-5838, CVE-2024-5839, CVE-2024-5840, CVE-2024-5841,
  CVE-2024-5842, CVE-2024-5843, CVE-2024-5844, CVE-2024-5845,
  CVE-2024-5846, CVE-2024-5847

- Update to 111.0.5168.55
  * DNA-116749 Unnecessary icons in the advanced sync settings
  * DNA-116961 Evaluate #vtvd-as-platform-sw-decoder in the field
  * DNA-117003 #vtvd-as-platform-sw-decoder is not registered in
    media unittests
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-20"/>
	<updated date="2024-07-20"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5830/">CVE-2024-5830 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5830">CVE-2024-5830 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5831/">CVE-2024-5831 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5831">CVE-2024-5831 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5832/">CVE-2024-5832 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5832">CVE-2024-5832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5833/">CVE-2024-5833 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5833">CVE-2024-5833 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5834/">CVE-2024-5834 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5834">CVE-2024-5834 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5835/">CVE-2024-5835 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5835">CVE-2024-5835 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5836/">CVE-2024-5836 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5836">CVE-2024-5836 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5837/">CVE-2024-5837 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5837">CVE-2024-5837 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5838/">CVE-2024-5838 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5838">CVE-2024-5838 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5839/">CVE-2024-5839 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5839">CVE-2024-5839 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5840/">CVE-2024-5840 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5840">CVE-2024-5840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5841/">CVE-2024-5841 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5841">CVE-2024-5841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5842/">CVE-2024-5842 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5842">CVE-2024-5842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5843/">CVE-2024-5843 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5843">CVE-2024-5843 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5844/">CVE-2024-5844 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5844">CVE-2024-5844 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5845/">CVE-2024-5845 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5845">CVE-2024-5845 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5846/">CVE-2024-5846 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5846">CVE-2024-5846 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5847/">CVE-2024-5847 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5847">CVE-2024-5847 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6290/">CVE-2024-6290 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6290">CVE-2024-6290 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6291/">CVE-2024-6291 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6291">CVE-2024-6291 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6292/">CVE-2024-6292 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6292">CVE-2024-6292 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6293/">CVE-2024-6293 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6293">CVE-2024-6293 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874753" comment="opera-112.0.5197.25-lp155.3.54.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4048" version="1" class="patch">
	<metadata>
		<title>Security update for perl-Spreadsheet-ParseXLSX (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218651" ref_url="https://bugzilla.suse.com/1218651" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-22368" ref_url="https://www.suse.com/security/cve/CVE-2024-22368/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0021-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EHHPL7IKGNQCRM3NOTRZRDYWT4OKW47L/" source="SUSE-SU"/>
		<description>
This update for perl-Spreadsheet-ParseXLSX fixes the following issues:

Updated to 0.29:

   see /usr/share/doc/packages/perl-Spreadsheet-ParseXLSX/Changes

0.29:

- Fix for 'Argument '' isn't numeric in addition (+) at /usr/local/shar…
- Incorrect cell values due to phonetic data doy#72
- Fix die message in parse()
- Cannot open password protected SHA1 encrypted files. doy#68
- use date format detection based on Spreadsheet::XLSX
- Add rudimentary support for hyperlinks in cells

0.28:

- CVE-2024-22368: out-of-memory condition during parsing of a crafted XLSX document (boo#1218651)

- Fix possible memory bomb as reported in https://github.com/haile01/perl_spreadsheet_excel_rce_poc/blob/main/parse_xlsx_bomb.md
- Updated Dist::Zilla configuration fixing deprecation warnings
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-16"/>
	<updated date="2024-01-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218651">SUSE bug 1218651</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22368/">CVE-2024-22368 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22368">CVE-2024-22368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819598" comment="perl-Spreadsheet-ParseXLSX-0.290.0-bp155.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4049" version="1" class="patch">
	<metadata>
		<title>Security update for global (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226420" ref_url="https://bugzilla.suse.com/1226420" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-38448" ref_url="https://www.suse.com/security/cve/CVE-2024-38448/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0210-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6T6VB4GY63XJU4MTLJTP4WHTMYJFMEGF/" source="SUSE-SU"/>
		<description>
This update for global fixes the following issues:

- CVE-2024-38448: htags may allow code execution via untrusted dbpath (boo#1226420)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1226420">SUSE bug 1226420</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-38448/">CVE-2024-38448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38448">CVE-2024-38448 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875030" comment="global-6.6.9-bp156.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4050" version="1" class="patch">
	<metadata>
		<title>Security update for caddy (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222468" ref_url="https://bugzilla.suse.com/1222468" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45142" ref_url="https://www.suse.com/security/cve/CVE-2023-45142/" source="CVE"/>
		<reference ref_id="CVE-2024-22189" ref_url="https://www.suse.com/security/cve/CVE-2024-22189/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0211-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4POHOO6U2FW5XKZT7HPGZAJF7LQQW3W4/" source="SUSE-SU"/>
		<description>
This update for caddy fixes the following issues:

Update to version 2.8.4:

  * cmd: fix regression in auto-detect of Caddyfile (#6362)
  * Tag v2.8.3 was mistakenly made on the v2.8.2 commit and is skipped

Update to version 2.8.2:

  * cmd: fix auto-detetction of .caddyfile extension (#6356)
  * caddyhttp: properly sanitize requests for root path (#6360)
  * caddytls: Implement certmagic.RenewalInfoGetter

Update to version 2.8.1:

  * caddyhttp: Fix merging consecutive `client_ip` or `remote_ip` matchers (#6350)
  * core: MkdirAll appDataDir in InstanceID with 0o700 (#6340)

Update to version 2.8.0:

  * acmeserver: Add `sign_with_root` for Caddyfile (#6345)
  * caddyfile: Reject global request matchers earlier (#6339)
  * core: Fix bug in AppIfConfigured (fix #6336)
  * fix a typo (#6333)
  * autohttps: Move log WARN to INFO, reduce confusion (#6185)
  * reverseproxy: Support HTTP/3 transport to backend (#6312)
  * context: AppIfConfigured returns error; consider not-yet-provisioned modules (#6292)
  * Fix lint error about deprecated method in smallstep/certificates/authority
  * go.mod: Upgrade dependencies
  * caddytls: fix permission requirement with AutomationPolicy (#6328)
  * caddytls: remove ClientHelloSNICtxKey (#6326)
  * caddyhttp: Trace individual middleware handlers (#6313)
  * templates: Add `pathEscape` template function and use it in file browser (#6278)
  * caddytls: set server name in context (#6324)
  * chore: downgrade minimum Go version in go.mod (#6318)
  * caddytest: normalize the JSON config (#6316)
  * caddyhttp: New experimental handler for intercepting responses (#6232)
  * httpcaddyfile: Set challenge ports when http_port or https_port are used
  * logging: Add support for additional logger filters other than hostname (#6082)
  * caddyhttp: Log 4xx as INFO; 5xx as ERROR (close #6106)
  * caddyhttp: Alter log message when request is unhandled (close #5182)
  * reverseproxy: Pointer to struct when loading modules; remove LazyCertPool (#6307)
  * tracing: add trace_id var (`http.vars.trace_id` placeholder) (#6308)
  * go.mod: CertMagic v0.21.0
  * reverseproxy: Implement health_follow_redirects (#6302)
  * caddypki: Allow use of root CA without a key. Fixes #6290 (#6298)
  * go.mod: Upgrade to quic-go v0.43.1
  * reverseproxy: HTTP transport: fix PROXY protocol initialization (#6301)
  * caddytls: Ability to drop connections (close #6294)
  * httpcaddyfile: Fix expression matcher shortcut in snippets (#6288)
  * caddytls: Evict internal certs from cache based on issuer (#6266)
  * chore: add warn logs when using deprecated fields (#6276)
  * caddyhttp: Fix linter warning about deprecation
  * go.mod: Upgrade to quic-go v0.43.0
  * fileserver: Set 'Vary: Accept-Encoding' header (see #5849)
  * events: Add debug log
  * reverseproxy: handle buffered data during hijack (#6274)
  * ci: remove `android` and `plan9` from cross-build workflow (#6268)
  * run `golangci-lint run --fix --fast` (#6270)
  * caddytls: Option to configure certificate lifetime (#6253)
  * replacer: Implement `file.*` global replacements (#5463)
  * caddyhttp: Address some Go 1.20 features (#6252)
  * Quell linter (false positive)
  * reverse_proxy: Add grace_period for SRV upstreams to Caddyfile (#6264)
  * doc: add `verifier` in `ClientAuthentication` caddyfile marshaler doc (#6263)
  * caddytls: Add Caddyfile support for on-demand permission module (close #6260)
  * reverseproxy: Remove long-deprecated buffering properties
  * reverseproxy: Reuse buffered request body even if partially drained
  * reverseproxy: Accept EOF when buffering
  * logging: Fix default access logger (#6251)
  * fileserver: Improve Vary handling (#5849)
  * cmd: Only validate config is proper JSON if config slice has data (#6250)
  * staticresp: Use the evaluated response body for sniffing JSON content-type (#6249)
  * encode: Slight fix for the previous commit
  * encode: Improve Etag handling (fix #5849)
  * httpcaddyfile: Skip automate loader if disable_certs is specified (fix #6148)
  * caddyfile: Populate regexp matcher names by default (#6145)
  * caddyhttp: record num. bytes read when response writer is hijacked (#6173)
  * caddyhttp: Support multiple logger names per host (#6088)
  * chore: fix some typos in comments (#6243)
  * encode: Configurable compression level for zstd (#6140)
  * caddytls: Remove shim code supporting deprecated lego-dns (#6231)
  * connection policy: add `local_ip`  matcher (#6074)
  * reverseproxy: Wait for both ends of websocket to close (#6175)
  * caddytls: Upgrade ACMEz to v2; support ZeroSSL API; various fixes (#6229)
  * caddytls: Still provision permission module if ask is specified
  * fileserver: read etags from precomputed files (#6222)
  * fileserver: Escape # and ? in img src (fix #6237)
  * reverseproxy: Implement modular CA provider for TLS transport (#6065)
  * caddyhttp: Apply auto HTTPS redir to all interfaces (fix #6226)
  * cmd: Fix panic related to config filename (fix #5919)
  * cmd: Assume Caddyfile based on filename prefix and suffix (#5919)
  * admin: Make `Etag` a header, not a trailer (#6208)
  * caddyhttp: remove duplicate strings.Count in path matcher (fixes #6233) (#6234)
  * caddyconfig: Use empty struct instead of bool in map (close #6224) (#6227)
  * gitignore: Add rule for caddyfile.go (#6225)
  * chore: Fix broken links in README.md (#6223)
  * chore: Upgrade some dependencies (#6221)
  * caddyhttp: Add plaintext response to `file_server browse` (#6093)
  * admin: Use xxhash for etag (#6207)
  * modules: fix some typo in conments (#6206)
  * caddyhttp: Replace sensitive headers with REDACTED (close #5669)
  * caddyhttp: close quic connections when server closes (#6202)
  * reverseproxy: Use xxhash instead of fnv32 for LB (#6203)
  * caddyhttp: add http.request.local{,.host,.port} placeholder (#6182)
  * chore: remove repetitive word (#6193)
  * Added a null check to avoid segfault on rewrite query ops (#6191)
  * rewrite: `uri query` replace operation (#6165)
  * logging: support `ms` duration format and add docs (#6187)
  * replacer: use RWMutex to protect static provider (#6184)
  * caddyhttp: Allow `header` replacement with empty string (#6163)
  * vars: Make nil values act as empty string instead of `'&lt;nil&gt;'` (#6174)
  * chore: Update quic-go to v0.42.0 (#6176)
  * caddyhttp: Accept XFF header values with ports, when parsing client IP (#6183)
  * reverseproxy: configurable active health_passes and health_fails (#6154)
  * reverseproxy: Configurable forward proxy URL (#6114)
  * caddyhttp: upgrade to cel v0.20.0 (#6161)
  * chore: Bump Chroma to v2.13.0, includes new Caddyfile lexer (#6169)
  * caddyhttp: suppress flushing if the response is being buffered (#6150)
  * chore: encode: use FlushError instead of Flush (#6168)
  * encode: write status immediately when status code is informational (#6164)
  * httpcaddyfile: Keep deprecated `skip_log` in directive order (#6153)
  * httpcaddyfile: Add `RegisterDirectiveOrder` function for plugin authors (#5865)
  * rewrite: Implement `uri query` operations (#6120)
  * fix struct names (#6151)
  * fileserver: Preserve query during canonicalization redirect (#6109)
  * logging: Implement `log_append` handler (#6066)
  * httpcaddyfile: Allow nameless regexp placeholder shorthand (#6113)
  * logging: Implement `append` encoder, allow flatter filters config (#6069)
  * ci: fix the integration test `TestLeafCertLoaders` (#6149)
  * vars: Allow overriding `http.auth.user.id` in replacer as a special case (#6108)
  * caddytls: clientauth: leaf verifier: make trusted leaf certs source pluggable (#6050)
  * cmd: Adjust config load logs/errors (#6032)
  * reverseproxy: SRV dynamic upstream failover (#5832)
  * ci: bump golangci/golangci-lint-action from 3 to 4 (#6141)
  * core: OnExit hooks (#6128)
  * cmd: fix the output of the `Usage` section (#6138)
  * caddytls: verifier: caddyfile: re-add Caddyfile support (#6127)
  * acmeserver: add policy field to define allow/deny rules (#5796)
  * reverseproxy: cookie should be Secure and SameSite=None when TLS (#6115)
  * caddytest: Rename adapt tests to `*.caddyfiletest` extension (#6119)
  * tests: uses testing.TB interface for helper to be able to use test server in benchmarks. (#6103)
  * caddyfile: Assert having a space after heredoc marker to simply check (#6117)
  * chore: Update Chroma to get the new Caddyfile lexer (#6118)
  * reverseproxy: use context.WithoutCancel (#6116)
  * caddyfile: Reject directives in the place of site addresses (#6104)
  * caddyhttp: Register post-shutdown callbacks (#5948)
  * caddyhttp: Only attempt to enable full duplex for HTTP/1.x (#6102)
  * caddyauth: Drop support for `scrypt` (#6091)
  * Revert 'caddyfile: Reject long heredoc markers (#6098)' (#6100)
  * caddyauth: Rename `basicauth` to `basic_auth` (#6092)
  * logging: Inline Caddyfile syntax for `ip_mask` filter (#6094)
  * caddyfile: Reject long heredoc markers (#6098)
  * chore: Rename CI jobs, run on M1 mac (#6089)
  * fix: add back text/*
  * fix: add more media types to the compressed by default list
  * acmeserver: support specifying the allowed challenge types (#5794)
  * matchers: Drop `forwarded` option from `remote_ip` matcher (#6085)
  * caddyhttp: Test cases for `%2F` and `%252F` (#6084)
  * fileserver: Browse can show symlink target if enabled (#5973)
  * core: Support NO_COLOR env var to disable log coloring (#6078)
  * Update comment in setcap helper script
  * caddytls: Make on-demand 'ask' permission modular (#6055)
  * core: Add `ctx.Slogger()` which returns an `slog` logger (#5945)
  * chore: Update quic-go to v0.41.0, bump Go minimum to 1.21 (#6043)
  * chore: enabling a few more linters (#5961)
  * caddyfile: Correctly close the heredoc when the closing marker appears immediately (#6062)
  * caddyfile: Switch to slices.Equal for better performance (#6061)
  * tls: modularize trusted CA providers (#5784)
  * logging: Automatic `wrap` default for `filter` encoder (#5980)
  * caddyhttp: Fix panic when request missing ClientIPVarKey (#6040)
  * caddyfile: Normalize &amp; flatten all unmarshalers (#6037)
  * cmd: reverseproxy: log: use caddy logger (#6042)
  * matchers: `query` now ANDs multiple keys (#6054)
  * caddyfile: Add heredoc support to `fmt` command (#6056)
  * refactor: move automaxprocs init in caddycmd.Main()
  * caddyfile: Allow heredoc blank lines (#6051)
  * httpcaddyfile: Add optional status code argument to `handle_errors` directive (#5965)
  * httpcaddyfile: Rewrite `root` and `rewrite` parsing to allow omitting matcher (#5844)
  * fileserver: Implement caddyfile.Unmarshaler interface (#5850)
  * reverseproxy: Add `tls_curves` option to HTTP transport (#5851)
  * caddyhttp: Security enhancements for client IP parsing (#5805)
  * replacer: Fix escaped closing braces (#5995)
  * filesystem: Globally declared filesystems, `fs` directive (#5833)
  * ci/cd: use the build tag `nobadger` to exclude badgerdb (#6031)
  * httpcaddyfile: Fix redir &lt;to&gt; html (#6001)
  * httpcaddyfile: Support client auth verifiers (#6022)
  * tls: add reuse_private_keys (#6025)
  * reverseproxy: Only change Content-Length when full request is buffered (#5830)
  * Switch Solaris-derivatives away from listen_unix (#6021)
  * chore: check against errors of `io/fs` instead of `os` (#6011)
  * caddyhttp: support unix sockets in `caddy respond` command (#6010)
  * fileserver: Add total file size to directory listing (#6003)
  * httpcaddyfile: Fix cert file decoding to load multiple PEM in one file (#5997)
  * cmd: use automaxprocs for better perf in containers (#5711)
  * logging: Add `zap.Option` support (#5944)
  * httpcaddyfile: Sort skip_hosts for deterministic JSON (#5990)
  * metrics: Record request metrics on HTTP errors (#5979)
  * go.mod: Updated quic-go to v0.40.1 (#5983)
  * fileserver: Enable compression for command by default (#5855)
  * fileserver: New --precompressed flag (#5880)
  * caddyhttp: Add `uuid` to access logs when used (#5859)
  * proxyprotocol: use github.com/pires/go-proxyproto (#5915)
  * cmd: Preserve LastModified date when exporting storage (#5968)
  * core: Always make AppDataDir for InstanceID (#5976)
  * chore: cross-build for AIX (#5971)
  * caddytls: Sync distributed storage cleaning (#5940)
  * caddytls: Context to DecisionFunc (#5923)
  * tls: accept placeholders in string values of certificate loaders (#5963)
  * templates: Offically make templates extensible (#5939)
  * http2 uses new round-robin scheduler (#5946)
  * panic when reading from backend failed to propagate stream error (#5952)
  * chore: Bump otel to v1.21.0. (#5949)
  * httpredirectlistener: Only set read limit for when request is HTTP (#5917)
  * fileserver: Add .m4v for browse template icon
  * Revert 'caddyhttp: Use sync.Pool to reduce lengthReader allocations (#5848)' (#5924)
  * go.mod: update quic-go version to v0.40.0 (#5922)
  * update quic-go to v0.39.3 (#5918)
  * chore: Fix usage pool comment (#5916)
  * test: acmeserver: add smoke test for the ACME server directory (#5914)
  *  Upgrade acmeserver to github.com/go-chi/chi/v5 (#5913)
  * caddyhttp: Adjust `scheme` placeholder docs (#5910)
  * go.mod: Upgrade quic-go to v0.39.1
  * go.mod: CVE-2023-45142 Update opentelemetry (#5908)
  * templates: Delete headers on `httpError` to reset to clean slate (#5905)
  * httpcaddyfile: Remove port from logger names (#5881)
  * core: Apply SO_REUSEPORT to UDP sockets (#5725)
  * caddyhttp: Use sync.Pool to reduce lengthReader allocations (#5848)
  * cmd: Add newline character to version string in CLI output (#5895)
  * core: quic listener will manage the underlying socket by itself (#5749)
  * templates: Clarify `include` args docs, add `.ClientIP` (#5898)
  * httpcaddyfile: Fix TLS automation policy merging with get_certificate (#5896)
  * cmd: upgrade: resolve symlink of the executable (#5891)
  * caddyfile: Fix variadic placeholder false positive when token contains `:` (#5883)

- CVEs:
  * CVE-2024-22189 (boo#1222468)
  * CVE-2023-45142

- Remove the manual user/group provides: the package uses
  sysusers.d; the auto-provides were not working due to the broken
  go_provides.

- Provide user and group (due to RPM 4.19)
- Update caddy.sysusers to also create a group

- Update to version 2.7.6:

  * caddytls: Sync distributed storage cleaning (#5940)
  * caddytls: Context to DecisionFunc (#5923)
  * tls: accept placeholders in string values of certificate loaders (#5963)
  * templates: Offically make templates extensible (#5939)
  * http2 uses new round-robin scheduler (#5946)
  * panic when reading from backend failed to propagate stream error (#5952)
  * chore: Bump otel to v1.21.0. (#5949)
  * httpredirectlistener: Only set read limit for when request is HTTP (#5917)
  * fileserver: Add .m4v for browse template icon
  * Revert 'caddyhttp: Use sync.Pool to reduce lengthReader allocations (#5848)' (#5924)
  * go.mod: update quic-go version to v0.40.0 (#5922)
  * update quic-go to v0.39.3 (#5918)
  * chore: Fix usage pool comment (#5916)
  * test: acmeserver: add smoke test for the ACME server directory (#5914)
  * Upgrade acmeserver to github.com/go-chi/chi/v5 (#5913)
  * caddyhttp: Adjust `scheme` placeholder docs (#5910)
  * go.mod: Upgrade quic-go to v0.39.1
  * go.mod: CVE-2023-45142 Update opentelemetry (#5908)
  * templates: Delete headers on `httpError` to reset to clean slate (#5905)
  * httpcaddyfile: Remove port from logger names (#5881)
  * core: Apply SO_REUSEPORT to UDP sockets (#5725)
  * caddyhttp: Use sync.Pool to reduce lengthReader allocations (#5848)
  * cmd: Add newline character to version string in CLI output (#5895)
  * core: quic listener will manage the underlying socket by itself (#5749)
  * templates: Clarify `include` args docs, add `.ClientIP` (#5898)
  * httpcaddyfile: Fix TLS automation policy merging with get_certificate (#5896)
  * cmd: upgrade: resolve symlink of the executable (#5891)
  * caddyfile: Fix variadic placeholder false positive when token contains `:` (#5883)

- Update to version 2.7.5:

  * admin: Respond with 4xx on non-existing config path (#5870)
  * ci: Force the Go version for govulncheck (#5879)
  * fileserver: Set canonical URL on browse template (#5867)
  * tls: Add X25519Kyber768Draft00 PQ 'curve' behind build tag (#5852)
  * reverseproxy: Add more debug logs (#5793)
  * reverseproxy: Fix `least_conn` policy regression (#5862)
  * reverseproxy: Add logging for dynamic A upstreams (#5857)
  * reverseproxy: Replace health header placeholders (#5861)
  * httpcaddyfile: Sort TLS SNI matcher for deterministic JSON output (#5860)
  * cmd: Fix exiting with custom status code, add `caddy -v` (#5874)
  * reverseproxy: fix parsing Caddyfile fails for unlimited request/response buffers (#5828)
  * reverseproxy: Fix retries on 'upstreams unavailable' error (#5841)
  * httpcaddyfile: Enable TLS for catch-all site if `tls` directive is specified (#5808)
  * encode: Add `application/wasm*` to the default content types (#5869)
  * fileserver: Add command shortcuts `-l` and `-a` (#5854)
  * go.mod: Upgrade dependencies incl. x/net/http
  * templates: Add dummy `RemoteAddr` to `httpInclude` request, proxy compatibility (#5845)
  * reverseproxy: Allow fallthrough for response handlers without routes (#5780)
  * fix: caddytest.AssertResponseCode error message (#5853)
  * caddyhttp: Use LimitedReader for HTTPRedirectListener
  * fileserver: browse template SVG icons and UI tweaks (#5812)
  * reverseproxy: fix nil pointer dereference in AUpstreams.GetUpstreams (#5811)
  * httpcaddyfile: fix placeholder shorthands in named routes (#5791)
  * cmd: Prevent overwriting existing env vars with `--envfile` (#5803)
  * ci: Run govulncheck (#5790)
  * logging: query filter for array of strings (#5779)
  * logging: Clone array on log filters, prevent side-effects (#5786)
  * fileserver: Export BrowseTemplate
  * ci: ensure short-sha is exported correctly on all platforms (#5781)
  * caddyfile: Fix case where heredoc marker is empty after newline (#5769)
  * go.mod: Update quic-go to v0.38.0 (#5772)
  * chore: Appease gosec linter (#5777)
  * replacer: change timezone to UTC for 'time.now.http' placeholders (#5774)
  * caddyfile: Adjust error formatting (#5765)
  * update quic-go to v0.37.6 (#5767)
  * httpcaddyfile: Stricter errors for site and upstream address schemes (#5757)
  * caddyfile: Loosen heredoc parsing (#5761)
  * fileserver: docs: clarify the ability to produce JSON array with `browse` (#5751)
  * fix package typo (#5764)

- Switch to sysuser for user setup

Update to version 2.7.4:

  * go.mod: Upgrade CertMagic and quic-go
  * reverseproxy: Always return new upstreams (fix #5736) (#5752)
  * ci: use gci linter (#5708)
  * fileserver: Slightly more fitting icons
  * cmd: Require config for caddy validate (fix #5612) (#5614)
  * caddytls: Update docs for on-demand config
  * fileserver: Don't repeat error for invalid method inside error context (#5705)
  * ci: Update to Go 1.21 (#5719)
  * ci: Add riscv64 (64-bit RISC-V) to goreleaser (#5720)
  * go.mod: Upgrade golang.org/x/net to 0.14.0 (#5718)
  * ci: Use gofumpt to format code (#5707)
  * templates: Fix httpInclude (fix #5698)

Update to version 2.7.3:

  * go.mod: Upgrade to quic-go v0.37.3
  * cmd: Split unix sockets for admin endpoint addresses (#5696)
  * reverseproxy: do not parse upstream address too early if it contains replaceble parts (#5695)
  * caddyfile: check that matched key is not a substring of the replacement key (#5685)
  * chore: use `--clean` instead of `--rm-dist` for goreleaser (#5691)
  * go.mod: Upgrade quic-go to v0.37.2 (fix  #5680)
  * fileserver: browse: Render SVG images in grid

- Update to version 2.7.2:
  * reverseproxy: Fix hijack ordering which broke websockets (#5679)
  * httpcaddyfile: Fix `string does not match ~[]E` error (#5675)
  * encode: Fix infinite recursion (#5672)
  * caddyhttp: Make use of `http.ResponseController` (#5654)
  * go.mod: Upgrade dependencies esp. smallstep/certificates
  * core: Allow loopback hosts for admin endpoint (fix #5650) (#5664)
  * httpcaddyfile: Allow `hostnames` &amp; logger name overrides for log directive (#5643)
  * reverseproxy: Connection termination cleanup (#5663)
  * go.mod: Use quic-go 0.37.1
  * reverseproxy: Export ipVersions type (#5648)
  * go.mod: Use latest CertMagic (v0.19.1)
  * caddyhttp: Preserve original error (fix #5652)
  * fileserver: add lazy image loading (#5646)
  * go.mod: Update quic-go to v0.37.0, bump to Go 1.20 minimum (#5644)
  * core: Refine mutex during reloads (fix #5628) (#5645)
  * go.mod: update quic-go to v0.36.2 (#5636)
  * fileserver: Tweak grid view of browse template
  * fileserver: add `export-template` sub-command to `file-server` (#5630)
  * caddyfile: Fix comparing if two tokens are on the same line (#5626)
  * caddytls: Reuse certificate cache through reloads (#5623)
  * Minor tweaks to security.md
  * reverseproxy: Pointer receiver
  * caddyhttp: Trim dot/space only on Windows (fix #5613)
  * update quic-go to v0.36.1 (#5611)
  * caddyconfig: Specify config adapter for HTTP loader (close #5607)
  * core: Embed net.UDPConn to gain optimizations (#5606)
  * chore: remove deprecated property `rlcp` in goreleaser config (#5608)
  * core: Skip `chmod` for abstract unix sockets (#5596)
  * core: Add optional unix socket file permissions (#4741)
  * reverseproxy: Honor `tls_except_port` for active health checks (#5591)
  * Appease linter
  * Fix compile on Windows, hopefully
  * core: Properly preserve unix sockets (fix  #5568)
  * go.mod: Upgrade CertMagic for hotfix
  * go.mod: Upgrade some dependencies
  * chore: upgrade otel (#5586)
  * go.mod: Update quic-go to v0.36.0 (#5584)
  * reverseproxy: weighted_round_robin load balancing policy (#5579)
  * reverseproxy: Experimental streaming timeouts (#5567)
  * chore: remove refs of deprecated io/ioutil (#5576)
  * headers: Allow `&gt;` to defer shortcut for replacements (#5574)
  * caddyhttp: Support custom network for HTTP/3 (#5573)
  * reverseproxy: Fix parsing of source IP in case it's an ipv6 address (#5569)
  * fileserver: browse: Better grid layout (#5564)
  * caddytls: Clarify some JSON config docs
  * cmd: Implement storage import/export (#5532)
  * go.mod: Upgrade quic-go to 0.35.1
  * update quic-go to v0.35.0 (#5560)
  * templates: Add `readFile` action that does not evaluate templates (#5553)
  * caddyfile: Track import name instead of modifying filename (#5540)
  * core: Use SO_REUSEPORT_LB on FreeBSD (#5554)
  * caddyfile: Do not replace import tokens if they are part of a snippet (#5539)
  * fileserver: Don't set Etag if mtime is 0 or 1 (close #5548) (#5550)
  * fileserver: browse: minor tweaks for grid view, dark mode (#5545)
  * fileserver: Only set Etag if not already set (fix #5546) (#5547)
  * fileserver: Fix file browser breadcrumb font (#5543)
  * caddyhttp: Fix h3 shutdown (#5541)
  * fileserver: More filetypes for browse icons
  * fileserver: Fix file browser footer in grid mode (#5536)
  * cmd: Avoid spammy log messages (fix #5538)
  * httpcaddyfile: Sort Caddyfile slice
  * caddyhttp: Implement named routes, `invoke` directive (#5107)
  * rewrite: use escaped path, fix #5278 (#5504)
  * headers: Add &gt; Caddyfile shortcut for enabling defer (#5535)
  * go.mod: Upgrade several dependencies
  * reverseproxy: Expand port ranges to multiple upstreams in CLI + Caddyfile (#5494)
  * fileserver: Use EscapedPath for browse (#5534)
  * caddyhttp: Refactor cert Managers (fix #5415) (#5533)
  * Slightly more helpful error message
  * caddytls: Check for nil ALPN; close #5470 (#5473)
  * cmd: Reduce spammy logs from --watch
  * caddyhttp: Add a getter for Server.name (#5531)
  * caddytls: Configurable fallback SNI (#5527)
  * caddyhttp: Update quic's TLS configs after reload (#5517) (fix #4849)
  * Add doc comment about changing admin endpoint
  * feature: watch include directory (#5521)
  * chore: remove deprecated linters (#5525)
  * go.mod: Upgrade CertMagic again
  * go.mod: Upgrade CertMagic
  * reverseproxy: Optimize base case for least_conn and random_choose policies (#5487)
  * reverseproxy: Fix active health check header canonicalization, refactor (#5446)
  * reverseproxy: Add `fallback` for some policies, instead of always random (#5488)
  * logging: Actually honor the SoftStart parameter
  * logging: Soft start for net writer (close #5520)
  * fastcgi: Fix `capture_stderr` (#5515)
  * acmeserver: Configurable `resolvers`, fix smallstep deprecations (#5500)
  * go.mod: Update some dependencies
  * logging: Add traceID field to access logs when tracing is active (#5507)
  * caddyhttp: Impl `ResponseWriter.Unwrap()`, prep for Go 1.20's `ResponseController` (#5509)
  * reverseproxy: Fix reinitialize upstream healthy metrics (#5498)
  * fix some comments (#5508)
  * templates: Add `fileStat` function (#5497)
  * caddyfile: Stricter parsing, error for brace on new line (#5505)
  * core: Return default logger if no modules loaded
  * celmatcher: Implement `pkix.Name` conversion to string (#5492)
  * chore: Adjustments to CI caching (#5495)
  * reverseproxy: Remove deprecated `lookup_srv` (#5396)
  * cmd: Support `'` quotes in envfile parsing (#5437)
  * Update contributing guidelines (#5466)
  * caddyhttp: Serve http2 when listener wrapper doesn't return *tls.Conn (#4929)
  * reverseproxy: Add `query` and `client_ip_hash` lb policies (#5468)
  * cmd: Create pidfile before config load (close #5477)
  * fileserver: Add color-scheme meta tag (#5475)
  * proxyprotocol: Add PROXY protocol support to `reverse_proxy`, add HTTP listener wrapper (#5424)
  * reverseproxy: Add mention of which half a copyBuffer err comes from (#5472)
  * caddyhttp: Log request body bytes read (#5461)
  * log: Make sink logs encodable (#5441)
  * caddytls: Eval replacer on automation policy subjects (#5459)
  * headers: Support deleting all headers as first op (#5464)
  * replacer: Add HTTP time format (#5458)
  * reverseproxy: Header up/down support for CLI command (#5460)
  * caddyhttp: Determine real client IP if trusted proxies configured (#5104)
  * httpcaddyfile: Adjust path matcher sorting to solve for specificity (#5462)
  * caddytls: Zero out throttle window first (#5443)
  * ci: add `--yes` to cosign arguments (#5440)
  * reverseproxy: Reset Content-Length to prevent FastCGI from hanging (#5435)
  * caddytls: Allow on-demand w/o ask for internal-only
  * caddytls: Require 'ask' endpoint for on-demand TLS
  * fileserver: New file browse template (#5427)
  * go.mod: Upgrade dependencies
  * tracing: Support autoprop from OTEL_PROPAGATORS (#5147)
  * caddyhttp: Enable 0-RTT QUIC (#5425)
  * encode: flush status code when hijacked. (#5419)
  * fileserver: Remove trailing slash on fs filenames (#5417)
  * core: Eliminate unnecessary shutdown delay on Unix (#5413)
  * caddyhttp: Fix `vars_regexp` matcher with placeholders (#5408)
  * context: Rename func to `AppIfConfigured` (#5397)
  * reverseproxy: allow specifying ip version for dynamic `a` upstream (#5401)
  * caddyfile: Fix heredoc fuzz crasher, drop trailing newline (#5404)
  * caddyfile: Implement heredoc support (#5385)
  * cmd: Expand cobra support, add short flags (#5379)
  * ci: Update minimum Go version to 1.19
  * go.mod: Upgrade quic-go to v0.33.0 (Go 1.19 min)
  * reverseproxy: refactor HTTP transport layer (#5369)
  * caddytls: Relax the warning for on-demand (#5384)
  * cmd: Strict unmarshal for validate (#5383)
  * caddyfile: Implement variadics for import args placeholders (#5249)
  * cmd: make `caddy fmt` hints more clear (#5378)
  * cmd: Adjust documentation for commands (#5377)


- Update to version 2.6.4:

  * reverseproxy: Don't buffer chunked requests (fix #5366) (#5367)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-07-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1222468">SUSE bug 1222468</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45142/">CVE-2023-45142 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45142">CVE-2023-45142 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22189/">CVE-2024-22189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22189">CVE-2024-22189 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009875031" comment="caddy-2.8.4-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875032" comment="caddy-bash-completion-2.8.4-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875033" comment="caddy-fish-completion-2.8.4-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875034" comment="caddy-zsh-completion-2.8.4-bp155.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4051" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227979" ref_url="https://bugzilla.suse.com/1227979" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6772" ref_url="https://www.suse.com/security/cve/CVE-2024-6772/" source="CVE"/>
		<reference ref_id="CVE-2024-6773" ref_url="https://www.suse.com/security/cve/CVE-2024-6773/" source="CVE"/>
		<reference ref_id="CVE-2024-6774" ref_url="https://www.suse.com/security/cve/CVE-2024-6774/" source="CVE"/>
		<reference ref_id="CVE-2024-6775" ref_url="https://www.suse.com/security/cve/CVE-2024-6775/" source="CVE"/>
		<reference ref_id="CVE-2024-6776" ref_url="https://www.suse.com/security/cve/CVE-2024-6776/" source="CVE"/>
		<reference ref_id="CVE-2024-6777" ref_url="https://www.suse.com/security/cve/CVE-2024-6777/" source="CVE"/>
		<reference ref_id="CVE-2024-6778" ref_url="https://www.suse.com/security/cve/CVE-2024-6778/" source="CVE"/>
		<reference ref_id="CVE-2024-6779" ref_url="https://www.suse.com/security/cve/CVE-2024-6779/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0212-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RJOT7BGWYVLXOVLMKMOC32TKY7UOGTGI/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 126.0.6478.182 (boo#1227979):

- CVE-2024-6772: Inappropriate implementation in V8
- CVE-2024-6773: Type Confusion in V8
- CVE-2024-6774: Use after free in Screen Capture
- CVE-2024-6775: Use after free in Media Stream
- CVE-2024-6776: Use after free in Audio
- CVE-2024-6777: Use after free in Navigation
- CVE-2024-6778: Race in DevTools
- CVE-2024-6779: Out of bounds memory access in V8
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1227979">SUSE bug 1227979</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6772/">CVE-2024-6772 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6772">CVE-2024-6772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6773/">CVE-2024-6773 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6773">CVE-2024-6773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6774/">CVE-2024-6774 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6774">CVE-2024-6774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6775/">CVE-2024-6775 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6775">CVE-2024-6775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6776/">CVE-2024-6776 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6776">CVE-2024-6776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6777/">CVE-2024-6777 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6777">CVE-2024-6777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6778/">CVE-2024-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6778">CVE-2024-6778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6779/">CVE-2024-6779 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6779">CVE-2024-6779 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009875035" comment="chromedriver-126.0.6478.182-bp156.2.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875036" comment="chromium-126.0.6478.182-bp156.2.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4052" version="1" class="patch">
	<metadata>
		<title>Security update for python-sentry-sdk (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228128" ref_url="https://bugzilla.suse.com/1228128" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-40647" ref_url="https://www.suse.com/security/cve/CVE-2024-40647/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0214-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J6DLLMQ4P74VFN7WOQ3UL2VM6BAM22WL/" source="SUSE-SU"/>
		<description>
This update for python-sentry-sdk fixes the following issues:

- CVE-2024-40647: Do not leak environment variables to child processes. (bsc#1228128)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-23"/>
	<updated date="2024-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1228128">SUSE bug 1228128</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-40647/">CVE-2024-40647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40647">CVE-2024-40647 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875462" comment="python3-sentry-sdk-0.14.4-bp155.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4053" version="1" class="patch">
	<metadata>
		<title>Security update for exim (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227423" ref_url="https://bugzilla.suse.com/1227423" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-39929" ref_url="https://www.suse.com/security/cve/CVE-2024-39929/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0218-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3XAMVZ4QHUCDCCXUDIQEZCTUQTZA2P46/" source="SUSE-SU"/>
		<description>
This update for exim fixes the following issues:

- CVE-2024-39929: Fixed incorrect parsing of multiline rfc2231 header filename (boo#1227423).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-25"/>
	<updated date="2024-07-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1227423">SUSE bug 1227423</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-39929/">CVE-2024-39929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39929">CVE-2024-39929 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009875463" comment="exim-4.97.1-bp155.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875464" comment="eximon-4.97.1-bp155.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009875465" comment="eximstats-html-4.97.1-bp155.5.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4054" version="1" class="patch">
	<metadata>
		<title>Security update for python-nltk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227174" ref_url="https://bugzilla.suse.com/1227174" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-39705" ref_url="https://www.suse.com/security/cve/CVE-2024-39705/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/34GPGJ5MWORJ4EISDV3CLYKNIHC3Z7CC/" source="SUSE-SU"/>
		<description>
This update for python-nltk fixes the following issues:

- CVE-2024-39705: Fixed remote code execution through unsafe pickle usage (boo#1227174).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2024-07-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1227174">SUSE bug 1227174</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-39705/">CVE-2024-39705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39705">CVE-2024-39705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876318" comment="python3-nltk-3.7-bp155.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4055" version="1" class="patch">
	<metadata>
		<title>Security update for keybase-client (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227167" ref_url="https://bugzilla.suse.com/1227167" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-24792" ref_url="https://www.suse.com/security/cve/CVE-2024-24792/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0224-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GXB4SKOPE2SZAUL5AG6RPXV7XINWBOYH/" source="SUSE-SU"/>
		<description>
This update for keybase-client fixes the following issues:

- Update the Image dependency to address CVE-2024-24792 (boo#1227167).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2024-07-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1227167">SUSE bug 1227167</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-24792/">CVE-2024-24792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24792">CVE-2024-24792 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009876377" comment="kbfs-6.2.8-bp156.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876378" comment="kbfs-git-6.2.8-bp156.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876379" comment="kbfs-tool-6.2.8-bp156.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876380" comment="keybase-client-6.2.8-bp156.2.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4056" version="1" class="patch">
	<metadata>
		<title>Security update for assimp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218474" ref_url="https://bugzilla.suse.com/1218474" source="BUGZILLA"/>
		<reference ref_id="1228142" ref_url="https://bugzilla.suse.com/1228142" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-40724" ref_url="https://www.suse.com/security/cve/CVE-2024-40724/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0225-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GRHXRZKHWQMKKB7V55J2TDPZAKJSN2BF/" source="SUSE-SU"/>
		<description>
This update for assimp fixes the following issues:

- CVE-2024-40724: Fixed heap-based buffer overflow in the PLY importer class (boo#1228142), 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-27"/>
	<updated date="2024-07-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218474">SUSE bug 1218474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228142">SUSE bug 1228142</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40724/">CVE-2024-40724 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40724">CVE-2024-40724 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009876439" comment="assimp-devel-5.3.1-bp156.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876440" comment="libassimp5-5.3.1-bp156.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4057" version="1" class="patch">
	<metadata>
		<title>Security update for gh (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227035" ref_url="https://bugzilla.suse.com/1227035" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0227-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2COZIDAEHXSE2NGBIJOMDBA64FCPZOP/" source="SUSE-SU"/>
		<description>
This update for gh fixes the following issues:

Update to version 2.53.0:

* CVE-2024-6104: gh: hashicorp/go-retryablehttp: url might write sensitive information to log file (boo#1227035)

* Disable `TestGetTrustedRoot/successfully_verifies_TUF_root` test due to https://github.com/cli/cli/issues/8928
* Rename package directory and files
* Rename package name to `update_branch`
* Rename `gh pr update` to `gh pr update-branch`
* Add test case for merge conflict error
* Handle merge conflict error
* Return error if PR is not mergeable
* Replace literals with consts for `Mergeable` field values
* Add separate type for `PullRequest.Mergeable` field
* Remove unused flag
* Print message on stdout instead of stderr
* Raise error if editor is used in non-tty mode
* Add tests for JSON field support on issue and pr view commands
* docs: Update documentation for `gh repo create` to clarify owner
* Ensure PR does not panic when stateReason is requested
* Add `createdAt` field to tests
* Add `createdAt` field to `Variable` type
* Add test for exporting as JSON
* Add test for JSON output
* Only populate selected repo information for JSON output
* Add test to verify JSON exporter gets set
* Add `--json` option support
* Use `Variable` type defined in `shared` package
* Add tests for JSON output
* Move `Variable` type and `PopulateSelectedRepositoryInformation` func to shared
* Fix query parameter name
* Update tests to account for ref comparison step
* Improve query variable names
* Check if PR branch is already up-to-date
* Add `ComparePullRequestBaseBranchWith` function
* Run `go mod tidy`
* Add test to verify `--repo` requires non-empty selector
* Require non-empty selector when `--repo` override is used
* Run `go mod tidy`
* Register `update` command
* Add tests for `pr update` command
* Add `pr update` command
* Add `UpdatePullRequestBranch` method
* Upgrade `shurcooL/githubv4`

Update to version 2.52.0:

* Attestation Verification - Buffer Fix
* Remove beta note from attestation top level command
* Removed beta note from `gh at download`.
* Removed beta note from `gh at verify`, clarified reusable workflows use case.
* add `-a` flag to `gh run list`
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-27"/>
	<updated date="2024-07-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1227035">SUSE bug 1227035</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009876441" comment="gh-2.53.0-bp155.2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876442" comment="gh-bash-completion-2.53.0-bp155.2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876443" comment="gh-fish-completion-2.53.0-bp155.2.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009876444" comment="gh-zsh-completion-2.53.0-bp155.2.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4058" version="1" class="patch">
	<metadata>
		<title>Security update for libuev (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218749" ref_url="https://bugzilla.suse.com/1218749" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48620" ref_url="https://www.suse.com/security/cve/CVE-2022-48620/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0023-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EEXA2EZOHQFRCE3KOKKQIYMIW7OG2YYR/" source="SUSE-SU"/>
		<description>
This update for libuev fixes the following issues:

- Update to 2.4.1:

  * Update README with list of moden Linux APIs used
  * Fix #27: possible buffer overrun in uev_run()
    boo#1218749 CVE-2022-48620
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-18"/>
	<updated date="2024-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218749">SUSE bug 1218749</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-48620/">CVE-2022-48620 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48620">CVE-2022-48620 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009819762" comment="libuev-devel-2.4.1-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819763" comment="libuev3-2.4.1-bp155.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4059" version="1" class="patch">
	<metadata>
		<title>Security update for python-notebook (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227583" ref_url="https://bugzilla.suse.com/1227583" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11358" ref_url="https://www.suse.com/security/cve/CVE-2019-11358/" source="CVE"/>
		<reference ref_id="CVE-2021-32798" ref_url="https://www.suse.com/security/cve/CVE-2021-32798/" source="CVE"/>
		<description>
This update for python-notebook fixes the following issues:

- Update to 5.7.11
  * sanitizer fix CVE-2021-32798 (boo#1227583)
- Update to 5.7.10
  * no upstream changelog
- Update to 5.7.9
  * Update JQuery dependency to version 3.4.1 to fix security
    vulnerability (CVE-2019-11358)
  * Update from preact to React 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-02"/>
	<updated date="2024-08-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1227583">SUSE bug 1227583</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11358/">CVE-2019-11358 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-11358">CVE-2019-11358 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-32798/">CVE-2021-32798 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32798">CVE-2021-32798 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877954" comment="jupyter-notebook-5.7.11-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877955" comment="jupyter-notebook-doc-5.7.11-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877956" comment="jupyter-notebook-lang-5.7.11-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877957" comment="jupyter-notebook-latex-5.7.11-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877958" comment="python3-notebook-5.7.11-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877959" comment="python3-notebook-lang-5.7.11-bp155.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4060" version="1" class="patch">
	<metadata>
		<title>Security update for python-aiosmtpd (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1221328" ref_url="https://bugzilla.suse.com/1221328" source="BUGZILLA"/>
		<reference ref_id="1224467" ref_url="https://bugzilla.suse.com/1224467" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-27305" ref_url="https://www.suse.com/security/cve/CVE-2024-27305/" source="CVE"/>
		<reference ref_id="CVE-2024-34083" ref_url="https://www.suse.com/security/cve/CVE-2024-34083/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0243-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G642S3M3RN5DHIPCAJBHQAPH7Q6QWPX2/" source="SUSE-SU"/>
		<description>
This update for python-aiosmtpd fixes the following issues:

- CVE-2024-34083: Fixed MiTM attack could inject extra unencrypted commands after STARTTLS (boo#1224467)
- CVE-2024-27305: Fixed SMTP smuggling (boo#1221328)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2024-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221328">SUSE bug 1221328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224467">SUSE bug 1224467</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-27305/">CVE-2024-27305 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27305">CVE-2024-27305 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-34083/">CVE-2024-34083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34083">CVE-2024-34083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879831" comment="python3-aiosmtpd-1.2.1-bp155.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4061" version="1" class="patch">
	<metadata>
		<title>Security update for apptainer (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1221364" ref_url="https://bugzilla.suse.com/1221364" source="BUGZILLA"/>
		<reference ref_id="1224114" ref_url="https://bugzilla.suse.com/1224114" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-30549" ref_url="https://www.suse.com/security/cve/CVE-2023-30549/" source="CVE"/>
		<reference ref_id="CVE-2023-38496" ref_url="https://www.suse.com/security/cve/CVE-2023-38496/" source="CVE"/>
		<reference ref_id="CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3BEJQC6TDQZLJ4YE746IHLCFJFUQ2JKQ/" source="SUSE-SU"/>
		<description>
This update for apptainer fixes the following issues:

- Make sure, digest values handled by the Go library
  github.com/opencontainers/go-digest and used throughout the
  Go-implemented containers ecosystem are always validated. This
  prevents attackers from triggering unexpected authenticated
  registry accesses. (CVE-2024-3727, boo#1224114).
 

- Updated apptainer to version 1.3.0
  * FUSE mounts are now supported in setuid mode, enabling full
    functionality even when kernel filesystem mounts are insecure due to
    unprivileged users having write access to raw filesystems in
    containers. When allow `setuid-mount extfs = no` (the default) in
    apptainer.conf, then the fuse2fs image driver will be used to mount
    ext3 images in setuid mode instead of the kernel driver (ext3 images
    are primarily used for the `--overlay` feature), restoring
    functionality that was removed by default in Apptainer 1.1.8 because
    of the security risk.
    The allow `setuid-mount squashfs` configuration option in
    `apptainer.conf` now has a new default called `iflimited` which allows
    kernel squashfs mounts only if there is at least one `limit container`
    option set or if Execution Control Lists are activated in ecl.toml.
    If kernel squashfs mounts are are not allowed, then the squashfuse
    image driver will be used instead.
    `iflimited` is the default because if one of those limits are used
    the system administrator ensures that unprivileged users do not have
    write access to the containers, but on the other hand using FUSE
    would enable a user to theoretically bypass the limits via `ptrace()`
    because the FUSE process runs as that user.
    The `fuse-overlayfs` image driver will also now be tried in setuid
    mode if the kernel overlayfs driver does not work (for example if
    one of the layers is a FUSE filesystem).  In addition, if `allow
    setuid-mount encrypted = no` then the unprivileged gocryptfs format
    will be used for encrypting SIF files instead of the kernel
    device-mapper. If a SIF file was encrypted using the gocryptfs
    format, it can now be mounted in setuid mode in addition to
    non-setuid mode.
  * Change the default in user namespace mode to use either kernel
    overlayfs or fuse-overlayfs instead of the underlay feature for the
    purpose of adding bind mount points. That was already the default in
    setuid mode; this change makes it consistent. The underlay feature
    can still be used with the `--underlay` option, but it is deprecated
    because the implementation is complicated and measurements have
    shown that the performance of underlay is similar to overlayfs and
    fuse-overlayfs.
    For now the underlay feature can be made the default again with a
    new `preferred` value on the `enable underlay` configuration option.
    Also the `--underlay` option can be used in setuid mode or as the
    root user, although it was ignored previously.
  * Prefer again to use kernel overlayfs over fuse-overlayfs when a
    lower layer is FUSE and there's no writable upper layer, undoing the
    change from 1.2.0. Another workaround was found for the problem that
    change addressed. This applies in both setuid mode and in user
    namespace mode.
  * `--cwd` is now the preferred form of the flag for setting the
    container's working directory, though `--pwd` is still supported for
    compatibility.
  * The way `--home` is handled when running as root (e.g. sudo apptainer)
    or with `--fakeroot` has changed. Previously, we were only modifying
    the `HOME` environment variable in these cases, while leaving the
    container's `/etc/passwd` file unchanged (with its homedir field
    pointing to `/root`, regardless of the value passed to `--home`). With
    this change, both value of HOME and the contents of `/etc/passwd` in
    the container will reflect the value passed to `--home` if the
    container is readonly. If the container is writable, the
    `/etc/passwd` file is left alone because it can interfere with
    commands that want to modify it.
  * The `--vm` and related flags to start apptainer inside a VM have been
    removed. This functionality was related to the retired Singularity Desktop
    / SyOS projects.
  * The keyserver-related commands that were under `remote` have been moved to
    their own, dedicated `keyserver` command. Run `apptainer help keyserver`
    for more information.
  * The commands related to OCI/Docker registries that were under `remote` have
    been moved to their own, dedicated `registry` command. Run
    `apptainer help registry` for more information.
  * The the `remote list` subcommand now outputs only remote endpoints (with
    keyservers and OCI/Docker registries having been moved to separate
    commands), and the output has been streamlined.
  * Adding a new remote endpoint using the `apptainer remote add` command will
    now set the new endpoint as default. This behavior can be suppressed by
    supplying the `--no-default` (or `-n`) flag to `remote add`.
  * Skip parsing build definition file template variables after comments
    beginning with a hash symbol.
  * The global `/tmp` directory is no longer used for gocryptfs mountpoints.
- New Features &amp; Functionality
  * The `remote status` command will now print the username, realname, and
    email of the logged-in user, if available.
  * Add monitoring feature support, which requires the usage of an
    additional tool named `apptheus`, this tool will put apptainer starter
    into a newly created cgroup and collect system metrics.
  * A new `--no-pid` flag for `apptainer run/shell/exec` disables the PID
    namespace inferred by `--containall` and `--compat`.
  * Added `--config` option to `keyserver` commands.
  * Honor an optional remoteName argument to the `keyserver list` command.
  * Added the `APPTAINER_ENCRYPTION_PEM_DATA` env var to allow for
    encrypting and running encrypted containers without a PEM file.
  * Adding `--sharens` mode for `apptainer exec/run/shell`, which enables to
    run multiple apptainer instances created by the same parent using
    the same image in the same user namespace.
- Make 'gocryptfs' an optional dependency.
- Make apptainer definition templates version dependent.

- Fix 'apptainer build' using signed packages from the SUSE
  Registry (boo#1221364).

- Updated apptainer to version 1.2.5
  * Added `libnvidia-nvvm` to `nvliblist.conf`. Newer NVIDIA
    Drivers (known with &gt;= 525.85.05) require this lib to compile
    OpenCL programs against NVIDIA GPUs, i.e. `libnvidia-opencl`
    depends on `libnvidia-nvvm`.
  * Disable the usage of cgroup in instance creation when
    `--fakeroot` is passed.
  * Disable the usage of cgroup in instance creation when `hidepid`
    mount option on `/proc` is set.
  * Fixed a regression introduced in 1.2.0 where the user's
    password file information was not copied in to the container
    when there was a parent root-mapped user namespace (as is the
    case for example in `cvmfsexec`).
  * Added the upcoming NVIDIA driver library `libnvidia-gpucomp.so`
    to the list of libraries to add to NVIDIA GPU-enabled
    containers. Fixed missing error handling during the creation
    of an encrypted image that lead to the generation of corrupted
    images.
  * Use `APPTAINER_TMPDIR` for temporary files during privileged
    image encryption.
  * If rootless unified cgroups v2 is available when starting an
    image but `XDG_RUNTIME_DIR` or `DBUS_SESSION_BUS_ADDRESS` is
    not set, print an info message that stats will not be available
    instead of exiting with a fatal error.
  * Allow templated build arguments to definition files to have
    empty values.
- Package .def templates separately for different SPs.

- Do not build squashfuse, require it as a dependency.
- Replace awkward 'Obsoletes: singularity-*' as well as the
  'Provides: Singularity' by 'Conflicts:' and drop the provides -
  the versioning scheme does not match and we do not automatically
  migrate from one to the other.
- Exclude platforms which do not provide all build dependencies.

- updated to 1.2.3 with following changes:
  * The apptainer push/pull commands now show a progress bar for the oras
    protocol like there was for docker and library protocols.
  * The --nv and --rocm flags can now be used simultaneously.
  * Fix the use of APPTAINER_CONFIGDIR with apptainer instance start and action
    commands that refer to instance://.
  * Fix the issue that apptainer would not read credentials from the Docker
    fallback path ~/.docker/config.json if missing in the apptainer
    credentials.

- updated to 1.2.2 with following changes:
  * Fix $APPTAINER_MESSAGELEVEL to correctly set the logging level.
  * Fix build failures when in setuid mode and unprivileged user namespaces are
    unavailable and the --fakeroot option is not selected.

- updated to 1.2.1 to fix CVE-2023-38496 although not relevant as package is 
  compiled with setuid

- update to 1.2.0 with following changes:
  * binary is built reproducible which disables plugins
  * Create the current working directory in a container when it doesn't exist.
    This restores behavior as it was before singularity 3.6.0. As a result,
    using --no-mount home won't have any effect when running apptainer from a
    home directory and will require --no-mount home,cwd to avoid mounting that
    directory.
  * Handle current working directory paths containing symlinks both on the host
    and in a container but pointing to different destinations. If detected, the
    current working directory is not mounted when the destination directory in
    the container exists.
  * Destination mount points are now sorted by shortest path first to ensure
    that a user bind doesn't override a previous bind path when set in
    arbitrary order on the CLI. This is also applied to image binds.
  * When the kernel supports unprivileged overlay mounts in a user namespace,
    the container will be constructed by default using an overlay instead of an
    underlay layout for bind mounts. A new --underlay action option can be used
    to prefer underlay instead of overlay.
  * sessiondir maxsize in apptainer.conf now defaults to 64 MiB for new
    installations. This is an increase from 16 MiB in prior versions.
  * The apptainer cache is now architecture aware, so the same home directory
    cache can be shared by machines with different architectures.
  * Overlay is blocked on the panfs filesystem, allowing sandbox directories to
    be run from panfs without error.
  * Lookup and store user/group information in stage one prior to entering any
    namespaces, to fix an issue with winbind not correctly looking up
    user/group information when using user namespaces.
- New features / functionalities
  * Support for unprivileged encryption of SIF files using gocryptfs.  This is
    not compatible with privileged encryption, so containers encrypted by root
    need to be rebuilt by an unprivileged user.
  * Templating support for definition files. Users can now define variables in
    definition files via a matching pair of double curly brackets. Variables of
    the form {{ variable }} will be replaced by a value defined either by a
    variable=value entry in the %arguments section of the definition file or
    through new build options --build-arg or --build-arg-file.
  * Add a new instance run command that will execute the runscript when an
    instance is initiated instead of executing the startscript.
  * The sign and verify commands now support signing and verification with
    non-PGP key material by specifying the path to a private key via the --key
    flag.
  * The verify command now supports verification with X.509 certificates by
    specifying the path to a certificate via the --certificate flag. By
    default, the system root certificate pool is used as trust anchors unless
    overridden via the --certificate-roots flag. A pool of intermediate
    certificates that are not trust anchors, but can be used to form a
    certificate chain, can also be specified via the
    --certificate-intermediates flag.
  * Support for online verification checks of X.509 certificates using OCSP
    protocol via the new verify --ocsp-verify option.
  * The instance stats command displays the resource usage every second. The
    --no-stream option disables this interactive mode and shows the
    point-in-time usage.
  * Instances are now started in a cgroup by default, when run as root or when
    unified cgroups v2 with systemd as manager is configured. This allows
    apptainer instance stats to be supported by default when possible.
  * The instance start command now accepts an optional --app &lt;name&gt; argument
    which invokes a start script within the %appstart &lt;name&gt; section in the
    definition file. The instance stop command still only requires the instance
    name.
  * The instance name is now available inside an instance via the new
    APPTAINER_INSTANCE environment variable.
  * The --no-mount flag now accepts the value bind-paths to disable mounting of
    all bind path entries in apptainer.conf.
    Support for DOCKER_HOST parsing when using docker-daemon://
    DOCKER_USERNAME and DOCKER_PASSWORD supported without APPTAINER_ prefix.
    Add new Linux capabilities CAP_PERFMON, CAP_BPF, and CAP_CHECKPOINT_RESTORE.
  * The remote get-login-password command allows users to retrieve a remote's
    token. This enables piping the secret directly into docker login while
    preventing it from showing up in a shell's history.
  * Define EUID in %environment alongside UID.
  * In --rocm mode, the whole of /dev/dri is now bound into the container when
    --contain is in use. This makes /dev/dri/render devices available, required
    for later ROCm versions.

- update to 1.1.9 with following changes:
  * Remove warning about unknown xino=on option from fuse-overlayfs, introduced
    in 1.1.8.
  * Ignore extraneous warning from fuse-overlayfs about a readonly /proc.
  * Fix dropped 'n' characters on some platforms in definition file stored as
    part of SIF metadata.
  * Remove duplicated group ids.
  * Fix not being able to handle multiple entries in LD_PRELOAD when binding
    fakeroot into container during apptainer startup for --fakeroot with
    fakeroot command.

- Included a fix for CVE-2023-30549 which is a vulnerability in setuid-root
  installations of Apptainer iwhich was not active in the recent openSUSE
  packages. Still this is included for completenss. The fix adds allow
  setuid-mount configuration options encrypted, squashfs, and extfs, and makes
  the default for extfs be 'no'. That disables the use of extfs mounts
  including for overlays or binds while in the setuid-root mode, while leaving
  it enabled for unprivileged user namespace mode. The default for encrypted
  and squashfs is 'yes'.
- Other bug fixes:
  * Fix loop device 'no such device or address' spurious errors when using shared
    loop devices.
  * Add xino=on mount option for writable kernel overlay mount points to fix
    inode numbers consistency after kernel cache flush (not applicable to
    fuse-overlayfs).
 

- updated to 1.1.7 with following changes:
  * Allow gpu options such as --nv to be nested by always inheriting all
    libraries bound in to a parent container's /.singularity.d/libs.
  * Map the user's home directory to the root home directory by default in the
    non-subuid fakeroot mode like it was in the subuid fakeroot mode, for both
    action commands and building containers from definition files.
  * Make the error message more helpful in another place where a remote is
    found to have no library client.
  * Avoid incorrect error when requesting fakeroot network.
  * Pass computed LD_LIBRARY_PATH to wrapped unsquashfs. Fixes issues where
    unsquashfs on host uses libraries in non-default paths.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2024-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221364">SUSE bug 1221364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224114">SUSE bug 1224114</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-30549/">CVE-2023-30549 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30549">CVE-2023-30549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38496/">CVE-2023-38496 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38496">CVE-2023-38496 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009879832" comment="apptainer-1.3.0-bp155.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879833" comment="apptainer-leap-1.3.0-bp155.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879834" comment="apptainer-sle15_5-1.3.0-bp155.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879835" comment="apptainer-sle15_6-1.3.0-bp155.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879836" comment="libsquashfuse0-0.5.0-bp155.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879837" comment="squashfuse-0.5.0-bp155.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879838" comment="squashfuse-devel-0.5.0-bp155.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879839" comment="squashfuse-tools-0.5.0-bp155.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4062" version="1" class="patch">
	<metadata>
		<title>Security update for sngrep (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1225638" ref_url="https://bugzilla.suse.com/1225638" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-35434" ref_url="https://www.suse.com/security/cve/CVE-2024-35434/" source="CVE"/>
		<description>
This update for sngrep fixes the following issues:

- CVE-2024-35434: Fixed heap buffer overflow in rtp_check_packet (boo#1225638)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2024-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1225638">SUSE bug 1225638</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35434/">CVE-2024-35434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35434">CVE-2024-35434 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879840" comment="sngrep-1.8.1-bp155.2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4063" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218892" ref_url="https://bugzilla.suse.com/1218892" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0517" ref_url="https://www.suse.com/security/cve/CVE-2024-0517/" source="CVE"/>
		<reference ref_id="CVE-2024-0518" ref_url="https://www.suse.com/security/cve/CVE-2024-0518/" source="CVE"/>
		<reference ref_id="CVE-2024-0519" ref_url="https://www.suse.com/security/cve/CVE-2024-0519/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0025-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SBKM7LPPN3ZZXZUPUKOH3JTVVIDYQUW6/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Update to 120.0.6099.224 (boo#1218892):

- CVE-2024-0517: Out of bounds write in V8
- CVE-2024-0518: Type Confusion in V8
- CVE-2024-0519: Out of bounds memory access in V8
- Various fixes from internal audits, fuzzing and other initiatives
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-18"/>
	<updated date="2024-01-18"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1218892">SUSE bug 1218892</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0517/">CVE-2024-0517 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0517">CVE-2024-0517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0518/">CVE-2024-0518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0518">CVE-2024-0518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0519/">CVE-2024-0519 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0519">CVE-2024-0519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009819764" comment="chromedriver-120.0.6099.224-bp155.2.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819765" comment="chromium-120.0.6099.224-bp155.2.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4064" version="1" class="patch">
	<metadata>
		<title>Security update for sleuthkit (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1144304" ref_url="https://bugzilla.suse.com/1144304" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14531" ref_url="https://www.suse.com/security/cve/CVE-2019-14531/" source="CVE"/>
		<description>
This update for sleuthkit fixes the following issues:

* CVE-2019-14531: Fixed an out of bounds read on iso9660 while parsing System Use Sharing Protocol data in fs/iso9660.c.  (boo#1144304)

update to 4.12.1:

  *     C/C++:
  *         Bug fixes from Luis Nassif and Joachim Metz
  *         Added check to stop for very large folders to prevent memory exhaustion
  *     Java:
  *         Added File Repository concept for files to be stored in another location
  *         Schema updated to 9.4
  *         Fixed OS Account merge bug and now fire events when accounts are merged

update to 4.12.0:

  *      Add Linux LVM support
  *      Logical File System support (a folder structure is parsed by TSK libraries)
  *      Many small fixes

update to 4.11.1:

  *     C/C++:
  *         Several fixes from @joachimmetz
  *         NTFS Decompression bug fix from @kastonework and @uckelman-sf
  *     Java:
  *         Fixed connection leak when making OS Accounts in bridge
  *         OsAccount updates for instance types and special Windows SIDs
            Fixed issue with duplicate value in Japanese timeline translation

update to 4.11.0:

  *     C/C++:
  *         Added checks at various layers to detect encrypted file systems and disks to give more useful error messages.
  *         Added checks to detect file formats that are not supported (such as AD1, ZIP, etc.) to give more useful error messages.
  *         Added tsk_imageinfo tool that detects if an image is supported by TSK and if it is encrypted.
  *         Add numerous bound checks from @joachimmetz
  *         Clarified licenses as pointed out by @joachimmetz
  *     Java:
  *         Updated from Schema 8.6 to 9.1.
  *         Added tables and classes for OS Accounts and Realms (Domains).
  *         Added tables and classes for Host Addresses (IP, MAC, etc.).
  *         Added tables and classes for Analysis Results vs Data Artifacts by adding onto BlackboardArtifacts.
  *         Added tables and classes for Host and Person to make it easier to group data sources.
  *         Added static types for standard artifact types.
  *         Added File Attribute table to allow custom information to be stored for each file.
  *         Made ordering of getting lock and connection consistent.
  *         Made the findFile methods more efficient by using extension (which is indexed).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-17"/>
	<updated date="2024-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144304">SUSE bug 1144304</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-14531/">CVE-2019-14531 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-14531">CVE-2019-14531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009880180" comment="libtsk19-4.12.1-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880181" comment="sleuthkit-4.12.1-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880182" comment="sleuthkit-devel-4.12.1-bp155.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4065" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2024-6772" ref_url="https://www.suse.com/security/cve/CVE-2024-6772/" source="CVE"/>
		<reference ref_id="CVE-2024-6773" ref_url="https://www.suse.com/security/cve/CVE-2024-6773/" source="CVE"/>
		<reference ref_id="CVE-2024-6774" ref_url="https://www.suse.com/security/cve/CVE-2024-6774/" source="CVE"/>
		<reference ref_id="CVE-2024-6775" ref_url="https://www.suse.com/security/cve/CVE-2024-6775/" source="CVE"/>
		<reference ref_id="CVE-2024-6776" ref_url="https://www.suse.com/security/cve/CVE-2024-6776/" source="CVE"/>
		<reference ref_id="CVE-2024-6777" ref_url="https://www.suse.com/security/cve/CVE-2024-6777/" source="CVE"/>
		<reference ref_id="CVE-2024-6778" ref_url="https://www.suse.com/security/cve/CVE-2024-6778/" source="CVE"/>
		<reference ref_id="CVE-2024-6779" ref_url="https://www.suse.com/security/cve/CVE-2024-6779/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0252-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2EALRZ2J2EDX32BAG7AQ44YU767S375L/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

- Update to 112.0.5197.53
  * CHR-9814 Update Chromium on desktop-stable-126-5197 to
    126.0.6478.226
  * DNA-116974 Site settings popup size not expanding causing
    display issues
  * DNA-117115 Tab islands are extending partially after Workspace
    change
  * DNA-117708 H.264 SW decoding only possible if HW decoding
    is possible
  * DNA-117792 Crash at content::RenderWidgetHostImpl::
    ForwardMouseEventWithLatencyInfo(blink::
    WebMouseEvent const&amp;, ui::LatencyInfo const&amp;)
- The update to chromium &gt;= 126.0.6478.182 fixes following issues:
  CVE-2024-6772, CVE-2024-6773, CVE-2024-6774, CVE-2024-6775,
  CVE-2024-6776, CVE-2024-6777, CVE-2024-6778, CVE-2024-6779

- Update to 112.0.5197.30
  * CHR-9416 Updating Chromium on desktop-stable-* branches
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-18"/>
	<updated date="2024-08-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6772/">CVE-2024-6772 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6772">CVE-2024-6772 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6773/">CVE-2024-6773 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6773">CVE-2024-6773 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6774/">CVE-2024-6774 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6774">CVE-2024-6774 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6775/">CVE-2024-6775 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6775">CVE-2024-6775 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6776/">CVE-2024-6776 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6776">CVE-2024-6776 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6777/">CVE-2024-6777 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6777">CVE-2024-6777 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6778/">CVE-2024-6778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6778">CVE-2024-6778 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6779/">CVE-2024-6779 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6779">CVE-2024-6779 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880188" comment="opera-112.0.5197.53-lp155.3.57.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4066" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1205416" ref_url="https://bugzilla.suse.com/1205416" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-45198" ref_url="https://www.suse.com/security/cve/CVE-2022-45198/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0253-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GCGXLEMT363ZHOQX2SPXT2G7LEECANKD/" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

- CVE-2022-45198: Fixed improper handling of highly compressed GIF data (boo#1205416)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-18"/>
	<updated date="2024-08-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1205416">SUSE bug 1205416</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-45198/">CVE-2022-45198 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45198">CVE-2022-45198 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009880189" comment="python3-Pillow-8.4.0-bp155.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880190" comment="python3-Pillow-tk-8.4.0-bp155.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4067" version="1" class="patch">
	<metadata>
		<title>Security update for chromium, gn, rust-bindgen (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228628" ref_url="https://bugzilla.suse.com/1228628" source="BUGZILLA"/>
		<reference ref_id="1228940" ref_url="https://bugzilla.suse.com/1228940" source="BUGZILLA"/>
		<reference ref_id="1228941" ref_url="https://bugzilla.suse.com/1228941" source="BUGZILLA"/>
		<reference ref_id="1228942" ref_url="https://bugzilla.suse.com/1228942" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6988" ref_url="https://www.suse.com/security/cve/CVE-2024-6988/" source="CVE"/>
		<reference ref_id="CVE-2024-6989" ref_url="https://www.suse.com/security/cve/CVE-2024-6989/" source="CVE"/>
		<reference ref_id="CVE-2024-6990" ref_url="https://www.suse.com/security/cve/CVE-2024-6990/" source="CVE"/>
		<reference ref_id="CVE-2024-6991" ref_url="https://www.suse.com/security/cve/CVE-2024-6991/" source="CVE"/>
		<reference ref_id="CVE-2024-6992" ref_url="https://www.suse.com/security/cve/CVE-2024-6992/" source="CVE"/>
		<reference ref_id="CVE-2024-6993" ref_url="https://www.suse.com/security/cve/CVE-2024-6993/" source="CVE"/>
		<reference ref_id="CVE-2024-6994" ref_url="https://www.suse.com/security/cve/CVE-2024-6994/" source="CVE"/>
		<reference ref_id="CVE-2024-6995" ref_url="https://www.suse.com/security/cve/CVE-2024-6995/" source="CVE"/>
		<reference ref_id="CVE-2024-6996" ref_url="https://www.suse.com/security/cve/CVE-2024-6996/" source="CVE"/>
		<reference ref_id="CVE-2024-6997" ref_url="https://www.suse.com/security/cve/CVE-2024-6997/" source="CVE"/>
		<reference ref_id="CVE-2024-6998" ref_url="https://www.suse.com/security/cve/CVE-2024-6998/" source="CVE"/>
		<reference ref_id="CVE-2024-6999" ref_url="https://www.suse.com/security/cve/CVE-2024-6999/" source="CVE"/>
		<reference ref_id="CVE-2024-7000" ref_url="https://www.suse.com/security/cve/CVE-2024-7000/" source="CVE"/>
		<reference ref_id="CVE-2024-7001" ref_url="https://www.suse.com/security/cve/CVE-2024-7001/" source="CVE"/>
		<reference ref_id="CVE-2024-7003" ref_url="https://www.suse.com/security/cve/CVE-2024-7003/" source="CVE"/>
		<reference ref_id="CVE-2024-7004" ref_url="https://www.suse.com/security/cve/CVE-2024-7004/" source="CVE"/>
		<reference ref_id="CVE-2024-7005" ref_url="https://www.suse.com/security/cve/CVE-2024-7005/" source="CVE"/>
		<reference ref_id="CVE-2024-7255" ref_url="https://www.suse.com/security/cve/CVE-2024-7255/" source="CVE"/>
		<reference ref_id="CVE-2024-7256" ref_url="https://www.suse.com/security/cve/CVE-2024-7256/" source="CVE"/>
		<reference ref_id="CVE-2024-7532" ref_url="https://www.suse.com/security/cve/CVE-2024-7532/" source="CVE"/>
		<reference ref_id="CVE-2024-7533" ref_url="https://www.suse.com/security/cve/CVE-2024-7533/" source="CVE"/>
		<reference ref_id="CVE-2024-7534" ref_url="https://www.suse.com/security/cve/CVE-2024-7534/" source="CVE"/>
		<reference ref_id="CVE-2024-7535" ref_url="https://www.suse.com/security/cve/CVE-2024-7535/" source="CVE"/>
		<reference ref_id="CVE-2024-7536" ref_url="https://www.suse.com/security/cve/CVE-2024-7536/" source="CVE"/>
		<reference ref_id="CVE-2024-7550" ref_url="https://www.suse.com/security/cve/CVE-2024-7550/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0254-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KC4DDO3O7C7P2VVA7A7WIO5RVISNZ3HV/" source="SUSE-SU"/>
		<description>
This update for chromium, gn, rust-bindgen fixes the following issues:

- Chromium 127.0.6533.119 (boo#1228941)

  * CVE-2024-7532: Out of bounds memory access in ANGLE
  * CVE-2024-7533: Use after free in Sharing
  * CVE-2024-7550: Type Confusion in V8
  * CVE-2024-7534: Heap buffer overflow in Layout
  * CVE-2024-7535: Inappropriate implementation in V8
  * CVE-2024-7536: Use after free in WebAudio

- Chromium 127.0.6533.88 (boo#1228628, boo#1228940, boo#1228942)

  * CVE-2024-6988: Use after free in Downloads
  * CVE-2024-6989: Use after free in Loader
  * CVE-2024-6991: Use after free in Dawn
  * CVE-2024-6992: Out of bounds memory access in ANGLE
  * CVE-2024-6993: Inappropriate implementation in Canvas
  * CVE-2024-6994: Heap buffer overflow in Layout
  * CVE-2024-6995: Inappropriate implementation in Fullscreen
  * CVE-2024-6996: Race in Frames
  * CVE-2024-6997: Use after free in Tabs
  * CVE-2024-6998: Use after free in User Education
  * CVE-2024-6999: Inappropriate implementation in FedCM
  * CVE-2024-7000: Use after free in CSS. Reported by Anonymous
  * CVE-2024-7001: Inappropriate implementation in HTML
  * CVE-2024-7003: Inappropriate implementation in FedCM
  * CVE-2024-7004: Insufficient validation of untrusted input
    in Safe Browsing
  * CVE-2024-7005: Insufficient validation of untrusted input
    in Safe Browsing
  * CVE-2024-6990: Uninitialized Use in Dawn
  * CVE-2024-7255: Out of bounds read in WebTransport
  * CVE-2024-7256: Insufficient data validation in Dawn

gh:

- Update to version 0.20240730:
  * Rust: link_output, depend_output and runtime_outputs for dylibs
  * Add missing reference section to function_toolchain.cc
  * Do not cleanup args.gn imports located in the output directory.
  * Fix expectations in NinjaRustBinaryTargetWriterTest.SwiftModule
  * Do not add native dependencies to the library search path
  * Support linking frameworks and swiftmodules in Rust targets
  * [desc] Silence print() statements when outputing json
  * infra: Move CI/try builds to Ubuntu-22.04
  * [MinGW] Fix mingw building issues
  * [gn] Fix 'link' in the //examples/simple_build/build/toolchain/BUILD.gn
  * [template] Fix 'rule alink_thin' in the //build/build_linux.ninja.template
  * Allow multiple --ide switches
  * [src] Add '#include &lt;limits&gt;' in the //src/base/files/file_enumerator_win.cc
  * Get updates to infra/recipes.py from upstream
  * Revert 'Teach gn to handle systems with &gt; 64 processors'
  * [apple] Rename the code-signing properties of create_bundle
  * Fix a typo in 'gn help refs' output
  * Revert '[bundle] Use 'phony' builtin tool for create_bundle targets'
  * [bundle] Use 'phony' builtin tool for create_bundle targets
  * [ios] Simplify handling of assets catalog
  * [swift] List all outputs as deps of 'source_set' stamp file
  * [swift] Update `gn check ...` to consider the generated header
  * [swift] Set `restat = 1` to swift build rules
  * Fix build with gcc12
  * [label_matches] Add new functions label_matches(), filter_labels_include() and filter_labels_exclude()
  * [swift] Remove problematic use of 'stamp' tool
  * Implement new --ninja-outputs-file option.
  * Add NinjaOutputsWriter class
  * Move InvokePython() function to its own source file.
  * zos: build with -DZOSLIB_OVERRIDE_CLIB to override creat
  * Enable C++ runtime assertions in debug mode.
  * Fix regression in MakeRelativePath()
  * fix: Fix Windows MakeRelativePath.
  * Add long path support for windows
  * Ensure read_file() files are considered by 'gn analyze'
  * apply 2to3 to for some Python scripts
  * Add rustflags to desc and help output
  * strings: support case insensitive check only in StartsWith/EndsWith
  * add .git-blame-ignore-revs
  * use std::{string,string_view}::{starts_with,ends_with}
  * apply clang-format to all C++ sources
  * add forward declaration in rust_values.h
  * Add `root_patterns` list to build configuration.
  * Use c++20 in GN build
  * update windows sdk to 2024-01-11
  * update windows sdk
  * Add linux-riscv64.
  * Update OWNERS list.
  * remove unused function
  * Ignore build warning -Werror=redundant-move
  * Fix --as=buildfile `gn desc deps` output.
  * Update recipe engine to 9dea1246.
  * treewide: Fix spelling mistakes

Added rust-bindgen:

- Version 0.69.1
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-19"/>
	<updated date="2024-08-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1228628">SUSE bug 1228628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228940">SUSE bug 1228940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228941">SUSE bug 1228941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228942">SUSE bug 1228942</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6988/">CVE-2024-6988 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6988">CVE-2024-6988 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6989/">CVE-2024-6989 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6989">CVE-2024-6989 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6990/">CVE-2024-6990 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6990">CVE-2024-6990 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6991/">CVE-2024-6991 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6991">CVE-2024-6991 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6992/">CVE-2024-6992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6992">CVE-2024-6992 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6993/">CVE-2024-6993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6993">CVE-2024-6993 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6994/">CVE-2024-6994 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6994">CVE-2024-6994 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6995/">CVE-2024-6995 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6995">CVE-2024-6995 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6996/">CVE-2024-6996 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6996">CVE-2024-6996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6997/">CVE-2024-6997 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6997">CVE-2024-6997 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6998/">CVE-2024-6998 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6998">CVE-2024-6998 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6999/">CVE-2024-6999 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6999">CVE-2024-6999 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7000/">CVE-2024-7000 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7000">CVE-2024-7000 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7001/">CVE-2024-7001 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7001">CVE-2024-7001 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7003/">CVE-2024-7003 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7003">CVE-2024-7003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7004/">CVE-2024-7004 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7004">CVE-2024-7004 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7005/">CVE-2024-7005 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7005">CVE-2024-7005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7255/">CVE-2024-7255 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7255">CVE-2024-7255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7256/">CVE-2024-7256 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7256">CVE-2024-7256 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7532/">CVE-2024-7532 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7532">CVE-2024-7532 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7533/">CVE-2024-7533 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7533">CVE-2024-7533 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7534/">CVE-2024-7534 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7534">CVE-2024-7534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7535/">CVE-2024-7535 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7535">CVE-2024-7535 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7536/">CVE-2024-7536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7536">CVE-2024-7536 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7550/">CVE-2024-7550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7550">CVE-2024-7550 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009880191" comment="chromedriver-127.0.6533.119-bp156.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880192" comment="chromium-127.0.6533.119-bp156.2.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880193" comment="gn-0.20240730-bp156.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880194" comment="rust-bindgen-0.69.1-bp156.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4068" version="1" class="patch">
	<metadata>
		<title>Security update for roundcubemail (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216895" ref_url="https://bugzilla.suse.com/1216895" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-47272" ref_url="https://www.suse.com/security/cve/CVE-2023-47272/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0257-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JQ3GTO6YI3BLAIR7PQZYZ5LRFR7OKTWN/" source="SUSE-SU"/>
		<description>
This update for roundcubemail fixes the following issues:

Update to 1.6.7

This is a security update to the stable version 1.6 of Roundcube Webmail.
It provides a fix to a recently reported XSS vulnerabilities:

  * Fix cross-site scripting (XSS) vulnerability in handling SVG animate attributes.
    Reported by Valentin T. and Lutz Wolf of CrowdStrike.
  * Fix cross-site scripting (XSS) vulnerability in handling list columns from user preferences.
    Reported by Huy Nguyễn Phạm Nhật.
  * Fix command injection via crafted im_convert_path/im_identify_path on Windows.
    Reported by Huy Nguyễn Phạm Nhật.

  CHANGELOG

  * Makefile: Use phpDocumentor v3.4 for the Framework docs (#9313)
  * Fix bug where HTML entities in URLs were not decoded on HTML to plain text conversion (#9312)
  * Fix bug in collapsing/expanding folders with some special characters in names (#9324)
  * Fix PHP8 warnings (#9363, #9365, #9429)
  * Fix missing field labels in CSV import, for some locales (#9393)
  * Fix cross-site scripting (XSS) vulnerability in handling SVG animate attributes
  * Fix cross-site scripting (XSS) vulnerability in handling list columns from user preferences
  * Fix command injection via crafted im_convert_path/im_identify_path on Windows

Update to 1.6.6:

  * Fix regression in handling LDAP search_fields configuration parameter (#9210)
  * Enigma: Fix finding of a private key when decrypting a message using GnuPG v2.3
  * Fix page jump menu flickering on click (#9196)
  * Update to TinyMCE 5.10.9 security release (#9228)
  * Fix PHP8 warnings (#9235, #9238, #9242, #9306)
  * Fix saving other encryption settings besides enigma's (#9240)
  * Fix unneeded php command use in installto.sh and deluser.sh scripts (#9237)
  * Fix TinyMCE localization installation (#9266)
  * Fix bug where trailing non-ascii characters in email addresses 
    could have been removed in recipient input (#9257)
  * Fix IMAP GETMETADATA command with options - RFC5464

Update to 1.6.5 (boo#1216895):

  * Fix cross-site scripting (XSS) vulnerability in setting 
    Content-Type/Content-Disposition for attachment 
    preview/download  CVE-2023-47272

  Other changes:

  * Fix PHP8 fatal error when parsing a malformed BODYSTRUCTURE (#9171)
  * Fix duplicated Inbox folder on IMAP servers that do not use Inbox 
    folder with all capital letters (#9166)
  * Fix PHP warnings (#9174)
  * Fix UI issue when dealing with an invalid managesieve_default_headers 
    value (#9175)
  * Fix bug where images attached to application/smil messages 
    weren't displayed (#8870)
  * Fix PHP string replacement error in utils/error.php (#9185)
  * Fix regression where smtp_user did not allow pre/post strings 
    before/after %u placeholder (#9162)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-21"/>
	<updated date="2024-08-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216895">SUSE bug 1216895</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-47272/">CVE-2023-47272 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47272">CVE-2023-47272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880822" comment="roundcubemail-1.6.7-bp155.2.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4069" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229426" ref_url="https://bugzilla.suse.com/1229426" source="BUGZILLA"/>
		<reference ref_id="1229591" ref_url="https://bugzilla.suse.com/1229591" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-7964" ref_url="https://www.suse.com/security/cve/CVE-2024-7964/" source="CVE"/>
		<reference ref_id="CVE-2024-7965" ref_url="https://www.suse.com/security/cve/CVE-2024-7965/" source="CVE"/>
		<reference ref_id="CVE-2024-7966" ref_url="https://www.suse.com/security/cve/CVE-2024-7966/" source="CVE"/>
		<reference ref_id="CVE-2024-7967" ref_url="https://www.suse.com/security/cve/CVE-2024-7967/" source="CVE"/>
		<reference ref_id="CVE-2024-7968" ref_url="https://www.suse.com/security/cve/CVE-2024-7968/" source="CVE"/>
		<reference ref_id="CVE-2024-7969" ref_url="https://www.suse.com/security/cve/CVE-2024-7969/" source="CVE"/>
		<reference ref_id="CVE-2024-7971" ref_url="https://www.suse.com/security/cve/CVE-2024-7971/" source="CVE"/>
		<reference ref_id="CVE-2024-7972" ref_url="https://www.suse.com/security/cve/CVE-2024-7972/" source="CVE"/>
		<reference ref_id="CVE-2024-7973" ref_url="https://www.suse.com/security/cve/CVE-2024-7973/" source="CVE"/>
		<reference ref_id="CVE-2024-7974" ref_url="https://www.suse.com/security/cve/CVE-2024-7974/" source="CVE"/>
		<reference ref_id="CVE-2024-7975" ref_url="https://www.suse.com/security/cve/CVE-2024-7975/" source="CVE"/>
		<reference ref_id="CVE-2024-7976" ref_url="https://www.suse.com/security/cve/CVE-2024-7976/" source="CVE"/>
		<reference ref_id="CVE-2024-7977" ref_url="https://www.suse.com/security/cve/CVE-2024-7977/" source="CVE"/>
		<reference ref_id="CVE-2024-7978" ref_url="https://www.suse.com/security/cve/CVE-2024-7978/" source="CVE"/>
		<reference ref_id="CVE-2024-7979" ref_url="https://www.suse.com/security/cve/CVE-2024-7979/" source="CVE"/>
		<reference ref_id="CVE-2024-7980" ref_url="https://www.suse.com/security/cve/CVE-2024-7980/" source="CVE"/>
		<reference ref_id="CVE-2024-7981" ref_url="https://www.suse.com/security/cve/CVE-2024-7981/" source="CVE"/>
		<reference ref_id="CVE-2024-8033" ref_url="https://www.suse.com/security/cve/CVE-2024-8033/" source="CVE"/>
		<reference ref_id="CVE-2024-8034" ref_url="https://www.suse.com/security/cve/CVE-2024-8034/" source="CVE"/>
		<reference ref_id="CVE-2024-8035" ref_url="https://www.suse.com/security/cve/CVE-2024-8035/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0258-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G5G3DFUIZH3E3T5UIPSI3LSGCI5KE3NF/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

- Chromium 128.0.6613.84 (boo#1229591)
  * CVE-2024-7964: Use after free in Passwords
  * CVE-2024-7965: Inappropriate implementation in V8
  * CVE-2024-7966: Out of bounds memory access in Skia
  * CVE-2024-7967: Heap buffer overflow in Fonts
  * CVE-2024-7968: Use after free in Autofill
  * CVE-2024-7969: Type Confusion in V8
  * CVE-2024-7971: Type confusion in V8
  * CVE-2024-7972: Inappropriate implementation in V8
  * CVE-2024-7973: Heap buffer overflow in PDFium
  * CVE-2024-7974: Insufficient data validation in V8 API
  * CVE-2024-7975: Inappropriate implementation in Permissions
  * CVE-2024-7976: Inappropriate implementation in FedCM
  * CVE-2024-7977: Insufficient data validation in Installer
  * CVE-2024-7978: Insufficient policy enforcement in Data Transfer
  * CVE-2024-7979: Insufficient data validation in Installer
  * CVE-2024-7980: Insufficient data validation in Installer
  * CVE-2024-7981: Inappropriate implementation in Views
  * CVE-2024-8033: Inappropriate implementation in WebApp Installs
  * CVE-2024-8034: Inappropriate implementation in Custom Tabs
  * CVE-2024-8035: Inappropriate implementation in Extensions
  * Various fixes from internal audits, fuzzing and other initiatives
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229426">SUSE bug 1229426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229591">SUSE bug 1229591</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7964/">CVE-2024-7964 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7964">CVE-2024-7964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7965/">CVE-2024-7965 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7965">CVE-2024-7965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7966/">CVE-2024-7966 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7966">CVE-2024-7966 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7967/">CVE-2024-7967 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7967">CVE-2024-7967 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7968/">CVE-2024-7968 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7968">CVE-2024-7968 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7969/">CVE-2024-7969 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7969">CVE-2024-7969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7971/">CVE-2024-7971 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7971">CVE-2024-7971 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7972/">CVE-2024-7972 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7972">CVE-2024-7972 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7973/">CVE-2024-7973 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7973">CVE-2024-7973 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7974/">CVE-2024-7974 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7974">CVE-2024-7974 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7975/">CVE-2024-7975 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7975">CVE-2024-7975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7976/">CVE-2024-7976 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7976">CVE-2024-7976 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7977/">CVE-2024-7977 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7977">CVE-2024-7977 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7978/">CVE-2024-7978 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7978">CVE-2024-7978 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7979/">CVE-2024-7979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7979">CVE-2024-7979 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7980/">CVE-2024-7980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7980">CVE-2024-7980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7981/">CVE-2024-7981 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7981">CVE-2024-7981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8033/">CVE-2024-8033 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8033">CVE-2024-8033 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8034/">CVE-2024-8034 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8034">CVE-2024-8034 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8035/">CVE-2024-8035 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8035">CVE-2024-8035 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009880905" comment="chromedriver-128.0.6613.84-bp156.2.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880906" comment="chromium-128.0.6613.84-bp156.2.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4070" version="1" class="patch">
	<metadata>
		<title>Security update for seamonkey (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="openSUSE-SU-2024:0026-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OGI7EUNMLZU4UAVRG45B5WQC4TV4VFIL/" source="SUSE-SU"/>
		<description>
This update for seamonkey fixes the following issues:

Update to 2.53.18.1:

* Update the NSS library to the latest esr 115 version for the final
  2.53.18.1 release.
* SeaMonkey 2.53.18.1 uses the same backend as Firefox and contains
  the relevant Firefox 60.8 security fixes.
* SeaMonkey 2.53.18.1 shares most parts of the mail and news code
  with Thunderbird. Please read the Thunderbird 60.8.0 release notes
  for specific security fixes in this release.
* Additional important security fixes up to Current Firefox 115.7
  and Thunderbird 115.7 ESR plus many enhancements have been
  backported. We will continue to enhance SeaMonkey security in
  subsequent 2.53.x beta and release versions as fast as we are able to.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-19"/>
	<updated date="2024-01-19"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009819963" comment="seamonkey-2.53.18.1-bp155.2.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819964" comment="seamonkey-dom-inspector-2.53.18.1-bp155.2.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819965" comment="seamonkey-irc-2.53.18.1-bp155.2.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4071" version="1" class="patch">
	<metadata>
		<title>Security update for php81 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226073" ref_url="https://bugzilla.suse.com/1226073" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-5458" ref_url="https://www.suse.com/security/cve/CVE-2024-5458/" source="CVE"/>
		<description>

This update for php81 fixes the following issue:

- Version update to 8.1.29 [bsc#1226073]

  - Fixed bug GHSA-w8qr-v226-r27w (Filter bypass in filter_var FILTER_VALIDATE_URL). (CVE-2024-5458)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-24"/>
	<updated date="2024-08-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1226073">SUSE bug 1226073</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-5458/">CVE-2024-5458 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5458">CVE-2024-5458 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009880907" comment="apache2-mod_php81-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880908" comment="php81-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880909" comment="php81-bcmath-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880910" comment="php81-bz2-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880911" comment="php81-calendar-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880912" comment="php81-cli-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880913" comment="php81-ctype-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880914" comment="php81-curl-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880915" comment="php81-dba-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880916" comment="php81-devel-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880917" comment="php81-dom-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880918" comment="php81-embed-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880919" comment="php81-enchant-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880920" comment="php81-exif-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880921" comment="php81-fastcgi-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880922" comment="php81-ffi-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880923" comment="php81-fileinfo-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880924" comment="php81-fpm-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880925" comment="php81-fpm-apache-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880926" comment="php81-ftp-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880927" comment="php81-gd-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880928" comment="php81-gettext-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880929" comment="php81-gmp-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880930" comment="php81-iconv-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880931" comment="php81-intl-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880932" comment="php81-ldap-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880933" comment="php81-mbstring-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880934" comment="php81-mysql-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880935" comment="php81-odbc-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880936" comment="php81-opcache-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880937" comment="php81-openssl-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880938" comment="php81-pcntl-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880939" comment="php81-pdo-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880940" comment="php81-pgsql-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880941" comment="php81-phar-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880942" comment="php81-posix-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880943" comment="php81-readline-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880944" comment="php81-shmop-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880945" comment="php81-snmp-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880946" comment="php81-soap-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880947" comment="php81-sockets-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880948" comment="php81-sodium-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880949" comment="php81-sqlite-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880950" comment="php81-sysvmsg-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880951" comment="php81-sysvsem-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880952" comment="php81-sysvshm-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880953" comment="php81-test-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880954" comment="php81-tidy-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880955" comment="php81-tokenizer-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880956" comment="php81-xmlreader-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880957" comment="php81-xmlwriter-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880958" comment="php81-xsl-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880959" comment="php81-zip-8.1.29-bp155.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880960" comment="php81-zlib-8.1.29-bp155.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4072" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229897" ref_url="https://bugzilla.suse.com/1229897" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-7969" ref_url="https://www.suse.com/security/cve/CVE-2024-7969/" source="CVE"/>
		<reference ref_id="CVE-2024-8193" ref_url="https://www.suse.com/security/cve/CVE-2024-8193/" source="CVE"/>
		<reference ref_id="CVE-2024-8194" ref_url="https://www.suse.com/security/cve/CVE-2024-8194/" source="CVE"/>
		<reference ref_id="CVE-2024-8198" ref_url="https://www.suse.com/security/cve/CVE-2024-8198/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0267-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RIZKO6CBLHDIQSHSR5OD4LHRUHJOZWTG/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 128.0.6613.113 (boo#1229897)

* CVE-2024-7969: Type Confusion in V8
* CVE-2024-8193: Heap buffer overflow in Skia
* CVE-2024-8194: Type Confusion in V8
* CVE-2024-8198: Heap buffer overflow in Skia

		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-30"/>
	<updated date="2024-08-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229897">SUSE bug 1229897</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7969/">CVE-2024-7969 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7969">CVE-2024-7969 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8193/">CVE-2024-8193 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8193">CVE-2024-8193 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8194/">CVE-2024-8194 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8194">CVE-2024-8194 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8198/">CVE-2024-8198 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8198">CVE-2024-8198 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009881504" comment="chromedriver-128.0.6613.113-bp156.2.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881505" comment="chromium-128.0.6613.113-bp156.2.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4073" version="1" class="patch">
	<metadata>
		<title>Security update for trivy (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224781" ref_url="https://bugzilla.suse.com/1224781" source="BUGZILLA"/>
		<reference ref_id="1227022" ref_url="https://bugzilla.suse.com/1227022" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-42363" ref_url="https://www.suse.com/security/cve/CVE-2023-42363/" source="CVE"/>
		<reference ref_id="CVE-2024-35192" ref_url="https://www.suse.com/security/cve/CVE-2024-35192/" source="CVE"/>
		<reference ref_id="CVE-2024-6257" ref_url="https://www.suse.com/security/cve/CVE-2024-6257/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6XAQOEGAUMX4BBTNYDJHKA4H3VD5H2PQ/" source="SUSE-SU"/>
		<description>

trivy was updated to fix the following issues:

Update to version 0.54.1:

* fix(flag): incorrect behavior for deprected flag `--clear-cache` [backport: release/v0.54] (#7285)
* fix(java): Return error when trying to find a remote pom to avoid segfault [backport: release/v0.54] (#7283)
* fix(plugin): do not call GitHub content API for releases and tags [backport: release/v0.54] (#7279)
* docs: update ecosystem page reporting with plopsec.com app (#7262)
* feat(vex): retrieve VEX attestations from OCI registries (#7249)
* feat(sbom): add image labels into `SPDX` and `CycloneDX` reports (#7257)
* refactor(flag): return error if both `--download-db-only` and `--download-java-db-only` are specified (#7259)
* fix(nodejs): detect direct dependencies when using `latest` version for files `yarn.lock` + `package.json` (#7110)
* chore: show VEX notice for OSS maintainers in CI environments (#7246)
* feat(vuln): add `--pkg-relationships` (#7237)
* docs: show VEX cli pages + update config file page for VEX flags (#7244)
* fix(dotnet): show `nuget package dir not found` log only when checking `nuget` packages (#7194)
* feat(vex): VEX Repository support (#7206)
* fix(secret): skip regular strings contain secret patterns (#7182)
* feat: share build-in rules (#7207)
* fix(report): hide empty table when all secrets/license/misconfigs are ignored (#7171)
* fix(cli): error on missing config file (#7154)
* fix(secret): update length of `hugging-face-access-token` (#7216)
* feat(sbom): add vulnerability support for SPDX formats (#7213)
* fix(secret): trim excessively long lines (#7192)
* chore(vex): update subcomponents for CVE-2023-42363/42364/42365/42366 (#7201)
* fix(server): pass license categories to options (#7203)
* feat(mariner): Add support for Azure Linux (#7186)
* docs: updates config file (#7188)
* refactor(fs): remove unused field for CompositeFS (#7195)
* fix: add missing platform and type to spec (#7149)
* feat(misconf): enabled China configuration for ACRs (#7156)
* fix: close file when failed to open gzip (#7164)
* docs: Fix PR documentation to use GitHub Discussions, not Issues (#7141)
* docs(misconf): add info about limitations for terraform plan json (#7143)
* chore: add VEX for Trivy images (#7140)
* chore: add VEX document and generator for Trivy  (#7128)
* fix(misconf): do not evaluate TF when a load error occurs (#7109)
* feat(cli): rename `--vuln-type` flag to `--pkg-types` flag (#7104)
* refactor(secret): move warning about file size after `IsBinary` check (#7123)
* feat: add openSUSE tumbleweed detection and scanning (#6965)
* test: add missing advisory details for integration tests database (#7122)
* fix: Add dependencyManagement exclusions to the child exclusions (#6969)
* fix: ignore nodes when listing permission is not allowed (#7107)
* fix(java): use `go-mvn-version` to remove `Package` duplicates (#7088)
* refactor(secret): add warning about large files (#7085)
* feat(nodejs): add license parser to pnpm analyser (#7036)
* refactor(sbom): add sbom prefix + filepaths for decode log messages (#7074)
* feat: add `log.FilePath()` function for logger (#7080)
* chore: bump golangci-lint from v1.58 to v1.59 (#7077)
* perf(debian): use `bytes.Index` in `emptyLineSplit` to cut allocation (#7065)
* refactor: pass DB dir to trivy-db (#7057)
* docs: navigate to the release highlights and summary (#7072)

Update to version 0.53.0 (bsc#1227022, CVE-2024-6257):

* feat(conda): add licenses support for `environment.yml` files (#6953)
* fix(sbom): fix panic when scanning SBOM file without root component into SBOM format (#7051)
* feat: add memory cache backend (#7048)
* fix(sbom): use package UIDs for uniqueness (#7042)
* feat(php): add installed.json file support (#4865)
* docs: ✨ Updated ecosystem docs with reference to new community app (#7041)
* fix: use embedded when command path not found (#7037)
* refactor: use google/wire for cache (#7024)
* fix(cli): show info message only when --scanners is available (#7032)
* chore: enable float-compare rule from testifylint (#6967)
* docs: Add sudo on commands, chmod before mv on install docs (#7009)
* fix(plugin): respect `--insecure` (#7022)
* feat(k8s)!: node-collector dynamic commands support (#6861)
* fix(sbom): take pkg name from `purl` for maven pkgs (#7008)
* feat!: add clean subcommand (#6993)
* chore: use `!` for breaking changes (#6994)
* feat(aws)!: Remove aws subcommand (#6995)
* refactor: replace global cache directory with parameter passing (#6986)
* fix(sbom): use `purl` for `bitnami` pkg names (#6982)
* chore: bump Go toolchain version (#6984)
* refactor: unify cache implementations (#6977)
* docs: non-packaged and sbom clarifications (#6975)
* BREAKING(aws): Deprecate `trivy aws` as subcmd in favour of a plugin (#6819)
* docs: delete unknown URL (#6972)
* refactor: use version-specific URLs for documentation references (#6966)
* refactor: delete db mock (#6940)
* refactor: add warning if severity not from vendor (or NVD or GH) is used (#6726)
* feat: Add local ImageID to SARIF metadata (#6522)
* fix(suse): Add SLES 15.6 and Leap 15.6 (#6964)
* feat(java): add support for sbt projects using sbt-dependency-lock (#6882)
* feat(java): add support for `maven-metadata.xml` files for remote snapshot repositories. (#6950)
* fix(purl): add missed os types (#6955)
* fix(cyclonedx): trim non-URL info for `advisory.url` (#6952)
* fix(c): don't skip conan files from `file-patterns` and scan `.conan2` cache dir (#6949)
* fix(image): parse `image.inspect.Created` field only for non-empty values (#6948)
* fix(misconf): handle source prefix to ignore (#6945)
* fix(misconf): fix parsing of engine links and frameworks (#6937)
* feat(misconf): support of selectors for all providers for Rego (#6905)
* fix(license): return license separation using separators  `,`, `or`, etc. (#6916)
* feat(misconf): add support for AWS::EC2::SecurityGroupIngress/Egress (#6755)
* BREAKING(misconf): flatten recursive types (#6862)
* test: bump docker API to 1.45  (#6914)
* feat(sbom): migrate to `CycloneDX v1.6` (#6903)
* feat(image): Set User-Agent header for Trivy container registry requests (#6868)
* fix(debian): take installed files from the origin layer (#6849)
* fix(nodejs): fix infinite loop when package link from `package-lock.json` file is broken (#6858)
* feat(misconf): API Gateway V1 support for CloudFormation (#6874)
* feat(plugin): add support for nested archives (#6845)
* fix(sbom): don't overwrite `srcEpoch` when decoding SBOM files (#6866)
* fix(secret): `Asymmetric Private Key` shouldn't start with space (#6867)
* chore: auto label discussions (#5259)
* docs: explain how VEX is applied (#6864)
* fix(python): compare pkg names from `poetry.lock` and `pyproject.toml` in lowercase (#6852)
* fix(nodejs): fix infinity loops for `pnpm` with cyclic imports (#6857)
* feat(dart): use first version of constraint for dependencies using SDK version (#6239)
* fix(misconf): parsing numbers without fraction as int (#6834)
* fix(misconf): fix caching of modules in subdirectories (#6814)
* feat(misconf): add metadata to Cloud schema (#6831)
* test: replace embedded Git repository with dynamically created repository (#6824)

Update to version 0.52.2:

* test: bump docker API to 1.45  [backport: release/v0.52] (#6922)
* fix(debian): take installed files from the origin layer [backport: release/v0.52] (#6892)

Update to version 0.52.1:

* fix(nodejs): fix infinite loop when package link from `package-lock.json` file is broken [backport: release/v0.52] (#6888)
* fix(sbom): don't overwrite `srcEpoch` when decoding SBOM files [backport: release/v0.52] (#6881)
* fix(python): compare pkg names from `poetry.lock` and `pyproject.toml` in lowercase [backport: release/v0.52] (#6878)
* docs: explain how VEX is applied (#6864)
* fix(nodejs): fix infinity loops for `pnpm` with cyclic imports (#6857)

Update to version 0.52.0 (bsc#1224781, CVE-2024-35192):

* fix(plugin): initialize logger (#6836)
* fix(cli): always output fatal errors to stderr (#6827)
* fix: close testfile (#6830)
* docs(julia): add scanner table (#6826)
* feat(python): add license support for `requirement.txt` files (#6782)
* docs: add more workarounds for out-of-disk (#6821)
* chore: improve error message for image not found (#6822)
* fix(sbom): fix panic for `convert` mode when scanning json file derived from sbom file (#6808)
* fix: clean up golangci lint configuration (#6797)
* fix(python): add package name and version validation for `requirements.txt` files. (#6804)
* feat(vex): improve relationship support in CSAF VEX (#6735)
* chore(alpine): add eol date for Alpine 3.20 (#6800)
* docs(plugin): add missed `plugin` section (#6799)
* fix: include packages unless it is not needed (#6765)
* feat(misconf): support for VPC resources for inbound/outbound rules (#6779)
* chore: replace interface{} with any (#6751)
* fix: close settings.xml (#6768)
* refactor(go): add priority for gobinary module versions from `ldflags` (#6745)
* build: use main package instead of main.go (#6766)
* feat(misconf): resolve tf module from OpenTofu compatible registry (#6743)
* docs: add info on adding compliance checks (#6275)
* docs: Add documentation for contributing additional checks to the trivy policies repo (#6234)
* feat(nodejs): add v9 pnpm lock file support (#6617)
* feat(vex): support non-root components for products in OpenVEX (#6728)
* feat(python): add line number support for `requirement.txt` files (#6729)
* chore: respect timeout value in .golangci.yaml (#6724)
* fix: node-collector high and critical cves (#6707)
* Merge pull request from GHSA-xcq4-m2r3-cmrj
* chore: auto-bump golang patch versions (#6711)
* fix(misconf): don't shift ignore rule related to code (#6708)
* feat(plugin): specify plugin version (#6683)
* chore: enforce golangci-lint version (#6700)
* fix(go): include only `.version`|`.ver` (no prefixes) ldflags for `gobinaries` (#6705)
* fix(go): add only non-empty root modules for `gobinaries` (#6710)
* refactor: unify package addition and vulnerability scanning (#6579)
* fix: Golang version parsing from binaries w/GOEXPERIMENT (#6696)
* feat(misconf): Add support for deprecating a check (#6664)
* feat: Add Julia language analyzer support (#5635)
* feat(misconf): register builtin Rego funcs from trivy-checks (#6616)
* fix(report): hide empty tables if all vulns has been filtered (#6352)
* feat(report): Include licenses and secrets filtered by rego to ModifiedFindings (#6483)
* feat: add support for plugin index (#6674)
* docs: add support table for client server mode (#6498)
* fix: close APKINDEX archive file (#6672)
* fix(misconf): skip Rego errors with a nil location (#6666)
* refactor: move artifact types under artifact package to avoid import cycles (#6652)
* refactor(misconf): remove extrafs (#6656)
* refactor: re-define module structs for serialization (#6655)
* chore(misconf): Clean up iac logger (#6642)
* feat(misconf): support symlinks inside of Helm archives (#6621)
* feat(misconf): add Terraform 'removed' block to schema (#6640)
* refactor: unify Library and Package structs (#6633)
* fix: use of specified context to obtain cluster name (#6645)
* perf(misconf): parse rego input once (#6615)
* fix(misconf): skip Rego errors with a nil location (#6638)
* docs: link warning to both timeout config options (#6620)
* docs: fix usage of image-config-scanners (#6635)

Update to version 0.51.1:

* fix(fs): handle default skip dirs properly (#6628)
* fix(misconf): load cached tf modules (#6607)
* fix(misconf): do not use semver for parsing tf module versions (#6614)
* refactor: move setting scanners when using compliance reports to flag parsing (#6619)
* feat: introduce package UIDs for improved vulnerability mapping (#6583)
* perf(misconf): Improve cause performance (#6586)
* docs: trivy-k8s new experiance remove un-used section (#6608)
* docs: remove mention of GitLab Gold because it doesn't exist anymore (#6609)
* feat(misconf): Use updated terminology for misconfiguration checks (#6476)
* docs: use `generic` link from `trivy-repo` (#6606)
* docs: update trivy k8s with new experience (#6465)
* feat: support `--skip-images` scanning flag (#6334)
* BREAKING: add support for k8s `disable-node-collector` flag (#6311)
* feat: add ubuntu 23.10 and 24.04 support (#6573)
* docs(go): add stdlib (#6580)
* feat(go): parse main mod version from build info settings (#6564)
* feat: respect custom exit code from plugin (#6584)
* docs: add asdf and mise installation method (#6063)
* feat(vuln): Handle scanning conan v2.x lockfiles (#6357)
* feat: add support `environment.yaml` files (#6569)
* fix: close plugin.yaml (#6577)
* fix: trivy k8s avoid deleting non-default node collector namespace  (#6559)
* BREAKING: support exclude `kinds/namespaces` and include `kinds/namespaces` (#6323)
* feat(go): add main module (#6574)
* feat: add relationships (#6563)
* docs: mention `--show-suppressed` is available in table (#6571)
* chore: fix sqlite to support loong64 (#6511)
* fix(debian): sort dpkg info before parsing due to exclude directories (#6551)
* docs: update info about config file (#6547)
* docs: remove RELEASE_VERSION from trivy.repo (#6546)
* fix(sbom): change error to warning for multiple OSes (#6541)
* fix(vuln): skip empty versions (#6542)
* feat(c): add license support for conan lock files (#6329)
* fix(terraform): Attribute and fileset fixes (#6544)
* refactor: change warning if no vulnerability details are found (#6230)
* refactor(misconf): improve error handling in the Rego scanner (#6527)
* feat(go): parse main module of go binary files (#6530)
* refactor(misconf): simplify the retrieval of module annotations (#6528)
* docs(nodejs): add info about supported versions of pnpm lock files (#6510)
* feat(misconf): loading embedded checks as a fallback (#6502)
* fix(misconf): Parse JSON k8s manifests properly (#6490)
* refactor: remove parallel walk (#5180)
* fix: close pom.xml (#6507)
* fix(secret): convert severity for custom rules (#6500)
* fix(java): update logic to detect `pom.xml` file snapshot artifacts from remote repositories (#6412)
* fix: typo (#6283)
* docs(k8s,image): fix command-line syntax issues (#6403)
* fix(misconf): avoid panic if the scheme is not valid (#6496)
* feat(image): goversion as stdlib (#6277)
* fix: add color for error inside of log message (#6493)
* docs: fix links to OPA docs (#6480)
* refactor: replace zap with slog (#6466)
* docs: update links to IaC schemas (#6477)
* chore: bump Go to 1.22 (#6075)
* refactor(terraform): sync funcs with Terraform (#6415)
* feat(misconf): add helm-api-version and helm-kube-version flag (#6332)
* fix(terraform): eval submodules (#6411)
* refactor(terraform): remove unused options (#6446)
* refactor(terraform): remove unused file (#6445)
* fix(misconf): Escape template value correctly (#6292)
* feat(misconf): add support for wildcard ignores (#6414)
* fix(cloudformation): resolve `DedicatedMasterEnabled` parsing issue (#6439)
* refactor(terraform): remove metrics collection (#6444)
* feat(cloudformation): add support for logging and endpoint access for EKS (#6440)
* fix(db): check schema version for image name only (#6410)
* feat(misconf): Support private registries for misconf check bundle (#6327)
* feat(cloudformation): inline ignore support for YAML templates (#6358)
* feat(terraform): ignore resources by nested attributes (#6302)
* perf(helm): load in-memory files (#6383)
* feat(aws): apply filter options to result (#6367)
* feat(aws): quiet flag support (#6331)
* fix(misconf): clear location URI for SARIF (#6405)
* test(cloudformation): add CF tests (#6315)
* fix(cloudformation): infer type after resolving a function (#6406)
* fix(sbom): fix error when parent of SPDX Relationships is not a package. (#6399)
* docs: add info about support for package license detection in `fs`/`repo` modes (#6381)
* fix(nodejs): add support for parsing `workspaces` from `package.json` as an object (#6231)
* fix: use `0600` perms for tmp files for post analyzers (#6386)
* fix(helm): scan the subcharts once (#6382)
* docs(terraform): add file patterns for Terraform Plan (#6393)
* fix(terraform): сhecking SSE encryption algorithm validity (#6341)
* fix(java): parse modules from `pom.xml` files once (#6312)
* fix(server): add Locations for `Packages` in client/server mode (#6366)
* fix(sbom): add check for `CreationInfo` to nil when detecting SPDX created using Trivy (#6346)
* fix(report): don't include empty strings in `.vulnerabilities[].identifiers[].url` when `gitlab.tpl` is used (#6348)
* chore(ubuntu): Add Ubuntu 22.04 EOL date (#6371)
* feat(java): add support licenses and graph for gradle lock files (#6140)
* feat(vex): consider root component for relationships (#6313)
* fix: increase the default buffer size for scanning dpkg status files by 2 times (#6298)
* chore: updates wazero to v1.7.0 (#6301)
* feat(sbom): Support license detection for SBOM scan (#6072)
* refactor(sbom): use intermediate representation for SPDX (#6310)
* docs(terraform): improve documentation for filtering by inline comments (#6284)
* fix(terraform): fix policy document retrieval (#6276)
* refactor(terraform): remove unused custom error (#6303)
* refactor(sbom): add intermediate representation for BOM (#6240)
* fix(amazon): check only major version of AL to find advisories (#6295)
* fix(db): use schema version as tag only for `trivy-db` and `trivy-java-db` registries by default (#6219)
* fix(nodejs): add name validation for package name from `package.json`  (#6268)
* docs: Added install instructions for FreeBSD (#6293)
* feat(image): customer podman host or socket option (#6256)
* feat(java): mark dependencies from `maven-invoker-plugin` integration tests pom.xml files as `Dev` (#6213)
* fix(license): reorder logic of how python package licenses are acquired (#6220)
* test(terraform): skip cached modules (#6281)
* feat(secret): Support for detecting Hugging Face Access Tokens (#6236)
* fix(cloudformation): support of all SSE algorithms for s3 (#6270)
* feat(terraform): Terraform Plan snapshot scanning support (#6176)
* fix: typo function name and comment optimization (#6200)
* fix(java): don't ignore runtime scope for pom.xml files (#6223)
* fix(license): add FilePath to results to allow for license path filtering via trivyignore file (#6215)
* test(k8s): use test-db for k8s integration tests (#6222)
* fix(terraform): fix root module search (#6160)
* test(parser): squash test data for yarn (#6203)
* fix(terraform): do not re-expand dynamic blocks (#6151)
* docs: update ecosystem page reporting with db app (#6201)
* fix: k8s summary separate infra and user finding results (#6120)
* fix: add context to target finding on k8s table view (#6099)
* fix: Printf format err (#6198)
* refactor: better integration of the parser into Trivy (#6183)
* feat(terraform): Add hyphen and non-ASCII support for domain names in credential extraction (#6108)
* fix(vex): CSAF filtering should consider relationships (#5923)
* refactor(report): Replacing `source_location` in `github` report when scanning an image (#5999)
* feat(vuln): ignore vulnerabilities by PURL (#6178)
* feat(java): add support for fetching packages from repos mentioned in pom.xml (#6171)
* feat(k8s): rancher rke2 version support (#5988)
* docs: update kbom distribution for scanning (#6019)
* chore: update CODEOWNERS (#6173)
* fix(swift): try to use branch to resolve version (#6168)
* fix(terraform): ensure consistent path handling across OS (#6161)
* fix(java): add only valid libs from `pom.properties` files from `jars` (#6164)
* fix(sbom): skip executable file analysis if Rekor isn't a specified SBOM source (#6163)
* docs(report): add remark about `path` to filter licenses using `.trivyignore.yaml` file (#6145)
* docs: update template path for gitlab-ci tutorial (#6144)
* feat(report): support for filtering licenses and secrets via rego policy files (#6004)
* fix(cyclonedx): move root component from scanned cyclonedx file to output cyclonedx file (#6113)
* docs: add SecObserve in CI/CD and reporting (#6139)
* fix(alpine): exclude empty licenses for apk packages (#6130)
* docs: add docs tutorial on custom policies with rego (#6104)
* fix(nodejs): use project dir when searching for workspaces for Yarn.lock files (#6102)
* feat(vuln): show suppressed vulnerabilities in table (#6084)
* docs: rename governance to principles (#6107)
* docs: add governance (#6090)
* feat(java): add dependency location support for `gradle` files (#6083)
* fix(misconf): get `user` from `Config.User` (#6070)

Update to version 0.49.1:

* fix: check unescaped `BomRef` when matching `PkgIdentifier` (#6025)
* docs: Fix broken link to 'pronunciation' (#6057)
* fix: fix cursor usage in Redis Clear function (#6056)
* fix(nodejs): add local packages support for `pnpm-lock.yaml` files (#6034)
* test: fix flaky `TestDockerEngine` (#6054)
* fix(java): recursive check all nested depManagements with import scope for pom.xml files (#5982)
* fix(cli): inconsistent behavior across CLI flags, environment variables, and config files (#5843)
* feat(rust): Support workspace.members parsing for Cargo.toml analysis (#5285)
* docs: add note about Bun (#6001)
* fix(report): use `AWS_REGION` env for secrets in `asff` template (#6011)
* fix: check returned error before deferring f.Close() (#6007)
* feat(misconf): add support of buildkit instructions when building dockerfile from image config (#5990)
* feat(vuln): enable `--vex` for all targets (#5992)
* docs: update link to data sources (#6000)
* feat(java): add support for line numbers for pom.xml files (#5991)
* refactor(sbom): use new `metadata.tools` struct for CycloneDX (#5981)
* docs: Update troubleshooting guide with image not found error (#5983)
* style: update band logos (#5968)
* docs: update cosign tutorial and commands, update kyverno policy (#5929)
* docs: update command to scan go binary (#5969)
* fix: handle non-parsable images names (#5965)
* fix(amazon): save system files for pkgs containing `amzn` in src (#5951)
* fix(alpine): Add EOL support for alpine 3.19. (#5938)
* feat: allow end-users to adjust K8S client QPS and burst (#5910)
* fix(nodejs): find licenses for packages with slash (#5836)
* fix(sbom): use `group` field for pom.xml and nodejs files for CycloneDX reports (#5922)
* fix: ignore no init containers (#5939)
* docs: Fix documentation of ecosystem (#5940)
* docs(misconf): multiple ignores in comment (#5926)
* fix(secret): find aws secrets ending with a comma or dot (#5921)
* docs: ✨ Updated ecosystem docs with reference to new community app (#5918)
* fix(java): check if a version exists when determining GAV by file name for `jar` files (#5630)
* feat(vex): add PURL matching for CSAF VEX (#5890)
* fix(secret): `AWS Secret Access Key` must include only secrets with `aws` text. (#5901)
* revert(report): don't escape new line characters for sarif format (#5897)
* docs: improve filter by rego (#5402)
* docs: add_scan2html_to_trivy_ecosystem (#5875)
* fix(vm): update ext4-filesystem fix reading groupdescriptor in 32bit mode (#5888)
* feat(vex): Add support for CSAF format (#5535)
* feat(python): parse licenses from dist-info folder (#4724)
* feat(nodejs): add yarn alias support (#5818)
* refactor: propagate time through context values (#5858)
* refactor: move PkgRef under PkgIdentifier (#5831)
* fix(cyclonedx): fix unmarshal for licenses (#5828)
* feat(vuln): include pkg identifier on detected vulnerabilities (#5439)

Update to version 0.48.1:

* fix(bitnami): use a different comparer for detecting vulnerabilities (#5633)
* refactor(sbom): disable html escaping for CycloneDX (#5764)
* refactor(purl): use `pub` from `package-url` (#5784)
* docs(python): add note to using `pip freeze` for `compatible releases` (#5760)
* fix(report): use OS information for OS packages purl in `github` template (#5783)
* fix(report): fix error if miconfigs are empty (#5782)
* refactor(vuln): don't remove VendorSeverity in JSON report (#5761)
* fix(report): don't mark misconfig passed tests as failed in junit.tpl (#5767)
* docs(k8s): replace --scanners config with --scanners misconfig in docs (#5746)
* fix(report): update Gitlab template (#5721)
* feat(secret): add support of GitHub fine-grained tokens (#5740)
* fix(misconf): add an image misconf to result (#5731)
* feat(secret): added support of Docker registry credentials (#5720)

Update to version 0.48.0:

* feat: filter k8s core components vuln results (#5713)
* feat(vuln): remove duplicates in Fixed Version (#5596)
* feat(report): output plugin (#4863)
* docs: typo in modules.md (#5712)
* feat: Add flag to configure node-collector image ref (#5710)
* feat(misconf): Add `--misconfig-scanners` option (#5670)
* chore: bump Go to 1.21 (#5662)
* feat: Packagesprops support (#5605)
* docs: update adopters discussion template (#5632)
* docs: terraform tutorial links updated to point to correct loc (#5661)
* fix(secret): add `sec` and space to secret prefix for `aws-secret-access-key` (#5647)
* fix(nodejs): support protocols for dependency section in yarn.lock files (#5612)
* fix(secret): exclude upper case before secret for `alibaba-access-key-id` (#5618)
* docs: Update Arch Linux package URL in installation.md (#5619)
* chore: add prefix to image errors (#5601)
* docs(vuln): fix link anchor (#5606)
* docs: Add Dagger integration section and cleanup Ecosystem CICD docs page (#5608)
* fix: k8s friendly error messages kbom non cluster scans (#5594)
* feat: set InstalledFiles for DEB and RPM packages (#5488)
* fix(report): use time.Time for CreatedAt (#5598)
* test: retry containerd initialization (#5597)
* feat(misconf): Expose misconf engine debug logs with `--debug` option (#5550)
* test: mock VM walker (#5589)
* chore: bump node-collector v0.0.9 (#5591)
* feat(misconf): Add support for `--cf-params` for CFT (#5507)
* feat(flag): replace '--slow' with '--parallel' (#5572)
* fix(report): add escaping for Sarif format (#5568)
* chore: show a deprecation notice for `--scanners config` (#5587)
* feat(report): Add CreatedAt to the JSON report. (#5542) (#5549)
* test: mock RPM DB (#5567)
* feat: add aliases to '--scanners' (#5558)
* refactor: reintroduce output writer (#5564)
* chore: not load plugins for auto-generating docs (#5569)
* chore: sort supported AWS services (#5570)
* fix: no schedule toleration (#5562)
* fix(cli): set correct `scanners` for `k8s` target (#5561)
* fix(sbom): add `FilesAnalyzed` and `PackageVerificationCode` fields for SPDX (#5533)
* refactor(misconf): Update refactored dependencies (#5245)
* feat(secret): add built-in rule for JWT tokens (#5480)
* fix: trivy k8s parse ecr image with arn (#5537)
* fix: fail k8s resource scanning (#5529)
* refactor(misconf): don't remove Highlighted in json format (#5531)
* docs(k8s): fix link in kubernetes.md (#5524)
* docs(k8s): fix whitespace in list syntax (#5525)

Update to version 0.47.0:

* docs: add info that license scanning supports file-patterns flag (#5484)
* docs: add Zora integration into Ecosystem session (#5490)
* fix(sbom): Use UUID as BomRef for packages with empty purl (#5448)
* fix: correct error mismatch causing race in fast walks (#5516)
* docs: k8s vulnerability scanning (#5515)
* docs: remove glad for java datasources (#5508)
* chore: remove unused logger attribute in amazon detector (#5476)
* fix: correct error mismatch causing race in fast walks (#5482)
* fix(server): add licenses to `BlobInfo` message (#5382)
* feat: scan vulns on k8s core component apps (#5418)
* fix(java): fix infinite loop when `relativePath` field points to `pom.xml` being scanned (#5470)
* fix(sbom): save digests for package/application when scanning SBOM files (#5432)
* docs: fix the broken link (#5454)
* docs: fix error when installing `PyYAML` for gh pages (#5462)
* fix(java): download java-db once (#5442)
* docs(misconf): Update `--tf-exclude-downloaded-modules` description (#5419)
* feat(misconf): Support `--ignore-policy` in config scans (#5359)
* docs(misconf): fix broken table for `Use container image` section (#5425)
* feat(dart): add graph support (#5374)
* refactor: define a new struct for scan targets (#5397)
* fix(sbom): add missed `primaryURL` and `source severity` for CycloneDX (#5399)
* fix: correct invalid MD5 hashes for rpms ending with one or more zero bytes (#5393)
* docs: remove --scanners none (#5384)
* docs: Update container_image.md #5182 (#5193)
* feat(report): Add `InstalledFiles` field to Package (#4706)
* feat(k8s): add support for vulnerability detection (#5268)
* fix(python): override BOM in `requirements.txt` files (#5375)
* docs: add kbom documentation (#5363)
* test: use maximize build space for VM tests (#5362)
* fix(report): add escaping quotes in misconfig Title for asff template (#5351)
* fix: Report error when os.CreateTemp fails (to be consistent with other uses) (#5342)
* fix: add config files to FS for post-analyzers (#5333)
* fix: fix MIME warnings after updating to Go 1.20 (#5336)
* build: fix a compile error with Go 1.21 (#5339)
* feat: added `Metadata` into the k8s resource's scan report (#5322)
* chore: update adopters template (#5330)
* fix(sbom): use PURL or Group and Name in case of Java  (#5154)
* docs: add buildkite repository to ecosystem page (#5316)
* chore: enable go-critic (#5302)
* close java-db client (#5273)
* fix(report): removes git::http from uri in sarif (#5244)
* Improve the meaning of  sentence (#5301)
* add app nil check (#5274)
* typo: in secret.md (#5281)
* docs: add info about `github` format (#5265)
* feat(dotnet): add license support for NuGet (#5217)
* docs: correctly export variables (#5260)
* chore: Add line numbers for lint output (#5247)
* chore(cli): disable java-db flags in server mode (#5263)
* feat(db): allow passing registry options (#5226)
* refactor(purl): use TypeApk from purl (#5232)
* chore: enable more linters (#5228)
* Fix typo on ide.md (#5239)
* refactor: use defined types (#5225)
* fix(purl): skip local Go packages (#5190)
* docs: update info about license scanning in Yarn projects (#5207)
* fix link (#5203)
* fix(purl): handle rust types (#5186)
* chore: auto-close issues (#5177)
* fix(k8s): kbom support addons labels (#5178)
* test: validate SPDX with the JSON schema (#5124)
* chore: bump trivy-kubernetes-latest (#5161)
* docs: add 'Signature Verification' guide (#4731)
* docs: add image-scanner-with-trivy for ecosystem (#5159)
* fix(fs): assign the absolute path to be inspected to ROOTPATH when filesystem (#5158)
* Update filtering.md (#5131)
* chaging adopters discussion tempalte (#5091)
* docs: add Bitnami (#5078)
* feat(docker): add support for scanning Bitnami components (#5062)
* feat: add support for .trivyignore.yaml (#5070)
* fix(terraform): improve detection of terraform files (#4984)
* feat: filter artifacts on --exclude-owned flag (#5059)
* fix(sbom): cyclonedx advisory should omit `null` value (#5041)
* build: maximize build space for build tests (#5072)
* feat: improve kbom component name (#5058)
* fix(pom): add licenses for pom artifacts (#5071)
* chore: bump Go to `1.20` (#5067)
* feat: PURL matching with qualifiers in OpenVEX (#5061)
* feat(java): add graph support for pom.xml (#4902)
* feat(swift): add vulns for cocoapods (#5037)
* fix: support image pull secret for additional workloads (#5052)
* fix: #5033 Superfluous double quote in html.tpl (#5036)
* docs(repo): update trivy repo usage and example (#5049)
* perf: Optimize Dockerfile for reduced layers and size (#5038)
* feat: scan K8s Resources Kind with --all-namespaces (#5043)
* fix: vulnerability typo (#5044)
* docs: adding a terraform tutorial to the docs (#3708)
* feat(report): add licenses to sarif format (#4866)
* feat(misconf): show the resource name in the report (#4806)
* chore: update alpine base images (#5015)
* feat: add Package.resolved swift files support (#4932)
* feat(nodejs): parse licenses in yarn projects (#4652)
* fix: k8s private registries support (#5021)
* bump github.com/testcontainers/testcontainers-go from 0.21.0 to 0.23.0 (#5018)
* feat(vuln): support last_affected field from osv (#4944)
* feat(server): add version endpoint (#4869)
* feat: k8s private registries support (#4987)
* fix(server): add indirect prop to package (#4974)
* docs: add coverage (#4954)
* feat(c): add location for lock file dependencies. (#4994)
* docs: adding blog post on ec2 (#4813)
* revert 32bit bins (#4977)

Update to version 0.44.1:

* fix(report): return severity colors in table format (#4969)
* build: maximize available disk space for release (#4937)
* test(cli): Fix assertion helptext (#4966)
* test: validate CycloneDX with the JSON schema (#4956)
* fix(server): add licenses to the Result message (#4955)
* fix(aws): resolve endpoint if endpoint is passed (#4925)
* fix(sbom): move licenses to `name` field in Cyclonedx format (#4941)
* use testify instead of gotest.tools (#4946)
* fix(nodejs): do not detect lock file in node_modules as an app (#4949)
* bump go-dep-parser (#4936)
* test(aws): move part of unit tests to integration (#4884)
* docs(cli): update help string for file and dir skipping (#4872)
* docs: update the discussion template (#4928)

 Update to version 0.44.0:

* feat(repo): support local repositories (#4890)
* bump go-dep-parser (#4893)
* fix(misconf): add missing fields to proto (#4861)
* fix: remove trivy-db package replacement (#4877)
* chore(test): bump the integration test timeout to 15m (#4880)
* chore: update CODEOWNERS (#4871)
* feat(vuln): support vulnerability status (#4867)
* feat(misconf): Support custom URLs for policy bundle (#4834)
* refactor: replace with sortable packages (#4858)
* docs: correct license scanning sample command (#4855)
* fix(report): close the file (#4842)
* feat(misconf): Add support for independently enabling libraries (#4070)
* feat(secret): add secret config file for cache calculation (#4837)
* Fix a link in gitlab-ci.md (#4850)
* fix(flag): use globalstar to skip directories (#4854)
* fix(license): using common way for splitting licenses (#4434)
* fix(containerd): Use img platform in exporter instead of strict host platform (#4477)
* remove govulndb (#4783)
* fix(java): inherit licenses from parents (#4817)
* refactor: add allowed values for CLI flags (#4800)
* add example regex to allow rules (#4827)
* feat(misconf): Support custom data for rego policies for cloud (#4745)
* docs: correcting the trivy k8s tutorial (#4815)
* feat(cli): add --tf-exclude-downloaded-modules flag (#4810)
* fix(sbom): cyclonedx recommendations should include fixed versions for each package (#4794)
* feat(misconf): enable --policy flag to accept directory and files both (#4777)
* feat(python): add license fields (#4722)
* fix: support trivy k8s-version on k8s sub-command (#4786)

Update to version 0.43.1:

* docs(image): fix the comment on the soft/hard link (#4740)
* check Type when filling pkgs in vulns (#4776)
* feat: add support of linux/ppc64le and linux/s390x architectures for Install.sh script (#4770)
* fix(rocky): add architectures support for advisories (#4691)
* fix: documentation about reseting trivy image (#4733)
* fix(suse): Add openSUSE Leap 15.5 eol date as well (#4744)
* fix: update Amazon Linux 1 EOL (#4761)

Update to version 0.43.0:

* feat(nodejs): support yarn workspaces (#4664)
* fix(image): pass the secret scanner option to scan the img config (#4735)
* fix: scan job pod it not found on k8s-1.27.x (#4729)
* feat(docker): add support for mTLS authentication when connecting to registry (#4649)
* fix: skip scanning the gpg-pubkey package (#4720)
* Fix http registry oci pull (#4701)
* feat(misconf): Support skipping services (#4686)
* docs: fix supported modes for pubspec.lock files (#4713)
* fix(misconf): disable the terraform plan analyzer for other scanners (#4714)
* clarifying a dir path is required for custom policies (#4716)
* chore: update alpine base images (#4715)
* fix last-history-created (#4697)
* feat: kbom and cyclonedx v1.5 spec support (#4708)
* docs: add information about Aqua (#4590)
* fix: k8s escape resource filename on windows os (#4693)
* feat: cyclondx sbom custom property support (#4688)
* add SUSE Linux Enterprise Server 15 SP5 and update SP4 eol date (#4690)
* use group field for jar in cyclonedx (#4674)
* feat(java): capture licenses from pom.xml (#4681)
* feat(helm): make sessionAffinity configurable (#4623)
* fix: Show the correct URL of the secret scanning (#4682)
* document expected file pattern definition format (#4654)
* fix: format arg error (#4642)
* feat(k8s): cyclonedx kbom support (#4557)
* fix(nodejs): remove unused fields for the pnpm lockfile (#4630)
* fix(vm): update ext4-filesystem parser for parse multi block extents (#4616)
* fix(debian): update EOL for Debian 12 (#4647)
* chore: unnecessary use of fmt.Sprintf (S1039) (#4637)
* fix(db): change argument order in Exists query for JavaDB (#4595)
* feat(aws): Add support to see successes in results (#4427)
* feat: trivy k8s private registry support (#4567)
* docs: add general coverage page (#3859)
* chore: create SECURITY.md (#4601)

Update to version 0.42.1:

* fix(misconf): deduplicate misconf results (#4588)
* fix(vm): support sector size of 4096 (#4564)
* fix(misconf): terraform relative paths (#4571)
* fix(purl): skip unsupported library type (#4577)
* fix(terraform): recursively detect all Root Modules (#4457)
* fix(vm): support post analyzer for vm command (#4544)
* fix(nodejs): change the type of the devDependencies field (#4560)
* fix(sbom): export empty dependencies in CycloneDX (#4568)
* refactor: add composite fs for post-analyzers (#4556)
* feat: add SBOM analyzer (#4210)
* fix(sbom): update logic for work with files in spdx format (#4513)
* feat: azure workload identity support (#4489)
* feat(ubuntu): add eol date for 18.04 ESM (#4524)
* fix(misconf): Update required extensions for terraformplan (#4523)
* refactor(cyclonedx): add intermediate representation (#4490)
* fix(misconf): Remove debug print while scanning (#4521)
* fix(java): remove duplicates of jar libs (#4515)
* fix(java): fix overwriting project props in pom.xml (#4498)
* docs: Update compilation instructions (#4512)
* fix(nodejs): update logic for parsing pnpm lock files (#4502)
*  fix(secret): remove aws-account-id rule (#4494)
* feat(oci): add support for referencing an input image by digest (#4470)
* docs: fixed the format (#4503)
* fix(java): add support of * for exclusions for pom.xml files (#4501)
* feat: adding issue template for documentation (#4453)
* docs: switch glad to ghsa for Go (#4493)
* feat(misconf): Add terraformplan support (#4342)
* feat(debian): add digests for dpkg (#4445)
* feat(k8s): exclude node scanning by node labels (#4459)
* docs: add info about multi-line mode for regexp from custom secret rules (#4159)
* feat(cli): convert JSON reports into a different format (#4452)
* feat(image): add logic to guess base layer for docker-cis scan (#4344)
* fix(cyclonedx): set original names for packages (#4306)
* feat: group subcommands (#4449)
* feat(cli): add retry to cache operations (#4189)
* fix(vuln): report architecture for `apk` packages (#4247)
* refactor: enable cases where return values are not needed in pipeline (#4443)
* fix(image): resolve scan deadlock when error occurs in slow mode (#4336)
* docs(misconf): Update docs for kubernetes file patterns (#4435)
* test: k8s integration tests (#4423)
* feat(redhat): add package digest for rpm (#4410)
* feat(misconf): Add `--reset-policy-bundle` for policy bundle (#4167)
* fix: typo (#4431)
* add user instruction to imgconf (#4429)
* fix(k8s): add image sources (#4411)
* docs(scanning): Add versioning banner (#4415)
* feat(cli): add mage command to update golden integration test files (#4380)
* feat: node-collector custom namespace support (#4407)
* refactor(sbom): use multiline json for spdx-json format (#4404)
* fix(ubuntu): add EOL date for Ubuntu 23.04 (#4347)
* refactor: code-optimization (#4214)
* feat(image): Add image-src flag to specify which runtime(s) to use (#4047)
*  test: skip wrong update of test golden files (#4379)
* refactor: don't return error for package.json without version/name (#4377)
* docs: cmd  error (#4376)
* test(cli): add test for config file and env combination (#2666)
* fix(report): set a correct file location for license scan output (#4326)
* chore(alpine): Update Alpine to 3.18 (#4351)
* fix(alpine): add EOL date for Alpine 3.18 (#4308)
* feat: allow root break for mapfs (#4094)
* docs(misconf): Remove examples.md (#4256)
* fix(ubuntu): update eol dates for Ubuntu (#4258)
* feat(alpine): add digests for apk packages (#4168)
* chore: add discussion templates (#4190)
* fix(terraform): Support tfvars (#4123)
* chore: separate docs:generate (#4242)
* refactor: define vulnerability scanner interfaces (#4117)
* feat: unified k8s scan resources (#4188)
* chore: trivy bin ignore (#4212)
* feat(image): enforce image platform (#4083)
* fix(ubuntu): fix version selection logic for ubuntu esm (#4171)
* chore: install.sh support for windows (#4155)
* docs: moving skipping files out of others (#4154)

Update to version 0.41.0:

* fix(spdx): add workaround for no src packages (#4118)
* test(golang): rename broken go.mod (#4129)
* feat(sbom): add supplier field (#4122)
* test(misconf): skip downloading of policies for tests #4126
* refactor: use debug message for post-analyze errors (#4037)
* feat(sbom): add VEX support (#4053)
* feat(sbom): add primary package purpose field for SPDX (#4119)
* fix(k8s): fix quiet flag (#4120)
* fix(python): parse of pip extras (#4103)
* feat(java): use full path for nested jars (#3992)
* feat(license): add new flag for classifier confidence level (#4073)
* feat: config and fs compliance support (#4097)
* feat(spdx): add support for SPDX 2.3 (#4058)
* fix: k8s all-namespaces support (#4096)
* perf(misconf): replace with post-analyzers (#4090)
* fix(helm): update networking API version detection (#4106)
* feat(image): custom docker host option (#3599)
* style: debug flag is incorrect and needs extra - (#4087)
* docs(vuln): Document inline vulnerability filtering comments (#4024)
* feat(fs): customize error callback during fs walk (#4038)
* fix(ubuntu): skip copyright files from subfolders (#4076)
* docs: restructure scanners (#3977)
* fix: fix `file does not exist` error for post-analyzers (#4061)

Update to version 0.40.0:

* feat(flag): Support globstar for `--skip-files` and `--skip-directories` (#4026)
* fix: return insecure option to download javadb (#4064)
* fix(nodejs): don't stop parsing when unsupported yarn.lock protocols are found (#4052)
* fix(k8s): current context title (#4055)
* fix(k8s): quit support on k8s progress bar (#4021)
* chore: add a note about Dockerfile.canary (#4050)
* fix(vuln): report architecture for debian packages (#4032)
* feat: add support for Chainguard's commercial distro (#3641)
* fix(vuln): fix error message for remote scanners (#4031)
* feat(report): add image metadata to SARIF (#4020)
* docs: fix broken cache link on Installation page (#3999)
* fix: lock downloading policies and database (#4017)
* fix: avoid concurrent access to the global map (#4014)
* feat(rust): add Cargo.lock v3 support (#4012)
* feat: auth support oci download server subcommand (#4008)
* chore: install.sh support for armv7 (#3985)

Update to version 0.39.1:

* fix(rust): fix panic when 'dependencies' field is not used in cargo.toml (#3997)
* fix(sbom): fix infinite loop for cyclonedx (#3998)
* fix: use warning for errors from enrichment files for post-analyzers (#3972)
* fix(helm): added annotation to psp configurable from values (#3893)
* fix(secret): update built-in rule `tests`  (#3855)
* test: rewrite scripts in Go (#3968)
* docs(cli): Improve glob documentation (#3945)

Update to version 0.39.0:

* docs(cli): added makefile and go file to create docs (#3930)
* feat(cyclonedx): support dependency graph (#3177)
* feat(server): redis with public TLS certs support (#3783)
* feat(flag): Add glob support to `--skip-dirs` and `--skip-files`  (#3866)
* chore: replace make with mage (#3932)
* fix(sbom): add checksum to files (#3888)
* chore: remove unused mount volumes (#3927)
* feat: add auth support for downloading OCI artifacts (#3915)
* refactor(purl): use epoch in qualifier (#3913)
* feat(image): add registry options (#3906)
* feat(rust): dependency tree and line numbers support for cargo lock file (#3746)
* feat(php): add support for location, licenses and graph for composer.lock files (#3873)
* feat(image): discover SBOM in OCI referrers (#3768)
* docs: change cache-dir key in config file (#3897)
* fix(sbom): use release and epoch for SPDX package version (#3896)
* docs: Update incorrect comment for skip-update flag (#3878)
* refactor(misconf): simplify policy filesystem (#3875)
* feat(nodejs): parse package.json alongside yarn.lock (#3757)
* fix(spdx): add PkgDownloadLocation field (#3879)
* chore(amazon): update EOL (#3876)
* fix(nodejs): improvement logic for package-lock.json v2-v3 (#3877)
* feat(amazon): add al2023 support (#3854)
* docs(misconf): Add information about selectors (#3703)
* docs(cli): update CLI docs with cobra (#3815)
* feat: k8s parallel processing (#3693)
* docs: add DefectDojo in the Security Management section (#3871)
* refactor: add pipeline (#3868)
* feat(cli): add javadb metadata to version info (#3835)
* feat(sbom): add support for CycloneDX JSON Attestation of the correct specification (#3849)
* feat: add node toleration option (#3823)
* fix: allow mapfs to open dirs (#3867)
* fix(report): update uri only for os class targets (#3846)
* feat(nodejs): Add v3 npm lock file support (#3826)
* feat(nodejs): parse package.json files alongside package-lock.json (#2916)
* docs(misconf): Fix links to built in policies (#3841)

Update to version 0.38.3:

  from 1.86.1 to 1.89.1
* fix(java): skip empty files for jar post analyzer
* fix(docker): build healthcheck command for line without
  /bin/sh prefix
* refactor(license): use goyacc for license parser (#3824)
  23.0.0-rc.1+incompatible to 23.0.1+incompatible
* fix: populate timeout context to node-collector
* fix: exclude node collector scanning (#3771)
* fix: display correct flag in error message when skipping
  java db update #3808
* fix: disable jar analyzer for scanners other than vuln (#3810)
* fix(sbom): fix incompliant license format for spdx (#3335)
* fix(java): the project props take precedence over the
  parent's props (#3320)
* docs: add canary build info to README.md (#3799)
* docs: adding link to gh token generation (#3784)
* docs: changing docs in accordance with #3460 (#3787)

Update to version 0.38.2:

* fix(license): disable jar analyzer for licence scan only (#3780)
* bump trivy-issue-action to v0.0.0; skip `pkg` dir (#3781)
* fix: skip checking dirs for required post-analyzers (#3773)
* docs: add information about plugin format (#3749)
* fix(sbom): add trivy version to spdx creators tool field (#3756)

Update to version 0.38.1:

* feat(misconf): Add support to show policy bundle version (#3743)
* fix(python): fix error with optional dependencies in pyproject.toml (#3741)
* add id for package.json files (#3750)

Update to version 0.38.0:

* fix(cli): pass integer to exit-on-eol (#3716)
* feat: add kubernetes pss compliance (#3498)
* feat: Adding --module-dir and --enable-modules (#3677)
* feat: add special IDs for filtering secrets (#3702)
* docs(misconf): Add guide on input schema (#3692)
* feat(go): support dependency graph and show only direct dependencies in the tree (#3691)
* feat: docker multi credential support (#3631)
* feat: summarize vulnerabilities in compliance reports (#3651)
* feat(python): parse pyproject.toml alongside poetry.lock (#3695)
* feat(python): add dependency tree for poetry lock file (#3665)
* fix(cyclonedx): incompliant affect ref (#3679)
* chore(helm): update skip-db-update environment variable (#3657)
* fix(spdx): change CreationInfo timestamp format RFC3336Nano to RFC3336 (#3675)
* fix(sbom): export empty dependencies in CycloneDX (#3664)
* docs: java-db air-gap doc tweaks (#3561)
* feat(go): license support (#3683)
* feat(ruby): add dependency tree/location support for Gemfile.lock (#3669)
* fix(k8s): k8s label size (#3678)
* fix(cyclondx): fix array empty value, null to [] (#3676)
* refactor: rewrite gomod analyzer as post-analyzer (#3674)
* feat: config outdated-api result filtered by k8s version (#3578)
* fix: Update to Alpine 3.17.2 (#3655)
* feat: add support for virtual files (#3654)
* feat: add post-analyzers (#3640)
* feat(python): add dependency locations for Pipfile.lock (#3614)
* fix(java): fix groupID selection by ArtifactID for jar files. (#3644)
* fix(aws): Adding a fix for update-cache flag that is not applied on AWS scans. (#3619)
* feat(cli): add command completion (#3061)
* docs(misconf): update dockerfile link (#3627)
* feat(flag): add exit-on-eosl option (#3423)
* fix(cli): make java db repository configurable (#3595)
* chore: bump trivy-kubernetes (#3613)
  		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-30"/>
	<updated date="2024-08-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1224781">SUSE bug 1224781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227022">SUSE bug 1227022</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42363/">CVE-2023-42363 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42363">CVE-2023-42363 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35192/">CVE-2024-35192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35192">CVE-2024-35192 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6257/">CVE-2024-6257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6257">CVE-2024-6257 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881506" comment="trivy-0.54.1-bp155.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4074" version="1" class="patch">
	<metadata>
		<title>Security update for rust-bindgen. (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229375" ref_url="https://bugzilla.suse.com/1229375" source="BUGZILLA"/>
		<reference ref_id="1229376" ref_url="https://bugzilla.suse.com/1229376" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-43806" ref_url="https://www.suse.com/security/cve/CVE-2024-43806/" source="CVE"/>
		<description>
rust-bindgen was updated to fix the following issues:

Update to version 0.70.1:

* Revert 'Only trigger the publish workflow manually'
* Fix `collapsible_match` clippy warning
* Add `#[clippy::allow]` attribute to `const` layout tests
* Fix creduce example
* Fix creduce install link
* Fix create-tag.yml

Update to version 0.70.0:

* Fix generation of extern 'C' blocks with llvm 18
* Update shlex dependency (RUSTSEC-2024-0006, boo#1229375)
* Try to avoid repr(packed) for explicitly aligned types when not needed
* Support Float16
* Fix alignment contribution from bitfields
* Replace peeking_take_while by itertools
* Add blocklist_var
* Stabilize thiscall_abi
* Allow older itertools
* Add target mappings for riscv64imac and riscv32imafc.
* Add a complex macro fallback API
* Add option to use DST structs for flexible arrays
* Add option to dynamically load variables
* Add option in CLI to use rustified non-exhaustive enums
* Remove which and lazy-static dependencies
* Generate compile-time layout tests
* Print bindgen-cli errors to stderr instead of stdout
* Fix --formatter=prettyplease not working in bindgen-cli by adding prettyplease feature and enabling it by default for bindgen-cli
* Fix --allowlist-item so anonymous enums are no longer ignored
* Use clang_getFileLocation instead of clang_getSpellingLocation to fix clang-trun
* Fix generated constants: f64::INFINITY, f64::NEG_ INFINITY,f64::NAN
* Update tempfile and rustix due to GHSA-c827-hfw6-qwvm (boo#1229376)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-01"/>
	<updated date="2024-09-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1229375">SUSE bug 1229375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229376">SUSE bug 1229376</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43806/">CVE-2024-43806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43806">CVE-2024-43806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940215" comment="rust-bindgen-0.70.1-bp156.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4075" version="1" class="patch">
	<metadata>
		<title>Security update for cacti, cacti-spine (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224229" ref_url="https://bugzilla.suse.com/1224229" source="BUGZILLA"/>
		<reference ref_id="1224230" ref_url="https://bugzilla.suse.com/1224230" source="BUGZILLA"/>
		<reference ref_id="1224231" ref_url="https://bugzilla.suse.com/1224231" source="BUGZILLA"/>
		<reference ref_id="1224235" ref_url="https://bugzilla.suse.com/1224235" source="BUGZILLA"/>
		<reference ref_id="1224236" ref_url="https://bugzilla.suse.com/1224236" source="BUGZILLA"/>
		<reference ref_id="1224237" ref_url="https://bugzilla.suse.com/1224237" source="BUGZILLA"/>
		<reference ref_id="1224238" ref_url="https://bugzilla.suse.com/1224238" source="BUGZILLA"/>
		<reference ref_id="1224239" ref_url="https://bugzilla.suse.com/1224239" source="BUGZILLA"/>
		<reference ref_id="1224240" ref_url="https://bugzilla.suse.com/1224240" source="BUGZILLA"/>
		<reference ref_id="1224241" ref_url="https://bugzilla.suse.com/1224241" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-25641" ref_url="https://www.suse.com/security/cve/CVE-2024-25641/" source="CVE"/>
		<reference ref_id="CVE-2024-27082" ref_url="https://www.suse.com/security/cve/CVE-2024-27082/" source="CVE"/>
		<reference ref_id="CVE-2024-29894" ref_url="https://www.suse.com/security/cve/CVE-2024-29894/" source="CVE"/>
		<reference ref_id="CVE-2024-31443" ref_url="https://www.suse.com/security/cve/CVE-2024-31443/" source="CVE"/>
		<reference ref_id="CVE-2024-31444" ref_url="https://www.suse.com/security/cve/CVE-2024-31444/" source="CVE"/>
		<reference ref_id="CVE-2024-31445" ref_url="https://www.suse.com/security/cve/CVE-2024-31445/" source="CVE"/>
		<reference ref_id="CVE-2024-31458" ref_url="https://www.suse.com/security/cve/CVE-2024-31458/" source="CVE"/>
		<reference ref_id="CVE-2024-31459" ref_url="https://www.suse.com/security/cve/CVE-2024-31459/" source="CVE"/>
		<reference ref_id="CVE-2024-31460" ref_url="https://www.suse.com/security/cve/CVE-2024-31460/" source="CVE"/>
		<reference ref_id="CVE-2024-34340" ref_url="https://www.suse.com/security/cve/CVE-2024-34340/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0274-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RAIZKHB2VPK6KRYTE3TU44EJVFAT4WWP/" source="SUSE-SU"/>
		<description>
This update for cacti, cacti-spine fixes the following issues:

- cacti 1.2.27:
  * CVE-2024-34340: Authentication Bypass when using using older password hashes (boo#1224240)
  * CVE-2024-25641: RCE vulnerability when importing packages (boo#1224229)
  * CVE-2024-31459: RCE vulnerability when plugins include files (boo#1224238)
  * CVE-2024-31460: SQL Injection vulnerability when using tree rules through Automation API (boo#1224239)
  * CVE-2024-29894: XSS vulnerability when using JavaScript based messaging API (boo#1224231)
  * CVE-2024-31458: SQL Injection vulnerability when using form templates (boo#1224241)
  * CVE-2024-31444: XSS vulnerability when reading tree rules with Automation API (boo#1224236)
  * CVE-2024-31443: XSS vulnerability when managing data queries (boo#1224235)
  * CVE-2024-31445: SQL Injection vulnerability when retrieving graphs using Automation API (boo#1224237)
  * CVE-2024-27082: XSS vulnerability when managing trees (boo#1224230)
  * Improve PHP 8.3 support
  * When importing packages via command line, data source profile could not be selected
  * When changing password, returning to previous page does not always work
  * When using LDAP authentication the first time, warnings may appear in logs
  * When editing/viewing devices, add IPv6 info to hostname tooltip
  * Improve speed of polling when Boost is enabled
  * Improve support for Half-Hour time zones
  * When user session not found, device lists can be incorrectly returned
  * On import, legacy templates may generate warnings
  * Improve support for alternate locations of Ping
  * Improve PHP 8.1 support for Installer
  * Fix issues with number formatting
  * Improve PHP 8.1 support when SpikeKill is run first time
  * Improve PHP 8.1 support for SpikeKill
  * When using Chinese to search for graphics, garbled characters appear.
  * When importing templates, preview mode will not always load
  * When remote poller is installed, MySQL TimeZone DB checks are not performed
  * When Remote Poller installation completes, no finish button is shown
  * Unauthorized agents should be recorded into logs
  * Poller cache may not always update if hostname changes
  * When using CMD poller, Failure and Recovery dates may have incorrect values
  * Saving a Tree can cause the tree to become unpublished
  * Web Basic Authentication does not record user logins
  * When using Accent-based languages, translations may not work properly
  * Fix automation expressions for device rules
  * Improve PHP 8.1 Support during fresh install with boost
  * Add a device 'enabled/disabled' indicator next to the graphs
  * Notify the admin periodically when a remote data collector goes into heartbeat status
  * Add template for Aruba Clearpass
  * Add fliter/sort of Device Templates by Graph Templates

- cacti-spine 1.2.27:
  * Restore AES Support
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-02"/>
	<updated date="2024-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1224229">SUSE bug 1224229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224230">SUSE bug 1224230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224231">SUSE bug 1224231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224235">SUSE bug 1224235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224236">SUSE bug 1224236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224237">SUSE bug 1224237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224238">SUSE bug 1224238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224239">SUSE bug 1224239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224240">SUSE bug 1224240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224241">SUSE bug 1224241</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-25641/">CVE-2024-25641 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25641">CVE-2024-25641 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-27082/">CVE-2024-27082 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27082">CVE-2024-27082 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-29894/">CVE-2024-29894 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-29894">CVE-2024-29894 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-31443/">CVE-2024-31443 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31443">CVE-2024-31443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-31444/">CVE-2024-31444 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31444">CVE-2024-31444 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-31445/">CVE-2024-31445 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31445">CVE-2024-31445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-31458/">CVE-2024-31458 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31458">CVE-2024-31458 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-31459/">CVE-2024-31459 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31459">CVE-2024-31459 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-31460/">CVE-2024-31460 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31460">CVE-2024-31460 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-34340/">CVE-2024-34340 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-34340">CVE-2024-34340 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940220" comment="cacti-1.2.27-bp155.2.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940221" comment="cacti-spine-1.2.27-bp155.2.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4076" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2024-7971" ref_url="https://www.suse.com/security/cve/CVE-2024-7971/" source="CVE"/>
		<description>
This update for opera fixes the following issues:

- Update to 113.0.5230.32
  * DNA-118250 Backport fix for CVE-2024-7971 from Chrome to
    Opera 113 

- Changes in 113.0.5230.31

  * CHR-9819 Update Chromium on desktop-stable-127-5230 to
    127.0.6533.120
  * DNA-116113 Print window boxes have frames and text is not
    vertically centered
  * DNA-117467 Crash at static void views::Combobox::
    PaintIconAndText(class gfx::Canvas*)
  * DNA-117557 Fix detected dangling ptr in WorkspacesTabCycler
    ControllerIndexInCycleOrderTest.IndexInCyclingOrder
  * DNA-117721 [Lin] When I drag a tab out of the tab strip and
    drop it, it is not possible to do so without creating a
    new window.
  * DNA-117854 Pinned tab takes whole tab strip
  * DNA-117857 [Sync][Lost password] After profile error can’t add
    passwords and sync can’t display synced passwords
  * DNA-118215 Promote 113 to stable

- Complete Opera 113 changelog at:
  https://blogs.opera.com/desktop/changelog-for-113
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-05"/>
	<updated date="2024-09-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7971/">CVE-2024-7971 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7971">CVE-2024-7971 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941118" comment="opera-113.0.5230.32-lp155.3.60.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4077" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230108" ref_url="https://bugzilla.suse.com/1230108" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-7970" ref_url="https://www.suse.com/security/cve/CVE-2024-7970/" source="CVE"/>
		<reference ref_id="CVE-2024-8362" ref_url="https://www.suse.com/security/cve/CVE-2024-8362/" source="CVE"/>
		<description>
This update for chromium fixes the following issues:

Chromium 128.0.6613.119 (released 2024-09-02) (boo#1230108)

* CVE-2024-8362: Use after free in WebAudio
* CVE-2024-7970: Out of bounds write in V8
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1230108">SUSE bug 1230108</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7970/">CVE-2024-7970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7970">CVE-2024-7970 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8362/">CVE-2024-8362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8362">CVE-2024-8362 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941422" comment="chromedriver-128.0.6613.119-bp155.2.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941423" comment="chromium-128.0.6613.119-bp155.2.111.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4078" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230391" ref_url="https://bugzilla.suse.com/1230391" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-8636" ref_url="https://www.suse.com/security/cve/CVE-2024-8636/" source="CVE"/>
		<reference ref_id="CVE-2024-8637" ref_url="https://www.suse.com/security/cve/CVE-2024-8637/" source="CVE"/>
		<reference ref_id="CVE-2024-8638" ref_url="https://www.suse.com/security/cve/CVE-2024-8638/" source="CVE"/>
		<reference ref_id="CVE-2024-8639" ref_url="https://www.suse.com/security/cve/CVE-2024-8639/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0302-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X5R3A7VNTZ3JKV7YDW56C7TEUFBJLNKE/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 128.0.6613.137 (released 2024-09-10) (boo#1230391)

  * CVE-2024-8636: Heap buffer overflow in Skia
  * CVE-2024-8637: Use after free in Media Router
  * CVE-2024-8638: Type Confusion in V8
  * CVE-2024-8639: Use after free in Autofill
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-16"/>
	<updated date="2024-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1230391">SUSE bug 1230391</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8636/">CVE-2024-8636 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8636">CVE-2024-8636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8637/">CVE-2024-8637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8637">CVE-2024-8637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8638/">CVE-2024-8638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8638">CVE-2024-8638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8639/">CVE-2024-8639 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8639">CVE-2024-8639 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942640" comment="chromedriver-128.0.6613.137-bp156.2.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942641" comment="chromium-128.0.6613.137-bp156.2.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4079" version="1" class="patch">
	<metadata>
		<title>Security update for htmldoc (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230022" ref_url="https://bugzilla.suse.com/1230022" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-45508" ref_url="https://www.suse.com/security/cve/CVE-2024-45508/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PS3VK5JTDY5FTLYYYSQWM5OBYO27JOKV/" source="SUSE-SU"/>
		<description>
This update for htmldoc fixes the following issues:

- CVE-2024-45508: Fixed an out-of-bounds write in parse_paragraph in ps-pdf.cxx because of an attempt to strip leading whitespace from a whitespace-only node [boo#1230022].
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-16"/>
	<updated date="2024-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1230022">SUSE bug 1230022</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45508/">CVE-2024-45508 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45508">CVE-2024-45508 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942642" comment="htmldoc-1.9.16-bp155.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4080" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-bad (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215792" ref_url="https://bugzilla.suse.com/1215792" source="BUGZILLA"/>
		<reference ref_id="1217211" ref_url="https://bugzilla.suse.com/1217211" source="BUGZILLA"/>
		<reference ref_id="1217213" ref_url="https://bugzilla.suse.com/1217213" source="BUGZILLA"/>
		<reference ref_id="1218534" ref_url="https://bugzilla.suse.com/1218534" source="BUGZILLA"/>
		<reference ref_id="1223263" ref_url="https://bugzilla.suse.com/1223263" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40475" ref_url="https://www.suse.com/security/cve/CVE-2023-40475/" source="CVE"/>
		<reference ref_id="CVE-2023-44429" ref_url="https://www.suse.com/security/cve/CVE-2023-44429/" source="CVE"/>
		<reference ref_id="CVE-2023-44446" ref_url="https://www.suse.com/security/cve/CVE-2023-44446/" source="CVE"/>
		<reference ref_id="CVE-2023-50186" ref_url="https://www.suse.com/security/cve/CVE-2023-50186/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0305-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/73CSYYN6KCRAUIBATMXYYKQT4I5PVKDJ/" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-bad fixes the following issues:

Adding references for already fixed vulnerability:

- CVE-2023-50186: Fixed heap-based buffer overflow in the AV1 codec parser (ZDI-CAN-22300, bsc#1218534, bsc#1223263)
- CVE-2023-40475: Fixed GStreamer MXF File Parsing Integer Overflow (bsc#1215792).
- CVE-2023-44446: Fixed GStreamer MXF File Parsing Use-After-Free (bsc#1217213).
- CVE-2023-44429: Fixed GStreamer AV1 Codec Parsing Heap-based Buffer Overflow (bsc#1217211).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-17"/>
	<updated date="2024-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215792">SUSE bug 1215792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217211">SUSE bug 1217211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217213">SUSE bug 1217213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218534">SUSE bug 1218534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223263">SUSE bug 1223263</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40475/">CVE-2023-40475 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40475">CVE-2023-40475 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44429/">CVE-2023-44429 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44429">CVE-2023-44429 at NVD</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44446/">CVE-2023-44446 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44446">CVE-2023-44446 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50186/">CVE-2023-50186 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50186">CVE-2023-50186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942752" comment="gstreamer-plugins-bad-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942753" comment="gstreamer-plugins-bad-32bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942754" comment="gstreamer-plugins-bad-64bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942755" comment="gstreamer-plugins-bad-chromaprint-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942756" comment="gstreamer-plugins-bad-chromaprint-32bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942757" comment="gstreamer-plugins-bad-chromaprint-64bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942758" comment="gstreamer-plugins-bad-devel-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942759" comment="gstreamer-plugins-bad-fluidsynth-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942760" comment="gstreamer-plugins-bad-fluidsynth-32bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942761" comment="gstreamer-plugins-bad-fluidsynth-64bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942762" comment="gstreamer-plugins-bad-lang-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942763" comment="gstreamer-transcoder-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942764" comment="gstreamer-transcoder-devel-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942765" comment="libgstadaptivedemux-1_0-0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942766" comment="libgstadaptivedemux-1_0-0-32bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942767" comment="libgstadaptivedemux-1_0-0-64bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942768" comment="libgstbadaudio-1_0-0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942769" comment="libgstbadaudio-1_0-0-32bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942770" comment="libgstbadaudio-1_0-0-64bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942771" comment="libgstbasecamerabinsrc-1_0-0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942772" comment="libgstbasecamerabinsrc-1_0-0-32bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942773" comment="libgstbasecamerabinsrc-1_0-0-64bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942774" comment="libgstcodecparsers-1_0-0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942775" comment="libgstcodecparsers-1_0-0-32bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942776" comment="libgstcodecparsers-1_0-0-64bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942777" comment="libgstcodecs-1_0-0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942778" comment="libgstcodecs-1_0-0-32bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942779" comment="libgstcodecs-1_0-0-64bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942780" comment="libgstcuda-1_0-0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942781" comment="libgstcuda-1_0-0-32bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942782" comment="libgstcuda-1_0-0-64bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942783" comment="libgstinsertbin-1_0-0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942784" comment="libgstinsertbin-1_0-0-32bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942785" comment="libgstinsertbin-1_0-0-64bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942786" comment="libgstisoff-1_0-0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942787" comment="libgstisoff-1_0-0-32bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942788" comment="libgstisoff-1_0-0-64bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942789" comment="libgstmpegts-1_0-0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942790" comment="libgstmpegts-1_0-0-32bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942791" comment="libgstmpegts-1_0-0-64bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942792" comment="libgstphotography-1_0-0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942793" comment="libgstphotography-1_0-0-32bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942794" comment="libgstphotography-1_0-0-64bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942795" comment="libgstplay-1_0-0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942796" comment="libgstplay-1_0-0-32bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942797" comment="libgstplay-1_0-0-64bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942798" comment="libgstplayer-1_0-0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942799" comment="libgstplayer-1_0-0-32bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942800" comment="libgstplayer-1_0-0-64bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942801" comment="libgstsctp-1_0-0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942802" comment="libgstsctp-1_0-0-32bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942803" comment="libgstsctp-1_0-0-64bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942804" comment="libgsttranscoder-1_0-0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942805" comment="libgsturidownloader-1_0-0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942806" comment="libgsturidownloader-1_0-0-32bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942807" comment="libgsturidownloader-1_0-0-64bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942808" comment="libgstva-1_0-0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942809" comment="libgstva-1_0-0-32bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942810" comment="libgstva-1_0-0-64bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942811" comment="libgstvulkan-1_0-0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942812" comment="libgstvulkan-1_0-0-32bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942813" comment="libgstvulkan-1_0-0-64bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942814" comment="libgstwayland-1_0-0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942815" comment="libgstwayland-1_0-0-32bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942816" comment="libgstwayland-1_0-0-64bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942817" comment="libgstwebrtc-1_0-0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942818" comment="libgstwebrtc-1_0-0-32bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942819" comment="libgstwebrtc-1_0-0-64bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942820" comment="libgstwebrtcnice-1_0-0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942821" comment="libgstwebrtcnice-1_0-0-32bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942822" comment="libgstwebrtcnice-1_0-0-64bit-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942823" comment="typelib-1_0-CudaGst-1_0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942824" comment="typelib-1_0-GstBadAudio-1_0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942825" comment="typelib-1_0-GstCodecs-1_0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942826" comment="typelib-1_0-GstCuda-1_0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942827" comment="typelib-1_0-GstInsertBin-1_0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942828" comment="typelib-1_0-GstMpegts-1_0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942829" comment="typelib-1_0-GstPlay-1_0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942830" comment="typelib-1_0-GstPlayer-1_0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942831" comment="typelib-1_0-GstTranscoder-1_0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942832" comment="typelib-1_0-GstVa-1_0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942833" comment="typelib-1_0-GstVulkan-1_0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942834" comment="typelib-1_0-GstVulkanWayland-1_0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942835" comment="typelib-1_0-GstVulkanXCB-1_0-1.22.0-lp155.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942836" comment="typelib-1_0-GstWebRTC-1_0-1.22.0-lp155.3.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4081" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-bad, libvpl (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218534" ref_url="https://bugzilla.suse.com/1218534" source="BUGZILLA"/>
		<reference ref_id="1219494" ref_url="https://bugzilla.suse.com/1219494" source="BUGZILLA"/>
		<reference ref_id="1223263" ref_url="https://bugzilla.suse.com/1223263" source="BUGZILLA"/>
		<reference ref_id="1226892" ref_url="https://bugzilla.suse.com/1226892" source="BUGZILLA"/>
		<reference ref_id="1226897" ref_url="https://bugzilla.suse.com/1226897" source="BUGZILLA"/>
		<reference ref_id="1226898" ref_url="https://bugzilla.suse.com/1226898" source="BUGZILLA"/>
		<reference ref_id="1226899" ref_url="https://bugzilla.suse.com/1226899" source="BUGZILLA"/>
		<reference ref_id="1226900" ref_url="https://bugzilla.suse.com/1226900" source="BUGZILLA"/>
		<reference ref_id="1226901" ref_url="https://bugzilla.suse.com/1226901" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-22656" ref_url="https://www.suse.com/security/cve/CVE-2023-22656/" source="CVE"/>
		<reference ref_id="CVE-2023-45221" ref_url="https://www.suse.com/security/cve/CVE-2023-45221/" source="CVE"/>
		<reference ref_id="CVE-2023-47169" ref_url="https://www.suse.com/security/cve/CVE-2023-47169/" source="CVE"/>
		<reference ref_id="CVE-2023-47282" ref_url="https://www.suse.com/security/cve/CVE-2023-47282/" source="CVE"/>
		<reference ref_id="CVE-2023-48368" ref_url="https://www.suse.com/security/cve/CVE-2023-48368/" source="CVE"/>
		<reference ref_id="CVE-2023-50186" ref_url="https://www.suse.com/security/cve/CVE-2023-50186/" source="CVE"/>
		<description>
This update for gstreamer-plugins-bad, libvpl fixes the following issues:

- Dropped support for libmfx to fix the following CVEs:
  * libmfx: improper input validation (CVE-2023-48368, bsc#1226897)
  * libmfx: improper buffer restrictions (CVE-2023-45221, bsc#1226898)
  * libmfx: out-of-bounds read (CVE-2023-22656, bsc#1226899)
  * libmfx: out-of-bounds write (CVE-2023-47282, bsc#1226900)
  * libmfx: improper buffer restrictions (CVE-2023-47169, bsc#1226901)

The libmfx dependency is replaced by libvpl.
  		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-09-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218534">SUSE bug 1218534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219494">SUSE bug 1219494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223263">SUSE bug 1223263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226892">SUSE bug 1226892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226897">SUSE bug 1226897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226898">SUSE bug 1226898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226899">SUSE bug 1226899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226900">SUSE bug 1226900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226901">SUSE bug 1226901</bugzilla>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22656/">CVE-2023-22656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-22656">CVE-2023-22656 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45221/">CVE-2023-45221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45221">CVE-2023-45221 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-47169/">CVE-2023-47169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-47169">CVE-2023-47169 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-47282/">CVE-2023-47282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-47282">CVE-2023-47282 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-48368/">CVE-2023-48368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-48368">CVE-2023-48368 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50186/">CVE-2023-50186 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50186">CVE-2023-50186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943443" comment="gstreamer-plugins-bad-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943444" comment="gstreamer-plugins-bad-32bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943445" comment="gstreamer-plugins-bad-64bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943446" comment="gstreamer-plugins-bad-chromaprint-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943447" comment="gstreamer-plugins-bad-chromaprint-32bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943448" comment="gstreamer-plugins-bad-chromaprint-64bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943449" comment="gstreamer-plugins-bad-devel-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943450" comment="gstreamer-plugins-bad-fluidsynth-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943451" comment="gstreamer-plugins-bad-fluidsynth-32bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943452" comment="gstreamer-plugins-bad-fluidsynth-64bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943453" comment="gstreamer-plugins-bad-lang-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943454" comment="gstreamer-transcoder-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943455" comment="gstreamer-transcoder-devel-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943456" comment="libgstadaptivedemux-1_0-0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943457" comment="libgstadaptivedemux-1_0-0-32bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943458" comment="libgstadaptivedemux-1_0-0-64bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943459" comment="libgstbadaudio-1_0-0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943460" comment="libgstbadaudio-1_0-0-32bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943461" comment="libgstbadaudio-1_0-0-64bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943462" comment="libgstbasecamerabinsrc-1_0-0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943463" comment="libgstbasecamerabinsrc-1_0-0-32bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943464" comment="libgstbasecamerabinsrc-1_0-0-64bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943465" comment="libgstcodecparsers-1_0-0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943466" comment="libgstcodecparsers-1_0-0-32bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943467" comment="libgstcodecparsers-1_0-0-64bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943468" comment="libgstcodecs-1_0-0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943469" comment="libgstcodecs-1_0-0-32bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943470" comment="libgstcodecs-1_0-0-64bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943471" comment="libgstcuda-1_0-0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943472" comment="libgstcuda-1_0-0-32bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943473" comment="libgstcuda-1_0-0-64bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943474" comment="libgstinsertbin-1_0-0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943475" comment="libgstinsertbin-1_0-0-32bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943476" comment="libgstinsertbin-1_0-0-64bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943477" comment="libgstisoff-1_0-0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943478" comment="libgstisoff-1_0-0-32bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943479" comment="libgstisoff-1_0-0-64bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943480" comment="libgstmpegts-1_0-0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943481" comment="libgstmpegts-1_0-0-32bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943482" comment="libgstmpegts-1_0-0-64bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943483" comment="libgstphotography-1_0-0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943484" comment="libgstphotography-1_0-0-32bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943485" comment="libgstphotography-1_0-0-64bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943486" comment="libgstplay-1_0-0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943487" comment="libgstplay-1_0-0-32bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943488" comment="libgstplay-1_0-0-64bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943489" comment="libgstplayer-1_0-0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943490" comment="libgstplayer-1_0-0-32bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943491" comment="libgstplayer-1_0-0-64bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943492" comment="libgstsctp-1_0-0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943493" comment="libgstsctp-1_0-0-32bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943494" comment="libgstsctp-1_0-0-64bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943495" comment="libgsttranscoder-1_0-0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943496" comment="libgsturidownloader-1_0-0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943497" comment="libgsturidownloader-1_0-0-32bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943498" comment="libgsturidownloader-1_0-0-64bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943499" comment="libgstva-1_0-0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943500" comment="libgstva-1_0-0-32bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943501" comment="libgstva-1_0-0-64bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943502" comment="libgstvulkan-1_0-0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943503" comment="libgstvulkan-1_0-0-32bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943504" comment="libgstvulkan-1_0-0-64bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943505" comment="libgstwayland-1_0-0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943506" comment="libgstwayland-1_0-0-32bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943507" comment="libgstwayland-1_0-0-64bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943508" comment="libgstwebrtc-1_0-0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943509" comment="libgstwebrtc-1_0-0-32bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943510" comment="libgstwebrtc-1_0-0-64bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943511" comment="libgstwebrtcnice-1_0-0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943512" comment="libgstwebrtcnice-1_0-0-32bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943513" comment="libgstwebrtcnice-1_0-0-64bit-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943514" comment="typelib-1_0-CudaGst-1_0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943515" comment="typelib-1_0-GstBadAudio-1_0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943516" comment="typelib-1_0-GstCodecs-1_0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943517" comment="typelib-1_0-GstCuda-1_0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943518" comment="typelib-1_0-GstInsertBin-1_0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943519" comment="typelib-1_0-GstMpegts-1_0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943520" comment="typelib-1_0-GstPlay-1_0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943521" comment="typelib-1_0-GstPlayer-1_0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943522" comment="typelib-1_0-GstTranscoder-1_0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943523" comment="typelib-1_0-GstVa-1_0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943524" comment="typelib-1_0-GstVulkan-1_0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943525" comment="typelib-1_0-GstVulkanWayland-1_0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943526" comment="typelib-1_0-GstVulkanXCB-1_0-1.22.0-lp155.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943527" comment="typelib-1_0-GstWebRTC-1_0-1.22.0-lp155.3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4082" version="1" class="patch">
	<metadata>
		<title>Security update for cacti, cacti-spine (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218360" ref_url="https://bugzilla.suse.com/1218360" source="BUGZILLA"/>
		<reference ref_id="1218366" ref_url="https://bugzilla.suse.com/1218366" source="BUGZILLA"/>
		<reference ref_id="1218378" ref_url="https://bugzilla.suse.com/1218378" source="BUGZILLA"/>
		<reference ref_id="1218379" ref_url="https://bugzilla.suse.com/1218379" source="BUGZILLA"/>
		<reference ref_id="1218380" ref_url="https://bugzilla.suse.com/1218380" source="BUGZILLA"/>
		<reference ref_id="1218381" ref_url="https://bugzilla.suse.com/1218381" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-49084" ref_url="https://www.suse.com/security/cve/CVE-2023-49084/" source="CVE"/>
		<reference ref_id="CVE-2023-49085" ref_url="https://www.suse.com/security/cve/CVE-2023-49085/" source="CVE"/>
		<reference ref_id="CVE-2023-49086" ref_url="https://www.suse.com/security/cve/CVE-2023-49086/" source="CVE"/>
		<reference ref_id="CVE-2023-49088" ref_url="https://www.suse.com/security/cve/CVE-2023-49088/" source="CVE"/>
		<reference ref_id="CVE-2023-50250" ref_url="https://www.suse.com/security/cve/CVE-2023-50250/" source="CVE"/>
		<reference ref_id="CVE-2023-51448" ref_url="https://www.suse.com/security/cve/CVE-2023-51448/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IZJKJNYP7JFJ3XMRIGZT22J5DIAVPSY7/" source="SUSE-SU"/>
		<description>
This update for cacti, cacti-spine fixes the following issues:

cacti-spine 1.2.26:

* Fix: Errors when uptime OID is not present
* Fix: MySQL reconnect option is depreciated
* Fix: Spine does not check a host with no poller items
* Fix: Poller may report the wrong number of devices polled
* Feature: Allow users to override the threads setting at the command line
* Feature: Allow spine to run in ping-only mode

cacti 1.2.26:

* CVE-2023-50250: XSS vulnerability when importing a template file (boo#1218380)
* CVE-2023-49084: RCE vulnerability when managing links (boo#1218360)
* CVE-2023-49085: SQL Injection vulnerability when managing poller devices (boo#1218378)
* CVE-2023-49086: XSS vulnerability when adding new devices (boo#1218366)
* CVE-2023-49088: XSS vulnerability when viewing data sources in debug mode (boo#1218379)
* CVE-2023-51448: SQL Injection vulnerability when managing SNMP Notification Receivers (boo#1218381)
* When viewing data sources, an undefined variable error may be seen
* Improvements for Poller Last Run Date
* Attempting to edit a Data Query that does not exist throws warnings and not an GUI error
* Improve PHP 8.1 support when adding devices
* Viewing Data Query Cache can cause errors to be logged
* Preserve option is not properly honoured when removing devices at command line
* Infinite recursion is possible during a database failure
* Monitoring Host CPU's does not always work on Windows endpoints
* Multi select drop down list box not rendered correctly in Chrome and Edge
* Selective Plugin Debugging may not always work as intended
* During upgrades, Plugins may be falsely reported as incompatible
* Plugin management at command line does not work with multiple plugins
* Improve PHP 8.1 support for incrementing only numbers
* Allow the renaming of guest and template accounts
* DS Stats issues warnings when the RRDfile has not been initialized
* When upgrading, missing data source profile can cause errors to be logged
* When deleting a single Data Source, purge historical debug data
* Improvements to form element warnings
* Some interface aliases do not appear correctly
* Aggregate graph does not show other percentiles
* Settings table updates for large values reverted by database repair
* When obtaining graph records, error messages may be recorded
* Unable to change a device's community at command line
* Increase timeout for RRDChecker
* When viewing a graph, option to edit template may lead to incorrect URL
* When upgrading, failures may occur due to missing color table keys
* On installation, allow a more appropriate template to be used as the default
* When data input parameters are allowed to be null, allow null
* CSV Exports may not always output data correctly
* When debugging a graph, long CDEF's can cause undesirable scrolling
* Secondary LDAP server not evaluated when the first one has failed
* When adding a device, using the bulk walk option can make version information appear
* When parsing a Data Query resource, an error can be reported if no direction is specified
* Database reconnection can cause errors to be reported incorrectly
* fix returned value if $sau is empty
* Add Aruba switch, Aruba controller and HPE iLO templates
* Add OSCX 6x00 templates
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2024-01-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218360">SUSE bug 1218360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218366">SUSE bug 1218366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218378">SUSE bug 1218378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218379">SUSE bug 1218379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218380">SUSE bug 1218380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218381">SUSE bug 1218381</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-49084/">CVE-2023-49084 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49084">CVE-2023-49084 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-49085/">CVE-2023-49085 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49085">CVE-2023-49085 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-49086/">CVE-2023-49086 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49086">CVE-2023-49086 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-49088/">CVE-2023-49088 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49088">CVE-2023-49088 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50250/">CVE-2023-50250 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50250">CVE-2023-50250 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-51448/">CVE-2023-51448 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51448">CVE-2023-51448 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844296" comment="cacti-1.2.26-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844297" comment="cacti-spine-1.2.26-bp155.2.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4083" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230678" ref_url="https://bugzilla.suse.com/1230678" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-8904" ref_url="https://www.suse.com/security/cve/CVE-2024-8904/" source="CVE"/>
		<reference ref_id="CVE-2024-8905" ref_url="https://www.suse.com/security/cve/CVE-2024-8905/" source="CVE"/>
		<reference ref_id="CVE-2024-8906" ref_url="https://www.suse.com/security/cve/CVE-2024-8906/" source="CVE"/>
		<reference ref_id="CVE-2024-8907" ref_url="https://www.suse.com/security/cve/CVE-2024-8907/" source="CVE"/>
		<reference ref_id="CVE-2024-8908" ref_url="https://www.suse.com/security/cve/CVE-2024-8908/" source="CVE"/>
		<reference ref_id="CVE-2024-8909" ref_url="https://www.suse.com/security/cve/CVE-2024-8909/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0312-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PZAWWKV77U4BUVQL3WE5ZHGVHOYFAXSS/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

- Chromium 129.0.6668.58 (stable released 2024-09-17)
  (boo#1230678)

  * CVE-2024-8904: Type Confusion in V8
  * CVE-2024-8905: Inappropriate implementation in V8
  * CVE-2024-8906: Incorrect security UI in Downloads
  * CVE-2024-8907: Insufficient data validation in Omnibox
  * CVE-2024-8908: Inappropriate implementation in Autofill
  * CVE-2024-8909: Inappropriate implementation in UI
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-24"/>
	<updated date="2024-09-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1230678">SUSE bug 1230678</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8904/">CVE-2024-8904 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8904">CVE-2024-8904 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8905/">CVE-2024-8905 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8905">CVE-2024-8905 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8906/">CVE-2024-8906 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8906">CVE-2024-8906 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8907/">CVE-2024-8907 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8907">CVE-2024-8907 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8908/">CVE-2024-8908 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8908">CVE-2024-8908 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8909/">CVE-2024-8909 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8909">CVE-2024-8909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944462" comment="chromedriver-129.0.6668.58-bp155.2.117.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944463" comment="chromium-129.0.6668.58-bp155.2.117.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4084" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230964" ref_url="https://bugzilla.suse.com/1230964" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-9120" ref_url="https://www.suse.com/security/cve/CVE-2024-9120/" source="CVE"/>
		<reference ref_id="CVE-2024-9121" ref_url="https://www.suse.com/security/cve/CVE-2024-9121/" source="CVE"/>
		<reference ref_id="CVE-2024-9122" ref_url="https://www.suse.com/security/cve/CVE-2024-9122/" source="CVE"/>
		<reference ref_id="CVE-2024-9123" ref_url="https://www.suse.com/security/cve/CVE-2024-9123/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0320-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PSCMNKOFIFR6UW562BL6G3POOMLBOVMN/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 129.0.6668.70 (stable released 2024-09-24) (boo#1230964)

  * CVE-2024-9120: Use after free in Dawn
  * CVE-2024-9121: Inappropriate implementation in V8
  * CVE-2024-9122: Type Confusion in V8
  * CVE-2024-9123: Integer overflow in Skia
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1230964">SUSE bug 1230964</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9120/">CVE-2024-9120 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9120">CVE-2024-9120 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9121/">CVE-2024-9121 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9121">CVE-2024-9121 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9122/">CVE-2024-9122 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9122">CVE-2024-9122 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9123/">CVE-2024-9123 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9123">CVE-2024-9123 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945286" comment="chromedriver-129.0.6668.70-bp155.2.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945287" comment="chromium-129.0.6668.70-bp155.2.120.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4085" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2024-8636" ref_url="https://www.suse.com/security/cve/CVE-2024-8636/" source="CVE"/>
		<reference ref_id="CVE-2024-8637" ref_url="https://www.suse.com/security/cve/CVE-2024-8637/" source="CVE"/>
		<reference ref_id="CVE-2024-8638" ref_url="https://www.suse.com/security/cve/CVE-2024-8638/" source="CVE"/>
		<reference ref_id="CVE-2024-8639" ref_url="https://www.suse.com/security/cve/CVE-2024-8639/" source="CVE"/>
		<description>
This update for opera fixes the following issues:

Opera was updated to 114.0.5282.21

  * CHR-9843 Update Chromium on desktop-stable-128-5282 to
    128.0.6613.138
  * DNA-118381 Corrupted extension should be repaired
    automatically
  * DNA-118423 Crash on exit at opera::VideoPopoutDetachController
    ::OnTabStripModelChanged
  * DNA-118480 Crash when closing tab from island's tooltip with
    double-click on X button
  * DNA-118586 Translations for O114
  * DNA-118605 [Beta 114] [WinLin] Saved bookmarks have hover
    effect on the bookmarks bar
  * DNA-118736 Crash at opera::SyncLoginHelper::GetMenuItemString
    after clicking 'O' menu
  * DNA-118822 Promote 114 to stable
- Complete Opera 114 changelog at:
  https://blogs.opera.com/desktop/changelog-for-114
- The update to chromium 128.0.6613.138 fixes following issues:
  CVE-2024-8636, CVE-2024-8637, CVE-2024-8638, CVE-2024-8639

- Update to 113.0.5230.132

  * DNA-117554 Checkboxes in Sidebar setup are not visible in
    light theme
  * DNA-117952 Crash at opera::component_based::ComponentTabBar::
    ~ComponentTabBar
  * DNA-118311 When pinning a tab from a tab island, it pins
    'separately' from other pinned tabs
  * DNA-118661 Crash at opera::component_based::ComponentTabGroup
    ::~ComponentTabGroup
  * DNA-118688 Crash when opening o-menu with logged in anonymous
    hidden account
  * DNA-118732 IsLoggedIn should return false for unset type
  * DNA-118736 Crash at opera::SyncLoginHelper::GetMenuItemString
    after clicking 'O' menu
  * DNA-118782 Enable calling Aria via API by clicking on
    masthead banner
  * DNA-118796 Crash at blink::DocumentRulePredicate::
    Parse(blink::JSONObject*, blink::KURL const&amp;, blink::
    ExecutionContext*, blink::ExceptionState&amp;, WTF::String*)

- Update to 113.0.5230.86
  * DNA-115191 BookmarkModelMerger::Merge() blocks UI thread on
    sync start
  * DNA-117744 Missing downloads in easy files window when image
    copied to clipboard
  * DNA-118016 Event of enabling/disabling extension
- Changes in 113.0.5230.62
  * DNA-118382 Crash at (anonymous namespace)::ProfileErrorCallback 

- Update to 113.0.5230.47
  * DNA-115901 Crash when canceling drag and drop tab between
    windows
  * DNA-118200 Crash at
    opera::flow::FlowSessionImpl::GetPairingUrl
  * DNA-118271 Miniplayer shows only icons to stop, play next or
    previous song
  * DNA-118297 Crash at views::Widget::GetWindowBoundsInScreen
  * DNA-118300 [startpage] click on link with target = blank opens
    page without visible tab
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-07"/>
	<updated date="2024-10-07"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8636/">CVE-2024-8636 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8636">CVE-2024-8636 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8637/">CVE-2024-8637 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8637">CVE-2024-8637 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8638/">CVE-2024-8638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8638">CVE-2024-8638 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8639/">CVE-2024-8639 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8639">CVE-2024-8639 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945820" comment="opera-114.0.5282.21-lp156.2.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4086" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231232" ref_url="https://bugzilla.suse.com/1231232" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-7025" ref_url="https://www.suse.com/security/cve/CVE-2024-7025/" source="CVE"/>
		<reference ref_id="CVE-2024-9369" ref_url="https://www.suse.com/security/cve/CVE-2024-9369/" source="CVE"/>
		<reference ref_id="CVE-2024-9370" ref_url="https://www.suse.com/security/cve/CVE-2024-9370/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0327-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SYPKGRQVF66ICD6CNLMEGRXEFBJME6TA/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 129.0.6668.89 (stable released 2024-09-24)
  (boo#1231232)

  * CVE-2024-7025: Integer overflow in Layout
  * CVE-2024-9369: Insufficient data validation in Mojo
  * CVE-2024-9370: Inappropriate implementation in V8
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-07"/>
	<updated date="2024-10-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1231232">SUSE bug 1231232</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7025/">CVE-2024-7025 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7025">CVE-2024-7025 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9369/">CVE-2024-9369 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9369">CVE-2024-9369 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9370/">CVE-2024-9370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9370">CVE-2024-9370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945821" comment="chromedriver-129.0.6668.89-bp156.2.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945822" comment="chromium-129.0.6668.89-bp156.2.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4087" version="1" class="patch">
	<metadata>
		<title>Security update for roundcubemail (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228900" ref_url="https://bugzilla.suse.com/1228900" source="BUGZILLA"/>
		<reference ref_id="1228901" ref_url="https://bugzilla.suse.com/1228901" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-42008" ref_url="https://www.suse.com/security/cve/CVE-2024-42008/" source="CVE"/>
		<reference ref_id="CVE-2024-42009" ref_url="https://www.suse.com/security/cve/CVE-2024-42009/" source="CVE"/>
		<reference ref_id="CVE-2024-42010" ref_url="https://www.suse.com/security/cve/CVE-2024-42010/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0328-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q5GOCYS6W7WGAIH6NILISNVXQC4O7Z53/" source="SUSE-SU"/>
		<description>
This update for roundcubemail fixes the following issues:

Update to 1.6.8
This is a security update to the stable version 1.6 of Roundcube Webmail.
It provides fixes to recently reported security vulnerabilities:

  * Fix XSS vulnerability in post-processing of sanitized HTML content [CVE-2024-42009]
  * Fix XSS vulnerability in serving of attachments other than HTML or SVG [CVE-2024-42008]
  * Fix information leak (access to remote content) via insufficient CSS filtering [CVE-2024-42010]

  CHANGELOG

  * Managesieve: Protect special scripts in managesieve_kolab_master mode
  * Fix newmail_notifier notification focus in Chrome (#9467)
  * Fix fatal error when parsing some TNEF attachments (#9462)
  * Fix double scrollbar when composing a mail with many plain text lines (#7760)
  * Fix decoding mail parts with multiple base64-encoded text blocks (#9290)
  * Fix bug where some messages could get malformed in an import from a MBOX file (#9510)
  * Fix invalid line break characters in multi-line text in Sieve scripts (#9543)
  * Fix bug where 'with attachment' filter could fail on some fts engines (#9514)
  * Fix bug where an unhandled exception was caused by an invalid image attachment (#9475)
  * Fix bug where a long subject title could not be displayed in some cases (#9416)
  * Fix infinite loop when parsing malformed Sieve script (#9562)
  * Fix bug where imap_conn_option's 'socket' was ignored (#9566)
  * Fix XSS vulnerability in post-processing of sanitized HTML content [CVE-2024-42009]
  * Fix XSS vulnerability in serving of attachments other than HTML or SVG [CVE-2024-42008]
  * Fix information leak (access to remote content) via insufficient CSS filtering [CVE-2024-42010]
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-09"/>
	<updated date="2024-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1228900">SUSE bug 1228900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228901">SUSE bug 1228901</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-42008/">CVE-2024-42008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42008">CVE-2024-42008 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-42009/">CVE-2024-42009 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42009">CVE-2024-42009 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-42010/">CVE-2024-42010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42010">CVE-2024-42010 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946149" comment="roundcubemail-1.6.8-bp156.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4088" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2024-0517" ref_url="https://www.suse.com/security/cve/CVE-2024-0517/" source="CVE"/>
		<reference ref_id="CVE-2024-0518" ref_url="https://www.suse.com/security/cve/CVE-2024-0518/" source="CVE"/>
		<reference ref_id="CVE-2024-0519" ref_url="https://www.suse.com/security/cve/CVE-2024-0519/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0033-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DE3CLV6WHFJZTJIJKVBYWFEYFP3WUP2Q/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

Update to 106.0.4998.52

* CHR-9580 Update Chromium on desktop-stable-120-4998 to 120.0.6099.234
* DNA-113175 Can not merge folders on start page
* DNA-113341 Implement 'special' menus
* DNA-113811 Removing icons in sidepanel heading
* DNA-114059 [Move to context menu] Workspaces icons always displayed in 1 line
* DNA-114361 'Move to workspace' submenu shows icons vertically
* The update to chromium 120.0.6099.234 fixes following issues:
  CVE-2024-0517, CVE-2024-0518, CVE-2024-0519
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2024-01-24"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0517/">CVE-2024-0517 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0517">CVE-2024-0517 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0518/">CVE-2024-0518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0518">CVE-2024-0518 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0519/">CVE-2024-0519 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0519">CVE-2024-0519 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844298" comment="opera-106.0.4998.52-lp155.3.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4089" version="1" class="patch">
	<metadata>
		<title>Security update for ntpd-rs (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="CVE-2024-38528" ref_url="https://www.suse.com/security/cve/CVE-2024-38528/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0331-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELZ3RSJII44KQB224ALPU2QM6LJCFQO3/" source="SUSE-SU"/>
		<description>
This update for ntpd-rs fixes the following issues:

- Introducing ntpd-rs version 1.2.3.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-12"/>
	<updated date="2024-10-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-38528/">CVE-2024-38528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38528">CVE-2024-38528 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947251" comment="ntpd-rs-1.2.3-bp155.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947252" comment="ntpd-rs-common-1.2.3-bp155.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4090" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231420" ref_url="https://bugzilla.suse.com/1231420" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-9602" ref_url="https://www.suse.com/security/cve/CVE-2024-9602/" source="CVE"/>
		<reference ref_id="CVE-2024-9603" ref_url="https://www.suse.com/security/cve/CVE-2024-9603/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0335-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KBINLYTAEEUNDXFHD5QY53RF7MGWTRI7/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

- Chromium 129.0.6668.100 (boo#1231420)

  * CVE-2024-9602: Type Confusion in V8
  * CVE-2024-9603: Type Confusion in V8
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-14"/>
	<updated date="2024-10-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1231420">SUSE bug 1231420</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9602/">CVE-2024-9602 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9602">CVE-2024-9602 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9603/">CVE-2024-9603 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9603">CVE-2024-9603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947345" comment="chromedriver-129.0.6668.100-bp156.2.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947346" comment="chromium-129.0.6668.100-bp156.2.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4091" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231694" ref_url="https://bugzilla.suse.com/1231694" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-9954" ref_url="https://www.suse.com/security/cve/CVE-2024-9954/" source="CVE"/>
		<reference ref_id="CVE-2024-9955" ref_url="https://www.suse.com/security/cve/CVE-2024-9955/" source="CVE"/>
		<reference ref_id="CVE-2024-9956" ref_url="https://www.suse.com/security/cve/CVE-2024-9956/" source="CVE"/>
		<reference ref_id="CVE-2024-9957" ref_url="https://www.suse.com/security/cve/CVE-2024-9957/" source="CVE"/>
		<reference ref_id="CVE-2024-9958" ref_url="https://www.suse.com/security/cve/CVE-2024-9958/" source="CVE"/>
		<reference ref_id="CVE-2024-9959" ref_url="https://www.suse.com/security/cve/CVE-2024-9959/" source="CVE"/>
		<reference ref_id="CVE-2024-9960" ref_url="https://www.suse.com/security/cve/CVE-2024-9960/" source="CVE"/>
		<reference ref_id="CVE-2024-9961" ref_url="https://www.suse.com/security/cve/CVE-2024-9961/" source="CVE"/>
		<reference ref_id="CVE-2024-9962" ref_url="https://www.suse.com/security/cve/CVE-2024-9962/" source="CVE"/>
		<reference ref_id="CVE-2024-9963" ref_url="https://www.suse.com/security/cve/CVE-2024-9963/" source="CVE"/>
		<reference ref_id="CVE-2024-9964" ref_url="https://www.suse.com/security/cve/CVE-2024-9964/" source="CVE"/>
		<reference ref_id="CVE-2024-9965" ref_url="https://www.suse.com/security/cve/CVE-2024-9965/" source="CVE"/>
		<reference ref_id="CVE-2024-9966" ref_url="https://www.suse.com/security/cve/CVE-2024-9966/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0337-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T2MFLX2ZRDN67URDWGTQ2CAJVYDFICNP/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 130.0.6723.58 (boo#1231694)

* CVE-2024-9954: Use after free in AI
* CVE-2024-9955: Use after free in Web Authentication
* CVE-2024-9956: Inappropriate implementation in Web Authentication
* CVE-2024-9957: Use after free in UI
* CVE-2024-9958: Inappropriate implementation in PictureInPicture
* CVE-2024-9959: Use after free in DevTools
* CVE-2024-9960: Use after free in Dawn
* CVE-2024-9961: Use after free in Parcel Tracking
* CVE-2024-9962: Inappropriate implementation in Permissions
* CVE-2024-9963: Insufficient data validation in Downloads
* CVE-2024-9964: Inappropriate implementation in Payments
* CVE-2024-9965: Insufficient data validation in DevTools
* CVE-2024-9966: Inappropriate implementation in Navigations
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2024-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1231694">SUSE bug 1231694</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9954/">CVE-2024-9954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9954">CVE-2024-9954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9955/">CVE-2024-9955 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9955">CVE-2024-9955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9956/">CVE-2024-9956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9956">CVE-2024-9956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9957/">CVE-2024-9957 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9957">CVE-2024-9957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9958/">CVE-2024-9958 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9958">CVE-2024-9958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9959/">CVE-2024-9959 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9959">CVE-2024-9959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9960/">CVE-2024-9960 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9960">CVE-2024-9960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9961/">CVE-2024-9961 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9961">CVE-2024-9961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9962/">CVE-2024-9962 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9962">CVE-2024-9962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9963/">CVE-2024-9963 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9963">CVE-2024-9963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9964/">CVE-2024-9964 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9964">CVE-2024-9964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9965/">CVE-2024-9965 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9965">CVE-2024-9965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9966/">CVE-2024-9966 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9966">CVE-2024-9966 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947912" comment="chromedriver-130.0.6723.58-bp156.2.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947913" comment="chromium-130.0.6723.58-bp156.2.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4092" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1232060" ref_url="https://bugzilla.suse.com/1232060" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-10229" ref_url="https://www.suse.com/security/cve/CVE-2024-10229/" source="CVE"/>
		<reference ref_id="CVE-2024-10230" ref_url="https://www.suse.com/security/cve/CVE-2024-10230/" source="CVE"/>
		<reference ref_id="CVE-2024-10231" ref_url="https://www.suse.com/security/cve/CVE-2024-10231/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0341-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5PEJPFZ7F3SICZGHQRWBWYOGKITIYN67/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 130.0.6723.69 (boo#1232060)

  * CVE-2024-10229: Inappropriate implementation in Extensions
  * CVE-2024-10230: Type Confusion in V8
  * CVE-2024-10231: Type Confusion in V8
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-28"/>
	<updated date="2024-10-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1232060">SUSE bug 1232060</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10229/">CVE-2024-10229 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10229">CVE-2024-10229 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10230/">CVE-2024-10230 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10230">CVE-2024-10230 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10231/">CVE-2024-10231 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10231">CVE-2024-10231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948598" comment="chromedriver-130.0.6723.69-bp156.2.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948599" comment="chromium-130.0.6723.69-bp156.2.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4093" version="1" class="patch">
	<metadata>
		<title>Security update for lxc (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1204842" ref_url="https://bugzilla.suse.com/1204842" source="BUGZILLA"/>
		<reference ref_id="1206779" ref_url="https://bugzilla.suse.com/1206779" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-47952" ref_url="https://www.suse.com/security/cve/CVE-2022-47952/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0342-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OOSMXYJMF3W5N7MDXO2O3PADSGDX4HXP/" source="SUSE-SU"/>
		<description>
This update for lxc fixes the following issues:

lxc was updated to 6.0.2:

  The LXC team is pleased to announce the release of LXC 6.0.2!
  This is the second bugfix release for LXC 6.0 which is supported
  until June 2029.

  As usual this bugfix releases focus on stability and hardening.

  * Some of the highlights for this release are:

    - Reduced log level on some common messages
    - Fix compilation error on aarch64

  * Detailed changelog

    - Remove unused function
    - idmap: Lower logging level of newXidmap tools to INFO
    - Exit 0 when there's no error
    - doc: Fix definitions of get_config_path and set_config_path
    - README: Update security contact
    - fix possible clang compile error in AARCH

Update to 6.0.1:

  The LXC team is pleased to announce the release of LXC 6.0.1!
  This is the first bugfix release for LXC 6.0 which is supported
  until June 2029.

  As usual this bugfix releases focus on stability and hardening.

  * Highlights

    - Fixed some build tooling issues
    - Fixed startup failures on system without IPv6 support
    - Updated AppArmor rules to avoid potential warnings

Update to 6.0.0:

  The LXC team is pleased to announce the release of LXC 6.0 LTS!
  This is the result of two years of work since the LXC 5.0 release
  and is the sixth LTS release for the LXC project. This release
  will be supported until June 2029.

  * New multi-call binary?

    A new tools-multicall=true configuration option can be used to
    produce a single lxc binary which can then have all other
    lxc-XYZ commands be symlinked to.
    This allows for a massive disk space reduction, particularly
    useful for embedded platforms.

  * Add a set_timeout function to the library

    A new set_timeout function is available on the main
    lxc_container struct and allow for setting a global timeout for
    interactions with the LXC monitor.
    Prior to this, there was no timeout, leading to potential
    deadlocks as there's also no way to cancel an monitor request.
    As a result of adding this new symbol to the library, we have
    bumped the liblxc symbol version to 1.8.0.

  * LXC bridge now has IPV6 enabled

    The default lxcbr0 bridge now comes with IPv6 enabled by
    default, using an IPv6 ULA subnet.
    Support for uid/gid selection in lxc-usernsexec
    The lxc-usernsexec tool now has both -u and -g options to
    control what resulting UID and GID (respectively) the user
    wishes to use (defaulting to 0/0).

  * Improvements to lxc-checkconfig

    lxc-checkconfig now only shows the version if lxc-start is
    present (rather than failing).
    Additionally, it's seen a number of other cosmetic improvements
    as well as now listing the maximum number of allowed namespaces
    for every namespace type.

  * Support for squashfs OCI images

    The built-in oci container template can now handle squashfs
    compressed OCI images through the use of atomfs.

  * Switched from systemd's dbus to dbus-1

    LXC now uses libdbus-1 for DBus interactions with systemd
    rather than using libsystemd.
    The reason for this change is that libdbus-1 is readily
    available for static builds.

  * Removed Upstart support

    Support for the Upstart init system has finally been removed
    from LXC.
    This shouldn't really affect anyone at this stage and allowed
    for cleaning up some logic and config files from our
    repository.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-30"/>
	<updated date="2024-10-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1204842">SUSE bug 1204842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206779">SUSE bug 1206779</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-47952/">CVE-2022-47952 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47952">CVE-2022-47952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948667" comment="liblxc-devel-6.0.2-bp156.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948668" comment="liblxc1-6.0.2-bp156.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948669" comment="lxc-6.0.2-bp156.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948670" comment="lxc-bash-completion-6.0.2-bp156.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948671" comment="lxc-ja-doc-6.0.2-bp156.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948672" comment="lxc-ko-doc-6.0.2-bp156.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948673" comment="pam_cgfs-6.0.2-bp156.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4094" version="1" class="patch">
	<metadata>
		<title>Security update for Botan (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1232296" ref_url="https://bugzilla.suse.com/1232296" source="BUGZILLA"/>
		<reference ref_id="1232297" ref_url="https://bugzilla.suse.com/1232297" source="BUGZILLA"/>
		<reference ref_id="1232300" ref_url="https://bugzilla.suse.com/1232300" source="BUGZILLA"/>
		<reference ref_id="1232301" ref_url="https://bugzilla.suse.com/1232301" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-50382" ref_url="https://www.suse.com/security/cve/CVE-2024-50382/" source="CVE"/>
		<reference ref_id="CVE-2024-50383" ref_url="https://www.suse.com/security/cve/CVE-2024-50383/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0343-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JIB3PGKG47QR6R5PTCZJFDYCEELC6BOJ/" source="SUSE-SU"/>
		<description>
This update for Botan fixes the following issues:

- Fixed CVE-2024-50382, CVE-2024-50383 - various compiler-induced side channel in GHASH when certain LLVM/GCC versions are used to compile Botan.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-30"/>
	<updated date="2024-10-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1232296">SUSE bug 1232296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232297">SUSE bug 1232297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232300">SUSE bug 1232300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232301">SUSE bug 1232301</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50382/">CVE-2024-50382 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50382">CVE-2024-50382 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50383/">CVE-2024-50383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50383">CVE-2024-50383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948674" comment="Botan-2.19.5-bp156.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948675" comment="Botan-doc-2.19.5-bp156.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948676" comment="libbotan-2-19-2.19.5-bp156.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948677" comment="libbotan-2-19-32bit-2.19.5-bp156.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948678" comment="libbotan-2-19-64bit-2.19.5-bp156.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948679" comment="libbotan-devel-2.19.5-bp156.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948680" comment="libbotan-devel-32bit-2.19.5-bp156.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948681" comment="libbotan-devel-64bit-2.19.5-bp156.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948682" comment="python3-botan-2.19.5-bp156.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4095" version="1" class="patch">
	<metadata>
		<title>Security update for xsd (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1232580" ref_url="https://bugzilla.suse.com/1232580" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-50602" ref_url="https://www.suse.com/security/cve/CVE-2024-50602/" source="CVE"/>
		<description>
This update for xsd fixes the following issues:

  - CVE-2024-50602: Fixed libexpat DoS via XML_ResumeParser in xsd (boo#1232580)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-03"/>
	<updated date="2024-11-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1232580">SUSE bug 1232580</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50602/">CVE-2024-50602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50602">CVE-2024-50602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950796" comment="xsd-4.1.0-bp156.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950797" comment="xsd-doc-4.1.0-bp156.5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4096" version="1" class="patch">
	<metadata>
		<title>Security update for mosquitto (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1190048" ref_url="https://bugzilla.suse.com/1190048" source="BUGZILLA"/>
		<reference ref_id="1190101" ref_url="https://bugzilla.suse.com/1190101" source="BUGZILLA"/>
		<reference ref_id="1214918" ref_url="https://bugzilla.suse.com/1214918" source="BUGZILLA"/>
		<reference ref_id="1215864" ref_url="https://bugzilla.suse.com/1215864" source="BUGZILLA"/>
		<reference ref_id="1215865" ref_url="https://bugzilla.suse.com/1215865" source="BUGZILLA"/>
		<reference ref_id="1232635" ref_url="https://bugzilla.suse.com/1232635" source="BUGZILLA"/>
		<reference ref_id="1232636" ref_url="https://bugzilla.suse.com/1232636" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13849" ref_url="https://www.suse.com/security/cve/CVE-2020-13849/" source="CVE"/>
		<reference ref_id="CVE-2021-34434" ref_url="https://www.suse.com/security/cve/CVE-2021-34434/" source="CVE"/>
		<reference ref_id="CVE-2023-0809" ref_url="https://www.suse.com/security/cve/CVE-2023-0809/" source="CVE"/>
		<reference ref_id="CVE-2023-28366" ref_url="https://www.suse.com/security/cve/CVE-2023-28366/" source="CVE"/>
		<reference ref_id="CVE-2023-3592" ref_url="https://www.suse.com/security/cve/CVE-2023-3592/" source="CVE"/>
		<reference ref_id="CVE-2024-10525" ref_url="https://www.suse.com/security/cve/CVE-2024-10525/" source="CVE"/>
		<reference ref_id="CVE-2024-3935" ref_url="https://www.suse.com/security/cve/CVE-2024-3935/" source="CVE"/>
		<description>
This update for mosquitto fixes the following issues:

- Update to latest release to address the following security
  issues:

  * CVE-2024-3935 (boo#1232635)
  * CVE-2024-10525 (boo#1232636)

Update to version 2.0.20

  Broker:

  - Fix QoS 1 / QoS 2 publish incorrectly returning
    'no subscribers'.
  - Don't allow invalid response topic values.
  - Fix some strict protocol compliance issues.

Update to version 2.0.19

  Security:

  * Fix mismatched subscribe/unsubscribe with normal/shared topics.
  * Fix crash on bridge using remapped topic being sent a crafted
    packet.

  Broker:

  * Fix assert failure when loading a persistence file that
    contains subscriptions with no client id.
  * Fix local bridges being incorrectly expired when
    persistent_client_expiration is in use.
  * Fix use of CLOCK_BOOTTIME for getting time.
  * Fix mismatched subscribe/unsubscribe with normal/shared topics.
  * Fix crash on bridge using remapped topic being sent a crafted
    packet.

  Client library:

  * Fix some error codes being converted to string as 'unknown'.
  * Clear SSL error state to avoid spurious error reporting.
  * Fix 'payload format invalid' not being allowed as a PUBREC
    reason code.
  * Don't allow SUBACK with missing reason codes.

Update to 2.0.18 (boo#1214918, CVE-2023-28366, boo#1215865,
                    CVE-2023-0809, boo#1215864, CVE-2023-3592):

  * Fix crash on subscribe under certain unlikely conditions.
  * Fix mosquitto_rr not honouring `-R`. Closes #2893.
  * Fix `max_queued_messages 0` stopping clients from receiving
    messages.
  * Fix `max_inflight_messages` not being set correctly.
  * Fix `mosquitto_passwd -U` backup file creation.
  * CVE-2023-28366: Fix memory leak in broker when clients send
    multiple QoS 2 messages with the same message ID, but then
    never respond to the PUBREC commands.
  * CVE-2023-0809: Fix excessive memory being allocated based on
    malicious initial packets that are not CONNECT packets.
  * CVE-2023-3592: Fix memory leak when clients send v5 CONNECT
    packets with a will message that contains invalid property
    types.
  * Broker will now reject Will messages that attempt to publish
    to $CONTROL/.
  * Broker now validates usernames provided in a TLS certificate
    or TLS-PSK identity are valid UTF-8.
  * Fix potential crash when loading invalid persistence file.
  * Library will no longer allow single level wildcard
    certificates, e.g. *.com
  * Fix $SYS messages being expired after 60 seconds and hence
    unchanged values disappearing.
  * Fix some retained topic memory not being cleared immediately
    after used.
  * Fix error handling related to the `bind_interface` option.
  * Fix std* files not being redirected when daemonising, when
    built with assertions removed.
  * Fix default settings incorrectly allowing TLS v1.1.
  * Use line buffered mode for stdout.
  * Fix bridges with non-matching cleansession/local_cleansession
    being expired on start after restoring from persistence
  * Fix connections being limited to 2048 on Windows. The limit
    is now 8192, where supported.
  * Broker will log warnings if sensitive files are world
    readable/writable, or if the owner/group is not the same as
    the user/group the broker is running as. In future versions
    the broker will refuse to open these files.
  * mosquitto_memcmp_const is now more constant time.
  * Only register with DLT if DLT logging is enabled.
  * Fix any possible case where a json string might be
    incorrectly loaded. This could have caused a crash if a
    textname or textdescription field of a role was not a string,
    when loading the dynsec config from file only.
  * Dynsec plugin will not allow duplicate clients/groups/roles
    when loading config from file, which matches the behaviour
    for when creating them.
  * Fix heap overflow when reading corrupt config with 'log_dest
    file'.
  * Use CLOCK_BOOTTIME when available, to keep track of time.
    This solves the problem of the client OS sleeping and the
    client hence not being able to calculate the actual time for
    keepalive purposes.
  * Fix default settings incorrectly allowing TLS v1.1. Closes
  * Fix high CPU use on slow TLS connect.
  * Fix incorrect topic-alias property value in mosquitto_sub
    json output.
  * Fix confusing message on TLS certificate verification.
  * mosquitto_passwd uses mkstemp() for backup files.
  * `mosquitto_ctrl dynsec init` will refuse to overwrite an
    existing file, without a race-condition.

Update to 2.0.15:

  * Deleting the group configured as the anonymous group in the Dynamic Security
    plugin, would leave a dangling pointer that could lead to a single crash.
    This is considered a minor issue - only administrative users should have
    access to dynsec, the impact on availability is one-off, and there is no
    associated loss of data. It is now forbidden to delete the group configured
    as the anonymous group.
  * Fix memory leak when a plugin modifies the topic of a message in
    MOSQ_EVT_MESSAGE.
  * Fix bridge `restart_timeout` not being honoured.
  * Fix potential memory leaks if a plugin modifies the message in the
    MOSQ_EVT_MESSAGE event.
  * Fix unused flags in CONNECT command being forced to be 0, which is not
    required for MQTT v3.1. Closes #2522.
  * Improve documentation of `persistent_client_expiration` option.
    Closes #2404.
  * Add clients to session expiry check list when restarting and reloading from
   persistence. Closes #2546.
  * Fix bridges not sending failure notification messages to the local broker if
    the remote bridge connection fails. Closes #2467. Closes #1488.
  * Fix some PUBLISH messages not being counted in $SYS stats. Closes #2448.
  * Fix incorrect return code being sent in DISCONNECT when a client session is
    taken over. Closes #2607.
  * Fix confusing 'out of memory' error when a client is kicked in the dynamic
    security plugin. Closes #2525.
  * Fix confusing error message when dynamic security config file was a
    directory. Closes #2520.
  * Fix bridge queued messages not being persisted when local_cleansession is
    set to false and cleansession is set to true. Closes #2604.
  * Dynamic security: Fix modifyClient and modifyGroup commands to not modify
    the client/group if a new group/client being added is not valid.
  * Dynamic security: Fix the plugin being able to be loaded twice. Currently
    only a single plugin can interact with a unique $CONTROL topic. Using
    multiple instances of the plugin would produce duplicate entries in the
    config file. Closes #2601. Closes #2470.
  * Fix case where expired messages were causing queued messages not to be
    delivered. Closes #2609.
  * Fix websockets not passing on the X-Forwarded-For header.
  * Fix use of `MOSQ_OPT_TLS_ENGINE` being unable to be used due to the openssl
    ctx not being initialised until starting to connect. Closes #2537.
  * Fix incorrect use of SSL_connect. Closes #2594.
  * Don't set SIGPIPE to ignore, use MSG_NOSIGNAL instead. Closes #2564.
  * Add documentation of struct mosquitto_message to header. Closes #2561.
  * Fix documentation omission around mosquitto_reinitialise. Closes #2489.
  * Fix use of MOSQ_OPT_SSL_CTX when used in conjunction with
    MOSQ_OPT_SSL_CTX_DEFAULTS. Closes #2463.
  * Fix failure to close thread in some situations. Closes #2545.
  * Fix mosquitto_pub incorrectly reusing topic aliases when reconnecting.
  * Fix `-o` not working in `mosquitto_ctrl`, and typo in related documentation.

Update to version 2.0.14:

  Broker:

  * Fix bridge not respecting receive-maximum when reconnecting
    with MQTT v5.

  Client library:

  * Fix mosquitto_topic_matches_sub2() not using the length
    parameters.
  * Fix incorrect subscribe_callback in mosquittopp.h.

Update to version 2.0.13:

  Broker:

  * Fix `max_keepalive` option not being able to be set to 0.
  * Fix LWT messages not being delivered if `per_listener_settings`
    was set to true.
  * Various fixes around inflight quota management.
  * Fix problem parsing config files with Windows line endings.
  * Don't send retained messages when a shared subscription is made
  * Fix client id not showing in log on failed connections, where
    possible.
  * Fix broker sending duplicate CONNACK on failed MQTT v5
    reauthentication.
  * Fix mosquitto_plugin.h not including mosquitto_broker.h.

  Client library:

  * Initialise sockpairR/W to invalid in `mosquitto_reinitialise()`
    to avoid closing invalid sockets in `mosquitto_destroy()` on
    error.

  Clients:

  - Fix date format in mosquitto_sub output.

- Update to version 2.0.12

  * Includes security fixes for
    CVE-2021-34434 (boo#1190048) and CVE-2020-13849 (boo#1190101)

  Security :

  * An MQTT v5 client connecting with a large number of
    user-property properties could cause excessive CPU usage,
    leading to a loss of performance and possible denial of
    service. This has been fixed.
  * Fix `max_keepalive` not applying to MQTT v3.1.1 and v3.1
    connections.  These clients are now rejected if their keepalive
    value exceeds max_keepalive. This option allows CVE-2020-13849,
    which is for the MQTT v3.1.1 protocol itself rather than an
    implementation, to be addressed.
  * Using certain listener related configuration options e.g.
    `cafile`, that apply to the default listener without defining
    any listener would cause a remotely accessible listener to be
    opened that was not confined to the local machine but did have
    anonymous access enabled, contrary to the documentation.
    This has been fixed. Closes #2283.
  * CVE-2021-34434: If a plugin had granted ACL subscription access
    to a durable/non-clean-session client, then removed that
    access,the client would keep its existing subscription. This
    has been fixed.
  * Incoming QoS 2 messages that had not completed the QoS flow
    were not being checked for ACL access when a clean
    session=False client was reconnecting.  This has been fixed.

  Broker:

  * Fix possible out of bounds memory reads when reading a
    corrupt/crafted configuration file. Unless your configuration
    file is writable by untrusted users this is not a risk.
  * Fix `max_connections` option not being correctly counted.
  * Fix TLS certificates and TLS-PSK not being able to be
    configured at the same time.
  * Disable TLS v1.3 when using TLS-PSK, because it isn't correctly
    configured.
  * Fix `max_keepalive` not applying to MQTT v3.1.1 and v3.1
    connections.  These clients are now rejected if their keepalive
    value exceeds max_keepalive.
  * Fix broker not quiting if e.g. the `password_file` is specified
    as a directory. Closes #2241.
  * Fix listener mount_point not being removed on outgoing messages.
  * Strict protocol compliance fixes, plus test suite.
  * Fix $share subscriptions not being recovered for durable
    clients that reconnect.
  * Update plugin configuration documentation. Closes #2286.

  Client library:

  * If a client uses TLS-PSK then force the default cipher list to
    use 'PSK' ciphers only. This means that a client connecting to
    a broker configured with x509 certificates only will now fail.
    Prior to this, the client would connect successfully without#
    verifying certificates, because they were not configured.
  * Disable TLS v1.3 when using TLS-PSK, because it isn't correctly
    configured.
  * Threaded mode is deconfigured when the mosquitto_loop_start()
    thread ends, which allows mosquitto_loop_start() to be called
    again.
  * Fix MOSQ_OPT_SSL_CTX not being able to be set to NULL.
  * Fix reconnecting failing when MOSQ_OPT_TLS_USE_OS_CERTS was in
    use, but none of capath, cafile, psk, nor MOSQ_OPT_SSL_CTX were
    set, and MOSQ_OPT_SSL_CTX_WITH_DEFAULTS was set to the default
    value of true.

  Apps:

  * Fix `mosquitto_ctrl dynsec setDefaultACLAccess` command not
    working.

  Clients:

  * Document TLS certificate behaviour when using `-p 8883`.

  Build:

  * Fix installation using WITH_TLS=no. Closes #2281.
  * Fix builds with libressl 3.4.0. Closes #2198.
  * Remove some unnecessary code guards related to libressl.
  * Fix printf format build warning on MIPS. Closes #2271.

Update to version 2.0.11:

  Security:

  * If a MQTT v5 client connects with a crafted CONNECT packet a
    memory leak will occur. This has been fixed.

  Broker:

  * Fix possible crash having just upgraded from 1.6 if
    `per_listener_settings true` is set, and a SIGHUP is sent to
    the broker before a client has reconnected to the broker.
  * Fix bridge not reconnectng if the first reconnection attempt
    fails.
  * Improve QoS 0 outgoing packet queueing.
  * Fix QoS 0 messages not being queued when `queue_qos0_messages`
    was enabled.

  Clients:

  * If sending mosquitto_sub output to a pipe, mosquitto_sub will
    now detect that the pipe has closed and disconnect.
  * Fix `mosquitto_pub -l` quitting if a message publication is
    attempted when the broker is temporarily unavailable.

		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-04"/>
	<updated date="2024-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190048">SUSE bug 1190048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190101">SUSE bug 1190101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214918">SUSE bug 1214918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215864">SUSE bug 1215864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215865">SUSE bug 1215865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232635">SUSE bug 1232635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232636">SUSE bug 1232636</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-13849/">CVE-2020-13849 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13849">CVE-2020-13849 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2021-34434/">CVE-2021-34434 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34434">CVE-2021-34434 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0809/">CVE-2023-0809 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0809">CVE-2023-0809 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28366/">CVE-2023-28366 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28366">CVE-2023-28366 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3592/">CVE-2023-3592 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3592">CVE-2023-3592 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10525/">CVE-2024-10525 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10525">CVE-2024-10525 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3935/">CVE-2024-3935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3935">CVE-2024-3935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950798" comment="libmosquitto1-2.0.20-bp156.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950799" comment="libmosquittopp1-2.0.20-bp156.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950800" comment="mosquitto-2.0.20-bp156.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950801" comment="mosquitto-clients-2.0.20-bp156.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950802" comment="mosquitto-devel-2.0.20-bp156.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4097" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1232566" ref_url="https://bugzilla.suse.com/1232566" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-10487" ref_url="https://www.suse.com/security/cve/CVE-2024-10487/" source="CVE"/>
		<reference ref_id="CVE-2024-10488" ref_url="https://www.suse.com/security/cve/CVE-2024-10488/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0348-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TWCERU7U22RRHAMW65YIQM4E2L3NHCQX/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Update to version 130.0.6723.91 (boo#1232566):

- CVE-2024-10487: Out of bounds write in Dawn
- CVE-2024-10488: Use after free in WebRTC

		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-05"/>
	<updated date="2024-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1232566">SUSE bug 1232566</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10487/">CVE-2024-10487 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10487">CVE-2024-10487 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10488/">CVE-2024-10488 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10488">CVE-2024-10488 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950986" comment="chromedriver-130.0.6723.91-bp155.2.135.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950987" comment="chromium-130.0.6723.91-bp155.2.135.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4098" version="1" class="patch">
	<metadata>
		<title>Security update for htmldoc (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1232380" ref_url="https://bugzilla.suse.com/1232380" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-46478" ref_url="https://www.suse.com/security/cve/CVE-2024-46478/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0349-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/66EAKHFU5UCLXGZTCGHTRYJAVMYI7VOL/" source="SUSE-SU"/>
		<description>
This update for htmldoc fixes the following issues:

- CVE-2024-46478: Fixed a buffer overflow when handling tabs through the parse_pre function (boo#1232380).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-05"/>
	<updated date="2024-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1232380">SUSE bug 1232380</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-46478/">CVE-2024-46478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46478">CVE-2024-46478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950988" comment="htmldoc-1.9.16-bp155.2.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4099" version="1" class="patch">
	<metadata>
		<title>Security update for python-mysql-connector-python (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231740" ref_url="https://bugzilla.suse.com/1231740" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21272" ref_url="https://www.suse.com/security/cve/CVE-2024-21272/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0351-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A4QYWY7IAP4RFAA3R6QMK3Q6FFAY4UOZ/" source="SUSE-SU"/>
		<description>
This update for python-mysql-connector-python fixes the following issues:

- Update to 9.1.0 (boo#1231740, CVE-2024-21272)
  - WL#16452: Bundle all installable authentication plugins when building the C-extension
  - WL#16444: Drop build support for DEB packages
  - WL#16442: Upgrade gssapi version to 1.8.3
  - WL#16411: Improve wheel metadata information for Classic and XDevAPI connectors
  - WL#16341: OpenID Connect (Oauth2 - JWT) Authentication Support
  - WL#16307: Remove Python 3.8 support
  - WL#16306: Add support for Python 3.13
  - BUG#37055435: Connection fails during the TLS negotiation when specifying TLSv1.3 ciphers
  - BUG#37013057: mysql-connector-python Parameterized query SQL injection
  - BUG#36765200: python mysql connector 8.3.0 raise %-.100s:%u when input a wrong host
  - BUG#36577957: Update charset/collation description indicate this is 16 bits
- 9.0.0:
  - WL#16350: Update dnspython version
  - WL#16318: Deprecate Cursors Prepared Raw and Named Tuple
  - WL#16284: Update the Python Protobuf version
  - WL#16283: Remove OpenTelemetry Bundled Installation
  - BUG#36664998: Packets out of order error is raised while changing user in aio
  - BUG#36611371: Update dnspython required versions to allow latest 2.6.1
  - BUG#36570707: Collation set on connect using C-Extension is ignored
  - BUG#36476195: Incorrect escaping in pure Python mode if sql_mode includes NO_BACKSLASH_ESCAPES
  - BUG#36289767: MySQLCursorBufferedRaw does not skip conversion
- 8.4.0
  - WL#16203: GPL License Exception Update
  - WL#16173: Update allowed cipher and cipher-suite lists
  - WL#16164: Implement support for new vector data type
  - WL#16127: Remove the FIDO authentication mechanism
  - WL#16053: Support GSSAPI/Kerberos authentication on Windows using authentication_ldap_sasl_client plug-in for C-extension
  - BUG#36227964: Improve OpenTelemetry span coverage
  - BUG#36167880: Massive memory leak mysqlx native Protobuf adding to collection
- 8.3.0
  - WL#16015: Remove use of removed COM_ commands
  - WL#15985: Support GSSAPI/Kerberos authentication on Windows using authentication_ldap_sasl_client plug-in for Pure Python
  - WL#15983: Stop using mysql_ssl_set api
  - WL#15982: Remove use of mysql_shutdown
  - WL#15950: Support query parameters for prepared statements
  - WL#15942: Improve type hints and standardize byte type handling
  - WL#15836: Split mysql and mysqlx into different packages
  - WL#15523: Support Python DB API asynchronous execution
  - BUG#35912790: Binary strings are converted when using prepared statements
  - BUG#35832148: Fix Django timezone.utc deprecation warning
  - BUG#35710145: Bad MySQLCursor.statement and result when query text contains code comments
  - BUG#21390859: STATEMENTS GET OUT OF SYNCH WITH RESULT SETS
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-06"/>
	<updated date="2024-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1231740">SUSE bug 1231740</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21272/">CVE-2024-21272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21272">CVE-2024-21272 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951068" comment="python3-mysql-connector-python-9.1.0-bp155.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4100" version="1" class="patch">
	<metadata>
		<title>Security update for python-jupyterlab (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229914" ref_url="https://bugzilla.suse.com/1229914" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-43805" ref_url="https://www.suse.com/security/cve/CVE-2024-43805/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0352-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AHLZGQA6FMW5UIO6ZBRWSGIB2JGKCLPB/" source="SUSE-SU"/>
		<description>
This update for python-jupyterlab fixes the following issues:

- Build the full pacakge with the javascript dependencies as a new
  source in vendor.tar.gz.
- CVE-2024-43805: Fixed data access via malicious Markdown due to HTML injection leading to DOM clobbering (boo#1229914)

		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-06"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1229914">SUSE bug 1229914</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43805/">CVE-2024-43805 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43805">CVE-2024-43805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951069" comment="jupyter-jupyterlab-2.2.10-bp156.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951070" comment="python3-jupyterlab-2.2.10-bp156.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4101" version="1" class="patch">
	<metadata>
		<title>Security update for kmail-account-wizard (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1232454" ref_url="https://bugzilla.suse.com/1232454" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-50624" ref_url="https://www.suse.com/security/cve/CVE-2024-50624/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0353-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RTPM7QBPNV2IRHCZU54SHNI4ODHT6PO4/" source="SUSE-SU"/>
		<description>
This update for kmail-account-wizard fixes the following issues:

- CVE-2024-50624: Fixed that plaintext HTTP was used for URLs when retrieving configuration files (boo#1232454, kde#487882)

		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-06"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1232454">SUSE bug 1232454</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-50624/">CVE-2024-50624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50624">CVE-2024-50624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951071" comment="kmail-account-wizard-23.08.5-bp156.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951072" comment="kmail-account-wizard-lang-23.08.5-bp156.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4102" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1232843" ref_url="https://bugzilla.suse.com/1232843" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-10826" ref_url="https://www.suse.com/security/cve/CVE-2024-10826/" source="CVE"/>
		<reference ref_id="CVE-2024-10827" ref_url="https://www.suse.com/security/cve/CVE-2024-10827/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0356-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M4FI7CL3CJJIB4K3DLJPCONJGHE5WQQR/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 130.0.6723.116 (boo#1232843)

- CVE-2024-10826: Use after free in Family Experiences
- CVE-2024-10827: Use after free in Serial
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-11-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1232843">SUSE bug 1232843</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10826/">CVE-2024-10826 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10826">CVE-2024-10826 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10827/">CVE-2024-10827 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10827">CVE-2024-10827 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951426" comment="chromedriver-130.0.6723.116-bp155.2.138.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951427" comment="chromium-130.0.6723.116-bp155.2.138.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4103" version="1" class="patch">
	<metadata>
		<title>Security update for tinyssh (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218197" ref_url="https://bugzilla.suse.com/1218197" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UXSOYCFCX44QUQ434BAHHQRSSCB3KZG5/" source="SUSE-SU"/>
		<description>
This update for tinyssh fixes the following issues:

tinyssh was updated to 20240101 (boo#1218197, CVE-2023-48795):

  * fixed channel_forkpty() race condition between close(slave)
    in parent process and login_tty(slave) in child process
  * fixed behavior when using terminal mode and stdin redirected
    to /dev/null 'ssh -tt -n'
  * added an 'strict-key' key exchange kex-strict-
    s-v00@openssh.com (Mitigates CVE-2023-48795 'Terrapin
    attack')
  		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-31"/>
	<updated date="2024-01-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218197">SUSE bug 1218197</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844808" comment="tinyssh-20240101-bp155.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4104" version="1" class="patch">
	<metadata>
		<title>Security update for python-PyPDF2 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1198588" ref_url="https://bugzilla.suse.com/1198588" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24859" ref_url="https://www.suse.com/security/cve/CVE-2022-24859/" source="CVE"/>
		<description>
This update for python-PyPDF2 fixes the following issues:

- CVE-2022-24859: Fixed infinite loop vulnerability (boo#1198588)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-11-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198588">SUSE bug 1198588</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24859/">CVE-2022-24859 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24859">CVE-2022-24859 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951976" comment="python3-PyPDF2-1.26.0-bp155.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4105" version="1" class="patch">
	<metadata>
		<title>Security update for mbedtls (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219336" ref_url="https://bugzilla.suse.com/1219336" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-23170" ref_url="https://www.suse.com/security/cve/CVE-2024-23170/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TFW4YTDRTJEE3RUQXN4MRJ2SIL4ISBZT/" source="SUSE-SU"/>
		<description>
This update for mbedtls fixes the following issues:

- Update to version 2.28.7:

  - Resolves CVE-2024-23170 boo#1219336 

- Update to 2.28.6:

  Changes:

  * Mbed TLS is now released under a dual Apache-2.0 OR GPL-2.0-or-later
    license. Users may choose which license they take the code under.

- Update to 2.28.5:

  Features:

  * The documentation of mbedtls_ecp_group now describes the optimized
    representation of A for some curves. Fixes gh#Mbed-TLS/mbedtls#8045.

  Security:

  * Developers using mbedtls_pkcs5_pbes2() or mbedtls_pkcs12_pbe() should
    review the size of the output buffer passed to this function, and note that
    the output after decryption may include CBC padding. Consider moving to the
    new functions mbedtls_pkcs5_pbes2_ext() or mbedtls_pkcs12_pbe_ext() which
    checks for overflow of the output buffer and reports the actual length of
    the output.
  * Improve padding calculations in CBC decryption, NIST key unwrapping and
    RSA OAEP decryption. With the previous implementation, some compilers
    (notably recent versions of Clang and IAR) could produce non-constant time
    code, which could allow a padding oracle attack if the attacker has access
    to precise timing measurements.
  * Fix a buffer overread when parsing short TLS application data records in
    ARC4 or null-cipher cipher suites. Credit to OSS-Fuzz.

  Bugfix:

  * Fix x509 certificate generation to conform to RFC 5480 / RFC 5758 when
    using ECC key. The certificate was rejected by some crypto frameworks.
    Fixes gh#Mbed-TLS/mbedtls#2924.
  * Fix some cases where mbedtls_mpi_mod_exp, RSA key construction or ECDSA
    signature can silently return an incorrect result in low memory conditions.
  * Fix IAR compiler warnings. Fixes gh#Mbed-TLS/mbedtls#7873,
    gh#Mbed-TLS/mbedtls#4300.
  * Fix an issue when parsing an otherName subject alternative name into a
    mbedtls_x509_san_other_name struct. The type-id of the otherName was not
    copied to the struct. This meant that the struct had incomplete information
    about the otherName SAN and contained uninitialized memory.
  * Fix the detection of HardwareModuleName otherName SANs. These were being
    detected by comparing the wrong field and the check was erroneously
    inverted.
  * Fix an error when MBEDTLS_ECDSA_SIGN_ALT is defined but not
    MBEDTLS_ECDSA_VERIFY_ALT, causing ecdsa verify to fail. Fixes
    gh#Mbed-TLS/mbedtls#7498.  Functions in the ssl_cache module now return a
    negative MBEDTLS_ERR_xxx error code on failure. Before, they returned 1 to
    indicate failure in some cases involving a missing entry or a full cache.

  Changes:

  * In configurations with ARIA or Camellia but not AES, the value of
    MBEDTLS_CIPHER_BLKSIZE_MAX was 8, rather than 16 as the name might suggest.
    This did not affect any library code, because this macro was only used in
    relation with CMAC which does not support these ciphers.  Its value is now
    16 if ARIA or Camellia are present. This may affect application code that
    uses this macro.

- Update to 2.28.4:

  Features:

  * Allow MBEDTLS_CONFIG_FILE and MBEDTLS_USER_CONFIG_FILE to be set by
    setting the CMake variable of the same name at configuration time.

  Bugfix:

  * Fix crypt_and_hash decryption fail when used with a stream cipher
    mode of operation, due to the input not being a multiple of the block
    size. Resolves #7417.
  * Fix a bug where mbedtls_x509_string_to_names() would return success
    when given a invalid name string, if it did not contain '=' or ','.
  * Fix missing PSA initialization in sample programs when
    MBEDTLS_USE_PSA_CRYPTO is enabled.
  * Fix clang and armclang compilation error when targeting certain Arm
    M-class CPUs (Cortex-M0, Cortex-M0+, Cortex-M1, Cortex-M23,
    SecurCore SC000). Fixes #1077.
  * Fixed an issue that caused compile errors when using CMake and the IAR
    toolchain.
  * Fix the build with MBEDTLS_PSA_INJECT_ENTROPY. Fixes #7516.
  * Fix builds on Windows with clang.
  * Fix compilation warnings in aes.c for certain combinations
    of configuration options.
  * Fix a compilation error on some platforms when including mbedtls/ssl.h
    with all TLS support disabled. Fixes #6628.

  Changes:

  * Update test data to avoid failures of unit tests after 2023-08-07, and
    update expiring certififcates in the certs 

- Update to 2.28.3:

  Features:

  * Use HOSTCC (if it is set) when compiling C code during generation of the
    configuration-independent files. This allows them to be generated when CC
    is set for cross compilation.
  * AES-NI is now supported with Visual Studio.
  * AES-NI is now supported in 32-bit builds, or when MBEDTLS_HAVE_ASM is
    disabled, when compiling with GCC or Clang or a compatible compiler for a
    target CPU that supports the requisite instructions (for example gcc -m32
    -msse2 -maes -mpclmul). (Generic x86 builds with GCC-like compilers still
    require MBEDTLS_HAVE_ASM and a 64-bit target.)

  Security:

  * MBEDTLS_AESNI_C, which is enabled by default, was silently ignored on
    builds that couldn't compile the GCC-style assembly implementation (most
    notably builds with Visual Studio), leaving them vulnerable to timing
    side-channel attacks. There is now an intrinsics-based AES-NI
    implementation as a fallback for when the assembly one cannot be used.

  Bugfix:

  * Fix a build issue on Windows where the source and build directory could
    not be on different drives (#5751).
  * Fix possible integer overflow in mbedtls_timing_hardclock(), which
    could cause a crash for certain platforms &amp; compiler options.
  * Fix IAR compiler warnings. Fixes #6924.
  * Fix a bug in the build where directory names containing spaces were
    causing generate_errors.pl to error out resulting in a build failure.
    Fixes issue #6879.
  * Fix compile error where MBEDTLS_RSA_C and MBEDTLS_X509_CRT_WRITE_C are
    defined, but MBEDTLS_PK_RSA_ALT_SUPPORT is not defined. Fixes #3174.
  * Fix a build issue when defining MBEDTLS_TIMING_ALT and MBEDTLS_SELF_TEST.
    The library would not link if the user didn't provide an external self-test
    function. The self-test is now provided regardless of the choice of
    internal/alternative timing implementation. Fixes #6923.
  * mbedtls_x509write_crt_set_serial() now explicitly rejects serial numbers
    whose binary representation is longer than 20 bytes. This was already
    forbidden by the standard (RFC5280 - section 4.1.2.2) and now it's being
    enforced also at code level.
  * Fix potential undefined behavior in mbedtls_mpi_sub_abs(). Reported by
    Pascal Cuoq using TrustInSoft Analyzer in #6701; observed independently by
    Aaron Ucko under Valgrind.
  * Fix behavior of certain sample programs which could, when run with no
    arguments, access uninitialized memory in some cases. Fixes #6700 (which
    was found by TrustInSoft Analyzer during REDOCS'22) and #1120.
  * Fix build errors in test programs when MBEDTLS_CERTS_C is disabled.
    Fixes #6243.
  * Fix parsing of X.509 SubjectAlternativeName extension. Previously,
    malformed alternative name components were not caught during initial
    certificate parsing, but only on subsequent calls to
    mbedtls_x509_parse_subject_alt_name(). Fixes #2838.
  * Fix bug in conversion from OID to string in
    mbedtls_oid_get_numeric_string(). OIDs such as 2.40.0.25 are now printed
    correctly.
  * Reject OIDs with overlong-encoded subidentifiers when converting them to a
    string.
  * Reject OIDs with subidentifier values exceeding UINT_MAX. Such
    subidentifiers can be valid, but Mbed TLS cannot currently handle them.
  * Reject OIDs that have unterminated subidentifiers, or (equivalently) have
    the most-significant bit set in their last byte.
  * Silence a warning about an unused local variable in bignum.c on some
    architectures. Fixes #7166.
  * Silence warnings from clang -Wdocumentation about empty \retval
    descriptions, which started appearing with Clang 15. Fixes #6960.
  * Fix undefined behavior in mbedtls_ssl_read() and mbedtls_ssl_write() if
    len argument is 0 and buffer is NULL.

  Changes:

  * The C code follows a new coding style. This is transparent for users but
    affects contributors and maintainers of local patches. For more
    information, see
    https://mbed-tls.readthedocs.io/en/latest/kb/how-to/rewrite-branch-for-coding-style/
  * Changed the default MBEDTLS_ECP_WINDOW_SIZE from 6 to 2.  As tested in
    issue 6790, the correlation between this define and RSA decryption
    performance has changed lately due to security fixes.  To fix the
    performance degradation when using default values the window was reduced
    from 6 to 2, a value that gives the best or close to best results when
    tested on Cortex-M4 and Intel i7.

- Setup the mbedtls-2 package
- Build AVX2 enabled hwcaps library for x86_64-v3
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-31"/>
	<updated date="2024-01-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219336">SUSE bug 1219336</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-23170/">CVE-2024-23170 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23170">CVE-2024-23170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844809" comment="libmbedcrypto7-2.28.7-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844810" comment="libmbedcrypto7-32bit-2.28.7-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844811" comment="libmbedcrypto7-64bit-2.28.7-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844812" comment="libmbedtls14-2.28.7-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844813" comment="libmbedtls14-32bit-2.28.7-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844814" comment="libmbedtls14-64bit-2.28.7-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844815" comment="libmbedx509-1-2.28.7-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844816" comment="libmbedx509-1-32bit-2.28.7-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844817" comment="libmbedx509-1-64bit-2.28.7-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844818" comment="mbedtls-devel-2.28.7-bp155.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4106" version="1" class="patch">
	<metadata>
		<title>Security update for icinga2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233310" ref_url="https://bugzilla.suse.com/1233310" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-49369" ref_url="https://www.suse.com/security/cve/CVE-2024-49369/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0371-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WZZJE5TDFJPSAOPLZPWW67EYXT7Z5WA4/" source="SUSE-SU"/>
		<description>
This update for icinga2 fixes the following issues:

Update to 2.13.10:

- CVE-2024-49369: Fix TLS certificate validation bypass (bsc#1233310).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-21"/>
	<updated date="2024-11-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1233310">SUSE bug 1233310</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="10/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-49369/">CVE-2024-49369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-49369">CVE-2024-49369 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953978" comment="icinga2-2.13.10-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953979" comment="icinga2-bin-2.13.10-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953980" comment="icinga2-common-2.13.10-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953981" comment="icinga2-doc-2.13.10-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953982" comment="icinga2-ido-mysql-2.13.10-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953983" comment="icinga2-ido-pgsql-2.13.10-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953984" comment="nano-icinga2-2.13.10-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953985" comment="vim-icinga2-2.13.10-bp155.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4107" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233311" ref_url="https://bugzilla.suse.com/1233311" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-11110" ref_url="https://www.suse.com/security/cve/CVE-2024-11110/" source="CVE"/>
		<reference ref_id="CVE-2024-11111" ref_url="https://www.suse.com/security/cve/CVE-2024-11111/" source="CVE"/>
		<reference ref_id="CVE-2024-11112" ref_url="https://www.suse.com/security/cve/CVE-2024-11112/" source="CVE"/>
		<reference ref_id="CVE-2024-11113" ref_url="https://www.suse.com/security/cve/CVE-2024-11113/" source="CVE"/>
		<reference ref_id="CVE-2024-11114" ref_url="https://www.suse.com/security/cve/CVE-2024-11114/" source="CVE"/>
		<reference ref_id="CVE-2024-11115" ref_url="https://www.suse.com/security/cve/CVE-2024-11115/" source="CVE"/>
		<reference ref_id="CVE-2024-11116" ref_url="https://www.suse.com/security/cve/CVE-2024-11116/" source="CVE"/>
		<reference ref_id="CVE-2024-11117" ref_url="https://www.suse.com/security/cve/CVE-2024-11117/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0373-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GW7TPS22DZK4SYF2WPZQO6RF5P6FPPAV/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 131.0.6778.69 (stable released 2024-11-12) (boo#1233311)

* CVE-2024-11110: Inappropriate implementation in Blink.
* CVE-2024-11111: Inappropriate implementation in Autofill.
* CVE-2024-11112: Use after free in Media.
* CVE-2024-11113: Use after free in Accessibility.
* CVE-2024-11114: Inappropriate implementation in Views.
* CVE-2024-11115: Insufficient policy enforcement in Navigation.
* CVE-2024-11116: Inappropriate implementation in Paint.
* CVE-2024-11117: Inappropriate implementation in FileSystem.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1233311">SUSE bug 1233311</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11110/">CVE-2024-11110 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11110">CVE-2024-11110 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11111/">CVE-2024-11111 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11111">CVE-2024-11111 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11112/">CVE-2024-11112 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11112">CVE-2024-11112 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11113/">CVE-2024-11113 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11113">CVE-2024-11113 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11114/">CVE-2024-11114 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11114">CVE-2024-11114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11115/">CVE-2024-11115 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11115">CVE-2024-11115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11116/">CVE-2024-11116 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11116">CVE-2024-11116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11117/">CVE-2024-11117 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11117">CVE-2024-11117 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009954020" comment="chromedriver-131.0.6778.69-bp155.2.141.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954021" comment="chromium-131.0.6778.69-bp155.2.141.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4108" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233534" ref_url="https://bugzilla.suse.com/1233534" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-11395" ref_url="https://www.suse.com/security/cve/CVE-2024-11395/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0377-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KRCYQ3DNIALF3YZPIC5DK2WC5O6L6AJP/" source="SUSE-SU"/>
		<description>

This update for chromium fixes the following issues:

- Chromium 131.0.6778.85 (stable released 2024-11-19) (boo#1233534)

  * CVE-2024-11395: Type Confusion in V8
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-25"/>
	<updated date="2024-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1233534">SUSE bug 1233534</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-11395/">CVE-2024-11395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11395">CVE-2024-11395 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009954747" comment="chromedriver-131.0.6778.85-bp155.2.144.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954748" comment="chromium-131.0.6778.85-bp155.2.144.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4109" version="1" class="patch">
	<metadata>
		<title>Security update for seamonkey (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230257" ref_url="https://bugzilla.suse.com/1230257" source="BUGZILLA"/>
		<reference ref_id="openSUSE-SU-2024:0381-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZCBM65JXGQLO4VAA4PM3Q466RSC2IZRV/" source="SUSE-SU"/>
		<description>
This update for seamonkey fixes the following issues:

Update to SeaMonkey 2.53.19:

  * Cancel button in SeaMonkey bookmarking star ui not working bug
    1872623.
  * Remove OfflineAppCacheHelper.jsm copy from SeaMonkey and use the
    one in toolkit bug 1896292.
  * Remove obsolete registerFactoryLocation calls from cZ bug 1870930.
  * Remove needless implements='nsIDOMEventListener' and QI bug
    1611010.
  * Replace use of nsIStandardURL::Init bug 1864355.
  * Switch SeaMonkey website from hg.mozilla.org to heptapod. bug
    1870934.
  * Allow view-image to open a data: URI by setting a flag on the
    loadinfo bug 1877001.
  * Save-link-as feature should use the loading principal and context
    menu using nsIContentPolicy.TYPE_SAVE_AS_DOWNLOAD bug 1879726.
  * Use punycode in SeaMonkey JS bug 1864287.
  * Font lists in preferences are no longer grouped by font type, port
    asynchronous handling like Bug 1399206 bug 1437393.
  * SeaMonkey broken tab after undo closed tab with invalid protocol
    bug 1885748.
  * SeaMonkey session restore is missing the checkboxes in the Classic
    theme bug 1896174.
  * Implement about:credits on seamonkey-project.org website bug
    1898467.
  * Fix for the 0.0.0.0 day vulnerability oligo summary.
  * Link in update notification does not open Browser bug 1888364.
  * Update ReadExtensionPrefs in Preferences.cpp bug 1890196.
  * Add about:seamonkey page to SeaMonkey bug 1897801.
  * SeaMonkey 2.53.19 uses the same backend as Firefox and contains
    the relevant Firefox 60.8 security fixes.
  * SeaMonkey 2.53.19 shares most parts of the mail and news code with
    Thunderbird. Please read the Thunderbird 60.8.0 release notes for
    specific security fixes in this release.
  * Additional important security fixes up to Current Firefox 115.14
    and Thunderbird 115.14 ESR plus many enhancements have been
    backported. We will continue to enhance SeaMonkey security in
    subsequent 2.53.x beta and release versions as fast as we are able
    to.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-28"/>
	<updated date="2024-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1230257">SUSE bug 1230257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955244" comment="seamonkey-2.53.19-bp155.2.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955245" comment="seamonkey-dom-inspector-2.53.19-bp155.2.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955246" comment="seamonkey-irc-2.53.19-bp155.2.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4110" version="1" class="patch">
	<metadata>
		<title>Security update for cobbler (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1203478" ref_url="https://bugzilla.suse.com/1203478" source="BUGZILLA"/>
		<reference ref_id="1204900" ref_url="https://bugzilla.suse.com/1204900" source="BUGZILLA"/>
		<reference ref_id="1205489" ref_url="https://bugzilla.suse.com/1205489" source="BUGZILLA"/>
		<reference ref_id="1205749" ref_url="https://bugzilla.suse.com/1205749" source="BUGZILLA"/>
		<reference ref_id="1206060" ref_url="https://bugzilla.suse.com/1206060" source="BUGZILLA"/>
		<reference ref_id="1206160" ref_url="https://bugzilla.suse.com/1206160" source="BUGZILLA"/>
		<reference ref_id="1206520" ref_url="https://bugzilla.suse.com/1206520" source="BUGZILLA"/>
		<reference ref_id="1207595" ref_url="https://bugzilla.suse.com/1207595" source="BUGZILLA"/>
		<reference ref_id="1209149" ref_url="https://bugzilla.suse.com/1209149" source="BUGZILLA"/>
		<reference ref_id="1219933" ref_url="https://bugzilla.suse.com/1219933" source="BUGZILLA"/>
		<reference ref_id="1231332" ref_url="https://bugzilla.suse.com/1231332" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-47533" ref_url="https://www.suse.com/security/cve/CVE-2024-47533/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0382-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CGWWFM26ZMG5SCPMDNQQNYHHTROXVX2Q/" source="SUSE-SU"/>
		<description>
This update for cobbler fixes the following issues:

Update to 3.3.7:

  * Security: Fix issue that allowed anyone to connect to the API
    as admin (CVE-2024-47533, boo#1231332)

  * bind - Fix bug that prevents cname entries from being
    generated successfully
  * Fix build on RHEL9 based distributions (fence-agents-all split)
  * Fix for Windows systems
  * Docs: Add missing dependencies for source installation
  * Fix issue that prevented systems from being synced when the
    profile was edited

Update to 3.3.6:

  * Upstream all openSUSE specific patches that were maintained in Git
  * Fix rename of items that had uppercase letters
  * Skip inconsistent collections instead of crashing the daemon

- Update to 3.3.5:
  * Added collection indicies for UUID's, MAC's, IP addresses and hostnames
    boo#1219933
  * Re-added to_dict() caching
  * Added lazy loading for the daemon (off by default)

- Update to 3.3.4:

  * Added cobbler-tests-containers subpackage
  * Updated the distro_signatures.json database
  * The default name for grub2-efi changed to grubx64.efi to match
    the DHCP template

- Do generate boot menus even if no profiles or systems - only local boot
- Avoid crashing running buildiso in certain conditions.
- Fix settings migration schema to work while upgrading on existing running
  Uyuni and SUSE Manager servers running with old Cobbler settings (boo#1203478)
- Consider case of 'next_server' being a hostname during migration
  of Cobbler collections.
- Fix problem with 'proxy_url_ext' setting being None type.
- Update v2 to v3 migration script to allow migration of collections
  that contains settings from Cobbler 2. (boo#1203478)
- Fix problem for the migration of 'autoinstall' collection attribute.
- Fix failing Cobbler tests after upgrading to 3.3.3.
- Fix regression: allow empty string as interface_type value (boo#1203478) 
- Avoid possible override of existing values during migration
  of collections to 3.0.0 (boo#1206160)
- Add missing code for previous patch file around boot_loaders migration.
- Improve Cobbler performance with item cache and threadpool (boo#1205489)
- Skip collections that are inconsistent instead of crashing (boo#1205749)
- Items: Fix creation of 'default' NetworkInterface (boo#1206520)
- S390X systems require their kernel options to have a linebreak at
  79 characters (boo#1207595)
- settings-migration-v1-to-v2.sh will now handle paths with whitespace
  correct
- Fix renaming Cobbler items (boo#1204900, boo#1209149)
- Fix cobbler buildiso so that the artifact can be booted by EFI firmware.
  (boo#1206060)
- Add input_string_*, input_boolean, input_int functiont to public API
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-28"/>
	<updated date="2024-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203478">SUSE bug 1203478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204900">SUSE bug 1204900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205489">SUSE bug 1205489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205749">SUSE bug 1205749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206060">SUSE bug 1206060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206160">SUSE bug 1206160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206520">SUSE bug 1206520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207595">SUSE bug 1207595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209149">SUSE bug 1209149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219933">SUSE bug 1219933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231332">SUSE bug 1231332</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47533/">CVE-2024-47533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47533">CVE-2024-47533 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955247" comment="cobbler-3.3.7-bp155.2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955248" comment="cobbler-tests-3.3.7-bp155.2.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955249" comment="cobbler-tests-containers-3.3.7-bp155.2.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4111" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2024-9954" ref_url="https://www.suse.com/security/cve/CVE-2024-9954/" source="CVE"/>
		<reference ref_id="CVE-2024-9955" ref_url="https://www.suse.com/security/cve/CVE-2024-9955/" source="CVE"/>
		<reference ref_id="CVE-2024-9956" ref_url="https://www.suse.com/security/cve/CVE-2024-9956/" source="CVE"/>
		<reference ref_id="CVE-2024-9957" ref_url="https://www.suse.com/security/cve/CVE-2024-9957/" source="CVE"/>
		<reference ref_id="CVE-2024-9958" ref_url="https://www.suse.com/security/cve/CVE-2024-9958/" source="CVE"/>
		<reference ref_id="CVE-2024-9959" ref_url="https://www.suse.com/security/cve/CVE-2024-9959/" source="CVE"/>
		<reference ref_id="CVE-2024-9960" ref_url="https://www.suse.com/security/cve/CVE-2024-9960/" source="CVE"/>
		<reference ref_id="CVE-2024-9961" ref_url="https://www.suse.com/security/cve/CVE-2024-9961/" source="CVE"/>
		<reference ref_id="CVE-2024-9962" ref_url="https://www.suse.com/security/cve/CVE-2024-9962/" source="CVE"/>
		<reference ref_id="CVE-2024-9963" ref_url="https://www.suse.com/security/cve/CVE-2024-9963/" source="CVE"/>
		<reference ref_id="CVE-2024-9964" ref_url="https://www.suse.com/security/cve/CVE-2024-9964/" source="CVE"/>
		<reference ref_id="CVE-2024-9965" ref_url="https://www.suse.com/security/cve/CVE-2024-9965/" source="CVE"/>
		<reference ref_id="CVE-2024-9966" ref_url="https://www.suse.com/security/cve/CVE-2024-9966/" source="CVE"/>
		<description>
This update for opera fixes the following issues:

opera was updated to 115.0.5322.68:

  * CHR-9877 Update Chromium on desktop-stable-130-5322 to
    130.0.6723.59
  * DNA-118660 [Win][Lin] Crash at
    opera::TabTracker::UpdateOnDeactivate
  * DNA-118840 Crash at
    extensions::OperaTouchPrivateDeleteAllDevicesFunction::Run
  * DNA-119224 Onboarding Web Content window does not have focus
  * DNA-119586 Search Copy browser popup windows issues
  * DNA-119685 [Easy Files] Popup is greyed out and unresponsive
    with sidebar autohide
  * DNA-119687 French text is not fitting
  * DNA-119700 Translations for Opera 115
  * DNA-119713 Crash at opera::content_filter::
    URLLoaderThrottleFactory::Throttle::WillStartRequest
  * DNA-119736 [Linux] Address bar not clickable when dropdown
    is shown
  * DNA-119770 Back “Force dark theme on pages” to 'Easy setup'
  * DNA-119902 Promote 115 to stable
- Complete Opera 115 changelog at:
  https://blogs.opera.com/desktop/changelog-for-115
- The update to chromium 130.0.6723.59 fixes following issues:
  CVE-2024-9954, CVE-2024-9955, CVE-2024-9956, CVE-2024-9957,
  CVE-2024-9958, CVE-2024-9959, CVE-2024-9960, CVE-2024-9961,
  CVE-2024-9962, CVE-2024-9963, CVE-2024-9964, CVE-2024-9965,
  CVE-2024-9966

- Update to 114.0.5282.222

  * DNA-118660 [Win][Lin] Crash at
    opera::TabTracker::UpdateOnDeactivate
  * DNA-119224 Onboarding Web Content window does not have focus
  * DNA-119478 Uncaught exception on opera:settings
  * DNA-119673 [Miniplayer] Cursor does not change from grab when
    hovering over detach button
  * DNA-119685 [Easy Files] Popup is greyed out and unresponsive
    with sidebar autohide
  * DNA-119687 French text is not fitting

- Update to 114.0.5282.185

  * DNA-119423 The icon should react on updates in the runtime
  * DNA-119524 Disallow installing GX mods
  * DNA-119565 Spotify in sidebar should be green in both dark
    and light theme

- Update to 114.0.5282.154

  * DNA-118382 Crash at
    (anonymous namespace)::ProfileErrorCallback
  * DNA-119509 After a restart, the wallpaper for an inactive
    Classic theme is restored to the default one (Opera One)
  * DNA-119528 Crash at opera::VibesServiceImpl::InitService
- Changes in 114.0.5282.144
  * DNA-118341 [Sidebar] Context menu appears
  * DNA-118450 Crash at opera::component_based::
    SplitScreenViewDelegate::UpdateViewWebContentses
  * DNA-118738 [Easy setup] When system mode is selected for
    classic theme, it will show light theme wallpaper even if
    system theme is dark
  * DNA-118987 [Address Bar] Page information icon from previous
    tab displayed after tabs drag &amp; drop
  * DNA-119025 Crash after going back to tab with detached
    google meet
  * DNA-119128 Custom wallpaper settled for the first time
    doesn’t show in Themes preview
  * DNA-119337 [Easy setup] Restore Wallpapers section for
    Classic theme
  * DNA-119369 Crash at PrefValueMap::GetValue
  * DNA-119399 Re-enable deleting theme configurations
  * DNA-119400 Disable ‘delete’ option when there is only one
    classic theme configuration
  * DNA-119403 Deleting a wallpaper should remove that wallpaper
    from inactive configurations
  * DNA-119440 Easy-setup wallpaper cannot load
  * DNA-119448 Update translations
  * DNA-119482 When launching the browser for the first time,
    the existing Classic theme is overwritten instead of creating
    a new one when the user uses a custom wallpaper

- Update to 114.0.5282.115
  * DNA-117247 Menu button not vertically centered
  * DNA-117907 [DevTools] Dark theme selection not persisting
  * DNA-117946 Select value for bookmark and history in sidebar
    setup can’t be changed by mouse click
  * DNA-118105 [Color-theme] [Split screen] Bookmarks bars are
    displayed when split screen is turned on
  * DNA-118115 Crash at content::(anonymous namespace)::
    GetContextLost
  * DNA-118586 Translations for O114
  * DNA-118661 Crash at opera::component_based::
    ComponentTabGroup::~ComponentTabGroup
  * DNA-118747 Detach miniplayer using button in sidebar panel
  * DNA-118795 [Easy setup] The user theme name is displayed
    incorrectly
  * DNA-118951 Inactive checkboxes are invisible in the
    Sidebar Setup
  * DNA-118956 Miniplayer is closed after pressing Esc key
  * DNA-119048 Issue came back – Missing ‘System mode’ in easy
    setup edit mode menu
  * DNA-119087 The mouse cursor should change to a clenched fist
    'grabbed' cursor, indicating that it is in the process of
    moving the mini player
  * DNA-119122 [Split Screen] Crash at opera::
    component_based::ComponentTabBar::DidChangeTabs
  * DNA-119123 [Split Screen] Crash at opera::component_based::
    ComponentTabBar::GetActiveTab
  * DNA-119182 Buttons in the theme tile preview become invisible
    when a user wallpaper is set
  * DNA-119191 Address bar dropdown list has wrong color
  * DNA-119192 [Background music] Music is only playing when
    clicking in web view
  * DNA-119234 Integrate translations for theme descriptions
  * DNA-119250 Crash when closing opera window with pinned tab(s)
  * DNA-119252 User wallpaper is not visible
  * DNA-119272 Crash at logging::NotReachedNoreturnError::
    ~NotReachedNoreturnError
  * DNA-119293 Crash at Browser::CloseContents
  * DNA-119306 [Background music] Change music to the one chosen
    in DNA-119297

- Update to 114.0.5282.102
  * DNA-118231 Crash at opera::VibesServiceImpl::OnVibeUninstalled
  * DNA-119119 Netinstaller shows eula-dialog during installation
    in silent mode
- Changes in 114.0.5282.101
  * CHR-9871 Update Chromium on desktop-stable-128-5282 to
    128.0.6613.186
  * DNA-118575 Crash at
    opera::SelfieViewController::~SelfieViewController
  * DNA-118592 Crash at views::View::~View()
  * DNA-118594 [browser tests] Crash at ui::
    LayerAnimationSequence::Start(ui::LayerAnimationDelegate*)
  * DNA-119169 Crash at views::View::~View

- Update to 114.0.5282.86
  * CHR-9856 Update Chromium on desktop-stable-128-5282 to
    128.0.6613.170
  * DNA-116321 React emoji picker is not closing when clicking
    outside of sidebar setup
  * DNA-117552 [Mac] Spacing in context menus is too large
  * DNA-118482 Crash at opera::SidebarPlayerServiceItemView::
    PostCloseControlPanelIfNotHovered()
  * DNA-118583 Crash at opera::ComponentTabStripController::
    CloseTooltipOnMouseEvent
  * DNA-118863 Version field doesn’t filled in for Stable
  * DNA-118995 Crash at opera::PageContainerView::
    UpdateDevToolsForContents
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2024-12-04"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9954/">CVE-2024-9954 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9954">CVE-2024-9954 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9955/">CVE-2024-9955 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9955">CVE-2024-9955 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9956/">CVE-2024-9956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9956">CVE-2024-9956 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9957/">CVE-2024-9957 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9957">CVE-2024-9957 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9958/">CVE-2024-9958 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9958">CVE-2024-9958 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9959/">CVE-2024-9959 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9959">CVE-2024-9959 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9960/">CVE-2024-9960 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9960">CVE-2024-9960 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9961/">CVE-2024-9961 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9961">CVE-2024-9961 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9962/">CVE-2024-9962 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9962">CVE-2024-9962 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9963/">CVE-2024-9963 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9963">CVE-2024-9963 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9964/">CVE-2024-9964 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9964">CVE-2024-9964 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9965/">CVE-2024-9965 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9965">CVE-2024-9965 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9966/">CVE-2024-9966 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9966">CVE-2024-9966 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956224" comment="opera-115.0.5322.68-lp156.2.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4112" version="1" class="patch">
	<metadata>
		<title>Security update for radare2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1234065" ref_url="https://bugzilla.suse.com/1234065" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-29645" ref_url="https://www.suse.com/security/cve/CVE-2024-29645/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0396-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O2TWZ4JPBWFDDWVAOUETBZRA6JUPKB5S/" source="SUSE-SU"/>
		<description>
This update for radare2 fixes the following issues:

Update to version 5.9.8:

- CVE-2024-29645: buffer overflow vulnerability allows an attacker to
  execute arbitrary code via the parse_die function (boo#1234065).
- For more details, check full release notes:
  https://github.com/radareorg/radare2/releases/tag/5.9.8
  https://github.com/radareorg/radare2/releases/tag/5.9.6
  https://github.com/radareorg/radare2/releases/tag/5.9.4
  https://github.com/radareorg/radare2/releases/tag/5.9.2
  https://github.com/radareorg/radare2/releases/tag/5.9.0 
  https://github.com/radareorg/radare2/releases/tag/5.8.8
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-09"/>
	<updated date="2024-12-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1234065">SUSE bug 1234065</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-29645/">CVE-2024-29645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29645">CVE-2024-29645 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957150" comment="radare2-5.9.8-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957151" comment="radare2-devel-5.9.8-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957152" comment="radare2-zsh-completion-5.9.8-bp155.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4113" version="1" class="patch">
	<metadata>
		<title>Security update for qt6-webengine (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233764" ref_url="https://bugzilla.suse.com/1233764" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-11403" ref_url="https://www.suse.com/security/cve/CVE-2024-11403/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0402-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGCRWIE4IMT4IZHYUTUPMPDFR46SJODV/" source="SUSE-SU"/>
		<description>
This update for qt6-webengine fixes the following issues:

- CVE-2024-11403: Fixed out of bounds memory read/write in libjxl (boo#1233764)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-09"/>
	<updated date="2024-12-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1233764">SUSE bug 1233764</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-11403/">CVE-2024-11403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11403">CVE-2024-11403 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957153" comment="libQt6Pdf6-6.4.2-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957154" comment="libQt6PdfQuick6-6.4.2-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957155" comment="libQt6PdfWidgets6-6.4.2-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957156" comment="libQt6WebEngineCore6-6.4.2-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957157" comment="libQt6WebEngineQuick6-6.4.2-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957158" comment="libQt6WebEngineWidgets6-6.4.2-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957159" comment="qt6-pdf-devel-6.4.2-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957160" comment="qt6-pdf-imports-6.4.2-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957161" comment="qt6-pdf-private-devel-6.4.2-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957162" comment="qt6-pdfquick-devel-6.4.2-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957163" comment="qt6-pdfquick-private-devel-6.4.2-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957164" comment="qt6-pdfwidgets-devel-6.4.2-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957165" comment="qt6-pdfwidgets-private-devel-6.4.2-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957166" comment="qt6-webengine-6.4.2-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957167" comment="qt6-webengine-docs-html-6.4.2-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957168" comment="qt6-webengine-docs-qch-6.4.2-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957169" comment="qt6-webengine-examples-6.4.2-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957170" comment="qt6-webengine-imports-6.4.2-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957171" comment="qt6-webenginecore-devel-6.4.2-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957172" comment="qt6-webenginecore-private-devel-6.4.2-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957173" comment="qt6-webenginequick-devel-6.4.2-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957174" comment="qt6-webenginequick-private-devel-6.4.2-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957175" comment="qt6-webenginewidgets-devel-6.4.2-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957176" comment="qt6-webenginewidgets-private-devel-6.4.2-bp155.2.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4114" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1234118" ref_url="https://bugzilla.suse.com/1234118" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-12053" ref_url="https://www.suse.com/security/cve/CVE-2024-12053/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0406-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MY4OWMSB2PYQKNUUAPGBJASRRX47GPPD/" source="SUSE-SU"/>
		<description>
This update for chromium fixes the following issues:

Chromium 131.0.6778.108 (stable released 2024-12-04) (boo#1234118)

- CVE-2024-12053: Type Confusion in V8
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-12"/>
	<updated date="2024-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1234118">SUSE bug 1234118</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-12053/">CVE-2024-12053 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12053">CVE-2024-12053 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957538" comment="chromedriver-131.0.6778.108-bp155.2.147.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957539" comment="chromium-131.0.6778.108-bp155.2.147.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4115" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1234361" ref_url="https://bugzilla.suse.com/1234361" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-12381" ref_url="https://www.suse.com/security/cve/CVE-2024-12381/" source="CVE"/>
		<reference ref_id="CVE-2024-12382" ref_url="https://www.suse.com/security/cve/CVE-2024-12382/" source="CVE"/>
		<description>

Chromium was updated to version 131.0.6778.139 (boo#1234361)

* CVE-2024-12381: Type Confusion in V8
* CVE-2024-12382: Use after free in Translate
* Various fixes from internal audits, fuzzing and other initiatives		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-16"/>
	<updated date="2024-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1234361">SUSE bug 1234361</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-12381/">CVE-2024-12381 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12381">CVE-2024-12381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-12382/">CVE-2024-12382 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12382">CVE-2024-12382 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958159" comment="chromedriver-131.0.6778.139-bp156.2.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958160" comment="chromium-131.0.6778.139-bp156.2.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4116" version="1" class="patch">
	<metadata>
		<title>Security update for python-python-sql (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1234653" ref_url="https://bugzilla.suse.com/1234653" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-9774" ref_url="https://www.suse.com/security/cve/CVE-2024-9774/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0412-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NH7RQ74KYYNIEITRLT3RX22PYBPURFLV/" source="SUSE-SU"/>
		<description>
This update for python-python-sql fixes the following issues:

- CVE-2024-9774: Fixed that unary operators does not escape non-Expression (boo#1234653).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-21"/>
	<updated date="2024-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1234653">SUSE bug 1234653</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9774/">CVE-2024-9774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9774">CVE-2024-9774 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958730" comment="python3-python-sql-1.5.1-bp155.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958731" comment="python311-python-sql-1.5.1-bp155.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4117" version="1" class="patch">
	<metadata>
		<title>Security update for python-xhtml2pdf (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231408" ref_url="https://bugzilla.suse.com/1231408" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-25885" ref_url="https://www.suse.com/security/cve/CVE-2024-25885/" source="CVE"/>
		<description>
This update for python-xhtml2pdf fixes the following issues:

- CVE-2024-25885: Fixed denial of service through regular expression in utils.py:getColor() (boo#1231408)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-21"/>
	<updated date="2024-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1231408">SUSE bug 1231408</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-25885/">CVE-2024-25885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25885">CVE-2024-25885 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958732" comment="python3-xhtml2pdf-0.2.4-bp155.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4118" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="CVE-2024-12692" ref_url="https://www.suse.com/security/cve/CVE-2024-12692/" source="CVE"/>
		<reference ref_id="CVE-2024-12693" ref_url="https://www.suse.com/security/cve/CVE-2024-12693/" source="CVE"/>
		<reference ref_id="CVE-2024-12694" ref_url="https://www.suse.com/security/cve/CVE-2024-12694/" source="CVE"/>
		<reference ref_id="CVE-2024-12695" ref_url="https://www.suse.com/security/cve/CVE-2024-12695/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0417-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HF65BDGUTXUXBR6H52BX5MEINMUTBW3M/" source="SUSE-SU"/>
		<description>

This security update for Chromium to version 131.0.6778.204 (boo#1234704) fixes:

* CVE-2024-12692: Type Confusion in V8
* CVE-2024-12693: Out of bounds memory access in V8
* CVE-2024-12694: Use after free in Compositing
* CVE-2024-12695: Out of bounds write in V8
* Various fixes from internal audits, fuzzing and other initiatives
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-28"/>
	<updated date="2024-12-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-12692/">CVE-2024-12692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12692">CVE-2024-12692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-12693/">CVE-2024-12693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12693">CVE-2024-12693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-12694/">CVE-2024-12694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12694">CVE-2024-12694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-12695/">CVE-2024-12695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12695">CVE-2024-12695 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958944" comment="chromedriver-131.0.6778.204-bp156.2.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958945" comment="chromium-131.0.6778.204-bp156.2.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4119" version="1" class="patch">
	<metadata>
		<title>Security update for hugin (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219819" ref_url="https://bugzilla.suse.com/1219819" source="BUGZILLA"/>
		<reference ref_id="1219820" ref_url="https://bugzilla.suse.com/1219820" source="BUGZILLA"/>
		<reference ref_id="1219821" ref_url="https://bugzilla.suse.com/1219821" source="BUGZILLA"/>
		<reference ref_id="1219822" ref_url="https://bugzilla.suse.com/1219822" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-25442" ref_url="https://www.suse.com/security/cve/CVE-2024-25442/" source="CVE"/>
		<reference ref_id="CVE-2024-25443" ref_url="https://www.suse.com/security/cve/CVE-2024-25443/" source="CVE"/>
		<reference ref_id="CVE-2024-25445" ref_url="https://www.suse.com/security/cve/CVE-2024-25445/" source="CVE"/>
		<reference ref_id="CVE-2024-25446" ref_url="https://www.suse.com/security/cve/CVE-2024-25446/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0047-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L2F34UEYXKH5DPAK35YKK7INNA4FS6WN/" source="SUSE-SU"/>
		<description>
This update for hugin fixes the following issues:

Update to version 2023.0.0:

  * PTBatcherGUI can now also queue user defined assistant and
    user defined output sequences.
  * PTBatcherGUI: Added option to generate panorama sequences from
    an existing pto template.
  * Assistant: Added option to select different output options
    like projection, FOV or canvas size depending on different
    variables (e.g. image count, field of view, lens type).
  * Allow building with epoxy instead of GLEW for OpenGL pointer
    management.
  * Several improvements to crop tool (outside crop, aspect ratio,
    ...).
  * Several bug fixes (e.g. in verdandi/internal blender).
  * Updated translations.
- fixed: boo#1219819 (CVE-2024-25442), boo#1219820 (CVE-2024-25443)
         boo#1219821 (CVE-2024-25445), boo#1219822 (CVE-2024-25446) 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-14"/>
	<updated date="2024-02-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219819">SUSE bug 1219819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219820">SUSE bug 1219820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219821">SUSE bug 1219821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219822">SUSE bug 1219822</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-25442/">CVE-2024-25442 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25442">CVE-2024-25442 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-25443/">CVE-2024-25443 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25443">CVE-2024-25443 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-25445/">CVE-2024-25445 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25445">CVE-2024-25445 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-25446/">CVE-2024-25446 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25446">CVE-2024-25446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846380" comment="hugin-2023.0.0-bp155.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4120" version="1" class="patch">
	<metadata>
		<title>Security update for pdns-recursor (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1209897" ref_url="https://bugzilla.suse.com/1209897" source="BUGZILLA"/>
		<reference ref_id="1219823" ref_url="https://bugzilla.suse.com/1219823" source="BUGZILLA"/>
		<reference ref_id="1219826" ref_url="https://bugzilla.suse.com/1219826" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-26437" ref_url="https://www.suse.com/security/cve/CVE-2023-26437/" source="CVE"/>
		<reference ref_id="CVE-2023-50387" ref_url="https://www.suse.com/security/cve/CVE-2023-50387/" source="CVE"/>
		<reference ref_id="CVE-2023-50868" ref_url="https://www.suse.com/security/cve/CVE-2023-50868/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZPNQJJ7XX3KPQTYPFVQXAGEDZZNY73R/" source="SUSE-SU"/>
		<description>
This update for pdns-recursor fixes the following issues:

Update to 4.8.6:

* fixes case when crafted DNSSEC records in a zone can lead to
  a denial of service in Recursor
  https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
 (boo#1219823, boo#1219826, CVE-2023-50387, CVE-2023-50868)


Changes in 4.8.5:

* (I)XFR: handle partial read of len prefix.
* YaHTTP: Prevent integer overflow on very large chunks.
* Fix setting of policy tags for packet cache hits.

Changes in 4.8.4:

* Deterred spoofing attempts can lead to authoritative servers
  being marked unavailable (boo#1209897, CVE-2023-26437)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-14"/>
	<updated date="2024-02-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1209897">SUSE bug 1209897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219823">SUSE bug 1219823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219826">SUSE bug 1219826</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-26437/">CVE-2023-26437 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26437">CVE-2023-26437 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50387/">CVE-2023-50387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50868/">CVE-2023-50868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846381" comment="pdns-recursor-4.8.6-bp155.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4121" version="1" class="patch">
	<metadata>
		<title>Security update for bitcoin (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="CVE-2018-17144" ref_url="https://www.suse.com/security/cve/CVE-2018-17144/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0052-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QVS4SN3G7GHI3M44QGZ5RO5NWOGIM4SH/" source="SUSE-SU"/>
		<description>
This update for bitcoin fixes the following issues:

Update to version 26.0, including the following changes:

- Enable LTO and test package for Leap
- Enable sqlite3 support for wallet
- Enable asm optimizations unconditionally
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-16"/>
	<updated date="2024-02-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17144/">CVE-2018-17144 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17144">CVE-2018-17144 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846382" comment="bitcoin-qt5-26.0-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846383" comment="bitcoin-test-26.0-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846384" comment="bitcoin-utils-26.0-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846385" comment="bitcoind-26.0-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846386" comment="libbitcoinconsensus-devel-26.0-bp155.2.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846387" comment="libbitcoinconsensus0-26.0-bp155.2.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4122" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2024-1059" ref_url="https://www.suse.com/security/cve/CVE-2024-1059/" source="CVE"/>
		<reference ref_id="CVE-2024-1060" ref_url="https://www.suse.com/security/cve/CVE-2024-1060/" source="CVE"/>
		<reference ref_id="CVE-2024-1077" ref_url="https://www.suse.com/security/cve/CVE-2024-1077/" source="CVE"/>
		<reference ref_id="CVE-2024-1283" ref_url="https://www.suse.com/security/cve/CVE-2024-1283/" source="CVE"/>
		<reference ref_id="CVE-2024-1284" ref_url="https://www.suse.com/security/cve/CVE-2024-1284/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0053-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JEOW7JNA5URR7GH7G6H4JCJ2CMZKOQEE/" source="SUSE-SU"/>
		<description>
This update for opera fixes the following issues:

- Update to 107.0.5045.21
  * CHR-9604 Update Chromium on desktop-stable-121-5045
    to 121.0.6167.160
  * DNA-114167 Crash at TopLevelStorageAccessPermissionContext::
    DecidePermission(permissions::PermissionRequestData, base::
    OnceCallback)
  * DNA-114303 Crash at auto std::__Cr::remove_if(auto, auto,
    base::ObserverList::Compact()::”lambda”(auto const&amp;))
  * DNA-114478 Start Page opening animation refresh
  * DNA-114553 Change search box animation
  * DNA-114723 [Search box] No option to highlight typed text
  * DNA-114806 [Tab cycler] Domain address should be bolded
  * DNA-114846 Translations for O107
  * DNA-114924 Crash at opera::SuggestionModelBase::
    NavigateTo(WindowOpenDisposition)
- The update to chromium 121.0.6167.160 fixes following issues:
    CVE-2024-1283, CVE-2024-1284

- Update to 107.0.5045.15
  * CHR-9593 Update Chromium on desktop-stable-121-5045 to
    121.0.6167.140
  * DNA-114421 Animate text in tab cycler from the center of
    the screen
  * DNA-114519 Crash at media::AVStreamToVideoDecoderConfig
    (AVStream const*, media::VideoDecoderConfig*)
  * DNA-114537 Default value for synchronization changed from
    'Do not sync data' to 'Customise sync'
  * DNA-114554 Add shadow to tab thumbnails in tab cycler
  * DNA-114555 Fade out long tab titles
  * DNA-114686 [Import] Import from Opera Crypto is marked as
    done even when Crypto is not installed
  * DNA-114691 Update font colors
  * DNA-114692 Update shadow (glow) of tabs
  * DNA-114693 Update position of text and tabs when cycling
    through tabs
  * DNA-114790 [Linux] Unwanted 1px top border in full screen mode
- Complete Opera 107 changelog at:
  https://blogs.opera.com/desktop/changelog-for-107/
- The update to chromium 121.0.6167.140 fixes following issues:
  CVE-2024-1059, CVE-2024-1060, CVE-2024-1077

- Update to 106.0.4998.70
  * DNA-112467 Shadow on Opera popups
  * DNA-114414 The 'Move to' workspace submenu from tab strip
    stays blue when its submenu item is selected

- Update to 106.0.4998.66
  * CHR-9416 Updating Chromium on desktop-stable-* branches
  * DNA-114489 Release and update opera:intro extension version
    in Opera
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-19"/>
	<updated date="2024-02-19"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1059/">CVE-2024-1059 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1059">CVE-2024-1059 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1060/">CVE-2024-1060 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1060">CVE-2024-1060 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1077/">CVE-2024-1077 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1077">CVE-2024-1077 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1283/">CVE-2024-1283 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1283">CVE-2024-1283 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1284/">CVE-2024-1284 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1284">CVE-2024-1284 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847369" comment="opera-107.0.5045.21-lp155.3.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4123" version="1" class="patch">
	<metadata>
		<title>Security update for syncthing (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="CVE-2023-49295" ref_url="https://www.suse.com/security/cve/CVE-2023-49295/" source="CVE"/>
		<description>
This update for syncthing fixes the following issues:

Update to 1.27.3

  * Bugfixes:

    #9039: Sync from Linux to Mac with ownership - Local additions after rescan
    #9241: Versions path does not honor tilde (~) shortcut

  * Enhancements:
    #8616: Add CLI completion
    #9151: Add 'stay logged in' checkbox to login dialog

  * Other issues:
    #9267: Inconsistent version requirements in lib/build and lib/upgrade
    #9313: Different lengths used for short device IDs in UI

- Make syncthing-relaysrv package resolvable by using systemd users
  to create the required user and group

Update to 1.27.2

  * Bugfixes:

    #9041: cli subcommand does not use STHOMEDIR env var
    #9183: Filesystem watching (kqueue) is enabled … with a lot of files
    #9274: Missing lock in DeviceStatistics ('fatal error: concurrent map read and map write')

  * Enhancements:

    #7406: Add UPnP support for IPv6

  * Other Issues:

    #9247: Embed binary releases signing key as a file instead of hardcoding a string
    #9287: quic-go v0.40.1 (CVE-2023-49295)

Update to 1.27.1

  * Bugfixes:

    #9253: Permission error on folder causes 'connection error' dialog when opening folder editor
    #9269: panic: nil pointer dereference in (*indexHandlerRegistry).startLocked

  * Other issues:

    #9274: Missing lock in DeviceStatistics ('fatal error: concurrent map read and map write')

Update to 1.27.0

  * Bugfixes:

    #9179: spurious log file in $XDG_CONFIG_HOME
    #9189: Discovery Returns IP
    #9208: Display error in 1.26 with login screen

  * Enhancements:

    #9178: Default config (state) dir on Unixes should be ~/.local/state/syncthing ($XDG_STATE_HOME/syncthing)
    #9200: Login form: login button should have an id attribute

Update to 1.26.1
  * Bugfixes:
    #9208: Display error in 1.26 with login screen

Update to 1.26.0

  * Bugfixes:

    #9072: Omitting %s from LDAP search filter results in corrupt search filter
    #9106: Posting config with invalid versioner type causes panic
    #9120: Deduplicated files on Windows aren't treated as regular files any more (Go 1.21)
    #9133: Syncthing Docker container fails to start if underlying filesystem doesn't support chown
    #9143: traefik no longer url escape X-Forwarded-Tls-Client-Cert header
    #9149: Favicon is stuck in notify state

  * Enhancements:

    #4137: Use a real login screen + sessions instead of HTTP basic auth

Update to 1.25.0

  * Bugfixes:

    #8274: Usage report transport type is wrong for QUIC
    #8482: Discovery server keeps duplicate entries
    #9019: Web GUI loses config changes when doing multiple modifications (e.g. on slow hardware or remotely)
    #9112: panic: counter cannot decrease in value
    #9123: Hashed passwords via API are hashed again

  * Enhancements:

    #141: Use multiple simultaneous TCP connections
    #5607: Move footer links to header

Update to 1.24.0

  * Bugfixes:

    #8965: v1.23.6 introduces untrusted sharing regression

  * Enhancements:

    #5175: Record more performance metrics
    #7456: Announce IPv6 ULA
    #7973: Restore versions file filter should be case insensitive
    #8767: Check interface for FlagRunning

  * Other issues:

    #9021: panic: bug: ClusterConfig called on closed or nonexistent connection
    #9034: Build with Go 1.21 out of the box

Update to 1.13.7

  * Bugfixes:

    #6597: setLowPriority should not increase process priority when already lower (in Windows)
    #7698: ursrv: unrealistic uptime data, likely due to unset RTC (1970-01-01)
    #8958: Extended attribute filter editor should be enabled when 'send extended attributes' is checked
    #8967: Shared With list ends with comma on 1 device
    #9001: relaysrv crash after some weeks of operation

  * Enhancements:

    #8890: Do not autoexpand tilde sign (~) to an absolute home directory path
    #8957: Add environment variables for --home, --conf, and --data
    #8968: Error for Windows invalid file names should indicate the invalid character or name part

  * Other issues:

    #8973: 1.23.6 docker image no longer available for linux/arm/v7
    #8983: Integrate govulncheck

Update to 1.13.6

  * Bugfixes:

    #7638: favicon not working Firefox &amp; derivative browsers
    #8899: Omitting %s from LDAP bind DN sends corrupted bind DN string to LDAP server
    #8920: Untrusted device should be disallowed from being an introducer
    #8960: relaysrv and discosrv docker images haven't been updated for more than year
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-20"/>
	<updated date="2024-02-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-49295/">CVE-2023-49295 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49295">CVE-2023-49295 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009847484" comment="syncthing-1.27.3-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847485" comment="syncthing-relaysrv-1.27.3-bp155.2.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4124" version="1" class="patch">
	<metadata>
		<title>Security update for zabbix (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219775" ref_url="https://bugzilla.suse.com/1219775" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-22119" ref_url="https://www.suse.com/security/cve/CVE-2024-22119/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0064-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/77EQS2XXGKMRBJR36XU7OBBZBMHJPDHT/" source="SUSE-SU"/>
		<description>
This update for zabbix fixes the following issues:

- CVE-2024-22119: Fixed a stored XSS in graph items select form (boo#1219775).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219775">SUSE bug 1219775</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-22119/">CVE-2024-22119 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22119">CVE-2024-22119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849712" comment="zabbix-agent-4.0.50-bp155.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849713" comment="zabbix-java-gateway-4.0.50-bp155.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849714" comment="zabbix-phpfrontend-4.0.50-bp155.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849715" comment="zabbix-proxy-4.0.50-bp155.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849716" comment="zabbix-proxy-mysql-4.0.50-bp155.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849717" comment="zabbix-proxy-postgresql-4.0.50-bp155.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849718" comment="zabbix-proxy-sqlite-4.0.50-bp155.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849719" comment="zabbix-server-4.0.50-bp155.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849720" comment="zabbix-server-mysql-4.0.50-bp155.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849721" comment="zabbix-server-postgresql-4.0.50-bp155.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4125" version="1" class="patch">
	<metadata>
		<title>Security update for exim (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218387" ref_url="https://bugzilla.suse.com/1218387" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3559" ref_url="https://www.suse.com/security/cve/CVE-2022-3559/" source="CVE"/>
		<reference ref_id="CVE-2023-42114" ref_url="https://www.suse.com/security/cve/CVE-2023-42114/" source="CVE"/>
		<reference ref_id="CVE-2023-42115" ref_url="https://www.suse.com/security/cve/CVE-2023-42115/" source="CVE"/>
		<reference ref_id="CVE-2023-42116" ref_url="https://www.suse.com/security/cve/CVE-2023-42116/" source="CVE"/>
		<reference ref_id="CVE-2023-42117" ref_url="https://www.suse.com/security/cve/CVE-2023-42117/" source="CVE"/>
		<reference ref_id="CVE-2023-42119" ref_url="https://www.suse.com/security/cve/CVE-2023-42119/" source="CVE"/>
		<reference ref_id="CVE-2023-51766" ref_url="https://www.suse.com/security/cve/CVE-2023-51766/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0007-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HHLYW3QLWRHGQXVXSQUL2DBTCFFCJGNB/" source="SUSE-SU"/>
		<description>
This update for exim fixes the following issues:

exim was updated to 4.97.1 (boo#1218387, CVE-2023-51766):

  * Fixes for the smtp protocol smuggling (CVE-2023-51766)

exim was updated to exim 4.96:

  * Move from using the pcre library to pcre2.
  * Constification work in the filters module required a major version
    bump for the local-scan API.  Specifically, the 'headers_charset'
    global which is visible via the API is now const and may therefore
    not be modified by local-scan code.
  * Bug 2819: speed up command-line messages being read in.  Previously a
    time check was being done for every character; replace that with one
    per buffer.
  * Bug 2815: Fix ALPN sent by server under OpenSSL.  Previously the string
    sent was prefixed with a length byte.
  * Change the SMTP feature name for pipelining connect to be compliant with
    RFC 5321.  Previously Dovecot (at least) would log errors during
    submission.
  * Fix macro-definition during '-be' expansion testing.  The move to
    write-protected store for macros had not accounted for these runtime
    additions; fix by removing this protection for '-be' mode.
  * Convert all uses of select() to poll().
  * Fix use of $sender_host_name in daemon process.  When used in certain
    main-section options or in a connect ACL, the value from the first ever
    connection was never replaced for subsequent connections.
  * Bug 2838: Fix for i32lp64 hard-align platforms
  * Bug 2845: Fix handling of tls_require_ciphers for OpenSSL when a value
    with underbars is given.
  * Bug 1895: TLS: Deprecate RFC 5114 Diffie-Hellman parameters.
  * Debugging initiated by an ACL control now continues through into routing
    and transport processes.
  * The 'expand' debug selector now gives more detail, specifically on the
    result of expansion operators and items.
  * Bug 2751: Fix include_directory in redirect routers.  Previously a
    bad comparison between the option value and the name of the file to
    be included was done, and a mismatch was wrongly identified.
  * Support for Berkeley DB versions 1 and 2 is withdrawn.
  * When built with NDBM for hints DB's check for nonexistence of a name
    supplied as the db file-pair basename.
  * Remove the 'allow_insecure_tainted_data' main config option and the
    'taint' log_selector.
  * Fix static address-list lookups to properly return the matched item.
    Previously only the domain part was returned.
  * The ${run} expansion item now expands its command string elements after
    splitting.  Previously it was before; the new ordering makes handling
    zero-length arguments simpler.
  * Taint-check exec arguments for transport-initiated external processes.
    Previously, tainted values could be used.  This affects 'pipe', 'lmtp' and
    'queryprogram' transport, transport-filter, and ETRN commands.
    The ${run} expansion is also affected: in 'preexpand' mode no part of
    the command line may be tainted, in default mode the executable name
    may not be tainted.
  * Fix CHUNKING on a continued-transport.  Previously the usabilility of
    the facility was not passed across execs, and only the first message
    passed over a connection could use BDAT; any further ones using DATA.
  * Support the PIPECONNECT facility in the smtp transport when the helo_data
    uses $sending_ip_address and an interface is specified.
  * OpenSSL: fix transport-required OCSP stapling verification under session
    resumption.
  * TLS resumption: the key for session lookup in the client now includes
    more info that a server could potentially use in configuring a TLS
    session, avoiding oferring mismatching sessions to such a server.
  * Fix string_copyn() for limit greater than actual string length.
  * Bug 2886: GnuTLS: Do not free the cached creds on transport connection
    close; it may be needed for a subsequent connection.
  * Fix CHUNKING for a second message on a connection when the first was
    rejected.
  * Fix ${srs_encode ...} to handle an empty sender address, now returning
    an empty address.
  * Bug 2855: Handle a v4mapped sender address given us by a frontending
    proxy.

update to exim 4.95

  * includes taintwarn (taintwarn.patch)
  * fast-ramp queue run
  * native SRS
  * TLS resumption
  * LMDB lookups with single key
  * smtp transport option 'message_linelength_limit'
  * optionally ignore lookup caches
  * quota checking for appendfile transport during message reception
  * sqlite lookups allow a 'file=&lt;path&gt;' option
  * lsearch lookups allow a 'ret=full' option
  * command line option for the notifier socket
  * faster TLS startup
  * new main config option 'proxy_protocol_timeout'
  * expand 'smtp_accept_max_per_connection'
  * log selector 'queue_size_exclusive'
  * main config option 'smtp_backlog_monitor'
  * main config option 'hosts_require_helo'
  * main config option 'allow_insecure_tainted_data'		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-03"/>
	<updated date="2024-01-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218387">SUSE bug 1218387</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3559/">CVE-2022-3559 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3559">CVE-2022-3559 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-42114/">CVE-2023-42114 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42114">CVE-2023-42114 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-42115/">CVE-2023-42115 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42115">CVE-2023-42115 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-42116/">CVE-2023-42116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42116">CVE-2023-42116 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-42117/">CVE-2023-42117 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42117">CVE-2023-42117 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-42119/">CVE-2023-42119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42119">CVE-2023-42119 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-51766/">CVE-2023-51766 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51766">CVE-2023-51766 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009818412" comment="exim-4.97.1-bp155.5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818413" comment="eximon-4.97.1-bp155.5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818414" comment="eximstats-html-4.97.1-bp155.5.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4126" version="1" class="patch">
	<metadata>
		<title>Security update for proftpd (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218144" ref_url="https://bugzilla.suse.com/1218144" source="BUGZILLA"/>
		<reference ref_id="1218344" ref_url="https://bugzilla.suse.com/1218344" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="CVE-2023-51713" ref_url="https://www.suse.com/security/cve/CVE-2023-51713/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L45IOOVVBSIBE7RRRVUWOWDGUABBZE4Q/" source="SUSE-SU"/>
		<description>
This update for proftpd fixes the following issues:

proftpd was updated to 1.3.8b - released 19-Dec-2023

- CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity (boo#1218144)
- CVE-2023-51713: Fixed Out-of-bounds buffer read when handling FTP commands. (boo#1218344)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-03"/>
	<updated date="2024-01-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218144">SUSE bug 1218144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218344">SUSE bug 1218344</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-51713/">CVE-2023-51713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51713">CVE-2023-51713 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009818415" comment="proftpd-1.3.8b-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818416" comment="proftpd-devel-1.3.8b-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818417" comment="proftpd-doc-1.3.8b-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818418" comment="proftpd-lang-1.3.8b-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818419" comment="proftpd-ldap-1.3.8b-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818420" comment="proftpd-mysql-1.3.8b-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818421" comment="proftpd-pgsql-1.3.8b-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818422" comment="proftpd-radius-1.3.8b-bp155.2.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818423" comment="proftpd-sqlite-1.3.8b-bp155.2.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4127" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django1 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220358" ref_url="https://bugzilla.suse.com/1220358" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-27351" ref_url="https://www.suse.com/security/cve/CVE-2024-27351/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0080-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BROIU2USAKIOU6XOT2YPTIGOODLQMAPF/" source="SUSE-SU"/>
		<description>
This update for python-Django1 fixes the following issues:

- CVE-2024-27351: Fixed a denial-of-service in regular expression of django.utils.text.Truncator.words() (boo#1220358).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-11"/>
	<updated date="2024-03-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220358">SUSE bug 1220358</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27351/">CVE-2024-27351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27351">CVE-2024-27351 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850420" comment="python3-Django1-1.11.29-bp155.4.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4128" version="1" class="patch">
	<metadata>
		<title>Security update for python-rpyc (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1221331" ref_url="https://bugzilla.suse.com/1221331" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-27758" ref_url="https://www.suse.com/security/cve/CVE-2024-27758/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AQXPI4PTGO5Y3OJPY3PCERYEYZAUX2VW/" source="SUSE-SU"/>
		<description>
This update for python-rpyc fixes the following issues:

- CVE-2024-27758: Fixed remote code execution via exposed methods (boo#1221331).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221331">SUSE bug 1221331</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-27758/">CVE-2024-27758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27758">CVE-2024-27758 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851425" comment="python3-rpyc-4.1.5-bp155.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4129" version="1" class="patch">
	<metadata>
		<title>Security update for chromium (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220131" ref_url="https://bugzilla.suse.com/1220131" source="BUGZILLA"/>
		<reference ref_id="1220604" ref_url="https://bugzilla.suse.com/1220604" source="BUGZILLA"/>
		<reference ref_id="1221105" ref_url="https://bugzilla.suse.com/1221105" source="BUGZILLA"/>
		<reference ref_id="1221335" ref_url="https://bugzilla.suse.com/1221335" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-1669" ref_url="https://www.suse.com/security/cve/CVE-2024-1669/" source="CVE"/>
		<reference ref_id="CVE-2024-1670" ref_url="https://www.suse.com/security/cve/CVE-2024-1670/" source="CVE"/>
		<reference ref_id="CVE-2024-1671" ref_url="https://www.suse.com/security/cve/CVE-2024-1671/" source="CVE"/>
		<reference ref_id="CVE-2024-1672" ref_url="https://www.suse.com/security/cve/CVE-2024-1672/" source="CVE"/>
		<reference ref_id="CVE-2024-1673" ref_url="https://www.suse.com/security/cve/CVE-2024-1673/" source="CVE"/>
		<reference ref_id="CVE-2024-1674" ref_url="https://www.suse.com/security/cve/CVE-2024-1674/" source="CVE"/>
		<reference ref_id="CVE-2024-1675" ref_url="https://www.suse.com/security/cve/CVE-2024-1675/" source="CVE"/>
		<reference ref_id="CVE-2024-1676" ref_url="https://www.suse.com/security/cve/CVE-2024-1676/" source="CVE"/>
		<reference ref_id="CVE-2024-2173" ref_url="https://www.suse.com/security/cve/CVE-2024-2173/" source="CVE"/>
		<reference ref_id="CVE-2024-2174" ref_url="https://www.suse.com/security/cve/CVE-2024-2174/" source="CVE"/>
		<reference ref_id="CVE-2024-2176" ref_url="https://www.suse.com/security/cve/CVE-2024-2176/" source="CVE"/>
		<reference ref_id="CVE-2024-2400" ref_url="https://www.suse.com/security/cve/CVE-2024-2400/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0084-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LA5F4J2SLVEY6FKG6O3LFDSA2N3OMZH/" source="SUSE-SU"/>
		<description>

This update for chromium fixes the following issue:

Chromium 122.0.6261.128 (boo#1221335)

*  CVE-2024-2400: Use after free in Performance Manager


Chromium 122.0.6261.111 (boo#1220131,boo#1220604,boo#1221105)

  * New upstream security release.
  * CVE-2024-2173: Out of bounds memory access in V8.
  * CVE-2024-2174: Inappropriate implementation in V8.
  * CVE-2024-2176: Use after free in FedCM.

Chromium 122.0.6261.94

  * CVE-2024-1669: Out of bounds memory access in Blink.
  * CVE-2024-1670: Use after free in Mojo.
  * CVE-2024-1671: Inappropriate implementation in Site Isolation.
  * CVE-2024-1672: Inappropriate implementation in Content Security Policy.
  * CVE-2024-1673: Use after free in Accessibility.
  * CVE-2024-1674: Inappropriate implementation in Navigation.
  * CVE-2024-1675: Insufficient policy enforcement in Download.
  * CVE-2024-1676: Inappropriate implementation in Navigation.
  * Type Confusion in V8
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-18"/>
	<updated date="2024-03-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220131">SUSE bug 1220131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220604">SUSE bug 1220604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221105">SUSE bug 1221105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221335">SUSE bug 1221335</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1669/">CVE-2024-1669 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1669">CVE-2024-1669 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1670/">CVE-2024-1670 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1670">CVE-2024-1670 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1671/">CVE-2024-1671 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1671">CVE-2024-1671 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1672/">CVE-2024-1672 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1672">CVE-2024-1672 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1673/">CVE-2024-1673 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1673">CVE-2024-1673 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1674/">CVE-2024-1674 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1674">CVE-2024-1674 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1675/">CVE-2024-1675 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1675">CVE-2024-1675 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1676/">CVE-2024-1676 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1676">CVE-2024-1676 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2173/">CVE-2024-2173 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2173">CVE-2024-2173 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2174/">CVE-2024-2174 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2174">CVE-2024-2174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2176/">CVE-2024-2176 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2176">CVE-2024-2176 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2400/">CVE-2024-2400 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2400">CVE-2024-2400 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851520" comment="chromedriver-122.0.6261.128-bp155.2.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851521" comment="chromium-122.0.6261.128-bp155.2.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851522" comment="clang17-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851523" comment="clang17-devel-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851524" comment="clang17-doc-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851525" comment="libLLVM17-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851526" comment="libLLVM17-32bit-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851527" comment="libLLVM17-64bit-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851528" comment="libLTO17-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851529" comment="libclang-cpp17-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851530" comment="libclang-cpp17-32bit-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851531" comment="libclang-cpp17-64bit-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851532" comment="liblldb17-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851533" comment="libomp17-devel-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851534" comment="lld17-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851535" comment="lldb17-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851536" comment="lldb17-devel-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851537" comment="llvm17-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851538" comment="llvm17-devel-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851539" comment="llvm17-doc-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851540" comment="llvm17-gold-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851541" comment="llvm17-libc++-devel-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851542" comment="llvm17-libc++1-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851543" comment="llvm17-libc++abi-devel-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851544" comment="llvm17-libc++abi1-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851545" comment="llvm17-libclang13-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851546" comment="llvm17-opt-viewer-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851547" comment="llvm17-polly-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851548" comment="llvm17-polly-devel-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851549" comment="llvm17-vim-plugins-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851550" comment="python3-clang17-17.0.6-bp155.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851551" comment="python3-lldb17-17.0.6-bp155.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4130" version="1" class="patch">
	<metadata>
		<title>Security update for minidlna (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222007" ref_url="https://bugzilla.suse.com/1222007" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-33476" ref_url="https://www.suse.com/security/cve/CVE-2023-33476/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2024:0093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJXNSM22S74GJOPTE62NPG75AN32GT4P/" source="SUSE-SU"/>
		<description>
This update for minidlna fixes the following issues:

Update to 1.3.3 (boo#1222007):

- Fixed HTTP chunk length parsing. (CVE-2023-33476)
- Improved Dutch and Swedish translations.
- Fixed directory symlink deletion handling.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-03-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222007">SUSE bug 1222007</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-33476/">CVE-2023-33476 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33476">CVE-2023-33476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852405" comment="minidlna-1.3.3-bp155.2.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4131" version="1" class="patch">
	<metadata>
		<title>Security update for kanidm (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="openSUSE-SU-2024:0095-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NKJULBOBLCBFHPQE3UTQ6SUJ5LZ43XC7/" source="SUSE-SU"/>
		<description>
This update for kanidm fixes the following issues:

Update to version 1.1.0~rc16~git6.e51d0de:

* [SECURITY: LOW] Administrator triggered thread crash in oauth2 claim maps #2686 (#2686)
* return consent map to service account (#2604)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-30"/>
	<updated date="2024-03-30"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009852638" comment="kanidm-1.1.0~rc16~git6.e51d0de-bp155.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852639" comment="kanidm-clients-1.1.0~rc16~git6.e51d0de-bp155.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852640" comment="kanidm-docs-1.1.0~rc16~git6.e51d0de-bp155.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852641" comment="kanidm-server-1.1.0~rc16~git6.e51d0de-bp155.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852642" comment="kanidm-unixd-clients-1.1.0~rc16~git6.e51d0de-bp155.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4132" version="1" class="patch">
	<metadata>
		<title>Security update for opera (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5 NonFree</platform>
		</affected>
		<reference ref_id="CVE-2024-2400" ref_url="https://www.suse.com/security/cve/CVE-2024-2400/" source="CVE"/>
		<description>
This update for opera fixes the following issues:

- Update to 108.0.5067.40

  * CHR-9668 Update Chromium on desktop-stable-122-5067 to
    122.0.6261.129
  * DNA-115396 Bolded camera icon when camera access is allowed

- The update to chromium 122.0.6261.129 fixes following issues:
  CVE-2024-2400

- Changes in 108.0.5067.24

  * CHR-9416 Updating Chromium on desktop-stable-* branches
  * DNA-115080 Crash at opera::component_based::
    ComponentDragController::ResetDragging()

- Changes in 108.0.5067.20

  * CHR-9642 Update Chromium on desktop-stable-122-5067 to
    122.0.6261.70
  * DNA-114217 [macOS] Services on the sidebar are not responding
    when browser window is on external monitor
  * DNA-114612 Crash at syncer::SyncEngineImpl::
    OnInvalidationReceived(std::__Cr::basic_string const&amp;)
  * DNA-114816 Update removed search engines and reset flags
    to default
  * DNA-114848 Workspace can not be removed from sidebar setup
  * DNA-114935 After an update extensions’ icons in the Sidebar
    are black
  * DNA-115087 Translations for O108
  * DNA-115228 Adblocker is blocking ads when turned off
  * DNA-115232 Promote 108 to stable
- Complete Opera 108 changelog at:
  https://blogs.opera.com/desktop/changelog-for-108/

- Update to 107.0.5045.36

  * CHR-9416 Updating Chromium on desktop-stable-* branches
  * DNA-114562 Fraud warning page missed animation
  * DNA-115103 Crash at opera::AdjustNavigationParamsWhen
    IntroductionIsActive(NavigateParams*)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-01"/>
	<updated date="2024-04-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2400/">CVE-2024-2400 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2400">CVE-2024-2400 at NVD</cve>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 NonFree is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852643" comment="opera-108.0.5067.40-lp155.3.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4133" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-json-jwt (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1156649" ref_url="https://bugzilla.suse.com/1156649" source="BUGZILLA"/>
		<reference ref_id="1220727" ref_url="https://bugzilla.suse.com/1220727" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18848" ref_url="https://www.suse.com/security/cve/CVE-2019-18848/" source="CVE"/>
		<reference ref_id="CVE-2023-51774" ref_url="https://www.suse.com/security/cve/CVE-2023-51774/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2025:0004-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FICWL2K7EGMUBVQ6CHEQYANYFEU4XBG4/" source="SUSE-SU"/>
		<description>
This update for rubygem-json-jwt fixes the following issues:

- New upstream release 1.16.6, see bundled CHANGELOG.md

- Remove padding oracle by @btoews in https://github.com/nov/json-jwt/pull/109
- Fixes CVE-2023-51774 boo#1220727

- updated to version 1.11.0
  - no changelog found
  - Fixes CVE-2019-18848 boo#1156649 

		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1156649">SUSE bug 1156649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220727">SUSE bug 1220727</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-18848/">CVE-2019-18848 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-18848">CVE-2019-18848 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-51774/">CVE-2023-51774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51774">CVE-2023-51774 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959148" comment="ruby2.5-rubygem-aes_key_wrap-1.1.0-bp155.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959149" comment="ruby2.5-rubygem-aes_key_wrap-doc-1.1.0-bp155.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959150" comment="ruby2.5-rubygem-json-jwt-1.16.6-bp155.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959151" comment="ruby2.5-rubygem-json-jwt-doc-1.16.6-bp155.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4134" version="1" class="patch">
	<metadata>
		<title>Security update for python-django-ckeditor (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219720" ref_url="https://bugzilla.suse.com/1219720" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-24815" ref_url="https://www.suse.com/security/cve/CVE-2024-24815/" source="CVE"/>
		<reference ref_id="openSUSE-SU-2025:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZXNT2JPQVYWDQRDN2YJ7KJCRBY5QEJQW/" source="SUSE-SU"/>
		<description>
This update for python-django-ckeditor fixes the following issues:

- Update to 6.7.2
  * Deprecated the package.
  * Added a new ckeditor/fixups.js script which disables the version check again 
    (if something slips through by accident) and which disables the behavior 
    where CKEditor 4 would automatically attach itself to unrelated HTML elements 
    with a contenteditable attribute (see CKEDITOR.disableAutoInline in the 
    CKEditor 4 docs).
- CVE-2024-24815: Fixed bypass of Advanced Content Filtering mechanism (boo#1219720)

- update to 6.7.1:
  * Add Python 3.12, Django 5.0
  * Silence the CKEditor version check/nag but include a system check warning

- update to 6.7.0:
  * Dark mode fixes.
  * Added support for Pillow 10.

- update to 6.6.1:
  * Required a newer version of django-js-asset which actually works
    with Django 4.1.
  * CKEditor 4.21.0
  * Fixed the CKEditor styles when used with the dark Django admin theme.

- update to 6.5.1:
  * Avoided calling ``static()`` if ``CKEDITOR_BASEPATH`` is defined.
  * Fixed ``./manage.py generateckeditorthumbnails`` to work again after the
    image uploader backend rework.
  * CKEditor 4.19.1
  * Stopped calling ``static()`` during application startup.
  * Added Django 4.1
  * Changed the context for the widget to deviate less from Django. Removed a
  * few template variables which are not used in the bundled
  * ``ckeditor/widget.html`` template. This only affects you if you are using a
  * customized widget or widget template.
  * Dropped support for Python &lt; 3.8, Django &lt; 3.2.
  * Added a pre-commit configuration.
  * Added a GitHub action for running tests.
  * Made selenium tests require opt in using a ``SELENIUM=firefox`` or
    ``SELENIUM=chromium`` environment variable.
  * Made it possible to override the CKEditor template in the widget class.
  * Changed ``CKEDITOR_IMAGE_BACKEND`` to require dotted module paths (the old
    identifiers are still supported for now).
		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219720">SUSE bug 1219720</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-24815/">CVE-2024-24815 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24815">CVE-2024-24815 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959152" comment="python311-django-ckeditor-6.7.2-bp155.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4135" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1201103" ref_url="https://bugzilla.suse.com/1201103" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24805" ref_url="https://www.suse.com/security/cve/CVE-2022-24805/" source="CVE"/>
		<reference ref_id="CVE-2022-24806" ref_url="https://www.suse.com/security/cve/CVE-2022-24806/" source="CVE"/>
		<reference ref_id="CVE-2022-24807" ref_url="https://www.suse.com/security/cve/CVE-2022-24807/" source="CVE"/>
		<reference ref_id="CVE-2022-24808" ref_url="https://www.suse.com/security/cve/CVE-2022-24808/" source="CVE"/>
		<reference ref_id="CVE-2022-24809" ref_url="https://www.suse.com/security/cve/CVE-2022-24809/" source="CVE"/>
		<reference ref_id="CVE-2022-24810" ref_url="https://www.suse.com/security/cve/CVE-2022-24810/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:4205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013097.html" source="SUSE-SU"/>
		<description>
This update for net-snmp fixes the following issues:

  Updated to version 5.9.3 (bsc#1201103, jsc#SLE-11203):

  - CVE-2022-24805: Fixed a buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB that can cause an out-of-bounds memory access.
  - CVE-2022-24809: Fixed a malformed OID in a GET-NEXT to the nsVacmAccessTable that can cause a NULL pointer dereference.
  - CVE-2022-24806: Fixed an improper Input Validation when SETing malformed OIDs in master agent and subagent simultaneously.
  - CVE-2022-24807: Fixed a malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an out-of-bounds memory access.
  - CVE-2022-24808: Fixed a malformed OID in a SET request to NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference.
  - CVE-2022-24810: Fixed a malformed OID in a SET to the nsVacmAccessTable can cause a NULL pointer dereference.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-11-23"/>
	<updated date="2022-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201103">SUSE bug 1201103</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24805/">CVE-2022-24805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24805">CVE-2022-24805 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24806/">CVE-2022-24806 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24806">CVE-2022-24806 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24807/">CVE-2022-24807 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24807">CVE-2022-24807 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24808/">CVE-2022-24808 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24808">CVE-2022-24808 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24809/">CVE-2022-24809 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24809">CVE-2022-24809 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24810/">CVE-2022-24810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-24810">CVE-2022-24810 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009717344" comment="net-snmp-5.9.3-150300.15.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717345" comment="net-snmp-devel-5.9.3-150300.15.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717468" comment="net-snmp-devel-32bit-5.9.3-150300.15.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717346" comment="perl-SNMP-5.9.3-150300.15.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717469" comment="python3-net-snmp-5.9.3-150300.15.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009717347" comment="snmp-mibs-5.9.3-150300.15.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4136" version="1" class="patch">
	<metadata>
		<title>Security update for netty, netty-tcnative (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1199338" ref_url="https://bugzilla.suse.com/1199338" source="BUGZILLA"/>
		<reference ref_id="1206360" ref_url="https://bugzilla.suse.com/1206360" source="BUGZILLA"/>
		<reference ref_id="1206379" ref_url="https://bugzilla.suse.com/1206379" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24823" ref_url="https://www.suse.com/security/cve/CVE-2022-24823/" source="CVE"/>
		<reference ref_id="CVE-2022-41881" ref_url="https://www.suse.com/security/cve/CVE-2022-41881/" source="CVE"/>
		<reference ref_id="CVE-2022-41915" ref_url="https://www.suse.com/security/cve/CVE-2022-41915/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2096-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029968.html" source="SUSE-SU"/>
		<description>
This update for netty, netty-tcnative fixes the following issues:

netty:

- Security fixes included in this version update from 4.1.75 to 4.1.90:
  * CVE-2022-24823: Local Information Disclosure Vulnerability in Netty on Unix-Like systems due temporary files for
    Java 6 and lower in io.netty:netty-codec-http (bsc#1199338)
  * CVE-2022-41881: HAProxyMessageDecoder Stack Exhaustion DoS (bsc#1206360)
  * CVE-2022-41915: HTTP Response splitting from assigning header value iterator (bsc#1206379)
    
- Other non-security bug fixes included in this version update from 4.1.75 to 4.1.90:
  * Build with Java 11 on ix86 architecture in order to avoid build failures 
  * Fix `HttpHeaders.names` for non-String headers
  * Fix `FlowControlHandler` behaviour to pass read events when auto-reading is turned off
  * Fix brotli compression
  * Fix a bug in FlowControlHandler that broke auto-read
  * Fix a potential memory leak bug has been in the pooled allocator
  * Fix a scalability issue caused by instanceof and check-cast checks that lead to false-sharing on the 
    `Klass::secondary_super_cache` field in the JVM
  * Fix a bug in our `PEMParser` when PEM files have multiple objects, and `BouncyCastle` is on the classpath
  * Fix several `NullPointerException` bugs
  * Fix a regression `SslContext` private key loading
  * Fix a bug in `SslContext` private key reading fall-back path
  * Fix a buffer leak regression in `HttpClientCodec`
  * Fix a bug where some `HttpMessage` implementations, that also implement `HttpContent`, were not handled correctly
  * Fix epoll bug when receiving zero-sized datagrams
  * Fix a bug in `SslHandler` so `handlerRemoved` works properly even if `handlerAdded` throws an exception
  * Fix an issue that allowed the multicast methods on `EpollDatagramChannel` to be called outside of an event-loop 
    thread
  * Fix a bug where an OPT record was added to DNS queries that already had such a record
  * Fix a bug that caused an error when files uploaded with HTTP POST contained a backslash in their name
  * Fix an issue in the `BlockHound` integration that could occasionally cause NetUtil to be reported as performing
    blocking operation. A similar `BlockHound` issue was fixed for the `JdkSslContext`
  * Fix a bug that prevented preface or settings frames from being flushed, when an HTTP2 connection was established
    with prior-knowledge
  * Fix a bug where Netty fails to load a shaded native library
  * Fix and relax overly strict HTTP/2 header validation check that was rejecting requests from Chrome and Firefox
  * Fix OpenSSL and BoringSSL implementations to respect the `jdk.tls.client.protocols` and `jdk.tls.server.protocols`
    system properties, making them react to these in the same way the JDK SSL provider does
  * Fix inconsitencies in how `epoll`, `kqueue`, and `NIO` handle RDHUP
  * For a more detailed list of changes please consult the official release notes:
    +  Changes from 4.1.90: https://netty.io/news/2023/03/14/4-1-90-Final.html
    +  Changes from 4.1.89: https://netty.io/news/2023/02/13/4-1-89-Final.html
    +  Changes from 4.1.88: https://netty.io/news/2023/02/12/4-1-88-Final.html
    +  Changes from 4.1.87: https://netty.io/news/2023/01/12/4-1-87-Final.html
    +  Changes from 4.1.86: https://netty.io/news/2022/12/12/4-1-86-Final.html
    +  Changes from 4.1.85: https://netty.io/news/2022/11/09/4-1-85-Final.html
    +  Changes from 4.1.84: https://netty.io/news/2022/10/11/4-1-84-Final.html
    +  Changes from 4.1.82: https://netty.io/news/2022/09/13/4-1-82-Final.html
    +  Changes from 4.1.81: https://netty.io/news/2022/09/08/4-1-81-Final.html
    +  Changes from 4.1.80: https://netty.io/news/2022/08/26/4-1-80-Final.html
    +  Changes from 4.1.79: https://netty.io/news/2022/07/11/4-1-79-Final.html
    +  Changes from 4.1.78: https://netty.io/news/2022/06/14/4-1-78-Final.html
    +  Changes from 4.1.77: https://netty.io/news/2022/05/06/2-1-77-Final.html
    +  Changes from 4.1.76: https://netty.io/news/2022/04/12/4-1-76-Final.html

netty-tcnative:
    
- New artifact named `netty-tcnative-classes`, provided by this update is required by netty 4.1.90 which contains 
  important security updates
- No formal changelog present. This artifact is closely bound to the netty releases
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-21"/>
	<updated date="2023-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199338">SUSE bug 1199338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206360">SUSE bug 1206360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206379">SUSE bug 1206379</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24823/">CVE-2022-24823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24823">CVE-2022-24823 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41881/">CVE-2022-41881 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41881">CVE-2022-41881 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-41915/">CVE-2022-41915 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41915">CVE-2022-41915 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009755110" comment="netty-4.1.90-150200.4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755111" comment="netty-javadoc-4.1.90-150200.4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755112" comment="netty-poms-4.1.90-150200.4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755113" comment="netty-tcnative-2.0.59-150200.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009755114" comment="netty-tcnative-javadoc-2.0.59-150200.3.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4137" version="1" class="patch">
	<metadata>
		<title>Security update for libheif (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211174" ref_url="https://bugzilla.suse.com/1211174" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-29659" ref_url="https://www.suse.com/security/cve/CVE-2023-29659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2223-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015519.html" source="SUSE-SU"/>
		<description>
This update for libheif fixes the following issues:

- CVE-2023-29659: Fixed segfault caused by divide-by-zero (bsc#1211174).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-18"/>
	<updated date="2023-07-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211174">SUSE bug 1211174</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29659/">CVE-2023-29659 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29659">CVE-2023-29659 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009757067" comment="gdk-pixbuf-loader-libheif-1.12.0-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757068" comment="libheif-devel-1.12.0-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757069" comment="libheif1-1.12.0-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757070" comment="libheif1-32bit-1.12.0-150400.3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4138" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211230" ref_url="https://bugzilla.suse.com/1211230" source="BUGZILLA"/>
		<reference ref_id="1211231" ref_url="https://bugzilla.suse.com/1211231" source="BUGZILLA"/>
		<reference ref_id="1211232" ref_url="https://bugzilla.suse.com/1211232" source="BUGZILLA"/>
		<reference ref_id="1211233" ref_url="https://bugzilla.suse.com/1211233" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28319" ref_url="https://www.suse.com/security/cve/CVE-2023-28319/" source="CVE"/>
		<reference ref_id="CVE-2023-28320" ref_url="https://www.suse.com/security/cve/CVE-2023-28320/" source="CVE"/>
		<reference ref_id="CVE-2023-28321" ref_url="https://www.suse.com/security/cve/CVE-2023-28321/" source="CVE"/>
		<reference ref_id="CVE-2023-28322" ref_url="https://www.suse.com/security/cve/CVE-2023-28322/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2224-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015260.html" source="SUSE-SU"/>
		<description>
This update for curl adds the following feature:

Update to version 8.0.1 (jsc#PED-2580)

- CVE-2023-28319: use-after-free in SSH sha256 fingerprint check (bsc#1211230).
- CVE-2023-28320: siglongjmp race condition (bsc#1211231).
- CVE-2023-28321: IDN wildcard matching (bsc#1211232).
- CVE-2023-28322: POST-after-PUT confusion (bsc#1211233).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-21"/>
	<updated date="2023-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211230">SUSE bug 1211230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211231">SUSE bug 1211231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211232">SUSE bug 1211232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211233">SUSE bug 1211233</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28319/">CVE-2023-28319 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28319">CVE-2023-28319 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28320/">CVE-2023-28320 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28320">CVE-2023-28320 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28321/">CVE-2023-28321 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28321">CVE-2023-28321 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28322/">CVE-2023-28322 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28322">CVE-2023-28322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009758942" comment="curl-8.0.1-150400.5.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758943" comment="libcurl-devel-8.0.1-150400.5.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758944" comment="libcurl-devel-32bit-8.0.1-150400.5.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758945" comment="libcurl4-8.0.1-150400.5.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758946" comment="libcurl4-32bit-8.0.1-150400.5.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4139" version="1" class="patch">
	<metadata>
		<title>Security update for cups-filters (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211340" ref_url="https://bugzilla.suse.com/1211340" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-24805" ref_url="https://www.suse.com/security/cve/CVE-2023-24805/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2233-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015529.html" source="SUSE-SU"/>
		<description>
This update for cups-filters fixes the following issues:

- CVE-2023-24805: Fixed a remote code execution in the beh backend (bsc#1211340).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-19"/>
	<updated date="2023-07-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211340">SUSE bug 1211340</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-24805/">CVE-2023-24805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24805">CVE-2023-24805 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009758947" comment="cups-filters-1.25.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758948" comment="cups-filters-devel-1.25.0-150200.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4140" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210628" ref_url="https://bugzilla.suse.com/1210628" source="BUGZILLA"/>
		<reference ref_id="1210631" ref_url="https://bugzilla.suse.com/1210631" source="BUGZILLA"/>
		<reference ref_id="1210632" ref_url="https://bugzilla.suse.com/1210632" source="BUGZILLA"/>
		<reference ref_id="1210634" ref_url="https://bugzilla.suse.com/1210634" source="BUGZILLA"/>
		<reference ref_id="1210635" ref_url="https://bugzilla.suse.com/1210635" source="BUGZILLA"/>
		<reference ref_id="1210636" ref_url="https://bugzilla.suse.com/1210636" source="BUGZILLA"/>
		<reference ref_id="1210637" ref_url="https://bugzilla.suse.com/1210637" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-21930" ref_url="https://www.suse.com/security/cve/CVE-2023-21930/" source="CVE"/>
		<reference ref_id="CVE-2023-21937" ref_url="https://www.suse.com/security/cve/CVE-2023-21937/" source="CVE"/>
		<reference ref_id="CVE-2023-21938" ref_url="https://www.suse.com/security/cve/CVE-2023-21938/" source="CVE"/>
		<reference ref_id="CVE-2023-21939" ref_url="https://www.suse.com/security/cve/CVE-2023-21939/" source="CVE"/>
		<reference ref_id="CVE-2023-21954" ref_url="https://www.suse.com/security/cve/CVE-2023-21954/" source="CVE"/>
		<reference ref_id="CVE-2023-21967" ref_url="https://www.suse.com/security/cve/CVE-2023-21967/" source="CVE"/>
		<reference ref_id="CVE-2023-21968" ref_url="https://www.suse.com/security/cve/CVE-2023-21968/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2242-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030018.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Updated to version jdk8u372 (icedtea-3.27.0):
    - CVE-2023-21930: Fixed an issue in the JSSE component that could
      allow an attacker to access critical data without authorization
      (bsc#1210628).
    - CVE-2023-21937: Fixed an issue in the Networking component that
      could allow an attacker to update, insert or delete some data
      without authorization (bsc#1210631).
    - CVE-2023-21938: Fixed an issue in the Libraries component that
      could allow an attacker to update, insert or delete some data
      without authorization (bsc#1210632).
    - CVE-2023-21939: Fixed an issue in the Swing component that could
      allow an attacker to update, insert or delete some data without
      authorization (bsc#1210634).
    - CVE-2023-21954: Fixed an issue in the Hotspot component that
      could allow an attacker to access critical data without
      authorization (bsc#1210635).
    - CVE-2023-21967: Fixed an issue in the JSSE component that could
      allow an attacker to cause a hang or frequently repeatable
      crash without authorization (bsc#1210636).
    - CVE-2023-21968: Fixed an issue in the Libraries component that
      could allow an attacker to update, insert or delete some data
      without authorization (bsc#1210637).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-23"/>
	<updated date="2023-06-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210628">SUSE bug 1210628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210631">SUSE bug 1210631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210632">SUSE bug 1210632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210634">SUSE bug 1210634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210635">SUSE bug 1210635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210636">SUSE bug 1210636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210637">SUSE bug 1210637</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-21930/">CVE-2023-21930 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21930">CVE-2023-21930 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21937/">CVE-2023-21937 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21937">CVE-2023-21937 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21938/">CVE-2023-21938 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21938">CVE-2023-21938 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21939/">CVE-2023-21939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21939">CVE-2023-21939 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-21954/">CVE-2023-21954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21954">CVE-2023-21954 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-21967/">CVE-2023-21967 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21967">CVE-2023-21967 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21968/">CVE-2023-21968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21968">CVE-2023-21968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009756453" comment="java-1_8_0-openjdk-1.8.0.372-150000.3.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756454" comment="java-1_8_0-openjdk-accessibility-1.8.0.372-150000.3.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756455" comment="java-1_8_0-openjdk-demo-1.8.0.372-150000.3.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756456" comment="java-1_8_0-openjdk-devel-1.8.0.372-150000.3.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756457" comment="java-1_8_0-openjdk-headless-1.8.0.372-150000.3.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756458" comment="java-1_8_0-openjdk-javadoc-1.8.0.372-150000.3.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009756459" comment="java-1_8_0-openjdk-src-1.8.0.372-150000.3.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4141" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1208479" ref_url="https://bugzilla.suse.com/1208479" source="BUGZILLA"/>
		<reference ref_id="1211382" ref_url="https://bugzilla.suse.com/1211382" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-33972" ref_url="https://www.suse.com/security/cve/CVE-2022-33972/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2243-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015514.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to Intel CPU Microcode 20230512 release. (bsc#1211382).
- New platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | ADL-N          | A0       | 06-be-00/01 |          | 00000010 | Core i3-N305/N300, N50/N97/N100/N200, Atom x7211E/x7213E/x7425E
  | AZB            | A0       | 06-9a-04/40 |          | 00000004 | Intel(R) Atom(R) C1100
  | AZB            | R0       | 06-9a-04/40 |          | 00000004 | Intel(R) Atom(R) C1100
- Updated Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | ADL            | L0       | 06-9a-03/80 | 00000429 | 0000042a | Core Gen12
  | ADL            | L0       | 06-9a-04/80 | 00000429 | 0000042a | Core Gen12
  | AML-Y22        | H0       | 06-8e-09/10 |          | 000000f2 | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000f4 | 000000f6 | Core Gen10 Mobile
  | CFL-H          | R0       | 06-9e-0d/22 | 000000f4 | 000000f8 | Core Gen9 Mobile
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000f0 | 000000f2 | Core Gen9
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000f0 | 000000f2 | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000f0 | 000000f2 | Core Gen8
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000f0 | 000000f2 | Core Gen8 Mobile
  | CLX-SP         | B0       | 06-55-06/bf | 04003303 | 04003501 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05003303 | 05003501 | Xeon Scalable Gen2
  | CML-H          | R1       | 06-a5-02/20 | 000000f4 | 000000f6 | Core Gen10 Mobile
  | CML-S102       | Q0       | 06-a5-05/22 | 000000f4 | 000000f6 | Core Gen10
  | CML-S62        | G1       | 06-a5-03/22 | 000000f4 | 000000f6 | Core Gen10
  | CML-U62 V1     | A0       | 06-a6-00/80 | 000000f4 | 000000f6 | Core Gen10 Mobile
  | CML-U62 V2     | K1       | 06-a6-01/80 | 000000f4 | 000000f6 | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000f4 | 000000f6 | Core Gen10 Mobile
  | CPX-SP         | A1       | 06-55-0b/bf | 07002503 | 07002601 | Xeon Scalable Gen3
  | ICL-D          | B0       | 06-6c-01/10 | 01000211 | 01000230 | Xeon D-17xx, D-27xx
  | ICL-U/Y        | D1       | 06-7e-05/80 | 000000b8 | 000000ba | Core Gen10 Mobile
  | ICX-SP         | D0       | 06-6a-06/87 | 0d000389 | 0d000390 | Xeon Scalable Gen3
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000f0 | 000000f2 | Core Gen7; Xeon E3 v6
  | KBL-U/Y        | H0       | 06-8e-09/c0 |          | 000000f2 | Core Gen7 Mobile
  | LKF            | B2/B3    | 06-8a-01/10 | 00000032 | 00000033 | Core w/Hybrid Technology
  | RKL-S          | B0       | 06-a7-01/02 | 00000057 | 00000058 | Core Gen11
  | RPL-H 6+8      | J0       | 06-ba-02/07 | 0000410e | 00004112 | Core Gen13
  | RPL-P 6+8      | J0       | 06-ba-02/07 | 0000410e | 00004112 | Core Gen13
  | RPL-S          | S0       | 06-b7-01/32 | 00000112 | 00000113 | Core Gen13
  | RPL-U 2+8      | Q0       | 06-ba-03/07 | 0000410e | 00004112 | Core Gen13
  | SKX-D          | H0       | 06-55-04/b7 |          | 02006f05 | Xeon D-21xx
  | SKX-SP         | B1       | 06-55-03/97 | 01000161 | 01000171 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 |          | 02006f05 | Xeon Scalable
  | SPR-HBM        | B3       | 06-8f-08/10 | 2c000170 | 2c0001d1 | Xeon Max
  | SPR-SP         | E0       | 06-8f-04/87 | 2b000181 | 2b000461 | Xeon Scalable Gen4
  | SPR-SP         | E2       | 06-8f-05/87 | 2b000181 | 2b000461 | Xeon Scalable Gen4
  | SPR-SP         | E3       | 06-8f-06/87 | 2b000181 | 2b000461 | Xeon Scalable Gen4
  | SPR-SP         | E4       | 06-8f-07/87 | 2b000181 | 2b000461 | Xeon Scalable Gen4
  | SPR-SP         | E5       | 06-8f-08/87 | 2b000181 | 2b000461 | Xeon Scalable Gen4
  | SPR-SP         | S2       | 06-8f-07/87 | 2b000181 | 2b000461 | Xeon Scalable Gen4
  | SPR-SP         | S3       | 06-8f-08/87 | 2b000181 | 2b000461 | Xeon Scalable Gen4
  | TGL            | B1       | 06-8c-01/80 | 000000a6 | 000000aa | Core Gen11 Mobile
  | TGL-H          | R0       | 06-8d-01/c2 | 00000042 | 00000044 | Core Gen11 Mobile
  | TGL-R          | C0       | 06-8c-02/c2 | 00000028 | 0000002a | Core Gen11 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000f4 | 000000f6 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 |          | 000000f2 | Core Gen8 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-17"/>
	<updated date="2023-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208479">SUSE bug 1208479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211382">SUSE bug 1211382</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-33972/">CVE-2022-33972 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33972">CVE-2022-33972 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758961" comment="ucode-intel-20230512-150200.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4142" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206580" ref_url="https://bugzilla.suse.com/1206580" source="BUGZILLA"/>
		<reference ref_id="1206581" ref_url="https://bugzilla.suse.com/1206581" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4337" ref_url="https://www.suse.com/security/cve/CVE-2022-4337/" source="CVE"/>
		<reference ref_id="CVE-2022-4338" ref_url="https://www.suse.com/security/cve/CVE-2022-4338/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2250-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015513.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:

- CVE-2022-4338: Fixed Integer Underflow in Organization Specific TLV (bsc#1206580).
- CVE-2022-4337: Fixed Out-of-Bounds Read in Organization Specific TLV (bsc#1206581).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-17"/>
	<updated date="2023-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206580">SUSE bug 1206580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206581">SUSE bug 1206581</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-4337/">CVE-2022-4337 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4337">CVE-2022-4337 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-4338/">CVE-2022-4338 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4338">CVE-2022-4338 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009758962" comment="libopenvswitch-2_14-0-2.14.2-150400.24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758963" comment="libovn-20_06-0-20.06.2-150400.24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758964" comment="openvswitch-2.14.2-150400.24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758965" comment="openvswitch-devel-2.14.2-150400.24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758966" comment="openvswitch-doc-2.14.2-150400.24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758967" comment="openvswitch-ipsec-2.14.2-150400.24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758968" comment="openvswitch-pki-2.14.2-150400.24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758969" comment="openvswitch-test-2.14.2-150400.24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758970" comment="openvswitch-vtep-2.14.2-150400.24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758971" comment="ovn-20.06.2-150400.24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758972" comment="ovn-central-20.06.2-150400.24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758973" comment="ovn-devel-20.06.2-150400.24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758974" comment="ovn-doc-20.06.2-150400.24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758975" comment="ovn-docker-20.06.2-150400.24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758976" comment="ovn-host-20.06.2-150400.24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758977" comment="ovn-vtep-20.06.2-150400.24.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758978" comment="python3-ovs-2.14.2-150400.24.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4143" version="1" class="patch">
	<metadata>
		<title>Security update for terraform-provider-aws (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1200441" ref_url="https://bugzilla.suse.com/1200441" source="BUGZILLA"/>
		<reference ref_id="1209658" ref_url="https://bugzilla.suse.com/1209658" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2253-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029970.html" source="SUSE-SU"/>
		<description>

This update of terraform-provider-aws fixes the following issues:

- rebuild the package with the go 1.19 security release (bsc#1200441 bsc#1209658).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-21"/>
	<updated date="2023-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200441">SUSE bug 1200441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209658">SUSE bug 1209658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757058" comment="terraform-provider-aws-3.11.0-150200.6.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4144" version="1" class="patch">
	<metadata>
		<title>Security update for terraform-provider-null (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1200441" ref_url="https://bugzilla.suse.com/1200441" source="BUGZILLA"/>
		<reference ref_id="1209658" ref_url="https://bugzilla.suse.com/1209658" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2261-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029969.html" source="SUSE-SU"/>
		<description>

This update of terraform-provider-null fixes the following issues:

- rebuild the package with the go 1.19 security release (bsc#1200441 bsc#1209658).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-21"/>
	<updated date="2023-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200441">SUSE bug 1200441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209658">SUSE bug 1209658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757059" comment="terraform-provider-null-3.0.0-150200.6.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4145" version="1" class="patch">
	<metadata>
		<title>Security update for python-Flask (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211246" ref_url="https://bugzilla.suse.com/1211246" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-30861" ref_url="https://www.suse.com/security/cve/CVE-2023-30861/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2263-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030433.html" source="SUSE-SU"/>
		<description>
This update for python-Flask fixes the following issues:

- CVE-2023-30861: Fixed a potential cookie confusion due to incorrect
  caching (bsc#1211246).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-20"/>
	<updated date="2023-07-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211246">SUSE bug 1211246</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-30861/">CVE-2023-30861 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30861">CVE-2023-30861 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009757420" comment="python3-Flask-1.0.4-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757421" comment="python3-Flask-doc-1.0.4-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4146" version="1" class="patch">
	<metadata>
		<title>Security update for geoipupdate (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1200441" ref_url="https://bugzilla.suse.com/1200441" source="BUGZILLA"/>
		<reference ref_id="1209658" ref_url="https://bugzilla.suse.com/1209658" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2273-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029962.html" source="SUSE-SU"/>
		<description>

This update of geoipupdate fixes the following issues:

- rebuild the package with the go 1.19 security release (bsc#1200441 bsc#1209658).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-21"/>
	<updated date="2023-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200441">SUSE bug 1200441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209658">SUSE bug 1209658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009757060" comment="geoipupdate-4.2.2-150000.1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757061" comment="geoipupdate-legacy-4.2.2-150000.1.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4147" version="1" class="patch">
	<metadata>
		<title>Security update for texlive (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211389" ref_url="https://bugzilla.suse.com/1211389" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32700" ref_url="https://www.suse.com/security/cve/CVE-2023-32700/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2284-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030432.html" source="SUSE-SU"/>
		<description>
This update for texlive fixes the following issues:

- CVE-2023-32700: Fixed arbitrary code execution in LuaTeX (bsc#1211389).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-20"/>
	<updated date="2023-07-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211389">SUSE bug 1211389</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32700/">CVE-2023-32700 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32700">CVE-2023-32700 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009758258" comment="libkpathsea6-6.3.3-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758259" comment="libptexenc1-1.3.9-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758260" comment="libsynctex2-1.21-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758261" comment="libtexlua53-5-5.3.6-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758262" comment="libtexluajit2-2.1.0beta3-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758263" comment="perl-biber-2021.20210325.svn30357-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758264" comment="texlive-2021.20210325-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758265" comment="texlive-a2ping-bin-2021.20210325.svn27321-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758266" comment="texlive-accfonts-bin-2021.20210325.svn12688-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758267" comment="texlive-adhocfilelist-bin-2021.20210325.svn28038-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758268" comment="texlive-afm2pl-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758269" comment="texlive-albatross-bin-2021.20210325.svn57089-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758270" comment="texlive-aleph-bin-2021.20210325.svn58378-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758271" comment="texlive-amstex-bin-2021.20210325.svn3006-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758272" comment="texlive-arara-bin-2021.20210325.svn29036-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758273" comment="texlive-asymptote-bin-2021.20210325.svn57890-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758274" comment="texlive-attachfile2-bin-2021.20210325.svn52909-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758275" comment="texlive-authorindex-bin-2021.20210325.svn18790-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758276" comment="texlive-autosp-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758277" comment="texlive-axodraw2-bin-2021.20210325.svn58378-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758278" comment="texlive-bib2gls-bin-2021.20210325.svn45266-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758279" comment="texlive-biber-bin-2021.20210325.svn57273-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758280" comment="texlive-bibexport-bin-2021.20210325.svn16219-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758281" comment="texlive-bibtex-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758282" comment="texlive-bibtex8-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758283" comment="texlive-bibtexu-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758284" comment="texlive-bin-devel-2021.20210325-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758285" comment="texlive-bundledoc-bin-2021.20210325.svn17794-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758286" comment="texlive-cachepic-bin-2021.20210325.svn15543-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758287" comment="texlive-checkcites-bin-2021.20210325.svn25623-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758288" comment="texlive-checklistings-bin-2021.20210325.svn38300-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758289" comment="texlive-chklref-bin-2021.20210325.svn52631-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758290" comment="texlive-chktex-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758291" comment="texlive-cjk-gs-integrate-bin-2021.20210325.svn37223-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758292" comment="texlive-cjkutils-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758293" comment="texlive-clojure-pamphlet-bin-2021.20210325.svn51944-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758294" comment="texlive-cluttex-bin-2021.20210325.svn48871-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758295" comment="texlive-context-bin-2021.20210325.svn34112-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758296" comment="texlive-convbkmk-bin-2021.20210325.svn30408-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758297" comment="texlive-crossrefware-bin-2021.20210325.svn45927-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758298" comment="texlive-cslatex-bin-2021.20210325.svn3006-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758299" comment="texlive-csplain-bin-2021.20210325.svn50528-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758300" comment="texlive-ctan-o-mat-bin-2021.20210325.svn46996-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758301" comment="texlive-ctanbib-bin-2021.20210325.svn48478-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758302" comment="texlive-ctanify-bin-2021.20210325.svn24061-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758303" comment="texlive-ctanupload-bin-2021.20210325.svn23866-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758304" comment="texlive-ctie-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758305" comment="texlive-cweb-bin-2021.20210325.svn58136-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758306" comment="texlive-cyrillic-bin-bin-2021.20210325.svn53554-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758307" comment="texlive-de-macro-bin-2021.20210325.svn17399-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758308" comment="texlive-detex-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758309" comment="texlive-diadia-bin-2021.20210325.svn37645-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758310" comment="texlive-dosepsbin-bin-2021.20210325.svn24759-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758311" comment="texlive-dtl-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758312" comment="texlive-dtxgen-bin-2021.20210325.svn29031-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758313" comment="texlive-dviasm-bin-2021.20210325.svn8329-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758314" comment="texlive-dvicopy-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758315" comment="texlive-dvidvi-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758316" comment="texlive-dviinfox-bin-2021.20210325.svn44515-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758317" comment="texlive-dviljk-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758318" comment="texlive-dviout-util-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758319" comment="texlive-dvipdfmx-bin-2021.20210325.svn58535-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758320" comment="texlive-dvipng-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758321" comment="texlive-dvipos-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758322" comment="texlive-dvips-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758323" comment="texlive-dvisvgm-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758324" comment="texlive-eplain-bin-2021.20210325.svn3006-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758325" comment="texlive-epspdf-bin-2021.20210325.svn29050-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758326" comment="texlive-epstopdf-bin-2021.20210325.svn18336-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758327" comment="texlive-exceltex-bin-2021.20210325.svn25860-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758328" comment="texlive-fig4latex-bin-2021.20210325.svn14752-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758329" comment="texlive-findhyph-bin-2021.20210325.svn14758-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758330" comment="texlive-fontinst-bin-2021.20210325.svn53554-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758331" comment="texlive-fontools-bin-2021.20210325.svn25997-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758332" comment="texlive-fontware-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758333" comment="texlive-fragmaster-bin-2021.20210325.svn13663-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758334" comment="texlive-getmap-bin-2021.20210325.svn34971-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758335" comment="texlive-git-latexdiff-bin-2021.20210325.svn54732-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758336" comment="texlive-glossaries-bin-2021.20210325.svn37813-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758337" comment="texlive-gregoriotex-bin-2021.20210325.svn58378-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758338" comment="texlive-gsftopk-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758339" comment="texlive-hyperxmp-bin-2021.20210325.svn56984-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758340" comment="texlive-jadetex-bin-2021.20210325.svn3006-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758341" comment="texlive-jfmutil-bin-2021.20210325.svn44835-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758342" comment="texlive-ketcindy-bin-2021.20210325.svn49033-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758343" comment="texlive-kotex-utils-bin-2021.20210325.svn32101-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758344" comment="texlive-kpathsea-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758345" comment="texlive-kpathsea-devel-6.3.3-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758346" comment="texlive-l3build-bin-2021.20210325.svn46894-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758347" comment="texlive-lacheck-bin-2021.20210325.svn53999-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758348" comment="texlive-latex-bin-bin-2021.20210325.svn54358-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758349" comment="texlive-latex-bin-dev-bin-2021.20210325.svn53999-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758350" comment="texlive-latex-git-log-bin-2021.20210325.svn30983-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758351" comment="texlive-latex-papersize-bin-2021.20210325.svn42296-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758352" comment="texlive-latex2man-bin-2021.20210325.svn13663-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758353" comment="texlive-latex2nemeth-bin-2021.20210325.svn42300-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758354" comment="texlive-latexdiff-bin-2021.20210325.svn16420-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758355" comment="texlive-latexfileversion-bin-2021.20210325.svn25012-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758356" comment="texlive-latexindent-bin-2021.20210325.svn32150-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758357" comment="texlive-latexmk-bin-2021.20210325.svn10937-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758358" comment="texlive-latexpand-bin-2021.20210325.svn27025-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758359" comment="texlive-lcdftypetools-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758360" comment="texlive-light-latex-make-bin-2021.20210325.svn56352-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758361" comment="texlive-lilyglyphs-bin-2021.20210325.svn31696-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758362" comment="texlive-listbib-bin-2021.20210325.svn26126-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758363" comment="texlive-listings-ext-bin-2021.20210325.svn15093-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758364" comment="texlive-lollipop-bin-2021.20210325.svn41465-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758365" comment="texlive-ltxfileinfo-bin-2021.20210325.svn29005-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758366" comment="texlive-ltximg-bin-2021.20210325.svn32346-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758367" comment="texlive-luahbtex-bin-2021.20210325.svn58535-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758368" comment="texlive-luajittex-bin-2021.20210325.svn58535-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758369" comment="texlive-luaotfload-bin-2021.20210325.svn34647-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758370" comment="texlive-luatex-bin-2021.20210325.svn58535-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758371" comment="texlive-lwarp-bin-2021.20210325.svn43292-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758372" comment="texlive-m-tx-bin-2021.20210325.svn50281-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758373" comment="texlive-make4ht-bin-2021.20210325.svn37750-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758374" comment="texlive-makedtx-bin-2021.20210325.svn38769-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758375" comment="texlive-makeindex-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758376" comment="texlive-match_parens-bin-2021.20210325.svn23500-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758377" comment="texlive-mathspic-bin-2021.20210325.svn23661-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758378" comment="texlive-metafont-bin-2021.20210325.svn58378-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758379" comment="texlive-metapost-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758380" comment="texlive-mex-bin-2021.20210325.svn3006-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758381" comment="texlive-mf2pt1-bin-2021.20210325.svn23406-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758382" comment="texlive-mflua-bin-2021.20210325.svn58535-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758383" comment="texlive-mfware-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758384" comment="texlive-mkgrkindex-bin-2021.20210325.svn14428-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758385" comment="texlive-mkjobtexmf-bin-2021.20210325.svn8457-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758386" comment="texlive-mkpic-bin-2021.20210325.svn33688-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758387" comment="texlive-mltex-bin-2021.20210325.svn3006-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758388" comment="texlive-mptopdf-bin-2021.20210325.svn18674-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758389" comment="texlive-multibibliography-bin-2021.20210325.svn30534-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758390" comment="texlive-musixtex-bin-2021.20210325.svn37026-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758391" comment="texlive-musixtnt-bin-2021.20210325.svn50281-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758392" comment="texlive-omegaware-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758393" comment="texlive-optex-bin-2021.20210325.svn53804-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758394" comment="texlive-patgen-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758395" comment="texlive-pax-bin-2021.20210325.svn10843-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758396" comment="texlive-pdfbook2-bin-2021.20210325.svn37537-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758397" comment="texlive-pdfcrop-bin-2021.20210325.svn14387-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758398" comment="texlive-pdfjam-bin-2021.20210325.svn52858-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758399" comment="texlive-pdflatexpicscale-bin-2021.20210325.svn41779-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758400" comment="texlive-pdftex-bin-2021.20210325.svn58535-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758401" comment="texlive-pdftex-quiet-bin-2021.20210325.svn49140-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758402" comment="texlive-pdftosrc-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758403" comment="texlive-pdfxup-bin-2021.20210325.svn40690-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758404" comment="texlive-pedigree-perl-bin-2021.20210325.svn25962-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758405" comment="texlive-perltex-bin-2021.20210325.svn16181-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758406" comment="texlive-petri-nets-bin-2021.20210325.svn39165-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758407" comment="texlive-pfarrei-bin-2021.20210325.svn29348-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758408" comment="texlive-pkfix-bin-2021.20210325.svn13364-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758409" comment="texlive-pkfix-helper-bin-2021.20210325.svn13663-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758410" comment="texlive-platex-bin-2021.20210325.svn52800-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758411" comment="texlive-pmx-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758412" comment="texlive-pmxchords-bin-2021.20210325.svn32405-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758413" comment="texlive-ps2eps-bin-2021.20210325.svn50281-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758414" comment="texlive-ps2pk-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758415" comment="texlive-pst-pdf-bin-2021.20210325.svn7838-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758416" comment="texlive-pst2pdf-bin-2021.20210325.svn29333-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758417" comment="texlive-ptex-bin-2021.20210325.svn58378-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758418" comment="texlive-ptex-fontmaps-bin-2021.20210325.svn44206-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758419" comment="texlive-ptex2pdf-bin-2021.20210325.svn29335-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758420" comment="texlive-ptexenc-devel-1.3.9-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758421" comment="texlive-purifyeps-bin-2021.20210325.svn13663-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758422" comment="texlive-pygmentex-bin-2021.20210325.svn34996-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758423" comment="texlive-pythontex-bin-2021.20210325.svn31638-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758424" comment="texlive-rubik-bin-2021.20210325.svn32919-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758425" comment="texlive-scripts-bin-2021.20210325.svn55172-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758426" comment="texlive-scripts-extra-bin-2021.20210325.svn53577-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758427" comment="texlive-seetexk-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758428" comment="texlive-spix-bin-2021.20210325.svn55933-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758429" comment="texlive-splitindex-bin-2021.20210325.svn29688-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758430" comment="texlive-srcredact-bin-2021.20210325.svn38710-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758431" comment="texlive-sty2dtx-bin-2021.20210325.svn21215-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758432" comment="texlive-svn-multi-bin-2021.20210325.svn13663-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758433" comment="texlive-synctex-bin-2021.20210325.svn58136-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758434" comment="texlive-synctex-devel-1.21-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758435" comment="texlive-tex-bin-2021.20210325.svn58378-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758436" comment="texlive-tex4ebook-bin-2021.20210325.svn37771-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758437" comment="texlive-tex4ht-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758438" comment="texlive-texcount-bin-2021.20210325.svn13013-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758439" comment="texlive-texdef-bin-2021.20210325.svn45011-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758440" comment="texlive-texdiff-bin-2021.20210325.svn15506-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758441" comment="texlive-texdirflatten-bin-2021.20210325.svn12782-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758442" comment="texlive-texdoc-bin-2021.20210325.svn47948-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758443" comment="texlive-texdoctk-bin-2021.20210325.svn29741-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758444" comment="texlive-texfot-bin-2021.20210325.svn33155-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758445" comment="texlive-texliveonfly-bin-2021.20210325.svn24062-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758446" comment="texlive-texloganalyser-bin-2021.20210325.svn13663-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758447" comment="texlive-texlua-devel-5.3.6-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758448" comment="texlive-texluajit-devel-2.1.0beta3-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758449" comment="texlive-texosquery-bin-2021.20210325.svn43596-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758450" comment="texlive-texplate-bin-2021.20210325.svn53444-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758451" comment="texlive-texsis-bin-2021.20210325.svn3006-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758452" comment="texlive-texware-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758453" comment="texlive-thumbpdf-bin-2021.20210325.svn6898-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758454" comment="texlive-tie-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758455" comment="texlive-tikztosvg-bin-2021.20210325.svn55132-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758456" comment="texlive-tpic2pdftex-bin-2021.20210325.svn50281-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758457" comment="texlive-ttfutils-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758458" comment="texlive-typeoutfileinfo-bin-2021.20210325.svn25648-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758459" comment="texlive-ulqda-bin-2021.20210325.svn13663-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758460" comment="texlive-uplatex-bin-2021.20210325.svn52800-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758461" comment="texlive-uptex-bin-2021.20210325.svn58378-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758462" comment="texlive-urlbst-bin-2021.20210325.svn23262-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758463" comment="texlive-velthuis-bin-2021.20210325.svn50281-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758464" comment="texlive-vlna-bin-2021.20210325.svn50281-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758465" comment="texlive-vpe-bin-2021.20210325.svn6897-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758466" comment="texlive-web-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758467" comment="texlive-webquiz-bin-2021.20210325.svn50419-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758468" comment="texlive-wordcount-bin-2021.20210325.svn46165-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758469" comment="texlive-xdvi-bin-2021.20210325.svn58378-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758470" comment="texlive-xelatex-dev-bin-2021.20210325.svn53999-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758471" comment="texlive-xetex-bin-2021.20210325.svn58378-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758472" comment="texlive-xindex-bin-2021.20210325.svn49312-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758473" comment="texlive-xml2pmx-bin-2021.20210325.svn57878-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758474" comment="texlive-xmltex-bin-2021.20210325.svn3006-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758475" comment="texlive-xpdfopen-bin-2021.20210325.svn52917-150400.31.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758476" comment="texlive-yplan-bin-2021.20210325.svn34398-150400.31.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4148" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210054" ref_url="https://bugzilla.suse.com/1210054" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1668" ref_url="https://www.suse.com/security/cve/CVE-2023-1668/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2296-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029555.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:

- CVE-2023-1668: Fixed remote traffic denial of service via crafted packets with IP proto 0 (bsc#1210054).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-25"/>
	<updated date="2023-05-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210054">SUSE bug 1210054</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1668/">CVE-2023-1668 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1668">CVE-2023-1668 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009761815" comment="libopenvswitch-2_14-0-2.14.2-150400.24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761816" comment="libovn-20_06-0-20.06.2-150400.24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761817" comment="openvswitch-2.14.2-150400.24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761818" comment="openvswitch-devel-2.14.2-150400.24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761819" comment="openvswitch-doc-2.14.2-150400.24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761820" comment="openvswitch-ipsec-2.14.2-150400.24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761821" comment="openvswitch-pki-2.14.2-150400.24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761822" comment="openvswitch-test-2.14.2-150400.24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761823" comment="openvswitch-vtep-2.14.2-150400.24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761824" comment="ovn-20.06.2-150400.24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761825" comment="ovn-central-20.06.2-150400.24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761826" comment="ovn-devel-20.06.2-150400.24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761827" comment="ovn-doc-20.06.2-150400.24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761828" comment="ovn-docker-20.06.2-150400.24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761829" comment="ovn-host-20.06.2-150400.24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761830" comment="ovn-vtep-20.06.2-150400.24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761831" comment="python3-ovs-2.14.2-150400.24.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4149" version="1" class="patch">
	<metadata>
		<title>Security update for golang-github-vpenso-prometheus_slurm_exporter (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1200441" ref_url="https://bugzilla.suse.com/1200441" source="BUGZILLA"/>
		<reference ref_id="1209658" ref_url="https://bugzilla.suse.com/1209658" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2297-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030021.html" source="SUSE-SU"/>
		<description>

This update of golang-github-vpenso-prometheus_slurm_exporter fixes the following issues:

- rebuild the package with the go 1.19 security release (bsc#1200441 bsc#1209658).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-23"/>
	<updated date="2023-06-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200441">SUSE bug 1200441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209658">SUSE bug 1209658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757062" comment="golang-github-vpenso-prometheus_slurm_exporter-0.19-150300.3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4150" version="1" class="patch">
	<metadata>
		<title>Security update for distribution (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1207705" ref_url="https://bugzilla.suse.com/1207705" source="BUGZILLA"/>
		<reference ref_id="1210428" ref_url="https://bugzilla.suse.com/1210428" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2253" ref_url="https://www.suse.com/security/cve/CVE-2023-2253/" source="CVE"/>
		<description>
This update for distribution fixes the following issues:

Update to verison 2.8.2:

- Revert registry/client: set `Accept: identity` header when getting layers
- Parse `http` forbidden as denied
- Fix CVE-2023-2253 runaway allocation on /v2/_catalog (bsc#1207705)
- Fix panic in inmemory driver
- update to go1.19.9
- Add code to handle pagination of parts. Fixes max layer size of 10GB bug
- Dockerfile: fix filenames of artifacts
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-21"/>
	<updated date="2023-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207705">SUSE bug 1207705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210428">SUSE bug 1210428</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2253/">CVE-2023-2253 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2253">CVE-2023-2253 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009757419" comment="distribution-registry-2.8.2-150400.9.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4151" version="1" class="patch">
	<metadata>
		<title>Security update for go1.18-openssl (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1183043" ref_url="https://bugzilla.suse.com/1183043" source="BUGZILLA"/>
		<reference ref_id="1193742" ref_url="https://bugzilla.suse.com/1193742" source="BUGZILLA"/>
		<reference ref_id="1198423" ref_url="https://bugzilla.suse.com/1198423" source="BUGZILLA"/>
		<reference ref_id="1198424" ref_url="https://bugzilla.suse.com/1198424" source="BUGZILLA"/>
		<reference ref_id="1198427" ref_url="https://bugzilla.suse.com/1198427" source="BUGZILLA"/>
		<reference ref_id="1199413" ref_url="https://bugzilla.suse.com/1199413" source="BUGZILLA"/>
		<reference ref_id="1200134" ref_url="https://bugzilla.suse.com/1200134" source="BUGZILLA"/>
		<reference ref_id="1200135" ref_url="https://bugzilla.suse.com/1200135" source="BUGZILLA"/>
		<reference ref_id="1200136" ref_url="https://bugzilla.suse.com/1200136" source="BUGZILLA"/>
		<reference ref_id="1200137" ref_url="https://bugzilla.suse.com/1200137" source="BUGZILLA"/>
		<reference ref_id="1201434" ref_url="https://bugzilla.suse.com/1201434" source="BUGZILLA"/>
		<reference ref_id="1201436" ref_url="https://bugzilla.suse.com/1201436" source="BUGZILLA"/>
		<reference ref_id="1201437" ref_url="https://bugzilla.suse.com/1201437" source="BUGZILLA"/>
		<reference ref_id="1201440" ref_url="https://bugzilla.suse.com/1201440" source="BUGZILLA"/>
		<reference ref_id="1201443" ref_url="https://bugzilla.suse.com/1201443" source="BUGZILLA"/>
		<reference ref_id="1201444" ref_url="https://bugzilla.suse.com/1201444" source="BUGZILLA"/>
		<reference ref_id="1201445" ref_url="https://bugzilla.suse.com/1201445" source="BUGZILLA"/>
		<reference ref_id="1201447" ref_url="https://bugzilla.suse.com/1201447" source="BUGZILLA"/>
		<reference ref_id="1201448" ref_url="https://bugzilla.suse.com/1201448" source="BUGZILLA"/>
		<reference ref_id="1202035" ref_url="https://bugzilla.suse.com/1202035" source="BUGZILLA"/>
		<reference ref_id="1203185" ref_url="https://bugzilla.suse.com/1203185" source="BUGZILLA"/>
		<reference ref_id="1204023" ref_url="https://bugzilla.suse.com/1204023" source="BUGZILLA"/>
		<reference ref_id="1204024" ref_url="https://bugzilla.suse.com/1204024" source="BUGZILLA"/>
		<reference ref_id="1204025" ref_url="https://bugzilla.suse.com/1204025" source="BUGZILLA"/>
		<reference ref_id="1204941" ref_url="https://bugzilla.suse.com/1204941" source="BUGZILLA"/>
		<reference ref_id="1206134" ref_url="https://bugzilla.suse.com/1206134" source="BUGZILLA"/>
		<reference ref_id="1206135" ref_url="https://bugzilla.suse.com/1206135" source="BUGZILLA"/>
		<reference ref_id="1208270" ref_url="https://bugzilla.suse.com/1208270" source="BUGZILLA"/>
		<reference ref_id="1208271" ref_url="https://bugzilla.suse.com/1208271" source="BUGZILLA"/>
		<reference ref_id="1208272" ref_url="https://bugzilla.suse.com/1208272" source="BUGZILLA"/>
		<reference ref_id="1208491" ref_url="https://bugzilla.suse.com/1208491" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1705" ref_url="https://www.suse.com/security/cve/CVE-2022-1705/" source="CVE"/>
		<reference ref_id="CVE-2022-1962" ref_url="https://www.suse.com/security/cve/CVE-2022-1962/" source="CVE"/>
		<reference ref_id="CVE-2022-24675" ref_url="https://www.suse.com/security/cve/CVE-2022-24675/" source="CVE"/>
		<reference ref_id="CVE-2022-27536" ref_url="https://www.suse.com/security/cve/CVE-2022-27536/" source="CVE"/>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<reference ref_id="CVE-2022-28131" ref_url="https://www.suse.com/security/cve/CVE-2022-28131/" source="CVE"/>
		<reference ref_id="CVE-2022-28327" ref_url="https://www.suse.com/security/cve/CVE-2022-28327/" source="CVE"/>
		<reference ref_id="CVE-2022-2879" ref_url="https://www.suse.com/security/cve/CVE-2022-2879/" source="CVE"/>
		<reference ref_id="CVE-2022-2880" ref_url="https://www.suse.com/security/cve/CVE-2022-2880/" source="CVE"/>
		<reference ref_id="CVE-2022-29526" ref_url="https://www.suse.com/security/cve/CVE-2022-29526/" source="CVE"/>
		<reference ref_id="CVE-2022-29804" ref_url="https://www.suse.com/security/cve/CVE-2022-29804/" source="CVE"/>
		<reference ref_id="CVE-2022-30580" ref_url="https://www.suse.com/security/cve/CVE-2022-30580/" source="CVE"/>
		<reference ref_id="CVE-2022-30629" ref_url="https://www.suse.com/security/cve/CVE-2022-30629/" source="CVE"/>
		<reference ref_id="CVE-2022-30630" ref_url="https://www.suse.com/security/cve/CVE-2022-30630/" source="CVE"/>
		<reference ref_id="CVE-2022-30631" ref_url="https://www.suse.com/security/cve/CVE-2022-30631/" source="CVE"/>
		<reference ref_id="CVE-2022-30632" ref_url="https://www.suse.com/security/cve/CVE-2022-30632/" source="CVE"/>
		<reference ref_id="CVE-2022-30633" ref_url="https://www.suse.com/security/cve/CVE-2022-30633/" source="CVE"/>
		<reference ref_id="CVE-2022-30634" ref_url="https://www.suse.com/security/cve/CVE-2022-30634/" source="CVE"/>
		<reference ref_id="CVE-2022-30635" ref_url="https://www.suse.com/security/cve/CVE-2022-30635/" source="CVE"/>
		<reference ref_id="CVE-2022-32148" ref_url="https://www.suse.com/security/cve/CVE-2022-32148/" source="CVE"/>
		<reference ref_id="CVE-2022-32189" ref_url="https://www.suse.com/security/cve/CVE-2022-32189/" source="CVE"/>
		<reference ref_id="CVE-2022-41715" ref_url="https://www.suse.com/security/cve/CVE-2022-41715/" source="CVE"/>
		<reference ref_id="CVE-2022-41716" ref_url="https://www.suse.com/security/cve/CVE-2022-41716/" source="CVE"/>
		<reference ref_id="CVE-2022-41717" ref_url="https://www.suse.com/security/cve/CVE-2022-41717/" source="CVE"/>
		<reference ref_id="CVE-2022-41720" ref_url="https://www.suse.com/security/cve/CVE-2022-41720/" source="CVE"/>
		<reference ref_id="CVE-2022-41723" ref_url="https://www.suse.com/security/cve/CVE-2022-41723/" source="CVE"/>
		<reference ref_id="CVE-2022-41724" ref_url="https://www.suse.com/security/cve/CVE-2022-41724/" source="CVE"/>
		<reference ref_id="CVE-2022-41725" ref_url="https://www.suse.com/security/cve/CVE-2022-41725/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015005.html" source="SUSE-SU"/>
		<description>
This update for go1.18-openssl fixes the following issues:

- Add subpackage go1.x-libstd compiled shared object libstd.so (jsc#PED-1962)
  * Main go1.x package included libstd.so in previous versions
  * Split libstd.so into subpackage that can be installed standalone
  * Continues the slimming down of main go1.x package by 40 Mb
  * Experimental and not recommended for general use, Go currently has no ABI
  * Upstream Go has not committed to support buildmode=shared long-term
  * Do not use in packaging, build static single binaries (the default)
  * Upstream Go go1.x binary releases do not include libstd.so
  * go1.x Suggests go1.x-libstd so not installed by default Recommends
  * go1.x-libstd does not Require: go1.x so can install standalone
  * Provides go-libstd unversioned package name
  * Fix build step -buildmode=shared std to omit -linkshared
- Packaging improvements:
  * go1.x Suggests go1.x-doc so not installed by default Recommends
  * Use Group: Development/Languages/Go instead of Other

- Improvements to go1.x packaging spec:
  * On Tumbleweed bootstrap with current default gcc13 and gccgo118
  * On SLE-12 aarch64 ppc64le ppc64 remove overrides to bootstrap
    using go1.x package (%bcond_without gccgo). This is no longer
    needed on current SLE-12:Update and removing will consolidate
    the build configurations used.
  * Change source URLs to go.dev as per Go upstream
  * On x86_64 export GOAMD64=v1 as per the current baseline.
    At this time forgo GOAMD64=v3 option for x86_64_v3 support.
  * On x86_64 %define go_amd64=v1 as current instruction baseline

- Update to version 1.18.10.1 cut from the go1.18-openssl-fips
  branch at the revision tagged go1.18.10-1-openssl-fips.
  * Merge branch dev.boringcrypto.go1.18 into go1.18-openssl-fips
  * Merge go1.18.10 into dev.boringcrypto.go1.18

- go1.18.10 (released 2023-01-10) includes fixes to cgo, the
  compiler, the linker, and the crypto/x509, net/http, and syscall
  packages.
  Refs bsc#1193742 go1.18 release tracking
  * go#57705 misc/cgo: backport needed for dlltool fix
  * go#57426 crypto/x509: Verify on macOS does not return typed errors
  * go#57344 cmd/compile: the loong64 intrinsic for CompareAndSwapUint32 function needs to sign extend its 'old' argument.
  * go#57338 syscall, internal/poll: accept4-to-accept fallback removal broke Go code on Synology DSM 6.2 ARM devices
  * go#57213 os: TestLstat failure on Linux Aarch64
  * go#57211 reflect: sort.SliceStable sorts incorrectly on arm64 with less function created with reflect.MakeFunc and slice of sufficient length
  * go#57057 cmd/go: remove test dependency on gopkg.in service
  * go#57054 cmd/go: TestScript/version_buildvcs_git_gpg (if enabled) fails on linux longtest builders
  * go#57044 cgo: malformed DWARF TagVariable entry
  * go#57028 cmd/cgo: Wrong types in compiler errors with clang 14
  * go#56833 cmd/link/internal/ppc64: too-far trampoline is reused
  * go#56711 net: reenable TestLookupDotsWithRemoteSource and TestLookupGoogleSRV with a different target
  * go#56323 net/http: bad handling of HEAD requests with a body
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-30"/>
	<updated date="2023-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183043">SUSE bug 1183043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193742">SUSE bug 1193742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198423">SUSE bug 1198423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198424">SUSE bug 1198424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198427">SUSE bug 1198427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199413">SUSE bug 1199413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200134">SUSE bug 1200134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200135">SUSE bug 1200135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200136">SUSE bug 1200136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200137">SUSE bug 1200137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201434">SUSE bug 1201434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201436">SUSE bug 1201436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201437">SUSE bug 1201437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201440">SUSE bug 1201440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201443">SUSE bug 1201443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201444">SUSE bug 1201444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201445">SUSE bug 1201445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201447">SUSE bug 1201447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201448">SUSE bug 1201448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202035">SUSE bug 1202035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203185">SUSE bug 1203185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204023">SUSE bug 1204023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204024">SUSE bug 1204024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204025">SUSE bug 1204025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204941">SUSE bug 1204941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206134">SUSE bug 1206134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206135">SUSE bug 1206135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208270">SUSE bug 1208270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208271">SUSE bug 1208271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208272">SUSE bug 1208272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208491">SUSE bug 1208491</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1705/">CVE-2022-1705 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1705">CVE-2022-1705 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1962/">CVE-2022-1962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1962">CVE-2022-1962 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24675/">CVE-2022-24675 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24675">CVE-2022-24675 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27536/">CVE-2022-27536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27536">CVE-2022-27536 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28131/">CVE-2022-28131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28131">CVE-2022-28131 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28327/">CVE-2022-28327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28327">CVE-2022-28327 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2879/">CVE-2022-2879 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2879">CVE-2022-2879 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2880/">CVE-2022-2880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2880">CVE-2022-2880 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29526/">CVE-2022-29526 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29526">CVE-2022-29526 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29804/">CVE-2022-29804 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29804">CVE-2022-29804 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30580/">CVE-2022-30580 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30580">CVE-2022-30580 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30629/">CVE-2022-30629 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30629">CVE-2022-30629 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30630/">CVE-2022-30630 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30631/">CVE-2022-30631 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30631">CVE-2022-30631 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30632/">CVE-2022-30632 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30633/">CVE-2022-30633 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30633">CVE-2022-30633 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-30634/">CVE-2022-30634 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30634">CVE-2022-30634 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30635/">CVE-2022-30635 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30635">CVE-2022-30635 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32148/">CVE-2022-32148 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32148">CVE-2022-32148 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32189/">CVE-2022-32189 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32189">CVE-2022-32189 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41715/">CVE-2022-41715 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41715">CVE-2022-41715 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41716/">CVE-2022-41716 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41716">CVE-2022-41716 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41717/">CVE-2022-41717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41717">CVE-2022-41717 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41720/">CVE-2022-41720 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41720">CVE-2022-41720 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41723/">CVE-2022-41723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41724/">CVE-2022-41724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41724">CVE-2022-41724 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41725/">CVE-2022-41725 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41725">CVE-2022-41725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009762638" comment="go1.18-openssl-1.18.10.1-150000.1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009762639" comment="go1.18-openssl-doc-1.18.10.1-150000.1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009762640" comment="go1.18-openssl-race-1.18.10.1-150000.1.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4152" version="1" class="patch">
	<metadata>
		<title>Security update for c-ares (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211604" ref_url="https://bugzilla.suse.com/1211604" source="BUGZILLA"/>
		<reference ref_id="1211605" ref_url="https://bugzilla.suse.com/1211605" source="BUGZILLA"/>
		<reference ref_id="1211606" ref_url="https://bugzilla.suse.com/1211606" source="BUGZILLA"/>
		<reference ref_id="1211607" ref_url="https://bugzilla.suse.com/1211607" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-31124" ref_url="https://www.suse.com/security/cve/CVE-2023-31124/" source="CVE"/>
		<reference ref_id="CVE-2023-31130" ref_url="https://www.suse.com/security/cve/CVE-2023-31130/" source="CVE"/>
		<reference ref_id="CVE-2023-31147" ref_url="https://www.suse.com/security/cve/CVE-2023-31147/" source="CVE"/>
		<reference ref_id="CVE-2023-32067" ref_url="https://www.suse.com/security/cve/CVE-2023-32067/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015004.html" source="SUSE-SU"/>
		<description>
This update for c-ares fixes the following issues:

Update to version 1.19.1:

- CVE-2023-32067: 0-byte UDP payload causes Denial of Service (bsc#1211604)
- CVE-2023-31147: Insufficient randomness in generation of DNS query IDs (bsc#1211605)
- CVE-2023-31130: Buffer Underwrite in ares_inet_net_pton() (bsc#1211606)
- CVE-2023-31124: AutoTools does not set CARES_RANDOM_FILE during cross compilation (bsc#1211607)
- Fix uninitialized memory warning in test
- ares_getaddrinfo() should allow a port of 0
- Fix memory leak in ares_send() on error
- Fix comment style in ares_data.h
- Fix typo in ares_init_options.3
- Sync ax_pthread.m4 with upstream
- Sync ax_cxx_compile_stdcxx_11.m4 with upstream to fix uclibc support 
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-30"/>
	<updated date="2023-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211604">SUSE bug 1211604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211605">SUSE bug 1211605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211606">SUSE bug 1211606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211607">SUSE bug 1211607</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-31124/">CVE-2023-31124 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31124">CVE-2023-31124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-31130/">CVE-2023-31130 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31130">CVE-2023-31130 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31147/">CVE-2023-31147 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31147">CVE-2023-31147 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32067/">CVE-2023-32067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32067">CVE-2023-32067 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009761834" comment="c-ares-devel-1.19.1-150000.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761835" comment="c-ares-utils-1.19.1-150000.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761836" comment="libcares2-1.19.1-150000.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761837" comment="libcares2-32bit-1.19.1-150000.3.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4153" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211703" ref_url="https://bugzilla.suse.com/1211703" source="BUGZILLA"/>
		<reference ref_id="1211705" ref_url="https://bugzilla.suse.com/1211705" source="BUGZILLA"/>
		<reference ref_id="1211706" ref_url="https://bugzilla.suse.com/1211706" source="BUGZILLA"/>
		<reference ref_id="1211707" ref_url="https://bugzilla.suse.com/1211707" source="BUGZILLA"/>
		<reference ref_id="1211710" ref_url="https://bugzilla.suse.com/1211710" source="BUGZILLA"/>
		<reference ref_id="1211793" ref_url="https://bugzilla.suse.com/1211793" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0668" ref_url="https://www.suse.com/security/cve/CVE-2023-0668/" source="CVE"/>
		<reference ref_id="CVE-2023-2855" ref_url="https://www.suse.com/security/cve/CVE-2023-2855/" source="CVE"/>
		<reference ref_id="CVE-2023-2856" ref_url="https://www.suse.com/security/cve/CVE-2023-2856/" source="CVE"/>
		<reference ref_id="CVE-2023-2857" ref_url="https://www.suse.com/security/cve/CVE-2023-2857/" source="CVE"/>
		<reference ref_id="CVE-2023-2858" ref_url="https://www.suse.com/security/cve/CVE-2023-2858/" source="CVE"/>
		<reference ref_id="CVE-2023-2859" ref_url="https://www.suse.com/security/cve/CVE-2023-2859/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029579.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Updated to version 3.6.14:

- CVE-2023-2855: Fixed a crash in the Candump log file parser
  (boo#1211703).
- CVE-2023-2856: Fixed a crash in the VMS TCPIPtrace file parser
  (boo#1211707).
- CVE-2023-2857: Fixed a crash in the BLF file parser (boo#1211705).
- CVE-2023-2858: Fixed a crash in the NetScaler file parser
  (boo#1211706).
- CVE-2023-0668: Fixed a crash in the IEEE C37.118 Synchrophasor
  dissector (boo#1211710).
- CVE-2023-2879: GDSDB dissector infinite loop (boo#1211793).

Further features, bug fixes and updated protocol support as listed in:
https://www.wireshark.org/docs/relnotes/wireshark-3.6.14.html
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-30"/>
	<updated date="2023-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211703">SUSE bug 1211703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211705">SUSE bug 1211705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211706">SUSE bug 1211706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211707">SUSE bug 1211707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211710">SUSE bug 1211710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211793">SUSE bug 1211793</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0668/">CVE-2023-0668 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0668">CVE-2023-0668 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-2855/">CVE-2023-2855 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2855">CVE-2023-2855 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2856/">CVE-2023-2856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2856">CVE-2023-2856 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2857/">CVE-2023-2857 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2857">CVE-2023-2857 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2858/">CVE-2023-2858 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2858">CVE-2023-2858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2859/">CVE-2023-2859 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2859">CVE-2023-2859 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009763511" comment="libwireshark15-3.6.14-150000.3.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763512" comment="libwiretap12-3.6.14-150000.3.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763513" comment="libwsutil13-3.6.14-150000.3.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763514" comment="wireshark-3.6.14-150000.3.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763515" comment="wireshark-devel-3.6.14-150000.3.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763516" comment="wireshark-ui-qt-3.6.14-150000.3.92.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4154" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_0_0 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211430" ref_url="https://bugzilla.suse.com/1211430" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2650" ref_url="https://www.suse.com/security/cve/CVE-2023-2650/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015007.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_0_0 fixes the following issues:

- CVE-2023-2650: Fixed possible denial of service translating ASN.1 object identifiers (bsc#1211430).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-30"/>
	<updated date="2023-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211430">SUSE bug 1211430</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2650/">CVE-2023-2650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009763699" comment="libopenssl-1_0_0-devel-1.0.2p-150000.3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763700" comment="libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763701" comment="libopenssl10-1.0.2p-150000.3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763702" comment="libopenssl1_0_0-1.0.2p-150000.3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763703" comment="libopenssl1_0_0-32bit-1.0.2p-150000.3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763704" comment="libopenssl1_0_0-hmac-1.0.2p-150000.3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763705" comment="libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763706" comment="libopenssl1_0_0-steam-1.0.2p-150000.3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763707" comment="libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763708" comment="openssl-1_0_0-1.0.2p-150000.3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763709" comment="openssl-1_0_0-cavs-1.0.2p-150000.3.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763710" comment="openssl-1_0_0-doc-1.0.2p-150000.3.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4155" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1208226" ref_url="https://bugzilla.suse.com/1208226" source="BUGZILLA"/>
		<reference ref_id="1208227" ref_url="https://bugzilla.suse.com/1208227" source="BUGZILLA"/>
		<reference ref_id="1208228" ref_url="https://bugzilla.suse.com/1208228" source="BUGZILLA"/>
		<reference ref_id="1208229" ref_url="https://bugzilla.suse.com/1208229" source="BUGZILLA"/>
		<reference ref_id="1208230" ref_url="https://bugzilla.suse.com/1208230" source="BUGZILLA"/>
		<reference ref_id="1208231" ref_url="https://bugzilla.suse.com/1208231" source="BUGZILLA"/>
		<reference ref_id="1208232" ref_url="https://bugzilla.suse.com/1208232" source="BUGZILLA"/>
		<reference ref_id="1208233" ref_url="https://bugzilla.suse.com/1208233" source="BUGZILLA"/>
		<reference ref_id="1208234" ref_url="https://bugzilla.suse.com/1208234" source="BUGZILLA"/>
		<reference ref_id="1208236" ref_url="https://bugzilla.suse.com/1208236" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0795" ref_url="https://www.suse.com/security/cve/CVE-2023-0795/" source="CVE"/>
		<reference ref_id="CVE-2023-0796" ref_url="https://www.suse.com/security/cve/CVE-2023-0796/" source="CVE"/>
		<reference ref_id="CVE-2023-0797" ref_url="https://www.suse.com/security/cve/CVE-2023-0797/" source="CVE"/>
		<reference ref_id="CVE-2023-0798" ref_url="https://www.suse.com/security/cve/CVE-2023-0798/" source="CVE"/>
		<reference ref_id="CVE-2023-0799" ref_url="https://www.suse.com/security/cve/CVE-2023-0799/" source="CVE"/>
		<reference ref_id="CVE-2023-0800" ref_url="https://www.suse.com/security/cve/CVE-2023-0800/" source="CVE"/>
		<reference ref_id="CVE-2023-0801" ref_url="https://www.suse.com/security/cve/CVE-2023-0801/" source="CVE"/>
		<reference ref_id="CVE-2023-0802" ref_url="https://www.suse.com/security/cve/CVE-2023-0802/" source="CVE"/>
		<reference ref_id="CVE-2023-0803" ref_url="https://www.suse.com/security/cve/CVE-2023-0803/" source="CVE"/>
		<reference ref_id="CVE-2023-0804" ref_url="https://www.suse.com/security/cve/CVE-2023-0804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015030.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

Fixed multiple out of bounds read/write security issues:

  CVE-2023-0795 (bsc#1208226), CVE-2023-0796 (bsc#1208227), CVE-2023-0797 (bsc#1208228),
  CVE-2023-0798 (bsc#1208229), CVE-2023-0799 (bsc#1208230), CVE-2023-0800 (bsc#1208231),
  CVE-2023-0801 (bsc#1208232), CVE-2023-0802 (bsc#1208233), CVE-2023-0803 (bsc#1208234),
  CVE-2023-0804 (bsc#1208236).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-05-31"/>
	<updated date="2023-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1208226">SUSE bug 1208226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208227">SUSE bug 1208227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208228">SUSE bug 1208228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208229">SUSE bug 1208229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208230">SUSE bug 1208230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208231">SUSE bug 1208231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208232">SUSE bug 1208232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208233">SUSE bug 1208233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208234">SUSE bug 1208234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208236">SUSE bug 1208236</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0795/">CVE-2023-0795 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0795">CVE-2023-0795 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0796/">CVE-2023-0796 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0796">CVE-2023-0796 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0797/">CVE-2023-0797 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0797">CVE-2023-0797 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0798/">CVE-2023-0798 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0798">CVE-2023-0798 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0799/">CVE-2023-0799 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0799">CVE-2023-0799 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0800/">CVE-2023-0800 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0800">CVE-2023-0800 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0801/">CVE-2023-0801 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0801">CVE-2023-0801 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0802/">CVE-2023-0802 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0802">CVE-2023-0802 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0803/">CVE-2023-0803 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0803">CVE-2023-0803 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0804/">CVE-2023-0804 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0804">CVE-2023-0804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009763290" comment="libtiff-devel-4.0.9-150000.45.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763291" comment="libtiff-devel-32bit-4.0.9-150000.45.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763292" comment="libtiff5-4.0.9-150000.45.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763293" comment="libtiff5-32bit-4.0.9-150000.45.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763294" comment="tiff-4.0.9-150000.45.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4156" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211791" ref_url="https://bugzilla.suse.com/1211791" source="BUGZILLA"/>
		<reference ref_id="1211792" ref_url="https://bugzilla.suse.com/1211792" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-34151" ref_url="https://www.suse.com/security/cve/CVE-2023-34151/" source="CVE"/>
		<reference ref_id="CVE-2023-34153" ref_url="https://www.suse.com/security/cve/CVE-2023-34153/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015033.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2023-34151: Fixed an undefined behavior issue due to floating
  point truncation (bsc#1211791).
- CVE-2023-34153: Fixed a command injection issue when encoding or
  decoding VIDEO files (bsc#1211792).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-01"/>
	<updated date="2023-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211791">SUSE bug 1211791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211792">SUSE bug 1211792</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-34151/">CVE-2023-34151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34151">CVE-2023-34151 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34153/">CVE-2023-34153 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34153">CVE-2023-34153 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009763734" comment="ImageMagick-7.1.0.9-150400.6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763735" comment="ImageMagick-config-7-SUSE-7.1.0.9-150400.6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763736" comment="ImageMagick-config-7-upstream-7.1.0.9-150400.6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763737" comment="ImageMagick-devel-7.1.0.9-150400.6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763738" comment="ImageMagick-devel-32bit-7.1.0.9-150400.6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763739" comment="ImageMagick-doc-7.1.0.9-150400.6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763740" comment="ImageMagick-extra-7.1.0.9-150400.6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763741" comment="libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763742" comment="libMagick++-7_Q16HDRI5-32bit-7.1.0.9-150400.6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763743" comment="libMagick++-devel-7.1.0.9-150400.6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763744" comment="libMagick++-devel-32bit-7.1.0.9-150400.6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763745" comment="libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763746" comment="libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-150400.6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763747" comment="libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763748" comment="libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-150400.6.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763749" comment="perl-PerlMagick-7.1.0.9-150400.6.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4157" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211643" ref_url="https://bugzilla.suse.com/1211643" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32324" ref_url="https://www.suse.com/security/cve/CVE-2023-32324/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029664.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2023-32324: Fixed a buffer overflow in format_log_line() which could cause a denial-of-service (bsc#1211643).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-01"/>
	<updated date="2023-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211643">SUSE bug 1211643</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32324/">CVE-2023-32324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32324">CVE-2023-32324 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009764083" comment="cups-2.2.7-150000.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764084" comment="cups-client-2.2.7-150000.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764085" comment="cups-config-2.2.7-150000.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764086" comment="cups-ddk-2.2.7-150000.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764087" comment="cups-devel-2.2.7-150000.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764088" comment="cups-devel-32bit-2.2.7-150000.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764089" comment="libcups2-2.2.7-150000.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764090" comment="libcups2-32bit-2.2.7-150000.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764091" comment="libcupscgi1-2.2.7-150000.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764092" comment="libcupscgi1-32bit-2.2.7-150000.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764093" comment="libcupsimage2-2.2.7-150000.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764094" comment="libcupsimage2-32bit-2.2.7-150000.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764095" comment="libcupsmime1-2.2.7-150000.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764096" comment="libcupsmime1-32bit-2.2.7-150000.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764097" comment="libcupsppdc1-2.2.7-150000.3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764098" comment="libcupsppdc1-32bit-2.2.7-150000.3.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4158" version="1" class="patch">
	<metadata>
		<title>Security update for apache-commons-fileupload (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1208513" ref_url="https://bugzilla.suse.com/1208513" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-24998" ref_url="https://www.suse.com/security/cve/CVE-2023-24998/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2390-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029737.html" source="SUSE-SU"/>
		<description>
This update for apache-commons-fileupload fixes the following issues:

Updated to version 1.5:
- CVE-2023-24998: Added a configurable maximum number of files to
  upload per request (bsc#1208513).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-06"/>
	<updated date="2023-06-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208513">SUSE bug 1208513</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24998/">CVE-2023-24998 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24998">CVE-2023-24998 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009761849" comment="apache-commons-fileupload-1.5-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761850" comment="apache-commons-fileupload-javadoc-1.5-150200.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4159" version="1" class="patch">
	<metadata>
		<title>Security update for google-cloud-sap-agent (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1200441" ref_url="https://bugzilla.suse.com/1200441" source="BUGZILLA"/>
		<reference ref_id="1210464" ref_url="https://bugzilla.suse.com/1210464" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029765.html" source="SUSE-SU"/>
		<description>

This update of google-cloud-sap-agent fixes the following issues:

- rebuild the package with the go 1.19 security release (bsc#1200441).
- Update to version 1.5.1 (bsc#1210464)
- Raise golang API version to 1.20
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-07"/>
	<updated date="2023-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200441">SUSE bug 1200441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210464">SUSE bug 1210464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763295" comment="google-cloud-sap-agent-1.5.1-150100.3.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4160" version="1" class="patch">
	<metadata>
		<title>Security update for python310 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1203750" ref_url="https://bugzilla.suse.com/1203750" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029776.html" source="SUSE-SU"/>
		<description>
This update for python310 fixes the following issues:

- CVE-2007-4559: Fixed filter for tarfile.extractall (bsc#1203750).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-08"/>
	<updated date="2023-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203750">SUSE bug 1203750</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009764622" comment="libpython3_10-1_0-3.10.11-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764623" comment="libpython3_10-1_0-32bit-3.10.11-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764624" comment="python310-3.10.11-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764625" comment="python310-32bit-3.10.11-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764626" comment="python310-base-3.10.11-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764627" comment="python310-base-32bit-3.10.11-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764628" comment="python310-curses-3.10.11-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764629" comment="python310-dbm-3.10.11-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764630" comment="python310-devel-3.10.11-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764631" comment="python310-doc-3.10.11-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764632" comment="python310-doc-devhelp-3.10.11-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764633" comment="python310-idle-3.10.11-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764634" comment="python310-testsuite-3.10.11-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764635" comment="python310-tk-3.10.11-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764636" comment="python310-tools-3.10.11-150400.4.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4161" version="1" class="patch">
	<metadata>
		<title>Security update for libwebp (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210212" ref_url="https://bugzilla.suse.com/1210212" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1999" ref_url="https://www.suse.com/security/cve/CVE-2023-1999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2467-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029773.html" source="SUSE-SU"/>
		<description>
This update for libwebp fixes the following issues:

- CVE-2023-1999: Fixed a double free (bsc#1210212).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-08"/>
	<updated date="2023-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210212">SUSE bug 1210212</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1999/">CVE-2023-1999 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1999">CVE-2023-1999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009764394" comment="libwebp-devel-1.0.3-150200.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764395" comment="libwebp-devel-32bit-1.0.3-150200.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764396" comment="libwebp-tools-1.0.3-150200.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764397" comment="libwebp7-1.0.3-150200.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764398" comment="libwebp7-32bit-1.0.3-150200.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764399" comment="libwebpdecoder3-1.0.3-150200.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764400" comment="libwebpdecoder3-32bit-1.0.3-150200.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764401" comment="libwebpdemux2-1.0.3-150200.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764402" comment="libwebpdemux2-32bit-1.0.3-150200.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764403" comment="libwebpmux3-1.0.3-150200.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764404" comment="libwebpmux3-32bit-1.0.3-150200.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4162" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1207404" ref_url="https://bugzilla.suse.com/1207404" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-47015" ref_url="https://www.suse.com/security/cve/CVE-2022-47015/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015131.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

Updated to version 10.6.13:

- CVE-2022-47015: Fixed a denial of service that could be triggered by
  a crafted SQL query (bsc#1207404).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-09"/>
	<updated date="2023-06-09"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1207404">SUSE bug 1207404</bugzilla>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-47015/">CVE-2022-47015 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47015">CVE-2022-47015 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009763280" comment="libmariadbd-devel-10.6.13-150400.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763281" comment="libmariadbd19-10.6.13-150400.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763282" comment="mariadb-10.6.13-150400.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763283" comment="mariadb-bench-10.6.13-150400.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763284" comment="mariadb-client-10.6.13-150400.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763285" comment="mariadb-errormessages-10.6.13-150400.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763286" comment="mariadb-galera-10.6.13-150400.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763287" comment="mariadb-rpm-macros-10.6.13-150400.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763288" comment="mariadb-test-10.6.13-150400.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763289" comment="mariadb-tools-10.6.13-150400.3.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4163" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211795" ref_url="https://bugzilla.suse.com/1211795" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2953" ref_url="https://www.suse.com/security/cve/CVE-2023-2953/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015137.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2023-2953: Fixed null pointer deref in ber_memalloc_x (bsc#1211795).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-12"/>
	<updated date="2023-06-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211795">SUSE bug 1211795</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2953/">CVE-2023-2953 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2953">CVE-2023-2953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009763719" comment="libldap-2_4-2-2.4.46-150200.14.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763720" comment="libldap-2_4-2-32bit-2.4.46-150200.14.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763721" comment="libldap-data-2.4.46-150200.14.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763722" comment="openldap2-2.4.46-150200.14.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763723" comment="openldap2-back-meta-2.4.46-150200.14.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763724" comment="openldap2-back-perl-2.4.46-150200.14.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763725" comment="openldap2-back-sock-2.4.46-150200.14.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763726" comment="openldap2-back-sql-2.4.46-150200.14.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763727" comment="openldap2-client-2.4.46-150200.14.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763728" comment="openldap2-contrib-2.4.46-150200.14.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763729" comment="openldap2-devel-2.4.46-150200.14.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763730" comment="openldap2-devel-32bit-2.4.46-150200.14.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763731" comment="openldap2-devel-static-2.4.46-150200.14.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763732" comment="openldap2-doc-2.4.46-150200.14.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763733" comment="openldap2-ppolicy-check-password-1.2-150200.14.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4164" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211922" ref_url="https://bugzilla.suse.com/1211922" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-34414" ref_url="https://www.suse.com/security/cve/CVE-2023-34414/" source="CVE"/>
		<reference ref_id="CVE-2023-34416" ref_url="https://www.suse.com/security/cve/CVE-2023-34416/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015139.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Extended Support Release 102.12.0 ESR (bsc#1211922):

- CVE-2023-34414: Click-jacking certificate exceptions through rendering lag
- CVE-2023-34416: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-12"/>
	<updated date="2023-06-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211922">SUSE bug 1211922</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34414/">CVE-2023-34414 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34414">CVE-2023-34414 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34416/">CVE-2023-34416 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34416">CVE-2023-34416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009764604" comment="MozillaFirefox-102.12.0-150200.152.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764605" comment="MozillaFirefox-branding-upstream-102.12.0-150200.152.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764606" comment="MozillaFirefox-devel-102.12.0-150200.152.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764607" comment="MozillaFirefox-translations-common-102.12.0-150200.152.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764608" comment="MozillaFirefox-translations-other-102.12.0-150200.152.90.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4165" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210628" ref_url="https://bugzilla.suse.com/1210628" source="BUGZILLA"/>
		<reference ref_id="1210631" ref_url="https://bugzilla.suse.com/1210631" source="BUGZILLA"/>
		<reference ref_id="1210632" ref_url="https://bugzilla.suse.com/1210632" source="BUGZILLA"/>
		<reference ref_id="1210634" ref_url="https://bugzilla.suse.com/1210634" source="BUGZILLA"/>
		<reference ref_id="1210635" ref_url="https://bugzilla.suse.com/1210635" source="BUGZILLA"/>
		<reference ref_id="1210636" ref_url="https://bugzilla.suse.com/1210636" source="BUGZILLA"/>
		<reference ref_id="1210637" ref_url="https://bugzilla.suse.com/1210637" source="BUGZILLA"/>
		<reference ref_id="1210711" ref_url="https://bugzilla.suse.com/1210711" source="BUGZILLA"/>
		<reference ref_id="1210826" ref_url="https://bugzilla.suse.com/1210826" source="BUGZILLA"/>
		<reference ref_id="1211615" ref_url="https://bugzilla.suse.com/1211615" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-21930" ref_url="https://www.suse.com/security/cve/CVE-2023-21930/" source="CVE"/>
		<reference ref_id="CVE-2023-21937" ref_url="https://www.suse.com/security/cve/CVE-2023-21937/" source="CVE"/>
		<reference ref_id="CVE-2023-21938" ref_url="https://www.suse.com/security/cve/CVE-2023-21938/" source="CVE"/>
		<reference ref_id="CVE-2023-21939" ref_url="https://www.suse.com/security/cve/CVE-2023-21939/" source="CVE"/>
		<reference ref_id="CVE-2023-21954" ref_url="https://www.suse.com/security/cve/CVE-2023-21954/" source="CVE"/>
		<reference ref_id="CVE-2023-21967" ref_url="https://www.suse.com/security/cve/CVE-2023-21967/" source="CVE"/>
		<reference ref_id="CVE-2023-21968" ref_url="https://www.suse.com/security/cve/CVE-2023-21968/" source="CVE"/>
		<reference ref_id="CVE-2023-2597" ref_url="https://www.suse.com/security/cve/CVE-2023-2597/" source="CVE"/>
		<reference ref_id="CVE-2023-30441" ref_url="https://www.suse.com/security/cve/CVE-2023-30441/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015172.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- CVE-2023-21930: Fixed possible compromise from unauthenticated attacker with network access via TLS (bsc#1210628).
- CVE-2023-21937: Fixed vulnerability inside the networking component (bsc#1210631).
- CVE-2023-21938: Fixed vulnerability inside the library component (bsc#1210632).
- CVE-2023-21939: Fixed vulnerability inside the swing component (bsc#1210634).
- CVE-2023-21968: Fixed vulnerability inside the library component (bsc#1210637).
- CVE-2023-2597: Fixed buffer overflow in shared cache implementation (bsc#1211615).
- CVE-2023-21967: Fixed vulnerability inside the JSSE component (bsc#1210636).
- CVE-2023-21954: Fixed vulnerability inside the hotspot component (bsc#1210635).

Additional reference fixed already in 8.0.7.15:

- CVE-2023-30441: Fixed components that could have exposed sensitive information using a combination of flaws and configurations (bsc#1210711).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-13"/>
	<updated date="2023-06-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210628">SUSE bug 1210628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210631">SUSE bug 1210631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210632">SUSE bug 1210632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210634">SUSE bug 1210634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210635">SUSE bug 1210635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210636">SUSE bug 1210636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210637">SUSE bug 1210637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210711">SUSE bug 1210711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210826">SUSE bug 1210826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211615">SUSE bug 1211615</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-21930/">CVE-2023-21930 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21930">CVE-2023-21930 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21937/">CVE-2023-21937 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21937">CVE-2023-21937 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21938/">CVE-2023-21938 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21938">CVE-2023-21938 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21939/">CVE-2023-21939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21939">CVE-2023-21939 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-21954/">CVE-2023-21954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21954">CVE-2023-21954 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-21967/">CVE-2023-21967 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21967">CVE-2023-21967 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21968/">CVE-2023-21968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21968">CVE-2023-21968 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2597/">CVE-2023-2597 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2597">CVE-2023-2597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-30441/">CVE-2023-30441 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30441">CVE-2023-30441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009765043" comment="java-1_8_0-ibm-1.8.0_sr8.5-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765044" comment="java-1_8_0-ibm-32bit-1.8.0_sr8.5-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765045" comment="java-1_8_0-ibm-alsa-1.8.0_sr8.5-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765046" comment="java-1_8_0-ibm-demo-1.8.0_sr8.5-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765047" comment="java-1_8_0-ibm-devel-1.8.0_sr8.5-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765048" comment="java-1_8_0-ibm-devel-32bit-1.8.0_sr8.5-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765049" comment="java-1_8_0-ibm-plugin-1.8.0_sr8.5-150000.3.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765050" comment="java-1_8_0-ibm-src-1.8.0_sr8.5-150000.3.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4166" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1208513" ref_url="https://bugzilla.suse.com/1208513" source="BUGZILLA"/>
		<reference ref_id="1211608" ref_url="https://bugzilla.suse.com/1211608" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-24998" ref_url="https://www.suse.com/security/cve/CVE-2023-24998/" source="CVE"/>
		<reference ref_id="CVE-2023-28709" ref_url="https://www.suse.com/security/cve/CVE-2023-28709/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015174.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

Updated to version 9.0.75:
- CVE-2023-28709: Mended an incomplete fix for CVE-2023-24998 (bsc#1208513, bsc#1211608).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-13"/>
	<updated date="2023-06-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208513">SUSE bug 1208513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211608">SUSE bug 1211608</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24998/">CVE-2023-24998 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24998">CVE-2023-24998 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28709/">CVE-2023-28709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28709">CVE-2023-28709 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009761838" comment="tomcat-9.0.75-150200.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761839" comment="tomcat-admin-webapps-9.0.75-150200.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761840" comment="tomcat-docs-webapp-9.0.75-150200.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761841" comment="tomcat-el-3_0-api-9.0.75-150200.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761842" comment="tomcat-embed-9.0.75-150200.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761843" comment="tomcat-javadoc-9.0.75-150200.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761844" comment="tomcat-jsp-2_3-api-9.0.75-150200.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761845" comment="tomcat-jsvc-9.0.75-150200.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761846" comment="tomcat-lib-9.0.75-150200.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761847" comment="tomcat-servlet-4_0-api-9.0.75-150200.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009761848" comment="tomcat-webapps-9.0.75-150200.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4167" version="1" class="patch">
	<metadata>
		<title>Security update for rekor (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211790" ref_url="https://bugzilla.suse.com/1211790" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-33199" ref_url="https://www.suse.com/security/cve/CVE-2023-33199/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2515-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029895.html" source="SUSE-SU"/>
		<description>
This update for rekor fixes the following issues:

- updated to rekor 1.2.1 (jsc#SLE-23476):

- CVE-2023-33199: Fixed that malformed proposed intoto v0.0.2 entries can cause a panic (bsc#1211790).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-15"/>
	<updated date="2023-06-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211790">SUSE bug 1211790</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-33199/">CVE-2023-33199 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33199">CVE-2023-33199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764393" comment="rekor-1.2.1-150400.4.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4168" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211894" ref_url="https://bugzilla.suse.com/1211894" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2977" ref_url="https://www.suse.com/security/cve/CVE-2023-2977/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2516-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029894.html" source="SUSE-SU"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2023-2977: Fixed out of bounds read in pkcs15 cardos_have_verifyrc_package() (bsc#1211894).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-15"/>
	<updated date="2023-06-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211894">SUSE bug 1211894</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2977/">CVE-2023-2977 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2977">CVE-2023-2977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009764602" comment="opensc-0.22.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764603" comment="opensc-32bit-0.22.0-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4169" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1203750" ref_url="https://bugzilla.suse.com/1203750" source="BUGZILLA"/>
		<reference ref_id="1211158" ref_url="https://bugzilla.suse.com/1211158" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2517-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029893.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2007-4559: Fixed filter for tarfile.extractall (bsc#1203750).

- Fixed unittest.mock.patch.dict returns function when applied to coroutines (bsc#1211158).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-15"/>
	<updated date="2023-06-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203750">SUSE bug 1203750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211158">SUSE bug 1211158</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009764609" comment="libpython3_6m1_0-3.6.15-150300.10.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764610" comment="libpython3_6m1_0-32bit-3.6.15-150300.10.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764611" comment="python3-3.6.15-150300.10.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764612" comment="python3-base-3.6.15-150300.10.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764613" comment="python3-curses-3.6.15-150300.10.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764614" comment="python3-dbm-3.6.15-150300.10.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764615" comment="python3-devel-3.6.15-150300.10.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764616" comment="python3-doc-3.6.15-150300.10.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764617" comment="python3-doc-devhelp-3.6.15-150300.10.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764618" comment="python3-idle-3.6.15-150300.10.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764619" comment="python3-testsuite-3.6.15-150300.10.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764620" comment="python3-tk-3.6.15-150300.10.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764621" comment="python3-tools-3.6.15-150300.10.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4170" version="1" class="patch">
	<metadata>
		<title>Security update for frr (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211248" ref_url="https://bugzilla.suse.com/1211248" source="BUGZILLA"/>
		<reference ref_id="1211249" ref_url="https://bugzilla.suse.com/1211249" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-31489" ref_url="https://www.suse.com/security/cve/CVE-2023-31489/" source="CVE"/>
		<reference ref_id="CVE-2023-31490" ref_url="https://www.suse.com/security/cve/CVE-2023-31490/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015208.html" source="SUSE-SU"/>
		<description>
This update for frr fixes the following issues:

- CVE-2023-31489: Fixed a remote denial of service via a malformed BGP packet (bsc#1211248).
- CVE-2023-31490: Fixed a remote denial of service via a malformed BGP packet (bsc#1211249).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-15"/>
	<updated date="2023-06-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211248">SUSE bug 1211248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211249">SUSE bug 1211249</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31489/">CVE-2023-31489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31489">CVE-2023-31489 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31490/">CVE-2023-31490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31490">CVE-2023-31490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009765201" comment="frr-8.4-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765202" comment="frr-devel-8.4-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765203" comment="libfrr0-8.4-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765204" comment="libfrr_pb0-8.4-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765205" comment="libfrrcares0-8.4-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765206" comment="libfrrfpm_pb0-8.4-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765207" comment="libfrrospfapiclient0-8.4-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765208" comment="libfrrsnmp0-8.4-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765209" comment="libfrrzmq0-8.4-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765210" comment="libmlag_pb0-8.4-150500.4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4171" version="1" class="patch">
	<metadata>
		<title>Security update for go1.19 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1200441" ref_url="https://bugzilla.suse.com/1200441" source="BUGZILLA"/>
		<reference ref_id="1212073" ref_url="https://bugzilla.suse.com/1212073" source="BUGZILLA"/>
		<reference ref_id="1212074" ref_url="https://bugzilla.suse.com/1212074" source="BUGZILLA"/>
		<reference ref_id="1212075" ref_url="https://bugzilla.suse.com/1212075" source="BUGZILLA"/>
		<reference ref_id="1212076" ref_url="https://bugzilla.suse.com/1212076" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-29402" ref_url="https://www.suse.com/security/cve/CVE-2023-29402/" source="CVE"/>
		<reference ref_id="CVE-2023-29403" ref_url="https://www.suse.com/security/cve/CVE-2023-29403/" source="CVE"/>
		<reference ref_id="CVE-2023-29404" ref_url="https://www.suse.com/security/cve/CVE-2023-29404/" source="CVE"/>
		<reference ref_id="CVE-2023-29405" ref_url="https://www.suse.com/security/cve/CVE-2023-29405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015223.html" source="SUSE-SU"/>
		<description>
This update for go1.19 fixes the following issues:

Update to go1.19.10 (bsc#1200441):

- CVE-2023-29402: cmd/go: Fixed cgo code injection (bsc#1212073).                                                                                                                              
- CVE-2023-29403: runtime: Fixed unexpected behavior of setuid/setgid binaries (bsc#1212074).                                                                                                  
- CVE-2023-29404: cmd/go: Fixed improper sanitization of LDFLAGS (bsc#1212075).                                                                                                                
- CVE-2023-29405: cmd/go: Fixed improper sanitization of LDFLAGS (bsc#1212076).                                                                                                                
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-16"/>
	<updated date="2023-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1200441">SUSE bug 1200441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212073">SUSE bug 1212073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212074">SUSE bug 1212074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212075">SUSE bug 1212075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212076">SUSE bug 1212076</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29402/">CVE-2023-29402 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29402">CVE-2023-29402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29403/">CVE-2023-29403 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29403">CVE-2023-29403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29404/">CVE-2023-29404 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29404">CVE-2023-29404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29405/">CVE-2023-29405 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29405">CVE-2023-29405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009765051" comment="go1.19-1.19.10-150000.1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765052" comment="go1.19-doc-1.19.10-150000.1.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765125" comment="go1.19-race-1.19.10-150000.1.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4172" version="1" class="patch">
	<metadata>
		<title>Security update for go1.20 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206346" ref_url="https://bugzilla.suse.com/1206346" source="BUGZILLA"/>
		<reference ref_id="1212073" ref_url="https://bugzilla.suse.com/1212073" source="BUGZILLA"/>
		<reference ref_id="1212074" ref_url="https://bugzilla.suse.com/1212074" source="BUGZILLA"/>
		<reference ref_id="1212075" ref_url="https://bugzilla.suse.com/1212075" source="BUGZILLA"/>
		<reference ref_id="1212076" ref_url="https://bugzilla.suse.com/1212076" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-29402" ref_url="https://www.suse.com/security/cve/CVE-2023-29402/" source="CVE"/>
		<reference ref_id="CVE-2023-29403" ref_url="https://www.suse.com/security/cve/CVE-2023-29403/" source="CVE"/>
		<reference ref_id="CVE-2023-29404" ref_url="https://www.suse.com/security/cve/CVE-2023-29404/" source="CVE"/>
		<reference ref_id="CVE-2023-29405" ref_url="https://www.suse.com/security/cve/CVE-2023-29405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015222.html" source="SUSE-SU"/>
		<description>
This update for go1.20 fixes the following issues:

Update to go1.20.5 (bsc#1206346):

- CVE-2023-29402: cmd/go: Fixed cgo code injection (bsc#1212073).                                                                                                                              
- CVE-2023-29403: runtime: Fixed unexpected behavior of setuid/setgid binaries (bsc#1212074).                                                                                                  
- CVE-2023-29404: cmd/go: Fixed improper sanitization of LDFLAGS (bsc#1212075).                                                                                                                
- CVE-2023-29405: cmd/go: Fixed improper sanitization of LDFLAGS (bsc#1212076).                                                                                                                
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-16"/>
	<updated date="2023-06-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206346">SUSE bug 1206346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212073">SUSE bug 1212073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212074">SUSE bug 1212074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212075">SUSE bug 1212075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212076">SUSE bug 1212076</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29402/">CVE-2023-29402 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29402">CVE-2023-29402 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29403/">CVE-2023-29403 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29403">CVE-2023-29403 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29404/">CVE-2023-29404 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29404">CVE-2023-29404 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29405/">CVE-2023-29405 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29405">CVE-2023-29405 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009765054" comment="go1.20-1.20.5-150000.1.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765055" comment="go1.20-doc-1.20.5-150000.1.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765056" comment="go1.20-race-1.20.5-150000.1.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4173" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1172073" ref_url="https://bugzilla.suse.com/1172073" source="BUGZILLA"/>
		<reference ref_id="1191731" ref_url="https://bugzilla.suse.com/1191731" source="BUGZILLA"/>
		<reference ref_id="1199046" ref_url="https://bugzilla.suse.com/1199046" source="BUGZILLA"/>
		<reference ref_id="1204405" ref_url="https://bugzilla.suse.com/1204405" source="BUGZILLA"/>
		<reference ref_id="1205756" ref_url="https://bugzilla.suse.com/1205756" source="BUGZILLA"/>
		<reference ref_id="1205758" ref_url="https://bugzilla.suse.com/1205758" source="BUGZILLA"/>
		<reference ref_id="1205760" ref_url="https://bugzilla.suse.com/1205760" source="BUGZILLA"/>
		<reference ref_id="1205762" ref_url="https://bugzilla.suse.com/1205762" source="BUGZILLA"/>
		<reference ref_id="1205803" ref_url="https://bugzilla.suse.com/1205803" source="BUGZILLA"/>
		<reference ref_id="1206878" ref_url="https://bugzilla.suse.com/1206878" source="BUGZILLA"/>
		<reference ref_id="1208600" ref_url="https://bugzilla.suse.com/1208600" source="BUGZILLA"/>
		<reference ref_id="1209287" ref_url="https://bugzilla.suse.com/1209287" source="BUGZILLA"/>
		<reference ref_id="1209366" ref_url="https://bugzilla.suse.com/1209366" source="BUGZILLA"/>
		<reference ref_id="1210629" ref_url="https://bugzilla.suse.com/1210629" source="BUGZILLA"/>
		<reference ref_id="1210715" ref_url="https://bugzilla.suse.com/1210715" source="BUGZILLA"/>
		<reference ref_id="1210783" ref_url="https://bugzilla.suse.com/1210783" source="BUGZILLA"/>
		<reference ref_id="1210791" ref_url="https://bugzilla.suse.com/1210791" source="BUGZILLA"/>
		<reference ref_id="1210940" ref_url="https://bugzilla.suse.com/1210940" source="BUGZILLA"/>
		<reference ref_id="1211037" ref_url="https://bugzilla.suse.com/1211037" source="BUGZILLA"/>
		<reference ref_id="1211089" ref_url="https://bugzilla.suse.com/1211089" source="BUGZILLA"/>
		<reference ref_id="1211105" ref_url="https://bugzilla.suse.com/1211105" source="BUGZILLA"/>
		<reference ref_id="1211186" ref_url="https://bugzilla.suse.com/1211186" source="BUGZILLA"/>
		<reference ref_id="1211519" ref_url="https://bugzilla.suse.com/1211519" source="BUGZILLA"/>
		<reference ref_id="1211592" ref_url="https://bugzilla.suse.com/1211592" source="BUGZILLA"/>
		<reference ref_id="1211622" ref_url="https://bugzilla.suse.com/1211622" source="BUGZILLA"/>
		<reference ref_id="1211796" ref_url="https://bugzilla.suse.com/1211796" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-3566" ref_url="https://www.suse.com/security/cve/CVE-2022-3566/" source="CVE"/>
		<reference ref_id="CVE-2022-45884" ref_url="https://www.suse.com/security/cve/CVE-2022-45884/" source="CVE"/>
		<reference ref_id="CVE-2022-45885" ref_url="https://www.suse.com/security/cve/CVE-2022-45885/" source="CVE"/>
		<reference ref_id="CVE-2022-45886" ref_url="https://www.suse.com/security/cve/CVE-2022-45886/" source="CVE"/>
		<reference ref_id="CVE-2022-45887" ref_url="https://www.suse.com/security/cve/CVE-2022-45887/" source="CVE"/>
		<reference ref_id="CVE-2022-45919" ref_url="https://www.suse.com/security/cve/CVE-2022-45919/" source="CVE"/>
		<reference ref_id="CVE-2023-1077" ref_url="https://www.suse.com/security/cve/CVE-2023-1077/" source="CVE"/>
		<reference ref_id="CVE-2023-1380" ref_url="https://www.suse.com/security/cve/CVE-2023-1380/" source="CVE"/>
		<reference ref_id="CVE-2023-2176" ref_url="https://www.suse.com/security/cve/CVE-2023-2176/" source="CVE"/>
		<reference ref_id="CVE-2023-2194" ref_url="https://www.suse.com/security/cve/CVE-2023-2194/" source="CVE"/>
		<reference ref_id="CVE-2023-2483" ref_url="https://www.suse.com/security/cve/CVE-2023-2483/" source="CVE"/>
		<reference ref_id="CVE-2023-2513" ref_url="https://www.suse.com/security/cve/CVE-2023-2513/" source="CVE"/>
		<reference ref_id="CVE-2023-28466" ref_url="https://www.suse.com/security/cve/CVE-2023-28466/" source="CVE"/>
		<reference ref_id="CVE-2023-31084" ref_url="https://www.suse.com/security/cve/CVE-2023-31084/" source="CVE"/>
		<reference ref_id="CVE-2023-31436" ref_url="https://www.suse.com/security/cve/CVE-2023-31436/" source="CVE"/>
		<reference ref_id="CVE-2023-32269" ref_url="https://www.suse.com/security/cve/CVE-2023-32269/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029918.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2023-1077: Fixed a type confusion in pick_next_rt_entity(), that could cause memory corruption (bsc#1208600).
- CVE-2022-3566: Fixed race condition in the TCP Handler (bsc#1204405).
- CVE-2022-45886: Fixed a .disconnect versus dvb_device_open race condition in dvb_net.c that lead to a use-after-free (bsc#1205760).
- CVE-2022-45885: Fixed a race condition in dvb_frontend.c that could cause a use-after-free when a device is disconnected (bsc#1205758).
- CVE-2022-45887: Fixed a memory leak in ttusb_dec.c caused by the lack of a dvb_frontend_detach call (bsc#1205762).
- CVE-2022-45919: Fixed a use-after-free in dvb_ca_en50221.c that could occur if there is a disconnect after an open, because of the lack of a wait_event (bsc#1205803).
- CVE-2022-45884: Fixed a use-after-free in dvbdev.c, related to dvb_register_device dynamically allocating fops (bsc#1205756).
- CVE-2023-31084: Fixed a blocking issue in drivers/media/dvb-core/dvb_frontend.c (bsc#1210783).
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210940).
- CVE-2023-2194: Fixed an out-of-bounds write vulnerability in the SLIMpro I2C device driver (bsc#1210715).
- CVE-2023-32269: Fixed a use-after-free in af_netrom.c, related to the fact that accept() was also allowed for a successfully connected AF_NETROM socket (bsc#1211186).
- CVE-2023-28466: Fixed race condition that could lead to use-after-free or NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c (bsc#1209366).
- CVE-2023-1380: Fixed a slab-out-of-bound read problem in brcmf_get_assoc_ies() (bsc#1209287).
- CVE-2023-2513: Fixed a use-after-free vulnerability in the ext4 filesystem (bsc#1211105).
- CVE-2023-2483: Fixed a use after free bug in emac_remove caused by a race condition (bsc#1211037).
- CVE-2023-2176: Fixed an out-of-boundary read in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA (bsc#1210629).

The following non-security bugs were fixed:

- ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h (bsc#1206878).
- google/gve:fix repeated words in comments (bsc#1211519).
- gve: Adding a new AdminQ command to verify driver (bsc#1211519).
- gve: Cache link_speed value from device (bsc#1211519).
- gve: Fix GFP flags when allocing pages (bsc#1211519).
- gve: Fix error return code in gve_prefill_rx_pages() (bsc#1211519).
- gve: Fix spelling mistake 'droping' -&gt; 'dropping' (bsc#1211519).
- gve: Handle alternate miss completions (bsc#1211519).
- gve: Reduce alloc and copy costs in the GQ rx path (bsc#1211519).
- gve: Remove the code of clearing PBA bit (bsc#1211519).
- gve: Secure enough bytes in the first TX desc for all TCP pkts (bsc#1211519).
- gve: enhance no queue page list detection (bsc#1211519).
- hv: vmbus: Optimize vmbus_on_event (bsc#1211622).
- ipv6: sr: fix out-of-bounds read when setting HMAC data (bsc#1211592).
- kernel-binary: install expoline.o (boo#1210791 bsc#1211089)
- scsi: storvsc: Parameterize number hardware queues (bsc#1211622).
- usrmerge: Compatibility with earlier rpm (boo#1211796)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-19"/>
	<updated date="2023-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172073">SUSE bug 1172073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191731">SUSE bug 1191731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199046">SUSE bug 1199046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204405">SUSE bug 1204405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205756">SUSE bug 1205756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205758">SUSE bug 1205758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205760">SUSE bug 1205760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205762">SUSE bug 1205762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205803">SUSE bug 1205803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206878">SUSE bug 1206878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208600">SUSE bug 1208600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209287">SUSE bug 1209287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209366">SUSE bug 1209366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210629">SUSE bug 1210629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210715">SUSE bug 1210715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210783">SUSE bug 1210783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210791">SUSE bug 1210791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210940">SUSE bug 1210940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211037">SUSE bug 1211037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211089">SUSE bug 1211089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211105">SUSE bug 1211105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211186">SUSE bug 1211186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211519">SUSE bug 1211519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211592">SUSE bug 1211592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211622">SUSE bug 1211622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211796">SUSE bug 1211796</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3566/">CVE-2022-3566 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3566">CVE-2022-3566 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45884/">CVE-2022-45884 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45884">CVE-2022-45884 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45885/">CVE-2022-45885 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45885">CVE-2022-45885 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45886/">CVE-2022-45886 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45886">CVE-2022-45886 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45887/">CVE-2022-45887 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45887">CVE-2022-45887 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45919/">CVE-2022-45919 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45919">CVE-2022-45919 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1077/">CVE-2023-1077 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1077">CVE-2023-1077 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1380/">CVE-2023-1380 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1380">CVE-2023-1380 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2176/">CVE-2023-2176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2176">CVE-2023-2176 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-2194/">CVE-2023-2194 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2194">CVE-2023-2194 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2483/">CVE-2023-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-2483">CVE-2023-2483 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2513/">CVE-2023-2513 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2513">CVE-2023-2513 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28466/">CVE-2023-28466 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28466">CVE-2023-28466 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31084/">CVE-2023-31084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31084">CVE-2023-31084 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31436/">CVE-2023-31436 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31436">CVE-2023-31436 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32269/">CVE-2023-32269 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32269">CVE-2023-32269 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009765060" comment="kernel-vanilla-4.12.14-150100.197.148.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765061" comment="kernel-vanilla-base-4.12.14-150100.197.148.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765062" comment="kernel-vanilla-devel-4.12.14-150100.197.148.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765063" comment="kernel-vanilla-livepatch-devel-4.12.14-150100.197.148.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4174" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1208736" ref_url="https://bugzilla.suse.com/1208736" source="BUGZILLA"/>
		<reference ref_id="1209237" ref_url="https://bugzilla.suse.com/1209237" source="BUGZILLA"/>
		<reference ref_id="1209245" ref_url="https://bugzilla.suse.com/1209245" source="BUGZILLA"/>
		<reference ref_id="1210315" ref_url="https://bugzilla.suse.com/1210315" source="BUGZILLA"/>
		<reference ref_id="1210570" ref_url="https://bugzilla.suse.com/1210570" source="BUGZILLA"/>
		<reference ref_id="1211433" ref_url="https://bugzilla.suse.com/1211433" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42335" ref_url="https://www.suse.com/security/cve/CVE-2022-42335/" source="CVE"/>
		<reference ref_id="CVE-2022-42336" ref_url="https://www.suse.com/security/cve/CVE-2022-42336/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2535-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029921.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security fixes:

- CVE-2022-42336: Fix an issue where guests configuring AMD
  Speculative Store Bypass Disable would have no effect (XSA-431)
  (bsc#1211433).
- CVE-2022-42335: Fixed an issue where guests running under shadow
  mode with a PCI devices passed through could force the hypervisor
  to dereference arbitrary memory, leading to a denial of service
  (XSA-430) (bsc#1210315).

Non-security fixes:

- Fixed a build warning false positive (bsc#1210570).
- Added missing debug-info to xen-syms (bsc#1209237).
- Updated to version 4.17.1 (bsc#1027519).
- Fixed a failure during VM destruction when using host-assisted kexec
  and kdump (bsc#1209245).
- Other upstream fixes (bsc#1027519).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-19"/>
	<updated date="2023-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208736">SUSE bug 1208736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209237">SUSE bug 1209237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209245">SUSE bug 1209245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210315">SUSE bug 1210315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210570">SUSE bug 1210570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211433">SUSE bug 1211433</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-42335/">CVE-2022-42335 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42335">CVE-2022-42335 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-42336/">CVE-2022-42336 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42336">CVE-2022-42336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009768640" comment="xen-4.17.1_04-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768641" comment="xen-devel-4.17.1_04-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768642" comment="xen-doc-html-4.17.1_04-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768643" comment="xen-libs-4.17.1_04-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768644" comment="xen-libs-32bit-4.17.1_04-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768645" comment="xen-tools-4.17.1_04-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768646" comment="xen-tools-domU-4.17.1_04-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767936" comment="xen-tools-xendomains-wait-disk-4.17.1_04-150500.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4175" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210054" ref_url="https://bugzilla.suse.com/1210054" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1668" ref_url="https://www.suse.com/security/cve/CVE-2023-1668/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2536-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029920.html" source="SUSE-SU"/>
		<description>
This update for openvswitch3 fixes the following issues:

- CVE-2023-1668: Fixed a remote denial of service that could be
  triggered via malformed IP packets (bsc#1210054).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-19"/>
	<updated date="2023-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210054">SUSE bug 1210054</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1668/">CVE-2023-1668 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1668">CVE-2023-1668 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009765211" comment="libopenvswitch-3_1-0-3.1.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765212" comment="libovn-23_03-0-23.03.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765213" comment="openvswitch3-3.1.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765214" comment="openvswitch3-devel-3.1.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768647" comment="openvswitch3-doc-3.1.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765215" comment="openvswitch3-ipsec-3.1.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765216" comment="openvswitch3-pki-3.1.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765217" comment="openvswitch3-test-3.1.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765218" comment="openvswitch3-vtep-3.1.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765219" comment="ovn3-23.03.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765220" comment="ovn3-central-23.03.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765221" comment="ovn3-devel-23.03.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768648" comment="ovn3-doc-23.03.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765222" comment="ovn3-docker-23.03.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765223" comment="ovn3-host-23.03.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765224" comment="ovn3-vtep-23.03.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765225" comment="python3-ovs3-3.1.0-150500.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4176" version="1" class="patch">
	<metadata>
		<title>Security update for jetty-minimal (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210620" ref_url="https://bugzilla.suse.com/1210620" source="BUGZILLA"/>
		<reference ref_id="1210621" ref_url="https://bugzilla.suse.com/1210621" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-26048" ref_url="https://www.suse.com/security/cve/CVE-2023-26048/" source="CVE"/>
		<reference ref_id="CVE-2023-26049" ref_url="https://www.suse.com/security/cve/CVE-2023-26049/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2539-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029919.html" source="SUSE-SU"/>
		<description>
This update for jetty-minimal fixes the following issues:

Updated to version 9.4.51.v20230217:
- CVE-2023-26048: Fixed an excessive memory consumption when
  processing a large multipart request (bsc#1210620)
- CVE-2023-26049: Fixed a cookie exfiltration issue due to improper
  parsing (bsc#1210621).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-19"/>
	<updated date="2023-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210620">SUSE bug 1210620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210621">SUSE bug 1210621</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-26048/">CVE-2023-26048 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26048">CVE-2023-26048 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-26049/">CVE-2023-26049 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26049">CVE-2023-26049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009760668" comment="jetty-annotations-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760669" comment="jetty-ant-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760670" comment="jetty-cdi-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760671" comment="jetty-client-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760672" comment="jetty-continuation-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760673" comment="jetty-deploy-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760674" comment="jetty-fcgi-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760675" comment="jetty-http-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760676" comment="jetty-http-spi-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760677" comment="jetty-io-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760678" comment="jetty-jaas-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760679" comment="jetty-jmx-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760680" comment="jetty-jndi-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760681" comment="jetty-jsp-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760682" comment="jetty-minimal-javadoc-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760683" comment="jetty-openid-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760684" comment="jetty-plus-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760685" comment="jetty-proxy-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760686" comment="jetty-quickstart-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760687" comment="jetty-rewrite-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760688" comment="jetty-security-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760689" comment="jetty-server-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760690" comment="jetty-servlet-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760691" comment="jetty-servlets-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760692" comment="jetty-start-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760693" comment="jetty-util-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760694" comment="jetty-util-ajax-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760695" comment="jetty-webapp-9.4.51-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009760696" comment="jetty-xml-9.4.51-150200.3.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4177" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.18 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211630" ref_url="https://bugzilla.suse.com/1211630" source="BUGZILLA"/>
		<reference ref_id="1211631" ref_url="https://bugzilla.suse.com/1211631" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2727" ref_url="https://www.suse.com/security/cve/CVE-2023-2727/" source="CVE"/>
		<reference ref_id="CVE-2023-2728" ref_url="https://www.suse.com/security/cve/CVE-2023-2728/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2541-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029931.html" source="SUSE-SU"/>
		<description>
This update for kubernetes1.18 fixes the following issues:

- CVE-2023-2727: Fixed bypassing policies imposed by the ImagePolicyWebhook admission plugin (bsc#1211630).
- CVE-2023-2728: Fixed bypassing enforce mountable secrets policy imposed by the ServiceAccount admission plugin (bsc#1211631).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-19"/>
	<updated date="2023-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211630">SUSE bug 1211630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211631">SUSE bug 1211631</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2727/">CVE-2023-2727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2727">CVE-2023-2727 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2728/">CVE-2023-2728 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2728">CVE-2023-2728 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009767679" comment="kubernetes1.18-client-1.18.10-150200.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767680" comment="kubernetes1.18-client-common-1.18.10-150200.5.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4178" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.23 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211630" ref_url="https://bugzilla.suse.com/1211630" source="BUGZILLA"/>
		<reference ref_id="1211631" ref_url="https://bugzilla.suse.com/1211631" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2727" ref_url="https://www.suse.com/security/cve/CVE-2023-2727/" source="CVE"/>
		<reference ref_id="CVE-2023-2728" ref_url="https://www.suse.com/security/cve/CVE-2023-2728/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2543-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029929.html" source="SUSE-SU"/>
		<description>
This update for kubernetes1.23 fixes the following issues:

- CVE-2023-2727: Fixed bypassing policies imposed by the ImagePolicyWebhook admission plugin (bsc#1211630).
- CVE-2023-2728: Fixed bypassing enforce mountable secrets policy imposed by the ServiceAccount admission plugin (bsc#1211631).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-19"/>
	<updated date="2023-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211630">SUSE bug 1211630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211631">SUSE bug 1211631</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2727/">CVE-2023-2727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2727">CVE-2023-2727 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2728/">CVE-2023-2728 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2728">CVE-2023-2728 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009768649" comment="kubernetes1.23-apiserver-1.23.17-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767929" comment="kubernetes1.23-client-1.23.17-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768650" comment="kubernetes1.23-client-bash-completion-1.23.17-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767930" comment="kubernetes1.23-client-common-1.23.17-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768651" comment="kubernetes1.23-client-fish-completion-1.23.17-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768652" comment="kubernetes1.23-controller-manager-1.23.17-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768653" comment="kubernetes1.23-kubeadm-1.23.17-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768654" comment="kubernetes1.23-kubelet-1.23.17-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768655" comment="kubernetes1.23-kubelet-common-1.23.17-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768656" comment="kubernetes1.23-proxy-1.23.17-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768657" comment="kubernetes1.23-scheduler-1.23.17-150500.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4179" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.24 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211630" ref_url="https://bugzilla.suse.com/1211630" source="BUGZILLA"/>
		<reference ref_id="1211631" ref_url="https://bugzilla.suse.com/1211631" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2727" ref_url="https://www.suse.com/security/cve/CVE-2023-2727/" source="CVE"/>
		<reference ref_id="CVE-2023-2728" ref_url="https://www.suse.com/security/cve/CVE-2023-2728/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2544-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029928.html" source="SUSE-SU"/>
		<description>
This update for kubernetes1.24 fixes the following issues:

- CVE-2023-2727: Fixed bypassing policies imposed by the ImagePolicyWebhook admission plugin (bsc#1211630).
- CVE-2023-2728: Fixed bypassing enforce mountable secrets policy imposed by the ServiceAccount admission plugin (bsc#1211631).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-19"/>
	<updated date="2023-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211630">SUSE bug 1211630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211631">SUSE bug 1211631</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2727/">CVE-2023-2727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2727">CVE-2023-2727 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2728/">CVE-2023-2728 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2728">CVE-2023-2728 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009768658" comment="kubernetes1.24-apiserver-1.24.13-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767931" comment="kubernetes1.24-client-1.24.13-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768659" comment="kubernetes1.24-client-bash-completion-1.24.13-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767932" comment="kubernetes1.24-client-common-1.24.13-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768660" comment="kubernetes1.24-client-fish-completion-1.24.13-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768661" comment="kubernetes1.24-controller-manager-1.24.13-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768662" comment="kubernetes1.24-kubeadm-1.24.13-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768663" comment="kubernetes1.24-kubelet-1.24.13-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768664" comment="kubernetes1.24-kubelet-common-1.24.13-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768665" comment="kubernetes1.24-proxy-1.24.13-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768666" comment="kubernetes1.24-scheduler-1.24.13-150500.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4180" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210398" ref_url="https://bugzilla.suse.com/1210398" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-27349" ref_url="https://www.suse.com/security/cve/CVE-2023-27349/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029926.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2023-27349: Fixed crash while handling unsupported events (bsc#1210398).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-19"/>
	<updated date="2023-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210398">SUSE bug 1210398</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-27349/">CVE-2023-27349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-27349">CVE-2023-27349 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009766952" comment="bluez-5.65-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768667" comment="bluez-auto-enable-devices-5.65-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768668" comment="bluez-cups-5.65-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768669" comment="bluez-deprecated-5.65-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009766955" comment="bluez-devel-5.65-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768670" comment="bluez-devel-32bit-5.65-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768671" comment="bluez-obexd-5.65-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768672" comment="bluez-test-5.65-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009766953" comment="bluez-zsh-completion-5.65-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009766954" comment="libbluetooth3-5.65-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768673" comment="libbluetooth3-32bit-5.65-150500.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4181" version="1" class="patch">
	<metadata>
		<title>Security update for python-reportlab (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212065" ref_url="https://bugzilla.suse.com/1212065" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-33733" ref_url="https://www.suse.com/security/cve/CVE-2023-33733/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2561-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029973.html" source="SUSE-SU"/>
		<description>
This update for python-reportlab fixes the following issues:

- CVE-2023-33733: Fixed arbitrary code execution via supplying a crafted PDF file (bsc#1212065).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-21"/>
	<updated date="2023-06-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1212065">SUSE bug 1212065</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-33733/">CVE-2023-33733 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33733">CVE-2023-33733 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765285" comment="python3-reportlab-3.4.0-150000.3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4182" version="1" class="patch">
	<metadata>
		<title>Security update for Salt (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1207071" ref_url="https://bugzilla.suse.com/1207071" source="BUGZILLA"/>
		<reference ref_id="1209233" ref_url="https://bugzilla.suse.com/1209233" source="BUGZILLA"/>
		<reference ref_id="1211612" ref_url="https://bugzilla.suse.com/1211612" source="BUGZILLA"/>
		<reference ref_id="1211754" ref_url="https://bugzilla.suse.com/1211754" source="BUGZILLA"/>
		<reference ref_id="1212516" ref_url="https://bugzilla.suse.com/1212516" source="BUGZILLA"/>
		<reference ref_id="1212517" ref_url="https://bugzilla.suse.com/1212517" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029957.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

salt:

- Update to Salt release version 3006.0 (jsc#PED-4361)
  * See release notes: https://docs.saltproject.io/en/latest/topics/releases/3006.0.html
- Add missing patch after rebase to fix collections Mapping issues
- Add python3-looseversion as new dependency for salt
- Add python3-packaging as new dependency for salt
- Allow entrypoint compatibility for 'importlib-metadata&gt;=5.0.0' (bsc#1207071)
- Avoid conflicts with Salt dependencies versions (bsc#1211612)
- Avoid failures due transactional_update module not available in Salt 3006.0 (bsc#1211754)
- Create new salt-tests subpackage containing Salt tests
- Drop conflictive patch dicarded from upstream
- Fix package build with old setuptools versions
- Fix SLS rendering error when Jinja macros are used
- Fix version detection and avoid building and testing failures
- Prevent deadlocks in salt-ssh executions
- Require python3-jmespath runtime dependency (bsc#1209233)
- Make master_tops compatible with Salt 3000 and older minions (bsc#1212516, bsc#1212517)
    
python-jmespath:
    
- Deliver python3-jmespath to SUSE Linux Enterprise Micro on s390x architecture as it is now required by Salt
  (no source changes)
    
python-ply:
    
- Deliver python3-ply to SUSE Linux Enterprise Micro on s390x architecture as it is a requirement for python-jmespath
  (no source changes)
 		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-21"/>
	<updated date="2023-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1207071">SUSE bug 1207071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209233">SUSE bug 1209233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211612">SUSE bug 1211612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211754">SUSE bug 1211754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212516">SUSE bug 1212516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212517">SUSE bug 1212517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009767683" comment="python-ply-doc-3.10-150000.3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767684" comment="python3-jmespath-0.9.3-150000.3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767685" comment="python3-ply-3.10-150000.3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767687" comment="python3-simplejson-3.17.2-150300.3.2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4183" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1192154" ref_url="https://bugzilla.suse.com/1192154" source="BUGZILLA"/>
		<reference ref_id="1192696" ref_url="https://bugzilla.suse.com/1192696" source="BUGZILLA"/>
		<reference ref_id="1200480" ref_url="https://bugzilla.suse.com/1200480" source="BUGZILLA"/>
		<reference ref_id="1201535" ref_url="https://bugzilla.suse.com/1201535" source="BUGZILLA"/>
		<reference ref_id="1201539" ref_url="https://bugzilla.suse.com/1201539" source="BUGZILLA"/>
		<reference ref_id="1203185" ref_url="https://bugzilla.suse.com/1203185" source="BUGZILLA"/>
		<reference ref_id="1203596" ref_url="https://bugzilla.suse.com/1203596" source="BUGZILLA"/>
		<reference ref_id="1203597" ref_url="https://bugzilla.suse.com/1203597" source="BUGZILLA"/>
		<reference ref_id="1204501" ref_url="https://bugzilla.suse.com/1204501" source="BUGZILLA"/>
		<reference ref_id="1209645" ref_url="https://bugzilla.suse.com/1209645" source="BUGZILLA"/>
		<reference ref_id="1210907" ref_url="https://bugzilla.suse.com/1210907" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7753" ref_url="https://www.suse.com/security/cve/CVE-2020-7753/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<reference ref_id="CVE-2021-43138" ref_url="https://www.suse.com/security/cve/CVE-2021-43138/" source="CVE"/>
		<reference ref_id="CVE-2022-0155" ref_url="https://www.suse.com/security/cve/CVE-2022-0155/" source="CVE"/>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<reference ref_id="CVE-2022-31097" ref_url="https://www.suse.com/security/cve/CVE-2022-31097/" source="CVE"/>
		<reference ref_id="CVE-2022-31107" ref_url="https://www.suse.com/security/cve/CVE-2022-31107/" source="CVE"/>
		<reference ref_id="CVE-2022-32149" ref_url="https://www.suse.com/security/cve/CVE-2022-32149/" source="CVE"/>
		<reference ref_id="CVE-2022-35957" ref_url="https://www.suse.com/security/cve/CVE-2022-35957/" source="CVE"/>
		<reference ref_id="CVE-2022-36062" ref_url="https://www.suse.com/security/cve/CVE-2022-36062/" source="CVE"/>
		<reference ref_id="CVE-2023-1387" ref_url="https://www.suse.com/security/cve/CVE-2023-1387/" source="CVE"/>
		<reference ref_id="CVE-2023-1410" ref_url="https://www.suse.com/security/cve/CVE-2023-1410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2575-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029953.html" source="SUSE-SU"/>
		<description>
This update fixes the following issues:

grafana:

- Version update from 8.5.22 to 9.5.1 (jsc#PED-3694):
  * Security fixes:
    - CVE-2023-1410: grafana: Stored XSS in Graphite FunctionDescription tooltip (bsc#1209645)
    - CVE-2023-1387: grafana: JWT URL-login flow leaks token to data sources through request parameter in proxy requests
      (bnc#1210907)
    - CVE-2022-36062: grafana: Fix RBAC folders/dashboards privilege escalation (bsc#1203596)
    - CVE-2022-35957: grafana: Escalation from admin to server admin when auth proxy is used (bsc#1203597)
    - CVE-2022-32149: Upgrade x/text to version unaffected by CVE-2022-32149 (bsc#1204501)
    - CVE-2022-31107: grafana: OAuth account takeover (bsc#1201539)
    - CVE-2022-31097: grafana: stored XSS vulnerability (bsc#1201535)
    - CVE-2022-27664: go1.18,go1.19: net/http: handle server errors after sending GOAWAY (bsc#1203185)
    - CVE-2022-0155: follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor
    - CVE-2021-43138: spacewalk-web: a malicious user can obtain privileges via the mapValues() method(bsc#1200480)
    - CVE-2021-3918: json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes
      ('Prototype Pollution') (bsc#1192696)
    - CVE-2021-3807: node-ansi-regex: Inefficient Regular Expression Complexity in chalk/ansi-regex (bsc#1192154)
    - CVE-2020-7753: nodejs-trim: Regular Expression Denial of Service (ReDoS) in trim function 
  * Important changes:
    - Default named retention policies won't be used to query.
      Users who have a default named retention policy in their influxdb database, have to rename it to something else.
      To change the hardcoded retention policy in the dashboard.json, users must then select the right retention policy
      from dropdown and save the panel/dashboard.
    - Grafana Alerting rules with NoDataState configuration set to Alerting will now respect 'For' duration.
    - Users who use LDAP role sync to only sync Viewer, Editor and Admin roles, but grant Grafana Server Admin role
      manually will not be able to do that anymore. After this change, LDAP role sync will override any manual changes
      to Grafana Server Admin role assignments. If grafana_admin is left unset in LDAP role mapping configuration, it
      will default to false.
    - The InfluxDB backend migration feature toggle (influxdbBackendMigration) has been reintroduced in this version
      as issues were discovered with backend processing of InfluxDB data. Unless this feature toggle is enabled, all
      InfluxDB data will be parsed in the frontend. This frontend processing is the default behavior. 
      In Grafana 9.4.4, InfluxDB data parsing started to be handled in the backend. If you have upgraded to 9.4.4
      and then added new transformations on InfluxDB data, those panels will fail to render. To resolve this either:
      Remove the affected panel and re-create it or edit the `time` field as `Time` in `panel.json` 
      or `dashboard.json`
    - The `@grafana/ui` package helper function `selectOptionInTest` used in frontend tests has been removed as it
      caused testing libraries to be bundled in the production code of Grafana. If you were using this helper function
      in your tests please update your code accordingly.
    - Removed deprecated `checkHealth` prop from the `@grafana/e2e` `addDataSource` configuration. Previously this
      value defaulted to `false`, and has not been used in end-to-end tests since Grafana 8.0.3.
    - Removed the deprecated `LegacyBaseMap`, `LegacyValueMapping`, `LegacyValueMap`, and `LegacyRangeMap` types, and
      `getMappedValue` function from grafana-data. See the documentation for the migration.
      This change fixes a bug in Grafana where intermittent failure of database, network between Grafana and the
      database, or error in querying the database would cause all alert rules to be unscheduled in Grafana. 
      Following this change scheduled alert rules are not updated unless the query is successful.
    - The `get_alert_rules_duration_seconds` metric has been renamed to `schedule_query_alert_rules_duration_seconds`
    - Any secret (data sources credential, alert manager credential, etc, etc) created or modified with Grafana v9.0
      won't be decryptable from any previous version (by default) because the way encrypted secrets are stored into the
      database has changed. Although secrets created or modified with previous versions will still be decryptable by
      Grafana v9.0.
    - If required, although generally discouraged, the `disableEnvelopeEncryption` feature toggle can be enabled to
      keep envelope encryption disabled once updating to Grafana
    - In case of need to rollback to an earlier version of Grafana (i.e. Grafana v8.x) for any reason, after being
      created or modified any secret with Grafana v9.0, the `envelopeEncryption` feature toggle will need to be enabled
      to keep backwards compatibility (only from `v8.3.x` a bit unstable, from `8.5.x` stable).
    - As a final attempt to deal with issues related with the aforementioned situations, the 
      `grafana-cli admin secrets-migration rollback` command has been designed to move back all the Grafana secrets
      encrypted with envelope encryption to legacy encryption. So, after running that command it should be safe to
      disable envelope encryption and/or roll back to a previous version of Grafana.
      Alternatively or complementarily to all the points above, backing up the Grafana database before updating could
      be a good idea to prevent disasters (although the risk of getting some secrets corrupted only applies to those 
      updates/created with after updating to Grafana v9.0).
    - In Elasticsearch, browser access mode was deprecated in grafana 7.4.0 and removed in 9.0.0. If you used this mode
      please switch to server access mode on the datasource configuration page.
    - Environment variables passed from Grafana to external Azure plugins have been renamed:
      `AZURE_CLOUD` renamed to `GFAZPL_AZURE_CLOUD`,
      `AZURE_MANAGED_IDENTITY_ENABLED` renamed to `GFAZPL_MANAGED_IDENTITY_ENABLED`,
      `AZURE_MANAGED_IDENTITY_CLIENT_ID` renamed to `GFAZPL_MANAGED_IDENTITY_CLIENT_ID`.
      There are no known plugins which were relying on these variables. Moving forward plugins should read Azure
      settings only via Grafana Azure SDK which properly handles old and new environment variables.
    - Removes support for for ElasticSearch versions after their end-of-life, currently versions &lt; 7.10.0.
      To continue to use ElasticSearch data source, upgrade ElasticSearch to version 7.10.0+.
    - Application Insights and Insight Analytics queries in Azure Monitor were deprecated in Grafana 8.0 and finally
      removed in 9.0. Deprecated queries will no longer be executed.
    - grafana/ui: Button now specifies a default type='button'.
      The `Button` component provided by @grafana/ui now specifies a default `type='button'` when no type is provided.
      In previous versions, if the attribute was not specified for buttons associated with a `&lt;form&gt;` the
      default value was `submit` per the specification. You can preserve the old behavior by explicitly setting the
      type attribute: `&lt;Button type='submit' /&gt;`
    - The `Rename by regex` transformation has been improved to allow global patterns of the form 
      `/&lt;stringToReplace&gt;/g`.
      Depending on the regex match used, this may cause some transformations to behave slightly differently. You can
      guarantee the same behaviour as before by wrapping the `match` string in forward slashes (`/`), e.g. `(.*)` would
      become `/(.*)/`
    - `&lt;Select /&gt;` menus will now portal to the document body by default. This is to give more consistent
      behaviour when positioning and overlaying. If you were setting`menuShouldPortal={true}` before you can safely 
      remove that prop and behaviour will be the same. If you weren't explicitly setting that prop, there should be no
      visible changes in behaviour but your tests may need updating. If you were setting `menuShouldPortal={false}`
      this will continue to prevent the menu from portalling.
    - Grafana alerting endpoint prefixed with `api/v1/rule/test` that tests a rule against a Corte/Loki data source now
      expects the data source UID as a path parameter instead of the data source numeric identifier.
    - Grafana alerting endpoints prefixed with `api/prometheus/` that proxy requests to a Cortex/Loki data source now
      expect the data source UID as a path parameter instead of the data source numeric identifier.
    - Grafana alerting endpoints prefixed with `api/ruler/` that proxy requests to a Cortex/Loki data source now expect
      the data source UID as a path parameter instead of the data
    - Grafana alerting endpoints prefixed with `api/alertmanager/` that proxy requests to an Alertmanager now expect
      the data source UID as a path parameter instead of the data source numeric identifier.
    - The format of log messages have been updated, `lvl` is now `level` and `eror`and `dbug` has been replaced with
      `error` and `debug`. The precision of timestamps has been increased.
      To smooth the transition, it is possible to opt-out of the new log format by enabling the feature toggle
      `oldlog`.
      This option will be removed in a future minor release.
    - In the Loki data source, the dataframe format used to represent Loki logs-data has been changed to a more
      efficient format. The query-result is represented by a single dataframe with a 'labels' column, instead of the
      separate dataframes for every labels-value. When displaying such data in explore, or in a logs-panel in the
      dashboard will continue to work without changes, but if the data was loaded into a different dashboard-panel, or
      Transforms were used, adjustments may be necessary. For example, if you used the 'labels to fields' 
      transformation with the logs data, please switch to the 'extract fields' transformation.
  * Deprecations:
    - The `grafana_database_conn_*` metrics are deprecated, and will be removed in a future version of Grafana. Use 
      the `go_sql_stats_*` metrics instead.
    - Support for compact Explore URLs is deprecated and will be removed in a future release. Until then, when
      navigating to Explore using the deprecated format the URLs are automatically converted. If you have
      existing links pointing to Explore update them using the format generated by Explore upon navigation.
      You can identify a compact URL by its format. Compact URLs have the left (and optionally right) url parameter as
      an array of strings, for example `&amp;left=['now-1h','now'...]`. The standard explore URLs follow a key/value
      pattern, for example `&amp;left={'datasource':'test'...}`. Please be sure to check your dashboards for any
      hardcoded links to Explore and update them to the standard URL pattern.
    - Chore: Remove deprecated DataSourceAPI methods.
    - Data: Remove deprecated types and functions from valueMappings.
    - Elasticsearch: Remove browser access mode.
    - Elasticsearch: Remove support for versions after their end of the life (&lt;7.10.0).
    - Explore: Remove support for legacy, compact format URLs.
    - Graph: Deprecate Graph (old) and make it no longer a visualization option for new panels.
    - `setExploreQueryField`, `setExploreMetricsQueryField` and `setExploreLogsQueryField` are now deprecated and will
      be removed in a future release. If you need to set a different query editor for Explore, conditionally render
      based on `props.app` in your regular query editor.
  * Changes:
    - User: Fix externalUserId not being populated.
      If you used any of these components please use them from grafana/experimental from now on:
       - AccessoryButton
       - EditorFieldGroup
       - EditorHeader
       - EditorField
       - EditorRow
       - EditorList
       - EditorRows
       - EditorSwitch
       - FlexItem
       - Stack
       - InlineSelect
       - InputGroup
       - Space
    - Starting with 9.1.0, existing heatmap panels will start using a new implementation. This can be disabled by
      setting the `useLegacyHeatmapPanel` feature flag to true. It can be tested on a single dashbobard by adding
      `?__feature.useLegacyHeatmapPanel=true` to any dashboard URL.
    - Logger: Enable new logging format by default.
    - Loki: Enable new visual query builder by default.
    - Plugins: Remove plugin list panel.
    - Install wrapper scripts under /usr/sbin
    - Install actual binaries under /usr/libexec/grafana (or /usr/lib under older distributions) and create a simlink 
      for wrapper scripts and the service (which expect the binary to be under /usr/share/grafana/bin)
    - Chore: Upgrade typescript to 4.6.4.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-21"/>
	<updated date="2023-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192154">SUSE bug 1192154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192696">SUSE bug 1192696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200480">SUSE bug 1200480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201535">SUSE bug 1201535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201539">SUSE bug 1201539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203185">SUSE bug 1203185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203596">SUSE bug 1203596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203597">SUSE bug 1203597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204501">SUSE bug 1204501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209645">SUSE bug 1209645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210907">SUSE bug 1210907</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7753/">CVE-2020-7753 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7753">CVE-2020-7753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3807">CVE-2021-3807 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3918">CVE-2021-3918 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43138/">CVE-2021-43138 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43138">CVE-2021-43138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0155/">CVE-2022-0155 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0155">CVE-2022-0155 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-31097/">CVE-2022-31097 at SUSE</cve>
	<cve impact="high" cvss3="8.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31097">CVE-2022-31097 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-31107/">CVE-2022-31107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31107">CVE-2022-31107 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32149/">CVE-2022-32149 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32149">CVE-2022-32149 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-35957/">CVE-2022-35957 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35957">CVE-2022-35957 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-36062/">CVE-2022-36062 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36062">CVE-2022-36062 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1387/">CVE-2023-1387 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1387">CVE-2023-1387 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-1410/">CVE-2023-1410 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1410">CVE-2023-1410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764582" comment="grafana-9.5.1-150200.3.41.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4184" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1192154" ref_url="https://bugzilla.suse.com/1192154" source="BUGZILLA"/>
		<reference ref_id="1192696" ref_url="https://bugzilla.suse.com/1192696" source="BUGZILLA"/>
		<reference ref_id="1200480" ref_url="https://bugzilla.suse.com/1200480" source="BUGZILLA"/>
		<reference ref_id="1201535" ref_url="https://bugzilla.suse.com/1201535" source="BUGZILLA"/>
		<reference ref_id="1201539" ref_url="https://bugzilla.suse.com/1201539" source="BUGZILLA"/>
		<reference ref_id="1203185" ref_url="https://bugzilla.suse.com/1203185" source="BUGZILLA"/>
		<reference ref_id="1203596" ref_url="https://bugzilla.suse.com/1203596" source="BUGZILLA"/>
		<reference ref_id="1203597" ref_url="https://bugzilla.suse.com/1203597" source="BUGZILLA"/>
		<reference ref_id="1203599" ref_url="https://bugzilla.suse.com/1203599" source="BUGZILLA"/>
		<reference ref_id="1204501" ref_url="https://bugzilla.suse.com/1204501" source="BUGZILLA"/>
		<reference ref_id="1207830" ref_url="https://bugzilla.suse.com/1207830" source="BUGZILLA"/>
		<reference ref_id="1208719" ref_url="https://bugzilla.suse.com/1208719" source="BUGZILLA"/>
		<reference ref_id="1209645" ref_url="https://bugzilla.suse.com/1209645" source="BUGZILLA"/>
		<reference ref_id="1210458" ref_url="https://bugzilla.suse.com/1210458" source="BUGZILLA"/>
		<reference ref_id="1210640" ref_url="https://bugzilla.suse.com/1210640" source="BUGZILLA"/>
		<reference ref_id="1210907" ref_url="https://bugzilla.suse.com/1210907" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7753" ref_url="https://www.suse.com/security/cve/CVE-2020-7753/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<reference ref_id="CVE-2021-43138" ref_url="https://www.suse.com/security/cve/CVE-2021-43138/" source="CVE"/>
		<reference ref_id="CVE-2022-0155" ref_url="https://www.suse.com/security/cve/CVE-2022-0155/" source="CVE"/>
		<reference ref_id="CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664/" source="CVE"/>
		<reference ref_id="CVE-2022-31097" ref_url="https://www.suse.com/security/cve/CVE-2022-31097/" source="CVE"/>
		<reference ref_id="CVE-2022-31107" ref_url="https://www.suse.com/security/cve/CVE-2022-31107/" source="CVE"/>
		<reference ref_id="CVE-2022-32149" ref_url="https://www.suse.com/security/cve/CVE-2022-32149/" source="CVE"/>
		<reference ref_id="CVE-2022-35957" ref_url="https://www.suse.com/security/cve/CVE-2022-35957/" source="CVE"/>
		<reference ref_id="CVE-2022-36062" ref_url="https://www.suse.com/security/cve/CVE-2022-36062/" source="CVE"/>
		<reference ref_id="CVE-2022-41715" ref_url="https://www.suse.com/security/cve/CVE-2022-41715/" source="CVE"/>
		<reference ref_id="CVE-2022-46146" ref_url="https://www.suse.com/security/cve/CVE-2022-46146/" source="CVE"/>
		<reference ref_id="CVE-2023-1387" ref_url="https://www.suse.com/security/cve/CVE-2023-1387/" source="CVE"/>
		<reference ref_id="CVE-2023-1410" ref_url="https://www.suse.com/security/cve/CVE-2023-1410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2578-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029951.html" source="SUSE-SU"/>
		<description>
This update fixes the following issues:

bind:

- Provide bind dependencies and solve installation issues on SUSE Linux Enterprise Micro
- There are no source changes    
    
dracut-saltboot:

- Update to version 0.1.1681904360.84ef141 
  * Load network configuration even when missing protocol version (bsc#1210640)

grafana:
    
- Version update from 8.5.22 to 9.5.1 (jsc#PED-3694):
  * Security fixes:
    - CVE-2023-1410: grafana: Stored XSS in Graphite FunctionDescription tooltip (bsc#1209645)
    - CVE-2023-1387: grafana: JWT URL-login flow leaks token to data sources through request parameter in proxy requests
      (bnc#1210907)
    - CVE-2022-36062: grafana: Fix RBAC folders/dashboards privilege escalation (bsc#1203596)
    - CVE-2022-35957: grafana: Escalation from admin to server admin when auth proxy is used (bsc#1203597)
    - CVE-2022-32149: Upgrade x/text to version unaffected by CVE-2022-32149 (bsc#1204501)
    - CVE-2022-31107: grafana: OAuth account takeover (bsc#1201539)
    - CVE-2022-31097: grafana: stored XSS vulnerability (bsc#1201535)
    - CVE-2022-27664: go1.18,go1.19: net/http: handle server errors after sending GOAWAY (bsc#1203185)
    - CVE-2022-0155: follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor
    - CVE-2021-43138: spacewalk-web: a malicious user can obtain privileges via the mapValues() method(bsc#1200480)
    - CVE-2021-3918: json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes
      ('Prototype Pollution') (bsc#1192696)
    - CVE-2021-3807: node-ansi-regex: Inefficient Regular Expression Complexity in chalk/ansi-regex (bsc#1192154)
    - CVE-2020-7753: nodejs-trim: Regular Expression Denial of Service (ReDoS) in trim function 
  * Important changes:
    - Default named retention policies won't be used to query.
      Users who have a default named retention policy in their influxdb database, have to rename it to something else.
      To change the hardcoded retention policy in the dashboard.json, users must then select the right retention policy
      from dropdown and save the panel/dashboard.
    - Grafana Alerting rules with NoDataState configuration set to Alerting will now respect 'For' duration.
    - Users who use LDAP role sync to only sync Viewer, Editor and Admin roles, but grant Grafana Server Admin role
      manually will not be able to do that anymore. After this change, LDAP role sync will override any manual changes
      to Grafana Server Admin role assignments. If grafana_admin is left unset in LDAP role mapping configuration, it
      will default to false.
    - The InfluxDB backend migration feature toggle (influxdbBackendMigration) has been reintroduced in this version
      as issues were discovered with backend processing of InfluxDB data. Unless this feature toggle is enabled, all
      InfluxDB data will be parsed in the frontend. This frontend processing is the default behavior. 
      In Grafana 9.4.4, InfluxDB data parsing started to be handled in the backend. If you have upgraded to 9.4.4
      and then added new transformations on InfluxDB data, those panels will fail to render. To resolve this either:
      Remove the affected panel and re-create it or edit the `time` field as `Time` in `panel.json` 
      or `dashboard.json`
    - The `@grafana/ui` package helper function `selectOptionInTest` used in frontend tests has been removed as it
      caused testing libraries to be bundled in the production code of Grafana. If you were using this helper function
      in your tests please update your code accordingly.
    - Removed deprecated `checkHealth` prop from the `@grafana/e2e` `addDataSource` configuration. Previously this
      value defaulted to `false`, and has not been used in end-to-end tests since Grafana 8.0.3.
    - Removed the deprecated `LegacyBaseMap`, `LegacyValueMapping`, `LegacyValueMap`, and `LegacyRangeMap` types, and
      `getMappedValue` function from grafana-data. See the documentation for the migration.
      This change fixes a bug in Grafana where intermittent failure of database, network between Grafana and the
      database, or error in querying the database would cause all alert rules to be unscheduled in Grafana. 
      Following this change scheduled alert rules are not updated unless the query is successful.
    - The `get_alert_rules_duration_seconds` metric has been renamed to `schedule_query_alert_rules_duration_seconds`
    - Any secret (data sources credential, alert manager credential, etc, etc) created or modified with Grafana v9.0
      won't be decryptable from any previous version (by default) because the way encrypted secrets are stored into the
      database has changed. Although secrets created or modified with previous versions will still be decryptable by
      Grafana v9.0.
    - If required, although generally discouraged, the `disableEnvelopeEncryption` feature toggle can be enabled to
      keep envelope encryption disabled once updating to Grafana
    - In case of need to rollback to an earlier version of Grafana (i.e. Grafana v8.x) for any reason, after being
      created or modified any secret with Grafana v9.0, the `envelopeEncryption` feature toggle will need to be enabled
      to keep backwards compatibility (only from `v8.3.x` a bit unstable, from `8.5.x` stable).
    - As a final attempt to deal with issues related with the aforementioned situations, the 
      `grafana-cli admin secrets-migration rollback` command has been designed to move back all the Grafana secrets
      encrypted with envelope encryption to legacy encryption. So, after running that command it should be safe to
      disable envelope encryption and/or roll back to a previous version of Grafana.
      Alternatively or complementarily to all the points above, backing up the Grafana database before updating could
      be a good idea to prevent disasters (although the risk of getting some secrets corrupted only applies to those 
      updates/created with after updating to Grafana v9.0).
    - In Elasticsearch, browser access mode was deprecated in grafana 7.4.0 and removed in 9.0.0. If you used this mode
      please switch to server access mode on the datasource configuration page.
    - Environment variables passed from Grafana to external Azure plugins have been renamed:
      `AZURE_CLOUD` renamed to `GFAZPL_AZURE_CLOUD`,
      `AZURE_MANAGED_IDENTITY_ENABLED` renamed to `GFAZPL_MANAGED_IDENTITY_ENABLED`,
      `AZURE_MANAGED_IDENTITY_CLIENT_ID` renamed to `GFAZPL_MANAGED_IDENTITY_CLIENT_ID`.
      There are no known plugins which were relying on these variables. Moving forward plugins should read Azure
      settings only via Grafana Azure SDK which properly handles old and new environment variables.
    - Removes support for for ElasticSearch versions after their end-of-life, currently versions &lt; 7.10.0.
      To continue to use ElasticSearch data source, upgrade ElasticSearch to version 7.10.0+.
    - Application Insights and Insight Analytics queries in Azure Monitor were deprecated in Grafana 8.0 and finally
      removed in 9.0. Deprecated queries will no longer be executed.
    - grafana/ui: Button now specifies a default type='button'.
      The `Button` component provided by @grafana/ui now specifies a default `type='button'` when no type is provided.
      In previous versions, if the attribute was not specified for buttons associated with a `&lt;form&gt;` the
      default value was `submit` per the specification. You can preserve the old behavior by explicitly setting the
      type attribute: `&lt;Button type='submit' /&gt;`
    - The `Rename by regex` transformation has been improved to allow global patterns of the form 
      `/&lt;stringToReplace&gt;/g`.
      Depending on the regex match used, this may cause some transformations to behave slightly differently. You can
      guarantee the same behaviour as before by wrapping the `match` string in forward slashes (`/`), e.g. `(.*)` would
      become `/(.*)/`
    - `&lt;Select /&gt;` menus will now portal to the document body by default. This is to give more consistent
      behaviour when positioning and overlaying. If you were setting`menuShouldPortal={true}` before you can safely 
      remove that prop and behaviour will be the same. If you weren't explicitly setting that prop, there should be no
      visible changes in behaviour but your tests may need updating. If you were setting `menuShouldPortal={false}`
      this will continue to prevent the menu from portalling.
    - Grafana alerting endpoint prefixed with `api/v1/rule/test` that tests a rule against a Corte/Loki data source now
      expects the data source UID as a path parameter instead of the data source numeric identifier.
    - Grafana alerting endpoints prefixed with `api/prometheus/` that proxy requests to a Cortex/Loki data source now
      expect the data source UID as a path parameter instead of the data source numeric identifier.
    - Grafana alerting endpoints prefixed with `api/ruler/` that proxy requests to a Cortex/Loki data source now expect
      the data source UID as a path parameter instead of the data
    - Grafana alerting endpoints prefixed with `api/alertmanager/` that proxy requests to an Alertmanager now expect
      the data source UID as a path parameter instead of the data source numeric identifier.
    - The format of log messages have been updated, `lvl` is now `level` and `eror`and `dbug` has been replaced with
      `error` and `debug`. The precision of timestamps has been increased.
      To smooth the transition, it is possible to opt-out of the new log format by enabling the feature toggle
      `oldlog`.
      This option will be removed in a future minor release.
    - In the Loki data source, the dataframe format used to represent Loki logs-data has been changed to a more
      efficient format. The query-result is represented by a single dataframe with a 'labels' column, instead of the
      separate dataframes for every labels-value. When displaying such data in explore, or in a logs-panel in the
      dashboard will continue to work without changes, but if the data was loaded into a different dashboard-panel, or
      Transforms were used, adjustments may be necessary. For example, if you used the 'labels to fields' 
      transformation with the logs data, please switch to the 'extract fields' transformation.
  * Deprecations:
    - The `grafana_database_conn_*` metrics are deprecated, and will be removed in a future version of Grafana. Use 
      the `go_sql_stats_*` metrics instead.
    - Support for compact Explore URLs is deprecated and will be removed in a future release. Until then, when
      navigating to Explore using the deprecated format the URLs are automatically converted. If you have
      existing links pointing to Explore update them using the format generated by Explore upon navigation.
      You can identify a compact URL by its format. Compact URLs have the left (and optionally right) url parameter as
      an array of strings, for example `&amp;left=['now-1h','now'...]`. The standard explore URLs follow a key/value
      pattern, for example `&amp;left={'datasource':'test'...}`. Please be sure to check your dashboards for any
      hardcoded links to Explore and update them to the standard URL pattern.
    - Chore: Remove deprecated DataSourceAPI methods.
    - Data: Remove deprecated types and functions from valueMappings.
    - Elasticsearch: Remove browser access mode.
    - Elasticsearch: Remove support for versions after their end of the life (&lt;7.10.0).
    - Explore: Remove support for legacy, compact format URLs.
    - Graph: Deprecate Graph (old) and make it no longer a visualization option for new panels.
    - `setExploreQueryField`, `setExploreMetricsQueryField` and `setExploreLogsQueryField` are now deprecated and will
      be removed in a future release. If you need to set a different query editor for Explore, conditionally render
      based on `props.app` in your regular query editor.
  * Changes:
    - User: Fix externalUserId not being populated.
      If you used any of these components please use them from grafana/experimental from now on:
       - AccessoryButton
       - EditorFieldGroup
       - EditorHeader
       - EditorField
       - EditorRow
       - EditorList
       - EditorRows
       - EditorSwitch
       - FlexItem
       - Stack
       - InlineSelect
       - InputGroup
       - Space
    - Starting with 9.1.0, existing heatmap panels will start using a new implementation. This can be disabled by
      setting the `useLegacyHeatmapPanel` feature flag to true. It can be tested on a single dashbobard by adding
      `?__feature.useLegacyHeatmapPanel=true` to any dashboard URL.
    - Logger: Enable new logging format by default.
    - Loki: Enable new visual query builder by default.
    - Plugins: Remove plugin list panel.
    - Install wrapper scripts under /usr/sbin
    - Install actual binaries under /usr/libexec/grafana (or /usr/lib under older distributions) and create a simlink 
      for wrapper scripts and the service (which expect the binary to be under /usr/share/grafana/bin)
    - Chore: Upgrade typescript to 4.6.4.

mgr-daemon:

- Version 4.3.7-1
  * Update translation strings

spacecmd:

- Version 4.3.21-1
  * fix argument parsing of distribution_update (bsc#1210458)
- Version 4.3.20-1
  * Display activation key details after executing the corresponding command (bsc#1208719)
  * Show targetted packages before actually removing them (bsc#1207830)

uyuni-common-libs:

- Version 4.3.8-1
  * Allow default component for context manager

zypp-plugin-spacewalk:

- 1.0.14
  * SPEC cleanup
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-21"/>
	<updated date="2023-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192154">SUSE bug 1192154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192696">SUSE bug 1192696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200480">SUSE bug 1200480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201535">SUSE bug 1201535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201539">SUSE bug 1201539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203185">SUSE bug 1203185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203596">SUSE bug 1203596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203597">SUSE bug 1203597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203599">SUSE bug 1203599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204501">SUSE bug 1204501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207830">SUSE bug 1207830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208719">SUSE bug 1208719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209645">SUSE bug 1209645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210458">SUSE bug 1210458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210640">SUSE bug 1210640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210907">SUSE bug 1210907</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7753/">CVE-2020-7753 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7753">CVE-2020-7753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3807">CVE-2021-3807 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3918">CVE-2021-3918 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43138/">CVE-2021-43138 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43138">CVE-2021-43138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0155/">CVE-2022-0155 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0155">CVE-2022-0155 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-31097/">CVE-2022-31097 at SUSE</cve>
	<cve impact="high" cvss3="8.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31097">CVE-2022-31097 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-31107/">CVE-2022-31107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31107">CVE-2022-31107 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32149/">CVE-2022-32149 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32149">CVE-2022-32149 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-35957/">CVE-2022-35957 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35957">CVE-2022-35957 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-36062/">CVE-2022-36062 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36062">CVE-2022-36062 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41715/">CVE-2022-41715 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41715">CVE-2022-41715 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46146/">CVE-2022-46146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46146">CVE-2022-46146 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1387/">CVE-2023-1387 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1387">CVE-2023-1387 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-1410/">CVE-2023-1410 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1410">CVE-2023-1410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009758950" comment="dracut-saltboot-0.1.1681904360.84ef141-150000.1.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009758958" comment="spacecmd-4.3.21-150000.3.98.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767081" comment="wire-0.5.0-150000.1.12.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4185" version="1" class="patch">
	<metadata>
		<title>Security update for salt and python-pyzmq (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1186945" ref_url="https://bugzilla.suse.com/1186945" source="BUGZILLA"/>
		<reference ref_id="1207071" ref_url="https://bugzilla.suse.com/1207071" source="BUGZILLA"/>
		<reference ref_id="1209233" ref_url="https://bugzilla.suse.com/1209233" source="BUGZILLA"/>
		<reference ref_id="1211612" ref_url="https://bugzilla.suse.com/1211612" source="BUGZILLA"/>
		<reference ref_id="1211754" ref_url="https://bugzilla.suse.com/1211754" source="BUGZILLA"/>
		<reference ref_id="1212516" ref_url="https://bugzilla.suse.com/1212516" source="BUGZILLA"/>
		<reference ref_id="1212517" ref_url="https://bugzilla.suse.com/1212517" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034401.html" source="SUSE-SU"/>
		<description>
This update for salt and python-pyzmq fixes the following issues:

salt:

- Update to Salt release version 3006.0 (jsc#PED-4361)
  * See release notes: https://docs.saltproject.io/en/latest/topics/releases/3006.0.html
- Add missing patch after rebase to fix collections Mapping issues
- Add python3-looseversion as new dependency for salt
- Add python3-packaging as new dependency for salt
- Allow entrypoint compatibility for 'importlib-metadata&gt;=5.0.0' (bsc#1207071)
- Avoid conflicts with Salt dependencies versions (bsc#1211612)
- Avoid failures due transactional_update module not available in Salt 3006.0 (bsc#1211754)
- Create new salt-tests subpackage containing Salt tests
- Drop conflictive patch dicarded from upstream
- Fix package build with old setuptools versions
- Fix SLS rendering error when Jinja macros are used
- Fix version detection and avoid building and testing failures
- Prevent deadlocks in salt-ssh executions
- Require python3-jmespath runtime dependency (bsc#1209233)
- Make master_tops compatible with Salt 3000 and older minions (bsc#1212516, bsc#1212517)

python-pyzmq:

- Update python-pyzmq to version 17.1.2 in LTSS products (bsc#1186945)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-21"/>
	<updated date="2023-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186945">SUSE bug 1186945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207071">SUSE bug 1207071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209233">SUSE bug 1209233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211612">SUSE bug 1211612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211754">SUSE bug 1211754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212516">SUSE bug 1212516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212517">SUSE bug 1212517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009767681" comment="python3-pyzmq-17.1.2-150000.3.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767682" comment="python3-pyzmq-devel-17.1.2-150000.3.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4186" version="1" class="patch">
	<metadata>
		<title>Security update for golang-github-prometheus-prometheus (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1204023" ref_url="https://bugzilla.suse.com/1204023" source="BUGZILLA"/>
		<reference ref_id="1208049" ref_url="https://bugzilla.suse.com/1208049" source="BUGZILLA"/>
		<reference ref_id="1208298" ref_url="https://bugzilla.suse.com/1208298" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41715" ref_url="https://www.suse.com/security/cve/CVE-2022-41715/" source="CVE"/>
		<reference ref_id="CVE-2022-41723" ref_url="https://www.suse.com/security/cve/CVE-2022-41723/" source="CVE"/>
		<reference ref_id="CVE-2022-46146" ref_url="https://www.suse.com/security/cve/CVE-2022-46146/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2598-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034404.html" source="SUSE-SU"/>
		<description>
This update for golang-github-prometheus-prometheus fixes the following issues:

golang-github-prometheus-prometheus:

- Security issues fixed in this version update to 2.37.6:
  * CVE-2022-46146: Fix basic authentication bypass vulnerability (bsc#1208049, jsc#PED-3576)
  * CVE-2022-41715: Update our regexp library to fix upstream (bsc#1204023)
  * CVE-2022-41723: Fixed go issue to avoid quadratic complexity in HPACK decoding (bsc#1208298)
- Other non-security bugs fixed and changes in this version update to 2.37.6:    
  * [BUGFIX] TSDB: Turn off isolation for Head compaction to fix a memory leak.
  * [BUGFIX] TSDB: Fix 'invalid magic number 0' error on Prometheus startup.
  * [BUGFIX] Agent: Fix validation of flag options and prevent WAL from growing more than desired.
  * [BUGFIX] Properly close file descriptor when logging unfinished queries.
  * [BUGFIX] TSDB: In the WAL watcher metrics, expose the type='exemplar' label instead of type='unknown' for exemplar
    records.
  * [BUGFIX] Alerting: Fix Alertmanager targets not being updated when alerts were queued.
  * [BUGFIX] Hetzner SD: Make authentication files relative to Prometheus config file.
  * [BUGFIX] Promtool: Fix promtool check config not erroring properly on failures.
  * [BUGFIX] Scrape: Keep relabeled scrape interval and timeout on reloads.
  * [BUGFIX] TSDB: Don't increment prometheus_tsdb_compactions_failed_total when context is canceled.
  * [BUGFIX] TSDB: Fix panic if series is not found when deleting series.
  * [BUGFIX] TSDB: Increase prometheus_tsdb_mmap_chunk_corruptions_total on out of sequence errors.
  * [BUGFIX] Uyuni SD: Make authentication files relative to Prometheus configuration file and fix default configuration
    values.
  * [BUGFIX] Fix serving of static assets like fonts and favicon.
  * [BUGFIX] promtool: Add --lint-fatal option.
  * [BUGFIX] Changing TotalQueryableSamples from int to int64.
  * [BUGFIX] tsdb/agent: Ignore duplicate exemplars.
  * [BUGFIX] TSDB: Fix chunk overflow appending samples at a variable rate.
  * [BUGFIX] Stop rule manager before TSDB is stopped.
  * [BUGFIX] Kubernetes SD: Explicitly include gcp auth from k8s.io.
  * [BUGFIX] Fix OpenMetrics parser to sort uppercase labels correctly.
  * [BUGFIX] UI: Fix scrape interval and duration tooltip not showing on target page.
  * [BUGFIX] Tracing/GRPC: Set TLS credentials only when insecure is false.
  * [BUGFIX] Agent: Fix ID collision when loading a WAL with multiple segments.
  * [BUGFIX] Remote-write: Fix a deadlock between Batch and flushing the queue.
  * [BUGFIX] PromQL: Properly return an error from histogram_quantile when metrics have the same labelset.
  * [BUGFIX] UI: Fix bug that sets the range input to the resolution.
  * [BUGFIX] TSDB: Fix a query panic when memory-snapshot-on-shutdown is enabled.
  * [BUGFIX] Parser: Specify type in metadata parser errors.
  * [BUGFIX] Scrape: Fix label limit changes not applying.
  * [BUGFIX] Remote-write: Fix deadlock between adding to queue and getting batch.
  * [BUGFIX] TSDB: Fix panic when m-mapping head chunks onto the disk.
  * [BUGFIX] Azure SD: Fix a regression when public IP Address isn't set.
  * [BUGFIX] Azure SD: Fix panic when public IP Address isn't set.
  * [BUGFIX] Remote-write: Fix deadlock when stopping a shard.
  * [BUGFIX] SD: Fix no such file or directory in K8s SD when not running inside K8s.
  * [BUGFIX] Promtool: Make exit codes more consistent.
  * [BUGFIX] Promtool: Fix flakiness of rule testing.
  * [BUGFIX] Remote-write: Update prometheus_remote_storage_queue_highest_sent_timestamp_seconds metric when write
    irrecoverably fails.
  * [BUGFIX] Storage: Avoid panic in BufferedSeriesIterator.
  * [BUGFIX] TSDB: CompactBlockMetas should produce correct mint/maxt for overlapping blocks.
  * [BUGFIX] TSDB: Fix logging of exemplar storage size.
  * [BUGFIX] UI: Fix overlapping click targets for the alert state checkboxes.
  * [BUGFIX] UI: Fix Unhealthy filter on target page to actually display only Unhealthy targets.
  * [BUGFIX] UI: Fix autocompletion when expression is empty.
  * [BUGFIX] TSDB: Fix deadlock from simultaneous GC and write.
  * [CHANGE] TSDB: Delete *.tmp WAL files when Prometheus starts.
  * [CHANGE] promtool: Add new flag --lint (enabled by default) for the commands check rules and check config, resulting
    in a new exit code (3) for linter errors.
  * [CHANGE] UI: Classic UI removed.
  * [CHANGE] Tracing: Migrate from Jaeger to OpenTelemetry based tracing.
  * [CHANGE] PromQL: Promote negative offset and @ modifer to stable features.
  * [CHANGE] Web: Promote remote-write-receiver to stable.
  * [FEATURE] Nomad SD: New service discovery for Nomad built-in service discovery.
  * [FEATURE] Add lowercase and uppercase relabel action.
  * [FEATURE] SD: Add IONOS Cloud integration.
  * [FEATURE] SD: Add Vultr integration.
  * [FEATURE] SD: Add Linode SD failure count metric.
  * [FEATURE] Add prometheus_ready metric.
  * [FEATURE] Support for automatically setting the variable GOMAXPROCS to the container CPU limit. 
    Enable with the flag `--enable-feature=auto-gomaxprocs`.
  * [FEATURE] PromQL: Extend statistics with total and peak number of samples in a query. 
    Additionally, per-step statistics are available with --enable-feature=promql-per-step-stats and using
    stats=all in the query API. Enable with the flag `--enable-feature=per-step-stats`.
  * [FEATURE] Config: Add stripPort template function.
  * [FEATURE] Promtool: Add cardinality analysis to check metrics, enabled by flag --extended.
  * [FEATURE] SD: Enable target discovery in own K8s namespace.
  * [FEATURE] SD: Add provider ID label in K8s SD.
  * [FEATURE] Web: Add limit field to the rules API.
  * [ENHANCEMENT] Kubernetes SD: Allow attaching node labels for endpoint role.
  * [ENHANCEMENT] PromQL: Optimise creation of signature with/without labels.
  * [ENHANCEMENT] TSDB: Memory optimizations.
  * [ENHANCEMENT] TSDB: Reduce sleep time when reading WAL.
  * [ENHANCEMENT] OAuth2: Add appropriate timeouts and User-Agent header.
  * [ENHANCEMENT] Add stripDomain to template function.
  * [ENHANCEMENT] UI: Enable active search through dropped targets.
  * [ENHANCEMENT] promtool: support matchers when querying label
  * [ENHANCEMENT] Add agent mode identifier.
  * [ENHANCEMENT] TSDB: more efficient sorting of postings read from WAL at startup.
  * [ENHANCEMENT] Azure SD: Add metric to track Azure SD failures.
  * [ENHANCEMENT] Azure SD: Add an optional resource_group configuration.
  * [ENHANCEMENT] Kubernetes SD: Support discovery.k8s.io/v1
    EndpointSlice (previously only discovery.k8s.io/v1beta1
    EndpointSlice was supported).
  * [ENHANCEMENT] Kubernetes SD: Allow attaching node metadata to discovered pods.
  * [ENHANCEMENT] OAuth2: Support for using a proxy URL to fetch OAuth2 tokens.
  * [ENHANCEMENT] Configuration: Add the ability to disable HTTP2.
  * [ENHANCEMENT] Config: Support overriding minimum TLS version.
  * [ENHANCEMENT] TSDB: Disable the chunk write queue by default and allow configuration with the experimental flag
    `--storage.tsdb.head-chunks-write-queue-size`.
  * [ENHANCEMENT] HTTP SD: Add a failure counter.
  * [ENHANCEMENT] Azure SD: Set Prometheus User-Agent on requests.
  * [ENHANCEMENT] Uyuni SD: Reduce the number of logins to Uyuni.
  * [ENHANCEMENT] Scrape: Log when an invalid media type is encountered during a scrape.
  * [ENHANCEMENT] Scrape: Accept application/openmetrics-text;version=1.0.0 in addition to version=0.0.1.
  * [ENHANCEMENT] Remote-read: Add an option to not use external labels as selectors for remote read.
  * [ENHANCEMENT] UI: Optimize the alerts page and add a search bar.
  * [ENHANCEMENT] UI: Improve graph colors that were hard to see.
  * [ENHANCEMENT] Config: Allow escaping of $ with $$ when using environment variables with external labels.
  * [ENHANCEMENT] Remote-write: Avoid allocations by buffering concrete structs instead of interfaces.
  * [ENHANCEMENT] Remote-write: Log time series details for out-of-order samples in remote write receiver.
  * [ENHANCEMENT] Remote-write: Shard up more when backlogged.
  * [ENHANCEMENT] TSDB: Use simpler map key to improve exemplar ingest performance.
  * [ENHANCEMENT] TSDB: Avoid allocations when popping from the intersected postings heap.
  * [ENHANCEMENT] TSDB: Make chunk writing non-blocking, avoiding latency spikes in remote-write.
  * [ENHANCEMENT] TSDB: Improve label matching performance.
  * [ENHANCEMENT] UI: Optimize the service discovery page and add a search bar.
  * [ENHANCEMENT] UI: Optimize the target page and add a search bar.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-21"/>
	<updated date="2023-06-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204023">SUSE bug 1204023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208049">SUSE bug 1208049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208298">SUSE bug 1208298</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41715/">CVE-2022-41715 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41715">CVE-2022-41715 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41723/">CVE-2022-41723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46146/">CVE-2022-46146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46146">CVE-2022-46146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009763509" comment="firewalld-prometheus-config-0.1-150100.4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009763510" comment="golang-github-prometheus-prometheus-2.37.6-150100.4.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4187" version="1" class="patch">
	<metadata>
		<title>Security update for rustup (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1208552" ref_url="https://bugzilla.suse.com/1208552" source="BUGZILLA"/>
		<reference ref_id="1210345" ref_url="https://bugzilla.suse.com/1210345" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31394" ref_url="https://www.suse.com/security/cve/CVE-2022-31394/" source="CVE"/>
		<reference ref_id="CVE-2023-26964" ref_url="https://www.suse.com/security/cve/CVE-2023-26964/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2603-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029998.html" source="SUSE-SU"/>
		<description>
This update for rustup fixes the following issues:

- CVE-2022-31394: Fixed possible HTTP2 attacks by specifying the HTTP/2 SETTINGS_MAX_HEADER_LIST_SIZE (bsc#1208552).
- CVE-2023-26964: Fixed high memory and CPU usage when stream stacking occurs when H2 processes HTTP2 RST_STREAM frames (bsc#1210345).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-22"/>
	<updated date="2023-06-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1208552">SUSE bug 1208552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210345">SUSE bug 1210345</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-31394/">CVE-2022-31394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31394">CVE-2022-31394 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-26964/">CVE-2023-26964 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26964">CVE-2023-26964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009766710" comment="rustup-1.26.0~0-150400.3.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4188" version="1" class="patch">
	<metadata>
		<title>Security update for open-vm-tools (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210695" ref_url="https://bugzilla.suse.com/1210695" source="BUGZILLA"/>
		<reference ref_id="1212143" ref_url="https://bugzilla.suse.com/1212143" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-20867" ref_url="https://www.suse.com/security/cve/CVE-2023-20867/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2604-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029997.html" source="SUSE-SU"/>
		<description>
This update for open-vm-tools fixes the following issues:

- CVE-2023-20867: Fixed authentication bypass vulnerability in the vgauth module (bsc#1212143).

Bug fixes:

- Fixed build problem with grpc 1.54 (bsc#1210695).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-22"/>
	<updated date="2023-06-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210695">SUSE bug 1210695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212143">SUSE bug 1212143</bugzilla>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-20867/">CVE-2023-20867 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20867">CVE-2023-20867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009767117" comment="libvmtools-devel-12.2.0-150300.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767118" comment="libvmtools0-12.2.0-150300.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767119" comment="open-vm-tools-12.2.0-150300.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767120" comment="open-vm-tools-desktop-12.2.0-150300.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767121" comment="open-vm-tools-salt-minion-12.2.0-150300.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767122" comment="open-vm-tools-sdmp-12.2.0-150300.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4189" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210390" ref_url="https://bugzilla.suse.com/1210390" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-26555" ref_url="https://www.suse.com/security/cve/CVE-2023-26555/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2608-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029993.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

- CVE-2023-26555: Fixed assertion failure on malformed RT-11 dates (bsc#1210390).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-22"/>
	<updated date="2023-06-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210390">SUSE bug 1210390</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-26555/">CVE-2023-26555 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26555">CVE-2023-26555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009767123" comment="ntp-4.2.8p17-150000.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767124" comment="ntp-doc-4.2.8p17-150000.4.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4190" version="1" class="patch">
	<metadata>
		<title>Security update for php8 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212349" ref_url="https://bugzilla.suse.com/1212349" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3247" ref_url="https://www.suse.com/security/cve/CVE-2023-3247/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2610-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029991.html" source="SUSE-SU"/>
		<description>
This update for php8 fixes the following issues:

- CVE-2023-3247: Fixed missing error check and insufficient random bytes in HTTP Digest authentication for SOAP (bsc#1212349).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-22"/>
	<updated date="2023-06-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212349">SUSE bug 1212349</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3247/">CVE-2023-3247 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3247">CVE-2023-3247 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009767709" comment="apache2-mod_php8-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767710" comment="php8-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767711" comment="php8-bcmath-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767712" comment="php8-bz2-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767713" comment="php8-calendar-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767714" comment="php8-cli-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767715" comment="php8-ctype-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767716" comment="php8-curl-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767717" comment="php8-dba-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767718" comment="php8-devel-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767719" comment="php8-dom-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767720" comment="php8-embed-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767721" comment="php8-enchant-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767722" comment="php8-exif-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767723" comment="php8-fastcgi-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767724" comment="php8-fileinfo-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767725" comment="php8-fpm-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767726" comment="php8-ftp-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767727" comment="php8-gd-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767728" comment="php8-gettext-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767729" comment="php8-gmp-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767730" comment="php8-iconv-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767731" comment="php8-intl-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767732" comment="php8-ldap-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767733" comment="php8-mbstring-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767734" comment="php8-mysql-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767735" comment="php8-odbc-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767736" comment="php8-opcache-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767737" comment="php8-openssl-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767738" comment="php8-pcntl-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767739" comment="php8-pdo-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767740" comment="php8-pgsql-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767741" comment="php8-phar-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767742" comment="php8-posix-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767743" comment="php8-readline-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767744" comment="php8-shmop-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767745" comment="php8-snmp-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767746" comment="php8-soap-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767747" comment="php8-sockets-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767748" comment="php8-sodium-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767749" comment="php8-sqlite-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767750" comment="php8-sysvmsg-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767751" comment="php8-sysvsem-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767752" comment="php8-sysvshm-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767753" comment="php8-test-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767754" comment="php8-tidy-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767755" comment="php8-tokenizer-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767756" comment="php8-xmlreader-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767757" comment="php8-xmlwriter-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767758" comment="php8-xsl-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767759" comment="php8-zip-8.0.29-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767760" comment="php8-zlib-8.0.29-150400.4.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4191" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211922" ref_url="https://bugzilla.suse.com/1211922" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-34414" ref_url="https://www.suse.com/security/cve/CVE-2023-34414/" source="CVE"/>
		<reference ref_id="CVE-2023-34416" ref_url="https://www.suse.com/security/cve/CVE-2023-34416/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018023.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Mozilla Thunderbird 102.12 MFSA 2023-21 (bsc#1211922):

- CVE-2023-34414: Click-jacking certificate exceptions through rendering lag
- CVE-2023-34416: Memory safety bugs fixed in Thunderbird 102.12
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-22"/>
	<updated date="2023-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211922">SUSE bug 1211922</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34414/">CVE-2023-34414 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34414">CVE-2023-34414 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34416/">CVE-2023-34416 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34416">CVE-2023-34416 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009766641" comment="MozillaThunderbird-102.12.0-150200.8.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009766642" comment="MozillaThunderbird-translations-common-102.12.0-150200.8.121.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009766643" comment="MozillaThunderbird-translations-other-102.12.0-150200.8.121.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4192" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212102" ref_url="https://bugzilla.suse.com/1212102" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3138" ref_url="https://www.suse.com/security/cve/CVE-2023-3138/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030001.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- CVE-2023-3138: Fixed buffer overflows in InitExt.c (bsc#1212102).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-22"/>
	<updated date="2023-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212102">SUSE bug 1212102</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3138/">CVE-2023-3138 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3138">CVE-2023-3138 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009767702" comment="libX11-6-1.6.5-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767703" comment="libX11-6-32bit-1.6.5-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767704" comment="libX11-data-1.6.5-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767705" comment="libX11-devel-1.6.5-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767706" comment="libX11-devel-32bit-1.6.5-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767707" comment="libX11-xcb1-1.6.5-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767708" comment="libX11-xcb1-32bit-1.6.5-150000.3.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4193" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212230" ref_url="https://bugzilla.suse.com/1212230" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-34241" ref_url="https://www.suse.com/security/cve/CVE-2023-34241/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2616-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030000.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2023-34241: Fixed a use-after-free problem in cupsdAcceptClient() (bsc#1212230).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-22"/>
	<updated date="2023-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212230">SUSE bug 1212230</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34241/">CVE-2023-34241 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34241">CVE-2023-34241 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009769103" comment="cups-2.2.7-150000.3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769104" comment="cups-client-2.2.7-150000.3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769105" comment="cups-config-2.2.7-150000.3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769106" comment="cups-ddk-2.2.7-150000.3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769107" comment="cups-devel-2.2.7-150000.3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769108" comment="cups-devel-32bit-2.2.7-150000.3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769109" comment="libcups2-2.2.7-150000.3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769110" comment="libcups2-32bit-2.2.7-150000.3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769111" comment="libcupscgi1-2.2.7-150000.3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769112" comment="libcupscgi1-32bit-2.2.7-150000.3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769113" comment="libcupsimage2-2.2.7-150000.3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769114" comment="libcupsimage2-32bit-2.2.7-150000.3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769115" comment="libcupsmime1-2.2.7-150000.3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769116" comment="libcupsmime1-32bit-2.2.7-150000.3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769117" comment="libcupsppdc1-2.2.7-150000.3.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769118" comment="libcupsppdc1-32bit-2.2.7-150000.3.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4194" version="1" class="patch">
	<metadata>
		<title>Security update for google-cloud-sap-agent (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206346" ref_url="https://bugzilla.suse.com/1206346" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2617-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030019.html" source="SUSE-SU"/>
		<description>

This update of google-cloud-sap-agent fixes the following issues:

- rebuild the package with the go 1.20 security release (bsc#1206346).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-23"/>
	<updated date="2023-06-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206346">SUSE bug 1206346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768698" comment="google-cloud-sap-agent-1.5.1-150100.3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4195" version="1" class="patch">
	<metadata>
		<title>Security update for dav1d (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211262" ref_url="https://bugzilla.suse.com/1211262" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32570" ref_url="https://www.suse.com/security/cve/CVE-2023-32570/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2618-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030017.html" source="SUSE-SU"/>
		<description>
This update for dav1d fixes the following issues:

- CVE-2023-32570: Fixed possible crash when decoding a frame (bsc#1211262).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-23"/>
	<updated date="2023-06-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211262">SUSE bug 1211262</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-32570/">CVE-2023-32570 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32570">CVE-2023-32570 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009764518" comment="dav1d-1.0.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764487" comment="dav1d-devel-1.0.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764488" comment="libdav1d6-1.0.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768674" comment="libdav1d6-32bit-1.0.0-150500.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4196" version="1" class="patch">
	<metadata>
		<title>Security update for python-sqlparse (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210617" ref_url="https://bugzilla.suse.com/1210617" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-30608" ref_url="https://www.suse.com/security/cve/CVE-2023-30608/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2619-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030016.html" source="SUSE-SU"/>
		<description>
This update for python-sqlparse fixes the following issues:

- CVE-2023-30608: Fixed a Regular Expression Denial of Service (ReDOS) vulnerability (bsc#1210617).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-23"/>
	<updated date="2023-06-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210617">SUSE bug 1210617</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-30608/">CVE-2023-30608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30608">CVE-2023-30608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764637" comment="python3-sqlparse-0.4.2-150300.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4197" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210714" ref_url="https://bugzilla.suse.com/1210714" source="BUGZILLA"/>
		<reference ref_id="1211430" ref_url="https://bugzilla.suse.com/1211430" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1255" ref_url="https://www.suse.com/security/cve/CVE-2023-1255/" source="CVE"/>
		<reference ref_id="CVE-2023-2650" ref_url="https://www.suse.com/security/cve/CVE-2023-2650/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030015.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2023-1255: Fixed input buffer over-read in AES-XTS implementation on 64 bit ARM (bsc#1210714).
- CVE-2023-2650: Fixed possible DoS translating ASN.1 object identifiers (bsc#1211430).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-23"/>
	<updated date="2023-06-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210714">SUSE bug 1210714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211430">SUSE bug 1211430</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1255/">CVE-2023-1255 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1255">CVE-2023-1255 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2650/">CVE-2023-2650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009764828" comment="libopenssl-3-devel-3.0.8-150500.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768677" comment="libopenssl-3-devel-32bit-3.0.8-150500.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764829" comment="libopenssl3-3.0.8-150500.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768678" comment="libopenssl3-32bit-3.0.8-150500.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764830" comment="openssl-3-3.0.8-150500.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768679" comment="openssl-3-doc-3.0.8-150500.5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4198" version="1" class="patch">
	<metadata>
		<title>Security update for cloud-init (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1171511" ref_url="https://bugzilla.suse.com/1171511" source="BUGZILLA"/>
		<reference ref_id="1203393" ref_url="https://bugzilla.suse.com/1203393" source="BUGZILLA"/>
		<reference ref_id="1210277" ref_url="https://bugzilla.suse.com/1210277" source="BUGZILLA"/>
		<reference ref_id="1210652" ref_url="https://bugzilla.suse.com/1210652" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2084" ref_url="https://www.suse.com/security/cve/CVE-2022-2084/" source="CVE"/>
		<reference ref_id="CVE-2023-1786" ref_url="https://www.suse.com/security/cve/CVE-2023-1786/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015295.html" source="SUSE-SU"/>
		<description>
This update for cloud-init fixes the following issues:

- CVE-2023-1786: Do not expose sensitive data gathered from the CSP. (bsc#1210277)
- CVE-2022-2084: Fixed a bug which caused logging schema failures can include password hashes. (bsc#1210652)
    
- Update to version 23.1

  + Support transactional-updates for SUSE based distros
  + Set ownership for new folders in Write Files Module
  + add OpenCloudOS and TencentOS support
  + lxd: Retry if the server isn't ready 
  + test: switch pycloudlib source to pypi 
  + test: Fix integration test deprecation message 
  + Recognize opensuse-microos, dev tooling fixes 
  + sources/azure: refactor imds handler into own module 
  + docs: deprecation generation support 
  + add function is_virtual to distro/FreeBSD
  + cc_ssh: support multiple hostcertificates 
  + Fix minor schema validation regression and fixup typing 
  + doc: Reword user data debug section 
  + cli: schema also validate vendordata*.
  + ci: sort and add checks for cla signers file 
  + Add 'ederst' as contributor
  + readme: add reference to packages dir 
  + docs: update downstream package list 
  + docs: add google search verification 
  + docs: fix 404 render use default notfound_urls_prefix in RTD conf
  + Fix OpenStack datasource detection on bare metal
  + docs: add themed RTD 404 page and pointer to readthedocs-hosted 
  + schema: fix gpt labels, use type string for GUID 
  + cc_disk_setup: code cleanup 
  + netplan: keep custom strict perms when 50-cloud-init.yaml exists
  + cloud-id: better handling of change in datasource files
  + Warn on empty network key 
  + Fix Vultr cloud_interfaces usage 
  + cc_puppet: Update puppet service name 
  + docs: Clarify networking docs 
  + lint: remove httpretty 
  + cc_set_passwords: Prevent traceback when restarting ssh 
  + tests: fix lp1912844 
  + tests: Skip ansible test on bionic 
  + Wait for NetworkManager 
  + docs: minor polishing 
  + CI: migrate integration-test to GH actions 
  + Fix permission of SSH host keys 
  + Fix default route rendering on v2 ipv6
  + doc: fix path in net_convert command 
  + docs: update net_convert docs
  + doc: fix dead link
  + cc_set_hostname: ignore /var/lib/cloud/data/set-hostname if it's empty
  + distros/rhel.py: _read_hostname() missing strip on 'hostname'
  + integration tests: add  IBM VPC support 
  + machine-id: set to uninitialized to trigger regeneration on clones
  + sources/azure: retry on connection error when fetching metdata 
  + Ensure ssh state accurately obtained 
  + bddeb: drop dh-systemd dependency on newer deb-based releases 
  + doc: fix `config formats` link in cloudsigma.rst 
  + Fix wrong subp syntax in cc_set_passwords.py 
  + docs: update the PR template link to readthedocs 
  + ci: switch unittests to gh actions
  + Add mount_default_fields for PhotonOS. 
  + sources/azure: minor refactor for metadata source detection logic
  + add 'CalvoM' as contributor 
  + ci: doc to gh actions 
  + lxd: handle 404 from missing devices route for LXD 4.0 
  + docs: Diataxis overhaul 
  + vultr: Fix issue regarding cache and region codes 
  + cc_set_passwords: Move ssh status checking later 
  + Improve Wireguard module idempotency 
  + network/netplan: add gateways as on-link when necessary 
  + tests: test_lxd assert features.networks.zones when present 
  + Use btrfs enquque when available (#1926) [Robert Schweikert]
  + sources/azure: fix device driver matching for net config (#1914)
  + BSD: fix duplicate macs in Ifconfig parser 
  + pycloudlib: add lunar support for integration tests 
  + nocloud: add support for dmi variable expansion for seedfrom URL
  + tools: read-version drop extra call to git describe --long
  + doc: improve cc_write_files doc
  + read-version: When insufficient tags, use cloudinit.version.get_version
  + mounts: document weird prefix in schema 
  + Ensure network ready before cloud-init service runs on RHEL
  + docs: add copy button to code blocks 
  + netplan: define features.NETPLAN_CONFIG_ROOT_READ_ONLY flag
  + azure: fix support for systems without az command installed 
  + Fix the distro.osfamily output problem in the openEuler system. 
  + pycloudlib: bump commit dropping azure api smoke test
  + net: netplan config root read-only as wifi config can contain creds
  + autoinstall: clarify docs for users
  + sources/azure: encode health report as utf-8 
  + Add back gateway4/6 deprecation to docs 
  + networkd: Add support for multiple [Route] sections 
  + doc: add qemu tutorial 
  + lint: fix tip-flake8 and tip-mypy 
  + Add support for setting uid when creating users on FreeBSD 
  + Fix exception in BSD networking code-path 
  + Append derivatives to is_rhel list in cloud.cfg.tmpl 
  + FreeBSD init: use cloudinit_enable as only rcvar 
  + feat: add support aliyun metadata security harden mode 
  + docs: uprate analyze to performance page
  + test: fix lxd preseed managed network config 
  + Add support for static IPv6 addresses for FreeBSD 
  + Make 3.12 failures not fail the build 
  + Docs: adding relative links 
  + Fix setup.py to align with PEP 440 versioning replacing trailing
  + Add 'nkukard' as contributor 
  + doc: add how to render new module doc 
  + doc: improve module creation explanation 
  + Add Support for IPv6 metadata to OpenStack 
  + add xiaoge1001 to .github-cla-signers
  + network: Deprecate gateway{4,6} keys in network config v2
  + VMware: Move Guest Customization transport from OVF to VMware
  + doc: home page links added
  + net: skip duplicate mac check for netvsc nic and its VF

This update for python-responses fixes the following issues:
  
- update to 0.21.0:
  * Add `threading.Lock()` to allow `responses` working with `threading` module.
  * Add `urllib3` `Retry` mechanism. See #135
  * Removed internal `_cookies_from_headers` function
  * Now `add`, `upsert`, `replace` methods return registered response.
    `remove` method returns list of removed responses.
  * Added null value support in `urlencoded_params_matcher` via `allow_blank` keyword argument
  * Added strict version of decorator. Now you can apply `@responses.activate(assert_all_requests_are_fired=True)`
    to your function to validate that all requests were executed in the wrapped function. See #183

  
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-23"/>
	<updated date="2023-06-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171511">SUSE bug 1171511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203393">SUSE bug 1203393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210277">SUSE bug 1210277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210652">SUSE bug 1210652</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2084/">CVE-2022-2084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2084">CVE-2022-2084 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1786/">CVE-2023-1786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1786">CVE-2023-1786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009765282" comment="cloud-init-23.1-150100.8.63.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765283" comment="cloud-init-config-suse-23.1-150100.8.63.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765284" comment="cloud-init-doc-23.1-150100.8.63.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4199" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_0_0 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1207534" ref_url="https://bugzilla.suse.com/1207534" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4304" ref_url="https://www.suse.com/security/cve/CVE-2022-4304/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018032.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_0_0 fixes the following issues:

- CVE-2022-4304: Reworked the fix for the Timing-Oracle in RSA decryption.
  The previous fix for this timing side channel turned out to cause a
  severe 2-3x performance regression in the typical use case (bsc#1207534).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-26"/>
	<updated date="2023-06-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1207534">SUSE bug 1207534</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4304/">CVE-2022-4304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4304">CVE-2022-4304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009768621" comment="libopenssl-1_0_0-devel-1.0.2p-150000.3.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768622" comment="libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768623" comment="libopenssl10-1.0.2p-150000.3.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768624" comment="libopenssl1_0_0-1.0.2p-150000.3.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768625" comment="libopenssl1_0_0-32bit-1.0.2p-150000.3.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768626" comment="libopenssl1_0_0-hmac-1.0.2p-150000.3.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768627" comment="libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768628" comment="libopenssl1_0_0-steam-1.0.2p-150000.3.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768629" comment="libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768630" comment="openssl-1_0_0-1.0.2p-150000.3.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768631" comment="openssl-1_0_0-cavs-1.0.2p-150000.3.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768632" comment="openssl-1_0_0-doc-1.0.2p-150000.3.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4200" version="1" class="patch">
	<metadata>
		<title>Security update for python39 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1203750" ref_url="https://bugzilla.suse.com/1203750" source="BUGZILLA"/>
		<reference ref_id="1211158" ref_url="https://bugzilla.suse.com/1211158" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018022.html" source="SUSE-SU"/>
		<description>
This update for python39 fixes the following issues:

- CVE-2007-4559: Fixed filter for tarfile.extractall (bsc#1203750).

- Fixed unittest.mock.patch.dict returns function when applied to coroutines (bsc#1211158).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-26"/>
	<updated date="2023-06-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203750">SUSE bug 1203750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211158">SUSE bug 1211158</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009764638" comment="libpython3_9-1_0-3.9.16-150300.4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764639" comment="libpython3_9-1_0-32bit-3.9.16-150300.4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764640" comment="python39-3.9.16-150300.4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764641" comment="python39-32bit-3.9.16-150300.4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764642" comment="python39-base-3.9.16-150300.4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764643" comment="python39-base-32bit-3.9.16-150300.4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764644" comment="python39-curses-3.9.16-150300.4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764645" comment="python39-dbm-3.9.16-150300.4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764646" comment="python39-devel-3.9.16-150300.4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764647" comment="python39-doc-3.9.16-150300.4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764648" comment="python39-doc-devhelp-3.9.16-150300.4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764649" comment="python39-idle-3.9.16-150300.4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764650" comment="python39-testsuite-3.9.16-150300.4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764651" comment="python39-tk-3.9.16-150300.4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764652" comment="python39-tools-3.9.16-150300.4.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4201" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1109158" ref_url="https://bugzilla.suse.com/1109158" source="BUGZILLA"/>
		<reference ref_id="1142685" ref_url="https://bugzilla.suse.com/1142685" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1160435" ref_url="https://bugzilla.suse.com/1160435" source="BUGZILLA"/>
		<reference ref_id="1166486" ref_url="https://bugzilla.suse.com/1166486" source="BUGZILLA"/>
		<reference ref_id="1172073" ref_url="https://bugzilla.suse.com/1172073" source="BUGZILLA"/>
		<reference ref_id="1174777" ref_url="https://bugzilla.suse.com/1174777" source="BUGZILLA"/>
		<reference ref_id="1177529" ref_url="https://bugzilla.suse.com/1177529" source="BUGZILLA"/>
		<reference ref_id="1186449" ref_url="https://bugzilla.suse.com/1186449" source="BUGZILLA"/>
		<reference ref_id="1189998" ref_url="https://bugzilla.suse.com/1189998" source="BUGZILLA"/>
		<reference ref_id="1189999" ref_url="https://bugzilla.suse.com/1189999" source="BUGZILLA"/>
		<reference ref_id="1191731" ref_url="https://bugzilla.suse.com/1191731" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1195175" ref_url="https://bugzilla.suse.com/1195175" source="BUGZILLA"/>
		<reference ref_id="1195655" ref_url="https://bugzilla.suse.com/1195655" source="BUGZILLA"/>
		<reference ref_id="1195921" ref_url="https://bugzilla.suse.com/1195921" source="BUGZILLA"/>
		<reference ref_id="1196058" ref_url="https://bugzilla.suse.com/1196058" source="BUGZILLA"/>
		<reference ref_id="1197534" ref_url="https://bugzilla.suse.com/1197534" source="BUGZILLA"/>
		<reference ref_id="1197617" ref_url="https://bugzilla.suse.com/1197617" source="BUGZILLA"/>
		<reference ref_id="1198101" ref_url="https://bugzilla.suse.com/1198101" source="BUGZILLA"/>
		<reference ref_id="1198438" ref_url="https://bugzilla.suse.com/1198438" source="BUGZILLA"/>
		<reference ref_id="1198835" ref_url="https://bugzilla.suse.com/1198835" source="BUGZILLA"/>
		<reference ref_id="1199304" ref_url="https://bugzilla.suse.com/1199304" source="BUGZILLA"/>
		<reference ref_id="1200054" ref_url="https://bugzilla.suse.com/1200054" source="BUGZILLA"/>
		<reference ref_id="1202353" ref_url="https://bugzilla.suse.com/1202353" source="BUGZILLA"/>
		<reference ref_id="1202633" ref_url="https://bugzilla.suse.com/1202633" source="BUGZILLA"/>
		<reference ref_id="1203039" ref_url="https://bugzilla.suse.com/1203039" source="BUGZILLA"/>
		<reference ref_id="1203200" ref_url="https://bugzilla.suse.com/1203200" source="BUGZILLA"/>
		<reference ref_id="1203325" ref_url="https://bugzilla.suse.com/1203325" source="BUGZILLA"/>
		<reference ref_id="1203331" ref_url="https://bugzilla.suse.com/1203331" source="BUGZILLA"/>
		<reference ref_id="1203332" ref_url="https://bugzilla.suse.com/1203332" source="BUGZILLA"/>
		<reference ref_id="1203693" ref_url="https://bugzilla.suse.com/1203693" source="BUGZILLA"/>
		<reference ref_id="1203906" ref_url="https://bugzilla.suse.com/1203906" source="BUGZILLA"/>
		<reference ref_id="1204356" ref_url="https://bugzilla.suse.com/1204356" source="BUGZILLA"/>
		<reference ref_id="1204662" ref_url="https://bugzilla.suse.com/1204662" source="BUGZILLA"/>
		<reference ref_id="1204993" ref_url="https://bugzilla.suse.com/1204993" source="BUGZILLA"/>
		<reference ref_id="1205191" ref_url="https://bugzilla.suse.com/1205191" source="BUGZILLA"/>
		<reference ref_id="1205205" ref_url="https://bugzilla.suse.com/1205205" source="BUGZILLA"/>
		<reference ref_id="1205544" ref_url="https://bugzilla.suse.com/1205544" source="BUGZILLA"/>
		<reference ref_id="1205650" ref_url="https://bugzilla.suse.com/1205650" source="BUGZILLA"/>
		<reference ref_id="1205756" ref_url="https://bugzilla.suse.com/1205756" source="BUGZILLA"/>
		<reference ref_id="1205758" ref_url="https://bugzilla.suse.com/1205758" source="BUGZILLA"/>
		<reference ref_id="1205760" ref_url="https://bugzilla.suse.com/1205760" source="BUGZILLA"/>
		<reference ref_id="1205762" ref_url="https://bugzilla.suse.com/1205762" source="BUGZILLA"/>
		<reference ref_id="1205803" ref_url="https://bugzilla.suse.com/1205803" source="BUGZILLA"/>
		<reference ref_id="1205846" ref_url="https://bugzilla.suse.com/1205846" source="BUGZILLA"/>
		<reference ref_id="1206024" ref_url="https://bugzilla.suse.com/1206024" source="BUGZILLA"/>
		<reference ref_id="1206036" ref_url="https://bugzilla.suse.com/1206036" source="BUGZILLA"/>
		<reference ref_id="1206056" ref_url="https://bugzilla.suse.com/1206056" source="BUGZILLA"/>
		<reference ref_id="1206057" ref_url="https://bugzilla.suse.com/1206057" source="BUGZILLA"/>
		<reference ref_id="1206103" ref_url="https://bugzilla.suse.com/1206103" source="BUGZILLA"/>
		<reference ref_id="1206224" ref_url="https://bugzilla.suse.com/1206224" source="BUGZILLA"/>
		<reference ref_id="1206232" ref_url="https://bugzilla.suse.com/1206232" source="BUGZILLA"/>
		<reference ref_id="1206340" ref_url="https://bugzilla.suse.com/1206340" source="BUGZILLA"/>
		<reference ref_id="1206459" ref_url="https://bugzilla.suse.com/1206459" source="BUGZILLA"/>
		<reference ref_id="1206492" ref_url="https://bugzilla.suse.com/1206492" source="BUGZILLA"/>
		<reference ref_id="1206493" ref_url="https://bugzilla.suse.com/1206493" source="BUGZILLA"/>
		<reference ref_id="1206552" ref_url="https://bugzilla.suse.com/1206552" source="BUGZILLA"/>
		<reference ref_id="1206578" ref_url="https://bugzilla.suse.com/1206578" source="BUGZILLA"/>
		<reference ref_id="1206640" ref_url="https://bugzilla.suse.com/1206640" source="BUGZILLA"/>
		<reference ref_id="1206649" ref_url="https://bugzilla.suse.com/1206649" source="BUGZILLA"/>
		<reference ref_id="1206677" ref_url="https://bugzilla.suse.com/1206677" source="BUGZILLA"/>
		<reference ref_id="1206824" ref_url="https://bugzilla.suse.com/1206824" source="BUGZILLA"/>
		<reference ref_id="1206843" ref_url="https://bugzilla.suse.com/1206843" source="BUGZILLA"/>
		<reference ref_id="1206876" ref_url="https://bugzilla.suse.com/1206876" source="BUGZILLA"/>
		<reference ref_id="1206877" ref_url="https://bugzilla.suse.com/1206877" source="BUGZILLA"/>
		<reference ref_id="1206878" ref_url="https://bugzilla.suse.com/1206878" source="BUGZILLA"/>
		<reference ref_id="1206880" ref_url="https://bugzilla.suse.com/1206880" source="BUGZILLA"/>
		<reference ref_id="1206881" ref_url="https://bugzilla.suse.com/1206881" source="BUGZILLA"/>
		<reference ref_id="1206882" ref_url="https://bugzilla.suse.com/1206882" source="BUGZILLA"/>
		<reference ref_id="1206883" ref_url="https://bugzilla.suse.com/1206883" source="BUGZILLA"/>
		<reference ref_id="1206884" ref_url="https://bugzilla.suse.com/1206884" source="BUGZILLA"/>
		<reference ref_id="1206885" ref_url="https://bugzilla.suse.com/1206885" source="BUGZILLA"/>
		<reference ref_id="1206886" ref_url="https://bugzilla.suse.com/1206886" source="BUGZILLA"/>
		<reference ref_id="1206887" ref_url="https://bugzilla.suse.com/1206887" source="BUGZILLA"/>
		<reference ref_id="1206888" ref_url="https://bugzilla.suse.com/1206888" source="BUGZILLA"/>
		<reference ref_id="1206889" ref_url="https://bugzilla.suse.com/1206889" source="BUGZILLA"/>
		<reference ref_id="1206890" ref_url="https://bugzilla.suse.com/1206890" source="BUGZILLA"/>
		<reference ref_id="1206891" ref_url="https://bugzilla.suse.com/1206891" source="BUGZILLA"/>
		<reference ref_id="1206893" ref_url="https://bugzilla.suse.com/1206893" source="BUGZILLA"/>
		<reference ref_id="1206894" ref_url="https://bugzilla.suse.com/1206894" source="BUGZILLA"/>
		<reference ref_id="1206935" ref_url="https://bugzilla.suse.com/1206935" source="BUGZILLA"/>
		<reference ref_id="1206992" ref_url="https://bugzilla.suse.com/1206992" source="BUGZILLA"/>
		<reference ref_id="1207034" ref_url="https://bugzilla.suse.com/1207034" source="BUGZILLA"/>
		<reference ref_id="1207050" ref_url="https://bugzilla.suse.com/1207050" source="BUGZILLA"/>
		<reference ref_id="1207088" ref_url="https://bugzilla.suse.com/1207088" source="BUGZILLA"/>
		<reference ref_id="1207149" ref_url="https://bugzilla.suse.com/1207149" source="BUGZILLA"/>
		<reference ref_id="1207158" ref_url="https://bugzilla.suse.com/1207158" source="BUGZILLA"/>
		<reference ref_id="1207168" ref_url="https://bugzilla.suse.com/1207168" source="BUGZILLA"/>
		<reference ref_id="1207185" ref_url="https://bugzilla.suse.com/1207185" source="BUGZILLA"/>
		<reference ref_id="1207270" ref_url="https://bugzilla.suse.com/1207270" source="BUGZILLA"/>
		<reference ref_id="1207315" ref_url="https://bugzilla.suse.com/1207315" source="BUGZILLA"/>
		<reference ref_id="1207328" ref_url="https://bugzilla.suse.com/1207328" source="BUGZILLA"/>
		<reference ref_id="1207497" ref_url="https://bugzilla.suse.com/1207497" source="BUGZILLA"/>
		<reference ref_id="1207500" ref_url="https://bugzilla.suse.com/1207500" source="BUGZILLA"/>
		<reference ref_id="1207501" ref_url="https://bugzilla.suse.com/1207501" source="BUGZILLA"/>
		<reference ref_id="1207506" ref_url="https://bugzilla.suse.com/1207506" source="BUGZILLA"/>
		<reference ref_id="1207507" ref_url="https://bugzilla.suse.com/1207507" source="BUGZILLA"/>
		<reference ref_id="1207521" ref_url="https://bugzilla.suse.com/1207521" source="BUGZILLA"/>
		<reference ref_id="1207553" ref_url="https://bugzilla.suse.com/1207553" source="BUGZILLA"/>
		<reference ref_id="1207560" ref_url="https://bugzilla.suse.com/1207560" source="BUGZILLA"/>
		<reference ref_id="1207574" ref_url="https://bugzilla.suse.com/1207574" source="BUGZILLA"/>
		<reference ref_id="1207588" ref_url="https://bugzilla.suse.com/1207588" source="BUGZILLA"/>
		<reference ref_id="1207589" ref_url="https://bugzilla.suse.com/1207589" source="BUGZILLA"/>
		<reference ref_id="1207590" ref_url="https://bugzilla.suse.com/1207590" source="BUGZILLA"/>
		<reference ref_id="1207591" ref_url="https://bugzilla.suse.com/1207591" source="BUGZILLA"/>
		<reference ref_id="1207592" ref_url="https://bugzilla.suse.com/1207592" source="BUGZILLA"/>
		<reference ref_id="1207593" ref_url="https://bugzilla.suse.com/1207593" source="BUGZILLA"/>
		<reference ref_id="1207594" ref_url="https://bugzilla.suse.com/1207594" source="BUGZILLA"/>
		<reference ref_id="1207602" ref_url="https://bugzilla.suse.com/1207602" source="BUGZILLA"/>
		<reference ref_id="1207603" ref_url="https://bugzilla.suse.com/1207603" source="BUGZILLA"/>
		<reference ref_id="1207605" ref_url="https://bugzilla.suse.com/1207605" source="BUGZILLA"/>
		<reference ref_id="1207606" ref_url="https://bugzilla.suse.com/1207606" source="BUGZILLA"/>
		<reference ref_id="1207607" ref_url="https://bugzilla.suse.com/1207607" source="BUGZILLA"/>
		<reference ref_id="1207608" ref_url="https://bugzilla.suse.com/1207608" source="BUGZILLA"/>
		<reference ref_id="1207609" ref_url="https://bugzilla.suse.com/1207609" source="BUGZILLA"/>
		<reference ref_id="1207610" ref_url="https://bugzilla.suse.com/1207610" source="BUGZILLA"/>
		<reference ref_id="1207611" ref_url="https://bugzilla.suse.com/1207611" source="BUGZILLA"/>
		<reference ref_id="1207612" ref_url="https://bugzilla.suse.com/1207612" source="BUGZILLA"/>
		<reference ref_id="1207613" ref_url="https://bugzilla.suse.com/1207613" source="BUGZILLA"/>
		<reference ref_id="1207614" ref_url="https://bugzilla.suse.com/1207614" source="BUGZILLA"/>
		<reference ref_id="1207615" ref_url="https://bugzilla.suse.com/1207615" source="BUGZILLA"/>
		<reference ref_id="1207616" ref_url="https://bugzilla.suse.com/1207616" source="BUGZILLA"/>
		<reference ref_id="1207617" ref_url="https://bugzilla.suse.com/1207617" source="BUGZILLA"/>
		<reference ref_id="1207618" ref_url="https://bugzilla.suse.com/1207618" source="BUGZILLA"/>
		<reference ref_id="1207619" ref_url="https://bugzilla.suse.com/1207619" source="BUGZILLA"/>
		<reference ref_id="1207620" ref_url="https://bugzilla.suse.com/1207620" source="BUGZILLA"/>
		<reference ref_id="1207621" ref_url="https://bugzilla.suse.com/1207621" source="BUGZILLA"/>
		<reference ref_id="1207622" ref_url="https://bugzilla.suse.com/1207622" source="BUGZILLA"/>
		<reference ref_id="1207623" ref_url="https://bugzilla.suse.com/1207623" source="BUGZILLA"/>
		<reference ref_id="1207624" ref_url="https://bugzilla.suse.com/1207624" source="BUGZILLA"/>
		<reference ref_id="1207625" ref_url="https://bugzilla.suse.com/1207625" source="BUGZILLA"/>
		<reference ref_id="1207626" ref_url="https://bugzilla.suse.com/1207626" source="BUGZILLA"/>
		<reference ref_id="1207627" ref_url="https://bugzilla.suse.com/1207627" source="BUGZILLA"/>
		<reference ref_id="1207628" ref_url="https://bugzilla.suse.com/1207628" source="BUGZILLA"/>
		<reference ref_id="1207629" ref_url="https://bugzilla.suse.com/1207629" source="BUGZILLA"/>
		<reference ref_id="1207630" ref_url="https://bugzilla.suse.com/1207630" source="BUGZILLA"/>
		<reference ref_id="1207631" ref_url="https://bugzilla.suse.com/1207631" source="BUGZILLA"/>
		<reference ref_id="1207632" ref_url="https://bugzilla.suse.com/1207632" source="BUGZILLA"/>
		<reference ref_id="1207633" ref_url="https://bugzilla.suse.com/1207633" source="BUGZILLA"/>
		<reference ref_id="1207634" ref_url="https://bugzilla.suse.com/1207634" source="BUGZILLA"/>
		<reference ref_id="1207635" ref_url="https://bugzilla.suse.com/1207635" source="BUGZILLA"/>
		<reference ref_id="1207636" ref_url="https://bugzilla.suse.com/1207636" source="BUGZILLA"/>
		<reference ref_id="1207637" ref_url="https://bugzilla.suse.com/1207637" source="BUGZILLA"/>
		<reference ref_id="1207638" ref_url="https://bugzilla.suse.com/1207638" source="BUGZILLA"/>
		<reference ref_id="1207639" ref_url="https://bugzilla.suse.com/1207639" source="BUGZILLA"/>
		<reference ref_id="1207640" ref_url="https://bugzilla.suse.com/1207640" source="BUGZILLA"/>
		<reference ref_id="1207641" ref_url="https://bugzilla.suse.com/1207641" source="BUGZILLA"/>
		<reference ref_id="1207642" ref_url="https://bugzilla.suse.com/1207642" source="BUGZILLA"/>
		<reference ref_id="1207643" ref_url="https://bugzilla.suse.com/1207643" source="BUGZILLA"/>
		<reference ref_id="1207644" ref_url="https://bugzilla.suse.com/1207644" source="BUGZILLA"/>
		<reference ref_id="1207645" ref_url="https://bugzilla.suse.com/1207645" source="BUGZILLA"/>
		<reference ref_id="1207646" ref_url="https://bugzilla.suse.com/1207646" source="BUGZILLA"/>
		<reference ref_id="1207647" ref_url="https://bugzilla.suse.com/1207647" source="BUGZILLA"/>
		<reference ref_id="1207648" ref_url="https://bugzilla.suse.com/1207648" source="BUGZILLA"/>
		<reference ref_id="1207649" ref_url="https://bugzilla.suse.com/1207649" source="BUGZILLA"/>
		<reference ref_id="1207650" ref_url="https://bugzilla.suse.com/1207650" source="BUGZILLA"/>
		<reference ref_id="1207651" ref_url="https://bugzilla.suse.com/1207651" source="BUGZILLA"/>
		<reference ref_id="1207652" ref_url="https://bugzilla.suse.com/1207652" source="BUGZILLA"/>
		<reference ref_id="1207653" ref_url="https://bugzilla.suse.com/1207653" source="BUGZILLA"/>
		<reference ref_id="1207734" ref_url="https://bugzilla.suse.com/1207734" source="BUGZILLA"/>
		<reference ref_id="1207768" ref_url="https://bugzilla.suse.com/1207768" source="BUGZILLA"/>
		<reference ref_id="1207769" ref_url="https://bugzilla.suse.com/1207769" source="BUGZILLA"/>
		<reference ref_id="1207770" ref_url="https://bugzilla.suse.com/1207770" source="BUGZILLA"/>
		<reference ref_id="1207771" ref_url="https://bugzilla.suse.com/1207771" source="BUGZILLA"/>
		<reference ref_id="1207773" ref_url="https://bugzilla.suse.com/1207773" source="BUGZILLA"/>
		<reference ref_id="1207795" ref_url="https://bugzilla.suse.com/1207795" source="BUGZILLA"/>
		<reference ref_id="1207827" ref_url="https://bugzilla.suse.com/1207827" source="BUGZILLA"/>
		<reference ref_id="1207842" ref_url="https://bugzilla.suse.com/1207842" source="BUGZILLA"/>
		<reference ref_id="1207845" ref_url="https://bugzilla.suse.com/1207845" source="BUGZILLA"/>
		<reference ref_id="1207875" ref_url="https://bugzilla.suse.com/1207875" source="BUGZILLA"/>
		<reference ref_id="1207878" ref_url="https://bugzilla.suse.com/1207878" source="BUGZILLA"/>
		<reference ref_id="1207935" ref_url="https://bugzilla.suse.com/1207935" source="BUGZILLA"/>
		<reference ref_id="1207948" ref_url="https://bugzilla.suse.com/1207948" source="BUGZILLA"/>
		<reference ref_id="1208050" ref_url="https://bugzilla.suse.com/1208050" source="BUGZILLA"/>
		<reference ref_id="1208076" ref_url="https://bugzilla.suse.com/1208076" source="BUGZILLA"/>
		<reference ref_id="1208081" ref_url="https://bugzilla.suse.com/1208081" source="BUGZILLA"/>
		<reference ref_id="1208105" ref_url="https://bugzilla.suse.com/1208105" source="BUGZILLA"/>
		<reference ref_id="1208107" ref_url="https://bugzilla.suse.com/1208107" source="BUGZILLA"/>
		<reference ref_id="1208128" ref_url="https://bugzilla.suse.com/1208128" source="BUGZILLA"/>
		<reference ref_id="1208130" ref_url="https://bugzilla.suse.com/1208130" source="BUGZILLA"/>
		<reference ref_id="1208149" ref_url="https://bugzilla.suse.com/1208149" source="BUGZILLA"/>
		<reference ref_id="1208153" ref_url="https://bugzilla.suse.com/1208153" source="BUGZILLA"/>
		<reference ref_id="1208183" ref_url="https://bugzilla.suse.com/1208183" source="BUGZILLA"/>
		<reference ref_id="1208212" ref_url="https://bugzilla.suse.com/1208212" source="BUGZILLA"/>
		<reference ref_id="1208219" ref_url="https://bugzilla.suse.com/1208219" source="BUGZILLA"/>
		<reference ref_id="1208290" ref_url="https://bugzilla.suse.com/1208290" source="BUGZILLA"/>
		<reference ref_id="1208368" ref_url="https://bugzilla.suse.com/1208368" source="BUGZILLA"/>
		<reference ref_id="1208420" ref_url="https://bugzilla.suse.com/1208420" source="BUGZILLA"/>
		<reference ref_id="1208428" ref_url="https://bugzilla.suse.com/1208428" source="BUGZILLA"/>
		<reference ref_id="1208429" ref_url="https://bugzilla.suse.com/1208429" source="BUGZILLA"/>
		<reference ref_id="1208449" ref_url="https://bugzilla.suse.com/1208449" source="BUGZILLA"/>
		<reference ref_id="1208534" ref_url="https://bugzilla.suse.com/1208534" source="BUGZILLA"/>
		<reference ref_id="1208541" ref_url="https://bugzilla.suse.com/1208541" source="BUGZILLA"/>
		<reference ref_id="1208542" ref_url="https://bugzilla.suse.com/1208542" source="BUGZILLA"/>
		<reference ref_id="1208570" ref_url="https://bugzilla.suse.com/1208570" source="BUGZILLA"/>
		<reference ref_id="1208588" ref_url="https://bugzilla.suse.com/1208588" source="BUGZILLA"/>
		<reference ref_id="1208598" ref_url="https://bugzilla.suse.com/1208598" source="BUGZILLA"/>
		<reference ref_id="1208599" ref_url="https://bugzilla.suse.com/1208599" source="BUGZILLA"/>
		<reference ref_id="1208600" ref_url="https://bugzilla.suse.com/1208600" source="BUGZILLA"/>
		<reference ref_id="1208602" ref_url="https://bugzilla.suse.com/1208602" source="BUGZILLA"/>
		<reference ref_id="1208604" ref_url="https://bugzilla.suse.com/1208604" source="BUGZILLA"/>
		<reference ref_id="1208605" ref_url="https://bugzilla.suse.com/1208605" source="BUGZILLA"/>
		<reference ref_id="1208607" ref_url="https://bugzilla.suse.com/1208607" source="BUGZILLA"/>
		<reference ref_id="1208619" ref_url="https://bugzilla.suse.com/1208619" source="BUGZILLA"/>
		<reference ref_id="1208628" ref_url="https://bugzilla.suse.com/1208628" source="BUGZILLA"/>
		<reference ref_id="1208700" ref_url="https://bugzilla.suse.com/1208700" source="BUGZILLA"/>
		<reference ref_id="1208758" ref_url="https://bugzilla.suse.com/1208758" source="BUGZILLA"/>
		<reference ref_id="1208759" ref_url="https://bugzilla.suse.com/1208759" source="BUGZILLA"/>
		<reference ref_id="1208776" ref_url="https://bugzilla.suse.com/1208776" source="BUGZILLA"/>
		<reference ref_id="1208777" ref_url="https://bugzilla.suse.com/1208777" source="BUGZILLA"/>
		<reference ref_id="1208784" ref_url="https://bugzilla.suse.com/1208784" source="BUGZILLA"/>
		<reference ref_id="1208787" ref_url="https://bugzilla.suse.com/1208787" source="BUGZILLA"/>
		<reference ref_id="1208815" ref_url="https://bugzilla.suse.com/1208815" source="BUGZILLA"/>
		<reference ref_id="1208816" ref_url="https://bugzilla.suse.com/1208816" source="BUGZILLA"/>
		<reference ref_id="1208829" ref_url="https://bugzilla.suse.com/1208829" source="BUGZILLA"/>
		<reference ref_id="1208837" ref_url="https://bugzilla.suse.com/1208837" source="BUGZILLA"/>
		<reference ref_id="1208843" ref_url="https://bugzilla.suse.com/1208843" source="BUGZILLA"/>
		<reference ref_id="1208845" ref_url="https://bugzilla.suse.com/1208845" source="BUGZILLA"/>
		<reference ref_id="1208848" ref_url="https://bugzilla.suse.com/1208848" source="BUGZILLA"/>
		<reference ref_id="1208864" ref_url="https://bugzilla.suse.com/1208864" source="BUGZILLA"/>
		<reference ref_id="1208902" ref_url="https://bugzilla.suse.com/1208902" source="BUGZILLA"/>
		<reference ref_id="1208948" ref_url="https://bugzilla.suse.com/1208948" source="BUGZILLA"/>
		<reference ref_id="1208976" ref_url="https://bugzilla.suse.com/1208976" source="BUGZILLA"/>
		<reference ref_id="1209008" ref_url="https://bugzilla.suse.com/1209008" source="BUGZILLA"/>
		<reference ref_id="1209052" ref_url="https://bugzilla.suse.com/1209052" source="BUGZILLA"/>
		<reference ref_id="1209092" ref_url="https://bugzilla.suse.com/1209092" source="BUGZILLA"/>
		<reference ref_id="1209159" ref_url="https://bugzilla.suse.com/1209159" source="BUGZILLA"/>
		<reference ref_id="1209256" ref_url="https://bugzilla.suse.com/1209256" source="BUGZILLA"/>
		<reference ref_id="1209258" ref_url="https://bugzilla.suse.com/1209258" source="BUGZILLA"/>
		<reference ref_id="1209262" ref_url="https://bugzilla.suse.com/1209262" source="BUGZILLA"/>
		<reference ref_id="1209287" ref_url="https://bugzilla.suse.com/1209287" source="BUGZILLA"/>
		<reference ref_id="1209288" ref_url="https://bugzilla.suse.com/1209288" source="BUGZILLA"/>
		<reference ref_id="1209290" ref_url="https://bugzilla.suse.com/1209290" source="BUGZILLA"/>
		<reference ref_id="1209292" ref_url="https://bugzilla.suse.com/1209292" source="BUGZILLA"/>
		<reference ref_id="1209367" ref_url="https://bugzilla.suse.com/1209367" source="BUGZILLA"/>
		<reference ref_id="1209457" ref_url="https://bugzilla.suse.com/1209457" source="BUGZILLA"/>
		<reference ref_id="1209504" ref_url="https://bugzilla.suse.com/1209504" source="BUGZILLA"/>
		<reference ref_id="1209532" ref_url="https://bugzilla.suse.com/1209532" source="BUGZILLA"/>
		<reference ref_id="1209556" ref_url="https://bugzilla.suse.com/1209556" source="BUGZILLA"/>
		<reference ref_id="1209600" ref_url="https://bugzilla.suse.com/1209600" source="BUGZILLA"/>
		<reference ref_id="1209635" ref_url="https://bugzilla.suse.com/1209635" source="BUGZILLA"/>
		<reference ref_id="1209636" ref_url="https://bugzilla.suse.com/1209636" source="BUGZILLA"/>
		<reference ref_id="1209637" ref_url="https://bugzilla.suse.com/1209637" source="BUGZILLA"/>
		<reference ref_id="1209684" ref_url="https://bugzilla.suse.com/1209684" source="BUGZILLA"/>
		<reference ref_id="1209687" ref_url="https://bugzilla.suse.com/1209687" source="BUGZILLA"/>
		<reference ref_id="1209693" ref_url="https://bugzilla.suse.com/1209693" source="BUGZILLA"/>
		<reference ref_id="1209739" ref_url="https://bugzilla.suse.com/1209739" source="BUGZILLA"/>
		<reference ref_id="1209779" ref_url="https://bugzilla.suse.com/1209779" source="BUGZILLA"/>
		<reference ref_id="1209788" ref_url="https://bugzilla.suse.com/1209788" source="BUGZILLA"/>
		<reference ref_id="1209798" ref_url="https://bugzilla.suse.com/1209798" source="BUGZILLA"/>
		<reference ref_id="1209799" ref_url="https://bugzilla.suse.com/1209799" source="BUGZILLA"/>
		<reference ref_id="1209804" ref_url="https://bugzilla.suse.com/1209804" source="BUGZILLA"/>
		<reference ref_id="1209805" ref_url="https://bugzilla.suse.com/1209805" source="BUGZILLA"/>
		<reference ref_id="1209856" ref_url="https://bugzilla.suse.com/1209856" source="BUGZILLA"/>
		<reference ref_id="1209871" ref_url="https://bugzilla.suse.com/1209871" source="BUGZILLA"/>
		<reference ref_id="1209927" ref_url="https://bugzilla.suse.com/1209927" source="BUGZILLA"/>
		<reference ref_id="1209980" ref_url="https://bugzilla.suse.com/1209980" source="BUGZILLA"/>
		<reference ref_id="1209982" ref_url="https://bugzilla.suse.com/1209982" source="BUGZILLA"/>
		<reference ref_id="1209999" ref_url="https://bugzilla.suse.com/1209999" source="BUGZILLA"/>
		<reference ref_id="1210034" ref_url="https://bugzilla.suse.com/1210034" source="BUGZILLA"/>
		<reference ref_id="1210050" ref_url="https://bugzilla.suse.com/1210050" source="BUGZILLA"/>
		<reference ref_id="1210158" ref_url="https://bugzilla.suse.com/1210158" source="BUGZILLA"/>
		<reference ref_id="1210165" ref_url="https://bugzilla.suse.com/1210165" source="BUGZILLA"/>
		<reference ref_id="1210202" ref_url="https://bugzilla.suse.com/1210202" source="BUGZILLA"/>
		<reference ref_id="1210203" ref_url="https://bugzilla.suse.com/1210203" source="BUGZILLA"/>
		<reference ref_id="1210206" ref_url="https://bugzilla.suse.com/1210206" source="BUGZILLA"/>
		<reference ref_id="1210216" ref_url="https://bugzilla.suse.com/1210216" source="BUGZILLA"/>
		<reference ref_id="1210230" ref_url="https://bugzilla.suse.com/1210230" source="BUGZILLA"/>
		<reference ref_id="1210294" ref_url="https://bugzilla.suse.com/1210294" source="BUGZILLA"/>
		<reference ref_id="1210301" ref_url="https://bugzilla.suse.com/1210301" source="BUGZILLA"/>
		<reference ref_id="1210329" ref_url="https://bugzilla.suse.com/1210329" source="BUGZILLA"/>
		<reference ref_id="1210336" ref_url="https://bugzilla.suse.com/1210336" source="BUGZILLA"/>
		<reference ref_id="1210409" ref_url="https://bugzilla.suse.com/1210409" source="BUGZILLA"/>
		<reference ref_id="1210439" ref_url="https://bugzilla.suse.com/1210439" source="BUGZILLA"/>
		<reference ref_id="1210449" ref_url="https://bugzilla.suse.com/1210449" source="BUGZILLA"/>
		<reference ref_id="1210450" ref_url="https://bugzilla.suse.com/1210450" source="BUGZILLA"/>
		<reference ref_id="1210469" ref_url="https://bugzilla.suse.com/1210469" source="BUGZILLA"/>
		<reference ref_id="1210498" ref_url="https://bugzilla.suse.com/1210498" source="BUGZILLA"/>
		<reference ref_id="1210506" ref_url="https://bugzilla.suse.com/1210506" source="BUGZILLA"/>
		<reference ref_id="1210533" ref_url="https://bugzilla.suse.com/1210533" source="BUGZILLA"/>
		<reference ref_id="1210551" ref_url="https://bugzilla.suse.com/1210551" source="BUGZILLA"/>
		<reference ref_id="1210629" ref_url="https://bugzilla.suse.com/1210629" source="BUGZILLA"/>
		<reference ref_id="1210644" ref_url="https://bugzilla.suse.com/1210644" source="BUGZILLA"/>
		<reference ref_id="1210647" ref_url="https://bugzilla.suse.com/1210647" source="BUGZILLA"/>
		<reference ref_id="1210725" ref_url="https://bugzilla.suse.com/1210725" source="BUGZILLA"/>
		<reference ref_id="1210741" ref_url="https://bugzilla.suse.com/1210741" source="BUGZILLA"/>
		<reference ref_id="1210762" ref_url="https://bugzilla.suse.com/1210762" source="BUGZILLA"/>
		<reference ref_id="1210763" ref_url="https://bugzilla.suse.com/1210763" source="BUGZILLA"/>
		<reference ref_id="1210764" ref_url="https://bugzilla.suse.com/1210764" source="BUGZILLA"/>
		<reference ref_id="1210765" ref_url="https://bugzilla.suse.com/1210765" source="BUGZILLA"/>
		<reference ref_id="1210766" ref_url="https://bugzilla.suse.com/1210766" source="BUGZILLA"/>
		<reference ref_id="1210767" ref_url="https://bugzilla.suse.com/1210767" source="BUGZILLA"/>
		<reference ref_id="1210768" ref_url="https://bugzilla.suse.com/1210768" source="BUGZILLA"/>
		<reference ref_id="1210769" ref_url="https://bugzilla.suse.com/1210769" source="BUGZILLA"/>
		<reference ref_id="1210770" ref_url="https://bugzilla.suse.com/1210770" source="BUGZILLA"/>
		<reference ref_id="1210771" ref_url="https://bugzilla.suse.com/1210771" source="BUGZILLA"/>
		<reference ref_id="1210775" ref_url="https://bugzilla.suse.com/1210775" source="BUGZILLA"/>
		<reference ref_id="1210783" ref_url="https://bugzilla.suse.com/1210783" source="BUGZILLA"/>
		<reference ref_id="1210791" ref_url="https://bugzilla.suse.com/1210791" source="BUGZILLA"/>
		<reference ref_id="1210793" ref_url="https://bugzilla.suse.com/1210793" source="BUGZILLA"/>
		<reference ref_id="1210806" ref_url="https://bugzilla.suse.com/1210806" source="BUGZILLA"/>
		<reference ref_id="1210816" ref_url="https://bugzilla.suse.com/1210816" source="BUGZILLA"/>
		<reference ref_id="1210817" ref_url="https://bugzilla.suse.com/1210817" source="BUGZILLA"/>
		<reference ref_id="1210827" ref_url="https://bugzilla.suse.com/1210827" source="BUGZILLA"/>
		<reference ref_id="1210940" ref_url="https://bugzilla.suse.com/1210940" source="BUGZILLA"/>
		<reference ref_id="1210943" ref_url="https://bugzilla.suse.com/1210943" source="BUGZILLA"/>
		<reference ref_id="1210947" ref_url="https://bugzilla.suse.com/1210947" source="BUGZILLA"/>
		<reference ref_id="1210953" ref_url="https://bugzilla.suse.com/1210953" source="BUGZILLA"/>
		<reference ref_id="1210986" ref_url="https://bugzilla.suse.com/1210986" source="BUGZILLA"/>
		<reference ref_id="1211025" ref_url="https://bugzilla.suse.com/1211025" source="BUGZILLA"/>
		<reference ref_id="1211037" ref_url="https://bugzilla.suse.com/1211037" source="BUGZILLA"/>
		<reference ref_id="1211043" ref_url="https://bugzilla.suse.com/1211043" source="BUGZILLA"/>
		<reference ref_id="1211044" ref_url="https://bugzilla.suse.com/1211044" source="BUGZILLA"/>
		<reference ref_id="1211089" ref_url="https://bugzilla.suse.com/1211089" source="BUGZILLA"/>
		<reference ref_id="1211105" ref_url="https://bugzilla.suse.com/1211105" source="BUGZILLA"/>
		<reference ref_id="1211113" ref_url="https://bugzilla.suse.com/1211113" source="BUGZILLA"/>
		<reference ref_id="1211131" ref_url="https://bugzilla.suse.com/1211131" source="BUGZILLA"/>
		<reference ref_id="1211140" ref_url="https://bugzilla.suse.com/1211140" source="BUGZILLA"/>
		<reference ref_id="1211205" ref_url="https://bugzilla.suse.com/1211205" source="BUGZILLA"/>
		<reference ref_id="1211263" ref_url="https://bugzilla.suse.com/1211263" source="BUGZILLA"/>
		<reference ref_id="1211280" ref_url="https://bugzilla.suse.com/1211280" source="BUGZILLA"/>
		<reference ref_id="1211281" ref_url="https://bugzilla.suse.com/1211281" source="BUGZILLA"/>
		<reference ref_id="1211299" ref_url="https://bugzilla.suse.com/1211299" source="BUGZILLA"/>
		<reference ref_id="1211387" ref_url="https://bugzilla.suse.com/1211387" source="BUGZILLA"/>
		<reference ref_id="1211414" ref_url="https://bugzilla.suse.com/1211414" source="BUGZILLA"/>
		<reference ref_id="1211449" ref_url="https://bugzilla.suse.com/1211449" source="BUGZILLA"/>
		<reference ref_id="1211465" ref_url="https://bugzilla.suse.com/1211465" source="BUGZILLA"/>
		<reference ref_id="1211519" ref_url="https://bugzilla.suse.com/1211519" source="BUGZILLA"/>
		<reference ref_id="1211564" ref_url="https://bugzilla.suse.com/1211564" source="BUGZILLA"/>
		<reference ref_id="1211590" ref_url="https://bugzilla.suse.com/1211590" source="BUGZILLA"/>
		<reference ref_id="1211592" ref_url="https://bugzilla.suse.com/1211592" source="BUGZILLA"/>
		<reference ref_id="1211593" ref_url="https://bugzilla.suse.com/1211593" source="BUGZILLA"/>
		<reference ref_id="1211595" ref_url="https://bugzilla.suse.com/1211595" source="BUGZILLA"/>
		<reference ref_id="1211654" ref_url="https://bugzilla.suse.com/1211654" source="BUGZILLA"/>
		<reference ref_id="1211686" ref_url="https://bugzilla.suse.com/1211686" source="BUGZILLA"/>
		<reference ref_id="1211687" ref_url="https://bugzilla.suse.com/1211687" source="BUGZILLA"/>
		<reference ref_id="1211688" ref_url="https://bugzilla.suse.com/1211688" source="BUGZILLA"/>
		<reference ref_id="1211689" ref_url="https://bugzilla.suse.com/1211689" source="BUGZILLA"/>
		<reference ref_id="1211690" ref_url="https://bugzilla.suse.com/1211690" source="BUGZILLA"/>
		<reference ref_id="1211691" ref_url="https://bugzilla.suse.com/1211691" source="BUGZILLA"/>
		<reference ref_id="1211692" ref_url="https://bugzilla.suse.com/1211692" source="BUGZILLA"/>
		<reference ref_id="1211693" ref_url="https://bugzilla.suse.com/1211693" source="BUGZILLA"/>
		<reference ref_id="1211714" ref_url="https://bugzilla.suse.com/1211714" source="BUGZILLA"/>
		<reference ref_id="1211796" ref_url="https://bugzilla.suse.com/1211796" source="BUGZILLA"/>
		<reference ref_id="1211804" ref_url="https://bugzilla.suse.com/1211804" source="BUGZILLA"/>
		<reference ref_id="1211807" ref_url="https://bugzilla.suse.com/1211807" source="BUGZILLA"/>
		<reference ref_id="1211808" ref_url="https://bugzilla.suse.com/1211808" source="BUGZILLA"/>
		<reference ref_id="1211820" ref_url="https://bugzilla.suse.com/1211820" source="BUGZILLA"/>
		<reference ref_id="1211836" ref_url="https://bugzilla.suse.com/1211836" source="BUGZILLA"/>
		<reference ref_id="1211847" ref_url="https://bugzilla.suse.com/1211847" source="BUGZILLA"/>
		<reference ref_id="1211855" ref_url="https://bugzilla.suse.com/1211855" source="BUGZILLA"/>
		<reference ref_id="1211960" ref_url="https://bugzilla.suse.com/1211960" source="BUGZILLA"/>
		<reference ref_id="1212129" ref_url="https://bugzilla.suse.com/1212129" source="BUGZILLA"/>
		<reference ref_id="1212154" ref_url="https://bugzilla.suse.com/1212154" source="BUGZILLA"/>
		<reference ref_id="1212155" ref_url="https://bugzilla.suse.com/1212155" source="BUGZILLA"/>
		<reference ref_id="1212158" ref_url="https://bugzilla.suse.com/1212158" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2196" ref_url="https://www.suse.com/security/cve/CVE-2022-2196/" source="CVE"/>
		<reference ref_id="CVE-2022-36280" ref_url="https://www.suse.com/security/cve/CVE-2022-36280/" source="CVE"/>
		<reference ref_id="CVE-2022-38096" ref_url="https://www.suse.com/security/cve/CVE-2022-38096/" source="CVE"/>
		<reference ref_id="CVE-2022-4269" ref_url="https://www.suse.com/security/cve/CVE-2022-4269/" source="CVE"/>
		<reference ref_id="CVE-2022-45884" ref_url="https://www.suse.com/security/cve/CVE-2022-45884/" source="CVE"/>
		<reference ref_id="CVE-2022-45885" ref_url="https://www.suse.com/security/cve/CVE-2022-45885/" source="CVE"/>
		<reference ref_id="CVE-2022-45886" ref_url="https://www.suse.com/security/cve/CVE-2022-45886/" source="CVE"/>
		<reference ref_id="CVE-2022-45887" ref_url="https://www.suse.com/security/cve/CVE-2022-45887/" source="CVE"/>
		<reference ref_id="CVE-2022-45919" ref_url="https://www.suse.com/security/cve/CVE-2022-45919/" source="CVE"/>
		<reference ref_id="CVE-2022-4744" ref_url="https://www.suse.com/security/cve/CVE-2022-4744/" source="CVE"/>
		<reference ref_id="CVE-2023-0045" ref_url="https://www.suse.com/security/cve/CVE-2023-0045/" source="CVE"/>
		<reference ref_id="CVE-2023-0122" ref_url="https://www.suse.com/security/cve/CVE-2023-0122/" source="CVE"/>
		<reference ref_id="CVE-2023-0179" ref_url="https://www.suse.com/security/cve/CVE-2023-0179/" source="CVE"/>
		<reference ref_id="CVE-2023-0394" ref_url="https://www.suse.com/security/cve/CVE-2023-0394/" source="CVE"/>
		<reference ref_id="CVE-2023-0461" ref_url="https://www.suse.com/security/cve/CVE-2023-0461/" source="CVE"/>
		<reference ref_id="CVE-2023-0469" ref_url="https://www.suse.com/security/cve/CVE-2023-0469/" source="CVE"/>
		<reference ref_id="CVE-2023-0590" ref_url="https://www.suse.com/security/cve/CVE-2023-0590/" source="CVE"/>
		<reference ref_id="CVE-2023-0597" ref_url="https://www.suse.com/security/cve/CVE-2023-0597/" source="CVE"/>
		<reference ref_id="CVE-2023-1075" ref_url="https://www.suse.com/security/cve/CVE-2023-1075/" source="CVE"/>
		<reference ref_id="CVE-2023-1076" ref_url="https://www.suse.com/security/cve/CVE-2023-1076/" source="CVE"/>
		<reference ref_id="CVE-2023-1077" ref_url="https://www.suse.com/security/cve/CVE-2023-1077/" source="CVE"/>
		<reference ref_id="CVE-2023-1079" ref_url="https://www.suse.com/security/cve/CVE-2023-1079/" source="CVE"/>
		<reference ref_id="CVE-2023-1095" ref_url="https://www.suse.com/security/cve/CVE-2023-1095/" source="CVE"/>
		<reference ref_id="CVE-2023-1118" ref_url="https://www.suse.com/security/cve/CVE-2023-1118/" source="CVE"/>
		<reference ref_id="CVE-2023-1380" ref_url="https://www.suse.com/security/cve/CVE-2023-1380/" source="CVE"/>
		<reference ref_id="CVE-2023-1382" ref_url="https://www.suse.com/security/cve/CVE-2023-1382/" source="CVE"/>
		<reference ref_id="CVE-2023-1513" ref_url="https://www.suse.com/security/cve/CVE-2023-1513/" source="CVE"/>
		<reference ref_id="CVE-2023-1582" ref_url="https://www.suse.com/security/cve/CVE-2023-1582/" source="CVE"/>
		<reference ref_id="CVE-2023-1583" ref_url="https://www.suse.com/security/cve/CVE-2023-1583/" source="CVE"/>
		<reference ref_id="CVE-2023-1611" ref_url="https://www.suse.com/security/cve/CVE-2023-1611/" source="CVE"/>
		<reference ref_id="CVE-2023-1637" ref_url="https://www.suse.com/security/cve/CVE-2023-1637/" source="CVE"/>
		<reference ref_id="CVE-2023-1652" ref_url="https://www.suse.com/security/cve/CVE-2023-1652/" source="CVE"/>
		<reference ref_id="CVE-2023-1670" ref_url="https://www.suse.com/security/cve/CVE-2023-1670/" source="CVE"/>
		<reference ref_id="CVE-2023-1838" ref_url="https://www.suse.com/security/cve/CVE-2023-1838/" source="CVE"/>
		<reference ref_id="CVE-2023-1855" ref_url="https://www.suse.com/security/cve/CVE-2023-1855/" source="CVE"/>
		<reference ref_id="CVE-2023-1989" ref_url="https://www.suse.com/security/cve/CVE-2023-1989/" source="CVE"/>
		<reference ref_id="CVE-2023-1998" ref_url="https://www.suse.com/security/cve/CVE-2023-1998/" source="CVE"/>
		<reference ref_id="CVE-2023-2002" ref_url="https://www.suse.com/security/cve/CVE-2023-2002/" source="CVE"/>
		<reference ref_id="CVE-2023-21102" ref_url="https://www.suse.com/security/cve/CVE-2023-21102/" source="CVE"/>
		<reference ref_id="CVE-2023-21106" ref_url="https://www.suse.com/security/cve/CVE-2023-21106/" source="CVE"/>
		<reference ref_id="CVE-2023-2124" ref_url="https://www.suse.com/security/cve/CVE-2023-2124/" source="CVE"/>
		<reference ref_id="CVE-2023-2156" ref_url="https://www.suse.com/security/cve/CVE-2023-2156/" source="CVE"/>
		<reference ref_id="CVE-2023-2162" ref_url="https://www.suse.com/security/cve/CVE-2023-2162/" source="CVE"/>
		<reference ref_id="CVE-2023-2176" ref_url="https://www.suse.com/security/cve/CVE-2023-2176/" source="CVE"/>
		<reference ref_id="CVE-2023-2235" ref_url="https://www.suse.com/security/cve/CVE-2023-2235/" source="CVE"/>
		<reference ref_id="CVE-2023-2269" ref_url="https://www.suse.com/security/cve/CVE-2023-2269/" source="CVE"/>
		<reference ref_id="CVE-2023-22998" ref_url="https://www.suse.com/security/cve/CVE-2023-22998/" source="CVE"/>
		<reference ref_id="CVE-2023-23000" ref_url="https://www.suse.com/security/cve/CVE-2023-23000/" source="CVE"/>
		<reference ref_id="CVE-2023-23001" ref_url="https://www.suse.com/security/cve/CVE-2023-23001/" source="CVE"/>
		<reference ref_id="CVE-2023-23004" ref_url="https://www.suse.com/security/cve/CVE-2023-23004/" source="CVE"/>
		<reference ref_id="CVE-2023-23006" ref_url="https://www.suse.com/security/cve/CVE-2023-23006/" source="CVE"/>
		<reference ref_id="CVE-2023-2483" ref_url="https://www.suse.com/security/cve/CVE-2023-2483/" source="CVE"/>
		<reference ref_id="CVE-2023-25012" ref_url="https://www.suse.com/security/cve/CVE-2023-25012/" source="CVE"/>
		<reference ref_id="CVE-2023-2513" ref_url="https://www.suse.com/security/cve/CVE-2023-2513/" source="CVE"/>
		<reference ref_id="CVE-2023-26545" ref_url="https://www.suse.com/security/cve/CVE-2023-26545/" source="CVE"/>
		<reference ref_id="CVE-2023-28327" ref_url="https://www.suse.com/security/cve/CVE-2023-28327/" source="CVE"/>
		<reference ref_id="CVE-2023-28410" ref_url="https://www.suse.com/security/cve/CVE-2023-28410/" source="CVE"/>
		<reference ref_id="CVE-2023-28464" ref_url="https://www.suse.com/security/cve/CVE-2023-28464/" source="CVE"/>
		<reference ref_id="CVE-2023-3006" ref_url="https://www.suse.com/security/cve/CVE-2023-3006/" source="CVE"/>
		<reference ref_id="CVE-2023-30456" ref_url="https://www.suse.com/security/cve/CVE-2023-30456/" source="CVE"/>
		<reference ref_id="CVE-2023-30772" ref_url="https://www.suse.com/security/cve/CVE-2023-30772/" source="CVE"/>
		<reference ref_id="CVE-2023-31084" ref_url="https://www.suse.com/security/cve/CVE-2023-31084/" source="CVE"/>
		<reference ref_id="CVE-2023-3141" ref_url="https://www.suse.com/security/cve/CVE-2023-3141/" source="CVE"/>
		<reference ref_id="CVE-2023-31436" ref_url="https://www.suse.com/security/cve/CVE-2023-31436/" source="CVE"/>
		<reference ref_id="CVE-2023-3161" ref_url="https://www.suse.com/security/cve/CVE-2023-3161/" source="CVE"/>
		<reference ref_id="CVE-2023-32233" ref_url="https://www.suse.com/security/cve/CVE-2023-32233/" source="CVE"/>
		<reference ref_id="CVE-2023-33288" ref_url="https://www.suse.com/security/cve/CVE-2023-33288/" source="CVE"/>
		<reference ref_id="CVE-2023-33951" ref_url="https://www.suse.com/security/cve/CVE-2023-33951/" source="CVE"/>
		<reference ref_id="CVE-2023-33952" ref_url="https://www.suse.com/security/cve/CVE-2023-33952/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 AZURE kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2023-3161: Fixed shift-out-of-bounds in fbcon_set_font() (bsc#1212154).
- CVE-2023-21102: Fixed possible bypass of shadow stack protection in __efi_rt_asm_wrapper of efi-rt-wrapper.S (bsc#1212155).
- CVE-2023-3141: Fixed a use-after-free flaw in r592_remove in drivers/memstick/host/r592.c, that allowed local attackers to crash the system at device disconnect (bsc#1212129).
- CVE-2023-1077: Fixed a type confusion in pick_next_rt_entity(), that could cause memory corruption (bsc#1208600).
- CVE-2023-28410: Fixed improper restriction of operations within the bounds of a memory buffer in some Intel(R) i915 Graphics drivers that may have allowed an authenticated user to potentially enable escalation of privilege via local access (bsc#1211263).
- CVE-2023-2156: Fixed a flaw in the networking subsystem within the handling of the RPL protocol (bsc#1211131).
- CVE-2023-1382: Fixed denial of service in tipc_conn_close (bsc#1209288).
- CVE-2023-33951: Fixed a race condition that could have led to an information disclosure inside the vmwgfx driver (bsc#1211593).
- CVE-2023-33952: Fixed a double free that could have led to a local privilege escalation inside the vmwgfx driver (bsc#1211595).
- CVE-2023-3006: Fixed a known cache speculation vulnerability, known as Branch History Injection (BHI) or Spectre-BHB, for the new hw AmpereOne (bsc#1211855).
- CVE-2023-2269: Fixed a denial-of-service problem due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c (bsc#1210806).
- CVE-2023-1079: Fixed a use-after-free problem that could have been triggered in asus_kbd_backlight_set when plugging/disconnecting a malicious USB device (bsc#1208604).
- CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647).
- CVE-2023-21106: Fixed possible memory corruption due to double free in adreno_set_param of adreno_gpu.c (bsc#1211654).
- CVE-2023-33288: Fixed a use-after-free in bq24190_remove in drivers/power/supply/bq24190_charger.c (bsc#1211590).
- CVE-2022-45886: Fixed a .disconnect versus dvb_device_open race condition in dvb_net.c that lead to a use-after-free (bsc#1205760).
- CVE-2022-45885: Fixed a race condition in dvb_frontend.c that could cause a use-after-free when a device is disconnected (bsc#1205758).
- CVE-2022-45887: Fixed a memory leak in ttusb_dec.c caused by the lack of a dvb_frontend_detach call (bsc#1205762).
- CVE-2022-45919: Fixed a use-after-free in dvb_ca_en50221.c that could occur if there is a disconnect after an open, because of the lack of a wait_event (bsc#1205803).
- CVE-2022-45884: Fixed a use-after-free in dvbdev.c, related to dvb_register_device dynamically allocating fops (bsc#1205756).
- CVE-2023-31084: Fixed a blocking issue in drivers/media/dvb-core/dvb_frontend.c (bsc#1210783).
- CVE-2023-2002: Fixed a flaw that allowed an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication (bsc#1210533).
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210940).
- CVE-2023-30456: Fixed an issue in arch/x86/kvm/vmx/nested.c with nVMX on x86_64 lacks consistency checks for CR0 and CR4 (bsc#1210294).
- CVE-2022-4269: Fixed a flaw was found inside the Traffic Control (TC) subsystem (bsc#1206024).
- CVE-2023-32233: Fixed a use-after-free in Netfilter nf_tables when processing batch requests (bsc#1211043).
- CVE-2023-1380: Fixed a slab-out-of-bound read problem in brcmf_get_assoc_ies() (bsc#1209287).
- CVE-2023-2513: Fixed a use-after-free vulnerability in the ext4 filesystem (bsc#1211105).
- CVE-2023-2483: Fixed a use after free bug in emac_remove caused by a race condition (bsc#1211037).
- CVE-2023-2124: Fixed an out-of-bound access in the XFS subsystem that could have lead to denial-of-service or potentially privilege escalation (bsc#1210498).
- CVE-2023-2235: Fixed a use-after-free vulnerability in the Performance Events system that could have been exploited to achieve local privilege escalation (bsc#1210986).
- CVE-2022-2196: Fixed a regression related to KVM that allowed for speculative execution attacks (bsc#1206992).
- CVE-2023-23006: Fixed NULL vs IS_ERR checking in dr_domain_init_resources (bsc#1208845).
- CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).
- CVE-2023-2176: Fixed an out-of-boundary read in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA (bsc#1210629).
- CVE-2023-1998: Fixed a use after free during login when accessing the shost ipaddress (bsc#1210506).
- CVE-2023-1855: Fixed a use after free in xgene_hwmon_remove (bsc#1210202).
- CVE-2023-30772: Fixed race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329).
- CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336).
- CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).
- CVE-2023-1838: Fixed an use-after-free flaw in virtio network subcomponent. This flaw could allow a local attacker to crash the system and lead to a kernel information leak problem. (bsc#1210203).
- CVE-2023-0394: Fixed a null pointer dereference in the network subcomponent. This flaw could cause system crashes (bsc#1207168).
- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).
- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/uetooth/hci_conn.c (bsc#1209052).
- CVE-2023-1637: Fixed vulnerability that could lead to unauthorized access to CPU memory after resuming CPU from suspend-to-RAM (bsc#1209779).
- CVE-2023-1652: Fixed use-after-free that could lead to DoS and information leak in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c (bsc#1209788).
- CVE-2023-1583: Fixed a NULL pointer dereference in io_file_bitmap_get in io_uring/filetable.c (bsc#1209637).
- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209635).
- CVE-2023-1582: Fixed soft lockup in __page_mapcount (bsc#1209636).
- CVE-2023-28327: Fixed DoS in in_skb in unix_diag_get_exact() (bsc#1209290).
- CVE-2023-23001: Fixed misinterpretation of regulator_get return value in drivers/scsi/ufs/ufs-mediatek.c (bsc#1208829).
- CVE-2023-1075: Fixed a type confusion in tls_is_tx_ready (bsc#1208598).
- CVE-2023-1076: Fixed incorrect UID assigned to tun/tap sockets (bsc#1208599).
- CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777).
- CVE-2023-25012: Fixed a use-after-free in bigben_set_led() (bsc#1207560).
- CVE-2023-23004: Fixed misinterpretation of get_sg_table return value (bsc#1208843).
- CVE-2023-22998: Fixed NULL vs IS_ERR checking in virtio_gpu_object_shmem_init (bsc#1208776).
- CVE-2023-23000: Fixed return value of tegra_xusb_find_port_node function phy/tegra (bsc#1208816).
- CVE-2023-1118: Fixed a use-after-free bugs caused by ene_tx_irqsim() in media/rc (bsc#1208837).
- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787).
- CVE-2023-26545: Fixed double free in net/mpls/af_mpls.c upon an allocation failure (bsc#1208700).
- CVE-2023-0597: Fixed lack of randomization of per-cpu entry area in x86/mm (bsc#1207845).
- CVE-2022-38096: Fixed NULL-ptr deref in vmw_cmd_dx_define_query() (bsc#1203331).
- CVE-2022-36280: Fixed out-of-bounds memory access vulnerability found in vmwgfx driver (bsc#1203332).
- CVE-2023-0045: Fixed missing Flush IBP in ib_prctl_set (bsc#1207773).
- CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).
- CVE-2023-0122: Fixed a NULL pointer dereference vulnerability in nvmet_setup_auth(), that allowed an attacker to perform a Pre-Auth Denial of Service (DoS) attack on a remote machine (bsc#1207050).
- CVE-2023-0469: Fixed a use-after-free flaw in io_uring/filetable.c in io_install_fixed_file in the io_uring subcomponent (bsc#1207521).
- CVE-2023-0179: Fixed incorrect arithmetics when fetching VLAN header bits (bsc#1207034).

The following non-security bugs were fixed:

- 3c589_cs: Fix an error handling path in tc589_probe() (git-fixes).
- ACPI / x86: Add support for LPS0 callback handler (git-fixes).
- ACPI: CPPC: Disable FIE if registers in PCC regions (bsc#1210953).
- ACPI: Do not build ACPICA with '-Os' (git-fixes).
- ACPI: EC: Fix EC address space handler unregistration (bsc#1207149).
- ACPI: EC: Fix ECDT probe ordering issues (bsc#1207149).
- ACPI: EC: Fix oops when removing custom query handlers (git-fixes).
- ACPI: NFIT: fix a potential deadlock during NFIT teardown (git-fixes).
- ACPI: PM: Do not turn of unused power resources on the Toshiba Click Mini (git-fixes).
- ACPI: PM: s2idle: Add support for upcoming AMD uPEP HID AMDI008 (bsc#1206224).
- ACPI: PM: s2idle: Use LPS0 idle if ACPI_FADT_LOW_POWER_S0 is unset (bsc#1206224).
- ACPI: PPTT: Fix to avoid sleep in the atomic context when PPTT is absent (git-fixes).
- ACPI: VIOT: Initialize the correct IOMMU fwspec (git-fixes).
- ACPI: battery: Fix missing NUL-termination with large strings (git-fixes).
- ACPI: bus: Ensure that notify handlers are not running after removal (git-fixes).
- ACPI: processor: Fix evaluating _PDC method when running as Xen dom0 (git-fixes).
- ACPI: resource: Add IRQ override quirk for LG UltraPC 17U70P (git-fixes).
- ACPI: resource: Add IRQ overrides for MAINGEAR Vector Pro 2 models (git-fixes).
- ACPI: resource: Add Medion S17413 to IRQ override quirk (git-fixes).
- ACPI: resource: Add helper function acpi_dev_get_memory_resources() (git-fixes).
- ACPI: resource: Do IRQ override on all TongFang GMxRGxx (git-fixes).
- ACPI: tables: Add support for NBFT (bsc#1195921).
- ACPI: tables: Add support for NBFT (bsc#1206340).
- ACPI: video: Add acpi_video_backlight_use_native() helper (bsc#1206843).
- ACPI: video: Allow GPU drivers to report no panels (bsc#1206843).
- ACPI: video: Fix Lenovo Ideapad Z570 DMI match (git-fixes).
- ACPI: video: Fix missing native backlight on Chromebooks (bsc#1206843).
- ACPI: video: Refactor acpi_video_get_backlight_type() a bit (bsc#1203693).
- ACPI: x86: s2idle: Add a quirk for ASUS ROG Zephyrus G14 (bsc#1206224).
- ACPI: x86: s2idle: Add a quirk for ASUS TUF Gaming A17 FA707RE (bsc#1206224).
- ACPI: x86: s2idle: Add a quirk for ASUSTeK COMPUTER INC. ROG Flow X13 (bsc#1206224).
- ACPI: x86: s2idle: Add a quirk for Lenovo Slim 7 Pro 14ARH7 (bsc#1206224).
- ACPI: x86: s2idle: Add another ID to s2idle_dmi_table (bsc#1206224).
- ACPI: x86: s2idle: Add module parameter to prefer Microsoft GUID (bsc#1206224).
- ACPI: x86: s2idle: Fix a NULL pointer dereference (bsc#1206224).
- ACPI: x86: s2idle: Force AMD GUID/_REV 2 on HP Elitebook 865 (bsc#1206224).
- ACPI: x86: s2idle: If a new AMD _HID is missing assume Rembrandt (bsc#1206224).
- ACPI: x86: s2idle: Move _HID handling for AMD systems into structures (bsc#1206224).
- ACPI: x86: s2idle: Stop using AMD specific codepath for Rembrandt+ (bsc#1206224).
- ACPI: x86: utils: Add Cezanne to the list for forcing StorageD3Enable (git-fixes).
- ACPICA: ACPICA: check null return of ACPI_ALLOCATE_ZEROED in acpi_db_display_objects (git-fixes).
- ACPICA: Allow address_space_handler Install and _REG execution as 2 separate steps (bsc#1207149).
- ACPICA: Avoid undefined behavior: applying zero offset to null pointer (git-fixes).
- ACPICA: Drop port I/O validation for some regions (git-fixes).
- ACPICA: include/acpi/acpixf.h: Fix indentation (bsc#1207149).
- ACPICA: nsrepair: handle cases without a return value correctly (git-fixes).
- ALSA: asihpi: check pao in control_message() (git-fixes).
- ALSA: caiaq: input: Add error handling for unsupported input methods in `snd_usb_caiaq_input_init` (git-fixes).
- ALSA: cs46xx: mark snd_cs46xx_download_image as static (git-fixes).
- ALSA: emu10k1: do not create old pass-through playback device on Audigy (git-fixes).
- ALSA: emu10k1: fix capture interrupt handler unlinking (git-fixes).
- ALSA: emux: Avoid potential array out-of-bound in snd_emux_xg_control() (git-fixes).
- ALSA: firewire-digi00x: prevent potential use after free (git-fixes).
- ALSA: firewire-tascam: add missing unwind goto in snd_tscm_stream_start_duplex() (git-fixes).
- ALSA: hda/ca0132: add quirk for EVGA X299 DARK (git-fixes).
- ALSA: hda/ca0132: fixup buffer overrun at tuning_ctl_set() (git-fixes).
- ALSA: hda/ca0132: minor fix for allocation size (git-fixes).
- ALSA: hda/cirrus: Add extra 10 ms delay to allow PLL settle and lock (git-fixes).
- ALSA: hda/conexant: Partial revert of a quirk for Lenovo (git-fixes).
- ALSA: hda/conexant: add a new hda codec SN6180 (git-fixes).
- ALSA: hda/hdmi: Preserve the previous PCM device upon re-enablement (git-fixes).
- ALSA: hda/hdmi: disable KAE for Intel DG2 (git-fixes).
- ALSA: hda/realtek - fixed wrong gpio assigned (git-fixes).
- ALSA: hda/realtek: Add Acer Predator PH315-54 (git-fixes).
- ALSA: hda/realtek: Add Lenovo P3 Tower platform (git-fixes).
- ALSA: hda/realtek: Add Positivo N14KP6-TG (git-fixes).
- ALSA: hda/realtek: Add a quirk for HP EliteDesk 805 (git-fixes).
- ALSA: hda/realtek: Add a quirk for HP Slim Desktop S01 (git-fixes).
- ALSA: hda/realtek: Add quirk for 2nd ASUS GU603 (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS UM3402 using CS35L41 (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS UM3402YAR using CS35L41 (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo L140AU (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NS50AU (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo X370SNW (git-fixes).
- ALSA: hda/realtek: Add quirk for HP EliteBook G10 laptops (git-fixes).
- ALSA: hda/realtek: Add quirk for HP EliteDesk 800 G6 Tower PC (git-fixes).
- ALSA: hda/realtek: Add quirk for Lenovo ZhaoYang CF4620Z (git-fixes).
- ALSA: hda/realtek: Add quirk for ThinkPad P1 Gen 6 (git-fixes).
- ALSA: hda/realtek: Add quirks for Asus ROG 2024 laptops using CS35L41 (git-fixes).
- ALSA: hda/realtek: Add quirks for Lenovo Z13/Z16 Gen2 (git-fixes).
- ALSA: hda/realtek: Add quirks for some Clevo laptops (git-fixes).
- ALSA: hda/realtek: Apply HP B&amp;O top speaker profile to Pavilion 15 (git-fixes).
- ALSA: hda/realtek: Enable 4 amplifiers instead of 2 on a HP platform (git-fixes).
- ALSA: hda/realtek: Enable headset onLenovo M70/M90 (git-fixes).
- ALSA: hda/realtek: Enable mute/micmute LEDs and speaker support for HP Laptops (git-fixes).
- ALSA: hda/realtek: Enable mute/micmute LEDs on HP Elitebook, 645 G9 (git-fixes).
- ALSA: hda/realtek: Fix mute and micmute LEDs for an HP laptop (git-fixes).
- ALSA: hda/realtek: Fix mute and micmute LEDs for yet another HP laptop (git-fixes).
- ALSA: hda/realtek: Fix support for Dell Precision 3260 (git-fixes).
- ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book2 Pro (git-fixes).
- ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book2 Pro 360 (git-fixes).
- ALSA: hda/realtek: Remove specific patch for Dell Precision 3260 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs do not work for a HP platform (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs do not work for a HP platform (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs, speaker do not work for a HP platform (git-fixes).
- ALSA: hda/realtek: fix speaker, mute/micmute LEDs not work on a HP platform (git-fixes).
- ALSA: hda/realtek: support HP Pavilion Aero 13-be0xxx Mute LED (git-fixes).
- ALSA: hda/sigmatel: add pin overrides for Intel DP45SG motherboard (git-fixes).
- ALSA: hda/sigmatel: fix S/PDIF out on Intel D*45* motherboards (git-fixes).
- ALSA: hda/via: Avoid potential array out-of-bound in add_secret_dac_path() (git-fixes).
- ALSA: hda: Add NVIDIA codec IDs a3 through a7 to patch table (git-fixes).
- ALSA: hda: Do not unset preset when cleaning up codec (git-fixes).
- ALSA: hda: Fix Oops by 9.1 surround channel names (git-fixes).
- ALSA: hda: Fix unhandled register update during auto-suspend period (git-fixes).
- ALSA: hda: Glenfly: add HD Audio PCI IDs and HDMI Codec Vendor IDs (git-fixes).
- ALSA: hda: Match only Intel devices with CONTROLLER_IN_GPU() (git-fixes).
- ALSA: hda: cs35l41: Enable Amp High Pass Filter (git-fixes).
- ALSA: hda: intel-dsp-config: add MTL PCI id (git-fixes).
- ALSA: hda: patch_realtek: add quirk for Asus N7601ZM (git-fixes).
- ALSA: i2c/cs8427: fix iec958 mixer control deactivation (git-fixes).
- ALSA: ice1712: Delete unreachable code in aureon_add_controls() (git-fixes).
- ALSA: ice1712: Do not left ice-&gt;gpio_mutex locked in aureon_add_controls() (git-fixes).
- ALSA: memalloc: Workaround for Xen PV (git-fixes).
- ALSA: oss: avoid missing-prototype warnings (git-fixes).
- ALSA: pci: lx6464es: fix a debug loop (git-fixes).
- ALSA: usb-audio: Add a sample rate workaround for Line6 Pod Go (git-fixes).
- ALSA: usb-audio: Add quirk for Pioneer DDJ-800 (git-fixes).
- ALSA: usb-audio: Fix recursive locking at XRUN during syncing (git-fixes).
- ALSA: usb-audio: Fix regression on detection of Roland VS-100 (git-fixes).
- ALSA: ymfpci: Fix BUG_ON in probe function (git-fixes).
- ARM64: dts: Add DTS files for bcmbca SoC BCM6858 (git-fixes).
- ARM: 9290/1: uaccess: Fix KASAN false-positives (git-fixes).
- ARM: 9296/1: HP Jornada 7XX: fix kernel-doc warnings (git-fixes).
- ARM: OMAP1: call platform_device_put() in error case in omap1_dm_timer_init() (git-fixes).
- ARM: OMAP2+: Fix memory leak in realtime_counter_init() (git-fixes).
- ARM: bcm2835_defconfig: Enable the framebuffer (git-fixes).
- ARM: defconfig: drop CONFIG_DRM_RCAR_LVDS (git-fixes).
- ARM: dts: am5748: keep usb4_tm disabled (git-fixes)
- ARM: dts: exynos: Use Exynos5420 compatible for the MIPI video phy (git-fixes).
- ARM: dts: exynos: correct HDMI phy compatible in Exynos4 (git-fixes).
- ARM: dts: exynos: correct TMU phandle in Exynos4 (git-fixes).
- ARM: dts: exynos: correct TMU phandle in Exynos4210 (git-fixes).
- ARM: dts: exynos: correct TMU phandle in Exynos5250 (git-fixes).
- ARM: dts: exynos: correct TMU phandle in Odroid HC1 (git-fixes).
- ARM: dts: exynos: correct TMU phandle in Odroid XU (git-fixes).
- ARM: dts: exynos: correct TMU phandle in Odroid XU3 family (git-fixes).
- ARM: dts: exynos: correct wr-active property in Exynos3250 Rinato (git-fixes).
- ARM: dts: exynos: fix WM8960 clock name in Itop Elite (git-fixes).
- ARM: dts: gta04: fix excess dma channel usage (git-fixes).
- ARM: dts: imx6sl: tolino-shine2hd: fix usbotg1 pinctrl (git-fixes).
- ARM: dts: imx6sll: e60k02: fix usbotg1 pinctrl (git-fixes).
- ARM: dts: imx7-colibri-eval-v3: correct can controller comment (git-fixes)
- ARM: dts: imx7s: correct iomuxc gpr mux controller cells (git-fixes).
- ARM: dts: imx: Fix pca9547 i2c-mux node name (git-fixes).
- ARM: dts: qcom: ipq4019: Fix the PCI I/O port range (git-fixes).
- ARM: dts: qcom: ipq8064: Fix the PCI I/O port range (git-fixes).
- ARM: dts: qcom: ipq8064: reduce pci IO size to 64K (git-fixes).
- ARM: dts: qcom: msm8974: add required ranges to OCMEM (git-fixes)
- ARM: dts: qcom: sdx55: Add Qcom SMMU-500 as the fallback for IOMMU node (git-fixes).
- ARM: dts: rockchip: add power-domains property to dp node on rk3288 (git-fixes).
- ARM: dts: rockchip: fix a typo error for rk3288 spdif node (git-fixes).
- ARM: dts: s5pv210: correct MIPI CSIS clock name (git-fixes).
- ARM: dts: spear320-hmi: correct STMPE GPIO compatible (git-fixes).
- ARM: dts: stm32: add missing usbh clock and fix clk order on (git-fixes)
- ARM: dts: stm32: use usbphyc ck_usbo_48m as USBH OHCI clock on (git-fixes)
- ARM: dts: sun8i: nanopi-duo2: Fix regulator GPIO reference (git-fixes).
- ARM: dts: vf610: Fix pca9548 i2c-mux node names (git-fixes).
- ARM: imx: Call ida_simple_remove() for ida_simple_get (git-fixes).
- ARM: imx: rename DEBUG_IMX21_IMX27_UART to DEBUG_IMX27_UART (git-fixes)
- ARM: omap: remove debug-leds driver (git-fixes)
- ARM: remove some dead code (git-fixes)
- ARM: renumber bits related to _TIF_WORK_MASK (git-fixes)
- ARM: s3c: fix s3c64xx_set_timer_source prototype (git-fixes).
- ARM: shmobile: rcar-gen2: Add missing of_node_put() (git-fixes)
- ARM: zynq: Fix refcount leak in zynq_early_slcr_init (git-fixes).
- ASN.1: Fix check for strdup() success (git-fixes).
- ASOC: Intel: sof_sdw: add quirk for Intel 'Rooks County' NUC M15 (git-fixes).
- ASoC: Intel: Skylake: Fix declaration of enum skl_ch_cfg (git-fixes).
- ASoC: Intel: Skylake: Fix driver hang during shutdown (git-fixes).
- ASoC: Intel: avs: Access path components under lock (git-fixes).
- ASoC: Intel: avs: Fix declaration of enum avs_channel_config (git-fixes).
- ASoC: Intel: avs: Implement PCI shutdown (git-fixes).
- ASoC: Intel: avs: Use min_t instead of min with cast (git-fixes).
- ASoC: Intel: boards: fix spelling in comments (git-fixes).
- ASoC: Intel: bytcht_es8316: Drop reference count of ACPI device after use (git-fixes).
- ASoC: Intel: bytcht_es8316: Drop reference count of ACPI device after use (git-fixes).
- ASoC: Intel: bytcht_es8316: move comment to the right place (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Acer Iconia One 7 B1-750 (git-fixes).
- ASoC: Intel: bytcr_rt5640: Drop reference count of ACPI device after use (git-fixes).
- ASoC: Intel: bytcr_rt5651: Drop reference count of ACPI device after use (git-fixes).
- ASoC: Intel: bytcr_wm5102: Drop reference count of ACPI device after use (git-fixes).
- ASoC: Intel: soc-acpi-byt: Fix 'WM510205' match no longer working (git-fixes).
- ASoC: Intel: soc-acpi: fix copy-paste issue in topology names (git-fixes).
- ASoC: Intel: sof_cs42l42: always set dpcm_capture for amplifiers (git-fixes).
- ASoC: Intel: sof_es8336: Drop reference count of ACPI device after use (git-fixes).
- ASoC: Intel: sof_rt5682: always set dpcm_capture for amplifiers (git-fixes).
- ASoC: SOF: Intel: MTL: Fix the device description (git-fixes).
- ASoC: SOF: ipc4-topology: set dmic dai index from copier (git-fixes).
- ASoC: SOF: ipc4: Ensure DSP is in D0I0 during sof_ipc4_set_get_data() (git-fixes).
- ASoC: adau7118: do not disable regulators on device unbind (git-fixes).
- ASoC: amd: acp-es8336: Drop reference count of ACPI device after use (git-fixes).
- ASoC: codecs: Change bulk clock voting to optional voting in digital codecs (git-fixes).
- ASoC: codecs: lpass: fix incorrect mclk rate (git-fixes).
- ASoC: codecs: rx-macro: move clk provider to managed variants (git-fixes).
- ASoC: codecs: rx-macro: move to individual clks from bulk (git-fixes).
- ASoC: codecs: tx-macro: Fix for KASAN: slab-out-of-bounds (git-fixes).
- ASoC: codecs: tx-macro: move clk provider to managed variants (git-fixes).
- ASoC: codecs: tx-macro: move to individual clks from bulk (git-fixes).
- ASoC: codecs: wsa881x: do not set can_multi_write flag (git-fixes).
- ASoC: cs35l41: Only disable internal boost (git-fixes).
- ASoC: cs42l56: fix DT probe (git-fixes).
- ASoC: dt-bindings: meson: fix gx-card codec node regex (git-fixes).
- ASoC: dwc: limit the number of overrun messages (git-fixes).
- ASoC: es8316: Handle optional IRQ assignment (git-fixes).
- ASoC: fsl-asoc-card: Fix naming of AC'97 CODEC widgets (git-fixes).
- ASoC: fsl_asrc_dma: fix potential null-ptr-deref (git-fixes).
- ASoC: fsl_micfil: Correct the number of steps on SX controls (git-fixes).
- ASoC: fsl_micfil: Fix error handler with pm_runtime_enable (git-fixes).
- ASoC: fsl_mqs: move of_node_put() to the correct location (git-fixes).
- ASoC: fsl_sai: Update to modern clocking terminology (git-fixes).
- ASoC: fsl_ssi: Rename AC'97 streams to avoid collisions with AC'97 CODEC (git-fixes).
- ASoC: hdac_hdmi: use set_stream() instead of set_tdm_slots() (git-fixes).
- ASoC: kirkwood: Iterate over array indexes instead of using pointer math (git-fixes).
- ASoC: lpass: Fix for KASAN use_after_free out of bounds (git-fixes).
- ASoC: mchp-spdifrx: Fix uninitialized use of mr in mchp_spdifrx_hw_params() (git-fixes).
- ASoC: mchp-spdifrx: disable all interrupts in mchp_spdifrx_dai_remove() (git-fixes).
- ASoC: mchp-spdifrx: fix controls which rely on rsr register (git-fixes).
- ASoC: rsnd: Remove unnecessary rsnd_dbg_dai_call() (git-fixes).
- ASoC: rsnd: fixup #endif position (git-fixes).
- ASoC: rt1308-sdw: add the default value of some registers (git-fixes).
- ASoC: rt5682: Disable jack detection interrupt during suspend (git-fixes).
- ASoC: rt715-sdca: fix clock stop prepare timeout issue (git-fixes).
- ASoC: soc-compress.c: fixup private_data on snd_soc_new_compress() (git-fixes).
- ASoC: soc-compress: Inherit atomicity from DAI link for Compress FE (git-fixes).
- ASoC: soc-compress: Reposition and add pcm_mutex (git-fixes).
- ASoC: soc-dapm.h: fixup warning struct snd_pcm_substream not declared (git-fixes).
- ASoC: soc-pcm: fix hw-&gt;formats cleared by soc_pcm_hw_init() for dpcm (git-fixes).
- ASoC: ssm2602: Add workaround for playback distortions (git-fixes).
- ASoC: tlv320adcx140: fix 'ti,gpio-config' DT property init (git-fixes).
- ASoC: topology: Properly access value coming from topology file (git-fixes).
- ASoC: topology: Return -ENOMEM on memory allocation failure (git-fixes).
- ASoC: zl38060 add gpiolib dependency (git-fixes).
- ASoC: zl38060: Remove spurious gpiolib select (git-fixes).
- Add 42a11bf5c543 cgroup/cpuset: Make cpuset_fork() handle CLONE_INTO_CGROUP properly
- Bluetooth: Fix crash when replugging CSR fake controllers (git-fixes).
- Bluetooth: Fix l2cap_disconnect_req deadlock (git-fixes).
- Bluetooth: Fix race condition in hci_cmd_sync_clear (git-fixes).
- Bluetooth: Fix race condition in hidp_session_thread (git-fixes).
- Bluetooth: Fix support for Read Local Supported Codecs V2 (git-fixes).
- Bluetooth: HCI: Fix global-out-of-bounds (git-fixes).
- Bluetooth: ISO: Avoid circular locking dependency (git-fixes).
- Bluetooth: ISO: Fix possible circular locking dependency (git-fixes).
- Bluetooth: ISO: Fix possible circular locking dependency (git-fixes).
- Bluetooth: ISO: do not try to remove CIG if there are bound CIS left (git-fixes).
- Bluetooth: ISO: fix timestamped HCI ISO data packet parsing (git-fixes).
- Bluetooth: L2CAP: Add missing checks for invalid DCID (git-fixes).
- Bluetooth: L2CAP: Fix potential user-after-free (git-fixes).
- Bluetooth: L2CAP: Fix responding with wrong PDU type (git-fixes).
- Bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp} (git-fixes).
- Bluetooth: L2CAP: fix 'bad unlock balance' in l2cap_disconnect_rsp (git-fixes).
- Bluetooth: Remove codec id field in vendor codec definition (git-fixes).
- Bluetooth: SCO: Fix possible circular locking dependency sco_sock_getsockopt (git-fixes).
- Bluetooth: Set ISO Data Path on broadcast sink (git-fixes).
- Bluetooth: btintel: Add LE States quirk support (git-fixes).
- Bluetooth: btqcomsmd: Fix command timeout after setting BD address (git-fixes).
- Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work (git-fixes).
- Bluetooth: btusb: Add VID:PID 13d3:3529 for Realtek RTL8821CE (git-fixes).
- Bluetooth: btusb: Remove detection of ISO packets over bulk (git-fixes).
- Bluetooth: hci_bcm: Fall back to getting bdaddr from EFI if not set (git-fixes).
- Bluetooth: hci_conn: Fix memory leaks (git-fixes).
- Bluetooth: hci_conn: Fix not cleaning up on LE Connection failure (git-fixes).
- Bluetooth: hci_conn: Refactor hci_bind_bis() since it always succeeds (git-fixes).
- Bluetooth: hci_conn: use HCI dst_type values also for BIS (git-fixes).
- Bluetooth: hci_core: Detect if an ACL packet is in fact an ISO packet (git-fixes).
- Bluetooth: hci_core: fix error handling in hci_register_dev() (git-fixes).
- Bluetooth: hci_event: Fix Invalid wait context (git-fixes).
- Bluetooth: hci_qca: Fix the teardown problem for real (git-fixes).
- Bluetooth: hci_qca: fix debugfs registration (git-fixes).
- Bluetooth: hci_qca: get wakeup status from serdev device handle (git-fixes).
- Bluetooth: hci_sock: purge socket queues in the destruct() callback (git-fixes).
- Bluetooth: hci_sync: Fix not indicating power state (git-fixes).
- Bluetooth: hci_sync: Fix use HCI_OP_LE_READ_BUFFER_SIZE_V2 (git-fixes).
- Bluetooth: hci_sync: cancel cmd_timer if hci_open failed (git-fixes).
- Documentation/filesystems: ramfs-rootfs-initramfs: use :Author: (git-fixes).
- Documentation/filesystems: sharedsubtree: add section headings (git-fixes).
- Documentation/hw-vuln: Document the interaction between IBRS and STIBP (git-fixes).
- Documentation: simplify and clarify DCO contribution example language (git-fixes).
- Drivers: vmbus: Check for channel allocation before looking up relids (git-fixes).
- EDAC/i10nm: Add Intel Emerald Rapids server support (PED-4400).
- HID: Add Mapping for System Microphone Mute (git-fixes).
- HID: asus: use spinlock to protect concurrent accesses (git-fixes).
- HID: asus: use spinlock to safely schedule workers (git-fixes).
- HID: bigben: use spinlock to protect concurrent accesses (git-fixes).
- HID: bigben: use spinlock to safely schedule workers (git-fixes).
- HID: bigben_worker() remove unneeded check on report_field (git-fixes).
- HID: core: Fix deadloop in hid_apply_multiplier (git-fixes).
- HID: cp2112: Fix driver not registering GPIO IRQ chip as threaded (git-fixes).
- HID: elecom: add support for TrackBall 056E:011C (git-fixes).
- HID: google: add jewel USB id (git-fixes).
- HID: intel-ish-hid: ipc: Fix potential use-after-free in work function (git-fixes).
- HID: logitech-hidpp: Do not restart communication if not necessary (git-fixes).
- HID: logitech-hidpp: Do not use the USB serial for USB devices (git-fixes).
- HID: logitech-hidpp: Reconcile USB and Unifying serials (git-fixes).
- HID: microsoft: Add rumble support to latest xbox controllers (bsc#1211280).
- HID: multitouch: Add quirks for flipped axes (git-fixes).
- HID: playstation: sanity check DualSense calibration data (git-fixes).
- HID: retain initial quirks set up when creating HID devices (git-fixes).
- HID: wacom: Add new Intuos Pro Small (PTH-460) device IDs (git-fixes).
- HID: wacom: Force pen out of prox if no events have been received in a while (git-fixes).
- HID: wacom: Set a default resolution for older tablets (git-fixes).
- HID: wacom: add three styli to wacom_intuos_get_tool_type (git-fixes).
- HID: wacom: avoid integer overflow in wacom_intuos_inout() (git-fixes).
- HID: wacom: generic: Set battery quirk only when we see battery data (git-fixes).
- HV: hv_balloon: fix memory leak with using debugfs_lookup() (git-fixes).
- IB/IPoIB: Fix legacy IPoIB due to wrong number of queues (git-fixes)
- IB/hfi1: Assign npages earlier (git-fixes)
- IB/hfi1: Fix SDMA mmu_rb_node not being evicted in LRU order (git-fixes)
- IB/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests (git-fixes)
- IB/hfi1: Fix expected receive setup error exit issues (git-fixes)
- IB/hfi1: Fix math bugs in hfi1_can_pin_pages() (git-fixes)
- IB/hfi1: Fix sdma.h tx-&gt;num_descs off-by-one errors (git-fixes)
- IB/hfi1: Immediately remove invalid memory from hardware (git-fixes)
- IB/hfi1: Reject a zero-length user expected buffer (git-fixes)
- IB/hfi1: Remove user expected buffer invalidate race (git-fixes)
- IB/hfi1: Reserve user expected TIDs (git-fixes)
- IB/hfi1: Restore allocated resources on failed copyout (git-fixes)
- IB/hfi1: Update RMT size calculation (git-fixes)
- IB/hifi1: add a null check of kzalloc_node in hfi1_ipoib_txreq_init (git-fixes)
- IB/mad: Do not call to function that might sleep while in atomic context (git-fixes).
- IB/mlx5: Add support for 400G_8X lane speed (git-fixes)
- IB/rdmavt: add missing locks in rvt_ruc_loopback (git-fixes)
- Input: ads7846 - always set last command to PWRDOWN (git-fixes).
- Input: ads7846 - do not check penirq immediately for 7845 (git-fixes).
- Input: ads7846 - do not report pressure for ads7845 (git-fixes).
- Input: alps - fix compatibility with -funsigned-char (bsc#1209805).
- Input: exc3000 - properly stop timer on shutdown (git-fixes).
- Input: fix open count when closing inhibited device (git-fixes).
- Input: focaltech - use explicitly signed char type (git-fixes).
- Input: goodix - add Lenovo Yoga Book X90F to nine_bytes_report DMI table (git-fixes).
- Input: hp_sdc_rtc - mark an unused function as __maybe_unused (git-fixes).
- Input: iqs269a - configure device with a single block write (git-fixes).
- Input: iqs269a - drop unused device node references (git-fixes).
- Input: iqs269a - increase interrupt handler return delay (git-fixes).
- Input: iqs626a - drop unused device node references (git-fixes).
- Input: raspberrypi-ts - fix refcount leak in rpi_ts_probe (git-fixes).
- Input: xpad - add constants for GIP interface numbers (git-fixes).
- KABI FIX FOR NFSv4: Fix free of uninitialized nfs4_label on referral lookup (git-fixes).
- KABI FIX FOR: NFS: Further optimisations for 'ls -l' (git-fixes).
- KABI FIX FOR: NFSD: Have legacy NFSD WRITE decoders use xdr_stream_subsegment() (git-fixes).
- KABI FIX FOR: NFSv4.1 query for fs_location attr on a new file system (Never, kabi).
- KABI FIX FOR: NFSv4: keep state manager thread active if swap is enabled (Never, kabi).
- KABI fix for: NFSv3: handle out-of-order write replies (bsc#1205544).
- KEYS: Add missing function documentation (git-fixes).
- KEYS: Create static version of public_key_verify_signature (git-fixes).
- KEYS: asymmetric: Copy sig and digest in public_key_verify_signature() (git-fixes).
- KEYS: asymmetric: Fix ECDSA use via keyctl uapi (git-fixes).
- KMP: Remove obsolete KMP obsoletes (bsc#1210469).
- KVM: Destroy target device if coalesced MMIO unregistration fails (git-fixes)
- KVM: Disallow user memslot with size that exceeds 'unsigned long' (git-fixes)
- KVM: Do not create VM debugfs files outside of the VM directory (git-fixes)
- KVM: Do not set Accessed/Dirty bits for ZERO_PAGE (git-fixes)
- KVM: LAPIC: Enable timer posted-interrupt only when mwait/hlt is advertised (git-fixes).
- KVM: Prevent module exit until all VMs are freed (git-fixes)
- KVM: SVM: Do not rewrite guest ICR on AVIC IPI virtualization failure (git-fixes).
- KVM: SVM: Fix benign 'bool vs. int' comparison in svm_set_cr0() (git-fixes).
- KVM: SVM: Fix potential overflow in SEV's send|receive_update_data() (git-fixes).
- KVM: SVM: Require logical ID to be power-of-2 for AVIC entry (git-fixes).
- KVM: SVM: Skip WRMSR fastpath on VM-Exit if next RIP isn't valid (git-fixes).
- KVM: SVM: hyper-v: placate modpost section mismatch error (git-fixes).
- KVM: VMX: Introduce vmx_msr_bitmap_l01_changed() helper (git-fixes).
- KVM: VMX: Resume guest immediately when injecting #GP on ECREATE (git-fixes).
- KVM: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadow (git-fixes).
- KVM: VMX: Use is_64_bit_mode() to check 64-bit mode in SGX handler (git-fixes).
- KVM: X86: Fix tlb flush for tdp in kvm_invalidate_pcid() (git-fixes).
- KVM: arm64: Do not arm a hrtimer for an already pending timer (git-fixes)
- KVM: arm64: Do not return from void function (git-fixes)
- KVM: arm64: Fix PAR_TO_HPFAR() to work independently of PA_BITS. (git-fixes)
- KVM: arm64: Fix S1PTW handling on RO memslots (git-fixes)
- KVM: arm64: Fix bad dereference on MTE-enabled systems (git-fixes)
- KVM: arm64: Fix buffer overflow in kvm_arm_set_fw_reg() (git-fixes)
- KVM: arm64: Fix kvm init failure when mode!=vhe and VA_BITS=52. (git-fixes)
- KVM: arm64: Free hypervisor allocations if vector slot init fails (git-fixes)
- KVM: arm64: GICv4.1: Fix race with doorbell on VPE (git-fixes)
- KVM: arm64: Limit length in kvm_vm_ioctl_mte_copy_tags() to INT_MAX (git-fixes)
- KVM: arm64: PMU: Restore the guest's EL0 event counting after (git-fixes)
- KVM: arm64: Reject 32bit user PSTATE on asymmetric systems (git-fixes)
- KVM: arm64: Stop handle_exit() from handling HVC twice when an SError (git-fixes)
- KVM: arm64: Treat PMCR_EL1.LC as RES1 on asymmetric systems (git-fixes)
- KVM: arm64: nvhe: Eliminate kernel-doc warnings (git-fixes)
- KVM: arm64: vgic: Fix exit condition in scan_its_table() (git-fixes)
- KVM: nVMX: Also filter MSR_IA32_VMX_TRUE_PINBASED_CTLS when eVMCS (git-fixes).
- KVM: nVMX: Do not use Enlightened MSR Bitmap for L3 (git-fixes).
- KVM: nVMX: Document that ignoring memory failures for VMCLEAR is deliberate (git-fixes).
- KVM: nVMX: Emulate NOPs in L2, and PAUSE if it's not intercepted (git-fixes).
- KVM: nVMX: Inject #GP, not #UD, if 'generic' VMXON CR0/CR4 check fails (git-fixes).
- KVM: nVMX: Prioritize TSS T-flag #DBs over Monitor Trap Flag (git-fixes).
- KVM: nVMX: Properly expose ENABLE_USR_WAIT_PAUSE control to L1 (git-fixes).
- KVM: nVMX: Treat General Detect #DB (DR7.GD=1) as fault-like (git-fixes).
- KVM: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER (git-fixes).
- KVM: s390: selftest: memop: Fix integer literal (git-fixes).
- KVM: x86/emulator: Emulate RDPID only if it is enabled in guest (git-fixes).
- KVM: x86/mmu: avoid NULL-pointer dereference on page freeing bugs (git-fixes).
- KVM: x86/pmu: Ignore pmu-&gt;global_ctrl check if vPMU does not support global_ctrl (git-fixes).
- KVM: x86/svm: add __GFP_ACCOUNT to __sev_dbg_{en,de}crypt_user() (git-fixes).
- KVM: x86/vmx: Do not skip segment attributes if unusable bit is set (git-fixes).
- KVM: x86/xen: Fix memory leak in kvm_xen_write_hypercall_page() (git-fixes).
- KVM: x86: Copy filter arg outside kvm_vm_ioctl_set_msr_filter() (git-fixes).
- KVM: x86: Do not change ICR on write to APIC_SELF_IPI (git-fixes).
- KVM: x86: Fail emulation during EMULTYPE_SKIP on any exception (git-fixes).
- KVM: x86: Inject #GP if WRMSR sets reserved bits in APIC Self-IPI (git-fixes).
- KVM: x86: Mask off reserved bits in CPUID.8000001FH (git-fixes).
- KVM: x86: Mask off unsupported and unknown bits of IA32_ARCH_CAPABILITIES (git-fixes).
- KVM: x86: Protect the unused bits in MSR exiting flags (git-fixes).
- KVM: x86: Remove a redundant guest cpuid check in kvm_set_cr4() (git-fixes).
- KVM: x86: Report deprecated x87 features in supported CPUID (git-fixes).
- KVM: x86: do not set st-&gt;preempted when going back to user space (git-fixes).
- KVM: x86: fix sending PV IPI (git-fixes).
- KVM: x86: fix sending PV IPI (git-fixes).
- KVM: x86: fix typo in __try_cmpxchg_user causing non-atomicness (git-fixes).
- KVM: x86: ioapic: Fix level-triggered EOI and userspace I/OAPIC reconfigure race (git-fixes).
- Makefile: link with -z noexecstack --no-warn-rwx-segments (bsc#1203200).
- NFS: Always initialise fattr-&gt;label in nfs_fattr_alloc() (git-fixes).
- NFS: Avoid writeback threads getting stuck in mempool_alloc() (git-fixes).
- NFS: Cleanup unused rpc_clnt variable (git-fixes).
- NFS: Create a new nfs_alloc_fattr_with_label() function (git-fixes).
- NFS: Do not allocate nfs_fattr on the stack in __nfs42_ssc_open() (git-fixes).
- NFS: Fix an Oops in nfs_d_automount() (git-fixes).
- NFS: Fix careless typo (bsc#1209457)
- NFS: Further optimisations for 'ls -l' (git-fixes).
- NFS: Pass i_size to fscache_unuse_cookie() when a file is released (git-fixes).
- NFS: fix NFS Null pointer (bsc#1210725).
- NFS: fix disabling of swap (git-fixes).
- NFS: nfsiod should not block forever in mempool_alloc() (git-fixes).
- NFS: nfsiod should not block forever in mempool_alloc() (git-fixes).
- NFSD: Avoid calling OPDESC() with ops-&gt;opnum == OP_ILLEGAL (git-fixes).
- NFSD: COMMIT operations must not return NFS?ERR_INVAL (git-fixes).
- NFSD: De-duplicate net_generic(nf-&gt;nf_net, nfsd_net_id) (git-fixes).
- NFSD: Finish converting the NFSv2 GETACL result encoder (git-fixes).
- NFSD: Finish converting the NFSv3 GETACL result encoder (git-fixes).
- NFSD: Fix handling of oversized NFSv4 COMPOUND requests (git-fixes).
- NFSD: Fix nfsd_breaker_owns_lease() return values (git-fixes).
- NFSD: Have legacy NFSD WRITE decoders use xdr_stream_subsegment() (git-fixes).
- NFSD: Protect against filesystem freezing (git-fixes).
- NFSD: Return nfserr_serverfault if splice_ok but buf-&gt;pages have data (git-fixes).
- NFSD: callback request does not use correct credential for AUTH_SYS (git-fixes).
- NFSD: fix leaked reference count of nfsd4_ssc_umount_item (git-fixes).
- NFSD: fix problems with cleanup on errors in nfsd4_copy (git-fixes).
- NFSD: fix use-after-free in nfsd4_ssc_setup_dul() (git-fixes).
- NFSD: fix use-after-free on source server when doing inter-server copy (git-fixes).
- NFSD: pass range end to vfs_fsync_range() instead of count (git-fixes).
- NFSv3: handle out-of-order write replies (bsc#1205544).
- NFSv4 expose nfs_parse_server_name function (git-fixes).
- NFSv4 handle port presence in fs_location server string (git-fixes).
- NFSv4 only print the label when its queried (git-fixes).
- NFSv4 remove zero number of fs_locations entries error check (git-fixes).
- NFSv4 store server support for fs_location attribute (git-fixes).
- NFSv4.1 provide mount option to toggle trunking discovery (git-fixes).
- NFSv4.1 query for fs_location attr on a new file system (git-fixes).
- NFSv4.1: Fix uninitialised variable in devicenotify (git-fixes).
- NFSv4.1: Handle RECLAIM_COMPLETE trunking errors (git-fixes).
- NFSv4.1: We must always send RECLAIM_COMPLETE after a reboot (git-fixes).
- NFSv4.2: Clear FATTR4_WORD2_SECURITY_LABEL when done decoding (git-fixes).
- NFSv4.2: Fix a memory stomp in decode_attr_security_label (git-fixes).
- NFSv4.2: Fix initialisation of struct nfs4_label (git-fixes).
- NFSv4.2: Fixup CLONE dest file size for zero-length count (git-fixes).
- NFSv4.2: fix reference count leaks in _nfs42_proc_copy_notify() (git-fixes).
- NFSv4.x: Fail client initialisation if state manager thread can't run (git-fixes).
- NFSv4/pNFS: Always return layout stats on layout return for flexfiles (git-fixes).
- NFSv4/pnfs: Fix a use-after-free bug in open (git-fixes).
- NFSv4: Add an fattr allocation to _nfs4_discover_trunking() (git-fixes).
- NFSv4: Do not hold the layoutget locks across multiple RPC calls (git-fixes).
- NFSv4: Fix a credential leak in _nfs4_discover_trunking() (git-fixes).
- NFSv4: Fix a deadlock between nfs4_open_recover_helper() and delegreturn (git-fixes).
- NFSv4: Fix a potential state reclaim deadlock (git-fixes).
- NFSv4: Fix free of uninitialized nfs4_label on referral lookup (git-fixes).
- NFSv4: Fix hangs when recovering open state after a server reboot (git-fixes).
- NFSv4: Protect the state recovery thread against direct reclaim (git-fixes).
- NFSv4: Retry LOCK on OLD_STATEID during delegation return (git-fixes).
- NFSv4: keep state manager thread active if swap is enabled (git-fixes).
- PCI/ASPM: Remove pcie_aspm_pm_state_change() (git-fixes).
- PCI/DPC: Await readiness of secondary bus after reset (git-fixes).
- PCI/EDR: Clear Device Status after EDR error recovery (git-fixes).
- PCI/IOV: Enlarge virtfn sysfs name buffer (git-fixes).
- PCI/PM: Always disable PTM for all devices during suspend (git-fixes).
- PCI/PM: Avoid putting Elo i2 PCIe Ports in D3cold (git-fixes).
- PCI/PM: Fix bridge_d3_blacklist Elo i2 overwrite of Gigabyte X299 (git-fixes).
- PCI/PM: Observe reset delay irrespective of bridge_d3 (git-fixes).
- PCI/PTM: Add pci_suspend_ptm() and pci_resume_ptm() (git-fixes).
- PCI: Add ACS quirk for Wangxun NICs (git-fixes).
- PCI: Add SolidRun vendor ID (git-fixes).
- PCI: Align extra resources for hotplug bridges properly (git-fixes).
- PCI: Avoid FLR for AMD FCH AHCI adapters (git-fixes).
- PCI: Avoid pci_dev_lock() AB/BA deadlock with sriov_numvfs_store() (git-fixes).
- PCI: Fix dropping valid root bus resources with .end = zero (git-fixes).
- PCI: Reduce warnings on possible RW1C corruption (git-fixes).
- PCI: Take other bus devices into account when distributing resources (git-fixes).
- PCI: Unify delay handling for reset and resume (git-fixes).
- PCI: aardvark: Check return value of generic_handle_domain_irq() when processing INTx IRQ (git-fixes).
- PCI: aardvark: Fix link training (git-fixes).
- PCI: dwc: Add dw_pcie_ops.host_deinit() callback (git-fixes).
- PCI: dwc: Fix PORT_LINK_CONTROL update when CDM check enabled (git-fixes).
- PCI: hotplug: Allow marking devices as disconnected during bind/unbind (git-fixes).
- PCI: hv: Add a per-bus mutex state_lock (bsc#1207185).
- PCI: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1207185).
- PCI: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1207185).
- PCI: hv: Use async probing to reduce boot time (bsc#1207185).
- PCI: hv: fix a race condition bug in hv_pci_query_relations() (bsc#1207185).
- PCI: hv: update comment in x86 specific hv_arch_irq_unmask (git-fixes).
- PCI: imx6: Install the fault handler only on compatible match (git-fixes).
- PCI: loongson: Add more devices that need MRRS quirk (git-fixes).
- PCI: loongson: Prevent LS7A MRRS increases (git-fixes).
- PCI: mediatek-gen3: Assert resets to ensure expected init state (git-fixes).
- PCI: mediatek-gen3: Fix refcount leak in mtk_pcie_init_irq_domains() (git-fixes).
- PCI: pciehp: Fix AB-BA deadlock between reset_lock and device_lock (git-fixes).
- PCI: qcom: Fix host-init error handling (git-fixes).
- PCI: qcom: Fix pipe clock imbalance (git-fixes).
- PCI: qcom: Fix the incorrect register usage in v2.7.0 config (git-fixes).
- PCI: switchtec: Return -EFAULT for copy_to_user() errors (git-fixes).
- PCI: vmd: Fix secondary bus reset for Intel bridges (git-fixes).
- PCI: vmd: Fix secondary bus reset for Intel bridges (git-fixes).
- PCI: xgene: Revert 'PCI: xgene: Use inbound resources for setup' (git-fixes).
- PM: hibernate: Do not get block device exclusively in test_resume mode (git-fixes).
- PM: hibernate: Turn snapshot_test into global variable (git-fixes).
- PM: hibernate: fix load_image_and_restore() error path (git-fixes).
- RDMA/bnxt_re: Fix a possible memory leak (git-fixes)
- RDMA/bnxt_re: Fix return value of bnxt_re_process_raw_qp_pkt_rx (git-fixes)
- RDMA/bnxt_re: Fix the page_size used during the MR creation (git-fixes)
- RDMA/cm: Trace icm_send_rej event before the cm state is reset (git-fixes)
- RDMA/cma: Allow UD qp_type to join multicast only (git-fixes)
- RDMA/core: Fix GID entry ref leak when create_ah fails (git-fixes)
- RDMA/core: Fix ib block iterator counter overflow (bsc#1207878).
- RDMA/core: Fix ib block iterator counter overflow (git-fixes)
- RDMA/core: Fix multiple -Warray-bounds warnings (git-fixes)
- RDMA/cxgb4: Fix potential null-ptr-deref in pass_establish() (git-fixes)
- RDMA/cxgb4: add null-ptr-check after ip_dev_find() (git-fixes)
- RDMA/cxgb4: remove unnecessary NULL check in __c4iw_poll_cq_one() (git-fixes)
- RDMA/efa: Fix unsupported page sizes in device (git-fixes)
- RDMA/hns: Fix base address table allocation (git-fixes)
- RDMA/hns: Fix timeout attr in query qp for HIP08 (git-fixes)
- RDMA/hns: Modify the value of long message loopback slice (git-fixes)
- RDMA/irdma: Add SW mechanism to generate completions on error (jsc#SLE-18383).
- RDMA/irdma: Add ipv4 check to irdma_find_listener() (git-fixes)
- RDMA/irdma: Cap MSIX used to online CPUs + 1 (git-fixes)
- RDMA/irdma: Do not generate SW completions for NOPs (git-fixes)
- RDMA/irdma: Do not generate SW completions for NOPs (jsc#SLE-18383).
- RDMA/irdma: Fix Local Invalidate fencing (git-fixes)
- RDMA/irdma: Fix RQ completion opcode (jsc#SLE-18383).
- RDMA/irdma: Fix drain SQ hang with no completion (jsc#SLE-18383).
- RDMA/irdma: Fix inline for multiple SGE's (jsc#SLE-18383).
- RDMA/irdma: Fix memory leak of PBLE objects (git-fixes)
- RDMA/irdma: Fix potential NULL-ptr-dereference (git-fixes)
- RDMA/irdma: Increase iWARP CM default rexmit count (git-fixes)
- RDMA/irdma: Prevent QP use after free (git-fixes)
- RDMA/irdma: Remove enum irdma_status_code (jsc#SLE-18383).
- RDMA/irdma: Remove excess error variables (jsc#SLE-18383).
- RDMA/mana: Remove redefinition of basic u64 type (bsc#1210741 jsc#PED-4022).
- RDMA/mana: hide new rdma_driver_ids (bsc#1210741 jsc#PED-4022).
- RDMA/mana_ib: Add a driver for Microsoft Azure Network Adapter (bsc#1210741 jsc#PED-4022).
- RDMA/mana_ib: Fix a bug when the PF indicates more entries for registering memory on first packet (bsc#1210741 jsc#PED-4022).
- RDMA/mana_ib: Prevent array underflow in mana_ib_create_qp_raw() (bsc#1210741 jsc#PED-4022).
- RDMA/mlx4: Prevent shift wrapping in set_user_sq_size() (jsc#SLE-19255).
- RDMA/mlx5: Fix flow counter query via DEVX (git-fixes)
- RDMA/mlx5: Fix mlx5_ib_get_hw_stats when used for device (git-fixes)
- RDMA/mlx5: Fix validation of max_rd_atomic caps for DC (git-fixes)
- RDMA/mlx5: Use correct device num_ports when modify DC (git-fixes)
- RDMA/mlx5: Use rdma_umem_for_each_dma_block() (git-fixes)
- RDMA/rdmavt: Delete unnecessary NULL check (git-fixes)
- RDMA/rtrs-clt: Replace list_next_or_null_rr_rcu with an inline function (git-fixes)
- RDMA/rtrs-srv: Pass the correct number of entries for dma mapped SGL (git-fixes)
- RDMA/rxe: Fix inaccurate constants in rxe_type_info (git-fixes)
- RDMA/rxe: Fix missing memory barriers in rxe_queue.h (git-fixes)
- RDMA/rxe: Fix mr-&gt;map double free (git-fixes)
- RDMA/rxe: Fix oops with zero length reads (git-fixes)
- RDMA/rxe: Fix the error 'trying to register non-static key in rxe_cleanup_task' (git-fixes)
- RDMA/rxe: Make responder handle RDMA Read failures (git-fixes)
- RDMA/rxe: Prevent faulty rkey generation (git-fixes)
- RDMA/rxe: Remove tasklet call from rxe_cq.c (git-fixes)
- RDMA/siw: Fix potential page_array out of range access (git-fixes)
- RDMA/siw: Fix user page pinning accounting (git-fixes)
- RDMA/siw: Remove namespace check from siw_netdev_event() (git-fixes)
- RDMA/srp: Move large values to a new enum for gcc13 (git-fixes)
- RDMA/srpt: Add a check for valid 'mad_agent' pointer (git-fixes)
- RDMA/usnic: use iommu_map_atomic() under spin_lock() (git-fixes)
- RDMA: Handle the return code from dma_resv_wait_timeout() properly (git-fixes)
- SMB3.1.1: add new tree connect ShareFlags (bsc#1193629).
- SMB3: Add missing locks to protect deferred close file list (git-fixes).
- SMB3: Close all deferred handles of inode in case of handle lease break (bsc#1193629).
- SMB3: Close deferred file handles in case of handle lease break (bsc#1193629).
- SMB3: drop reference to cfile before sending oplock break (bsc#1193629).
- SMB3: force unmount was failing to close deferred close files (bsc#1193629).
- SUNRPC allow for unspecified transport time in rpc_clnt_add_xprt (git-fixes).
- SUNRPC: Do not dereference xprt-&gt;snd_task if it's a cookie (git-fixes).
- SUNRPC: Do not leak netobj memory when gss_read_proxy_verf() fails (git-fixes).
- SUNRPC: Fix a server shutdown leak (git-fixes).
- SUNRPC: Fix missing release socket in rpc_sockname() (git-fixes).
- SUNRPC: Fix null-ptr-deref when xps sysfs alloc failed (git-fixes).
- SUNRPC: Fix socket waits for write buffer space (git-fixes).
- SUNRPC: Return true/false (not 1/0) from bool functions (git-fixes).
- SUNRPC: Update trace flags (git-fixes).
- SUNRPC: Use BIT() macro in rpc_show_xprt_state() (git-fixes).
- SUNRPC: ensure the matching upcall is in-flight upon downcall (git-fixes).
- SUNRPC: fix breakage caused by introduction of rq_xprt_ctxt (bsc#1210775).
- Squashfs: fix handling and sanity checking of xattr_ids count (git-fixes).
- USB / dwc3: Fix a checkpatch warning in core.c (git-fixes).
- USB: UHCI: adjust zhaoxin UHCI controllers OverCurrent bit value (git-fixes).
- USB: chipidea: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: core: Add routines for endpoint checks in old drivers (git-fixes).
- USB: core: Do not hold device lock while reading the 'descriptors' sysfs file (git-fixes).
- USB: dwc3: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: dwc3: fix runtime pm imbalance on probe errors (git-fixes).
- USB: dwc3: fix runtime pm imbalance on unbind (git-fixes).
- USB: ene_usb6250: Allocate enough memory for full object (git-fixes).
- USB: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: fotg210: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: gadget: bcm63xx_udc: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: gadget: gr_udc: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: gadget: lpc32xx_udc: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: gadget: pxa25x_udc: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: gadget: pxa27x_udc: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: isp116x: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: isp1362: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: serial: cp210x: add SCALANCE LPE-9000 device id (git-fixes).
- USB: serial: cp210x: add Silicon Labs IFS-USB-DATACABLE IDs (git-fixes).
- USB: serial: option: add Quectel EC200U modem (git-fixes).
- USB: serial: option: add Quectel EM05-G (CS) modem (git-fixes).
- USB: serial: option: add Quectel EM05-G (GR) modem (git-fixes).
- USB: serial: option: add Quectel EM05-G (RS) modem (git-fixes).
- USB: serial: option: add Quectel EM05CN (SG) modem (git-fixes).
- USB: serial: option: add Quectel EM05CN modem (git-fixes).
- USB: serial: option: add Quectel RM500U-CN modem (git-fixes).
- USB: serial: option: add Telit FE990 compositions (git-fixes).
- USB: serial: option: add UNISOC vendor and TOZED LT70C product (git-fixes).
- USB: serial: option: add support for VW/Skoda 'Carstick LTE' (git-fixes).
- USB: sisusbvga: Add endpoint checks (git-fixes).
- USB: sl811: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: uhci: fix memory leak with using debugfs_lookup() (git-fixes).
- USB: usbtmc: Fix direction for 0-length ioctl control messages (git-fixes).
- VFS: filename_create(): fix incorrect intent (bsc#1197534).
- VMCI: check context-&gt;notify_page after call to get_user_pages_fast() to avoid GPF (git-fixes).
- affs: initialize fsdata in affs_truncate() (git-fixes).
- alarmtimer: Prevent starvation by small intervals and SIG_IGN (git-fixes)
- amdgpu/nv.c: Corrected typo in the video capabilities resolution (git-fixes).
- amdgpu: disable powerpc support for the newer display engine (bsc#1194869).
- amdgpu: fix build on non-DCN platforms (git-fixes).
- apparmor: add a kernel label to use on kernel objects (bsc#1211113).
- applicom: Fix PCI device refcount leak in applicom_init() (git-fixes).
- arch: fix broken BuildID for arm64 and riscv (bsc#1209798).
- arm64/cpufeature: Fix field sign for DIT hwcap detection (git-fixes)
- arm64: Treat ESR_ELx as a 64-bit register (git-fixes)
- arm64: atomics: remove LL/SC trampolines (git-fixes)
- arm64: cacheinfo: Fix incorrect assignment of signed error value to (git-fixes)
- arm64: cmpxchg_double*: hazard against entire exchange variable (git-fixes)
- arm64: dts: Add DTS files for bcmbca SoC BCM4912 (git-fixes).
- arm64: dts: Add DTS files for bcmbca SoC BCM63158 (git-fixes).
- arm64: dts: Add base DTS file for bcmbca device Asus GT-AX6000 (git-fixes).
- arm64: dts: amlogic: meson-axg: fix SCPI clock dvfs node name (git-fixes).
- arm64: dts: amlogic: meson-gx-libretech-pc: fix update button name (git-fixes).
- arm64: dts: amlogic: meson-gx: add missing SCPI sensors compatible (git-fixes).
- arm64: dts: amlogic: meson-gx: add missing unit address to rng node name (git-fixes).
- arm64: dts: amlogic: meson-gx: fix SCPI clock dvfs node name (git-fixes).
- arm64: dts: amlogic: meson-gxbb-kii-pro: fix led node name (git-fixes).
- arm64: dts: amlogic: meson-gxl-s905d-phicomm-n1: fix led node name (git-fixes).
- arm64: dts: amlogic: meson-gxl-s905d-sml5442tw: drop invalid clock-names property (git-fixes).
- arm64: dts: amlogic: meson-gxl: add missing unit address to eth-phy-mux node name (git-fixes).
- arm64: dts: amlogic: meson-sm1-bananapi-m5: fix adc keys node names (git-fixes).
- arm64: dts: amlogic: meson-sm1-odroid-hc4: fix active fan thermal trip (git-fixes).
- arm64: dts: arm: drop unused interrupt-names in MHU (git-fixes)
- arm64: dts: broadcom: bcm4908: add DT for Netgear RAXE500 (git-fixes).
- arm64: dts: freescale: Fix pca954x i2c-mux node names (git-fixes)
- arm64: dts: imx8-ss-dma: assign default clock rate for lpuarts (git-fixes).
- arm64: dts: imx8m: Align SoC unique ID node unit address (git-fixes).
- arm64: dts: imx8mm-evk: correct pmic clock source (git-fixes).
- arm64: dts: imx8mm-nitrogen-r2: fix WM8960 clock name (git-fixes).
- arm64: dts: imx8mm: Fix pad control for UART1_DTE_RX (git-fixes).
- arm64: dts: imx8mn-beacon: Fix SPI CS pinmux (git-fixes).
- arm64: dts: imx8mn: specify #sound-dai-cells for SAI nodes (git-fixes).
- arm64: dts: imx8mp-phycore-som: Remove invalid PMIC property (git-fixes)
- arm64: dts: imx8mp: correct usb clocks (git-fixes)
- arm64: dts: imx8mq-thor96: fix no-mmc property for SDHCI (git-fixes).
- arm64: dts: imx8mq: add mipi csi phy and csi bridge descriptions (git-fixes)
- arm64: dts: imx8mq: fix mipi_csi bidirectional port numbers (git-fixes)
- arm64: dts: imx8qm-mek: correct GPIOs for USDHC2 CD and WP signals (git-fixes).
- arm64: dts: juno: Add missing MHU secure-irq (git-fixes)
- arm64: dts: mediatek: mt7622: Add missing pwm-cells to pwm node (git-fixes).
- arm64: dts: mediatek: mt8183: Fix systimer 13 MHz clock description (git-fixes).
- arm64: dts: meson-axg: Make mmc host controller interrupts level-sensitive (git-fixes).
- arm64: dts: meson-g12-common: Make mmc host controller interrupts level-sensitive (git-fixes).
- arm64: dts: meson-g12-common: specify full DMC range (git-fixes).
- arm64: dts: meson-g12a: Fix internal Ethernet PHY unit name (git-fixes).
- arm64: dts: meson-gx: Fix Ethernet MAC address unit name (git-fixes).
- arm64: dts: meson-gx: Fix the SCPI DVFS node name and unit address (git-fixes).
- arm64: dts: meson-gx: Make mmc host controller interrupts level-sensitive (git-fixes).
- arm64: dts: meson: bananapi-m5: switch VDDIO_C pin to OPEN_DRAIN (git-fixes).
- arm64: dts: meson: remove CPU opps below 1GHz for G12A boards (git-fixes).
- arm64: dts: mt8192: Fix CPU map for single-cluster SoC (git-fixes).
- arm64: dts: qcom: Fix IPQ8074 PCIe PHY nodes (git-fixes).
- arm64: dts: qcom: ipq8074-hk01: enable QMP device, not the PHY node (git-fixes).
- arm64: dts: qcom: ipq8074: Fix the PCI I/O port range (git-fixes).
- arm64: dts: qcom: ipq8074: correct Gen2 PCIe ranges (git-fixes).
- arm64: dts: qcom: ipq8074: correct PCIe QMP PHY output clock names (git-fixes).
- arm64: dts: qcom: ipq8074: correct USB3 QMP PHY-s clock output names (git-fixes).
- arm64: dts: qcom: ipq8074: fix Gen2 PCIe QMP PHY (git-fixes).
- arm64: dts: qcom: ipq8074: fix Gen3 PCIe QMP PHY (git-fixes).
- arm64: dts: qcom: ipq8074: fix Gen3 PCIe node (git-fixes).
- arm64: dts: qcom: ipq8074: fix PCIe PHY serdes size (git-fixes).
- arm64: dts: qcom: msm8992-libra: Add CPU regulators (git-fixes).
- arm64: dts: qcom: msm8992-libra: Fix the memory map (git-fixes).
- arm64: dts: qcom: msm8994-kitakami: drop unit address from PMI8994 regulator (git-fixes).
- arm64: dts: qcom: msm8994-msft-lumia-octagon: drop unit address from PMI8994 regulator (git-fixes).
- arm64: dts: qcom: msm8996: Add missing DWC3 quirks (git-fixes).
- arm64: dts: qcom: msm8996: Fix the PCI I/O port range (git-fixes).
- arm64: dts: qcom: msm8998: Fix stm-stimulus-base reg name (git-fixes).
- arm64: dts: qcom: msm8998: Fix the PCI I/O port range (git-fixes).
- arm64: dts: qcom: pmk8350: Specify PBS register for PON (git-fixes).
- arm64: dts: qcom: pmk8350: Use the correct PON compatible (git-fixes).
- arm64: dts: qcom: qcs404: use symbol names for PCIe resets (git-fixes).
- arm64: dts: qcom: sc7180-lite: Fix SDRAM freq for misidentified sc7180-lite boards (git-fixes).
- arm64: dts: qcom: sc7180-trogdor-lazor: correct trackpad supply (git-fixes).
- arm64: dts: qcom: sc7180: correct SPMI bus address cells (git-fixes).
- arm64: dts: qcom: sc7280: correct SPMI bus address cells (git-fixes).
- arm64: dts: qcom: sdm845-db845c: fix audio codec interrupt pin name (git-fixes).
- arm64: dts: qcom: sdm845: Fix the PCI I/O port range (git-fixes).
- arm64: dts: qcom: sm8150-kumano: Panel framebuffer is 2.5k instead of 4k (git-fixes).
- arm64: dts: qcom: sm8250: Fix the PCI I/O port range (git-fixes).
- arm64: dts: qcom: sm8350: Mark UFS controller as cache coherent (git-fixes).
- arm64: dts: renesas: beacon-renesom: Fix gpio expander reference (git-fixes).
- arm64: dts: renesas: r8a774c0: Remove bogus voltages from OPP table (git-fixes).
- arm64: dts: renesas: r8a77990: Remove bogus voltages from OPP table (git-fixes).
- arm64: dts: rockchip: drop unused LED mode property from rk3328-roc-cc (git-fixes).
- arm64: dts: ti: k3-j7200: Fix wakeup pinmux range (git-fixes).
- arm64: dts: ti: k3-j721e-main: Remove ti,strobe-sel property (git-fixes).
- arm64: efi: Execute runtime services from a dedicated stack (git-fixes).
- arm64: efi: Make efi_rt_lock a raw_spinlock (git-fixes).
- arm64: errata: add detection for AMEVCNTR01 incrementing incorrectly (git-fixes).
- arm64: kgdb: Set PSTATE.SS to 1 to re-enable single-step (git-fixes)
- arm64: kgdb: Set PSTATE.SS to 1 to re-enable single-step (git-fixes).
- arm64: make is_ttbrX_addr() noinstr-safe (git-fixes)
- arm64: mm: kfence: only handle translation faults (git-fixes)
- asm-generic/io.h: suppress endianness warnings for readq() and writeq() (git-fixes).
- ata: libata-scsi: Use correct device no in ata_find_dev() (git-fixes).
- ata: libata: Fix sata_down_spd_limit() when no link speed is reported (git-fixes).
- ata: libata: Set __ATA_BASE_SHT max_sectors (git-fixes).
- ata: libata: fix NCQ autosense logic (git-fixes).
- ata: pata_macio: Fix compilation warning (git-fixes).
- ata: pata_octeon_cf: drop kernel-doc notation (git-fixes).
- ata: pata_octeon_cf: fix call to trace_ata_bmdma_stop() (git-fixes).
- ath11k: Fix unexpected return buffer manager error for QCA6390 (git-fixes).
- ath6kl: Use struct_group() to avoid size-mismatched casting (git-fixes).
- ath9k: hif_usb: simplify if-if to if-else (git-fixes).
- ath9k: htc: clean up statistics macros (git-fixes).
- atm: idt77252: fix kmemleak when rmmod idt77252 (git-fixes).
- audit: update the mailing list in MAINTAINERS (git-fixes).
- auxdisplay: hd44780: Fix potential memory leak in hd44780_remove() (git-fixes).
- backlight: backlight: Fix doc for backlight_device_get_by_name (git-fixes).
- batman-adv: Broken sync while rescheduling delayed work (git-fixes).
- bcache: Revert 'bcache: use bvec_virt' (git-fixes).
- bcache: fix set_at_max_writeback_rate() for multiple attached devices (git-fixes).
- bcache: fix wrong bdev parameter when calling bio_alloc_clone() in do_bio_hook() (git-fixes).
- bcache: put bch_bio_map() back to correct location in journal_write_unlocked() (git-fixes).
- bfq: fix use-after-free in bfq_dispatch_request (git-fixes).
- bfq: fix waker_bfqq inconsistency crash (git-fixes).
- blacklist.conf: s390/boot: allocate amode31 section in decompressor
- blacklist.conf: the commit might cause regression (bsc#1210947)
- blk-cgroup: fix missing pd_online_fn() while activating policy (git-fixes).
- blk-cgroup: properly pin the parent in blkcg_css_online (bsc#1208105).
- blk-lib: fix blkdev_issue_secure_erase (git-fixes).
- blk-mq: Fix kmemleak in blk_mq_init_allocated_queue (git-fixes).
- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (git-fixes).
- blk-mq: fix possible memleak when register 'hctx' failed (git-fixes).
- blk-mq: run queue no matter whether the request is the last request (git-fixes).
- blk-throttle: fix that io throttle can only work for single bio (git-fixes).
- blk-throttle: prevent overflow while calculating wait time (git-fixes).
- blk-wbt: fix that 'rwb-&gt;wc' is always set to 1 in wbt_init() (git-fixes).
- blktrace: Fix output non-blktrace event when blk_classic option enabled (git-fixes).
- block, bfq: do not move oom_bfqq (git-fixes).
- block, bfq: fix null pointer dereference in bfq_bio_bfqg() (git-fixes).
- block, bfq: fix possible uaf for 'bfqq-&gt;bic' (git-fixes).
- block, bfq: fix uaf for bfqq in bfq_exit_icq_bfqq (git-fixes).
- block, bfq: fix uaf for bfqq in bic_set_bfqq() (git-fixes).
- block, bfq: protect 'bfqd-&gt;queued' by 'bfqd-&gt;lock' (git-fixes).
- block/bfq-iosched.c: use 'false' rather than 'BLK_RW_ASYNC' (git-fixes).
- block/bfq_wf2q: correct weight to ioprio (git-fixes).
- block/bio: remove duplicate append pages code (git-fixes).
- block: Fix possible memory leak for rq_wb on add_disk failure (git-fixes).
- block: add a bdev_max_zone_append_sectors helper (git-fixes).
- block: bio-integrity: Copy flags when bio_integrity_payload is cloned (bsc#1208541).
- block: bio-integrity: Copy flags when bio_integrity_payload is cloned (bsc#1208541).
- block: check minor range in device_add_disk() (git-fixes).
- block: clear -&gt;slave_dir when dropping the main slave_dir reference (git-fixes).
- block: do not allow splitting of a REQ_NOWAIT bio (git-fixes).
- block: do not allow the same type rq_qos add more than once (git-fixes).
- block: do not reverse request order when flushing plug list (bsc#1208588 bsc#1208128).
- block: ensure iov_iter advances for added pages (git-fixes).
- block: fix and cleanup bio_check_ro (git-fixes).
- block: fix default IO priority handling again (git-fixes).
- block: fix infinite loop for invalid zone append (git-fixes).
- block: fix leaking minors of hidden disks (git-fixes).
- block: fix memory leak for elevator on add_disk failure (git-fixes).
- block: fix missing blkcg_bio_issue_init (bsc#1208107).
- block: loop:use kstatfs.f_bsize of backing file to set discard granularity (git-fixes).
- block: mq-deadline: Do not break sequential write streams to zoned HDDs (git-fixes).
- block: mq-deadline: Fix dd_finish_request() for zoned devices (git-fixes).
- block: mq-deadline: Rename deadline_is_seq_writes() (git-fixes).
- block: null_blk: Fix null_zone_write() (git-fixes).
- block: pop cached rq before potentially blocking rq_qos_throttle() (git-fixes).
- block: use bdev_get_queue() in bio.c (git-fixes).
- bluetooth: Add cmd validity checks at the start of hci_sock_ioctl() (git-fixes).
- bluetooth: Perform careful capability checks in hci_sock_ioctl() (git-fixes).
- bnxt: Do not read past the end of test names (jsc#SLE-18978).
- bnxt: prevent skb UAF after handing over to PTP worker (jsc#SLE-18978).
- bnxt_en: Add missing 200G link speed reporting (jsc#SLE-18978).
- bnxt_en: Avoid order-5 memory allocation for TPA data (jsc#SLE-18978).
- bnxt_en: Do not initialize PTP on older P3/P4 chips (jsc#SLE-18978).
- bnxt_en: Fix mqprio and XDP ring checking logic (jsc#SLE-18978).
- bnxt_en: Fix reporting of test result in ethtool selftest (jsc#SLE-18978).
- bnxt_en: Fix typo in PCI id to device description string mapping (jsc#SLE-18978).
- bnxt_en: fix NQ resource accounting during vf creation on 57500 chips (jsc#SLE-18978).
- bnxt_en: set missing reload flag in devlink features (jsc#SLE-18978).
- bpf, perf: Use subprog name when reporting subprog ksymbol (git fixes).
- bpf, x64: Factor out emission of REX byte in more cases (git-fixes).
- bpf: Fix a possible task gone issue with bpf_send_signal[_thread]() helpers (git-fixes).
- bpf: Fix extable address check (git-fixes).
- bpf: Fix extable fixup offset (git-fixes).
- bpf: Skip task with pid=1 in send_signal_common() (git-fixes).
- btrfs: backport recent fixes for send/receive into SLE15 SP4/SP5 (bsc#1206036 bsc#1206057 bsc#1206056 bsc#1207500 bsc#1207506 bsc#1207507).
- btrfs: fix race between quota enable and quota rescan ioctl (bsc#1207158).
- btrfs: fix race between quota rescan and disable leading to NULL pointer deref (bsc#1207158).
- btrfs: fix trace event name typo for FLUSH_DELAYED_REFS (git-fixes).
- btrfs: move QUOTA_ENABLED check to rescan_should_stop from btrfs_qgroup_rescan_worker (bsc#1207158).
- btrfs: qgroup: remove duplicated check in adding qgroup relations (bsc#1207158).
- btrfs: qgroup: remove outdated TODO comments (bsc#1207158).
- bus: mhi: host: Fix race between channel preparation and M0 event (git-fixes).
- bus: mhi: host: Range check CHDBOFF and ERDBOFF (git-fixes).
- bus: mhi: host: Remove duplicate ee check for syserr (git-fixes).
- bus: mhi: host: Use mhi_tryset_pm_state() for setting fw error state (git-fixes).
- bus: sunxi-rsb: Fix error handling in sunxi_rsb_init() (git-fixes).
- ca8210: Fix unsigned mac_len comparison with zero in ca8210_skb_tx() (git-fixes).
- ca8210: fix mac_len negative array access (git-fixes).
- can: bcm: bcm_tx_setup(): fix KMSAN uninit-value in vfs_write (git-fixes).
- can: isotp: isotp_ops: fix poll() to not report false EPOLLOUT events (git-fixes).
- can: isotp: recvmsg(): allow MSG_CMSG_COMPAT flag (git-fixes).
- can: j1939: avoid possible use-after-free when j1939_can_rx_register fails (git-fixes).
- can: j1939: change j1939_netdev_lock type to mutex (git-fixes).
- can: j1939: do not wait 250 ms if the same addr was already claimed (git-fixes).
- can: j1939: fix errant WARN_ON_ONCE in j1939_session_deactivate (git-fixes).
- can: j1939: j1939_sk_send_loop_abort(): improved error queue handling in J1939 Socket (git-fixes).
- can: j1939: j1939_tp_tx_dat_new(): fix out-of-bounds memory access (git-fixes).
- can: j1939: recvmsg(): allow MSG_CMSG_COMPAT flag (git-fixes).
- can: kvaser_pciefd: Call request_irq() before enabling interrupts (git-fixes).
- can: kvaser_pciefd: Clear listen-only bit if not explicitly requested (git-fixes).
- can: kvaser_pciefd: Disable interrupts in probe error path (git-fixes).
- can: kvaser_pciefd: Do not send EFLUSH command on TFD interrupt (git-fixes).
- can: kvaser_pciefd: Empty SRB buffer in probe (git-fixes).
- can: kvaser_pciefd: Set CAN_STATE_STOPPED in kvaser_pciefd_stop() (git-fixes).
- can: kvaser_usb: Add struct kvaser_usb_busparams (git-fixes).
- can: kvaser_usb: kvaser_usb_leaf: Get capabilities from device (git-fixes).
- can: kvaser_usb: kvaser_usb_leaf: Handle CMD_ERROR_EVENT (git-fixes).
- can: kvaser_usb: kvaser_usb_leaf: Rename {leaf,usbcan}_cmd_error_event to {leaf,usbcan}_cmd_can_error_event (git-fixes).
- can: kvaser_usb_leaf: Fix overread with an invalid command (git-fixes).
- cassini: Fix a memory leak in the error handling path of cas_init_one() (git-fixes).
- ceph: avoid use-after-free in ceph_fl_release_lock() (jsc#SES-1880).
- ceph: blocklist the kclient when receiving corrupted snap trace (jsc#SES-1880).
- ceph: flush cap releases when the session is flushed (bsc#1208428).
- ceph: flush cap releases when the session is flushed (jsc#SES-1880).
- ceph: force updating the msg pointer in non-split case (bsc#1211804).
- ceph: move mount state enum to super.h (jsc#SES-1880).
- ceph: remove useless session parameter for check_caps() (jsc#SES-1880).
- ceph: switch to vfs_inode_has_locks() to fix file lock bug (jsc#SES-1880).
- ceph: try to check caps immediately after async creating finishes (jsc#SES-1880).
- ceph: update the time stamps and try to drop the suid/sgid (bsc#1209504).
- ceph: use locks_inode_context helper (jsc#SES-1880).
- cfg80211: allow continuous radar monitoring on offchannel chain (bsc#1209980).
- cfg80211: fix possible NULL pointer dereference in cfg80211_stop_offchan_radar_detection (bsc#1209980).
- cfg80211: implement APIs for dedicated radar detection HW (bsc#1209980).
- cfg80211: move offchan_cac_event to a dedicated work (bsc#1209980).
- cfg80211: rename offchannel_chain structs to background_chain to avoid confusion with ETSI standard (bsc#1209980).
- cfg80211: schedule offchan_cac_abort_wk in cfg80211_radar_event (bsc#1209980).
- cgroup.c: add helper __cset_cgroup_from_root to cleanup duplicated codes (bsc#1203906).
- cgroup/cpuset: Wake up cpuset_attach_wq tasks in cpuset_cancel_attach() (bsc#1210827).
- cgroup: Homogenize cgroup_get_from_id() return value (bsc#1205650).
- cgroup: Honor caller's cgroup NS when resolving path (bsc#1205650).
- cgroup: Make cgroup_get_from_id() prettier (bsc#1205650).
- cgroup: Reorganize css_set_lock and kernfs path processing (bsc#1205650).
- cgroup: cgroup: Honor caller's cgroup NS when resolving cgroup  id (bsc#1205650).
- cgroup: reduce dependency on cgroup_mutex (bsc#1205650).
- cifs: Avoid a cast in add_lease_context() (bsc#1193629).
- cifs: Check the lease context if we actually got a lease (bsc#1193629).
- cifs: Convert struct fealist away from 1-element array (bsc#1193629).
- cifs: Fix lost destroy smbd connection when MR allocate failed (git-fixes).
- cifs: Fix oops due to uncleared server-&gt;smbd_conn in reconnect (git-fixes).
- cifs: Fix smb2_set_path_size() (git-fixes).
- cifs: Fix uninitialized memory read in smb3_qfs_tcon() (bsc#1193629).
- cifs: Fix uninitialized memory reads for oparms.mode (bsc#1193629).
- cifs: Fix use-after-free in rdata-&gt;read_into_pages() (git-fixes).
- cifs: Fix warning and UAF when destroy the MR list (git-fixes).
- cifs: Get rid of unneeded conditional in the smb2_get_aead_req() (bsc#1193629).
- cifs: Move the in_send statistic to __smb_send_rqst() (git-fixes).
- cifs: Replace remaining 1-element arrays (bsc#1193629).
- cifs: Replace zero-length arrays with flexible-array members (bsc#1193629).
- cifs: Simplify SMB2_open_init() (bsc#1193629).
- cifs: Simplify SMB2_open_init() (bsc#1193629).
- cifs: Simplify SMB2_open_init() (bsc#1193629).
- cifs: Use kstrtobool() instead of strtobool() (bsc#1193629).
- cifs: append path to open_enter trace event (bsc#1193629).
- cifs: avoid dup prefix path in dfs_get_automount_devname() (git-fixes).
- cifs: avoid potential races when handling multiple dfs tcons (bsc#1208758).
- cifs: avoid race conditions with parallel reconnects (bsc#1193629).
- cifs: avoid races in parallel reconnects in smb1 (bsc#1193629).
- cifs: avoid re-lookups in dfs_cache_find() (bsc#1193629).
- cifs: check only tcon status on tcon related functions (bsc#1193629).
- cifs: do not include page data when checking signature (git-fixes).
- cifs: do not poll server interfaces too regularly (bsc#1193629).
- cifs: do not take exclusive lock for updating target hints (bsc#1193629).
- cifs: do not try to use rdma offload on encrypted connections (bsc#1193629).
- cifs: double lock in cifs_reconnect_tcon() (git-fixes).
- cifs: dump pending mids for all channels in DebugData (bsc#1193629).
- cifs: empty interface list when server does not support query interfaces (bsc#1193629).
- cifs: fix DFS traversal oops without CONFIG_CIFS_DFS_UPCALL (bsc#1193629).
- cifs: fix dentry lookups in directory handle cache (bsc#1193629).
- cifs: fix missing unload_nls() in smb2_reconnect() (bsc#1193629).
- cifs: fix mount on old smb servers (boo#1206935).
- cifs: fix negotiate context parsing (bsc#1210301).
- cifs: fix pcchunk length type in smb2_copychunk_range (bsc#1193629).
- cifs: fix potential deadlock in cache_refresh_path() (git-fixes).
- cifs: fix potential race when tree connecting ipc (bsc#1208758).
- cifs: fix potential use-after-free bugs in TCP_Server_Info::hostname (bsc#1208758).
- cifs: fix return of uninitialized rc in dfs_cache_update_tgthint() (bsc#1193629).
- cifs: fix sharing of DFS connections (bsc#1208758).
- cifs: fix smb1 mount regression (bsc#1193629).
- cifs: fix use-after-free bug in refresh_cache_worker() (bsc#1193629).
- cifs: generate signkey for the channel that's reconnecting (bsc#1193629).
- cifs: get rid of dead check in smb2_reconnect() (bsc#1193629).
- cifs: get rid of dns resolve worker (bsc#1193629).
- cifs: get rid of unneeded conditional in cifs_get_num_sgs() (bsc#1193629).
- cifs: handle cache lookup errors different than -ENOENT (bsc#1193629).
- cifs: improve checking of DFS links over STATUS_OBJECT_NAME_INVALID (git-fixes).
- cifs: introduce cifs_io_parms in smb2_async_writev() (bsc#1193629).
- cifs: lock chan_lock outside match_session (bsc#1193629).
- cifs: mapchars mount option ignored (bsc#1193629).
- cifs: match even the scope id for ipv6 addresses (bsc#1193629).
- cifs: missing lock when updating session status (bsc#1193629).
- cifs: prevent data race in cifs_reconnect_tcon() (bsc#1193629).
- cifs: prevent data race in smb2_reconnect() (bsc#1193629).
- cifs: prevent infinite recursion in CIFSGetDFSRefer() (bsc#1193629).
- cifs: print last update time for interface list (bsc#1193629).
- cifs: print session id while listing open files (bsc#1193629).
- cifs: print smb3_fs_context::source when mounting (bsc#1193629).
- cifs: protect access of TCP_Server_Info::{origin,leaf}_fullpath (bsc#1208758).
- cifs: protect session status check in smb2_reconnect() (bsc#1208758).
- cifs: release leases for deferred close handles when freezing (bsc#1193629).
- cifs: remove duplicate code in __refresh_tcon() (bsc#1193629).
- cifs: remove unneeded 2bytes of padding from smb2 tree connect (bsc#1193629).
- cifs: remove unused function (bsc#1193629).
- cifs: return DFS root session id in DebugData (bsc#1193629).
- cifs: return a single-use cfid if we did not get a lease (bsc#1193629).
- cifs: reuse cifs_match_ipaddr for comparison of dstaddr too (bsc#1193629).
- cifs: sanitize paths in cifs_update_super_prepath (git-fixes).
- cifs: set DFS root session in cifs_get_smb_ses() (bsc#1193629).
- cifs: split out smb3_use_rdma_offload() helper (bsc#1193629).
- cifs: update internal module version number for cifs.ko (bsc#1193629).
- cifs: update ip_addr for ses only for primary chan setup (bsc#1193629).
- cifs: use DFS root session instead of tcon ses (bsc#1193629).
- cifs: use tcon allocation functions even for dummy tcon (git-fixes).
- cifs: use the least loaded channel for sending requests (bsc#1193629).
- clk: HI655X: select REGMAP instead of depending on it (git-fixes).
- clk: Honor CLK_OPS_PARENT_ENABLE in clk_core_is_enabled() (git-fixes).
- clk: add missing of_node_put() in 'assigned-clocks' property parsing (git-fixes).
- clk: at91: clk-sam9x60-pll: fix return value check (git-fixes).
- clk: imx: avoid memory leak (git-fixes).
- clk: ingenic: jz4760: Update M/N/OD calculation algorithm (git-fixes).
- clk: mxl: Add option to override gate clks (git-fixes).
- clk: mxl: Fix a clk entry by adding relevant flags (git-fixes).
- clk: mxl: Remove redundant spinlocks (git-fixes).
- clk: mxl: Switch from direct readl/writel based IO to regmap based IO (git-fixes).
- clk: mxl: syscon_node_to_regmap() returns error pointers (git-fixes).
- clk: qcom: gcc-qcs404: disable gpll[04]_out_aux parents (git-fixes).
- clk: qcom: gcc-qcs404: fix names of the DSI clocks used as parents (git-fixes).
- clk: qcom: gcc-sm8350: fix PCIe PIPE clocks handling (git-fixes).
- clk: qcom: regmap: add PHY clock source implementation (git-fixes).
- clk: ralink: fix 'mt7621_gate_is_enabled()' function (git-fixes).
- clk: renesas: cpg-mssr: Fix use after free if cpg_mssr_common_init() failed (git-fixes).
- clk: renesas: cpg-mssr: Remove superfluous check in resume code (git-fixes).
- clk: rockchip: rk3399: allow clk_cifout to force clk_cifout_src to reparent (git-fixes).
- clk: sprd: set max_register according to mapping range (git-fixes).
- clk: tegra20: fix gcc-7 constant overflow warning (git-fixes).
- clocksource/drivers/davinci: Fix memory leak in davinci_timer_register when init fails (git-fixes).
- clocksource/drivers/mediatek: Optimize systimer irq clear flow on shutdown (git-fixes).
- clocksource: Suspend the watchdog temporarily when high read latency detected (git-fixes).
- comedi: use menuconfig for main Comedi menu (git-fixes).
- configfs: fix possible memory leak in configfs_create_dir() (git-fixes).
- cpufreq: Add Tegra234 to cpufreq-dt-platdev blocklist (git-fixes).
- cpufreq: CPPC: Fix build error without CONFIG_ACPI_CPPC_CPUFREQ_FIE (bsc#1210953).
- cpufreq: CPPC: Fix performance/frequency conversion (git-fixes).
- cpufreq: armada-37xx: stop using 0 as NULL pointer (git-fixes).
- cpumask: fix incorrect cpumask scanning result checks (bsc#1210943).
- cpumask: fix incorrect cpumask scanning result checks (bsc#1210943).
- crypto: acomp - define max size for destination (jsc#PED-3692)
- crypto: arm64 - Fix unused variable compilation warnings of (git-fixes)
- crypto: caam - Clear some memory in instantiate_rng (git-fixes).
- crypto: ccp - Avoid page allocation failure warning for SEV_GET_ID2 (git-fixes).
- crypto: ccp - Failure on re-initialization due to duplicate sysfs filename (git-fixes).
- crypto: crypto4xx - Call dma_unmap_page when done (git-fixes).
- crypto: drbg - Only fail when jent is unavailable in FIPS mode (git-fixes).
- crypto: drivers - move from strlcpy with unused retval to (jsc#PED-3692)
- crypto: essiv - Handle EBUSY correctly (git-fixes).
- crypto: hisilicon/qm - add missing pci_dev_put() in q_num_set() (git-fixes).
- crypto: qat - Fix unsigned function returning negative (jsc#PED-3692)
- crypto: qat - Removes the x86 dependency on the QAT drivers (jsc#PED-3692)
- crypto: qat - abstract PFVF messages with struct pfvf_message (jsc#PED-3692)
- crypto: qat - abstract PFVF receive logic (jsc#PED-3692)
- crypto: qat - abstract PFVF send function (jsc#PED-3692)
- crypto: qat - add PFVF support to enable the reset of ring (jsc#PED-3692)
- crypto: qat - add PFVF support to the GEN4 host driver (jsc#PED-3692)
- crypto: qat - add VF and PF wrappers to common send function (jsc#PED-3692)
- crypto: qat - add backlog mechanism (jsc#PED-3692)
- crypto: qat - add check for invalid PFVF protocol version 0 (jsc#PED-3692)
- crypto: qat - add check to validate firmware images (jsc#PED-3692)
- crypto: qat - add limit to linked list parsing (jsc#PED-3692)
- crypto: qat - add misc workqueue (jsc#PED-3692)
- crypto: qat - add missing restarting event notification in (jsc#PED-3692)
- crypto: qat - add param check for DH (jsc#PED-3692)
- crypto: qat - add param check for RSA (jsc#PED-3692)
- crypto: qat - add pfvf_ops (jsc#PED-3692)
- crypto: qat - add resubmit logic for decompression (jsc#PED-3692)
- crypto: qat - add support for 401xx devices (jsc#PED-3692)
- crypto: qat - add support for compression for 4xxx (jsc#PED-3692)
- crypto: qat - add the adf_get_pmisc_base() helper function (jsc#PED-3692)
- crypto: qat - allow detection of dc capabilities for 4xxx (jsc#PED-3692)
- crypto: qat - change PFVF ACK behaviour (jsc#PED-3692)
- crypto: qat - change behaviour of (jsc#PED-3692)
- crypto: qat - change bufferlist logic interface (jsc#PED-3692)
- crypto: qat - config VFs based on ring-to-svc mapping (jsc#PED-3692)
- crypto: qat - differentiate between pf2vf and vf2pf offset (jsc#PED-3692)
- crypto: qat - disable AER if an error occurs in probe (jsc#PED-3692)
- crypto: qat - do not handle PFVF sources for qat_4xxx (jsc#PED-3692)
- crypto: qat - do not rely on min version (jsc#PED-3692)
- crypto: qat - enable deflate for QAT GEN4 (jsc#PED-3692)
- crypto: qat - enable power management for QAT GEN4 (jsc#PED-3692)
- crypto: qat - exchange device capabilities over PFVF (jsc#PED-3692)
- crypto: qat - exchange ring-to-service mappings over PFVF (jsc#PED-3692)
- crypto: qat - expose deflate through acomp api for QAT GEN2 (jsc#PED-3692)
- crypto: qat - expose device config through sysfs for 4xxx (jsc#PED-3692)
- crypto: qat - expose device state through sysfs for 4xxx (jsc#PED-3692)
- crypto: qat - extend buffer list interface (jsc#PED-3692)
- crypto: qat - extend crypto capability detection for 4xxx (jsc#PED-3692)
- crypto: qat - extract send and wait from (jsc#PED-3692)
- crypto: qat - fix DMA transfer direction (jsc#PED-3692)
- crypto: qat - fix ETR sources enabled by default on GEN2 (jsc#PED-3692)
- crypto: qat - fix VF IDs in PFVF log messages (jsc#PED-3692)
- crypto: qat - fix a signedness bug in get_service_enabled() (jsc#PED-3692)
- crypto: qat - fix a typo in a comment (jsc#PED-3692)
- crypto: qat - fix access to PFVF interrupt registers for GEN4 (jsc#PED-3692)
- crypto: qat - fix definition of ring reset results (jsc#PED-3692)
- crypto: qat - fix error return code in adf_probe (git-fixes).
- crypto: qat - fix error return code in adf_probe (jsc#PED-3692)
- crypto: qat - fix handling of VF to PF interrupts (jsc#PED-3692)
- crypto: qat - fix initialization of pfvf cap_msg structures (jsc#PED-3692)
- crypto: qat - fix initialization of pfvf rts_map_msg (jsc#PED-3692)
- crypto: qat - fix off-by-one error in PFVF debug print (jsc#PED-3692)
- crypto: qat - fix out-of-bounds read (git-fixes).
- crypto: qat - fix wording and formatting in code comment (jsc#PED-3692)
- crypto: qat - flush vf workqueue at driver removal (jsc#PED-3692)
- crypto: qat - free irq in case of failure (jsc#PED-3692)
- crypto: qat - free irqs only if allocated (jsc#PED-3692)
- crypto: qat - generalize crypto request buffers (jsc#PED-3692)
- crypto: qat - get compression extended capabilities (jsc#PED-3692)
- crypto: qat - handle retries due to collisions in (jsc#PED-3692)
- crypto: qat - honor CRYPTO_TFM_REQ_MAY_SLEEP flag (jsc#PED-3692)
- crypto: qat - improve logging of PFVF messages (jsc#PED-3692)
- crypto: qat - improve the ACK timings in PFVF send (jsc#PED-3692)
- crypto: qat - introduce support for PFVF block messages (jsc#PED-3692)
- crypto: qat - leverage bitfield.h utils for PFVF messages (jsc#PED-3692)
- crypto: qat - leverage read_poll_timeout in PFVF send (jsc#PED-3692)
- crypto: qat - leverage the GEN2 VF mask definiton (jsc#PED-3692)
- crypto: qat - make PFVF message construction direction (jsc#PED-3692)
- crypto: qat - make PFVF send and receive direction agnostic (jsc#PED-3692)
- crypto: qat - move VF message handler to adf_vf2pf_msg.c (jsc#PED-3692)
- crypto: qat - move and rename GEN4 error register definitions (jsc#PED-3692)
- crypto: qat - move interrupt code out of the PFVF handler (jsc#PED-3692)
- crypto: qat - move pfvf collision detection values (jsc#PED-3692)
- crypto: qat - move vf2pf interrupt helpers (jsc#PED-3692)
- crypto: qat - pass the PF2VF responses back to the callers (jsc#PED-3692)
- crypto: qat - prevent spurious MSI interrupt in VF (jsc#PED-3692)
- crypto: qat - re-enable interrupts for legacy PFVF messages (jsc#PED-3692)
- crypto: qat - re-enable registration of algorithms (jsc#PED-3692)
- crypto: qat - refactor PF top half for PFVF (jsc#PED-3692)
- crypto: qat - refactor pfvf version request messages (jsc#PED-3692)
- crypto: qat - refactor submission logic (jsc#PED-3692)
- crypto: qat - relocate PFVF PF related logic (jsc#PED-3692)
- crypto: qat - relocate PFVF VF related logic (jsc#PED-3692)
- crypto: qat - relocate PFVF disabled function (jsc#PED-3692)
- crypto: qat - relocate and rename adf_sriov_prepare_restart() (jsc#PED-3692)
- crypto: qat - relocate backlog related structures (jsc#PED-3692)
- crypto: qat - relocate bufferlist logic (jsc#PED-3692)
- crypto: qat - relocate qat_algs_alloc_flags() (jsc#PED-3692)
- crypto: qat - remove duplicated logic across GEN2 drivers (jsc#PED-3692)
- crypto: qat - remove empty sriov_configure() (jsc#PED-3692)
- crypto: qat - remove line wrapping for pfvf_ops functions (jsc#PED-3692)
- crypto: qat - remove the unnecessary get_vintmsk_offset() (jsc#PED-3692)
- crypto: qat - remove unmatched CPU affinity to cluster IRQ (jsc#PED-3692)
- crypto: qat - remove unnecessary tests to detect PFVF support (jsc#PED-3692)
- crypto: qat - remove unneeded assignment (jsc#PED-3692)
- crypto: qat - remove unneeded braces (jsc#PED-3692)
- crypto: qat - remove unneeded packed attribute (jsc#PED-3692)
- crypto: qat - remove unused PFVF stubs (jsc#PED-3692)
- crypto: qat - rename and relocate GEN2 config function (jsc#PED-3692)
- crypto: qat - rename bufferlist functions (jsc#PED-3692)
- crypto: qat - rename pfvf collision constants (jsc#PED-3692)
- crypto: qat - reorganize PFVF code (jsc#PED-3692)
- crypto: qat - reorganize PFVF protocol definitions (jsc#PED-3692)
- crypto: qat - replace deprecated MSI API (jsc#PED-3692)
- crypto: qat - replace disable_vf2pf_interrupts() (jsc#PED-3692)
- crypto: qat - replace get_current_node() with numa_node_id() (jsc#PED-3692)
- crypto: qat - rework the VF2PF interrupt handling logic (jsc#PED-3692)
- crypto: qat - set CIPHER capability for QAT GEN2 (jsc#PED-3692)
- crypto: qat - set COMPRESSION capability for DH895XCC (jsc#PED-3692)
- crypto: qat - set COMPRESSION capability for QAT GEN2 (jsc#PED-3692)
- crypto: qat - set DMA mask to 48 bits for Gen2 (jsc#PED-3692)
- crypto: qat - set PFVF_MSGORIGIN just before sending (jsc#PED-3692)
- crypto: qat - share adf_enable_pf2vf_comms() from (jsc#PED-3692)
- crypto: qat - simplify adf_enable_aer() (jsc#PED-3692)
- crypto: qat - simplify code and axe the use of a deprecated (jsc#PED-3692)
- crypto: qat - split PFVF message decoding from handling (jsc#PED-3692)
- crypto: qat - stop using iommu_present() (jsc#PED-3692)
- crypto: qat - store the PFVF protocol version of the (jsc#PED-3692)
- crypto: qat - store the ring-to-service mapping (jsc#PED-3692)
- crypto: qat - support fast ACKs in the PFVF protocol (jsc#PED-3692)
- crypto: qat - support the reset of ring pairs on PF (jsc#PED-3692)
- crypto: qat - test PFVF registers for spurious interrupts on (jsc#PED-3692)
- crypto: qat - use enums for PFVF protocol codes (jsc#PED-3692)
- crypto: qat - use hweight for bit counting (jsc#PED-3692)
- crypto: qat - use pre-allocated buffers in datapath (jsc#PED-3692)
- crypto: qat - use reference to structure in dma_map_single() (jsc#PED-3692)
- crypto: qat - use u32 variables in all GEN4 pfvf_ops (jsc#PED-3692)
- crypto: rsa-pkcs1pad - Use akcipher_request_complete (git-fixes).
- crypto: sa2ul - Select CRYPTO_DES (git-fixes).
- crypto: safexcel - Cleanup ring IRQ workqueues on load failure (git-fixes).
- crypto: seqiv - Handle EBUSY correctly (git-fixes).
- crypto: sun8i-ss - Fix a test in sun8i_ss_setup_ivs() (git-fixes).
- crypto: x86/ghash - fix unaligned access in ghash_setkey() (git-fixes).
- crypto: xts - Handle EBUSY correctly (git-fixes).
- cxgb4: fix missing unlock on ETHOFLD desc collect fail path (jsc#SLE-18992).
- debugfs: add debugfs_lookup_and_remove() (git-fixes).
- debugfs: add debugfs_lookup_and_remove() (git-fixes).
- debugfs: fix error when writing negative value to atomic_t debugfs file (git-fixes).
- devlink: hold region lock when flushing snapshots (git-fixes).
- dm btree: add a defensive bounds check to insert_at() (git-fixes).
- dm cache: Fix ABBA deadlock between shrink_slab and dm_cache_metadata_abort (git-fixes).
- dm cache: Fix UAF in destroy() (git-fixes).
- dm cache: set needs_check flag after aborting metadata (git-fixes).
- dm clone: Fix UAF in clone_dtr() (git-fixes).
- dm integrity: Fix UAF in dm_integrity_dtr() (git-fixes).
- dm integrity: clear the journal on suspend (git-fixes).
- dm integrity: flush the journal on suspend (git-fixes).
- dm ioctl: fix misbehavior if list_versions races with module loading (git-fixes).
- dm ioctl: prevent potential spectre v1 gadget (git-fixes).
- dm raid: fix address sanitizer warning in raid_resume (git-fixes).
- dm raid: fix address sanitizer warning in raid_status (git-fixes).
- dm space map common: add bounds check to sm_ll_lookup_bitmap() (git-fixes).
- dm thin: Fix ABBA deadlock between shrink_slab and dm_pool_abort_metadata (git-fixes).
- dm thin: Fix UAF in run_timer_softirq() (git-fixes).
- dm thin: Use last transaction's pmd-&gt;root when commit failed (git-fixes).
- dm thin: resume even if in FAIL mode (git-fixes).
- dm writecache: set a default MAX_WRITEBACK_JOBS (git-fixes).
- dm: fix alloc_dax error handling in alloc_dev (git-fixes).
- dm: requeue IO if mapping table not yet available (git-fixes).
- dma-buf: Use dma_fence_unwrap_for_each when importing fences (git-fixes).
- dma-buf: cleanup kerneldoc of removed component (git-fixes).
- dma-direct: use is_swiotlb_active in dma_direct_map_page (PED-3259).
- dma-mapping: reformat comment to suppress htmldoc warning (git-fixes).
- dma: gpi: remove spurious unlock in gpi_ch_init (git-fixes).
- dmaengine: at_xdmac: Move the free desc to the tail of the desc list (git-fixes).
- dmaengine: at_xdmac: do not enable all cyclic channels (git-fixes).
- dmaengine: at_xdmac: fix potential Oops in at_xdmac_prep_interleaved() (git-fixes).
- dmaengine: dw-axi-dmac: Do not dereference NULL structure (git-fixes).
- dmaengine: dw-edma: Do not permit non-inc interleaved xfers (git-fixes).
- dmaengine: dw-edma: Drop chancnt initialization (git-fixes).
- dmaengine: dw-edma: Fix invalid interleaved xfers semantics (git-fixes).
- dmaengine: dw-edma: Fix missing src/dst address of interleaved xfers (git-fixes).
- dmaengine: dw-edma: Fix readq_ch() return value truncation (git-fixes).
- dmaengine: dw-edma: Fix to change for continuous transfer (git-fixes).
- dmaengine: dw-edma: Fix to enable to issue dma request on DMA processing (git-fixes).
- dmaengine: idxd: Do not enable user type Work Queue without Shared Virtual Addressing (git-fixes).
- dmaengine: idxd: Only call idxd_enable_system_pasid() if succeeded in enabling SVA feature (git-fixes).
- dmaengine: idxd: Separate user and kernel pasid enabling (git-fixes).
- dmaengine: idxd: Set traffic class values in GRPCFG on DSA 2.0 (git-fixes).
- dmaengine: imx-sdma: Fix a possible memory leak in sdma_transfer_init (git-fixes).
- dmaengine: mv_xor_v2: Fix an error code (git-fixes).
- dmaengine: pl330: rename _start to prevent build error (git-fixes).
- dmaengine: ptdma: check for null desc before calling pt_cmd_callback (git-fixes).
- dmaengine: sf-pdma: pdma_desc memory leak fix (git-fixes).
- dmaengine: tegra: Fix memory leak in terminate_all() (git-fixes).
- do not reuse connection if share marked as isolated (bsc#1193629).
- docs/scripts/gdb: add necessary make scripts_gdb step (git-fixes).
- docs: Correct missing 'd_' prefix for dentry_operations member d_weak_revalidate (git-fixes).
- docs: driver-api: firmware_loader: fix missing argument in usage example (git-fixes).
- docs: ftrace: fix a issue with duplicated subtitle number (git-fixes).
- docs: gdbmacros: print newest record (git-fixes).
- docs: networking: fix x25-iface.rst heading &amp; index order (git-fixes).
- driver core: Do not require dynamic_debug for initcall_debug probe timing (git-fixes).
- driver core: fix potential null-ptr-deref in device_add() (git-fixes).
- driver core: fix resource leak in device_add() (git-fixes).
- driver core: fw_devlink: Add DL_FLAG_CYCLE support to device links (git-fixes).
- drivers/base: Fix unsigned comparison to -1 in CPUMAP_FILE_MAX_BYTES (bsc#1208815).
- drivers/base: fix userspace break from using bin_attributes for cpumap and cpulist (bsc#1208815).
- drivers/md/md-bitmap: check the return value of md_bitmap_get_counter() (git-fixes).
- drivers: base: component: fix memory leak with using debugfs_lookup() (git-fixes).
- drivers: base: dd: fix memory leak with using debugfs_lookup() (git-fixes).
- drivers: base: transport_class: fix possible memory leak (git-fixes).
- drivers: base: transport_class: fix resource leak when transport_add_device() fails (git-fixes).
- drivers: staging: rtl8723bs: Fix locking in _rtw_join_timeout_handler() (git-fixes).
- drivers: staging: rtl8723bs: Fix locking in rtw_scan_timeout_handler() (git-fixes).
- drivers:md:fix a potential use-after-free bug (git-fixes).
- drm/amd/amdgpu: fix warning during suspend (bsc#1206843).
- drm/amd/display/dc/dce60/Makefile: Fix previous attempt to silence known override-init warnings (git-fixes).
- drm/amd/display: Add DCN314 display SG Support (bsc#1206843).
- drm/amd/display: Add DSC Support for Synaptics Cascaded MST Hub (git-fixes).
- drm/amd/display: Add NULL plane_state check for cursor disable logic (git-fixes).
- drm/amd/display: Add check for DET fetch latency hiding for dcn32 (bsc#1206843).
- drm/amd/display: Add missing brackets in calculation (bsc#1206843).
- drm/amd/display: Adjust downscaling limits for dcn314 (bsc#1206843).
- drm/amd/display: Allow subvp on vactive pipes that are 2560x1440@60 (bsc#1206843).
- drm/amd/display: Clear MST topology if it fails to resume (git-fixes).
- drm/amd/display: Conversion to bool not necessary (git-fixes).
- drm/amd/display: Defer DIG FIFO disable after VID stream enable (bsc#1206843).
- drm/amd/display: Disable DRR actions during state commit (bsc#1206843).
- drm/amd/display: Disable HUBP/DPP PG on DCN314 for now (bsc#1206843).
- drm/amd/display: Do not clear GPINT register when releasing DMUB from reset (git-fixes).
- drm/amd/display: Do not commit pipe when updating DRR (bsc#1206843).
- drm/amd/display: Do not set DRR on pipe Commit (bsc#1206843).
- drm/amd/display: Enable P-state validation checks for DCN314 (bsc#1206843).
- drm/amd/display: Fail atomic_check early on normalize_zpos error (git-fixes).
- drm/amd/display: Fix DP MST sinks removal issue (git-fixes).
- drm/amd/display: Fix DTBCLK disable requests and SRC_SEL programming (bsc#1206843).
- drm/amd/display: Fix display corruption w/ VSR enable (bsc#1206843).
- drm/amd/display: Fix hang when skipping modeset (git-fixes).
- drm/amd/display: Fix potential null dereference (git-fixes).
- drm/amd/display: Fix potential null-deref in dm_resume (git-fixes).
- drm/amd/display: Fix race condition in DPIA AUX transfer (bsc#1206843).
- drm/amd/display: Fix set scaling doesn's work (git-fixes).
- drm/amd/display: Fix timing not changning when freesync video is enabled (git-fixes).
- drm/amd/display: Fixes for dcn32_clk_mgr implementation (git-fixes).
- drm/amd/display: Include virtual signal to set k1 and k2 values (bsc#1206843).
- drm/amd/display: Move DCN314 DOMAIN power control to DMCUB (bsc#1206843).
- drm/amd/display: Pass the right info to drm_dp_remove_payload (bsc#1206843).
- drm/amd/display: Properly handle additional cases where DCN is not supported (git-fixes).
- drm/amd/display: Properly reuse completion structure (bsc#1206843).
- drm/amd/display: Reduce expected sdp bandwidth for dcn321 (bsc#1206843).
- drm/amd/display: Remove OTG DIV register write for Virtual signals (bsc#1206843).
- drm/amd/display: Report to ACPI video if no panels were found (bsc#1206843).
- drm/amd/display: Reset DMUB mailbox SW state after HW reset (bsc#1206843).
- drm/amd/display: Reset OUTBOX0 r/w pointer on DMUB reset (git-fixes).
- drm/amd/display: Return error code on DSC atomic check failure (git-fixes).
- drm/amd/display: Revert Reduce delay when sink device not able to ACK 00340h write (git-fixes).
- drm/amd/display: Set dcn32 caps.seamless_odm (bsc#1206843).
- drm/amd/display: Set hvm_enabled flag for S/G mode (bsc#1206843).
- drm/amd/display: Simplify same effect if/else blocks (git-fixes).
- drm/amd/display: Take FEC Overhead into Timeslot Calculation (bsc#1206843).
- drm/amd/display: Take emulated dc_sink into account for HDCP (bsc#1207734).
- drm/amd/display: Unassign does_plane_fit_in_mall function from dcn3.2 (bsc#1206843).
- drm/amd/display: Uninitialized variables causing 4k60 UCLK to stay at DPM1 and not DPM0 (bsc#1206843).
- drm/amd/display: Update bounding box values for DCN321 (git-fixes).
- drm/amd/display: Update clock table to include highest clock setting (bsc#1206843).
- drm/amd/display: Use DC_LOG_DC in the trasform pixel function (git-fixes).
- drm/amd/display: Use min transition for SubVP into MPO (bsc#1206843).
- drm/amd/display: Workaround to increase phantom pipe vactive in pipesplit (bsc#1206843).
- drm/amd/display: adjust MALL size available for DCN32 and DCN321 (bsc#1206843).
- drm/amd/display: disable S/G display on DCN 3.1.4 (bsc#1206843).
- drm/amd/display: disable S/G display on DCN 3.1.5 (bsc#1206843).
- drm/amd/display: disconnect MPCC only on OTG change (bsc#1206843).
- drm/amd/display: do not call dc_interrupt_set() for disabled crtcs (git-fixes).
- drm/amd/display: fix FCLK pstate change underflow (bsc#1206843).
- drm/amd/display: fix cursor offset on rotation 180 (git-fixes).
- drm/amd/display: fix duplicate assignments (git-fixes).
- drm/amd/display: fix flickering caused by S/G mode (git-fixes).
- drm/amd/display: fix issues with driver unload (git-fixes).
- drm/amd/display: fix k1 k2 divider programming for phantom streams (bsc#1206843).
- drm/amd/display: fix mapping to non-allocated address (bsc#1206843).
- drm/amd/display: fix shift-out-of-bounds in CalculateVMAndRowBytes (git-fixes).
- drm/amd/display: fix wrong index used in dccg32_set_dpstreamclk (bsc#1206843).
- drm/amd/display: move remaining FPU code to dml folder (bsc#1206843).
- drm/amd/display: properly handling AGP aperture in vm setup (bsc#1206843).
- drm/amd/display: reduce else-if to else in dcn10_blank_pixel_data() (git-fixes).
- drm/amd/display: revert Disable DRR actions during state commit (bsc#1206843).
- drm/amd/display: skip commit minimal transition state (bsc#1206843).
- drm/amd/display: wait for vblank during pipe programming (git-fixes).
- drm/amd/pm/smu13: BACO is supported when it's in BACO state (bsc#1206843).
- drm/amd/pm: Enable bad memory page/channel recording support for smu v13_0_0 (bsc#1206843).
- drm/amd/pm: Fix output of pp_od_clk_voltage (git-fixes).
- drm/amd/pm: Fix sienna cichlid incorrect OD volage after resume (bsc#1206843).
- drm/amd/pm: add SMU 13.0.7 missing GetPptLimit message mapping (bsc#1206843).
- drm/amd/pm: add missing AllowIHInterrupt message mapping for SMU13.0.0 (bsc#1206843).
- drm/amd/pm: add missing SMU13.0.0 mm_dpm feature mapping (bsc#1206843).
- drm/amd/pm: add missing SMU13.0.7 mm_dpm feature mapping (bsc#1206843).
- drm/amd/pm: add the missing mapping for PPT feature on SMU13.0.0 and 13.0.7 (bsc#1206843).
- drm/amd/pm: bump SMU 13.0.0 driver_if header version (bsc#1206843).
- drm/amd/pm: bump SMU 13.0.4 driver_if header version (bsc#1206843).
- drm/amd/pm: bump SMU 13.0.7 driver_if header version (bsc#1206843).
- drm/amd/pm: bump SMU13.0.0 driver_if header to version 0x34 (bsc#1206843).
- drm/amd/pm: correct SMU13.0.0 pstate profiling clock settings (bsc#1206843).
- drm/amd/pm: correct SMU13.0.7 max shader clock reporting (bsc#1206843).
- drm/amd/pm: correct SMU13.0.7 pstate profiling clock settings (bsc#1206843).
- drm/amd/pm: correct the fan speed retrieving in PWM for some SMU13 asics (bsc#1206843).
- drm/amd/pm: correct the pcie link state check for SMU13 (bsc#1206843).
- drm/amd/pm: correct the reference clock for fan speed(rpm) calculation (bsc#1206843).
- drm/amd/pm: drop unneeded dpm features disablement for SMU 13.0.4/11 (bsc#1206843).
- drm/amd/pm: enable GPO dynamic control support for SMU13.0.0 (bsc#1206843).
- drm/amd/pm: enable GPO dynamic control support for SMU13.0.7 (bsc#1206843).
- drm/amd/pm: enable mode1 reset on smu_v13_0_10 (bsc#1206843).
- drm/amd/pm: parse pp_handle under appropriate conditions (git-fixes).
- drm/amd/pm: remove unused num_of_active_display variable (git-fixes).
- drm/amd/pm: reverse mclk and fclk clocks levels for renoir (git-fixes).
- drm/amd/pm: reverse mclk and fclk clocks levels for vangogh (git-fixes).
- drm/amd/pm: reverse mclk and fclk clocks levels for yellow carp (git-fixes).
- drm/amd/pm: update SMU13.0.0 reported maximum shader clock (bsc#1206843).
- drm/amd: Avoid ASSERT for some message failures (bsc#1206843).
- drm/amd: Avoid BUG() for case of SRIOV missing IP version (bsc#1206843).
- drm/amd: Delay removal of the firmware framebuffer (git-fixes).
- drm/amd: Fix an out of bounds error in BIOS parser (git-fixes).
- drm/amd: Fix initialization for nbio 4.3.0 (bsc#1206843).
- drm/amd: Fix initialization for nbio 7.5.1 (bsc#1206843).
- drm/amd: Fix initialization mistake for NBIO 7.3.0 (bsc#1206843).
- drm/amdgpu/discovery: add PSP IP v13.0.11 support (bsc#1206843).
- drm/amdgpu/discovery: enable gfx v11 for GC 11.0.4 (bsc#1206843).
- drm/amdgpu/discovery: enable gmc v11 for GC 11.0.4 (bsc#1206843).
- drm/amdgpu/discovery: enable mes support for GC v11.0.4 (bsc#1206843).
- drm/amdgpu/discovery: enable nbio support for NBIO v7.7.1 (bsc#1206843).
- drm/amdgpu/discovery: enable soc21 common for GC 11.0.4 (bsc#1206843).
- drm/amdgpu/discovery: set the APU flag for GC 11.0.4 (bsc#1206843).
- drm/amdgpu/display/mst: Fix mst_state-&gt;pbn_div and slot count assignments (bsc#1206843).
- drm/amdgpu/display/mst: adjust the naming of mst_port and port of aconnector (bsc#1206843).
- drm/amdgpu/display/mst: limit payload to be updated one by one (bsc#1206843).
- drm/amdgpu/display/mst: update mst_mgr relevant variable when long HPD (bsc#1206843).
- drm/amdgpu/dm/dp_mst: Do not grab mst_mgr-&gt;lock when computing DSC state (bsc#1206843).
- drm/amdgpu/dm/mst: Fix uninitialized var in pre_compute_mst_dsc_configs_for_state() (bsc#1206843).
- drm/amdgpu/dm/mst: Use the correct topology mgr pointer in amdgpu_dm_connector (bsc#1206843).
- drm/amdgpu/fence: Fix oops due to non-matching drm_sched init/fini (git-fixes).
- drm/amdgpu/gfx10: Disable gfxoff before disabling powergating (git-fixes).
- drm/amdgpu/gfx: disable gfx9 cp_ecc_error_irq only when enabling legacy gfx ras (git-fixes).
- drm/amdgpu/mst: Stop ignoring error codes and deadlocking (bsc#1206843).
- drm/amdgpu/nv: Apply ASPM quirk on Intel ADL + AMD Navi (bsc#1206843).
- drm/amdgpu/pm: add GFXOFF control IP version check for SMU IP v13.0.11 (bsc#1206843).
- drm/amdgpu/pm: enable swsmu for SMU IP v13.0.11 (bsc#1206843).
- drm/amdgpu/pm: use the specific mailbox registers only for SMU IP v13.0.4 (bsc#1206843).
- drm/amdgpu/smu: skip pptable init under sriov (bsc#1206843).
- drm/amdgpu/soc21: Add video cap query support for VCN_4_0_4 (bsc#1206843).
- drm/amdgpu/soc21: add mode2 asic reset for SMU IP v13.0.11 (bsc#1206843).
- drm/amdgpu/soc21: do not expose AV1 if VCN0 is harvested (bsc#1206843).
- drm/amdgpu: Add unique_id support for GC 11.0.1/2 (bsc#1206843).
- drm/amdgpu: Correct the power calcultion for Renior/Cezanne (git-fixes).
- drm/amdgpu: Do not register backlight when another backlight should be used (v3) (bsc#1206843).
- drm/amdgpu: Do not resume IOMMU after incomplete init (bsc#1206843).
- drm/amdgpu: Enable pg/cg flags on GC11_0_4 for VCN (bsc#1206843).
- drm/amdgpu: Enable vclk dclk node for gc11.0.3 (bsc#1206843).
- drm/amdgpu: Fix call trace warning and hang when removing amdgpu device (bsc#1206843).
- drm/amdgpu: Fix potential NULL dereference (bsc#1206843).
- drm/amdgpu: Fix potential double free and null pointer dereference (bsc#1206843).
- drm/amdgpu: Fix size validation for non-exclusive domains (v4) (bsc#1206843).
- drm/amdgpu: Fix vram recover does not work after whole GPU reset (v2) (git-fixes).
- drm/amdgpu: Fixed bug on error when unloading amdgpu (bsc#1206843).
- drm/amdgpu: Re-enable DCN for 64-bit powerpc (bsc#1194869).
- drm/amdgpu: Register ACPI video backlight when skipping amdgpu backlight registration (bsc#1206843).
- drm/amdgpu: Use the TGID for trace_amdgpu_vm_update_ptes (bsc#1206843).
- drm/amdgpu: Use the default reset when loading or reloading the driver (git-fixes).
- drm/amdgpu: Use the sched from entity for amdgpu_cs trace (git-fixes).
- drm/amdgpu: add a missing lock for AMDGPU_SCHED (git-fixes).
- drm/amdgpu: add gfx support for GC 11.0.4 (bsc#1206843).
- drm/amdgpu: add gmc v11 support for GC 11.0.4 (bsc#1206843).
- drm/amdgpu: add smu 13 support for smu 13.0.11 (bsc#1206843).
- drm/amdgpu: add soc21 common ip block support for GC 11.0.4 (bsc#1206843).
- drm/amdgpu: add tmz support for GC 11.0.1 (bsc#1206843).
- drm/amdgpu: add tmz support for GC IP v11.0.4 (bsc#1206843).
- drm/amdgpu: allow more APUs to do mode2 reset when go to S4 (bsc#1206843).
- drm/amdgpu: allow multipipe policy on ASICs with one MEC (bsc#1206843).
- drm/amdgpu: change gfx 11.0.4 external_id range (git-fixes).
- drm/amdgpu: complete gfxoff allow signal during suspend without delay (git-fixes).
- drm/amdgpu: correct MEC number for gfx11 APUs (bsc#1206843).
- drm/amdgpu: disable runtime pm on several sienna cichlid cards(v2) (git-fixes).
- drm/amdgpu: disable sdma ecc irq only when sdma RAS is enabled in suspend (git-fixes).
- drm/amdgpu: drop experimental flag on aldebaran (git-fixes).
- drm/amdgpu: enable GFX Clock Gating control for GC IP v11.0.4 (bsc#1206843).
- drm/amdgpu: enable GFX IP v11.0.4 CG support (bsc#1206843).
- drm/amdgpu: enable GFX Power Gating for GC IP v11.0.4 (bsc#1206843).
- drm/amdgpu: enable HDP SD for gfx 11.0.3 (bsc#1206843).
- drm/amdgpu: enable PSP IP v13.0.11 support (bsc#1206843).
- drm/amdgpu: enable VCN DPG for GC IP v11.0.4 (bsc#1206843).
- drm/amdgpu: fix Null pointer dereference error in amdgpu_device_recover_vram (git-fixes).
- drm/amdgpu: fix amdgpu_job_free_resources v2 (bsc#1206843).
- drm/amdgpu: fix enum odm_combine_mode mismatch (git-fixes).
- drm/amdgpu: fix error checking in amdgpu_read_mm_registers for nv (bsc#1206843).
- drm/amdgpu: fix error checking in amdgpu_read_mm_registers for soc15 (git-fixes).
- drm/amdgpu: fix error checking in amdgpu_read_mm_registers for soc21 (bsc#1206843).
- drm/amdgpu: fix mmhub register base coding error (git-fixes).
- drm/amdgpu: fix return value check in kfd (git-fixes).
- drm/amdgpu: fix ttm_bo calltrace warning in psp_hw_fini (bsc#1206843).
- drm/amdgpu: for S0ix, skip SDMA 5.x+ suspend/resume (git-fixes).
- drm/amdgpu: release gpu full access after 'amdgpu_device_ip_late_init' (git-fixes).
- drm/amdgpu: reposition the gpu reset checking for reuse (bsc#1206843).
- drm/amdgpu: set GC 11.0.4 family (bsc#1206843).
- drm/amdgpu: skip ASIC reset for APUs when go to S4 (bsc#1206843).
- drm/amdgpu: skip MES for S0ix as well since it's part of GFX (bsc#1206843).
- drm/amdgpu: skip disabling fence driver src_irqs when device is unplugged (git-fixes).
- drm/amdgpu: skip mes self test after s0i3 resume for MES IP v11.0 (bsc#1206843).
- drm/amdgpu: skip psp suspend for IMU enabled ASICs mode2 reset (git-fixes).
- drm/amdgpu: update drm_display_info correctly when the edid is read (git-fixes).
- drm/amdgpu: update wave data type to 3 for gfx11 (bsc#1206843).
- drm/amdkfd: Add sync after creating vram bo (bsc#1206843).
- drm/amdkfd: Fix BO offset for multi-VMA page migration (git-fixes).
- drm/amdkfd: Fix NULL pointer error for GC 11.0.1 on mGPU (bsc#1206843).
- drm/amdkfd: Fix an illegal memory access (git-fixes).
- drm/amdkfd: Fix double release compute pasid (bsc#1206843).
- drm/amdkfd: Fix kfd_process_device_init_vm error handling (bsc#1206843).
- drm/amdkfd: Fix the memory overrun (bsc#1206843).
- drm/amdkfd: Fix the warning of array-index-out-of-bounds (bsc#1206843).
- drm/amdkfd: Fixed kfd_process cleanup on module exit (git-fixes).
- drm/amdkfd: Get prange-&gt;offset after svm_range_vram_node_new (git-fixes).
- drm/amdkfd: Page aligned memory reserve size (bsc#1206843).
- drm/amdkfd: add GC 11.0.4 KFD support (bsc#1206843).
- drm/amdkfd: fix a potential double free in pqm_create_queue (git-fixes).
- drm/amdkfd: fix potential kgd_mem UAFs (git-fixes).
- drm/amdkfd: introduce dummy cache info for property asic (bsc#1206843).
- drm/armada: Fix a potential double free in an error handling path (git-fixes).
- drm/ast: Fix ARM compatibility (git-fixes).
- drm/bochs: fix blanking (git-fixes).
- drm/bridge: Fix returned array size name for atomic_get_input_bus_fmts kdoc (git-fixes).
- drm/bridge: adv7533: Fix adv7533_mode_valid for adv7533 and adv7535 (git-fixes).
- drm/bridge: it6505: Fix return value check for pm_runtime_get_sync (git-fixes).
- drm/bridge: lt8912b: Add hot plug detection (git-fixes).
- drm/bridge: lt8912b: Fix DSI Video Mode (git-fixes).
- drm/bridge: lt8912b: return EPROBE_DEFER if bridge is not found (git-fixes).
- drm/bridge: lt9611: Fix PLL being unable to lock (git-fixes).
- drm/bridge: lt9611: fix HPD reenablement (git-fixes).
- drm/bridge: lt9611: fix clock calculation (git-fixes).
- drm/bridge: lt9611: fix polarity programming (git-fixes).
- drm/bridge: lt9611: fix programming of video modes (git-fixes).
- drm/bridge: lt9611: fix sleep mode setup (git-fixes).
- drm/bridge: lt9611: pass a pointer to the of node (git-fixes).
- drm/bridge: megachips: Fix error handling in i2c_register_driver() (git-fixes).
- drm/bridge: ti-sn65dsi83: Fix delay after reset deassert to match spec (git-fixes).
- drm/cirrus: NULL-check pipe-&gt;plane.state-&gt;fb in cirrus_pipe_update() (git-fixes).
- drm/connector: print max_requested_bpc in state debugfs (git-fixes).
- drm/display/dp_mst: Add drm_atomic_get_old_mst_topology_state() (bsc#1206843).
- drm/display/dp_mst: Add helper for finding payloads in atomic MST state (bsc#1206843).
- drm/display/dp_mst: Add helpers for serializing SST &amp;lt;-&gt; MST transitions (bsc#1206843).
- drm/display/dp_mst: Add nonblocking helpers for DP MST (bsc#1206843).
- drm/display/dp_mst: Call them time slots, not VCPI slots (bsc#1206843).
- drm/display/dp_mst: Correct the kref of port (bsc#1206843).
- drm/display/dp_mst: Do not open code modeset checks for releasing time slots (bsc#1206843).
- drm/display/dp_mst: Drop all ports from topology on CSNs before queueing link address work (bsc#1206843).
- drm/display/dp_mst: Fix confusing docs for drm_dp_atomic_release_time_slots() (bsc#1206843).
- drm/display/dp_mst: Fix down message handling after a packet reception error (git-fixes).
- drm/display/dp_mst: Fix down/up message handling after sink disconnect (git-fixes).
- drm/display/dp_mst: Fix drm_dp_mst_add_affected_dsc_crtcs() return code (git-fixes).
- drm/display/dp_mst: Fix modeset tracking in drm_dp_atomic_release_vcpi_slots() (bsc#1206843).
- drm/display/dp_mst: Handle old/new payload states in drm_dp_remove_payload() (bsc#1206843).
- drm/display/dp_mst: Maintain time slot allocations when deleting payloads (bsc#1206843).
- drm/display/dp_mst: Move all payload info into the atomic state (bsc#1206843).
- drm/display/dp_mst: Rename drm_dp_mst_vcpi_allocation (bsc#1206843).
- drm/display: Do not assume dual mode adaptors support i2c sub-addressing (git-fixes).
- drm/displayid: add displayid_get_header() and check bounds better (git-fixes).
- drm/dp: Do not rewrite link config when setting phy test pattern (git-fixes).
- drm/dp_mst: Avoid deleting payloads for connectors staying enabled (bsc#1206843).
- drm/dp_mst: fix drm_dp_dpcd_read return value checks (git-fixes).
- drm/edid: fix AVI infoframe aspect ratio handling (git-fixes).
- drm/edid: fix parsing of 3D modes from HDMI VSDB (git-fixes).
- drm/etnaviv: fix reference leak when mmaping imported buffer (git-fixes).
- drm/exynos: fix g2d_open/close helper function definitions (git-fixes).
- drm/fb-helper: set x/yres_virtual in drm_fb_helper_check_var (git-fixes).
- drm/fbdev-generic: prohibit potential out-of-bounds access (git-fixes).
- drm/fourcc: Add missing big-endian XRGB1555 and RGB565 formats (git-fixes).
- drm/hyperv : Removing the restruction of VRAM allocation with PCI bar size (git-fixes).
- drm/hyperv: Add a bug reference to two existing changes (bsc#1211281).
- drm/hyperv: Add error message for fb size greater than allocated (git-fixes).
- drm/hyperv: Fix an error handling path in hyperv_vmbus_probe() (git-fixes).
- drm/i915/active: Fix missing debug object activation (git-fixes).
- drm/i915/active: Fix misuse of non-idle barriers as fence trackers (git-fixes).
- drm/i915/active: Fix misuse of non-idle barriers as fence trackers (git-fixes).
- drm/i915/adlp: Fix typo for reference clock (git-fixes).
- drm/i915/color: Fix typo for Plane CSC indexes (git-fixes).
- drm/i915/dg2: Add HDMI pixel clock frequencies 267.30 and 319.89 MHz (git-fixes).
- drm/i915/dg2: Add additional HDMI pixel clock frequencies (git-fixes).
- drm/i915/dg2: Drop one PCI ID (git-fixes).
- drm/i915/dg2: Support 4k@30 on HDMI (git-fixes).
- drm/i915/dgfx: Keep PCI autosuspend control 'on' by default on all dGPU (git-fixes).
- drm/i915/display/psr: Handle plane and pipe restrictions at every page flip (git-fixes).
- drm/i915/display/psr: Use drm damage helpers to calculate plane damaged area (git-fixes).
- drm/i915/display: Check source height is &gt; 0 (git-fixes).
- drm/i915/display: Workaround cursor left overs with PSR2 selective fetch enabled (git-fixes).
- drm/i915/display: clean up comments (git-fixes).
- drm/i915/dmc: Update DG2 DMC version to v2.08 (git-fixes).
- drm/i915/dp: prevent potential div-by-zero (git-fixes).
- drm/i915/dp_mst: Fix mst_mgr lookup during atomic check (bsc#1206843).
- drm/i915/dp_mst: Fix payload removal during output disabling (bsc#1206843).
- drm/i915/dpt: Treat the DPT BO as a framebuffer (git-fixes).
- drm/i915/dsi: Use unconditional msleep() instead of intel_dsi_msleep() (git-fixes).
- drm/i915/dsi: fix DSS CTL register offsets for TGL+ (git-fixes).
- drm/i915/gem: Flush lmem contents after construction (git-fixes).
- drm/i915/gen11: Moving WAs to icl_gt_workarounds_init() (git-fixes).
- drm/i915/gen11: Wa_1408615072/Wa_1407596294 should be on GT list (git-fixes).
- drm/i915/gt: Use the correct error value when kernel_context() fails (git-fixes).
- drm/i915/gt: perform uc late init after probe error injection (git-fixes).
- drm/i915/guc: Do not capture Gen8 regs on Xe devices (git-fixes).
- drm/i915/huc: always init the delayed load fence (git-fixes).
- drm/i915/huc: bump timeout for delayed load and reduce print verbosity (git-fixes).
- drm/i915/huc: fix leak of debug object in huc load fence on driver unload (git-fixes).
- drm/i915/migrate: Account for the reserved_space (git-fixes).
- drm/i915/migrate: fix corner case in CCS aux copying (git-fixes).
- drm/i915/psr: Fix PSR_IMR/IIR field handling (git-fixes).
- drm/i915/psr: Use calculated io and fast wake lines (git-fixes).
- drm/i915/psr: Use calculated io and fast wake lines (git-fixes).
- drm/i915/pxp: use &amp;lt;&gt; instead of '' for headers in include/ (git-fixes).
- drm/i915/quirks: Add inverted backlight quirk for HP 14-r206nv (git-fixes).
- drm/i915/selftest: fix intel_selftest_modify_policy argument types (git-fixes).
- drm/i915/tc: Fix the ICL PHY ownership check in TC-cold state (git-fixes).
- drm/i915: Allow switching away via vga-switcheroo if uninitialized (git-fixes).
- drm/i915: Avoid potential vm use-after-free (git-fixes).
- drm/i915: Disable DC states for all commits (git-fixes).
- drm/i915: Do not use BAR mappings for ring buffers with LLC (git-fixes).
- drm/i915: Do not use BAR mappings for ring buffers with LLC (git-fixes).
- drm/i915: Do not use stolen memory for ring buffers with LLC (git-fixes).
- drm/i915: Do not use stolen memory for ring buffers with LLC (git-fixes).
- drm/i915: Fix NULL ptr deref by checking new_crtc_state (git-fixes).
- drm/i915: Fix VBT DSI DVO port handling (git-fixes).
- drm/i915: Fix context runtime accounting (git-fixes).
- drm/i915: Fix fast wake AUX sync len (git-fixes).
- drm/i915: Fix potential bit_17 double-free (git-fixes).
- drm/i915: Fix potential context UAFs (git-fixes).
- drm/i915: Fix request ref counting during error capture &amp; debugfs dump (git-fixes).
- drm/i915: Fix up locking around dumping requests lists (git-fixes).
- drm/i915: Initialize the obj flags for shmem objects (git-fixes).
- drm/i915: Make intel_get_crtc_new_encoder() less oopsy (git-fixes).
- drm/i915: Move CSC load back into .color_commit_arm() when PSR is enabled on skl/glk (git-fixes).
- drm/i915: Move fd_install after last use of fence (git-fixes).
- drm/i915: Preserve crtc_state-&gt;inherited during state clearing (git-fixes).
- drm/i915: Remove __maybe_unused from mtl_info (git-fixes).
- drm/i915: Remove unused bits of i915_vma/active api (git-fixes).
- drm/i915: Remove unused variable (git-fixes).
- drm/i915: fix race condition UAF in i915_perf_add_config_ioctl (git-fixes).
- drm/i915: fix race condition UAF in i915_perf_add_config_ioctl (git-fixes).
- drm/i915: move a Kconfig symbol to unbreak the menu presentation (git-fixes).
- drm/i915: stop abusing swiotlb_max_segment (git-fixes).
- drm/lima/lima_drv: Add missing unwind goto in lima_pdev_probe() (git-fixes).
- drm/mediatek: Clean dangling pointer on bind error path (git-fixes).
- drm/mediatek: Drop unbalanced obj unref (git-fixes).
- drm/mediatek: Use NULL instead of 0 for NULL pointer (git-fixes).
- drm/mediatek: dsi: Reduce the time of dsi from LP11 to sending cmd (git-fixes).
- drm/mediatek: mtk_drm_crtc: Add checks for devm_kcalloc (git-fixes).
- drm/meson: fix 1px pink line on GXM when scaling video overlay (git-fixes).
- drm/meson: fix missing component unbind on bind errors (git-fixes).
- drm/meson: reorder driver deinit sequence to fix use-after-free bug (git-fixes).
- drm/mgag200: Fix gamma lut not initialized (git-fixes).
- drm/mipi-dsi: Fix byte order of 16-bit DCS set/get brightness (git-fixes).
- drm/mipi-dsi: Set the fwnode for mipi_dsi_device (git-fixes).
- drm/msm/a5xx: fix context faults during ring switch (git-fixes).
- drm/msm/a5xx: fix highest bank bit for a530 (git-fixes).
- drm/msm/a5xx: fix setting of the CP_PREEMPT_ENABLE_LOCAL register (git-fixes).
- drm/msm/a5xx: fix the emptyness check in the preempt code (git-fixes).
- drm/msm/a6xx: Fix kvzalloc vs state_kcalloc usage (git-fixes).
- drm/msm/a6xx: Fix speed-bin detection vs probe-defer (git-fixes).
- drm/msm/adreno: Fix null ptr access in adreno_gpu_cleanup() (git-fixes).
- drm/msm/adreno: adreno_gpu: Use suspend() instead of idle() on load error (git-fixes).
- drm/msm/adreno: drop bogus pm_runtime_set_active() (git-fixes).
- drm/msm/adreno: fix runtime PM imbalance at gpu load (git-fixes).
- drm/msm/disp/dpu: check for crtc enable rather than crtc active to release shared resources (git-fixes).
- drm/msm/disp/dpu: fix sc7280_pp base offset (git-fixes).
- drm/msm/dp: Clean up handling of DP AUX interrupts (git-fixes).
- drm/msm/dp: cleared DP_DOWNSPREAD_CTRL register before start link training (git-fixes).
- drm/msm/dp: unregister audio driver during unbind (git-fixes).
- drm/msm/dpu: Add INTF_5 interrupts (git-fixes).
- drm/msm/dpu: Add check for cstate (git-fixes).
- drm/msm/dpu: Add check for pstates (git-fixes).
- drm/msm/dpu: Disallow unallocated resources to be returned (git-fixes).
- drm/msm/dpu: Move non-MDP_TOP INTF_INTR offsets out of hwio header (git-fixes).
- drm/msm/dpu: Reject topologies for which no DSC blocks are available (git-fixes).
- drm/msm/dpu: Remove duplicate register defines from INTF (git-fixes).
- drm/msm/dpu: Remove num_enc from topology struct in favour of num_dsc (git-fixes).
- drm/msm/dpu: Wire up DSC mask for active CTL configuration (git-fixes).
- drm/msm/dpu: check for null return of devm_kzalloc() in dpu_writeback_init() (git-fixes).
- drm/msm/dpu: clear DSPP reservations in rm release (git-fixes).
- drm/msm/dpu: disable features unsupported by QCM2290 (git-fixes).
- drm/msm/dpu: drop DPU_DIM_LAYER from MIXER_MSM8998_MASK (git-fixes).
- drm/msm/dpu: drop stale comment from struct dpu_mdp_cfg doc (git-fixes).
- drm/msm/dpu: fix clocks settings for msm8998 SSPP blocks (git-fixes).
- drm/msm/dpu: fix len of sc7180 ctl blocks (git-fixes).
- drm/msm/dpu: sc7180: add missing WB2 clock control (git-fixes).
- drm/msm/dpu: set pdpu-&gt;is_rt_pipe early in dpu_plane_sspp_atomic_update() (git-fixes).
- drm/msm/dsi: Add missing check for alloc_ordered_workqueue (git-fixes).
- drm/msm/dsi: Allow 2 CTRLs on v2.5.0 (git-fixes).
- drm/msm/gem: Add check for kmalloc (git-fixes).
- drm/msm/hdmi: Add missing check for alloc_ordered_workqueue (git-fixes).
- drm/msm/mdp5: Add check for kzalloc (git-fixes).
- drm/msm/mdp5: fix reading hw revision on db410c platform (git-fixes).
- drm/msm: Be more shouty if per-process pgtables are not working (git-fixes).
- drm/msm: Fix potential invalid ptr free (git-fixes).
- drm/msm: Set max segment size earlier (git-fixes).
- drm/msm: clean event_thread-&gt;worker in case of an error (git-fixes).
- drm/msm: fix NULL-deref on irq uninstall (git-fixes).
- drm/msm: fix NULL-deref on snapshot tear down (git-fixes).
- drm/msm: fix drm device leak on bind errors (git-fixes).
- drm/msm: fix missing wq allocation error handling (git-fixes).
- drm/msm: fix vram leak on bind errors (git-fixes).
- drm/msm: fix workqueue leak on bind errors (git-fixes).
- drm/msm: use strscpy instead of strncpy (git-fixes).
- drm/nouveau/devinit/tu102-: wait for GFW_BOOT_PROGRESS == COMPLETED (git-fixes).
- drm/nouveau/disp: Support more modes by checking with lower bpc (git-fixes).
- drm/nouveau/kms/nv50-: remove unused functions (git-fixes).
- drm/nouveau/kms/nv50: fix nv50_wndw_new_ prototype (git-fixes).
- drm/nouveau/kms: Cache DP encoders in nouveau_connector (bsc#1206843).
- drm/nouveau/kms: Pull mst state in for all modesets (bsc#1206843).
- drm/omap: dsi: Fix excessive stack usage (git-fixes).
- drm/omapdrm: Remove unused struct csc_coef_rgb2yuv (git-fixes).
- drm/panel: novatek-nt35950: Improve error handling (git-fixes).
- drm/panel: novatek-nt35950: Only unregister DSI1 if it exists (git-fixes).
- drm/panel: otm8009a: Set backlight parent to panel device (git-fixes).
- drm/panfrost: Do not sync rpm suspension after mmu flushing (git-fixes).
- drm/panfrost: Fix the panfrost_mmu_map_fault_addr() error path (git-fixes).
- drm/probe-helper: Cancel previous job before starting new one (git-fixes).
- drm/radeon: Drop legacy MST support (bsc#1206843).
- drm/radeon: Fix eDP for single-display iMac11,2 (git-fixes).
- drm/radeon: free iio for atombios when driver shutdown (git-fixes).
- drm/radeon: reintroduce radeon_dp_work_func content (git-fixes).
- drm/rockchip: Drop unbalanced obj unref (git-fixes).
- drm/sched: Remove redundant check (git-fixes).
- drm/shmem-helper: Fix locking for drm_gem_shmem_get_pages_sgt() (git-fixes).
- drm/shmem-helper: Remove another errant put in error path (git-fixes).
- drm/shmem-helper: Revert accidental non-GPL export (git-fixes).
- drm/sun4i: fix missing component unbind on bind errors (git-fixes).
- drm/tegra: Avoid potential 32-bit integer overflow (git-fixes).
- drm/tegra: firewall: Check for is_addr_reg existence in IMM check (git-fixes).
- drm/tiny: ili9486: Do not assume 8-bit only SPI controllers (git-fixes).
- drm/ttm/pool: Fix ttm_pool_alloc error path (git-fixes).
- drm/ttm: Fix a NULL pointer dereference (git-fixes).
- drm/ttm: fix undefined behavior in bit shift for TTM_TT_FLAG_PRIV_POPULATED (git-fixes).
- drm/ttm: optimize pool allocations a bit v2 (git-fixes).
- drm/vc4: crtc: Increase setup cost in core clock calculation to handle extreme reduced blanking (git-fixes).
- drm/vc4: dpi: Add option for inverting pixel clock and output enable (git-fixes).
- drm/vc4: dpi: Fix format mapping for RGB565 (git-fixes).
- drm/vc4: dpi: Fix format mapping for RGB565 (git-fixes).
- drm/vc4: drv: Call component_unbind_all() (git-fixes).
- drm/vc4: hdmi: Correct interlaced timings again (git-fixes).
- drm/vc4: hdmi: make CEC adapter name unique (git-fixes).
- drm/vc4: hvs: Fix colour order for xRGB1555 on HVS5 (git-fixes).
- drm/vc4: hvs: SCALER_DISPBKGND_AUTOHS is only valid on HVS4 (git-fixes).
- drm/vc4: hvs: Set AXI panic modes (git-fixes).
- drm/vc4: kms: Sort the CRTCs by output before assigning them (git-fixes).
- drm/vc4: vec: Use pm_runtime_resume_and_get() in vc4_vec_encoder_enable() (git-fixes).
- drm/vgem: add missing mutex_destroy (git-fixes).
- drm/virtio: Correct drm_gem_shmem_get_sg_table() error handling (git-fixes).
- drm/virtio: Use appropriate atomic state in virtio_gpu_plane_cleanup_fb() (git-fixes).
- drm/virtio: exbuf-&gt;fence_fd unmodified on interrupted wait (git-fixes).
- drm/vkms: Fix memory leak in vkms_init() (git-fixes).
- drm/vkms: Fix null-ptr-deref in vkms_release() (git-fixes).
- drm/vmwgfx: Do not drop the reference to the handle too soon (git-fixes).
- drm/vmwgfx: Fix memory leak in vmw_mksstat_add_ioctl() (git-fixes).
- drm/vmwgfx: Fix race issue calling pin_user_pages (git-fixes).
- drm/vmwgfx: Stop accessing buffer objects which failed init (git-fixes).
- drm: Add orientation quirk for Lenovo ideapad D330-10IGL (git-fixes).
- drm: Fix potential null-ptr-deref due to drmm_mode_config_init() (git-fixes).
- drm: amd: display: Fix memory leakage (git-fixes).
- drm: bridge: adv7511: unregister cec i2c device after cec adapter (git-fixes).
- drm: exynos: dsi: Fix MIPI_DSI*_NO_* mode flags (git-fixes).
- drm: msm: adreno: Disable preemption on Adreno 510 (git-fixes).
- drm: mxsfb: DRM_IMX_LCDIF should depend on ARCH_MXC (git-fixes).
- drm: mxsfb: DRM_MXSFB should depend on ARCH_MXS || ARCH_MXC (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Lenovo IdeaPad Duet 3 10IGL5 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Lenovo Yoga Book X90F (git-fixes).
- drm: rcar-du: Fix a NULL vs IS_ERR() bug (git-fixes).
- drm: tidss: Fix pixel format definition (git-fixes).
- dt-binding: cdns,usb3: Fix cdns,on-chip-buff-size type (git-fixes).
- dt-bindings: arm: fsl: Fix bindings for APF28Dev board (git-fixes).
- dt-bindings: arm: fsl: Fix copy-paste error in comment (git-fixes).
- dt-bindings: ata: ahci-ceva: Cover all 4 iommus entries (git-fixes).
- dt-bindings: ata: ahci-ceva: convert to yaml (git-fixes).
- dt-bindings: hwlock: sun6i: Add missing #hwlock-cells (git-fixes).
- dt-bindings: iio: adc: renesas,rcar-gyroadc: Fix adi,ad7476 compatible value (git-fixes).
- dt-bindings: iio: ti,tmp117: fix documentation link (git-fixes).
- dt-bindings: input: iqs626a: Redefine trackpad property types (git-fixes).
- dt-bindings: mailbox: qcom,apcs-kpss-global: fix SDX55 'if' match (git-fixes).
- dt-bindings: msm: dsi-controller-main: Add vdd* descriptions back in (git-fixes).
- dt-bindings: net: snps,dwmac: Fix snps,reset-delays-us dependency (git-fixes).
- dt-bindings: nvmem: qcom,spmi-sdam: fix example 'reg' property (git-fixes).
- dt-bindings: power: renesas,apmu: Fix cpus property limits (git-fixes).
- dt-bindings: power: supply: pm8941-coincell: Do not require charging properties (git-fixes).
- dt-bindings: remoteproc: st,stm32-rproc: Fix phandle-array parameters description (git-fixes).
- dt-bindings: remoteproc: stm32-rproc: Typo fix (git-fixes).
- dt-bindings: serial: renesas,scif: Fix 4th IRQ for 4-IRQ SCIFs (git-fixes).
- dt-bindings: soc: qcom: smd-rpm: re-add missing qcom,rpm-msm8994 (git-fixes).
- dt-bindings: usb: amlogic,meson-g12a-usb-ctrl: make G12A usb3-phy0 optional (git-fixes).
- dt-bindings: usb: snps,dwc3: Fix 'snps,hsphy_interface' type (git-fixes).
- e1000e: Disable TSO on i219-LM card to increase speed (git-fixes).
- eeprom: at24: also select REGMAP (git-fixes).
- eeprom: idt_89hpesx: Fix error handling in idt_init() (git-fixes).
- efi/x86: libstub: Fix typo in __efi64_argmap* name (git-fixes).
- efi: Accept version 2 of memory attributes table (git-fixes).
- efi: efivars: Fix variable writes with unsupported query_variable_store() (git-fixes).
- efi: efivars: Fix variable writes without query_variable_store() (git-fixes).
- efi: fix potential NULL deref in efi_mem_reserve_persistent (git-fixes).
- efi: rt-wrapper: Add missing include (git-fixes).
- efi: ssdt: Do not free memory if ACPI table was loaded successfully (git-fixes).
- efi: sysfb_efi: Add quirk for Lenovo Yoga Book X91F/L (git-fixes).
- efi: sysfb_efi: Fix DMI quirks not working for simpledrm (git-fixes).
- elevator: update the document of elevator_switch (git-fixes).
- ethernet: 3com/typhoon: do not write directly to netdev-&gt;dev_addr (git-fixes).
- ethernet: 8390/etherh: do not write directly to netdev-&gt;dev_addr (git-fixes).
- ethernet: i825xx: do not write directly to netdev-&gt;dev_addr (git-fixes).
- ethernet: ice: avoid gcc-9 integer overflow warning (jsc#PED-376).
- ethernet: seeq/ether3: do not write directly to netdev-&gt;dev_addr (git-fixes).
- ethernet: tundra: do not write directly to netdev-&gt;dev_addr (git-fixes).
- exit: Add and use make_task_dead (bsc#1207328).
- exit: Allow oops_limit to be disabled (bsc#1207328).
- exit: Guarantee make_task_dead leaks the tsk when calling do_task_exit (bsc#1207328).
- exit: Move force_uaccess back into do_exit (bsc#1207328).
- exit: Move oops specific logic from do_exit into make_task_dead (bsc#1207328).
- exit: Put an upper limit on how often we can oops (bsc#1207328).
- exit: Stop poorly open coding do_task_dead in make_task_dead (bsc#1207328).
- exit: Use READ_ONCE() for all oops/warn limit reads (bsc#1207328).
- ext4,f2fs: fix readahead of verity data (bsc#1207648).
- ext4: Fix deadlock during directory rename (bsc#1210763).
- ext4: Fix possible corruption when moving a directory (bsc#1210763).
- ext4: add EXT4_IGET_BAD flag to prevent unexpected bad inode (bsc#1207619).
- ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h (bsc#1206878).
- ext4: add helper to check quota inums (bsc#1207618).
- ext4: add inode table check in __ext4_get_inode_loc to aovid possible infinite loop (bsc#1207617).
- ext4: add missing validation of fast-commit record lengths (bsc#1207626).
- ext4: allocate extended attribute value in vmalloc area (bsc#1207635).
- ext4: avoid crash when inline data creation follows DIO write (bsc#1206883).
- ext4: avoid resizing to a partial cluster size (bsc#1206880).
- ext4: avoid unaccounted block allocation when expanding inode (bsc#1207634).
- ext4: continue to expand file system when the target size does not reach (bsc#1206882).
- ext4: correct cluster len and clusters changed accounting in ext4_mb_mark_bb (bsc#1207592).
- ext4: correct max_inline_xattr_value_size computing (bsc#1206878).
- ext4: correct the misjudgment in ext4_iget_extra_inode (bsc#1206878).
- ext4: disable fast-commit of encrypted dir operations (bsc#1207623).
- ext4: do not allow journal inode to have encrypt flag (bsc#1207621).
- ext4: do not increase iversion counter for ea_inodes (bsc#1207605).
- ext4: do not run ext4lazyinit for read-only filesystems (bsc#1207603).
- ext4: do not set up encryption key during jbd2 transaction (bsc#1207624).
- ext4: drop ineligible txn start stop APIs (bsc#1207588).
- ext4: ext4_read_bh_lock() should submit IO if the buffer isn't uptodate (bsc#1207606).
- ext4: factor out ext4_fc_get_tl() (bsc#1207615).
- ext4: fast commit may miss file actions (bsc#1207591).
- ext4: fast commit may not fallback for ineligible commit (bsc#1207590).
- ext4: fix BUG_ON() when directory entry has invalid rec_len (bsc#1206886).
- ext4: fix RENAME_WHITEOUT handling for inline directories (bsc#1210766).
- ext4: fix another off-by-one fsmap error on 1k block filesystems (bsc#1210767).
- ext4: fix bad checksum after online resize (bsc#1210762 bsc#1208076).
- ext4: fix bug in extents parsing when eh_entries == 0 and eh_depth &gt; 0 (bsc#1206881).
- ext4: fix bug_on in __es_tree_search caused by bad boot loader inode (bsc#1207620).
- ext4: fix bug_on in start_this_handle during umount filesystem (bsc#1207594).
- ext4: fix cgroup writeback accounting with fs-layer encryption (bsc#1210765).
- ext4: fix corruption when online resizing a 1K bigalloc fs (bsc#1206891).
- ext4: fix deadlock due to mbcache entry corruption (bsc#1207653).
- ext4: fix delayed allocation bug in ext4_clu_mapped for bigalloc + inline (bsc#1207631).
- ext4: fix dir corruption when ext4_dx_add_entry() fails (bsc#1207608).
- ext4: fix error code return to user-space in ext4_get_branch() (bsc#1207630).
- ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit (bsc#1207593).
- ext4: fix extent status tree race in writeback error recovery path (bsc#1206877).
- ext4: fix incorrect options show of original mount_opt and extend mount_opt2 (bsc#1210764).
- ext4: fix inode leak in ext4_xattr_inode_create() on an error path (bsc#1207636).
- ext4: fix kernel BUG in 'ext4_write_inline_data_end()' (bsc#1206894).
- ext4: fix leaking uninitialized memory in fast-commit journal (bsc#1207625).
- ext4: fix miss release buffer head in ext4_fc_write_inode (bsc#1207609).
- ext4: fix null-ptr-deref in ext4_write_info (bsc#1206884).
- ext4: fix off-by-one errors in fast-commit block filling (bsc#1207628).
- ext4: fix possible double unlock when moving a directory (bsc#1210763).
- ext4: fix potential memory leak in ext4_fc_record_modified_inode() (bsc#1207611).
- ext4: fix potential memory leak in ext4_fc_record_regions() (bsc#1207612).
- ext4: fix potential out of bound read in ext4_fc_replay_scan() (bsc#1207616).
- ext4: fix reserved cluster accounting in __es_remove_extent() (bsc#1207637).
- ext4: fix unaligned memory access in ext4_fc_reserve_space() (bsc#1207627).
- ext4: fix undefined behavior in bit shift for ext4_check_flag_values (bsc#1206890).
- ext4: fix uninititialized value in 'ext4_evict_inode' (bsc#1206893).
- ext4: fix use-after-free in ext4_ext_shift_extents (bsc#1206888).
- ext4: fix use-after-free in ext4_orphan_cleanup (bsc#1207622).
- ext4: fix use-after-free in ext4_xattr_set_entry (bsc#1206878).
- ext4: fix warning in 'ext4_da_release_space' (bsc#1206887).
- ext4: goto right label 'failed_mount3a' (bsc#1207610).
- ext4: init quota for 'old.inode' in 'ext4_rename' (bsc#1207629).
- ext4: initialize quota before expanding inode in setproject ioctl (bsc#1207633).
- ext4: introduce EXT4_FC_TAG_BASE_LEN helper (bsc#1207614).
- ext4: limit the number of retries after discarding preallocations blocks (bsc#1207602).
- ext4: make ext4_lazyinit_thread freezable (bsc#1206885).
- ext4: place buffer head allocation before handle start (bsc#1207607).
- ext4: silence the warning when evicting inode with dioread_nolock (bsc#1206889).
- ext4: simplify updating of fast commit stats (bsc#1207589).
- ext4: unconditionally enable the i_version counter (bsc#1211299).
- ext4: update 'state-&gt;fc_regions_size' after successful memory allocation (bsc#1207613).
- ext4: update s_overhead_clusters in the superblock during an on-line resize (bsc#1206876).
- ext4: use ext4_journal_start/stop for fast commit transactions (bsc#1210793).
- extcon: usbc-tusb320: fix kernel-doc warning (git-fixes).
- f2fs: Fix f2fs_truncate_partial_nodes ftrace event (git-fixes).
- fbcon: Check font dimension limits (git-fixes).
- fbcon: Fix error paths in set_con2fb_map (git-fixes).
- fbcon: Fix null-ptr-deref in soft_cursor (git-fixes).
- fbcon: set_con2fb_map needs to set con2fb_map! (git-fixes).
- fbdev: Prevent possible use-after-free in fb_release() (bsc#1152472).
- fbdev: arcfb: Fix error handling in arcfb_probe() (git-fixes).
- fbdev: au1200fb: Fix potential divide by zero (git-fixes).
- fbdev: ep93xx-fb: Add missing clk_disable_unprepare in ep93xxfb_probe() (git-fixes).
- fbdev: fbcon: Destroy mutex on freeing struct fb_info (bsc#1152489)
- fbdev: imsttfb: Fix use after free bug in imsttfb_probe (git-fixes bsc#1211387).
- fbdev: intelfb: Fix potential divide by zero (git-fixes).
- fbdev: lxfb: Fix potential divide by zero (git-fixes).
- fbdev: mmp: Fix deferred clk handling in mmphw_probe() (git-fixes).
- fbdev: modedb: Add 1920x1080 at 60 Hz video mode (git-fixes).
- fbdev: nvidia: Fix potential divide by zero (git-fixes).
- fbdev: omapfb: avoid stack overflow warning (git-fixes).
- fbdev: omapfb: cleanup inconsistent indentation (git-fixes).
- fbdev: smscufx: fix error handling code in ufx_usb_probe (git-fixes).
- fbdev: stifb: Fall back to cfb_fillrect() on 32-bit HCRX cards (git-fixes).
- fbdev: stifb: Fix info entry in sti_struct on error path (git-fixes).
- fbdev: stifb: Provide valid pixelclock and add fb_check_var() checks (git-fixes).
- fbdev: tgafb: Fix potential divide by zero (git-fixes).
- fbdev: udlfb: Fix endpoint check (git-fixes).
- fbmem: Reject FB_ACTIVATE_KD_TEXT from userspace (git-fixes).
- filelock: new helper: vfs_inode_has_locks (jsc#SES-1880).
- firewire: fix memory leak for payload of request subaction to IEC 61883-1 FCP region (git-fixes).
- firmware/efi sysfb_efi: Add quirk for Lenovo IdeaPad Duet 3 (git-fixes).
- firmware: arm_ffa: Check if ffa_driver remove is present before executing (git-fixes).
- firmware: arm_ffa: Set handle field to zero in memory descriptor (git-fixes).
- firmware: arm_ffa: Set reserved/MBZ fields to zero in the memory descriptors (git-fixes).
- firmware: arm_scmi: Fix device node validation for mailbox transport (git-fixes).
- firmware: coreboot: Remove GOOGLE_COREBOOT_TABLE_ACPI/OF Kconfig entries (git-fixes).
- firmware: coreboot: framebuffer: Ignore reserved pixel color bits (git-fixes).
- firmware: dmi-sysfs: Fix null-ptr-deref in dmi_sysfs_register_handle (git-fixes).
- firmware: qcom_scm: Clear download bit during reboot (git-fixes).
- firmware: stratix10-svc: Fix an NULL vs IS_ERR() bug in probe (git-fixes).
- firmware: stratix10-svc: add missing gen_pool_destroy() in stratix10_svc_drv_probe() (git-fixes).
- firmware: xilinx: do not make a sleepable memory allocation from an atomic context (git-fixes).
- flow_dissector: Do not count vlan tags inside tunnel payload (git-fixes).
- fork: allow CLONE_NEWTIME in clone3 flags (bsc#1209258).
- fotg210-udc: Add missing completion handler (git-fixes).
- fpga: bridge: fix kernel-doc parameter description (git-fixes).
- fpga: bridge: properly initialize bridge device before populating children (git-fixes).
- fpga: m10bmc-sec: Fix probe rollback (git-fixes).
- fpga: stratix10-soc: Fix return value check in s10_ops_write_init() (git-fixes).
- fprobe: Check rethook_alloc() return in rethook initialization (git-fixes).
- fprobe: Fix smatch type mismatch warning (git-fixes).
- fprobe: add recursion detection in fprobe_exit_handler (git-fixes).
- fprobe: make fprobe_kprobe_handler recursion free (git-fixes).
- fs/jfs: fix shift exponent db_agl2size negative (git-fixes).
- fs: account for filesystem mappings (bsc#1205191).
- fs: account for group membership (bsc#1205191).
- fs: add i_user_ns() helper (bsc#1205191).
- fs: dlm: do not call kernel_getpeername() in error_report() (bsc#1208130).
- fs: dlm: use sk-&gt;sk_socket instead of con-&gt;sock (bsc#1208130).
- fs: ext4: initialize fsdata in pagecache_write() (bsc#1207632).
- fs: hfsplus: fix UAF issue in hfsplus_put_super (git-fixes).
- fs: jfs: fix possible NULL pointer dereference in dbFree() (git-fixes).
- fs: jfs: fix shift-out-of-bounds in dbAllocAG (git-fixes).
- fs: jfs: fix shift-out-of-bounds in dbDiscardAG (git-fixes).
- fs: move mapping helpers (bsc#1205191). Refresh patches.suse/nfs-set-acl-perm.patch.
- fs: remove __sync_filesystem (git-fixes).
- fs: sysv: Fix sysv_nblocks() returns wrong value (git-fixes).
- fs: tweak fsuidgid_has_mapping() (bsc#1205191).
- fscache: Use wait_on_bit() to wait for the freeing of relinquished volume (bsc#1210409).
- fscache_cookie_enabled: check cookie is valid before accessing it (bsc#1208429).
- ftrace/x86: Add back ftrace_expected for ftrace bug reports (git-fixes).
- ftrace: Clean comments related to FTRACE_OPS_FL_PER_CPU (git-fixes).
- ftrace: Fix invalid address access in lookup_rec() when index is 0 (git-fixes).
- ftrace: Fix issue that 'direct-&gt;addr' not restored in modify_ftrace_direct() (git-fixes).
- ftrace: Mark get_lock_parent_ip() __always_inline (git-fixes).
- fuse: add inode/permission checks to fileattr_get/fileattr_set (bsc#1208759).
- fuse: always revalidate rename target dentry (bsc#1211808).
- fuse: fix attr version comparison in fuse_read_update_size() (bsc#1211807).
- futex: Resend potentially swallowed owner death notification (git-fixes).
- genirq: Provide new interfaces for affinity hints (bsc#1208153).
- git-sort: Add io_uring 6.3 fixes remote
- google/gve:fix repeated words in comments (bsc#1211519).
- gpio: GPIO_REGMAP: select REGMAP instead of depending on it (git-fixes).
- gpio: davinci: Add irq chip flag to skip set wake (git-fixes).
- gpio: mockup: Fix mode of debugfs files (git-fixes).
- gpio: tegra186: remove unneeded loop in tegra186_gpio_init_route_mapping() (git-fixes).
- gpio: vf610: connect GPIO label to dev name (git-fixes).
- gpu: host1x: Do not skip assigning syncpoints to channels (git-fixes).
- gpu: host1x: Fix mask for syncpoint increment register (git-fixes).
- gpu: host1x: Fix potential double free if IOMMU is disabled (git-fixes).
- gpu: ipu-v3: common: Add of_node_put() for reference returned by of_graph_get_port_by_id() (git-fixes).
- gve: Adding a new AdminQ command to verify driver (bsc#1211519).
- gve: Cache link_speed value from device (git-fixes).
- gve: Fix error return code in gve_prefill_rx_pages() (bsc#1211519).
- gve: Fix spelling mistake 'droping' -&gt; 'dropping' (bsc#1211519).
- gve: Handle alternate miss completions (bsc#1211519).
- gve: Reduce alloc and copy costs in the GQ rx path (bsc#1211519).
- gve: Remove the code of clearing PBA bit (git-fixes).
- gve: Secure enough bytes in the first TX desc for all TCP pkts (git-fixes).
- gve: enhance no queue page list detection (bsc#1211519).
- hfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling (git-fixes).
- hfs/hfsplus: use WARN_ON for sanity check (git-fixes).
- hfs: Fix OOB Write in hfs_asc2mac (git-fixes).
- hfs: fix OOB Read in __hfs_brec_find (git-fixes).
- hfs: fix missing hfs_bnode_get() in __hfs_bnode_create (git-fixes).
- hfsplus: fix bug causing custom uid and gid being unable to be assigned with mount (git-fixes).
- hid: bigben_probe(): validate report count (git-fixes).
- hv: fix comment typo in vmbus_channel/low_latency (git-fixes).
- hv_netvsc: Allocate memory in netvsc_dma_map() with GFP_ATOMIC (git-fixes).
- hv_netvsc: Check status in SEND_RNDIS_PKT completion message (git-fixes).
- hv_netvsc: Fix missed pagebuf entries in netvsc_dma_map/unmap() (git-fixes).
- hwmon: (adm1266) Set `can_sleep` flag for GPIO chip (git-fixes).
- hwmon: (adt7475) Display smoothing attributes in correct order (git-fixes).
- hwmon: (adt7475) Fix masking of hysteresis registers (git-fixes).
- hwmon: (adt7475) Use device_property APIs when configuring polarity (git-fixes).
- hwmon: (coretemp) Simplify platform device handling (git-fixes).
- hwmon: (ftsteutates) Fix scaling of measurements (git-fixes).
- hwmon: (ina3221) return prober error code (git-fixes).
- hwmon: (k10temp) Check range scale when CUR_TEMP register is read-write (git-fixes).
- hwmon: (k10temp): Add support for new family 17h and 19h models (bsc#1208848).
- hwmon: (ltc2945) Handle error case in ltc2945_value_store (git-fixes).
- hwmon: (ltc2992) Set `can_sleep` flag for GPIO chip (git-fixes).
- hwmon: (mlxreg-fan) Return zero speed for broken fan (git-fixes).
- hwmon: (pmbus/fsp-3y) Fix functionality bitmask in FSP-3Y YM-2151E (git-fixes).
- hwmon: (ucd90320) Add minimum delay between bus accesses (git-fixes).
- hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition (git-fixes).
- hwmon: fix potential sensor registration fail if of_node is missing (git-fixes).
- hwmon: tmp512: drop of_match_ptr for ID table (git-fixes).
- i2c: cadence: cdns_i2c_master_xfer(): Fix runtime PM leak on error path (git-fixes).
- i2c: designware-pci: Add new PCI IDs for AMD NAVI GPU (git-fixes).
- i2c: designware: fix i2c_dw_clk_rate() return size to be u32 (git-fixes).
- i2c: hisi: Avoid redundant interrupts (git-fixes).
- i2c: hisi: Only use the completion interrupt to finish the transfer (git-fixes).
- i2c: imx-lpi2c: check only for enabled interrupt flags (git-fixes).
- i2c: imx-lpi2c: clean rx/tx buffers upon new message (git-fixes).
- i2c: mv64xxx: Add atomic_xfer method to driver (git-fixes).
- i2c: mv64xxx: Fix reading invalid status value in atomic mode (git-fixes).
- i2c: mv64xxx: Remove shutdown method from driver (git-fixes).
- i2c: mxs: suppress probe-deferral error message (git-fixes).
- i2c: ocores: generate stop condition after timeout in polling mode (git-fixes).
- i2c: omap: Fix standard mode false ACK readings (git-fixes).
- i2c: rk3x: fix a bunch of kernel-doc warnings (git-fixes).
- i2c: sprd: Delete i2c adapter in .remove's error path (git-fixes).
- i2c: tegra: Fix PEC support for SMBUS block read (git-fixes).
- i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer() (git-fixes).
- i40e: Add checking for null for nlmsg_find_attr() (jsc#SLE-18378).
- i40e: Fix ADQ rate limiting for PF (jsc#SLE-18378).
- i40e: Fix DMA mappings leak (jsc#SLE-18378).
- i40e: Fix VF hang when reset is triggered on another VF (jsc#SLE-18378).
- i40e: Fix VF set max MTU size (jsc#SLE-18378).
- i40e: Fix VF's MAC Address change on VM (jsc#SLE-18378).
- i40e: Fix adding ADQ filter to TC0 (jsc#SLE-18378).
- i40e: Fix calculating the number of queue pairs (jsc#SLE-18378).
- i40e: Fix erroneous adapter reinitialization during recovery process (jsc#SLE-18378).
- i40e: Fix ethtool rx-flow-hash setting for X722 (jsc#SLE-18378).
- i40e: Fix flow-type by setting GL_HASH_INSET registers (jsc#SLE-18378).
- i40e: Fix for VF MAC address 0 (jsc#SLE-18378).
- i40e: Fix incorrect address type for IPv6 flow rules (jsc#SLE-18378).
- i40e: Fix interface init with MSI interrupts (no MSI-X) (jsc#SLE-18378).
- i40e: Fix kernel crash during module removal (jsc#SLE-18378).
- i40e: Fix kernel crash during reboot when adapter is in recovery mode (jsc#SLE-18378).
- i40e: Fix set max_tx_rate when it is lower than 1 Mbps (jsc#SLE-18378).
- i40e: Fix the inability to attach XDP program on downed interface (jsc#SLE-18378).
- i40e: Refactor tc mqprio checks (jsc#SLE-18378).
- i40e: add double of VLAN header when computing the max MTU (jsc#SLE-18378).
- i40e: fix accessing vsi-&gt;active_filters without holding lock (jsc#SLE-18378).
- i40e: fix flow director packet filter programming (jsc#SLE-18378).
- i40e: fix i40e_setup_misc_vector() error handling (jsc#SLE-18378).
- i40e: fix registers dump after run ethtool adapter self test (jsc#SLE-18378).
- i825xx: sni_82596: use eth_hw_addr_set() (git-fixes).
- i915 kABI workaround (git-fixes).
- i915/perf: Replace DRM_DEBUG with driver specific drm_dbg call (git-fixes).
- iavf/iavf_main: actually log -&gt;src mask when talking about it (jsc#SLE-18385).
- iavf: Detach device during reset task (jsc#SLE-18385).
- iavf: Disallow changing rx/tx-frames and rx/tx-frames-irq (jsc#SLE-18385).
- iavf: Do not restart Tx queues after reset task failure (jsc#SLE-18385).
- iavf: Fix 'tc qdisc show' listing too many queues (jsc#SLE-18385).
- iavf: Fix a crash during reset task (jsc#SLE-18385).
- iavf: Fix bad page state (jsc#SLE-18385).
- iavf: Fix cached head and tail value for iavf_get_tx_pending (jsc#SLE-18385).
- iavf: Fix error handling in iavf_init_module() (jsc#SLE-18385).
- iavf: Fix max_rate limiting (jsc#SLE-18385).
- iavf: Fix race condition between iavf_shutdown and iavf_remove (jsc#SLE-18385).
- iavf: Fix set max MTU size with port VLAN and jumbo frames (jsc#SLE-18385).
- iavf: do not track VLAN 0 filters (jsc#PED-835).
- iavf: fix hang on reboot with ice (jsc#SLE-18385).
- iavf: fix inverted Rx hash condition leading to disabled hash (jsc#SLE-18385).
- iavf: fix non-tunneled IPv6 UDP packet type and hashing (jsc#SLE-18385).
- iavf: fix temporary deadlock and failure to set MAC address (jsc#PED-835).
- iavf: refactor VLAN filter states (jsc#PED-835).
- iavf: remove active_cvlans and active_svlans bitmaps (jsc#PED-835).
- iavf: schedule watchdog immediately when changing primary MAC (jsc#PED-835).
- ice: Add check for kzalloc (jsc#PED-376).
- ice: Call Trace after rmmod ice (bsc#1208628).
- ice: Fix disabling Rx VLAN filtering with port VLAN enabled (jsc#PED-376).
- ice: Fix interrupt moderation settings getting cleared (jsc#SLE-18375).
- ice: Fix potential memory leak in ice_gnss_tty_write() (jsc#PED-376).
- ice: Set txq_teid to ICE_INVAL_TEID on ring creation (jsc#SLE-18375).
- ice: avoid bonding causing auxiliary plug/unplug under RTNL lock (bsc#1210158).
- ice: move devlink port creation/deletion (jsc#PED-376).
- ice: xsk: Fix cleaning of XDP_TX frames (jsc#PED-376).
- ice: xsk: do not use xdp_return_frame() on tx_buf-&gt;raw_buf (jsc#PED-376).
- ieee80211: add TWT element definitions (bsc#1209980).
- igb: Add lock to avoid data race (jsc#SLE-18379).
- igb: Enable SR-IOV after reinit (jsc#SLE-18379).
- igb: Fix PPS input and output using 3rd and 4th SDP (jsc#PED-370).
- igb: Initialize mailbox message for VF reset (jsc#SLE-18379).
- igb: conditionalize I2C bit banging on external thermal sensor support (jsc#SLE-18379).
- igb: revert rtnl_lock() that causes deadlock (jsc#SLE-18379).
- igbvf: Regard vf reset nack as success (jsc#SLE-18379).
- igc: Add checking for basetime less than zero (jsc#SLE-18377).
- igc: Add ndo_tx_timeout support (jsc#SLE-18377).
- igc: Enhance Qbv scheduling by using first flag bit (jsc#SLE-18377).
- igc: Fix PPS delta between two synchronized end-points (jsc#SLE-18377).
- igc: Lift TAPRIO schedule restriction (jsc#SLE-18377).
- igc: Reinstate IGC_REMOVED logic and implement it properly (jsc#SLE-18377).
- igc: Set Qbv start_time and end_time to end_time if not being configured in GCL (jsc#SLE-18377).
- igc: Use strict cycles for Qbv scheduling (jsc#SLE-18377).
- igc: allow BaseTime 0 enrollment for Qbv (jsc#SLE-18377).
- igc: fix the validation logic for taprio's gate list (jsc#SLE-18377).
- igc: read before write to SRRCTL register (jsc#SLE-18377).
- igc: recalculate Qbv end_time by considering cycle time (jsc#SLE-18377).
- igc: return an error if the mac type is unknown in igc_ptp_systim_to_hwtstamp() (jsc#SLE-18377).
- iio: accel: mma9551_core: Prevent uninitialized variable in mma9551_read_config_word() (git-fixes).
- iio: accel: mma9551_core: Prevent uninitialized variable in mma9551_read_status_word() (git-fixes).
- iio: accel: st_accel: Fix invalid mount_matrix on devices without ACPI _ONT method (git-fixes).
- iio: adc: ad7192: Change 'shorted' channels to differential (git-fixes).
- iio: adc: ad7791: fix IRQ flags (git-fixes).
- iio: adc: ad_sigma_delta: Fix IRQ issue by setting IRQ_DISABLE_UNLAZY flag (git-fixes).
- iio: adc: at91-sama5d2_adc: fix an error code in at91_adc_allocate_trigger() (git-fixes).
- iio: adc: berlin2-adc: Add missing of_node_put() in error path (git-fixes).
- iio: adc: mxs-lradc: fix the order of two cleanup operations (git-fixes).
- iio: adc: palmas_gpadc: fix NULL dereference on rmmod (git-fixes).
- iio: adc: stm32-dfsdm: fill module aliases (git-fixes).
- iio: adc: ti-ads7950: Set `can_sleep` flag for GPIO chip (git-fixes).
- iio: adis16480: select CONFIG_CRC32 (git-fixes).
- iio: dac: cio-dac: Fix max DAC write value check for 12-bit (git-fixes).
- iio: dac: mcp4725: Fix i2c_master_send() return value handling (git-fixes).
- iio: hid: fix the retval in accel_3d_capture_sample (git-fixes).
- iio: hid: fix the retval in gyro_3d_capture_sample (git-fixes).
- iio: imu: fxos8700: fix ACCEL measurement range selection (git-fixes).
- iio: imu: fxos8700: fix IMU data bits returned to user space (git-fixes).
- iio: imu: fxos8700: fix MAGN sensor scale and unit (git-fixes).
- iio: imu: fxos8700: fix failed initialization ODR mode assignment (git-fixes).
- iio: imu: fxos8700: fix incomplete ACCEL and MAGN channels readback (git-fixes).
- iio: imu: fxos8700: fix incorrect ODR mode readback (git-fixes).
- iio: imu: fxos8700: fix map label of channel type to MAGN sensor (git-fixes).
- iio: imu: fxos8700: fix swapped ACCEL and MAGN channels readback (git-fixes).
- iio: imu: fxos8700: remove definition FXOS8700_CTRL_ODR_MIN (git-fixes).
- iio: imu: inv_icm42600: fix timestamp reset (git-fixes).
- iio: light: cm32181: Unregister second I2C client if present (git-fixes).
- iio: light: tsl2563: Do not hardcode interrupt trigger type (git-fixes).
- iio: light: tsl2772: fix reading proximity-diodes from device tree (git-fixes).
- iio: light: vcnl4035: fixed chip ID check (git-fixes).
- iio:adc:twl6030: Enable measurement of VAC (git-fixes).
- iio:adc:twl6030: Enable measurements of VUSB, VBAT and others (git-fixes).
- ima: Fix memory leak in __ima_inode_hash() (git-fixes).
- intel/igbvf: free irq on the error path in igbvf_request_msix() (jsc#SLE-18379).
- intel_idle: add Emerald Rapids Xeon support (PED-3849).
- interconnect: exynos: fix node leak in probe PM QoS error path (git-fixes).
- interconnect: fix mem leak when freeing nodes (git-fixes).
- interconnect: qcom: osm-l3: fix icc_onecell_data allocation (git-fixes).
- io_uring/fdinfo: fix sqe dumping for IORING_SETUP_SQE128 (git-fixes).
- io_uring/kbuf: fix not advancing READV kbuf ring (git-fixes).
- io_uring: ensure that cached task references are always put on exit (git-fixes).
- io_uring: fix CQ waiting timeout handling (git-fixes).
- io_uring: fix fget leak when fs do not support nowait buffered read (bsc#1205205).
- io_uring: fix ordering of args in io_uring_queue_async_work (git-fixes).
- io_uring: recycle kbuf recycle on tw requeue (git-fixes).
- iommu/hyper-v: Allow hyperv irq remapping without x2apic (git-fixes).
- iommu/vt-d: Add a fix for devices need extra dtlb flush (bsc#1208219).
- iommu/vt-d: Avoid superfluous IOTLB tracking in lazy mode (bsc#1208948).
- iommu/vt-d: Fix buggy QAT device mask (bsc#1208219).
- ipmi: fix SSIF not responding under certain cond (git-fixes).
- ipmi:ssif: Add 60ms time internal between write retries (bsc#1206459).
- ipmi:ssif: Add a timer between request retries (bsc#1206459).
- ipmi:ssif: Add send_retries increment (git-fixes).
- ipmi:ssif: Increase the message retry time (bsc#1206459).
- ipmi:ssif: Remove rtc_us_timer (bsc#1206459).
- ipmi:ssif: resend_msg() cannot fail (bsc#1206459).
- ipmi_ssif: Rename idle state and check (bsc#1206459).
- ipv6: sr: fix out-of-bounds read when setting HMAC data (bsc#1211592).
- ipv6: sr: fix out-of-bounds read when setting HMAC data (bsc#1211592).
- irqchip/gic-v3: Refactor ISB + EOIR at ack time (git-fixes)
- iw_cxgb4: Fix potential NULL dereference in c4iw_fill_res_cm_id_entry() (git-fixes)
- iwlwifi: cfg: Add missing MODULE_FIRMWARE() for *.pnvm (bsc#1207553).
- ixgbe: Allow flow hash to be set via ethtool (jsc#SLE-18384).
- ixgbe: Enable setting RSS table to default values (jsc#SLE-18384).
- ixgbe: Fix panic during XDP_TX with &gt; 64 CPUs (jsc#SLE-18384).
- ixgbe: add double of VLAN header when computing the max MTU (jsc#SLE-18384).
- ixgbe: allow to increase MTU to 3K with XDP enabled (jsc#SLE-18384).
- ixgbe: fix pci device refcount leak (jsc#SLE-18384).
- ixgbe: stop resetting SYSTIME in ixgbe_ptp_start_cyclecounter (jsc#SLE-18384).
- jbd2: Fix up kABI of ext4 fast commit interface (bsc#1207590).
- jbd2: add miss release buffer head in fc_do_one_pass() (bsc#1207646).
- jbd2: fix a potential race while discarding reserved buffers after an abort (bsc#1207641).
- jbd2: fix potential buffer head reference count leak (bsc#1207644).
- jbd2: fix potential use-after-free in jbd2_fc_wait_bufs (bsc#1207645).
- jbd2: use the correct print format (git-fixes).
- jbd2: wake up journal waiters in FIFO order, not LIFO (bsc#1207643).
- jfs: Fix fortify moan in symlink (git-fixes).
- k-m-s: Drop Linux 2.6 support
- kABI compatibility workaround for efivars (git-fixes).
- kABI workaround for btbcm.c (git-fixes).
- kABI workaround for drm_dp_mst helper updates (bsc#1206843).
- kABI workaround for hid quirks (git-fixes).
- kABI workaround for ieee80211 and co (bsc#1209980).
- kABI workaround for mt76_poll_msec() (git-fixes).
- kABI workaround for struct acpi_ec (bsc#1207149).
- kABI workaround for xhci (git-fixes).
- kABI: Fix kABI after backport Emulate RDPID only if it is enabled in guest  (git-fixes)
- kABI: Fixed broken 3rd party dirvers issue (bsc#1208050 bsc#1211414).
- kABI: PCI: Reduce warnings on possible RW1C corruption (kabi).
- kABI: PCI: dwc: Add dw_pcie_ops.host_deinit() callback (kabi).
- kABI: PCI: loongson: Prevent LS7A MRRS increases (kabi).
- kABI: Preserve TRACE_EVENT_FL values (git-fixes).
- kABI: Work around kABI changes after '20347fca71a3 swiotlb: split up the global swiotlb lock' (jsc#PED-3259).
- kABI: fix kabi breakage (bsc#1210206).
- kABI: x86/msi: Fix msi message data shadow struct (kabi).
- kABI: x86/msr: Remove .fixup usage (kabi).
- kabi/severities: add mlx5 internal symbols
- kabi/severities: added Microsoft mana symbold (bsc#1210551)
- kabi/severities: ignore KABI for NVMe target (bsc#1174777)
- kabi/severities: ignore kABI changes for mt76/* local modules (bsc#1209980)
- kasan: no need to unset panic_on_warn in end_report() (bsc#1207328).
- kconfig: Update config changed flag before calling callback (git-fixes).
- kernel-binary: install expoline.o (boo#1210791 bsc#1211089)
- kernel-docs: Add missing top level chapter numbers on SLE12 SP5 (bsc#1212158).
- kernel-spec-macros: Fix up obsolete_rebuilds_subpackage to generate obsoletes correctly (boo#1172073 bsc#1191731).
- kernel: Avoid deadlock for recursive I/O on dm-thin when used as swap (bsc#1177529).
- kernel: Do not sign the vanilla kernel (bsc#1209008).
- kernel: Fix page corruption caused by racy check in __free_pages (bsc#1208149).
- kernel: fix panic loop (bsc#1208290).
- kernel: secureboot: fix kernel lock issue (bsc#1198101, bsc#1208976).
- keys: Do not cache key in task struct if key is requested from kernel thread (git-fixes).
- keys: Fix linking a duplicate key to a keyring's assoc_array (bsc#1207088).
- kmap_local: do not assume kmap PTEs are linear arrays in memory (git-fixes).
- kvm/vfio: Fix potential deadlock on vfio group_lock (git-fixes)
- kvm/vfio: Fix potential deadlock problem in vfio (git-fixes)
- kvm: x86: Disable KVM_HC_CLOCK_PAIRING if tsc is in always catchup mode (git-fixes).
- lan78xx: Add missing return code checks (git-fixes).
- lan78xx: Fix exception on link speed change (git-fixes).
- lan78xx: Fix memory allocation bug (git-fixes).
- lan78xx: Fix partial packet errors on suspend/resume (git-fixes).
- lan78xx: Fix race condition in disconnect handling (git-fixes).
- lan78xx: Fix race conditions in suspend/resume handling (git-fixes).
- lan78xx: Fix white space and style issues (git-fixes).
- lan78xx: Remove unused pause frame queue (git-fixes).
- lan78xx: Remove unused timer (git-fixes).
- lan78xx: Set flow control threshold to prevent packet loss (git-fixes).
- leds: Fix reference to led_set_brightness() in doc (git-fixes).
- leds: TI_LMU_COMMON: select REGMAP instead of depending on it (git-fixes).
- leds: led-class: Add missing put_device() to led_put() (git-fixes).
- leds: led-core: Fix refcount leak in of_led_get() (git-fixes).
- leds: tca6507: Fix error handling of using fwnode_property_read_string (git-fixes).
- lib/mpi: Fix buffer overrun when SG is too long (git-fixes).
- lib/sbitmap: Fix invalid loop in __sbitmap_queue_get_batch() (git-fixes).
- lib/zlib: remove redundation assignement of avail_in dfltcc_gdht() (git-fixes).
- libfs: add DEFINE_SIMPLE_ATTRIBUTE_SIGNED for signed value (git-fixes).
- lockd: set file_lock start and end when decoding nlm4 testargs (git-fixes).
- locking/rwbase: Mitigate indefinite writer starvation (bsc#1189998, bsc#1206552).
- locking/rwbase: Mitigate indefinite writer starvation. Move out of sorted as the patch has moved within the tip tree.
- locking/rwsem: Add __always_inline annotation to __down_read_common() and inlined callers (git-fixes).
- locking/rwsem: Allow slowpath writer to ignore handoff bit if not set by first waiter (bsc#1207270).
- locking/rwsem: Always try to wake waiters in out_nolock path (bsc#1207270).
- locking/rwsem: Conditionally wake waiters in reader/writer slowpaths (bsc#1207270).
- locking/rwsem: Disable preemption in all down_read*() and up_read() code paths (bsc#1207270).
- locking/rwsem: Disable preemption in all down_write*() and up_write() code paths (bsc#1207270).
- locking/rwsem: Disable preemption while trying for rwsem lock (bsc#1207270).
- locking/rwsem: Make handoff bit handling more consistent (bsc#1207270).
- locking/rwsem: No need to check for handoff bit if wait queue empty (bsc#1207270).
- locking/rwsem: Prevent non-first waiter from spinning in down_write() slowpath (bsc#1207270).
- locking: Add missing __sched attributes (bsc#1207270).
- loop: Fix the max_loop commandline argument treatment when it is set to 0 (git-fixes).
- loop: fix ioctl calls using compat_loop_info (git-fixes).
- mac80211: introduce individual TWT support in AP mode (bsc#1209980).
- mac80211: introduce set_radar_offchan callback (bsc#1209980).
- mac80211: twt: do not use potentially unaligned pointer (bsc#1209980).
- mailbox: mailbox-test: Fix potential double-free in mbox_test_message_write() (git-fixes).
- mailbox: mailbox-test: fix a locking issue in mbox_test_message_write() (git-fixes).
- mailbox: zynqmp: Fix IPI isr handling (git-fixes).
- mailbox: zynqmp: Fix typo in IPI documentation (git-fixes).
- mbcache: Avoid nesting of cache-&gt;c_list_lock under bit locks (bsc#1207647).
- mbcache: Fixup kABI of mb_cache_entry (bsc#1207653).
- mce: fix set_mce_nospec to always unmap the whole page (git-fixes).
- md/bitmap: Fix bitmap chunk size overflow issues (git-fixes).
- md/raid1: stop mdx_raid1 thread when raid1 array run failed (git-fixes).
- md/raid5: Improve performance for sequential IO (bsc#1208081).
- md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d (git-fixes).
- md: Flush workqueue md_rdev_misc_wq in md_alloc() (git-fixes).
- md: Notify sysfs sync_completed in md_reap_sync_thread() (git-fixes).
- md: fix a crash in mempool_free (git-fixes).
- md: protect md_unregister_thread from reentrancy (git-fixes).
- media: av7110: prevent underflow in write_ts_to_decoder() (git-fixes).
- media: coda: Add check for dcoda_iram_alloc (git-fixes).
- media: coda: Add check for kmalloc (git-fixes).
- media: cx23885: Fix a null-ptr-deref bug in buffer_prepare() and buffer_finish() (git-fixes).
- media: dm1105: Fix use after free bug in dm1105_remove due to race condition (git-fixes).
- media: dvb-usb-v2: ce6230: fix null-ptr-deref in ce6230_i2c_master_xfer() (git-fixes).
- media: dvb-usb-v2: ec168: fix null-ptr-deref in ec168_i2c_xfer() (git-fixes).
- media: dvb-usb-v2: rtl28xxu: fix null-ptr-deref in rtl28xxu_i2c_xfer (git-fixes).
- media: dvb-usb: az6027: fix three null-ptr-deref in az6027_i2c_xfer() (git-fixes).
- media: dvb-usb: digitv: fix null-ptr-deref in digitv_i2c_xfer() (git-fixes).
- media: dvb-usb: dw2102: fix uninit-value in su3000_read_mac_address (git-fixes).
- media: dvb_ca_en50221: fix a size write bug (git-fixes).
- media: dvb_demux: fix a bug for the continuity counter (git-fixes).
- media: i2c: imx219: Fix binning for RAW8 capture (git-fixes).
- media: i2c: imx219: Split common registers from mode tables (git-fixes).
- media: i2c: ov7670: 0 instead of -EINVAL was returned (git-fixes).
- media: i2c: ov772x: Fix memleak in ov772x_probe() (git-fixes).
- media: imx: imx7-media-csi: fix missing clk_disable_unprepare() in imx7_csi_init() (git-fixes).
- media: ipu3-cio2: Fix PM runtime usage_count in driver unbind (git-fixes).
- media: m5mols: fix off-by-one loop termination error (git-fixes).
- media: max9286: Fix memleak in max9286_v4l2_register() (git-fixes).
- media: max9286: Free control handler (git-fixes).
- media: mn88443x: fix !CONFIG_OF error by drop of_match_ptr from ID table (git-fixes).
- media: netup_unidvb: fix irq init by register it at the end of probe (git-fixes).
- media: netup_unidvb: fix use-after-free at del_timer() (git-fixes).
- media: ov2740: Fix memleak in ov2740_init_controls() (git-fixes).
- media: ov5640: Fix analogue gain control (git-fixes).
- media: ov5675: Fix memleak in ov5675_init_controls() (git-fixes).
- media: pci: tw68: Fix null-ptr-deref bug in buf prepare and finish (git-fixes).
- media: platform: ti: Add missing check for devm_regulator_get (git-fixes).
- media: radio-shark: Add endpoint checks (git-fixes).
- media: rc: Fix use-after-free bugs caused by ene_tx_irqsim() (git-fixes).
- media: rc: gpio-ir-recv: Fix support for wake-up (git-fixes).
- media: rc: gpio-ir-recv: add remove function (git-fixes).
- media: rcar_fdp1: Fix the correct variable assignments (git-fixes).
- media: rcar_fdp1: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).
- media: rkvdec: fix use after free bug in rkvdec_remove (git-fixes).
- media: saa7134: Use video_unregister_device for radio_dev (git-fixes).
- media: saa7134: fix use after free bug in saa7134_finidev due to race condition (git-fixes).
- media: ti: cal: fix possible memory leak in cal_ctx_create() (git-fixes).
- media: usb: siano: Fix use after free bugs caused by do_submit_urb (git-fixes).
- media: uvcvideo: Add support for V4L2_CTRL_TYPE_CTRL_CLASS (git-fixes).
- media: uvcvideo: Check controls flags before accessing them (git-fixes).
- media: uvcvideo: Check for INACTIVE in uvc_ctrl_is_accessible() (git-fixes).
- media: uvcvideo: Do not check for V4L2_CTRL_WHICH_DEF_VAL (git-fixes).
- media: uvcvideo: Fix memory leak of object map on error exit path (git-fixes).
- media: uvcvideo: Fix race condition with usb_kill_urb (git-fixes).
- media: uvcvideo: Handle cameras with invalid descriptors (git-fixes).
- media: uvcvideo: Handle errors from calls to usb_string (git-fixes).
- media: uvcvideo: Quirk for autosuspend in Logitech B910 and C910 (git-fixes).
- media: uvcvideo: Remove s_ctrl and g_ctrl (git-fixes).
- media: uvcvideo: Silence memcpy() run-time false positive warnings (git-fixes).
- media: uvcvideo: Use control names from framework (git-fixes).
- media: uvcvideo: refactor __uvc_ctrl_add_mapping (git-fixes).
- media: v4l2-jpeg: correct the skip count in jpeg_parse_app14_data (git-fixes).
- media: v4l2-jpeg: ignore the unknown APP14 marker (git-fixes).
- media: venus: dec: Fix handling of the start cmd (git-fixes).
- mei: bus-fixup:upon error print return values of send and receive (git-fixes).
- mei: bus: fix unlink on bus in error path (git-fixes).
- mei: me: add meteor lake point M DID (git-fixes).
- mei: pxp: Use correct macros to initialize uuid_le (git-fixes).
- memstick: fix memory leak if card device is never registered (git-fixes).
- memstick: r592: Fix UAF bug in r592_remove due to race condition (bsc#1211449).
- mfd: arizona: Use pm_runtime_resume_and_get() to prevent refcnt leak (git-fixes).
- mfd: cs5535: Do not build on UML (git-fixes).
- mfd: dln2: Fix memory leak in dln2_probe() (git-fixes).
- mfd: pcf50633-adc: Fix potential memleak in pcf50633_adc_async_read() (git-fixes).
- mfd: tqmx86: Correct board names for TQMxE39x (git-fixes).
- mfd: tqmx86: Do not access I2C_DETECT register through io_base (git-fixes).
- misc/mei/hdcp: Use correct macros to initialize uuid_le (git-fixes).
- misc: enclosure: Fix doc for enclosure_find() (git-fixes).
- misc: fastrpc: reject new invocations during device removal (git-fixes).
- misc: fastrpc: return -EPIPE to invocations on device removal (git-fixes).
- mkinitrd: fix dependency with dracut (bsc#1202353).
- mlxsw: minimal: Fix deadlock in ports creation (git-fixes).
- mlxsw: spectrum: Allow driver to load with old firmware versions (git-fixes).
- mm/filemap: fix page end in filemap_get_read_batch (bsc#1210768).
- mm: /proc/pid/smaps_rollup: fix no vma's null-deref (bsc#1207769).
- mm: memcg: fix NULL pointer in mem_cgroup_track_foreign_dirty_slowpath() (bsc#1209262).
- mm: memcg: fix swapcached stat accounting (bsc#1209804).
- mm: mmap: remove newline at the end of the trace (git-fixes).
- mm: page_alloc: skip regions with hugetlbfs pages when allocating 1G pages (bsc#1210034).
- mm: take a page reference when removing device exclusive entries (bsc#1211025).
- mmc: atmel-mci: fix race between stop command and start of next command (git-fixes).
- mmc: block: Remove error check of hw_reset on reset (git-fixes).
- mmc: block: ensure error propagation for non-blk (git-fixes).
- mmc: jz4740: Work around bug on JZ4760(B) (git-fixes).
- mmc: mmc_spi: fix error handling in mmc_spi_probe() (git-fixes).
- mmc: sdhci-esdhc-imx: make 'no-mmc-hs400' works (git-fixes).
- mmc: sdhci-of-esdhc: fix quirk to ignore command inhibit for data (git-fixes).
- mmc: sdhci_am654: Set HIGH_SPEED_ENA for SDR12 and SDR25 (git-fixes).
- mmc: sdhci_am654: lower power-on failed message severity (git-fixes).
- mmc: sdio: fix possible resource leaks in some error paths (git-fixes).
- mmc: vub300: fix invalid response handling (git-fixes).
- module: Do not wait for GOING modules (bsc#1196058, bsc#1186449, bsc#1204356, bsc#1204662).
- mt76: Make use of the helper macro kthread_run() (bsc#1209980).
- mt76: Print error message when reading EEPROM from mtd failed (bsc#1209980).
- mt76: add 6GHz support (bsc#1209980).
- mt76: add MT_RXQ_MAIN_WA for mt7916 (bsc#1209980).
- mt76: add support for setting mcast rate (bsc#1209980).
- mt76: allow drivers to drop rx packets early (bsc#1209980).
- mt76: clear sta powersave flag after notifying driver (bsc#1209980).
- mt76: connac: add 6 GHz support for wtbl and starec configuration (bsc#1209980).
- mt76: connac: add 6GHz support to mt76_connac_mcu_set_channel_domain (bsc#1209980).
- mt76: connac: add 6GHz support to mt76_connac_mcu_sta_tlv (bsc#1209980).
- mt76: connac: add 6GHz support to mt76_connac_mcu_uni_add_bss (bsc#1209980).
- mt76: connac: add support for limiting to maximum regulatory Tx power (bsc#1209980).
- mt76: connac: add support for passing the cipher field in bss_info (bsc#1209980).
- mt76: connac: adjust wlan_idx size from u8 to u16 (bsc#1209980).
- mt76: connac: align MCU_EXT definitions with 7915 driver (bsc#1209980).
- mt76: connac: enable 6GHz band for hw scan (bsc#1209980).
- mt76: connac: enable hw amsdu @ 6GHz (bsc#1209980).
- mt76: connac: extend mcu_get_nic_capability (bsc#1209980).
- mt76: connac: fix a theoretical NULL pointer dereference in mt76_connac_get_phy_mode (bsc#1209980).
- mt76: connac: fix last_chan configuration in mt76_connac_mcu_rate_txpower_band (bsc#1209980).
- mt76: connac: fix unresolved symbols when CONFIG_PM is unset (bsc#1209980).
- mt76: connac: introduce MCU_CE_CMD macro (bsc#1209980).
- mt76: connac: introduce MCU_EXT macros (bsc#1209980).
- mt76: connac: introduce MCU_UNI_CMD macro (bsc#1209980).
- mt76: connac: introduce is_connac_v1 utility routine (bsc#1209980).
- mt76: connac: make read-only array ba_range static const (bsc#1209980).
- mt76: connac: move mcu reg access utility routines in mt76_connac_lib module (bsc#1209980).
- mt76: connac: move mt76_connac_chan_bw in common code (bsc#1209980).
- mt76: connac: move mt76_connac_lmac_mapping in mt76-connac module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_add_key in connac module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_bss_basic_tlv in connac module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_bss_ext_tlv in connac module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_bss_omac_tlv in connac module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_gen_dl_mode in mt76-connac module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_get_cipher in common code (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_rdd_cmd in mt76-connac module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_restart in common module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_set_pm in connac module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_wtbl_update_hdr_trans in connac module (bsc#1209980).
- mt76: connac: rely on MCU_CMD macro (bsc#1209980).
- mt76: connac: rely on le16_add_cpu in mt76_connac_mcu_add_nested_tlv (bsc#1209980).
- mt76: connac: remove MCU_FW_PREFIX bit (bsc#1209980).
- mt76: connac: remove PHY_MODE_AX_6G configuration in mt76_connac_get_phy_mode (bsc#1209980).
- mt76: connac: set 6G phymode in mt76_connac_get_phy_mode{,v2} (bsc#1209980).
- mt76: connac: set 6G phymode in single-sku support (bsc#1209980).
- mt76: debugfs: fix queue reporting for mt76-usb (bsc#1209980).
- mt76: debugfs: improve queue node readability (bsc#1209980).
- mt76: disable BH around napi_schedule() calls (bsc#1209980).
- mt76: do not access 802.11 header in ccmp check for 802.3 rx skbs (bsc#1209980).
- mt76: do not always copy ethhdr in reverse_frag0_hdr_trans (bsc#1209980).
- mt76: do not reset MIB counters in get_stats callback (bsc#1209980).
- mt76: eeprom: tolerate corrected bit-flips (bsc#1209980).
- mt76: fill boottime_ns in Rx path (bsc#1209980).
- mt76: fix antenna config missing in 6G cap (bsc#1209980).
- mt76: fix boolreturn.cocci warnings (bsc#1209980).
- mt76: fix dfs state issue with 160 MHz channels (bsc#1209980).
- mt76: fix endianness errors in reverse_frag0_hdr_trans (bsc#1209980).
- mt76: fix invalid rssi report (bsc#1209980).
- mt76: fix key pointer overwrite in mt7921s_write_txwi/mt7663_usb_sdio_write_txwi (bsc#1209980).
- mt76: fix monitor rx FCS error in DFS channel (bsc#1209980).
- mt76: fix possible OOB issue in mt76_calculate_default_rate (bsc#1209980).
- mt76: fix possible pktid leak (bsc#1209980).
- mt76: fix the wiphy's available antennas to the correct value (bsc#1209980).
- mt76: fix timestamp check in tx_status (bsc#1209980).
- mt76: fix tx status related use-after-free race on station removal (bsc#1209980).
- mt76: fix use-after-free by removing a non-RCU wcid pointer (git-fixes).
- mt76: fix wrong HE data rate in sniffer tool (bsc#1209980).
- mt76: improve signal strength reporting (bsc#1209980).
- mt76: introduce packet_id idr (bsc#1209980).
- mt76: make mt76_sar_capa static (bsc#1209980).
- mt76: move mt76_ethtool_worker_info in mt76 module (bsc#1209980).
- mt76: move mt76_sta_stats in mt76.h (bsc#1209980).
- mt76: move sar utilities to mt76-core module (bsc#1209980).
- mt76: move sar_capa configuration in common code (bsc#1209980).
- mt76: move spin_lock_bh to spin_lock in tasklet (bsc#1209980).
- mt76: mt7603: improve reliability of tx powersave filtering (bsc#1209980).
- mt76: mt7603: introduce SAR support (bsc#1209980).
- mt76: mt7615: add support for LG LGSBWAC02 (MT7663BUN) (bsc#1209980).
- mt76: mt7615: apply cached RF data for DBDC (bsc#1209980).
- mt76: mt7615: clear mcu error interrupt status on mt7663 (bsc#1209980).
- mt76: mt7615: fix a possible race enabling/disabling runtime-pm (bsc#1209980).
- mt76: mt7615: fix compiler warning on frame size (bsc#1209980).
- mt76: mt7615: fix decap offload corner case with 4-addr VLAN frames (bsc#1209980).
- mt76: mt7615: fix throughput regression on DFS channels (bsc#1209980).
- mt76: mt7615: fix unused tx antenna mask in testmode (bsc#1209980).
- mt76: mt7615: fix/rewrite the dfs state handling logic (bsc#1209980).
- mt76: mt7615: honor ret from mt7615_mcu_restart in mt7663u_mcu_init (bsc#1209980).
- mt76: mt7615: in debugfs queue stats, skip wmm index 3 on mt7663 (bsc#1209980).
- mt76: mt7615: introduce SAR support (bsc#1209980).
- mt76: mt7615: move mt7615_mcu_set_p2p_oppps in mt76_connac module (bsc#1209980).
- mt76: mt7615: remove dead code in get_omac_idx (bsc#1209980).
- mt76: mt7615: update bss_info with cipher after setting the group key (bsc#1209980).
- mt76: mt7615e: process txfree and txstatus without allocating skbs (bsc#1209980).
- mt76: mt7663: disable 4addr capability (bsc#1209980).
- mt76: mt7663s: flush runtime-pm queue after waking up the device (bsc#1209980).
- mt76: mt7663s: rely on mcu reg access utility (bsc#1209980).
- mt76: mt7663u: introduce mt7663u_mcu_power_on routine (bsc#1209980).
- mt76: mt76_connac: fix MCU_CE_CMD_SET_ROC definition error (bsc#1209980).
- mt76: mt76x02: improve tx hang detection (bsc#1209980).
- mt76: mt76x02: introduce SAR support (bsc#1209980).
- mt76: mt76x02: use mt76_phy_dfs_state to determine radar detector state (bsc#1209980).
- mt76: mt76x0: correct VHT MCS 8/9 tx power eeprom offset (bsc#1209980).
- mt76: mt7915: Fix PCI device refcount leak in mt7915_pci_init_hif2() (bsc#1209980).
- mt76: mt7915: Fix channel state update error issue (bsc#1209980).
- mt76: mt7915: add 6 GHz support (bsc#1209980).
- mt76: mt7915: add HE-LTF into fixed rate command (bsc#1209980).
- mt76: mt7915: add LED support (bsc#1209980).
- mt76: mt7915: add WA firmware log support (bsc#1209980).
- mt76: mt7915: add control knobs for thermal throttling (bsc#1209980).
- mt76: mt7915: add debugfs knobs for MCU utilization (bsc#1209980).
- mt76: mt7915: add default calibrated data support (bsc#1209980).
- mt76: mt7915: add device id for mt7916 (bsc#1209980).
- mt76: mt7915: add ethtool stats support (bsc#1209980).
- mt76: mt7915: add firmware support for mt7916 (bsc#1209980).
- mt76: mt7915: add mib counters to ethtool stats (bsc#1209980).
- mt76: mt7915: add missing DATA4_TB_SPTL_REUSE1 to mt7915_mac_decode_he_radiotap (bsc#1209980).
- mt76: mt7915: add more MIB registers (bsc#1209980).
- mt76: mt7915: add mt7915_mmio_probe() as a common probing function (bsc#1209980).
- mt76: mt7915: add mt7916 calibrated data support (bsc#1209980).
- mt76: mt7915: add mu-mimo and ofdma debugfs knobs (bsc#1209980).
- mt76: mt7915: add some per-station tx stats to ethtool (bsc#1209980).
- mt76: mt7915: add support for MT7986 (bsc#1209980).
- mt76: mt7915: add support for passing chip/firmware debug data to user space (bsc#1209980).
- mt76: mt7915: add twt_stats knob in debugfs (bsc#1209980).
- mt76: mt7915: add tx mu/su counters to mib (bsc#1209980).
- mt76: mt7915: add tx stats gathered from tx-status callbacks (bsc#1209980).
- mt76: mt7915: add txfree event v3 (bsc#1209980).
- mt76: mt7915: add txpower init for 6GHz (bsc#1209980).
- mt76: mt7915: allow beaconing on all chains (bsc#1209980).
- mt76: mt7915: change max rx len limit of hw modules (bsc#1209980).
- mt76: mt7915: check band idx for bcc event (bsc#1209980).
- mt76: mt7915: check for devm_pinctrl_get() failure (bsc#1209980).
- mt76: mt7915: do not pass data pointer to mt7915_mcu_muru_debug_set (bsc#1209980).
- mt76: mt7915: enable HE UL MU-MIMO (bsc#1209980).
- mt76: mt7915: enable configured beacon tx rate (bsc#1209980).
- mt76: mt7915: enable radar background detection (bsc#1209980).
- mt76: mt7915: enable radar trigger on rdd2 (bsc#1209980).
- mt76: mt7915: enable twt responder capability (bsc#1209980).
- mt76: mt7915: enlarge wcid size to 544 (bsc#1209980).
- mt76: mt7915: fix DBDC default band selection on MT7915D (bsc#1209980).
- mt76: mt7915: fix DFS no radar detection event (bsc#1209980).
- mt76: mt7915: fix SMPS operation fail (bsc#1209980).
- mt76: mt7915: fix WMM index on DBDC cards (bsc#1209980).
- mt76: mt7915: fix beamforming mib stats (bsc#1209980).
- mt76: mt7915: fix decap offload corner case with 4-addr VLAN frames (bsc#1209980).
- mt76: mt7915: fix eeprom fields of txpower init values (bsc#1209980).
- mt76: mt7915: fix endiannes warning mt7915_mcu_beacon_check_caps (bsc#1209980).
- mt76: mt7915: fix endianness warnings in mt7915_debugfs_rx_fw_monitor (bsc#1209980).
- mt76: mt7915: fix endianness warnings in mt7915_mac_tx_free() (bsc#1209980).
- mt76: mt7915: fix he_mcs capabilities for 160mhz (bsc#1209980).
- mt76: mt7915: fix incorrect testmode ipg on band 1 caused by wmm_idx (git-fixes).
- mt76: mt7915: fix incorrect testmode ipg on band 1 caused by wmm_idx (git-fixes).
- mt76: mt7915: fix mcs_map in mt7915_mcu_set_sta_he_mcs() (bsc#1209980).
- mt76: mt7915: fix missing HE phy cap (bsc#1209980).
- mt76: mt7915: fix phy cap in mt7915_set_stream_he_txbf_caps() (bsc#1209980).
- mt76: mt7915: fix polling firmware-own status (git-fixes).
- mt76: mt7915: fix possible NULL pointer dereference in mt7915_mac_fill_rx_vector (git-fixes).
- mt76: mt7915: fix possible memory leak in mt7915_mcu_add_sta (bsc#1209980).
- mt76: mt7915: fix possible uninitialized pointer dereference in mt7986_wmac_gpio_setup (bsc#1209980).
- mt76: mt7915: fix potential NPE in TXS processing (bsc#1209980).
- mt76: mt7915: fix potential memory leak of fw monitor packets (bsc#1209980).
- mt76: mt7915: fix return condition in mt7915_tm_reg_backup_restore() (bsc#1209980).
- mt76: mt7915: fix the muru tlv issue (bsc#1209980).
- mt76: mt7915: fix the nss setting in bitrates (bsc#1209980).
- mt76: mt7915: fix twt table_mask to u16 in mt7915_dev (bsc#1209980).
- mt76: mt7915: fix txbf starec TLV issues (bsc#1209980).
- mt76: mt7915: fix typos in comments (bsc#1209980).
- mt76: mt7915: fix/rewrite the dfs state handling logic (bsc#1209980).
- mt76: mt7915: get rid of mt7915_mcu_set_fixed_rate routine (bsc#1209980).
- mt76: mt7915: honor all possible error conditions in mt7915_mcu_init() (bsc#1209980).
- mt76: mt7915: improve code readability for xmit-queue handler (bsc#1209980).
- mt76: mt7915: improve code readability in mt7915_mcu_sta_bfer_ht (bsc#1209980).
- mt76: mt7915: improve starec readability of txbf (bsc#1209980).
- mt76: mt7915: improve wmm index allocation (bsc#1209980).
- mt76: mt7915: initialize smps mode in mt7915_mcu_sta_rate_ctrl_tlv() (bsc#1209980).
- mt76: mt7915: introduce SAR support (bsc#1209980).
- mt76: mt7915: introduce __mt7915_get_tsf routine (bsc#1209980).
- mt76: mt7915: introduce band_idx in mt7915_phy (bsc#1209980).
- mt76: mt7915: introduce bss coloring support (bsc#1209980).
- mt76: mt7915: introduce mt76 debugfs sub-dir for ext-phy (bsc#1209980).
- mt76: mt7915: introduce mt76_vif in mt7915_vif (bsc#1209980).
- mt76: mt7915: introduce mt7915_mac_add_twt_setup routine (bsc#1209980).
- mt76: mt7915: introduce mt7915_mcu_beacon_check_caps() (bsc#1209980).
- mt76: mt7915: introduce mt7915_mcu_twt_agrt_update mcu command (bsc#1209980).
- mt76: mt7915: introduce mt7915_set_radar_background routine (bsc#1209980).
- mt76: mt7915: introduce rdd_monitor debugfs node (bsc#1209980).
- mt76: mt7915: move pci specific code back to pci.c (bsc#1209980).
- mt76: mt7915: move tx amsdu stats in mib_stats (bsc#1209980).
- mt76: mt7915: process txfree and txstatus without allocating skbs (bsc#1209980).
- mt76: mt7915: refine register definition (bsc#1209980).
- mt76: mt7915: rely on mt76_connac definitions (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_get_phy utilities (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_add_tlv routine (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_alloc_sta_req (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_alloc_wtbl_req (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_init_download (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_patch_sem_ctrl/mt76_connac_mcu_start_patch (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_set_rts_thresh (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_sta_ba (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_sta_ba_tlv (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_sta_basic_tlv (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_sta_uapsd (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_start_firmware (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_wtbl_ba_tlv (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_wtbl_generic_tlv (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_wtbl_hdr_trans_tlv (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_wtbl_ht_tlv (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_wtbl_smps_tlv (bsc#1209980).
- mt76: mt7915: remove dead code in debugfs code (bsc#1209980).
- mt76: mt7915: remove duplicated defs in mcu.h (bsc#1209980).
- mt76: mt7915: remove mt7915_mcu_add_he() (bsc#1209980).
- mt76: mt7915: rename debugfs tx-queues (bsc#1209980).
- mt76: mt7915: report radar pattern if detected by rdd2 (bsc#1209980).
- mt76: mt7915: report rx mode value in mt7915_mac_fill_rx_rate (bsc#1209980).
- mt76: mt7915: rework .set_bitrate_mask() to support more options (bsc#1209980).
- mt76: mt7915: rework debugfs fixed-rate knob (bsc#1209980).
- mt76: mt7915: rework debugfs queue info (bsc#1209980).
- mt76: mt7915: rework dma.c to adapt mt7916 changes (bsc#1209980).
- mt76: mt7915: rework eeprom.c to adapt mt7916 changes (bsc#1209980).
- mt76: mt7915: rework mt7915_mcu_sta_muru_tlv() (bsc#1209980).
- mt76: mt7915: rework starec TLV tags (bsc#1209980).
- mt76: mt7915: run mt7915_get_et_stats holding mt76 mutex (bsc#1209980).
- mt76: mt7915: send EAPOL frames at lowest rate (bsc#1209980).
- mt76: mt7915: set VTA bit in tx descriptor (bsc#1209980).
- mt76: mt7915: set band1 TGID field in tx descriptor (bsc#1209980).
- mt76: mt7915: set bssinfo/starec command when adding interface (bsc#1209980).
- mt76: mt7915: set muru platform type (bsc#1209980).
- mt76: mt7915: simplify conditional (bsc#1209980).
- mt76: mt7915: switch proper tx arbiter mode in testmode (bsc#1209980).
- mt76: mt7915: update bss_info with cipher after setting the group key (bsc#1209980).
- mt76: mt7915: update mac timing settings (bsc#1209980).
- mt76: mt7915: update max_mpdu_size in mt7915_mcu_sta_amsdu_tlv() (bsc#1209980).
- mt76: mt7915: update mt7915_chan_mib_offs for mt7916 (bsc#1209980).
- mt76: mt7915: update rx rate reporting for mt7916 (bsc#1209980).
- mt76: mt7915: use min_t() to make code cleaner (bsc#1209980).
- mt76: mt7915e: Add a hwmon attribute to get the actual throttle state (bsc#1209980).
- mt76: mt7915e: Enable thermal management by default (bsc#1209980).
- mt76: mt7915e: Fix degraded performance after temporary overheat (bsc#1209980).
- mt76: mt7921: Fix the error handling path of mt7921_pci_probe() (git-fixes).
- mt76: mt7921: add 6GHz support (bsc#1209980).
- mt76: mt7921: add MT7921_COMMON module (bsc#1209980).
- mt76: mt7921: add MU EDCA cmd support (bsc#1209980).
- mt76: mt7921: add delay config for sched scan (bsc#1209980).
- mt76: mt7921: add mt7921u driver (bsc#1209980).
- mt76: mt7921: add per-vif counters in ethtool (bsc#1209980).
- mt76: mt7921: add some more MIB counters (bsc#1209980).
- mt76: mt7921: add sta stats accounting in mt7921_mac_add_txs_skb (bsc#1209980).
- mt76: mt7921: add support for PCIe ID 0x0608/0x0616 (bsc#1209980).
- mt76: mt7921: add support for tx status reporting (bsc#1209980).
- mt76: mt7921: clear pm-&gt;suspended in mt7921_mac_reset_work (bsc#1209980).
- mt76: mt7921: disable 4addr capability (bsc#1209980).
- mt76: mt7921: disable runtime pm for usb (bsc#1209980).
- mt76: mt7921: do not always disable fw runtime-pm (bsc#1209980).
- mt76: mt7921: do not enable beacon filter when IEEE80211_CONF_CHANGE_MONITOR is set (bsc#1209980).
- mt76: mt7921: do not update pm states in case of error (git-fixes).
- mt76: mt7921: fix MT7921E reset failure (bsc#1209980).
- mt76: mt7921: fix Wformat build warning (bsc#1209980).
- mt76: mt7921: fix a possible race enabling/disabling runtime-pm (bsc#1209980).
- mt76: mt7921: fix boolreturn.cocci warning (bsc#1209980).
- mt76: mt7921: fix build regression (bsc#1209980).
- mt76: mt7921: fix endianness issues in mt7921_mcu_set_tx() (bsc#1209980).
- mt76: mt7921: fix endianness warnings in mt7921_mac_decode_he_mu_radiotap (bsc#1209980).
- mt76: mt7921: fix ht mcs in mt7921_mac_add_txs_skb() (bsc#1209980).
- mt76: mt7921: fix injected MPDU transmission to not use HW A-MSDU (bsc#1209980).
- mt76: mt7921: fix kernel crash at mt7921_pci_remove (git-fixes).
- mt76: mt7921: fix kernel panic by accessing unallocated eeprom.data (git-fixes).
- mt76: mt7921: fix mt7921s Kconfig (bsc#1209980).
- mt76: mt7921: fix network buffer leak by txs missing (bsc#1209980).
- mt76: mt7921: fix possible NULL pointer dereference in mt7921_mac_write_txwi (bsc#1209980).
- mt76: mt7921: fix up the monitor mode (bsc#1209980).
- mt76: mt7921: fix xmit-queue dump for usb and sdio (bsc#1209980).
- mt76: mt7921: forbid the doze mode when coredump is in progress (bsc#1209980).
- mt76: mt7921: get rid of monitor_vif (bsc#1209980).
- mt76: mt7921: get rid of mt7921_mcu_get_eeprom (bsc#1209980).
- mt76: mt7921: get rid of mt7921_wait_for_mcu_init declaration (bsc#1209980).
- mt76: mt7921: honor mt76_connac_mcu_set_rate_txpower return value in mt7921_config (bsc#1209980).
- mt76: mt7921: honor pm user configuration in mt7921_sniffer_interface_iter (bsc#1209980).
- mt76: mt7921: introduce 160 MHz channel bandwidth support (bsc#1209980).
- mt76: mt7921: introduce mt7921s support (bsc#1209980).
- mt76: mt7921: introduce stats reporting through ethtool (bsc#1209980).
- mt76: mt7921: make all event parser reusable between mt7921s and mt7921e (bsc#1209980).
- mt76: mt7921: make mt7921_init_tx_queues static (bsc#1209980).
- mt76: mt7921: move mt76_connac_mcu_set_hif_suspend to bus-related files (bsc#1209980).
- mt76: mt7921: move mt7921_init_hw in a dedicated work (bsc#1209980).
- mt76: mt7921: move mt7921_queue_rx_skb to mac.c (bsc#1209980).
- mt76: mt7921: move mt7921_usb_sdio_tx_complete_skb in common mac code (bsc#1209980).
- mt76: mt7921: move mt7921_usb_sdio_tx_prepare_skb in common mac code (bsc#1209980).
- mt76: mt7921: move mt7921_usb_sdio_tx_status_data in mac common code (bsc#1209980).
- mt76: mt7921: move tx amsdu stats in mib_stats (bsc#1209980).
- mt76: mt7921: reduce log severity levels for informative messages (bsc#1209980).
- mt76: mt7921: refactor dma.c to be pcie specific (bsc#1209980).
- mt76: mt7921: refactor init.c to be bus independent (bsc#1209980).
- mt76: mt7921: refactor mac.c to be bus independent (bsc#1209980).
- mt76: mt7921: refactor mcu.c to be bus independent (bsc#1209980).
- mt76: mt7921: refactor mt7921_mcu_send_message (bsc#1209980).
- mt76: mt7921: rely on mcu_get_nic_capability (bsc#1209980).
- mt76: mt7921: remove dead definitions (bsc#1209980).
- mt76: mt7921: remove duplicated code in mt7921_mac_decode_he_radiotap (bsc#1209980).
- mt76: mt7921: remove mcu rate reporting code (bsc#1209980).
- mt76: mt7921: remove mt7921_sta_stats (bsc#1209980).
- mt76: mt7921: report tx rate directly from tx status (bsc#1209980).
- mt76: mt7921: robustify hardware initialization flow (bsc#1209980).
- mt76: mt7921: send EAPOL frames at lowest rate (bsc#1209980).
- mt76: mt7921: set EDCA parameters with the MCU CE command (bsc#1209980).
- mt76: mt7921: start reworking tx rate reporting (bsc#1209980).
- mt76: mt7921: toggle runtime-pm adding a monitor vif (bsc#1209980).
- mt76: mt7921: update mib counters dumping phy stats (bsc#1209980).
- mt76: mt7921: update mt7921_skb_add_usb_sdio_hdr to support usb (bsc#1209980).
- mt76: mt7921: use correct iftype data on 6GHz cap init (bsc#1209980).
- mt76: mt7921: use mt76_hw instead of open coding it (bsc#1209980).
- mt76: mt7921: use physical addr to unify register access (bsc#1209980).
- mt76: mt7921e: fix possible probe failure after reboot (bsc#1198835).
- mt76: mt7921e: make dev-&gt;fw_assert usage consistent (bsc#1209980).
- mt76: mt7921e: process txfree and txstatus without allocating skbs (bsc#1209980).
- mt76: mt7921s: add reset support (bsc#1209980).
- mt76: mt7921s: clear MT76_STATE_MCU_RUNNING immediately after reset (bsc#1209980).
- mt76: mt7921s: fix a possible memory leak in mt7921_load_patch (bsc#1209980).
- mt76: mt7921s: fix bus hang with wrong privilege (bsc#1209980).
- mt76: mt7921s: fix cmd timeout in throughput test (bsc#1209980).
- mt76: mt7921s: fix firmware download random fail (bsc#1209980).
- mt76: mt7921s: fix missing fc type/sub-type for 802.11 pkts (bsc#1209980).
- mt76: mt7921s: fix mt7921s_mcu_[fw|drv]_pmctrl (bsc#1209980).
- mt76: mt7921s: fix possible kernel crash due to invalid Rx count (bsc#1209980).
- mt76: mt7921s: fix possible sdio deadlock in command fail (bsc#1209980).
- mt76: mt7921s: fix suspend error with enlarging mcu timeout value (bsc#1209980).
- mt76: mt7921s: fix the device cannot sleep deeply in suspend (bsc#1209980).
- mt76: mt7921s: make pm-&gt;suspended usage consistent (bsc#1209980).
- mt76: mt7921s: run sleep mode by default (bsc#1209980).
- mt76: mt7921s: update mt7921s_wfsys_reset sequence (bsc#1209980).
- mt76: only access ieee80211_hdr after mt76_insert_ccmp_hdr (bsc#1209980).
- mt76: only set rx radiotap flag from within decoder functions (bsc#1209980).
- mt76: redefine mt76_for_each_q_rx to adapt mt7986 changes (bsc#1209980).
- mt76: rely on phy pointer in mt76_register_debugfs_fops routine signature (bsc#1209980).
- mt76: remove mt76_wcid pointer from mt76_tx_status_check signature (bsc#1209980).
- mt76: remove variable set but not used (bsc#1209980).
- mt76: reverse the first fragmented frame to 802.11 (bsc#1209980).
- mt76: schedule status timeout at dma completion (bsc#1209980).
- mt76: sdio: disable interrupt in mt76s_sdio_irq (bsc#1209980).
- mt76: sdio: export mt76s_alloc_rx_queue and mt76s_alloc_tx routines (bsc#1209980).
- mt76: sdio: extend sdio module to support CONNAC2 (bsc#1209980).
- mt76: sdio: honor the largest Tx buffer the hardware can support (bsc#1209980).
- mt76: sdio: introduce parse_irq callback (bsc#1209980).
- mt76: sdio: lock sdio when it is needed (bsc#1209980).
- mt76: sdio: move common code in mt76_sdio module (bsc#1209980).
- mt76: set wlan_idx_hi on mt7916 (bsc#1209980).
- mt76: split single ldpc cap bit into bits (bsc#1209980).
- mt76: substitute sk_buff_head status_list with spinlock_t status_lock (bsc#1209980).
- mt76: support reading EEPROM data embedded in fdt (bsc#1209980).
- mt76: switch from 'pci_' to 'dma_' API (bsc#1209980).
- mt76: testmode: add support to set MAC (bsc#1209980).
- mt76: usb: add req_type to ___mt76u_rr signature (bsc#1209980).
- mt76: usb: add req_type to ___mt76u_wr signature (bsc#1209980).
- mt76: usb: introduce __mt76u_init utility routine (bsc#1209980).
- mt76: use IEEE80211_OFFLOAD_ENCAP_ENABLED instead of MT_DRV_AMSDU_OFFLOAD (bsc#1209980).
- mt76: use a separate CCMP PN receive counter for management frames (bsc#1209980).
- mt76: use le32/16_get_bits() whenever possible (bsc#1209980).
- mt76x02: improve mac error check/reset reliability (bsc#1209980).
- mtd: core: fix error path for nvmem provider (git-fixes).
- mtd: core: fix nvmem error reporting (git-fixes).
- mtd: core: provide unique name for nvmem device, take two (git-fixes).
- mtd: dataflash: remove duplicate SPI ID table (git-fixes).
- mtd: rawnand: fsl_elbc: Propagate HW ECC settings to HW (git-fixes).
- mtd: rawnand: ingenic: fix empty stub helper definitions (git-fixes).
- mtd: rawnand: marvell: do not set the NAND frequency select (git-fixes).
- mtd: rawnand: marvell: ensure timing values are written (git-fixes).
- mtd: rawnand: meson: fix bitmask for length in command word (git-fixes).
- mtd: rawnand: meson: invalidate cache on polling ECC bit (git-fixes).
- mtd: rawnand: stm32_fmc2: remove unsupported EDO mode (git-fixes).
- mtd: rawnand: stm32_fmc2: use timings.mode instead of checking tRC_min (git-fixes).
- mtd: rawnand: sunxi: Clean up chips after failed init (git-fixes).
- mtd: rawnand: sunxi: Fix the size of the last OOB region (git-fixes).
- mtd: spi-nor: Fix a trivial typo (git-fixes).
- mtd: spi-nor: Fix shift-out-of-bounds in spi_nor_set_erase_type (git-fixes).
- mtd: spi-nor: core: fix implicit declaration warning (git-fixes).
- mtd: spi-nor: sfdp: Fix index value for SCCR dwords (git-fixes).
- mtd: spi-nor: spansion: Consider reserved bits in CFR5 register (git-fixes).
- mtdblock: tolerate corrected bit-flips (git-fixes).
- nbd: Fix hung on disconnect request if socket is closed before (git-fixes).
- nbd: Fix hung when signal interrupts nbd_start_device_ioctl() (git-fixes).
- nbd: Fix hungtask when nbd_config_put (git-fixes).
- nbd: add missing definition of pr_fmt (git-fixes).
- nbd: call genl_unregister_family() first in nbd_cleanup() (git-fixes).
- nbd: fix io hung while disconnecting device (git-fixes).
- nbd: fix race between nbd_alloc_config() and module removal (git-fixes).
- net/iucv: Fix size of interrupt data (bsc#1211465 git-fixes).
- net/mlx5: Dynamically resize flow counters query buffer (bsc#1195175).
- net/rose: Fix to not accept on connected socket (git-fixes).
- net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change (git-fixes).
- net/tg3: resolve deadlock in tg3_reset_task() during EEH (bsc#1207842).
- net/usb: kalmia: Do not pass act_len in usb_bulk_msg error path (git-fixes).
- net/x25: Fix to not accept on connected socket (git-fixes).
- net: USB: Fix wrong-direction WARNING in plusb.c (git-fixes).
- net: accept UFOv6 packages in virtio_net_hdr_to_skb (git-fixes).
- net: add missing include in include/net/gro.h (git-fixes).
- net: asix: fix modprobe 'sysfs: cannot create duplicate filename' (git-fixes).
- net: bridge: command/utility delivers no return output(bsc#1208368).
- net: cdc_ncm: Deal with too low values of dwNtbOutMaxSize (git-fixes).
- net: devlink: Fix missing mutex_unlock() call (git-fixes).
- net: linkwatch: be more careful about dev-&gt;linkwatch_dev_tracker (git-fixes).
- net: mana: Add new MANA VF performance counters for easier troubleshooting (bsc#1209982).
- net: mana: Add support for auxiliary device (bsc#1210741 jsc#PED-4022).
- net: mana: Add support for jumbo frame (bsc#1210551).
- net: mana: Assign interrupts to CPUs based on NUMA nodes (bsc#1208153).
- net: mana: Check if netdev/napi_alloc_frag returns single page (bsc#1210551).
- net: mana: Define and process GDMA response code GDMA_STATUS_MORE_ENTRIES (bsc#1210741 jsc#PED-4022).
- net: mana: Define data structures for allocating doorbell page from GDMA (bsc#1210741 jsc#PED-4022).
- net: mana: Define data structures for protection domain and memory registration (bsc#1210741 jsc#PED-4022).
- net: mana: Define max values for SGL entries (bsc#1210741 jsc#PED-4022).
- net: mana: Enable RX path to handle various MTU sizes (bsc#1210551).
- net: mana: Export Work Queue functions for use by RDMA driver (bsc#1210741 jsc#PED-4022).
- net: mana: Fix IRQ name - add PCI and queue number (bsc#1207875).
- net: mana: Fix accessing freed irq affinity_hint (bsc#1208153).
- net: mana: Fix perf regression: remove rx_cqes, tx_cqes counters (git-fixes).
- net: mana: Handle vport sharing between devices (bsc#1210741 jsc#PED-4022).
- net: mana: Move header files to a common location (bsc#1210741 jsc#PED-4022).
- net: mana: Record port number in netdev (bsc#1210741 jsc#PED-4022).
- net: mana: Record the physical address for doorbell page region (bsc#1210741 jsc#PED-4022).
- net: mana: Refactor RX buffer allocation code to prepare for various MTU (bsc#1210551).
- net: mana: Rename mana_refill_rxoob and remove some empty lines (bsc#1210551).
- net: mana: Set the DMA device max segment size (bsc#1210741 jsc#PED-4022).
- net: mana: Use napi_build_skb in RX path (bsc#1210551).
- net: mdio: mvusb: Fix an error handling path in mvusb_mdio_probe() (git-fixes).
- net: mdio: thunder: Add missing fwnode_handle_put() (git-fixes).
- net: mellanox: mlxbf_gige: Fix skb_panic splat under memory pressure (bsc#1211564).
- net: natsemi: fix hw address initialization for jazz and xtensa (git-fixes).
- net: of: fix stub of_net helpers for CONFIG_NET=n (git-fixes).
- net: openvswitch: fix possible memory leak in ovs_meter_cmd_set() (git-fixes).
- net: phy: Ensure state transitions are processed from phy_stop() (git-fixes).
- net: phy: dp83822: Fix null pointer access on DP83825/DP83826 devices (git-fixes).
- net: phy: dp83867: add w/a for packet errors seen with short cables (git-fixes).
- net: phy: dp83869: fix default value for tx-/rx-internal-delay (git-fixes).
- net: phy: meson-gxl: Add generic dummy stubs for MMD register access (git-fixes).
- net: phy: meson-gxl: use MMD access dummy stubs for GXL, internal PHY (git-fixes).
- net: phy: mxl-gpy: add MDINT workaround (git-fixes).
- net: phy: nxp-c45-tja11xx: add remove callback (git-fixes).
- net: phy: nxp-c45-tja11xx: fix MII_BASIC_CONFIG_REV bit (git-fixes).
- net: phy: nxp-c45-tja11xx: fix unsigned long multiplication overflow (git-fixes).
- net: phy: smsc: bail out in lan87xx_read_status if genphy_read_status fails (git-fixes).
- net: qcom/emac: Fix use after free bug in emac_remove due to race condition (git-fixes).
- net: qrtr: correct types of trace event parameters (git-fixes).
- net: skip virtio_net_hdr_set_proto if protocol already set (git-fixes).
- net: tun: avoid disabling NAPI twice (git-fixes).
- net: tun: fix bugs for oversize packet when napi frags enabled (git-fixes).
- net: tun: stop NAPI when detaching queues (git-fixes).
- net: tun: unlink NAPI from device on destruction (git-fixes).
- net: usb: asix: remove redundant assignment to variable reg (git-fixes).
- net: usb: cdc_ether: add support for Thales Cinterion PLS62-W modem (git-fixes).
- net: usb: cdc_ether: add support for Thales Cinterion PLS62-W modem (git-fixes).
- net: usb: cdc_mbim: avoid altsetting toggling for Telit FE990 (git-fixes).
- net: usb: lan78xx: Limit packet length to skb-&gt;len (git-fixes).
- net: usb: qmi_wwan: Set DTR quirk for BroadMobi BM818 (git-fixes).
- net: usb: qmi_wwan: add Telit 0x1080 composition (git-fixes).
- net: usb: smsc75xx: Limit packet length to skb-&gt;len (git-fixes).
- net: usb: smsc75xx: Move packet length check to prevent kernel panic in skb_pull (git-fixes).
- net: usb: smsc95xx: Limit packet length to skb-&gt;len (git-fixes).
- net: usb: use eth_hw_addr_set() (git-fixes).
- net: virtio_net_hdr_to_skb: count transport header in UFO (git-fixes).
- netrom: Fix use-after-free caused by accept on already connected socket (git-fixes).
- netrom: Fix use-after-free of a listening socket (git-fixes).
- nfc: change order inside nfc_se_io error path (git-fixes).
- nfc: fdp: add null check of devm_kmalloc_array in fdp_nci_i2c_read_device_properties (git-fixes).
- nfc: fix memory leak of se_io context in nfc_genl_se_io (git-fixes).
- nfc: pn533: initialize struct pn533_out_arg properly (git-fixes).
- nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition (git-fixes).
- nfp: flower-ct: fix error return code in nfp_fl_ct_add_offload() (git-fixes).
- nfp: flower: fix ingress police using matchall filter (git-fixes).
- nfs4: Fix kmemleak when allocate slot failed (git-fixes).
- nfs4trace: fix state manager flag printing (git-fixes).
- nfs: nfs4clinet: check the return value of kstrdup() (git-fixes).
- nfsd: Fix a memory leak in an error handling path (git-fixes).
- nfsd: call op_release, even when op_func returns an error (git-fixes).
- nfsd: do not call nfsd_file_put from client states seqfile display (git-fixes).
- nfsd: fix handling of readdir in v4root vs. mount upcall timeout (git-fixes).
- nfsd: fix race to check ls_layouts (git-fixes).
- nfsd: shut down the NFSv4 state objects before the filecache (git-fixes).
- nfsd: under NFSv4.1, fix double svc_xprt_put on rpc_create failure (git-fixes).
- nfsd: zero out pointers after putting nfsd_files on COPY setup error (git-fixes).
- nilfs2: do not write dirty data after degenerating to read-only (git-fixes).
- nilfs2: fix general protection fault in nilfs_btree_insert() (git-fixes).
- nilfs2: fix infinite loop in nilfs_mdt_get_block() (git-fixes).
- nilfs2: fix kernel-infoleak in nilfs_ioctl_wrap_copy() (git-fixes).
- nilfs2: fix potential UAF of struct nilfs_sc_info in nilfs_segctor_thread() (git-fixes).
- nilfs2: fix sysfs interface lifetime (git-fixes).
- nilfs2: fix underflow in second superblock position calculations (git-fixes).
- nilfs2: fix use-after-free bug of nilfs_root in nilfs_evict_inode() (git-fixes).
- nilfs2: initialize unused bytes in segment summary blocks (git-fixes).
- null_blk: fix ida error handling in null_add_dev() (git-fixes).
- nvdimm: disable namespace on error (bsc#1166486).
- nvdimm: disable namespace on error (bsc#1166486).
- nvme initialize core quirks before calling nvme_init_subsystem (git-fixes).
- nvme-auth: check chap ctrl_key once constructed (bsc#1202633).
- nvme-auth: check chap ctrl_key once constructed (bsc#1202633).
- nvme-auth: clear sensitive info right after authentication completes (bsc#1202633).
- nvme-auth: clear sensitive info right after authentication completes (bsc#1202633).
- nvme-auth: convert dhchap_auth_list to an array (bsc#1202633).
- nvme-auth: convert dhchap_auth_list to an array (bsc#1202633).
- nvme-auth: do not ignore key generation failures when initializing ctrl keys (bsc#1202633).
- nvme-auth: do not ignore key generation failures when initializing ctrl keys (bsc#1202633).
- nvme-auth: do not keep long lived 4k dhchap buffer (bsc#1202633).
- nvme-auth: do not keep long lived 4k dhchap buffer (bsc#1202633).
- nvme-auth: do not override ctrl keys before validation (bsc#1202633).
- nvme-auth: do not override ctrl keys before validation (bsc#1202633).
- nvme-auth: do not re-authenticate if the controller is not LIVE (bsc#1202633).
- nvme-auth: do not re-authenticate if the controller is not LIVE (bsc#1202633).
- nvme-auth: do not use NVMe status codes (bsc#1202633).
- nvme-auth: do not use NVMe status codes (bsc#1202633).
- nvme-auth: fix an error code in nvme_auth_process_dhchap_challenge() (bsc#1202633).
- nvme-auth: fix an error code in nvme_auth_process_dhchap_challenge() (bsc#1202633).
- nvme-auth: fix smatch warning complaints (bsc#1202633).
- nvme-auth: fix smatch warning complaints (bsc#1202633).
- nvme-auth: guarantee dhchap buffers under memory pressure (bsc#1202633).
- nvme-auth: guarantee dhchap buffers under memory pressure (bsc#1202633).
- nvme-auth: have dhchap_auth_work wait for queues auth to complete (bsc#1202633).
- nvme-auth: have dhchap_auth_work wait for queues auth to complete (bsc#1202633).
- nvme-auth: mark nvme_auth_wq static (bsc#1202633).
- nvme-auth: mark nvme_auth_wq static (bsc#1202633).
- nvme-auth: no need to reset chap contexts on re-authentication (bsc#1202633).
- nvme-auth: no need to reset chap contexts on re-authentication (bsc#1202633).
- nvme-auth: remove redundant auth_work flush (bsc#1202633).
- nvme-auth: remove redundant auth_work flush (bsc#1202633).
- nvme-auth: remove redundant buffer deallocations (bsc#1202633).
- nvme-auth: remove redundant buffer deallocations (bsc#1202633).
- nvme-auth: remove redundant deallocations (bsc#1202633).
- nvme-auth: remove redundant deallocations (bsc#1202633).
- nvme-auth: remove redundant if statement (bsc#1202633).
- nvme-auth: remove redundant if statement (bsc#1202633).
- nvme-auth: remove symbol export from nvme_auth_reset (bsc#1202633).
- nvme-auth: remove symbol export from nvme_auth_reset (bsc#1202633).
- nvme-auth: rename __nvme_auth_[reset|free] to nvme_auth[reset|free]_dhchap (bsc#1202633).
- nvme-auth: rename __nvme_auth_[reset|free] to nvme_auth[reset|free]_dhchap (bsc#1202633).
- nvme-auth: rename authentication work elements (bsc#1202633).
- nvme-auth: rename authentication work elements (bsc#1202633).
- nvme-auth: uninitialized variable in nvme_auth_transform_key() (git-fixes).
- nvme-auth: use workqueue dedicated to authentication (bsc#1202633).
- nvme-auth: use workqueue dedicated to authentication (bsc#1202633).
- nvme-fabrics: show well known discovery name (bsc#1200054).
- nvme-fabrics: show well known discovery name (bsc#1200054).
- nvme-fc: fix a missing queue put in nvmet_fc_ls_create_association (git-fixes).
- nvme-fcloop: fix 'inconsistent {IN-HARDIRQ-W} -&gt; {HARDIRQ-ON-W} usage' (git-fixes).
- nvme-hwmon: consistently ignore errors from nvme_hwmon_init (git-fixes).
- nvme-hwmon: kmalloc the NVME SMART log buffer (git-fixes).
- nvme-multipath: fix hang when disk goes live over reconnect (git-fixes).
- nvme-multipath: fix possible hang in live ns resize with ANA access (git-fixes).
- nvme-pci: add bogus ID quirk for ADATA SX6000PNP (bsc#1207827).
- nvme-pci: add quirks for Samsung X5 SSDs (git-fixes).
- nvme-pci: add the IGNORE_DEV_SUBNQN quirk for Intel P4500/P4600 SSDs (git-fixes).
- nvme-pci: avoid the deepest sleep state on ZHITAI TiPro5000 SSDs (git-fixes).
- nvme-pci: avoid the deepest sleep state on ZHITAI TiPro7000 SSDs (git-fixes).
- nvme-pci: clear the prp2 field when not used (git-fixes).
- nvme-pci: disable write zeroes on various Kingston SSD (git-fixes).
- nvme-pci: fix a NULL pointer dereference in nvme_alloc_admin_tags (git-fixes).
- nvme-pci: fix doorbell buffer value endianness (git-fixes).
- nvme-pci: fix mempool alloc size (git-fixes).
- nvme-pci: fix page size checks (git-fixes).
- nvme-pci: fix timeout request state check (git-fixes).
- nvme-pci: mark Lexar NM760 as IGNORE_DEV_SUBNQN (git-fixes).
- nvme-pci: set min_align_mask before calculating max_hw_sectors (git-fixes).
- nvme-rdma: fix possible hang caused during ctrl deletion (git-fixes).
- nvme-tcp: always fail a request when sending it failed (bsc#1208902).
- nvme-tcp: fix a possible UAF when failing to allocate an io queue (git-fixes).
- nvme-tcp: fix bogus request completion when failing to send AER (git-fixes).
- nvme-tcp: fix possible circular locking when deleting a controller under memory pressure (git-fixes).
- nvme-tcp: fix possible hang caused during ctrl deletion (git-fixes).
- nvme-tcp: fix regression that causes sporadic requests to time out (git-fixes).
- nvme-tcp: lockdep: annotate in-kernel sockets (git-fixes).
- nvme: Fix IOC_PR_CLEAR and IOC_PR_RELEASE ioctls for nvme devices (git-fixes).
- nvme: add a bogus subsystem NQN quirk for Micron MTFDKBA2T0TFH (git-fixes).
- nvme: add device name to warning in uuid_show() (git-fixes).
- nvme: also return I/O command effects from nvme_command_effects (git-fixes).
- nvme: bring back auto-removal of deleted namespaces during sequential scan (git-fixes).
- nvme: catch -ENODEV from nvme_revalidate_zones again (git-fixes).
- nvme: check for duplicate identifiers earlier (git-fixes).
- nvme: cleanup __nvme_check_ids (git-fixes).
- nvme: copy firmware_rev on each init (git-fixes).
- nvme: copy firmware_rev on each init (git-fixes).
- nvme: define compat_ioctl again to unbreak 32-bit userspace (git-fixes).
- nvme: fix async event trace event (git-fixes).
- nvme: fix discard support without oncs (git-fixes).
- nvme: fix discard support without oncs (git-fixes).
- nvme: fix handling single range discard request (git-fixes).
- nvme: fix interpretation of DMRSL (git-fixes).
- nvme: fix multipath crash caused by flush request when blktrace is enabled (git-fixes).
- nvme: fix passthrough csi check (git-fixes).
- nvme: fix per-namespace chardev deletion (git-fixes).
- nvme: fix the CRIMS and CRWMS definitions to match the spec (git-fixes).
- nvme: fix the NVME_CMD_EFFECTS_CSE_MASK definition (git-fixes).
- nvme: fix the name of Zone Append for verbose logging (git-fixes).
- nvme: fix the read-only state for zoned namespaces with unsupposed features (git-fixes).
- nvme: generalize the nvme_multi_css check in nvme_scan_ns (git-fixes).
- nvme: improve the NVME_CONNECT_AUTHREQ* definitions (git-fixes).
- nvme: move nvme_multi_css into nvme.h (git-fixes).
- nvme: move the Samsung X5 quirk entry to the core quirks (git-fixes).
- nvme: rename nvme_validate_or_alloc_ns to nvme_scan_ns (git-fixes).
- nvme: return err on nvme_init_non_mdts_limits fail (git-fixes).
- nvme: send Identify with CNS 06h only to I/O controllers (bsc#1209693).
- nvme: send Identify with CNS 06h only to I/O controllers (bsc#1209693).
- nvme: set dma alignment to dword (git-fixes).
- nvme: set non-mdts limits in nvme_scan_work (git-fixes).
- nvme: use command_id instead of req-&gt;tag in trace_nvme_complete_rq() (git-fixes).
- nvmet-auth: do not try to cancel a non-initialized work_struct (git-fixes).
- nvmet-tcp: add bounds check on Transfer Tag (git-fixes).
- nvmet-tcp: fix incomplete data digest send (git-fixes).
- nvmet-tcp: fix lockdep complaint on nvmet_tcp_wq flush during queue teardown (git-fixes).
- nvmet-tcp: fix regression in data_digest calculation (git-fixes).
- nvmet-tcp: fix unhandled tcp states in nvmet_tcp_state_change() (git-fixes).
- nvmet: add helpers to set the result field for connect commands (git-fixes).
- nvmet: avoid potential UAF in nvmet_req_complete() (git-fixes).
- nvmet: do not defer passthrough commands with trivial effects to the workqueue (git-fixes).
- nvmet: fix I/O Command Set specific Identify Controller (git-fixes).
- nvmet: fix Identify Active Namespace ID list handling (git-fixes).
- nvmet: fix Identify Controller handling (git-fixes).
- nvmet: fix Identify Namespace handling (git-fixes).
- nvmet: fix a memory leak (git-fixes).
- nvmet: fix a memory leak in nvmet_auth_set_key (git-fixes).
- nvmet: fix a use-after-free (git-fixes).
- nvmet: fix invalid memory reference in nvmet_subsys_attr_qid_max_show (git-fixes).
- nvmet: fix mar and mor off-by-one errors (git-fixes).
- nvmet: fix memory leak in nvmet_subsys_attr_model_store_locked (git-fixes).
- nvmet: fix workqueue MEM_RECLAIM flushing dependency (git-fixes).
- nvmet: fix workqueue MEM_RECLAIM flushing dependency (git-fixes).
- nvmet: force reconnect when number of queue changes (git-fixes).
- nvmet: looks at the passthrough controller when initializing CAP (git-fixes).
- nvmet: move the call to nvmet_ns_changed out of nvmet_ns_revalidate (git-fixes).
- nvmet: only allocate a single slab for bvecs (git-fixes).
- nvmet: use IOCB_NOWAIT only if the filesystem supports it (git-fixes).
- nvmet: use NVME_CMD_EFFECTS_CSUPP instead of open coding it (git-fixes).
- objtool: Add a missing comma to avoid string concatenation (bsc#1207328).
- ocfs2: Fix data corruption after failed write (bsc#1208542).
- ocfs2: clear dinode links count in case of error (bsc#1207650).
- ocfs2: fix BUG when iput after ocfs2_mknod fails (bsc#1207649).
- ocfs2: fix crash when mount with quota enabled (bsc#1207640).
- ocfs2: fix defrag path triggering jbd2 ASSERT (bsc#1199304).
- ocfs2: fix memory leak in ocfs2_mount_volume() (bsc#1207652).
- ocfs2: fix memory leak in ocfs2_stack_glue_init() (bsc#1207651).
- ocfs2: fix non-auto defrag path not working issue (bsc#1199304).
- ocfs2: ocfs2_mount_volume does cleanup job before return error (bsc#1207770).
- ocfs2: quota_local: fix possible uninitialized-variable access in ocfs2_local_read_info() (bsc#1207768).
- ocfs2: rewrite error handling of ocfs2_fill_super (bsc#1207771).
- octeon: constify netdev-&gt;dev_addr (git-fixes).
- of/address: Return an error when no valid dma-ranges are found (git-fixes).
- pNFS/filelayout: Fix coalescing test for single DS (git-fixes).
- panic: Consolidate open-coded panic_on_warn checks (bsc#1207328).
- panic: Introduce warn_limit (bsc#1207328).
- panic: unset panic_on_warn inside panic() (bsc#1207328).
- perf/amd/ibs: Use interrupt regs ip for stack unwinding (git fixes).
- perf/core: Call LSM hook after copying perf_event_attr (git fixes).
- perf/core: Fix data race between perf_event_set_output() and perf_mmap_close() (git fixes).
- perf/core: Fix perf_output_begin parameter is incorrectly invoked in perf_event_bpf_output (git fixes).
- perf/core: Fix the same task check in perf_event_set_output (git fixes).
- perf/core: Inherit event_caps (git fixes).
- perf/x86/amd: fix potential integer overflow on shift of a int (git fixes).
- perf/x86/intel/ds: Fix precise store latency handling (git fixes).
- perf/x86/intel/lbr: Use setup_clear_cpu_cap() instead of clear_cpu_cap() (git fixes).
- perf/x86/intel/pt: Fix sampling using single range output (git fixes).
- perf/x86/intel/pt: Relax address filter validation (git fixes).
- perf/x86/intel/uncore: Add Emerald Rapids (git fixes).
- perf/x86/intel/uncore: Clear attr_update properly (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Disable I/O stacks to PMU mapping on ICX-D (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Enable UPI topology discovery for Icelake Server (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Enable UPI topology discovery for Sapphire Rapids (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Enable UPI topology discovery for Skylake Server (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Fix broken read_counter() for SNB IMC PMU (git fixes).
- perf/x86/intel/uncore: Fix reference count leak in __uncore_imc_init_box() (git fixes).
- perf/x86/intel/uncore: Fix reference count leak in hswep_has_limit_sbox() (git fixes).
- perf/x86/intel/uncore: Fix reference count leak in sad_cfg_iio_topology() (git fixes).
- perf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map() (git fixes).
- perf/x86/intel/uncore: Generalize IIO topology support (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Generalize get_topology() for SKX PMUs (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Get UPI NodeID and GroupID (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Introduce UPI topology type (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Make set_mapping() procedure void (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Update sysfs-devices-mapping file (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel: Add Cooper Lake stepping to isolation_ucodes (git fixes).
- perf/x86/intel: Add Emerald Rapids (git fixes).
- perf/x86/intel: Do not extend the pseudo-encoding to GP counters (git fixes).
- perf/x86/intel: Fix PEBS data source encoding for ADL (git fixes).
- perf/x86/intel: Fix PEBS memory access info encoding for ADL (git fixes).
- perf/x86/intel: Fix event constraints for ICL (git fixes).
- perf/x86/intel: Fix pebs event constraints for ADL (git fixes).
- perf/x86/intel: Fix pebs event constraints for ICL (git fixes).
- perf/x86/intel: Fix pebs event constraints for SPR (git fixes).
- perf/x86/lbr: Enable the branch type for the Arch LBR by default (git fixes).
- perf/x86/msr: Add Emerald Rapids (git fixes).
- perf/x86/rapl: Add support for Intel AlderLake-N (git fixes).
- perf/x86/rapl: Add support for Intel Emerald Rapids (PED-4394).
- perf/x86/rapl: Treat Tigerlake like Icelake (git fixes).
- perf/x86/rapl: Use standard Energy Unit for SPR Dram RAPL domain (git fixes).
- perf/x86/rapl: fix AMD event handling (git fixes).
- perf/x86/uncore: Add Raptor Lake uncore support (git fixes).
- perf/x86/uncore: Add a quirk for UPI on SPR (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/uncore: Add new Alder Lake and Raptor Lake support (git fixes).
- perf/x86/uncore: Add new Raptor Lake S support (git fixes).
- perf/x86/uncore: Clean up uncore_pci_ids (git fixes).
- perf/x86/uncore: Do not WARN_ON_ONCE() for a broken discovery table (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/uncore: Factor out uncore_device_to_die() (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/uncore: Fix potential NULL pointer in uncore_get_alias_name (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/uncore: Ignore broken units in discovery table (bsc#1206824, bsc#1206493, bsc#1206492).
- perf: Always wake the parent event (git fixes).
- perf: Fix check before add_event_to_groups() in perf_group_detach() (git fixes).
- perf: Fix possible memleak in pmu_dev_alloc() (git fixes).
- perf: fix perf_event_context-&gt;time (git fixes).
- phy: rockchip-typec: Fix unsigned comparison with less than zero (git-fixes).
- phy: rockchip-typec: fix tcphy_get_mode error case (git-fixes).
- phy: st: miphy28lp: use _poll_timeout functions for waits (git-fixes).
- phy: tegra: xusb: Add missing tegra_xusb_port_unregister for usb2_port and ulpi_port (git-fixes).
- pinctrl: amd: Disable and mask interrupts on resume (git-fixes).
- pinctrl: aspeed: Fix confusing types in return value (git-fixes).
- pinctrl: at91-pio4: fix domain name assignment (git-fixes).
- pinctrl: at91: use devm_kasprintf() to avoid potential leaks (git-fixes).
- pinctrl: intel: Restore the pins that used to be in Direct IRQ mode (git-fixes).
- pinctrl: mediatek: Fix the drive register definition of some Pins (git-fixes).
- pinctrl: mediatek: Initialize variable *buf to zero (git-fixes).
- pinctrl: mediatek: fix coding style (git-fixes).
- pinctrl: meson-axg: add missing GPIOA_18 gpio group (git-fixes).
- pinctrl: ocelot: Fix alt mode for ocelot (git-fixes).
- pinctrl: qcom: lpass-lpi: set output value before enabling output (git-fixes).
- pinctrl: qcom: pinctrl-msm8976: Correct function names for wcss pins (git-fixes).
- pinctrl: renesas: r8a779a0: Remove incorrect AVB[01] pinmux configuration (git-fixes).
- pinctrl: rockchip: Fix refcount leak in rockchip_pinctrl_parse_groups (git-fixes).
- pinctrl: single: fix potential NULL dereference (git-fixes).
- pinctrl: stm32: Fix refcount leak in stm32_pctrl_get_irq_domain (git-fixes).
- platform/chrome: cros_ec_chardev: fix kernel data leak from ioctl (git-fixes).
- platform/surface: aggregator: Allow completion work-items to be executed in parallel (git-fixes).
- platform/x86 (gigabyte-wmi): Add support for A320M-S2H V2 (git-fixes).
- platform/x86/amd/pmc: Add new acpi id for PMC controller (bsc#1210644).
- platform/x86/amd/pmc: Add new acpi id for PMC controller (bsc#1210644).
- platform/x86/amd/pmc: Add new platform support (bsc#1210644).
- platform/x86/amd/pmc: Add new platform support (bsc#1210644).
- platform/x86/amd: Fix refcount leak in amd_pmc_probe (bsc#1210644).
- platform/x86/amd: pmc: Add a module parameter to disable workarounds (bsc#1210644).
- platform/x86/amd: pmc: Add a workaround for an s0i3 issue on Cezanne (bsc#1210644).
- platform/x86/amd: pmc: Add defines for STB events (bsc#1210644).
- platform/x86/amd: pmc: Add line break for readability (bsc#1210644).
- platform/x86/amd: pmc: Add new ACPI ID AMDI0009 (bsc#1210644).
- platform/x86/amd: pmc: Add num_samples message id support to STB (bsc#1210644).
- platform/x86/amd: pmc: Add sysfs files for SMU (bsc#1210644).
- platform/x86/amd: pmc: Always write to the STB (bsc#1210644).
- platform/x86/amd: pmc: Disable IRQ1 wakeup for RN/CZN (bsc#1210644).
- platform/x86/amd: pmc: Do not dump data after resume from s0i3 on picasso (git-fixes).
- platform/x86/amd: pmc: Do not try to read SMU version on Picasso (git-fixes).
- platform/x86/amd: pmc: Fix build without debugfs (bsc#1210644).
- platform/x86/amd: pmc: Fix memory leak in amd_pmc_stb_debugfs_open_v2() (bsc#1210644).
- platform/x86/amd: pmc: Hide SMU version and program attributes for Picasso (git-fixes).
- platform/x86/amd: pmc: Move idlemask check into `amd_pmc_idlemask_read` (git-fixes).
- platform/x86/amd: pmc: Move out of BIOS SMN pair for STB init (git-fixes).
- platform/x86/amd: pmc: Read SMU version during suspend on Cezanne systems (bsc#1210644).
- platform/x86/amd: pmc: Remove more CONFIG_DEBUG_FS checks (bsc#1210644).
- platform/x86/amd: pmc: Utilize SMN index 0 for driver probe (git-fixes).
- platform/x86/amd: pmc: Write dummy postcode into the STB DRAM (bsc#1210644).
- platform/x86/amd: pmc: add CONFIG_SERIO dependency (git-fixes).
- platform/x86/amd: pmc: differentiate STB/SMU messaging prints (bsc#1210644).
- platform/x86/amd: pmc: remove CONFIG_DEBUG_FS checks (bsc#1210644).
- platform/x86/amd: pmc: remove CONFIG_SUSPEND checks (bsc#1210644).
- platform/x86/intel/pmc: Alder Lake PCH slp_s0_residency fix (git-fixes).
- platform/x86: ISST: PUNIT device mapping with Sub-NUMA clustering (bsc#1208420).
- platform/x86: ISST: Remove 8 socket limit (bsc#1211836).
- platform/x86: Move AMD platform drivers to separate directory (bsc#1210644).
- platform/x86: amd-pmc: Add a message to print resume time info (bsc#1210644).
- platform/x86: amd-pmc: Add special handling for timer based S0i3 wakeup (bsc#1210644).
- platform/x86: amd-pmc: Add support for AMD Smart Trace Buffer (bsc#1210644).
- platform/x86: amd-pmc: Add support for AMD Spill to DRAM STB feature (bsc#1210644).
- platform/x86: amd-pmc: Avoid reading SMU version at probe time (bsc#1210644).
- platform/x86: amd-pmc: Check s0i3 cycle status (bsc#1210644).
- platform/x86: amd-pmc: Correct usage of SMU version (git-fixes).
- platform/x86: amd-pmc: Downgrade dev_info message to dev_dbg (bsc#1210644).
- platform/x86: amd-pmc: Drop CPU QoS workaround (bsc#1210644).
- platform/x86: amd-pmc: Drop check for valid alarm time (bsc#1210644).
- platform/x86: amd-pmc: Export Idlemask values based on the APU (git-fixes).
- platform/x86: amd-pmc: Fix build error unused-function (bsc#1210644).
- platform/x86: amd-pmc: Fix compilation when CONFIG_DEBUGFS is disabled (git-fixes).
- platform/x86: amd-pmc: Fix compilation without CONFIG_SUSPEND (bsc#1210644).
- platform/x86: amd-pmc: Make amd_pmc_stb_debugfs_fops static (bsc#1210644).
- platform/x86: amd-pmc: Move FCH init to first use (bsc#1210644).
- platform/x86: amd-pmc: Move SMU logging setup out of init (bsc#1210644).
- platform/x86: amd-pmc: Move to later in the suspend process (bsc#1210644).
- platform/x86: amd-pmc: Only report STB errors when STB enabled (bsc#1210644).
- platform/x86: amd-pmc: Output error codes in messages (bsc#1210644).
- platform/x86: amd-pmc: Send command to dump data after clearing OS_HINT (bsc#1210644).
- platform/x86: amd-pmc: Set QOS during suspend on CZN w/ timer wakeup (bsc#1210644).
- platform/x86: amd-pmc: Shuffle location of amd_pmc_get_smu_version() (bsc#1210644).
- platform/x86: amd-pmc: Simplify error handling and store the pci_dev in amd_pmc_dev structure (bsc#1210644).
- platform/x86: amd-pmc: Validate entry into the deepest state on resume (bsc#1210644).
- platform/x86: amd-pmc: adjust arguments for `amd_pmc_send_cmd` (bsc#1210644).
- platform/x86: amd-pmc: fix compilation without CONFIG_RTC_SYSTOHC_DEVICE (bsc#1210644).
- platform/x86: amd-pmc: uninitialized variable in amd_pmc_s2d_init() (bsc#1210644).
- platform/x86: amd: pmc: Remove __maybe_unused from amd_pmc_suspend_handler() (bsc#1210644).
- platform/x86: amd: pmc: provide user message where s0ix is not supported (bsc#1210644).
- platform/x86: asus-nb-wmi: Add alternate mapping for KEY_SCREENLOCK (git-fixes).
- platform/x86: dell-wmi: Add a keymap for KEY_MUTE in type 0x0010 table (git-fixes).
- platform/x86: gigabyte-wmi: add support for B450M DS3H WIFI-CF (git-fixes).
- platform/x86: gigabyte-wmi: add support for X570S AORUS ELITE (git-fixes).
- platform/x86: hp-wmi: Support touchpad on/off (git-fixes).
- platform/x86: intel-uncore-freq: add Emerald Rapids support (PED-4390).
- platform/x86: intel_scu_pcidrv: Add back PCI ID for Medfield (git-fixes).
- platform/x86: think-lmi: Add possible_values for ThinkStation (git-fixes).
- platform/x86: think-lmi: Certificate authentication support (bsc#1210050).
- platform/x86: think-lmi: Clean up display of current_value on Thinkstation (git-fixes).
- platform/x86: think-lmi: Fix memory leak when showing current settings (git-fixes).
- platform/x86: think-lmi: Fix memory leaks when parsing ThinkStation WMI strings (git-fixes).
- platform/x86: think-lmi: Move kobject_init() call into tlmi_create_auth() (bsc#1210050).
- platform/x86: think-lmi: Opcode support (bsc#1210050).
- platform/x86: think-lmi: Prevent underflow in index_store() (bsc#1210050).
- platform/x86: think-lmi: Simplify tlmi_analyze() error handling a bit (bsc#1210050).
- platform/x86: think-lmi: Use min_t() for comparison and assignment (bsc#1210050).
- platform/x86: think-lmi: add debug_cmd (bsc#1210050).
- platform/x86: think-lmi: add missing type attribute (git-fixes).
- platform/x86: think-lmi: certificate support clean ups (bsc#1210050).
- platform/x86: think-lmi: only display possible_values if available (git-fixes).
- platform/x86: think-lmi: use correct possible_values delimiters (git-fixes).
- platform/x86: thinkpad-acpi: Add support for automatic mode transitions (bsc#1210050).
- platform/x86: thinkpad-acpi: Enable AMT by default on supported systems (bsc#1210050).
- platform/x86: thinkpad-acpi: profile capabilities as integer (bsc#1210050).
- platform/x86: thinkpad_acpi: Accept ibm_init_struct.init() returning -ENODEV (bsc#1210050).
- platform/x86: thinkpad_acpi: Add LED_RETAIN_AT_SHUTDOWN to led_class_devs (bsc#1210050).
- platform/x86: thinkpad_acpi: Add PSC mode support (bsc#1210050).
- platform/x86: thinkpad_acpi: Add a s2idle resume quirk for a number of laptops (bsc#1210050).
- platform/x86: thinkpad_acpi: Add dual fan probe (bsc#1210050).
- platform/x86: thinkpad_acpi: Add dual-fan quirk for T15g (2nd gen) (bsc#1210050).
- platform/x86: thinkpad_acpi: Add hotkey_notify_extended_hotkey() helper (bsc#1210050).
- platform/x86: thinkpad_acpi: Add lid_logo_dot to the list of safe LEDs (bsc#1210050).
- platform/x86: thinkpad_acpi: Add quirk for ThinkPads without a fan (bsc#1210050).
- platform/x86: thinkpad_acpi: Cleanup dytc_profile_available (bsc#1210050).
- platform/x86: thinkpad_acpi: Convert btusb DMI list to quirks (bsc#1210050).
- platform/x86: thinkpad_acpi: Convert platform driver to use dev_groups (bsc#1210050).
- platform/x86: thinkpad_acpi: Correct dual fan probe (bsc#1210050).
- platform/x86: thinkpad_acpi: Do not use test_bit on an integer (bsc#1210050).
- platform/x86: thinkpad_acpi: Enable s2idle quirk for 21A1 machine type (bsc#1210050).
- platform/x86: thinkpad_acpi: Explicitly set to balanced mode on startup (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix a memory leak of EFCH MMIO resource (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix coccinelle warnings (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix compiler warning about uninitialized err variable (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix incorrect use of platform profile on AMD platforms (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix max_brightness of thinklight (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix platform profiles on T490 (git-fixes).
- platform/x86: thinkpad_acpi: Fix profile mode display in AMT mode (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix profile modes on Intel platforms (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix reporting a non present second fan on some models (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix the hwmon sysfs-attr showing up in the wrong place (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix thermal_temp_input_attr sorting (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix thinklight LED brightness returning 255 (bsc#1210050).
- platform/x86: thinkpad_acpi: Get privacy-screen / lcdshadow ACPI handles only once (bsc#1210050).
- platform/x86: thinkpad_acpi: Make *_init() functions return -ENODEV instead of 1 (bsc#1210050).
- platform/x86: thinkpad_acpi: Properly indent code in tpacpi_dytc_profile_init() (bsc#1210050).
- platform/x86: thinkpad_acpi: Register tpacpi_pdriver after subdriver init (bsc#1210050).
- platform/x86: thinkpad_acpi: Remove 'goto err_exit' from hotkey_init() (bsc#1210050).
- platform/x86: thinkpad_acpi: Remove unused sensors_pdev_attrs_registered flag (bsc#1210050).
- platform/x86: thinkpad_acpi: Restore missing hotkey_tablet_mode and hotkey_radio_sw sysfs-attr (bsc#1210050).
- platform/x86: thinkpad_acpi: Simplify dytc_version handling (bsc#1210050).
- platform/x86: thinkpad_acpi: Switch to common use of attributes (bsc#1210050).
- platform/x86: thinkpad_acpi: Use backlight helper (bsc#1210050).
- platform/x86: thinkpad_acpi: clean up dytc profile convert (bsc#1210050).
- platform/x86: thinkpad_acpi: consistently check fan_get_status return (bsc#1210050).
- platform/x86: thinkpad_acpi: do not use PSC mode on Intel platforms (bsc#1210050).
- platform/x86: thinkpad_acpi: tpacpi_attr_group contains driver attributes not device attrs (bsc#1210050).
- platform/x86: thinkpad_acpi: use strstarts() (bsc#1210050).
- platform/x86: touchscreen_dmi: Add Chuwi Vi8 (CWI501) DMI match (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the CSL Panther Tab HD (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Dexp Ursus KX210i (git-fixes).
- platform/x86: touchscreen_dmi: Add upside-down quirk for GDIX1002 ts on the Juno Tablet (git-fixes).
- platform: x86: MLX_PLATFORM: select REGMAP instead of depending on it (git-fixes).
- power: supply: bq24190_charger: using pm_runtime_resume_and_get instead of pm_runtime_get_sync (git-fixes).
- power: supply: bq27xxx: Add cache parameter to bq27xxx_battery_current_and_status() (git-fixes).
- power: supply: bq27xxx: After charger plug in/out wait 0.5s for things to stabilize (git-fixes).
- power: supply: bq27xxx: Ensure power_supply_changed() is called on current sign changes (git-fixes).
- power: supply: bq27xxx: Fix I2C IRQ race on remove (git-fixes).
- power: supply: bq27xxx: Fix bq27xxx_battery_update() race condition (git-fixes).
- power: supply: bq27xxx: Fix poll_interval handling and races on remove (git-fixes).
- power: supply: bq27xxx: Move bq27xxx_battery_update() down (git-fixes).
- power: supply: bq27xxx: expose battery data when CI=1 (git-fixes).
- power: supply: cros_usbpd: reclassify 'default case!' as debug (git-fixes).
- power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition (git-fixes).
- power: supply: generic-adc-battery: fix unit scaling (git-fixes).
- power: supply: leds: Fix blink to LED on transition (git-fixes).
- power: supply: sbs-charger: Fix INHIBITED bit for Status reg (git-fixes).
- powercap: fix possible name leak in powercap_register_zone() (git-fixes).
- powercap: intel_rapl: add support for Emerald Rapids (PED-4398).
- powerpc/64: Always build with 128-bit long double (bsc#1194869).
- powerpc/64e: Fix amdgpu build on Book3E w/o AltiVec (bsc#1194869).
- powerpc/64s/interrupt: Fix interrupt exit race with security mitigation switch (bsc#1194869).
- powerpc/64s/radix: Fix RWX mapping with relocated kernel (bsc#1194869).
- powerpc/64s/radix: Fix crash with unaligned relocated kernel (bsc#1194869).
- powerpc/64s/radix: Fix soft dirty tracking (bsc#1065729).
- powerpc/64s: Fix local irq disable when PMIs are disabled (bsc#1195655 ltc#1195655 git-fixes).
- powerpc/64s: Make POWER10 and later use pause_short in cpu_relax loops (bsc#1209367 ltc#195662).
- powerpc/btext: add missing of_node_put (bsc#1065729).
- powerpc/eeh: Set channel state after notifying the drivers (bsc#1208784 ltc#201612).
- powerpc/hv-gpci: Fix hv_gpci event list (bsc#1207935).
- powerpc/hv-gpci: Fix hv_gpci event list (git fixes).
- powerpc/ioda/iommu/debugfs: Generate unique debugfs entries (bsc#1194869).
- powerpc/iommu: Add missing of_node_put in iommu_init_early_dart (bsc#1194869).
- powerpc/iommu: DMA address offset is incorrectly calculated with 2MB TCEs (jsc#SLE-19556 git-fixes).
- powerpc/iommu: fix memory leak with using debugfs_lookup() (bsc#1194869).
- powerpc/kcsan: Exclude udelay to prevent recursive instrumentation (bsc#1194869).
- powerpc/kexec_file: Count hot-pluggable memory in FDT estimate (bsc#1194869).
- powerpc/kexec_file: Fix division by zero in extra size estimation (bsc#1194869).
- powerpc/kexec_file: fix implicit decl error (bsc#1194869).
- powerpc/mm: Fix false detection of read faults (bsc#1208864).
- powerpc/papr_scm: Update the NUMA distance table for the target node (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).
- powerpc/perf/hv-24x7: add missing RTAS retry status handling (git fixes).
- powerpc/powernv/ioda: Skip unallocated resources when mapping to PE (bsc#1065729).
- powerpc/powernv: fix missing of_node_put in uv_init() (bsc#1194869).
- powerpc/pseries/lpar: add missing RTAS retry status handling (bsc#1109158 ltc#169177 git-fixes).
- powerpc/pseries/lparcfg: add missing RTAS retry status handling (bsc#1065729).
- powerpc/pseries/vas: Ignore VAS update for DLPAR if copy/paste is not enabled (bsc#1210216 ltc#202189).
- powerpc/pseries: Consolidate different NUMA distance update code paths (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).
- powerpc/rtas: ensure 4KB alignment for rtas_data_buf (bsc#1065729).
- powerpc/rtas: use memmove for potentially overlapping buffer copy (bsc#1065729).
- powerpc/vmlinux.lds: Add an explicit symbol for the SRWX boundary (bsc#1194869).
- powerpc/vmlinux.lds: Define RUNTIME_DISCARD_EXIT (bsc#1194869).
- powerpc/vmlinux.lds: Do not discard .comment (bsc#1194869).
- powerpc/vmlinux.lds: Do not discard .rela* for relocatable builds (bsc#1194869).
- powerpc/vmlinux.lds: Ensure STRICT_ALIGN_SIZE is at least page aligned (bsc#1194869).
- powerpc/xmon: Fix -Wswitch-unreachable warning in bpt_cmds (bsc#1194869).
- powerpc: Do not try to copy PPR for task with NULL pt_regs (bsc#1065729).
- powerpc: Redefine HMT_xxx macros as empty on PPC32 (bsc#1209367 ltc#195662).
- powerpc: Remove linker flag from KBUILD_AFLAGS (bsc#1194869).
- powerpc: add ISA v3.0 / v3.1 wait opcode macro (bsc#1209367 ltc#195662).
- powerpc: declare unmodified attribute_group usages const (bsc#1207935).
- powerpc: declare unmodified attribute_group usages const (git-fixes).
- powerpc: move __end_rodata to cover arch read-only sections (bsc#1194869).
- printf: fix errname.c list (git-fixes).
- prlimit: do_prlimit needs to have a speculation check (bsc#1209256).
- pstore: Revert pmsg_lock back to a normal mutex (git-fixes).
- purgatory: fix disabling debug info (git-fixes).
- pwm: cros-ec: Explicitly set .polarity in .get_state() (git-fixes).
- pwm: meson: Fix axg ao mux parents (git-fixes).
- pwm: meson: Fix g12a ao clk81 name (git-fixes).
- pwm: sprd: Explicitly set .polarity in .get_state() (git-fixes).
- pwm: stm32-lp: fix the check on arr and cmp registers update (git-fixes).
- qed/qed_dev: guard against a possible division by zero (jsc#SLE-19001).
- qed/qed_mng_tlv: correctly zero out -&gt;min instead of -&gt;hour (jsc#SLE-19001).
- qed/qed_sriov: guard against NULL derefs from qed_iov_get_vf_info (jsc#SLE-19001).
- qed: allow sleep in qed_mcp_trace_dump() (jsc#SLE-19001).
- qede: avoid uninitialized entries in coal_entry array (bsc#1205846).
- qede: execute xdp_do_flush() before napi_complete_done() (jsc#SLE-19001).
- qede: fix interrupt coalescing configuration (bsc#1205846).
- quota: Check next/prev free block number after reading from quota file (bsc#1206640).
- quota: Prevent memory allocation recursion while holding dq_lock (bsc#1207639).
- r8152: add vendor/device ID pair for Microsoft Devkit (git-fixes).
- r8152: add vendor/device ID pair for Microsoft Devkit (git-fixes).
- r8152: fix flow control issue of RTL8156A (git-fixes).
- r8152: fix the poor throughput for 2.5G devices (git-fixes).
- r8152: move setting r8153b_rx_agg_chg_indicate() (git-fixes).
- r8169: fix RTL8168H and RTL8107E rx crc error (git-fixes).
- r8169: move rtl_wol_enable_rx() and rtl_prepare_power_down() (git-fixes).
- rcu: Fix rcu_torture_read ftrace event (git-fixes).
- rcu: Tighten rcu_advance_cbs_nowake() checks (bsc#1209159).
- ref_tracker: use __GFP_NOFAIL more carefully (git-fixes).
- regmap: Account for register length when chunking (git-fixes).
- regmap: cache: Return error in cache sync operations for REGCACHE_NONE (git-fixes).
- regulator: Flag uncontrollable regulators as always_on (git-fixes).
- regulator: Handle deferred clk (git-fixes).
- regulator: core: Avoid lockdep reports when resolving supplies (git-fixes).
- regulator: core: Consistently set mutex_owner when using ww_mutex_lock_slow() (git-fixes).
- regulator: core: Fix off-on-delay-us for always-on/boot-on regulators (git-fixes).
- regulator: core: Shorten off-on-delay-us for always-on/boot-on by time since booted (git-fixes).
- regulator: core: Use ktime_get_boottime() to determine how long a regulator was off (git-fixes).
- regulator: fan53555: Explicitly include bits header (git-fixes).
- regulator: fan53555: Fix wrong TCS_SLEW_MASK (git-fixes).
- regulator: max77802: Bounds check regulator id against opmode (git-fixes).
- regulator: mt6359: add read check for PMIC MT6359 (git-fixes).
- regulator: pca9450: Fix BUCK2 enable_mask (git-fixes).
- regulator: s5m8767: Bounds check id indexing into arrays (git-fixes).
- regulator: stm32-pwr: fix of_iomap leak (git-fixes).
- reiserfs: Add missing calls to reiserfs_security_free() (git-fixes).
- reiserfs: Add security prefix to xattr name in reiserfs_security_write() (git-fixes).
- remoteproc/mtk_scp: Move clk ops outside send_lock (git-fixes).
- remoteproc: Harden rproc_handle_vdev() against integer overflow (git-fixes).
- remoteproc: imx_rproc: Call of_node_put() on iteration error (git-fixes).
- remoteproc: qcom_q6v5_mss: Use a carveout to authenticate modem headers (git-fixes).
- remoteproc: st: Call of_node_put() on iteration error (git-fixes).
- remoteproc: stm32: Call of_node_put() on iteration error (git-fixes).
- remoteproc: stm32_rproc: Add mutex protection for workqueue (git-fixes).
- remove 'PCI: hv: Use async probing to reduce boot time' (bsc#1207185).
- rethook: Reject getting a rethook if RCU is not watching (git-fixes).
- rethook: fix a potential memleak in rethook_alloc() (git-fixes).
- rethook: use preempt_{disable, enable}_notrace in rethook_trampoline_handler (git-fixes).
- revert 'squashfs: harden sanity check in squashfs_read_xattr_id_table' (git-fixes).
- ring-buffer: Ensure proper resetting of atomic variables in ring_buffer_reset_online_cpus (git-fixes).
- ring-buffer: Fix kernel-doc (git-fixes).
- ring-buffer: Fix race while reader and writer are on the same page (git-fixes).
- ring-buffer: Handle race between rb_move_tail and rb_check_pages (git-fixes).
- ring-buffer: Sync IRQ works before buffer destruction (git-fixes).
- ring-buffer: remove obsolete comment for free_buffer_page() (git-fixes).
- rpm/constraints.in: Increase disk size constraint for riscv64 to 52GB
- rpm/kernel-binary.spec.in: Fix compatibility wth newer rpm
- rpm/kernel-docs.spec.in: pass PYTHON=python3 to fix build error (bsc#1160435)
- rpm/kernel-obs-build.spec.in: Remove SLE11 cruft
- rpm/kernel-source.spec.in: Add patches.drm for moved DRM patches
- rtc: allow rtc_read_alarm without read_alarm callback (git-fixes).
- rtc: meson-vrtc: Use ktime_get_real_ts64() to get the current time (git-fixes).
- rtc: omap: include header for omap_rtc_power_off_program prototype (git-fixes).
- rtc: pm8xxx: fix set-alarm race (git-fixes).
- rtc: sun6i: Always export the internal oscillator (git-fixes).
- rtmutex: Ensure that the top waiter is always woken up (git-fixes).
- s390/ap: fix crash on older machines based on QCI info missing (git-fixes bsc#1210947).
- s390/boot: simplify and fix kernel memory layout setup (bsc#1209600).
- s390/ctcm: Fix return type of ctc{mp,}m_tx() (git-fixes bsc#1211686).
- s390/dasd: Fix potential memleak in dasd_eckd_init() (git-fixes).
- s390/dasd: fix hanging blockdevice after request requeue (git-fixes bsc#1211687).
- s390/dasd: fix no record found for raw_track_access (bsc#1207574).
- s390/extmem: return correct segment type in __segment_load() (bsc#1210450 git-fixes).
- s390/kprobes: fix current_kprobe never cleared after kprobes reenter (git-fixes bsc#1211688).
- s390/kprobes: fix irq mask clobbering on kprobe reenter from post_handler (git-fixes bsc#1211689).
- s390/lcs: Fix return type of lcs_start_xmit() (git-fixes bsc#1211690).
- s390/mem_detect: fix detect_memory() error handling (git-fixes bsc#1211691).
- s390/netiucv: Fix return type of netiucv_tx() (git-fixes bsc#1211692).
- s390/qdio: fix do_sqbs() inline assembly constraint (git-fixes bsc#1211693).
- s390/qeth: fix use-after-free in hsci (bsc#1210449 git-fixes).
- s390/uaccess: add missing earlyclobber annotations to __clear_user() (bsc#1209856 git-fixes).
- s390/vdso: remove -nostdlib compiler flag (git-fixes bsc#1211714).
- s390/vfio-ap: fix memory leak in vfio_ap device driver (git-fixes).
- s390x: Fixed hard lockups while running stress-ng and LPAR hangs (bsc#1195655 ltc#195733).
- sched, cpuset: Fix dl_cpu_busy() panic due to empty (git-fixes)
- sched/core: Avoid obvious double update_rq_clock warning (git-fixes)
- sched/core: Fix arch_scale_freq_tick() on tickless systems (git-fixes)
- sched/core: Introduce sched_asym_cpucap_active() (git-fixes)
- sched/deadline: Merge dl_task_can_attach() and dl_cpu_busy() (git-fixes)
- sched/fair: Fix imbalance overflow (bsc#1155798).
- sched/fair: Limit sched slice duration (bsc#1189999).
- sched/fair: Move calculate of avg_load to a better location (bsc#1155798).
- sched/fair: Sanitize vruntime of entity being migrated (bsc#1203325).
- sched/fair: sanitize vruntime of entity being placed (bsc#1203325).
- sched/numa: Stop an exhastive search if an idle core is found (bsc#1189999).
- sched/psi: Fix use-after-free in ep_remove_wait_queue() (bsc#1209799).
- sched/tracing: Report TASK_RTLOCK_WAIT tasks as (git-fixes)
- sched/uclamp: Make asym_fits_capacity() use util_fits_cpu() (git-fixes)
- sched: Avoid double preemption in __cond_resched_*lock*() (git-fixes)
- sched_getaffinity: do not assume 'cpumask_size()' is fully initialized (bsc#1155798).
- scsi: Revert 'scsi: core: map PQ=1, PDT=other values to SCSI_SCAN_TARGET_PRESENT' (git-fixes).
- scsi: aacraid: Allocate cmd_priv with scsicmd (git-fixes).
- scsi: aic94xx: Add missing check for dma_map_single() (git-fixes).
- scsi: core: Add BLIST_NO_VPD_SIZE for some VDASD (git-fixes bsc#1203039)
- scsi: core: Add BLIST_SKIP_VPD_PAGES for SKhynix H28U74301AMR (git-fixes).
- scsi: core: Fix a procfs host directory removal regression (git-fixes).
- scsi: core: Fix a source code comment (git-fixes).
- scsi: core: Improve scsi_vpd_inquiry() checks (git-fixes).
- scsi: core: Remove the /proc/scsi/${proc_name} directory earlier (git-fixes).
- scsi: hisi_sas: Check devm_add_action() return value (git-fixes).
- scsi: hisi_sas: Handle NCQ error when IPTT is valid (git-fixes).
- scsi: hisi_sas: Revert change to limit max hw sectors for v3 HW (bsc#1210230).
- scsi: hisi_sas: Set a port invalid only if there are no devices attached when refreshing port id (git-fixes).
- scsi: hpsa: Fix allocation size for scsi_host_alloc() (git-fixes).
- scsi: ipr: Work around fortify-string warning (git-fixes).
- scsi: iscsi_tcp: Check that sock is valid before iscsi_set_param() (git-fixes).
- scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress (git-fixes).
- scsi: iscsi_tcp: Fix UAF during logout when accessing the shost ipaddress (git-fixes).
- scsi: kABI workaround for fc_host_fpin_rcv (git-fixes).
- scsi: kABI workaround for fc_host_fpin_rcv (git-fixes).
- scsi: libsas: Add sas_ata_device_link_abort() (git-fixes).
- scsi: libsas: Grab the ATA port lock in sas_ata_device_link_abort() (git-fixes).
- scsi: libsas: Remove useless dev_list delete in sas_ex_discover_end_dev() (git-fixes).
- scsi: lpfc: Add new RCQE status for handling DMA failures (bsc#1211847).
- scsi: lpfc: Avoid usage of list iterator variable after loop (git-fixes).
- scsi: lpfc: Check kzalloc() in lpfc_sli4_cgn_params_read() (git-fixes).
- scsi: lpfc: Copyright updates for 14.2.0.10 patches (bsc#1208607).
- scsi: lpfc: Copyright updates for 14.2.0.10 patches (bsc#1208607).
- scsi: lpfc: Copyright updates for 14.2.0.11 patches (bsc#1210943).
- scsi: lpfc: Copyright updates for 14.2.0.11 patches (bsc#1210943).
- scsi: lpfc: Correct used_rpi count when devloss tmo fires with no recovery (bsc#1210943).
- scsi: lpfc: Correct used_rpi count when devloss tmo fires with no recovery (bsc#1210943).
- scsi: lpfc: Defer issuing new PLOGI if received RSCN before completing REG_LOGIN (bsc#1210943).
- scsi: lpfc: Defer issuing new PLOGI if received RSCN before completing REG_LOGIN (bsc#1210943).
- scsi: lpfc: Drop redundant pci_enable_pcie_error_reporting() (bsc#1210943).
- scsi: lpfc: Drop redundant pci_enable_pcie_error_reporting() (bsc#1210943).
- scsi: lpfc: Exit PRLI completion handling early if ndlp not in PRLI_ISSUE state (bsc#1208607).
- scsi: lpfc: Exit PRLI completion handling early if ndlp not in PRLI_ISSUE state (bsc#1208607).
- scsi: lpfc: Fix double free in lpfc_cmpl_els_logo_acc() caused by lpfc_nlp_not_used() (bsc#1211847).
- scsi: lpfc: Fix double word in comments (bsc#1210943).
- scsi: lpfc: Fix double word in comments (bsc#1210943).
- scsi: lpfc: Fix ioremap issues in lpfc_sli4_pci_mem_setup() (bsc#1210943).
- scsi: lpfc: Fix ioremap issues in lpfc_sli4_pci_mem_setup() (bsc#1210943).
- scsi: lpfc: Fix lockdep warning for rx_monitor lock when unloading driver (bsc#1210943).
- scsi: lpfc: Fix lockdep warning for rx_monitor lock when unloading driver (bsc#1210943).
- scsi: lpfc: Fix space indentation in lpfc_xcvr_data_show() (bsc#1208607).
- scsi: lpfc: Fix space indentation in lpfc_xcvr_data_show() (bsc#1208607).
- scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write (bsc#1208607).
- scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write (bsc#1208607).
- scsi: lpfc: Fix verbose logging for SCSI commands issued to SES devices (bsc#1211847).
- scsi: lpfc: Introduce new attention types for lpfc_sli4_async_fc_evt() handler (bsc#1208607).
- scsi: lpfc: Introduce new attention types for lpfc_sli4_async_fc_evt() handler (bsc#1208607).
- scsi: lpfc: Match lock ordering of lpfc_cmd-&gt;buf_lock and hbalock for abort paths (bsc#1211847).
- scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow (bsc#1210943).
- scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow (bsc#1210943).
- scsi: lpfc: Record LOGO state with discovery engine even if aborted (bsc#1210943).
- scsi: lpfc: Record LOGO state with discovery engine even if aborted (bsc#1210943).
- scsi: lpfc: Reinitialize internal VMID data structures after FLOGI completion (bsc#1208607).
- scsi: lpfc: Reinitialize internal VMID data structures after FLOGI completion (bsc#1208607).
- scsi: lpfc: Remove duplicate ndlp kref decrement in lpfc_cleanup_rpis() (bsc#1208607 bsc#1208534).
- scsi: lpfc: Remove duplicate ndlp kref decrement in lpfc_cleanup_rpis() (bsc#1208607 bsc#1208534).
- scsi: lpfc: Remove redundant clean up code in disable_vport() (bsc#1208607).
- scsi: lpfc: Remove redundant clean up code in disable_vport() (bsc#1208607).
- scsi: lpfc: Reorder freeing of various DMA buffers and their list removal (bsc#1210943).
- scsi: lpfc: Reorder freeing of various DMA buffers and their list removal (bsc#1210943).
- scsi: lpfc: Replace blk_irq_poll intr handler with threaded IRQ (bsc#1211847).
- scsi: lpfc: Replace outdated strncpy() with strscpy() (bsc#1208607).
- scsi: lpfc: Replace outdated strncpy() with strscpy() (bsc#1208607).
- scsi: lpfc: Resolve miscellaneous variable set but not used compiler warnings (bsc#1208607).
- scsi: lpfc: Resolve miscellaneous variable set but not used compiler warnings (bsc#1208607).
- scsi: lpfc: Revise lpfc_error_lost_link() reason code evaluation logic (bsc#1210943).
- scsi: lpfc: Revise lpfc_error_lost_link() reason code evaluation logic (bsc#1210943).
- scsi: lpfc: Set max DMA segment size to HBA supported SGE length (bsc#1208607).
- scsi: lpfc: Set max DMA segment size to HBA supported SGE length (bsc#1208607).
- scsi: lpfc: Silence an incorrect device output (bsc#1210943).
- scsi: lpfc: Silence an incorrect device output (bsc#1210943).
- scsi: lpfc: Skip waiting for register ready bits when in unrecoverable state (bsc#1210943).
- scsi: lpfc: Skip waiting for register ready bits when in unrecoverable state (bsc#1210943).
- scsi: lpfc: Update congestion warning notification period (bsc#1211847).
- scsi: lpfc: Update lpfc version to 14.2.0.10 (bsc#1208607).
- scsi: lpfc: Update lpfc version to 14.2.0.10 (bsc#1208607).
- scsi: lpfc: Update lpfc version to 14.2.0.11 (bsc#1210943).
- scsi: lpfc: Update lpfc version to 14.2.0.11 (bsc#1210943).
- scsi: lpfc: Update lpfc version to 14.2.0.12 (bsc#1211847).
- scsi: megaraid: Fix mega_cmd_done() CMDID_INT_CMDS (git-fixes).
- scsi: megaraid_sas: Fix crash after a double completion (git-fixes).
- scsi: megaraid_sas: Fix fw_crash_buffer_show() (git-fixes).
- scsi: megaraid_sas: Update max supported LD IDs to 240 (git-fixes).
- scsi: megaraid_sas: Update max supported LD IDs to 240 (git-fixes).
- scsi: mpi3mr: Fix issues in mpi3mr_get_all_tgt_info() (git-fixes).
- scsi: mpi3mr: Fix missing mrioc-&gt;evtack_cmds initialization (git-fixes).
- scsi: mpi3mr: Fix throttle_groups memory leak (git-fixes).
- scsi: mpi3mr: Remove unnecessary memcpy() to alltgt_info-&gt;dmi (git-fixes).
- scsi: mpi3mr: Suppress command reply debug prints (bsc#1211820).
- scsi: mpt3sas: Do not print sense pool info twice (git-fixes).
- scsi: mpt3sas: Fix NULL pointer access in mpt3sas_transport_port_add() (git-fixes).
- scsi: mpt3sas: Fix a memory leak (git-fixes).
- scsi: mpt3sas: Remove scsi_dma_map() error messages (git-fixes).
- scsi: qedi: Fix use after free bug in qedi_remove() (git-fixes).
- scsi: qla2xxx: Add option to disable FC2 Target support (bsc#1198438 bsc#1206103).
- scsi: qla2xxx: Add option to disable FC2 Target support (bsc#1198438 bsc#1206103).
- scsi: qla2xxx: Check if port is online before sending ELS (bsc#1208570).
- scsi: qla2xxx: Check if port is online before sending ELS (bsc#1208570).
- scsi: qla2xxx: Drop redundant pci_enable_pcie_error_reporting() (bsc#1211960).
- scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests (bsc#1208570).
- scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests (bsc#1208570).
- scsi: qla2xxx: Fix IOCB resource check warning (bsc#1208570).
- scsi: qla2xxx: Fix IOCB resource check warning (bsc#1208570).
- scsi: qla2xxx: Fix erroneous link down (bsc#1208570).
- scsi: qla2xxx: Fix erroneous link down (bsc#1208570).
- scsi: qla2xxx: Fix exchange oversubscription (bsc#1208570).
- scsi: qla2xxx: Fix exchange oversubscription (bsc#1208570).
- scsi: qla2xxx: Fix exchange oversubscription for management commands (bsc#1208570).
- scsi: qla2xxx: Fix exchange oversubscription for management commands (bsc#1208570).
- scsi: qla2xxx: Fix hang in task management (bsc#1211960).
- scsi: qla2xxx: Fix link failure in NPIV environment (bsc#1208570).
- scsi: qla2xxx: Fix link failure in NPIV environment (bsc#1208570).
- scsi: qla2xxx: Fix mem access after free (bsc#1211960).
- scsi: qla2xxx: Fix memory leak in qla2x00_probe_one() (git-fixes).
- scsi: qla2xxx: Fix printk() format string (bsc#1208570).
- scsi: qla2xxx: Fix printk() format string (bsc#1208570).
- scsi: qla2xxx: Fix stalled login (bsc#1208570).
- scsi: qla2xxx: Fix stalled login (bsc#1208570).
- scsi: qla2xxx: Fix task management cmd fail due to unavailable resource (bsc#1211960).
- scsi: qla2xxx: Fix task management cmd failure (bsc#1211960).
- scsi: qla2xxx: Make qla_trim_buf() and __qla_adjust_buf() static (bsc#1208570).
- scsi: qla2xxx: Make qla_trim_buf() and __qla_adjust_buf() static (bsc#1208570).
- scsi: qla2xxx: Multi-que support for TMF (bsc#1211960).
- scsi: qla2xxx: Perform lockless command completion in abort path (git-fixes).
- scsi: qla2xxx: Refer directly to the qla2xxx_driver_template (bsc#1211960).
- scsi: qla2xxx: Relocate/rename vp map (bsc#1208570).
- scsi: qla2xxx: Relocate/rename vp map (bsc#1208570).
- scsi: qla2xxx: Remove dead code (GNN ID) (bsc#1208570).
- scsi: qla2xxx: Remove dead code (GNN ID) (bsc#1208570).
- scsi: qla2xxx: Remove dead code (GPNID) (bsc#1208570).
- scsi: qla2xxx: Remove dead code (GPNID) (bsc#1208570).
- scsi: qla2xxx: Remove dead code (bsc#1208570).
- scsi: qla2xxx: Remove dead code (bsc#1208570).
- scsi: qla2xxx: Remove default fabric ops callouts (bsc#1211960).
- scsi: qla2xxx: Remove increment of interface err cnt (bsc#1208570).
- scsi: qla2xxx: Remove increment of interface err cnt (bsc#1208570).
- scsi: qla2xxx: Remove the unused variable wwn (bsc#1208570).
- scsi: qla2xxx: Remove the unused variable wwn (bsc#1208570).
- scsi: qla2xxx: Remove unintended flag clearing (bsc#1208570).
- scsi: qla2xxx: Remove unintended flag clearing (bsc#1208570).
- scsi: qla2xxx: Replace all non-returning strlcpy() with strscpy() (bsc#1211960).
- scsi: qla2xxx: Select qpair depending on which CPU post_cmd() gets called (bsc#1208570).
- scsi: qla2xxx: Select qpair depending on which CPU post_cmd() gets called (bsc#1208570).
- scsi: qla2xxx: Simplify if condition evaluation (bsc#1208570).
- scsi: qla2xxx: Simplify if condition evaluation (bsc#1208570).
- scsi: qla2xxx: Synchronize the IOCB count to be in order (bsc#1209292 bsc#1209684 bsc#1209556).
- scsi: qla2xxx: Update version to 10.02.08.100-k (bsc#1208570).
- scsi: qla2xxx: Update version to 10.02.08.100-k (bsc#1208570).
- scsi: qla2xxx: Update version to 10.02.08.200-k (bsc#1208570).
- scsi: qla2xxx: Update version to 10.02.08.200-k (bsc#1208570).
- scsi: qla2xxx: Update version to 10.02.08.300-k (bsc#1211960).
- scsi: qla2xxx: Use a variable for repeated mem_size computation (bsc#1208570).
- scsi: qla2xxx: Use a variable for repeated mem_size computation (bsc#1208570).
- scsi: qla2xxx: Wait for io return on terminate rport (bsc#1211960).
- scsi: qla2xxx: edif: Fix clang warning (bsc#1208570).
- scsi: qla2xxx: edif: Fix clang warning (bsc#1208570).
- scsi: qla2xxx: edif: Fix performance dip due to lock contention (bsc#1208570).
- scsi: qla2xxx: edif: Fix performance dip due to lock contention (bsc#1208570).
- scsi: qla2xxx: edif: Fix stall session after app start (bsc#1208570).
- scsi: qla2xxx: edif: Fix stall session after app start (bsc#1208570).
- scsi: qla2xxx: edif: Reduce memory usage during low I/O (bsc#1208570).
- scsi: qla2xxx: edif: Reduce memory usage during low I/O (bsc#1208570).
- scsi: scsi_dh_alua: Fix memleak for 'qdata' in alua_activate() (git-fixes).
- scsi: scsi_ioctl: Validate command size (git-fixes).
- scsi: scsi_transport_fc: Add an additional flag to fc_host_fpin_rcv() (bsc#1210943).
- scsi: scsi_transport_fc: Add an additional flag to fc_host_fpin_rcv() (bsc#1210943).
- scsi: sd: Fix wrong zone_write_granularity value during revalidate (git-fixes).
- scsi: sd: Fix wrong zone_write_granularity value during revalidate (git-fixes).
- scsi: sd: Revert 'Rework asynchronous resume support' (bsc#1209092).
- scsi: ses: Do not attach if enclosure has no components (git-fixes).
- scsi: ses: Fix possible addl_desc_ptr out-of-bounds accesses (git-fixes).
- scsi: ses: Fix possible desc_ptr out-of-bounds accesses (git-fixes).
- scsi: ses: Fix slab-out-of-bounds in ses_enclosure_data_process() (git-fixes).
- scsi: ses: Fix slab-out-of-bounds in ses_intf_remove() (git-fixes).
- scsi: ses: Handle enclosure with just a primary component gracefully (git-fixes).
- scsi: smartpqi: Add controller cache flush during rmmod (bsc#1207315).
- scsi: smartpqi: Add new controller PCI IDs (bsc#1207315).
- scsi: smartpqi: Change sysfs raid_level attribute to N/A for controllers (bsc#1207315).
- scsi: smartpqi: Change version to 2.1.20-035 (bsc#1207315).
- scsi: smartpqi: Convert to host_tagset (bsc#1207315).
- scsi: smartpqi: Correct device removal for multi-actuator devices (bsc#1207315).
- scsi: smartpqi: Correct max LUN number (bsc#1207315).
- scsi: smartpqi: Initialize feature section info (bsc#1207315).
- scsi: smartpqi: Replace one-element array with flexible-array member (bsc#1207315).
- scsi: snic: Fix memory leak with using debugfs_lookup() (git-fixes).
- scsi: storvsc: Correct reporting of Hyper-V I/O size limits (git-fixes).
- scsi: storvsc: Do not pass unused PFNs to Hyper-V host (git-fixes).
- scsi: storvsc: Handle BlockSize change in Hyper-V VHD/VHDX file (git-fixes).
- scsi: tracing: Fix compile error in trace_array calls when TRACING is disabled (git-fixes).
- scsi: ufs: Stop using the clock scaling lock in the error handler (git-fixes).
- scsi: ufs: core: Enable link lost interrupt (git-fixes).
- scsi_disk kABI: add back members (bsc#1209092).
- sctp: fail if no bound addresses can be used for a given scope (bsc#1206677).
- sctp: sctp_sock_filter(): avoid list_entry() on possibly empty list (bsc#1208602, git-fixes).
- sctp: sctp_sock_filter(): avoid list_entry() on possibly empty list (bsc#1208602, git-fixes).
- seccomp: Move copy_seccomp() to no failure path (bsc#1210817).
- sefltests: netdevsim: wait for devlink instance after netns removal (git-fixes).
- selftest/lkdtm: Skip stack-entropy test if lkdtm is not available (git-fixes).
- selftests mount: Fix mount_setattr_test builds failed (git-fixes).
- selftests/ftrace: Add check for ping command for trigger tests (bsc#1204993 ltc#200103).
- selftests/ftrace: Convert tracer tests to use 'requires' to specify program dependency (bsc#1204993 ltc#200103).
- selftests/kselftest/runner/run_one(): allow running non-executable files (git-fixes).
- selftests/powerpc: Account for offline cpus in perf-hwbreak test (bsc#1206232).
- selftests/powerpc: Bump up rlimit for perf-hwbreak test (bsc#1206232).
- selftests/powerpc: Move perror closer to its use (bsc#1206232).
- selftests/resctrl: Allow -&gt;setup() to return errors (git-fixes).
- selftests/resctrl: Check for return value after write_schemata() (git-fixes).
- selftests/resctrl: Extend CPU vendor detection (git-fixes).
- selftests/resctrl: Move -&gt;setup() call outside of test specific branches (git-fixes).
- selftests/resctrl: Return NULL if malloc_and_init_memory() did not alloc mem (git-fixes).
- selftests/sgx: Add 'test_encl.elf' to TEST_FILES (git-fixes).
- selftests/vm: remove ARRAY_SIZE define from individual tests (git-fixes).
- selftests: Provide local define of __cpuid_count() (git-fixes).
- selftests: forwarding: lib: quote the sysctl values (git-fixes).
- selftests: mptcp: connect: skip if MPTCP is not supported (git-fixes).
- selftests: mptcp: pm nl: skip if MPTCP is not supported (git-fixes).
- selftests: mptcp: sockopt: skip if MPTCP is not supported (git-fixes).
- selftests: net: udpgso_bench: Fix racing bug between the rx/tx programs (git-fixes).
- selftests: net: udpgso_bench_rx/tx: Stop when wrong CLI args are provided (git-fixes).
- selftests: net: udpgso_bench_rx: Fix 'used uninitialized' compiler warning (git-fixes).
- selftests: net: udpgso_bench_tx: Cater for pending datagrams zerocopy benchmarking (git-fixes).
- selftests: seg6: disable DAD on IPv6 router cfg for srv6_end_dt4_l3vpn_test (git-fixes).
- selftests: sigaltstack: fix -Wuninitialized (git-fixes).
- selftests: srv6: make srv6_end_dt46_l3vpn_test more robust (git-fixes).
- selftests: xsk: Disable IPv6 on VETH1 (git-fixes).
- selftets: seg6: disable rp_filter by default in srv6_end_dt4_l3vpn_test (git-fixes).
- selinux: do not use make's grouped targets feature yet (git-fixes).
- selinux: ensure av_permissions.h is built when needed (git-fixes).
- selinux: fix Makefile dependencies of flask.h (git-fixes).
- serial: 8250: ASPEED_VUART: select REGMAP instead of depending on it (git-fixes).
- serial: 8250: Add missing wakeup event reporting (git-fixes).
- serial: 8250: Reinit port-&gt;pm on port specific driver unbind (git-fixes).
- serial: 8250: SERIAL_8250_ASPEED_VUART should depend on ARCH_ASPEED (git-fixes).
- serial: 8250_bcm7271: Fix arbitration handling (git-fixes).
- serial: 8250_bcm7271: balance clk_enable calls (git-fixes).
- serial: 8250_bcm7271: fix leak in `brcmuart_probe` (git-fixes).
- serial: 8250_dma: Fix DMA Rx rearm race (git-fixes).
- serial: 8250_em: Fix UART port type (git-fixes).
- serial: 8250_exar: Add support for USR298x PCI Modems (git-fixes).
- serial: 8250_exar: derive nr_ports from PCI ID for Acces I/O cards (git-fixes).
- serial: 8250_fsl: fix handle_irq locking (git-fixes).
- serial: 8250_tegra: Fix an error handling path in tegra_uart_probe() (git-fixes).
- serial: Add support for Advantech PCI-1611U card (git-fixes).
- serial: arc_uart: fix of_iomap leak in `arc_serial_probe` (git-fixes).
- serial: exar: Add support for Sealevel 7xxxC serial cards (git-fixes).
- serial: fsl_lpuart: Fix comment typo (git-fixes).
- serial: fsl_lpuart: fix RS485 RTS polariy inverse issue (git-fixes).
- serial: qcom-geni: fix console shutdown hang (git-fixes).
- serial: qcom-geni: fix enabling deactivated interrupt (git-fixes).
- serial: sc16is7xx: setup GPIO controller later in probe (git-fixes).
- serial: stm32: re-introduce an irq flag condition in usart_receive_chars (git-fixes).
- serial: tegra: Add missing clk_disable_unprepare() in tegra_uart_hw_init() (git-fixes).
- sfc: Change VF mac via PF as first preference if available (git-fixes).
- sfc: Fix module EEPROM reporting for QSFP modules (git-fixes).
- sfc: Fix use-after-free due to selftest_work (git-fixes).
- sfc: correctly advertise tunneled IPv6 segmentation (git-fixes).
- sfc: disable RXFCS and RXALL features by default (git-fixes).
- sfc: disable RXFCS and RXALL features by default (git-fixes).
- sfc: ef10: do not overwrite offload features at NIC reset (git-fixes).
- sfc: fix TX channel offset when using legacy interrupts (git-fixes).
- sfc: fix considering that all channels have TX queues (git-fixes).
- sfc: fix null pointer dereference in efx_hard_start_xmit (git-fixes).
- sfc: fix wrong tx channel offset with efx_separate_tx_channels (git-fixes).
- sfc: include vport_id in filter spec hash and equal() (git-fixes).
- signal handling: do not use BUG_ON() for debugging (bsc#1210439).
- signal/seccomp: Refactor seccomp signal and coredump generation (git-fixes).
- signal/vm86_32: Properly send SIGSEGV when the vm86 state cannot be saved (git-fixes).
- signal/x86: In emulate_vsyscall force a signal instead of calling do_exit (git-fixes).
- signal: Add SA_IMMUTABLE to ensure forced siganls do not get changed (bsc#1210816).
- signal: Do not always set SA_IMMUTABLE for forced signals (bsc#1210816).
- signal: HANDLER_EXIT should clear SIGNAL_UNKILLABLE (bsc#1210816).
- signal: Implement force_fatal_sig (git-fixes).
- smb3: Replace smb2pdu 1-element arrays with flex-arrays (bsc#1193629).
- smb3: display debug information better for encryption (bsc#1193629).
- smb3: fix problem remounting a share after shutdown (bsc#1193629).
- smb3: fix unusable share after force unmount failure (bsc#1193629).
- smb3: improve parallel reads of large files (bsc#1193629).
- smb3: lower default deferred close timeout to address perf regression (bsc#1193629).
- smb3: make query_on_disk_id open context consistent and move to common code (bsc#1193629).
- smb3: move some common open context structs to smbfs_common (bsc#1193629).
- soc/tegra: cbb: Use correct master_id mask for CBB NOC in Tegra194 (git-fixes).
- soc: ti: pm33xx: Fix refcount leak in am33xx_pm_probe (git-fixes).
- soundwire: cadence: Do not overflow the command FIFOs (git-fixes).
- soundwire: qcom: correct setting ignore bit on v1.5.1 (git-fixes).
- soundwire: qcom: gracefully handle too many ports in DT (git-fixes).
- spi: bcm63xx-hsspi: Endianness fix for ARM based SoC (git-fixes).
- spi: cadence-quadspi: fix suspend-resume implementations (git-fixes).
- spi: dw: Fix wrong FIFO level setting for long xfers (git-fixes).
- spi: dw_bt1: fix MUX_MMIO dependencies (git-fixes).
- spi: fsl-spi: Fix CPM/QE mode Litte Endian (git-fixes).
- spi: qup: Do not skip cleanup in remove's error path (git-fixes).
- spi: qup: Request DMA before enabling clocks (git-fixes).
- spi: spi-imx: fix MX51_ECSPI_* macros when cs &gt; 3 (git-fixes).
- spi: spi-imx: using pm_runtime_resume_and_get instead of pm_runtime_get_sync (git-fixes).
- spi: spidev: remove debug messages that access spidev-&gt;spi without locking (git-fixes).
- spi: synquacer: Fix timeout handling in synquacer_spi_transfer_one() (git-fixes).
- spi: tegra210-quad: Fix validate combined sequence (git-fixes).
- squashfs: harden sanity check in squashfs_read_xattr_id_table (git-fixes).
- staging: emxx_udc: Add checks for dma_alloc_coherent() (git-fixes).
- staging: iio: resolver: ads1210: fix config mode (git-fixes).
- staging: mt7621-dts: change palmbus address to lower case (git-fixes).
- staging: mt7621-dts: change some node hex addresses to lower case (git-fixes).
- staging: rtl8192e: Fix W_DISABLE# does not work after stop/start (git-fixes).
- staging: rtl8192e: Remove call_usermodehelper starting RadioPower.sh (git-fixes).
- staging: rtl8192e: Remove function ..dm_check_ac_dc_power calling a script (git-fixes).
- staging: rtl8192e: Replace macro RTL_PCI_DEVICE with PCI_DEVICE (git-fixes).
- stat: fix inconsistency between struct stat and struct compat_stat (git-fixes).
- struct ci_hdrc: hide new member at end (git-fixes).
- struct dwc3: mask new member (git-fixes).
- struct uvc_device move flush_status new member to end (git-fixes).
- sunrpc: Fix potential race conditions in rpc_sysfs_xprt_state_change() (git-fixes).
- sunrpc: only free unix grouplist after RCU settles (git-fixes).
- swim3: add missing major.h include (git-fixes).
- swiotlb: Free tbl memory in swiotlb_exit() (jsc#PED-3259).
- swiotlb: add a SWIOTLB_ANY flag to lift the low memory restriction (PED-3259).
- swiotlb: avoid potential left shift overflow (PED-3259).
- swiotlb: clean up some coding style and minor issues (PED-3259).
- swiotlb: consolidate rounding up default_nslabs (PED-3259).
- swiotlb: do not panic when the swiotlb buffer can't be allocated (PED-3259).
- swiotlb: ensure a segment does not cross the area boundary (PED-3259).
- swiotlb: fail map correctly with failed io_tlb_default_mem (PED-3259).
- swiotlb: fix a typo (PED-3259).
- swiotlb: fix passing local variable to debugfs_create_ulong() (PED-3259).
- swiotlb: fix setting -&gt;force_bounce (PED-3259).
- swiotlb: fix use after free on error handling path (PED-3259).
- swiotlb: make swiotlb_exit a no-op if SWIOTLB_FORCE is set (PED-3259).
- swiotlb: make the swiotlb_init interface more useful (PED-3259).
- swiotlb: merge swiotlb-xen initialization into swiotlb (jsc#PED-3259).
- swiotlb: panic if nslabs is too small (PED-3259).
- swiotlb: pass a gfp_mask argument to swiotlb_init_late (PED-3259).
- swiotlb: provide swiotlb_init variants that remap the buffer (PED-3259).
- swiotlb: relocate PageHighMem test away from rmem_swiotlb_setup (git-fixes).
- swiotlb: remove a useless return in swiotlb_init (PED-3259).
- swiotlb: remove swiotlb_init_with_tbl and swiotlb_init_late_with_tbl (PED-3259).
- swiotlb: remove unused fields in io_tlb_mem (PED-3259).
- swiotlb: rename swiotlb_late_init_with_default_size (PED-3259).
- swiotlb: simplify debugfs setup (jsc#PED-3259).
- swiotlb: simplify swiotlb_max_segment (PED-3259).
- swiotlb: split up the global swiotlb lock (PED-3259).
- swiotlb: use the right nslabs value in swiotlb_init_remap (PED-3259).
- swiotlb: use the right nslabs-derived sizes in swiotlb_init_late (PED-3259).
- sysctl: add a new register_sysctl_init() interface (bsc#1207328).
- test_firmware: fix the memory leak of the allocated firmware buffer (git-fixes).
- thermal/core: Remove duplicate information when an error occurs (git-fixes).
- thermal/drivers/hisi: Drop second sensor hi3660 (git-fixes).
- thermal/drivers/tsens: Add compat string for the qcom,msm8960 (git-fixes).
- thermal/drivers/tsens: Drop msm8976-specific defines (git-fixes).
- thermal/drivers/tsens: Sort out msm8976 vs msm8956 data (git-fixes).
- thermal/drivers/tsens: fix slope values for msm8939 (git-fixes).
- thermal/drivers/tsens: limit num_sensors to 9 for msm8939 (git-fixes).
- thermal: intel: BXT_PMIC: select REGMAP instead of depending on it (git-fixes).
- thermal: intel: Fix unsigned comparison with less than zero (git-fixes).
- thermal: intel: intel_pch: Add support for Wellsburg PCH (git-fixes).
- thermal: intel: powerclamp: Fix cur_state for multi package system (git-fixes).
- thermal: intel: quark_dts: fix error pointer dereference (git-fixes).
- thunderbolt: Add missing UNSET_INBOUND_SBTX for retimer access (git-fixes).
- thunderbolt: Call tb_check_quirks() after initializing adapters (git-fixes).
- thunderbolt: Clear registers properly when auto clear isn't in use (bsc#1210165).
- thunderbolt: Clear registers properly when auto clear isn't in use (bsc#1210165).
- thunderbolt: Disable interrupt auto clear for rings (git-fixes).
- thunderbolt: Mask ring interrupt on Intel hardware as well (bsc#1210165).
- thunderbolt: Rename shadowed variables bit to interrupt_bit and auto_clear_bit (git-fixes).
- thunderbolt: Use const qualifier for `ring_interrupt_index` (git-fixes).
- thunderbolt: Use scale field when allocating USB3 bandwidth (git-fixes).
- timers: Prevent union confusion from unexpected (git-fixes)
- tools/iio/iio_utils:fix memory leak (git-fixes).
- tools/virtio: compile with -pthread (git-fixes).
- tools/virtio: fix the vringh test for virtio ring changes (git-fixes).
- tools/virtio: fix virtio_test execution (git-fixes).
- tools/virtio: initialize spinlocks in vring_test.c (git-fixes).
- tools: fix ARRAY_SIZE defines in tools and selftests hdrs (git-fixes).
- tpm, tpm_tis: Claim locality before writing TPM_INT_ENABLE register (git-fixes).
- tpm, tpm_tis: Disable interrupts if tpm_tis_probe_irq() failed (git-fixes).
- tpm, tpm_tis: Request threaded interrupt handler (git-fixes).
- tpm/eventlog: Do not abort tpm_read_log on faulty ACPI address (git-fixes).
- tpm/tpm_tis: Disable interrupts for more Lenovo devices (git-fixes).
- trace/hwlat: Do not start per-cpu thread if it is already running (git-fixes).
- trace/hwlat: Do not wipe the contents of per-cpu thread data (git-fixes).
- trace/hwlat: make use of the helper function kthread_run_on_cpu() (git-fixes).
- trace/hwlat: make use of the helper function kthread_run_on_cpu() (git-fixes).
- trace_events_hist: add check for return value of 'create_hist_field' (git-fixes).
- tracing/fprobe: Fix to check whether fprobe is registered correctly (git-fixes).
- tracing/hist: Fix issue of losting command info in error_log (git-fixes).
- tracing/hist: Fix out-of-bound write on 'action_data.var_ref_idx' (git-fixes).
- tracing/hist: Fix wrong return value in parse_action_params() (git-fixes).
- tracing/hwlat: Replace sched_setaffinity with set_cpus_allowed_ptr (git-fixes).
- tracing/osnoise: Make osnoise_main to sleep for microseconds (git-fixes).
- tracing/perf: Avoid -Warray-bounds warning for __rel_loc macro (git-fixes).
- tracing/probes: Handle system names with hyphens (git-fixes).
- tracing: Add '__rel_loc' using trace event macros (git-fixes).
- tracing: Add DYNAMIC flag for dynamic events (git-fixes).
- tracing: Add NULL checks for buffer in ring_buffer_free_read_page() (git-fixes).
- tracing: Add trace_array_puts() to write into instance (git-fixes).
- tracing: Add trace_event helper macros __string_len() and __assign_str_len() (git-fixes).
- tracing: Avoid -Warray-bounds warning for __rel_loc macro (git-fixes).
- tracing: Avoid adding tracer option before update_tracer_options (git-fixes).
- tracing: Check field value in hist_field_name() (git-fixes).
- tracing: Do not let histogram values have some modifiers (git-fixes).
- tracing: Do not use out-of-sync va_list in event printing (git-fixes).
- tracing: Ensure trace buffer is at least 4096 bytes large (git-fixes).
- tracing: Fix a kmemleak false positive in tracing_map (git-fixes).
- tracing: Fix complicated dependency of CONFIG_TRACER_MAX_TRACE (git-fixes).
- tracing: Fix infinite loop in tracing_read_pipe on overflowed print_trace_line (git-fixes).
- tracing: Fix issue of missing one synthetic field (git-fixes).
- tracing: Fix mismatched comment in __string_len (git-fixes).
- tracing: Fix permissions for the buffer_percent file (git-fixes).
- tracing: Fix poll() and select() do not work on per_cpu trace_pipe and trace_pipe_raw (git-fixes).
- tracing: Fix possible memory leak in __create_synth_event() error path (git-fixes).
- tracing: Fix race where histograms can be called before the event (git-fixes).
- tracing: Fix sleeping function called from invalid context on RT kernel (git-fixes).
- tracing: Fix tp_printk option related with tp_printk_stop_on_boot (git-fixes).
- tracing: Fix warning on variable 'struct trace_array' (git-fixes).
- tracing: Fix wrong return in kprobe_event_gen_test.c (git-fixes).
- tracing: Free error logs of tracing instances (git-fixes).
- tracing: Have TRACE_DEFINE_ENUM affect trace event types as well (git-fixes).
- tracing: Have syscall trace events use trace_event_buffer_lock_reserve() (git-fixes).
- tracing: Have tracing_snapshot_instance_cond() write errors to the appropriate instance (git-fixes).
- tracing: Have type enum modifications copy the strings (git-fixes).
- tracing: Make splice_read available again (git-fixes).
- tracing: Make sure trace_printk() can output as soon as it can be used (git-fixes).
- tracing: Make tp_printk work on syscall tracepoints (git-fixes).
- tracing: Make tracepoint lockdep check actually test something (git-fixes).
- tracing: Use alignof__(struct {type b;}) instead of offsetof() (git-fixes).
- tracing: incorrect isolate_mote_t cast in mm_vmscan_lru_isolate (git-fixes).
- tty: Prevent writing chars during tcsetattr TCSADRAIN/FLUSH (git-fixes).
- tty: fix out-of-bounds access in tty_driver_lookup_tty() (git-fixes).
- tty: serial: fsl_lpuart: Fix the wrong RXWATER setting for rx dma case (git-fixes).
- tty: serial: fsl_lpuart: adjust buffer length to the intended size (git-fixes).
- tty: serial: fsl_lpuart: avoid checking for transfer complete when UARTCTRL_SBK is asserted in lpuart32_tx_empty (git-fixes).
- tty: serial: fsl_lpuart: clear LPUART Status Register in lpuart32_shutdown() (git-fixes).
- tty: serial: fsl_lpuart: disable Rx/Tx DMA in lpuart32_shutdown() (git-fixes).
- tty: serial: fsl_lpuart: disable the CTS when send break signal (git-fixes).
- tty: serial: fsl_lpuart: skip waiting for transmission complete when UARTCTRL_SBK is asserted (git-fixes).
- tty: serial: fsl_lpuart: use UARTCTRL_TXINV to send break instead of UARTCTRL_SBK (git-fixes).
- tty: serial: imx: Handle RS485 DE signal active high (git-fixes).
- tty: serial: imx: disable Ageing Timer interrupt request irq (git-fixes).
- tty: serial: qcom-geni-serial: stop operations in progress at shutdown (git-fixes).
- tty: serial: sh-sci: Fix Rx on RZ/G2L SCI (git-fixes).
- tty: serial: sh-sci: Fix transmit end interrupt handler (git-fixes).
- tun: annotate access to queue-&gt;trans_start (jsc#PED-370).
- uas: Add US_FL_NO_REPORT_OPCODES for JMicron JMS583Gen 2 (git-fixes).
- ubsan: no need to unset panic_on_warn in ubsan_epilogue() (bsc#1207328).
- udf: Check consistency of Space Bitmap Descriptor (bsc#1210771).
- udf: Fix a slab-out-of-bounds write bug in udf_find_entry() (bsc#1206649).
- udf: Support splicing to file (bsc#1210770).
- update internal module version number for cifs.ko (bsc#1193629).
- usb-storage: fix deadlock when a scsi command timeouts more than once (git-fixes).
- usb: acpi: add helper to check port lpm capability using acpi _DSM (git-fixes).
- usb: cdns3: Fix issue with using incorrect PCI device function (git-fixes).
- usb: cdnsp: Fixes error: uninitialized symbol 'len' (git-fixes).
- usb: cdnsp: Fixes issue with redundant Status Stage (git-fixes).
- usb: cdnsp: changes PCI Device ID to fix conflict with CNDS3 driver (git-fixes).
- usb: chipdea: core: fix return -EINVAL if request role is the same with current role (git-fixes).
- usb: chipidea: core: fix possible concurrent when switch role (git-fixes).
- usb: chipidea: fix missing goto in `ci_hdrc_probe` (git-fixes).
- usb: chipidea: imx: avoid unnecessary probe defer (git-fixes).
- usb: core: add quirk for Alcor Link AK9563 smartcard reader (git-fixes).
- usb: core: hub: disable autosuspend for TI TUSB8041 (git-fixes).
- usb: dwc2: fix a devres leak in hw_enable upon suspend resume (git-fixes).
- usb: dwc3: Align DWC3_EP_* flag macros (git-fixes).
- usb: dwc3: Fix a repeated word checkpatch warning (git-fixes).
- usb: dwc3: Fix a typo in field name (git-fixes).
- usb: dwc3: Fix ep0 handling when getting reset while doing control transfer (git-fixes).
- usb: dwc3: core: Host wake up support from system suspend (git-fixes).
- usb: dwc3: debugfs: Resume dwc3 before accessing registers (git-fixes).
- usb: dwc3: drd: use helper to get role-switch-default-mode (git-fixes).
- usb: dwc3: ep0: Do not prepare beyond Setup stage (git-fixes).
- usb: dwc3: gadget: Add 1ms delay after end transfer command without IOC (git-fixes).
- usb: dwc3: gadget: Change condition for processing suspend event (git-fixes).
- usb: dwc3: gadget: Delay issuing End Transfer (git-fixes).
- usb: dwc3: gadget: Execute gadget stop after halting the controller (git-fixes).
- usb: dwc3: gadget: Improve dwc3_gadget_suspend() and dwc3_gadget_resume() (git-fixes).
- usb: dwc3: gadget: Only End Transfer for ep0 data phase (git-fixes).
- usb: dwc3: gadget: Stall and restart EP0 if host is unresponsive (git-fixes).
- usb: dwc3: pci: add support for the Intel Meteor Lake-M (git-fixes).
- usb: dwc3: pci: add support for the Intel Meteor Lake-S (git-fixes).
- usb: dwc3: qcom: Configure wakeup interrupts during suspend (git-fixes).
- usb: dwc3: qcom: Fix memory leak in dwc3_qcom_interconnect_init (git-fixes).
- usb: dwc3: qcom: Keep power domain on to retain controller status (git-fixes).
- usb: dwc3: qcom: clean up icc init (git-fixes).
- usb: dwc3: qcom: clean up suspend callbacks (git-fixes).
- usb: dwc3: qcom: enable vbus override when in OTG dr-mode (git-fixes).
- usb: dwc3: qcom: fix gadget-only builds (git-fixes).
- usb: dwc3: qcom: fix peripheral and OTG suspend (git-fixes).
- usb: dwc3: qcom: fix wakeup implementation (git-fixes).
- usb: dwc3: qcom: only parse 'maximum-speed' once (git-fixes).
- usb: dwc3: qcom: suppress unused-variable warning (git-fixes).
- usb: dwc3: remove a possible unnecessary 'out of memory' message (git-fixes).
- usb: early: xhci-dbc: Fix a potential out-of-bound memory access (git-fixes).
- usb: gadget: configfs: Restrict symlink creation is UDC already binded (git-fixes).
- usb: gadget: configfs: remove using list iterator after loop body as a ptr (git-fixes).
- usb: gadget: configfs: use to_config_usb_cfg() in os_desc_link() (git-fixes).
- usb: gadget: configfs: use to_usb_function_instance() in cfg (un)link func (git-fixes).
- usb: gadget: f_fs: Add unbind event before functionfs_unbind (git-fixes).
- usb: gadget: f_fs: Fix unbalanced spinlock in __ffs_ep0_queue_wait (git-fixes).
- usb: gadget: f_hid: fix f_hidg lifetime vs cdev (git-fixes).
- usb: gadget: f_hid: fix refcount leak on error path (git-fixes).
- usb: gadget: f_ncm: fix potential NULL ptr deref in ncm_bitrate() (git-fixes).
- usb: gadget: f_uac2: Fix incorrect increment of bNumEndpoints (git-fixes).
- usb: gadget: fusb300_udc: free irq on the error path in fusb300_probe() (git-fixes).
- usb: gadget: tegra-xudc: Fix crash in vbus_draw (git-fixes).
- usb: gadget: u_audio: do not let userspace block driver unbind (git-fixes).
- usb: gadget: u_ether: Fix host MAC address case (git-fixes).
- usb: gadget: u_serial: Add null pointer check in gserial_resume (git-fixes).
- usb: gadget: udc: do not clear gadget driver.bus (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition (git-fixes).
- usb: host: xhci-rcar: remove leftover quirk handling (git-fixes).
- usb: host: xhci: mvebu: Iterate over array indexes instead of using pointer math (git-fixes).
- usb: max-3421: Fix setting of I/O pins (git-fixes).
- usb: mtu3: fix kernel panic at qmu transfer done irq handler (git-fixes).
- usb: musb: Add and use inline function musb_otg_state_string (git-fixes).
- usb: musb: Add and use inline functions musb_{get,set}_state (git-fixes).
- usb: musb: mediatek: do not unregister something that wasn't registered (git-fixes).
- usb: musb: remove schedule work called after flush (git-fixes).
- usb: typec: altmodes/displayport: Fix configure initial pin assignment (git-fixes).
- usb: typec: altmodes/displayport: Fix probe pin assign check (git-fixes).
- usb: typec: altmodes/displayport: fix pin_assignment_show (git-fixes).
- usb: typec: intel_pmc_mux: Do not leak the ACPI device reference count (git-fixes).
- usb: typec: intel_pmc_mux: Use the helper acpi_dev_get_memory_resources() (git-fixes).
- usb: typec: pd: Remove usb_suspend_supported sysfs from sink PDO (git-fixes).
- usb: typec: tcpm: fix create duplicate source-capabilities file (git-fixes).
- usb: typec: tcpm: fix create duplicate source-capabilities file (git-fixes).
- usb: typec: tcpm: fix multiple times discover svids error (git-fixes).
- usb: typec: tcpm: fix warning when handle discover_identity message (git-fixes).
- usb: typec: ucsi: Do not attempt to resume the ports before they exist (git-fixes).
- usb: typec: ucsi: Do not warn on probe deferral (git-fixes).
- usb: ucsi: Fix NULL pointer deref in ucsi_connector_change() (git-fixes).
- usb: ucsi: Fix ucsi-&gt;connector race (git-fixes).
- usb: ucsi_acpi: Increase the command completion timeout (git-fixes).
- usb: usbfs: Enforce page requirements for mmap (git-fixes).
- usb: usbfs: Use consistent mmap functions (git-fixes).
- usb: uvc: Enumerate valid values for color matching (git-fixes).
- usb: xhci: tegra: fix sleep in atomic call (git-fixes).
- usrmerge: Compatibility with earlier rpm (boo#1211796)
- usrmerge: Remove usrmerge compatibility symlink in buildroot (boo#1211796).
- vc_screen: do not clobber return value in vcs_read (git-fixes).
- vc_screen: do not clobber return value in vcs_read (git-fixes).
- vc_screen: modify vcs_size() handling in vcs_read() (git-fixes).
- vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF (git-fixes).
- vc_screen: reload load of struct vc_data pointer in vcs_write() to avoid UAF (git-fixes).
- vdpa/vp_vdpa: fix kfree a wrong pointer in vp_vdpa_remove (git-fixes).
- vdpa: fix use-after-free on vp_vdpa_remove (git-fixes).
- vdpa_sim: not reset state in vdpasim_queue_ready (git-fixes).
- vdpa_sim: set last_used_idx as last_avail_idx in vdpasim_queue_ready (git-fixes).
- vfio/type1: prevent underflow of locked_vm via exec() (git-fixes).
- vfio/type1: restore locked_vm (git-fixes).
- vfio/type1: track locked_vm per dma (git-fixes).
- vfs: Check the truncate maximum size in inode_newsize_ok() (bsc#1207642).
- vfs: make sync_filesystem return errors from -&gt;sync_fs (git-fixes).
- vhost/net: Clear the pending messages when the backend is removed (git-fixes).
- virt/coco/sev-guest: Add throttling awareness (bsc#1209927).
- virt/coco/sev-guest: Carve out the request issuing logic into a helper (bsc#1209927).
- virt/coco/sev-guest: Check SEV_SNP attribute at probe time (bsc#1209927).
- virt/coco/sev-guest: Convert the sw_exit_info_2 checking to a switch-case (bsc#1209927).
- virt/coco/sev-guest: Do some code style cleanups (bsc#1209927).
- virt/coco/sev-guest: Remove the disable_vmpck label in handle_guest_request() (bsc#1209927).
- virt/coco/sev-guest: Simplify extended guest request handling (bsc#1209927).
- virt/sev-guest: Add a MODULE_ALIAS (bsc#1208449).
- virt/sev-guest: Prevent IV reuse in the SNP guest driver (bsc#1208449).
- virt/sev-guest: Remove unnecessary free in init_crypto() (bsc#1208449).
- virt/sev-guest: Return -EIO if certificate buffer is not large enough (bsc#1209927).
- virt: sev-guest: Pass the appropriate argument type to iounmap() (bsc#1208449).
- virt: sevguest: Change driver name to reflect generic SEV support (bsc#1208449).
- virt: sevguest: Rename the sevguest dir and files to sev-guest (bsc#1208449).
- virtio-blk: modify the value type of num in virtio_queue_rq() (git-fixes).
- virtio-net: Keep stop() to follow mirror sequence of open() (git-fixes).
- virtio-net: execute xdp_do_flush() before napi_complete_done() (git-fixes).
- virtio_net: Fix probe failed when modprobe virtio_net (git-fixes).
- virtio_net: bugfix overflow inside xdp_linearize_page() (git-fixes).
- virtio_net: split free_unused_bufs() (git-fixes).
- virtio_net: suppress cpu stall when free_unused_bufs (git-fixes).
- virtio_pci: modify ENOENT to EINVAL (git-fixes).
- virtio_ring: do not update event idx on get_buf (git-fixes).
- vmci_host: fix a race condition in vmci_host_poll() causing GPF (git-fixes).
- vmxnet3: move rss code block under eop descriptor (bsc#1208212).
- vmxnet3: use gro callback when UPT is enabled (bsc#1209739).
- vp_vdpa: fix the crash in hot unplug with vp_vdpa (git-fixes).
- wait: Fix __wait_event_hrtimeout for RT/DL tasks (git-fixes)
- watch_queue: fix IOC_WATCH_QUEUE_SET_SIZE alloc error paths (bsc#1197617).
- watchdog-diag288_wdt-fix-__diag288-inline-assembly.patch
- watchdog/hpwdt: Enable HP_WATCHDOG for ARM64 systems. (jsc#PED-3210) Also enable module in aarch64 default configuration.
- watchdog: Fix kmemleak in watchdog_cdev_register (git-fixes).
- watchdog: allow building BCM7038_WDT for BCM4908 (bsc#1208619).
- watchdog: at91sam9_wdt: use devm_request_irq to avoid missing free_irq() in error path (git-fixes).
- watchdog: diag288_wdt: do not use stack buffers for hardware data (bsc#1207497).
- watchdog: diag288_wdt: fix __diag288() inline assembly (bsc#1207497).
- watchdog: dw_wdt: Fix the error handling path of dw_wdt_drv_probe() (git-fixes).
- watchdog: ixp4xx: Implement restart (bsc#1208619).
- watchdog: ixp4xx: Rewrite driver to use core (bsc#1208619).
- watchdog: ixp4xx_wdt: Fix address space warning (bsc#1208619).
- watchdog: menz069_wdt: fix watchdog initialisation (git-fixes).
- watchdog: orion_wdt: support pretimeout on Armada-XP (bsc#1208619).
- watchdog: pcwd_usb: Fix attempting to access uninitialized memory (git-fixes).
- watchdog: sbsa_wdog: Make sure the timeout programming is within the limits (git-fixes).
- watchdog: sp5100_tco: Immediately trigger upon starting (git-fixes).
- wifi: ath11k: Fix SKB corruption in REO destination ring (git-fixes).
- wifi: ath11k: Fix memory leak in ath11k_peer_rx_frag_setup (git-fixes).
- wifi: ath11k: allow system suspend to survive ath11k (git-fixes).
- wifi: ath11k: fix SAC bug on peer addition with sta band migration (git-fixes).
- wifi: ath11k: fix deinitialization of firmware resources (git-fixes).
- wifi: ath11k: fix writing to unintended memory region (git-fixes).
- wifi: ath11k: reduce the MHI timeout to 20s (bsc#1207948).
- wifi: ath5k: fix an off by one check in ath5k_eeprom_read_freq_list() (git-fixes).
- wifi: ath6kl: minor fix for allocation size (git-fixes).
- wifi: ath6kl: reduce WARN to dev_dbg() in callback (git-fixes).
- wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback() (git-fixes).
- wifi: ath9k: Fix use-after-free in ath9k_hif_usb_disconnect() (git-fixes).
- wifi: ath9k: hif_usb: clean up skbs if ath9k_hif_usb_rx_stream() fails (git-fixes).
- wifi: ath9k: hif_usb: fix memory leak of remain_skbs (git-fixes).
- wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function (git-fixes).
- wifi: ath9k: use proper statements in conditionals (git-fixes).
- wifi: ath: Silence memcpy run-time false positive warning (git-fixes).
- wifi: b43: fix incorrect __packed annotation (git-fixes).
- wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() (git-fixes).
- wifi: brcmfmac: cfg80211: Pass the PMK in binary instead of hex (git-fixes).
- wifi: brcmfmac: ensure CLM version is null-terminated to prevent stack-out-of-bounds (git-fixes).
- wifi: brcmfmac: fix potential memory leak in brcmf_netdev_start_xmit() (git-fixes).
- wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() (git-fixes).
- wifi: brcmfmac: support CQM RSSI notification with older firmware (git-fixes).
- wifi: brcmfmac: unmap dma buffer in brcmf_msgbuf_alloc_pktid() (git-fixes).
- wifi: cfg80211: Fix extended KCK key length check in nl80211_set_rekey_data() (git-fixes).
- wifi: cfg80211: Fix use after free for wext (git-fixes).
- wifi: cfg80211: Partial revert 'wifi: cfg80211: Fix use after free for wext' (git-fixes).
- wifi: cfg80211: fix locking in regulatory disconnect (git-fixes).
- wifi: cfg80211: fix locking in sched scan stop work (git-fixes).
- wifi: ipw2200: fix memory leak in ipw_wdev_init() (git-fixes).
- wifi: ipw2x00: do not call dev_kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: iwl3945: Add missing check for create_singlethread_workqueue (git-fixes).
- wifi: iwl4965: Add missing check for create_singlethread_workqueue() (git-fixes).
- wifi: iwlegacy: common: do not call dev_kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: iwlwifi: debug: fix crash in __iwl_err() (git-fixes).
- wifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace (git-fixes).
- wifi: iwlwifi: fix OEM's name in the ppag approved list (git-fixes).
- wifi: iwlwifi: fix duplicate entry in iwl_dev_info_table (git-fixes).
- wifi: iwlwifi: fw: fix DBGI dump (git-fixes).
- wifi: iwlwifi: fw: fix memory leak in debugfs (git-fixes).
- wifi: iwlwifi: fw: move memset before early return (git-fixes).
- wifi: iwlwifi: make the loop for card preparation effective (git-fixes).
- wifi: iwlwifi: mvm: check firmware response size (git-fixes).
- wifi: iwlwifi: mvm: do not set CHECKSUM_COMPLETE for unsupported protocols (git-fixes).
- wifi: iwlwifi: mvm: do not trust firmware n_channels (git-fixes).
- wifi: iwlwifi: mvm: fix OEM's name in the tas approved list (git-fixes).
- wifi: iwlwifi: mvm: fix cancel_delayed_work_sync() deadlock (git-fixes).
- wifi: iwlwifi: mvm: fix mvmtxq-&gt;stopped handling (git-fixes).
- wifi: iwlwifi: mvm: initialize seq variable (git-fixes).
- wifi: iwlwifi: pcie: Fix integer overflow in iwl_write_to_user_buf (git-fixes).
- wifi: iwlwifi: pcie: fix possible NULL pointer dereference (git-fixes).
- wifi: iwlwifi: trans: do not trigger d3 interrupt twice (git-fixes).
- wifi: iwlwifi: yoyo: Fix possible division by zero (git-fixes).
- wifi: iwlwifi: yoyo: skip dump correctly on hw error (git-fixes).
- wifi: libertas: cmdresp: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: libertas: fix memory leak in lbs_init_adapter() (git-fixes).
- wifi: libertas: if_usb: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: libertas: main: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: libertas_tf: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: mac80211: Set TWT Information Frame Disabled bit as 1 (bsc#1209980).
- wifi: mac80211: adjust scan cancel comment/check (git-fixes).
- wifi: mac80211: fix invalid drv_sta_pre_rcu_remove calls for non-uploaded sta (git-fixes).
- wifi: mac80211: fix min center freq offset tracing (git-fixes).
- wifi: mac80211: fix qos on mesh interfaces (git-fixes).
- wifi: mac80211: make rate u32 in sta_set_rate_info_rx() (git-fixes).
- wifi: mac80211: sdata can be NULL during AMPDU start (git-fixes).
- wifi: mac80211: simplify chanctx allocation (git-fixes).
- wifi: mt7601u: fix an integer underflow (git-fixes).
- wifi: mt76: add flexible polling wait-interval support (git-fixes).
- wifi: mt76: add memory barrier to SDIO queue kick (bsc#1209980).
- wifi: mt76: add missing locking to protect against concurrent rx/status calls (git-fixes).
- wifi: mt76: connac: fix possible unaligned access in mt76_connac_mcu_add_nested_tlv (bsc#1209980).
- wifi: mt76: dma: free rx_head in mt76_dma_rx_cleanup (git-fixes).
- wifi: mt76: do not run mt76_unregister_device() on unregistered hw (bsc#1209980).
- wifi: mt76: fix 6GHz high channel not be scanned (git-fixes).
- wifi: mt76: fix receiving LLC packets on mt7615/mt7915 (bsc#1209980).
- wifi: mt76: handle failure of vzalloc in mt7615_coredump_work (git-fixes).
- wifi: mt76: mt7615: fix possible race in mt7615_mac_sta_poll (git-fixes).
- wifi: mt76: mt7915: add missing of_node_put() (bsc#1209980).
- wifi: mt76: mt7915: call mt7915_mcu_set_thermal_throttling() only after init_work (bsc#1209980).
- wifi: mt76: mt7915: check return value before accessing free_block_num (bsc#1209980).
- wifi: mt76: mt7915: drop always true condition of __mt7915_reg_addr() (bsc#1209980).
- wifi: mt76: mt7915: expose device tree match table (git-fixes).
- wifi: mt76: mt7915: fix mcs value in ht mode (bsc#1209980).
- wifi: mt76: mt7915: fix memory leak in mt7915_mcu_exit (git-fixes).
- wifi: mt76: mt7915: fix mt7915_mac_set_timing() (bsc#1209980).
- wifi: mt76: mt7915: fix possible unaligned access in mt7915_mac_add_twt_setup (bsc#1209980).
- wifi: mt76: mt7915: fix reporting of TX AGGR histogram (git-fixes).
- wifi: mt76: mt7915: fix unintended sign extension of mt7915_hw_queue_read() (bsc#1209980).
- wifi: mt76: mt7921: fix missing unwind goto in `mt7921u_probe` (git-fixes).
- wifi: mt76: mt7921: fix reporting of TX AGGR histogram (git-fixes).
- wifi: mt76: mt7921e: Set memory space enable in PCI_COMMAND if unset (git-fixes).
- wifi: mt76: mt7921e: fix crash in chip reset fail (bsc#1209980).
- wifi: mt76: mt7921e: fix probe timeout after reboot (git-fixes).
- wifi: mt76: mt7921e: fix random fw download fail (git-fixes).
- wifi: mt76: mt7921e: fix random fw download fail (git-fixes).
- wifi: mt76: mt7921e: fix rmmod crash in driver reload test (bsc#1209980).
- wifi: mt76: mt7921e: improve reliability of dma reset (git-fixes).
- wifi: mt76: mt7921e: stop chip reset worker in unregister hook (git-fixes).
- wifi: mt76: mt7921s: fix race issue between reset and suspend/resume (bsc#1209980).
- wifi: mt76: mt7921s: fix slab-out-of-bounds access in sdio host (bsc#1209980).
- wifi: mwifiex: Add missing compatible string for SD8787 (git-fixes).
- wifi: mwifiex: fix loop iterator in mwifiex_update_ampdu_txwinsize() (git-fixes).
- wifi: mwifiex: mark OF related data as maybe unused (git-fixes).
- wifi: orinoco: check return value of hermes_write_wordrec() (git-fixes).
- wifi: rsi: Fix memory leak in rsi_coex_attach() (git-fixes).
- wifi: rt2x00: Fix memory leak when handling surveys (git-fixes).
- wifi: rtl8xxxu: Fix memory leaks with RTL8723BU, RTL8192EU (git-fixes).
- wifi: rtl8xxxu: RTL8192EU always needs full init (git-fixes).
- wifi: rtl8xxxu: Use a longer retry limit of 48 (git-fixes).
- wifi: rtl8xxxu: do not call dev_kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: rtl8xxxu: fix authentication timeout due to incorrect RCR value (git-fixes).
- wifi: rtl8xxxu: fixing transmisison failure for rtl8192eu (git-fixes).
- wifi: rtlwifi: Fix global-out-of-bounds bug in _rtl8812ae_phy_set_txpower_limit() (git-fixes).
- wifi: rtlwifi: fix incorrect error codes in rtl_debugfs_set_write_reg() (git-fixes).
- wifi: rtlwifi: fix incorrect error codes in rtl_debugfs_set_write_rfreg() (git-fixes).
- wifi: rtlwifi: rtl8188ee: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: rtlwifi: rtl8723be: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: rtlwifi: rtl8821ae: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: rtw88: mac: Return the original error from rtw_mac_power_switch() (git-fixes).
- wifi: rtw88: mac: Return the original error from rtw_pwr_seq_parser() (git-fixes).
- wifi: rtw89: Add missing check for alloc_workqueue (git-fixes).
- wifi: rtw89: fix potential race condition between napi_init and napi_enable (git-fixes).
- wifi: wilc1000: fix potential memory leak in wilc_mac_xmit() (git-fixes).
- wifi: wl3501_cs: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wireguard: ratelimiter: use hrtimer in selftest (git-fixes)
- workqueue: Fix hung time report of worker pools (bsc#1211044).
- workqueue: Interrupted create_worker() is not a repeated event (bsc#1211044).
- workqueue: Print backtraces from CPUs with hung CPU bound workqueues (bsc#1211044).
- workqueue: Warn when a new worker could not be created (bsc#1211044).
- workqueue: Warn when a rescuer could not be created (bsc#1211044).
- writeback, cgroup: fix null-ptr-deref write in bdi_split_work_to_wbs (bsc#1210769).
- writeback: avoid use-after-free after removing device (bsc#1207638).
- x86, sched: Fix undefined reference to init_freq_invariance_cppc() build error (git-fixes).
- x86/64/mm: Map all kernel memory into trampoline_pgd (git-fixes).
- x86/ACPI/boot: Use FADT version to check support for online capable (git-fixes).
- x86/MCE/AMD: Clear DFR errors found in THR handler (git-fixes).
- x86/MCE/AMD: Fix memory leak when threshold_create_bank() fails (git-fixes).
- x86/MCE/AMD: Use an u64 for bank_map (git-fixes).
- x86/PAT: Have pat_enabled() properly reflect state when running on Xen (git-fixes).
- x86/PCI: Add quirk for AMD XHCI controller that loses MSI-X state in D3hot (git-fixes).
- x86/acpi/boot: Correct acpi_is_processor_usable() check (git-fixes).
- x86/acpi/boot: Do not register processors that cannot be onlined for x2APIC (git-fixes).
- x86/alternative: Make debug-alternative selective (bsc#1206578).
- x86/alternative: Report missing return thunk details (git-fixes).
- x86/alternative: Support relocations in alternatives (bsc#1206578).
- x86/amd: Use IBPB for firmware calls (git-fixes).
- x86/amd_nb: Add AMD PCI IDs for SMN communication (bsc#1208848).
- x86/asm: Fix an assembler warning with current binutils (git-fixes).
- x86/boot: Avoid using Intel mnemonics in AT&amp;T syntax asm (git-fixes).
- x86/boot: Skip realmode init code when running as Xen PV guest  (git-fixes).
- x86/bug: Merge annotate_reachable() into _BUG_FLAGS() asm (git-fixes).
- x86/bug: Merge annotate_reachable() into _BUG_FLAGS() asm (git-fixes).
- x86/bug: Prevent shadowing in __WARN_FLAGS (git-fixes).
- x86/bugs: Add 'unknown' reporting for MMIO Stale Data (git-fixes).
- x86/bugs: Do not enable IBPB at firmware entry when IBPB is not available (git-fixes).
- x86/bugs: Enable STIBP for IBPB mitigated RETBleed (git-fixes).
- x86/bugs: Warn when 'ibrs' mitigation is selected on Enhanced IBRS parts (git-fixes).
- x86/cpu: Add CPU model numbers for Meteor Lake (git fixes).
- x86/cpu: Add Raptor Lake to Intel family (git fixes).
- x86/cpu: Add new Alderlake and Raptorlake CPU model numbers (git fixes).
- x86/cpu: Add new Raptor Lake CPU model number (git fixes).
- x86/cpu: Add several Intel server CPU model numbers (git fixes).
- x86/cpu: Drop spurious underscore from RAPTOR_LAKE #define (git fixes).
- x86/cpufeatures: Add macros for Intel's new fast rep string features (bsc#1211140).
- x86/cpufeatures: Introduce x2AVIC CPUID bit (bsc#1208619).
- x86/crash: Disable virt in core NMI crash handler to avoid double shootdown (git-fixes).
- x86/delay: Fix the wrong asm constraint in delay_loop() (git-fixes).
- x86/entry: Avoid very early RET (git-fixes).
- x86/entry: Build thunk_$(BITS) only if CONFIG_PREEMPTION=y (git-fixes).
- x86/entry: Do not call error_entry() for XENPV (git-fixes).
- x86/entry: Move CLD to the start of the idtentry macro (git-fixes).
- x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (git-fixes).
- x86/entry: Switch the stack after error_entry() returns (git-fixes).
- x86/fault: Cast an argument to the proper address space in prefetch() (git-fixes).
- x86/fpu/xsave: Handle compacted offsets correctly with supervisor states (git-fixes).
- x86/fpu/xsave: Handle compacted offsets correctly with supervisor states (git-fixes).
- x86/fpu/xsave: Initialize offset/size cache early (bsc#1211205).
- x86/fpu/xstate: Fix the ARCH_REQ_XCOMP_PERM implementation (git-fixes).
- x86/fpu/xstate: Fix the ARCH_REQ_XCOMP_PERM implementation (git-fixes).
- x86/fpu: Cache xfeature flags from CPUID (git-fixes).
- x86/fpu: Fix copy_xstate_to_uabi() to copy init states correctly (git-fixes).
- x86/fpu: Fix the init_fpstate size check with the actual size (git-fixes).
- x86/fpu: Prevent FPU state corruption (git-fixes).
- x86/fpu: Remove unused supervisor only offsets (git-fixes).
- x86/fpu: Remove unused supervisor only offsets (git-fixes).
- x86/fpu: Use _Alignof to avoid undefined behavior in TYPE_ALIGN (git-fixes).
- x86/hyperv: Block root partition functionality in a Confidential VM (git-fixes).
- x86/hyperv: Introduce HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK constants (git-fixes).
- x86/hyperv: Remove unregister syscore call from Hyper-V cleanup (git-fixes).
- x86/hyperv: Restore VP assist page after cpu offlining/onlining (git-fixes).
- x86/kprobes: Fix kprobes instruction boudary check with CONFIG_RETHUNK (git-fixes).
- x86/kprobes: Fix optprobe optimization check with CONFIG_RETHUNK (git-fixes).
- x86/kvm: Do not use pv tlb/ipi/sched_yield if on 1 vCPU (git-fixes).
- x86/kvm: Do not use pv tlb/ipi/sched_yield if on 1 vCPU (git-fixes).
- x86/kvm: Preserve BSP MSR_KVM_POLL_CONTROL across suspend/resume (git-fixes).
- x86/kvm: Remove unused virt to phys translation in kvm_guest_cpu_init() (git-fixes).
- x86/lib/memmove: Decouple ERMS from FSRM (bsc#1206578).
- x86/mce/inject: Avoid out-of-bounds write when setting flags (git-fixes).
- x86/mce/inject: Avoid out-of-bounds write when setting flags (git-fixes).
- x86/mce: Allow instrumentation during task work queueing (git-fixes).
- x86/mce: Allow instrumentation during task work queueing (git-fixes).
- x86/mce: Mark mce_end() noinstr (git-fixes).
- x86/mce: Mark mce_end() noinstr (git-fixes).
- x86/mce: Mark mce_panic() noinstr (git-fixes).
- x86/mce: Mark mce_panic() noinstr (git-fixes).
- x86/mce: Mark mce_read_aux() noinstr (git-fixes).
- x86/mce: Mark mce_read_aux() noinstr (git-fixes).
- x86/mce: relocate set{clear}_mce_nospec() functions (git-fixes). This is a preparation for the next patch
- x86/microcode/AMD: Add a @cpu parameter to the reloading functions (git-fixes).
- x86/microcode/AMD: Fix mixed steppings support (git-fixes).
- x86/microcode/AMD: Track patch allocation size explicitly (git-fixes).
- x86/microcode/intel: Do not retry microcode reloading on the APs (git-fixes).
- x86/microcode: Add a parameter to microcode_check() to store CPU capabilities (git-fixes).
- x86/microcode: Add explicit CPU vendor dependency (git-fixes).
- x86/microcode: Adjust late loading result reporting message (git-fixes).
- x86/microcode: Check CPU capabilities after late microcode update correctly (git-fixes).
- x86/microcode: Rip out the OLD_INTERFACE (git-fixes).
- x86/mm: Cleanup the control_va_addr_alignment() __setup handler (git-fixes).
- x86/mm: Flush global TLB when switching to trampoline page-table (git-fixes).
- x86/mm: Flush global TLB when switching to trampoline page-table (git-fixes).
- x86/mm: Use proper mask when setting PUD mapping (git-fixes).
- x86/msi: Fix msi message data shadow struct (git-fixes).
- x86/msr: Remove .fixup usage (git-fixes).
- x86/nospec: Unwreck the RSB stuffing (git-fixes).
- x86/numa: Use cpumask_available instead of hardcoded NULL check (git-fixes).
- x86/pat: Fix x86_has_pat_wp() (git-fixes).
- x86/pci/xen: Disable PCI/MSI masking for XEN_HVM guests (git-fixes).
- x86/perf/zhaoxin: Add stepping check for ZXC (git fixes).
- x86/perf: Avoid warning for Arch LBR without XSAVE (git fixes).
- x86/perf: Default set FREEZE_ON_SMI for all (git fixes).
- x86/pm: Add enumeration check before spec MSRs save/restore setup (git-fixes).
- x86/reboot: Disable SVM, not just VMX, when stopping CPUs (git-fixes).
- x86/resctrl: Fix min_cbm_bits for AMD (git-fixes).
- x86/sev: Add SEV-SNP guest feature negotiation support (git-fixes).
- x86/sgx: Fix free page accounting (git-fixes).
- x86/sgx: Free backing memory after faulting the enclave page (git-fixes).
- x86/sgx: Free backing memory after faulting the enclave page (git-fixes).
- x86/sgx: Silence softlockup detection when releasing large enclaves (git-fixes).
- x86/sgx: Silence softlockup detection when releasing large enclaves (git-fixes).
- x86/signal: Fix the value returned by strict_sas_size() (git-fixes).
- x86/speculation/mmio: Print SMT warning (git-fixes).
- x86/speculation: Identify processors vulnerable to SMT RSB predictions (git-fixes).
- x86/static_call: Serialize __static_call_fixup() properly (git-fixes).
- x86/syscall: Include asm/ptrace.h in syscall_wrapper header (git-fixes).
- x86/topology: Fix duplicated core ID within a package (git-fixes).
- x86/topology: Fix multiple packages shown on a single-package system (git-fixes).
- x86/traps: Use pt_regs directly in fixup_bad_iret() (git-fixes).
- x86/tsx: Add a feature bit for TSX control MSR support (git-fixes).
- x86/tsx: Disable TSX development mode at boot (git-fixes).
- x86/uaccess: Move variable into switch case statement (git-fixes).
- x86/uaccess: Move variable into switch case statement (git-fixes).
- x86/xen: Fix memory leak in xen_init_lock_cpu() (git-fixes).
- x86/xen: Fix memory leak in xen_smp_intr_init{_pv}() (git-fixes).
- x86: ACPI: cstate: Optimize C3 entry on AMD CPUs (git-fixes).
- x86: Annotate call_on_stack() (git-fixes).
- x86: Annotate call_on_stack() (git-fixes).
- x86: Fix return value of __setup handlers (git-fixes).
- x86: Handle idle=nomwait cmdline properly for x86_idle (bsc#1208619).
- x86: Remove vendor checks from prefer_mwait_c1_over_halt (bsc#1208619).
- x86: __memcpy_flushcache: fix wrong alignment if size &gt; 2^32 (git-fixes).
- x86: centralize setting SWIOTLB_FORCE when guest memory encryption is enabled (jsc#PED-3259).
- x86: do not use REP_GOOD or ERMS for small memory clearing (bsc#1211140).
- x86: drop bogus 'cc' clobber from __try_cmpxchg_user_asm() (git-fixes).
- x86: link vdso and boot with -z noexecstack --no-warn-rwx-segments (bsc#1203200).
- x86: link vdso and boot with -z noexecstack --no-warn-rwx-segments (bsc#1203200).
- x86: remove cruft from &amp;lt;asm/dma-mapping.h&gt; (PED-3259).
- xen-netfront: Fix NULL sring after live migration (git-fixes).
- xen-pciback: Allow setting PCI_MSIX_FLAGS_MASKALL too (git-fixes).
- xen/arm: Fix race in RB-tree based P2M accounting (git-fixes)
- xen/netback: do not do grant copy across page boundary (git-fixes).
- xen/netback: do some code cleanup (git-fixes).
- xen/netback: fix build warning (git-fixes).
- xen/netback: use same error messages for same errors (git-fixes).
- xen/netfront: destroy queues before real_num_tx_queues is zeroed (git-fixes).
- xen/platform-pci: add missing free_irq() in error path (git-fixes).
- xen/privcmd: Fix a possible warning in privcmd_ioctl_mmap_resource() (git-fixes).
- xfs: Fix unreferenced object reported by kmemleak in xfs_sysfs_init() (git-fixes).
- xfs: Fix unreferenced object reported by kmemleak in xfs_sysfs_init() (git-fixes).
- xfs: convert ptag flags to unsigned (git-fixes).
- xfs: do not assert fail on perag references on teardown (git-fixes).
- xfs: do not leak btree cursor when insrec fails after a split (git-fixes).
- xfs: estimate post-merge refcounts correctly (bsc#1208183).
- xfs: fix incorrect error-out in xfs_remove (git-fixes).
- xfs: fix incorrect error-out in xfs_remove (git-fixes).
- xfs: fix incorrect i_nlink caused by inode racing (git-fixes).
- xfs: fix incorrect i_nlink caused by inode racing (git-fixes).
- xfs: fix maxlevels comparisons in the btree staging code (git-fixes).
- xfs: fix maxlevels comparisons in the btree staging code (git-fixes).
- xfs: fix memory leak in xfs_errortag_init (git-fixes).
- xfs: fix memory leak in xfs_errortag_init (git-fixes).
- xfs: fix rm_offset flag handling in rmap keys (git-fixes).
- xfs: get rid of assert from xfs_btree_islastblock (git-fixes).
- xfs: get rid of assert from xfs_btree_islastblock (git-fixes).
- xfs: get root inode correctly at bulkstat (bsc#1207501).
- xfs: get root inode correctly at bulkstat (git-fixes).
- xfs: get root inode correctly at bulkstat (git-fixes).
- xfs: hoist refcount record merge predicates (bsc#1208183).
- xfs: initialize the check_owner object fully (git-fixes).
- xfs: initialize the check_owner object fully (git-fixes).
- xfs: pass the correct cursor to xfs_iomap_prealloc_size (git-fixes).
- xfs: prevent a WARN_ONCE() in xfs_ioc_attr_list() (git-fixes).
- xfs: prevent a WARN_ONCE() in xfs_ioc_attr_list() (git-fixes).
- xfs: reject crazy array sizes being fed to XFS_IOC_GETBMAP* (git-fixes).
- xfs: reject crazy array sizes being fed to XFS_IOC_GETBMAP* (git-fixes).
- xfs: remove xfs_setattr_time() declaration (git-fixes).
- xfs: return errors in xfs_fs_sync_fs (git-fixes).
- xfs: return errors in xfs_fs_sync_fs (git-fixes).
- xfs: set bnobt/cntbt numrecs correctly when formatting new AGs (git-fixes).
- xfs: zero inode fork buffer at allocation (git-fixes).
- xhci-pci: Only run d3cold avoidance quirk for s2idle (git-fixes).
- xhci-pci: set the dma max_seg_size (git-fixes).
- xhci-pci: set the dma max_seg_size (git-fixes).
- xhci: Fix incorrect tracking of free space on transfer rings (git-fixes).
- xhci: Fix null pointer dereference when host dies (git-fixes).
- xhci: Fix null pointer dereference when host dies (git-fixes).
- xhci: Free the command allocated for setting LPM if we return early (git-fixes).
- xhci: also avoid the XHCI_ZERO_64B_REGS quirk with a passthrough iommu (git-fixes).
- xhci: fix debugfs register accesses while suspended (git-fixes).
- xirc2ps_cs: Fix use after free bug in xirc2ps_detach (git-fixes).
- xprtrdma: Fix regbuf data not freed in rpcrdma_req_create() (git-fixes).
- xsk: Fix corrupted packets for XDP_SHARED_UMEM (git-fixes).
- zram: do not lookup algorithm in backends table (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-27"/>
	<updated date="2023-06-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109158">SUSE bug 1109158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142685">SUSE bug 1142685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160435">SUSE bug 1160435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166486">SUSE bug 1166486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172073">SUSE bug 1172073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174777">SUSE bug 1174777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177529">SUSE bug 1177529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186449">SUSE bug 1186449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189998">SUSE bug 1189998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189999">SUSE bug 1189999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191731">SUSE bug 1191731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195175">SUSE bug 1195175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195655">SUSE bug 1195655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195921">SUSE bug 1195921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196058">SUSE bug 1196058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197534">SUSE bug 1197534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197617">SUSE bug 1197617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198101">SUSE bug 1198101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198438">SUSE bug 1198438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198835">SUSE bug 1198835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199304">SUSE bug 1199304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200054">SUSE bug 1200054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202353">SUSE bug 1202353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202633">SUSE bug 1202633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203039">SUSE bug 1203039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203200">SUSE bug 1203200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203325">SUSE bug 1203325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203331">SUSE bug 1203331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203332">SUSE bug 1203332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203693">SUSE bug 1203693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203906">SUSE bug 1203906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204356">SUSE bug 1204356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204662">SUSE bug 1204662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204993">SUSE bug 1204993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205191">SUSE bug 1205191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205205">SUSE bug 1205205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205544">SUSE bug 1205544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205650">SUSE bug 1205650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205756">SUSE bug 1205756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205758">SUSE bug 1205758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205760">SUSE bug 1205760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205762">SUSE bug 1205762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205803">SUSE bug 1205803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205846">SUSE bug 1205846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206024">SUSE bug 1206024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206036">SUSE bug 1206036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206056">SUSE bug 1206056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206057">SUSE bug 1206057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206103">SUSE bug 1206103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206224">SUSE bug 1206224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206232">SUSE bug 1206232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206340">SUSE bug 1206340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206459">SUSE bug 1206459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206492">SUSE bug 1206492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206493">SUSE bug 1206493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206552">SUSE bug 1206552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206578">SUSE bug 1206578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206640">SUSE bug 1206640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206649">SUSE bug 1206649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206677">SUSE bug 1206677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206824">SUSE bug 1206824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206843">SUSE bug 1206843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206876">SUSE bug 1206876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206877">SUSE bug 1206877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206878">SUSE bug 1206878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206880">SUSE bug 1206880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206881">SUSE bug 1206881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206882">SUSE bug 1206882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206883">SUSE bug 1206883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206884">SUSE bug 1206884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206885">SUSE bug 1206885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206886">SUSE bug 1206886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206887">SUSE bug 1206887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206888">SUSE bug 1206888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206889">SUSE bug 1206889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206890">SUSE bug 1206890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206891">SUSE bug 1206891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206893">SUSE bug 1206893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206894">SUSE bug 1206894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206935">SUSE bug 1206935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206992">SUSE bug 1206992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207034">SUSE bug 1207034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207050">SUSE bug 1207050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207088">SUSE bug 1207088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207149">SUSE bug 1207149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207158">SUSE bug 1207158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207168">SUSE bug 1207168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207185">SUSE bug 1207185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207270">SUSE bug 1207270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207315">SUSE bug 1207315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207328">SUSE bug 1207328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207497">SUSE bug 1207497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207500">SUSE bug 1207500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207501">SUSE bug 1207501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207506">SUSE bug 1207506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207507">SUSE bug 1207507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207521">SUSE bug 1207521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207553">SUSE bug 1207553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207560">SUSE bug 1207560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207574">SUSE bug 1207574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207588">SUSE bug 1207588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207589">SUSE bug 1207589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207590">SUSE bug 1207590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207591">SUSE bug 1207591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207592">SUSE bug 1207592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207593">SUSE bug 1207593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207594">SUSE bug 1207594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207602">SUSE bug 1207602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207603">SUSE bug 1207603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207605">SUSE bug 1207605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207606">SUSE bug 1207606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207607">SUSE bug 1207607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207608">SUSE bug 1207608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207609">SUSE bug 1207609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207610">SUSE bug 1207610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207611">SUSE bug 1207611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207612">SUSE bug 1207612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207613">SUSE bug 1207613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207614">SUSE bug 1207614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207615">SUSE bug 1207615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207616">SUSE bug 1207616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207617">SUSE bug 1207617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207618">SUSE bug 1207618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207619">SUSE bug 1207619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207620">SUSE bug 1207620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207621">SUSE bug 1207621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207622">SUSE bug 1207622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207623">SUSE bug 1207623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207624">SUSE bug 1207624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207625">SUSE bug 1207625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207626">SUSE bug 1207626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207627">SUSE bug 1207627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207628">SUSE bug 1207628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207629">SUSE bug 1207629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207630">SUSE bug 1207630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207631">SUSE bug 1207631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207632">SUSE bug 1207632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207633">SUSE bug 1207633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207634">SUSE bug 1207634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207635">SUSE bug 1207635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207636">SUSE bug 1207636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207637">SUSE bug 1207637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207638">SUSE bug 1207638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207639">SUSE bug 1207639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207640">SUSE bug 1207640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207641">SUSE bug 1207641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207642">SUSE bug 1207642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207643">SUSE bug 1207643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207644">SUSE bug 1207644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207645">SUSE bug 1207645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207646">SUSE bug 1207646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207647">SUSE bug 1207647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207648">SUSE bug 1207648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207649">SUSE bug 1207649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207650">SUSE bug 1207650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207651">SUSE bug 1207651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207652">SUSE bug 1207652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207653">SUSE bug 1207653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207734">SUSE bug 1207734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207768">SUSE bug 1207768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207769">SUSE bug 1207769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207770">SUSE bug 1207770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207771">SUSE bug 1207771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207773">SUSE bug 1207773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207795">SUSE bug 1207795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207827">SUSE bug 1207827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207842">SUSE bug 1207842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207845">SUSE bug 1207845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207875">SUSE bug 1207875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207878">SUSE bug 1207878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207935">SUSE bug 1207935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207948">SUSE bug 1207948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208050">SUSE bug 1208050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208076">SUSE bug 1208076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208081">SUSE bug 1208081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208105">SUSE bug 1208105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208107">SUSE bug 1208107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208128">SUSE bug 1208128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208130">SUSE bug 1208130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208149">SUSE bug 1208149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208153">SUSE bug 1208153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208183">SUSE bug 1208183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208212">SUSE bug 1208212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208219">SUSE bug 1208219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208290">SUSE bug 1208290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208368">SUSE bug 1208368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208420">SUSE bug 1208420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208428">SUSE bug 1208428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208429">SUSE bug 1208429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208449">SUSE bug 1208449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208534">SUSE bug 1208534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208541">SUSE bug 1208541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208542">SUSE bug 1208542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208570">SUSE bug 1208570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208588">SUSE bug 1208588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208598">SUSE bug 1208598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208599">SUSE bug 1208599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208600">SUSE bug 1208600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208602">SUSE bug 1208602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208604">SUSE bug 1208604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208605">SUSE bug 1208605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208607">SUSE bug 1208607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208619">SUSE bug 1208619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208628">SUSE bug 1208628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208700">SUSE bug 1208700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208758">SUSE bug 1208758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208759">SUSE bug 1208759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208776">SUSE bug 1208776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208777">SUSE bug 1208777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208784">SUSE bug 1208784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208787">SUSE bug 1208787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208815">SUSE bug 1208815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208816">SUSE bug 1208816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208829">SUSE bug 1208829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208837">SUSE bug 1208837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208843">SUSE bug 1208843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208845">SUSE bug 1208845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208848">SUSE bug 1208848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208864">SUSE bug 1208864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208902">SUSE bug 1208902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208948">SUSE bug 1208948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208976">SUSE bug 1208976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209008">SUSE bug 1209008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209052">SUSE bug 1209052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209092">SUSE bug 1209092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209159">SUSE bug 1209159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209256">SUSE bug 1209256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209258">SUSE bug 1209258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209262">SUSE bug 1209262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209287">SUSE bug 1209287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209288">SUSE bug 1209288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209290">SUSE bug 1209290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209292">SUSE bug 1209292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209367">SUSE bug 1209367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209457">SUSE bug 1209457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209504">SUSE bug 1209504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209532">SUSE bug 1209532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209556">SUSE bug 1209556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209600">SUSE bug 1209600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209635">SUSE bug 1209635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209636">SUSE bug 1209636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209637">SUSE bug 1209637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209684">SUSE bug 1209684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209687">SUSE bug 1209687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209693">SUSE bug 1209693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209739">SUSE bug 1209739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209779">SUSE bug 1209779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209788">SUSE bug 1209788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209798">SUSE bug 1209798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209799">SUSE bug 1209799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209804">SUSE bug 1209804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209805">SUSE bug 1209805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209856">SUSE bug 1209856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209871">SUSE bug 1209871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209927">SUSE bug 1209927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209980">SUSE bug 1209980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209982">SUSE bug 1209982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209999">SUSE bug 1209999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210034">SUSE bug 1210034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210050">SUSE bug 1210050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210158">SUSE bug 1210158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210165">SUSE bug 1210165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210202">SUSE bug 1210202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210203">SUSE bug 1210203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210206">SUSE bug 1210206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210216">SUSE bug 1210216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210230">SUSE bug 1210230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210294">SUSE bug 1210294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210301">SUSE bug 1210301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210329">SUSE bug 1210329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210336">SUSE bug 1210336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210409">SUSE bug 1210409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210439">SUSE bug 1210439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210449">SUSE bug 1210449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210450">SUSE bug 1210450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210469">SUSE bug 1210469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210498">SUSE bug 1210498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210506">SUSE bug 1210506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210533">SUSE bug 1210533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210551">SUSE bug 1210551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210629">SUSE bug 1210629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210644">SUSE bug 1210644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210647">SUSE bug 1210647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210725">SUSE bug 1210725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210741">SUSE bug 1210741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210762">SUSE bug 1210762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210763">SUSE bug 1210763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210764">SUSE bug 1210764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210765">SUSE bug 1210765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210766">SUSE bug 1210766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210767">SUSE bug 1210767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210768">SUSE bug 1210768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210769">SUSE bug 1210769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210770">SUSE bug 1210770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210771">SUSE bug 1210771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210775">SUSE bug 1210775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210783">SUSE bug 1210783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210791">SUSE bug 1210791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210793">SUSE bug 1210793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210806">SUSE bug 1210806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210816">SUSE bug 1210816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210817">SUSE bug 1210817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210827">SUSE bug 1210827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210940">SUSE bug 1210940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210943">SUSE bug 1210943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210947">SUSE bug 1210947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210953">SUSE bug 1210953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210986">SUSE bug 1210986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211025">SUSE bug 1211025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211037">SUSE bug 1211037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211043">SUSE bug 1211043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211044">SUSE bug 1211044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211089">SUSE bug 1211089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211105">SUSE bug 1211105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211113">SUSE bug 1211113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211131">SUSE bug 1211131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211140">SUSE bug 1211140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211205">SUSE bug 1211205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211263">SUSE bug 1211263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211280">SUSE bug 1211280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211281">SUSE bug 1211281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211299">SUSE bug 1211299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211387">SUSE bug 1211387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211414">SUSE bug 1211414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211449">SUSE bug 1211449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211465">SUSE bug 1211465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211519">SUSE bug 1211519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211564">SUSE bug 1211564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211590">SUSE bug 1211590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211592">SUSE bug 1211592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211593">SUSE bug 1211593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211595">SUSE bug 1211595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211654">SUSE bug 1211654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211686">SUSE bug 1211686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211687">SUSE bug 1211687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211688">SUSE bug 1211688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211689">SUSE bug 1211689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211690">SUSE bug 1211690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211691">SUSE bug 1211691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211692">SUSE bug 1211692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211693">SUSE bug 1211693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211714">SUSE bug 1211714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211796">SUSE bug 1211796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211804">SUSE bug 1211804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211807">SUSE bug 1211807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211808">SUSE bug 1211808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211820">SUSE bug 1211820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211836">SUSE bug 1211836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211847">SUSE bug 1211847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211855">SUSE bug 1211855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211960">SUSE bug 1211960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212129">SUSE bug 1212129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212154">SUSE bug 1212154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212155">SUSE bug 1212155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212158">SUSE bug 1212158</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2196/">CVE-2022-2196 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2196">CVE-2022-2196 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36280/">CVE-2022-36280 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36280">CVE-2022-36280 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38096/">CVE-2022-38096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38096">CVE-2022-38096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4269/">CVE-2022-4269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4269">CVE-2022-4269 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45884/">CVE-2022-45884 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45884">CVE-2022-45884 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45885/">CVE-2022-45885 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45885">CVE-2022-45885 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45886/">CVE-2022-45886 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45886">CVE-2022-45886 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45887/">CVE-2022-45887 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45887">CVE-2022-45887 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45919/">CVE-2022-45919 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45919">CVE-2022-45919 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4744/">CVE-2022-4744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4744">CVE-2022-4744 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0045/">CVE-2023-0045 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0045">CVE-2023-0045 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0122/">CVE-2023-0122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0122">CVE-2023-0122 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0179/">CVE-2023-0179 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0179">CVE-2023-0179 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0394/">CVE-2023-0394 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0394">CVE-2023-0394 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0461/">CVE-2023-0461 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0461">CVE-2023-0461 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0469/">CVE-2023-0469 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0469">CVE-2023-0469 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0590/">CVE-2023-0590 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0590">CVE-2023-0590 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0597/">CVE-2023-0597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0597">CVE-2023-0597 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1075/">CVE-2023-1075 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1075">CVE-2023-1075 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1076/">CVE-2023-1076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1076">CVE-2023-1076 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1077/">CVE-2023-1077 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1077">CVE-2023-1077 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1079/">CVE-2023-1079 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1079">CVE-2023-1079 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1095/">CVE-2023-1095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1095">CVE-2023-1095 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1118/">CVE-2023-1118 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1118">CVE-2023-1118 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1380/">CVE-2023-1380 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1380">CVE-2023-1380 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1382/">CVE-2023-1382 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1382">CVE-2023-1382 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1513/">CVE-2023-1513 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1513">CVE-2023-1513 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1582/">CVE-2023-1582 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1582">CVE-2023-1582 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1583/">CVE-2023-1583 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1583">CVE-2023-1583 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1611/">CVE-2023-1611 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1611">CVE-2023-1611 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1637/">CVE-2023-1637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1637">CVE-2023-1637 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1652/">CVE-2023-1652 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1652">CVE-2023-1652 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1670/">CVE-2023-1670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1670">CVE-2023-1670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1838/">CVE-2023-1838 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1838">CVE-2023-1838 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1855/">CVE-2023-1855 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1855">CVE-2023-1855 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1989/">CVE-2023-1989 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1989">CVE-2023-1989 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1998/">CVE-2023-1998 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1998">CVE-2023-1998 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2002/">CVE-2023-2002 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2002">CVE-2023-2002 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-21102/">CVE-2023-21102 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21102">CVE-2023-21102 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-21106/">CVE-2023-21106 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21106">CVE-2023-21106 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2124/">CVE-2023-2124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2124">CVE-2023-2124 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2156/">CVE-2023-2156 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2156">CVE-2023-2156 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2162/">CVE-2023-2162 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2162">CVE-2023-2162 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2176/">CVE-2023-2176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2176">CVE-2023-2176 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2235/">CVE-2023-2235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2235">CVE-2023-2235 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2269/">CVE-2023-2269 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2269">CVE-2023-2269 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22998/">CVE-2023-22998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22998">CVE-2023-22998 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-23000/">CVE-2023-23000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23000">CVE-2023-23000 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-23001/">CVE-2023-23001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23001">CVE-2023-23001 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23004/">CVE-2023-23004 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23004">CVE-2023-23004 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-23006/">CVE-2023-23006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23006">CVE-2023-23006 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2483/">CVE-2023-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-2483">CVE-2023-2483 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-25012/">CVE-2023-25012 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25012">CVE-2023-25012 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2513/">CVE-2023-2513 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2513">CVE-2023-2513 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26545/">CVE-2023-26545 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26545">CVE-2023-26545 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28327/">CVE-2023-28327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28327">CVE-2023-28327 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28410/">CVE-2023-28410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28410">CVE-2023-28410 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28464/">CVE-2023-28464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28464">CVE-2023-28464 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3006/">CVE-2023-3006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3006">CVE-2023-3006 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-30456/">CVE-2023-30456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30456">CVE-2023-30456 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-30772/">CVE-2023-30772 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30772">CVE-2023-30772 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31084/">CVE-2023-31084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31084">CVE-2023-31084 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-3141/">CVE-2023-3141 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3141">CVE-2023-3141 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31436/">CVE-2023-31436 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31436">CVE-2023-31436 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3161/">CVE-2023-3161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3161">CVE-2023-3161 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32233/">CVE-2023-32233 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32233">CVE-2023-32233 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-33288/">CVE-2023-33288 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33288">CVE-2023-33288 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-33951/">CVE-2023-33951 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33951">CVE-2023-33951 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-33952/">CVE-2023-33952 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33952">CVE-2023-33952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009768685" comment="cluster-md-kmp-azure-5.14.21-150500.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768686" comment="dlm-kmp-azure-5.14.21-150500.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768687" comment="gfs2-kmp-azure-5.14.21-150500.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009766964" comment="kernel-azure-5.14.21-150500.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009766965" comment="kernel-azure-devel-5.14.21-150500.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768688" comment="kernel-azure-extra-5.14.21-150500.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768689" comment="kernel-azure-livepatch-devel-5.14.21-150500.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768690" comment="kernel-azure-optional-5.14.21-150500.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768691" comment="kernel-azure-vdso-5.14.21-150500.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009766966" comment="kernel-devel-azure-5.14.21-150500.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009766967" comment="kernel-source-azure-5.14.21-150500.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009766968" comment="kernel-syms-azure-5.14.21-150500.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768692" comment="kselftests-kmp-azure-5.14.21-150500.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768693" comment="ocfs2-kmp-azure-5.14.21-150500.33.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768694" comment="reiserfs-kmp-azure-5.14.21-150500.33.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4202" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211658" ref_url="https://bugzilla.suse.com/1211658" source="BUGZILLA"/>
		<reference ref_id="1211659" ref_url="https://bugzilla.suse.com/1211659" source="BUGZILLA"/>
		<reference ref_id="1211846" ref_url="https://bugzilla.suse.com/1211846" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28204" ref_url="https://www.suse.com/security/cve/CVE-2023-28204/" source="CVE"/>
		<reference ref_id="CVE-2023-32373" ref_url="https://www.suse.com/security/cve/CVE-2023-32373/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015324.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Add security patches (bsc#1211846):

- CVE-2023-28204: Fixed processing of web content that may disclose sensitive information (bsc#1211659).
- CVE-2023-32373: Fixed processing of maliciously crafted web content that may lead to arbitrary code execution (bsc#1211658).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-27"/>
	<updated date="2023-06-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211658">SUSE bug 1211658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211659">SUSE bug 1211659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211846">SUSE bug 1211846</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28204/">CVE-2023-28204 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28204">CVE-2023-28204 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32373/">CVE-2023-32373 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32373">CVE-2023-32373 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009767082" comment="WebKit2GTK-4.0-lang-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767083" comment="WebKit2GTK-4.1-lang-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767084" comment="WebKit2GTK-5.0-lang-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767085" comment="libjavascriptcoregtk-4_0-18-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767086" comment="libjavascriptcoregtk-4_0-18-32bit-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767087" comment="libjavascriptcoregtk-4_1-0-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767088" comment="libjavascriptcoregtk-4_1-0-32bit-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767089" comment="libjavascriptcoregtk-5_0-0-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767090" comment="libwebkit2gtk-4_0-37-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767091" comment="libwebkit2gtk-4_0-37-32bit-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767092" comment="libwebkit2gtk-4_1-0-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767093" comment="libwebkit2gtk-4_1-0-32bit-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767094" comment="libwebkit2gtk-5_0-0-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767095" comment="typelib-1_0-JavaScriptCore-4_0-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767096" comment="typelib-1_0-JavaScriptCore-4_1-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767097" comment="typelib-1_0-JavaScriptCore-5_0-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767098" comment="typelib-1_0-WebKit2-4_0-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767099" comment="typelib-1_0-WebKit2-4_1-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767100" comment="typelib-1_0-WebKit2-5_0-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767101" comment="typelib-1_0-WebKit2WebExtension-4_0-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767102" comment="typelib-1_0-WebKit2WebExtension-4_1-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767103" comment="typelib-1_0-WebKit2WebExtension-5_0-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767104" comment="webkit-jsc-4-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767105" comment="webkit-jsc-4.1-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767106" comment="webkit-jsc-5.0-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767107" comment="webkit2gtk-4_0-injected-bundles-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767108" comment="webkit2gtk-4_1-injected-bundles-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767109" comment="webkit2gtk-5_0-injected-bundles-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767110" comment="webkit2gtk3-devel-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767111" comment="webkit2gtk3-minibrowser-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767112" comment="webkit2gtk3-soup2-devel-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767113" comment="webkit2gtk3-soup2-minibrowser-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767114" comment="webkit2gtk4-devel-2.38.6-150400.4.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767115" comment="webkit2gtk4-minibrowser-2.38.6-150400.4.42.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4203" version="1" class="patch">
	<metadata>
		<title>Security update for amazon-ssm-agent (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206346" ref_url="https://bugzilla.suse.com/1206346" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030084.html" source="SUSE-SU"/>
		<description>

This update of amazon-ssm-agent fixes the following issues:

- rebuild the package with the go 1.20 security release (bsc#1206346).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-27"/>
	<updated date="2023-06-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206346">SUSE bug 1206346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769136" comment="amazon-ssm-agent-3.1.1260.0-150000.5.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4204" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1209861" ref_url="https://bugzilla.suse.com/1209861" source="BUGZILLA"/>
		<reference ref_id="1210666" ref_url="https://bugzilla.suse.com/1210666" source="BUGZILLA"/>
		<reference ref_id="1211390" ref_url="https://bugzilla.suse.com/1211390" source="BUGZILLA"/>
		<reference ref_id="1211472" ref_url="https://bugzilla.suse.com/1211472" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2700" ref_url="https://www.suse.com/security/cve/CVE-2023-2700/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2652-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030083.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2023-2700: virpci: Resolve leak in virPCIVirtualFunctionList (bsc#1211390)
- apparmor: Add support for local profile customizations (bsc#1211472)
- qemu: Fix cdrom media change (bsc#1210666)
- qemu: Fix potential crash during driver cleanup (bsc#1209861)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-27"/>
	<updated date="2023-06-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209861">SUSE bug 1209861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210666">SUSE bug 1210666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211390">SUSE bug 1211390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211472">SUSE bug 1211472</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2700/">CVE-2023-2700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2700">CVE-2023-2700 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009765226" comment="libvirt-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765227" comment="libvirt-client-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765228" comment="libvirt-client-qemu-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765229" comment="libvirt-daemon-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765230" comment="libvirt-daemon-config-network-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765231" comment="libvirt-daemon-config-nwfilter-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765232" comment="libvirt-daemon-driver-interface-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765233" comment="libvirt-daemon-driver-libxl-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768680" comment="libvirt-daemon-driver-lxc-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765234" comment="libvirt-daemon-driver-network-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765235" comment="libvirt-daemon-driver-nodedev-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765236" comment="libvirt-daemon-driver-nwfilter-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765237" comment="libvirt-daemon-driver-qemu-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765238" comment="libvirt-daemon-driver-secret-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765239" comment="libvirt-daemon-driver-storage-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765240" comment="libvirt-daemon-driver-storage-core-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765241" comment="libvirt-daemon-driver-storage-disk-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768681" comment="libvirt-daemon-driver-storage-gluster-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765242" comment="libvirt-daemon-driver-storage-iscsi-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765243" comment="libvirt-daemon-driver-storage-iscsi-direct-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765244" comment="libvirt-daemon-driver-storage-logical-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765245" comment="libvirt-daemon-driver-storage-mpath-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765246" comment="libvirt-daemon-driver-storage-rbd-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765247" comment="libvirt-daemon-driver-storage-scsi-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765248" comment="libvirt-daemon-hooks-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768682" comment="libvirt-daemon-lxc-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765249" comment="libvirt-daemon-qemu-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765250" comment="libvirt-daemon-xen-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765251" comment="libvirt-devel-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768683" comment="libvirt-devel-32bit-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765252" comment="libvirt-doc-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765124" comment="libvirt-libs-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765253" comment="libvirt-lock-sanlock-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009765254" comment="libvirt-nss-9.0.0-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768684" comment="wireshark-plugin-libvirt-9.0.0-150500.6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4205" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.24 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206346" ref_url="https://bugzilla.suse.com/1206346" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015334.html" source="SUSE-SU"/>
		<description>

This update of kubernetes1.24 fixes the following issues:

- Update to version 1.24.15.
- rebuild the package with the go 1.20 security release (bsc#1206346).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-27"/>
	<updated date="2023-06-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206346">SUSE bug 1206346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009769149" comment="kubernetes1.24-apiserver-1.24.15-150500.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769150" comment="kubernetes1.24-client-1.24.15-150500.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769151" comment="kubernetes1.24-client-bash-completion-1.24.15-150500.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769152" comment="kubernetes1.24-client-common-1.24.15-150500.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769153" comment="kubernetes1.24-client-fish-completion-1.24.15-150500.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769154" comment="kubernetes1.24-controller-manager-1.24.15-150500.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769155" comment="kubernetes1.24-kubeadm-1.24.15-150500.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769156" comment="kubernetes1.24-kubelet-1.24.15-150500.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769157" comment="kubernetes1.24-kubelet-common-1.24.15-150500.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769158" comment="kubernetes1.24-proxy-1.24.15-150500.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769159" comment="kubernetes1.24-scheduler-1.24.15-150500.3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4206" version="1" class="patch">
	<metadata>
		<title>Security update for cosign (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206346" ref_url="https://bugzilla.suse.com/1206346" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015333.html" source="SUSE-SU"/>
		<description>

This update of cosign fixes the following issues:

- rebuild the package with the go 1.20 security release (bsc#1206346).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-27"/>
	<updated date="2023-06-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206346">SUSE bug 1206346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769130" comment="cosign-2.0.1-150400.3.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4207" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs18 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1208744" ref_url="https://bugzilla.suse.com/1208744" source="BUGZILLA"/>
		<reference ref_id="1211407" ref_url="https://bugzilla.suse.com/1211407" source="BUGZILLA"/>
		<reference ref_id="1211604" ref_url="https://bugzilla.suse.com/1211604" source="BUGZILLA"/>
		<reference ref_id="1211605" ref_url="https://bugzilla.suse.com/1211605" source="BUGZILLA"/>
		<reference ref_id="1211606" ref_url="https://bugzilla.suse.com/1211606" source="BUGZILLA"/>
		<reference ref_id="1211607" ref_url="https://bugzilla.suse.com/1211607" source="BUGZILLA"/>
		<reference ref_id="1212574" ref_url="https://bugzilla.suse.com/1212574" source="BUGZILLA"/>
		<reference ref_id="1212579" ref_url="https://bugzilla.suse.com/1212579" source="BUGZILLA"/>
		<reference ref_id="1212581" ref_url="https://bugzilla.suse.com/1212581" source="BUGZILLA"/>
		<reference ref_id="1212582" ref_url="https://bugzilla.suse.com/1212582" source="BUGZILLA"/>
		<reference ref_id="1212583" ref_url="https://bugzilla.suse.com/1212583" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25881" ref_url="https://www.suse.com/security/cve/CVE-2022-25881/" source="CVE"/>
		<reference ref_id="CVE-2023-30581" ref_url="https://www.suse.com/security/cve/CVE-2023-30581/" source="CVE"/>
		<reference ref_id="CVE-2023-30585" ref_url="https://www.suse.com/security/cve/CVE-2023-30585/" source="CVE"/>
		<reference ref_id="CVE-2023-30588" ref_url="https://www.suse.com/security/cve/CVE-2023-30588/" source="CVE"/>
		<reference ref_id="CVE-2023-30589" ref_url="https://www.suse.com/security/cve/CVE-2023-30589/" source="CVE"/>
		<reference ref_id="CVE-2023-30590" ref_url="https://www.suse.com/security/cve/CVE-2023-30590/" source="CVE"/>
		<reference ref_id="CVE-2023-31124" ref_url="https://www.suse.com/security/cve/CVE-2023-31124/" source="CVE"/>
		<reference ref_id="CVE-2023-31130" ref_url="https://www.suse.com/security/cve/CVE-2023-31130/" source="CVE"/>
		<reference ref_id="CVE-2023-31147" ref_url="https://www.suse.com/security/cve/CVE-2023-31147/" source="CVE"/>
		<reference ref_id="CVE-2023-32067" ref_url="https://www.suse.com/security/cve/CVE-2023-32067/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015346.html" source="SUSE-SU"/>
		<description>
This update for nodejs18 fixes the following issues:

Update to version 18.16.1:

- CVE-2023-30581: Fixed mainModule.__proto__ Bypass Experimental Policy Mechanism (bsc#1212574).
- CVE-2023-30585: Fixed privilege escalation via Malicious Registry Key manipulation during Node.js installer repair process (bsc#1212579).
- CVE-2023-30588: Fixed process interuption due to invalid Public Key information in x509 certificates (bsc#1212581).
- CVE-2023-30589: Fixed HTTP Request Smuggling via empty headers separated by CR (bsc#1212582).
- CVE-2023-30590: Fixed DiffieHellman key generation after setting a private key (bsc#1212583).
- CVE-2023-31124: Fixed cross compilation issue with AutoTools that does not set CARES_RANDOM_FILE (bsc#1211607).
- CVE-2023-31130: Fixed buffer underwrite problem in ares_inet_net_pton() (bsc#1211606).
- CVE-2023-31147: Fixed insufficient randomness in generation of DNS query IDs (bsc#1211605).
- CVE-2023-32067: Fixed denial-of-service via 0-byte UDP payload (bsc#1211604).
- CVE-2022-25881: Fixed a Regular Expression Denial of Service (bsc#1208744).

Bug fixes:

- Increased the default timeout on unit tests from 2 to 20 minutes. This seems to have lead to build failures on some platforms, like s390x in Factory. (bsc#1211407)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-28"/>
	<updated date="2023-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208744">SUSE bug 1208744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211407">SUSE bug 1211407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211604">SUSE bug 1211604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211605">SUSE bug 1211605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211606">SUSE bug 1211606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211607">SUSE bug 1211607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212574">SUSE bug 1212574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212579">SUSE bug 1212579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212581">SUSE bug 1212581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212582">SUSE bug 1212582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212583">SUSE bug 1212583</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25881/">CVE-2022-25881 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25881">CVE-2022-25881 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-30581/">CVE-2023-30581 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30581">CVE-2023-30581 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-30585/">CVE-2023-30585 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30585">CVE-2023-30585 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-30588/">CVE-2023-30588 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30588">CVE-2023-30588 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-30589/">CVE-2023-30589 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30589">CVE-2023-30589 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-30590/">CVE-2023-30590 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30590">CVE-2023-30590 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-31124/">CVE-2023-31124 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31124">CVE-2023-31124 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-31130/">CVE-2023-31130 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31130">CVE-2023-31130 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31147/">CVE-2023-31147 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31147">CVE-2023-31147 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32067/">CVE-2023-32067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32067">CVE-2023-32067 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009769329" comment="corepack18-18.16.1-150400.9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769330" comment="nodejs18-18.16.1-150400.9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769331" comment="nodejs18-devel-18.16.1-150400.9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769332" comment="nodejs18-docs-18.16.1-150400.9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769333" comment="npm18-18.16.1-150400.9.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4208" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.23 (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212493" ref_url="https://bugzilla.suse.com/1212493" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2431" ref_url="https://www.suse.com/security/cve/CVE-2023-2431/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2691-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030117.html" source="SUSE-SU"/>
		<description>
This update for kubernetes1.23 fixes the following issues:

- CVE-2023-2431: Fixed a bypass issue of seccomp profile enforcement (bsc#1212493).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-28"/>
	<updated date="2023-06-28"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1212493">SUSE bug 1212493</bugzilla>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-2431/">CVE-2023-2431 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2431">CVE-2023-2431 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009769160" comment="kubernetes1.23-apiserver-1.23.17-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769161" comment="kubernetes1.23-client-1.23.17-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769162" comment="kubernetes1.23-client-bash-completion-1.23.17-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769163" comment="kubernetes1.23-client-common-1.23.17-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769164" comment="kubernetes1.23-client-fish-completion-1.23.17-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769165" comment="kubernetes1.23-controller-manager-1.23.17-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769166" comment="kubernetes1.23-kubeadm-1.23.17-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769167" comment="kubernetes1.23-kubelet-1.23.17-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769168" comment="kubernetes1.23-kubelet-common-1.23.17-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769169" comment="kubernetes1.23-proxy-1.23.17-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769170" comment="kubernetes1.23-scheduler-1.23.17-150500.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4209" version="1" class="patch">
	<metadata>
		<title>Security update for rekor (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206346" ref_url="https://bugzilla.suse.com/1206346" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2744-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030156.html" source="SUSE-SU"/>
		<description>

This update of rekor fixes the following issues:

- rebuild the package with the go 1.20 security release (bsc#1206346).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-30"/>
	<updated date="2023-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206346">SUSE bug 1206346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769135" comment="rekor-1.2.1-150400.4.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4210" version="1" class="patch">
	<metadata>
		<title>Security update for iniparser (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211889" ref_url="https://bugzilla.suse.com/1211889" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-33461" ref_url="https://www.suse.com/security/cve/CVE-2023-33461/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030166.html" source="SUSE-SU"/>
		<description>
This update for iniparser fixes the following issues:

- CVE-2023-33461: Fixed NULL pointer dereference in iniparser_getboolean() (bsc#1211889).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-30"/>
	<updated date="2023-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211889">SUSE bug 1211889</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-33461/">CVE-2023-33461 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33461">CVE-2023-33461 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009768695" comment="libiniparser-devel-4.1-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768696" comment="libiniparser1-4.1-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768697" comment="libiniparser1-32bit-4.1-150500.4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4211" version="1" class="patch">
	<metadata>
		<title>Security update for terraform-provider-aws (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206346" ref_url="https://bugzilla.suse.com/1206346" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030164.html" source="SUSE-SU"/>
		<description>

This update of terraform-provider-aws fixes the following issues:

- rebuild the package with the go 1.20 security release (bsc#1206346).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-30"/>
	<updated date="2023-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206346">SUSE bug 1206346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768636" comment="terraform-provider-aws-3.11.0-150200.6.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4212" version="1" class="patch">
	<metadata>
		<title>Security update for terraform-provider-helm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206346" ref_url="https://bugzilla.suse.com/1206346" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2752-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030163.html" source="SUSE-SU"/>
		<description>

This update of terraform-provider-helm fixes the following issues:

- rebuild the package with the go 1.20 security release (bsc#1206346).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-30"/>
	<updated date="2023-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206346">SUSE bug 1206346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768637" comment="terraform-provider-helm-2.9.0-150200.6.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4213" version="1" class="patch">
	<metadata>
		<title>Security update for terraform-provider-null (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206346" ref_url="https://bugzilla.suse.com/1206346" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2753-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030162.html" source="SUSE-SU"/>
		<description>

This update of terraform-provider-null fixes the following issues:

- rebuild the package with the go 1.20 security release (bsc#1206346).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-30"/>
	<updated date="2023-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206346">SUSE bug 1206346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768638" comment="terraform-provider-null-3.0.0-150200.6.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4214" version="1" class="patch">
	<metadata>
		<title>Security update for dnsdist (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1054799" ref_url="https://bugzilla.suse.com/1054799" source="BUGZILLA"/>
		<reference ref_id="1054802" ref_url="https://bugzilla.suse.com/1054802" source="BUGZILLA"/>
		<reference ref_id="1114511" ref_url="https://bugzilla.suse.com/1114511" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-7069" ref_url="https://www.suse.com/security/cve/CVE-2016-7069/" source="CVE"/>
		<reference ref_id="CVE-2017-7557" ref_url="https://www.suse.com/security/cve/CVE-2017-7557/" source="CVE"/>
		<reference ref_id="CVE-2018-14663" ref_url="https://www.suse.com/security/cve/CVE-2018-14663/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2760-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018053.html" source="SUSE-SU"/>
		<description>
This update for dnsdist fixes the following issues:


- update to 1.8.0
  - Implements dnsdist in SLE15 (jsc#PED-3402)
  - Security fix: fixes a possible record smugging with a crafted DNS query with trailing data (CVE-2018-14663, bsc#1114511)

- update to 1.2.0 (bsc#1054799, bsc#1054802)
  This release also addresses two security issues of low severity, CVE-2016-7069 and CVE-2017-7557. The first issue can lead to a
  denial of service on 32-bit if a backend sends crafted answers,
  and the second to an alteration of dnsdist’s ACL if the API is
  enabled, writable and an authenticated user is tricked into
  visiting a crafted website. 
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-06"/>
	<updated date="2023-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1054799">SUSE bug 1054799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1054802">SUSE bug 1054802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114511">SUSE bug 1114511</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-7069/">CVE-2016-7069 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-7069">CVE-2016-7069 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-7557/">CVE-2017-7557 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7557">CVE-2017-7557 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-14663/">CVE-2018-14663 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-14663">CVE-2018-14663 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009803032" comment="dnsdist-1.8.0-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770390" comment="libluajit-5_1-2-2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770391" comment="libluajit-5_1-2-32bit-2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770392" comment="luajit-2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770393" comment="luajit-devel-2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4215" version="1" class="patch">
	<metadata>
		<title>Security update for amazon-ecs-init (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206346" ref_url="https://bugzilla.suse.com/1206346" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015405.html" source="SUSE-SU"/>
		<description>

This update of amazon-ecs-init fixes the following issues:

- rebuild the package with the go 1.20 security release (bsc#1206346).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-03"/>
	<updated date="2023-07-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206346">SUSE bug 1206346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768138" comment="amazon-ecs-init-1.53.0-150100.4.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4216" version="1" class="patch">
	<metadata>
		<title>Security update for libcap (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211418" ref_url="https://bugzilla.suse.com/1211418" source="BUGZILLA"/>
		<reference ref_id="1211419" ref_url="https://bugzilla.suse.com/1211419" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2602" ref_url="https://www.suse.com/security/cve/CVE-2023-2602/" source="CVE"/>
		<reference ref_id="CVE-2023-2603" ref_url="https://www.suse.com/security/cve/CVE-2023-2603/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015408.html" source="SUSE-SU"/>
		<description>
This update for libcap fixes the following issues:

- CVE-2023-2602: Fixed improper memory release in libcap/psx/psx.c:__wrap_pthread_create() (bsc#1211418).
- CVE-2023-2603: Fixed an integer overflow or wraparound in libcap/cap_alloc.c:_libcap_strdup() (bsc#1211419).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-03"/>
	<updated date="2023-07-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211418">SUSE bug 1211418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211419">SUSE bug 1211419</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2602/">CVE-2023-2602 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2602">CVE-2023-2602 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-2603/">CVE-2023-2603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2603">CVE-2023-2603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009769963" comment="libcap-devel-2.63-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769964" comment="libcap-progs-2.63-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769965" comment="libcap2-2.63-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769966" comment="libcap2-32bit-2.63-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769967" comment="libpsx2-2.63-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769968" comment="libpsx2-32bit-2.63-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4217" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.18 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206346" ref_url="https://bugzilla.suse.com/1206346" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030194.html" source="SUSE-SU"/>
		<description>

This update of kubernetes1.18 fixes the following issues:

- rebuild the package with the go 1.20 security release (bsc#1206346).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2023-07-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206346">SUSE bug 1206346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009768634" comment="kubernetes1.18-client-1.18.10-150200.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768635" comment="kubernetes1.18-client-common-1.18.10-150200.5.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4218" version="1" class="patch">
	<metadata>
		<title>Security update for python311 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1203750" ref_url="https://bugzilla.suse.com/1203750" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2778-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030189.html" source="SUSE-SU"/>
		<description>
This update for python311 fixes the following issues:

- CVE-2007-4559: Fixed filter for tarfile.extractall (bsc#1203750).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2023-07-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203750">SUSE bug 1203750</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009769930" comment="libpython3_11-1_0-3.11.3-150400.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769931" comment="libpython3_11-1_0-32bit-3.11.3-150400.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769932" comment="python311-3.11.3-150400.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769933" comment="python311-32bit-3.11.3-150400.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769934" comment="python311-base-3.11.3-150400.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769935" comment="python311-base-32bit-3.11.3-150400.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769936" comment="python311-curses-3.11.3-150400.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769937" comment="python311-dbm-3.11.3-150400.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769938" comment="python311-devel-3.11.3-150400.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769939" comment="python311-doc-3.11.3-150400.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769940" comment="python311-doc-devhelp-3.11.3-150400.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769941" comment="python311-idle-3.11.3-150400.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769942" comment="python311-testsuite-3.11.3-150400.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769943" comment="python311-tk-3.11.3-150400.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769944" comment="python311-tools-3.11.3-150400.9.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4219" version="1" class="patch">
	<metadata>
		<title>Security update for qt6-base (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211798" ref_url="https://bugzilla.suse.com/1211798" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32763" ref_url="https://www.suse.com/security/cve/CVE-2023-32763/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2780-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030187.html" source="SUSE-SU"/>
		<description>
This update for qt6-base fixes the following issues:

- CVE-2023-32763: Fixed an overflow in QTextLayout (bsc#1211798).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2023-07-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211798">SUSE bug 1211798</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32763/">CVE-2023-32763 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32763">CVE-2023-32763 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009770257" comment="libQt6Concurrent6-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770258" comment="libQt6Core6-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770259" comment="libQt6DBus6-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770260" comment="libQt6Gui6-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770261" comment="libQt6Network6-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770262" comment="libQt6OpenGL6-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770263" comment="libQt6OpenGLWidgets6-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770264" comment="libQt6PrintSupport6-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770265" comment="libQt6Sql6-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770266" comment="libQt6Test6-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770267" comment="libQt6Widgets6-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770268" comment="libQt6Xml6-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770269" comment="qt6-base-common-devel-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770270" comment="qt6-base-devel-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770271" comment="qt6-base-docs-html-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770272" comment="qt6-base-docs-qch-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770273" comment="qt6-base-examples-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770274" comment="qt6-base-private-devel-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770275" comment="qt6-concurrent-devel-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770276" comment="qt6-core-devel-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770277" comment="qt6-core-private-devel-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770278" comment="qt6-dbus-devel-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770279" comment="qt6-dbus-private-devel-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770280" comment="qt6-docs-common-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770281" comment="qt6-gui-devel-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770282" comment="qt6-gui-private-devel-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770283" comment="qt6-kmssupport-devel-static-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770284" comment="qt6-kmssupport-private-devel-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770285" comment="qt6-network-devel-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770286" comment="qt6-network-private-devel-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770287" comment="qt6-network-tls-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770288" comment="qt6-networkinformation-glib-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770289" comment="qt6-networkinformation-nm-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770290" comment="qt6-opengl-devel-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770291" comment="qt6-opengl-private-devel-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770292" comment="qt6-openglwidgets-devel-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770293" comment="qt6-platformsupport-devel-static-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770294" comment="qt6-platformsupport-private-devel-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770295" comment="qt6-platformtheme-gtk3-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770296" comment="qt6-platformtheme-xdgdesktopportal-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770297" comment="qt6-printsupport-cups-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770298" comment="qt6-printsupport-devel-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770299" comment="qt6-printsupport-private-devel-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770300" comment="qt6-sql-devel-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770301" comment="qt6-sql-mysql-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770302" comment="qt6-sql-postgresql-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770303" comment="qt6-sql-private-devel-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770304" comment="qt6-sql-sqlite-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770305" comment="qt6-sql-unixODBC-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770306" comment="qt6-test-devel-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770307" comment="qt6-test-private-devel-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770308" comment="qt6-widgets-devel-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770309" comment="qt6-widgets-private-devel-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770310" comment="qt6-xml-devel-6.4.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770311" comment="qt6-xml-private-devel-6.4.2-150500.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4220" version="1" class="patch">
	<metadata>
		<title>Security update for rmt-server (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1202053" ref_url="https://bugzilla.suse.com/1202053" source="BUGZILLA"/>
		<reference ref_id="1203171" ref_url="https://bugzilla.suse.com/1203171" source="BUGZILLA"/>
		<reference ref_id="1204285" ref_url="https://bugzilla.suse.com/1204285" source="BUGZILLA"/>
		<reference ref_id="1204769" ref_url="https://bugzilla.suse.com/1204769" source="BUGZILLA"/>
		<reference ref_id="1205089" ref_url="https://bugzilla.suse.com/1205089" source="BUGZILLA"/>
		<reference ref_id="1206593" ref_url="https://bugzilla.suse.com/1206593" source="BUGZILLA"/>
		<reference ref_id="1207670" ref_url="https://bugzilla.suse.com/1207670" source="BUGZILLA"/>
		<reference ref_id="1209096" ref_url="https://bugzilla.suse.com/1209096" source="BUGZILLA"/>
		<reference ref_id="1209507" ref_url="https://bugzilla.suse.com/1209507" source="BUGZILLA"/>
		<reference ref_id="1209825" ref_url="https://bugzilla.suse.com/1209825" source="BUGZILLA"/>
		<reference ref_id="1211398" ref_url="https://bugzilla.suse.com/1211398" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-31254" ref_url="https://www.suse.com/security/cve/CVE-2022-31254/" source="CVE"/>
		<reference ref_id="CVE-2023-27530" ref_url="https://www.suse.com/security/cve/CVE-2023-27530/" source="CVE"/>
		<reference ref_id="CVE-2023-28120" ref_url="https://www.suse.com/security/cve/CVE-2023-28120/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2781-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030186.html" source="SUSE-SU"/>
		<description>
This update for rmt-server fixes the following issues:

Update to version 2.13:

- CVE-2023-28120: Fixed a possible XSS Security Vulnerability in bytesliced strings for html_safe (bsc#1209507).
- CVE-2023-27530: Fixed a DoS in multipart mime parsing (bsc#1209096).
- CVE-2022-31254: Fixed escalation vector bug from user _rmt to root in the packaging file (bsc#1204285).

Bug fixes:

- Handle X-Original-URI header, partial fix for (bsc#1211398)
- Force rmt-client-setup-res script to use https (bsc#1209825)
- Mark secrets.yml.key file as part of the rpm to allow seamless downgrades (bsc#1207670)
- Adding -f to the file move command when moving the mirrored directory to its final location (bsc#1203171) 
- Fix %post install of pubcloud subpackage reload of nginx (bsc#1206593)
- Skip warnings regarding nokogiri libxml version mismatch (bsc#1202053)
- Add option to turn off system token support (bsc#1205089)
- Do not retry to import non-existing files in air-gapped mode (bsc#1204769)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-04"/>
	<updated date="2023-07-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202053">SUSE bug 1202053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203171">SUSE bug 1203171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204285">SUSE bug 1204285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204769">SUSE bug 1204769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205089">SUSE bug 1205089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206593">SUSE bug 1206593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207670">SUSE bug 1207670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209096">SUSE bug 1209096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209507">SUSE bug 1209507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209825">SUSE bug 1209825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211398">SUSE bug 1211398</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31254/">CVE-2022-31254 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31254">CVE-2022-31254 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-27530/">CVE-2023-27530 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27530">CVE-2023-27530 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28120/">CVE-2023-28120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28120">CVE-2023-28120 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009770254" comment="rmt-server-2.13-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770255" comment="rmt-server-config-2.13-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770256" comment="rmt-server-pubcloud-2.13-150500.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4221" version="1" class="patch">
	<metadata>
		<title>Security update for libdwarf (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1193102" ref_url="https://bugzilla.suse.com/1193102" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27545" ref_url="https://www.suse.com/security/cve/CVE-2020-27545/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015452.html" source="SUSE-SU"/>
		<description>
This update for libdwarf fixes the following issues:

  - CVE-2020-27545: Fixed corrupted line table being able to crash calling app (bsc#1193102).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-05"/>
	<updated date="2023-07-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193102">SUSE bug 1193102</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27545/">CVE-2020-27545 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27545">CVE-2020-27545 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009770676" comment="libdwarf-devel-20161124-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770677" comment="libdwarf-devel-static-20161124-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770678" comment="libdwarf-doc-20161124-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770679" comment="libdwarf-tools-20161124-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770680" comment="libdwarf1-20161124-150000.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4222" version="1" class="patch">
	<metadata>
		<title>Security update for prometheus-sap_host_exporter (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1208270" ref_url="https://bugzilla.suse.com/1208270" source="BUGZILLA"/>
		<reference ref_id="1211311" ref_url="https://bugzilla.suse.com/1211311" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015461.html" source="SUSE-SU"/>
		<description>
This update for prometheus-sap_host_exporter fixes the following issues:

- rebuild the package with the go 1.20 security release (bsc#1208270).
- fixed exporter package description (bsc#1211311).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-07"/>
	<updated date="2023-07-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208270">SUSE bug 1208270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211311">SUSE bug 1211311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769978" comment="prometheus-sap_host_exporter-0.6.0+git.1685628435.48c4099-150200.4.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4223" version="1" class="patch">
	<metadata>
		<title>Security update for prometheus-ha_cluster_exporter (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1208296" ref_url="https://bugzilla.suse.com/1208296" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015460.html" source="SUSE-SU"/>
		<description>
This update for prometheus-ha_cluster_exporter fixes the following issues:

- rebuild the package with the go 1.20 security release (bsc#1208296).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-07"/>
	<updated date="2023-07-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208296">SUSE bug 1208296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769979" comment="prometheus-ha_cluster_exporter-1.3.3+git.1683650163.1000ba6-150200.3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4224" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1109158" ref_url="https://bugzilla.suse.com/1109158" source="BUGZILLA"/>
		<reference ref_id="1142685" ref_url="https://bugzilla.suse.com/1142685" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1160435" ref_url="https://bugzilla.suse.com/1160435" source="BUGZILLA"/>
		<reference ref_id="1166486" ref_url="https://bugzilla.suse.com/1166486" source="BUGZILLA"/>
		<reference ref_id="1172073" ref_url="https://bugzilla.suse.com/1172073" source="BUGZILLA"/>
		<reference ref_id="1174777" ref_url="https://bugzilla.suse.com/1174777" source="BUGZILLA"/>
		<reference ref_id="1177529" ref_url="https://bugzilla.suse.com/1177529" source="BUGZILLA"/>
		<reference ref_id="1185861" ref_url="https://bugzilla.suse.com/1185861" source="BUGZILLA"/>
		<reference ref_id="1186449" ref_url="https://bugzilla.suse.com/1186449" source="BUGZILLA"/>
		<reference ref_id="1189998" ref_url="https://bugzilla.suse.com/1189998" source="BUGZILLA"/>
		<reference ref_id="1189999" ref_url="https://bugzilla.suse.com/1189999" source="BUGZILLA"/>
		<reference ref_id="1191731" ref_url="https://bugzilla.suse.com/1191731" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1195175" ref_url="https://bugzilla.suse.com/1195175" source="BUGZILLA"/>
		<reference ref_id="1195655" ref_url="https://bugzilla.suse.com/1195655" source="BUGZILLA"/>
		<reference ref_id="1195921" ref_url="https://bugzilla.suse.com/1195921" source="BUGZILLA"/>
		<reference ref_id="1196058" ref_url="https://bugzilla.suse.com/1196058" source="BUGZILLA"/>
		<reference ref_id="1197534" ref_url="https://bugzilla.suse.com/1197534" source="BUGZILLA"/>
		<reference ref_id="1197617" ref_url="https://bugzilla.suse.com/1197617" source="BUGZILLA"/>
		<reference ref_id="1198101" ref_url="https://bugzilla.suse.com/1198101" source="BUGZILLA"/>
		<reference ref_id="1198400" ref_url="https://bugzilla.suse.com/1198400" source="BUGZILLA"/>
		<reference ref_id="1198438" ref_url="https://bugzilla.suse.com/1198438" source="BUGZILLA"/>
		<reference ref_id="1198835" ref_url="https://bugzilla.suse.com/1198835" source="BUGZILLA"/>
		<reference ref_id="1199304" ref_url="https://bugzilla.suse.com/1199304" source="BUGZILLA"/>
		<reference ref_id="1199701" ref_url="https://bugzilla.suse.com/1199701" source="BUGZILLA"/>
		<reference ref_id="1200054" ref_url="https://bugzilla.suse.com/1200054" source="BUGZILLA"/>
		<reference ref_id="1202353" ref_url="https://bugzilla.suse.com/1202353" source="BUGZILLA"/>
		<reference ref_id="1202633" ref_url="https://bugzilla.suse.com/1202633" source="BUGZILLA"/>
		<reference ref_id="1203039" ref_url="https://bugzilla.suse.com/1203039" source="BUGZILLA"/>
		<reference ref_id="1203200" ref_url="https://bugzilla.suse.com/1203200" source="BUGZILLA"/>
		<reference ref_id="1203325" ref_url="https://bugzilla.suse.com/1203325" source="BUGZILLA"/>
		<reference ref_id="1203331" ref_url="https://bugzilla.suse.com/1203331" source="BUGZILLA"/>
		<reference ref_id="1203332" ref_url="https://bugzilla.suse.com/1203332" source="BUGZILLA"/>
		<reference ref_id="1203693" ref_url="https://bugzilla.suse.com/1203693" source="BUGZILLA"/>
		<reference ref_id="1203906" ref_url="https://bugzilla.suse.com/1203906" source="BUGZILLA"/>
		<reference ref_id="1204356" ref_url="https://bugzilla.suse.com/1204356" source="BUGZILLA"/>
		<reference ref_id="1204363" ref_url="https://bugzilla.suse.com/1204363" source="BUGZILLA"/>
		<reference ref_id="1204662" ref_url="https://bugzilla.suse.com/1204662" source="BUGZILLA"/>
		<reference ref_id="1204993" ref_url="https://bugzilla.suse.com/1204993" source="BUGZILLA"/>
		<reference ref_id="1205153" ref_url="https://bugzilla.suse.com/1205153" source="BUGZILLA"/>
		<reference ref_id="1205191" ref_url="https://bugzilla.suse.com/1205191" source="BUGZILLA"/>
		<reference ref_id="1205205" ref_url="https://bugzilla.suse.com/1205205" source="BUGZILLA"/>
		<reference ref_id="1205544" ref_url="https://bugzilla.suse.com/1205544" source="BUGZILLA"/>
		<reference ref_id="1205650" ref_url="https://bugzilla.suse.com/1205650" source="BUGZILLA"/>
		<reference ref_id="1205756" ref_url="https://bugzilla.suse.com/1205756" source="BUGZILLA"/>
		<reference ref_id="1205758" ref_url="https://bugzilla.suse.com/1205758" source="BUGZILLA"/>
		<reference ref_id="1205760" ref_url="https://bugzilla.suse.com/1205760" source="BUGZILLA"/>
		<reference ref_id="1205762" ref_url="https://bugzilla.suse.com/1205762" source="BUGZILLA"/>
		<reference ref_id="1205803" ref_url="https://bugzilla.suse.com/1205803" source="BUGZILLA"/>
		<reference ref_id="1205846" ref_url="https://bugzilla.suse.com/1205846" source="BUGZILLA"/>
		<reference ref_id="1206024" ref_url="https://bugzilla.suse.com/1206024" source="BUGZILLA"/>
		<reference ref_id="1206036" ref_url="https://bugzilla.suse.com/1206036" source="BUGZILLA"/>
		<reference ref_id="1206056" ref_url="https://bugzilla.suse.com/1206056" source="BUGZILLA"/>
		<reference ref_id="1206057" ref_url="https://bugzilla.suse.com/1206057" source="BUGZILLA"/>
		<reference ref_id="1206103" ref_url="https://bugzilla.suse.com/1206103" source="BUGZILLA"/>
		<reference ref_id="1206224" ref_url="https://bugzilla.suse.com/1206224" source="BUGZILLA"/>
		<reference ref_id="1206232" ref_url="https://bugzilla.suse.com/1206232" source="BUGZILLA"/>
		<reference ref_id="1206340" ref_url="https://bugzilla.suse.com/1206340" source="BUGZILLA"/>
		<reference ref_id="1206459" ref_url="https://bugzilla.suse.com/1206459" source="BUGZILLA"/>
		<reference ref_id="1206492" ref_url="https://bugzilla.suse.com/1206492" source="BUGZILLA"/>
		<reference ref_id="1206493" ref_url="https://bugzilla.suse.com/1206493" source="BUGZILLA"/>
		<reference ref_id="1206578" ref_url="https://bugzilla.suse.com/1206578" source="BUGZILLA"/>
		<reference ref_id="1206640" ref_url="https://bugzilla.suse.com/1206640" source="BUGZILLA"/>
		<reference ref_id="1206649" ref_url="https://bugzilla.suse.com/1206649" source="BUGZILLA"/>
		<reference ref_id="1206824" ref_url="https://bugzilla.suse.com/1206824" source="BUGZILLA"/>
		<reference ref_id="1206843" ref_url="https://bugzilla.suse.com/1206843" source="BUGZILLA"/>
		<reference ref_id="1206876" ref_url="https://bugzilla.suse.com/1206876" source="BUGZILLA"/>
		<reference ref_id="1206877" ref_url="https://bugzilla.suse.com/1206877" source="BUGZILLA"/>
		<reference ref_id="1206878" ref_url="https://bugzilla.suse.com/1206878" source="BUGZILLA"/>
		<reference ref_id="1206880" ref_url="https://bugzilla.suse.com/1206880" source="BUGZILLA"/>
		<reference ref_id="1206881" ref_url="https://bugzilla.suse.com/1206881" source="BUGZILLA"/>
		<reference ref_id="1206882" ref_url="https://bugzilla.suse.com/1206882" source="BUGZILLA"/>
		<reference ref_id="1206883" ref_url="https://bugzilla.suse.com/1206883" source="BUGZILLA"/>
		<reference ref_id="1206884" ref_url="https://bugzilla.suse.com/1206884" source="BUGZILLA"/>
		<reference ref_id="1206885" ref_url="https://bugzilla.suse.com/1206885" source="BUGZILLA"/>
		<reference ref_id="1206886" ref_url="https://bugzilla.suse.com/1206886" source="BUGZILLA"/>
		<reference ref_id="1206887" ref_url="https://bugzilla.suse.com/1206887" source="BUGZILLA"/>
		<reference ref_id="1206888" ref_url="https://bugzilla.suse.com/1206888" source="BUGZILLA"/>
		<reference ref_id="1206889" ref_url="https://bugzilla.suse.com/1206889" source="BUGZILLA"/>
		<reference ref_id="1206890" ref_url="https://bugzilla.suse.com/1206890" source="BUGZILLA"/>
		<reference ref_id="1206891" ref_url="https://bugzilla.suse.com/1206891" source="BUGZILLA"/>
		<reference ref_id="1206893" ref_url="https://bugzilla.suse.com/1206893" source="BUGZILLA"/>
		<reference ref_id="1206894" ref_url="https://bugzilla.suse.com/1206894" source="BUGZILLA"/>
		<reference ref_id="1206935" ref_url="https://bugzilla.suse.com/1206935" source="BUGZILLA"/>
		<reference ref_id="1206992" ref_url="https://bugzilla.suse.com/1206992" source="BUGZILLA"/>
		<reference ref_id="1207034" ref_url="https://bugzilla.suse.com/1207034" source="BUGZILLA"/>
		<reference ref_id="1207036" ref_url="https://bugzilla.suse.com/1207036" source="BUGZILLA"/>
		<reference ref_id="1207050" ref_url="https://bugzilla.suse.com/1207050" source="BUGZILLA"/>
		<reference ref_id="1207051" ref_url="https://bugzilla.suse.com/1207051" source="BUGZILLA"/>
		<reference ref_id="1207088" ref_url="https://bugzilla.suse.com/1207088" source="BUGZILLA"/>
		<reference ref_id="1207125" ref_url="https://bugzilla.suse.com/1207125" source="BUGZILLA"/>
		<reference ref_id="1207149" ref_url="https://bugzilla.suse.com/1207149" source="BUGZILLA"/>
		<reference ref_id="1207158" ref_url="https://bugzilla.suse.com/1207158" source="BUGZILLA"/>
		<reference ref_id="1207168" ref_url="https://bugzilla.suse.com/1207168" source="BUGZILLA"/>
		<reference ref_id="1207185" ref_url="https://bugzilla.suse.com/1207185" source="BUGZILLA"/>
		<reference ref_id="1207270" ref_url="https://bugzilla.suse.com/1207270" source="BUGZILLA"/>
		<reference ref_id="1207315" ref_url="https://bugzilla.suse.com/1207315" source="BUGZILLA"/>
		<reference ref_id="1207328" ref_url="https://bugzilla.suse.com/1207328" source="BUGZILLA"/>
		<reference ref_id="1207497" ref_url="https://bugzilla.suse.com/1207497" source="BUGZILLA"/>
		<reference ref_id="1207500" ref_url="https://bugzilla.suse.com/1207500" source="BUGZILLA"/>
		<reference ref_id="1207501" ref_url="https://bugzilla.suse.com/1207501" source="BUGZILLA"/>
		<reference ref_id="1207506" ref_url="https://bugzilla.suse.com/1207506" source="BUGZILLA"/>
		<reference ref_id="1207507" ref_url="https://bugzilla.suse.com/1207507" source="BUGZILLA"/>
		<reference ref_id="1207521" ref_url="https://bugzilla.suse.com/1207521" source="BUGZILLA"/>
		<reference ref_id="1207553" ref_url="https://bugzilla.suse.com/1207553" source="BUGZILLA"/>
		<reference ref_id="1207560" ref_url="https://bugzilla.suse.com/1207560" source="BUGZILLA"/>
		<reference ref_id="1207574" ref_url="https://bugzilla.suse.com/1207574" source="BUGZILLA"/>
		<reference ref_id="1207588" ref_url="https://bugzilla.suse.com/1207588" source="BUGZILLA"/>
		<reference ref_id="1207589" ref_url="https://bugzilla.suse.com/1207589" source="BUGZILLA"/>
		<reference ref_id="1207590" ref_url="https://bugzilla.suse.com/1207590" source="BUGZILLA"/>
		<reference ref_id="1207591" ref_url="https://bugzilla.suse.com/1207591" source="BUGZILLA"/>
		<reference ref_id="1207592" ref_url="https://bugzilla.suse.com/1207592" source="BUGZILLA"/>
		<reference ref_id="1207593" ref_url="https://bugzilla.suse.com/1207593" source="BUGZILLA"/>
		<reference ref_id="1207594" ref_url="https://bugzilla.suse.com/1207594" source="BUGZILLA"/>
		<reference ref_id="1207602" ref_url="https://bugzilla.suse.com/1207602" source="BUGZILLA"/>
		<reference ref_id="1207603" ref_url="https://bugzilla.suse.com/1207603" source="BUGZILLA"/>
		<reference ref_id="1207605" ref_url="https://bugzilla.suse.com/1207605" source="BUGZILLA"/>
		<reference ref_id="1207606" ref_url="https://bugzilla.suse.com/1207606" source="BUGZILLA"/>
		<reference ref_id="1207607" ref_url="https://bugzilla.suse.com/1207607" source="BUGZILLA"/>
		<reference ref_id="1207608" ref_url="https://bugzilla.suse.com/1207608" source="BUGZILLA"/>
		<reference ref_id="1207609" ref_url="https://bugzilla.suse.com/1207609" source="BUGZILLA"/>
		<reference ref_id="1207610" ref_url="https://bugzilla.suse.com/1207610" source="BUGZILLA"/>
		<reference ref_id="1207611" ref_url="https://bugzilla.suse.com/1207611" source="BUGZILLA"/>
		<reference ref_id="1207612" ref_url="https://bugzilla.suse.com/1207612" source="BUGZILLA"/>
		<reference ref_id="1207613" ref_url="https://bugzilla.suse.com/1207613" source="BUGZILLA"/>
		<reference ref_id="1207614" ref_url="https://bugzilla.suse.com/1207614" source="BUGZILLA"/>
		<reference ref_id="1207615" ref_url="https://bugzilla.suse.com/1207615" source="BUGZILLA"/>
		<reference ref_id="1207616" ref_url="https://bugzilla.suse.com/1207616" source="BUGZILLA"/>
		<reference ref_id="1207617" ref_url="https://bugzilla.suse.com/1207617" source="BUGZILLA"/>
		<reference ref_id="1207618" ref_url="https://bugzilla.suse.com/1207618" source="BUGZILLA"/>
		<reference ref_id="1207619" ref_url="https://bugzilla.suse.com/1207619" source="BUGZILLA"/>
		<reference ref_id="1207620" ref_url="https://bugzilla.suse.com/1207620" source="BUGZILLA"/>
		<reference ref_id="1207621" ref_url="https://bugzilla.suse.com/1207621" source="BUGZILLA"/>
		<reference ref_id="1207622" ref_url="https://bugzilla.suse.com/1207622" source="BUGZILLA"/>
		<reference ref_id="1207623" ref_url="https://bugzilla.suse.com/1207623" source="BUGZILLA"/>
		<reference ref_id="1207624" ref_url="https://bugzilla.suse.com/1207624" source="BUGZILLA"/>
		<reference ref_id="1207625" ref_url="https://bugzilla.suse.com/1207625" source="BUGZILLA"/>
		<reference ref_id="1207626" ref_url="https://bugzilla.suse.com/1207626" source="BUGZILLA"/>
		<reference ref_id="1207627" ref_url="https://bugzilla.suse.com/1207627" source="BUGZILLA"/>
		<reference ref_id="1207628" ref_url="https://bugzilla.suse.com/1207628" source="BUGZILLA"/>
		<reference ref_id="1207629" ref_url="https://bugzilla.suse.com/1207629" source="BUGZILLA"/>
		<reference ref_id="1207630" ref_url="https://bugzilla.suse.com/1207630" source="BUGZILLA"/>
		<reference ref_id="1207631" ref_url="https://bugzilla.suse.com/1207631" source="BUGZILLA"/>
		<reference ref_id="1207632" ref_url="https://bugzilla.suse.com/1207632" source="BUGZILLA"/>
		<reference ref_id="1207633" ref_url="https://bugzilla.suse.com/1207633" source="BUGZILLA"/>
		<reference ref_id="1207634" ref_url="https://bugzilla.suse.com/1207634" source="BUGZILLA"/>
		<reference ref_id="1207635" ref_url="https://bugzilla.suse.com/1207635" source="BUGZILLA"/>
		<reference ref_id="1207636" ref_url="https://bugzilla.suse.com/1207636" source="BUGZILLA"/>
		<reference ref_id="1207637" ref_url="https://bugzilla.suse.com/1207637" source="BUGZILLA"/>
		<reference ref_id="1207638" ref_url="https://bugzilla.suse.com/1207638" source="BUGZILLA"/>
		<reference ref_id="1207639" ref_url="https://bugzilla.suse.com/1207639" source="BUGZILLA"/>
		<reference ref_id="1207640" ref_url="https://bugzilla.suse.com/1207640" source="BUGZILLA"/>
		<reference ref_id="1207641" ref_url="https://bugzilla.suse.com/1207641" source="BUGZILLA"/>
		<reference ref_id="1207642" ref_url="https://bugzilla.suse.com/1207642" source="BUGZILLA"/>
		<reference ref_id="1207643" ref_url="https://bugzilla.suse.com/1207643" source="BUGZILLA"/>
		<reference ref_id="1207644" ref_url="https://bugzilla.suse.com/1207644" source="BUGZILLA"/>
		<reference ref_id="1207645" ref_url="https://bugzilla.suse.com/1207645" source="BUGZILLA"/>
		<reference ref_id="1207646" ref_url="https://bugzilla.suse.com/1207646" source="BUGZILLA"/>
		<reference ref_id="1207647" ref_url="https://bugzilla.suse.com/1207647" source="BUGZILLA"/>
		<reference ref_id="1207648" ref_url="https://bugzilla.suse.com/1207648" source="BUGZILLA"/>
		<reference ref_id="1207649" ref_url="https://bugzilla.suse.com/1207649" source="BUGZILLA"/>
		<reference ref_id="1207650" ref_url="https://bugzilla.suse.com/1207650" source="BUGZILLA"/>
		<reference ref_id="1207651" ref_url="https://bugzilla.suse.com/1207651" source="BUGZILLA"/>
		<reference ref_id="1207652" ref_url="https://bugzilla.suse.com/1207652" source="BUGZILLA"/>
		<reference ref_id="1207653" ref_url="https://bugzilla.suse.com/1207653" source="BUGZILLA"/>
		<reference ref_id="1207734" ref_url="https://bugzilla.suse.com/1207734" source="BUGZILLA"/>
		<reference ref_id="1207768" ref_url="https://bugzilla.suse.com/1207768" source="BUGZILLA"/>
		<reference ref_id="1207769" ref_url="https://bugzilla.suse.com/1207769" source="BUGZILLA"/>
		<reference ref_id="1207770" ref_url="https://bugzilla.suse.com/1207770" source="BUGZILLA"/>
		<reference ref_id="1207771" ref_url="https://bugzilla.suse.com/1207771" source="BUGZILLA"/>
		<reference ref_id="1207773" ref_url="https://bugzilla.suse.com/1207773" source="BUGZILLA"/>
		<reference ref_id="1207795" ref_url="https://bugzilla.suse.com/1207795" source="BUGZILLA"/>
		<reference ref_id="1207827" ref_url="https://bugzilla.suse.com/1207827" source="BUGZILLA"/>
		<reference ref_id="1207842" ref_url="https://bugzilla.suse.com/1207842" source="BUGZILLA"/>
		<reference ref_id="1207845" ref_url="https://bugzilla.suse.com/1207845" source="BUGZILLA"/>
		<reference ref_id="1207875" ref_url="https://bugzilla.suse.com/1207875" source="BUGZILLA"/>
		<reference ref_id="1207878" ref_url="https://bugzilla.suse.com/1207878" source="BUGZILLA"/>
		<reference ref_id="1207933" ref_url="https://bugzilla.suse.com/1207933" source="BUGZILLA"/>
		<reference ref_id="1207935" ref_url="https://bugzilla.suse.com/1207935" source="BUGZILLA"/>
		<reference ref_id="1207948" ref_url="https://bugzilla.suse.com/1207948" source="BUGZILLA"/>
		<reference ref_id="1208050" ref_url="https://bugzilla.suse.com/1208050" source="BUGZILLA"/>
		<reference ref_id="1208076" ref_url="https://bugzilla.suse.com/1208076" source="BUGZILLA"/>
		<reference ref_id="1208081" ref_url="https://bugzilla.suse.com/1208081" source="BUGZILLA"/>
		<reference ref_id="1208105" ref_url="https://bugzilla.suse.com/1208105" source="BUGZILLA"/>
		<reference ref_id="1208107" ref_url="https://bugzilla.suse.com/1208107" source="BUGZILLA"/>
		<reference ref_id="1208128" ref_url="https://bugzilla.suse.com/1208128" source="BUGZILLA"/>
		<reference ref_id="1208130" ref_url="https://bugzilla.suse.com/1208130" source="BUGZILLA"/>
		<reference ref_id="1208149" ref_url="https://bugzilla.suse.com/1208149" source="BUGZILLA"/>
		<reference ref_id="1208153" ref_url="https://bugzilla.suse.com/1208153" source="BUGZILLA"/>
		<reference ref_id="1208183" ref_url="https://bugzilla.suse.com/1208183" source="BUGZILLA"/>
		<reference ref_id="1208212" ref_url="https://bugzilla.suse.com/1208212" source="BUGZILLA"/>
		<reference ref_id="1208219" ref_url="https://bugzilla.suse.com/1208219" source="BUGZILLA"/>
		<reference ref_id="1208290" ref_url="https://bugzilla.suse.com/1208290" source="BUGZILLA"/>
		<reference ref_id="1208368" ref_url="https://bugzilla.suse.com/1208368" source="BUGZILLA"/>
		<reference ref_id="1208410" ref_url="https://bugzilla.suse.com/1208410" source="BUGZILLA"/>
		<reference ref_id="1208420" ref_url="https://bugzilla.suse.com/1208420" source="BUGZILLA"/>
		<reference ref_id="1208428" ref_url="https://bugzilla.suse.com/1208428" source="BUGZILLA"/>
		<reference ref_id="1208429" ref_url="https://bugzilla.suse.com/1208429" source="BUGZILLA"/>
		<reference ref_id="1208449" ref_url="https://bugzilla.suse.com/1208449" source="BUGZILLA"/>
		<reference ref_id="1208534" ref_url="https://bugzilla.suse.com/1208534" source="BUGZILLA"/>
		<reference ref_id="1208541" ref_url="https://bugzilla.suse.com/1208541" source="BUGZILLA"/>
		<reference ref_id="1208542" ref_url="https://bugzilla.suse.com/1208542" source="BUGZILLA"/>
		<reference ref_id="1208570" ref_url="https://bugzilla.suse.com/1208570" source="BUGZILLA"/>
		<reference ref_id="1208588" ref_url="https://bugzilla.suse.com/1208588" source="BUGZILLA"/>
		<reference ref_id="1208598" ref_url="https://bugzilla.suse.com/1208598" source="BUGZILLA"/>
		<reference ref_id="1208599" ref_url="https://bugzilla.suse.com/1208599" source="BUGZILLA"/>
		<reference ref_id="1208600" ref_url="https://bugzilla.suse.com/1208600" source="BUGZILLA"/>
		<reference ref_id="1208601" ref_url="https://bugzilla.suse.com/1208601" source="BUGZILLA"/>
		<reference ref_id="1208602" ref_url="https://bugzilla.suse.com/1208602" source="BUGZILLA"/>
		<reference ref_id="1208604" ref_url="https://bugzilla.suse.com/1208604" source="BUGZILLA"/>
		<reference ref_id="1208605" ref_url="https://bugzilla.suse.com/1208605" source="BUGZILLA"/>
		<reference ref_id="1208607" ref_url="https://bugzilla.suse.com/1208607" source="BUGZILLA"/>
		<reference ref_id="1208619" ref_url="https://bugzilla.suse.com/1208619" source="BUGZILLA"/>
		<reference ref_id="1208628" ref_url="https://bugzilla.suse.com/1208628" source="BUGZILLA"/>
		<reference ref_id="1208700" ref_url="https://bugzilla.suse.com/1208700" source="BUGZILLA"/>
		<reference ref_id="1208741" ref_url="https://bugzilla.suse.com/1208741" source="BUGZILLA"/>
		<reference ref_id="1208758" ref_url="https://bugzilla.suse.com/1208758" source="BUGZILLA"/>
		<reference ref_id="1208759" ref_url="https://bugzilla.suse.com/1208759" source="BUGZILLA"/>
		<reference ref_id="1208776" ref_url="https://bugzilla.suse.com/1208776" source="BUGZILLA"/>
		<reference ref_id="1208777" ref_url="https://bugzilla.suse.com/1208777" source="BUGZILLA"/>
		<reference ref_id="1208784" ref_url="https://bugzilla.suse.com/1208784" source="BUGZILLA"/>
		<reference ref_id="1208787" ref_url="https://bugzilla.suse.com/1208787" source="BUGZILLA"/>
		<reference ref_id="1208815" ref_url="https://bugzilla.suse.com/1208815" source="BUGZILLA"/>
		<reference ref_id="1208816" ref_url="https://bugzilla.suse.com/1208816" source="BUGZILLA"/>
		<reference ref_id="1208829" ref_url="https://bugzilla.suse.com/1208829" source="BUGZILLA"/>
		<reference ref_id="1208837" ref_url="https://bugzilla.suse.com/1208837" source="BUGZILLA"/>
		<reference ref_id="1208843" ref_url="https://bugzilla.suse.com/1208843" source="BUGZILLA"/>
		<reference ref_id="1208845" ref_url="https://bugzilla.suse.com/1208845" source="BUGZILLA"/>
		<reference ref_id="1208848" ref_url="https://bugzilla.suse.com/1208848" source="BUGZILLA"/>
		<reference ref_id="1208864" ref_url="https://bugzilla.suse.com/1208864" source="BUGZILLA"/>
		<reference ref_id="1208902" ref_url="https://bugzilla.suse.com/1208902" source="BUGZILLA"/>
		<reference ref_id="1208948" ref_url="https://bugzilla.suse.com/1208948" source="BUGZILLA"/>
		<reference ref_id="1208976" ref_url="https://bugzilla.suse.com/1208976" source="BUGZILLA"/>
		<reference ref_id="1209008" ref_url="https://bugzilla.suse.com/1209008" source="BUGZILLA"/>
		<reference ref_id="1209039" ref_url="https://bugzilla.suse.com/1209039" source="BUGZILLA"/>
		<reference ref_id="1209052" ref_url="https://bugzilla.suse.com/1209052" source="BUGZILLA"/>
		<reference ref_id="1209092" ref_url="https://bugzilla.suse.com/1209092" source="BUGZILLA"/>
		<reference ref_id="1209159" ref_url="https://bugzilla.suse.com/1209159" source="BUGZILLA"/>
		<reference ref_id="1209256" ref_url="https://bugzilla.suse.com/1209256" source="BUGZILLA"/>
		<reference ref_id="1209258" ref_url="https://bugzilla.suse.com/1209258" source="BUGZILLA"/>
		<reference ref_id="1209262" ref_url="https://bugzilla.suse.com/1209262" source="BUGZILLA"/>
		<reference ref_id="1209287" ref_url="https://bugzilla.suse.com/1209287" source="BUGZILLA"/>
		<reference ref_id="1209288" ref_url="https://bugzilla.suse.com/1209288" source="BUGZILLA"/>
		<reference ref_id="1209290" ref_url="https://bugzilla.suse.com/1209290" source="BUGZILLA"/>
		<reference ref_id="1209291" ref_url="https://bugzilla.suse.com/1209291" source="BUGZILLA"/>
		<reference ref_id="1209292" ref_url="https://bugzilla.suse.com/1209292" source="BUGZILLA"/>
		<reference ref_id="1209366" ref_url="https://bugzilla.suse.com/1209366" source="BUGZILLA"/>
		<reference ref_id="1209367" ref_url="https://bugzilla.suse.com/1209367" source="BUGZILLA"/>
		<reference ref_id="1209436" ref_url="https://bugzilla.suse.com/1209436" source="BUGZILLA"/>
		<reference ref_id="1209457" ref_url="https://bugzilla.suse.com/1209457" source="BUGZILLA"/>
		<reference ref_id="1209504" ref_url="https://bugzilla.suse.com/1209504" source="BUGZILLA"/>
		<reference ref_id="1209532" ref_url="https://bugzilla.suse.com/1209532" source="BUGZILLA"/>
		<reference ref_id="1209556" ref_url="https://bugzilla.suse.com/1209556" source="BUGZILLA"/>
		<reference ref_id="1209600" ref_url="https://bugzilla.suse.com/1209600" source="BUGZILLA"/>
		<reference ref_id="1209615" ref_url="https://bugzilla.suse.com/1209615" source="BUGZILLA"/>
		<reference ref_id="1209635" ref_url="https://bugzilla.suse.com/1209635" source="BUGZILLA"/>
		<reference ref_id="1209636" ref_url="https://bugzilla.suse.com/1209636" source="BUGZILLA"/>
		<reference ref_id="1209637" ref_url="https://bugzilla.suse.com/1209637" source="BUGZILLA"/>
		<reference ref_id="1209684" ref_url="https://bugzilla.suse.com/1209684" source="BUGZILLA"/>
		<reference ref_id="1209687" ref_url="https://bugzilla.suse.com/1209687" source="BUGZILLA"/>
		<reference ref_id="1209693" ref_url="https://bugzilla.suse.com/1209693" source="BUGZILLA"/>
		<reference ref_id="1209739" ref_url="https://bugzilla.suse.com/1209739" source="BUGZILLA"/>
		<reference ref_id="1209779" ref_url="https://bugzilla.suse.com/1209779" source="BUGZILLA"/>
		<reference ref_id="1209780" ref_url="https://bugzilla.suse.com/1209780" source="BUGZILLA"/>
		<reference ref_id="1209788" ref_url="https://bugzilla.suse.com/1209788" source="BUGZILLA"/>
		<reference ref_id="1209798" ref_url="https://bugzilla.suse.com/1209798" source="BUGZILLA"/>
		<reference ref_id="1209799" ref_url="https://bugzilla.suse.com/1209799" source="BUGZILLA"/>
		<reference ref_id="1209804" ref_url="https://bugzilla.suse.com/1209804" source="BUGZILLA"/>
		<reference ref_id="1209805" ref_url="https://bugzilla.suse.com/1209805" source="BUGZILLA"/>
		<reference ref_id="1209856" ref_url="https://bugzilla.suse.com/1209856" source="BUGZILLA"/>
		<reference ref_id="1209871" ref_url="https://bugzilla.suse.com/1209871" source="BUGZILLA"/>
		<reference ref_id="1209927" ref_url="https://bugzilla.suse.com/1209927" source="BUGZILLA"/>
		<reference ref_id="1209980" ref_url="https://bugzilla.suse.com/1209980" source="BUGZILLA"/>
		<reference ref_id="1209982" ref_url="https://bugzilla.suse.com/1209982" source="BUGZILLA"/>
		<reference ref_id="1209999" ref_url="https://bugzilla.suse.com/1209999" source="BUGZILLA"/>
		<reference ref_id="1210034" ref_url="https://bugzilla.suse.com/1210034" source="BUGZILLA"/>
		<reference ref_id="1210050" ref_url="https://bugzilla.suse.com/1210050" source="BUGZILLA"/>
		<reference ref_id="1210158" ref_url="https://bugzilla.suse.com/1210158" source="BUGZILLA"/>
		<reference ref_id="1210165" ref_url="https://bugzilla.suse.com/1210165" source="BUGZILLA"/>
		<reference ref_id="1210202" ref_url="https://bugzilla.suse.com/1210202" source="BUGZILLA"/>
		<reference ref_id="1210203" ref_url="https://bugzilla.suse.com/1210203" source="BUGZILLA"/>
		<reference ref_id="1210206" ref_url="https://bugzilla.suse.com/1210206" source="BUGZILLA"/>
		<reference ref_id="1210216" ref_url="https://bugzilla.suse.com/1210216" source="BUGZILLA"/>
		<reference ref_id="1210230" ref_url="https://bugzilla.suse.com/1210230" source="BUGZILLA"/>
		<reference ref_id="1210294" ref_url="https://bugzilla.suse.com/1210294" source="BUGZILLA"/>
		<reference ref_id="1210301" ref_url="https://bugzilla.suse.com/1210301" source="BUGZILLA"/>
		<reference ref_id="1210329" ref_url="https://bugzilla.suse.com/1210329" source="BUGZILLA"/>
		<reference ref_id="1210336" ref_url="https://bugzilla.suse.com/1210336" source="BUGZILLA"/>
		<reference ref_id="1210337" ref_url="https://bugzilla.suse.com/1210337" source="BUGZILLA"/>
		<reference ref_id="1210409" ref_url="https://bugzilla.suse.com/1210409" source="BUGZILLA"/>
		<reference ref_id="1210439" ref_url="https://bugzilla.suse.com/1210439" source="BUGZILLA"/>
		<reference ref_id="1210449" ref_url="https://bugzilla.suse.com/1210449" source="BUGZILLA"/>
		<reference ref_id="1210450" ref_url="https://bugzilla.suse.com/1210450" source="BUGZILLA"/>
		<reference ref_id="1210453" ref_url="https://bugzilla.suse.com/1210453" source="BUGZILLA"/>
		<reference ref_id="1210454" ref_url="https://bugzilla.suse.com/1210454" source="BUGZILLA"/>
		<reference ref_id="1210469" ref_url="https://bugzilla.suse.com/1210469" source="BUGZILLA"/>
		<reference ref_id="1210498" ref_url="https://bugzilla.suse.com/1210498" source="BUGZILLA"/>
		<reference ref_id="1210506" ref_url="https://bugzilla.suse.com/1210506" source="BUGZILLA"/>
		<reference ref_id="1210533" ref_url="https://bugzilla.suse.com/1210533" source="BUGZILLA"/>
		<reference ref_id="1210551" ref_url="https://bugzilla.suse.com/1210551" source="BUGZILLA"/>
		<reference ref_id="1210629" ref_url="https://bugzilla.suse.com/1210629" source="BUGZILLA"/>
		<reference ref_id="1210644" ref_url="https://bugzilla.suse.com/1210644" source="BUGZILLA"/>
		<reference ref_id="1210647" ref_url="https://bugzilla.suse.com/1210647" source="BUGZILLA"/>
		<reference ref_id="1210725" ref_url="https://bugzilla.suse.com/1210725" source="BUGZILLA"/>
		<reference ref_id="1210741" ref_url="https://bugzilla.suse.com/1210741" source="BUGZILLA"/>
		<reference ref_id="1210762" ref_url="https://bugzilla.suse.com/1210762" source="BUGZILLA"/>
		<reference ref_id="1210763" ref_url="https://bugzilla.suse.com/1210763" source="BUGZILLA"/>
		<reference ref_id="1210764" ref_url="https://bugzilla.suse.com/1210764" source="BUGZILLA"/>
		<reference ref_id="1210765" ref_url="https://bugzilla.suse.com/1210765" source="BUGZILLA"/>
		<reference ref_id="1210766" ref_url="https://bugzilla.suse.com/1210766" source="BUGZILLA"/>
		<reference ref_id="1210767" ref_url="https://bugzilla.suse.com/1210767" source="BUGZILLA"/>
		<reference ref_id="1210768" ref_url="https://bugzilla.suse.com/1210768" source="BUGZILLA"/>
		<reference ref_id="1210769" ref_url="https://bugzilla.suse.com/1210769" source="BUGZILLA"/>
		<reference ref_id="1210770" ref_url="https://bugzilla.suse.com/1210770" source="BUGZILLA"/>
		<reference ref_id="1210771" ref_url="https://bugzilla.suse.com/1210771" source="BUGZILLA"/>
		<reference ref_id="1210775" ref_url="https://bugzilla.suse.com/1210775" source="BUGZILLA"/>
		<reference ref_id="1210783" ref_url="https://bugzilla.suse.com/1210783" source="BUGZILLA"/>
		<reference ref_id="1210791" ref_url="https://bugzilla.suse.com/1210791" source="BUGZILLA"/>
		<reference ref_id="1210793" ref_url="https://bugzilla.suse.com/1210793" source="BUGZILLA"/>
		<reference ref_id="1210806" ref_url="https://bugzilla.suse.com/1210806" source="BUGZILLA"/>
		<reference ref_id="1210816" ref_url="https://bugzilla.suse.com/1210816" source="BUGZILLA"/>
		<reference ref_id="1210817" ref_url="https://bugzilla.suse.com/1210817" source="BUGZILLA"/>
		<reference ref_id="1210827" ref_url="https://bugzilla.suse.com/1210827" source="BUGZILLA"/>
		<reference ref_id="1210940" ref_url="https://bugzilla.suse.com/1210940" source="BUGZILLA"/>
		<reference ref_id="1210943" ref_url="https://bugzilla.suse.com/1210943" source="BUGZILLA"/>
		<reference ref_id="1210947" ref_url="https://bugzilla.suse.com/1210947" source="BUGZILLA"/>
		<reference ref_id="1210953" ref_url="https://bugzilla.suse.com/1210953" source="BUGZILLA"/>
		<reference ref_id="1210986" ref_url="https://bugzilla.suse.com/1210986" source="BUGZILLA"/>
		<reference ref_id="1211025" ref_url="https://bugzilla.suse.com/1211025" source="BUGZILLA"/>
		<reference ref_id="1211037" ref_url="https://bugzilla.suse.com/1211037" source="BUGZILLA"/>
		<reference ref_id="1211043" ref_url="https://bugzilla.suse.com/1211043" source="BUGZILLA"/>
		<reference ref_id="1211044" ref_url="https://bugzilla.suse.com/1211044" source="BUGZILLA"/>
		<reference ref_id="1211089" ref_url="https://bugzilla.suse.com/1211089" source="BUGZILLA"/>
		<reference ref_id="1211105" ref_url="https://bugzilla.suse.com/1211105" source="BUGZILLA"/>
		<reference ref_id="1211113" ref_url="https://bugzilla.suse.com/1211113" source="BUGZILLA"/>
		<reference ref_id="1211131" ref_url="https://bugzilla.suse.com/1211131" source="BUGZILLA"/>
		<reference ref_id="1211205" ref_url="https://bugzilla.suse.com/1211205" source="BUGZILLA"/>
		<reference ref_id="1211263" ref_url="https://bugzilla.suse.com/1211263" source="BUGZILLA"/>
		<reference ref_id="1211280" ref_url="https://bugzilla.suse.com/1211280" source="BUGZILLA"/>
		<reference ref_id="1211281" ref_url="https://bugzilla.suse.com/1211281" source="BUGZILLA"/>
		<reference ref_id="1211299" ref_url="https://bugzilla.suse.com/1211299" source="BUGZILLA"/>
		<reference ref_id="1211346" ref_url="https://bugzilla.suse.com/1211346" source="BUGZILLA"/>
		<reference ref_id="1211387" ref_url="https://bugzilla.suse.com/1211387" source="BUGZILLA"/>
		<reference ref_id="1211400" ref_url="https://bugzilla.suse.com/1211400" source="BUGZILLA"/>
		<reference ref_id="1211410" ref_url="https://bugzilla.suse.com/1211410" source="BUGZILLA"/>
		<reference ref_id="1211414" ref_url="https://bugzilla.suse.com/1211414" source="BUGZILLA"/>
		<reference ref_id="1211449" ref_url="https://bugzilla.suse.com/1211449" source="BUGZILLA"/>
		<reference ref_id="1211465" ref_url="https://bugzilla.suse.com/1211465" source="BUGZILLA"/>
		<reference ref_id="1211519" ref_url="https://bugzilla.suse.com/1211519" source="BUGZILLA"/>
		<reference ref_id="1211564" ref_url="https://bugzilla.suse.com/1211564" source="BUGZILLA"/>
		<reference ref_id="1211590" ref_url="https://bugzilla.suse.com/1211590" source="BUGZILLA"/>
		<reference ref_id="1211592" ref_url="https://bugzilla.suse.com/1211592" source="BUGZILLA"/>
		<reference ref_id="1211593" ref_url="https://bugzilla.suse.com/1211593" source="BUGZILLA"/>
		<reference ref_id="1211595" ref_url="https://bugzilla.suse.com/1211595" source="BUGZILLA"/>
		<reference ref_id="1211654" ref_url="https://bugzilla.suse.com/1211654" source="BUGZILLA"/>
		<reference ref_id="1211686" ref_url="https://bugzilla.suse.com/1211686" source="BUGZILLA"/>
		<reference ref_id="1211687" ref_url="https://bugzilla.suse.com/1211687" source="BUGZILLA"/>
		<reference ref_id="1211688" ref_url="https://bugzilla.suse.com/1211688" source="BUGZILLA"/>
		<reference ref_id="1211689" ref_url="https://bugzilla.suse.com/1211689" source="BUGZILLA"/>
		<reference ref_id="1211690" ref_url="https://bugzilla.suse.com/1211690" source="BUGZILLA"/>
		<reference ref_id="1211691" ref_url="https://bugzilla.suse.com/1211691" source="BUGZILLA"/>
		<reference ref_id="1211692" ref_url="https://bugzilla.suse.com/1211692" source="BUGZILLA"/>
		<reference ref_id="1211693" ref_url="https://bugzilla.suse.com/1211693" source="BUGZILLA"/>
		<reference ref_id="1211714" ref_url="https://bugzilla.suse.com/1211714" source="BUGZILLA"/>
		<reference ref_id="1211794" ref_url="https://bugzilla.suse.com/1211794" source="BUGZILLA"/>
		<reference ref_id="1211796" ref_url="https://bugzilla.suse.com/1211796" source="BUGZILLA"/>
		<reference ref_id="1211804" ref_url="https://bugzilla.suse.com/1211804" source="BUGZILLA"/>
		<reference ref_id="1211807" ref_url="https://bugzilla.suse.com/1211807" source="BUGZILLA"/>
		<reference ref_id="1211808" ref_url="https://bugzilla.suse.com/1211808" source="BUGZILLA"/>
		<reference ref_id="1211820" ref_url="https://bugzilla.suse.com/1211820" source="BUGZILLA"/>
		<reference ref_id="1211836" ref_url="https://bugzilla.suse.com/1211836" source="BUGZILLA"/>
		<reference ref_id="1211847" ref_url="https://bugzilla.suse.com/1211847" source="BUGZILLA"/>
		<reference ref_id="1211852" ref_url="https://bugzilla.suse.com/1211852" source="BUGZILLA"/>
		<reference ref_id="1211855" ref_url="https://bugzilla.suse.com/1211855" source="BUGZILLA"/>
		<reference ref_id="1211960" ref_url="https://bugzilla.suse.com/1211960" source="BUGZILLA"/>
		<reference ref_id="1212129" ref_url="https://bugzilla.suse.com/1212129" source="BUGZILLA"/>
		<reference ref_id="1212154" ref_url="https://bugzilla.suse.com/1212154" source="BUGZILLA"/>
		<reference ref_id="1212155" ref_url="https://bugzilla.suse.com/1212155" source="BUGZILLA"/>
		<reference ref_id="1212158" ref_url="https://bugzilla.suse.com/1212158" source="BUGZILLA"/>
		<reference ref_id="1212350" ref_url="https://bugzilla.suse.com/1212350" source="BUGZILLA"/>
		<reference ref_id="1212405" ref_url="https://bugzilla.suse.com/1212405" source="BUGZILLA"/>
		<reference ref_id="1212445" ref_url="https://bugzilla.suse.com/1212445" source="BUGZILLA"/>
		<reference ref_id="1212448" ref_url="https://bugzilla.suse.com/1212448" source="BUGZILLA"/>
		<reference ref_id="1212494" ref_url="https://bugzilla.suse.com/1212494" source="BUGZILLA"/>
		<reference ref_id="1212495" ref_url="https://bugzilla.suse.com/1212495" source="BUGZILLA"/>
		<reference ref_id="1212504" ref_url="https://bugzilla.suse.com/1212504" source="BUGZILLA"/>
		<reference ref_id="1212513" ref_url="https://bugzilla.suse.com/1212513" source="BUGZILLA"/>
		<reference ref_id="1212540" ref_url="https://bugzilla.suse.com/1212540" source="BUGZILLA"/>
		<reference ref_id="1212556" ref_url="https://bugzilla.suse.com/1212556" source="BUGZILLA"/>
		<reference ref_id="1212561" ref_url="https://bugzilla.suse.com/1212561" source="BUGZILLA"/>
		<reference ref_id="1212563" ref_url="https://bugzilla.suse.com/1212563" source="BUGZILLA"/>
		<reference ref_id="1212564" ref_url="https://bugzilla.suse.com/1212564" source="BUGZILLA"/>
		<reference ref_id="1212584" ref_url="https://bugzilla.suse.com/1212584" source="BUGZILLA"/>
		<reference ref_id="1212592" ref_url="https://bugzilla.suse.com/1212592" source="BUGZILLA"/>
		<reference ref_id="1212605" ref_url="https://bugzilla.suse.com/1212605" source="BUGZILLA"/>
		<reference ref_id="1212606" ref_url="https://bugzilla.suse.com/1212606" source="BUGZILLA"/>
		<reference ref_id="1212619" ref_url="https://bugzilla.suse.com/1212619" source="BUGZILLA"/>
		<reference ref_id="1212701" ref_url="https://bugzilla.suse.com/1212701" source="BUGZILLA"/>
		<reference ref_id="1212741" ref_url="https://bugzilla.suse.com/1212741" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588/" source="CVE"/>
		<reference ref_id="CVE-2022-2196" ref_url="https://www.suse.com/security/cve/CVE-2022-2196/" source="CVE"/>
		<reference ref_id="CVE-2022-3523" ref_url="https://www.suse.com/security/cve/CVE-2022-3523/" source="CVE"/>
		<reference ref_id="CVE-2022-36280" ref_url="https://www.suse.com/security/cve/CVE-2022-36280/" source="CVE"/>
		<reference ref_id="CVE-2022-38096" ref_url="https://www.suse.com/security/cve/CVE-2022-38096/" source="CVE"/>
		<reference ref_id="CVE-2022-4269" ref_url="https://www.suse.com/security/cve/CVE-2022-4269/" source="CVE"/>
		<reference ref_id="CVE-2022-45884" ref_url="https://www.suse.com/security/cve/CVE-2022-45884/" source="CVE"/>
		<reference ref_id="CVE-2022-45885" ref_url="https://www.suse.com/security/cve/CVE-2022-45885/" source="CVE"/>
		<reference ref_id="CVE-2022-45886" ref_url="https://www.suse.com/security/cve/CVE-2022-45886/" source="CVE"/>
		<reference ref_id="CVE-2022-45887" ref_url="https://www.suse.com/security/cve/CVE-2022-45887/" source="CVE"/>
		<reference ref_id="CVE-2022-45919" ref_url="https://www.suse.com/security/cve/CVE-2022-45919/" source="CVE"/>
		<reference ref_id="CVE-2022-4744" ref_url="https://www.suse.com/security/cve/CVE-2022-4744/" source="CVE"/>
		<reference ref_id="CVE-2023-0045" ref_url="https://www.suse.com/security/cve/CVE-2023-0045/" source="CVE"/>
		<reference ref_id="CVE-2023-0122" ref_url="https://www.suse.com/security/cve/CVE-2023-0122/" source="CVE"/>
		<reference ref_id="CVE-2023-0179" ref_url="https://www.suse.com/security/cve/CVE-2023-0179/" source="CVE"/>
		<reference ref_id="CVE-2023-0386" ref_url="https://www.suse.com/security/cve/CVE-2023-0386/" source="CVE"/>
		<reference ref_id="CVE-2023-0394" ref_url="https://www.suse.com/security/cve/CVE-2023-0394/" source="CVE"/>
		<reference ref_id="CVE-2023-0461" ref_url="https://www.suse.com/security/cve/CVE-2023-0461/" source="CVE"/>
		<reference ref_id="CVE-2023-0469" ref_url="https://www.suse.com/security/cve/CVE-2023-0469/" source="CVE"/>
		<reference ref_id="CVE-2023-0590" ref_url="https://www.suse.com/security/cve/CVE-2023-0590/" source="CVE"/>
		<reference ref_id="CVE-2023-0597" ref_url="https://www.suse.com/security/cve/CVE-2023-0597/" source="CVE"/>
		<reference ref_id="CVE-2023-1075" ref_url="https://www.suse.com/security/cve/CVE-2023-1075/" source="CVE"/>
		<reference ref_id="CVE-2023-1076" ref_url="https://www.suse.com/security/cve/CVE-2023-1076/" source="CVE"/>
		<reference ref_id="CVE-2023-1077" ref_url="https://www.suse.com/security/cve/CVE-2023-1077/" source="CVE"/>
		<reference ref_id="CVE-2023-1078" ref_url="https://www.suse.com/security/cve/CVE-2023-1078/" source="CVE"/>
		<reference ref_id="CVE-2023-1079" ref_url="https://www.suse.com/security/cve/CVE-2023-1079/" source="CVE"/>
		<reference ref_id="CVE-2023-1095" ref_url="https://www.suse.com/security/cve/CVE-2023-1095/" source="CVE"/>
		<reference ref_id="CVE-2023-1118" ref_url="https://www.suse.com/security/cve/CVE-2023-1118/" source="CVE"/>
		<reference ref_id="CVE-2023-1249" ref_url="https://www.suse.com/security/cve/CVE-2023-1249/" source="CVE"/>
		<reference ref_id="CVE-2023-1382" ref_url="https://www.suse.com/security/cve/CVE-2023-1382/" source="CVE"/>
		<reference ref_id="CVE-2023-1513" ref_url="https://www.suse.com/security/cve/CVE-2023-1513/" source="CVE"/>
		<reference ref_id="CVE-2023-1582" ref_url="https://www.suse.com/security/cve/CVE-2023-1582/" source="CVE"/>
		<reference ref_id="CVE-2023-1583" ref_url="https://www.suse.com/security/cve/CVE-2023-1583/" source="CVE"/>
		<reference ref_id="CVE-2023-1611" ref_url="https://www.suse.com/security/cve/CVE-2023-1611/" source="CVE"/>
		<reference ref_id="CVE-2023-1637" ref_url="https://www.suse.com/security/cve/CVE-2023-1637/" source="CVE"/>
		<reference ref_id="CVE-2023-1652" ref_url="https://www.suse.com/security/cve/CVE-2023-1652/" source="CVE"/>
		<reference ref_id="CVE-2023-1670" ref_url="https://www.suse.com/security/cve/CVE-2023-1670/" source="CVE"/>
		<reference ref_id="CVE-2023-1838" ref_url="https://www.suse.com/security/cve/CVE-2023-1838/" source="CVE"/>
		<reference ref_id="CVE-2023-1855" ref_url="https://www.suse.com/security/cve/CVE-2023-1855/" source="CVE"/>
		<reference ref_id="CVE-2023-1989" ref_url="https://www.suse.com/security/cve/CVE-2023-1989/" source="CVE"/>
		<reference ref_id="CVE-2023-1998" ref_url="https://www.suse.com/security/cve/CVE-2023-1998/" source="CVE"/>
		<reference ref_id="CVE-2023-2002" ref_url="https://www.suse.com/security/cve/CVE-2023-2002/" source="CVE"/>
		<reference ref_id="CVE-2023-21102" ref_url="https://www.suse.com/security/cve/CVE-2023-21102/" source="CVE"/>
		<reference ref_id="CVE-2023-21106" ref_url="https://www.suse.com/security/cve/CVE-2023-21106/" source="CVE"/>
		<reference ref_id="CVE-2023-2124" ref_url="https://www.suse.com/security/cve/CVE-2023-2124/" source="CVE"/>
		<reference ref_id="CVE-2023-2156" ref_url="https://www.suse.com/security/cve/CVE-2023-2156/" source="CVE"/>
		<reference ref_id="CVE-2023-2162" ref_url="https://www.suse.com/security/cve/CVE-2023-2162/" source="CVE"/>
		<reference ref_id="CVE-2023-2176" ref_url="https://www.suse.com/security/cve/CVE-2023-2176/" source="CVE"/>
		<reference ref_id="CVE-2023-2235" ref_url="https://www.suse.com/security/cve/CVE-2023-2235/" source="CVE"/>
		<reference ref_id="CVE-2023-2269" ref_url="https://www.suse.com/security/cve/CVE-2023-2269/" source="CVE"/>
		<reference ref_id="CVE-2023-22998" ref_url="https://www.suse.com/security/cve/CVE-2023-22998/" source="CVE"/>
		<reference ref_id="CVE-2023-23000" ref_url="https://www.suse.com/security/cve/CVE-2023-23000/" source="CVE"/>
		<reference ref_id="CVE-2023-23001" ref_url="https://www.suse.com/security/cve/CVE-2023-23001/" source="CVE"/>
		<reference ref_id="CVE-2023-23004" ref_url="https://www.suse.com/security/cve/CVE-2023-23004/" source="CVE"/>
		<reference ref_id="CVE-2023-23006" ref_url="https://www.suse.com/security/cve/CVE-2023-23006/" source="CVE"/>
		<reference ref_id="CVE-2023-23454" ref_url="https://www.suse.com/security/cve/CVE-2023-23454/" source="CVE"/>
		<reference ref_id="CVE-2023-23455" ref_url="https://www.suse.com/security/cve/CVE-2023-23455/" source="CVE"/>
		<reference ref_id="CVE-2023-2483" ref_url="https://www.suse.com/security/cve/CVE-2023-2483/" source="CVE"/>
		<reference ref_id="CVE-2023-25012" ref_url="https://www.suse.com/security/cve/CVE-2023-25012/" source="CVE"/>
		<reference ref_id="CVE-2023-2513" ref_url="https://www.suse.com/security/cve/CVE-2023-2513/" source="CVE"/>
		<reference ref_id="CVE-2023-26545" ref_url="https://www.suse.com/security/cve/CVE-2023-26545/" source="CVE"/>
		<reference ref_id="CVE-2023-28327" ref_url="https://www.suse.com/security/cve/CVE-2023-28327/" source="CVE"/>
		<reference ref_id="CVE-2023-28410" ref_url="https://www.suse.com/security/cve/CVE-2023-28410/" source="CVE"/>
		<reference ref_id="CVE-2023-28464" ref_url="https://www.suse.com/security/cve/CVE-2023-28464/" source="CVE"/>
		<reference ref_id="CVE-2023-28466" ref_url="https://www.suse.com/security/cve/CVE-2023-28466/" source="CVE"/>
		<reference ref_id="CVE-2023-28866" ref_url="https://www.suse.com/security/cve/CVE-2023-28866/" source="CVE"/>
		<reference ref_id="CVE-2023-3006" ref_url="https://www.suse.com/security/cve/CVE-2023-3006/" source="CVE"/>
		<reference ref_id="CVE-2023-30456" ref_url="https://www.suse.com/security/cve/CVE-2023-30456/" source="CVE"/>
		<reference ref_id="CVE-2023-30772" ref_url="https://www.suse.com/security/cve/CVE-2023-30772/" source="CVE"/>
		<reference ref_id="CVE-2023-31084" ref_url="https://www.suse.com/security/cve/CVE-2023-31084/" source="CVE"/>
		<reference ref_id="CVE-2023-3141" ref_url="https://www.suse.com/security/cve/CVE-2023-3141/" source="CVE"/>
		<reference ref_id="CVE-2023-31436" ref_url="https://www.suse.com/security/cve/CVE-2023-31436/" source="CVE"/>
		<reference ref_id="CVE-2023-3161" ref_url="https://www.suse.com/security/cve/CVE-2023-3161/" source="CVE"/>
		<reference ref_id="CVE-2023-3220" ref_url="https://www.suse.com/security/cve/CVE-2023-3220/" source="CVE"/>
		<reference ref_id="CVE-2023-32233" ref_url="https://www.suse.com/security/cve/CVE-2023-32233/" source="CVE"/>
		<reference ref_id="CVE-2023-33288" ref_url="https://www.suse.com/security/cve/CVE-2023-33288/" source="CVE"/>
		<reference ref_id="CVE-2023-3357" ref_url="https://www.suse.com/security/cve/CVE-2023-3357/" source="CVE"/>
		<reference ref_id="CVE-2023-3358" ref_url="https://www.suse.com/security/cve/CVE-2023-3358/" source="CVE"/>
		<reference ref_id="CVE-2023-33951" ref_url="https://www.suse.com/security/cve/CVE-2023-33951/" source="CVE"/>
		<reference ref_id="CVE-2023-33952" ref_url="https://www.suse.com/security/cve/CVE-2023-33952/" source="CVE"/>
		<reference ref_id="CVE-2023-35788" ref_url="https://www.suse.com/security/cve/CVE-2023-35788/" source="CVE"/>
		<reference ref_id="CVE-2023-35823" ref_url="https://www.suse.com/security/cve/CVE-2023-35823/" source="CVE"/>
		<reference ref_id="CVE-2023-35828" ref_url="https://www.suse.com/security/cve/CVE-2023-35828/" source="CVE"/>
		<reference ref_id="CVE-2023-35829" ref_url="https://www.suse.com/security/cve/CVE-2023-35829/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-24588: Fixed a bug that could allow an adversary to abuse devices that support receiving non-SSP A-MSDU frames to inject arbitrary network packets (bsc#1185861).
- CVE-2022-2196: Fixed a regression related to KVM that allowed for speculative execution attacks (bsc#1206992).
- CVE-2022-3523: Fixed a use after free related to device private page handling (bsc#1204363).
- CVE-2022-36280: Fixed out-of-bounds memory access vulnerability found in vmwgfx driver (bsc#1203332).
- CVE-2022-38096: Fixed NULL-ptr deref in vmw_cmd_dx_define_query() (bsc#1203331).
- CVE-2022-4269: Fixed a flaw was found inside the Traffic Control (TC) subsystem (bsc#1206024).
- CVE-2022-45884: Fixed a use-after-free in dvbdev.c, related to dvb_register_device dynamically allocating fops (bsc#1205756).
- CVE-2022-45885: Fixed a race condition in dvb_frontend.c that could cause a use-after-free when a device is disconnected (bsc#1205758).
- CVE-2022-45886: Fixed a .disconnect versus dvb_device_open race condition in dvb_net.c that lead to a use-after-free (bsc#1205760).
- CVE-2022-45887: Fixed a memory leak in ttusb_dec.c caused by the lack of a dvb_frontend_detach call (bsc#1205762).
- CVE-2022-45919: Fixed a use-after-free in dvb_ca_en50221.c that could occur if there is a disconnect after an open, because of the lack of a wait_event (bsc#1205803).
- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209635).
- CVE-2023-0045: Fixed missing Flush IBP in ib_prctl_set (bsc#1207773).
- CVE-2023-0122: Fixed a NULL pointer dereference vulnerability in nvmet_setup_auth(), that allowed an attacker to perform a Pre-Auth Denial of Service (DoS) attack on a remote machine (bsc#1207050).
- CVE-2023-0179: Fixed incorrect arithmetics when fetching VLAN header bits (bsc#1207034).
- CVE-2023-0386: A flaw was found where unauthorized access to the execution of the setuid file with capabilities was found in the OverlayFS subsystem, when a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allowed a local user to escalate their privileges on the system (bsc#1209615).
- CVE-2023-0394: Fixed a null pointer dereference in the network subcomponent. This flaw could cause system crashes (bsc#1207168).
- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787).
- CVE-2023-0469: Fixed a use-after-free flaw in io_uring/filetable.c in io_install_fixed_file in the io_uring subcomponent (bsc#1207521).
- CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).
- CVE-2023-0597: Fixed lack of randomization of per-cpu entry area in x86/mm (bsc#1207845).
- CVE-2023-1075: Fixed a type confusion in tls_is_tx_ready (bsc#1208598).
- CVE-2023-1076: Fixed incorrect UID assigned to tun/tap sockets (bsc#1208599).
- CVE-2023-1077: Fixed a type confusion in pick_next_rt_entity(), that could cause memory corruption (bsc#1208600).
- CVE-2023-1078: Fixed a heap out-of-bounds write in rds_rm_zerocopy_callback (bsc#1208601).
- CVE-2023-1079: Fixed a use-after-free problem that could have been triggered in asus_kbd_backlight_set when plugging/disconnecting a malicious USB device (bsc#1208604).
- CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777).
- CVE-2023-1118: Fixed a use-after-free bugs caused by ene_tx_irqsim() in media/rc (bsc#1208837).
- CVE-2023-1249: Fixed a use-after-free flaw in the core dump subsystem that allowed a local user to crash the system (bsc#1209039).
- CVE-2023-1382: Fixed denial of service in tipc_conn_close (bsc#1209288).
- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).
- CVE-2023-1582: Fixed soft lockup in __page_mapcount (bsc#1209636).
- CVE-2023-1583: Fixed a NULL pointer dereference in io_file_bitmap_get in io_uring/filetable.c (bsc#1209637).
- CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).
- CVE-2023-1637: Fixed vulnerability that could lead to unauthorized access to CPU memory after resuming CPU from suspend-to-RAM (bsc#1209779, bsc#1198400).
- CVE-2023-1652: Fixed use-after-free that could lead to DoS and information leak in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c (bsc#1209788).
- CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).
- CVE-2023-1838: Fixed an use-after-free flaw in virtio network subcomponent. This flaw could allow a local attacker to crash the system and lead to a kernel information leak problem. (bsc#1210203).
- CVE-2023-1855: Fixed a use after free in xgene_hwmon_remove (bsc#1210202).
- CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336).
- CVE-2023-1998: Fixed a use after free during login when accessing the shost ipaddress (bsc#1210506).
- CVE-2023-2002: Fixed a flaw that allowed an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication (bsc#1210533).
- CVE-2023-21102: Fixed possible bypass of shadow stack protection in __efi_rt_asm_wrapper of efi-rt-wrapper.S (bsc#1212155).
- CVE-2023-21106: Fixed possible memory corruption due to double free in adreno_set_param of adreno_gpu.c (bsc#1211654).
- CVE-2023-2124: Fixed an out-of-bound access in the XFS subsystem that could have lead to denial-of-service or potentially privilege escalation (bsc#1210498).
- CVE-2023-2156: Fixed a flaw in the networking subsystem within the handling of the RPL protocol (bsc#1211131).
- CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647).
- CVE-2023-2176: Fixed an out-of-boundary read in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA (bsc#1210629).
- CVE-2023-2235: Fixed a use-after-free vulnerability in the Performance Events system that could have been exploited to achieve local privilege escalation (bsc#1210986).
- CVE-2023-2269: Fixed a denial-of-service problem due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c (bsc#1210806).
- CVE-2023-22998: Fixed NULL vs IS_ERR checking in virtio_gpu_object_shmem_init (bsc#1208776).
- CVE-2023-23000: Fixed return value of tegra_xusb_find_port_node function phy/tegra (bsc#1208816).
- CVE-2023-23001: Fixed misinterpretation of regulator_get return value in drivers/scsi/ufs/ufs-mediatek.c (bsc#1208829).
- CVE-2023-23004: Fixed misinterpretation of get_sg_table return value (bsc#1208843).
- CVE-2023-23006: Fixed NULL vs IS_ERR checking in dr_domain_init_resources (bsc#1208845).
- CVE-2023-23454: Fixed a type confusion bug in the CBQ network scheduler which could lead to a use-after-free (bsc#1207036).
- CVE-2023-23455: Fixed a denial of service inside atm_tc_enqueue in net/sched/sch_atm.c because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results) (bsc#1207125).
- CVE-2023-2483: Fixed a use after free bug in emac_remove caused by a race condition (bsc#1211037).
- CVE-2023-25012: Fixed a use-after-free in bigben_set_led() (bsc#1207560).
- CVE-2023-2513: Fixed a use-after-free vulnerability in the ext4 filesystem (bsc#1211105).
- CVE-2023-26545: Fixed double free in net/mpls/af_mpls.c upon an allocation failure (bsc#1208700).
- CVE-2023-28327: Fixed DoS in in_skb in unix_diag_get_exact() (bsc#1209290).
- CVE-2023-28410: Fixed improper restriction of operations within the bounds of a memory buffer in some Intel(R) i915 Graphics drivers that may have allowed an authenticated user to potentially enable escalation of privilege via local access (bsc#1211263).
- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/uetooth/hci_conn.c (bsc#1209052).
- CVE-2023-28866: Fixed an out-of-bounds access in net/bluetooth/hci_sync.c because amp_init1[] and amp_init2[] are supposed to have an intentionally invalid element, but did not (bsc#1209780).
- CVE-2023-3006: Fixed a known cache speculation vulnerability, known as Branch History Injection (BHI) or Spectre-BHB, for the new hw AmpereOne (bsc#1211855, bsc#1205153).
- CVE-2023-30456: Fixed an issue in arch/x86/kvm/vmx/nested.c with nVMX on x86_64 lacks consistency checks for CR0 and CR4 (bsc#1210294).
- CVE-2023-30772: Fixed race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329).
- CVE-2023-31084: Fixed a blocking issue in drivers/media/dvb-core/dvb_frontend.c (bsc#1210783).
- CVE-2023-3141: Fixed a use-after-free flaw in r592_remove in drivers/memstick/host/r592.c, that allowed local attackers to crash the system at device disconnect (bsc#1212129).
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210940).
- CVE-2023-3161: Fixed shift-out-of-bounds in fbcon_set_font() (bsc#1212154).
- CVE-2023-3220: Fixed a NULL pointer dereference flaw in dpu_crtc_atomic_check in drivers/gpu/drm/msm/disp/dpu1/dpu_crtc.c lacks check of the return value of kzalloc() (bsc#1212556).
- CVE-2023-32233: Fixed a use-after-free in Netfilter nf_tables when processing batch requests (bsc#1211043).
- CVE-2023-33288: Fixed a use-after-free in bq24190_remove in drivers/power/supply/bq24190_charger.c (bsc#1211590).
- CVE-2023-3357: Fixed a NULL pointer dereference flaw in the AMD Sensor Fusion Hub driver (bsc#1212605).
- CVE-2023-3358: Fixed a NULL pointer dereference flaw in the Integrated Sensor Hub (ISH) driver (bsc#1212606).
- CVE-2023-33951: Fixed a race condition that could have led to an information disclosure inside the vmwgfx driver (bsc#1211593).
- CVE-2023-33952: Fixed a double free that could have led to a local privilege escalation inside the vmwgfx driver (bsc#1211595).
- CVE-2023-35788: Fixed an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets in fl_set_geneve_opt in net/sched/cls_flower.c (bsc#1212504).
- CVE-2023-35823: Fixed a use-after-free flaw in saa7134_finidev in drivers/media/pci/saa7134/saa7134-core.c (bsc#1212494).
- CVE-2023-35828: Fixed a use-after-free flaw in renesas_usb3_remove in drivers/usb/gadget/udc/renesas_usb3.c (bsc#1212513).
- CVE-2023-35829: Fixed a use-after-free flaw in rkvdec_remove in drivers/staging/media/rkvdec/rkvdec.c (bsc#1212495).


The following non-security bugs were fixed:

- Add 42a11bf5c543 cgroup/cpuset: Make cpuset_fork() handle CLONE_INTO_CGROUP properly
- Add Intel QAT GEN 4 inflate and deflate feature (jsc#PED-3692).
- Add a bug reference to two existing drm-hyperv changes (bsc#1211281).
- Add cherry-picked IDs and resort DRM patches (bsc#1206843)
- Add eee878537941 cgroup/cpuset: Add cpuset_can_fork() and cpuset_cancel_fork() methods
- Add missing IP_VERSION checks for psr for DCN314/315 (bsc#1206843)
- Add the kABI workaround for drm_dp_remove_payload() (bsc#1206843)
- Also include kernel-docs build requirements for ALP
- Avoid deadlock for recursive I/O on dm-thin when used as swap (bsc#1177529).
- Avoid unsuported tar parameter on SLE12
- Backport MANA features and support for InfiniBand (jsc#PED-4022).
- Correct the bq24190 fix patch to apply at the right place (CVE-2023-33288 bsc#1211590)
- Delete for regression addressed (bsc#1207933)
- Fixed broken kABI (bsc#1208050 bsc#1211414).
- Fixed an Oops / hang at boot (bsc#1209436).
- Delete patches causing bsc#1209798, which were restored by accident.
- Do not sign the vanilla kernel (bsc#1209008).
- Drop a buggy dvb-core fix patch (bsc#1205758)
- Drop build fix patch causing a regression on aarch64 (bsc#1209798)
- Drop doubly-applied AMDGPU S3 workaround patch (bsc#1206843)
- Enable USB NCM drivers (jsc#PED-3759, jsc#PED-3750).
- Enable kernel modules bttv bt878 and snd-bt878 (jsc#PED-3931).
- Fix bug introduced by broken backport (bsc#1208628).
- Fix error path in pci-hyperv to unlock the mutex state_lock
- Fix missing top level chapter numbers on SLE12 SP5 (bsc#1212158).
- Fix page corruption caused by racy check in __free_pages (bsc#1208149).
- Fix usrmerge error (boo#1211796)
- Include Performance Fix ' swiotlb: split up the global swiotlb lock' (jsc#PED-3259).
- Makefile: link with -z noexecstack --no-warn-rwx-segments (bsc#1203200).
- Makefile: link with -z noexecstack --no-warn-rwx-segments (bsc#1203200).
- Recover the dropped aspm check in AMDGPU driver (bsc#1206843) 
- Remove obsolete KMP obsoletes (bsc#1210469).
- Remove obsolete rpm spec constructs defattr does not need to be specified anymore buildroot does not need to be specified anymore
- Remove orphaned CONFIG_PRINTK_SAFE_LOG_BUF_SHIFT (bsc#1189998 git-fixes).
- Remove usrmerge compatibility symlink in buildroot (boo#1211796) Besides Makefile depmod.sh needs to be patched to prefix /lib/modules. Requires corresponding patch to kmod.
- Replace mkinitrd dependency with dracut (bsc#1202353). Also update mkinitrd refrences in documentation and comments.
- Require suse-kernel-rpm-scriptlets at all times. The kernel packages call scriptlets for each stage, add the dependency to make it clear to libzypp that the scriptlets are required. There is no special dependency for posttrans, these scriptlets run when transactions are resolved. The plain dependency has to be used to support posttrans.
- Revert 'Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work' (git-fixes).
- Revert 'HID: logitech-hidpp: add a module parameter to keep firmware gestures' (git-fixes).
- Revert 'Input: synaptics - switch touchpad on HP Laptop 15-da3001TU to RMI mode' (git-fixes).
- Revert 'KVM: set owner of cpu and vm file operations' (git-fixes)
- Revert 'Makefile: link with -z noexecstack --no-warn-rwx-segments' (bsc#1209798) This reverts commit 34f9acb95470d2d2543e314cadd40a0e1c0ee6e1. It causes problems on aarch64:  ... BuildID Mismatch vmlinux= vmlinux_debuginfo=
- Revert 'PCI: hv: Fix a timing issue which causes kdump to fail occasionally' (bsc#1207185).
- Revert 'Revert 'Makefile: link with -z noexecstack --no-warn-rwx-segments' (bsc#1209798)' This reverts commit 7db37fcbd312a083337d722b2c5543e6bf3a5c70.
- Revert 'Revert 'block, bfq: honor already-setup queue merges'' (git-fixes).
- Revert 'Revert 'x86: link vdso and boot with -z noexecstack' (bsc#1209798)' This reverts commit 26c6d5069004c3a470d53c3a53228ad5d44aa2a5.
- Revert 'Update config files. (bsc#1198101)' This reverts commit 924d3f9978137dc25cb49a295c832a32144bc64e. (bsc#1198101, bsc#1208976) Joey Lee:
- Revert 'block: freeze the queue earlier in del_gendisk' (git-fixes).
- Revert 'bpf: Add support to inline bpf_get_func_ip helper on x86' (git-fixes).
- Revert 'char: pcmcia: cm4000_cs: Replace mdelay with usleep_range in set_protocol' (git-fixes).
- Revert 'crypto: rsa-pkcs1pad - Replace GFP_ATOMIC with GFP_KERNEL in pkcs1pad_encrypt_sign_complete' (git-fixes).
- Revert 'drm/amdgpu: TA unload messages are not actually sent to psp when amdgpu is uninstalled' (bsc#1206843).
- Revert 'pinctrl: amd: Disable and mask interrupts on resume' (git-fixes).
- Revert 'supported.conf: Add a guard for unsupported DVB modules' The fix has been merged to the upstream and will be backported
- Revert 'usb: dwc3: qcom: Keep power domain on to retain controller status' (git-fixes).
- Revert 'x86: link vdso and boot with -z noexecstack' (bsc#1209798) This reverts commit dc30142edffcbb9537e3cc47b176cb97109792c7. It causes problems on aarch64:  ... BuildID Mismatch vmlinux= vmlinux_debuginfo=
- Set references for 'drm/vmwgfx: Validate the box size for the snooped cursor' (bsc#1203332 CVE-2022-36280)
- Set references for 'drm/vmwgfx: Validate the box size for the snooped cursor' (bsc#1203332 CVE-2022-36280)
- Update commit 52b1b46c39ae ('of: Create platform devices for OF framebuffers') (bsc#1212405) Add missing changes to drivers/of/platform.c.
- Update config and supported.conf for MT7921 updates (bsc#1209980)
- Update config and supported.conf for mt76 updates (bsc#1209980)
- Update config files. (bsc#1198101) Using CONFIG_LOCK_DOWN_KERNEL_FORCE_INTEGRITY instead of CONFIG_LOCK_DOWN_KERNEL_FORCE_NONE because Microsoft signed shim be used to load vanilla kernel.
- Update reference for BT fix (CVE-2023-1989 bsc#1210336)
- Update the thunderbolt fix to the latest upstream version (bsc#1210165)
- Update to the latest version of HPWDT for aarch64 environments (jsc#PED-3210).
- [infiniband] READ is 'data destination', not source... (git-fixes)
- [xen] fix 'direction' argument of iov_iter_kvec() (git-fixes).
- 3c589_cs: Fix an error handling path in tc589_probe() (git-fixes).
- acpi / x86: Add support for LPS0 callback handler (git-fixes).
- acpi: Do not build ACPICA with '-Os' (git-fixes).
- acpi: battery: Fix missing NUL-termination with large strings (git-fixes).
- acpi: bus: Ensure that notify handlers are not running after removal (git-fixes).
- acpi: cppc: Add AMD pstate energy performance preference cppc control (bsc#1212445).
- acpi: cppc: Add auto select register read/write support (bsc#1212445).
- acpi: cppc: Disable FIE if registers in PCC regions (bsc#1210953).
- acpi: ec: Fix EC address space handler unregistration (bsc#1207149).
- acpi: ec: Fix ECDT probe ordering issues (bsc#1207149).
- acpi: ec: Fix oops when removing custom query handlers (git-fixes).
- acpi: nfit: fix a potential deadlock during NFIT teardown (git-fixes).
- acpi: pm: Do not turn of unused power resources on the Toshiba Click Mini (git-fixes).
- acpi: pm: s2idle: Add support for upcoming AMD uPEP HID AMDI008 (bsc#1206224).
- acpi: pm: s2idle: Use LPS0 idle if ACPI_FADT_LOW_POWER_S0 is unset (bsc#1206224).
- acpi: pptt: Fix to avoid sleep in the atomic context when PPTT is absent (git-fixes).
- acpi: processor: Fix evaluating _PDC method when running as Xen dom0 (git-fixes).
- acpi: resource: Add IRQ override quirk for LG UltraPC 17U70P (git-fixes).
- acpi: resource: Add IRQ overrides for MAINGEAR Vector Pro 2 models (git-fixes).
- acpi: resource: Add Medion S17413 to IRQ override quirk (git-fixes).
- acpi: resource: Add helper function acpi_dev_get_memory_resources() (git-fixes).
- acpi: resource: Do IRQ override on all TongFang GMxRGxx (git-fixes).
- acpi: sleep: Avoid breaking S3 wakeup due to might_sleep() (git-fixes).
- acpi: tables: Add support for NBFT (bsc#1195921).
- acpi: tables: Add support for NBFT (bsc#1206340).
- acpi: video: Add acpi_video_backlight_use_native() helper (bsc#1206843).
- acpi: video: Allow GPU drivers to report no panels (bsc#1206843).
- acpi: video: Fix Lenovo Ideapad Z570 DMI match (git-fixes).
- acpi: video: Fix missing native backlight on Chromebooks (bsc#1206843).
- acpi: video: Refactor acpi_video_get_backlight_type() a bit (bsc#1203693).
- acpi: viot: Initialize the correct IOMMU fwspec (git-fixes).
- acpi: x86: s2idle: Add a quirk for ASUS ROG Zephyrus G14 (bsc#1206224).
- acpi: x86: s2idle: Add a quirk for ASUS TUF Gaming A17 FA707RE (bsc#1206224).
- acpi: x86: s2idle: Add a quirk for ASUSTeK COMPUTER INC. ROG Flow X13 (bsc#1206224).
- acpi: x86: s2idle: Add a quirk for Lenovo Slim 7 Pro 14ARH7 (bsc#1206224).
- acpi: x86: s2idle: Add another ID to s2idle_dmi_table (bsc#1206224).
- acpi: x86: s2idle: Add module parameter to prefer Microsoft GUID (bsc#1206224).
- acpi: x86: s2idle: Fix a NULL pointer dereference (bsc#1206224).
- acpi: x86: s2idle: Force AMD GUID/_REV 2 on HP Elitebook 865 (bsc#1206224).
- acpi: x86: s2idle: If a new AMD _HID is missing assume Rembrandt (bsc#1206224).
- acpi: x86: s2idle: Move _HID handling for AMD systems into structures (bsc#1206224).
- acpi: x86: s2idle: Stop using AMD specific codepath for Rembrandt+ (bsc#1206224).
- acpi: x86: utils: Add Cezanne to the list for forcing StorageD3Enable (git-fixes).
- acpica: ACPICA: check null return of ACPI_ALLOCATE_ZEROED in acpi_db_display_objects (git-fixes).
- acpica: Allow address_space_handler Install and _REG execution as 2 separate steps (bsc#1207149).
- acpica: Avoid undefined behavior: applying zero offset to null pointer (git-fixes).
- acpica: Drop port I/O validation for some regions (git-fixes).
- acpica: include/acpi/acpixf.h: Fix indentation (bsc#1207149).
- acpica: nsrepair: handle cases without a return value correctly (git-fixes).
- act_mirred: use the backlog for nested calls to mirred ingress (CVE-2022-4269 bsc#1206024).
- af_unix: Get user_ns from in_skb in unix_diag_get_exact() (bsc#1209290 CVE-2023-28327).
- af_unix: Get user_ns from in_skb in unix_diag_get_exact() (bsc#1209290 CVE-2023-28327).
- affs: initialize fsdata in affs_truncate() (git-fixes).
- alarmtimer: Prevent starvation by small intervals and SIG_IGN (git-fixes)
- alsa: asihpi: check pao in control_message() (git-fixes).
- alsa: caiaq: input: Add error handling for unsupported input methods in `snd_usb_caiaq_input_init` (git-fixes).
- alsa: cs46xx: mark snd_cs46xx_download_image as static (git-fixes).
- alsa: emu10k1: do not create old pass-through playback device on Audigy (git-fixes).
- alsa: emu10k1: fix capture interrupt handler unlinking (git-fixes).
- alsa: emux: Avoid potential array out-of-bound in snd_emux_xg_control() (git-fixes).
- alsa: firewire-digi00x: prevent potential use after free (git-fixes).
- alsa: firewire-tascam: add missing unwind goto in snd_tscm_stream_start_duplex() (git-fixes).
- alsa: hda/ca0132: add quirk for EVGA X299 DARK (git-fixes).
- alsa: hda/ca0132: fixup buffer overrun at tuning_ctl_set() (git-fixes).
- alsa: hda/ca0132: minor fix for allocation size (git-fixes).
- alsa: hda/cirrus: Add extra 10 ms delay to allow PLL settle and lock (git-fixes).
- alsa: hda/conexant: Partial revert of a quirk for Lenovo (git-fixes).
- alsa: hda/conexant: add a new hda codec SN6180 (git-fixes).
- alsa: hda/hdmi: Preserve the previous PCM device upon re-enablement (git-fixes).
- alsa: hda/hdmi: disable KAE for Intel DG2 (git-fixes).
- alsa: hda/realtek - fixed wrong gpio assigned (git-fixes).
- alsa: hda/realtek: Add 'Intel Reference board' and 'NUC 13' SSID in the ALC256 (git-fixes).
- alsa: hda/realtek: Add Acer Predator PH315-54 (git-fixes).
- alsa: hda/realtek: Add Lenovo P3 Tower platform (git-fixes).
- alsa: hda/realtek: Add Positivo N14KP6-TG (git-fixes).
- alsa: hda/realtek: Add a quirk for Compaq N14JP6 (git-fixes).
- alsa: hda/realtek: Add a quirk for HP EliteDesk 805 (git-fixes).
- alsa: hda/realtek: Add a quirk for HP Slim Desktop S01 (git-fixes).
- alsa: hda/realtek: Add quirk for 2nd ASUS GU603 (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS ROG G634Z (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS ROG GV601V (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS UM3402 using CS35L41 (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS UM3402YAR using CS35L41 (git-fixes).
- alsa: hda/realtek: Add quirk for Clevo L140AU (git-fixes).
- alsa: hda/realtek: Add quirk for Clevo NS50AU (git-fixes).
- alsa: hda/realtek: Add quirk for Clevo X370SNW (git-fixes).
- alsa: hda/realtek: Add quirk for HP EliteBook G10 laptops (git-fixes).
- alsa: hda/realtek: Add quirk for HP EliteDesk 800 G6 Tower PC (git-fixes).
- alsa: hda/realtek: Add quirk for Lenovo ZhaoYang CF4620Z (git-fixes).
- alsa: hda/realtek: Add quirk for ThinkPad P1 Gen 6 (git-fixes).
- alsa: hda/realtek: Add quirks for ASUS GU604V and GU603V (git-fixes).
- alsa: hda/realtek: Add quirks for Asus ROG 2024 laptops using CS35L41 (git-fixes).
- alsa: hda/realtek: Add quirks for Lenovo Z13/Z16 Gen2 (git-fixes).
- alsa: hda/realtek: Add quirks for some Clevo laptops (git-fixes).
- alsa: hda/realtek: Apply HP B&amp;O top speaker profile to Pavilion 15 (git-fixes).
- alsa: hda/realtek: Enable 4 amplifiers instead of 2 on a HP platform (git-fixes).
- alsa: hda/realtek: Enable headset onLenovo M70/M90 (git-fixes).
- alsa: hda/realtek: Enable mute/micmute LEDs and speaker support for HP Laptops (git-fixes).
- alsa: hda/realtek: Enable mute/micmute LEDs on HP Elitebook, 645 G9 (git-fixes).
- alsa: hda/realtek: Fix mute and micmute LEDs for an HP laptop (git-fixes).
- alsa: hda/realtek: Fix mute and micmute LEDs for yet another HP laptop (git-fixes).
- alsa: hda/realtek: Fix support for Dell Precision 3260 (git-fixes).
- alsa: hda/realtek: Fix the speaker output on Samsung Galaxy Book2 Pro (git-fixes).
- alsa: hda/realtek: Fix the speaker output on Samsung Galaxy Book2 Pro 360 (git-fixes).
- alsa: hda/realtek: Remove specific patch for Dell Precision 3260 (git-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs do not work for a HP platform (git-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs do not work for a HP platform (git-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs, speaker do not work for a HP platform (git-fixes).
- alsa: hda/realtek: fix speaker, mute/micmute LEDs not work on a HP platform (git-fixes).
- alsa: hda/realtek: support HP Pavilion Aero 13-be0xxx Mute LED (git-fixes).
- alsa: hda/sigmatel: add pin overrides for Intel DP45SG motherboard (git-fixes).
- alsa: hda/sigmatel: fix S/PDIF out on Intel D*45* motherboards (git-fixes).
- alsa: hda/via: Avoid potential array out-of-bound in add_secret_dac_path() (git-fixes).
- alsa: hda: Add NVIDIA codec IDs a3 through a7 to patch table (git-fixes).
- alsa: hda: Do not unset preset when cleaning up codec (git-fixes).
- alsa: hda: Fix Oops by 9.1 surround channel names (git-fixes).
- alsa: hda: Fix unhandled register update during auto-suspend period (git-fixes).
- alsa: hda: Glenfly: add HD Audio PCI IDs and HDMI Codec Vendor IDs (git-fixes).
- alsa: hda: Match only Intel devices with CONTROLLER_IN_GPU() (git-fixes).
- alsa: hda: cs35l41: Enable Amp High Pass Filter (git-fixes).
- alsa: hda: intel-dsp-config: add MTL PCI id (git-fixes).
- alsa: hda: patch_realtek: add quirk for Asus N7601ZM (git-fixes).
- alsa: i2c/cs8427: fix iec958 mixer control deactivation (git-fixes).
- alsa: ice1712: Delete unreachable code in aureon_add_controls() (git-fixes).
- alsa: ice1712: Do not left ice-&gt;gpio_mutex locked in aureon_add_controls() (git-fixes).
- alsa: memalloc: Workaround for Xen PV (git-fixes).
- alsa: oss: avoid missing-prototype warnings (git-fixes).
- alsa: pci: lx6464es: fix a debug loop (git-fixes).
- alsa: usb-audio: Add a sample rate workaround for Line6 Pod Go (git-fixes).
- alsa: usb-audio: Add quirk flag for HEM devices to enable native DSD playback (git-fixes).
- alsa: usb-audio: Add quirk for Pioneer DDJ-800 (git-fixes).
- alsa: usb-audio: Fix broken resume due to UAC3 power state (git-fixes).
- alsa: usb-audio: Fix recursive locking at XRUN during syncing (git-fixes).
- alsa: usb-audio: Fix regression on detection of Roland VS-100 (git-fixes).
- alsa: ymfpci: Fix BUG_ON in probe function (git-fixes).
- amdgpu/nv.c: Corrected typo in the video capabilities resolution (git-fixes).
- amdgpu: disable powerpc support for the newer display engine (bsc#1194869).
- amdgpu: fix build on non-DCN platforms (git-fixes).
- apparmor: add a kernel label to use on kernel objects (bsc#1211113).
- applicom: Fix PCI device refcount leak in applicom_init() (git-fixes).
- arch: fix broken BuildID for arm64 and riscv (bsc#1209798).
- arm64/cpufeature: Fix field sign for DIT hwcap detection (git-fixes)
- arm64: Always load shadow stack pointer directly from the task struct (git-fixes)
- arm64: Stash shadow stack pointer in the task struct on interrupt (git-fixes)
- arm64: Treat ESR_ELx as a 64-bit register (git-fixes)
- arm64: atomics: remove LL/SC trampolines (git-fixes)
- arm64: cacheinfo: Fix incorrect assignment of signed error value to (git-fixes)
- arm64: cmpxchg_double*: hazard against entire exchange variable (git-fixes)
- arm64: dts: Add DTS files for bcmbca SoC BCM4912 (git-fixes).
- arm64: dts: Add DTS files for bcmbca SoC BCM63158 (git-fixes).
- arm64: dts: Add DTS files for bcmbca SoC BCM6858 (git-fixes).
- arm64: dts: Add base DTS file for bcmbca device Asus GT-AX6000 (git-fixes).
- arm64: dts: Move BCM4908 dts to bcmbca folder (git-fixes)
- arm64: dts: amlogic: meson-axg: fix SCPI clock dvfs node name (git-fixes).
- arm64: dts: amlogic: meson-gx-libretech-pc: fix update button name (git-fixes).
- arm64: dts: amlogic: meson-gx: add missing SCPI sensors compatible (git-fixes).
- arm64: dts: amlogic: meson-gx: add missing unit address to rng node name (git-fixes).
- arm64: dts: amlogic: meson-gx: fix SCPI clock dvfs node name (git-fixes).
- arm64: dts: amlogic: meson-gxbb-kii-pro: fix led node name (git-fixes).
- arm64: dts: amlogic: meson-gxl-s905d-phicomm-n1: fix led node name (git-fixes).
- arm64: dts: amlogic: meson-gxl-s905d-sml5442tw: drop invalid clock-names property (git-fixes).
- arm64: dts: amlogic: meson-gxl: add missing unit address to eth-phy-mux node name (git-fixes).
- arm64: dts: amlogic: meson-sm1-bananapi-m5: fix adc keys node names (git-fixes).
- arm64: dts: amlogic: meson-sm1-odroid-hc4: fix active fan thermal trip (git-fixes).
- arm64: dts: arm: drop unused interrupt-names in MHU (git-fixes)
- arm64: dts: broadcom: bcm4908: add DT for Netgear RAXE500 (git-fixes).
- arm64: dts: broadcom: bcmbca: bcm4908: fix NAND interrupt name (git-fixes)
- arm64: dts: broadcom: bcmbca: bcm4908: fix procmon nodename (git-fixes)
- arm64: dts: freescale: Fix pca954x i2c-mux node names (git-fixes)
- arm64: dts: imx8-ss-dma: assign default clock rate for lpuarts (git-fixes).
- arm64: dts: imx8m: Align SoC unique ID node unit address (git-fixes).
- arm64: dts: imx8mm-evk: correct pmic clock source (git-fixes).
- arm64: dts: imx8mm-nitrogen-r2: fix WM8960 clock name (git-fixes).
- arm64: dts: imx8mm: Fix pad control for UART1_DTE_RX (git-fixes).
- arm64: dts: imx8mn-beacon: Fix SPI CS pinmux (git-fixes).
- arm64: dts: imx8mn-var-som: fix PHY detection bug by adding deassert (git-fixes)
- arm64: dts: imx8mn: specify #sound-dai-cells for SAI nodes (git-fixes).
- arm64: dts: imx8mp-phycore-som: Remove invalid PMIC property (git-fixes)
- arm64: dts: imx8mp: correct usb clocks (git-fixes)
- arm64: dts: imx8mq-thor96: fix no-mmc property for SDHCI (git-fixes).
- arm64: dts: imx8mq: add mipi csi phy and csi bridge descriptions (git-fixes)
- arm64: dts: imx8mq: fix mipi_csi bidirectional port numbers (git-fixes)
- arm64: dts: imx8qm-mek: correct GPIOs for USDHC2 CD and WP signals (git-fixes).
- arm64: dts: juno: Add missing MHU secure-irq (git-fixes)
- arm64: dts: mediatek: mt7622: Add missing pwm-cells to pwm node (git-fixes).
- arm64: dts: mediatek: mt8183: Fix systimer 13 MHz clock description (git-fixes).
- arm64: dts: meson-axg: Make mmc host controller interrupts level-sensitive (git-fixes).
- arm64: dts: meson-g12-common: Make mmc host controller interrupts level-sensitive (git-fixes).
- arm64: dts: meson-g12-common: specify full DMC range (git-fixes).
- arm64: dts: meson-g12a: Fix internal Ethernet PHY unit name (git-fixes).
- arm64: dts: meson-gx: Fix Ethernet MAC address unit name (git-fixes).
- arm64: dts: meson-gx: Fix the SCPI DVFS node name and unit address (git-fixes).
- arm64: dts: meson-gx: Make mmc host controller interrupts level-sensitive (git-fixes).
- arm64: dts: meson: bananapi-m5: switch VDDIO_C pin to OPEN_DRAIN (git-fixes).
- arm64: dts: meson: remove CPU opps below 1GHz for G12A boards (git-fixes).
- arm64: dts: mt8192: Fix CPU map for single-cluster SoC (git-fixes).
- arm64: dts: qcom: Fix IPQ8074 PCIe PHY nodes (git-fixes).
- arm64: dts: qcom: ipq8074-hk01: enable QMP device, not the PHY node (git-fixes).
- arm64: dts: qcom: ipq8074: Fix the PCI I/O port range (git-fixes).
- arm64: dts: qcom: ipq8074: correct Gen2 PCIe ranges (git-fixes).
- arm64: dts: qcom: ipq8074: correct PCIe QMP PHY output clock names (git-fixes).
- arm64: dts: qcom: ipq8074: correct USB3 QMP PHY-s clock output names (git-fixes).
- arm64: dts: qcom: ipq8074: fix Gen2 PCIe QMP PHY (git-fixes).
- arm64: dts: qcom: ipq8074: fix Gen3 PCIe QMP PHY (git-fixes).
- arm64: dts: qcom: ipq8074: fix Gen3 PCIe node (git-fixes).
- arm64: dts: qcom: ipq8074: fix PCIe PHY serdes size (git-fixes).
- arm64: dts: qcom: msm8992-libra: Add CPU regulators (git-fixes).
- arm64: dts: qcom: msm8992-libra: Fix the memory map (git-fixes).
- arm64: dts: qcom: msm8994-kitakami: drop unit address from PMI8994 regulator (git-fixes).
- arm64: dts: qcom: msm8994-msft-lumia-octagon: drop unit address from PMI8994 regulator (git-fixes).
- arm64: dts: qcom: msm8996: Add missing DWC3 quirks (git-fixes).
- arm64: dts: qcom: msm8996: Fix the PCI I/O port range (git-fixes).
- arm64: dts: qcom: msm8998: Fix stm-stimulus-base reg name (git-fixes).
- arm64: dts: qcom: msm8998: Fix the PCI I/O port range (git-fixes).
- arm64: dts: qcom: pmk8350: Specify PBS register for PON (git-fixes).
- arm64: dts: qcom: pmk8350: Use the correct PON compatible (git-fixes).
- arm64: dts: qcom: qcs404: use symbol names for PCIe resets (git-fixes).
- arm64: dts: qcom: sc7180-lite: Fix SDRAM freq for misidentified sc7180-lite boards (git-fixes).
- arm64: dts: qcom: sc7180-trogdor-lazor: correct trackpad supply (git-fixes).
- arm64: dts: qcom: sc7180: correct SPMI bus address cells (git-fixes).
- arm64: dts: qcom: sc7280: correct SPMI bus address cells (git-fixes).
- arm64: dts: qcom: sdm845-db845c: fix audio codec interrupt pin name (git-fixes).
- arm64: dts: qcom: sdm845: Fix the PCI I/O port range (git-fixes).
- arm64: dts: qcom: sm8150-kumano: Panel framebuffer is 2.5k instead of 4k (git-fixes).
- arm64: dts: qcom: sm8250: Fix the PCI I/O port range (git-fixes).
- arm64: dts: qcom: sm8350: Mark UFS controller as cache coherent (git-fixes).
- arm64: dts: renesas: beacon-renesom: Fix gpio expander reference (git-fixes).
- arm64: dts: renesas: r8a774c0: Remove bogus voltages from OPP table (git-fixes).
- arm64: dts: renesas: r8a77990: Remove bogus voltages from OPP table (git-fixes).
- arm64: dts: rockchip: drop unused LED mode property from rk3328-roc-cc (git-fixes).
- arm64: dts: ti: k3-j7200: Fix wakeup pinmux range (git-fixes).
- arm64: dts: ti: k3-j721e-main: Remove ti,strobe-sel property (git-fixes).
- arm64: efi: Execute runtime services from a dedicated stack (git-fixes).
- arm64: efi: Make efi_rt_lock a raw_spinlock (git-fixes).
- arm64: errata: add detection for AMEVCNTR01 incrementing incorrectly (git-fixes) Enable workaround and fix kABI breakage.
- arm64: kgdb: Set PSTATE.SS to 1 to re-enable single-step (git-fixes)
- arm64: kgdb: Set PSTATE.SS to 1 to re-enable single-step (git-fixes).
- arm64: make is_ttbrX_addr() noinstr-safe (git-fixes)
- arm64: mm: kfence: only handle translation faults (git-fixes)
- arm: 9290/1: uaccess: Fix KASAN false-positives (git-fixes).
- arm: 9295/1: unwind:fix unwind abort for uleb128 case (git-fixes)
- arm: 9296/1: HP Jornada 7XX: fix kernel-doc warnings (git-fixes).
- arm: OMAP1: call platform_device_put() in error case in omap1_dm_timer_init() (git-fixes).
- arm: OMAP2+: Fix memory leak in realtime_counter_init() (git-fixes).
- arm: bcm2835_defconfig: Enable the framebuffer (git-fixes).
- arm: cpu: Switch to arch_cpu_finalize_init() (bsc#1212448).
- arm: defconfig: drop CONFIG_DRM_RCAR_LVDS (git-fixes).
- arm: dts: am5748: keep usb4_tm disabled (git-fixes)
- arm: dts: exynos: Use Exynos5420 compatible for the MIPI video phy (git-fixes).
- arm: dts: exynos: correct HDMI phy compatible in Exynos4 (git-fixes).
- arm: dts: exynos: correct TMU phandle in Exynos4 (git-fixes).
- arm: dts: exynos: correct TMU phandle in Exynos4210 (git-fixes).
- arm: dts: exynos: correct TMU phandle in Exynos5250 (git-fixes).
- arm: dts: exynos: correct TMU phandle in Odroid HC1 (git-fixes).
- arm: dts: exynos: correct TMU phandle in Odroid XU (git-fixes).
- arm: dts: exynos: correct TMU phandle in Odroid XU3 family (git-fixes).
- arm: dts: exynos: correct wr-active property in Exynos3250 Rinato (git-fixes).
- arm: dts: exynos: fix WM8960 clock name in Itop Elite (git-fixes).
- arm: dts: gta04: fix excess dma channel usage (git-fixes).
- arm: dts: imx6sl: tolino-shine2hd: fix usbotg1 pinctrl (git-fixes).
- arm: dts: imx6sll: e60k02: fix usbotg1 pinctrl (git-fixes).
- arm: dts: imx7-colibri-eval-v3: correct can controller comment (git-fixes)
- arm: dts: imx7s: correct iomuxc gpr mux controller cells (git-fixes).
- arm: dts: imx: Fix pca9547 i2c-mux node name (git-fixes).
- arm: dts: qcom: ipq4019: Fix the PCI I/O port range (git-fixes).
- arm: dts: qcom: ipq8064: Fix the PCI I/O port range (git-fixes).
- arm: dts: qcom: ipq8064: reduce pci IO size to 64K (git-fixes).
- arm: dts: qcom: msm8974: add required ranges to OCMEM (git-fixes)
- arm: dts: qcom: sdx55: Add Qcom SMMU-500 as the fallback for IOMMU node (git-fixes).
- arm: dts: rockchip: add power-domains property to dp node on rk3288 (git-fixes).
- arm: dts: rockchip: fix a typo error for rk3288 spdif node (git-fixes).
- arm: dts: s5pv210: correct MIPI CSIS clock name (git-fixes).
- arm: dts: spear320-hmi: correct STMPE GPIO compatible (git-fixes).
- arm: dts: stm32: add missing usbh clock and fix clk order on (git-fixes)
- arm: dts: stm32: use usbphyc ck_usbo_48m as USBH OHCI clock on (git-fixes)
- arm: dts: sun8i: nanopi-duo2: Fix regulator GPIO reference (git-fixes).
- arm: dts: vexpress: add missing cache properties (git-fixes).
- arm: dts: vf610: Fix pca9548 i2c-mux node names (git-fixes).
- arm: imx: Call ida_simple_remove() for ida_simple_get (git-fixes).
- arm: imx: rename DEBUG_IMX21_IMX27_UART to DEBUG_IMX27_UART (git-fixes)
- arm: omap: remove debug-leds driver (git-fixes)
- arm: remove some dead code (git-fixes)
- arm: renumber bits related to _TIF_WORK_MASK (git-fixes)
- arm: s3c: fix s3c64xx_set_timer_source prototype (git-fixes).
- arm: shmobile: rcar-gen2: Add missing of_node_put() (git-fixes)
- arm: zynq: Fix refcount leak in zynq_early_slcr_init (git-fixes).
- asm-generic/io.h: suppress endianness warnings for readq() and writeq() (git-fixes).
- asn.1: Fix check for strdup() success (git-fixes).
- asoc: Intel: Skylake: Fix declaration of enum skl_ch_cfg (git-fixes).
- asoc: Intel: Skylake: Fix driver hang during shutdown (git-fixes).
- asoc: Intel: avs: Access path components under lock (git-fixes).
- asoc: Intel: avs: Fix declaration of enum avs_channel_config (git-fixes).
- asoc: Intel: avs: Implement PCI shutdown (git-fixes).
- asoc: Intel: avs: Use min_t instead of min with cast (git-fixes).
- asoc: Intel: boards: fix spelling in comments (git-fixes).
- asoc: Intel: bytcht_es8316: Drop reference count of ACPI device after use (git-fixes).
- asoc: Intel: bytcht_es8316: Drop reference count of ACPI device after use (git-fixes).
- asoc: Intel: bytcht_es8316: move comment to the right place (git-fixes).
- asoc: Intel: bytcr_rt5640: Add quirk for the Acer Iconia One 7 B1-750 (git-fixes).
- asoc: Intel: bytcr_rt5640: Drop reference count of ACPI device after use (git-fixes).
- asoc: Intel: bytcr_rt5651: Drop reference count of ACPI device after use (git-fixes).
- asoc: Intel: bytcr_wm5102: Drop reference count of ACPI device after use (git-fixes).
- asoc: Intel: soc-acpi-byt: Fix 'WM510205' match no longer working (git-fixes).
- asoc: Intel: soc-acpi: fix copy-paste issue in topology names (git-fixes).
- asoc: Intel: sof_cs42l42: always set dpcm_capture for amplifiers (git-fixes).
- asoc: Intel: sof_es8336: Drop reference count of ACPI device after use (git-fixes).
- asoc: Intel: sof_rt5682: always set dpcm_capture for amplifiers (git-fixes).
- asoc: Intel: sof_sdw: add quirk for Intel 'Rooks County' NUC M15 (git-fixes).
- asoc: SOF: Intel: MTL: Fix the device description (git-fixes).
- asoc: SOF: ipc4-topology: set dmic dai index from copier (git-fixes).
- asoc: SOF: ipc4: Ensure DSP is in D0I0 during sof_ipc4_set_get_data() (git-fixes).
- asoc: adau7118: do not disable regulators on device unbind (git-fixes).
- asoc: amd: acp-es8336: Drop reference count of ACPI device after use (git-fixes).
- asoc: codecs: Change bulk clock voting to optional voting in digital codecs (git-fixes).
- asoc: codecs: lpass: fix incorrect mclk rate (git-fixes).
- asoc: codecs: rx-macro: move clk provider to managed variants (git-fixes).
- asoc: codecs: rx-macro: move to individual clks from bulk (git-fixes).
- asoc: codecs: tx-macro: Fix for KASAN: slab-out-of-bounds (git-fixes).
- asoc: codecs: tx-macro: move clk provider to managed variants (git-fixes).
- asoc: codecs: tx-macro: move to individual clks from bulk (git-fixes).
- asoc: codecs: wsa881x: do not set can_multi_write flag (git-fixes).
- asoc: cs35l41: Only disable internal boost (git-fixes).
- asoc: cs42l56: fix DT probe (git-fixes).
- asoc: dt-bindings: meson: fix gx-card codec node regex (git-fixes).
- asoc: dwc: limit the number of overrun messages (git-fixes).
- asoc: dwc: move DMA init to snd_soc_dai_driver probe() (git-fixes).
- asoc: es8316: Handle optional IRQ assignment (git-fixes).
- asoc: fsl-asoc-card: Fix naming of AC'97 CODEC widgets (git-fixes).
- asoc: fsl_asrc_dma: fix potential null-ptr-deref (git-fixes).
- asoc: fsl_micfil: Correct the number of steps on SX controls (git-fixes).
- asoc: fsl_micfil: Fix error handler with pm_runtime_enable (git-fixes).
- asoc: fsl_mqs: move of_node_put() to the correct location (git-fixes).
- asoc: fsl_sai: Update to modern clocking terminology (git-fixes).
- asoc: fsl_ssi: Rename AC'97 streams to avoid collisions with AC'97 CODEC (git-fixes).
- asoc: hdac_hdmi: use set_stream() instead of set_tdm_slots() (git-fixes).
- asoc: kirkwood: Iterate over array indexes instead of using pointer math (git-fixes).
- asoc: lpass: Fix for KASAN use_after_free out of bounds (git-fixes).
- asoc: mchp-spdifrx: Fix uninitialized use of mr in mchp_spdifrx_hw_params() (git-fixes).
- asoc: mchp-spdifrx: disable all interrupts in mchp_spdifrx_dai_remove() (git-fixes).
- asoc: mchp-spdifrx: fix controls which rely on rsr register (git-fixes).
- asoc: rsnd: Remove unnecessary rsnd_dbg_dai_call() (git-fixes).
- asoc: rsnd: fixup #endif position (git-fixes).
- asoc: rt1308-sdw: add the default value of some registers (git-fixes).
- asoc: rt5682: Disable jack detection interrupt during suspend (git-fixes).
- asoc: rt715-sdca: fix clock stop prepare timeout issue (git-fixes).
- asoc: soc-compress.c: fixup private_data on snd_soc_new_compress() (git-fixes).
- asoc: soc-compress: Inherit atomicity from DAI link for Compress FE (git-fixes).
- asoc: soc-compress: Reposition and add pcm_mutex (git-fixes).
- asoc: soc-dapm.h: fixup warning struct snd_pcm_substream not declared (git-fixes).
- asoc: soc-pcm: fix hw-&gt;formats cleared by soc_pcm_hw_init() for dpcm (git-fixes).
- asoc: soc-pcm: test if a BE can be prepared (git-fixes).
- asoc: ssm2602: Add workaround for playback distortions (git-fixes).
- asoc: tlv320adcx140: fix 'ti,gpio-config' DT property init (git-fixes).
- asoc: topology: Properly access value coming from topology file (git-fixes).
- asoc: topology: Return -ENOMEM on memory allocation failure (git-fixes).
- asoc: zl38060 add gpiolib dependency (git-fixes).
- asoc: zl38060: Remove spurious gpiolib select (git-fixes).
- ata: libata-scsi: Use correct device no in ata_find_dev() (git-fixes).
- ata: libata: Fix sata_down_spd_limit() when no link speed is reported (git-fixes).
- ata: libata: Set __ATA_BASE_SHT max_sectors (git-fixes).
- ata: libata: fix NCQ autosense logic (git-fixes).
- ata: pata_macio: Fix compilation warning (git-fixes).
- ata: pata_octeon_cf: drop kernel-doc notation (git-fixes).
- ata: pata_octeon_cf: fix call to trace_ata_bmdma_stop() (git-fixes).
- ath11k: Fix unexpected return buffer manager error for QCA6390 (git-fixes).
- ath11k_hw_params unremane cal_size (bsc#1199701 CVE-2020-24588).
- ath6kl: Use struct_group() to avoid size-mismatched casting (git-fixes).
- ath9k: hif_usb: simplify if-if to if-else (git-fixes).
- ath9k: htc: clean up statistics macros (git-fixes).
- atm: idt77252: fix kmemleak when rmmod idt77252 (git-fixes).
- audit: update the mailing list in MAINTAINERS (git-fixes).
- auxdisplay: hd44780: Fix potential memory leak in hd44780_remove() (git-fixes).
- backlight: backlight: Fix doc for backlight_device_get_by_name (git-fixes).
- batman-adv: Broken sync while rescheduling delayed work (git-fixes).
- bcache: Revert 'bcache: use bvec_virt' (git-fixes).
- bcache: fix set_at_max_writeback_rate() for multiple attached devices (git-fixes).
- bcache: fix wrong bdev parameter when calling bio_alloc_clone() in do_bio_hook() (git-fixes).
- bcache: put bch_bio_map() back to correct location in journal_write_unlocked() (git-fixes).
- bfq: fix use-after-free in bfq_dispatch_request (git-fixes).
- bfq: fix waker_bfqq inconsistency crash (git-fixes).
- binfmt_elf: Take the mmap lock when walking the VMA list (bsc#1209039 CVE-2023-1249).
- blacklist.conf: the commit might cause regression (bsc#1210947)
- blk-cgroup: fix missing pd_online_fn() while activating policy (git-fixes).
- blk-cgroup: properly pin the parent in blkcg_css_online (bsc#1208105).
- blk-lib: fix blkdev_issue_secure_erase (git-fixes).
- blk-mq: Fix kmemleak in blk_mq_init_allocated_queue (git-fixes).
- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (git-fixes).
- blk-mq: fix possible memleak when register 'hctx' failed (git-fixes).
- blk-mq: run queue no matter whether the request is the last request (git-fixes).
- blk-throttle: fix that io throttle can only work for single bio (git-fixes).
- blk-throttle: prevent overflow while calculating wait time (git-fixes).
- blk-wbt: fix that 'rwb-&gt;wc' is always set to 1 in wbt_init() (git-fixes).
- blktrace: Fix output non-blktrace event when blk_classic option enabled (git-fixes).
- block, bfq: do not move oom_bfqq (git-fixes).
- block, bfq: fix null pointer dereference in bfq_bio_bfqg() (git-fixes).
- block, bfq: fix possible uaf for 'bfqq-&gt;bic' (git-fixes).
- block, bfq: fix uaf for bfqq in bfq_exit_icq_bfqq (git-fixes).
- block, bfq: fix uaf for bfqq in bic_set_bfqq() (git-fixes).
- block, bfq: protect 'bfqd-&gt;queued' by 'bfqd-&gt;lock' (git-fixes).
- block/bfq-iosched.c: use 'false' rather than 'BLK_RW_ASYNC' (git-fixes).
- block/bfq_wf2q: correct weight to ioprio (git-fixes).
- block/bio: remove duplicate append pages code (git-fixes).
- block: Fix possible memory leak for rq_wb on add_disk failure (git-fixes).
- block: add a bdev_max_zone_append_sectors helper (git-fixes).
- block: bio-integrity: Copy flags when bio_integrity_payload is cloned (bsc#1208541).
- block: bio-integrity: Copy flags when bio_integrity_payload is cloned (bsc#1208541).
- block: check minor range in device_add_disk() (git-fixes).
- block: clear -&gt;slave_dir when dropping the main slave_dir reference (git-fixes).
- block: do not allow splitting of a REQ_NOWAIT bio (git-fixes).
- block: do not allow the same type rq_qos add more than once (git-fixes).
- block: do not reverse request order when flushing plug list (bsc#1208588 bsc#1208128).
- block: ensure iov_iter advances for added pages (git-fixes).
- block: fix and cleanup bio_check_ro (git-fixes).
- block: fix default IO priority handling again (git-fixes).
- block: fix infinite loop for invalid zone append (git-fixes).
- block: fix leaking minors of hidden disks (git-fixes).
- block: fix memory leak for elevator on add_disk failure (git-fixes).
- block: fix missing blkcg_bio_issue_init (bsc#1208107).
- block: loop:use kstatfs.f_bsize of backing file to set discard granularity (git-fixes).
- block: mq-deadline: Do not break sequential write streams to zoned HDDs (git-fixes).
- block: mq-deadline: Fix dd_finish_request() for zoned devices (git-fixes).
- block: mq-deadline: Rename deadline_is_seq_writes() (git-fixes).
- block: null_blk: Fix null_zone_write() (git-fixes).
- block: pop cached rq before potentially blocking rq_qos_throttle() (git-fixes).
- block: use bdev_get_queue() in bio.c (git-fixes).
- bluetooth: Add cmd validity checks at the start of hci_sock_ioctl() (git-fixes).
- bluetooth: Fix crash when replugging CSR fake controllers (git-fixes).
- bluetooth: Fix double free in hci_conn_cleanup (bsc#1209052 CVE-2023-28464).
- bluetooth: Fix double free in hci_conn_cleanup (bsc#1209052 CVE-2023-28464).
- bluetooth: Fix l2cap_disconnect_req deadlock (git-fixes).
- bluetooth: Fix race condition in hci_cmd_sync_clear (git-fixes).
- bluetooth: Fix race condition in hidp_session_thread (git-fixes).
- bluetooth: Fix support for Read Local Supported Codecs V2 (git-fixes).
- bluetooth: Fix use-after-free in hci_remove_ltk/hci_remove_irk (git-fixes).
- bluetooth: HCI: Fix global-out-of-bounds (git-fixes).
- bluetooth: ISO: Avoid circular locking dependency (git-fixes).
- bluetooth: ISO: Fix possible circular locking dependency (git-fixes).
- bluetooth: ISO: Fix possible circular locking dependency (git-fixes).
- bluetooth: ISO: do not try to remove CIG if there are bound CIS left (git-fixes).
- bluetooth: ISO: fix timestamped HCI ISO data packet parsing (git-fixes).
- bluetooth: L2CAP: Add missing checks for invalid DCID (git-fixes).
- bluetooth: L2CAP: Fix potential user-after-free (git-fixes).
- bluetooth: L2CAP: Fix responding with wrong PDU type (git-fixes).
- bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp} (git-fixes).
- bluetooth: L2CAP: fix 'bad unlock balance' in l2cap_disconnect_rsp (git-fixes).
- bluetooth: Perform careful capability checks in hci_sock_ioctl() (git-fixes).
- bluetooth: Remove codec id field in vendor codec definition (git-fixes).
- bluetooth: SCO: Fix possible circular locking dependency sco_sock_getsockopt (git-fixes).
- bluetooth: Set ISO Data Path on broadcast sink (git-fixes).
- bluetooth: btintel: Add LE States quirk support (git-fixes).
- bluetooth: btqcomsmd: Fix command timeout after setting BD address (git-fixes).
- bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work (git-fixes).
- bluetooth: btusb: Add VID:PID 13d3:3529 for Realtek RTL8821CE (git-fixes).
- bluetooth: btusb: Remove detection of ISO packets over bulk (git-fixes).
- bluetooth: hci_bcm: Fall back to getting bdaddr from EFI if not set (git-fixes).
- bluetooth: hci_conn: Fix memory leaks (git-fixes).
- bluetooth: hci_conn: Fix not cleaning up on LE Connection failure (git-fixes).
- bluetooth: hci_conn: Refactor hci_bind_bis() since it always succeeds (git-fixes).
- bluetooth: hci_conn: use HCI dst_type values also for BIS (git-fixes).
- bluetooth: hci_core: Detect if an ACL packet is in fact an ISO packet (git-fixes).
- bluetooth: hci_core: fix error handling in hci_register_dev() (git-fixes).
- bluetooth: hci_event: Fix Invalid wait context (git-fixes).
- bluetooth: hci_qca: Fix the teardown problem for real (git-fixes).
- bluetooth: hci_qca: fix debugfs registration (git-fixes).
- bluetooth: hci_qca: get wakeup status from serdev device handle (git-fixes).
- bluetooth: hci_sock: purge socket queues in the destruct() callback (git-fixes).
- bluetooth: hci_sync: Fix not indicating power state (git-fixes).
- bluetooth: hci_sync: Fix use HCI_OP_LE_READ_BUFFER_SIZE_V2 (git-fixes).
- bluetooth: hci_sync: cancel cmd_timer if hci_open failed (git-fixes).
- bnxt: Do not read past the end of test names (jsc#SLE-18978).
- bnxt: prevent skb UAF after handing over to PTP worker (jsc#SLE-18978).
- bnxt_en: Add missing 200G link speed reporting (jsc#SLE-18978).
- bnxt_en: Avoid order-5 memory allocation for TPA data (jsc#SLE-18978).
- bnxt_en: Do not initialize PTP on older P3/P4 chips (jsc#SLE-18978).
- bnxt_en: Do not issue AP reset during ethtool's reset operation (git-fixes).
- bnxt_en: Fix mqprio and XDP ring checking logic (jsc#SLE-18978).
- bnxt_en: Fix reporting of test result in ethtool selftest (jsc#SLE-18978).
- bnxt_en: Fix typo in PCI id to device description string mapping (jsc#SLE-18978).
- bnxt_en: Implement .set_port / .unset_port UDP tunnel callbacks (git-fixes).
- bnxt_en: Prevent kernel panic when receiving unexpected PHC_UPDATE event (git-fixes).
- bnxt_en: Query default VLAN before VNIC setup on a VF (git-fixes).
- bnxt_en: Skip firmware fatal error recovery if chip is not accessible (git-fixes).
- bnxt_en: fix NQ resource accounting during vf creation on 57500 chips (jsc#SLE-18978).
- bnxt_en: set missing reload flag in devlink features (jsc#SLE-18978).
- bpf, arm64: Call build_prologue() first in first JIT pass (git-fixes)
- bpf, arm64: Clear prog-&gt;jited_len along prog-&gt;jited (git-fixes)
- bpf, arm64: Feed byte-offset into bpf line info (git-fixes)
- bpf, arm64: Use emit_addr_mov_i64() for BPF_PSEUDO_FUNC (git-fixes)
- bpf, perf: Use subprog name when reporting subprog ksymbol (git fixes).
- bpf, x64: Factor out emission of REX byte in more cases (git-fixes).
- bpf: Add extra path pointer check to d_path helper (git-fixes).
- bpf: Fix UAF in task local storage (bsc#1212564).
- bpf: Fix a possible task gone issue with bpf_send_signal[_thread]() helpers (git-fixes).
- bpf: Fix extable address check (git-fixes).
- bpf: Fix extable fixup offset (git-fixes).
- bpf: Skip task with pid=1 in send_signal_common() (git-fixes).
- btrfs: fix race between quota disable and quota assign ioctls (CVE-2023-1611 bsc#1209687).
- btrfs: fix race between quota enable and quota rescan ioctl (bsc#1207158).
- btrfs: fix race between quota rescan and disable leading to NULL pointer deref (bsc#1207158).
- btrfs: fix trace event name typo for FLUSH_DELAYED_REFS (git-fixes).
- btrfs: move QUOTA_ENABLED check to rescan_should_stop from btrfs_qgroup_rescan_worker (bsc#1207158).
- btrfs: qgroup: remove duplicated check in adding qgroup relations (bsc#1207158).
- btrfs: qgroup: remove outdated TODO comments (bsc#1207158).
- bus: mhi: host: Fix race between channel preparation and M0 event (git-fixes).
- bus: mhi: host: Range check CHDBOFF and ERDBOFF (git-fixes).
- bus: mhi: host: Remove duplicate ee check for syserr (git-fixes).
- bus: mhi: host: Use mhi_tryset_pm_state() for setting fw error state (git-fixes).
- bus: sunxi-rsb: Fix error handling in sunxi_rsb_init() (git-fixes).
- ca8210: Fix unsigned mac_len comparison with zero in ca8210_skb_tx() (git-fixes).
- ca8210: fix mac_len negative array access (git-fixes).
- can: bcm: bcm_tx_setup(): fix KMSAN uninit-value in vfs_write (git-fixes).
- can: isotp: isotp_ops: fix poll() to not report false EPOLLOUT events (git-fixes).
- can: isotp: recvmsg(): allow MSG_CMSG_COMPAT flag (git-fixes).
- can: j1939: avoid possible use-after-free when j1939_can_rx_register fails (git-fixes).
- can: j1939: change j1939_netdev_lock type to mutex (git-fixes).
- can: j1939: do not wait 250 ms if the same addr was already claimed (git-fixes).
- can: j1939: fix errant WARN_ON_ONCE in j1939_session_deactivate (git-fixes).
- can: j1939: j1939_sk_send_loop_abort(): improved error queue handling in J1939 Socket (git-fixes).
- can: j1939: j1939_tp_tx_dat_new(): fix out-of-bounds memory access (git-fixes).
- can: j1939: recvmsg(): allow MSG_CMSG_COMPAT flag (git-fixes).
- can: kvaser_pciefd: Call request_irq() before enabling interrupts (git-fixes).
- can: kvaser_pciefd: Clear listen-only bit if not explicitly requested (git-fixes).
- can: kvaser_pciefd: Disable interrupts in probe error path (git-fixes).
- can: kvaser_pciefd: Do not send EFLUSH command on TFD interrupt (git-fixes).
- can: kvaser_pciefd: Empty SRB buffer in probe (git-fixes).
- can: kvaser_pciefd: Set CAN_STATE_STOPPED in kvaser_pciefd_stop() (git-fixes).
- can: kvaser_usb: Add struct kvaser_usb_busparams (git-fixes).
- can: kvaser_usb: kvaser_usb_leaf: Get capabilities from device (git-fixes).
- can: kvaser_usb: kvaser_usb_leaf: Handle CMD_ERROR_EVENT (git-fixes).
- can: kvaser_usb: kvaser_usb_leaf: Rename {leaf,usbcan}_cmd_error_event to {leaf,usbcan}_cmd_can_error_event (git-fixes).
- can: kvaser_usb_leaf: Fix overread with an invalid command (git-fixes).
- cassini: Fix a memory leak in the error handling path of cas_init_one() (git-fixes).
- ceph: avoid use-after-free in ceph_fl_release_lock() (jsc#SES-1880).
- ceph: blocklist the kclient when receiving corrupted snap trace (jsc#SES-1880).
- ceph: fix use-after-free bug for inodes when flushing capsnaps (bsc#1212540).
- ceph: flush cap releases when the session is flushed (bsc#1208428).
- ceph: flush cap releases when the session is flushed (jsc#SES-1880).
- ceph: force updating the msg pointer in non-split case (bsc#1211804).
- ceph: move mount state enum to super.h (jsc#SES-1880).
- ceph: remove useless session parameter for check_caps() (jsc#SES-1880).
- ceph: switch to vfs_inode_has_locks() to fix file lock bug (jsc#SES-1880).
- ceph: try to check caps immediately after async creating finishes (jsc#SES-1880).
- ceph: update the time stamps and try to drop the suid/sgid (bsc#1209504).
- ceph: use locks_inode_context helper (jsc#SES-1880).
- cfg80211: allow continuous radar monitoring on offchannel chain (bsc#1209980).
- cfg80211: fix possible NULL pointer dereference in cfg80211_stop_offchan_radar_detection (bsc#1209980).
- cfg80211: implement APIs for dedicated radar detection HW (bsc#1209980).
- cfg80211: move offchan_cac_event to a dedicated work (bsc#1209980).
- cfg80211: rename offchannel_chain structs to background_chain to avoid confusion with ETSI standard (bsc#1209980).
- cfg80211: schedule offchan_cac_abort_wk in cfg80211_radar_event (bsc#1209980).
- cgroup.c: add helper __cset_cgroup_from_root to cleanup duplicated codes (bsc#1203906).
- cgroup/cpuset: Wake up cpuset_attach_wq tasks in cpuset_cancel_attach() (bsc#1210827).
- cgroup: Homogenize cgroup_get_from_id() return value (bsc#1205650).
- cgroup: Honor caller's cgroup NS when resolving path (bsc#1205650).
- cgroup: Make cgroup_get_from_id() prettier (bsc#1205650).
- cgroup: Reorganize css_set_lock and kernfs path processing (bsc#1205650).
- cgroup: Use cgroup_attach_{lock,unlock}() from cgroup_attach_task_all() (bsc#1212563).
- cgroup: always put cset in cgroup_css_set_put_fork (bsc#1212561).
- cgroup: cgroup: Honor caller's cgroup NS when resolving cgroup  id (bsc#1205650).
- cgroup: fix missing cpus_read_{lock,unlock}() in cgroup_transfer_tasks() (bsc#1212563).
- cgroup: reduce dependency on cgroup_mutex (bsc#1205650).
- cifs: Avoid a cast in add_lease_context() (bsc#1193629).
- cifs: Check the lease context if we actually got a lease (bsc#1193629).
- cifs: Convert struct fealist away from 1-element array (bsc#1193629).
- cifs: Fix lost destroy smbd connection when MR allocate failed (git-fixes).
- cifs: Fix oops due to uncleared server-&gt;smbd_conn in reconnect (git-fixes).
- cifs: Fix smb2_set_path_size() (git-fixes).
- cifs: Fix uninitialized memory read in smb3_qfs_tcon() (bsc#1193629).
- cifs: Fix uninitialized memory reads for oparms.mode (bsc#1193629).
- cifs: Fix use-after-free in rdata-&gt;read_into_pages() (git-fixes).
- cifs: Fix warning and UAF when destroy the MR list (git-fixes).
- cifs: Get rid of unneeded conditional in the smb2_get_aead_req() (bsc#1193629).
- cifs: Move the in_send statistic to __smb_send_rqst() (git-fixes).
- cifs: Replace remaining 1-element arrays (bsc#1193629).
- cifs: Replace zero-length arrays with flexible-array members (bsc#1193629).
- cifs: Simplify SMB2_open_init() (bsc#1193629).
- cifs: Simplify SMB2_open_init() (bsc#1193629).
- cifs: Simplify SMB2_open_init() (bsc#1193629).
- cifs: Use kstrtobool() instead of strtobool() (bsc#1193629).
- cifs: append path to open_enter trace event (bsc#1193629).
- cifs: avoid dup prefix path in dfs_get_automount_devname() (git-fixes).
- cifs: avoid potential races when handling multiple dfs tcons (bsc#1208758).
- cifs: avoid race conditions with parallel reconnects (bsc#1193629).
- cifs: avoid races in parallel reconnects in smb1 (bsc#1193629).
- cifs: avoid re-lookups in dfs_cache_find() (bsc#1193629).
- cifs: check only tcon status on tcon related functions (bsc#1193629).
- cifs: do not include page data when checking signature (git-fixes).
- cifs: do not poll server interfaces too regularly (bsc#1193629).
- cifs: do not take exclusive lock for updating target hints (bsc#1193629).
- cifs: do not try to use rdma offload on encrypted connections (bsc#1193629).
- cifs: double lock in cifs_reconnect_tcon() (git-fixes).
- cifs: dump pending mids for all channels in DebugData (bsc#1193629).
- cifs: empty interface list when server does not support query interfaces (bsc#1193629).
- cifs: fix DFS traversal oops without CONFIG_CIFS_DFS_UPCALL (bsc#1193629).
- cifs: fix dentry lookups in directory handle cache (bsc#1193629).
- cifs: fix missing unload_nls() in smb2_reconnect() (bsc#1193629).
- cifs: fix mount on old smb servers (boo#1206935).
- cifs: fix negotiate context parsing (bsc#1210301).
- cifs: fix pcchunk length type in smb2_copychunk_range (bsc#1193629).
- cifs: fix potential deadlock in cache_refresh_path() (git-fixes).
- cifs: fix potential race when tree connecting ipc (bsc#1208758).
- cifs: fix potential use-after-free bugs in TCP_Server_Info::hostname (bsc#1208758).
- cifs: fix return of uninitialized rc in dfs_cache_update_tgthint() (bsc#1193629).
- cifs: fix sharing of DFS connections (bsc#1208758).
- cifs: fix smb1 mount regression (bsc#1193629).
- cifs: fix use-after-free bug in refresh_cache_worker() (bsc#1193629).
- cifs: generate signkey for the channel that's reconnecting (bsc#1193629).
- cifs: get rid of dead check in smb2_reconnect() (bsc#1193629).
- cifs: get rid of dns resolve worker (bsc#1193629).
- cifs: get rid of unneeded conditional in cifs_get_num_sgs() (bsc#1193629).
- cifs: handle cache lookup errors different than -ENOENT (bsc#1193629).
- cifs: improve checking of DFS links over STATUS_OBJECT_NAME_INVALID (git-fixes).
- cifs: introduce cifs_io_parms in smb2_async_writev() (bsc#1193629).
- cifs: lock chan_lock outside match_session (bsc#1193629).
- cifs: mapchars mount option ignored (bsc#1193629).
- cifs: match even the scope id for ipv6 addresses (bsc#1193629).
- cifs: missing lock when updating session status (bsc#1193629).
- cifs: prevent data race in cifs_reconnect_tcon() (bsc#1193629).
- cifs: prevent data race in smb2_reconnect() (bsc#1193629).
- cifs: prevent infinite recursion in CIFSGetDFSRefer() (bsc#1193629).
- cifs: print last update time for interface list (bsc#1193629).
- cifs: print session id while listing open files (bsc#1193629).
- cifs: print smb3_fs_context::source when mounting (bsc#1193629).
- cifs: protect access of TCP_Server_Info::{origin,leaf}_fullpath (bsc#1208758).
- cifs: protect session status check in smb2_reconnect() (bsc#1208758).
- cifs: release leases for deferred close handles when freezing (bsc#1193629).
- cifs: remove duplicate code in __refresh_tcon() (bsc#1193629).
- cifs: remove unneeded 2bytes of padding from smb2 tree connect (bsc#1193629).
- cifs: remove unused function (bsc#1193629).
- cifs: return DFS root session id in DebugData (bsc#1193629).
- cifs: return a single-use cfid if we did not get a lease (bsc#1193629).
- cifs: reuse cifs_match_ipaddr for comparison of dstaddr too (bsc#1193629).
- cifs: sanitize paths in cifs_update_super_prepath (git-fixes).
- cifs: set DFS root session in cifs_get_smb_ses() (bsc#1193629).
- cifs: split out smb3_use_rdma_offload() helper (bsc#1193629).
- cifs: update internal module version number for cifs.ko (bsc#1193629).
- cifs: update ip_addr for ses only for primary chan setup (bsc#1193629).
- cifs: use DFS root session instead of tcon ses (bsc#1193629).
- cifs: use tcon allocation functions even for dummy tcon (git-fixes).
- cifs: use the least loaded channel for sending requests (bsc#1193629).
- clk: HI655X: select REGMAP instead of depending on it (git-fixes).
- clk: Honor CLK_OPS_PARENT_ENABLE in clk_core_is_enabled() (git-fixes).
- clk: add missing of_node_put() in 'assigned-clocks' property parsing (git-fixes).
- clk: at91: clk-sam9x60-pll: fix return value check (git-fixes).
- clk: imx: avoid memory leak (git-fixes).
- clk: ingenic: jz4760: Update M/N/OD calculation algorithm (git-fixes).
- clk: mxl: Add option to override gate clks (git-fixes).
- clk: mxl: Fix a clk entry by adding relevant flags (git-fixes).
- clk: mxl: Remove redundant spinlocks (git-fixes).
- clk: mxl: Switch from direct readl/writel based IO to regmap based IO (git-fixes).
- clk: mxl: syscon_node_to_regmap() returns error pointers (git-fixes).
- clk: qcom: gcc-qcs404: disable gpll[04]_out_aux parents (git-fixes).
- clk: qcom: gcc-qcs404: fix names of the DSI clocks used as parents (git-fixes).
- clk: qcom: gcc-sm8350: fix PCIe PIPE clocks handling (git-fixes).
- clk: qcom: regmap: add PHY clock source implementation (git-fixes).
- clk: ralink: fix 'mt7621_gate_is_enabled()' function (git-fixes).
- clk: renesas: cpg-mssr: Fix use after free if cpg_mssr_common_init() failed (git-fixes).
- clk: renesas: cpg-mssr: Remove superfluous check in resume code (git-fixes).
- clk: rockchip: rk3399: allow clk_cifout to force clk_cifout_src to reparent (git-fixes).
- clk: sprd: set max_register according to mapping range (git-fixes).
- clk: tegra20: fix gcc-7 constant overflow warning (git-fixes).
- clocksource/drivers/cadence-ttc: Fix memory leak in ttc_timer_probe (git-fixes).
- clocksource/drivers/davinci: Fix memory leak in davinci_timer_register when init fails (git-fixes).
- clocksource/drivers/mediatek: Optimize systimer irq clear flow on shutdown (git-fixes).
- clocksource: Suspend the watchdog temporarily when high read latency detected (git-fixes).
- comedi: use menuconfig for main Comedi menu (git-fixes).
- configfs: fix possible memory leak in configfs_create_dir() (git-fixes).
- cpufreq: Add Tegra234 to cpufreq-dt-platdev blocklist (git-fixes).
- cpufreq: CPPC: Fix build error without CONFIG_ACPI_CPPC_CPUFREQ_FIE (bsc#1210953).
- cpufreq: CPPC: Fix performance/frequency conversion (git-fixes).
- cpufreq: armada-37xx: stop using 0 as NULL pointer (git-fixes).
- cpumask: fix incorrect cpumask scanning result checks (bsc#1210943).
- cpumask: fix incorrect cpumask scanning result checks (bsc#1210943).
- crypto: acomp - define max size for destination (jsc#PED-3692)
- crypto: arm64 - Fix unused variable compilation warnings of (git-fixes)
- crypto: caam - Clear some memory in instantiate_rng (git-fixes).
- crypto: ccp - Avoid page allocation failure warning for SEV_GET_ID2 (git-fixes).
- crypto: ccp - Failure on re-initialization due to duplicate sysfs filename (git-fixes).
- crypto: crypto4xx - Call dma_unmap_page when done (git-fixes).
- crypto: drbg - Only fail when jent is unavailable in FIPS mode (git-fixes).
- crypto: drivers - move from strlcpy with unused retval to (jsc#PED-3692)
- crypto: essiv - Handle EBUSY correctly (git-fixes).
- crypto: hisilicon/qm - add missing pci_dev_put() in q_num_set() (git-fixes).
- crypto: qat - Fix unsigned function returning negative (jsc#PED-3692)
- crypto: qat - Removes the x86 dependency on the QAT drivers (jsc#PED-3692)
- crypto: qat - abstract PFVF messages with struct pfvf_message (jsc#PED-3692)
- crypto: qat - abstract PFVF receive logic (jsc#PED-3692)
- crypto: qat - abstract PFVF send function (jsc#PED-3692)
- crypto: qat - add PFVF support to enable the reset of ring (jsc#PED-3692)
- crypto: qat - add PFVF support to the GEN4 host driver (jsc#PED-3692)
- crypto: qat - add VF and PF wrappers to common send function (jsc#PED-3692)
- crypto: qat - add backlog mechanism (jsc#PED-3692)
- crypto: qat - add check for invalid PFVF protocol version 0 (jsc#PED-3692)
- crypto: qat - add check to validate firmware images (jsc#PED-3692)
- crypto: qat - add limit to linked list parsing (jsc#PED-3692)
- crypto: qat - add misc workqueue (jsc#PED-3692)
- crypto: qat - add missing restarting event notification in (jsc#PED-3692)
- crypto: qat - add param check for DH (jsc#PED-3692)
- crypto: qat - add param check for RSA (jsc#PED-3692)
- crypto: qat - add pfvf_ops (jsc#PED-3692)
- crypto: qat - add resubmit logic for decompression (jsc#PED-3692)
- crypto: qat - add support for 401xx devices (jsc#PED-3692)
- crypto: qat - add support for compression for 4xxx (jsc#PED-3692)
- crypto: qat - add the adf_get_pmisc_base() helper function (jsc#PED-3692)
- crypto: qat - allow detection of dc capabilities for 4xxx (jsc#PED-3692)
- crypto: qat - change PFVF ACK behaviour (jsc#PED-3692)
- crypto: qat - change behaviour of (jsc#PED-3692)
- crypto: qat - change bufferlist logic interface (jsc#PED-3692)
- crypto: qat - config VFs based on ring-to-svc mapping (jsc#PED-3692)
- crypto: qat - differentiate between pf2vf and vf2pf offset (jsc#PED-3692)
- crypto: qat - disable AER if an error occurs in probe (jsc#PED-3692)
- crypto: qat - do not handle PFVF sources for qat_4xxx (jsc#PED-3692)
- crypto: qat - do not rely on min version (jsc#PED-3692)
- crypto: qat - enable deflate for QAT GEN4 (jsc#PED-3692)
- crypto: qat - enable power management for QAT GEN4 (jsc#PED-3692)
- crypto: qat - exchange device capabilities over PFVF (jsc#PED-3692)
- crypto: qat - exchange ring-to-service mappings over PFVF (jsc#PED-3692)
- crypto: qat - expose deflate through acomp api for QAT GEN2 (jsc#PED-3692)
- crypto: qat - expose device config through sysfs for 4xxx (jsc#PED-3692)
- crypto: qat - expose device state through sysfs for 4xxx (jsc#PED-3692)
- crypto: qat - extend buffer list interface (jsc#PED-3692)
- crypto: qat - extend crypto capability detection for 4xxx (jsc#PED-3692)
- crypto: qat - extract send and wait from (jsc#PED-3692)
- crypto: qat - fix DMA transfer direction (jsc#PED-3692)
- crypto: qat - fix ETR sources enabled by default on GEN2 (jsc#PED-3692)
- crypto: qat - fix VF IDs in PFVF log messages (jsc#PED-3692)
- crypto: qat - fix a signedness bug in get_service_enabled() (jsc#PED-3692)
- crypto: qat - fix a typo in a comment (jsc#PED-3692)
- crypto: qat - fix access to PFVF interrupt registers for GEN4 (jsc#PED-3692)
- crypto: qat - fix definition of ring reset results (jsc#PED-3692)
- crypto: qat - fix error return code in adf_probe (git-fixes).
- crypto: qat - fix error return code in adf_probe (jsc#PED-3692)
- crypto: qat - fix handling of VF to PF interrupts (jsc#PED-3692)
- crypto: qat - fix initialization of pfvf cap_msg structures (jsc#PED-3692)
- crypto: qat - fix initialization of pfvf rts_map_msg (jsc#PED-3692)
- crypto: qat - fix off-by-one error in PFVF debug print (jsc#PED-3692)
- crypto: qat - fix out-of-bounds read (git-fixes).
- crypto: qat - fix wording and formatting in code comment (jsc#PED-3692)
- crypto: qat - flush vf workqueue at driver removal (jsc#PED-3692)
- crypto: qat - free irq in case of failure (jsc#PED-3692)
- crypto: qat - free irqs only if allocated (jsc#PED-3692)
- crypto: qat - generalize crypto request buffers (jsc#PED-3692)
- crypto: qat - get compression extended capabilities (jsc#PED-3692)
- crypto: qat - handle retries due to collisions in (jsc#PED-3692)
- crypto: qat - honor CRYPTO_TFM_REQ_MAY_SLEEP flag (jsc#PED-3692)
- crypto: qat - improve logging of PFVF messages (jsc#PED-3692)
- crypto: qat - improve the ACK timings in PFVF send (jsc#PED-3692)
- crypto: qat - introduce support for PFVF block messages (jsc#PED-3692)
- crypto: qat - leverage bitfield.h utils for PFVF messages (jsc#PED-3692)
- crypto: qat - leverage read_poll_timeout in PFVF send (jsc#PED-3692)
- crypto: qat - leverage the GEN2 VF mask definiton (jsc#PED-3692)
- crypto: qat - make PFVF message construction direction (jsc#PED-3692)
- crypto: qat - make PFVF send and receive direction agnostic (jsc#PED-3692)
- crypto: qat - move VF message handler to adf_vf2pf_msg.c (jsc#PED-3692)
- crypto: qat - move and rename GEN4 error register definitions (jsc#PED-3692)
- crypto: qat - move interrupt code out of the PFVF handler (jsc#PED-3692)
- crypto: qat - move pfvf collision detection values (jsc#PED-3692)
- crypto: qat - move vf2pf interrupt helpers (jsc#PED-3692)
- crypto: qat - pass the PF2VF responses back to the callers (jsc#PED-3692)
- crypto: qat - prevent spurious MSI interrupt in VF (jsc#PED-3692)
- crypto: qat - re-enable interrupts for legacy PFVF messages (jsc#PED-3692)
- crypto: qat - re-enable registration of algorithms (jsc#PED-3692)
- crypto: qat - refactor PF top half for PFVF (jsc#PED-3692)
- crypto: qat - refactor pfvf version request messages (jsc#PED-3692)
- crypto: qat - refactor submission logic (jsc#PED-3692)
- crypto: qat - relocate PFVF PF related logic (jsc#PED-3692)
- crypto: qat - relocate PFVF VF related logic (jsc#PED-3692)
- crypto: qat - relocate PFVF disabled function (jsc#PED-3692)
- crypto: qat - relocate and rename adf_sriov_prepare_restart() (jsc#PED-3692)
- crypto: qat - relocate backlog related structures (jsc#PED-3692)
- crypto: qat - relocate bufferlist logic (jsc#PED-3692)
- crypto: qat - relocate qat_algs_alloc_flags() (jsc#PED-3692)
- crypto: qat - remove duplicated logic across GEN2 drivers (jsc#PED-3692)
- crypto: qat - remove empty sriov_configure() (jsc#PED-3692)
- crypto: qat - remove line wrapping for pfvf_ops functions (jsc#PED-3692)
- crypto: qat - remove the unnecessary get_vintmsk_offset() (jsc#PED-3692)
- crypto: qat - remove unmatched CPU affinity to cluster IRQ (jsc#PED-3692)
- crypto: qat - remove unnecessary tests to detect PFVF support (jsc#PED-3692)
- crypto: qat - remove unneeded assignment (jsc#PED-3692)
- crypto: qat - remove unneeded braces (jsc#PED-3692)
- crypto: qat - remove unneeded packed attribute (jsc#PED-3692)
- crypto: qat - remove unused PFVF stubs (jsc#PED-3692)
- crypto: qat - rename and relocate GEN2 config function (jsc#PED-3692)
- crypto: qat - rename bufferlist functions (jsc#PED-3692)
- crypto: qat - rename pfvf collision constants (jsc#PED-3692)
- crypto: qat - reorganize PFVF code (jsc#PED-3692)
- crypto: qat - reorganize PFVF protocol definitions (jsc#PED-3692)
- crypto: qat - replace deprecated MSI API (jsc#PED-3692)
- crypto: qat - replace disable_vf2pf_interrupts() (jsc#PED-3692)
- crypto: qat - replace get_current_node() with numa_node_id() (jsc#PED-3692)
- crypto: qat - rework the VF2PF interrupt handling logic (jsc#PED-3692)
- crypto: qat - set CIPHER capability for QAT GEN2 (jsc#PED-3692)
- crypto: qat - set COMPRESSION capability for DH895XCC (jsc#PED-3692)
- crypto: qat - set COMPRESSION capability for QAT GEN2 (jsc#PED-3692)
- crypto: qat - set DMA mask to 48 bits for Gen2 (jsc#PED-3692)
- crypto: qat - set PFVF_MSGORIGIN just before sending (jsc#PED-3692)
- crypto: qat - share adf_enable_pf2vf_comms() from (jsc#PED-3692)
- crypto: qat - simplify adf_enable_aer() (jsc#PED-3692)
- crypto: qat - simplify code and axe the use of a deprecated (jsc#PED-3692)
- crypto: qat - split PFVF message decoding from handling (jsc#PED-3692)
- crypto: qat - stop using iommu_present() (jsc#PED-3692)
- crypto: qat - store the PFVF protocol version of the (jsc#PED-3692)
- crypto: qat - store the ring-to-service mapping (jsc#PED-3692)
- crypto: qat - support fast ACKs in the PFVF protocol (jsc#PED-3692)
- crypto: qat - support the reset of ring pairs on PF (jsc#PED-3692)
- crypto: qat - test PFVF registers for spurious interrupts on (jsc#PED-3692)
- crypto: qat - use enums for PFVF protocol codes (jsc#PED-3692)
- crypto: qat - use hweight for bit counting (jsc#PED-3692)
- crypto: qat - use pre-allocated buffers in datapath (jsc#PED-3692)
- crypto: qat - use reference to structure in dma_map_single() (jsc#PED-3692)
- crypto: qat - use u32 variables in all GEN4 pfvf_ops (jsc#PED-3692)
- crypto: rsa-pkcs1pad - Use akcipher_request_complete (git-fixes).
- crypto: sa2ul - Select CRYPTO_DES (git-fixes).
- crypto: safexcel - Cleanup ring IRQ workqueues on load failure (git-fixes).
- crypto: seqiv - Handle EBUSY correctly (git-fixes).
- crypto: sun8i-ss - Fix a test in sun8i_ss_setup_ivs() (git-fixes).
- crypto: x86/ghash - fix unaligned access in ghash_setkey() (git-fixes).
- crypto: xts - Handle EBUSY correctly (git-fixes).
- cxgb4: fix missing unlock on ETHOFLD desc collect fail path (jsc#SLE-18992).
- debugfs: add debugfs_lookup_and_remove() (git-fixes).
- debugfs: add debugfs_lookup_and_remove() (git-fixes).
- debugfs: fix error when writing negative value to atomic_t debugfs file (git-fixes).
- device-dax: Fix duplicate 'hmem' device registration (bsc#1211400).
- devlink: hold region lock when flushing snapshots (git-fixes).
- dm btree: add a defensive bounds check to insert_at() (git-fixes).
- dm cache: Fix ABBA deadlock between shrink_slab and dm_cache_metadata_abort (git-fixes).
- dm cache: Fix UAF in destroy() (git-fixes).
- dm cache: set needs_check flag after aborting metadata (git-fixes).
- dm clone: Fix UAF in clone_dtr() (git-fixes).
- dm integrity: Fix UAF in dm_integrity_dtr() (git-fixes).
- dm integrity: clear the journal on suspend (git-fixes).
- dm integrity: flush the journal on suspend (git-fixes).
- dm ioctl: fix misbehavior if list_versions races with module loading (git-fixes).
- dm ioctl: fix nested locking in table_clear() to remove deadlock concern (bsc#1210806, CVE-2023-2269).
- dm ioctl: fix nested locking in table_clear() to remove deadlock concern (bsc#1210806, CVE-2023-2269).
- dm ioctl: prevent potential spectre v1 gadget (git-fixes).
- dm raid: fix address sanitizer warning in raid_resume (git-fixes).
- dm raid: fix address sanitizer warning in raid_status (git-fixes).
- dm space map common: add bounds check to sm_ll_lookup_bitmap() (git-fixes).
- dm thin: Fix ABBA deadlock between shrink_slab and dm_pool_abort_metadata (git-fixes).
- dm thin: Fix UAF in run_timer_softirq() (git-fixes).
- dm thin: Use last transaction's pmd-&gt;root when commit failed (git-fixes).
- dm thin: resume even if in FAIL mode (git-fixes).
- dm writecache: set a default MAX_WRITEBACK_JOBS (git-fixes).
- dm: fix alloc_dax error handling in alloc_dev (git-fixes).
- dm: requeue IO if mapping table not yet available (git-fixes).
- dma-buf: Use dma_fence_unwrap_for_each when importing fences (git-fixes).
- dma-buf: cleanup kerneldoc of removed component (git-fixes).
- dma-direct: use is_swiotlb_active in dma_direct_map_page (PED-3259).
- dma-mapping: reformat comment to suppress htmldoc warning (git-fixes).
- dma: gpi: remove spurious unlock in gpi_ch_init (git-fixes).
- dmaengine: at_xdmac: Move the free desc to the tail of the desc list (git-fixes).
- dmaengine: at_xdmac: do not enable all cyclic channels (git-fixes).
- dmaengine: at_xdmac: fix potential Oops in at_xdmac_prep_interleaved() (git-fixes).
- dmaengine: dw-axi-dmac: Do not dereference NULL structure (git-fixes).
- dmaengine: dw-edma: Do not permit non-inc interleaved xfers (git-fixes).
- dmaengine: dw-edma: Drop chancnt initialization (git-fixes).
- dmaengine: dw-edma: Fix invalid interleaved xfers semantics (git-fixes).
- dmaengine: dw-edma: Fix missing src/dst address of interleaved xfers (git-fixes).
- dmaengine: dw-edma: Fix readq_ch() return value truncation (git-fixes).
- dmaengine: dw-edma: Fix to change for continuous transfer (git-fixes).
- dmaengine: dw-edma: Fix to enable to issue dma request on DMA processing (git-fixes).
- dmaengine: idxd: Do not enable user type Work Queue without Shared Virtual Addressing (git-fixes).
- dmaengine: idxd: Only call idxd_enable_system_pasid() if succeeded in enabling SVA feature (git-fixes).
- dmaengine: idxd: Separate user and kernel pasid enabling (git-fixes).
- dmaengine: idxd: Set traffic class values in GRPCFG on DSA 2.0 (git-fixes).
- dmaengine: imx-sdma: Fix a possible memory leak in sdma_transfer_init (git-fixes).
- dmaengine: mv_xor_v2: Fix an error code (git-fixes).
- dmaengine: pl330: rename _start to prevent build error (git-fixes).
- dmaengine: ptdma: check for null desc before calling pt_cmd_callback (git-fixes).
- dmaengine: sf-pdma: pdma_desc memory leak fix (git-fixes).
- dmaengine: tegra: Fix memory leak in terminate_all() (git-fixes).
- do not reuse connection if share marked as isolated (bsc#1193629).
- docs/memory-barriers.txt: Add a missed closing parenthesis (git-fixes).
- docs/scripts/gdb: add necessary make scripts_gdb step (git-fixes).
- docs: Correct missing 'd_' prefix for dentry_operations member d_weak_revalidate (git-fixes).
- docs: driver-api: firmware_loader: fix missing argument in usage example (git-fixes).
- docs: ftrace: fix a issue with duplicated subtitle number (git-fixes).
- docs: gdbmacros: print newest record (git-fixes).
- docs: networking: fix x25-iface.rst heading &amp; index order (git-fixes).
- documentation/filesystems: ramfs-rootfs-initramfs: use :Author: (git-fixes).
- documentation/filesystems: sharedsubtree: add section headings (git-fixes).
- documentation/hw-vuln: Document the interaction between IBRS and STIBP (git-fixes).
- documentation: devlink: add add devlink-selftests to the table of contents (git-fixes).
- documentation: devlink: mlx5.rst: Fix htmldoc build warning (git-fixes).
- documentation: simplify and clarify DCO contribution example language (git-fixes).
- driver core: Do not require dynamic_debug for initcall_debug probe timing (git-fixes).
- driver core: fix potential null-ptr-deref in device_add() (git-fixes).
- driver core: fix resource leak in device_add() (git-fixes).
- driver core: fw_devlink: Add DL_FLAG_CYCLE support to device links (git-fixes).
- drivers/base: Fix unsigned comparison to -1 in CPUMAP_FILE_MAX_BYTES (bsc#1208815).
- drivers/base: fix userspace break from using bin_attributes for cpumap and cpulist (bsc#1208815).
- drivers/md/md-bitmap: check the return value of md_bitmap_get_counter() (git-fixes).
- drivers: base: component: fix memory leak with using debugfs_lookup() (git-fixes).
- drivers: base: dd: fix memory leak with using debugfs_lookup() (git-fixes).
- drivers: base: transport_class: fix possible memory leak (git-fixes).
- drivers: base: transport_class: fix resource leak when transport_add_device() fails (git-fixes).
- drivers: staging: rtl8723bs: Fix locking in _rtw_join_timeout_handler() (git-fixes).
- drivers: staging: rtl8723bs: Fix locking in rtw_scan_timeout_handler() (git-fixes).
- drivers: vmbus: Check for channel allocation before looking up relids (git-fixes).
- drivers:md:fix a potential use-after-free bug (git-fixes).
- drm/amd/amdgpu: fix warning during suspend (bsc#1206843).
- drm/amd/display/dc/dce60/Makefile: Fix previous attempt to silence known override-init warnings (git-fixes).
- drm/amd/display: Add DCN314 display SG Support (bsc#1206843).
- drm/amd/display: Add DSC Support for Synaptics Cascaded MST Hub (git-fixes).
- drm/amd/display: Add NULL plane_state check for cursor disable logic (git-fixes).
- drm/amd/display: Add check for DET fetch latency hiding for dcn32 (bsc#1206843).
- drm/amd/display: Add missing brackets in calculation (bsc#1206843).
- drm/amd/display: Adjust downscaling limits for dcn314 (bsc#1206843).
- drm/amd/display: Allow subvp on vactive pipes that are 2560x1440@60 (bsc#1206843).
- drm/amd/display: Clear MST topology if it fails to resume (git-fixes).
- drm/amd/display: Conversion to bool not necessary (git-fixes).
- drm/amd/display: Defer DIG FIFO disable after VID stream enable (bsc#1206843).
- drm/amd/display: Disable DRR actions during state commit (bsc#1206843).
- drm/amd/display: Disable HUBP/DPP PG on DCN314 for now (bsc#1206843).
- drm/amd/display: Do not clear GPINT register when releasing DMUB from reset (git-fixes).
- drm/amd/display: Do not commit pipe when updating DRR (bsc#1206843).
- drm/amd/display: Do not set DRR on pipe Commit (bsc#1206843).
- drm/amd/display: Enable P-state validation checks for DCN314 (bsc#1206843).
- drm/amd/display: Fail atomic_check early on normalize_zpos error (git-fixes).
- drm/amd/display: Fix DP MST sinks removal issue (git-fixes).
- drm/amd/display: Fix DTBCLK disable requests and SRC_SEL programming (bsc#1206843).
- drm/amd/display: Fix display corruption w/ VSR enable (bsc#1206843).
- drm/amd/display: Fix hang when skipping modeset (git-fixes).
- drm/amd/display: Fix potential null dereference (git-fixes).
- drm/amd/display: Fix potential null-deref in dm_resume (git-fixes).
- drm/amd/display: Fix race condition in DPIA AUX transfer (bsc#1206843).
- drm/amd/display: Fix set scaling doesn's work (git-fixes).
- drm/amd/display: Fix timing not changning when freesync video is enabled (git-fixes).
- drm/amd/display: Fixes for dcn32_clk_mgr implementation (git-fixes).
- drm/amd/display: Include virtual signal to set k1 and k2 values (bsc#1206843).
- drm/amd/display: Move DCN314 DOMAIN power control to DMCUB (bsc#1206843).
- drm/amd/display: Pass the right info to drm_dp_remove_payload (bsc#1206843).
- drm/amd/display: Properly handle additional cases where DCN is not supported (git-fixes).
- drm/amd/display: Properly reuse completion structure (bsc#1206843).
- drm/amd/display: Reduce expected sdp bandwidth for dcn321 (bsc#1206843).
- drm/amd/display: Remove OTG DIV register write for Virtual signals (bsc#1206843).
- drm/amd/display: Report to ACPI video if no panels were found (bsc#1206843).
- drm/amd/display: Reset DMUB mailbox SW state after HW reset (bsc#1206843).
- drm/amd/display: Reset OUTBOX0 r/w pointer on DMUB reset (git-fixes).
- drm/amd/display: Return error code on DSC atomic check failure (git-fixes).
- drm/amd/display: Revert Reduce delay when sink device not able to ACK 00340h write (git-fixes).
- drm/amd/display: Set dcn32 caps.seamless_odm (bsc#1206843).
- drm/amd/display: Set hvm_enabled flag for S/G mode (bsc#1206843).
- drm/amd/display: Simplify same effect if/else blocks (git-fixes).
- drm/amd/display: Take FEC Overhead into Timeslot Calculation (bsc#1206843).
- drm/amd/display: Take emulated dc_sink into account for HDCP (bsc#1207734).
- drm/amd/display: Unassign does_plane_fit_in_mall function from dcn3.2 (bsc#1206843).
- drm/amd/display: Uninitialized variables causing 4k60 UCLK to stay at DPM1 and not DPM0 (bsc#1206843).
- drm/amd/display: Update bounding box values for DCN321 (git-fixes).
- drm/amd/display: Update clock table to include highest clock setting (bsc#1206843).
- drm/amd/display: Use DC_LOG_DC in the trasform pixel function (git-fixes).
- drm/amd/display: Use min transition for SubVP into MPO (bsc#1206843).
- drm/amd/display: Workaround to increase phantom pipe vactive in pipesplit (bsc#1206843).
- drm/amd/display: adjust MALL size available for DCN32 and DCN321 (bsc#1206843).
- drm/amd/display: disable S/G display on DCN 3.1.4 (bsc#1206843).
- drm/amd/display: disable S/G display on DCN 3.1.5 (bsc#1206843).
- drm/amd/display: disconnect MPCC only on OTG change (bsc#1206843).
- drm/amd/display: do not call dc_interrupt_set() for disabled crtcs (git-fixes).
- drm/amd/display: edp do not add non-edid timings (git-fixes).
- drm/amd/display: fix FCLK pstate change underflow (bsc#1206843).
- drm/amd/display: fix cursor offset on rotation 180 (git-fixes).
- drm/amd/display: fix duplicate assignments (git-fixes).
- drm/amd/display: fix flickering caused by S/G mode (git-fixes).
- drm/amd/display: fix issues with driver unload (git-fixes).
- drm/amd/display: fix k1 k2 divider programming for phantom streams (bsc#1206843).
- drm/amd/display: fix mapping to non-allocated address (bsc#1206843).
- drm/amd/display: fix shift-out-of-bounds in CalculateVMAndRowBytes (git-fixes).
- drm/amd/display: fix wrong index used in dccg32_set_dpstreamclk (bsc#1206843).
- drm/amd/display: move remaining FPU code to dml folder (bsc#1206843).
- drm/amd/display: properly handling AGP aperture in vm setup (bsc#1206843).
- drm/amd/display: reduce else-if to else in dcn10_blank_pixel_data() (git-fixes).
- drm/amd/display: revert Disable DRR actions during state commit (bsc#1206843).
- drm/amd/display: skip commit minimal transition state (bsc#1206843).
- drm/amd/display: wait for vblank during pipe programming (git-fixes).
- drm/amd/pm/smu13: BACO is supported when it's in BACO state (bsc#1206843).
- drm/amd/pm: Enable bad memory page/channel recording support for smu v13_0_0 (bsc#1206843).
- drm/amd/pm: Fix output of pp_od_clk_voltage (git-fixes).
- drm/amd/pm: Fix power context allocation in SMU13 (git-fixes).
- drm/amd/pm: Fix sienna cichlid incorrect OD volage after resume (bsc#1206843).
- drm/amd/pm: add SMU 13.0.7 missing GetPptLimit message mapping (bsc#1206843).
- drm/amd/pm: add missing AllowIHInterrupt message mapping for SMU13.0.0 (bsc#1206843).
- drm/amd/pm: add missing SMU13.0.0 mm_dpm feature mapping (bsc#1206843).
- drm/amd/pm: add missing SMU13.0.7 mm_dpm feature mapping (bsc#1206843).
- drm/amd/pm: add the missing mapping for PPT feature on SMU13.0.0 and 13.0.7 (bsc#1206843).
- drm/amd/pm: bump SMU 13.0.0 driver_if header version (bsc#1206843).
- drm/amd/pm: bump SMU 13.0.4 driver_if header version (bsc#1206843).
- drm/amd/pm: bump SMU 13.0.7 driver_if header version (bsc#1206843).
- drm/amd/pm: bump SMU13.0.0 driver_if header to version 0x34 (bsc#1206843).
- drm/amd/pm: correct SMU13.0.0 pstate profiling clock settings (bsc#1206843).
- drm/amd/pm: correct SMU13.0.7 max shader clock reporting (bsc#1206843).
- drm/amd/pm: correct SMU13.0.7 pstate profiling clock settings (bsc#1206843).
- drm/amd/pm: correct the fan speed retrieving in PWM for some SMU13 asics (bsc#1206843).
- drm/amd/pm: correct the pcie link state check for SMU13 (bsc#1206843).
- drm/amd/pm: correct the reference clock for fan speed(rpm) calculation (bsc#1206843).
- drm/amd/pm: drop unneeded dpm features disablement for SMU 13.0.4/11 (bsc#1206843).
- drm/amd/pm: enable GPO dynamic control support for SMU13.0.0 (bsc#1206843).
- drm/amd/pm: enable GPO dynamic control support for SMU13.0.7 (bsc#1206843).
- drm/amd/pm: enable mode1 reset on smu_v13_0_10 (bsc#1206843).
- drm/amd/pm: parse pp_handle under appropriate conditions (git-fixes).
- drm/amd/pm: remove unused num_of_active_display variable (git-fixes).
- drm/amd/pm: reverse mclk and fclk clocks levels for renoir (git-fixes).
- drm/amd/pm: reverse mclk and fclk clocks levels for vangogh (git-fixes).
- drm/amd/pm: reverse mclk and fclk clocks levels for yellow carp (git-fixes).
- drm/amd/pm: update SMU13.0.0 reported maximum shader clock (bsc#1206843).
- drm/amd: Avoid ASSERT for some message failures (bsc#1206843).
- drm/amd: Avoid BUG() for case of SRIOV missing IP version (bsc#1206843).
- drm/amd: Delay removal of the firmware framebuffer (git-fixes).
- drm/amd: Fix an out of bounds error in BIOS parser (git-fixes).
- drm/amd: Fix initialization for nbio 4.3.0 (bsc#1206843).
- drm/amd: Fix initialization for nbio 7.5.1 (bsc#1206843).
- drm/amd: Fix initialization mistake for NBIO 7.3.0 (bsc#1206843).
- drm/amd: Make sure image is written to trigger VBIOS image update flow (git-fixes).
- drm/amd: Tighten permissions on VBIOS flashing attributes (git-fixes).
- drm/amdgpu/discovery: add PSP IP v13.0.11 support (bsc#1206843).
- drm/amdgpu/discovery: enable gfx v11 for GC 11.0.4 (bsc#1206843).
- drm/amdgpu/discovery: enable gmc v11 for GC 11.0.4 (bsc#1206843).
- drm/amdgpu/discovery: enable mes support for GC v11.0.4 (bsc#1206843).
- drm/amdgpu/discovery: enable nbio support for NBIO v7.7.1 (bsc#1206843).
- drm/amdgpu/discovery: enable soc21 common for GC 11.0.4 (bsc#1206843).
- drm/amdgpu/discovery: set the APU flag for GC 11.0.4 (bsc#1206843).
- drm/amdgpu/display/mst: Fix mst_state-&gt;pbn_div and slot count assignments (bsc#1206843).
- drm/amdgpu/display/mst: adjust the naming of mst_port and port of aconnector (bsc#1206843).
- drm/amdgpu/display/mst: limit payload to be updated one by one (bsc#1206843).
- drm/amdgpu/display/mst: update mst_mgr relevant variable when long HPD (bsc#1206843).
- drm/amdgpu/dm/dp_mst: Do not grab mst_mgr-&gt;lock when computing DSC state (bsc#1206843).
- drm/amdgpu/dm/mst: Fix uninitialized var in pre_compute_mst_dsc_configs_for_state() (bsc#1206843).
- drm/amdgpu/dm/mst: Use the correct topology mgr pointer in amdgpu_dm_connector (bsc#1206843).
- drm/amdgpu/fence: Fix oops due to non-matching drm_sched init/fini (git-fixes).
- drm/amdgpu/gfx10: Disable gfxoff before disabling powergating (git-fixes).
- drm/amdgpu/gfx: disable gfx9 cp_ecc_error_irq only when enabling legacy gfx ras (git-fixes).
- drm/amdgpu/mst: Stop ignoring error codes and deadlocking (bsc#1206843).
- drm/amdgpu/nv: Apply ASPM quirk on Intel ADL + AMD Navi (bsc#1206843).
- drm/amdgpu/pm: add GFXOFF control IP version check for SMU IP v13.0.11 (bsc#1206843).
- drm/amdgpu/pm: enable swsmu for SMU IP v13.0.11 (bsc#1206843).
- drm/amdgpu/pm: use the specific mailbox registers only for SMU IP v13.0.4 (bsc#1206843).
- drm/amdgpu/smu: skip pptable init under sriov (bsc#1206843).
- drm/amdgpu/soc21: Add video cap query support for VCN_4_0_4 (bsc#1206843).
- drm/amdgpu/soc21: add mode2 asic reset for SMU IP v13.0.11 (bsc#1206843).
- drm/amdgpu/soc21: do not expose AV1 if VCN0 is harvested (bsc#1206843).
- drm/amdgpu: Add unique_id support for GC 11.0.1/2 (bsc#1206843).
- drm/amdgpu: Correct the power calcultion for Renior/Cezanne (git-fixes).
- drm/amdgpu: Do not register backlight when another backlight should be used (v3) (bsc#1206843).
- drm/amdgpu: Do not resume IOMMU after incomplete init (bsc#1206843).
- drm/amdgpu: Enable pg/cg flags on GC11_0_4 for VCN (bsc#1206843).
- drm/amdgpu: Enable vclk dclk node for gc11.0.3 (bsc#1206843).
- drm/amdgpu: Fix call trace warning and hang when removing amdgpu device (bsc#1206843).
- drm/amdgpu: Fix potential NULL dereference (bsc#1206843).
- drm/amdgpu: Fix potential double free and null pointer dereference (bsc#1206843).
- drm/amdgpu: Fix size validation for non-exclusive domains (v4) (bsc#1206843).
- drm/amdgpu: Fix vram recover does not work after whole GPU reset (v2) (git-fixes).
- drm/amdgpu: Fixed bug on error when unloading amdgpu (bsc#1206843).
- drm/amdgpu: Re-enable DCN for 64-bit powerpc (bsc#1194869).
- drm/amdgpu: Register ACPI video backlight when skipping amdgpu backlight registration (bsc#1206843).
- drm/amdgpu: Use the TGID for trace_amdgpu_vm_update_ptes (bsc#1206843).
- drm/amdgpu: Use the default reset when loading or reloading the driver (git-fixes).
- drm/amdgpu: Use the sched from entity for amdgpu_cs trace (git-fixes).
- drm/amdgpu: add a missing lock for AMDGPU_SCHED (git-fixes).
- drm/amdgpu: add gfx support for GC 11.0.4 (bsc#1206843).
- drm/amdgpu: add gmc v11 support for GC 11.0.4 (bsc#1206843).
- drm/amdgpu: add missing radeon secondary PCI ID (git-fixes).
- drm/amdgpu: add smu 13 support for smu 13.0.11 (bsc#1206843).
- drm/amdgpu: add soc21 common ip block support for GC 11.0.4 (bsc#1206843).
- drm/amdgpu: add tmz support for GC 11.0.1 (bsc#1206843).
- drm/amdgpu: add tmz support for GC IP v11.0.4 (bsc#1206843).
- drm/amdgpu: allow more APUs to do mode2 reset when go to S4 (bsc#1206843).
- drm/amdgpu: allow multipipe policy on ASICs with one MEC (bsc#1206843).
- drm/amdgpu: change gfx 11.0.4 external_id range (git-fixes).
- drm/amdgpu: complete gfxoff allow signal during suspend without delay (git-fixes).
- drm/amdgpu: correct MEC number for gfx11 APUs (bsc#1206843).
- drm/amdgpu: disable runtime pm on several sienna cichlid cards(v2) (git-fixes).
- drm/amdgpu: disable sdma ecc irq only when sdma RAS is enabled in suspend (git-fixes).
- drm/amdgpu: drop experimental flag on aldebaran (git-fixes).
- drm/amdgpu: enable GFX Clock Gating control for GC IP v11.0.4 (bsc#1206843).
- drm/amdgpu: enable GFX IP v11.0.4 CG support (bsc#1206843).
- drm/amdgpu: enable GFX Power Gating for GC IP v11.0.4 (bsc#1206843).
- drm/amdgpu: enable HDP SD for gfx 11.0.3 (bsc#1206843).
- drm/amdgpu: enable PSP IP v13.0.11 support (bsc#1206843).
- drm/amdgpu: enable VCN DPG for GC IP v11.0.4 (bsc#1206843).
- drm/amdgpu: fix Null pointer dereference error in amdgpu_device_recover_vram (git-fixes).
- drm/amdgpu: fix amdgpu_job_free_resources v2 (bsc#1206843).
- drm/amdgpu: fix enum odm_combine_mode mismatch (git-fixes).
- drm/amdgpu: fix error checking in amdgpu_read_mm_registers for nv (bsc#1206843).
- drm/amdgpu: fix error checking in amdgpu_read_mm_registers for soc15 (git-fixes).
- drm/amdgpu: fix error checking in amdgpu_read_mm_registers for soc21 (bsc#1206843).
- drm/amdgpu: fix mmhub register base coding error (git-fixes).
- drm/amdgpu: fix return value check in kfd (git-fixes).
- drm/amdgpu: fix ttm_bo calltrace warning in psp_hw_fini (bsc#1206843).
- drm/amdgpu: fix xclk freq on CHIP_STONEY (git-fixes).
- drm/amdgpu: for S0ix, skip SDMA 5.x+ suspend/resume (git-fixes).
- drm/amdgpu: release gpu full access after 'amdgpu_device_ip_late_init' (git-fixes).
- drm/amdgpu: reposition the gpu reset checking for reuse (bsc#1206843).
- drm/amdgpu: set GC 11.0.4 family (bsc#1206843).
- drm/amdgpu: skip ASIC reset for APUs when go to S4 (bsc#1206843).
- drm/amdgpu: skip MES for S0ix as well since it's part of GFX (bsc#1206843).
- drm/amdgpu: skip disabling fence driver src_irqs when device is unplugged (git-fixes).
- drm/amdgpu: skip mes self test after s0i3 resume for MES IP v11.0 (bsc#1206843).
- drm/amdgpu: skip psp suspend for IMU enabled ASICs mode2 reset (git-fixes).
- drm/amdgpu: update drm_display_info correctly when the edid is read (git-fixes).
- drm/amdgpu: update wave data type to 3 for gfx11 (bsc#1206843).
- drm/amdkfd: Add sync after creating vram bo (bsc#1206843).
- drm/amdkfd: Fix BO offset for multi-VMA page migration (git-fixes).
- drm/amdkfd: Fix NULL pointer error for GC 11.0.1 on mGPU (bsc#1206843).
- drm/amdkfd: Fix an illegal memory access (git-fixes).
- drm/amdkfd: Fix double release compute pasid (bsc#1206843).
- drm/amdkfd: Fix kfd_process_device_init_vm error handling (bsc#1206843).
- drm/amdkfd: Fix the memory overrun (bsc#1206843).
- drm/amdkfd: Fix the warning of array-index-out-of-bounds (bsc#1206843).
- drm/amdkfd: Fixed kfd_process cleanup on module exit (git-fixes).
- drm/amdkfd: Get prange-&gt;offset after svm_range_vram_node_new (git-fixes).
- drm/amdkfd: Page aligned memory reserve size (bsc#1206843).
- drm/amdkfd: add GC 11.0.4 KFD support (bsc#1206843).
- drm/amdkfd: fix a potential double free in pqm_create_queue (git-fixes).
- drm/amdkfd: fix potential kgd_mem UAFs (git-fixes).
- drm/amdkfd: introduce dummy cache info for property asic (bsc#1206843).
- drm/armada: Fix a potential double free in an error handling path (git-fixes).
- drm/ast: Fix ARM compatibility (git-fixes).
- drm/bochs: fix blanking (git-fixes).
- drm/bridge: Fix returned array size name for atomic_get_input_bus_fmts kdoc (git-fixes).
- drm/bridge: adv7533: Fix adv7533_mode_valid for adv7533 and adv7535 (git-fixes).
- drm/bridge: it6505: Fix return value check for pm_runtime_get_sync (git-fixes).
- drm/bridge: lt8912b: Add hot plug detection (git-fixes).
- drm/bridge: lt8912b: Fix DSI Video Mode (git-fixes).
- drm/bridge: lt8912b: return EPROBE_DEFER if bridge is not found (git-fixes).
- drm/bridge: lt9611: Fix PLL being unable to lock (git-fixes).
- drm/bridge: lt9611: fix HPD reenablement (git-fixes).
- drm/bridge: lt9611: fix clock calculation (git-fixes).
- drm/bridge: lt9611: fix polarity programming (git-fixes).
- drm/bridge: lt9611: fix programming of video modes (git-fixes).
- drm/bridge: lt9611: fix sleep mode setup (git-fixes).
- drm/bridge: lt9611: pass a pointer to the of node (git-fixes).
- drm/bridge: megachips: Fix error handling in i2c_register_driver() (git-fixes).
- drm/bridge: ti-sn65dsi83: Fix delay after reset deassert to match spec (git-fixes).
- drm/bridge: ti-sn65dsi86: Avoid possible buffer overflow (git-fixes).
- drm/cirrus: NULL-check pipe-&gt;plane.state-&gt;fb in cirrus_pipe_update() (git-fixes).
- drm/connector: print max_requested_bpc in state debugfs (git-fixes).
- drm/display/dp_mst: Add drm_atomic_get_old_mst_topology_state() (bsc#1206843).
- drm/display/dp_mst: Add helper for finding payloads in atomic MST state (bsc#1206843).
- drm/display/dp_mst: Add helpers for serializing SST &amp;lt;-&gt; MST transitions (bsc#1206843).
- drm/display/dp_mst: Add nonblocking helpers for DP MST (bsc#1206843).
- drm/display/dp_mst: Call them time slots, not VCPI slots (bsc#1206843).
- drm/display/dp_mst: Correct the kref of port (bsc#1206843).
- drm/display/dp_mst: Do not open code modeset checks for releasing time slots (bsc#1206843).
- drm/display/dp_mst: Drop all ports from topology on CSNs before queueing link address work (bsc#1206843).
- drm/display/dp_mst: Fix confusing docs for drm_dp_atomic_release_time_slots() (bsc#1206843).
- drm/display/dp_mst: Fix down message handling after a packet reception error (git-fixes).
- drm/display/dp_mst: Fix down/up message handling after sink disconnect (git-fixes).
- drm/display/dp_mst: Fix drm_dp_mst_add_affected_dsc_crtcs() return code (git-fixes).
- drm/display/dp_mst: Fix modeset tracking in drm_dp_atomic_release_vcpi_slots() (bsc#1206843).
- drm/display/dp_mst: Handle old/new payload states in drm_dp_remove_payload() (bsc#1206843).
- drm/display/dp_mst: Maintain time slot allocations when deleting payloads (bsc#1206843).
- drm/display/dp_mst: Move all payload info into the atomic state (bsc#1206843).
- drm/display/dp_mst: Rename drm_dp_mst_vcpi_allocation (bsc#1206843).
- drm/display: Do not assume dual mode adaptors support i2c sub-addressing (git-fixes).
- drm/displayid: add displayid_get_header() and check bounds better (git-fixes).
- drm/dp: Do not rewrite link config when setting phy test pattern (git-fixes).
- drm/dp_mst: Avoid deleting payloads for connectors staying enabled (bsc#1206843).
- drm/dp_mst: fix drm_dp_dpcd_read return value checks (git-fixes).
- drm/edid: fix AVI infoframe aspect ratio handling (git-fixes).
- drm/edid: fix parsing of 3D modes from HDMI VSDB (git-fixes).
- drm/etnaviv: fix reference leak when mmaping imported buffer (git-fixes).
- drm/exynos: fix g2d_open/close helper function definitions (git-fixes).
- drm/fb-helper: set x/yres_virtual in drm_fb_helper_check_var (git-fixes).
- drm/fbdev-generic: prohibit potential out-of-bounds access (git-fixes).
- drm/fourcc: Add missing big-endian XRGB1555 and RGB565 formats (git-fixes).
- drm/hyperv : Removing the restruction of VRAM allocation with PCI bar size (git-fixes).
- drm/hyperv: Add error message for fb size greater than allocated (git-fixes).
- drm/hyperv: Fix an error handling path in hyperv_vmbus_probe() (git-fixes).
- drm/i915/active: Fix missing debug object activation (git-fixes).
- drm/i915/active: Fix misuse of non-idle barriers as fence trackers (git-fixes).
- drm/i915/active: Fix misuse of non-idle barriers as fence trackers (git-fixes).
- drm/i915/adlp: Fix typo for reference clock (git-fixes).
- drm/i915/color: Fix typo for Plane CSC indexes (git-fixes).
- drm/i915/dg2: Add HDMI pixel clock frequencies 267.30 and 319.89 MHz (git-fixes).
- drm/i915/dg2: Add additional HDMI pixel clock frequencies (git-fixes).
- drm/i915/dg2: Drop one PCI ID (git-fixes).
- drm/i915/dg2: Support 4k@30 on HDMI (git-fixes).
- drm/i915/dgfx: Keep PCI autosuspend control 'on' by default on all dGPU (git-fixes).
- drm/i915/display/psr: Handle plane and pipe restrictions at every page flip (git-fixes).
- drm/i915/display/psr: Use drm damage helpers to calculate plane damaged area (git-fixes).
- drm/i915/display: Check source height is &gt; 0 (git-fixes).
- drm/i915/display: Workaround cursor left overs with PSR2 selective fetch enabled (git-fixes).
- drm/i915/display: clean up comments (git-fixes).
- drm/i915/dmc: Update DG2 DMC version to v2.08 (git-fixes).
- drm/i915/dp: prevent potential div-by-zero (git-fixes).
- drm/i915/dp_mst: Fix mst_mgr lookup during atomic check (bsc#1206843).
- drm/i915/dp_mst: Fix payload removal during output disabling (bsc#1206843).
- drm/i915/dpt: Treat the DPT BO as a framebuffer (git-fixes).
- drm/i915/dsi: Use unconditional msleep() instead of intel_dsi_msleep() (git-fixes).
- drm/i915/dsi: fix DSS CTL register offsets for TGL+ (git-fixes).
- drm/i915/gem: Flush lmem contents after construction (git-fixes).
- drm/i915/gen11: Moving WAs to icl_gt_workarounds_init() (git-fixes).
- drm/i915/gen11: Wa_1408615072/Wa_1407596294 should be on GT list (git-fixes).
- drm/i915/gt: Use the correct error value when kernel_context() fails (git-fixes).
- drm/i915/gt: perform uc late init after probe error injection (git-fixes).
- drm/i915/guc: Do not capture Gen8 regs on Xe devices (git-fixes).
- drm/i915/huc: always init the delayed load fence (git-fixes).
- drm/i915/huc: bump timeout for delayed load and reduce print verbosity (git-fixes).
- drm/i915/huc: fix leak of debug object in huc load fence on driver unload (git-fixes).
- drm/i915/migrate: Account for the reserved_space (git-fixes).
- drm/i915/migrate: fix corner case in CCS aux copying (git-fixes).
- drm/i915/psr: Fix PSR_IMR/IIR field handling (git-fixes).
- drm/i915/psr: Use calculated io and fast wake lines (git-fixes).
- drm/i915/psr: Use calculated io and fast wake lines (git-fixes).
- drm/i915/pxp: use &amp;lt;&gt; instead of '' for headers in include/ (git-fixes).
- drm/i915/quirks: Add inverted backlight quirk for HP 14-r206nv (git-fixes).
- drm/i915/selftest: fix intel_selftest_modify_policy argument types (git-fixes).
- drm/i915/selftests: Add some missing error propagation (git-fixes).
- drm/i915/selftests: Increase timeout for live_parallel_switch (git-fixes).
- drm/i915/selftests: Stop using kthread_stop() (git-fixes).
- drm/i915/tc: Fix the ICL PHY ownership check in TC-cold state (git-fixes).
- drm/i915: Allow switching away via vga-switcheroo if uninitialized (git-fixes).
- drm/i915: Avoid potential vm use-after-free (git-fixes).
- drm/i915: Disable DC states for all commits (git-fixes).
- drm/i915: Do not use BAR mappings for ring buffers with LLC (git-fixes).
- drm/i915: Do not use BAR mappings for ring buffers with LLC (git-fixes).
- drm/i915: Do not use stolen memory for ring buffers with LLC (git-fixes).
- drm/i915: Do not use stolen memory for ring buffers with LLC (git-fixes).
- drm/i915: Explain the magic numbers for AUX SYNC/precharge length (git-fixes).
- drm/i915: Fix NULL ptr deref by checking new_crtc_state (git-fixes).
- drm/i915: Fix VBT DSI DVO port handling (git-fixes).
- drm/i915: Fix context runtime accounting (git-fixes).
- drm/i915: Fix fast wake AUX sync len (git-fixes).
- drm/i915: Fix potential bit_17 double-free (git-fixes).
- drm/i915: Fix potential context UAFs (git-fixes).
- drm/i915: Fix request ref counting during error capture &amp; debugfs dump (git-fixes).
- drm/i915: Fix up locking around dumping requests lists (git-fixes).
- drm/i915: Initialize the obj flags for shmem objects (git-fixes).
- drm/i915: Make intel_get_crtc_new_encoder() less oopsy (git-fixes).
- drm/i915: Move CSC load back into .color_commit_arm() when PSR is enabled on skl/glk (git-fixes).
- drm/i915: Move fd_install after last use of fence (git-fixes).
- drm/i915: Preserve crtc_state-&gt;inherited during state clearing (git-fixes).
- drm/i915: Remove __maybe_unused from mtl_info (git-fixes).
- drm/i915: Remove unused bits of i915_vma/active api (git-fixes).
- drm/i915: Remove unused variable (git-fixes).
- drm/i915: Use 18 fast wake AUX sync len (git-fixes).
- drm/i915: fix race condition UAF in i915_perf_add_config_ioctl (git-fixes).
- drm/i915: fix race condition UAF in i915_perf_add_config_ioctl (git-fixes).
- drm/i915: move a Kconfig symbol to unbreak the menu presentation (git-fixes).
- drm/i915: stop abusing swiotlb_max_segment (git-fixes).
- drm/lima/lima_drv: Add missing unwind goto in lima_pdev_probe() (git-fixes).
- drm/mediatek: Clean dangling pointer on bind error path (git-fixes).
- drm/mediatek: Drop unbalanced obj unref (git-fixes).
- drm/mediatek: Use NULL instead of 0 for NULL pointer (git-fixes).
- drm/mediatek: dsi: Reduce the time of dsi from LP11 to sending cmd (git-fixes).
- drm/mediatek: mtk_drm_crtc: Add checks for devm_kcalloc (git-fixes).
- drm/meson: fix 1px pink line on GXM when scaling video overlay (git-fixes).
- drm/meson: fix missing component unbind on bind errors (git-fixes).
- drm/meson: reorder driver deinit sequence to fix use-after-free bug (git-fixes).
- drm/mgag200: Fix gamma lut not initialized (git-fixes).
- drm/mipi-dsi: Fix byte order of 16-bit DCS set/get brightness (git-fixes).
- drm/mipi-dsi: Set the fwnode for mipi_dsi_device (git-fixes).
- drm/msm/a5xx: fix context faults during ring switch (git-fixes).
- drm/msm/a5xx: fix highest bank bit for a530 (git-fixes).
- drm/msm/a5xx: fix setting of the CP_PREEMPT_ENABLE_LOCAL register (git-fixes).
- drm/msm/a5xx: fix the emptyness check in the preempt code (git-fixes).
- drm/msm/a6xx: Fix kvzalloc vs state_kcalloc usage (git-fixes).
- drm/msm/a6xx: Fix speed-bin detection vs probe-defer (git-fixes).
- drm/msm/adreno: Fix null ptr access in adreno_gpu_cleanup() (git-fixes).
- drm/msm/adreno: adreno_gpu: Use suspend() instead of idle() on load error (git-fixes).
- drm/msm/adreno: drop bogus pm_runtime_set_active() (git-fixes).
- drm/msm/adreno: fix runtime PM imbalance at gpu load (git-fixes).
- drm/msm/disp/dpu: check for crtc enable rather than crtc active to release shared resources (git-fixes).
- drm/msm/disp/dpu: fix sc7280_pp base offset (git-fixes).
- drm/msm/dp: Clean up handling of DP AUX interrupts (git-fixes).
- drm/msm/dp: cleared DP_DOWNSPREAD_CTRL register before start link training (git-fixes).
- drm/msm/dp: unregister audio driver during unbind (git-fixes).
- drm/msm/dpu: Add INTF_5 interrupts (git-fixes).
- drm/msm/dpu: Add check for cstate (git-fixes).
- drm/msm/dpu: Add check for pstates (git-fixes).
- drm/msm/dpu: Disallow unallocated resources to be returned (git-fixes).
- drm/msm/dpu: Move non-MDP_TOP INTF_INTR offsets out of hwio header (git-fixes).
- drm/msm/dpu: Reject topologies for which no DSC blocks are available (git-fixes).
- drm/msm/dpu: Remove duplicate register defines from INTF (git-fixes).
- drm/msm/dpu: Remove num_enc from topology struct in favour of num_dsc (git-fixes).
- drm/msm/dpu: Wire up DSC mask for active CTL configuration (git-fixes).
- drm/msm/dpu: check for null return of devm_kzalloc() in dpu_writeback_init() (git-fixes).
- drm/msm/dpu: clear DSPP reservations in rm release (git-fixes).
- drm/msm/dpu: disable features unsupported by QCM2290 (git-fixes).
- drm/msm/dpu: drop DPU_DIM_LAYER from MIXER_MSM8998_MASK (git-fixes).
- drm/msm/dpu: drop stale comment from struct dpu_mdp_cfg doc (git-fixes).
- drm/msm/dpu: fix clocks settings for msm8998 SSPP blocks (git-fixes).
- drm/msm/dpu: fix len of sc7180 ctl blocks (git-fixes).
- drm/msm/dpu: sc7180: add missing WB2 clock control (git-fixes).
- drm/msm/dpu: set pdpu-&gt;is_rt_pipe early in dpu_plane_sspp_atomic_update() (git-fixes).
- drm/msm/dsi: Add missing check for alloc_ordered_workqueue (git-fixes).
- drm/msm/dsi: Allow 2 CTRLs on v2.5.0 (git-fixes).
- drm/msm/gem: Add check for kmalloc (git-fixes).
- drm/msm/hdmi: Add missing check for alloc_ordered_workqueue (git-fixes).
- drm/msm/mdp5: Add check for kzalloc (git-fixes).
- drm/msm/mdp5: fix reading hw revision on db410c platform (git-fixes).
- drm/msm: Be more shouty if per-process pgtables are not working (git-fixes).
- drm/msm: Fix potential invalid ptr free (git-fixes).
- drm/msm: Set max segment size earlier (git-fixes).
- drm/msm: clean event_thread-&gt;worker in case of an error (git-fixes).
- drm/msm: fix NULL-deref on irq uninstall (git-fixes).
- drm/msm: fix NULL-deref on snapshot tear down (git-fixes).
- drm/msm: fix drm device leak on bind errors (git-fixes).
- drm/msm: fix missing wq allocation error handling (git-fixes).
- drm/msm: fix vram leak on bind errors (git-fixes).
- drm/msm: fix workqueue leak on bind errors (git-fixes).
- drm/msm: use strscpy instead of strncpy (git-fixes).
- drm/nouveau/devinit/tu102-: wait for GFW_BOOT_PROGRESS == COMPLETED (git-fixes).
- drm/nouveau/disp: Support more modes by checking with lower bpc (git-fixes).
- drm/nouveau/dp: check for NULL nv_connector-&gt;native_mode (git-fixes).
- drm/nouveau/kms/nv50-: remove unused functions (git-fixes).
- drm/nouveau/kms/nv50: fix nv50_wndw_new_ prototype (git-fixes).
- drm/nouveau/kms: Cache DP encoders in nouveau_connector (bsc#1206843).
- drm/nouveau/kms: Pull mst state in for all modesets (bsc#1206843).
- drm/nouveau: add nv_encoder pointer check for NULL (git-fixes).
- drm/nouveau: do not detect DSM for non-NVIDIA device (git-fixes).
- drm/omap: dsi: Fix excessive stack usage (git-fixes).
- drm/omapdrm: Remove unused struct csc_coef_rgb2yuv (git-fixes).
- drm/panel: novatek-nt35950: Improve error handling (git-fixes).
- drm/panel: novatek-nt35950: Only unregister DSI1 if it exists (git-fixes).
- drm/panel: otm8009a: Set backlight parent to panel device (git-fixes).
- drm/panfrost: Do not sync rpm suspension after mmu flushing (git-fixes).
- drm/panfrost: Fix the panfrost_mmu_map_fault_addr() error path (git-fixes).
- drm/probe-helper: Cancel previous job before starting new one (git-fixes).
- drm/radeon: Drop legacy MST support (bsc#1206843).
- drm/radeon: Fix eDP for single-display iMac11,2 (git-fixes).
- drm/radeon: free iio for atombios when driver shutdown (git-fixes).
- drm/radeon: reintroduce radeon_dp_work_func content (git-fixes).
- drm/rockchip: Drop unbalanced obj unref (git-fixes).
- drm/sched: Remove redundant check (git-fixes).
- drm/shmem-helper: Fix locking for drm_gem_shmem_get_pages_sgt() (git-fixes).
- drm/shmem-helper: Remove another errant put in error path (git-fixes).
- drm/shmem-helper: Revert accidental non-GPL export (git-fixes).
- drm/sun4i: fix missing component unbind on bind errors (git-fixes).
- drm/tegra: Avoid potential 32-bit integer overflow (git-fixes).
- drm/tegra: firewall: Check for is_addr_reg existence in IMM check (git-fixes).
- drm/tiny: ili9486: Do not assume 8-bit only SPI controllers (git-fixes).
- drm/ttm/pool: Fix ttm_pool_alloc error path (git-fixes).
- drm/ttm: Fix a NULL pointer dereference (git-fixes).
- drm/ttm: fix undefined behavior in bit shift for TTM_TT_FLAG_PRIV_POPULATED (git-fixes).
- drm/ttm: optimize pool allocations a bit v2 (git-fixes).
- drm/vc4: crtc: Increase setup cost in core clock calculation to handle extreme reduced blanking (git-fixes).
- drm/vc4: dpi: Add option for inverting pixel clock and output enable (git-fixes).
- drm/vc4: dpi: Fix format mapping for RGB565 (git-fixes).
- drm/vc4: dpi: Fix format mapping for RGB565 (git-fixes).
- drm/vc4: drv: Call component_unbind_all() (git-fixes).
- drm/vc4: hdmi: Correct interlaced timings again (git-fixes).
- drm/vc4: hdmi: make CEC adapter name unique (git-fixes).
- drm/vc4: hvs: Fix colour order for xRGB1555 on HVS5 (git-fixes).
- drm/vc4: hvs: SCALER_DISPBKGND_AUTOHS is only valid on HVS4 (git-fixes).
- drm/vc4: hvs: Set AXI panic modes (git-fixes).
- drm/vc4: kms: Sort the CRTCs by output before assigning them (git-fixes).
- drm/vc4: vec: Use pm_runtime_resume_and_get() in vc4_vec_encoder_enable() (git-fixes).
- drm/vgem: add missing mutex_destroy (git-fixes).
- drm/virtio: Correct drm_gem_shmem_get_sg_table() error handling (git-fixes).
- drm/virtio: Fix NULL vs IS_ERR checking in virtio_gpu_object_shmem_init (bsc#1208776 CVE-2023-22998).
- drm/virtio: Use appropriate atomic state in virtio_gpu_plane_cleanup_fb() (git-fixes).
- drm/virtio: exbuf-&gt;fence_fd unmodified on interrupted wait (git-fixes).
- drm/vkms: Fix memory leak in vkms_init() (git-fixes).
- drm/vkms: Fix null-ptr-deref in vkms_release() (git-fixes).
- drm/vmwgfx: Avoid NULL-ptr deref in vmw_cmd_dx_define_query() (bsc#1203331 CVE-2022-38096)
- drm/vmwgfx: Do not drop the reference to the handle too soon (git-fixes).
- drm/vmwgfx: Fix memory leak in vmw_mksstat_add_ioctl() (git-fixes).
- drm/vmwgfx: Fix race issue calling pin_user_pages (git-fixes).
- drm/vmwgfx: Stop accessing buffer objects which failed init (git-fixes).
- drm: Add orientation quirk for Lenovo ideapad D330-10IGL (git-fixes).
- drm: Fix potential null-ptr-deref due to drmm_mode_config_init() (git-fixes).
- drm: amd: display: Fix memory leakage (git-fixes).
- drm: bridge: adv7511: unregister cec i2c device after cec adapter (git-fixes).
- drm: exynos: dsi: Fix MIPI_DSI*_NO_* mode flags (git-fixes).
- drm: msm: adreno: Disable preemption on Adreno 510 (git-fixes).
- drm: mxsfb: DRM_IMX_LCDIF should depend on ARCH_MXC (git-fixes).
- drm: mxsfb: DRM_MXSFB should depend on ARCH_MXS || ARCH_MXC (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Lenovo IdeaPad Duet 3 10IGL5 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Lenovo Yoga Book X90F (git-fixes).
- drm: rcar-du: Fix a NULL vs IS_ERR() bug (git-fixes).
- drm: tidss: Fix pixel format definition (git-fixes).
- drm:amd:amdgpu: Fix missing buffer object unlock in failure path (git-fixes).
- dt-binding: cdns,usb3: Fix cdns,on-chip-buff-size type (git-fixes).
- dt-bindings: arm: fsl: Fix bindings for APF28Dev board (git-fixes).
- dt-bindings: arm: fsl: Fix copy-paste error in comment (git-fixes).
- dt-bindings: ata: ahci-ceva: Cover all 4 iommus entries (git-fixes).
- dt-bindings: ata: ahci-ceva: convert to yaml (git-fixes).
- dt-bindings: hwlock: sun6i: Add missing #hwlock-cells (git-fixes).
- dt-bindings: i3c: silvaco,i3c-master: fix missing schema restriction (git-fixes).
- dt-bindings: iio: adc: renesas,rcar-gyroadc: Fix adi,ad7476 compatible value (git-fixes).
- dt-bindings: iio: ti,tmp117: fix documentation link (git-fixes).
- dt-bindings: input: iqs626a: Redefine trackpad property types (git-fixes).
- dt-bindings: mailbox: qcom,apcs-kpss-global: fix SDX55 'if' match (git-fixes).
- dt-bindings: msm: dsi-controller-main: Add vdd* descriptions back in (git-fixes).
- dt-bindings: net: snps,dwmac: Fix snps,reset-delays-us dependency (git-fixes).
- dt-bindings: nvmem: qcom,spmi-sdam: fix example 'reg' property (git-fixes).
- dt-bindings: power: renesas,apmu: Fix cpus property limits (git-fixes).
- dt-bindings: power: supply: pm8941-coincell: Do not require charging properties (git-fixes).
- dt-bindings: remoteproc: st,stm32-rproc: Fix phandle-array parameters description (git-fixes).
- dt-bindings: remoteproc: stm32-rproc: Typo fix (git-fixes).
- dt-bindings: serial: renesas,scif: Fix 4th IRQ for 4-IRQ SCIFs (git-fixes).
- dt-bindings: soc: qcom: smd-rpm: re-add missing qcom,rpm-msm8994 (git-fixes).
- dt-bindings: usb: amlogic,meson-g12a-usb-ctrl: make G12A usb3-phy0 optional (git-fixes).
- dt-bindings: usb: snps,dwc3: Fix 'snps,hsphy_interface' type (git-fixes).
- e1000e: Disable TSO on i219-LM card to increase speed (git-fixes).
- edac/i10nm: Add Intel Emerald Rapids server support (PED-4400).
- eeprom: at24: also select REGMAP (git-fixes).
- eeprom: idt_89hpesx: Fix error handling in idt_init() (git-fixes).
- efi/x86: libstub: Fix typo in __efi64_argmap* name (git-fixes).
- efi: Accept version 2 of memory attributes table (git-fixes).
- efi: efivars: Fix variable writes with unsupported query_variable_store() (git-fixes).
- efi: efivars: Fix variable writes without query_variable_store() (git-fixes).
- efi: fix potential NULL deref in efi_mem_reserve_persistent (git-fixes).
- efi: rt-wrapper: Add missing include (git-fixes).
- efi: ssdt: Do not free memory if ACPI table was loaded successfully (git-fixes).
- efi: sysfb_efi: Add quirk for Lenovo Yoga Book X91F/L (git-fixes).
- efi: sysfb_efi: Fix DMI quirks not working for simpledrm (git-fixes).
- elevator: update the document of elevator_switch (git-fixes).
- ethernet: 3com/typhoon: do not write directly to netdev-&gt;dev_addr (git-fixes).
- ethernet: 8390/etherh: do not write directly to netdev-&gt;dev_addr (git-fixes).
- ethernet: i825xx: do not write directly to netdev-&gt;dev_addr (git-fixes).
- ethernet: ice: avoid gcc-9 integer overflow warning (jsc#PED-376).
- ethernet: seeq/ether3: do not write directly to netdev-&gt;dev_addr (git-fixes).
- ethernet: tundra: do not write directly to netdev-&gt;dev_addr (git-fixes).
- exit: Add and use make_task_dead (bsc#1207328).
- exit: Allow oops_limit to be disabled (bsc#1207328).
- exit: Guarantee make_task_dead leaks the tsk when calling do_task_exit (bsc#1207328).
- exit: Move force_uaccess back into do_exit (bsc#1207328).
- exit: Move oops specific logic from do_exit into make_task_dead (bsc#1207328).
- exit: Put an upper limit on how often we can oops (bsc#1207328).
- exit: Stop poorly open coding do_task_dead in make_task_dead (bsc#1207328).
- exit: Use READ_ONCE() for all oops/warn limit reads (bsc#1207328).
- ext4,f2fs: fix readahead of verity data (bsc#1207648).
- ext4: Fix deadlock during directory rename (bsc#1210763).
- ext4: Fix possible corruption when moving a directory (bsc#1210763).
- ext4: add EXT4_IGET_BAD flag to prevent unexpected bad inode (bsc#1207619).
- ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h (bsc#1206878).
- ext4: add helper to check quota inums (bsc#1207618).
- ext4: add inode table check in __ext4_get_inode_loc to aovid possible infinite loop (bsc#1207617).
- ext4: add missing validation of fast-commit record lengths (bsc#1207626).
- ext4: allocate extended attribute value in vmalloc area (bsc#1207635).
- ext4: avoid crash when inline data creation follows DIO write (bsc#1206883).
- ext4: avoid resizing to a partial cluster size (bsc#1206880).
- ext4: avoid unaccounted block allocation when expanding inode (bsc#1207634).
- ext4: continue to expand file system when the target size does not reach (bsc#1206882).
- ext4: correct cluster len and clusters changed accounting in ext4_mb_mark_bb (bsc#1207592).
- ext4: correct max_inline_xattr_value_size computing (bsc#1206878).
- ext4: correct the misjudgment in ext4_iget_extra_inode (bsc#1206878).
- ext4: disable fast-commit of encrypted dir operations (bsc#1207623).
- ext4: do not allow journal inode to have encrypt flag (bsc#1207621).
- ext4: do not increase iversion counter for ea_inodes (bsc#1207605).
- ext4: do not run ext4lazyinit for read-only filesystems (bsc#1207603).
- ext4: do not set up encryption key during jbd2 transaction (bsc#1207624).
- ext4: drop ineligible txn start stop APIs (bsc#1207588).
- ext4: ext4_read_bh_lock() should submit IO if the buffer isn't uptodate (bsc#1207606).
- ext4: factor out ext4_fc_get_tl() (bsc#1207615).
- ext4: fast commit may miss file actions (bsc#1207591).
- ext4: fast commit may not fallback for ineligible commit (bsc#1207590).
- ext4: fix BUG_ON() when directory entry has invalid rec_len (bsc#1206886).
- ext4: fix RENAME_WHITEOUT handling for inline directories (bsc#1210766).
- ext4: fix another off-by-one fsmap error on 1k block filesystems (bsc#1210767).
- ext4: fix bad checksum after online resize (bsc#1210762 bsc#1208076).
- ext4: fix bug in extents parsing when eh_entries == 0 and eh_depth &gt; 0 (bsc#1206881).
- ext4: fix bug_on in __es_tree_search caused by bad boot loader inode (bsc#1207620).
- ext4: fix bug_on in start_this_handle during umount filesystem (bsc#1207594).
- ext4: fix cgroup writeback accounting with fs-layer encryption (bsc#1210765).
- ext4: fix corruption when online resizing a 1K bigalloc fs (bsc#1206891).
- ext4: fix deadlock due to mbcache entry corruption (bsc#1207653).
- ext4: fix delayed allocation bug in ext4_clu_mapped for bigalloc + inline (bsc#1207631).
- ext4: fix dir corruption when ext4_dx_add_entry() fails (bsc#1207608).
- ext4: fix error code return to user-space in ext4_get_branch() (bsc#1207630).
- ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit (bsc#1207593).
- ext4: fix extent status tree race in writeback error recovery path (bsc#1206877).
- ext4: fix incorrect options show of original mount_opt and extend mount_opt2 (bsc#1210764).
- ext4: fix inode leak in ext4_xattr_inode_create() on an error path (bsc#1207636).
- ext4: fix kernel BUG in 'ext4_write_inline_data_end()' (bsc#1206894).
- ext4: fix leaking uninitialized memory in fast-commit journal (bsc#1207625).
- ext4: fix miss release buffer head in ext4_fc_write_inode (bsc#1207609).
- ext4: fix null-ptr-deref in ext4_write_info (bsc#1206884).
- ext4: fix off-by-one errors in fast-commit block filling (bsc#1207628).
- ext4: fix possible double unlock when moving a directory (bsc#1210763).
- ext4: fix potential memory leak in ext4_fc_record_modified_inode() (bsc#1207611).
- ext4: fix potential memory leak in ext4_fc_record_regions() (bsc#1207612).
- ext4: fix potential out of bound read in ext4_fc_replay_scan() (bsc#1207616).
- ext4: fix reserved cluster accounting in __es_remove_extent() (bsc#1207637).
- ext4: fix unaligned memory access in ext4_fc_reserve_space() (bsc#1207627).
- ext4: fix undefined behavior in bit shift for ext4_check_flag_values (bsc#1206890).
- ext4: fix uninititialized value in 'ext4_evict_inode' (bsc#1206893).
- ext4: fix use-after-free in ext4_ext_shift_extents (bsc#1206888).
- ext4: fix use-after-free in ext4_orphan_cleanup (bsc#1207622).
- ext4: fix use-after-free in ext4_xattr_set_entry (bsc#1206878).
- ext4: fix warning in 'ext4_da_release_space' (bsc#1206887).
- ext4: goto right label 'failed_mount3a' (bsc#1207610).
- ext4: init quota for 'old.inode' in 'ext4_rename' (bsc#1207629).
- ext4: initialize quota before expanding inode in setproject ioctl (bsc#1207633).
- ext4: introduce EXT4_FC_TAG_BASE_LEN helper (bsc#1207614).
- ext4: limit the number of retries after discarding preallocations blocks (bsc#1207602).
- ext4: make ext4_lazyinit_thread freezable (bsc#1206885).
- ext4: place buffer head allocation before handle start (bsc#1207607).
- ext4: silence the warning when evicting inode with dioread_nolock (bsc#1206889).
- ext4: simplify updating of fast commit stats (bsc#1207589).
- ext4: unconditionally enable the i_version counter (bsc#1211299).
- ext4: update 'state-&gt;fc_regions_size' after successful memory allocation (bsc#1207613).
- ext4: update s_overhead_clusters in the superblock during an on-line resize (bsc#1206876).
- ext4: use ext4_journal_start/stop for fast commit transactions (bsc#1210793).
- extcon: usbc-tusb320: fix kernel-doc warning (git-fixes).
- f2fs: Fix f2fs_truncate_partial_nodes ftrace event (git-fixes).
- fbcon: Check font dimension limits (git-fixes).
- fbcon: Fix error paths in set_con2fb_map (git-fixes).
- fbcon: Fix null-ptr-deref in soft_cursor (git-fixes).
- fbcon: set_con2fb_map needs to set con2fb_map! (git-fixes).
- fbdev: Prevent possible use-after-free in fb_release() (bsc#1152472) Backporting changes: 	* replace refcount_read() with atomic_read()
- fbdev: arcfb: Fix error handling in arcfb_probe() (git-fixes).
- fbdev: au1200fb: Fix potential divide by zero (git-fixes).
- fbdev: ep93xx-fb: Add missing clk_disable_unprepare in ep93xxfb_probe() (git-fixes).
- fbdev: fbcon: Destroy mutex on freeing struct fb_info (bsc#1152489)
- fbdev: imsttfb: Fix use after free bug in imsttfb_probe (git-fixes bsc#1211387).
- fbdev: intelfb: Fix potential divide by zero (git-fixes).
- fbdev: lxfb: Fix potential divide by zero (git-fixes).
- fbdev: mmp: Fix deferred clk handling in mmphw_probe() (git-fixes).
- fbdev: modedb: Add 1920x1080 at 60 Hz video mode (git-fixes).
- fbdev: nvidia: Fix potential divide by zero (git-fixes).
- fbdev: omapfb: avoid stack overflow warning (git-fixes).
- fbdev: omapfb: cleanup inconsistent indentation (git-fixes).
- fbdev: smscufx: fix error handling code in ufx_usb_probe (git-fixes).
- fbdev: stifb: Fall back to cfb_fillrect() on 32-bit HCRX cards (git-fixes).
- fbdev: stifb: Fix info entry in sti_struct on error path (git-fixes).
- fbdev: stifb: Provide valid pixelclock and add fb_check_var() checks (git-fixes).
- fbdev: tgafb: Fix potential divide by zero (git-fixes).
- fbdev: udlfb: Fix endpoint check (git-fixes).
- fbmem: Reject FB_ACTIVATE_KD_TEXT from userspace (git-fixes).
- filelock: new helper: vfs_inode_has_locks (jsc#SES-1880).
- firewire: fix memory leak for payload of request subaction to IEC 61883-1 FCP region (git-fixes).
- firmware/efi sysfb_efi: Add quirk for Lenovo IdeaPad Duet 3 (git-fixes).
- firmware: arm_ffa: Check if ffa_driver remove is present before executing (git-fixes).
- firmware: arm_ffa: Set handle field to zero in memory descriptor (git-fixes).
- firmware: arm_ffa: Set reserved/MBZ fields to zero in the memory descriptors (git-fixes).
- firmware: arm_scmi: Fix device node validation for mailbox transport (git-fixes).
- firmware: coreboot: Remove GOOGLE_COREBOOT_TABLE_ACPI/OF Kconfig entries (git-fixes).
- firmware: coreboot: framebuffer: Ignore reserved pixel color bits (git-fixes).
- firmware: dmi-sysfs: Fix null-ptr-deref in dmi_sysfs_register_handle (git-fixes).
- firmware: qcom_scm: Clear download bit during reboot (git-fixes).
- firmware: stratix10-svc: Fix an NULL vs IS_ERR() bug in probe (git-fixes).
- firmware: stratix10-svc: add missing gen_pool_destroy() in stratix10_svc_drv_probe() (git-fixes).
- firmware: xilinx: do not make a sleepable memory allocation from an atomic context (git-fixes).
- flow_dissector: Do not count vlan tags inside tunnel payload (git-fixes).
- fork: allow CLONE_NEWTIME in clone3 flags (bsc#1209258).
- fotg210-udc: Add missing completion handler (git-fixes).
- fpga: bridge: fix kernel-doc parameter description (git-fixes).
- fpga: bridge: properly initialize bridge device before populating children (git-fixes).
- fpga: m10bmc-sec: Fix probe rollback (git-fixes).
- fpga: stratix10-soc: Fix return value check in s10_ops_write_init() (git-fixes).
- fprobe: Check rethook_alloc() return in rethook initialization (git-fixes).
- fprobe: Fix smatch type mismatch warning (git-fixes).
- fprobe: add recursion detection in fprobe_exit_handler (git-fixes).
- fprobe: make fprobe_kprobe_handler recursion free (git-fixes).
- fs/jfs: fix shift exponent db_agl2size negative (git-fixes).
- fs/proc: task_mmu.c: do not read mapcount for migration entry (CVE-2023-1582, bsc#1209636).
- fs: account for filesystem mappings (bsc#1205191).
- fs: account for group membership (bsc#1205191).
- fs: add i_user_ns() helper (bsc#1205191).
- fs: dlm: do not call kernel_getpeername() in error_report() (bsc#1208130).
- fs: dlm: use sk-&gt;sk_socket instead of con-&gt;sock (bsc#1208130).
- fs: ext4: initialize fsdata in pagecache_write() (bsc#1207632).
- fs: hfsplus: fix UAF issue in hfsplus_put_super (git-fixes).
- fs: jfs: fix possible NULL pointer dereference in dbFree() (git-fixes).
- fs: jfs: fix shift-out-of-bounds in dbAllocAG (git-fixes).
- fs: jfs: fix shift-out-of-bounds in dbDiscardAG (git-fixes).
- fs: move mapping helpers (bsc#1205191).
- fs: remove __sync_filesystem (git-fixes).
- fs: sysv: Fix sysv_nblocks() returns wrong value (git-fixes).
- fs: tweak fsuidgid_has_mapping() (bsc#1205191).
- fscache: Use wait_on_bit() to wait for the freeing of relinquished volume (bsc#1210409).
- fscache_cookie_enabled: check cookie is valid before accessing it (bsc#1208429).
- ftrace/x86: Add back ftrace_expected for ftrace bug reports (git-fixes).
- ftrace: Clean comments related to FTRACE_OPS_FL_PER_CPU (git-fixes).
- ftrace: Fix invalid address access in lookup_rec() when index is 0 (git-fixes).
- ftrace: Fix issue that 'direct-&gt;addr' not restored in modify_ftrace_direct() (git-fixes).
- ftrace: Mark get_lock_parent_ip() __always_inline (git-fixes).
- fuse: add inode/permission checks to fileattr_get/fileattr_set (bsc#1208759).
- fuse: always revalidate rename target dentry (bsc#1211808).
- fuse: fix attr version comparison in fuse_read_update_size() (bsc#1211807).
- futex: Resend potentially swallowed owner death notification (git-fixes).
- genirq: Provide new interfaces for affinity hints (bsc#1208153).
- git-sort: Add io_uring 6.3 fixes remote
- google/gve:fix repeated words in comments (bsc#1211519).
- gpio: GPIO_REGMAP: select REGMAP instead of depending on it (git-fixes).
- gpio: davinci: Add irq chip flag to skip set wake (git-fixes).
- gpio: mockup: Fix mode of debugfs files (git-fixes).
- gpio: tegra186: remove unneeded loop in tegra186_gpio_init_route_mapping() (git-fixes).
- gpio: vf610: connect GPIO label to dev name (git-fixes).
- gpu: host1x: Do not skip assigning syncpoints to channels (git-fixes).
- gpu: host1x: Fix mask for syncpoint increment register (git-fixes).
- gpu: host1x: Fix potential double free if IOMMU is disabled (git-fixes).
- gpu: ipu-v3: common: Add of_node_put() for reference returned by of_graph_get_port_by_id() (git-fixes).
- gve: Adding a new AdminQ command to verify driver (bsc#1211519).
- gve: Cache link_speed value from device (git-fixes).
- gve: Fix error return code in gve_prefill_rx_pages() (bsc#1211519).
- gve: Fix spelling mistake 'droping' -&gt; 'dropping' (bsc#1211519).
- gve: Handle alternate miss completions (bsc#1211519).
- gve: Reduce alloc and copy costs in the GQ rx path (bsc#1211519).
- gve: Remove the code of clearing PBA bit (git-fixes).
- gve: Secure enough bytes in the first TX desc for all TCP pkts (git-fixes).
- gve: enhance no queue page list detection (bsc#1211519).
- hfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling (git-fixes).
- hfs/hfsplus: use WARN_ON for sanity check (git-fixes).
- hfs: Fix OOB Write in hfs_asc2mac (git-fixes).
- hfs: fix OOB Read in __hfs_brec_find (git-fixes).
- hfs: fix missing hfs_bnode_get() in __hfs_bnode_create (git-fixes).
- hfsplus: fix bug causing custom uid and gid being unable to be assigned with mount (git-fixes).
- hid: Add Mapping for System Microphone Mute (git-fixes).
- hid: amd_sfh: Add missing check for dma_alloc_coherent (bsc#1212605 CVE-2023-3357).
- hid: amd_sfh: Add missing check for dma_alloc_coherent (bsc#1212605 CVE-2023-3357).
- hid: asus: use spinlock to protect concurrent accesses (git-fixes).
- hid: asus: use spinlock to safely schedule workers (git-fixes).
- hid: bigben: use spinlock to protect concurrent accesses (git-fixes).
- hid: bigben: use spinlock to safely schedule workers (git-fixes).
- hid: bigben_probe(): validate report count (git-fixes).
- hid: bigben_worker() remove unneeded check on report_field (git-fixes).
- hid: core: Fix deadloop in hid_apply_multiplier (git-fixes).
- hid: cp2112: Fix driver not registering GPIO IRQ chip as threaded (git-fixes).
- hid: elecom: add support for TrackBall 056E:011C (git-fixes).
- hid: google: add jewel USB id (git-fixes).
- hid: intel-ish-hid: ipc: Fix potential use-after-free in work function (git-fixes).
- hid: logitech-hidpp: Do not restart communication if not necessary (git-fixes).
- hid: logitech-hidpp: Do not use the USB serial for USB devices (git-fixes).
- hid: logitech-hidpp: Reconcile USB and Unifying serials (git-fixes).
- hid: microsoft: Add rumble support to latest xbox controllers (bsc#1211280).
- hid: multitouch: Add quirks for flipped axes (git-fixes).
- hid: playstation: sanity check DualSense calibration data (git-fixes).
- hid: retain initial quirks set up when creating HID devices (git-fixes).
- hid: wacom: Add new Intuos Pro Small (PTH-460) device IDs (git-fixes).
- hid: wacom: Force pen out of prox if no events have been received in a while (git-fixes).
- hid: wacom: Set a default resolution for older tablets (git-fixes).
- hid: wacom: add three styli to wacom_intuos_get_tool_type (git-fixes).
- hid: wacom: avoid integer overflow in wacom_intuos_inout() (git-fixes).
- hid: wacom: generic: Set battery quirk only when we see battery data (git-fixes).
- hv: fix comment typo in vmbus_channel/low_latency (git-fixes).
- hv: hv_balloon: fix memory leak with using debugfs_lookup() (git-fixes).
- hv_netvsc: Allocate memory in netvsc_dma_map() with GFP_ATOMIC (git-fixes).
- hv_netvsc: Check status in SEND_RNDIS_PKT completion message (git-fixes).
- hv_netvsc: Fix missed pagebuf entries in netvsc_dma_map/unmap() (git-fixes).
- hwmon: (adm1266) Set `can_sleep` flag for GPIO chip (git-fixes).
- hwmon: (adt7475) Display smoothing attributes in correct order (git-fixes).
- hwmon: (adt7475) Fix masking of hysteresis registers (git-fixes).
- hwmon: (adt7475) Use device_property APIs when configuring polarity (git-fixes).
- hwmon: (coretemp) Simplify platform device handling (git-fixes).
- hwmon: (ftsteutates) Fix scaling of measurements (git-fixes).
- hwmon: (ina3221) return prober error code (git-fixes).
- hwmon: (k10temp) Check range scale when CUR_TEMP register is read-write (git-fixes).
- hwmon: (k10temp): Add support for new family 17h and 19h models (bsc#1208848).
- hwmon: (ltc2945) Handle error case in ltc2945_value_store (git-fixes).
- hwmon: (ltc2992) Set `can_sleep` flag for GPIO chip (git-fixes).
- hwmon: (mlxreg-fan) Return zero speed for broken fan (git-fixes).
- hwmon: (pmbus/fsp-3y) Fix functionality bitmask in FSP-3Y YM-2151E (git-fixes).
- hwmon: (ucd90320) Add minimum delay between bus accesses (git-fixes).
- hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition (git-fixes).
- hwmon: fix potential sensor registration fail if of_node is missing (git-fixes).
- hwmon: tmp512: drop of_match_ptr for ID table (git-fixes).
- i2c: cadence: cdns_i2c_master_xfer(): Fix runtime PM leak on error path (git-fixes).
- i2c: designware-pci: Add new PCI IDs for AMD NAVI GPU (git-fixes).
- i2c: designware: fix i2c_dw_clk_rate() return size to be u32 (git-fixes).
- i2c: hisi: Avoid redundant interrupts (git-fixes).
- i2c: hisi: Only use the completion interrupt to finish the transfer (git-fixes).
- i2c: imx-lpi2c: check only for enabled interrupt flags (git-fixes).
- i2c: imx-lpi2c: clean rx/tx buffers upon new message (git-fixes).
- i2c: imx-lpi2c: fix type char overflow issue when calculating the clock cycle (git-fixes).
- i2c: mv64xxx: Add atomic_xfer method to driver (git-fixes).
- i2c: mv64xxx: Fix reading invalid status value in atomic mode (git-fixes).
- i2c: mv64xxx: Remove shutdown method from driver (git-fixes).
- i2c: mxs: suppress probe-deferral error message (git-fixes).
- i2c: ocores: generate stop condition after timeout in polling mode (git-fixes).
- i2c: omap: Fix standard mode false ACK readings (git-fixes).
- i2c: qup: Add missing unwind goto in qup_i2c_probe() (git-fixes).
- i2c: rk3x: fix a bunch of kernel-doc warnings (git-fixes).
- i2c: sprd: Delete i2c adapter in .remove's error path (git-fixes).
- i2c: tegra: Fix PEC support for SMBUS block read (git-fixes).
- i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer() (git-fixes).
- i40e: Add checking for null for nlmsg_find_attr() (jsc#SLE-18378).
- i40e: Fix ADQ rate limiting for PF (jsc#SLE-18378).
- i40e: Fix DMA mappings leak (jsc#SLE-18378).
- i40e: Fix VF hang when reset is triggered on another VF (jsc#SLE-18378).
- i40e: Fix VF set max MTU size (jsc#SLE-18378).
- i40e: Fix VF's MAC Address change on VM (jsc#SLE-18378).
- i40e: Fix adding ADQ filter to TC0 (jsc#SLE-18378).
- i40e: Fix calculating the number of queue pairs (jsc#SLE-18378).
- i40e: Fix erroneous adapter reinitialization during recovery process (jsc#SLE-18378).
- i40e: Fix ethtool rx-flow-hash setting for X722 (jsc#SLE-18378).
- i40e: Fix flow-type by setting GL_HASH_INSET registers (jsc#SLE-18378).
- i40e: Fix for VF MAC address 0 (jsc#SLE-18378).
- i40e: Fix incorrect address type for IPv6 flow rules (jsc#SLE-18378).
- i40e: Fix interface init with MSI interrupts (no MSI-X) (jsc#SLE-18378).
- i40e: Fix kernel crash during module removal (jsc#SLE-18378).
- i40e: Fix kernel crash during reboot when adapter is in recovery mode (jsc#SLE-18378).
- i40e: Fix set max_tx_rate when it is lower than 1 Mbps (jsc#SLE-18378).
- i40e: Fix the inability to attach XDP program on downed interface (jsc#SLE-18378).
- i40e: Refactor tc mqprio checks (jsc#SLE-18378).
- i40e: add double of VLAN header when computing the max MTU (jsc#SLE-18378).
- i40e: fix accessing vsi-&gt;active_filters without holding lock (jsc#SLE-18378).
- i40e: fix flow director packet filter programming (jsc#SLE-18378).
- i40e: fix i40e_setup_misc_vector() error handling (jsc#SLE-18378).
- i40e: fix registers dump after run ethtool adapter self test (jsc#SLE-18378).
- i825xx: sni_82596: use eth_hw_addr_set() (git-fixes).
- i915 kABI workaround (git-fixes).
- i915/perf: Replace DRM_DEBUG with driver specific drm_dbg call (git-fixes).
- iavf/iavf_main: actually log -&gt;src mask when talking about it (jsc#SLE-18385).
- iavf: Detach device during reset task (jsc#SLE-18385).
- iavf: Disallow changing rx/tx-frames and rx/tx-frames-irq (jsc#SLE-18385).
- iavf: Do not restart Tx queues after reset task failure (jsc#SLE-18385).
- iavf: Fix 'tc qdisc show' listing too many queues (jsc#SLE-18385).
- iavf: Fix a crash during reset task (jsc#SLE-18385).
- iavf: Fix bad page state (jsc#SLE-18385).
- iavf: Fix cached head and tail value for iavf_get_tx_pending (jsc#SLE-18385).
- iavf: Fix error handling in iavf_init_module() (jsc#SLE-18385).
- iavf: Fix max_rate limiting (jsc#SLE-18385).
- iavf: Fix race condition between iavf_shutdown and iavf_remove (jsc#SLE-18385).
- iavf: Fix set max MTU size with port VLAN and jumbo frames (jsc#SLE-18385).
- iavf: do not track VLAN 0 filters (jsc#PED-835).
- iavf: fix hang on reboot with ice (jsc#SLE-18385).
- iavf: fix inverted Rx hash condition leading to disabled hash (jsc#SLE-18385).
- iavf: fix non-tunneled IPv6 UDP packet type and hashing (jsc#SLE-18385).
- iavf: fix temporary deadlock and failure to set MAC address (jsc#PED-835).
- iavf: refactor VLAN filter states (jsc#PED-835).
- iavf: remove active_cvlans and active_svlans bitmaps (jsc#PED-835).
- iavf: remove mask from iavf_irq_enable_queues() (git-fixes).
- iavf: schedule watchdog immediately when changing primary MAC (jsc#PED-835).
- ib/hfi1: Assign npages earlier (git-fixes)
- ib/hfi1: Fix SDMA mmu_rb_node not being evicted in LRU order (git-fixes)
- ib/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests (git-fixes)
- ib/hfi1: Fix expected receive setup error exit issues (git-fixes)
- ib/hfi1: Fix math bugs in hfi1_can_pin_pages() (git-fixes)
- ib/hfi1: Fix sdma.h tx-&gt;num_descs off-by-one errors (git-fixes)
- ib/hfi1: Immediately remove invalid memory from hardware (git-fixes)
- ib/hfi1: Reject a zero-length user expected buffer (git-fixes)
- ib/hfi1: Remove user expected buffer invalidate race (git-fixes)
- ib/hfi1: Reserve user expected TIDs (git-fixes)
- ib/hfi1: Restore allocated resources on failed copyout (git-fixes)
- ib/hfi1: Update RMT size calculation (git-fixes)
- ib/hifi1: add a null check of kzalloc_node in hfi1_ipoib_txreq_init (git-fixes)
- ib/ipoib: Fix legacy IPoIB due to wrong number of queues (git-fixes)
- ib/mad: Do not call to function that might sleep while in atomic context (git-fixes).
- ib/mlx5: Add support for 400G_8X lane speed (git-fixes)
- ib/rdmavt: add missing locks in rvt_ruc_loopback (git-fixes)
- ice, xsk: Diversify return values from xsk_wakeup call paths (git-fixes).
- ice: Add check for kzalloc (jsc#PED-376).
- ice: Do not double unplug aux on peer initiated reset (git-fixes).
- ice: Do not use WQ_MEM_RECLAIM flag for workqueue (git-fixes).
- ice: Do not use WQ_MEM_RECLAIM flag for workqueue (jsc#PED-376).
- ice: Fix DSCP PFC TLV creation (git-fixes).
- ice: Fix DSCP PFC TLV creation (jsc#PED-376).
- ice: Fix XDP memory leak when NIC is brought up and down (git-fixes).
- ice: Fix disabling Rx VLAN filtering with port VLAN enabled (jsc#PED-376).
- ice: Fix ice VF reset during iavf initialization (jsc#PED-376).
- ice: Fix ice_cfg_rdma_fltr() to only update relevant fields (jsc#PED-376).
- ice: Fix ice_xdp_xmit() when XDP TX queue number is not sufficient (git-fixes).
- ice: Fix interrupt moderation settings getting cleared (jsc#SLE-18375).
- ice: Fix memory corruption in VF driver (git-fixes).
- ice: Fix potential memory leak in ice_gnss_tty_write() (jsc#PED-376).
- ice: Ignore EEXIST when setting promisc mode (git-fixes).
- ice: Prevent set_channel from changing queues while RDMA active (git-fixes).
- ice: Prevent set_channel from changing queues while RDMA active (jsc#PED-376).
- ice: Reset FDIR counter in FDIR init stage (git-fixes).
- ice: Reset FDIR counter in FDIR init stage (jsc#PED-376).
- ice: Set txq_teid to ICE_INVAL_TEID on ring creation (jsc#SLE-18375).
- ice: add profile conflict check for AVF FDIR (git-fixes).
- ice: add profile conflict check for AVF FDIR (jsc#PED-376).
- ice: avoid bonding causing auxiliary plug/unplug under RTNL lock (bsc#1210158).
- ice: block LAN in case of VF to VF offload (git-fixes).
- ice: block LAN in case of VF to VF offload (jsc#PED-376).
- ice: check if VF exists before mode check (jsc#PED-376).
- ice: config netdev tc before setting queues number (git-fixes).
- ice: copy last block omitted in ice_get_module_eeprom() (git-fixes).
- ice: copy last block omitted in ice_get_module_eeprom() (jsc#PED-376).
- ice: ethtool: Prohibit improper channel config for DCB (git-fixes).
- ice: ethtool: advertise 1000M speeds properly (git-fixes).
- ice: fix invalid check for empty list in ice_sched_assoc_vsi_to_agg() (git-fixes).
- ice: fix invalid check for empty list in ice_sched_assoc_vsi_to_agg() (jsc#PED-376).
- ice: fix lost multicast packets in promisc mode (jsc#PED-376).
- ice: fix wrong fallback logic for FDIR (git-fixes).
- ice: fix wrong fallback logic for FDIR (jsc#PED-376).
- ice: handle E822 generic device ID in PLDM header (git-fixes).
- ice: move devlink port creation/deletion (jsc#PED-376).
- ice: switch: fix potential memleak in ice_add_adv_recipe() (git-fixes).
- ice: switch: fix potential memleak in ice_add_adv_recipe() (jsc#PED-376).
- ice: use bitmap_free instead of devm_kfree (git-fixes).
- ice: xsk: Fix cleaning of XDP_TX frames (jsc#PED-376).
- ice: xsk: disable txq irq before flushing hw (jsc#PED-376).
- ice: xsk: do not use xdp_return_frame() on tx_buf-&gt;raw_buf (jsc#PED-376).
- ice: xsk: use Rx ring's XDP ring when picking NAPI context (git-fixes).
- ieee80211: add TWT element definitions (bsc#1209980).
- ieee802154: hwsim: Fix possible memory leaks (git-fixes).
- ifcvf/vDPA: fix misuse virtio-net device config size for blk dev (jsc#SLE-19253).
- igb: Add lock to avoid data race (jsc#SLE-18379).
- igb: Enable SR-IOV after reinit (jsc#SLE-18379).
- igb: Fix PPS input and output using 3rd and 4th SDP (jsc#PED-370).
- igb: Fix extts capture value format for 82580/i354/i350 (git-fixes).
- igb: Initialize mailbox message for VF reset (jsc#SLE-18379).
- igb: conditionalize I2C bit banging on external thermal sensor support (jsc#SLE-18379).
- igb: fix bit_shift to be in [1..8] range (git-fixes).
- igb: fix nvm.ops.read() error handling (git-fixes).
- igb: revert rtnl_lock() that causes deadlock (jsc#SLE-18379).
- igbvf: Regard vf reset nack as success (jsc#SLE-18379).
- igc: Add checking for basetime less than zero (jsc#SLE-18377).
- igc: Add ndo_tx_timeout support (jsc#SLE-18377).
- igc: Clean the TX buffer and TX descriptor ring (git-fixes).
- igc: Enhance Qbv scheduling by using first flag bit (jsc#SLE-18377).
- igc: Fix PPS delta between two synchronized end-points (jsc#SLE-18377).
- igc: Fix possible system crash when loading module (git-fixes).
- igc: Lift TAPRIO schedule restriction (jsc#SLE-18377).
- igc: Reinstate IGC_REMOVED logic and implement it properly (jsc#SLE-18377).
- igc: Set Qbv start_time and end_time to end_time if not being configured in GCL (jsc#SLE-18377).
- igc: Use strict cycles for Qbv scheduling (jsc#SLE-18377).
- igc: allow BaseTime 0 enrollment for Qbv (jsc#SLE-18377).
- igc: fix the validation logic for taprio's gate list (jsc#SLE-18377).
- igc: read before write to SRRCTL register (jsc#SLE-18377).
- igc: recalculate Qbv end_time by considering cycle time (jsc#SLE-18377).
- igc: return an error if the mac type is unknown in igc_ptp_systim_to_hwtstamp() (jsc#SLE-18377).
- iio: accel: mma9551_core: Prevent uninitialized variable in mma9551_read_config_word() (git-fixes).
- iio: accel: mma9551_core: Prevent uninitialized variable in mma9551_read_status_word() (git-fixes).
- iio: accel: st_accel: Fix invalid mount_matrix on devices without ACPI _ONT method (git-fixes).
- iio: adc: ad7192: Change 'shorted' channels to differential (git-fixes).
- iio: adc: ad7791: fix IRQ flags (git-fixes).
- iio: adc: ad_sigma_delta: Fix IRQ issue by setting IRQ_DISABLE_UNLAZY flag (git-fixes).
- iio: adc: at91-sama5d2_adc: fix an error code in at91_adc_allocate_trigger() (git-fixes).
- iio: adc: berlin2-adc: Add missing of_node_put() in error path (git-fixes).
- iio: adc: mxs-lradc: fix the order of two cleanup operations (git-fixes).
- iio: adc: palmas_gpadc: fix NULL dereference on rmmod (git-fixes).
- iio: adc: stm32-dfsdm: fill module aliases (git-fixes).
- iio: adc: ti-ads7950: Set `can_sleep` flag for GPIO chip (git-fixes).
- iio: adis16480: select CONFIG_CRC32 (git-fixes).
- iio: dac: cio-dac: Fix max DAC write value check for 12-bit (git-fixes).
- iio: dac: mcp4725: Fix i2c_master_send() return value handling (git-fixes).
- iio: hid: fix the retval in accel_3d_capture_sample (git-fixes).
- iio: hid: fix the retval in gyro_3d_capture_sample (git-fixes).
- iio: imu: fxos8700: fix ACCEL measurement range selection (git-fixes).
- iio: imu: fxos8700: fix IMU data bits returned to user space (git-fixes).
- iio: imu: fxos8700: fix MAGN sensor scale and unit (git-fixes).
- iio: imu: fxos8700: fix failed initialization ODR mode assignment (git-fixes).
- iio: imu: fxos8700: fix incomplete ACCEL and MAGN channels readback (git-fixes).
- iio: imu: fxos8700: fix incorrect ODR mode readback (git-fixes).
- iio: imu: fxos8700: fix map label of channel type to MAGN sensor (git-fixes).
- iio: imu: fxos8700: fix swapped ACCEL and MAGN channels readback (git-fixes).
- iio: imu: fxos8700: remove definition FXOS8700_CTRL_ODR_MIN (git-fixes).
- iio: imu: inv_icm42600: fix timestamp reset (git-fixes).
- iio: light: cm32181: Unregister second I2C client if present (git-fixes).
- iio: light: tsl2563: Do not hardcode interrupt trigger type (git-fixes).
- iio: light: tsl2772: fix reading proximity-diodes from device tree (git-fixes).
- iio: light: vcnl4035: fixed chip ID check (git-fixes).
- iio:adc:twl6030: Enable measurement of VAC (git-fixes).
- iio:adc:twl6030: Enable measurements of VUSB, VBAT and others (git-fixes).
- ima: Fix memory leak in __ima_inode_hash() (git-fixes).
- init, x86: Move mem_encrypt_init() into arch_cpu_finalize_init() (bsc#1212448).
- init: Invoke arch_cpu_finalize_init() earlier (bsc#1212448).
- init: Provide arch_cpu_finalize_init() (bsc#1212448).
- init: Remove check_bugs() leftovers (bsc#1212448).
- input: ads7846 - always set last command to PWRDOWN (git-fixes).
- input: ads7846 - do not check penirq immediately for 7845 (git-fixes).
- input: ads7846 - do not report pressure for ads7845 (git-fixes).
- input: alps - fix compatibility with -funsigned-char (bsc#1209805).
- input: exc3000 - properly stop timer on shutdown (git-fixes).
- input: fix open count when closing inhibited device (git-fixes).
- input: focaltech - use explicitly signed char type (git-fixes).
- input: goodix - add Lenovo Yoga Book X90F to nine_bytes_report DMI table (git-fixes).
- input: hp_sdc_rtc - mark an unused function as __maybe_unused (git-fixes).
- input: iqs269a - configure device with a single block write (git-fixes).
- input: iqs269a - drop unused device node references (git-fixes).
- input: iqs269a - increase interrupt handler return delay (git-fixes).
- input: iqs626a - drop unused device node references (git-fixes).
- input: psmouse - fix OOB access in Elantech protocol (git-fixes).
- input: raspberrypi-ts - fix refcount leak in rpi_ts_probe (git-fixes).
- input: xpad - add constants for GIP interface numbers (git-fixes).
- input: xpad - delete a Razer DeathAdder mouse VID/PID entry (git-fixes).
- intel/igbvf: free irq on the error path in igbvf_request_msix() (jsc#SLE-18379).
- intel_idle: add Emerald Rapids Xeon support (PED-3849).
- interconnect: exynos: fix node leak in probe PM QoS error path (git-fixes).
- interconnect: fix mem leak when freeing nodes (git-fixes).
- interconnect: qcom: osm-l3: fix icc_onecell_data allocation (git-fixes).
- io_uring/fdinfo: fix sqe dumping for IORING_SETUP_SQE128 (git-fixes).
- io_uring/filetable: fix file reference underflow (git-fixes bsc#1207521 CVE-2023-0469).
- io_uring/kbuf: fix not advancing READV kbuf ring (git-fixes).
- io_uring/rsrc: fix null-ptr-deref in io_file_bitmap_get() (bsc#1209637 CVE-2023-1583).
- io_uring: clear TIF_NOTIFY_SIGNAL if set and task_work not available (git-fixes).
- io_uring: do not gate task_work run on TIF_NOTIFY_SIGNAL (git-fixes).
- io_uring: ensure that cached task references are always put on exit (git-fixes).
- io_uring: fix CQ waiting timeout handling (git-fixes).
- io_uring: fix fget leak when fs do not support nowait buffered read (bsc#1205205).
- io_uring: fix ordering of args in io_uring_queue_async_work (git-fixes).
- io_uring: fix return value when removing provided buffers (git-fixes).
- io_uring: fix size calculation when registering buf ring (git-fixes).
- io_uring: recycle kbuf recycle on tw requeue (git-fixes).
- iommu/hyper-v: Allow hyperv irq remapping without x2apic (git-fixes).
- iommu/vt-d: Add a fix for devices need extra dtlb flush (bsc#1208219).
- iommu/vt-d: Avoid superfluous IOTLB tracking in lazy mode (bsc#1208948).
- iommu/vt-d: Fix buggy QAT device mask (bsc#1208219).
- ipmi: fix SSIF not responding under certain cond (git-fixes).
- ipmi:ssif: Add 60ms time internal between write retries (bsc#1206459).
- ipmi:ssif: Add a timer between request retries (bsc#1206459).
- ipmi:ssif: Add send_retries increment (git-fixes).
- ipmi:ssif: Increase the message retry time (bsc#1206459).
- ipmi:ssif: Remove rtc_us_timer (bsc#1206459).
- ipmi:ssif: resend_msg() cannot fail (bsc#1206459).
- ipmi_ssif: Rename idle state and check (bsc#1206459).
- ipv6: raw: Deduct extension header length in rawv6_push_pending_frames (bsc#1207168 CVE-2023-0394).
- ipv6: raw: Deduct extension header length in rawv6_push_pending_frames (bsc#1207168 CVE-2023-0394).
- ipv6: sr: fix out-of-bounds read when setting HMAC data (bsc#1211592).
- ipv6: sr: fix out-of-bounds read when setting HMAC data (bsc#1211592).
- irqchip/clps711x: Remove unused clps711x_intc_init() function (git-fixes).
- irqchip/ftintc010: Mark all function static (git-fixes).
- irqchip/gic-v3: Refactor ISB + EOIR at ack time (git-fixes)
- irqchip/jcore-aic: Fix missing allocation of IRQ descriptors (git-fixes).
- iw_cxgb4: Fix potential NULL dereference in c4iw_fill_res_cm_id_entry() (git-fixes)
- iwlwifi: cfg: Add missing MODULE_FIRMWARE() for *.pnvm (bsc#1207553).
- ixgbe: Allow flow hash to be set via ethtool (jsc#SLE-18384).
- ixgbe: Enable setting RSS table to default values (jsc#SLE-18384).
- ixgbe: Fix panic during XDP_TX with &gt; 64 CPUs (jsc#SLE-18384).
- ixgbe: add double of VLAN header when computing the max MTU (jsc#SLE-18384).
- ixgbe: allow to increase MTU to 3K with XDP enabled (jsc#SLE-18384).
- ixgbe: fix pci device refcount leak (jsc#SLE-18384).
- ixgbe: stop resetting SYSTIME in ixgbe_ptp_start_cyclecounter (jsc#SLE-18384).
- jbd2: Fix up kABI of ext4 fast commit interface (bsc#1207590).
- jbd2: add miss release buffer head in fc_do_one_pass() (bsc#1207646).
- jbd2: fix a potential race while discarding reserved buffers after an abort (bsc#1207641).
- jbd2: fix potential buffer head reference count leak (bsc#1207644).
- jbd2: fix potential use-after-free in jbd2_fc_wait_bufs (bsc#1207645).
- jbd2: use the correct print format (git-fixes).
- jbd2: wake up journal waiters in FIFO order, not LIFO (bsc#1207643).
- jfs: Fix fortify moan in symlink (git-fixes).
- k-m-s: Drop Linux 2.6 support
- kABI compatibility workaround for efivars (git-fixes).
- kABI workaround for btbcm.c (git-fixes).
- kABI workaround for cpp_acpi extensions for EPP (bsc#1212445).
- kABI workaround for drm_dp_mst helper updates (bsc#1206843).
- kABI workaround for hid quirks (git-fixes).
- kABI workaround for ieee80211 and co (bsc#1209980).
- kABI workaround for mt76_poll_msec() (git-fixes).
- kABI workaround for struct acpi_ec (bsc#1207149).
- kABI workaround for xhci (git-fixes).
- kABI: Fix kABI after backport Emulate RDPID only if it is enabled in guest  (git-fixes)
- kABI: PCI: Reduce warnings on possible RW1C corruption (kabi).
- kABI: PCI: dwc: Add dw_pcie_ops.host_deinit() callback (kabi).
- kABI: PCI: loongson: Prevent LS7A MRRS increases (kabi).
- kABI: Preserve TRACE_EVENT_FL values (git-fixes).
- kABI: Work around kABI changes after '20347fca71a3 swiotlb: split up the global swiotlb lock' (jsc#PED-3259).
- kABI: x86/msi: Fix msi message data shadow struct (kabi).
- kABI: x86/msr: Remove .fixup usage (kabi).
- kabi/severities: add mlx5 internal symbols
- kabi/severities: added Microsoft mana symbold (bsc#1210551)
- kabi/severities: ignore KABI for NVMe target (bsc#1174777) The target code is only for testing and there are no external users.
- kabi/severities: ignore kABI changes for mt76/* local modules (bsc#1209980)
- kabi/severities: ignore kABI in bq27xxx_battery module Those are local symbols that are used only by child drivers
- kabi: FIX FOR NFSv4: Fix free of uninitialized nfs4_label on referral lookup (git-fixes).
- kabi: FIX FOR: NFS: Further optimisations for 'ls -l' (git-fixes).
- kabi: FIX FOR: NFSD: Have legacy NFSD WRITE decoders use xdr_stream_subsegment() (git-fixes).
- kabi: FIX FOR: NFSv4.1 query for fs_location attr on a new file system (Never, kabi).
- kabi: FIX FOR: NFSv4: keep state manager thread active if swap is enabled (Never, kabi).
- kabi: fix for: NFSv3: handle out-of-order write replies (bsc#1205544).
- kasan: no need to unset panic_on_warn in end_report() (bsc#1207328).
- kconfig: Update config changed flag before calling callback (git-fixes).
- kernel-binary: Add back kernel-default-base guarded by option Add configsh option for splitting off kernel-default-base, and for not signing the kernel on non-efi
- kernel-binary: install expoline.o (boo#1210791 bsc#1211089)
- kernel-docs: Add buildrequires on python3-base when using python3 The python3 binary is provided by python3-base.
- kernel-docs: Use python3 together with python3-Sphinx (bsc#1212741).
- kernel-source: Remove unused macro variant_symbols
- kernel-spec-macros: Fix up obsolete_rebuilds_subpackage to generate obsoletes correctly (boo#1172073 bsc#1191731). rpm only supports full length release, no provides
- keys: Add missing function documentation (git-fixes).
- keys: Create static version of public_key_verify_signature (git-fixes).
- keys: Do not cache key in task struct if key is requested from kernel thread (git-fixes).
- keys: Fix linking a duplicate key to a keyring's assoc_array (bsc#1207088).
- keys: asymmetric: Copy sig and digest in public_key_verify_signature() (git-fixes).
- keys: asymmetric: Fix ECDSA use via keyctl uapi (git-fixes).
- kmap_local: do not assume kmap PTEs are linear arrays in memory (git-fixes) Update config/armv7hl/default too.
- kprobe: reverse kp-&gt;flags when arm_kprobe failed (git-fixes).
- kprobes: Fix check for probe enabled in kill_kprobe() (git-fixes).
- kprobes: Fix to handle forcibly unoptimized kprobes on freeing_list (git-fixes).
- kprobes: Forbid probing on trampoline and BPF code areas (git-fixes).
- kprobes: Prohibit probes in gate area (git-fixes).
- kprobes: Skip clearing aggrprobe's post_handler in kprobe-on-ftrace case (git-fixes).
- kprobes: do not call disarm_kprobe() for disabled kprobes (git-fixes).
- kvm/vfio: Fix potential deadlock on vfio group_lock (git-fixes)
- kvm/vfio: Fix potential deadlock problem in vfio (git-fixes)
- kvm: Destroy target device if coalesced MMIO unregistration fails (git-fixes)
- kvm: Disallow user memslot with size that exceeds 'unsigned long' (git-fixes)
- kvm: Do not create VM debugfs files outside of the VM directory (git-fixes)
- kvm: Do not set Accessed/Dirty bits for ZERO_PAGE (git-fixes)
- kvm: LAPIC: Enable timer posted-interrupt only when mwait/hlt is advertised (git-fixes).
- kvm: Prevent module exit until all VMs are freed (git-fixes)
- kvm: SVM: Do not rewrite guest ICR on AVIC IPI virtualization failure (git-fixes).
- kvm: SVM: Fix benign 'bool vs. int' comparison in svm_set_cr0() (git-fixes).
- kvm: SVM: Fix potential overflow in SEV's send|receive_update_data() (git-fixes).
- kvm: SVM: Require logical ID to be power-of-2 for AVIC entry (git-fixes).
- kvm: SVM: Skip WRMSR fastpath on VM-Exit if next RIP isn't valid (git-fixes).
- kvm: SVM: hyper-v: placate modpost section mismatch error (git-fixes).
- kvm: VMX: Execute IBPB on emulated VM-exit when guest has IBRS (bsc#1206992 CVE-2022-2196).
- kvm: VMX: Introduce vmx_msr_bitmap_l01_changed() helper (git-fixes).
- kvm: VMX: Resume guest immediately when injecting #GP on ECREATE (git-fixes).
- kvm: VMX: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadow (git-fixes).
- kvm: VMX: Use is_64_bit_mode() to check 64-bit mode in SGX handler (git-fixes).
- kvm: X86: Fix tlb flush for tdp in kvm_invalidate_pcid() (git-fixes).
- kvm: arm64: Do not arm a hrtimer for an already pending timer (git-fixes)
- kvm: arm64: Do not hypercall before EL2 init (git-fixes)
- kvm: arm64: Do not return from void function (git-fixes)
- kvm: arm64: Fix PAR_TO_HPFAR() to work independently of PA_BITS. (git-fixes)
- kvm: arm64: Fix S1PTW handling on RO memslots (git-fixes)
- kvm: arm64: Fix bad dereference on MTE-enabled systems (git-fixes)
- kvm: arm64: Fix buffer overflow in kvm_arm_set_fw_reg() (git-fixes)
- kvm: arm64: Fix kvm init failure when mode!=vhe and VA_BITS=52. (git-fixes)
- kvm: arm64: Free hypervisor allocations if vector slot init fails (git-fixes)
- kvm: arm64: GICv4.1: Fix race with doorbell on VPE (git-fixes)
- kvm: arm64: Limit length in kvm_vm_ioctl_mte_copy_tags() to INT_MAX (git-fixes)
- kvm: arm64: PMU: Restore the guest's EL0 event counting after (git-fixes)
- kvm: arm64: Propagate errors from __pkvm_prot_finalize hypercall (git-fixes)
- kvm: arm64: Reject 32bit user PSTATE on asymmetric systems (git-fixes)
- kvm: arm64: Save PSTATE early on exit (git-fixes)
- kvm: arm64: Stop handle_exit() from handling HVC twice when an SError (git-fixes)
- kvm: arm64: Treat PMCR_EL1.LC as RES1 on asymmetric systems (git-fixes)
- kvm: arm64: nvhe: Eliminate kernel-doc warnings (git-fixes)
- kvm: arm64: vgic: Fix exit condition in scan_its_table() (git-fixes)
- kvm: arm64: vgic: Read HW interrupt pending state from the HW (git-fixes)
- kvm: initialize all of the kvm_debugregs structure before sending it to userspace (bsc#1209532 CVE-2023-1513).
- kvm: initialize all of the kvm_debugregs structure before sending it to userspace (bsc#1209532 CVE-2023-1513).
- kvm: nVMX: Also filter MSR_IA32_VMX_TRUE_PINBASED_CTLS when eVMCS (git-fixes).
- kvm: nVMX: Do not use Enlightened MSR Bitmap for L3 (git-fixes).
- kvm: nVMX: Document that ignoring memory failures for VMCLEAR is deliberate (git-fixes).
- kvm: nVMX: Emulate NOPs in L2, and PAUSE if it's not intercepted (git-fixes).
- kvm: nVMX: Inject #GP, not #UD, if 'generic' VMXON CR0/CR4 check fails (git-fixes).
- kvm: nVMX: Prioritize TSS T-flag #DBs over Monitor Trap Flag (git-fixes).
- kvm: nVMX: Properly expose ENABLE_USR_WAIT_PAUSE control to L1 (git-fixes).
- kvm: nVMX: Treat General Detect #DB (DR7.GD=1) as fault-like (git-fixes).
- kvm: nVMX: add missing consistency checks for CR0 and CR4 (bsc#1210294 CVE-2023-30456).
- kvm: nVMX: add missing consistency checks for CR0 and CR4 (bsc#1210294 CVE-2023-30456).
- kvm: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER (git-fixes).
- kvm: s390: selftest: memop: Fix integer literal (git-fixes).
- kvm: x86/emulator: Emulate RDPID only if it is enabled in guest (git-fixes).
- kvm: x86/mmu: avoid NULL-pointer dereference on page freeing bugs (git-fixes).
- kvm: x86/pmu: Ignore pmu-&gt;global_ctrl check if vPMU does not support global_ctrl (git-fixes).
- kvm: x86/svm: add __GFP_ACCOUNT to __sev_dbg_{en,de}crypt_user() (git-fixes).
- kvm: x86/vmx: Do not skip segment attributes if unusable bit is set (git-fixes).
- kvm: x86/xen: Fix memory leak in kvm_xen_write_hypercall_page() (git-fixes).
- kvm: x86: Copy filter arg outside kvm_vm_ioctl_set_msr_filter() (git-fixes).
- kvm: x86: Disable KVM_HC_CLOCK_PAIRING if tsc is in always catchup mode (git-fixes).
- kvm: x86: Do not change ICR on write to APIC_SELF_IPI (git-fixes).
- kvm: x86: Fail emulation during EMULTYPE_SKIP on any exception (git-fixes).
- kvm: x86: Inject #GP if WRMSR sets reserved bits in APIC Self-IPI (git-fixes).
- kvm: x86: Mask off reserved bits in CPUID.8000001FH (git-fixes).
- kvm: x86: Mask off unsupported and unknown bits of IA32_ARCH_CAPABILITIES (git-fixes).
- kvm: x86: Protect the unused bits in MSR exiting flags (git-fixes).
- kvm: x86: Remove a redundant guest cpuid check in kvm_set_cr4() (git-fixes).
- kvm: x86: Report deprecated x87 features in supported CPUID (git-fixes).
- kvm: x86: do not set st-&gt;preempted when going back to user space (git-fixes).
- kvm: x86: fix sending PV IPI (git-fixes).
- kvm: x86: fix sending PV IPI (git-fixes).
- kvm: x86: fix typo in __try_cmpxchg_user causing non-atomicness (git-fixes).
- kvm: x86: ioapic: Fix level-triggered EOI and userspace I/OAPIC reconfigure race (git-fixes).
- lan78xx: Add missing return code checks (git-fixes).
- lan78xx: Fix exception on link speed change (git-fixes).
- lan78xx: Fix memory allocation bug (git-fixes).
- lan78xx: Fix partial packet errors on suspend/resume (git-fixes).
- lan78xx: Fix race condition in disconnect handling (git-fixes).
- lan78xx: Fix race conditions in suspend/resume handling (git-fixes).
- lan78xx: Fix white space and style issues (git-fixes).
- lan78xx: Remove unused pause frame queue (git-fixes).
- lan78xx: Remove unused timer (git-fixes).
- lan78xx: Set flow control threshold to prevent packet loss (git-fixes).
- leds: Fix reference to led_set_brightness() in doc (git-fixes).
- leds: TI_LMU_COMMON: select REGMAP instead of depending on it (git-fixes).
- leds: led-class: Add missing put_device() to led_put() (git-fixes).
- leds: led-core: Fix refcount leak in of_led_get() (git-fixes).
- leds: tca6507: Fix error handling of using fwnode_property_read_string (git-fixes).
- lib/mpi: Fix buffer overrun when SG is too long (git-fixes).
- lib/sbitmap: Fix invalid loop in __sbitmap_queue_get_batch() (git-fixes).
- lib/zlib: remove redundation assignement of avail_in dfltcc_gdht() (git-fixes).
- libfs: add DEFINE_SIMPLE_ATTRIBUTE_SIGNED for signed value (git-fixes).
- lockd: set file_lock start and end when decoding nlm4 testargs (git-fixes).
- locking/rwbase: Mitigate indefinite writer starvation. Move out of sorted as the patch has moved within the tip tree.
- locking/rwsem: Add __always_inline annotation to __down_read_common() and inlined callers (git-fixes).
- locking/rwsem: Allow slowpath writer to ignore handoff bit if not set by first waiter (bsc#1207270).
- locking/rwsem: Always try to wake waiters in out_nolock path (bsc#1207270).
- locking/rwsem: Conditionally wake waiters in reader/writer slowpaths (bsc#1207270).
- locking/rwsem: Disable preemption in all down_read*() and up_read() code paths (bsc#1207270).
- locking/rwsem: Disable preemption in all down_write*() and up_write() code paths (bsc#1207270).
- locking/rwsem: Disable preemption while trying for rwsem lock (bsc#1207270).
- locking/rwsem: Make handoff bit handling more consistent (bsc#1207270).
- locking/rwsem: No need to check for handoff bit if wait queue empty (bsc#1207270).
- locking/rwsem: Prevent non-first waiter from spinning in down_write() slowpath (bsc#1207270).
- locking: Add missing __sched attributes (bsc#1207270).
- loop: Fix the max_loop commandline argument treatment when it is set to 0 (git-fixes).
- loop: fix ioctl calls using compat_loop_info (git-fixes).
- lpfc: Account for fabric domain ctlr device loss recovery (bsc#1211346, bsc#1211852).
- lpfc: Change firmware upgrade logging to KERN_NOTICE instead of TRACE_EVENT (bsc#1211852).
- lpfc: Clean up SLI-4 CQE status handling (bsc#1211852).
- lpfc: Clear NLP_IN_DEV_LOSS flag if already in rediscovery (bsc#1211852).
- lpfc: Copyright updates for 14.2.0.13 patches (bsc#1211852).
- lpfc: Enhance congestion statistics collection (bsc#1211852).
- lpfc: Fix use-after-free rport memory access in lpfc_register_remote_port (bsc#1211852, bsc#1208410, bsc#1211346).
- lpfc: Revise NPIV ELS unsol rcv cmpl logic to drop ndlp based on nlp_state (bsc#1211852).
- lpfc: Update lpfc version to 14.2.0.13 (bsc#1211852).
- lpfc: update metadata
- mac80211: introduce individual TWT support in AP mode (bsc#1209980).
- mac80211: introduce set_radar_offchan callback (bsc#1209980).
- mac80211: twt: do not use potentially unaligned pointer (bsc#1209980).
- mailbox: mailbox-test: Fix potential double-free in mbox_test_message_write() (git-fixes).
- mailbox: mailbox-test: fix a locking issue in mbox_test_message_write() (git-fixes).
- mailbox: zynqmp: Fix IPI isr handling (git-fixes).
- mailbox: zynqmp: Fix typo in IPI documentation (git-fixes).
- malidp: Fix NULL vs IS_ERR() checking (bsc#1208843 CVE-2023-23004).
- mbcache: Avoid nesting of cache-&gt;c_list_lock under bit locks (bsc#1207647).
- mbcache: Fixup kABI of mb_cache_entry (bsc#1207653).
- mce: fix set_mce_nospec to always unmap the whole page (git-fixes).
- md/bitmap: Fix bitmap chunk size overflow issues (git-fixes).
- md/raid1: stop mdx_raid1 thread when raid1 array run failed (git-fixes).
- md/raid5: Improve performance for sequential IO (bsc#1208081).
- md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d (git-fixes).
- md: Flush workqueue md_rdev_misc_wq in md_alloc() (git-fixes).
- md: Notify sysfs sync_completed in md_reap_sync_thread() (git-fixes).
- md: fix a crash in mempool_free (git-fixes).
- md: protect md_unregister_thread from reentrancy (git-fixes).
- media: av7110: prevent underflow in write_ts_to_decoder() (git-fixes).
- media: coda: Add check for dcoda_iram_alloc (git-fixes).
- media: coda: Add check for kmalloc (git-fixes).
- media: cx23885: Fix a null-ptr-deref bug in buffer_prepare() and buffer_finish() (git-fixes).
- media: dm1105: Fix use after free bug in dm1105_remove due to race condition (git-fixes).
- media: dvb-core: Fix kernel WARNING for blocking operation in wait_event*() (CVE-2023-31084 bsc#1210783).
- media: dvb-core: Fix use-after-free due on race condition at dvb_net (CVE-2022-45886 bsc#1205760).
- media: dvb-core: Fix use-after-free due to race at dvb_register_device() (CVE-2022-45884 bsc#1205756).
- media: dvb-core: Fix use-after-free due to race condition at dvb_ca_en50221 (CVE-2022-45919 bsc#1205803).
- media: dvb-core: Fix use-after-free on race condition at dvb_frontend (CVE-2022-45885 bsc#1205758).
- media: dvb-usb-v2: ce6230: fix null-ptr-deref in ce6230_i2c_master_xfer() (git-fixes).
- media: dvb-usb-v2: ec168: fix null-ptr-deref in ec168_i2c_xfer() (git-fixes).
- media: dvb-usb-v2: rtl28xxu: fix null-ptr-deref in rtl28xxu_i2c_xfer (git-fixes).
- media: dvb-usb: az6027: fix three null-ptr-deref in az6027_i2c_xfer() (git-fixes).
- media: dvb-usb: digitv: fix null-ptr-deref in digitv_i2c_xfer() (git-fixes).
- media: dvb-usb: dw2102: fix uninit-value in su3000_read_mac_address (git-fixes).
- media: dvb_ca_en50221: fix a size write bug (git-fixes).
- media: dvb_demux: fix a bug for the continuity counter (git-fixes).
- media: dvb_frontend: kABI workaround (CVE-2022-45885 bsc#1205758).
- media: dvb_net: kABI workaround (CVE-2022-45886 bsc#1205760).
- media: i2c: imx219: Fix binning for RAW8 capture (git-fixes).
- media: i2c: imx219: Split common registers from mode tables (git-fixes).
- media: i2c: ov7670: 0 instead of -EINVAL was returned (git-fixes).
- media: i2c: ov772x: Fix memleak in ov772x_probe() (git-fixes).
- media: imx: imx7-media-csi: fix missing clk_disable_unprepare() in imx7_csi_init() (git-fixes).
- media: ipu3-cio2: Fix PM runtime usage_count in driver unbind (git-fixes).
- media: m5mols: fix off-by-one loop termination error (git-fixes).
- media: max9286: Fix memleak in max9286_v4l2_register() (git-fixes).
- media: max9286: Free control handler (git-fixes).
- media: mn88443x: fix !CONFIG_OF error by drop of_match_ptr from ID table (git-fixes).
- media: netup_unidvb: fix irq init by register it at the end of probe (git-fixes).
- media: netup_unidvb: fix use-after-free at del_timer() (git-fixes).
- media: ov2740: Fix memleak in ov2740_init_controls() (git-fixes).
- media: ov5640: Fix analogue gain control (git-fixes).
- media: ov5675: Fix memleak in ov5675_init_controls() (git-fixes).
- media: pci: tw68: Fix null-ptr-deref bug in buf prepare and finish (git-fixes).
- media: platform: ti: Add missing check for devm_regulator_get (git-fixes).
- media: radio-shark: Add endpoint checks (git-fixes).
- media: rc: Fix use-after-free bugs caused by ene_tx_irqsim() (git-fixes).
- media: rc: gpio-ir-recv: Fix support for wake-up (git-fixes).
- media: rc: gpio-ir-recv: add remove function (git-fixes).
- media: rcar_fdp1: Fix the correct variable assignments (git-fixes).
- media: rcar_fdp1: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).
- media: rkvdec: fix use after free bug in rkvdec_remove (git-fixes).
- media: saa7134: Use video_unregister_device for radio_dev (git-fixes).
- media: saa7134: fix use after free bug in saa7134_finidev due to race condition (git-fixes).
- media: ti: cal: fix possible memory leak in cal_ctx_create() (git-fixes).
- media: ttusb-dec: fix memory leak in ttusb_dec_exit_dvb() (CVE-2022-45887 bsc#1205762).
- media: usb: siano: Fix use after free bugs caused by do_submit_urb (git-fixes).
- media: uvcvideo: Add support for V4L2_CTRL_TYPE_CTRL_CLASS (git-fixes).
- media: uvcvideo: Check controls flags before accessing them (git-fixes).
- media: uvcvideo: Check for INACTIVE in uvc_ctrl_is_accessible() (git-fixes).
- media: uvcvideo: Do not check for V4L2_CTRL_WHICH_DEF_VAL (git-fixes).
- media: uvcvideo: Fix memory leak of object map on error exit path (git-fixes).
- media: uvcvideo: Fix race condition with usb_kill_urb (git-fixes).
- media: uvcvideo: Handle cameras with invalid descriptors (git-fixes).
- media: uvcvideo: Handle errors from calls to usb_string (git-fixes).
- media: uvcvideo: Quirk for autosuspend in Logitech B910 and C910 (git-fixes).
- media: uvcvideo: Remove s_ctrl and g_ctrl (git-fixes).
- media: uvcvideo: Silence memcpy() run-time false positive warnings (git-fixes).
- media: uvcvideo: Use control names from framework (git-fixes).
- media: uvcvideo: refactor __uvc_ctrl_add_mapping (git-fixes).
- media: v4l2-jpeg: correct the skip count in jpeg_parse_app14_data (git-fixes).
- media: v4l2-jpeg: ignore the unknown APP14 marker (git-fixes).
- media: venus: dec: Fix handling of the start cmd (git-fixes).
- mei: bus-fixup:upon error print return values of send and receive (git-fixes).
- mei: bus: fix unlink on bus in error path (git-fixes).
- mei: me: add meteor lake point M DID (git-fixes).
- mei: pxp: Use correct macros to initialize uuid_le (git-fixes).
- memstick: fix memory leak if card device is never registered (git-fixes).
- memstick: r592: Fix UAF bug in r592_remove due to race condition (bsc#1211449).
- mfd: arizona: Use pm_runtime_resume_and_get() to prevent refcnt leak (git-fixes).
- mfd: cs5535: Do not build on UML (git-fixes).
- mfd: dln2: Fix memory leak in dln2_probe() (git-fixes).
- mfd: pcf50633-adc: Fix potential memleak in pcf50633_adc_async_read() (git-fixes).
- mfd: tqmx86: Correct board names for TQMxE39x (git-fixes).
- mfd: tqmx86: Do not access I2C_DETECT register through io_base (git-fixes).
- misc/mei/hdcp: Use correct macros to initialize uuid_le (git-fixes).
- misc: enclosure: Fix doc for enclosure_find() (git-fixes).
- misc: fastrpc: reject new invocations during device removal (git-fixes).
- misc: fastrpc: return -EPIPE to invocations on device removal (git-fixes).
- mlx5: do not use RT_TOS for IPv6 flowlabel (jsc#SLE-19253).
- mlx5: fix possible ptp queue fifo use-after-free (jsc#PED-1549).
- mlx5: fix skb leak while fifo resync and push (jsc#PED-1549).
- mlxfw: fix null-ptr-deref in mlxfw_mfa2_tlv_next() (git-fixes).
- mlxsw: minimal: Fix deadlock in ports creation (git-fixes).
- mlxsw: spectrum: Allow driver to load with old firmware versions (git-fixes).
- mm/filemap: fix page end in filemap_get_read_batch (bsc#1210768).
- mm/memory.c: fix race when faulting a device private page (CVE-2022-3523, bsc#1204363). nouveau: fix migrate_to_ram() for faulting page (CVE-2022-3523, bsc#1204363). mm/memory: return vm_fault_t result from migrate_to_ram() callback (CVE-2022-3523, bsc#1204363). kabi: workaround for migrate_vma.fault_page (CVE-2022-3523, bsc#1204363).
- mm/vmalloc: do not output a spurious warning when huge vmalloc() fails (bsc#1211410).
- mm: /proc/pid/smaps_rollup: fix no vma's null-deref (bsc#1207769).
- mm: Move mm_cachep initialization to mm_init() (bsc#1212448).
- mm: memcg: fix NULL pointer in mem_cgroup_track_foreign_dirty_slowpath() (bsc#1209262).
- mm: memcg: fix swapcached stat accounting (bsc#1209804).
- mm: mmap: remove newline at the end of the trace (git-fixes).
- mm: page_alloc: skip regions with hugetlbfs pages when allocating 1G pages (bsc#1210034).
- mm: take a page reference when removing device exclusive entries (bsc#1211025).
- mm: vmalloc: avoid warn_alloc noise caused by fatal signal (bsc#1211410).
- mmc: atmel-mci: fix race between stop command and start of next command (git-fixes).
- mmc: bcm2835: fix deferred probing (git-fixes).
- mmc: block: Remove error check of hw_reset on reset (git-fixes).
- mmc: block: ensure error propagation for non-blk (git-fixes).
- mmc: jz4740: Work around bug on JZ4760(B) (git-fixes).
- mmc: meson-gx: remove redundant mmc_request_done() call from irq context (git-fixes).
- mmc: mmc_spi: fix error handling in mmc_spi_probe() (git-fixes).
- mmc: mmci: stm32: fix max busy timeout calculation (git-fixes).
- mmc: mtk-sd: fix deferred probing (git-fixes).
- mmc: mvsdio: fix deferred probing (git-fixes).
- mmc: omap: fix deferred probing (git-fixes).
- mmc: omap_hsmmc: fix deferred probing (git-fixes).
- mmc: owl: fix deferred probing (git-fixes).
- mmc: sdhci-acpi: fix deferred probing (git-fixes).
- mmc: sdhci-esdhc-imx: make 'no-mmc-hs400' works (git-fixes).
- mmc: sdhci-of-esdhc: fix quirk to ignore command inhibit for data (git-fixes).
- mmc: sdhci-spear: fix deferred probing (git-fixes).
- mmc: sdhci_am654: Set HIGH_SPEED_ENA for SDR12 and SDR25 (git-fixes).
- mmc: sdhci_am654: lower power-on failed message severity (git-fixes).
- mmc: sdio: fix possible resource leaks in some error paths (git-fixes).
- mmc: sh_mmcif: fix deferred probing (git-fixes).
- mmc: sunxi: fix deferred probing (git-fixes).
- mmc: usdhi60rol0: fix deferred probing (git-fixes).
- mmc: vub300: fix invalid response handling (git-fixes).
- module: Do not wait for GOING modules (bsc#1196058, bsc#1186449, bsc#1204356, bsc#1204662).
- mt76: Make use of the helper macro kthread_run() (bsc#1209980).
- mt76: Print error message when reading EEPROM from mtd failed (bsc#1209980).
- mt76: add 6GHz support (bsc#1209980).
- mt76: add MT_RXQ_MAIN_WA for mt7916 (bsc#1209980).
- mt76: add support for setting mcast rate (bsc#1209980).
- mt76: allow drivers to drop rx packets early (bsc#1209980).
- mt76: clear sta powersave flag after notifying driver (bsc#1209980).
- mt76: connac: add 6 GHz support for wtbl and starec configuration (bsc#1209980).
- mt76: connac: add 6GHz support to mt76_connac_mcu_set_channel_domain (bsc#1209980).
- mt76: connac: add 6GHz support to mt76_connac_mcu_sta_tlv (bsc#1209980).
- mt76: connac: add 6GHz support to mt76_connac_mcu_uni_add_bss (bsc#1209980).
- mt76: connac: add support for limiting to maximum regulatory Tx power (bsc#1209980).
- mt76: connac: add support for passing the cipher field in bss_info (bsc#1209980).
- mt76: connac: adjust wlan_idx size from u8 to u16 (bsc#1209980).
- mt76: connac: align MCU_EXT definitions with 7915 driver (bsc#1209980).
- mt76: connac: enable 6GHz band for hw scan (bsc#1209980).
- mt76: connac: enable hw amsdu @ 6GHz (bsc#1209980).
- mt76: connac: extend mcu_get_nic_capability (bsc#1209980).
- mt76: connac: fix a theoretical NULL pointer dereference in mt76_connac_get_phy_mode (bsc#1209980).
- mt76: connac: fix last_chan configuration in mt76_connac_mcu_rate_txpower_band (bsc#1209980).
- mt76: connac: fix unresolved symbols when CONFIG_PM is unset (bsc#1209980).
- mt76: connac: introduce MCU_CE_CMD macro (bsc#1209980).
- mt76: connac: introduce MCU_EXT macros (bsc#1209980).
- mt76: connac: introduce MCU_UNI_CMD macro (bsc#1209980).
- mt76: connac: introduce is_connac_v1 utility routine (bsc#1209980).
- mt76: connac: make read-only array ba_range static const (bsc#1209980).
- mt76: connac: move mcu reg access utility routines in mt76_connac_lib module (bsc#1209980).
- mt76: connac: move mt76_connac_chan_bw in common code (bsc#1209980).
- mt76: connac: move mt76_connac_lmac_mapping in mt76-connac module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_add_key in connac module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_bss_basic_tlv in connac module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_bss_ext_tlv in connac module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_bss_omac_tlv in connac module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_gen_dl_mode in mt76-connac module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_get_cipher in common code (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_rdd_cmd in mt76-connac module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_restart in common module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_set_pm in connac module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_wtbl_update_hdr_trans in connac module (bsc#1209980).
- mt76: connac: rely on MCU_CMD macro (bsc#1209980).
- mt76: connac: rely on le16_add_cpu in mt76_connac_mcu_add_nested_tlv (bsc#1209980).
- mt76: connac: remove MCU_FW_PREFIX bit (bsc#1209980).
- mt76: connac: remove PHY_MODE_AX_6G configuration in mt76_connac_get_phy_mode (bsc#1209980).
- mt76: connac: set 6G phymode in mt76_connac_get_phy_mode{,v2} (bsc#1209980).
- mt76: connac: set 6G phymode in single-sku support (bsc#1209980).
- mt76: debugfs: fix queue reporting for mt76-usb (bsc#1209980).
- mt76: debugfs: improve queue node readability (bsc#1209980).
- mt76: disable BH around napi_schedule() calls (bsc#1209980).
- mt76: do not access 802.11 header in ccmp check for 802.3 rx skbs (bsc#1209980).
- mt76: do not always copy ethhdr in reverse_frag0_hdr_trans (bsc#1209980).
- mt76: do not reset MIB counters in get_stats callback (bsc#1209980).
- mt76: eeprom: tolerate corrected bit-flips (bsc#1209980).
- mt76: fill boottime_ns in Rx path (bsc#1209980).
- mt76: fix antenna config missing in 6G cap (bsc#1209980).
- mt76: fix boolreturn.cocci warnings (bsc#1209980).
- mt76: fix dfs state issue with 160 MHz channels (bsc#1209980).
- mt76: fix endianness errors in reverse_frag0_hdr_trans (bsc#1209980).
- mt76: fix invalid rssi report (bsc#1209980).
- mt76: fix key pointer overwrite in mt7921s_write_txwi/mt7663_usb_sdio_write_txwi (bsc#1209980).
- mt76: fix monitor rx FCS error in DFS channel (bsc#1209980).
- mt76: fix possible OOB issue in mt76_calculate_default_rate (bsc#1209980).
- mt76: fix possible pktid leak (bsc#1209980).
- mt76: fix the wiphy's available antennas to the correct value (bsc#1209980).
- mt76: fix timestamp check in tx_status (bsc#1209980).
- mt76: fix tx status related use-after-free race on station removal (bsc#1209980).
- mt76: fix use-after-free by removing a non-RCU wcid pointer (git-fixes).
- mt76: fix wrong HE data rate in sniffer tool (bsc#1209980).
- mt76: improve signal strength reporting (bsc#1209980).
- mt76: introduce packet_id idr (bsc#1209980).
- mt76: make mt76_sar_capa static (bsc#1209980).
- mt76: move mt76_ethtool_worker_info in mt76 module (bsc#1209980).
- mt76: move mt76_sta_stats in mt76.h (bsc#1209980).
- mt76: move sar utilities to mt76-core module (bsc#1209980).
- mt76: move sar_capa configuration in common code (bsc#1209980).
- mt76: move spin_lock_bh to spin_lock in tasklet (bsc#1209980).
- mt76: mt7603: improve reliability of tx powersave filtering (bsc#1209980).
- mt76: mt7603: introduce SAR support (bsc#1209980).
- mt76: mt7615: add support for LG LGSBWAC02 (MT7663BUN) (bsc#1209980).
- mt76: mt7615: apply cached RF data for DBDC (bsc#1209980).
- mt76: mt7615: clear mcu error interrupt status on mt7663 (bsc#1209980).
- mt76: mt7615: fix a possible race enabling/disabling runtime-pm (bsc#1209980).
- mt76: mt7615: fix compiler warning on frame size (bsc#1209980).
- mt76: mt7615: fix decap offload corner case with 4-addr VLAN frames (bsc#1209980).
- mt76: mt7615: fix throughput regression on DFS channels (bsc#1209980).
- mt76: mt7615: fix unused tx antenna mask in testmode (bsc#1209980).
- mt76: mt7615: fix/rewrite the dfs state handling logic (bsc#1209980).
- mt76: mt7615: honor ret from mt7615_mcu_restart in mt7663u_mcu_init (bsc#1209980).
- mt76: mt7615: in debugfs queue stats, skip wmm index 3 on mt7663 (bsc#1209980).
- mt76: mt7615: introduce SAR support (bsc#1209980).
- mt76: mt7615: move mt7615_mcu_set_p2p_oppps in mt76_connac module (bsc#1209980).
- mt76: mt7615: remove dead code in get_omac_idx (bsc#1209980).
- mt76: mt7615: update bss_info with cipher after setting the group key (bsc#1209980).
- mt76: mt7615e: process txfree and txstatus without allocating skbs (bsc#1209980).
- mt76: mt7663: disable 4addr capability (bsc#1209980).
- mt76: mt7663s: flush runtime-pm queue after waking up the device (bsc#1209980).
- mt76: mt7663s: rely on mcu reg access utility (bsc#1209980).
- mt76: mt7663u: introduce mt7663u_mcu_power_on routine (bsc#1209980).
- mt76: mt76_connac: fix MCU_CE_CMD_SET_ROC definition error (bsc#1209980).
- mt76: mt76x02: improve tx hang detection (bsc#1209980).
- mt76: mt76x02: introduce SAR support (bsc#1209980).
- mt76: mt76x02: use mt76_phy_dfs_state to determine radar detector state (bsc#1209980).
- mt76: mt76x0: correct VHT MCS 8/9 tx power eeprom offset (bsc#1209980).
- mt76: mt7915: Fix PCI device refcount leak in mt7915_pci_init_hif2() (bsc#1209980).
- mt76: mt7915: Fix channel state update error issue (bsc#1209980).
- mt76: mt7915: add 6 GHz support (bsc#1209980).
- mt76: mt7915: add HE-LTF into fixed rate command (bsc#1209980).
- mt76: mt7915: add LED support (bsc#1209980).
- mt76: mt7915: add WA firmware log support (bsc#1209980).
- mt76: mt7915: add control knobs for thermal throttling (bsc#1209980).
- mt76: mt7915: add debugfs knobs for MCU utilization (bsc#1209980).
- mt76: mt7915: add default calibrated data support (bsc#1209980).
- mt76: mt7915: add device id for mt7916 (bsc#1209980).
- mt76: mt7915: add ethtool stats support (bsc#1209980).
- mt76: mt7915: add firmware support for mt7916 (bsc#1209980).
- mt76: mt7915: add mib counters to ethtool stats (bsc#1209980).
- mt76: mt7915: add missing DATA4_TB_SPTL_REUSE1 to mt7915_mac_decode_he_radiotap (bsc#1209980).
- mt76: mt7915: add more MIB registers (bsc#1209980).
- mt76: mt7915: add mt7915_mmio_probe() as a common probing function (bsc#1209980).
- mt76: mt7915: add mt7916 calibrated data support (bsc#1209980).
- mt76: mt7915: add mu-mimo and ofdma debugfs knobs (bsc#1209980).
- mt76: mt7915: add some per-station tx stats to ethtool (bsc#1209980).
- mt76: mt7915: add support for MT7986 (bsc#1209980).
- mt76: mt7915: add support for passing chip/firmware debug data to user space (bsc#1209980).
- mt76: mt7915: add twt_stats knob in debugfs (bsc#1209980).
- mt76: mt7915: add tx mu/su counters to mib (bsc#1209980).
- mt76: mt7915: add tx stats gathered from tx-status callbacks (bsc#1209980).
- mt76: mt7915: add txfree event v3 (bsc#1209980).
- mt76: mt7915: add txpower init for 6GHz (bsc#1209980).
- mt76: mt7915: allow beaconing on all chains (bsc#1209980).
- mt76: mt7915: change max rx len limit of hw modules (bsc#1209980).
- mt76: mt7915: check band idx for bcc event (bsc#1209980).
- mt76: mt7915: check for devm_pinctrl_get() failure (bsc#1209980).
- mt76: mt7915: do not pass data pointer to mt7915_mcu_muru_debug_set (bsc#1209980).
- mt76: mt7915: enable HE UL MU-MIMO (bsc#1209980).
- mt76: mt7915: enable configured beacon tx rate (bsc#1209980).
- mt76: mt7915: enable radar background detection (bsc#1209980).
- mt76: mt7915: enable radar trigger on rdd2 (bsc#1209980).
- mt76: mt7915: enable twt responder capability (bsc#1209980).
- mt76: mt7915: enlarge wcid size to 544 (bsc#1209980).
- mt76: mt7915: fix DBDC default band selection on MT7915D (bsc#1209980).
- mt76: mt7915: fix DFS no radar detection event (bsc#1209980).
- mt76: mt7915: fix SMPS operation fail (bsc#1209980).
- mt76: mt7915: fix WMM index on DBDC cards (bsc#1209980).
- mt76: mt7915: fix beamforming mib stats (bsc#1209980).
- mt76: mt7915: fix decap offload corner case with 4-addr VLAN frames (bsc#1209980).
- mt76: mt7915: fix eeprom fields of txpower init values (bsc#1209980).
- mt76: mt7915: fix endiannes warning mt7915_mcu_beacon_check_caps (bsc#1209980).
- mt76: mt7915: fix endianness warnings in mt7915_debugfs_rx_fw_monitor (bsc#1209980).
- mt76: mt7915: fix endianness warnings in mt7915_mac_tx_free() (bsc#1209980).
- mt76: mt7915: fix he_mcs capabilities for 160mhz (bsc#1209980).
- mt76: mt7915: fix incorrect testmode ipg on band 1 caused by wmm_idx (git-fixes).
- mt76: mt7915: fix incorrect testmode ipg on band 1 caused by wmm_idx (git-fixes).
- mt76: mt7915: fix mcs_map in mt7915_mcu_set_sta_he_mcs() (bsc#1209980).
- mt76: mt7915: fix missing HE phy cap (bsc#1209980).
- mt76: mt7915: fix phy cap in mt7915_set_stream_he_txbf_caps() (bsc#1209980).
- mt76: mt7915: fix polling firmware-own status (git-fixes).
- mt76: mt7915: fix possible NULL pointer dereference in mt7915_mac_fill_rx_vector (git-fixes).
- mt76: mt7915: fix possible memory leak in mt7915_mcu_add_sta (bsc#1209980).
- mt76: mt7915: fix possible uninitialized pointer dereference in mt7986_wmac_gpio_setup (bsc#1209980).
- mt76: mt7915: fix potential NPE in TXS processing (bsc#1209980).
- mt76: mt7915: fix potential memory leak of fw monitor packets (bsc#1209980).
- mt76: mt7915: fix return condition in mt7915_tm_reg_backup_restore() (bsc#1209980).
- mt76: mt7915: fix the muru tlv issue (bsc#1209980).
- mt76: mt7915: fix the nss setting in bitrates (bsc#1209980).
- mt76: mt7915: fix twt table_mask to u16 in mt7915_dev (bsc#1209980).
- mt76: mt7915: fix txbf starec TLV issues (bsc#1209980).
- mt76: mt7915: fix typos in comments (bsc#1209980).
- mt76: mt7915: fix/rewrite the dfs state handling logic (bsc#1209980).
- mt76: mt7915: get rid of mt7915_mcu_set_fixed_rate routine (bsc#1209980).
- mt76: mt7915: honor all possible error conditions in mt7915_mcu_init() (bsc#1209980).
- mt76: mt7915: improve code readability for xmit-queue handler (bsc#1209980).
- mt76: mt7915: improve code readability in mt7915_mcu_sta_bfer_ht (bsc#1209980).
- mt76: mt7915: improve starec readability of txbf (bsc#1209980).
- mt76: mt7915: improve wmm index allocation (bsc#1209980).
- mt76: mt7915: initialize smps mode in mt7915_mcu_sta_rate_ctrl_tlv() (bsc#1209980).
- mt76: mt7915: introduce SAR support (bsc#1209980).
- mt76: mt7915: introduce __mt7915_get_tsf routine (bsc#1209980).
- mt76: mt7915: introduce band_idx in mt7915_phy (bsc#1209980).
- mt76: mt7915: introduce bss coloring support (bsc#1209980).
- mt76: mt7915: introduce mt76 debugfs sub-dir for ext-phy (bsc#1209980).
- mt76: mt7915: introduce mt76_vif in mt7915_vif (bsc#1209980).
- mt76: mt7915: introduce mt7915_mac_add_twt_setup routine (bsc#1209980).
- mt76: mt7915: introduce mt7915_mcu_beacon_check_caps() (bsc#1209980).
- mt76: mt7915: introduce mt7915_mcu_twt_agrt_update mcu command (bsc#1209980).
- mt76: mt7915: introduce mt7915_set_radar_background routine (bsc#1209980).
- mt76: mt7915: introduce rdd_monitor debugfs node (bsc#1209980).
- mt76: mt7915: move pci specific code back to pci.c (bsc#1209980).
- mt76: mt7915: move tx amsdu stats in mib_stats (bsc#1209980).
- mt76: mt7915: process txfree and txstatus without allocating skbs (bsc#1209980).
- mt76: mt7915: refine register definition (bsc#1209980).
- mt76: mt7915: rely on mt76_connac definitions (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_get_phy utilities (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_add_tlv routine (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_alloc_sta_req (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_alloc_wtbl_req (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_init_download (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_patch_sem_ctrl/mt76_connac_mcu_start_patch (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_set_rts_thresh (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_sta_ba (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_sta_ba_tlv (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_sta_basic_tlv (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_sta_uapsd (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_start_firmware (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_wtbl_ba_tlv (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_wtbl_generic_tlv (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_wtbl_hdr_trans_tlv (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_wtbl_ht_tlv (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_wtbl_smps_tlv (bsc#1209980).
- mt76: mt7915: remove dead code in debugfs code (bsc#1209980).
- mt76: mt7915: remove duplicated defs in mcu.h (bsc#1209980).
- mt76: mt7915: remove mt7915_mcu_add_he() (bsc#1209980).
- mt76: mt7915: rename debugfs tx-queues (bsc#1209980).
- mt76: mt7915: report radar pattern if detected by rdd2 (bsc#1209980).
- mt76: mt7915: report rx mode value in mt7915_mac_fill_rx_rate (bsc#1209980).
- mt76: mt7915: rework .set_bitrate_mask() to support more options (bsc#1209980).
- mt76: mt7915: rework debugfs fixed-rate knob (bsc#1209980).
- mt76: mt7915: rework debugfs queue info (bsc#1209980).
- mt76: mt7915: rework dma.c to adapt mt7916 changes (bsc#1209980).
- mt76: mt7915: rework eeprom.c to adapt mt7916 changes (bsc#1209980).
- mt76: mt7915: rework mt7915_mcu_sta_muru_tlv() (bsc#1209980).
- mt76: mt7915: rework starec TLV tags (bsc#1209980).
- mt76: mt7915: run mt7915_get_et_stats holding mt76 mutex (bsc#1209980).
- mt76: mt7915: send EAPOL frames at lowest rate (bsc#1209980).
- mt76: mt7915: set VTA bit in tx descriptor (bsc#1209980).
- mt76: mt7915: set band1 TGID field in tx descriptor (bsc#1209980).
- mt76: mt7915: set bssinfo/starec command when adding interface (bsc#1209980).
- mt76: mt7915: set muru platform type (bsc#1209980).
- mt76: mt7915: simplify conditional (bsc#1209980).
- mt76: mt7915: switch proper tx arbiter mode in testmode (bsc#1209980).
- mt76: mt7915: update bss_info with cipher after setting the group key (bsc#1209980).
- mt76: mt7915: update mac timing settings (bsc#1209980).
- mt76: mt7915: update max_mpdu_size in mt7915_mcu_sta_amsdu_tlv() (bsc#1209980).
- mt76: mt7915: update mt7915_chan_mib_offs for mt7916 (bsc#1209980).
- mt76: mt7915: update rx rate reporting for mt7916 (bsc#1209980).
- mt76: mt7915: use min_t() to make code cleaner (bsc#1209980).
- mt76: mt7915e: Add a hwmon attribute to get the actual throttle state (bsc#1209980).
- mt76: mt7915e: Enable thermal management by default (bsc#1209980).
- mt76: mt7915e: Fix degraded performance after temporary overheat (bsc#1209980).
- mt76: mt7921: Fix the error handling path of mt7921_pci_probe() (git-fixes).
- mt76: mt7921: add 6GHz support (bsc#1209980).
- mt76: mt7921: add MT7921_COMMON module (bsc#1209980).
- mt76: mt7921: add MU EDCA cmd support (bsc#1209980).
- mt76: mt7921: add delay config for sched scan (bsc#1209980).
- mt76: mt7921: add mt7921u driver (bsc#1209980).
- mt76: mt7921: add per-vif counters in ethtool (bsc#1209980).
- mt76: mt7921: add some more MIB counters (bsc#1209980).
- mt76: mt7921: add sta stats accounting in mt7921_mac_add_txs_skb (bsc#1209980).
- mt76: mt7921: add support for PCIe ID 0x0608/0x0616 (bsc#1209980).
- mt76: mt7921: add support for tx status reporting (bsc#1209980).
- mt76: mt7921: clear pm-&gt;suspended in mt7921_mac_reset_work (bsc#1209980).
- mt76: mt7921: disable 4addr capability (bsc#1209980).
- mt76: mt7921: disable runtime pm for usb (bsc#1209980).
- mt76: mt7921: do not always disable fw runtime-pm (bsc#1209980).
- mt76: mt7921: do not enable beacon filter when IEEE80211_CONF_CHANGE_MONITOR is set (bsc#1209980).
- mt76: mt7921: do not update pm states in case of error (git-fixes).
- mt76: mt7921: fix MT7921E reset failure (bsc#1209980).
- mt76: mt7921: fix Wformat build warning (bsc#1209980).
- mt76: mt7921: fix a possible race enabling/disabling runtime-pm (bsc#1209980).
- mt76: mt7921: fix boolreturn.cocci warning (bsc#1209980).
- mt76: mt7921: fix build regression (bsc#1209980).
- mt76: mt7921: fix endianness issues in mt7921_mcu_set_tx() (bsc#1209980).
- mt76: mt7921: fix endianness warnings in mt7921_mac_decode_he_mu_radiotap (bsc#1209980).
- mt76: mt7921: fix ht mcs in mt7921_mac_add_txs_skb() (bsc#1209980).
- mt76: mt7921: fix injected MPDU transmission to not use HW A-MSDU (bsc#1209980).
- mt76: mt7921: fix kernel crash at mt7921_pci_remove (git-fixes).
- mt76: mt7921: fix kernel panic by accessing unallocated eeprom.data (git-fixes).
- mt76: mt7921: fix mt7921s Kconfig (bsc#1209980).
- mt76: mt7921: fix network buffer leak by txs missing (bsc#1209980).
- mt76: mt7921: fix possible NULL pointer dereference in mt7921_mac_write_txwi (bsc#1209980).
- mt76: mt7921: fix up the monitor mode (bsc#1209980).
- mt76: mt7921: fix xmit-queue dump for usb and sdio (bsc#1209980).
- mt76: mt7921: forbid the doze mode when coredump is in progress (bsc#1209980).
- mt76: mt7921: get rid of monitor_vif (bsc#1209980).
- mt76: mt7921: get rid of mt7921_mcu_get_eeprom (bsc#1209980).
- mt76: mt7921: get rid of mt7921_wait_for_mcu_init declaration (bsc#1209980).
- mt76: mt7921: honor mt76_connac_mcu_set_rate_txpower return value in mt7921_config (bsc#1209980).
- mt76: mt7921: honor pm user configuration in mt7921_sniffer_interface_iter (bsc#1209980).
- mt76: mt7921: introduce 160 MHz channel bandwidth support (bsc#1209980).
- mt76: mt7921: introduce mt7921s support (bsc#1209980).
- mt76: mt7921: introduce stats reporting through ethtool (bsc#1209980).
- mt76: mt7921: make all event parser reusable between mt7921s and mt7921e (bsc#1209980).
- mt76: mt7921: make mt7921_init_tx_queues static (bsc#1209980).
- mt76: mt7921: move mt76_connac_mcu_set_hif_suspend to bus-related files (bsc#1209980).
- mt76: mt7921: move mt7921_init_hw in a dedicated work (bsc#1209980).
- mt76: mt7921: move mt7921_queue_rx_skb to mac.c (bsc#1209980).
- mt76: mt7921: move mt7921_usb_sdio_tx_complete_skb in common mac code (bsc#1209980).
- mt76: mt7921: move mt7921_usb_sdio_tx_prepare_skb in common mac code (bsc#1209980).
- mt76: mt7921: move mt7921_usb_sdio_tx_status_data in mac common code (bsc#1209980).
- mt76: mt7921: move tx amsdu stats in mib_stats (bsc#1209980).
- mt76: mt7921: reduce log severity levels for informative messages (bsc#1209980).
- mt76: mt7921: refactor dma.c to be pcie specific (bsc#1209980).
- mt76: mt7921: refactor init.c to be bus independent (bsc#1209980).
- mt76: mt7921: refactor mac.c to be bus independent (bsc#1209980).
- mt76: mt7921: refactor mcu.c to be bus independent (bsc#1209980).
- mt76: mt7921: refactor mt7921_mcu_send_message (bsc#1209980).
- mt76: mt7921: rely on mcu_get_nic_capability (bsc#1209980).
- mt76: mt7921: remove dead definitions (bsc#1209980).
- mt76: mt7921: remove duplicated code in mt7921_mac_decode_he_radiotap (bsc#1209980).
- mt76: mt7921: remove mcu rate reporting code (bsc#1209980).
- mt76: mt7921: remove mt7921_sta_stats (bsc#1209980).
- mt76: mt7921: report tx rate directly from tx status (bsc#1209980).
- mt76: mt7921: robustify hardware initialization flow (bsc#1209980).
- mt76: mt7921: send EAPOL frames at lowest rate (bsc#1209980).
- mt76: mt7921: set EDCA parameters with the MCU CE command (bsc#1209980).
- mt76: mt7921: start reworking tx rate reporting (bsc#1209980).
- mt76: mt7921: toggle runtime-pm adding a monitor vif (bsc#1209980).
- mt76: mt7921: update mib counters dumping phy stats (bsc#1209980).
- mt76: mt7921: update mt7921_skb_add_usb_sdio_hdr to support usb (bsc#1209980).
- mt76: mt7921: use correct iftype data on 6GHz cap init (bsc#1209980).
- mt76: mt7921: use mt76_hw instead of open coding it (bsc#1209980).
- mt76: mt7921: use physical addr to unify register access (bsc#1209980).
- mt76: mt7921e: fix possible probe failure after reboot (bsc#1198835).
- mt76: mt7921e: make dev-&gt;fw_assert usage consistent (bsc#1209980).
- mt76: mt7921e: process txfree and txstatus without allocating skbs (bsc#1209980).
- mt76: mt7921s: add reset support (bsc#1209980).
- mt76: mt7921s: clear MT76_STATE_MCU_RUNNING immediately after reset (bsc#1209980).
- mt76: mt7921s: fix a possible memory leak in mt7921_load_patch (bsc#1209980).
- mt76: mt7921s: fix bus hang with wrong privilege (bsc#1209980).
- mt76: mt7921s: fix cmd timeout in throughput test (bsc#1209980).
- mt76: mt7921s: fix firmware download random fail (bsc#1209980).
- mt76: mt7921s: fix missing fc type/sub-type for 802.11 pkts (bsc#1209980).
- mt76: mt7921s: fix mt7921s_mcu_[fw|drv]_pmctrl (bsc#1209980).
- mt76: mt7921s: fix possible kernel crash due to invalid Rx count (bsc#1209980).
- mt76: mt7921s: fix possible sdio deadlock in command fail (bsc#1209980).
- mt76: mt7921s: fix suspend error with enlarging mcu timeout value (bsc#1209980).
- mt76: mt7921s: fix the device cannot sleep deeply in suspend (bsc#1209980).
- mt76: mt7921s: make pm-&gt;suspended usage consistent (bsc#1209980).
- mt76: mt7921s: run sleep mode by default (bsc#1209980).
- mt76: mt7921s: update mt7921s_wfsys_reset sequence (bsc#1209980).
- mt76: only access ieee80211_hdr after mt76_insert_ccmp_hdr (bsc#1209980).
- mt76: only set rx radiotap flag from within decoder functions (bsc#1209980).
- mt76: redefine mt76_for_each_q_rx to adapt mt7986 changes (bsc#1209980).
- mt76: rely on phy pointer in mt76_register_debugfs_fops routine signature (bsc#1209980).
- mt76: remove mt76_wcid pointer from mt76_tx_status_check signature (bsc#1209980).
- mt76: remove variable set but not used (bsc#1209980).
- mt76: reverse the first fragmented frame to 802.11 (bsc#1209980).
- mt76: schedule status timeout at dma completion (bsc#1209980).
- mt76: sdio: disable interrupt in mt76s_sdio_irq (bsc#1209980).
- mt76: sdio: export mt76s_alloc_rx_queue and mt76s_alloc_tx routines (bsc#1209980).
- mt76: sdio: extend sdio module to support CONNAC2 (bsc#1209980).
- mt76: sdio: honor the largest Tx buffer the hardware can support (bsc#1209980).
- mt76: sdio: introduce parse_irq callback (bsc#1209980).
- mt76: sdio: lock sdio when it is needed (bsc#1209980).
- mt76: sdio: move common code in mt76_sdio module (bsc#1209980).
- mt76: set wlan_idx_hi on mt7916 (bsc#1209980).
- mt76: split single ldpc cap bit into bits (bsc#1209980).
- mt76: substitute sk_buff_head status_list with spinlock_t status_lock (bsc#1209980).
- mt76: support reading EEPROM data embedded in fdt (bsc#1209980).
- mt76: switch from 'pci_' to 'dma_' API (bsc#1209980).
- mt76: testmode: add support to set MAC (bsc#1209980).
- mt76: usb: add req_type to ___mt76u_rr signature (bsc#1209980).
- mt76: usb: add req_type to ___mt76u_wr signature (bsc#1209980).
- mt76: usb: introduce __mt76u_init utility routine (bsc#1209980).
- mt76: use IEEE80211_OFFLOAD_ENCAP_ENABLED instead of MT_DRV_AMSDU_OFFLOAD (bsc#1209980).
- mt76: use a separate CCMP PN receive counter for management frames (bsc#1209980).
- mt76: use le32/16_get_bits() whenever possible (bsc#1209980).
- mt76x02: improve mac error check/reset reliability (bsc#1209980).
- mtd: core: fix error path for nvmem provider (git-fixes).
- mtd: core: fix nvmem error reporting (git-fixes).
- mtd: core: provide unique name for nvmem device, take two (git-fixes).
- mtd: dataflash: remove duplicate SPI ID table (git-fixes).
- mtd: rawnand: fsl_elbc: Propagate HW ECC settings to HW (git-fixes).
- mtd: rawnand: ingenic: fix empty stub helper definitions (git-fixes).
- mtd: rawnand: marvell: do not set the NAND frequency select (git-fixes).
- mtd: rawnand: marvell: ensure timing values are written (git-fixes).
- mtd: rawnand: meson: fix bitmask for length in command word (git-fixes).
- mtd: rawnand: meson: invalidate cache on polling ECC bit (git-fixes).
- mtd: rawnand: stm32_fmc2: remove unsupported EDO mode (git-fixes).
- mtd: rawnand: stm32_fmc2: use timings.mode instead of checking tRC_min (git-fixes).
- mtd: rawnand: sunxi: Clean up chips after failed init (git-fixes).
- mtd: rawnand: sunxi: Fix the size of the last OOB region (git-fixes).
- mtd: spi-nor: Fix a trivial typo (git-fixes).
- mtd: spi-nor: Fix shift-out-of-bounds in spi_nor_set_erase_type (git-fixes).
- mtd: spi-nor: core: fix implicit declaration warning (git-fixes).
- mtd: spi-nor: sfdp: Fix index value for SCCR dwords (git-fixes).
- mtd: spi-nor: spansion: Consider reserved bits in CFR5 register (git-fixes).
- mtdblock: tolerate corrected bit-flips (git-fixes).
- nbd: Fix hung on disconnect request if socket is closed before (git-fixes).
- nbd: Fix hung when signal interrupts nbd_start_device_ioctl() (git-fixes).
- nbd: Fix hungtask when nbd_config_put (git-fixes).
- nbd: add missing definition of pr_fmt (git-fixes).
- nbd: call genl_unregister_family() first in nbd_cleanup() (git-fixes).
- nbd: fix io hung while disconnecting device (git-fixes).
- nbd: fix race between nbd_alloc_config() and module removal (git-fixes).
- net/iucv: Fix size of interrupt data (bsc#1211465 git-fixes).
- net/mlx5: Add forgotten cleanup calls into mlx5_init_once() error path (jsc#PED-1549).
- net/mlx5: Add forgotten cleanup calls into mlx5_init_once() error path (jsc#SLE-19253).
- net/mlx5: Allow async trigger completion execution on single CPU systems (jsc#SLE-19253).
- net/mlx5: Allow future addition of IPsec object modifiers (jsc#SLE-19253).
- net/mlx5: Avoid false positive lockdep warning by adding lock_class_key (jsc#SLE-19253).
- net/mlx5: Avoid recovery in probe flows (jsc#PED-1549 bsc#1211794).
- net/mlx5: Avoid recovery in probe flows (jsc#SLE-19253).
- net/mlx5: Bridge, fix ageing of peer FDB entries (jsc#PED-1549).
- net/mlx5: Bridge, fix ageing of peer FDB entries (jsc#SLE-19253).
- net/mlx5: Bridge, verify LAG state when adding bond to bridge (jsc#SLE-19253).
- net/mlx5: Collect command failures data only for known commands (jsc#PED-1549).
- net/mlx5: DR, Check force-loopback RC QP capability independently from RoCE (jsc#PED-1549).
- net/mlx5: DR, Check force-loopback RC QP capability independently from RoCE (jsc#SLE-19253).
- net/mlx5: DR, Fix crc32 calculation to work on big-endian (BE) CPUs (jsc#PED-1549).
- net/mlx5: DR, Fix crc32 calculation to work on big-endian (BE) CPUs (jsc#SLE-19253).
- net/mlx5: DR, Fix missing flow_source when creating multi-destination FW table (jsc#SLE-19253).
- net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device (jsc#PED-1549).
- net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device (jsc#SLE-19253).
- net/mlx5: Devcom, serialize devcom registration (jsc#PED-1549).
- net/mlx5: Disable eswitch before waiting for VF pages (jsc#PED-1549).
- net/mlx5: Do not advertise IPsec netdev support for non-IPsec device (jsc#SLE-19253).
- net/mlx5: Do not use already freed action pointer (jsc#SLE-19253).
- net/mlx5: Dynamically resize flow counters query buffer (bsc#1195175).
- net/mlx5: E-Switch, Fix an Oops in error handling code (jsc#PED-1549).
- net/mlx5: E-Switch, Fix an Oops in error handling code (jsc#SLE-19253).
- net/mlx5: E-Switch, properly handle ingress tagged packets on VST (jsc#PED-1549).
- net/mlx5: E-Switch, properly handle ingress tagged packets on VST (jsc#SLE-19253).
- net/mlx5: E-switch, Create per vport table based on devlink encap mode (jsc#PED-1549).
- net/mlx5: E-switch, Create per vport table based on devlink encap mode (jsc#SLE-19253).
- net/mlx5: E-switch, Do not destroy indirect table in split rule (jsc#PED-1549).
- net/mlx5: E-switch, Do not destroy indirect table in split rule (jsc#SLE-19253).
- net/mlx5: E-switch, Fix missing set of split_count when forward to ovs internal port (jsc#PED-1549).
- net/mlx5: E-switch, Fix missing set of split_count when forward to ovs internal port (jsc#SLE-19253).
- net/mlx5: E-switch, Fix setting of reserved fields on MODIFY_SCHEDULING_ELEMENT (jsc#PED-1549).
- net/mlx5: E-switch, Fix setting of reserved fields on MODIFY_SCHEDULING_ELEMENT (jsc#SLE-19253).
- net/mlx5: E-switch, Fix switchdev mode after devlink reload (jsc#PED-1549).
- net/mlx5: E-switch, Fix wrong usage of source port rewrite in split rules (jsc#PED-1549).
- net/mlx5: ECPF, wait for VF pages only after disabling host PFs (jsc#PED-1549).
- net/mlx5: Enhance debug print in page allocation failure (jsc#PED-1549).
- net/mlx5: Enhance debug print in page allocation failure (jsc#SLE-19253).
- net/mlx5: Expose SF firmware pages counter (jsc#PED-1549).
- net/mlx5: Fix FW tracer timestamp calculation (jsc#SLE-19253).
- net/mlx5: Fix RoCE setting at HCA level (jsc#PED-1549).
- net/mlx5: Fix RoCE setting at HCA level (jsc#SLE-19253).
- net/mlx5: Fix command stats access after free (jsc#PED-1549).
- net/mlx5: Fix crash during sync firmware reset (jsc#SLE-19253).
- net/mlx5: Fix error message when failing to allocate device memory (jsc#PED-1549).
- net/mlx5: Fix error message when failing to allocate device memory (jsc#SLE-19253).
- net/mlx5: Fix handling of entry refcount when command is not issued to FW (jsc#SLE-19253).
- net/mlx5: Fix io_eq_size and event_eq_size params validation (jsc#PED-1549).
- net/mlx5: Fix possible use-after-free in async command interface (jsc#SLE-19253).
- net/mlx5: Fix ptp max frequency adjustment range (jsc#PED-1549).
- net/mlx5: Fix ptp max frequency adjustment range (jsc#SLE-19253).
- net/mlx5: Fix setting ec_function bit in MANAGE_PAGES (jsc#PED-1549).
- net/mlx5: Fix steering rules cleanup (jsc#PED-1549).
- net/mlx5: Fix steering rules cleanup (jsc#SLE-19253).
- net/mlx5: Fix uninitialized variable bug in outlen_write() (jsc#SLE-19253).
- net/mlx5: Geneve, Fix handling of Geneve object id as error code (jsc#PED-1549).
- net/mlx5: Geneve, Fix handling of Geneve object id as error code (jsc#SLE-19253).
- net/mlx5: Handle pairing of E-switch via uplink un/load APIs (jsc#PED-1549).
- net/mlx5: Initialize flow steering during driver probe (jsc#SLE-19253).
- net/mlx5: Lag, fix failure to cancel delayed bond work (jsc#PED-1549).
- net/mlx5: Read embedded cpu after init bit cleared (jsc#PED-1549).
- net/mlx5: Read embedded cpu after init bit cleared (jsc#SLE-19253).
- net/mlx5: Read the TC mapping of all priorities on ETS query (jsc#PED-1549).
- net/mlx5: Read the TC mapping of all priorities on ETS query (jsc#SLE-19253).
- net/mlx5: Rearm the FW tracer after each tracer event (jsc#SLE-19253).
- net/mlx5: SF, Drain health before removing device (jsc#PED-1549).
- net/mlx5: SF, Drain health before removing device (jsc#SLE-19253).
- net/mlx5: SF: Fix probing active SFs during driver probe phase (jsc#SLE-19253).
- net/mlx5: Serialize module cleanup with reload and remove (jsc#PED-1549).
- net/mlx5: Serialize module cleanup with reload and remove (jsc#SLE-19253).
- net/mlx5: Set BREAK_FW_WAIT flag first when removing driver (jsc#PED-1549).
- net/mlx5: Store page counters in a single array (jsc#PED-1549).
- net/mlx5: Wait for firmware to enable CRS before pci_restore_state (jsc#SLE-19253).
- net/mlx5: check attr pointer validity before dereferencing it (jsc#PED-1549).
- net/mlx5: check attr pointer validity before dereferencing it (jsc#SLE-19253).
- net/mlx5: correct ECE offset in query qp output (jsc#SLE-19253).
- net/mlx5: fix missing mutex_unlock in mlx5_fw_fatal_reporter_err_work() (jsc#SLE-19253).
- net/mlx5: fs, fail conflicting actions (jsc#SLE-19253).
- net/mlx5: fw_tracer, Clear load bit when freeing string DBs buffers (jsc#PED-1549).
- net/mlx5: fw_tracer, Clear load bit when freeing string DBs buffers (jsc#SLE-19253).
- net/mlx5: fw_tracer, Fix event handling (jsc#PED-1549).
- net/mlx5: fw_tracer, Fix event handling (jsc#SLE-19253).
- net/mlx5: fw_tracer, Zero consumer index when reloading the tracer (jsc#PED-1549).
- net/mlx5: fw_tracer, Zero consumer index when reloading the tracer (jsc#SLE-19253).
- net/mlx5e: Always clear dest encap in neigh-update-del (jsc#PED-1549).
- net/mlx5e: Always clear dest encap in neigh-update-del (jsc#SLE-19253).
- net/mlx5e: Avoid false lock dependency warning on tc_ht even more (jsc#PED-1549).
- net/mlx5e: Avoid false lock dependency warning on tc_ht even more (jsc#SLE-19253).
- net/mlx5e: Block entering switchdev mode with ns inconsistency (jsc#PED-1549).
- net/mlx5e: Block entering switchdev mode with ns inconsistency (jsc#SLE-19253).
- net/mlx5e: CT: Fix ct debugfs folder name (jsc#PED-1549).
- net/mlx5e: Do not attach netdev profile while handling internal error (jsc#PED-1549).
- net/mlx5e: Do not attach netdev profile while handling internal error (jsc#SLE-19253).
- net/mlx5e: Do not cache tunnel offloads capability (jsc#PED-1549).
- net/mlx5e: Do not clone flow post action attributes second time (jsc#PED-1549).
- net/mlx5e: Do not increment ESN when updating IPsec ESN state (jsc#SLE-19253).
- net/mlx5e: Do not support encap rules with gbp option (jsc#PED-1549).
- net/mlx5e: Do not support encap rules with gbp option (jsc#SLE-19253).
- net/mlx5e: E-Switch, Fix comparing termination table instance (jsc#SLE-19253).
- net/mlx5e: Extend SKB room check to include PTP-SQ (jsc#SLE-19253).
- net/mlx5e: Fix MPLSoUDP encap to use MPLS action information (jsc#SLE-19253).
- net/mlx5e: Fix RX reporter for XSK RQs (jsc#PED-1549).
- net/mlx5e: Fix SQ wake logic in ptp napi_poll context (jsc#PED-1549).
- net/mlx5e: Fix SQ wake logic in ptp napi_poll context (jsc#SLE-19253).
- net/mlx5e: Fix capability check for updating vnic env counters (jsc#SLE-19253).
- net/mlx5e: Fix cleanup null-ptr deref on encap lock (jsc#PED-1549).
- net/mlx5e: Fix crash unsetting rx-vlan-filter in switchdev mode (jsc#PED-1549).
- net/mlx5e: Fix deadlock in tc route query code (jsc#PED-1549).
- net/mlx5e: Fix error handling in mlx5e_refresh_tirs (jsc#PED-1549).
- net/mlx5e: Fix error handling in mlx5e_refresh_tirs (jsc#SLE-19253).
- net/mlx5e: Fix hw mtu initializing at XDP SQ allocation (jsc#PED-1549).
- net/mlx5e: Fix hw mtu initializing at XDP SQ allocation (jsc#SLE-19253).
- net/mlx5e: Fix macsec ASO context alignment (jsc#PED-1549).
- net/mlx5e: Fix macsec possible null dereference when updating MAC security entity (SecY) (jsc#PED-1549).
- net/mlx5e: Fix macsec ssci attribute handling in offload path (jsc#PED-1549).
- net/mlx5e: Fix the value of MLX5E_MAX_RQ_NUM_MTTS (jsc#SLE-19253).
- net/mlx5e: Fix use-after-free when reverting termination table (jsc#SLE-19253).
- net/mlx5e: Fix wrong application of the LRO state (jsc#SLE-19253).
- net/mlx5e: Fix wrong tc flag used when set hw-tc-offload off (jsc#SLE-19253).
- net/mlx5e: IPoIB, Block PKEY interfaces with less rx queues than parent (jsc#PED-1549).
- net/mlx5e: IPoIB, Block queue count configuration when sub interfaces are present (jsc#PED-1549).
- net/mlx5e: IPoIB, Do not allow CQE compression to be turned on by default (jsc#PED-1549).
- net/mlx5e: IPoIB, Do not allow CQE compression to be turned on by default (jsc#SLE-19253).
- net/mlx5e: IPoIB, Fix child PKEY interface stats on rx path (jsc#PED-1549).
- net/mlx5e: IPoIB, Show unknown speed instead of error (jsc#PED-1549).
- net/mlx5e: IPoIB, Show unknown speed instead of error (jsc#SLE-19253).
- net/mlx5e: Initialize link speed to zero (jsc#PED-1549).
- net/mlx5e: Modify slow path rules to go to slow fdb (jsc#SLE-19253).
- net/mlx5e: Nullify table pointer when failing to create (jsc#PED-1549).
- net/mlx5e: Overcome slow response for first macsec ASO WQE (jsc#PED-1549).
- net/mlx5e: QoS, Fix wrongfully setting parent_element_id on MODIFY_SCHEDULING_ELEMENT (jsc#PED-1549).
- net/mlx5e: QoS, Fix wrongfully setting parent_element_id on MODIFY_SCHEDULING_ELEMENT (jsc#SLE-19253).
- net/mlx5e: Remove redundant xsk pointer check in mlx5e_mpwrq_validate_xsk (jsc#PED-1549).
- net/mlx5e: Set decap action based on attr for sample (jsc#PED-1549).
- net/mlx5e: Set geneve_tlv_option_0_exist when matching on geneve option (jsc#PED-1549).
- net/mlx5e: Set uplink rep as NETNS_LOCAL (jsc#PED-1549).
- net/mlx5e: Set uplink rep as NETNS_LOCAL (jsc#SLE-19253).
- net/mlx5e: TC, Fix ct_clear overwriting ct action metadata (jsc#SLE-19253).
- net/mlx5e: TC, Keep mod hdr actions after mod hdr alloc (jsc#PED-1549).
- net/mlx5e: Update rx ring hw mtu upon each rx-fcs flag change (jsc#PED-1549).
- net/mlx5e: Update rx ring hw mtu upon each rx-fcs flag change (jsc#SLE-19253).
- net/mlx5e: Use correct encap attribute during invalidation (jsc#PED-1549).
- net/mlx5e: Verify dev is present for fix features ndo (jsc#PED-1549).
- net/mlx5e: Verify flow_source cap before using it (jsc#PED-1549).
- net/mlx5e: Verify flow_source cap before using it (jsc#SLE-19253).
- net/mlx5e: do as little as possible in napi poll when budget is 0 (jsc#PED-1549).
- net/mlx5e: do as little as possible in napi poll when budget is 0 (jsc#SLE-19253).
- net/mlx5e: kTLS, Fix build time constant test in RX (jsc#SLE-19253).
- net/mlx5e: kTLS, Fix build time constant test in TX (jsc#SLE-19253).
- net/net_failover: fix txq exceeding warning (git-fixes).
- net/rose: Fix to not accept on connected socket (git-fixes).
- net/sched: act_mirred: better wording on protection against excessive stack growth (CVE-2022-4269 bsc#1206024).
- net/sched: fix initialization order when updating chain 0 head (git-fixes).
- net/sched: flower: fix possible OOB write in fl_set_geneve_opt() (git-fixes).
- net/sched: sch_netem: Fix arithmetic in netem_dump() for 32-bit platforms (git-fixes).
- net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change (git-fixes).
- net/tg3: resolve deadlock in tg3_reset_task() during EEH (bsc#1207842).
- net/tls: tls_is_tx_ready() checked list_entry (CVE-2023-1075 bsc#1208598).
- net/ulp: prevent ULP without clone op from entering the LISTEN status (CVE-2023-0461 bsc#1208787).
- net/ulp: use consistent error code when blocking ULP (CVE-2023-0461 bsc#1208787).
- net/usb: kalmia: Do not pass act_len in usb_bulk_msg error path (git-fixes).
- net/x25: Fix to not accept on connected socket (git-fixes).
- net: USB: Fix wrong-direction WARNING in plusb.c (git-fixes).
- net: accept UFOv6 packages in virtio_net_hdr_to_skb (git-fixes).
- net: add missing include in include/net/gro.h (git-fixes).
- net: asix: fix modprobe 'sysfs: cannot create duplicate filename' (git-fixes).
- net: cdc_ncm: Deal with too low values of dwNtbOutMaxSize (git-fixes).
- net: devlink: Fix missing mutex_unlock() call (git-fixes).
- net: ena: Account for the number of processed bytes in XDP (git-fixes).
- net: ena: Do not register memory info on XDP exchange (git-fixes).
- net: ena: Fix rx_copybreak value update (git-fixes).
- net: ena: Fix toeplitz initial hash value (git-fixes).
- net: ena: Set default value for RX interrupt moderation (git-fixes).
- net: ena: Update NUMA TPH hint register upon NUMA node update (git-fixes).
- net: ena: Use bitmask to indicate packet redirection (git-fixes).
- net: hns3: add interrupts re-initialization while doing VF FLR (git-fixes).
- net: hns3: fix output information incomplete for dumping tx queue info with debugfs (git-fixes).
- net: hns3: fix reset delay time to avoid configuration timeout (git-fixes).
- net: hns3: fix sending pfc frames after reset issue (git-fixes).
- net: hns3: fix tm port shapping of fibre port is incorrect after driver initialization (git-fixes).
- net: linkwatch: be more careful about dev-&gt;linkwatch_dev_tracker (git-fixes).
- net: mana: Add new MANA VF performance counters for easier troubleshooting (bsc#1209982).
- net: mana: Add support for auxiliary device (bsc#1210741 jsc#PED-4022).
- net: mana: Add support for jumbo frame (bsc#1210551).
- net: mana: Assign interrupts to CPUs based on NUMA nodes (bsc#1208153).
- net: mana: Check if netdev/napi_alloc_frag returns single page (bsc#1210551).
- net: mana: Define and process GDMA response code GDMA_STATUS_MORE_ENTRIES (bsc#1210741 jsc#PED-4022).
- net: mana: Define data structures for allocating doorbell page from GDMA (bsc#1210741 jsc#PED-4022).
- net: mana: Define data structures for protection domain and memory registration (bsc#1210741 jsc#PED-4022).
- net: mana: Define max values for SGL entries (bsc#1210741 jsc#PED-4022).
- net: mana: Enable RX path to handle various MTU sizes (bsc#1210551).
- net: mana: Export Work Queue functions for use by RDMA driver (bsc#1210741 jsc#PED-4022).
- net: mana: Fix IRQ name - add PCI and queue number (bsc#1207875).
- net: mana: Fix accessing freed irq affinity_hint (bsc#1208153).
- net: mana: Fix perf regression: remove rx_cqes, tx_cqes counters (git-fixes).
- net: mana: Handle vport sharing between devices (bsc#1210741 jsc#PED-4022).
- net: mana: Move header files to a common location (bsc#1210741 jsc#PED-4022).
- net: mana: Record port number in netdev (bsc#1210741 jsc#PED-4022).
- net: mana: Record the physical address for doorbell page region (bsc#1210741 jsc#PED-4022).
- net: mana: Refactor RX buffer allocation code to prepare for various MTU (bsc#1210551).
- net: mana: Rename mana_refill_rxoob and remove some empty lines (bsc#1210551).
- net: mana: Set the DMA device max segment size (bsc#1210741 jsc#PED-4022).
- net: mana: Use napi_build_skb in RX path (bsc#1210551).
- net: mdio: mvusb: Fix an error handling path in mvusb_mdio_probe() (git-fixes).
- net: mdio: thunder: Add missing fwnode_handle_put() (git-fixes).
- net: mellanox: mlxbf_gige: Fix skb_panic splat under memory pressure (bsc#1211564).
- net: mlx5: eliminate anonymous module_init &amp; module_exit (jsc#PED-1549).
- net: mlx5: eliminate anonymous module_init &amp; module_exit (jsc#SLE-19253).
- net: mpls: fix stale pointer if allocation fails during device rename (bsc#1208700 CVE-2023-26545).
- net: natsemi: fix hw address initialization for jazz and xtensa (git-fixes).
- net: of: fix stub of_net helpers for CONFIG_NET=n (git-fixes).
- net: openvswitch: fix possible memory leak in ovs_meter_cmd_set() (git-fixes).
- net: phy: Ensure state transitions are processed from phy_stop() (git-fixes).
- net: phy: dp83822: Fix null pointer access on DP83825/DP83826 devices (git-fixes).
- net: phy: dp83867: add w/a for packet errors seen with short cables (git-fixes).
- net: phy: dp83869: fix default value for tx-/rx-internal-delay (git-fixes).
- net: phy: meson-gxl: Add generic dummy stubs for MMD register access (git-fixes).
- net: phy: meson-gxl: use MMD access dummy stubs for GXL, internal PHY (git-fixes).
- net: phy: mxl-gpy: add MDINT workaround (git-fixes).
- net: phy: nxp-c45-tja11xx: add remove callback (git-fixes).
- net: phy: nxp-c45-tja11xx: fix MII_BASIC_CONFIG_REV bit (git-fixes).
- net: phy: nxp-c45-tja11xx: fix unsigned long multiplication overflow (git-fixes).
- net: phy: smsc: bail out in lan87xx_read_status if genphy_read_status fails (git-fixes).
- net: qcom/emac: Fix use after free bug in emac_remove due to race condition (git-fixes).
- net: qrtr: correct types of trace event parameters (git-fixes).
- net: rpl: fix rpl header size calculation (CVE-2023-2156 bsc#1211131).
- net: sched: atm: dont intepret cls results when asked to drop (bsc#1207125 CVE-2023-23455).
- net: sched: cbq: dont intepret cls results when asked to drop (bsc#1207036 CVE-2023-23454).
- net: sched: fix possible refcount leak in tc_chain_tmplt_add() (git-fixes).
- net: sched: fix race condition in qdisc_graft() (CVE-2023-0590 bsc#1207795).
- net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg (bsc#1210940 CVE-2023-31436).
- net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg (bsc#1210940 CVE-2023-31436).
- net: skip virtio_net_hdr_set_proto if protocol already set (git-fixes).
- net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() (bsc#1209366 CVE-2023-28466).
- net: tun: avoid disabling NAPI twice (git-fixes).
- net: tun: fix bugs for oversize packet when napi frags enabled (git-fixes).
- net: tun: stop NAPI when detaching queues (git-fixes).
- net: tun: unlink NAPI from device on destruction (git-fixes).
- net: usb: asix: remove redundant assignment to variable reg (git-fixes).
- net: usb: cdc_ether: add support for Thales Cinterion PLS62-W modem (git-fixes).
- net: usb: cdc_ether: add support for Thales Cinterion PLS62-W modem (git-fixes).
- net: usb: cdc_mbim: avoid altsetting toggling for Telit FE990 (git-fixes).
- net: usb: lan78xx: Limit packet length to skb-&gt;len (git-fixes).
- net: usb: qmi_wwan: Set DTR quirk for BroadMobi BM818 (git-fixes).
- net: usb: qmi_wwan: add Telit 0x1080 composition (git-fixes).
- net: usb: qmi_wwan: add support for Compal RXM-G1 (git-fixes).
- net: usb: smsc75xx: Limit packet length to skb-&gt;len (git-fixes).
- net: usb: smsc75xx: Move packet length check to prevent kernel panic in skb_pull (git-fixes).
- net: usb: smsc95xx: Limit packet length to skb-&gt;len (git-fixes).
- net: usb: use eth_hw_addr_set() (git-fixes).
- net: virtio_net_hdr_to_skb: count transport header in UFO (git-fixes).
- net_sched: add __rcu annotation to netdev-&gt;qdisc (CVE-2023-0590 bsc#1207795).
- netfilter: nf_tables: deactivate anonymous set from preparation phase (CVE-2023-32233 bsc#1211043).
- netfilter: nf_tables: fix null deref due to zeroed list head (CVE-2023-1095 bsc#1208777).
- netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits (CVE-2023-0179 bsc#1207034).
- netrom: Fix use-after-free caused by accept on already connected socket (git-fixes).
- netrom: Fix use-after-free of a listening socket (git-fixes).
- nfc: change order inside nfc_se_io error path (git-fixes).
- nfc: fdp: add null check of devm_kmalloc_array in fdp_nci_i2c_read_device_properties (git-fixes).
- nfc: fix memory leak of se_io context in nfc_genl_se_io (git-fixes).
- nfc: pn533: initialize struct pn533_out_arg properly (git-fixes).
- nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition (git-fixes).
- nfp: flower-ct: fix error return code in nfp_fl_ct_add_offload() (git-fixes).
- nfp: flower: fix ingress police using matchall filter (git-fixes).
- nfp: only report pause frame configuration for physical device (git-fixes).
- nfs4: Fix kmemleak when allocate slot failed (git-fixes).
- nfs4trace: fix state manager flag printing (git-fixes).
- nfs: Always initialise fattr-&gt;label in nfs_fattr_alloc() (git-fixes).
- nfs: Avoid writeback threads getting stuck in mempool_alloc() (git-fixes).
- nfs: Cleanup unused rpc_clnt variable (git-fixes).
- nfs: Create a new nfs_alloc_fattr_with_label() function (git-fixes).
- nfs: Do not allocate nfs_fattr on the stack in __nfs42_ssc_open() (git-fixes).
- nfs: Fix an Oops in nfs_d_automount() (git-fixes).
- nfs: Further optimisations for 'ls -l' (git-fixes).
- nfs: Pass i_size to fscache_unuse_cookie() when a file is released (git-fixes).
- nfs: fix disabling of swap (git-fixes).
- nfs: nfs4clinet: check the return value of kstrdup() (git-fixes).
- nfs: nfsiod should not block forever in mempool_alloc() (git-fixes).
- nfs: nfsiod should not block forever in mempool_alloc() (git-fixes).
- nfsd: Avoid calling OPDESC() with ops-&gt;opnum == OP_ILLEGAL (git-fixes).
- nfsd: COMMIT operations must not return NFS?ERR_INVAL (git-fixes).
- nfsd: De-duplicate net_generic(nf-&gt;nf_net, nfsd_net_id) (git-fixes).
- nfsd: Finish converting the NFSv2 GETACL result encoder (git-fixes).
- nfsd: Finish converting the NFSv3 GETACL result encoder (git-fixes).
- nfsd: Fix a memory leak in an error handling path (git-fixes).
- nfsd: Fix handling of oversized NFSv4 COMPOUND requests (git-fixes).
- nfsd: Fix nfsd_breaker_owns_lease() return values (git-fixes).
- nfsd: Have legacy NFSD WRITE decoders use xdr_stream_subsegment() (git-fixes).
- nfsd: Protect against filesystem freezing (git-fixes).
- nfsd: Return nfserr_serverfault if splice_ok but buf-&gt;pages have data (git-fixes).
- nfsd: call op_release, even when op_func returns an error (git-fixes).
- nfsd: callback request does not use correct credential for AUTH_SYS (git-fixes).
- nfsd: do not call nfsd_file_put from client states seqfile display (git-fixes).
- nfsd: fix handling of readdir in v4root vs. mount upcall timeout (git-fixes).
- nfsd: fix leaked reference count of nfsd4_ssc_umount_item (git-fixes).
- nfsd: fix problems with cleanup on errors in nfsd4_copy (git-fixes).
- nfsd: fix race to check ls_layouts (git-fixes).
- nfsd: fix use-after-free in nfsd4_ssc_setup_dul() (git-fixes).
- nfsd: fix use-after-free on source server when doing inter-server copy (git-fixes).
- nfsd: pass range end to vfs_fsync_range() instead of count (git-fixes).
- nfsd: shut down the NFSv4 state objects before the filecache (git-fixes).
- nfsd: under NFSv4.1, fix double svc_xprt_put on rpc_create failure (git-fixes).
- nfsd: zero out pointers after putting nfsd_files on COPY setup error (git-fixes).
- nfsv3: handle out-of-order write replies (bsc#1205544).
- nfsv4 expose nfs_parse_server_name function (git-fixes).
- nfsv4 handle port presence in fs_location server string (git-fixes).
- nfsv4 only print the label when its queried (git-fixes).
- nfsv4 remove zero number of fs_locations entries error check (git-fixes).
- nfsv4 store server support for fs_location attribute (git-fixes).
- nfsv4.1 provide mount option to toggle trunking discovery (git-fixes).
- nfsv4.1 query for fs_location attr on a new file system (git-fixes).
- nfsv4.1: Fix uninitialised variable in devicenotify (git-fixes).
- nfsv4.1: Handle RECLAIM_COMPLETE trunking errors (git-fixes).
- nfsv4.1: We must always send RECLAIM_COMPLETE after a reboot (git-fixes).
- nfsv4.2: Clear FATTR4_WORD2_SECURITY_LABEL when done decoding (git-fixes).
- nfsv4.2: Fix a memory stomp in decode_attr_security_label (git-fixes).
- nfsv4.2: Fix initialisation of struct nfs4_label (git-fixes).
- nfsv4.2: Fixup CLONE dest file size for zero-length count (git-fixes).
- nfsv4.2: fix reference count leaks in _nfs42_proc_copy_notify() (git-fixes).
- nfsv4.x: Fail client initialisation if state manager thread can't run (git-fixes).
- nfsv4/pNFS: Always return layout stats on layout return for flexfiles (git-fixes).
- nfsv4/pnfs: Fix a use-after-free bug in open (git-fixes).
- nfsv4: Add an fattr allocation to _nfs4_discover_trunking() (git-fixes).
- nfsv4: Do not hold the layoutget locks across multiple RPC calls (git-fixes).
- nfsv4: Fix a credential leak in _nfs4_discover_trunking() (git-fixes).
- nfsv4: Fix a deadlock between nfs4_open_recover_helper() and delegreturn (git-fixes).
- nfsv4: Fix a potential state reclaim deadlock (git-fixes).
- nfsv4: Fix free of uninitialized nfs4_label on referral lookup (git-fixes).
- nfsv4: Fix hangs when recovering open state after a server reboot (git-fixes).
- nfsv4: Protect the state recovery thread against direct reclaim (git-fixes).
- nfsv4: Retry LOCK on OLD_STATEID during delegation return (git-fixes).
- nfsv4: keep state manager thread active if swap is enabled (git-fixes).
- nilfs2: do not write dirty data after degenerating to read-only (git-fixes).
- nilfs2: fix general protection fault in nilfs_btree_insert() (git-fixes).
- nilfs2: fix incomplete buffer cleanup in nilfs_btnode_abort_change_key() (git-fixes).
- nilfs2: fix infinite loop in nilfs_mdt_get_block() (git-fixes).
- nilfs2: fix kernel-infoleak in nilfs_ioctl_wrap_copy() (git-fixes).
- nilfs2: fix possible out-of-bounds segment allocation in resize ioctl (git-fixes).
- nilfs2: fix potential UAF of struct nilfs_sc_info in nilfs_segctor_thread() (git-fixes).
- nilfs2: fix sysfs interface lifetime (git-fixes).
- nilfs2: fix underflow in second superblock position calculations (git-fixes).
- nilfs2: fix use-after-free bug of nilfs_root in nilfs_evict_inode() (git-fixes).
- nilfs2: initialize unused bytes in segment summary blocks (git-fixes).
- nouveau: fix client work fence deletion race (git-fixes).
- null_blk: fix ida error handling in null_add_dev() (git-fixes).
- nvdimm: disable namespace on error (bsc#1166486).
- nvdimm: disable namespace on error (bsc#1166486).
- nvme initialize core quirks before calling nvme_init_subsystem (git-fixes).
- nvme-auth: check chap ctrl_key once constructed (bsc#1202633).
- nvme-auth: check chap ctrl_key once constructed (bsc#1202633).
- nvme-auth: clear sensitive info right after authentication completes (bsc#1202633).
- nvme-auth: clear sensitive info right after authentication completes (bsc#1202633).
- nvme-auth: convert dhchap_auth_list to an array (bsc#1202633).
- nvme-auth: convert dhchap_auth_list to an array (bsc#1202633).
- nvme-auth: do not ignore key generation failures when initializing ctrl keys (bsc#1202633).
- nvme-auth: do not ignore key generation failures when initializing ctrl keys (bsc#1202633).
- nvme-auth: do not keep long lived 4k dhchap buffer (bsc#1202633).
- nvme-auth: do not keep long lived 4k dhchap buffer (bsc#1202633).
- nvme-auth: do not override ctrl keys before validation (bsc#1202633).
- nvme-auth: do not override ctrl keys before validation (bsc#1202633).
- nvme-auth: do not re-authenticate if the controller is not LIVE (bsc#1202633).
- nvme-auth: do not re-authenticate if the controller is not LIVE (bsc#1202633).
- nvme-auth: do not use NVMe status codes (bsc#1202633).
- nvme-auth: do not use NVMe status codes (bsc#1202633).
- nvme-auth: fix an error code in nvme_auth_process_dhchap_challenge() (bsc#1202633).
- nvme-auth: fix an error code in nvme_auth_process_dhchap_challenge() (bsc#1202633).
- nvme-auth: fix smatch warning complaints (bsc#1202633).
- nvme-auth: fix smatch warning complaints (bsc#1202633).
- nvme-auth: guarantee dhchap buffers under memory pressure (bsc#1202633).
- nvme-auth: guarantee dhchap buffers under memory pressure (bsc#1202633).
- nvme-auth: have dhchap_auth_work wait for queues auth to complete (bsc#1202633).
- nvme-auth: have dhchap_auth_work wait for queues auth to complete (bsc#1202633).
- nvme-auth: mark nvme_auth_wq static (bsc#1202633).
- nvme-auth: mark nvme_auth_wq static (bsc#1202633).
- nvme-auth: no need to reset chap contexts on re-authentication (bsc#1202633).
- nvme-auth: no need to reset chap contexts on re-authentication (bsc#1202633).
- nvme-auth: remove redundant auth_work flush (bsc#1202633).
- nvme-auth: remove redundant auth_work flush (bsc#1202633).
- nvme-auth: remove redundant buffer deallocations (bsc#1202633).
- nvme-auth: remove redundant buffer deallocations (bsc#1202633).
- nvme-auth: remove redundant deallocations (bsc#1202633).
- nvme-auth: remove redundant deallocations (bsc#1202633).
- nvme-auth: remove redundant if statement (bsc#1202633).
- nvme-auth: remove redundant if statement (bsc#1202633).
- nvme-auth: remove symbol export from nvme_auth_reset (bsc#1202633).
- nvme-auth: remove symbol export from nvme_auth_reset (bsc#1202633).
- nvme-auth: rename __nvme_auth_[reset|free] to nvme_auth[reset|free]_dhchap (bsc#1202633).
- nvme-auth: rename __nvme_auth_[reset|free] to nvme_auth[reset|free]_dhchap (bsc#1202633).
- nvme-auth: rename authentication work elements (bsc#1202633).
- nvme-auth: rename authentication work elements (bsc#1202633).
- nvme-auth: uninitialized variable in nvme_auth_transform_key() (git-fixes).
- nvme-auth: use workqueue dedicated to authentication (bsc#1202633).
- nvme-auth: use workqueue dedicated to authentication (bsc#1202633).
- nvme-fabrics: show well known discovery name (bsc#1200054).
- nvme-fabrics: show well known discovery name (bsc#1200054).
- nvme-fc: fix a missing queue put in nvmet_fc_ls_create_association (git-fixes).
- nvme-fcloop: fix 'inconsistent {IN-HARDIRQ-W} -&gt; {HARDIRQ-ON-W} usage' (git-fixes).
- nvme-hwmon: consistently ignore errors from nvme_hwmon_init (git-fixes).
- nvme-hwmon: kmalloc the NVME SMART log buffer (git-fixes).
- nvme-multipath: fix hang when disk goes live over reconnect (git-fixes).
- nvme-multipath: fix possible hang in live ns resize with ANA access (git-fixes).
- nvme-pci: add bogus ID quirk for ADATA SX6000PNP (bsc#1207827).
- nvme-pci: add quirks for Samsung X5 SSDs (git-fixes).
- nvme-pci: add the IGNORE_DEV_SUBNQN quirk for Intel P4500/P4600 SSDs (git-fixes).
- nvme-pci: avoid the deepest sleep state on ZHITAI TiPro5000 SSDs (git-fixes).
- nvme-pci: avoid the deepest sleep state on ZHITAI TiPro7000 SSDs (git-fixes).
- nvme-pci: clear the prp2 field when not used (git-fixes).
- nvme-pci: disable write zeroes on various Kingston SSD (git-fixes).
- nvme-pci: fix a NULL pointer dereference in nvme_alloc_admin_tags (git-fixes).
- nvme-pci: fix doorbell buffer value endianness (git-fixes).
- nvme-pci: fix mempool alloc size (git-fixes).
- nvme-pci: fix page size checks (git-fixes).
- nvme-pci: fix timeout request state check (git-fixes).
- nvme-pci: mark Lexar NM760 as IGNORE_DEV_SUBNQN (git-fixes).
- nvme-pci: set min_align_mask before calculating max_hw_sectors (git-fixes).
- nvme-rdma: fix possible hang caused during ctrl deletion (git-fixes).
- nvme-tcp: always fail a request when sending it failed (bsc#1208902).
- nvme-tcp: fix a possible UAF when failing to allocate an io queue (git-fixes).
- nvme-tcp: fix bogus request completion when failing to send AER (git-fixes).
- nvme-tcp: fix possible circular locking when deleting a controller under memory pressure (git-fixes).
- nvme-tcp: fix possible hang caused during ctrl deletion (git-fixes).
- nvme-tcp: fix regression that causes sporadic requests to time out (git-fixes).
- nvme-tcp: lockdep: annotate in-kernel sockets (git-fixes).
- nvme: Fix IOC_PR_CLEAR and IOC_PR_RELEASE ioctls for nvme devices (git-fixes).
- nvme: add a bogus subsystem NQN quirk for Micron MTFDKBA2T0TFH (git-fixes).
- nvme: add device name to warning in uuid_show() (git-fixes).
- nvme: also return I/O command effects from nvme_command_effects (git-fixes).
- nvme: bring back auto-removal of deleted namespaces during sequential scan (git-fixes).
- nvme: catch -ENODEV from nvme_revalidate_zones again (git-fixes).
- nvme: check for duplicate identifiers earlier (git-fixes).
- nvme: cleanup __nvme_check_ids (git-fixes).
- nvme: copy firmware_rev on each init (git-fixes).
- nvme: copy firmware_rev on each init (git-fixes).
- nvme: define compat_ioctl again to unbreak 32-bit userspace (git-fixes).
- nvme: fix async event trace event (git-fixes).
- nvme: fix discard support without oncs (git-fixes).
- nvme: fix discard support without oncs (git-fixes).
- nvme: fix handling single range discard request (git-fixes).
- nvme: fix interpretation of DMRSL (git-fixes).
- nvme: fix multipath crash caused by flush request when blktrace is enabled (git-fixes).
- nvme: fix passthrough csi check (git-fixes).
- nvme: fix per-namespace chardev deletion (git-fixes).
- nvme: fix the CRIMS and CRWMS definitions to match the spec (git-fixes).
- nvme: fix the NVME_CMD_EFFECTS_CSE_MASK definition (git-fixes).
- nvme: fix the name of Zone Append for verbose logging (git-fixes).
- nvme: fix the read-only state for zoned namespaces with unsupposed features (git-fixes).
- nvme: generalize the nvme_multi_css check in nvme_scan_ns (git-fixes).
- nvme: improve the NVME_CONNECT_AUTHREQ* definitions (git-fixes).
- nvme: move nvme_multi_css into nvme.h (git-fixes).
- nvme: move the Samsung X5 quirk entry to the core quirks (git-fixes).
- nvme: rename nvme_validate_or_alloc_ns to nvme_scan_ns (git-fixes).
- nvme: return err on nvme_init_non_mdts_limits fail (git-fixes).
- nvme: send Identify with CNS 06h only to I/O controllers (bsc#1209693).
- nvme: send Identify with CNS 06h only to I/O controllers (bsc#1209693).
- nvme: set dma alignment to dword (git-fixes).
- nvme: set non-mdts limits in nvme_scan_work (git-fixes).
- nvme: use command_id instead of req-&gt;tag in trace_nvme_complete_rq() (git-fixes).
- nvmet-auth: add missing goto in nvmet_setup_auth() (bsc#1207050 CVE-2023-0122).
- nvmet-auth: do not try to cancel a non-initialized work_struct (git-fixes).
- nvmet-tcp: add bounds check on Transfer Tag (git-fixes).
- nvmet-tcp: fix incomplete data digest send (git-fixes).
- nvmet-tcp: fix lockdep complaint on nvmet_tcp_wq flush during queue teardown (git-fixes).
- nvmet-tcp: fix regression in data_digest calculation (git-fixes).
- nvmet-tcp: fix unhandled tcp states in nvmet_tcp_state_change() (git-fixes).
- nvmet: add helpers to set the result field for connect commands (git-fixes).
- nvmet: avoid potential UAF in nvmet_req_complete() (git-fixes).
- nvmet: do not defer passthrough commands with trivial effects to the workqueue (git-fixes).
- nvmet: fix I/O Command Set specific Identify Controller (git-fixes).
- nvmet: fix Identify Active Namespace ID list handling (git-fixes).
- nvmet: fix Identify Controller handling (git-fixes).
- nvmet: fix Identify Namespace handling (git-fixes).
- nvmet: fix a memory leak (git-fixes).
- nvmet: fix a memory leak in nvmet_auth_set_key (git-fixes).
- nvmet: fix a use-after-free (git-fixes).
- nvmet: fix invalid memory reference in nvmet_subsys_attr_qid_max_show (git-fixes).
- nvmet: fix mar and mor off-by-one errors (git-fixes).
- nvmet: fix memory leak in nvmet_subsys_attr_model_store_locked (git-fixes).
- nvmet: fix workqueue MEM_RECLAIM flushing dependency (git-fixes).
- nvmet: fix workqueue MEM_RECLAIM flushing dependency (git-fixes).
- nvmet: force reconnect when number of queue changes (git-fixes).
- nvmet: looks at the passthrough controller when initializing CAP (git-fixes).
- nvmet: move the call to nvmet_ns_changed out of nvmet_ns_revalidate (git-fixes).
- nvmet: only allocate a single slab for bvecs (git-fixes).
- nvmet: use IOCB_NOWAIT only if the filesystem supports it (git-fixes).
- nvmet: use NVME_CMD_EFFECTS_CSUPP instead of open coding it (git-fixes).
- objtool: Add a missing comma to avoid string concatenation (bsc#1207328).
- ocfs2: Fix data corruption after failed write (bsc#1208542).
- ocfs2: clear dinode links count in case of error (bsc#1207650).
- ocfs2: fix BUG when iput after ocfs2_mknod fails (bsc#1207649).
- ocfs2: fix crash when mount with quota enabled (bsc#1207640).
- ocfs2: fix defrag path triggering jbd2 ASSERT (bsc#1199304).
- ocfs2: fix memory leak in ocfs2_mount_volume() (bsc#1207652).
- ocfs2: fix memory leak in ocfs2_stack_glue_init() (bsc#1207651).
- ocfs2: fix non-auto defrag path not working issue (bsc#1199304).
- ocfs2: ocfs2_mount_volume does cleanup job before return error (bsc#1207770).
- ocfs2: quota_local: fix possible uninitialized-variable access in ocfs2_local_read_info() (bsc#1207768).
- ocfs2: rewrite error handling of ocfs2_fill_super (bsc#1207771).
- octeon: constify netdev-&gt;dev_addr (git-fixes).
- octeontx2-pf: Avoid use of GFP_KERNEL in atomic context (git-fixes).
- octeontx2-pf: Fix resource leakage in VF driver unbind (git-fixes).
- octeontx2-pf: Fix the use of GFP_KERNEL in atomic context on rt (git-fixes).
- octeontx2-pf: Recalculate UDP checksum for ptp 1-step sync packet (git-fixes).
- of/address: Return an error when no valid dma-ranges are found (git-fixes).
- ovl: fail on invalid uid/gid mapping at copy up (CVE-2023-0386 bsc#1209615).
- pNFS/filelayout: Fix coalescing test for single DS (git-fixes).
- panic: Consolidate open-coded panic_on_warn checks (bsc#1207328).
- panic: Introduce warn_limit (bsc#1207328).
- panic: unset panic_on_warn inside panic() (bsc#1207328).
- pci/aspm: Remove pcie_aspm_pm_state_change() (git-fixes).
- pci/dpc: Await readiness of secondary bus after reset (git-fixes).
- pci/edr: Clear Device Status after EDR error recovery (git-fixes).
- pci/iov: Enlarge virtfn sysfs name buffer (git-fixes).
- pci/pm: Always disable PTM for all devices during suspend (git-fixes).
- pci/pm: Avoid putting Elo i2 PCIe Ports in D3cold (git-fixes).
- pci/pm: Fix bridge_d3_blacklist Elo i2 overwrite of Gigabyte X299 (git-fixes).
- pci/pm: Observe reset delay irrespective of bridge_d3 (git-fixes).
- pci/ptm: Add pci_suspend_ptm() and pci_resume_ptm() (git-fixes).
- pci: Add ACS quirk for Wangxun NICs (git-fixes).
- pci: Add SolidRun vendor ID (git-fixes).
- pci: Align extra resources for hotplug bridges properly (git-fixes).
- pci: Avoid FLR for AMD FCH AHCI adapters (git-fixes).
- pci: Avoid pci_dev_lock() AB/BA deadlock with sriov_numvfs_store() (git-fixes).
- pci: Fix dropping valid root bus resources with .end = zero (git-fixes).
- pci: Reduce warnings on possible RW1C corruption (git-fixes).
- pci: Take other bus devices into account when distributing resources (git-fixes).
- pci: Unify delay handling for reset and resume (git-fixes).
- pci: aardvark: Check return value of generic_handle_domain_irq() when processing INTx IRQ (git-fixes).
- pci: aardvark: Fix link training (git-fixes).
- pci: dwc: Add dw_pcie_ops.host_deinit() callback (git-fixes).
- pci: dwc: Fix PORT_LINK_CONTROL update when CDM check enabled (git-fixes).
- pci: hotplug: Allow marking devices as disconnected during bind/unbind (git-fixes).
- pci: hv: Add a per-bus mutex state_lock (bsc#1207185).
- pci: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1207185).
- pci: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1207185).
- pci: hv: Use async probing to reduce boot time (bsc#1207185).
- pci: hv: fix a race condition bug in hv_pci_query_relations() (bsc#1207185).
- pci: hv: update comment in x86 specific hv_arch_irq_unmask (git-fixes).
- pci: imx6: Install the fault handler only on compatible match (git-fixes).
- pci: loongson: Add more devices that need MRRS quirk (git-fixes).
- pci: loongson: Prevent LS7A MRRS increases (git-fixes).
- pci: mediatek-gen3: Assert resets to ensure expected init state (git-fixes).
- pci: mediatek-gen3: Fix refcount leak in mtk_pcie_init_irq_domains() (git-fixes).
- pci: pciehp: Fix AB-BA deadlock between reset_lock and device_lock (git-fixes).
- pci: qcom: Fix host-init error handling (git-fixes).
- pci: qcom: Fix pipe clock imbalance (git-fixes).
- pci: qcom: Fix the incorrect register usage in v2.7.0 config (git-fixes).
- pci: switchtec: Return -EFAULT for copy_to_user() errors (git-fixes).
- pci: vmd: Fix secondary bus reset for Intel bridges (git-fixes).
- pci: vmd: Fix secondary bus reset for Intel bridges (git-fixes).
- pci: xgene: Revert 'PCI: xgene: Use inbound resources for setup' (git-fixes).
- perf/amd/ibs: Use interrupt regs ip for stack unwinding (git fixes).
- perf/core: Call LSM hook after copying perf_event_attr (git fixes).
- perf/core: Fix data race between perf_event_set_output() and perf_mmap_close() (git fixes).
- perf/core: Fix perf_output_begin parameter is incorrectly invoked in perf_event_bpf_output (git fixes).
- perf/core: Fix the same task check in perf_event_set_output (git fixes).
- perf/core: Inherit event_caps (git fixes).
- perf/x86/amd: fix potential integer overflow on shift of a int (git fixes).
- perf/x86/intel/cstate: Add Emerald Rapids (PED-4396).
- perf/x86/intel/ds: Fix precise store latency handling (git fixes).
- perf/x86/intel/lbr: Use setup_clear_cpu_cap() instead of clear_cpu_cap() (git fixes).
- perf/x86/intel/pt: Fix sampling using single range output (git fixes).
- perf/x86/intel/pt: Relax address filter validation (git fixes).
- perf/x86/intel/uncore: Add Emerald Rapids (git fixes).
- perf/x86/intel/uncore: Clear attr_update properly (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Disable I/O stacks to PMU mapping on ICX-D (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Enable UPI topology discovery for Icelake Server (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Enable UPI topology discovery for Sapphire Rapids (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Enable UPI topology discovery for Skylake Server (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Fix broken read_counter() for SNB IMC PMU (git fixes).
- perf/x86/intel/uncore: Fix reference count leak in __uncore_imc_init_box() (git fixes).
- perf/x86/intel/uncore: Fix reference count leak in hswep_has_limit_sbox() (git fixes).
- perf/x86/intel/uncore: Fix reference count leak in sad_cfg_iio_topology() (git fixes).
- perf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map() (git fixes).
- perf/x86/intel/uncore: Generalize IIO topology support (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Generalize get_topology() for SKX PMUs (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Get UPI NodeID and GroupID (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Introduce UPI topology type (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Make set_mapping() procedure void (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Update sysfs-devices-mapping file (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel: Add Cooper Lake stepping to isolation_ucodes (git fixes).
- perf/x86/intel: Add Emerald Rapids (git fixes).
- perf/x86/intel: Do not extend the pseudo-encoding to GP counters (git fixes).
- perf/x86/intel: Fix PEBS data source encoding for ADL (git fixes).
- perf/x86/intel: Fix PEBS memory access info encoding for ADL (git fixes).
- perf/x86/intel: Fix event constraints for ICL (git fixes).
- perf/x86/intel: Fix pebs event constraints for ADL (git fixes).
- perf/x86/intel: Fix pebs event constraints for ICL (git fixes).
- perf/x86/intel: Fix pebs event constraints for SPR (git fixes).
- perf/x86/lbr: Enable the branch type for the Arch LBR by default (git fixes).
- perf/x86/msr: Add Emerald Rapids (git fixes).
- perf/x86/rapl: Add support for Intel AlderLake-N (git fixes).
- perf/x86/rapl: Add support for Intel Emerald Rapids (PED-4394).
- perf/x86/rapl: Treat Tigerlake like Icelake (git fixes).
- perf/x86/rapl: Use standard Energy Unit for SPR Dram RAPL domain (git fixes).
- perf/x86/rapl: fix AMD event handling (git fixes).
- perf/x86/uncore: Add Raptor Lake uncore support (git fixes).
- perf/x86/uncore: Add a quirk for UPI on SPR (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/uncore: Add new Alder Lake and Raptor Lake support (git fixes).
- perf/x86/uncore: Add new Raptor Lake S support (git fixes).
- perf/x86/uncore: Clean up uncore_pci_ids (git fixes).
- perf/x86/uncore: Do not WARN_ON_ONCE() for a broken discovery table (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/uncore: Factor out uncore_device_to_die() (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/uncore: Fix potential NULL pointer in uncore_get_alias_name (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/uncore: Ignore broken units in discovery table (bsc#1206824, bsc#1206493, bsc#1206492).
- perf: Always wake the parent event (git fixes).
- perf: Fix check before add_event_to_groups() in perf_group_detach() (git fixes).
- perf: Fix possible memleak in pmu_dev_alloc() (git fixes).
- perf: fix perf_event_context-&gt;time (git fixes).
- phy: rockchip-typec: Fix unsigned comparison with less than zero (git-fixes).
- phy: rockchip-typec: fix tcphy_get_mode error case (git-fixes).
- phy: st: miphy28lp: use _poll_timeout functions for waits (git-fixes).
- phy: tegra: xusb: Add missing tegra_xusb_port_unregister for usb2_port and ulpi_port (git-fixes).
- phy: tegra: xusb: Fix return value of tegra_xusb_find_port_node function (CVE-2023-23000 bsc#1208816).
- pinctrl: amd: Disable and mask interrupts on resume (git-fixes).
- pinctrl: aspeed: Fix confusing types in return value (git-fixes).
- pinctrl: at91-pio4: fix domain name assignment (git-fixes).
- pinctrl: at91: use devm_kasprintf() to avoid potential leaks (git-fixes).
- pinctrl: intel: Restore the pins that used to be in Direct IRQ mode (git-fixes).
- pinctrl: mediatek: Fix the drive register definition of some Pins (git-fixes).
- pinctrl: mediatek: Initialize variable *buf to zero (git-fixes).
- pinctrl: mediatek: fix coding style (git-fixes).
- pinctrl: meson-axg: add missing GPIOA_18 gpio group (git-fixes).
- pinctrl: ocelot: Fix alt mode for ocelot (git-fixes).
- pinctrl: qcom: lpass-lpi: set output value before enabling output (git-fixes).
- pinctrl: qcom: pinctrl-msm8976: Correct function names for wcss pins (git-fixes).
- pinctrl: renesas: r8a779a0: Remove incorrect AVB[01] pinmux configuration (git-fixes).
- pinctrl: rockchip: Fix refcount leak in rockchip_pinctrl_parse_groups (git-fixes).
- pinctrl: single: fix potential NULL dereference (git-fixes).
- pinctrl: stm32: Fix refcount leak in stm32_pctrl_get_irq_domain (git-fixes).
- platform/chrome: cros_ec_chardev: fix kernel data leak from ioctl (git-fixes).
- platform/surface: aggregator: Allow completion work-items to be executed in parallel (git-fixes).
- platform/x86 (gigabyte-wmi): Add support for A320M-S2H V2 (git-fixes).
- platform/x86/amd/pmc: Add new acpi id for PMC controller (bsc#1210644).
- platform/x86/amd/pmc: Add new acpi id for PMC controller (bsc#1210644).
- platform/x86/amd/pmc: Add new platform support (bsc#1210644).
- platform/x86/amd/pmc: Add new platform support (bsc#1210644).
- platform/x86/amd: Fix refcount leak in amd_pmc_probe (bsc#1210644).
- platform/x86/amd: pmc: Add a module parameter to disable workarounds (bsc#1210644).
- platform/x86/amd: pmc: Add a workaround for an s0i3 issue on Cezanne (bsc#1210644).
- platform/x86/amd: pmc: Add defines for STB events (bsc#1210644).
- platform/x86/amd: pmc: Add line break for readability (bsc#1210644).
- platform/x86/amd: pmc: Add new ACPI ID AMDI0009 (bsc#1210644).
- platform/x86/amd: pmc: Add num_samples message id support to STB (bsc#1210644).
- platform/x86/amd: pmc: Add sysfs files for SMU (bsc#1210644).
- platform/x86/amd: pmc: Always write to the STB (bsc#1210644).
- platform/x86/amd: pmc: Disable IRQ1 wakeup for RN/CZN (bsc#1210644).
- platform/x86/amd: pmc: Do not dump data after resume from s0i3 on picasso (git-fixes).
- platform/x86/amd: pmc: Do not try to read SMU version on Picasso (git-fixes).
- platform/x86/amd: pmc: Fix build without debugfs (bsc#1210644).
- platform/x86/amd: pmc: Fix memory leak in amd_pmc_stb_debugfs_open_v2() (bsc#1210644).
- platform/x86/amd: pmc: Hide SMU version and program attributes for Picasso (git-fixes).
- platform/x86/amd: pmc: Move idlemask check into `amd_pmc_idlemask_read` (git-fixes).
- platform/x86/amd: pmc: Move out of BIOS SMN pair for STB init (git-fixes).
- platform/x86/amd: pmc: Read SMU version during suspend on Cezanne systems (bsc#1210644).
- platform/x86/amd: pmc: Remove more CONFIG_DEBUG_FS checks (bsc#1210644).
- platform/x86/amd: pmc: Utilize SMN index 0 for driver probe (git-fixes).
- platform/x86/amd: pmc: Write dummy postcode into the STB DRAM (bsc#1210644).
- platform/x86/amd: pmc: add CONFIG_SERIO dependency (git-fixes).
- platform/x86/amd: pmc: differentiate STB/SMU messaging prints (bsc#1210644).
- platform/x86/amd: pmc: remove CONFIG_DEBUG_FS checks (bsc#1210644).
- platform/x86/amd: pmc: remove CONFIG_SUSPEND checks (bsc#1210644).
- platform/x86/intel/pmc: Alder Lake PCH slp_s0_residency fix (git-fixes).
- platform/x86: ISST: PUNIT device mapping with Sub-NUMA clustering (bsc#1208420).
- platform/x86: ISST: Remove 8 socket limit (bsc#1211836).
- platform/x86: Move AMD platform drivers to separate directory (bsc#1210644).
- platform/x86: amd-pmc: Add a message to print resume time info (bsc#1210644).
- platform/x86: amd-pmc: Add special handling for timer based S0i3 wakeup (bsc#1210644).
- platform/x86: amd-pmc: Add support for AMD Smart Trace Buffer (bsc#1210644).
- platform/x86: amd-pmc: Add support for AMD Spill to DRAM STB feature (bsc#1210644).
- platform/x86: amd-pmc: Avoid reading SMU version at probe time (bsc#1210644).
- platform/x86: amd-pmc: Check s0i3 cycle status (bsc#1210644).
- platform/x86: amd-pmc: Correct usage of SMU version (git-fixes).
- platform/x86: amd-pmc: Downgrade dev_info message to dev_dbg (bsc#1210644).
- platform/x86: amd-pmc: Drop CPU QoS workaround (bsc#1210644).
- platform/x86: amd-pmc: Drop check for valid alarm time (bsc#1210644).
- platform/x86: amd-pmc: Export Idlemask values based on the APU (git-fixes).
- platform/x86: amd-pmc: Fix build error unused-function (bsc#1210644).
- platform/x86: amd-pmc: Fix compilation when CONFIG_DEBUGFS is disabled (git-fixes).
- platform/x86: amd-pmc: Fix compilation without CONFIG_SUSPEND (bsc#1210644).
- platform/x86: amd-pmc: Make amd_pmc_stb_debugfs_fops static (bsc#1210644).
- platform/x86: amd-pmc: Move FCH init to first use (bsc#1210644).
- platform/x86: amd-pmc: Move SMU logging setup out of init (bsc#1210644).
- platform/x86: amd-pmc: Move to later in the suspend process (bsc#1210644).
- platform/x86: amd-pmc: Only report STB errors when STB enabled (bsc#1210644).
- platform/x86: amd-pmc: Output error codes in messages (bsc#1210644).
- platform/x86: amd-pmc: Send command to dump data after clearing OS_HINT (bsc#1210644).
- platform/x86: amd-pmc: Set QOS during suspend on CZN w/ timer wakeup (bsc#1210644).
- platform/x86: amd-pmc: Shuffle location of amd_pmc_get_smu_version() (bsc#1210644).
- platform/x86: amd-pmc: Simplify error handling and store the pci_dev in amd_pmc_dev structure (bsc#1210644).
- platform/x86: amd-pmc: Validate entry into the deepest state on resume (bsc#1210644).
- platform/x86: amd-pmc: adjust arguments for `amd_pmc_send_cmd` (bsc#1210644).
- platform/x86: amd-pmc: fix compilation without CONFIG_RTC_SYSTOHC_DEVICE (bsc#1210644).
- platform/x86: amd-pmc: uninitialized variable in amd_pmc_s2d_init() (bsc#1210644).
- platform/x86: amd: pmc: Remove __maybe_unused from amd_pmc_suspend_handler() (bsc#1210644).
- platform/x86: amd: pmc: provide user message where s0ix is not supported (bsc#1210644).
- platform/x86: asus-nb-wmi: Add alternate mapping for KEY_SCREENLOCK (git-fixes).
- platform/x86: asus-wmi: Ignore WMI events with codes 0x7B, 0xC0 (git-fixes).
- platform/x86: dell-wmi: Add a keymap for KEY_MUTE in type 0x0010 table (git-fixes).
- platform/x86: gigabyte-wmi: add support for B450M DS3H WIFI-CF (git-fixes).
- platform/x86: gigabyte-wmi: add support for X570S AORUS ELITE (git-fixes).
- platform/x86: hp-wmi: Support touchpad on/off (git-fixes).
- platform/x86: intel-uncore-freq: add Emerald Rapids support (PED-4390).
- platform/x86: intel_scu_pcidrv: Add back PCI ID for Medfield (git-fixes).
- platform/x86: think-lmi: Add possible_values for ThinkStation (git-fixes).
- platform/x86: think-lmi: Certificate authentication support (bsc#1210050).
- platform/x86: think-lmi: Clean up display of current_value on Thinkstation (git-fixes).
- platform/x86: think-lmi: Fix memory leak when showing current settings (git-fixes).
- platform/x86: think-lmi: Fix memory leaks when parsing ThinkStation WMI strings (git-fixes).
- platform/x86: think-lmi: Move kobject_init() call into tlmi_create_auth() (bsc#1210050).
- platform/x86: think-lmi: Opcode support (bsc#1210050).
- platform/x86: think-lmi: Prevent underflow in index_store() (bsc#1210050).
- platform/x86: think-lmi: Simplify tlmi_analyze() error handling a bit (bsc#1210050).
- platform/x86: think-lmi: Use min_t() for comparison and assignment (bsc#1210050).
- platform/x86: think-lmi: add debug_cmd (bsc#1210050).
- platform/x86: think-lmi: add missing type attribute (git-fixes).
- platform/x86: think-lmi: certificate support clean ups (bsc#1210050).
- platform/x86: think-lmi: only display possible_values if available (git-fixes).
- platform/x86: think-lmi: use correct possible_values delimiters (git-fixes).
- platform/x86: thinkpad-acpi: Add support for automatic mode transitions (bsc#1210050).
- platform/x86: thinkpad-acpi: Enable AMT by default on supported systems (bsc#1210050).
- platform/x86: thinkpad-acpi: profile capabilities as integer (bsc#1210050).
- platform/x86: thinkpad_acpi: Accept ibm_init_struct.init() returning -ENODEV (bsc#1210050).
- platform/x86: thinkpad_acpi: Add LED_RETAIN_AT_SHUTDOWN to led_class_devs (bsc#1210050).
- platform/x86: thinkpad_acpi: Add PSC mode support (bsc#1210050).
- platform/x86: thinkpad_acpi: Add a s2idle resume quirk for a number of laptops (bsc#1210050).
- platform/x86: thinkpad_acpi: Add dual fan probe (bsc#1210050).
- platform/x86: thinkpad_acpi: Add dual-fan quirk for T15g (2nd gen) (bsc#1210050).
- platform/x86: thinkpad_acpi: Add hotkey_notify_extended_hotkey() helper (bsc#1210050).
- platform/x86: thinkpad_acpi: Add lid_logo_dot to the list of safe LEDs (bsc#1210050).
- platform/x86: thinkpad_acpi: Add quirk for ThinkPads without a fan (bsc#1210050).
- platform/x86: thinkpad_acpi: Cleanup dytc_profile_available (bsc#1210050).
- platform/x86: thinkpad_acpi: Convert btusb DMI list to quirks (bsc#1210050).
- platform/x86: thinkpad_acpi: Convert platform driver to use dev_groups (bsc#1210050).
- platform/x86: thinkpad_acpi: Correct dual fan probe (bsc#1210050).
- platform/x86: thinkpad_acpi: Do not use test_bit on an integer (bsc#1210050).
- platform/x86: thinkpad_acpi: Enable s2idle quirk for 21A1 machine type (bsc#1210050).
- platform/x86: thinkpad_acpi: Explicitly set to balanced mode on startup (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix a memory leak of EFCH MMIO resource (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix coccinelle warnings (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix compiler warning about uninitialized err variable (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix incorrect use of platform profile on AMD platforms (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix max_brightness of thinklight (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix platform profiles on T490 (git-fixes).
- platform/x86: thinkpad_acpi: Fix profile mode display in AMT mode (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix profile modes on Intel platforms (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix reporting a non present second fan on some models (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix the hwmon sysfs-attr showing up in the wrong place (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix thermal_temp_input_attr sorting (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix thinklight LED brightness returning 255 (bsc#1210050).
- platform/x86: thinkpad_acpi: Get privacy-screen / lcdshadow ACPI handles only once (bsc#1210050).
- platform/x86: thinkpad_acpi: Make *_init() functions return -ENODEV instead of 1 (bsc#1210050).
- platform/x86: thinkpad_acpi: Properly indent code in tpacpi_dytc_profile_init() (bsc#1210050).
- platform/x86: thinkpad_acpi: Register tpacpi_pdriver after subdriver init (bsc#1210050).
- platform/x86: thinkpad_acpi: Remove 'goto err_exit' from hotkey_init() (bsc#1210050).
- platform/x86: thinkpad_acpi: Remove unused sensors_pdev_attrs_registered flag (bsc#1210050).
- platform/x86: thinkpad_acpi: Restore missing hotkey_tablet_mode and hotkey_radio_sw sysfs-attr (bsc#1210050).
- platform/x86: thinkpad_acpi: Simplify dytc_version handling (bsc#1210050).
- platform/x86: thinkpad_acpi: Switch to common use of attributes (bsc#1210050).
- platform/x86: thinkpad_acpi: Use backlight helper (bsc#1210050).
- platform/x86: thinkpad_acpi: clean up dytc profile convert (bsc#1210050).
- platform/x86: thinkpad_acpi: consistently check fan_get_status return (bsc#1210050).
- platform/x86: thinkpad_acpi: do not use PSC mode on Intel platforms (bsc#1210050).
- platform/x86: thinkpad_acpi: tpacpi_attr_group contains driver attributes not device attrs (bsc#1210050).
- platform/x86: thinkpad_acpi: use strstarts() (bsc#1210050).
- platform/x86: touchscreen_dmi: Add Chuwi Vi8 (CWI501) DMI match (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the CSL Panther Tab HD (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Dexp Ursus KX210i (git-fixes).
- platform/x86: touchscreen_dmi: Add upside-down quirk for GDIX1002 ts on the Juno Tablet (git-fixes).
- platform: x86: MLX_PLATFORM: select REGMAP instead of depending on it (git-fixes).
- pm: domains: fix integer overflow issues in genpd_parse_state() (git-fixes).
- pm: hibernate: Do not get block device exclusively in test_resume mode (git-fixes).
- pm: hibernate: Turn snapshot_test into global variable (git-fixes).
- pm: hibernate: fix load_image_and_restore() error path (git-fixes).
- power: supply: Fix logic checking if system is running from battery (git-fixes).
- power: supply: Ratelimit no data debug output (git-fixes).
- power: supply: ab8500: Fix external_power_changed race (git-fixes).
- power: supply: bq24190: Fix use after free bug in bq24190_remove due to race condition (CVE-2023-33288 bsc#1211590).
- power: supply: bq24190_charger: using pm_runtime_resume_and_get instead of pm_runtime_get_sync (git-fixes).
- power: supply: bq27xxx: Add cache parameter to bq27xxx_battery_current_and_status() (git-fixes).
- power: supply: bq27xxx: After charger plug in/out wait 0.5s for things to stabilize (git-fixes).
- power: supply: bq27xxx: Ensure power_supply_changed() is called on current sign changes (git-fixes).
- power: supply: bq27xxx: Fix I2C IRQ race on remove (git-fixes).
- power: supply: bq27xxx: Fix bq27xxx_battery_update() race condition (git-fixes).
- power: supply: bq27xxx: Fix poll_interval handling and races on remove (git-fixes).
- power: supply: bq27xxx: Move bq27xxx_battery_update() down (git-fixes).
- power: supply: bq27xxx: Use mod_delayed_work() instead of cancel() + schedule() (git-fixes).
- power: supply: bq27xxx: expose battery data when CI=1 (git-fixes).
- power: supply: cros_usbpd: reclassify 'default case!' as debug (git-fixes).
- power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition (git-fixes).
- power: supply: generic-adc-battery: fix unit scaling (git-fixes).
- power: supply: leds: Fix blink to LED on transition (git-fixes).
- power: supply: sbs-charger: Fix INHIBITED bit for Status reg (git-fixes).
- power: supply: sc27xx: Fix external_power_changed race (git-fixes).
- powercap: fix possible name leak in powercap_register_zone() (git-fixes).
- powercap: intel_rapl: add support for Emerald Rapids (PED-4398).
- powerpc/64: Always build with 128-bit long double (bsc#1194869).
- powerpc/64e: Fix amdgpu build on Book3E w/o AltiVec (bsc#1194869).
- powerpc/64s/interrupt: Fix interrupt exit race with security mitigation switch (bsc#1194869).
- powerpc/64s/radix: Fix RWX mapping with relocated kernel (bsc#1194869).
- powerpc/64s/radix: Fix crash with unaligned relocated kernel (bsc#1194869).
- powerpc/64s/radix: Fix exit lazy tlb mm switch with irqs enabled (bsc#1194869).
- powerpc/64s/radix: Fix soft dirty tracking (bsc#1065729).
- powerpc/64s: Fix local irq disable when PMIs are disabled (bsc#1195655 ltc#1195655 git-fixes).
- powerpc/64s: Make POWER10 and later use pause_short in cpu_relax loops (bsc#1209367 ltc#195662).
- powerpc/btext: add missing of_node_put (bsc#1065729).
- powerpc/eeh: Set channel state after notifying the drivers (bsc#1208784 ltc#201612).
- powerpc/hv-gpci: Fix hv_gpci event list (bsc#1207935).
- powerpc/hv-gpci: Fix hv_gpci event list (git fixes).
- powerpc/ioda/iommu/debugfs: Generate unique debugfs entries (bsc#1194869).
- powerpc/iommu: Add missing of_node_put in iommu_init_early_dart (bsc#1194869).
- powerpc/iommu: DMA address offset is incorrectly calculated with 2MB TCEs (jsc#SLE-19556 git-fixes).
- powerpc/iommu: Limit number of TCEs to 512 for H_STUFF_TCE hcall (bsc#1194869 bsc#1212701).
- powerpc/iommu: fix memory leak with using debugfs_lookup() (bsc#1194869).
- powerpc/kcsan: Exclude udelay to prevent recursive instrumentation (bsc#1194869).
- powerpc/kexec_file: Count hot-pluggable memory in FDT estimate (bsc#1194869).
- powerpc/kexec_file: Fix division by zero in extra size estimation (bsc#1194869).
- powerpc/kexec_file: fix implicit decl error (bsc#1194869).
- powerpc/mm: Fix false detection of read faults (bsc#1208864).
- powerpc/papr_scm: Update the NUMA distance table for the target node (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).
- powerpc/perf/hv-24x7: add missing RTAS retry status handling (git fixes).
- powerpc/powernv/ioda: Skip unallocated resources when mapping to PE (bsc#1065729).
- powerpc/powernv: fix missing of_node_put in uv_init() (bsc#1194869).
- powerpc/pseries/lpar: add missing RTAS retry status handling (bsc#1109158 ltc#169177 git-fixes).
- powerpc/pseries/lparcfg: add missing RTAS retry status handling (bsc#1065729).
- powerpc/pseries/vas: Ignore VAS update for DLPAR if copy/paste is not enabled (bsc#1210216 ltc#202189).
- powerpc/pseries: Consolidate different NUMA distance update code paths (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).
- powerpc/purgatory: remove PGO flags (bsc#1194869).
- powerpc/rtas: ensure 4KB alignment for rtas_data_buf (bsc#1065729).
- powerpc/rtas: use memmove for potentially overlapping buffer copy (bsc#1065729).
- powerpc/set_memory: Avoid spinlock recursion in change_page_attr() (bsc#1194869).
- powerpc/vmlinux.lds: Add an explicit symbol for the SRWX boundary (bsc#1194869).
- powerpc/vmlinux.lds: Define RUNTIME_DISCARD_EXIT (bsc#1194869).
- powerpc/vmlinux.lds: Do not discard .comment (bsc#1194869).
- powerpc/vmlinux.lds: Do not discard .rela* for relocatable builds (bsc#1194869).
- powerpc/vmlinux.lds: Ensure STRICT_ALIGN_SIZE is at least page aligned (bsc#1194869).
- powerpc/xmon: Fix -Wswitch-unreachable warning in bpt_cmds (bsc#1194869).
- powerpc: Do not try to copy PPR for task with NULL pt_regs (bsc#1065729).
- powerpc: Redefine HMT_xxx macros as empty on PPC32 (bsc#1209367 ltc#195662).
- powerpc: Remove linker flag from KBUILD_AFLAGS (bsc#1194869).
- powerpc: add ISA v3.0 / v3.1 wait opcode macro (bsc#1209367 ltc#195662).
- powerpc: declare unmodified attribute_group usages const (bsc#1207935).
- powerpc: declare unmodified attribute_group usages const (git-fixes).
- powerpc: move __end_rodata to cover arch read-only sections (bsc#1194869).
- printf: fix errname.c list (git-fixes).
- prlimit: do_prlimit needs to have a speculation check (bsc#1209256).
- pstore: Revert pmsg_lock back to a normal mutex (git-fixes).
- purgatory: fix disabling debug info (git-fixes).
- pwm: cros-ec: Explicitly set .polarity in .get_state() (git-fixes).
- pwm: meson: Fix axg ao mux parents (git-fixes).
- pwm: meson: Fix g12a ao clk81 name (git-fixes).
- pwm: sprd: Explicitly set .polarity in .get_state() (git-fixes).
- pwm: stm32-lp: fix the check on arr and cmp registers update (git-fixes).
- qed/qed_dev: guard against a possible division by zero (jsc#SLE-19001).
- qed/qed_mng_tlv: correctly zero out -&gt;min instead of -&gt;hour (jsc#SLE-19001).
- qed/qed_sriov: guard against NULL derefs from qed_iov_get_vf_info (jsc#SLE-19001).
- qed/qede: Fix scheduling while atomic (git-fixes).
- qed: allow sleep in qed_mcp_trace_dump() (jsc#SLE-19001).
- qede: avoid uninitialized entries in coal_entry array (bsc#1205846).
- qede: execute xdp_do_flush() before napi_complete_done() (jsc#SLE-19001).
- qede: fix interrupt coalescing configuration (bsc#1205846).
- quota: Check next/prev free block number after reading from quota file (bsc#1206640).
- quota: Prevent memory allocation recursion while holding dq_lock (bsc#1207639).
- r8152: add vendor/device ID pair for Microsoft Devkit (git-fixes).
- r8152: add vendor/device ID pair for Microsoft Devkit (git-fixes).
- r8152: fix flow control issue of RTL8156A (git-fixes).
- r8152: fix the poor throughput for 2.5G devices (git-fixes).
- r8152: move setting r8153b_rx_agg_chg_indicate() (git-fixes).
- r8169: fix RTL8168H and RTL8107E rx crc error (git-fixes).
- r8169: move rtl_wol_enable_rx() and rtl_prepare_power_down() (git-fixes).
- rcu: Fix missing TICK_DEP_MASK_RCU_EXP dependency check (git-fixes).
- rcu: Fix rcu_torture_read ftrace event (git-fixes).
- rcu: Tighten rcu_advance_cbs_nowake() checks (bsc#1209159).
- rdma/bnxt_re: Fix a possible memory leak (git-fixes)
- rdma/bnxt_re: Fix return value of bnxt_re_process_raw_qp_pkt_rx (git-fixes)
- rdma/bnxt_re: Fix the page_size used during the MR creation (git-fixes)
- rdma/cm: Trace icm_send_rej event before the cm state is reset (git-fixes)
- rdma/cma: Allow UD qp_type to join multicast only (git-fixes)
- rdma/core: Fix GID entry ref leak when create_ah fails (git-fixes)
- rdma/core: Fix ib block iterator counter overflow (bsc#1207878).
- rdma/core: Fix ib block iterator counter overflow (git-fixes)
- rdma/core: Fix multiple -Warray-bounds warnings (git-fixes)
- rdma/core: Refactor rdma_bind_addr (bsc#1210629 CVE-2023-2176)
- rdma/cxgb4: Fix potential null-ptr-deref in pass_establish() (git-fixes)
- rdma/cxgb4: add null-ptr-check after ip_dev_find() (git-fixes)
- rdma/cxgb4: remove unnecessary NULL check in __c4iw_poll_cq_one() (git-fixes)
- rdma/efa: Fix unsupported page sizes in device (git-fixes)
- rdma/hns: Fix base address table allocation (git-fixes)
- rdma/hns: Fix timeout attr in query qp for HIP08 (git-fixes)
- rdma/hns: Modify the value of long message loopback slice (git-fixes)
- rdma/irdma: Add SW mechanism to generate completions on error (jsc#SLE-18383).
- rdma/irdma: Add ipv4 check to irdma_find_listener() (git-fixes)
- rdma/irdma: Cap MSIX used to online CPUs + 1 (git-fixes)
- rdma/irdma: Do not generate SW completions for NOPs (git-fixes)
- rdma/irdma: Do not generate SW completions for NOPs (jsc#SLE-18383).
- rdma/irdma: Fix Local Invalidate fencing (git-fixes)
- rdma/irdma: Fix RQ completion opcode (jsc#SLE-18383).
- rdma/irdma: Fix drain SQ hang with no completion (jsc#SLE-18383).
- rdma/irdma: Fix inline for multiple SGE's (jsc#SLE-18383).
- rdma/irdma: Fix memory leak of PBLE objects (git-fixes)
- rdma/irdma: Fix potential NULL-ptr-dereference (git-fixes)
- rdma/irdma: Increase iWARP CM default rexmit count (git-fixes)
- rdma/irdma: Prevent QP use after free (git-fixes)
- rdma/irdma: Remove enum irdma_status_code (jsc#SLE-18383).
- rdma/irdma: Remove excess error variables (jsc#SLE-18383).
- rdma/mana: Remove redefinition of basic u64 type (bsc#1210741 jsc#PED-4022).
- rdma/mana: hide new rdma_driver_ids (bsc#1210741 jsc#PED-4022).
- rdma/mana_ib: Add a driver for Microsoft Azure Network Adapter (bsc#1210741 jsc#PED-4022).
- rdma/mana_ib: Fix a bug when the PF indicates more entries for registering memory on first packet (bsc#1210741 jsc#PED-4022).
- rdma/mana_ib: Prevent array underflow in mana_ib_create_qp_raw() (bsc#1210741 jsc#PED-4022).
- rdma/mlx4: Prevent shift wrapping in set_user_sq_size() (jsc#SLE-19255).
- rdma/mlx5: Fix flow counter query via DEVX (git-fixes)
- rdma/mlx5: Fix mlx5_ib_get_hw_stats when used for device (git-fixes)
- rdma/mlx5: Fix validation of max_rd_atomic caps for DC (git-fixes)
- rdma/mlx5: Rely on RoCE fw cap instead of devlink when setting profile (jsc#SLE-19253).
- rdma/mlx5: Use correct device num_ports when modify DC (git-fixes)
- rdma/mlx5: Use rdma_umem_for_each_dma_block() (git-fixes)
- rdma/rdmavt: Delete unnecessary NULL check (git-fixes)
- rdma/rtrs-clt: Replace list_next_or_null_rr_rcu with an inline function (git-fixes)
- rdma/rtrs-srv: Pass the correct number of entries for dma mapped SGL (git-fixes)
- rdma/rxe: Fix inaccurate constants in rxe_type_info (git-fixes)
- rdma/rxe: Fix missing memory barriers in rxe_queue.h (git-fixes)
- rdma/rxe: Fix mr-&gt;map double free (git-fixes)
- rdma/rxe: Fix oops with zero length reads (git-fixes)
- rdma/rxe: Fix the error 'trying to register non-static key in rxe_cleanup_task' (git-fixes)
- rdma/rxe: Make responder handle RDMA Read failures (git-fixes)
- rdma/rxe: Prevent faulty rkey generation (git-fixes)
- rdma/rxe: Remove tasklet call from rxe_cq.c (git-fixes)
- rdma/siw: Fix potential page_array out of range access (git-fixes)
- rdma/siw: Fix user page pinning accounting (git-fixes)
- rdma/siw: Remove namespace check from siw_netdev_event() (git-fixes)
- rdma/srp: Move large values to a new enum for gcc13 (git-fixes)
- rdma/srpt: Add a check for valid 'mad_agent' pointer (git-fixes)
- rdma/usnic: use iommu_map_atomic() under spin_lock() (git-fixes)
- rdma: Handle the return code from dma_resv_wait_timeout() properly (git-fixes)
- rds: rds_rm_zerocopy_callback() correct order for list_add_tail() (CVE-2023-1078 bsc#1208601).
- ref_tracker: use __GFP_NOFAIL more carefully (git-fixes).
- regmap: Account for register length when chunking (git-fixes).
- regmap: cache: Return error in cache sync operations for REGCACHE_NONE (git-fixes).
- regmap: spi-avmm: Fix regmap_bus max_raw_write (git-fixes).
- regulator: Fix error checking for debugfs_create_dir (git-fixes).
- regulator: Flag uncontrollable regulators as always_on (git-fixes).
- regulator: Handle deferred clk (git-fixes).
- regulator: core: Avoid lockdep reports when resolving supplies (git-fixes).
- regulator: core: Consistently set mutex_owner when using ww_mutex_lock_slow() (git-fixes).
- regulator: core: Fix off-on-delay-us for always-on/boot-on regulators (git-fixes).
- regulator: core: Shorten off-on-delay-us for always-on/boot-on by time since booted (git-fixes).
- regulator: core: Use ktime_get_boottime() to determine how long a regulator was off (git-fixes).
- regulator: fan53555: Explicitly include bits header (git-fixes).
- regulator: fan53555: Fix wrong TCS_SLEW_MASK (git-fixes).
- regulator: max77802: Bounds check regulator id against opmode (git-fixes).
- regulator: mt6359: add read check for PMIC MT6359 (git-fixes).
- regulator: pca9450: Fix BUCK2 enable_mask (git-fixes).
- regulator: pca9450: Fix LDO3OUT and LDO4OUT MASK (git-fixes).
- regulator: s5m8767: Bounds check id indexing into arrays (git-fixes).
- regulator: stm32-pwr: fix of_iomap leak (git-fixes).
- reiserfs: Add missing calls to reiserfs_security_free() (git-fixes).
- reiserfs: Add security prefix to xattr name in reiserfs_security_write() (git-fixes).
- remoteproc/mtk_scp: Move clk ops outside send_lock (git-fixes).
- remoteproc: Harden rproc_handle_vdev() against integer overflow (git-fixes).
- remoteproc: imx_rproc: Call of_node_put() on iteration error (git-fixes).
- remoteproc: qcom_q6v5_mss: Use a carveout to authenticate modem headers (git-fixes).
- remoteproc: st: Call of_node_put() on iteration error (git-fixes).
- remoteproc: stm32: Call of_node_put() on iteration error (git-fixes).
- remoteproc: stm32_rproc: Add mutex protection for workqueue (git-fixes).
- remove 'PCI: hv: Use async probing to reduce boot time' (bsc#1207185).
- rethook: Reject getting a rethook if RCU is not watching (git-fixes).
- rethook: fix a potential memleak in rethook_alloc() (git-fixes).
- rethook: use preempt_{disable, enable}_notrace in rethook_trampoline_handler (git-fixes).
- revert 'squashfs: harden sanity check in squashfs_read_xattr_id_table' (git-fixes).
- ring-buffer: Ensure proper resetting of atomic variables in ring_buffer_reset_online_cpus (git-fixes).
- ring-buffer: Fix kernel-doc (git-fixes).
- ring-buffer: Fix race while reader and writer are on the same page (git-fixes).
- ring-buffer: Handle race between rb_move_tail and rb_check_pages (git-fixes).
- ring-buffer: Sync IRQ works before buffer destruction (git-fixes).
- ring-buffer: remove obsolete comment for free_buffer_page() (git-fixes).
- rpm/check-for-config-changes: add TOOLCHAIN_NEEDS_* to IGNORED_CONFIGS_RE This new form was added in commit e89c2e815e76 ('riscv: Handle zicsr/zifencei issues between clang and binutils').
- rpm/constraints.in: Increase disk size constraint for riscv64 to 52GB
- rpm/group-source-files.pl: Fix output difference when / is in location While previous attempt to fix group-source-files.pl in 6d651362c38 'rpm/group-source-files.pl: Deal with {pre,post}fixed / in location' breaks the infinite loop, it does not properly address the issue. Having prefixed and/or postfixed forward slash still result in different output. This commit changes the script to use the Perl core module File::Spec for proper path manipulation to give consistent output.
- rpm/kernel-binary.spec.in: Fix compatibility wth newer rpm
- rpm/kernel-docs.spec.in: pass PYTHON=python3 to fix build error (bsc#1160435)
- rpm/kernel-obs-build.spec.in: Remove SLE11 cruft
- rpm/kernel-source.spec.in: Add patches.drm for moved DRM patches
- rtc: allow rtc_read_alarm without read_alarm callback (git-fixes).
- rtc: meson-vrtc: Use ktime_get_real_ts64() to get the current time (git-fixes).
- rtc: omap: include header for omap_rtc_power_off_program prototype (git-fixes).
- rtc: pm8xxx: fix set-alarm race (git-fixes).
- rtc: sun6i: Always export the internal oscillator (git-fixes).
- rtmutex: Ensure that the top waiter is always woken up (git-fixes).
- s390/ap: fix memory leak in ap_init_qci_info() (git-fixes).
- s390/boot: simplify and fix kernel memory layout setup (bsc#1209600).
- s390/ctcm: Fix return type of ctc{mp,}m_tx() (git-fixes bsc#1211686).
- s390/dasd: Fix potential memleak in dasd_eckd_init() (git-fixes).
- s390/dasd: Use correct lock while counting channel queue length (git-fixes bsc#1212592).
- s390/dasd: fix hanging blockdevice after request requeue (git-fixes bsc#1211687).
- s390/dasd: fix no record found for raw_track_access (bsc#1207574).
- s390/extmem: return correct segment type in __segment_load() (bsc#1210450 git-fixes).
- s390/kprobes: fix current_kprobe never cleared after kprobes reenter (git-fixes bsc#1211688).
- s390/kprobes: fix irq mask clobbering on kprobe reenter from post_handler (git-fixes bsc#1211689).
- s390/lcs: Fix return type of lcs_start_xmit() (git-fixes bsc#1211690).
- s390/mem_detect: fix detect_memory() error handling (git-fixes bsc#1211691).
- s390/netiucv: Fix return type of netiucv_tx() (git-fixes bsc#1211692).
- s390/pkey: zeroize key blobs (git-fixes bsc#1212619).
- s390/qdio: fix do_sqbs() inline assembly constraint (git-fixes bsc#1211693).
- s390/qeth: fix use-after-free in hsci (bsc#1210449 git-fixes).
- s390/uaccess: add missing earlyclobber annotations to __clear_user() (bsc#1209856 git-fixes).
- s390/vdso: remove -nostdlib compiler flag (git-fixes bsc#1211714).
- s390/vfio-ap: fix an error handling path in vfio_ap_mdev_probe_queue() (git-fixes).
- s390/vfio-ap: fix memory leak in vfio_ap device driver (git-fixes).
- sched, cpuset: Fix dl_cpu_busy() panic due to empty (git-fixes)
- sched/core: Avoid obvious double update_rq_clock warning (git-fixes)
- sched/core: Fix arch_scale_freq_tick() on tickless systems (git-fixes)
- sched/core: Introduce sched_asym_cpucap_active() (git-fixes)
- sched/deadline: Merge dl_task_can_attach() and dl_cpu_busy() (git-fixes)
- sched/fair: Fix imbalance overflow (bsc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Limit sched slice duration (bsc#1189999 (Scheduler functional and performance backports)).
- sched/fair: Move calculate of avg_load to a better location (bsc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Sanitize vruntime of entity being migrated (bsc#1203325).
- sched/fair: sanitize vruntime of entity being placed (bsc#1203325).
- sched/numa: Stop an exhastive search if an idle core is found (bsc#1189999 (Scheduler functional and performance backports)).
- sched/psi: Fix use-after-free in ep_remove_wait_queue() (bsc#1209799).
- sched/rt: pick_next_rt_entity(): check list_entry (bsc#1208600 CVE-2023-1077)
- sched/tracing: Report TASK_RTLOCK_WAIT tasks as (git-fixes)
- sched/uclamp: Make asym_fits_capacity() use util_fits_cpu() (git-fixes)
- sched: Avoid double preemption in __cond_resched_*lock*() (git-fixes)
- sched_getaffinity: do not assume 'cpumask_size()' is fully initialized (bsc#1155798 (CPU scheduler functional and performance backports)).
- scsi: Revert 'scsi: core: map PQ=1, PDT=other values to SCSI_SCAN_TARGET_PRESENT' (git-fixes).
- scsi: aacraid: Allocate cmd_priv with scsicmd (git-fixes).
- scsi: aic94xx: Add missing check for dma_map_single() (git-fixes).
- scsi: core: Add BLIST_NO_VPD_SIZE for some VDASD (git-fixes bsc#1203039) (renamed now that it's upstgream)
- scsi: core: Add BLIST_SKIP_VPD_PAGES for SKhynix H28U74301AMR (git-fixes).
- scsi: core: Decrease scsi_device's iorequest_cnt if dispatch failed (git-fixes).
- scsi: core: Fix a procfs host directory removal regression (git-fixes).
- scsi: core: Fix a source code comment (git-fixes).
- scsi: core: Improve scsi_vpd_inquiry() checks (git-fixes).
- scsi: core: Remove the /proc/scsi/${proc_name} directory earlier (git-fixes).
- scsi: hisi_sas: Check devm_add_action() return value (git-fixes).
- scsi: hisi_sas: Handle NCQ error when IPTT is valid (git-fixes).
- scsi: hisi_sas: Revert change to limit max hw sectors for v3 HW (bsc#1210230).
- scsi: hisi_sas: Set a port invalid only if there are no devices attached when refreshing port id (git-fixes).
- scsi: hpsa: Fix allocation size for scsi_host_alloc() (git-fixes).
- scsi: ipr: Work around fortify-string warning (git-fixes).
- scsi: iscsi_tcp: Check that sock is valid before iscsi_set_param() (git-fixes).
- scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress (git-fixes).
- scsi: iscsi_tcp: Fix UAF during logout when accessing the shost ipaddress (git-fixes).
- scsi: kABI workaround for fc_host_fpin_rcv (git-fixes).
- scsi: kABI workaround for fc_host_fpin_rcv (git-fixes).
- scsi: libsas: Add sas_ata_device_link_abort() (git-fixes).
- scsi: libsas: Grab the ATA port lock in sas_ata_device_link_abort() (git-fixes).
- scsi: libsas: Remove useless dev_list delete in sas_ex_discover_end_dev() (git-fixes).
- scsi: lpfc: Add new RCQE status for handling DMA failures (bsc#1211847).
- scsi: lpfc: Avoid usage of list iterator variable after loop (git-fixes).
- scsi: lpfc: Check kzalloc() in lpfc_sli4_cgn_params_read() (git-fixes).
- scsi: lpfc: Copyright updates for 14.2.0.10 patches (bsc#1208607).
- scsi: lpfc: Copyright updates for 14.2.0.10 patches (bsc#1208607).
- scsi: lpfc: Copyright updates for 14.2.0.11 patches (bsc#1210943).
- scsi: lpfc: Copyright updates for 14.2.0.11 patches (bsc#1210943).
- scsi: lpfc: Correct used_rpi count when devloss tmo fires with no recovery (bsc#1210943).
- scsi: lpfc: Correct used_rpi count when devloss tmo fires with no recovery (bsc#1210943).
- scsi: lpfc: Defer issuing new PLOGI if received RSCN before completing REG_LOGIN (bsc#1210943).
- scsi: lpfc: Defer issuing new PLOGI if received RSCN before completing REG_LOGIN (bsc#1210943).
- scsi: lpfc: Drop redundant pci_enable_pcie_error_reporting() (bsc#1210943).
- scsi: lpfc: Drop redundant pci_enable_pcie_error_reporting() (bsc#1210943).
- scsi: lpfc: Exit PRLI completion handling early if ndlp not in PRLI_ISSUE state (bsc#1208607).
- scsi: lpfc: Exit PRLI completion handling early if ndlp not in PRLI_ISSUE state (bsc#1208607).
- scsi: lpfc: Fix double free in lpfc_cmpl_els_logo_acc() caused by lpfc_nlp_not_used() (bsc#1211847).
- scsi: lpfc: Fix double word in comments (bsc#1210943).
- scsi: lpfc: Fix double word in comments (bsc#1210943).
- scsi: lpfc: Fix ioremap issues in lpfc_sli4_pci_mem_setup() (bsc#1210943).
- scsi: lpfc: Fix ioremap issues in lpfc_sli4_pci_mem_setup() (bsc#1210943).
- scsi: lpfc: Fix lockdep warning for rx_monitor lock when unloading driver (bsc#1210943).
- scsi: lpfc: Fix lockdep warning for rx_monitor lock when unloading driver (bsc#1210943).
- scsi: lpfc: Fix space indentation in lpfc_xcvr_data_show() (bsc#1208607).
- scsi: lpfc: Fix space indentation in lpfc_xcvr_data_show() (bsc#1208607).
- scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write (bsc#1208607).
- scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write (bsc#1208607).
- scsi: lpfc: Fix verbose logging for SCSI commands issued to SES devices (bsc#1211847).
- scsi: lpfc: Introduce new attention types for lpfc_sli4_async_fc_evt() handler (bsc#1208607).
- scsi: lpfc: Introduce new attention types for lpfc_sli4_async_fc_evt() handler (bsc#1208607).
- scsi: lpfc: Match lock ordering of lpfc_cmd-&gt;buf_lock and hbalock for abort paths (bsc#1211847).
- scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow (bsc#1210943).
- scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow (bsc#1210943).
- scsi: lpfc: Record LOGO state with discovery engine even if aborted (bsc#1210943).
- scsi: lpfc: Record LOGO state with discovery engine even if aborted (bsc#1210943).
- scsi: lpfc: Reinitialize internal VMID data structures after FLOGI completion (bsc#1208607).
- scsi: lpfc: Reinitialize internal VMID data structures after FLOGI completion (bsc#1208607).
- scsi: lpfc: Remove duplicate ndlp kref decrement in lpfc_cleanup_rpis() (bsc#1208607 bsc#1208534).
- scsi: lpfc: Remove duplicate ndlp kref decrement in lpfc_cleanup_rpis() (bsc#1208607 bsc#1208534).
- scsi: lpfc: Remove redundant clean up code in disable_vport() (bsc#1208607).
- scsi: lpfc: Remove redundant clean up code in disable_vport() (bsc#1208607).
- scsi: lpfc: Reorder freeing of various DMA buffers and their list removal (bsc#1210943).
- scsi: lpfc: Reorder freeing of various DMA buffers and their list removal (bsc#1210943).
- scsi: lpfc: Replace blk_irq_poll intr handler with threaded IRQ (bsc#1211847).
- scsi: lpfc: Replace outdated strncpy() with strscpy() (bsc#1208607).
- scsi: lpfc: Replace outdated strncpy() with strscpy() (bsc#1208607).
- scsi: lpfc: Resolve miscellaneous variable set but not used compiler warnings (bsc#1208607).
- scsi: lpfc: Resolve miscellaneous variable set but not used compiler warnings (bsc#1208607).
- scsi: lpfc: Revise lpfc_error_lost_link() reason code evaluation logic (bsc#1210943).
- scsi: lpfc: Revise lpfc_error_lost_link() reason code evaluation logic (bsc#1210943).
- scsi: lpfc: Set max DMA segment size to HBA supported SGE length (bsc#1208607).
- scsi: lpfc: Set max DMA segment size to HBA supported SGE length (bsc#1208607).
- scsi: lpfc: Silence an incorrect device output (bsc#1210943).
- scsi: lpfc: Silence an incorrect device output (bsc#1210943).
- scsi: lpfc: Skip waiting for register ready bits when in unrecoverable state (bsc#1210943).
- scsi: lpfc: Skip waiting for register ready bits when in unrecoverable state (bsc#1210943).
- scsi: lpfc: Update congestion warning notification period (bsc#1211847).
- scsi: lpfc: Update lpfc version to 14.2.0.10 (bsc#1208607).
- scsi: lpfc: Update lpfc version to 14.2.0.10 (bsc#1208607).
- scsi: lpfc: Update lpfc version to 14.2.0.11 (bsc#1210943).
- scsi: lpfc: Update lpfc version to 14.2.0.11 (bsc#1210943).
- scsi: lpfc: Update lpfc version to 14.2.0.12 (bsc#1211847).
- scsi: megaraid: Fix mega_cmd_done() CMDID_INT_CMDS (git-fixes).
- scsi: megaraid_sas: Fix crash after a double completion (git-fixes).
- scsi: megaraid_sas: Fix fw_crash_buffer_show() (git-fixes).
- scsi: megaraid_sas: Update max supported LD IDs to 240 (git-fixes).
- scsi: megaraid_sas: Update max supported LD IDs to 240 (git-fixes).
- scsi: mpi3mr: Fix issues in mpi3mr_get_all_tgt_info() (git-fixes).
- scsi: mpi3mr: Fix missing mrioc-&gt;evtack_cmds initialization (git-fixes).
- scsi: mpi3mr: Fix throttle_groups memory leak (git-fixes).
- scsi: mpi3mr: Remove unnecessary memcpy() to alltgt_info-&gt;dmi (git-fixes).
- scsi: mpi3mr: Suppress command reply debug prints (bsc#1211820).
- scsi: mpt3sas: Do not print sense pool info twice (git-fixes).
- scsi: mpt3sas: Fix NULL pointer access in mpt3sas_transport_port_add() (git-fixes).
- scsi: mpt3sas: Fix a memory leak (git-fixes).
- scsi: mpt3sas: Remove scsi_dma_map() error messages (git-fixes).
- scsi: qedi: Fix use after free bug in qedi_remove() (git-fixes).
- scsi: qla2xxx: Add option to disable FC2 Target support (bsc#1198438 bsc#1206103).
- scsi: qla2xxx: Add option to disable FC2 Target support (bsc#1198438 bsc#1206103).
- scsi: qla2xxx: Check if port is online before sending ELS (bsc#1208570).
- scsi: qla2xxx: Check if port is online before sending ELS (bsc#1208570).
- scsi: qla2xxx: Drop redundant pci_enable_pcie_error_reporting() (bsc#1211960).
- scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests (bsc#1208570).
- scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests (bsc#1208570).
- scsi: qla2xxx: Fix IOCB resource check warning (bsc#1208570).
- scsi: qla2xxx: Fix IOCB resource check warning (bsc#1208570).
- scsi: qla2xxx: Fix erroneous link down (bsc#1208570).
- scsi: qla2xxx: Fix erroneous link down (bsc#1208570).
- scsi: qla2xxx: Fix exchange oversubscription (bsc#1208570).
- scsi: qla2xxx: Fix exchange oversubscription (bsc#1208570).
- scsi: qla2xxx: Fix exchange oversubscription for management commands (bsc#1208570).
- scsi: qla2xxx: Fix exchange oversubscription for management commands (bsc#1208570).
- scsi: qla2xxx: Fix hang in task management (bsc#1211960).
- scsi: qla2xxx: Fix link failure in NPIV environment (bsc#1208570).
- scsi: qla2xxx: Fix link failure in NPIV environment (bsc#1208570).
- scsi: qla2xxx: Fix mem access after free (bsc#1211960).
- scsi: qla2xxx: Fix memory leak in qla2x00_probe_one() (git-fixes).
- scsi: qla2xxx: Fix printk() format string (bsc#1208570).
- scsi: qla2xxx: Fix printk() format string (bsc#1208570).
- scsi: qla2xxx: Fix stalled login (bsc#1208570).
- scsi: qla2xxx: Fix stalled login (bsc#1208570).
- scsi: qla2xxx: Fix task management cmd fail due to unavailable resource (bsc#1211960).
- scsi: qla2xxx: Fix task management cmd failure (bsc#1211960).
- scsi: qla2xxx: Make qla_trim_buf() and __qla_adjust_buf() static (bsc#1208570).
- scsi: qla2xxx: Make qla_trim_buf() and __qla_adjust_buf() static (bsc#1208570).
- scsi: qla2xxx: Multi-que support for TMF (bsc#1211960).
- scsi: qla2xxx: Perform lockless command completion in abort path (git-fixes).
- scsi: qla2xxx: Refer directly to the qla2xxx_driver_template (bsc#1211960).
- scsi: qla2xxx: Relocate/rename vp map (bsc#1208570).
- scsi: qla2xxx: Relocate/rename vp map (bsc#1208570).
- scsi: qla2xxx: Remove dead code (GNN ID) (bsc#1208570).
- scsi: qla2xxx: Remove dead code (GNN ID) (bsc#1208570).
- scsi: qla2xxx: Remove dead code (GPNID) (bsc#1208570).
- scsi: qla2xxx: Remove dead code (GPNID) (bsc#1208570).
- scsi: qla2xxx: Remove dead code (bsc#1208570).
- scsi: qla2xxx: Remove dead code (bsc#1208570).
- scsi: qla2xxx: Remove default fabric ops callouts (bsc#1211960).
- scsi: qla2xxx: Remove increment of interface err cnt (bsc#1208570).
- scsi: qla2xxx: Remove increment of interface err cnt (bsc#1208570).
- scsi: qla2xxx: Remove the unused variable wwn (bsc#1208570).
- scsi: qla2xxx: Remove the unused variable wwn (bsc#1208570).
- scsi: qla2xxx: Remove unintended flag clearing (bsc#1208570).
- scsi: qla2xxx: Remove unintended flag clearing (bsc#1208570).
- scsi: qla2xxx: Replace all non-returning strlcpy() with strscpy() (bsc#1211960).
- scsi: qla2xxx: Select qpair depending on which CPU post_cmd() gets called (bsc#1208570).
- scsi: qla2xxx: Select qpair depending on which CPU post_cmd() gets called (bsc#1208570).
- scsi: qla2xxx: Simplify if condition evaluation (bsc#1208570).
- scsi: qla2xxx: Simplify if condition evaluation (bsc#1208570).
- scsi: qla2xxx: Synchronize the IOCB count to be in order (bsc#1209292 bsc#1209684 bsc#1209556).
- scsi: qla2xxx: Update version to 10.02.08.100-k (bsc#1208570).
- scsi: qla2xxx: Update version to 10.02.08.100-k (bsc#1208570).
- scsi: qla2xxx: Update version to 10.02.08.200-k (bsc#1208570).
- scsi: qla2xxx: Update version to 10.02.08.200-k (bsc#1208570).
- scsi: qla2xxx: Update version to 10.02.08.300-k (bsc#1211960).
- scsi: qla2xxx: Use a variable for repeated mem_size computation (bsc#1208570).
- scsi: qla2xxx: Use a variable for repeated mem_size computation (bsc#1208570).
- scsi: qla2xxx: Wait for io return on terminate rport (bsc#1211960).
- scsi: qla2xxx: edif: Fix clang warning (bsc#1208570).
- scsi: qla2xxx: edif: Fix clang warning (bsc#1208570).
- scsi: qla2xxx: edif: Fix performance dip due to lock contention (bsc#1208570).
- scsi: qla2xxx: edif: Fix performance dip due to lock contention (bsc#1208570).
- scsi: qla2xxx: edif: Fix stall session after app start (bsc#1208570).
- scsi: qla2xxx: edif: Fix stall session after app start (bsc#1208570).
- scsi: qla2xxx: edif: Reduce memory usage during low I/O (bsc#1208570).
- scsi: qla2xxx: edif: Reduce memory usage during low I/O (bsc#1208570).
- scsi: scsi_dh_alua: Fix memleak for 'qdata' in alua_activate() (git-fixes).
- scsi: scsi_ioctl: Validate command size (git-fixes).
- scsi: scsi_transport_fc: Add an additional flag to fc_host_fpin_rcv() (bsc#1210943).
- scsi: scsi_transport_fc: Add an additional flag to fc_host_fpin_rcv() (bsc#1210943).
- scsi: sd: Fix wrong zone_write_granularity value during revalidate (git-fixes).
- scsi: sd: Fix wrong zone_write_granularity value during revalidate (git-fixes).
- scsi: sd: Revert 'Rework asynchronous resume support' (bsc#1209092).
- scsi: ses: Do not attach if enclosure has no components (git-fixes).
- scsi: ses: Fix possible addl_desc_ptr out-of-bounds accesses (git-fixes).
- scsi: ses: Fix possible desc_ptr out-of-bounds accesses (git-fixes).
- scsi: ses: Fix slab-out-of-bounds in ses_enclosure_data_process() (git-fixes).
- scsi: ses: Fix slab-out-of-bounds in ses_intf_remove() (git-fixes).
- scsi: ses: Handle enclosure with just a primary component gracefully (git-fixes).
- scsi: smartpqi: Add controller cache flush during rmmod (bsc#1207315).
- scsi: smartpqi: Add new controller PCI IDs (bsc#1207315).
- scsi: smartpqi: Change sysfs raid_level attribute to N/A for controllers (bsc#1207315).
- scsi: smartpqi: Change version to 2.1.20-035 (bsc#1207315).
- scsi: smartpqi: Convert to host_tagset (bsc#1207315).
- scsi: smartpqi: Correct device removal for multi-actuator devices (bsc#1207315).
- scsi: smartpqi: Correct max LUN number (bsc#1207315).
- scsi: smartpqi: Initialize feature section info (bsc#1207315).
- scsi: smartpqi: Replace one-element array with flexible-array member (bsc#1207315).
- scsi: snic: Fix memory leak with using debugfs_lookup() (git-fixes).
- scsi: stex: Fix gcc 13 warnings (git-fixes).
- scsi: storvsc: Correct reporting of Hyper-V I/O size limits (git-fixes).
- scsi: storvsc: Do not pass unused PFNs to Hyper-V host (git-fixes).
- scsi: storvsc: Handle BlockSize change in Hyper-V VHD/VHDX file (git-fixes).
- scsi: tracing: Fix compile error in trace_array calls when TRACING is disabled (git-fixes).
- scsi: ufs: Stop using the clock scaling lock in the error handler (git-fixes).
- scsi: ufs: core: Enable link lost interrupt (git-fixes).
- scsi_disk kABI: add back members (bsc#1209092).
- sctp: sctp_sock_filter(): avoid list_entry() on possibly empty list (bsc#1208602, git-fixes).
- sctp: sctp_sock_filter(): avoid list_entry() on possibly empty list (bsc#1208602, git-fixes).
- seccomp: Move copy_seccomp() to no failure path (bsc#1210817).
- sefltests: netdevsim: wait for devlink instance after netns removal (git-fixes).
- selftest/lkdtm: Skip stack-entropy test if lkdtm is not available (git-fixes).
- selftests mount: Fix mount_setattr_test builds failed (git-fixes).
- selftests/ftrace: Add check for ping command for trigger tests (bsc#1204993 ltc#200103).
- selftests/ftrace: Convert tracer tests to use 'requires' to specify program dependency (bsc#1204993 ltc#200103).
- selftests/kselftest/runner/run_one(): allow running non-executable files (git-fixes).
- selftests/powerpc: Account for offline cpus in perf-hwbreak test (bsc#1206232).
- selftests/powerpc: Bump up rlimit for perf-hwbreak test (bsc#1206232).
- selftests/powerpc: Move perror closer to its use (bsc#1206232).
- selftests/ptp: Fix timestamp printf format for PTP_SYS_OFFSET (git-fixes).
- selftests/resctrl: Allow -&gt;setup() to return errors (git-fixes).
- selftests/resctrl: Check for return value after write_schemata() (git-fixes).
- selftests/resctrl: Extend CPU vendor detection (git-fixes).
- selftests/resctrl: Move -&gt;setup() call outside of test specific branches (git-fixes).
- selftests/resctrl: Return NULL if malloc_and_init_memory() did not alloc mem (git-fixes).
- selftests/sgx: Add 'test_encl.elf' to TEST_FILES (git-fixes).
- selftests/vm: remove ARRAY_SIZE define from individual tests (git-fixes).
- selftests: Provide local define of __cpuid_count() (git-fixes).
- selftests: forwarding: lib: quote the sysctl values (git-fixes).
- selftests: mptcp: connect: skip if MPTCP is not supported (git-fixes).
- selftests: mptcp: pm nl: skip if MPTCP is not supported (git-fixes).
- selftests: mptcp: sockopt: skip if MPTCP is not supported (git-fixes).
- selftests: net: udpgso_bench: Fix racing bug between the rx/tx programs (git-fixes).
- selftests: net: udpgso_bench_rx/tx: Stop when wrong CLI args are provided (git-fixes).
- selftests: net: udpgso_bench_rx: Fix 'used uninitialized' compiler warning (git-fixes).
- selftests: net: udpgso_bench_tx: Cater for pending datagrams zerocopy benchmarking (git-fixes).
- selftests: seg6: disable DAD on IPv6 router cfg for srv6_end_dt4_l3vpn_test (git-fixes).
- selftests: sigaltstack: fix -Wuninitialized (git-fixes).
- selftests: srv6: make srv6_end_dt46_l3vpn_test more robust (git-fixes).
- selftests: xsk: Disable IPv6 on VETH1 (git-fixes).
- selftets: seg6: disable rp_filter by default in srv6_end_dt4_l3vpn_test (git-fixes).
- selinux: do not use make's grouped targets feature yet (git-fixes).
- selinux: ensure av_permissions.h is built when needed (git-fixes).
- selinux: fix Makefile dependencies of flask.h (git-fixes).
- serial: 8250: ASPEED_VUART: select REGMAP instead of depending on it (git-fixes).
- serial: 8250: Add missing wakeup event reporting (git-fixes).
- serial: 8250: Reinit port-&gt;pm on port specific driver unbind (git-fixes).
- serial: 8250: SERIAL_8250_ASPEED_VUART should depend on ARCH_ASPEED (git-fixes).
- serial: 8250_bcm7271: Fix arbitration handling (git-fixes).
- serial: 8250_bcm7271: balance clk_enable calls (git-fixes).
- serial: 8250_bcm7271: fix leak in `brcmuart_probe` (git-fixes).
- serial: 8250_dma: Fix DMA Rx rearm race (git-fixes).
- serial: 8250_em: Fix UART port type (git-fixes).
- serial: 8250_exar: Add support for USR298x PCI Modems (git-fixes).
- serial: 8250_exar: derive nr_ports from PCI ID for Acces I/O cards (git-fixes).
- serial: 8250_fsl: fix handle_irq locking (git-fixes).
- serial: 8250_tegra: Fix an error handling path in tegra_uart_probe() (git-fixes).
- serial: Add support for Advantech PCI-1611U card (git-fixes).
- serial: arc_uart: fix of_iomap leak in `arc_serial_probe` (git-fixes).
- serial: exar: Add support for Sealevel 7xxxC serial cards (git-fixes).
- serial: fsl_lpuart: Fix comment typo (git-fixes).
- serial: fsl_lpuart: fix RS485 RTS polariy inverse issue (git-fixes).
- serial: lantiq: add missing interrupt ack (git-fixes).
- serial: qcom-geni: fix console shutdown hang (git-fixes).
- serial: qcom-geni: fix enabling deactivated interrupt (git-fixes).
- serial: sc16is7xx: setup GPIO controller later in probe (git-fixes).
- serial: stm32: re-introduce an irq flag condition in usart_receive_chars (git-fixes).
- serial: tegra: Add missing clk_disable_unprepare() in tegra_uart_hw_init() (git-fixes).
- sfc: Change VF mac via PF as first preference if available (git-fixes).
- sfc: Fix module EEPROM reporting for QSFP modules (git-fixes).
- sfc: Fix use-after-free due to selftest_work (git-fixes).
- sfc: correctly advertise tunneled IPv6 segmentation (git-fixes).
- sfc: disable RXFCS and RXALL features by default (git-fixes).
- sfc: disable RXFCS and RXALL features by default (git-fixes).
- sfc: ef10: do not overwrite offload features at NIC reset (git-fixes).
- sfc: fix TX channel offset when using legacy interrupts (git-fixes).
- sfc: fix considering that all channels have TX queues (git-fixes).
- sfc: fix null pointer dereference in efx_hard_start_xmit (git-fixes).
- sfc: fix wrong tx channel offset with efx_separate_tx_channels (git-fixes).
- sfc: include vport_id in filter spec hash and equal() (git-fixes).
- signal handling: do not use BUG_ON() for debugging (bsc#1210439).
- signal/seccomp: Refactor seccomp signal and coredump generation (git-fixes).
- signal/vm86_32: Properly send SIGSEGV when the vm86 state cannot be saved (git-fixes).
- signal/x86: In emulate_vsyscall force a signal instead of calling do_exit (git-fixes).
- signal: Add SA_IMMUTABLE to ensure forced siganls do not get changed (bsc#1210816).
- signal: Do not always set SA_IMMUTABLE for forced signals (bsc#1210816).
- signal: HANDLER_EXIT should clear SIGNAL_UNKILLABLE (bsc#1210816).
- signal: Implement force_fatal_sig (git-fixes).
- smb3.1.1: add new tree connect ShareFlags (bsc#1193629).
- smb3: Add missing locks to protect deferred close file list (git-fixes).
- smb3: Close all deferred handles of inode in case of handle lease break (bsc#1193629).
- smb3: Close deferred file handles in case of handle lease break (bsc#1193629).
- smb3: Replace smb2pdu 1-element arrays with flex-arrays (bsc#1193629).
- smb3: display debug information better for encryption (bsc#1193629).
- smb3: drop reference to cfile before sending oplock break (bsc#1193629).
- smb3: fix problem remounting a share after shutdown (bsc#1193629).
- smb3: fix unusable share after force unmount failure (bsc#1193629).
- smb3: force unmount was failing to close deferred close files (bsc#1193629).
- smb3: improve parallel reads of large files (bsc#1193629).
- smb3: lower default deferred close timeout to address perf regression (bsc#1193629).
- smb3: make query_on_disk_id open context consistent and move to common code (bsc#1193629).
- smb3: move some common open context structs to smbfs_common (bsc#1193629).
- soc/tegra: cbb: Use correct master_id mask for CBB NOC in Tegra194 (git-fixes).
- soc: ti: pm33xx: Fix refcount leak in am33xx_pm_probe (git-fixes).
- soundwire: cadence: Do not overflow the command FIFOs (git-fixes).
- soundwire: qcom: correct setting ignore bit on v1.5.1 (git-fixes).
- soundwire: qcom: gracefully handle too many ports in DT (git-fixes).
- spi: bcm63xx-hsspi: Endianness fix for ARM based SoC (git-fixes).
- spi: cadence-quadspi: fix suspend-resume implementations (git-fixes).
- spi: dw: Fix wrong FIFO level setting for long xfers (git-fixes).
- spi: dw_bt1: fix MUX_MMIO dependencies (git-fixes).
- spi: fsl-dspi: avoid SCK glitches with continuous transfers (git-fixes).
- spi: fsl-spi: Fix CPM/QE mode Litte Endian (git-fixes).
- spi: qup: Do not skip cleanup in remove's error path (git-fixes).
- spi: qup: Request DMA before enabling clocks (git-fixes).
- spi: spi-imx: fix MX51_ECSPI_* macros when cs &gt; 3 (git-fixes).
- spi: spi-imx: using pm_runtime_resume_and_get instead of pm_runtime_get_sync (git-fixes).
- spi: spidev: remove debug messages that access spidev-&gt;spi without locking (git-fixes).
- spi: synquacer: Fix timeout handling in synquacer_spi_transfer_one() (git-fixes).
- spi: tegra210-quad: Fix combined sequence (bsc#1212584)
- spi: tegra210-quad: Fix iterator outside loop (git-fixes).
- spi: tegra210-quad: Fix validate combined sequence (git-fixes).
- spi: tegra210-quad: Multi-cs support (bsc#1212584)
- squashfs: fix handling and sanity checking of xattr_ids count (git-fixes).
- squashfs: harden sanity check in squashfs_read_xattr_id_table (git-fixes).
- staging: emxx_udc: Add checks for dma_alloc_coherent() (git-fixes).
- staging: iio: resolver: ads1210: fix config mode (git-fixes).
- staging: mt7621-dts: change palmbus address to lower case (git-fixes).
- staging: mt7621-dts: change some node hex addresses to lower case (git-fixes).
- staging: rtl8192e: Fix W_DISABLE# does not work after stop/start (git-fixes).
- staging: rtl8192e: Remove call_usermodehelper starting RadioPower.sh (git-fixes).
- staging: rtl8192e: Remove function ..dm_check_ac_dc_power calling a script (git-fixes).
- staging: rtl8192e: Replace macro RTL_PCI_DEVICE with PCI_DEVICE (git-fixes).
- stat: fix inconsistency between struct stat and struct compat_stat (git-fixes).
- struct ci_hdrc: hide new member at end (git-fixes).
- struct dwc3: mask new member (git-fixes).
- struct uvc_device move flush_status new member to end (git-fixes).
- sunrpc allow for unspecified transport time in rpc_clnt_add_xprt (git-fixes).
- sunrpc: Clean up svc_deferred_class trace events (git-fixes).
- sunrpc: Do not dereference xprt-&gt;snd_task if it's a cookie (git-fixes).
- sunrpc: Do not leak netobj memory when gss_read_proxy_verf() fails (git-fixes).
- sunrpc: Fix a server shutdown leak (git-fixes).
- sunrpc: Fix missing release socket in rpc_sockname() (git-fixes).
- sunrpc: Fix null-ptr-deref when xps sysfs alloc failed (git-fixes).
- sunrpc: Fix potential race conditions in rpc_sysfs_xprt_state_change() (git-fixes).
- sunrpc: Fix socket waits for write buffer space (git-fixes).
- sunrpc: Return true/false (not 1/0) from bool functions (git-fixes).
- sunrpc: Update trace flags (git-fixes).
- sunrpc: Use BIT() macro in rpc_show_xprt_state() (git-fixes).
- sunrpc: ensure the matching upcall is in-flight upon downcall (git-fixes).
- sunrpc: fix breakage caused by introduction of rq_xprt_ctxt (bsc#1210775).
- sunrpc: only free unix grouplist after RCU settles (git-fixes).
- supported.conf:
- supported.conf: Add a guard for unsupported DVB modules
- supported.conf: Add a guard for unsupported rose module
- supported.conf: Move bt878 and bttv modules to kernel-*-extra (jsc#PED-3931)
- supported.conf: Remove duplicate entry.
- supported.conf: add comments for missing CVE fixes for net/rose
- supported.conf: declaring usb_f_ncm supported as requested in (jsc#PED-3750) Support for the legacy functionality g_ncm is still under discussion (see jsc-PED#3200) For maintainance see (jsc#PED-3759)
- supported.conf: mark mana_ib supported
- supported.conf: support u_ether and libcomposite (jsc-PED#3750) This is necessary for g_ncm (for maintainance see jsc-PED#3759)
- swim3: add missing major.h include (git-fixes).
- swiotlb: Free tbl memory in swiotlb_exit() (jsc#PED-3259).
- swiotlb: add a SWIOTLB_ANY flag to lift the low memory restriction (PED-3259).
- swiotlb: avoid potential left shift overflow (PED-3259).
- swiotlb: clean up some coding style and minor issues (PED-3259).
- swiotlb: consolidate rounding up default_nslabs (PED-3259).
- swiotlb: do not panic when the swiotlb buffer can't be allocated (PED-3259).
- swiotlb: ensure a segment does not cross the area boundary (PED-3259).
- swiotlb: fail map correctly with failed io_tlb_default_mem (PED-3259).
- swiotlb: fix a typo (PED-3259).
- swiotlb: fix passing local variable to debugfs_create_ulong() (PED-3259).
- swiotlb: fix setting -&gt;force_bounce (PED-3259).
- swiotlb: fix use after free on error handling path (PED-3259).
- swiotlb: make swiotlb_exit a no-op if SWIOTLB_FORCE is set (PED-3259).
- swiotlb: make the swiotlb_init interface more useful (PED-3259).
- swiotlb: merge swiotlb-xen initialization into swiotlb (jsc#PED-3259).
- swiotlb: panic if nslabs is too small (PED-3259).
- swiotlb: pass a gfp_mask argument to swiotlb_init_late (PED-3259).
- swiotlb: provide swiotlb_init variants that remap the buffer (PED-3259).
- swiotlb: relocate PageHighMem test away from rmem_swiotlb_setup (git-fixes).
- swiotlb: remove a useless return in swiotlb_init (PED-3259).
- swiotlb: remove swiotlb_init_with_tbl and swiotlb_init_late_with_tbl (PED-3259).
- swiotlb: remove unused fields in io_tlb_mem (PED-3259).
- swiotlb: rename swiotlb_late_init_with_default_size (PED-3259).
- swiotlb: simplify debugfs setup (jsc#PED-3259).
- swiotlb: simplify swiotlb_max_segment (PED-3259).
- swiotlb: split up the global swiotlb lock (PED-3259).
- swiotlb: use the right nslabs value in swiotlb_init_remap (PED-3259).
- swiotlb: use the right nslabs-derived sizes in swiotlb_init_late (PED-3259).
- sysctl: add a new register_sysctl_init() interface (bsc#1207328).
- tap: tap_open(): correctly initialize socket uid (CVE-2023-1076 bsc#1208599).
- task_work: Decouple TIF_NOTIFY_SIGNAL and task_work (git-fixes).
- task_work: Introduce task_work_pending (git-fixes).
- test_firmware: Use kstrtobool() instead of strtobool() (git-fixes).
- test_firmware: fix the memory leak of the allocated firmware buffer (git-fixes).
- test_firmware: prevent race conditions by a correct implementation of locking (git-fixes).
- thermal/core: Remove duplicate information when an error occurs (git-fixes).
- thermal/drivers/hisi: Drop second sensor hi3660 (git-fixes).
- thermal/drivers/sun8i: Fix some error handling paths in sun8i_ths_probe() (git-fixes).
- thermal/drivers/tsens: Add compat string for the qcom,msm8960 (git-fixes).
- thermal/drivers/tsens: Drop msm8976-specific defines (git-fixes).
- thermal/drivers/tsens: Sort out msm8976 vs msm8956 data (git-fixes).
- thermal/drivers/tsens: fix slope values for msm8939 (git-fixes).
- thermal/drivers/tsens: limit num_sensors to 9 for msm8939 (git-fixes).
- thermal: intel: BXT_PMIC: select REGMAP instead of depending on it (git-fixes).
- thermal: intel: Fix unsigned comparison with less than zero (git-fixes).
- thermal: intel: intel_pch: Add support for Wellsburg PCH (git-fixes).
- thermal: intel: powerclamp: Fix cur_state for multi package system (git-fixes).
- thermal: intel: quark_dts: fix error pointer dereference (git-fixes).
- thunderbolt: Add missing UNSET_INBOUND_SBTX for retimer access (git-fixes).
- thunderbolt: Call tb_check_quirks() after initializing adapters (git-fixes).
- thunderbolt: Clear registers properly when auto clear isn't in use (bsc#1210165).
- thunderbolt: Clear registers properly when auto clear isn't in use (bsc#1210165).
- thunderbolt: Disable interrupt auto clear for rings (git-fixes).
- thunderbolt: Mask ring interrupt on Intel hardware as well (bsc#1210165).
- thunderbolt: Rename shadowed variables bit to interrupt_bit and auto_clear_bit (git-fixes).
- thunderbolt: Use const qualifier for `ring_interrupt_index` (git-fixes).
- thunderbolt: Use scale field when allocating USB3 bandwidth (git-fixes).
- thunderbolt: dma_test: Use correct value for absent rings when creating paths (git-fixes).
- timers: Prevent union confusion from unexpected (git-fixes)
- tls: Skip tls_append_frag on zero copy size (git-fixes).
- tools/iio/iio_utils:fix memory leak (git-fixes).
- tools/virtio: compile with -pthread (git-fixes).
- tools/virtio: fix the vringh test for virtio ring changes (git-fixes).
- tools/virtio: fix virtio_test execution (git-fixes).
- tools/virtio: initialize spinlocks in vring_test.c (git-fixes).
- tools: bpftool: Remove invalid \' json escape (git-fixes).
- tools: fix ARRAY_SIZE defines in tools and selftests hdrs (git-fixes).
- tpm, tpm_tis: Claim locality before writing TPM_INT_ENABLE register (git-fixes).
- tpm, tpm_tis: Disable interrupts if tpm_tis_probe_irq() failed (git-fixes).
- tpm, tpm_tis: Request threaded interrupt handler (git-fixes).
- tpm/eventlog: Do not abort tpm_read_log on faulty ACPI address (git-fixes).
- tpm/tpm_tis: Disable interrupts for more Lenovo devices (git-fixes).
- trace/hwlat: Do not start per-cpu thread if it is already running (git-fixes).
- trace/hwlat: Do not wipe the contents of per-cpu thread data (git-fixes).
- trace/hwlat: make use of the helper function kthread_run_on_cpu() (git-fixes).
- trace/hwlat: make use of the helper function kthread_run_on_cpu() (git-fixes).
- trace_events_hist: add check for return value of 'create_hist_field' (git-fixes).
- tracing/fprobe: Fix to check whether fprobe is registered correctly (git-fixes).
- tracing/hist: Fix issue of losting command info in error_log (git-fixes).
- tracing/hist: Fix out-of-bound write on 'action_data.var_ref_idx' (git-fixes).
- tracing/hist: Fix wrong return value in parse_action_params() (git-fixes).
- tracing/histograms: Allow variables to have some modifiers (git-fixes).
- tracing/hwlat: Replace sched_setaffinity with set_cpus_allowed_ptr (git-fixes).
- tracing/osnoise: Make osnoise_main to sleep for microseconds (git-fixes).
- tracing/perf: Avoid -Warray-bounds warning for __rel_loc macro (git-fixes).
- tracing/probe: trace_probe_primary_from_call(): checked list_first_entry (git-fixes).
- tracing/probes: Handle system names with hyphens (git-fixes).
- tracing: Add '__rel_loc' using trace event macros (git-fixes).
- tracing: Add DYNAMIC flag for dynamic events (git-fixes).
- tracing: Add NULL checks for buffer in ring_buffer_free_read_page() (git-fixes).
- tracing: Add trace_array_puts() to write into instance (git-fixes).
- tracing: Add trace_event helper macros __string_len() and __assign_str_len() (git-fixes).
- tracing: Avoid -Warray-bounds warning for __rel_loc macro (git-fixes).
- tracing: Avoid adding tracer option before update_tracer_options (git-fixes).
- tracing: Check field value in hist_field_name() (git-fixes).
- tracing: Do not let histogram values have some modifiers (git-fixes).
- tracing: Do not use out-of-sync va_list in event printing (git-fixes).
- tracing: Ensure trace buffer is at least 4096 bytes large (git-fixes).
- tracing: Fix a kmemleak false positive in tracing_map (git-fixes).
- tracing: Fix complicated dependency of CONFIG_TRACER_MAX_TRACE (git-fixes).
- tracing: Fix infinite loop in tracing_read_pipe on overflowed print_trace_line (git-fixes).
- tracing: Fix issue of missing one synthetic field (git-fixes).
- tracing: Fix mismatched comment in __string_len (git-fixes).
- tracing: Fix permissions for the buffer_percent file (git-fixes).
- tracing: Fix poll() and select() do not work on per_cpu trace_pipe and trace_pipe_raw (git-fixes).
- tracing: Fix possible memory leak in __create_synth_event() error path (git-fixes).
- tracing: Fix race where histograms can be called before the event (git-fixes).
- tracing: Fix sleeping function called from invalid context on RT kernel (git-fixes).
- tracing: Fix tp_printk option related with tp_printk_stop_on_boot (git-fixes).
- tracing: Fix warning on variable 'struct trace_array' (git-fixes).
- tracing: Fix wrong return in kprobe_event_gen_test.c (git-fixes).
- tracing: Free error logs of tracing instances (git-fixes).
- tracing: Have TRACE_DEFINE_ENUM affect trace event types as well (git-fixes).
- tracing: Have event format check not flag %p* on __get_dynamic_array() (git-fixes, bsc#1212350).
- tracing: Have syscall trace events use trace_event_buffer_lock_reserve() (git-fixes).
- tracing: Have tracing_snapshot_instance_cond() write errors to the appropriate instance (git-fixes).
- tracing: Have type enum modifications copy the strings (git-fixes).
- tracing: Introduce helpers to safely handle dynamic-sized sockaddrs (git-fixes).
- tracing: Make splice_read available again (git-fixes).
- tracing: Make sure trace_printk() can output as soon as it can be used (git-fixes).
- tracing: Make tp_printk work on syscall tracepoints (git-fixes).
- tracing: Make tracepoint lockdep check actually test something (git-fixes).
- tracing: Update print fmt check to handle new __get_sockaddr() macro (git-fixes, bsc#1212350).
- tracing: Use alignof__(struct {type b;}) instead of offsetof() (git-fixes).
- tracing: incorrect isolate_mote_t cast in mm_vmscan_lru_isolate (git-fixes).
- tty: Prevent writing chars during tcsetattr TCSADRAIN/FLUSH (git-fixes).
- tty: fix out-of-bounds access in tty_driver_lookup_tty() (git-fixes).
- tty: serial: fsl_lpuart: Fix the wrong RXWATER setting for rx dma case (git-fixes).
- tty: serial: fsl_lpuart: adjust buffer length to the intended size (git-fixes).
- tty: serial: fsl_lpuart: avoid checking for transfer complete when UARTCTRL_SBK is asserted in lpuart32_tx_empty (git-fixes).
- tty: serial: fsl_lpuart: clear LPUART Status Register in lpuart32_shutdown() (git-fixes).
- tty: serial: fsl_lpuart: disable Rx/Tx DMA in lpuart32_shutdown() (git-fixes).
- tty: serial: fsl_lpuart: disable the CTS when send break signal (git-fixes).
- tty: serial: fsl_lpuart: skip waiting for transmission complete when UARTCTRL_SBK is asserted (git-fixes).
- tty: serial: fsl_lpuart: use UARTCTRL_TXINV to send break instead of UARTCTRL_SBK (git-fixes).
- tty: serial: imx: Handle RS485 DE signal active high (git-fixes).
- tty: serial: imx: disable Ageing Timer interrupt request irq (git-fixes).
- tty: serial: qcom-geni-serial: stop operations in progress at shutdown (git-fixes).
- tty: serial: sh-sci: Fix Rx on RZ/G2L SCI (git-fixes).
- tty: serial: sh-sci: Fix transmit end interrupt handler (git-fixes).
- tun: annotate access to queue-&gt;trans_start (jsc#PED-370).
- tun: tun_chr_open(): correctly initialize socket uid (CVE-2023-1076 bsc#1208599).
- uas: Add US_FL_NO_REPORT_OPCODES for JMicron JMS583Gen 2 (git-fixes).
- ubsan: no need to unset panic_on_warn in ubsan_epilogue() (bsc#1207328).
- udf: Check consistency of Space Bitmap Descriptor (bsc#1210771).
- udf: Fix a slab-out-of-bounds write bug in udf_find_entry() (bsc#1206649).
- udf: Support splicing to file (bsc#1210770).
- update internal module version number for cifs.ko (bsc#1193629).
- usb / dwc3: Fix a checkpatch warning in core.c (git-fixes).
- usb-storage: fix deadlock when a scsi command timeouts more than once (git-fixes).
- usb: UHCI: adjust zhaoxin UHCI controllers OverCurrent bit value (git-fixes).
- usb: acpi: add helper to check port lpm capability using acpi _DSM (git-fixes).
- usb: cdns3: Fix issue with using incorrect PCI device function (git-fixes).
- usb: cdns3: fix NCM gadget RX speed 20x slow than expection at iMX8QM (git-fixes).
- usb: cdnsp: Fixes error: uninitialized symbol 'len' (git-fixes).
- usb: cdnsp: Fixes issue with redundant Status Stage (git-fixes).
- usb: cdnsp: changes PCI Device ID to fix conflict with CNDS3 driver (git-fixes).
- usb: chipdea: core: fix return -EINVAL if request role is the same with current role (git-fixes).
- usb: chipidea: core: fix possible concurrent when switch role (git-fixes).
- usb: chipidea: fix memory leak with using debugfs_lookup() (git-fixes).
- usb: chipidea: fix missing goto in `ci_hdrc_probe` (git-fixes).
- usb: chipidea: imx: avoid unnecessary probe defer (git-fixes).
- usb: core: Add routines for endpoint checks in old drivers (git-fixes).
- usb: core: Do not hold device lock while reading the 'descriptors' sysfs file (git-fixes).
- usb: core: add quirk for Alcor Link AK9563 smartcard reader (git-fixes).
- usb: core: hub: disable autosuspend for TI TUSB8041 (git-fixes).
- usb: dwc2: fix a devres leak in hw_enable upon suspend resume (git-fixes).
- usb: dwc3: Align DWC3_EP_* flag macros (git-fixes).
- usb: dwc3: Fix a repeated word checkpatch warning (git-fixes).
- usb: dwc3: Fix a typo in field name (git-fixes).
- usb: dwc3: Fix ep0 handling when getting reset while doing control transfer (git-fixes).
- usb: dwc3: core: Host wake up support from system suspend (git-fixes).
- usb: dwc3: debugfs: Resume dwc3 before accessing registers (git-fixes).
- usb: dwc3: drd: use helper to get role-switch-default-mode (git-fixes).
- usb: dwc3: ep0: Do not prepare beyond Setup stage (git-fixes).
- usb: dwc3: fix memory leak with using debugfs_lookup() (git-fixes).
- usb: dwc3: fix runtime pm imbalance on probe errors (git-fixes).
- usb: dwc3: fix runtime pm imbalance on unbind (git-fixes).
- usb: dwc3: fix use-after-free on core driver unbind (git-fixes).
- usb: dwc3: gadget: Add 1ms delay after end transfer command without IOC (git-fixes).
- usb: dwc3: gadget: Change condition for processing suspend event (git-fixes).
- usb: dwc3: gadget: Delay issuing End Transfer (git-fixes).
- usb: dwc3: gadget: Execute gadget stop after halting the controller (git-fixes).
- usb: dwc3: gadget: Improve dwc3_gadget_suspend() and dwc3_gadget_resume() (git-fixes).
- usb: dwc3: gadget: Only End Transfer for ep0 data phase (git-fixes).
- usb: dwc3: gadget: Reset num TRBs before giving back the request (git-fixes).
- usb: dwc3: gadget: Stall and restart EP0 if host is unresponsive (git-fixes).
- usb: dwc3: pci: add support for the Intel Meteor Lake-M (git-fixes).
- usb: dwc3: pci: add support for the Intel Meteor Lake-S (git-fixes).
- usb: dwc3: qcom: Configure wakeup interrupts during suspend (git-fixes).
- usb: dwc3: qcom: Fix memory leak in dwc3_qcom_interconnect_init (git-fixes).
- usb: dwc3: qcom: Keep power domain on to retain controller status (git-fixes).
- usb: dwc3: qcom: clean up icc init (git-fixes).
- usb: dwc3: qcom: clean up suspend callbacks (git-fixes).
- usb: dwc3: qcom: enable vbus override when in OTG dr-mode (git-fixes).
- usb: dwc3: qcom: fix NULL-deref on suspend (git-fixes).
- usb: dwc3: qcom: fix gadget-only builds (git-fixes).
- usb: dwc3: qcom: fix peripheral and OTG suspend (git-fixes).
- usb: dwc3: qcom: fix wakeup implementation (git-fixes).
- usb: dwc3: qcom: only parse 'maximum-speed' once (git-fixes).
- usb: dwc3: qcom: suppress unused-variable warning (git-fixes).
- usb: dwc3: remove a possible unnecessary 'out of memory' message (git-fixes).
- usb: early: xhci-dbc: Fix a potential out-of-bound memory access (git-fixes).
- usb: ene_usb6250: Allocate enough memory for full object (git-fixes).
- usb: fix memory leak with using debugfs_lookup() (git-fixes).
- usb: fotg210: fix memory leak with using debugfs_lookup() (git-fixes).
- usb: gadget: bcm63xx_udc: fix memory leak with using debugfs_lookup() (git-fixes).
- usb: gadget: configfs: Restrict symlink creation is UDC already binded (git-fixes).
- usb: gadget: configfs: remove using list iterator after loop body as a ptr (git-fixes).
- usb: gadget: configfs: use to_config_usb_cfg() in os_desc_link() (git-fixes).
- usb: gadget: configfs: use to_usb_function_instance() in cfg (un)link func (git-fixes).
- usb: gadget: f_fs: Add unbind event before functionfs_unbind (git-fixes).
- usb: gadget: f_fs: Fix unbalanced spinlock in __ffs_ep0_queue_wait (git-fixes).
- usb: gadget: f_hid: fix f_hidg lifetime vs cdev (git-fixes).
- usb: gadget: f_hid: fix refcount leak on error path (git-fixes).
- usb: gadget: f_ncm: fix potential NULL ptr deref in ncm_bitrate() (git-fixes).
- usb: gadget: f_uac2: Fix incorrect increment of bNumEndpoints (git-fixes).
- usb: gadget: fusb300_udc: free irq on the error path in fusb300_probe() (git-fixes).
- usb: gadget: gr_udc: fix memory leak with using debugfs_lookup() (git-fixes).
- usb: gadget: lpc32xx_udc: fix memory leak with using debugfs_lookup() (git-fixes).
- usb: gadget: pxa25x_udc: fix memory leak with using debugfs_lookup() (git-fixes).
- usb: gadget: pxa27x_udc: fix memory leak with using debugfs_lookup() (git-fixes).
- usb: gadget: tegra-xudc: Fix crash in vbus_draw (git-fixes).
- usb: gadget: u_audio: do not let userspace block driver unbind (git-fixes).
- usb: gadget: u_ether: Fix host MAC address case (git-fixes).
- usb: gadget: u_serial: Add null pointer check in gserial_resume (git-fixes).
- usb: gadget: udc: do not clear gadget driver.bus (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix use after free bug in renesas_usb3_remove due to race condition (git-fixes).
- usb: host: xhci-rcar: remove leftover quirk handling (git-fixes).
- usb: host: xhci: mvebu: Iterate over array indexes instead of using pointer math (git-fixes).
- usb: isp116x: fix memory leak with using debugfs_lookup() (git-fixes).
- usb: isp1362: fix memory leak with using debugfs_lookup() (git-fixes).
- usb: max-3421: Fix setting of I/O pins (git-fixes).
- usb: mtu3: fix kernel panic at qmu transfer done irq handler (git-fixes).
- usb: musb: Add and use inline function musb_otg_state_string (git-fixes).
- usb: musb: Add and use inline functions musb_{get,set}_state (git-fixes).
- usb: musb: mediatek: do not unregister something that wasn't registered (git-fixes).
- usb: musb: remove schedule work called after flush (git-fixes).
- usb: serial: cp210x: add SCALANCE LPE-9000 device id (git-fixes).
- usb: serial: cp210x: add Silicon Labs IFS-USB-DATACABLE IDs (git-fixes).
- usb: serial: option: add Quectel EC200U modem (git-fixes).
- usb: serial: option: add Quectel EM05-G (CS) modem (git-fixes).
- usb: serial: option: add Quectel EM05-G (GR) modem (git-fixes).
- usb: serial: option: add Quectel EM05-G (RS) modem (git-fixes).
- usb: serial: option: add Quectel EM05CN (SG) modem (git-fixes).
- usb: serial: option: add Quectel EM05CN modem (git-fixes).
- usb: serial: option: add Quectel EM061KGL series (git-fixes).
- usb: serial: option: add Quectel RM500U-CN modem (git-fixes).
- usb: serial: option: add Telit FE990 compositions (git-fixes).
- usb: serial: option: add UNISOC vendor and TOZED LT70C product (git-fixes).
- usb: serial: option: add support for VW/Skoda 'Carstick LTE' (git-fixes).
- usb: sisusbvga: Add endpoint checks (git-fixes).
- usb: sl811: fix memory leak with using debugfs_lookup() (git-fixes).
- usb: typec: altmodes/displayport: Fix configure initial pin assignment (git-fixes).
- usb: typec: altmodes/displayport: Fix probe pin assign check (git-fixes).
- usb: typec: altmodes/displayport: fix pin_assignment_show (git-fixes).
- usb: typec: intel_pmc_mux: Do not leak the ACPI device reference count (git-fixes).
- usb: typec: intel_pmc_mux: Use the helper acpi_dev_get_memory_resources() (git-fixes).
- usb: typec: pd: Remove usb_suspend_supported sysfs from sink PDO (git-fixes).
- usb: typec: tcpm: fix create duplicate source-capabilities file (git-fixes).
- usb: typec: tcpm: fix create duplicate source-capabilities file (git-fixes).
- usb: typec: tcpm: fix multiple times discover svids error (git-fixes).
- usb: typec: tcpm: fix warning when handle discover_identity message (git-fixes).
- usb: typec: ucsi: Do not attempt to resume the ports before they exist (git-fixes).
- usb: typec: ucsi: Do not warn on probe deferral (git-fixes).
- usb: typec: ucsi: Fix command cancellation (git-fixes).
- usb: ucsi: Fix NULL pointer deref in ucsi_connector_change() (git-fixes).
- usb: ucsi: Fix ucsi-&gt;connector race (git-fixes).
- usb: ucsi_acpi: Increase the command completion timeout (git-fixes).
- usb: uhci: fix memory leak with using debugfs_lookup() (git-fixes).
- usb: usbfs: Enforce page requirements for mmap (git-fixes).
- usb: usbfs: Use consistent mmap functions (git-fixes).
- usb: usbtmc: Fix direction for 0-length ioctl control messages (git-fixes).
- usb: uvc: Enumerate valid values for color matching (git-fixes).
- usb: xhci: tegra: fix sleep in atomic call (git-fixes).
- usrmerge: Compatibility with earlier rpm (boo#1211796)
- vDPA: check VIRTIO_NET_F_RSS for max_virtqueue_paris's presence (jsc#PED-1549).
- vDPA: check virtio device features to detect MQ (jsc#PED-1549).
- vDPA: fix 'cast to restricted le16' warnings in vdpa.c (jsc#PED-1549).
- vc_screen: do not clobber return value in vcs_read (git-fixes).
- vc_screen: do not clobber return value in vcs_read (git-fixes).
- vc_screen: modify vcs_size() handling in vcs_read() (git-fixes).
- vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF (git-fixes).
- vc_screen: reload load of struct vc_data pointer in vcs_write() to avoid UAF (git-fixes).
- vdpa/ifcvf: fix the calculation of queuepair (jsc#PED-1549).
- vdpa/mlx5: Directly assign memory key (jsc#PED-1549).
- vdpa/mlx5: Directly assign memory key (jsc#SLE-19253).
- vdpa/mlx5: Do not clear mr struct on destroy MR (jsc#PED-1549).
- vdpa/mlx5: Do not clear mr struct on destroy MR (jsc#SLE-19253).
- vdpa/mlx5: Fix rule forwarding VLAN to TIR (jsc#PED-1549).
- vdpa/mlx5: Fix wrong configuration of virtio_version_1_0 (jsc#SLE-19253).
- vdpa/mlx5: Fix wrong mac address deletion (jsc#PED-1549).
- vdpa/mlx5: Initialize CVQ iotlb spinlock (jsc#PED-1549).
- vdpa/mlx5: should not activate virtq object when suspended (jsc#PED-1549).
- vdpa/vp_vdpa: fix kfree a wrong pointer in vp_vdpa_remove (git-fixes).
- vdpa: Fix error logic in vdpa_nl_cmd_dev_get_doit (jsc#PED-1549).
- vdpa: Fix error logic in vdpa_nl_cmd_dev_get_doit (jsc#SLE-19253).
- vdpa: Use BIT_ULL for bit operations (jsc#PED-1549).
- vdpa: conditionally fill max max queue pair for stats (jsc#PED-1549).
- vdpa: fix use-after-free on vp_vdpa_remove (git-fixes).
- vdpa_sim: not reset state in vdpasim_queue_ready (git-fixes).
- vdpa_sim: set last_used_idx as last_avail_idx in vdpasim_queue_ready (git-fixes).
- vduse: Fix NULL pointer dereference on sysfs access (jsc#PED-1549).
- vduse: Fix returning wrong type in vduse_domain_alloc_iova() (jsc#PED-1549).
- vduse: avoid empty string for dev name (jsc#PED-1549).
- vduse: check that offset is within bounds in get_config() (jsc#PED-1549).
- vduse: fix memory corruption in vduse_dev_ioctl() (jsc#PED-1549).
- vduse: prevent uninitialized memory accesses (jsc#PED-1549).
- vfio/type1: prevent underflow of locked_vm via exec() (git-fixes).
- vfio/type1: restore locked_vm (git-fixes).
- vfio/type1: track locked_vm per dma (git-fixes).
- vfs: Check the truncate maximum size in inode_newsize_ok() (bsc#1207642).
- vfs: filename_create(): fix incorrect intent (bsc#1197534).
- vfs: make sync_filesystem return errors from -&gt;sync_fs (git-fixes).
- vhost-vdpa: fix an iotlb memory leak (jsc#PED-1549).
- vhost-vdpa: free iommu domain after last use during cleanup (jsc#PED-1549).
- vhost/net: Clear the pending messages when the backend is removed (git-fixes).
- vhost_vdpa: fix the crash in unmap a large memory (jsc#PED-1549).
- vhost_vdpa: fix unmap process in no-batch mode (jsc#PED-1549).
- vhost_vdpa: support PACKED when setting-getting vring_base (jsc#PED-1549).
- vhost_vdpa: support PACKED when setting-getting vring_base (jsc#SLE-19253).
- virt/coco/sev-guest: Add throttling awareness (bsc#1209927).
- virt/coco/sev-guest: Carve out the request issuing logic into a helper (bsc#1209927).
- virt/coco/sev-guest: Check SEV_SNP attribute at probe time (bsc#1209927).
- virt/coco/sev-guest: Convert the sw_exit_info_2 checking to a switch-case (bsc#1209927).
- virt/coco/sev-guest: Do some code style cleanups (bsc#1209927).
- virt/coco/sev-guest: Remove the disable_vmpck label in handle_guest_request() (bsc#1209927).
- virt/coco/sev-guest: Simplify extended guest request handling (bsc#1209927).
- virt/sev-guest: Add a MODULE_ALIAS (bsc#1208449).
- virt/sev-guest: Prevent IV reuse in the SNP guest driver (bsc#1208449).
- virt/sev-guest: Remove unnecessary free in init_crypto() (bsc#1208449).
- virt/sev-guest: Return -EIO if certificate buffer is not large enough (bsc#1209927).
- virt: sev-guest: Pass the appropriate argument type to iounmap() (bsc#1208449).
- virt: sevguest: Change driver name to reflect generic SEV support (bsc#1208449).
- virt: sevguest: Rename the sevguest dir and files to sev-guest (bsc#1208449).
- virtio-blk: modify the value type of num in virtio_queue_rq() (git-fixes).
- virtio-net: Keep stop() to follow mirror sequence of open() (git-fixes).
- virtio-net: execute xdp_do_flush() before napi_complete_done() (git-fixes).
- virtio_net: Fix probe failed when modprobe virtio_net (git-fixes).
- virtio_net: bugfix overflow inside xdp_linearize_page() (git-fixes).
- virtio_net: split free_unused_bufs() (git-fixes).
- virtio_net: suppress cpu stall when free_unused_bufs (git-fixes).
- virtio_pci: modify ENOENT to EINVAL (git-fixes).
- virtio_ring: do not update event idx on get_buf (git-fixes).
- vmci: check context-&gt;notify_page after call to get_user_pages_fast() to avoid GPF (git-fixes).
- vmci_host: fix a race condition in vmci_host_poll() causing GPF (git-fixes).
- vmxnet3: move rss code block under eop descriptor (bsc#1208212).
- vmxnet3: use gro callback when UPT is enabled (bsc#1209739).
- vp_vdpa: fix the crash in hot unplug with vp_vdpa (git-fixes).
- wait: Fix __wait_event_hrtimeout for RT/DL tasks (git-fixes)
- watch_queue: fix IOC_WATCH_QUEUE_SET_SIZE alloc error paths (bsc#1197617).
- watchdog/hpwdt: Enable HP_WATCHDOG for ARM64 systems. (jsc#PED-3210) Also enable module in aarch64 default configuration.
- watchdog: Fix kmemleak in watchdog_cdev_register (git-fixes).
- watchdog: allow building BCM7038_WDT for BCM4908 (bsc#1208619).
- watchdog: at91sam9_wdt: use devm_request_irq to avoid missing free_irq() in error path (git-fixes).
- watchdog: diag288_wdt: do not use stack buffers for hardware data (bsc#1207497).
- watchdog: diag288_wdt: fix __diag288() inline assembly (bsc#1207497).
- watchdog: dw_wdt: Fix the error handling path of dw_wdt_drv_probe() (git-fixes).
- watchdog: ixp4xx: Implement restart (bsc#1208619).
- watchdog: ixp4xx: Rewrite driver to use core (bsc#1208619).
- watchdog: ixp4xx_wdt: Fix address space warning (bsc#1208619).
- watchdog: menz069_wdt: fix watchdog initialisation (git-fixes).
- watchdog: orion_wdt: support pretimeout on Armada-XP (bsc#1208619).
- watchdog: pcwd_usb: Fix attempting to access uninitialized memory (git-fixes).
- watchdog: sbsa_wdog: Make sure the timeout programming is within the limits (git-fixes).
- watchdog: sp5100_tco: Immediately trigger upon starting (git-fixes).
- wifi: ath11k: Fix SKB corruption in REO destination ring (git-fixes).
- wifi: ath11k: Fix memory leak in ath11k_peer_rx_frag_setup (git-fixes).
- wifi: ath11k: allow system suspend to survive ath11k (git-fixes).
- wifi: ath11k: fix SAC bug on peer addition with sta band migration (git-fixes).
- wifi: ath11k: fix deinitialization of firmware resources (git-fixes).
- wifi: ath11k: fix writing to unintended memory region (git-fixes).
- wifi: ath11k: reduce the MHI timeout to 20s (bsc#1207948).
- wifi: ath5k: fix an off by one check in ath5k_eeprom_read_freq_list() (git-fixes).
- wifi: ath6kl: minor fix for allocation size (git-fixes).
- wifi: ath6kl: reduce WARN to dev_dbg() in callback (git-fixes).
- wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback() (git-fixes).
- wifi: ath9k: Fix use-after-free in ath9k_hif_usb_disconnect() (git-fixes).
- wifi: ath9k: hif_usb: clean up skbs if ath9k_hif_usb_rx_stream() fails (git-fixes).
- wifi: ath9k: hif_usb: fix memory leak of remain_skbs (git-fixes).
- wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function (git-fixes).
- wifi: ath9k: use proper statements in conditionals (git-fixes).
- wifi: ath: Silence memcpy run-time false positive warning (git-fixes).
- wifi: b43: fix incorrect __packed annotation (git-fixes).
- wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() (git-fixes).
- wifi: brcmfmac: cfg80211: Pass the PMK in binary instead of hex (git-fixes).
- wifi: brcmfmac: ensure CLM version is null-terminated to prevent stack-out-of-bounds (git-fixes).
- wifi: brcmfmac: fix potential memory leak in brcmf_netdev_start_xmit() (git-fixes).
- wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() (git-fixes).
- wifi: brcmfmac: support CQM RSSI notification with older firmware (git-fixes).
- wifi: brcmfmac: unmap dma buffer in brcmf_msgbuf_alloc_pktid() (git-fixes).
- wifi: cfg80211: Fix extended KCK key length check in nl80211_set_rekey_data() (git-fixes).
- wifi: cfg80211: Fix use after free for wext (git-fixes).
- wifi: cfg80211: Partial revert 'wifi: cfg80211: Fix use after free for wext' (git-fixes).
- wifi: cfg80211: fix locking in regulatory disconnect (git-fixes).
- wifi: cfg80211: fix locking in sched scan stop work (git-fixes).
- wifi: ipw2200: fix memory leak in ipw_wdev_init() (git-fixes).
- wifi: ipw2x00: do not call dev_kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: iwl3945: Add missing check for create_singlethread_workqueue (git-fixes).
- wifi: iwl4965: Add missing check for create_singlethread_workqueue() (git-fixes).
- wifi: iwlegacy: common: do not call dev_kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: iwlwifi: debug: fix crash in __iwl_err() (git-fixes).
- wifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace (git-fixes).
- wifi: iwlwifi: fix OEM's name in the ppag approved list (git-fixes).
- wifi: iwlwifi: fix duplicate entry in iwl_dev_info_table (git-fixes).
- wifi: iwlwifi: fw: fix DBGI dump (git-fixes).
- wifi: iwlwifi: fw: fix memory leak in debugfs (git-fixes).
- wifi: iwlwifi: fw: move memset before early return (git-fixes).
- wifi: iwlwifi: make the loop for card preparation effective (git-fixes).
- wifi: iwlwifi: mvm: check firmware response size (git-fixes).
- wifi: iwlwifi: mvm: do not set CHECKSUM_COMPLETE for unsupported protocols (git-fixes).
- wifi: iwlwifi: mvm: do not trust firmware n_channels (git-fixes).
- wifi: iwlwifi: mvm: fix OEM's name in the tas approved list (git-fixes).
- wifi: iwlwifi: mvm: fix cancel_delayed_work_sync() deadlock (git-fixes).
- wifi: iwlwifi: mvm: fix mvmtxq-&gt;stopped handling (git-fixes).
- wifi: iwlwifi: mvm: initialize seq variable (git-fixes).
- wifi: iwlwifi: pcie: Fix integer overflow in iwl_write_to_user_buf (git-fixes).
- wifi: iwlwifi: pcie: fix possible NULL pointer dereference (git-fixes).
- wifi: iwlwifi: trans: do not trigger d3 interrupt twice (git-fixes).
- wifi: iwlwifi: yoyo: Fix possible division by zero (git-fixes).
- wifi: iwlwifi: yoyo: skip dump correctly on hw error (git-fixes).
- wifi: libertas: cmdresp: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: libertas: fix memory leak in lbs_init_adapter() (git-fixes).
- wifi: libertas: if_usb: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: libertas: main: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: libertas_tf: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: mac80211: Set TWT Information Frame Disabled bit as 1 (bsc#1209980).
- wifi: mac80211: adjust scan cancel comment/check (git-fixes).
- wifi: mac80211: fix invalid drv_sta_pre_rcu_remove calls for non-uploaded sta (git-fixes).
- wifi: mac80211: fix min center freq offset tracing (git-fixes).
- wifi: mac80211: fix qos on mesh interfaces (git-fixes).
- wifi: mac80211: make rate u32 in sta_set_rate_info_rx() (git-fixes).
- wifi: mac80211: sdata can be NULL during AMPDU start (git-fixes).
- wifi: mac80211: simplify chanctx allocation (git-fixes).
- wifi: mt7601u: fix an integer underflow (git-fixes).
- wifi: mt76: add flexible polling wait-interval support (git-fixes).
- wifi: mt76: add memory barrier to SDIO queue kick (bsc#1209980).
- wifi: mt76: add missing locking to protect against concurrent rx/status calls (git-fixes).
- wifi: mt76: connac: fix possible unaligned access in mt76_connac_mcu_add_nested_tlv (bsc#1209980).
- wifi: mt76: dma: free rx_head in mt76_dma_rx_cleanup (git-fixes).
- wifi: mt76: do not run mt76_unregister_device() on unregistered hw (bsc#1209980).
- wifi: mt76: fix 6GHz high channel not be scanned (git-fixes).
- wifi: mt76: fix receiving LLC packets on mt7615/mt7915 (bsc#1209980).
- wifi: mt76: handle failure of vzalloc in mt7615_coredump_work (git-fixes).
- wifi: mt76: mt7615: fix possible race in mt7615_mac_sta_poll (git-fixes).
- wifi: mt76: mt7915: add missing of_node_put() (bsc#1209980).
- wifi: mt76: mt7915: call mt7915_mcu_set_thermal_throttling() only after init_work (bsc#1209980).
- wifi: mt76: mt7915: check return value before accessing free_block_num (bsc#1209980).
- wifi: mt76: mt7915: drop always true condition of __mt7915_reg_addr() (bsc#1209980).
- wifi: mt76: mt7915: expose device tree match table (git-fixes).
- wifi: mt76: mt7915: fix mcs value in ht mode (bsc#1209980).
- wifi: mt76: mt7915: fix memory leak in mt7915_mcu_exit (git-fixes).
- wifi: mt76: mt7915: fix mt7915_mac_set_timing() (bsc#1209980).
- wifi: mt76: mt7915: fix possible unaligned access in mt7915_mac_add_twt_setup (bsc#1209980).
- wifi: mt76: mt7915: fix reporting of TX AGGR histogram (git-fixes).
- wifi: mt76: mt7915: fix unintended sign extension of mt7915_hw_queue_read() (bsc#1209980).
- wifi: mt76: mt7921: fix missing unwind goto in `mt7921u_probe` (git-fixes).
- wifi: mt76: mt7921: fix reporting of TX AGGR histogram (git-fixes).
- wifi: mt76: mt7921e: Set memory space enable in PCI_COMMAND if unset (git-fixes).
- wifi: mt76: mt7921e: fix crash in chip reset fail (bsc#1209980).
- wifi: mt76: mt7921e: fix probe timeout after reboot (git-fixes).
- wifi: mt76: mt7921e: fix random fw download fail (git-fixes).
- wifi: mt76: mt7921e: fix random fw download fail (git-fixes).
- wifi: mt76: mt7921e: fix rmmod crash in driver reload test (bsc#1209980).
- wifi: mt76: mt7921e: improve reliability of dma reset (git-fixes).
- wifi: mt76: mt7921e: stop chip reset worker in unregister hook (git-fixes).
- wifi: mt76: mt7921s: fix race issue between reset and suspend/resume (bsc#1209980).
- wifi: mt76: mt7921s: fix slab-out-of-bounds access in sdio host (bsc#1209980).
- wifi: mwifiex: Add missing compatible string for SD8787 (git-fixes).
- wifi: mwifiex: fix loop iterator in mwifiex_update_ampdu_txwinsize() (git-fixes).
- wifi: mwifiex: mark OF related data as maybe unused (git-fixes).
- wifi: orinoco: check return value of hermes_write_wordrec() (git-fixes).
- wifi: rsi: Fix memory leak in rsi_coex_attach() (git-fixes).
- wifi: rt2x00: Fix memory leak when handling surveys (git-fixes).
- wifi: rtl8xxxu: Fix memory leaks with RTL8723BU, RTL8192EU (git-fixes).
- wifi: rtl8xxxu: RTL8192EU always needs full init (git-fixes).
- wifi: rtl8xxxu: Use a longer retry limit of 48 (git-fixes).
- wifi: rtl8xxxu: do not call dev_kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: rtl8xxxu: fix authentication timeout due to incorrect RCR value (git-fixes).
- wifi: rtl8xxxu: fixing transmisison failure for rtl8192eu (git-fixes).
- wifi: rtlwifi: Fix global-out-of-bounds bug in _rtl8812ae_phy_set_txpower_limit() (git-fixes).
- wifi: rtlwifi: fix incorrect error codes in rtl_debugfs_set_write_reg() (git-fixes).
- wifi: rtlwifi: fix incorrect error codes in rtl_debugfs_set_write_rfreg() (git-fixes).
- wifi: rtlwifi: rtl8188ee: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: rtlwifi: rtl8723be: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: rtlwifi: rtl8821ae: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: rtw88: mac: Return the original error from rtw_mac_power_switch() (git-fixes).
- wifi: rtw88: mac: Return the original error from rtw_pwr_seq_parser() (git-fixes).
- wifi: rtw89: Add missing check for alloc_workqueue (git-fixes).
- wifi: rtw89: fix potential race condition between napi_init and napi_enable (git-fixes).
- wifi: wilc1000: fix potential memory leak in wilc_mac_xmit() (git-fixes).
- wifi: wl3501_cs: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wireguard: ratelimiter: use hrtimer in selftest (git-fixes)
- workqueue: Fix hung time report of worker pools (bsc#1211044).
- workqueue: Interrupted create_worker() is not a repeated event (bsc#1211044).
- workqueue: Print backtraces from CPUs with hung CPU bound workqueues (bsc#1211044).
- workqueue: Warn when a new worker could not be created (bsc#1211044).
- workqueue: Warn when a rescuer could not be created (bsc#1211044).
- writeback, cgroup: fix null-ptr-deref write in bdi_split_work_to_wbs (bsc#1210769).
- writeback: avoid use-after-free after removing device (bsc#1207638).
- x86, sched: Fix undefined reference to init_freq_invariance_cppc() build error (git-fixes).
- x86/64/mm: Map all kernel memory into trampoline_pgd (git-fixes).
- x86/ACPI/boot: Use FADT version to check support for online capable (git-fixes).
- x86/MCE/AMD: Clear DFR errors found in THR handler (git-fixes).
- x86/MCE/AMD: Fix memory leak when threshold_create_bank() fails (git-fixes).
- x86/MCE/AMD: Use an u64 for bank_map (git-fixes).
- x86/PAT: Have pat_enabled() properly reflect state when running on Xen (git-fixes).
- x86/PCI: Add quirk for AMD XHCI controller that loses MSI-X state in D3hot (git-fixes).
- x86/acpi/boot: Correct acpi_is_processor_usable() check (git-fixes).
- x86/acpi/boot: Do not register processors that cannot be onlined for x2APIC (git-fixes).
- x86/alternative: Make debug-alternative selective (bsc#1206578).
- x86/alternative: Report missing return thunk details (git-fixes).
- x86/alternative: Support relocations in alternatives (bsc#1206578).
- x86/amd: Use IBPB for firmware calls (git-fixes).
- x86/amd_nb: Add AMD PCI IDs for SMN communication (bsc#1208848).
- x86/asm: Fix an assembler warning with current binutils (git-fixes).
- x86/boot: Avoid using Intel mnemonics in AT&amp;T syntax asm (git-fixes).
- x86/boot: Skip realmode init code when running as Xen PV guest  (git-fixes).
- x86/bug: Merge annotate_reachable() into _BUG_FLAGS() asm (git-fixes).
- x86/bug: Merge annotate_reachable() into _BUG_FLAGS() asm (git-fixes).
- x86/bug: Prevent shadowing in __WARN_FLAGS (git-fixes).
- x86/bugs: Add 'unknown' reporting for MMIO Stale Data (git-fixes).
- x86/bugs: Do not enable IBPB at firmware entry when IBPB is not available (git-fixes).
- x86/bugs: Enable STIBP for IBPB mitigated RETBleed (git-fixes).
- x86/bugs: Flush IBP in ib_prctl_set() (bsc#1207773 CVE-2023-0045).
- x86/bugs: Warn when 'ibrs' mitigation is selected on Enhanced IBRS parts (git-fixes).
- x86/cpu: Add CPU model numbers for Meteor Lake (git fixes).
- x86/cpu: Add Raptor Lake to Intel family (git fixes).
- x86/cpu: Add new Alderlake and Raptorlake CPU model numbers (git fixes).
- x86/cpu: Add new Raptor Lake CPU model number (git fixes).
- x86/cpu: Add several Intel server CPU model numbers (git fixes).
- x86/cpu: Drop spurious underscore from RAPTOR_LAKE #define (git fixes).
- x86/cpu: Switch to arch_cpu_finalize_init() (bsc#1212448).
- x86/cpufeatures: Introduce x2AVIC CPUID bit (bsc#1208619).
- x86/crash: Disable virt in core NMI crash handler to avoid double shootdown (git-fixes).
- x86/delay: Fix the wrong asm constraint in delay_loop() (git-fixes).
- x86/entry: Avoid very early RET (git-fixes).
- x86/entry: Build thunk_$(BITS) only if CONFIG_PREEMPTION=y (git-fixes).
- x86/entry: Do not call error_entry() for XENPV (git-fixes).
- x86/entry: Move CLD to the start of the idtentry macro (git-fixes).
- x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (git-fixes).
- x86/entry: Switch the stack after error_entry() returns (git-fixes).
- x86/fault: Cast an argument to the proper address space in prefetch() (git-fixes).
- x86/fpu/xsave: Handle compacted offsets correctly with supervisor states (git-fixes).
- x86/fpu/xsave: Handle compacted offsets correctly with supervisor states (git-fixes).
- x86/fpu/xsave: Initialize offset/size cache early (bsc#1211205).
- x86/fpu/xstate: Fix the ARCH_REQ_XCOMP_PERM implementation (git-fixes).
- x86/fpu/xstate: Fix the ARCH_REQ_XCOMP_PERM implementation (git-fixes).
- x86/fpu: Cache xfeature flags from CPUID (git-fixes).
- x86/fpu: Fix copy_xstate_to_uabi() to copy init states correctly (git-fixes).
- x86/fpu: Fix the init_fpstate size check with the actual size (git-fixes).
- x86/fpu: Mark init functions __init (bsc#1212448).
- x86/fpu: Move FPU initialization into arch_cpu_finalize_init() (bsc#1212448).
- x86/fpu: Prevent FPU state corruption (git-fixes).
- x86/fpu: Remove cpuinfo argument from init functions (bsc#1212448).
- x86/fpu: Remove unused supervisor only offsets (git-fixes).
- x86/fpu: Remove unused supervisor only offsets (git-fixes).
- x86/fpu: Use _Alignof to avoid undefined behavior in TYPE_ALIGN (git-fixes).
- x86/hyperv: Block root partition functionality in a Confidential VM (git-fixes).
- x86/hyperv: Introduce HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK constants (git-fixes).
- x86/hyperv: Remove unregister syscore call from Hyper-V cleanup (git-fixes).
- x86/hyperv: Restore VP assist page after cpu offlining/onlining (git-fixes).
- x86/init: Initialize signal frame size late (bsc#1212448).
- x86/kprobes: Fix __recover_optprobed_insn check optimizing logic (git-fixes).
- x86/kprobes: Fix kprobes instruction boudary check with CONFIG_RETHUNK (git-fixes).
- x86/kprobes: Fix optprobe optimization check with CONFIG_RETHUNK (git-fixes).
- x86/kvm: Do not use pv tlb/ipi/sched_yield if on 1 vCPU (git-fixes).
- x86/kvm: Do not use pv tlb/ipi/sched_yield if on 1 vCPU (git-fixes).
- x86/kvm: Preserve BSP MSR_KVM_POLL_CONTROL across suspend/resume (git-fixes).
- x86/kvm: Remove unused virt to phys translation in kvm_guest_cpu_init() (git-fixes).
- x86/lib/memmove: Decouple ERMS from FSRM (bsc#1206578).
- x86/mce/inject: Avoid out-of-bounds write when setting flags (git-fixes).
- x86/mce/inject: Avoid out-of-bounds write when setting flags (git-fixes).
- x86/mce: Allow instrumentation during task work queueing (git-fixes).
- x86/mce: Allow instrumentation during task work queueing (git-fixes).
- x86/mce: Mark mce_end() noinstr (git-fixes).
- x86/mce: Mark mce_end() noinstr (git-fixes).
- x86/mce: Mark mce_panic() noinstr (git-fixes).
- x86/mce: Mark mce_panic() noinstr (git-fixes).
- x86/mce: Mark mce_read_aux() noinstr (git-fixes).
- x86/mce: Mark mce_read_aux() noinstr (git-fixes).
- x86/mce: relocate set{clear}_mce_nospec() functions (git-fixes). This is a preparation for the next patch
- x86/mem_encrypt: Unbreak the AMD_MEM_ENCRYPT=n build (git-fixes).
- x86/microcode/AMD: Add a @cpu parameter to the reloading functions (git-fixes).
- x86/microcode/AMD: Fix mixed steppings support (git-fixes).
- x86/microcode/AMD: Track patch allocation size explicitly (git-fixes).
- x86/microcode/amd: Remove load_microcode_amd()'s bsp parameter (git-fixes).
- x86/microcode/intel: Do not retry microcode reloading on the APs (git-fixes).
- x86/microcode: Add a parameter to microcode_check() to store CPU capabilities (git-fixes).
- x86/microcode: Add explicit CPU vendor dependency (git-fixes).
- x86/microcode: Adjust late loading result reporting message (git-fixes).
- x86/microcode: Check CPU capabilities after late microcode update correctly (git-fixes).
- x86/microcode: Print previous version of microcode after reload (git-fixes).
- x86/microcode: Rip out the OLD_INTERFACE (git-fixes).
- x86/mm: Cleanup the control_va_addr_alignment() __setup handler (git-fixes).
- x86/mm: Fix RESERVE_BRK() for older binutils (git-fixes).
- x86/mm: Fix use of uninitialized buffer in sme_enable() (git-fixes).
- x86/mm: Flush global TLB when switching to trampoline page-table (git-fixes).
- x86/mm: Flush global TLB when switching to trampoline page-table (git-fixes).
- x86/mm: Initialize text poking earlier (bsc#1212448).
- x86/mm: Randomize per-cpu entry area (bsc#1207845 CVE-2023-0597).
- x86/mm: Use mm_alloc() in poking_init() (bsc#1212448).
- x86/mm: Use proper mask when setting PUD mapping (git-fixes).
- x86/mm: fix poking_init() for Xen PV guests (git-fixes).
- x86/msi: Fix msi message data shadow struct (git-fixes).
- x86/msr: Add AMD CPPC MSR definitions (bsc#1212445).
- x86/msr: Remove .fixup usage (git-fixes).
- x86/nospec: Unwreck the RSB stuffing (git-fixes).
- x86/numa: Use cpumask_available instead of hardcoded NULL check (git-fixes).
- x86/pat: Fix x86_has_pat_wp() (git-fixes).
- x86/pci/xen: Disable PCI/MSI masking for XEN_HVM guests (git-fixes).
- x86/perf/zhaoxin: Add stepping check for ZXC (git fixes).
- x86/perf: Avoid warning for Arch LBR without XSAVE (git fixes).
- x86/perf: Default set FREEZE_ON_SMI for all (git fixes).
- x86/pm: Add enumeration check before spec MSRs save/restore setup (git-fixes).
- x86/reboot: Disable SVM, not just VMX, when stopping CPUs (git-fixes).
- x86/resctrl: Fix min_cbm_bits for AMD (git-fixes).
- x86/sev: Add SEV-SNP guest feature negotiation support (git-fixes).
- x86/sgx: Fix free page accounting (git-fixes).
- x86/sgx: Fix race between reclaimer and page fault handler (git-fixes).
- x86/sgx: Free backing memory after faulting the enclave page (git-fixes).
- x86/sgx: Free backing memory after faulting the enclave page (git-fixes).
- x86/sgx: Mark PCMD page as dirty when modifying contents (git-fixes).
- x86/sgx: Silence softlockup detection when releasing large enclaves (git-fixes).
- x86/sgx: Silence softlockup detection when releasing large enclaves (git-fixes).
- x86/signal: Fix the value returned by strict_sas_size() (git-fixes).
- x86/speculation/mmio: Print SMT warning (git-fixes).
- x86/speculation: Allow enabling STIBP with legacy IBRS (bsc#1210506 CVE-2023-1998).
- x86/speculation: Identify processors vulnerable to SMT RSB predictions (git-fixes).
- x86/static_call: Serialize __static_call_fixup() properly (git-fixes).
- x86/syscall: Include asm/ptrace.h in syscall_wrapper header (git-fixes).
- x86/topology: Fix duplicated core ID within a package (git-fixes).
- x86/topology: Fix multiple packages shown on a single-package system (git-fixes).
- x86/traps: Use pt_regs directly in fixup_bad_iret() (git-fixes).
- x86/tsx: Add a feature bit for TSX control MSR support (git-fixes).
- x86/tsx: Disable TSX development mode at boot (git-fixes).
- x86/uaccess: Move variable into switch case statement (git-fixes).
- x86/uaccess: Move variable into switch case statement (git-fixes).
- x86/xen: Fix memory leak in xen_init_lock_cpu() (git-fixes).
- x86/xen: Fix memory leak in xen_smp_intr_init{_pv}() (git-fixes).
- x86: ACPI: cstate: Optimize C3 entry on AMD CPUs (git-fixes).
- x86: Annotate call_on_stack() (git-fixes).
- x86: Annotate call_on_stack() (git-fixes).
- x86: Fix return value of __setup handlers (git-fixes).
- x86: Handle idle=nomwait cmdline properly for x86_idle (bsc#1208619).
- x86: Remove vendor checks from prefer_mwait_c1_over_halt (bsc#1208619).
- x86: __memcpy_flushcache: fix wrong alignment if size &gt; 2^32 (git-fixes).
- x86: centralize setting SWIOTLB_FORCE when guest memory encryption is enabled (jsc#PED-3259).
- x86: drop bogus 'cc' clobber from __try_cmpxchg_user_asm() (git-fixes).
- x86: link vdso and boot with -z noexecstack --no-warn-rwx-segments (bsc#1203200).
- x86: link vdso and boot with -z noexecstack --no-warn-rwx-segments (bsc#1203200).
- x86: remove cruft from &amp;lt;asm/dma-mapping.h&gt; (PED-3259).
- xen-netfront: Fix NULL sring after live migration (git-fixes).
- xen-pciback: Allow setting PCI_MSIX_FLAGS_MASKALL too (git-fixes).
- xen/arm: Fix race in RB-tree based P2M accounting (git-fixes)
- xen/netback: do not do grant copy across page boundary (git-fixes).
- xen/netback: do some code cleanup (git-fixes).
- xen/netback: fix build warning (git-fixes).
- xen/netback: use same error messages for same errors (git-fixes).
- xen/netfront: destroy queues before real_num_tx_queues is zeroed (git-fixes).
- xen/platform-pci: add missing free_irq() in error path (git-fixes).
- xen/privcmd: Fix a possible warning in privcmd_ioctl_mmap_resource() (git-fixes).
- xfs: Fix unreferenced object reported by kmemleak in xfs_sysfs_init() (git-fixes).
- xfs: Fix unreferenced object reported by kmemleak in xfs_sysfs_init() (git-fixes).
- xfs: convert ptag flags to unsigned (git-fixes).
- xfs: do not assert fail on perag references on teardown (git-fixes).
- xfs: do not leak btree cursor when insrec fails after a split (git-fixes).
- xfs: estimate post-merge refcounts correctly (bsc#1208183).
- xfs: fix incorrect error-out in xfs_remove (git-fixes).
- xfs: fix incorrect error-out in xfs_remove (git-fixes).
- xfs: fix incorrect i_nlink caused by inode racing (git-fixes).
- xfs: fix incorrect i_nlink caused by inode racing (git-fixes).
- xfs: fix maxlevels comparisons in the btree staging code (git-fixes).
- xfs: fix maxlevels comparisons in the btree staging code (git-fixes).
- xfs: fix memory leak in xfs_errortag_init (git-fixes).
- xfs: fix memory leak in xfs_errortag_init (git-fixes).
- xfs: fix rm_offset flag handling in rmap keys (git-fixes).
- xfs: get rid of assert from xfs_btree_islastblock (git-fixes).
- xfs: get rid of assert from xfs_btree_islastblock (git-fixes).
- xfs: get root inode correctly at bulkstat (git-fixes).
- xfs: get root inode correctly at bulkstat (git-fixes).
- xfs: hoist refcount record merge predicates (bsc#1208183).
- xfs: initialize the check_owner object fully (git-fixes).
- xfs: initialize the check_owner object fully (git-fixes).
- xfs: pass the correct cursor to xfs_iomap_prealloc_size (git-fixes).
- xfs: prevent a WARN_ONCE() in xfs_ioc_attr_list() (git-fixes).
- xfs: prevent a WARN_ONCE() in xfs_ioc_attr_list() (git-fixes).
- xfs: reject crazy array sizes being fed to XFS_IOC_GETBMAP* (git-fixes).
- xfs: reject crazy array sizes being fed to XFS_IOC_GETBMAP* (git-fixes).
- xfs: remove xfs_setattr_time() declaration (git-fixes).
- xfs: return errors in xfs_fs_sync_fs (git-fixes).
- xfs: return errors in xfs_fs_sync_fs (git-fixes).
- xfs: set bnobt/cntbt numrecs correctly when formatting new AGs (git-fixes).
- xfs: verify buffer contents when we skip log replay (bsc#1210498 CVE-2023-2124).
- xfs: zero inode fork buffer at allocation (git-fixes).
- xhci-pci: Only run d3cold avoidance quirk for s2idle (git-fixes).
- xhci-pci: set the dma max_seg_size (git-fixes).
- xhci-pci: set the dma max_seg_size (git-fixes).
- xhci: Fix incorrect tracking of free space on transfer rings (git-fixes).
- xhci: Fix null pointer dereference when host dies (git-fixes).
- xhci: Fix null pointer dereference when host dies (git-fixes).
- xhci: Free the command allocated for setting LPM if we return early (git-fixes).
- xhci: also avoid the XHCI_ZERO_64B_REGS quirk with a passthrough iommu (git-fixes).
- xhci: fix debugfs register accesses while suspended (git-fixes).
- xirc2ps_cs: Fix use after free bug in xirc2ps_detach (git-fixes).
- xprtrdma: Fix regbuf data not freed in rpcrdma_req_create() (git-fixes).
- xsk: Fix corrupted packets for XDP_SHARED_UMEM (git-fixes).
- zram: do not lookup algorithm in backends table (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-11"/>
	<updated date="2023-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109158">SUSE bug 1109158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142685">SUSE bug 1142685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160435">SUSE bug 1160435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166486">SUSE bug 1166486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172073">SUSE bug 1172073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174777">SUSE bug 1174777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177529">SUSE bug 1177529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185861">SUSE bug 1185861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186449">SUSE bug 1186449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189998">SUSE bug 1189998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189999">SUSE bug 1189999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191731">SUSE bug 1191731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195175">SUSE bug 1195175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195655">SUSE bug 1195655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195921">SUSE bug 1195921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196058">SUSE bug 1196058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197534">SUSE bug 1197534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197617">SUSE bug 1197617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198101">SUSE bug 1198101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198400">SUSE bug 1198400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198438">SUSE bug 1198438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198835">SUSE bug 1198835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199304">SUSE bug 1199304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199701">SUSE bug 1199701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200054">SUSE bug 1200054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202353">SUSE bug 1202353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202633">SUSE bug 1202633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203039">SUSE bug 1203039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203200">SUSE bug 1203200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203325">SUSE bug 1203325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203331">SUSE bug 1203331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203332">SUSE bug 1203332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203693">SUSE bug 1203693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203906">SUSE bug 1203906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204356">SUSE bug 1204356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204363">SUSE bug 1204363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204662">SUSE bug 1204662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204993">SUSE bug 1204993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205153">SUSE bug 1205153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205191">SUSE bug 1205191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205205">SUSE bug 1205205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205544">SUSE bug 1205544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205650">SUSE bug 1205650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205756">SUSE bug 1205756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205758">SUSE bug 1205758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205760">SUSE bug 1205760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205762">SUSE bug 1205762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205803">SUSE bug 1205803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205846">SUSE bug 1205846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206024">SUSE bug 1206024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206036">SUSE bug 1206036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206056">SUSE bug 1206056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206057">SUSE bug 1206057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206103">SUSE bug 1206103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206224">SUSE bug 1206224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206232">SUSE bug 1206232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206340">SUSE bug 1206340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206459">SUSE bug 1206459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206492">SUSE bug 1206492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206493">SUSE bug 1206493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206578">SUSE bug 1206578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206640">SUSE bug 1206640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206649">SUSE bug 1206649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206824">SUSE bug 1206824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206843">SUSE bug 1206843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206876">SUSE bug 1206876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206877">SUSE bug 1206877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206878">SUSE bug 1206878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206880">SUSE bug 1206880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206881">SUSE bug 1206881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206882">SUSE bug 1206882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206883">SUSE bug 1206883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206884">SUSE bug 1206884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206885">SUSE bug 1206885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206886">SUSE bug 1206886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206887">SUSE bug 1206887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206888">SUSE bug 1206888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206889">SUSE bug 1206889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206890">SUSE bug 1206890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206891">SUSE bug 1206891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206893">SUSE bug 1206893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206894">SUSE bug 1206894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206935">SUSE bug 1206935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206992">SUSE bug 1206992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207034">SUSE bug 1207034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207036">SUSE bug 1207036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207050">SUSE bug 1207050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207051">SUSE bug 1207051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207088">SUSE bug 1207088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207125">SUSE bug 1207125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207149">SUSE bug 1207149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207158">SUSE bug 1207158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207168">SUSE bug 1207168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207185">SUSE bug 1207185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207270">SUSE bug 1207270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207315">SUSE bug 1207315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207328">SUSE bug 1207328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207497">SUSE bug 1207497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207500">SUSE bug 1207500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207501">SUSE bug 1207501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207506">SUSE bug 1207506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207507">SUSE bug 1207507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207521">SUSE bug 1207521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207553">SUSE bug 1207553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207560">SUSE bug 1207560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207574">SUSE bug 1207574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207588">SUSE bug 1207588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207589">SUSE bug 1207589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207590">SUSE bug 1207590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207591">SUSE bug 1207591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207592">SUSE bug 1207592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207593">SUSE bug 1207593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207594">SUSE bug 1207594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207602">SUSE bug 1207602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207603">SUSE bug 1207603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207605">SUSE bug 1207605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207606">SUSE bug 1207606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207607">SUSE bug 1207607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207608">SUSE bug 1207608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207609">SUSE bug 1207609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207610">SUSE bug 1207610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207611">SUSE bug 1207611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207612">SUSE bug 1207612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207613">SUSE bug 1207613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207614">SUSE bug 1207614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207615">SUSE bug 1207615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207616">SUSE bug 1207616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207617">SUSE bug 1207617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207618">SUSE bug 1207618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207619">SUSE bug 1207619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207620">SUSE bug 1207620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207621">SUSE bug 1207621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207622">SUSE bug 1207622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207623">SUSE bug 1207623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207624">SUSE bug 1207624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207625">SUSE bug 1207625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207626">SUSE bug 1207626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207627">SUSE bug 1207627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207628">SUSE bug 1207628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207629">SUSE bug 1207629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207630">SUSE bug 1207630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207631">SUSE bug 1207631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207632">SUSE bug 1207632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207633">SUSE bug 1207633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207634">SUSE bug 1207634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207635">SUSE bug 1207635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207636">SUSE bug 1207636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207637">SUSE bug 1207637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207638">SUSE bug 1207638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207639">SUSE bug 1207639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207640">SUSE bug 1207640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207641">SUSE bug 1207641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207642">SUSE bug 1207642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207643">SUSE bug 1207643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207644">SUSE bug 1207644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207645">SUSE bug 1207645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207646">SUSE bug 1207646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207647">SUSE bug 1207647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207648">SUSE bug 1207648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207649">SUSE bug 1207649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207650">SUSE bug 1207650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207651">SUSE bug 1207651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207652">SUSE bug 1207652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207653">SUSE bug 1207653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207734">SUSE bug 1207734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207768">SUSE bug 1207768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207769">SUSE bug 1207769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207770">SUSE bug 1207770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207771">SUSE bug 1207771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207773">SUSE bug 1207773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207795">SUSE bug 1207795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207827">SUSE bug 1207827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207842">SUSE bug 1207842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207845">SUSE bug 1207845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207875">SUSE bug 1207875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207878">SUSE bug 1207878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207933">SUSE bug 1207933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207935">SUSE bug 1207935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207948">SUSE bug 1207948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208050">SUSE bug 1208050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208076">SUSE bug 1208076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208081">SUSE bug 1208081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208105">SUSE bug 1208105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208107">SUSE bug 1208107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208128">SUSE bug 1208128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208130">SUSE bug 1208130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208149">SUSE bug 1208149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208153">SUSE bug 1208153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208183">SUSE bug 1208183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208212">SUSE bug 1208212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208219">SUSE bug 1208219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208290">SUSE bug 1208290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208368">SUSE bug 1208368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208410">SUSE bug 1208410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208420">SUSE bug 1208420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208428">SUSE bug 1208428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208429">SUSE bug 1208429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208449">SUSE bug 1208449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208534">SUSE bug 1208534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208541">SUSE bug 1208541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208542">SUSE bug 1208542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208570">SUSE bug 1208570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208588">SUSE bug 1208588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208598">SUSE bug 1208598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208599">SUSE bug 1208599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208600">SUSE bug 1208600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208601">SUSE bug 1208601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208602">SUSE bug 1208602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208604">SUSE bug 1208604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208605">SUSE bug 1208605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208607">SUSE bug 1208607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208619">SUSE bug 1208619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208628">SUSE bug 1208628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208700">SUSE bug 1208700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208741">SUSE bug 1208741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208758">SUSE bug 1208758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208759">SUSE bug 1208759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208776">SUSE bug 1208776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208777">SUSE bug 1208777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208784">SUSE bug 1208784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208787">SUSE bug 1208787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208815">SUSE bug 1208815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208816">SUSE bug 1208816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208829">SUSE bug 1208829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208837">SUSE bug 1208837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208843">SUSE bug 1208843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208845">SUSE bug 1208845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208848">SUSE bug 1208848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208864">SUSE bug 1208864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208902">SUSE bug 1208902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208948">SUSE bug 1208948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208976">SUSE bug 1208976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209008">SUSE bug 1209008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209039">SUSE bug 1209039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209052">SUSE bug 1209052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209092">SUSE bug 1209092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209159">SUSE bug 1209159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209256">SUSE bug 1209256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209258">SUSE bug 1209258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209262">SUSE bug 1209262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209287">SUSE bug 1209287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209288">SUSE bug 1209288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209290">SUSE bug 1209290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209291">SUSE bug 1209291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209292">SUSE bug 1209292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209366">SUSE bug 1209366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209367">SUSE bug 1209367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209436">SUSE bug 1209436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209457">SUSE bug 1209457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209504">SUSE bug 1209504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209532">SUSE bug 1209532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209556">SUSE bug 1209556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209600">SUSE bug 1209600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209615">SUSE bug 1209615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209635">SUSE bug 1209635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209636">SUSE bug 1209636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209637">SUSE bug 1209637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209684">SUSE bug 1209684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209687">SUSE bug 1209687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209693">SUSE bug 1209693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209739">SUSE bug 1209739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209779">SUSE bug 1209779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209780">SUSE bug 1209780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209788">SUSE bug 1209788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209798">SUSE bug 1209798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209799">SUSE bug 1209799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209804">SUSE bug 1209804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209805">SUSE bug 1209805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209856">SUSE bug 1209856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209871">SUSE bug 1209871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209927">SUSE bug 1209927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209980">SUSE bug 1209980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209982">SUSE bug 1209982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209999">SUSE bug 1209999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210034">SUSE bug 1210034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210050">SUSE bug 1210050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210158">SUSE bug 1210158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210165">SUSE bug 1210165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210202">SUSE bug 1210202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210203">SUSE bug 1210203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210206">SUSE bug 1210206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210216">SUSE bug 1210216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210230">SUSE bug 1210230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210294">SUSE bug 1210294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210301">SUSE bug 1210301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210329">SUSE bug 1210329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210336">SUSE bug 1210336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210337">SUSE bug 1210337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210409">SUSE bug 1210409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210439">SUSE bug 1210439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210449">SUSE bug 1210449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210450">SUSE bug 1210450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210453">SUSE bug 1210453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210454">SUSE bug 1210454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210469">SUSE bug 1210469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210498">SUSE bug 1210498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210506">SUSE bug 1210506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210533">SUSE bug 1210533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210551">SUSE bug 1210551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210629">SUSE bug 1210629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210644">SUSE bug 1210644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210647">SUSE bug 1210647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210725">SUSE bug 1210725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210741">SUSE bug 1210741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210762">SUSE bug 1210762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210763">SUSE bug 1210763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210764">SUSE bug 1210764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210765">SUSE bug 1210765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210766">SUSE bug 1210766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210767">SUSE bug 1210767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210768">SUSE bug 1210768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210769">SUSE bug 1210769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210770">SUSE bug 1210770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210771">SUSE bug 1210771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210775">SUSE bug 1210775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210783">SUSE bug 1210783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210791">SUSE bug 1210791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210793">SUSE bug 1210793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210806">SUSE bug 1210806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210816">SUSE bug 1210816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210817">SUSE bug 1210817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210827">SUSE bug 1210827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210940">SUSE bug 1210940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210943">SUSE bug 1210943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210947">SUSE bug 1210947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210953">SUSE bug 1210953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210986">SUSE bug 1210986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211025">SUSE bug 1211025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211037">SUSE bug 1211037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211043">SUSE bug 1211043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211044">SUSE bug 1211044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211089">SUSE bug 1211089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211105">SUSE bug 1211105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211113">SUSE bug 1211113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211131">SUSE bug 1211131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211205">SUSE bug 1211205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211263">SUSE bug 1211263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211280">SUSE bug 1211280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211281">SUSE bug 1211281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211299">SUSE bug 1211299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211346">SUSE bug 1211346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211387">SUSE bug 1211387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211400">SUSE bug 1211400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211410">SUSE bug 1211410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211414">SUSE bug 1211414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211449">SUSE bug 1211449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211465">SUSE bug 1211465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211519">SUSE bug 1211519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211564">SUSE bug 1211564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211590">SUSE bug 1211590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211592">SUSE bug 1211592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211593">SUSE bug 1211593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211595">SUSE bug 1211595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211654">SUSE bug 1211654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211686">SUSE bug 1211686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211687">SUSE bug 1211687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211688">SUSE bug 1211688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211689">SUSE bug 1211689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211690">SUSE bug 1211690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211691">SUSE bug 1211691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211692">SUSE bug 1211692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211693">SUSE bug 1211693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211714">SUSE bug 1211714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211794">SUSE bug 1211794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211796">SUSE bug 1211796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211804">SUSE bug 1211804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211807">SUSE bug 1211807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211808">SUSE bug 1211808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211820">SUSE bug 1211820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211836">SUSE bug 1211836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211847">SUSE bug 1211847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211852">SUSE bug 1211852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211855">SUSE bug 1211855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211960">SUSE bug 1211960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212129">SUSE bug 1212129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212154">SUSE bug 1212154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212155">SUSE bug 1212155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212158">SUSE bug 1212158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212350">SUSE bug 1212350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212405">SUSE bug 1212405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212445">SUSE bug 1212445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212448">SUSE bug 1212448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212494">SUSE bug 1212494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212495">SUSE bug 1212495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212504">SUSE bug 1212504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212513">SUSE bug 1212513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212540">SUSE bug 1212540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212556">SUSE bug 1212556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212561">SUSE bug 1212561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212563">SUSE bug 1212563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212564">SUSE bug 1212564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212584">SUSE bug 1212584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212592">SUSE bug 1212592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212605">SUSE bug 1212605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212606">SUSE bug 1212606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212619">SUSE bug 1212619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212701">SUSE bug 1212701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212741">SUSE bug 1212741</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-24588">CVE-2020-24588 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2196/">CVE-2022-2196 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2196">CVE-2022-2196 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3523/">CVE-2022-3523 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3523">CVE-2022-3523 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36280/">CVE-2022-36280 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36280">CVE-2022-36280 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38096/">CVE-2022-38096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38096">CVE-2022-38096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4269/">CVE-2022-4269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4269">CVE-2022-4269 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45884/">CVE-2022-45884 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45884">CVE-2022-45884 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45885/">CVE-2022-45885 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45885">CVE-2022-45885 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45886/">CVE-2022-45886 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45886">CVE-2022-45886 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45887/">CVE-2022-45887 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45887">CVE-2022-45887 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45919/">CVE-2022-45919 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45919">CVE-2022-45919 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4744/">CVE-2022-4744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4744">CVE-2022-4744 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0045/">CVE-2023-0045 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0045">CVE-2023-0045 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0122/">CVE-2023-0122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0122">CVE-2023-0122 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0179/">CVE-2023-0179 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0179">CVE-2023-0179 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0386/">CVE-2023-0386 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0386">CVE-2023-0386 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0394/">CVE-2023-0394 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0394">CVE-2023-0394 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0461/">CVE-2023-0461 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0461">CVE-2023-0461 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0469/">CVE-2023-0469 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0469">CVE-2023-0469 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0590/">CVE-2023-0590 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0590">CVE-2023-0590 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0597/">CVE-2023-0597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0597">CVE-2023-0597 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1075/">CVE-2023-1075 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1075">CVE-2023-1075 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1076/">CVE-2023-1076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1076">CVE-2023-1076 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1077/">CVE-2023-1077 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1077">CVE-2023-1077 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1078/">CVE-2023-1078 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1078">CVE-2023-1078 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1079/">CVE-2023-1079 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1079">CVE-2023-1079 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1095/">CVE-2023-1095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1095">CVE-2023-1095 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1118/">CVE-2023-1118 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1118">CVE-2023-1118 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-1249/">CVE-2023-1249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1249">CVE-2023-1249 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1382/">CVE-2023-1382 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1382">CVE-2023-1382 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1513/">CVE-2023-1513 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1513">CVE-2023-1513 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1582/">CVE-2023-1582 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1582">CVE-2023-1582 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1583/">CVE-2023-1583 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1583">CVE-2023-1583 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1611/">CVE-2023-1611 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1611">CVE-2023-1611 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1637/">CVE-2023-1637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1637">CVE-2023-1637 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1652/">CVE-2023-1652 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1652">CVE-2023-1652 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1670/">CVE-2023-1670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1670">CVE-2023-1670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1838/">CVE-2023-1838 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1838">CVE-2023-1838 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1855/">CVE-2023-1855 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1855">CVE-2023-1855 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1989/">CVE-2023-1989 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1989">CVE-2023-1989 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1998/">CVE-2023-1998 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1998">CVE-2023-1998 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2002/">CVE-2023-2002 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2002">CVE-2023-2002 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-21102/">CVE-2023-21102 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21102">CVE-2023-21102 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-21106/">CVE-2023-21106 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21106">CVE-2023-21106 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2124/">CVE-2023-2124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2124">CVE-2023-2124 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2156/">CVE-2023-2156 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2156">CVE-2023-2156 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2162/">CVE-2023-2162 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2162">CVE-2023-2162 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2176/">CVE-2023-2176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2176">CVE-2023-2176 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2235/">CVE-2023-2235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2235">CVE-2023-2235 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2269/">CVE-2023-2269 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2269">CVE-2023-2269 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22998/">CVE-2023-22998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22998">CVE-2023-22998 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-23000/">CVE-2023-23000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23000">CVE-2023-23000 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-23001/">CVE-2023-23001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23001">CVE-2023-23001 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23004/">CVE-2023-23004 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23004">CVE-2023-23004 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-23006/">CVE-2023-23006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23006">CVE-2023-23006 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23454/">CVE-2023-23454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23454">CVE-2023-23454 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23455/">CVE-2023-23455 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23455">CVE-2023-23455 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2483/">CVE-2023-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-2483">CVE-2023-2483 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-25012/">CVE-2023-25012 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25012">CVE-2023-25012 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2513/">CVE-2023-2513 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2513">CVE-2023-2513 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26545/">CVE-2023-26545 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26545">CVE-2023-26545 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28327/">CVE-2023-28327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28327">CVE-2023-28327 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28410/">CVE-2023-28410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28410">CVE-2023-28410 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28464/">CVE-2023-28464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28464">CVE-2023-28464 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28466/">CVE-2023-28466 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28466">CVE-2023-28466 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28866/">CVE-2023-28866 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28866">CVE-2023-28866 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3006/">CVE-2023-3006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3006">CVE-2023-3006 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-30456/">CVE-2023-30456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30456">CVE-2023-30456 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-30772/">CVE-2023-30772 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30772">CVE-2023-30772 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31084/">CVE-2023-31084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31084">CVE-2023-31084 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-3141/">CVE-2023-3141 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3141">CVE-2023-3141 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31436/">CVE-2023-31436 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31436">CVE-2023-31436 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3161/">CVE-2023-3161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3161">CVE-2023-3161 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3220/">CVE-2023-3220 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3220">CVE-2023-3220 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32233/">CVE-2023-32233 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32233">CVE-2023-32233 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-33288/">CVE-2023-33288 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33288">CVE-2023-33288 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3357/">CVE-2023-3357 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3357">CVE-2023-3357 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3358/">CVE-2023-3358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3358">CVE-2023-3358 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-33951/">CVE-2023-33951 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33951">CVE-2023-33951 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-33952/">CVE-2023-33952 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33952">CVE-2023-33952 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35788/">CVE-2023-35788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35788">CVE-2023-35788 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-35823/">CVE-2023-35823 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35823">CVE-2023-35823 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35828/">CVE-2023-35828 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35828">CVE-2023-35828 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35829/">CVE-2023-35829 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35829">CVE-2023-35829 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009770942" comment="cluster-md-kmp-rt-5.14.21-150500.13.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770943" comment="dlm-kmp-rt-5.14.21-150500.13.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770944" comment="gfs2-kmp-rt-5.14.21-150500.13.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770945" comment="kernel-devel-rt-5.14.21-150500.13.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770946" comment="kernel-rt-5.14.21-150500.13.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770947" comment="kernel-rt-devel-5.14.21-150500.13.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770948" comment="kernel-rt-extra-5.14.21-150500.13.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770949" comment="kernel-rt-livepatch-5.14.21-150500.13.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770950" comment="kernel-rt-livepatch-devel-5.14.21-150500.13.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770951" comment="kernel-rt-optional-5.14.21-150500.13.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770952" comment="kernel-rt-vdso-5.14.21-150500.13.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770953" comment="kernel-rt_debug-5.14.21-150500.13.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770954" comment="kernel-rt_debug-devel-5.14.21-150500.13.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770955" comment="kernel-rt_debug-livepatch-devel-5.14.21-150500.13.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770956" comment="kernel-rt_debug-vdso-5.14.21-150500.13.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770957" comment="kernel-source-rt-5.14.21-150500.13.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770958" comment="kernel-syms-rt-5.14.21-150500.13.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770959" comment="kselftests-kmp-rt-5.14.21-150500.13.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770960" comment="ocfs2-kmp-rt-5.14.21-150500.13.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770961" comment="reiserfs-kmp-rt-5.14.21-150500.13.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4225" version="1" class="patch">
	<metadata>
		<title>Security update for geoipupdate (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206346" ref_url="https://bugzilla.suse.com/1206346" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015474.html" source="SUSE-SU"/>
		<description>

This update of geoipupdate fixes the following issues:

- rebuild the package with the go 1.20 security release (bsc#1206346).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-12"/>
	<updated date="2023-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206346">SUSE bug 1206346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009769137" comment="geoipupdate-4.2.2-150000.1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769138" comment="geoipupdate-legacy-4.2.2-150000.1.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4226" version="1" class="patch">
	<metadata>
		<title>Security update for rabbitmq-c (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212499" ref_url="https://bugzilla.suse.com/1212499" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-35789" ref_url="https://www.suse.com/security/cve/CVE-2023-35789/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018036.html" source="SUSE-SU"/>
		<description>
This update for rabbitmq-c fixes the following issues:

- CVE-2023-35789: Fixed insecure credentials submission (bsc#1212499).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-14"/>
	<updated date="2023-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212499">SUSE bug 1212499</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-35789/">CVE-2023-35789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35789">CVE-2023-35789 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009769975" comment="librabbitmq-devel-0.10.0-150300.5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769976" comment="librabbitmq4-0.10.0-150300.5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769977" comment="rabbitmq-c-tools-0.10.0-150300.5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4227" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211798" ref_url="https://bugzilla.suse.com/1211798" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32763" ref_url="https://www.suse.com/security/cve/CVE-2023-32763/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018044.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- CVE-2023-32763: Fixed an overflow in QTextLayout (bsc#1211798).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-14"/>
	<updated date="2023-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211798">SUSE bug 1211798</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32763/">CVE-2023-32763 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32763">CVE-2023-32763 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009770485" comment="libQt5Bootstrap-devel-static-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770486" comment="libQt5Bootstrap-devel-static-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770487" comment="libQt5Concurrent-devel-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770488" comment="libQt5Concurrent-devel-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770489" comment="libQt5Concurrent5-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770490" comment="libQt5Concurrent5-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770491" comment="libQt5Core-devel-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770492" comment="libQt5Core-devel-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770493" comment="libQt5Core-private-headers-devel-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770494" comment="libQt5Core5-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770495" comment="libQt5Core5-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770496" comment="libQt5DBus-devel-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770497" comment="libQt5DBus-devel-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770498" comment="libQt5DBus-private-headers-devel-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770499" comment="libQt5DBus5-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770500" comment="libQt5DBus5-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770501" comment="libQt5Gui-devel-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770502" comment="libQt5Gui-devel-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770503" comment="libQt5Gui-private-headers-devel-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770504" comment="libQt5Gui5-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770505" comment="libQt5Gui5-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770506" comment="libQt5KmsSupport-devel-static-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770507" comment="libQt5KmsSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770508" comment="libQt5Network-devel-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770509" comment="libQt5Network-devel-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770510" comment="libQt5Network-private-headers-devel-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770511" comment="libQt5Network5-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770512" comment="libQt5Network5-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770513" comment="libQt5OpenGL-devel-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770514" comment="libQt5OpenGL-devel-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770515" comment="libQt5OpenGL-private-headers-devel-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770516" comment="libQt5OpenGL5-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770517" comment="libQt5OpenGL5-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770518" comment="libQt5OpenGLExtensions-devel-static-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770519" comment="libQt5OpenGLExtensions-devel-static-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770520" comment="libQt5PlatformHeaders-devel-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770521" comment="libQt5PlatformSupport-devel-static-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770522" comment="libQt5PlatformSupport-devel-static-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770523" comment="libQt5PlatformSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770524" comment="libQt5PrintSupport-devel-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770525" comment="libQt5PrintSupport-devel-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770526" comment="libQt5PrintSupport-private-headers-devel-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770527" comment="libQt5PrintSupport5-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770528" comment="libQt5PrintSupport5-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770529" comment="libQt5Sql-devel-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770530" comment="libQt5Sql-devel-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770531" comment="libQt5Sql-private-headers-devel-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770532" comment="libQt5Sql5-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770533" comment="libQt5Sql5-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770534" comment="libQt5Sql5-mysql-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770535" comment="libQt5Sql5-mysql-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770536" comment="libQt5Sql5-postgresql-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770537" comment="libQt5Sql5-postgresql-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770538" comment="libQt5Sql5-sqlite-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770539" comment="libQt5Sql5-sqlite-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770540" comment="libQt5Sql5-unixODBC-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770541" comment="libQt5Sql5-unixODBC-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770542" comment="libQt5Test-devel-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770543" comment="libQt5Test-devel-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770544" comment="libQt5Test-private-headers-devel-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770545" comment="libQt5Test5-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770546" comment="libQt5Test5-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770547" comment="libQt5Widgets-devel-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770548" comment="libQt5Widgets-devel-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770549" comment="libQt5Widgets-private-headers-devel-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770550" comment="libQt5Widgets5-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770551" comment="libQt5Widgets5-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770552" comment="libQt5Xml-devel-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770553" comment="libQt5Xml-devel-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770554" comment="libQt5Xml5-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770555" comment="libQt5Xml5-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770556" comment="libqt5-qtbase-common-devel-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770557" comment="libqt5-qtbase-devel-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770558" comment="libqt5-qtbase-examples-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770559" comment="libqt5-qtbase-examples-32bit-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770560" comment="libqt5-qtbase-platformtheme-gtk3-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770561" comment="libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.8+kde185-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770562" comment="libqt5-qtbase-private-headers-devel-5.15.8+kde185-150500.4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4228" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212349" ref_url="https://bugzilla.suse.com/1212349" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3247" ref_url="https://www.suse.com/security/cve/CVE-2023-3247/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015494.html" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2023-3247: Fixed missing error check and insufficient random bytes in HTTP Digest authentication for SOAP (bsc#1212349).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-14"/>
	<updated date="2023-07-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212349">SUSE bug 1212349</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3247/">CVE-2023-3247 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3247">CVE-2023-3247 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009767142" comment="apache2-mod_php7-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767143" comment="php7-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767144" comment="php7-bcmath-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767145" comment="php7-bz2-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767146" comment="php7-calendar-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767147" comment="php7-cli-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767148" comment="php7-ctype-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767149" comment="php7-curl-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767150" comment="php7-dba-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767151" comment="php7-devel-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767152" comment="php7-dom-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767153" comment="php7-embed-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767154" comment="php7-enchant-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767155" comment="php7-exif-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767156" comment="php7-fastcgi-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767157" comment="php7-fileinfo-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767158" comment="php7-fpm-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767159" comment="php7-ftp-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767160" comment="php7-gd-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767161" comment="php7-gettext-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767162" comment="php7-gmp-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767163" comment="php7-iconv-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767164" comment="php7-intl-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767165" comment="php7-json-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767166" comment="php7-ldap-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767167" comment="php7-mbstring-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767168" comment="php7-mysql-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767169" comment="php7-odbc-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767170" comment="php7-opcache-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767171" comment="php7-openssl-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767172" comment="php7-pcntl-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767173" comment="php7-pdo-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767174" comment="php7-pgsql-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767175" comment="php7-phar-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767176" comment="php7-posix-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767177" comment="php7-readline-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767178" comment="php7-shmop-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767179" comment="php7-snmp-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767180" comment="php7-soap-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767181" comment="php7-sockets-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767182" comment="php7-sodium-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767183" comment="php7-sqlite-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767184" comment="php7-sysvmsg-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767185" comment="php7-sysvsem-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767186" comment="php7-sysvshm-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767187" comment="php7-test-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767188" comment="php7-tidy-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767189" comment="php7-tokenizer-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767190" comment="php7-xmlreader-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767191" comment="php7-xmlrpc-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767192" comment="php7-xmlwriter-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767193" comment="php7-xsl-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767194" comment="php7-zip-7.4.33-150400.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767195" comment="php7-zlib-7.4.33-150400.4.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4229" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212711" ref_url="https://bugzilla.suse.com/1212711" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-36664" ref_url="https://www.suse.com/security/cve/CVE-2023-36664/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015493.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

  - CVE-2023-36664: Fixed permission validation mishandling for pipe devices with the %pipe% prefix or the | pipe character prefix (bsc#1212711).

		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-14"/>
	<updated date="2023-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212711">SUSE bug 1212711</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-36664/">CVE-2023-36664 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36664">CVE-2023-36664 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009770405" comment="ghostscript-9.52-150000.167.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770406" comment="ghostscript-devel-9.52-150000.167.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770407" comment="ghostscript-x11-9.52-150000.167.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4230" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1160435" ref_url="https://bugzilla.suse.com/1160435" source="BUGZILLA"/>
		<reference ref_id="1198400" ref_url="https://bugzilla.suse.com/1198400" source="BUGZILLA"/>
		<reference ref_id="1208604" ref_url="https://bugzilla.suse.com/1208604" source="BUGZILLA"/>
		<reference ref_id="1209039" ref_url="https://bugzilla.suse.com/1209039" source="BUGZILLA"/>
		<reference ref_id="1209779" ref_url="https://bugzilla.suse.com/1209779" source="BUGZILLA"/>
		<reference ref_id="1210533" ref_url="https://bugzilla.suse.com/1210533" source="BUGZILLA"/>
		<reference ref_id="1211449" ref_url="https://bugzilla.suse.com/1211449" source="BUGZILLA"/>
		<reference ref_id="1212051" ref_url="https://bugzilla.suse.com/1212051" source="BUGZILLA"/>
		<reference ref_id="1212128" ref_url="https://bugzilla.suse.com/1212128" source="BUGZILLA"/>
		<reference ref_id="1212129" ref_url="https://bugzilla.suse.com/1212129" source="BUGZILLA"/>
		<reference ref_id="1212154" ref_url="https://bugzilla.suse.com/1212154" source="BUGZILLA"/>
		<reference ref_id="1212158" ref_url="https://bugzilla.suse.com/1212158" source="BUGZILLA"/>
		<reference ref_id="1212501" ref_url="https://bugzilla.suse.com/1212501" source="BUGZILLA"/>
		<reference ref_id="1212502" ref_url="https://bugzilla.suse.com/1212502" source="BUGZILLA"/>
		<reference ref_id="1212606" ref_url="https://bugzilla.suse.com/1212606" source="BUGZILLA"/>
		<reference ref_id="1212842" ref_url="https://bugzilla.suse.com/1212842" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1079" ref_url="https://www.suse.com/security/cve/CVE-2023-1079/" source="CVE"/>
		<reference ref_id="CVE-2023-1249" ref_url="https://www.suse.com/security/cve/CVE-2023-1249/" source="CVE"/>
		<reference ref_id="CVE-2023-1637" ref_url="https://www.suse.com/security/cve/CVE-2023-1637/" source="CVE"/>
		<reference ref_id="CVE-2023-2002" ref_url="https://www.suse.com/security/cve/CVE-2023-2002/" source="CVE"/>
		<reference ref_id="CVE-2023-3090" ref_url="https://www.suse.com/security/cve/CVE-2023-3090/" source="CVE"/>
		<reference ref_id="CVE-2023-3111" ref_url="https://www.suse.com/security/cve/CVE-2023-3111/" source="CVE"/>
		<reference ref_id="CVE-2023-3141" ref_url="https://www.suse.com/security/cve/CVE-2023-3141/" source="CVE"/>
		<reference ref_id="CVE-2023-3159" ref_url="https://www.suse.com/security/cve/CVE-2023-3159/" source="CVE"/>
		<reference ref_id="CVE-2023-3161" ref_url="https://www.suse.com/security/cve/CVE-2023-3161/" source="CVE"/>
		<reference ref_id="CVE-2023-3268" ref_url="https://www.suse.com/security/cve/CVE-2023-3268/" source="CVE"/>
		<reference ref_id="CVE-2023-3358" ref_url="https://www.suse.com/security/cve/CVE-2023-3358/" source="CVE"/>
		<reference ref_id="CVE-2023-35824" ref_url="https://www.suse.com/security/cve/CVE-2023-35824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015491.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2023-1079: Fixed a use-after-free problem that could have been triggered in asus_kbd_backlight_set when plugging/disconnecting a malicious USB device (bsc#1208604).
- CVE-2023-1249: Fixed a use-after-free flaw in the core dump subsystem that allowed a local user to crash the system (bsc#1209039).
- CVE-2023-1637: Fixed vulnerability that could lead to unauthorized access to CPU memory after resuming CPU from suspend-to-RAM (bsc#1209779).
- CVE-2023-2002: Fixed a flaw that allowed an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication (bsc#1210533).
- CVE-2023-3090: Fixed a heap out-of-bounds write in the ipvlan network driver (bsc#1212842).
- CVE-2023-3111: Fixed a use-after-free vulnerability in prepare_to_relocate in fs/btrfs/relocation.c (bsc#1212051).
- CVE-2023-3141: Fixed a use-after-free flaw in r592_remove in drivers/memstick/host/r592.c, that allowed local attackers to crash the system at device disconnect (bsc#1212129).
- CVE-2023-3159: Fixed use-after-free issue in driver/firewire in outbound_phy_packet_callback (bsc#1212128).
- CVE-2023-3161: Fixed shift-out-of-bounds in fbcon_set_font() (bsc#1212154).
- CVE-2023-3268: Fixed an out of bounds flaw in relay_file_read_start_pos in kernel/relay.c that allowed a local attacker to crash the system or leak kernel internal information (bsc#1212502).
- CVE-2023-3358: Fixed a NULL pointer dereference flaw in the Integrated Sensor Hub (ISH) driver (bsc#1212606).
- CVE-2023-35824: Fixed a use-after-free in dm1105_remove in drivers/media/pci/dm1105/dm1105.c (bsc#1212501).

The following non-security bugs were fixed:

- Fix missing top level chapter numbers on SLE12 SP5 (bsc#1212158).
- Move setting %%build_html to config.sh
- Move setting %%split_optional to config.sh
- Move setting %%supported_modules_check to config.sh
- rpm/kernel-binary.spec.in: Fix compatibility wth newer rpm
- rpm/kernel-docs.spec.in: pass PYTHON=python3 to fix build error (bsc#1160435)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-14"/>
	<updated date="2023-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160435">SUSE bug 1160435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198400">SUSE bug 1198400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208604">SUSE bug 1208604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209039">SUSE bug 1209039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209779">SUSE bug 1209779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210533">SUSE bug 1210533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211449">SUSE bug 1211449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212051">SUSE bug 1212051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212128">SUSE bug 1212128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212129">SUSE bug 1212129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212154">SUSE bug 1212154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212158">SUSE bug 1212158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212501">SUSE bug 1212501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212502">SUSE bug 1212502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212606">SUSE bug 1212606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212842">SUSE bug 1212842</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1079/">CVE-2023-1079 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1079">CVE-2023-1079 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-1249/">CVE-2023-1249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1249">CVE-2023-1249 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1637/">CVE-2023-1637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1637">CVE-2023-1637 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2002/">CVE-2023-2002 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2002">CVE-2023-2002 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3090/">CVE-2023-3090 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3090">CVE-2023-3090 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3111/">CVE-2023-3111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3111">CVE-2023-3111 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-3141/">CVE-2023-3141 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3141">CVE-2023-3141 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3159/">CVE-2023-3159 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3159">CVE-2023-3159 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3161/">CVE-2023-3161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3161">CVE-2023-3161 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3268/">CVE-2023-3268 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3268">CVE-2023-3268 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3358/">CVE-2023-3358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3358">CVE-2023-3358 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-35824/">CVE-2023-35824 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35824">CVE-2023-35824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009770846" comment="kernel-vanilla-4.12.14-150100.197.151.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770847" comment="kernel-vanilla-base-4.12.14-150100.197.151.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770848" comment="kernel-vanilla-devel-4.12.14-150100.197.151.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770849" comment="kernel-vanilla-livepatch-devel-4.12.14-150100.197.151.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4231" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212090" ref_url="https://bugzilla.suse.com/1212090" source="BUGZILLA"/>
		<reference ref_id="1212544" ref_url="https://bugzilla.suse.com/1212544" source="BUGZILLA"/>
		<reference ref_id="1212567" ref_url="https://bugzilla.suse.com/1212567" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2828" ref_url="https://www.suse.com/security/cve/CVE-2023-2828/" source="CVE"/>
		<reference ref_id="CVE-2023-2911" ref_url="https://www.suse.com/security/cve/CVE-2023-2911/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015499.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

Update to release 9.16.42

Security Fixes:

* The overmem cleaning process has been improved, to prevent the
  cache from significantly exceeding the configured
  max-cache-size limit. (CVE-2023-2828)
* A query that prioritizes stale data over lookup triggers a
  fetch to refresh the stale data in cache. If the fetch is
  aborted for exceeding the recursion quota, it was possible for
  named to enter an infinite callback loop and crash due to stack
  overflow. This has been fixed. (CVE-2023-2911)

Bug Fixes:

* Previously, it was possible for a delegation from cache to be
  returned to the client after the stale-answer-client-timeout
  duration. This has been fixed.  [bsc#1212544, bsc#1212567, jsc#SLE-24600]

Update to release 9.16.41

Bug Fixes:

* When removing delegations from an opt-out range,
  empty-non-terminal NSEC3 records generated by those delegations
  were not cleaned up. This has been fixed.  [jsc#SLE-24600]

Update to release 9.16.40

Bug Fixes:

* Logfiles using timestamp-style suffixes were not always
  correctly removed when the number of files exceeded the limit
  set by versions. This has been fixed for configurations which
  do not explicitly specify a directory path as part of the file
  argument in the channel specification.
* Performance of DNSSEC validation in zones with many DNSKEY
  records has been improved.

Update to release 9.16.39

Feature Changes:

* libuv support for receiving multiple UDP messages in a single
  recvmmsg() system call has been tweaked several times between
  libuv versions 1.35.0 and 1.40.0; the current recommended libuv
  version is 1.40.0 or higher. New rules are now in effect for
  running with a different version of libuv than the one used at
  compilation time. These rules may trigger a fatal error at
  startup:
  - Building against or running with libuv versions 1.35.0 and
    1.36.0 is now a fatal error.
  - Running with libuv version higher than 1.34.2 is now a
    fatal error when named is built against libuv version
    1.34.2 or lower.
  - Running with libuv version higher than 1.39.0 is now a
    fatal error when named is built against libuv version
    1.37.0, 1.38.0, 1.38.1, or 1.39.0.

* This prevents the use of libuv versions that may trigger an
  assertion failure when receiving multiple UDP messages in a
  single system call.

Bug Fixes:

* named could crash with an assertion failure when adding a new
  zone into the configuration file for a name which was already
  configured as a member zone for a catalog zone. This has been
  fixed.
* When named starts up, it sends a query for the DNSSEC key for
  each configured trust anchor to determine whether the key has
  changed. In some unusual cases, the query might depend on a
  zone for which the server is itself authoritative, and would
  have failed if it were sent before the zone was fully loaded.
  This has now been fixed by delaying the key queries until all
  zones have finished loading. [jsc#SLE-24600]
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-14"/>
	<updated date="2023-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212090">SUSE bug 1212090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212544">SUSE bug 1212544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212567">SUSE bug 1212567</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2828/">CVE-2023-2828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2828">CVE-2023-2828 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2911/">CVE-2023-2911 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2911">CVE-2023-2911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771329" comment="bind-9.16.42-150500.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771330" comment="bind-doc-9.16.42-150500.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771331" comment="bind-utils-9.16.42-150500.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771332" comment="python3-bind-9.16.42-150500.8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4232" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210866" ref_url="https://bugzilla.suse.com/1210866" source="BUGZILLA"/>
		<reference ref_id="1212742" ref_url="https://bugzilla.suse.com/1212742" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-31047" ref_url="https://www.suse.com/security/cve/CVE-2023-31047/" source="CVE"/>
		<reference ref_id="CVE-2023-36053" ref_url="https://www.suse.com/security/cve/CVE-2023-36053/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015497.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

- CVE-2023-31047: Fixed a potential bypass of validation when uploading multiple files using one form field (bsc#1210866).
- CVE-2023-36053: Fixed potential regular expression denial of service vulnerability in EmailValidator/URLValidator (bsc#1212742).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-14"/>
	<updated date="2023-07-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210866">SUSE bug 1210866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212742">SUSE bug 1212742</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-31047/">CVE-2023-31047 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31047">CVE-2023-31047 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-36053/">CVE-2023-36053 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36053">CVE-2023-36053 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771998" comment="python3-Django-2.0.7-150000.1.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4233" version="1" class="patch">
	<metadata>
		<title>Security update for bouncycastle (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212508" ref_url="https://bugzilla.suse.com/1212508" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-33201" ref_url="https://www.suse.com/security/cve/CVE-2023-33201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015507.html" source="SUSE-SU"/>
		<description>
This update for bouncycastle fixes the following issues:

- CVE-2023-33201: Fixed an issue with the X509LDAPCertStoreSpi where a specially crafted certificate subject could be used to try and extract extra information out of an LDAP server (bsc#1212508).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-17"/>
	<updated date="2023-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212508">SUSE bug 1212508</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-33201/">CVE-2023-33201 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33201">CVE-2023-33201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009769317" comment="bouncycastle-1.74-150200.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769318" comment="bouncycastle-javadoc-1.74-150200.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769334" comment="bouncycastle-jmail-1.74-150200.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769319" comment="bouncycastle-mail-1.74-150200.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769320" comment="bouncycastle-pg-1.74-150200.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769321" comment="bouncycastle-pkix-1.74-150200.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769322" comment="bouncycastle-tls-1.74-150200.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769323" comment="bouncycastle-util-1.74-150200.3.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4234" version="1" class="patch">
	<metadata>
		<title>Security update for go1.19 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1200441" ref_url="https://bugzilla.suse.com/1200441" source="BUGZILLA"/>
		<reference ref_id="1213229" ref_url="https://bugzilla.suse.com/1213229" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-29406" ref_url="https://www.suse.com/security/cve/CVE-2023-29406/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015505.html" source="SUSE-SU"/>
		<description>
This update for go1.19 fixes the following issues:

  go was updated to version 1.19.11 (bsc#1200441):

  - CVE-2023-29406: Fixed insufficient sanitization of Host header in net/http (bsc#1213229).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-17"/>
	<updated date="2023-07-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1200441">SUSE bug 1200441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213229">SUSE bug 1213229</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-29406/">CVE-2023-29406 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29406">CVE-2023-29406 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771919" comment="go1.19-1.19.11-150000.1.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771920" comment="go1.19-doc-1.19.11-150000.1.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771925" comment="go1.19-race-1.19.11-150000.1.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4235" version="1" class="patch">
	<metadata>
		<title>Security update for go1.20 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206346" ref_url="https://bugzilla.suse.com/1206346" source="BUGZILLA"/>
		<reference ref_id="1213229" ref_url="https://bugzilla.suse.com/1213229" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-29406" ref_url="https://www.suse.com/security/cve/CVE-2023-29406/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015504.html" source="SUSE-SU"/>
		<description>
This update for go1.20 fixes the following issues:

  go was updated to version 1.20.6 (bsc#1206346):

  - CVE-2023-29406: Fixed insufficient sanitization of Host header in net/http (bsc#1213229).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-17"/>
	<updated date="2023-07-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206346">SUSE bug 1206346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213229">SUSE bug 1213229</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-29406/">CVE-2023-29406 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29406">CVE-2023-29406 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771922" comment="go1.20-1.20.6-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771923" comment="go1.20-doc-1.20.6-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771924" comment="go1.20-race-1.20.6-150000.1.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4236" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213000" ref_url="https://bugzilla.suse.com/1213000" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015509.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

  Updated to Java 8.0 Service Refresh 8 Fix Pack 6 (bsc#1213000):

  - Fixed issue in Java Virtual Machine where outofmemory (OOM) killer terminates the jvm due to failure in control groups detection.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-17"/>
	<updated date="2023-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213000">SUSE bug 1213000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009770929" comment="java-1_8_0-ibm-1.8.0_sr8.6-150000.3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770930" comment="java-1_8_0-ibm-32bit-1.8.0_sr8.6-150000.3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770931" comment="java-1_8_0-ibm-alsa-1.8.0_sr8.6-150000.3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770932" comment="java-1_8_0-ibm-demo-1.8.0_sr8.6-150000.3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770933" comment="java-1_8_0-ibm-devel-1.8.0_sr8.6-150000.3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770934" comment="java-1_8_0-ibm-devel-32bit-1.8.0_sr8.6-150000.3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770935" comment="java-1_8_0-ibm-plugin-1.8.0_sr8.6-150000.3.77.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770936" comment="java-1_8_0-ibm-src-1.8.0_sr8.6-150000.3.77.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4237" version="1" class="patch">
	<metadata>
		<title>Security update for python-requests (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211674" ref_url="https://bugzilla.suse.com/1211674" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32681" ref_url="https://www.suse.com/security/cve/CVE-2023-32681/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015522.html" source="SUSE-SU"/>
		<description>
This update for python-requests fixes the following issues:

- CVE-2023-32681: Fixed unintended leak of Proxy-Authorization header (bsc#1211674).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-18"/>
	<updated date="2023-07-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211674">SUSE bug 1211674</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32681/">CVE-2023-32681 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32681">CVE-2023-32681 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767761" comment="python3-requests-2.24.0-150300.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4238" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1109158" ref_url="https://bugzilla.suse.com/1109158" source="BUGZILLA"/>
		<reference ref_id="1142685" ref_url="https://bugzilla.suse.com/1142685" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1160435" ref_url="https://bugzilla.suse.com/1160435" source="BUGZILLA"/>
		<reference ref_id="1166486" ref_url="https://bugzilla.suse.com/1166486" source="BUGZILLA"/>
		<reference ref_id="1172073" ref_url="https://bugzilla.suse.com/1172073" source="BUGZILLA"/>
		<reference ref_id="1174777" ref_url="https://bugzilla.suse.com/1174777" source="BUGZILLA"/>
		<reference ref_id="1177529" ref_url="https://bugzilla.suse.com/1177529" source="BUGZILLA"/>
		<reference ref_id="1186449" ref_url="https://bugzilla.suse.com/1186449" source="BUGZILLA"/>
		<reference ref_id="1187829" ref_url="https://bugzilla.suse.com/1187829" source="BUGZILLA"/>
		<reference ref_id="1189998" ref_url="https://bugzilla.suse.com/1189998" source="BUGZILLA"/>
		<reference ref_id="1189999" ref_url="https://bugzilla.suse.com/1189999" source="BUGZILLA"/>
		<reference ref_id="1191731" ref_url="https://bugzilla.suse.com/1191731" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1195175" ref_url="https://bugzilla.suse.com/1195175" source="BUGZILLA"/>
		<reference ref_id="1195655" ref_url="https://bugzilla.suse.com/1195655" source="BUGZILLA"/>
		<reference ref_id="1195921" ref_url="https://bugzilla.suse.com/1195921" source="BUGZILLA"/>
		<reference ref_id="1196058" ref_url="https://bugzilla.suse.com/1196058" source="BUGZILLA"/>
		<reference ref_id="1197534" ref_url="https://bugzilla.suse.com/1197534" source="BUGZILLA"/>
		<reference ref_id="1197617" ref_url="https://bugzilla.suse.com/1197617" source="BUGZILLA"/>
		<reference ref_id="1198101" ref_url="https://bugzilla.suse.com/1198101" source="BUGZILLA"/>
		<reference ref_id="1198400" ref_url="https://bugzilla.suse.com/1198400" source="BUGZILLA"/>
		<reference ref_id="1198438" ref_url="https://bugzilla.suse.com/1198438" source="BUGZILLA"/>
		<reference ref_id="1198835" ref_url="https://bugzilla.suse.com/1198835" source="BUGZILLA"/>
		<reference ref_id="1199304" ref_url="https://bugzilla.suse.com/1199304" source="BUGZILLA"/>
		<reference ref_id="1199701" ref_url="https://bugzilla.suse.com/1199701" source="BUGZILLA"/>
		<reference ref_id="1200054" ref_url="https://bugzilla.suse.com/1200054" source="BUGZILLA"/>
		<reference ref_id="1202353" ref_url="https://bugzilla.suse.com/1202353" source="BUGZILLA"/>
		<reference ref_id="1202633" ref_url="https://bugzilla.suse.com/1202633" source="BUGZILLA"/>
		<reference ref_id="1203039" ref_url="https://bugzilla.suse.com/1203039" source="BUGZILLA"/>
		<reference ref_id="1203200" ref_url="https://bugzilla.suse.com/1203200" source="BUGZILLA"/>
		<reference ref_id="1203325" ref_url="https://bugzilla.suse.com/1203325" source="BUGZILLA"/>
		<reference ref_id="1203331" ref_url="https://bugzilla.suse.com/1203331" source="BUGZILLA"/>
		<reference ref_id="1203332" ref_url="https://bugzilla.suse.com/1203332" source="BUGZILLA"/>
		<reference ref_id="1203693" ref_url="https://bugzilla.suse.com/1203693" source="BUGZILLA"/>
		<reference ref_id="1203906" ref_url="https://bugzilla.suse.com/1203906" source="BUGZILLA"/>
		<reference ref_id="1204356" ref_url="https://bugzilla.suse.com/1204356" source="BUGZILLA"/>
		<reference ref_id="1204363" ref_url="https://bugzilla.suse.com/1204363" source="BUGZILLA"/>
		<reference ref_id="1204662" ref_url="https://bugzilla.suse.com/1204662" source="BUGZILLA"/>
		<reference ref_id="1204993" ref_url="https://bugzilla.suse.com/1204993" source="BUGZILLA"/>
		<reference ref_id="1205153" ref_url="https://bugzilla.suse.com/1205153" source="BUGZILLA"/>
		<reference ref_id="1205191" ref_url="https://bugzilla.suse.com/1205191" source="BUGZILLA"/>
		<reference ref_id="1205205" ref_url="https://bugzilla.suse.com/1205205" source="BUGZILLA"/>
		<reference ref_id="1205544" ref_url="https://bugzilla.suse.com/1205544" source="BUGZILLA"/>
		<reference ref_id="1205650" ref_url="https://bugzilla.suse.com/1205650" source="BUGZILLA"/>
		<reference ref_id="1205756" ref_url="https://bugzilla.suse.com/1205756" source="BUGZILLA"/>
		<reference ref_id="1205758" ref_url="https://bugzilla.suse.com/1205758" source="BUGZILLA"/>
		<reference ref_id="1205760" ref_url="https://bugzilla.suse.com/1205760" source="BUGZILLA"/>
		<reference ref_id="1205762" ref_url="https://bugzilla.suse.com/1205762" source="BUGZILLA"/>
		<reference ref_id="1205803" ref_url="https://bugzilla.suse.com/1205803" source="BUGZILLA"/>
		<reference ref_id="1205846" ref_url="https://bugzilla.suse.com/1205846" source="BUGZILLA"/>
		<reference ref_id="1206024" ref_url="https://bugzilla.suse.com/1206024" source="BUGZILLA"/>
		<reference ref_id="1206036" ref_url="https://bugzilla.suse.com/1206036" source="BUGZILLA"/>
		<reference ref_id="1206056" ref_url="https://bugzilla.suse.com/1206056" source="BUGZILLA"/>
		<reference ref_id="1206057" ref_url="https://bugzilla.suse.com/1206057" source="BUGZILLA"/>
		<reference ref_id="1206103" ref_url="https://bugzilla.suse.com/1206103" source="BUGZILLA"/>
		<reference ref_id="1206224" ref_url="https://bugzilla.suse.com/1206224" source="BUGZILLA"/>
		<reference ref_id="1206232" ref_url="https://bugzilla.suse.com/1206232" source="BUGZILLA"/>
		<reference ref_id="1206340" ref_url="https://bugzilla.suse.com/1206340" source="BUGZILLA"/>
		<reference ref_id="1206459" ref_url="https://bugzilla.suse.com/1206459" source="BUGZILLA"/>
		<reference ref_id="1206492" ref_url="https://bugzilla.suse.com/1206492" source="BUGZILLA"/>
		<reference ref_id="1206493" ref_url="https://bugzilla.suse.com/1206493" source="BUGZILLA"/>
		<reference ref_id="1206552" ref_url="https://bugzilla.suse.com/1206552" source="BUGZILLA"/>
		<reference ref_id="1206578" ref_url="https://bugzilla.suse.com/1206578" source="BUGZILLA"/>
		<reference ref_id="1206640" ref_url="https://bugzilla.suse.com/1206640" source="BUGZILLA"/>
		<reference ref_id="1206649" ref_url="https://bugzilla.suse.com/1206649" source="BUGZILLA"/>
		<reference ref_id="1206677" ref_url="https://bugzilla.suse.com/1206677" source="BUGZILLA"/>
		<reference ref_id="1206824" ref_url="https://bugzilla.suse.com/1206824" source="BUGZILLA"/>
		<reference ref_id="1206843" ref_url="https://bugzilla.suse.com/1206843" source="BUGZILLA"/>
		<reference ref_id="1206876" ref_url="https://bugzilla.suse.com/1206876" source="BUGZILLA"/>
		<reference ref_id="1206877" ref_url="https://bugzilla.suse.com/1206877" source="BUGZILLA"/>
		<reference ref_id="1206878" ref_url="https://bugzilla.suse.com/1206878" source="BUGZILLA"/>
		<reference ref_id="1206880" ref_url="https://bugzilla.suse.com/1206880" source="BUGZILLA"/>
		<reference ref_id="1206881" ref_url="https://bugzilla.suse.com/1206881" source="BUGZILLA"/>
		<reference ref_id="1206882" ref_url="https://bugzilla.suse.com/1206882" source="BUGZILLA"/>
		<reference ref_id="1206883" ref_url="https://bugzilla.suse.com/1206883" source="BUGZILLA"/>
		<reference ref_id="1206884" ref_url="https://bugzilla.suse.com/1206884" source="BUGZILLA"/>
		<reference ref_id="1206885" ref_url="https://bugzilla.suse.com/1206885" source="BUGZILLA"/>
		<reference ref_id="1206886" ref_url="https://bugzilla.suse.com/1206886" source="BUGZILLA"/>
		<reference ref_id="1206887" ref_url="https://bugzilla.suse.com/1206887" source="BUGZILLA"/>
		<reference ref_id="1206888" ref_url="https://bugzilla.suse.com/1206888" source="BUGZILLA"/>
		<reference ref_id="1206889" ref_url="https://bugzilla.suse.com/1206889" source="BUGZILLA"/>
		<reference ref_id="1206890" ref_url="https://bugzilla.suse.com/1206890" source="BUGZILLA"/>
		<reference ref_id="1206891" ref_url="https://bugzilla.suse.com/1206891" source="BUGZILLA"/>
		<reference ref_id="1206893" ref_url="https://bugzilla.suse.com/1206893" source="BUGZILLA"/>
		<reference ref_id="1206894" ref_url="https://bugzilla.suse.com/1206894" source="BUGZILLA"/>
		<reference ref_id="1206935" ref_url="https://bugzilla.suse.com/1206935" source="BUGZILLA"/>
		<reference ref_id="1206992" ref_url="https://bugzilla.suse.com/1206992" source="BUGZILLA"/>
		<reference ref_id="1207034" ref_url="https://bugzilla.suse.com/1207034" source="BUGZILLA"/>
		<reference ref_id="1207036" ref_url="https://bugzilla.suse.com/1207036" source="BUGZILLA"/>
		<reference ref_id="1207050" ref_url="https://bugzilla.suse.com/1207050" source="BUGZILLA"/>
		<reference ref_id="1207051" ref_url="https://bugzilla.suse.com/1207051" source="BUGZILLA"/>
		<reference ref_id="1207088" ref_url="https://bugzilla.suse.com/1207088" source="BUGZILLA"/>
		<reference ref_id="1207125" ref_url="https://bugzilla.suse.com/1207125" source="BUGZILLA"/>
		<reference ref_id="1207149" ref_url="https://bugzilla.suse.com/1207149" source="BUGZILLA"/>
		<reference ref_id="1207158" ref_url="https://bugzilla.suse.com/1207158" source="BUGZILLA"/>
		<reference ref_id="1207168" ref_url="https://bugzilla.suse.com/1207168" source="BUGZILLA"/>
		<reference ref_id="1207185" ref_url="https://bugzilla.suse.com/1207185" source="BUGZILLA"/>
		<reference ref_id="1207270" ref_url="https://bugzilla.suse.com/1207270" source="BUGZILLA"/>
		<reference ref_id="1207315" ref_url="https://bugzilla.suse.com/1207315" source="BUGZILLA"/>
		<reference ref_id="1207328" ref_url="https://bugzilla.suse.com/1207328" source="BUGZILLA"/>
		<reference ref_id="1207497" ref_url="https://bugzilla.suse.com/1207497" source="BUGZILLA"/>
		<reference ref_id="1207500" ref_url="https://bugzilla.suse.com/1207500" source="BUGZILLA"/>
		<reference ref_id="1207501" ref_url="https://bugzilla.suse.com/1207501" source="BUGZILLA"/>
		<reference ref_id="1207506" ref_url="https://bugzilla.suse.com/1207506" source="BUGZILLA"/>
		<reference ref_id="1207507" ref_url="https://bugzilla.suse.com/1207507" source="BUGZILLA"/>
		<reference ref_id="1207521" ref_url="https://bugzilla.suse.com/1207521" source="BUGZILLA"/>
		<reference ref_id="1207553" ref_url="https://bugzilla.suse.com/1207553" source="BUGZILLA"/>
		<reference ref_id="1207560" ref_url="https://bugzilla.suse.com/1207560" source="BUGZILLA"/>
		<reference ref_id="1207574" ref_url="https://bugzilla.suse.com/1207574" source="BUGZILLA"/>
		<reference ref_id="1207588" ref_url="https://bugzilla.suse.com/1207588" source="BUGZILLA"/>
		<reference ref_id="1207589" ref_url="https://bugzilla.suse.com/1207589" source="BUGZILLA"/>
		<reference ref_id="1207590" ref_url="https://bugzilla.suse.com/1207590" source="BUGZILLA"/>
		<reference ref_id="1207591" ref_url="https://bugzilla.suse.com/1207591" source="BUGZILLA"/>
		<reference ref_id="1207592" ref_url="https://bugzilla.suse.com/1207592" source="BUGZILLA"/>
		<reference ref_id="1207593" ref_url="https://bugzilla.suse.com/1207593" source="BUGZILLA"/>
		<reference ref_id="1207594" ref_url="https://bugzilla.suse.com/1207594" source="BUGZILLA"/>
		<reference ref_id="1207602" ref_url="https://bugzilla.suse.com/1207602" source="BUGZILLA"/>
		<reference ref_id="1207603" ref_url="https://bugzilla.suse.com/1207603" source="BUGZILLA"/>
		<reference ref_id="1207605" ref_url="https://bugzilla.suse.com/1207605" source="BUGZILLA"/>
		<reference ref_id="1207606" ref_url="https://bugzilla.suse.com/1207606" source="BUGZILLA"/>
		<reference ref_id="1207607" ref_url="https://bugzilla.suse.com/1207607" source="BUGZILLA"/>
		<reference ref_id="1207608" ref_url="https://bugzilla.suse.com/1207608" source="BUGZILLA"/>
		<reference ref_id="1207609" ref_url="https://bugzilla.suse.com/1207609" source="BUGZILLA"/>
		<reference ref_id="1207610" ref_url="https://bugzilla.suse.com/1207610" source="BUGZILLA"/>
		<reference ref_id="1207611" ref_url="https://bugzilla.suse.com/1207611" source="BUGZILLA"/>
		<reference ref_id="1207612" ref_url="https://bugzilla.suse.com/1207612" source="BUGZILLA"/>
		<reference ref_id="1207613" ref_url="https://bugzilla.suse.com/1207613" source="BUGZILLA"/>
		<reference ref_id="1207614" ref_url="https://bugzilla.suse.com/1207614" source="BUGZILLA"/>
		<reference ref_id="1207615" ref_url="https://bugzilla.suse.com/1207615" source="BUGZILLA"/>
		<reference ref_id="1207616" ref_url="https://bugzilla.suse.com/1207616" source="BUGZILLA"/>
		<reference ref_id="1207617" ref_url="https://bugzilla.suse.com/1207617" source="BUGZILLA"/>
		<reference ref_id="1207618" ref_url="https://bugzilla.suse.com/1207618" source="BUGZILLA"/>
		<reference ref_id="1207619" ref_url="https://bugzilla.suse.com/1207619" source="BUGZILLA"/>
		<reference ref_id="1207620" ref_url="https://bugzilla.suse.com/1207620" source="BUGZILLA"/>
		<reference ref_id="1207621" ref_url="https://bugzilla.suse.com/1207621" source="BUGZILLA"/>
		<reference ref_id="1207622" ref_url="https://bugzilla.suse.com/1207622" source="BUGZILLA"/>
		<reference ref_id="1207623" ref_url="https://bugzilla.suse.com/1207623" source="BUGZILLA"/>
		<reference ref_id="1207624" ref_url="https://bugzilla.suse.com/1207624" source="BUGZILLA"/>
		<reference ref_id="1207625" ref_url="https://bugzilla.suse.com/1207625" source="BUGZILLA"/>
		<reference ref_id="1207626" ref_url="https://bugzilla.suse.com/1207626" source="BUGZILLA"/>
		<reference ref_id="1207627" ref_url="https://bugzilla.suse.com/1207627" source="BUGZILLA"/>
		<reference ref_id="1207628" ref_url="https://bugzilla.suse.com/1207628" source="BUGZILLA"/>
		<reference ref_id="1207629" ref_url="https://bugzilla.suse.com/1207629" source="BUGZILLA"/>
		<reference ref_id="1207630" ref_url="https://bugzilla.suse.com/1207630" source="BUGZILLA"/>
		<reference ref_id="1207631" ref_url="https://bugzilla.suse.com/1207631" source="BUGZILLA"/>
		<reference ref_id="1207632" ref_url="https://bugzilla.suse.com/1207632" source="BUGZILLA"/>
		<reference ref_id="1207633" ref_url="https://bugzilla.suse.com/1207633" source="BUGZILLA"/>
		<reference ref_id="1207634" ref_url="https://bugzilla.suse.com/1207634" source="BUGZILLA"/>
		<reference ref_id="1207635" ref_url="https://bugzilla.suse.com/1207635" source="BUGZILLA"/>
		<reference ref_id="1207636" ref_url="https://bugzilla.suse.com/1207636" source="BUGZILLA"/>
		<reference ref_id="1207637" ref_url="https://bugzilla.suse.com/1207637" source="BUGZILLA"/>
		<reference ref_id="1207638" ref_url="https://bugzilla.suse.com/1207638" source="BUGZILLA"/>
		<reference ref_id="1207639" ref_url="https://bugzilla.suse.com/1207639" source="BUGZILLA"/>
		<reference ref_id="1207640" ref_url="https://bugzilla.suse.com/1207640" source="BUGZILLA"/>
		<reference ref_id="1207641" ref_url="https://bugzilla.suse.com/1207641" source="BUGZILLA"/>
		<reference ref_id="1207642" ref_url="https://bugzilla.suse.com/1207642" source="BUGZILLA"/>
		<reference ref_id="1207643" ref_url="https://bugzilla.suse.com/1207643" source="BUGZILLA"/>
		<reference ref_id="1207644" ref_url="https://bugzilla.suse.com/1207644" source="BUGZILLA"/>
		<reference ref_id="1207645" ref_url="https://bugzilla.suse.com/1207645" source="BUGZILLA"/>
		<reference ref_id="1207646" ref_url="https://bugzilla.suse.com/1207646" source="BUGZILLA"/>
		<reference ref_id="1207647" ref_url="https://bugzilla.suse.com/1207647" source="BUGZILLA"/>
		<reference ref_id="1207648" ref_url="https://bugzilla.suse.com/1207648" source="BUGZILLA"/>
		<reference ref_id="1207649" ref_url="https://bugzilla.suse.com/1207649" source="BUGZILLA"/>
		<reference ref_id="1207650" ref_url="https://bugzilla.suse.com/1207650" source="BUGZILLA"/>
		<reference ref_id="1207651" ref_url="https://bugzilla.suse.com/1207651" source="BUGZILLA"/>
		<reference ref_id="1207652" ref_url="https://bugzilla.suse.com/1207652" source="BUGZILLA"/>
		<reference ref_id="1207653" ref_url="https://bugzilla.suse.com/1207653" source="BUGZILLA"/>
		<reference ref_id="1207734" ref_url="https://bugzilla.suse.com/1207734" source="BUGZILLA"/>
		<reference ref_id="1207768" ref_url="https://bugzilla.suse.com/1207768" source="BUGZILLA"/>
		<reference ref_id="1207769" ref_url="https://bugzilla.suse.com/1207769" source="BUGZILLA"/>
		<reference ref_id="1207770" ref_url="https://bugzilla.suse.com/1207770" source="BUGZILLA"/>
		<reference ref_id="1207771" ref_url="https://bugzilla.suse.com/1207771" source="BUGZILLA"/>
		<reference ref_id="1207773" ref_url="https://bugzilla.suse.com/1207773" source="BUGZILLA"/>
		<reference ref_id="1207795" ref_url="https://bugzilla.suse.com/1207795" source="BUGZILLA"/>
		<reference ref_id="1207827" ref_url="https://bugzilla.suse.com/1207827" source="BUGZILLA"/>
		<reference ref_id="1207842" ref_url="https://bugzilla.suse.com/1207842" source="BUGZILLA"/>
		<reference ref_id="1207845" ref_url="https://bugzilla.suse.com/1207845" source="BUGZILLA"/>
		<reference ref_id="1207875" ref_url="https://bugzilla.suse.com/1207875" source="BUGZILLA"/>
		<reference ref_id="1207878" ref_url="https://bugzilla.suse.com/1207878" source="BUGZILLA"/>
		<reference ref_id="1207933" ref_url="https://bugzilla.suse.com/1207933" source="BUGZILLA"/>
		<reference ref_id="1207935" ref_url="https://bugzilla.suse.com/1207935" source="BUGZILLA"/>
		<reference ref_id="1207948" ref_url="https://bugzilla.suse.com/1207948" source="BUGZILLA"/>
		<reference ref_id="1208050" ref_url="https://bugzilla.suse.com/1208050" source="BUGZILLA"/>
		<reference ref_id="1208076" ref_url="https://bugzilla.suse.com/1208076" source="BUGZILLA"/>
		<reference ref_id="1208081" ref_url="https://bugzilla.suse.com/1208081" source="BUGZILLA"/>
		<reference ref_id="1208105" ref_url="https://bugzilla.suse.com/1208105" source="BUGZILLA"/>
		<reference ref_id="1208107" ref_url="https://bugzilla.suse.com/1208107" source="BUGZILLA"/>
		<reference ref_id="1208128" ref_url="https://bugzilla.suse.com/1208128" source="BUGZILLA"/>
		<reference ref_id="1208130" ref_url="https://bugzilla.suse.com/1208130" source="BUGZILLA"/>
		<reference ref_id="1208149" ref_url="https://bugzilla.suse.com/1208149" source="BUGZILLA"/>
		<reference ref_id="1208153" ref_url="https://bugzilla.suse.com/1208153" source="BUGZILLA"/>
		<reference ref_id="1208183" ref_url="https://bugzilla.suse.com/1208183" source="BUGZILLA"/>
		<reference ref_id="1208212" ref_url="https://bugzilla.suse.com/1208212" source="BUGZILLA"/>
		<reference ref_id="1208219" ref_url="https://bugzilla.suse.com/1208219" source="BUGZILLA"/>
		<reference ref_id="1208290" ref_url="https://bugzilla.suse.com/1208290" source="BUGZILLA"/>
		<reference ref_id="1208368" ref_url="https://bugzilla.suse.com/1208368" source="BUGZILLA"/>
		<reference ref_id="1208410" ref_url="https://bugzilla.suse.com/1208410" source="BUGZILLA"/>
		<reference ref_id="1208420" ref_url="https://bugzilla.suse.com/1208420" source="BUGZILLA"/>
		<reference ref_id="1208428" ref_url="https://bugzilla.suse.com/1208428" source="BUGZILLA"/>
		<reference ref_id="1208429" ref_url="https://bugzilla.suse.com/1208429" source="BUGZILLA"/>
		<reference ref_id="1208449" ref_url="https://bugzilla.suse.com/1208449" source="BUGZILLA"/>
		<reference ref_id="1208534" ref_url="https://bugzilla.suse.com/1208534" source="BUGZILLA"/>
		<reference ref_id="1208541" ref_url="https://bugzilla.suse.com/1208541" source="BUGZILLA"/>
		<reference ref_id="1208542" ref_url="https://bugzilla.suse.com/1208542" source="BUGZILLA"/>
		<reference ref_id="1208570" ref_url="https://bugzilla.suse.com/1208570" source="BUGZILLA"/>
		<reference ref_id="1208588" ref_url="https://bugzilla.suse.com/1208588" source="BUGZILLA"/>
		<reference ref_id="1208598" ref_url="https://bugzilla.suse.com/1208598" source="BUGZILLA"/>
		<reference ref_id="1208599" ref_url="https://bugzilla.suse.com/1208599" source="BUGZILLA"/>
		<reference ref_id="1208600" ref_url="https://bugzilla.suse.com/1208600" source="BUGZILLA"/>
		<reference ref_id="1208601" ref_url="https://bugzilla.suse.com/1208601" source="BUGZILLA"/>
		<reference ref_id="1208602" ref_url="https://bugzilla.suse.com/1208602" source="BUGZILLA"/>
		<reference ref_id="1208604" ref_url="https://bugzilla.suse.com/1208604" source="BUGZILLA"/>
		<reference ref_id="1208605" ref_url="https://bugzilla.suse.com/1208605" source="BUGZILLA"/>
		<reference ref_id="1208607" ref_url="https://bugzilla.suse.com/1208607" source="BUGZILLA"/>
		<reference ref_id="1208619" ref_url="https://bugzilla.suse.com/1208619" source="BUGZILLA"/>
		<reference ref_id="1208628" ref_url="https://bugzilla.suse.com/1208628" source="BUGZILLA"/>
		<reference ref_id="1208700" ref_url="https://bugzilla.suse.com/1208700" source="BUGZILLA"/>
		<reference ref_id="1208741" ref_url="https://bugzilla.suse.com/1208741" source="BUGZILLA"/>
		<reference ref_id="1208758" ref_url="https://bugzilla.suse.com/1208758" source="BUGZILLA"/>
		<reference ref_id="1208759" ref_url="https://bugzilla.suse.com/1208759" source="BUGZILLA"/>
		<reference ref_id="1208776" ref_url="https://bugzilla.suse.com/1208776" source="BUGZILLA"/>
		<reference ref_id="1208777" ref_url="https://bugzilla.suse.com/1208777" source="BUGZILLA"/>
		<reference ref_id="1208784" ref_url="https://bugzilla.suse.com/1208784" source="BUGZILLA"/>
		<reference ref_id="1208787" ref_url="https://bugzilla.suse.com/1208787" source="BUGZILLA"/>
		<reference ref_id="1208815" ref_url="https://bugzilla.suse.com/1208815" source="BUGZILLA"/>
		<reference ref_id="1208816" ref_url="https://bugzilla.suse.com/1208816" source="BUGZILLA"/>
		<reference ref_id="1208829" ref_url="https://bugzilla.suse.com/1208829" source="BUGZILLA"/>
		<reference ref_id="1208837" ref_url="https://bugzilla.suse.com/1208837" source="BUGZILLA"/>
		<reference ref_id="1208843" ref_url="https://bugzilla.suse.com/1208843" source="BUGZILLA"/>
		<reference ref_id="1208845" ref_url="https://bugzilla.suse.com/1208845" source="BUGZILLA"/>
		<reference ref_id="1208848" ref_url="https://bugzilla.suse.com/1208848" source="BUGZILLA"/>
		<reference ref_id="1208864" ref_url="https://bugzilla.suse.com/1208864" source="BUGZILLA"/>
		<reference ref_id="1208902" ref_url="https://bugzilla.suse.com/1208902" source="BUGZILLA"/>
		<reference ref_id="1208948" ref_url="https://bugzilla.suse.com/1208948" source="BUGZILLA"/>
		<reference ref_id="1208976" ref_url="https://bugzilla.suse.com/1208976" source="BUGZILLA"/>
		<reference ref_id="1209008" ref_url="https://bugzilla.suse.com/1209008" source="BUGZILLA"/>
		<reference ref_id="1209039" ref_url="https://bugzilla.suse.com/1209039" source="BUGZILLA"/>
		<reference ref_id="1209052" ref_url="https://bugzilla.suse.com/1209052" source="BUGZILLA"/>
		<reference ref_id="1209092" ref_url="https://bugzilla.suse.com/1209092" source="BUGZILLA"/>
		<reference ref_id="1209159" ref_url="https://bugzilla.suse.com/1209159" source="BUGZILLA"/>
		<reference ref_id="1209256" ref_url="https://bugzilla.suse.com/1209256" source="BUGZILLA"/>
		<reference ref_id="1209258" ref_url="https://bugzilla.suse.com/1209258" source="BUGZILLA"/>
		<reference ref_id="1209262" ref_url="https://bugzilla.suse.com/1209262" source="BUGZILLA"/>
		<reference ref_id="1209287" ref_url="https://bugzilla.suse.com/1209287" source="BUGZILLA"/>
		<reference ref_id="1209288" ref_url="https://bugzilla.suse.com/1209288" source="BUGZILLA"/>
		<reference ref_id="1209290" ref_url="https://bugzilla.suse.com/1209290" source="BUGZILLA"/>
		<reference ref_id="1209291" ref_url="https://bugzilla.suse.com/1209291" source="BUGZILLA"/>
		<reference ref_id="1209292" ref_url="https://bugzilla.suse.com/1209292" source="BUGZILLA"/>
		<reference ref_id="1209366" ref_url="https://bugzilla.suse.com/1209366" source="BUGZILLA"/>
		<reference ref_id="1209367" ref_url="https://bugzilla.suse.com/1209367" source="BUGZILLA"/>
		<reference ref_id="1209436" ref_url="https://bugzilla.suse.com/1209436" source="BUGZILLA"/>
		<reference ref_id="1209457" ref_url="https://bugzilla.suse.com/1209457" source="BUGZILLA"/>
		<reference ref_id="1209504" ref_url="https://bugzilla.suse.com/1209504" source="BUGZILLA"/>
		<reference ref_id="1209532" ref_url="https://bugzilla.suse.com/1209532" source="BUGZILLA"/>
		<reference ref_id="1209556" ref_url="https://bugzilla.suse.com/1209556" source="BUGZILLA"/>
		<reference ref_id="1209600" ref_url="https://bugzilla.suse.com/1209600" source="BUGZILLA"/>
		<reference ref_id="1209615" ref_url="https://bugzilla.suse.com/1209615" source="BUGZILLA"/>
		<reference ref_id="1209635" ref_url="https://bugzilla.suse.com/1209635" source="BUGZILLA"/>
		<reference ref_id="1209636" ref_url="https://bugzilla.suse.com/1209636" source="BUGZILLA"/>
		<reference ref_id="1209637" ref_url="https://bugzilla.suse.com/1209637" source="BUGZILLA"/>
		<reference ref_id="1209684" ref_url="https://bugzilla.suse.com/1209684" source="BUGZILLA"/>
		<reference ref_id="1209687" ref_url="https://bugzilla.suse.com/1209687" source="BUGZILLA"/>
		<reference ref_id="1209693" ref_url="https://bugzilla.suse.com/1209693" source="BUGZILLA"/>
		<reference ref_id="1209739" ref_url="https://bugzilla.suse.com/1209739" source="BUGZILLA"/>
		<reference ref_id="1209779" ref_url="https://bugzilla.suse.com/1209779" source="BUGZILLA"/>
		<reference ref_id="1209780" ref_url="https://bugzilla.suse.com/1209780" source="BUGZILLA"/>
		<reference ref_id="1209788" ref_url="https://bugzilla.suse.com/1209788" source="BUGZILLA"/>
		<reference ref_id="1209798" ref_url="https://bugzilla.suse.com/1209798" source="BUGZILLA"/>
		<reference ref_id="1209799" ref_url="https://bugzilla.suse.com/1209799" source="BUGZILLA"/>
		<reference ref_id="1209804" ref_url="https://bugzilla.suse.com/1209804" source="BUGZILLA"/>
		<reference ref_id="1209805" ref_url="https://bugzilla.suse.com/1209805" source="BUGZILLA"/>
		<reference ref_id="1209856" ref_url="https://bugzilla.suse.com/1209856" source="BUGZILLA"/>
		<reference ref_id="1209871" ref_url="https://bugzilla.suse.com/1209871" source="BUGZILLA"/>
		<reference ref_id="1209927" ref_url="https://bugzilla.suse.com/1209927" source="BUGZILLA"/>
		<reference ref_id="1209980" ref_url="https://bugzilla.suse.com/1209980" source="BUGZILLA"/>
		<reference ref_id="1209982" ref_url="https://bugzilla.suse.com/1209982" source="BUGZILLA"/>
		<reference ref_id="1209999" ref_url="https://bugzilla.suse.com/1209999" source="BUGZILLA"/>
		<reference ref_id="1210034" ref_url="https://bugzilla.suse.com/1210034" source="BUGZILLA"/>
		<reference ref_id="1210050" ref_url="https://bugzilla.suse.com/1210050" source="BUGZILLA"/>
		<reference ref_id="1210158" ref_url="https://bugzilla.suse.com/1210158" source="BUGZILLA"/>
		<reference ref_id="1210165" ref_url="https://bugzilla.suse.com/1210165" source="BUGZILLA"/>
		<reference ref_id="1210202" ref_url="https://bugzilla.suse.com/1210202" source="BUGZILLA"/>
		<reference ref_id="1210203" ref_url="https://bugzilla.suse.com/1210203" source="BUGZILLA"/>
		<reference ref_id="1210206" ref_url="https://bugzilla.suse.com/1210206" source="BUGZILLA"/>
		<reference ref_id="1210216" ref_url="https://bugzilla.suse.com/1210216" source="BUGZILLA"/>
		<reference ref_id="1210230" ref_url="https://bugzilla.suse.com/1210230" source="BUGZILLA"/>
		<reference ref_id="1210294" ref_url="https://bugzilla.suse.com/1210294" source="BUGZILLA"/>
		<reference ref_id="1210301" ref_url="https://bugzilla.suse.com/1210301" source="BUGZILLA"/>
		<reference ref_id="1210329" ref_url="https://bugzilla.suse.com/1210329" source="BUGZILLA"/>
		<reference ref_id="1210335" ref_url="https://bugzilla.suse.com/1210335" source="BUGZILLA"/>
		<reference ref_id="1210336" ref_url="https://bugzilla.suse.com/1210336" source="BUGZILLA"/>
		<reference ref_id="1210337" ref_url="https://bugzilla.suse.com/1210337" source="BUGZILLA"/>
		<reference ref_id="1210409" ref_url="https://bugzilla.suse.com/1210409" source="BUGZILLA"/>
		<reference ref_id="1210439" ref_url="https://bugzilla.suse.com/1210439" source="BUGZILLA"/>
		<reference ref_id="1210449" ref_url="https://bugzilla.suse.com/1210449" source="BUGZILLA"/>
		<reference ref_id="1210450" ref_url="https://bugzilla.suse.com/1210450" source="BUGZILLA"/>
		<reference ref_id="1210453" ref_url="https://bugzilla.suse.com/1210453" source="BUGZILLA"/>
		<reference ref_id="1210454" ref_url="https://bugzilla.suse.com/1210454" source="BUGZILLA"/>
		<reference ref_id="1210498" ref_url="https://bugzilla.suse.com/1210498" source="BUGZILLA"/>
		<reference ref_id="1210506" ref_url="https://bugzilla.suse.com/1210506" source="BUGZILLA"/>
		<reference ref_id="1210533" ref_url="https://bugzilla.suse.com/1210533" source="BUGZILLA"/>
		<reference ref_id="1210551" ref_url="https://bugzilla.suse.com/1210551" source="BUGZILLA"/>
		<reference ref_id="1210565" ref_url="https://bugzilla.suse.com/1210565" source="BUGZILLA"/>
		<reference ref_id="1210584" ref_url="https://bugzilla.suse.com/1210584" source="BUGZILLA"/>
		<reference ref_id="1210629" ref_url="https://bugzilla.suse.com/1210629" source="BUGZILLA"/>
		<reference ref_id="1210644" ref_url="https://bugzilla.suse.com/1210644" source="BUGZILLA"/>
		<reference ref_id="1210647" ref_url="https://bugzilla.suse.com/1210647" source="BUGZILLA"/>
		<reference ref_id="1210725" ref_url="https://bugzilla.suse.com/1210725" source="BUGZILLA"/>
		<reference ref_id="1210741" ref_url="https://bugzilla.suse.com/1210741" source="BUGZILLA"/>
		<reference ref_id="1210762" ref_url="https://bugzilla.suse.com/1210762" source="BUGZILLA"/>
		<reference ref_id="1210763" ref_url="https://bugzilla.suse.com/1210763" source="BUGZILLA"/>
		<reference ref_id="1210764" ref_url="https://bugzilla.suse.com/1210764" source="BUGZILLA"/>
		<reference ref_id="1210765" ref_url="https://bugzilla.suse.com/1210765" source="BUGZILLA"/>
		<reference ref_id="1210766" ref_url="https://bugzilla.suse.com/1210766" source="BUGZILLA"/>
		<reference ref_id="1210767" ref_url="https://bugzilla.suse.com/1210767" source="BUGZILLA"/>
		<reference ref_id="1210768" ref_url="https://bugzilla.suse.com/1210768" source="BUGZILLA"/>
		<reference ref_id="1210769" ref_url="https://bugzilla.suse.com/1210769" source="BUGZILLA"/>
		<reference ref_id="1210770" ref_url="https://bugzilla.suse.com/1210770" source="BUGZILLA"/>
		<reference ref_id="1210771" ref_url="https://bugzilla.suse.com/1210771" source="BUGZILLA"/>
		<reference ref_id="1210775" ref_url="https://bugzilla.suse.com/1210775" source="BUGZILLA"/>
		<reference ref_id="1210783" ref_url="https://bugzilla.suse.com/1210783" source="BUGZILLA"/>
		<reference ref_id="1210791" ref_url="https://bugzilla.suse.com/1210791" source="BUGZILLA"/>
		<reference ref_id="1210793" ref_url="https://bugzilla.suse.com/1210793" source="BUGZILLA"/>
		<reference ref_id="1210806" ref_url="https://bugzilla.suse.com/1210806" source="BUGZILLA"/>
		<reference ref_id="1210816" ref_url="https://bugzilla.suse.com/1210816" source="BUGZILLA"/>
		<reference ref_id="1210817" ref_url="https://bugzilla.suse.com/1210817" source="BUGZILLA"/>
		<reference ref_id="1210827" ref_url="https://bugzilla.suse.com/1210827" source="BUGZILLA"/>
		<reference ref_id="1210853" ref_url="https://bugzilla.suse.com/1210853" source="BUGZILLA"/>
		<reference ref_id="1210940" ref_url="https://bugzilla.suse.com/1210940" source="BUGZILLA"/>
		<reference ref_id="1210943" ref_url="https://bugzilla.suse.com/1210943" source="BUGZILLA"/>
		<reference ref_id="1210947" ref_url="https://bugzilla.suse.com/1210947" source="BUGZILLA"/>
		<reference ref_id="1210953" ref_url="https://bugzilla.suse.com/1210953" source="BUGZILLA"/>
		<reference ref_id="1210986" ref_url="https://bugzilla.suse.com/1210986" source="BUGZILLA"/>
		<reference ref_id="1211014" ref_url="https://bugzilla.suse.com/1211014" source="BUGZILLA"/>
		<reference ref_id="1211025" ref_url="https://bugzilla.suse.com/1211025" source="BUGZILLA"/>
		<reference ref_id="1211037" ref_url="https://bugzilla.suse.com/1211037" source="BUGZILLA"/>
		<reference ref_id="1211043" ref_url="https://bugzilla.suse.com/1211043" source="BUGZILLA"/>
		<reference ref_id="1211044" ref_url="https://bugzilla.suse.com/1211044" source="BUGZILLA"/>
		<reference ref_id="1211089" ref_url="https://bugzilla.suse.com/1211089" source="BUGZILLA"/>
		<reference ref_id="1211105" ref_url="https://bugzilla.suse.com/1211105" source="BUGZILLA"/>
		<reference ref_id="1211113" ref_url="https://bugzilla.suse.com/1211113" source="BUGZILLA"/>
		<reference ref_id="1211131" ref_url="https://bugzilla.suse.com/1211131" source="BUGZILLA"/>
		<reference ref_id="1211205" ref_url="https://bugzilla.suse.com/1211205" source="BUGZILLA"/>
		<reference ref_id="1211263" ref_url="https://bugzilla.suse.com/1211263" source="BUGZILLA"/>
		<reference ref_id="1211280" ref_url="https://bugzilla.suse.com/1211280" source="BUGZILLA"/>
		<reference ref_id="1211281" ref_url="https://bugzilla.suse.com/1211281" source="BUGZILLA"/>
		<reference ref_id="1211299" ref_url="https://bugzilla.suse.com/1211299" source="BUGZILLA"/>
		<reference ref_id="1211346" ref_url="https://bugzilla.suse.com/1211346" source="BUGZILLA"/>
		<reference ref_id="1211387" ref_url="https://bugzilla.suse.com/1211387" source="BUGZILLA"/>
		<reference ref_id="1211400" ref_url="https://bugzilla.suse.com/1211400" source="BUGZILLA"/>
		<reference ref_id="1211410" ref_url="https://bugzilla.suse.com/1211410" source="BUGZILLA"/>
		<reference ref_id="1211414" ref_url="https://bugzilla.suse.com/1211414" source="BUGZILLA"/>
		<reference ref_id="1211449" ref_url="https://bugzilla.suse.com/1211449" source="BUGZILLA"/>
		<reference ref_id="1211465" ref_url="https://bugzilla.suse.com/1211465" source="BUGZILLA"/>
		<reference ref_id="1211519" ref_url="https://bugzilla.suse.com/1211519" source="BUGZILLA"/>
		<reference ref_id="1211564" ref_url="https://bugzilla.suse.com/1211564" source="BUGZILLA"/>
		<reference ref_id="1211590" ref_url="https://bugzilla.suse.com/1211590" source="BUGZILLA"/>
		<reference ref_id="1211592" ref_url="https://bugzilla.suse.com/1211592" source="BUGZILLA"/>
		<reference ref_id="1211593" ref_url="https://bugzilla.suse.com/1211593" source="BUGZILLA"/>
		<reference ref_id="1211595" ref_url="https://bugzilla.suse.com/1211595" source="BUGZILLA"/>
		<reference ref_id="1211654" ref_url="https://bugzilla.suse.com/1211654" source="BUGZILLA"/>
		<reference ref_id="1211686" ref_url="https://bugzilla.suse.com/1211686" source="BUGZILLA"/>
		<reference ref_id="1211687" ref_url="https://bugzilla.suse.com/1211687" source="BUGZILLA"/>
		<reference ref_id="1211688" ref_url="https://bugzilla.suse.com/1211688" source="BUGZILLA"/>
		<reference ref_id="1211689" ref_url="https://bugzilla.suse.com/1211689" source="BUGZILLA"/>
		<reference ref_id="1211690" ref_url="https://bugzilla.suse.com/1211690" source="BUGZILLA"/>
		<reference ref_id="1211691" ref_url="https://bugzilla.suse.com/1211691" source="BUGZILLA"/>
		<reference ref_id="1211692" ref_url="https://bugzilla.suse.com/1211692" source="BUGZILLA"/>
		<reference ref_id="1211693" ref_url="https://bugzilla.suse.com/1211693" source="BUGZILLA"/>
		<reference ref_id="1211714" ref_url="https://bugzilla.suse.com/1211714" source="BUGZILLA"/>
		<reference ref_id="1211794" ref_url="https://bugzilla.suse.com/1211794" source="BUGZILLA"/>
		<reference ref_id="1211796" ref_url="https://bugzilla.suse.com/1211796" source="BUGZILLA"/>
		<reference ref_id="1211804" ref_url="https://bugzilla.suse.com/1211804" source="BUGZILLA"/>
		<reference ref_id="1211807" ref_url="https://bugzilla.suse.com/1211807" source="BUGZILLA"/>
		<reference ref_id="1211808" ref_url="https://bugzilla.suse.com/1211808" source="BUGZILLA"/>
		<reference ref_id="1211820" ref_url="https://bugzilla.suse.com/1211820" source="BUGZILLA"/>
		<reference ref_id="1211836" ref_url="https://bugzilla.suse.com/1211836" source="BUGZILLA"/>
		<reference ref_id="1211847" ref_url="https://bugzilla.suse.com/1211847" source="BUGZILLA"/>
		<reference ref_id="1211852" ref_url="https://bugzilla.suse.com/1211852" source="BUGZILLA"/>
		<reference ref_id="1211855" ref_url="https://bugzilla.suse.com/1211855" source="BUGZILLA"/>
		<reference ref_id="1211960" ref_url="https://bugzilla.suse.com/1211960" source="BUGZILLA"/>
		<reference ref_id="1212051" ref_url="https://bugzilla.suse.com/1212051" source="BUGZILLA"/>
		<reference ref_id="1212129" ref_url="https://bugzilla.suse.com/1212129" source="BUGZILLA"/>
		<reference ref_id="1212154" ref_url="https://bugzilla.suse.com/1212154" source="BUGZILLA"/>
		<reference ref_id="1212155" ref_url="https://bugzilla.suse.com/1212155" source="BUGZILLA"/>
		<reference ref_id="1212158" ref_url="https://bugzilla.suse.com/1212158" source="BUGZILLA"/>
		<reference ref_id="1212265" ref_url="https://bugzilla.suse.com/1212265" source="BUGZILLA"/>
		<reference ref_id="1212350" ref_url="https://bugzilla.suse.com/1212350" source="BUGZILLA"/>
		<reference ref_id="1212445" ref_url="https://bugzilla.suse.com/1212445" source="BUGZILLA"/>
		<reference ref_id="1212448" ref_url="https://bugzilla.suse.com/1212448" source="BUGZILLA"/>
		<reference ref_id="1212456" ref_url="https://bugzilla.suse.com/1212456" source="BUGZILLA"/>
		<reference ref_id="1212494" ref_url="https://bugzilla.suse.com/1212494" source="BUGZILLA"/>
		<reference ref_id="1212495" ref_url="https://bugzilla.suse.com/1212495" source="BUGZILLA"/>
		<reference ref_id="1212504" ref_url="https://bugzilla.suse.com/1212504" source="BUGZILLA"/>
		<reference ref_id="1212513" ref_url="https://bugzilla.suse.com/1212513" source="BUGZILLA"/>
		<reference ref_id="1212540" ref_url="https://bugzilla.suse.com/1212540" source="BUGZILLA"/>
		<reference ref_id="1212556" ref_url="https://bugzilla.suse.com/1212556" source="BUGZILLA"/>
		<reference ref_id="1212561" ref_url="https://bugzilla.suse.com/1212561" source="BUGZILLA"/>
		<reference ref_id="1212563" ref_url="https://bugzilla.suse.com/1212563" source="BUGZILLA"/>
		<reference ref_id="1212564" ref_url="https://bugzilla.suse.com/1212564" source="BUGZILLA"/>
		<reference ref_id="1212584" ref_url="https://bugzilla.suse.com/1212584" source="BUGZILLA"/>
		<reference ref_id="1212592" ref_url="https://bugzilla.suse.com/1212592" source="BUGZILLA"/>
		<reference ref_id="1212603" ref_url="https://bugzilla.suse.com/1212603" source="BUGZILLA"/>
		<reference ref_id="1212605" ref_url="https://bugzilla.suse.com/1212605" source="BUGZILLA"/>
		<reference ref_id="1212606" ref_url="https://bugzilla.suse.com/1212606" source="BUGZILLA"/>
		<reference ref_id="1212619" ref_url="https://bugzilla.suse.com/1212619" source="BUGZILLA"/>
		<reference ref_id="1212685" ref_url="https://bugzilla.suse.com/1212685" source="BUGZILLA"/>
		<reference ref_id="1212701" ref_url="https://bugzilla.suse.com/1212701" source="BUGZILLA"/>
		<reference ref_id="1212741" ref_url="https://bugzilla.suse.com/1212741" source="BUGZILLA"/>
		<reference ref_id="1212835" ref_url="https://bugzilla.suse.com/1212835" source="BUGZILLA"/>
		<reference ref_id="1212838" ref_url="https://bugzilla.suse.com/1212838" source="BUGZILLA"/>
		<reference ref_id="1212842" ref_url="https://bugzilla.suse.com/1212842" source="BUGZILLA"/>
		<reference ref_id="1212848" ref_url="https://bugzilla.suse.com/1212848" source="BUGZILLA"/>
		<reference ref_id="1212861" ref_url="https://bugzilla.suse.com/1212861" source="BUGZILLA"/>
		<reference ref_id="1212869" ref_url="https://bugzilla.suse.com/1212869" source="BUGZILLA"/>
		<reference ref_id="1212892" ref_url="https://bugzilla.suse.com/1212892" source="BUGZILLA"/>
		<reference ref_id="1212961" ref_url="https://bugzilla.suse.com/1212961" source="BUGZILLA"/>
		<reference ref_id="1213010" ref_url="https://bugzilla.suse.com/1213010" source="BUGZILLA"/>
		<reference ref_id="1213011" ref_url="https://bugzilla.suse.com/1213011" source="BUGZILLA"/>
		<reference ref_id="1213012" ref_url="https://bugzilla.suse.com/1213012" source="BUGZILLA"/>
		<reference ref_id="1213013" ref_url="https://bugzilla.suse.com/1213013" source="BUGZILLA"/>
		<reference ref_id="1213014" ref_url="https://bugzilla.suse.com/1213014" source="BUGZILLA"/>
		<reference ref_id="1213015" ref_url="https://bugzilla.suse.com/1213015" source="BUGZILLA"/>
		<reference ref_id="1213016" ref_url="https://bugzilla.suse.com/1213016" source="BUGZILLA"/>
		<reference ref_id="1213017" ref_url="https://bugzilla.suse.com/1213017" source="BUGZILLA"/>
		<reference ref_id="1213018" ref_url="https://bugzilla.suse.com/1213018" source="BUGZILLA"/>
		<reference ref_id="1213019" ref_url="https://bugzilla.suse.com/1213019" source="BUGZILLA"/>
		<reference ref_id="1213020" ref_url="https://bugzilla.suse.com/1213020" source="BUGZILLA"/>
		<reference ref_id="1213021" ref_url="https://bugzilla.suse.com/1213021" source="BUGZILLA"/>
		<reference ref_id="1213024" ref_url="https://bugzilla.suse.com/1213024" source="BUGZILLA"/>
		<reference ref_id="1213025" ref_url="https://bugzilla.suse.com/1213025" source="BUGZILLA"/>
		<reference ref_id="1213032" ref_url="https://bugzilla.suse.com/1213032" source="BUGZILLA"/>
		<reference ref_id="1213034" ref_url="https://bugzilla.suse.com/1213034" source="BUGZILLA"/>
		<reference ref_id="1213035" ref_url="https://bugzilla.suse.com/1213035" source="BUGZILLA"/>
		<reference ref_id="1213036" ref_url="https://bugzilla.suse.com/1213036" source="BUGZILLA"/>
		<reference ref_id="1213037" ref_url="https://bugzilla.suse.com/1213037" source="BUGZILLA"/>
		<reference ref_id="1213038" ref_url="https://bugzilla.suse.com/1213038" source="BUGZILLA"/>
		<reference ref_id="1213039" ref_url="https://bugzilla.suse.com/1213039" source="BUGZILLA"/>
		<reference ref_id="1213040" ref_url="https://bugzilla.suse.com/1213040" source="BUGZILLA"/>
		<reference ref_id="1213041" ref_url="https://bugzilla.suse.com/1213041" source="BUGZILLA"/>
		<reference ref_id="1213087" ref_url="https://bugzilla.suse.com/1213087" source="BUGZILLA"/>
		<reference ref_id="1213088" ref_url="https://bugzilla.suse.com/1213088" source="BUGZILLA"/>
		<reference ref_id="1213089" ref_url="https://bugzilla.suse.com/1213089" source="BUGZILLA"/>
		<reference ref_id="1213090" ref_url="https://bugzilla.suse.com/1213090" source="BUGZILLA"/>
		<reference ref_id="1213092" ref_url="https://bugzilla.suse.com/1213092" source="BUGZILLA"/>
		<reference ref_id="1213093" ref_url="https://bugzilla.suse.com/1213093" source="BUGZILLA"/>
		<reference ref_id="1213094" ref_url="https://bugzilla.suse.com/1213094" source="BUGZILLA"/>
		<reference ref_id="1213095" ref_url="https://bugzilla.suse.com/1213095" source="BUGZILLA"/>
		<reference ref_id="1213096" ref_url="https://bugzilla.suse.com/1213096" source="BUGZILLA"/>
		<reference ref_id="1213098" ref_url="https://bugzilla.suse.com/1213098" source="BUGZILLA"/>
		<reference ref_id="1213099" ref_url="https://bugzilla.suse.com/1213099" source="BUGZILLA"/>
		<reference ref_id="1213100" ref_url="https://bugzilla.suse.com/1213100" source="BUGZILLA"/>
		<reference ref_id="1213102" ref_url="https://bugzilla.suse.com/1213102" source="BUGZILLA"/>
		<reference ref_id="1213103" ref_url="https://bugzilla.suse.com/1213103" source="BUGZILLA"/>
		<reference ref_id="1213104" ref_url="https://bugzilla.suse.com/1213104" source="BUGZILLA"/>
		<reference ref_id="1213105" ref_url="https://bugzilla.suse.com/1213105" source="BUGZILLA"/>
		<reference ref_id="1213106" ref_url="https://bugzilla.suse.com/1213106" source="BUGZILLA"/>
		<reference ref_id="1213107" ref_url="https://bugzilla.suse.com/1213107" source="BUGZILLA"/>
		<reference ref_id="1213108" ref_url="https://bugzilla.suse.com/1213108" source="BUGZILLA"/>
		<reference ref_id="1213109" ref_url="https://bugzilla.suse.com/1213109" source="BUGZILLA"/>
		<reference ref_id="1213110" ref_url="https://bugzilla.suse.com/1213110" source="BUGZILLA"/>
		<reference ref_id="1213111" ref_url="https://bugzilla.suse.com/1213111" source="BUGZILLA"/>
		<reference ref_id="1213112" ref_url="https://bugzilla.suse.com/1213112" source="BUGZILLA"/>
		<reference ref_id="1213113" ref_url="https://bugzilla.suse.com/1213113" source="BUGZILLA"/>
		<reference ref_id="1213114" ref_url="https://bugzilla.suse.com/1213114" source="BUGZILLA"/>
		<reference ref_id="1213116" ref_url="https://bugzilla.suse.com/1213116" source="BUGZILLA"/>
		<reference ref_id="1213134" ref_url="https://bugzilla.suse.com/1213134" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-36280" ref_url="https://www.suse.com/security/cve/CVE-2022-36280/" source="CVE"/>
		<reference ref_id="CVE-2022-38096" ref_url="https://www.suse.com/security/cve/CVE-2022-38096/" source="CVE"/>
		<reference ref_id="CVE-2022-4269" ref_url="https://www.suse.com/security/cve/CVE-2022-4269/" source="CVE"/>
		<reference ref_id="CVE-2022-45884" ref_url="https://www.suse.com/security/cve/CVE-2022-45884/" source="CVE"/>
		<reference ref_id="CVE-2022-45885" ref_url="https://www.suse.com/security/cve/CVE-2022-45885/" source="CVE"/>
		<reference ref_id="CVE-2022-45886" ref_url="https://www.suse.com/security/cve/CVE-2022-45886/" source="CVE"/>
		<reference ref_id="CVE-2022-45887" ref_url="https://www.suse.com/security/cve/CVE-2022-45887/" source="CVE"/>
		<reference ref_id="CVE-2022-45919" ref_url="https://www.suse.com/security/cve/CVE-2022-45919/" source="CVE"/>
		<reference ref_id="CVE-2022-4744" ref_url="https://www.suse.com/security/cve/CVE-2022-4744/" source="CVE"/>
		<reference ref_id="CVE-2023-0045" ref_url="https://www.suse.com/security/cve/CVE-2023-0045/" source="CVE"/>
		<reference ref_id="CVE-2023-0122" ref_url="https://www.suse.com/security/cve/CVE-2023-0122/" source="CVE"/>
		<reference ref_id="CVE-2023-0179" ref_url="https://www.suse.com/security/cve/CVE-2023-0179/" source="CVE"/>
		<reference ref_id="CVE-2023-0394" ref_url="https://www.suse.com/security/cve/CVE-2023-0394/" source="CVE"/>
		<reference ref_id="CVE-2023-0461" ref_url="https://www.suse.com/security/cve/CVE-2023-0461/" source="CVE"/>
		<reference ref_id="CVE-2023-0469" ref_url="https://www.suse.com/security/cve/CVE-2023-0469/" source="CVE"/>
		<reference ref_id="CVE-2023-0590" ref_url="https://www.suse.com/security/cve/CVE-2023-0590/" source="CVE"/>
		<reference ref_id="CVE-2023-0597" ref_url="https://www.suse.com/security/cve/CVE-2023-0597/" source="CVE"/>
		<reference ref_id="CVE-2023-1075" ref_url="https://www.suse.com/security/cve/CVE-2023-1075/" source="CVE"/>
		<reference ref_id="CVE-2023-1076" ref_url="https://www.suse.com/security/cve/CVE-2023-1076/" source="CVE"/>
		<reference ref_id="CVE-2023-1077" ref_url="https://www.suse.com/security/cve/CVE-2023-1077/" source="CVE"/>
		<reference ref_id="CVE-2023-1079" ref_url="https://www.suse.com/security/cve/CVE-2023-1079/" source="CVE"/>
		<reference ref_id="CVE-2023-1095" ref_url="https://www.suse.com/security/cve/CVE-2023-1095/" source="CVE"/>
		<reference ref_id="CVE-2023-1118" ref_url="https://www.suse.com/security/cve/CVE-2023-1118/" source="CVE"/>
		<reference ref_id="CVE-2023-1249" ref_url="https://www.suse.com/security/cve/CVE-2023-1249/" source="CVE"/>
		<reference ref_id="CVE-2023-1382" ref_url="https://www.suse.com/security/cve/CVE-2023-1382/" source="CVE"/>
		<reference ref_id="CVE-2023-1513" ref_url="https://www.suse.com/security/cve/CVE-2023-1513/" source="CVE"/>
		<reference ref_id="CVE-2023-1582" ref_url="https://www.suse.com/security/cve/CVE-2023-1582/" source="CVE"/>
		<reference ref_id="CVE-2023-1583" ref_url="https://www.suse.com/security/cve/CVE-2023-1583/" source="CVE"/>
		<reference ref_id="CVE-2023-1611" ref_url="https://www.suse.com/security/cve/CVE-2023-1611/" source="CVE"/>
		<reference ref_id="CVE-2023-1637" ref_url="https://www.suse.com/security/cve/CVE-2023-1637/" source="CVE"/>
		<reference ref_id="CVE-2023-1652" ref_url="https://www.suse.com/security/cve/CVE-2023-1652/" source="CVE"/>
		<reference ref_id="CVE-2023-1670" ref_url="https://www.suse.com/security/cve/CVE-2023-1670/" source="CVE"/>
		<reference ref_id="CVE-2023-1829" ref_url="https://www.suse.com/security/cve/CVE-2023-1829/" source="CVE"/>
		<reference ref_id="CVE-2023-1838" ref_url="https://www.suse.com/security/cve/CVE-2023-1838/" source="CVE"/>
		<reference ref_id="CVE-2023-1855" ref_url="https://www.suse.com/security/cve/CVE-2023-1855/" source="CVE"/>
		<reference ref_id="CVE-2023-1989" ref_url="https://www.suse.com/security/cve/CVE-2023-1989/" source="CVE"/>
		<reference ref_id="CVE-2023-1998" ref_url="https://www.suse.com/security/cve/CVE-2023-1998/" source="CVE"/>
		<reference ref_id="CVE-2023-2002" ref_url="https://www.suse.com/security/cve/CVE-2023-2002/" source="CVE"/>
		<reference ref_id="CVE-2023-21102" ref_url="https://www.suse.com/security/cve/CVE-2023-21102/" source="CVE"/>
		<reference ref_id="CVE-2023-21106" ref_url="https://www.suse.com/security/cve/CVE-2023-21106/" source="CVE"/>
		<reference ref_id="CVE-2023-2124" ref_url="https://www.suse.com/security/cve/CVE-2023-2124/" source="CVE"/>
		<reference ref_id="CVE-2023-2156" ref_url="https://www.suse.com/security/cve/CVE-2023-2156/" source="CVE"/>
		<reference ref_id="CVE-2023-2162" ref_url="https://www.suse.com/security/cve/CVE-2023-2162/" source="CVE"/>
		<reference ref_id="CVE-2023-2176" ref_url="https://www.suse.com/security/cve/CVE-2023-2176/" source="CVE"/>
		<reference ref_id="CVE-2023-2235" ref_url="https://www.suse.com/security/cve/CVE-2023-2235/" source="CVE"/>
		<reference ref_id="CVE-2023-2269" ref_url="https://www.suse.com/security/cve/CVE-2023-2269/" source="CVE"/>
		<reference ref_id="CVE-2023-22998" ref_url="https://www.suse.com/security/cve/CVE-2023-22998/" source="CVE"/>
		<reference ref_id="CVE-2023-23000" ref_url="https://www.suse.com/security/cve/CVE-2023-23000/" source="CVE"/>
		<reference ref_id="CVE-2023-23001" ref_url="https://www.suse.com/security/cve/CVE-2023-23001/" source="CVE"/>
		<reference ref_id="CVE-2023-23004" ref_url="https://www.suse.com/security/cve/CVE-2023-23004/" source="CVE"/>
		<reference ref_id="CVE-2023-23006" ref_url="https://www.suse.com/security/cve/CVE-2023-23006/" source="CVE"/>
		<reference ref_id="CVE-2023-2430" ref_url="https://www.suse.com/security/cve/CVE-2023-2430/" source="CVE"/>
		<reference ref_id="CVE-2023-2483" ref_url="https://www.suse.com/security/cve/CVE-2023-2483/" source="CVE"/>
		<reference ref_id="CVE-2023-25012" ref_url="https://www.suse.com/security/cve/CVE-2023-25012/" source="CVE"/>
		<reference ref_id="CVE-2023-2513" ref_url="https://www.suse.com/security/cve/CVE-2023-2513/" source="CVE"/>
		<reference ref_id="CVE-2023-26545" ref_url="https://www.suse.com/security/cve/CVE-2023-26545/" source="CVE"/>
		<reference ref_id="CVE-2023-28327" ref_url="https://www.suse.com/security/cve/CVE-2023-28327/" source="CVE"/>
		<reference ref_id="CVE-2023-28410" ref_url="https://www.suse.com/security/cve/CVE-2023-28410/" source="CVE"/>
		<reference ref_id="CVE-2023-28464" ref_url="https://www.suse.com/security/cve/CVE-2023-28464/" source="CVE"/>
		<reference ref_id="CVE-2023-28866" ref_url="https://www.suse.com/security/cve/CVE-2023-28866/" source="CVE"/>
		<reference ref_id="CVE-2023-3006" ref_url="https://www.suse.com/security/cve/CVE-2023-3006/" source="CVE"/>
		<reference ref_id="CVE-2023-30456" ref_url="https://www.suse.com/security/cve/CVE-2023-30456/" source="CVE"/>
		<reference ref_id="CVE-2023-30772" ref_url="https://www.suse.com/security/cve/CVE-2023-30772/" source="CVE"/>
		<reference ref_id="CVE-2023-3090" ref_url="https://www.suse.com/security/cve/CVE-2023-3090/" source="CVE"/>
		<reference ref_id="CVE-2023-31084" ref_url="https://www.suse.com/security/cve/CVE-2023-31084/" source="CVE"/>
		<reference ref_id="CVE-2023-3111" ref_url="https://www.suse.com/security/cve/CVE-2023-3111/" source="CVE"/>
		<reference ref_id="CVE-2023-3141" ref_url="https://www.suse.com/security/cve/CVE-2023-3141/" source="CVE"/>
		<reference ref_id="CVE-2023-31436" ref_url="https://www.suse.com/security/cve/CVE-2023-31436/" source="CVE"/>
		<reference ref_id="CVE-2023-3161" ref_url="https://www.suse.com/security/cve/CVE-2023-3161/" source="CVE"/>
		<reference ref_id="CVE-2023-3212" ref_url="https://www.suse.com/security/cve/CVE-2023-3212/" source="CVE"/>
		<reference ref_id="CVE-2023-3220" ref_url="https://www.suse.com/security/cve/CVE-2023-3220/" source="CVE"/>
		<reference ref_id="CVE-2023-32233" ref_url="https://www.suse.com/security/cve/CVE-2023-32233/" source="CVE"/>
		<reference ref_id="CVE-2023-33288" ref_url="https://www.suse.com/security/cve/CVE-2023-33288/" source="CVE"/>
		<reference ref_id="CVE-2023-3357" ref_url="https://www.suse.com/security/cve/CVE-2023-3357/" source="CVE"/>
		<reference ref_id="CVE-2023-3358" ref_url="https://www.suse.com/security/cve/CVE-2023-3358/" source="CVE"/>
		<reference ref_id="CVE-2023-3389" ref_url="https://www.suse.com/security/cve/CVE-2023-3389/" source="CVE"/>
		<reference ref_id="CVE-2023-33951" ref_url="https://www.suse.com/security/cve/CVE-2023-33951/" source="CVE"/>
		<reference ref_id="CVE-2023-33952" ref_url="https://www.suse.com/security/cve/CVE-2023-33952/" source="CVE"/>
		<reference ref_id="CVE-2023-35788" ref_url="https://www.suse.com/security/cve/CVE-2023-35788/" source="CVE"/>
		<reference ref_id="CVE-2023-35823" ref_url="https://www.suse.com/security/cve/CVE-2023-35823/" source="CVE"/>
		<reference ref_id="CVE-2023-35828" ref_url="https://www.suse.com/security/cve/CVE-2023-35828/" source="CVE"/>
		<reference ref_id="CVE-2023-35829" ref_url="https://www.suse.com/security/cve/CVE-2023-35829/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-36280: Fixed out-of-bounds memory access vulnerability found in vmwgfx driver (bsc#1203332).
- CVE-2022-38096: Fixed NULL-ptr deref in vmw_cmd_dx_define_query() (bsc#1203331).
- CVE-2022-4269: Fixed a flaw was found inside the Traffic Control (TC) subsystem (bsc#1206024).
- CVE-2022-45884: Fixed a use-after-free in dvbdev.c, related to dvb_register_device dynamically allocating fops (bsc#1205756).
- CVE-2022-45885: Fixed a race condition in dvb_frontend.c that could cause a use-after-free when a device is disconnected (bsc#1205758).
- CVE-2022-45886: Fixed a .disconnect versus dvb_device_open race condition in dvb_net.c that lead to a use-after-free (bsc#1205760).
- CVE-2022-45887: Fixed a memory leak in ttusb_dec.c caused by the lack of a dvb_frontend_detach call (bsc#1205762).
- CVE-2022-45919: Fixed a use-after-free in dvb_ca_en50221.c that could occur if there is a disconnect after an open, because of the lack of a wait_event (bsc#1205803).
- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209635).
- CVE-2023-0045: Fixed missing Flush IBP in ib_prctl_set (bsc#1207773).
- CVE-2023-0122: Fixed a NULL pointer dereference vulnerability in nvmet_setup_auth(), that allowed an attacker to perform a Pre-Auth Denial of Service (DoS) attack on a remote machine (bsc#1207050).
- CVE-2023-0179: Fixed incorrect arithmetics when fetching VLAN header bits (bsc#1207034).
- CVE-2023-0394: Fixed a null pointer dereference in the network subcomponent. This flaw could cause system crashes (bsc#1207168).
- CVE-2023-0461: Fixed use-after-free in icsk_ulp_data (bsc#1208787).
- CVE-2023-0469: Fixed a use-after-free flaw in io_uring/filetable.c in io_install_fixed_file in the io_uring subcomponent (bsc#1207521).
- CVE-2023-0590: Fixed race condition in qdisc_graft() (bsc#1207795).
- CVE-2023-0597: Fixed lack of randomization of per-cpu entry area in x86/mm (bsc#1207845).
- CVE-2023-1075: Fixed a type confusion in tls_is_tx_ready (bsc#1208598).
- CVE-2023-1076: Fixed incorrect UID assigned to tun/tap sockets (bsc#1208599).
- CVE-2023-1077: Fixed a type confusion in pick_next_rt_entity(), that could cause memory corruption (bsc#1208600).
- CVE-2023-1079: Fixed a use-after-free problem that could have been triggered in asus_kbd_backlight_set when plugging/disconnecting a malicious USB device (bsc#1208604).
- CVE-2023-1095: Fixed a NULL pointer dereference in nf_tables due to zeroed list head (bsc#1208777).
- CVE-2023-1118: Fixed a use-after-free bugs caused by ene_tx_irqsim() in media/rc (bsc#1208837).
- CVE-2023-1249: Fixed a use-after-free flaw in the core dump subsystem that allowed a local user to crash the system (bsc#1209039).
- CVE-2023-1382: Fixed denial of service in tipc_conn_close (bsc#1209288).
- CVE-2023-1513: Fixed an uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak (bsc#1209532).
- CVE-2023-1582: Fixed soft lockup in __page_mapcount (bsc#1209636).
- CVE-2023-1583: Fixed a NULL pointer dereference in io_file_bitmap_get in io_uring/filetable.c (bsc#1209637).
- CVE-2023-1611: Fixed an use-after-free flaw in btrfs_search_slot (bsc#1209687).
- CVE-2023-1637: Fixed vulnerability that could lead to unauthorized access to CPU memory after resuming CPU from suspend-to-RAM (bsc#1209779).
- CVE-2023-1652: Fixed use-after-free that could lead to DoS and information leak in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c (bsc#1209788).
- CVE-2023-1670: Fixed a use after free in the Xircom 16-bit PCMCIA Ethernet driver. A local user could use this flaw to crash the system or potentially escalate their privileges on the system (bsc#1209871).
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).
- CVE-2023-1838: Fixed an use-after-free flaw in virtio network subcomponent. This flaw could allow a local attacker to crash the system and lead to a kernel information leak problem. (bsc#1210203).
- CVE-2023-1855: Fixed a use after free in xgene_hwmon_remove (bsc#1210202).
- CVE-2023-1989: Fixed a use after free in btsdio_remove (bsc#1210336).
- CVE-2023-1998: Fixed a use after free during login when accessing the shost ipaddress (bsc#1210506).
- CVE-2023-2002: Fixed a flaw that allowed an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication (bsc#1210533).
- CVE-2023-21102: Fixed possible bypass of shadow stack protection in __efi_rt_asm_wrapper of efi-rt-wrapper.S (bsc#1212155).
- CVE-2023-21106: Fixed possible memory corruption due to double free in adreno_set_param of adreno_gpu.c (bsc#1211654).
- CVE-2023-2124: Fixed an out-of-bound access in the XFS subsystem that could have lead to denial-of-service or potentially privilege escalation (bsc#1210498).
- CVE-2023-2156: Fixed a flaw in the networking subsystem within the handling of the RPL protocol (bsc#1211131).
- CVE-2023-2162: Fixed an use-after-free flaw in iscsi_sw_tcp_session_create (bsc#1210647).
- CVE-2023-2176: Fixed an out-of-boundary read in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA (bsc#1210629).
- CVE-2023-2235: Fixed a use-after-free vulnerability in the Performance Events system that could have been exploited to achieve local privilege escalation (bsc#1210986).
- CVE-2023-2269: Fixed a denial-of-service problem due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c (bsc#1210806).
- CVE-2023-22998: Fixed NULL vs IS_ERR checking in virtio_gpu_object_shmem_init (bsc#1208776).
- CVE-2023-23000: Fixed return value of tegra_xusb_find_port_node function phy/tegra (bsc#1208816).
- CVE-2023-23001: Fixed misinterpretation of regulator_get return value in drivers/scsi/ufs/ufs-mediatek.c (bsc#1208829).
- CVE-2023-23004: Fixed misinterpretation of get_sg_table return value (bsc#1208843).
- CVE-2023-23006: Fixed NULL vs IS_ERR checking in dr_domain_init_resources (bsc#1208845).
- CVE-2023-2430: Fixed a missing lock on overflow for IOPOLL (bsc#1211014).
- CVE-2023-2483: Fixed a use after free bug in emac_remove caused by a race condition (bsc#1211037).
- CVE-2023-25012: Fixed a use-after-free in bigben_set_led() (bsc#1207560).
- CVE-2023-2513: Fixed a use-after-free vulnerability in the ext4 filesystem (bsc#1211105).
- CVE-2023-26545: Fixed double free in net/mpls/af_mpls.c upon an allocation failure (bsc#1208700).
- CVE-2023-28327: Fixed DoS in in_skb in unix_diag_get_exact() (bsc#1209290).
- CVE-2023-28410: Fixed improper restriction of operations within the bounds of a memory buffer in some Intel(R) i915 Graphics drivers that may have allowed an authenticated user to potentially enable escalation of privilege via local access (bsc#1211263).
- CVE-2023-28464: Fixed user-after-free that could lead to privilege escalation in hci_conn_cleanup in net/uetooth/hci_conn.c (bsc#1209052).
- CVE-2023-28866: Fixed an out-of-bounds access in net/bluetooth/hci_sync.c because amp_init1[] and amp_init2[] are supposed to have an intentionally invalid element, but did not (bsc#1209780).
- CVE-2023-3006: Fixed a known cache speculation vulnerability, known as Branch History Injection (BHI) or Spectre-BHB, for the new hw AmpereOne (bsc#1211855).
- CVE-2023-30456: Fixed an issue in arch/x86/kvm/vmx/nested.c with nVMX on x86_64 lacks consistency checks for CR0 and CR4 (bsc#1210294).
- CVE-2023-30772: Fixed race condition and resultant use-after-free in da9150_charger_remove (bsc#1210329).
- CVE-2023-3090: Fixed a heap out-of-bounds write in the ipvlan network driver (bsc#1212842).
- CVE-2023-31084: Fixed a blocking issue in drivers/media/dvb-core/dvb_frontend.c (bsc#1210783).
- CVE-2023-3111: Fixed a use-after-free vulnerability in prepare_to_relocate in fs/btrfs/relocation.c (bsc#1212051).
- CVE-2023-3141: Fixed a use-after-free flaw in r592_remove in drivers/memstick/host/r592.c, that allowed local attackers to crash the system at device disconnect (bsc#1212129).
- CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because lmax can exceed QFQ_MIN_LMAX (bsc#1210940).
- CVE-2023-3161: Fixed shift-out-of-bounds in fbcon_set_font() (bsc#1212154).
- CVE-2023-3212: Fixed a NULL pointer dereference flaw in the gfs2 file system (bsc#1212265).
- CVE-2023-3220: Fixed a NULL pointer dereference flaw in dpu_crtc_atomic_check in drivers/gpu/drm/msm/disp/dpu1/dpu_crtc.c lacks check of the return value of kzalloc() (bsc#1212556).
- CVE-2023-32233: Fixed a use-after-free in Netfilter nf_tables when processing batch requests (bsc#1211043).
- CVE-2023-33288: Fixed a use-after-free in bq24190_remove in drivers/power/supply/bq24190_charger.c (bsc#1211590).
- CVE-2023-3357: Fixed a NULL pointer dereference flaw in the AMD Sensor Fusion Hub driver (bsc#1212605).
- CVE-2023-3358: Fixed a NULL pointer dereference flaw in the Integrated Sensor Hub (ISH) driver (bsc#1212606).
- CVE-2023-3389: Fixed a use-after-free vulnerability in the io_uring subsystem (bsc#1212838).
- CVE-2023-33951: Fixed a race condition that could have led to an information disclosure inside the vmwgfx driver (bsc#1211593).
- CVE-2023-33952: Fixed a double free that could have led to a local privilege escalation inside the vmwgfx driver (bsc#1211595).
- CVE-2023-35788: Fixed an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets in fl_set_geneve_opt in net/sched/cls_flower.c (bsc#1212504).
- CVE-2023-35823: Fixed a use-after-free flaw in saa7134_finidev in drivers/media/pci/saa7134/saa7134-core.c (bsc#1212494).
- CVE-2023-35828: Fixed a use-after-free flaw in renesas_usb3_remove in drivers/usb/gadget/udc/renesas_usb3.c (bsc#1212513).
- CVE-2023-35829: Fixed a use-after-free flaw in rkvdec_remove in drivers/staging/media/rkvdec/rkvdec.c (bsc#1212495).

The following non-security bugs were fixed:

- 3c589_cs: Fix an error handling path in tc589_probe() (git-fixes).
- Add MODULE_FIRMWARE() for FIRMWARE_TG357766 (git-fixes).
- Avoid deadlock for recursive I/O on dm-thin when used as swap (bsc#1177529).
- Fix missing top level chapter numbers on SLE12 SP5 (bsc#1212158).
- Fix page corruption caused by racy check in __free_pages (bsc#1208149).
- Get module prefix from kmod (bsc#1212835).
- Move upstreamed x86, scsi and arm patches into sorted section
- Fixed typo that might caused (bsc#1209457).
- Fix bug introduced by broken backport (bsc#1208628).
- Update patch for launch issue (bsc#1210853).
- [infiniband] READ is 'data destination', not source... (git-fixes)
- [xen] fix 'direction' argument of iov_iter_kvec() (git-fixes).
- acpi / x86: Add support for LPS0 callback handler (git-fixes).
- acpi: Do not build ACPICA with '-Os' (git-fixes).
- acpi: EC: Fix EC address space handler unregistration (bsc#1207149).
- acpi: EC: Fix ECDT probe ordering issues (bsc#1207149).
- acpi: EC: Fix oops when removing custom query handlers (git-fixes).
- acpi: NFIT: fix a potential deadlock during NFIT teardown (git-fixes).
- acpi: PM: Do not turn of unused power resources on the Toshiba Click Mini (git-fixes).
- acpi: PM: s2idle: Add support for upcoming AMD uPEP HID AMDI008 (bsc#1206224).
- acpi: PM: s2idle: Use LPS0 idle if ACPI_FADT_LOW_POWER_S0 is unset (bsc#1206224).
- acpi: PPTT: Fix to avoid sleep in the atomic context when PPTT is absent (git-fixes).
- acpi: VIOT: Initialize the correct IOMMU fwspec (git-fixes).
- acpi: battery: Fix missing NUL-termination with large strings (git-fixes).
- acpi: bus: Ensure that notify handlers are not running after removal (git-fixes).
- acpi: cppc: Add AMD pstate energy performance preference cppc control (bsc#1212445).
- acpi: cppc: Add auto select register read/write support (bsc#1212445).
- acpi: cppc: Disable FIE if registers in PCC regions (bsc#1210953).
- acpi: processor: Fix evaluating _PDC method when running as Xen dom0 (git-fixes).
- acpi: resource: Add IRQ override quirk for LG UltraPC 17U70P (git-fixes).
- acpi: resource: Add IRQ overrides for MAINGEAR Vector Pro 2 models (git-fixes).
- acpi: resource: Add Medion S17413 to IRQ override quirk (git-fixes).
- acpi: resource: Add helper function acpi_dev_get_memory_resources() (git-fixes).
- acpi: resource: Do IRQ override on all TongFang GMxRGxx (git-fixes).
- acpi: sleep: Avoid breaking S3 wakeup due to might_sleep() (git-fixes).
- acpi: tables: Add support for NBFT (bsc#1195921).
- acpi: tables: Add support for NBFT (bsc#1206340).
- acpi: video: Add acpi_video_backlight_use_native() helper (bsc#1206843).
- acpi: video: Allow GPU drivers to report no panels (bsc#1206843).
- acpi: video: Fix Lenovo Ideapad Z570 DMI match (git-fixes).
- acpi: video: Fix missing native backlight on Chromebooks (bsc#1206843).
- acpi: video: Refactor acpi_video_get_backlight_type() a bit (bsc#1203693).
- acpi: x86: s2idle: Add a quirk for ASUS ROG Zephyrus G14 (bsc#1206224).
- acpi: x86: s2idle: Add a quirk for ASUS TUF Gaming A17 FA707RE (bsc#1206224).
- acpi: x86: s2idle: Add a quirk for ASUSTeK COMPUTER INC. ROG Flow X13 (bsc#1206224).
- acpi: x86: s2idle: Add a quirk for Lenovo Slim 7 Pro 14ARH7 (bsc#1206224).
- acpi: x86: s2idle: Add another ID to s2idle_dmi_table (bsc#1206224).
- acpi: x86: s2idle: Add module parameter to prefer Microsoft GUID (bsc#1206224).
- acpi: x86: s2idle: Fix a NULL pointer dereference (bsc#1206224).
- acpi: x86: s2idle: Force AMD GUID/_REV 2 on HP Elitebook 865 (bsc#1206224).
- acpi: x86: s2idle: If a new AMD _HID is missing assume Rembrandt (bsc#1206224).
- acpi: x86: s2idle: Move _HID handling for AMD systems into structures (bsc#1206224).
- acpi: x86: s2idle: Stop using AMD specific codepath for Rembrandt+ (bsc#1206224).
- acpi: x86: utils: Add Cezanne to the list for forcing StorageD3Enable (git-fixes).
- acpica: ACPICA: check null return of ACPI_ALLOCATE_ZEROED in acpi_db_display_objects (git-fixes).
- acpica: Allow address_space_handler Install and _REG execution as 2 separate steps (bsc#1207149).
- acpica: Avoid undefined behavior: applying zero offset to null pointer (git-fixes).
- acpica: Drop port I/O validation for some regions (git-fixes).
- acpica: include/acpi/acpixf.h: Fix indentation (bsc#1207149).
- acpica: nsrepair: handle cases without a return value correctly (git-fixes).
- add mainline tags to five pci_hyperv patches
- affs: initialize fsdata in affs_truncate() (git-fixes).
- alarmtimer: Prevent starvation by small intervals and SIG_IGN (git-fixes)
- alsa: ac97: Fix possible NULL dereference in snd_ac97_mixer (git-fixes).
- alsa: asihpi: check pao in control_message() (git-fixes).
- alsa: caiaq: input: Add error handling for unsupported input methods in `snd_usb_caiaq_input_init` (git-fixes).
- alsa: cs46xx: mark snd_cs46xx_download_image as static (git-fixes).
- alsa: emu10k1: do not create old pass-through playback device on Audigy (git-fixes).
- alsa: emu10k1: fix capture interrupt handler unlinking (git-fixes).
- alsa: emux: Avoid potential array out-of-bound in snd_emux_xg_control() (git-fixes).
- alsa: fireface: make read-only const array for model names static (git-fixes).
- alsa: firewire-digi00x: prevent potential use after free (git-fixes).
- alsa: firewire-tascam: add missing unwind goto in snd_tscm_stream_start_duplex() (git-fixes).
- alsa: hda/ca0132: add quirk for EVGA X299 DARK (git-fixes).
- alsa: hda/ca0132: fixup buffer overrun at tuning_ctl_set() (git-fixes).
- alsa: hda/ca0132: minor fix for allocation size (git-fixes).
- alsa: hda/cirrus: Add extra 10 ms delay to allow PLL settle and lock (git-fixes).
- alsa: hda/conexant: Partial revert of a quirk for Lenovo (git-fixes).
- alsa: hda/conexant: add a new hda codec SN6180 (git-fixes).
- alsa: hda/hdmi: Preserve the previous PCM device upon re-enablement (git-fixes).
- alsa: hda/hdmi: disable KAE for Intel DG2 (git-fixes).
- alsa: hda/realtek - fixed wrong gpio assigned (git-fixes).
- alsa: hda/realtek: Add 'Intel Reference board' and 'NUC 13' SSID in the ALC256 (git-fixes).
- alsa: hda/realtek: Add Acer Predator PH315-54 (git-fixes).
- alsa: hda/realtek: Add Lenovo P3 Tower platform (git-fixes).
- alsa: hda/realtek: Add Positivo N14KP6-TG (git-fixes).
- alsa: hda/realtek: Add a quirk for Compaq N14JP6 (git-fixes).
- alsa: hda/realtek: Add a quirk for HP EliteDesk 805 (git-fixes).
- alsa: hda/realtek: Add a quirk for HP Slim Desktop S01 (git-fixes).
- alsa: hda/realtek: Add quirk for 2nd ASUS GU603 (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS ROG G614Jx (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS ROG G634Z (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS ROG GA402X (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS ROG GV601V (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS ROG GX650P (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS ROG GZ301V (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS UM3402 using CS35L41 (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS UM3402YAR using CS35L41 (git-fixes).
- alsa: hda/realtek: Add quirk for Clevo L140AU (git-fixes).
- alsa: hda/realtek: Add quirk for Clevo NPx0SNx (git-fixes).
- alsa: hda/realtek: Add quirk for Clevo NS50AU (git-fixes).
- alsa: hda/realtek: Add quirk for Clevo X370SNW (git-fixes).
- alsa: hda/realtek: Add quirk for HP EliteBook G10 laptops (git-fixes).
- alsa: hda/realtek: Add quirk for HP EliteDesk 800 G6 Tower PC (git-fixes).
- alsa: hda/realtek: Add quirk for Lenovo ZhaoYang CF4620Z (git-fixes).
- alsa: hda/realtek: Add quirk for ThinkPad P1 Gen 6 (git-fixes).
- alsa: hda/realtek: Add quirks for ASUS GU604V and GU603V (git-fixes).
- alsa: hda/realtek: Add quirks for Asus ROG 2024 laptops using CS35L41 (git-fixes).
- alsa: hda/realtek: Add quirks for Lenovo Z13/Z16 Gen2 (git-fixes).
- alsa: hda/realtek: Add quirks for ROG ALLY CS35l41 audio (git-fixes).
- alsa: hda/realtek: Add quirks for Unis H3C Desktop B760 &amp; Q760 (git-fixes).
- alsa: hda/realtek: Add quirks for some Clevo laptops (git-fixes).
- alsa: hda/realtek: Amend G634 quirk to enable rear speakers (git-fixes).
- alsa: hda/realtek: Apply HP B&amp;O top speaker profile to Pavilion 15 (git-fixes).
- alsa: hda/realtek: Enable 4 amplifiers instead of 2 on a HP platform (git-fixes).
- alsa: hda/realtek: Enable headset onLenovo M70/M90 (git-fixes).
- alsa: hda/realtek: Enable mute/micmute LEDs and limit mic boost on EliteBook (git-fixes).
- alsa: hda/realtek: Enable mute/micmute LEDs and speaker support for HP Laptops (git-fixes).
- alsa: hda/realtek: Enable mute/micmute LEDs on HP Elitebook, 645 G9 (git-fixes).
- alsa: hda/realtek: Fix mute and micmute LEDs for an HP laptop (git-fixes).
- alsa: hda/realtek: Fix mute and micmute LEDs for yet another HP laptop (git-fixes).
- alsa: hda/realtek: Fix support for Dell Precision 3260 (git-fixes).
- alsa: hda/realtek: Fix the speaker output on Samsung Galaxy Book2 Pro (git-fixes).
- alsa: hda/realtek: Fix the speaker output on Samsung Galaxy Book2 Pro 360 (git-fixes).
- alsa: hda/realtek: Remove specific patch for Dell Precision 3260 (git-fixes).
- alsa: hda/realtek: Whitespace fix (git-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs do not work for a HP platform (git-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs for a HP ProBook (git-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs, speaker do not work for a HP platform (git-fixes).
- alsa: hda/realtek: fix speaker, mute/micmute LEDs not work on a HP platform (git-fixes).
- alsa: hda/realtek: support HP Pavilion Aero 13-be0xxx Mute LED (git-fixes).
- alsa: hda/sigmatel: add pin overrides for Intel DP45SG motherboard (git-fixes).
- alsa: hda/sigmatel: fix S/PDIF out on Intel D*45* motherboards (git-fixes).
- alsa: hda/via: Avoid potential array out-of-bound in add_secret_dac_path() (git-fixes).
- alsa: hda: Add NVIDIA codec IDs a3 through a7 to patch table (git-fixes).
- alsa: hda: Do not unset preset when cleaning up codec (git-fixes).
- alsa: hda: Fix Oops by 9.1 surround channel names (git-fixes).
- alsa: hda: Fix unhandled register update during auto-suspend period (git-fixes).
- alsa: hda: Glenfly: add HD Audio PCI IDs and HDMI Codec Vendor IDs (git-fixes).
- alsa: hda: LNL: add HD Audio PCI ID (git-fixes).
- alsa: hda: Match only Intel devices with CONTROLLER_IN_GPU() (git-fixes).
- alsa: hda: cs35l41: Enable Amp High Pass Filter (git-fixes).
- alsa: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() (git-fixes).
- alsa: hda: intel-dsp-config: add MTL PCI id (git-fixes).
- alsa: hda: patch_realtek: add quirk for Asus N7601ZM (git-fixes).
- alsa: i2c/cs8427: fix iec958 mixer control deactivation (git-fixes).
- alsa: ice1712: Delete unreachable code in aureon_add_controls() (git-fixes).
- alsa: ice1712: Do not left ice-&gt;gpio_mutex locked in aureon_add_controls() (git-fixes).
- alsa: jack: Fix mutex call in snd_jack_report() (git-fixes).
- alsa: memalloc: Workaround for Xen PV (git-fixes).
- alsa: oss: avoid missing-prototype warnings (git-fixes).
- alsa: oxfw: make read-only const array models static (git-fixes).
- alsa: pci: lx6464es: fix a debug loop (git-fixes).
- alsa: pcm: Fix potential data race at PCM memory allocation helpers (git-fixes).
- alsa: usb-audio: Add a sample rate workaround for Line6 Pod Go (git-fixes).
- alsa: usb-audio: Add quirk flag for HEM devices to enable native DSD playback (git-fixes).
- alsa: usb-audio: Add quirk for Pioneer DDJ-800 (git-fixes).
- alsa: usb-audio: Fix broken resume due to UAC3 power state (git-fixes).
- alsa: usb-audio: Fix recursive locking at XRUN during syncing (git-fixes).
- alsa: usb-audio: Fix regression on detection of Roland VS-100 (git-fixes).
- alsa: ymfpci: Fix BUG_ON in probe function (git-fixes).
- amdgpu/nv.c: Corrected typo in the video capabilities resolution (git-fixes).
- amdgpu: disable powerpc support for the newer display engine (bsc#1194869).
- amdgpu: fix build on non-DCN platforms (git-fixes).
- amdgpu: validate offset_in_bo of drm_amdgpu_gem_va (git-fixes).
- apparmor: add a kernel label to use on kernel objects (bsc#1211113).
- apparmor: fix missing error check for rhashtable_insert_fast (git-fixes).
- applicom: Fix PCI device refcount leak in applicom_init() (git-fixes).
- arch: fix broken BuildID for arm64 and riscv (bsc#1209798).
- arm64/cpufeature: Fix field sign for DIT hwcap detection (git-fixes)
- arm64: Add missing Set/Way CMO encodings (git-fixes).
- arm64: Always load shadow stack pointer directly from the task struct (git-fixes)
- arm64: Stash shadow stack pointer in the task struct on interrupt (git-fixes)
- arm64: Treat ESR_ELx as a 64-bit register (git-fixes)
- arm64: atomics: remove LL/SC trampolines (git-fixes)
- arm64: cacheinfo: Fix incorrect assignment of signed error value to (git-fixes)
- arm64: cmpxchg_double*: hazard against entire exchange variable (git-fixes)
- arm64: dts: Add DTS files for bcmbca SoC BCM4912 (git-fixes).
- arm64: dts: Add DTS files for bcmbca SoC BCM63158 (git-fixes).
- arm64: dts: Add DTS files for bcmbca SoC BCM6858 (git-fixes).
- arm64: dts: Add base DTS file for bcmbca device Asus GT-AX6000 (git-fixes).
- arm64: dts: Move BCM4908 dts to bcmbca folder (git-fixes)
- arm64: dts: amlogic: meson-axg: fix SCPI clock dvfs node name (git-fixes).
- arm64: dts: amlogic: meson-gx-libretech-pc: fix update button name (git-fixes).
- arm64: dts: amlogic: meson-gx: add missing SCPI sensors compatible (git-fixes).
- arm64: dts: amlogic: meson-gx: add missing unit address to rng node name (git-fixes).
- arm64: dts: amlogic: meson-gx: fix SCPI clock dvfs node name (git-fixes).
- arm64: dts: amlogic: meson-gxbb-kii-pro: fix led node name (git-fixes).
- arm64: dts: amlogic: meson-gxl-s905d-phicomm-n1: fix led node name (git-fixes).
- arm64: dts: amlogic: meson-gxl-s905d-sml5442tw: drop invalid clock-names property (git-fixes).
- arm64: dts: amlogic: meson-gxl: add missing unit address to eth-phy-mux node name (git-fixes).
- arm64: dts: amlogic: meson-sm1-bananapi-m5: fix adc keys node names (git-fixes).
- arm64: dts: amlogic: meson-sm1-odroid-hc4: fix active fan thermal trip (git-fixes).
- arm64: dts: arm: drop unused interrupt-names in MHU (git-fixes)
- arm64: dts: broadcom: bcm4908: add DT for Netgear RAXE500 (git-fixes).
- arm64: dts: broadcom: bcmbca: bcm4908: fix NAND interrupt name (git-fixes)
- arm64: dts: broadcom: bcmbca: bcm4908: fix procmon nodename (git-fixes)
- arm64: dts: freescale: Fix pca954x i2c-mux node names (git-fixes)
- arm64: dts: imx8-ss-dma: assign default clock rate for lpuarts (git-fixes).
- arm64: dts: imx8m: Align SoC unique ID node unit address (git-fixes).
- arm64: dts: imx8mm-evk: correct pmic clock source (git-fixes).
- arm64: dts: imx8mm-nitrogen-r2: fix WM8960 clock name (git-fixes).
- arm64: dts: imx8mm: Fix pad control for UART1_DTE_RX (git-fixes).
- arm64: dts: imx8mn-beacon: Fix SPI CS pinmux (git-fixes).
- arm64: dts: imx8mn-var-som: fix PHY detection bug by adding deassert (git-fixes)
- arm64: dts: imx8mn: specify #sound-dai-cells for SAI nodes (git-fixes).
- arm64: dts: imx8mp-phycore-som: Remove invalid PMIC property (git-fixes)
- arm64: dts: imx8mp: correct usb clocks (git-fixes)
- arm64: dts: imx8mq-thor96: fix no-mmc property for SDHCI (git-fixes).
- arm64: dts: imx8mq: add mipi csi phy and csi bridge descriptions (git-fixes)
- arm64: dts: imx8mq: fix mipi_csi bidirectional port numbers (git-fixes)
- arm64: dts: imx8qm-mek: correct GPIOs for USDHC2 CD and WP signals (git-fixes).
- arm64: dts: juno: Add missing MHU secure-irq (git-fixes)
- arm64: dts: mediatek: mt7622: Add missing pwm-cells to pwm node (git-fixes).
- arm64: dts: mediatek: mt8183: Fix systimer 13 MHz clock description (git-fixes).
- arm64: dts: meson-axg: Make mmc host controller interrupts level-sensitive (git-fixes).
- arm64: dts: meson-g12-common: Make mmc host controller interrupts level-sensitive (git-fixes).
- arm64: dts: meson-g12-common: specify full DMC range (git-fixes).
- arm64: dts: meson-g12a: Fix internal Ethernet PHY unit name (git-fixes).
- arm64: dts: meson-gx: Fix Ethernet MAC address unit name (git-fixes).
- arm64: dts: meson-gx: Fix the SCPI DVFS node name and unit address (git-fixes).
- arm64: dts: meson-gx: Make mmc host controller interrupts level-sensitive (git-fixes).
- arm64: dts: meson: bananapi-m5: switch VDDIO_C pin to OPEN_DRAIN (git-fixes).
- arm64: dts: meson: remove CPU opps below 1GHz for G12A boards (git-fixes).
- arm64: dts: mt8192: Fix CPU map for single-cluster SoC (git-fixes).
- arm64: dts: qcom: Fix IPQ8074 PCIe PHY nodes (git-fixes).
- arm64: dts: qcom: ipq8074-hk01: enable QMP device, not the PHY node (git-fixes).
- arm64: dts: qcom: ipq8074: Fix the PCI I/O port range (git-fixes).
- arm64: dts: qcom: ipq8074: correct Gen2 PCIe ranges (git-fixes).
- arm64: dts: qcom: ipq8074: correct PCIe QMP PHY output clock names (git-fixes).
- arm64: dts: qcom: ipq8074: correct USB3 QMP PHY-s clock output names (git-fixes).
- arm64: dts: qcom: ipq8074: fix Gen2 PCIe QMP PHY (git-fixes).
- arm64: dts: qcom: ipq8074: fix Gen3 PCIe QMP PHY (git-fixes).
- arm64: dts: qcom: ipq8074: fix Gen3 PCIe node (git-fixes).
- arm64: dts: qcom: ipq8074: fix PCIe PHY serdes size (git-fixes).
- arm64: dts: qcom: msm8992-libra: Add CPU regulators (git-fixes).
- arm64: dts: qcom: msm8992-libra: Fix the memory map (git-fixes).
- arm64: dts: qcom: msm8994-kitakami: drop unit address from PMI8994 regulator (git-fixes).
- arm64: dts: qcom: msm8994-msft-lumia-octagon: drop unit address from PMI8994 regulator (git-fixes).
- arm64: dts: qcom: msm8996: Add missing DWC3 quirks (git-fixes).
- arm64: dts: qcom: msm8996: Fix the PCI I/O port range (git-fixes).
- arm64: dts: qcom: msm8998: Fix stm-stimulus-base reg name (git-fixes).
- arm64: dts: qcom: msm8998: Fix the PCI I/O port range (git-fixes).
- arm64: dts: qcom: pmk8350: Specify PBS register for PON (git-fixes).
- arm64: dts: qcom: pmk8350: Use the correct PON compatible (git-fixes).
- arm64: dts: qcom: qcs404: use symbol names for PCIe resets (git-fixes).
- arm64: dts: qcom: sc7180-lite: Fix SDRAM freq for misidentified sc7180-lite boards (git-fixes).
- arm64: dts: qcom: sc7180-trogdor-lazor: correct trackpad supply (git-fixes).
- arm64: dts: qcom: sc7180: correct SPMI bus address cells (git-fixes).
- arm64: dts: qcom: sc7280: correct SPMI bus address cells (git-fixes).
- arm64: dts: qcom: sdm845-db845c: fix audio codec interrupt pin name (git-fixes).
- arm64: dts: qcom: sdm845: Fix the PCI I/O port range (git-fixes).
- arm64: dts: qcom: sm8150-kumano: Panel framebuffer is 2.5k instead of 4k (git-fixes).
- arm64: dts: qcom: sm8250: Fix the PCI I/O port range (git-fixes).
- arm64: dts: qcom: sm8350: Mark UFS controller as cache coherent (git-fixes).
- arm64: dts: renesas: beacon-renesom: Fix gpio expander reference (git-fixes).
- arm64: dts: renesas: r8a774c0: Remove bogus voltages from OPP table (git-fixes).
- arm64: dts: renesas: r8a77990: Remove bogus voltages from OPP table (git-fixes).
- arm64: dts: rockchip: drop unused LED mode property from rk3328-roc-cc (git-fixes).
- arm64: dts: ti: k3-j7200: Fix wakeup pinmux range (git-fixes).
- arm64: dts: ti: k3-j721e-main: Remove ti,strobe-sel property (git-fixes).
- arm64: efi: Execute runtime services from a dedicated stack (git-fixes).
- arm64: efi: Make efi_rt_lock a raw_spinlock (git-fixes).
- arm64: errata: add detection for AMEVCNTR01 incrementing incorrectly (git-fixes) Enable workaround and fix kABI breakage.
- arm64: kgdb: Set PSTATE.SS to 1 to re-enable single-step (git-fixes)
- arm64: kgdb: Set PSTATE.SS to 1 to re-enable single-step (git-fixes).
- arm64: make is_ttbrX_addr() noinstr-safe (git-fixes)
- arm64: mm: kfence: only handle translation faults (git-fixes)
- arm: 9290/1: uaccess: Fix KASAN false-positives (git-fixes).
- arm: 9295/1: unwind:fix unwind abort for uleb128 case (git-fixes)
- arm: 9296/1: HP Jornada 7XX: fix kernel-doc warnings (git-fixes).
- arm: bcm2835_defconfig: Enable the framebuffer (git-fixes).
- arm: cpu: Switch to arch_cpu_finalize_init() (bsc#1212448).
- arm: defconfig: drop CONFIG_DRM_RCAR_LVDS (git-fixes).
- arm: dts: Fix erroneous ADS touchscreen polarities (git-fixes).
- arm: dts: am5748: keep usb4_tm disabled (git-fixes)
- arm: dts: exynos: Use Exynos5420 compatible for the MIPI video phy (git-fixes).
- arm: dts: exynos: correct HDMI phy compatible in Exynos4 (git-fixes).
- arm: dts: exynos: correct TMU phandle in Exynos4 (git-fixes).
- arm: dts: exynos: correct TMU phandle in Exynos4210 (git-fixes).
- arm: dts: exynos: correct TMU phandle in Exynos5250 (git-fixes).
- arm: dts: exynos: correct TMU phandle in Odroid HC1 (git-fixes).
- arm: dts: exynos: correct TMU phandle in Odroid XU (git-fixes).
- arm: dts: exynos: correct TMU phandle in Odroid XU3 family (git-fixes).
- arm: dts: exynos: correct wr-active property in Exynos3250 Rinato (git-fixes).
- arm: dts: exynos: fix WM8960 clock name in Itop Elite (git-fixes).
- arm: dts: gta04: fix excess dma channel usage (git-fixes).
- arm: dts: imx6sl: tolino-shine2hd: fix usbotg1 pinctrl (git-fixes).
- arm: dts: imx6sll: e60k02: fix usbotg1 pinctrl (git-fixes).
- arm: dts: imx7-colibri-eval-v3: correct can controller comment (git-fixes)
- arm: dts: imx7s: correct iomuxc gpr mux controller cells (git-fixes).
- arm: dts: imx: Fix pca9547 i2c-mux node name (git-fixes).
- arm: dts: qcom: ipq4019: Fix the PCI I/O port range (git-fixes).
- arm: dts: qcom: ipq8064: Fix the PCI I/O port range (git-fixes).
- arm: dts: qcom: ipq8064: reduce pci IO size to 64K (git-fixes).
- arm: dts: qcom: msm8974: add required ranges to OCMEM (git-fixes)
- arm: dts: qcom: sdx55: Add Qcom SMMU-500 as the fallback for IOMMU node (git-fixes).
- arm: dts: rockchip: add power-domains property to dp node on rk3288 (git-fixes).
- arm: dts: rockchip: fix a typo error for rk3288 spdif node (git-fixes).
- arm: dts: s5pv210: correct MIPI CSIS clock name (git-fixes).
- arm: dts: spear320-hmi: correct STMPE GPIO compatible (git-fixes).
- arm: dts: stm32: add missing usbh clock and fix clk order on (git-fixes)
- arm: dts: stm32: use usbphyc ck_usbo_48m as USBH OHCI clock on (git-fixes)
- arm: dts: sun8i: nanopi-duo2: Fix regulator GPIO reference (git-fixes).
- arm: dts: vexpress: add missing cache properties (git-fixes).
- arm: dts: vf610: Fix pca9548 i2c-mux node names (git-fixes).
- arm: imx: Call ida_simple_remove() for ida_simple_get (git-fixes).
- arm: imx: rename DEBUG_IMX21_IMX27_UART to DEBUG_IMX27_UART (git-fixes)
- arm: oMAP1: call platform_device_put() in error case in omap1_dm_timer_init() (git-fixes).
- arm: oMAP2+: Fix memory leak in realtime_counter_init() (git-fixes).
- arm: omap: remove debug-leds driver (git-fixes)
- arm: remove some dead code (git-fixes)
- arm: renumber bits related to _TIF_WORK_MASK (git-fixes)
- arm: s3c: fix s3c64xx_set_timer_source prototype (git-fixes).
- arm: shmobile: rcar-gen2: Add missing of_node_put() (git-fixes)
- arm: zynq: Fix refcount leak in zynq_early_slcr_init (git-fixes).
- asm-generic/io.h: suppress endianness warnings for readq() and writeq() (git-fixes).
- asn.1: Fix check for strdup() success (git-fixes).
- asoc: adau7118: do not disable regulators on device unbind (git-fixes).
- asoc: amd: acp-es8336: Drop reference count of ACPI device after use (git-fixes).
- asoc: codecs: Change bulk clock voting to optional voting in digital codecs (git-fixes).
- asoc: codecs: lpass: fix incorrect mclk rate (git-fixes).
- asoc: codecs: rx-macro: move clk provider to managed variants (git-fixes).
- asoc: codecs: rx-macro: move to individual clks from bulk (git-fixes).
- asoc: codecs: tx-macro: Fix for KASAN: slab-out-of-bounds (git-fixes).
- asoc: codecs: tx-macro: move clk provider to managed variants (git-fixes).
- asoc: codecs: tx-macro: move to individual clks from bulk (git-fixes).
- asoc: codecs: wsa881x: do not set can_multi_write flag (git-fixes).
- asoc: cs35l41: Only disable internal boost (git-fixes).
- asoc: cs42l56: fix DT probe (git-fixes).
- asoc: dt-bindings: meson: fix gx-card codec node regex (git-fixes).
- asoc: dwc: limit the number of overrun messages (git-fixes).
- asoc: dwc: move DMA init to snd_soc_dai_driver probe() (git-fixes).
- asoc: es8316: Do not set rate constraints for unsupported MCLKs (git-fixes).
- asoc: es8316: Handle optional IRQ assignment (git-fixes).
- asoc: es8316: Increment max value for ALC Capture Target Volume control (git-fixes).
- asoc: fsl-asoc-card: Fix naming of AC'97 CODEC widgets (git-fixes).
- asoc: fsl_asrc_dma: fix potential null-ptr-deref (git-fixes).
- asoc: fsl_micfil: Correct the number of steps on SX controls (git-fixes).
- asoc: fsl_micfil: Fix error handler with pm_runtime_enable (git-fixes).
- asoc: fsl_mqs: move of_node_put() to the correct location (git-fixes).
- asoc: fsl_sai: Update to modern clocking terminology (git-fixes).
- asoc: fsl_ssi: Rename AC'97 streams to avoid collisions with AC'97 CODEC (git-fixes).
- asoc: hdac_hdmi: use set_stream() instead of set_tdm_slots() (git-fixes).
- asoc: imx-audmix: check return value of devm_kasprintf() (git-fixes).
- asoc: intel: Skylake: Fix declaration of enum skl_ch_cfg (git-fixes).
- asoc: intel: Skylake: Fix driver hang during shutdown (git-fixes).
- asoc: intel: avs: Access path components under lock (git-fixes).
- asoc: intel: avs: Fix declaration of enum avs_channel_config (git-fixes).
- asoc: intel: avs: Implement PCI shutdown (git-fixes).
- asoc: intel: avs: Use min_t instead of min with cast (git-fixes).
- asoc: intel: boards: fix spelling in comments (git-fixes).
- asoc: intel: bytcht_es8316: Drop reference count of ACPI device after use (git-fixes).
- asoc: intel: bytcht_es8316: move comment to the right place (git-fixes).
- asoc: intel: bytcr_rt5640: Add quirk for the Acer Iconia One 7 B1-750 (git-fixes).
- asoc: intel: bytcr_rt5640: Drop reference count of ACPI device after use (git-fixes).
- asoc: intel: bytcr_rt5651: Drop reference count of ACPI device after use (git-fixes).
- asoc: intel: bytcr_wm5102: Drop reference count of ACPI device after use (git-fixes).
- asoc: intel: soc-acpi-byt: Fix 'WM510205' match no longer working (git-fixes).
- asoc: intel: soc-acpi: fix copy-paste issue in topology names (git-fixes).
- asoc: intel: sof_cs42l42: always set dpcm_capture for amplifiers (git-fixes).
- asoc: intel: sof_es8336: Drop reference count of ACPI device after use (git-fixes).
- asoc: intel: sof_rt5682: always set dpcm_capture for amplifiers (git-fixes).
- asoc: intel: sof_sdw: add quirk for Intel 'Rooks County' NUC M15 (git-fixes).
- asoc: kirkwood: Iterate over array indexes instead of using pointer math (git-fixes).
- asoc: lpass: Fix for KASAN use_after_free out of bounds (git-fixes).
- asoc: mchp-spdifrx: Fix uninitialized use of mr in mchp_spdifrx_hw_params() (git-fixes).
- asoc: mchp-spdifrx: disable all interrupts in mchp_spdifrx_dai_remove() (git-fixes).
- asoc: mchp-spdifrx: fix controls which rely on rsr register (git-fixes).
- asoc: mediatek: mt8173: Fix irq error path (git-fixes).
- asoc: nau8824: Add quirk to active-high jack-detect (git-fixes).
- asoc: rsnd: Remove unnecessary rsnd_dbg_dai_call() (git-fixes).
- asoc: rsnd: fixup #endif position (git-fixes).
- asoc: rt1308-sdw: add the default value of some registers (git-fixes).
- asoc: rt5682: Disable jack detection interrupt during suspend (git-fixes).
- asoc: rt715-sdca: fix clock stop prepare timeout issue (git-fixes).
- asoc: simple-card: Add missing of_node_put() in case of error (git-fixes).
- asoc: soc-compress.c: fixup private_data on snd_soc_new_compress() (git-fixes).
- asoc: soc-compress: Inherit atomicity from DAI link for Compress FE (git-fixes).
- asoc: soc-compress: Reposition and add pcm_mutex (git-fixes).
- asoc: soc-dapm.h: fixup warning struct snd_pcm_substream not declared (git-fixes).
- asoc: soc-pcm: fix hw-&gt;formats cleared by soc_pcm_hw_init() for dpcm (git-fixes).
- asoc: soc-pcm: test if a BE can be prepared (git-fixes).
- asoc: sof: Intel: MTL: Fix the device description (git-fixes).
- asoc: sof: ipc4-topology: set dmic dai index from copier (git-fixes).
- asoc: sof: ipc4: Ensure DSP is in D0I0 during sof_ipc4_set_get_data() (git-fixes).
- asoc: ssm2602: Add workaround for playback distortions (git-fixes).
- asoc: tlv320adcx140: fix 'ti,gpio-config' DT property init (git-fixes).
- asoc: topology: Properly access value coming from topology file (git-fixes).
- asoc: topology: Return -ENOMEM on memory allocation failure (git-fixes).
- asoc: zl38060 add gpiolib dependency (git-fixes).
- asoc: zl38060: Remove spurious gpiolib select (git-fixes).
- ata: libata-scsi: Use correct device no in ata_find_dev() (git-fixes).
- ata: libata: Fix sata_down_spd_limit() when no link speed is reported (git-fixes).
- ata: libata: Set __ATA_BASE_SHT max_sectors (git-fixes).
- ata: libata: fix NCQ autosense logic (git-fixes).
- ata: pata_macio: Fix compilation warning (git-fixes).
- ata: pata_octeon_cf: drop kernel-doc notation (git-fixes).
- ata: pata_octeon_cf: fix call to trace_ata_bmdma_stop() (git-fixes).
- ath11k: Fix unexpected return buffer manager error for QCA6390 (git-fixes).
- ath6kl: Use struct_group() to avoid size-mismatched casting (git-fixes).
- ath9k: hif_usb: simplify if-if to if-else (git-fixes).
- ath9k: htc: clean up statistics macros (git-fixes).
- atm: idt77252: fix kmemleak when rmmod idt77252 (git-fixes).
- audit: update the mailing list in MAINTAINERS (git-fixes).
- auxdisplay: hd44780: Fix potential memory leak in hd44780_remove() (git-fixes).
- backlight: backlight: Fix doc for backlight_device_get_by_name (git-fixes).
- batman-adv: Broken sync while rescheduling delayed work (git-fixes).
- bcache: Revert 'bcache: use bvec_virt' (git-fixes).
- bcache: fix set_at_max_writeback_rate() for multiple attached devices (git-fixes).
- bcache: fix wrong bdev parameter when calling bio_alloc_clone() in do_bio_hook() (git-fixes).
- bcache: put bch_bio_map() back to correct location in journal_write_unlocked() (git-fixes).
- bfq: fix use-after-free in bfq_dispatch_request (git-fixes).
- bfq: fix waker_bfqq inconsistency crash (git-fixes).
- Blacklist commit that might cause regression (bsc#1210947)
- blk-cgroup: fix missing pd_online_fn() while activating policy (git-fixes).
- blk-cgroup: properly pin the parent in blkcg_css_online (bsc#1208105).
- blk-lib: fix blkdev_issue_secure_erase (git-fixes).
- blk-mq: Fix kmemleak in blk_mq_init_allocated_queue (git-fixes).
- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (git-fixes).
- blk-mq: fix possible memleak when register 'hctx' failed (git-fixes).
- blk-mq: run queue no matter whether the request is the last request (git-fixes).
- blk-throttle: fix that io throttle can only work for single bio (git-fixes).
- blk-throttle: prevent overflow while calculating wait time (git-fixes).
- blk-wbt: fix that 'rwb-&gt;wc' is always set to 1 in wbt_init() (git-fixes).
- blktrace: Fix output non-blktrace event when blk_classic option enabled (git-fixes).
- block, bfq: do not move oom_bfqq (git-fixes).
- block, bfq: fix null pointer dereference in bfq_bio_bfqg() (git-fixes).
- block, bfq: fix possible uaf for 'bfqq-&gt;bic' (git-fixes).
- block, bfq: fix uaf for bfqq in bfq_exit_icq_bfqq (git-fixes).
- block, bfq: fix uaf for bfqq in bic_set_bfqq() (git-fixes).
- block, bfq: protect 'bfqd-&gt;queued' by 'bfqd-&gt;lock' (git-fixes).
- block/bfq-iosched.c: use 'false' rather than 'BLK_RW_ASYNC' (git-fixes).
- block/bfq_wf2q: correct weight to ioprio (git-fixes).
- block/bio: remove duplicate append pages code (git-fixes).
- block: Fix possible memory leak for rq_wb on add_disk failure (git-fixes).
- block: add a bdev_max_zone_append_sectors helper (git-fixes).
- block: bio-integrity: Copy flags when bio_integrity_payload is cloned (bsc#1208541).
- block: check minor range in device_add_disk() (git-fixes).
- block: clear -&gt;slave_dir when dropping the main slave_dir reference (git-fixes).
- block: do not allow splitting of a REQ_NOWAIT bio (git-fixes).
- block: do not allow the same type rq_qos add more than once (git-fixes).
- block: do not reverse request order when flushing plug list (bsc#1208588 bsc#1208128).
- block: ensure iov_iter advances for added pages (git-fixes).
- block: fix and cleanup bio_check_ro (git-fixes).
- block: fix default IO priority handling again (git-fixes).
- block: fix infinite loop for invalid zone append (git-fixes).
- block: fix leaking minors of hidden disks (git-fixes).
- block: fix memory leak for elevator on add_disk failure (git-fixes).
- block: fix missing blkcg_bio_issue_init (bsc#1208107).
- block: loop:use kstatfs.f_bsize of backing file to set discard granularity (git-fixes).
- block: mq-deadline: Do not break sequential write streams to zoned HDDs (git-fixes).
- block: mq-deadline: Fix dd_finish_request() for zoned devices (git-fixes).
- block: mq-deadline: Rename deadline_is_seq_writes() (git-fixes).
- block: null_blk: Fix null_zone_write() (git-fixes).
- block: pop cached rq before potentially blocking rq_qos_throttle() (git-fixes).
- block: use bdev_get_queue() in bio.c (git-fixes).
- bluetooth: Add cmd validity checks at the start of hci_sock_ioctl() (git-fixes).
- bluetooth: Fix crash when replugging CSR fake controllers (git-fixes).
- bluetooth: Fix double free in hci_conn_cleanup (bsc#1209052 CVE-2023-28464).
- bluetooth: Fix l2cap_disconnect_req deadlock (git-fixes).
- bluetooth: Fix race condition in hci_cmd_sync_clear (git-fixes).
- bluetooth: Fix race condition in hidp_session_thread (git-fixes).
- bluetooth: Fix support for Read Local Supported Codecs V2 (git-fixes).
- bluetooth: Fix use-after-free in hci_remove_ltk/hci_remove_irk (git-fixes).
- bluetooth: HCI: Fix global-out-of-bounds (git-fixes).
- bluetooth: ISO: Avoid circular locking dependency (git-fixes).
- bluetooth: ISO: Fix possible circular locking dependency (git-fixes).
- bluetooth: ISO: do not try to remove CIG if there are bound CIS left (git-fixes).
- bluetooth: ISO: fix timestamped HCI ISO data packet parsing (git-fixes).
- bluetooth: L2CAP: Add missing checks for invalid DCID (git-fixes).
- bluetooth: L2CAP: Fix potential user-after-free (git-fixes).
- bluetooth: L2CAP: Fix responding with wrong PDU type (git-fixes).
- bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp} (git-fixes).
- bluetooth: L2CAP: fix 'bad unlock balance' in l2cap_disconnect_rsp (git-fixes).
- bluetooth: Perform careful capability checks in hci_sock_ioctl() (git-fixes).
- bluetooth: Remove codec id field in vendor codec definition (git-fixes).
- bluetooth: SCO: Fix possible circular locking dependency sco_sock_getsockopt (git-fixes).
- bluetooth: Set ISO Data Path on broadcast sink (git-fixes).
- bluetooth: btintel: Add LE States quirk support (git-fixes).
- bluetooth: btqcomsmd: Fix command timeout after setting BD address (git-fixes).
- bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work (git-fixes).
- bluetooth: btusb: Add VID:PID 13d3:3529 for Realtek RTL8821CE (git-fixes).
- bluetooth: btusb: Remove detection of ISO packets over bulk (git-fixes).
- bluetooth: hci_bcm: Fall back to getting bdaddr from EFI if not set (git-fixes).
- bluetooth: hci_conn: Fix memory leaks (git-fixes).
- bluetooth: hci_conn: Fix not cleaning up on LE Connection failure (git-fixes).
- bluetooth: hci_conn: Refactor hci_bind_bis() since it always succeeds (git-fixes).
- bluetooth: hci_conn: use HCI dst_type values also for BIS (git-fixes).
- bluetooth: hci_core: Detect if an ACL packet is in fact an ISO packet (git-fixes).
- bluetooth: hci_core: fix error handling in hci_register_dev() (git-fixes).
- bluetooth: hci_event: Fix Invalid wait context (git-fixes).
- bluetooth: hci_qca: Fix the teardown problem for real (git-fixes).
- bluetooth: hci_qca: fix debugfs registration (git-fixes).
- bluetooth: hci_qca: get wakeup status from serdev device handle (git-fixes).
- bluetooth: hci_sock: purge socket queues in the destruct() callback (git-fixes).
- bluetooth: hci_sync: Fix not indicating power state (git-fixes).
- bluetooth: hci_sync: Fix use HCI_OP_LE_READ_BUFFER_SIZE_V2 (git-fixes).
- bluetooth: hci_sync: cancel cmd_timer if hci_open failed (git-fixes).
- bnxt: Do not read past the end of test names (jsc#SLE-18978).
- bnxt: prevent skb UAF after handing over to PTP worker (jsc#SLE-18978).
- bnxt_en: Add missing 200G link speed reporting (jsc#SLE-18978).
- bnxt_en: Avoid order-5 memory allocation for TPA data (jsc#SLE-18978).
- bnxt_en: Do not initialize PTP on older P3/P4 chips (jsc#SLE-18978).
- bnxt_en: Do not issue AP reset during ethtool's reset operation (git-fixes).
- bnxt_en: Fix mqprio and XDP ring checking logic (jsc#SLE-18978).
- bnxt_en: Fix reporting of test result in ethtool selftest (jsc#SLE-18978).
- bnxt_en: Fix typo in PCI id to device description string mapping (jsc#SLE-18978).
- bnxt_en: Implement .set_port / .unset_port UDP tunnel callbacks (git-fixes).
- bnxt_en: Prevent kernel panic when receiving unexpected PHC_UPDATE event (git-fixes).
- bnxt_en: Query default VLAN before VNIC setup on a VF (git-fixes).
- bnxt_en: Skip firmware fatal error recovery if chip is not accessible (git-fixes).
- bnxt_en: fix NQ resource accounting during vf creation on 57500 chips (jsc#SLE-18978).
- bnxt_en: set missing reload flag in devlink features (jsc#SLE-18978).
- bonding: Fix negative jump label count on nested bonding (bsc#1212685).
- bpf, arm64: Call build_prologue() first in first JIT pass (git-fixes)
- bpf, arm64: Clear prog-&gt;jited_len along prog-&gt;jited (git-fixes)
- bpf, arm64: Feed byte-offset into bpf line info (git-fixes)
- bpf, arm64: Use emit_addr_mov_i64() for BPF_PSEUDO_FUNC (git-fixes)
- bpf, perf: Use subprog name when reporting subprog ksymbol (git fixes).
- bpf, x64: Factor out emission of REX byte in more cases (git-fixes).
- bpf: Add extra path pointer check to d_path helper (git-fixes).
- bpf: Fix UAF in task local storage (bsc#1212564).
- bpf: Fix a possible task gone issue with bpf_send_signal[_thread]() helpers (git-fixes).
- bpf: Fix extable address check (git-fixes).
- bpf: Fix extable fixup offset (git-fixes).
- bpf: Skip task with pid=1 in send_signal_common() (git-fixes).
- btrfs: fix race between quota enable and quota rescan ioctl (bsc#1207158).
- btrfs: fix race between quota rescan and disable leading to NULL pointer deref (bsc#1207158).
- btrfs: fix trace event name typo for FLUSH_DELAYED_REFS (git-fixes).
- btrfs: move QUOTA_ENABLED check to rescan_should_stop from btrfs_qgroup_rescan_worker (bsc#1207158).
- btrfs: qgroup: remove duplicated check in adding qgroup relations (bsc#1207158).
- btrfs: qgroup: remove outdated TODO comments (bsc#1207158).
- bus: fsl-mc: fsl-mc-allocator: Drop a write-only variable (git-fixes).
- bus: mhi: host: Fix race between channel preparation and M0 event (git-fixes).
- bus: mhi: host: Range check CHDBOFF and ERDBOFF (git-fixes).
- bus: mhi: host: Remove duplicate ee check for syserr (git-fixes).
- bus: mhi: host: Use mhi_tryset_pm_state() for setting fw error state (git-fixes).
- bus: sunxi-rsb: Fix error handling in sunxi_rsb_init() (git-fixes).
- bus: ti-sysc: Fix dispc quirk masking bool variables (git-fixes).
- ca8210: Fix unsigned mac_len comparison with zero in ca8210_skb_tx() (git-fixes).
- ca8210: fix mac_len negative array access (git-fixes).
- can: bcm: bcm_tx_setup(): fix KMSAN uninit-value in vfs_write (git-fixes).
- can: isotp: isotp_ops: fix poll() to not report false EPOLLOUT events (git-fixes).
- can: isotp: isotp_sendmsg(): fix return error fix on TX path (git-fixes).
- can: isotp: recvmsg(): allow MSG_CMSG_COMPAT flag (git-fixes).
- can: j1939: avoid possible use-after-free when j1939_can_rx_register fails (git-fixes).
- can: j1939: change j1939_netdev_lock type to mutex (git-fixes).
- can: j1939: do not wait 250 ms if the same addr was already claimed (git-fixes).
- can: j1939: fix errant WARN_ON_ONCE in j1939_session_deactivate (git-fixes).
- can: j1939: j1939_sk_send_loop_abort(): improved error queue handling in J1939 Socket (git-fixes).
- can: j1939: j1939_tp_tx_dat_new(): fix out-of-bounds memory access (git-fixes).
- can: j1939: recvmsg(): allow MSG_CMSG_COMPAT flag (git-fixes).
- can: kvaser_pciefd: Call request_irq() before enabling interrupts (git-fixes).
- can: kvaser_pciefd: Clear listen-only bit if not explicitly requested (git-fixes).
- can: kvaser_pciefd: Disable interrupts in probe error path (git-fixes).
- can: kvaser_pciefd: Do not send EFLUSH command on TFD interrupt (git-fixes).
- can: kvaser_pciefd: Empty SRB buffer in probe (git-fixes).
- can: kvaser_pciefd: Remove handler for unused KVASER_PCIEFD_PACK_TYPE_EFRAME_ACK (git-fixes).
- can: kvaser_pciefd: Remove useless write to interrupt register (git-fixes).
- can: kvaser_pciefd: Set CAN_STATE_STOPPED in kvaser_pciefd_stop() (git-fixes).
- can: kvaser_usb: Add struct kvaser_usb_busparams (git-fixes).
- can: kvaser_usb: kvaser_usb_leaf: Get capabilities from device (git-fixes).
- can: kvaser_usb: kvaser_usb_leaf: Handle CMD_ERROR_EVENT (git-fixes).
- can: kvaser_usb: kvaser_usb_leaf: Rename {leaf,usbcan}_cmd_error_event to {leaf,usbcan}_cmd_can_error_event (git-fixes).
- can: kvaser_usb_leaf: Fix overread with an invalid command (git-fixes).
- can: length: fix bitstuffing count (git-fixes).
- can: length: fix description of the RRS field (git-fixes).
- can: length: make header self contained (git-fixes).
- cassini: Fix a memory leak in the error handling path of cas_init_one() (git-fixes).
- ceph: avoid use-after-free in ceph_fl_release_lock() (jsc#SES-1880).
- ceph: blocklist the kclient when receiving corrupted snap trace (jsc#SES-1880).
- ceph: fix use-after-free bug for inodes when flushing capsnaps (bsc#1212540).
- ceph: flush cap releases when the session is flushed (bsc#1208428).
- ceph: flush cap releases when the session is flushed (jsc#SES-1880).
- ceph: force updating the msg pointer in non-split case (bsc#1211804).
- ceph: move mount state enum to super.h (jsc#SES-1880).
- ceph: remove useless session parameter for check_caps() (jsc#SES-1880).
- ceph: switch to vfs_inode_has_locks() to fix file lock bug (jsc#SES-1880).
- ceph: try to check caps immediately after async creating finishes (jsc#SES-1880).
- ceph: update the time stamps and try to drop the suid/sgid (bsc#1209504).
- ceph: use locks_inode_context helper (jsc#SES-1880).
- cfg80211: allow continuous radar monitoring on offchannel chain (bsc#1209980).
- cfg80211: fix possible NULL pointer dereference in cfg80211_stop_offchan_radar_detection (bsc#1209980).
- cfg80211: implement APIs for dedicated radar detection HW (bsc#1209980).
- cfg80211: move offchan_cac_event to a dedicated work (bsc#1209980).
- cfg80211: rename offchannel_chain structs to background_chain to avoid confusion with ETSI standard (bsc#1209980).
- cfg80211: schedule offchan_cac_abort_wk in cfg80211_radar_event (bsc#1209980).
- cgroup.c: add helper __cset_cgroup_from_root to cleanup duplicated codes (bsc#1203906).
- cgroup/cpuset: Wake up cpuset_attach_wq tasks in cpuset_cancel_attach() (bsc#1210827).
- cgroup: Homogenize cgroup_get_from_id() return value (bsc#1205650).
- cgroup: Honor caller's cgroup NS when resolving path (bsc#1205650).
- cgroup: Make cgroup_get_from_id() prettier (bsc#1205650).
- cgroup: Reorganize css_set_lock and kernfs path processing (bsc#1205650).
- cgroup: Use cgroup_attach_{lock,unlock}() from cgroup_attach_task_all() (bsc#1212563).
- cgroup: always put cset in cgroup_css_set_put_fork (bsc#1212561).
- cgroup: cgroup: Honor caller's cgroup NS when resolving cgroup  id (bsc#1205650).
- cgroup: fix missing cpus_read_{lock,unlock}() in cgroup_transfer_tasks() (bsc#1212563).
- cgroup: reduce dependency on cgroup_mutex (bsc#1205650).
- cifs: Avoid a cast in add_lease_context() (bsc#1193629).
- cifs: Check the lease context if we actually got a lease (bsc#1193629).
- cifs: Convert struct fealist away from 1-element array (bsc#1193629).
- cifs: Fix lost destroy smbd connection when MR allocate failed (git-fixes).
- cifs: Fix oops due to uncleared server-&gt;smbd_conn in reconnect (git-fixes).
- cifs: Fix smb2_set_path_size() (git-fixes).
- cifs: Fix uninitialized memory read in smb3_qfs_tcon() (bsc#1193629).
- cifs: Fix uninitialized memory reads for oparms.mode (bsc#1193629).
- cifs: Fix use-after-free in rdata-&gt;read_into_pages() (git-fixes).
- cifs: Fix warning and UAF when destroy the MR list (git-fixes).
- cifs: Get rid of unneeded conditional in the smb2_get_aead_req() (bsc#1193629).
- cifs: Move the in_send statistic to __smb_send_rqst() (git-fixes).
- cifs: Replace remaining 1-element arrays (bsc#1193629).
- cifs: Replace zero-length arrays with flexible-array members (bsc#1193629).
- cifs: Simplify SMB2_open_init() (bsc#1193629).
- cifs: Use kstrtobool() instead of strtobool() (bsc#1193629).
- cifs: append path to open_enter trace event (bsc#1193629).
- cifs: avoid dup prefix path in dfs_get_automount_devname() (git-fixes).
- cifs: avoid potential races when handling multiple dfs tcons (bsc#1208758).
- cifs: avoid race conditions with parallel reconnects (bsc#1193629).
- cifs: avoid races in parallel reconnects in smb1 (bsc#1193629).
- cifs: avoid re-lookups in dfs_cache_find() (bsc#1193629).
- cifs: check only tcon status on tcon related functions (bsc#1193629).
- cifs: do not include page data when checking signature (git-fixes).
- cifs: do not poll server interfaces too regularly (bsc#1193629).
- cifs: do not take exclusive lock for updating target hints (bsc#1193629).
- cifs: do not try to use rdma offload on encrypted connections (bsc#1193629).
- cifs: double lock in cifs_reconnect_tcon() (git-fixes).
- cifs: dump pending mids for all channels in DebugData (bsc#1193629).
- cifs: empty interface list when server does not support query interfaces (bsc#1193629).
- cifs: fix DFS traversal oops without CONFIG_CIFS_DFS_UPCALL (bsc#1193629).
- cifs: fix dentry lookups in directory handle cache (bsc#1193629).
- cifs: fix missing unload_nls() in smb2_reconnect() (bsc#1193629).
- cifs: fix mount on old smb servers (boo#1206935).
- cifs: fix negotiate context parsing (bsc#1210301).
- cifs: fix pcchunk length type in smb2_copychunk_range (bsc#1193629).
- cifs: fix potential deadlock in cache_refresh_path() (git-fixes).
- cifs: fix potential race when tree connecting ipc (bsc#1208758).
- cifs: fix potential use-after-free bugs in TCP_Server_Info::hostname (bsc#1208758).
- cifs: fix return of uninitialized rc in dfs_cache_update_tgthint() (bsc#1193629).
- cifs: fix sharing of DFS connections (bsc#1208758).
- cifs: fix smb1 mount regression (bsc#1193629).
- cifs: fix use-after-free bug in refresh_cache_worker() (bsc#1193629).
- cifs: generate signkey for the channel that's reconnecting (bsc#1193629).
- cifs: get rid of dead check in smb2_reconnect() (bsc#1193629).
- cifs: get rid of dns resolve worker (bsc#1193629).
- cifs: get rid of unneeded conditional in cifs_get_num_sgs() (bsc#1193629).
- cifs: handle cache lookup errors different than -ENOENT (bsc#1193629).
- cifs: improve checking of DFS links over STATUS_OBJECT_NAME_INVALID (git-fixes).
- cifs: introduce cifs_io_parms in smb2_async_writev() (bsc#1193629).
- cifs: lock chan_lock outside match_session (bsc#1193629).
- cifs: mapchars mount option ignored (bsc#1193629).
- cifs: match even the scope id for ipv6 addresses (bsc#1193629).
- cifs: missing lock when updating session status (bsc#1193629).
- cifs: prevent data race in cifs_reconnect_tcon() (bsc#1193629).
- cifs: prevent data race in smb2_reconnect() (bsc#1193629).
- cifs: prevent infinite recursion in CIFSGetDFSRefer() (bsc#1193629).
- cifs: print last update time for interface list (bsc#1193629).
- cifs: print session id while listing open files (bsc#1193629).
- cifs: print smb3_fs_context::source when mounting (bsc#1193629).
- cifs: protect access of TCP_Server_Info::{origin,leaf}_fullpath (bsc#1208758).
- cifs: protect session status check in smb2_reconnect() (bsc#1208758).
- cifs: release leases for deferred close handles when freezing (bsc#1193629).
- cifs: remove duplicate code in __refresh_tcon() (bsc#1193629).
- cifs: remove unneeded 2bytes of padding from smb2 tree connect (bsc#1193629).
- cifs: remove unused function (bsc#1193629).
- cifs: return DFS root session id in DebugData (bsc#1193629).
- cifs: return a single-use cfid if we did not get a lease (bsc#1193629).
- cifs: reuse cifs_match_ipaddr for comparison of dstaddr too (bsc#1193629).
- cifs: sanitize paths in cifs_update_super_prepath (git-fixes).
- cifs: set DFS root session in cifs_get_smb_ses() (bsc#1193629).
- cifs: split out smb3_use_rdma_offload() helper (bsc#1193629).
- cifs: update internal module version number for cifs.ko (bsc#1193629).
- cifs: update ip_addr for ses only for primary chan setup (bsc#1193629).
- cifs: use DFS root session instead of tcon ses (bsc#1193629).
- cifs: use tcon allocation functions even for dummy tcon (git-fixes).
- cifs: use the least loaded channel for sending requests (bsc#1193629).
- clk: Fix memory leak in devm_clk_notifier_register() (git-fixes).
- clk: HI655X: select REGMAP instead of depending on it (git-fixes).
- clk: Honor CLK_OPS_PARENT_ENABLE in clk_core_is_enabled() (git-fixes).
- clk: add missing of_node_put() in 'assigned-clocks' property parsing (git-fixes).
- clk: at91: clk-sam9x60-pll: fix return value check (git-fixes).
- clk: cdce925: check return value of kasprintf() (git-fixes).
- clk: imx: avoid memory leak (git-fixes).
- clk: imx: clk-imx8mn: fix memory leak in imx8mn_clocks_probe (git-fixes).
- clk: imx: clk-imx8mp: improve error handling in imx8mp_clocks_probe() (git-fixes).
- clk: imx: scu: use _safe list iterator to avoid a use after free (git-fixes).
- clk: ingenic: jz4760: Update M/N/OD calculation algorithm (git-fixes).
- clk: keystone: sci-clk: check return value of kasprintf() (git-fixes).
- clk: mxl: Add option to override gate clks (git-fixes).
- clk: mxl: Fix a clk entry by adding relevant flags (git-fixes).
- clk: mxl: Remove redundant spinlocks (git-fixes).
- clk: mxl: Switch from direct readl/writel based IO to regmap based IO (git-fixes).
- clk: mxl: syscon_node_to_regmap() returns error pointers (git-fixes).
- clk: qcom: camcc-sc7180: Add parent dependency to all camera GDSCs (git-fixes).
- clk: qcom: gcc-ipq6018: Use floor ops for sdcc clocks (git-fixes).
- clk: qcom: gcc-qcs404: disable gpll[04]_out_aux parents (git-fixes).
- clk: qcom: gcc-qcs404: fix names of the DSI clocks used as parents (git-fixes).
- clk: qcom: gcc-sm8350: fix PCIe PIPE clocks handling (git-fixes).
- clk: qcom: regmap: add PHY clock source implementation (git-fixes).
- clk: ralink: fix 'mt7621_gate_is_enabled()' function (git-fixes).
- clk: renesas: cpg-mssr: Fix use after free if cpg_mssr_common_init() failed (git-fixes).
- clk: renesas: cpg-mssr: Remove superfluous check in resume code (git-fixes).
- clk: rockchip: rk3399: allow clk_cifout to force clk_cifout_src to reparent (git-fixes).
- clk: samsung: Add Exynos4212 compatible to CLKOUT driver (git-fixes).
- clk: si5341: check return value of {devm_}kasprintf() (git-fixes).
- clk: si5341: free unused memory on probe failure (git-fixes).
- clk: si5341: return error if one synth clock registration fails (git-fixes).
- clk: sprd: set max_register according to mapping range (git-fixes).
- clk: tegra20: fix gcc-7 constant overflow warning (git-fixes).
- clk: tegra: tegra124-emc: Fix potential memory leak (git-fixes).
- clk: ti: clkctrl: check return value of kasprintf() (git-fixes).
- clk: vc5: check memory returned by kasprintf() (git-fixes).
- clocksource/drivers/cadence-ttc: Fix memory leak in ttc_timer_probe (git-fixes).
- clocksource/drivers/davinci: Fix memory leak in davinci_timer_register when init fails (git-fixes).
- clocksource/drivers/mediatek: Optimize systimer irq clear flow on shutdown (git-fixes).
- clocksource: Suspend the watchdog temporarily when high read latency detected (git-fixes).
- comedi: use menuconfig for main Comedi menu (git-fixes).
- configfs: fix possible memory leak in configfs_create_dir() (git-fixes).
- cpufreq: Add Tegra234 to cpufreq-dt-platdev blocklist (git-fixes).
- cpufreq: CPPC: Fix build error without CONFIG_ACPI_CPPC_CPUFREQ_FIE (bsc#1210953).
- cpufreq: CPPC: Fix performance/frequency conversion (git-fixes).
- cpufreq: armada-37xx: stop using 0 as NULL pointer (git-fixes).
- cpumask: fix incorrect cpumask scanning result checks (bsc#1210943).
- crypto: acomp - define max size for destination (jsc#PED-3692)
- crypto: arm64 - Fix unused variable compilation warnings of (git-fixes)
- crypto: caam - Clear some memory in instantiate_rng (git-fixes).
- crypto: ccp - Avoid page allocation failure warning for SEV_GET_ID2 (git-fixes).
- crypto: ccp - Failure on re-initialization due to duplicate sysfs filename (git-fixes).
- crypto: crypto4xx - Call dma_unmap_page when done (git-fixes).
- crypto: drbg - Only fail when jent is unavailable in FIPS mode (git-fixes).
- crypto: drivers - move from strlcpy with unused retval to (jsc#PED-3692)
- crypto: essiv - Handle EBUSY correctly (git-fixes).
- crypto: hisilicon/qm - add missing pci_dev_put() in q_num_set() (git-fixes).
- crypto: marvell/cesa - Fix type mismatch warning (git-fixes).
- crypto: nx - fix build warnings when DEBUG_FS is not enabled (git-fixes).
- crypto: qat - Fix unsigned function returning negative (jsc#PED-3692)
- crypto: qat - Removes the x86 dependency on the QAT drivers (jsc#PED-3692)
- crypto: qat - abstract PFVF messages with struct pfvf_message (jsc#PED-3692)
- crypto: qat - abstract PFVF receive logic (jsc#PED-3692)
- crypto: qat - abstract PFVF send function (jsc#PED-3692)
- crypto: qat - add PFVF support to enable the reset of ring (jsc#PED-3692)
- crypto: qat - add PFVF support to the GEN4 host driver (jsc#PED-3692)
- crypto: qat - add VF and PF wrappers to common send function (jsc#PED-3692)
- crypto: qat - add backlog mechanism (jsc#PED-3692)
- crypto: qat - add check for invalid PFVF protocol version 0 (jsc#PED-3692)
- crypto: qat - add check to validate firmware images (jsc#PED-3692)
- crypto: qat - add limit to linked list parsing (jsc#PED-3692)
- crypto: qat - add misc workqueue (jsc#PED-3692)
- crypto: qat - add missing restarting event notification in (jsc#PED-3692)
- crypto: qat - add param check for DH (jsc#PED-3692)
- crypto: qat - add param check for RSA (jsc#PED-3692)
- crypto: qat - add pfvf_ops (jsc#PED-3692)
- crypto: qat - add resubmit logic for decompression (jsc#PED-3692)
- crypto: qat - add support for 401xx devices (jsc#PED-3692)
- crypto: qat - add support for compression for 4xxx (jsc#PED-3692)
- crypto: qat - add the adf_get_pmisc_base() helper function (jsc#PED-3692)
- crypto: qat - allow detection of dc capabilities for 4xxx (jsc#PED-3692)
- crypto: qat - change PFVF ACK behaviour (jsc#PED-3692)
- crypto: qat - change behaviour of (jsc#PED-3692)
- crypto: qat - change bufferlist logic interface (jsc#PED-3692)
- crypto: qat - config VFs based on ring-to-svc mapping (jsc#PED-3692)
- crypto: qat - differentiate between pf2vf and vf2pf offset (jsc#PED-3692)
- crypto: qat - disable AER if an error occurs in probe (jsc#PED-3692)
- crypto: qat - do not handle PFVF sources for qat_4xxx (jsc#PED-3692)
- crypto: qat - do not rely on min version (jsc#PED-3692)
- crypto: qat - enable deflate for QAT GEN4 (jsc#PED-3692)
- crypto: qat - enable power management for QAT GEN4 (jsc#PED-3692)
- crypto: qat - exchange device capabilities over PFVF (jsc#PED-3692)
- crypto: qat - exchange ring-to-service mappings over PFVF (jsc#PED-3692)
- crypto: qat - expose deflate through acomp api for QAT GEN2 (jsc#PED-3692)
- crypto: qat - expose device config through sysfs for 4xxx (jsc#PED-3692)
- crypto: qat - expose device state through sysfs for 4xxx (jsc#PED-3692)
- crypto: qat - extend buffer list interface (jsc#PED-3692)
- crypto: qat - extend crypto capability detection for 4xxx (jsc#PED-3692)
- crypto: qat - extract send and wait from (jsc#PED-3692)
- crypto: qat - fix DMA transfer direction (jsc#PED-3692)
- crypto: qat - fix ETR sources enabled by default on GEN2 (jsc#PED-3692)
- crypto: qat - fix VF IDs in PFVF log messages (jsc#PED-3692)
- crypto: qat - fix a signedness bug in get_service_enabled() (jsc#PED-3692)
- crypto: qat - fix a typo in a comment (jsc#PED-3692)
- crypto: qat - fix access to PFVF interrupt registers for GEN4 (jsc#PED-3692)
- crypto: qat - fix definition of ring reset results (jsc#PED-3692)
- crypto: qat - fix error return code in adf_probe (git-fixes).
- crypto: qat - fix error return code in adf_probe (jsc#PED-3692)
- crypto: qat - fix handling of VF to PF interrupts (jsc#PED-3692)
- crypto: qat - fix initialization of pfvf cap_msg structures (jsc#PED-3692)
- crypto: qat - fix initialization of pfvf rts_map_msg (jsc#PED-3692)
- crypto: qat - fix off-by-one error in PFVF debug print (jsc#PED-3692)
- crypto: qat - fix out-of-bounds read (git-fixes).
- crypto: qat - fix wording and formatting in code comment (jsc#PED-3692)
- crypto: qat - flush vf workqueue at driver removal (jsc#PED-3692)
- crypto: qat - free irq in case of failure (jsc#PED-3692)
- crypto: qat - free irqs only if allocated (jsc#PED-3692)
- crypto: qat - generalize crypto request buffers (jsc#PED-3692)
- crypto: qat - get compression extended capabilities (jsc#PED-3692)
- crypto: qat - handle retries due to collisions in (jsc#PED-3692)
- crypto: qat - honor CRYPTO_TFM_REQ_MAY_SLEEP flag (jsc#PED-3692)
- crypto: qat - improve logging of PFVF messages (jsc#PED-3692)
- crypto: qat - improve the ACK timings in PFVF send (jsc#PED-3692)
- crypto: qat - introduce support for PFVF block messages (jsc#PED-3692)
- crypto: qat - leverage bitfield.h utils for PFVF messages (jsc#PED-3692)
- crypto: qat - leverage read_poll_timeout in PFVF send (jsc#PED-3692)
- crypto: qat - leverage the GEN2 VF mask definiton (jsc#PED-3692)
- crypto: qat - make PFVF message construction direction (jsc#PED-3692)
- crypto: qat - make PFVF send and receive direction agnostic (jsc#PED-3692)
- crypto: qat - move VF message handler to adf_vf2pf_msg.c (jsc#PED-3692)
- crypto: qat - move and rename GEN4 error register definitions (jsc#PED-3692)
- crypto: qat - move interrupt code out of the PFVF handler (jsc#PED-3692)
- crypto: qat - move pfvf collision detection values (jsc#PED-3692)
- crypto: qat - move vf2pf interrupt helpers (jsc#PED-3692)
- crypto: qat - pass the PF2VF responses back to the callers (jsc#PED-3692)
- crypto: qat - prevent spurious MSI interrupt in VF (jsc#PED-3692)
- crypto: qat - re-enable interrupts for legacy PFVF messages (jsc#PED-3692)
- crypto: qat - re-enable registration of algorithms (jsc#PED-3692)
- crypto: qat - refactor PF top half for PFVF (jsc#PED-3692)
- crypto: qat - refactor pfvf version request messages (jsc#PED-3692)
- crypto: qat - refactor submission logic (jsc#PED-3692)
- crypto: qat - relocate PFVF PF related logic (jsc#PED-3692)
- crypto: qat - relocate PFVF VF related logic (jsc#PED-3692)
- crypto: qat - relocate PFVF disabled function (jsc#PED-3692)
- crypto: qat - relocate and rename adf_sriov_prepare_restart() (jsc#PED-3692)
- crypto: qat - relocate backlog related structures (jsc#PED-3692)
- crypto: qat - relocate bufferlist logic (jsc#PED-3692)
- crypto: qat - relocate qat_algs_alloc_flags() (jsc#PED-3692)
- crypto: qat - remove duplicated logic across GEN2 drivers (jsc#PED-3692)
- crypto: qat - remove empty sriov_configure() (jsc#PED-3692)
- crypto: qat - remove line wrapping for pfvf_ops functions (jsc#PED-3692)
- crypto: qat - remove the unnecessary get_vintmsk_offset() (jsc#PED-3692)
- crypto: qat - remove unmatched CPU affinity to cluster IRQ (jsc#PED-3692)
- crypto: qat - remove unnecessary tests to detect PFVF support (jsc#PED-3692)
- crypto: qat - remove unneeded assignment (jsc#PED-3692)
- crypto: qat - remove unneeded braces (jsc#PED-3692)
- crypto: qat - remove unneeded packed attribute (jsc#PED-3692)
- crypto: qat - remove unused PFVF stubs (jsc#PED-3692)
- crypto: qat - rename and relocate GEN2 config function (jsc#PED-3692)
- crypto: qat - rename bufferlist functions (jsc#PED-3692)
- crypto: qat - rename pfvf collision constants (jsc#PED-3692)
- crypto: qat - reorganize PFVF code (jsc#PED-3692)
- crypto: qat - reorganize PFVF protocol definitions (jsc#PED-3692)
- crypto: qat - replace deprecated MSI API (jsc#PED-3692)
- crypto: qat - replace disable_vf2pf_interrupts() (jsc#PED-3692)
- crypto: qat - replace get_current_node() with numa_node_id() (jsc#PED-3692)
- crypto: qat - rework the VF2PF interrupt handling logic (jsc#PED-3692)
- crypto: qat - set CIPHER capability for QAT GEN2 (jsc#PED-3692)
- crypto: qat - set COMPRESSION capability for DH895XCC (jsc#PED-3692)
- crypto: qat - set COMPRESSION capability for QAT GEN2 (jsc#PED-3692)
- crypto: qat - set DMA mask to 48 bits for Gen2 (jsc#PED-3692)
- crypto: qat - set PFVF_MSGORIGIN just before sending (jsc#PED-3692)
- crypto: qat - share adf_enable_pf2vf_comms() from (jsc#PED-3692)
- crypto: qat - simplify adf_enable_aer() (jsc#PED-3692)
- crypto: qat - simplify code and axe the use of a deprecated (jsc#PED-3692)
- crypto: qat - split PFVF message decoding from handling (jsc#PED-3692)
- crypto: qat - stop using iommu_present() (jsc#PED-3692)
- crypto: qat - store the PFVF protocol version of the (jsc#PED-3692)
- crypto: qat - store the ring-to-service mapping (jsc#PED-3692)
- crypto: qat - support fast ACKs in the PFVF protocol (jsc#PED-3692)
- crypto: qat - support the reset of ring pairs on PF (jsc#PED-3692)
- crypto: qat - test PFVF registers for spurious interrupts on (jsc#PED-3692)
- crypto: qat - use enums for PFVF protocol codes (jsc#PED-3692)
- crypto: qat - use hweight for bit counting (jsc#PED-3692)
- crypto: qat - use pre-allocated buffers in datapath (jsc#PED-3692)
- crypto: qat - use reference to structure in dma_map_single() (jsc#PED-3692)
- crypto: qat - use u32 variables in all GEN4 pfvf_ops (jsc#PED-3692)
- crypto: rsa-pkcs1pad - Use akcipher_request_complete (git-fixes).
- crypto: sa2ul - Select CRYPTO_DES (git-fixes).
- crypto: safexcel - Cleanup ring IRQ workqueues on load failure (git-fixes).
- crypto: seqiv - Handle EBUSY correctly (git-fixes).
- crypto: sun8i-ss - Fix a test in sun8i_ss_setup_ivs() (git-fixes).
- crypto: x86/ghash - fix unaligned access in ghash_setkey() (git-fixes).
- crypto: xts - Handle EBUSY correctly (git-fixes).
- cxgb4: fix missing unlock on ETHOFLD desc collect fail path (jsc#SLE-18992).
- debugfs: add debugfs_lookup_and_remove() (git-fixes).
- debugfs: fix error when writing negative value to atomic_t debugfs file (git-fixes).
- device-dax: Fix duplicate 'hmem' device registration (bsc#1211400).
- devlink: hold region lock when flushing snapshots (git-fixes).
- disable two x86 PAT related patches (bsc#1212456) This may break i915 when booted with nopat, but fixes /dev/mem access in Xen PV domU.
- dm btree: add a defensive bounds check to insert_at() (git-fixes).
- dm cache: Fix ABBA deadlock between shrink_slab and dm_cache_metadata_abort (git-fixes).
- dm cache: Fix UAF in destroy() (git-fixes).
- dm cache: set needs_check flag after aborting metadata (git-fixes).
- dm clone: Fix UAF in clone_dtr() (git-fixes).
- dm integrity: Fix UAF in dm_integrity_dtr() (git-fixes).
- dm integrity: clear the journal on suspend (git-fixes).
- dm integrity: flush the journal on suspend (git-fixes).
- dm ioctl: fix misbehavior if list_versions races with module loading (git-fixes).
- dm ioctl: prevent potential spectre v1 gadget (git-fixes).
- dm raid: fix address sanitizer warning in raid_resume (git-fixes).
- dm raid: fix address sanitizer warning in raid_status (git-fixes).
- dm space map common: add bounds check to sm_ll_lookup_bitmap() (git-fixes).
- dm thin: Fix ABBA deadlock between shrink_slab and dm_pool_abort_metadata (git-fixes).
- dm thin: Fix UAF in run_timer_softirq() (git-fixes).
- dm thin: Use last transaction's pmd-&gt;root when commit failed (git-fixes).
- dm thin: resume even if in FAIL mode (git-fixes).
- dm writecache: set a default MAX_WRITEBACK_JOBS (git-fixes).
- dm: fix alloc_dax error handling in alloc_dev (git-fixes).
- dm: requeue IO if mapping table not yet available (git-fixes).
- dma-buf: Use dma_fence_unwrap_for_each when importing fences (git-fixes).
- dma-buf: cleanup kerneldoc of removed component (git-fixes).
- dma-direct: use is_swiotlb_active in dma_direct_map_page (PED-3259).
- dma-mapping: reformat comment to suppress htmldoc warning (git-fixes).
- dma: gpi: remove spurious unlock in gpi_ch_init (git-fixes).
- dmaengine: at_xdmac: Move the free desc to the tail of the desc list (git-fixes).
- dmaengine: at_xdmac: do not enable all cyclic channels (git-fixes).
- dmaengine: at_xdmac: fix potential Oops in at_xdmac_prep_interleaved() (git-fixes).
- dmaengine: dw-axi-dmac: Do not dereference NULL structure (git-fixes).
- dmaengine: dw-edma: Do not permit non-inc interleaved xfers (git-fixes).
- dmaengine: dw-edma: Drop chancnt initialization (git-fixes).
- dmaengine: dw-edma: Fix invalid interleaved xfers semantics (git-fixes).
- dmaengine: dw-edma: Fix missing src/dst address of interleaved xfers (git-fixes).
- dmaengine: dw-edma: Fix readq_ch() return value truncation (git-fixes).
- dmaengine: dw-edma: Fix to change for continuous transfer (git-fixes).
- dmaengine: dw-edma: Fix to enable to issue dma request on DMA processing (git-fixes).
- dmaengine: idxd: Do not enable user type Work Queue without Shared Virtual Addressing (git-fixes).
- dmaengine: idxd: Only call idxd_enable_system_pasid() if succeeded in enabling SVA feature (git-fixes).
- dmaengine: idxd: Separate user and kernel pasid enabling (git-fixes).
- dmaengine: idxd: Set traffic class values in GRPCFG on DSA 2.0 (git-fixes).
- dmaengine: imx-sdma: Fix a possible memory leak in sdma_transfer_init (git-fixes).
- dmaengine: mv_xor_v2: Fix an error code (git-fixes).
- dmaengine: pl330: rename _start to prevent build error (git-fixes).
- dmaengine: ptdma: check for null desc before calling pt_cmd_callback (git-fixes).
- dmaengine: sf-pdma: pdma_desc memory leak fix (git-fixes).
- dmaengine: tegra: Fix memory leak in terminate_all() (git-fixes).
- do not reuse connection if share marked as isolated (bsc#1193629).
- docs/memory-barriers.txt: Add a missed closing parenthesis (git-fixes).
- docs/scripts/gdb: add necessary make scripts_gdb step (git-fixes).
- docs: Correct missing 'd_' prefix for dentry_operations member d_weak_revalidate (git-fixes).
- docs: driver-api: firmware_loader: fix missing argument in usage example (git-fixes).
- docs: ftrace: fix a issue with duplicated subtitle number (git-fixes).
- docs: gdbmacros: print newest record (git-fixes).
- docs: networking: Update codeaurora references for rmnet (git-fixes).
- docs: networking: fix x25-iface.rst heading &amp; index order (git-fixes).
- documentation: ABI: sysfs-class-net-qmi: pass_through contact update (git-fixes).
- documentation: bonding: fix the doc of peer_notif_delay (git-fixes).
- documentation: timers: hrtimers: Make hybrid union historical (git-fixes).
- driver core: Do not require dynamic_debug for initcall_debug probe timing (git-fixes).
- driver core: fix potential null-ptr-deref in device_add() (git-fixes).
- driver core: fix resource leak in device_add() (git-fixes).
- driver core: fw_devlink: Add DL_FLAG_CYCLE support to device links (git-fixes).
- drivers/base: Fix unsigned comparison to -1 in CPUMAP_FILE_MAX_BYTES (bsc#1208815).
- drivers/base: fix userspace break from using bin_attributes for cpumap and cpulist (bsc#1208815).
- drivers/md/md-bitmap: check the return value of md_bitmap_get_counter() (git-fixes).
- drivers: base: component: fix memory leak with using debugfs_lookup() (git-fixes).
- drivers: base: dd: fix memory leak with using debugfs_lookup() (git-fixes).
- drivers: base: transport_class: fix possible memory leak (git-fixes).
- drivers: base: transport_class: fix resource leak when transport_add_device() fails (git-fixes).
- drivers: meson: secure-pwrc: always enable DMA domain (git-fixes).
- drivers: staging: rtl8723bs: Fix locking in _rtw_join_timeout_handler() (git-fixes).
- drivers: staging: rtl8723bs: Fix locking in rtw_scan_timeout_handler() (git-fixes).
- drivers: vmbus: Check for channel allocation before looking up relids (git-fixes).
- drivers:md:fix a potential use-after-free bug (git-fixes).
- drm-hyperv: Add a bug reference to two existing changes (bsc#1211281).
- drm/amd/amdgpu: fix warning during suspend (bsc#1206843).
- drm/amd/display/dc/dce60/Makefile: Fix previous attempt to silence known override-init warnings (git-fixes).
- drm/amd/display: Add DCN314 display SG Support (bsc#1206843).
- drm/amd/display: Add DSC Support for Synaptics Cascaded MST Hub (git-fixes).
- drm/amd/display: Add NULL plane_state check for cursor disable logic (git-fixes).
- drm/amd/display: Add check for DET fetch latency hiding for dcn32 (bsc#1206843).
- drm/amd/display: Add logging for display MALL refresh setting (git-fixes).
- drm/amd/display: Add minimal pipe split transition state (git-fixes).
- drm/amd/display: Add missing brackets in calculation (bsc#1206843).
- drm/amd/display: Add wrapper to call planes and stream update (git-fixes).
- drm/amd/display: Adjust downscaling limits for dcn314 (bsc#1206843).
- drm/amd/display: Allow subvp on vactive pipes that are 2560x1440@60 (bsc#1206843).
- drm/amd/display: Clear MST topology if it fails to resume (git-fixes).
- drm/amd/display: Conversion to bool not necessary (git-fixes).
- drm/amd/display: Defer DIG FIFO disable after VID stream enable (bsc#1206843).
- drm/amd/display: Disable DRR actions during state commit (bsc#1206843).
- drm/amd/display: Disable HUBP/DPP PG on DCN314 for now (bsc#1206843).
- drm/amd/display: Do not clear GPINT register when releasing DMUB from reset (git-fixes).
- drm/amd/display: Do not commit pipe when updating DRR (bsc#1206843).
- drm/amd/display: Do not set DRR on pipe Commit (bsc#1206843).
- drm/amd/display: Enable P-state validation checks for DCN314 (bsc#1206843).
- drm/amd/display: Explicitly specify update type per plane info change (git-fixes).
- drm/amd/display: Fail atomic_check early on normalize_zpos error (git-fixes).
- drm/amd/display: Fix DP MST sinks removal issue (git-fixes).
- drm/amd/display: Fix DTBCLK disable requests and SRC_SEL programming (bsc#1206843).
- drm/amd/display: Fix artifacting on eDP panels when engaging freesync video mode (git-fixes).
- drm/amd/display: Fix display corruption w/ VSR enable (bsc#1206843).
- drm/amd/display: Fix hang when skipping modeset (git-fixes).
- drm/amd/display: Fix potential null dereference (git-fixes).
- drm/amd/display: Fix potential null-deref in dm_resume (git-fixes).
- drm/amd/display: Fix race condition in DPIA AUX transfer (bsc#1206843).
- drm/amd/display: Fix set scaling doesn's work (git-fixes).
- drm/amd/display: Fix timing not changning when freesync video is enabled (git-fixes).
- drm/amd/display: Fixes for dcn32_clk_mgr implementation (git-fixes).
- drm/amd/display: Include virtual signal to set k1 and k2 values (bsc#1206843).
- drm/amd/display: Move DCN314 DOMAIN power control to DMCUB (bsc#1206843).
- drm/amd/display: Pass the right info to drm_dp_remove_payload (bsc#1206843).
- drm/amd/display: Properly handle additional cases where DCN is not supported (git-fixes).
- drm/amd/display: Properly reuse completion structure (bsc#1206843).
- drm/amd/display: Reduce expected sdp bandwidth for dcn321 (bsc#1206843).
- drm/amd/display: Remove OTG DIV register write for Virtual signals (bsc#1206843).
- drm/amd/display: Report to ACPI video if no panels were found (bsc#1206843).
- drm/amd/display: Reset DMUB mailbox SW state after HW reset (bsc#1206843).
- drm/amd/display: Reset OUTBOX0 r/w pointer on DMUB reset (git-fixes).
- drm/amd/display: Return error code on DSC atomic check failure (git-fixes).
- drm/amd/display: Revert Reduce delay when sink device not able to ACK 00340h write (git-fixes).
- drm/amd/display: Set dcn32 caps.seamless_odm (bsc#1206843).
- drm/amd/display: Set hvm_enabled flag for S/G mode (bsc#1206843).
- drm/amd/display: Simplify same effect if/else blocks (git-fixes).
- drm/amd/display: Take FEC Overhead into Timeslot Calculation (bsc#1206843).
- drm/amd/display: Take emulated dc_sink into account for HDCP (bsc#1207734).
- drm/amd/display: Unassign does_plane_fit_in_mall function from dcn3.2 (bsc#1206843).
- drm/amd/display: Uninitialized variables causing 4k60 UCLK to stay at DPM1 and not DPM0 (bsc#1206843).
- drm/amd/display: Update bounding box values for DCN321 (git-fixes).
- drm/amd/display: Update clock table to include highest clock setting (bsc#1206843).
- drm/amd/display: Use DC_LOG_DC in the trasform pixel function (git-fixes).
- drm/amd/display: Use dc_update_planes_and_stream (git-fixes).
- drm/amd/display: Use min transition for SubVP into MPO (bsc#1206843).
- drm/amd/display: Workaround to increase phantom pipe vactive in pipesplit (bsc#1206843).
- drm/amd/display: add a NULL pointer check (bsc#1212848, bsc#1212961).
- drm/amd/display: adjust MALL size available for DCN32 and DCN321 (bsc#1206843).
- drm/amd/display: disable S/G display on DCN 3.1.4 (bsc#1206843).
- drm/amd/display: disable S/G display on DCN 3.1.5 (bsc#1206843).
- drm/amd/display: disable seamless boot if force_odm_combine is enabled (bsc#1212848, bsc#1212961).
- drm/amd/display: disconnect MPCC only on OTG change (bsc#1206843).
- drm/amd/display: do not call dc_interrupt_set() for disabled crtcs (git-fixes).
- drm/amd/display: drop redundant memset() in get_available_dsc_slices() (git-fixes).
- drm/amd/display: edp do not add non-edid timings (git-fixes).
- drm/amd/display: fix FCLK pstate change underflow (bsc#1206843).
- drm/amd/display: fix cursor offset on rotation 180 (git-fixes).
- drm/amd/display: fix duplicate assignments (git-fixes).
- drm/amd/display: fix flickering caused by S/G mode (git-fixes).
- drm/amd/display: fix issues with driver unload (git-fixes).
- drm/amd/display: fix k1 k2 divider programming for phantom streams (bsc#1206843).
- drm/amd/display: fix mapping to non-allocated address (bsc#1206843).
- drm/amd/display: fix shift-out-of-bounds in CalculateVMAndRowBytes (git-fixes).
- drm/amd/display: fix the system hang while disable PSR (git-fixes).
- drm/amd/display: fix wrong index used in dccg32_set_dpstreamclk (bsc#1206843).
- drm/amd/display: move remaining FPU code to dml folder (bsc#1206843).
- drm/amd/display: properly handling AGP aperture in vm setup (bsc#1206843).
- drm/amd/display: reduce else-if to else in dcn10_blank_pixel_data() (git-fixes).
- drm/amd/display: revert Disable DRR actions during state commit (bsc#1206843).
- drm/amd/display: skip commit minimal transition state (bsc#1206843).
- drm/amd/display: wait for vblank during pipe programming (git-fixes).
- drm/amd/pm/smu13: BACO is supported when it's in BACO state (bsc#1206843).
- drm/amd/pm: Enable bad memory page/channel recording support for smu v13_0_0 (bsc#1206843).
- drm/amd/pm: Fix output of pp_od_clk_voltage (git-fixes).
- drm/amd/pm: Fix power context allocation in SMU13 (git-fixes).
- drm/amd/pm: Fix sienna cichlid incorrect OD volage after resume (bsc#1206843).
- drm/amd/pm: add SMU 13.0.7 missing GetPptLimit message mapping (bsc#1206843).
- drm/amd/pm: add missing AllowIHInterrupt message mapping for SMU13.0.0 (bsc#1206843).
- drm/amd/pm: add missing SMU13.0.0 mm_dpm feature mapping (bsc#1206843).
- drm/amd/pm: add missing SMU13.0.7 mm_dpm feature mapping (bsc#1206843).
- drm/amd/pm: add the missing mapping for PPT feature on SMU13.0.0 and 13.0.7 (bsc#1206843).
- drm/amd/pm: bump SMU 13.0.0 driver_if header version (bsc#1206843).
- drm/amd/pm: bump SMU 13.0.4 driver_if header version (bsc#1206843).
- drm/amd/pm: bump SMU 13.0.7 driver_if header version (bsc#1206843).
- drm/amd/pm: bump SMU13.0.0 driver_if header to version 0x34 (bsc#1206843).
- drm/amd/pm: correct SMU13.0.0 pstate profiling clock settings (bsc#1206843).
- drm/amd/pm: correct SMU13.0.7 max shader clock reporting (bsc#1206843).
- drm/amd/pm: correct SMU13.0.7 pstate profiling clock settings (bsc#1206843).
- drm/amd/pm: correct the fan speed retrieving in PWM for some SMU13 asics (bsc#1206843).
- drm/amd/pm: correct the pcie link state check for SMU13 (bsc#1206843).
- drm/amd/pm: correct the reference clock for fan speed(rpm) calculation (bsc#1206843).
- drm/amd/pm: drop unneeded dpm features disablement for SMU 13.0.4/11 (bsc#1206843).
- drm/amd/pm: enable GPO dynamic control support for SMU13.0.0 (bsc#1206843).
- drm/amd/pm: enable GPO dynamic control support for SMU13.0.7 (bsc#1206843).
- drm/amd/pm: enable mode1 reset on smu_v13_0_10 (bsc#1206843).
- drm/amd/pm: parse pp_handle under appropriate conditions (git-fixes).
- drm/amd/pm: remove unused num_of_active_display variable (git-fixes).
- drm/amd/pm: reverse mclk and fclk clocks levels for renoir (git-fixes).
- drm/amd/pm: reverse mclk and fclk clocks levels for vangogh (git-fixes).
- drm/amd/pm: reverse mclk and fclk clocks levels for yellow carp (git-fixes).
- drm/amd/pm: revise the ASPM settings for thunderbolt attached scenario (bsc#1212848, bsc#1212961).
- drm/amd/pm: update SMU13.0.0 reported maximum shader clock (bsc#1206843).
- drm/amd/pm: update the LC_L1_INACTIVITY setting to address possible noise issue (bsc#1212848, bsc#1212961).
- drm/amd: Avoid ASSERT for some message failures (bsc#1206843).
- drm/amd: Avoid BUG() for case of SRIOV missing IP version (bsc#1206843).
- drm/amd: Delay removal of the firmware framebuffer (git-fixes).
- drm/amd: Disable PSR-SU on Parade 0803 TCON (bsc#1212848, bsc#1212961).
- drm/amd: Do not try to enable secure display TA multiple times (bsc#1212848, bsc#1212961).
- drm/amd: Fix an out of bounds error in BIOS parser (git-fixes).
- drm/amd: Fix initialization for nbio 4.3.0 (bsc#1206843).
- drm/amd: Fix initialization for nbio 7.5.1 (bsc#1206843).
- drm/amd: Fix initialization mistake for NBIO 7.3.0 (bsc#1206843).
- drm/amd: Make sure image is written to trigger VBIOS image update flow (git-fixes).
- drm/amd: Tighten permissions on VBIOS flashing attributes (git-fixes).
- drm/amdgpu/discovery: add PSP IP v13.0.11 support (bsc#1206843).
- drm/amdgpu/discovery: enable gfx v11 for GC 11.0.4 (bsc#1206843).
- drm/amdgpu/discovery: enable gmc v11 for GC 11.0.4 (bsc#1206843).
- drm/amdgpu/discovery: enable mes support for GC v11.0.4 (bsc#1206843).
- drm/amdgpu/discovery: enable nbio support for NBIO v7.7.1 (bsc#1206843).
- drm/amdgpu/discovery: enable soc21 common for GC 11.0.4 (bsc#1206843).
- drm/amdgpu/discovery: set the APU flag for GC 11.0.4 (bsc#1206843).
- drm/amdgpu/display/mst: Fix mst_state-&gt;pbn_div and slot count assignments (bsc#1206843).
- drm/amdgpu/display/mst: adjust the naming of mst_port and port of aconnector (bsc#1206843).
- drm/amdgpu/display/mst: limit payload to be updated one by one (bsc#1206843).
- drm/amdgpu/display/mst: update mst_mgr relevant variable when long HPD (bsc#1206843).
- drm/amdgpu/dm/dp_mst: Do not grab mst_mgr-&gt;lock when computing DSC state (bsc#1206843).
- drm/amdgpu/dm/mst: Fix uninitialized var in pre_compute_mst_dsc_configs_for_state() (bsc#1206843).
- drm/amdgpu/dm/mst: Use the correct topology mgr pointer in amdgpu_dm_connector (bsc#1206843).
- drm/amdgpu/fence: Fix oops due to non-matching drm_sched init/fini (git-fixes).
- drm/amdgpu/gfx10: Disable gfxoff before disabling powergating (git-fixes).
- drm/amdgpu/gfx: disable gfx9 cp_ecc_error_irq only when enabling legacy gfx ras (git-fixes).
- drm/amdgpu/mst: Stop ignoring error codes and deadlocking (bsc#1206843).
- drm/amdgpu/nv: Apply ASPM quirk on Intel ADL + AMD Navi (bsc#1206843).
- drm/amdgpu/pm: add GFXOFF control IP version check for SMU IP v13.0.11 (bsc#1206843).
- drm/amdgpu/pm: enable swsmu for SMU IP v13.0.11 (bsc#1206843).
- drm/amdgpu/pm: use the specific mailbox registers only for SMU IP v13.0.4 (bsc#1206843).
- drm/amdgpu/smu: skip pptable init under sriov (bsc#1206843).
- drm/amdgpu/soc21: Add video cap query support for VCN_4_0_4 (bsc#1206843).
- drm/amdgpu/soc21: add mode2 asic reset for SMU IP v13.0.11 (bsc#1206843).
- drm/amdgpu/soc21: do not expose AV1 if VCN0 is harvested (bsc#1206843).
- drm/amdgpu: Add unique_id support for GC 11.0.1/2 (bsc#1206843).
- drm/amdgpu: Correct the power calcultion for Renior/Cezanne (git-fixes).
- drm/amdgpu: Do not register backlight when another backlight should be used (v3) (bsc#1206843).
- drm/amdgpu: Do not resume IOMMU after incomplete init (bsc#1206843).
- drm/amdgpu: Enable pg/cg flags on GC11_0_4 for VCN (bsc#1206843).
- drm/amdgpu: Enable vclk dclk node for gc11.0.3 (bsc#1206843).
- drm/amdgpu: Fix call trace warning and hang when removing amdgpu device (bsc#1206843).
- drm/amdgpu: Fix potential NULL dereference (bsc#1206843).
- drm/amdgpu: Fix potential double free and null pointer dereference (bsc#1206843).
- drm/amdgpu: Fix size validation for non-exclusive domains (v4) (bsc#1206843).
- drm/amdgpu: Fix vram recover does not work after whole GPU reset (v2) (git-fixes).
- drm/amdgpu: Fixed bug on error when unloading amdgpu (bsc#1206843).
- drm/amdgpu: Re-enable DCN for 64-bit powerpc (bsc#1194869).
- drm/amdgpu: Register ACPI video backlight when skipping amdgpu backlight registration (bsc#1206843).
- drm/amdgpu: Set vmbo destroy after pt bo is created (git-fixes).
- drm/amdgpu: Use the TGID for trace_amdgpu_vm_update_ptes (bsc#1206843).
- drm/amdgpu: Use the default reset when loading or reloading the driver (git-fixes).
- drm/amdgpu: Use the sched from entity for amdgpu_cs trace (git-fixes).
- drm/amdgpu: Validate VM ioctl flags (git-fixes).
- drm/amdgpu: add a missing lock for AMDGPU_SCHED (git-fixes).
- drm/amdgpu: add gfx support for GC 11.0.4 (bsc#1206843).
- drm/amdgpu: add gmc v11 support for GC 11.0.4 (bsc#1206843).
- drm/amdgpu: add missing radeon secondary PCI ID (git-fixes).
- drm/amdgpu: add smu 13 support for smu 13.0.11 (bsc#1206843).
- drm/amdgpu: add soc21 common ip block support for GC 11.0.4 (bsc#1206843).
- drm/amdgpu: add tmz support for GC 11.0.1 (bsc#1206843).
- drm/amdgpu: add tmz support for GC IP v11.0.4 (bsc#1206843).
- drm/amdgpu: allow more APUs to do mode2 reset when go to S4 (bsc#1206843).
- drm/amdgpu: allow multipipe policy on ASICs with one MEC (bsc#1206843).
- drm/amdgpu: change gfx 11.0.4 external_id range (git-fixes).
- drm/amdgpu: complete gfxoff allow signal during suspend without delay (git-fixes).
- drm/amdgpu: correct MEC number for gfx11 APUs (bsc#1206843).
- drm/amdgpu: disable runtime pm on several sienna cichlid cards(v2) (git-fixes).
- drm/amdgpu: disable sdma ecc irq only when sdma RAS is enabled in suspend (git-fixes).
- drm/amdgpu: drop experimental flag on aldebaran (git-fixes).
- drm/amdgpu: enable GFX Clock Gating control for GC IP v11.0.4 (bsc#1206843).
- drm/amdgpu: enable GFX IP v11.0.4 CG support (bsc#1206843).
- drm/amdgpu: enable GFX Power Gating for GC IP v11.0.4 (bsc#1206843).
- drm/amdgpu: enable HDP SD for gfx 11.0.3 (bsc#1206843).
- drm/amdgpu: enable PSP IP v13.0.11 support (bsc#1206843).
- drm/amdgpu: enable VCN DPG for GC IP v11.0.4 (bsc#1206843).
- drm/amdgpu: fix Null pointer dereference error in amdgpu_device_recover_vram (git-fixes).
- drm/amdgpu: fix amdgpu_job_free_resources v2 (bsc#1206843).
- drm/amdgpu: fix clearing mappings for BOs that are always valid in VM (bsc#1212848, bsc#1212961).
- drm/amdgpu: fix enum odm_combine_mode mismatch (git-fixes).
- drm/amdgpu: fix error checking in amdgpu_read_mm_registers for nv (bsc#1206843).
- drm/amdgpu: fix error checking in amdgpu_read_mm_registers for soc15 (git-fixes).
- drm/amdgpu: fix error checking in amdgpu_read_mm_registers for soc21 (bsc#1206843).
- drm/amdgpu: fix mmhub register base coding error (git-fixes).
- drm/amdgpu: fix number of fence calculations (bsc#1212848, bsc#1212961).
- drm/amdgpu: fix return value check in kfd (git-fixes).
- drm/amdgpu: fix ttm_bo calltrace warning in psp_hw_fini (bsc#1206843).
- drm/amdgpu: fix xclk freq on CHIP_STONEY (git-fixes).
- drm/amdgpu: for S0ix, skip SDMA 5.x+ suspend/resume (git-fixes).
- drm/amdgpu: release gpu full access after 'amdgpu_device_ip_late_init' (git-fixes).
- drm/amdgpu: reposition the gpu reset checking for reuse (bsc#1206843).
- drm/amdgpu: set GC 11.0.4 family (bsc#1206843).
- drm/amdgpu: skip ASIC reset for APUs when go to S4 (bsc#1206843).
- drm/amdgpu: skip MES for S0ix as well since it's part of GFX (bsc#1206843).
- drm/amdgpu: skip disabling fence driver src_irqs when device is unplugged (git-fixes).
- drm/amdgpu: skip mes self test after s0i3 resume for MES IP v11.0 (bsc#1206843).
- drm/amdgpu: skip psp suspend for IMU enabled ASICs mode2 reset (git-fixes).
- drm/amdgpu: update drm_display_info correctly when the edid is read (git-fixes).
- drm/amdgpu: update wave data type to 3 for gfx11 (bsc#1206843).
- drm/amdkfd: Add sync after creating vram bo (bsc#1206843).
- drm/amdkfd: Fix BO offset for multi-VMA page migration (git-fixes).
- drm/amdkfd: Fix NULL pointer error for GC 11.0.1 on mGPU (bsc#1206843).
- drm/amdkfd: Fix an illegal memory access (git-fixes).
- drm/amdkfd: Fix double release compute pasid (bsc#1206843).
- drm/amdkfd: Fix kfd_process_device_init_vm error handling (bsc#1206843).
- drm/amdkfd: Fix potential deallocation of previously deallocated memory (git-fixes).
- drm/amdkfd: Fix the memory overrun (bsc#1206843).
- drm/amdkfd: Fix the warning of array-index-out-of-bounds (bsc#1206843).
- drm/amdkfd: Fixed kfd_process cleanup on module exit (git-fixes).
- drm/amdkfd: Get prange-&gt;offset after svm_range_vram_node_new (git-fixes).
- drm/amdkfd: Page aligned memory reserve size (bsc#1206843).
- drm/amdkfd: add GC 11.0.4 KFD support (bsc#1206843).
- drm/amdkfd: fix a potential double free in pqm_create_queue (git-fixes).
- drm/amdkfd: fix potential kgd_mem UAFs (git-fixes).
- drm/amdkfd: introduce dummy cache info for property asic (bsc#1206843).
- drm/armada: Fix a potential double free in an error handling path (git-fixes).
- drm/ast: Fix ARM compatibility (git-fixes).
- drm/bochs: fix blanking (git-fixes).
- drm/bridge: Fix returned array size name for atomic_get_input_bus_fmts kdoc (git-fixes).
- drm/bridge: adv7533: Fix adv7533_mode_valid for adv7533 and adv7535 (git-fixes).
- drm/bridge: it6505: Fix return value check for pm_runtime_get_sync (git-fixes).
- drm/bridge: lt8912b: Add hot plug detection (git-fixes).
- drm/bridge: lt8912b: Fix DSI Video Mode (git-fixes).
- drm/bridge: lt8912b: return EPROBE_DEFER if bridge is not found (git-fixes).
- drm/bridge: lt9611: Fix PLL being unable to lock (git-fixes).
- drm/bridge: lt9611: fix HPD reenablement (git-fixes).
- drm/bridge: lt9611: fix clock calculation (git-fixes).
- drm/bridge: lt9611: fix polarity programming (git-fixes).
- drm/bridge: lt9611: fix programming of video modes (git-fixes).
- drm/bridge: lt9611: fix sleep mode setup (git-fixes).
- drm/bridge: lt9611: pass a pointer to the of node (git-fixes).
- drm/bridge: megachips: Fix error handling in i2c_register_driver() (git-fixes).
- drm/bridge: tc358768: always enable HS video mode (git-fixes).
- drm/bridge: tc358768: fix PLL parameters computation (git-fixes).
- drm/bridge: tc358768: fix PLL target frequency (git-fixes).
- drm/bridge: tc358768: fix TCLK_ZEROCNT computation (git-fixes).
- drm/bridge: tc358768: fix TXTAGOCNT computation (git-fixes).
- drm/bridge: ti-sn65dsi83: Fix delay after reset deassert to match spec (git-fixes).
- drm/bridge: ti-sn65dsi86: Avoid possible buffer overflow (git-fixes).
- drm/cirrus: NULL-check pipe-&gt;plane.state-&gt;fb in cirrus_pipe_update() (git-fixes).
- drm/connector: print max_requested_bpc in state debugfs (git-fixes).
- drm/display/dp_mst: Add drm_atomic_get_old_mst_topology_state() (bsc#1206843).
- drm/display/dp_mst: Add helper for finding payloads in atomic MST state (bsc#1206843).
- drm/display/dp_mst: Add helpers for serializing SST &amp;lt;-&gt; MST transitions (bsc#1206843).
- drm/display/dp_mst: Add nonblocking helpers for DP MST (bsc#1206843).
- drm/display/dp_mst: Call them time slots, not VCPI slots (bsc#1206843).
- drm/display/dp_mst: Correct the kref of port (bsc#1206843).
- drm/display/dp_mst: Do not open code modeset checks for releasing time slots (bsc#1206843).
- drm/display/dp_mst: Drop all ports from topology on CSNs before queueing link address work (bsc#1206843).
- drm/display/dp_mst: Fix confusing docs for drm_dp_atomic_release_time_slots() (bsc#1206843).
- drm/display/dp_mst: Fix down message handling after a packet reception error (git-fixes).
- drm/display/dp_mst: Fix down/up message handling after sink disconnect (git-fixes).
- drm/display/dp_mst: Fix drm_dp_mst_add_affected_dsc_crtcs() return code (git-fixes).
- drm/display/dp_mst: Fix modeset tracking in drm_dp_atomic_release_vcpi_slots() (bsc#1206843).
- drm/display/dp_mst: Handle old/new payload states in drm_dp_remove_payload() (bsc#1206843).
- drm/display/dp_mst: Maintain time slot allocations when deleting payloads (bsc#1206843).
- drm/display/dp_mst: Move all payload info into the atomic state (bsc#1206843).
- drm/display/dp_mst: Rename drm_dp_mst_vcpi_allocation (bsc#1206843).
- drm/display: Do not assume dual mode adaptors support i2c sub-addressing (git-fixes).
- drm/displayid: add displayid_get_header() and check bounds better (git-fixes).
- drm/dp: Do not rewrite link config when setting phy test pattern (git-fixes).
- drm/dp_mst: Avoid deleting payloads for connectors staying enabled (bsc#1206843).
- drm/dp_mst: fix drm_dp_dpcd_read return value checks (git-fixes).
- drm/edid: fix AVI infoframe aspect ratio handling (git-fixes).
- drm/edid: fix parsing of 3D modes from HDMI VSDB (git-fixes).
- drm/etnaviv: fix reference leak when mmaping imported buffer (git-fixes).
- drm/exynos: fix g2d_open/close helper function definitions (git-fixes).
- drm/exynos: fix race condition UAF in exynos_g2d_exec_ioctl (git-fixes).
- drm/exynos: vidi: fix a wrong error return (git-fixes).
- drm/fb-helper: set x/yres_virtual in drm_fb_helper_check_var (git-fixes).
- drm/fbdev-generic: prohibit potential out-of-bounds access (git-fixes).
- drm/fourcc: Add missing big-endian XRGB1555 and RGB565 formats (git-fixes).
- drm/hyperv : Removing the restruction of VRAM allocation with PCI bar size (git-fixes).
- drm/hyperv: Add error message for fb size greater than allocated (git-fixes).
- drm/hyperv: Fix an error handling path in hyperv_vmbus_probe() (git-fixes).
- drm/i915/active: Fix missing debug object activation (git-fixes).
- drm/i915/active: Fix misuse of non-idle barriers as fence trackers (git-fixes).
- drm/i915/adlp: Fix typo for reference clock (git-fixes).
- drm/i915/color: Fix typo for Plane CSC indexes (git-fixes).
- drm/i915/dg2: Add HDMI pixel clock frequencies 267.30 and 319.89 MHz (git-fixes).
- drm/i915/dg2: Add additional HDMI pixel clock frequencies (git-fixes).
- drm/i915/dg2: Drop one PCI ID (git-fixes).
- drm/i915/dg2: Support 4k@30 on HDMI (git-fixes).
- drm/i915/dgfx: Keep PCI autosuspend control 'on' by default on all dGPU (git-fixes).
- drm/i915/display/psr: Handle plane and pipe restrictions at every page flip (git-fixes).
- drm/i915/display/psr: Use drm damage helpers to calculate plane damaged area (git-fixes).
- drm/i915/display: Check source height is &gt; 0 (git-fixes).
- drm/i915/display: Workaround cursor left overs with PSR2 selective fetch enabled (git-fixes).
- drm/i915/display: clean up comments (git-fixes).
- drm/i915/dmc: Update DG2 DMC version to v2.08 (git-fixes).
- drm/i915/dp: prevent potential div-by-zero (git-fixes).
- drm/i915/dp_mst: Fix mst_mgr lookup during atomic check (bsc#1206843).
- drm/i915/dp_mst: Fix payload removal during output disabling (bsc#1206843).
- drm/i915/dpt: Treat the DPT BO as a framebuffer (git-fixes).
- drm/i915/dsi: Use unconditional msleep() instead of intel_dsi_msleep() (git-fixes).
- drm/i915/dsi: fix DSS CTL register offsets for TGL+ (git-fixes).
- drm/i915/gem: Flush lmem contents after construction (git-fixes).
- drm/i915/gen11: Moving WAs to icl_gt_workarounds_init() (git-fixes).
- drm/i915/gen11: Wa_1408615072/Wa_1407596294 should be on GT list (git-fixes).
- drm/i915/gt: Use the correct error value when kernel_context() fails (git-fixes).
- drm/i915/gt: perform uc late init after probe error injection (git-fixes).
- drm/i915/guc: Do not capture Gen8 regs on Xe devices (git-fixes).
- drm/i915/gvt: remove unused variable gma_bottom in command parser (git-fixes).
- drm/i915/huc: always init the delayed load fence (git-fixes).
- drm/i915/huc: bump timeout for delayed load and reduce print verbosity (git-fixes).
- drm/i915/huc: fix leak of debug object in huc load fence on driver unload (git-fixes).
- drm/i915/migrate: Account for the reserved_space (git-fixes).
- drm/i915/migrate: fix corner case in CCS aux copying (git-fixes).
- drm/i915/psr: Fix PSR_IMR/IIR field handling (git-fixes).
- drm/i915/psr: Use calculated io and fast wake lines (git-fixes).
- drm/i915/psr: Use hw.adjusted mode when calculating io/fast wake times (git-fixes).
- drm/i915/pxp: use &amp;lt;&gt; instead of '' for headers in include/ (git-fixes).
- drm/i915/quirks: Add inverted backlight quirk for HP 14-r206nv (git-fixes).
- drm/i915/selftest: fix intel_selftest_modify_policy argument types (git-fixes).
- drm/i915/selftests: Add some missing error propagation (git-fixes).
- drm/i915/selftests: Increase timeout for live_parallel_switch (git-fixes).
- drm/i915/selftests: Stop using kthread_stop() (git-fixes).
- drm/i915/tc: Fix the ICL PHY ownership check in TC-cold state (git-fixes).
- drm/i915: Allow switching away via vga-switcheroo if uninitialized (git-fixes).
- drm/i915: Avoid potential vm use-after-free (git-fixes).
- drm/i915: Disable DC states for all commits (git-fixes).
- drm/i915: Do not use BAR mappings for ring buffers with LLC (git-fixes).
- drm/i915: Do not use stolen memory for ring buffers with LLC (git-fixes).
- drm/i915: Explain the magic numbers for AUX SYNC/precharge length (git-fixes).
- drm/i915: Fix NULL ptr deref by checking new_crtc_state (git-fixes).
- drm/i915: Fix VBT DSI DVO port handling (git-fixes).
- drm/i915: Fix context runtime accounting (git-fixes).
- drm/i915: Fix fast wake AUX sync len (git-fixes).
- drm/i915: Fix potential bit_17 double-free (git-fixes).
- drm/i915: Fix potential context UAFs (git-fixes).
- drm/i915: Fix request ref counting during error capture &amp; debugfs dump (git-fixes).
- drm/i915: Fix up locking around dumping requests lists (git-fixes).
- drm/i915: Initialize the obj flags for shmem objects (git-fixes).
- drm/i915: Make intel_get_crtc_new_encoder() less oopsy (git-fixes).
- drm/i915: Move CSC load back into .color_commit_arm() when PSR is enabled on skl/glk (git-fixes).
- drm/i915: Move fd_install after last use of fence (git-fixes).
- drm/i915: Preserve crtc_state-&gt;inherited during state clearing (git-fixes).
- drm/i915: Remove __maybe_unused from mtl_info (git-fixes).
- drm/i915: Remove unused bits of i915_vma/active api (git-fixes).
- drm/i915: Remove unused variable (git-fixes).
- drm/i915: Use 18 fast wake AUX sync len (git-fixes).
- drm/i915: fix race condition UAF in i915_perf_add_config_ioctl (git-fixes).
- drm/i915: move a Kconfig symbol to unbreak the menu presentation (git-fixes).
- drm/i915: stop abusing swiotlb_max_segment (git-fixes).
- drm/lima/lima_drv: Add missing unwind goto in lima_pdev_probe() (git-fixes).
- drm/mediatek: Clean dangling pointer on bind error path (git-fixes).
- drm/mediatek: Drop unbalanced obj unref (git-fixes).
- drm/mediatek: Use NULL instead of 0 for NULL pointer (git-fixes).
- drm/mediatek: dsi: Reduce the time of dsi from LP11 to sending cmd (git-fixes).
- drm/mediatek: mtk_drm_crtc: Add checks for devm_kcalloc (git-fixes).
- drm/meson: fix 1px pink line on GXM when scaling video overlay (git-fixes).
- drm/meson: fix missing component unbind on bind errors (git-fixes).
- drm/meson: reorder driver deinit sequence to fix use-after-free bug (git-fixes).
- drm/mgag200: Fix gamma lut not initialized (git-fixes).
- drm/mipi-dsi: Fix byte order of 16-bit DCS set/get brightness (git-fixes).
- drm/mipi-dsi: Set the fwnode for mipi_dsi_device (git-fixes).
- drm/msm/a5xx: fix context faults during ring switch (git-fixes).
- drm/msm/a5xx: fix highest bank bit for a530 (git-fixes).
- drm/msm/a5xx: fix setting of the CP_PREEMPT_ENABLE_LOCAL register (git-fixes).
- drm/msm/a5xx: fix the emptyness check in the preempt code (git-fixes).
- drm/msm/a6xx: Fix kvzalloc vs state_kcalloc usage (git-fixes).
- drm/msm/a6xx: Fix speed-bin detection vs probe-defer (git-fixes).
- drm/msm/adreno: Fix null ptr access in adreno_gpu_cleanup() (git-fixes).
- drm/msm/adreno: adreno_gpu: Use suspend() instead of idle() on load error (git-fixes).
- drm/msm/adreno: drop bogus pm_runtime_set_active() (git-fixes).
- drm/msm/adreno: fix runtime PM imbalance at gpu load (git-fixes).
- drm/msm/adreno: fix sparse warnings in a6xx code (git-fixes).
- drm/msm/disp/dpu: check for crtc enable rather than crtc active to release shared resources (git-fixes).
- drm/msm/disp/dpu: fix sc7280_pp base offset (git-fixes).
- drm/msm/dp: Clean up handling of DP AUX interrupts (git-fixes).
- drm/msm/dp: Free resources after unregistering them (git-fixes).
- drm/msm/dp: cleared DP_DOWNSPREAD_CTRL register before start link training (git-fixes).
- drm/msm/dp: unregister audio driver during unbind (git-fixes).
- drm/msm/dpu: Add INTF_5 interrupts (git-fixes).
- drm/msm/dpu: Add check for cstate (git-fixes).
- drm/msm/dpu: Add check for pstates (git-fixes).
- drm/msm/dpu: Disallow unallocated resources to be returned (git-fixes).
- drm/msm/dpu: Move non-MDP_TOP INTF_INTR offsets out of hwio header (git-fixes).
- drm/msm/dpu: Reject topologies for which no DSC blocks are available (git-fixes).
- drm/msm/dpu: Remove duplicate register defines from INTF (git-fixes).
- drm/msm/dpu: Remove num_enc from topology struct in favour of num_dsc (git-fixes).
- drm/msm/dpu: Wire up DSC mask for active CTL configuration (git-fixes).
- drm/msm/dpu: check for null return of devm_kzalloc() in dpu_writeback_init() (git-fixes).
- drm/msm/dpu: clear DSPP reservations in rm release (git-fixes).
- drm/msm/dpu: correct MERGE_3D length (git-fixes).
- drm/msm/dpu: disable features unsupported by QCM2290 (git-fixes).
- drm/msm/dpu: do not enable color-management if DSPPs are not available (git-fixes).
- drm/msm/dpu: drop DPU_DIM_LAYER from MIXER_MSM8998_MASK (git-fixes).
- drm/msm/dpu: drop stale comment from struct dpu_mdp_cfg doc (git-fixes).
- drm/msm/dpu: fix clocks settings for msm8998 SSPP blocks (git-fixes).
- drm/msm/dpu: fix len of sc7180 ctl blocks (git-fixes).
- drm/msm/dpu: sc7180: add missing WB2 clock control (git-fixes).
- drm/msm/dpu: set pdpu-&gt;is_rt_pipe early in dpu_plane_sspp_atomic_update() (git-fixes).
- drm/msm/dsi: Add missing check for alloc_ordered_workqueue (git-fixes).
- drm/msm/dsi: Allow 2 CTRLs on v2.5.0 (git-fixes).
- drm/msm/dsi: do not allow enabling 14nm VCO with unprogrammed rate (git-fixes).
- drm/msm/gem: Add check for kmalloc (git-fixes).
- drm/msm/hdmi: Add missing check for alloc_ordered_workqueue (git-fixes).
- drm/msm/mdp5: Add check for kzalloc (git-fixes).
- drm/msm/mdp5: fix reading hw revision on db410c platform (git-fixes).
- drm/msm: Be more shouty if per-process pgtables are not working (git-fixes).
- drm/msm: Fix potential invalid ptr free (git-fixes).
- drm/msm: Set max segment size earlier (git-fixes).
- drm/msm: clean event_thread-&gt;worker in case of an error (git-fixes).
- drm/msm: fix NULL-deref on irq uninstall (git-fixes).
- drm/msm: fix NULL-deref on snapshot tear down (git-fixes).
- drm/msm: fix drm device leak on bind errors (git-fixes).
- drm/msm: fix missing wq allocation error handling (git-fixes).
- drm/msm: fix vram leak on bind errors (git-fixes).
- drm/msm: fix workqueue leak on bind errors (git-fixes).
- drm/msm: use strscpy instead of strncpy (git-fixes).
- drm/nouveau/devinit/tu102-: wait for GFW_BOOT_PROGRESS == COMPLETED (git-fixes).
- drm/nouveau/disp: Support more modes by checking with lower bpc (git-fixes).
- drm/nouveau/dp: check for NULL nv_connector-&gt;native_mode (git-fixes).
- drm/nouveau/kms/nv50-: remove unused functions (git-fixes).
- drm/nouveau/kms/nv50: fix nv50_wndw_new_ prototype (git-fixes).
- drm/nouveau/kms: Cache DP encoders in nouveau_connector (bsc#1206843).
- drm/nouveau/kms: Pull mst state in for all modesets (bsc#1206843).
- drm/nouveau: add nv_encoder pointer check for NULL (git-fixes).
- drm/nouveau: do not detect DSM for non-NVIDIA device (git-fixes).
- drm/omap: dsi: Fix excessive stack usage (git-fixes).
- drm/omapdrm: Remove unused struct csc_coef_rgb2yuv (git-fixes).
- drm/panel: novatek-nt35950: Improve error handling (git-fixes).
- drm/panel: novatek-nt35950: Only unregister DSI1 if it exists (git-fixes).
- drm/panel: otm8009a: Set backlight parent to panel device (git-fixes).
- drm/panel: sharp-ls043t1le01: adjust mode settings (git-fixes).
- drm/panel: simple: fix active size for Ampire AM-480272H3TMQW-T01H (git-fixes).
- drm/panfrost: Do not sync rpm suspension after mmu flushing (git-fixes).
- drm/panfrost: Fix the panfrost_mmu_map_fault_addr() error path (git-fixes).
- drm/probe-helper: Cancel previous job before starting new one (git-fixes).
- drm/radeon: Drop legacy MST support (bsc#1206843).
- drm/radeon: Fix eDP for single-display iMac11,2 (git-fixes).
- drm/radeon: fix possible division-by-zero errors (git-fixes).
- drm/radeon: fix race condition UAF in radeon_gem_set_domain_ioctl (git-fixes).
- drm/radeon: free iio for atombios when driver shutdown (git-fixes).
- drm/radeon: reintroduce radeon_dp_work_func content (git-fixes).
- drm/rockchip: Drop unbalanced obj unref (git-fixes).
- drm/rockchip: vop: Leave vblank enabled in self-refresh (git-fixes).
- drm/sched: Remove redundant check (git-fixes).
- drm/shmem-helper: Fix locking for drm_gem_shmem_get_pages_sgt() (git-fixes).
- drm/shmem-helper: Remove another errant put in error path (git-fixes).
- drm/shmem-helper: Revert accidental non-GPL export (git-fixes).
- drm/sun4i: fix missing component unbind on bind errors (git-fixes).
- drm/tegra: Avoid potential 32-bit integer overflow (git-fixes).
- drm/tegra: firewall: Check for is_addr_reg existence in IMM check (git-fixes).
- drm/tiny: ili9486: Do not assume 8-bit only SPI controllers (git-fixes).
- drm/ttm/pool: Fix ttm_pool_alloc error path (git-fixes).
- drm/ttm: Fix a NULL pointer dereference (git-fixes).
- drm/ttm: fix undefined behavior in bit shift for TTM_TT_FLAG_PRIV_POPULATED (git-fixes).
- drm/ttm: optimize pool allocations a bit v2 (git-fixes).
- drm/vc4: crtc: Increase setup cost in core clock calculation to handle extreme reduced blanking (git-fixes).
- drm/vc4: dpi: Add option for inverting pixel clock and output enable (git-fixes).
- drm/vc4: dpi: Fix format mapping for RGB565 (git-fixes).
- drm/vc4: drv: Call component_unbind_all() (git-fixes).
- drm/vc4: hdmi: Correct interlaced timings again (git-fixes).
- drm/vc4: hdmi: make CEC adapter name unique (git-fixes).
- drm/vc4: hvs: Fix colour order for xRGB1555 on HVS5 (git-fixes).
- drm/vc4: hvs: SCALER_DISPBKGND_AUTOHS is only valid on HVS4 (git-fixes).
- drm/vc4: hvs: Set AXI panic modes (git-fixes).
- drm/vc4: kms: Sort the CRTCs by output before assigning them (git-fixes).
- drm/vc4: vec: Use pm_runtime_resume_and_get() in vc4_vec_encoder_enable() (git-fixes).
- drm/vgem: add missing mutex_destroy (git-fixes).
- drm/virtio: Correct drm_gem_shmem_get_sg_table() error handling (git-fixes).
- drm/virtio: Use appropriate atomic state in virtio_gpu_plane_cleanup_fb() (git-fixes).
- drm/virtio: exbuf-&gt;fence_fd unmodified on interrupted wait (git-fixes).
- drm/vkms: Fix memory leak in vkms_init() (git-fixes).
- drm/vkms: Fix null-ptr-deref in vkms_release() (git-fixes).
- drm/vmwgfx: Do not drop the reference to the handle too soon (git-fixes).
- drm/vmwgfx: Fix memory leak in vmw_mksstat_add_ioctl() (git-fixes).
- drm/vmwgfx: Fix race issue calling pin_user_pages (git-fixes).
- drm/vmwgfx: Stop accessing buffer objects which failed init (git-fixes).
- drm/vram-helper: fix function names in vram helper doc (git-fixes).
- drm: Add orientation quirk for Lenovo ideapad D330-10IGL (git-fixes).
- drm: Fix potential null-ptr-deref due to drmm_mode_config_init() (git-fixes).
- drm: amd: display: Fix memory leakage (git-fixes).
- drm: bridge: adv7511: unregister cec i2c device after cec adapter (git-fixes).
- drm: exynos: dsi: Fix MIPI_DSI*_NO_* mode flags (git-fixes).
- drm: msm: adreno: Disable preemption on Adreno 510 (git-fixes).
- drm: mxsfb: DRM_IMX_LCDIF should depend on ARCH_MXC (git-fixes).
- drm: mxsfb: DRM_MXSFB should depend on ARCH_MXS || ARCH_MXC (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Lenovo IdeaPad Duet 3 10IGL5 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Lenovo Yoga Book X90F (git-fixes).
- drm: rcar-du: Fix a NULL vs IS_ERR() bug (git-fixes).
- drm: sun4i_tcon: use devm_clk_get_enabled in `sun4i_tcon_init_clocks` (git-fixes).
- drm: tidss: Fix pixel format definition (git-fixes).
- drm:amd:amdgpu: Fix missing buffer object unlock in failure path (git-fixes).
- dt-binding: cdns,usb3: Fix cdns,on-chip-buff-size type (git-fixes).
- dt-bindings: arm: fsl: Fix bindings for APF28Dev board (git-fixes).
- dt-bindings: arm: fsl: Fix copy-paste error in comment (git-fixes).
- dt-bindings: ata: ahci-ceva: Cover all 4 iommus entries (git-fixes).
- dt-bindings: ata: ahci-ceva: convert to yaml (git-fixes).
- dt-bindings: hwlock: sun6i: Add missing #hwlock-cells (git-fixes).
- dt-bindings: i3c: silvaco,i3c-master: fix missing schema restriction (git-fixes).
- dt-bindings: iio: adc: renesas,rcar-gyroadc: Fix adi,ad7476 compatible value (git-fixes).
- dt-bindings: iio: ti,tmp117: fix documentation link (git-fixes).
- dt-bindings: input: iqs626a: Redefine trackpad property types (git-fixes).
- dt-bindings: mailbox: qcom,apcs-kpss-global: fix SDX55 'if' match (git-fixes).
- dt-bindings: msm: dsi-controller-main: Add vdd* descriptions back in (git-fixes).
- dt-bindings: net: snps,dwmac: Fix snps,reset-delays-us dependency (git-fixes).
- dt-bindings: nvmem: qcom,spmi-sdam: fix example 'reg' property (git-fixes).
- dt-bindings: phy: brcm,brcmstb-usb-phy: Fix error in 'compatible' conditional schema (git-fixes).
- dt-bindings: power: renesas,apmu: Fix cpus property limits (git-fixes).
- dt-bindings: power: supply: pm8941-coincell: Do not require charging properties (git-fixes).
- dt-bindings: remoteproc: st,stm32-rproc: Fix phandle-array parameters description (git-fixes).
- dt-bindings: remoteproc: stm32-rproc: Typo fix (git-fixes).
- dt-bindings: serial: renesas,scif: Fix 4th IRQ for 4-IRQ SCIFs (git-fixes).
- dt-bindings: soc: qcom: smd-rpm: re-add missing qcom,rpm-msm8994 (git-fixes).
- dt-bindings: usb: amlogic,meson-g12a-usb-ctrl: make G12A usb3-phy0 optional (git-fixes).
- dt-bindings: usb: snps,dwc3: Fix 'snps,hsphy_interface' type (git-fixes).
- e1000e: Disable TSO on i219-LM card to increase speed (git-fixes).
- edac/i10nm: Add Intel Emerald Rapids server support (PED-4400).
- eeprom: at24: also select REGMAP (git-fixes).
- eeprom: idt_89hpesx: Fix error handling in idt_init() (git-fixes).
- efi/x86: libstub: Fix typo in __efi64_argmap* name (git-fixes).
- efi: Accept version 2 of memory attributes table (git-fixes).
- efi: efivars: Fix variable writes with unsupported query_variable_store() (git-fixes).
- efi: efivars: Fix variable writes without query_variable_store() (git-fixes).
- efi: fix potential NULL deref in efi_mem_reserve_persistent (git-fixes).
- efi: rt-wrapper: Add missing include (git-fixes).
- efi: ssdt: Do not free memory if ACPI table was loaded successfully (git-fixes).
- efi: sysfb_efi: Add quirk for Lenovo Yoga Book X91F/L (git-fixes).
- efi: sysfb_efi: Fix DMI quirks not working for simpledrm (git-fixes).
- elevator: update the document of elevator_switch (git-fixes).
- elf: correct note name comment (git-fixes).
- ethernet: 3com/typhoon: do not write directly to netdev-&gt;dev_addr (git-fixes).
- ethernet: 8390/etherh: do not write directly to netdev-&gt;dev_addr (git-fixes).
- ethernet: i825xx: do not write directly to netdev-&gt;dev_addr (git-fixes).
- ethernet: ice: avoid gcc-9 integer overflow warning (jsc#PED-376).
- ethernet: seeq/ether3: do not write directly to netdev-&gt;dev_addr (git-fixes).
- ethernet: tundra: do not write directly to netdev-&gt;dev_addr (git-fixes).
- exit: Add and use make_task_dead (bsc#1207328).
- exit: Allow oops_limit to be disabled (bsc#1207328).
- exit: Guarantee make_task_dead leaks the tsk when calling do_task_exit (bsc#1207328).
- exit: Move force_uaccess back into do_exit (bsc#1207328).
- exit: Move oops specific logic from do_exit into make_task_dead (bsc#1207328).
- exit: Put an upper limit on how often we can oops (bsc#1207328).
- exit: Stop poorly open coding do_task_dead in make_task_dead (bsc#1207328).
- exit: Use READ_ONCE() for all oops/warn limit reads (bsc#1207328).
- ext4,f2fs: fix readahead of verity data (bsc#1207648).
- ext4: Fix deadlock during directory rename (bsc#1210763).
- ext4: Fix possible corruption when moving a directory (bsc#1210763).
- ext4: Fix reusing stale buffer heads from last failed mounting (bsc#1213020).
- ext4: add EA_INODE checking to ext4_iget() (bsc#1213106).
- ext4: add EXT4_IGET_BAD flag to prevent unexpected bad inode (bsc#1207619).
- ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h (bsc#1206878).
- ext4: add ext4_sb_block_valid() refactored out of ext4_inode_block_valid() (bsc#1213088).
- ext4: add helper to check quota inums (bsc#1207618).
- ext4: add inode table check in __ext4_get_inode_loc to aovid possible infinite loop (bsc#1207617).
- ext4: add lockdep annotations for i_data_sem for ea_inode's (bsc#1213109).
- ext4: add missing validation of fast-commit record lengths (bsc#1207626).
- ext4: add strict range checks while freeing blocks (bsc#1213089).
- ext4: allocate extended attribute value in vmalloc area (bsc#1207635).
- ext4: avoid crash when inline data creation follows DIO write (bsc#1206883).
- ext4: avoid deadlock in fs reclaim with page writeback (bsc#1213016).
- ext4: avoid resizing to a partial cluster size (bsc#1206880).
- ext4: avoid unaccounted block allocation when expanding inode (bsc#1207634).
- ext4: bail out of ext4_xattr_ibody_get() fails for any reason (bsc#1213018).
- ext4: block range must be validated before use in ext4_mb_clear_bb() (bsc#1213090).
- ext4: check iomap type only if ext4_iomap_begin() does not fail (bsc#1213103).
- ext4: continue to expand file system when the target size does not reach (bsc#1206882).
- ext4: correct cluster len and clusters changed accounting in ext4_mb_mark_bb (bsc#1207592).
- ext4: correct max_inline_xattr_value_size computing (bsc#1206878).
- ext4: correct the misjudgment in ext4_iget_extra_inode (bsc#1206878).
- ext4: disable fast-commit of encrypted dir operations (bsc#1207623).
- ext4: disallow ea_inodes with extended attributes (bsc#1213108).
- ext4: do not allow journal inode to have encrypt flag (bsc#1207621).
- ext4: do not increase iversion counter for ea_inodes (bsc#1207605).
- ext4: do not run ext4lazyinit for read-only filesystems (bsc#1207603).
- ext4: do not set up encryption key during jbd2 transaction (bsc#1207624).
- ext4: drop ineligible txn start stop APIs (bsc#1207588).
- ext4: ext4_read_bh_lock() should submit IO if the buffer isn't uptodate (bsc#1207606).
- ext4: factor out ext4_fc_get_tl() (bsc#1207615).
- ext4: fail ext4_iget if special inode unallocated (bsc#1213010).
- ext4: fast commit may miss file actions (bsc#1207591).
- ext4: fast commit may not fallback for ineligible commit (bsc#1207590).
- ext4: fix BUG_ON() when directory entry has invalid rec_len (bsc#1206886).
- ext4: fix RENAME_WHITEOUT handling for inline directories (bsc#1210766).
- ext4: fix WARNING in ext4_update_inline_data (bsc#1213012).
- ext4: fix WARNING in mb_find_extent (bsc#1213099).
- ext4: fix another off-by-one fsmap error on 1k block filesystems (bsc#1210767).
- ext4: fix bad checksum after online resize (bsc#1210762 bsc#1208076).
- ext4: fix bug in extents parsing when eh_entries == 0 and eh_depth &gt; 0 (bsc#1206881).
- ext4: fix bug_on in __es_tree_search caused by bad boot loader inode (bsc#1207620).
- ext4: fix bug_on in __es_tree_search caused by bad quota inode (bsc#1213111).
- ext4: fix bug_on in start_this_handle during umount filesystem (bsc#1207594).
- ext4: fix cgroup writeback accounting with fs-layer encryption (bsc#1210765).
- ext4: fix corruption when online resizing a 1K bigalloc fs (bsc#1206891).
- ext4: fix data races when using cached status extents (bsc#1213102).
- ext4: fix deadlock due to mbcache entry corruption (bsc#1207653).
- ext4: fix deadlock when converting an inline directory in nojournal mode (bsc#1213105).
- ext4: fix delayed allocation bug in ext4_clu_mapped for bigalloc + inline (bsc#1207631).
- ext4: fix dir corruption when ext4_dx_add_entry() fails (bsc#1207608).
- ext4: fix error code return to user-space in ext4_get_branch() (bsc#1207630).
- ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit (bsc#1207593).
- ext4: fix extent status tree race in writeback error recovery path (bsc#1206877).
- ext4: fix i_disksize exceeding i_size problem in paritally written case (bsc#1213015).
- ext4: fix incorrect options show of original mount_opt and extend mount_opt2 (bsc#1210764).
- ext4: fix inode leak in ext4_xattr_inode_create() on an error path (bsc#1207636).
- ext4: fix kernel BUG in 'ext4_write_inline_data_end()' (bsc#1206894).
- ext4: fix leaking uninitialized memory in fast-commit journal (bsc#1207625).
- ext4: fix lockdep warning when enabling MMP (bsc#1213100).
- ext4: fix miss release buffer head in ext4_fc_write_inode (bsc#1207609).
- ext4: fix null-ptr-deref in ext4_write_info (bsc#1206884).
- ext4: fix off-by-one errors in fast-commit block filling (bsc#1207628).
- ext4: fix possible double unlock when moving a directory (bsc#1210763).
- ext4: fix potential memory leak in ext4_fc_record_modified_inode() (bsc#1207611).
- ext4: fix potential memory leak in ext4_fc_record_regions() (bsc#1207612).
- ext4: fix potential out of bound read in ext4_fc_replay_scan() (bsc#1207616).
- ext4: fix reserved cluster accounting in __es_remove_extent() (bsc#1207637).
- ext4: fix task hung in ext4_xattr_delete_inode (bsc#1213096).
- ext4: fix to check return value of freeze_bdev() in ext4_shutdown() (bsc#1213021).
- ext4: fix unaligned memory access in ext4_fc_reserve_space() (bsc#1207627).
- ext4: fix undefined behavior in bit shift for ext4_check_flag_values (bsc#1206890).
- ext4: fix uninititialized value in 'ext4_evict_inode' (bsc#1206893).
- ext4: fix use-after-free in ext4_ext_shift_extents (bsc#1206888).
- ext4: fix use-after-free in ext4_orphan_cleanup (bsc#1207622).
- ext4: fix use-after-free in ext4_xattr_set_entry (bsc#1206878).
- ext4: fix use-after-free read in ext4_find_extent for bigalloc + inline (bsc#1213098).
- ext4: fix warning in 'ext4_da_release_space' (bsc#1206887).
- ext4: goto right label 'failed_mount3a' (bsc#1207610).
- ext4: improve error handling from ext4_dirhash() (bsc#1213104).
- ext4: improve error recovery code paths in __ext4_remount() (bsc#1213017).
- ext4: init quota for 'old.inode' in 'ext4_rename' (bsc#1207629).
- ext4: initialize quota before expanding inode in setproject ioctl (bsc#1207633).
- ext4: introduce EXT4_FC_TAG_BASE_LEN helper (bsc#1207614).
- ext4: limit the number of retries after discarding preallocations blocks (bsc#1207602).
- ext4: make ext4_lazyinit_thread freezable (bsc#1206885).
- ext4: move where set the MAY_INLINE_DATA flag is set (bsc#1213011).
- ext4: only update i_reserved_data_blocks on successful block allocation (bsc#1213019).
- ext4: place buffer head allocation before handle start (bsc#1207607).
- ext4: refactor ext4_free_blocks() to pull out ext4_mb_clear_bb() (bsc#1213087).
- ext4: refuse to create ea block when umounted (bsc#1213093).
- ext4: set lockdep subclass for the ea_inode in ext4_xattr_inode_cache_find() (bsc#1213107).
- ext4: silence the warning when evicting inode with dioread_nolock (bsc#1206889).
- ext4: simplify updating of fast commit stats (bsc#1207589).
- ext4: turn quotas off if mount failed after enabling quotas (bsc#1213110).
- ext4: unconditionally enable the i_version counter (bsc#1211299).
- ext4: update 'state-&gt;fc_regions_size' after successful memory allocation (bsc#1207613).
- ext4: update s_journal_inum if it changes after journal replay (bsc#1213094).
- ext4: update s_overhead_clusters in the superblock during an on-line resize (bsc#1206876).
- ext4: use ext4_fc_tl_mem in fast-commit replay path (bsc#1213092).
- ext4: use ext4_journal_start/stop for fast commit transactions (bsc#1210793).
- ext4: zero i_disksize when initializing the bootloader inode (bsc#1213013).
- extcon: Fix kernel doc of property capability fields to avoid warnings (git-fixes).
- extcon: Fix kernel doc of property fields to avoid warnings (git-fixes).
- extcon: usbc-tusb320: Add USB TYPE-C support (git-fixes).
- extcon: usbc-tusb320: Call the Type-C IRQ handler only if a port is registered (git-fixes).
- extcon: usbc-tusb320: Unregister typec port on driver removal (git-fixes).
- extcon: usbc-tusb320: Update state on probe even if no IRQ pending (git-fixes).
- extcon: usbc-tusb320: fix kernel-doc warning (git-fixes).
- f2fs: Fix f2fs_truncate_partial_nodes ftrace event (git-fixes).
- fbcon: Check font dimension limits (git-fixes).
- fbcon: Fix error paths in set_con2fb_map (git-fixes).
- fbcon: Fix null-ptr-deref in soft_cursor (git-fixes).
- fbcon: set_con2fb_map needs to set con2fb_map! (git-fixes).
- fbdev: Prevent possible use-after-free in fb_release() (bsc#1152472).
- fbdev: arcfb: Fix error handling in arcfb_probe() (git-fixes).
- fbdev: au1200fb: Fix potential divide by zero (git-fixes).
- fbdev: ep93xx-fb: Add missing clk_disable_unprepare in ep93xxfb_probe() (git-fixes).
- fbdev: fbcon: Destroy mutex on freeing struct fb_info (bsc#1152489)
- fbdev: imsttfb: Fix use after free bug in imsttfb_probe (git-fixes bsc#1211387).
- fbdev: intelfb: Fix potential divide by zero (git-fixes).
- fbdev: lxfb: Fix potential divide by zero (git-fixes).
- fbdev: mmp: Fix deferred clk handling in mmphw_probe() (git-fixes).
- fbdev: modedb: Add 1920x1080 at 60 Hz video mode (git-fixes).
- fbdev: nvidia: Fix potential divide by zero (git-fixes).
- fbdev: omapfb: avoid stack overflow warning (git-fixes).
- fbdev: omapfb: cleanup inconsistent indentation (git-fixes).
- fbdev: omapfb: lcd_mipid: Fix an error handling path in mipid_spi_probe() (git-fixes).
- fbdev: smscufx: fix error handling code in ufx_usb_probe (git-fixes).
- fbdev: stifb: Fall back to cfb_fillrect() on 32-bit HCRX cards (git-fixes).
- fbdev: stifb: Fix info entry in sti_struct on error path (git-fixes).
- fbdev: stifb: Provide valid pixelclock and add fb_check_var() checks (git-fixes).
- fbdev: tgafb: Fix potential divide by zero (git-fixes).
- fbdev: udlfb: Fix endpoint check (git-fixes).
- fbmem: Reject FB_ACTIVATE_KD_TEXT from userspace (git-fixes).
- filelock: new helper: vfs_inode_has_locks (jsc#SES-1880).
- firewire: fix memory leak for payload of request subaction to IEC 61883-1 FCP region (git-fixes).
- firmware/efi sysfb_efi: Add quirk for Lenovo IdeaPad Duet 3 (git-fixes).
- firmware: arm_ffa: Check if ffa_driver remove is present before executing (git-fixes).
- firmware: arm_ffa: Set handle field to zero in memory descriptor (git-fixes).
- firmware: arm_ffa: Set reserved/MBZ fields to zero in the memory descriptors (git-fixes).
- firmware: arm_scmi: Fix device node validation for mailbox transport (git-fixes).
- firmware: coreboot: Remove GOOGLE_COREBOOT_TABLE_ACPI/OF Kconfig entries (git-fixes).
- firmware: coreboot: framebuffer: Ignore reserved pixel color bits (git-fixes).
- firmware: dmi-sysfs: Fix null-ptr-deref in dmi_sysfs_register_handle (git-fixes).
- firmware: qcom_scm: Clear download bit during reboot (git-fixes).
- firmware: stratix10-svc: Fix a potential resource leak in svc_create_memory_pool() (git-fixes).
- firmware: stratix10-svc: Fix an NULL vs IS_ERR() bug in probe (git-fixes).
- firmware: stratix10-svc: add missing gen_pool_destroy() in stratix10_svc_drv_probe() (git-fixes).
- firmware: xilinx: do not make a sleepable memory allocation from an atomic context (git-fixes).
- flow_dissector: Do not count vlan tags inside tunnel payload (git-fixes).
- fork: allow CLONE_NEWTIME in clone3 flags (bsc#1209258).
- fotg210-udc: Add missing completion handler (git-fixes).
- fpga: bridge: fix kernel-doc parameter description (git-fixes).
- fpga: bridge: properly initialize bridge device before populating children (git-fixes).
- fpga: m10bmc-sec: Fix probe rollback (git-fixes).
- fpga: stratix10-soc: Fix return value check in s10_ops_write_init() (git-fixes).
- fprobe: Check rethook_alloc() return in rethook initialization (git-fixes).
- fprobe: Fix smatch type mismatch warning (git-fixes).
- fprobe: add recursion detection in fprobe_exit_handler (git-fixes).
- fprobe: make fprobe_kprobe_handler recursion free (git-fixes).
- fs/jfs: fix shift exponent db_agl2size negative (git-fixes).
- fs: account for filesystem mappings (bsc#1205191).
- fs: account for group membership (bsc#1205191).
- fs: add i_user_ns() helper (bsc#1205191).
- fs: dlm: do not call kernel_getpeername() in error_report() (bsc#1208130).
- fs: dlm: use sk-&gt;sk_socket instead of con-&gt;sock (bsc#1208130).
- fs: ext4: initialize fsdata in pagecache_write() (bsc#1207632).
- fs: hfsplus: fix UAF issue in hfsplus_put_super (git-fixes).
- fs: jfs: fix possible NULL pointer dereference in dbFree() (git-fixes).
- fs: jfs: fix shift-out-of-bounds in dbAllocAG (git-fixes).
- fs: jfs: fix shift-out-of-bounds in dbDiscardAG (git-fixes).
- fs: move mapping helpers (bsc#1205191)
- fs: remove __sync_filesystem (git-fixes).
- fs: sysv: Fix sysv_nblocks() returns wrong value (git-fixes).
- fs: tweak fsuidgid_has_mapping() (bsc#1205191).
- fscache: Use wait_on_bit() to wait for the freeing of relinquished volume (bsc#1210409).
- fscache_cookie_enabled: check cookie is valid before accessing it (bsc#1208429).
- ftrace/x86: Add back ftrace_expected for ftrace bug reports (git-fixes).
- ftrace: Clean comments related to FTRACE_OPS_FL_PER_CPU (git-fixes).
- ftrace: Fix invalid address access in lookup_rec() when index is 0 (git-fixes).
- ftrace: Fix issue that 'direct-&gt;addr' not restored in modify_ftrace_direct() (git-fixes).
- ftrace: Mark get_lock_parent_ip() __always_inline (git-fixes).
- fuse: add inode/permission checks to fileattr_get/fileattr_set (bsc#1208759).
- fuse: always revalidate rename target dentry (bsc#1211808).
- fuse: fix attr version comparison in fuse_read_update_size() (bsc#1211807).
- futex: Resend potentially swallowed owner death notification (git-fixes).
- genirq: Provide new interfaces for affinity hints (bsc#1208153).
- git-sort: Add io_uring 6.3 fixes remote
- google/gve:fix repeated words in comments (bsc#1211519).
- gpio: GPIO_REGMAP: select REGMAP instead of depending on it (git-fixes).
- gpio: davinci: Add irq chip flag to skip set wake (git-fixes).
- gpio: mockup: Fix mode of debugfs files (git-fixes).
- gpio: tegra186: remove unneeded loop in tegra186_gpio_init_route_mapping() (git-fixes).
- gpio: vf610: connect GPIO label to dev name (git-fixes).
- gpu: host1x: Do not skip assigning syncpoints to channels (git-fixes).
- gpu: host1x: Fix mask for syncpoint increment register (git-fixes).
- gpu: host1x: Fix potential double free if IOMMU is disabled (git-fixes).
- gpu: ipu-v3: common: Add of_node_put() for reference returned by of_graph_get_port_by_id() (git-fixes).
- gve: Adding a new AdminQ command to verify driver (bsc#1211519).
- gve: Cache link_speed value from device (git-fixes).
- gve: Fix error return code in gve_prefill_rx_pages() (bsc#1211519).
- gve: Fix spelling mistake 'droping' -&gt; 'dropping' (bsc#1211519).
- gve: Handle alternate miss completions (bsc#1211519).
- gve: Reduce alloc and copy costs in the GQ rx path (bsc#1211519).
- gve: Remove the code of clearing PBA bit (git-fixes).
- gve: Secure enough bytes in the first TX desc for all TCP pkts (git-fixes).
- gve: enhance no queue page list detection (bsc#1211519).
- hfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling (git-fixes).
- hfs/hfsplus: use WARN_ON for sanity check (git-fixes).
- hfs: Fix OOB Write in hfs_asc2mac (git-fixes).
- hfs: fix OOB Read in __hfs_brec_find (git-fixes).
- hfs: fix missing hfs_bnode_get() in __hfs_bnode_create (git-fixes).
- hfsplus: fix bug causing custom uid and gid being unable to be assigned with mount (git-fixes).
- hid: Add Mapping for System Microphone Mute (git-fixes).
- hid: asus: use spinlock to protect concurrent accesses (git-fixes).
- hid: asus: use spinlock to safely schedule workers (git-fixes).
- hid: bigben: use spinlock to protect concurrent accesses (git-fixes).
- hid: bigben: use spinlock to safely schedule workers (git-fixes).
- hid: bigben_probe(): validate report count (git-fixes).
- hid: bigben_worker() remove unneeded check on report_field (git-fixes).
- hid: core: Fix deadloop in hid_apply_multiplier (git-fixes).
- hid: cp2112: Fix driver not registering GPIO IRQ chip as threaded (git-fixes).
- hid: elecom: add support for TrackBall 056E:011C (git-fixes).
- hid: google: add jewel USB id (git-fixes).
- hid: intel-ish-hid: ipc: Fix potential use-after-free in work function (git-fixes).
- hid: logitech-hidpp: Do not restart communication if not necessary (git-fixes).
- hid: logitech-hidpp: Do not use the USB serial for USB devices (git-fixes).
- hid: logitech-hidpp: Reconcile USB and Unifying serials (git-fixes).
- hid: logitech-hidpp: add HIDPP_QUIRK_DELAYED_INIT for the T651 (git-fixes).
- hid: microsoft: Add rumble support to latest xbox controllers (bsc#1211280).
- hid: multitouch: Add quirks for flipped axes (git-fixes).
- hid: playstation: sanity check DualSense calibration data (git-fixes).
- hid: retain initial quirks set up when creating HID devices (git-fixes).
- hid: wacom: Add error check to wacom_parse_and_register() (git-fixes).
- hid: wacom: Add new Intuos Pro Small (PTH-460) device IDs (git-fixes).
- hid: wacom: Force pen out of prox if no events have been received in a while (git-fixes).
- hid: wacom: Set a default resolution for older tablets (git-fixes).
- hid: wacom: add three styli to wacom_intuos_get_tool_type (git-fixes).
- hid: wacom: avoid integer overflow in wacom_intuos_inout() (git-fixes).
- hid: wacom: generic: Set battery quirk only when we see battery data (git-fixes).
- hv: fix comment typo in vmbus_channel/low_latency (git-fixes).
- hv: hv_balloon: fix memory leak with using debugfs_lookup() (git-fixes).
- hv_netvsc: Allocate memory in netvsc_dma_map() with GFP_ATOMIC (git-fixes).
- hv_netvsc: Check status in SEND_RNDIS_PKT completion message (git-fixes).
- hv_netvsc: Fix missed pagebuf entries in netvsc_dma_map/unmap() (git-fixes).
- hvcs: Fix hvcs port reference counting (bsc#1213134 ltc#202861).
- hvcs: Get reference to tty in remove (bsc#1213134 ltc#202861).
- hvcs: Synchronize hotplug remove with port free (bsc#1213134 ltc#202861).
- hvcs: Use dev_groups to manage hvcs device attributes (bsc#1213134 ltc#202861).
- hvcs: Use driver groups to manage driver attributes (bsc#1213134 ltc#202861).
- hvcs: Use vhangup in hotplug remove (bsc#1213134 ltc#202861).
- hwmon: (adm1266) Set `can_sleep` flag for GPIO chip (git-fixes).
- hwmon: (adt7475) Display smoothing attributes in correct order (git-fixes).
- hwmon: (adt7475) Fix masking of hysteresis registers (git-fixes).
- hwmon: (adt7475) Use device_property APIs when configuring polarity (git-fixes).
- hwmon: (coretemp) Simplify platform device handling (git-fixes).
- hwmon: (ftsteutates) Fix scaling of measurements (git-fixes).
- hwmon: (gsc-hwmon) fix fan pwm temperature scaling (git-fixes).
- hwmon: (ina3221) return prober error code (git-fixes).
- hwmon: (k10temp) Check range scale when CUR_TEMP register is read-write (git-fixes).
- hwmon: (k10temp): Add support for new family 17h and 19h models (bsc#1208848).
- hwmon: (ltc2945) Handle error case in ltc2945_value_store (git-fixes).
- hwmon: (ltc2992) Set `can_sleep` flag for GPIO chip (git-fixes).
- hwmon: (mlxreg-fan) Return zero speed for broken fan (git-fixes).
- hwmon: (pmbus/fsp-3y) Fix functionality bitmask in FSP-3Y YM-2151E (git-fixes).
- hwmon: (ucd90320) Add minimum delay between bus accesses (git-fixes).
- hwmon: (xgene) Fix use after free bug in xgene_hwmon_remove due to race condition (git-fixes).
- hwmon: fix potential sensor registration fail if of_node is missing (git-fixes).
- hwmon: tmp512: drop of_match_ptr for ID table (git-fixes).
- hwrng: imx-rngc - fix the timeout for init and self check (git-fixes).
- hwrng: st - keep clock enabled while hwrng is registered (git-fixes).
- i2c: cadence: cdns_i2c_master_xfer(): Fix runtime PM leak on error path (git-fixes).
- i2c: designware-pci: Add new PCI IDs for AMD NAVI GPU (git-fixes).
- i2c: designware: fix i2c_dw_clk_rate() return size to be u32 (git-fixes).
- i2c: hisi: Avoid redundant interrupts (git-fixes).
- i2c: hisi: Only use the completion interrupt to finish the transfer (git-fixes).
- i2c: imx-lpi2c: check only for enabled interrupt flags (git-fixes).
- i2c: imx-lpi2c: clean rx/tx buffers upon new message (git-fixes).
- i2c: imx-lpi2c: fix type char overflow issue when calculating the clock cycle (git-fixes).
- i2c: mv64xxx: Add atomic_xfer method to driver (git-fixes).
- i2c: mv64xxx: Fix reading invalid status value in atomic mode (git-fixes).
- i2c: mv64xxx: Remove shutdown method from driver (git-fixes).
- i2c: mxs: suppress probe-deferral error message (git-fixes).
- i2c: ocores: generate stop condition after timeout in polling mode (git-fixes).
- i2c: omap: Fix standard mode false ACK readings (git-fixes).
- i2c: qup: Add missing unwind goto in qup_i2c_probe() (git-fixes).
- i2c: rk3x: fix a bunch of kernel-doc warnings (git-fixes).
- i2c: sprd: Delete i2c adapter in .remove's error path (git-fixes).
- i2c: tegra: Fix PEC support for SMBUS block read (git-fixes).
- i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer() (git-fixes).
- i40e: Add checking for null for nlmsg_find_attr() (jsc#SLE-18378).
- i40e: Fix ADQ rate limiting for PF (jsc#SLE-18378).
- i40e: Fix DMA mappings leak (jsc#SLE-18378).
- i40e: Fix VF hang when reset is triggered on another VF (jsc#SLE-18378).
- i40e: Fix VF set max MTU size (jsc#SLE-18378).
- i40e: Fix VF's MAC Address change on VM (jsc#SLE-18378).
- i40e: Fix adding ADQ filter to TC0 (jsc#SLE-18378).
- i40e: Fix calculating the number of queue pairs (jsc#SLE-18378).
- i40e: Fix erroneous adapter reinitialization during recovery process (jsc#SLE-18378).
- i40e: Fix ethtool rx-flow-hash setting for X722 (jsc#SLE-18378).
- i40e: Fix flow-type by setting GL_HASH_INSET registers (jsc#SLE-18378).
- i40e: Fix for VF MAC address 0 (jsc#SLE-18378).
- i40e: Fix incorrect address type for IPv6 flow rules (jsc#SLE-18378).
- i40e: Fix interface init with MSI interrupts (no MSI-X) (jsc#SLE-18378).
- i40e: Fix kernel crash during module removal (jsc#SLE-18378).
- i40e: Fix kernel crash during reboot when adapter is in recovery mode (jsc#SLE-18378).
- i40e: Fix set max_tx_rate when it is lower than 1 Mbps (jsc#SLE-18378).
- i40e: Fix the inability to attach XDP program on downed interface (jsc#SLE-18378).
- i40e: Refactor tc mqprio checks (jsc#SLE-18378).
- i40e: add double of VLAN header when computing the max MTU (jsc#SLE-18378).
- i40e: fix accessing vsi-&gt;active_filters without holding lock (jsc#SLE-18378).
- i40e: fix flow director packet filter programming (jsc#SLE-18378).
- i40e: fix i40e_setup_misc_vector() error handling (jsc#SLE-18378).
- i40e: fix registers dump after run ethtool adapter self test (jsc#SLE-18378).
- i825xx: sni_82596: use eth_hw_addr_set() (git-fixes).
- i915 kABI workaround (git-fixes).
- i915/perf: Replace DRM_DEBUG with driver specific drm_dbg call (git-fixes).
- iavf/iavf_main: actually log -&gt;src mask when talking about it (jsc#SLE-18385).
- iavf: Detach device during reset task (jsc#SLE-18385).
- iavf: Disallow changing rx/tx-frames and rx/tx-frames-irq (jsc#SLE-18385).
- iavf: Do not restart Tx queues after reset task failure (jsc#SLE-18385).
- iavf: Fix 'tc qdisc show' listing too many queues (jsc#SLE-18385).
- iavf: Fix a crash during reset task (jsc#SLE-18385).
- iavf: Fix bad page state (jsc#SLE-18385).
- iavf: Fix cached head and tail value for iavf_get_tx_pending (jsc#SLE-18385).
- iavf: Fix error handling in iavf_init_module() (jsc#SLE-18385).
- iavf: Fix max_rate limiting (jsc#SLE-18385).
- iavf: Fix race condition between iavf_shutdown and iavf_remove (jsc#SLE-18385).
- iavf: Fix set max MTU size with port VLAN and jumbo frames (jsc#SLE-18385).
- iavf: do not track VLAN 0 filters (jsc#PED-835).
- iavf: fix hang on reboot with ice (jsc#SLE-18385).
- iavf: fix inverted Rx hash condition leading to disabled hash (jsc#SLE-18385).
- iavf: fix non-tunneled IPv6 UDP packet type and hashing (jsc#SLE-18385).
- iavf: fix temporary deadlock and failure to set MAC address (jsc#PED-835).
- iavf: refactor VLAN filter states (jsc#PED-835).
- iavf: remove active_cvlans and active_svlans bitmaps (jsc#PED-835).
- iavf: remove mask from iavf_irq_enable_queues() (git-fixes).
- iavf: schedule watchdog immediately when changing primary MAC (jsc#PED-835).
- ib/hfi1: Assign npages earlier (git-fixes)
- ib/hfi1: Fix SDMA mmu_rb_node not being evicted in LRU order (git-fixes)
- ib/hfi1: Fix bugs with non-PAGE_SIZE-end multi-iovec user SDMA requests (git-fixes)
- ib/hfi1: Fix expected receive setup error exit issues (git-fixes)
- ib/hfi1: Fix math bugs in hfi1_can_pin_pages() (git-fixes)
- ib/hfi1: Fix sdma.h tx-&gt;num_descs off-by-one errors (git-fixes)
- ib/hfi1: Fix wrong mmu_node used for user SDMA packet after invalidate (git-fixes)
- ib/hfi1: Immediately remove invalid memory from hardware (git-fixes)
- ib/hfi1: Reject a zero-length user expected buffer (git-fixes)
- ib/hfi1: Remove user expected buffer invalidate race (git-fixes)
- ib/hfi1: Reserve user expected TIDs (git-fixes)
- ib/hfi1: Restore allocated resources on failed copyout (git-fixes)
- ib/hfi1: Update RMT size calculation (git-fixes)
- ib/hifi1: add a null check of kzalloc_node in hfi1_ipoib_txreq_init (git-fixes)
- ib/iPoIB: Fix legacy IPoIB due to wrong number of queues (git-fixes)
- ib/isert: Fix dead lock in ib_isert (git-fixes)
- ib/isert: Fix incorrect release of isert connection (git-fixes)
- ib/isert: Fix possible list corruption in CMA handler (git-fixes)
- ib/mad: Do not call to function that might sleep while in atomic context (git-fixes).
- ib/mlx5: Add support for 400G_8X lane speed (git-fixes)
- ib/rdmavt: add missing locks in rvt_ruc_loopback (git-fixes)
- ib/uverbs: Fix to consider event queue closing also upon non-blocking mode (git-fixes)
- ibmvnic: Do not reset dql stats on NON_FATAL err (bsc#1212603 ltc#202604).
- ice, xsk: Diversify return values from xsk_wakeup call paths (git-fixes).
- ice: Add check for kzalloc (jsc#PED-376).
- ice: Do not double unplug aux on peer initiated reset (git-fixes).
- ice: Do not use WQ_MEM_RECLAIM flag for workqueue (git-fixes).
- ice: Do not use WQ_MEM_RECLAIM flag for workqueue (jsc#PED-376).
- ice: Fix DSCP PFC TLV creation (git-fixes).
- ice: Fix DSCP PFC TLV creation (jsc#PED-376).
- ice: Fix XDP memory leak when NIC is brought up and down (git-fixes).
- ice: Fix disabling Rx VLAN filtering with port VLAN enabled (jsc#PED-376).
- ice: Fix ice VF reset during iavf initialization (jsc#PED-376).
- ice: Fix ice_cfg_rdma_fltr() to only update relevant fields (jsc#PED-376).
- ice: Fix ice_xdp_xmit() when XDP TX queue number is not sufficient (git-fixes).
- ice: Fix interrupt moderation settings getting cleared (jsc#SLE-18375).
- ice: Fix memory corruption in VF driver (git-fixes).
- ice: Fix potential memory leak in ice_gnss_tty_write() (jsc#PED-376).
- ice: Ignore EEXIST when setting promisc mode (git-fixes).
- ice: Prevent set_channel from changing queues while RDMA active (git-fixes).
- ice: Prevent set_channel from changing queues while RDMA active (jsc#PED-376).
- ice: Reset FDIR counter in FDIR init stage (git-fixes).
- ice: Reset FDIR counter in FDIR init stage (jsc#PED-376).
- ice: Set txq_teid to ICE_INVAL_TEID on ring creation (jsc#SLE-18375).
- ice: add profile conflict check for AVF FDIR (git-fixes).
- ice: add profile conflict check for AVF FDIR (jsc#PED-376).
- ice: avoid bonding causing auxiliary plug/unplug under RTNL lock (bsc#1210158).
- ice: block LAN in case of VF to VF offload (git-fixes).
- ice: block LAN in case of VF to VF offload (jsc#PED-376).
- ice: check if VF exists before mode check (jsc#PED-376).
- ice: config netdev tc before setting queues number (git-fixes).
- ice: copy last block omitted in ice_get_module_eeprom() (git-fixes).
- ice: copy last block omitted in ice_get_module_eeprom() (jsc#PED-376).
- ice: ethtool: Prohibit improper channel config for DCB (git-fixes).
- ice: ethtool: advertise 1000M speeds properly (git-fixes).
- ice: fix invalid check for empty list in ice_sched_assoc_vsi_to_agg() (git-fixes).
- ice: fix invalid check for empty list in ice_sched_assoc_vsi_to_agg() (jsc#PED-376).
- ice: fix lost multicast packets in promisc mode (jsc#PED-376).
- ice: fix wrong fallback logic for FDIR (git-fixes).
- ice: fix wrong fallback logic for FDIR (jsc#PED-376).
- ice: handle E822 generic device ID in PLDM header (git-fixes).
- ice: move devlink port creation/deletion (jsc#PED-376).
- ice: switch: fix potential memleak in ice_add_adv_recipe() (git-fixes).
- ice: switch: fix potential memleak in ice_add_adv_recipe() (jsc#PED-376).
- ice: use bitmap_free instead of devm_kfree (git-fixes).
- ice: xsk: Fix cleaning of XDP_TX frames (jsc#PED-376).
- ice: xsk: disable txq irq before flushing hw (jsc#PED-376).
- ice: xsk: do not use xdp_return_frame() on tx_buf-&gt;raw_buf (jsc#PED-376).
- ice: xsk: use Rx ring's XDP ring when picking NAPI context (git-fixes).
- ieee80211: add TWT element definitions (bsc#1209980).
- ieee802154: hwsim: Fix possible memory leaks (git-fixes).
- ifcvf/vDPA: fix misuse virtio-net device config size for blk dev (jsc#SLE-19253).
- igb: Add lock to avoid data race (jsc#SLE-18379).
- igb: Enable SR-IOV after reinit (jsc#SLE-18379).
- igb: Fix PPS input and output using 3rd and 4th SDP (jsc#PED-370).
- igb: Fix extts capture value format for 82580/i354/i350 (git-fixes).
- igb: Initialize mailbox message for VF reset (jsc#SLE-18379).
- igb: conditionalize I2C bit banging on external thermal sensor support (jsc#SLE-18379).
- igb: fix bit_shift to be in [1..8] range (git-fixes).
- igb: fix nvm.ops.read() error handling (git-fixes).
- igb: revert rtnl_lock() that causes deadlock (jsc#SLE-18379).
- igbvf: Regard vf reset nack as success (jsc#SLE-18379).
- igc: Add checking for basetime less than zero (jsc#SLE-18377).
- igc: Add ndo_tx_timeout support (jsc#SLE-18377).
- igc: Clean the TX buffer and TX descriptor ring (git-fixes).
- igc: Enhance Qbv scheduling by using first flag bit (jsc#SLE-18377).
- igc: Fix PPS delta between two synchronized end-points (jsc#SLE-18377).
- igc: Fix possible system crash when loading module (git-fixes).
- igc: Lift TAPRIO schedule restriction (jsc#SLE-18377).
- igc: Reinstate IGC_REMOVED logic and implement it properly (jsc#SLE-18377).
- igc: Set Qbv start_time and end_time to end_time if not being configured in GCL (jsc#SLE-18377).
- igc: Use strict cycles for Qbv scheduling (jsc#SLE-18377).
- igc: allow BaseTime 0 enrollment for Qbv (jsc#SLE-18377).
- igc: fix the validation logic for taprio's gate list (jsc#SLE-18377).
- igc: read before write to SRRCTL register (jsc#SLE-18377).
- igc: recalculate Qbv end_time by considering cycle time (jsc#SLE-18377).
- igc: return an error if the mac type is unknown in igc_ptp_systim_to_hwtstamp() (jsc#SLE-18377).
- iio: accel: fxls8962af: errata bug only applicable for FXLS8962AF (git-fixes).
- iio: accel: fxls8962af: fixup buffer scan element type (git-fixes).
- iio: accel: mma9551_core: Prevent uninitialized variable in mma9551_read_config_word() (git-fixes).
- iio: accel: mma9551_core: Prevent uninitialized variable in mma9551_read_status_word() (git-fixes).
- iio: accel: st_accel: Fix invalid mount_matrix on devices without ACPI _ONT method (git-fixes).
- iio: adc: ad7192: Change 'shorted' channels to differential (git-fixes).
- iio: adc: ad7192: Fix internal/external clock selection (git-fixes).
- iio: adc: ad7192: Fix null ad7192_state pointer access (git-fixes).
- iio: adc: ad7791: fix IRQ flags (git-fixes).
- iio: adc: ad_sigma_delta: Fix IRQ issue by setting IRQ_DISABLE_UNLAZY flag (git-fixes).
- iio: adc: at91-sama5d2_adc: fix an error code in at91_adc_allocate_trigger() (git-fixes).
- iio: adc: berlin2-adc: Add missing of_node_put() in error path (git-fixes).
- iio: adc: mxs-lradc: fix the order of two cleanup operations (git-fixes).
- iio: adc: palmas_gpadc: fix NULL dereference on rmmod (git-fixes).
- iio: adc: stm32-dfsdm: fill module aliases (git-fixes).
- iio: adc: ti-ads7950: Set `can_sleep` flag for GPIO chip (git-fixes).
- iio: adis16480: select CONFIG_CRC32 (git-fixes).
- iio: dac: cio-dac: Fix max DAC write value check for 12-bit (git-fixes).
- iio: dac: mcp4725: Fix i2c_master_send() return value handling (git-fixes).
- iio: hid: fix the retval in accel_3d_capture_sample (git-fixes).
- iio: hid: fix the retval in gyro_3d_capture_sample (git-fixes).
- iio: imu: fxos8700: fix ACCEL measurement range selection (git-fixes).
- iio: imu: fxos8700: fix IMU data bits returned to user space (git-fixes).
- iio: imu: fxos8700: fix MAGN sensor scale and unit (git-fixes).
- iio: imu: fxos8700: fix failed initialization ODR mode assignment (git-fixes).
- iio: imu: fxos8700: fix incomplete ACCEL and MAGN channels readback (git-fixes).
- iio: imu: fxos8700: fix incorrect ODR mode readback (git-fixes).
- iio: imu: fxos8700: fix map label of channel type to MAGN sensor (git-fixes).
- iio: imu: fxos8700: fix swapped ACCEL and MAGN channels readback (git-fixes).
- iio: imu: fxos8700: remove definition FXOS8700_CTRL_ODR_MIN (git-fixes).
- iio: imu: inv_icm42600: fix timestamp reset (git-fixes).
- iio: light: cm32181: Unregister second I2C client if present (git-fixes).
- iio: light: tsl2563: Do not hardcode interrupt trigger type (git-fixes).
- iio: light: tsl2772: fix reading proximity-diodes from device tree (git-fixes).
- iio: light: vcnl4035: fixed chip ID check (git-fixes).
- iio:adc:twl6030: Enable measurement of VAC (git-fixes).
- iio:adc:twl6030: Enable measurements of VUSB, VBAT and others (git-fixes).
- ima: Fix memory leak in __ima_inode_hash() (git-fixes).
- init, x86: Move mem_encrypt_init() into arch_cpu_finalize_init() (bsc#1212448).
- init: Invoke arch_cpu_finalize_init() earlier (bsc#1212448).
- init: Provide arch_cpu_finalize_init() (bsc#1212448).
- init: Remove check_bugs() leftovers (bsc#1212448).
- inotify: Avoid reporting event with invalid wd (bsc#1213025).
- input: ads7846 - always set last command to PWRDOWN (git-fixes).
- input: ads7846 - do not check penirq immediately for 7845 (git-fixes).
- input: ads7846 - do not report pressure for ads7845 (git-fixes).
- input: adxl34x - do not hardcode interrupt trigger type (git-fixes).
- input: alps - fix compatibility with -funsigned-char (bsc#1209805).
- input: drv260x - fix typo in register value define (git-fixes).
- input: drv260x - remove unused .reg_defaults (git-fixes).
- input: drv260x - sleep between polling GO bit (git-fixes).
- input: exc3000 - properly stop timer on shutdown (git-fixes).
- input: fix open count when closing inhibited device (git-fixes).
- input: focaltech - use explicitly signed char type (git-fixes).
- input: goodix - add Lenovo Yoga Book X90F to nine_bytes_report DMI table (git-fixes).
- input: hp_sdc_rtc - mark an unused function as __maybe_unused (git-fixes).
- input: iqs269a - configure device with a single block write (git-fixes).
- input: iqs269a - drop unused device node references (git-fixes).
- input: iqs269a - increase interrupt handler return delay (git-fixes).
- input: iqs626a - drop unused device node references (git-fixes).
- input: psmouse - fix OOB access in Elantech protocol (git-fixes).
- input: raspberrypi-ts - fix refcount leak in rpi_ts_probe (git-fixes).
- input: soc_button_array - add invalid acpi_index DMI quirk handling (git-fixes).
- input: xpad - add constants for GIP interface numbers (git-fixes).
- input: xpad - delete a Razer DeathAdder mouse VID/PID entry (git-fixes).
- integrity: Fix possible multiple allocation in integrity_inode_get() (git-fixes).
- intel/igbvf: free irq on the error path in igbvf_request_msix() (jsc#SLE-18379).
- intel_idle: add Emerald Rapids Xeon support (PED-3849).
- interconnect: exynos: fix node leak in probe PM QoS error path (git-fixes).
- interconnect: fix mem leak when freeing nodes (git-fixes).
- interconnect: qcom: osm-l3: fix icc_onecell_data allocation (git-fixes).
- io_uring/fdinfo: fix sqe dumping for IORING_SETUP_SQE128 (git-fixes).
- io_uring/kbuf: fix not advancing READV kbuf ring (git-fixes).
- io_uring: clear TIF_NOTIFY_SIGNAL if set and task_work not available (git-fixes).
- io_uring: do not expose io_fill_cqe_aux() (bsc#1211014).
- io_uring: do not gate task_work run on TIF_NOTIFY_SIGNAL (git-fixes).
- io_uring: ensure that cached task references are always put on exit (git-fixes).
- io_uring: fix CQ waiting timeout handling (git-fixes).
- io_uring: fix fget leak when fs do not support nowait buffered read (bsc#1205205).
- io_uring: fix ordering of args in io_uring_queue_async_work (git-fixes).
- io_uring: fix return value when removing provided buffers (git-fixes).
- io_uring: fix size calculation when registering buf ring (git-fixes).
- io_uring: recycle kbuf recycle on tw requeue (git-fixes).
- iommu/hyper-v: Allow hyperv irq remapping without x2apic (git-fixes).
- iommu/vt-d: Add a fix for devices need extra dtlb flush (bsc#1208219).
- iommu/vt-d: Avoid superfluous IOTLB tracking in lazy mode (bsc#1208948).
- iommu/vt-d: Fix buggy QAT device mask (bsc#1208219).
- ipmi: fix SSIF not responding under certain cond (git-fixes).
- ipmi:ssif: Add 60ms time internal between write retries (bsc#1206459).
- ipmi:ssif: Add a timer between request retries (bsc#1206459).
- ipmi:ssif: Add send_retries increment (git-fixes).
- ipmi:ssif: Increase the message retry time (bsc#1206459).
- ipmi:ssif: Remove rtc_us_timer (bsc#1206459).
- ipmi:ssif: resend_msg() cannot fail (bsc#1206459).
- ipmi_ssif: Rename idle state and check (bsc#1206459).
- ipv6: sr: fix out-of-bounds read when setting HMAC data (bsc#1211592).
- irqchip/clps711x: Remove unused clps711x_intc_init() function (git-fixes).
- irqchip/ftintc010: Mark all function static (git-fixes).
- irqchip/gic-v3: Refactor ISB + EOIR at ack time (git-fixes)
- irqchip/jcore-aic: Fix missing allocation of IRQ descriptors (git-fixes).
- iw_cxgb4: Fix potential NULL dereference in c4iw_fill_res_cm_id_entry() (git-fixes)
- iwlwifi: cfg: Add missing MODULE_FIRMWARE() for *.pnvm (bsc#1207553).
- ixgbe: Allow flow hash to be set via ethtool (jsc#SLE-18384).
- ixgbe: Enable setting RSS table to default values (jsc#SLE-18384).
- ixgbe: Fix panic during XDP_TX with &gt; 64 CPUs (jsc#SLE-18384).
- ixgbe: add double of VLAN header when computing the max MTU (jsc#SLE-18384).
- ixgbe: allow to increase MTU to 3K with XDP enabled (jsc#SLE-18384).
- ixgbe: fix pci device refcount leak (jsc#SLE-18384).
- ixgbe: stop resetting SYSTIME in ixgbe_ptp_start_cyclecounter (jsc#SLE-18384).
- jbd2: Fix up kABI of ext4 fast commit interface (bsc#1207590).
- jbd2: add miss release buffer head in fc_do_one_pass() (bsc#1207646).
- jbd2: fix a potential race while discarding reserved buffers after an abort (bsc#1207641).
- jbd2: fix data missing when reusing bh which is ready to be checkpointed (bsc#1213095).
- jbd2: fix potential buffer head reference count leak (bsc#1207644).
- jbd2: fix potential use-after-free in jbd2_fc_wait_bufs (bsc#1207645).
- jbd2: use the correct print format (git-fixes).
- jbd2: wake up journal waiters in FIFO order, not LIFO (bsc#1207643).
- jdb2: Do not refuse invalidation of already invalidated buffers (bsc#1213014).
- jfs: Fix fortify moan in symlink (git-fixes).
- k-m-s: Drop Linux 2.6 support
- kABI compatibility workaround for efivars (git-fixes).
- kABI workaround for btbcm.c (git-fixes).
- kABI workaround for cpp_acpi extensions for EPP (bsc#1212445).
- kABI workaround for drm_dp_mst helper updates (bsc#1206843).
- kABI workaround for hid quirks (git-fixes).
- kABI workaround for ieee80211 and co (bsc#1209980).
- kABI workaround for mt76_poll_msec() (git-fixes).
- kABI workaround for struct acpi_ec (bsc#1207149).
- kABI workaround for xhci (git-fixes).
- kABI: Fix kABI after backport Emulate RDPID only if it is enabled in guest  (git-fixes)
- kABI: PCI: Reduce warnings on possible RW1C corruption (kabi).
- kABI: PCI: dwc: Add dw_pcie_ops.host_deinit() callback (kabi).
- kABI: PCI: loongson: Prevent LS7A MRRS increases (kabi).
- kABI: Preserve TRACE_EVENT_FL values (git-fixes).
- kABI: Work around kABI changes after '20347fca71a3 swiotlb: split up the global swiotlb lock' (jsc#PED-3259).
- kABI: x86/msi: Fix msi message data shadow struct (kabi).
- kABI: x86/msr: Remove .fixup usage (kabi).
- kabi FIX FOR NFSv4: Fix free of uninitialized nfs4_label on referral lookup (git-fixes).
- kabi FIX FOR: NFS: Further optimisations for 'ls -l' (git-fixes).
- kabi FIX FOR: NFSD: Have legacy NFSD WRITE decoders use xdr_stream_subsegment() (git-fixes).
- kabi FIX FOR: NFSv4.1 query for fs_location attr on a new file system (Never, kabi).
- kabi FIX FOR: NFSv4: keep state manager thread active if swap is enabled (Never, kabi).
- kabi fix for: NFSv3: handle out-of-order write replies (bsc#1205544).
- kabi/severities: add mlx5 internal symbols
- kabi/severities: added Microsoft mana symbold (bsc#1210551)
- kabi/severities: ignore KABI for NVMe target (bsc#1174777) The target code is only for testing and there are no external users.
- kabi/severities: ignore kABI changes for mt76/* local modules (bsc#1209980)
- kabi/severities: ignore kABI in bq27xxx_battery module Those are local symbols that are used only by child drivers
- kasan: no need to unset panic_on_warn in end_report() (bsc#1207328).
- kconfig: Update config changed flag before calling callback (git-fixes).
- kernel-binary: Add back kernel-default-base guarded by option Add configsh option for splitting off kernel-default-base, and for not signing the kernel on non-efi
- kernel-binary: install expoline.o (boo#1210791 bsc#1211089)
- kernel-docs: Add buildrequires on python3-base when using python3 The python3 binary is provided by python3-base.
- kernel-docs: Use python3 together with python3-Sphinx (bsc#1212741).
- kernel-source: Remove unused macro variant_symbols
- kernel-spec-macros: Fix up obsolete_rebuilds_subpackage to generate obsoletes correctly (boo#1172073 bsc#1191731). rpm only supports full length release, no provides
- kernel: Do not sign the vanilla kernel (bsc#1209008).
- kernel: Kernel is locked down even though secure boot is disabled (bsc#1198101, bsc#1208976).
- keys: Add missing function documentation (git-fixes).
- keys: Create static version of public_key_verify_signature (git-fixes).
- keys: Do not cache key in task struct if key is requested from kernel thread (git-fixes).
- keys: Fix linking a duplicate key to a keyring's assoc_array (bsc#1207088).
- keys: asymmetric: Copy sig and digest in public_key_verify_signature() (git-fixes).
- keys: asymmetric: Fix ECDSA use via keyctl uapi (git-fixes).
- kmap_local: do not assume kmap PTEs are linear arrays in memory (git-fixes) Update config/armv7hl/default too.
- kprobe: reverse kp-&gt;flags when arm_kprobe failed (git-fixes).
- kprobes: Fix check for probe enabled in kill_kprobe() (git-fixes).
- kprobes: Fix to handle forcibly unoptimized kprobes on freeing_list (git-fixes).
- kprobes: Forbid probing on trampoline and BPF code areas (git-fixes).
- kprobes: Prohibit probes in gate area (git-fixes).
- kprobes: Skip clearing aggrprobe's post_handler in kprobe-on-ftrace case (git-fixes).
- kprobes: do not call disarm_kprobe() for disabled kprobes (git-fixes).
- kvm/vfio: Fix potential deadlock on vfio group_lock (git-fixes)
- kvm/vfio: Fix potential deadlock problem in vfio (git-fixes)
- kvm: Destroy target device if coalesced MMIO unregistration fails (git-fixes)
- kvm: Disallow user memslot with size that exceeds 'unsigned long' (git-fixes)
- kvm: Do not create VM debugfs files outside of the VM directory (git-fixes)
- kvm: Do not set Accessed/Dirty bits for ZERO_PAGE (git-fixes)
- kvm: LAPIC: Enable timer posted-interrupt only when mwait/hlt is advertised (git-fixes).
- kvm: Prevent module exit until all VMs are freed (git-fixes)
- kvm: arm64: Do not arm a hrtimer for an already pending timer (git-fixes)
- kvm: arm64: Do not hypercall before EL2 init (git-fixes)
- kvm: arm64: Do not return from void function (git-fixes)
- kvm: arm64: Fix PAR_TO_HPFAR() to work independently of PA_BITS. (git-fixes)
- kvm: arm64: Fix S1PTW handling on RO memslots (git-fixes)
- kvm: arm64: Fix bad dereference on MTE-enabled systems (git-fixes)
- kvm: arm64: Fix buffer overflow in kvm_arm_set_fw_reg() (git-fixes)
- kvm: arm64: Fix kvm init failure when mode!=vhe and VA_BITS=52. (git-fixes)
- kvm: arm64: Free hypervisor allocations if vector slot init fails (git-fixes)
- kvm: arm64: GICv4.1: Fix race with doorbell on VPE (git-fixes)
- kvm: arm64: Limit length in kvm_vm_ioctl_mte_copy_tags() to INT_MAX (git-fixes)
- kvm: arm64: PMU: Restore the guest's EL0 event counting after (git-fixes)
- kvm: arm64: Propagate errors from __pkvm_prot_finalize hypercall (git-fixes)
- kvm: arm64: Reject 32bit user PSTATE on asymmetric systems (git-fixes)
- kvm: arm64: Save PSTATE early on exit (git-fixes)
- kvm: arm64: Stop handle_exit() from handling HVC twice when an SError (git-fixes)
- kvm: arm64: Treat PMCR_EL1.LC as RES1 on asymmetric systems (git-fixes)
- kvm: arm64: nvhe: Eliminate kernel-doc warnings (git-fixes)
- kvm: arm64: vgic: Fix exit condition in scan_its_table() (git-fixes)
- kvm: arm64: vgic: Read HW interrupt pending state from the HW (git-fixes)
- kvm: nVMX: Also filter MSR_IA32_VMX_TRUE_PINBASED_CTLS when eVMCS (git-fixes).
- kvm: nVMX: Do not use Enlightened MSR Bitmap for L3 (git-fixes).
- kvm: nVMX: Document that ignoring memory failures for VMCLEAR is deliberate (git-fixes).
- kvm: nVMX: Emulate NOPs in L2, and PAUSE if it's not intercepted (git-fixes).
- kvm: nVMX: Inject #GP, not #UD, if 'generic' VMXON CR0/CR4 check fails (git-fixes).
- kvm: nVMX: Prioritize TSS T-flag #DBs over Monitor Trap Flag (git-fixes).
- kvm: nVMX: Properly expose ENABLE_USR_WAIT_PAUSE control to L1 (git-fixes).
- kvm: nVMX: Treat General Detect #DB (DR7.GD=1) as fault-like (git-fixes).
- kvm: nVMX: eVMCS: Filter out VM_EXIT_SAVE_VMX_PREEMPTION_TIMER (git-fixes).
- kvm: s390: selftest: memop: Fix integer literal (git-fixes).
- kvm: svm: Do not rewrite guest ICR on AVIC IPI virtualization failure (git-fixes).
- kvm: svm: Fix benign 'bool vs. int' comparison in svm_set_cr0() (git-fixes).
- kvm: svm: Fix potential overflow in SEV's send|receive_update_data() (git-fixes).
- kvm: svm: Require logical ID to be power-of-2 for AVIC entry (git-fixes).
- kvm: svm: Skip WRMSR fastpath on VM-Exit if next RIP isn't valid (git-fixes).
- kvm: svm: hyper-v: placate modpost section mismatch error (git-fixes).
- kvm: vmx: Introduce vmx_msr_bitmap_l01_changed() helper (git-fixes).
- kvm: vmx: Resume guest immediately when injecting #GP on ECREATE (git-fixes).
- kvm: vmx: Set vmcs.PENDING_DBG.BS on #DB in STI/MOVSS blocking shadow (git-fixes).
- kvm: vmx: Use is_64_bit_mode() to check 64-bit mode in SGX handler (git-fixes).
- kvm: x86/emulator: Emulate RDPID only if it is enabled in guest (git-fixes).
- kvm: x86/mmu: avoid NULL-pointer dereference on page freeing bugs (git-fixes).
- kvm: x86/pmu: Ignore pmu-&gt;global_ctrl check if vPMU does not support global_ctrl (git-fixes).
- kvm: x86/svm: add __GFP_ACCOUNT to __sev_dbg_{en,de}crypt_user() (git-fixes).
- kvm: x86/vmx: Do not skip segment attributes if unusable bit is set (git-fixes).
- kvm: x86/xen: Fix memory leak in kvm_xen_write_hypercall_page() (git-fixes).
- kvm: x86: Copy filter arg outside kvm_vm_ioctl_set_msr_filter() (git-fixes).
- kvm: x86: Disable KVM_HC_CLOCK_PAIRING if tsc is in always catchup mode (git-fixes).
- kvm: x86: Do not change ICR on write to APIC_SELF_IPI (git-fixes).
- kvm: x86: Fail emulation during EMULTYPE_SKIP on any exception (git-fixes).
- kvm: x86: Fix tlb flush for tdp in kvm_invalidate_pcid() (git-fixes).
- kvm: x86: Inject #GP if WRMSR sets reserved bits in APIC Self-IPI (git-fixes).
- kvm: x86: Mask off reserved bits in CPUID.8000001FH (git-fixes).
- kvm: x86: Mask off unsupported and unknown bits of IA32_ARCH_CAPABILITIES (git-fixes).
- kvm: x86: Protect the unused bits in MSR exiting flags (git-fixes).
- kvm: x86: Remove a redundant guest cpuid check in kvm_set_cr4() (git-fixes).
- kvm: x86: Report deprecated x87 features in supported CPUID (git-fixes).
- kvm: x86: do not set st-&gt;preempted when going back to user space (git-fixes).
- kvm: x86: fix sending PV IPI (git-fixes).
- kvm: x86: fix typo in __try_cmpxchg_user causing non-atomicness (git-fixes).
- kvm: x86: ioapic: Fix level-triggered EOI and userspace I/OAPIC reconfigure race (git-fixes).
- lan78xx: Add missing return code checks (git-fixes).
- lan78xx: Fix exception on link speed change (git-fixes).
- lan78xx: Fix memory allocation bug (git-fixes).
- lan78xx: Fix partial packet errors on suspend/resume (git-fixes).
- lan78xx: Fix race condition in disconnect handling (git-fixes).
- lan78xx: Fix race conditions in suspend/resume handling (git-fixes).
- lan78xx: Fix white space and style issues (git-fixes).
- lan78xx: Remove unused pause frame queue (git-fixes).
- lan78xx: Remove unused timer (git-fixes).
- lan78xx: Set flow control threshold to prevent packet loss (git-fixes).
- leds: Fix reference to led_set_brightness() in doc (git-fixes).
- leds: TI_LMU_COMMON: select REGMAP instead of depending on it (git-fixes).
- leds: led-class: Add missing put_device() to led_put() (git-fixes).
- leds: led-core: Fix refcount leak in of_led_get() (git-fixes).
- leds: tca6507: Fix error handling of using fwnode_property_read_string (git-fixes).
- lib/mpi: Fix buffer overrun when SG is too long (git-fixes).
- lib/sbitmap: Fix invalid loop in __sbitmap_queue_get_batch() (git-fixes).
- lib/zlib: remove redundation assignement of avail_in dfltcc_gdht() (git-fixes).
- libfs: add DEFINE_SIMPLE_ATTRIBUTE_SIGNED for signed value (git-fixes).
- lockd: set file_lock start and end when decoding nlm4 testargs (git-fixes).
- locking/rwbase: Mitigate indefinite writer starvation (bsc#1189998 (PREEMPT_RT prerequisite backports), bsc#1206552).
- locking/rwsem: Add __always_inline annotation to __down_read_common() and inlined callers (git-fixes).
- locking/rwsem: Allow slowpath writer to ignore handoff bit if not set by first waiter (bsc#1207270).
- locking/rwsem: Always try to wake waiters in out_nolock path (bsc#1207270).
- locking/rwsem: Conditionally wake waiters in reader/writer slowpaths (bsc#1207270).
- locking/rwsem: Disable preemption in all down_read*() and up_read() code paths (bsc#1207270).
- locking/rwsem: Disable preemption in all down_write*() and up_write() code paths (bsc#1207270).
- locking/rwsem: Disable preemption while trying for rwsem lock (bsc#1207270).
- locking/rwsem: Make handoff bit handling more consistent (bsc#1207270).
- locking/rwsem: No need to check for handoff bit if wait queue empty (bsc#1207270).
- locking/rwsem: Prevent non-first waiter from spinning in down_write() slowpath (bsc#1207270).
- locking: Add missing __sched attributes (bsc#1207270).
- loop: Fix the max_loop commandline argument treatment when it is set to 0 (git-fixes).
- loop: fix ioctl calls using compat_loop_info (git-fixes).
- lpfc: Account for fabric domain ctlr device loss recovery (bsc#1211346, bsc#1211852).
- lpfc: Change firmware upgrade logging to KERN_NOTICE instead of TRACE_EVENT (bsc#1211852).
- lpfc: Clean up SLI-4 CQE status handling (bsc#1211852).
- lpfc: Clear NLP_IN_DEV_LOSS flag if already in rediscovery (bsc#1211852).
- lpfc: Copyright updates for 14.2.0.13 patches (bsc#1211852).
- lpfc: Enhance congestion statistics collection (bsc#1211852).
- lpfc: Fix use-after-free rport memory access in lpfc_register_remote_port (bsc#1211852, bsc#1208410, bsc#1211346).
- lpfc: Revise NPIV ELS unsol rcv cmpl logic to drop ndlp based on nlp_state (bsc#1211852).
- lpfc: Update lpfc version to 14.2.0.13 (bsc#1211852).
- lpfc: update metadata
- mac80211: introduce individual TWT support in AP mode (bsc#1209980).
- mac80211: introduce set_radar_offchan callback (bsc#1209980).
- mac80211: twt: do not use potentially unaligned pointer (bsc#1209980).
- mailbox: mailbox-test: Fix potential double-free in mbox_test_message_write() (git-fixes).
- mailbox: mailbox-test: fix a locking issue in mbox_test_message_write() (git-fixes).
- mailbox: ti-msgmgr: Fill non-message tx data fields with 0x0 (git-fixes).
- mailbox: zynqmp: Fix IPI isr handling (git-fixes).
- mailbox: zynqmp: Fix typo in IPI documentation (git-fixes).
- mbcache: Avoid nesting of cache-&gt;c_list_lock under bit locks (bsc#1207647).
- mbcache: Fixup kABI of mb_cache_entry (bsc#1207653).
- mce: fix set_mce_nospec to always unmap the whole page (git-fixes).
- md/bitmap: Fix bitmap chunk size overflow issues (git-fixes).
- md/raid1: stop mdx_raid1 thread when raid1 array run failed (git-fixes).
- md/raid5: Improve performance for sequential IO (bsc#1208081).
- md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d (git-fixes).
- md: Flush workqueue md_rdev_misc_wq in md_alloc() (git-fixes).
- md: Notify sysfs sync_completed in md_reap_sync_thread() (git-fixes).
- md: fix a crash in mempool_free (git-fixes).
- md: protect md_unregister_thread from reentrancy (git-fixes).
- media: atomisp: gmin_platform: fix out_len in gmin_get_config_dsm_var() (git-fixes).
- media: av7110: prevent underflow in write_ts_to_decoder() (git-fixes).
- media: cec: core: do not set last_initiator if tx in progress (git-fixes).
- media: cec: i2c: ch7322: also select REGMAP (git-fixes).
- media: coda: Add check for dcoda_iram_alloc (git-fixes).
- media: coda: Add check for kmalloc (git-fixes).
- media: cx23885: Fix a null-ptr-deref bug in buffer_prepare() and buffer_finish() (git-fixes).
- media: dm1105: Fix use after free bug in dm1105_remove due to race condition (git-fixes).
- media: dvb-usb-v2: ce6230: fix null-ptr-deref in ce6230_i2c_master_xfer() (git-fixes).
- media: dvb-usb-v2: ec168: fix null-ptr-deref in ec168_i2c_xfer() (git-fixes).
- media: dvb-usb-v2: rtl28xxu: fix null-ptr-deref in rtl28xxu_i2c_xfer (git-fixes).
- media: dvb-usb: az6027: fix three null-ptr-deref in az6027_i2c_xfer() (git-fixes).
- media: dvb-usb: digitv: fix null-ptr-deref in digitv_i2c_xfer() (git-fixes).
- media: dvb-usb: dw2102: fix uninit-value in su3000_read_mac_address (git-fixes).
- media: dvb_ca_en50221: fix a size write bug (git-fixes).
- media: dvb_demux: fix a bug for the continuity counter (git-fixes).
- media: i2c: Correct format propagation for st-mipid02 (git-fixes).
- media: i2c: imx219: Fix binning for RAW8 capture (git-fixes).
- media: i2c: imx219: Split common registers from mode tables (git-fixes).
- media: i2c: ov7670: 0 instead of -EINVAL was returned (git-fixes).
- media: i2c: ov772x: Fix memleak in ov772x_probe() (git-fixes).
- media: imx: imx7-media-csi: fix missing clk_disable_unprepare() in imx7_csi_init() (git-fixes).
- media: ipu3-cio2: Fix PM runtime usage_count in driver unbind (git-fixes).
- media: m5mols: fix off-by-one loop termination error (git-fixes).
- media: max9286: Fix memleak in max9286_v4l2_register() (git-fixes).
- media: max9286: Free control handler (git-fixes).
- media: mn88443x: fix !CONFIG_OF error by drop of_match_ptr from ID table (git-fixes).
- media: netup_unidvb: fix irq init by register it at the end of probe (git-fixes).
- media: netup_unidvb: fix use-after-free at del_timer() (git-fixes).
- media: ov2740: Fix memleak in ov2740_init_controls() (git-fixes).
- media: ov5640: Fix analogue gain control (git-fixes).
- media: ov5675: Fix memleak in ov5675_init_controls() (git-fixes).
- media: pci: tw68: Fix null-ptr-deref bug in buf prepare and finish (git-fixes).
- media: platform: ti: Add missing check for devm_regulator_get (git-fixes).
- media: radio-shark: Add endpoint checks (git-fixes).
- media: rc: Fix use-after-free bugs caused by ene_tx_irqsim() (git-fixes).
- media: rc: gpio-ir-recv: Fix support for wake-up (git-fixes).
- media: rc: gpio-ir-recv: add remove function (git-fixes).
- media: rcar_fdp1: Fix the correct variable assignments (git-fixes).
- media: rcar_fdp1: Make use of the helper function devm_platform_ioremap_resource() (git-fixes).
- media: rkvdec: fix use after free bug in rkvdec_remove (git-fixes).
- media: saa7134: Use video_unregister_device for radio_dev (git-fixes).
- media: saa7134: fix use after free bug in saa7134_finidev due to race condition (git-fixes).
- media: ti: cal: fix possible memory leak in cal_ctx_create() (git-fixes).
- media: usb: Check az6007_read() return value (git-fixes).
- media: usb: siano: Fix use after free bugs caused by do_submit_urb (git-fixes).
- media: usb: siano: Fix warning due to null work_func_t function pointer (git-fixes).
- media: uvcvideo: Add support for V4L2_CTRL_TYPE_CTRL_CLASS (git-fixes).
- media: uvcvideo: Check controls flags before accessing them (git-fixes).
- media: uvcvideo: Check for INACTIVE in uvc_ctrl_is_accessible() (git-fixes).
- media: uvcvideo: Do not check for V4L2_CTRL_WHICH_DEF_VAL (git-fixes).
- media: uvcvideo: Fix memory leak of object map on error exit path (git-fixes).
- media: uvcvideo: Fix race condition with usb_kill_urb (git-fixes).
- media: uvcvideo: Handle cameras with invalid descriptors (git-fixes).
- media: uvcvideo: Handle errors from calls to usb_string (git-fixes).
- media: uvcvideo: Quirk for autosuspend in Logitech B910 and C910 (git-fixes).
- media: uvcvideo: Remove s_ctrl and g_ctrl (git-fixes).
- media: uvcvideo: Silence memcpy() run-time false positive warnings (git-fixes).
- media: uvcvideo: Use control names from framework (git-fixes).
- media: uvcvideo: refactor __uvc_ctrl_add_mapping (git-fixes).
- media: v4l2-jpeg: correct the skip count in jpeg_parse_app14_data (git-fixes).
- media: v4l2-jpeg: ignore the unknown APP14 marker (git-fixes).
- media: venus: dec: Fix handling of the start cmd (git-fixes).
- media: venus: helpers: Fix ALIGN() of non power of two (git-fixes).
- media: videodev2.h: Fix struct v4l2_input tuner index comment (git-fixes).
- mei: bus-fixup:upon error print return values of send and receive (git-fixes).
- mei: bus: fix unlink on bus in error path (git-fixes).
- mei: me: add meteor lake point M DID (git-fixes).
- mei: pxp: Use correct macros to initialize uuid_le (git-fixes).
- memory: brcmstb_dpfe: fix testing array offset after use (git-fixes).
- memstick: fix memory leak if card device is never registered (git-fixes).
- memstick: r592: Fix UAF bug in r592_remove due to race condition (bsc#1211449).
- meson saradc: fix clock divider mask length (git-fixes).
- mfd: arizona: Use pm_runtime_resume_and_get() to prevent refcnt leak (git-fixes).
- mfd: cs5535: Do not build on UML (git-fixes).
- mfd: dln2: Fix memory leak in dln2_probe() (git-fixes).
- mfd: intel-lpss: Add missing check for platform_get_resource (git-fixes).
- mfd: pcf50633-adc: Fix potential memleak in pcf50633_adc_async_read() (git-fixes).
- mfd: pm8008: Fix module autoloading (git-fixes).
- mfd: rt5033: Drop rt5033-battery sub-device (git-fixes).
- mfd: stmfx: Fix error path in stmfx_chip_init (git-fixes).
- mfd: stmfx: Nullify stmfx-&gt;vdd in case of error (git-fixes).
- mfd: stmpe: Only disable the regulators if they are enabled (git-fixes).
- mfd: tqmx86: Correct board names for TQMxE39x (git-fixes).
- mfd: tqmx86: Do not access I2C_DETECT register through io_base (git-fixes).
- misc/mei/hdcp: Use correct macros to initialize uuid_le (git-fixes).
- misc: enclosure: Fix doc for enclosure_find() (git-fixes).
- misc: fastrpc: Create fastrpc scalar with correct buffer count (git-fixes).
- misc: fastrpc: reject new invocations during device removal (git-fixes).
- misc: fastrpc: return -EPIPE to invocations on device removal (git-fixes).
- misc: pci_endpoint_test: Free IRQs before removing the device (git-fixes).
- misc: pci_endpoint_test: Re-init completion for every test (git-fixes).
- mkinitrd: Replace dependency with dracut (bsc#1202353).
- mlx5: do not use RT_TOS for IPv6 flowlabel (jsc#SLE-19253).
- mlx5: fix possible ptp queue fifo use-after-free (jsc#PED-1549).
- mlx5: fix skb leak while fifo resync and push (jsc#PED-1549).
- mlxfw: fix null-ptr-deref in mlxfw_mfa2_tlv_next() (git-fixes).
- mlxsw: minimal: Fix deadlock in ports creation (git-fixes).
- mlxsw: spectrum: Allow driver to load with old firmware versions (git-fixes).
- mm/filemap: fix page end in filemap_get_read_batch (bsc#1210768).
- mm/vmalloc: do not output a spurious warning when huge vmalloc() fails (bsc#1211410).
- mm: /proc/pid/smaps_rollup: fix no vma's null-deref (bsc#1207769).
- mm: Move mm_cachep initialization to mm_init() (bsc#1212448).
- mm: memcg: fix NULL pointer in mem_cgroup_track_foreign_dirty_slowpath() (bsc#1209262).
- mm: memcg: fix swapcached stat accounting (bsc#1209804).
- mm: mmap: remove newline at the end of the trace (git-fixes).
- mm: page_alloc: skip regions with hugetlbfs pages when allocating 1G pages (bsc#1210034).
- mm: take a page reference when removing device exclusive entries (bsc#1211025).
- mm: vmalloc: avoid warn_alloc noise caused by fatal signal (bsc#1211410).
- mmc: atmel-mci: fix race between stop command and start of next command (git-fixes).
- mmc: bcm2835: fix deferred probing (git-fixes).
- mmc: block: Remove error check of hw_reset on reset (git-fixes).
- mmc: block: ensure error propagation for non-blk (git-fixes).
- mmc: jz4740: Work around bug on JZ4760(B) (git-fixes).
- mmc: meson-gx: remove redundant mmc_request_done() call from irq context (git-fixes).
- mmc: mmc_spi: fix error handling in mmc_spi_probe() (git-fixes).
- mmc: mmci: Set PROBE_PREFER_ASYNCHRONOUS (git-fixes).
- mmc: mmci: stm32: fix max busy timeout calculation (git-fixes).
- mmc: mtk-sd: fix deferred probing (git-fixes).
- mmc: mvsdio: fix deferred probing (git-fixes).
- mmc: omap: fix deferred probing (git-fixes).
- mmc: omap_hsmmc: fix deferred probing (git-fixes).
- mmc: owl: fix deferred probing (git-fixes).
- mmc: sdhci-acpi: fix deferred probing (git-fixes).
- mmc: sdhci-esdhc-imx: make 'no-mmc-hs400' works (git-fixes).
- mmc: sdhci-msm: Disable broken 64-bit DMA on MSM8916 (git-fixes).
- mmc: sdhci-of-esdhc: fix quirk to ignore command inhibit for data (git-fixes).
- mmc: sdhci-spear: fix deferred probing (git-fixes).
- mmc: sdhci_am654: Set HIGH_SPEED_ENA for SDR12 and SDR25 (git-fixes).
- mmc: sdhci_am654: lower power-on failed message severity (git-fixes).
- mmc: sdio: fix possible resource leaks in some error paths (git-fixes).
- mmc: sh_mmcif: fix deferred probing (git-fixes).
- mmc: sunxi: fix deferred probing (git-fixes).
- mmc: usdhi60rol0: fix deferred probing (git-fixes).
- mmc: vub300: fix invalid response handling (git-fixes).
- module: Do not wait for GOING modules (bsc#1196058, bsc#1186449, bsc#1204356, bsc#1204662).
- mt76: Make use of the helper macro kthread_run() (bsc#1209980).
- mt76: Print error message when reading EEPROM from mtd failed (bsc#1209980).
- mt76: add 6GHz support (bsc#1209980).
- mt76: add MT_RXQ_MAIN_WA for mt7916 (bsc#1209980).
- mt76: add support for setting mcast rate (bsc#1209980).
- mt76: allow drivers to drop rx packets early (bsc#1209980).
- mt76: clear sta powersave flag after notifying driver (bsc#1209980).
- mt76: connac: add 6 GHz support for wtbl and starec configuration (bsc#1209980).
- mt76: connac: add 6GHz support to mt76_connac_mcu_set_channel_domain (bsc#1209980).
- mt76: connac: add 6GHz support to mt76_connac_mcu_sta_tlv (bsc#1209980).
- mt76: connac: add 6GHz support to mt76_connac_mcu_uni_add_bss (bsc#1209980).
- mt76: connac: add support for limiting to maximum regulatory Tx power (bsc#1209980).
- mt76: connac: add support for passing the cipher field in bss_info (bsc#1209980).
- mt76: connac: adjust wlan_idx size from u8 to u16 (bsc#1209980).
- mt76: connac: align MCU_EXT definitions with 7915 driver (bsc#1209980).
- mt76: connac: enable 6GHz band for hw scan (bsc#1209980).
- mt76: connac: enable hw amsdu @ 6GHz (bsc#1209980).
- mt76: connac: extend mcu_get_nic_capability (bsc#1209980).
- mt76: connac: fix a theoretical NULL pointer dereference in mt76_connac_get_phy_mode (bsc#1209980).
- mt76: connac: fix last_chan configuration in mt76_connac_mcu_rate_txpower_band (bsc#1209980).
- mt76: connac: fix unresolved symbols when CONFIG_PM is unset (bsc#1209980).
- mt76: connac: introduce MCU_CE_CMD macro (bsc#1209980).
- mt76: connac: introduce MCU_EXT macros (bsc#1209980).
- mt76: connac: introduce MCU_UNI_CMD macro (bsc#1209980).
- mt76: connac: introduce is_connac_v1 utility routine (bsc#1209980).
- mt76: connac: make read-only array ba_range static const (bsc#1209980).
- mt76: connac: move mcu reg access utility routines in mt76_connac_lib module (bsc#1209980).
- mt76: connac: move mt76_connac_chan_bw in common code (bsc#1209980).
- mt76: connac: move mt76_connac_lmac_mapping in mt76-connac module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_add_key in connac module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_bss_basic_tlv in connac module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_bss_ext_tlv in connac module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_bss_omac_tlv in connac module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_gen_dl_mode in mt76-connac module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_get_cipher in common code (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_rdd_cmd in mt76-connac module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_restart in common module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_set_pm in connac module (bsc#1209980).
- mt76: connac: move mt76_connac_mcu_wtbl_update_hdr_trans in connac module (bsc#1209980).
- mt76: connac: rely on MCU_CMD macro (bsc#1209980).
- mt76: connac: rely on le16_add_cpu in mt76_connac_mcu_add_nested_tlv (bsc#1209980).
- mt76: connac: remove MCU_FW_PREFIX bit (bsc#1209980).
- mt76: connac: remove PHY_MODE_AX_6G configuration in mt76_connac_get_phy_mode (bsc#1209980).
- mt76: connac: set 6G phymode in mt76_connac_get_phy_mode{,v2} (bsc#1209980).
- mt76: connac: set 6G phymode in single-sku support (bsc#1209980).
- mt76: debugfs: fix queue reporting for mt76-usb (bsc#1209980).
- mt76: debugfs: improve queue node readability (bsc#1209980).
- mt76: disable BH around napi_schedule() calls (bsc#1209980).
- mt76: do not access 802.11 header in ccmp check for 802.3 rx skbs (bsc#1209980).
- mt76: do not always copy ethhdr in reverse_frag0_hdr_trans (bsc#1209980).
- mt76: do not reset MIB counters in get_stats callback (bsc#1209980).
- mt76: eeprom: tolerate corrected bit-flips (bsc#1209980).
- mt76: fill boottime_ns in Rx path (bsc#1209980).
- mt76: fix antenna config missing in 6G cap (bsc#1209980).
- mt76: fix boolreturn.cocci warnings (bsc#1209980).
- mt76: fix dfs state issue with 160 MHz channels (bsc#1209980).
- mt76: fix endianness errors in reverse_frag0_hdr_trans (bsc#1209980).
- mt76: fix invalid rssi report (bsc#1209980).
- mt76: fix key pointer overwrite in mt7921s_write_txwi/mt7663_usb_sdio_write_txwi (bsc#1209980).
- mt76: fix monitor rx FCS error in DFS channel (bsc#1209980).
- mt76: fix possible OOB issue in mt76_calculate_default_rate (bsc#1209980).
- mt76: fix possible pktid leak (bsc#1209980).
- mt76: fix the wiphy's available antennas to the correct value (bsc#1209980).
- mt76: fix timestamp check in tx_status (bsc#1209980).
- mt76: fix tx status related use-after-free race on station removal (bsc#1209980).
- mt76: fix use-after-free by removing a non-RCU wcid pointer (git-fixes).
- mt76: fix wrong HE data rate in sniffer tool (bsc#1209980).
- mt76: improve signal strength reporting (bsc#1209980).
- mt76: introduce packet_id idr (bsc#1209980).
- mt76: make mt76_sar_capa static (bsc#1209980).
- mt76: move mt76_ethtool_worker_info in mt76 module (bsc#1209980).
- mt76: move mt76_sta_stats in mt76.h (bsc#1209980).
- mt76: move sar utilities to mt76-core module (bsc#1209980).
- mt76: move sar_capa configuration in common code (bsc#1209980).
- mt76: move spin_lock_bh to spin_lock in tasklet (bsc#1209980).
- mt76: mt7603: improve reliability of tx powersave filtering (bsc#1209980).
- mt76: mt7603: introduce SAR support (bsc#1209980).
- mt76: mt7615: add support for LG LGSBWAC02 (MT7663BUN) (bsc#1209980).
- mt76: mt7615: apply cached RF data for DBDC (bsc#1209980).
- mt76: mt7615: clear mcu error interrupt status on mt7663 (bsc#1209980).
- mt76: mt7615: fix a possible race enabling/disabling runtime-pm (bsc#1209980).
- mt76: mt7615: fix compiler warning on frame size (bsc#1209980).
- mt76: mt7615: fix decap offload corner case with 4-addr VLAN frames (bsc#1209980).
- mt76: mt7615: fix throughput regression on DFS channels (bsc#1209980).
- mt76: mt7615: fix unused tx antenna mask in testmode (bsc#1209980).
- mt76: mt7615: fix/rewrite the dfs state handling logic (bsc#1209980).
- mt76: mt7615: honor ret from mt7615_mcu_restart in mt7663u_mcu_init (bsc#1209980).
- mt76: mt7615: in debugfs queue stats, skip wmm index 3 on mt7663 (bsc#1209980).
- mt76: mt7615: introduce SAR support (bsc#1209980).
- mt76: mt7615: move mt7615_mcu_set_p2p_oppps in mt76_connac module (bsc#1209980).
- mt76: mt7615: remove dead code in get_omac_idx (bsc#1209980).
- mt76: mt7615: update bss_info with cipher after setting the group key (bsc#1209980).
- mt76: mt7615e: process txfree and txstatus without allocating skbs (bsc#1209980).
- mt76: mt7663: disable 4addr capability (bsc#1209980).
- mt76: mt7663s: flush runtime-pm queue after waking up the device (bsc#1209980).
- mt76: mt7663s: rely on mcu reg access utility (bsc#1209980).
- mt76: mt7663u: introduce mt7663u_mcu_power_on routine (bsc#1209980).
- mt76: mt76_connac: fix MCU_CE_CMD_SET_ROC definition error (bsc#1209980).
- mt76: mt76x02: improve tx hang detection (bsc#1209980).
- mt76: mt76x02: introduce SAR support (bsc#1209980).
- mt76: mt76x02: use mt76_phy_dfs_state to determine radar detector state (bsc#1209980).
- mt76: mt76x0: correct VHT MCS 8/9 tx power eeprom offset (bsc#1209980).
- mt76: mt7915: Fix PCI device refcount leak in mt7915_pci_init_hif2() (bsc#1209980).
- mt76: mt7915: Fix channel state update error issue (bsc#1209980).
- mt76: mt7915: add 6 GHz support (bsc#1209980).
- mt76: mt7915: add HE-LTF into fixed rate command (bsc#1209980).
- mt76: mt7915: add LED support (bsc#1209980).
- mt76: mt7915: add WA firmware log support (bsc#1209980).
- mt76: mt7915: add control knobs for thermal throttling (bsc#1209980).
- mt76: mt7915: add debugfs knobs for MCU utilization (bsc#1209980).
- mt76: mt7915: add default calibrated data support (bsc#1209980).
- mt76: mt7915: add device id for mt7916 (bsc#1209980).
- mt76: mt7915: add ethtool stats support (bsc#1209980).
- mt76: mt7915: add firmware support for mt7916 (bsc#1209980).
- mt76: mt7915: add mib counters to ethtool stats (bsc#1209980).
- mt76: mt7915: add missing DATA4_TB_SPTL_REUSE1 to mt7915_mac_decode_he_radiotap (bsc#1209980).
- mt76: mt7915: add more MIB registers (bsc#1209980).
- mt76: mt7915: add mt7915_mmio_probe() as a common probing function (bsc#1209980).
- mt76: mt7915: add mt7916 calibrated data support (bsc#1209980).
- mt76: mt7915: add mu-mimo and ofdma debugfs knobs (bsc#1209980).
- mt76: mt7915: add some per-station tx stats to ethtool (bsc#1209980).
- mt76: mt7915: add support for MT7986 (bsc#1209980).
- mt76: mt7915: add support for passing chip/firmware debug data to user space (bsc#1209980).
- mt76: mt7915: add twt_stats knob in debugfs (bsc#1209980).
- mt76: mt7915: add tx mu/su counters to mib (bsc#1209980).
- mt76: mt7915: add tx stats gathered from tx-status callbacks (bsc#1209980).
- mt76: mt7915: add txfree event v3 (bsc#1209980).
- mt76: mt7915: add txpower init for 6GHz (bsc#1209980).
- mt76: mt7915: allow beaconing on all chains (bsc#1209980).
- mt76: mt7915: change max rx len limit of hw modules (bsc#1209980).
- mt76: mt7915: check band idx for bcc event (bsc#1209980).
- mt76: mt7915: check for devm_pinctrl_get() failure (bsc#1209980).
- mt76: mt7915: do not pass data pointer to mt7915_mcu_muru_debug_set (bsc#1209980).
- mt76: mt7915: enable HE UL MU-MIMO (bsc#1209980).
- mt76: mt7915: enable configured beacon tx rate (bsc#1209980).
- mt76: mt7915: enable radar background detection (bsc#1209980).
- mt76: mt7915: enable radar trigger on rdd2 (bsc#1209980).
- mt76: mt7915: enable twt responder capability (bsc#1209980).
- mt76: mt7915: enlarge wcid size to 544 (bsc#1209980).
- mt76: mt7915: fix DBDC default band selection on MT7915D (bsc#1209980).
- mt76: mt7915: fix DFS no radar detection event (bsc#1209980).
- mt76: mt7915: fix SMPS operation fail (bsc#1209980).
- mt76: mt7915: fix WMM index on DBDC cards (bsc#1209980).
- mt76: mt7915: fix beamforming mib stats (bsc#1209980).
- mt76: mt7915: fix decap offload corner case with 4-addr VLAN frames (bsc#1209980).
- mt76: mt7915: fix eeprom fields of txpower init values (bsc#1209980).
- mt76: mt7915: fix endiannes warning mt7915_mcu_beacon_check_caps (bsc#1209980).
- mt76: mt7915: fix endianness warnings in mt7915_debugfs_rx_fw_monitor (bsc#1209980).
- mt76: mt7915: fix endianness warnings in mt7915_mac_tx_free() (bsc#1209980).
- mt76: mt7915: fix he_mcs capabilities for 160mhz (bsc#1209980).
- mt76: mt7915: fix incorrect testmode ipg on band 1 caused by wmm_idx (git-fixes).
- mt76: mt7915: fix mcs_map in mt7915_mcu_set_sta_he_mcs() (bsc#1209980).
- mt76: mt7915: fix missing HE phy cap (bsc#1209980).
- mt76: mt7915: fix phy cap in mt7915_set_stream_he_txbf_caps() (bsc#1209980).
- mt76: mt7915: fix polling firmware-own status (git-fixes).
- mt76: mt7915: fix possible NULL pointer dereference in mt7915_mac_fill_rx_vector (git-fixes).
- mt76: mt7915: fix possible memory leak in mt7915_mcu_add_sta (bsc#1209980).
- mt76: mt7915: fix possible uninitialized pointer dereference in mt7986_wmac_gpio_setup (bsc#1209980).
- mt76: mt7915: fix potential NPE in TXS processing (bsc#1209980).
- mt76: mt7915: fix potential memory leak of fw monitor packets (bsc#1209980).
- mt76: mt7915: fix return condition in mt7915_tm_reg_backup_restore() (bsc#1209980).
- mt76: mt7915: fix the muru tlv issue (bsc#1209980).
- mt76: mt7915: fix the nss setting in bitrates (bsc#1209980).
- mt76: mt7915: fix twt table_mask to u16 in mt7915_dev (bsc#1209980).
- mt76: mt7915: fix txbf starec TLV issues (bsc#1209980).
- mt76: mt7915: fix typos in comments (bsc#1209980).
- mt76: mt7915: fix/rewrite the dfs state handling logic (bsc#1209980).
- mt76: mt7915: get rid of mt7915_mcu_set_fixed_rate routine (bsc#1209980).
- mt76: mt7915: honor all possible error conditions in mt7915_mcu_init() (bsc#1209980).
- mt76: mt7915: improve code readability for xmit-queue handler (bsc#1209980).
- mt76: mt7915: improve code readability in mt7915_mcu_sta_bfer_ht (bsc#1209980).
- mt76: mt7915: improve starec readability of txbf (bsc#1209980).
- mt76: mt7915: improve wmm index allocation (bsc#1209980).
- mt76: mt7915: initialize smps mode in mt7915_mcu_sta_rate_ctrl_tlv() (bsc#1209980).
- mt76: mt7915: introduce SAR support (bsc#1209980).
- mt76: mt7915: introduce __mt7915_get_tsf routine (bsc#1209980).
- mt76: mt7915: introduce band_idx in mt7915_phy (bsc#1209980).
- mt76: mt7915: introduce bss coloring support (bsc#1209980).
- mt76: mt7915: introduce mt76 debugfs sub-dir for ext-phy (bsc#1209980).
- mt76: mt7915: introduce mt76_vif in mt7915_vif (bsc#1209980).
- mt76: mt7915: introduce mt7915_mac_add_twt_setup routine (bsc#1209980).
- mt76: mt7915: introduce mt7915_mcu_beacon_check_caps() (bsc#1209980).
- mt76: mt7915: introduce mt7915_mcu_twt_agrt_update mcu command (bsc#1209980).
- mt76: mt7915: introduce mt7915_set_radar_background routine (bsc#1209980).
- mt76: mt7915: introduce rdd_monitor debugfs node (bsc#1209980).
- mt76: mt7915: move pci specific code back to pci.c (bsc#1209980).
- mt76: mt7915: move tx amsdu stats in mib_stats (bsc#1209980).
- mt76: mt7915: process txfree and txstatus without allocating skbs (bsc#1209980).
- mt76: mt7915: refine register definition (bsc#1209980).
- mt76: mt7915: rely on mt76_connac definitions (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_get_phy utilities (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_add_tlv routine (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_alloc_sta_req (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_alloc_wtbl_req (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_init_download (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_patch_sem_ctrl/mt76_connac_mcu_start_patch (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_set_rts_thresh (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_sta_ba (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_sta_ba_tlv (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_sta_basic_tlv (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_sta_uapsd (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_start_firmware (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_wtbl_ba_tlv (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_wtbl_generic_tlv (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_wtbl_hdr_trans_tlv (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_wtbl_ht_tlv (bsc#1209980).
- mt76: mt7915: rely on mt76_connac_mcu_wtbl_smps_tlv (bsc#1209980).
- mt76: mt7915: remove dead code in debugfs code (bsc#1209980).
- mt76: mt7915: remove duplicated defs in mcu.h (bsc#1209980).
- mt76: mt7915: remove mt7915_mcu_add_he() (bsc#1209980).
- mt76: mt7915: rename debugfs tx-queues (bsc#1209980).
- mt76: mt7915: report radar pattern if detected by rdd2 (bsc#1209980).
- mt76: mt7915: report rx mode value in mt7915_mac_fill_rx_rate (bsc#1209980).
- mt76: mt7915: rework .set_bitrate_mask() to support more options (bsc#1209980).
- mt76: mt7915: rework debugfs fixed-rate knob (bsc#1209980).
- mt76: mt7915: rework debugfs queue info (bsc#1209980).
- mt76: mt7915: rework dma.c to adapt mt7916 changes (bsc#1209980).
- mt76: mt7915: rework eeprom.c to adapt mt7916 changes (bsc#1209980).
- mt76: mt7915: rework mt7915_mcu_sta_muru_tlv() (bsc#1209980).
- mt76: mt7915: rework starec TLV tags (bsc#1209980).
- mt76: mt7915: run mt7915_get_et_stats holding mt76 mutex (bsc#1209980).
- mt76: mt7915: send EAPOL frames at lowest rate (bsc#1209980).
- mt76: mt7915: set VTA bit in tx descriptor (bsc#1209980).
- mt76: mt7915: set band1 TGID field in tx descriptor (bsc#1209980).
- mt76: mt7915: set bssinfo/starec command when adding interface (bsc#1209980).
- mt76: mt7915: set muru platform type (bsc#1209980).
- mt76: mt7915: simplify conditional (bsc#1209980).
- mt76: mt7915: switch proper tx arbiter mode in testmode (bsc#1209980).
- mt76: mt7915: update bss_info with cipher after setting the group key (bsc#1209980).
- mt76: mt7915: update mac timing settings (bsc#1209980).
- mt76: mt7915: update max_mpdu_size in mt7915_mcu_sta_amsdu_tlv() (bsc#1209980).
- mt76: mt7915: update mt7915_chan_mib_offs for mt7916 (bsc#1209980).
- mt76: mt7915: update rx rate reporting for mt7916 (bsc#1209980).
- mt76: mt7915: use min_t() to make code cleaner (bsc#1209980).
- mt76: mt7915e: Add a hwmon attribute to get the actual throttle state (bsc#1209980).
- mt76: mt7915e: Enable thermal management by default (bsc#1209980).
- mt76: mt7915e: Fix degraded performance after temporary overheat (bsc#1209980).
- mt76: mt7921: Fix the error handling path of mt7921_pci_probe() (git-fixes).
- mt76: mt7921: add 6GHz support (bsc#1209980).
- mt76: mt7921: add MT7921_COMMON module (bsc#1209980).
- mt76: mt7921: add MU EDCA cmd support (bsc#1209980).
- mt76: mt7921: add delay config for sched scan (bsc#1209980).
- mt76: mt7921: add mt7921u driver (bsc#1209980).
- mt76: mt7921: add per-vif counters in ethtool (bsc#1209980).
- mt76: mt7921: add some more MIB counters (bsc#1209980).
- mt76: mt7921: add sta stats accounting in mt7921_mac_add_txs_skb (bsc#1209980).
- mt76: mt7921: add support for PCIe ID 0x0608/0x0616 (bsc#1209980).
- mt76: mt7921: add support for tx status reporting (bsc#1209980).
- mt76: mt7921: clear pm-&gt;suspended in mt7921_mac_reset_work (bsc#1209980).
- mt76: mt7921: disable 4addr capability (bsc#1209980).
- mt76: mt7921: disable runtime pm for usb (bsc#1209980).
- mt76: mt7921: do not always disable fw runtime-pm (bsc#1209980).
- mt76: mt7921: do not enable beacon filter when IEEE80211_CONF_CHANGE_MONITOR is set (bsc#1209980).
- mt76: mt7921: do not update pm states in case of error (git-fixes).
- mt76: mt7921: fix MT7921E reset failure (bsc#1209980).
- mt76: mt7921: fix Wformat build warning (bsc#1209980).
- mt76: mt7921: fix a possible race enabling/disabling runtime-pm (bsc#1209980).
- mt76: mt7921: fix boolreturn.cocci warning (bsc#1209980).
- mt76: mt7921: fix build regression (bsc#1209980).
- mt76: mt7921: fix endianness issues in mt7921_mcu_set_tx() (bsc#1209980).
- mt76: mt7921: fix endianness warnings in mt7921_mac_decode_he_mu_radiotap (bsc#1209980).
- mt76: mt7921: fix ht mcs in mt7921_mac_add_txs_skb() (bsc#1209980).
- mt76: mt7921: fix injected MPDU transmission to not use HW A-MSDU (bsc#1209980).
- mt76: mt7921: fix kernel crash at mt7921_pci_remove (git-fixes).
- mt76: mt7921: fix kernel panic by accessing unallocated eeprom.data (git-fixes).
- mt76: mt7921: fix mt7921s Kconfig (bsc#1209980).
- mt76: mt7921: fix network buffer leak by txs missing (bsc#1209980).
- mt76: mt7921: fix possible NULL pointer dereference in mt7921_mac_write_txwi (bsc#1209980).
- mt76: mt7921: fix up the monitor mode (bsc#1209980).
- mt76: mt7921: fix xmit-queue dump for usb and sdio (bsc#1209980).
- mt76: mt7921: forbid the doze mode when coredump is in progress (bsc#1209980).
- mt76: mt7921: get rid of monitor_vif (bsc#1209980).
- mt76: mt7921: get rid of mt7921_mcu_get_eeprom (bsc#1209980).
- mt76: mt7921: get rid of mt7921_wait_for_mcu_init declaration (bsc#1209980).
- mt76: mt7921: honor mt76_connac_mcu_set_rate_txpower return value in mt7921_config (bsc#1209980).
- mt76: mt7921: honor pm user configuration in mt7921_sniffer_interface_iter (bsc#1209980).
- mt76: mt7921: introduce 160 MHz channel bandwidth support (bsc#1209980).
- mt76: mt7921: introduce mt7921s support (bsc#1209980).
- mt76: mt7921: introduce stats reporting through ethtool (bsc#1209980).
- mt76: mt7921: make all event parser reusable between mt7921s and mt7921e (bsc#1209980).
- mt76: mt7921: make mt7921_init_tx_queues static (bsc#1209980).
- mt76: mt7921: move mt76_connac_mcu_set_hif_suspend to bus-related files (bsc#1209980).
- mt76: mt7921: move mt7921_init_hw in a dedicated work (bsc#1209980).
- mt76: mt7921: move mt7921_queue_rx_skb to mac.c (bsc#1209980).
- mt76: mt7921: move mt7921_usb_sdio_tx_complete_skb in common mac code (bsc#1209980).
- mt76: mt7921: move mt7921_usb_sdio_tx_prepare_skb in common mac code (bsc#1209980).
- mt76: mt7921: move mt7921_usb_sdio_tx_status_data in mac common code (bsc#1209980).
- mt76: mt7921: move tx amsdu stats in mib_stats (bsc#1209980).
- mt76: mt7921: reduce log severity levels for informative messages (bsc#1209980).
- mt76: mt7921: refactor dma.c to be pcie specific (bsc#1209980).
- mt76: mt7921: refactor init.c to be bus independent (bsc#1209980).
- mt76: mt7921: refactor mac.c to be bus independent (bsc#1209980).
- mt76: mt7921: refactor mcu.c to be bus independent (bsc#1209980).
- mt76: mt7921: refactor mt7921_mcu_send_message (bsc#1209980).
- mt76: mt7921: rely on mcu_get_nic_capability (bsc#1209980).
- mt76: mt7921: remove dead definitions (bsc#1209980).
- mt76: mt7921: remove duplicated code in mt7921_mac_decode_he_radiotap (bsc#1209980).
- mt76: mt7921: remove mcu rate reporting code (bsc#1209980).
- mt76: mt7921: remove mt7921_sta_stats (bsc#1209980).
- mt76: mt7921: report tx rate directly from tx status (bsc#1209980).
- mt76: mt7921: robustify hardware initialization flow (bsc#1209980).
- mt76: mt7921: send EAPOL frames at lowest rate (bsc#1209980).
- mt76: mt7921: set EDCA parameters with the MCU CE command (bsc#1209980).
- mt76: mt7921: start reworking tx rate reporting (bsc#1209980).
- mt76: mt7921: toggle runtime-pm adding a monitor vif (bsc#1209980).
- mt76: mt7921: update mib counters dumping phy stats (bsc#1209980).
- mt76: mt7921: update mt7921_skb_add_usb_sdio_hdr to support usb (bsc#1209980).
- mt76: mt7921: use correct iftype data on 6GHz cap init (bsc#1209980).
- mt76: mt7921: use mt76_hw instead of open coding it (bsc#1209980).
- mt76: mt7921: use physical addr to unify register access (bsc#1209980).
- mt76: mt7921e: fix possible probe failure after reboot (bsc#1198835).
- mt76: mt7921e: make dev-&gt;fw_assert usage consistent (bsc#1209980).
- mt76: mt7921e: process txfree and txstatus without allocating skbs (bsc#1209980).
- mt76: mt7921s: add reset support (bsc#1209980).
- mt76: mt7921s: clear MT76_STATE_MCU_RUNNING immediately after reset (bsc#1209980).
- mt76: mt7921s: fix a possible memory leak in mt7921_load_patch (bsc#1209980).
- mt76: mt7921s: fix bus hang with wrong privilege (bsc#1209980).
- mt76: mt7921s: fix cmd timeout in throughput test (bsc#1209980).
- mt76: mt7921s: fix firmware download random fail (bsc#1209980).
- mt76: mt7921s: fix missing fc type/sub-type for 802.11 pkts (bsc#1209980).
- mt76: mt7921s: fix mt7921s_mcu_[fw|drv]_pmctrl (bsc#1209980).
- mt76: mt7921s: fix possible kernel crash due to invalid Rx count (bsc#1209980).
- mt76: mt7921s: fix possible sdio deadlock in command fail (bsc#1209980).
- mt76: mt7921s: fix suspend error with enlarging mcu timeout value (bsc#1209980).
- mt76: mt7921s: fix the device cannot sleep deeply in suspend (bsc#1209980).
- mt76: mt7921s: make pm-&gt;suspended usage consistent (bsc#1209980).
- mt76: mt7921s: run sleep mode by default (bsc#1209980).
- mt76: mt7921s: update mt7921s_wfsys_reset sequence (bsc#1209980).
- mt76: only access ieee80211_hdr after mt76_insert_ccmp_hdr (bsc#1209980).
- mt76: only set rx radiotap flag from within decoder functions (bsc#1209980).
- mt76: redefine mt76_for_each_q_rx to adapt mt7986 changes (bsc#1209980).
- mt76: rely on phy pointer in mt76_register_debugfs_fops routine signature (bsc#1209980).
- mt76: remove mt76_wcid pointer from mt76_tx_status_check signature (bsc#1209980).
- mt76: remove variable set but not used (bsc#1209980).
- mt76: reverse the first fragmented frame to 802.11 (bsc#1209980).
- mt76: schedule status timeout at dma completion (bsc#1209980).
- mt76: sdio: disable interrupt in mt76s_sdio_irq (bsc#1209980).
- mt76: sdio: export mt76s_alloc_rx_queue and mt76s_alloc_tx routines (bsc#1209980).
- mt76: sdio: extend sdio module to support CONNAC2 (bsc#1209980).
- mt76: sdio: honor the largest Tx buffer the hardware can support (bsc#1209980).
- mt76: sdio: introduce parse_irq callback (bsc#1209980).
- mt76: sdio: lock sdio when it is needed (bsc#1209980).
- mt76: sdio: move common code in mt76_sdio module (bsc#1209980).
- mt76: set wlan_idx_hi on mt7916 (bsc#1209980).
- mt76: split single ldpc cap bit into bits (bsc#1209980).
- mt76: substitute sk_buff_head status_list with spinlock_t status_lock (bsc#1209980).
- mt76: support reading EEPROM data embedded in fdt (bsc#1209980).
- mt76: switch from 'pci_' to 'dma_' API (bsc#1209980).
- mt76: testmode: add support to set MAC (bsc#1209980).
- mt76: usb: add req_type to ___mt76u_rr signature (bsc#1209980).
- mt76: usb: add req_type to ___mt76u_wr signature (bsc#1209980).
- mt76: usb: introduce __mt76u_init utility routine (bsc#1209980).
- mt76: use IEEE80211_OFFLOAD_ENCAP_ENABLED instead of MT_DRV_AMSDU_OFFLOAD (bsc#1209980).
- mt76: use a separate CCMP PN receive counter for management frames (bsc#1209980).
- mt76: use le32/16_get_bits() whenever possible (bsc#1209980).
- mt76x02: improve mac error check/reset reliability (bsc#1209980).
- mtd: core: fix error path for nvmem provider (git-fixes).
- mtd: core: fix nvmem error reporting (git-fixes).
- mtd: core: provide unique name for nvmem device, take two (git-fixes).
- mtd: dataflash: remove duplicate SPI ID table (git-fixes).
- mtd: rawnand: fsl_elbc: Propagate HW ECC settings to HW (git-fixes).
- mtd: rawnand: ingenic: fix empty stub helper definitions (git-fixes).
- mtd: rawnand: marvell: do not set the NAND frequency select (git-fixes).
- mtd: rawnand: marvell: ensure timing values are written (git-fixes).
- mtd: rawnand: meson: fix bitmask for length in command word (git-fixes).
- mtd: rawnand: meson: fix unaligned DMA buffers handling (git-fixes).
- mtd: rawnand: meson: invalidate cache on polling ECC bit (git-fixes).
- mtd: rawnand: stm32_fmc2: remove unsupported EDO mode (git-fixes).
- mtd: rawnand: stm32_fmc2: use timings.mode instead of checking tRC_min (git-fixes).
- mtd: rawnand: sunxi: Clean up chips after failed init (git-fixes).
- mtd: rawnand: sunxi: Fix the size of the last OOB region (git-fixes).
- mtd: spi-nor: Fix a trivial typo (git-fixes).
- mtd: spi-nor: Fix shift-out-of-bounds in spi_nor_set_erase_type (git-fixes).
- mtd: spi-nor: core: fix implicit declaration warning (git-fixes).
- mtd: spi-nor: sfdp: Fix index value for SCCR dwords (git-fixes).
- mtd: spi-nor: spansion: Consider reserved bits in CFR5 register (git-fixes).
- mtdblock: tolerate corrected bit-flips (git-fixes).
- nbd: Fix hung on disconnect request if socket is closed before (git-fixes).
- nbd: Fix hung when signal interrupts nbd_start_device_ioctl() (git-fixes).
- nbd: Fix hungtask when nbd_config_put (git-fixes).
- nbd: add missing definition of pr_fmt (git-fixes).
- nbd: call genl_unregister_family() first in nbd_cleanup() (git-fixes).
- nbd: fix io hung while disconnecting device (git-fixes).
- nbd: fix race between nbd_alloc_config() and module removal (git-fixes).
- net/iucv: Fix size of interrupt data (bsc#1211465 git-fixes).
- net/mlx5: Add forgotten cleanup calls into mlx5_init_once() error path (jsc#PED-1549).
- net/mlx5: Add forgotten cleanup calls into mlx5_init_once() error path (jsc#SLE-19253).
- net/mlx5: Allow async trigger completion execution on single CPU systems (jsc#SLE-19253).
- net/mlx5: Allow future addition of IPsec object modifiers (jsc#SLE-19253).
- net/mlx5: Avoid false positive lockdep warning by adding lock_class_key (jsc#SLE-19253).
- net/mlx5: Avoid recovery in probe flows (jsc#PED-1549 bsc#1211794).
- net/mlx5: Avoid recovery in probe flows (jsc#SLE-19253).
- net/mlx5: Bridge, fix ageing of peer FDB entries (jsc#PED-1549).
- net/mlx5: Bridge, fix ageing of peer FDB entries (jsc#SLE-19253).
- net/mlx5: Bridge, verify LAG state when adding bond to bridge (jsc#SLE-19253).
- net/mlx5: Collect command failures data only for known commands (jsc#PED-1549).
- net/mlx5: DR, Check force-loopback RC QP capability independently from RoCE (jsc#PED-1549).
- net/mlx5: DR, Check force-loopback RC QP capability independently from RoCE (jsc#SLE-19253).
- net/mlx5: DR, Fix crc32 calculation to work on big-endian (BE) CPUs (jsc#PED-1549).
- net/mlx5: DR, Fix crc32 calculation to work on big-endian (BE) CPUs (jsc#SLE-19253).
- net/mlx5: DR, Fix missing flow_source when creating multi-destination FW table (jsc#SLE-19253).
- net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device (jsc#PED-1549).
- net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device (jsc#SLE-19253).
- net/mlx5: Devcom, serialize devcom registration (jsc#PED-1549).
- net/mlx5: Disable eswitch before waiting for VF pages (jsc#PED-1549).
- net/mlx5: Do not advertise IPsec netdev support for non-IPsec device (jsc#SLE-19253).
- net/mlx5: Do not use already freed action pointer (jsc#SLE-19253).
- net/mlx5: Dynamically resize flow counters query buffer (bsc#1195175).
- net/mlx5: E-Switch, Fix an Oops in error handling code (jsc#PED-1549).
- net/mlx5: E-Switch, Fix an Oops in error handling code (jsc#SLE-19253).
- net/mlx5: E-Switch, properly handle ingress tagged packets on VST (jsc#PED-1549).
- net/mlx5: E-Switch, properly handle ingress tagged packets on VST (jsc#SLE-19253).
- net/mlx5: E-switch, Create per vport table based on devlink encap mode (jsc#PED-1549).
- net/mlx5: E-switch, Create per vport table based on devlink encap mode (jsc#SLE-19253).
- net/mlx5: E-switch, Do not destroy indirect table in split rule (jsc#PED-1549).
- net/mlx5: E-switch, Do not destroy indirect table in split rule (jsc#SLE-19253).
- net/mlx5: E-switch, Fix missing set of split_count when forward to ovs internal port (jsc#PED-1549).
- net/mlx5: E-switch, Fix missing set of split_count when forward to ovs internal port (jsc#SLE-19253).
- net/mlx5: E-switch, Fix setting of reserved fields on MODIFY_SCHEDULING_ELEMENT (jsc#PED-1549).
- net/mlx5: E-switch, Fix setting of reserved fields on MODIFY_SCHEDULING_ELEMENT (jsc#SLE-19253).
- net/mlx5: E-switch, Fix switchdev mode after devlink reload (jsc#PED-1549).
- net/mlx5: E-switch, Fix wrong usage of source port rewrite in split rules (jsc#PED-1549).
- net/mlx5: ECPF, wait for VF pages only after disabling host PFs (jsc#PED-1549).
- net/mlx5: Enhance debug print in page allocation failure (jsc#PED-1549).
- net/mlx5: Enhance debug print in page allocation failure (jsc#SLE-19253).
- net/mlx5: Expose SF firmware pages counter (jsc#PED-1549).
- net/mlx5: Fix FW tracer timestamp calculation (jsc#SLE-19253).
- net/mlx5: Fix RoCE setting at HCA level (jsc#PED-1549).
- net/mlx5: Fix RoCE setting at HCA level (jsc#SLE-19253).
- net/mlx5: Fix command stats access after free (jsc#PED-1549).
- net/mlx5: Fix crash during sync firmware reset (jsc#SLE-19253).
- net/mlx5: Fix error message when failing to allocate device memory (jsc#PED-1549).
- net/mlx5: Fix error message when failing to allocate device memory (jsc#SLE-19253).
- net/mlx5: Fix handling of entry refcount when command is not issued to FW (jsc#SLE-19253).
- net/mlx5: Fix io_eq_size and event_eq_size params validation (jsc#PED-1549).
- net/mlx5: Fix possible use-after-free in async command interface (jsc#SLE-19253).
- net/mlx5: Fix ptp max frequency adjustment range (jsc#PED-1549).
- net/mlx5: Fix ptp max frequency adjustment range (jsc#SLE-19253).
- net/mlx5: Fix setting ec_function bit in MANAGE_PAGES (jsc#PED-1549).
- net/mlx5: Fix steering rules cleanup (jsc#PED-1549).
- net/mlx5: Fix steering rules cleanup (jsc#SLE-19253).
- net/mlx5: Fix uninitialized variable bug in outlen_write() (jsc#SLE-19253).
- net/mlx5: Geneve, Fix handling of Geneve object id as error code (jsc#PED-1549).
- net/mlx5: Geneve, Fix handling of Geneve object id as error code (jsc#SLE-19253).
- net/mlx5: Handle pairing of E-switch via uplink un/load APIs (jsc#PED-1549).
- net/mlx5: Initialize flow steering during driver probe (jsc#SLE-19253).
- net/mlx5: Lag, fix failure to cancel delayed bond work (jsc#PED-1549).
- net/mlx5: Read embedded cpu after init bit cleared (jsc#PED-1549).
- net/mlx5: Read embedded cpu after init bit cleared (jsc#SLE-19253).
- net/mlx5: Read the TC mapping of all priorities on ETS query (jsc#PED-1549).
- net/mlx5: Read the TC mapping of all priorities on ETS query (jsc#SLE-19253).
- net/mlx5: Rearm the FW tracer after each tracer event (jsc#SLE-19253).
- net/mlx5: SF, Drain health before removing device (jsc#PED-1549).
- net/mlx5: SF, Drain health before removing device (jsc#SLE-19253).
- net/mlx5: SF: Fix probing active SFs during driver probe phase (jsc#SLE-19253).
- net/mlx5: Serialize module cleanup with reload and remove (jsc#PED-1549).
- net/mlx5: Serialize module cleanup with reload and remove (jsc#SLE-19253).
- net/mlx5: Set BREAK_FW_WAIT flag first when removing driver (jsc#PED-1549).
- net/mlx5: Store page counters in a single array (jsc#PED-1549).
- net/mlx5: Wait for firmware to enable CRS before pci_restore_state (jsc#SLE-19253).
- net/mlx5: add IFC bits for bypassing port select flow table (git-fixes)
- net/mlx5: check attr pointer validity before dereferencing it (jsc#PED-1549).
- net/mlx5: check attr pointer validity before dereferencing it (jsc#SLE-19253).
- net/mlx5: correct ECE offset in query qp output (jsc#SLE-19253).
- net/mlx5: fix missing mutex_unlock in mlx5_fw_fatal_reporter_err_work() (jsc#SLE-19253).
- net/mlx5: fs, fail conflicting actions (jsc#SLE-19253).
- net/mlx5: fw_tracer, Clear load bit when freeing string DBs buffers (jsc#PED-1549).
- net/mlx5: fw_tracer, Clear load bit when freeing string DBs buffers (jsc#SLE-19253).
- net/mlx5: fw_tracer, Fix event handling (jsc#PED-1549).
- net/mlx5: fw_tracer, Fix event handling (jsc#SLE-19253).
- net/mlx5: fw_tracer, Zero consumer index when reloading the tracer (jsc#PED-1549).
- net/mlx5: fw_tracer, Zero consumer index when reloading the tracer (jsc#SLE-19253).
- net/mlx5e: Always clear dest encap in neigh-update-del (jsc#PED-1549).
- net/mlx5e: Always clear dest encap in neigh-update-del (jsc#SLE-19253).
- net/mlx5e: Avoid false lock dependency warning on tc_ht even more (jsc#PED-1549).
- net/mlx5e: Avoid false lock dependency warning on tc_ht even more (jsc#SLE-19253).
- net/mlx5e: Block entering switchdev mode with ns inconsistency (jsc#PED-1549).
- net/mlx5e: Block entering switchdev mode with ns inconsistency (jsc#SLE-19253).
- net/mlx5e: CT: Fix ct debugfs folder name (jsc#PED-1549).
- net/mlx5e: Do not attach netdev profile while handling internal error (jsc#PED-1549).
- net/mlx5e: Do not attach netdev profile while handling internal error (jsc#SLE-19253).
- net/mlx5e: Do not cache tunnel offloads capability (jsc#PED-1549).
- net/mlx5e: Do not clone flow post action attributes second time (jsc#PED-1549).
- net/mlx5e: Do not increment ESN when updating IPsec ESN state (jsc#SLE-19253).
- net/mlx5e: Do not support encap rules with gbp option (jsc#PED-1549).
- net/mlx5e: Do not support encap rules with gbp option (jsc#SLE-19253).
- net/mlx5e: E-Switch, Fix comparing termination table instance (jsc#SLE-19253).
- net/mlx5e: Extend SKB room check to include PTP-SQ (jsc#SLE-19253).
- net/mlx5e: Fix MPLSoUDP encap to use MPLS action information (jsc#SLE-19253).
- net/mlx5e: Fix RX reporter for XSK RQs (jsc#PED-1549).
- net/mlx5e: Fix SQ wake logic in ptp napi_poll context (jsc#PED-1549).
- net/mlx5e: Fix SQ wake logic in ptp napi_poll context (jsc#SLE-19253).
- net/mlx5e: Fix capability check for updating vnic env counters (jsc#SLE-19253).
- net/mlx5e: Fix cleanup null-ptr deref on encap lock (jsc#PED-1549).
- net/mlx5e: Fix crash unsetting rx-vlan-filter in switchdev mode (jsc#PED-1549).
- net/mlx5e: Fix deadlock in tc route query code (jsc#PED-1549).
- net/mlx5e: Fix error handling in mlx5e_refresh_tirs (jsc#PED-1549).
- net/mlx5e: Fix error handling in mlx5e_refresh_tirs (jsc#SLE-19253).
- net/mlx5e: Fix hw mtu initializing at XDP SQ allocation (jsc#PED-1549).
- net/mlx5e: Fix hw mtu initializing at XDP SQ allocation (jsc#SLE-19253).
- net/mlx5e: Fix macsec ASO context alignment (jsc#PED-1549).
- net/mlx5e: Fix macsec possible null dereference when updating MAC security entity (SecY) (jsc#PED-1549).
- net/mlx5e: Fix macsec ssci attribute handling in offload path (jsc#PED-1549).
- net/mlx5e: Fix the value of MLX5E_MAX_RQ_NUM_MTTS (jsc#SLE-19253).
- net/mlx5e: Fix use-after-free when reverting termination table (jsc#SLE-19253).
- net/mlx5e: Fix wrong application of the LRO state (jsc#SLE-19253).
- net/mlx5e: Fix wrong tc flag used when set hw-tc-offload off (jsc#SLE-19253).
- net/mlx5e: IPoIB, Block PKEY interfaces with less rx queues than parent (jsc#PED-1549).
- net/mlx5e: IPoIB, Block queue count configuration when sub interfaces are present (jsc#PED-1549).
- net/mlx5e: IPoIB, Do not allow CQE compression to be turned on by default (jsc#PED-1549).
- net/mlx5e: IPoIB, Do not allow CQE compression to be turned on by default (jsc#SLE-19253).
- net/mlx5e: IPoIB, Fix child PKEY interface stats on rx path (jsc#PED-1549).
- net/mlx5e: IPoIB, Show unknown speed instead of error (jsc#PED-1549).
- net/mlx5e: IPoIB, Show unknown speed instead of error (jsc#SLE-19253).
- net/mlx5e: Initialize link speed to zero (jsc#PED-1549).
- net/mlx5e: Modify slow path rules to go to slow fdb (jsc#SLE-19253).
- net/mlx5e: Nullify table pointer when failing to create (jsc#PED-1549).
- net/mlx5e: Overcome slow response for first macsec ASO WQE (jsc#PED-1549).
- net/mlx5e: QoS, Fix wrongfully setting parent_element_id on MODIFY_SCHEDULING_ELEMENT (jsc#PED-1549).
- net/mlx5e: QoS, Fix wrongfully setting parent_element_id on MODIFY_SCHEDULING_ELEMENT (jsc#SLE-19253).
- net/mlx5e: Remove redundant xsk pointer check in mlx5e_mpwrq_validate_xsk (jsc#PED-1549).
- net/mlx5e: Set decap action based on attr for sample (jsc#PED-1549).
- net/mlx5e: Set geneve_tlv_option_0_exist when matching on geneve option (jsc#PED-1549).
- net/mlx5e: Set uplink rep as NETNS_LOCAL (jsc#PED-1549).
- net/mlx5e: Set uplink rep as NETNS_LOCAL (jsc#SLE-19253).
- net/mlx5e: TC, Fix ct_clear overwriting ct action metadata (jsc#SLE-19253).
- net/mlx5e: TC, Keep mod hdr actions after mod hdr alloc (jsc#PED-1549).
- net/mlx5e: Update rx ring hw mtu upon each rx-fcs flag change (jsc#PED-1549).
- net/mlx5e: Update rx ring hw mtu upon each rx-fcs flag change (jsc#SLE-19253).
- net/mlx5e: Use correct encap attribute during invalidation (jsc#PED-1549).
- net/mlx5e: Verify dev is present for fix features ndo (jsc#PED-1549).
- net/mlx5e: Verify flow_source cap before using it (jsc#PED-1549).
- net/mlx5e: Verify flow_source cap before using it (jsc#SLE-19253).
- net/mlx5e: do as little as possible in napi poll when budget is 0 (jsc#PED-1549).
- net/mlx5e: do as little as possible in napi poll when budget is 0 (jsc#SLE-19253).
- net/mlx5e: kTLS, Fix build time constant test in RX (jsc#SLE-19253).
- net/mlx5e: kTLS, Fix build time constant test in TX (jsc#SLE-19253).
- net/net_failover: fix txq exceeding warning (git-fixes).
- net/rose: Fix to not accept on connected socket (git-fixes).
- net/sched: fix initialization order when updating chain 0 head (git-fixes).
- net/sched: flower: fix possible OOB write in fl_set_geneve_opt() (git-fixes).
- net/sched: sch_netem: Fix arithmetic in netem_dump() for 32-bit platforms (git-fixes).
- net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change (git-fixes).
- net/tg3: resolve deadlock in tg3_reset_task() during EEH (bsc#1207842).
- net/usb: kalmia: Do not pass act_len in usb_bulk_msg error path (git-fixes).
- net/x25: Fix to not accept on connected socket (git-fixes).
- net: USB: Fix wrong-direction WARNING in plusb.c (git-fixes).
- net: accept UFOv6 packages in virtio_net_hdr_to_skb (git-fixes).
- net: add missing include in include/net/gro.h (git-fixes).
- net: asix: fix modprobe 'sysfs: cannot create duplicate filename' (git-fixes).
- net: cdc_ncm: Deal with too low values of dwNtbOutMaxSize (git-fixes).
- net: devlink: Fix missing mutex_unlock() call (git-fixes).
- net: ena: Account for the number of processed bytes in XDP (git-fixes).
- net: ena: Do not register memory info on XDP exchange (git-fixes).
- net: ena: Fix rx_copybreak value update (git-fixes).
- net: ena: Fix toeplitz initial hash value (git-fixes).
- net: ena: Set default value for RX interrupt moderation (git-fixes).
- net: ena: Update NUMA TPH hint register upon NUMA node update (git-fixes).
- net: ena: Use bitmask to indicate packet redirection (git-fixes).
- net: hns3: add interrupts re-initialization while doing VF FLR (git-fixes).
- net: hns3: fix output information incomplete for dumping tx queue info with debugfs (git-fixes).
- net: hns3: fix reset delay time to avoid configuration timeout (git-fixes).
- net: hns3: fix sending pfc frames after reset issue (git-fixes).
- net: hns3: fix tm port shapping of fibre port is incorrect after driver initialization (git-fixes).
- net: linkwatch: be more careful about dev-&gt;linkwatch_dev_tracker (git-fixes).
- net: mana: Add new MANA VF performance counters for easier troubleshooting (bsc#1209982).
- net: mana: Add support for auxiliary device (bsc#1210741 jsc#PED-4022).
- net: mana: Add support for jumbo frame (bsc#1210551).
- net: mana: Assign interrupts to CPUs based on NUMA nodes (bsc#1208153).
- net: mana: Check if netdev/napi_alloc_frag returns single page (bsc#1210551).
- net: mana: Define and process GDMA response code GDMA_STATUS_MORE_ENTRIES (bsc#1210741 jsc#PED-4022).
- net: mana: Define data structures for allocating doorbell page from GDMA (bsc#1210741 jsc#PED-4022).
- net: mana: Define data structures for protection domain and memory registration (bsc#1210741 jsc#PED-4022).
- net: mana: Define max values for SGL entries (bsc#1210741 jsc#PED-4022).
- net: mana: Enable RX path to handle various MTU sizes (bsc#1210551).
- net: mana: Export Work Queue functions for use by RDMA driver (bsc#1210741 jsc#PED-4022).
- net: mana: Fix IRQ name - add PCI and queue number (bsc#1207875).
- net: mana: Fix accessing freed irq affinity_hint (bsc#1208153).
- net: mana: Fix perf regression: remove rx_cqes, tx_cqes counters (git-fixes).
- net: mana: Handle vport sharing between devices (bsc#1210741 jsc#PED-4022).
- net: mana: Move header files to a common location (bsc#1210741 jsc#PED-4022).
- net: mana: Record port number in netdev (bsc#1210741 jsc#PED-4022).
- net: mana: Record the physical address for doorbell page region (bsc#1210741 jsc#PED-4022).
- net: mana: Refactor RX buffer allocation code to prepare for various MTU (bsc#1210551).
- net: mana: Rename mana_refill_rxoob and remove some empty lines (bsc#1210551).
- net: mana: Set the DMA device max segment size (bsc#1210741 jsc#PED-4022).
- net: mana: Use napi_build_skb in RX path (bsc#1210551).
- net: mdio: mvusb: Fix an error handling path in mvusb_mdio_probe() (git-fixes).
- net: mdio: thunder: Add missing fwnode_handle_put() (git-fixes).
- net: mellanox: mlxbf_gige: Fix skb_panic splat under memory pressure (bsc#1211564).
- net: mlx5: eliminate anonymous module_init &amp; module_exit (jsc#PED-1549).
- net: mlx5: eliminate anonymous module_init &amp; module_exit (jsc#SLE-19253).
- net: natsemi: fix hw address initialization for jazz and xtensa (git-fixes).
- net: of: fix stub of_net helpers for CONFIG_NET=n (git-fixes).
- net: openvswitch: fix possible memory leak in ovs_meter_cmd_set() (git-fixes).
- net: phy: Ensure state transitions are processed from phy_stop() (git-fixes).
- net: phy: dp83822: Fix null pointer access on DP83825/DP83826 devices (git-fixes).
- net: phy: dp83867: add w/a for packet errors seen with short cables (git-fixes).
- net: phy: dp83869: fix default value for tx-/rx-internal-delay (git-fixes).
- net: phy: meson-gxl: Add generic dummy stubs for MMD register access (git-fixes).
- net: phy: meson-gxl: use MMD access dummy stubs for GXL, internal PHY (git-fixes).
- net: phy: mxl-gpy: add MDINT workaround (git-fixes).
- net: phy: nxp-c45-tja11xx: add remove callback (git-fixes).
- net: phy: nxp-c45-tja11xx: fix MII_BASIC_CONFIG_REV bit (git-fixes).
- net: phy: nxp-c45-tja11xx: fix unsigned long multiplication overflow (git-fixes).
- net: phy: smsc: bail out in lan87xx_read_status if genphy_read_status fails (git-fixes).
- net: qcom/emac: Fix use after free bug in emac_remove due to race condition (git-fixes).
- net: qrtr: correct types of trace event parameters (git-fixes).
- net: sched: fix possible refcount leak in tc_chain_tmplt_add() (git-fixes).
- net: skip virtio_net_hdr_set_proto if protocol already set (git-fixes).
- net: tun: avoid disabling NAPI twice (git-fixes).
- net: tun: fix bugs for oversize packet when napi frags enabled (git-fixes).
- net: tun: stop NAPI when detaching queues (git-fixes).
- net: tun: unlink NAPI from device on destruction (git-fixes).
- net: usb: asix: remove redundant assignment to variable reg (git-fixes).
- net: usb: cdc_ether: add support for Thales Cinterion PLS62-W modem (git-fixes).
- net: usb: cdc_mbim: avoid altsetting toggling for Telit FE990 (git-fixes).
- net: usb: lan78xx: Limit packet length to skb-&gt;len (git-fixes).
- net: usb: qmi_wwan: Set DTR quirk for BroadMobi BM818 (git-fixes).
- net: usb: qmi_wwan: add Telit 0x1080 composition (git-fixes).
- net: usb: qmi_wwan: add support for Compal RXM-G1 (git-fixes).
- net: usb: smsc75xx: Limit packet length to skb-&gt;len (git-fixes).
- net: usb: smsc75xx: Move packet length check to prevent kernel panic in skb_pull (git-fixes).
- net: usb: smsc95xx: Limit packet length to skb-&gt;len (git-fixes).
- net: usb: use eth_hw_addr_set() (git-fixes).
- net: virtio_net_hdr_to_skb: count transport header in UFO (git-fixes).
- netrom: Fix use-after-free caused by accept on already connected socket (git-fixes).
- netrom: Fix use-after-free of a listening socket (git-fixes).
- nfc: change order inside nfc_se_io error path (git-fixes).
- nfc: fdp: add null check of devm_kmalloc_array in fdp_nci_i2c_read_device_properties (git-fixes).
- nfc: fix memory leak of se_io context in nfc_genl_se_io (git-fixes).
- nfc: pn533: initialize struct pn533_out_arg properly (git-fixes).
- nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition (git-fixes).
- nfcsim.c: Fix error checking for debugfs_create_dir (git-fixes).
- nfp: flower-ct: fix error return code in nfp_fl_ct_add_offload() (git-fixes).
- nfp: flower: fix ingress police using matchall filter (git-fixes).
- nfp: only report pause frame configuration for physical device (git-fixes).
- nfs4: Fix kmemleak when allocate slot failed (git-fixes).
- nfs4trace: fix state manager flag printing (git-fixes).
- nfs: Always initialise fattr-&gt;label in nfs_fattr_alloc() (git-fixes).
- nfs: Avoid writeback threads getting stuck in mempool_alloc() (git-fixes).
- nfs: Cleanup unused rpc_clnt variable (git-fixes).
- nfs: Create a new nfs_alloc_fattr_with_label() function (git-fixes).
- nfs: Do not allocate nfs_fattr on the stack in __nfs42_ssc_open() (git-fixes).
- nfs: Fix an Oops in nfs_d_automount() (git-fixes).
- nfs: Further optimisations for 'ls -l' (git-fixes).
- nfs: Pass i_size to fscache_unuse_cookie() when a file is released (git-fixes).
- nfs: fix disabling of swap (git-fixes).
- nfs: nfs4clinet: check the return value of kstrdup() (git-fixes).
- nfs: nfsiod should not block forever in mempool_alloc() (git-fixes).
- nfsd: Avoid calling OPDESC() with ops-&gt;opnum == OP_ILLEGAL (git-fixes).
- nfsd: COMMIT operations must not return NFS?ERR_INVAL (git-fixes).
- nfsd: De-duplicate net_generic(nf-&gt;nf_net, nfsd_net_id) (git-fixes).
- nfsd: Finish converting the NFSv2 GETACL result encoder (git-fixes).
- nfsd: Finish converting the NFSv3 GETACL result encoder (git-fixes).
- nfsd: Fix a memory leak in an error handling path (git-fixes).
- nfsd: Fix handling of oversized NFSv4 COMPOUND requests (git-fixes).
- nfsd: Fix nfsd_breaker_owns_lease() return values (git-fixes).
- nfsd: Have legacy NFSD WRITE decoders use xdr_stream_subsegment() (git-fixes).
- nfsd: Protect against filesystem freezing (git-fixes).
- nfsd: Return nfserr_serverfault if splice_ok but buf-&gt;pages have data (git-fixes).
- nfsd: call op_release, even when op_func returns an error (git-fixes).
- nfsd: callback request does not use correct credential for AUTH_SYS (git-fixes).
- nfsd: do not call nfsd_file_put from client states seqfile display (git-fixes).
- nfsd: fix handling of readdir in v4root vs. mount upcall timeout (git-fixes).
- nfsd: fix leaked reference count of nfsd4_ssc_umount_item (git-fixes).
- nfsd: fix problems with cleanup on errors in nfsd4_copy (git-fixes).
- nfsd: fix race to check ls_layouts (git-fixes).
- nfsd: fix use-after-free in nfsd4_ssc_setup_dul() (git-fixes).
- nfsd: fix use-after-free on source server when doing inter-server copy (git-fixes).
- nfsd: pass range end to vfs_fsync_range() instead of count (git-fixes).
- nfsd: shut down the NFSv4 state objects before the filecache (git-fixes).
- nfsd: under NFSv4.1, fix double svc_xprt_put on rpc_create failure (git-fixes).
- nfsd: zero out pointers after putting nfsd_files on COPY setup error (git-fixes).
- nfsv3: handle out-of-order write replies (bsc#1205544).
- nfsv4 expose nfs_parse_server_name function (git-fixes).
- nfsv4 handle port presence in fs_location server string (git-fixes).
- nfsv4 only print the label when its queried (git-fixes).
- nfsv4 remove zero number of fs_locations entries error check (git-fixes).
- nfsv4 store server support for fs_location attribute (git-fixes).
- nfsv4.1 provide mount option to toggle trunking discovery (git-fixes).
- nfsv4.1 query for fs_location attr on a new file system (git-fixes).
- nfsv4.1: Fix uninitialised variable in devicenotify (git-fixes).
- nfsv4.1: Handle RECLAIM_COMPLETE trunking errors (git-fixes).
- nfsv4.1: We must always send RECLAIM_COMPLETE after a reboot (git-fixes).
- nfsv4.2: Clear FATTR4_WORD2_SECURITY_LABEL when done decoding (git-fixes).
- nfsv4.2: Fix a memory stomp in decode_attr_security_label (git-fixes).
- nfsv4.2: Fix initialisation of struct nfs4_label (git-fixes).
- nfsv4.2: Fixup CLONE dest file size for zero-length count (git-fixes).
- nfsv4.2: fix reference count leaks in _nfs42_proc_copy_notify() (git-fixes).
- nfsv4.x: Fail client initialisation if state manager thread can't run (git-fixes).
- nfsv4/pNFS: Always return layout stats on layout return for flexfiles (git-fixes).
- nfsv4/pnfs: Fix a use-after-free bug in open (git-fixes).
- nfsv4: Add an fattr allocation to _nfs4_discover_trunking() (git-fixes).
- nfsv4: Do not hold the layoutget locks across multiple RPC calls (git-fixes).
- nfsv4: Fix a credential leak in _nfs4_discover_trunking() (git-fixes).
- nfsv4: Fix a deadlock between nfs4_open_recover_helper() and delegreturn (git-fixes).
- nfsv4: Fix a potential state reclaim deadlock (git-fixes).
- nfsv4: Fix free of uninitialized nfs4_label on referral lookup (git-fixes).
- nfsv4: Fix hangs when recovering open state after a server reboot (git-fixes).
- nfsv4: Protect the state recovery thread against direct reclaim (git-fixes).
- nfsv4: Retry LOCK on OLD_STATEID during delegation return (git-fixes).
- nfsv4: keep state manager thread active if swap is enabled (git-fixes).
- nilfs2: do not write dirty data after degenerating to read-only (git-fixes).
- nilfs2: fix buffer corruption due to concurrent device reads (git-fixes).
- nilfs2: fix general protection fault in nilfs_btree_insert() (git-fixes).
- nilfs2: fix incomplete buffer cleanup in nilfs_btnode_abort_change_key() (git-fixes).
- nilfs2: fix infinite loop in nilfs_mdt_get_block() (git-fixes).
- nilfs2: fix kernel-infoleak in nilfs_ioctl_wrap_copy() (git-fixes).
- nilfs2: fix possible out-of-bounds segment allocation in resize ioctl (git-fixes).
- nilfs2: fix potential UAF of struct nilfs_sc_info in nilfs_segctor_thread() (git-fixes).
- nilfs2: fix sysfs interface lifetime (git-fixes).
- nilfs2: fix underflow in second superblock position calculations (git-fixes).
- nilfs2: fix use-after-free bug of nilfs_root in nilfs_evict_inode() (git-fixes).
- nilfs2: initialize unused bytes in segment summary blocks (git-fixes).
- nouveau: fix client work fence deletion race (git-fixes).
- ntb: amd: Fix error handling in amd_ntb_pci_driver_init() (git-fixes).
- ntb: idt: Fix error handling in idt_pci_driver_init() (git-fixes).
- ntb: intel: Fix error handling in intel_ntb_pci_driver_init() (git-fixes).
- ntb: ntb_tool: Add check for devm_kcalloc (git-fixes).
- ntb: ntb_transport: fix possible memory leak while device_register() fails (git-fixes).
- null_blk: fix ida error handling in null_add_dev() (git-fixes).
- nvdimm: disable namespace on error (bsc#1166486).
- nvme initialize core quirks before calling nvme_init_subsystem (git-fixes).
- nvme-auth: check chap ctrl_key once constructed (bsc#1202633).
- nvme-auth: clear sensitive info right after authentication completes (bsc#1202633).
- nvme-auth: convert dhchap_auth_list to an array (bsc#1202633).
- nvme-auth: do not ignore key generation failures when initializing ctrl keys (bsc#1202633).
- nvme-auth: do not keep long lived 4k dhchap buffer (bsc#1202633).
- nvme-auth: do not override ctrl keys before validation (bsc#1202633).
- nvme-auth: do not re-authenticate if the controller is not LIVE (bsc#1202633).
- nvme-auth: do not use NVMe status codes (bsc#1202633).
- nvme-auth: fix an error code in nvme_auth_process_dhchap_challenge() (bsc#1202633).
- nvme-auth: fix smatch warning complaints (bsc#1202633).
- nvme-auth: guarantee dhchap buffers under memory pressure (bsc#1202633).
- nvme-auth: have dhchap_auth_work wait for queues auth to complete (bsc#1202633).
- nvme-auth: mark nvme_auth_wq static (bsc#1202633).
- nvme-auth: no need to reset chap contexts on re-authentication (bsc#1202633).
- nvme-auth: remove redundant auth_work flush (bsc#1202633).
- nvme-auth: remove redundant buffer deallocations (bsc#1202633).
- nvme-auth: remove redundant deallocations (bsc#1202633).
- nvme-auth: remove redundant if statement (bsc#1202633).
- nvme-auth: remove symbol export from nvme_auth_reset (bsc#1202633).
- nvme-auth: rename __nvme_auth_[reset|free] to nvme_auth[reset|free]_dhchap (bsc#1202633).
- nvme-auth: rename authentication work elements (bsc#1202633).
- nvme-auth: uninitialized variable in nvme_auth_transform_key() (git-fixes).
- nvme-auth: use workqueue dedicated to authentication (bsc#1202633).
- nvme-core: fix dev_pm_qos memleak (git-fixes).
- nvme-core: fix memory leak in dhchap_ctrl_secret (git-fixes).
- nvme-core: fix memory leak in dhchap_secret_store (git-fixes).
- nvme-fabrics: show well known discovery name (bsc#1200054).
- nvme-fc: fix a missing queue put in nvmet_fc_ls_create_association (git-fixes).
- nvme-fcloop: fix 'inconsistent {IN-HARDIRQ-W} -&gt; {HARDIRQ-ON-W} usage' (git-fixes).
- nvme-hwmon: consistently ignore errors from nvme_hwmon_init (git-fixes).
- nvme-hwmon: kmalloc the NVME SMART log buffer (git-fixes).
- nvme-multipath: fix hang when disk goes live over reconnect (git-fixes).
- nvme-multipath: fix possible hang in live ns resize with ANA access (git-fixes).
- nvme-multipath: support io stats on the mpath device (bsc#1210565).
- nvme-pci: add bogus ID quirk for ADATA SX6000PNP (bsc#1207827).
- nvme-pci: add quirk for missing secondary temperature thresholds (git-fixes).
- nvme-pci: add quirks for Samsung X5 SSDs (git-fixes).
- nvme-pci: add the IGNORE_DEV_SUBNQN quirk for Intel P4500/P4600 SSDs (git-fixes).
- nvme-pci: avoid the deepest sleep state on ZHITAI TiPro5000 SSDs (git-fixes).
- nvme-pci: avoid the deepest sleep state on ZHITAI TiPro7000 SSDs (git-fixes).
- nvme-pci: clear the prp2 field when not used (git-fixes).
- nvme-pci: disable write zeroes on various Kingston SSD (git-fixes).
- nvme-pci: fix a NULL pointer dereference in nvme_alloc_admin_tags (git-fixes).
- nvme-pci: fix doorbell buffer value endianness (git-fixes).
- nvme-pci: fix mempool alloc size (git-fixes).
- nvme-pci: fix page size checks (git-fixes).
- nvme-pci: fix timeout request state check (git-fixes).
- nvme-pci: mark Lexar NM760 as IGNORE_DEV_SUBNQN (git-fixes).
- nvme-pci: set min_align_mask before calculating max_hw_sectors (git-fixes).
- nvme-rdma: fix possible hang caused during ctrl deletion (git-fixes).
- nvme-tcp: always fail a request when sending it failed (bsc#1208902).
- nvme-tcp: fix a possible UAF when failing to allocate an io queue (git-fixes).
- nvme-tcp: fix bogus request completion when failing to send AER (git-fixes).
- nvme-tcp: fix possible circular locking when deleting a controller under memory pressure (git-fixes).
- nvme-tcp: fix possible hang caused during ctrl deletion (git-fixes).
- nvme-tcp: fix regression that causes sporadic requests to time out (git-fixes).
- nvme-tcp: lockdep: annotate in-kernel sockets (git-fixes).
- nvme: Fix IOC_PR_CLEAR and IOC_PR_RELEASE ioctls for nvme devices (git-fixes).
- nvme: add a bogus subsystem NQN quirk for Micron MTFDKBA2T0TFH (git-fixes).
- nvme: add device name to warning in uuid_show() (git-fixes).
- nvme: also return I/O command effects from nvme_command_effects (git-fixes).
- nvme: bring back auto-removal of deleted namespaces during sequential scan (git-fixes).
- nvme: catch -ENODEV from nvme_revalidate_zones again (git-fixes).
- nvme: check for duplicate identifiers earlier (git-fixes).
- nvme: cleanup __nvme_check_ids (git-fixes).
- nvme: copy firmware_rev on each init (git-fixes).
- nvme: define compat_ioctl again to unbreak 32-bit userspace (git-fixes).
- nvme: double KA polling frequency to avoid KATO with TBKAS on (git-fixes).
- nvme: fix async event trace event (git-fixes).
- nvme: fix discard support without oncs (git-fixes).
- nvme: fix handling single range discard request (git-fixes).
- nvme: fix interpretation of DMRSL (git-fixes).
- nvme: fix multipath crash caused by flush request when blktrace is enabled (git-fixes).
- nvme: fix passthrough csi check (git-fixes).
- nvme: fix per-namespace chardev deletion (git-fixes).
- nvme: fix the CRIMS and CRWMS definitions to match the spec (git-fixes).
- nvme: fix the NVME_CMD_EFFECTS_CSE_MASK definition (git-fixes).
- nvme: fix the name of Zone Append for verbose logging (git-fixes).
- nvme: fix the read-only state for zoned namespaces with unsupposed features (git-fixes).
- nvme: generalize the nvme_multi_css check in nvme_scan_ns (git-fixes).
- nvme: improve the NVME_CONNECT_AUTHREQ* definitions (git-fixes).
- nvme: introduce nvme_start_request (bsc#1210565).
- nvme: move nvme_multi_css into nvme.h (git-fixes).
- nvme: move the Samsung X5 quirk entry to the core quirks (git-fixes).
- nvme: rename nvme_validate_or_alloc_ns to nvme_scan_ns (git-fixes).
- nvme: return err on nvme_init_non_mdts_limits fail (git-fixes).
- nvme: send Identify with CNS 06h only to I/O controllers (bsc#1209693).
- nvme: set dma alignment to dword (git-fixes).
- nvme: set non-mdts limits in nvme_scan_work (git-fixes).
- nvme: use command_id instead of req-&gt;tag in trace_nvme_complete_rq() (git-fixes).
- nvmet-auth: do not try to cancel a non-initialized work_struct (git-fixes).
- nvmet-tcp: add bounds check on Transfer Tag (git-fixes).
- nvmet-tcp: fix incomplete data digest send (git-fixes).
- nvmet-tcp: fix lockdep complaint on nvmet_tcp_wq flush during queue teardown (git-fixes).
- nvmet-tcp: fix regression in data_digest calculation (git-fixes).
- nvmet-tcp: fix unhandled tcp states in nvmet_tcp_state_change() (git-fixes).
- nvmet: add helpers to set the result field for connect commands (git-fixes).
- nvmet: avoid potential UAF in nvmet_req_complete() (git-fixes).
- nvmet: do not defer passthrough commands with trivial effects to the workqueue (git-fixes).
- nvmet: fix I/O Command Set specific Identify Controller (git-fixes).
- nvmet: fix Identify Active Namespace ID list handling (git-fixes).
- nvmet: fix Identify Controller handling (git-fixes).
- nvmet: fix Identify Namespace handling (git-fixes).
- nvmet: fix a memory leak (git-fixes).
- nvmet: fix a memory leak in nvmet_auth_set_key (git-fixes).
- nvmet: fix a use-after-free (git-fixes).
- nvmet: fix invalid memory reference in nvmet_subsys_attr_qid_max_show (git-fixes).
- nvmet: fix mar and mor off-by-one errors (git-fixes).
- nvmet: fix memory leak in nvmet_subsys_attr_model_store_locked (git-fixes).
- nvmet: fix workqueue MEM_RECLAIM flushing dependency (git-fixes).
- nvmet: force reconnect when number of queue changes (git-fixes).
- nvmet: looks at the passthrough controller when initializing CAP (git-fixes).
- nvmet: move the call to nvmet_ns_changed out of nvmet_ns_revalidate (git-fixes).
- nvmet: only allocate a single slab for bvecs (git-fixes).
- nvmet: use IOCB_NOWAIT only if the filesystem supports it (git-fixes).
- nvmet: use NVME_CMD_EFFECTS_CSUPP instead of open coding it (git-fixes).
- objtool: Add a missing comma to avoid string concatenation (bsc#1207328).
- ocfs2: Fix data corruption after failed write (bsc#1208542).
- ocfs2: clear dinode links count in case of error (bsc#1207650).
- ocfs2: fix BUG when iput after ocfs2_mknod fails (bsc#1207649).
- ocfs2: fix crash when mount with quota enabled (bsc#1207640).
- ocfs2: fix defrag path triggering jbd2 ASSERT (bsc#1199304).
- ocfs2: fix defrag path triggering jbd2 ASSERT (git-fixes).
- ocfs2: fix freeing uninitialized resource on ocfs2_dlm_shutdown (git-fixes).
- ocfs2: fix memory leak in ocfs2_mount_volume() (bsc#1207652).
- ocfs2: fix memory leak in ocfs2_stack_glue_init() (bsc#1207651).
- ocfs2: fix non-auto defrag path not working issue (bsc#1199304).
- ocfs2: fix non-auto defrag path not working issue (git-fixes).
- ocfs2: ocfs2_mount_volume does cleanup job before return error (bsc#1207770).
- ocfs2: quota_local: fix possible uninitialized-variable access in ocfs2_local_read_info() (bsc#1207768).
- ocfs2: rewrite error handling of ocfs2_fill_super (bsc#1207771).
- octeon: constify netdev-&gt;dev_addr (git-fixes).
- octeontx2-pf: Avoid use of GFP_KERNEL in atomic context (git-fixes).
- octeontx2-pf: Fix resource leakage in VF driver unbind (git-fixes).
- octeontx2-pf: Fix the use of GFP_KERNEL in atomic context on rt (git-fixes).
- octeontx2-pf: Recalculate UDP checksum for ptp 1-step sync packet (git-fixes).
- of/address: Return an error when no valid dma-ranges are found (git-fixes).
- opp: Fix use-after-free in lazy_opp_tables after probe deferral (git-fixes).
- pNFS/filelayout: Fix coalescing test for single DS (git-fixes).
- panic: Consolidate open-coded panic_on_warn checks (bsc#1207328).
- panic: Introduce warn_limit (bsc#1207328).
- panic: unset panic_on_warn inside panic() (bsc#1207328).
- pci/aspm: Disable ASPM on MFD function removal to avoid use-after-free (git-fixes).
- pci/aspm: Remove pcie_aspm_pm_state_change() (git-fixes).
- pci/dpc: Await readiness of secondary bus after reset (git-fixes).
- pci/edr: Clear Device Status after EDR error recovery (git-fixes).
- pci/iov: Enlarge virtfn sysfs name buffer (git-fixes).
- pci/pm: Always disable PTM for all devices during suspend (git-fixes).
- pci/pm: Avoid putting Elo i2 PCIe Ports in D3cold (git-fixes).
- pci/pm: Fix bridge_d3_blacklist Elo i2 overwrite of Gigabyte X299 (git-fixes).
- pci/pm: Observe reset delay irrespective of bridge_d3 (git-fixes).
- pci/ptm: Add pci_suspend_ptm() and pci_resume_ptm() (git-fixes).
- pci: Add ACS quirk for Wangxun NICs (git-fixes).
- pci: Add SolidRun vendor ID (git-fixes).
- pci: Add pci_clear_master() stub for non-CONFIG_PCI (git-fixes).
- pci: Align extra resources for hotplug bridges properly (git-fixes).
- pci: Avoid FLR for AMD FCH AHCI adapters (git-fixes).
- pci: Avoid pci_dev_lock() AB/BA deadlock with sriov_numvfs_store() (git-fixes).
- pci: Fix dropping valid root bus resources with .end = zero (git-fixes).
- pci: Reduce warnings on possible RW1C corruption (git-fixes).
- pci: Release resource invalidated by coalescing (git-fixes).
- pci: Take other bus devices into account when distributing resources (git-fixes).
- pci: Unify delay handling for reset and resume (git-fixes).
- pci: aardvark: Check return value of generic_handle_domain_irq() when processing INTx IRQ (git-fixes).
- pci: aardvark: Fix link training (git-fixes).
- pci: cadence: Fix Gen2 Link Retraining process (git-fixes).
- pci: dwc: Add dw_pcie_ops.host_deinit() callback (git-fixes).
- pci: dwc: Fix PORT_LINK_CONTROL update when CDM check enabled (git-fixes).
- pci: endpoint: Add missing documentation about the MSI/MSI-X range (git-fixes).
- pci: ftpci100: Release the clock resources (git-fixes).
- pci: hotplug: Allow marking devices as disconnected during bind/unbind (git-fixes).
- pci: hv: Add a per-bus mutex state_lock (bsc#1207185).
- pci: hv: Fix a race condition in hv_irq_unmask() that can cause panic (bsc#1207185).
- pci: hv: Remove the useless hv_pcichild_state from struct hv_pci_dev (bsc#1207185).
- pci: hv: Use async probing to reduce boot time (bsc#1207185).
- pci: hv: fix a race condition bug in hv_pci_query_relations() (bsc#1207185).
- pci: hv: update comment in x86 specific hv_arch_irq_unmask (git-fixes).
- pci: imx6: Install the fault handler only on compatible match (git-fixes).
- pci: loongson: Add more devices that need MRRS quirk (git-fixes).
- pci: loongson: Prevent LS7A MRRS increases (git-fixes).
- pci: mediatek-gen3: Assert resets to ensure expected init state (git-fixes).
- pci: mediatek-gen3: Fix refcount leak in mtk_pcie_init_irq_domains() (git-fixes).
- pci: pciehp: Cancel bringup sequence if card is not present (git-fixes).
- pci: pciehp: Fix AB-BA deadlock between reset_lock and device_lock (git-fixes).
- pci: qcom: Disable write access to read only registers for IP v2.3.3 (git-fixes).
- pci: qcom: Fix host-init error handling (git-fixes).
- pci: qcom: Fix pipe clock imbalance (git-fixes).
- pci: qcom: Fix the incorrect register usage in v2.7.0 config (git-fixes).
- pci: rockchip: Add poll and timeout to wait for PHY PLLs to be locked (git-fixes).
- pci: rockchip: Assert PCI Configuration Enable bit after probe (git-fixes).
- pci: rockchip: Fix legacy IRQ generation for RK3399 PCIe endpoint core (git-fixes).
- pci: rockchip: Set address alignment for endpoint mode (git-fixes).
- pci: rockchip: Use u32 variable to access 32-bit registers (git-fixes).
- pci: rockchip: Write PCI Device ID to correct register (git-fixes).
- pci: switchtec: Return -EFAULT for copy_to_user() errors (git-fixes).
- pci: vmd: Fix secondary bus reset for Intel bridges (git-fixes).
- pci: vmd: Reset VMD config register between soft reboots (git-fixes).
- pci: xgene: Revert 'PCI: xgene: Use inbound resources for setup' (git-fixes).
- perf/amd/ibs: Use interrupt regs ip for stack unwinding (git fixes).
- perf/core: Call LSM hook after copying perf_event_attr (git fixes).
- perf/core: Fix data race between perf_event_set_output() and perf_mmap_close() (git fixes).
- perf/core: Fix perf_output_begin parameter is incorrectly invoked in perf_event_bpf_output (git fixes).
- perf/core: Fix the same task check in perf_event_set_output (git fixes).
- perf/core: Inherit event_caps (git fixes).
- perf/x86/amd: fix potential integer overflow on shift of a int (git fixes).
- perf/x86/intel/cstate: Add Emerald Rapids (PED-4396).
- perf/x86/intel/ds: Fix precise store latency handling (git fixes).
- perf/x86/intel/lbr: Use setup_clear_cpu_cap() instead of clear_cpu_cap() (git fixes).
- perf/x86/intel/pt: Fix sampling using single range output (git fixes).
- perf/x86/intel/pt: Relax address filter validation (git fixes).
- perf/x86/intel/uncore: Add Emerald Rapids (git fixes).
- perf/x86/intel/uncore: Clear attr_update properly (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Disable I/O stacks to PMU mapping on ICX-D (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Enable UPI topology discovery for Icelake Server (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Enable UPI topology discovery for Sapphire Rapids (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Enable UPI topology discovery for Skylake Server (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Fix broken read_counter() for SNB IMC PMU (git fixes).
- perf/x86/intel/uncore: Fix reference count leak in __uncore_imc_init_box() (git fixes).
- perf/x86/intel/uncore: Fix reference count leak in hswep_has_limit_sbox() (git fixes).
- perf/x86/intel/uncore: Fix reference count leak in sad_cfg_iio_topology() (git fixes).
- perf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map() (git fixes).
- perf/x86/intel/uncore: Generalize IIO topology support (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Generalize get_topology() for SKX PMUs (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Get UPI NodeID and GroupID (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Introduce UPI topology type (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Make set_mapping() procedure void (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel/uncore: Update sysfs-devices-mapping file (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/intel: Add Cooper Lake stepping to isolation_ucodes (git fixes).
- perf/x86/intel: Add Emerald Rapids (git fixes).
- perf/x86/intel: Do not extend the pseudo-encoding to GP counters (git fixes).
- perf/x86/intel: Fix PEBS data source encoding for ADL (git fixes).
- perf/x86/intel: Fix PEBS memory access info encoding for ADL (git fixes).
- perf/x86/intel: Fix event constraints for ICL (git fixes).
- perf/x86/intel: Fix pebs event constraints for ADL (git fixes).
- perf/x86/intel: Fix pebs event constraints for ICL (git fixes).
- perf/x86/intel: Fix pebs event constraints for SPR (git fixes).
- perf/x86/lbr: Enable the branch type for the Arch LBR by default (git fixes).
- perf/x86/msr: Add Emerald Rapids (git fixes).
- perf/x86/rapl: Add support for Intel AlderLake-N (git fixes).
- perf/x86/rapl: Add support for Intel Emerald Rapids (PED-4394).
- perf/x86/rapl: Treat Tigerlake like Icelake (git fixes).
- perf/x86/rapl: Use standard Energy Unit for SPR Dram RAPL domain (git fixes).
- perf/x86/rapl: fix AMD event handling (git fixes).
- perf/x86/uncore: Add Raptor Lake uncore support (git fixes).
- perf/x86/uncore: Add a quirk for UPI on SPR (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/uncore: Add new Alder Lake and Raptor Lake support (git fixes).
- perf/x86/uncore: Add new Raptor Lake S support (git fixes).
- perf/x86/uncore: Clean up uncore_pci_ids (git fixes).
- perf/x86/uncore: Do not WARN_ON_ONCE() for a broken discovery table (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/uncore: Factor out uncore_device_to_die() (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/uncore: Fix potential NULL pointer in uncore_get_alias_name (bsc#1206824, bsc#1206493, bsc#1206492).
- perf/x86/uncore: Ignore broken units in discovery table (bsc#1206824, bsc#1206493, bsc#1206492).
- perf: Always wake the parent event (git fixes).
- perf: Fix check before add_event_to_groups() in perf_group_detach() (git fixes).
- perf: Fix possible memleak in pmu_dev_alloc() (git fixes).
- perf: fix perf_event_context-&gt;time (git fixes).
- phy: Revert 'phy: Remove SOC_EXYNOS4212 dep. from PHY_EXYNOS4X12_USB' (git-fixes).
- phy: rockchip-typec: Fix unsigned comparison with less than zero (git-fixes).
- phy: rockchip-typec: fix tcphy_get_mode error case (git-fixes).
- phy: st: miphy28lp: use _poll_timeout functions for waits (git-fixes).
- phy: tegra: xusb: Add missing tegra_xusb_port_unregister for usb2_port and ulpi_port (git-fixes).
- phy: tegra: xusb: Clear the driver reference in usb-phy dev (git-fixes).
- phy: tegra: xusb: check return value of devm_kzalloc() (git-fixes).
- pinctrl: amd: Disable and mask interrupts on resume (git-fixes).
- pinctrl: aspeed: Fix confusing types in return value (git-fixes).
- pinctrl: at91-pio4: check return value of devm_kasprintf() (git-fixes).
- pinctrl: at91-pio4: fix domain name assignment (git-fixes).
- pinctrl: at91: use devm_kasprintf() to avoid potential leaks (git-fixes).
- pinctrl: cherryview: Return correct value if pin in push-pull mode (git-fixes).
- pinctrl: intel: Restore the pins that used to be in Direct IRQ mode (git-fixes).
- pinctrl: mediatek: Fix the drive register definition of some Pins (git-fixes).
- pinctrl: mediatek: Initialize variable *buf to zero (git-fixes).
- pinctrl: mediatek: fix coding style (git-fixes).
- pinctrl: meson-axg: add missing GPIOA_18 gpio group (git-fixes).
- pinctrl: microchip-sgpio: check return value of devm_kasprintf() (git-fixes).
- pinctrl: ocelot: Fix alt mode for ocelot (git-fixes).
- pinctrl: qcom: lpass-lpi: set output value before enabling output (git-fixes).
- pinctrl: qcom: pinctrl-msm8976: Correct function names for wcss pins (git-fixes).
- pinctrl: renesas: r8a779a0: Remove incorrect AVB[01] pinmux configuration (git-fixes).
- pinctrl: rockchip: Fix refcount leak in rockchip_pinctrl_parse_groups (git-fixes).
- pinctrl: single: fix potential NULL dereference (git-fixes).
- pinctrl: stm32: Fix refcount leak in stm32_pctrl_get_irq_domain (git-fixes).
- platform/chrome: cros_ec_chardev: fix kernel data leak from ioctl (git-fixes).
- platform/surface: aggregator: Allow completion work-items to be executed in parallel (git-fixes).
- platform/x86 (gigabyte-wmi): Add support for A320M-S2H V2 (git-fixes).
- platform/x86/amd/pmc: Add new acpi id for PMC controller (bsc#1210644).
- platform/x86/amd/pmc: Add new platform support (bsc#1210644).
- platform/x86/amd: Fix refcount leak in amd_pmc_probe (bsc#1210644).
- platform/x86/amd: pmc: Add a module parameter to disable workarounds (bsc#1210644).
- platform/x86/amd: pmc: Add a workaround for an s0i3 issue on Cezanne (bsc#1210644).
- platform/x86/amd: pmc: Add defines for STB events (bsc#1210644).
- platform/x86/amd: pmc: Add line break for readability (bsc#1210644).
- platform/x86/amd: pmc: Add new ACPI ID AMDI0009 (bsc#1210644).
- platform/x86/amd: pmc: Add num_samples message id support to STB (bsc#1210644).
- platform/x86/amd: pmc: Add sysfs files for SMU (bsc#1210644).
- platform/x86/amd: pmc: Always write to the STB (bsc#1210644).
- platform/x86/amd: pmc: Disable IRQ1 wakeup for RN/CZN (bsc#1210644).
- platform/x86/amd: pmc: Do not dump data after resume from s0i3 on picasso (git-fixes).
- platform/x86/amd: pmc: Do not try to read SMU version on Picasso (git-fixes).
- platform/x86/amd: pmc: Fix build without debugfs (bsc#1210644).
- platform/x86/amd: pmc: Fix memory leak in amd_pmc_stb_debugfs_open_v2() (bsc#1210644).
- platform/x86/amd: pmc: Hide SMU version and program attributes for Picasso (git-fixes).
- platform/x86/amd: pmc: Move idlemask check into `amd_pmc_idlemask_read` (git-fixes).
- platform/x86/amd: pmc: Move out of BIOS SMN pair for STB init (git-fixes).
- platform/x86/amd: pmc: Read SMU version during suspend on Cezanne systems (bsc#1210644).
- platform/x86/amd: pmc: Remove more CONFIG_DEBUG_FS checks (bsc#1210644).
- platform/x86/amd: pmc: Utilize SMN index 0 for driver probe (git-fixes).
- platform/x86/amd: pmc: Write dummy postcode into the STB DRAM (bsc#1210644).
- platform/x86/amd: pmc: add CONFIG_SERIO dependency (git-fixes).
- platform/x86/amd: pmc: differentiate STB/SMU messaging prints (bsc#1210644).
- platform/x86/amd: pmc: remove CONFIG_DEBUG_FS checks (bsc#1210644).
- platform/x86/amd: pmc: remove CONFIG_SUSPEND checks (bsc#1210644).
- platform/x86/intel/pmc: Alder Lake PCH slp_s0_residency fix (git-fixes).
- platform/x86: ISST: PUNIT device mapping with Sub-NUMA clustering (bsc#1208420).
- platform/x86: ISST: Remove 8 socket limit (bsc#1211836).
- platform/x86: Move AMD platform drivers to separate directory (bsc#1210644).
- platform/x86: amd-pmc: Add a message to print resume time info (bsc#1210644).
- platform/x86: amd-pmc: Add special handling for timer based S0i3 wakeup (bsc#1210644).
- platform/x86: amd-pmc: Add support for AMD Smart Trace Buffer (bsc#1210644).
- platform/x86: amd-pmc: Add support for AMD Spill to DRAM STB feature (bsc#1210644).
- platform/x86: amd-pmc: Avoid reading SMU version at probe time (bsc#1210644).
- platform/x86: amd-pmc: Check s0i3 cycle status (bsc#1210644).
- platform/x86: amd-pmc: Correct usage of SMU version (git-fixes).
- platform/x86: amd-pmc: Downgrade dev_info message to dev_dbg (bsc#1210644).
- platform/x86: amd-pmc: Drop CPU QoS workaround (bsc#1210644).
- platform/x86: amd-pmc: Drop check for valid alarm time (bsc#1210644).
- platform/x86: amd-pmc: Export Idlemask values based on the APU (git-fixes).
- platform/x86: amd-pmc: Fix build error unused-function (bsc#1210644).
- platform/x86: amd-pmc: Fix compilation when CONFIG_DEBUGFS is disabled (git-fixes).
- platform/x86: amd-pmc: Fix compilation without CONFIG_SUSPEND (bsc#1210644).
- platform/x86: amd-pmc: Make amd_pmc_stb_debugfs_fops static (bsc#1210644).
- platform/x86: amd-pmc: Move FCH init to first use (bsc#1210644).
- platform/x86: amd-pmc: Move SMU logging setup out of init (bsc#1210644).
- platform/x86: amd-pmc: Move to later in the suspend process (bsc#1210644).
- platform/x86: amd-pmc: Only report STB errors when STB enabled (bsc#1210644).
- platform/x86: amd-pmc: Output error codes in messages (bsc#1210644).
- platform/x86: amd-pmc: Send command to dump data after clearing OS_HINT (bsc#1210644).
- platform/x86: amd-pmc: Set QOS during suspend on CZN w/ timer wakeup (bsc#1210644).
- platform/x86: amd-pmc: Shuffle location of amd_pmc_get_smu_version() (bsc#1210644).
- platform/x86: amd-pmc: Simplify error handling and store the pci_dev in amd_pmc_dev structure (bsc#1210644).
- platform/x86: amd-pmc: Validate entry into the deepest state on resume (bsc#1210644).
- platform/x86: amd-pmc: adjust arguments for `amd_pmc_send_cmd` (bsc#1210644).
- platform/x86: amd-pmc: fix compilation without CONFIG_RTC_SYSTOHC_DEVICE (bsc#1210644).
- platform/x86: amd-pmc: uninitialized variable in amd_pmc_s2d_init() (bsc#1210644).
- platform/x86: amd: pmc: Remove __maybe_unused from amd_pmc_suspend_handler() (bsc#1210644).
- platform/x86: amd: pmc: provide user message where s0ix is not supported (bsc#1210644).
- platform/x86: asus-nb-wmi: Add alternate mapping for KEY_SCREENLOCK (git-fixes).
- platform/x86: asus-wmi: Ignore WMI events with codes 0x7B, 0xC0 (git-fixes).
- platform/x86: dell-wmi: Add a keymap for KEY_MUTE in type 0x0010 table (git-fixes).
- platform/x86: gigabyte-wmi: add support for B450M DS3H WIFI-CF (git-fixes).
- platform/x86: gigabyte-wmi: add support for X570S AORUS ELITE (git-fixes).
- platform/x86: hp-wmi: Support touchpad on/off (git-fixes).
- platform/x86: intel-uncore-freq: add Emerald Rapids support (PED-4390).
- platform/x86: intel_scu_pcidrv: Add back PCI ID for Medfield (git-fixes).
- platform/x86: think-lmi: Add possible_values for ThinkStation (git-fixes).
- platform/x86: think-lmi: Certificate authentication support (bsc#1210050).
- platform/x86: think-lmi: Clean up display of current_value on Thinkstation (git-fixes).
- platform/x86: think-lmi: Correct NVME password handling (git-fixes).
- platform/x86: think-lmi: Correct System password interface (git-fixes).
- platform/x86: think-lmi: Fix memory leak when showing current settings (git-fixes).
- platform/x86: think-lmi: Fix memory leaks when parsing ThinkStation WMI strings (git-fixes).
- platform/x86: think-lmi: Move kobject_init() call into tlmi_create_auth() (bsc#1210050).
- platform/x86: think-lmi: Opcode support (bsc#1210050).
- platform/x86: think-lmi: Prevent underflow in index_store() (bsc#1210050).
- platform/x86: think-lmi: Simplify tlmi_analyze() error handling a bit (bsc#1210050).
- platform/x86: think-lmi: Use min_t() for comparison and assignment (bsc#1210050).
- platform/x86: think-lmi: add debug_cmd (bsc#1210050).
- platform/x86: think-lmi: add missing type attribute (git-fixes).
- platform/x86: think-lmi: certificate support clean ups (bsc#1210050).
- platform/x86: think-lmi: mutex protection around multiple WMI calls (git-fixes).
- platform/x86: think-lmi: only display possible_values if available (git-fixes).
- platform/x86: think-lmi: use correct possible_values delimiters (git-fixes).
- platform/x86: thinkpad-acpi: Add support for automatic mode transitions (bsc#1210050).
- platform/x86: thinkpad-acpi: Enable AMT by default on supported systems (bsc#1210050).
- platform/x86: thinkpad-acpi: profile capabilities as integer (bsc#1210050).
- platform/x86: thinkpad_acpi: Accept ibm_init_struct.init() returning -ENODEV (bsc#1210050).
- platform/x86: thinkpad_acpi: Add LED_RETAIN_AT_SHUTDOWN to led_class_devs (bsc#1210050).
- platform/x86: thinkpad_acpi: Add PSC mode support (bsc#1210050).
- platform/x86: thinkpad_acpi: Add a s2idle resume quirk for a number of laptops (bsc#1210050).
- platform/x86: thinkpad_acpi: Add dual fan probe (bsc#1210050).
- platform/x86: thinkpad_acpi: Add dual-fan quirk for T15g (2nd gen) (bsc#1210050).
- platform/x86: thinkpad_acpi: Add hotkey_notify_extended_hotkey() helper (bsc#1210050).
- platform/x86: thinkpad_acpi: Add lid_logo_dot to the list of safe LEDs (bsc#1210050).
- platform/x86: thinkpad_acpi: Add quirk for ThinkPads without a fan (bsc#1210050).
- platform/x86: thinkpad_acpi: Cleanup dytc_profile_available (bsc#1210050).
- platform/x86: thinkpad_acpi: Convert btusb DMI list to quirks (bsc#1210050).
- platform/x86: thinkpad_acpi: Convert platform driver to use dev_groups (bsc#1210050).
- platform/x86: thinkpad_acpi: Correct dual fan probe (bsc#1210050).
- platform/x86: thinkpad_acpi: Do not use test_bit on an integer (bsc#1210050).
- platform/x86: thinkpad_acpi: Enable s2idle quirk for 21A1 machine type (bsc#1210050).
- platform/x86: thinkpad_acpi: Explicitly set to balanced mode on startup (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix a memory leak of EFCH MMIO resource (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix coccinelle warnings (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix compiler warning about uninitialized err variable (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix incorrect use of platform profile on AMD platforms (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix lkp-tests warnings for platform profiles (git-fixes).
- platform/x86: thinkpad_acpi: Fix max_brightness of thinklight (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix platform profiles on T490 (git-fixes).
- platform/x86: thinkpad_acpi: Fix profile mode display in AMT mode (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix profile modes on Intel platforms (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix reporting a non present second fan on some models (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix the hwmon sysfs-attr showing up in the wrong place (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix thermal_temp_input_attr sorting (bsc#1210050).
- platform/x86: thinkpad_acpi: Fix thinklight LED brightness returning 255 (bsc#1210050).
- platform/x86: thinkpad_acpi: Get privacy-screen / lcdshadow ACPI handles only once (bsc#1210050).
- platform/x86: thinkpad_acpi: Make *_init() functions return -ENODEV instead of 1 (bsc#1210050).
- platform/x86: thinkpad_acpi: Properly indent code in tpacpi_dytc_profile_init() (bsc#1210050).
- platform/x86: thinkpad_acpi: Register tpacpi_pdriver after subdriver init (bsc#1210050).
- platform/x86: thinkpad_acpi: Remove 'goto err_exit' from hotkey_init() (bsc#1210050).
- platform/x86: thinkpad_acpi: Remove unused sensors_pdev_attrs_registered flag (bsc#1210050).
- platform/x86: thinkpad_acpi: Restore missing hotkey_tablet_mode and hotkey_radio_sw sysfs-attr (bsc#1210050).
- platform/x86: thinkpad_acpi: Simplify dytc_version handling (bsc#1210050).
- platform/x86: thinkpad_acpi: Switch to common use of attributes (bsc#1210050).
- platform/x86: thinkpad_acpi: Use backlight helper (bsc#1210050).
- platform/x86: thinkpad_acpi: clean up dytc profile convert (bsc#1210050).
- platform/x86: thinkpad_acpi: consistently check fan_get_status return (bsc#1210050).
- platform/x86: thinkpad_acpi: do not use PSC mode on Intel platforms (bsc#1210050).
- platform/x86: thinkpad_acpi: tpacpi_attr_group contains driver attributes not device attrs (bsc#1210050).
- platform/x86: thinkpad_acpi: use strstarts() (bsc#1210050).
- platform/x86: touchscreen_dmi: Add Chuwi Vi8 (CWI501) DMI match (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the CSL Panther Tab HD (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Dexp Ursus KX210i (git-fixes).
- platform/x86: touchscreen_dmi: Add upside-down quirk for GDIX1002 ts on the Juno Tablet (git-fixes).
- platform: x86: MLX_PLATFORM: select REGMAP instead of depending on it (git-fixes).
- pm: domains: fix integer overflow issues in genpd_parse_state() (git-fixes).
- pm: hibernate: Do not get block device exclusively in test_resume mode (git-fixes).
- pm: hibernate: Turn snapshot_test into global variable (git-fixes).
- pm: hibernate: fix load_image_and_restore() error path (git-fixes).
- power: supply: Fix logic checking if system is running from battery (git-fixes).
- power: supply: Ratelimit no data debug output (git-fixes).
- power: supply: ab8500: Fix external_power_changed race (git-fixes).
- power: supply: bq24190_charger: using pm_runtime_resume_and_get instead of pm_runtime_get_sync (git-fixes).
- power: supply: bq27xxx: Add cache parameter to bq27xxx_battery_current_and_status() (git-fixes).
- power: supply: bq27xxx: After charger plug in/out wait 0.5s for things to stabilize (git-fixes).
- power: supply: bq27xxx: Ensure power_supply_changed() is called on current sign changes (git-fixes).
- power: supply: bq27xxx: Fix I2C IRQ race on remove (git-fixes).
- power: supply: bq27xxx: Fix bq27xxx_battery_update() race condition (git-fixes).
- power: supply: bq27xxx: Fix poll_interval handling and races on remove (git-fixes).
- power: supply: bq27xxx: Move bq27xxx_battery_update() down (git-fixes).
- power: supply: bq27xxx: Use mod_delayed_work() instead of cancel() + schedule() (git-fixes).
- power: supply: bq27xxx: expose battery data when CI=1 (git-fixes).
- power: supply: cros_usbpd: reclassify 'default case!' as debug (git-fixes).
- power: supply: da9150: Fix use after free bug in da9150_charger_remove due to race condition (git-fixes).
- power: supply: generic-adc-battery: fix unit scaling (git-fixes).
- power: supply: leds: Fix blink to LED on transition (git-fixes).
- power: supply: sbs-charger: Fix INHIBITED bit for Status reg (git-fixes).
- power: supply: sc27xx: Fix external_power_changed race (git-fixes).
- powercap: fix possible name leak in powercap_register_zone() (git-fixes).
- powercap: intel_rapl: add support for Emerald Rapids (PED-4398).
- powerpc/64: Always build with 128-bit long double (bsc#1194869).
- powerpc/64e: Fix amdgpu build on Book3E w/o AltiVec (bsc#1194869).
- powerpc/64s/interrupt: Fix interrupt exit race with security mitigation switch (bsc#1194869).
- powerpc/64s/radix: Fix RWX mapping with relocated kernel (bsc#1194869).
- powerpc/64s/radix: Fix crash with unaligned relocated kernel (bsc#1194869).
- powerpc/64s/radix: Fix exit lazy tlb mm switch with irqs enabled (bsc#1194869).
- powerpc/64s/radix: Fix soft dirty tracking (bsc#1065729).
- powerpc/64s: Fix local irq disable when PMIs are disabled (bsc#1195655 ltc#1195655 git-fixes).
- powerpc/64s: Make POWER10 and later use pause_short in cpu_relax loops (bsc#1209367 ltc#195662).
- powerpc/btext: add missing of_node_put (bsc#1065729).
- powerpc/eeh: Set channel state after notifying the drivers (bsc#1208784 ltc#201612).
- powerpc/hv-gpci: Fix hv_gpci event list (bsc#1207935).
- powerpc/hv-gpci: Fix hv_gpci event list (git fixes).
- powerpc/ioda/iommu/debugfs: Generate unique debugfs entries (bsc#1194869).
- powerpc/iommu: Add missing of_node_put in iommu_init_early_dart (bsc#1194869).
- powerpc/iommu: DMA address offset is incorrectly calculated with 2MB TCEs (jsc#SLE-19556 git-fixes).
- powerpc/iommu: Limit number of TCEs to 512 for H_STUFF_TCE hcall (bsc#1194869 bsc#1212701).
- powerpc/iommu: fix memory leak with using debugfs_lookup() (bsc#1194869).
- powerpc/kcsan: Exclude udelay to prevent recursive instrumentation (bsc#1194869).
- powerpc/kexec_file: Count hot-pluggable memory in FDT estimate (bsc#1194869).
- powerpc/kexec_file: Fix division by zero in extra size estimation (bsc#1194869).
- powerpc/kexec_file: fix implicit decl error (bsc#1194869).
- powerpc/mm: Fix false detection of read faults (bsc#1208864).
- powerpc/papr_scm: Update the NUMA distance table for the target node (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).
- powerpc/perf/hv-24x7: add missing RTAS retry status handling (git fixes).
- powerpc/powernv/ioda: Skip unallocated resources when mapping to PE (bsc#1065729).
- powerpc/powernv: fix missing of_node_put in uv_init() (bsc#1194869).
- powerpc/pseries/lpar: add missing RTAS retry status handling (bsc#1109158 ltc#169177 git-fixes).
- powerpc/pseries/lparcfg: add missing RTAS retry status handling (bsc#1065729).
- powerpc/pseries/vas: Ignore VAS update for DLPAR if copy/paste is not enabled (bsc#1210216 ltc#202189).
- powerpc/pseries: Consolidate different NUMA distance update code paths (bsc#1209999 ltc#202140 bsc#1142685 ltc#179509 git-fixes).
- powerpc/purgatory: remove PGO flags (bsc#1194869).
- powerpc/rtas: ensure 4KB alignment for rtas_data_buf (bsc#1065729).
- powerpc/rtas: use memmove for potentially overlapping buffer copy (bsc#1065729).
- powerpc/set_memory: Avoid spinlock recursion in change_page_attr() (bsc#1194869).
- powerpc/vmlinux.lds: Add an explicit symbol for the SRWX boundary (bsc#1194869).
- powerpc/vmlinux.lds: Define RUNTIME_DISCARD_EXIT (bsc#1194869).
- powerpc/vmlinux.lds: Do not discard .comment (bsc#1194869).
- powerpc/vmlinux.lds: Do not discard .rela* for relocatable builds (bsc#1194869).
- powerpc/vmlinux.lds: Ensure STRICT_ALIGN_SIZE is at least page aligned (bsc#1194869).
- powerpc/xmon: Fix -Wswitch-unreachable warning in bpt_cmds (bsc#1194869).
- powerpc: Do not try to copy PPR for task with NULL pt_regs (bsc#1065729).
- powerpc: Redefine HMT_xxx macros as empty on PPC32 (bsc#1209367 ltc#195662).
- powerpc: Remove linker flag from KBUILD_AFLAGS (bsc#1194869).
- powerpc: add ISA v3.0 / v3.1 wait opcode macro (bsc#1209367 ltc#195662).
- powerpc: declare unmodified attribute_group usages const (bsc#1207935).
- powerpc: declare unmodified attribute_group usages const (git-fixes).
- powerpc: move __end_rodata to cover arch read-only sections (bsc#1194869).
- printf: fix errname.c list (git-fixes).
- prlimit: do_prlimit needs to have a speculation check (bsc#1209256).
- pstore/ram: Add check for kstrdup (git-fixes).
- pstore: Revert pmsg_lock back to a normal mutex (git-fixes).
- purgatory: fix disabling debug info (git-fixes).
- pwm: ab8500: Fix error code in probe() (git-fixes).
- pwm: cros-ec: Explicitly set .polarity in .get_state() (git-fixes).
- pwm: imx-tpm: force 'real_period' to be zero in suspend (git-fixes).
- pwm: meson: Fix axg ao mux parents (git-fixes).
- pwm: meson: Fix g12a ao clk81 name (git-fixes).
- pwm: sprd: Explicitly set .polarity in .get_state() (git-fixes).
- pwm: stm32-lp: fix the check on arr and cmp registers update (git-fixes).
- pwm: sysfs: Do not apply state to already disabled PWMs (git-fixes).
- qed/qed_dev: guard against a possible division by zero (jsc#SLE-19001).
- qed/qed_mng_tlv: correctly zero out -&gt;min instead of -&gt;hour (jsc#SLE-19001).
- qed/qed_sriov: guard against NULL derefs from qed_iov_get_vf_info (jsc#SLE-19001).
- qed/qede: Fix scheduling while atomic (git-fixes).
- qed: allow sleep in qed_mcp_trace_dump() (jsc#SLE-19001).
- qede: avoid uninitialized entries in coal_entry array (bsc#1205846).
- qede: execute xdp_do_flush() before napi_complete_done() (jsc#SLE-19001).
- qede: fix interrupt coalescing configuration (bsc#1205846).
- quota: Check next/prev free block number after reading from quota file (bsc#1206640).
- quota: Prevent memory allocation recursion while holding dq_lock (bsc#1207639).
- r8152: add vendor/device ID pair for Microsoft Devkit (git-fixes).
- r8152: fix flow control issue of RTL8156A (git-fixes).
- r8152: fix the poor throughput for 2.5G devices (git-fixes).
- r8152: move setting r8153b_rx_agg_chg_indicate() (git-fixes).
- r8169: fix RTL8168H and RTL8107E rx crc error (git-fixes).
- r8169: move rtl_wol_enable_rx() and rtl_prepare_power_down() (git-fixes).
- radeon: avoid double free in ci_dpm_init() (git-fixes).
- rcu: Fix missing TICK_DEP_MASK_RCU_EXP dependency check (git-fixes).
- rcu: Fix rcu_torture_read ftrace event (git-fixes).
- rcu: Tighten rcu_advance_cbs_nowake() checks (bsc#1209159).
- rdma/bnxt_re: Avoid calling wake_up threads from spin_lock context (git-fixes)
- rdma/bnxt_re: Disable/kill tasklet only if it is enabled (git-fixes)
- rdma/bnxt_re: Fix a possible memory leak (git-fixes)
- rdma/bnxt_re: Fix return value of bnxt_re_process_raw_qp_pkt_rx (git-fixes)
- rdma/bnxt_re: Fix the page_size used during the MR creation (git-fixes)
- rdma/bnxt_re: Fix to remove an unnecessary log (git-fixes)
- rdma/bnxt_re: Fix to remove unnecessary return labels (git-fixes)
- rdma/bnxt_re: Remove a redundant check inside bnxt_re_update_gid (git-fixes)
- rdma/bnxt_re: Remove unnecessary checks (git-fixes)
- rdma/bnxt_re: Return directly without goto jumps (git-fixes)
- rdma/bnxt_re: Use unique names while registering interrupts (git-fixes)
- rdma/bnxt_re: wraparound mbox producer index (git-fixes)
- rdma/cm: Trace icm_send_rej event before the cm state is reset (git-fixes)
- rdma/cma: Allow UD qp_type to join multicast only (git-fixes)
- rdma/cma: Always set static rate to 0 for RoCE (git-fixes)
- rdma/core: Fix GID entry ref leak when create_ah fails (git-fixes)
- rdma/core: Fix ib block iterator counter overflow (bsc#1207878).
- rdma/core: Fix ib block iterator counter overflow (git-fixes)
- rdma/core: Fix multiple -Warray-bounds warnings (git-fixes)
- rdma/cxgb4: Fix potential null-ptr-deref in pass_establish() (git-fixes)
- rdma/cxgb4: add null-ptr-check after ip_dev_find() (git-fixes)
- rdma/cxgb4: remove unnecessary NULL check in __c4iw_poll_cq_one() (git-fixes)
- rdma/efa: Fix unsupported page sizes in device (git-fixes)
- rdma/hns: Fix base address table allocation (git-fixes)
- rdma/hns: Fix hns_roce_table_get return value (git-fixes)
- rdma/hns: Fix timeout attr in query qp for HIP08 (git-fixes)
- rdma/hns: Modify the value of long message loopback slice (git-fixes)
- rdma/irdma: Add SW mechanism to generate completions on error (jsc#SLE-18383).
- rdma/irdma: Add ipv4 check to irdma_find_listener() (git-fixes)
- rdma/irdma: Cap MSIX used to online CPUs + 1 (git-fixes)
- rdma/irdma: Do not generate SW completions for NOPs (git-fixes)
- rdma/irdma: Do not generate SW completions for NOPs (jsc#SLE-18383).
- rdma/irdma: Fix Local Invalidate fencing (git-fixes)
- rdma/irdma: Fix RQ completion opcode (jsc#SLE-18383).
- rdma/irdma: Fix drain SQ hang with no completion (jsc#SLE-18383).
- rdma/irdma: Fix inline for multiple SGE's (jsc#SLE-18383).
- rdma/irdma: Fix memory leak of PBLE objects (git-fixes)
- rdma/irdma: Fix potential NULL-ptr-dereference (git-fixes)
- rdma/irdma: Increase iWARP CM default rexmit count (git-fixes)
- rdma/irdma: Prevent QP use after free (git-fixes)
- rdma/irdma: Remove enum irdma_status_code (jsc#SLE-18383).
- rdma/irdma: Remove excess error variables (jsc#SLE-18383).
- rdma/irdma: avoid fortify-string warning in irdma_clr_wqes (git-fixes)
- rdma/mana: Remove redefinition of basic u64 type (bsc#1210741 jsc#PED-4022).
- rdma/mana: hide new rdma_driver_ids (bsc#1210741 jsc#PED-4022).
- rdma/mana_ib: Add a driver for Microsoft Azure Network Adapter (bsc#1210741 jsc#PED-4022).
- rdma/mana_ib: Fix a bug when the PF indicates more entries for registering memory on first packet (bsc#1210741 jsc#PED-4022).
- rdma/mana_ib: Prevent array underflow in mana_ib_create_qp_raw() (bsc#1210741 jsc#PED-4022).
- rdma/mlx4: Prevent shift wrapping in set_user_sq_size() (jsc#SLE-19255).
- rdma/mlx5: Create an indirect flow table for steering anchor (git-fixes)
- rdma/mlx5: Do not set tx affinity when lag is in hash mode (git-fixes)
- rdma/mlx5: Fix affinity assignment (git-fixes)
- rdma/mlx5: Fix flow counter query via DEVX (git-fixes)
- rdma/mlx5: Fix mlx5_ib_get_hw_stats when used for device (git-fixes)
- rdma/mlx5: Fix validation of max_rd_atomic caps for DC (git-fixes)
- rdma/mlx5: Initiate dropless RQ for RAW Ethernet functions (git-fixes)
- rdma/mlx5: Rely on RoCE fw cap instead of devlink when setting profile (jsc#SLE-19253).
- rdma/mlx5: Use correct device num_ports when modify DC (git-fixes)
- rdma/mlx5: Use rdma_umem_for_each_dma_block() (git-fixes)
- rdma/rdmavt: Delete unnecessary NULL check (git-fixes)
- rdma/rtrs-clt: Replace list_next_or_null_rr_rcu with an inline function (git-fixes)
- rdma/rtrs-srv: Pass the correct number of entries for dma mapped SGL (git-fixes)
- rdma/rtrs: Fix rxe_dealloc_pd warning (git-fixes)
- rdma/rtrs: Fix the last iu-&gt;buf leak in err path (git-fixes)
- rdma/rxe: Fix access checks in rxe_check_bind_mw (git-fixes)
- rdma/rxe: Fix inaccurate constants in rxe_type_info (git-fixes)
- rdma/rxe: Fix missing memory barriers in rxe_queue.h (git-fixes)
- rdma/rxe: Fix mr-&gt;map double free (git-fixes)
- rdma/rxe: Fix oops with zero length reads (git-fixes)
- rdma/rxe: Fix packet length checks (git-fixes)
- rdma/rxe: Fix ref count error in check_rkey() (git-fixes)
- rdma/rxe: Fix rxe_cq_post (git-fixes)
- rdma/rxe: Fix the error 'trying to register non-static key in rxe_cleanup_task' (git-fixes)
- rdma/rxe: Fix the use-before-initialization error of resp_pkts (git-fixes)
- rdma/rxe: Make responder handle RDMA Read failures (git-fixes)
- rdma/rxe: Prevent faulty rkey generation (git-fixes)
- rdma/rxe: Remove dangling declaration of rxe_cq_disable() (git-fixes)
- rdma/rxe: Remove tasklet call from rxe_cq.c (git-fixes)
- rdma/rxe: Remove the unused variable obj (git-fixes)
- rdma/rxe: Removed unused name from rxe_task struct (git-fixes)
- rdma/siw: Fix potential page_array out of range access (git-fixes)
- rdma/siw: Fix user page pinning accounting (git-fixes)
- rdma/siw: Remove namespace check from siw_netdev_event() (git-fixes)
- rdma/srp: Move large values to a new enum for gcc13 (git-fixes)
- rdma/srpt: Add a check for valid 'mad_agent' pointer (git-fixes)
- rdma/usnic: use iommu_map_atomic() under spin_lock() (git-fixes)
- rdma/uverbs: Restrict usage of privileged QKEYs (git-fixes)
- rdma/vmw_pvrdma: Remove unnecessary check on wr-&gt;opcode (git-fixes)
- rdma: Handle the return code from dma_resv_wait_timeout() properly (git-fixes)
- ref_tracker: use __GFP_NOFAIL more carefully (git-fixes).
- regmap: Account for register length when chunking (git-fixes).
- regmap: cache: Return error in cache sync operations for REGCACHE_NONE (git-fixes).
- regmap: spi-avmm: Fix regmap_bus max_raw_write (git-fixes).
- regulator: Fix error checking for debugfs_create_dir (git-fixes).
- regulator: Flag uncontrollable regulators as always_on (git-fixes).
- regulator: Handle deferred clk (git-fixes).
- regulator: core: Avoid lockdep reports when resolving supplies (git-fixes).
- regulator: core: Consistently set mutex_owner when using ww_mutex_lock_slow() (git-fixes).
- regulator: core: Fix more error checking for debugfs_create_dir() (git-fixes).
- regulator: core: Fix off-on-delay-us for always-on/boot-on regulators (git-fixes).
- regulator: core: Shorten off-on-delay-us for always-on/boot-on by time since booted (git-fixes).
- regulator: core: Streamline debugfs operations (git-fixes).
- regulator: core: Use ktime_get_boottime() to determine how long a regulator was off (git-fixes).
- regulator: fan53555: Explicitly include bits header (git-fixes).
- regulator: fan53555: Fix wrong TCS_SLEW_MASK (git-fixes).
- regulator: helper: Document ramp_delay parameter of regulator_set_ramp_delay_regmap() (git-fixes).
- regulator: max77802: Bounds check regulator id against opmode (git-fixes).
- regulator: mt6359: add read check for PMIC MT6359 (git-fixes).
- regulator: pca9450: Fix BUCK2 enable_mask (git-fixes).
- regulator: pca9450: Fix LDO3OUT and LDO4OUT MASK (git-fixes).
- regulator: s5m8767: Bounds check id indexing into arrays (git-fixes).
- regulator: stm32-pwr: fix of_iomap leak (git-fixes).
- reiserfs: Add missing calls to reiserfs_security_free() (git-fixes).
- reiserfs: Add security prefix to xattr name in reiserfs_security_write() (git-fixes).
- remoteproc/mtk_scp: Move clk ops outside send_lock (git-fixes).
- remoteproc: Harden rproc_handle_vdev() against integer overflow (git-fixes).
- remoteproc: imx_rproc: Call of_node_put() on iteration error (git-fixes).
- remoteproc: qcom_q6v5_mss: Use a carveout to authenticate modem headers (git-fixes).
- remoteproc: st: Call of_node_put() on iteration error (git-fixes).
- remoteproc: stm32: Call of_node_put() on iteration error (git-fixes).
- remoteproc: stm32_rproc: Add mutex protection for workqueue (git-fixes).
- remove 'PCI: hv: Use async probing to reduce boot time' (bsc#1207185).
- rethook: Reject getting a rethook if RCU is not watching (git-fixes).
- rethook: fix a potential memleak in rethook_alloc() (git-fixes).
- rethook: use preempt_{disable, enable}_notrace in rethook_trampoline_handler (git-fixes).
- revert 'squashfs: harden sanity check in squashfs_read_xattr_id_table' (git-fixes).
- ring-buffer: Ensure proper resetting of atomic variables in ring_buffer_reset_online_cpus (git-fixes).
- ring-buffer: Fix kernel-doc (git-fixes).
- ring-buffer: Fix race while reader and writer are on the same page (git-fixes).
- ring-buffer: Handle race between rb_move_tail and rb_check_pages (git-fixes).
- ring-buffer: Sync IRQ works before buffer destruction (git-fixes).
- ring-buffer: remove obsolete comment for free_buffer_page() (git-fixes).
- rpm/check-for-config-changes: ignore also PAHOLE_HAS_* We now also have options like CONFIG_PAHOLE_HAS_LANG_EXCLUDE.
- rpm/constraints.in: Increase disk size constraint for riscv64 to 52GB
- rpm/kernel-binary.spec.in: Fix compatibility wth newer rpm
- rpm/kernel-docs.spec.in: pass PYTHON=python3 to fix build error (bsc#1160435)
- rpm/kernel-obs-build.spec.in: Remove SLE11 cruft
- rpm/kernel-source.spec.in: Add patches.drm for moved DRM patches
- rtc: allow rtc_read_alarm without read_alarm callback (git-fixes).
- rtc: efi: Add wakeup support (bsc#1213116).
- rtc: efi: Enable SET/GET WAKEUP services as optional (bsc#1213116).
- rtc: efi: switch to devm_rtc_allocate_device (bsc#1213116).
- rtc: meson-vrtc: Use ktime_get_real_ts64() to get the current time (git-fixes).
- rtc: omap: include header for omap_rtc_power_off_program prototype (git-fixes).
- rtc: pm8xxx: fix set-alarm race (git-fixes).
- rtc: st-lpc: Release some resources in st_rtc_probe() in case of error (git-fixes).
- rtc: sun6i: Always export the internal oscillator (git-fixes).
- rtmutex: Ensure that the top waiter is always woken up (git-fixes).
- s390/ap: fix memory leak in ap_init_qci_info() (git-fixes).
- s390/boot: simplify and fix kernel memory layout setup (bsc#1209600).
- s390/ctcm: Fix return type of ctc{mp,}m_tx() (git-fixes bsc#1211686).
- s390/dasd: Fix potential memleak in dasd_eckd_init() (git-fixes).
- s390/dasd: Use correct lock while counting channel queue length (git-fixes bsc#1212592).
- s390/dasd: fix hanging blockdevice after request requeue (git-fixes bsc#1211687).
- s390/dasd: fix no record found for raw_track_access (bsc#1207574).
- s390/extmem: return correct segment type in __segment_load() (bsc#1210450 git-fixes).
- s390/gmap: voluntarily schedule during key setting (git-fixes bsc#1212892).
- s390/kprobes: fix current_kprobe never cleared after kprobes reenter (git-fixes bsc#1211688).
- s390/kprobes: fix irq mask clobbering on kprobe reenter from post_handler (git-fixes bsc#1211689).
- s390/lcs: Fix return type of lcs_start_xmit() (git-fixes bsc#1211690).
- s390/mem_detect: fix detect_memory() error handling (git-fixes bsc#1211691).
- s390/netiucv: Fix return type of netiucv_tx() (git-fixes bsc#1211692).
- s390/pkey: zeroize key blobs (git-fixes bsc#1212619).
- s390/qdio: fix do_sqbs() inline assembly constraint (git-fixes bsc#1211693).
- s390/qeth: fix use-after-free in hsci (bsc#1210449 git-fixes).
- s390/uaccess: add missing earlyclobber annotations to __clear_user() (bsc#1209856 git-fixes).
- s390/vdso: remove -nostdlib compiler flag (git-fixes bsc#1211714).
- s390/vfio-ap: fix an error handling path in vfio_ap_mdev_probe_queue() (git-fixes).
- s390/vfio-ap: fix memory leak in vfio_ap device driver (git-fixes).
- sched, cpuset: Fix dl_cpu_busy() panic due to empty (git-fixes)
- sched/core: Avoid obvious double update_rq_clock warning (git-fixes)
- sched/core: Fix arch_scale_freq_tick() on tickless systems (git-fixes)
- sched/core: Introduce sched_asym_cpucap_active() (git-fixes)
- sched/deadline: Merge dl_task_can_attach() and dl_cpu_busy() (git-fixes)
- sched/debug: fix dentry leak in update_sched_domain_debugfs (git-fixes)
- sched/fair: Fix imbalance overflow (bsc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Limit sched slice duration (bsc#1189999 (Scheduler functional and performance backports)).
- sched/fair: Move calculate of avg_load to a better location (bsc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Sanitize vruntime of entity being migrated (bsc#1203325).
- sched/fair: sanitize vruntime of entity being placed (bsc#1203325).
- sched/numa: Stop an exhastive search if an idle core is found (bsc#1189999 (Scheduler functional and performance backports)).
- sched/psi: Fix use-after-free in ep_remove_wait_queue() (bsc#1209799).
- sched/tracing: Report TASK_RTLOCK_WAIT tasks as (git-fixes)
- sched/uclamp: Make asym_fits_capacity() use util_fits_cpu() (git-fixes)
- sched: Avoid double preemption in __cond_resched_*lock*() (git-fixes)
- sched: Fix DEBUG &amp;&amp; !SCHEDSTATS warn (git-fixes)
- sched_getaffinity: do not assume 'cpumask_size()' is fully initialized (bsc#1155798 (CPU scheduler functional and performance backports)).
- scsi: Revert 'scsi: core: map PQ=1, PDT=other values to SCSI_SCAN_TARGET_PRESENT' (git-fixes).
- scsi: aacraid: Allocate cmd_priv with scsicmd (git-fixes).
- scsi: aic94xx: Add missing check for dma_map_single() (git-fixes).
- scsi: core: Add BLIST_NO_VPD_SIZE for some VDASD (git-fixes bsc#1203039) (renamed now that it's upstgream)
- scsi: core: Add BLIST_SKIP_VPD_PAGES for SKhynix H28U74301AMR (git-fixes).
- scsi: core: Decrease scsi_device's iorequest_cnt if dispatch failed (git-fixes).
- scsi: core: Fix a procfs host directory removal regression (git-fixes).
- scsi: core: Fix a source code comment (git-fixes).
- scsi: core: Improve scsi_vpd_inquiry() checks (git-fixes).
- scsi: core: Remove the /proc/scsi/${proc_name} directory earlier (git-fixes).
- scsi: hisi_sas: Check devm_add_action() return value (git-fixes).
- scsi: hisi_sas: Handle NCQ error when IPTT is valid (git-fixes).
- scsi: hisi_sas: Revert change to limit max hw sectors for v3 HW (bsc#1210230).
- scsi: hisi_sas: Set a port invalid only if there are no devices attached when refreshing port id (git-fixes).
- scsi: hpsa: Fix allocation size for scsi_host_alloc() (git-fixes).
- scsi: ipr: Work around fortify-string warning (git-fixes).
- scsi: iscsi_tcp: Check that sock is valid before iscsi_set_param() (git-fixes).
- scsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress (git-fixes).
- scsi: iscsi_tcp: Fix UAF during logout when accessing the shost ipaddress (git-fixes).
- scsi: kABI workaround for fc_host_fpin_rcv (git-fixes).
- scsi: libsas: Add sas_ata_device_link_abort() (git-fixes).
- scsi: libsas: Grab the ATA port lock in sas_ata_device_link_abort() (git-fixes).
- scsi: libsas: Remove useless dev_list delete in sas_ex_discover_end_dev() (git-fixes).
- scsi: lpfc: Add new RCQE status for handling DMA failures (bsc#1211847).
- scsi: lpfc: Avoid usage of list iterator variable after loop (git-fixes).
- scsi: lpfc: Check kzalloc() in lpfc_sli4_cgn_params_read() (git-fixes).
- scsi: lpfc: Copyright updates for 14.2.0.10 patches (bsc#1208607).
- scsi: lpfc: Copyright updates for 14.2.0.11 patches (bsc#1210943).
- scsi: lpfc: Correct used_rpi count when devloss tmo fires with no recovery (bsc#1210943).
- scsi: lpfc: Defer issuing new PLOGI if received RSCN before completing REG_LOGIN (bsc#1210943).
- scsi: lpfc: Drop redundant pci_enable_pcie_error_reporting() (bsc#1210943).
- scsi: lpfc: Exit PRLI completion handling early if ndlp not in PRLI_ISSUE state (bsc#1208607).
- scsi: lpfc: Fix double free in lpfc_cmpl_els_logo_acc() caused by lpfc_nlp_not_used() (bsc#1211847).
- scsi: lpfc: Fix double word in comments (bsc#1210943).
- scsi: lpfc: Fix ioremap issues in lpfc_sli4_pci_mem_setup() (bsc#1210943).
- scsi: lpfc: Fix lockdep warning for rx_monitor lock when unloading driver (bsc#1210943).
- scsi: lpfc: Fix space indentation in lpfc_xcvr_data_show() (bsc#1208607).
- scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write (bsc#1208607).
- scsi: lpfc: Fix verbose logging for SCSI commands issued to SES devices (bsc#1211847).
- scsi: lpfc: Introduce new attention types for lpfc_sli4_async_fc_evt() handler (bsc#1208607).
- scsi: lpfc: Match lock ordering of lpfc_cmd-&gt;buf_lock and hbalock for abort paths (bsc#1211847).
- scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow (bsc#1210943).
- scsi: lpfc: Record LOGO state with discovery engine even if aborted (bsc#1210943).
- scsi: lpfc: Reinitialize internal VMID data structures after FLOGI completion (bsc#1208607).
- scsi: lpfc: Remove duplicate ndlp kref decrement in lpfc_cleanup_rpis() (bsc#1208607 bsc#1208534).
- scsi: lpfc: Remove redundant clean up code in disable_vport() (bsc#1208607).
- scsi: lpfc: Reorder freeing of various DMA buffers and their list removal (bsc#1210943).
- scsi: lpfc: Replace blk_irq_poll intr handler with threaded IRQ (bsc#1211847).
- scsi: lpfc: Replace outdated strncpy() with strscpy() (bsc#1208607).
- scsi: lpfc: Resolve miscellaneous variable set but not used compiler warnings (bsc#1208607).
- scsi: lpfc: Revise lpfc_error_lost_link() reason code evaluation logic (bsc#1210943).
- scsi: lpfc: Set max DMA segment size to HBA supported SGE length (bsc#1208607).
- scsi: lpfc: Silence an incorrect device output (bsc#1210943).
- scsi: lpfc: Skip waiting for register ready bits when in unrecoverable state (bsc#1210943).
- scsi: lpfc: Update congestion warning notification period (bsc#1211847).
- scsi: lpfc: Update lpfc version to 14.2.0.10 (bsc#1208607).
- scsi: lpfc: Update lpfc version to 14.2.0.11 (bsc#1210943).
- scsi: lpfc: Update lpfc version to 14.2.0.12 (bsc#1211847).
- scsi: megaraid: Fix mega_cmd_done() CMDID_INT_CMDS (git-fixes).
- scsi: megaraid_sas: Fix crash after a double completion (git-fixes).
- scsi: megaraid_sas: Fix fw_crash_buffer_show() (git-fixes).
- scsi: megaraid_sas: Update max supported LD IDs to 240 (git-fixes).
- scsi: mpi3mr: Fix issues in mpi3mr_get_all_tgt_info() (git-fixes).
- scsi: mpi3mr: Fix missing mrioc-&gt;evtack_cmds initialization (git-fixes).
- scsi: mpi3mr: Fix throttle_groups memory leak (git-fixes).
- scsi: mpi3mr: Remove unnecessary memcpy() to alltgt_info-&gt;dmi (git-fixes).
- scsi: mpi3mr: Suppress command reply debug prints (bsc#1211820).
- scsi: mpt3sas: Do not print sense pool info twice (git-fixes).
- scsi: mpt3sas: Fix NULL pointer access in mpt3sas_transport_port_add() (git-fixes).
- scsi: mpt3sas: Fix a memory leak (git-fixes).
- scsi: mpt3sas: Remove scsi_dma_map() error messages (git-fixes).
- scsi: qedi: Fix use after free bug in qedi_remove() (git-fixes).
- scsi: qla2xxx: Add option to disable FC2 Target support (bsc#1198438 bsc#1206103).
- scsi: qla2xxx: Check if port is online before sending ELS (bsc#1208570).
- scsi: qla2xxx: Drop redundant pci_enable_pcie_error_reporting() (bsc#1211960).
- scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests (bsc#1208570).
- scsi: qla2xxx: Fix IOCB resource check warning (bsc#1208570).
- scsi: qla2xxx: Fix erroneous link down (bsc#1208570).
- scsi: qla2xxx: Fix exchange oversubscription (bsc#1208570).
- scsi: qla2xxx: Fix exchange oversubscription for management commands (bsc#1208570).
- scsi: qla2xxx: Fix hang in task management (bsc#1211960).
- scsi: qla2xxx: Fix link failure in NPIV environment (bsc#1208570).
- scsi: qla2xxx: Fix mem access after free (bsc#1211960).
- scsi: qla2xxx: Fix memory leak in qla2x00_probe_one() (git-fixes).
- scsi: qla2xxx: Fix printk() format string (bsc#1208570).
- scsi: qla2xxx: Fix stalled login (bsc#1208570).
- scsi: qla2xxx: Fix task management cmd fail due to unavailable resource (bsc#1211960).
- scsi: qla2xxx: Fix task management cmd failure (bsc#1211960).
- scsi: qla2xxx: Make qla_trim_buf() and __qla_adjust_buf() static (bsc#1208570).
- scsi: qla2xxx: Multi-que support for TMF (bsc#1211960).
- scsi: qla2xxx: Perform lockless command completion in abort path (git-fixes).
- scsi: qla2xxx: Refer directly to the qla2xxx_driver_template (bsc#1211960).
- scsi: qla2xxx: Relocate/rename vp map (bsc#1208570).
- scsi: qla2xxx: Remove dead code (GNN ID) (bsc#1208570).
- scsi: qla2xxx: Remove dead code (GPNID) (bsc#1208570).
- scsi: qla2xxx: Remove dead code (bsc#1208570).
- scsi: qla2xxx: Remove default fabric ops callouts (bsc#1211960).
- scsi: qla2xxx: Remove increment of interface err cnt (bsc#1208570).
- scsi: qla2xxx: Remove the unused variable wwn (bsc#1208570).
- scsi: qla2xxx: Remove unintended flag clearing (bsc#1208570).
- scsi: qla2xxx: Replace all non-returning strlcpy() with strscpy() (bsc#1211960).
- scsi: qla2xxx: Select qpair depending on which CPU post_cmd() gets called (bsc#1208570).
- scsi: qla2xxx: Simplify if condition evaluation (bsc#1208570).
- scsi: qla2xxx: Synchronize the IOCB count to be in order (bsc#1209292 bsc#1209684 bsc#1209556).
- scsi: qla2xxx: Update version to 10.02.08.100-k (bsc#1208570).
- scsi: qla2xxx: Update version to 10.02.08.200-k (bsc#1208570).
- scsi: qla2xxx: Update version to 10.02.08.300-k (bsc#1211960).
- scsi: qla2xxx: Use a variable for repeated mem_size computation (bsc#1208570).
- scsi: qla2xxx: Wait for io return on terminate rport (bsc#1211960).
- scsi: qla2xxx: edif: Fix clang warning (bsc#1208570).
- scsi: qla2xxx: edif: Fix performance dip due to lock contention (bsc#1208570).
- scsi: qla2xxx: edif: Fix stall session after app start (bsc#1208570).
- scsi: qla2xxx: edif: Reduce memory usage during low I/O (bsc#1208570).
- scsi: scsi_dh_alua: Fix memleak for 'qdata' in alua_activate() (git-fixes).
- scsi: scsi_ioctl: Validate command size (git-fixes).
- scsi: scsi_transport_fc: Add an additional flag to fc_host_fpin_rcv() (bsc#1210943).
- scsi: sd: Fix wrong zone_write_granularity value during revalidate (git-fixes).
- scsi: sd: Revert 'Rework asynchronous resume support' (bsc#1209092).
- scsi: ses: Do not attach if enclosure has no components (git-fixes).
- scsi: ses: Fix possible addl_desc_ptr out-of-bounds accesses (git-fixes).
- scsi: ses: Fix possible desc_ptr out-of-bounds accesses (git-fixes).
- scsi: ses: Fix slab-out-of-bounds in ses_enclosure_data_process() (git-fixes).
- scsi: ses: Fix slab-out-of-bounds in ses_intf_remove() (git-fixes).
- scsi: ses: Handle enclosure with just a primary component gracefully (git-fixes).
- scsi: smartpqi: Add controller cache flush during rmmod (bsc#1207315).
- scsi: smartpqi: Add new controller PCI IDs (bsc#1207315).
- scsi: smartpqi: Change sysfs raid_level attribute to N/A for controllers (bsc#1207315).
- scsi: smartpqi: Change version to 2.1.20-035 (bsc#1207315).
- scsi: smartpqi: Convert to host_tagset (bsc#1207315).
- scsi: smartpqi: Correct device removal for multi-actuator devices (bsc#1207315).
- scsi: smartpqi: Correct max LUN number (bsc#1207315).
- scsi: smartpqi: Initialize feature section info (bsc#1207315).
- scsi: smartpqi: Replace one-element array with flexible-array member (bsc#1207315).
- scsi: snic: Fix memory leak with using debugfs_lookup() (git-fixes).
- scsi: stex: Fix gcc 13 warnings (git-fixes).
- scsi: storvsc: Correct reporting of Hyper-V I/O size limits (git-fixes).
- scsi: storvsc: Do not pass unused PFNs to Hyper-V host (git-fixes).
- scsi: storvsc: Handle BlockSize change in Hyper-V VHD/VHDX file (git-fixes).
- scsi: tracing: Fix compile error in trace_array calls when TRACING is disabled (git-fixes).
- scsi: ufs: Stop using the clock scaling lock in the error handler (git-fixes).
- scsi: ufs: core: Enable link lost interrupt (git-fixes).
- scsi_disk kABI: add back members (bsc#1209092).
- sctp: fail if no bound addresses can be used for a given scope (bsc#1206677).
- sctp: sctp_sock_filter(): avoid list_entry() on possibly empty list (bsc#1208602, git-fixes).
- seccomp: Move copy_seccomp() to no failure path (bsc#1210817).
- sefltests: netdevsim: wait for devlink instance after netns removal (git-fixes).
- selftest/lkdtm: Skip stack-entropy test if lkdtm is not available (git-fixes).
- selftests mount: Fix mount_setattr_test builds failed (git-fixes).
- selftests/ftrace: Add check for ping command for trigger tests (bsc#1204993 ltc#200103).
- selftests/ftrace: Convert tracer tests to use 'requires' to specify program dependency (bsc#1204993 ltc#200103).
- selftests/kselftest/runner/run_one(): allow running non-executable files (git-fixes).
- selftests/powerpc: Account for offline cpus in perf-hwbreak test (bsc#1206232).
- selftests/powerpc: Bump up rlimit for perf-hwbreak test (bsc#1206232).
- selftests/powerpc: Move perror closer to its use (bsc#1206232).
- selftests/ptp: Fix timestamp printf format for PTP_SYS_OFFSET (git-fixes).
- selftests/resctrl: Allow -&gt;setup() to return errors (git-fixes).
- selftests/resctrl: Check for return value after write_schemata() (git-fixes).
- selftests/resctrl: Extend CPU vendor detection (git-fixes).
- selftests/resctrl: Move -&gt;setup() call outside of test specific branches (git-fixes).
- selftests/resctrl: Return NULL if malloc_and_init_memory() did not alloc mem (git-fixes).
- selftests/sgx: Add 'test_encl.elf' to TEST_FILES (git-fixes).
- selftests/vm: remove ARRAY_SIZE define from individual tests (git-fixes).
- selftests: Provide local define of __cpuid_count() (git-fixes).
- selftests: forwarding: lib: quote the sysctl values (git-fixes).
- selftests: mptcp: connect: skip if MPTCP is not supported (git-fixes).
- selftests: mptcp: depend on SYN_COOKIES (git-fixes).
- selftests: mptcp: pm nl: skip if MPTCP is not supported (git-fixes).
- selftests: mptcp: sockopt: return error if wrong mark (git-fixes).
- selftests: mptcp: sockopt: skip if MPTCP is not supported (git-fixes).
- selftests: net: udpgso_bench: Fix racing bug between the rx/tx programs (git-fixes).
- selftests: net: udpgso_bench_rx/tx: Stop when wrong CLI args are provided (git-fixes).
- selftests: net: udpgso_bench_rx: Fix 'used uninitialized' compiler warning (git-fixes).
- selftests: net: udpgso_bench_tx: Cater for pending datagrams zerocopy benchmarking (git-fixes).
- selftests: seg6: disable DAD on IPv6 router cfg for srv6_end_dt4_l3vpn_test (git-fixes).
- selftests: sigaltstack: fix -Wuninitialized (git-fixes).
- selftests: srv6: make srv6_end_dt46_l3vpn_test more robust (git-fixes).
- selftests: xsk: Disable IPv6 on VETH1 (git-fixes).
- selftets: seg6: disable rp_filter by default in srv6_end_dt4_l3vpn_test (git-fixes).
- selinux: do not use make's grouped targets feature yet (git-fixes).
- selinux: ensure av_permissions.h is built when needed (git-fixes).
- selinux: fix Makefile dependencies of flask.h (git-fixes).
- serial: 8250: ASPEED_VUART: select REGMAP instead of depending on it (git-fixes).
- serial: 8250: Add missing wakeup event reporting (git-fixes).
- serial: 8250: Reinit port-&gt;pm on port specific driver unbind (git-fixes).
- serial: 8250: SERIAL_8250_ASPEED_VUART should depend on ARCH_ASPEED (git-fixes).
- serial: 8250: lock port for UART_IER access in omap8250_irq() (git-fixes).
- serial: 8250: lock port for stop_rx() in omap8250_irq() (git-fixes).
- serial: 8250: omap: Fix freeing of resources on failed register (git-fixes).
- serial: 8250_bcm7271: Fix arbitration handling (git-fixes).
- serial: 8250_bcm7271: balance clk_enable calls (git-fixes).
- serial: 8250_bcm7271: fix leak in `brcmuart_probe` (git-fixes).
- serial: 8250_dma: Fix DMA Rx rearm race (git-fixes).
- serial: 8250_em: Fix UART port type (git-fixes).
- serial: 8250_exar: Add support for USR298x PCI Modems (git-fixes).
- serial: 8250_exar: derive nr_ports from PCI ID for Acces I/O cards (git-fixes).
- serial: 8250_fsl: fix handle_irq locking (git-fixes).
- serial: 8250_omap: Use force_suspend and resume for system suspend (git-fixes).
- serial: 8250_tegra: Fix an error handling path in tegra_uart_probe() (git-fixes).
- serial: Add support for Advantech PCI-1611U card (git-fixes).
- serial: arc_uart: fix of_iomap leak in `arc_serial_probe` (git-fixes).
- serial: atmel: do not enable IRQs prematurely (git-fixes).
- serial: exar: Add support for Sealevel 7xxxC serial cards (git-fixes).
- serial: fsl_lpuart: Fix comment typo (git-fixes).
- serial: fsl_lpuart: fix RS485 RTS polariy inverse issue (git-fixes).
- serial: lantiq: add missing interrupt ack (git-fixes).
- serial: qcom-geni: fix console shutdown hang (git-fixes).
- serial: qcom-geni: fix enabling deactivated interrupt (git-fixes).
- serial: sc16is7xx: setup GPIO controller later in probe (git-fixes).
- serial: stm32: re-introduce an irq flag condition in usart_receive_chars (git-fixes).
- serial: tegra: Add missing clk_disable_unprepare() in tegra_uart_hw_init() (git-fixes).
- sfc: Change VF mac via PF as first preference if available (git-fixes).
- sfc: Fix module EEPROM reporting for QSFP modules (git-fixes).
- sfc: Fix use-after-free due to selftest_work (git-fixes).
- sfc: correctly advertise tunneled IPv6 segmentation (git-fixes).
- sfc: disable RXFCS and RXALL features by default (git-fixes).
- sfc: ef10: do not overwrite offload features at NIC reset (git-fixes).
- sfc: fix TX channel offset when using legacy interrupts (git-fixes).
- sfc: fix considering that all channels have TX queues (git-fixes).
- sfc: fix null pointer dereference in efx_hard_start_xmit (git-fixes).
- sfc: fix wrong tx channel offset with efx_separate_tx_channels (git-fixes).
- sfc: include vport_id in filter spec hash and equal() (git-fixes).
- signal handling: do not use BUG_ON() for debugging (bsc#1210439).
- signal/s390: Use force_sigsegv in default_trap_handler (git-fixes bsc#1212861).
- signal/seccomp: Refactor seccomp signal and coredump generation (git-fixes).
- signal/vm86_32: Properly send SIGSEGV when the vm86 state cannot be saved (git-fixes).
- signal/x86: In emulate_vsyscall force a signal instead of calling do_exit (git-fixes).
- signal: Add SA_IMMUTABLE to ensure forced siganls do not get changed (bsc#1210816).
- signal: Do not always set SA_IMMUTABLE for forced signals (bsc#1210816).
- signal: HANDLER_EXIT should clear SIGNAL_UNKILLABLE (bsc#1210816).
- signal: Implement force_fatal_sig (git-fixes).
- smb3.1.1: add new tree connect ShareFlags (bsc#1193629).
- smb3: Add missing locks to protect deferred close file list (git-fixes).
- smb3: Close all deferred handles of inode in case of handle lease break (bsc#1193629).
- smb3: Close deferred file handles in case of handle lease break (bsc#1193629).
- smb3: Replace smb2pdu 1-element arrays with flex-arrays (bsc#1193629).
- smb3: display debug information better for encryption (bsc#1193629).
- smb3: drop reference to cfile before sending oplock break (bsc#1193629).
- smb3: fix problem remounting a share after shutdown (bsc#1193629).
- smb3: fix unusable share after force unmount failure (bsc#1193629).
- smb3: force unmount was failing to close deferred close files (bsc#1193629).
- smb3: improve parallel reads of large files (bsc#1193629).
- smb3: lower default deferred close timeout to address perf regression (bsc#1193629).
- smb3: make query_on_disk_id open context consistent and move to common code (bsc#1193629).
- smb3: move some common open context structs to smbfs_common (bsc#1193629).
- soc/fsl/qe: fix usb.c build errors (git-fixes).
- soc/tegra: cbb: Use correct master_id mask for CBB NOC in Tegra194 (git-fixes).
- soc: samsung: exynos-pmu: Re-introduce Exynos4212 support (git-fixes).
- soc: ti: pm33xx: Fix refcount leak in am33xx_pm_probe (git-fixes).
- soundwire: cadence: Do not overflow the command FIFOs (git-fixes).
- soundwire: dmi-quirks: add new mapping for HP Spectre x360 (git-fixes).
- soundwire: qcom: correct setting ignore bit on v1.5.1 (git-fixes).
- soundwire: qcom: fix storing port config out-of-bounds (git-fixes).
- soundwire: qcom: gracefully handle too many ports in DT (git-fixes).
- spi: bcm-qspi: return error if neither hif_mspi nor mspi is available (git-fixes).
- spi: bcm63xx-hsspi: Endianness fix for ARM based SoC (git-fixes).
- spi: cadence-quadspi: fix suspend-resume implementations (git-fixes).
- spi: dw: Fix wrong FIFO level setting for long xfers (git-fixes).
- spi: dw: Round of n_bytes to power of 2 (git-fixes).
- spi: dw_bt1: fix MUX_MMIO dependencies (git-fixes).
- spi: fsl-dspi: avoid SCK glitches with continuous transfers (git-fixes).
- spi: fsl-spi: Fix CPM/QE mode Litte Endian (git-fixes).
- spi: lpspi: disable lpspi module irq in DMA mode (git-fixes).
- spi: qup: Do not skip cleanup in remove's error path (git-fixes).
- spi: qup: Request DMA before enabling clocks (git-fixes).
- spi: spi-geni-qcom: Correct CS_TOGGLE bit in SPI_TRANS_CFG (git-fixes).
- spi: spi-imx: fix MX51_ECSPI_* macros when cs &gt; 3 (git-fixes).
- spi: spi-imx: using pm_runtime_resume_and_get instead of pm_runtime_get_sync (git-fixes).
- spi: spidev: remove debug messages that access spidev-&gt;spi without locking (git-fixes).
- spi: synquacer: Fix timeout handling in synquacer_spi_transfer_one() (git-fixes).
- spi: tegra210-quad: Fix combined sequence (bsc#1212584)
- spi: tegra210-quad: Fix iterator outside loop (git-fixes).
- spi: tegra210-quad: Fix validate combined sequence (git-fixes).
- spi: tegra210-quad: Multi-cs support (bsc#1212584)
- squashfs: harden sanity check in squashfs_read_xattr_id_table (git-fixes).
- staging: emxx_udc: Add checks for dma_alloc_coherent() (git-fixes).
- staging: iio: resolver: ads1210: fix config mode (git-fixes).
- staging: mt7621-dts: change palmbus address to lower case (git-fixes).
- staging: mt7621-dts: change some node hex addresses to lower case (git-fixes).
- staging: octeon: delete my name from TODO contact (git-fixes).
- staging: rtl8192e: Fix W_DISABLE# does not work after stop/start (git-fixes).
- staging: rtl8192e: Remove call_usermodehelper starting RadioPower.sh (git-fixes).
- staging: rtl8192e: Remove function ..dm_check_ac_dc_power calling a script (git-fixes).
- staging: rtl8192e: Replace macro RTL_PCI_DEVICE with PCI_DEVICE (git-fixes).
- stat: fix inconsistency between struct stat and struct compat_stat (git-fixes).
- struct ci_hdrc: hide new member at end (git-fixes).
- struct dwc3: mask new member (git-fixes).
- struct uvc_device move flush_status new member to end (git-fixes).
- sunrpc allow for unspecified transport time in rpc_clnt_add_xprt (git-fixes).
- sunrpc: Clean up svc_deferred_class trace events (git-fixes).
- sunrpc: Do not dereference xprt-&gt;snd_task if it's a cookie (git-fixes).
- sunrpc: Do not leak netobj memory when gss_read_proxy_verf() fails (git-fixes).
- sunrpc: Fix a server shutdown leak (git-fixes).
- sunrpc: Fix missing release socket in rpc_sockname() (git-fixes).
- sunrpc: Fix null-ptr-deref when xps sysfs alloc failed (git-fixes).
- sunrpc: Fix potential race conditions in rpc_sysfs_xprt_state_change() (git-fixes).
- sunrpc: Fix socket waits for write buffer space (git-fixes).
- sunrpc: Return true/false (not 1/0) from bool functions (git-fixes).
- sunrpc: Update trace flags (git-fixes).
- sunrpc: Use BIT() macro in rpc_show_xprt_state() (git-fixes).
- sunrpc: ensure the matching upcall is in-flight upon downcall (git-fixes).
- sunrpc: fix breakage caused by introduction of rq_xprt_ctxt (bsc#1210775).
- sunrpc: only free unix grouplist after RCU settles (git-fixes).
- swim3: add missing major.h include (git-fixes).
- swiotlb: Free tbl memory in swiotlb_exit() (jsc#PED-3259).
- swiotlb: add a SWIOTLB_ANY flag to lift the low memory restriction (PED-3259).
- swiotlb: avoid potential left shift overflow (PED-3259).
- swiotlb: clean up some coding style and minor issues (PED-3259).
- swiotlb: consolidate rounding up default_nslabs (PED-3259).
- swiotlb: do not panic when the swiotlb buffer can't be allocated (PED-3259).
- swiotlb: ensure a segment does not cross the area boundary (PED-3259).
- swiotlb: fail map correctly with failed io_tlb_default_mem (PED-3259).
- swiotlb: fix a typo (PED-3259).
- swiotlb: fix passing local variable to debugfs_create_ulong() (PED-3259).
- swiotlb: fix setting -&gt;force_bounce (PED-3259).
- swiotlb: fix use after free on error handling path (PED-3259).
- swiotlb: make swiotlb_exit a no-op if SWIOTLB_FORCE is set (PED-3259).
- swiotlb: make the swiotlb_init interface more useful (PED-3259).
- swiotlb: merge swiotlb-xen initialization into swiotlb (jsc#PED-3259).
- swiotlb: panic if nslabs is too small (PED-3259).
- swiotlb: pass a gfp_mask argument to swiotlb_init_late (PED-3259).
- swiotlb: provide swiotlb_init variants that remap the buffer (PED-3259).
- swiotlb: relocate PageHighMem test away from rmem_swiotlb_setup (git-fixes).
- swiotlb: remove a useless return in swiotlb_init (PED-3259).
- swiotlb: remove swiotlb_init_with_tbl and swiotlb_init_late_with_tbl (PED-3259).
- swiotlb: remove unused fields in io_tlb_mem (PED-3259).
- swiotlb: rename swiotlb_late_init_with_default_size (PED-3259).
- swiotlb: simplify debugfs setup (jsc#PED-3259).
- swiotlb: simplify swiotlb_max_segment (PED-3259).
- swiotlb: split up the global swiotlb lock (PED-3259).
- swiotlb: use the right nslabs value in swiotlb_init_remap (PED-3259).
- swiotlb: use the right nslabs-derived sizes in swiotlb_init_late (PED-3259).
- sysctl: add a new register_sysctl_init() interface (bsc#1207328).
- task_work: Decouple TIF_NOTIFY_SIGNAL and task_work (git-fixes).
- task_work: Introduce task_work_pending (git-fixes).
- test_firmware: Use kstrtobool() instead of strtobool() (git-fixes).
- test_firmware: fix the memory leak of the allocated firmware buffer (git-fixes).
- test_firmware: prevent race conditions by a correct implementation of locking (git-fixes).
- test_firmware: return ENOMEM instead of ENOSPC on failed memory allocation (git-fixes).
- thermal/core: Remove duplicate information when an error occurs (git-fixes).
- thermal/drivers/hisi: Drop second sensor hi3660 (git-fixes).
- thermal/drivers/sun8i: Fix some error handling paths in sun8i_ths_probe() (git-fixes).
- thermal/drivers/tsens: Add compat string for the qcom,msm8960 (git-fixes).
- thermal/drivers/tsens: Drop msm8976-specific defines (git-fixes).
- thermal/drivers/tsens: Sort out msm8976 vs msm8956 data (git-fixes).
- thermal/drivers/tsens: fix slope values for msm8939 (git-fixes).
- thermal/drivers/tsens: limit num_sensors to 9 for msm8939 (git-fixes).
- thermal: intel: BXT_PMIC: select REGMAP instead of depending on it (git-fixes).
- thermal: intel: Fix unsigned comparison with less than zero (git-fixes).
- thermal: intel: intel_pch: Add support for Wellsburg PCH (git-fixes).
- thermal: intel: powerclamp: Fix cur_state for multi package system (git-fixes).
- thermal: intel: quark_dts: fix error pointer dereference (git-fixes).
- thunderbolt: Add missing UNSET_INBOUND_SBTX for retimer access (git-fixes).
- thunderbolt: Call tb_check_quirks() after initializing adapters (git-fixes).
- thunderbolt: Clear registers properly when auto clear isn't in use (bsc#1210165).
- thunderbolt: Disable interrupt auto clear for rings (git-fixes).
- thunderbolt: Mask ring interrupt on Intel hardware as well (bsc#1210165).
- thunderbolt: Rename shadowed variables bit to interrupt_bit and auto_clear_bit (git-fixes).
- thunderbolt: Use const qualifier for `ring_interrupt_index` (git-fixes).
- thunderbolt: Use scale field when allocating USB3 bandwidth (git-fixes).
- thunderbolt: dma_test: Use correct value for absent rings when creating paths (git-fixes).
- timers: Prevent union confusion from unexpected (git-fixes)
- tls: Skip tls_append_frag on zero copy size (git-fixes).
- tools/iio/iio_utils:fix memory leak (git-fixes).
- tools/virtio: compile with -pthread (git-fixes).
- tools/virtio: fix the vringh test for virtio ring changes (git-fixes).
- tools/virtio: fix virtio_test execution (git-fixes).
- tools/virtio: initialize spinlocks in vring_test.c (git-fixes).
- tools: bpftool: Remove invalid \' json escape (git-fixes).
- tools: fix ARRAY_SIZE defines in tools and selftests hdrs (git-fixes).
- tpm, tpm_tis: Claim locality before writing TPM_INT_ENABLE register (git-fixes).
- tpm, tpm_tis: Disable interrupts if tpm_tis_probe_irq() failed (git-fixes).
- tpm, tpm_tis: Request threaded interrupt handler (git-fixes).
- tpm/eventlog: Do not abort tpm_read_log on faulty ACPI address (git-fixes).
- tpm/tpm_tis: Disable interrupts for more Lenovo devices (git-fixes).
- trace/hwlat: Do not start per-cpu thread if it is already running (git-fixes).
- trace/hwlat: Do not wipe the contents of per-cpu thread data (git-fixes).
- trace/hwlat: make use of the helper function kthread_run_on_cpu() (git-fixes).
- trace_events_hist: add check for return value of 'create_hist_field' (git-fixes).
- tracing/fprobe: Fix to check whether fprobe is registered correctly (git-fixes).
- tracing/hist: Fix issue of losting command info in error_log (git-fixes).
- tracing/hist: Fix out-of-bound write on 'action_data.var_ref_idx' (git-fixes).
- tracing/hist: Fix wrong return value in parse_action_params() (git-fixes).
- tracing/histograms: Allow variables to have some modifiers (git-fixes).
- tracing/hwlat: Replace sched_setaffinity with set_cpus_allowed_ptr (git-fixes).
- tracing/osnoise: Make osnoise_main to sleep for microseconds (git-fixes).
- tracing/perf: Avoid -Warray-bounds warning for __rel_loc macro (git-fixes).
- tracing/probe: trace_probe_primary_from_call(): checked list_first_entry (git-fixes).
- tracing/probes: Handle system names with hyphens (git-fixes).
- tracing/timer: Add missing hrtimer modes to decode_hrtimer_mode() (git-fixes).
- tracing: Add '__rel_loc' using trace event macros (git-fixes).
- tracing: Add DYNAMIC flag for dynamic events (git-fixes).
- tracing: Add NULL checks for buffer in ring_buffer_free_read_page() (git-fixes).
- tracing: Add trace_array_puts() to write into instance (git-fixes).
- tracing: Add trace_event helper macros __string_len() and __assign_str_len() (git-fixes).
- tracing: Avoid -Warray-bounds warning for __rel_loc macro (git-fixes).
- tracing: Avoid adding tracer option before update_tracer_options (git-fixes).
- tracing: Check field value in hist_field_name() (git-fixes).
- tracing: Do not let histogram values have some modifiers (git-fixes).
- tracing: Do not use out-of-sync va_list in event printing (git-fixes).
- tracing: Ensure trace buffer is at least 4096 bytes large (git-fixes).
- tracing: Fix a kmemleak false positive in tracing_map (git-fixes).
- tracing: Fix complicated dependency of CONFIG_TRACER_MAX_TRACE (git-fixes).
- tracing: Fix infinite loop in tracing_read_pipe on overflowed print_trace_line (git-fixes).
- tracing: Fix issue of missing one synthetic field (git-fixes).
- tracing: Fix mismatched comment in __string_len (git-fixes).
- tracing: Fix permissions for the buffer_percent file (git-fixes).
- tracing: Fix poll() and select() do not work on per_cpu trace_pipe and trace_pipe_raw (git-fixes).
- tracing: Fix possible memory leak in __create_synth_event() error path (git-fixes).
- tracing: Fix race where histograms can be called before the event (git-fixes).
- tracing: Fix sleeping function called from invalid context on RT kernel (git-fixes).
- tracing: Fix tp_printk option related with tp_printk_stop_on_boot (git-fixes).
- tracing: Fix warning on variable 'struct trace_array' (git-fixes).
- tracing: Fix wrong return in kprobe_event_gen_test.c (git-fixes).
- tracing: Free error logs of tracing instances (git-fixes).
- tracing: Have TRACE_DEFINE_ENUM affect trace event types as well (git-fixes).
- tracing: Have event format check not flag %p* on __get_dynamic_array() (git-fixes, bsc#1212350).
- tracing: Have syscall trace events use trace_event_buffer_lock_reserve() (git-fixes).
- tracing: Have tracing_snapshot_instance_cond() write errors to the appropriate instance (git-fixes).
- tracing: Have type enum modifications copy the strings (git-fixes).
- tracing: Introduce helpers to safely handle dynamic-sized sockaddrs (git-fixes).
- tracing: Make splice_read available again (git-fixes).
- tracing: Make sure trace_printk() can output as soon as it can be used (git-fixes).
- tracing: Make tp_printk work on syscall tracepoints (git-fixes).
- tracing: Make tracepoint lockdep check actually test something (git-fixes).
- tracing: Update print fmt check to handle new __get_sockaddr() macro (git-fixes, bsc#1212350).
- tracing: Use alignof__(struct {type b;}) instead of offsetof() (git-fixes).
- tracing: incorrect isolate_mote_t cast in mm_vmscan_lru_isolate (git-fixes).
- tty: Prevent writing chars during tcsetattr TCSADRAIN/FLUSH (git-fixes).
- tty: fix out-of-bounds access in tty_driver_lookup_tty() (git-fixes).
- tty: serial: fsl_lpuart: Fix the wrong RXWATER setting for rx dma case (git-fixes).
- tty: serial: fsl_lpuart: adjust buffer length to the intended size (git-fixes).
- tty: serial: fsl_lpuart: clear LPUART Status Register in lpuart32_shutdown() (git-fixes).
- tty: serial: fsl_lpuart: disable Rx/Tx DMA in lpuart32_shutdown() (git-fixes).
- tty: serial: fsl_lpuart: disable the CTS when send break signal (git-fixes).
- tty: serial: fsl_lpuart: skip waiting for transmission complete when UARTCTRL_SBK is asserted (git-fixes).
- tty: serial: fsl_lpuart: use UARTCTRL_TXINV to send break instead of UARTCTRL_SBK (git-fixes).
- tty: serial: imx: Handle RS485 DE signal active high (git-fixes).
- tty: serial: imx: disable Ageing Timer interrupt request irq (git-fixes).
- tty: serial: imx: fix rs485 rx after tx (git-fixes).
- tty: serial: qcom-geni-serial: stop operations in progress at shutdown (git-fixes).
- tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() in case of error (git-fixes).
- tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() when iterating clk (git-fixes).
- tty: serial: sh-sci: Fix Rx on RZ/G2L SCI (git-fixes).
- tty: serial: sh-sci: Fix transmit end interrupt handler (git-fixes).
- tun: annotate access to queue-&gt;trans_start (jsc#PED-370).
- uas: Add US_FL_NO_REPORT_OPCODES for JMicron JMS583Gen 2 (git-fixes).
- ubi: Fix failure attaching when vid_hdr offset equals to (sub)page size (bsc#1210584).
- ubi: ensure that VID header offset + VID header size &amp;lt;= alloc, size (bsc#1210584).
- ubsan: no need to unset panic_on_warn in ubsan_epilogue() (bsc#1207328).
- udf: Avoid double brelse() in udf_rename() (bsc#1213032).
- udf: Check consistency of Space Bitmap Descriptor (bsc#1210771).
- udf: Define EFSCORRUPTED error code (bsc#1213038).
- udf: Detect system inodes linked into directory hierarchy (bsc#1213114).
- udf: Discard preallocation before extending file with a hole (bsc#1213036).
- udf: Do not bother looking for prealloc extents if i_lenExtents matches i_size (bsc#1213035).
- udf: Do not bother merging very long extents (bsc#1213040).
- udf: Do not update file length for failed writes to inline files (bsc#1213041).
- udf: Fix a slab-out-of-bounds write bug in udf_find_entry() (bsc#1206649).
- udf: Fix error handling in udf_new_inode() (bsc#1213112).
- udf: Fix extending file within last block (bsc#1213037).
- udf: Fix preallocation discarding at indirect extent boundary (bsc#1213034).
- udf: Preserve link count of system files (bsc#1213113).
- udf: Support splicing to file (bsc#1210770).
- udf: Truncate added extents on failed expansion (bsc#1213039).
- update internal module version number for cifs.ko (bsc#1193629).
- usb-storage: fix deadlock when a scsi command timeouts more than once (git-fixes).
- usb: acpi: add helper to check port lpm capability using acpi _DSM (git-fixes).
- usb: cdns3: Fix issue with using incorrect PCI device function (git-fixes).
- usb: cdns3: fix NCM gadget RX speed 20x slow than expection at iMX8QM (git-fixes).
- usb: cdnsp: Fixes error: uninitialized symbol 'len' (git-fixes).
- usb: cdnsp: Fixes issue with redundant Status Stage (git-fixes).
- usb: cdnsp: changes PCI Device ID to fix conflict with CNDS3 driver (git-fixes).
- usb: chipdea: core: fix return -EINVAL if request role is the same with current role (git-fixes).
- usb: chipidea: core: fix possible concurrent when switch role (git-fixes).
- usb: chipidea: fix memory leak with using debugfs_lookup() (git-fixes).
- usb: chipidea: fix missing goto in `ci_hdrc_probe` (git-fixes).
- usb: chipidea: imx: avoid unnecessary probe defer (git-fixes).
- usb: core: Add routines for endpoint checks in old drivers (git-fixes).
- usb: core: Do not hold device lock while reading the 'descriptors' sysfs file (git-fixes).
- usb: core: add quirk for Alcor Link AK9563 smartcard reader (git-fixes).
- usb: core: hub: disable autosuspend for TI TUSB8041 (git-fixes).
- usb: dwc2: fix a devres leak in hw_enable upon suspend resume (git-fixes).
- usb: dwc3-meson-g12a: Fix an error handling path in dwc3_meson_g12a_probe() (git-fixes).
- usb: dwc3: Align DWC3_EP_* flag macros (git-fixes).
- usb: dwc3: Fix a repeated word checkpatch warning (git-fixes).
- usb: dwc3: Fix a typo in field name (git-fixes).
- usb: dwc3: Fix ep0 handling when getting reset while doing control transfer (git-fixes).
- usb: dwc3: core: Host wake up support from system suspend (git-fixes).
- usb: dwc3: debugfs: Resume dwc3 before accessing registers (git-fixes).
- usb: dwc3: drd: use helper to get role-switch-default-mode (git-fixes).
- usb: dwc3: ep0: Do not prepare beyond Setup stage (git-fixes).
- usb: dwc3: fix memory leak with using debugfs_lookup() (git-fixes).
- usb: dwc3: fix runtime pm imbalance on probe errors (git-fixes).
- usb: dwc3: fix runtime pm imbalance on unbind (git-fixes).
- usb: dwc3: fix use-after-free on core driver unbind (git-fixes).
- usb: dwc3: gadget: Add 1ms delay after end transfer command without IOC (git-fixes).
- usb: dwc3: gadget: Change condition for processing suspend event (git-fixes).
- usb: dwc3: gadget: Delay issuing End Transfer (git-fixes).
- usb: dwc3: gadget: Execute gadget stop after halting the controller (git-fixes).
- usb: dwc3: gadget: Improve dwc3_gadget_suspend() and dwc3_gadget_resume() (git-fixes).
- usb: dwc3: gadget: Only End Transfer for ep0 data phase (git-fixes).
- usb: dwc3: gadget: Propagate core init errors to UDC during pullup (git-fixes).
- usb: dwc3: gadget: Reset num TRBs before giving back the request (git-fixes).
- usb: dwc3: gadget: Stall and restart EP0 if host is unresponsive (git-fixes).
- usb: dwc3: pci: add support for the Intel Meteor Lake-M (git-fixes).
- usb: dwc3: pci: add support for the Intel Meteor Lake-S (git-fixes).
- usb: dwc3: qcom: Configure wakeup interrupts during suspend (git-fixes).
- usb: dwc3: qcom: Fix an error handling path in dwc3_qcom_probe() (git-fixes).
- usb: dwc3: qcom: Fix memory leak in dwc3_qcom_interconnect_init (git-fixes).
- usb: dwc3: qcom: Fix potential memory leak (git-fixes).
- usb: dwc3: qcom: Keep power domain on to retain controller status (git-fixes).
- usb: dwc3: qcom: Release the correct resources in dwc3_qcom_remove() (git-fixes).
- usb: dwc3: qcom: clean up icc init (git-fixes).
- usb: dwc3: qcom: clean up suspend callbacks (git-fixes).
- usb: dwc3: qcom: enable vbus override when in OTG dr-mode (git-fixes).
- usb: dwc3: qcom: fix NULL-deref on suspend (git-fixes).
- usb: dwc3: qcom: fix gadget-only builds (git-fixes).
- usb: dwc3: qcom: fix peripheral and OTG suspend (git-fixes).
- usb: dwc3: qcom: fix wakeup implementation (git-fixes).
- usb: dwc3: qcom: only parse 'maximum-speed' once (git-fixes).
- usb: dwc3: qcom: suppress unused-variable warning (git-fixes).
- usb: dwc3: remove a possible unnecessary 'out of memory' message (git-fixes).
- usb: early: xhci-dbc: Fix a potential out-of-bound memory access (git-fixes).
- usb: ene_usb6250: Allocate enough memory for full object (git-fixes).
- usb: fix memory leak with using debugfs_lookup() (git-fixes).
- usb: fotg210: fix memory leak with using debugfs_lookup() (git-fixes).
- usb: gadget: bcm63xx_udc: fix memory leak with using debugfs_lookup() (git-fixes).
- usb: gadget: configfs: Restrict symlink creation is UDC already binded (git-fixes).
- usb: gadget: configfs: remove using list iterator after loop body as a ptr (git-fixes).
- usb: gadget: configfs: use to_config_usb_cfg() in os_desc_link() (git-fixes).
- usb: gadget: configfs: use to_usb_function_instance() in cfg (un)link func (git-fixes).
- usb: gadget: f_fs: Add unbind event before functionfs_unbind (git-fixes).
- usb: gadget: f_fs: Fix unbalanced spinlock in __ffs_ep0_queue_wait (git-fixes).
- usb: gadget: f_hid: fix f_hidg lifetime vs cdev (git-fixes).
- usb: gadget: f_hid: fix refcount leak on error path (git-fixes).
- usb: gadget: f_ncm: fix potential NULL ptr deref in ncm_bitrate() (git-fixes).
- usb: gadget: f_uac2: Fix incorrect increment of bNumEndpoints (git-fixes).
- usb: gadget: fusb300_udc: free irq on the error path in fusb300_probe() (git-fixes).
- usb: gadget: gr_udc: fix memory leak with using debugfs_lookup() (git-fixes).
- usb: gadget: lpc32xx_udc: fix memory leak with using debugfs_lookup() (git-fixes).
- usb: gadget: pxa25x_udc: fix memory leak with using debugfs_lookup() (git-fixes).
- usb: gadget: pxa27x_udc: fix memory leak with using debugfs_lookup() (git-fixes).
- usb: gadget: tegra-xudc: Fix crash in vbus_draw (git-fixes).
- usb: gadget: u_audio: do not let userspace block driver unbind (git-fixes).
- usb: gadget: u_ether: Fix host MAC address case (git-fixes).
- usb: gadget: u_serial: Add null pointer check in gserial_resume (git-fixes).
- usb: gadget: u_serial: Add null pointer check in gserial_suspend (git-fixes).
- usb: gadget: udc: do not clear gadget driver.bus (git-fixes).
- usb: gadget: udc: fix NULL dereference in remove() (git-fixes).
- usb: hide unused usbfs_notify_suspend/resume functions (git-fixes).
- usb: host: xhci-rcar: remove leftover quirk handling (git-fixes).
- usb: host: xhci: mvebu: Iterate over array indexes instead of using pointer math (git-fixes).
- usb: isp116x: fix memory leak with using debugfs_lookup() (git-fixes).
- usb: isp1362: fix memory leak with using debugfs_lookup() (git-fixes).
- usb: max-3421: Fix setting of I/O pins (git-fixes).
- usb: mtu3: fix kernel panic at qmu transfer done irq handler (git-fixes).
- usb: musb: Add and use inline function musb_otg_state_string (git-fixes).
- usb: musb: Add and use inline functions musb_{get,set}_state (git-fixes).
- usb: musb: mediatek: do not unregister something that wasn't registered (git-fixes).
- usb: musb: remove schedule work called after flush (git-fixes).
- usb: phy: phy-tahvo: fix memory leak in tahvo_usb_probe() (git-fixes).
- usb: serial: cp210x: add SCALANCE LPE-9000 device id (git-fixes).
- usb: serial: cp210x: add Silicon Labs IFS-USB-DATACABLE IDs (git-fixes).
- usb: serial: option: add Quectel EC200U modem (git-fixes).
- usb: serial: option: add Quectel EM05-G (CS) modem (git-fixes).
- usb: serial: option: add Quectel EM05-G (GR) modem (git-fixes).
- usb: serial: option: add Quectel EM05-G (RS) modem (git-fixes).
- usb: serial: option: add Quectel EM05CN (SG) modem (git-fixes).
- usb: serial: option: add Quectel EM05CN modem (git-fixes).
- usb: serial: option: add Quectel EM061KGL series (git-fixes).
- usb: serial: option: add Quectel RM500U-CN modem (git-fixes).
- usb: serial: option: add Telit FE990 compositions (git-fixes).
- usb: serial: option: add UNISOC vendor and TOZED LT70C product (git-fixes).
- usb: serial: option: add support for VW/Skoda 'Carstick LTE' (git-fixes).
- usb: sisusbvga: Add endpoint checks (git-fixes).
- usb: sl811: fix memory leak with using debugfs_lookup() (git-fixes).
- usb: typec: altmodes/displayport: Fix configure initial pin assignment (git-fixes).
- usb: typec: altmodes/displayport: Fix probe pin assign check (git-fixes).
- usb: typec: altmodes/displayport: fix pin_assignment_show (git-fixes).
- usb: typec: intel_pmc_mux: Do not leak the ACPI device reference count (git-fixes).
- usb: typec: intel_pmc_mux: Use the helper acpi_dev_get_memory_resources() (git-fixes).
- usb: typec: pd: Remove usb_suspend_supported sysfs from sink PDO (git-fixes).
- usb: typec: tcpm: fix create duplicate source-capabilities file (git-fixes).
- usb: typec: tcpm: fix multiple times discover svids error (git-fixes).
- usb: typec: tcpm: fix warning when handle discover_identity message (git-fixes).
- usb: typec: ucsi: Do not attempt to resume the ports before they exist (git-fixes).
- usb: typec: ucsi: Do not warn on probe deferral (git-fixes).
- usb: typec: ucsi: Fix command cancellation (git-fixes).
- usb: ucsi: Fix NULL pointer deref in ucsi_connector_change() (git-fixes).
- usb: ucsi: Fix ucsi-&gt;connector race (git-fixes).
- usb: ucsi_acpi: Increase the command completion timeout (git-fixes).
- usb: uhci: adjust zhaoxin UHCI controllers OverCurrent bit value (git-fixes).
- usb: uhci: fix memory leak with using debugfs_lookup() (git-fixes).
- usb: usbfs: Enforce page requirements for mmap (git-fixes).
- usb: usbfs: Use consistent mmap functions (git-fixes).
- usb: usbtmc: Fix direction for 0-length ioctl control messages (git-fixes).
- usb: uvc: Enumerate valid values for color matching (git-fixes).
- usb: xhci: Remove unused udev from xhci_log_ctx trace event (git-fixes).
- usb: xhci: tegra: fix sleep in atomic call (git-fixes).
- usrmerge: Adjust module path in the kernel sources (bsc#1212835). With the module path adjustment applied as source patch only ALP/Tumbleweed kernel built on SLE/Leap needs the path changed back to non-usrmerged.
- usrmerge: Compatibility with earlier rpm (boo#1211796)
- vDPA: check VIRTIO_NET_F_RSS for max_virtqueue_paris's presence (jsc#PED-1549).
- vDPA: check virtio device features to detect MQ (jsc#PED-1549).
- vDPA: fix 'cast to restricted le16' warnings in vdpa.c (jsc#PED-1549).
- vc_screen: do not clobber return value in vcs_read (git-fixes).
- vc_screen: modify vcs_size() handling in vcs_read() (git-fixes).
- vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF (git-fixes).
- vc_screen: reload load of struct vc_data pointer in vcs_write() to avoid UAF (git-fixes).
- vdpa/ifcvf: fix the calculation of queuepair (jsc#PED-1549).
- vdpa/mlx5: Directly assign memory key (jsc#PED-1549).
- vdpa/mlx5: Directly assign memory key (jsc#SLE-19253).
- vdpa/mlx5: Do not clear mr struct on destroy MR (jsc#PED-1549).
- vdpa/mlx5: Do not clear mr struct on destroy MR (jsc#SLE-19253).
- vdpa/mlx5: Fix rule forwarding VLAN to TIR (jsc#PED-1549).
- vdpa/mlx5: Fix wrong configuration of virtio_version_1_0 (jsc#SLE-19253).
- vdpa/mlx5: Fix wrong mac address deletion (jsc#PED-1549).
- vdpa/mlx5: Initialize CVQ iotlb spinlock (jsc#PED-1549).
- vdpa/mlx5: should not activate virtq object when suspended (jsc#PED-1549).
- vdpa/vp_vdpa: fix kfree a wrong pointer in vp_vdpa_remove (git-fixes).
- vdpa: Fix error logic in vdpa_nl_cmd_dev_get_doit (jsc#PED-1549).
- vdpa: Fix error logic in vdpa_nl_cmd_dev_get_doit (jsc#SLE-19253).
- vdpa: Use BIT_ULL for bit operations (jsc#PED-1549).
- vdpa: conditionally fill max max queue pair for stats (jsc#PED-1549).
- vdpa: fix use-after-free on vp_vdpa_remove (git-fixes).
- vdpa_sim: not reset state in vdpasim_queue_ready (git-fixes).
- vdpa_sim: set last_used_idx as last_avail_idx in vdpasim_queue_ready (git-fixes).
- vduse: Fix NULL pointer dereference on sysfs access (jsc#PED-1549).
- vduse: Fix returning wrong type in vduse_domain_alloc_iova() (jsc#PED-1549).
- vduse: avoid empty string for dev name (jsc#PED-1549).
- vduse: check that offset is within bounds in get_config() (jsc#PED-1549).
- vduse: fix memory corruption in vduse_dev_ioctl() (jsc#PED-1549).
- vduse: prevent uninitialized memory accesses (jsc#PED-1549).
- vfio/type1: prevent underflow of locked_vm via exec() (git-fixes).
- vfio/type1: restore locked_vm (git-fixes).
- vfio/type1: track locked_vm per dma (git-fixes).
- vfs: Check the truncate maximum size in inode_newsize_ok() (bsc#1207642).
- vfs: filename_create(): fix incorrect intent (bsc#1197534).
- vfs: make sync_filesystem return errors from -&gt;sync_fs (git-fixes).
- vhost-vdpa: fix an iotlb memory leak (jsc#PED-1549).
- vhost-vdpa: free iommu domain after last use during cleanup (jsc#PED-1549).
- vhost/net: Clear the pending messages when the backend is removed (git-fixes).
- vhost_vdpa: fix the crash in unmap a large memory (jsc#PED-1549).
- vhost_vdpa: fix unmap process in no-batch mode (jsc#PED-1549).
- vhost_vdpa: support PACKED when setting-getting vring_base (jsc#PED-1549).
- vhost_vdpa: support PACKED when setting-getting vring_base (jsc#SLE-19253).
- virt/coco/sev-guest: Add throttling awareness (bsc#1209927).
- virt/coco/sev-guest: Carve out the request issuing logic into a helper (bsc#1209927).
- virt/coco/sev-guest: Check SEV_SNP attribute at probe time (bsc#1209927).
- virt/coco/sev-guest: Convert the sw_exit_info_2 checking to a switch-case (bsc#1209927).
- virt/coco/sev-guest: Do some code style cleanups (bsc#1209927).
- virt/coco/sev-guest: Remove the disable_vmpck label in handle_guest_request() (bsc#1209927).
- virt/coco/sev-guest: Simplify extended guest request handling (bsc#1209927).
- virt/sev-guest: Add a MODULE_ALIAS (bsc#1208449).
- virt/sev-guest: Prevent IV reuse in the SNP guest driver (bsc#1208449).
- virt/sev-guest: Remove unnecessary free in init_crypto() (bsc#1208449).
- virt/sev-guest: Return -EIO if certificate buffer is not large enough (bsc#1209927).
- virt: sev-guest: Pass the appropriate argument type to iounmap() (bsc#1208449).
- virt: sevguest: Change driver name to reflect generic SEV support (bsc#1208449).
- virt: sevguest: Rename the sevguest dir and files to sev-guest (bsc#1208449).
- virtio-blk: modify the value type of num in virtio_queue_rq() (git-fixes).
- virtio-net: Keep stop() to follow mirror sequence of open() (git-fixes).
- virtio-net: execute xdp_do_flush() before napi_complete_done() (git-fixes).
- virtio_net: Fix probe failed when modprobe virtio_net (git-fixes).
- virtio_net: bugfix overflow inside xdp_linearize_page() (git-fixes).
- virtio_net: split free_unused_bufs() (git-fixes).
- virtio_net: suppress cpu stall when free_unused_bufs (git-fixes).
- virtio_pci: modify ENOENT to EINVAL (git-fixes).
- virtio_ring: do not update event idx on get_buf (git-fixes).
- vmci: check context-&gt;notify_page after call to get_user_pages_fast() to avoid GPF (git-fixes).
- vmci_host: fix a race condition in vmci_host_poll() causing GPF (git-fixes).
- vmxnet3: move rss code block under eop descriptor (bsc#1208212).
- vmxnet3: use gro callback when UPT is enabled (bsc#1209739).
- vp_vdpa: fix the crash in hot unplug with vp_vdpa (git-fixes).
- w1: fix loop in w1_fini() (git-fixes).
- w1: w1_therm: fix locking behavior in convert_t (git-fixes).
- wait: Fix __wait_event_hrtimeout for RT/DL tasks (git-fixes)
- watch_queue: fix IOC_WATCH_QUEUE_SET_SIZE alloc error paths (bsc#1197617).
- watchdog: Fix kmemleak in watchdog_cdev_register (git-fixes).
- watchdog: allow building BCM7038_WDT for BCM4908 (bsc#1208619).
- watchdog: at91sam9_wdt: use devm_request_irq to avoid missing free_irq() in error path (git-fixes).
- watchdog: diag288_wdt: do not use stack buffers for hardware data (bsc#1207497).
- watchdog: diag288_wdt: fix __diag288() inline assembly (bsc#1207497).
- watchdog: dw_wdt: Fix the error handling path of dw_wdt_drv_probe() (git-fixes).
- watchdog: ixp4xx: Implement restart (bsc#1208619).
- watchdog: ixp4xx: Rewrite driver to use core (bsc#1208619).
- watchdog: ixp4xx_wdt: Fix address space warning (bsc#1208619).
- watchdog: menz069_wdt: fix watchdog initialisation (git-fixes).
- watchdog: orion_wdt: support pretimeout on Armada-XP (bsc#1208619).
- watchdog: pcwd_usb: Fix attempting to access uninitialized memory (git-fixes).
- watchdog: sbsa_wdog: Make sure the timeout programming is within the limits (git-fixes).
- watchdog: sp5100_tco: Immediately trigger upon starting (git-fixes).
- wifi: ath11k: Fix SKB corruption in REO destination ring (git-fixes).
- wifi: ath11k: Fix memory leak in ath11k_peer_rx_frag_setup (git-fixes).
- wifi: ath11k: allow system suspend to survive ath11k (git-fixes).
- wifi: ath11k: fix SAC bug on peer addition with sta band migration (git-fixes).
- wifi: ath11k: fix deinitialization of firmware resources (git-fixes).
- wifi: ath11k: fix writing to unintended memory region (git-fixes).
- wifi: ath11k: reduce the MHI timeout to 20s (bsc#1207948).
- wifi: ath5k: fix an off by one check in ath5k_eeprom_read_freq_list() (git-fixes).
- wifi: ath6kl: minor fix for allocation size (git-fixes).
- wifi: ath6kl: reduce WARN to dev_dbg() in callback (git-fixes).
- wifi: ath9k: Fix possible stall on ath9k_txq_list_has_key() (git-fixes).
- wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback() (git-fixes).
- wifi: ath9k: Fix use-after-free in ath9k_hif_usb_disconnect() (git-fixes).
- wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx (git-fixes).
- wifi: ath9k: convert msecs to jiffies where needed (git-fixes).
- wifi: ath9k: do not allow to overwrite ENDPOINT0 attributes (git-fixes).
- wifi: ath9k: fix AR9003 mac hardware hang check register offset calculation (git-fixes).
- wifi: ath9k: hif_usb: clean up skbs if ath9k_hif_usb_rx_stream() fails (git-fixes).
- wifi: ath9k: hif_usb: fix memory leak of remain_skbs (git-fixes).
- wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function (git-fixes).
- wifi: ath9k: use proper statements in conditionals (git-fixes).
- wifi: ath: Silence memcpy run-time false positive warning (git-fixes).
- wifi: atmel: Fix an error handling path in atmel_probe() (git-fixes).
- wifi: b43: fix incorrect __packed annotation (git-fixes).
- wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() (git-fixes).
- wifi: brcmfmac: cfg80211: Pass the PMK in binary instead of hex (git-fixes).
- wifi: brcmfmac: ensure CLM version is null-terminated to prevent stack-out-of-bounds (git-fixes).
- wifi: brcmfmac: fix potential memory leak in brcmf_netdev_start_xmit() (git-fixes).
- wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() (git-fixes).
- wifi: brcmfmac: support CQM RSSI notification with older firmware (git-fixes).
- wifi: brcmfmac: unmap dma buffer in brcmf_msgbuf_alloc_pktid() (git-fixes).
- wifi: cfg80211: Fix extended KCK key length check in nl80211_set_rekey_data() (git-fixes).
- wifi: cfg80211: Fix use after free for wext (git-fixes).
- wifi: cfg80211: Partial revert 'wifi: cfg80211: Fix use after free for wext' (git-fixes).
- wifi: cfg80211: fix locking in regulatory disconnect (git-fixes).
- wifi: cfg80211: fix locking in sched scan stop work (git-fixes).
- wifi: cfg80211: rewrite merging of inherited elements (git-fixes).
- wifi: ipw2200: fix memory leak in ipw_wdev_init() (git-fixes).
- wifi: ipw2x00: do not call dev_kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: iwl3945: Add missing check for create_singlethread_workqueue (git-fixes).
- wifi: iwl4965: Add missing check for create_singlethread_workqueue() (git-fixes).
- wifi: iwlegacy: common: do not call dev_kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: iwlwifi: debug: fix crash in __iwl_err() (git-fixes).
- wifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace (git-fixes).
- wifi: iwlwifi: fix OEM's name in the ppag approved list (git-fixes).
- wifi: iwlwifi: fix duplicate entry in iwl_dev_info_table (git-fixes).
- wifi: iwlwifi: fw: fix DBGI dump (git-fixes).
- wifi: iwlwifi: fw: fix memory leak in debugfs (git-fixes).
- wifi: iwlwifi: fw: move memset before early return (git-fixes).
- wifi: iwlwifi: make the loop for card preparation effective (git-fixes).
- wifi: iwlwifi: mvm: check firmware response size (git-fixes).
- wifi: iwlwifi: mvm: do not set CHECKSUM_COMPLETE for unsupported protocols (git-fixes).
- wifi: iwlwifi: mvm: do not trust firmware n_channels (git-fixes).
- wifi: iwlwifi: mvm: fix OEM's name in the tas approved list (git-fixes).
- wifi: iwlwifi: mvm: fix cancel_delayed_work_sync() deadlock (git-fixes).
- wifi: iwlwifi: mvm: fix mvmtxq-&gt;stopped handling (git-fixes).
- wifi: iwlwifi: mvm: indicate HW decrypt for beacon protection (git-fixes).
- wifi: iwlwifi: mvm: initialize seq variable (git-fixes).
- wifi: iwlwifi: pcie: Fix integer overflow in iwl_write_to_user_buf (git-fixes).
- wifi: iwlwifi: pcie: fix NULL pointer dereference in iwl_pcie_irq_rx_msix_handler() (git-fixes).
- wifi: iwlwifi: pcie: fix possible NULL pointer dereference (git-fixes).
- wifi: iwlwifi: pull from TXQs with softirqs disabled (git-fixes).
- wifi: iwlwifi: trans: do not trigger d3 interrupt twice (git-fixes).
- wifi: iwlwifi: yoyo: Fix possible division by zero (git-fixes).
- wifi: iwlwifi: yoyo: skip dump correctly on hw error (git-fixes).
- wifi: libertas: cmdresp: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: libertas: fix memory leak in lbs_init_adapter() (git-fixes).
- wifi: libertas: if_usb: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: libertas: main: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: libertas_tf: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: mac80211: Set TWT Information Frame Disabled bit as 1 (bsc#1209980).
- wifi: mac80211: adjust scan cancel comment/check (git-fixes).
- wifi: mac80211: fix invalid drv_sta_pre_rcu_remove calls for non-uploaded sta (git-fixes).
- wifi: mac80211: fix min center freq offset tracing (git-fixes).
- wifi: mac80211: fix qos on mesh interfaces (git-fixes).
- wifi: mac80211: make rate u32 in sta_set_rate_info_rx() (git-fixes).
- wifi: mac80211: sdata can be NULL during AMPDU start (git-fixes).
- wifi: mac80211: simplify chanctx allocation (git-fixes).
- wifi: mt7601u: fix an integer underflow (git-fixes).
- wifi: mt76: add flexible polling wait-interval support (git-fixes).
- wifi: mt76: add memory barrier to SDIO queue kick (bsc#1209980).
- wifi: mt76: add missing locking to protect against concurrent rx/status calls (git-fixes).
- wifi: mt76: connac: fix possible unaligned access in mt76_connac_mcu_add_nested_tlv (bsc#1209980).
- wifi: mt76: dma: free rx_head in mt76_dma_rx_cleanup (git-fixes).
- wifi: mt76: do not run mt76_unregister_device() on unregistered hw (bsc#1209980).
- wifi: mt76: fix 6GHz high channel not be scanned (git-fixes).
- wifi: mt76: fix receiving LLC packets on mt7615/mt7915 (bsc#1209980).
- wifi: mt76: handle failure of vzalloc in mt7615_coredump_work (git-fixes).
- wifi: mt76: mt7615: fix possible race in mt7615_mac_sta_poll (git-fixes).
- wifi: mt76: mt7915: add missing of_node_put() (bsc#1209980).
- wifi: mt76: mt7915: call mt7915_mcu_set_thermal_throttling() only after init_work (bsc#1209980).
- wifi: mt76: mt7915: check return value before accessing free_block_num (bsc#1209980).
- wifi: mt76: mt7915: drop always true condition of __mt7915_reg_addr() (bsc#1209980).
- wifi: mt76: mt7915: expose device tree match table (git-fixes).
- wifi: mt76: mt7915: fix mcs value in ht mode (bsc#1209980).
- wifi: mt76: mt7915: fix memory leak in mt7915_mcu_exit (git-fixes).
- wifi: mt76: mt7915: fix mt7915_mac_set_timing() (bsc#1209980).
- wifi: mt76: mt7915: fix possible unaligned access in mt7915_mac_add_twt_setup (bsc#1209980).
- wifi: mt76: mt7915: fix reporting of TX AGGR histogram (git-fixes).
- wifi: mt76: mt7915: fix unintended sign extension of mt7915_hw_queue_read() (bsc#1209980).
- wifi: mt76: mt7921: fix missing unwind goto in `mt7921u_probe` (git-fixes).
- wifi: mt76: mt7921: fix reporting of TX AGGR histogram (git-fixes).
- wifi: mt76: mt7921e: Set memory space enable in PCI_COMMAND if unset (git-fixes).
- wifi: mt76: mt7921e: fix crash in chip reset fail (bsc#1209980).
- wifi: mt76: mt7921e: fix probe timeout after reboot (git-fixes).
- wifi: mt76: mt7921e: fix random fw download fail (git-fixes).
- wifi: mt76: mt7921e: fix rmmod crash in driver reload test (bsc#1209980).
- wifi: mt76: mt7921e: improve reliability of dma reset (git-fixes).
- wifi: mt76: mt7921e: stop chip reset worker in unregister hook (git-fixes).
- wifi: mt76: mt7921s: fix race issue between reset and suspend/resume (bsc#1209980).
- wifi: mt76: mt7921s: fix slab-out-of-bounds access in sdio host (bsc#1209980).
- wifi: mwifiex: Add missing compatible string for SD8787 (git-fixes).
- wifi: mwifiex: Fix the size of a memory allocation in mwifiex_ret_802_11_scan() (git-fixes).
- wifi: mwifiex: fix loop iterator in mwifiex_update_ampdu_txwinsize() (git-fixes).
- wifi: mwifiex: mark OF related data as maybe unused (git-fixes).
- wifi: orinoco: Fix an error handling path in orinoco_cs_probe() (git-fixes).
- wifi: orinoco: Fix an error handling path in spectrum_cs_probe() (git-fixes).
- wifi: orinoco: check return value of hermes_write_wordrec() (git-fixes).
- wifi: rsi: Do not configure WoWlan in shutdown hook if not enabled (git-fixes).
- wifi: rsi: Do not set MMC_PM_KEEP_POWER in shutdown (git-fixes).
- wifi: rsi: Fix memory leak in rsi_coex_attach() (git-fixes).
- wifi: rt2x00: Fix memory leak when handling surveys (git-fixes).
- wifi: rtl8xxxu: Fix memory leaks with RTL8723BU, RTL8192EU (git-fixes).
- wifi: rtl8xxxu: RTL8192EU always needs full init (git-fixes).
- wifi: rtl8xxxu: Use a longer retry limit of 48 (git-fixes).
- wifi: rtl8xxxu: do not call dev_kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: rtl8xxxu: fix authentication timeout due to incorrect RCR value (git-fixes).
- wifi: rtl8xxxu: fixing transmisison failure for rtl8192eu (git-fixes).
- wifi: rtlwifi: Fix global-out-of-bounds bug in _rtl8812ae_phy_set_txpower_limit() (git-fixes).
- wifi: rtlwifi: fix incorrect error codes in rtl_debugfs_set_write_reg() (git-fixes).
- wifi: rtlwifi: fix incorrect error codes in rtl_debugfs_set_write_rfreg() (git-fixes).
- wifi: rtlwifi: rtl8188ee: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: rtlwifi: rtl8723be: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: rtlwifi: rtl8821ae: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wifi: rtw88: mac: Return the original error from rtw_mac_power_switch() (git-fixes).
- wifi: rtw88: mac: Return the original error from rtw_pwr_seq_parser() (git-fixes).
- wifi: rtw89: Add missing check for alloc_workqueue (git-fixes).
- wifi: rtw89: fix potential race condition between napi_init and napi_enable (git-fixes).
- wifi: wilc1000: fix for absent RSN capabilities WFA testcase (git-fixes).
- wifi: wilc1000: fix potential memory leak in wilc_mac_xmit() (git-fixes).
- wifi: wl3501_cs: do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- wireguard: ratelimiter: use hrtimer in selftest (git-fixes)
- workqueue: Fix hung time report of worker pools (bsc#1211044).
- workqueue: Interrupted create_worker() is not a repeated event (bsc#1211044).
- workqueue: Print backtraces from CPUs with hung CPU bound workqueues (bsc#1211044).
- workqueue: Warn when a new worker could not be created (bsc#1211044).
- workqueue: Warn when a rescuer could not be created (bsc#1211044).
- writeback, cgroup: fix null-ptr-deref write in bdi_split_work_to_wbs (bsc#1210769).
- writeback: avoid use-after-free after removing device (bsc#1207638).
- writeback: fix call of incorrect macro (bsc#1213024).
- writeback: fix dereferencing NULL mapping-&gt;host on writeback_page_template (git-fixes).
- x86, sched: Fix undefined reference to init_freq_invariance_cppc() build error (git-fixes).
- x86/64/mm: Map all kernel memory into trampoline_pgd (git-fixes).
- x86/ACPI/boot: Use FADT version to check support for online capable (git-fixes).
- x86/MCE/AMD: Clear DFR errors found in THR handler (git-fixes).
- x86/MCE/AMD: Fix memory leak when threshold_create_bank() fails (git-fixes).
- x86/MCE/AMD: Use an u64 for bank_map (git-fixes).
- x86/PAT: Have pat_enabled() properly reflect state when running on Xen (git-fixes).
- x86/PCI: Add quirk for AMD XHCI controller that loses MSI-X state in D3hot (git-fixes).
- x86/acpi/boot: Correct acpi_is_processor_usable() check (git-fixes).
- x86/acpi/boot: Do not register processors that cannot be onlined for x2APIC (git-fixes).
- x86/alternative: Make debug-alternative selective (bsc#1206578).
- x86/alternative: Report missing return thunk details (git-fixes).
- x86/alternative: Support relocations in alternatives (bsc#1206578).
- x86/amd: Use IBPB for firmware calls (git-fixes).
- x86/amd_nb: Add AMD PCI IDs for SMN communication (bsc#1208848).
- x86/asm: Fix an assembler warning with current binutils (git-fixes).
- x86/boot: Avoid using Intel mnemonics in AT&amp;T syntax asm (git-fixes).
- x86/boot: Skip realmode init code when running as Xen PV guest  (git-fixes).
- x86/bug: Merge annotate_reachable() into _BUG_FLAGS() asm (git-fixes).
- x86/bug: Prevent shadowing in __WARN_FLAGS (git-fixes).
- x86/bugs: Add 'unknown' reporting for MMIO Stale Data (git-fixes).
- x86/bugs: Do not enable IBPB at firmware entry when IBPB is not available (git-fixes).
- x86/bugs: Enable STIBP for IBPB mitigated RETBleed (git-fixes).
- x86/bugs: Warn when 'ibrs' mitigation is selected on Enhanced IBRS parts (git-fixes).
- x86/build: Avoid relocation information in final vmlinux (bsc#1187829).
- x86/cpu: Add CPU model numbers for Meteor Lake (git fixes).
- x86/cpu: Add Raptor Lake to Intel family (git fixes).
- x86/cpu: Add new Alderlake and Raptorlake CPU model numbers (git fixes).
- x86/cpu: Add new Raptor Lake CPU model number (git fixes).
- x86/cpu: Add several Intel server CPU model numbers (git fixes).
- x86/cpu: Drop spurious underscore from RAPTOR_LAKE #define (git fixes).
- x86/cpu: Switch to arch_cpu_finalize_init() (bsc#1212448).
- x86/cpufeatures: Introduce x2AVIC CPUID bit (bsc#1208619).
- x86/crash: Disable virt in core NMI crash handler to avoid double shootdown (git-fixes).
- x86/delay: Fix the wrong asm constraint in delay_loop() (git-fixes).
- x86/entry: Avoid very early RET (git-fixes).
- x86/entry: Build thunk_$(BITS) only if CONFIG_PREEMPTION=y (git-fixes).
- x86/entry: Do not call error_entry() for XENPV (git-fixes).
- x86/entry: Move CLD to the start of the idtentry macro (git-fixes).
- x86/entry: Move PUSH_AND_CLEAR_REGS out of error_entry() (git-fixes).
- x86/entry: Switch the stack after error_entry() returns (git-fixes).
- x86/fault: Cast an argument to the proper address space in prefetch() (git-fixes).
- x86/fpu/xsave: Handle compacted offsets correctly with supervisor states (git-fixes).
- x86/fpu/xsave: Initialize offset/size cache early (bsc#1211205).
- x86/fpu/xstate: Fix the ARCH_REQ_XCOMP_PERM implementation (git-fixes).
- x86/fpu: Cache xfeature flags from CPUID (git-fixes).
- x86/fpu: Fix copy_xstate_to_uabi() to copy init states correctly (git-fixes).
- x86/fpu: Fix the init_fpstate size check with the actual size (git-fixes).
- x86/fpu: Mark init functions __init (bsc#1212448).
- x86/fpu: Move FPU initialization into arch_cpu_finalize_init() (bsc#1212448).
- x86/fpu: Prevent FPU state corruption (git-fixes).
- x86/fpu: Remove cpuinfo argument from init functions (bsc#1212448).
- x86/fpu: Remove unused supervisor only offsets (git-fixes).
- x86/fpu: Use _Alignof to avoid undefined behavior in TYPE_ALIGN (git-fixes).
- x86/hyperv: Block root partition functionality in a Confidential VM (git-fixes).
- x86/hyperv: Introduce HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK constants (git-fixes).
- x86/hyperv: Remove unregister syscore call from Hyper-V cleanup (git-fixes).
- x86/hyperv: Restore VP assist page after cpu offlining/onlining (git-fixes).
- x86/init: Initialize signal frame size late (bsc#1212448).
- x86/kprobes: Fix __recover_optprobed_insn check optimizing logic (git-fixes).
- x86/kprobes: Fix arch_check_optimized_kprobe check within optimized_kprobe range (git-fixes).
- x86/kprobes: Fix kprobes instruction boudary check with CONFIG_RETHUNK (git-fixes).
- x86/kprobes: Fix optprobe optimization check with CONFIG_RETHUNK (git-fixes).
- x86/kvm: Do not use pv tlb/ipi/sched_yield if on 1 vCPU (git-fixes).
- x86/kvm: Preserve BSP MSR_KVM_POLL_CONTROL across suspend/resume (git-fixes).
- x86/kvm: Remove unused virt to phys translation in kvm_guest_cpu_init() (git-fixes).
- x86/lib/memmove: Decouple ERMS from FSRM (bsc#1206578).
- x86/mce/inject: Avoid out-of-bounds write when setting flags (git-fixes).
- x86/mce: Allow instrumentation during task work queueing (git-fixes).
- x86/mce: Mark mce_end() noinstr (git-fixes).
- x86/mce: Mark mce_panic() noinstr (git-fixes).
- x86/mce: Mark mce_read_aux() noinstr (git-fixes).
- x86/mce: relocate set{clear}_mce_nospec() functions (git-fixes). 
- x86/mem_encrypt: Unbreak the AMD_MEM_ENCRYPT=n build (git-fixes).
- x86/microcode/AMD: Add a @cpu parameter to the reloading functions (git-fixes).
- x86/microcode/AMD: Fix mixed steppings support (git-fixes).
- x86/microcode/AMD: Track patch allocation size explicitly (git-fixes).
- x86/microcode/amd: Remove load_microcode_amd()'s bsp parameter (git-fixes).
- x86/microcode/intel: Do not retry microcode reloading on the APs (git-fixes).
- x86/microcode: Add a parameter to microcode_check() to store CPU capabilities (git-fixes).
- x86/microcode: Add explicit CPU vendor dependency (git-fixes).
- x86/microcode: Adjust late loading result reporting message (git-fixes).
- x86/microcode: Check CPU capabilities after late microcode update correctly (git-fixes).
- x86/microcode: Print previous version of microcode after reload (git-fixes).
- x86/microcode: Rip out the OLD_INTERFACE (git-fixes).
- x86/mm: Cleanup the control_va_addr_alignment() __setup handler (git-fixes).
- x86/mm: Fix RESERVE_BRK() for older binutils (git-fixes).
- x86/mm: Fix use of uninitialized buffer in sme_enable() (git-fixes).
- x86/mm: Flush global TLB when switching to trampoline page-table (git-fixes).
- x86/mm: Initialize text poking earlier (bsc#1212448).
- x86/mm: Use mm_alloc() in poking_init() (bsc#1212448).
- x86/mm: Use proper mask when setting PUD mapping (git-fixes).
- x86/mm: fix poking_init() for Xen PV guests (git-fixes).
- x86/msi: Fix msi message data shadow struct (git-fixes).
- x86/msr: Add AMD CPPC MSR definitions (bsc#1212445).
- x86/msr: Remove .fixup usage (git-fixes).
- x86/nospec: Unwreck the RSB stuffing (git-fixes).
- x86/numa: Use cpumask_available instead of hardcoded NULL check (git-fixes).
- x86/pat: Fix x86_has_pat_wp() (git-fixes).
- x86/pci/xen: Disable PCI/MSI masking for XEN_HVM guests (git-fixes).
- x86/perf/zhaoxin: Add stepping check for ZXC (git fixes).
- x86/perf: Avoid warning for Arch LBR without XSAVE (git fixes).
- x86/perf: Default set FREEZE_ON_SMI for all (git fixes).
- x86/pm: Add enumeration check before spec MSRs save/restore setup (git-fixes).
- x86/reboot: Disable SVM, not just VMX, when stopping CPUs (git-fixes).
- x86/resctrl: Fix min_cbm_bits for AMD (git-fixes).
- x86/sev: Add SEV-SNP guest feature negotiation support (git-fixes).
- x86/sgx: Fix free page accounting (git-fixes).
- x86/sgx: Fix race between reclaimer and page fault handler (git-fixes).
- x86/sgx: Free backing memory after faulting the enclave page (git-fixes).
- x86/sgx: Mark PCMD page as dirty when modifying contents (git-fixes).
- x86/sgx: Silence softlockup detection when releasing large enclaves (git-fixes).
- x86/signal: Fix the value returned by strict_sas_size() (git-fixes).
- x86/speculation/mmio: Print SMT warning (git-fixes).
- x86/speculation: Identify processors vulnerable to SMT RSB predictions (git-fixes).
- x86/static_call: Serialize __static_call_fixup() properly (git-fixes).
- x86/syscall: Include asm/ptrace.h in syscall_wrapper header (git-fixes).
- x86/topology: Fix duplicated core ID within a package (git-fixes).
- x86/topology: Fix multiple packages shown on a single-package system (git-fixes).
- x86/traps: Use pt_regs directly in fixup_bad_iret() (git-fixes).
- x86/tsx: Add a feature bit for TSX control MSR support (git-fixes).
- x86/tsx: Disable TSX development mode at boot (git-fixes).
- x86/uaccess: Move variable into switch case statement (git-fixes).
- x86/xen: Fix memory leak in xen_init_lock_cpu() (git-fixes).
- x86/xen: Fix memory leak in xen_smp_intr_init{_pv}() (git-fixes).
- x86/xen: fix secondary processor fpu initialization (bsc#1212869).
- x86: ACPI: cstate: Optimize C3 entry on AMD CPUs (git-fixes).
- x86: Annotate call_on_stack() (git-fixes).
- x86: Fix return value of __setup handlers (git-fixes).
- x86: Handle idle=nomwait cmdline properly for x86_idle (bsc#1208619).
- x86: Remove vendor checks from prefer_mwait_c1_over_halt (bsc#1208619).
- x86: __memcpy_flushcache: fix wrong alignment if size &gt; 2^32 (git-fixes).
- x86: centralize setting SWIOTLB_FORCE when guest memory encryption is enabled (jsc#PED-3259).
- x86: drop bogus 'cc' clobber from __try_cmpxchg_user_asm() (git-fixes).
- x86: link vdso and boot with -z noexecstack --no-warn-rwx-segments (bsc#1203200).
- x86: remove cruft from &amp;lt;asm/dma-mapping.h&gt; (PED-3259).
- xen-netfront: Fix NULL sring after live migration (git-fixes).
- xen-pciback: Allow setting PCI_MSIX_FLAGS_MASKALL too (git-fixes).
- xen/arm: Fix race in RB-tree based P2M accounting (git-fixes)
- xen/netback: do not do grant copy across page boundary (git-fixes).
- xen/netback: do some code cleanup (git-fixes).
- xen/netback: fix build warning (git-fixes).
- xen/netback: use same error messages for same errors (git-fixes).
- xen/netfront: destroy queues before real_num_tx_queues is zeroed (git-fixes).
- xen/platform-pci: add missing free_irq() in error path (git-fixes).
- xen/privcmd: Fix a possible warning in privcmd_ioctl_mmap_resource() (git-fixes).
- xfs: Fix unreferenced object reported by kmemleak in xfs_sysfs_init() (git-fixes).
- xfs: convert ptag flags to unsigned (git-fixes).
- xfs: do not assert fail on perag references on teardown (git-fixes).
- xfs: do not leak btree cursor when insrec fails after a split (git-fixes).
- xfs: estimate post-merge refcounts correctly (bsc#1208183).
- xfs: fix incorrect error-out in xfs_remove (git-fixes).
- xfs: fix incorrect i_nlink caused by inode racing (git-fixes).
- xfs: fix maxlevels comparisons in the btree staging code (git-fixes).
- xfs: fix memory leak in xfs_errortag_init (git-fixes).
- xfs: fix rm_offset flag handling in rmap keys (git-fixes).
- xfs: get rid of assert from xfs_btree_islastblock (git-fixes).
- xfs: get root inode correctly at bulkstat (git-fixes).
- xfs: hoist refcount record merge predicates (bsc#1208183).
- xfs: initialize the check_owner object fully (git-fixes).
- xfs: pass the correct cursor to xfs_iomap_prealloc_size (git-fixes).
- xfs: prevent a WARN_ONCE() in xfs_ioc_attr_list() (git-fixes).
- xfs: reject crazy array sizes being fed to XFS_IOC_GETBMAP* (git-fixes).
- xfs: remove xfs_setattr_time() declaration (git-fixes).
- xfs: return errors in xfs_fs_sync_fs (git-fixes).
- xfs: set bnobt/cntbt numrecs correctly when formatting new AGs (git-fixes).
- xfs: zero inode fork buffer at allocation (git-fixes).
- xhci-pci: Only run d3cold avoidance quirk for s2idle (git-fixes).
- xhci-pci: set the dma max_seg_size (git-fixes).
- xhci: Fix incorrect tracking of free space on transfer rings (git-fixes).
- xhci: Fix null pointer dereference when host dies (git-fixes).
- xhci: Free the command allocated for setting LPM if we return early (git-fixes).
- xhci: also avoid the XHCI_ZERO_64B_REGS quirk with a passthrough iommu (git-fixes).
- xhci: fix debugfs register accesses while suspended (git-fixes).
- xirc2ps_cs: Fix use after free bug in xirc2ps_detach (git-fixes).
- xprtrdma: Fix regbuf data not freed in rpcrdma_req_create() (git-fixes).
- xsk: Fix corrupted packets for XDP_SHARED_UMEM (git-fixes).
- zram: do not lookup algorithm in backends table (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-18"/>
	<updated date="2023-07-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109158">SUSE bug 1109158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142685">SUSE bug 1142685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160435">SUSE bug 1160435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166486">SUSE bug 1166486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172073">SUSE bug 1172073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174777">SUSE bug 1174777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177529">SUSE bug 1177529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186449">SUSE bug 1186449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187829">SUSE bug 1187829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189998">SUSE bug 1189998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189999">SUSE bug 1189999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191731">SUSE bug 1191731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195175">SUSE bug 1195175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195655">SUSE bug 1195655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195921">SUSE bug 1195921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196058">SUSE bug 1196058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197534">SUSE bug 1197534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197617">SUSE bug 1197617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198101">SUSE bug 1198101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198400">SUSE bug 1198400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198438">SUSE bug 1198438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198835">SUSE bug 1198835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199304">SUSE bug 1199304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199701">SUSE bug 1199701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200054">SUSE bug 1200054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202353">SUSE bug 1202353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202633">SUSE bug 1202633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203039">SUSE bug 1203039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203200">SUSE bug 1203200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203325">SUSE bug 1203325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203331">SUSE bug 1203331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203332">SUSE bug 1203332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203693">SUSE bug 1203693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203906">SUSE bug 1203906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204356">SUSE bug 1204356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204363">SUSE bug 1204363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204662">SUSE bug 1204662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204993">SUSE bug 1204993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205153">SUSE bug 1205153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205191">SUSE bug 1205191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205205">SUSE bug 1205205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205544">SUSE bug 1205544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205650">SUSE bug 1205650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205756">SUSE bug 1205756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205758">SUSE bug 1205758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205760">SUSE bug 1205760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205762">SUSE bug 1205762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205803">SUSE bug 1205803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205846">SUSE bug 1205846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206024">SUSE bug 1206024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206036">SUSE bug 1206036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206056">SUSE bug 1206056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206057">SUSE bug 1206057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206103">SUSE bug 1206103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206224">SUSE bug 1206224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206232">SUSE bug 1206232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206340">SUSE bug 1206340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206459">SUSE bug 1206459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206492">SUSE bug 1206492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206493">SUSE bug 1206493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206552">SUSE bug 1206552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206578">SUSE bug 1206578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206640">SUSE bug 1206640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206649">SUSE bug 1206649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206677">SUSE bug 1206677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206824">SUSE bug 1206824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206843">SUSE bug 1206843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206876">SUSE bug 1206876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206877">SUSE bug 1206877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206878">SUSE bug 1206878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206880">SUSE bug 1206880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206881">SUSE bug 1206881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206882">SUSE bug 1206882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206883">SUSE bug 1206883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206884">SUSE bug 1206884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206885">SUSE bug 1206885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206886">SUSE bug 1206886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206887">SUSE bug 1206887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206888">SUSE bug 1206888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206889">SUSE bug 1206889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206890">SUSE bug 1206890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206891">SUSE bug 1206891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206893">SUSE bug 1206893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206894">SUSE bug 1206894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206935">SUSE bug 1206935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206992">SUSE bug 1206992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207034">SUSE bug 1207034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207036">SUSE bug 1207036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207050">SUSE bug 1207050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207051">SUSE bug 1207051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207088">SUSE bug 1207088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207125">SUSE bug 1207125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207149">SUSE bug 1207149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207158">SUSE bug 1207158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207168">SUSE bug 1207168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207185">SUSE bug 1207185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207270">SUSE bug 1207270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207315">SUSE bug 1207315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207328">SUSE bug 1207328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207497">SUSE bug 1207497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207500">SUSE bug 1207500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207501">SUSE bug 1207501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207506">SUSE bug 1207506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207507">SUSE bug 1207507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207521">SUSE bug 1207521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207553">SUSE bug 1207553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207560">SUSE bug 1207560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207574">SUSE bug 1207574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207588">SUSE bug 1207588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207589">SUSE bug 1207589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207590">SUSE bug 1207590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207591">SUSE bug 1207591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207592">SUSE bug 1207592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207593">SUSE bug 1207593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207594">SUSE bug 1207594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207602">SUSE bug 1207602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207603">SUSE bug 1207603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207605">SUSE bug 1207605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207606">SUSE bug 1207606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207607">SUSE bug 1207607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207608">SUSE bug 1207608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207609">SUSE bug 1207609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207610">SUSE bug 1207610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207611">SUSE bug 1207611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207612">SUSE bug 1207612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207613">SUSE bug 1207613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207614">SUSE bug 1207614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207615">SUSE bug 1207615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207616">SUSE bug 1207616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207617">SUSE bug 1207617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207618">SUSE bug 1207618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207619">SUSE bug 1207619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207620">SUSE bug 1207620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207621">SUSE bug 1207621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207622">SUSE bug 1207622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207623">SUSE bug 1207623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207624">SUSE bug 1207624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207625">SUSE bug 1207625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207626">SUSE bug 1207626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207627">SUSE bug 1207627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207628">SUSE bug 1207628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207629">SUSE bug 1207629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207630">SUSE bug 1207630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207631">SUSE bug 1207631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207632">SUSE bug 1207632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207633">SUSE bug 1207633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207634">SUSE bug 1207634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207635">SUSE bug 1207635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207636">SUSE bug 1207636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207637">SUSE bug 1207637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207638">SUSE bug 1207638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207639">SUSE bug 1207639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207640">SUSE bug 1207640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207641">SUSE bug 1207641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207642">SUSE bug 1207642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207643">SUSE bug 1207643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207644">SUSE bug 1207644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207645">SUSE bug 1207645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207646">SUSE bug 1207646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207647">SUSE bug 1207647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207648">SUSE bug 1207648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207649">SUSE bug 1207649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207650">SUSE bug 1207650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207651">SUSE bug 1207651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207652">SUSE bug 1207652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207653">SUSE bug 1207653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207734">SUSE bug 1207734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207768">SUSE bug 1207768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207769">SUSE bug 1207769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207770">SUSE bug 1207770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207771">SUSE bug 1207771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207773">SUSE bug 1207773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207795">SUSE bug 1207795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207827">SUSE bug 1207827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207842">SUSE bug 1207842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207845">SUSE bug 1207845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207875">SUSE bug 1207875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207878">SUSE bug 1207878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207933">SUSE bug 1207933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207935">SUSE bug 1207935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207948">SUSE bug 1207948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208050">SUSE bug 1208050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208076">SUSE bug 1208076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208081">SUSE bug 1208081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208105">SUSE bug 1208105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208107">SUSE bug 1208107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208128">SUSE bug 1208128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208130">SUSE bug 1208130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208149">SUSE bug 1208149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208153">SUSE bug 1208153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208183">SUSE bug 1208183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208212">SUSE bug 1208212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208219">SUSE bug 1208219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208290">SUSE bug 1208290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208368">SUSE bug 1208368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208410">SUSE bug 1208410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208420">SUSE bug 1208420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208428">SUSE bug 1208428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208429">SUSE bug 1208429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208449">SUSE bug 1208449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208534">SUSE bug 1208534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208541">SUSE bug 1208541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208542">SUSE bug 1208542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208570">SUSE bug 1208570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208588">SUSE bug 1208588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208598">SUSE bug 1208598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208599">SUSE bug 1208599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208600">SUSE bug 1208600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208601">SUSE bug 1208601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208602">SUSE bug 1208602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208604">SUSE bug 1208604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208605">SUSE bug 1208605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208607">SUSE bug 1208607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208619">SUSE bug 1208619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208628">SUSE bug 1208628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208700">SUSE bug 1208700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208741">SUSE bug 1208741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208758">SUSE bug 1208758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208759">SUSE bug 1208759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208776">SUSE bug 1208776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208777">SUSE bug 1208777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208784">SUSE bug 1208784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208787">SUSE bug 1208787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208815">SUSE bug 1208815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208816">SUSE bug 1208816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208829">SUSE bug 1208829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208837">SUSE bug 1208837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208843">SUSE bug 1208843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208845">SUSE bug 1208845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208848">SUSE bug 1208848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208864">SUSE bug 1208864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208902">SUSE bug 1208902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208948">SUSE bug 1208948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208976">SUSE bug 1208976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209008">SUSE bug 1209008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209039">SUSE bug 1209039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209052">SUSE bug 1209052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209092">SUSE bug 1209092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209159">SUSE bug 1209159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209256">SUSE bug 1209256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209258">SUSE bug 1209258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209262">SUSE bug 1209262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209287">SUSE bug 1209287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209288">SUSE bug 1209288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209290">SUSE bug 1209290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209291">SUSE bug 1209291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209292">SUSE bug 1209292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209366">SUSE bug 1209366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209367">SUSE bug 1209367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209436">SUSE bug 1209436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209457">SUSE bug 1209457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209504">SUSE bug 1209504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209532">SUSE bug 1209532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209556">SUSE bug 1209556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209600">SUSE bug 1209600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209615">SUSE bug 1209615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209635">SUSE bug 1209635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209636">SUSE bug 1209636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209637">SUSE bug 1209637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209684">SUSE bug 1209684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209687">SUSE bug 1209687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209693">SUSE bug 1209693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209739">SUSE bug 1209739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209779">SUSE bug 1209779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209780">SUSE bug 1209780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209788">SUSE bug 1209788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209798">SUSE bug 1209798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209799">SUSE bug 1209799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209804">SUSE bug 1209804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209805">SUSE bug 1209805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209856">SUSE bug 1209856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209871">SUSE bug 1209871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209927">SUSE bug 1209927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209980">SUSE bug 1209980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209982">SUSE bug 1209982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209999">SUSE bug 1209999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210034">SUSE bug 1210034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210050">SUSE bug 1210050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210158">SUSE bug 1210158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210165">SUSE bug 1210165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210202">SUSE bug 1210202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210203">SUSE bug 1210203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210206">SUSE bug 1210206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210216">SUSE bug 1210216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210230">SUSE bug 1210230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210294">SUSE bug 1210294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210301">SUSE bug 1210301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210329">SUSE bug 1210329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210335">SUSE bug 1210335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210336">SUSE bug 1210336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210337">SUSE bug 1210337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210409">SUSE bug 1210409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210439">SUSE bug 1210439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210449">SUSE bug 1210449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210450">SUSE bug 1210450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210453">SUSE bug 1210453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210454">SUSE bug 1210454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210498">SUSE bug 1210498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210506">SUSE bug 1210506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210533">SUSE bug 1210533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210551">SUSE bug 1210551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210565">SUSE bug 1210565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210584">SUSE bug 1210584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210629">SUSE bug 1210629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210644">SUSE bug 1210644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210647">SUSE bug 1210647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210725">SUSE bug 1210725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210741">SUSE bug 1210741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210762">SUSE bug 1210762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210763">SUSE bug 1210763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210764">SUSE bug 1210764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210765">SUSE bug 1210765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210766">SUSE bug 1210766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210767">SUSE bug 1210767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210768">SUSE bug 1210768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210769">SUSE bug 1210769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210770">SUSE bug 1210770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210771">SUSE bug 1210771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210775">SUSE bug 1210775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210783">SUSE bug 1210783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210791">SUSE bug 1210791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210793">SUSE bug 1210793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210806">SUSE bug 1210806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210816">SUSE bug 1210816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210817">SUSE bug 1210817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210827">SUSE bug 1210827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210853">SUSE bug 1210853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210940">SUSE bug 1210940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210943">SUSE bug 1210943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210947">SUSE bug 1210947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210953">SUSE bug 1210953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210986">SUSE bug 1210986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211014">SUSE bug 1211014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211025">SUSE bug 1211025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211037">SUSE bug 1211037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211043">SUSE bug 1211043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211044">SUSE bug 1211044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211089">SUSE bug 1211089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211105">SUSE bug 1211105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211113">SUSE bug 1211113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211131">SUSE bug 1211131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211205">SUSE bug 1211205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211263">SUSE bug 1211263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211280">SUSE bug 1211280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211281">SUSE bug 1211281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211299">SUSE bug 1211299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211346">SUSE bug 1211346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211387">SUSE bug 1211387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211400">SUSE bug 1211400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211410">SUSE bug 1211410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211414">SUSE bug 1211414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211449">SUSE bug 1211449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211465">SUSE bug 1211465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211519">SUSE bug 1211519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211564">SUSE bug 1211564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211590">SUSE bug 1211590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211592">SUSE bug 1211592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211593">SUSE bug 1211593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211595">SUSE bug 1211595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211654">SUSE bug 1211654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211686">SUSE bug 1211686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211687">SUSE bug 1211687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211688">SUSE bug 1211688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211689">SUSE bug 1211689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211690">SUSE bug 1211690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211691">SUSE bug 1211691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211692">SUSE bug 1211692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211693">SUSE bug 1211693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211714">SUSE bug 1211714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211794">SUSE bug 1211794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211796">SUSE bug 1211796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211804">SUSE bug 1211804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211807">SUSE bug 1211807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211808">SUSE bug 1211808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211820">SUSE bug 1211820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211836">SUSE bug 1211836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211847">SUSE bug 1211847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211852">SUSE bug 1211852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211855">SUSE bug 1211855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211960">SUSE bug 1211960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212051">SUSE bug 1212051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212129">SUSE bug 1212129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212154">SUSE bug 1212154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212155">SUSE bug 1212155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212158">SUSE bug 1212158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212265">SUSE bug 1212265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212350">SUSE bug 1212350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212445">SUSE bug 1212445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212448">SUSE bug 1212448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212456">SUSE bug 1212456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212494">SUSE bug 1212494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212495">SUSE bug 1212495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212504">SUSE bug 1212504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212513">SUSE bug 1212513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212540">SUSE bug 1212540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212556">SUSE bug 1212556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212561">SUSE bug 1212561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212563">SUSE bug 1212563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212564">SUSE bug 1212564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212584">SUSE bug 1212584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212592">SUSE bug 1212592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212603">SUSE bug 1212603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212605">SUSE bug 1212605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212606">SUSE bug 1212606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212619">SUSE bug 1212619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212685">SUSE bug 1212685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212701">SUSE bug 1212701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212741">SUSE bug 1212741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212835">SUSE bug 1212835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212838">SUSE bug 1212838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212842">SUSE bug 1212842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212848">SUSE bug 1212848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212861">SUSE bug 1212861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212869">SUSE bug 1212869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212892">SUSE bug 1212892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212961">SUSE bug 1212961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213010">SUSE bug 1213010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213011">SUSE bug 1213011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213012">SUSE bug 1213012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213013">SUSE bug 1213013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213014">SUSE bug 1213014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213015">SUSE bug 1213015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213016">SUSE bug 1213016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213017">SUSE bug 1213017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213018">SUSE bug 1213018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213019">SUSE bug 1213019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213020">SUSE bug 1213020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213021">SUSE bug 1213021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213024">SUSE bug 1213024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213025">SUSE bug 1213025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213032">SUSE bug 1213032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213034">SUSE bug 1213034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213035">SUSE bug 1213035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213036">SUSE bug 1213036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213037">SUSE bug 1213037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213038">SUSE bug 1213038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213039">SUSE bug 1213039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213040">SUSE bug 1213040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213041">SUSE bug 1213041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213087">SUSE bug 1213087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213088">SUSE bug 1213088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213089">SUSE bug 1213089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213090">SUSE bug 1213090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213092">SUSE bug 1213092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213093">SUSE bug 1213093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213094">SUSE bug 1213094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213095">SUSE bug 1213095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213096">SUSE bug 1213096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213098">SUSE bug 1213098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213099">SUSE bug 1213099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213100">SUSE bug 1213100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213102">SUSE bug 1213102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213103">SUSE bug 1213103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213104">SUSE bug 1213104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213105">SUSE bug 1213105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213106">SUSE bug 1213106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213107">SUSE bug 1213107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213108">SUSE bug 1213108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213109">SUSE bug 1213109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213110">SUSE bug 1213110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213111">SUSE bug 1213111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213112">SUSE bug 1213112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213113">SUSE bug 1213113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213114">SUSE bug 1213114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213116">SUSE bug 1213116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213134">SUSE bug 1213134</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36280/">CVE-2022-36280 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36280">CVE-2022-36280 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38096/">CVE-2022-38096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38096">CVE-2022-38096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4269/">CVE-2022-4269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4269">CVE-2022-4269 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45884/">CVE-2022-45884 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45884">CVE-2022-45884 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45885/">CVE-2022-45885 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45885">CVE-2022-45885 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45886/">CVE-2022-45886 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45886">CVE-2022-45886 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45887/">CVE-2022-45887 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45887">CVE-2022-45887 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45919/">CVE-2022-45919 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45919">CVE-2022-45919 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4744/">CVE-2022-4744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4744">CVE-2022-4744 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0045/">CVE-2023-0045 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0045">CVE-2023-0045 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0122/">CVE-2023-0122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0122">CVE-2023-0122 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0179/">CVE-2023-0179 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0179">CVE-2023-0179 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0394/">CVE-2023-0394 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0394">CVE-2023-0394 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0461/">CVE-2023-0461 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0461">CVE-2023-0461 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0469/">CVE-2023-0469 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0469">CVE-2023-0469 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0590/">CVE-2023-0590 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0590">CVE-2023-0590 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0597/">CVE-2023-0597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0597">CVE-2023-0597 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1075/">CVE-2023-1075 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1075">CVE-2023-1075 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1076/">CVE-2023-1076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1076">CVE-2023-1076 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1077/">CVE-2023-1077 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1077">CVE-2023-1077 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1079/">CVE-2023-1079 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1079">CVE-2023-1079 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1095/">CVE-2023-1095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1095">CVE-2023-1095 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1118/">CVE-2023-1118 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1118">CVE-2023-1118 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-1249/">CVE-2023-1249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1249">CVE-2023-1249 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1382/">CVE-2023-1382 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1382">CVE-2023-1382 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1513/">CVE-2023-1513 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1513">CVE-2023-1513 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1582/">CVE-2023-1582 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1582">CVE-2023-1582 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1583/">CVE-2023-1583 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1583">CVE-2023-1583 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1611/">CVE-2023-1611 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1611">CVE-2023-1611 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1637/">CVE-2023-1637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1637">CVE-2023-1637 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1652/">CVE-2023-1652 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1652">CVE-2023-1652 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1670/">CVE-2023-1670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1670">CVE-2023-1670 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1829/">CVE-2023-1829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1829">CVE-2023-1829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1838/">CVE-2023-1838 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1838">CVE-2023-1838 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1855/">CVE-2023-1855 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1855">CVE-2023-1855 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1989/">CVE-2023-1989 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1989">CVE-2023-1989 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1998/">CVE-2023-1998 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1998">CVE-2023-1998 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2002/">CVE-2023-2002 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2002">CVE-2023-2002 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-21102/">CVE-2023-21102 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21102">CVE-2023-21102 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-21106/">CVE-2023-21106 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21106">CVE-2023-21106 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2124/">CVE-2023-2124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2124">CVE-2023-2124 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2156/">CVE-2023-2156 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2156">CVE-2023-2156 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2162/">CVE-2023-2162 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2162">CVE-2023-2162 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2176/">CVE-2023-2176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2176">CVE-2023-2176 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2235/">CVE-2023-2235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2235">CVE-2023-2235 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2269/">CVE-2023-2269 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2269">CVE-2023-2269 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22998/">CVE-2023-22998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22998">CVE-2023-22998 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-23000/">CVE-2023-23000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23000">CVE-2023-23000 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-23001/">CVE-2023-23001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23001">CVE-2023-23001 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23004/">CVE-2023-23004 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23004">CVE-2023-23004 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-23006/">CVE-2023-23006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23006">CVE-2023-23006 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-2430/">CVE-2023-2430 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2430">CVE-2023-2430 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2483/">CVE-2023-2483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-2483">CVE-2023-2483 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-25012/">CVE-2023-25012 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25012">CVE-2023-25012 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2513/">CVE-2023-2513 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2513">CVE-2023-2513 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26545/">CVE-2023-26545 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26545">CVE-2023-26545 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28327/">CVE-2023-28327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28327">CVE-2023-28327 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28410/">CVE-2023-28410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28410">CVE-2023-28410 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28464/">CVE-2023-28464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28464">CVE-2023-28464 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28866/">CVE-2023-28866 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28866">CVE-2023-28866 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3006/">CVE-2023-3006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3006">CVE-2023-3006 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-30456/">CVE-2023-30456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30456">CVE-2023-30456 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-30772/">CVE-2023-30772 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30772">CVE-2023-30772 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3090/">CVE-2023-3090 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3090">CVE-2023-3090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31084/">CVE-2023-31084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31084">CVE-2023-31084 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3111/">CVE-2023-3111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3111">CVE-2023-3111 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-3141/">CVE-2023-3141 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3141">CVE-2023-3141 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31436/">CVE-2023-31436 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31436">CVE-2023-31436 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3161/">CVE-2023-3161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3161">CVE-2023-3161 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3212/">CVE-2023-3212 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3212">CVE-2023-3212 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3220/">CVE-2023-3220 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3220">CVE-2023-3220 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32233/">CVE-2023-32233 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32233">CVE-2023-32233 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-33288/">CVE-2023-33288 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33288">CVE-2023-33288 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3357/">CVE-2023-3357 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3357">CVE-2023-3357 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3358/">CVE-2023-3358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3358">CVE-2023-3358 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3389/">CVE-2023-3389 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3389">CVE-2023-3389 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-33951/">CVE-2023-33951 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33951">CVE-2023-33951 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-33952/">CVE-2023-33952 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33952">CVE-2023-33952 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35788/">CVE-2023-35788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35788">CVE-2023-35788 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-35823/">CVE-2023-35823 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35823">CVE-2023-35823 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35828/">CVE-2023-35828 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35828">CVE-2023-35828 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35829/">CVE-2023-35829 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35829">CVE-2023-35829 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771841" comment="cluster-md-kmp-64kb-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771842" comment="cluster-md-kmp-default-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771843" comment="dlm-kmp-64kb-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771844" comment="dlm-kmp-default-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771845" comment="dtb-allwinner-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771846" comment="dtb-altera-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771847" comment="dtb-amazon-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771848" comment="dtb-amd-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771849" comment="dtb-amlogic-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771850" comment="dtb-apm-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771851" comment="dtb-apple-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771852" comment="dtb-arm-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771853" comment="dtb-broadcom-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771854" comment="dtb-cavium-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771855" comment="dtb-exynos-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771856" comment="dtb-freescale-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771857" comment="dtb-hisilicon-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771858" comment="dtb-lg-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771859" comment="dtb-marvell-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771860" comment="dtb-mediatek-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771861" comment="dtb-nvidia-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771862" comment="dtb-qcom-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771863" comment="dtb-renesas-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771864" comment="dtb-rockchip-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771865" comment="dtb-socionext-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771866" comment="dtb-sprd-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771867" comment="dtb-xilinx-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771868" comment="gfs2-kmp-64kb-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771869" comment="gfs2-kmp-default-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771870" comment="kernel-64kb-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771871" comment="kernel-64kb-devel-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771872" comment="kernel-64kb-extra-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771873" comment="kernel-64kb-livepatch-devel-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771874" comment="kernel-64kb-optional-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771875" comment="kernel-debug-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771876" comment="kernel-debug-devel-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771877" comment="kernel-debug-livepatch-devel-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771878" comment="kernel-debug-vdso-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771879" comment="kernel-default-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771880" comment="kernel-default-base-5.14.21-150500.55.7.1.150500.6.2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771881" comment="kernel-default-base-rebuild-5.14.21-150500.55.7.1.150500.6.2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771882" comment="kernel-default-devel-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771883" comment="kernel-default-extra-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771884" comment="kernel-default-livepatch-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771885" comment="kernel-default-livepatch-devel-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771886" comment="kernel-default-optional-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771887" comment="kernel-default-vdso-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771888" comment="kernel-devel-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771889" comment="kernel-docs-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771890" comment="kernel-docs-html-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771891" comment="kernel-kvmsmall-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771892" comment="kernel-kvmsmall-devel-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771893" comment="kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771894" comment="kernel-kvmsmall-vdso-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771895" comment="kernel-macros-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771896" comment="kernel-obs-build-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771897" comment="kernel-obs-qa-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771898" comment="kernel-source-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771899" comment="kernel-source-vanilla-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771900" comment="kernel-syms-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771901" comment="kernel-zfcpdump-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771902" comment="kselftests-kmp-64kb-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771903" comment="kselftests-kmp-default-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771904" comment="ocfs2-kmp-64kb-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771905" comment="ocfs2-kmp-default-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771906" comment="reiserfs-kmp-64kb-5.14.21-150500.55.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771907" comment="reiserfs-kmp-default-5.14.21-150500.55.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4239" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212126" ref_url="https://bugzilla.suse.com/1212126" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-34969" ref_url="https://www.suse.com/security/cve/CVE-2023-34969/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015527.html" source="SUSE-SU"/>
		<description>
This update for dbus-1 fixes the following issues:

- CVE-2023-34969: Fixed a possible dbus-daemon crash by an unprivileged users (bsc#1212126).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-19"/>
	<updated date="2023-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212126">SUSE bug 1212126</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34969/">CVE-2023-34969 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34969">CVE-2023-34969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009769140" comment="dbus-1-1.12.2-150400.18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769141" comment="dbus-1-devel-1.12.2-150400.18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769142" comment="dbus-1-devel-32bit-1.12.2-150400.18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769143" comment="dbus-1-devel-doc-1.12.2-150400.18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769144" comment="dbus-1-x11-1.12.2-150400.18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769145" comment="libdbus-1-3-1.12.2-150400.18.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769146" comment="libdbus-1-3-32bit-1.12.2-150400.18.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4240" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212237" ref_url="https://bugzilla.suse.com/1212237" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-34474" ref_url="https://www.suse.com/security/cve/CVE-2023-34474/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015526.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2023-34474: Fixed heap-based buffer overflow in ReadTIM2ImageData() function in coders/tim2.c (bsc#1212237).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-19"/>
	<updated date="2023-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212237">SUSE bug 1212237</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-34474/">CVE-2023-34474 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34474">CVE-2023-34474 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009767125" comment="ImageMagick-7.1.0.9-150400.6.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767126" comment="ImageMagick-config-7-SUSE-7.1.0.9-150400.6.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767127" comment="ImageMagick-config-7-upstream-7.1.0.9-150400.6.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767128" comment="ImageMagick-devel-7.1.0.9-150400.6.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767129" comment="ImageMagick-devel-32bit-7.1.0.9-150400.6.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767130" comment="ImageMagick-doc-7.1.0.9-150400.6.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767131" comment="ImageMagick-extra-7.1.0.9-150400.6.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767132" comment="libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767133" comment="libMagick++-7_Q16HDRI5-32bit-7.1.0.9-150400.6.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767134" comment="libMagick++-devel-7.1.0.9-150400.6.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767135" comment="libMagick++-devel-32bit-7.1.0.9-150400.6.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767136" comment="libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767137" comment="libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-150400.6.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767138" comment="libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767139" comment="libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-150400.6.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009767140" comment="perl-PerlMagick-7.1.0.9-150400.6.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4241" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210999" ref_url="https://bugzilla.suse.com/1210999" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-31484" ref_url="https://www.suse.com/security/cve/CVE-2023-31484/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017860.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:


  - CVE-2023-31484: Enable TLS cert verification in CPAN (bsc#1210999).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-19"/>
	<updated date="2023-07-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210999">SUSE bug 1210999</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31484/">CVE-2023-31484 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31484">CVE-2023-31484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771311" comment="perl-5.26.1-150300.17.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771312" comment="perl-32bit-5.26.1-150300.17.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771313" comment="perl-base-5.26.1-150300.17.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771314" comment="perl-base-32bit-5.26.1-150300.17.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771315" comment="perl-core-DB_File-5.26.1-150300.17.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771316" comment="perl-core-DB_File-32bit-5.26.1-150300.17.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771317" comment="perl-doc-5.26.1-150300.17.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4242" version="1" class="patch">
	<metadata>
		<title>Security update for python310 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1203750" ref_url="https://bugzilla.suse.com/1203750" source="BUGZILLA"/>
		<reference ref_id="1208471" ref_url="https://bugzilla.suse.com/1208471" source="BUGZILLA"/>
		<reference ref_id="1211765" ref_url="https://bugzilla.suse.com/1211765" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015532.html" source="SUSE-SU"/>
		<description>
This update for python310 fixes the following issues:

- Make marshalling of `set` and `frozenset` deterministic (bsc#1211765)

python310 was updated to 3.10.12:

- urllib.parse.urlsplit() now strips leading C0
  control and space characters following the specification for
  URLs defined by WHATWG in response to CVE-2023-24329
  (bsc#1208471).
- Fixed a security in flaw in uu.decode() that could
  allow for directory traversal based on the input if no
  out_file was specified.
- Do not expose the local on-disk
  location in directory indexes produced by
  http.client.SimpleHTTPRequestHandler.
- trace.__main__ now uses io.open_code() for files
  to be executed instead of raw open().
- CVE-2007-4559: The extraction methods in tarfile, and
  shutil.unpack_archive(), have a new filter argument that
  allows limiting tar features than may be surprising or
  dangerous, such as creating files outside the destination
  directory. See Extraction filters for details (fixing
  bsc#1203750).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-19"/>
	<updated date="2023-07-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203750">SUSE bug 1203750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208471">SUSE bug 1208471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211765">SUSE bug 1211765</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771603" comment="libpython3_10-1_0-3.10.12-150400.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771604" comment="libpython3_10-1_0-32bit-3.10.12-150400.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771605" comment="python310-3.10.12-150400.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771606" comment="python310-32bit-3.10.12-150400.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771607" comment="python310-base-3.10.12-150400.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771608" comment="python310-base-32bit-3.10.12-150400.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771609" comment="python310-curses-3.10.12-150400.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771610" comment="python310-dbm-3.10.12-150400.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771611" comment="python310-devel-3.10.12-150400.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771612" comment="python310-doc-3.10.12-150400.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771613" comment="python310-doc-devhelp-3.10.12-150400.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771614" comment="python310-idle-3.10.12-150400.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771615" comment="python310-testsuite-3.10.12-150400.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771616" comment="python310-tk-3.10.12-150400.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771617" comment="python310-tools-3.10.12-150400.4.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4243" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox, MozillaFirefox-branding-SLE (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212101" ref_url="https://bugzilla.suse.com/1212101" source="BUGZILLA"/>
		<reference ref_id="1212438" ref_url="https://bugzilla.suse.com/1212438" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3482" ref_url="https://www.suse.com/security/cve/CVE-2023-3482/" source="CVE"/>
		<reference ref_id="CVE-2023-37201" ref_url="https://www.suse.com/security/cve/CVE-2023-37201/" source="CVE"/>
		<reference ref_id="CVE-2023-37202" ref_url="https://www.suse.com/security/cve/CVE-2023-37202/" source="CVE"/>
		<reference ref_id="CVE-2023-37203" ref_url="https://www.suse.com/security/cve/CVE-2023-37203/" source="CVE"/>
		<reference ref_id="CVE-2023-37204" ref_url="https://www.suse.com/security/cve/CVE-2023-37204/" source="CVE"/>
		<reference ref_id="CVE-2023-37205" ref_url="https://www.suse.com/security/cve/CVE-2023-37205/" source="CVE"/>
		<reference ref_id="CVE-2023-37206" ref_url="https://www.suse.com/security/cve/CVE-2023-37206/" source="CVE"/>
		<reference ref_id="CVE-2023-37207" ref_url="https://www.suse.com/security/cve/CVE-2023-37207/" source="CVE"/>
		<reference ref_id="CVE-2023-37208" ref_url="https://www.suse.com/security/cve/CVE-2023-37208/" source="CVE"/>
		<reference ref_id="CVE-2023-37209" ref_url="https://www.suse.com/security/cve/CVE-2023-37209/" source="CVE"/>
		<reference ref_id="CVE-2023-37210" ref_url="https://www.suse.com/security/cve/CVE-2023-37210/" source="CVE"/>
		<reference ref_id="CVE-2023-37211" ref_url="https://www.suse.com/security/cve/CVE-2023-37211/" source="CVE"/>
		<reference ref_id="CVE-2023-37212" ref_url="https://www.suse.com/security/cve/CVE-2023-37212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2886-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030408.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox, MozillaFirefox-branding-SLE fixes the following issues:

Changes in MozillaFirefox and MozillaFirefox-branding-SLE:

This update provides Firefox Extended Support Release 115.0 ESR

* New: 

  - Required fields are now highlighted in PDF forms.
  - Improved performance on high-refresh rate monitors (120Hz+).
  - Buttons in the Tabs toolbar can now be reached with Tab,
    Shift+Tab, and Arrow keys. View this article for additional
    details.
  - Windows' 'Make text bigger' accessibility setting now
    affects all the UI and content pages, rather than only
    applying to system font sizes.
  - Non-breaking spaces are now preserved—preventing automatic
    line breaks—when copying text from a form control.
  - Fixed WebGL performance issues on NVIDIA binary drivers via
    DMA-Buf on Linux.
  - Fixed an issue in which Firefox startup could be
    significantly slowed down by the processing of Web content
    local storage. This had the greatest impact on users with
    platter hard drives and significant local storage.
  - Removed a configuration option to allow SHA-1 signatures in
    certificates: SHA-1 signatures in certificates—long since
    determined to no longer be secure enough—are now not
    supported.
  - Highlight color is preserved correctly after typing `Enter`
    in the mail composer of Yahoo Mail and Outlook.
    After bypassing the https only error page navigating back
    would take you to the error page that was previously
    dismissed. Back now takes you to the previous site that was
    visited.
  - Paste unformatted shortcut (shift+ctrl/cmd+v) now works in
    plain text contexts, such as input and text area.
  - Added an option to print only the current page from the
    print preview dialog.
  - Swipe to navigate (two fingers on a touchpad swiped left or
    right to perform history back or forward) on Windows is now
    enabled.
  - Stability on Windows is significantly improved as Firefox
    handles low-memory situations much better.
  - Touchpad scrolling on macOS was made more accessible by
    reducing unintended diagonal scrolling opposite of the
    intended scroll axis.
  - Firefox is less likely to run out of memory on Linux and
    performs more efficiently for the rest of the system when
    memory runs low.
  - It is now possible to edit PDFs: including writing text,
    drawing, and adding signatures.
  - Setting Firefox as your default browser now also makes it
    the default PDF application on Windows systems.
  - Swipe-to-navigate (two fingers on a touchpad swiped left or
    right to perform history back or forward) now works for Linux
    users on Wayland.
  - Text Recognition in images allows users on macOS 10.15 and
    higher to extract text from the selected image (such as a
    meme or screenshot).
  - Firefox View helps you get back to content you previously
    discovered. A pinned tab allows you to find and open recently
    closed tabs on your current device and access tabs from other
    devices (via our “Tab Pickup” feature).
  - Import maps, which allow web pages to control the behavior
    of JavaScript imports, are now enabled by default.
  - Processes used for background tabs now use efficiency mode
    on Windows 11 to limit resource use.
  - The shift+esc keyboard shortcut now opens the Process
    Manager, offering a way to quickly identify processes that
    are using too many resources.
  - Firefox now supports properly color correcting images
    tagged with ICCv4 profiles.
  - Support for non-English characters when saving and printing
    PDF forms.
  - The bookmarks toolbar's default 'Only show on New Tab'
    state works correctly for blank new tabs. As before, you can
    change the bookmark toolbar's behavior using the toolbar
    context menu.
  - Manifest Version 3 (MV3) extension support is now enabled
    by default (MV2 remains enabled/supported). This major update
    also ushers an exciting user interface change in the form of
    the new extensions button.
  - The Arbitrary Code Guard exploit protection has been
    enabled in the media playback utility processes, improving
    security for Windows users.
  - The native HTML date picker for date and datetime inputs
    can now be used with a keyboard alone, improving its
    accessibility for screen reader users. Users with limited
    mobility can also now use common keyboard shortcuts to
    navigate the calendar grid and month selection spinners.
  - Firefox builds in the Spanish from Spain (es-ES) and
    Spanish from Argentina (es-AR) locales now come with a built-
    in dictionary for the Firefox spellchecker.
  - On macOS, Ctrl or Cmd + trackpad or mouse wheel now scrolls
    the page instead of zooming. This avoids accidental zooming
    and matches the behavior of other web browsers on macOS.
  - It's now possible to import bookmarks, history and
    passwords not only from Edge, Chrome or Safari but also from
    Opera, Opera GX, and Vivaldi.
  - GPU sandboxing has been enabled on Windows.
  - On Windows, third-party modules can now be blocked from
    injecting themselves into Firefox, which can be helpful if
    they are causing crashes or other undesirable behavior.
  - Date, time, and datetime-local input fields can now be
    cleared with `Cmd+Backspace` and `Cmd+Delete` shortcut on
    macOS and `Ctrl+Backspace` and `Ctrl+Delete` on Windows and
    Linux.
  - GPU-accelerated Canvas2D is enabled by default on macOS and
    Linux.
  - WebGL performance improvement on Windows, MacOS and Linux.
  - Enables overlay of hardware-decoded video with non-Intel
    GPUs on Windows 10/11, improving video playback performance
    and video scaling quality.
  - Windows native notifications are now enabled.
  - Firefox Relay users can now opt-in to create Relay email
    masks directly from the Firefox credential manager. You must
    be signed in with your Firefox Account.
  - We’ve added two new locales: Silhe Friulian (fur) and
    Sardinian (sc).
  - Right-clicking on password fields now shows an option to
    reveal the password.
  - Private windows and ETP set to strict will now include
    email tracking protection. This will make it harder for email
    trackers to learn the browsing habits of Firefox users. You
    can check the Tracking Content in the sub-panel on the shield
    icon panel.
  - The deprecated U2F Javascript API is now disabled by
    default. The U2F protocol remains usable through the WebAuthn
    API. The U2F API can be re-enabled using the
    `security.webauth.u2f` preference.
  - Say hello to enhanced Picture-in-Picture! Rewind, check
    video duration, and effortlessly switch to full-screen mode
    on the web's most popular video websites.
  - Firefox's address bar is already a great place to search
    for what you're looking for. Now you'll always be able to see
    your web search terms and refine them while viewing your
    search's results - no additional scrolling needed! Also, a
    new result menu has been added making it easier to remove
    history results and dismiss sponsored Firefox Suggest
    entries.
  - Private windows now protect users even better by blocking
    third-party cookies and storage of content trackers.
  - Passwords automatically generated by Firefox now include
    special characters, giving users more secure passwords by
    default.
  - Firefox 115 introduces a redesigned accessibility engine
    which significantly improves the speed, responsiveness, and
    stability of Firefox when used with:

    - Screen readers, as well as certain other accessibility
      software;
    - East Asian input methods;
    - Enterprise single sign-on software; and
    - Other applications which use accessibility frameworks to
      access information.

  - Firefox 115 now supports AV1 Image Format files containing
    animations (AVIS), improving support for AVIF images across
    the web.
  - The Windows GPU sandbox first shipped in the Firefox 110
    release has been tightened to enhance the security benefits
    it provides.
  - A 13-year-old feature request was fulfilled and Firefox now
    supports files being drag-and-dropped directly from Microsoft
    Outlook. A special thanks to volunteer contributor Marco
    Spiess for helping to get this across the finish line!
  - Users on macOS can now access the Services sub-menu
    directly from Firefox context menus.
  - On Windows, the elastic overscroll effect has been enabled
    by default. When two-finger scrolling on the touchpad or
    scrolling on the touchscreen, you will now see a bouncing
    animation when scrolling past the edge of a scroll container.
  - Firefox is now available in the Tajik (tg) language.
  - Added UI to manage the DNS over HTTPS exception list.
  - Bookmarks can now be searched from the Bookmarks menu. The
    Bookmarks menu is accessible by adding the Bookmarks menu
    button to the toolbar.
  - Restrict searches to your local browsing history by
    selecting Search history from the History, Library or
    Application menu buttons.
  - Mac users can now capture video from their cameras in all
    supported native resolutions. This enables resolutions higher
    than 1280x720.
  - It is now possible to reorder the extensions listed in the
    extensions panel.
  - Users on macOS, Linux, and Windows 7 can now use FIDO2 /
    WebAuthn authenticators over USB. Some advanced features,
    such as fully passwordless logins, require a PIN to be set on
    the authenticator.
  - Pocket Recommended content can now be seen in France,
    Italy, and Spain.
  - DNS over HTTPS settings are now part of the Privacy &amp;
    Security section of the Settings page and allow the user to
    choose from all the supported modes.
  - Migrating from another browser? Now you can bring over
    payment methods you've saved in Chrome-based browsers to
    Firefox.
  - Hardware video decoding enabled for Intel GPUs on Linux.
  - The Tab Manager dropdown now features close buttons, so you
    can close tabs more quickly.
  - Windows Magnifier now follows the text cursor correctly
    when the Firefox title bar is visible.
  - Undo and redo are now available in Password fields.
    [1]:https://support.mozilla.org/kb/access-toolbar-functions-
    using-keyboard?_gl=1*16it7nj*_ga*MTEzNjg4MjY5NC4xNjQ1MjAxMDU3
    *_ga_MQ7767QQQW*MTY1Njk2MzExMS43LjEuMTY1Njk2MzIzMy4w
    [2]:https://support.mozilla.org/kb/how-set-tab-pickup-firefox-view
    [3]:https://support.mozilla.org/kb/task-manager-tabs-or-extensions-are-slowing-firefox
    [4]:https://blog.mozilla.org/addons/2022/11/17/manifest-v3-signing-available-november-21-on-firefox-nightly/
    [5]:https://blog.mozilla.org/addons/2022/05/18/manifest-v3-in-firefox-recap-next-steps/
    [6]:https://support.mozilla.org/kb/unified-extensions
    [7]:https://support.mozilla.org/kb/import-data-another-browser
    [8]:https://support.mozilla.org/kb/identify-problems-third-party-modules-firefox-windows
    [9]:https://support.mozilla.org/kb/how-generate-secure-password-firefox
    [10]:https://blog.mozilla.org/accessibility/firefox-113-accessibility-performance/

* Fixed: Various security fixes. MFSA 2023-22 (bsc#1212438)

  * CVE-2023-3482 (bmo#1839464)
    Block all cookies bypass for localstorage
  * CVE-2023-37201 (bmo#1826002)
    Use-after-free in WebRTC certificate generation
  * CVE-2023-37202 (bmo#1834711)
    Potential use-after-free from compartment mismatch in
    SpiderMonkey
  * CVE-2023-37203 (bmo#291640)
    Drag and Drop API may provide access to local system files
  * CVE-2023-37204 (bmo#1832195)
    Fullscreen notification obscured via option element
  * CVE-2023-37205 (bmo#1704420)
    URL spoofing in address bar using RTL characters
  * CVE-2023-37206 (bmo#1813299)
    Insufficient validation of symlinks in the FileSystem API
  * CVE-2023-37207 (bmo#1816287)
    Fullscreen notification obscured
  * CVE-2023-37208 (bmo#1837675)
    Lack of warning when opening Diagcab files
  * CVE-2023-37209 (bmo#1837993)
    Use-after-free in `NotifyOnHistoryReload`
  * CVE-2023-37210 (bmo#1821886)
    Full-screen mode exit prevention
  * CVE-2023-37211 (bmo#1832306, bmo#1834862, bmo#1835886,
    bmo#1836550, bmo#1837450)
    Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13,
    and Thunderbird 102.13
  * CVE-2023-37212 (bmo#1750870, bmo#1825552, bmo#1826206,
    bmo#1827076, bmo#1828690, bmo#1833503, bmo#1835710,
    bmo#1838587)
    Memory safety bugs fixed in Firefox 115
- Fixed potential SIGILL on older CPUs (bsc#1212101)

* Fixed: Various security fixes and other quality
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-19"/>
	<updated date="2023-07-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212101">SUSE bug 1212101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212438">SUSE bug 1212438</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3482/">CVE-2023-3482 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3482">CVE-2023-3482 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37201/">CVE-2023-37201 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37201">CVE-2023-37201 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37202/">CVE-2023-37202 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37202">CVE-2023-37202 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37203/">CVE-2023-37203 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37203">CVE-2023-37203 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37204/">CVE-2023-37204 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37204">CVE-2023-37204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37205/">CVE-2023-37205 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37205">CVE-2023-37205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37206/">CVE-2023-37206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37206">CVE-2023-37206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37207/">CVE-2023-37207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37207">CVE-2023-37207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37208/">CVE-2023-37208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37208">CVE-2023-37208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37209/">CVE-2023-37209 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37209">CVE-2023-37209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37210/">CVE-2023-37210 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37210">CVE-2023-37210 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37211/">CVE-2023-37211 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37211">CVE-2023-37211 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37212/">CVE-2023-37212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37212">CVE-2023-37212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771913" comment="MozillaFirefox-115.0-150200.152.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771914" comment="MozillaFirefox-branding-SLE-115-150200.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771915" comment="MozillaFirefox-branding-upstream-115.0-150200.152.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771916" comment="MozillaFirefox-devel-115.0-150200.152.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771917" comment="MozillaFirefox-translations-common-115.0-150200.152.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771918" comment="MozillaFirefox-translations-other-115.0-150200.152.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4244" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213237" ref_url="https://bugzilla.suse.com/1213237" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32001" ref_url="https://www.suse.com/security/cve/CVE-2023-32001/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015534.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2023-32001: Fixed TOCTOU race condition (bsc#1213237).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-19"/>
	<updated date="2023-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213237">SUSE bug 1213237</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-32001/">CVE-2023-32001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-32001">CVE-2023-32001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009772228" comment="curl-8.0.1-150400.5.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772229" comment="libcurl-devel-8.0.1-150400.5.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772230" comment="libcurl-devel-32bit-8.0.1-150400.5.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772231" comment="libcurl4-8.0.1-150400.5.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772232" comment="libcurl4-32bit-8.0.1-150400.5.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4245" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1187829" ref_url="https://bugzilla.suse.com/1187829" source="BUGZILLA"/>
		<reference ref_id="1189998" ref_url="https://bugzilla.suse.com/1189998" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1205758" ref_url="https://bugzilla.suse.com/1205758" source="BUGZILLA"/>
		<reference ref_id="1208410" ref_url="https://bugzilla.suse.com/1208410" source="BUGZILLA"/>
		<reference ref_id="1209039" ref_url="https://bugzilla.suse.com/1209039" source="BUGZILLA"/>
		<reference ref_id="1209780" ref_url="https://bugzilla.suse.com/1209780" source="BUGZILLA"/>
		<reference ref_id="1210335" ref_url="https://bugzilla.suse.com/1210335" source="BUGZILLA"/>
		<reference ref_id="1210565" ref_url="https://bugzilla.suse.com/1210565" source="BUGZILLA"/>
		<reference ref_id="1210584" ref_url="https://bugzilla.suse.com/1210584" source="BUGZILLA"/>
		<reference ref_id="1210853" ref_url="https://bugzilla.suse.com/1210853" source="BUGZILLA"/>
		<reference ref_id="1211014" ref_url="https://bugzilla.suse.com/1211014" source="BUGZILLA"/>
		<reference ref_id="1211346" ref_url="https://bugzilla.suse.com/1211346" source="BUGZILLA"/>
		<reference ref_id="1211400" ref_url="https://bugzilla.suse.com/1211400" source="BUGZILLA"/>
		<reference ref_id="1211410" ref_url="https://bugzilla.suse.com/1211410" source="BUGZILLA"/>
		<reference ref_id="1211794" ref_url="https://bugzilla.suse.com/1211794" source="BUGZILLA"/>
		<reference ref_id="1211852" ref_url="https://bugzilla.suse.com/1211852" source="BUGZILLA"/>
		<reference ref_id="1212051" ref_url="https://bugzilla.suse.com/1212051" source="BUGZILLA"/>
		<reference ref_id="1212265" ref_url="https://bugzilla.suse.com/1212265" source="BUGZILLA"/>
		<reference ref_id="1212350" ref_url="https://bugzilla.suse.com/1212350" source="BUGZILLA"/>
		<reference ref_id="1212405" ref_url="https://bugzilla.suse.com/1212405" source="BUGZILLA"/>
		<reference ref_id="1212445" ref_url="https://bugzilla.suse.com/1212445" source="BUGZILLA"/>
		<reference ref_id="1212448" ref_url="https://bugzilla.suse.com/1212448" source="BUGZILLA"/>
		<reference ref_id="1212456" ref_url="https://bugzilla.suse.com/1212456" source="BUGZILLA"/>
		<reference ref_id="1212494" ref_url="https://bugzilla.suse.com/1212494" source="BUGZILLA"/>
		<reference ref_id="1212495" ref_url="https://bugzilla.suse.com/1212495" source="BUGZILLA"/>
		<reference ref_id="1212504" ref_url="https://bugzilla.suse.com/1212504" source="BUGZILLA"/>
		<reference ref_id="1212513" ref_url="https://bugzilla.suse.com/1212513" source="BUGZILLA"/>
		<reference ref_id="1212540" ref_url="https://bugzilla.suse.com/1212540" source="BUGZILLA"/>
		<reference ref_id="1212556" ref_url="https://bugzilla.suse.com/1212556" source="BUGZILLA"/>
		<reference ref_id="1212561" ref_url="https://bugzilla.suse.com/1212561" source="BUGZILLA"/>
		<reference ref_id="1212563" ref_url="https://bugzilla.suse.com/1212563" source="BUGZILLA"/>
		<reference ref_id="1212564" ref_url="https://bugzilla.suse.com/1212564" source="BUGZILLA"/>
		<reference ref_id="1212584" ref_url="https://bugzilla.suse.com/1212584" source="BUGZILLA"/>
		<reference ref_id="1212592" ref_url="https://bugzilla.suse.com/1212592" source="BUGZILLA"/>
		<reference ref_id="1212603" ref_url="https://bugzilla.suse.com/1212603" source="BUGZILLA"/>
		<reference ref_id="1212605" ref_url="https://bugzilla.suse.com/1212605" source="BUGZILLA"/>
		<reference ref_id="1212606" ref_url="https://bugzilla.suse.com/1212606" source="BUGZILLA"/>
		<reference ref_id="1212619" ref_url="https://bugzilla.suse.com/1212619" source="BUGZILLA"/>
		<reference ref_id="1212685" ref_url="https://bugzilla.suse.com/1212685" source="BUGZILLA"/>
		<reference ref_id="1212701" ref_url="https://bugzilla.suse.com/1212701" source="BUGZILLA"/>
		<reference ref_id="1212741" ref_url="https://bugzilla.suse.com/1212741" source="BUGZILLA"/>
		<reference ref_id="1212835" ref_url="https://bugzilla.suse.com/1212835" source="BUGZILLA"/>
		<reference ref_id="1212838" ref_url="https://bugzilla.suse.com/1212838" source="BUGZILLA"/>
		<reference ref_id="1212842" ref_url="https://bugzilla.suse.com/1212842" source="BUGZILLA"/>
		<reference ref_id="1212848" ref_url="https://bugzilla.suse.com/1212848" source="BUGZILLA"/>
		<reference ref_id="1212861" ref_url="https://bugzilla.suse.com/1212861" source="BUGZILLA"/>
		<reference ref_id="1212869" ref_url="https://bugzilla.suse.com/1212869" source="BUGZILLA"/>
		<reference ref_id="1212892" ref_url="https://bugzilla.suse.com/1212892" source="BUGZILLA"/>
		<reference ref_id="1212961" ref_url="https://bugzilla.suse.com/1212961" source="BUGZILLA"/>
		<reference ref_id="1213010" ref_url="https://bugzilla.suse.com/1213010" source="BUGZILLA"/>
		<reference ref_id="1213011" ref_url="https://bugzilla.suse.com/1213011" source="BUGZILLA"/>
		<reference ref_id="1213012" ref_url="https://bugzilla.suse.com/1213012" source="BUGZILLA"/>
		<reference ref_id="1213013" ref_url="https://bugzilla.suse.com/1213013" source="BUGZILLA"/>
		<reference ref_id="1213014" ref_url="https://bugzilla.suse.com/1213014" source="BUGZILLA"/>
		<reference ref_id="1213015" ref_url="https://bugzilla.suse.com/1213015" source="BUGZILLA"/>
		<reference ref_id="1213016" ref_url="https://bugzilla.suse.com/1213016" source="BUGZILLA"/>
		<reference ref_id="1213017" ref_url="https://bugzilla.suse.com/1213017" source="BUGZILLA"/>
		<reference ref_id="1213018" ref_url="https://bugzilla.suse.com/1213018" source="BUGZILLA"/>
		<reference ref_id="1213019" ref_url="https://bugzilla.suse.com/1213019" source="BUGZILLA"/>
		<reference ref_id="1213020" ref_url="https://bugzilla.suse.com/1213020" source="BUGZILLA"/>
		<reference ref_id="1213021" ref_url="https://bugzilla.suse.com/1213021" source="BUGZILLA"/>
		<reference ref_id="1213024" ref_url="https://bugzilla.suse.com/1213024" source="BUGZILLA"/>
		<reference ref_id="1213025" ref_url="https://bugzilla.suse.com/1213025" source="BUGZILLA"/>
		<reference ref_id="1213032" ref_url="https://bugzilla.suse.com/1213032" source="BUGZILLA"/>
		<reference ref_id="1213034" ref_url="https://bugzilla.suse.com/1213034" source="BUGZILLA"/>
		<reference ref_id="1213035" ref_url="https://bugzilla.suse.com/1213035" source="BUGZILLA"/>
		<reference ref_id="1213036" ref_url="https://bugzilla.suse.com/1213036" source="BUGZILLA"/>
		<reference ref_id="1213037" ref_url="https://bugzilla.suse.com/1213037" source="BUGZILLA"/>
		<reference ref_id="1213038" ref_url="https://bugzilla.suse.com/1213038" source="BUGZILLA"/>
		<reference ref_id="1213039" ref_url="https://bugzilla.suse.com/1213039" source="BUGZILLA"/>
		<reference ref_id="1213040" ref_url="https://bugzilla.suse.com/1213040" source="BUGZILLA"/>
		<reference ref_id="1213041" ref_url="https://bugzilla.suse.com/1213041" source="BUGZILLA"/>
		<reference ref_id="1213087" ref_url="https://bugzilla.suse.com/1213087" source="BUGZILLA"/>
		<reference ref_id="1213088" ref_url="https://bugzilla.suse.com/1213088" source="BUGZILLA"/>
		<reference ref_id="1213089" ref_url="https://bugzilla.suse.com/1213089" source="BUGZILLA"/>
		<reference ref_id="1213090" ref_url="https://bugzilla.suse.com/1213090" source="BUGZILLA"/>
		<reference ref_id="1213092" ref_url="https://bugzilla.suse.com/1213092" source="BUGZILLA"/>
		<reference ref_id="1213093" ref_url="https://bugzilla.suse.com/1213093" source="BUGZILLA"/>
		<reference ref_id="1213094" ref_url="https://bugzilla.suse.com/1213094" source="BUGZILLA"/>
		<reference ref_id="1213095" ref_url="https://bugzilla.suse.com/1213095" source="BUGZILLA"/>
		<reference ref_id="1213096" ref_url="https://bugzilla.suse.com/1213096" source="BUGZILLA"/>
		<reference ref_id="1213098" ref_url="https://bugzilla.suse.com/1213098" source="BUGZILLA"/>
		<reference ref_id="1213099" ref_url="https://bugzilla.suse.com/1213099" source="BUGZILLA"/>
		<reference ref_id="1213100" ref_url="https://bugzilla.suse.com/1213100" source="BUGZILLA"/>
		<reference ref_id="1213102" ref_url="https://bugzilla.suse.com/1213102" source="BUGZILLA"/>
		<reference ref_id="1213103" ref_url="https://bugzilla.suse.com/1213103" source="BUGZILLA"/>
		<reference ref_id="1213104" ref_url="https://bugzilla.suse.com/1213104" source="BUGZILLA"/>
		<reference ref_id="1213105" ref_url="https://bugzilla.suse.com/1213105" source="BUGZILLA"/>
		<reference ref_id="1213106" ref_url="https://bugzilla.suse.com/1213106" source="BUGZILLA"/>
		<reference ref_id="1213107" ref_url="https://bugzilla.suse.com/1213107" source="BUGZILLA"/>
		<reference ref_id="1213108" ref_url="https://bugzilla.suse.com/1213108" source="BUGZILLA"/>
		<reference ref_id="1213109" ref_url="https://bugzilla.suse.com/1213109" source="BUGZILLA"/>
		<reference ref_id="1213110" ref_url="https://bugzilla.suse.com/1213110" source="BUGZILLA"/>
		<reference ref_id="1213111" ref_url="https://bugzilla.suse.com/1213111" source="BUGZILLA"/>
		<reference ref_id="1213112" ref_url="https://bugzilla.suse.com/1213112" source="BUGZILLA"/>
		<reference ref_id="1213113" ref_url="https://bugzilla.suse.com/1213113" source="BUGZILLA"/>
		<reference ref_id="1213114" ref_url="https://bugzilla.suse.com/1213114" source="BUGZILLA"/>
		<reference ref_id="1213116" ref_url="https://bugzilla.suse.com/1213116" source="BUGZILLA"/>
		<reference ref_id="1213134" ref_url="https://bugzilla.suse.com/1213134" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1249" ref_url="https://www.suse.com/security/cve/CVE-2023-1249/" source="CVE"/>
		<reference ref_id="CVE-2023-1829" ref_url="https://www.suse.com/security/cve/CVE-2023-1829/" source="CVE"/>
		<reference ref_id="CVE-2023-2430" ref_url="https://www.suse.com/security/cve/CVE-2023-2430/" source="CVE"/>
		<reference ref_id="CVE-2023-28866" ref_url="https://www.suse.com/security/cve/CVE-2023-28866/" source="CVE"/>
		<reference ref_id="CVE-2023-3090" ref_url="https://www.suse.com/security/cve/CVE-2023-3090/" source="CVE"/>
		<reference ref_id="CVE-2023-3111" ref_url="https://www.suse.com/security/cve/CVE-2023-3111/" source="CVE"/>
		<reference ref_id="CVE-2023-3212" ref_url="https://www.suse.com/security/cve/CVE-2023-3212/" source="CVE"/>
		<reference ref_id="CVE-2023-3220" ref_url="https://www.suse.com/security/cve/CVE-2023-3220/" source="CVE"/>
		<reference ref_id="CVE-2023-3357" ref_url="https://www.suse.com/security/cve/CVE-2023-3357/" source="CVE"/>
		<reference ref_id="CVE-2023-3358" ref_url="https://www.suse.com/security/cve/CVE-2023-3358/" source="CVE"/>
		<reference ref_id="CVE-2023-3389" ref_url="https://www.suse.com/security/cve/CVE-2023-3389/" source="CVE"/>
		<reference ref_id="CVE-2023-35788" ref_url="https://www.suse.com/security/cve/CVE-2023-35788/" source="CVE"/>
		<reference ref_id="CVE-2023-35823" ref_url="https://www.suse.com/security/cve/CVE-2023-35823/" source="CVE"/>
		<reference ref_id="CVE-2023-35828" ref_url="https://www.suse.com/security/cve/CVE-2023-35828/" source="CVE"/>
		<reference ref_id="CVE-2023-35829" ref_url="https://www.suse.com/security/cve/CVE-2023-35829/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2023-1249: Fixed a use-after-free flaw in the core dump subsystem that allowed a local user to crash the system (bsc#1209039).
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).
- CVE-2023-2430: Fixed a possible denial of service via a missing lock in the io_uring subsystem (bsc#1211014).
- CVE-2023-28866: Fixed an out-of-bounds access in net/bluetooth/hci_sync.c because amp_init1[] and amp_init2[] are supposed to have an intentionally invalid element, but did not (bsc#1209780).
- CVE-2023-3090: Fixed a heap out-of-bounds write in the ipvlan network driver (bsc#1212842).
- CVE-2023-3111: Fixed a use-after-free vulnerability in prepare_to_relocate in fs/btrfs/relocation.c (bsc#1212051).
- CVE-2023-3212: Fixed a NULL pointer dereference flaw in the gfs2 file system (bsc#1212265).
- CVE-2023-3220: Fixed a NULL pointer dereference flaw in dpu_crtc_atomic_check in drivers/gpu/drm/msm/disp/dpu1/dpu_crtc.c lacks check of the return value of kzalloc() (bsc#1212556).
- CVE-2023-3357: Fixed a NULL pointer dereference flaw in the AMD Sensor Fusion Hub driver (bsc#1212605).
- CVE-2023-3358: Fixed a NULL pointer dereference flaw in the Integrated Sensor Hub (ISH) driver (bsc#1212606).
- CVE-2023-3389: Fixed a use-after-free vulnerability in the io_uring subsystem (bsc#1212838).
- CVE-2023-35788: Fixed an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets in fl_set_geneve_opt in net/sched/cls_flower.c (bsc#1212504).
- CVE-2023-35823: Fixed a use-after-free flaw in saa7134_finidev in drivers/media/pci/saa7134/saa7134-core.c (bsc#1212494).
- CVE-2023-35828: Fixed a use-after-free flaw in renesas_usb3_remove in drivers/usb/gadget/udc/renesas_usb3.c (bsc#1212513).
- CVE-2023-35829: Fixed a use-after-free flaw in rkvdec_remove in drivers/staging/media/rkvdec/rkvdec.c (bsc#1212495).

The following non-security bugs were fixed:

- ACPI: CPPC: Add AMD pstate energy performance preference cppc control (bsc#1212445).
- ACPI: CPPC: Add auto select register read/write support (bsc#1212445).
- ACPI: sleep: Avoid breaking S3 wakeup due to might_sleep() (git-fixes).
- ALSA: ac97: Fix possible NULL dereference in snd_ac97_mixer (git-fixes).
- ALSA: fireface: make read-only const array for model names static (git-fixes).
- ALSA: hda/realtek: Add 'Intel Reference board' and 'NUC 13' SSID in the ALC256 (git-fixes).
- ALSA: hda/realtek: Add a quirk for Compaq N14JP6 (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS ROG G614Jx (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS ROG G634Z (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS ROG GA402X (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS ROG GV601V (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS ROG GX650P (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS ROG GZ301V (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NPx0SNx (git-fixes).
- ALSA: hda/realtek: Add quirks for ASUS GU604V and GU603V (git-fixes).
- ALSA: hda/realtek: Add quirks for ROG ALLY CS35l41 audio (git-fixes).
- ALSA: hda/realtek: Add quirks for Unis H3C Desktop B760 &amp; Q760 (git-fixes).
- ALSA: hda/realtek: Amend G634 quirk to enable rear speakers (git-fixes).
- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on EliteBook (git-fixes).
- ALSA: hda/realtek: Whitespace fix (git-fixes).
- ALSA: hda: LNL: add HD Audio PCI ID (git-fixes).
- ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() (git-fixes).
- ALSA: jack: Fix mutex call in snd_jack_report() (git-fixes).
- ALSA: oxfw: make read-only const array models static (git-fixes).
- ALSA: pcm: Fix potential data race at PCM memory allocation helpers (git-fixes).
- ALSA: usb-audio: Add quirk flag for HEM devices to enable native DSD playback (git-fixes).
- ALSA: usb-audio: Fix broken resume due to UAC3 power state (git-fixes).
- ARM: 9295/1: unwind:fix unwind abort for uleb128 case (git-fixes)
- ARM: cpu: Switch to arch_cpu_finalize_init() (bsc#1212448).
- ARM: dts: Fix erroneous ADS touchscreen polarities (git-fixes).
- ARM: dts: vexpress: add missing cache properties (git-fixes).
- ASoC: dwc: move DMA init to snd_soc_dai_driver probe() (git-fixes).
- ASoC: es8316: Do not set rate constraints for unsupported MCLKs (git-fixes).
- ASoC: es8316: Increment max value for ALC Capture Target Volume control (git-fixes).
- ASoC: imx-audmix: check return value of devm_kasprintf() (git-fixes).
- ASoC: mediatek: mt8173: Fix irq error path (git-fixes).
- ASoC: nau8824: Add quirk to active-high jack-detect (git-fixes).
- ASoC: simple-card: Add missing of_node_put() in case of error (git-fixes).
- ASoC: soc-pcm: test if a BE can be prepared (git-fixes).
- Add MODULE_FIRMWARE() for FIRMWARE_TG357766 (git-fixes).
- Bluetooth: Fix use-after-free in hci_remove_ltk/hci_remove_irk (git-fixes).
- Documentation: ABI: sysfs-class-net-qmi: pass_through contact update (git-fixes).
- Documentation: bonding: fix the doc of peer_notif_delay (git-fixes).
- Documentation: devlink: add add devlink-selftests to the table of contents (git-fixes).
- Documentation: devlink: mlx5.rst: Fix htmldoc build warning (git-fixes).
- Documentation: timers: hrtimers: Make hybrid union historical (git-fixes).
- Drop a buggy dvb-core fix patch (bsc#1205758)
- Fix documentation of panic_on_warn (git-fixes).
- Get module prefix from kmod (bsc#1212835).
- HID: logitech-hidpp: add HIDPP_QUIRK_DELAYED_INIT for the T651 (git-fixes).
- HID: wacom: Add error check to wacom_parse_and_register() (git-fixes).
- IB/hfi1: Fix wrong mmu_node used for user SDMA packet after invalidate (git-fixes)
- IB/isert: Fix dead lock in ib_isert (git-fixes)
- IB/isert: Fix incorrect release of isert connection (git-fixes)
- IB/isert: Fix possible list corruption in CMA handler (git-fixes)
- IB/uverbs: Fix to consider event queue closing also upon non-blocking mode (git-fixes)
- Input: adxl34x - do not hardcode interrupt trigger type (git-fixes).
- Input: drv260x - fix typo in register value define (git-fixes).
- Input: drv260x - remove unused .reg_defaults (git-fixes).
- Input: drv260x - sleep between polling GO bit (git-fixes).
- Input: psmouse - fix OOB access in Elantech protocol (git-fixes).
- Input: soc_button_array - add invalid acpi_index DMI quirk handling (git-fixes).
- KVM: arm64: Do not hypercall before EL2 init (git-fixes)
- KVM: arm64: Propagate errors from __pkvm_prot_finalize hypercall (git-fixes)
- KVM: arm64: Save PSTATE early on exit (git-fixes)
- KVM: arm64: vgic: Read HW interrupt pending state from the HW (git-fixes)
- NTB: amd: Fix error handling in amd_ntb_pci_driver_init() (git-fixes).
- NTB: ntb_tool: Add check for devm_kcalloc (git-fixes).
- NTB: ntb_transport: fix possible memory leak while device_register() fails (git-fixes).
- PCI/ASPM: Disable ASPM on MFD function removal to avoid use-after-free (git-fixes).
- PCI: Add pci_clear_master() stub for non-CONFIG_PCI (git-fixes).
- PCI: Release resource invalidated by coalescing (git-fixes).
- PCI: cadence: Fix Gen2 Link Retraining process (git-fixes).
- PCI: endpoint: Add missing documentation about the MSI/MSI-X range (git-fixes).
- PCI: ftpci100: Release the clock resources (git-fixes).
- PCI: pciehp: Cancel bringup sequence if card is not present (git-fixes).
- PCI: qcom: Disable write access to read only registers for IP v2.3.3 (git-fixes).
- PCI: rockchip: Add poll and timeout to wait for PHY PLLs to be locked (git-fixes).
- PCI: rockchip: Assert PCI Configuration Enable bit after probe (git-fixes).
- PCI: rockchip: Fix legacy IRQ generation for RK3399 PCIe endpoint core (git-fixes).
- PCI: rockchip: Set address alignment for endpoint mode (git-fixes).
- PCI: rockchip: Use u32 variable to access 32-bit registers (git-fixes).
- PCI: rockchip: Write PCI Device ID to correct register (git-fixes).
- PCI: vmd: Reset VMD config register between soft reboots (git-fixes).
- PM: domains: fix integer overflow issues in genpd_parse_state() (git-fixes).
- RDMA/bnxt_re: Avoid calling wake_up threads from spin_lock context (git-fixes)
- RDMA/bnxt_re: Disable/kill tasklet only if it is enabled (git-fixes)
- RDMA/bnxt_re: Fix to remove an unnecessary log (git-fixes)
- RDMA/bnxt_re: Fix to remove unnecessary return labels (git-fixes)
- RDMA/bnxt_re: Remove a redundant check inside bnxt_re_update_gid (git-fixes)
- RDMA/bnxt_re: Remove unnecessary checks (git-fixes)
- RDMA/bnxt_re: Return directly without goto jumps (git-fixes)
- RDMA/bnxt_re: Use unique names while registering interrupts (git-fixes)
- RDMA/bnxt_re: wraparound mbox producer index (git-fixes)
- RDMA/cma: Always set static rate to 0 for RoCE (git-fixes)
- RDMA/hns: Fix hns_roce_table_get return value (git-fixes)
- RDMA/irdma: avoid fortify-string warning in irdma_clr_wqes (git-fixes)
- RDMA/mlx5: Create an indirect flow table for steering anchor (git-fixes)
- RDMA/mlx5: Do not set tx affinity when lag is in hash mode (git-fixes)
- RDMA/mlx5: Fix affinity assignment (git-fixes)
- RDMA/mlx5: Initiate dropless RQ for RAW Ethernet functions (git-fixes)
- RDMA/mlx5: Rely on RoCE fw cap instead of devlink when setting profile (jsc#SLE-19253).
- RDMA/rtrs: Fix rxe_dealloc_pd warning (git-fixes)
- RDMA/rtrs: Fix the last iu-&gt;buf leak in err path (git-fixes)
- RDMA/rxe: Fix access checks in rxe_check_bind_mw (git-fixes)
- RDMA/rxe: Fix packet length checks (git-fixes)
- RDMA/rxe: Fix ref count error in check_rkey() (git-fixes)
- RDMA/rxe: Fix rxe_cq_post (git-fixes)
- RDMA/rxe: Fix the use-before-initialization error of resp_pkts (git-fixes)
- RDMA/rxe: Remove dangling declaration of rxe_cq_disable() (git-fixes)
- RDMA/rxe: Remove the unused variable obj (git-fixes)
- RDMA/rxe: Removed unused name from rxe_task struct (git-fixes)
- RDMA/uverbs: Restrict usage of privileged QKEYs (git-fixes)
- RDMA/vmw_pvrdma: Remove unnecessary check on wr-&gt;opcode (git-fixes)
- Remove more packaging cruft for SLE &amp;lt; 12 SP3
- Remove orphaned CONFIG_PRINTK_SAFE_LOG_BUF_SHIFT (bsc#1189998 git-fixes).
- Revert 'drm/amd/display: edp do not add non-edid timings' (git-fixes).
- Revert 'mtd: rawnand: arasan: Prevent an unsupported configuration' (git-fixes).
- Revert 'net: phy: dp83867: perform soft reset and retain established link' (git-fixes).
- SUNRPC: Clean up svc_deferred_class trace events (git-fixes).
- USB: cdns3: fix NCM gadget RX speed 20x slow than expection at iMX8QM (git-fixes).
- USB: dwc3-meson-g12a: Fix an error handling path in dwc3_meson_g12a_probe() (git-fixes).
- USB: dwc3: fix use-after-free on core driver unbind (git-fixes).
- USB: dwc3: gadget: Propagate core init errors to UDC during pullup (git-fixes).
- USB: dwc3: gadget: Reset num TRBs before giving back the request (git-fixes).
- USB: dwc3: qcom: Fix an error handling path in dwc3_qcom_probe() (git-fixes).
- USB: dwc3: qcom: Fix potential memory leak (git-fixes).
- USB: dwc3: qcom: Release the correct resources in dwc3_qcom_remove() (git-fixes).
- USB: dwc3: qcom: fix NULL-deref on suspend (git-fixes).
- USB: gadget: u_serial: Add null pointer check in gserial_suspend (git-fixes).
- USB: gadget: udc: fix NULL dereference in remove() (git-fixes).
- USB: hide unused usbfs_notify_suspend/resume functions (git-fixes).
- USB: phy: phy-tahvo: fix memory leak in tahvo_usb_probe() (git-fixes).
- USB: serial: option: add Quectel EM061KGL series (git-fixes).
- USB: typec: ucsi: Fix command cancellation (git-fixes).
- USB: xhci: Remove unused udev from xhci_log_ctx trace event (git-fixes).
- Update commit 52b1b46c39ae ('of: Create platform devices for OF framebuffers') (bsc#1212405).
- Update patches.suse/KVM-x86-fix-sending-PV-IPI.patch (git-fixes, bsc#1210853).
- amdgpu: validate offset_in_bo of drm_amdgpu_gem_va (git-fixes).
- apparmor: fix missing error check for rhashtable_insert_fast (git-fixes).
- arm64: Add missing Set/Way CMO encodings (git-fixes).
- arm64: Always load shadow stack pointer directly from the task struct (git-fixes)
- arm64: Stash shadow stack pointer in the task struct on interrupt (git-fixes)
- arm64: dts: Move BCM4908 dts to bcmbca folder (git-fixes)
- arm64: dts: broadcom: bcmbca: bcm4908: fix NAND interrupt name (git-fixes)
- arm64: dts: broadcom: bcmbca: bcm4908: fix procmon nodename (git-fixes)
- arm64: dts: imx8mn-var-som: fix PHY detection bug by adding deassert (git-fixes)
- bnxt_en: Do not issue AP reset during ethtool's reset operation (git-fixes).
- bnxt_en: Implement .set_port / .unset_port UDP tunnel callbacks (git-fixes).
- bnxt_en: Prevent kernel panic when receiving unexpected PHC_UPDATE event (git-fixes).
- bnxt_en: Query default VLAN before VNIC setup on a VF (git-fixes).
- bnxt_en: Skip firmware fatal error recovery if chip is not accessible (git-fixes).
- bonding: Fix negative jump label count on nested bonding (bsc#1212685).
- bpf, arm64: Call build_prologue() first in first JIT pass (git-fixes)
- bpf, arm64: Clear prog-&gt;jited_len along prog-&gt;jited (git-fixes)
- bpf, arm64: Feed byte-offset into bpf line info (git-fixes)
- bpf, arm64: Use emit_addr_mov_i64() for BPF_PSEUDO_FUNC (git-fixes)
- bpf: Add extra path pointer check to d_path helper (git-fixes).
- bpf: Fix UAF in task local storage (bsc#1212564).
- bus: fsl-mc: fsl-mc-allocator: Drop a write-only variable (git-fixes).
- bus: ti-sysc: Fix dispc quirk masking bool variables (git-fixes).
- can: isotp: isotp_sendmsg(): fix return error fix on TX path (git-fixes).
- can: kvaser_pciefd: Remove handler for unused KVASER_PCIEFD_PACK_TYPE_EFRAME_ACK (git-fixes).
- can: kvaser_pciefd: Remove useless write to interrupt register (git-fixes).
- can: length: fix bitstuffing count (git-fixes).
- can: length: fix description of the RRS field (git-fixes).
- can: length: make header self contained (git-fixes).
- ceph: fix use-after-free bug for inodes when flushing capsnaps (bsc#1212540).
- cgroup: Use cgroup_attach_{lock,unlock}() from cgroup_attach_task_all() (bsc#1212563).
- cgroup: always put cset in cgroup_css_set_put_fork (bsc#1212561).
- cgroup: fix missing cpus_read_{lock,unlock}() in cgroup_transfer_tasks() (bsc#1212563).
- clk: Fix memory leak in devm_clk_notifier_register() (git-fixes).
- clk: cdce925: check return value of kasprintf() (git-fixes).
- clk: imx: clk-imx8mn: fix memory leak in imx8mn_clocks_probe (git-fixes).
- clk: imx: clk-imx8mp: improve error handling in imx8mp_clocks_probe() (git-fixes).
- clk: imx: scu: use _safe list iterator to avoid a use after free (git-fixes).
- clk: keystone: sci-clk: check return value of kasprintf() (git-fixes).
- clk: qcom: camcc-sc7180: Add parent dependency to all camera GDSCs (git-fixes).
- clk: qcom: gcc-ipq6018: Use floor ops for sdcc clocks (git-fixes).
- clk: samsung: Add Exynos4212 compatible to CLKOUT driver (git-fixes).
- clk: si5341: check return value of {devm_}kasprintf() (git-fixes).
- clk: si5341: free unused memory on probe failure (git-fixes).
- clk: si5341: return error if one synth clock registration fails (git-fixes).
- clk: tegra: tegra124-emc: Fix potential memory leak (git-fixes).
- clk: ti: clkctrl: check return value of kasprintf() (git-fixes).
- clk: vc5: check memory returned by kasprintf() (git-fixes).
- clocksource/drivers/cadence-ttc: Fix memory leak in ttc_timer_probe (git-fixes).
- crypto: marvell/cesa - Fix type mismatch warning (git-fixes).
- crypto: nx - fix build warnings when DEBUG_FS is not enabled (git-fixes).
- device-dax: Fix duplicate 'hmem' device registration (bsc#1211400).
- disable two x86 PAT related patches (bsc#1212456).
- docs/memory-barriers.txt: Add a missed closing parenthesis (git-fixes).
- docs: networking: Update codeaurora references for rmnet (git-fixes).
- drivers: meson: secure-pwrc: always enable DMA domain (git-fixes).
- drm/amd/display: Add logging for display MALL refresh setting (git-fixes).
- drm/amd/display: Add minimal pipe split transition state (git-fixes).
- drm/amd/display: Add wrapper to call planes and stream update (git-fixes).
- drm/amd/display: Explicitly specify update type per plane info change (git-fixes).
- drm/amd/display: Fix artifacting on eDP panels when engaging freesync video mode (git-fixes).
- drm/amd/display: Use dc_update_planes_and_stream (git-fixes).
- drm/amd/display: add a NULL pointer check (bsc#1212848, bsc#1212961).
- drm/amd/display: disable seamless boot if force_odm_combine is enabled (bsc#1212848, bsc#1212961).
- drm/amd/display: drop redundant memset() in get_available_dsc_slices() (git-fixes).
- drm/amd/display: edp do not add non-edid timings (git-fixes).
- drm/amd/display: fix the system hang while disable PSR (git-fixes).
- drm/amd/pm: Fix power context allocation in SMU13 (git-fixes).
- drm/amd/pm: revise the ASPM settings for thunderbolt attached scenario (bsc#1212848, bsc#1212961).
- drm/amd/pm: update the LC_L1_INACTIVITY setting to address possible noise issue (bsc#1212848, bsc#1212961).
- drm/amd: Disable PSR-SU on Parade 0803 TCON (bsc#1212848, bsc#1212961).
- drm/amd: Do not try to enable secure display TA multiple times (bsc#1212848, bsc#1212961).
- drm/amd: Make sure image is written to trigger VBIOS image update flow (git-fixes).
- drm/amd: Tighten permissions on VBIOS flashing attributes (git-fixes).
- drm/amdgpu: Set vmbo destroy after pt bo is created (git-fixes).
- drm/amdgpu: Validate VM ioctl flags (git-fixes).
- drm/amdgpu: add missing radeon secondary PCI ID (git-fixes).
- drm/amdgpu: fix clearing mappings for BOs that are always valid in VM (bsc#1212848, bsc#1212961).
- drm/amdgpu: fix number of fence calculations (bsc#1212848, bsc#1212961).
- drm/amdgpu: fix xclk freq on CHIP_STONEY (git-fixes).
- drm/amdkfd: Fix potential deallocation of previously deallocated memory (git-fixes).
- drm/bridge: tc358768: always enable HS video mode (git-fixes).
- drm/bridge: tc358768: fix PLL parameters computation (git-fixes).
- drm/bridge: tc358768: fix PLL target frequency (git-fixes).
- drm/bridge: tc358768: fix TCLK_ZEROCNT computation (git-fixes).
- drm/bridge: tc358768: fix TXTAGOCNT computation (git-fixes).
- drm/bridge: ti-sn65dsi86: Avoid possible buffer overflow (git-fixes).
- drm/exynos: fix race condition UAF in exynos_g2d_exec_ioctl (git-fixes).
- drm/exynos: vidi: fix a wrong error return (git-fixes).
- drm/i915/gvt: remove unused variable gma_bottom in command parser (git-fixes).
- drm/i915/psr: Use hw.adjusted mode when calculating io/fast wake times (git-fixes).
- drm/i915/selftests: Add some missing error propagation (git-fixes).
- drm/i915/selftests: Increase timeout for live_parallel_switch (git-fixes).
- drm/i915/selftests: Stop using kthread_stop() (git-fixes).
- drm/i915: Explain the magic numbers for AUX SYNC/precharge length (git-fixes).
- drm/i915: Use 18 fast wake AUX sync len (git-fixes).
- drm/msm/adreno: fix sparse warnings in a6xx code (git-fixes).
- drm/msm/dp: Free resources after unregistering them (git-fixes).
- drm/msm/dpu: correct MERGE_3D length (git-fixes).
- drm/msm/dpu: do not enable color-management if DSPPs are not available (git-fixes).
- drm/msm/dsi: do not allow enabling 14nm VCO with unprogrammed rate (git-fixes).
- drm/nouveau/dp: check for NULL nv_connector-&gt;native_mode (git-fixes).
- drm/nouveau: add nv_encoder pointer check for NULL (git-fixes).
- drm/nouveau: do not detect DSM for non-NVIDIA device (git-fixes).
- drm/panel: sharp-ls043t1le01: adjust mode settings (git-fixes).
- drm/panel: simple: fix active size for Ampire AM-480272H3TMQW-T01H (git-fixes).
- drm/radeon: fix possible division-by-zero errors (git-fixes).
- drm/radeon: fix race condition UAF in radeon_gem_set_domain_ioctl (git-fixes).
- drm/rockchip: vop: Leave vblank enabled in self-refresh (git-fixes).
- drm/vram-helper: fix function names in vram helper doc (git-fixes).
- drm: sun4i_tcon: use devm_clk_get_enabled in `sun4i_tcon_init_clocks` (git-fixes).
- drm:amd:amdgpu: Fix missing buffer object unlock in failure path (git-fixes).
- dt-bindings: i3c: silvaco,i3c-master: fix missing schema restriction (git-fixes).
- dt-bindings: phy: brcm,brcmstb-usb-phy: Fix error in 'compatible' conditional schema (git-fixes).
- elf: correct note name comment (git-fixes).
- ext4: Fix reusing stale buffer heads from last failed mounting (bsc#1213020).
- ext4: add EA_INODE checking to ext4_iget() (bsc#1213106).
- ext4: add ext4_sb_block_valid() refactored out of ext4_inode_block_valid() (bsc#1213088).
- ext4: add lockdep annotations for i_data_sem for ea_inode's (bsc#1213109).
- ext4: add strict range checks while freeing blocks (bsc#1213089).
- ext4: avoid deadlock in fs reclaim with page writeback (bsc#1213016).
- ext4: bail out of ext4_xattr_ibody_get() fails for any reason (bsc#1213018).
- ext4: block range must be validated before use in ext4_mb_clear_bb() (bsc#1213090).
- ext4: check iomap type only if ext4_iomap_begin() does not fail (bsc#1213103).
- ext4: disallow ea_inodes with extended attributes (bsc#1213108).
- ext4: fail ext4_iget if special inode unallocated (bsc#1213010).
- ext4: fix WARNING in ext4_update_inline_data (bsc#1213012).
- ext4: fix WARNING in mb_find_extent (bsc#1213099).
- ext4: fix bug_on in __es_tree_search caused by bad quota inode (bsc#1213111).
- ext4: fix data races when using cached status extents (bsc#1213102).
- ext4: fix deadlock when converting an inline directory in nojournal mode (bsc#1213105).
- ext4: fix i_disksize exceeding i_size problem in paritally written case (bsc#1213015).
- ext4: fix lockdep warning when enabling MMP (bsc#1213100).
- ext4: fix task hung in ext4_xattr_delete_inode (bsc#1213096).
- ext4: fix to check return value of freeze_bdev() in ext4_shutdown() (bsc#1213021).
- ext4: fix use-after-free read in ext4_find_extent for bigalloc + inline (bsc#1213098).
- ext4: improve error handling from ext4_dirhash() (bsc#1213104).
- ext4: improve error recovery code paths in __ext4_remount() (bsc#1213017).
- ext4: move where set the MAY_INLINE_DATA flag is set (bsc#1213011).
- ext4: only update i_reserved_data_blocks on successful block allocation (bsc#1213019).
- ext4: refactor ext4_free_blocks() to pull out ext4_mb_clear_bb() (bsc#1213087).
- ext4: refuse to create ea block when umounted (bsc#1213093).
- ext4: set lockdep subclass for the ea_inode in ext4_xattr_inode_cache_find() (bsc#1213107).
- ext4: turn quotas off if mount failed after enabling quotas (bsc#1213110).
- ext4: update s_journal_inum if it changes after journal replay (bsc#1213094).
- ext4: use ext4_fc_tl_mem in fast-commit replay path (bsc#1213092).
- ext4: zero i_disksize when initializing the bootloader inode (bsc#1213013).
- extcon: Fix kernel doc of property capability fields to avoid warnings (git-fixes).
- extcon: Fix kernel doc of property fields to avoid warnings (git-fixes).
- extcon: usbc-tusb320: Add USB TYPE-C support (git-fixes).
- extcon: usbc-tusb320: Call the Type-C IRQ handler only if a port is registered (git-fixes).
- extcon: usbc-tusb320: Unregister typec port on driver removal (git-fixes).
- extcon: usbc-tusb320: Update state on probe even if no IRQ pending (git-fixes).
- fbdev: omapfb: lcd_mipid: Fix an error handling path in mipid_spi_probe() (git-fixes).
- firmware: stratix10-svc: Fix a potential resource leak in svc_create_memory_pool() (git-fixes).
- hvcs: Fix hvcs port reference counting (bsc#1213134 ltc#202861).
- hvcs: Get reference to tty in remove (bsc#1213134 ltc#202861).
- hvcs: Synchronize hotplug remove with port free (bsc#1213134 ltc#202861).
- hvcs: Use dev_groups to manage hvcs device attributes (bsc#1213134 ltc#202861).
- hvcs: Use driver groups to manage driver attributes (bsc#1213134 ltc#202861).
- hvcs: Use vhangup in hotplug remove (bsc#1213134 ltc#202861).
- hwmon: (gsc-hwmon) fix fan pwm temperature scaling (git-fixes).
- hwrng: imx-rngc - fix the timeout for init and self check (git-fixes).
- hwrng: st - keep clock enabled while hwrng is registered (git-fixes).
- i2c: imx-lpi2c: fix type char overflow issue when calculating the clock cycle (git-fixes).
- i2c: qup: Add missing unwind goto in qup_i2c_probe() (git-fixes).
- iavf: remove mask from iavf_irq_enable_queues() (git-fixes).
- ibmvnic: Do not reset dql stats on NON_FATAL err (bsc#1212603 ltc#202604).
- ice, xsk: Diversify return values from xsk_wakeup call paths (git-fixes).
- ice: Do not double unplug aux on peer initiated reset (git-fixes).
- ice: Do not use WQ_MEM_RECLAIM flag for workqueue (git-fixes).
- ice: Do not use WQ_MEM_RECLAIM flag for workqueue (jsc#PED-376).
- ice: Fix DSCP PFC TLV creation (git-fixes).
- ice: Fix DSCP PFC TLV creation (jsc#PED-376).
- ice: Fix XDP memory leak when NIC is brought up and down (git-fixes).
- ice: Fix ice VF reset during iavf initialization (jsc#PED-376).
- ice: Fix ice_cfg_rdma_fltr() to only update relevant fields (jsc#PED-376).
- ice: Fix ice_xdp_xmit() when XDP TX queue number is not sufficient (git-fixes).
- ice: Fix memory corruption in VF driver (git-fixes).
- ice: Ignore EEXIST when setting promisc mode (git-fixes).
- ice: Prevent set_channel from changing queues while RDMA active (git-fixes).
- ice: Prevent set_channel from changing queues while RDMA active (jsc#PED-376).
- ice: Reset FDIR counter in FDIR init stage (git-fixes).
- ice: Reset FDIR counter in FDIR init stage (jsc#PED-376).
- ice: add profile conflict check for AVF FDIR (git-fixes).
- ice: add profile conflict check for AVF FDIR (jsc#PED-376).
- ice: block LAN in case of VF to VF offload (git-fixes).
- ice: block LAN in case of VF to VF offload (jsc#PED-376).
- ice: check if VF exists before mode check (jsc#PED-376).
- ice: config netdev tc before setting queues number (git-fixes).
- ice: copy last block omitted in ice_get_module_eeprom() (git-fixes).
- ice: copy last block omitted in ice_get_module_eeprom() (jsc#PED-376).
- ice: ethtool: Prohibit improper channel config for DCB (git-fixes).
- ice: ethtool: advertise 1000M speeds properly (git-fixes).
- ice: fix invalid check for empty list in ice_sched_assoc_vsi_to_agg() (git-fixes).
- ice: fix invalid check for empty list in ice_sched_assoc_vsi_to_agg() (jsc#PED-376).
- ice: fix lost multicast packets in promisc mode (jsc#PED-376).
- ice: fix wrong fallback logic for FDIR (git-fixes).
- ice: fix wrong fallback logic for FDIR (jsc#PED-376).
- ice: handle E822 generic device ID in PLDM header (git-fixes).
- ice: switch: fix potential memleak in ice_add_adv_recipe() (git-fixes).
- ice: switch: fix potential memleak in ice_add_adv_recipe() (jsc#PED-376).
- ice: use bitmap_free instead of devm_kfree (git-fixes).
- ice: xsk: disable txq irq before flushing hw (jsc#PED-376).
- ice: xsk: use Rx ring's XDP ring when picking NAPI context (git-fixes).
- ieee802154: hwsim: Fix possible memory leaks (git-fixes).
- ifcvf/vDPA: fix misuse virtio-net device config size for blk dev (jsc#SLE-19253).
- igb: Fix extts capture value format for 82580/i354/i350 (git-fixes).
- igb: fix bit_shift to be in [1..8] range (git-fixes).
- igb: fix nvm.ops.read() error handling (git-fixes).
- igc: Clean the TX buffer and TX descriptor ring (git-fixes).
- igc: Fix possible system crash when loading module (git-fixes).
- iio: accel: fxls8962af: errata bug only applicable for FXLS8962AF (git-fixes).
- iio: accel: fxls8962af: fixup buffer scan element type (git-fixes).
- iio: adc: ad7192: Fix internal/external clock selection (git-fixes).
- iio: adc: ad7192: Fix null ad7192_state pointer access (git-fixes).
- init, x86: Move mem_encrypt_init() into arch_cpu_finalize_init() (bsc#1212448).
- init: Invoke arch_cpu_finalize_init() earlier (bsc#1212448).
- init: Provide arch_cpu_finalize_init() (bsc#1212448).
- init: Remove check_bugs() leftovers (bsc#1212448).
- inotify: Avoid reporting event with invalid wd (bsc#1213025).
- integrity: Fix possible multiple allocation in integrity_inode_get() (git-fixes).
- io_uring: clear TIF_NOTIFY_SIGNAL if set and task_work not available (git-fixes).
- io_uring: do not expose io_fill_cqe_aux() (bsc#1211014).
- io_uring: do not gate task_work run on TIF_NOTIFY_SIGNAL (git-fixes).
- io_uring: fix return value when removing provided buffers (git-fixes).
- io_uring: fix size calculation when registering buf ring (git-fixes).
- irqchip/clps711x: Remove unused clps711x_intc_init() function (git-fixes).
- irqchip/ftintc010: Mark all function static (git-fixes).
- irqchip/jcore-aic: Fix missing allocation of IRQ descriptors (git-fixes).
- jbd2: fix data missing when reusing bh which is ready to be checkpointed (bsc#1213095).
- jdb2: Do not refuse invalidation of already invalidated buffers (bsc#1213014).
- kABI workaround for cpp_acpi extensions for EPP (bsc#1212445).
- kernel-docs: Add buildrequires on python3-base when using python3 The python3 binary is provided by python3-base.
- kernel-docs: Use python3 together with python3-Sphinx (bsc#1212741).
- kprobe: reverse kp-&gt;flags when arm_kprobe failed (git-fixes).
- kprobes: Fix check for probe enabled in kill_kprobe() (git-fixes).
- kprobes: Fix to handle forcibly unoptimized kprobes on freeing_list (git-fixes).
- kprobes: Forbid probing on trampoline and BPF code areas (git-fixes).
- kprobes: Prohibit probes in gate area (git-fixes).
- kprobes: Skip clearing aggrprobe's post_handler in kprobe-on-ftrace case (git-fixes).
- kprobes: do not call disarm_kprobe() for disabled kprobes (git-fixes).
- lpfc: Account for fabric domain ctlr device loss recovery (bsc#1211346, bsc#1211852).
- lpfc: Change firmware upgrade logging to KERN_NOTICE instead of TRACE_EVENT (bsc#1211852).
- lpfc: Clean up SLI-4 CQE status handling (bsc#1211852).
- lpfc: Clear NLP_IN_DEV_LOSS flag if already in rediscovery (bsc#1211852).
- lpfc: Copyright updates for 14.2.0.13 patches (bsc#1211852).
- lpfc: Enhance congestion statistics collection (bsc#1211852).
- lpfc: Fix use-after-free rport memory access in lpfc_register_remote_port (bsc#1211852, bsc#1208410, bsc#1211346).
- lpfc: Revise NPIV ELS unsol rcv cmpl logic to drop ndlp based on nlp_state (bsc#1211852).
- lpfc: Update lpfc version to 14.2.0.13 (bsc#1211852).
- mailbox: ti-msgmgr: Fill non-message tx data fields with 0x0 (git-fixes).
- media: atomisp: gmin_platform: fix out_len in gmin_get_config_dsm_var() (git-fixes).
- media: cec: core: do not set last_initiator if tx in progress (git-fixes).
- media: cec: i2c: ch7322: also select REGMAP (git-fixes).
- media: i2c: Correct format propagation for st-mipid02 (git-fixes).
- media: usb: Check az6007_read() return value (git-fixes).
- media: usb: siano: Fix warning due to null work_func_t function pointer (git-fixes).
- media: venus: helpers: Fix ALIGN() of non power of two (git-fixes).
- media: videodev2.h: Fix struct v4l2_input tuner index comment (git-fixes).
- memory: brcmstb_dpfe: fix testing array offset after use (git-fixes).
- meson saradc: fix clock divider mask length (git-fixes).
- mfd: intel-lpss: Add missing check for platform_get_resource (git-fixes).
- mfd: pm8008: Fix module autoloading (git-fixes).
- mfd: rt5033: Drop rt5033-battery sub-device (git-fixes).
- mfd: stmfx: Fix error path in stmfx_chip_init (git-fixes).
- mfd: stmfx: Nullify stmfx-&gt;vdd in case of error (git-fixes).
- mfd: stmpe: Only disable the regulators if they are enabled (git-fixes).
- misc: fastrpc: Create fastrpc scalar with correct buffer count (git-fixes).
- misc: pci_endpoint_test: Free IRQs before removing the device (git-fixes).
- misc: pci_endpoint_test: Re-init completion for every test (git-fixes).
- mlx5: do not use RT_TOS for IPv6 flowlabel (jsc#SLE-19253).
- mlx5: fix possible ptp queue fifo use-after-free (jsc#PED-1549).
- mlx5: fix skb leak while fifo resync and push (jsc#PED-1549).
- mlxfw: fix null-ptr-deref in mlxfw_mfa2_tlv_next() (git-fixes).
- mm/vmalloc: do not output a spurious warning when huge vmalloc() fails (bsc#1211410).
- mm: Move mm_cachep initialization to mm_init() (bsc#1212448).
- mm: vmalloc: avoid warn_alloc noise caused by fatal signal (bsc#1211410).
- mmc: bcm2835: fix deferred probing (git-fixes).
- mmc: meson-gx: remove redundant mmc_request_done() call from irq context (git-fixes).
- mmc: mmci: Set PROBE_PREFER_ASYNCHRONOUS (git-fixes).
- mmc: mmci: stm32: fix max busy timeout calculation (git-fixes).
- mmc: mtk-sd: fix deferred probing (git-fixes).
- mmc: mvsdio: fix deferred probing (git-fixes).
- mmc: omap: fix deferred probing (git-fixes).
- mmc: omap_hsmmc: fix deferred probing (git-fixes).
- mmc: owl: fix deferred probing (git-fixes).
- mmc: sdhci-acpi: fix deferred probing (git-fixes).
- mmc: sdhci-msm: Disable broken 64-bit DMA on MSM8916 (git-fixes).
- mmc: sdhci-spear: fix deferred probing (git-fixes).
- mmc: sh_mmcif: fix deferred probing (git-fixes).
- mmc: sunxi: fix deferred probing (git-fixes).
- mmc: usdhi60rol0: fix deferred probing (git-fixes).
- mtd: rawnand: meson: fix unaligned DMA buffers handling (git-fixes).
- net/mlx5: Add forgotten cleanup calls into mlx5_init_once() error path (jsc#PED-1549).
- net/mlx5: Add forgotten cleanup calls into mlx5_init_once() error path (jsc#SLE-19253).
- net/mlx5: Allow async trigger completion execution on single CPU systems (jsc#SLE-19253).
- net/mlx5: Allow future addition of IPsec object modifiers (jsc#SLE-19253).
- net/mlx5: Avoid false positive lockdep warning by adding lock_class_key (jsc#SLE-19253).
- net/mlx5: Avoid recovery in probe flows (jsc#PED-1549 bsc#1211794).
- net/mlx5: Avoid recovery in probe flows (jsc#SLE-19253).
- net/mlx5: Bridge, fix ageing of peer FDB entries (jsc#PED-1549).
- net/mlx5: Bridge, fix ageing of peer FDB entries (jsc#SLE-19253).
- net/mlx5: Bridge, verify LAG state when adding bond to bridge (jsc#SLE-19253).
- net/mlx5: Collect command failures data only for known commands (jsc#PED-1549).
- net/mlx5: DR, Check force-loopback RC QP capability independently from RoCE (jsc#PED-1549).
- net/mlx5: DR, Check force-loopback RC QP capability independently from RoCE (jsc#SLE-19253).
- net/mlx5: DR, Fix crc32 calculation to work on big-endian (BE) CPUs (jsc#PED-1549).
- net/mlx5: DR, Fix crc32 calculation to work on big-endian (BE) CPUs (jsc#SLE-19253).
- net/mlx5: DR, Fix missing flow_source when creating multi-destination FW table (jsc#SLE-19253).
- net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device (jsc#PED-1549).
- net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device (jsc#SLE-19253).
- net/mlx5: Devcom, serialize devcom registration (jsc#PED-1549).
- net/mlx5: Disable eswitch before waiting for VF pages (jsc#PED-1549).
- net/mlx5: Do not advertise IPsec netdev support for non-IPsec device (jsc#SLE-19253).
- net/mlx5: Do not use already freed action pointer (jsc#SLE-19253).
- net/mlx5: E-Switch, Fix an Oops in error handling code (jsc#PED-1549).
- net/mlx5: E-Switch, Fix an Oops in error handling code (jsc#SLE-19253).
- net/mlx5: E-Switch, properly handle ingress tagged packets on VST (jsc#PED-1549).
- net/mlx5: E-Switch, properly handle ingress tagged packets on VST (jsc#SLE-19253).
- net/mlx5: E-switch, Create per vport table based on devlink encap mode (jsc#PED-1549).
- net/mlx5: E-switch, Create per vport table based on devlink encap mode (jsc#SLE-19253).
- net/mlx5: E-switch, Do not destroy indirect table in split rule (jsc#PED-1549).
- net/mlx5: E-switch, Do not destroy indirect table in split rule (jsc#SLE-19253).
- net/mlx5: E-switch, Fix missing set of split_count when forward to ovs internal port (jsc#PED-1549).
- net/mlx5: E-switch, Fix missing set of split_count when forward to ovs internal port (jsc#SLE-19253).
- net/mlx5: E-switch, Fix setting of reserved fields on MODIFY_SCHEDULING_ELEMENT (jsc#PED-1549).
- net/mlx5: E-switch, Fix setting of reserved fields on MODIFY_SCHEDULING_ELEMENT (jsc#SLE-19253).
- net/mlx5: E-switch, Fix switchdev mode after devlink reload (jsc#PED-1549).
- net/mlx5: E-switch, Fix wrong usage of source port rewrite in split rules (jsc#PED-1549).
- net/mlx5: ECPF, wait for VF pages only after disabling host PFs (jsc#PED-1549).
- net/mlx5: Enhance debug print in page allocation failure (jsc#PED-1549).
- net/mlx5: Enhance debug print in page allocation failure (jsc#SLE-19253).
- net/mlx5: Expose SF firmware pages counter (jsc#PED-1549).
- net/mlx5: Fix FW tracer timestamp calculation (jsc#SLE-19253).
- net/mlx5: Fix RoCE setting at HCA level (jsc#PED-1549).
- net/mlx5: Fix RoCE setting at HCA level (jsc#SLE-19253).
- net/mlx5: Fix command stats access after free (jsc#PED-1549).
- net/mlx5: Fix crash during sync firmware reset (jsc#SLE-19253).
- net/mlx5: Fix error message when failing to allocate device memory (jsc#PED-1549).
- net/mlx5: Fix error message when failing to allocate device memory (jsc#SLE-19253).
- net/mlx5: Fix handling of entry refcount when command is not issued to FW (jsc#SLE-19253).
- net/mlx5: Fix io_eq_size and event_eq_size params validation (jsc#PED-1549).
- net/mlx5: Fix possible use-after-free in async command interface (jsc#SLE-19253).
- net/mlx5: Fix ptp max frequency adjustment range (jsc#PED-1549).
- net/mlx5: Fix ptp max frequency adjustment range (jsc#SLE-19253).
- net/mlx5: Fix setting ec_function bit in MANAGE_PAGES (jsc#PED-1549).
- net/mlx5: Fix steering rules cleanup (jsc#PED-1549).
- net/mlx5: Fix steering rules cleanup (jsc#SLE-19253).
- net/mlx5: Fix uninitialized variable bug in outlen_write() (jsc#SLE-19253).
- net/mlx5: Geneve, Fix handling of Geneve object id as error code (jsc#PED-1549).
- net/mlx5: Geneve, Fix handling of Geneve object id as error code (jsc#SLE-19253).
- net/mlx5: Handle pairing of E-switch via uplink un/load APIs (jsc#PED-1549).
- net/mlx5: Initialize flow steering during driver probe (jsc#SLE-19253).
- net/mlx5: Lag, fix failure to cancel delayed bond work (jsc#PED-1549).
- net/mlx5: Read embedded cpu after init bit cleared (jsc#PED-1549).
- net/mlx5: Read embedded cpu after init bit cleared (jsc#SLE-19253).
- net/mlx5: Read the TC mapping of all priorities on ETS query (jsc#PED-1549).
- net/mlx5: Read the TC mapping of all priorities on ETS query (jsc#SLE-19253).
- net/mlx5: Rearm the FW tracer after each tracer event (jsc#SLE-19253).
- net/mlx5: SF, Drain health before removing device (jsc#PED-1549).
- net/mlx5: SF, Drain health before removing device (jsc#SLE-19253).
- net/mlx5: SF: Fix probing active SFs during driver probe phase (jsc#SLE-19253).
- net/mlx5: Serialize module cleanup with reload and remove (jsc#PED-1549).
- net/mlx5: Serialize module cleanup with reload and remove (jsc#SLE-19253).
- net/mlx5: Set BREAK_FW_WAIT flag first when removing driver (jsc#PED-1549).
- net/mlx5: Store page counters in a single array (jsc#PED-1549).
- net/mlx5: Wait for firmware to enable CRS before pci_restore_state (jsc#SLE-19253).
- net/mlx5: add IFC bits for bypassing port select flow table (git-fixes)
- net/mlx5: check attr pointer validity before dereferencing it (jsc#PED-1549).
- net/mlx5: check attr pointer validity before dereferencing it (jsc#SLE-19253).
- net/mlx5: correct ECE offset in query qp output (jsc#SLE-19253).
- net/mlx5: fix missing mutex_unlock in mlx5_fw_fatal_reporter_err_work() (jsc#SLE-19253).
- net/mlx5: fs, fail conflicting actions (jsc#SLE-19253).
- net/mlx5: fw_tracer, Clear load bit when freeing string DBs buffers (jsc#PED-1549).
- net/mlx5: fw_tracer, Clear load bit when freeing string DBs buffers (jsc#SLE-19253).
- net/mlx5: fw_tracer, Fix event handling (jsc#PED-1549).
- net/mlx5: fw_tracer, Fix event handling (jsc#SLE-19253).
- net/mlx5: fw_tracer, Zero consumer index when reloading the tracer (jsc#PED-1549).
- net/mlx5: fw_tracer, Zero consumer index when reloading the tracer (jsc#SLE-19253).
- net/mlx5e: Always clear dest encap in neigh-update-del (jsc#PED-1549).
- net/mlx5e: Always clear dest encap in neigh-update-del (jsc#SLE-19253).
- net/mlx5e: Avoid false lock dependency warning on tc_ht even more (jsc#PED-1549).
- net/mlx5e: Avoid false lock dependency warning on tc_ht even more (jsc#SLE-19253).
- net/mlx5e: Block entering switchdev mode with ns inconsistency (jsc#PED-1549).
- net/mlx5e: Block entering switchdev mode with ns inconsistency (jsc#SLE-19253).
- net/mlx5e: CT: Fix ct debugfs folder name (jsc#PED-1549).
- net/mlx5e: Do not attach netdev profile while handling internal error (jsc#PED-1549).
- net/mlx5e: Do not attach netdev profile while handling internal error (jsc#SLE-19253).
- net/mlx5e: Do not cache tunnel offloads capability (jsc#PED-1549).
- net/mlx5e: Do not clone flow post action attributes second time (jsc#PED-1549).
- net/mlx5e: Do not increment ESN when updating IPsec ESN state (jsc#SLE-19253).
- net/mlx5e: Do not support encap rules with gbp option (jsc#PED-1549).
- net/mlx5e: Do not support encap rules with gbp option (jsc#SLE-19253).
- net/mlx5e: E-Switch, Fix comparing termination table instance (jsc#SLE-19253).
- net/mlx5e: Extend SKB room check to include PTP-SQ (jsc#SLE-19253).
- net/mlx5e: Fix MPLSoUDP encap to use MPLS action information (jsc#SLE-19253).
- net/mlx5e: Fix RX reporter for XSK RQs (jsc#PED-1549).
- net/mlx5e: Fix SQ wake logic in ptp napi_poll context (jsc#PED-1549).
- net/mlx5e: Fix SQ wake logic in ptp napi_poll context (jsc#SLE-19253).
- net/mlx5e: Fix capability check for updating vnic env counters (jsc#SLE-19253).
- net/mlx5e: Fix cleanup null-ptr deref on encap lock (jsc#PED-1549).
- net/mlx5e: Fix crash unsetting rx-vlan-filter in switchdev mode (jsc#PED-1549).
- net/mlx5e: Fix deadlock in tc route query code (jsc#PED-1549).
- net/mlx5e: Fix error handling in mlx5e_refresh_tirs (jsc#PED-1549).
- net/mlx5e: Fix error handling in mlx5e_refresh_tirs (jsc#SLE-19253).
- net/mlx5e: Fix hw mtu initializing at XDP SQ allocation (jsc#PED-1549).
- net/mlx5e: Fix hw mtu initializing at XDP SQ allocation (jsc#SLE-19253).
- net/mlx5e: Fix macsec ASO context alignment (jsc#PED-1549).
- net/mlx5e: Fix macsec possible null dereference when updating MAC security entity (SecY) (jsc#PED-1549).
- net/mlx5e: Fix macsec ssci attribute handling in offload path (jsc#PED-1549).
- net/mlx5e: Fix the value of MLX5E_MAX_RQ_NUM_MTTS (jsc#SLE-19253).
- net/mlx5e: Fix use-after-free when reverting termination table (jsc#SLE-19253).
- net/mlx5e: Fix wrong application of the LRO state (jsc#SLE-19253).
- net/mlx5e: Fix wrong tc flag used when set hw-tc-offload off (jsc#SLE-19253).
- net/mlx5e: IPoIB, Block PKEY interfaces with less rx queues than parent (jsc#PED-1549).
- net/mlx5e: IPoIB, Block queue count configuration when sub interfaces are present (jsc#PED-1549).
- net/mlx5e: IPoIB, Do not allow CQE compression to be turned on by default (jsc#PED-1549).
- net/mlx5e: IPoIB, Do not allow CQE compression to be turned on by default (jsc#SLE-19253).
- net/mlx5e: IPoIB, Fix child PKEY interface stats on rx path (jsc#PED-1549).
- net/mlx5e: IPoIB, Show unknown speed instead of error (jsc#PED-1549).
- net/mlx5e: IPoIB, Show unknown speed instead of error (jsc#SLE-19253).
- net/mlx5e: Initialize link speed to zero (jsc#PED-1549).
- net/mlx5e: Modify slow path rules to go to slow fdb (jsc#SLE-19253).
- net/mlx5e: Nullify table pointer when failing to create (jsc#PED-1549).
- net/mlx5e: Overcome slow response for first macsec ASO WQE (jsc#PED-1549).
- net/mlx5e: QoS, Fix wrongfully setting parent_element_id on MODIFY_SCHEDULING_ELEMENT (jsc#PED-1549).
- net/mlx5e: QoS, Fix wrongfully setting parent_element_id on MODIFY_SCHEDULING_ELEMENT (jsc#SLE-19253).
- net/mlx5e: Remove redundant xsk pointer check in mlx5e_mpwrq_validate_xsk (jsc#PED-1549).
- net/mlx5e: Set decap action based on attr for sample (jsc#PED-1549).
- net/mlx5e: Set geneve_tlv_option_0_exist when matching on geneve option (jsc#PED-1549).
- net/mlx5e: Set uplink rep as NETNS_LOCAL (jsc#PED-1549).
- net/mlx5e: Set uplink rep as NETNS_LOCAL (jsc#SLE-19253).
- net/mlx5e: TC, Fix ct_clear overwriting ct action metadata (jsc#SLE-19253).
- net/mlx5e: TC, Keep mod hdr actions after mod hdr alloc (jsc#PED-1549).
- net/mlx5e: Update rx ring hw mtu upon each rx-fcs flag change (jsc#PED-1549).
- net/mlx5e: Update rx ring hw mtu upon each rx-fcs flag change (jsc#SLE-19253).
- net/mlx5e: Use correct encap attribute during invalidation (jsc#PED-1549).
- net/mlx5e: Verify dev is present for fix features ndo (jsc#PED-1549).
- net/mlx5e: Verify flow_source cap before using it (jsc#PED-1549).
- net/mlx5e: Verify flow_source cap before using it (jsc#SLE-19253).
- net/mlx5e: do as little as possible in napi poll when budget is 0 (jsc#PED-1549).
- net/mlx5e: do as little as possible in napi poll when budget is 0 (jsc#SLE-19253).
- net/mlx5e: kTLS, Fix build time constant test in RX (jsc#SLE-19253).
- net/mlx5e: kTLS, Fix build time constant test in TX (jsc#SLE-19253).
- net/net_failover: fix txq exceeding warning (git-fixes).
- net/sched: fix initialization order when updating chain 0 head (git-fixes).
- net/sched: flower: fix possible OOB write in fl_set_geneve_opt() (git-fixes).
- net/sched: sch_netem: Fix arithmetic in netem_dump() for 32-bit platforms (git-fixes).
- net: ena: Account for the number of processed bytes in XDP (git-fixes).
- net: ena: Do not register memory info on XDP exchange (git-fixes).
- net: ena: Fix rx_copybreak value update (git-fixes).
- net: ena: Fix toeplitz initial hash value (git-fixes).
- net: ena: Set default value for RX interrupt moderation (git-fixes).
- net: ena: Update NUMA TPH hint register upon NUMA node update (git-fixes).
- net: ena: Use bitmask to indicate packet redirection (git-fixes).
- net: hns3: add interrupts re-initialization while doing VF FLR (git-fixes).
- net: hns3: fix output information incomplete for dumping tx queue info with debugfs (git-fixes).
- net: hns3: fix reset delay time to avoid configuration timeout (git-fixes).
- net: hns3: fix sending pfc frames after reset issue (git-fixes).
- net: hns3: fix tm port shapping of fibre port is incorrect after driver initialization (git-fixes).
- net: mlx5: eliminate anonymous module_init &amp; module_exit (jsc#PED-1549).
- net: mlx5: eliminate anonymous module_init &amp; module_exit (jsc#SLE-19253).
- net: sched: fix possible refcount leak in tc_chain_tmplt_add() (git-fixes).
- net: usb: qmi_wwan: add support for Compal RXM-G1 (git-fixes).
- nfcsim.c: Fix error checking for debugfs_create_dir (git-fixes).
- nfp: only report pause frame configuration for physical device (git-fixes).
- nilfs2: fix buffer corruption due to concurrent device reads (git-fixes).
- nilfs2: fix incomplete buffer cleanup in nilfs_btnode_abort_change_key() (git-fixes).
- nilfs2: fix possible out-of-bounds segment allocation in resize ioctl (git-fixes).
- nouveau: fix client work fence deletion race (git-fixes).
- ntb: idt: Fix error handling in idt_pci_driver_init() (git-fixes).
- ntb: intel: Fix error handling in intel_ntb_pci_driver_init() (git-fixes).
- nvme-core: fix dev_pm_qos memleak (git-fixes).
- nvme-core: fix memory leak in dhchap_ctrl_secret (git-fixes).
- nvme-core: fix memory leak in dhchap_secret_store (git-fixes).
- nvme-multipath: support io stats on the mpath device (bsc#1210565).
- nvme-pci: add quirk for missing secondary temperature thresholds (git-fixes).
- nvme: double KA polling frequency to avoid KATO with TBKAS on (git-fixes).
- nvme: introduce nvme_start_request (bsc#1210565).
- ocfs2: fix defrag path triggering jbd2 ASSERT (git-fixes).
- ocfs2: fix freeing uninitialized resource on ocfs2_dlm_shutdown (git-fixes).
- ocfs2: fix non-auto defrag path not working issue (git-fixes).
- octeontx2-pf: Avoid use of GFP_KERNEL in atomic context (git-fixes).
- octeontx2-pf: Fix resource leakage in VF driver unbind (git-fixes).
- octeontx2-pf: Fix the use of GFP_KERNEL in atomic context on rt (git-fixes).
- octeontx2-pf: Recalculate UDP checksum for ptp 1-step sync packet (git-fixes).
- opp: Fix use-after-free in lazy_opp_tables after probe deferral (git-fixes).
- perf/x86/intel/cstate: Add Emerald Rapids (PED-4396).
- phy: Revert 'phy: Remove SOC_EXYNOS4212 dep. from PHY_EXYNOS4X12_USB' (git-fixes).
- phy: tegra: xusb: Clear the driver reference in usb-phy dev (git-fixes).
- phy: tegra: xusb: check return value of devm_kzalloc() (git-fixes).
- pinctrl: at91-pio4: check return value of devm_kasprintf() (git-fixes).
- pinctrl: cherryview: Return correct value if pin in push-pull mode (git-fixes).
- pinctrl: microchip-sgpio: check return value of devm_kasprintf() (git-fixes).
- platform/x86: asus-wmi: Ignore WMI events with codes 0x7B, 0xC0 (git-fixes).
- platform/x86: think-lmi: Correct NVME password handling (git-fixes).
- platform/x86: think-lmi: Correct System password interface (git-fixes).
- platform/x86: think-lmi: mutex protection around multiple WMI calls (git-fixes).
- platform/x86: thinkpad_acpi: Fix lkp-tests warnings for platform profiles (git-fixes).
- power: supply: Fix logic checking if system is running from battery (git-fixes).
- power: supply: Ratelimit no data debug output (git-fixes).
- power: supply: ab8500: Fix external_power_changed race (git-fixes).
- power: supply: bq27xxx: Use mod_delayed_work() instead of cancel() + schedule() (git-fixes).
- power: supply: sc27xx: Fix external_power_changed race (git-fixes).
- powerpc/64s/radix: Fix exit lazy tlb mm switch with irqs enabled (bsc#1194869).
- powerpc/iommu: Limit number of TCEs to 512 for H_STUFF_TCE hcall (bsc#1194869 bsc#1212701).
- powerpc/purgatory: remove PGO flags (bsc#1194869).
- powerpc/set_memory: Avoid spinlock recursion in change_page_attr() (bsc#1194869).
- pstore/ram: Add check for kstrdup (git-fixes).
- pwm: ab8500: Fix error code in probe() (git-fixes).
- pwm: imx-tpm: force 'real_period' to be zero in suspend (git-fixes).
- pwm: sysfs: Do not apply state to already disabled PWMs (git-fixes).
- qed/qede: Fix scheduling while atomic (git-fixes).
- radeon: avoid double free in ci_dpm_init() (git-fixes).
- rcu: Fix missing TICK_DEP_MASK_RCU_EXP dependency check (git-fixes).
- regmap: spi-avmm: Fix regmap_bus max_raw_write (git-fixes).
- regulator: Fix error checking for debugfs_create_dir (git-fixes).
- regulator: core: Fix more error checking for debugfs_create_dir() (git-fixes).
- regulator: core: Streamline debugfs operations (git-fixes).
- regulator: helper: Document ramp_delay parameter of regulator_set_ramp_delay_regmap() (git-fixes).
- regulator: pca9450: Fix LDO3OUT and LDO4OUT MASK (git-fixes).
- rpm/check-for-config-changes: ignore also PAHOLE_HAS_* We now also have options like CONFIG_PAHOLE_HAS_LANG_EXCLUDE.
- rtc: efi: Add wakeup support (bsc#1213116).
- rtc: efi: Enable SET/GET WAKEUP services as optional (bsc#1213116).
- rtc: efi: switch to devm_rtc_allocate_device (bsc#1213116).
- rtc: st-lpc: Release some resources in st_rtc_probe() in case of error (git-fixes).
- s390/ap: fix memory leak in ap_init_qci_info() (git-fixes).
- s390/dasd: Use correct lock while counting channel queue length (git-fixes bsc#1212592).
- s390/gmap: voluntarily schedule during key setting (git-fixes bsc#1212892).
- s390/pkey: zeroize key blobs (git-fixes bsc#1212619).
- s390/vfio-ap: fix an error handling path in vfio_ap_mdev_probe_queue() (git-fixes).
- sched/debug: fix dentry leak in update_sched_domain_debugfs (git-fixes)
- sched: Fix DEBUG &amp;&amp; !SCHEDSTATS warn (git-fixes)
- scsi: core: Decrease scsi_device's iorequest_cnt if dispatch failed (git-fixes).
- scsi: stex: Fix gcc 13 warnings (git-fixes).
- selftests/ptp: Fix timestamp printf format for PTP_SYS_OFFSET (git-fixes).
- selftests: mptcp: depend on SYN_COOKIES (git-fixes).
- selftests: mptcp: sockopt: return error if wrong mark (git-fixes).
- serial: 8250: lock port for UART_IER access in omap8250_irq() (git-fixes).
- serial: 8250: lock port for stop_rx() in omap8250_irq() (git-fixes).
- serial: 8250: omap: Fix freeing of resources on failed register (git-fixes).
- serial: 8250_omap: Use force_suspend and resume for system suspend (git-fixes).
- serial: atmel: do not enable IRQs prematurely (git-fixes).
- serial: lantiq: add missing interrupt ack (git-fixes).
- signal/s390: Use force_sigsegv in default_trap_handler (git-fixes bsc#1212861).
- soc/fsl/qe: fix usb.c build errors (git-fixes).
- soc: samsung: exynos-pmu: Re-introduce Exynos4212 support (git-fixes).
- soundwire: dmi-quirks: add new mapping for HP Spectre x360 (git-fixes).
- soundwire: qcom: fix storing port config out-of-bounds (git-fixes).
- spi: bcm-qspi: return error if neither hif_mspi nor mspi is available (git-fixes).
- spi: dw: Round of n_bytes to power of 2 (git-fixes).
- spi: fsl-dspi: avoid SCK glitches with continuous transfers (git-fixes).
- spi: lpspi: disable lpspi module irq in DMA mode (git-fixes).
- spi: spi-geni-qcom: Correct CS_TOGGLE bit in SPI_TRANS_CFG (git-fixes).
- spi: tegra210-quad: Fix combined sequence (bsc#1212584)
- spi: tegra210-quad: Fix iterator outside loop (git-fixes).
- spi: tegra210-quad: Multi-cs support (bsc#1212584)
- supported.conf: Move bt878 and bttv modules to kernel-*-extra (jsc#PED-3931)
- task_work: Decouple TIF_NOTIFY_SIGNAL and task_work (git-fixes).
- task_work: Introduce task_work_pending (git-fixes).
- test_firmware: Use kstrtobool() instead of strtobool() (git-fixes).
- test_firmware: prevent race conditions by a correct implementation of locking (git-fixes).
- test_firmware: return ENOMEM instead of ENOSPC on failed memory allocation (git-fixes).
- thermal/drivers/sun8i: Fix some error handling paths in sun8i_ths_probe() (git-fixes).
- thunderbolt: dma_test: Use correct value for absent rings when creating paths (git-fixes).
- tls: Skip tls_append_frag on zero copy size (git-fixes).
- tools: bpftool: Remove invalid \' json escape (git-fixes).
- tracing/histograms: Allow variables to have some modifiers (git-fixes).
- tracing/probe: trace_probe_primary_from_call(): checked list_first_entry (git-fixes).
- tracing/timer: Add missing hrtimer modes to decode_hrtimer_mode() (git-fixes).
- tracing: Have event format check not flag %p* on __get_dynamic_array() (git-fixes, bsc#1212350).
- tracing: Introduce helpers to safely handle dynamic-sized sockaddrs (git-fixes).
- tracing: Update print fmt check to handle new __get_sockaddr() macro (git-fixes, bsc#1212350).
- tty: serial: imx: fix rs485 rx after tx (git-fixes).
- tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() in case of error (git-fixes).
- tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() when iterating clk (git-fixes).
- ubi: Fix failure attaching when vid_hdr offset equals to (sub)page size (bsc#1210584).
- ubi: ensure that VID header offset + VID header size &amp;lt;= alloc, size (bsc#1210584).
- udf: Avoid double brelse() in udf_rename() (bsc#1213032).
- udf: Define EFSCORRUPTED error code (bsc#1213038).
- udf: Detect system inodes linked into directory hierarchy (bsc#1213114).
- udf: Discard preallocation before extending file with a hole (bsc#1213036).
- udf: Do not bother looking for prealloc extents if i_lenExtents matches i_size (bsc#1213035).
- udf: Do not bother merging very long extents (bsc#1213040).
- udf: Do not update file length for failed writes to inline files (bsc#1213041).
- udf: Fix error handling in udf_new_inode() (bsc#1213112).
- udf: Fix extending file within last block (bsc#1213037).
- udf: Fix preallocation discarding at indirect extent boundary (bsc#1213034).
- udf: Preserve link count of system files (bsc#1213113).
- udf: Truncate added extents on failed expansion (bsc#1213039).
- usrmerge: Adjust module path in the kernel sources (bsc#1212835).
- vDPA: check VIRTIO_NET_F_RSS for max_virtqueue_paris's presence (jsc#PED-1549).
- vDPA: check virtio device features to detect MQ (jsc#PED-1549).
- vDPA: fix 'cast to restricted le16' warnings in vdpa.c (jsc#PED-1549).
- vdpa/ifcvf: fix the calculation of queuepair (jsc#PED-1549).
- vdpa/mlx5: Directly assign memory key (jsc#PED-1549).
- vdpa/mlx5: Directly assign memory key (jsc#SLE-19253).
- vdpa/mlx5: Do not clear mr struct on destroy MR (jsc#PED-1549).
- vdpa/mlx5: Do not clear mr struct on destroy MR (jsc#SLE-19253).
- vdpa/mlx5: Fix rule forwarding VLAN to TIR (jsc#PED-1549).
- vdpa/mlx5: Fix wrong configuration of virtio_version_1_0 (jsc#SLE-19253).
- vdpa/mlx5: Fix wrong mac address deletion (jsc#PED-1549).
- vdpa/mlx5: Initialize CVQ iotlb spinlock (jsc#PED-1549).
- vdpa/mlx5: should not activate virtq object when suspended (jsc#PED-1549).
- vdpa: Fix error logic in vdpa_nl_cmd_dev_get_doit (jsc#PED-1549).
- vdpa: Fix error logic in vdpa_nl_cmd_dev_get_doit (jsc#SLE-19253).
- vdpa: Use BIT_ULL for bit operations (jsc#PED-1549).
- vdpa: conditionally fill max max queue pair for stats (jsc#PED-1549).
- vduse: Fix NULL pointer dereference on sysfs access (jsc#PED-1549).
- vduse: Fix returning wrong type in vduse_domain_alloc_iova() (jsc#PED-1549).
- vduse: avoid empty string for dev name (jsc#PED-1549).
- vduse: check that offset is within bounds in get_config() (jsc#PED-1549).
- vduse: fix memory corruption in vduse_dev_ioctl() (jsc#PED-1549).
- vduse: prevent uninitialized memory accesses (jsc#PED-1549).
- vhost-vdpa: fix an iotlb memory leak (jsc#PED-1549).
- vhost-vdpa: free iommu domain after last use during cleanup (jsc#PED-1549).
- vhost_vdpa: fix the crash in unmap a large memory (jsc#PED-1549).
- vhost_vdpa: fix unmap process in no-batch mode (jsc#PED-1549).
- vhost_vdpa: support PACKED when setting-getting vring_base (jsc#PED-1549).
- vhost_vdpa: support PACKED when setting-getting vring_base (jsc#SLE-19253).
- w1: fix loop in w1_fini() (git-fixes).
- w1: w1_therm: fix locking behavior in convert_t (git-fixes).
- wifi: ath9k: Fix possible stall on ath9k_txq_list_has_key() (git-fixes).
- wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx (git-fixes).
- wifi: ath9k: convert msecs to jiffies where needed (git-fixes).
- wifi: ath9k: do not allow to overwrite ENDPOINT0 attributes (git-fixes).
- wifi: ath9k: fix AR9003 mac hardware hang check register offset calculation (git-fixes).
- wifi: atmel: Fix an error handling path in atmel_probe() (git-fixes).
- wifi: cfg80211: rewrite merging of inherited elements (git-fixes).
- wifi: iwlwifi: mvm: indicate HW decrypt for beacon protection (git-fixes).
- wifi: iwlwifi: pcie: fix NULL pointer dereference in iwl_pcie_irq_rx_msix_handler() (git-fixes).
- wifi: iwlwifi: pull from TXQs with softirqs disabled (git-fixes).
- wifi: mwifiex: Fix the size of a memory allocation in mwifiex_ret_802_11_scan() (git-fixes).
- wifi: orinoco: Fix an error handling path in orinoco_cs_probe() (git-fixes).
- wifi: orinoco: Fix an error handling path in spectrum_cs_probe() (git-fixes).
- wifi: rsi: Do not configure WoWlan in shutdown hook if not enabled (git-fixes).
- wifi: rsi: Do not set MMC_PM_KEEP_POWER in shutdown (git-fixes).
- wifi: wilc1000: fix for absent RSN capabilities WFA testcase (git-fixes).
- writeback: fix call of incorrect macro (bsc#1213024).
- writeback: fix dereferencing NULL mapping-&gt;host on writeback_page_template (git-fixes).
- x86/build: Avoid relocation information in final vmlinux (bsc#1187829).
- x86/cpu: Switch to arch_cpu_finalize_init() (bsc#1212448).
- x86/fpu: Mark init functions __init (bsc#1212448).
- x86/fpu: Move FPU initialization into arch_cpu_finalize_init() (bsc#1212448).
- x86/fpu: Remove cpuinfo argument from init functions (bsc#1212448).
- x86/init: Initialize signal frame size late (bsc#1212448).
- x86/kprobes: Fix __recover_optprobed_insn check optimizing logic (git-fixes).
- x86/kprobes: Fix arch_check_optimized_kprobe check within optimized_kprobe range (git-fixes).
- x86/mem_encrypt: Unbreak the AMD_MEM_ENCRYPT=n build (git-fixes).
- x86/microcode/amd: Remove load_microcode_amd()'s bsp parameter (git-fixes).
- x86/microcode: Print previous version of microcode after reload (git-fixes).
- x86/mm: Fix RESERVE_BRK() for older binutils (git-fixes).
- x86/mm: Fix use of uninitialized buffer in sme_enable() (git-fixes).
- x86/mm: Initialize text poking earlier (bsc#1212448).
- x86/mm: Use mm_alloc() in poking_init() (bsc#1212448).
- x86/mm: fix poking_init() for Xen PV guests (git-fixes).
- x86/msr: Add AMD CPPC MSR definitions (bsc#1212445).
- x86/sgx: Fix race between reclaimer and page fault handler (git-fixes).
- x86/sgx: Mark PCMD page as dirty when modifying contents (git-fixes).
- x86/xen: fix secondary processor fpu initialization (bsc#1212869).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-19"/>
	<updated date="2023-07-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187829">SUSE bug 1187829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189998">SUSE bug 1189998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205758">SUSE bug 1205758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208410">SUSE bug 1208410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209039">SUSE bug 1209039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209780">SUSE bug 1209780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210335">SUSE bug 1210335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210565">SUSE bug 1210565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210584">SUSE bug 1210584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210853">SUSE bug 1210853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211014">SUSE bug 1211014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211346">SUSE bug 1211346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211400">SUSE bug 1211400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211410">SUSE bug 1211410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211794">SUSE bug 1211794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211852">SUSE bug 1211852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212051">SUSE bug 1212051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212265">SUSE bug 1212265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212350">SUSE bug 1212350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212405">SUSE bug 1212405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212445">SUSE bug 1212445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212448">SUSE bug 1212448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212456">SUSE bug 1212456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212494">SUSE bug 1212494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212495">SUSE bug 1212495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212504">SUSE bug 1212504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212513">SUSE bug 1212513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212540">SUSE bug 1212540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212556">SUSE bug 1212556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212561">SUSE bug 1212561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212563">SUSE bug 1212563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212564">SUSE bug 1212564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212584">SUSE bug 1212584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212592">SUSE bug 1212592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212603">SUSE bug 1212603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212605">SUSE bug 1212605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212606">SUSE bug 1212606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212619">SUSE bug 1212619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212685">SUSE bug 1212685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212701">SUSE bug 1212701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212741">SUSE bug 1212741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212835">SUSE bug 1212835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212838">SUSE bug 1212838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212842">SUSE bug 1212842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212848">SUSE bug 1212848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212861">SUSE bug 1212861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212869">SUSE bug 1212869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212892">SUSE bug 1212892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212961">SUSE bug 1212961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213010">SUSE bug 1213010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213011">SUSE bug 1213011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213012">SUSE bug 1213012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213013">SUSE bug 1213013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213014">SUSE bug 1213014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213015">SUSE bug 1213015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213016">SUSE bug 1213016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213017">SUSE bug 1213017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213018">SUSE bug 1213018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213019">SUSE bug 1213019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213020">SUSE bug 1213020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213021">SUSE bug 1213021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213024">SUSE bug 1213024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213025">SUSE bug 1213025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213032">SUSE bug 1213032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213034">SUSE bug 1213034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213035">SUSE bug 1213035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213036">SUSE bug 1213036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213037">SUSE bug 1213037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213038">SUSE bug 1213038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213039">SUSE bug 1213039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213040">SUSE bug 1213040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213041">SUSE bug 1213041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213087">SUSE bug 1213087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213088">SUSE bug 1213088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213089">SUSE bug 1213089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213090">SUSE bug 1213090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213092">SUSE bug 1213092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213093">SUSE bug 1213093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213094">SUSE bug 1213094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213095">SUSE bug 1213095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213096">SUSE bug 1213096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213098">SUSE bug 1213098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213099">SUSE bug 1213099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213100">SUSE bug 1213100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213102">SUSE bug 1213102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213103">SUSE bug 1213103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213104">SUSE bug 1213104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213105">SUSE bug 1213105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213106">SUSE bug 1213106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213107">SUSE bug 1213107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213108">SUSE bug 1213108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213109">SUSE bug 1213109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213110">SUSE bug 1213110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213111">SUSE bug 1213111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213112">SUSE bug 1213112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213113">SUSE bug 1213113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213114">SUSE bug 1213114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213116">SUSE bug 1213116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213134">SUSE bug 1213134</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-1249/">CVE-2023-1249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1249">CVE-2023-1249 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1829/">CVE-2023-1829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1829">CVE-2023-1829 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-2430/">CVE-2023-2430 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2430">CVE-2023-2430 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28866/">CVE-2023-28866 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28866">CVE-2023-28866 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3090/">CVE-2023-3090 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3090">CVE-2023-3090 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3111/">CVE-2023-3111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3111">CVE-2023-3111 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3212/">CVE-2023-3212 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3212">CVE-2023-3212 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3220/">CVE-2023-3220 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3220">CVE-2023-3220 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3357/">CVE-2023-3357 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3357">CVE-2023-3357 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3358/">CVE-2023-3358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3358">CVE-2023-3358 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3389/">CVE-2023-3389 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3389">CVE-2023-3389 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35788/">CVE-2023-35788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35788">CVE-2023-35788 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-35823/">CVE-2023-35823 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35823">CVE-2023-35823 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35828/">CVE-2023-35828 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35828">CVE-2023-35828 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35829/">CVE-2023-35829 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35829">CVE-2023-35829 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771768" comment="cluster-md-kmp-azure-5.14.21-150500.33.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771769" comment="dlm-kmp-azure-5.14.21-150500.33.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771770" comment="gfs2-kmp-azure-5.14.21-150500.33.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771771" comment="kernel-azure-5.14.21-150500.33.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771772" comment="kernel-azure-devel-5.14.21-150500.33.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771773" comment="kernel-azure-extra-5.14.21-150500.33.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771774" comment="kernel-azure-livepatch-devel-5.14.21-150500.33.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771775" comment="kernel-azure-optional-5.14.21-150500.33.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771776" comment="kernel-azure-vdso-5.14.21-150500.33.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771777" comment="kernel-devel-azure-5.14.21-150500.33.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771778" comment="kernel-source-azure-5.14.21-150500.33.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771779" comment="kernel-syms-azure-5.14.21-150500.33.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771780" comment="kselftests-kmp-azure-5.14.21-150500.33.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771781" comment="ocfs2-kmp-azure-5.14.21-150500.33.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771782" comment="reiserfs-kmp-azure-5.14.21-150500.33.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4246" version="1" class="patch">
	<metadata>
		<title>Security update for python-azure-core, python-azure-storage-blob (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1199282" ref_url="https://bugzilla.suse.com/1199282" source="BUGZILLA"/>
		<reference ref_id="1202088" ref_url="https://bugzilla.suse.com/1202088" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-30187" ref_url="https://www.suse.com/security/cve/CVE-2022-30187/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034403.html" source="SUSE-SU"/>
		<description>
This update for python-azure-core, python-azure-storage-blob fixes the following issues:


Security fixes:

- CVE-2022-30187: Fixed information disclosure vulnerability (bsc#1202088).    

Recommended fixes:    

- New upstream release version 1.23.1 to SLE 15 (bsc#1199282, jsc#PM-3243, jsc#SLE-24629).
 		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-20"/>
	<updated date="2023-07-20"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1199282">SUSE bug 1199282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202088">SUSE bug 1202088</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30187/">CVE-2022-30187 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30187">CVE-2022-30187 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771307" comment="python3-azure-core-1.23.1-150100.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771308" comment="python3-azure-storage-blob-12.13.1-150100.3.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4247" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212099" ref_url="https://bugzilla.suse.com/1212099" source="BUGZILLA"/>
		<reference ref_id="1212100" ref_url="https://bugzilla.suse.com/1212100" source="BUGZILLA"/>
		<reference ref_id="1212641" ref_url="https://bugzilla.suse.com/1212641" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2183" ref_url="https://www.suse.com/security/cve/CVE-2023-2183/" source="CVE"/>
		<reference ref_id="CVE-2023-2801" ref_url="https://www.suse.com/security/cve/CVE-2023-2801/" source="CVE"/>
		<reference ref_id="CVE-2023-3128" ref_url="https://www.suse.com/security/cve/CVE-2023-3128/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2917-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030437.html" source="SUSE-SU"/>
		<description>
This update fixes the following issues:

grafana:

- Update to version 9.5.5:
  * CVE-2023-3128: Fix authentication bypass using Azure AD OAuth (bsc#1212641, jsc#PED-3694)
  * Bug fixes:
    * Auth: Show invite button if disable login form is set to false.
    * Azure: Fix Kusto auto-completion for Azure datasources.
    * RBAC: Remove legacy AC editor and admin role on new dashboard route.
    * API: Revert allowing editors to access GET /datasources. 
    * Settings: Add ability to override skip_org_role_sync with Env variables.
- Update to version 9.5.3:
  * CVE-2023-2801: Query: Prevent crash while executing concurrent mixed queries (bsc#1212099)
  * CVE-2023-2183: Alerting: Require alert.notifications:write permissions to test receivers and templates (bsc#1212100)
- Update to version 9.5.2:
    Alerting: Scheduler use rule fingerprint instead of version.
    Explore: Update table min height.
    DataLinks: Encoded URL fixed.
    TimeSeries: Fix leading null-fill for missing intervals.
    Dashboard: Revert fixed header shown on mobile devices in the new panel header.
    PostgreSQL: Fix TLS certificate issue by downgrading lib/pq.
    Provisioning: Fix provisioning issues with legacy alerting and data source permissions.
    Alerting: Fix misleading status code in provisioning API.
    Loki: Fix log samples using `instant` queries.
    Panel Header: Implement new Panel Header on Angular Panels.
    Azure Monitor: Fix bug that was not showing resources for certain locations.
    Alerting: Fix panic when reparenting receivers to groups following an attempted rename via Provisioning.
    Cloudwatch Logs: Clarify Cloudwatch Logs Limits.
- Update to 9.5.1
    Loki Variable Query Editor: Fix bug when the query is updated
    Expressions: Fix expression load with legacy UID -100

		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-20"/>
	<updated date="2023-07-20"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1212099">SUSE bug 1212099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212100">SUSE bug 1212100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212641">SUSE bug 1212641</bugzilla>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-2183/">CVE-2023-2183 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2183">CVE-2023-2183 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2801/">CVE-2023-2801 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2801">CVE-2023-2801 at NVD</cve>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-3128/">CVE-2023-3128 at SUSE</cve>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3128">CVE-2023-3128 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009770205" comment="grafana-9.5.5-150200.3.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4248" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1201627" ref_url="https://bugzilla.suse.com/1201627" source="BUGZILLA"/>
		<reference ref_id="1207534" ref_url="https://bugzilla.suse.com/1207534" source="BUGZILLA"/>
		<reference ref_id="1211430" ref_url="https://bugzilla.suse.com/1211430" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4304" ref_url="https://www.suse.com/security/cve/CVE-2022-4304/" source="CVE"/>
		<reference ref_id="CVE-2023-2650" ref_url="https://www.suse.com/security/cve/CVE-2023-2650/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:29171-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030013.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2023-2650: Fixed possible denial of service translating ASN.1 object identifiers (bsc#1211430).
- CVE-2022-4304: Reworked the fix for the Timing-Oracle in RSA decryption.
  The previous fix for this timing side channel turned out to cause a
  severe 2-3x performance regression in the typical use case (bsc#1207534).

- Update further expiring certificates that affect tests (bsc#1201627)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-06-20"/>
	<updated date="2023-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201627">SUSE bug 1201627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207534">SUSE bug 1207534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211430">SUSE bug 1211430</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4304/">CVE-2022-4304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4304">CVE-2022-4304 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2650/">CVE-2023-2650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009768332" comment="libopenssl-1_1-devel-1.1.1l-150500.17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768675" comment="libopenssl-1_1-devel-32bit-1.1.1l-150500.17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768333" comment="libopenssl1_1-1.1.1l-150500.17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768334" comment="libopenssl1_1-32bit-1.1.1l-150500.17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768335" comment="libopenssl1_1-hmac-1.1.1l-150500.17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768336" comment="libopenssl1_1-hmac-32bit-1.1.1l-150500.17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768337" comment="openssl-1_1-1.1.1l-150500.17.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009768676" comment="openssl-1_1-doc-1.1.1l-150500.17.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4249" version="1" class="patch">
	<metadata>
		<title>Security update for redis (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213193" ref_url="https://bugzilla.suse.com/1213193" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24834" ref_url="https://www.suse.com/security/cve/CVE-2022-24834/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015552.html" source="SUSE-SU"/>
		<description>
This update for redis fixes the following issues:

  - CVE-2022-24834: Fixed heap overflow in the cjson and cmsgpack libraries (bsc#1213193).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-20"/>
	<updated date="2023-07-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213193">SUSE bug 1213193</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24834/">CVE-2022-24834 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24834">CVE-2022-24834 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772174" comment="redis-6.2.6-150400.3.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4250" version="1" class="patch">
	<metadata>
		<title>Security update for redis7 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1208790" ref_url="https://bugzilla.suse.com/1208790" source="BUGZILLA"/>
		<reference ref_id="1208793" ref_url="https://bugzilla.suse.com/1208793" source="BUGZILLA"/>
		<reference ref_id="1209528" ref_url="https://bugzilla.suse.com/1209528" source="BUGZILLA"/>
		<reference ref_id="1210548" ref_url="https://bugzilla.suse.com/1210548" source="BUGZILLA"/>
		<reference ref_id="1213193" ref_url="https://bugzilla.suse.com/1213193" source="BUGZILLA"/>
		<reference ref_id="1213249" ref_url="https://bugzilla.suse.com/1213249" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24834" ref_url="https://www.suse.com/security/cve/CVE-2022-24834/" source="CVE"/>
		<reference ref_id="CVE-2022-36021" ref_url="https://www.suse.com/security/cve/CVE-2022-36021/" source="CVE"/>
		<reference ref_id="CVE-2023-25155" ref_url="https://www.suse.com/security/cve/CVE-2023-25155/" source="CVE"/>
		<reference ref_id="CVE-2023-28425" ref_url="https://www.suse.com/security/cve/CVE-2023-28425/" source="CVE"/>
		<reference ref_id="CVE-2023-28856" ref_url="https://www.suse.com/security/cve/CVE-2023-28856/" source="CVE"/>
		<reference ref_id="CVE-2023-36824" ref_url="https://www.suse.com/security/cve/CVE-2023-36824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015551.html" source="SUSE-SU"/>
		<description>
This update for redis7 fixes the following issues:

  - CVE-2022-24834: Fixed heap overflow in the cjson and cmsgpack libraries (bsc#1213193).
  - CVE-2023-28856: Fixed HINCRBYFLOAT invalid key crash (bsc#1210548).
  - CVE-2022-36021: Fixed integer overflow via Specially crafted SRANDMEMBER, ZRANDMEMBER, and HRANDFIELD (bsc#1208790).
  - CVE-2023-25155: Fixed Integer Overflow in RAND commands (bsc#1208793).
  - CVE-2023-28425: Fixed denial-of-service via Specially crafted MSETNX command (bsc#1209528).
  - CVE-2023-36824: Fixed heap overflow in COMMAND GETKEYS and ACL evaluation (bsc#1213249).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-20"/>
	<updated date="2023-07-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208790">SUSE bug 1208790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208793">SUSE bug 1208793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209528">SUSE bug 1209528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210548">SUSE bug 1210548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213193">SUSE bug 1213193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213249">SUSE bug 1213249</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24834/">CVE-2022-24834 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24834">CVE-2022-24834 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36021/">CVE-2022-36021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36021">CVE-2022-36021 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-25155/">CVE-2023-25155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25155">CVE-2023-25155 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28425/">CVE-2023-28425 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28425">CVE-2023-28425 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28856/">CVE-2023-28856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28856">CVE-2023-28856 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-36824/">CVE-2023-36824 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36824">CVE-2023-36824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772191" comment="redis7-7.0.8-150500.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4251" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212375" ref_url="https://bugzilla.suse.com/1212375" source="BUGZILLA"/>
		<reference ref_id="1213170" ref_url="https://bugzilla.suse.com/1213170" source="BUGZILLA"/>
		<reference ref_id="1213171" ref_url="https://bugzilla.suse.com/1213171" source="BUGZILLA"/>
		<reference ref_id="1213172" ref_url="https://bugzilla.suse.com/1213172" source="BUGZILLA"/>
		<reference ref_id="1213173" ref_url="https://bugzilla.suse.com/1213173" source="BUGZILLA"/>
		<reference ref_id="1213174" ref_url="https://bugzilla.suse.com/1213174" source="BUGZILLA"/>
		<reference ref_id="1213384" ref_url="https://bugzilla.suse.com/1213384" source="BUGZILLA"/>
		<reference ref_id="1213386" ref_url="https://bugzilla.suse.com/1213386" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25720" ref_url="https://www.suse.com/security/cve/CVE-2020-25720/" source="CVE"/>
		<reference ref_id="CVE-2022-2127" ref_url="https://www.suse.com/security/cve/CVE-2022-2127/" source="CVE"/>
		<reference ref_id="CVE-2023-3347" ref_url="https://www.suse.com/security/cve/CVE-2023-3347/" source="CVE"/>
		<reference ref_id="CVE-2023-34966" ref_url="https://www.suse.com/security/cve/CVE-2023-34966/" source="CVE"/>
		<reference ref_id="CVE-2023-34967" ref_url="https://www.suse.com/security/cve/CVE-2023-34967/" source="CVE"/>
		<reference ref_id="CVE-2023-34968" ref_url="https://www.suse.com/security/cve/CVE-2023-34968/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018041.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

  samba was updated to version 4.17.9:

  - CVE-2022-2127: Fixed issue where lm_resp_len was not checked properly in winbindd_pam_auth_crap_send (bsc#1213174).
  - CVE-2023-34966: Fixed samba spotlight mdssvc RPC Request Infinite Loop Denial-of-Service Vulnerability (bsc#1213173).
  - CVE-2023-34967: Fixed samba spotlight mdssvc RPC Request Type Confusion Denial-of-Service Vulnerability (bsc#1213172).
  - CVE-2023-34968: Fixed spotlight server-side Share Path Disclosure (bsc#1213171).
  - CVE-2023-3347: Fixed issue where SMB2 packet signing not enforced (bsc#1213170).
  - CVE-2020-25720: Fixed issue where creating child permission allowed full write to all attributes (bsc#1213386).

  Bugfixes:

  - Fixed trust relationship failure (bsc#1213384).
  - Backported --pidl-developer fixes.
  - Fixed smbd_scavenger crash when service smbd is stopped.
  - Fixed issue where vfs_fruit might cause a failing open for delete.
  - Fixed named crashes on DLZ zone update.
  - Fixed issue where winbind recurses into itself via rpcd_lsad.
  - Fixed cli_list looping 100% CPU against pre-lanman2 servers.
  - Fixed smbclient leaks fds with showacls.
  - Fixed aes256 smb3 encryption algorithms not allowed in smb3_sid_parse().
  - Fixed winbindd getting stuck on NT_STATUS_RPC_SEC_PKG_ERROR.
  - Fixed smbget memory leak if failed to download files recursively.
  - Fixed log flood: smbd_calculate_access_mask_fsp: Access denied: message level should be lower.
  - Fixed floating point exception (FPE) via cli_pull_send at source3/libsmb/clireadwrite.c.
  - Fixed test_tstream_more_tcp_user_timeout_spin fails intermittently on Rackspace GitLab runners.
  - Reduce flapping of ridalloc test.
  - Fixed unreliable large_ldap test.
  - Fixed filename parser not checking veto files smb.conf parameter.
  - Fixed mdssvc may crash when initializing.
  - Fixed broken large directory optimization for non-lcomp path elements
  - Fixed streams_depot failing to create streams.
  - Fixed shadow_copy2 and streams_depot issues.
  - Fixed wbinfo -u fails on ad dc with &gt;1000 users.
  - Fixed winbindd idmap child contacting the domain controller without a need.
  - Fixed idmap_autorid may fail to map sids of trusted domains for the first time.
  - Fixed idmap_hash doesn't use ID_TYPE_BOTH for reverse mappings.
  - Fixed net ads search -P doesn't work against servers in other domains.
  - Fixed DS ACEs might be inherited to unrelated object classes.
  - Fixed temporary smbXsrv_tcon_global.tdb can't be parsed.
  - Fixed setting veto files = /.*/ breaking listing directories (bsc#1212375).
  - Fixed dsgetdcname assuming local system uses IPv4.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-21"/>
	<updated date="2023-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212375">SUSE bug 1212375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213170">SUSE bug 1213170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213171">SUSE bug 1213171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213172">SUSE bug 1213172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213173">SUSE bug 1213173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213174">SUSE bug 1213174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213384">SUSE bug 1213384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213386">SUSE bug 1213386</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25720/">CVE-2020-25720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-25720">CVE-2020-25720 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2127/">CVE-2022-2127 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2127">CVE-2022-2127 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-3347/">CVE-2023-3347 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3347">CVE-2023-3347 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34966/">CVE-2023-34966 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34966">CVE-2023-34966 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-34967/">CVE-2023-34967 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34967">CVE-2023-34967 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-34968/">CVE-2023-34968 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34968">CVE-2023-34968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009772867" comment="ctdb-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772868" comment="ctdb-pcp-pmda-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772869" comment="libsamba-policy-devel-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772870" comment="libsamba-policy-python3-devel-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772871" comment="libsamba-policy0-python3-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772872" comment="libsamba-policy0-python3-32bit-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772873" comment="samba-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772874" comment="samba-ceph-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772875" comment="samba-client-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772876" comment="samba-client-32bit-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772877" comment="samba-client-libs-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772878" comment="samba-client-libs-32bit-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772879" comment="samba-devel-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772880" comment="samba-devel-32bit-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772881" comment="samba-doc-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772882" comment="samba-gpupdate-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772883" comment="samba-ldb-ldap-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772884" comment="samba-libs-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772885" comment="samba-libs-32bit-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772886" comment="samba-libs-python3-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772887" comment="samba-libs-python3-32bit-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772888" comment="samba-python3-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772889" comment="samba-test-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772890" comment="samba-tool-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772891" comment="samba-winbind-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772892" comment="samba-winbind-libs-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772893" comment="samba-winbind-libs-32bit-4.17.9+git.367.dae41ffdd1f-150500.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4252" version="1" class="patch">
	<metadata>
		<title>Security update for python-pip (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212015" ref_url="https://bugzilla.suse.com/1212015" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018033.html" source="SUSE-SU"/>
		<description>
This update for python-pip fixes the following issues:

- Removed .exe files from the RPM package, to prevent issues with security scanners (bsc#1212015).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-21"/>
	<updated date="2023-07-21"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1212015">SUSE bug 1212015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769147" comment="python311-pip-22.3.1-150400.17.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4253" version="1" class="patch">
	<metadata>
		<title>Security update for python311 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1203750" ref_url="https://bugzilla.suse.com/1203750" source="BUGZILLA"/>
		<reference ref_id="1208471" ref_url="https://bugzilla.suse.com/1208471" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018040.html" source="SUSE-SU"/>
		<description>
This update for python311 fixes the following issues:

  python was updated to version 3.11.4:

  - CVE-2023-24329: Fixed blocklist bypass via the urllib.parse component when supplying a URL that starts with blank characters (bsc#1208471).
  - CVE-2007-4559: Fixed python tarfile module directory traversal (bsc#1203750).
  - Fixed a security in flaw in uu.decode() that could allow for directory traversal based on the input if no out_file was specified.
  - Do not expose the local on-disk location in directory indexes produced by http.client.SimpleHTTPRequestHandler.


  Bugfixes:

  - trace.__main__ now uses io.open_code() for files to be executed instead of raw open().
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-21"/>
	<updated date="2023-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203750">SUSE bug 1203750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208471">SUSE bug 1208471</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009772520" comment="libpython3_11-1_0-3.11.4-150400.9.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772521" comment="libpython3_11-1_0-32bit-3.11.4-150400.9.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772522" comment="python311-3.11.4-150400.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772523" comment="python311-32bit-3.11.4-150400.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772524" comment="python311-base-3.11.4-150400.9.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772525" comment="python311-base-32bit-3.11.4-150400.9.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772526" comment="python311-curses-3.11.4-150400.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772527" comment="python311-dbm-3.11.4-150400.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772528" comment="python311-devel-3.11.4-150400.9.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772529" comment="python311-doc-3.11.4-150400.9.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772530" comment="python311-doc-devhelp-3.11.4-150400.9.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772531" comment="python311-idle-3.11.4-150400.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772532" comment="python311-testsuite-3.11.4-150400.9.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772533" comment="python311-tk-3.11.4-150400.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772534" comment="python311-tools-3.11.4-150400.9.15.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4254" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1186673" ref_url="https://bugzilla.suse.com/1186673" source="BUGZILLA"/>
		<reference ref_id="1209536" ref_url="https://bugzilla.suse.com/1209536" source="BUGZILLA"/>
		<reference ref_id="1213004" ref_url="https://bugzilla.suse.com/1213004" source="BUGZILLA"/>
		<reference ref_id="1213008" ref_url="https://bugzilla.suse.com/1213008" source="BUGZILLA"/>
		<reference ref_id="1213504" ref_url="https://bugzilla.suse.com/1213504" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38408" ref_url="https://www.suse.com/security/cve/CVE-2023-38408/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015607.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2023-38408: Fixed a condition where specific libaries loaded via
  ssh-agent(1)'s PKCS#11 support could be abused to achieve remote code
  execution via a forwarded agent socket if those libraries were present on the
  victim's system and if the agent was forwarded to an attacker-controlled
  system. [bsc#1213504, CVE-2023-38408]

- Close the right filedescriptor and also close fdh in read_hmac to avoid file
  descriptor leaks. [bsc#1209536]

- Attempts to mitigate instances of secrets lingering in memory after a session
  exits. [bsc#1186673, bsc#1213004, bsc#1213008]
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-24"/>
	<updated date="2023-07-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186673">SUSE bug 1186673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209536">SUSE bug 1209536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213004">SUSE bug 1213004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213008">SUSE bug 1213008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213504">SUSE bug 1213504</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38408/">CVE-2023-38408 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38408">CVE-2023-38408 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009772775" comment="openssh-8.4p1-150300.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772776" comment="openssh-askpass-gnome-8.4p1-150300.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772777" comment="openssh-cavs-8.4p1-150300.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772778" comment="openssh-clients-8.4p1-150300.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772779" comment="openssh-common-8.4p1-150300.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772780" comment="openssh-fips-8.4p1-150300.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772781" comment="openssh-helpers-8.4p1-150300.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772782" comment="openssh-server-8.4p1-150300.3.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4255" version="1" class="patch">
	<metadata>
		<title>Security update for python39 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1203750" ref_url="https://bugzilla.suse.com/1203750" source="BUGZILLA"/>
		<reference ref_id="1208471" ref_url="https://bugzilla.suse.com/1208471" source="BUGZILLA"/>
		<reference ref_id="CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559/" source="CVE"/>
		<reference ref_id="CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015621.html" source="SUSE-SU"/>
		<description>
This update for python39 fixes the following issues:

Update to 3.9.17:

- urllib.parse.urlsplit() now strips leading C0 control and space
  characters following the specification for URLs defined by WHATWG in
  response to CVE-2023-24329 (bsc#1208471).
- Fixed a security in flaw in uu.decode() that could allow for directory
  traversal based on the input if no out_file was specified.
- Do not expose the local on-disk location in directory indexes produced by
  http.client.SimpleHTTPRequestHandler.
- trace.__main__ now uses io.open_code() for files
  to be executed instead of raw open().
- CVE-2007-4559: The extraction methods in tarfile, and shutil.unpack_archive(), have
  a new filter argument that allows limiting tar features than may be
  surprising or dangerous, such as creating files outside the destination
  directory. See Extraction filters for details (fixing bsc#1203750).
- Fixed a deadlock at shutdown when clearing thread states if any
  finalizer tries to acquire the runtime head lock.
- Fixed a crash due to a race while iterating over thread states in
  clearing threading.local.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-25"/>
	<updated date="2023-07-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203750">SUSE bug 1203750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208471">SUSE bug 1208471</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771618" comment="libpython3_9-1_0-3.9.17-150300.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771619" comment="libpython3_9-1_0-32bit-3.9.17-150300.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771620" comment="python39-3.9.17-150300.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771621" comment="python39-32bit-3.9.17-150300.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771622" comment="python39-base-3.9.17-150300.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771623" comment="python39-base-32bit-3.9.17-150300.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771624" comment="python39-curses-3.9.17-150300.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771625" comment="python39-dbm-3.9.17-150300.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771626" comment="python39-devel-3.9.17-150300.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771627" comment="python39-doc-3.9.17-150300.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771628" comment="python39-doc-devhelp-3.9.17-150300.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771629" comment="python39-idle-3.9.17-150300.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771630" comment="python39-testsuite-3.9.17-150300.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771631" comment="python39-tk-3.9.17-150300.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771632" comment="python39-tools-3.9.17-150300.4.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4256" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213230" ref_url="https://bugzilla.suse.com/1213230" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3600" ref_url="https://www.suse.com/security/cve/CVE-2023-3600/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015620.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

  Firefox was updated to version 115.0.2 ESR (bsc#1213230):

  - CVE-2023-3600: Fixed Use-after-free in workers (bmo#1839703).

  Bugfixes:
  - Fixed a startup crash experienced by some Windows users by blocking instances of a malicious injected DLL (bmo#1841751).
  - Fixed a bug with displaying a caret in the text editor on some websites (bmo#1840804).
  - Fixed a bug with broken audio rendering on some websites (bmo#1841982).
  - Fixed a bug with patternTransform translate using the wrong units (bmo#1840746).
  - Fixed a crash affecting Windows 7 users related to the DLL blocklist.
  - Fixed a startup crash for Windows users with Kingsoft Antivirus software installed (bmo#1837242).

  		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-25"/>
	<updated date="2023-07-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213230">SUSE bug 1213230</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3600/">CVE-2023-3600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3600">CVE-2023-3600 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009772538" comment="MozillaFirefox-115.0.2-150200.152.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772539" comment="MozillaFirefox-branding-upstream-115.0.2-150200.152.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772540" comment="MozillaFirefox-devel-115.0.2-150200.152.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772541" comment="MozillaFirefox-translations-common-115.0.2-150200.152.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772542" comment="MozillaFirefox-translations-other-115.0.2-150200.152.96.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4257" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213487" ref_url="https://bugzilla.suse.com/1213487" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3446" ref_url="https://www.suse.com/security/cve/CVE-2023-3446/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015623.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2023-3446: Fixed DH_check() excessive time with over sized modulus (bsc#1213487).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-25"/>
	<updated date="2023-07-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213487">SUSE bug 1213487</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3446/">CVE-2023-3446 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3446">CVE-2023-3446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009772572" comment="libopenssl-1_1-devel-1.1.1l-150500.17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772573" comment="libopenssl-1_1-devel-32bit-1.1.1l-150500.17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772574" comment="libopenssl1_1-1.1.1l-150500.17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772575" comment="libopenssl1_1-32bit-1.1.1l-150500.17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772576" comment="libopenssl1_1-hmac-1.1.1l-150500.17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772577" comment="libopenssl1_1-hmac-32bit-1.1.1l-150500.17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772578" comment="openssl-1_1-1.1.1l-150500.17.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772579" comment="openssl-1_1-doc-1.1.1l-150500.17.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4258" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtsvg (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1196654" ref_url="https://bugzilla.suse.com/1196654" source="BUGZILLA"/>
		<reference ref_id="1211298" ref_url="https://bugzilla.suse.com/1211298" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45930" ref_url="https://www.suse.com/security/cve/CVE-2021-45930/" source="CVE"/>
		<reference ref_id="CVE-2023-32573" ref_url="https://www.suse.com/security/cve/CVE-2023-32573/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015627.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtsvg fixes the following issues:

- CVE-2021-45930: Fixed an out-of-bounds write that may have lead to a denial-of-service (bsc#1196654).
- CVE-2023-32573: Fixed missing initialization of QtSvg QSvgFont m_unitsPerEm variable (bsc#1211298).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-25"/>
	<updated date="2023-07-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196654">SUSE bug 1196654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211298">SUSE bug 1211298</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45930/">CVE-2021-45930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45930">CVE-2021-45930 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32573/">CVE-2023-32573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32573">CVE-2023-32573 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009772972" comment="libQt5Svg5-5.15.8+kde8-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772973" comment="libQt5Svg5-32bit-5.15.8+kde8-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772974" comment="libqt5-qtsvg-devel-5.15.8+kde8-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772975" comment="libqt5-qtsvg-devel-32bit-5.15.8+kde8-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772976" comment="libqt5-qtsvg-examples-5.15.8+kde8-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772977" comment="libqt5-qtsvg-private-headers-devel-5.15.8+kde8-150500.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4259" version="1" class="patch">
	<metadata>
		<title>Security update for python-scipy (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213062" ref_url="https://bugzilla.suse.com/1213062" source="BUGZILLA"/>
		<reference ref_id="1213137" ref_url="https://bugzilla.suse.com/1213137" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-25399" ref_url="https://www.suse.com/security/cve/CVE-2023-25399/" source="CVE"/>
		<reference ref_id="CVE-2023-29824" ref_url="https://www.suse.com/security/cve/CVE-2023-29824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015626.html" source="SUSE-SU"/>
		<description>
This update for python-scipy fixes the following issues:

- CVE-2023-25399: Fixed minor refcounting issue in Py_FindObjects (bsc#1213062).
- CVE-2023-29824: Fixed use-after-free in Py_FindObjects (bsc#1213137).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-25"/>
	<updated date="2023-07-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213062">SUSE bug 1213062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213137">SUSE bug 1213137</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-25399/">CVE-2023-25399 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25399">CVE-2023-25399 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-29824/">CVE-2023-29824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29824">CVE-2023-29824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772175" comment="python3-scipy_1_2_0-gnu-hpc-1.2.0-150100.4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4260" version="1" class="patch">
	<metadata>
		<title>Security update for netty, netty-tcnative (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212637" ref_url="https://bugzilla.suse.com/1212637" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-34462" ref_url="https://www.suse.com/security/cve/CVE-2023-34462/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015642.html" source="SUSE-SU"/>
		<description>
This update for netty, netty-tcnative fixes the following issues:

Upgrade to upstream version 4.1.94:

- CVE-2023-34462: Allow to limit the maximum lenght of the ClientHello (bsc#1212637).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-26"/>
	<updated date="2023-07-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212637">SUSE bug 1212637</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34462/">CVE-2023-34462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34462">CVE-2023-34462 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009769969" comment="netty-4.1.94-150200.4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769970" comment="netty-javadoc-4.1.94-150200.4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769971" comment="netty-poms-4.1.94-150200.4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769972" comment="netty-tcnative-2.0.61-150200.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769973" comment="netty-tcnative-javadoc-2.0.61-150200.3.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4261" version="1" class="patch">
	<metadata>
		<title>Security update for mysql-connector-java (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211247" ref_url="https://bugzilla.suse.com/1211247" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-21971" ref_url="https://www.suse.com/security/cve/CVE-2023-21971/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015640.html" source="SUSE-SU"/>
		<description>
This update for mysql-connector-java fixes the following issues:

- CVE-2023-21971: Fixed a denial-of-service vulnerability in the java.sql.DriverManager.getConnection() method when used with untrusted inputs (bsc#1211247).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-26"/>
	<updated date="2023-07-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211247">SUSE bug 1211247</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-21971/">CVE-2023-21971 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21971">CVE-2023-21971 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009764658" comment="mysql-connector-java-8.0.33-150200.3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4262" version="1" class="patch">
	<metadata>
		<title>Security update for iperf (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213430" ref_url="https://bugzilla.suse.com/1213430" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38403" ref_url="https://www.suse.com/security/cve/CVE-2023-38403/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:2987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015669.html" source="SUSE-SU"/>
		<description>
This update for iperf fixes the following issues:

- CVE-2023-38403: Fixed integer overflow leading to heap buffer overflow (bsc#1213430).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-26"/>
	<updated date="2023-07-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213430">SUSE bug 1213430</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38403/">CVE-2023-38403 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38403">CVE-2023-38403 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009772772" comment="iperf-3.5-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772773" comment="iperf-devel-3.5-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772774" comment="libiperf0-3.5-150000.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4263" version="1" class="patch">
	<metadata>
		<title>Security update for conmon (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1208737" ref_url="https://bugzilla.suse.com/1208737" source="BUGZILLA"/>
		<reference ref_id="1209307" ref_url="https://bugzilla.suse.com/1209307" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015668.html" source="SUSE-SU"/>
		<description>
This update for conmon fixes the following issues:

  conmon was updated to version 2.1.7:

  - Bumped go version to 1.19 (bsc#1209307).

  Bugfixes:

  - Fixed leaking symbolic links in the opt_socket_path directory
  - Fixed oom handling issues (bsc#1208737).
  - Fixed OOM watcher for cgroupv2 `oom_kill` events

		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-26"/>
	<updated date="2023-07-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208737">SUSE bug 1208737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209307">SUSE bug 1209307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772072" comment="conmon-2.1.7-150500.9.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4264" version="1" class="patch">
	<metadata>
		<title>Security update for go1.20-openssl (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206346" ref_url="https://bugzilla.suse.com/1206346" source="BUGZILLA"/>
		<reference ref_id="1213229" ref_url="https://bugzilla.suse.com/1213229" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-29406" ref_url="https://www.suse.com/security/cve/CVE-2023-29406/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015678.html" source="SUSE-SU"/>
		<description>
This update for go1.20-openssl fixes the following issues:

  Update to version 1.20.6.1 (bsc#1206346):

  - CVE-2023-29406: Fixed insufficient sanitization of Host header (bsc#1213229).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-27"/>
	<updated date="2023-07-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206346">SUSE bug 1206346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213229">SUSE bug 1213229</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-29406/">CVE-2023-29406 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29406">CVE-2023-29406 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009772535" comment="go1.20-openssl-1.20.6.1-150000.1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772536" comment="go1.20-openssl-doc-1.20.6.1-150000.1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772537" comment="go1.20-openssl-race-1.20.6.1-150000.1.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4265" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213383" ref_url="https://bugzilla.suse.com/1213383" source="BUGZILLA"/>
		<reference ref_id="1213487" ref_url="https://bugzilla.suse.com/1213487" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2975" ref_url="https://www.suse.com/security/cve/CVE-2023-2975/" source="CVE"/>
		<reference ref_id="CVE-2023-3446" ref_url="https://www.suse.com/security/cve/CVE-2023-3446/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030618.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2023-2975: Fixed AES-SIV implementation ignores empty associated data entries (bsc#1213383).
- CVE-2023-3446: Fixed DH_check() excessive time with over sized modulus (bsc#1213487).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-28"/>
	<updated date="2023-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213383">SUSE bug 1213383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213487">SUSE bug 1213487</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2975/">CVE-2023-2975 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2975">CVE-2023-2975 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3446/">CVE-2023-3446 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3446">CVE-2023-3446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009772566" comment="libopenssl-3-devel-3.0.8-150500.5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772567" comment="libopenssl-3-devel-32bit-3.0.8-150500.5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772568" comment="libopenssl3-3.0.8-150500.5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772569" comment="libopenssl3-32bit-3.0.8-150500.5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772570" comment="openssl-3-3.0.8-150500.5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772571" comment="openssl-3-doc-3.0.8-150500.5.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4266" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1209616" ref_url="https://bugzilla.suse.com/1209616" source="BUGZILLA"/>
		<reference ref_id="1211642" ref_url="https://bugzilla.suse.com/1211642" source="BUGZILLA"/>
		<reference ref_id="1211797" ref_url="https://bugzilla.suse.com/1211797" source="BUGZILLA"/>
		<reference ref_id="1211994" ref_url="https://bugzilla.suse.com/1211994" source="BUGZILLA"/>
		<reference ref_id="1213326" ref_url="https://bugzilla.suse.com/1213326" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-24607" ref_url="https://www.suse.com/security/cve/CVE-2023-24607/" source="CVE"/>
		<reference ref_id="CVE-2023-32762" ref_url="https://www.suse.com/security/cve/CVE-2023-32762/" source="CVE"/>
		<reference ref_id="CVE-2023-33285" ref_url="https://www.suse.com/security/cve/CVE-2023-33285/" source="CVE"/>
		<reference ref_id="CVE-2023-34410" ref_url="https://www.suse.com/security/cve/CVE-2023-34410/" source="CVE"/>
		<reference ref_id="CVE-2023-38197" ref_url="https://www.suse.com/security/cve/CVE-2023-38197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3018-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030624.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- CVE-2023-34410: Fixed certificate validation does not always consider whether the root of a chain is a configured CA certificate (bsc#1211994).
- CVE-2023-33285: Fixed buffer overflow in QDnsLookup (bsc#1211642).
- CVE-2023-32762: Fixed Qt Network incorrectly parses the strict-transport-security (HSTS) header (bsc#1211797).
- CVE-2023-38197: Fixed infinite loops in QXmlStreamReader(bsc#1213326).
- CVE-2023-24607: Fixed Qt SQL ODBC driver plugin DOS (bsc#1209616).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-28"/>
	<updated date="2023-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1209616">SUSE bug 1209616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211642">SUSE bug 1211642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211797">SUSE bug 1211797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211994">SUSE bug 1211994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213326">SUSE bug 1213326</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24607/">CVE-2023-24607 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24607">CVE-2023-24607 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-32762/">CVE-2023-32762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32762">CVE-2023-32762 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-33285/">CVE-2023-33285 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33285">CVE-2023-33285 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-34410/">CVE-2023-34410 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34410">CVE-2023-34410 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38197/">CVE-2023-38197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38197">CVE-2023-38197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009772894" comment="libQt5Bootstrap-devel-static-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772895" comment="libQt5Bootstrap-devel-static-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772896" comment="libQt5Concurrent-devel-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772897" comment="libQt5Concurrent-devel-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772898" comment="libQt5Concurrent5-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772899" comment="libQt5Concurrent5-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772900" comment="libQt5Core-devel-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772901" comment="libQt5Core-devel-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772902" comment="libQt5Core-private-headers-devel-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772903" comment="libQt5Core5-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772904" comment="libQt5Core5-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772905" comment="libQt5DBus-devel-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772906" comment="libQt5DBus-devel-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772907" comment="libQt5DBus-private-headers-devel-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772908" comment="libQt5DBus5-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772909" comment="libQt5DBus5-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772910" comment="libQt5Gui-devel-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772911" comment="libQt5Gui-devel-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772912" comment="libQt5Gui-private-headers-devel-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772913" comment="libQt5Gui5-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772914" comment="libQt5Gui5-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772915" comment="libQt5KmsSupport-devel-static-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772916" comment="libQt5KmsSupport-private-headers-devel-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772917" comment="libQt5Network-devel-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772918" comment="libQt5Network-devel-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772919" comment="libQt5Network-private-headers-devel-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772920" comment="libQt5Network5-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772921" comment="libQt5Network5-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772922" comment="libQt5OpenGL-devel-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772923" comment="libQt5OpenGL-devel-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772924" comment="libQt5OpenGL-private-headers-devel-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772925" comment="libQt5OpenGL5-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772926" comment="libQt5OpenGL5-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772927" comment="libQt5OpenGLExtensions-devel-static-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772928" comment="libQt5OpenGLExtensions-devel-static-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772929" comment="libQt5PlatformHeaders-devel-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772930" comment="libQt5PlatformSupport-devel-static-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772931" comment="libQt5PlatformSupport-devel-static-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772932" comment="libQt5PlatformSupport-private-headers-devel-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772933" comment="libQt5PrintSupport-devel-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772934" comment="libQt5PrintSupport-devel-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772935" comment="libQt5PrintSupport-private-headers-devel-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772936" comment="libQt5PrintSupport5-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772937" comment="libQt5PrintSupport5-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772938" comment="libQt5Sql-devel-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772939" comment="libQt5Sql-devel-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772940" comment="libQt5Sql-private-headers-devel-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772941" comment="libQt5Sql5-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772942" comment="libQt5Sql5-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772943" comment="libQt5Sql5-mysql-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772944" comment="libQt5Sql5-mysql-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772945" comment="libQt5Sql5-postgresql-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772946" comment="libQt5Sql5-postgresql-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772947" comment="libQt5Sql5-sqlite-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772948" comment="libQt5Sql5-sqlite-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772949" comment="libQt5Sql5-unixODBC-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772950" comment="libQt5Sql5-unixODBC-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772951" comment="libQt5Test-devel-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772952" comment="libQt5Test-devel-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772953" comment="libQt5Test-private-headers-devel-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772954" comment="libQt5Test5-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772955" comment="libQt5Test5-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772956" comment="libQt5Widgets-devel-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772957" comment="libQt5Widgets-devel-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772958" comment="libQt5Widgets-private-headers-devel-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772959" comment="libQt5Widgets5-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772960" comment="libQt5Widgets5-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772961" comment="libQt5Xml-devel-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772962" comment="libQt5Xml-devel-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772963" comment="libQt5Xml5-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772964" comment="libQt5Xml5-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772965" comment="libqt5-qtbase-common-devel-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772966" comment="libqt5-qtbase-devel-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772967" comment="libqt5-qtbase-examples-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772968" comment="libqt5-qtbase-examples-32bit-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772969" comment="libqt5-qtbase-platformtheme-gtk3-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772970" comment="libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.8+kde185-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772971" comment="libqt5-qtbase-private-headers-devel-5.15.8+kde185-150500.4.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4267" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213286" ref_url="https://bugzilla.suse.com/1213286" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030623.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

  Updated to version 20230724 (git commit 59fbffa9ec8e):

  - CVE-2023-20593: Fixed AMD ucode for ZenBleed vulnerability (bsc#1213286).


  Bugfixes:

  - Fix qcom ASoC tglp WHENCE entry
  - Group all Conexant V4L devices together
  - Makefile, copy-firmware: support xz/zstd compressed firmware
  - Updated NXP SR150 UWB firmware
  - WHENCE: Cleanup Realtek BT firmware provenance
  - WHENCE: comment out duplicate MediaTek firmware
  - amdgpu: Add GC 11.0.4 firmware
  - amdgpu: Add PSP 13.0.11 firmware
  - amdgpu: DMCUB updates for DCN 3.1.4 and 3.1.5
  - amdgpu: DMCUB updates for various AMDGPU asics
  - amdgpu: Update DCN 3.1.4 firmware
  - amdgpu: Update GC 11.0.1 and 11.0.4
  - amdgpu: Update GC 11.0.1 firmware
  - amdgpu: Update PSP 13.0.4 firmware
  - amdgpu: Update SDMA 6.0.1 firmware
  - amdgpu: add initial GC 11.0.3 firmware
  - amdgpu: add initial PSP 13.0.10 firmware
  - amdgpu: add initial SDMA 6.0.3 firmware
  - amdgpu: add initial SMU 13.0.10 firmware
  - amdgpu: update 13.0.8 firmware for amd.5.5 release
  - amdgpu: update DCN 3.1.6 DMCUB firmware
  - amdgpu: update DMCUB to v0.0.172.0 for various AMDGPU ASICs
  - amdgpu: update DMCUB to v0.0.175.0 for various AMDGPU ASICs
  - amdgpu: update GC 10.3.6 firmware for amd.5.5 release
  - amdgpu: update GC 10.3.7 firmware for amd.5.5 release
  - amdgpu: update GC 11.0.0 firmware for amd.5.5 release
  - amdgpu: update GC 11.0.1 firmware for amd.5.5 release
  - amdgpu: update GC 11.0.2 firmware for amd.5.5 release
  - amdgpu: update GC 11.0.4 firmware for amd.5.5 release
  - amdgpu: update PSP 13.0.0 firmware for amd.5.5 release
  - amdgpu: update PSP 13.0.11 firmware for amd.5.5 release
  - amdgpu: update PSP 13.0.4 firmware for amd.5.5 release
  - amdgpu: update PSP 13.0.7 firmware for amd.5.5 release
  - amdgpu: update Picasso VCN firmware
  - amdgpu: update SDMA 6.0.1 firmware for amd.5.5 release
  - amdgpu: update SMU 13.0.0 firmware for amd.5.5 release
  - amdgpu: update SMU 13.0.7 firmware for amd.5.5 release
  - amdgpu: update VCN 4.0.0 firmware
  - amdgpu: update VCN 4.0.0 firmware for amd.5.5 release
  - amdgpu: update VCN 4.0.4 firmware for amd.5.5 release
  - amdgpu: update aldebaran firmware for amd.5.5 release
  - amdgpu: update arcturus firmware for amd.5.5 release
  - amdgpu: update beige goby firmware for amd.5.5 release
  - amdgpu: update dimgrey cavefish firmware for amd.5.5 release
  - amdgpu: update green sardine VCN firmware
  - amdgpu: update green sardine firmware for amd.5.5 release
  - amdgpu: update navi10 firmware for amd.5.5 release
  - amdgpu: update navi12 firmware for amd.5.5 release
  - amdgpu: update navi14 firmware for amd.5.5 release
  - amdgpu: update navy flounder firmware for amd.5.5 release
  - amdgpu: update psp 13.0.5 firmware for amd.5.5 release
  - amdgpu: update raven VCN firmware
  - amdgpu: update raven2 VCN firmware
  - amdgpu: update renoir VCN firmware
  - amdgpu: update renoir firmware for amd.5.5 release
  - amdgpu: update sienna cichlid firmware for amd.5.5 release
  - amdgpu: update vangogh firmware for amd.5.5 release
  - amdgpu: update vcn 3.1.2 firmware for amd.5.5 release
  - amdgpu: update vega10 firmware for amd.5.5 release
  - amdgpu: update vega12 firmware for amd.5.5 release
  - amdgpu: update vega20 firmware for amd.5.5 release
  - amdgpu: update yellow carp firmware for amd.5.5 release
  - ath10k: QCA4019 hw1.0: update board-2.bin
  - ath10k: QCA6174 hw3.0: update board-2.bin
  - ath10k: QCA9888 hw2.0: update board-2.bin
  - ath10k: QCA9984 hw1.0: update board-2.bin
  - ath10k: QCA99X0 hw2.0: update board-2.bin
  - ath11k: IPQ6018 hw1.0: update board-2.bin
  - ath11k: IPQ6018 hw1.0: update to WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1
  - ath11k: IPQ8074 hw2.0: update board-2.bin
  - ath11k: IPQ8074 hw2.0: update to WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1
  - ath11k: QCN9074 hw1.0: update to WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1
  - ath11k: WCN6750 hw1.0: update to WLAN.MSL.1.0.1-01160-QCAMSLSWPLZ-1
  - ath11k: WCN6855 hw2.0: update board-2.bin
  - brcm: Add symlinks from Pine64 devices to AW-CM256SM.txt
  - check_whence: Check link targets are valid
  - check_whence: error if File: is actually a link
  - check_whence: error if symlinks are in-tree
  - check_whence: error on directory listed as File
  - check_whence: error on duplicate file entries
  - check_whence: strip quotation marks
  - cirrus: Add CS35L41 firmware for ASUS ROG 2023 Models
  - cirrus: Add firmware and tuning files for HP G10 series laptops
  - cirrus: Add firmware and tuning files for Lenovo ThinkPad P1 Gen 6
  - cirrus: Add firmware for new Asus ROG Laptops
  - cnm: update chips&amp;media wave521c firmware.
  - copy-firmware: drop obsolete backticks, quote
  - copy-firmware: quote deskdir and dirname
  - copy-firmware: silence the last shellcheck warnings
  - copy-firmware: tweak sed invocation
  - cxgb4: Update firmware to revision 1.27.3.0
  - fix broken cirrus firmware symlinks
  - i915: Add GuC v70.6.6 for MTL
  - i915: Add HuC v8.5.0 for MTL
  - i915: update DG2 GuC to v70.8.0
  - i915: update to GuC 70.8.0 and HuC 8.5.1 for MTL
  - ice: update ice DDP comms package to 1.3.40.0
  - ice: update ice DDP wireless_edge package to 1.3.10.0
  - iwlwifi: add new FWs from core78-32 release
  - iwlwifi: add new FWs from core80-39 release
  - iwlwifi: update 9000-family firmwares to core78-32
  - iwlwifi: update cc/Qu/QuZ firmwares for core80-39 release
  - linux-firmware: Add firmware for Cirrus CS35L41 on Lenovo Laptops
  - linux-firmware: Amphion: Update vpu firmware
  - linux-firmware: Update AMD cpu microcode
  - linux-firmware: Update AMD cpu microcode
  - linux-firmware: Update AMD fam17h cpu microcode
  - linux-firmware: Update firmware file for Intel Bluetooth AX200
  - linux-firmware: Update firmware file for Intel Bluetooth AX201
  - linux-firmware: Update firmware file for Intel Bluetooth AX203
  - linux-firmware: Update firmware file for Intel Bluetooth AX210
  - linux-firmware: Update firmware file for Intel Bluetooth AX211
  - linux-firmware: add firmware for MT7981
  - linux-firmware: update firmware for MT7916
  - linux-firmware: update firmware for MT7921 WiFi device
  - linux-firmware: update firmware for MT7922 WiFi device
  - linux-firmware: update firmware for MT7981
  - linux-firmware: update firmware for mediatek bluetooth chip (MT7921)
  - linux-firmware: update firmware for mediatek bluetooth chip (MT7922)
  - linux-firmware: update firmware for mediatek bluetooth chip (MT7922)
  - linux-firmware: update qat firmware
  - linux-firmware: wilc1000: update WILC1000 firmware to v16.0
  - mediatek: Update mt8195 SCP firmware to support 10bit mode
  - mediatek: Update mt8195 SCP firmware to support hevc
  - mt76xx: Move the old Mediatek WiFi firmware to mediatek
  - nvidia: update Tu10x and Tu11x signed firmware to support newer Turing HW
  - qca: Update firmware files for BT chip WCN6750
  - qcom: Add Audio firmware for SC8280XP X13s
  - qcom: Update the microcode files for Adreno a630 GPUs.
  - qcom: apq8016: add Dragonboard 410c WiFi and modem firmware
  - qcom: sdm845: rename the modem firmware
  - qcom: sdm845: update remoteproc firmware
  - rtl_bt: Add firmware and config files for RTL8851B
  - rtl_bt: Update RTL8761B BT UART firmware to 0x9DC6_D922
  - rtl_bt: Update RTL8761B BT USB firmware to 0xDFC6_D922
  - rtl_bt: Update RTL8852A BT USB firmware to 0xDAC7_480D
  - rtl_bt: Update RTL8852B BT USB firmware to 0xDBC6_B20F
  - rtl_bt: Update RTL8852C BT USB firmware to 0x040D_7225
  - rtl_nic: update firmware of USB devices
  - rtlwifi: Add firmware v6.0 for RTL8192FU
  - rtlwifi: Update firmware for RTL8188EU to v28.0
  - rtw88: 8822c: Update normal firmware to v9.9.15
  - rtw89: 8851b: add firmware v0.29.41.0
  - rtw89: 8852b: update format-1 fw to v0.29.29.1
  - rtw89: 8852c: update fw to v0.27.56.13
  - wfx: update to firmware 3.16.1
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-28"/>
	<updated date="2023-07-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213286">SUSE bug 1213286</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009774985" comment="kernel-firmware-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774986" comment="kernel-firmware-all-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774987" comment="kernel-firmware-amdgpu-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774988" comment="kernel-firmware-ath10k-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774989" comment="kernel-firmware-ath11k-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774990" comment="kernel-firmware-atheros-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774991" comment="kernel-firmware-bluetooth-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774992" comment="kernel-firmware-bnx2-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774993" comment="kernel-firmware-brcm-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774994" comment="kernel-firmware-chelsio-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774995" comment="kernel-firmware-dpaa2-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774996" comment="kernel-firmware-i915-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774997" comment="kernel-firmware-intel-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774998" comment="kernel-firmware-iwlwifi-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774999" comment="kernel-firmware-liquidio-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775000" comment="kernel-firmware-marvell-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775001" comment="kernel-firmware-media-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775002" comment="kernel-firmware-mediatek-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775003" comment="kernel-firmware-mellanox-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775004" comment="kernel-firmware-mwifiex-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775005" comment="kernel-firmware-network-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775006" comment="kernel-firmware-nfp-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775007" comment="kernel-firmware-nvidia-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775008" comment="kernel-firmware-platform-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775009" comment="kernel-firmware-prestera-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775010" comment="kernel-firmware-qcom-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775011" comment="kernel-firmware-qlogic-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775012" comment="kernel-firmware-radeon-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775013" comment="kernel-firmware-realtek-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775014" comment="kernel-firmware-serial-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775015" comment="kernel-firmware-sound-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775016" comment="kernel-firmware-ti-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775017" comment="kernel-firmware-ueagle-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775018" comment="kernel-firmware-usb-network-20230724-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775019" comment="ucode-amd-20230724-150500.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4268" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213502" ref_url="https://bugzilla.suse.com/1213502" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38633" ref_url="https://www.suse.com/security/cve/CVE-2023-38633/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015690.html" source="SUSE-SU"/>
		<description>
This update for librsvg fixes the following issues:

librsvg was updated to version 2.52.10:
 
- CVE-2023-38633: Fixed directory traversal in URI decoder (bsc#1213502).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-28"/>
	<updated date="2023-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213502">SUSE bug 1213502</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-38633/">CVE-2023-38633 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38633">CVE-2023-38633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009773749" comment="gdk-pixbuf-loader-rsvg-2.52.10-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773750" comment="gdk-pixbuf-loader-rsvg-32bit-2.52.10-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773751" comment="librsvg-2-2-2.52.10-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773752" comment="librsvg-2-2-32bit-2.52.10-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773753" comment="librsvg-devel-2.52.10-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773754" comment="rsvg-convert-2.52.10-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773755" comment="rsvg-thumbnailer-2.52.10-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773756" comment="typelib-1_0-Rsvg-2_0-2.52.10-150400.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4269" version="1" class="patch">
	<metadata>
		<title>Security update for java-17-openjdk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1207922" ref_url="https://bugzilla.suse.com/1207922" source="BUGZILLA"/>
		<reference ref_id="1213473" ref_url="https://bugzilla.suse.com/1213473" source="BUGZILLA"/>
		<reference ref_id="1213474" ref_url="https://bugzilla.suse.com/1213474" source="BUGZILLA"/>
		<reference ref_id="1213475" ref_url="https://bugzilla.suse.com/1213475" source="BUGZILLA"/>
		<reference ref_id="1213479" ref_url="https://bugzilla.suse.com/1213479" source="BUGZILLA"/>
		<reference ref_id="1213481" ref_url="https://bugzilla.suse.com/1213481" source="BUGZILLA"/>
		<reference ref_id="1213482" ref_url="https://bugzilla.suse.com/1213482" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-22006" ref_url="https://www.suse.com/security/cve/CVE-2023-22006/" source="CVE"/>
		<reference ref_id="CVE-2023-22036" ref_url="https://www.suse.com/security/cve/CVE-2023-22036/" source="CVE"/>
		<reference ref_id="CVE-2023-22041" ref_url="https://www.suse.com/security/cve/CVE-2023-22041/" source="CVE"/>
		<reference ref_id="CVE-2023-22044" ref_url="https://www.suse.com/security/cve/CVE-2023-22044/" source="CVE"/>
		<reference ref_id="CVE-2023-22045" ref_url="https://www.suse.com/security/cve/CVE-2023-22045/" source="CVE"/>
		<reference ref_id="CVE-2023-22049" ref_url="https://www.suse.com/security/cve/CVE-2023-22049/" source="CVE"/>
		<reference ref_id="CVE-2023-25193" ref_url="https://www.suse.com/security/cve/CVE-2023-25193/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030633.html" source="SUSE-SU"/>
		<description>
This update for java-17-openjdk fixes the following issues:

  Updated to version jdk-17.0.8+7 (July 2023 CPU):

  - CVE-2023-22006: Fixed vulnerability in the network component (bsc#1213473).
  - CVE-2023-22036: Fixed vulnerability in the utility component (bsc#1213474).
  - CVE-2023-22041: Fixed vulnerability in the hotspot component (bsc#1213475).
  - CVE-2023-22044: Fixed vulnerability in the hotspot component (bsc#1213479).
  - CVE-2023-22045: Fixed vulnerability in the hotspot component (bsc#1213481).
  - CVE-2023-22049: Fixed vulnerability in the libraries component (bsc#1213482).
  - CVE-2023-25193: Fixed vulnerability in the embedded harfbuzz module (bsc#1207922).

  - JDK-8294323: Improve Shared Class Data
  - JDK-8296565: Enhanced archival support
  - JDK-8298676, JDK-8300891: Enhanced Look and Feel
  - JDK-8300285: Enhance TLS data handling
  - JDK-8300596: Enhance Jar Signature validation
  - JDK-8301998, JDK-8302084: Update HarfBuzz to 7.0.1
  - JDK-8302475: Enhance HTTP client file downloading
  - JDK-8302483: Enhance ZIP performance
  - JDK-8303376: Better launching of JDI
  - JDK-8304460: Improve array usages
  - JDK-8304468: Better array usages
  - JDK-8305312: Enhanced path handling
  - JDK-8308682: Enhance AES performance

  Bugfixes:

  - JDK-8178806: Better exception logging in crypto code
  - JDK-8201516: DebugNonSafepoints generates incorrect
    information
  - JDK-8224768: Test ActalisCA.java fails
  - JDK-8227060: Optimize safepoint cleanup subtask order
  - JDK-8227257: javax/swing/JFileChooser/4847375/bug4847375.java
    fails with AssertionError
  - JDK-8238274: (sctp) JDK-7118373 is not fixed for SctpChannel
  - JDK-8244976: vmTestbase/nsk/jdi/Event/request/request001.java
    doesn' initialize eName
  - JDK-8245877: assert(_value != __null) failed: resolving NULL
    _value in JvmtiExport::post_compiled_method_load
  - JDK-8248001: javadoc generates invalid HTML pages whose
    ftp:// links are broken
  - JDK-8252990: Intrinsify Unsafe.storeStoreFence
  - JDK-8254711: Add java.security.Provider.getService JFR Event
  - JDK-8257856: Make ClassFileVersionsTest.java robust to JDK
    version updates
  - JDK-8261495: Shenandoah: reconsider update references memory
    ordering
  - JDK-8268288: jdk/jfr/api/consumer/streaming/
    /TestOutOfProcessMigration.java fails with 'Error:
    ShouldNotReachHere()'
  - JDK-8268298: jdk/jfr/api/consumer/log/TestVerbosity.java
    fails: unexpected log message
  - JDK-8268582: javadoc throws NPE with --ignore-source-errors
    option
  - JDK-8269821: Remove is-queue-active check in inner loop of
    write_ref_array_pre_work
  - JDK-8270434: JDI+UT: Unexpected event in JDI tests
  - JDK-8270859: Post JEP 411 refactoring: client libs with
    maximum covering &gt; 10K
  - JDK-8270869: G1ServiceThread may not terminate
  - JDK-8271519: java/awt/event/SequencedEvent/
    /MultipleContextsFunctionalTest.java failed with 'Total [200]
    - Expected [400]'
  - JDK-8273909: vmTestbase/nsk/jdi/Event/request/request001 can
    still fail with 'ERROR: new event is not ThreadStartEvent'
  - JDK-8274243: Implement fast-path for ASCII-compatible
    CharsetEncoders on aarch64
  - JDK-8274615: Support relaxed atomic add for linux-aarch64
  - JDK-8274864: Remove Amman/Cairo hacks in ZoneInfoFile
  - JDK-8275233: Incorrect line number reported in exception
    stack trace thrown from a lambda expression
  - JDK-8275287: Relax memory ordering constraints on updating
    instance class and array class counters
  - JDK-8275721: Name of UTC timezone in a locale changes
    depending on previous code
  - JDK-8275735: [linux] Remove deprecated Metrics api (kernel
    memory limit)
  - JDK-8276058: Some swing test fails on specific CI macos system
  - JDK-8277407: javax/swing/plaf/synth/SynthButtonUI/6276188/
    /bug6276188.java fails to compile after JDK-8276058
  - JDK-8277775: Fixup bugids in RemoveDropTargetCrashTest.java -
    add 4357905
  - JDK-8278146: G1: Rework VM_G1Concurrent VMOp to clearly
    identify it as pause
  - JDK-8278434: timeouts in test  java/time/test/java/time/
    /format/TestZoneTextPrinterParser.java
  - JDK-8278834: Error 'Cannot read field 'sym' because
    'this.lvar[od]' is null' when compiling
  - JDK-8282077: PKCS11 provider C_sign() impl should handle
    CKR_BUFFER_TOO_SMALL error
  - JDK-8282201: Consider removal of expiry check in
    VerifyCACerts.java test
  - JDK-8282227: Locale information for nb is not working properly
  - JDK-8282704: runtime/Thread/StopAtExit.java may leak memory
  - JDK-8283057: Update GCC to version 11.2.0 for Oracle builds
    on Linux
  - JDK-8283062: Uninitialized warnings in libgtest with GCC 11.2
  - JDK-8283520: JFR: Memory leak in dcmd_arena
  - JDK-8283566: G1: Improve G1BarrierSet::enqueue performance
  - JDK-8284331: Add sanity check for signal handler modification
    warning.
  - JDK-8285635: javax/swing/JRootPane/DefaultButtonTest.java
    failed with Default Button not pressed for L&amp;F:
    com.sun.java.swing.plaf.motif.MotifLookAndFeel
  - JDK-8285987: executing shell scripts without #! fails on
    Alpine linux
  - JDK-8286191: misc tests fail due to JDK-8285987
  - JDK-8286287: Reading file as UTF-16 causes Error which
    'shouldn't happen'
  - JDK-8286331: jni_GetStringUTFChars() uses wrong heap allocator
  - JDK-8286346: 3-parameter version of AllocateHeap should not
    ignore AllocFailType
  - JDK-8286398: Address possibly lossy conversions in
    jdk.internal.le
  - JDK-8287007: [cgroups] Consistently use stringStream
    throughout parsing code
  - JDK-8287246: DSAKeyValue should check for missing params
    instead of relying on KeyFactory provider
  - JDK-8287541: Files.writeString fails to throw IOException for
    charset 'windows-1252'
  - JDK-8287854: Dangling reference in ClassVerifier::verify_class
  - JDK-8287876: The recently de-problemlisted
    TestTitledBorderLeak test is unstable
  - JDK-8287897: Augment src/jdk.internal.le/share/legal/jline.md
    with information on 4th party dependencies
  - JDK-8288589: Files.readString ignores encoding errors for
    UTF-16
  - JDK-8289509: Improve test coverage for XPath Axes:
    descendant, descendant-or-self, following, following-sibling
  - JDK-8289735: UTIL_LOOKUP_PROGS fails on pathes with space
  - JDK-8289949: Improve test coverage for XPath: operators
  - JDK-8290822: C2: assert in PhaseIdealLoop::do_unroll() is
    subject to undefined behavior
  - JDK-8291226: Create Test Cases to cover scenarios for
    JDK-8278067
  - JDK-8291637: HttpClient default keep alive timeout not
    followed if server sends invalid value
  - JDK-8291638: Keep-Alive timeout of 0 should close connection
    immediately
  - JDK-8292206: TestCgroupMetrics.java fails as getMemoryUsage()
    is lower than expected
  - JDK-8292301: [REDO v2] C2 crash when allocating array of size
    too large
  - JDK-8292407: Improve Weak CAS VarHandle/Unsafe tests
    resilience under spurious failures
  - JDK-8292713: Unsafe.allocateInstance should be intrinsified
    without UseUnalignedAccesses
  - JDK-8292755: Non-default method in interface leads to a stack
    overflow in JShell
  - JDK-8292990: Improve test coverage for XPath Axes: parent
  - JDK-8293295: Add type check asserts to
    java_lang_ref_Reference accessors
  - JDK-8293492: ShenandoahControlThread missing from hs-err log
    and thread dump
  - JDK-8293858: Change PKCS7 code to use default SecureRandom
    impl instead of SHA1PRNG
  - JDK-8293887: AArch64 build failure with GCC 12 due to
    maybe-uninitialized warning in libfdlibm k_rem_pio2.c
  - JDK-8294183: AArch64: Wrong macro check in
    SharedRuntime::generate_deopt_blob
  - JDK-8294281: Allow warnings to be disabled on a per-file basis
  - JDK-8294673: JFR: Add SecurityProviderService#threshold to
    TestActiveSettingEvent.java
  - JDK-8294717: (bf) DirectByteBuffer constructor will leak if
    allocating Deallocator or Cleaner fails with OOME
  - JDK-8294906: Memory leak in PKCS11 NSS TLS server
  - JDK-8295564: Norwegian Nynorsk Locale is missing formatting
  - JDK-8295974: jni_FatalError and Xcheck:jni warnings should
    print the native stack when there are no Java frames
  - JDK-8296084: javax/swing/JSpinner/4788637/bug4788637.java
    fails intermittently on a VM
  - JDK-8296318: use-def assert: special case undetected loops
    nested in infinite loops
  - JDK-8296343: CPVE thrown on missing content-length in OCSP
    response
  - JDK-8296412: Special case infinite loops with unmerged
    backedges in IdealLoopTree::check_safepts
  - JDK-8296545: C2 Blackholes should allow load optimizations
  - JDK-8296934: Write a test to verify whether Undecorated Frame
    can be iconified or not
  - JDK-8297000: [jib] Add more friendly warning for proxy issues
  - JDK-8297154: Improve safepoint cleanup logging
  - JDK-8297450: ScaledTextFieldBorderTest.java fails when run
    with -show parameter
  - JDK-8297587: Upgrade JLine to 3.22.0
  - JDK-8297730: C2: Arraycopy intrinsic throws incorrect
    exception
  - JDK-8297955: LDAP CertStore should use LdapName and not
    String for DNs
  - JDK-8298488: [macos13] tools/jpackage tests failing with
    'Exit code: 137' on macOS
  - JDK-8298887: On the latest macOS+XCode the Robot API may
    report wrong colors
  - JDK-8299179: ArrayFill with store on backedge needs to reduce
    length by 1
  - JDK-8299259: C2: Div/Mod nodes without zero check could be
    split through iv phi of loop resulting in SIGFPE
  - JDK-8299544: Improve performance of CRC32C intrinsics
    (non-AVX-512) for small inputs
  - JDK-8299570: [JVMCI] Insufficient error handling when
    CodeBuffer is exhausted
  - JDK-8299959: C2: CmpU::Value must filter overflow computation
    against local sub computation
  - JDK-8300042: Improve CPU related JFR events descriptions
  - JDK-8300079: SIGSEGV in LibraryCallKit::inline_string_copy
    due to constant NULL src argument
  - JDK-8300823: UB: Compile::_phase_optimize_finished is
    initialized too late
  - JDK-8300939: sun/security/provider/certpath/OCSP/
    /OCSPNoContentLength.java fails due to network errors
  - JDK-8301050: Detect Xen Virtualization on Linux aarch64
  - JDK-8301119: Support for GB18030-2022
  - JDK-8301123: Enable Symbol refcounting underflow checks in
    PRODUCT
  - JDK-8301190: [vectorapi] The typeChar of LaneType is
    incorrect when default locale is tr
  - JDK-8301216: ForkJoinPool invokeAll() ignores timeout
  - JDK-8301338: Identical branch conditions in
    CompileBroker::print_heapinfo
  - JDK-8301491: C2: java.lang.StringUTF16::indexOfChar intrinsic
    called with negative character argument
  - JDK-8301637: ThreadLocalRandom.current().doubles().parallel()
    contention
  - JDK-8301661: Enhance os::pd_print_cpu_info on macOS and
    Windows
  - JDK-8302151: BMPImageReader throws an exception reading BMP
    images
  - JDK-8302172: [JVMCI] HotSpotResolvedJavaMethodImpl.canBeInlined
    must respect ForceInline
  - JDK-8302320: AsyncGetCallTrace obtains too few frames in
    sanity test
  - JDK-8302491: NoClassDefFoundError omits the original cause of
    an error
  - JDK-8302508: Add timestamp to the output TraceCompilerThreads
  - JDK-8302594: use-after-free in Node::destruct
  - JDK-8302595: use-after-free related to GraphKit::clone_map
  - JDK-8302791: Add specific ClassLoader object to Proxy
    IllegalArgumentException message
  - JDK-8302849: SurfaceManager might expose partially
    constructed object
  - JDK-8303069: Memory leak in CompilerOracle::parse_from_line
  - JDK-8303102: jcmd: ManagementAgent.status truncates the text
    longer than O_BUFLEN
  - JDK-8303130: Document required Accessibility permissions on
    macOS
  - JDK-8303354: addCertificatesToKeystore in KeystoreImpl.m
    needs CFRelease call in early potential CHECK_NULL return
  - JDK-8303433: Bump update version for OpenJDK: jdk-17.0.8
  - JDK-8303440: The 'ZonedDateTime.parse' may not accept the
    'UTC+XX' zone id
  - JDK-8303465: KeyStore of type KeychainStore, provider Apple
    does not show all trusted certificates
  - JDK-8303476: Add the runtime version in the release file of a
    JDK image
  - JDK-8303482: Update LCMS to 2.15
  - JDK-8303508: Vector.lane() gets wrong value on x86
  - JDK-8303511: C2: assert(get_ctrl(n) == cle_out) during
    unrolling
  - JDK-8303564: C2: 'Bad graph detected in build_loop_late'
    after a CMove is wrongly split thru phi
  - JDK-8303575: adjust Xen handling on Linux aarch64
  - JDK-8303576: addIdentitiesToKeystore in KeystoreImpl.m needs
    CFRelease call in early potential CHECK_NULL return
  - JDK-8303588: [JVMCI] make JVMCI source directories conform
    with standard layout
  - JDK-8303809: Dispose context in SPNEGO NegotiatorImpl
  - JDK-8303822: gtestMain should give more helpful output
  - JDK-8303861: Error handling step timeouts should never be
    blocked by OnError and others
  - JDK-8303937: Corrupted heap dumps due to missing retries for
    os::write()
  - JDK-8303949: gcc10 warning Linux ppc64le - note: the layout
    of aggregates containing vectors with 8-byte alignment has
    changed in GCC 5
  - JDK-8304054: Linux: NullPointerException from
    FontConfiguration.getVersion in case no fonts are installed
  - JDK-8304063: tools/jpackage/share/AppLauncherEnvTest.java
    fails when checking LD_LIBRARY_PATH
  - JDK-8304134: jib bootstrapper fails to quote filename when
    checking download filetype
  - JDK-8304291: [AIX] Broken build after JDK-8301998
  - JDK-8304295: harfbuzz build fails with GCC 7 after JDK-8301998
  - JDK-8304350: Font.getStringBounds calculates wrong width for
    TextAttribute.TRACKING other than 0.0
  - JDK-8304671: javac regression: Compilation with --release 8
    fails on underscore in enum identifiers
  - JDK-8304683: Memory leak in WB_IsMethodCompatible
  - JDK-8304760: Add 2 Microsoft TLS roots
  - JDK-8304867: Explicitly disable dtrace for ppc builds
  - JDK-8304880: [PPC64] VerifyOops code in C1 doesn't work with
    ZGC
  - JDK-8305088: SIGSEGV in Method::is_method_handle_intrinsic
  - JDK-8305113: (tz) Update Timezone Data to 2023c
  - JDK-8305400: ISO 4217 Amendment 175 Update
  - JDK-8305403: Shenandoah evacuation workers may deadlock
  - JDK-8305481: gtest is_first_C_frame failing on ARM
  - JDK-8305690: [X86] Do not emit two REX prefixes in
    Assembler::prefix
  - JDK-8305711: Arm: C2 always enters slowpath for monitorexit
  - JDK-8305721: add `make compile-commands` artifacts to
    .gitignore
  - JDK-8305975: Add TWCA Global Root CA
  - JDK-8305993: Add handleSocketErrorWithMessage to extend nio
    Net.c exception message
  - JDK-8305994: Guarantee eventual async monitor deflation
  - JDK-8306072: Open source several AWT MouseInfo related tests
  - JDK-8306133: Open source few AWT Drag &amp; Drop related tests
  - JDK-8306409: Open source AWT KeyBoardFocusManger,
    LightWeightComponent related tests
  - JDK-8306432: Open source several AWT Text Component related
    tests
  - JDK-8306466: Open source more AWT Drag &amp; Drop related tests
  - JDK-8306489: Open source AWT List related tests
  - JDK-8306543: GHA: MSVC installation is failing
  - JDK-8306640: Open source several AWT TextArea related tests
  - JDK-8306652: Open source AWT MenuItem related tests
  - JDK-8306658: GHA: MSVC installation could be optional since
    it might already be pre-installed
  - JDK-8306664: GHA: Update MSVC version to latest stepping
  - JDK-8306681: Open source more AWT DnD related tests
  - JDK-8306683: Open source several clipboard and color AWT tests
  - JDK-8306752: Open source several container and component AWT
    tests
  - JDK-8306753: Open source several container AWT tests
  - JDK-8306755: Open source few Swing JComponent and
    AbstractButton tests
  - JDK-8306768: CodeCache Analytics reports wrong threshold
  - JDK-8306774: Make runtime/Monitor/
    /GuaranteedAsyncDeflationIntervalTest.java more reliable
  - JDK-8306825: Monitor deflation might be accidentally disabled
    by zero intervals
  - JDK-8306850: Open source AWT Modal related tests
  - JDK-8306871: Open source more AWT Drag &amp; Drop tests
  - JDK-8306883: Thread stacksize is reported with wrong units in
    os::create_thread logging
  - JDK-8306941: Open source several datatransfer and dnd AWT
    tests
  - JDK-8306943: Open source several dnd AWT tests
  - JDK-8306954: Open source five Focus related tests
  - JDK-8306955: Open source several JComboBox jtreg tests
  - JDK-8306976: UTIL_REQUIRE_SPECIAL warning on grep
  - JDK-8306996: Open source Swing MenuItem related tests
  - JDK-8307080: Open source some more JComboBox jtreg tests
  - JDK-8307128: Open source some drag and drop tests 4
  - JDK-8307130: Open source few Swing JMenu tests
  - JDK-8307133: Open source some JTable jtreg tests
  - JDK-8307134: Add GTS root CAs
  - JDK-8307135: java/awt/dnd/NotReallySerializableTest/
    /NotReallySerializableTest.java failed
  - JDK-8307331: Correctly update line maps when class redefine
    rewrites bytecodes
  - JDK-8307346: Add missing gc+phases logging for
    ObjectCount(AfterGC) JFR event collection code
  - JDK-8307347: serviceability/sa/ClhsdbDumpclass.java could
    leave files owned by root on macOS
  - JDK-8307378: Allow collectors to provide specific values for
    GC notifications' actions
  - JDK-8307381: Open Source JFrame, JIF related Swing Tests
  - JDK-8307425: Socket input stream read burns CPU cycles with
    back-to-back poll(0) calls
  - JDK-8307799: Newly added java/awt/dnd/MozillaDnDTest.java has
    invalid jtreg `@requires` clause
  - JDK-8308554: [17u] Fix commit of 8286191. vm.musl was not
    removed from ExternalEditorTest
  - JDK-8308880: [17u] micro bench ZoneStrings missed in backport
    of 8278434
  - JDK-8308884: [17u/11u] Backout JDK-8297951
  - JDK-8311467: [17u] Remove designator
    DEFAULT_PROMOTED_VERSION_PRE=ea for release 17.0.8
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-28"/>
	<updated date="2023-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207922">SUSE bug 1207922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213473">SUSE bug 1213473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213474">SUSE bug 1213474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213475">SUSE bug 1213475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213479">SUSE bug 1213479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213481">SUSE bug 1213481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213482">SUSE bug 1213482</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22006/">CVE-2023-22006 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22006">CVE-2023-22006 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22036/">CVE-2023-22036 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22036">CVE-2023-22036 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22041/">CVE-2023-22041 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22041">CVE-2023-22041 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22044/">CVE-2023-22044 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22044">CVE-2023-22044 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22045/">CVE-2023-22045 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22045">CVE-2023-22045 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22049/">CVE-2023-22049 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22049">CVE-2023-22049 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25193/">CVE-2023-25193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25193">CVE-2023-25193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009775314" comment="java-17-openjdk-17.0.8.0-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775315" comment="java-17-openjdk-demo-17.0.8.0-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775316" comment="java-17-openjdk-devel-17.0.8.0-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775317" comment="java-17-openjdk-headless-17.0.8.0-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775318" comment="java-17-openjdk-javadoc-17.0.8.0-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775319" comment="java-17-openjdk-jmods-17.0.8.0-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775320" comment="java-17-openjdk-src-17.0.8.0-150400.3.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4270" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213352" ref_url="https://bugzilla.suse.com/1213352" source="BUGZILLA"/>
		<reference ref_id="1213447" ref_url="https://bugzilla.suse.com/1213447" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3750" ref_url="https://www.suse.com/security/cve/CVE-2023-3750/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030643.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

Security fixes:

  - CVE-2023-3750: Fixed mproper locking in virStoragePoolObjListSearch that may lead to denial of service (bsc#1213447).

Other fixes:
  
  - build library with support for modular daemons (bsc#1213352).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-31"/>
	<updated date="2023-07-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213352">SUSE bug 1213352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213447">SUSE bug 1213447</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3750/">CVE-2023-3750 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3750">CVE-2023-3750 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009774950" comment="libvirt-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774951" comment="libvirt-client-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774952" comment="libvirt-client-qemu-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774953" comment="libvirt-daemon-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774954" comment="libvirt-daemon-config-network-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774955" comment="libvirt-daemon-config-nwfilter-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774956" comment="libvirt-daemon-driver-interface-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774957" comment="libvirt-daemon-driver-libxl-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774958" comment="libvirt-daemon-driver-lxc-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774959" comment="libvirt-daemon-driver-network-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774960" comment="libvirt-daemon-driver-nodedev-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774961" comment="libvirt-daemon-driver-nwfilter-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774962" comment="libvirt-daemon-driver-qemu-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774963" comment="libvirt-daemon-driver-secret-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774964" comment="libvirt-daemon-driver-storage-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774965" comment="libvirt-daemon-driver-storage-core-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774966" comment="libvirt-daemon-driver-storage-disk-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774967" comment="libvirt-daemon-driver-storage-gluster-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774968" comment="libvirt-daemon-driver-storage-iscsi-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774969" comment="libvirt-daemon-driver-storage-iscsi-direct-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774970" comment="libvirt-daemon-driver-storage-logical-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774971" comment="libvirt-daemon-driver-storage-mpath-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774972" comment="libvirt-daemon-driver-storage-rbd-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774973" comment="libvirt-daemon-driver-storage-scsi-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774974" comment="libvirt-daemon-hooks-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774975" comment="libvirt-daemon-lxc-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774976" comment="libvirt-daemon-qemu-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774977" comment="libvirt-daemon-xen-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774978" comment="libvirt-devel-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774979" comment="libvirt-devel-32bit-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774980" comment="libvirt-doc-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774981" comment="libvirt-libs-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774982" comment="libvirt-lock-sanlock-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774983" comment="libvirt-nss-9.0.0-150500.6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774984" comment="wireshark-plugin-libvirt-9.0.0-150500.6.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4271" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212438" ref_url="https://bugzilla.suse.com/1212438" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3417" ref_url="https://www.suse.com/security/cve/CVE-2023-3417/" source="CVE"/>
		<reference ref_id="CVE-2023-3600" ref_url="https://www.suse.com/security/cve/CVE-2023-3600/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030640.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

  Mozilla Thunderbird was updated to version 115.0.1 (bsc#1212438):

  - CVE-2023-3600: Fixed use-after-free in workers (bmo#1839703).
  - CVE-2023-3417: Fixed File Extension Spoofing using the Text Direction Override Character (bmo#1835582).

  Bugfixes: 

  - changed: Added Thunderbird Supernova branding to about:dialog
    (bmo#1842102)
  - fixed: Message list was not updated when message was deleted
    from server outside of Thunderbird (bmo#1837041)
  - fixed: Scrolling behaved unexpectedly when moving to next
    message unread message in another folder (bmo#1841711)
  - fixed: Scrolling animation was unnecessarily used when
    switching or toggling the sort column in message list
    (bmo#1838522)
  - fixed: Attempting to delete a message and then cancelling the
    action still marked the message as read (bmo#793353)
  - fixed: Unified Toolbar could not be customized under certain
    tabs (bmo#1841480)
  - fixed: Selecting a folder with one or more subfolders and
    pressing enter did not expand folder (bmo#1841200)
  - fixed: Tooltips did not appear when hovering over folders
    (bmo#1839780)
  - fixed: Deleting large amounts of messages from Trash folder
    consumed excessive time and memory (bmo#1833665)
  - fixed: Message Summary header buttons were not keyboard
    accessible (bmo#1827199)
  - fixed: 'New' button in Message Filters dialog was not
    keyboard accessible (bmo#1841477)
  - fixed: Backing up secret keys from OpenPGP Key Manager dialog
    silently failed (bmo#1839415)
  - fixed: Various visual and UX improvements
    (bmo#1843172,bmo#1831422,bmo#1838360,bmo#1842319)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-31"/>
	<updated date="2023-07-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212438">SUSE bug 1212438</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3417/">CVE-2023-3417 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3417">CVE-2023-3417 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3600/">CVE-2023-3600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3600">CVE-2023-3600 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009775321" comment="MozillaThunderbird-115.0.1-150200.8.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775322" comment="MozillaThunderbird-translations-common-115.0.1-150200.8.124.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775323" comment="MozillaThunderbird-translations-other-115.0.1-150200.8.124.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4272" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1179993" ref_url="https://bugzilla.suse.com/1179993" source="BUGZILLA"/>
		<reference ref_id="1181740" ref_url="https://bugzilla.suse.com/1181740" source="BUGZILLA"/>
		<reference ref_id="1207205" ref_url="https://bugzilla.suse.com/1207205" source="BUGZILLA"/>
		<reference ref_id="1212968" ref_url="https://bugzilla.suse.com/1212968" source="BUGZILLA"/>
		<reference ref_id="1213001" ref_url="https://bugzilla.suse.com/1213001" source="BUGZILLA"/>
		<reference ref_id="1213414" ref_url="https://bugzilla.suse.com/1213414" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0330" ref_url="https://www.suse.com/security/cve/CVE-2023-0330/" source="CVE"/>
		<reference ref_id="CVE-2023-2861" ref_url="https://www.suse.com/security/cve/CVE-2023-2861/" source="CVE"/>
		<reference ref_id="CVE-2023-3255" ref_url="https://www.suse.com/security/cve/CVE-2023-3255/" source="CVE"/>
		<reference ref_id="CVE-2023-3301" ref_url="https://www.suse.com/security/cve/CVE-2023-3301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBGW5JBGK2W2H3MOOD5HENYWYUVVQPM/" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

  - CVE-2023-3301: Fixed incorrect cleanup of the vdpa/vhost-net structures if peer nic is present (bsc#1213414).
  - CVE-2023-0330: Fixed reentrancy issues in the LSI controller (bsc#1207205).
  - CVE-2023-2861: Fixed opening special files in 9pfs (bsc#1212968).
  - CVE-2023-3255: Fixed infinite loop in inflate_buffer() leads to denial of service (bsc#1213001).

  Bugfixes: 

  - hw/ide/piix: properly initialize the BMIBA register (bsc#bsc#1179993)
  - Fixed issue where Guest did not run on XEN SLES15SP2 (bsc#1181740).

		</description>
<advisory from="security@suse.de">
	<issued date="2023-07-31"/>
	<updated date="2023-07-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179993">SUSE bug 1179993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181740">SUSE bug 1181740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207205">SUSE bug 1207205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212968">SUSE bug 1212968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213001">SUSE bug 1213001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213414">SUSE bug 1213414</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0330/">CVE-2023-0330 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0330">CVE-2023-0330 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2861/">CVE-2023-2861 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2861">CVE-2023-2861 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3255/">CVE-2023-3255 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3255">CVE-2023-3255 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3301/">CVE-2023-3301 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3301">CVE-2023-3301 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009775351" comment="qemu-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775352" comment="qemu-SLOF-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775353" comment="qemu-accel-qtest-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775354" comment="qemu-accel-tcg-x86-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775355" comment="qemu-arm-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775356" comment="qemu-audio-alsa-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775357" comment="qemu-audio-dbus-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775358" comment="qemu-audio-jack-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775359" comment="qemu-audio-pa-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775360" comment="qemu-audio-spice-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775361" comment="qemu-block-curl-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775362" comment="qemu-block-dmg-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775363" comment="qemu-block-gluster-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775364" comment="qemu-block-iscsi-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775365" comment="qemu-block-nfs-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775366" comment="qemu-block-rbd-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775367" comment="qemu-block-ssh-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775368" comment="qemu-chardev-baum-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775369" comment="qemu-chardev-spice-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775370" comment="qemu-extra-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775371" comment="qemu-guest-agent-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775372" comment="qemu-hw-display-qxl-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775373" comment="qemu-hw-display-virtio-gpu-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775374" comment="qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775375" comment="qemu-hw-display-virtio-vga-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775376" comment="qemu-hw-s390x-virtio-gpu-ccw-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775377" comment="qemu-hw-usb-host-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775378" comment="qemu-hw-usb-redirect-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775379" comment="qemu-hw-usb-smartcard-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775380" comment="qemu-ipxe-1.0.0+-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775381" comment="qemu-ivshmem-tools-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775382" comment="qemu-ksm-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775383" comment="qemu-kvm-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775384" comment="qemu-lang-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775385" comment="qemu-microvm-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775386" comment="qemu-ppc-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775387" comment="qemu-s390x-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775388" comment="qemu-seabios-1.16.0_0_gd239552-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775389" comment="qemu-sgabios-8-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775390" comment="qemu-skiboot-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775391" comment="qemu-tools-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775392" comment="qemu-ui-curses-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775393" comment="qemu-ui-dbus-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775394" comment="qemu-ui-gtk-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775395" comment="qemu-ui-opengl-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775396" comment="qemu-ui-spice-app-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775397" comment="qemu-ui-spice-core-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775398" comment="qemu-vgabios-1.16.0_0_gd239552-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775399" comment="qemu-vhost-user-gpu-7.1.0-150500.49.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775400" comment="qemu-x86-7.1.0-150500.49.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4273" version="1" class="patch">
	<metadata>
		<title>Security update for xmltooling (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212359" ref_url="https://bugzilla.suse.com/1212359" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-36661" ref_url="https://www.suse.com/security/cve/CVE-2023-36661/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030679.html" source="SUSE-SU"/>
		<description>
This update for xmltooling fixes the following issues:

- CVE-2023-36661: Fix server-side request forgery vulnerability (bsc#1212359)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-01"/>
	<updated date="2023-08-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212359">SUSE bug 1212359</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-36661/">CVE-2023-36661 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36661">CVE-2023-36661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009769728" comment="libxmltooling-devel-3.1.0-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769729" comment="libxmltooling-lite9-3.1.0-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769730" comment="libxmltooling9-3.1.0-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769731" comment="xmltooling-schemas-3.1.0-150300.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4274" version="1" class="patch">
	<metadata>
		<title>Security update for guava (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1179926" ref_url="https://bugzilla.suse.com/1179926" source="BUGZILLA"/>
		<reference ref_id="1212401" ref_url="https://bugzilla.suse.com/1212401" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8908" ref_url="https://www.suse.com/security/cve/CVE-2020-8908/" source="CVE"/>
		<reference ref_id="CVE-2023-2976" ref_url="https://www.suse.com/security/cve/CVE-2023-2976/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3090-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030678.html" source="SUSE-SU"/>
		<description>
This update for guava fixes the following issues:

Upgrade to guava 32.0.1:

- CVE-2020-8908: Fixed predictable temporary files and directories used in FileBackedOutputStream (bsc#1179926).
- CVE-2023-2976: Fixed a temp directory creation vulnerability (bsc#1212401).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-01"/>
	<updated date="2023-08-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179926">SUSE bug 1179926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212401">SUSE bug 1212401</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8908/">CVE-2020-8908 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8908">CVE-2020-8908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-2976/">CVE-2023-2976 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2976">CVE-2023-2976 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009769299" comment="guava-32.0.1-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769300" comment="guava-javadoc-32.0.1-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009769301" comment="guava-testlib-32.0.1-150200.3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4275" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_0_0 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213487" ref_url="https://bugzilla.suse.com/1213487" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3446" ref_url="https://www.suse.com/security/cve/CVE-2023-3446/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3093-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030674.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_0_0 fixes the following issues:

   - CVE-2023-3446: Fixed DH_check() excessive time with over sized modulus (bsc#1213487).

		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-01"/>
	<updated date="2023-08-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213487">SUSE bug 1213487</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3446/">CVE-2023-3446 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3446">CVE-2023-3446 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009772551" comment="libopenssl-1_0_0-devel-1.0.2p-150000.3.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772552" comment="libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772553" comment="libopenssl10-1.0.2p-150000.3.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772554" comment="libopenssl1_0_0-1.0.2p-150000.3.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772555" comment="libopenssl1_0_0-32bit-1.0.2p-150000.3.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772556" comment="libopenssl1_0_0-hmac-1.0.2p-150000.3.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772557" comment="libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772558" comment="libopenssl1_0_0-steam-1.0.2p-150000.3.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772559" comment="libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772560" comment="openssl-1_0_0-1.0.2p-150000.3.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772561" comment="openssl-1_0_0-cavs-1.0.2p-150000.3.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772562" comment="openssl-1_0_0-doc-1.0.2p-150000.3.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4276" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210994" ref_url="https://bugzilla.suse.com/1210994" source="BUGZILLA"/>
		<reference ref_id="1211591" ref_url="https://bugzilla.suse.com/1211591" source="BUGZILLA"/>
		<reference ref_id="1211741" ref_url="https://bugzilla.suse.com/1211741" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28370" ref_url="https://www.suse.com/security/cve/CVE-2023-28370/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015739.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

Security fixes:

- CVE-2023-28370: Fix an open redirect vulnerability in 'StaticFileHandler' under certain configurations (bsc#1211741)

Bug fixes:

- Prevent error loading 'known_hosts' when '$HOME' is not set (bsc#1210994)
- Fix ModuleNotFoundError and other issues raised by salt-support module (bsc#1211591)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-02"/>
	<updated date="2023-08-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210994">SUSE bug 1210994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211591">SUSE bug 1211591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211741">SUSE bug 1211741</bugzilla>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28370/">CVE-2023-28370 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28370">CVE-2023-28370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009773767" comment="python3-salt-3006.0-150500.4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773768" comment="salt-3006.0-150500.4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773769" comment="salt-api-3006.0-150500.4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773770" comment="salt-bash-completion-3006.0-150500.4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773771" comment="salt-cloud-3006.0-150500.4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773772" comment="salt-doc-3006.0-150500.4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773773" comment="salt-fish-completion-3006.0-150500.4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773774" comment="salt-master-3006.0-150500.4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773775" comment="salt-minion-3006.0-150500.4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773776" comment="salt-proxy-3006.0-150500.4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773777" comment="salt-ssh-3006.0-150500.4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773778" comment="salt-standalone-formulas-configuration-3006.0-150500.4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773779" comment="salt-syndic-3006.0-150500.4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773780" comment="salt-tests-3006.0-150500.4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773781" comment="salt-transactional-update-3006.0-150500.4.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773782" comment="salt-zsh-completion-3006.0-150500.4.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4277" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1208612" ref_url="https://bugzilla.suse.com/1208612" source="BUGZILLA"/>
		<reference ref_id="1211741" ref_url="https://bugzilla.suse.com/1211741" source="BUGZILLA"/>
		<reference ref_id="1212279" ref_url="https://bugzilla.suse.com/1212279" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28370" ref_url="https://www.suse.com/security/cve/CVE-2023-28370/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015736.html" source="SUSE-SU"/>
		<description>
This update fixes the following issues:

python-tornado:
    
- Security fixes:
  * CVE-2023-28370: Fixed an open redirect issue in the static file handler (bsc#1211741)

prometheus-blackbox_exporter:

- Use obscpio for go modules service
- Set version number
- Set build date from SOURCE_DATE_EPOCH
- Update to 0.24.0 (bsc#1212279, jsc#PED-4556)
  * Requires go1.19
- Avoid empty validation script
- Add rc symlink for backwards compatibility

spacecmd:

- Version 4.3.22-1
  * Bypass traditional systems check on older SUMA instances (bsc#1208612)

		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-02"/>
	<updated date="2023-08-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1208612">SUSE bug 1208612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211741">SUSE bug 1211741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212279">SUSE bug 1212279</bugzilla>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28370/">CVE-2023-28370 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28370">CVE-2023-28370 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009773713" comment="prometheus-blackbox_exporter-0.24.0-150000.1.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773714" comment="python3-tornado-4.5.3-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773715" comment="spacecmd-4.3.22-150000.3.101.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773716" comment="system-user-prometheus-1.0.0-150000.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4278" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213657" ref_url="https://bugzilla.suse.com/1213657" source="BUGZILLA"/>
		<reference ref_id="1213746" ref_url="https://bugzilla.suse.com/1213746" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4045" ref_url="https://www.suse.com/security/cve/CVE-2023-4045/" source="CVE"/>
		<reference ref_id="CVE-2023-4046" ref_url="https://www.suse.com/security/cve/CVE-2023-4046/" source="CVE"/>
		<reference ref_id="CVE-2023-4047" ref_url="https://www.suse.com/security/cve/CVE-2023-4047/" source="CVE"/>
		<reference ref_id="CVE-2023-4048" ref_url="https://www.suse.com/security/cve/CVE-2023-4048/" source="CVE"/>
		<reference ref_id="CVE-2023-4049" ref_url="https://www.suse.com/security/cve/CVE-2023-4049/" source="CVE"/>
		<reference ref_id="CVE-2023-4050" ref_url="https://www.suse.com/security/cve/CVE-2023-4050/" source="CVE"/>
		<reference ref_id="CVE-2023-4052" ref_url="https://www.suse.com/security/cve/CVE-2023-4052/" source="CVE"/>
		<reference ref_id="CVE-2023-4054" ref_url="https://www.suse.com/security/cve/CVE-2023-4054/" source="CVE"/>
		<reference ref_id="CVE-2023-4055" ref_url="https://www.suse.com/security/cve/CVE-2023-4055/" source="CVE"/>
		<reference ref_id="CVE-2023-4056" ref_url="https://www.suse.com/security/cve/CVE-2023-4056/" source="CVE"/>
		<reference ref_id="CVE-2023-4057" ref_url="https://www.suse.com/security/cve/CVE-2023-4057/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030750.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following security issues:

  Firefox was updated to Extended Support Release 115.1.0 ESR (bsc#1213746):

  - CVE-2023-4045: Fixed cross-origin restrictions bypass with Offscreen Canvas (bmo#1833876).
  - CVE-2023-4046: Fixed incorrect value used during WASM compilation (bmo#1837686).
  - CVE-2023-4047: Fixed potential permissions request bypass via clickjacking (bmo#1839073).
  - CVE-2023-4048: Fixed crash in DOMParser due to out-of-memory conditions (bmo#1841368).
  - CVE-2023-4049: Fixed potential race conditions when releasing platform objects (bmo#1842658).
  - CVE-2023-4050: Fixed stack buffer overflow in StorageManager (bmo#1843038).
  - CVE-2023-4052: Fixed file deletion and privilege escalation through Firefox uninstaller (bmo#1824420).
  - CVE-2023-4054: Fixed lack of warning when opening appref-ms files (bmo#1840777).
  - CVE-2023-4055: Fixed cookie jar overflow caused unexpected cookie jar state (bmo#1782561).
  - CVE-2023-4056: Fixed memory safety bugs (bmo#1820587, bmo#1824634, bmo#1839235, bmo#1842325, bmo#1843847).
  - CVE-2023-4057: Fixed memory safety bugs (bmo#1841682).

  Bugfixes:

  - Remove bashisms from startup-script (bsc#1213657) 
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-02"/>
	<updated date="2023-08-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213657">SUSE bug 1213657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213746">SUSE bug 1213746</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4045/">CVE-2023-4045 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4045">CVE-2023-4045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4046/">CVE-2023-4046 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4046">CVE-2023-4046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4047/">CVE-2023-4047 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4047">CVE-2023-4047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4048/">CVE-2023-4048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4048">CVE-2023-4048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4049/">CVE-2023-4049 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4049">CVE-2023-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4050/">CVE-2023-4050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4050">CVE-2023-4050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4052/">CVE-2023-4052 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4052">CVE-2023-4052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4054/">CVE-2023-4054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4054">CVE-2023-4054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4055/">CVE-2023-4055 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4055">CVE-2023-4055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4056/">CVE-2023-4056 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4056">CVE-2023-4056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4057/">CVE-2023-4057 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4057">CVE-2023-4057 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009775743" comment="MozillaFirefox-115.1.0-150200.152.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775744" comment="MozillaFirefox-branding-upstream-115.1.0-150200.152.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775745" comment="MozillaFirefox-devel-115.1.0-150200.152.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775746" comment="MozillaFirefox-translations-common-115.1.0-150200.152.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775747" comment="MozillaFirefox-translations-other-115.1.0-150200.152.99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4279" version="1" class="patch">
	<metadata>
		<title>Security update for jtidy (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212404" ref_url="https://bugzilla.suse.com/1212404" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-34623" ref_url="https://www.suse.com/security/cve/CVE-2023-34623/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015757.html" source="SUSE-SU"/>
		<description>
This update for jtidy fixes the following issues:

- CVE-2023-34623: Prevent crash when parsing documents with excessive nesting (bsc#1212404).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-02"/>
	<updated date="2023-08-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212404">SUSE bug 1212404</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34623/">CVE-2023-34623 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34623">CVE-2023-34623 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009772563" comment="jtidy-8.0-150200.11.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772564" comment="jtidy-javadoc-8.0-150200.11.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772565" comment="jtidy-scripts-8.0-150200.11.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4280" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1150305" ref_url="https://bugzilla.suse.com/1150305" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1207894" ref_url="https://bugzilla.suse.com/1207894" source="BUGZILLA"/>
		<reference ref_id="1208788" ref_url="https://bugzilla.suse.com/1208788" source="BUGZILLA"/>
		<reference ref_id="1211243" ref_url="https://bugzilla.suse.com/1211243" source="BUGZILLA"/>
		<reference ref_id="1211867" ref_url="https://bugzilla.suse.com/1211867" source="BUGZILLA"/>
		<reference ref_id="1212256" ref_url="https://bugzilla.suse.com/1212256" source="BUGZILLA"/>
		<reference ref_id="1212301" ref_url="https://bugzilla.suse.com/1212301" source="BUGZILLA"/>
		<reference ref_id="1212525" ref_url="https://bugzilla.suse.com/1212525" source="BUGZILLA"/>
		<reference ref_id="1212846" ref_url="https://bugzilla.suse.com/1212846" source="BUGZILLA"/>
		<reference ref_id="1212905" ref_url="https://bugzilla.suse.com/1212905" source="BUGZILLA"/>
		<reference ref_id="1213059" ref_url="https://bugzilla.suse.com/1213059" source="BUGZILLA"/>
		<reference ref_id="1213061" ref_url="https://bugzilla.suse.com/1213061" source="BUGZILLA"/>
		<reference ref_id="1213205" ref_url="https://bugzilla.suse.com/1213205" source="BUGZILLA"/>
		<reference ref_id="1213206" ref_url="https://bugzilla.suse.com/1213206" source="BUGZILLA"/>
		<reference ref_id="1213226" ref_url="https://bugzilla.suse.com/1213226" source="BUGZILLA"/>
		<reference ref_id="1213233" ref_url="https://bugzilla.suse.com/1213233" source="BUGZILLA"/>
		<reference ref_id="1213245" ref_url="https://bugzilla.suse.com/1213245" source="BUGZILLA"/>
		<reference ref_id="1213247" ref_url="https://bugzilla.suse.com/1213247" source="BUGZILLA"/>
		<reference ref_id="1213252" ref_url="https://bugzilla.suse.com/1213252" source="BUGZILLA"/>
		<reference ref_id="1213258" ref_url="https://bugzilla.suse.com/1213258" source="BUGZILLA"/>
		<reference ref_id="1213259" ref_url="https://bugzilla.suse.com/1213259" source="BUGZILLA"/>
		<reference ref_id="1213263" ref_url="https://bugzilla.suse.com/1213263" source="BUGZILLA"/>
		<reference ref_id="1213264" ref_url="https://bugzilla.suse.com/1213264" source="BUGZILLA"/>
		<reference ref_id="1213286" ref_url="https://bugzilla.suse.com/1213286" source="BUGZILLA"/>
		<reference ref_id="1213493" ref_url="https://bugzilla.suse.com/1213493" source="BUGZILLA"/>
		<reference ref_id="1213523" ref_url="https://bugzilla.suse.com/1213523" source="BUGZILLA"/>
		<reference ref_id="1213524" ref_url="https://bugzilla.suse.com/1213524" source="BUGZILLA"/>
		<reference ref_id="1213533" ref_url="https://bugzilla.suse.com/1213533" source="BUGZILLA"/>
		<reference ref_id="1213543" ref_url="https://bugzilla.suse.com/1213543" source="BUGZILLA"/>
		<reference ref_id="1213705" ref_url="https://bugzilla.suse.com/1213705" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<reference ref_id="CVE-2023-2985" ref_url="https://www.suse.com/security/cve/CVE-2023-2985/" source="CVE"/>
		<reference ref_id="CVE-2023-3117" ref_url="https://www.suse.com/security/cve/CVE-2023-3117/" source="CVE"/>
		<reference ref_id="CVE-2023-31248" ref_url="https://www.suse.com/security/cve/CVE-2023-31248/" source="CVE"/>
		<reference ref_id="CVE-2023-3390" ref_url="https://www.suse.com/security/cve/CVE-2023-3390/" source="CVE"/>
		<reference ref_id="CVE-2023-35001" ref_url="https://www.suse.com/security/cve/CVE-2023-35001/" source="CVE"/>
		<reference ref_id="CVE-2023-3812" ref_url="https://www.suse.com/security/cve/CVE-2023-3812/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015771.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2023-2985: Fixed an use-after-free vulnerability in hfsplus_put_super in fs/hfsplus/super.c that could allow a local user to cause a denial of service (bsc#1211867).
- CVE-2023-3117: Fixed an use-after-free vulnerability in the netfilter subsystem when processing named and anonymous sets in batch requests that could allow a local user with CAP_NET_ADMIN capability to crash or potentially escalate their privileges on the system (bsc#1213245).
- CVE-2023-3390: Fixed an use-after-free vulnerability in the netfilter subsystem in net/netfilter/nf_tables_api.c that could allow a local attacker with user access to cause a privilege escalation issue (bsc#1212846).
- CVE-2023-3812: Fixed an out-of-bounds memory access flaw in the TUN/TAP device driver functionality that could allow a local user to crash or potentially escalate their privileges on the system (bsc#1213543).
- CVE-2023-20593: Fixed a ZenBleed issue in 'Zen 2' CPUs that could allow an attacker to potentially access sensitive information (bsc#1213286).
- CVE-2023-31248: Fixed an use-after-free vulnerability in nft_chain_lookup_byid that could allow a local attacker to escalate their privilege (bsc#1213061).
- CVE-2023-35001: Fixed an out-of-bounds memory access flaw in nft_byteorder that could allow a local attacker to escalate their privilege (bsc#1213059).

The following non-security bugs were fixed:

- Dropped patch that caused issues with k3s (bsc#1213705).
- ASoC: Intel: sof_sdw: remove SOF_SDW_TGL_HDMI for MeteorLake devices (git-fixes).
- ASoC: SOF: topology: Fix logic for copying tuples (git-fixes).
- Bluetooth: ISO: Fix CIG auto-allocation to select configurable CIG (git-fixes).
- Bluetooth: ISO: consider right CIS when removing CIG at cleanup (git-fixes).
- Bluetooth: ISO: fix iso_conn related locking and validity issues (git-fixes).
- Bluetooth: ISO: use hci_sync for setting CIG parameters (git-fixes).
- Bluetooth: fix invalid-bdaddr quirk for non-persistent setup (git-fixes).
- Bluetooth: fix use-bdaddr-property quirk (git-fixes).
- Bluetooth: hci_bcm: do not mark valid bd_addr as invalid (git-fixes).
- Bluetooth: hci_event: call disconnect callback before deleting conn (git-fixes).
- Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_remove_adv_monitor() (git-fixes).
- Bluetooth: use RCU for hci_conn_params and iterate safely in hci_sync (git-fixes).
- Enable NXP SNVS RTC driver for i.MX 8MQ/8MP (jsc#PED-4758)
- PCI: s390: Fix use-after-free of PCI resources with per-function hotplug (bsc#1212525).
- PCI: vmd: Fix uninitialized variable usage in vmd_enable_domain() (git-fixes).
- Revert 'arm64: dts: zynqmp: Add address-cells property to interrupt (git-fixes)
- Revert 'drm/i915: Disable DSB usage for now' (git-fixes).
- USB: dwc2: Fix some error handling paths (git-fixes).
- USB: gadget: udc: core: Offload usb_udc_vbus_handler processing (git-fixes).
- USB: gadget: udc: core: Prevent soft_connect_store() race (git-fixes).
- USB: typec: Fix fast_role_swap_current show function (git-fixes).
- Update config and supported.conf files due to renaming.
- acpi: Fix suspend with Xen PV (git-fixes).
- adreno: Shutdown the GPU properly (git-fixes).
- arm64/mm: mark private VM_FAULT_X defines as vm_fault_t (git-fixes)
- arm64: dts: microchip: sparx5: do not use PSCI on reference boards (git-fixes)
- arm64: vdso: Pass (void *) to virt_to_page() (git-fixes)
- arm64: xor-neon: mark xor_arm64_neon_*() static (git-fixes)
- can: bcm: Fix UAF in bcm_proc_show() (git-fixes).
- ceph: add a dedicated private data for netfs rreq (bsc#1213205).
- ceph: fix blindly expanding the readahead windows (bsc#1213206).
- cifs: add a warning when the in-flight count goes negative (bsc#1193629).
- cifs: address unused variable warning (bsc#1193629).
- cifs: do all necessary checks for credits within or before locking (bsc#1193629).
- cifs: fix lease break oops in xfstest generic/098 (bsc#1193629).
- cifs: fix max_credits implementation (bsc#1193629).
- cifs: fix session state check in reconnect to avoid use-after-free issue (bsc#1193629).
- cifs: fix session state check in smb2_find_smb_ses (bsc#1193629).
- cifs: fix session state transition to avoid use-after-free issue (bsc#1193629).
- cifs: fix sockaddr comparison in iface_cmp (bsc#1193629).
- cifs: fix status checks in cifs_tree_connect (bsc#1193629).
- cifs: log session id when a matching ses is not found (bsc#1193629).
- cifs: new dynamic tracepoint to track ses not found errors (bsc#1193629).
- cifs: prevent use-after-free by freeing the cfile later (bsc#1193629).
- cifs: print all credit counters in DebugData (bsc#1193629).
- cifs: print client_guid in DebugData (bsc#1193629).
- cifs: print more detail when invalidate_inode_mapping fails (bsc#1193629).
- cifs: print nosharesock value while dumping mount options (bsc#1193629).
- codel: fix kernel-doc notation warnings (git-fixes).
- cpufreq: tegra194: Fix module loading (git-fixes).
- devlink: fix kernel-doc notation warnings (git-fixes).
- dma-buf/dma-resv: Stop leaking on krealloc() failure (git-fixes).
- drm/amd/amdgpu: introduce gc_*_mes_2.bin v2 (git-fixes).
- drm/amd/amdgpu: limit one queue per gang (git-fixes).
- drm/amd/amdgpu: update mes11 api def (git-fixes).
- drm/amd/display (gcc13): fix enum mismatch (git-fixes).
- drm/amd/display: Add Z8 allow states to z-state support list (git-fixes).
- drm/amd/display: Add debug option to skip PSR CRTC disable (git-fixes).
- drm/amd/display: Add minimum Z8 residency debug option (git-fixes).
- drm/amd/display: Add missing WA and MCLK validation (git-fixes).
- drm/amd/display: Change default Z8 watermark values (git-fixes).
- drm/amd/display: Correct DML calculation to align HW formula (git-fixes).
- drm/amd/display: Correct DML calculation to follow HW SPEC (git-fixes).
- drm/amd/display: Do not update DRR while BW optimizations pending (git-fixes).
- drm/amd/display: Enable HostVM based on rIOMMU active (git-fixes).
- drm/amd/display: Enforce 60us prefetch for 200Mhz DCFCLK modes (git-fixes).
- drm/amd/display: Ensure vmin and vmax adjust for DCE (git-fixes).
- drm/amd/display: Fix 4to1 MPC black screen with DPP RCO (git-fixes).
- drm/amd/display: Fix Z8 support configurations (git-fixes).
- drm/amd/display: Fix a test CalculatePrefetchSchedule() (git-fixes).
- drm/amd/display: Fix a test dml32_rq_dlg_get_rq_reg() (git-fixes).
- drm/amd/display: Have Payload Properly Created After Resume (git-fixes).
- drm/amd/display: Lowering min Z8 residency time (git-fixes).
- drm/amd/display: Reduce sdp bw after urgent to 90% (git-fixes).
- drm/amd/display: Refactor eDP PSR codes (git-fixes).
- drm/amd/display: Remove FPU guards from the DML folder (git-fixes).
- drm/amd/display: Remove optimization for VRR updates (git-fixes).
- drm/amd/display: Remove stutter only configurations (git-fixes).
- drm/amd/display: Update Z8 SR exit/enter latencies (git-fixes).
- drm/amd/display: Update Z8 watermarks for DCN314 (git-fixes).
- drm/amd/display: Update minimum stutter residency for DCN314 Z8 (git-fixes).
- drm/amd/display: filter out invalid bits in pipe_fuses (git-fixes).
- drm/amd/display: fix PSR-SU/DSC interoperability support (git-fixes).
- drm/amd/display: fix a divided-by-zero error (git-fixes).
- drm/amd/display: fixed dcn30+ underflow issue (git-fixes).
- drm/amd/display: limit timing for single dimm memory (git-fixes).
- drm/amd/display: populate subvp cmd info only for the top pipe (git-fixes).
- drm/amd/display: set dcn315 lb bpp to 48 (git-fixes).
- drm/amd/pm: add missing NotifyPowerSource message mapping for SMU13.0.7 (git-fixes).
- drm/amd/pm: avoid potential UBSAN issue on legacy asics (git-fixes).
- drm/amd/pm: conditionally disable pcie lane switching for some sienna_cichlid SKUs (git-fixes).
- drm/amd/pm: fix possible power mode mismatch between driver and PMFW (git-fixes).
- drm/amd/pm: resolve reboot exception for si oland (git-fixes).
- drm/amd/pm: reverse mclk and fclk clocks levels for SMU v13.0.4 (git-fixes).
- drm/amd/pm: reverse mclk clocks levels for SMU v13.0.5 (git-fixes).
- drm/amd/pm: workaround for compute workload type on some skus (git-fixes).
- drm/amd: Add a new helper for loading/validating microcode (git-fixes).
- drm/amd: Do not allow s0ix on APUs older than Raven (git-fixes).
- drm/amd: Load MES microcode during early_init (git-fixes).
- drm/amd: Use `amdgpu_ucode_*` helpers for MES (git-fixes).
- drm/amdgpu/gfx11: Adjust gfxoff before powergating on gfx11 as well (git-fixes).
- drm/amdgpu/gfx11: update gpu_clock_counter logic (git-fixes).
- drm/amdgpu/gfx: set cg flags to enter/exit safe mode (git-fixes).
- drm/amdgpu/gmc11: implement get_vbios_fb_size() (git-fixes).
- drm/amdgpu/jpeg: Remove harvest checking for JPEG3 (git-fixes).
- drm/amdgpu/mes11: enable reg active poll (git-fixes).
- drm/amdgpu/vcn: Disable indirect SRAM on Vangogh broken BIOSes (git-fixes).
- drm/amdgpu/vkms: relax timer deactivation by hrtimer_try_to_cancel (git-fixes).
- drm/amdgpu: Do not set struct drm_driver.output_poll_changed (git-fixes).
- drm/amdgpu: Fix desktop freezed after gpu-reset (git-fixes).
- drm/amdgpu: Fix memcpy() in sienna_cichlid_append_powerplay_table function (git-fixes).
- drm/amdgpu: Fix sdma v4 sw fini error (git-fixes).
- drm/amdgpu: Fix usage of UMC fill record in RAS (git-fixes).
- drm/amdgpu: Force signal hw_fences that are embedded in non-sched jobs (git-fixes).
- drm/amdgpu: add mes resume when do gfx post soft reset (git-fixes).
- drm/amdgpu: change reserved vram info print (git-fixes).
- drm/amdgpu: declare firmware for new MES 11.0.4 (git-fixes).
- drm/amdgpu: enable tmz by default for GC 11.0.1 (git-fixes).
- drm/amdgpu: fix amdgpu_irq_put call trace in gmc_v10_0_hw_fini (git-fixes).
- drm/amdgpu: fix amdgpu_irq_put call trace in gmc_v11_0_hw_fini (git-fixes).
- drm/amdgpu: fix an amdgpu_irq_put() issue in gmc_v9_0_hw_fini() (git-fixes).
- drm/amdgpu: refine get gpu clock counter method (git-fixes).
- drm/amdgpu: remove deprecated MES version vars (git-fixes).
- drm/amdgpu: reserve the old gc_11_0_*_mes.bin (git-fixes).
- drm/amdgpu: set gfx9 onwards APU atomics support to be true (git-fixes).
- drm/amdgpu: vcn_4_0 set instance 0 init sched score to 1 (git-fixes).
- drm/bridge: anx7625: Convert to i2c's .probe_new() (git-fixes).
- drm/bridge: anx7625: Fix refcount bug in anx7625_parse_dt() (git-fixes).
- drm/bridge: anx7625: Prevent endless probe loop (git-fixes).
- drm/bridge: it6505: Move a variable assignment behind a null pointer check in receive_timing_debugfs_show() (git-fixes).
- drm/bridge: tc358767: Switch to devm MIPI-DSI helpers (git-fixes).
- drm/bridge: tc358768: Add atomic_get_input_bus_fmts() implementation (git-fixes).
- drm/bridge: tc358768: fix TCLK_TRAILCNT computation (git-fixes).
- drm/bridge: tc358768: fix THS_TRAILCNT computation (git-fixes).
- drm/bridge: tc358768: fix THS_ZEROCNT computation (git-fixes).
- drm/bridge: ti-sn65dsi83: Fix enable error path (git-fixes).
- drm/client: Fix memory leak in drm_client_target_cloned (git-fixes).
- drm/display/dp_mst: Fix payload addition on a disconnected sink (git-fixes).
- drm/display: Do not block HDR_OUTPUT_METADATA on unknown EOTF (git-fixes).
- drm/drm_vma_manager: Add drm_vma_node_allow_once() (git-fixes).
- drm/dsc: fix DP_DSC_MAX_BPP_DELTA_* macro values (git-fixes).
- drm/dsc: fix drm_edp_dsc_sink_output_bpp() DPCD high byte usage (git-fixes).
- drm/etnaviv: move idle mapping reaping into separate function (git-fixes).
- drm/etnaviv: reap idle mapping if it does not match the softpin address (git-fixes).
- drm/i915/dp_mst: Add the MST topology state for modesetted CRTCs (bsc#1213493).
- drm/i915/fbdev: lock the fbdev obj before vma pin (git-fixes).
- drm/i915/gt: Cleanup partial engine discovery failures (git-fixes).
- drm/i915/guc: Add error-capture init warnings when needed (git-fixes).
- drm/i915/guc: Fix missing ecodes (git-fixes).
- drm/i915/guc: Limit scheduling properties to avoid overflow (git-fixes).
- drm/i915/guc: Rename GuC register state capture node to be more obvious (git-fixes).
- drm/i915/mtl: update scaler source and destination limits for MTL (git-fixes).
- drm/i915/sdvo: Grab mode_config.mutex during LVDS init to avoid WARNs (git-fixes).
- drm/i915/sseu: fix max_subslices array-index-out-of-bounds access (git-fixes).
- drm/i915/tc: Fix TC port link ref init for DP MST during HW readout (git-fixes).
- drm/i915: Allow panel fixed modes to have differing sync polarities (git-fixes).
- drm/i915: Check pipe source size when using skl+ scalers (git-fixes).
- drm/i915: Do panel VBT init early if the VBT declares an explicit panel type (git-fixes).
- drm/i915: Fix TypeC mode initialization during system resume (git-fixes).
- drm/i915: Fix a memory leak with reused mmap_offset (git-fixes).
- drm/i915: Fix negative value passed as remaining time (git-fixes).
- drm/i915: Fix one wrong caching mode enum usage (git-fixes).
- drm/i915: Introduce intel_panel_init_alloc() (git-fixes).
- drm/i915: Never return 0 if not all requests retired (git-fixes).
- drm/i915: Populate encoder-&gt;devdata for DSI on icl+ (git-fixes).
- drm/i915: Print return value on error (git-fixes).
- drm/i915: Use _MMIO_PIPE() for SKL_BOTTOM_COLOR (git-fixes).
- drm/meson: Fix return type of meson_encoder_cvbs_mode_valid() (git-fixes).
- drm/msm/a5xx: really check for A510 in a5xx_gpu_init (git-fixes).
- drm/msm/adreno: Simplify read64/write64 helpers (git-fixes).
- drm/msm/adreno: fix runtime PM imbalance at unbind (git-fixes).
- drm/msm/disp/dpu: get timing engine status from intf status register (git-fixes).
- drm/msm/dpu: Add DSC hardware blocks to register snapshot (git-fixes).
- drm/msm/dpu: Assign missing writeback log_mask (git-fixes).
- drm/msm/dpu: Set DPU_DATA_HCTL_EN for in INTF_SC7180_MASK (git-fixes).
- drm/msm/dpu: clean up dpu_kms_get_clk_rate() returns (git-fixes).
- drm/msm/dpu: set DSC flush bit correctly at MDP CTL flush register (git-fixes).
- drm/msm/hdmi: use devres helper for runtime PM management (git-fixes).
- drm/panel: boe-tv101wum-nl6: Ensure DSI writes succeed during disable (git-fixes).
- drm/panel: simple: Add Powertip PH800480T013 drm_display_mode flags (git-fixes).
- drm/panel: simple: Add connector_type for innolux_at043tn24 (git-fixes).
- drm/rockchip: dw_hdmi: cleanup drm encoder during unbind (git-fixes).
- drm/ttm: Do not leak a resource on swapout move error (git-fixes).
- drm/virtio: Fix memory leak in virtio_gpu_object_create() (git-fixes).
- drm/virtio: Simplify error handling of virtio_gpu_object_create() (git-fixes).
- drm/vmwgfx: Refactor resource manager's hashtable to use linux/hashtable implementation (git-fixes).
- drm/vmwgfx: Refactor resource validation hashtable to use linux/hashtable implementation (git-fixes).
- drm/vmwgfx: Refactor ttm reference object hashtable to use linux/hashtable (git-fixes).
- drm/vmwgfx: Remove ttm object hashtable (git-fixes).
- drm/vmwgfx: Remove vmwgfx_hashtab (git-fixes).
- drm/vmwgfx: Write the driver id registers (git-fixes).
- drm: Add fixed-point helper to get rounded integer values (git-fixes).
- drm: Add missing DP DSC extended capability definitions (git-fixes).
- drm: Optimize drm buddy top-down allocation method (git-fixes).
- drm: buddy_allocator: Fix buddy allocator init on 32-bit systems (git-fixes).
- drm: panel-orientation-quirks: Add quirk for DynaBook K50 (git-fixes).
- drm: rcar-du: Add quirk for H3 ES1.x pclk workaround (git-fixes).
- drm: rcar-du: Fix setting a reserved bit in DPLLCR (git-fixes).
- drm: use mgr-&gt;dev in drm_dbg_kms in drm_dp_add_payload_part2 (git-fixes).
- fuse: ioctl: translate ENOSYS in outarg (bsc#1213524).
- fuse: revalidate: do not invalidate if interrupted (bsc#1213523).
- i2c: tegra: Set ACPI node as primary fwnode (bsc#1213226).
- irqchip/gic-v3: Claim iomem resources (bsc#1213533)
- irqchip/gicv3: Handle resource request failure consistently (bsc#1213533)
- irqchip/gicv3: Workaround for NVIDIA erratum T241-FABRIC-4 (bsc#1213533)
- kABI: do not check external trampolines for signature (kabi bsc#1207894 bsc#1211243).
- kabi/severities: Add VAS symbols changed due to recent fix VAS accelerators are directly tied to the architecture, there is no reason to have out-of-tree production drivers
- kabi/severities: ignore kABI of i915 module It's exported only for its sub-module, not really used by externals
- kabi/severities: ignore kABI of vmwgfx The driver exports a function unnecessarily without used by anyone else. Ignore the kABI changes.
- memcg: drop kmem.limit_in_bytes (bsc#1208788, bsc#1212905).
- net: mana: Add support for vlan tagging (bsc#1212301).
- net: phy: prevent stale pointer dereference in phy_init() (git-fixes).
- net: qrtr: Fix an uninit variable access bug in qrtr_tx_resume() (git-fixes).
- net: qrtr: start MHI channel after endpoit creation (git-fixes).
- nilfs2: reject devices with insufficient block count (git-fixes).
- ocfs2: Switch to security_inode_init_security() (git-fixes).
- ocfs2: check new file size on fallocate call (git-fixes).
- ocfs2: fix use-after-free when unmounting read-only filesystem (git-fixes).
- perf/x86/amd/core: Always clear status for idx (bsc#1213233).
- pie: fix kernel-doc notation warning (git-fixes).
- powerpc/64: Only WARN if __pa()/__va() called with bad addresses (bsc#1194869).
- powerpc/64s: Fix VAS mm use after free (bsc#1194869).
- powerpc/book3s64/mm: Fix DirectMap stats in /proc/meminfo (bsc#1194869).
- powerpc/bpf: Fix use of user_pt_regs in uapi (bsc#1194869).
- powerpc/ftrace: Remove ftrace init tramp once kernel init is complete (bsc#1194869).
- powerpc/interrupt: Do not read MSR from interrupt_exit_kernel_prepare() (bsc#1194869).
- powerpc/mm/dax: Fix the condition when checking if altmap vmemap can cross-boundary (bsc#1150305 ltc#176097 git-fixes).
- powerpc/mm: Switch obsolete dssall to .long (bsc#1194869).
- powerpc/powernv/sriov: perform null check on iov before dereferencing iov (bsc#1194869).
- powerpc/powernv/vas: Assign real address to rx_fifo in vas_rx_win_attr (bsc#1194869).
- powerpc/prom_init: Fix kernel config grep (bsc#1194869).
- powerpc/pseries/vas: Hold mmap_mutex after mmap lock during window close (jsc#PED-542 git-fixes).
- powerpc/secvar: fix refcount leak in format_show() (bsc#1194869).
- powerpc/xics: fix refcount leak in icp_opal_init() (bsc#1194869).
- powerpc: clean vdso32 and vdso64 directories (bsc#1194869).
- powerpc: define get_cycles macro for arch-override (bsc#1194869).
- powerpc: update ppc_save_regs to save current r1 in pt_regs (bsc#1194869).
- rpm/check-for-config-changes: ignore also RISCV_ISA_* and DYNAMIC_SIGFRAME They depend on CONFIG_TOOLCHAIN_HAS_*.
- rsi: remove kernel-doc comment marker (git-fixes).
- s390/ap: fix status returned by ap_aqic() (git-fixes bsc#1213259).
- s390/ap: fix status returned by ap_qact() (git-fixes bsc#1213258).
- s390/debug: add _ASM_S390_ prefix to header guard (git-fixes bsc#1213263).
- s390/pci: clean up left over special treatment for function zero (bsc#1212525).
- s390/pci: only add specific device in zpci_bus_scan_device() (bsc#1212525).
- s390/pci: remove redundant pci_bus_add_devices() on new bus (bsc#1212525).
- s390/percpu: add READ_ONCE() to arch_this_cpu_to_op_simple() (git-fixes bsc#1213252).
- s390: define RUNTIME_DISCARD_EXIT to fix link error with GNU ld &amp;lt; 2.36 (git-fixes bsc#1213264).
- s390: discard .interp section (git-fixes bsc#1213247).
- security: keys: Modify mismatched function name (git-fixes).
- selftests/ir: fix build with ancient kernel headers (git-fixes).
- selftests: cgroup: fix unsigned comparison with less than zero (git-fixes).
- selftests: forwarding: Fix packet matching in mirroring selftests (git-fixes).
- selftests: tc: add 'ct' action kconfig dep (git-fixes).
- selftests: tc: add ConnTrack procfs kconfig (git-fixes).
- selftests: tc: set timeout to 15 minutes (git-fixes).
- signal/powerpc: On swapcontext failure force SIGSEGV (bsc#1194869).
- signal: Replace force_sigsegv(SIGSEGV) with force_fatal_sig(SIGSEGV) (bsc#1194869).
- smb3: do not reserve too many oplock credits (bsc#1193629).
- smb3: missing null check in SMB2_change_notify (bsc#1193629).
- smb: client: fix broken file attrs with nodfs mounts (bsc#1193629).
- smb: client: fix missed ses refcounting (git-fixes).
- smb: client: fix parsing of source mount option (bsc#1193629).
- smb: client: fix shared DFS root mounts with different prefixes (bsc#1193629).
- smb: client: fix warning in CIFSFindFirst() (bsc#1193629).
- smb: client: fix warning in CIFSFindNext() (bsc#1193629).
- smb: client: fix warning in cifs_match_super() (bsc#1193629).
- smb: client: fix warning in cifs_smb3_do_mount() (bsc#1193629).
- smb: client: fix warning in generic_ip_connect() (bsc#1193629).
- smb: client: improve DFS mount check (bsc#1193629).
- smb: client: remove redundant pointer 'server' (bsc#1193629).
- smb: delete an unnecessary statement (bsc#1193629).
- smb: move client and server files to common directory fs/smb (bsc#1193629).
- smb: remove obsolete comment (bsc#1193629).
- soundwire: bus_type: Avoid lockdep assert in sdw_drv_probe() (git-fixes).
- soundwire: cadence: Drain the RX FIFO after an IO timeout (git-fixes).
- soundwire: stream: Add missing clear of alloc_slave_rt (git-fixes).
- spi: bcm63xx: fix max prepend length (git-fixes).
- swsmu/amdgpu_smu: Fix the wrong if-condition (git-fixes).
- tpm: tpm_vtpm_proxy: fix a race condition in /dev/vtpmx creation (git-fixes).
- wifi: airo: avoid uninitialized warning in airo_get_rate() (git-fixes).
- wifi: ath10k: Trigger STA disconnect after reconfig complete on hardware restart (git-fixes).
- wifi: ath11k: Add missing check for ioremap (git-fixes).
- wifi: rtw89: debug: fix error code in rtw89_debug_priv_send_h2c_set() (git-fixes).
- x86/amd_nb: Add PCI ID for family 19h model 78h (git-fixes).
- x86/platform/uv: Add platform resolving #defines for misc GAM_MMIOH_REDIRECT* (bsc#1212256 jsc#PED-4718).
- x86/platform/uv: Fix printed information in calc_mmioh_map (bsc#1212256 jsc#PED-4718).
- x86/platform/uv: Helper functions for allocating and freeing conversion tables (bsc#1212256 jsc#PED-4718).
- x86/platform/uv: Introduce helper function uv_pnode_to_socket (bsc#1212256 jsc#PED-4718).
- x86/platform/uv: Remove remaining BUG_ON() and BUG() calls (bsc#1212256 jsc#PED-4718).
- x86/platform/uv: UV support for sub-NUMA clustering (bsc#1212256 jsc#PED-4718).
- x86/platform/uv: Update UV platform code for SNC (bsc#1212256 jsc#PED-4718).
- x86/platform/uv: When searching for minimums, start at INT_MAX not 99999 (bsc#1212256 jsc#PED-4718).
- x86: Fix .brk attribute in linker script (git-fixes).
- xfs: clean up the rtbitmap fsmap backend (git-fixes).
- xfs: do not deplete the reserve pool when trying to shrink the fs (git-fixes).
- xfs: do not reverse order of items in bulk AIL insertion (git-fixes).
- xfs: fix getfsmap reporting past the last rt extent (git-fixes).
- xfs: fix integer overflows in the fsmap rtbitmap and logdev backends (git-fixes).
- xfs: fix interval filtering in multi-step fsmap queries (git-fixes).
- xfs: fix logdev fsmap query result filtering (git-fixes).
- xfs: fix off-by-one error when the last rt extent is in use (git-fixes).
- xfs: fix uninitialized variable access (git-fixes).
- xfs: make fsmap backend function key parameters const (git-fixes).
- xfs: make the record pointer passed to query_range functions const (git-fixes).
- xfs: pass explicit mount pointer to rtalloc query functions (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-03"/>
	<updated date="2023-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1150305">SUSE bug 1150305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207894">SUSE bug 1207894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208788">SUSE bug 1208788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211243">SUSE bug 1211243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211867">SUSE bug 1211867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212256">SUSE bug 1212256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212301">SUSE bug 1212301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212525">SUSE bug 1212525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212846">SUSE bug 1212846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212905">SUSE bug 1212905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213059">SUSE bug 1213059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213061">SUSE bug 1213061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213205">SUSE bug 1213205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213206">SUSE bug 1213206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213226">SUSE bug 1213226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213233">SUSE bug 1213233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213245">SUSE bug 1213245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213247">SUSE bug 1213247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213252">SUSE bug 1213252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213258">SUSE bug 1213258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213259">SUSE bug 1213259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213263">SUSE bug 1213263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213264">SUSE bug 1213264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213286">SUSE bug 1213286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213493">SUSE bug 1213493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213523">SUSE bug 1213523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213524">SUSE bug 1213524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213533">SUSE bug 1213533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213543">SUSE bug 1213543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213705">SUSE bug 1213705</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2985/">CVE-2023-2985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2985">CVE-2023-2985 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3117/">CVE-2023-3117 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3117">CVE-2023-3117 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31248/">CVE-2023-31248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31248">CVE-2023-31248 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3390/">CVE-2023-3390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3390">CVE-2023-3390 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35001/">CVE-2023-35001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35001">CVE-2023-35001 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3812/">CVE-2023-3812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3812">CVE-2023-3812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009775849" comment="cluster-md-kmp-64kb-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775850" comment="cluster-md-kmp-default-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775851" comment="dlm-kmp-64kb-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775852" comment="dlm-kmp-default-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775853" comment="dtb-allwinner-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775854" comment="dtb-altera-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775855" comment="dtb-amazon-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775856" comment="dtb-amd-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775857" comment="dtb-amlogic-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775858" comment="dtb-apm-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775859" comment="dtb-apple-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775860" comment="dtb-arm-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775861" comment="dtb-broadcom-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775862" comment="dtb-cavium-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775863" comment="dtb-exynos-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775864" comment="dtb-freescale-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775865" comment="dtb-hisilicon-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775866" comment="dtb-lg-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775867" comment="dtb-marvell-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775868" comment="dtb-mediatek-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775869" comment="dtb-nvidia-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775870" comment="dtb-qcom-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775871" comment="dtb-renesas-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775872" comment="dtb-rockchip-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775873" comment="dtb-socionext-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775874" comment="dtb-sprd-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775875" comment="dtb-xilinx-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775876" comment="gfs2-kmp-64kb-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775877" comment="gfs2-kmp-default-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775878" comment="kernel-64kb-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775879" comment="kernel-64kb-devel-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775880" comment="kernel-64kb-extra-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775881" comment="kernel-64kb-livepatch-devel-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775882" comment="kernel-64kb-optional-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775883" comment="kernel-debug-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775884" comment="kernel-debug-devel-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775885" comment="kernel-debug-livepatch-devel-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775886" comment="kernel-debug-vdso-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775887" comment="kernel-default-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775888" comment="kernel-default-base-5.14.21-150500.55.12.1.150500.6.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775889" comment="kernel-default-base-rebuild-5.14.21-150500.55.12.1.150500.6.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775890" comment="kernel-default-devel-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775891" comment="kernel-default-extra-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775892" comment="kernel-default-livepatch-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775893" comment="kernel-default-livepatch-devel-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775894" comment="kernel-default-optional-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775895" comment="kernel-default-vdso-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775896" comment="kernel-devel-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775897" comment="kernel-docs-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775898" comment="kernel-docs-html-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775899" comment="kernel-kvmsmall-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775900" comment="kernel-kvmsmall-devel-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775901" comment="kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775902" comment="kernel-kvmsmall-vdso-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775903" comment="kernel-macros-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775904" comment="kernel-obs-build-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775905" comment="kernel-obs-qa-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775906" comment="kernel-source-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775907" comment="kernel-source-vanilla-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775908" comment="kernel-syms-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775909" comment="kernel-zfcpdump-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775910" comment="kselftests-kmp-64kb-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775911" comment="kselftests-kmp-default-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775912" comment="ocfs2-kmp-64kb-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775913" comment="ocfs2-kmp-default-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775914" comment="reiserfs-kmp-64kb-5.14.21-150500.55.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775915" comment="reiserfs-kmp-default-5.14.21-150500.55.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4281" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1150305" ref_url="https://bugzilla.suse.com/1150305" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1207894" ref_url="https://bugzilla.suse.com/1207894" source="BUGZILLA"/>
		<reference ref_id="1208788" ref_url="https://bugzilla.suse.com/1208788" source="BUGZILLA"/>
		<reference ref_id="1211243" ref_url="https://bugzilla.suse.com/1211243" source="BUGZILLA"/>
		<reference ref_id="1211867" ref_url="https://bugzilla.suse.com/1211867" source="BUGZILLA"/>
		<reference ref_id="1212256" ref_url="https://bugzilla.suse.com/1212256" source="BUGZILLA"/>
		<reference ref_id="1212301" ref_url="https://bugzilla.suse.com/1212301" source="BUGZILLA"/>
		<reference ref_id="1212525" ref_url="https://bugzilla.suse.com/1212525" source="BUGZILLA"/>
		<reference ref_id="1212846" ref_url="https://bugzilla.suse.com/1212846" source="BUGZILLA"/>
		<reference ref_id="1212905" ref_url="https://bugzilla.suse.com/1212905" source="BUGZILLA"/>
		<reference ref_id="1213059" ref_url="https://bugzilla.suse.com/1213059" source="BUGZILLA"/>
		<reference ref_id="1213061" ref_url="https://bugzilla.suse.com/1213061" source="BUGZILLA"/>
		<reference ref_id="1213205" ref_url="https://bugzilla.suse.com/1213205" source="BUGZILLA"/>
		<reference ref_id="1213206" ref_url="https://bugzilla.suse.com/1213206" source="BUGZILLA"/>
		<reference ref_id="1213226" ref_url="https://bugzilla.suse.com/1213226" source="BUGZILLA"/>
		<reference ref_id="1213233" ref_url="https://bugzilla.suse.com/1213233" source="BUGZILLA"/>
		<reference ref_id="1213245" ref_url="https://bugzilla.suse.com/1213245" source="BUGZILLA"/>
		<reference ref_id="1213247" ref_url="https://bugzilla.suse.com/1213247" source="BUGZILLA"/>
		<reference ref_id="1213252" ref_url="https://bugzilla.suse.com/1213252" source="BUGZILLA"/>
		<reference ref_id="1213258" ref_url="https://bugzilla.suse.com/1213258" source="BUGZILLA"/>
		<reference ref_id="1213259" ref_url="https://bugzilla.suse.com/1213259" source="BUGZILLA"/>
		<reference ref_id="1213263" ref_url="https://bugzilla.suse.com/1213263" source="BUGZILLA"/>
		<reference ref_id="1213264" ref_url="https://bugzilla.suse.com/1213264" source="BUGZILLA"/>
		<reference ref_id="1213286" ref_url="https://bugzilla.suse.com/1213286" source="BUGZILLA"/>
		<reference ref_id="1213311" ref_url="https://bugzilla.suse.com/1213311" source="BUGZILLA"/>
		<reference ref_id="1213493" ref_url="https://bugzilla.suse.com/1213493" source="BUGZILLA"/>
		<reference ref_id="1213523" ref_url="https://bugzilla.suse.com/1213523" source="BUGZILLA"/>
		<reference ref_id="1213524" ref_url="https://bugzilla.suse.com/1213524" source="BUGZILLA"/>
		<reference ref_id="1213533" ref_url="https://bugzilla.suse.com/1213533" source="BUGZILLA"/>
		<reference ref_id="1213543" ref_url="https://bugzilla.suse.com/1213543" source="BUGZILLA"/>
		<reference ref_id="1213705" ref_url="https://bugzilla.suse.com/1213705" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<reference ref_id="CVE-2023-2985" ref_url="https://www.suse.com/security/cve/CVE-2023-2985/" source="CVE"/>
		<reference ref_id="CVE-2023-3117" ref_url="https://www.suse.com/security/cve/CVE-2023-3117/" source="CVE"/>
		<reference ref_id="CVE-2023-31248" ref_url="https://www.suse.com/security/cve/CVE-2023-31248/" source="CVE"/>
		<reference ref_id="CVE-2023-3390" ref_url="https://www.suse.com/security/cve/CVE-2023-3390/" source="CVE"/>
		<reference ref_id="CVE-2023-35001" ref_url="https://www.suse.com/security/cve/CVE-2023-35001/" source="CVE"/>
		<reference ref_id="CVE-2023-3812" ref_url="https://www.suse.com/security/cve/CVE-2023-3812/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030786.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2023-3812: Fixed an out-of-bounds memory access flaw in the TUN/TAP device driver functionality that could allow a local user to crash or potentially escalate their privileges on the system (bsc#1213543).
- CVE-2023-35001: Fixed an out-of-bounds memory access flaw in nft_byteorder that could allow a local attacker to escalate their privilege (bsc#1213059).
- CVE-2023-31248: Fixed an use-after-free vulnerability in nft_chain_lookup_byid that could allow a local attacker to escalate their privilege (bsc#1213061).
- CVE-2023-3390: Fixed an use-after-free vulnerability in the netfilter subsystem in net/netfilter/nf_tables_api.c that could allow a local attacker with user access to cause a privilege escalation issue (bsc#1212846).
- CVE-2023-3117: Fixed an use-after-free vulnerability in the netfilter subsystem when processing named and anonymous sets in batch requests that could allow a local user with CAP_NET_ADMIN capability to crash or potentially escalate their privileges on the system (bsc#1213245).
- CVE-2023-20593: Fixed a ZenBleed issue in 'Zen 2' CPUs that could allow an attacker to potentially access sensitive information (bsc#1213286).
- CVE-2023-2985: Fixed an use-after-free vulnerability in hfsplus_put_super in fs/hfsplus/super.c that could allow a local user to cause a denial of service (bsc#1211867).

The following non-security bugs were fixed:

- Enable NXP SNVS RTC driver for i.MX 8MQ/8MP (jsc#PED-4758).
- Support sub-NUMA clustering on UV (jsc#PED-4718).
- Fixed multipath not supported error (bsc#1213311).
- Revert 'arm64: dts: zynqmp: Add address-cells property to interrupt (git-fixes)
- Revert 'drm/i915: Disable DSB usage for now' (git-fixes).
- acpi: Fix suspend with Xen PV (git-fixes).
- adreno: Shutdown the GPU properly (git-fixes).
- arm64/mm: mark private VM_FAULT_X defines as vm_fault_t (git-fixes)
- arm64: dts: microchip: sparx5: do not use PSCI on reference boards (git-fixes)
- arm64: vdso: Pass (void *) to virt_to_page() (git-fixes)
- arm64: xor-neon: mark xor_arm64_neon_*() static (git-fixes)
- asoc: Intel: sof_sdw: remove SOF_SDW_TGL_HDMI for MeteorLake devices (git-fixes).
- asoc: SOF: topology: Fix logic for copying tuples (git-fixes).
- bluetooth: ISO: Fix CIG auto-allocation to select configurable CIG (git-fixes).
- bluetooth: ISO: consider right CIS when removing CIG at cleanup (git-fixes).
- bluetooth: ISO: fix iso_conn related locking and validity issues (git-fixes).
- bluetooth: ISO: use hci_sync for setting CIG parameters (git-fixes).
- bluetooth: fix invalid-bdaddr quirk for non-persistent setup (git-fixes).
- bluetooth: fix use-bdaddr-property quirk (git-fixes).
- bluetooth: hci_bcm: do not mark valid bd_addr as invalid (git-fixes).
- bluetooth: hci_event: call disconnect callback before deleting conn (git-fixes).
- bluetooth: hci_sync: Avoid use-after-free in dbg for hci_remove_adv_monitor() (git-fixes).
- bluetooth: use RCU for hci_conn_params and iterate safely in hci_sync (git-fixes).
- can: bcm: Fix UAF in bcm_proc_show() (git-fixes).
- ceph: add a dedicated private data for netfs rreq (bsc#1213205).
- ceph: fix blindly expanding the readahead windows (bsc#1213206).
- cifs: add a warning when the in-flight count goes negative (bsc#1193629).
- cifs: address unused variable warning (bsc#1193629).
- cifs: do all necessary checks for credits within or before locking (bsc#1193629).
- cifs: fix lease break oops in xfstest generic/098 (bsc#1193629).
- cifs: fix max_credits implementation (bsc#1193629).
- cifs: fix session state check in reconnect to avoid use-after-free issue (bsc#1193629).
- cifs: fix session state check in smb2_find_smb_ses (bsc#1193629).
- cifs: fix session state transition to avoid use-after-free issue (bsc#1193629).
- cifs: fix sockaddr comparison in iface_cmp (bsc#1193629).
- cifs: fix status checks in cifs_tree_connect (bsc#1193629).
- cifs: log session id when a matching ses is not found (bsc#1193629).
- cifs: new dynamic tracepoint to track ses not found errors (bsc#1193629).
- cifs: prevent use-after-free by freeing the cfile later (bsc#1193629).
- cifs: print all credit counters in DebugData (bsc#1193629).
- cifs: print client_guid in DebugData (bsc#1193629).
- cifs: print more detail when invalidate_inode_mapping fails (bsc#1193629).
- cifs: print nosharesock value while dumping mount options (bsc#1193629).
- codel: fix kernel-doc notation warnings (git-fixes).
- cpufreq: tegra194: Fix module loading (git-fixes).
- devlink: fix kernel-doc notation warnings (git-fixes).
- dma-buf/dma-resv: Stop leaking on krealloc() failure (git-fixes).
- drm/amd/amdgpu: introduce gc_*_mes_2.bin v2 (git-fixes).
- drm/amd/amdgpu: limit one queue per gang (git-fixes).
- drm/amd/amdgpu: update mes11 api def (git-fixes).
- drm/amd/display (gcc13): fix enum mismatch (git-fixes).
- drm/amd/display: Add Z8 allow states to z-state support list (git-fixes).
- drm/amd/display: Add debug option to skip PSR CRTC disable (git-fixes).
- drm/amd/display: Add minimum Z8 residency debug option (git-fixes).
- drm/amd/display: Add missing WA and MCLK validation (git-fixes).
- drm/amd/display: Change default Z8 watermark values (git-fixes).
- drm/amd/display: Correct DML calculation to align HW formula (git-fixes).
- drm/amd/display: Correct DML calculation to follow HW SPEC (git-fixes).
- drm/amd/display: Do not update DRR while BW optimizations pending (git-fixes).
- drm/amd/display: Enable HostVM based on rIOMMU active (git-fixes).
- drm/amd/display: Enforce 60us prefetch for 200Mhz DCFCLK modes (git-fixes).
- drm/amd/display: Ensure vmin and vmax adjust for DCE (git-fixes).
- drm/amd/display: Fix 4to1 MPC black screen with DPP RCO (git-fixes).
- drm/amd/display: Fix Z8 support configurations (git-fixes).
- drm/amd/display: Fix a test CalculatePrefetchSchedule() (git-fixes).
- drm/amd/display: Fix a test dml32_rq_dlg_get_rq_reg() (git-fixes).
- drm/amd/display: Have Payload Properly Created After Resume (git-fixes).
- drm/amd/display: Lowering min Z8 residency time (git-fixes).
- drm/amd/display: Reduce sdp bw after urgent to 90% (git-fixes).
- drm/amd/display: Refactor eDP PSR codes (git-fixes).
- drm/amd/display: Remove FPU guards from the DML folder (git-fixes).
- drm/amd/display: Remove optimization for VRR updates (git-fixes).
- drm/amd/display: Remove stutter only configurations (git-fixes).
- drm/amd/display: Update Z8 SR exit/enter latencies (git-fixes).
- drm/amd/display: Update Z8 watermarks for DCN314 (git-fixes).
- drm/amd/display: Update minimum stutter residency for DCN314 Z8 (git-fixes).
- drm/amd/display: filter out invalid bits in pipe_fuses (git-fixes).
- drm/amd/display: fix PSR-SU/DSC interoperability support (git-fixes).
- drm/amd/display: fix a divided-by-zero error (git-fixes).
- drm/amd/display: fixed dcn30+ underflow issue (git-fixes).
- drm/amd/display: limit timing for single dimm memory (git-fixes).
- drm/amd/display: populate subvp cmd info only for the top pipe (git-fixes).
- drm/amd/display: set dcn315 lb bpp to 48 (git-fixes).
- drm/amd/pm: add missing NotifyPowerSource message mapping for SMU13.0.7 (git-fixes).
- drm/amd/pm: avoid potential UBSAN issue on legacy asics (git-fixes).
- drm/amd/pm: conditionally disable pcie lane switching for some sienna_cichlid SKUs (git-fixes).
- drm/amd/pm: fix possible power mode mismatch between driver and PMFW (git-fixes).
- drm/amd/pm: resolve reboot exception for si oland (git-fixes).
- drm/amd/pm: reverse mclk and fclk clocks levels for SMU v13.0.4 (git-fixes).
- drm/amd/pm: reverse mclk clocks levels for SMU v13.0.5 (git-fixes).
- drm/amd/pm: workaround for compute workload type on some skus (git-fixes).
- drm/amd: Add a new helper for loading/validating microcode (git-fixes).
- drm/amd: Do not allow s0ix on APUs older than Raven (git-fixes).
- drm/amd: Load MES microcode during early_init (git-fixes).
- drm/amd: Use `amdgpu_ucode_*` helpers for MES (git-fixes).
- drm/amdgpu/gfx11: Adjust gfxoff before powergating on gfx11 as well (git-fixes).
- drm/amdgpu/gfx11: update gpu_clock_counter logic (git-fixes).
- drm/amdgpu/gfx: set cg flags to enter/exit safe mode (git-fixes).
- drm/amdgpu/gmc11: implement get_vbios_fb_size() (git-fixes).
- drm/amdgpu/jpeg: Remove harvest checking for JPEG3 (git-fixes).
- drm/amdgpu/mes11: enable reg active poll (git-fixes).
- drm/amdgpu/vcn: Disable indirect SRAM on Vangogh broken BIOSes (git-fixes).
- drm/amdgpu/vkms: relax timer deactivation by hrtimer_try_to_cancel (git-fixes).
- drm/amdgpu: Do not set struct drm_driver.output_poll_changed (git-fixes).
- drm/amdgpu: Fix desktop freezed after gpu-reset (git-fixes).
- drm/amdgpu: Fix memcpy() in sienna_cichlid_append_powerplay_table function (git-fixes).
- drm/amdgpu: Fix sdma v4 sw fini error (git-fixes).
- drm/amdgpu: Fix usage of UMC fill record in RAS (git-fixes).
- drm/amdgpu: Force signal hw_fences that are embedded in non-sched jobs (git-fixes).
- drm/amdgpu: add mes resume when do gfx post soft reset (git-fixes).
- drm/amdgpu: change reserved vram info print (git-fixes).
- drm/amdgpu: declare firmware for new MES 11.0.4 (git-fixes).
- drm/amdgpu: enable tmz by default for GC 11.0.1 (git-fixes).
- drm/amdgpu: fix amdgpu_irq_put call trace in gmc_v10_0_hw_fini (git-fixes).
- drm/amdgpu: fix amdgpu_irq_put call trace in gmc_v11_0_hw_fini (git-fixes).
- drm/amdgpu: fix an amdgpu_irq_put() issue in gmc_v9_0_hw_fini() (git-fixes).
- drm/amdgpu: refine get gpu clock counter method (git-fixes).
- drm/amdgpu: remove deprecated MES version vars (git-fixes).
- drm/amdgpu: reserve the old gc_11_0_*_mes.bin (git-fixes).
- drm/amdgpu: set gfx9 onwards APU atomics support to be true (git-fixes).
- drm/amdgpu: vcn_4_0 set instance 0 init sched score to 1 (git-fixes).
- drm/bridge: anx7625: Convert to i2c's .probe_new() (git-fixes).
- drm/bridge: anx7625: Fix refcount bug in anx7625_parse_dt() (git-fixes).
- drm/bridge: anx7625: Prevent endless probe loop (git-fixes).
- drm/bridge: it6505: Move a variable assignment behind a null pointer check in receive_timing_debugfs_show() (git-fixes).
- drm/bridge: tc358767: Switch to devm MIPI-DSI helpers (git-fixes).
- drm/bridge: tc358768: Add atomic_get_input_bus_fmts() implementation (git-fixes).
- drm/bridge: tc358768: fix TCLK_TRAILCNT computation (git-fixes).
- drm/bridge: tc358768: fix THS_TRAILCNT computation (git-fixes).
- drm/bridge: tc358768: fix THS_ZEROCNT computation (git-fixes).
- drm/bridge: ti-sn65dsi83: Fix enable error path (git-fixes).
- drm/client: Fix memory leak in drm_client_target_cloned (git-fixes).
- drm/display/dp_mst: Fix payload addition on a disconnected sink (git-fixes).
- drm/display: Do not block HDR_OUTPUT_METADATA on unknown EOTF (git-fixes).
- drm/drm_vma_manager: Add drm_vma_node_allow_once() (git-fixes).
- drm/dsc: fix DP_DSC_MAX_BPP_DELTA_* macro values (git-fixes).
- drm/dsc: fix drm_edp_dsc_sink_output_bpp() DPCD high byte usage (git-fixes).
- drm/etnaviv: move idle mapping reaping into separate function (git-fixes).
- drm/etnaviv: reap idle mapping if it does not match the softpin address (git-fixes).
- drm/i915/dp_mst: Add the MST topology state for modesetted CRTCs (bsc#1213493).
- drm/i915/fbdev: lock the fbdev obj before vma pin (git-fixes).
- drm/i915/gt: Cleanup partial engine discovery failures (git-fixes).
- drm/i915/guc: Add error-capture init warnings when needed (git-fixes).
- drm/i915/guc: Fix missing ecodes (git-fixes).
- drm/i915/guc: Limit scheduling properties to avoid overflow (git-fixes).
- drm/i915/guc: Rename GuC register state capture node to be more obvious (git-fixes).
- drm/i915/mtl: update scaler source and destination limits for MTL (git-fixes).
- drm/i915/sdvo: Grab mode_config.mutex during LVDS init to avoid WARNs (git-fixes).
- drm/i915/sseu: fix max_subslices array-index-out-of-bounds access (git-fixes).
- drm/i915/tc: Fix TC port link ref init for DP MST during HW readout (git-fixes).
- drm/i915: Allow panel fixed modes to have differing sync polarities (git-fixes).
- drm/i915: Check pipe source size when using skl+ scalers (git-fixes).
- drm/i915: Do panel VBT init early if the VBT declares an explicit panel type (git-fixes).
- drm/i915: Fix TypeC mode initialization during system resume (git-fixes).
- drm/i915: Fix a memory leak with reused mmap_offset (git-fixes).
- drm/i915: Fix negative value passed as remaining time (git-fixes).
- drm/i915: Fix one wrong caching mode enum usage (git-fixes).
- drm/i915: Introduce intel_panel_init_alloc() (git-fixes).
- drm/i915: Never return 0 if not all requests retired (git-fixes).
- drm/i915: Populate encoder-&gt;devdata for DSI on icl+ (git-fixes).
- drm/i915: Print return value on error (git-fixes).
- drm/i915: Use _MMIO_PIPE() for SKL_BOTTOM_COLOR (git-fixes).
- drm/meson: Fix return type of meson_encoder_cvbs_mode_valid() (git-fixes).
- drm/msm/a5xx: really check for A510 in a5xx_gpu_init (git-fixes).
- drm/msm/adreno: Simplify read64/write64 helpers (git-fixes).
- drm/msm/adreno: fix runtime PM imbalance at unbind (git-fixes).
- drm/msm/disp/dpu: get timing engine status from intf status register (git-fixes).
- drm/msm/dpu: Add DSC hardware blocks to register snapshot (git-fixes).
- drm/msm/dpu: Assign missing writeback log_mask (git-fixes).
- drm/msm/dpu: Set DPU_DATA_HCTL_EN for in INTF_SC7180_MASK (git-fixes).
- drm/msm/dpu: clean up dpu_kms_get_clk_rate() returns (git-fixes).
- drm/msm/dpu: set DSC flush bit correctly at MDP CTL flush register (git-fixes).
- drm/msm/hdmi: use devres helper for runtime PM management (git-fixes).
- drm/panel: boe-tv101wum-nl6: Ensure DSI writes succeed during disable (git-fixes).
- drm/panel: simple: Add Powertip PH800480T013 drm_display_mode flags (git-fixes).
- drm/panel: simple: Add connector_type for innolux_at043tn24 (git-fixes).
- drm/rockchip: dw_hdmi: cleanup drm encoder during unbind (git-fixes).
- drm/ttm: Do not leak a resource on swapout move error (git-fixes).
- drm/virtio: Fix memory leak in virtio_gpu_object_create() (git-fixes).
- drm/virtio: Simplify error handling of virtio_gpu_object_create() (git-fixes).
- drm/vmwgfx: Refactor resource manager's hashtable to use linux/hashtable implementation (git-fixes).
- drm/vmwgfx: Refactor resource validation hashtable to use linux/hashtable implementation (git-fixes).
- drm/vmwgfx: Refactor ttm reference object hashtable to use linux/hashtable (git-fixes).
- drm/vmwgfx: Remove ttm object hashtable (git-fixes).
- drm/vmwgfx: Remove vmwgfx_hashtab (git-fixes).
- drm/vmwgfx: Write the driver id registers (git-fixes).
- drm: Add fixed-point helper to get rounded integer values (git-fixes).
- drm: Add missing DP DSC extended capability definitions (git-fixes).
- drm: Optimize drm buddy top-down allocation method (git-fixes).
- drm: buddy_allocator: Fix buddy allocator init on 32-bit systems (git-fixes).
- drm: panel-orientation-quirks: Add quirk for DynaBook K50 (git-fixes).
- drm: rcar-du: Add quirk for H3 ES1.x pclk workaround (git-fixes).
- drm: rcar-du: Fix setting a reserved bit in DPLLCR (git-fixes).
- drm: use mgr-&gt;dev in drm_dbg_kms in drm_dp_add_payload_part2 (git-fixes).
- fuse: ioctl: translate ENOSYS in outarg (bsc#1213524).
- fuse: revalidate: do not invalidate if interrupted (bsc#1213523).
- i2c: tegra: Set ACPI node as primary fwnode (bsc#1213226).
- irqchip/gic-v3: Claim iomem resources (bsc#1213533)
- irqchip/gicv3: Handle resource request failure consistently (bsc#1213533)
- irqchip/gicv3: Workaround for NVIDIA erratum T241-FABRIC-4 (bsc#1213533)
- kABI: do not check external trampolines for signature (kabi bsc#1207894 bsc#1211243).
- kabi/severities: Add VAS symbols changed due to recent fix VAS accelerators are directly tied to the architecture, there is no reason to have out-of-tree production drivers
- kabi/severities: ignore kABI of i915 module It's exported only for its sub-module, not really used by externals
- kabi/severities: ignore kABI of vmwgfx The driver exports a function unnecessarily without used by anyone else. Ignore the kABI changes.
- memcg: drop kmem.limit_in_bytes (bsc#1208788, bsc#1212905).
- net: mana: Add support for vlan tagging (bsc#1212301).
- net: phy: prevent stale pointer dereference in phy_init() (git-fixes).
- net: qrtr: Fix an uninit variable access bug in qrtr_tx_resume() (git-fixes).
- net: qrtr: start MHI channel after endpoit creation (git-fixes).
- nilfs2: reject devices with insufficient block count (git-fixes).
- ocfs2: Switch to security_inode_init_security() (git-fixes).
- ocfs2: check new file size on fallocate call (git-fixes).
- ocfs2: fix use-after-free when unmounting read-only filesystem (git-fixes).
- pci: s390: Fix use-after-free of PCI resources with per-function hotplug (bsc#1212525).
- pci: vmd: Fix uninitialized variable usage in vmd_enable_domain() (git-fixes).
- perf/x86/amd/core: Always clear status for idx (bsc#1213233).
- pie: fix kernel-doc notation warning (git-fixes).
- powerpc/64: Only WARN if __pa()/__va() called with bad addresses (bsc#1194869).
- powerpc/64s: Fix VAS mm use after free (bsc#1194869).
- powerpc/book3s64/mm: Fix DirectMap stats in /proc/meminfo (bsc#1194869).
- powerpc/bpf: Fix use of user_pt_regs in uapi (bsc#1194869).
- powerpc/ftrace: Remove ftrace init tramp once kernel init is complete (bsc#1194869).
- powerpc/interrupt: Do not read MSR from interrupt_exit_kernel_prepare() (bsc#1194869).
- powerpc/mm/dax: Fix the condition when checking if altmap vmemap can cross-boundary (bsc#1150305 ltc#176097 git-fixes).
- powerpc/mm: Switch obsolete dssall to .long (bsc#1194869).
- powerpc/powernv/sriov: perform null check on iov before dereferencing iov (bsc#1194869).
- powerpc/powernv/vas: Assign real address to rx_fifo in vas_rx_win_attr (bsc#1194869).
- powerpc/prom_init: Fix kernel config grep (bsc#1194869).
- powerpc/pseries/vas: Hold mmap_mutex after mmap lock during window close (jsc#PED-542 git-fixes).
- powerpc/secvar: fix refcount leak in format_show() (bsc#1194869).
- powerpc/xics: fix refcount leak in icp_opal_init() (bsc#1194869).
- powerpc: clean vdso32 and vdso64 directories (bsc#1194869).
- powerpc: define get_cycles macro for arch-override (bsc#1194869).
- powerpc: update ppc_save_regs to save current r1 in pt_regs (bsc#1194869).
- rpm/check-for-config-changes: ignore also RISCV_ISA_* and DYNAMIC_SIGFRAME They depend on CONFIG_TOOLCHAIN_HAS_*.
- rsi: remove kernel-doc comment marker (git-fixes).
- s390/ap: fix status returned by ap_aqic() (git-fixes bsc#1213259).
- s390/ap: fix status returned by ap_qact() (git-fixes bsc#1213258).
- s390/debug: add _ASM_S390_ prefix to header guard (git-fixes bsc#1213263).
- s390/pci: clean up left over special treatment for function zero (bsc#1212525).
- s390/pci: only add specific device in zpci_bus_scan_device() (bsc#1212525).
- s390/pci: remove redundant pci_bus_add_devices() on new bus (bsc#1212525).
- s390/percpu: add READ_ONCE() to arch_this_cpu_to_op_simple() (git-fixes bsc#1213252).
- s390: define RUNTIME_DISCARD_EXIT to fix link error with GNU ld &amp;lt; 2.36 (git-fixes bsc#1213264).
- s390: discard .interp section (git-fixes bsc#1213247).
- security: keys: Modify mismatched function name (git-fixes).
- selftests/ir: fix build with ancient kernel headers (git-fixes).
- selftests: cgroup: fix unsigned comparison with less than zero (git-fixes).
- selftests: forwarding: Fix packet matching in mirroring selftests (git-fixes).
- selftests: tc: add 'ct' action kconfig dep (git-fixes).
- selftests: tc: add ConnTrack procfs kconfig (git-fixes).
- selftests: tc: set timeout to 15 minutes (git-fixes).
- signal/powerpc: On swapcontext failure force SIGSEGV (bsc#1194869).
- signal: Replace force_sigsegv(SIGSEGV) with force_fatal_sig(SIGSEGV) (bsc#1194869).
- smb3: do not reserve too many oplock credits (bsc#1193629).
- smb3: missing null check in SMB2_change_notify (bsc#1193629).
- smb: client: fix broken file attrs with nodfs mounts (bsc#1193629).
- smb: client: fix missed ses refcounting (git-fixes).
- smb: client: fix parsing of source mount option (bsc#1193629).
- smb: client: fix shared DFS root mounts with different prefixes (bsc#1193629).
- smb: client: fix warning in CIFSFindFirst() (bsc#1193629).
- smb: client: fix warning in CIFSFindNext() (bsc#1193629).
- smb: client: fix warning in cifs_match_super() (bsc#1193629).
- smb: client: fix warning in cifs_smb3_do_mount() (bsc#1193629).
- smb: client: fix warning in generic_ip_connect() (bsc#1193629).
- smb: client: improve DFS mount check (bsc#1193629).
- smb: client: remove redundant pointer 'server' (bsc#1193629).
- smb: delete an unnecessary statement (bsc#1193629).
- smb: move client and server files to common directory fs/smb (bsc#1193629).
- smb: remove obsolete comment (bsc#1193629).
- soundwire: bus_type: Avoid lockdep assert in sdw_drv_probe() (git-fixes).
- soundwire: cadence: Drain the RX FIFO after an IO timeout (git-fixes).
- soundwire: stream: Add missing clear of alloc_slave_rt (git-fixes).
- spi: bcm63xx: fix max prepend length (git-fixes).
- swsmu/amdgpu_smu: Fix the wrong if-condition (git-fixes).
- tpm: tpm_vtpm_proxy: fix a race condition in /dev/vtpmx creation (git-fixes).
- usb: dwc2: Fix some error handling paths (git-fixes).
- usb: gadget: udc: core: Offload usb_udc_vbus_handler processing (git-fixes).
- usb: gadget: udc: core: Prevent soft_connect_store() race (git-fixes).
- usb: typec: Fix fast_role_swap_current show function (git-fixes).
- usb: typec: Fix fast_role_swap_current show function (git-fixes).
- wifi: airo: avoid uninitialized warning in airo_get_rate() (git-fixes).
- wifi: ath10k: Trigger STA disconnect after reconfig complete on hardware restart (git-fixes).
- wifi: ath11k: Add missing check for ioremap (git-fixes).
- wifi: rtw89: debug: fix error code in rtw89_debug_priv_send_h2c_set() (git-fixes).
- x86/amd_nb: Add PCI ID for family 19h model 78h (git-fixes).
- x86/platform/uv: Add platform resolving #defines for misc GAM_MMIOH_REDIRECT* (bsc#1212256 jsc#PED-4718).
- x86/platform/uv: Fix printed information in calc_mmioh_map (bsc#1212256 jsc#PED-4718).
- x86/platform/uv: Helper functions for allocating and freeing conversion tables (bsc#1212256 jsc#PED-4718).
- x86/platform/uv: Introduce helper function uv_pnode_to_socket (bsc#1212256 jsc#PED-4718).
- x86/platform/uv: Remove remaining BUG_ON() and BUG() calls (bsc#1212256 jsc#PED-4718).
- x86/platform/uv: UV support for sub-NUMA clustering (bsc#1212256 jsc#PED-4718).
- x86/platform/uv: Update UV platform code for SNC (bsc#1212256 jsc#PED-4718).
- x86/platform/uv: When searching for minimums, start at INT_MAX not 99999 (bsc#1212256 jsc#PED-4718).
- x86: Fix .brk attribute in linker script (git-fixes).
- xfs: clean up the rtbitmap fsmap backend (git-fixes).
- xfs: do not deplete the reserve pool when trying to shrink the fs (git-fixes).
- xfs: do not reverse order of items in bulk AIL insertion (git-fixes).
- xfs: fix getfsmap reporting past the last rt extent (git-fixes).
- xfs: fix integer overflows in the fsmap rtbitmap and logdev backends (git-fixes).
- xfs: fix interval filtering in multi-step fsmap queries (git-fixes).
- xfs: fix logdev fsmap query result filtering (git-fixes).
- xfs: fix off-by-one error when the last rt extent is in use (git-fixes).
- xfs: fix uninitialized variable access (git-fixes).
- xfs: make fsmap backend function key parameters const (git-fixes).
- xfs: make the record pointer passed to query_range functions const (git-fixes).
- xfs: pass explicit mount pointer to rtalloc query functions (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-03"/>
	<updated date="2023-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1150305">SUSE bug 1150305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207894">SUSE bug 1207894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208788">SUSE bug 1208788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211243">SUSE bug 1211243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211867">SUSE bug 1211867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212256">SUSE bug 1212256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212301">SUSE bug 1212301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212525">SUSE bug 1212525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212846">SUSE bug 1212846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212905">SUSE bug 1212905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213059">SUSE bug 1213059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213061">SUSE bug 1213061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213205">SUSE bug 1213205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213206">SUSE bug 1213206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213226">SUSE bug 1213226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213233">SUSE bug 1213233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213245">SUSE bug 1213245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213247">SUSE bug 1213247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213252">SUSE bug 1213252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213258">SUSE bug 1213258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213259">SUSE bug 1213259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213263">SUSE bug 1213263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213264">SUSE bug 1213264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213286">SUSE bug 1213286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213311">SUSE bug 1213311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213493">SUSE bug 1213493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213523">SUSE bug 1213523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213524">SUSE bug 1213524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213533">SUSE bug 1213533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213543">SUSE bug 1213543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213705">SUSE bug 1213705</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2985/">CVE-2023-2985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2985">CVE-2023-2985 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3117/">CVE-2023-3117 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3117">CVE-2023-3117 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31248/">CVE-2023-31248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31248">CVE-2023-31248 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3390/">CVE-2023-3390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3390">CVE-2023-3390 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35001/">CVE-2023-35001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35001">CVE-2023-35001 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3812/">CVE-2023-3812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3812">CVE-2023-3812 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009775834" comment="cluster-md-kmp-azure-5.14.21-150500.33.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775835" comment="dlm-kmp-azure-5.14.21-150500.33.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775836" comment="gfs2-kmp-azure-5.14.21-150500.33.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775837" comment="kernel-azure-5.14.21-150500.33.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775838" comment="kernel-azure-devel-5.14.21-150500.33.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775839" comment="kernel-azure-extra-5.14.21-150500.33.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775840" comment="kernel-azure-livepatch-devel-5.14.21-150500.33.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775841" comment="kernel-azure-optional-5.14.21-150500.33.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775842" comment="kernel-azure-vdso-5.14.21-150500.33.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775843" comment="kernel-devel-azure-5.14.21-150500.33.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775844" comment="kernel-source-azure-5.14.21-150500.33.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775845" comment="kernel-syms-azure-5.14.21-150500.33.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775846" comment="kselftests-kmp-azure-5.14.21-150500.33.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775847" comment="ocfs2-kmp-azure-5.14.21-150500.33.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775848" comment="reiserfs-kmp-azure-5.14.21-150500.33.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4282" version="1" class="patch">
	<metadata>
		<title>Security update for go1.20 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206346" ref_url="https://bugzilla.suse.com/1206346" source="BUGZILLA"/>
		<reference ref_id="1213880" ref_url="https://bugzilla.suse.com/1213880" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-29409" ref_url="https://www.suse.com/security/cve/CVE-2023-29409/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3181-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030785.html" source="SUSE-SU"/>
		<description>
This update for go1.20 fixes the following issues:

- Update to go v1.20.7 (released 2023-08-01) (bsc#1206346)
- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server while validating signatures for extremely large RSA keys. (bsc#1213880)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-03"/>
	<updated date="2023-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206346">SUSE bug 1206346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213880">SUSE bug 1213880</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29409/">CVE-2023-29409 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29409">CVE-2023-29409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009776225" comment="go1.20-1.20.7-150000.1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776226" comment="go1.20-doc-1.20.7-150000.1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776227" comment="go1.20-race-1.20.7-150000.1.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4283" version="1" class="patch">
	<metadata>
		<title>Security update for xtrans (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1178613" ref_url="https://bugzilla.suse.com/1178613" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25697" ref_url="https://www.suse.com/security/cve/CVE-2020-25697/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030792.html" source="SUSE-SU"/>
		<description>
This update for xtrans fixes the following issues:

- CVE-2020-25697: Fixed local privilege escalation via TRANS_ABSTRACT on the client side (bsc#1178613).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-03"/>
	<updated date="2023-08-03"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1178613">SUSE bug 1178613</bugzilla>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25697/">CVE-2020-25697 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25697">CVE-2020-25697 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009766904" comment="xtrans-1.3.5-150000.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4284" version="1" class="patch">
	<metadata>
		<title>Security update for qt6-base (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1209616" ref_url="https://bugzilla.suse.com/1209616" source="BUGZILLA"/>
		<reference ref_id="1211642" ref_url="https://bugzilla.suse.com/1211642" source="BUGZILLA"/>
		<reference ref_id="1211797" ref_url="https://bugzilla.suse.com/1211797" source="BUGZILLA"/>
		<reference ref_id="1211994" ref_url="https://bugzilla.suse.com/1211994" source="BUGZILLA"/>
		<reference ref_id="1213326" ref_url="https://bugzilla.suse.com/1213326" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-24607" ref_url="https://www.suse.com/security/cve/CVE-2023-24607/" source="CVE"/>
		<reference ref_id="CVE-2023-32762" ref_url="https://www.suse.com/security/cve/CVE-2023-32762/" source="CVE"/>
		<reference ref_id="CVE-2023-33285" ref_url="https://www.suse.com/security/cve/CVE-2023-33285/" source="CVE"/>
		<reference ref_id="CVE-2023-34410" ref_url="https://www.suse.com/security/cve/CVE-2023-34410/" source="CVE"/>
		<reference ref_id="CVE-2023-38197" ref_url="https://www.suse.com/security/cve/CVE-2023-38197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015803.html" source="SUSE-SU"/>
		<description>
This update for qt6-base fixes the following issues:

- CVE-2023-34410: Fixed certificate validation does not always consider whether the root of a chain is a configured CA certificate (bsc#1211994).
- CVE-2023-33285: Fixed buffer overflow in QDnsLookup (bsc#1211642).
- CVE-2023-32762: Fixed Qt Network incorrectly parses the strict-transport-security (HSTS) header (bsc#1211797).
- CVE-2023-38197: Fixed infinite loops in QXmlStreamReader(bsc#1213326).
- CVE-2023-24607: Fixed Qt SQL ODBC driver plugin DOS (bsc#1209616).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-08"/>
	<updated date="2023-08-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1209616">SUSE bug 1209616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211642">SUSE bug 1211642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211797">SUSE bug 1211797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211994">SUSE bug 1211994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213326">SUSE bug 1213326</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24607/">CVE-2023-24607 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24607">CVE-2023-24607 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-32762/">CVE-2023-32762 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32762">CVE-2023-32762 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-33285/">CVE-2023-33285 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33285">CVE-2023-33285 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-34410/">CVE-2023-34410 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34410">CVE-2023-34410 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38197/">CVE-2023-38197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38197">CVE-2023-38197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009776298" comment="libQt6Concurrent6-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776260" comment="libQt6Core6-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776261" comment="libQt6DBus6-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776262" comment="libQt6Gui6-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776263" comment="libQt6Network6-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776264" comment="libQt6OpenGL6-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776299" comment="libQt6OpenGLWidgets6-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776300" comment="libQt6PrintSupport6-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776301" comment="libQt6Sql6-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776302" comment="libQt6Test6-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776265" comment="libQt6Widgets6-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776303" comment="libQt6Xml6-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776304" comment="qt6-base-common-devel-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776305" comment="qt6-base-devel-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774438" comment="qt6-base-docs-html-6.4.2-150500.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774439" comment="qt6-base-docs-qch-6.4.2-150500.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776592" comment="qt6-base-examples-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776593" comment="qt6-base-private-devel-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776306" comment="qt6-concurrent-devel-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776307" comment="qt6-core-devel-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776308" comment="qt6-core-private-devel-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776309" comment="qt6-dbus-devel-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776594" comment="qt6-dbus-private-devel-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776595" comment="qt6-docs-common-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776310" comment="qt6-gui-devel-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776311" comment="qt6-gui-private-devel-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776312" comment="qt6-kmssupport-devel-static-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776313" comment="qt6-kmssupport-private-devel-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776314" comment="qt6-network-devel-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776596" comment="qt6-network-private-devel-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776266" comment="qt6-network-tls-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776597" comment="qt6-networkinformation-glib-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776598" comment="qt6-networkinformation-nm-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776315" comment="qt6-opengl-devel-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776316" comment="qt6-opengl-private-devel-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776317" comment="qt6-openglwidgets-devel-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776318" comment="qt6-platformsupport-devel-static-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776599" comment="qt6-platformsupport-private-devel-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776600" comment="qt6-platformtheme-gtk3-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776601" comment="qt6-platformtheme-xdgdesktopportal-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776602" comment="qt6-printsupport-cups-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776319" comment="qt6-printsupport-devel-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776603" comment="qt6-printsupport-private-devel-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776320" comment="qt6-sql-devel-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776604" comment="qt6-sql-mysql-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776605" comment="qt6-sql-postgresql-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776606" comment="qt6-sql-private-devel-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776321" comment="qt6-sql-sqlite-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776607" comment="qt6-sql-unixODBC-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776322" comment="qt6-test-devel-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776608" comment="qt6-test-private-devel-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776323" comment="qt6-widgets-devel-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776324" comment="qt6-widgets-private-devel-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776325" comment="qt6-xml-devel-6.4.2-150500.3.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776609" comment="qt6-xml-private-devel-6.4.2-150500.3.7.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4285" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213657" ref_url="https://bugzilla.suse.com/1213657" source="BUGZILLA"/>
		<reference ref_id="1213746" ref_url="https://bugzilla.suse.com/1213746" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4045" ref_url="https://www.suse.com/security/cve/CVE-2023-4045/" source="CVE"/>
		<reference ref_id="CVE-2023-4046" ref_url="https://www.suse.com/security/cve/CVE-2023-4046/" source="CVE"/>
		<reference ref_id="CVE-2023-4047" ref_url="https://www.suse.com/security/cve/CVE-2023-4047/" source="CVE"/>
		<reference ref_id="CVE-2023-4048" ref_url="https://www.suse.com/security/cve/CVE-2023-4048/" source="CVE"/>
		<reference ref_id="CVE-2023-4049" ref_url="https://www.suse.com/security/cve/CVE-2023-4049/" source="CVE"/>
		<reference ref_id="CVE-2023-4050" ref_url="https://www.suse.com/security/cve/CVE-2023-4050/" source="CVE"/>
		<reference ref_id="CVE-2023-4052" ref_url="https://www.suse.com/security/cve/CVE-2023-4052/" source="CVE"/>
		<reference ref_id="CVE-2023-4054" ref_url="https://www.suse.com/security/cve/CVE-2023-4054/" source="CVE"/>
		<reference ref_id="CVE-2023-4055" ref_url="https://www.suse.com/security/cve/CVE-2023-4055/" source="CVE"/>
		<reference ref_id="CVE-2023-4056" ref_url="https://www.suse.com/security/cve/CVE-2023-4056/" source="CVE"/>
		<reference ref_id="CVE-2023-4057" ref_url="https://www.suse.com/security/cve/CVE-2023-4057/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015804.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Update Mozilla Thunderbird 115.1.0 (bsc#1213746):

- CVE-2023-4045: Fixed cross-origin restrictions bypass with Offscreen Canvas (bmo#1833876).
- CVE-2023-4046: Fixed incorrect value used during WASM compilation (bmo#1837686).
- CVE-2023-4047: Fixed potential permissions request bypass via clickjacking (bmo#1839073).
- CVE-2023-4048: Fixed crash in DOMParser due to out-of-memory conditions (bmo#1841368).
- CVE-2023-4049: Fixed potential race conditions when releasing platform objects (bmo#1842658).
- CVE-2023-4050: Fixed stack buffer overflow in StorageManager (bmo#1843038).
- CVE-2023-4052: Fixed file deletion and privilege escalation through Firefox uninstaller (bmo#1824420).
- CVE-2023-4054: Fixed lack of warning when opening appref-ms files (bmo#1840777).
- CVE-2023-4055: Fixed cookie jar overflow caused unexpected cookie jar state (bmo#1782561).
- CVE-2023-4056: Fixed memory safety bugs (bmo#1820587, bmo#1824634, bmo#1839235, bmo#1842325, bmo#1843847).
- CVE-2023-4057: Fixed memory safety bugs (bmo#1841682).

Bugfixes:

- Remove bashisms from startup-script (bsc#1213657).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-08"/>
	<updated date="2023-08-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213657">SUSE bug 1213657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213746">SUSE bug 1213746</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4045/">CVE-2023-4045 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4045">CVE-2023-4045 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4046/">CVE-2023-4046 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4046">CVE-2023-4046 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4047/">CVE-2023-4047 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4047">CVE-2023-4047 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4048/">CVE-2023-4048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4048">CVE-2023-4048 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4049/">CVE-2023-4049 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4049">CVE-2023-4049 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4050/">CVE-2023-4050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4050">CVE-2023-4050 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4052/">CVE-2023-4052 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4052">CVE-2023-4052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4054/">CVE-2023-4054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4054">CVE-2023-4054 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4055/">CVE-2023-4055 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4055">CVE-2023-4055 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4056/">CVE-2023-4056 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4056">CVE-2023-4056 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4057/">CVE-2023-4057 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4057">CVE-2023-4057 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009777025" comment="MozillaThunderbird-115.1.0-150200.8.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777026" comment="MozillaThunderbird-translations-common-115.1.0-150200.8.127.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777027" comment="MozillaThunderbird-translations-other-115.1.0-150200.8.127.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4286" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionpack-5_1 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213312" ref_url="https://bugzilla.suse.com/1213312" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28362" ref_url="https://www.suse.com/security/cve/CVE-2023-28362/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3229-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030838.html" source="SUSE-SU"/>
		<description>
This update for rubygem-actionpack-5_1 fixes the following issues:

- CVE-2023-28362: Fixed possible XSS via User Supplied Values to redirect_to (bsc#1213312).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-08"/>
	<updated date="2023-08-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213312">SUSE bug 1213312</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28362/">CVE-2023-28362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28362">CVE-2023-28362 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009776515" comment="ruby2.5-rubygem-actionpack-5_1-5.1.4-150000.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776516" comment="ruby2.5-rubygem-actionpack-doc-5_1-5.1.4-150000.3.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4287" version="1" class="patch">
	<metadata>
		<title>Security update for cjose (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213385" ref_url="https://bugzilla.suse.com/1213385" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-37464" ref_url="https://www.suse.com/security/cve/CVE-2023-37464/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015807.html" source="SUSE-SU"/>
		<description>
This update for cjose fixes the following issues:

- CVE-2023-37464: Fixed AES GCM decryption uses the Tag length from the actual Authentication Tag (bsc#1213385).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-08"/>
	<updated date="2023-08-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213385">SUSE bug 1213385</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-37464/">CVE-2023-37464 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37464">CVE-2023-37464 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009772770" comment="libcjose-devel-0.6.1-150100.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772771" comment="libcjose0-0.6.1-150100.4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4288" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213853" ref_url="https://bugzilla.suse.com/1213853" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3817" ref_url="https://www.suse.com/security/cve/CVE-2023-3817/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030847.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2023-3817: Fixed a potential DoS due to excessive time spent checking DH q parameter value. (bsc#1213853)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-08"/>
	<updated date="2023-08-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213853">SUSE bug 1213853</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3817/">CVE-2023-3817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3817">CVE-2023-3817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009776669" comment="libopenssl-1_1-devel-1.1.1l-150500.17.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776670" comment="libopenssl-1_1-devel-32bit-1.1.1l-150500.17.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776671" comment="libopenssl1_1-1.1.1l-150500.17.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776672" comment="libopenssl1_1-32bit-1.1.1l-150500.17.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776673" comment="libopenssl1_1-hmac-1.1.1l-150500.17.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776674" comment="libopenssl1_1-hmac-32bit-1.1.1l-150500.17.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776675" comment="openssl-1_1-1.1.1l-150500.17.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776676" comment="openssl-1_1-doc-1.1.1l-150500.17.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4289" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213853" ref_url="https://bugzilla.suse.com/1213853" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3817" ref_url="https://www.suse.com/security/cve/CVE-2023-3817/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3243-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030846.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2023-3817: Fixed a potential DoS due to excessive time spent checking DH q parameter value. (bsc#1213853)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-08"/>
	<updated date="2023-08-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213853">SUSE bug 1213853</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3817/">CVE-2023-3817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3817">CVE-2023-3817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009776663" comment="libopenssl-3-devel-3.0.8-150500.5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776664" comment="libopenssl-3-devel-32bit-3.0.8-150500.5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776665" comment="libopenssl3-3.0.8-150500.5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776666" comment="libopenssl3-32bit-3.0.8-150500.5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776667" comment="openssl-3-3.0.8-150500.5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776668" comment="openssl-3-doc-3.0.8-150500.5.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4290" version="1" class="patch">
	<metadata>
		<title>Security update for keylime (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213310" ref_url="https://bugzilla.suse.com/1213310" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38200" ref_url="https://www.suse.com/security/cve/CVE-2023-38200/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3245-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030844.html" source="SUSE-SU"/>
		<description>
This update for keylime fixes the following issues:

- CVE-2023-38200: Fixed a DoS attack against it's SSL connections. (bsc#1213310)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-08"/>
	<updated date="2023-08-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213310">SUSE bug 1213310</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38200/">CVE-2023-38200 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38200">CVE-2023-38200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009776517" comment="keylime-agent-6.3.2-150400.4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776518" comment="keylime-config-6.3.2-150400.4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776519" comment="keylime-firewalld-6.3.2-150400.4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776662" comment="keylime-logrotate-6.3.2-150400.4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776520" comment="keylime-registrar-6.3.2-150400.4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776521" comment="keylime-tpm_cert_store-6.3.2-150400.4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776522" comment="keylime-verifier-6.3.2-150400.4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776523" comment="python3-keylime-6.3.2-150400.4.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4291" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-ugly (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213750" ref_url="https://bugzilla.suse.com/1213750" source="BUGZILLA"/>
		<reference ref_id="1213751" ref_url="https://bugzilla.suse.com/1213751" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38103" ref_url="https://www.suse.com/security/cve/CVE-2023-38103/" source="CVE"/>
		<reference ref_id="CVE-2023-38104" ref_url="https://www.suse.com/security/cve/CVE-2023-38104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015812.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-ugly fixes the following issues:

- CVE-2023-38103: Fixed an integer overflows when calculating the size of SIPR audio buffers. (bsc#1213751)
- CVE-2023-38104: Fixed an integer overflow when calculation audio packet size . (bsc#1213750)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-08"/>
	<updated date="2023-08-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213750">SUSE bug 1213750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213751">SUSE bug 1213751</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38103/">CVE-2023-38103 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38103">CVE-2023-38103 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38104/">CVE-2023-38104 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38104">CVE-2023-38104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009776658" comment="gstreamer-plugins-ugly-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776659" comment="gstreamer-plugins-ugly-32bit-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776660" comment="gstreamer-plugins-ugly-lang-1.22.0-150500.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4292" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-good (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213128" ref_url="https://bugzilla.suse.com/1213128" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-37327" ref_url="https://www.suse.com/security/cve/CVE-2023-37327/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015811.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-good fixes the following issues:

- CVE-2023-37327: Fixed FLAC file parsing integer overflow remote code execution vulnerability. (bsc#1213128)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-08"/>
	<updated date="2023-08-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213128">SUSE bug 1213128</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37327/">CVE-2023-37327 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37327">CVE-2023-37327 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009776649" comment="gstreamer-plugins-good-1.22.0-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776650" comment="gstreamer-plugins-good-32bit-1.22.0-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776651" comment="gstreamer-plugins-good-extra-1.22.0-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776652" comment="gstreamer-plugins-good-extra-32bit-1.22.0-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776653" comment="gstreamer-plugins-good-gtk-1.22.0-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776654" comment="gstreamer-plugins-good-jack-1.22.0-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776655" comment="gstreamer-plugins-good-jack-32bit-1.22.0-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776656" comment="gstreamer-plugins-good-lang-1.22.0-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776657" comment="gstreamer-plugins-good-qtqml-1.22.0-150500.4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4293" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-base (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213128" ref_url="https://bugzilla.suse.com/1213128" source="BUGZILLA"/>
		<reference ref_id="1213131" ref_url="https://bugzilla.suse.com/1213131" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-37327" ref_url="https://www.suse.com/security/cve/CVE-2023-37327/" source="CVE"/>
		<reference ref_id="CVE-2023-37328" ref_url="https://www.suse.com/security/cve/CVE-2023-37328/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015809.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-base fixes the following issues:

- CVE-2023-37327: Fixed FLAC file parsing integer overflow remote code execution vulnerability. (bsc#1213128)
- CVE-2023-37328: Fixed PGS file parsing heap-based buffer overflow remote code execution vulnerability. (bsc#1213131)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-08"/>
	<updated date="2023-08-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213128">SUSE bug 1213128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213131">SUSE bug 1213131</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37327/">CVE-2023-37327 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37327">CVE-2023-37327 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37328/">CVE-2023-37328 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37328">CVE-2023-37328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009776610" comment="gstreamer-plugins-base-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776611" comment="gstreamer-plugins-base-32bit-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776612" comment="gstreamer-plugins-base-devel-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776613" comment="gstreamer-plugins-base-devel-32bit-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776614" comment="gstreamer-plugins-base-lang-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776615" comment="libgstallocators-1_0-0-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776616" comment="libgstallocators-1_0-0-32bit-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776617" comment="libgstapp-1_0-0-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776618" comment="libgstapp-1_0-0-32bit-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776619" comment="libgstaudio-1_0-0-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776326" comment="libgstaudio-1_0-0-32bit-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776620" comment="libgstfft-1_0-0-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776621" comment="libgstfft-1_0-0-32bit-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776622" comment="libgstgl-1_0-0-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776623" comment="libgstgl-1_0-0-32bit-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776624" comment="libgstpbutils-1_0-0-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776625" comment="libgstpbutils-1_0-0-32bit-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776626" comment="libgstriff-1_0-0-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776627" comment="libgstriff-1_0-0-32bit-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776628" comment="libgstrtp-1_0-0-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776629" comment="libgstrtp-1_0-0-32bit-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776630" comment="libgstrtsp-1_0-0-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776631" comment="libgstrtsp-1_0-0-32bit-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776632" comment="libgstsdp-1_0-0-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776633" comment="libgstsdp-1_0-0-32bit-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776634" comment="libgsttag-1_0-0-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776327" comment="libgsttag-1_0-0-32bit-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776635" comment="libgstvideo-1_0-0-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776328" comment="libgstvideo-1_0-0-32bit-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776636" comment="typelib-1_0-GstAllocators-1_0-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776637" comment="typelib-1_0-GstApp-1_0-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776638" comment="typelib-1_0-GstAudio-1_0-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776639" comment="typelib-1_0-GstGL-1_0-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776640" comment="typelib-1_0-GstGLEGL-1_0-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776641" comment="typelib-1_0-GstGLWayland-1_0-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776642" comment="typelib-1_0-GstGLX11-1_0-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776643" comment="typelib-1_0-GstPbutils-1_0-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776644" comment="typelib-1_0-GstRtp-1_0-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776645" comment="typelib-1_0-GstRtsp-1_0-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776646" comment="typelib-1_0-GstSdp-1_0-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776647" comment="typelib-1_0-GstTag-1_0-1.22.0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776648" comment="typelib-1_0-GstVideo-1_0-1.22.0-150500.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4294" version="1" class="patch">
	<metadata>
		<title>Security update for rust1.71 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213817" ref_url="https://bugzilla.suse.com/1213817" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38497" ref_url="https://www.suse.com/security/cve/CVE-2023-38497/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015829.html" source="SUSE-SU"/>
		<description>
This update for rust1.71 fixes the following issues:

Update to version 1.71.1:

- CVE-2023-38497: Fixed privilege escalation with Cargo not respecting umask when extracting dependencies (bsc#1213817).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-08"/>
	<updated date="2023-08-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213817">SUSE bug 1213817</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38497/">CVE-2023-38497 at SUSE</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38497">CVE-2023-38497 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009777622" comment="cargo1.71-1.71.1-150400.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777623" comment="rust1.71-1.71.1-150400.9.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4295" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211703" ref_url="https://bugzilla.suse.com/1211703" source="BUGZILLA"/>
		<reference ref_id="1211705" ref_url="https://bugzilla.suse.com/1211705" source="BUGZILLA"/>
		<reference ref_id="1211706" ref_url="https://bugzilla.suse.com/1211706" source="BUGZILLA"/>
		<reference ref_id="1211707" ref_url="https://bugzilla.suse.com/1211707" source="BUGZILLA"/>
		<reference ref_id="1211710" ref_url="https://bugzilla.suse.com/1211710" source="BUGZILLA"/>
		<reference ref_id="1211793" ref_url="https://bugzilla.suse.com/1211793" source="BUGZILLA"/>
		<reference ref_id="1211844" ref_url="https://bugzilla.suse.com/1211844" source="BUGZILLA"/>
		<reference ref_id="1212084" ref_url="https://bugzilla.suse.com/1212084" source="BUGZILLA"/>
		<reference ref_id="1213319" ref_url="https://bugzilla.suse.com/1213319" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0667" ref_url="https://www.suse.com/security/cve/CVE-2023-0667/" source="CVE"/>
		<reference ref_id="CVE-2023-0668" ref_url="https://www.suse.com/security/cve/CVE-2023-0668/" source="CVE"/>
		<reference ref_id="CVE-2023-2855" ref_url="https://www.suse.com/security/cve/CVE-2023-2855/" source="CVE"/>
		<reference ref_id="CVE-2023-2856" ref_url="https://www.suse.com/security/cve/CVE-2023-2856/" source="CVE"/>
		<reference ref_id="CVE-2023-2857" ref_url="https://www.suse.com/security/cve/CVE-2023-2857/" source="CVE"/>
		<reference ref_id="CVE-2023-2858" ref_url="https://www.suse.com/security/cve/CVE-2023-2858/" source="CVE"/>
		<reference ref_id="CVE-2023-2879" ref_url="https://www.suse.com/security/cve/CVE-2023-2879/" source="CVE"/>
		<reference ref_id="CVE-2023-2952" ref_url="https://www.suse.com/security/cve/CVE-2023-2952/" source="CVE"/>
		<reference ref_id="CVE-2023-3648" ref_url="https://www.suse.com/security/cve/CVE-2023-3648/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015828.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update to Wireshark 3.6.15:
- Further features, bug fixes and updated protocol support as listed in:
  https://www.wireshark.org/docs/relnotes/wireshark-3.6.15.html

Security fixes:
  - CVE-2023-0667: Fixed failure to validate MS-MMS packet length (bsc#1212084).
  - CVE-2023-0668: Fixed IEEE C37.118 Synchrophasor dissector crash (bsc#1211710).
  - CVE-2023-2855: Fixed Candump log file parser crash (bsc#1211703).
  - CVE-2023-2856: Fixed VMS TCPIPtrace file parser crash (bsc#1211707).
  - CVE-2023-2857: Fixed BLF file parser crash (bsc#1211705).
  - CVE-2023-2858: Fixed NetScaler file parser crash (bsc#1211706).
  - CVE-2023-2879: Fixed GDSDB dissector infinite loop (bsc#1211793).
  - CVE-2023-2952: Fixed XRA dissector infinite loop (bsc#1211844).
  - CVE-2023-3648: Fixed Kafka dissector crash (bsc#1213319).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-09"/>
	<updated date="2023-08-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211703">SUSE bug 1211703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211705">SUSE bug 1211705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211706">SUSE bug 1211706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211707">SUSE bug 1211707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211710">SUSE bug 1211710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211793">SUSE bug 1211793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211844">SUSE bug 1211844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212084">SUSE bug 1212084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213319">SUSE bug 1213319</bugzilla>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0667/">CVE-2023-0667 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0667">CVE-2023-0667 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0668/">CVE-2023-0668 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0668">CVE-2023-0668 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-2855/">CVE-2023-2855 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2855">CVE-2023-2855 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2856/">CVE-2023-2856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2856">CVE-2023-2856 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2857/">CVE-2023-2857 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2857">CVE-2023-2857 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2858/">CVE-2023-2858 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2858">CVE-2023-2858 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2879/">CVE-2023-2879 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2879">CVE-2023-2879 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2952/">CVE-2023-2952 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2952">CVE-2023-2952 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3648/">CVE-2023-3648 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3648">CVE-2023-3648 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009772168" comment="libwireshark15-3.6.15-150000.3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772169" comment="libwiretap12-3.6.15-150000.3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772170" comment="libwsutil13-3.6.15-150000.3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772171" comment="wireshark-3.6.15-150000.3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772172" comment="wireshark-devel-3.6.15-150000.3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772173" comment="wireshark-ui-qt-3.6.15-150000.3.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4296" version="1" class="patch">
	<metadata>
		<title>Security update for pipewire (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213682" ref_url="https://bugzilla.suse.com/1213682" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:3257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015830.html" source="SUSE-SU"/>
		<description>
This update for pipewire fixes the following security issues:

  - Fixed issue where an app which only has permission to access one stream can also access other streams (bsc#1213682).

  Bugfixes:
  - Fixed division by 0 and other issues with invalid values (glfo#pipewire/pipewire#2953)
  - Fixed an overflow resulting in choppy sound in some cases (glfo#pipewire/pipewire#2680)

		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-09"/>
	<updated date="2023-08-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213682">SUSE bug 1213682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009775916" comment="gstreamer-plugin-pipewire-0.3.64-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775917" comment="libpipewire-0_3-0-0.3.64-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775918" comment="libpipewire-0_3-0-32bit-0.3.64-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775919" comment="pipewire-0.3.64-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775920" comment="pipewire-alsa-0.3.64-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775921" comment="pipewire-alsa-32bit-0.3.64-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775922" comment="pipewire-devel-0.3.64-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775923" comment="pipewire-doc-0.3.64-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775924" comment="pipewire-lang-0.3.64-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775925" comment="pipewire-libjack-0_3-0.3.64-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775926" comment="pipewire-libjack-0_3-32bit-0.3.64-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775927" comment="pipewire-libjack-0_3-devel-0.3.64-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775928" comment="pipewire-module-x11-0_3-0.3.64-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775929" comment="pipewire-modules-0_3-0.3.64-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775930" comment="pipewire-modules-0_3-32bit-0.3.64-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775931" comment="pipewire-pulseaudio-0.3.64-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775932" comment="pipewire-spa-plugins-0_2-0.3.64-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775933" comment="pipewire-spa-plugins-0_2-32bit-0.3.64-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775934" comment="pipewire-spa-tools-0.3.64-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775935" comment="pipewire-tools-0.3.64-150500.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4297" version="1" class="patch">
	<metadata>
		<title>Security update for go1.19 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1200441" ref_url="https://bugzilla.suse.com/1200441" source="BUGZILLA"/>
		<reference ref_id="1213880" ref_url="https://bugzilla.suse.com/1213880" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-29409" ref_url="https://www.suse.com/security/cve/CVE-2023-29409/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015868.html" source="SUSE-SU"/>
		<description>
This update for go1.19 fixes the following issues:

- Update to go v1.19.12 (released 2023-08-01) (bsc#1200441)
- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server while validating signatures for extremely large RSA keys. (bsc#1213880)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-10"/>
	<updated date="2023-08-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200441">SUSE bug 1200441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213880">SUSE bug 1213880</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29409/">CVE-2023-29409 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29409">CVE-2023-29409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009776222" comment="go1.19-1.19.12-150000.1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776223" comment="go1.19-doc-1.19.12-150000.1.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009776661" comment="go1.19-race-1.19.12-150000.1.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4298" version="1" class="patch">
	<metadata>
		<title>Security update for python-scipy (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213062" ref_url="https://bugzilla.suse.com/1213062" source="BUGZILLA"/>
		<reference ref_id="1213137" ref_url="https://bugzilla.suse.com/1213137" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-25399" ref_url="https://www.suse.com/security/cve/CVE-2023-25399/" source="CVE"/>
		<reference ref_id="CVE-2023-29824" ref_url="https://www.suse.com/security/cve/CVE-2023-29824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015875.html" source="SUSE-SU"/>
		<description>
This update for python-scipy fixes the following issues:

- CVE-2023-25399: Fixed minor refcounting issue in Py_FindObjects (bsc#1213062).
- CVE-2023-29824: Fixed use-after-free in Py_FindObjects (bsc#1213137).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-11"/>
	<updated date="2023-08-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213062">SUSE bug 1213062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213137">SUSE bug 1213137</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-25399/">CVE-2023-25399 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25399">CVE-2023-25399 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-29824/">CVE-2023-29824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29824">CVE-2023-29824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009772176" comment="python3-scipy-1.3.3-150200.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772177" comment="python3-scipy-gnu-hpc-1.3.3-150200.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009772178" comment="python3-scipy_1_3_3-gnu-hpc-1.3.3-150200.5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4299" version="1" class="patch">
	<metadata>
		<title>Feature update for cloud-init (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1184758" ref_url="https://bugzilla.suse.com/1184758" source="BUGZILLA"/>
		<reference ref_id="1210273" ref_url="https://bugzilla.suse.com/1210273" source="BUGZILLA"/>
		<reference ref_id="1212879" ref_url="https://bugzilla.suse.com/1212879" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3429" ref_url="https://www.suse.com/security/cve/CVE-2021-3429/" source="CVE"/>
		<reference ref_id="CVE-2023-1786" ref_url="https://www.suse.com/security/cve/CVE-2023-1786/" source="CVE"/>
		<reference ref_id="SUSE-FU-2023:3283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030931.html" source="SUSE-SU"/>
		<description>
This update for cloud-init fixes the following issues:

- Default route is not configured (bsc#1212879)
- cloud-final service failing in powerVS (bsc#1210273)
- Randomly generated passwords logged in clear-text to world-readable file (bsc#1184758, CVE-2021-3429)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-11"/>
	<updated date="2023-08-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184758">SUSE bug 1184758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210273">SUSE bug 1210273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212879">SUSE bug 1212879</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3429/">CVE-2021-3429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3429">CVE-2021-3429 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1786/">CVE-2023-1786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1786">CVE-2023-1786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009778181" comment="cloud-init-23.1-150100.8.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778182" comment="cloud-init-config-suse-23.1-150100.8.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778183" comment="cloud-init-doc-23.1-150100.8.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4300" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1207922" ref_url="https://bugzilla.suse.com/1207922" source="BUGZILLA"/>
		<reference ref_id="1213473" ref_url="https://bugzilla.suse.com/1213473" source="BUGZILLA"/>
		<reference ref_id="1213474" ref_url="https://bugzilla.suse.com/1213474" source="BUGZILLA"/>
		<reference ref_id="1213475" ref_url="https://bugzilla.suse.com/1213475" source="BUGZILLA"/>
		<reference ref_id="1213479" ref_url="https://bugzilla.suse.com/1213479" source="BUGZILLA"/>
		<reference ref_id="1213481" ref_url="https://bugzilla.suse.com/1213481" source="BUGZILLA"/>
		<reference ref_id="1213482" ref_url="https://bugzilla.suse.com/1213482" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-22006" ref_url="https://www.suse.com/security/cve/CVE-2023-22006/" source="CVE"/>
		<reference ref_id="CVE-2023-22036" ref_url="https://www.suse.com/security/cve/CVE-2023-22036/" source="CVE"/>
		<reference ref_id="CVE-2023-22041" ref_url="https://www.suse.com/security/cve/CVE-2023-22041/" source="CVE"/>
		<reference ref_id="CVE-2023-22044" ref_url="https://www.suse.com/security/cve/CVE-2023-22044/" source="CVE"/>
		<reference ref_id="CVE-2023-22045" ref_url="https://www.suse.com/security/cve/CVE-2023-22045/" source="CVE"/>
		<reference ref_id="CVE-2023-22049" ref_url="https://www.suse.com/security/cve/CVE-2023-22049/" source="CVE"/>
		<reference ref_id="CVE-2023-25193" ref_url="https://www.suse.com/security/cve/CVE-2023-25193/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015880.html" source="SUSE-SU"/>
		<description>
This update for java-11-openjdk fixes the following issues:

  Updated to jdk-11.0.20+8 (July 2023 CPU):

  - CVE-2023-22006: Fixed vulnerability in the network component (bsc#1213473).
  - CVE-2023-22036: Fixed vulnerability in the utility component (bsc#1213474).
  - CVE-2023-22041: Fixed vulnerability in the hotspot component (bsc#1213475).
  - CVE-2023-22044: Fixed vulnerability in the hotspot component (bsc#1213479).
  - CVE-2023-22045: Fixed vulnerability in the hotspot component (bsc#1213481).
  - CVE-2023-22049: Fixed vulnerability in the libraries component (bsc#1213482).
  - CVE-2023-25193: Fixed vulnerability in the embedded harfbuzz module (bsc#1207922).

  - JDK-8298676: Enhanced Look and Feel
  - JDK-8300285: Enhance TLS data handling
  - JDK-8300596: Enhance Jar Signature validation
  - JDK-8301998, JDK-8302084: Update HarfBuzz to 7.0.1
  - JDK-8302475: Enhance HTTP client file downloading
  - JDK-8302483: Enhance ZIP performance
  - JDK-8303376: Better launching of JDI
  - JDK-8304468: Better array usages
  - JDK-8305312: Enhanced path handling
  - JDK-8308682: Enhance AES performance

  Bugfixes:

  - JDK-8171426: java/lang/ProcessBuilder/Basic.java failed with
    Stream closed
  - JDK-8178806: Better exception logging in crypto code
  - JDK-8187522: test/sun/net/ftp/FtpURLConnectionLeak.java timed
    out
  - JDK-8209167: Use CLDR's time zone mappings for Windows
  - JDK-8209546: Make sun/security/tools/keytool/autotest.sh to
    support macosx
  - JDK-8209880: tzdb.dat is not reproducibly built
  - JDK-8213531: Test javax/swing/border/TestTitledBorderLeak.java
    fails
  - JDK-8214459: NSS source should be removed
  - JDK-8214807: Improve handling of very old class files
  - JDK-8215015: [TESTBUG] remove unneeded -Xfuture option from
    tests
  - JDK-8215575: C2 crash: assert(get_instanceKlass()-&gt;is_loaded())
    failed: must be at least loaded
  - JDK-8220093: Change to GCC 8.2 for building on Linux at Oracle
  - JDK-8227257: javax/swing/JFileChooser/4847375/bug4847375.java
    fails with AssertionError
  - JDK-8232853: AuthenticationFilter.Cache::remove may throw
    ConcurrentModificationException
  - JDK-8243936: NonWriteable system properties are actually
    writeable
  - JDK-8246383: NullPointerException in
    JceSecurity.getVerificationResult when using Entrust provider
  - JDK-8248701: On Windows generated modules-deps.gmk can
    contain backslash-r (CR) characters
  - JDK-8257856: Make ClassFileVersionsTest.java robust to JDK
    version updates
  - JDK-8259530: Generated docs contain MIT/GPL-licenced works
    without reproducing the licence
  - JDK-8263420: Incorrect function name in
    NSAccessibilityStaticText native peer implementation
  - JDK-8264290: Create implementation for
    NSAccessibilityComponentGroup protocol peer
  - JDK-8264304: Create implementation for NSAccessibilityToolbar
    protocol peer
  - JDK-8265486: ProblemList javax/sound/midi/Sequencer/
    /Recording.java on macosx-aarch64
  - JDK-8268558: [TESTBUG] Case 2 in
    TestP11KeyFactoryGetRSAKeySpec is skipped
  - JDK-8269746: C2: assert(!in-&gt;is_CFG()) failed: CFG Node with
    no controlling input?
  - JDK-8274864: Remove Amman/Cairo hacks in ZoneInfoFile
  - JDK-8275233: Incorrect line number reported in exception
    stack trace thrown from a lambda expression
  - JDK-8275721: Name of UTC timezone in a locale changes
    depending on previous code
  - JDK-8275735: [linux] Remove deprecated Metrics api (kernel
    memory limit)
  - JDK-8276880: Remove java/lang/RuntimeTests/exec/ExecWithDir
    as unnecessary
  - JDK-8277775: Fixup bugids in RemoveDropTargetCrashTest.java -
    add 4357905
  - JDK-8278434: timeouts in test java/time/test/java/time/format/
    /TestZoneTextPrinterParser.java
  - JDK-8280703: CipherCore.doFinal(...) causes potentially
    massive byte[] allocations during decryption
  - JDK-8282077: PKCS11 provider C_sign() impl should handle
    CKR_BUFFER_TOO_SMALL error
  - JDK-8282201: Consider removal of expiry check in
    VerifyCACerts.java test
  - JDK-8282467: add extra diagnostics for JDK-8268184
  - JDK-8282600: SSLSocketImpl should not use user_canceled
    workaround when not necessary
  - JDK-8283059: Uninitialized warning in check_code.c with GCC
    11.2
  - JDK-8285497: Add system property for Java SE specification
    maintenance version
  - JDK-8286398: Address possibly lossy conversions in
    jdk.internal.le
  - JDK-8287007: [cgroups] Consistently use stringStream
    throughout parsing code
  - JDK-8287246: DSAKeyValue should check for missing params
    instead of relying on KeyFactory provider
  - JDK-8287876: The recently de-problemlisted
    TestTitledBorderLeak test is unstable
  - JDK-8287897: Augment src/jdk.internal.le/share/legal/jline.md
    with information on 4th party dependencies
  - JDK-8289301: P11Cipher should not throw out of bounds
    exception during padding
  - JDK-8289735: UTIL_LOOKUP_PROGS fails on pathes with space
  - JDK-8291226: Create Test Cases to cover scenarios for
    JDK-8278067
  - JDK-8291637: HttpClient default keep alive timeout not
    followed if server sends invalid value
  - JDK-8291638: Keep-Alive timeout of 0 should close connection
    immediately
  - JDK-8292206: TestCgroupMetrics.java fails as getMemoryUsage()
    is lower than expected
  - JDK-8293232: Fix race condition in pkcs11 SessionManager
  - JDK-8293815: P11PSSSignature.engineUpdate should not print
    debug messages during normal operation
  - JDK-8294548: Problem list SA core file tests on macosx-x64
    due to JDK-8294316
  - JDK-8294906: Memory leak in PKCS11 NSS TLS server
  - JDK-8295974: jni_FatalError and Xcheck:jni warnings should
    print the native stack when there are no Java frames
  - JDK-8296934: Write a test to verify whether Undecorated Frame
    can be iconified or not
  - JDK-8297000: [jib] Add more friendly warning for proxy issues
  - JDK-8297450: ScaledTextFieldBorderTest.java fails when run
    with -show parameter
  - JDK-8298887: On the latest macOS+XCode the Robot API may
    report wrong colors
  - JDK-8299259: C2: Div/Mod nodes without zero check could be
    split through iv phi of loop resulting in SIGFPE
  - JDK-8300079: SIGSEGV in LibraryCallKit::inline_string_copy
    due to constant NULL src argument
  - JDK-8300205: Swing test bug8078268 make latch timeout
    configurable
  - JDK-8300490: Spaces in name of MacOS Code Signing Identity
    are not correctly handled after JDK-8293550
  - JDK-8301119: Support for GB18030-2022
  - JDK-8301170: perfMemory_windows.cpp add free_security_attr to
    early returns
  - JDK-8301401: Allow additional characters for GB18030-2022
    support
  - JDK-8302151: BMPImageReader throws an exception reading BMP
    images
  - JDK-8302791: Add specific ClassLoader object to Proxy
    IllegalArgumentException message
  - JDK-8303102: jcmd: ManagementAgent.status truncates the text
    longer than O_BUFLEN
  - JDK-8303354: addCertificatesToKeystore in KeystoreImpl.m
    needs CFRelease call in early potential CHECK_NULL return
  - JDK-8303432: Bump update version for OpenJDK: jdk-11.0.20
  - JDK-8303440: The 'ZonedDateTime.parse' may not accept the
    'UTC+XX' zone id
  - JDK-8303465: KeyStore of type KeychainStore, provider Apple
    does not show all trusted certificates
  - JDK-8303476: Add the runtime version in the release file of a
    JDK image
  - JDK-8303482: Update LCMS to 2.15
  - JDK-8303564: C2: 'Bad graph detected in build_loop_late'
    after a CMove is wrongly split thru phi
  - JDK-8303576: addIdentitiesToKeystore in KeystoreImpl.m needs
    CFRelease call in early potential CHECK_NULL return
  - JDK-8303822: gtestMain should give more helpful output
  - JDK-8303861: Error handling step timeouts should never be
    blocked by OnError and others
  - JDK-8303937: Corrupted heap dumps due to missing retries for
    os::write()
  - JDK-8304134: jib bootstrapper fails to quote filename when
    checking download filetype
  - JDK-8304291: [AIX] Broken build after JDK-8301998
  - JDK-8304295: harfbuzz build fails with GCC 7 after JDK-8301998
  - JDK-8304350: Font.getStringBounds calculates wrong width for
    TextAttribute.TRACKING other than 0.0
  - JDK-8304760: Add 2 Microsoft TLS roots
  - JDK-8305113: (tz) Update Timezone Data to 2023c
  - JDK-8305400: ISO 4217 Amendment 175 Update
  - JDK-8305528: [11u] Backport of JDK-8259530 breaks build with
    JDK10 bootstrap VM
  - JDK-8305682: Update the javadoc in the Character class to
    state support for GB 18030-2022 Implementation Level 2
  - JDK-8305711: Arm: C2 always enters slowpath for monitorexit
  - JDK-8305721: add `make compile-commands` artifacts to
    .gitignore
  - JDK-8305975: Add TWCA Global Root CA
  - JDK-8306543: GHA: MSVC installation is failing
  - JDK-8306658: GHA: MSVC installation could be optional since
    it might already be pre-installed
  - JDK-8306664: GHA: Update MSVC version to latest stepping
  - JDK-8306768: CodeCache Analytics reports wrong threshold
  - JDK-8306976: UTIL_REQUIRE_SPECIAL warning on grep
  - JDK-8307134: Add GTS root CAs
  - JDK-8307811: [TEST] compilation of TimeoutInErrorHandlingTest
    fails after backport of JDK-8303861
  - JDK-8308006: Missing NMT memory tagging in CMS
  - JDK-8308884: [17u/11u] Backout JDK-8297951
  - JDK-8309476: [11u] tools/jmod/hashes/HashesOrderTest.java
    fails intermittently
  - JDK-8311465: [11u] Remove designator
    DEFAULT_PROMOTED_VERSION_PRE=ea for release 11.0.20
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-11"/>
	<updated date="2023-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207922">SUSE bug 1207922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213473">SUSE bug 1213473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213474">SUSE bug 1213474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213475">SUSE bug 1213475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213479">SUSE bug 1213479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213481">SUSE bug 1213481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213482">SUSE bug 1213482</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22006/">CVE-2023-22006 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22006">CVE-2023-22006 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22036/">CVE-2023-22036 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22036">CVE-2023-22036 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22041/">CVE-2023-22041 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22041">CVE-2023-22041 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22044/">CVE-2023-22044 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22044">CVE-2023-22044 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22045/">CVE-2023-22045 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22045">CVE-2023-22045 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22049/">CVE-2023-22049 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22049">CVE-2023-22049 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25193/">CVE-2023-25193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25193">CVE-2023-25193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009774414" comment="java-11-openjdk-11.0.20.0-150000.3.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774415" comment="java-11-openjdk-demo-11.0.20.0-150000.3.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774416" comment="java-11-openjdk-devel-11.0.20.0-150000.3.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774417" comment="java-11-openjdk-headless-11.0.20.0-150000.3.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774418" comment="java-11-openjdk-javadoc-11.0.20.0-150000.3.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774419" comment="java-11-openjdk-jmods-11.0.20.0-150000.3.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774420" comment="java-11-openjdk-src-11.0.20.0-150000.3.99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4301" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213287" ref_url="https://bugzilla.suse.com/1213287" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015881.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

- CVE-2023-20569: Fixed AMD 19h ucode to mitigate a side channel vulnerability in some of the AMD CPUs. (bsc#1213287)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-11"/>
	<updated date="2023-08-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213287">SUSE bug 1213287</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009777903" comment="kernel-firmware-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777904" comment="kernel-firmware-all-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777905" comment="kernel-firmware-amdgpu-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777906" comment="kernel-firmware-ath10k-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777907" comment="kernel-firmware-ath11k-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777908" comment="kernel-firmware-atheros-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777909" comment="kernel-firmware-bluetooth-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777910" comment="kernel-firmware-bnx2-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777911" comment="kernel-firmware-brcm-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777912" comment="kernel-firmware-chelsio-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777913" comment="kernel-firmware-dpaa2-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777914" comment="kernel-firmware-i915-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777915" comment="kernel-firmware-intel-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777916" comment="kernel-firmware-iwlwifi-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777917" comment="kernel-firmware-liquidio-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777918" comment="kernel-firmware-marvell-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777919" comment="kernel-firmware-media-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777920" comment="kernel-firmware-mediatek-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777921" comment="kernel-firmware-mellanox-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777922" comment="kernel-firmware-mwifiex-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777923" comment="kernel-firmware-network-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777924" comment="kernel-firmware-nfp-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777925" comment="kernel-firmware-nvidia-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777926" comment="kernel-firmware-platform-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777927" comment="kernel-firmware-prestera-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777928" comment="kernel-firmware-qcom-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777929" comment="kernel-firmware-qlogic-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777930" comment="kernel-firmware-radeon-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777931" comment="kernel-firmware-realtek-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777932" comment="kernel-firmware-serial-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777933" comment="kernel-firmware-sound-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777934" comment="kernel-firmware-ti-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777935" comment="kernel-firmware-ueagle-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777936" comment="kernel-firmware-usb-network-20230724-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777937" comment="ucode-amd-20230724-150500.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4302" version="1" class="patch">
	<metadata>
		<title>Security update for libyajl (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212928" ref_url="https://bugzilla.suse.com/1212928" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-33460" ref_url="https://www.suse.com/security/cve/CVE-2023-33460/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030996.html" source="SUSE-SU"/>
		<description>
This update for libyajl fixes the following issues:

  - CVE-2023-33460: Fixed memory leak which could cause out-of-memory in server (bsc#1212928).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-14"/>
	<updated date="2023-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212928">SUSE bug 1212928</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-33460/">CVE-2023-33460 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33460">CVE-2023-33460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009771708" comment="libyajl-devel-2.1.0-150000.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771709" comment="libyajl-devel-32bit-2.1.0-150000.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771710" comment="libyajl-devel-static-2.1.0-150000.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771711" comment="libyajl2-2.1.0-150000.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771712" comment="libyajl2-32bit-2.1.0-150000.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771713" comment="yajl-2.1.0-150000.4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4303" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1150305" ref_url="https://bugzilla.suse.com/1150305" source="BUGZILLA"/>
		<reference ref_id="1187829" ref_url="https://bugzilla.suse.com/1187829" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1206418" ref_url="https://bugzilla.suse.com/1206418" source="BUGZILLA"/>
		<reference ref_id="1207129" ref_url="https://bugzilla.suse.com/1207129" source="BUGZILLA"/>
		<reference ref_id="1207894" ref_url="https://bugzilla.suse.com/1207894" source="BUGZILLA"/>
		<reference ref_id="1207948" ref_url="https://bugzilla.suse.com/1207948" source="BUGZILLA"/>
		<reference ref_id="1208788" ref_url="https://bugzilla.suse.com/1208788" source="BUGZILLA"/>
		<reference ref_id="1210335" ref_url="https://bugzilla.suse.com/1210335" source="BUGZILLA"/>
		<reference ref_id="1210565" ref_url="https://bugzilla.suse.com/1210565" source="BUGZILLA"/>
		<reference ref_id="1210584" ref_url="https://bugzilla.suse.com/1210584" source="BUGZILLA"/>
		<reference ref_id="1210627" ref_url="https://bugzilla.suse.com/1210627" source="BUGZILLA"/>
		<reference ref_id="1210780" ref_url="https://bugzilla.suse.com/1210780" source="BUGZILLA"/>
		<reference ref_id="1210825" ref_url="https://bugzilla.suse.com/1210825" source="BUGZILLA"/>
		<reference ref_id="1210853" ref_url="https://bugzilla.suse.com/1210853" source="BUGZILLA"/>
		<reference ref_id="1211014" ref_url="https://bugzilla.suse.com/1211014" source="BUGZILLA"/>
		<reference ref_id="1211131" ref_url="https://bugzilla.suse.com/1211131" source="BUGZILLA"/>
		<reference ref_id="1211243" ref_url="https://bugzilla.suse.com/1211243" source="BUGZILLA"/>
		<reference ref_id="1211738" ref_url="https://bugzilla.suse.com/1211738" source="BUGZILLA"/>
		<reference ref_id="1211811" ref_url="https://bugzilla.suse.com/1211811" source="BUGZILLA"/>
		<reference ref_id="1211867" ref_url="https://bugzilla.suse.com/1211867" source="BUGZILLA"/>
		<reference ref_id="1212051" ref_url="https://bugzilla.suse.com/1212051" source="BUGZILLA"/>
		<reference ref_id="1212256" ref_url="https://bugzilla.suse.com/1212256" source="BUGZILLA"/>
		<reference ref_id="1212265" ref_url="https://bugzilla.suse.com/1212265" source="BUGZILLA"/>
		<reference ref_id="1212301" ref_url="https://bugzilla.suse.com/1212301" source="BUGZILLA"/>
		<reference ref_id="1212445" ref_url="https://bugzilla.suse.com/1212445" source="BUGZILLA"/>
		<reference ref_id="1212456" ref_url="https://bugzilla.suse.com/1212456" source="BUGZILLA"/>
		<reference ref_id="1212502" ref_url="https://bugzilla.suse.com/1212502" source="BUGZILLA"/>
		<reference ref_id="1212525" ref_url="https://bugzilla.suse.com/1212525" source="BUGZILLA"/>
		<reference ref_id="1212603" ref_url="https://bugzilla.suse.com/1212603" source="BUGZILLA"/>
		<reference ref_id="1212604" ref_url="https://bugzilla.suse.com/1212604" source="BUGZILLA"/>
		<reference ref_id="1212685" ref_url="https://bugzilla.suse.com/1212685" source="BUGZILLA"/>
		<reference ref_id="1212766" ref_url="https://bugzilla.suse.com/1212766" source="BUGZILLA"/>
		<reference ref_id="1212835" ref_url="https://bugzilla.suse.com/1212835" source="BUGZILLA"/>
		<reference ref_id="1212838" ref_url="https://bugzilla.suse.com/1212838" source="BUGZILLA"/>
		<reference ref_id="1212842" ref_url="https://bugzilla.suse.com/1212842" source="BUGZILLA"/>
		<reference ref_id="1212846" ref_url="https://bugzilla.suse.com/1212846" source="BUGZILLA"/>
		<reference ref_id="1212848" ref_url="https://bugzilla.suse.com/1212848" source="BUGZILLA"/>
		<reference ref_id="1212861" ref_url="https://bugzilla.suse.com/1212861" source="BUGZILLA"/>
		<reference ref_id="1212869" ref_url="https://bugzilla.suse.com/1212869" source="BUGZILLA"/>
		<reference ref_id="1212892" ref_url="https://bugzilla.suse.com/1212892" source="BUGZILLA"/>
		<reference ref_id="1212901" ref_url="https://bugzilla.suse.com/1212901" source="BUGZILLA"/>
		<reference ref_id="1212905" ref_url="https://bugzilla.suse.com/1212905" source="BUGZILLA"/>
		<reference ref_id="1212961" ref_url="https://bugzilla.suse.com/1212961" source="BUGZILLA"/>
		<reference ref_id="1213010" ref_url="https://bugzilla.suse.com/1213010" source="BUGZILLA"/>
		<reference ref_id="1213011" ref_url="https://bugzilla.suse.com/1213011" source="BUGZILLA"/>
		<reference ref_id="1213012" ref_url="https://bugzilla.suse.com/1213012" source="BUGZILLA"/>
		<reference ref_id="1213013" ref_url="https://bugzilla.suse.com/1213013" source="BUGZILLA"/>
		<reference ref_id="1213014" ref_url="https://bugzilla.suse.com/1213014" source="BUGZILLA"/>
		<reference ref_id="1213015" ref_url="https://bugzilla.suse.com/1213015" source="BUGZILLA"/>
		<reference ref_id="1213016" ref_url="https://bugzilla.suse.com/1213016" source="BUGZILLA"/>
		<reference ref_id="1213017" ref_url="https://bugzilla.suse.com/1213017" source="BUGZILLA"/>
		<reference ref_id="1213018" ref_url="https://bugzilla.suse.com/1213018" source="BUGZILLA"/>
		<reference ref_id="1213019" ref_url="https://bugzilla.suse.com/1213019" source="BUGZILLA"/>
		<reference ref_id="1213020" ref_url="https://bugzilla.suse.com/1213020" source="BUGZILLA"/>
		<reference ref_id="1213021" ref_url="https://bugzilla.suse.com/1213021" source="BUGZILLA"/>
		<reference ref_id="1213024" ref_url="https://bugzilla.suse.com/1213024" source="BUGZILLA"/>
		<reference ref_id="1213025" ref_url="https://bugzilla.suse.com/1213025" source="BUGZILLA"/>
		<reference ref_id="1213032" ref_url="https://bugzilla.suse.com/1213032" source="BUGZILLA"/>
		<reference ref_id="1213034" ref_url="https://bugzilla.suse.com/1213034" source="BUGZILLA"/>
		<reference ref_id="1213035" ref_url="https://bugzilla.suse.com/1213035" source="BUGZILLA"/>
		<reference ref_id="1213036" ref_url="https://bugzilla.suse.com/1213036" source="BUGZILLA"/>
		<reference ref_id="1213037" ref_url="https://bugzilla.suse.com/1213037" source="BUGZILLA"/>
		<reference ref_id="1213038" ref_url="https://bugzilla.suse.com/1213038" source="BUGZILLA"/>
		<reference ref_id="1213039" ref_url="https://bugzilla.suse.com/1213039" source="BUGZILLA"/>
		<reference ref_id="1213040" ref_url="https://bugzilla.suse.com/1213040" source="BUGZILLA"/>
		<reference ref_id="1213041" ref_url="https://bugzilla.suse.com/1213041" source="BUGZILLA"/>
		<reference ref_id="1213059" ref_url="https://bugzilla.suse.com/1213059" source="BUGZILLA"/>
		<reference ref_id="1213061" ref_url="https://bugzilla.suse.com/1213061" source="BUGZILLA"/>
		<reference ref_id="1213087" ref_url="https://bugzilla.suse.com/1213087" source="BUGZILLA"/>
		<reference ref_id="1213088" ref_url="https://bugzilla.suse.com/1213088" source="BUGZILLA"/>
		<reference ref_id="1213089" ref_url="https://bugzilla.suse.com/1213089" source="BUGZILLA"/>
		<reference ref_id="1213090" ref_url="https://bugzilla.suse.com/1213090" source="BUGZILLA"/>
		<reference ref_id="1213092" ref_url="https://bugzilla.suse.com/1213092" source="BUGZILLA"/>
		<reference ref_id="1213093" ref_url="https://bugzilla.suse.com/1213093" source="BUGZILLA"/>
		<reference ref_id="1213094" ref_url="https://bugzilla.suse.com/1213094" source="BUGZILLA"/>
		<reference ref_id="1213095" ref_url="https://bugzilla.suse.com/1213095" source="BUGZILLA"/>
		<reference ref_id="1213096" ref_url="https://bugzilla.suse.com/1213096" source="BUGZILLA"/>
		<reference ref_id="1213098" ref_url="https://bugzilla.suse.com/1213098" source="BUGZILLA"/>
		<reference ref_id="1213099" ref_url="https://bugzilla.suse.com/1213099" source="BUGZILLA"/>
		<reference ref_id="1213100" ref_url="https://bugzilla.suse.com/1213100" source="BUGZILLA"/>
		<reference ref_id="1213102" ref_url="https://bugzilla.suse.com/1213102" source="BUGZILLA"/>
		<reference ref_id="1213103" ref_url="https://bugzilla.suse.com/1213103" source="BUGZILLA"/>
		<reference ref_id="1213104" ref_url="https://bugzilla.suse.com/1213104" source="BUGZILLA"/>
		<reference ref_id="1213105" ref_url="https://bugzilla.suse.com/1213105" source="BUGZILLA"/>
		<reference ref_id="1213106" ref_url="https://bugzilla.suse.com/1213106" source="BUGZILLA"/>
		<reference ref_id="1213107" ref_url="https://bugzilla.suse.com/1213107" source="BUGZILLA"/>
		<reference ref_id="1213108" ref_url="https://bugzilla.suse.com/1213108" source="BUGZILLA"/>
		<reference ref_id="1213109" ref_url="https://bugzilla.suse.com/1213109" source="BUGZILLA"/>
		<reference ref_id="1213110" ref_url="https://bugzilla.suse.com/1213110" source="BUGZILLA"/>
		<reference ref_id="1213111" ref_url="https://bugzilla.suse.com/1213111" source="BUGZILLA"/>
		<reference ref_id="1213112" ref_url="https://bugzilla.suse.com/1213112" source="BUGZILLA"/>
		<reference ref_id="1213113" ref_url="https://bugzilla.suse.com/1213113" source="BUGZILLA"/>
		<reference ref_id="1213114" ref_url="https://bugzilla.suse.com/1213114" source="BUGZILLA"/>
		<reference ref_id="1213116" ref_url="https://bugzilla.suse.com/1213116" source="BUGZILLA"/>
		<reference ref_id="1213134" ref_url="https://bugzilla.suse.com/1213134" source="BUGZILLA"/>
		<reference ref_id="1213167" ref_url="https://bugzilla.suse.com/1213167" source="BUGZILLA"/>
		<reference ref_id="1213205" ref_url="https://bugzilla.suse.com/1213205" source="BUGZILLA"/>
		<reference ref_id="1213206" ref_url="https://bugzilla.suse.com/1213206" source="BUGZILLA"/>
		<reference ref_id="1213226" ref_url="https://bugzilla.suse.com/1213226" source="BUGZILLA"/>
		<reference ref_id="1213233" ref_url="https://bugzilla.suse.com/1213233" source="BUGZILLA"/>
		<reference ref_id="1213245" ref_url="https://bugzilla.suse.com/1213245" source="BUGZILLA"/>
		<reference ref_id="1213247" ref_url="https://bugzilla.suse.com/1213247" source="BUGZILLA"/>
		<reference ref_id="1213252" ref_url="https://bugzilla.suse.com/1213252" source="BUGZILLA"/>
		<reference ref_id="1213258" ref_url="https://bugzilla.suse.com/1213258" source="BUGZILLA"/>
		<reference ref_id="1213259" ref_url="https://bugzilla.suse.com/1213259" source="BUGZILLA"/>
		<reference ref_id="1213263" ref_url="https://bugzilla.suse.com/1213263" source="BUGZILLA"/>
		<reference ref_id="1213264" ref_url="https://bugzilla.suse.com/1213264" source="BUGZILLA"/>
		<reference ref_id="1213272" ref_url="https://bugzilla.suse.com/1213272" source="BUGZILLA"/>
		<reference ref_id="1213286" ref_url="https://bugzilla.suse.com/1213286" source="BUGZILLA"/>
		<reference ref_id="1213287" ref_url="https://bugzilla.suse.com/1213287" source="BUGZILLA"/>
		<reference ref_id="1213304" ref_url="https://bugzilla.suse.com/1213304" source="BUGZILLA"/>
		<reference ref_id="1213417" ref_url="https://bugzilla.suse.com/1213417" source="BUGZILLA"/>
		<reference ref_id="1213493" ref_url="https://bugzilla.suse.com/1213493" source="BUGZILLA"/>
		<reference ref_id="1213523" ref_url="https://bugzilla.suse.com/1213523" source="BUGZILLA"/>
		<reference ref_id="1213524" ref_url="https://bugzilla.suse.com/1213524" source="BUGZILLA"/>
		<reference ref_id="1213533" ref_url="https://bugzilla.suse.com/1213533" source="BUGZILLA"/>
		<reference ref_id="1213543" ref_url="https://bugzilla.suse.com/1213543" source="BUGZILLA"/>
		<reference ref_id="1213578" ref_url="https://bugzilla.suse.com/1213578" source="BUGZILLA"/>
		<reference ref_id="1213585" ref_url="https://bugzilla.suse.com/1213585" source="BUGZILLA"/>
		<reference ref_id="1213586" ref_url="https://bugzilla.suse.com/1213586" source="BUGZILLA"/>
		<reference ref_id="1213588" ref_url="https://bugzilla.suse.com/1213588" source="BUGZILLA"/>
		<reference ref_id="1213601" ref_url="https://bugzilla.suse.com/1213601" source="BUGZILLA"/>
		<reference ref_id="1213620" ref_url="https://bugzilla.suse.com/1213620" source="BUGZILLA"/>
		<reference ref_id="1213632" ref_url="https://bugzilla.suse.com/1213632" source="BUGZILLA"/>
		<reference ref_id="1213653" ref_url="https://bugzilla.suse.com/1213653" source="BUGZILLA"/>
		<reference ref_id="1213705" ref_url="https://bugzilla.suse.com/1213705" source="BUGZILLA"/>
		<reference ref_id="1213713" ref_url="https://bugzilla.suse.com/1213713" source="BUGZILLA"/>
		<reference ref_id="1213715" ref_url="https://bugzilla.suse.com/1213715" source="BUGZILLA"/>
		<reference ref_id="1213747" ref_url="https://bugzilla.suse.com/1213747" source="BUGZILLA"/>
		<reference ref_id="1213756" ref_url="https://bugzilla.suse.com/1213756" source="BUGZILLA"/>
		<reference ref_id="1213759" ref_url="https://bugzilla.suse.com/1213759" source="BUGZILLA"/>
		<reference ref_id="1213777" ref_url="https://bugzilla.suse.com/1213777" source="BUGZILLA"/>
		<reference ref_id="1213810" ref_url="https://bugzilla.suse.com/1213810" source="BUGZILLA"/>
		<reference ref_id="1213812" ref_url="https://bugzilla.suse.com/1213812" source="BUGZILLA"/>
		<reference ref_id="1213856" ref_url="https://bugzilla.suse.com/1213856" source="BUGZILLA"/>
		<reference ref_id="1213857" ref_url="https://bugzilla.suse.com/1213857" source="BUGZILLA"/>
		<reference ref_id="1213863" ref_url="https://bugzilla.suse.com/1213863" source="BUGZILLA"/>
		<reference ref_id="1213867" ref_url="https://bugzilla.suse.com/1213867" source="BUGZILLA"/>
		<reference ref_id="1213870" ref_url="https://bugzilla.suse.com/1213870" source="BUGZILLA"/>
		<reference ref_id="1213871" ref_url="https://bugzilla.suse.com/1213871" source="BUGZILLA"/>
		<reference ref_id="1213872" ref_url="https://bugzilla.suse.com/1213872" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982/" source="CVE"/>
		<reference ref_id="CVE-2023-0459" ref_url="https://www.suse.com/security/cve/CVE-2023-0459/" source="CVE"/>
		<reference ref_id="CVE-2023-1829" ref_url="https://www.suse.com/security/cve/CVE-2023-1829/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<reference ref_id="CVE-2023-21400" ref_url="https://www.suse.com/security/cve/CVE-2023-21400/" source="CVE"/>
		<reference ref_id="CVE-2023-2156" ref_url="https://www.suse.com/security/cve/CVE-2023-2156/" source="CVE"/>
		<reference ref_id="CVE-2023-2166" ref_url="https://www.suse.com/security/cve/CVE-2023-2166/" source="CVE"/>
		<reference ref_id="CVE-2023-2430" ref_url="https://www.suse.com/security/cve/CVE-2023-2430/" source="CVE"/>
		<reference ref_id="CVE-2023-2985" ref_url="https://www.suse.com/security/cve/CVE-2023-2985/" source="CVE"/>
		<reference ref_id="CVE-2023-3090" ref_url="https://www.suse.com/security/cve/CVE-2023-3090/" source="CVE"/>
		<reference ref_id="CVE-2023-31083" ref_url="https://www.suse.com/security/cve/CVE-2023-31083/" source="CVE"/>
		<reference ref_id="CVE-2023-3111" ref_url="https://www.suse.com/security/cve/CVE-2023-3111/" source="CVE"/>
		<reference ref_id="CVE-2023-3117" ref_url="https://www.suse.com/security/cve/CVE-2023-3117/" source="CVE"/>
		<reference ref_id="CVE-2023-31248" ref_url="https://www.suse.com/security/cve/CVE-2023-31248/" source="CVE"/>
		<reference ref_id="CVE-2023-3212" ref_url="https://www.suse.com/security/cve/CVE-2023-3212/" source="CVE"/>
		<reference ref_id="CVE-2023-3268" ref_url="https://www.suse.com/security/cve/CVE-2023-3268/" source="CVE"/>
		<reference ref_id="CVE-2023-3389" ref_url="https://www.suse.com/security/cve/CVE-2023-3389/" source="CVE"/>
		<reference ref_id="CVE-2023-3390" ref_url="https://www.suse.com/security/cve/CVE-2023-3390/" source="CVE"/>
		<reference ref_id="CVE-2023-35001" ref_url="https://www.suse.com/security/cve/CVE-2023-35001/" source="CVE"/>
		<reference ref_id="CVE-2023-3567" ref_url="https://www.suse.com/security/cve/CVE-2023-3567/" source="CVE"/>
		<reference ref_id="CVE-2023-3609" ref_url="https://www.suse.com/security/cve/CVE-2023-3609/" source="CVE"/>
		<reference ref_id="CVE-2023-3611" ref_url="https://www.suse.com/security/cve/CVE-2023-3611/" source="CVE"/>
		<reference ref_id="CVE-2023-3776" ref_url="https://www.suse.com/security/cve/CVE-2023-3776/" source="CVE"/>
		<reference ref_id="CVE-2023-3812" ref_url="https://www.suse.com/security/cve/CVE-2023-3812/" source="CVE"/>
		<reference ref_id="CVE-2023-38409" ref_url="https://www.suse.com/security/cve/CVE-2023-38409/" source="CVE"/>
		<reference ref_id="CVE-2023-3863" ref_url="https://www.suse.com/security/cve/CVE-2023-3863/" source="CVE"/>
		<reference ref_id="CVE-2023-4004" ref_url="https://www.suse.com/security/cve/CVE-2023-4004/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-40982: Fixed transient execution attack called 'Gather Data Sampling' (bsc#1206418).
- CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec (bsc#1211738).
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).
- CVE-2023-20569: Fixed side channel attack ‘Inception’ or ‘RAS Poisoning’ (bsc#1213287).
- CVE-2023-20593: Fixed a ZenBleed issue in 'Zen 2' CPUs that could allow an attacker to potentially access sensitive information (bsc#1213286).
- CVE-2023-21400: Fixed several memory corruptions due to improper locking in io_uring (bsc#1213272).
- CVE-2023-2156: Fixed a flaw in the networking subsystem within the handling of the RPL protocol (bsc#1211131).
- CVE-2023-2166: Fixed NULL pointer dereference in can_rcv_filter (bsc#1210627).
- CVE-2023-2430: Fixed amissing lock for IOPOLL in io_cqring_event_overflow() in io_uring.c that could allow a privileged user to cause a denial of service (bsc#1211014).
- CVE-2023-2985: Fixed an use-after-free vulnerability in hfsplus_put_super in fs/hfsplus/super.c that could allow a local user to cause a denial of service (bsc#1211867).
- CVE-2023-3090: Fixed a heap out-of-bounds write in the ipvlan network driver (bsc#1212842).
- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).
- CVE-2023-3111: Fixed a use-after-free vulnerability in prepare_to_relocate in fs/btrfs/relocation.c (bsc#1212051).
- CVE-2023-3117: Fixed an use-after-free vulnerability in the netfilter subsystem when processing named and anonymous sets in batch requests that could allow a local user with CAP_NET_ADMIN capability to crash or potentially escalate their privileges on the system (bsc#1213245).
- CVE-2023-31248: Fixed an use-after-free vulnerability in nft_chain_lookup_byid that could allow a local attacker to escalate their privilege (bsc#1213061).
- CVE-2023-3212: Fixed a NULL pointer dereference flaw in the gfs2 file system (bsc#1212265).
- CVE-2023-3268: Fixed an out of bounds memory access flaw in relay_file_read_start_pos in the relayfs (bsc#1212502).
- CVE-2023-3389: Fixed a use-after-free vulnerability in the io_uring subsystem (bsc#1212838).
- CVE-2023-3390: Fixed an use-after-free vulnerability in the netfilter subsystem in net/netfilter/nf_tables_api.c that could allow a local attacker with user access to cause a privilege escalation issue (bsc#1212846).
- CVE-2023-35001: Fixed an out-of-bounds memory access flaw in nft_byteorder that could allow a local attacker to escalate their privilege (bsc#1213059).
- CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c (bsc#1213167).
- CVE-2023-3609: Fixed reference counter leak leading to  overflow in net/sched (bsc#1213586).
- CVE-2023-3611: Fixed an out-of-bounds write in net/sched sch_qfq(bsc#1213585).
- CVE-2023-3776: Fixed improper refcount update in  cls_fw leads to use-after-free (bsc#1213588).
- CVE-2023-3812: Fixed an out-of-bounds memory access flaw in the TUN/TAP device driver functionality that could allow a local user to crash or potentially escalate their privileges on the system (bsc#1213543).
- CVE-2023-38409: Fixed a use-after-free in drivers/video/fbdev/core/fbcon.c (bsc#1213417).
- CVE-2023-3863: Fixed a use-after-free flaw in nfc_llcp_find_local in net/nfc/llcp_core.c in NFC (bsc#1213601).
- CVE-2023-4004: Fixed improper element removal netfilter nft_set_pipapo (bsc#1213812).

The following non-security bugs were fixed:

- acpi/iort: remove erroneous id_count check in iort_node_get_rmr_info() (git-fixes).
- acpi: cppc: add acpi disabled check to acpi_cpc_valid() (bsc#1212445).
- acpi: cppc: add definition for undefined fadt preferred pm profile value (bsc#1212445).
- acpi: fix suspend with xen pv (git-fixes).
- acpi: utils: fix acpi_evaluate_dsm_typed() redefinition error (git-fixes).
- add module_firmware() for firmware_tg357766 (git-fixes).
- adreno: shutdown the gpu properly (git-fixes).
- afs: adjust ack interpretation to try and cope with nat (git-fixes).
- afs: fix access after dec in put functions (git-fixes).
- afs: fix afs_getattr() to refetch file status if callback break occurred (git-fixes).
- afs: fix dynamic root getattr (git-fixes).
- afs: fix fileserver probe rtt handling (git-fixes).
- afs: fix infinite loop found by xfstest generic/676 (git-fixes).
- afs: fix lost servers_outstanding count (git-fixes).
- afs: fix server-&gt;active leak in afs_put_server (git-fixes).
- afs: fix setting of mtime when creating a file/dir/symlink (git-fixes).
- afs: fix updating of i_size with dv jump from server (git-fixes).
- afs: fix vlserver probe rtt handling (git-fixes).
- afs: return -eagain, not -eremoteio, when a file already locked (git-fixes).
- afs: use refcount_t rather than atomic_t (git-fixes).
- afs: use the operation issue time instead of the reply time for callbacks (git-fixes).
- alsa: ac97: fix possible null dereference in snd_ac97_mixer (git-fixes).
- alsa: emu10k1: roll up loops in dsp setup code for audigy (git-fixes).
- alsa: fireface: make read-only const array for model names static (git-fixes).
- alsa: hda/realtek - remove 3k pull low procedure (git-fixes).
- alsa: hda/realtek: add quirk for asus rog g614jx (git-fixes).
- alsa: hda/realtek: add quirk for asus rog ga402x (git-fixes).
- alsa: hda/realtek: add quirk for asus rog gx650p (git-fixes).
- alsa: hda/realtek: add quirk for asus rog gz301v (git-fixes).
- alsa: hda/realtek: add quirk for clevo npx0snx (git-fixes).
- alsa: hda/realtek: add quirk for clevo ns70au (git-fixes).
- alsa: hda/realtek: add quirks for rog ally cs35l41 audio (git-fixes).
- alsa: hda/realtek: add quirks for unis h3c desktop b760 &amp; q760 (git-fixes).
- alsa: hda/realtek: add support for dell oasis 13/14/16 laptops (git-fixes).
- alsa: hda/realtek: amend g634 quirk to enable rear speakers (git-fixes).
- alsa: hda/realtek: enable mute led on hp laptop 15s-eq2xxx (git-fixes).
- alsa: hda/realtek: enable mute/micmute leds and limit mic boost on elitebook (git-fixes).
- alsa: hda/realtek: fix generic fixup definition for cs35l41 amp (git-fixes).
- alsa: hda/realtek: support asus g713pv laptop (git-fixes).
- alsa: hda/realtek: whitespace fix (git-fixes).
- alsa: hda/relatek: enable mute led on hp 250 g8 (git-fixes).
- alsa: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync() (git-fixes).
- alsa: hda: lnl: add hd audio pci id (git-fixes).
- alsa: jack: fix mutex call in snd_jack_report() (git-fixes).
- alsa: oxfw: make read-only const array models static (git-fixes).
- alsa: pcm: fix potential data race at pcm memory allocation helpers (git-fixes).
- alsa: usb-audio: add fixed_rate quirk for jbl quantum610 wireless (git-fixes).
- alsa: usb-audio: add new quirk fixed_rate for jbl quantum810 wireless (git-fixes).
- alsa: usb-audio: add quirk for microsoft modern wireless headset (bsc#1207129).
- alsa: usb-audio: always initialize fixed_rate in snd_usb_find_implicit_fb_sync_format() (git-fixes).
- alsa: usb-audio: apply mutex around snd_usb_endpoint_set_params() (git-fixes).
- alsa: usb-audio: avoid superfluous endpoint setup (git-fixes).
- alsa: usb-audio: avoid unnecessary interface change at ep close (git-fixes).
- alsa: usb-audio: clear fixed clock rate at closing ep (git-fixes).
- alsa: usb-audio: correct the return code from snd_usb_endpoint_set_params() (git-fixes).
- alsa: usb-audio: drop superfluous interface setup at parsing (git-fixes).
- alsa: usb-audio: fix possible null pointer dereference in snd_usb_pcm_has_fixed_rate() (git-fixes).
- alsa: usb-audio: fix wrong kfree issue in snd_usb_endpoint_free_all (git-fixes).
- alsa: usb-audio: more refactoring of hw constraint rules (git-fixes).
- alsa: usb-audio: properly refcounting clock rate (git-fixes).
- alsa: usb-audio: rate limit usb_set_interface error reporting (git-fixes).
- alsa: usb-audio: refcount multiple accesses on the single clock (git-fixes).
- alsa: usb-audio: split endpoint setups for hw_params and prepare (take#2) (git-fixes).
- alsa: usb-audio: update for native dsd support quirks (git-fixes).
- alsa: usb-audio: use atomic_try_cmpxchg in ep_state_update (git-fixes).
- alsa: usb-audio: workaround for xrun at prepare (git-fixes).
- amd-pstate: fix amd_pstate mode switch (git-fixes).
- amdgpu: validate offset_in_bo of drm_amdgpu_gem_va (git-fixes).
- apparmor: fix missing error check for rhashtable_insert_fast (git-fixes).
- arm64/mm: mark private vm_fault_x defines as vm_fault_t (git-fixes)
- arm64: add missing set/way cmo encodings (git-fixes).
- arm64: dts: microchip: sparx5: do not use psci on reference boards (git-fixes)
- arm64: vdso: pass (void *) to virt_to_page() (git-fixes)
- arm64: xor-neon: mark xor_arm64_neon_*() static (git-fixes)
- arm: dts: fix erroneous ads touchscreen polarities (git-fixes).
- asoc: amd: acp: fix for invalid dai id handling in acp_get_byte_count() (git-fixes).
- asoc: atmel: fix the 8k sample parameter in i2sc master (git-fixes).
- asoc: codecs: es8316: fix dmic config (git-fixes).
- asoc: codecs: wcd-mbhc-v2: fix resource leaks on component remove (git-fixes).
- asoc: codecs: wcd934x: fix resource leaks on component remove (git-fixes).
- asoc: codecs: wcd938x: fix codec initialisation race (git-fixes).
- asoc: codecs: wcd938x: fix db range for hphl and hphr (git-fixes).
- asoc: codecs: wcd938x: fix missing clsh ctrl error handling (git-fixes).
- asoc: codecs: wcd938x: fix soundwire initialisation race (git-fixes).
- asoc: da7219: check for failure reading aad irq events (git-fixes).
- asoc: da7219: flush pending aad irq when suspending (git-fixes).
- asoc: es8316: do not set rate constraints for unsupported mclks (git-fixes).
- asoc: es8316: increment max value for alc capture target volume control (git-fixes).
- asoc: fsl_sai: disable bit clock with transmitter (git-fixes).
- asoc: fsl_spdif: silence output on stop (git-fixes).
- asoc: imx-audmix: check return value of devm_kasprintf() (git-fixes).
- asoc: intel: sof_sdw: remove sof_sdw_tgl_hdmi for meteorlake devices (git-fixes).
- asoc: mediatek: mt8173: fix irq error path (git-fixes).
- asoc: nau8824: add quirk to active-high jack-detect (git-fixes).
- asoc: rt5640: fix sleep in atomic context (git-fixes).
- asoc: rt5682-sdw: fix for jd event handling in clockstop mode0 (git-fixes).
- asoc: rt711-sdca: fix for jd event handling in clockstop mode0 (git-fixes).
- asoc: rt711: fix for jd event handling in clockstop mode0 (git-fixes).
- asoc: simple-card: add missing of_node_put() in case of error (git-fixes).
- asoc: sof: ipc3-dtrace: uninitialized data in dfsentry_trace_filter_write() (git-fixes).
- asoc: sof: topology: fix logic for copying tuples (git-fixes).
- asoc: tegra: fix adx byte map (git-fixes).
- asoc: tegra: fix amx byte map (git-fixes).
- asoc: wm8904: fill the cache for wm8904_adc_test_0 register (git-fixes).
- ata: pata_ns87415: mark ns87560_tf_read static (git-fixes).
- block, bfq: fix division by zero error on zero wsum (bsc#1213653).
- block: fix a source code comment in include/uapi/linux/blkzoned.h (git-fixes).
- bluetooth: fix invalid-bdaddr quirk for non-persistent setup (git-fixes).
- bluetooth: fix use-bdaddr-property quirk (git-fixes).
- bluetooth: hci_bcm: do not mark valid bd_addr as invalid (git-fixes).
- bluetooth: hci_event: call disconnect callback before deleting conn (git-fixes).
- bluetooth: hci_sync: avoid use-after-free in dbg for hci_remove_adv_monitor() (git-fixes).
- bluetooth: iso: consider right cis when removing cig at cleanup (git-fixes).
- bluetooth: iso: fix cig auto-allocation to select configurable cig (git-fixes).
- bluetooth: iso: fix iso_conn related locking and validity issues (git-fixes).
- bluetooth: iso: use hci_sync for setting cig parameters (git-fixes).
- bluetooth: use rcu for hci_conn_params and iterate safely in hci_sync (git-fixes).
- bonding: fix negative jump label count on nested bonding (bsc#1212685).
- bus: fsl-mc: fsl-mc-allocator: drop a write-only variable (git-fixes).
- bus: mhi: add new interfaces to handle mhi channels directly (bsc#1207948).
- bus: mhi: host: add destroy_device argument to mhi_power_down() (bsc#1207948).
- bus: ti-sysc: fix dispc quirk masking bool variables (git-fixes).
- can: bcm: fix uaf in bcm_proc_show() (git-fixes).
- can: gs_usb: gs_can_close(): add missing set of can state to can_state_stopped (git-fixes).
- can: isotp: isotp_sendmsg(): fix return error fix on tx path (git-fixes).
- can: kvaser_pciefd: remove handler for unused kvaser_pciefd_pack_type_eframe_ack (git-fixes).
- can: kvaser_pciefd: remove useless write to interrupt register (git-fixes).
- can: length: fix bitstuffing count (git-fixes).
- can: length: fix description of the rrs field (git-fixes).
- can: length: make header self contained (git-fixes).
- ceph: add a dedicated private data for netfs rreq (bsc#1213205).
- ceph: do not let check_caps skip sending responses for revoke msgs (bsc#1213856).
- ceph: fix blindly expanding the readahead windows (bsc#1213206).
- cifs: add a warning when the in-flight count goes negative (bsc#1193629).
- cifs: address unused variable warning (bsc#1193629).
- cifs: do all necessary checks for credits within or before locking (bsc#1193629).
- cifs: fix lease break oops in xfstest generic/098 (bsc#1193629).
- cifs: fix max_credits implementation (bsc#1193629).
- cifs: fix session state check in reconnect to avoid use-after-free issue (bsc#1193629).
- cifs: fix session state check in smb2_find_smb_ses (bsc#1193629).
- cifs: fix session state transition to avoid use-after-free issue (bsc#1193629).
- cifs: fix sockaddr comparison in iface_cmp (bsc#1193629).
- cifs: fix status checks in cifs_tree_connect (bsc#1193629).
- cifs: log session id when a matching ses is not found (bsc#1193629).
- cifs: new dynamic tracepoint to track ses not found errors (bsc#1193629).
- cifs: prevent use-after-free by freeing the cfile later (bsc#1193629).
- cifs: print all credit counters in debugdata (bsc#1193629).
- cifs: print client_guid in debugdata (bsc#1193629).
- cifs: print more detail when invalidate_inode_mapping fails (bsc#1193629).
- cifs: print nosharesock value while dumping mount options (bsc#1193629).
- clk: cdce925: check return value of kasprintf() (git-fixes).
- clk: fix memory leak in devm_clk_notifier_register() (git-fixes).
- clk: imx: clk-imx8mn: fix memory leak in imx8mn_clocks_probe (git-fixes).
- clk: imx: clk-imx8mp: improve error handling in imx8mp_clocks_probe() (git-fixes).
- clk: imx: scu: use _safe list iterator to avoid a use after free (git-fixes).
- clk: keystone: sci-clk: check return value of kasprintf() (git-fixes).
- clk: qcom: camcc-sc7180: add parent dependency to all camera gdscs (git-fixes).
- clk: qcom: gcc-ipq6018: use floor ops for sdcc clocks (git-fixes).
- clk: samsung: add exynos4212 compatible to clkout driver (git-fixes).
- clk: si5341: check return value of {devm_}kasprintf() (git-fixes).
- clk: si5341: free unused memory on probe failure (git-fixes).
- clk: si5341: return error if one synth clock registration fails (git-fixes).
- clk: tegra: tegra124-emc: fix potential memory leak (git-fixes).
- clk: ti: clkctrl: check return value of kasprintf() (git-fixes).
- clk: vc5: check memory returned by kasprintf() (git-fixes).
- coda: avoid partial allocation of sig_inputargs (git-fixes).
- codel: fix kernel-doc notation warnings (git-fixes).
- cpufreq: amd-pstate: add -&gt;fast_switch() callback (bsc#1212445).
- cpufreq: amd-pstate: add amd p-state frequencies attributes (bsc#1212445).
- cpufreq: amd-pstate: add amd p-state performance attributes (bsc#1212445).
- cpufreq: amd-pstate: add amd-pstate driver parameter for mode selection (bsc#1212445).
- cpufreq: amd-pstate: add boost mode support for amd p-state (bsc#1212445).
- cpufreq: amd-pstate: add driver working mode switch support (bsc#1212445).
- cpufreq: amd-pstate: add fast switch function for amd p-state (bsc#1212445).
- cpufreq: amd-pstate: add guided autonomous mode (bsc#1212445).
- cpufreq: amd-pstate: add guided mode control support via sysfs (bsc#1212445).
- cpufreq: amd-pstate: add more tracepoint for amd p-state module (bsc#1212445).
- cpufreq: amd-pstate: add resume and suspend callbacks (bsc#1212445).
- cpufreq: amd-pstate: add trace for amd p-state module (bsc#1212445).
- cpufreq: amd-pstate: avoid uninitialized variable use (bsc#1212445).
- cpufreq: amd-pstate: change amd-pstate driver to be built-in type (bsc#1212445).
- cpufreq: amd-pstate: convert sprintf with sysfs_emit() (bsc#1212445).
- cpufreq: amd-pstate: cpufreq: amd-pstate: reset msr_amd_perf_ctl register at init (bsc#1212445).
- cpufreq: amd-pstate: expose struct amd_cpudata (bsc#1212445).
- cpufreq: amd-pstate: fix initial highest_perf value (bsc#1212445).
- cpufreq: amd-pstate: fix invalid write to msr_amd_cppc_req (bsc#1212445).
- cpufreq: amd-pstate: fix kconfig dependencies for amd p-state (bsc#1212445).
- cpufreq: amd-pstate: fix kernel hang issue while amd-pstate unregistering (bsc#1212445).
- cpufreq: amd-pstate: fix struct amd_cpudata kernel-doc comment (bsc#1212445).
- cpufreq: amd-pstate: fix white-space (bsc#1212445).
- cpufreq: amd-pstate: implement amd pstate cpu online and offline callback (bsc#1212445).
- cpufreq: amd-pstate: implement pstate epp support for the amd processors (bsc#1212445).
- cpufreq: amd-pstate: implement suspend and resume callbacks (bsc#1212445).
- cpufreq: amd-pstate: introduce a new amd p-state driver to support future processors (bsc#1212445).
- cpufreq: amd-pstate: introduce the support for the processors with shared memory solution (bsc#1212445).
- cpufreq: amd-pstate: let user know amd-pstate is disabled (bsc#1212445).
- cpufreq: amd-pstate: make amd-pstate epp driver name hyphenated (bsc#1212445).
- cpufreq: amd-pstate: make varaiable mode_state_machine static (bsc#1212445).
- cpufreq: amd-pstate: optimize driver working mode selection in amd_pstate_param() (bsc#1212445).
- cpufreq: amd-pstate: remove fast_switch_possible flag from active driver (bsc#1212445).
- cpufreq: amd-pstate: remove module_license in non-modules (bsc#1212445).
- cpufreq: amd-pstate: set a fallback policy based on preferred_profile (bsc#1212445).
- cpufreq: amd-pstate: simplify cpudata pointer assignment (bsc#1212445).
- cpufreq: amd-pstate: update policy-&gt;cur in amd_pstate_adjust_perf() (bsc#1212445).
- cpufreq: amd-pstate: update pstate frequency transition delay time (bsc#1212445).
- cpufreq: amd-pstate: write cppc enable bit per-socket (bsc#1212445).
- cpufreq: amd_pstate: fix wrong lowest perf fetch (bsc#1212445).
- cpufreq: amd_pstate: map desired perf into pstate scope for powersave governor (bsc#1212445).
- cpufreq: tegra194: fix module loading (git-fixes).
- crypto: kpp - add helper to set reqsize (git-fixes).
- crypto: marvell/cesa - fix type mismatch warning (git-fixes).
- crypto: nx - fix build warnings when debug_fs is not enabled (git-fixes).
- crypto: qat - use helper to set reqsize (git-fixes).
- delete suse/memcg-drop-kmem-limit_in_bytes. drop the patch in order to fix bsc#1213705.
- devlink: fix kernel-doc notation warnings (git-fixes).
- dlm: fix missing lkb refcount handling (git-fixes).
- dlm: fix plock invalid read (git-fixes).
- dma-buf/dma-resv: stop leaking on krealloc() failure (git-fixes).
- docs: networking: update codeaurora references for rmnet (git-fixes).
- documentation: abi: sysfs-class-net-qmi: pass_through contact update (git-fixes).
- documentation: bonding: fix the doc of peer_notif_delay (git-fixes).
- documentation: cpufreq: amd-pstate: move amd_pstate param to alphabetical order (bsc#1212445).
- documentation: devices.txt: reconcile serial/ucc_uart minor numers (git-fixes).
- documentation: timers: hrtimers: make hybrid union historical (git-fixes).
- drivers: meson: secure-pwrc: always enable dma domain (git-fixes).
- drm/amd/amdgpu: introduce gc_*_mes_2.bin v2 (git-fixes).
- drm/amd/amdgpu: limit one queue per gang (git-fixes).
- drm/amd/amdgpu: update mes11 api def (git-fixes).
- drm/amd/display (gcc13): fix enum mismatch (git-fixes).
- drm/amd/display: add a null pointer check (bsc#1212848, bsc#1212961).
- drm/amd/display: add debug option to skip psr crtc disable (git-fixes).
- drm/amd/display: add logging for display mall refresh setting (git-fixes).
- drm/amd/display: add minimal pipe split transition state (git-fixes).
- drm/amd/display: add minimum z8 residency debug option (git-fixes).
- drm/amd/display: add missing wa and mclk validation (git-fixes).
- drm/amd/display: add monitor specific edid quirk (git-fixes).
- drm/amd/display: add polling method to handle mst reply packet (bsc#1213578).
- drm/amd/display: add wrapper to call planes and stream update (git-fixes).
- drm/amd/display: add z8 allow states to z-state support list (git-fixes).
- drm/amd/display: change default z8 watermark values (git-fixes).
- drm/amd/display: check tg is non-null before checking if enabled (git-fixes).
- drm/amd/display: correct `dmub_fw_version` macro (git-fixes).
- drm/amd/display: correct dml calculation to align hw formula (git-fixes).
- drm/amd/display: correct dml calculation to follow hw spec (git-fixes).
- drm/amd/display: disable mpc split by default on special asic (git-fixes).
- drm/amd/display: disable seamless boot if force_odm_combine is enabled (bsc#1212848, bsc#1212961).
- drm/amd/display: do not update drr while bw optimizations pending (git-fixes).
- drm/amd/display: drop redundant memset() in get_available_dsc_slices() (git-fixes).
- drm/amd/display: enable hostvm based on riommu active (git-fixes).
- drm/amd/display: enforce 60us prefetch for 200mhz dcfclk modes (git-fixes).
- drm/amd/display: ensure vmin and vmax adjust for dce (git-fixes).
- drm/amd/display: explicitly specify update type per plane info change (git-fixes).
- drm/amd/display: filter out invalid bits in pipe_fuses (git-fixes).
- drm/amd/display: fix 4to1 mpc black screen with dpp rco (git-fixes).
- drm/amd/display: fix a divided-by-zero error (git-fixes).
- drm/amd/display: fix a test calculateprefetchschedule() (git-fixes).
- drm/amd/display: fix a test dml32_rq_dlg_get_rq_reg() (git-fixes).
- drm/amd/display: fix access hdcp_workqueue assert (git-fixes).
- drm/amd/display: fix artifacting on edp panels when engaging freesync video mode (git-fixes).
- drm/amd/display: fix psr-su/dsc interoperability support (git-fixes).
- drm/amd/display: fix seamless odm transitions (git-fixes).
- drm/amd/display: fix the system hang while disable psr (git-fixes).
- drm/amd/display: fix z8 support configurations (git-fixes).
- drm/amd/display: fixed dcn30+ underflow issue (git-fixes).
- drm/amd/display: have payload properly created after resume (git-fixes).
- drm/amd/display: keep phy active for dp displays on dcn31 (git-fixes).
- drm/amd/display: limit timing for single dimm memory (git-fixes).
- drm/amd/display: lowering min z8 residency time (git-fixes).
- drm/amd/display: only update link settings after successful mst link train (git-fixes).
- drm/amd/display: phase3 mst hdcp for multiple displays (git-fixes).
- drm/amd/display: populate subvp cmd info only for the top pipe (git-fixes).
- drm/amd/display: reduce sdp bw after urgent to 90% (git-fixes).
- drm/amd/display: refactor edp psr codes (git-fixes).
- drm/amd/display: remove fpu guards from the dml folder (git-fixes).
- drm/amd/display: remove optimization for vrr updates (git-fixes).
- drm/amd/display: remove phantom pipe check when calculating k1 and k2 (git-fixes).
- drm/amd/display: remove stutter only configurations (git-fixes).
- drm/amd/display: save restore hdcp state when display is unplugged from mst hub (git-fixes).
- drm/amd/display: set dcn315 lb bpp to 48 (git-fixes).
- drm/amd/display: unlock on error path in dm_handle_mst_sideband_msg_ready_event() (git-fixes).
- drm/amd/display: update minimum stutter residency for dcn314 z8 (git-fixes).
- drm/amd/display: update z8 sr exit/enter latencies (git-fixes).
- drm/amd/display: update z8 watermarks for dcn314 (git-fixes).
- drm/amd/display: use dc_update_planes_and_stream (git-fixes).
- drm/amd/pm: add abnormal fan detection for smu 13.0.0 (git-fixes).
- drm/amd/pm: add missing notifypowersource message mapping for smu13.0.7 (git-fixes).
- drm/amd/pm: avoid potential ubsan issue on legacy asics (git-fixes).
- drm/amd/pm: conditionally disable pcie lane switching for some sienna_cichlid skus (git-fixes).
- drm/amd/pm: conditionally disable pcie lane/speed switching for smu13 (git-fixes).
- drm/amd/pm: fix possible power mode mismatch between driver and pmfw (git-fixes).
- drm/amd/pm: re-enable the gfx imu when smu resume (git-fixes).
- drm/amd/pm: resolve reboot exception for si oland (git-fixes).
- drm/amd/pm: reverse mclk and fclk clocks levels for smu v13.0.4 (git-fixes).
- drm/amd/pm: reverse mclk clocks levels for smu v13.0.5 (git-fixes).
- drm/amd/pm: revise the aspm settings for thunderbolt attached scenario (bsc#1212848, bsc#1212961).
- drm/amd/pm: share the code around smu13 pcie parameters update (git-fixes).
- drm/amd/pm: update the lc_l1_inactivity setting to address possible noise issue (bsc#1212848, bsc#1212961).
- drm/amd/pm: workaround for compute workload type on some skus (git-fixes).
- drm/amd: add a new helper for loading/validating microcode (git-fixes).
- drm/amd: disable psr-su on parade 0803 tcon (bsc#1212848, bsc#1212961).
- drm/amd: do not allow s0ix on apus older than raven (git-fixes).
- drm/amd: do not try to enable secure display ta multiple times (bsc#1212848, bsc#1212961).
- drm/amd: fix an error handling mistake in psp_sw_init() (git-fixes).
- drm/amd: load mes microcode during early_init (git-fixes).
- drm/amd: use `amdgpu_ucode_*` helpers for mes (git-fixes).
- drm/amdgpu/gfx11: adjust gfxoff before powergating on gfx11 as well (git-fixes).
- drm/amdgpu/gfx11: update gpu_clock_counter logic (git-fixes).
- drm/amdgpu/gfx: set cg flags to enter/exit safe mode (git-fixes).
- drm/amdgpu/gmc11: implement get_vbios_fb_size() (git-fixes).
- drm/amdgpu/jpeg: remove harvest checking for jpeg3 (git-fixes).
- drm/amdgpu/mes11: enable reg active poll (git-fixes).
- drm/amdgpu/vcn: disable indirect sram on vangogh broken bioses (git-fixes).
- drm/amdgpu/vkms: relax timer deactivation by hrtimer_try_to_cancel (git-fixes).
- drm/amdgpu: add mes resume when do gfx post soft reset (git-fixes).
- drm/amdgpu: add the fan abnormal detection feature (git-fixes).
- drm/amdgpu: avoid restore process run into dead loop (git-fixes).
- drm/amdgpu: change reserved vram info print (git-fixes).
- drm/amdgpu: declare firmware for new mes 11.0.4 (git-fixes).
- drm/amdgpu: do not set struct drm_driver.output_poll_changed (git-fixes).
- drm/amdgpu: enable tmz by default for gc 11.0.1 (git-fixes).
- drm/amdgpu: fix amdgpu_irq_put call trace in gmc_v10_0_hw_fini (git-fixes).
- drm/amdgpu: fix amdgpu_irq_put call trace in gmc_v11_0_hw_fini (git-fixes).
- drm/amdgpu: fix an amdgpu_irq_put() issue in gmc_v9_0_hw_fini() (git-fixes).
- drm/amdgpu: fix clearing mappings for bos that are always valid in vm (bsc#1212848, bsc#1212961).
- drm/amdgpu: fix clearing mappings for bos that are always valid in vm (git-fixes).
- drm/amdgpu: fix desktop freezed after gpu-reset (git-fixes).
- drm/amdgpu: fix memcpy() in sienna_cichlid_append_powerplay_table function (git-fixes).
- drm/amdgpu: fix minmax warning (git-fixes).
- drm/amdgpu: fix number of fence calculations (bsc#1212848, bsc#1212961).
- drm/amdgpu: fix sdma v4 sw fini error (git-fixes).
- drm/amdgpu: fix usage of umc fill record in ras (git-fixes).
- drm/amdgpu: force signal hw_fences that are embedded in non-sched jobs (git-fixes).
- drm/amdgpu: refine get gpu clock counter method (git-fixes).
- drm/amdgpu: remove deprecated mes version vars (git-fixes).
- drm/amdgpu: reserve the old gc_11_0_*_mes.bin (git-fixes).
- drm/amdgpu: set gfx9 onwards apu atomics support to be true (git-fixes).
- drm/amdgpu: set vmbo destroy after pt bo is created (git-fixes).
- drm/amdgpu: validate vm ioctl flags (git-fixes).
- drm/amdgpu: vcn_4_0 set instance 0 init sched score to 1 (git-fixes).
- drm/amdkfd: fix potential deallocation of previously deallocated memory (git-fixes).
- drm/atomic: fix potential use-after-free in nonblocking commits (git-fixes).
- drm/bridge: anx7625: convert to i2c's .probe_new() (git-fixes).
- drm/bridge: anx7625: fix refcount bug in anx7625_parse_dt() (git-fixes).
- drm/bridge: anx7625: prevent endless probe loop (git-fixes).
- drm/bridge: it6505: move a variable assignment behind a null pointer check in receive_timing_debugfs_show() (git-fixes).
- drm/bridge: tc358767: switch to devm mipi-dsi helpers (git-fixes).
- drm/bridge: tc358768: add atomic_get_input_bus_fmts() implementation (git-fixes).
- drm/bridge: tc358768: always enable hs video mode (git-fixes).
- drm/bridge: tc358768: fix pll parameters computation (git-fixes).
- drm/bridge: tc358768: fix pll target frequency (git-fixes).
- drm/bridge: tc358768: fix tclk_trailcnt computation (git-fixes).
- drm/bridge: tc358768: fix tclk_zerocnt computation (git-fixes).
- drm/bridge: tc358768: fix ths_trailcnt computation (git-fixes).
- drm/bridge: tc358768: fix ths_zerocnt computation (git-fixes).
- drm/bridge: tc358768: fix txtagocnt computation (git-fixes).
- drm/bridge: ti-sn65dsi83: fix enable error path (git-fixes).
- drm/bridge: ti-sn65dsi86: fix auxiliary bus lifetime (git-fixes).
- drm/client: fix memory leak in drm_client_modeset_probe (git-fixes).
- drm/client: fix memory leak in drm_client_target_cloned (git-fixes).
- drm/display/dp_mst: fix payload addition on a disconnected sink (git-fixes).
- drm/display: do not block hdr_output_metadata on unknown eotf (git-fixes).
- drm/dp_mst: clear msg_rdy flag before sending new message (bsc#1213578).
- drm/drm_vma_manager: add drm_vma_node_allow_once() (git-fixes).
- drm/dsc: fix dp_dsc_max_bpp_delta_* macro values (git-fixes).
- drm/dsc: fix drm_edp_dsc_sink_output_bpp() dpcd high byte usage (git-fixes).
- drm/etnaviv: move idle mapping reaping into separate function (git-fixes).
- drm/etnaviv: reap idle mapping if it does not match the softpin address (git-fixes).
- drm/exynos: fix race condition uaf in exynos_g2d_exec_ioctl (git-fixes).
- drm/exynos: vidi: fix a wrong error return (git-fixes).
- drm/i915/dp_mst: add the mst topology state for modesetted crtcs (bsc#1213493).
- drm/i915/dpt: use shmem for dpt objects (git-fixes).
- drm/i915/fbdev: lock the fbdev obj before vma pin (git-fixes).
- drm/i915/gt: cleanup partial engine discovery failures (git-fixes).
- drm/i915/guc: add error-capture init warnings when needed (git-fixes).
- drm/i915/guc: fix missing ecodes (git-fixes).
- drm/i915/guc: limit scheduling properties to avoid overflow (git-fixes).
- drm/i915/guc: rename guc register state capture node to be more obvious (git-fixes).
- drm/i915/gvt: remove unused variable gma_bottom in command parser (git-fixes).
- drm/i915/mtl: update scaler source and destination limits for mtl (git-fixes).
- drm/i915/psr: use hw.adjusted mode when calculating io/fast wake times (git-fixes).
- drm/i915/sdvo: grab mode_config.mutex during lvds init to avoid warns (git-fixes).
- drm/i915/sseu: fix max_subslices array-index-out-of-bounds access (git-fixes).
- drm/i915/tc: fix system resume mst mode restore for dp-alt sinks (git-fixes).
- drm/i915/tc: fix tc port link ref init for dp mst during hw readout (git-fixes).
- drm/i915: allow panel fixed modes to have differing sync polarities (git-fixes).
- drm/i915: check pipe source size when using skl+ scalers (git-fixes).
- drm/i915: do not preserve dpll_hw_state for slave crtc in bigjoiner (git-fixes).
- drm/i915: do panel vbt init early if the vbt declares an explicit panel type (git-fixes).
- drm/i915: fix a memory leak with reused mmap_offset (git-fixes).
- drm/i915: fix an error handling path in igt_write_huge() (git-fixes).
- drm/i915: fix negative value passed as remaining time (git-fixes).
- drm/i915: fix one wrong caching mode enum usage (git-fixes).
- drm/i915: fix typec mode initialization during system resume (git-fixes).
- drm/i915: introduce intel_panel_init_alloc() (git-fixes).
- drm/i915: never return 0 if not all requests retired (git-fixes).
- drm/i915: populate encoder-&gt;devdata for dsi on icl+ (git-fixes).
- drm/i915: print return value on error (git-fixes).
- drm/i915: use _mmio_pipe() for skl_bottom_color (git-fixes).
- drm/meson: fix return type of meson_encoder_cvbs_mode_valid() (git-fixes).
- drm/msm/a5xx: really check for a510 in a5xx_gpu_init (git-fixes).
- drm/msm/adreno: fix runtime pm imbalance at unbind (git-fixes).
- drm/msm/adreno: fix snapshot bindless_data size (git-fixes).
- drm/msm/adreno: fix sparse warnings in a6xx code (git-fixes).
- drm/msm/adreno: simplify read64/write64 helpers (git-fixes).
- drm/msm/disp/dpu: get timing engine status from intf status register (git-fixes).
- drm/msm/dp: free resources after unregistering them (git-fixes).
- drm/msm/dpu: add dsc hardware blocks to register snapshot (git-fixes).
- drm/msm/dpu: assign missing writeback log_mask (git-fixes).
- drm/msm/dpu: clean up dpu_kms_get_clk_rate() returns (git-fixes).
- drm/msm/dpu: correct merge_3d length (git-fixes).
- drm/msm/dpu: do not enable color-management if dspps are not available (git-fixes).
- drm/msm/dpu: drop enum dpu_core_perf_data_bus_id (git-fixes).
- drm/msm/dpu: set dpu_data_hctl_en for in intf_sc7180_mask (git-fixes).
- drm/msm/dpu: set dsc flush bit correctly at mdp ctl flush register (git-fixes).
- drm/msm/dsi: do not allow enabling 14nm vco with unprogrammed rate (git-fixes).
- drm/msm/hdmi: use devres helper for runtime pm management (git-fixes).
- drm/msm: fix is_err_or_null() vs null check in a5xx_submit_in_rb() (git-fixes).
- drm/panel: boe-tv101wum-nl6: ensure dsi writes succeed during disable (git-fixes).
- drm/panel: sharp-ls043t1le01: adjust mode settings (git-fixes).
- drm/panel: simple: add connector_type for innolux_at043tn24 (git-fixes).
- drm/panel: simple: add powertip ph800480t013 drm_display_mode flags (git-fixes).
- drm/panel: simple: fix active size for ampire am-480272h3tmqw-t01h (git-fixes).
- drm/radeon: fix integer overflow in radeon_cs_parser_init (git-fixes).
- drm/radeon: fix possible division-by-zero errors (git-fixes).
- drm/radeon: fix race condition uaf in radeon_gem_set_domain_ioctl (git-fixes).
- drm/rockchip: dw_hdmi: cleanup drm encoder during unbind (git-fixes).
- drm/rockchip: vop: leave vblank enabled in self-refresh (git-fixes).
- drm/ttm: do not leak a resource on swapout move error (git-fixes).
- drm/ttm: fix bulk_move corruption when adding a entry (git-fixes).
- drm/ttm: fix warning that we shouldn't mix &amp;&amp; and || (git-fixes).
- drm/virtio: fix memory leak in virtio_gpu_object_create() (git-fixes).
- drm/virtio: simplify error handling of virtio_gpu_object_create() (git-fixes).
- drm/vmwgfx: fix legacy display unit atomic drm support (bsc#1213632).
- drm/vmwgfx: refactor resource manager's hashtable to use linux/hashtable implementation (git-fixes).
- drm/vmwgfx: refactor resource validation hashtable to use linux/hashtable implementation (git-fixes).
- drm/vmwgfx: refactor ttm reference object hashtable to use linux/hashtable (git-fixes).
- drm/vmwgfx: remove explicit and broken vblank handling (bsc#1213632).
- drm/vmwgfx: remove rcu locks from user resources (bsc#1213632).
- drm/vmwgfx: remove ttm object hashtable (git-fixes).
- drm/vmwgfx: remove vmwgfx_hashtab (git-fixes).
- drm/vmwgfx: write the driver id registers (git-fixes).
- drm/vram-helper: fix function names in vram helper doc (git-fixes).
- drm: add fixed-point helper to get rounded integer values (git-fixes).
- drm: add missing dp dsc extended capability definitions (git-fixes).
- drm: buddy_allocator: fix buddy allocator init on 32-bit systems (git-fixes).
- drm: optimize drm buddy top-down allocation method (git-fixes).
- drm: panel-orientation-quirks: add quirk for dynabook k50 (git-fixes).
- drm: rcar-du: add quirk for h3 es1.x pclk workaround (git-fixes).
- drm: rcar-du: fix setting a reserved bit in dpllcr (git-fixes).
- drm: sun4i_tcon: use devm_clk_get_enabled in `sun4i_tcon_init_clocks` (git-fixes).
- drm: use mgr-&gt;dev in drm_dbg_kms in drm_dp_add_payload_part2 (git-fixes).
- drop amdgpu patches for fixing regression (bsc#1213304,bsc#1213777).
- dt-bindings: phy: brcm,brcmstb-usb-phy: fix error in 'compatible' conditional schema (git-fixes).
- elf: correct note name comment (git-fixes).
- enable nxp snvs rtc driver for i.mx 8mq/8mp (jsc#ped-4758)
- ext4: add ea_inode checking to ext4_iget() (bsc#1213106).
- ext4: add ext4_sb_block_valid() refactored out of ext4_inode_block_valid() (bsc#1213088).
- ext4: add lockdep annotations for i_data_sem for ea_inode's (bsc#1213109).
- ext4: add strict range checks while freeing blocks (bsc#1213089).
- ext4: avoid deadlock in fs reclaim with page writeback (bsc#1213016).
- ext4: bail out of ext4_xattr_ibody_get() fails for any reason (bsc#1213018).
- ext4: block range must be validated before use in ext4_mb_clear_bb() (bsc#1213090).
- ext4: check iomap type only if ext4_iomap_begin() does not fail (bsc#1213103).
- ext4: disallow ea_inodes with extended attributes (bsc#1213108).
- ext4: fail ext4_iget if special inode unallocated (bsc#1213010).
- ext4: fix bug_on in __es_tree_search caused by bad quota inode (bsc#1213111).
- ext4: fix data races when using cached status extents (bsc#1213102).
- ext4: fix deadlock when converting an inline directory in nojournal mode (bsc#1213105).
- ext4: fix i_disksize exceeding i_size problem in paritally written case (bsc#1213015).
- ext4: fix lockdep warning when enabling mmp (bsc#1213100).
- ext4: fix reusing stale buffer heads from last failed mounting (bsc#1213020).
- ext4: fix task hung in ext4_xattr_delete_inode (bsc#1213096).
- ext4: fix to check return value of freeze_bdev() in ext4_shutdown() (bsc#1213021).
- ext4: fix use-after-free read in ext4_find_extent for bigalloc + inline (bsc#1213098).
- ext4: fix warning in ext4_update_inline_data (bsc#1213012).
- ext4: fix warning in mb_find_extent (bsc#1213099).
- ext4: improve error handling from ext4_dirhash() (bsc#1213104).
- ext4: improve error recovery code paths in __ext4_remount() (bsc#1213017).
- ext4: move where set the may_inline_data flag is set (bsc#1213011).
- ext4: only update i_reserved_data_blocks on successful block allocation (bsc#1213019).
- ext4: refactor ext4_free_blocks() to pull out ext4_mb_clear_bb() (bsc#1213087).
- ext4: refuse to create ea block when umounted (bsc#1213093).
- ext4: set lockdep subclass for the ea_inode in ext4_xattr_inode_cache_find() (bsc#1213107).
- ext4: turn quotas off if mount failed after enabling quotas (bsc#1213110).
- ext4: update s_journal_inum if it changes after journal replay (bsc#1213094).
- ext4: use ext4_fc_tl_mem in fast-commit replay path (bsc#1213092).
- ext4: zero i_disksize when initializing the bootloader inode (bsc#1213013).
- extcon: fix kernel doc of property capability fields to avoid warnings (git-fixes).
- extcon: fix kernel doc of property fields to avoid warnings (git-fixes).
- extcon: usbc-tusb320: add usb type-c support (git-fixes).
- extcon: usbc-tusb320: call the type-c irq handler only if a port is registered (git-fixes).
- extcon: usbc-tusb320: unregister typec port on driver removal (git-fixes).
- extcon: usbc-tusb320: update state on probe even if no irq pending (git-fixes).
- fbdev: au1200fb: fix missing irq check in au1200fb_drv_probe (git-fixes).
- fbdev: imxfb: removed unneeded release_mem_region (git-fixes).
- fbdev: imxfb: warn about invalid left/right margin (git-fixes).
- fbdev: omapfb: lcd_mipid: fix an error handling path in mipid_spi_probe() (git-fixes).
- file: always lock position for fmode_atomic_pos (bsc#1213759).
- firmware: stratix10-svc: fix a potential resource leak in svc_create_memory_pool() (git-fixes).
- fix documentation of panic_on_warn (git-fixes).
- fix null pointer dereference in drm_dp_atomic_find_time_slots() (bsc#1213578).
- fs: dlm: add midcomms init/start functions (git-fixes).
- fs: dlm: do not set stop rx flag after node reset (git-fixes).
- fs: dlm: filter user dlm messages for kernel locks (git-fixes).
- fs: dlm: fix log of lowcomms vs midcomms (git-fixes).
- fs: dlm: fix race between test_bit() and queue_work() (git-fixes).
- fs: dlm: fix race in lowcomms (git-fixes).
- fs: dlm: handle -ebusy first in lock arg validation (git-fixes).
- fs: dlm: move sending fin message into state change handling (git-fixes).
- fs: dlm: retry accept() until -eagain or error returns (git-fixes).
- fs: dlm: return positive pid value for f_getlk (git-fixes).
- fs: dlm: start midcomms before scand (git-fixes).
- fs: hfsplus: remove warn_on() from hfsplus_cat_{read,write}_inode() (git-fixes).
- fs: jfs: check for read-only mounted filesystem in txbegin (git-fixes).
- fs: jfs: fix null-ptr-deref read in txbegin (git-fixes).
- fs: jfs: fix ubsan: array-index-out-of-bounds in dballocdmaplev (git-fixes).
- fuse: ioctl: translate enosys in outarg (bsc#1213524).
- fuse: revalidate: do not invalidate if interrupted (bsc#1213523).
- get module prefix from kmod (bsc#1212835).
- gve: set default duplex configuration to full (git-fixes).
- gve: unify driver name usage (git-fixes).
- hid: logitech-hidpp: add hidpp_quirk_delayed_init for the t651 (git-fixes).
- hid: wacom: add error check to wacom_parse_and_register() (git-fixes).
- hvcs: fix hvcs port reference counting (bsc#1213134 ltc#202861).
- hvcs: get reference to tty in remove (bsc#1213134 ltc#202861).
- hvcs: synchronize hotplug remove with port free (bsc#1213134 ltc#202861).
- hvcs: use dev_groups to manage hvcs device attributes (bsc#1213134 ltc#202861).
- hvcs: use driver groups to manage driver attributes (bsc#1213134 ltc#202861).
- hvcs: use vhangup in hotplug remove (bsc#1213134 ltc#202861).
- hwmon: (adm1275) allow setting sample averaging (git-fixes).
- hwmon: (gsc-hwmon) fix fan pwm temperature scaling (git-fixes).
- hwmon: (k10temp) enable amd3255 proc to show negative temperature (git-fixes).
- hwmon: (nct7802) fix for temp6 (peci1) processed even if peci1 disabled (git-fixes).
- hwmon: (pmbus/adm1275) fix problems with temperature monitoring on adm1272 (git-fixes).
- hwrng: imx-rngc - fix the timeout for init and self check (git-fixes).
- hwrng: st - keep clock enabled while hwrng is registered (git-fixes).
- i2c: tegra: set acpi node as primary fwnode (bsc#1213226).
- i2c: xiic: defer xiic_wakeup() and __xiic_start_xfer() in xiic_process() (git-fixes).
- i2c: xiic: do not try to handle more interrupt events after error (git-fixes).
- iavf: check for removal state before iavf_flag_pf_comms_failed (git-fixes).
- iavf: fix a deadlock caused by rtnl and driver's lock circular dependencies (git-fixes).
- iavf: fix out-of-bounds when setting channels on remove (git-fixes).
- iavf: fix potential deadlock on allocation failure (git-fixes).
- iavf: fix reset task race with iavf_remove() (git-fixes).
- iavf: fix use-after-free in free_netdev (git-fixes).
- iavf: move netdev_update_features() into watchdog task (git-fixes).
- iavf: use internal state to free traffic irqs (git-fixes).
- iavf: wait for reset in callbacks which trigger it (git-fixes).
- ib/hfi1: fix wrong mmu_node used for user sdma packet after invalidate (git-fixes)
- ib/hfi1: use bitmap_zalloc() when applicable (git-fixes)
- ib/isert: fix dead lock in ib_isert (git-fixes)
- ib/isert: fix incorrect release of isert connection (git-fixes)
- ib/isert: fix possible list corruption in cma handler (git-fixes)
- ib/uverbs: fix to consider event queue closing also upon non-blocking mode (git-fixes)
- ibmvnic: do not reset dql stats on non_fatal err (bsc#1212603 ltc#202604).
- ice: fix max_rate check while configuring tx rate limits (git-fixes).
- ice: fix memory management in ice_ethtool_fdir.c (git-fixes).
- ice: handle extts in the miscellaneous interrupt thread (git-fixes).
- igc: check if hardware tx timestamping is enabled earlier (git-fixes).
- igc: enable and fix rx hash usage by netstack (git-fixes).
- igc: fix inserting of empty frame for launchtime (git-fixes).
- igc: fix kernel panic during ndo_tx_timeout callback (git-fixes).
- igc: fix launchtime before start of cycle (git-fixes).
- igc: fix race condition in ptp tx code (git-fixes).
- igc: handle pps start time programming for past time values (git-fixes).
- igc: prevent garbled tx queue with xdp zerocopy (git-fixes).
- igc: remove delay during tx ring configuration (git-fixes).
- igc: set tp bit in 'supported' and 'advertising' fields of ethtool_link_ksettings (git-fixes).
- igc: work around hw bug causing missing timestamps (git-fixes).
- iio: accel: fxls8962af: errata bug only applicable for fxls8962af (git-fixes).
- iio: accel: fxls8962af: fixup buffer scan element type (git-fixes).
- iio: adc: ad7192: fix internal/external clock selection (git-fixes).
- iio: adc: ad7192: fix null ad7192_state pointer access (git-fixes).
- inotify: avoid reporting event with invalid wd (bsc#1213025).
- input: adxl34x - do not hardcode interrupt trigger type (git-fixes).
- input: drv260x - fix typo in register value define (git-fixes).
- input: drv260x - remove unused .reg_defaults (git-fixes).
- input: drv260x - sleep between polling go bit (git-fixes).
- input: i8042 - add clevo pcx0dx to i8042 quirk table (git-fixes).
- input: iqs269a - do not poll during ati (git-fixes).
- input: iqs269a - do not poll during suspend or resume (git-fixes).
- input: soc_button_array - add invalid acpi_index dmi quirk handling (git-fixes).
- integrity: fix possible multiple allocation in integrity_inode_get() (git-fixes).
- io_uring: do not expose io_fill_cqe_aux() (bsc#1211014).
- irqchip/gic-v3: claim iomem resources (bsc#1213533)
- irqchip/gicv3: handle resource request failure consistently (bsc#1213533)
- irqchip/gicv3: workaround for nvidia erratum t241-fabric-4 (bsc#1213533)
- jbd2: fix data missing when reusing bh which is ready to be checkpointed (bsc#1213095).
- jdb2: do not refuse invalidation of already invalidated buffers (bsc#1213014).
- jffs2: fix memory leak in jffs2_do_fill_super (git-fixes).
- jffs2: fix memory leak in jffs2_do_mount_fs (git-fixes).
- jffs2: fix memory leak in jffs2_scan_medium (git-fixes).
- jffs2: fix use-after-free in jffs2_clear_xattr_subsystem (git-fixes).
- jffs2: gc deadlock reading a page that is used in jffs2_write_begin() (git-fixes).
- jffs2: reduce stack usage in jffs2_build_xattr_subsystem() (git-fixes).
- jfs: jfs_dmap: validate db_l2nbperpage while mounting (git-fixes).
- kabi fix after restore kabi for nvidia vgpu driver (bsc#1210825).
- kabi/severities: add vas symbols changed due to recent fix vas accelerators are directly tied to the architecture, there is no reason to have out-of-tree production drivers
- kabi/severities: ignore kabi of i915 module it's exported only for its sub-module, not really used by externals
- kabi/severities: ignore kabi of vmwgfx the driver exports a function unnecessarily without used by anyone else. ignore the kabi changes.
- kabi/severities: relax kabi for ath11k local symbols (bsc#1207948)
- kabi: do not check external trampolines for signature (kabi bsc#1207894 bsc#1211243).
- kernel-binary.spec.in: remove superfluous %% in supplements fixes: 02b7735e0caf ('rpm/kernel-binary.spec.in: add enhances and supplements tags to in-tree kmps')
- kselftest: vdso: fix accumulation of uninitialized ret when clock_realtime is undefined (git-fixes).
- kvm: arm64: do not read a hw interrupt pending state in user context (git-fixes)
- kvm: arm64: warn if accessing timer pending state outside of vcpu (bsc#1213620)
- kvm: do not null dereference ops-&gt;destroy (git-fixes)
- kvm: downgrade two bug_ons to warn_on_once (git-fixes)
- kvm: initialize debugfs_dentry when a vm is created to avoid null (git-fixes)
- kvm: s390: pv: fix index value of replaced asce (git-fixes bsc#1213867).
- kvm: vmx: inject #gp on encls if vcpu has paging disabled (cr0.pg==0) (git-fixes).
- kvm: vmx: inject #gp, not #ud, if sgx2 encls leafs are unsupported (git-fixes).
- kvm: vmx: restore vmx_vmexit alignment (git-fixes).
- kvm: x86: account fastpath-only vm-exits in vcpu stats (git-fixes).
- leds: trigger: netdev: recheck netdev_led_mode_linkup on dev rename (git-fixes).
- libceph: harden msgr2.1 frame segment length checks (bsc#1213857).
- m alsa: usb-audio: add quirk for tascam model 12 (git-fixes).
- mailbox: ti-msgmgr: fill non-message tx data fields with 0x0 (git-fixes).
- maintainers: add amd p-state driver maintainer entry (bsc#1212445).
- md: add error_handlers for raid0 and linear (bsc#1212766).
- media: atomisp: gmin_platform: fix out_len in gmin_get_config_dsm_var() (git-fixes).
- media: cec: core: do not set last_initiator if tx in progress (git-fixes).
- media: cec: i2c: ch7322: also select regmap (git-fixes).
- media: i2c: correct format propagation for st-mipid02 (git-fixes).
- media: staging: atomisp: select v4l2_fwnode (git-fixes).
- media: usb: check az6007_read() return value (git-fixes).
- media: usb: siano: fix warning due to null work_func_t function pointer (git-fixes).
- media: venus: helpers: fix align() of non power of two (git-fixes).
- media: videodev2.h: fix struct v4l2_input tuner index comment (git-fixes).
- memcg: drop kmem.limit_in_bytes (bsc#1208788, bsc#1212905).
- memory: brcmstb_dpfe: fix testing array offset after use (git-fixes).
- meson saradc: fix clock divider mask length (git-fixes).
- mfd: intel-lpss: add missing check for platform_get_resource (git-fixes).
- mfd: pm8008: fix module autoloading (git-fixes).
- mfd: rt5033: drop rt5033-battery sub-device (git-fixes).
- mfd: stmfx: fix error path in stmfx_chip_init (git-fixes).
- mfd: stmfx: nullify stmfx-&gt;vdd in case of error (git-fixes).
- mfd: stmpe: only disable the regulators if they are enabled (git-fixes).
- mhi_power_down() kabi workaround (bsc#1207948).
- misc: fastrpc: create fastrpc scalar with correct buffer count (git-fixes).
- misc: pci_endpoint_test: free irqs before removing the device (git-fixes).
- misc: pci_endpoint_test: re-init completion for every test (git-fixes).
- mmc: core: disable trim on kingston emmc04g-m627 (git-fixes).
- mmc: mmci: set probe_prefer_asynchronous (git-fixes).
- mmc: sdhci-msm: disable broken 64-bit dma on msm8916 (git-fixes).
- mmc: sdhci: fix dma configure compatibility issue when 64bit dma mode is used (git-fixes).
- mtd: rawnand: meson: fix unaligned dma buffers handling (git-fixes).
- net/mlx5: add ifc bits for bypassing port select flow table (git-fixes)
- net/mlx5: dr, support sw created encap actions for fw table (git-fixes).
- net/mlx5e: check for not_ready flag state after locking (git-fixes).
- net/mlx5e: fix double free in mlx5e_destroy_flow_table (git-fixes).
- net/mlx5e: fix memory leak in mlx5e_fs_tt_redirect_any_create (git-fixes).
- net/mlx5e: fix memory leak in mlx5e_ptp_open (git-fixes).
- net/mlx5e: xdp, allow growing tail for xdp multi buffer (git-fixes).
- net/mlx5e: xsk: set napi_id to support busy polling on xsk rq (git-fixes).
- net/sched: sch_qfq: refactor parsing of netlink parameters (bsc#1213585).
- net/sched: sch_qfq: reintroduce lmax bound check for mtu (bsc#1213585).
- net: ena: fix shift-out-of-bounds in exponential backoff (git-fixes).
- net: mana: add support for vlan tagging (bsc#1212301).
- net: mana: batch ringing rx queue doorbell on receiving packets (bsc#1212901).
- net: mana: use the correct wqe count for ringing rq doorbell (bsc#1212901).
- net: phy: marvell10g: fix 88x3310 power up (git-fixes).
- net: phy: prevent stale pointer dereference in phy_init() (git-fixes).
- net: qrtr: fix an uninit variable access bug in qrtr_tx_resume() (git-fixes).
- net: qrtr: start mhi channel after endpoit creation (git-fixes).
- nfcsim.c: fix error checking for debugfs_create_dir (git-fixes).
- nfsd: add encoding of op_recall flag for write delegation (git-fixes).
- nfsd: fix double fget() bug in __write_ports_addfd() (git-fixes).
- nfsd: fix sparse warning (git-fixes).
- nfsd: remove open coding of string copy (git-fixes).
- nfsv4.1: always send a reclaim_complete after establishing lease (git-fixes).
- nfsv4.1: freeze the session table upon receiving nfs4err_badsession (git-fixes).
- nilfs2: fix buffer corruption due to concurrent device reads (git-fixes).
- nilfs2: reject devices with insufficient block count (git-fixes).
- ntb: amd: fix error handling in amd_ntb_pci_driver_init() (git-fixes).
- ntb: idt: fix error handling in idt_pci_driver_init() (git-fixes).
- ntb: intel: fix error handling in intel_ntb_pci_driver_init() (git-fixes).
- ntb: ntb_tool: add check for devm_kcalloc (git-fixes).
- ntb: ntb_transport: fix possible memory leak while device_register() fails (git-fixes).
- nvme-core: fix dev_pm_qos memleak (git-fixes).
- nvme-core: fix memory leak in dhchap_ctrl_secret (git-fixes).
- nvme-core: fix memory leak in dhchap_secret_store (git-fixes).
- nvme-multipath: support io stats on the mpath device (bsc#1210565).
- nvme-pci: add quirk for missing secondary temperature thresholds (git-fixes).
- nvme-pci: fix dma direction of unmapping integrity data (git-fixes).
- nvme-pci: remove nvme_queue from nvme_iod (git-fixes).
- nvme: do not reject probe due to duplicate ids for single-ported pcie devices (git-fixes).
- nvme: double ka polling frequency to avoid kato with tbkas on (git-fixes).
- nvme: fix the nvme_id_ns_nvm_sts_mask definition (git-fixes).
- nvme: introduce nvme_start_request (bsc#1210565).
- ocfs2: check new file size on fallocate call (git-fixes).
- ocfs2: fix defrag path triggering jbd2 assert (git-fixes).
- ocfs2: fix freeing uninitialized resource on ocfs2_dlm_shutdown (git-fixes).
- ocfs2: fix non-auto defrag path not working issue (git-fixes).
- ocfs2: fix use-after-free when unmounting read-only filesystem (git-fixes).
- ocfs2: switch to security_inode_init_security() (git-fixes).
- octeontx-af: fix hardware timestamp configuration (git-fixes).
- octeontx2-af: move validation of ptp pointer before its usage (git-fixes).
- octeontx2-pf: add additional check for mcam rules (git-fixes).
- opp: fix use-after-free in lazy_opp_tables after probe deferral (git-fixes).
- pci/aspm: disable aspm on mfd function removal to avoid use-after-free (git-fixes).
- pci/pm: avoid putting elopos e2/s2/h2 pcie ports in d3cold (git-fixes).
- pci: add function 1 dma alias quirk for marvell 88se9235 (git-fixes).
- pci: add pci_clear_master() stub for non-config_pci (git-fixes).
- pci: cadence: fix gen2 link retraining process (git-fixes).
- pci: endpoint: add missing documentation about the msi/msi-x range (git-fixes).
- pci: ftpci100: release the clock resources (git-fixes).
- pci: pciehp: cancel bringup sequence if card is not present (git-fixes).
- pci: qcom: disable write access to read only registers for ip v2.3.3 (git-fixes).
- pci: release resource invalidated by coalescing (git-fixes).
- pci: rockchip: add poll and timeout to wait for phy plls to be locked (git-fixes).
- pci: rockchip: assert pci configuration enable bit after probe (git-fixes).
- pci: rockchip: fix legacy irq generation for rk3399 pcie endpoint core (git-fixes).
- pci: rockchip: set address alignment for endpoint mode (git-fixes).
- pci: rockchip: use u32 variable to access 32-bit registers (git-fixes).
- pci: rockchip: write pci device id to correct register (git-fixes).
- pci: s390: fix use-after-free of pci resources with per-function hotplug (bsc#1212525).
- pci: vmd: fix uninitialized variable usage in vmd_enable_domain() (git-fixes).
- pci: vmd: reset vmd config register between soft reboots (git-fixes).
- perf/x86/amd/core: always clear status for idx (bsc#1213233).
- phy: hisilicon: fix an out of bounds check in hisi_inno_phy_probe() (git-fixes).
- phy: revert 'phy: remove soc_exynos4212 dep. from phy_exynos4x12_usb' (git-fixes).
- phy: tegra: xusb: check return value of devm_kzalloc() (git-fixes).
- phy: tegra: xusb: clear the driver reference in usb-phy dev (git-fixes).
- pie: fix kernel-doc notation warning (git-fixes).
- pinctrl: amd: detect internal gpio0 debounce handling (git-fixes).
- pinctrl: amd: do not show `invalid config param` errors (git-fixes).
- pinctrl: amd: fix mistake in handling clearing pins at startup (git-fixes).
- pinctrl: amd: only use special debounce behavior for gpio 0 (git-fixes).
- pinctrl: amd: use amd_pinconf_set() for all config options (git-fixes).
- pinctrl: at91-pio4: check return value of devm_kasprintf() (git-fixes).
- pinctrl: cherryview: return correct value if pin in push-pull mode (git-fixes).
- pinctrl: microchip-sgpio: check return value of devm_kasprintf() (git-fixes).
- platform/x86: msi-laptop: fix rfkill out-of-sync on msi wind u100 (git-fixes).
- platform/x86: think-lmi: correct nvme password handling (git-fixes).
- platform/x86: think-lmi: correct system password interface (git-fixes).
- platform/x86: think-lmi: mutex protection around multiple wmi calls (git-fixes).
- platform/x86: thinkpad_acpi: fix lkp-tests warnings for platform profiles (git-fixes).
- powerpc/64: only warn if __pa()/__va() called with bad addresses (bsc#1194869).
- powerpc/64s: fix vas mm use after free (bsc#1194869).
- powerpc/book3s64/mm: fix directmap stats in /proc/meminfo (bsc#1194869).
- powerpc/bpf: fix use of user_pt_regs in uapi (bsc#1194869).
- powerpc/ftrace: remove ftrace init tramp once kernel init is complete (bsc#1194869).
- powerpc/interrupt: do not read msr from interrupt_exit_kernel_prepare() (bsc#1194869).
- powerpc/mm/dax: fix the condition when checking if altmap vmemap can cross-boundary (bsc#1150305 ltc#176097 git-fixes).
- powerpc/mm: switch obsolete dssall to .long (bsc#1194869).
- powerpc/powernv/sriov: perform null check on iov before dereferencing iov (bsc#1194869).
- powerpc/powernv/vas: assign real address to rx_fifo in vas_rx_win_attr (bsc#1194869).
- powerpc/prom_init: fix kernel config grep (bsc#1194869).
- powerpc/pseries/vas: hold mmap_mutex after mmap lock during window close (jsc#ped-542 git-fixes).
- powerpc/secvar: fix refcount leak in format_show() (bsc#1194869).
- powerpc/xics: fix refcount leak in icp_opal_init() (bsc#1194869).
- powerpc: clean vdso32 and vdso64 directories (bsc#1194869).
- powerpc: define get_cycles macro for arch-override (bsc#1194869).
- powerpc: update ppc_save_regs to save current r1 in pt_regs (bsc#1194869).
- pstore/ram: add check for kstrdup (git-fixes).
- pwm: ab8500: fix error code in probe() (git-fixes).
- pwm: imx-tpm: force 'real_period' to be zero in suspend (git-fixes).
- pwm: sysfs: do not apply state to already disabled pwms (git-fixes).
- radeon: avoid double free in ci_dpm_init() (git-fixes).
- rdma/bnxt_re: avoid calling wake_up threads from spin_lock context (git-fixes)
- rdma/bnxt_re: disable/kill tasklet only if it is enabled (git-fixes)
- rdma/bnxt_re: fix hang during driver unload (git-fixes)
- rdma/bnxt_re: fix to remove an unnecessary log (git-fixes)
- rdma/bnxt_re: fix to remove unnecessary return labels (git-fixes)
- rdma/bnxt_re: prevent handling any completions after qp destroy (git-fixes)
- rdma/bnxt_re: remove a redundant check inside bnxt_re_update_gid (git-fixes)
- rdma/bnxt_re: remove unnecessary checks (git-fixes)
- rdma/bnxt_re: return directly without goto jumps (git-fixes)
- rdma/bnxt_re: use unique names while registering interrupts (git-fixes)
- rdma/bnxt_re: wraparound mbox producer index (git-fixes)
- rdma/cma: always set static rate to 0 for roce (git-fixes)
- rdma/core: update cma destination address on rdma_resolve_addr (git-fixes)
- rdma/hns: fix hns_roce_table_get return value (git-fixes)
- rdma/irdma: add missing read barriers (git-fixes)
- rdma/irdma: avoid fortify-string warning in irdma_clr_wqes (git-fixes)
- rdma/irdma: fix data race on cqp completion stats (git-fixes)
- rdma/irdma: fix data race on cqp request done (git-fixes)
- rdma/irdma: fix op_type reporting in cqes (git-fixes)
- rdma/irdma: report correct wc error (git-fixes)
- rdma/mlx4: make check for invalid flags stricter (git-fixes)
- rdma/mlx5: create an indirect flow table for steering anchor (git-fixes)
- rdma/mlx5: do not set tx affinity when lag is in hash mode (git-fixes)
- rdma/mlx5: fix affinity assignment (git-fixes)
- rdma/mlx5: initiate dropless rq for raw ethernet functions (git-fixes)
- rdma/mthca: fix crash when polling cq for shared qps (git-fixes)
- rdma/rtrs: fix rxe_dealloc_pd warning (git-fixes)
- rdma/rtrs: fix the last iu-&gt;buf leak in err path (git-fixes)
- rdma/rxe: fix access checks in rxe_check_bind_mw (git-fixes)
- rdma/rxe: fix packet length checks (git-fixes)
- rdma/rxe: fix ref count error in check_rkey() (git-fixes)
- rdma/rxe: fix rxe_cq_post (git-fixes)
- rdma/rxe: fix the use-before-initialization error of resp_pkts (git-fixes)
- rdma/rxe: remove dangling declaration of rxe_cq_disable() (git-fixes)
- rdma/rxe: remove the unused variable obj (git-fixes)
- rdma/rxe: removed unused name from rxe_task struct (git-fixes)
- rdma/uverbs: restrict usage of privileged qkeys (git-fixes)
- rdma/vmw_pvrdma: remove unnecessary check on wr-&gt;opcode (git-fixes)
- regmap: account for register length in smbus i/o limits (git-fixes).
- regmap: drop initial version of maximum transfer length fixes (git-fixes).
- regulator: core: fix more error checking for debugfs_create_dir() (git-fixes).
- regulator: core: streamline debugfs operations (git-fixes).
- regulator: helper: document ramp_delay parameter of regulator_set_ramp_delay_regmap() (git-fixes).
- restore kabi for nvidia vgpu driver (bsc#1210825).
- revert 'alsa: usb-audio: drop superfluous interface setup at parsing' (git-fixes).
- revert 'arm64: dts: zynqmp: add address-cells property to interrupt (git-fixes)
- revert 'debugfs, coccinelle: check for obsolete define_simple_attribute() usage' (git-fixes).
- revert 'drm/amd/display: edp do not add non-edid timings' (git-fixes).
- revert 'drm/i915: disable dsb usage for now' (git-fixes).
- revert 'drop amdgpu patches for fixing regression (bsc#1213304,bsc#1213777)' sle15-sp5 branch works as is, hence revive the dropped patches again.
- revert 'iavf: detach device during reset task' (git-fixes).
- revert 'iavf: do not restart tx queues after reset task failure' (git-fixes).
- revert 'mtd: rawnand: arasan: prevent an unsupported configuration' (git-fixes).
- revert 'net: phy: dp83867: perform soft reset and retain established link' (git-fixes).
- revert 'nfsv4: retry lock on old_stateid during delegation return' (git-fixes).
- revert 'usb: dwc3: core: enable autoretry feature in the controller' (git-fixes).
- revert 'usb: gadget: tegra-xudc: fix error check in tegra_xudc_powerdomain_init()' (git-fixes).
- revert 'usb: gadget: udc: core: offload usb_udc_vbus_handler processing'
- revert 'usb: gadget: udc: core: prevent soft_connect_store() race'
- revert 'usb: xhci: tegra: fix error check' (git-fixes).
- revive drm_dp_mst_hpd_irq() function (bsc#1213578).
- rpm/check-for-config-changes: ignore also pahole_has_* we now also have options like config_pahole_has_lang_exclude.
- rpm/check-for-config-changes: ignore also riscv_isa_* and dynamic_sigframe they depend on config_toolchain_has_*.
- rsi: remove kernel-doc comment marker (git-fixes).
- rtc: efi: add wakeup support (bsc#1213116).
- rtc: efi: enable set/get wakeup services as optional (bsc#1213116).
- rtc: efi: switch to devm_rtc_allocate_device (bsc#1213116).
- rtc: st-lpc: release some resources in st_rtc_probe() in case of error (git-fixes).
- rxrpc, afs: fix selection of abort codes (git-fixes).
- s390/ap: fix status returned by ap_aqic() (git-fixes bsc#1213259).
- s390/ap: fix status returned by ap_qact() (git-fixes bsc#1213258).
- s390/bpf: add expoline to tail calls (git-fixes bsc#1213870).
- s390/dasd: fix hanging device after quiesce/resume (git-fixes bsc#1213810).
- s390/dasd: print copy pair message only for the correct error (git-fixes bsc#1213872).
- s390/debug: add _asm_s390_ prefix to header guard (git-fixes bsc#1213263).
- s390/decompressor: specify __decompress() buf len to avoid overflow (git-fixes bsc#1213863).
- s390/gmap: voluntarily schedule during key setting (git-fixes bsc#1212892).
- s390/ipl: add missing intersection check to ipl_report handling (git-fixes bsc#1213871).
- s390/pci: clean up left over special treatment for function zero (bsc#1212525).
- s390/pci: only add specific device in zpci_bus_scan_device() (bsc#1212525).
- s390/pci: remove redundant pci_bus_add_devices() on new bus (bsc#1212525).
- s390/percpu: add read_once() to arch_this_cpu_to_op_simple() (git-fixes bsc#1213252).
- s390/qeth: fix vipa deletion (git-fixes bsc#1213713).
- s390/vmem: fix empty page tables cleanup under kasan (git-fixes bsc#1213715).
- s390: define runtime_discard_exit to fix link error with gnu ld &amp;lt; 2.36 (git-fixes bsc#1213264).
- s390: discard .interp section (git-fixes bsc#1213247).
- s390: introduce nospec_uses_trampoline() (git-fixes bsc#1213870).
- scftorture: count reschedule ipis (git-fixes).
- sched/debug: fix dentry leak in update_sched_domain_debugfs (git-fixes)
- sched: fix debug &amp;&amp; !schedstats warn (git-fixes)
- scsi: lpfc: abort outstanding els cmds when mailbox timeout error is detected (bsc#1213756).
- scsi: lpfc: avoid -wstringop-overflow warning (bsc#1213756).
- scsi: lpfc: clean up sli-4 sysfs resource reporting (bsc#1213756).
- scsi: lpfc: copyright updates for 14.2.0.14 patches (bsc#1213756).
- scsi: lpfc: fix a possible data race in lpfc_unregister_fcf_rescan() (bsc#1213756).
- scsi: lpfc: fix incorrect big endian type assignment in bsg loopback path (bsc#1213756).
- scsi: lpfc: fix incorrect big endian type assignments in fdmi and vmid paths (bsc#1213756).
- scsi: lpfc: fix lpfc_name struct packing (bsc#1213756).
- scsi: lpfc: make fabric zone discovery more robust when handling unsolicited logo (bsc#1213756).
- scsi: lpfc: pull out fw diagnostic dump log message from driver's trace buffer (bsc#1213756).
- scsi: lpfc: qualify ndlp discovery state when processing rscn (bsc#1213756).
- scsi: lpfc: refactor cpu affinity assignment paths (bsc#1213756).
- scsi: lpfc: remove extra ndlp kref decrement in flogi cmpl for loop topology (bsc#1213756).
- scsi: lpfc: replace all non-returning strlcpy() with strscpy() (bsc#1213756).
- scsi: lpfc: replace one-element array with flexible-array member (bsc#1213756).
- scsi: lpfc: revise ndlp kref handling for dev_loss_tmo_callbk and lpfc_drop_node (bsc#1213756).
- scsi: lpfc: set establish image pair service parameter only for target functions (bsc#1213756).
- scsi: lpfc: simplify fcp_abort transport callback log message (bsc#1213756).
- scsi: lpfc: update lpfc version to 14.2.0.14 (bsc#1213756).
- scsi: lpfc: use struct_size() helper (bsc#1213756).
- scsi: qla2xxx: adjust iocb resource on qpair create (bsc#1213747).
- scsi: qla2xxx: array index may go out of bound (bsc#1213747).
- scsi: qla2xxx: avoid fcport pointer dereference (bsc#1213747).
- scsi: qla2xxx: check valid rport returned by fc_bsg_to_rport() (bsc#1213747).
- scsi: qla2xxx: correct the index of array (bsc#1213747).
- scsi: qla2xxx: drop useless list_head (bsc#1213747).
- scsi: qla2xxx: fix buffer overrun (bsc#1213747).
- scsi: qla2xxx: fix command flush during tmf (bsc#1213747).
- scsi: qla2xxx: fix deletion race condition (bsc#1213747).
- scsi: qla2xxx: fix end of loop test (bsc#1213747).
- scsi: qla2xxx: fix erroneous link up failure (bsc#1213747).
- scsi: qla2xxx: fix error code in qla2x00_start_sp() (bsc#1213747).
- scsi: qla2xxx: fix inconsistent tmf timeout (bsc#1213747).
- scsi: qla2xxx: fix null pointer dereference in target mode (bsc#1213747).
- scsi: qla2xxx: fix potential null pointer dereference (bsc#1213747).
- scsi: qla2xxx: fix session hang in gnl (bsc#1213747).
- scsi: qla2xxx: fix tmf leak through (bsc#1213747).
- scsi: qla2xxx: limit tmf to 8 per function (bsc#1213747).
- scsi: qla2xxx: pointer may be dereferenced (bsc#1213747).
- scsi: qla2xxx: remove unused nvme_ls_waitq wait queue (bsc#1213747).
- scsi: qla2xxx: replace one-element array with declare_flex_array() helper (bsc#1213747).
- scsi: qla2xxx: silence a static checker warning (bsc#1213747).
- scsi: qla2xxx: turn off noisy message log (bsc#1213747).
- scsi: qla2xxx: update version to 10.02.08.400-k (bsc#1213747).
- scsi: qla2xxx: update version to 10.02.08.500-k (bsc#1213747).
- scsi: qla2xxx: use vmalloc_array() and vcalloc() (bsc#1213747).
- security: keys: modify mismatched function name (git-fixes).
- selftests/ir: fix build with ancient kernel headers (git-fixes).
- selftests: cgroup: fix unsigned comparison with less than zero (git-fixes).
- selftests: forwarding: fix packet matching in mirroring selftests (git-fixes).
- selftests: mptcp: depend on syn_cookies (git-fixes).
- selftests: mptcp: sockopt: return error if wrong mark (git-fixes).
- selftests: rtnetlink: remove netdevsim device after ipsec offload test (git-fixes).
- selftests: tc: add 'ct' action kconfig dep (git-fixes).
- selftests: tc: add conntrack procfs kconfig (git-fixes).
- selftests: tc: set timeout to 15 minutes (git-fixes).
- serial: 8250: lock port for stop_rx() in omap8250_irq() (git-fixes).
- serial: 8250: lock port for uart_ier access in omap8250_irq() (git-fixes).
- serial: 8250: omap: fix freeing of resources on failed register (git-fixes).
- serial: 8250_omap: use force_suspend and resume for system suspend (git-fixes).
- serial: atmel: do not enable irqs prematurely (git-fixes).
- serial: qcom-geni: drop bogus runtime pm state update (git-fixes).
- serial: sifive: fix sifive_serial_console_setup() section (git-fixes).
- sfc: fix crash when reading stats while nic is resetting (git-fixes).
- sfc: fix xdp queues mode with legacy irq (git-fixes).
- sfc: use budget for tx completions (git-fixes).
- signal/powerpc: on swapcontext failure force sigsegv (bsc#1194869).
- signal/s390: use force_sigsegv in default_trap_handler (git-fixes bsc#1212861).
- signal: replace force_sigsegv(sigsegv) with force_fatal_sig(sigsegv) (bsc#1194869).
- smb3: do not reserve too many oplock credits (bsc#1193629).
- smb3: missing null check in smb2_change_notify (bsc#1193629).
- smb: client: fix broken file attrs with nodfs mounts (bsc#1193629).
- smb: client: fix missed ses refcounting (git-fixes).
- smb: client: fix parsing of source mount option (bsc#1193629).
- smb: client: fix shared dfs root mounts with different prefixes (bsc#1193629).
- smb: client: fix warning in cifs_match_super() (bsc#1193629).
- smb: client: fix warning in cifs_smb3_do_mount() (bsc#1193629).
- smb: client: fix warning in cifsfindfirst() (bsc#1193629).
- smb: client: fix warning in cifsfindnext() (bsc#1193629).
- smb: client: fix warning in generic_ip_connect() (bsc#1193629).
- smb: client: improve dfs mount check (bsc#1193629).
- smb: client: remove redundant pointer 'server' (bsc#1193629).
- smb: delete an unnecessary statement (bsc#1193629).
- smb: move client and server files to common directory fs/smb (bsc#1193629).
- smb: remove obsolete comment (bsc#1193629).
- soc/fsl/qe: fix usb.c build errors (git-fixes).
- soc: samsung: exynos-pmu: re-introduce exynos4212 support (git-fixes).
- soundwire: bus_type: avoid lockdep assert in sdw_drv_probe() (git-fixes).
- soundwire: cadence: drain the rx fifo after an io timeout (git-fixes).
- soundwire: dmi-quirks: add new mapping for hp spectre x360 (git-fixes).
- soundwire: qcom: fix storing port config out-of-bounds (git-fixes).
- soundwire: qcom: update status correctly with mask (git-fixes).
- soundwire: stream: add missing clear of alloc_slave_rt (git-fixes).
- spi: bcm-qspi: return error if neither hif_mspi nor mspi is available (git-fixes).
- spi: bcm63xx: fix max prepend length (git-fixes).
- spi: dw: round of n_bytes to power of 2 (git-fixes).
- spi: lpspi: disable lpspi module irq in dma mode (git-fixes).
- spi: spi-geni-qcom: correct cs_toggle bit in spi_trans_cfg (git-fixes).
- staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() (git-fixes).
- staging: r8712: fix memory leak in _r8712_init_xmit_priv() (git-fixes).
- sunrpc: always free ctxt when freeing deferred request (git-fixes).
- sunrpc: double free xprt_ctxt while still in use (git-fixes).
- sunrpc: fix trace_svc_register() call site (git-fixes).
- sunrpc: fix uaf in svc_tcp_listen_data_ready() (git-fixes).
- sunrpc: remove dead code in svc_tcp_release_rqst() (git-fixes).
- sunrpc: remove the maximum number of retries in call_bind_status (git-fixes).
- svcrdma: prevent page release when nothing was received (git-fixes).
- swsmu/amdgpu_smu: fix the wrong if-condition (git-fixes).
- test_firmware: return enomem instead of enospc on failed memory allocation (git-fixes).
- tpm: tpm_vtpm_proxy: fix a race condition in /dev/vtpmx creation (git-fixes).
- tpm_tis: explicitly check for error code (git-fixes).
- tracing/timer: add missing hrtimer modes to decode_hrtimer_mode() (git-fixes).
- tty: n_gsm: fix uaf in gsm_cleanup_mux (git-fixes).
- tty: serial: fsl_lpuart: add earlycon for imx8ulp platform (git-fixes).
- tty: serial: imx: fix rs485 rx after tx (git-fixes).
- tty: serial: samsung_tty: fix a memory leak in s3c24xx_serial_getclk() in case of error (git-fixes).
- tty: serial: samsung_tty: fix a memory leak in s3c24xx_serial_getclk() when iterating clk (git-fixes).
- ubi: ensure that vid header offset + vid header size &amp;lt;= alloc, size (bsc#1210584).
- ubi: fix failure attaching when vid_hdr offset equals to (sub)page size (bsc#1210584).
- ubifs: add missing iput if do_tmpfile() failed in rename whiteout (git-fixes).
- ubifs: do_rename: fix wrong space budget when target inode's nlink &gt; 1 (git-fixes).
- ubifs: error path in ubifs_remount_rw() seems to wrongly free write buffers (git-fixes).
- ubifs: fix 'ui-&gt;dirty' race between do_tmpfile() and writeback work (git-fixes).
- ubifs: fix aa deadlock when setting xattr for encrypted file (git-fixes).
- ubifs: fix build errors as symbol undefined (git-fixes).
- ubifs: fix deadlock in concurrent rename whiteout and inode writeback (git-fixes).
- ubifs: fix memory leak in alloc_wbufs() (git-fixes).
- ubifs: fix memory leak in do_rename (git-fixes).
- ubifs: fix read out-of-bounds in ubifs_wbuf_write_nolock() (git-fixes).
- ubifs: fix to add refcount once page is set private (git-fixes).
- ubifs: fix wrong dirty space budget for dirty inode (git-fixes).
- ubifs: free memory for tmpfile name (git-fixes).
- ubifs: rectify space amount budget for mkdir/tmpfile operations (git-fixes).
- ubifs: rectify space budget for ubifs_symlink() if symlink is encrypted (git-fixes).
- ubifs: rectify space budget for ubifs_xrename() (git-fixes).
- ubifs: rename whiteout atomically (git-fixes).
- ubifs: rename_whiteout: correct old_dir size computing (git-fixes).
- ubifs: rename_whiteout: fix double free for whiteout_ui-&gt;data (git-fixes).
- ubifs: reserve one leb for each journal head while doing budget (git-fixes).
- ubifs: setflags: make dirtied_ino_d 8 bytes aligned (git-fixes).
- ubifs: ubifs_writepage: mark page dirty after writing inode failed (git-fixes).
- udf: avoid double brelse() in udf_rename() (bsc#1213032).
- udf: define efscorrupted error code (bsc#1213038).
- udf: detect system inodes linked into directory hierarchy (bsc#1213114).
- udf: discard preallocation before extending file with a hole (bsc#1213036).
- udf: do not bother looking for prealloc extents if i_lenextents matches i_size (bsc#1213035).
- udf: do not bother merging very long extents (bsc#1213040).
- udf: do not update file length for failed writes to inline files (bsc#1213041).
- udf: fix error handling in udf_new_inode() (bsc#1213112).
- udf: fix extending file within last block (bsc#1213037).
- udf: fix preallocation discarding at indirect extent boundary (bsc#1213034).
- udf: preserve link count of system files (bsc#1213113).
- udf: truncate added extents on failed expansion (bsc#1213039).
- update config and supported.conf files due to renaming.
- update config files: enable config_x86_amd_pstate (bsc#1212445)
- update suse/rdma-mthca-fix-crash-when-polling-cq-for-shared-qps. (git-fixes bsc#1212604).
- usb: dwc2: fix some error handling paths (git-fixes).
- usb: dwc2: platform: improve error reporting for problems during .remove() (git-fixes).
- usb: dwc3-meson-g12a: fix an error handling path in dwc3_meson_g12a_probe() (git-fixes).
- usb: dwc3: do not reset device side if dwc3 was configured as host-only (git-fixes).
- usb: dwc3: gadget: propagate core init errors to udc during pullup (git-fixes).
- usb: dwc3: pci: skip byt gpio lookup table for hardwired phy (git-fixes).
- usb: dwc3: qcom: fix an error handling path in dwc3_qcom_probe() (git-fixes).
- usb: dwc3: qcom: fix potential memory leak (git-fixes).
- usb: dwc3: qcom: release the correct resources in dwc3_qcom_remove() (git-fixes).
- usb: gadget: core: remove unbalanced mutex_unlock in usb_gadget_activate (git-fixes).
- usb: gadget: u_serial: add null pointer check in gserial_suspend (git-fixes).
- usb: gadget: udc: core: offload usb_udc_vbus_handler processing (git-fixes).
- usb: gadget: udc: core: prevent soft_connect_store() race (git-fixes).
- usb: gadget: udc: fix null dereference in remove() (git-fixes).
- usb: hide unused usbfs_notify_suspend/resume functions (git-fixes).
- usb: phy: phy-tahvo: fix memory leak in tahvo_usb_probe() (git-fixes).
- usb: serial: option: add lara-r6 01b pids (git-fixes).
- usb: typec: fix fast_role_swap_current show function (git-fixes).
- usb: typec: iterate pds array when showing the pd list (git-fixes).
- usb: typec: set port-&gt;pd before adding device for typec_port (git-fixes).
- usb: typec: use sysfs_emit_at when concatenating the string (git-fixes).
- usb: xhci-mtk: set the dma max_seg_size (git-fixes).
- usb: xhci: remove unused udev from xhci_log_ctx trace event (git-fixes).
- usrmerge: adjust module path in the kernel sources (bsc#1212835).
- vhost: support packed when setting-getting vring_base (git-fixes).
- vhost_net: revert upend_idx only on retriable error (git-fixes).
- virtio-net: maintain reverse cleanup order (git-fixes).
- virtio_net: fix error unwinding of xdp initialization (git-fixes).
- w1: fix loop in w1_fini() (git-fixes).
- w1: w1_therm: fix locking behavior in convert_t (git-fixes).
- wifi: airo: avoid uninitialized warning in airo_get_rate() (git-fixes).
- wifi: ath10k: trigger sta disconnect after reconfig complete on hardware restart (git-fixes).
- wifi: ath11k: add missing check for ioremap (git-fixes).
- wifi: ath11k: add support for suspend in power down state (bsc#1207948).
- wifi: ath11k: handle irq enable/disable in several code path (bsc#1207948).
- wifi: ath11k: handle thermal device registeration together with mac (bsc#1207948).
- wifi: ath11k: remove mhi loopback channels (bsc#1207948).
- wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx (git-fixes).
- wifi: ath9k: convert msecs to jiffies where needed (git-fixes).
- wifi: ath9k: do not allow to overwrite endpoint0 attributes (git-fixes).
- wifi: ath9k: fix ar9003 mac hardware hang check register offset calculation (git-fixes).
- wifi: ath9k: fix possible stall on ath9k_txq_list_has_key() (git-fixes).
- wifi: atmel: fix an error handling path in atmel_probe() (git-fixes).
- wifi: cfg80211: rewrite merging of inherited elements (git-fixes).
- wifi: iwlwifi: mvm: indicate hw decrypt for beacon protection (git-fixes).
- wifi: iwlwifi: pcie: fix null pointer dereference in iwl_pcie_irq_rx_msix_handler() (git-fixes).
- wifi: iwlwifi: pull from txqs with softirqs disabled (git-fixes).
- wifi: mwifiex: fix the size of a memory allocation in mwifiex_ret_802_11_scan() (git-fixes).
- wifi: orinoco: fix an error handling path in orinoco_cs_probe() (git-fixes).
- wifi: orinoco: fix an error handling path in spectrum_cs_probe() (git-fixes).
- wifi: ray_cs: drop useless status variable in parse_addr() (git-fixes).
- wifi: ray_cs: utilize strnlen() in parse_addr() (git-fixes).
- wifi: rsi: do not configure wowlan in shutdown hook if not enabled (git-fixes).
- wifi: rsi: do not set mmc_pm_keep_power in shutdown (git-fixes).
- wifi: rtw89: debug: fix error code in rtw89_debug_priv_send_h2c_set() (git-fixes).
- wifi: wilc1000: fix for absent rsn capabilities wfa testcase (git-fixes).
- wl3501_cs: use eth_hw_addr_set() (git-fixes).
- writeback: fix call of incorrect macro (bsc#1213024).
- writeback: fix dereferencing null mapping-&gt;host on writeback_page_template (git-fixes).
- x86/amd_nb: add pci id for family 19h model 78h (git-fixes).
- x86/build: avoid relocation information in final vmlinux (bsc#1187829).
- x86/kprobes: fix arch_check_optimized_kprobe check within optimized_kprobe range (git-fixes).
- x86/platform/uv: add platform resolving #defines for misc gam_mmioh_redirect* (bsc#1212256 jsc#ped-4718).
- x86/platform/uv: fix printed information in calc_mmioh_map (bsc#1212256 jsc#ped-4718).
- x86/platform/uv: helper functions for allocating and freeing conversion tables (bsc#1212256 jsc#ped-4718).
- x86/platform/uv: introduce helper function uv_pnode_to_socket (bsc#1212256 jsc#ped-4718).
- x86/platform/uv: remove remaining bug_on() and bug() calls (bsc#1212256 jsc#ped-4718).
- x86/platform/uv: update uv platform code for snc (bsc#1212256 jsc#ped-4718).
- x86/platform/uv: uv support for sub-numa clustering (bsc#1212256 jsc#ped-4718).
- x86/platform/uv: when searching for minimums, start at int_max not 99999 (bsc#1212256 jsc#ped-4718).
- x86/pvh: obtain vga console info in dom0 (git-fixes).
- x86/xen: fix secondary processor fpu initialization (bsc#1212869).
- x86: fix .brk attribute in linker script (git-fixes).
- xen/blkfront: only check req_fua for writes (git-fixes).
- xen/pvcalls-back: fix double frees with pvcalls_new_active_socket() (git-fixes).
- xfs: ail needs asynchronous cil forcing (bsc#1211811).
- xfs: async cil flushes need pending pushes to be made stable (bsc#1211811).
- xfs: attach iclog callbacks in xlog_cil_set_ctx_write_state() (bsc#1211811).
- xfs: cil work is serialised, not pipelined (bsc#1211811).
- xfs: clean up the rtbitmap fsmap backend (git-fixes).
- xfs: do not deplete the reserve pool when trying to shrink the fs (git-fixes).
- xfs: do not reverse order of items in bulk ail insertion (git-fixes).
- xfs: do not run shutdown callbacks on active iclogs (bsc#1211811).
- xfs: drop async cache flushes from cil commits (bsc#1211811).
- xfs: factor out log write ordering from xlog_cil_push_work() (bsc#1211811).
- xfs: fix getfsmap reporting past the last rt extent (git-fixes).
- xfs: fix integer overflows in the fsmap rtbitmap and logdev backends (git-fixes).
- xfs: fix interval filtering in multi-step fsmap queries (git-fixes).
- xfs: fix logdev fsmap query result filtering (git-fixes).
- xfs: fix off-by-one error when the last rt extent is in use (git-fixes).
- xfs: fix uninitialized variable access (git-fixes).
- xfs: make fsmap backend function key parameters const (git-fixes).
- xfs: make the record pointer passed to query_range functions const (git-fixes).
- xfs: move the cil workqueue to the cil (bsc#1211811).
- xfs: move xlog_commit_record to xfs_log_cil.c (bsc#1211811).
- xfs: order cil checkpoint start records (bsc#1211811).
- xfs: pass a cil context to xlog_write() (bsc#1211811).
- xfs: pass explicit mount pointer to rtalloc query functions (git-fixes).
- xfs: rework xlog_state_do_callback() (bsc#1211811).
- xfs: run callbacks before waking waiters in xlog_state_shutdown_callbacks (bsc#1211811).
- xfs: separate out log shutdown callback processing (bsc#1211811).
- xfs: wait iclog complete before tearing down ail (bsc#1211811).
- xfs: xlog_state_ioerror must die (bsc#1211811).
- xhci: fix resume issue of some zhaoxin hosts (git-fixes).
- xhci: fix trb prefetch issue of zhaoxin hosts (git-fixes).
- xhci: show zhaoxin xhci root hub speed correctly (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-14"/>
	<updated date="2023-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1150305">SUSE bug 1150305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187829">SUSE bug 1187829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206418">SUSE bug 1206418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207129">SUSE bug 1207129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207894">SUSE bug 1207894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207948">SUSE bug 1207948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208788">SUSE bug 1208788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210335">SUSE bug 1210335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210565">SUSE bug 1210565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210584">SUSE bug 1210584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210627">SUSE bug 1210627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210780">SUSE bug 1210780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210825">SUSE bug 1210825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210853">SUSE bug 1210853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211014">SUSE bug 1211014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211131">SUSE bug 1211131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211243">SUSE bug 1211243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211738">SUSE bug 1211738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211811">SUSE bug 1211811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211867">SUSE bug 1211867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212051">SUSE bug 1212051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212256">SUSE bug 1212256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212265">SUSE bug 1212265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212301">SUSE bug 1212301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212445">SUSE bug 1212445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212456">SUSE bug 1212456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212502">SUSE bug 1212502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212525">SUSE bug 1212525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212603">SUSE bug 1212603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212604">SUSE bug 1212604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212685">SUSE bug 1212685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212766">SUSE bug 1212766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212835">SUSE bug 1212835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212838">SUSE bug 1212838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212842">SUSE bug 1212842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212846">SUSE bug 1212846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212848">SUSE bug 1212848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212861">SUSE bug 1212861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212869">SUSE bug 1212869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212892">SUSE bug 1212892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212901">SUSE bug 1212901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212905">SUSE bug 1212905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212961">SUSE bug 1212961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213010">SUSE bug 1213010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213011">SUSE bug 1213011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213012">SUSE bug 1213012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213013">SUSE bug 1213013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213014">SUSE bug 1213014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213015">SUSE bug 1213015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213016">SUSE bug 1213016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213017">SUSE bug 1213017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213018">SUSE bug 1213018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213019">SUSE bug 1213019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213020">SUSE bug 1213020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213021">SUSE bug 1213021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213024">SUSE bug 1213024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213025">SUSE bug 1213025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213032">SUSE bug 1213032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213034">SUSE bug 1213034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213035">SUSE bug 1213035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213036">SUSE bug 1213036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213037">SUSE bug 1213037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213038">SUSE bug 1213038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213039">SUSE bug 1213039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213040">SUSE bug 1213040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213041">SUSE bug 1213041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213059">SUSE bug 1213059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213061">SUSE bug 1213061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213087">SUSE bug 1213087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213088">SUSE bug 1213088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213089">SUSE bug 1213089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213090">SUSE bug 1213090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213092">SUSE bug 1213092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213093">SUSE bug 1213093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213094">SUSE bug 1213094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213095">SUSE bug 1213095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213096">SUSE bug 1213096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213098">SUSE bug 1213098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213099">SUSE bug 1213099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213100">SUSE bug 1213100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213102">SUSE bug 1213102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213103">SUSE bug 1213103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213104">SUSE bug 1213104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213105">SUSE bug 1213105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213106">SUSE bug 1213106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213107">SUSE bug 1213107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213108">SUSE bug 1213108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213109">SUSE bug 1213109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213110">SUSE bug 1213110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213111">SUSE bug 1213111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213112">SUSE bug 1213112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213113">SUSE bug 1213113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213114">SUSE bug 1213114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213116">SUSE bug 1213116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213134">SUSE bug 1213134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213167">SUSE bug 1213167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213205">SUSE bug 1213205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213206">SUSE bug 1213206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213226">SUSE bug 1213226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213233">SUSE bug 1213233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213245">SUSE bug 1213245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213247">SUSE bug 1213247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213252">SUSE bug 1213252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213258">SUSE bug 1213258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213259">SUSE bug 1213259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213263">SUSE bug 1213263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213264">SUSE bug 1213264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213272">SUSE bug 1213272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213286">SUSE bug 1213286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213287">SUSE bug 1213287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213304">SUSE bug 1213304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213417">SUSE bug 1213417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213493">SUSE bug 1213493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213523">SUSE bug 1213523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213524">SUSE bug 1213524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213533">SUSE bug 1213533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213543">SUSE bug 1213543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213578">SUSE bug 1213578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213585">SUSE bug 1213585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213586">SUSE bug 1213586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213588">SUSE bug 1213588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213601">SUSE bug 1213601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213620">SUSE bug 1213620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213632">SUSE bug 1213632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213653">SUSE bug 1213653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213705">SUSE bug 1213705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213713">SUSE bug 1213713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213715">SUSE bug 1213715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213747">SUSE bug 1213747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213756">SUSE bug 1213756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213759">SUSE bug 1213759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213777">SUSE bug 1213777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213810">SUSE bug 1213810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213812">SUSE bug 1213812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213856">SUSE bug 1213856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213857">SUSE bug 1213857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213863">SUSE bug 1213863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213867">SUSE bug 1213867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213870">SUSE bug 1213870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213871">SUSE bug 1213871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213872">SUSE bug 1213872</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0459/">CVE-2023-0459 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0459">CVE-2023-0459 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1829/">CVE-2023-1829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1829">CVE-2023-1829 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-21400/">CVE-2023-21400 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21400">CVE-2023-21400 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2156/">CVE-2023-2156 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2156">CVE-2023-2156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2166/">CVE-2023-2166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2166">CVE-2023-2166 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-2430/">CVE-2023-2430 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2430">CVE-2023-2430 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2985/">CVE-2023-2985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2985">CVE-2023-2985 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3090/">CVE-2023-3090 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3090">CVE-2023-3090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31083/">CVE-2023-31083 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31083">CVE-2023-31083 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3111/">CVE-2023-3111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3111">CVE-2023-3111 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3117/">CVE-2023-3117 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3117">CVE-2023-3117 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31248/">CVE-2023-31248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31248">CVE-2023-31248 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3212/">CVE-2023-3212 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3212">CVE-2023-3212 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3268/">CVE-2023-3268 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3268">CVE-2023-3268 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3389/">CVE-2023-3389 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3389">CVE-2023-3389 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3390/">CVE-2023-3390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3390">CVE-2023-3390 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35001/">CVE-2023-35001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35001">CVE-2023-35001 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3567/">CVE-2023-3567 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3567">CVE-2023-3567 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3609/">CVE-2023-3609 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3609">CVE-2023-3609 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3611/">CVE-2023-3611 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3611">CVE-2023-3611 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3776/">CVE-2023-3776 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3776">CVE-2023-3776 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3812/">CVE-2023-3812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3812">CVE-2023-3812 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38409/">CVE-2023-38409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38409">CVE-2023-38409 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3863/">CVE-2023-3863 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3863">CVE-2023-3863 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4004/">CVE-2023-4004 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4004">CVE-2023-4004 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009778255" comment="cluster-md-kmp-rt-5.14.21-150500.13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778256" comment="dlm-kmp-rt-5.14.21-150500.13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778257" comment="gfs2-kmp-rt-5.14.21-150500.13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778258" comment="kernel-devel-rt-5.14.21-150500.13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778259" comment="kernel-rt-5.14.21-150500.13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778260" comment="kernel-rt-devel-5.14.21-150500.13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778261" comment="kernel-rt-extra-5.14.21-150500.13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778262" comment="kernel-rt-livepatch-5.14.21-150500.13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778263" comment="kernel-rt-livepatch-devel-5.14.21-150500.13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778264" comment="kernel-rt-optional-5.14.21-150500.13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778265" comment="kernel-rt-vdso-5.14.21-150500.13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778266" comment="kernel-rt_debug-5.14.21-150500.13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778267" comment="kernel-rt_debug-devel-5.14.21-150500.13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778268" comment="kernel-rt_debug-livepatch-devel-5.14.21-150500.13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778269" comment="kernel-rt_debug-vdso-5.14.21-150500.13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778270" comment="kernel-source-rt-5.14.21-150500.13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778271" comment="kernel-syms-rt-5.14.21-150500.13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778272" comment="kselftests-kmp-rt-5.14.21-150500.13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778273" comment="ocfs2-kmp-rt-5.14.21-150500.13.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778274" comment="reiserfs-kmp-rt-5.14.21-150500.13.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4304" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openj9 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210628" ref_url="https://bugzilla.suse.com/1210628" source="BUGZILLA"/>
		<reference ref_id="1210631" ref_url="https://bugzilla.suse.com/1210631" source="BUGZILLA"/>
		<reference ref_id="1210632" ref_url="https://bugzilla.suse.com/1210632" source="BUGZILLA"/>
		<reference ref_id="1210634" ref_url="https://bugzilla.suse.com/1210634" source="BUGZILLA"/>
		<reference ref_id="1210635" ref_url="https://bugzilla.suse.com/1210635" source="BUGZILLA"/>
		<reference ref_id="1210636" ref_url="https://bugzilla.suse.com/1210636" source="BUGZILLA"/>
		<reference ref_id="1210637" ref_url="https://bugzilla.suse.com/1210637" source="BUGZILLA"/>
		<reference ref_id="1211615" ref_url="https://bugzilla.suse.com/1211615" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-21930" ref_url="https://www.suse.com/security/cve/CVE-2023-21930/" source="CVE"/>
		<reference ref_id="CVE-2023-21937" ref_url="https://www.suse.com/security/cve/CVE-2023-21937/" source="CVE"/>
		<reference ref_id="CVE-2023-21938" ref_url="https://www.suse.com/security/cve/CVE-2023-21938/" source="CVE"/>
		<reference ref_id="CVE-2023-21939" ref_url="https://www.suse.com/security/cve/CVE-2023-21939/" source="CVE"/>
		<reference ref_id="CVE-2023-21954" ref_url="https://www.suse.com/security/cve/CVE-2023-21954/" source="CVE"/>
		<reference ref_id="CVE-2023-21967" ref_url="https://www.suse.com/security/cve/CVE-2023-21967/" source="CVE"/>
		<reference ref_id="CVE-2023-21968" ref_url="https://www.suse.com/security/cve/CVE-2023-21968/" source="CVE"/>
		<reference ref_id="CVE-2023-2597" ref_url="https://www.suse.com/security/cve/CVE-2023-2597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3305-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031002.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openj9 fixes the following issues:

Update to OpenJDK 8u372 build 07 with OpenJ9 0.38.0 virtual machine.

CVE-2023-21930: Unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition (bsc#1210628).
CVE-2023-21937: Fixed vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). (bsc#1210631).
CVE-2023-21938: Fixed vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). (bsc#1210632).
CVE-2023-21939: Fixed vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). (bsc#1210634).
CVE-2023-21954: Fixed vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). (bsc#1210635).
CVE-2023-21967: Fixed vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). (bsc#1210636).
CVE-2023-21968: Fixed ulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries) (bsc#1210637).
CVE-2023-2597: Fixed buffer overflow in shared cache implementation (bsc#1211615).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-14"/>
	<updated date="2023-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210628">SUSE bug 1210628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210631">SUSE bug 1210631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210632">SUSE bug 1210632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210634">SUSE bug 1210634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210635">SUSE bug 1210635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210636">SUSE bug 1210636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210637">SUSE bug 1210637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211615">SUSE bug 1211615</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-21930/">CVE-2023-21930 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21930">CVE-2023-21930 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21937/">CVE-2023-21937 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21937">CVE-2023-21937 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21938/">CVE-2023-21938 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21938">CVE-2023-21938 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21939/">CVE-2023-21939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21939">CVE-2023-21939 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-21954/">CVE-2023-21954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21954">CVE-2023-21954 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-21967/">CVE-2023-21967 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21967">CVE-2023-21967 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21968/">CVE-2023-21968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21968">CVE-2023-21968 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2597/">CVE-2023-2597 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2597">CVE-2023-2597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009778466" comment="java-1_8_0-openj9-1.8.0.372-150200.3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778467" comment="java-1_8_0-openj9-accessibility-1.8.0.372-150200.3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778468" comment="java-1_8_0-openj9-demo-1.8.0.372-150200.3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778469" comment="java-1_8_0-openj9-devel-1.8.0.372-150200.3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778470" comment="java-1_8_0-openj9-headless-1.8.0.372-150200.3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778471" comment="java-1_8_0-openj9-javadoc-1.8.0.372-150200.3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778472" comment="java-1_8_0-openj9-src-1.8.0.372-150200.3.33.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4305" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206418" ref_url="https://bugzilla.suse.com/1206418" source="BUGZILLA"/>
		<reference ref_id="1207129" ref_url="https://bugzilla.suse.com/1207129" source="BUGZILLA"/>
		<reference ref_id="1207948" ref_url="https://bugzilla.suse.com/1207948" source="BUGZILLA"/>
		<reference ref_id="1210627" ref_url="https://bugzilla.suse.com/1210627" source="BUGZILLA"/>
		<reference ref_id="1210780" ref_url="https://bugzilla.suse.com/1210780" source="BUGZILLA"/>
		<reference ref_id="1210825" ref_url="https://bugzilla.suse.com/1210825" source="BUGZILLA"/>
		<reference ref_id="1211131" ref_url="https://bugzilla.suse.com/1211131" source="BUGZILLA"/>
		<reference ref_id="1211738" ref_url="https://bugzilla.suse.com/1211738" source="BUGZILLA"/>
		<reference ref_id="1211811" ref_url="https://bugzilla.suse.com/1211811" source="BUGZILLA"/>
		<reference ref_id="1212445" ref_url="https://bugzilla.suse.com/1212445" source="BUGZILLA"/>
		<reference ref_id="1212502" ref_url="https://bugzilla.suse.com/1212502" source="BUGZILLA"/>
		<reference ref_id="1212604" ref_url="https://bugzilla.suse.com/1212604" source="BUGZILLA"/>
		<reference ref_id="1212766" ref_url="https://bugzilla.suse.com/1212766" source="BUGZILLA"/>
		<reference ref_id="1212901" ref_url="https://bugzilla.suse.com/1212901" source="BUGZILLA"/>
		<reference ref_id="1213167" ref_url="https://bugzilla.suse.com/1213167" source="BUGZILLA"/>
		<reference ref_id="1213272" ref_url="https://bugzilla.suse.com/1213272" source="BUGZILLA"/>
		<reference ref_id="1213287" ref_url="https://bugzilla.suse.com/1213287" source="BUGZILLA"/>
		<reference ref_id="1213304" ref_url="https://bugzilla.suse.com/1213304" source="BUGZILLA"/>
		<reference ref_id="1213417" ref_url="https://bugzilla.suse.com/1213417" source="BUGZILLA"/>
		<reference ref_id="1213578" ref_url="https://bugzilla.suse.com/1213578" source="BUGZILLA"/>
		<reference ref_id="1213585" ref_url="https://bugzilla.suse.com/1213585" source="BUGZILLA"/>
		<reference ref_id="1213586" ref_url="https://bugzilla.suse.com/1213586" source="BUGZILLA"/>
		<reference ref_id="1213588" ref_url="https://bugzilla.suse.com/1213588" source="BUGZILLA"/>
		<reference ref_id="1213601" ref_url="https://bugzilla.suse.com/1213601" source="BUGZILLA"/>
		<reference ref_id="1213620" ref_url="https://bugzilla.suse.com/1213620" source="BUGZILLA"/>
		<reference ref_id="1213632" ref_url="https://bugzilla.suse.com/1213632" source="BUGZILLA"/>
		<reference ref_id="1213653" ref_url="https://bugzilla.suse.com/1213653" source="BUGZILLA"/>
		<reference ref_id="1213713" ref_url="https://bugzilla.suse.com/1213713" source="BUGZILLA"/>
		<reference ref_id="1213715" ref_url="https://bugzilla.suse.com/1213715" source="BUGZILLA"/>
		<reference ref_id="1213747" ref_url="https://bugzilla.suse.com/1213747" source="BUGZILLA"/>
		<reference ref_id="1213756" ref_url="https://bugzilla.suse.com/1213756" source="BUGZILLA"/>
		<reference ref_id="1213759" ref_url="https://bugzilla.suse.com/1213759" source="BUGZILLA"/>
		<reference ref_id="1213777" ref_url="https://bugzilla.suse.com/1213777" source="BUGZILLA"/>
		<reference ref_id="1213810" ref_url="https://bugzilla.suse.com/1213810" source="BUGZILLA"/>
		<reference ref_id="1213812" ref_url="https://bugzilla.suse.com/1213812" source="BUGZILLA"/>
		<reference ref_id="1213856" ref_url="https://bugzilla.suse.com/1213856" source="BUGZILLA"/>
		<reference ref_id="1213857" ref_url="https://bugzilla.suse.com/1213857" source="BUGZILLA"/>
		<reference ref_id="1213863" ref_url="https://bugzilla.suse.com/1213863" source="BUGZILLA"/>
		<reference ref_id="1213867" ref_url="https://bugzilla.suse.com/1213867" source="BUGZILLA"/>
		<reference ref_id="1213870" ref_url="https://bugzilla.suse.com/1213870" source="BUGZILLA"/>
		<reference ref_id="1213871" ref_url="https://bugzilla.suse.com/1213871" source="BUGZILLA"/>
		<reference ref_id="1213872" ref_url="https://bugzilla.suse.com/1213872" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982/" source="CVE"/>
		<reference ref_id="CVE-2023-0459" ref_url="https://www.suse.com/security/cve/CVE-2023-0459/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-21400" ref_url="https://www.suse.com/security/cve/CVE-2023-21400/" source="CVE"/>
		<reference ref_id="CVE-2023-2156" ref_url="https://www.suse.com/security/cve/CVE-2023-2156/" source="CVE"/>
		<reference ref_id="CVE-2023-2166" ref_url="https://www.suse.com/security/cve/CVE-2023-2166/" source="CVE"/>
		<reference ref_id="CVE-2023-31083" ref_url="https://www.suse.com/security/cve/CVE-2023-31083/" source="CVE"/>
		<reference ref_id="CVE-2023-3268" ref_url="https://www.suse.com/security/cve/CVE-2023-3268/" source="CVE"/>
		<reference ref_id="CVE-2023-3567" ref_url="https://www.suse.com/security/cve/CVE-2023-3567/" source="CVE"/>
		<reference ref_id="CVE-2023-3609" ref_url="https://www.suse.com/security/cve/CVE-2023-3609/" source="CVE"/>
		<reference ref_id="CVE-2023-3611" ref_url="https://www.suse.com/security/cve/CVE-2023-3611/" source="CVE"/>
		<reference ref_id="CVE-2023-3776" ref_url="https://www.suse.com/security/cve/CVE-2023-3776/" source="CVE"/>
		<reference ref_id="CVE-2023-38409" ref_url="https://www.suse.com/security/cve/CVE-2023-38409/" source="CVE"/>
		<reference ref_id="CVE-2023-3863" ref_url="https://www.suse.com/security/cve/CVE-2023-3863/" source="CVE"/>
		<reference ref_id="CVE-2023-4004" ref_url="https://www.suse.com/security/cve/CVE-2023-4004/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-40982: Fixed transient execution attack called 'Gather Data Sampling' (bsc#1206418).
- CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec (bsc#1211738).
- CVE-2023-20569: Fixed side channel attack ‘Inception’ or ‘RAS Poisoning’ (bsc#1213287).
- CVE-2023-21400: Fixed several memory corruptions due to improper locking in io_uring (bsc#1213272).
- CVE-2023-2156: Fixed a flaw in the networking subsystem within the handling of the RPL protocol (bsc#1211131).
- CVE-2023-2166: Fixed NULL pointer dereference in can_rcv_filter (bsc#1210627).
- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).
- CVE-2023-3268: Fixed an out of bounds memory access flaw in relay_file_read_start_pos in the relayfs (bsc#1212502).
- CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c (bsc#1213167).
- CVE-2023-3609: Fixed reference counter leak leading to  overflow in net/sched (bsc#1213586).
- CVE-2023-3611: Fixed an out-of-bounds write in net/sched sch_qfq(bsc#1213585).
- CVE-2023-3776: Fixed improper refcount update in  cls_fw leads to use-after-free (bsc#1213588).
- CVE-2023-38409: Fixed an issue in set_con2fb_map in drivers/video/fbdev/core/fbcon.c. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info) (bsc#1213417).
- CVE-2023-3863: Fixed a use-after-free flaw in nfc_llcp_find_local in net/nfc/llcp_core.c in NFC. This flaw allowed a local user with special privileges to impact a kernel information leak issue (bsc#1213601).
- CVE-2023-4004: Fixed improper element removal netfilter nft_set_pipapo (bsc#1213812).

The following non-security bugs were fixed:

- ACPI: CPPC: Add ACPI disabled check to acpi_cpc_valid() (bsc#1212445).
- ACPI: CPPC: Add definition for undefined FADT preferred PM profile value (bsc#1212445).
- ACPI/IORT: Remove erroneous id_count check in iort_node_get_rmr_info() (git-fixes).
- ACPI: utils: Fix acpi_evaluate_dsm_typed() redefinition error (git-fixes).
- afs: Adjust ACK interpretation to try and cope with NAT (git-fixes).
- afs: Fix access after dec in put functions (git-fixes).
- afs: Fix afs_getattr() to refetch file status if callback break occurred (git-fixes).
- afs: Fix dynamic root getattr (git-fixes).
- afs: Fix fileserver probe RTT handling (git-fixes).
- afs: Fix infinite loop found by xfstest generic/676 (git-fixes).
- afs: Fix lost servers_outstanding count (git-fixes).
- afs: Fix server-&gt;active leak in afs_put_server (git-fixes).
- afs: Fix setting of mtime when creating a file/dir/symlink (git-fixes).
- afs: Fix updating of i_size with dv jump from server (git-fixes).
- afs: Fix vlserver probe RTT handling (git-fixes).
- afs: Return -EAGAIN, not -EREMOTEIO, when a file already locked (git-fixes).
- afs: Use refcount_t rather than atomic_t (git-fixes).
- afs: Use the operation issue time instead of the reply time for callbacks (git-fixes).
- ALSA: emu10k1: roll up loops in DSP setup code for Audigy (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NS70AU (git-fixes).
- ALSA: hda/realtek: Add support for DELL Oasis 13/14/16 laptops (git-fixes).
- ALSA: hda/realtek: Enable Mute LED on HP Laptop 15s-eq2xxx (git-fixes).
- ALSA: hda/realtek: Fix generic fixup definition for cs35l41 amp (git-fixes).
- ALSA: hda/realtek - remove 3k pull low procedure (git-fixes).
- ALSA: hda/realtek: Support ASUS G713PV laptop (git-fixes).
- ALSA: hda/relatek: Enable Mute LED on HP 250 G8 (git-fixes).
- ALSA: usb-audio: Add FIXED_RATE quirk for JBL Quantum610 Wireless (git-fixes).
- ALSA: usb-audio: Add new quirk FIXED_RATE for JBL Quantum810 Wireless (git-fixes).
- ALSA: usb-audio: Add quirk for Microsoft Modern Wireless Headset (bsc#1207129).
- ALSA: usb-audio: Always initialize fixed_rate in snd_usb_find_implicit_fb_sync_format() (git-fixes).
- ALSA: usb-audio: Apply mutex around snd_usb_endpoint_set_params() (git-fixes).
- ALSA: usb-audio: Avoid superfluous endpoint setup (git-fixes).
- ALSA: usb-audio: Avoid unnecessary interface change at EP close (git-fixes).
- ALSA: usb-audio: Clear fixed clock rate at closing EP (git-fixes).
- ALSA: usb-audio: Correct the return code from snd_usb_endpoint_set_params() (git-fixes).
- ALSA: usb-audio: Drop superfluous interface setup at parsing (git-fixes).
- ALSA: usb-audio: Fix possible NULL pointer dereference in snd_usb_pcm_has_fixed_rate() (git-fixes).
- ALSA: usb-audio: Fix wrong kfree issue in snd_usb_endpoint_free_all (git-fixes).
- ALSA: usb-audio: More refactoring of hw constraint rules (git-fixes).
- ALSA: usb-audio: Properly refcounting clock rate (git-fixes).
- ALSA: usb-audio: Rate limit usb_set_interface error reporting (git-fixes).
- ALSA: usb-audio: Refcount multiple accesses on the single clock (git-fixes).
- ALSA: usb-audio: Split endpoint setups for hw_params and prepare (take#2) (git-fixes).
- ALSA: usb-audio: Update for native DSD support quirks (git-fixes).
- ALSA: usb-audio: Use atomic_try_cmpxchg in ep_state_update (git-fixes).
- ALSA: usb-audio: Workaround for XRUN at prepare (git-fixes).
- amd-pstate: Fix amd_pstate mode switch (git-fixes).
- ASoC: amd: acp: fix for invalid dai id handling in acp_get_byte_count() (git-fixes).
- ASoC: atmel: Fix the 8K sample parameter in I2SC master (git-fixes).
- ASoc: codecs: ES8316: Fix DMIC config (git-fixes).
- ASoC: codecs: wcd934x: fix resource leaks on component remove (git-fixes).
- ASoC: codecs: wcd938x: fix codec initialisation race (git-fixes).
- ASoC: codecs: wcd938x: fix dB range for HPHL and HPHR (git-fixes).
- ASoC: codecs: wcd938x: fix missing clsh ctrl error handling (git-fixes).
- ASoC: codecs: wcd938x: fix soundwire initialisation race (git-fixes).
- ASoC: codecs: wcd-mbhc-v2: fix resource leaks on component remove (git-fixes).
- ASoC: da7219: Check for failure reading AAD IRQ events (git-fixes).
- ASoC: da7219: Flush pending AAD IRQ when suspending (git-fixes).
- ASoC: fsl_sai: Disable bit clock with transmitter (git-fixes).
- ASoC: fsl_spdif: Silence output on stop (git-fixes).
- ASoC: rt5640: Fix sleep in atomic context (git-fixes).
- ASoC: rt5682-sdw: fix for JD event handling in ClockStop Mode0 (git-fixes).
- ASoC: rt711: fix for JD event handling in ClockStop Mode0 (git-fixes).
- ASoC: rt711-sdca: fix for JD event handling in ClockStop Mode0 (git-fixes).
- ASoC: SOF: ipc3-dtrace: uninitialized data in dfsentry_trace_filter_write() (git-fixes).
- ASoC: tegra: Fix ADX byte map (git-fixes).
- ASoC: tegra: Fix AMX byte map (git-fixes).
- ASoC: wm8904: Fill the cache for WM8904_ADC_TEST_0 register (git-fixes).
- ata: pata_ns87415: mark ns87560_tf_read static (git-fixes).
- block, bfq: Fix division by zero error on zero wsum (bsc#1213653).
- block: Fix a source code comment in include/uapi/linux/blkzoned.h (git-fixes).
- bus: mhi: add new interfaces to handle MHI channels directly (bsc#1207948).
- bus: mhi: host: add destroy_device argument to mhi_power_down() (bsc#1207948).
- can: gs_usb: gs_can_close(): add missing set of CAN state to CAN_STATE_STOPPED (git-fixes).
- ceph: do not let check_caps skip sending responses for revoke msgs (bsc#1213856).
- coda: Avoid partial allocation of sig_inputArgs (git-fixes).
- cpufreq: amd-pstate: add amd-pstate driver parameter for mode selection (bsc#1212445).
- cpufreq: amd-pstate: Add AMD P-State frequencies attributes (bsc#1212445).
- cpufreq: amd-pstate: Add AMD P-State performance attributes (bsc#1212445).
- cpufreq: amd-pstate: Add boost mode support for AMD P-State (bsc#1212445).
- cpufreq: amd-pstate: add driver working mode switch support (bsc#1212445).
- cpufreq: amd-pstate: Add -&gt;fast_switch() callback (bsc#1212445).
- cpufreq: amd-pstate: Add fast switch function for AMD P-State (bsc#1212445).
- cpufreq: amd-pstate: Add guided autonomous mode (bsc#1212445).
- cpufreq: amd-pstate: Add guided mode control support via sysfs (bsc#1212445).
- cpufreq: amd-pstate: Add more tracepoint for AMD P-State module (bsc#1212445).
- cpufreq: amd-pstate: Add resume and suspend callbacks (bsc#1212445).
- cpufreq: amd-pstate: Add trace for AMD P-State module (bsc#1212445).
- cpufreq: amd-pstate: avoid uninitialized variable use (bsc#1212445).
- cpufreq: amd-pstate: change amd-pstate driver to be built-in type (bsc#1212445).
- cpufreq: amd-pstate: convert sprintf with sysfs_emit() (bsc#1212445).
- cpufreq: amd-pstate: cpufreq: amd-pstate: reset MSR_AMD_PERF_CTL register at init (bsc#1212445).
- cpufreq: amd-pstate: Expose struct amd_cpudata (bsc#1212445).
- cpufreq: amd-pstate: Fix initial highest_perf value (bsc#1212445).
- cpufreq: amd-pstate: Fix invalid write to MSR_AMD_CPPC_REQ (bsc#1212445).
- cpufreq: amd-pstate: Fix Kconfig dependencies for AMD P-State (bsc#1212445).
- cpufreq: amd-pstate: fix kernel hang issue while amd-pstate unregistering (bsc#1212445).
- cpufreq: amd-pstate: Fix struct amd_cpudata kernel-doc comment (bsc#1212445).
- cpufreq: amd-pstate: fix white-space (bsc#1212445).
- cpufreq: amd_pstate: fix wrong lowest perf fetch (bsc#1212445).
- cpufreq: amd-pstate: implement amd pstate cpu online and offline callback (bsc#1212445).
- cpufreq: amd-pstate: implement Pstate EPP support for the AMD processors (bsc#1212445).
- cpufreq: amd-pstate: implement suspend and resume callbacks (bsc#1212445).
- cpufreq: amd-pstate: Introduce a new AMD P-State driver to support future processors (bsc#1212445).
- cpufreq: amd-pstate: Introduce the support for the processors with shared memory solution (bsc#1212445).
- cpufreq: amd-pstate: Let user know amd-pstate is disabled (bsc#1212445).
- cpufreq: amd-pstate: Make amd-pstate EPP driver name hyphenated (bsc#1212445).
- cpufreq: amd-pstate: Make varaiable mode_state_machine static (bsc#1212445).
- cpufreq: amd_pstate: map desired perf into pstate scope for powersave governor (bsc#1212445).
- cpufreq: amd-pstate: optimize driver working mode selection in amd_pstate_param() (bsc#1212445).
- cpufreq: amd-pstate: Remove fast_switch_possible flag from active driver (bsc#1212445).
- cpufreq: amd-pstate: remove MODULE_LICENSE in non-modules (bsc#1212445).
- cpufreq: amd-pstate: Set a fallback policy based on preferred_profile (bsc#1212445).
- cpufreq: amd-pstate: simplify cpudata pointer assignment (bsc#1212445).
- cpufreq: amd-pstate: Update policy-&gt;cur in amd_pstate_adjust_perf() (bsc#1212445).
- cpufreq: amd-pstate: update pstate frequency transition delay time (bsc#1212445).
- cpufreq: amd-pstate: Write CPPC enable bit per-socket (bsc#1212445).
- crypto: kpp - Add helper to set reqsize (git-fixes).
- crypto: qat - Use helper to set reqsize (git-fixes).
- dlm: fix missing lkb refcount handling (git-fixes).
- dlm: fix plock invalid read (git-fixes).
- Documentation: cpufreq: amd-pstate: Move amd_pstate param to alphabetical order (bsc#1212445).
- Documentation: devices.txt: reconcile serial/ucc_uart minor numers (git-fixes).
- drm/amd/display: Add monitor specific edid quirk (git-fixes).
- drm/amd/display: Add polling method to handle MST reply packet (bsc#1213578).
- drm/amd/display: check TG is non-null before checking if enabled (git-fixes).
- drm/amd/display: Correct `DMUB_FW_VERSION` macro (git-fixes).
- drm/amd/display: Disable MPC split by default on special asic (git-fixes).
- drm/amd/display: fix access hdcp_workqueue assert (git-fixes).
- drm/amd/display: fix seamless odm transitions (git-fixes).
- drm/amd/display: Keep PHY active for DP displays on DCN31 (git-fixes).
- drm/amd/display: only accept async flips for fast updates (git-fixes).
- drm/amd/display: Only update link settings after successful MST link train (git-fixes).
- drm/amd/display: phase3 mst hdcp for multiple displays (git-fixes).
- drm/amd/display: Remove Phantom Pipe Check When Calculating K1 and K2 (git-fixes).
- drm/amd/display: save restore hdcp state when display is unplugged from mst hub (git-fixes).
- drm/amd/display: Unlock on error path in dm_handle_mst_sideband_msg_ready_event() (git-fixes).
- drm/amd: Fix an error handling mistake in psp_sw_init() (git-fixes).
- drm/amdgpu: add the fan abnormal detection feature (git-fixes).
- drm/amdgpu: avoid restore process run into dead loop (git-fixes).
- drm/amdgpu: fix clearing mappings for BOs that are always valid in VM (git-fixes).
- drm/amdgpu: Fix minmax warning (git-fixes).
- drm/amd/pm: add abnormal fan detection for smu 13.0.0 (git-fixes).
- drm/amd/pm: conditionally disable pcie lane/speed switching for SMU13 (git-fixes).
- drm/amd/pm: re-enable the gfx imu when smu resume (git-fixes).
- drm/amd/pm: share the code around SMU13 pcie parameters update (git-fixes).
- drm/atomic: Allow vblank-enabled + self-refresh 'disable' (git-fixes).
- drm/atomic: Fix potential use-after-free in nonblocking commits (git-fixes).
- drm/bridge: tc358768: Add atomic_get_input_bus_fmts() implementation (git-fixes).
- drm/bridge: tc358768: fix TCLK_TRAILCNT computation (git-fixes).
- drm/bridge: tc358768: fix THS_TRAILCNT computation (git-fixes).
- drm/bridge: tc358768: fix THS_ZEROCNT computation (git-fixes).
- drm/bridge: ti-sn65dsi86: Fix auxiliary bus lifetime (git-fixes).
- drm/client: Fix memory leak in drm_client_modeset_probe (git-fixes).
- drm/dp_mst: Clear MSG_RDY flag before sending new message (bsc#1213578).
- drm: Fix null pointer dereference in drm_dp_atomic_find_time_slots() (bsc#1213578).
- drm/i915: Do not preserve dpll_hw_state for slave crtc in Bigjoiner (git-fixes).
- drm/i915/dpt: Use shmem for dpt objects (git-fixes).
- drm/i915: Fix an error handling path in igt_write_huge() (git-fixes).
- drm/i915/tc: Fix system resume MST mode restore for DP-alt sinks (git-fixes).
- drm/msm/adreno: Fix snapshot BINDLESS_DATA size (git-fixes).
- drm/msm/disp/dpu: get timing engine status from intf status register (git-fixes).
- drm/msm/dpu: drop enum dpu_core_perf_data_bus_id (git-fixes).
- drm/msm/dpu: Set DPU_DATA_HCTL_EN for in INTF_SC7180_MASK (git-fixes).
- drm/msm: Fix IS_ERR_OR_NULL() vs NULL check in a5xx_submit_in_rb() (git-fixes).
- drm/radeon: Fix integer overflow in radeon_cs_parser_init (git-fixes).
- drm/ttm: fix bulk_move corruption when adding a entry (git-fixes).
- drm/ttm: fix warning that we shouldn't mix &amp;&amp; and || (git-fixes).
- drm/vmwgfx: Fix Legacy Display Unit atomic drm support (bsc#1213632).
- drm/vmwgfx: Remove explicit and broken vblank handling (bsc#1213632).
- drm/vmwgfx: Remove rcu locks from user resources (bsc#1213632).
- fbdev: au1200fb: Fix missing IRQ check in au1200fb_drv_probe (git-fixes).
- fbdev: imxfb: Removed unneeded release_mem_region (git-fixes).
- fbdev: imxfb: warn about invalid left/right margin (git-fixes).
- file: always lock position for FMODE_ATOMIC_POS (bsc#1213759).
- fs: dlm: add midcomms init/start functions (git-fixes).
- fs: dlm: do not set stop rx flag after node reset (git-fixes).
- fs: dlm: filter user dlm messages for kernel locks (git-fixes).
- fs: dlm: fix log of lowcomms vs midcomms (git-fixes).
- fs: dlm: fix race between test_bit() and queue_work() (git-fixes).
- fs: dlm: fix race in lowcomms (git-fixes).
- fs: dlm: handle -EBUSY first in lock arg validation (git-fixes).
- fs: dlm: move sending fin message into state change handling (git-fixes).
- fs: dlm: retry accept() until -EAGAIN or error returns (git-fixes).
- fs: dlm: return positive pid value for F_GETLK (git-fixes).
- fs: dlm: start midcomms before scand (git-fixes).
- fs: hfsplus: remove WARN_ON() from hfsplus_cat_{read,write}_inode() (git-fixes).
- FS: JFS: Check for read-only mounted filesystem in txBegin (git-fixes).
- FS: JFS: Fix null-ptr-deref Read in txBegin (git-fixes).
- fs: jfs: Fix UBSAN: array-index-out-of-bounds in dbAllocDmapLev (git-fixes).
- gve: Set default duplex configuration to full (git-fixes).
- gve: unify driver name usage (git-fixes).
- hwmon: (adm1275) Allow setting sample averaging (git-fixes).
- hwmon: (k10temp) Enable AMD3255 Proc to show negative temperature (git-fixes).
- hwmon: (nct7802) Fix for temp6 (PECI1) processed even if PECI1 disabled (git-fixes).
- hwmon: (pmbus/adm1275) Fix problems with temperature monitoring on ADM1272 (git-fixes).
- i2c: xiic: Defer xiic_wakeup() and __xiic_start_xfer() in xiic_process() (git-fixes).
- i2c: xiic: Do not try to handle more interrupt events after error (git-fixes).
- iavf: check for removal state before IAVF_FLAG_PF_COMMS_FAILED (git-fixes).
- iavf: fix a deadlock caused by rtnl and driver's lock circular dependencies (git-fixes).
- iavf: Fix out-of-bounds when setting channels on remove (git-fixes).
- iavf: fix potential deadlock on allocation failure (git-fixes).
- iavf: fix reset task race with iavf_remove() (git-fixes).
- iavf: Fix use-after-free in free_netdev (git-fixes).
- iavf: Move netdev_update_features() into watchdog task (git-fixes).
- iavf: use internal state to free traffic IRQs (git-fixes).
- iavf: Wait for reset in callbacks which trigger it (git-fixes).
- IB/hfi1: Use bitmap_zalloc() when applicable (git-fixes)
- ice: Fix max_rate check while configuring TX rate limits (git-fixes).
- ice: Fix memory management in ice_ethtool_fdir.c (git-fixes).
- ice: handle extts in the miscellaneous interrupt thread (git-fixes).
- igc: Check if hardware TX timestamping is enabled earlier (git-fixes).
- igc: Enable and fix RX hash usage by netstack (git-fixes).
- igc: Fix inserting of empty frame for launchtime (git-fixes).
- igc: Fix Kernel Panic during ndo_tx_timeout callback (git-fixes).
- igc: Fix launchtime before start of cycle (git-fixes).
- igc: Fix race condition in PTP tx code (git-fixes).
- igc: Handle PPS start time programming for past time values (git-fixes).
- igc: Prevent garbled TX queue with XDP ZEROCOPY (git-fixes).
- igc: Remove delay during TX ring configuration (git-fixes).
- igc: set TP bit in 'supported' and 'advertising' fields of ethtool_link_ksettings (git-fixes).
- igc: Work around HW bug causing missing timestamps (git-fixes).
- Input: i8042 - add Clevo PCX0DX to i8042 quirk table (git-fixes).
- Input: iqs269a - do not poll during ATI (git-fixes).
- Input: iqs269a - do not poll during suspend or resume (git-fixes).
- jffs2: fix memory leak in jffs2_do_fill_super (git-fixes).
- jffs2: fix memory leak in jffs2_do_mount_fs (git-fixes).
- jffs2: fix memory leak in jffs2_scan_medium (git-fixes).
- jffs2: fix use-after-free in jffs2_clear_xattr_subsystem (git-fixes).
- jffs2: GC deadlock reading a page that is used in jffs2_write_begin() (git-fixes).
- jffs2: reduce stack usage in jffs2_build_xattr_subsystem() (git-fixes).
- jfs: jfs_dmap: Validate db_l2nbperpage while mounting (git-fixes).
- kABI fix after Restore kABI for NVidia vGPU driver (bsc#1210825).
- kabi/severities: relax kABI for ath11k local symbols (bsc#1207948)
- kselftest: vDSO: Fix accumulation of uninitialized ret when CLOCK_REALTIME is undefined (git-fixes).
- KVM: arm64: Do not read a HW interrupt pending state in user context (git-fixes)
- KVM: arm64: Warn if accessing timer pending state outside of vcpu (bsc#1213620)
- KVM: Do not null dereference ops-&gt;destroy (git-fixes)
- KVM: downgrade two BUG_ONs to WARN_ON_ONCE (git-fixes)
- KVM: Initialize debugfs_dentry when a VM is created to avoid NULL (git-fixes)
- KVM: s390: pv: fix index value of replaced ASCE (git-fixes bsc#1213867).
- KVM: VMX: Inject #GP, not #UD, if SGX2 ENCLS leafs are unsupported (git-fixes).
- KVM: VMX: Inject #GP on ENCLS if vCPU has paging disabled (CR0.PG==0) (git-fixes).
- KVM: VMX: restore vmx_vmexit alignment (git-fixes).
- KVM: x86: Account fastpath-only VM-Exits in vCPU stats (git-fixes).
- leds: trigger: netdev: Recheck NETDEV_LED_MODE_LINKUP on dev rename (git-fixes).
- libceph: harden msgr2.1 frame segment length checks (bsc#1213857).
- MAINTAINERS: Add AMD P-State driver maintainer entry (bsc#1212445).
- m ALSA: usb-audio: Add quirk for Tascam Model 12 (git-fixes).
- md: add error_handlers for raid0 and linear (bsc#1212766).
- media: staging: atomisp: select V4L2_FWNODE (git-fixes).
- mhi_power_down() kABI workaround (bsc#1207948).
- mmc: core: disable TRIM on Kingston EMMC04G-M627 (git-fixes).
- mmc: sdhci: fix DMA configure compatibility issue when 64bit DMA mode is used (git-fixes).
- net: ena: fix shift-out-of-bounds in exponential backoff (git-fixes).
- net: mana: Batch ringing RX queue doorbell on receiving packets (bsc#1212901).
- net: mana: Use the correct WQE count for ringing RQ doorbell (bsc#1212901).
- net/mlx5: DR, Support SW created encap actions for FW table (git-fixes).
- net/mlx5e: Check for NOT_READY flag state after locking (git-fixes).
- net/mlx5e: fix double free in mlx5e_destroy_flow_table (git-fixes).
- net/mlx5e: fix memory leak in mlx5e_fs_tt_redirect_any_create (git-fixes).
- net/mlx5e: fix memory leak in mlx5e_ptp_open (git-fixes).
- net/mlx5e: XDP, Allow growing tail for XDP multi buffer (git-fixes).
- net/mlx5e: xsk: Set napi_id to support busy polling on XSK RQ (git-fixes).
- net: phy: marvell10g: fix 88x3310 power up (git-fixes).
- net/sched: sch_qfq: refactor parsing of netlink parameters (bsc#1213585).
- net/sched: sch_qfq: reintroduce lmax bound check for MTU (bsc#1213585).
- nfsd: add encoding of op_recall flag for write delegation (git-fixes).
- nfsd: fix double fget() bug in __write_ports_addfd() (git-fixes).
- nfsd: Fix sparse warning (git-fixes).
- nfsd: Remove open coding of string copy (git-fixes).
- nfsv4.1: Always send a RECLAIM_COMPLETE after establishing lease (git-fixes).
- nfsv4.1: freeze the session table upon receiving NFS4ERR_BADSESSION (git-fixes).
- nvme: do not reject probe due to duplicate IDs for single-ported PCIe devices (git-fixes).
- nvme: fix the NVME_ID_NS_NVM_STS_MASK definition (git-fixes).
- nvme-pci: fix DMA direction of unmapping integrity data (git-fixes).
- nvme-pci: remove nvme_queue from nvme_iod (git-fixes).
- octeontx2-af: Move validation of ptp pointer before its usage (git-fixes).
- octeontx2-pf: Add additional check for MCAM rules (git-fixes).
- octeontx-af: fix hardware timestamp configuration (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 88SE9235 (git-fixes).
- PCI/PM: Avoid putting EloPOS E2/S2/H2 PCIe Ports in D3cold (git-fixes).
- phy: hisilicon: Fix an out of bounds check in hisi_inno_phy_probe() (git-fixes).
- pinctrl: amd: Detect internal GPIO0 debounce handling (git-fixes).
- pinctrl: amd: Do not show `Invalid config param` errors (git-fixes).
- pinctrl: amd: Fix mistake in handling clearing pins at startup (git-fixes).
- pinctrl: amd: Only use special debounce behavior for GPIO 0 (git-fixes).
- pinctrl: amd: Use amd_pinconf_set() for all config options (git-fixes).
- platform/x86: msi-laptop: Fix rfkill out-of-sync on MSI Wind U100 (git-fixes).
- RDMA/bnxt_re: Fix hang during driver unload (git-fixes)
- RDMA/bnxt_re: Prevent handling any completions after qp destroy (git-fixes)
- RDMA/core: Update CMA destination address on rdma_resolve_addr (git-fixes)
- RDMA/irdma: Add missing read barriers (git-fixes)
- RDMA/irdma: Fix data race on CQP completion stats (git-fixes)
- RDMA/irdma: Fix data race on CQP request done (git-fixes)
- RDMA/irdma: Fix op_type reporting in CQEs (git-fixes)
- RDMA/irdma: Report correct WC error (git-fixes)
- RDMA/mlx4: Make check for invalid flags stricter (git-fixes)
- RDMA/mthca: Fix crash when polling CQ for shared QPs (git-fixes)
- regmap: Account for register length in SMBus I/O limits (git-fixes).
- regmap: Drop initial version of maximum transfer length fixes (git-fixes).
- Restore kABI for NVidia vGPU driver (bsc#1210825).
- Revert 'ALSA: usb-audio: Drop superfluous interface setup at parsing' (git-fixes).
- Revert 'debugfs, coccinelle: check for obsolete DEFINE_SIMPLE_ATTRIBUTE() usage' (git-fixes).
- Revert 'Drop AMDGPU patches for fixing regression (bsc#1213304,bsc#1213777)' 
- Revert 'iavf: Detach device during reset task' (git-fixes).
- Revert 'iavf: Do not restart Tx queues after reset task failure' (git-fixes).
- Revert 'NFSv4: Retry LOCK on OLD_STATEID during delegation return' (git-fixes).
- Revert 'usb: dwc3: core: Enable AutoRetry feature in the controller' (git-fixes).
- Revert 'usb: gadget: tegra-xudc: Fix error check in tegra_xudc_powerdomain_init()' (git-fixes).
- Revert 'usb: xhci: tegra: Fix error check' (git-fixes).
- Revert 'xhci: add quirk for host controllers that do not update endpoint DCS' (git-fixes).
- Revive drm_dp_mst_hpd_irq() function (bsc#1213578).
- rxrpc, afs: Fix selection of abort codes (git-fixes).
- s390/bpf: Add expoline to tail calls (git-fixes bsc#1213870).
- s390/dasd: fix hanging device after quiesce/resume (git-fixes bsc#1213810).
- s390/dasd: print copy pair message only for the correct error (git-fixes bsc#1213872).
- s390/decompressor: specify __decompress() buf len to avoid overflow (git-fixes bsc#1213863).
- s390: introduce nospec_uses_trampoline() (git-fixes bsc#1213870).
- s390/ipl: add missing intersection check to ipl_report handling (git-fixes bsc#1213871).
- s390/qeth: Fix vipa deletion (git-fixes bsc#1213713).
- s390/vmem: fix empty page tables cleanup under KASAN (git-fixes bsc#1213715).
- scftorture: Count reschedule IPIs (git-fixes).
- scsi: lpfc: Abort outstanding ELS cmds when mailbox timeout error is detected (bsc#1213756).
- scsi: lpfc: Avoid -Wstringop-overflow warning (bsc#1213756).
- scsi: lpfc: Clean up SLI-4 sysfs resource reporting (bsc#1213756).
- scsi: lpfc: Copyright updates for 14.2.0.14 patches (bsc#1213756).
- scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() (bsc#1213756).
- scsi: lpfc: Fix incorrect big endian type assignment in bsg loopback path (bsc#1213756).
- scsi: lpfc: Fix incorrect big endian type assignments in FDMI and VMID paths (bsc#1213756).
- scsi: lpfc: Fix lpfc_name struct packing (bsc#1213756).
- scsi: lpfc: Make fabric zone discovery more robust when handling unsolicited LOGO (bsc#1213756).
- scsi: lpfc: Pull out fw diagnostic dump log message from driver's trace buffer (bsc#1213756).
- scsi: lpfc: Qualify ndlp discovery state when processing RSCN (bsc#1213756).
- scsi: lpfc: Refactor cpu affinity assignment paths (bsc#1213756).
- scsi: lpfc: Remove extra ndlp kref decrement in FLOGI cmpl for loop topology (bsc#1213756).
- scsi: lpfc: Replace all non-returning strlcpy() with strscpy() (bsc#1213756).
- scsi: lpfc: Replace one-element array with flexible-array member (bsc#1213756).
- scsi: lpfc: Revise ndlp kref handling for dev_loss_tmo_callbk and lpfc_drop_node (bsc#1213756).
- scsi: lpfc: Set Establish Image Pair service parameter only for Target Functions (bsc#1213756).
- scsi: lpfc: Simplify fcp_abort transport callback log message (bsc#1213756).
- scsi: lpfc: Update lpfc version to 14.2.0.14 (bsc#1213756).
- scsi: lpfc: Use struct_size() helper (bsc#1213756).
- scsi: qla2xxx: Adjust IOCB resource on qpair create (bsc#1213747).
- scsi: qla2xxx: Array index may go out of bound (bsc#1213747).
- scsi: qla2xxx: Avoid fcport pointer dereference (bsc#1213747).
- scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport() (bsc#1213747).
- scsi: qla2xxx: Correct the index of array (bsc#1213747).
- scsi: qla2xxx: Drop useless LIST_HEAD (bsc#1213747).
- scsi: qla2xxx: Fix buffer overrun (bsc#1213747).
- scsi: qla2xxx: Fix command flush during TMF (bsc#1213747).
- scsi: qla2xxx: Fix deletion race condition (bsc#1213747).
- scsi: qla2xxx: Fix end of loop test (bsc#1213747).
- scsi: qla2xxx: Fix erroneous link up failure (bsc#1213747).
- scsi: qla2xxx: Fix error code in qla2x00_start_sp() (bsc#1213747).
- scsi: qla2xxx: fix inconsistent TMF timeout (bsc#1213747).
- scsi: qla2xxx: Fix NULL pointer dereference in target mode (bsc#1213747).
- scsi: qla2xxx: Fix potential NULL pointer dereference (bsc#1213747).
- scsi: qla2xxx: Fix session hang in gnl (bsc#1213747).
- scsi: qla2xxx: Fix TMF leak through (bsc#1213747).
- scsi: qla2xxx: Limit TMF to 8 per function (bsc#1213747).
- scsi: qla2xxx: Pointer may be dereferenced (bsc#1213747).
- scsi: qla2xxx: Remove unused nvme_ls_waitq wait queue (bsc#1213747).
- scsi: qla2xxx: Replace one-element array with DECLARE_FLEX_ARRAY() helper (bsc#1213747).
- scsi: qla2xxx: Silence a static checker warning (bsc#1213747).
- scsi: qla2xxx: Turn off noisy message log (bsc#1213747).
- scsi: qla2xxx: Update version to 10.02.08.400-k (bsc#1213747).
- scsi: qla2xxx: Update version to 10.02.08.500-k (bsc#1213747).
- scsi: qla2xxx: Use vmalloc_array() and vcalloc() (bsc#1213747).
- selftests: rtnetlink: remove netdevsim device after ipsec offload test (git-fixes).
- serial: qcom-geni: drop bogus runtime pm state update (git-fixes).
- serial: sifive: Fix sifive_serial_console_setup() section (git-fixes).
- series: udpate metadata Refresh
- sfc: fix crash when reading stats while NIC is resetting (git-fixes).
- sfc: fix XDP queues mode with legacy IRQ (git-fixes).
- sfc: use budget for TX completions (git-fixes).
- soundwire: qcom: update status correctly with mask (git-fixes).
- staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() (git-fixes).
- staging: r8712: Fix memory leak in _r8712_init_xmit_priv() (git-fixes).
- SUNRPC: always free ctxt when freeing deferred request (git-fixes).
- SUNRPC: double free xprt_ctxt while still in use (git-fixes).
- SUNRPC: Fix trace_svc_register() call site (git-fixes).
- SUNRPC: Fix UAF in svc_tcp_listen_data_ready() (git-fixes).
- SUNRPC: Remove dead code in svc_tcp_release_rqst() (git-fixes).
- SUNRPC: remove the maximum number of retries in call_bind_status (git-fixes).
- svcrdma: Prevent page release when nothing was received (git-fixes).
- tpm_tis: Explicitly check for error code (git-fixes).
- tty: n_gsm: fix UAF in gsm_cleanup_mux (git-fixes).
- tty: serial: fsl_lpuart: add earlycon for imx8ulp platform (git-fixes).
- ubifs: Add missing iput if do_tmpfile() failed in rename whiteout (git-fixes).
- ubifs: do_rename: Fix wrong space budget when target inode's nlink &gt; 1 (git-fixes).
- ubifs: Error path in ubifs_remount_rw() seems to wrongly free write buffers (git-fixes).
- ubifs: Fix AA deadlock when setting xattr for encrypted file (git-fixes).
- ubifs: Fix build errors as symbol undefined (git-fixes).
- ubifs: Fix deadlock in concurrent rename whiteout and inode writeback (git-fixes).
- ubifs: Fix memory leak in alloc_wbufs() (git-fixes).
- ubifs: Fix memory leak in do_rename (git-fixes).
- ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock() (git-fixes).
- ubifs: Fix to add refcount once page is set private (git-fixes).
- ubifs: Fix 'ui-&gt;dirty' race between do_tmpfile() and writeback work (git-fixes).
- ubifs: Fix wrong dirty space budget for dirty inode (git-fixes).
- ubifs: Free memory for tmpfile name (git-fixes).
- ubifs: Rectify space amount budget for mkdir/tmpfile operations (git-fixes).
- ubifs: Rectify space budget for ubifs_symlink() if symlink is encrypted (git-fixes).
- ubifs: Rectify space budget for ubifs_xrename() (git-fixes).
- ubifs: Rename whiteout atomically (git-fixes).
- ubifs: rename_whiteout: correct old_dir size computing (git-fixes).
- ubifs: rename_whiteout: Fix double free for whiteout_ui-&gt;data (git-fixes).
- ubifs: Reserve one leb for each journal head while doing budget (git-fixes).
- ubifs: Re-statistic cleaned znode count if commit failed (git-fixes).
- ubifs: setflags: Make dirtied_ino_d 8 bytes aligned (git-fixes).
- ubifs: ubifs_writepage: Mark page dirty after writing inode failed (git-fixes).
- Update config files: enable CONFIG_X86_AMD_PSTATE (bsc#1212445)
- usb: dwc2: platform: Improve error reporting for problems during .remove() (git-fixes).
- usb: dwc3: do not reset device side if dwc3 was configured as host-only (git-fixes).
- usb: dwc3: pci: skip BYT GPIO lookup table for hardwired phy (git-fixes).
- usb: gadget: core: remove unbalanced mutex_unlock in usb_gadget_activate (git-fixes).
- USB: serial: option: add LARA-R6 01B PIDs (git-fixes).
- usb: typec: Iterate pds array when showing the pd list (git-fixes).
- usb: typec: Set port-&gt;pd before adding device for typec_port (git-fixes).
- usb: typec: Use sysfs_emit_at when concatenating the string (git-fixes).
- usb: xhci-mtk: set the dma max_seg_size (git-fixes).
- vhost_net: revert upend_idx only on retriable error (git-fixes).
- vhost: support PACKED when setting-getting vring_base (git-fixes).
- virtio_net: Fix error unwinding of XDP initialization (git-fixes).
- virtio-net: Maintain reverse cleanup order (git-fixes).
- wifi: ath11k: add support for suspend in power down state (bsc#1207948).
- wifi: ath11k: handle irq enable/disable in several code path (bsc#1207948).
- wifi: ath11k: handle thermal device registeration together with MAC (bsc#1207948).
- wifi: ath11k: remove MHI LOOPBACK channels (bsc#1207948).
- wifi: ray_cs: Drop useless status variable in parse_addr() (git-fixes).
- wifi: ray_cs: Utilize strnlen() in parse_addr() (git-fixes).
- wl3501_cs: use eth_hw_addr_set() (git-fixes).
- x86/PVH: obtain VGA console info in Dom0 (git-fixes).
- xen/blkfront: Only check REQ_FUA for writes (git-fixes).
- xen/pvcalls-back: fix double frees with pvcalls_new_active_socket() (git-fixes).
- xfs: AIL needs asynchronous CIL forcing (bsc#1211811).
- xfs: async CIL flushes need pending pushes to be made stable (bsc#1211811).
- xfs: attach iclog callbacks in xlog_cil_set_ctx_write_state() (bsc#1211811).
- xfs: CIL work is serialised, not pipelined (bsc#1211811).
- xfs: do not run shutdown callbacks on active iclogs (bsc#1211811).
- xfs: drop async cache flushes from CIL commits (bsc#1211811).
- xfs: factor out log write ordering from xlog_cil_push_work() (bsc#1211811).
- xfs: move the CIL workqueue to the CIL (bsc#1211811).
- xfs: move xlog_commit_record to xfs_log_cil.c (bsc#1211811).
- xfs: order CIL checkpoint start records (bsc#1211811).
- xfs: pass a CIL context to xlog_write() (bsc#1211811).
- xfs: rework xlog_state_do_callback() (bsc#1211811).
- xfs: run callbacks before waking waiters in xlog_state_shutdown_callbacks (bsc#1211811).
- xfs: separate out log shutdown callback processing (bsc#1211811).
- xfs: wait iclog complete before tearing down AIL (bsc#1211811).
- xfs: XLOG_STATE_IOERROR must die (bsc#1211811).
- xhci: Fix resume issue of some ZHAOXIN hosts (git-fixes).
- xhci: Fix TRB prefetch issue of ZHAOXIN hosts (git-fixes).
- xhci: Show ZHAOXIN xHCI root hub speed correctly (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-14"/>
	<updated date="2023-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206418">SUSE bug 1206418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207129">SUSE bug 1207129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207948">SUSE bug 1207948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210627">SUSE bug 1210627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210780">SUSE bug 1210780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210825">SUSE bug 1210825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211131">SUSE bug 1211131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211738">SUSE bug 1211738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211811">SUSE bug 1211811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212445">SUSE bug 1212445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212502">SUSE bug 1212502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212604">SUSE bug 1212604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212766">SUSE bug 1212766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212901">SUSE bug 1212901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213167">SUSE bug 1213167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213272">SUSE bug 1213272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213287">SUSE bug 1213287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213304">SUSE bug 1213304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213417">SUSE bug 1213417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213578">SUSE bug 1213578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213585">SUSE bug 1213585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213586">SUSE bug 1213586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213588">SUSE bug 1213588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213601">SUSE bug 1213601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213620">SUSE bug 1213620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213632">SUSE bug 1213632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213653">SUSE bug 1213653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213713">SUSE bug 1213713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213715">SUSE bug 1213715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213747">SUSE bug 1213747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213756">SUSE bug 1213756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213759">SUSE bug 1213759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213777">SUSE bug 1213777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213810">SUSE bug 1213810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213812">SUSE bug 1213812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213856">SUSE bug 1213856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213857">SUSE bug 1213857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213863">SUSE bug 1213863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213867">SUSE bug 1213867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213870">SUSE bug 1213870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213871">SUSE bug 1213871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213872">SUSE bug 1213872</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0459/">CVE-2023-0459 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0459">CVE-2023-0459 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-21400/">CVE-2023-21400 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21400">CVE-2023-21400 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2156/">CVE-2023-2156 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2156">CVE-2023-2156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2166/">CVE-2023-2166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2166">CVE-2023-2166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31083/">CVE-2023-31083 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31083">CVE-2023-31083 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3268/">CVE-2023-3268 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3268">CVE-2023-3268 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3567/">CVE-2023-3567 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3567">CVE-2023-3567 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3609/">CVE-2023-3609 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3609">CVE-2023-3609 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3611/">CVE-2023-3611 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3611">CVE-2023-3611 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3776/">CVE-2023-3776 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3776">CVE-2023-3776 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38409/">CVE-2023-38409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38409">CVE-2023-38409 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3863/">CVE-2023-3863 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3863">CVE-2023-3863 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4004/">CVE-2023-4004 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4004">CVE-2023-4004 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009778188" comment="cluster-md-kmp-64kb-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778189" comment="cluster-md-kmp-default-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778190" comment="dlm-kmp-64kb-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778191" comment="dlm-kmp-default-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778192" comment="dtb-allwinner-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778193" comment="dtb-altera-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778194" comment="dtb-amazon-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778195" comment="dtb-amd-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778196" comment="dtb-amlogic-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778197" comment="dtb-apm-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778198" comment="dtb-apple-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778199" comment="dtb-arm-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778200" comment="dtb-broadcom-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778201" comment="dtb-cavium-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778202" comment="dtb-exynos-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778203" comment="dtb-freescale-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778204" comment="dtb-hisilicon-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778205" comment="dtb-lg-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778206" comment="dtb-marvell-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778207" comment="dtb-mediatek-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778208" comment="dtb-nvidia-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778209" comment="dtb-qcom-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778210" comment="dtb-renesas-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778211" comment="dtb-rockchip-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778212" comment="dtb-socionext-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778213" comment="dtb-sprd-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778214" comment="dtb-xilinx-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778215" comment="gfs2-kmp-64kb-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778216" comment="gfs2-kmp-default-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778217" comment="kernel-64kb-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778218" comment="kernel-64kb-devel-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778219" comment="kernel-64kb-extra-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778220" comment="kernel-64kb-livepatch-devel-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778221" comment="kernel-64kb-optional-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778222" comment="kernel-debug-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778223" comment="kernel-debug-devel-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778224" comment="kernel-debug-livepatch-devel-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778225" comment="kernel-debug-vdso-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778226" comment="kernel-default-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778227" comment="kernel-default-base-5.14.21-150500.55.19.1.150500.6.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778228" comment="kernel-default-base-rebuild-5.14.21-150500.55.19.1.150500.6.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778229" comment="kernel-default-devel-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778230" comment="kernel-default-extra-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778231" comment="kernel-default-livepatch-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778232" comment="kernel-default-livepatch-devel-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778233" comment="kernel-default-optional-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778234" comment="kernel-default-vdso-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778235" comment="kernel-devel-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778236" comment="kernel-docs-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778237" comment="kernel-docs-html-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778238" comment="kernel-kvmsmall-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778239" comment="kernel-kvmsmall-devel-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778240" comment="kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778241" comment="kernel-kvmsmall-vdso-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778242" comment="kernel-macros-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778243" comment="kernel-obs-build-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778244" comment="kernel-obs-qa-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778245" comment="kernel-source-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778246" comment="kernel-source-vanilla-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778247" comment="kernel-syms-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778248" comment="kernel-zfcpdump-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778249" comment="kselftests-kmp-64kb-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778250" comment="kselftests-kmp-default-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778251" comment="ocfs2-kmp-64kb-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778252" comment="ocfs2-kmp-default-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778253" comment="reiserfs-kmp-64kb-5.14.21-150500.55.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778254" comment="reiserfs-kmp-default-5.14.21-150500.55.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4306" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214054" ref_url="https://bugzilla.suse.com/1214054" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-36054" ref_url="https://www.suse.com/security/cve/CVE-2023-36054/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3325-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031023.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following issues:

- CVE-2023-36054: Fixed a DoS that could be triggered by an authenticated remote user. (bsc#1214054)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-16"/>
	<updated date="2023-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214054">SUSE bug 1214054</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-36054/">CVE-2023-36054 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36054">CVE-2023-36054 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009777759" comment="krb5-1.20.1-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777760" comment="krb5-32bit-1.20.1-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777761" comment="krb5-client-1.20.1-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777762" comment="krb5-devel-1.20.1-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777763" comment="krb5-devel-32bit-1.20.1-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777764" comment="krb5-plugin-kdb-ldap-1.20.1-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777765" comment="krb5-plugin-preauth-otp-1.20.1-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777766" comment="krb5-plugin-preauth-pkinit-1.20.1-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777767" comment="krb5-plugin-preauth-spake-1.20.1-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777768" comment="krb5-server-1.20.1-150500.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4307" version="1" class="patch">
	<metadata>
		<title>Security update for pcre2 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213514" ref_url="https://bugzilla.suse.com/1213514" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41409" ref_url="https://www.suse.com/security/cve/CVE-2022-41409/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3327-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031021.html" source="SUSE-SU"/>
		<description>
This update for pcre2 fixes the following issues:

  - CVE-2022-41409: Fixed integer overflow vulnerability in pcre2test that allows attackers to cause a denial of service via negative input (bsc#1213514).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-16"/>
	<updated date="2023-08-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213514">SUSE bug 1213514</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41409/">CVE-2022-41409 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41409">CVE-2022-41409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009773717" comment="libpcre2-16-0-10.39-150400.4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773718" comment="libpcre2-16-0-32bit-10.39-150400.4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773719" comment="libpcre2-32-0-10.39-150400.4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773720" comment="libpcre2-32-0-32bit-10.39-150400.4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773721" comment="libpcre2-8-0-10.39-150400.4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773722" comment="libpcre2-8-0-32bit-10.39-150400.4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773723" comment="libpcre2-posix2-10.39-150400.4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773724" comment="libpcre2-posix2-32bit-10.39-150400.4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773725" comment="pcre2-devel-10.39-150400.4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773726" comment="pcre2-devel-static-10.39-150400.4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773727" comment="pcre2-doc-10.39-150400.4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009773728" comment="pcre2-tools-10.39-150400.4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4308" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openj9 (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213481" ref_url="https://bugzilla.suse.com/1213481" source="BUGZILLA"/>
		<reference ref_id="1213482" ref_url="https://bugzilla.suse.com/1213482" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-22045" ref_url="https://www.suse.com/security/cve/CVE-2023-22045/" source="CVE"/>
		<reference ref_id="CVE-2023-22049" ref_url="https://www.suse.com/security/cve/CVE-2023-22049/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015912.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openj9 fixes the following issues:

  OpenJDK was updated to version 8u382 build 05 with OpenJ9 0.40.0 VM:

  - CVE-2023-22045: Fixed vulnerability in hotspot component (bsc#1213481).
  - CVE-2023-22049: Fixed vulnerability in library component (bsc#1213482).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-16"/>
	<updated date="2023-08-16"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1213481">SUSE bug 1213481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213482">SUSE bug 1213482</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22045/">CVE-2023-22045 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22045">CVE-2023-22045 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22049/">CVE-2023-22049 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22049">CVE-2023-22049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009778941" comment="java-1_8_0-openj9-1.8.0.382-150200.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778942" comment="java-1_8_0-openj9-accessibility-1.8.0.382-150200.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778943" comment="java-1_8_0-openj9-demo-1.8.0.382-150200.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778944" comment="java-1_8_0-openj9-devel-1.8.0.382-150200.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778945" comment="java-1_8_0-openj9-headless-1.8.0.382-150200.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778946" comment="java-1_8_0-openj9-javadoc-1.8.0.382-150200.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778947" comment="java-1_8_0-openj9-src-1.8.0.382-150200.3.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4309" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_0_0 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213853" ref_url="https://bugzilla.suse.com/1213853" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3817" ref_url="https://www.suse.com/security/cve/CVE-2023-3817/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3338-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031059.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_0_0 fixes the following issues:

- CVE-2023-3817: Fixed a potential DoS due to excessive time spent checking DH q parameter value. (bsc#1213853)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-17"/>
	<updated date="2023-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213853">SUSE bug 1213853</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3817/">CVE-2023-3817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3817">CVE-2023-3817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009777610" comment="libopenssl-1_0_0-devel-1.0.2p-150000.3.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777611" comment="libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777612" comment="libopenssl10-1.0.2p-150000.3.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777613" comment="libopenssl1_0_0-1.0.2p-150000.3.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777614" comment="libopenssl1_0_0-32bit-1.0.2p-150000.3.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777615" comment="libopenssl1_0_0-hmac-1.0.2p-150000.3.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777616" comment="libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777617" comment="libopenssl1_0_0-steam-1.0.2p-150000.3.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777618" comment="libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777619" comment="openssl-1_0_0-1.0.2p-150000.3.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777620" comment="openssl-1_0_0-cavs-1.0.2p-150000.3.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777621" comment="openssl-1_0_0-doc-1.0.2p-150000.3.85.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4310" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql15 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214059" ref_url="https://bugzilla.suse.com/1214059" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39417" ref_url="https://www.suse.com/security/cve/CVE-2023-39417/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031069.html" source="SUSE-SU"/>
		<description>
This update for postgresql15 fixes the following issues:

- Update to 13.12
- CVE-2023-39417: Fixed potential SQL injection for trusted extensions. (bsc#1214059)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-17"/>
	<updated date="2023-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214059">SUSE bug 1214059</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39417/">CVE-2023-39417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39417">CVE-2023-39417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009778993" comment="postgresql13-13.12-150200.5.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778994" comment="postgresql13-contrib-13.12-150200.5.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778995" comment="postgresql13-devel-13.12-150200.5.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778996" comment="postgresql13-docs-13.12-150200.5.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778997" comment="postgresql13-llvmjit-13.12-150200.5.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778998" comment="postgresql13-llvmjit-devel-13.12-150200.5.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778999" comment="postgresql13-plperl-13.12-150200.5.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779000" comment="postgresql13-plpython-13.12-150200.5.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779001" comment="postgresql13-pltcl-13.12-150200.5.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779002" comment="postgresql13-server-13.12-150200.5.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779003" comment="postgresql13-server-devel-13.12-150200.5.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779004" comment="postgresql13-test-13.12-150200.5.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4311" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql15 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214059" ref_url="https://bugzilla.suse.com/1214059" source="BUGZILLA"/>
		<reference ref_id="1214061" ref_url="https://bugzilla.suse.com/1214061" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39417" ref_url="https://www.suse.com/security/cve/CVE-2023-39417/" source="CVE"/>
		<reference ref_id="CVE-2023-39418" ref_url="https://www.suse.com/security/cve/CVE-2023-39418/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031066.html" source="SUSE-SU"/>
		<description>
This update for postgresql15 fixes the following issues:

- Update to 15.4
- CVE-2023-39417: Fixed potential SQL injection for trusted extensions. (bsc#1214059)
- CVE-2023-39418: Fix MERGE to enforce row security. (bsc#1214061) 
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-17"/>
	<updated date="2023-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214059">SUSE bug 1214059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214061">SUSE bug 1214061</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39417/">CVE-2023-39417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39417">CVE-2023-39417 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39418/">CVE-2023-39418 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39418">CVE-2023-39418 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009779005" comment="libecpg6-15.4-150200.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779006" comment="libecpg6-32bit-15.4-150200.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779007" comment="libpq5-15.4-150200.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779008" comment="libpq5-32bit-15.4-150200.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779009" comment="postgresql15-15.4-150200.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779010" comment="postgresql15-contrib-15.4-150200.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779011" comment="postgresql15-devel-15.4-150200.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779012" comment="postgresql15-docs-15.4-150200.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779013" comment="postgresql15-llvmjit-15.4-150200.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779014" comment="postgresql15-llvmjit-devel-15.4-150200.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779015" comment="postgresql15-plperl-15.4-150200.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779016" comment="postgresql15-plpython-15.4-150200.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779017" comment="postgresql15-pltcl-15.4-150200.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779018" comment="postgresql15-server-15.4-150200.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779019" comment="postgresql15-server-devel-15.4-150200.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779020" comment="postgresql15-test-15.4-150200.5.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4312" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql15 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214059" ref_url="https://bugzilla.suse.com/1214059" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39417" ref_url="https://www.suse.com/security/cve/CVE-2023-39417/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031065.html" source="SUSE-SU"/>
		<description>
This update for postgresql15 fixes the following issues:

- Update to 14.9
- CVE-2023-39417: Fixed potential SQL injection for trusted extensions. (bsc#1214059)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-17"/>
	<updated date="2023-08-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214059">SUSE bug 1214059</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39417/">CVE-2023-39417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39417">CVE-2023-39417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009779021" comment="postgresql14-14.9-150200.5.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779022" comment="postgresql14-contrib-14.9-150200.5.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779023" comment="postgresql14-devel-14.9-150200.5.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779024" comment="postgresql14-docs-14.9-150200.5.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779025" comment="postgresql14-llvmjit-14.9-150200.5.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779026" comment="postgresql14-llvmjit-devel-14.9-150200.5.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779027" comment="postgresql14-plperl-14.9-150200.5.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779028" comment="postgresql14-plpython-14.9-150200.5.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779029" comment="postgresql14-pltcl-14.9-150200.5.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779030" comment="postgresql14-server-14.9-150200.5.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779031" comment="postgresql14-server-devel-14.9-150200.5.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779032" comment="postgresql14-test-14.9-150200.5.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4313" version="1" class="patch">
	<metadata>
		<title>Security update for re2c (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1170890" ref_url="https://bugzilla.suse.com/1170890" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-21232" ref_url="https://www.suse.com/security/cve/CVE-2018-21232/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015956.html" source="SUSE-SU"/>
		<description>
This update for re2c fixes the following issues:

- CVE-2018-21232: Fixed excess stack consumption due to uncontrolled recursion in find_fixed_tags (bsc#1170890).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-18"/>
	<updated date="2023-08-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170890">SUSE bug 1170890</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-21232/">CVE-2018-21232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-21232">CVE-2018-21232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009775785" comment="re2c-1.0.3-150000.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4314" version="1" class="patch">
	<metadata>
		<title>Security update for python-configobj (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210070" ref_url="https://bugzilla.suse.com/1210070" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-26112" ref_url="https://www.suse.com/security/cve/CVE-2023-26112/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3369-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031116.html" source="SUSE-SU"/>
		<description>
This update for python-configobj fixes the following issues:
  
- CVE-2023-26112: Fixed regular expression denial of service vulnerability in validate.py (bsc#1210070).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-22"/>
	<updated date="2023-08-22"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1210070">SUSE bug 1210070</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-26112/">CVE-2023-26112 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26112">CVE-2023-26112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009771765" comment="python3-configobj-5.0.6-150000.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4315" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206418" ref_url="https://bugzilla.suse.com/1206418" source="BUGZILLA"/>
		<reference ref_id="1207129" ref_url="https://bugzilla.suse.com/1207129" source="BUGZILLA"/>
		<reference ref_id="1207948" ref_url="https://bugzilla.suse.com/1207948" source="BUGZILLA"/>
		<reference ref_id="1210627" ref_url="https://bugzilla.suse.com/1210627" source="BUGZILLA"/>
		<reference ref_id="1210780" ref_url="https://bugzilla.suse.com/1210780" source="BUGZILLA"/>
		<reference ref_id="1210825" ref_url="https://bugzilla.suse.com/1210825" source="BUGZILLA"/>
		<reference ref_id="1211131" ref_url="https://bugzilla.suse.com/1211131" source="BUGZILLA"/>
		<reference ref_id="1211738" ref_url="https://bugzilla.suse.com/1211738" source="BUGZILLA"/>
		<reference ref_id="1211811" ref_url="https://bugzilla.suse.com/1211811" source="BUGZILLA"/>
		<reference ref_id="1212445" ref_url="https://bugzilla.suse.com/1212445" source="BUGZILLA"/>
		<reference ref_id="1212502" ref_url="https://bugzilla.suse.com/1212502" source="BUGZILLA"/>
		<reference ref_id="1212604" ref_url="https://bugzilla.suse.com/1212604" source="BUGZILLA"/>
		<reference ref_id="1212766" ref_url="https://bugzilla.suse.com/1212766" source="BUGZILLA"/>
		<reference ref_id="1212901" ref_url="https://bugzilla.suse.com/1212901" source="BUGZILLA"/>
		<reference ref_id="1213167" ref_url="https://bugzilla.suse.com/1213167" source="BUGZILLA"/>
		<reference ref_id="1213272" ref_url="https://bugzilla.suse.com/1213272" source="BUGZILLA"/>
		<reference ref_id="1213287" ref_url="https://bugzilla.suse.com/1213287" source="BUGZILLA"/>
		<reference ref_id="1213304" ref_url="https://bugzilla.suse.com/1213304" source="BUGZILLA"/>
		<reference ref_id="1213417" ref_url="https://bugzilla.suse.com/1213417" source="BUGZILLA"/>
		<reference ref_id="1213578" ref_url="https://bugzilla.suse.com/1213578" source="BUGZILLA"/>
		<reference ref_id="1213585" ref_url="https://bugzilla.suse.com/1213585" source="BUGZILLA"/>
		<reference ref_id="1213586" ref_url="https://bugzilla.suse.com/1213586" source="BUGZILLA"/>
		<reference ref_id="1213588" ref_url="https://bugzilla.suse.com/1213588" source="BUGZILLA"/>
		<reference ref_id="1213601" ref_url="https://bugzilla.suse.com/1213601" source="BUGZILLA"/>
		<reference ref_id="1213620" ref_url="https://bugzilla.suse.com/1213620" source="BUGZILLA"/>
		<reference ref_id="1213632" ref_url="https://bugzilla.suse.com/1213632" source="BUGZILLA"/>
		<reference ref_id="1213653" ref_url="https://bugzilla.suse.com/1213653" source="BUGZILLA"/>
		<reference ref_id="1213713" ref_url="https://bugzilla.suse.com/1213713" source="BUGZILLA"/>
		<reference ref_id="1213715" ref_url="https://bugzilla.suse.com/1213715" source="BUGZILLA"/>
		<reference ref_id="1213747" ref_url="https://bugzilla.suse.com/1213747" source="BUGZILLA"/>
		<reference ref_id="1213756" ref_url="https://bugzilla.suse.com/1213756" source="BUGZILLA"/>
		<reference ref_id="1213759" ref_url="https://bugzilla.suse.com/1213759" source="BUGZILLA"/>
		<reference ref_id="1213777" ref_url="https://bugzilla.suse.com/1213777" source="BUGZILLA"/>
		<reference ref_id="1213810" ref_url="https://bugzilla.suse.com/1213810" source="BUGZILLA"/>
		<reference ref_id="1213812" ref_url="https://bugzilla.suse.com/1213812" source="BUGZILLA"/>
		<reference ref_id="1213856" ref_url="https://bugzilla.suse.com/1213856" source="BUGZILLA"/>
		<reference ref_id="1213857" ref_url="https://bugzilla.suse.com/1213857" source="BUGZILLA"/>
		<reference ref_id="1213863" ref_url="https://bugzilla.suse.com/1213863" source="BUGZILLA"/>
		<reference ref_id="1213867" ref_url="https://bugzilla.suse.com/1213867" source="BUGZILLA"/>
		<reference ref_id="1213870" ref_url="https://bugzilla.suse.com/1213870" source="BUGZILLA"/>
		<reference ref_id="1213871" ref_url="https://bugzilla.suse.com/1213871" source="BUGZILLA"/>
		<reference ref_id="1213872" ref_url="https://bugzilla.suse.com/1213872" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982/" source="CVE"/>
		<reference ref_id="CVE-2023-0459" ref_url="https://www.suse.com/security/cve/CVE-2023-0459/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-21400" ref_url="https://www.suse.com/security/cve/CVE-2023-21400/" source="CVE"/>
		<reference ref_id="CVE-2023-2156" ref_url="https://www.suse.com/security/cve/CVE-2023-2156/" source="CVE"/>
		<reference ref_id="CVE-2023-2166" ref_url="https://www.suse.com/security/cve/CVE-2023-2166/" source="CVE"/>
		<reference ref_id="CVE-2023-31083" ref_url="https://www.suse.com/security/cve/CVE-2023-31083/" source="CVE"/>
		<reference ref_id="CVE-2023-3268" ref_url="https://www.suse.com/security/cve/CVE-2023-3268/" source="CVE"/>
		<reference ref_id="CVE-2023-3567" ref_url="https://www.suse.com/security/cve/CVE-2023-3567/" source="CVE"/>
		<reference ref_id="CVE-2023-3609" ref_url="https://www.suse.com/security/cve/CVE-2023-3609/" source="CVE"/>
		<reference ref_id="CVE-2023-3611" ref_url="https://www.suse.com/security/cve/CVE-2023-3611/" source="CVE"/>
		<reference ref_id="CVE-2023-3776" ref_url="https://www.suse.com/security/cve/CVE-2023-3776/" source="CVE"/>
		<reference ref_id="CVE-2023-38409" ref_url="https://www.suse.com/security/cve/CVE-2023-38409/" source="CVE"/>
		<reference ref_id="CVE-2023-3863" ref_url="https://www.suse.com/security/cve/CVE-2023-3863/" source="CVE"/>
		<reference ref_id="CVE-2023-4004" ref_url="https://www.suse.com/security/cve/CVE-2023-4004/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2023-20569: Fixed side channel attack ‘Inception’ or ‘RAS Poisoning’ (bsc#1213287).
- CVE-2023-3268: Fixed an out of bounds memory access flaw in relay_file_read_start_pos in the relayfs (bsc#1212502).
- CVE-2023-2166: Fixed NULL pointer dereference in can_rcv_filter (bsc#1210627).
- CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec (bsc#1211738).
- CVE-2023-4004: Fixed improper element removal netfilter nft_set_pipapo (bsc#1213812).
- CVE-2023-2156: Fixed a flaw in the networking subsystem within the handling of the RPL protocol (bsc#1211131).
- CVE-2023-21400: Fixed several memory corruptions due to improper locking in io_uring (bsc#1213272).
- CVE-2023-3776: Fixed improper refcount update in  cls_fw leads to use-after-free (bsc#1213588).
- CVE-2023-3863: Fixed a use-after-free flaw in nfc_llcp_find_local in net/nfc/llcp_core.c in NFC. This flaw allowed a local user with special privileges to impact a kernel information leak issue (bsc#1213601).
- CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c (bsc#1213167).
- CVE-2023-31083: Fixed race condition in hci_uart_tty_ioctl (bsc#1210780).
- CVE-2023-3609: Fixed reference counter leak leading to  overflow in net/sched (bsc#1213586).
- CVE-2023-3611: Fixed an out-of-bounds write in net/sched sch_qfq(bsc#1213585).
- CVE-2023-38409: Fixed an issue in set_con2fb_map in drivers/video/fbdev/core/fbcon.c. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info) (bsc#1213417).
- CVE-2022-40982: Fixed transient execution attack called 'Gather Data Sampling' (bsc#1206418).

The following non-security bugs were fixed:

- ACPI: CPPC: Add ACPI disabled check to acpi_cpc_valid() (bsc#1212445).
- ACPI: CPPC: Add definition for undefined FADT preferred PM profile value (bsc#1212445).
- ACPI: utils: Fix acpi_evaluate_dsm_typed() redefinition error (git-fixes).
- ACPI/IORT: Remove erroneous id_count check in iort_node_get_rmr_info() (git-fixes).
- afs: Adjust ACK interpretation to try and cope with NAT (git-fixes).
- afs: Fix access after dec in put functions (git-fixes).
- afs: Fix afs_getattr() to refetch file status if callback break occurred (git-fixes).
- afs: Fix dynamic root getattr (git-fixes).
- afs: Fix fileserver probe RTT handling (git-fixes).
- afs: Fix infinite loop found by xfstest generic/676 (git-fixes).
- afs: Fix lost servers_outstanding count (git-fixes).
- afs: Fix server-&gt;active leak in afs_put_server (git-fixes).
- afs: Fix setting of mtime when creating a file/dir/symlink (git-fixes).
- afs: Fix updating of i_size with dv jump from server (git-fixes).
- afs: Fix vlserver probe RTT handling (git-fixes).
- afs: Return -EAGAIN, not -EREMOTEIO, when a file already locked (git-fixes).
- afs: Use refcount_t rather than atomic_t (git-fixes).
- afs: Use the operation issue time instead of the reply time for callbacks (git-fixes).
- ALSA: emu10k1: roll up loops in DSP setup code for Audigy (git-fixes).
- ALSA: hda/realtek - remove 3k pull low procedure (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NS70AU (git-fixes).
- ALSA: hda/realtek: Add support for DELL Oasis 13/14/16 laptops (git-fixes).
- ALSA: hda/realtek: Enable Mute LED on HP Laptop 15s-eq2xxx (git-fixes).
- ALSA: hda/realtek: Fix generic fixup definition for cs35l41 amp (git-fixes).
- ALSA: hda/realtek: Support ASUS G713PV laptop (git-fixes).
- ALSA: hda/relatek: Enable Mute LED on HP 250 G8 (git-fixes).
- ALSA: usb-audio: Add FIXED_RATE quirk for JBL Quantum610 Wireless (git-fixes).
- ALSA: usb-audio: Add new quirk FIXED_RATE for JBL Quantum810 Wireless (git-fixes).
- ALSA: usb-audio: Add quirk for Microsoft Modern Wireless Headset (bsc#1207129).
- ALSA: usb-audio: Add quirk for Tascam Model 12 (git-fixes).
- ALSA: usb-audio: Always initialize fixed_rate in snd_usb_find_implicit_fb_sync_format() (git-fixes).
- ALSA: usb-audio: Apply mutex around snd_usb_endpoint_set_params() (git-fixes).
- ALSA: usb-audio: Avoid superfluous endpoint setup (git-fixes).
- ALSA: usb-audio: Avoid unnecessary interface change at EP close (git-fixes).
- ALSA: usb-audio: Clear fixed clock rate at closing EP (git-fixes).
- ALSA: usb-audio: Correct the return code from snd_usb_endpoint_set_params() (git-fixes).
- ALSA: usb-audio: Drop superfluous interface setup at parsing (git-fixes).
- ALSA: usb-audio: Fix possible NULL pointer dereference in snd_usb_pcm_has_fixed_rate() (git-fixes).
- ALSA: usb-audio: Fix wrong kfree issue in snd_usb_endpoint_free_all (git-fixes).
- ALSA: usb-audio: More refactoring of hw constraint rules (git-fixes).
- ALSA: usb-audio: Properly refcounting clock rate (git-fixes).
- ALSA: usb-audio: Rate limit usb_set_interface error reporting (git-fixes).
- ALSA: usb-audio: Refcount multiple accesses on the single clock (git-fixes).
- ALSA: usb-audio: Split endpoint setups for hw_params and prepare (take#2) (git-fixes).
- ALSA: usb-audio: Update for native DSD support quirks (git-fixes).
- ALSA: usb-audio: Use atomic_try_cmpxchg in ep_state_update (git-fixes).
- ALSA: usb-audio: Workaround for XRUN at prepare (git-fixes).
- amd-pstate: Fix amd_pstate mode switch (git-fixes).
- ASoC: amd: acp: fix for invalid dai id handling in acp_get_byte_count() (git-fixes).
- ASoC: atmel: Fix the 8K sample parameter in I2SC master (git-fixes).
- ASoc: codecs: ES8316: Fix DMIC config (git-fixes).
- ASoC: codecs: wcd-mbhc-v2: fix resource leaks on component remove (git-fixes).
- ASoC: codecs: wcd934x: fix resource leaks on component remove (git-fixes).
- ASoC: codecs: wcd938x: fix codec initialisation race (git-fixes).
- ASoC: codecs: wcd938x: fix dB range for HPHL and HPHR (git-fixes).
- ASoC: codecs: wcd938x: fix missing clsh ctrl error handling (git-fixes).
- ASoC: codecs: wcd938x: fix soundwire initialisation race (git-fixes).
- ASoC: da7219: Check for failure reading AAD IRQ events (git-fixes).
- ASoC: da7219: Flush pending AAD IRQ when suspending (git-fixes).
- ASoC: fsl_sai: Disable bit clock with transmitter (git-fixes).
- ASoC: fsl_spdif: Silence output on stop (git-fixes).
- ASoC: rt5640: Fix sleep in atomic context (git-fixes).
- ASoC: rt5682-sdw: fix for JD event handling in ClockStop Mode0 (git-fixes).
- ASoC: rt711-sdca: fix for JD event handling in ClockStop Mode0 (git-fixes).
- ASoC: rt711: fix for JD event handling in ClockStop Mode0 (git-fixes).
- ASoC: SOF: ipc3-dtrace: uninitialized data in dfsentry_trace_filter_write() (git-fixes).
- ASoC: tegra: Fix ADX byte map (git-fixes).
- ASoC: tegra: Fix AMX byte map (git-fixes).
- ASoC: wm8904: Fill the cache for WM8904_ADC_TEST_0 register (git-fixes).
- ata: pata_ns87415: mark ns87560_tf_read static (git-fixes).
- block, bfq: Fix division by zero error on zero wsum (bsc#1213653).
- block: Fix a source code comment in include/uapi/linux/blkzoned.h (git-fixes).
- Bluetooth: hci_ldisc: check HCI_UART_PROTO_READY flag in HCIUARTGETPROTO (bsc#1210780 CVE-2023-31083).
- bpf: add missing header file include (bsc#1211738 CVE-2023-0459).
- bus: mhi: add new interfaces to handle MHI channels directly (bsc#1207948).
- bus: mhi: host: add destroy_device argument to mhi_power_down() (bsc#1207948).
- can: af_can: fix NULL pointer dereference in can_rcv_filter (bsc#1210627 CVE-2023-2166).
- can: af_can: fix NULL pointer dereference in can_rcv_filter (bsc#1210627 CVE-2023-2166).
- can: gs_usb: gs_can_close(): add missing set of CAN state to CAN_STATE_STOPPED (git-fixes).
- ceph: do not let check_caps skip sending responses for revoke msgs (bsc#1213856).
- coda: Avoid partial allocation of sig_inputArgs (git-fixes).
- cpufreq: amd_pstate: fix wrong lowest perf fetch (bsc#1212445).
- cpufreq: amd_pstate: map desired perf into pstate scope for powersave governor (bsc#1212445).
- cpufreq: amd-pstate: Add -&gt;fast_switch() callback (bsc#1212445).
- cpufreq: amd-pstate: Add AMD P-State frequencies attributes (bsc#1212445).
- cpufreq: amd-pstate: Add AMD P-State performance attributes (bsc#1212445).
- cpufreq: amd-pstate: add amd-pstate driver parameter for mode selection (bsc#1212445).
- cpufreq: amd-pstate: Add boost mode support for AMD P-State (bsc#1212445).
- cpufreq: amd-pstate: add driver working mode switch support (bsc#1212445).
- cpufreq: amd-pstate: Add fast switch function for AMD P-State (bsc#1212445).
- cpufreq: amd-pstate: Add guided autonomous mode (bsc#1212445).
- cpufreq: amd-pstate: Add guided mode control support via sysfs (bsc#1212445).
- cpufreq: amd-pstate: Add more tracepoint for AMD P-State module (bsc#1212445).
- cpufreq: amd-pstate: Add resume and suspend callbacks (bsc#1212445).
- cpufreq: amd-pstate: Add trace for AMD P-State module (bsc#1212445).
- cpufreq: amd-pstate: avoid uninitialized variable use (bsc#1212445).
- cpufreq: amd-pstate: change amd-pstate driver to be built-in type (bsc#1212445).
- cpufreq: amd-pstate: convert sprintf with sysfs_emit() (bsc#1212445).
- cpufreq: amd-pstate: cpufreq: amd-pstate: reset MSR_AMD_PERF_CTL register at init (bsc#1212445).
- cpufreq: amd-pstate: Expose struct amd_cpudata (bsc#1212445).
- cpufreq: amd-pstate: Fix initial highest_perf value (bsc#1212445).
- cpufreq: amd-pstate: Fix invalid write to MSR_AMD_CPPC_REQ (bsc#1212445).
- cpufreq: amd-pstate: Fix Kconfig dependencies for AMD P-State (bsc#1212445).
- cpufreq: amd-pstate: fix kernel hang issue while amd-pstate unregistering (bsc#1212445).
- cpufreq: amd-pstate: Fix struct amd_cpudata kernel-doc comment (bsc#1212445).
- cpufreq: amd-pstate: fix white-space (bsc#1212445).
- cpufreq: amd-pstate: implement amd pstate cpu online and offline callback (bsc#1212445).
- cpufreq: amd-pstate: implement Pstate EPP support for the AMD processors (bsc#1212445).
- cpufreq: amd-pstate: implement suspend and resume callbacks (bsc#1212445).
- cpufreq: amd-pstate: Introduce a new AMD P-State driver to support future processors (bsc#1212445).
- cpufreq: amd-pstate: Introduce the support for the processors with shared memory solution (bsc#1212445).
- cpufreq: amd-pstate: Let user know amd-pstate is disabled (bsc#1212445).
- cpufreq: amd-pstate: Make amd-pstate EPP driver name hyphenated (bsc#1212445).
- cpufreq: amd-pstate: Make varaiable mode_state_machine static (bsc#1212445).
- cpufreq: amd-pstate: optimize driver working mode selection in amd_pstate_param() (bsc#1212445).
- cpufreq: amd-pstate: Remove fast_switch_possible flag from active driver (bsc#1212445).
- cpufreq: amd-pstate: remove MODULE_LICENSE in non-modules (bsc#1212445).
- cpufreq: amd-pstate: Set a fallback policy based on preferred_profile (bsc#1212445).
- cpufreq: amd-pstate: simplify cpudata pointer assignment (bsc#1212445).
- cpufreq: amd-pstate: Update policy-&gt;cur in amd_pstate_adjust_perf() (bsc#1212445).
- cpufreq: amd-pstate: update pstate frequency transition delay time (bsc#1212445).
- cpufreq: amd-pstate: Write CPPC enable bit per-socket (bsc#1212445).
- crypto: kpp - Add helper to set reqsize (git-fixes).
- crypto: qat - Use helper to set reqsize (git-fixes).
- dlm: fix missing lkb refcount handling (git-fixes).
- dlm: fix plock invalid read (git-fixes).
- Documentation: cpufreq: amd-pstate: Move amd_pstate param to alphabetical order (bsc#1212445).
- Documentation: devices.txt: reconcile serial/ucc_uart minor numers (git-fixes).
- drm/amd: Fix an error handling mistake in psp_sw_init() (git-fixes).
- drm/amd/display: Add monitor specific edid quirk (git-fixes).
- drm/amd/display: Add polling method to handle MST reply packet (bsc#1213578).
- drm/amd/display: check TG is non-null before checking if enabled (git-fixes).
- drm/amd/display: Correct `DMUB_FW_VERSION` macro (git-fixes).
- drm/amd/display: Disable MPC split by default on special asic (git-fixes).
- drm/amd/display: fix access hdcp_workqueue assert (git-fixes).
- drm/amd/display: fix seamless odm transitions (git-fixes).
- drm/amd/display: Keep PHY active for DP displays on DCN31 (git-fixes).
- drm/amd/display: only accept async flips for fast updates (git-fixes).
- drm/amd/display: Only update link settings after successful MST link train (git-fixes).
- drm/amd/display: phase3 mst hdcp for multiple displays (git-fixes).
- drm/amd/display: Remove Phantom Pipe Check When Calculating K1 and K2 (git-fixes).
- drm/amd/display: save restore hdcp state when display is unplugged from mst hub (git-fixes).
- drm/amd/display: Unlock on error path in dm_handle_mst_sideband_msg_ready_event() (git-fixes).
- drm/amd/pm: add abnormal fan detection for smu 13.0.0 (git-fixes).
- drm/amd/pm: conditionally disable pcie lane/speed switching for SMU13 (git-fixes).
- drm/amd/pm: re-enable the gfx imu when smu resume (git-fixes).
- drm/amd/pm: share the code around SMU13 pcie parameters update (git-fixes).
- drm/amdgpu: add the fan abnormal detection feature (git-fixes).
- drm/amdgpu: avoid restore process run into dead loop (git-fixes).
- drm/amdgpu: fix clearing mappings for BOs that are always valid in VM (git-fixes).
- drm/amdgpu: Fix minmax warning (git-fixes).
- drm/atomic: Allow vblank-enabled + self-refresh 'disable' (git-fixes).
- drm/atomic: Fix potential use-after-free in nonblocking commits (git-fixes).
- drm/bridge: tc358768: Add atomic_get_input_bus_fmts() implementation (git-fixes).
- drm/bridge: tc358768: fix TCLK_TRAILCNT computation (git-fixes).
- drm/bridge: tc358768: fix THS_TRAILCNT computation (git-fixes).
- drm/bridge: tc358768: fix THS_ZEROCNT computation (git-fixes).
- drm/bridge: ti-sn65dsi86: Fix auxiliary bus lifetime (git-fixes).
- drm/client: Fix memory leak in drm_client_modeset_probe (git-fixes).
- drm/dp_mst: Clear MSG_RDY flag before sending new message (bsc#1213578).
- drm/i915: Do not preserve dpll_hw_state for slave crtc in Bigjoiner (git-fixes).
- drm/i915: Fix an error handling path in igt_write_huge() (git-fixes).
- drm/i915/dpt: Use shmem for dpt objects (git-fixes).
- drm/i915/tc: Fix system resume MST mode restore for DP-alt sinks (git-fixes).
- drm/msm: Fix IS_ERR_OR_NULL() vs NULL check in a5xx_submit_in_rb() (git-fixes).
- drm/msm/adreno: Fix snapshot BINDLESS_DATA size (git-fixes).
- drm/msm/disp/dpu: get timing engine status from intf status register (git-fixes).
- drm/msm/dpu: drop enum dpu_core_perf_data_bus_id (git-fixes).
- drm/msm/dpu: Set DPU_DATA_HCTL_EN for in INTF_SC7180_MASK (git-fixes).
- drm/radeon: Fix integer overflow in radeon_cs_parser_init (git-fixes).
- drm/ttm: fix bulk_move corruption when adding a entry (git-fixes).
- drm/ttm: fix warning that we shouldn't mix (git-fixes).
- drm/vmwgfx: Fix Legacy Display Unit atomic drm support (bsc#1213632).
- drm/vmwgfx: Remove explicit and broken vblank handling (bsc#1213632).
- drm/vmwgfx: Remove rcu locks from user resources (bsc#1213632).
- fbdev: au1200fb: Fix missing IRQ check in au1200fb_drv_probe (git-fixes).
- fbdev: imxfb: Removed unneeded release_mem_region (git-fixes).
- fbdev: imxfb: warn about invalid left/right margin (git-fixes).
- file: always lock position for FMODE_ATOMIC_POS (bsc#1213759).
- fs: dlm: add midcomms init/start functions (git-fixes).
- fs: dlm: do not set stop rx flag after node reset (git-fixes).
- fs: dlm: filter user dlm messages for kernel locks (git-fixes).
- fs: dlm: fix log of lowcomms vs midcomms (git-fixes).
- fs: dlm: fix race between test_bit() and queue_work() (git-fixes).
- fs: dlm: fix race in lowcomms (git-fixes).
- fs: dlm: handle -EBUSY first in lock arg validation (git-fixes).
- fs: dlm: move sending fin message into state change handling (git-fixes).
- fs: dlm: retry accept() until -EAGAIN or error returns (git-fixes).
- fs: dlm: return positive pid value for F_GETLK (git-fixes).
- fs: dlm: start midcomms before scand (git-fixes).
- fs: hfsplus: remove WARN_ON() from hfsplus_cat_{read,write}_inode() (git-fixes).
- FS: JFS: Check for read-only mounted filesystem in txBegin (git-fixes).
- FS: JFS: Fix null-ptr-deref Read in txBegin (git-fixes).
- fs: jfs: Fix UBSAN: array-index-out-of-bounds in dbAllocDmapLev (git-fixes).
- gve: Set default duplex configuration to full (git-fixes).
- gve: unify driver name usage (git-fixes).
- hwmon: (adm1275) Allow setting sample averaging (git-fixes).
- hwmon: (k10temp) Enable AMD3255 Proc to show negative temperature (git-fixes).
- hwmon: (nct7802) Fix for temp6 (PECI1) processed even if PECI1 disabled (git-fixes).
- hwmon: (pmbus/adm1275) Fix problems with temperature monitoring on ADM1272 (git-fixes).
- i2c: xiic: Defer xiic_wakeup() and __xiic_start_xfer() in xiic_process() (git-fixes).
- i2c: xiic: Do not try to handle more interrupt events after error (git-fixes).
- iavf: check for removal state before IAVF_FLAG_PF_COMMS_FAILED (git-fixes).
- iavf: fix a deadlock caused by rtnl and driver's lock circular dependencies (git-fixes).
- iavf: Fix out-of-bounds when setting channels on remove (git-fixes).
- iavf: fix potential deadlock on allocation failure (git-fixes).
- iavf: fix reset task race with iavf_remove() (git-fixes).
- iavf: Fix use-after-free in free_netdev (git-fixes).
- iavf: Move netdev_update_features() into watchdog task (git-fixes).
- iavf: use internal state to free traffic IRQs (git-fixes).
- iavf: Wait for reset in callbacks which trigger it (git-fixes).
- IB/hfi1: Use bitmap_zalloc() when applicable (git-fixes)
- ice: Fix max_rate check while configuring TX rate limits (git-fixes).
- ice: Fix memory management in ice_ethtool_fdir.c (git-fixes).
- ice: handle extts in the miscellaneous interrupt thread (git-fixes).
- igc: Check if hardware TX timestamping is enabled earlier (git-fixes).
- igc: Enable and fix RX hash usage by netstack (git-fixes).
- igc: Fix inserting of empty frame for launchtime (git-fixes).
- igc: Fix Kernel Panic during ndo_tx_timeout callback (git-fixes).
- igc: Fix launchtime before start of cycle (git-fixes).
- igc: Fix race condition in PTP tx code (git-fixes).
- igc: Handle PPS start time programming for past time values (git-fixes).
- igc: Prevent garbled TX queue with XDP ZEROCOPY (git-fixes).
- igc: Remove delay during TX ring configuration (git-fixes).
- igc: set TP bit in 'supported' and 'advertising' fields of ethtool_link_ksettings (git-fixes).
- igc: Work around HW bug causing missing timestamps (git-fixes).
- Input: i8042 - add Clevo PCX0DX to i8042 quirk table (git-fixes).
- Input: iqs269a - do not poll during ATI (git-fixes).
- Input: iqs269a - do not poll during suspend or resume (git-fixes).
- io_uring: ensure IOPOLL locks around deferred work (bsc#1213272 CVE-2023-21400).
- ipv6: rpl: Fix Route of Death (CVE-2023-2156 bsc#1211131).
- jffs2: fix memory leak in jffs2_do_fill_super (git-fixes).
- jffs2: fix memory leak in jffs2_do_mount_fs (git-fixes).
- jffs2: fix memory leak in jffs2_scan_medium (git-fixes).
- jffs2: fix use-after-free in jffs2_clear_xattr_subsystem (git-fixes).
- jffs2: GC deadlock reading a page that is used in jffs2_write_begin() (git-fixes).
- jffs2: reduce stack usage in jffs2_build_xattr_subsystem() (git-fixes).
- jfs: jfs_dmap: Validate db_l2nbperpage while mounting (git-fixes).
- kabi/severities: relax kABI for ath11k local symbols (bsc#1207948)
- kselftest: vDSO: Fix accumulation of uninitialized ret when CLOCK_REALTIME is undefined (git-fixes).
- KVM: Add GDS_NO support to KVM (bsc#1206418, CVE-2022-40982).
- KVM: arm64: Do not read a HW interrupt pending state in user context (git-fixes)
- KVM: arm64: Warn if accessing timer pending state outside of vcpu (bsc#1213620)
- KVM: Do not null dereference ops-&gt;destroy (git-fixes)
- KVM: downgrade two BUG_ONs to WARN_ON_ONCE (git-fixes)
- KVM: Initialize debugfs_dentry when a VM is created to avoid NULL (git-fixes)
- KVM: s390: pv: fix index value of replaced ASCE (git-fixes bsc#1213867).
- KVM: VMX: Inject #GP on ENCLS if vCPU has paging disabled (CR0.PG==0) (git-fixes).
- KVM: VMX: Inject #GP, not #UD, if SGX2 ENCLS leafs are unsupported (git-fixes).
- KVM: VMX: restore vmx_vmexit alignment (git-fixes).
- KVM: x86: Account fastpath-only VM-Exits in vCPU stats (git-fixes).
- leds: trigger: netdev: Recheck NETDEV_LED_MODE_LINKUP on dev rename (git-fixes).
- libceph: harden msgr2.1 frame segment length checks (bsc#1213857).
- md: add error_handlers for raid0 and linear (bsc#1212766).
- media: staging: atomisp: select V4L2_FWNODE (git-fixes).
- mhi_power_down() kABI workaround (bsc#1207948).
- mmc: core: disable TRIM on Kingston EMMC04G-M627 (git-fixes).
- mmc: sdhci: fix DMA configure compatibility issue when 64bit DMA mode is used (git-fixes).
- net: ena: fix shift-out-of-bounds in exponential backoff (git-fixes).
- net: mana: Batch ringing RX queue doorbell on receiving packets (bsc#1212901).
- net: mana: Use the correct WQE count for ringing RQ doorbell (bsc#1212901).
- net: nfc: Fix use-after-free caused by nfc_llcp_find_local (bsc#1213601 CVE-2023-3863).
- net: phy: marvell10g: fix 88x3310 power up (git-fixes).
- net/mlx5: DR, Support SW created encap actions for FW table (git-fixes).
- net/mlx5e: Check for NOT_READY flag state after locking (git-fixes).
- net/mlx5e: fix double free in mlx5e_destroy_flow_table (git-fixes).
- net/mlx5e: fix memory leak in mlx5e_fs_tt_redirect_any_create (git-fixes).
- net/mlx5e: fix memory leak in mlx5e_ptp_open (git-fixes).
- net/mlx5e: XDP, Allow growing tail for XDP multi buffer (git-fixes).
- net/mlx5e: xsk: Set napi_id to support busy polling on XSK RQ (git-fixes).
- net/sched: cls_fw: Fix improper refcount update leads to use-after-free (CVE-2023-3776 bsc#1213588).
- net/sched: cls_u32: Fix reference counter leak leading to overflow (CVE-2023-3609 bsc#1213586).
- net/sched: sch_qfq: account for stab overhead in qfq_enqueue (CVE-2023-3611 bsc#1213585).
- net/sched: sch_qfq: refactor parsing of netlink parameters (bsc#1213585).
- net/sched: sch_qfq: reintroduce lmax bound check for MTU (bsc#1213585).
- netfilter: nft_set_pipapo: fix improper element removal (bsc#1213812 CVE-2023-4004).
- nfc: llcp: simplify llcp_sock_connect() error paths (bsc#1213601 CVE-2023-3863).
- nfsd: add encoding of op_recall flag for write delegation (git-fixes).
- nfsd: fix double fget() bug in __write_ports_addfd() (git-fixes).
- nfsd: Fix sparse warning (git-fixes).
- nfsd: Remove open coding of string copy (git-fixes).
- NFSv4.1: Always send a RECLAIM_COMPLETE after establishing lease (git-fixes).
- NFSv4.1: freeze the session table upon receiving NFS4ERR_BADSESSION (git-fixes).
- nvme-pci: fix DMA direction of unmapping integrity data (git-fixes).
- nvme-pci: remove nvme_queue from nvme_iod (git-fixes).
- nvme: do not reject probe due to duplicate IDs for single-ported PCIe devices (git-fixes).
- nvme: fix the NVME_ID_NS_NVM_STS_MASK definition (git-fixes).
- octeontx-af: fix hardware timestamp configuration (git-fixes).
- octeontx2-af: Move validation of ptp pointer before its usage (git-fixes).
- octeontx2-pf: Add additional check for MCAM rules (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 88SE9235 (git-fixes).
- PCI/PM: Avoid putting EloPOS E2/S2/H2 PCIe Ports in D3cold (git-fixes).
- phy: hisilicon: Fix an out of bounds check in hisi_inno_phy_probe() (git-fixes).
- pinctrl: amd: Detect internal GPIO0 debounce handling (git-fixes).
- pinctrl: amd: Do not show Invalid config param errors (git-fixes).
- pinctrl: amd: Fix mistake in handling clearing pins at startup (git-fixes).
- pinctrl: amd: Only use special debounce behavior for GPIO 0 (git-fixes).
- pinctrl: amd: Use amd_pinconf_set() for all config options (git-fixes).
- platform/x86: msi-laptop: Fix rfkill out-of-sync on MSI Wind U100 (git-fixes).
- RDMA/bnxt_re: Fix hang during driver unload (git-fixes)
- RDMA/bnxt_re: Prevent handling any completions after qp destroy (git-fixes)
- RDMA/core: Update CMA destination address on rdma_resolve_addr (git-fixes)
- RDMA/irdma: Add missing read barriers (git-fixes)
- RDMA/irdma: Fix data race on CQP completion stats (git-fixes)
- RDMA/irdma: Fix data race on CQP request done (git-fixes)
- RDMA/irdma: Fix op_type reporting in CQEs (git-fixes)
- RDMA/irdma: Report correct WC error (git-fixes)
- RDMA/mlx4: Make check for invalid flags stricter (git-fixes)
- RDMA/mthca: Fix crash when polling CQ for shared QPs (git-fixes)
- regmap: Account for register length in SMBus I/O limits (git-fixes).
- regmap: Drop initial version of maximum transfer length fixes (git-fixes).
- relayfs: fix out-of-bounds access in relay_file_read (bsc#1212502 CVE-2023-3268).
- rxrpc, afs: Fix selection of abort codes (git-fixes).
- s390: introduce nospec_uses_trampoline() (git-fixes bsc#1213870).
- s390/bpf: Add expoline to tail calls (git-fixes bsc#1213870).
- s390/dasd: fix hanging device after quiesce/resume (git-fixes bsc#1213810).
- s390/dasd: print copy pair message only for the correct error (git-fixes bsc#1213872).
- s390/decompressor: specify __decompress() buf len to avoid overflow (git-fixes bsc#1213863).
- s390/ipl: add missing intersection check to ipl_report handling (git-fixes bsc#1213871).
- s390/qeth: Fix vipa deletion (git-fixes bsc#1213713).
- s390/vmem: fix empty page tables cleanup under KASAN (git-fixes bsc#1213715).
- scftorture: Count reschedule IPIs (git-fixes).
- scsi: lpfc: Abort outstanding ELS cmds when mailbox timeout error is detected (bsc#1213756).
- scsi: lpfc: Avoid -Wstringop-overflow warning (bsc#1213756).
- scsi: lpfc: Clean up SLI-4 sysfs resource reporting (bsc#1213756).
- scsi: lpfc: Copyright updates for 14.2.0.14 patches (bsc#1213756).
- scsi: lpfc: Fix a possible data race in lpfc_unregister_fcf_rescan() (bsc#1213756).
- scsi: lpfc: Fix incorrect big endian type assignment in bsg loopback path (bsc#1213756).
- scsi: lpfc: Fix incorrect big endian type assignments in FDMI and VMID paths (bsc#1213756).
- scsi: lpfc: Fix lpfc_name struct packing (bsc#1213756).
- scsi: lpfc: Make fabric zone discovery more robust when handling unsolicited LOGO (bsc#1213756).
- scsi: lpfc: Pull out fw diagnostic dump log message from driver's trace buffer (bsc#1213756).
- scsi: lpfc: Qualify ndlp discovery state when processing RSCN (bsc#1213756).
- scsi: lpfc: Refactor cpu affinity assignment paths (bsc#1213756).
- scsi: lpfc: Remove extra ndlp kref decrement in FLOGI cmpl for loop topology (bsc#1213756).
- scsi: lpfc: Replace all non-returning strlcpy() with strscpy() (bsc#1213756).
- scsi: lpfc: Replace one-element array with flexible-array member (bsc#1213756).
- scsi: lpfc: Revise ndlp kref handling for dev_loss_tmo_callbk and lpfc_drop_node (bsc#1213756).
- scsi: lpfc: Set Establish Image Pair service parameter only for Target Functions (bsc#1213756).
- scsi: lpfc: Simplify fcp_abort transport callback log message (bsc#1213756).
- scsi: lpfc: Update lpfc version to 14.2.0.14 (bsc#1213756).
- scsi: lpfc: Use struct_size() helper (bsc#1213756).
- scsi: qla2xxx: Adjust IOCB resource on qpair create (bsc#1213747).
- scsi: qla2xxx: Array index may go out of bound (bsc#1213747).
- scsi: qla2xxx: Avoid fcport pointer dereference (bsc#1213747).
- scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport() (bsc#1213747).
- scsi: qla2xxx: Correct the index of array (bsc#1213747).
- scsi: qla2xxx: Drop useless LIST_HEAD (bsc#1213747).
- scsi: qla2xxx: Fix buffer overrun (bsc#1213747).
- scsi: qla2xxx: Fix command flush during TMF (bsc#1213747).
- scsi: qla2xxx: Fix deletion race condition (bsc#1213747).
- scsi: qla2xxx: Fix end of loop test (bsc#1213747).
- scsi: qla2xxx: Fix erroneous link up failure (bsc#1213747).
- scsi: qla2xxx: Fix error code in qla2x00_start_sp() (bsc#1213747).
- scsi: qla2xxx: fix inconsistent TMF timeout (bsc#1213747).
- scsi: qla2xxx: Fix NULL pointer dereference in target mode (bsc#1213747).
- scsi: qla2xxx: Fix potential NULL pointer dereference (bsc#1213747).
- scsi: qla2xxx: Fix session hang in gnl (bsc#1213747).
- scsi: qla2xxx: Fix TMF leak through (bsc#1213747).
- scsi: qla2xxx: Limit TMF to 8 per function (bsc#1213747).
- scsi: qla2xxx: Pointer may be dereferenced (bsc#1213747).
- scsi: qla2xxx: Remove unused nvme_ls_waitq wait queue (bsc#1213747).
- scsi: qla2xxx: Replace one-element array with DECLARE_FLEX_ARRAY() helper (bsc#1213747).
- scsi: qla2xxx: Silence a static checker warning (bsc#1213747).
- scsi: qla2xxx: Turn off noisy message log (bsc#1213747).
- scsi: qla2xxx: Update version to 10.02.08.400-k (bsc#1213747).
- scsi: qla2xxx: Update version to 10.02.08.500-k (bsc#1213747).
- scsi: qla2xxx: Use vmalloc_array() and vcalloc() (bsc#1213747).
- selftests: rtnetlink: remove netdevsim device after ipsec offload test (git-fixes).
- serial: qcom-geni: drop bogus runtime pm state update (git-fixes).
- serial: sifive: Fix sifive_serial_console_setup() section (git-fixes).
- sfc: fix crash when reading stats while NIC is resetting (git-fixes).
- sfc: fix XDP queues mode with legacy IRQ (git-fixes).
- sfc: use budget for TX completions (git-fixes).
- soundwire: qcom: update status correctly with mask (git-fixes).
- staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext() (git-fixes).
- staging: r8712: Fix memory leak in _r8712_init_xmit_priv() (git-fixes).
- SUNRPC: always free ctxt when freeing deferred request (git-fixes).
- SUNRPC: double free xprt_ctxt while still in use (git-fixes).
- SUNRPC: Fix trace_svc_register() call site (git-fixes).
- SUNRPC: Fix UAF in svc_tcp_listen_data_ready() (git-fixes).
- SUNRPC: Remove dead code in svc_tcp_release_rqst() (git-fixes).
- SUNRPC: remove the maximum number of retries in call_bind_status (git-fixes).
- svcrdma: Prevent page release when nothing was received (git-fixes).
- tpm_tis: Explicitly check for error code (git-fixes).
- tty: n_gsm: fix UAF in gsm_cleanup_mux (git-fixes).
- tty: serial: fsl_lpuart: add earlycon for imx8ulp platform (git-fixes).
- uaccess: Add speculation barrier to copy_from_user() (bsc#1211738 CVE-2023-0459).
- ubifs: Add missing iput if do_tmpfile() failed in rename whiteout (git-fixes).
- ubifs: do_rename: Fix wrong space budget when target inode's nlink &gt; 1 (git-fixes).
- ubifs: Error path in ubifs_remount_rw() seems to wrongly free write buffers (git-fixes).
- ubifs: Fix 'ui-&gt;dirty' race between do_tmpfile() and writeback work (git-fixes).
- ubifs: Fix AA deadlock when setting xattr for encrypted file (git-fixes).
- ubifs: Fix build errors as symbol undefined (git-fixes).
- ubifs: Fix deadlock in concurrent rename whiteout and inode writeback (git-fixes).
- ubifs: Fix memory leak in alloc_wbufs() (git-fixes).
- ubifs: Fix memory leak in do_rename (git-fixes).
- ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock() (git-fixes).
- ubifs: Fix to add refcount once page is set private (git-fixes).
- ubifs: Fix wrong dirty space budget for dirty inode (git-fixes).
- ubifs: Free memory for tmpfile name (git-fixes).
- ubifs: Re-statistic cleaned znode count if commit failed (git-fixes).
- ubifs: Rectify space amount budget for mkdir/tmpfile operations (git-fixes).
- ubifs: Rectify space budget for ubifs_symlink() if symlink is encrypted (git-fixes).
- ubifs: Rectify space budget for ubifs_xrename() (git-fixes).
- ubifs: Rename whiteout atomically (git-fixes).
- ubifs: rename_whiteout: correct old_dir size computing (git-fixes).
- ubifs: rename_whiteout: Fix double free for whiteout_ui-&gt;data (git-fixes).
- ubifs: Reserve one leb for each journal head while doing budget (git-fixes).
- ubifs: setflags: Make dirtied_ino_d 8 bytes aligned (git-fixes).
- ubifs: ubifs_writepage: Mark page dirty after writing inode failed (git-fixes).
- usb: dwc2: platform: Improve error reporting for problems during .remove() (git-fixes).
- usb: dwc3: do not reset device side if dwc3 was configured as host-only (git-fixes).
- usb: dwc3: pci: skip BYT GPIO lookup table for hardwired phy (git-fixes).
- usb: gadget: core: remove unbalanced mutex_unlock in usb_gadget_activate (git-fixes).
- USB: serial: option: add LARA-R6 01B PIDs (git-fixes).
- usb: typec: Iterate pds array when showing the pd list (git-fixes).
- usb: typec: Set port-&gt;pd before adding device for typec_port (git-fixes).
- usb: typec: Use sysfs_emit_at when concatenating the string (git-fixes).
- usb: xhci-mtk: set the dma max_seg_size (git-fixes).
- vhost_net: revert upend_idx only on retriable error (git-fixes).
- vhost: support PACKED when setting-getting vring_base (git-fixes).
- virtio_net: Fix error unwinding of XDP initialization (git-fixes).
- virtio-net: Maintain reverse cleanup order (git-fixes).
- wifi: ath11k: add support for suspend in power down state (bsc#1207948).
- wifi: ath11k: handle irq enable/disable in several code path (bsc#1207948).
- wifi: ath11k: handle thermal device registeration together with MAC (bsc#1207948).
- wifi: ath11k: remove MHI LOOPBACK channels (bsc#1207948).
- wifi: ray_cs: Drop useless status variable in parse_addr() (git-fixes).
- wifi: ray_cs: Utilize strnlen() in parse_addr() (git-fixes).
- wl3501_cs: use eth_hw_addr_set() (git-fixes).
- x86/PVH: obtain VGA console info in Dom0 (git-fixes).
- x86/speculation: Add Kconfig option for GDS (bsc#1206418, CVE-2022-40982).
- x86/srso: Add IBPB on VMEXIT (bsc#1213287, CVE-2023-20569).
- x86/srso: Tie SBPB bit setting to microcode patch detection (bsc#1213287, CVE-2023-20569).
- xen/blkfront: Only check REQ_FUA for writes (git-fixes).
- xen/pvcalls-back: fix double frees with pvcalls_new_active_socket() (git-fixes).
- xfs: AIL needs asynchronous CIL forcing (bsc#1211811).
- xfs: async CIL flushes need pending pushes to be made stable (bsc#1211811).
- xfs: attach iclog callbacks in xlog_cil_set_ctx_write_state() (bsc#1211811).
- xfs: CIL work is serialised, not pipelined (bsc#1211811).
- xfs: do not run shutdown callbacks on active iclogs (bsc#1211811).
- xfs: drop async cache flushes from CIL commits (bsc#1211811).
- xfs: factor out log write ordering from xlog_cil_push_work() (bsc#1211811).
- xfs: move the CIL workqueue to the CIL (bsc#1211811).
- xfs: move xlog_commit_record to xfs_log_cil.c (bsc#1211811).
- xfs: order CIL checkpoint start records (bsc#1211811).
- xfs: pass a CIL context to xlog_write() (bsc#1211811).
- xfs: rework xlog_state_do_callback() (bsc#1211811).
- xfs: run callbacks before waking waiters in xlog_state_shutdown_callbacks (bsc#1211811).
- xfs: separate out log shutdown callback processing (bsc#1211811).
- xfs: wait iclog complete before tearing down AIL (bsc#1211811).
- xfs: XLOG_STATE_IOERROR must die (bsc#1211811).
- xhci: Fix resume issue of some ZHAOXIN hosts (git-fixes).
- xhci: Fix TRB prefetch issue of ZHAOXIN hosts (git-fixes).
- xhci: Show ZHAOXIN xHCI root hub speed correctly (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-22"/>
	<updated date="2023-08-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206418">SUSE bug 1206418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207129">SUSE bug 1207129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207948">SUSE bug 1207948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210627">SUSE bug 1210627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210780">SUSE bug 1210780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210825">SUSE bug 1210825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211131">SUSE bug 1211131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211738">SUSE bug 1211738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211811">SUSE bug 1211811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212445">SUSE bug 1212445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212502">SUSE bug 1212502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212604">SUSE bug 1212604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212766">SUSE bug 1212766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212901">SUSE bug 1212901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213167">SUSE bug 1213167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213272">SUSE bug 1213272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213287">SUSE bug 1213287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213304">SUSE bug 1213304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213417">SUSE bug 1213417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213578">SUSE bug 1213578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213585">SUSE bug 1213585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213586">SUSE bug 1213586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213588">SUSE bug 1213588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213601">SUSE bug 1213601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213620">SUSE bug 1213620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213632">SUSE bug 1213632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213653">SUSE bug 1213653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213713">SUSE bug 1213713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213715">SUSE bug 1213715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213747">SUSE bug 1213747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213756">SUSE bug 1213756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213759">SUSE bug 1213759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213777">SUSE bug 1213777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213810">SUSE bug 1213810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213812">SUSE bug 1213812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213856">SUSE bug 1213856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213857">SUSE bug 1213857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213863">SUSE bug 1213863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213867">SUSE bug 1213867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213870">SUSE bug 1213870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213871">SUSE bug 1213871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213872">SUSE bug 1213872</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0459/">CVE-2023-0459 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0459">CVE-2023-0459 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-21400/">CVE-2023-21400 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21400">CVE-2023-21400 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2156/">CVE-2023-2156 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2156">CVE-2023-2156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2166/">CVE-2023-2166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2166">CVE-2023-2166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31083/">CVE-2023-31083 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31083">CVE-2023-31083 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3268/">CVE-2023-3268 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3268">CVE-2023-3268 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3567/">CVE-2023-3567 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3567">CVE-2023-3567 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3609/">CVE-2023-3609 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3609">CVE-2023-3609 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3611/">CVE-2023-3611 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3611">CVE-2023-3611 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3776/">CVE-2023-3776 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3776">CVE-2023-3776 at NVD</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38409/">CVE-2023-38409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38409">CVE-2023-38409 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3863/">CVE-2023-3863 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3863">CVE-2023-3863 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4004/">CVE-2023-4004 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4004">CVE-2023-4004 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009778275" comment="cluster-md-kmp-azure-5.14.21-150500.33.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778276" comment="dlm-kmp-azure-5.14.21-150500.33.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778277" comment="gfs2-kmp-azure-5.14.21-150500.33.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778278" comment="kernel-azure-5.14.21-150500.33.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778279" comment="kernel-azure-devel-5.14.21-150500.33.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778280" comment="kernel-azure-extra-5.14.21-150500.33.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778281" comment="kernel-azure-livepatch-devel-5.14.21-150500.33.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778282" comment="kernel-azure-optional-5.14.21-150500.33.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778283" comment="kernel-azure-vdso-5.14.21-150500.33.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778284" comment="kernel-devel-azure-5.14.21-150500.33.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778285" comment="kernel-source-azure-5.14.21-150500.33.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778286" comment="kernel-syms-azure-5.14.21-150500.33.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778287" comment="kselftests-kmp-azure-5.14.21-150500.33.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778288" comment="ocfs2-kmp-azure-5.14.21-150500.33.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778289" comment="reiserfs-kmp-azure-5.14.21-150500.33.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4316" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs18 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214150" ref_url="https://bugzilla.suse.com/1214150" source="BUGZILLA"/>
		<reference ref_id="1214154" ref_url="https://bugzilla.suse.com/1214154" source="BUGZILLA"/>
		<reference ref_id="1214156" ref_url="https://bugzilla.suse.com/1214156" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32002" ref_url="https://www.suse.com/security/cve/CVE-2023-32002/" source="CVE"/>
		<reference ref_id="CVE-2023-32006" ref_url="https://www.suse.com/security/cve/CVE-2023-32006/" source="CVE"/>
		<reference ref_id="CVE-2023-32559" ref_url="https://www.suse.com/security/cve/CVE-2023-32559/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015991.html" source="SUSE-SU"/>
		<description>
This update for nodejs18 fixes the following issues:

Update to LTS version 18.17.1.

- CVE-2023-32002: Fixed permissions policies bypass via Module._load (bsc#1214150).
- CVE-2023-32006: Fixed permissions policies impersonation using module.constructor.createRequire() (bsc#1214156).
- CVE-2023-32559: Fixed permissions policies bypass via process.binding (bsc#1214154).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-22"/>
	<updated date="2023-08-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214150">SUSE bug 1214150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214154">SUSE bug 1214154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214156">SUSE bug 1214156</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-32002/">CVE-2023-32002 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32002">CVE-2023-32002 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-32006/">CVE-2023-32006 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32006">CVE-2023-32006 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-32559/">CVE-2023-32559 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32559">CVE-2023-32559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009778176" comment="corepack18-18.17.1-150400.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778177" comment="nodejs18-18.17.1-150400.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778178" comment="nodejs18-devel-18.17.1-150400.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778179" comment="nodejs18-docs-18.17.1-150400.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778180" comment="npm18-18.17.1-150400.9.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4317" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206418" ref_url="https://bugzilla.suse.com/1206418" source="BUGZILLA"/>
		<reference ref_id="1214099" ref_url="https://bugzilla.suse.com/1214099" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982/" source="CVE"/>
		<reference ref_id="CVE-2022-41804" ref_url="https://www.suse.com/security/cve/CVE-2022-41804/" source="CVE"/>
		<reference ref_id="CVE-2023-23908" ref_url="https://www.suse.com/security/cve/CVE-2023-23908/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015993.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to Intel CPU Microcode 20230808 release. (bsc#1214099)
- CVE-2022-40982: Fixed a potential security vulnerability in some Intel? Processors which may allow information disclosure.
- CVE-2023-23908: Fixed a potential security vulnerability in some 3rd Generation Intel? Xeon? Scalable processors which may allow information disclosure.
- CVE-2022-41804: Fixed a potential security vulnerability in some Intel? Xeon? Processors with Intel? Software Guard Extensions (SGX) which may allow escalation of privilege.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-23"/>
	<updated date="2023-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206418">SUSE bug 1206418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214099">SUSE bug 1214099</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41804/">CVE-2022-41804 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41804">CVE-2022-41804 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-23908/">CVE-2023-23908 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23908">CVE-2023-23908 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778161" comment="ucode-intel-20230808-150200.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4318" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql15 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214059" ref_url="https://bugzilla.suse.com/1214059" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39417" ref_url="https://www.suse.com/security/cve/CVE-2023-39417/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015996.html" source="SUSE-SU"/>
		<description>
This update for postgresql15 fixes the following issues:

- Update to 12.16
- CVE-2023-39417: Fixed potential SQL injection for trusted extensions. (bsc#1214059)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-23"/>
	<updated date="2023-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214059">SUSE bug 1214059</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39417/">CVE-2023-39417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39417">CVE-2023-39417 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009778960" comment="postgresql12-12.16-150200.8.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778961" comment="postgresql12-contrib-12.16-150200.8.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778962" comment="postgresql12-devel-12.16-150200.8.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778963" comment="postgresql12-docs-12.16-150200.8.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778964" comment="postgresql12-llvmjit-12.16-150200.8.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778965" comment="postgresql12-llvmjit-devel-12.16-150200.8.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778966" comment="postgresql12-plperl-12.16-150200.8.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778967" comment="postgresql12-plpython-12.16-150200.8.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778968" comment="postgresql12-pltcl-12.16-150200.8.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778969" comment="postgresql12-server-12.16-150200.8.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778970" comment="postgresql12-server-devel-12.16-150200.8.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778971" comment="postgresql12-test-12.16-150200.8.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4319" version="1" class="patch">
	<metadata>
		<title>Security update for janino (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211923" ref_url="https://bugzilla.suse.com/1211923" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-33546" ref_url="https://www.suse.com/security/cve/CVE-2023-33546/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015995.html" source="SUSE-SU"/>
		<description>
This update for janino fixes the following issues:

  janino was upgraded to version 3.1.10:

  - CVE-2023-33546: Fixed DoS due to missing error handling (bsc#1211923).

		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-23"/>
	<updated date="2023-08-23"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1211923">SUSE bug 1211923</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-33546/">CVE-2023-33546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33546">CVE-2023-33546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009778849" comment="commons-compiler-3.1.10-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778857" comment="commons-compiler-jdk-3.1.10-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778850" comment="janino-3.1.10-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778851" comment="janino-javadoc-3.1.10-150200.3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4320" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206418" ref_url="https://bugzilla.suse.com/1206418" source="BUGZILLA"/>
		<reference ref_id="1207088" ref_url="https://bugzilla.suse.com/1207088" source="BUGZILLA"/>
		<reference ref_id="1210584" ref_url="https://bugzilla.suse.com/1210584" source="BUGZILLA"/>
		<reference ref_id="1211738" ref_url="https://bugzilla.suse.com/1211738" source="BUGZILLA"/>
		<reference ref_id="1211867" ref_url="https://bugzilla.suse.com/1211867" source="BUGZILLA"/>
		<reference ref_id="1212301" ref_url="https://bugzilla.suse.com/1212301" source="BUGZILLA"/>
		<reference ref_id="1212741" ref_url="https://bugzilla.suse.com/1212741" source="BUGZILLA"/>
		<reference ref_id="1212835" ref_url="https://bugzilla.suse.com/1212835" source="BUGZILLA"/>
		<reference ref_id="1213059" ref_url="https://bugzilla.suse.com/1213059" source="BUGZILLA"/>
		<reference ref_id="1213167" ref_url="https://bugzilla.suse.com/1213167" source="BUGZILLA"/>
		<reference ref_id="1213286" ref_url="https://bugzilla.suse.com/1213286" source="BUGZILLA"/>
		<reference ref_id="1213287" ref_url="https://bugzilla.suse.com/1213287" source="BUGZILLA"/>
		<reference ref_id="1213546" ref_url="https://bugzilla.suse.com/1213546" source="BUGZILLA"/>
		<reference ref_id="1213585" ref_url="https://bugzilla.suse.com/1213585" source="BUGZILLA"/>
		<reference ref_id="1213586" ref_url="https://bugzilla.suse.com/1213586" source="BUGZILLA"/>
		<reference ref_id="1213588" ref_url="https://bugzilla.suse.com/1213588" source="BUGZILLA"/>
		<reference ref_id="1213970" ref_url="https://bugzilla.suse.com/1213970" source="BUGZILLA"/>
		<reference ref_id="1214019" ref_url="https://bugzilla.suse.com/1214019" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982/" source="CVE"/>
		<reference ref_id="CVE-2023-0459" ref_url="https://www.suse.com/security/cve/CVE-2023-0459/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<reference ref_id="CVE-2023-2985" ref_url="https://www.suse.com/security/cve/CVE-2023-2985/" source="CVE"/>
		<reference ref_id="CVE-2023-34319" ref_url="https://www.suse.com/security/cve/CVE-2023-34319/" source="CVE"/>
		<reference ref_id="CVE-2023-35001" ref_url="https://www.suse.com/security/cve/CVE-2023-35001/" source="CVE"/>
		<reference ref_id="CVE-2023-3567" ref_url="https://www.suse.com/security/cve/CVE-2023-3567/" source="CVE"/>
		<reference ref_id="CVE-2023-3609" ref_url="https://www.suse.com/security/cve/CVE-2023-3609/" source="CVE"/>
		<reference ref_id="CVE-2023-3611" ref_url="https://www.suse.com/security/cve/CVE-2023-3611/" source="CVE"/>
		<reference ref_id="CVE-2023-3776" ref_url="https://www.suse.com/security/cve/CVE-2023-3776/" source="CVE"/>
		<reference ref_id="CVE-2023-4133" ref_url="https://www.suse.com/security/cve/CVE-2023-4133/" source="CVE"/>
		<reference ref_id="CVE-2023-4194" ref_url="https://www.suse.com/security/cve/CVE-2023-4194/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-40982: Fixed transient execution attack called 'Gather Data Sampling' (bsc#1206418).
- CVE-2023-0459: Fixed information leak in __uaccess_begin_nospec (bsc#1211738).
- CVE-2023-20569: Fixed side channel attack ‘Inception’ or ‘RAS Poisoning’ (bsc#1213287).
- CVE-2023-20593: Fixed a ZenBleed issue in 'Zen 2' CPUs that could allow an attacker to potentially access sensitive information (bsc#1213286).
- CVE-2023-2985: Fixed an use-after-free vulnerability in hfsplus_put_super in fs/hfsplus/super.c that could allow a local user to cause a denial of service (bsc#1211867).
- CVE-2023-34319: Fixed buffer overrun triggered by unusual packet in xen/netback (XSA-432) (bsc#1213546).
- CVE-2023-35001: Fixed an out-of-bounds memory access flaw in nft_byteorder that could allow a local attacker to escalate their privilege (bsc#1213059).
- CVE-2023-3567: Fixed a use-after-free in vcs_read in drivers/tty/vt/vc_screen.c (bsc#1213167).
- CVE-2023-3609: Fixed reference counter leak leading to  overflow in net/sched (bsc#1213586).
- CVE-2023-3611: Fixed an out-of-bounds write in net/sched sch_qfq(bsc#1213585).
- CVE-2023-3776: Fixed improper refcount update in  cls_fw leads to use-after-free (bsc#1213588).
- CVE-2023-4133: Fixed use after free bugs caused by circular dependency problem in cxgb4 (bsc#1213970).
- CVE-2023-4194: Fixed a type confusion in net tun_chr_open()  bsc#1214019).

The following non-security bugs were fixed:

- arm: spear: do not use timer namespace for timer_shutdown() function (bsc#1213970).
- clocksource/drivers/arm_arch_timer: do not use timer namespace for timer_shutdown() function (bsc#1213970).
- clocksource/drivers/sp804: do not use timer namespace for timer_shutdown() function (bsc#1213970).
- cpufeatures: allow adding more cpuid words
- get module prefix from kmod (bsc#1212835).
- kernel-binary.spec.in: remove superfluous %% in supplements fixes: 02b7735e0caf ('rpm/kernel-binary.spec.in: add enhances and supplements tags to in-tree kmps')
- kernel-docs: add buildrequires on python3-base when using python3 the python3 binary is provided by python3-base.
- kernel-docs: use python3 together with python3-sphinx (bsc#1212741).
- keys: change keyring_serialise_link_sem to a mutex (bsc#1207088).
- keys: fix linking a duplicate key to a keyring's assoc_array (bsc#1207088).
- keys: hoist locking out of __key_link_begin() (bsc#1207088).
- net/sched: sch_qfq: refactor parsing of netlink parameters (bsc#1213585).
- net: mana: add support for vlan tagging (bsc#1212301).
- readme.branch: add myself as co-maintainer
- remove more packaging cruft for sle &amp;lt; 12 sp3
- rpm/check-for-config-changes: ignore also pahole_has_* we now also have options like config_pahole_has_lang_exclude.
- rpm/check-for-config-changes: ignore also riscv_isa_* and dynamic_sigframe they depend on config_toolchain_has_*.
- timers: add shutdown mechanism to the internal functions (bsc#1213970).
- timers: provide timer_shutdown[_sync]() (bsc#1213970).
- timers: rename del_timer() to timer_delete() (bsc#1213970).
- timers: rename del_timer_sync() to timer_delete_sync() (bsc#1213970).
- timers: replace bug_on()s (bsc#1213970).
- timers: silently ignore timers with a null function (bsc#1213970).
- timers: split [try_to_]del_timer[_sync]() to prepare for shutdown mode (bsc#1213970).
- timers: update kernel-doc for various functions (bsc#1213970).
- timers: use del_timer_sync() even on up (bsc#1213970).
- ubi: ensure that vid header offset + vid header size &amp;lt;= alloc, size (bsc#1210584).
- ubi: fix failure attaching when vid_hdr offset equals to (sub)page size (bsc#1210584).
- usrmerge: Adjust module path in the kernel sources (bsc#1212835).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-23"/>
	<updated date="2023-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206418">SUSE bug 1206418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207088">SUSE bug 1207088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210584">SUSE bug 1210584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211738">SUSE bug 1211738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211867">SUSE bug 1211867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212301">SUSE bug 1212301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212741">SUSE bug 1212741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212835">SUSE bug 1212835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213059">SUSE bug 1213059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213167">SUSE bug 1213167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213286">SUSE bug 1213286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213287">SUSE bug 1213287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213546">SUSE bug 1213546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213585">SUSE bug 1213585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213586">SUSE bug 1213586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213588">SUSE bug 1213588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213970">SUSE bug 1213970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214019">SUSE bug 1214019</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0459/">CVE-2023-0459 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0459">CVE-2023-0459 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2985/">CVE-2023-2985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2985">CVE-2023-2985 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34319/">CVE-2023-34319 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34319">CVE-2023-34319 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35001/">CVE-2023-35001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35001">CVE-2023-35001 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3567/">CVE-2023-3567 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3567">CVE-2023-3567 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3609/">CVE-2023-3609 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3609">CVE-2023-3609 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3611/">CVE-2023-3611 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3611">CVE-2023-3611 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3776/">CVE-2023-3776 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3776">CVE-2023-3776 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4133/">CVE-2023-4133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4133">CVE-2023-4133 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4194/">CVE-2023-4194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4194">CVE-2023-4194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009779610" comment="kernel-vanilla-4.12.14-150100.197.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779611" comment="kernel-vanilla-base-4.12.14-150100.197.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779612" comment="kernel-vanilla-devel-4.12.14-150100.197.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779613" comment="kernel-vanilla-livepatch-devel-4.12.14-150100.197.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4321" version="1" class="patch">
	<metadata>
		<title>Security update for postfix (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211196" ref_url="https://bugzilla.suse.com/1211196" source="BUGZILLA"/>
		<reference ref_id="1213515" ref_url="https://bugzilla.suse.com/1213515" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32182" ref_url="https://www.suse.com/security/cve/CVE-2023-32182/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031154.html" source="SUSE-SU"/>
		<description>
This update for postfix fixes the following issues:

- CVE-2023-32182: Fixed config_postfix SUSE specific script potentially bad /tmp file usage (bsc#1211196).

- Update to from 3.7.2 to 3.7.3:
  - Fixes a bug where some messages were not delivered after 'warning: Unexpected record type 'X'. (bsc#1213515)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-23"/>
	<updated date="2023-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211196">SUSE bug 1211196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213515">SUSE bug 1213515</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-32182/">CVE-2023-32182 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32182">CVE-2023-32182 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009779630" comment="postfix-3.7.3-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779634" comment="postfix-bdb-3.7.3-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779635" comment="postfix-bdb-lmdb-3.7.3-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779631" comment="postfix-devel-3.7.3-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779632" comment="postfix-doc-3.7.3-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779633" comment="postfix-ldap-3.7.3-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779636" comment="postfix-mysql-3.7.3-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781021" comment="postfix-postgresql-3.7.3-150500.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4322" version="1" class="patch">
	<metadata>
		<title>Security update for erlang (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1205318" ref_url="https://bugzilla.suse.com/1205318" source="BUGZILLA"/>
		<reference ref_id="1207113" ref_url="https://bugzilla.suse.com/1207113" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-37026" ref_url="https://www.suse.com/security/cve/CVE-2022-37026/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3401-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031146.html" source="SUSE-SU"/>
		<description>
This update for erlang fixes the following issues:

- Replaced the CVE-2022-37026 patch with the one released by the upstream to fix a regression in the previous one. (bsc#1205318)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-23"/>
	<updated date="2023-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205318">SUSE bug 1205318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207113">SUSE bug 1207113</bugzilla>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-37026/">CVE-2022-37026 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37026">CVE-2022-37026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009778972" comment="erlang-22.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778973" comment="erlang-debugger-22.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778974" comment="erlang-debugger-src-22.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778975" comment="erlang-dialyzer-22.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778976" comment="erlang-dialyzer-src-22.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778977" comment="erlang-diameter-22.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778978" comment="erlang-diameter-src-22.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778979" comment="erlang-doc-22.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778980" comment="erlang-epmd-22.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778981" comment="erlang-et-22.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778982" comment="erlang-et-src-22.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778983" comment="erlang-jinterface-22.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778984" comment="erlang-jinterface-src-22.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778985" comment="erlang-observer-22.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778986" comment="erlang-observer-src-22.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778987" comment="erlang-reltool-22.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778988" comment="erlang-reltool-src-22.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778989" comment="erlang-src-22.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778990" comment="erlang-wx-22.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778991" comment="erlang-wx-src-22.3-150300.3.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4323" version="1" class="patch">
	<metadata>
		<title>Feature update for LibreOffice and xmlsec1 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1198666" ref_url="https://bugzilla.suse.com/1198666" source="BUGZILLA"/>
		<reference ref_id="1200085" ref_url="https://bugzilla.suse.com/1200085" source="BUGZILLA"/>
		<reference ref_id="1204040" ref_url="https://bugzilla.suse.com/1204040" source="BUGZILLA"/>
		<reference ref_id="1209242" ref_url="https://bugzilla.suse.com/1209242" source="BUGZILLA"/>
		<reference ref_id="1210687" ref_url="https://bugzilla.suse.com/1210687" source="BUGZILLA"/>
		<reference ref_id="1211746" ref_url="https://bugzilla.suse.com/1211746" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-0950" ref_url="https://www.suse.com/security/cve/CVE-2023-0950/" source="CVE"/>
		<reference ref_id="CVE-2023-2255" ref_url="https://www.suse.com/security/cve/CVE-2023-2255/" source="CVE"/>
		<reference ref_id="SUSE-FU-2023:3413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031163.html" source="SUSE-SU"/>
		<description>
This update for LibreOffice and xmlsec1 fixes the following issue:
    
libreoffice:

- Version update from 7.4.3.2 to 7.5.4.1 (jsc#PED-3561, jsc#PED-3550, jsc#3549):
  * For the highlights of changes of version 7.5 please consult the official release notes:
    https://wiki.documentfoundation.org/ReleaseNotes/7.5
  * Security issues fixed:
    + CVE-2023-0950: Fixed stack underflow in ScInterpreter (bsc#1209242)
    + CVE-2023-2255: Fixed vulnerability where remote documents could be loaded without prompt via IFrame (bsc#1211746)
  * Bug fixes:
    + Fix PPTX shadow effect for table offset (bsc#1204040)
    + Fix ability to set the default tab size for each text object (bsc#1198666)
    + Fix PPTX extra vertical space between different text formats (bsc#1200085)
    + Do not use binutils-gold as the package is unmaintained and will be removed in the future (boo#1210687)
  * Updated bundled dependencies:
    * boost version update from 1_77_0 to 1_80_0
    * curl version update from 7.83.1 to 8.0.1
    * gpgme version update from 1.16.0 to 1.18.0
    * icu4c-data version update from 70_1 to 72_1
    * icu4c version update from 70_1 to 72_1
    * pdfium version update from 4699 to 5408
    * poppler version update from 21.11.0 to 22.12.0

xmlsec1:
    
- Version update from 1.2.28 to 1.2.37 required by LibreOffice 7.5.2.2 (jsc#PED-3561, jsc#PED-3550):
  * Retired the XMLSec mailing list 'xmlsec@aleksey.com' and the XMLSec Online Signature Verifier.
  * Migration to OpenSSL 3.0 API Note that OpenSSL engines are disabled by default when XMLSec library is compiled
    against OpenSSL 3.0.
    To re-enable OpenSSL engines, use `--enable-openssl3-engines` configure flag 
    (there will be a lot of deprecation warnings).
  * The OpenSSL before 1.1.0 and LibreSSL before 2.7.0 are now deprecated and will be removed in the future versions of
    XMLSec Library.
  * Refactored all the integer casts to ensure cast-safety. Fixed all warnings and enabled `-Werror` and `-pedantic` 
    flags on CI builds.
  * Added configure flag to use size_t for xmlSecSize (currently disabled by default for backward compatibility).
  * Support for OpenSSL compiled with OPENSSL_NO_ERR.
  * Full support for LibreSSL 3.5.0 and above
  * Several other small fixes
  * Fix decrypting session key for two recipients 
  * Added `--privkey-openssl-engine` option to enhance openssl engine support
  * Remove MD5 for NSS 3.59 and above
  * Fix PKCS12_parse return code handling
  * Fix OpenSSL lookup
  * xmlSecX509DataGetNodeContent(): don't return 0 for non-empty elements - fix for LibreOffice
  * Unload error strings in OpenSSL shutdown.
  * Make userData available when executing preExecCallback function
  * Add an option to use secure memset.
  * Enabled XML_PARSE_HUGE for all xml parsers.
  * Various build and tests fixes and improvements.
  * Move remaining private header files away from xmlsec/include/`` folder
- Other packaging changes:
  * Relax the crypto policies for the test-suite. It allows the tests using certificates with small key lengths to pass.
  * Pass `--disable-md5` to configure: The cryptographic strength of the MD5 algorithm is sufficiently doubtful that its
    use is discouraged at this time. It is not listed as an algorithm in [XMLDSIG-CORE1]
    https://www.w3.org/TR/xmlsec-algorithms/#bib-XMLDSIG-CORE1
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-24"/>
	<updated date="2023-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198666">SUSE bug 1198666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200085">SUSE bug 1200085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204040">SUSE bug 1204040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209242">SUSE bug 1209242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210687">SUSE bug 1210687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211746">SUSE bug 1211746</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0950/">CVE-2023-0950 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0950">CVE-2023-0950 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2255/">CVE-2023-2255 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2255">CVE-2023-2255 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009779938" comment="libreoffice-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779939" comment="libreoffice-base-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779940" comment="libreoffice-base-drivers-postgresql-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779941" comment="libreoffice-branding-upstream-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779942" comment="libreoffice-calc-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779943" comment="libreoffice-calc-extensions-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779944" comment="libreoffice-draw-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779945" comment="libreoffice-filters-optional-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779946" comment="libreoffice-gdb-pretty-printers-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779947" comment="libreoffice-glade-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779948" comment="libreoffice-gnome-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779949" comment="libreoffice-gtk3-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779950" comment="libreoffice-icon-themes-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779951" comment="libreoffice-impress-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779952" comment="libreoffice-l10n-af-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779953" comment="libreoffice-l10n-am-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779954" comment="libreoffice-l10n-ar-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779955" comment="libreoffice-l10n-as-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779956" comment="libreoffice-l10n-ast-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779957" comment="libreoffice-l10n-be-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779958" comment="libreoffice-l10n-bg-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779959" comment="libreoffice-l10n-bn-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779960" comment="libreoffice-l10n-bn_IN-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779961" comment="libreoffice-l10n-bo-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779962" comment="libreoffice-l10n-br-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779963" comment="libreoffice-l10n-brx-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779964" comment="libreoffice-l10n-bs-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779965" comment="libreoffice-l10n-ca-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779966" comment="libreoffice-l10n-ca_valencia-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779967" comment="libreoffice-l10n-ckb-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779968" comment="libreoffice-l10n-cs-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779969" comment="libreoffice-l10n-cy-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779970" comment="libreoffice-l10n-da-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779971" comment="libreoffice-l10n-de-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779972" comment="libreoffice-l10n-dgo-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779973" comment="libreoffice-l10n-dsb-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779974" comment="libreoffice-l10n-dz-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779975" comment="libreoffice-l10n-el-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779976" comment="libreoffice-l10n-en-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779977" comment="libreoffice-l10n-en_GB-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779978" comment="libreoffice-l10n-en_ZA-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779979" comment="libreoffice-l10n-eo-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779980" comment="libreoffice-l10n-es-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779981" comment="libreoffice-l10n-et-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779982" comment="libreoffice-l10n-eu-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779983" comment="libreoffice-l10n-fa-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779984" comment="libreoffice-l10n-fi-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779985" comment="libreoffice-l10n-fr-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779986" comment="libreoffice-l10n-fur-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779987" comment="libreoffice-l10n-fy-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779988" comment="libreoffice-l10n-ga-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779989" comment="libreoffice-l10n-gd-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779990" comment="libreoffice-l10n-gl-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779991" comment="libreoffice-l10n-gu-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779992" comment="libreoffice-l10n-gug-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779993" comment="libreoffice-l10n-he-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779994" comment="libreoffice-l10n-hi-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779995" comment="libreoffice-l10n-hr-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779996" comment="libreoffice-l10n-hsb-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779997" comment="libreoffice-l10n-hu-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779998" comment="libreoffice-l10n-id-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779999" comment="libreoffice-l10n-is-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780000" comment="libreoffice-l10n-it-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780001" comment="libreoffice-l10n-ja-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780002" comment="libreoffice-l10n-ka-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780003" comment="libreoffice-l10n-kab-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780004" comment="libreoffice-l10n-kk-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780005" comment="libreoffice-l10n-km-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780006" comment="libreoffice-l10n-kmr_Latn-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780007" comment="libreoffice-l10n-kn-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780008" comment="libreoffice-l10n-ko-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780009" comment="libreoffice-l10n-kok-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780010" comment="libreoffice-l10n-ks-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780011" comment="libreoffice-l10n-lb-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780012" comment="libreoffice-l10n-lo-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780013" comment="libreoffice-l10n-lt-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780014" comment="libreoffice-l10n-lv-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780015" comment="libreoffice-l10n-mai-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780016" comment="libreoffice-l10n-mk-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780017" comment="libreoffice-l10n-ml-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780018" comment="libreoffice-l10n-mn-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780019" comment="libreoffice-l10n-mni-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780020" comment="libreoffice-l10n-mr-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780021" comment="libreoffice-l10n-my-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780022" comment="libreoffice-l10n-nb-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780023" comment="libreoffice-l10n-ne-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780024" comment="libreoffice-l10n-nl-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780025" comment="libreoffice-l10n-nn-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780026" comment="libreoffice-l10n-nr-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780027" comment="libreoffice-l10n-nso-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780028" comment="libreoffice-l10n-oc-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780029" comment="libreoffice-l10n-om-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780030" comment="libreoffice-l10n-or-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780031" comment="libreoffice-l10n-pa-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780032" comment="libreoffice-l10n-pl-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780033" comment="libreoffice-l10n-pt_BR-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780034" comment="libreoffice-l10n-pt_PT-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780035" comment="libreoffice-l10n-ro-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780036" comment="libreoffice-l10n-ru-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780037" comment="libreoffice-l10n-rw-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780038" comment="libreoffice-l10n-sa_IN-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780039" comment="libreoffice-l10n-sat-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780040" comment="libreoffice-l10n-sd-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780041" comment="libreoffice-l10n-si-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780042" comment="libreoffice-l10n-sid-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780043" comment="libreoffice-l10n-sk-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780044" comment="libreoffice-l10n-sl-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780045" comment="libreoffice-l10n-sq-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780046" comment="libreoffice-l10n-sr-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780047" comment="libreoffice-l10n-ss-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780048" comment="libreoffice-l10n-st-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780049" comment="libreoffice-l10n-sv-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780050" comment="libreoffice-l10n-sw_TZ-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780051" comment="libreoffice-l10n-szl-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780052" comment="libreoffice-l10n-ta-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780053" comment="libreoffice-l10n-te-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780054" comment="libreoffice-l10n-tg-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780055" comment="libreoffice-l10n-th-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780056" comment="libreoffice-l10n-tn-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780057" comment="libreoffice-l10n-tr-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780058" comment="libreoffice-l10n-ts-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780059" comment="libreoffice-l10n-tt-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780060" comment="libreoffice-l10n-ug-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780061" comment="libreoffice-l10n-uk-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780062" comment="libreoffice-l10n-uz-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780063" comment="libreoffice-l10n-ve-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780064" comment="libreoffice-l10n-vec-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780065" comment="libreoffice-l10n-vi-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780066" comment="libreoffice-l10n-xh-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780067" comment="libreoffice-l10n-zh_CN-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780068" comment="libreoffice-l10n-zh_TW-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780069" comment="libreoffice-l10n-zu-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780070" comment="libreoffice-librelogo-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780071" comment="libreoffice-mailmerge-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780072" comment="libreoffice-math-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780073" comment="libreoffice-officebean-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780074" comment="libreoffice-pyuno-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780075" comment="libreoffice-qt5-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780076" comment="libreoffice-sdk-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780077" comment="libreoffice-sdk-doc-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780078" comment="libreoffice-writer-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780079" comment="libreoffice-writer-extensions-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780080" comment="libreofficekit-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780081" comment="libreofficekit-devel-7.5.4.1-150400.17.12.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780082" comment="libxmlsec1-1-1.2.37-150400.14.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780083" comment="libxmlsec1-gcrypt1-1.2.37-150400.14.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780084" comment="libxmlsec1-gnutls1-1.2.37-150400.14.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780085" comment="libxmlsec1-nss1-1.2.37-150400.14.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780086" comment="libxmlsec1-openssl1-1.2.37-150400.14.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780087" comment="xmlsec1-1.2.37-150400.14.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780088" comment="xmlsec1-devel-1.2.37-150400.14.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780089" comment="xmlsec1-gcrypt-devel-1.2.37-150400.14.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780090" comment="xmlsec1-gnutls-devel-1.2.37-150400.14.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780091" comment="xmlsec1-nss-devel-1.2.37-150400.14.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780092" comment="xmlsec1-openssl-devel-1.2.37-150400.14.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4324" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212863" ref_url="https://bugzilla.suse.com/1212863" source="BUGZILLA"/>
		<reference ref_id="1213905" ref_url="https://bugzilla.suse.com/1213905" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48503" ref_url="https://www.suse.com/security/cve/CVE-2022-48503/" source="CVE"/>
		<reference ref_id="CVE-2023-32435" ref_url="https://www.suse.com/security/cve/CVE-2023-32435/" source="CVE"/>
		<reference ref_id="CVE-2023-32439" ref_url="https://www.suse.com/security/cve/CVE-2023-32439/" source="CVE"/>
		<reference ref_id="CVE-2023-38133" ref_url="https://www.suse.com/security/cve/CVE-2023-38133/" source="CVE"/>
		<reference ref_id="CVE-2023-38572" ref_url="https://www.suse.com/security/cve/CVE-2023-38572/" source="CVE"/>
		<reference ref_id="CVE-2023-38592" ref_url="https://www.suse.com/security/cve/CVE-2023-38592/" source="CVE"/>
		<reference ref_id="CVE-2023-38594" ref_url="https://www.suse.com/security/cve/CVE-2023-38594/" source="CVE"/>
		<reference ref_id="CVE-2023-38595" ref_url="https://www.suse.com/security/cve/CVE-2023-38595/" source="CVE"/>
		<reference ref_id="CVE-2023-38597" ref_url="https://www.suse.com/security/cve/CVE-2023-38597/" source="CVE"/>
		<reference ref_id="CVE-2023-38599" ref_url="https://www.suse.com/security/cve/CVE-2023-38599/" source="CVE"/>
		<reference ref_id="CVE-2023-38600" ref_url="https://www.suse.com/security/cve/CVE-2023-38600/" source="CVE"/>
		<reference ref_id="CVE-2023-38611" ref_url="https://www.suse.com/security/cve/CVE-2023-38611/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016017.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.40.5 (bsc#1213905):

- CVE-2023-38133: Fixed information disclosure.
- CVE-2023-38572: Fixed Same-Origin-Policy bypass.
- CVE-2023-38592: Fixed arbitrary code execution.
- CVE-2023-38594: Fixed arbitrary code execution.
- CVE-2023-38595: Fixed arbitrary code execution.
- CVE-2023-38597: Fixed arbitrary code execution.
- CVE-2023-38599: Fixed sensitive user information tracking.
- CVE-2023-38600: Fixed arbitrary code execution.
- CVE-2023-38611: Fixed arbitrary code execution.

Update to version 2.40.3 (bsc#1212863):

- CVE-2023-32439: Fixed a bug where processing maliciously crafted web content may lead to arbitrary code execution. (bsc#1212863)
- CVE-2023-32435: Fixed a bug where processing web content may lead to arbitrary code execution. (bsc#1212863)
- CVE-2022-48503: Fixed a bug where processing web content may lead to arbitrary code execution. (bsc#1212863)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-24"/>
	<updated date="2023-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212863">SUSE bug 1212863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213905">SUSE bug 1213905</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48503/">CVE-2022-48503 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48503">CVE-2022-48503 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32435/">CVE-2023-32435 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32435">CVE-2023-32435 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32439/">CVE-2023-32439 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32439">CVE-2023-32439 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-38133/">CVE-2023-38133 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38133">CVE-2023-38133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38572/">CVE-2023-38572 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38572">CVE-2023-38572 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38592/">CVE-2023-38592 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38592">CVE-2023-38592 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38594/">CVE-2023-38594 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38594">CVE-2023-38594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38595/">CVE-2023-38595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38595">CVE-2023-38595 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38597/">CVE-2023-38597 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38597">CVE-2023-38597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38599/">CVE-2023-38599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38599">CVE-2023-38599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38600/">CVE-2023-38600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38600">CVE-2023-38600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38611/">CVE-2023-38611 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38611">CVE-2023-38611 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009777734" comment="WebKitGTK-4.0-lang-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777735" comment="WebKitGTK-4.1-lang-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777736" comment="WebKitGTK-6.0-lang-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777585" comment="libjavascriptcoregtk-4_0-18-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777586" comment="libjavascriptcoregtk-4_0-18-32bit-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777737" comment="libjavascriptcoregtk-4_0-18-64bit-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777587" comment="libjavascriptcoregtk-4_1-0-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777588" comment="libjavascriptcoregtk-4_1-0-32bit-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777738" comment="libjavascriptcoregtk-4_1-0-64bit-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777739" comment="libjavascriptcoregtk-6_0-1-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777589" comment="libwebkit2gtk-4_0-37-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777590" comment="libwebkit2gtk-4_0-37-32bit-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777740" comment="libwebkit2gtk-4_0-37-64bit-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777591" comment="libwebkit2gtk-4_1-0-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777592" comment="libwebkit2gtk-4_1-0-32bit-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777741" comment="libwebkit2gtk-4_1-0-64bit-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777742" comment="libwebkitgtk-6_0-4-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777593" comment="typelib-1_0-JavaScriptCore-4_0-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777594" comment="typelib-1_0-JavaScriptCore-4_1-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777743" comment="typelib-1_0-JavaScriptCore-6_0-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777744" comment="typelib-1_0-WebKit-6_0-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777595" comment="typelib-1_0-WebKit2-4_0-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777596" comment="typelib-1_0-WebKit2-4_1-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777597" comment="typelib-1_0-WebKit2WebExtension-4_0-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777598" comment="typelib-1_0-WebKit2WebExtension-4_1-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777745" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777599" comment="webkit-jsc-4-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777600" comment="webkit-jsc-4.1-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777746" comment="webkit-jsc-6.0-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777601" comment="webkit2gtk-4_0-injected-bundles-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777602" comment="webkit2gtk-4_1-injected-bundles-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777603" comment="webkit2gtk3-devel-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777604" comment="webkit2gtk3-minibrowser-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777605" comment="webkit2gtk3-soup2-devel-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777606" comment="webkit2gtk3-soup2-minibrowser-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777607" comment="webkit2gtk4-devel-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777608" comment="webkit2gtk4-minibrowser-2.40.5-150400.4.45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777747" comment="webkitgtk-6_0-injected-bundles-2.40.5-150400.4.45.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4325" version="1" class="patch">
	<metadata>
		<title>Security update for indent (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214243" ref_url="https://bugzilla.suse.com/1214243" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40305" ref_url="https://www.suse.com/security/cve/CVE-2023-40305/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016018.html" source="SUSE-SU"/>
		<description>
This update for indent fixes the following issues:

- CVE-2023-40305: Fixed a memory safety issues bug. (bsc#1214243)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-24"/>
	<updated date="2023-08-24"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1214243">SUSE bug 1214243</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40305/">CVE-2023-40305 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40305">CVE-2023-40305 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779457" comment="indent-2.2.11-150000.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4326" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213637" ref_url="https://bugzilla.suse.com/1213637" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38559" ref_url="https://www.suse.com/security/cve/CVE-2023-38559/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016028.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2023-38559: Fixed out-of-bounds read in devn_pcx_write_rle() that could result in DoS (bsc#1213637).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-28"/>
	<updated date="2023-08-28"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1213637">SUSE bug 1213637</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38559/">CVE-2023-38559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38559">CVE-2023-38559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009774892" comment="ghostscript-9.52-150000.170.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774893" comment="ghostscript-devel-9.52-150000.170.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009774894" comment="ghostscript-x11-9.52-150000.170.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4327" version="1" class="patch">
	<metadata>
		<title>Security update for gawk (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214025" ref_url="https://bugzilla.suse.com/1214025" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4156" ref_url="https://www.suse.com/security/cve/CVE-2023-4156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016026.html" source="SUSE-SU"/>
		<description>
This update for gawk fixes the following issues:

- CVE-2023-4156: Fix a heap out of bound read by validating the index into argument list. (bsc#1214025)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-28"/>
	<updated date="2023-08-28"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1214025">SUSE bug 1214025</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4156/">CVE-2023-4156 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4156">CVE-2023-4156 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777748" comment="gawk-4.2.1-150000.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4328" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1207922" ref_url="https://bugzilla.suse.com/1207922" source="BUGZILLA"/>
		<reference ref_id="1213473" ref_url="https://bugzilla.suse.com/1213473" source="BUGZILLA"/>
		<reference ref_id="1213474" ref_url="https://bugzilla.suse.com/1213474" source="BUGZILLA"/>
		<reference ref_id="1213475" ref_url="https://bugzilla.suse.com/1213475" source="BUGZILLA"/>
		<reference ref_id="1213479" ref_url="https://bugzilla.suse.com/1213479" source="BUGZILLA"/>
		<reference ref_id="1213481" ref_url="https://bugzilla.suse.com/1213481" source="BUGZILLA"/>
		<reference ref_id="1213482" ref_url="https://bugzilla.suse.com/1213482" source="BUGZILLA"/>
		<reference ref_id="1213541" ref_url="https://bugzilla.suse.com/1213541" source="BUGZILLA"/>
		<reference ref_id="1213934" ref_url="https://bugzilla.suse.com/1213934" source="BUGZILLA"/>
		<reference ref_id="1214431" ref_url="https://bugzilla.suse.com/1214431" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40609" ref_url="https://www.suse.com/security/cve/CVE-2022-40609/" source="CVE"/>
		<reference ref_id="CVE-2023-22006" ref_url="https://www.suse.com/security/cve/CVE-2023-22006/" source="CVE"/>
		<reference ref_id="CVE-2023-22036" ref_url="https://www.suse.com/security/cve/CVE-2023-22036/" source="CVE"/>
		<reference ref_id="CVE-2023-22041" ref_url="https://www.suse.com/security/cve/CVE-2023-22041/" source="CVE"/>
		<reference ref_id="CVE-2023-22044" ref_url="https://www.suse.com/security/cve/CVE-2023-22044/" source="CVE"/>
		<reference ref_id="CVE-2023-22045" ref_url="https://www.suse.com/security/cve/CVE-2023-22045/" source="CVE"/>
		<reference ref_id="CVE-2023-22049" ref_url="https://www.suse.com/security/cve/CVE-2023-22049/" source="CVE"/>
		<reference ref_id="CVE-2023-25193" ref_url="https://www.suse.com/security/cve/CVE-2023-25193/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016025.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 8 Fix Pack 10 (bsc#1213541)
- CVE-2022-40609: Fixed an unsafe deserialization flaw which could allow a remote attacker to execute arbitrary code on the system. (bsc#1213934)
- CVE-2023-22041: Fixed a flaw whcih could allow unauthorized access to critical data or complete access. (bsc#1213475)
- CVE-2023-22049: Fixed a flaw which could result in unauthorized update. (bsc#1213482)
- CVE-2023-22045: Fixed a flaw which could result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. (bsc#1213481)
- CVE-2023-22044: Fixed a flaw which could result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. (bsc#1213479)
- CVE-2023-22036: Fixed a flaw which could result in unauthorized ability to cause a partial denial of service. (bsc#1213474)
- CVE-2023-25193: Fixed a flaw which could allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks. (bsc#1207922)
- CVE-2023-22006: Fixed a flaw which could result in unauthorized update, insert or delete access for JDK accessible data. (bsc#1213473)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-28"/>
	<updated date="2023-08-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207922">SUSE bug 1207922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213473">SUSE bug 1213473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213474">SUSE bug 1213474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213475">SUSE bug 1213475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213479">SUSE bug 1213479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213481">SUSE bug 1213481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213482">SUSE bug 1213482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213541">SUSE bug 1213541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213934">SUSE bug 1213934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214431">SUSE bug 1214431</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40609/">CVE-2022-40609 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40609">CVE-2022-40609 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22006/">CVE-2023-22006 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22006">CVE-2023-22006 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22036/">CVE-2023-22036 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22036">CVE-2023-22036 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22041/">CVE-2023-22041 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22041">CVE-2023-22041 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22044/">CVE-2023-22044 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22044">CVE-2023-22044 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22045/">CVE-2023-22045 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22045">CVE-2023-22045 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22049/">CVE-2023-22049 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22049">CVE-2023-22049 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25193/">CVE-2023-25193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25193">CVE-2023-25193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009779458" comment="java-1_8_0-ibm-1.8.0_sr8.10-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779459" comment="java-1_8_0-ibm-32bit-1.8.0_sr8.10-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779460" comment="java-1_8_0-ibm-alsa-1.8.0_sr8.10-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779461" comment="java-1_8_0-ibm-demo-1.8.0_sr8.10-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779462" comment="java-1_8_0-ibm-devel-1.8.0_sr8.10-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779463" comment="java-1_8_0-ibm-devel-32bit-1.8.0_sr8.10-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779464" comment="java-1_8_0-ibm-plugin-1.8.0_sr8.10-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779465" comment="java-1_8_0-ibm-src-1.8.0_sr8.10-150000.3.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4329" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213481" ref_url="https://bugzilla.suse.com/1213481" source="BUGZILLA"/>
		<reference ref_id="1213482" ref_url="https://bugzilla.suse.com/1213482" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-22045" ref_url="https://www.suse.com/security/cve/CVE-2023-22045/" source="CVE"/>
		<reference ref_id="CVE-2023-22049" ref_url="https://www.suse.com/security/cve/CVE-2023-22049/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3442-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031212.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version jdk8u382 (icedtea-3.28.0):
 
- CVE-2023-22045: Fixed a difficult to exploit vulnerability that allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK (bsc#1213481).
- CVE-2023-22049: Fixed a difficult to exploit vulnerability that allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK (bsc#1213482).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-28"/>
	<updated date="2023-08-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213481">SUSE bug 1213481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213482">SUSE bug 1213482</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22045/">CVE-2023-22045 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22045">CVE-2023-22045 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22049/">CVE-2023-22049 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22049">CVE-2023-22049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009777004" comment="java-1_8_0-openjdk-1.8.0.382-150000.3.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777005" comment="java-1_8_0-openjdk-accessibility-1.8.0.382-150000.3.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777006" comment="java-1_8_0-openjdk-demo-1.8.0.382-150000.3.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777007" comment="java-1_8_0-openjdk-devel-1.8.0.382-150000.3.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777008" comment="java-1_8_0-openjdk-headless-1.8.0.382-150000.3.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777009" comment="java-1_8_0-openjdk-javadoc-1.8.0.382-150000.3.82.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009777010" comment="java-1_8_0-openjdk-src-1.8.0.382-150000.3.82.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4330" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1212684" ref_url="https://bugzilla.suse.com/1212684" source="BUGZILLA"/>
		<reference ref_id="1213616" ref_url="https://bugzilla.suse.com/1213616" source="BUGZILLA"/>
		<reference ref_id="1214082" ref_url="https://bugzilla.suse.com/1214082" source="BUGZILLA"/>
		<reference ref_id="1214083" ref_url="https://bugzilla.suse.com/1214083" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982/" source="CVE"/>
		<reference ref_id="CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569/" source="CVE"/>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031207.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2023-20569: Fixed side channel attack Inception or RAS Poisoning. (bsc#1214082, XSA-434)
- CVE-2022-40982: Fixed transient execution attack called 'Gather Data Sampling'. (bsc#1214083, XSA-435)
- CVE-2023-20593: Fixed a ZenBleed issue in 'Zen 2' CPUs that could allow an attacker to potentially access sensitive information. (bsc#1213616, XSA-433)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-28"/>
	<updated date="2023-08-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212684">SUSE bug 1212684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213616">SUSE bug 1213616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214082">SUSE bug 1214082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214083">SUSE bug 1214083</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009778593" comment="xen-4.17.2_02-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778594" comment="xen-devel-4.17.2_02-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778595" comment="xen-doc-html-4.17.2_02-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778596" comment="xen-libs-4.17.2_02-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778597" comment="xen-libs-32bit-4.17.2_02-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778598" comment="xen-tools-4.17.2_02-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778599" comment="xen-tools-domU-4.17.2_02-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778600" comment="xen-tools-xendomains-wait-disk-4.17.2_02-150500.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4331" version="1" class="patch">
	<metadata>
		<title>Security update for ca-certificates-mozilla (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214248" ref_url="https://bugzilla.suse.com/1214248" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:3454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016029.html" source="SUSE-SU"/>
		<description>
This update for ca-certificates-mozilla fixes the following issues:

- Updated to 2.62 state of Mozilla SSL root CAs (bsc#1214248)
  Added:
  - Atos TrustedRoot Root CA ECC G2 2020
  - Atos TrustedRoot Root CA ECC TLS 2021
  - Atos TrustedRoot Root CA RSA G2 2020
  - Atos TrustedRoot Root CA RSA TLS 2021
  - BJCA Global Root CA1
  - BJCA Global Root CA2
  - LAWtrust Root CA2 (4096)
  - Sectigo Public Email Protection Root E46
  - Sectigo Public Email Protection Root R46
  - Sectigo Public Server Authentication Root E46
  - Sectigo Public Server Authentication Root R46
  - SSL.com Client ECC Root CA 2022
  - SSL.com Client RSA Root CA 2022
  - SSL.com TLS ECC Root CA 2022
  - SSL.com TLS RSA Root CA 2022
  Removed CAs:
  - Chambers of Commerce Root
  - E-Tugra Certification Authority
  - E-Tugra Global Root CA ECC v3
  - E-Tugra Global Root CA RSA v3
  - Hongkong Post Root CA 1
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-28"/>
	<updated date="2023-08-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214248">SUSE bug 1214248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009778601" comment="ca-certificates-mozilla-2.62-150200.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778602" comment="ca-certificates-mozilla-prebuilt-2.62-150200.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4332" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214342" ref_url="https://bugzilla.suse.com/1214342" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-20197" ref_url="https://www.suse.com/security/cve/CVE-2023-20197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016037.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- Update to 0.103.9
- CVE-2023-20197: Fixed a possible denial of service vulnerability in the HFS+ file parser. (bsc#1214342)  
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-28"/>
	<updated date="2023-08-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214342">SUSE bug 1214342</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-20197/">CVE-2023-20197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20197">CVE-2023-20197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009779345" comment="clamav-0.103.9-150000.3.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779346" comment="clamav-devel-0.103.9-150000.3.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779347" comment="libclamav9-0.103.9-150000.3.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779348" comment="libfreshclam2-0.103.9-150000.3.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4333" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210419" ref_url="https://bugzilla.suse.com/1210419" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2004" ref_url="https://www.suse.com/security/cve/CVE-2023-2004/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016036.html" source="SUSE-SU"/>
		<description>
This update for freetype2 fixes the following issues:

- CVE-2023-2004: Fixed integer overflow in tt_hvadvance_adjust (bsc#1210419).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-28"/>
	<updated date="2023-08-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210419">SUSE bug 1210419</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-2004/">CVE-2023-2004 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2004">CVE-2023-2004 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009779590" comment="freetype2-devel-2.10.4-150000.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779591" comment="freetype2-devel-32bit-2.10.4-150000.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779592" comment="freetype2-profile-tti35-2.10.4-150000.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779593" comment="ft2demos-2.10.4-150000.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779594" comment="ftbench-2.10.4-150000.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779595" comment="ftdiff-2.10.4-150000.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779596" comment="ftdump-2.10.4-150000.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779597" comment="ftgamma-2.10.4-150000.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779598" comment="ftgrid-2.10.4-150000.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779599" comment="ftinspect-2.10.4-150000.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779600" comment="ftlint-2.10.4-150000.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779601" comment="ftmulti-2.10.4-150000.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779602" comment="ftstring-2.10.4-150000.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779603" comment="ftvalid-2.10.4-150000.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779604" comment="ftview-2.10.4-150000.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779605" comment="libfreetype6-2.10.4-150000.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779606" comment="libfreetype6-32bit-2.10.4-150000.4.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4334" version="1" class="patch">
	<metadata>
		<title>Security update for haproxy (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214102" ref_url="https://bugzilla.suse.com/1214102" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40225" ref_url="https://www.suse.com/security/cve/CVE-2023-40225/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016041.html" source="SUSE-SU"/>
		<description>
This update for haproxy fixes the following issues:

- CVE-2023-40225: Fixed request smuggling with empty content-length header value (bsc#1214102).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-29"/>
	<updated date="2023-08-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214102">SUSE bug 1214102</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40225/">CVE-2023-40225 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40225">CVE-2023-40225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778992" comment="haproxy-2.4.22+git0.f8e3218e2-150400.3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4335" version="1" class="patch">
	<metadata>
		<title>Security update for procps (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214290" ref_url="https://bugzilla.suse.com/1214290" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4016" ref_url="https://www.suse.com/security/cve/CVE-2023-4016/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3472-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031239.html" source="SUSE-SU"/>
		<description>
This update for procps fixes the following issues:

  - CVE-2023-4016: Fixed ps buffer overflow (bsc#1214290).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-29"/>
	<updated date="2023-08-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1214290">SUSE bug 1214290</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4016/">CVE-2023-4016 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4016">CVE-2023-4016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009778852" comment="libprocps7-3.3.15-150000.7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778853" comment="procps-3.3.15-150000.7.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009778854" comment="procps-devel-3.3.15-150000.7.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4336" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210996" ref_url="https://bugzilla.suse.com/1210996" source="BUGZILLA"/>
		<reference ref_id="1211256" ref_url="https://bugzilla.suse.com/1211256" source="BUGZILLA"/>
		<reference ref_id="1211257" ref_url="https://bugzilla.suse.com/1211257" source="BUGZILLA"/>
		<reference ref_id="1211461" ref_url="https://bugzilla.suse.com/1211461" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2426" ref_url="https://www.suse.com/security/cve/CVE-2023-2426/" source="CVE"/>
		<reference ref_id="CVE-2023-2609" ref_url="https://www.suse.com/security/cve/CVE-2023-2609/" source="CVE"/>
		<reference ref_id="CVE-2023-2610" ref_url="https://www.suse.com/security/cve/CVE-2023-2610/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016048.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

Updated to version 9.0 with patch level 1572.

- CVE-2023-2426: Fixed Out-of-range Pointer Offset use (bsc#1210996).
- CVE-2023-2609: Fixed NULL Pointer Dereference (bsc#1211256).
- CVE-2023-2610: Fixed nteger Overflow or Wraparound (bsc#1211257).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-30"/>
	<updated date="2023-08-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210996">SUSE bug 1210996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211256">SUSE bug 1211256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211257">SUSE bug 1211257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211461">SUSE bug 1211461</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-2426/">CVE-2023-2426 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2426">CVE-2023-2426 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2609/">CVE-2023-2609 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2609">CVE-2023-2609 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2610/">CVE-2023-2610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2610">CVE-2023-2610 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009779240" comment="gvim-9.0.1632-150500.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779241" comment="vim-9.0.1632-150500.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779242" comment="vim-data-9.0.1632-150500.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779243" comment="vim-data-common-9.0.1632-150500.20.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779244" comment="vim-small-9.0.1632-150500.20.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4337" version="1" class="patch">
	<metadata>
		<title>Security update for open-vm-tools (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214566" ref_url="https://bugzilla.suse.com/1214566" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-20900" ref_url="https://www.suse.com/security/cve/CVE-2023-20900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016065.html" source="SUSE-SU"/>
		<description>
This update for open-vm-tools fixes the following issues:

- CVE-2023-20900: Fixed SAML token signature bypass vulnerability (bsc#1214566).

This update also ships a open-vm-tools-containerinfo plugin. (jsc#PED-3421)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-08-31"/>
	<updated date="2023-08-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214566">SUSE bug 1214566</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-20900/">CVE-2023-20900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20900">CVE-2023-20900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009781012" comment="libvmtools-devel-12.2.0-150300.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781013" comment="libvmtools0-12.2.0-150300.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781014" comment="open-vm-tools-12.2.0-150300.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781015" comment="open-vm-tools-containerinfo-12.2.0-150300.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781016" comment="open-vm-tools-desktop-12.2.0-150300.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781017" comment="open-vm-tools-salt-minion-12.2.0-150300.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781018" comment="open-vm-tools-sdmp-12.2.0-150300.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4338" version="1" class="patch">
	<metadata>
		<title>Security update for exempi (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214488" ref_url="https://bugzilla.suse.com/1214488" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-18652" ref_url="https://www.suse.com/security/cve/CVE-2020-18652/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016096.html" source="SUSE-SU"/>
		<description>
This update for exempi fixes the following issues:

- CVE-2020-18652: Fixed buffer overflow vulnerability in WEBP_Support.cpp (bsc#1214488).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-05"/>
	<updated date="2023-09-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214488">SUSE bug 1214488</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-18652/">CVE-2020-18652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18652">CVE-2020-18652 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009779881" comment="exempi-tools-2.4.5-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779882" comment="libexempi-devel-2.4.5-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779883" comment="libexempi3-2.4.5-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779884" comment="libexempi3-32bit-2.4.5-150000.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4339" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214606" ref_url="https://bugzilla.suse.com/1214606" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4051" ref_url="https://www.suse.com/security/cve/CVE-2023-4051/" source="CVE"/>
		<reference ref_id="CVE-2023-4053" ref_url="https://www.suse.com/security/cve/CVE-2023-4053/" source="CVE"/>
		<reference ref_id="CVE-2023-4574" ref_url="https://www.suse.com/security/cve/CVE-2023-4574/" source="CVE"/>
		<reference ref_id="CVE-2023-4575" ref_url="https://www.suse.com/security/cve/CVE-2023-4575/" source="CVE"/>
		<reference ref_id="CVE-2023-4576" ref_url="https://www.suse.com/security/cve/CVE-2023-4576/" source="CVE"/>
		<reference ref_id="CVE-2023-4577" ref_url="https://www.suse.com/security/cve/CVE-2023-4577/" source="CVE"/>
		<reference ref_id="CVE-2023-4578" ref_url="https://www.suse.com/security/cve/CVE-2023-4578/" source="CVE"/>
		<reference ref_id="CVE-2023-4580" ref_url="https://www.suse.com/security/cve/CVE-2023-4580/" source="CVE"/>
		<reference ref_id="CVE-2023-4581" ref_url="https://www.suse.com/security/cve/CVE-2023-4581/" source="CVE"/>
		<reference ref_id="CVE-2023-4582" ref_url="https://www.suse.com/security/cve/CVE-2023-4582/" source="CVE"/>
		<reference ref_id="CVE-2023-4583" ref_url="https://www.suse.com/security/cve/CVE-2023-4583/" source="CVE"/>
		<reference ref_id="CVE-2023-4584" ref_url="https://www.suse.com/security/cve/CVE-2023-4584/" source="CVE"/>
		<reference ref_id="CVE-2023-4585" ref_url="https://www.suse.com/security/cve/CVE-2023-4585/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016095.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox was updated to Extended Support Release 115.2.0 ESR (MFSA 2023-36) (bsc#1214606).

- CVE-2023-4574: Fixed memory corruption in IPC ColorPickerShownCallback (bmo#1846688)
- CVE-2023-4575: Fixed memory corruption in IPC FilePickerShownCallback  (bmo#1846689)
- CVE-2023-4576: Fixed integer Overflow in RecordedSourceSurfaceCreation (bmo#1846694)
- CVE-2023-4577: Fixed memory corruption in JIT UpdateRegExpStatics (bmo#1847397)
- CVE-2023-4051: Fixed full screen notification obscured by file open dialog (bmo#1821884)
- CVE-2023-4578: Fixed Out of Memory Exception in SpiderMonkey could have triggered an (bmo#1839007)
- CVE-2023-4053: Fixed full screen notification obscured by external program (bmo#1839079)
- CVE-2023-4580: Fixed push notifications saved to disk unencrypted (bmo#1843046)
- CVE-2023-4581: Fixed XLL file extensions downloadable without warnings (bmo#1843758)
- CVE-2023-4582: Fixed buffer Overflow in WebGL glGetProgramiv (bmo#1773874)
- CVE-2023-4583: Fixed browsing Context potentially not cleared when closing Private Window (bmo#1842030)
- CVE-2023-4584: Fixed memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2  (bmo#1843968, bmo#1845205, bmo#1846080, bmo#1846526, bmo#1847529)
- CVE-2023-4585: Fixed memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2(bmo#1751583, bmo#1833504, bmo#1841082, bmo#1847904, bmo#1848999).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-05"/>
	<updated date="2023-09-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214606">SUSE bug 1214606</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4051/">CVE-2023-4051 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4051">CVE-2023-4051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4053/">CVE-2023-4053 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4053">CVE-2023-4053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4574/">CVE-2023-4574 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4574">CVE-2023-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4575/">CVE-2023-4575 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4575">CVE-2023-4575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4576/">CVE-2023-4576 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4576">CVE-2023-4576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4577/">CVE-2023-4577 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4577">CVE-2023-4577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4578/">CVE-2023-4578 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4578">CVE-2023-4578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4580/">CVE-2023-4580 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4580">CVE-2023-4580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4581/">CVE-2023-4581 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4581">CVE-2023-4581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4582/">CVE-2023-4582 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4582">CVE-2023-4582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4583/">CVE-2023-4583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4583">CVE-2023-4583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4584/">CVE-2023-4584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4584">CVE-2023-4584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4585/">CVE-2023-4585 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4585">CVE-2023-4585 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009780894" comment="MozillaFirefox-115.2.0-150200.152.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780895" comment="MozillaFirefox-branding-upstream-115.2.0-150200.152.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780896" comment="MozillaFirefox-devel-115.2.0-150200.152.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780897" comment="MozillaFirefox-translations-common-115.2.0-150200.152.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780898" comment="MozillaFirefox-translations-other-115.2.0-150200.152.102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4340" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214670" ref_url="https://bugzilla.suse.com/1214670" source="BUGZILLA"/>
		<reference ref_id="1214672" ref_url="https://bugzilla.suse.com/1214672" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46310" ref_url="https://www.suse.com/security/cve/CVE-2021-46310/" source="CVE"/>
		<reference ref_id="CVE-2021-46312" ref_url="https://www.suse.com/security/cve/CVE-2021-46312/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016094.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-46310: Fixed divide by zero in IW44Image.cpp (bsc#1214670).
- CVE-2021-46312: Fixed divide by zero in IW44EncodeCodec.cpp (bsc#1214672).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-05"/>
	<updated date="2023-09-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1214670">SUSE bug 1214670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214672">SUSE bug 1214672</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46310/">CVE-2021-46310 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46310">CVE-2021-46310 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46312/">CVE-2021-46312 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46312">CVE-2021-46312 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009780852" comment="djvulibre-3.5.27-150200.11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780853" comment="djvulibre-doc-3.5.27-150200.11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780854" comment="libdjvulibre-devel-3.5.27-150200.11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780855" comment="libdjvulibre21-3.5.27-150200.11.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4341" version="1" class="patch">
	<metadata>
		<title>Security update for amazon-ecs-init (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016093.html" source="SUSE-SU"/>
		<description>

This update of amazon-ecs-init fixes the following issues:

- rebuild the package with the go 1.21 security release (bsc#1212475).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-05"/>
	<updated date="2023-09-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780900" comment="amazon-ecs-init-1.53.0-150100.4.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4342" version="1" class="patch">
	<metadata>
		<title>Security update for keylime (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213314" ref_url="https://bugzilla.suse.com/1213314" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38201" ref_url="https://www.suse.com/security/cve/CVE-2023-38201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016092.html" source="SUSE-SU"/>
		<description>
This update for keylime fixes the following issues:

- CVE-2023-38201: Fixed a bug to avoid leaks of the authorization tag. (bsc#1213314)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-05"/>
	<updated date="2023-09-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213314">SUSE bug 1213314</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-38201/">CVE-2023-38201 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38201">CVE-2023-38201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009781663" comment="keylime-agent-6.3.2-150400.4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781664" comment="keylime-config-6.3.2-150400.4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781665" comment="keylime-firewalld-6.3.2-150400.4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781678" comment="keylime-logrotate-6.3.2-150400.4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781666" comment="keylime-registrar-6.3.2-150400.4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781667" comment="keylime-tpm_cert_store-6.3.2-150400.4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781668" comment="keylime-verifier-6.3.2-150400.4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781669" comment="python3-keylime-6.3.2-150400.4.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4343" version="1" class="patch">
	<metadata>
		<title>Security update for sccache (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1194119" ref_url="https://bugzilla.suse.com/1194119" source="BUGZILLA"/>
		<reference ref_id="1196972" ref_url="https://bugzilla.suse.com/1196972" source="BUGZILLA"/>
		<reference ref_id="1208553" ref_url="https://bugzilla.suse.com/1208553" source="BUGZILLA"/>
		<reference ref_id="1212407" ref_url="https://bugzilla.suse.com/1212407" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45710" ref_url="https://www.suse.com/security/cve/CVE-2021-45710/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-31394" ref_url="https://www.suse.com/security/cve/CVE-2022-31394/" source="CVE"/>
		<reference ref_id="CVE-2023-1521" ref_url="https://www.suse.com/security/cve/CVE-2023-1521/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016091.html" source="SUSE-SU"/>
		<description>
This update for sccache fixes the following issues:

- Update to version 0.4.2.
- CVE-2021-45710: Fixed a segmentation fault due to data race in tokio crate. (bsc#1194119)
- CVE-2022-24713: Fixed a ReDoS issue due to vulnerable regex crate. (bsc#1196972)
- CVE-2022-31394: Fixed a DoS issue due to the max header list size not settable. (bsc#1208553)
- CVE-2023-1521: Fixed a local privilege escalation. (bsc#1212407)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-05"/>
	<updated date="2023-09-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194119">SUSE bug 1194119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196972">SUSE bug 1196972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208553">SUSE bug 1208553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212407">SUSE bug 1212407</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45710/">CVE-2021-45710 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45710">CVE-2021-45710 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24713">CVE-2022-24713 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-31394/">CVE-2022-31394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31394">CVE-2022-31394 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1521/">CVE-2023-1521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-1521">CVE-2023-1521 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780899" comment="sccache-0.4.2~3-150400.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4344" version="1" class="patch">
	<metadata>
		<title>Security update for gsl (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214681" ref_url="https://bugzilla.suse.com/1214681" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35357" ref_url="https://www.suse.com/security/cve/CVE-2020-35357/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016090.html" source="SUSE-SU"/>
		<description>
This update for gsl fixes the following issues:

- CVE-2020-35357: Fixed a stack out of bounds read in gsl_stats_quantile_from_sorted_data(). (bsc#1214681)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-05"/>
	<updated date="2023-09-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214681">SUSE bug 1214681</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35357/">CVE-2020-35357 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35357">CVE-2020-35357 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009780782" comment="gsl_2_4-gnu-hpc-2.4-150100.9.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780783" comment="gsl_2_4-gnu-hpc-devel-2.4-150100.9.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780784" comment="gsl_2_4-gnu-hpc-doc-2.4-150100.9.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780785" comment="gsl_2_4-gnu-hpc-examples-2.4-150100.9.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780786" comment="gsl_2_4-gnu-hpc-module-2.4-150100.9.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780788" comment="libgsl_2_4-gnu-hpc-2.4-150100.9.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780789" comment="libgslcblas_2_4-gnu-hpc-2.4-150100.9.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4345" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214103" ref_url="https://bugzilla.suse.com/1214103" source="BUGZILLA"/>
		<reference ref_id="1214106" ref_url="https://bugzilla.suse.com/1214106" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3823" ref_url="https://www.suse.com/security/cve/CVE-2023-3823/" source="CVE"/>
		<reference ref_id="CVE-2023-3824" ref_url="https://www.suse.com/security/cve/CVE-2023-3824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016089.html" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2023-3823: Fixed an issue with external entity loading in XML without enabling it. (bsc#1214106)
- CVE-2023-3824: Fixed a buffer overflow in phar_dir_read(). (bsc#1214103)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-05"/>
	<updated date="2023-09-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214103">SUSE bug 1214103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214106">SUSE bug 1214106</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3823/">CVE-2023-3823 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3823">CVE-2023-3823 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3824/">CVE-2023-3824 at SUSE</cve>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3824">CVE-2023-3824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009779829" comment="apache2-mod_php8-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779830" comment="php8-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779831" comment="php8-bcmath-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779832" comment="php8-bz2-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779833" comment="php8-calendar-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779834" comment="php8-cli-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779835" comment="php8-ctype-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779836" comment="php8-curl-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779837" comment="php8-dba-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779838" comment="php8-devel-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779839" comment="php8-dom-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779840" comment="php8-embed-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779841" comment="php8-enchant-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779842" comment="php8-exif-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779843" comment="php8-fastcgi-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779844" comment="php8-fileinfo-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779845" comment="php8-fpm-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779846" comment="php8-ftp-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779847" comment="php8-gd-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779848" comment="php8-gettext-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779849" comment="php8-gmp-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779850" comment="php8-iconv-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779851" comment="php8-intl-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779852" comment="php8-ldap-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779853" comment="php8-mbstring-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779854" comment="php8-mysql-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779855" comment="php8-odbc-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779856" comment="php8-opcache-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779857" comment="php8-openssl-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779858" comment="php8-pcntl-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779859" comment="php8-pdo-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779860" comment="php8-pgsql-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779861" comment="php8-phar-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779862" comment="php8-posix-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779863" comment="php8-readline-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779864" comment="php8-shmop-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779865" comment="php8-snmp-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779866" comment="php8-soap-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779867" comment="php8-sockets-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779868" comment="php8-sodium-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779869" comment="php8-sqlite-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779870" comment="php8-sysvmsg-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779871" comment="php8-sysvsem-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779872" comment="php8-sysvshm-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779873" comment="php8-test-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779874" comment="php8-tidy-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779875" comment="php8-tokenizer-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779876" comment="php8-xmlreader-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779877" comment="php8-xmlwriter-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779878" comment="php8-xsl-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779879" comment="php8-zip-8.0.30-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779880" comment="php8-zlib-8.0.30-150400.4.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4346" version="1" class="patch">
	<metadata>
		<title>Security update for busybox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214538" ref_url="https://bugzilla.suse.com/1214538" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48174" ref_url="https://www.suse.com/security/cve/CVE-2022-48174/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016088.html" source="SUSE-SU"/>
		<description>
This update for busybox fixes the following issues:

- CVE-2022-48174: Fixed stack overflow vulnerability. (bsc#1214538)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-05"/>
	<updated date="2023-09-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214538">SUSE bug 1214538</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48174/">CVE-2022-48174 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48174">CVE-2022-48174 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009781458" comment="busybox-adduser-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781459" comment="busybox-attr-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781460" comment="busybox-bc-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781461" comment="busybox-bind-utils-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781462" comment="busybox-bzip2-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781463" comment="busybox-coreutils-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781464" comment="busybox-cpio-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781465" comment="busybox-diffutils-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781466" comment="busybox-dos2unix-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781467" comment="busybox-ed-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781468" comment="busybox-findutils-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781469" comment="busybox-gawk-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781470" comment="busybox-grep-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781471" comment="busybox-gzip-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781472" comment="busybox-hostname-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781473" comment="busybox-iproute2-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781474" comment="busybox-iputils-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781475" comment="busybox-kbd-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781476" comment="busybox-kmod-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781477" comment="busybox-less-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781478" comment="busybox-links-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781479" comment="busybox-man-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781480" comment="busybox-misc-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781481" comment="busybox-ncurses-utils-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781482" comment="busybox-net-tools-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781483" comment="busybox-netcat-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781484" comment="busybox-patch-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781485" comment="busybox-policycoreutils-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781486" comment="busybox-procps-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781487" comment="busybox-psmisc-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781488" comment="busybox-sed-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781489" comment="busybox-selinux-tools-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781490" comment="busybox-sendmail-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781491" comment="busybox-sh-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781492" comment="busybox-sharutils-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781494" comment="busybox-syslogd-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781495" comment="busybox-sysvinit-tools-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781496" comment="busybox-tar-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781497" comment="busybox-telnet-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781499" comment="busybox-tftp-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781500" comment="busybox-time-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781501" comment="busybox-traceroute-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781502" comment="busybox-tunctl-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781503" comment="busybox-unzip-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781504" comment="busybox-util-linux-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781505" comment="busybox-vi-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781506" comment="busybox-vlan-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781508" comment="busybox-wget-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781509" comment="busybox-which-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781510" comment="busybox-whois-1.35.0-150400.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781511" comment="busybox-xz-1.35.0-150400.4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4347" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.18 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:3532-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BGQPKCSAJ3EKMGCLUP52ZGERCMZQP73E/" source="SUSE-SU"/>
		<description>

This update of kubernetes1.18 fixes the following issues:

- rebuild the package with the go 1.21 security release (bsc#1212475).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-05"/>
	<updated date="2023-09-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009781000" comment="kubernetes1.18-client-1.18.10-150200.5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781001" comment="kubernetes1.18-client-common-1.18.10-150200.5.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4348" version="1" class="patch">
	<metadata>
		<title>Security update for docker (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210797" ref_url="https://bugzilla.suse.com/1210797" source="BUGZILLA"/>
		<reference ref_id="1212368" ref_url="https://bugzilla.suse.com/1212368" source="BUGZILLA"/>
		<reference ref_id="1213120" ref_url="https://bugzilla.suse.com/1213120" source="BUGZILLA"/>
		<reference ref_id="1213229" ref_url="https://bugzilla.suse.com/1213229" source="BUGZILLA"/>
		<reference ref_id="1213500" ref_url="https://bugzilla.suse.com/1213500" source="BUGZILLA"/>
		<reference ref_id="1214107" ref_url="https://bugzilla.suse.com/1214107" source="BUGZILLA"/>
		<reference ref_id="1214108" ref_url="https://bugzilla.suse.com/1214108" source="BUGZILLA"/>
		<reference ref_id="1214109" ref_url="https://bugzilla.suse.com/1214109" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28840" ref_url="https://www.suse.com/security/cve/CVE-2023-28840/" source="CVE"/>
		<reference ref_id="CVE-2023-28841" ref_url="https://www.suse.com/security/cve/CVE-2023-28841/" source="CVE"/>
		<reference ref_id="CVE-2023-28842" ref_url="https://www.suse.com/security/cve/CVE-2023-28842/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016100.html" source="SUSE-SU"/>
		<description>
This update for docker fixes the following issues:

- Update to Docker 24.0.5-ce.

  See upstream changelong online at
  &lt;https://docs.docker.com/engine/release-notes/24.0/#2405&gt; bsc#1213229 

- Update to Docker 24.0.4-ce.

  See upstream changelog online at
  &lt;https://docs.docker.com/engine/release-notes/24.0/#2404&gt;. bsc#1213500

- Update to Docker 24.0.3-ce.

  See upstream changelog online at
  &lt;https://docs.docker.com/engine/release-notes/24.0/#2403&gt;. bsc#1213120

- Recommend docker-rootless-extras instead of Require(ing) it, given
  it's an additional functionality and not inherently required for
  docker to function.

- Add docker-rootless-extras subpackage (https://docs.docker.com/engine/security/rootless)

- Update to Docker 24.0.2-ce. See upstream changelog online at
  &lt;https://docs.docker.com/engine/release-notes/24.0/#2402&gt;. bsc#1212368

  * Includes the upstreamed fix for the mount table pollution issue.
    bsc#1210797

- Add Recommends for docker-buildx, and add /usr/lib/docker/cli-plugins as
  being provided by this package.

- was rebuilt against current GO compiler.

		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-05"/>
	<updated date="2023-09-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210797">SUSE bug 1210797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212368">SUSE bug 1212368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213120">SUSE bug 1213120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213229">SUSE bug 1213229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213500">SUSE bug 1213500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214107">SUSE bug 1214107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214108">SUSE bug 1214108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214109">SUSE bug 1214109</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28840/">CVE-2023-28840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28840">CVE-2023-28840 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28841/">CVE-2023-28841 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28841">CVE-2023-28841 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-28842/">CVE-2023-28842 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28842">CVE-2023-28842 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009781405" comment="docker-24.0.5_ce-150000.185.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781406" comment="docker-bash-completion-24.0.5_ce-150000.185.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781407" comment="docker-fish-completion-24.0.5_ce-150000.185.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781408" comment="docker-zsh-completion-24.0.5_ce-150000.185.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4349" version="1" class="patch">
	<metadata>
		<title>Security update for amazon-ssm-agent (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:3537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016099.html" source="SUSE-SU"/>
		<description>

This update of amazon-ssm-agent fixes the following issues:

- rebuild the package with the go 1.21 security release (bsc#1212475).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-05"/>
	<updated date="2023-09-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781008" comment="amazon-ssm-agent-3.1.1260.0-150000.5.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4350" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214103" ref_url="https://bugzilla.suse.com/1214103" source="BUGZILLA"/>
		<reference ref_id="1214106" ref_url="https://bugzilla.suse.com/1214106" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3823" ref_url="https://www.suse.com/security/cve/CVE-2023-3823/" source="CVE"/>
		<reference ref_id="CVE-2023-3824" ref_url="https://www.suse.com/security/cve/CVE-2023-3824/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016097.html" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2023-3823: Fixed an issue with external entity loading in XML without enabling it. (bsc#1214106)
- CVE-2023-3824: Fixed a buffer overflow in phar_dir_read(). (bsc#1214103)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-05"/>
	<updated date="2023-09-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214103">SUSE bug 1214103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214106">SUSE bug 1214106</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3823/">CVE-2023-3823 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3823">CVE-2023-3823 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3824/">CVE-2023-3824 at SUSE</cve>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3824">CVE-2023-3824 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009779774" comment="apache2-mod_php7-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779775" comment="php7-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779776" comment="php7-bcmath-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779777" comment="php7-bz2-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779778" comment="php7-calendar-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779779" comment="php7-cli-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779780" comment="php7-ctype-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779781" comment="php7-curl-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779782" comment="php7-dba-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779783" comment="php7-devel-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779784" comment="php7-dom-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779785" comment="php7-embed-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779786" comment="php7-enchant-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779787" comment="php7-exif-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779788" comment="php7-fastcgi-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779789" comment="php7-fileinfo-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779790" comment="php7-fpm-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779791" comment="php7-ftp-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779792" comment="php7-gd-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779793" comment="php7-gettext-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779794" comment="php7-gmp-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779795" comment="php7-iconv-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779796" comment="php7-intl-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779797" comment="php7-json-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779798" comment="php7-ldap-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779799" comment="php7-mbstring-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779800" comment="php7-mysql-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779801" comment="php7-odbc-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779802" comment="php7-opcache-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779803" comment="php7-openssl-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779804" comment="php7-pcntl-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779805" comment="php7-pdo-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779806" comment="php7-pgsql-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779807" comment="php7-phar-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779808" comment="php7-posix-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779809" comment="php7-readline-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779810" comment="php7-shmop-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779811" comment="php7-snmp-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779812" comment="php7-soap-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779813" comment="php7-sockets-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779814" comment="php7-sodium-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779815" comment="php7-sqlite-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779816" comment="php7-sysvmsg-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779817" comment="php7-sysvsem-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779818" comment="php7-sysvshm-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779819" comment="php7-test-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779820" comment="php7-tidy-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779821" comment="php7-tokenizer-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779822" comment="php7-xmlreader-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779823" comment="php7-xmlrpc-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779824" comment="php7-xmlwriter-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779825" comment="php7-xsl-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779826" comment="php7-zip-7.4.33-150400.4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779827" comment="php7-zlib-7.4.33-150400.4.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4351" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214527" ref_url="https://bugzilla.suse.com/1214527" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-22218" ref_url="https://www.suse.com/security/cve/CVE-2020-22218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031382.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

- CVE-2020-22218: Fixed a bug in _libssh2_packet_add() which allows to access out of bounds memory. (bsc#1214527)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-08"/>
	<updated date="2023-09-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214527">SUSE bug 1214527</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22218/">CVE-2020-22218 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-22218">CVE-2020-22218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009779885" comment="libssh2-1-1.9.0-150000.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779886" comment="libssh2-1-32bit-1.9.0-150000.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779887" comment="libssh2-devel-1.9.0-150000.4.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4352" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213379" ref_url="https://bugzilla.suse.com/1213379" source="BUGZILLA"/>
		<reference ref_id="1213581" ref_url="https://bugzilla.suse.com/1213581" source="BUGZILLA"/>
		<reference ref_id="1213905" ref_url="https://bugzilla.suse.com/1213905" source="BUGZILLA"/>
		<reference ref_id="1214093" ref_url="https://bugzilla.suse.com/1214093" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32393" ref_url="https://www.suse.com/security/cve/CVE-2023-32393/" source="CVE"/>
		<reference ref_id="CVE-2023-37450" ref_url="https://www.suse.com/security/cve/CVE-2023-37450/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3556-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031381.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Provide/obsolete WebKit2GTK-%{_apiver}-lang (bsc#1214093)
- Have the lang package provide libwebkit2gtk3-lang (bsc#1214093)

- Adjustments of update version 2.40.5 (bsc#1213905 bsc#1213379 bsc#1213581):
  + Added missing CVE references: CVE-2023-32393, CVE-2023-37450
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-08"/>
	<updated date="2023-09-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213379">SUSE bug 1213379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213581">SUSE bug 1213581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213905">SUSE bug 1213905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214093">SUSE bug 1214093</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32393/">CVE-2023-32393 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32393">CVE-2023-32393 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37450/">CVE-2023-37450 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37450">CVE-2023-37450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009780856" comment="WebKitGTK-4.0-lang-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780857" comment="WebKitGTK-4.1-lang-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780858" comment="WebKitGTK-6.0-lang-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780859" comment="libjavascriptcoregtk-4_0-18-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780860" comment="libjavascriptcoregtk-4_0-18-32bit-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780861" comment="libjavascriptcoregtk-4_0-18-64bit-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780862" comment="libjavascriptcoregtk-4_1-0-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780863" comment="libjavascriptcoregtk-4_1-0-32bit-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780864" comment="libjavascriptcoregtk-4_1-0-64bit-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780865" comment="libjavascriptcoregtk-6_0-1-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780866" comment="libwebkit2gtk-4_0-37-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780867" comment="libwebkit2gtk-4_0-37-32bit-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780868" comment="libwebkit2gtk-4_0-37-64bit-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780869" comment="libwebkit2gtk-4_1-0-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780870" comment="libwebkit2gtk-4_1-0-32bit-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780871" comment="libwebkit2gtk-4_1-0-64bit-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780872" comment="libwebkitgtk-6_0-4-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780873" comment="typelib-1_0-JavaScriptCore-4_0-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780874" comment="typelib-1_0-JavaScriptCore-4_1-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780875" comment="typelib-1_0-JavaScriptCore-6_0-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780876" comment="typelib-1_0-WebKit-6_0-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780877" comment="typelib-1_0-WebKit2-4_0-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780878" comment="typelib-1_0-WebKit2-4_1-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780879" comment="typelib-1_0-WebKit2WebExtension-4_0-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780880" comment="typelib-1_0-WebKit2WebExtension-4_1-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780881" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780882" comment="webkit-jsc-4-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780883" comment="webkit-jsc-4.1-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780884" comment="webkit-jsc-6.0-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780885" comment="webkit2gtk-4_0-injected-bundles-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780886" comment="webkit2gtk-4_1-injected-bundles-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780887" comment="webkit2gtk3-devel-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780888" comment="webkit2gtk3-minibrowser-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780889" comment="webkit2gtk3-soup2-devel-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780890" comment="webkit2gtk3-soup2-minibrowser-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780891" comment="webkit2gtk4-devel-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780892" comment="webkit2gtk4-minibrowser-2.40.5-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780893" comment="webkitgtk-6_0-injected-bundles-2.40.5-150400.4.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4353" version="1" class="patch">
	<metadata>
		<title>Security update for rekor (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:3557-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031380.html" source="SUSE-SU"/>
		<description>

This update of rekor fixes the following issues:

- rebuild the package with the go 1.21 security release (bsc#1212475).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-08"/>
	<updated date="2023-09-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781007" comment="rekor-1.2.1-150400.4.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4354" version="1" class="patch">
	<metadata>
		<title>Security update for geoipupdate (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:3560-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031377.html" source="SUSE-SU"/>
		<description>

This update of geoipupdate fixes the following issues:

- rebuild the package with the go 1.21 security release (bsc#1212475).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-08"/>
	<updated date="2023-09-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009781317" comment="geoipupdate-4.2.2-150000.1.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781318" comment="geoipupdate-legacy-4.2.2-150000.1.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4355" version="1" class="patch">
	<metadata>
		<title>Security update for skopeo (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016119.html" source="SUSE-SU"/>
		<description>

This update of skopeo fixes the following issues:

- rebuild the package with the go 1.21 security release (bsc#1212475).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-08"/>
	<updated date="2023-09-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781005" comment="skopeo-1.12.0-150300.11.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4356" version="1" class="patch">
	<metadata>
		<title>Security update for icu73_2 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1030253" ref_url="https://bugzilla.suse.com/1030253" source="BUGZILLA"/>
		<reference ref_id="1095425" ref_url="https://bugzilla.suse.com/1095425" source="BUGZILLA"/>
		<reference ref_id="1103893" ref_url="https://bugzilla.suse.com/1103893" source="BUGZILLA"/>
		<reference ref_id="1112183" ref_url="https://bugzilla.suse.com/1112183" source="BUGZILLA"/>
		<reference ref_id="1146907" ref_url="https://bugzilla.suse.com/1146907" source="BUGZILLA"/>
		<reference ref_id="1158955" ref_url="https://bugzilla.suse.com/1158955" source="BUGZILLA"/>
		<reference ref_id="1159131" ref_url="https://bugzilla.suse.com/1159131" source="BUGZILLA"/>
		<reference ref_id="1161007" ref_url="https://bugzilla.suse.com/1161007" source="BUGZILLA"/>
		<reference ref_id="1162882" ref_url="https://bugzilla.suse.com/1162882" source="BUGZILLA"/>
		<reference ref_id="1166844" ref_url="https://bugzilla.suse.com/1166844" source="BUGZILLA"/>
		<reference ref_id="1167603" ref_url="https://bugzilla.suse.com/1167603" source="BUGZILLA"/>
		<reference ref_id="1182252" ref_url="https://bugzilla.suse.com/1182252" source="BUGZILLA"/>
		<reference ref_id="1182645" ref_url="https://bugzilla.suse.com/1182645" source="BUGZILLA"/>
		<reference ref_id="1192935" ref_url="https://bugzilla.suse.com/1192935" source="BUGZILLA"/>
		<reference ref_id="1193951" ref_url="https://bugzilla.suse.com/1193951" source="BUGZILLA"/>
		<reference ref_id="354372" ref_url="https://bugzilla.suse.com/354372" source="BUGZILLA"/>
		<reference ref_id="437293" ref_url="https://bugzilla.suse.com/437293" source="BUGZILLA"/>
		<reference ref_id="824262" ref_url="https://bugzilla.suse.com/824262" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531/" source="CVE"/>
		<reference ref_id="CVE-2020-21913" ref_url="https://www.suse.com/security/cve/CVE-2020-21913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016117.html" source="SUSE-SU"/>
		<description>
This update for icu73_2 fixes the following issues:

- Update to release 73.2

  * CLDR extends the support for “short” Chinese sort orders to
    cover some additional, required characters for Level 2. This
    is carried over into ICU collation.
  * ICU has a modified character conversion table, mapping some
    GB18030 characters to Unicode characters that were encoded
    after GB18030-2005.

- fixes builds where UCHAR_TYPE is re-defined such as libqt5-qtwebengine

- Update to release 73.1

  * Improved Japanese and Korean short-text line breaking
  * Reduction of C++ memory use in date formatting

- Update to release 72.1

  * Support for Unicode 15, including new characters, scripts,
    emoji, and corresponding API constants.
  * Support for CLDR 42 locale data with various additions and
    corrections.
  * Shift to tzdb 2022e. Pre-1970 data for a number of timezones
    has been removed.

- bump library packagename to libicu71 to match the version.

- update to 71.1:

  * updates to CLDR 41 locale data with various additions and corrections.
  * phrase-based line breaking for Japanese. Existing line breaking methods
    follow standards and conventions for body text but do not work well for
    short Japanese text, such as in titles and headings. This new feature is
    optimized for these use cases.
  * support for Hindi written in Latin letters (hi_Latn). The CLDR data for
    this increasingly popular locale has been significantly revised and
    expanded. Note that based on user expectations, hi_Latn incorporates a
    large amount of English, and can also be referred to as “Hinglish”.
  * time zone data updated to version 2022a. Note that pre-1970 data for a
    number of time zones has been removed, as has been the case in the upstream
    tzdata release since 2021b.

- ICU-21793 Fix ucptrietest golden diff [bsc#1192935]

- Update to release 70.1:

  * Unicode 14 (new characters, scripts, emoji, and API constants)
  * CLDR 40 (many additions and corrections)
  * Fixes for measurement unit formatting
  * Can now be built with up to C++20 compilers

- ICU-21613 Fix undefined behaviour in ComplexUnitsConverter::applyRounder

- Update to release 69.1

  * CLDR 39
  * For Norwegian, 'no' is back to being the canonical code, with
    'nb' treated as equivalent. This aligns handling of Norwegian
    with other macro language codes.
  * Binary prefixes in measurement units (KiB, MiB, etc.)
  * Time zone offsets from local time: New APIs
    BasicTimeZone::getOffsetFromLocal() (C++) and
    ucal_getTimeZoneOffsetFromLocal()

- Backport ICU-21366 (bsc#1182645)

- Update to release 68.2

  * Fix memory problem in FormattedStringBuilder
  * Fix assertion when setKeywordValue w/ long value.
  * Fix UBSan breakage on 8bit of rbbi
  * fix int32_t overflow in listFormat
  * Fix memory handling in MemoryPool::operator=()
  * Fix memory leak in AliasReplacer

- Add back icu.keyring, see https://unicode-org.atlassian.net/browse/ICU-21361 

- Update to release 68.1

  * CLDR 38
  * Measurement unit preferences
  * PluralRules selection for ranges of numbers
  * Locale ID canonicalization now conforms to the CLDR spec
    including edge cases
  * DateIntervalFormat supports output options such as capitalization
  * Measurement units are normalized in skeleton string output
  * Time zone data (tzdata) version 2020d

- Add the provides for libicu to Make .Net core can install 
  successfully. (bsc#1167603, bsc#1161007) 

- Update to version 67.1

  * Unicode 13 (ICU-20893, same as in ICU 66)

    + Total of 5930 new characters
    + 4 new scripts
    + 55 new emoji characters, plus additional new sequences
    + New CJK extension, first characters in plane 3: U+30000..U+3134A

  * CLDR 37

    + New language at Modern coverage: Nigerian Pidgin
    + New languages at Basic coverage: Fulah (Adlam), Maithili,
      Manipuri, Santali, Sindhi (Devanagari), Sundanese
    + Region containment: EU no longer includes GB
    + Unicode 13 root collation data and Chinese data for collation and transliteration
  * DateTimePatternGenerator now obeys the 'hc' preference in the locale identifier (ICU-20442)
  * Various other improvements for ECMA-402 conformance
  * Number skeletons have a new 'concise' form that can be used in MessageFormat strings (ICU-20418)
  * Currency formatting options for formal and other currency display name variants (ICU-20854)
  * ListFormatter: new public API to select the style &amp; type (ICU-12863)
  * ListFormatter now selects the proper “and”/“or” form for Spanish &amp; Hebrew (ICU-21016)
  * Locale ID canonicalization upgraded to implement the complete CLDR spec (ICU-20834, ICU-20272)
  * LocaleMatcher: New option to ignore one-way matches (ICU-20936),
    and other tweaks to the code (ICU-20916, ICU-20917) and data (from CLDR)
  * acceptLanguage() reimplemented via LocaleMatcher (ICU-20700)
  * Data build tool: tzdbNames.res moved from the 'zone_tree' category to the 'zone_supplemental' category (ICU-21073)
  * Fixed uses of u8'literals' broken by the C++20 introduction of the incompatible char8_t type (ICU-20972),
  * and added a few API overloads to reduce the need for reinterpret_cast (ICU-20984).
  * Support for manipulating CLDR 37 unit identifiers in MeasureUnit.
  * Fix potential integer overflow in UnicodeString:doAppend (bsc#1166844, CVE-2020-10531).

- Update to version 66.1

  * Unicode 13 support
  * Fix uses of u8'literals' broken by C++20 introduction of
    incompatible char8_t type. (ICU-20972)
  * use LocalMemory for cmd to prevent use after free
    (bsc#1193951 CVE-2020-21913).

- Remove /usr/lib(64)/icu/current [bsc#1158955].

- Update to release 65.1 (jsc#SLE-11118).

  * Updated to CLDR 36 locale data with many additions and
    corrections, and some new measurement units.
  * The Java LocaleMatcher API is improved, and ported to C++.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-08"/>
	<updated date="2023-09-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1030253">SUSE bug 1030253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1095425">SUSE bug 1095425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1103893">SUSE bug 1103893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112183">SUSE bug 1112183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146907">SUSE bug 1146907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158955">SUSE bug 1158955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159131">SUSE bug 1159131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161007">SUSE bug 1161007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162882">SUSE bug 1162882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166844">SUSE bug 1166844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167603">SUSE bug 1167603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182252">SUSE bug 1182252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182645">SUSE bug 1182645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192935">SUSE bug 1192935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193951">SUSE bug 1193951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/354372">SUSE bug 354372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/437293">SUSE bug 437293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/824262">SUSE bug 824262</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10531">CVE-2020-10531 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21913/">CVE-2020-21913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-21913">CVE-2020-21913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009781384" comment="icu73_2-73.2-150000.1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781385" comment="libicu73_2-73.2-150000.1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781386" comment="libicu73_2-bedata-73.2-150000.1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781387" comment="libicu73_2-devel-73.2-150000.1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781388" comment="libicu73_2-doc-73.2-150000.1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781389" comment="libicu73_2-ledata-73.2-150000.1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4357" version="1" class="patch">
	<metadata>
		<title>Security update for terraform-provider-helm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016138.html" source="SUSE-SU"/>
		<description>

This update of terraform-provider-helm fixes the following issues:

- rebuild the package with the go 1.21 security release (bsc#1212475).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-12"/>
	<updated date="2023-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781003" comment="terraform-provider-helm-2.9.0-150200.6.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4358" version="1" class="patch">
	<metadata>
		<title>Security update for terraform-provider-null (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:3588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016137.html" source="SUSE-SU"/>
		<description>

This update of terraform-provider-null fixes the following issues:

- rebuild the package with the go 1.21 security release (bsc#1212475).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-12"/>
	<updated date="2023-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781004" comment="terraform-provider-null-3.0.0-150200.6.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4359" version="1" class="patch">
	<metadata>
		<title>Security update for terraform-provider-aws (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:3589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016136.html" source="SUSE-SU"/>
		<description>

This update of terraform-provider-aws fixes the following issues:

- rebuild the package with the go 1.21 security release (bsc#1212475).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-12"/>
	<updated date="2023-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781002" comment="terraform-provider-aws-3.11.0-150200.6.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4360" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210168" ref_url="https://bugzilla.suse.com/1210168" source="BUGZILLA"/>
		<reference ref_id="1215231" ref_url="https://bugzilla.suse.com/1215231" source="BUGZILLA"/>
		<reference ref_id="1215245" ref_url="https://bugzilla.suse.com/1215245" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016157.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 115.2.1 ESR (bsc#1215245).

- CVE-2023-4863: Fixed heap buffer overflow in libwebp (MFSA 2023-40) (bsc#1215231).

The following non-security bug was fixed:

- Fix i586 build by reducing debug info to -g1 (bsc#1210168).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-15"/>
	<updated date="2023-09-15"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1210168">SUSE bug 1210168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215231">SUSE bug 1215231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215245">SUSE bug 1215245</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009794715" comment="MozillaFirefox-115.2.1-150200.152.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794716" comment="MozillaFirefox-branding-upstream-115.2.1-150200.152.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794717" comment="MozillaFirefox-devel-115.2.1-150200.152.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794718" comment="MozillaFirefox-translations-common-115.2.1-150200.152.105.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794719" comment="MozillaFirefox-translations-other-115.2.1-150200.152.105.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4361" version="1" class="patch">
	<metadata>
		<title>Security update for libwebp (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215231" ref_url="https://bugzilla.suse.com/1215231" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031493.html" source="SUSE-SU"/>
		<description>
This update for libwebp fixes the following issues:

- CVE-2023-4863: Fixed heap buffer overflow (bsc#1215231).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-18"/>
	<updated date="2023-09-18"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1215231">SUSE bug 1215231</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009795106" comment="libwebp-devel-1.0.3-150200.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795107" comment="libwebp-devel-32bit-1.0.3-150200.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795108" comment="libwebp-tools-1.0.3-150200.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795109" comment="libwebp7-1.0.3-150200.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795110" comment="libwebp7-32bit-1.0.3-150200.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795111" comment="libwebpdecoder3-1.0.3-150200.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795112" comment="libwebpdecoder3-32bit-1.0.3-150200.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795113" comment="libwebpdemux2-1.0.3-150200.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795114" comment="libwebpdemux2-32bit-1.0.3-150200.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795115" comment="libwebpmux3-1.0.3-150200.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795116" comment="libwebpmux3-32bit-1.0.3-150200.3.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4362" version="1" class="patch">
	<metadata>
		<title>Security update for flac (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214615" ref_url="https://bugzilla.suse.com/1214615" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-22219" ref_url="https://www.suse.com/security/cve/CVE-2020-22219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031492.html" source="SUSE-SU"/>
		<description>
This update for flac fixes the following issues:

- CVE-2020-22219: Fixed a buffer overflow in function bitwriter_grow_ which might allow a remote attacker to run arbitrary code via crafted input to the encoder. (bsc#1214615)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-18"/>
	<updated date="2023-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214615">SUSE bug 1214615</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22219/">CVE-2020-22219 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-22219">CVE-2020-22219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009780808" comment="flac-1.3.2-150000.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780809" comment="flac-devel-1.3.2-150000.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780810" comment="flac-devel-32bit-1.3.2-150000.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780811" comment="flac-doc-1.3.2-150000.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780812" comment="libFLAC++6-1.3.2-150000.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780813" comment="libFLAC++6-32bit-1.3.2-150000.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780814" comment="libFLAC8-1.3.2-150000.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009780815" comment="libFLAC8-32bit-1.3.2-150000.3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4363" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1023051" ref_url="https://bugzilla.suse.com/1023051" source="BUGZILLA"/>
		<reference ref_id="1120059" ref_url="https://bugzilla.suse.com/1120059" source="BUGZILLA"/>
		<reference ref_id="1177719" ref_url="https://bugzilla.suse.com/1177719" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1203329" ref_url="https://bugzilla.suse.com/1203329" source="BUGZILLA"/>
		<reference ref_id="1203330" ref_url="https://bugzilla.suse.com/1203330" source="BUGZILLA"/>
		<reference ref_id="1205462" ref_url="https://bugzilla.suse.com/1205462" source="BUGZILLA"/>
		<reference ref_id="1206453" ref_url="https://bugzilla.suse.com/1206453" source="BUGZILLA"/>
		<reference ref_id="1208902" ref_url="https://bugzilla.suse.com/1208902" source="BUGZILLA"/>
		<reference ref_id="1208949" ref_url="https://bugzilla.suse.com/1208949" source="BUGZILLA"/>
		<reference ref_id="1209284" ref_url="https://bugzilla.suse.com/1209284" source="BUGZILLA"/>
		<reference ref_id="1209799" ref_url="https://bugzilla.suse.com/1209799" source="BUGZILLA"/>
		<reference ref_id="1210048" ref_url="https://bugzilla.suse.com/1210048" source="BUGZILLA"/>
		<reference ref_id="1210448" ref_url="https://bugzilla.suse.com/1210448" source="BUGZILLA"/>
		<reference ref_id="1211220" ref_url="https://bugzilla.suse.com/1211220" source="BUGZILLA"/>
		<reference ref_id="1212091" ref_url="https://bugzilla.suse.com/1212091" source="BUGZILLA"/>
		<reference ref_id="1212142" ref_url="https://bugzilla.suse.com/1212142" source="BUGZILLA"/>
		<reference ref_id="1212423" ref_url="https://bugzilla.suse.com/1212423" source="BUGZILLA"/>
		<reference ref_id="1212526" ref_url="https://bugzilla.suse.com/1212526" source="BUGZILLA"/>
		<reference ref_id="1212857" ref_url="https://bugzilla.suse.com/1212857" source="BUGZILLA"/>
		<reference ref_id="1212873" ref_url="https://bugzilla.suse.com/1212873" source="BUGZILLA"/>
		<reference ref_id="1213026" ref_url="https://bugzilla.suse.com/1213026" source="BUGZILLA"/>
		<reference ref_id="1213123" ref_url="https://bugzilla.suse.com/1213123" source="BUGZILLA"/>
		<reference ref_id="1213546" ref_url="https://bugzilla.suse.com/1213546" source="BUGZILLA"/>
		<reference ref_id="1213580" ref_url="https://bugzilla.suse.com/1213580" source="BUGZILLA"/>
		<reference ref_id="1213601" ref_url="https://bugzilla.suse.com/1213601" source="BUGZILLA"/>
		<reference ref_id="1213666" ref_url="https://bugzilla.suse.com/1213666" source="BUGZILLA"/>
		<reference ref_id="1213733" ref_url="https://bugzilla.suse.com/1213733" source="BUGZILLA"/>
		<reference ref_id="1213757" ref_url="https://bugzilla.suse.com/1213757" source="BUGZILLA"/>
		<reference ref_id="1213759" ref_url="https://bugzilla.suse.com/1213759" source="BUGZILLA"/>
		<reference ref_id="1213916" ref_url="https://bugzilla.suse.com/1213916" source="BUGZILLA"/>
		<reference ref_id="1213921" ref_url="https://bugzilla.suse.com/1213921" source="BUGZILLA"/>
		<reference ref_id="1213927" ref_url="https://bugzilla.suse.com/1213927" source="BUGZILLA"/>
		<reference ref_id="1213946" ref_url="https://bugzilla.suse.com/1213946" source="BUGZILLA"/>
		<reference ref_id="1213949" ref_url="https://bugzilla.suse.com/1213949" source="BUGZILLA"/>
		<reference ref_id="1213968" ref_url="https://bugzilla.suse.com/1213968" source="BUGZILLA"/>
		<reference ref_id="1213970" ref_url="https://bugzilla.suse.com/1213970" source="BUGZILLA"/>
		<reference ref_id="1213971" ref_url="https://bugzilla.suse.com/1213971" source="BUGZILLA"/>
		<reference ref_id="1214000" ref_url="https://bugzilla.suse.com/1214000" source="BUGZILLA"/>
		<reference ref_id="1214019" ref_url="https://bugzilla.suse.com/1214019" source="BUGZILLA"/>
		<reference ref_id="1214073" ref_url="https://bugzilla.suse.com/1214073" source="BUGZILLA"/>
		<reference ref_id="1214120" ref_url="https://bugzilla.suse.com/1214120" source="BUGZILLA"/>
		<reference ref_id="1214149" ref_url="https://bugzilla.suse.com/1214149" source="BUGZILLA"/>
		<reference ref_id="1214180" ref_url="https://bugzilla.suse.com/1214180" source="BUGZILLA"/>
		<reference ref_id="1214233" ref_url="https://bugzilla.suse.com/1214233" source="BUGZILLA"/>
		<reference ref_id="1214238" ref_url="https://bugzilla.suse.com/1214238" source="BUGZILLA"/>
		<reference ref_id="1214285" ref_url="https://bugzilla.suse.com/1214285" source="BUGZILLA"/>
		<reference ref_id="1214297" ref_url="https://bugzilla.suse.com/1214297" source="BUGZILLA"/>
		<reference ref_id="1214299" ref_url="https://bugzilla.suse.com/1214299" source="BUGZILLA"/>
		<reference ref_id="1214305" ref_url="https://bugzilla.suse.com/1214305" source="BUGZILLA"/>
		<reference ref_id="1214350" ref_url="https://bugzilla.suse.com/1214350" source="BUGZILLA"/>
		<reference ref_id="1214368" ref_url="https://bugzilla.suse.com/1214368" source="BUGZILLA"/>
		<reference ref_id="1214370" ref_url="https://bugzilla.suse.com/1214370" source="BUGZILLA"/>
		<reference ref_id="1214371" ref_url="https://bugzilla.suse.com/1214371" source="BUGZILLA"/>
		<reference ref_id="1214372" ref_url="https://bugzilla.suse.com/1214372" source="BUGZILLA"/>
		<reference ref_id="1214380" ref_url="https://bugzilla.suse.com/1214380" source="BUGZILLA"/>
		<reference ref_id="1214386" ref_url="https://bugzilla.suse.com/1214386" source="BUGZILLA"/>
		<reference ref_id="1214392" ref_url="https://bugzilla.suse.com/1214392" source="BUGZILLA"/>
		<reference ref_id="1214393" ref_url="https://bugzilla.suse.com/1214393" source="BUGZILLA"/>
		<reference ref_id="1214397" ref_url="https://bugzilla.suse.com/1214397" source="BUGZILLA"/>
		<reference ref_id="1214404" ref_url="https://bugzilla.suse.com/1214404" source="BUGZILLA"/>
		<reference ref_id="1214428" ref_url="https://bugzilla.suse.com/1214428" source="BUGZILLA"/>
		<reference ref_id="1214451" ref_url="https://bugzilla.suse.com/1214451" source="BUGZILLA"/>
		<reference ref_id="1214659" ref_url="https://bugzilla.suse.com/1214659" source="BUGZILLA"/>
		<reference ref_id="1214661" ref_url="https://bugzilla.suse.com/1214661" source="BUGZILLA"/>
		<reference ref_id="1214727" ref_url="https://bugzilla.suse.com/1214727" source="BUGZILLA"/>
		<reference ref_id="1214729" ref_url="https://bugzilla.suse.com/1214729" source="BUGZILLA"/>
		<reference ref_id="1214742" ref_url="https://bugzilla.suse.com/1214742" source="BUGZILLA"/>
		<reference ref_id="1214743" ref_url="https://bugzilla.suse.com/1214743" source="BUGZILLA"/>
		<reference ref_id="1214756" ref_url="https://bugzilla.suse.com/1214756" source="BUGZILLA"/>
		<reference ref_id="1214760" ref_url="https://bugzilla.suse.com/1214760" source="BUGZILLA"/>
		<reference ref_id="1214976" ref_url="https://bugzilla.suse.com/1214976" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-38457" ref_url="https://www.suse.com/security/cve/CVE-2022-38457/" source="CVE"/>
		<reference ref_id="CVE-2022-40133" ref_url="https://www.suse.com/security/cve/CVE-2022-40133/" source="CVE"/>
		<reference ref_id="CVE-2023-2007" ref_url="https://www.suse.com/security/cve/CVE-2023-2007/" source="CVE"/>
		<reference ref_id="CVE-2023-20588" ref_url="https://www.suse.com/security/cve/CVE-2023-20588/" source="CVE"/>
		<reference ref_id="CVE-2023-34319" ref_url="https://www.suse.com/security/cve/CVE-2023-34319/" source="CVE"/>
		<reference ref_id="CVE-2023-3610" ref_url="https://www.suse.com/security/cve/CVE-2023-3610/" source="CVE"/>
		<reference ref_id="CVE-2023-37453" ref_url="https://www.suse.com/security/cve/CVE-2023-37453/" source="CVE"/>
		<reference ref_id="CVE-2023-3772" ref_url="https://www.suse.com/security/cve/CVE-2023-3772/" source="CVE"/>
		<reference ref_id="CVE-2023-3863" ref_url="https://www.suse.com/security/cve/CVE-2023-3863/" source="CVE"/>
		<reference ref_id="CVE-2023-40283" ref_url="https://www.suse.com/security/cve/CVE-2023-40283/" source="CVE"/>
		<reference ref_id="CVE-2023-4128" ref_url="https://www.suse.com/security/cve/CVE-2023-4128/" source="CVE"/>
		<reference ref_id="CVE-2023-4133" ref_url="https://www.suse.com/security/cve/CVE-2023-4133/" source="CVE"/>
		<reference ref_id="CVE-2023-4134" ref_url="https://www.suse.com/security/cve/CVE-2023-4134/" source="CVE"/>
		<reference ref_id="CVE-2023-4147" ref_url="https://www.suse.com/security/cve/CVE-2023-4147/" source="CVE"/>
		<reference ref_id="CVE-2023-4194" ref_url="https://www.suse.com/security/cve/CVE-2023-4194/" source="CVE"/>
		<reference ref_id="CVE-2023-4273" ref_url="https://www.suse.com/security/cve/CVE-2023-4273/" source="CVE"/>
		<reference ref_id="CVE-2023-4387" ref_url="https://www.suse.com/security/cve/CVE-2023-4387/" source="CVE"/>
		<reference ref_id="CVE-2023-4459" ref_url="https://www.suse.com/security/cve/CVE-2023-4459/" source="CVE"/>
		<reference ref_id="CVE-2023-4563" ref_url="https://www.suse.com/security/cve/CVE-2023-4563/" source="CVE"/>
		<reference ref_id="CVE-2023-4569" ref_url="https://www.suse.com/security/cve/CVE-2023-4569/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-38457: Fixed a use-after-free vulnerability in vmwgfx driver that allowed a local attacker to cause a denial of service (bsc#1203330).
- CVE-2022-40133: Fixed a use-after-free vulnerability in vmwgfx driver that allowed a local attacker to cause a denial of service (bsc#1203329).
- CVE-2023-2007: Fixed a flaw in the DPT I2O Controller driver that could allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel (bsc#1210448).
- CVE-2023-3610: Fixed use-after-free vulnerability in nf_tables can be exploited to achieve local privilege escalation (bsc#1213580).
- CVE-2023-3772: Fixed a flaw in XFRM subsystem that may have allowed a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer leading to a possible kernel crash and denial of service (bsc#1213666).
- CVE-2023-3863: Fixed a use-after-free flaw was found in nfc_llcp_find_local that allowed a local user with special privileges to impact a kernel information leak issue (bsc#1213601).
- CVE-2023-4128: Fixed a use-after-free flaw in net/sched/cls_fw.c that allowed a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue (bsc#1214149).
- CVE-2023-4133: Fixed use after free bugs caused by circular dependency problem in cxgb4 (bsc#1213970).
- CVE-2023-4134: Fixed use-after-free in cyttsp4_watchdog_work() (bsc#1213971).
- CVE-2023-4147: Fixed use-after-free in nf_tables_newrule (bsc#1213968).
- CVE-2023-4194: Fixed a type confusion in net tun_chr_open() (bsc#1214019).
- CVE-2023-4273: Fixed a flaw in the exFAT driver of the Linux kernel that alloawed a local privileged attacker to overflow the kernel stack (bsc#1214120).
- CVE-2023-4387: Fixed use-after-free flaw in vmxnet3_rq_alloc_rx_buf that could allow a local attacker to crash the system due to a double-free (bsc#1214350).
- CVE-2023-4459: Fixed a NULL pointer dereference flaw in vmxnet3_rq_cleanup that may have allowed a local attacker with normal user privilege to cause a denial of service (bsc#1214451).
- CVE-2023-4563: Fixed use-after-free in nft_verdict_dump due to a race between set GC and transaction (bsc#1214727).
- CVE-2023-4569: Fixed information leak in nft_set_catchall_flush in net/netfilter/nf_tables_api.c (bsc#1214729).
- CVE-2023-20588: Fixed a division-by-zero error on some AMD processors that can potentially return speculative data resulting in loss of confidentiality (bsc#1213927).
- CVE-2023-34319: Fixed buffer overrun triggered by unusual packet in xen/netback (XSA-432) (bsc#1213546).
- CVE-2023-37453: Fixed oversight in SuperSpeed initialization  (bsc#1213123).
- CVE-2023-40283: Fixed use-after-free in l2cap_sock_ready_cb (bsc#1214233).

The following non-security bugs were fixed:

- ACPI/IORT: Update SMMUv3 DeviceID support (bsc#1214305).
- ACPI: processor: perflib: Avoid updating frequency QoS unnecessarily (git-fixes).
- ACPI: processor: perflib: Use the 'no limit' frequency QoS (git-fixes).
- ACPI: x86: s2idle: Fix a logic error parsing AMD constraints table (git-fixes).
- ALSA: ac97: Fix possible error value of *rac97 (git-fixes).
- ALSA: hda/cs8409: Support new Dell Dolphin Variants (git-fixes).
- ALSA: hda/realtek - Remodified 3k pull low procedure (git-fixes).
- ALSA: hda/realtek: Add quirk for HP Victus 16-d1xxx to enable mute LED (git-fixes).
- ALSA: hda/realtek: Add quirk for mute LEDs on HP ENVY x360 15-eu0xxx (git-fixes).
- ALSA: hda/realtek: Add quirks for HP G11 Laptops (git-fixes).
- ALSA: hda/realtek: Switch Dell Oasis models to use SPI (git-fixes).
- ALSA: pcm: Fix missing fixup call in compat hw_refine ioctl (git-fixes).
- ALSA: usb-audio: Add support for Mythware XA001AU capture and playback interfaces (git-fixes).
- ALSA: usb-audio: Fix init call orders for UAC1 (git-fixes).
- ALSA: ymfpci: Fix the missing snd_card_free() call at probe error (git-fixes).
- ARM: dts: imx6dl: prtrvt, prtvt7, prti6q, prtwd2: fix USB related warnings (git-fixes).
- ARM: dts: imx6sll: fixup of operating points (git-fixes).
- ARM: spear: Do not use timer namespace for timer_shutdown() function (bsc#1213970).
- ASoC: SOF: Intel: fix SoundWire/HDaudio mutual exclusion (git-fixes).
- ASoC: amd: yc: Fix a non-functional mic on Lenovo 82SJ (git-fixes).
- ASoC: lower 'no backend DAIs enabled for ... Port' log severity (git-fixes).
- ASoC: meson: axg-tdm-formatter: fix channel slot allocation (git-fixes).
- ASoC: rt5665: add missed regulator_bulk_disable (git-fixes).
- ASoC: stac9766: fix build errors with REGMAP_AC97 (git-fixes).
- ASoC: tegra: Fix SFC conversion for few rates (git-fixes).
- Bluetooth: Fix potential use-after-free when clear keys (git-fixes).
- Bluetooth: L2CAP: Fix use-after-free (git-fixes).
- Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb (git-fixes).
- Bluetooth: Remove unused declaration amp_read_loc_info() (git-fixes).
- Bluetooth: btusb: Add MT7922 bluetooth ID for the Asus Ally (git-fixes).
- Bluetooth: btusb: Do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- Bluetooth: nokia: fix value check in nokia_bluetooth_serdev_probe() (git-fixes).
- CONFIG_NVME_VERBOSE_ERRORS=y     gone with a82baa8083b
- CONFIG_PRINTK_SAFE_LOG_BUF_SHIFT=13  gone with 7e152d55123
- Created new preempt kernel flavor Configs are cloned from the respective $arch/default configs. All changed configs appart from CONFIG_PREEMPT-&gt;y are a result of dependencies, namely many lock/unlock primitives are no longer inlined in the preempt kernel. TREE_RCU has been also changed to PREEMPT_RCU which is the default implementation for PREEMPT kernel.
- Documentation: devices.txt: Fix minors for ttyCPM* (git-fixes).
- Documentation: devices.txt: Remove ttyIOC* (git-fixes).
- Documentation: devices.txt: Remove ttySIOC* (git-fixes).
- Drivers: hv: Do not remap addresses that are above shared_gpa_boundary (bsc#1206453).
- Drivers: hv: Enable vmbus driver for nested root partition (bsc#1206453).
- Drivers: hv: Explicitly request decrypted in vmap_pfn() calls (bsc#1206453).
- Drivers: hv: Setup synic registers in case of nested root partition (bsc#1206453).
- Drivers: hv: vmbus: Call hv_synic_free() if hv_synic_alloc() fails (bsc#1206453).
- Drivers: hv: vmbus: Remove second mapping of VMBus monitor pages (bsc#1206453).
- Drivers: hv: vmbus: Remove second way of mapping ring buffers (bsc#1206453).
- Drivers: hv: vmbus: Remove the per-CPU post_msg_page (bsc#1206453).
- Drop cfg80211 lock fix patches that caused a regression (bsc#1213757)
- Drop rtsx patch that caused a regression (bsc#1214397,bsc#1214428)
- Enable Analog Devices Industrial Ethernet PHY driver (jsc#PED-4759)
- HID: add quirk for 03f0:464a HP Elite Presenter Mouse (git-fixes).
- HID: logitech-dj: Fix error handling in logi_dj_recv_switch_to_dj_mode() (git-fixes).
- HID: logitech-hidpp: Add USB and Bluetooth IDs for the Logitech G915 TKL Keyboard (git-fixes).
- HID: multitouch: Correct devm device reference for hidinput input_dev name (git-fixes).
- HID: wacom: remove the battery when the EKR is off (git-fixes).
- HWPOISON: offline support: fix spelling in Documentation/ABI/ (git-fixes).
- IB/hfi1: Fix possible panic during hotplug remove (git-fixes)
- IB/uverbs: Fix an potential error pointer dereference (git-fixes)
- Input: exc3000 - properly stop timer on shutdown (git-fixes).
- KVM: s390: fix sthyi error handling (git-fixes bsc#1214370).
- Kbuild: add -Wno-shift-negative-value where -Wextra is used (bsc#1214756).
- Kbuild: move to -std=gnu11 (bsc#1214756).
- PCI/ASPM: Avoid link retraining race (git-fixes).
- PCI/ASPM: Factor out pcie_wait_for_retrain() (git-fixes).
- PCI/ASPM: Return 0 or -ETIMEDOUT from pcie_retrain_link() (git-fixes).
- PCI: Mark NVIDIA T4 GPUs to avoid bus reset (git-fixes).
- PCI: acpiphp: Reassign resources on bridge if necessary (git-fixes).
- PCI: acpiphp: Use pci_assign_unassigned_bridge_resources() only for non-root bus (git-fixes).
- PCI: hv: Enable PCI pass-thru devices in Confidential VMs (bsc#1206453).
- PCI: hv: Replace retarget_msi_interrupt_params with (bsc#1206453).
- PCI: meson: Remove cast between incompatible function type (git-fixes).
- PCI: microchip: Correct the DED and SEC interrupt bit offsets (git-fixes).
- PCI: microchip: Remove cast between incompatible function type (git-fixes).
- PCI: pciehp: Use RMW accessors for changing LNKCTL (git-fixes).
- PCI: rockchip: Remove writes to unused registers (git-fixes).
- PCI: s390: Fix use-after-free of PCI resources with per-function hotplug (git-fixes).
- PCI: tegra194: Fix possible array out of bounds access (git-fixes).
- PM / devfreq: Fix leak in devfreq_dev_release() (git-fixes).
- RDMA/bnxt_re: Fix error handling in probe failure path (git-fixes)
- RDMA/bnxt_re: Fix max_qp count for virtual functions (git-fixes)
- RDMA/efa: Fix wrong resources deallocation order (git-fixes)
- RDMA/hns: Fix CQ and QP cache affinity (git-fixes)
- RDMA/hns: Fix incorrect post-send with direct wqe of wr-list (git-fixes)
- RDMA/hns: Fix port active speed (git-fixes)
- RDMA/irdma: Prevent zero-length STAG registration (git-fixes)
- RDMA/irdma: Replace one-element array with flexible-array member (git-fixes)
- RDMA/mlx5: Return the firmware result upon destroying QP/RQ (git-fixes)
- RDMA/qedr: Remove a duplicate assignment in irdma_query_ah() (git-fixes)
- RDMA/siw: Balance the reference of cep-&gt;kref in the error path (git-fixes)
- RDMA/siw: Correct wrong debug message (git-fixes)
- RDMA/umem: Set iova in ODP flow (git-fixes)
- README.BRANCH: Add Miroslav Franc as a SLE15-SP4 co-maintainer.
- Revert 'IB/isert: Fix incorrect release of isert connection' (git-fixes)
- Revert 'tracing: Add '(fault)' name injection to kernel probes' (git-fixes).
- Update patches.suse/cpufreq-intel_pstate-Fix-cpu-pstate.turbo_freq-initi.patch (git-fixes bsc#1212526 bsc#1214368 jsc#PED-4927 jsc#PED-4929).
- amba: bus: fix refcount leak (git-fixes).
- arm64: dts: imx8mn-var-som: add missing pull-up for onboard PHY reset pinmux (git-fixes).
- arm64: dts: qcom: qrb5165-rb5: fix thermal zone conflict (git-fixes).
- arm64: dts: rockchip: Disable HS400 for eMMC on ROCK Pi 4 (git-fixes).
- audit: fix possible soft lockup in __audit_inode_child() (git-fixes).
- backlight/bd6107: Compare against struct fb_info.device (git-fixes).
- backlight/gpio_backlight: Compare against struct fb_info.device (git-fixes).
- backlight/lv5207lp: Compare against struct fb_info.device (git-fixes).
- batman-adv: Do not get eth header before batadv_check_management_packet (git-fixes).
- batman-adv: Do not increase MTU when set by user (git-fixes).
- batman-adv: Fix TT global entry leak when client roamed back (git-fixes).
- batman-adv: Fix batadv_v_ogm_aggr_send memory leak (git-fixes).
- batman-adv: Hold rtnl lock during MTU update via netlink (git-fixes).
- batman-adv: Trigger events for auto adjusted MTU (git-fixes).
- bnx2x: fix page fault following EEH recovery (bsc#1214299).
- bpf: Disable preemption in bpf_event_output (git-fixes).
- bpftool: Print newline before '}' for struct with padding only fields (bsc#1211220 jsc#PED-3924).
- bus: mhi: host: Skip MHI reset if device is in RDDM (git-fixes).
- bus: ti-sysc: Fix build warning for 64-bit build (git-fixes).
- bus: ti-sysc: Fix cast to enum warning (git-fixes).
- bus: ti-sysc: Flush posted write on enable before reset (git-fixes).
- can: gs_usb: gs_usb_receive_bulk_callback(): count RX overflow errors also in case of OOM (git-fixes).
- ceph: defer stopping mdsc delayed_work (bsc#1214392).
- ceph: do not check for quotas on MDS stray dirs (bsc#1214238).
- ceph: never send metrics if disable_send_metrics is set (bsc#1214180).
- check-for-config-changes: ignore BUILTIN_RETURN_ADDRESS_STRIPS_PAC (bsc#1214380). gcc7 on SLE 15 does not support this while later gcc does.
- cifs: add missing return value check for cifs_sb_tlink (bsc#1193629).
- cifs: allow dumping keys for directories too (bsc#1193629).
- cifs: fix mid leak during reconnection after timeout threshold (git-fixes).
- cifs: if deferred close is disabled then close files immediately (git-fixes).
- cifs: is_network_name_deleted should return a bool (bsc#1193629).
- cifs: update internal module version number for cifs.ko (bsc#1193629).
- clk: Fix slab-out-of-bounds error in devm_clk_release() (git-fixes).
- clk: Fix undefined reference to `clk_rate_exclusive_{get,put}' (git-fixes).
- clk: imx8mp: fix sai4 clock (git-fixes).
- clk: imx: composite-8m: fix clock pauses when set_rate would be a no-op (git-fixes).
- clk: imx: pll14xx: dynamically configure PLL for 393216000/361267200Hz (git-fixes).
- clk: qcom: camcc-sc7180: fix async resume during probe (git-fixes).
- clk: qcom: gcc-mdm9615: use proper parent for pll0_vote clock (git-fixes).
- clk: qcom: gcc-sc7180: Fix up gcc_sdcc2_apps_clk_src (git-fixes).
- clk: qcom: gcc-sm8250: Fix gcc_sdcc2_apps_clk_src (git-fixes).
- clk: sunxi-ng: Modify mismatched function name (git-fixes).
- clocksource/drivers/arm_arch_timer: Do not use timer namespace for timer_shutdown() function (bsc#1213970).
- clocksource/drivers/hyper-v: Rework clocksource and sched clock setup (bsc#1206453).
- clocksource/drivers/sp804: Do not use timer namespace for timer_shutdown() function (bsc#1213970).
- clocksource: hyper-v: Add TSC page support for root partition (bsc#1206453).
- clocksource: hyper-v: Introduce TSC PFN getter (bsc#1206453).
- clocksource: hyper-v: Introduce a pointer to TSC page (bsc#1206453).
- clocksource: hyper-v: Use TSC PFN getter to map vvar page (bsc#1206453).
- clocksource: hyper-v: make sure Invariant-TSC is used if it is (bsc#1206453).
- cpu/SMT: Allow enabling partial SMT states via sysfs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/SMT: Create topology_smt_thread_allowed() (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/SMT: Move SMT prototypes into cpu_smt.h (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/SMT: Move smt/control simple exit cases earlier (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/SMT: Remove topology_smt_supported() (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/SMT: Store the current/max number of threads (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpufreq: Fix the race condition while updating the transition_task of policy (git-fixes).
- cpufreq: intel_pstate: Adjust balance_performance EPP for Sapphire Rapids (bsc#1214659).
- cpufreq: intel_pstate: Enable HWP IO boost for all servers (bsc#1208949 jsc#PED-6003 jsc#PED-6004).
- cpufreq: intel_pstate: Fix scaling for hybrid-capable systems with disabled E-cores (bsc#1212526 bsc#1214368 jsc#PED-4927 jsc#PED-4929).
- cpufreq: intel_pstate: Read all MSRs on the target CPU (bsc#1212526 bsc#1214368 jsc#PED-4927 jsc#PED-4929).
- cpufreq: intel_pstate: hybrid: Rework HWP calibration (bsc#1212526 bsc#1214368 jsc#PED-4927 jsc#PED-4929).
- cpufreq: intel_pstate: hybrid: Use known scaling factor for P-cores (bsc#1212526 bsc#1214368 jsc#PED-4927 jsc#PED-4929).
- crypto: caam - fix unchecked return value error (git-fixes).
- crypto: stm32 - Properly handle pm_runtime_get failing (git-fixes).
- define more Hyper-V related constants (bsc#1206453).
- dma-buf/sw_sync: Avoid recursive lock during fence signal (git-fixes).
- dma-buf/sync_file: Fix docs syntax (git-fixes).
- dmaengine: idxd: Modify the dependence of attribute pasid_enabled (git-fixes).
- dmaengine: mcf-edma: Fix a potential un-allocated memory access (git-fixes).
- dmaengine: pl330: Return DMA_PAUSED when transaction is paused (git-fixes).
- dmaengine: ste_dma40: Add missing IRQ check in d40_probe (git-fixes).
- docs/process/howto: Replace C89 with C11 (bsc#1214756).
- docs: kernel-parameters: Refer to the correct bitmap function (git-fixes).
- docs: networking: replace skb_hwtstamp_tx with skb_tstamp_tx (git-fixes).
- docs: printk-formats: Fix hex printing of signed values (git-fixes).
- driver core: test_async: fix an error code (git-fixes).
- drivers: clk: keystone: Fix parameter judgment in _of_pll_clk_init() (git-fixes).
- drivers: usb: smsusb: fix error handling code in smsusb_init_device (git-fixes).
- drm/amd/display: Apply 60us prefetch for DCFCLK &amp;lt;= 300Mhz (git-fixes).
- drm/amd/display: Disable phantom OTG after enable for plane disable (git-fixes).
- drm/amd/display: Do not set drr on pipe commit (git-fixes).
- drm/amd/display: Enable dcn314 DPP RCO (git-fixes).
- drm/amd/display: Ensure that planes are in the same order (git-fixes).
- drm/amd/display: Implement workaround for writing to OTG_PIXEL_RATE_DIV register (git-fixes).
- drm/amd/display: Retain phantom plane/stream if validation fails (git-fixes).
- drm/amd/display: Skip DPP DTO update if root clock is gated (git-fixes).
- drm/amd/display: Use update plane and stream routine for DCN32x (git-fixes).
- drm/amd/display: check TG is non-null before checking if enabled (git-fixes).
- drm/amd/display: check attr flag before set cursor degamma on DCN3+ (git-fixes).
- drm/amd/display: disable RCO for DCN314 (git-fixes).
- drm/amd/display: do not wait for mpc idle if tg is disabled (git-fixes).
- drm/amd/display: fix access hdcp_workqueue assert (git-fixes).
- drm/amd/display: fix the build when DRM_AMD_DC_DCN is not set (git-fixes).
- drm/amd/display: limit DPIA link rate to HBR3 (git-fixes).
- drm/amd/display: phase3 mst hdcp for multiple displays (git-fixes).
- drm/amd/display: save restore hdcp state when display is unplugged from mst hub (git-fixes).
- drm/amd/display: trigger timing sync only if TG is running (git-fixes).
- drm/amd/pm/smu7: move variables to where they are used (git-fixes).
- drm/amd/pm: avoid unintentional shutdown due to temperature momentary fluctuation (git-fixes).
- drm/amd/pm: expose swctf threshold setting for legacy powerplay (git-fixes).
- drm/amd/pm: fix variable dereferenced issue in amdgpu_device_attr_create() (git-fixes).
- drm/amd/pm: fulfill powerplay peak profiling mode shader/memory clock settings (git-fixes).
- drm/amd/pm: fulfill swsmu peak profiling mode shader/memory clock settings (git-fixes).
- drm/amd/pm: skip the RLC stop when S0i3 suspend for SMU v13.0.4/11 (git-fixes).
- drm/amd: Disable S/G for APUs when 64GB or more host memory (git-fixes).
- drm/amd: flush any delayed gfxoff on suspend entry (git-fixes).
- drm/amdgpu/pm: fix throttle_status for other than MP1 11.0.7 (git-fixes).
- drm/amdgpu: Fix integer overflow in amdgpu_cs_pass1 (git-fixes).
- drm/amdgpu: Fix potential fence use-after-free v2 (git-fixes).
- drm/amdgpu: Remove unnecessary domain argument (git-fixes).
- drm/amdgpu: Use RMW accessors for changing LNKCTL (git-fixes).
- drm/amdgpu: add S/G display parameter (git-fixes).
- drm/amdgpu: add vram reservation based on vram_usagebyfirmware_v2_2 (git-fixes).
- drm/amdgpu: avoid integer overflow warning in amdgpu_device_resize_fb_bar() (git-fixes).
- drm/amdgpu: fix calltrace warning in amddrm_buddy_fini (git-fixes).
- drm/amdgpu: fix memory leak in mes self test (git-fixes).
- drm/amdgpu: fix possible UAF in amdgpu_cs_pass1() (git-fixes).
- drm/amdgpu: install stub fence into potential unused fence pointers (git-fixes).
- drm/amdgpu: keep irq count in amdgpu_irq_disable_all (git-fixes).
- drm/amdgpu: skip fence GFX interrupts disable/enable for S0ix (git-fixes).
- drm/armada: Fix off-by-one error in armada_overlay_get_property() (git-fixes).
- drm/ast: Fix DRAM init on AST2200 (git-fixes).
- drm/atomic-helper: Update reference to drm_crtc_force_disable_all() (git-fixes).
- drm/bridge: anx7625: Drop device lock before drm_helper_hpd_irq_event() (git-fixes).
- drm/bridge: anx7625: Use common macros for DP power sequencing commands (git-fixes).
- drm/bridge: anx7625: Use common macros for HDCP capabilities (git-fixes).
- drm/bridge: fix -Wunused-const-variable= warning (git-fixes).
- drm/bridge: tc358764: Fix debug print parameter order (git-fixes).
- drm/etnaviv: fix dumping of active MMU context (git-fixes).
- drm/gma500: Use drm_aperture_remove_conflicting_pci_framebuffers (git-fixes).
- drm/i915/sdvo: fix panel_type initialization (git-fixes).
- drm/i915: Fix premature release of request's reusable memory (git-fixes).
- drm/mediatek: Fix dereference before null check (git-fixes).
- drm/mediatek: Fix potential memory leak if vmap() fail (git-fixes).
- drm/mediatek: Remove freeing not dynamic allocated memory (git-fixes).
- drm/msm/a2xx: Call adreno_gpu_init() earlier (git-fixes).
- drm/msm/dpu: fix the irq index in dpu_encoder_phys_wb_wait_for_commit_done (git-fixes).
- drm/msm/mdp5: Do not leak some plane state (git-fixes).
- drm/msm: Update dev core dump to not print backwards (git-fixes).
- drm/mxsfb: Disable overlay plane in mxsfb_plane_overlay_atomic_disable() (git-fixes).
- drm/nouveau/disp: Revert a NULL check inside nouveau_connector_get_modes (git-fixes).
- drm/nouveau/disp: fix use-after-free in error handling of nouveau_connector_create (bsc#1214073).
- drm/nouveau/gr: enable memory loads on helper invocation on all channels (git-fixes).
- drm/nouveau/nvkm/dp: Add workaround to fix DP 1.3+ DPCD issues (git-fixes).
- drm/panel: simple: Add missing connector type and pixel format for AUO T215HVN01 (git-fixes).
- drm/panel: simple: Fix AUO G121EAN01 panel timings according to the docs (git-fixes).
- drm/qxl: fix UAF on handle creation (git-fixes).
- drm/radeon: Use RMW accessors for changing LNKCTL (git-fixes).
- drm/repaper: Reduce temporary buffer size in repaper_fb_dirty() (git-fixes).
- drm/rockchip: Do not spam logs in atomic check (git-fixes).
- drm/shmem-helper: Reset vma-&gt;vm_ops before calling dma_buf_mmap() (git-fixes).
- drm/stm: ltdc: fix late dereference check (git-fixes).
- drm/tegra: dpaux: Fix incorrect return value of platform_get_irq (git-fixes).
- drm/ttm: check null pointer before accessing when swapping (git-fixes).
- drm/ttm: never consider pinned BOs for eviction&amp;swap (git-fixes).
- drm/vmwgfx: Fix shader stage validation (git-fixes).
- drm: adv7511: Fix low refresh rate register for ADV7533/5 (git-fixes).
- drm: rcar-du: remove R-Car H3 ES1.* workarounds (git-fixes).
- drm: xlnx: zynqmp_dpsub: Add missing check for dma_set_mask (git-fixes).
- dt-bindings: clock: xlnx,versal-clk: drop select:false (git-fixes).
- dt-bindings: clocks: imx8mp: make sai4 a dummy clock (git-fixes).
- dt-bindings: crypto: ti,sa2ul: make power-domains conditional (git-fixes).
- e1000: Fix typos in comments (jsc#PED-5738).
- e1000: Remove unnecessary use of kmap_atomic() (jsc#PED-5738).
- e1000: switch to napi_build_skb() (jsc#PED-5738).
- e1000: switch to napi_consume_skb() (jsc#PED-5738).
- enable TPM in azure (bsc#1214760)
- exfat: fix unexpected EOF while reading dir (bsc#1214000).
- exfat: release s_lock before calling dir_emit() (bsc#1214000).
- exfat_iterate(): do not open-code file_inode(file) (bsc#1214000).
- fbdev/ep93xx-fb: Do not assign to struct fb_info.dev (git-fixes).
- fbdev: Fix sys_imageblit() for arbitrary image widths (git-fixes).
- fbdev: Improve performance of sys_imageblit() (git-fixes).
- fbdev: Update fbdev source file paths (git-fixes).
- fbdev: fix potential OOB read in fast_imageblit() (git-fixes).
- fbdev: mmp: fix value check in mmphw_probe() (git-fixes).
- file: reinstate f_pos locking optimization for regular files (bsc#1213759).
- firmware: arm_scmi: Drop OF node reference in the transport channel setup (git-fixes).
- firmware: cs_dsp: Fix new control name check (git-fixes).
- firmware: meson_sm: fix to avoid potential NULL pointer dereference (git-fixes).
- firmware: stratix10-svc: Fix an NULL vs IS_ERR() bug in probe (git-fixes).
- fprobe: Release rethook after the ftrace_ops is unregistered (git-fixes).
- fprobe: add unlock to match a succeeded ftrace_test_recursion_trylock (git-fixes).
- fs/sysv: Null check to prevent null-ptr-deref bug (git-fixes).
- fsi: aspeed: Reset master errors after CFAM reset (git-fixes).
- fsi: master-ast-cf: Add MODULE_FIRMWARE macro (git-fixes).
- ftrace: Fix possible warning on checking all pages used in ftrace_process_locs() (git-fixes).
- gpio: mvebu: Make use of devm_pwmchip_add (git-fixes).
- gpio: mvebu: fix irq domain leak (git-fixes).
- gpio: tps68470: Make tps68470_gpio_output() always set the initial value (git-fixes).
- hv_netvsc: Remove second mapping of send and recv buffers (bsc#1206453).
- hwmon: (pmbus/bel-pfe) Enable PMBUS_SKIP_STATUS_CHECK for pfe1100 (git-fixes).
- hwmon: (tmp513) Fix the channel number in tmp51x_is_visible() (git-fixes).
- hwrng: iproc-rng200 - Implement suspend and resume calls (git-fixes).
- hwrng: nomadik - keep clock enabled while hwrng is registered (git-fixes).
- hwrng: pic32 - use devm_clk_get_enabled (git-fixes).
- i2c: Delete error messages for failed memory allocations (git-fixes).
- i2c: Improve size determinations (git-fixes).
- i2c: bcm-iproc: Fix bcm_iproc_i2c_isr deadlock issue (git-fixes).
- i2c: designware: Correct length byte validation logic (git-fixes).
- i2c: designware: Handle invalid SMBus block data response length value (git-fixes).
- i2c: hisi: Only handle the interrupt of the driver's transfer (git-fixes).
- i2c: nomadik: Remove a useless call in the remove function (git-fixes).
- i2c: nomadik: Remove unnecessary goto label (git-fixes).
- i2c: nomadik: Use devm_clk_get_enabled() (git-fixes).
- i40e: Fix an NULL vs IS_ERR() bug for debugfs_create_dir() (git-fixes).
- iavf: fix potential races for FDIR filters (git-fixes).
- ice: Fix RDMA VSI removal during queue rebuild (git-fixes).
- ice: Fix crash by keep old cfg when update TCs more than queues (git-fixes).
- ice: Fix max_rate check while configuring TX rate limits (git-fixes).
- ice: Fix memory management in ice_ethtool_fdir.c (git-fixes).
- iio: adc: ina2xx: avoid NULL pointer dereference on OF device match (git-fixes).
- iio: adc: stx104: Implement and utilize register structures (git-fixes).
- iio: adc: stx104: Utilize iomap interface (git-fixes).
- iio: cros_ec: Fix the allocation size for cros_ec_command (git-fixes).
- intel/e1000:fix repeated words in comments (jsc#PED-5738).
- intel: remove unused macros (jsc#PED-5738).
- iommu/amd/io-pgtable: Implement map_pages io_pgtable_ops callback (bsc#1212423).
- iommu/amd/io-pgtable: Implement unmap_pages io_pgtable_ops callback (bsc#1212423).
- iommu/amd: Add PCI segment support for ivrs_ commands (git-fixes).
- iommu/amd: Add map/unmap_pages() iommu_domain_ops callback support (bsc#1212423).
- iommu/amd: Do not identity map v2 capable device when snp is enabled (git-fixes).
- iommu/amd: Fix compile warning in init code (git-fixes).
- iommu/amd: Fix ill-formed ivrs_ioapic, ivrs_hpet and ivrs_acpihid options (git-fixes).
- iommu/amd: Fix ivrs_acpihid cmdline parsing code (git-fixes).
- iommu/amd: Fix pci device refcount leak in ppr_notifier() (git-fixes).
- iommu/amd: use full 64-bit value in build_completion_wait() (git-fixes).
- iommu/arm-smmu-v3: Make default domain type of HiSilicon PTT device to identity (git-fixes).
- iommu/arm-smmu-v3: check return value after calling platform_get_resource() (git-fixes).
- iommu/arm-smmu-v3: fix event handling soft lockup (git-fixes).
- iommu/arm-smmu: fix possible null-ptr-deref in arm_smmu_device_probe() (git-fixes).
- iommu/dart: Initialize DART_STREAMS_ENABLE (git-fixes).
- iommu/dma: Fix incorrect error return on iommu deferred attach (git-fixes).
- iommu/dma: Fix iova map result check bug (git-fixes).
- iommu/dma: return error code from iommu_dma_map_sg() (git-fixes).
- iommu/fsl_pamu: Fix resource leak in fsl_pamu_probe() (git-fixes).
- iommu/io-pgtable-arm-v7s: Add a quirk to allow pgtable PA up to 35bit (git-fixes).
- iommu/iova: Fix module config properly (git-fixes).
- iommu/mediatek: Add error path for loop of mm_dts_parse (git-fixes).
- iommu/mediatek: Add platform_device_put for recovering the device refcnt (git-fixes).
- iommu/mediatek: Check return value after calling platform_get_resource() (git-fixes).
- iommu/mediatek: Set dma_mask for PGTABLE_PA_35_EN (git-fixes).
- iommu/mediatek: Use component_match_add (git-fixes).
- iommu/mediatek: Validate number of phandles associated with 'mediatek,larbs' (git-fixes).
- iommu/omap: Fix buffer overflow in debugfs (git-fixes).
- iommu/rockchip: fix permission bits in page table entries v2 (git-fixes).
- iommu/s390: Fix duplicate domain attachments (git-fixes).
- iommu/sun50i: Consider all fault sources for reset (git-fixes).
- iommu/sun50i: Fix R/W permission check (git-fixes).
- iommu/sun50i: Fix flush size (git-fixes).
- iommu/sun50i: Fix reset release (git-fixes).
- iommu/sun50i: Implement .iotlb_sync_map (git-fixes).
- iommu/sun50i: Remove IOMMU_DOMAIN_IDENTITY (git-fixes).
- iommu/vt-d: Add RPLS to quirk list to skip TE disabling (git-fixes).
- iommu/vt-d: Check correct capability for sagaw determination (git-fixes).
- iommu/vt-d: Clean up si_domain in the init_dmars() error path (git-fixes).
- iommu/vt-d: Correctly calculate sagaw value of IOMMU (git-fixes).
- iommu/vt-d: Fix PCI device refcount leak in dmar_dev_scope_init() (git-fixes).
- iommu/vt-d: Fix PCI device refcount leak in has_external_pci() (git-fixes).
- iommu/vt-d: Fix kdump kernels boot failure with scalable mode (git-fixes).
- iommu/vt-d: Preset Access bit for IOVA in FL non-leaf paging entries (git-fixes).
- iommu/vt-d: Set SRE bit only when hardware has SRS cap (git-fixes).
- ipmi:ssif: Add check for kstrdup (git-fixes).
- ipmi:ssif: Fix a memory leak when scanning for an adapter (git-fixes).
- ipmi_si: fix a memleak in try_smi_init() (git-fixes).
- jffs2: correct logic when creating a hole in jffs2_write_begin (git-fixes).
- kabi/severities: Ignore newly added SRSO mitigation functions
- kabi: Allow extra bugsints (bsc#1213927).
- kernel-binary: Common dependencies cleanup Common dependencies are copied to a subpackage, there is no need for copying defines or build dependencies there.
- kernel-binary: Drop code for kerntypes support Kerntypes was a SUSE-specific feature dropped before SLE 12.
- kunit: make kunit_test_timeout compatible with comment (git-fixes).
- leds: Fix BUG_ON check for LED_COLOR_ID_MULTI that is always false (git-fixes).
- leds: multicolor: Use rounded division when calculating color components (git-fixes).
- leds: pwm: Fix error code in led_pwm_create_fwnode() (git-fixes).
- leds: trigger: tty: Do not use LED_ON/OFF constants, use led_blink_set_oneshot instead (git-fixes).
- leds: turris-omnia: Drop unnecessary mutex locking (git-fixes).
- lib/test_meminit: allocate pages up to order MAX_ORDER (git-fixes).
- lib/test_meminit: destroy cache in kmem_cache_alloc_bulk() test (git-fixes).
- libbpf: Fix BTF-to-C converter's padding logic (bsc#1211220 jsc#PED-3924).
- libbpf: Fix btf_dump's packed struct determination (bsc#1211220 jsc#PED-3924).
- libbpf: Fix single-line struct definition output in btf_dump (bsc#1211220 jsc#PED-3924).
- libceph: fix potential hang in ceph_osdc_notify() (bsc#1214393).
- md/raid0: Factor out helper for mapping and submitting a bio (bsc#1213916).
- md/raid0: Fix performance regression for large sequential writes (bsc#1213916).
- media: ad5820: Drop unsupported ad5823 from i2c_ and of_device_id tables (git-fixes).
- media: cx24120: Add retval check for cx24120_message_send() (git-fixes).
- media: dib7000p: Fix potential division by zero (git-fixes).
- media: dvb-usb: m920x: Fix a potential memory leak in m920x_i2c_xfer() (git-fixes).
- media: go7007: Remove redundant if statement (git-fixes).
- media: i2c: ccs: Check rules is non-NULL (git-fixes).
- media: i2c: rdacm21: Fix uninitialized value (git-fixes).
- media: i2c: tvp5150: check return value of devm_kasprintf() (git-fixes).
- media: ov2680: Add ov2680_fill_format() helper function (git-fixes).
- media: ov2680: Do not take the lock for try_fmt calls (git-fixes).
- media: ov2680: Fix ov2680_bayer_order() (git-fixes).
- media: ov2680: Fix ov2680_set_fmt() which == V4L2_SUBDEV_FORMAT_TRY not working (git-fixes).
- media: ov2680: Fix regulators being left enabled on ov2680_power_on() errors (git-fixes).
- media: ov2680: Fix vflip / hflip set functions (git-fixes).
- media: ov2680: Remove VIDEO_V4L2_SUBDEV_API ifdef-s (git-fixes).
- media: ov5640: Enable MIPI interface in ov5640_set_power_mipi() (git-fixes).
- media: rkvdec: increase max supported height for H.264 (git-fixes).
- media: v4l2-core: Fix a potential resource leak in v4l2_fwnode_parse_link() (git-fixes).
- media: v4l2-mem2mem: add lock to protect parameter num_rdy (git-fixes).
- media: venus: hfi_venus: Only consider sys_idle_indicator on V1 (git-fixes).
- media: venus: hfi_venus: Write to VIDC_CTRL_INIT after unmasking interrupts (git-fixes).
- misc: rtsx: judge ASPM Mode to set PETXCFG Reg (git-fixes).
- mkspec: Allow unsupported KMPs (bsc#1214386)
- mlxsw: pci: Add shutdown method in PCI driver (git-fixes).
- mmc: block: Fix in_flight[issue_type] value error (git-fixes).
- mmc: moxart: read scr register without changing byte order (git-fixes).
- mmc: wbsd: fix double mmc_free_host() in wbsd_init() (git-fixes).
- module: avoid allocation if module is already present and ready (bsc#1213921).
- module: extract patient module check into helper (bsc#1213921).
- module: move check_modinfo() early to early_mod_check() (bsc#1213921).
- module: move early sanity checks into a helper (bsc#1213921).
- mtd: rawnand: brcmnand: Fix crash during the panic_write (git-fixes).
- mtd: rawnand: brcmnand: Fix mtd oobsize (git-fixes).
- mtd: rawnand: brcmnand: Fix potential false time out warning (git-fixes).
- mtd: rawnand: brcmnand: Fix potential out-of-bounds access in oob write (git-fixes).
- mtd: rawnand: fsl_upm: Fix an off-by one test in fun_exec_op() (git-fixes).
- mtd: rawnand: fsmc: handle clk prepare error in fsmc_nand_resume() (git-fixes).
- mtd: rawnand: omap_elm: Fix incorrect type in assignment (git-fixes).
- mtd: rawnand: rockchip: Align hwecc vs. raw page helper layouts (git-fixes).
- mtd: rawnand: rockchip: fix oobfree offset and description (git-fixes).
- mtd: spi-nor: Check bus width while setting QE bit (git-fixes).
- mtd: spinand: toshiba: Fix ecc_get_status (git-fixes).
- n_tty: Rename tail to old_tail in n_tty_read() (git-fixes).
- net: hns3: fix wrong bw weight of disabled tc issue (git-fixes).
- net: ieee802154: at86rf230: Stop leaking skb's (git-fixes).
- net: mana: Fix MANA VF unload when hardware is unresponsive (git-fixes).
- net: phy: at803x: remove set/get wol callbacks for AR8032 (git-fixes).
- net: phy: broadcom: stub c45 read/write for 54810 (git-fixes).
- net: phy: fix IRQ-based wake-on-lan over hibernate / power off (git-fixes).
- net: stmmac: tegra: Properly allocate clock bulk data (bsc#1213733)
- net: usb: lan78xx: reorder cleanup operations to avoid UAF bugs (git-fixes).
- net: usbnet: Fix WARNING in usbnet_start_xmit/usb_submit_urb (git-fixes).
- netfs: Fix lockdep warning from taking sb_writers whilst holding mmap_lock (bsc#1214742).
- netfs: Fix missing xas_retry() calls in xarray iteration (bsc#1213946 bsc#1214404).
- netfs: Fix missing xas_retry() calls in xarray iteration (bsc#1213946).
- netfs: fix parameter of cleanup() (bsc#1214743).
- nfsd: Remove incorrect check in nfsd4_validate_stateid (git-fixes).
- nilfs2: fix WARNING in mark_buffer_dirty due to discarded buffer reuse (git-fixes).
- nilfs2: fix use-after-free of nilfs_root in dirtying inodes via iput (git-fixes).
- nvme-rdma: fix potential unbalanced freeze &amp; unfreeze (bsc#1208902).
- nvme-tcp: fix potential unbalanced freeze &amp; unfreeze (bsc#1208902).
- objtool/x86: Fix SRSO mess (git-fixes).
- objtool/x86: Fixup frame-pointer vs rethunk (git-fixes).
- objtool: Union instruction::{call_dest,jump_table} (git-fixes).
- old-flavors: Drop 2.6 kernels. 2.6 based kernels are EOL, upgrading from them is no longer suported.
- pcmcia: rsrc_nonstatic: Fix memory leak in nonstatic_release_resource_db() (git-fixes).
- phy/rockchip: inno-hdmi: do not power on rk3328 post pll on reg write (git-fixes).
- phy/rockchip: inno-hdmi: round fractal pixclock in rk3328 recalc_rate (git-fixes).
- phy/rockchip: inno-hdmi: use correct vco_div_5 macro on rk3328 (git-fixes).
- phy: qcom-snps-femto-v2: keep cfg_ahb_clk enabled during runtime suspend (git-fixes).
- phy: qcom-snps-femto-v2: properly enable ref clock (git-fixes).
- phy: qcom-snps: Use dev_err_probe() to simplify code (git-fixes).
- phy: qcom-snps: correct struct qcom_snps_hsphy kerneldoc (git-fixes).
- pinctrl: amd: Mask wake bits on probe again (git-fixes).
- pinctrl: amd: Revert 'pinctrl: amd: disable and mask interrupts on probe' (git-fixes).
- pinctrl: cherryview: fix address_space_handler() argument (git-fixes).
- pinctrl: mcp23s08: check return value of devm_kasprintf() (git-fixes).
- pinctrl: renesas: rza2: Add lock around pinctrl_generic{{add,remove}_group,{add,remove}_function} (git-fixes).
- platform/x86: dell-sysman: Fix reference leak (git-fixes).
- powerpc/64e: Fix kexec build error (bsc#1212091 ltc#199106).
- powerpc/iommu: Fix iommu_table_in_use for a small default DMA window case (bsc#1212091 ltc#199106).
- powerpc/iommu: Incorrect DDW Table is referenced for SR-IOV device (bsc#1212091 ltc#199106).
- powerpc/iommu: TCEs are incorrectly manipulated with DLPAR add/remove of memory (bsc#1212091 ltc#199106).
- powerpc/iommu: do not set failed sg dma_address to DMA_MAPPING_ERROR (bsc#1212091 ltc#199106).
- powerpc/iommu: return error code from .map_sg() ops (bsc#1212091 ltc#199106).
- powerpc/kernel/iommu: Add new iommu_table_in_use() helper (bsc#1212091 ltc#199106).
- powerpc/kexec: Fix build failure from uninitialised variable (bsc#1212091 ltc#199106).
- powerpc/mm/altmap: Fix altmap boundary check (bsc#1120059 git-fixes).
- powerpc/pseries/ddw: Do not try direct mapping with persistent memory and one window (bsc#1212091 ltc#199106).
- powerpc/pseries/ddw: simplify enable_ddw() (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Add ddw_list_new_entry() helper (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Add ddw_property_create() and refactor enable_ddw() (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Add iommu_pseries_alloc_table() helper (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Add of_node_put() before break (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Allow DDW windows starting at 0x00 (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Check if the default window in use before removing it (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Create huge DMA window if no MMIO32 is present (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Find existing DDW with given property name (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Make use of DDW for indirect mapping (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Print ibm,query-pe-dma-windows parameters (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Rename 'direct window' to 'dma window' (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Reorganize iommu_table_setparms*() with new helper (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Replace hard-coded page shift (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Update remove_dma_window() to accept property name (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Use correct vfree for it_map (bsc#1212091 ltc#199106).
- powerpc/pseries: Add __init attribute to eligible functions (bsc#1212091 ltc#199106).
- powerpc/pseries: Honour current SMT state when DLPAR onlining CPUs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- powerpc/pseries: Initialise CPU hotplug callbacks earlier (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- powerpc/rtas: block error injection when locked down (bsc#1023051).
- powerpc/rtas: enture rtas_call is called with MMU enabled (bsc#1023051).
- powerpc/rtas: mandate RTAS syscall filtering (bsc#1023051).
- powerpc/rtas_flash: allow user copy to flash block cache objects (bsc#1194869).
- powerpc/security: Fix Speculation_Store_Bypass reporting on Power10 (bsc#1188885 ltc#193722 git-fixes).
- powerpc: Add HOTPLUG_SMT support (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588). Update config files.
- powerpc: Move DMA64_PROPNAME define to a header (bsc#1214297 ltc#197503).
- powerpc: fix typos in comments (bsc#1212091 ltc#199106).
- pseries/iommu/ddw: Fix kdump to work in absence of ibm,dma-window (bsc#1214297 ltc#197503).
- pstore/ram: Check start of empty przs during init (git-fixes).
- pwm: Add a stub for devm_pwmchip_add() (git-fixes).
- pwm: meson: Simplify duplicated per-channel tracking (git-fixes).
- pwm: meson: fix handling of period/duty if greater than UINT_MAX (git-fixes).
- qed: Fix scheduling in a tasklet while getting stats (git-fixes).
- regmap: rbtree: Use alloc_flags for memory allocations (git-fixes).
- ring-buffer: Do not swap cpu_buffer during resize process (git-fixes).
- ring-buffer: Fix deadloop issue on reading trace_pipe (git-fixes).
- ring-buffer: Fix wrong stat of cpu_buffer-&gt;read (git-fixes).
- rpm/mkspec-dtb: support for nested subdirs
- rpmsg: glink: Add check for kstrdup (git-fixes).
- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976).
- s390/purgatory: disable branch profiling (git-fixes bsc#1214372).
- s390/zcrypt: fix reply buffer calculations for CCA replies (bsc#1213949).
- sched/fair: Fix inaccurate tally of ttwu_move_affine (git fixes).
- sched/fair: Use recent_used_cpu to test p-&gt;cpus_ptr (git fixes).
- sched/psi: use kernfs polling functions for PSI trigger polling (bsc#1209799).
- scsi: 3w-xxxx: Add error handling for initialization failure in tw_probe() (git-fixes).
- scsi: 53c700: Check that command slot is not NULL (git-fixes).
- scsi: RDMA/srp: Fix residual handling (git-fixes)
- scsi: bsg: Increase number of devices (bsc#1210048).
- scsi: core: Do not wait for quiesce in scsi_device_block() (bsc#1209284).
- scsi: core: Do not wait for quiesce in scsi_stop_queue() (bsc#1209284).
- scsi: core: Fix legacy /proc parsing buffer overflow (git-fixes).
- scsi: core: Fix possible memory leak if device_add() fails (git-fixes).
- scsi: core: Improve warning message in scsi_device_block() (bsc#1209284).
- scsi: core: Merge scsi_internal_device_block() and device_block() (bsc#1209284).
- scsi: fnic: Replace return codes in fnic_clean_pending_aborts() (git-fixes).
- scsi: qedf: Fix NULL dereference in error handling (git-fixes).
- scsi: qedf: Fix firmware halt over suspend and resume (git-fixes).
- scsi: qedi: Fix firmware halt over suspend and resume (git-fixes).
- scsi: scsi_debug: Remove dead code (git-fixes).
- scsi: sg: Increase number of devices (bsc#1210048).
- scsi: snic: Fix double free in snic_tgt_create() (git-fixes).
- scsi: snic: Fix possible memory leak if device_add() fails (git-fixes).
- scsi: storvsc: Always set no_report_opcodes (git-fixes).
- scsi: storvsc: Fix handling of virtual Fibre Channel timeouts (git-fixes).
- scsi: storvsc: Handle SRB status value 0x30 (git-fixes).
- scsi: storvsc: Limit max_sectors for virtual Fibre Channel devices (git-fixes).
- scsi: zfcp: Defer fc_rport blocking until after ADISC response (git-fixes bsc#1214371).
- selftests/bpf: Test btf dump for struct with padding only fields (bsc#1211220 jsc#PED-3924).
- selftests/futex: Order calls to futex_lock_pi (git-fixes).
- selftests/harness: Actually report SKIP for signal tests (git-fixes).
- selftests/resctrl: Close perf value read fd on errors (git-fixes).
- selftests/resctrl: Do not leak buffer in fill_cache() (git-fixes).
- selftests/resctrl: Unmount resctrl FS if child fails to run benchmark (git-fixes).
- selftests/rseq: check if libc rseq support is registered (git-fixes).
- selftests: forwarding: Add a helper to skip test when using veth pairs (git-fixes).
- selftests: forwarding: Skip test when no interfaces are specified (git-fixes).
- selftests: forwarding: Switch off timeout (git-fixes).
- selftests: forwarding: ethtool: Skip when using veth pairs (git-fixes).
- selftests: forwarding: ethtool_extended_state: Skip when using veth pairs (git-fixes).
- selftests: forwarding: tc_actions: Use ncat instead of nc (git-fixes).
- selftests: forwarding: tc_actions: cleanup temporary files when test is aborted (git-fixes).
- selftests: forwarding: tc_flower: Relax success criterion (git-fixes).
- selftests: mirror_gre_changes: Tighten up the TTL test match (git-fixes).
- serial: sc16is7xx: fix broken port 0 uart init (git-fixes).
- serial: sc16is7xx: fix bug when first setting GPIO direction (git-fixes).
- serial: sprd: Assign sprd_port after initialized to avoid wrong access (git-fixes).
- serial: sprd: Fix DMA buffer leak issue (git-fixes).
- serial: tegra: handle clk prepare error in tegra_uart_hw_init() (git-fixes).
- sfc: fix crash when reading stats while NIC is resetting (git-fixes).
- smb3: Do not send lease break acknowledgment if all file handles have been closed (git-fixes).
- smb3: do not set NTLMSSP_VERSION flag for negotiate not auth request (bsc#1193629).
- smb: client: Fix -Wstringop-overflow issues (bsc#1193629).
- smb: client: fix dfs link mount against w2k8 (bsc#1212142).
- smb: client: fix null auth (git-fixes).
- soc: aspeed: socinfo: Add kfree for kstrdup (git-fixes).
- soundwire: bus: pm_runtime_request_resume on peripheral attachment (git-fixes).
- soundwire: fix enumeration completion (git-fixes).
- spi: tegra20-sflash: fix to check return value of platform_get_irq() in tegra_sflash_probe() (git-fixes).
- supported.conf: fix typos for -!optional markers
- swiotlb: Remove bounce buffer remapping for Hyper-V (bsc#1206453).
- target: compare and write backend driver sense handling (bsc#1177719 bsc#1213026).
- target_core_rbd: fix leak and reduce kmalloc calls (bsc#1212873).
- target_core_rbd: fix rbd_img_request.snap_id assignment (bsc#1212857).
- target_core_rbd: remove snapshot existence validation code (bsc#1212857).
- thunderbolt: Read retimer NVM authentication status prior tb_retimer_set_inbound_sbtx() (git-fixes).
- timers: Add shutdown mechanism to the internal functions (bsc#1213970).
- timers: Provide timer_shutdown[_sync]() (bsc#1213970).
- timers: Rename del_timer() to timer_delete() (bsc#1213970).
- timers: Rename del_timer_sync() to timer_delete_sync() (bsc#1213970).
- timers: Replace BUG_ON()s (bsc#1213970).
- timers: Silently ignore timers with a NULL function (bsc#1213970).
- timers: Split [try_to_]del_timer[_sync]() to prepare for shutdown mode (bsc#1213970).
- timers: Update kernel-doc for various functions (bsc#1213970).
- timers: Use del_timer_sync() even on UP (bsc#1213970).
- tracing/histograms: Add histograms to hist_vars if they have referenced variables (git-fixes).
- tracing/histograms: Return an error if we fail to add histogram to hist_vars list (git-fixes).
- tracing/probes: Fix not to count error code to total length (git-fixes).
- tracing/probes: Fix to avoid double count of the string length on the array (git-fixes).
- tracing/probes: Fix to record 0-length data_loc in fetch_store_string*() if fails (git-fixes).
- tracing/probes: Fix to update dynamic data counter if fetcharg uses it (git-fixes).
- tracing: Fix cpu buffers unavailable due to 'record_disabled' missed (git-fixes).
- tracing: Fix memleak due to race between current_tracer and trace (git-fixes).
- tracing: Fix memory leak of iter-&gt;temp when reading trace_pipe (git-fixes).
- tracing: Fix null pointer dereference in tracing_err_log_open() (git-fixes).
- tracing: Fix warning in trace_buffered_event_disable() (git-fixes).
- tty: fix hang on tty device with no_room set (git-fixes).
- tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux (git-fixes).
- tty: serial: fsl_lpuart: Add i.MXRT1050 support (git-fixes).
- tty: serial: fsl_lpuart: Clear the error flags by writing 1 for lpuart32 platforms (git-fixes).
- tty: serial: fsl_lpuart: make rx_watermark configurable for different platforms (git-fixes).
- tty: serial: fsl_lpuart: reduce RX watermark to 0 on LS1028A (git-fixes).
- ubifs: Fix memleak when insert_old_idx() failed (git-fixes).
- usb-storage: alauda: Fix uninit-value in alauda_check_media() (git-fixes).
- usb: chipidea: imx: add missing USB PHY DPDM wakeup setting (git-fixes).
- usb: chipidea: imx: do not request QoS for imx8ulp (git-fixes).
- usb: chipidea: imx: improve logic if samsung,picophy-* parameter is 0 (git-fixes).
- usb: common: usb-conn-gpio: Prevent bailing out if initial role is none (git-fixes).
- usb: dwc3: Fix typos in gadget.c (git-fixes).
- usb: dwc3: Properly handle processing of pending events (git-fixes).
- usb: dwc3: meson-g12a: do post init to fix broken usb after resumption (git-fixes).
- usb: gadget: Fix the memory leak in raw_gadget driver (git-fixes).
- usb: gadget: f_mass_storage: Fix unused variable warning (git-fixes).
- usb: gadget: u_serial: Avoid spinlock recursion in __gs_console_push (git-fixes).
- usb: ohci-at91: Fix the unhandle interrupt when resume (git-fixes).
- usb: phy: mxs: fix getting wrong state with mxs_phy_is_otg_host() (git-fixes).
- usb: quirks: add quirk for Focusrite Scarlett (git-fixes).
- usb: serial: option: add Quectel EC200A module support (git-fixes).
- usb: serial: option: support Quectel EM060K_128 (git-fixes).
- usb: serial: simple: add Kaufmann RKS+CAN VCP (git-fixes).
- usb: serial: simple: sort driver entries (git-fixes).
- usb: typec: altmodes/displayport: Signal hpd when configuring pin assignment (git-fixes).
- usb: typec: tcpm: Fix response to vsafe0V event (git-fixes).
- usb: typec: tcpm: set initial svdm version based on pd revision (git-fixes).
- usb: zaurus: Add ID for A-300/B-500/C-700 (git-fixes).
- watchdog: sp5100_tco: support Hygon FCH/SCH (Server Controller Hub) (git-fixes).
- wifi: ath10k: Use RMW accessors for changing LNKCTL (git-fixes).
- wifi: ath11k: Use RMW accessors for changing LNKCTL (git-fixes).
- wifi: ath9k: fix races between ath9k_wmi_cmd and ath9k_wmi_ctrl_rx (git-fixes).
- wifi: ath9k: protect WMI command response buffer replacement with a lock (git-fixes).
- wifi: ath9k: use IS_ERR() with debugfs_create_dir() (git-fixes).
- wifi: cfg80211: Fix return value in scan logic (git-fixes).
- wifi: cfg80211: fix sband iftype data lookup for AP_VLAN (git-fixes).
- wifi: mt76: mt7615: do not advertise 5 GHz on first phy of MT7615D (DBDC) (git-fixes).
- wifi: mt76: mt7915: fix power-limits while chan_switch (git-fixes).
- wifi: mt76: mt7921: do not support one stream on secondary antenna only (git-fixes).
- wifi: mt76: mt7921: fix non-PSC channel scan fail (git-fixes).
- wifi: mt76: testmode: add nla_policy for MT76_TM_ATTR_TX_LENGTH (git-fixes).
- wifi: mwifiex: Fix OOB and integer underflow when rx packets (git-fixes).
- wifi: mwifiex: Fix missed return in oob checks failed path (git-fixes).
- wifi: mwifiex: avoid possible NULL skb pointer dereference (git-fixes).
- wifi: mwifiex: fix error recovery in PCIE buffer descriptor management (git-fixes).
- wifi: mwifiex: fix memory leak in mwifiex_histogram_read() (git-fixes).
- wifi: nl80211/cfg80211: add forgotten nla_policy for BSS color attribute (git-fixes).
- wifi: radiotap: fix kernel-doc notation warnings (git-fixes).
- wifi: rtw89: debug: Fix error handling in rtw89_debug_priv_btc_manual_set() (git-fixes).
- x86/CPU/AMD: Disable XSAVES on AMD family 0x17 (git-fixes).
- x86/alternative: Make custom return thunk unconditional (git-fixes).
- x86/cpu/kvm: Provide UNTRAIN_RET_VM (git-fixes).
- x86/cpu: Clean up SRSO return thunk mess (git-fixes).
- x86/cpu: Cleanup the untrain mess (git-fixes).
- x86/cpu: Fix __x86_return_thunk symbol type (git-fixes).
- x86/cpu: Fix up srso_safe_ret() and __x86_return_thunk() (git-fixes).
- x86/cpu: Rename original retbleed methods (git-fixes).
- x86/cpu: Rename srso_(.*)_alias to srso_alias_\1 (git-fixes).
- x86/hyperv: Add an interface to do nested hypercalls (bsc#1206453).
- x86/hyperv: Add support for detecting nested hypervisor (bsc#1206453).
- x86/hyperv: Change vTOM handling to use standard coco mechanisms (bsc#1206453).
- x86/hyperv: Remove BUG_ON() for kmap_local_page() (bsc#1206453).
- x86/hyperv: Reorder code to facilitate future work (bsc#1206453).
- x86/hyperv: Replace kmap() with kmap_local_page() (bsc#1206453).
- x86/ioremap: Add hypervisor callback for private MMIO mapping in coco (bsc#1206453).
- x86/mce: Make sure logged MCEs are processed after sysfs update (git-fixes).
- x86/mm: Handle decryption/re-encryption of bss_decrypted consistently (bsc#1206453).
- x86/retpoline,kprobes: Fix position of thunk sections with CONFIG_LTO_CLANG (git-fixes).
- x86/retpoline,kprobes: Skip optprobe check for indirect jumps with retpolines and IBT (git-fixes).
- x86/retpoline: Do not clobber RFLAGS during srso_safe_ret() (git-fixes).
- x86/speculation: Add cpu_show_gds() prototype (git-fixes).
- x86/speculation: Mark all Skylake CPUs as vulnerable to GDS (git-fixes).
- x86/srso: Correct the mitigation status when SMT is disabled (git-fixes).
- x86/srso: Disable the mitigation on unaffected configurations (git-fixes).
- x86/srso: Explain the untraining sequences a bit more (git-fixes).
- x86/srso: Fix build breakage with the LLVM linker (git-fixes).
- x86/srso: Fix return thunks in generated code (git-fixes).
- x86/static_call: Fix __static_call_fixup() (git-fixes).
- x86/tdx: Add more registers to struct tdx_hypercall_args (bsc#1206453).
- x86/tdx: Do not corrupt frame-pointer in __tdx_hypercall() (bsc#1206453).
- x86/tdx: Expand __tdx_hypercall() to handle more arguments (bsc#1206453).
- x86/tdx: Fix typo in comment in __tdx_hypercall() (bsc#1206453).
- x86/tdx: Refactor __tdx_hypercall() to allow pass down more arguments (bsc#1206453).
- xfs: fix sb write verify for lazysbcount (bsc#1214661).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-18"/>
	<updated date="2023-09-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1023051">SUSE bug 1023051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120059">SUSE bug 1120059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177719">SUSE bug 1177719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203329">SUSE bug 1203329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203330">SUSE bug 1203330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205462">SUSE bug 1205462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206453">SUSE bug 1206453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208902">SUSE bug 1208902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208949">SUSE bug 1208949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209284">SUSE bug 1209284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209799">SUSE bug 1209799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210048">SUSE bug 1210048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210448">SUSE bug 1210448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211220">SUSE bug 1211220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212091">SUSE bug 1212091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212142">SUSE bug 1212142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212423">SUSE bug 1212423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212526">SUSE bug 1212526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212857">SUSE bug 1212857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212873">SUSE bug 1212873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213026">SUSE bug 1213026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213123">SUSE bug 1213123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213546">SUSE bug 1213546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213580">SUSE bug 1213580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213601">SUSE bug 1213601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213666">SUSE bug 1213666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213733">SUSE bug 1213733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213757">SUSE bug 1213757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213759">SUSE bug 1213759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213916">SUSE bug 1213916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213921">SUSE bug 1213921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213927">SUSE bug 1213927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213946">SUSE bug 1213946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213949">SUSE bug 1213949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213968">SUSE bug 1213968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213970">SUSE bug 1213970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213971">SUSE bug 1213971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214000">SUSE bug 1214000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214019">SUSE bug 1214019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214073">SUSE bug 1214073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214120">SUSE bug 1214120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214149">SUSE bug 1214149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214180">SUSE bug 1214180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214233">SUSE bug 1214233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214238">SUSE bug 1214238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214285">SUSE bug 1214285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214297">SUSE bug 1214297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214299">SUSE bug 1214299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214305">SUSE bug 1214305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214350">SUSE bug 1214350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214368">SUSE bug 1214368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214370">SUSE bug 1214370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214371">SUSE bug 1214371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214372">SUSE bug 1214372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214380">SUSE bug 1214380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214386">SUSE bug 1214386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214392">SUSE bug 1214392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214393">SUSE bug 1214393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214397">SUSE bug 1214397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214404">SUSE bug 1214404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214428">SUSE bug 1214428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214451">SUSE bug 1214451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214659">SUSE bug 1214659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214661">SUSE bug 1214661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214727">SUSE bug 1214727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214729">SUSE bug 1214729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214742">SUSE bug 1214742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214743">SUSE bug 1214743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214756">SUSE bug 1214756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214760">SUSE bug 1214760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214976">SUSE bug 1214976</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38457/">CVE-2022-38457 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38457">CVE-2022-38457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40133/">CVE-2022-40133 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40133">CVE-2022-40133 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-2007/">CVE-2023-2007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2007">CVE-2023-2007 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20588/">CVE-2023-20588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20588">CVE-2023-20588 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34319/">CVE-2023-34319 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34319">CVE-2023-34319 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3610/">CVE-2023-3610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3610">CVE-2023-3610 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37453/">CVE-2023-37453 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37453">CVE-2023-37453 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3772/">CVE-2023-3772 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3772">CVE-2023-3772 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3863/">CVE-2023-3863 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3863">CVE-2023-3863 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40283/">CVE-2023-40283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40283">CVE-2023-40283 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4128/">CVE-2023-4128 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4128">CVE-2023-4128 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4133/">CVE-2023-4133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4133">CVE-2023-4133 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4134/">CVE-2023-4134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4134">CVE-2023-4134 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4147/">CVE-2023-4147 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4147">CVE-2023-4147 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4194/">CVE-2023-4194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4194">CVE-2023-4194 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4273/">CVE-2023-4273 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4273">CVE-2023-4273 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4387/">CVE-2023-4387 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4387">CVE-2023-4387 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4459/">CVE-2023-4459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4459">CVE-2023-4459 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4563/">CVE-2023-4563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4563">CVE-2023-4563 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4569/">CVE-2023-4569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4569">CVE-2023-4569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009795204" comment="cluster-md-kmp-azure-5.14.21-150500.33.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795205" comment="dlm-kmp-azure-5.14.21-150500.33.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795206" comment="gfs2-kmp-azure-5.14.21-150500.33.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795207" comment="kernel-azure-5.14.21-150500.33.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795208" comment="kernel-azure-devel-5.14.21-150500.33.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795209" comment="kernel-azure-extra-5.14.21-150500.33.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795210" comment="kernel-azure-livepatch-devel-5.14.21-150500.33.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795211" comment="kernel-azure-optional-5.14.21-150500.33.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795212" comment="kernel-azure-vdso-5.14.21-150500.33.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795213" comment="kernel-devel-azure-5.14.21-150500.33.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795214" comment="kernel-source-azure-5.14.21-150500.33.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795215" comment="kernel-syms-azure-5.14.21-150500.33.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795216" comment="kselftests-kmp-azure-5.14.21-150500.33.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795217" comment="ocfs2-kmp-azure-5.14.21-150500.33.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795218" comment="reiserfs-kmp-azure-5.14.21-150500.33.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4364" version="1" class="patch">
	<metadata>
		<title>Security update for gcc12 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214052" ref_url="https://bugzilla.suse.com/1214052" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4039" ref_url="https://www.suse.com/security/cve/CVE-2023-4039/" source="CVE"/>
		<description>
This update for gcc12 fixes the following issues:

- CVE-2023-4039: Fixed incorrect stack protector for C99 VLAs on Aarch64 (bsc#1214052).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-18"/>
	<updated date="2023-09-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214052">SUSE bug 1214052</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4039/">CVE-2023-4039 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4039">CVE-2023-4039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009795933" comment="cpp12-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796078" comment="cross-aarch64-gcc12-bootstrap-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796079" comment="cross-arm-gcc12-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796080" comment="cross-arm-gcc12-icecream-backend-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796081" comment="cross-arm-none-gcc12-bootstrap-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796082" comment="cross-avr-gcc12-bootstrap-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796083" comment="cross-epiphany-gcc12-bootstrap-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796084" comment="cross-hppa-gcc12-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796085" comment="cross-hppa-gcc12-bootstrap-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796086" comment="cross-hppa-gcc12-icecream-backend-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796087" comment="cross-m68k-gcc12-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796088" comment="cross-m68k-gcc12-icecream-backend-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796089" comment="cross-mips-gcc12-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796090" comment="cross-mips-gcc12-icecream-backend-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795934" comment="cross-nvptx-gcc12-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795935" comment="cross-nvptx-newlib12-devel-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796091" comment="cross-ppc64-gcc12-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796092" comment="cross-ppc64-gcc12-icecream-backend-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796093" comment="cross-ppc64le-gcc12-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796094" comment="cross-ppc64le-gcc12-icecream-backend-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796095" comment="cross-riscv64-elf-gcc12-bootstrap-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796096" comment="cross-riscv64-gcc12-bootstrap-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796097" comment="cross-rx-gcc12-bootstrap-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796098" comment="cross-s390x-gcc12-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796099" comment="cross-s390x-gcc12-icecream-backend-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796100" comment="cross-sparc-gcc12-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796101" comment="cross-sparc64-gcc12-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796102" comment="cross-sparc64-gcc12-icecream-backend-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796103" comment="cross-sparcv9-gcc12-icecream-backend-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796104" comment="cross-x86_64-gcc12-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796105" comment="cross-x86_64-gcc12-icecream-backend-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795936" comment="gcc12-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796106" comment="gcc12-32bit-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795938" comment="gcc12-PIE-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795939" comment="gcc12-ada-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796107" comment="gcc12-ada-32bit-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795941" comment="gcc12-c++-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796108" comment="gcc12-c++-32bit-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795943" comment="gcc12-d-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796109" comment="gcc12-d-32bit-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795945" comment="gcc12-fortran-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796110" comment="gcc12-fortran-32bit-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795947" comment="gcc12-go-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796111" comment="gcc12-go-32bit-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795949" comment="gcc12-info-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795950" comment="gcc12-locale-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795951" comment="gcc12-obj-c++-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796112" comment="gcc12-obj-c++-32bit-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795953" comment="gcc12-objc-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796113" comment="gcc12-objc-32bit-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795955" comment="gcc12-testresults-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795956" comment="libada12-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796114" comment="libada12-32bit-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795958" comment="libasan8-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796115" comment="libasan8-32bit-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795960" comment="libatomic1-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795961" comment="libatomic1-32bit-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795962" comment="libgcc_s1-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795963" comment="libgcc_s1-32bit-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795964" comment="libgdruntime3-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796116" comment="libgdruntime3-32bit-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795966" comment="libgfortran5-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795967" comment="libgfortran5-32bit-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795968" comment="libgo21-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796117" comment="libgo21-32bit-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795970" comment="libgomp1-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795971" comment="libgomp1-32bit-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795972" comment="libgphobos3-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796118" comment="libgphobos3-32bit-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795974" comment="libhwasan0-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795975" comment="libitm1-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795976" comment="libitm1-32bit-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795977" comment="liblsan0-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795978" comment="libobjc4-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795979" comment="libobjc4-32bit-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795980" comment="libquadmath0-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795981" comment="libquadmath0-32bit-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795982" comment="libstdc++6-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795983" comment="libstdc++6-32bit-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795984" comment="libstdc++6-devel-gcc12-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796119" comment="libstdc++6-devel-gcc12-32bit-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795986" comment="libstdc++6-locale-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795987" comment="libstdc++6-pp-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796120" comment="libstdc++6-pp-32bit-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795989" comment="libtsan2-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795990" comment="libubsan1-12.3.0+git1204-150000.1.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795991" comment="libubsan1-32bit-12.3.0+git1204-150000.1.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4365" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214606" ref_url="https://bugzilla.suse.com/1214606" source="BUGZILLA"/>
		<reference ref_id="1215231" ref_url="https://bugzilla.suse.com/1215231" source="BUGZILLA"/>
		<reference ref_id="1215245" ref_url="https://bugzilla.suse.com/1215245" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4051" ref_url="https://www.suse.com/security/cve/CVE-2023-4051/" source="CVE"/>
		<reference ref_id="CVE-2023-4053" ref_url="https://www.suse.com/security/cve/CVE-2023-4053/" source="CVE"/>
		<reference ref_id="CVE-2023-4573" ref_url="https://www.suse.com/security/cve/CVE-2023-4573/" source="CVE"/>
		<reference ref_id="CVE-2023-4574" ref_url="https://www.suse.com/security/cve/CVE-2023-4574/" source="CVE"/>
		<reference ref_id="CVE-2023-4575" ref_url="https://www.suse.com/security/cve/CVE-2023-4575/" source="CVE"/>
		<reference ref_id="CVE-2023-4576" ref_url="https://www.suse.com/security/cve/CVE-2023-4576/" source="CVE"/>
		<reference ref_id="CVE-2023-4577" ref_url="https://www.suse.com/security/cve/CVE-2023-4577/" source="CVE"/>
		<reference ref_id="CVE-2023-4578" ref_url="https://www.suse.com/security/cve/CVE-2023-4578/" source="CVE"/>
		<reference ref_id="CVE-2023-4580" ref_url="https://www.suse.com/security/cve/CVE-2023-4580/" source="CVE"/>
		<reference ref_id="CVE-2023-4581" ref_url="https://www.suse.com/security/cve/CVE-2023-4581/" source="CVE"/>
		<reference ref_id="CVE-2023-4582" ref_url="https://www.suse.com/security/cve/CVE-2023-4582/" source="CVE"/>
		<reference ref_id="CVE-2023-4583" ref_url="https://www.suse.com/security/cve/CVE-2023-4583/" source="CVE"/>
		<reference ref_id="CVE-2023-4584" ref_url="https://www.suse.com/security/cve/CVE-2023-4584/" source="CVE"/>
		<reference ref_id="CVE-2023-4585" ref_url="https://www.suse.com/security/cve/CVE-2023-4585/" source="CVE"/>
		<reference ref_id="CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Security fixes:

- Mozilla Thunderbird 115.2.2 (MFSA 2023-40, bsc#1215245)
  - CVE-2023-4863: Fixed heap buffer overflow in libwebp (bmo#1852649).
  
- Mozilla Thunderbird 115.2 (MFSA 2023-38, bsc#1214606)
  - CVE-2023-4573: Memory corruption in IPC CanvasTranslator (bmo#1846687) 
  - CVE-2023-4574: Memory corruption in IPC ColorPickerShownCallback (bmo#1846688) 
  - CVE-2023-4575: Memory corruption in IPC FilePickerShownCallback (bmo#1846689) 
  - CVE-2023-4576: Integer Overflow in RecordedSourceSurfaceCreation (bmo#1846694) 
  - CVE-2023-4577: Memory corruption in JIT UpdateRegExpStatics (bmo#1847397) 
  - CVE-2023-4051: Full screen notification obscured by file open dialog (bmo#1821884) 
  - CVE-2023-4578: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception (bmo#1839007) 
  - CVE-2023-4053: Full screen notification obscured by external program (bmo#1839079) 
  - CVE-2023-4580: Push notifications saved to disk unencrypted (bmo#1843046) 
  - CVE-2023-4581: XLL file extensions were downloadable without warnings (bmo#1843758) 
  - CVE-2023-4582: Buffer Overflow in WebGL glGetProgramiv (bmo#1773874) 
  - CVE-2023-4583: Browsing Context potentially not cleared when closing Private Window (bmo#1842030) 
  - CVE-2023-4584: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 (bmo#1843968, bmo#1845205, bmo#1846080, bmo#1846526, bmo#1847529) 
  - CVE-2023-4585: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2 (bmo#1751583, bmo#1833504, bmo#1841082, bmo#1847904, bmo#1848999) 

Other fixes:

Mozilla Thunderbird 115.2.1
  * new: Column separators are now shown between all columns in
    tree view (bmo#1847441)
  * fixed: Crash reporter did not work in Thunderbird Flatpak
    (bmo#1843102)
  * fixed: New mail notification always opened message in message
    pane, even if pane was disabled (bmo#1840092)
  * fixed: After moving an IMAP message to another folder, the
    incorrect message was selected in the message list
    (bmo#1845376)
  * fixed: Adding a tag to an IMAP message opened in a tab failed
    (bmo#1844452)
  * fixed: Junk/Spam folders were not always shown in Unified
    Folders mode (bmo#1838672)
  * fixed: Middle-clicking a folder or message did not open it in
    a background tab, as in previous versions (bmo#1842482)
  * fixed: Settings tab visual improvements: Advanced Fonts
    dialog, Section headers hidden behind search box
    (bmo#1717382,bmo#1846751)
  * fixed: Various visual and style fixes
    (bmo#1843707,bmo#1849823)
  
Mozilla Thunderbird 115.2
  * new: Thunderbird MSIX packages are now published on
    archive.mozilla.org (bmo#1817657)
  * changed: Size, Unread, and Total columns are now right-
    aligned (bmo#1848604)
  * changed: Newsgroup names in message list header are now
    abbreviated (bmo#1833298)
  * fixed: Message compose window did not apply theme colors to
    menus (bmo#1845699)
  * fixed: Reading the second new message in a folder cleared the
    unread indicator of all other new messages (bmo#1839805)
  * fixed: Displayed counts of unread or flagged messages could
    become out-of-sync (bmo#1846860)
  * fixed: Deleting a message from the context menu with messages
    sorted in chronological order and smooth scroll enabled
    caused message list to scroll to top (bmo#1843462)
  * fixed: Repeatedly switching accounts in Subscribe dialog
    caused tree view to stop updating (bmo#1845593)
  * fixed: 'Ignore thread' caused message cards to display
    incorrectly in message list (bmo#1847966)
  * fixed: Creating tags from unified toolbar failed
    (bmo#1846336)
  * fixed: Cross-folder navigation using F and N did not work
    (bmo#1845011)
  * fixed: Account Manager did not resize to fit content, causing
    'Close' button to become hidden outside bounds of dialog when
    too many accounts were listed (bmo#1847555)
  * fixed: Remote content exceptions could not be added in
    Settings (bmo#1847576)
  * fixed: Newsgroup list file did not get updated after adding a
    new NNTP server (bmo#1845464)
  * fixed: 'Download all headers' option in NNTP 'Download
    Headers' dialog was incorrectly selected by default
    (bmo#1845457)
  * fixed: 'Convert to event/task' was missing from mail context
    menu (bmo#1817705)
  * fixed: Events and tasks were not shown in some cases despite
    being present on remote server (bmo#1827100)
  * fixed: Various visual and UX improvements
    (bmo#1844244,bmo#1845645)

- Mozilla Thunderbird 115.1.1
  * fixed: Some HTML emails printed headers on first page and
    message on subsequent pages (bmo#1843628)
  * fixed: Deleting messages from message list sometimes scrolled
    list to bottom, selecting bottommost message (bmo#1835173)
  * fixed: Width of icon columns (like Junk or Starred) in
    message list did not adjust when UI density was changed
    (bmo#1843014)
  * fixed: Old OpenPGP secret keys could not be used to decrypt
    messages under certain circumstances (bmo#1835786)
  * fixed: When multiple folder modes were active, tab focus
    navigated through all folder mode options before reaching
    message list (bmo#1842060)
  * fixed: Unread message count badge was not displayed on parent
    folders of subfolder containing unread messages (bmo#1844534)
  * fixed: 'Undo archive' (via Ctrl-Z) did not un-archive
    previously archived messages (bmo#1829340)
  * fixed: 'New' button dropdown menu in 'Message Filters' dialog
    could not be opened via keyboard navigation (bmo#1843511)
  * fixed: 'Show New Mail Alert for' input field in 'Customize
    New Mail Alert' dialog had zero width when using certain
    language packs (bmo#1845832)
  * fixed: 'Account Wizard' dialog was too narrow when adding a
    news server, partially hiding confirmation buttons
    (bmo#1846588)
  * fixed: Link Properties and Image Properties dialogs in the
    composer were too wide (bmo#1816850)
  * fixed: Thunderbird version number and details in 'About'
    dialog were not automatically read by screen readers when
    first opening dialog (bmo#1847078)
  * fixed: Flatpak improvements and bug fixes
    (bmo#1825399,bmo#1843094,bmo#1843097)
  * fixed: Various visual and UX improvements (bmo#1846262)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-18"/>
	<updated date="2023-09-18"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1214606">SUSE bug 1214606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215231">SUSE bug 1215231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215245">SUSE bug 1215245</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4051/">CVE-2023-4051 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4051">CVE-2023-4051 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4053/">CVE-2023-4053 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4053">CVE-2023-4053 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4573/">CVE-2023-4573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4573">CVE-2023-4573 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4574/">CVE-2023-4574 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4574">CVE-2023-4574 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4575/">CVE-2023-4575 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4575">CVE-2023-4575 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4576/">CVE-2023-4576 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4576">CVE-2023-4576 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4577/">CVE-2023-4577 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4577">CVE-2023-4577 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4578/">CVE-2023-4578 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4578">CVE-2023-4578 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4580/">CVE-2023-4580 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4580">CVE-2023-4580 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4581/">CVE-2023-4581 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4581">CVE-2023-4581 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4582/">CVE-2023-4582 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4582">CVE-2023-4582 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4583/">CVE-2023-4583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4583">CVE-2023-4583 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4584/">CVE-2023-4584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4584">CVE-2023-4584 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4585/">CVE-2023-4585 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4585">CVE-2023-4585 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009795065" comment="MozillaThunderbird-115.2.2-150200.8.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795066" comment="MozillaThunderbird-translations-common-115.2.2-150200.8.130.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795067" comment="MozillaThunderbird-translations-other-115.2.2-150200.8.130.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4366" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214768" ref_url="https://bugzilla.suse.com/1214768" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39615" ref_url="https://www.suse.com/security/cve/CVE-2023-39615/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016186.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2023-39615: Fixed crafted xml can cause global buffer overflow (bsc#1214768).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-18"/>
	<updated date="2023-09-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214768">SUSE bug 1214768</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39615/">CVE-2023-39615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39615">CVE-2023-39615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009781730" comment="libxml2-2-2.10.3-150500.5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781731" comment="libxml2-2-32bit-2.10.3-150500.5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781732" comment="libxml2-devel-2.10.3-150500.5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781733" comment="libxml2-devel-32bit-2.10.3-150500.5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781734" comment="libxml2-doc-2.10.3-150500.5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781735" comment="libxml2-tools-2.10.3-150500.5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781736" comment="python3-libxml2-2.10.3-150500.5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781737" comment="python311-libxml2-2.10.3-150500.5.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4367" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1203517" ref_url="https://bugzilla.suse.com/1203517" source="BUGZILLA"/>
		<reference ref_id="1210448" ref_url="https://bugzilla.suse.com/1210448" source="BUGZILLA"/>
		<reference ref_id="1213543" ref_url="https://bugzilla.suse.com/1213543" source="BUGZILLA"/>
		<reference ref_id="1213601" ref_url="https://bugzilla.suse.com/1213601" source="BUGZILLA"/>
		<reference ref_id="1213666" ref_url="https://bugzilla.suse.com/1213666" source="BUGZILLA"/>
		<reference ref_id="1213927" ref_url="https://bugzilla.suse.com/1213927" source="BUGZILLA"/>
		<reference ref_id="1213969" ref_url="https://bugzilla.suse.com/1213969" source="BUGZILLA"/>
		<reference ref_id="1213971" ref_url="https://bugzilla.suse.com/1213971" source="BUGZILLA"/>
		<reference ref_id="1214149" ref_url="https://bugzilla.suse.com/1214149" source="BUGZILLA"/>
		<reference ref_id="1214348" ref_url="https://bugzilla.suse.com/1214348" source="BUGZILLA"/>
		<reference ref_id="1214350" ref_url="https://bugzilla.suse.com/1214350" source="BUGZILLA"/>
		<reference ref_id="1214451" ref_url="https://bugzilla.suse.com/1214451" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-36402" ref_url="https://www.suse.com/security/cve/CVE-2022-36402/" source="CVE"/>
		<reference ref_id="CVE-2023-2007" ref_url="https://www.suse.com/security/cve/CVE-2023-2007/" source="CVE"/>
		<reference ref_id="CVE-2023-20588" ref_url="https://www.suse.com/security/cve/CVE-2023-20588/" source="CVE"/>
		<reference ref_id="CVE-2023-3772" ref_url="https://www.suse.com/security/cve/CVE-2023-3772/" source="CVE"/>
		<reference ref_id="CVE-2023-3812" ref_url="https://www.suse.com/security/cve/CVE-2023-3812/" source="CVE"/>
		<reference ref_id="CVE-2023-3863" ref_url="https://www.suse.com/security/cve/CVE-2023-3863/" source="CVE"/>
		<reference ref_id="CVE-2023-4128" ref_url="https://www.suse.com/security/cve/CVE-2023-4128/" source="CVE"/>
		<reference ref_id="CVE-2023-4132" ref_url="https://www.suse.com/security/cve/CVE-2023-4132/" source="CVE"/>
		<reference ref_id="CVE-2023-4134" ref_url="https://www.suse.com/security/cve/CVE-2023-4134/" source="CVE"/>
		<reference ref_id="CVE-2023-4385" ref_url="https://www.suse.com/security/cve/CVE-2023-4385/" source="CVE"/>
		<reference ref_id="CVE-2023-4387" ref_url="https://www.suse.com/security/cve/CVE-2023-4387/" source="CVE"/>
		<reference ref_id="CVE-2023-4459" ref_url="https://www.suse.com/security/cve/CVE-2023-4459/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016208.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-36402: Fixed an integer overflow vulnerability in vmwgfx driver in that allowed a local attacker with a user account on the system to gain privilege, causing a denial of service (bsc#1203517).
- CVE-2023-2007: Fixed a flaw in the DPT I2O Controller driver that could allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel (bsc#1210448).
- CVE-2023-20588: Fixed a division-by-zero error on some AMD processors that can potentially return speculative data resulting in loss of confidentiality (bsc#1213927).
- CVE-2023-3772: Fixed a flaw in XFRM subsystem that may have allowed a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer leading to a possible kernel crash and denial of service (bsc#1213666).
- CVE-2023-3812: Fixed an out-of-bounds memory access flaw in the TUN/TAP device driver functionality that could allow a local user to crash or potentially escalate their privileges on the system (bsc#1213543).
- CVE-2023-3863: Fixed a use-after-free flaw was found in nfc_llcp_find_local that allowed a local user with special privileges to impact a kernel information leak issue (bsc#1213601).
- CVE-2023-4128: Fixed a use-after-free flaw in net/sched/cls_fw.c that allowed a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue (bsc#1214149).
- CVE-2023-4132: Fixed use-after-free vulnerability was found in the siano smsusb module that allowed a local user to crash the system, causing a denial of service condition (bsc#1213969).
- CVE-2023-4134: Fixed use-after-free in cyttsp4_watchdog_work() (bsc#1213971).
- CVE-2023-4385: Fixed a NULL pointer dereference flaw in dbFree that may have allowed a local attacker to crash the system due to a missing sanity check (bsc#1214348).
- CVE-2023-4387: Fixed use-after-free flaw in vmxnet3_rq_alloc_rx_buf that could allow a local attacker to crash the system due to a double-free (bsc#1214350).
- CVE-2023-4459: Fixed a NULL pointer dereference flaw in vmxnet3_rq_cleanup that may have allowed a local attacker with normal user privilege to cause a denial of service (bsc#1214451).

The following non-security bugs were fixed:

- kabi/severities: Ignore newly added SRSO mitigation functions
- x86/cpu/kvm: Provide UNTRAIN_RET_VM (git-fixes).
- x86/cpu: Cleanup the untrain mess (git-fixes).
- x86/cpu: Fix __x86_return_thunk symbol type (git-fixes).
- x86/cpu: Fix up srso_safe_ret() and __x86_return_thunk() (git-fixes).
- x86/cpu: Rename original retbleed methods (git-fixes).
- x86/cpu: Rename srso_(.*)_alias to srso_alias_\1 (git-fixes).
- x86/retpoline,kprobes: Fix position of thunk sections with CONFIG_LTO_CLANG (git-fixes).
- x86/retpoline,kprobes: Skip optprobe check for indirect jumps with retpolines and IBT (git-fixes).
- x86/retpoline: Do not clobber RFLAGS during srso_safe_ret() (git-fixes).
- x86/speculation: Add cpu_show_gds() prototype (git-fixes).
- x86/speculation: Mark all Skylake CPUs as vulnerable to GDS (git-fixes).
- x86/srso: Correct the mitigation status when SMT is disabled (git-fixes).
- x86/srso: Disable the mitigation on unaffected configurations (git-fixes).
- x86/srso: Explain the untraining sequences a bit more (git-fixes).
- x86/srso: Fix build breakage with the LLVM linker (git-fixes).
- x86: Move gds_ucode_mitigated() declaration to header (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-19"/>
	<updated date="2023-09-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1203517">SUSE bug 1203517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210448">SUSE bug 1210448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213543">SUSE bug 1213543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213601">SUSE bug 1213601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213666">SUSE bug 1213666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213927">SUSE bug 1213927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213969">SUSE bug 1213969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213971">SUSE bug 1213971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214149">SUSE bug 1214149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214348">SUSE bug 1214348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214350">SUSE bug 1214350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214451">SUSE bug 1214451</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36402/">CVE-2022-36402 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36402">CVE-2022-36402 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-2007/">CVE-2023-2007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2007">CVE-2023-2007 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20588/">CVE-2023-20588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20588">CVE-2023-20588 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3772/">CVE-2023-3772 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3772">CVE-2023-3772 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3812/">CVE-2023-3812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3812">CVE-2023-3812 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3863/">CVE-2023-3863 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3863">CVE-2023-3863 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4128/">CVE-2023-4128 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4128">CVE-2023-4128 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4132/">CVE-2023-4132 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4132">CVE-2023-4132 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4134/">CVE-2023-4134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4134">CVE-2023-4134 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4385/">CVE-2023-4385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4385">CVE-2023-4385 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4387/">CVE-2023-4387 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4387">CVE-2023-4387 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4459/">CVE-2023-4459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4459">CVE-2023-4459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009794965" comment="kernel-vanilla-4.12.14-150100.197.157.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794966" comment="kernel-vanilla-base-4.12.14-150100.197.157.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794967" comment="kernel-vanilla-devel-4.12.14-150100.197.157.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794968" comment="kernel-vanilla-livepatch-devel-4.12.14-150100.197.157.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4368" version="1" class="patch">
	<metadata>
		<title>Security update for gcc7 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1195517" ref_url="https://bugzilla.suse.com/1195517" source="BUGZILLA"/>
		<reference ref_id="1196861" ref_url="https://bugzilla.suse.com/1196861" source="BUGZILLA"/>
		<reference ref_id="1204505" ref_url="https://bugzilla.suse.com/1204505" source="BUGZILLA"/>
		<reference ref_id="1205145" ref_url="https://bugzilla.suse.com/1205145" source="BUGZILLA"/>
		<reference ref_id="1214052" ref_url="https://bugzilla.suse.com/1214052" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4039" ref_url="https://www.suse.com/security/cve/CVE-2023-4039/" source="CVE"/>
		<description>
This update for gcc7 fixes the following issues:

Security issue fixed:

- CVE-2023-4039: Fixed incorrect stack protector for C99 VLAs on Aarch64 (bsc#1214052).

Other fixes:

- Fixed KASAN kernel compile.  [bsc#1205145]
- Fixed ICE with C++17 code as reported in [bsc#1204505]
- Fixed altivec.h redefining bool in C++ which makes bool unusable (bsc#1195517):
- Adjust gnats idea of the target, fixing the build of gprbuild.  [bsc#1196861]
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-19"/>
	<updated date="2023-09-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195517">SUSE bug 1195517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196861">SUSE bug 1196861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204505">SUSE bug 1204505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205145">SUSE bug 1205145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214052">SUSE bug 1214052</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4039/">CVE-2023-4039 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4039">CVE-2023-4039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009795832" comment="cpp7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795833" comment="cross-aarch64-gcc7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795834" comment="cross-aarch64-gcc7-icecream-backend-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795835" comment="cross-arm-gcc7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795836" comment="cross-arm-none-gcc7-bootstrap-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795837" comment="cross-avr-gcc7-bootstrap-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795838" comment="cross-epiphany-gcc7-bootstrap-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795839" comment="cross-hppa-gcc7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795840" comment="cross-hppa-gcc7-icecream-backend-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795841" comment="cross-i386-gcc7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795842" comment="cross-i386-gcc7-icecream-backend-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795843" comment="cross-m68k-gcc7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795844" comment="cross-m68k-gcc7-icecream-backend-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795845" comment="cross-mips-gcc7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795846" comment="cross-mips-gcc7-icecream-backend-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795847" comment="cross-nvptx-gcc7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795848" comment="cross-nvptx-newlib7-devel-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795849" comment="cross-ppc64-gcc7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795850" comment="cross-ppc64-gcc7-icecream-backend-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795851" comment="cross-ppc64le-gcc7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795852" comment="cross-ppc64le-gcc7-icecream-backend-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795853" comment="cross-rx-gcc7-bootstrap-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795854" comment="cross-s390x-gcc7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795855" comment="cross-s390x-gcc7-icecream-backend-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795856" comment="cross-sparc-gcc7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795857" comment="cross-sparc64-gcc7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795858" comment="cross-sparc64-gcc7-icecream-backend-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795859" comment="cross-sparcv9-gcc7-icecream-backend-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795860" comment="cross-x86_64-gcc7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795861" comment="cross-x86_64-gcc7-icecream-backend-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795862" comment="gcc7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795863" comment="gcc7-32bit-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795864" comment="gcc7-ada-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795865" comment="gcc7-ada-32bit-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795866" comment="gcc7-c++-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795867" comment="gcc7-c++-32bit-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795868" comment="gcc7-fortran-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795869" comment="gcc7-fortran-32bit-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795870" comment="gcc7-go-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795871" comment="gcc7-go-32bit-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795872" comment="gcc7-info-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795873" comment="gcc7-locale-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795874" comment="gcc7-obj-c++-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795875" comment="gcc7-obj-c++-32bit-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795876" comment="gcc7-objc-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795877" comment="gcc7-objc-32bit-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795878" comment="gcc7-testresults-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795879" comment="libada7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795880" comment="libada7-32bit-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795881" comment="libasan4-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795882" comment="libasan4-32bit-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795883" comment="libatomic1-gcc7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795884" comment="libatomic1-gcc7-32bit-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795885" comment="libcilkrts5-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795886" comment="libcilkrts5-32bit-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795887" comment="libgcc_s1-gcc7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795888" comment="libgcc_s1-gcc7-32bit-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795889" comment="libgfortran4-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795890" comment="libgfortran4-32bit-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795891" comment="libgo11-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795892" comment="libgo11-32bit-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795893" comment="libgomp1-gcc7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795894" comment="libgomp1-gcc7-32bit-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795895" comment="libitm1-gcc7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795896" comment="libitm1-gcc7-32bit-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795897" comment="liblsan0-gcc7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795898" comment="libmpx2-gcc7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795899" comment="libmpx2-gcc7-32bit-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795900" comment="libmpxwrappers2-gcc7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795901" comment="libmpxwrappers2-gcc7-32bit-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795902" comment="libobjc4-gcc7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795903" comment="libobjc4-gcc7-32bit-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795904" comment="libquadmath0-gcc7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795905" comment="libquadmath0-gcc7-32bit-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795906" comment="libstdc++6-devel-gcc7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795907" comment="libstdc++6-devel-gcc7-32bit-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795908" comment="libstdc++6-gcc7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795909" comment="libstdc++6-gcc7-32bit-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795910" comment="libstdc++6-gcc7-locale-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795911" comment="libtsan0-gcc7-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795912" comment="libubsan0-7.5.0+r278197-150000.4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795913" comment="libubsan0-32bit-7.5.0+r278197-150000.4.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4369" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214768" ref_url="https://bugzilla.suse.com/1214768" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39615" ref_url="https://www.suse.com/security/cve/CVE-2023-39615/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031570.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2023-39615: Fixed crafted xml can cause global buffer overflow (bsc#1214768).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-20"/>
	<updated date="2023-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214768">SUSE bug 1214768</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39615/">CVE-2023-39615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39615">CVE-2023-39615 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781701" comment="python3-libxml2-python-2.9.7-150000.3.60.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4370" version="1" class="patch">
	<metadata>
		<title>Security update for go1.20 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206346" ref_url="https://bugzilla.suse.com/1206346" source="BUGZILLA"/>
		<reference ref_id="1215084" ref_url="https://bugzilla.suse.com/1215084" source="BUGZILLA"/>
		<reference ref_id="1215085" ref_url="https://bugzilla.suse.com/1215085" source="BUGZILLA"/>
		<reference ref_id="1215090" ref_url="https://bugzilla.suse.com/1215090" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39318" ref_url="https://www.suse.com/security/cve/CVE-2023-39318/" source="CVE"/>
		<reference ref_id="CVE-2023-39319" ref_url="https://www.suse.com/security/cve/CVE-2023-39319/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3700-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031568.html" source="SUSE-SU"/>
		<description>
This update for go1.20 fixes the following issues:

Update to go1.20.8 (bsc#1206346).

- CVE-2023-39318: Fixed improper handling of HTML-like comments within script contexts in html/template (bsc#1215084).
- CVE-2023-39319: Fixed improper handling of special tags within script contexts in html/template (bsc#1215085).

The following non-security bug was fixed:

- Add missing directory pprof html asset directory to package (bsc#1215090).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-20"/>
	<updated date="2023-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206346">SUSE bug 1206346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215084">SUSE bug 1215084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215085">SUSE bug 1215085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215090">SUSE bug 1215090</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39318/">CVE-2023-39318 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39318">CVE-2023-39318 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39319/">CVE-2023-39319 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39319">CVE-2023-39319 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009782292" comment="go1.20-1.20.8-150000.1.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782293" comment="go1.20-doc-1.20.8-150000.1.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782294" comment="go1.20-race-1.20.8-150000.1.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4371" version="1" class="patch">
	<metadata>
		<title>Security update for go1.21 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="1215084" ref_url="https://bugzilla.suse.com/1215084" source="BUGZILLA"/>
		<reference ref_id="1215085" ref_url="https://bugzilla.suse.com/1215085" source="BUGZILLA"/>
		<reference ref_id="1215086" ref_url="https://bugzilla.suse.com/1215086" source="BUGZILLA"/>
		<reference ref_id="1215087" ref_url="https://bugzilla.suse.com/1215087" source="BUGZILLA"/>
		<reference ref_id="1215090" ref_url="https://bugzilla.suse.com/1215090" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39318" ref_url="https://www.suse.com/security/cve/CVE-2023-39318/" source="CVE"/>
		<reference ref_id="CVE-2023-39319" ref_url="https://www.suse.com/security/cve/CVE-2023-39319/" source="CVE"/>
		<reference ref_id="CVE-2023-39320" ref_url="https://www.suse.com/security/cve/CVE-2023-39320/" source="CVE"/>
		<reference ref_id="CVE-2023-39321" ref_url="https://www.suse.com/security/cve/CVE-2023-39321/" source="CVE"/>
		<reference ref_id="CVE-2023-39322" ref_url="https://www.suse.com/security/cve/CVE-2023-39322/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3701-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031567.html" source="SUSE-SU"/>
		<description>
This update for go1.21 fixes the following issues:

Update to go1.21.1 (bsc#1212475).

- CVE-2023-39318: Fixed improper handling of HTML-like comments within script contexts in html/template (bsc#1215084).
- CVE-2023-39319: Fixed improper handling of special tags within script contexts in html/template (bsc#1215085).
- CVE-2023-39320: Fixed arbitrary execution in go.mod toolchain directive (bsc#1215086).
- CVE-2023-39321, CVE-2023-39322: Fixed a panic when processing post-handshake message on QUIC connections in crypto/tls (bsc#1215087).

The following non-security bug was fixed:

- Add missing directory pprof html asset directory to package (bsc#1215090).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-20"/>
	<updated date="2023-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215084">SUSE bug 1215084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215085">SUSE bug 1215085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215086">SUSE bug 1215086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215087">SUSE bug 1215087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215090">SUSE bug 1215090</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39318/">CVE-2023-39318 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39318">CVE-2023-39318 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39319/">CVE-2023-39319 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39319">CVE-2023-39319 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39320/">CVE-2023-39320 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39320">CVE-2023-39320 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39321/">CVE-2023-39321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39321">CVE-2023-39321 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39322/">CVE-2023-39322 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39322">CVE-2023-39322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009786201" comment="go1.21-1.21.1-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009786202" comment="go1.21-doc-1.21.1-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009786203" comment="go1.21-race-1.21.1-150000.1.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4372" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214254" ref_url="https://bugzilla.suse.com/1214254" source="BUGZILLA"/>
		<reference ref_id="1215204" ref_url="https://bugzilla.suse.com/1215204" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32360" ref_url="https://www.suse.com/security/cve/CVE-2023-32360/" source="CVE"/>
		<reference ref_id="CVE-2023-4504" ref_url="https://www.suse.com/security/cve/CVE-2023-4504/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016253.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2023-4504: Fixed heap overflow in OpenPrinting CUPS Postscript Parsing (bsc#1215204).
- CVE-2023-32360: Fixed Information leak through Cups-Get-Document operation (bsc#1214254).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-20"/>
	<updated date="2023-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214254">SUSE bug 1214254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215204">SUSE bug 1215204</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32360/">CVE-2023-32360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32360">CVE-2023-32360 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4504/">CVE-2023-4504 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4504">CVE-2023-4504 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009796838" comment="cups-2.2.7-150000.3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796839" comment="cups-client-2.2.7-150000.3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796840" comment="cups-config-2.2.7-150000.3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796841" comment="cups-ddk-2.2.7-150000.3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796842" comment="cups-devel-2.2.7-150000.3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796843" comment="cups-devel-32bit-2.2.7-150000.3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796844" comment="libcups2-2.2.7-150000.3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796845" comment="libcups2-32bit-2.2.7-150000.3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796846" comment="libcupscgi1-2.2.7-150000.3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796847" comment="libcupscgi1-32bit-2.2.7-150000.3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796848" comment="libcupsimage2-2.2.7-150000.3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796849" comment="libcupsimage2-32bit-2.2.7-150000.3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796850" comment="libcupsmime1-2.2.7-150000.3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796851" comment="libcupsmime1-32bit-2.2.7-150000.3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796852" comment="libcupsppdc1-2.2.7-150000.3.51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796853" comment="libcupsppdc1-32bit-2.2.7-150000.3.51.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4373" version="1" class="patch">
	<metadata>
		<title>Security update for python39 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211765" ref_url="https://bugzilla.suse.com/1211765" source="BUGZILLA"/>
		<reference ref_id="1213463" ref_url="https://bugzilla.suse.com/1213463" source="BUGZILLA"/>
		<reference ref_id="1214692" ref_url="https://bugzilla.suse.com/1214692" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016252.html" source="SUSE-SU"/>
		<description>
This update for python39 fixes the following issues:

- Update to 3.9.18:

- CVE-2023-40217: Fixed TLS handshake bypass on closed sockets (bsc#1214692).

The following non-security bugs were fixed:

- making marshalling of `set` and `frozenset` deterministic (bsc#1211765).
- stabilizing FLAG_REF usage (required for reproduceability (bsc#1213463).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-20"/>
	<updated date="2023-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211765">SUSE bug 1211765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213463">SUSE bug 1213463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214692">SUSE bug 1214692</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009782125" comment="libpython3_9-1_0-3.9.18-150300.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782126" comment="libpython3_9-1_0-32bit-3.9.18-150300.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782127" comment="python39-3.9.18-150300.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782128" comment="python39-32bit-3.9.18-150300.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782129" comment="python39-base-3.9.18-150300.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782130" comment="python39-base-32bit-3.9.18-150300.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782131" comment="python39-curses-3.9.18-150300.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782132" comment="python39-dbm-3.9.18-150300.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782133" comment="python39-devel-3.9.18-150300.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782134" comment="python39-doc-3.9.18-150300.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782135" comment="python39-doc-devhelp-3.9.18-150300.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782136" comment="python39-idle-3.9.18-150300.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782137" comment="python39-testsuite-3.9.18-150300.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782138" comment="python39-tk-3.9.18-150300.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782139" comment="python39-tools-3.9.18-150300.4.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4374" version="1" class="patch">
	<metadata>
		<title>Security update for frr (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213284" ref_url="https://bugzilla.suse.com/1213284" source="BUGZILLA"/>
		<reference ref_id="1213434" ref_url="https://bugzilla.suse.com/1213434" source="BUGZILLA"/>
		<reference ref_id="1214735" ref_url="https://bugzilla.suse.com/1214735" source="BUGZILLA"/>
		<reference ref_id="1214739" ref_url="https://bugzilla.suse.com/1214739" source="BUGZILLA"/>
		<reference ref_id="1215065" ref_url="https://bugzilla.suse.com/1215065" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3748" ref_url="https://www.suse.com/security/cve/CVE-2023-3748/" source="CVE"/>
		<reference ref_id="CVE-2023-38802" ref_url="https://www.suse.com/security/cve/CVE-2023-38802/" source="CVE"/>
		<reference ref_id="CVE-2023-41358" ref_url="https://www.suse.com/security/cve/CVE-2023-41358/" source="CVE"/>
		<reference ref_id="CVE-2023-41360" ref_url="https://www.suse.com/security/cve/CVE-2023-41360/" source="CVE"/>
		<reference ref_id="CVE-2023-41909" ref_url="https://www.suse.com/security/cve/CVE-2023-41909/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016260.html" source="SUSE-SU"/>
		<description>
This update for frr fixes the following issues:

- CVE-2023-38802: Fixed bad length handling in BGP attribute handling (bsc#1213284). 
- CVE-2023-41358: Fixed crash in bgpd/bgp_packet.c (bsc#1214735).
- CVE-2023-41360: Fixed out-of-bounds read in bgpd/bgp_packet.c (bsc#1214739).
- CVE-2023-3748: Fixed inifinite loop in babld message parsing may cause DoS (bsc#1213434).
- CVE-2023-41909: Fixed NULL pointer dereference due to processing in bgp_nlri_parse_flowspec (bsc#1215065).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-20"/>
	<updated date="2023-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213284">SUSE bug 1213284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213434">SUSE bug 1213434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214735">SUSE bug 1214735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214739">SUSE bug 1214739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215065">SUSE bug 1215065</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3748/">CVE-2023-3748 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3748">CVE-2023-3748 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38802/">CVE-2023-38802 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38802">CVE-2023-38802 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-41358/">CVE-2023-41358 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41358">CVE-2023-41358 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-41360/">CVE-2023-41360 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41360">CVE-2023-41360 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-41909/">CVE-2023-41909 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41909">CVE-2023-41909 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009796865" comment="frr-8.4-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796866" comment="frr-devel-8.4-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796867" comment="libfrr0-8.4-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796868" comment="libfrr_pb0-8.4-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796869" comment="libfrrcares0-8.4-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796870" comment="libfrrfpm_pb0-8.4-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796871" comment="libfrrospfapiclient0-8.4-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796872" comment="libfrrsnmp0-8.4-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796873" comment="libfrrzmq0-8.4-150500.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796874" comment="libmlag_pb0-8.4-150500.4.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4375" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch3 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212125" ref_url="https://bugzilla.suse.com/1212125" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3152" ref_url="https://www.suse.com/security/cve/CVE-2023-3152/" source="CVE"/>
		<reference ref_id="CVE-2023-3153" ref_url="https://www.suse.com/security/cve/CVE-2023-3153/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016259.html" source="SUSE-SU"/>
		<description>
This update for openvswitch3 fixes the following issues:

- CVE-2023-3153: Fixed service monitor MAC flow is not rate limited (bsc#1212125).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-20"/>
	<updated date="2023-09-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212125">SUSE bug 1212125</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3152/">CVE-2023-3152 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3152">CVE-2023-3152 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3153/">CVE-2023-3153 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3153">CVE-2023-3153 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009781738" comment="libopenvswitch-3_1-0-3.1.0-150500.3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781739" comment="libovn-23_03-0-23.03.0-150500.3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781740" comment="openvswitch3-3.1.0-150500.3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781741" comment="openvswitch3-devel-3.1.0-150500.3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781742" comment="openvswitch3-doc-3.1.0-150500.3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781743" comment="openvswitch3-ipsec-3.1.0-150500.3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781744" comment="openvswitch3-pki-3.1.0-150500.3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781745" comment="openvswitch3-test-3.1.0-150500.3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781746" comment="openvswitch3-vtep-3.1.0-150500.3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781747" comment="ovn3-23.03.0-150500.3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781748" comment="ovn3-central-23.03.0-150500.3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781749" comment="ovn3-devel-23.03.0-150500.3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781750" comment="ovn3-doc-23.03.0-150500.3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781751" comment="ovn3-docker-23.03.0-150500.3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781752" comment="ovn3-host-23.03.0-150500.3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781753" comment="ovn3-vtep-23.03.0-150500.3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781754" comment="python3-ovs3-3.1.0-150500.3.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4376" version="1" class="patch">
	<metadata>
		<title>Security update for redis7 (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215094" ref_url="https://bugzilla.suse.com/1215094" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-41053" ref_url="https://www.suse.com/security/cve/CVE-2023-41053/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016258.html" source="SUSE-SU"/>
		<description>
This update for redis7 fixes the following issues:

- CVE-2023-41053: Fixed SORT_RO may bypass ACL configuration (bsc#1215094).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-20"/>
	<updated date="2023-09-20"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1215094">SUSE bug 1215094</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-41053/">CVE-2023-41053 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41053">CVE-2023-41053 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782301" comment="redis7-7.0.8-150500.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4377" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-rails-html-sanitizer (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206433" ref_url="https://bugzilla.suse.com/1206433" source="BUGZILLA"/>
		<reference ref_id="1206434" ref_url="https://bugzilla.suse.com/1206434" source="BUGZILLA"/>
		<reference ref_id="1206435" ref_url="https://bugzilla.suse.com/1206435" source="BUGZILLA"/>
		<reference ref_id="1206436" ref_url="https://bugzilla.suse.com/1206436" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23517" ref_url="https://www.suse.com/security/cve/CVE-2022-23517/" source="CVE"/>
		<reference ref_id="CVE-2022-23518" ref_url="https://www.suse.com/security/cve/CVE-2022-23518/" source="CVE"/>
		<reference ref_id="CVE-2022-23519" ref_url="https://www.suse.com/security/cve/CVE-2022-23519/" source="CVE"/>
		<reference ref_id="CVE-2022-23520" ref_url="https://www.suse.com/security/cve/CVE-2022-23520/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016255.html" source="SUSE-SU"/>
		<description>
This update for rubygem-rails-html-sanitizer fixes the following issues:

  - CVE-2022-23517: Fixed inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. (bsc#1206433)
  - CVE-2022-23518: Fixed XSS via data URIs when used in combination with Loofah. (bsc#1206434)
  - CVE-2022-23519: Fixed XSS vulnerability with certain configurations of Rails::Html::Sanitizer. (bsc#1206435)
  - CVE-2022-23520: Fixed XSS vulnerability with certain configurations of Rails::Html::Sanitizer. (bsc#1206436)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-20"/>
	<updated date="2023-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206433">SUSE bug 1206433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206434">SUSE bug 1206434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206435">SUSE bug 1206435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206436">SUSE bug 1206436</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23517/">CVE-2022-23517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23517">CVE-2022-23517 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23518/">CVE-2022-23518 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23518">CVE-2022-23518 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-23519/">CVE-2022-23519 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23519">CVE-2022-23519 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-23520/">CVE-2022-23520 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23520">CVE-2022-23520 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009781425" comment="ruby2.5-rubygem-rails-html-sanitizer-1.0.4-150000.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781426" comment="ruby2.5-rubygem-rails-html-sanitizer-doc-1.0.4-150000.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781427" comment="ruby2.5-rubygem-rails-html-sanitizer-testsuite-1.0.4-150000.4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4378" version="1" class="patch">
	<metadata>
		<title>Security update for rust, rust1.72 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214689" ref_url="https://bugzilla.suse.com/1214689" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40030" ref_url="https://www.suse.com/security/cve/CVE-2023-40030/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031626.html" source="SUSE-SU"/>
		<description>
This update for rust, rust1.72 fixes the following issues:

Changes in rust:

- Update to version 1.72.0 - for details see the rust1.72 package

Changes in rust1.72:

- CVE-2023-40030: fix minor non-exploited issue in cargo (bsc#1214689)


Version 1.72.0 (2023-08-24)
==========================

Language
--------

- Replace const eval limit by a lint and add an exponential backoff warning
- expand: Change how `#![cfg(FALSE)]` behaves on crate root
- Stabilize inline asm for LoongArch64
- Uplift `clippy::undropped_manually_drops` lint
- Uplift `clippy::invalid_utf8_in_unchecked` lint
- Uplift `clippy::cast_ref_to_mut` lint
- Uplift `clippy::cmp_nan` lint
- resolve: Remove artificial import ambiguity errors
- Don't require associated types with Self: Sized bounds in `dyn Trait` objects

Compiler
--------

- Remember names of `cfg`-ed out items to mention them in diagnostics
- Support for native WASM exceptions
- Add support for NetBSD/aarch64-be (big-endian arm64).
- Write to stdout if `-` is given as output file
- Force all native libraries to be statically linked when linking a static binary
- Add Tier 3 support for `loongarch64-unknown-none*`
- Prevent `.eh_frame` from being emitted for `-C panic=abort`
- Support 128-bit enum variant in debuginfo codegen
- compiler: update solaris/illumos to enable tsan support.

Refer to Rust's platform support page for more information on Rust's tiered platform support.

Libraries
---------

- Document memory orderings of `thread::{park, unpark}`
- io: soften ‘at most one write attempt’ requirement in io::Write::write
- Specify behavior of HashSet::insert
- Relax implicit `T: Sized` bounds on `BufReader&lt;T&gt;`, `BufWriter&lt;T&gt;` and `LineWriter&lt;T&gt;`
- Update runtime guarantee for `select_nth_unstable`
- Return `Ok` on kill if process has already exited
- Implement PartialOrd for `Vec`s over different allocators
- Use 128 bits for TypeId hash
- Don't drain-on-drop in DrainFilter impls of various collections.
- Make `{Arc,Rc,Weak}::ptr_eq` ignore pointer metadata

Rustdoc
-------

- Allow whitespace as path separator like double colon
- Add search result item types after their name
- Search for slices and arrays by type with `[]`
- Clean up type unification and 'unboxing'

Stabilized APIs
---------------

- `impl&lt;T: Send&gt; Sync for mpsc::Sender&lt;T&gt;`
- `impl TryFrom&lt;&amp;OsStr&gt; for &amp;str`
- `String::leak`

These APIs are now stable in const contexts:

- `CStr::from_bytes_with_nul`
- `CStr::to_bytes`
- `CStr::to_bytes_with_nul`
- `CStr::to_str`

Cargo
-----

- Enable `-Zdoctest-in-workspace` by default. When running each documentation
  test, the working directory is set to the root directory of the package the
  test belongs to.
- Add support of the 'default' keyword to reset previously set `build.jobs`
  parallelism back to the default.

Compatibility Notes
-------------------

- Alter `Display` for `Ipv6Addr` for IPv4-compatible addresses
- Cargo changed feature name validation check to a hard error. The warning was
  added in Rust 1.49. These extended characters aren't allowed on crates.io, so
  this should only impact users of other registries, or people who don't publish
  to a registry.
  		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-21"/>
	<updated date="2023-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214689">SUSE bug 1214689</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-40030/">CVE-2023-40030 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40030">CVE-2023-40030 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009782106" comment="cargo-1.72.0-150400.24.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782107" comment="cargo1.72-1.72.0-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782108" comment="rust-1.72.0-150400.24.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782109" comment="rust1.72-1.72.0-150400.9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4379" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213379" ref_url="https://bugzilla.suse.com/1213379" source="BUGZILLA"/>
		<reference ref_id="1213581" ref_url="https://bugzilla.suse.com/1213581" source="BUGZILLA"/>
		<reference ref_id="1213905" ref_url="https://bugzilla.suse.com/1213905" source="BUGZILLA"/>
		<reference ref_id="1214093" ref_url="https://bugzilla.suse.com/1214093" source="BUGZILLA"/>
		<reference ref_id="1214640" ref_url="https://bugzilla.suse.com/1214640" source="BUGZILLA"/>
		<reference ref_id="1214835" ref_url="https://bugzilla.suse.com/1214835" source="BUGZILLA"/>
		<reference ref_id="1215072" ref_url="https://bugzilla.suse.com/1215072" source="BUGZILLA"/>
		<reference ref_id="1215230" ref_url="https://bugzilla.suse.com/1215230" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28198" ref_url="https://www.suse.com/security/cve/CVE-2023-28198/" source="CVE"/>
		<reference ref_id="CVE-2023-32370" ref_url="https://www.suse.com/security/cve/CVE-2023-32370/" source="CVE"/>
		<reference ref_id="CVE-2023-37450" ref_url="https://www.suse.com/security/cve/CVE-2023-37450/" source="CVE"/>
		<reference ref_id="CVE-2023-38594" ref_url="https://www.suse.com/security/cve/CVE-2023-38594/" source="CVE"/>
		<reference ref_id="CVE-2023-38595" ref_url="https://www.suse.com/security/cve/CVE-2023-38595/" source="CVE"/>
		<reference ref_id="CVE-2023-38597" ref_url="https://www.suse.com/security/cve/CVE-2023-38597/" source="CVE"/>
		<reference ref_id="CVE-2023-38599" ref_url="https://www.suse.com/security/cve/CVE-2023-38599/" source="CVE"/>
		<reference ref_id="CVE-2023-38600" ref_url="https://www.suse.com/security/cve/CVE-2023-38600/" source="CVE"/>
		<reference ref_id="CVE-2023-38611" ref_url="https://www.suse.com/security/cve/CVE-2023-38611/" source="CVE"/>
		<reference ref_id="CVE-2023-40397" ref_url="https://www.suse.com/security/cve/CVE-2023-40397/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016317.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Expand lang sub-package in spec file unconditionally to handle
  previous name change from WebKit2GTK-lang to WebKitGTK-lang. This
  change affected the automatic generated Requires tag on
  WebKit2GTK-%{_apiver}, then getting out of sync of what's being
  required and what's being provided. Now, any sub-package that was
  providing WebKit2GTK-%{_apiver} will provide WebKitGTK-%{_apiver}
  instead (bsc#1214835, bsc#1214640, bsc#1214093).

- Require libwaylandclient0 &gt;= 1.20. 15.4 originally had 1.19.0,
  but webkitgtk uses a function added in 1.20.0, so we need to
  ensure that the wayland update is pulled in (bsc#1215072).

- Update to version 2.40.5 (bsc#1213905 bsc#1213379 bsc#1213581
  bsc#1215230):
    CVE-2023-38594, CVE-2023-38595, CVE-2023-38597,
    CVE-2023-38599, CVE-2023-38600, CVE-2023-38611,
    CVE-2023-40397, CVE-2023-37450, CVE-2023-28198,
    CVE-2023-32370
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-25"/>
	<updated date="2023-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213379">SUSE bug 1213379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213581">SUSE bug 1213581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213905">SUSE bug 1213905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214093">SUSE bug 1214093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214640">SUSE bug 1214640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214835">SUSE bug 1214835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215072">SUSE bug 1215072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215230">SUSE bug 1215230</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28198/">CVE-2023-28198 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28198">CVE-2023-28198 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-32370/">CVE-2023-32370 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32370">CVE-2023-32370 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37450/">CVE-2023-37450 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37450">CVE-2023-37450 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38594/">CVE-2023-38594 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38594">CVE-2023-38594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38595/">CVE-2023-38595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38595">CVE-2023-38595 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38597/">CVE-2023-38597 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38597">CVE-2023-38597 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38599/">CVE-2023-38599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38599">CVE-2023-38599 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38600/">CVE-2023-38600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38600">CVE-2023-38600 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38611/">CVE-2023-38611 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38611">CVE-2023-38611 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40397/">CVE-2023-40397 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40397">CVE-2023-40397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009795068" comment="WebKitGTK-4.0-lang-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795069" comment="WebKitGTK-4.1-lang-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795070" comment="WebKitGTK-6.0-lang-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795071" comment="libjavascriptcoregtk-4_0-18-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795072" comment="libjavascriptcoregtk-4_0-18-32bit-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795073" comment="libjavascriptcoregtk-4_0-18-64bit-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795074" comment="libjavascriptcoregtk-4_1-0-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795075" comment="libjavascriptcoregtk-4_1-0-32bit-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795076" comment="libjavascriptcoregtk-4_1-0-64bit-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795077" comment="libjavascriptcoregtk-6_0-1-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795078" comment="libwebkit2gtk-4_0-37-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795079" comment="libwebkit2gtk-4_0-37-32bit-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795080" comment="libwebkit2gtk-4_0-37-64bit-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795081" comment="libwebkit2gtk-4_1-0-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795082" comment="libwebkit2gtk-4_1-0-32bit-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795083" comment="libwebkit2gtk-4_1-0-64bit-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795084" comment="libwebkitgtk-6_0-4-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795085" comment="typelib-1_0-JavaScriptCore-4_0-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795086" comment="typelib-1_0-JavaScriptCore-4_1-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795087" comment="typelib-1_0-JavaScriptCore-6_0-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795088" comment="typelib-1_0-WebKit-6_0-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795089" comment="typelib-1_0-WebKit2-4_0-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795090" comment="typelib-1_0-WebKit2-4_1-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795091" comment="typelib-1_0-WebKit2WebExtension-4_0-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795092" comment="typelib-1_0-WebKit2WebExtension-4_1-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795093" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795094" comment="webkit-jsc-4-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795095" comment="webkit-jsc-4.1-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795096" comment="webkit-jsc-6.0-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795097" comment="webkit2gtk-4_0-injected-bundles-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795098" comment="webkit2gtk-4_1-injected-bundles-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795099" comment="webkit2gtk3-devel-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795100" comment="webkit2gtk3-minibrowser-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795101" comment="webkit2gtk3-soup2-devel-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795102" comment="webkit2gtk3-soup2-minibrowser-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795103" comment="webkit2gtk4-devel-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795104" comment="webkit2gtk4-minibrowser-2.40.5-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795105" comment="webkitgtk-6_0-injected-bundles-2.40.5-150400.4.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4380" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214560" ref_url="https://bugzilla.suse.com/1214560" source="BUGZILLA"/>
		<reference ref_id="1214561" ref_url="https://bugzilla.suse.com/1214561" source="BUGZILLA"/>
		<reference ref_id="1214562" ref_url="https://bugzilla.suse.com/1214562" source="BUGZILLA"/>
		<reference ref_id="1214652" ref_url="https://bugzilla.suse.com/1214652" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2906" ref_url="https://www.suse.com/security/cve/CVE-2023-2906/" source="CVE"/>
		<reference ref_id="CVE-2023-4511" ref_url="https://www.suse.com/security/cve/CVE-2023-4511/" source="CVE"/>
		<reference ref_id="CVE-2023-4512" ref_url="https://www.suse.com/security/cve/CVE-2023-4512/" source="CVE"/>
		<reference ref_id="CVE-2023-4513" ref_url="https://www.suse.com/security/cve/CVE-2023-4513/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3778-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031685.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

- Wireshark update to v3.6.16.
- CVE-2023-4512: Fixed a bug in CBOR dissector which could lead to crash. (bsc#1214561)
- CVE-2023-4511: Fixed a bug in BT SDP dissector which could lead to an infinite loop. (bsc#1214560)
- CVE-2023-4513: Fixed a bug in BT SDP dissector which could lead to a memory leak. (bsc#1214562)
- CVE-2023-2906: Fixed a bug in CP2179 dissector which could lead to crash. (bsc#1214652)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-26"/>
	<updated date="2023-09-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214560">SUSE bug 1214560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214561">SUSE bug 1214561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214562">SUSE bug 1214562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214652">SUSE bug 1214652</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-2906/">CVE-2023-2906 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2906">CVE-2023-2906 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-4511/">CVE-2023-4511 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4511">CVE-2023-4511 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-4512/">CVE-2023-4512 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4512">CVE-2023-4512 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-4513/">CVE-2023-4513 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4513">CVE-2023-4513 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009779888" comment="libwireshark15-3.6.16-150000.3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779889" comment="libwiretap12-3.6.16-150000.3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779890" comment="libwsutil13-3.6.16-150000.3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779891" comment="wireshark-3.6.16-150000.3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779892" comment="wireshark-devel-3.6.16-150000.3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009779893" comment="wireshark-ui-qt-3.6.16-150000.3.100.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4381" version="1" class="patch">
	<metadata>
		<title>Security update for wire (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016331.html" source="SUSE-SU"/>
		<description>

This update of wire fixes the following issues:

- rebuild the package with the go 1.21 security release (bsc#1212475).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-26"/>
	<updated date="2023-09-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781320" comment="wire-0.5.0-150000.1.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4382" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionview-5_1 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1209826" ref_url="https://bugzilla.suse.com/1209826" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-23913" ref_url="https://www.suse.com/security/cve/CVE-2023-23913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016345.html" source="SUSE-SU"/>
		<description>
This update for rubygem-actionview-5_1 fixes the following issues:

 - CVE-2023-23913: Fixed DOM Based Cross-site Scripting in rails-ujs (bsc#1209826).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1209826">SUSE bug 1209826</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-23913/">CVE-2023-23913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-23913">CVE-2023-23913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009797400" comment="ruby2.5-rubygem-actionview-5_1-5.1.4-150000.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797401" comment="ruby2.5-rubygem-actionview-doc-5_1-5.1.4-150000.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4383" version="1" class="patch">
	<metadata>
		<title>Security update for containerd (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:3817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031748.html" source="SUSE-SU"/>
		<description>

This update of containerd fixes the following issues:

- rebuild the package with the go 1.21 security release (bsc#1212475).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009781009" comment="containerd-1.6.21-150000.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781010" comment="containerd-ctr-1.6.21-150000.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781020" comment="containerd-devel-1.6.21-150000.95.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4384" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214246" ref_url="https://bugzilla.suse.com/1214246" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28429" ref_url="https://www.suse.com/security/cve/CVE-2021-28429/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031747.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg fixes the following issues:

- CVE-2021-28429: Fixed Integer overflow vulnerability in av_timecode_make_string in libavutil/timecode.c (bsc#1214246).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214246">SUSE bug 1214246</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28429/">CVE-2021-28429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28429">CVE-2021-28429 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009781428" comment="ffmpeg-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781429" comment="ffmpeg-private-devel-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781430" comment="libavcodec-devel-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781431" comment="libavcodec57-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781432" comment="libavcodec57-32bit-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781433" comment="libavdevice-devel-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781434" comment="libavdevice57-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781435" comment="libavdevice57-32bit-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781436" comment="libavfilter-devel-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781437" comment="libavfilter6-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781438" comment="libavfilter6-32bit-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781439" comment="libavformat-devel-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781440" comment="libavformat57-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781441" comment="libavformat57-32bit-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781442" comment="libavresample-devel-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781443" comment="libavresample3-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781444" comment="libavresample3-32bit-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781445" comment="libavutil-devel-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781446" comment="libavutil55-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781447" comment="libavutil55-32bit-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781448" comment="libpostproc-devel-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781449" comment="libpostproc54-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781450" comment="libpostproc54-32bit-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781451" comment="libswresample-devel-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781452" comment="libswresample2-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781453" comment="libswresample2-32bit-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781454" comment="libswscale-devel-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781455" comment="libswscale4-3.4.2-150200.11.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781456" comment="libswscale4-32bit-3.4.2-150200.11.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4385" version="1" class="patch">
	<metadata>
		<title>Security update for busybox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214538" ref_url="https://bugzilla.suse.com/1214538" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48174" ref_url="https://www.suse.com/security/cve/CVE-2022-48174/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3820-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031745.html" source="SUSE-SU"/>
		<description>
This update for busybox fixes the following issues:

- CVE-2022-48174: Fixed stack overflow vulnerability. (bsc#1214538)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214538">SUSE bug 1214538</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48174/">CVE-2022-48174 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48174">CVE-2022-48174 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009798700" comment="busybox-static-1.35.0-150500.10.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798701" comment="busybox-testsuite-1.35.0-150500.10.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798702" comment="busybox-warewulf3-1.35.0-150500.10.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4386" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215472" ref_url="https://bugzilla.suse.com/1215472" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3341" ref_url="https://www.suse.com/security/cve/CVE-2023-3341/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031744.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

Update to release 9.16.44:

  - CVE-2023-3341: Fixed stack exhaustion flaw in control channel code may cause named to terminate unexpectedly (bsc#1215472).
    
Update to release 9.16.43

* Processing already-queued queries received over TCP could cause
  an assertion failure, when the server was reconfigured at the
  same time or the cache was being flushed. This has been fixed.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215472">SUSE bug 1215472</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3341/">CVE-2023-3341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3341">CVE-2023-3341 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009797864" comment="bind-9.16.44-150500.8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797865" comment="bind-doc-9.16.44-150500.8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797866" comment="bind-utils-9.16.44-150500.8.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797867" comment="python3-bind-9.16.44-150500.8.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4387" version="1" class="patch">
	<metadata>
		<title>Security update for supportutils (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1181477" ref_url="https://bugzilla.suse.com/1181477" source="BUGZILLA"/>
		<reference ref_id="1196933" ref_url="https://bugzilla.suse.com/1196933" source="BUGZILLA"/>
		<reference ref_id="1204942" ref_url="https://bugzilla.suse.com/1204942" source="BUGZILLA"/>
		<reference ref_id="1205533" ref_url="https://bugzilla.suse.com/1205533" source="BUGZILLA"/>
		<reference ref_id="1206402" ref_url="https://bugzilla.suse.com/1206402" source="BUGZILLA"/>
		<reference ref_id="1206608" ref_url="https://bugzilla.suse.com/1206608" source="BUGZILLA"/>
		<reference ref_id="1207543" ref_url="https://bugzilla.suse.com/1207543" source="BUGZILLA"/>
		<reference ref_id="1207598" ref_url="https://bugzilla.suse.com/1207598" source="BUGZILLA"/>
		<reference ref_id="1208928" ref_url="https://bugzilla.suse.com/1208928" source="BUGZILLA"/>
		<reference ref_id="1209979" ref_url="https://bugzilla.suse.com/1209979" source="BUGZILLA"/>
		<reference ref_id="1210015" ref_url="https://bugzilla.suse.com/1210015" source="BUGZILLA"/>
		<reference ref_id="1210950" ref_url="https://bugzilla.suse.com/1210950" source="BUGZILLA"/>
		<reference ref_id="1211598" ref_url="https://bugzilla.suse.com/1211598" source="BUGZILLA"/>
		<reference ref_id="1211599" ref_url="https://bugzilla.suse.com/1211599" source="BUGZILLA"/>
		<reference ref_id="1213127" ref_url="https://bugzilla.suse.com/1213127" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-45154" ref_url="https://www.suse.com/security/cve/CVE-2022-45154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3822-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031743.html" source="SUSE-SU"/>
		<description>
This update for supportutils fixes the following issues:

Security fixes:

- CVE-2022-45154: Removed iSCSI passwords (bsc#1207598).

Other Fixes:

- Changes in version 3.1.26
  + powerpc plugin to collect the slots and active memory (bsc#1210950)
  + A Cleartext Storage of Sensitive Information vulnerability CVE-2022-45154
  + supportconfig: collect BPF information (pr#154)
  + Added additional iscsi information (pr#155)

- Added run time detection (bsc#1213127)

- Changes for supportutils version 3.1.25
  + Removed iSCSI passwords CVE-2022-45154 (bsc#1207598)
  + powerpc: Collect lsslot,amsstat, and opal elogs (pr#149)
  + powerpc: collect invscout logs (pr#150)
  + powerpc: collect RMC status logs (pr#151)
  + Added missing nvme nbft commands (bsc#1211599)
  + Fixed invalid nvme commands (bsc#1211598)
  + Added missing podman information (PED-1703, bsc#1181477)
  + Removed dependency on sysfstools
  + Check for systool use (bsc#1210015)
  + Added selinux checking (bsc#1209979)
  + Updated SLES_VER matrix

- Fixed missing status detail for apparmor (bsc#1196933)
- Corrected invalid argument list in docker.txt (bsc#1206608)
- Applies limit equally to sar data and text files (bsc#1207543)
- Collects hwinfo hardware logs (bsc#1208928)
- Collects lparnumascore logs (issue#148)

- Add dependency to `numactl` on ppc64le and `s390x`, this enforces
  that `numactl --hardware` data is provided in supportconfigs

- Changes to supportconfig.rc version 3.1.11-35
  + Corrected _sanitize_file to include iscsi.conf and others (bsc#1206402)

- Changes to supportconfig version 3.1.11-46.4
  + Added plymouth_info 

- Changes to getappcore version 1.53.02
  + The location of chkbin was updated earlier. This documents that
    change (bsc#1205533, bsc#1204942)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181477">SUSE bug 1181477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196933">SUSE bug 1196933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204942">SUSE bug 1204942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205533">SUSE bug 1205533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206402">SUSE bug 1206402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206608">SUSE bug 1206608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207543">SUSE bug 1207543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207598">SUSE bug 1207598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208928">SUSE bug 1208928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209979">SUSE bug 1209979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210015">SUSE bug 1210015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210950">SUSE bug 1210950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211598">SUSE bug 1211598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211599">SUSE bug 1211599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213127">SUSE bug 1213127</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-45154/">CVE-2022-45154 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45154">CVE-2022-45154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781703" comment="supportutils-3.1.26-150300.7.35.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4388" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215026" ref_url="https://bugzilla.suse.com/1215026" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38039" ref_url="https://www.suse.com/security/cve/CVE-2023-38039/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3823-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031742.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2023-38039: Fixed possible DoS when receiving too large HTTP header. (bsc#1215026)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215026">SUSE bug 1215026</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38039/">CVE-2023-38039 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38039">CVE-2023-38039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009796801" comment="curl-8.0.1-150400.5.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796802" comment="libcurl-devel-8.0.1-150400.5.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796803" comment="libcurl-devel-32bit-8.0.1-150400.5.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796804" comment="libcurl4-8.0.1-150400.5.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796805" comment="libcurl4-32bit-8.0.1-150400.5.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4389" version="1" class="patch">
	<metadata>
		<title>Security update for python310 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213463" ref_url="https://bugzilla.suse.com/1213463" source="BUGZILLA"/>
		<reference ref_id="1214692" ref_url="https://bugzilla.suse.com/1214692" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031741.html" source="SUSE-SU"/>
		<description>
This update for python310 fixes the following issues:

- Update to 3.10.13.

- CVE-2023-40217: Fixed TLS handshake bypass on closed sockets (bsc#1214692)

The following non-security bug was fixed:

- stabilizing FLAG_REF usage (required for reproduceability (bsc#1213463).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213463">SUSE bug 1213463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214692">SUSE bug 1214692</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009782110" comment="libpython3_10-1_0-3.10.13-150400.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782111" comment="libpython3_10-1_0-32bit-3.10.13-150400.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782112" comment="python310-3.10.13-150400.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782113" comment="python310-32bit-3.10.13-150400.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782114" comment="python310-base-3.10.13-150400.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782115" comment="python310-base-32bit-3.10.13-150400.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782116" comment="python310-curses-3.10.13-150400.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782117" comment="python310-dbm-3.10.13-150400.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782118" comment="python310-devel-3.10.13-150400.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782119" comment="python310-doc-3.10.13-150400.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782120" comment="python310-doc-devhelp-3.10.13-150400.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782121" comment="python310-idle-3.10.13-150400.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782122" comment="python310-testsuite-3.10.13-150400.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782123" comment="python310-tk-3.10.13-150400.4.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782124" comment="python310-tools-3.10.13-150400.4.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4390" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1200962" ref_url="https://bugzilla.suse.com/1200962" source="BUGZILLA"/>
		<reference ref_id="1206080" ref_url="https://bugzilla.suse.com/1206080" source="BUGZILLA"/>
		<reference ref_id="1206556" ref_url="https://bugzilla.suse.com/1206556" source="BUGZILLA"/>
		<reference ref_id="1208037" ref_url="https://bugzilla.suse.com/1208037" source="BUGZILLA"/>
		<reference ref_id="1208038" ref_url="https://bugzilla.suse.com/1208038" source="BUGZILLA"/>
		<reference ref_id="1208040" ref_url="https://bugzilla.suse.com/1208040" source="BUGZILLA"/>
		<reference ref_id="1208409" ref_url="https://bugzilla.suse.com/1208409" source="BUGZILLA"/>
		<reference ref_id="1209642" ref_url="https://bugzilla.suse.com/1209642" source="BUGZILLA"/>
		<reference ref_id="1210297" ref_url="https://bugzilla.suse.com/1210297" source="BUGZILLA"/>
		<reference ref_id="1210733" ref_url="https://bugzilla.suse.com/1210733" source="BUGZILLA"/>
		<reference ref_id="1213458" ref_url="https://bugzilla.suse.com/1213458" source="BUGZILLA"/>
		<reference ref_id="1214565" ref_url="https://bugzilla.suse.com/1214565" source="BUGZILLA"/>
		<reference ref_id="1214567" ref_url="https://bugzilla.suse.com/1214567" source="BUGZILLA"/>
		<reference ref_id="1214579" ref_url="https://bugzilla.suse.com/1214579" source="BUGZILLA"/>
		<reference ref_id="1214580" ref_url="https://bugzilla.suse.com/1214580" source="BUGZILLA"/>
		<reference ref_id="1214604" ref_url="https://bugzilla.suse.com/1214604" source="BUGZILLA"/>
		<reference ref_id="1214611" ref_url="https://bugzilla.suse.com/1214611" source="BUGZILLA"/>
		<reference ref_id="1214619" ref_url="https://bugzilla.suse.com/1214619" source="BUGZILLA"/>
		<reference ref_id="1214620" ref_url="https://bugzilla.suse.com/1214620" source="BUGZILLA"/>
		<reference ref_id="1214623" ref_url="https://bugzilla.suse.com/1214623" source="BUGZILLA"/>
		<reference ref_id="1214624" ref_url="https://bugzilla.suse.com/1214624" source="BUGZILLA"/>
		<reference ref_id="1214625" ref_url="https://bugzilla.suse.com/1214625" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-19726" ref_url="https://www.suse.com/security/cve/CVE-2020-19726/" source="CVE"/>
		<reference ref_id="CVE-2021-32256" ref_url="https://www.suse.com/security/cve/CVE-2021-32256/" source="CVE"/>
		<reference ref_id="CVE-2022-35205" ref_url="https://www.suse.com/security/cve/CVE-2022-35205/" source="CVE"/>
		<reference ref_id="CVE-2022-35206" ref_url="https://www.suse.com/security/cve/CVE-2022-35206/" source="CVE"/>
		<reference ref_id="CVE-2022-4285" ref_url="https://www.suse.com/security/cve/CVE-2022-4285/" source="CVE"/>
		<reference ref_id="CVE-2022-44840" ref_url="https://www.suse.com/security/cve/CVE-2022-44840/" source="CVE"/>
		<reference ref_id="CVE-2022-45703" ref_url="https://www.suse.com/security/cve/CVE-2022-45703/" source="CVE"/>
		<reference ref_id="CVE-2022-47673" ref_url="https://www.suse.com/security/cve/CVE-2022-47673/" source="CVE"/>
		<reference ref_id="CVE-2022-47695" ref_url="https://www.suse.com/security/cve/CVE-2022-47695/" source="CVE"/>
		<reference ref_id="CVE-2022-47696" ref_url="https://www.suse.com/security/cve/CVE-2022-47696/" source="CVE"/>
		<reference ref_id="CVE-2022-48063" ref_url="https://www.suse.com/security/cve/CVE-2022-48063/" source="CVE"/>
		<reference ref_id="CVE-2022-48064" ref_url="https://www.suse.com/security/cve/CVE-2022-48064/" source="CVE"/>
		<reference ref_id="CVE-2022-48065" ref_url="https://www.suse.com/security/cve/CVE-2022-48065/" source="CVE"/>
		<reference ref_id="CVE-2023-0687" ref_url="https://www.suse.com/security/cve/CVE-2023-0687/" source="CVE"/>
		<reference ref_id="CVE-2023-1579" ref_url="https://www.suse.com/security/cve/CVE-2023-1579/" source="CVE"/>
		<reference ref_id="CVE-2023-1972" ref_url="https://www.suse.com/security/cve/CVE-2023-1972/" source="CVE"/>
		<reference ref_id="CVE-2023-2222" ref_url="https://www.suse.com/security/cve/CVE-2023-2222/" source="CVE"/>
		<reference ref_id="CVE-2023-25585" ref_url="https://www.suse.com/security/cve/CVE-2023-25585/" source="CVE"/>
		<reference ref_id="CVE-2023-25587" ref_url="https://www.suse.com/security/cve/CVE-2023-25587/" source="CVE"/>
		<reference ref_id="CVE-2023-25588" ref_url="https://www.suse.com/security/cve/CVE-2023-25588/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031740.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

Update to version 2.41 [jsc#PED-5778]:

* The MIPS port now supports the Sony Interactive Entertainment Allegrex
  processor, used with the PlayStation Portable, which implements the MIPS
  II ISA along with a single-precision FPU and a few implementation-specific
  integer instructions.
* Objdump's --private option can now be used on PE format files to display the
  fields in the file header and section headers.
* New versioned release of libsframe: libsframe.so.1.  This release introduces
  versioned symbols with version node name LIBSFRAME_1.0.  This release also
  updates the ABI in an incompatible way: this includes removal of
  sframe_get_funcdesc_with_addr API, change in the behavior of
  sframe_fre_get_ra_offset and sframe_fre_get_fp_offset APIs.
* SFrame Version 2 is now the default (and only) format version supported by
  gas, ld, readelf and objdump.
* Add command-line option, --strip-section-headers, to objcopy and strip to
  remove ELF section header from ELF file.
* The RISC-V port now supports the following new standard extensions:

  - Zicond (conditional zero instructions)
  - Zfa (additional floating-point instructions)
  - Zvbb, Zvbc, Zvkg, Zvkned, Zvknh[ab], Zvksed, Zvksh, Zvkn, Zvknc, Zvkng,
    Zvks, Zvksc, Zvkg, Zvkt (vector crypto instructions)

* The RISC-V port now supports the following vendor-defined extensions:
  - XVentanaCondOps
* Add support for Intel FRED, LKGS and AMX-COMPLEX instructions.
* A new .insn directive is recognized by x86 gas.
* Add SME2 support to the AArch64 port.
* The linker now accepts a command line option of --remap-inputs
  &lt;PATTERN&gt;=&lt;FILE&gt; to relace any input file that matches &lt;PATTERN&gt; with
  &lt;FILE&gt;.  In addition the option --remap-inputs-file=&lt;FILE&gt; can be used to
  specify a file containing any number of these remapping directives.
* The linker command line option --print-map-locals can be used to include
  local symbols in a linker map.  (ELF targets only).
* For most ELF based targets, if the --enable-linker-version option is used
  then the version of the linker will be inserted as a string into the .comment
  section.
* The linker script syntax has a new command for output sections: ASCIZ 'string'
  This will insert a zero-terminated string at the current location.
* Add command-line option, -z nosectionheader, to omit ELF section
  header.

- Contains fixes for these non-CVEs (not security bugs per upstreams
  SECURITY.md):
  * bsc#1209642 aka CVE-2023-1579 aka PR29988
  * bsc#1210297 aka CVE-2023-1972 aka PR30285
  * bsc#1210733 aka CVE-2023-2222 aka PR29936
  * bsc#1213458 aka CVE-2021-32256 aka PR105039 (gcc)
  * bsc#1214565 aka CVE-2020-19726 aka PR26240
  * bsc#1214567 aka CVE-2022-35206 aka PR29290
  * bsc#1214579 aka CVE-2022-35205 aka PR29289
  * bsc#1214580 aka CVE-2022-44840 aka PR29732
  * bsc#1214604 aka CVE-2022-45703 aka PR29799
  * bsc#1214611 aka CVE-2022-48065 aka PR29925
  * bsc#1214619 aka CVE-2022-48064 aka PR29922
  * bsc#1214620 aka CVE-2022-48063 aka PR29924
  * bsc#1214623 aka CVE-2022-47696 aka PR29677
  * bsc#1214624 aka CVE-2022-47695 aka PR29846
  * bsc#1214625 aka CVE-2022-47673 aka PR29876

- This only existed only for a very short while in SLE-15, as the main
  variant in devel:gcc subsumed this in binutils-revert-rela.diff.
  Hence:

- Document fixed CVEs:

  * bsc#1208037 aka CVE-2023-25588 aka PR29677
  * bsc#1208038 aka CVE-2023-25587 aka PR29846
  * bsc#1208040 aka CVE-2023-25585 aka PR29892
  * bsc#1208409 aka CVE-2023-0687 aka PR29444

- Enable bpf-none cross target and add bpf-none to the multitarget
  set of supported targets.
- Disable packed-relative-relocs for old codestreams.  They generate
  buggy relocations when binutils-revert-rela.diff is active.
  [bsc#1206556]
- Disable ZSTD debug section compress by default.
- Enable zstd compression algorithm (instead of zlib)
  for debug info sections by default.
- Pack libgprofng only for supported platforms.
- Move libgprofng-related libraries to the proper locations (packages).
- Add --without=bootstrap for skipping of bootstrap (faster testing
  of the package).

- Remove broken arm32-avoid-copyreloc.patch to fix [gcc#108515]

Update to version 2.40:

* Objdump has a new command line option --show-all-symbols which will make it
  display all symbols that match a given address when disassembling.  (Normally
  only the first symbol that matches an address is shown).
* Add --enable-colored-disassembly configure time option to enable colored
  disassembly output by default, if the output device is a terminal.  Note,
  this configure option is disabled by default.
* DCO signed contributions are now accepted.
* objcopy --decompress-debug-sections now supports zstd compressed debug
  sections.  The new option --compress-debug-sections=zstd compresses debug
  sections with zstd.
* addr2line and objdump --dwarf now support zstd compressed debug sections.
* The dlltool program now accepts --deterministic-libraries and
  --non-deterministic-libraries as command line options to control whether or
  not it generates deterministic output libraries.  If neither of these options
  are used the default is whatever was set when the binutils were configured.
* readelf and objdump now have a newly added option --sframe which dumps the
  SFrame section.
* Add support for Intel RAO-INT instructions.
* Add support for Intel AVX-NE-CONVERT instructions.
* Add support for Intel MSRLIST instructions.
* Add support for Intel WRMSRNS instructions.
* Add support for Intel CMPccXADD instructions.
* Add support for Intel AVX-VNNI-INT8 instructions.
* Add support for Intel AVX-IFMA instructions.
* Add support for Intel PREFETCHI instructions.
* Add support for Intel AMX-FP16 instructions.
* gas now supports --compress-debug-sections=zstd to compress
  debug sections with zstd.
* Add --enable-default-compressed-debug-sections-algorithm={zlib,zstd}
  that selects the default compression algorithm
  for --enable-compressed-debug-sections.
* Add support for various T-Head extensions (XTheadBa, XTheadBb, XTheadBs,
  XTheadCmo, XTheadCondMov, XTheadFMemIdx, XTheadFmv, XTheadInt, XTheadMemIdx,
  XTheadMemPair, XTheadMac, and XTheadSync) from version 2.0 of the T-Head
  ISA manual, which are implemented in the Allwinner D1.
* Add support for the RISC-V Zawrs extension, version 1.0-rc4.
* Add support for Cortex-X1C for Arm.
* New command line option --gsframe to generate SFrame unwind information
  on x86_64 and aarch64 targets.
* The linker has a new command line option to suppress the generation of any
  warning or error messages.  This can be useful when there is a need to create
  a known non-working binary.  The option is -w or --no-warnings.
* ld now supports zstd compressed debug sections.  The new option
  --compress-debug-sections=zstd compresses debug sections with zstd.
* Add --enable-default-compressed-debug-sections-algorithm={zlib,zstd}
  that selects the default compression algorithm
  for --enable-compressed-debug-sections.
* Remove support for -z bndplt (MPX prefix instructions).

- Includes fixes for these CVEs:

  * bsc#1206080 aka CVE-2022-4285 aka PR29699

- Enable by default: --enable-colored-disassembly.
- fix build on x86_64_vX platforms 
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200962">SUSE bug 1200962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206080">SUSE bug 1206080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206556">SUSE bug 1206556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208037">SUSE bug 1208037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208038">SUSE bug 1208038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208040">SUSE bug 1208040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208409">SUSE bug 1208409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209642">SUSE bug 1209642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210297">SUSE bug 1210297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210733">SUSE bug 1210733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213458">SUSE bug 1213458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214565">SUSE bug 1214565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214567">SUSE bug 1214567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214579">SUSE bug 1214579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214580">SUSE bug 1214580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214604">SUSE bug 1214604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214611">SUSE bug 1214611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214619">SUSE bug 1214619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214620">SUSE bug 1214620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214623">SUSE bug 1214623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214624">SUSE bug 1214624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214625">SUSE bug 1214625</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-19726/">CVE-2020-19726 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-19726">CVE-2020-19726 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-32256/">CVE-2021-32256 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32256">CVE-2021-32256 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-35205/">CVE-2022-35205 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35205">CVE-2022-35205 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-35206/">CVE-2022-35206 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35206">CVE-2022-35206 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4285/">CVE-2022-4285 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4285">CVE-2022-4285 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-44840/">CVE-2022-44840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44840">CVE-2022-44840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45703/">CVE-2022-45703 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45703">CVE-2022-45703 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47673/">CVE-2022-47673 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47673">CVE-2022-47673 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47695/">CVE-2022-47695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47695">CVE-2022-47695 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47696/">CVE-2022-47696 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47696">CVE-2022-47696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-48063/">CVE-2022-48063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48063">CVE-2022-48063 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48064/">CVE-2022-48064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48064">CVE-2022-48064 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-48065/">CVE-2022-48065 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48065">CVE-2022-48065 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0687/">CVE-2023-0687 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0687">CVE-2023-0687 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1579/">CVE-2023-1579 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1579">CVE-2023-1579 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1972/">CVE-2023-1972 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1972">CVE-2023-1972 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2222/">CVE-2023-2222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-2222">CVE-2023-2222 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-25585/">CVE-2023-25585 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25585">CVE-2023-25585 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-25587/">CVE-2023-25587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-25587">CVE-2023-25587 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-25588/">CVE-2023-25588 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25588">CVE-2023-25588 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009791590" comment="binutils-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791591" comment="binutils-devel-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791592" comment="binutils-devel-32bit-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791593" comment="binutils-gold-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791594" comment="cross-aarch64-binutils-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791595" comment="cross-arm-binutils-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791596" comment="cross-avr-binutils-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791597" comment="cross-epiphany-binutils-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791598" comment="cross-hppa-binutils-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791599" comment="cross-hppa64-binutils-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791600" comment="cross-i386-binutils-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791601" comment="cross-ia64-binutils-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791602" comment="cross-m68k-binutils-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791603" comment="cross-mips-binutils-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791604" comment="cross-ppc-binutils-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791605" comment="cross-ppc64-binutils-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791606" comment="cross-ppc64le-binutils-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791607" comment="cross-riscv64-binutils-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791608" comment="cross-rx-binutils-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791609" comment="cross-s390-binutils-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791610" comment="cross-s390x-binutils-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791611" comment="cross-sparc-binutils-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791612" comment="cross-sparc64-binutils-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791613" comment="cross-spu-binutils-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791614" comment="cross-x86_64-binutils-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791623" comment="cross-xtensa-binutils-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791615" comment="libctf-nobfd0-2.41-150100.7.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791616" comment="libctf0-2.41-150100.7.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4391" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215189" ref_url="https://bugzilla.suse.com/1215189" source="BUGZILLA"/>
		<reference ref_id="1215191" ref_url="https://bugzilla.suse.com/1215191" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4874" ref_url="https://www.suse.com/security/cve/CVE-2023-4874/" source="CVE"/>
		<reference ref_id="CVE-2023-4875" ref_url="https://www.suse.com/security/cve/CVE-2023-4875/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3826-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031739.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2023-4874: Fixed NULL pointer dereference when composing an email (bsc#1215189).
- CVE-2023-4875: Fixed NULL pointer dereference when receiving an email (bsc#1215191).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215189">SUSE bug 1215189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215191">SUSE bug 1215191</bugzilla>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4874/">CVE-2023-4874 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4874">CVE-2023-4874 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4875/">CVE-2023-4875 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4875">CVE-2023-4875 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009791617" comment="mutt-1.10.1-150000.3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791618" comment="mutt-doc-1.10.1-150000.3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791619" comment="mutt-lang-1.10.1-150000.3.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4392" version="1" class="patch">
	<metadata>
		<title>Security update for python-brotlipy (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1175825" ref_url="https://bugzilla.suse.com/1175825" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8927" ref_url="https://www.suse.com/security/cve/CVE-2020-8927/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3827-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031738.html" source="SUSE-SU"/>
		<description>
This update for python-brotlipy fixes the following issues:

- CVE-2020-8927: Fixed integer overflow when input chunk is larger than 2GiB (bsc#1175825).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175825">SUSE bug 1175825</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8927/">CVE-2020-8927 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8927">CVE-2020-8927 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009791620" comment="python3-brotlipy-0.7.0-150300.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4393" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214692" ref_url="https://bugzilla.suse.com/1214692" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3828-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031737.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2023-40217: Fixed TLS handshake bypass on closed sockets (bsc#1214692).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214692">SUSE bug 1214692</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009794727" comment="libpython3_6m1_0-3.6.15-150300.10.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794728" comment="libpython3_6m1_0-32bit-3.6.15-150300.10.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794729" comment="python3-3.6.15-150300.10.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794730" comment="python3-base-3.6.15-150300.10.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794731" comment="python3-curses-3.6.15-150300.10.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794732" comment="python3-dbm-3.6.15-150300.10.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794733" comment="python3-devel-3.6.15-150300.10.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794734" comment="python3-doc-3.6.15-150300.10.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794735" comment="python3-doc-devhelp-3.6.15-150300.10.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794736" comment="python3-idle-3.6.15-150300.10.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794737" comment="python3-testsuite-3.6.15-150300.10.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794738" comment="python3-tk-3.6.15-150300.10.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794739" comment="python3-tools-3.6.15-150300.10.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4394" version="1" class="patch">
	<metadata>
		<title>Security update for xrdp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214805" ref_url="https://bugzilla.suse.com/1214805" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40184" ref_url="https://www.suse.com/security/cve/CVE-2023-40184/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3830-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031735.html" source="SUSE-SU"/>
		<description>
This update for xrdp fixes the following issues:

- CVE-2023-40184: Fixed restriction bypass via improper session handling (bsc#1214805).		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214805">SUSE bug 1214805</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40184/">CVE-2023-40184 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40184">CVE-2023-40184 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009796822" comment="libpainter0-0.9.13.1-150200.4.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796823" comment="librfxencode0-0.9.13.1-150200.4.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796824" comment="xrdp-0.9.13.1-150200.4.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796825" comment="xrdp-devel-0.9.13.1-150200.4.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4395" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215145" ref_url="https://bugzilla.suse.com/1215145" source="BUGZILLA"/>
		<reference ref_id="1215474" ref_url="https://bugzilla.suse.com/1215474" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-20588" ref_url="https://www.suse.com/security/cve/CVE-2023-20588/" source="CVE"/>
		<reference ref_id="CVE-2023-34322" ref_url="https://www.suse.com/security/cve/CVE-2023-34322/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3831-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031734.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2023-20588: Fixed AMD CPU transitional execution leak via division by zero (XSA-439) (bsc#1215474).
- CVE-2023-34322: Fixed top-level shadow reference dropped too early for 64-bit PV guests (XSA-438) (bsc#1215145).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215145">SUSE bug 1215145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215474">SUSE bug 1215474</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20588/">CVE-2023-20588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20588">CVE-2023-20588 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34322/">CVE-2023-34322 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34322">CVE-2023-34322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009796857" comment="xen-4.17.2_04-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796858" comment="xen-devel-4.17.2_04-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796859" comment="xen-doc-html-4.17.2_04-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796860" comment="xen-libs-4.17.2_04-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796861" comment="xen-libs-32bit-4.17.2_04-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796862" comment="xen-tools-4.17.2_04-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796863" comment="xen-tools-domU-4.17.2_04-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796864" comment="xen-tools-xendomains-wait-disk-4.17.2_04-150500.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4396" version="1" class="patch">
	<metadata>
		<title>Security update for exempi (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214486" ref_url="https://bugzilla.suse.com/1214486" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-18651" ref_url="https://www.suse.com/security/cve/CVE-2020-18651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031732.html" source="SUSE-SU"/>
		<description>
This update for exempi fixes the following issues:

- CVE-2020-18651: Fixed a buffer overflow in ID3 support (bsc#1214486).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214486">SUSE bug 1214486</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-18651/">CVE-2020-18651 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18651">CVE-2020-18651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009796834" comment="exempi-tools-2.4.5-150000.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796835" comment="libexempi-devel-2.4.5-150000.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796836" comment="libexempi3-2.4.5-150000.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796837" comment="libexempi3-32bit-2.4.5-150000.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4397" version="1" class="patch">
	<metadata>
		<title>Securitys update for open-vm-tools (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1205927" ref_url="https://bugzilla.suse.com/1205927" source="BUGZILLA"/>
		<reference ref_id="1214850" ref_url="https://bugzilla.suse.com/1214850" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-20900" ref_url="https://www.suse.com/security/cve/CVE-2023-20900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3835-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031730.html" source="SUSE-SU"/>
		<description>
This update for open-vm-tools fixes the following issues:

Update to 12.3.0 (build 22234872) (bsc#1214850)

- There are no new features in the open-vm-tools 12.3.0 release. This is
  primarily a maintenance release that addresses a few critical problems,
  including:

  - This release integrates CVE-2023-20900 without the need for a patch.
    For more information on this vulnerability and its impact on VMware
    products, see
    https://www.vmware.com/security/advisories/VMSA-2023-0019.html.
  - A tools.conf configuration setting is available to temporaily direct
    Linux quiesced snaphots to restore pre open-vm-tools 12.2.0 behavior
    of ignoring file systems already frozen.
  - Building of the VMware Guest Authentication Service (VGAuth) using
    'xml-security-c' and 'xerces-c' is being deprecated.
  - A number of Coverity reported issues have been addressed.
  - A number of GitHub issues and pull requests have been handled.
    Please see the Resolves Issues section of the Release Notes.
  - For issues resolved in this release, see the Resolved Issues section
    of the Release Notes.
- For complete details, see:
  https://github.com/vmware/open-vm-tools/releases/tag/stable-12.3.0
- Release Notes are available at
  https://github.com/vmware/open-vm-tools/blob/stable-12.3.0/ReleaseNotes.md
- The granular changes that have gone into the 12.3.0 release are in the
  ChangeLog at
  https://github.com/vmware/open-vm-tools/blob/stable-12.3.0/open-vm-tools/ChangeLog
- Fix (bsc#1205927) - hv_vmbus module is loaded unnecessarily in VMware guests
- jsc#PED-1344 - reinable building containerinfo plugin for SLES 15 SP4.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205927">SUSE bug 1205927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214850">SUSE bug 1214850</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-20900/">CVE-2023-20900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20900">CVE-2023-20900 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009797776" comment="libvmtools-devel-12.3.0-150300.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797777" comment="libvmtools0-12.3.0-150300.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797778" comment="open-vm-tools-12.3.0-150300.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797779" comment="open-vm-tools-containerinfo-12.3.0-150300.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797780" comment="open-vm-tools-desktop-12.3.0-150300.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797781" comment="open-vm-tools-salt-minion-12.3.0-150300.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797782" comment="open-vm-tools-sdmp-12.3.0-150300.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4398" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213284" ref_url="https://bugzilla.suse.com/1213284" source="BUGZILLA"/>
		<reference ref_id="1214735" ref_url="https://bugzilla.suse.com/1214735" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38802" ref_url="https://www.suse.com/security/cve/CVE-2023-38802/" source="CVE"/>
		<reference ref_id="CVE-2023-41358" ref_url="https://www.suse.com/security/cve/CVE-2023-41358/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3839-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031727.html" source="SUSE-SU"/>
		<description>
This update for quagga fixes the following issues:

  - CVE-2023-38802: Fixed bad length handling in BGP attribute handling (bsc#1213284).
  - CVE-2023-41358: Fixed possible crash when processing NLRIs if the attribute length is zero
 (bsc#1214735).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213284">SUSE bug 1213284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214735">SUSE bug 1214735</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38802/">CVE-2023-38802 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38802">CVE-2023-38802 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-41358/">CVE-2023-41358 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41358">CVE-2023-41358 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009797393" comment="libfpm_pb0-1.1.1-150400.12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797394" comment="libospf0-1.1.1-150400.12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797395" comment="libospfapiclient0-1.1.1-150400.12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797396" comment="libquagga_pb0-1.1.1-150400.12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797397" comment="libzebra1-1.1.1-150400.12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797398" comment="quagga-1.1.1-150400.12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797399" comment="quagga-devel-1.1.1-150400.12.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4399" version="1" class="patch">
	<metadata>
		<title>Security update for go1.20-openssl (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206346" ref_url="https://bugzilla.suse.com/1206346" source="BUGZILLA"/>
		<reference ref_id="1213880" ref_url="https://bugzilla.suse.com/1213880" source="BUGZILLA"/>
		<reference ref_id="1215084" ref_url="https://bugzilla.suse.com/1215084" source="BUGZILLA"/>
		<reference ref_id="1215085" ref_url="https://bugzilla.suse.com/1215085" source="BUGZILLA"/>
		<reference ref_id="1215090" ref_url="https://bugzilla.suse.com/1215090" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-29409" ref_url="https://www.suse.com/security/cve/CVE-2023-29409/" source="CVE"/>
		<reference ref_id="CVE-2023-39318" ref_url="https://www.suse.com/security/cve/CVE-2023-39318/" source="CVE"/>
		<reference ref_id="CVE-2023-39319" ref_url="https://www.suse.com/security/cve/CVE-2023-39319/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031726.html" source="SUSE-SU"/>
		<description>
This update for go1.20-openssl fixes the following issues:

Update to version 1.20.8 (bsc#1206346).

- CVE-2023-29409: Fixed unrestricted RSA keys in certificates (bsc#1213880).
- CVE-2023-39319: Fixed improper handling of special tags within script contexts in html/template (bsc#1215085).
- CVE-2023-39318: Fixed improper handling of HTML-like comments within script contexts (bsc#1215084).

The following non-security bug was fixed:

- Add missing directory pprof html asset directory to package (bsc#1215090).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206346">SUSE bug 1206346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213880">SUSE bug 1213880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215084">SUSE bug 1215084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215085">SUSE bug 1215085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215090">SUSE bug 1215090</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29409/">CVE-2023-29409 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29409">CVE-2023-29409 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39318/">CVE-2023-39318 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39318">CVE-2023-39318 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39319/">CVE-2023-39319 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39319">CVE-2023-39319 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009798668" comment="go1.20-openssl-1.20.8.1-150000.1.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798669" comment="go1.20-openssl-doc-1.20.8.1-150000.1.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798670" comment="go1.20-openssl-race-1.20.8.1-150000.1.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4400" version="1" class="patch">
	<metadata>
		<title>Security update for go1.19-openssl (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1200441" ref_url="https://bugzilla.suse.com/1200441" source="BUGZILLA"/>
		<reference ref_id="1213229" ref_url="https://bugzilla.suse.com/1213229" source="BUGZILLA"/>
		<reference ref_id="1213880" ref_url="https://bugzilla.suse.com/1213880" source="BUGZILLA"/>
		<reference ref_id="1215090" ref_url="https://bugzilla.suse.com/1215090" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-29406" ref_url="https://www.suse.com/security/cve/CVE-2023-29406/" source="CVE"/>
		<reference ref_id="CVE-2023-29409" ref_url="https://www.suse.com/security/cve/CVE-2023-29409/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016351.html" source="SUSE-SU"/>
		<description>
This update for go1.19-openssl fixes the following issues:

Update to version 1.19.13 (bsc#1200441).

- CVE-2023-29409: Fixed unrestricted RSA keys in certificates (bsc#1213880).
- CVE-2023-29406: Fixed insufficient sanitization of Host header (bsc#1213229).

The following non-security bug was fixed:

- Add missing directory pprof html asset directory to package (bsc#1215090). 
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-27"/>
	<updated date="2023-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200441">SUSE bug 1200441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213229">SUSE bug 1213229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213880">SUSE bug 1213880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215090">SUSE bug 1215090</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-29406/">CVE-2023-29406 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29406">CVE-2023-29406 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29409/">CVE-2023-29409 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29409">CVE-2023-29409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009798671" comment="go1.19-openssl-1.19.13.1-150000.1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798672" comment="go1.19-openssl-doc-1.19.13.1-150000.1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798673" comment="go1.19-openssl-race-1.19.13.1-150000.1.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4401" version="1" class="patch">
	<metadata>
		<title>Security update for gsl (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214681" ref_url="https://bugzilla.suse.com/1214681" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35357" ref_url="https://www.suse.com/security/cve/CVE-2020-35357/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3858-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031799.html" source="SUSE-SU"/>
		<description>
This update for gsl fixes the following issues:

- CVE-2020-35357: Fixed a stack out of bounds read in gsl_stats_quantile_from_sorted_data(). (bsc#1214681)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-28"/>
	<updated date="2023-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214681">SUSE bug 1214681</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35357/">CVE-2020-35357 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35357">CVE-2020-35357 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009796770" comment="gsl-2.6-150200.3.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796771" comment="gsl-devel-2.6-150200.3.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796772" comment="gsl-doc-2.6-150200.3.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796773" comment="gsl-examples-2.6-150200.3.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796774" comment="gsl-gnu-hpc-2.6-150200.3.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796775" comment="gsl-gnu-hpc-devel-2.6-150200.3.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796776" comment="gsl-gnu-hpc-doc-2.6-150200.3.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796777" comment="gsl_2_6-gnu-hpc-2.6-150200.3.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796778" comment="gsl_2_6-gnu-hpc-devel-2.6-150200.3.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796779" comment="gsl_2_6-gnu-hpc-doc-2.6-150200.3.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796780" comment="gsl_2_6-gnu-hpc-examples-2.6-150200.3.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796781" comment="gsl_2_6-gnu-hpc-module-2.6-150200.3.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796782" comment="libgsl-gnu-hpc-2.6-150200.3.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796783" comment="libgsl25-2.6-150200.3.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796784" comment="libgsl_2_6-gnu-hpc-2.6-150200.3.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796785" comment="libgslcblas-gnu-hpc-2.6-150200.3.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796786" comment="libgslcblas0-2.6-150200.3.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796787" comment="libgslcblas_2_6-gnu-hpc-2.6-150200.3.4.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4402" version="1" class="patch">
	<metadata>
		<title>Security update for pmix (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215190" ref_url="https://bugzilla.suse.com/1215190" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-41915" ref_url="https://www.suse.com/security/cve/CVE-2023-41915/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3859-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031798.html" source="SUSE-SU"/>
		<description>
This update for pmix fixes the following issues:

- CVE-2023-41915: Fixed a potential vulnerability where a `chown` may follow a
  user-created link (bsc#1215190).

- Install pmix-plugin-munge if munge is installed.		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-28"/>
	<updated date="2023-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215190">SUSE bug 1215190</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-41915/">CVE-2023-41915 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41915">CVE-2023-41915 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009794706" comment="libmca_common_dstore1-3.2.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794707" comment="libpmix2-3.2.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794708" comment="pmix-3.2.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794709" comment="pmix-devel-3.2.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794710" comment="pmix-headers-3.2.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794711" comment="pmix-mca-params-3.2.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794712" comment="pmix-plugin-munge-3.2.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794713" comment="pmix-plugins-3.2.3-150300.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794714" comment="pmix-test-3.2.3-150300.3.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4403" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1193948" ref_url="https://bugzilla.suse.com/1193948" source="BUGZILLA"/>
		<reference ref_id="1210994" ref_url="https://bugzilla.suse.com/1210994" source="BUGZILLA"/>
		<reference ref_id="1212794" ref_url="https://bugzilla.suse.com/1212794" source="BUGZILLA"/>
		<reference ref_id="1212844" ref_url="https://bugzilla.suse.com/1212844" source="BUGZILLA"/>
		<reference ref_id="1212855" ref_url="https://bugzilla.suse.com/1212855" source="BUGZILLA"/>
		<reference ref_id="1213257" ref_url="https://bugzilla.suse.com/1213257" source="BUGZILLA"/>
		<reference ref_id="1213441" ref_url="https://bugzilla.suse.com/1213441" source="BUGZILLA"/>
		<reference ref_id="1213630" ref_url="https://bugzilla.suse.com/1213630" source="BUGZILLA"/>
		<reference ref_id="1213960" ref_url="https://bugzilla.suse.com/1213960" source="BUGZILLA"/>
		<reference ref_id="1214796" ref_url="https://bugzilla.suse.com/1214796" source="BUGZILLA"/>
		<reference ref_id="1214797" ref_url="https://bugzilla.suse.com/1214797" source="BUGZILLA"/>
		<reference ref_id="1215489" ref_url="https://bugzilla.suse.com/1215489" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-20897" ref_url="https://www.suse.com/security/cve/CVE-2023-20897/" source="CVE"/>
		<reference ref_id="CVE-2023-20898" ref_url="https://www.suse.com/security/cve/CVE-2023-20898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3862-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031795.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

Security issues fixed:

- CVE-2023-20897: Fixed DOS in minion return. (bsc#1214796, bsc#1213441)
- CVE-2023-20898: Fixed Git Providers can read from the wrong environment because they get the same cache directory base
  name. (bsc#1214797, bsc#1193948)
  
Bugs fixed:

- Create minion_id with reproducible mtime
- Fix broken tests to make them running in the testsuite
- Fix detection of Salt codename by 'salt_version' execution module
- Fix inconsistency in reported version by egg-info metadata (bsc#1215489)
- Fix regression: multiple values for keyword argument 'saltenv' (bsc#1212844)
- Fix the regression of user.present state when group is unset (bsc#1212855)
- Fix utf8 handling in 'pass' renderer and make it more robust
- Fix zypper repositories always being reconfigured
- Make sure configured user is properly set by Salt (bsc#1210994)
- Prevent possible exceptions on salt.utils.user.get_group_dict (bsc#1212794)
- Revert usage of long running REQ channel to prevent possible missing responses on requests and duplicated responses
  (bsc#1213960, bsc#1213630, bsc#1213257)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-28"/>
	<updated date="2023-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193948">SUSE bug 1193948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210994">SUSE bug 1210994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212794">SUSE bug 1212794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212844">SUSE bug 1212844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212855">SUSE bug 1212855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213257">SUSE bug 1213257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213441">SUSE bug 1213441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213630">SUSE bug 1213630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213960">SUSE bug 1213960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214796">SUSE bug 1214796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214797">SUSE bug 1214797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215489">SUSE bug 1215489</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-20897/">CVE-2023-20897 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20897">CVE-2023-20897 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-20898/">CVE-2023-20898 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20898">CVE-2023-20898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009797421" comment="python3-salt-3006.0-150500.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797422" comment="salt-3006.0-150500.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797423" comment="salt-api-3006.0-150500.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797424" comment="salt-bash-completion-3006.0-150500.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797425" comment="salt-cloud-3006.0-150500.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797426" comment="salt-doc-3006.0-150500.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797427" comment="salt-fish-completion-3006.0-150500.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797428" comment="salt-master-3006.0-150500.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797429" comment="salt-minion-3006.0-150500.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797430" comment="salt-proxy-3006.0-150500.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797431" comment="salt-ssh-3006.0-150500.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797432" comment="salt-standalone-formulas-configuration-3006.0-150500.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797433" comment="salt-syndic-3006.0-150500.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797434" comment="salt-tests-3006.0-150500.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797435" comment="salt-transactional-update-3006.0-150500.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797436" comment="salt-zsh-completion-3006.0-150500.4.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4404" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1204501" ref_url="https://bugzilla.suse.com/1204501" source="BUGZILLA"/>
		<reference ref_id="1208046" ref_url="https://bugzilla.suse.com/1208046" source="BUGZILLA"/>
		<reference ref_id="1208270" ref_url="https://bugzilla.suse.com/1208270" source="BUGZILLA"/>
		<reference ref_id="1208298" ref_url="https://bugzilla.suse.com/1208298" source="BUGZILLA"/>
		<reference ref_id="1208692" ref_url="https://bugzilla.suse.com/1208692" source="BUGZILLA"/>
		<reference ref_id="1211525" ref_url="https://bugzilla.suse.com/1211525" source="BUGZILLA"/>
		<reference ref_id="1213880" ref_url="https://bugzilla.suse.com/1213880" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32149" ref_url="https://www.suse.com/security/cve/CVE-2022-32149/" source="CVE"/>
		<reference ref_id="CVE-2022-41723" ref_url="https://www.suse.com/security/cve/CVE-2022-41723/" source="CVE"/>
		<reference ref_id="CVE-2022-46146" ref_url="https://www.suse.com/security/cve/CVE-2022-46146/" source="CVE"/>
		<reference ref_id="CVE-2023-29409" ref_url="https://www.suse.com/security/cve/CVE-2023-29409/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3868-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031789.html" source="SUSE-SU"/>
		<description>
This update fixes the following issues:

golang-github-lusitaniae-apache_exporter:

- Security issues fixed:
  * CVE-2022-32149: Fix denial of service vulnerability (bsc#1204501)
  * CVE-2022-41723: Fix uncontrolled resource consumption (bsc#1208270)
  * CVE-2022-46146: Fix authentication bypass vulnarability (bsc#1208046)
- Changes and bugs fixed:
  * Updated to 1.0.0 (jsc#PED-5405)
    + Improved flag parsing
    + Added support for custom headers
  * Changes from 0.13.1
    + Fix panic caused by missing flagConfig options
  * Added AppArmor profile
  * Added sandboxing options to systemd service unit
  * Build using promu
  * Build with Go 1.19
  * Exclude s390 architecture

golang-github-prometheus-prometheus:

- This update introduces breaking changes. Please, read carefully the provided informations.
- Security issues fixed:
  * CVE-2022-41723: Fix uncontrolled resource consumption by updating Go to version 1.20.1 (bsc#1208298)
- Updated to 2.45.0 (jsc#PED-5406):
  * [FEATURE] API: New limit parameter to limit the number of items returned by `/api/v1/status/tsdb` endpoint
  * [FEATURE] Config: Add limits to global config
  * [FEATURE] Consul SD: Added support for `path_prefix`
  * [FEATURE] Native histograms: Add option to scrape both classic and native histograms.
  * [FEATURE] Native histograms: Added support for two more arithmetic operators `avg_over_time` and `sum_over_time`
  * [FEATURE] Promtool: When providing the block id, only one block will be loaded and analyzed
  * [FEATURE] Remote-write: New Azure ad configuration to support remote writing directly to Azure Monitor workspace
  * [FEATURE] TSDB: Samples per chunk are now configurable with flag `storage.tsdb.samples-per-chunk`. By default set
    to its former value 120
  * [ENHANCEMENT] Native histograms: bucket size can now be limited to avoid scrape fails
  * [ENHANCEMENT] TSDB: Dropped series are now deleted from the WAL sooner
  * [BUGFIX] Native histograms: ChunkSeries iterator now checks if a new sample can be appended to the open chunk
  * [BUGFIX] Native histograms: Fix Histogram Appender `Appendable()` segfault
  * [BUGFIX] Native histograms: Fix setting reset header to gauge histograms in seriesToChunkEncoder
  * [BUGFIX] TSDB: Tombstone intervals are not modified after Get() call
  * [BUGFIX] TSDB: Use path/filepath to set the WAL directory.
- Changes from 2.44.0:
  * [FEATURE] Remote-read: Handle native histograms
  * [FEATURE] Promtool: Health and readiness check of prometheus server in CLI
  * [FEATURE] PromQL: Add `query_samples_total` metric, the total number of samples loaded by all queries
  * [ENHANCEMENT] Storage: Optimise buffer used to iterate through samples
  * [ENHANCEMENT] Scrape: Reduce memory allocations on target labels
  * [ENHANCEMENT] PromQL: Use faster heap method for `topk()` / `bottomk()`
  * [ENHANCEMENT] Rules API: Allow filtering by rule name
  * [ENHANCEMENT] Native Histograms: Various fixes and improvements
  * [ENHANCEMENT] UI: Search of scraping pools is now case-insensitive
  * [ENHANCEMENT] TSDB: Add an affirmative log message for successful WAL repair
  * [BUGFIX] TSDB: Block compaction failed when shutting down
  * [BUGFIX] TSDB: Out-of-order chunks could be ignored if the write-behind log was deleted
- Changes from 2.43.1
  * [BUGFIX] Labels: Set() after Del() would be ignored, which broke some relabeling rules
- Changes from 2.43.0:
  * [FEATURE] Promtool: Add HTTP client configuration to query commands
  * [FEATURE] Scrape: Add `include_scrape_configs` to include scrape configs from different files
  * [FEATURE] HTTP client: Add `no_proxy` to exclude URLs from proxied requests
  * [FEATURE] HTTP client: Add `proxy_from_enviroment` to read proxies from env variables
  * [ENHANCEMENT] API: Add support for setting lookback delta per query via the API
  * [ENHANCEMENT] API: Change HTTP status code from 503/422 to 499 if a request is canceled
  * [ENHANCEMENT] Scrape: Allow exemplars for all metric types
  * [ENHANCEMENT] TSDB: Add metrics for head chunks and WAL folders size
  * [ENHANCEMENT] TSDB: Automatically remove incorrect snapshot with index that is ahead of WAL
  * [ENHANCEMENT] TSDB: Improve Prometheus parser error outputs to be more comprehensible
  * [ENHANCEMENT] UI: Scope `group by` labels to metric in autocompletion
  * [BUGFIX] Scrape: Fix `prometheus_target_scrape_pool_target_limit` metric not set before reloading
  * [BUGFIX] TSDB: Correctly update `prometheus_tsdb_head_chunks_removed_total` and `prometheus_tsdb_head_chunks`
    metrics when reading WAL
  * [BUGFIX] TSDB: Use the correct unit (seconds) when recording out-of-order append deltas in the
    `prometheus_tsdb_sample_ooo_delta` metric
- Changes from 2.42.0:
  This release comes with a new feature coverage for native histograms and breaking changes.
  If you are trying native histograms already, we recommend you remove the `wal` directory when upgrading. Because the
  old WAL record for native histograms is not backward compatible in v2.42.0, this will lead to some data loss for the
  latest data. Additionally, if you scrape 'float histograms' or use recording rules on native histograms in v2.42.0
  (which writes float histograms), it is a one-way street since older versions do not support float histograms.
  * [CHANGE] **breaking** TSDB: Changed WAL record format for the experimental native histograms
  * [FEATURE] Add 'keep_firing_for' field to alerting rules
  * [FEATURE] Promtool: Add support of selecting timeseries for TSDB dump
  * [ENHANCEMENT] Agent: Native histogram support.
  * [ENHANCEMENT] Rules: Support native histograms in recording rules
  * [ENHANCEMENT] SD: Add container ID as a meta label for pod targets for Kubernetes
  * [ENHANCEMENT] SD: Add VM size label to azure service discovery
  * [ENHANCEMENT] Support native histograms in federation
  * [ENHANCEMENT] TSDB: Add gauge histogram support
  * [ENHANCEMENT] TSDB/Scrape: Support FloatHistogram that represents buckets as float64 values
  * [ENHANCEMENT] UI: Show individual scrape pools on /targets page
- Changes from 2.41.0:
  * [FEATURE] Relabeling: Add keepequal and dropequal relabel actions
  * [FEATURE] Add support for HTTP proxy headers
  * [ENHANCEMENT] Reload private certificates when changed on disk
  * [ENHANCEMENT] Add max_version to specify maximum TLS version in tls_config
  * [ENHANCEMENT] Add goos and goarch labels to prometheus_build_info
  * [ENHANCEMENT] SD: Add proxy support for EC2 and LightSail SDs
  * [ENHANCEMENT] SD: Add new metric prometheus_sd_file_watcher_errors_total
  * [ENHANCEMENT] Remote Read: Use a pool to speed up marshalling
  * [ENHANCEMENT] TSDB: Improve handling of tombstoned chunks in iterators
  * [ENHANCEMENT] TSDB: Optimize postings offset table reading
  * [BUGFIX] Scrape: Validate the metric name, label names, and label values after relabeling
  * [BUGFIX] Remote Write receiver and rule manager: Fix error handling
- Changes from 2.40.7:
  * [BUGFIX] TSDB: Fix queries involving negative buckets of native histograms
- Changes from 2.40.5:
  * [BUGFIX] TSDB: Fix queries involving native histograms due to improper reset of iterators
- Changes from 2.40.3:
  * [BUGFIX] TSDB: Fix compaction after a deletion is called
- Changes from 2.40.2:
  * [BUGFIX] UI: Fix black-on-black metric name color in dark mode
- Changes from 2.40.1:
  * [BUGFIX] TSDB: Fix alignment for atomic int64 for 32 bit architecture
  * [BUGFIX] Scrape: Fix accept headers
- Changes from 2.40.0:
  * [FEATURE] Add experimental support for native histograms.
    Enable with the flag --enable-feature=native-histograms.
  * [FEATURE] SD: Add service discovery for OVHcloud
  * [ENHANCEMENT] Kubernetes SD: Use protobuf encoding
  * [ENHANCEMENT] TSDB: Use golang.org/x/exp/slices for improved sorting speed
  * [ENHANCEMENT] Consul SD: Add enterprise admin partitions. Adds __meta_consul_partition label. Adds partition
    config in consul_sd_config
  * [BUGFIX] API: Fix API error codes for /api/v1/labels and /api/v1/series
- Changes from 2.39.1:
  * [BUGFIX] Rules: Fix notifier relabel changing the labels on active alerts
- Changes from 2.39.0:
  * [FEATURE] experimental TSDB: Add support for ingesting out-of-order samples. This is configured via
    out_of_order_time_window field in the config file; check config file docs for more info
  * [ENHANCEMENT] API: /-/healthy and /-/ready API calls now also respond to a HEAD request on top of existing
    GET support.
  * [ENHANCEMENT] PuppetDB SD: Add __meta_puppetdb_query label.
  * [ENHANCEMENT] AWS EC2 SD: Add __meta_ec2_region label.
  * [ENHANCEMENT] AWS Lightsail SD: Add __meta_lightsail_region label.
  * [ENHANCEMENT] Scrape: Optimise relabeling by re-using memory.
  * [ENHANCEMENT] TSDB: Improve WAL replay timings.
  * [ENHANCEMENT] TSDB: Optimise memory by not storing unnecessary data in the memory.
  * [ENHANCEMENT] TSDB: Allow overlapping blocks by default.
    --storage.tsdb.allow-overlapping-blocks now has no effect.
  * [ENHANCEMENT] UI: Click to copy label-value pair from query result to clipboard.
  * [BUGFIX] TSDB: Turn off isolation for Head compaction to fix a memory leak.
  * [BUGFIX] TSDB: Fix 'invalid magic number 0' error on Prometheus startup.
  * [BUGFIX] PromQL: Properly close file descriptor when logging unfinished queries.
  * [BUGFIX] Agent: Fix validation of flag options and prevent WAL from growing more than desired.
- Changes from 2.38.0:
  * [FEATURE]: Web: Add a /api/v1/format_query HTTP API endpoint that allows pretty-formatting PromQL expressions.
  * [FEATURE]: UI: Add support for formatting PromQL expressions in the UI.
  * [FEATURE]: DNS SD: Support MX records for discovering targets.
  * [FEATURE]: Templates: Add toTime() template function that allows converting sample timestamps to
    Go time.Time values
  * [ENHANCEMENT]: Kubernetes SD: Add
    __meta_kubernetes_service_port_number meta label indicating the service port number.
    __meta_kubernetes_pod_container_image meta label indicating the container image.
  * [ENHANCEMENT]: PromQL: When a query panics, also log the query itself alongside the panic message.
  * [ENHANCEMENT]: UI: Tweak colors in the dark theme to improve the contrast ratio.
  * [ENHANCEMENT]: Web: Speed up calls to /api/v1/rules by avoiding locks and using atomic types instead.
  * [ENHANCEMENT]: Scrape: Add a no-default-scrape-port feature flag, which omits or removes any default HTTP (:80)
    or HTTPS (:443) ports in the target's scrape address.
  * [BUGFIX]: TSDB: In the WAL watcher metrics, expose the
    type='exemplar' label instead of type='unknown' for exemplar records.
  * [BUGFIX]: TSDB: Fix race condition around allocating series IDs during chunk snapshot loading.

golang-github-QubitProducts-exporter_exporter:

- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server
  while validating signatures for extremely large RSA keys. (bsc#1213880)
  There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.

grafana:

- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server
  while validating signatures for extremely large RSA keys. (bsc#1213880)
  There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.

prometheus-blackbox_exporter:

- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server
  while validating signatures for extremely large RSA keys. (bsc#1213880)
  There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.

prometheus-postgres_exporter:

- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server
  while validating signatures for extremely large RSA keys. (bsc#1213880)
  There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.

python-pyvmomi:

- Preparing submission to SUSE:SLE-15-SP3:Update as part of ECO PED-3623.

spacecmd:

- Updated to 4.3.23-1
  * Update translation strings

supportutils-plugin-susemanager-client:

- Updated to 4.3.3-1
  * Write configured crypto-policy in supportconfig
  * Add cloud and Pay-as-you-go checks

uyuni-common-libs:

- Updated to 4.3.9-1
  * Workaround for python3-debian bug about collecting control file (bsc#1211525, bsc#1208692)

		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-28"/>
	<updated date="2023-09-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204501">SUSE bug 1204501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208046">SUSE bug 1208046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208270">SUSE bug 1208270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208298">SUSE bug 1208298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208692">SUSE bug 1208692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211525">SUSE bug 1211525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213880">SUSE bug 1213880</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32149/">CVE-2022-32149 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32149">CVE-2022-32149 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41723/">CVE-2022-41723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46146/">CVE-2022-46146 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46146">CVE-2022-46146 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29409/">CVE-2023-29409 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29409">CVE-2023-29409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009796620" comment="golang-github-QubitProducts-exporter_exporter-0.4.0-150000.1.18.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796621" comment="golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796622" comment="prometheus-blackbox_exporter-0.24.0-150000.1.23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796623" comment="prometheus-postgres_exporter-0.10.1-150000.1.14.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796624" comment="spacecmd-4.3.23-150000.3.104.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796625" comment="supportutils-plugin-susemanager-client-4.3.3-150000.3.21.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4405" version="1" class="patch">
	<metadata>
		<title>Security update for grafana (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213880" ref_url="https://bugzilla.suse.com/1213880" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-29409" ref_url="https://www.suse.com/security/cve/CVE-2023-29409/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016388.html" source="SUSE-SU"/>
		<description>
This update for grafana fixes the following issues:

- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server
  while validating signatures for extremely large RSA keys. (bsc#1213880)
  There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-28"/>
	<updated date="2023-09-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213880">SUSE bug 1213880</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29409/">CVE-2023-29409 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29409">CVE-2023-29409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795914" comment="grafana-9.5.5-150200.3.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4406" version="1" class="patch">
	<metadata>
		<title>Security update for iperf (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215662" ref_url="https://bugzilla.suse.com/1215662" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38403" ref_url="https://www.suse.com/security/cve/CVE-2023-38403/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016420.html" source="SUSE-SU"/>
		<description>
This update for iperf fixes the following issues:

- update to 3.15 (bsc#1215662, ESNET-SECADV-2023-0002):
  * Several bugs that could allow the iperf3 server to hang waiting
    for input on the control connection has been fixed
    (ESnet Software Security Advisory ESNET-SECADV-2023-0002)
  * A bug that caused garbled output with UDP tests on 32-bit hosts
    has been fixed (PR #1554, PR #1556). This bug was introduced in
    iperf-3.14.
  * A bug in counting UDP messages has been fixed

- update to 3.14 (bsc#1213430, CVE-2023-38403):
  * fixes a memory allocation hazard that allowed a remote user to
    crash an iperf3 process
  * see https://downloads.es.net/pub/iperf/esnet-secadv-2023-0001.txt.asc

- update to 3.13:
  * Added missing bind_dev getter and setter.
  * a fix for A resource leak bug in function iperf_create_pidfile (#1443)
  * doc: Fix copy-and-paste error leading to wrong error message
  * Fix crash on rcv-timeout with JSON logfile

- update to 3.12:
  * cJSON has been updated to version 1.7.15 (#1383).
  * The --bind &lt;host&gt;%&lt;dev&gt; option syntax now works properly (#1360 /
  * A server-side file descriptor leak with the --logfile option has
    been fixed (#1369 / #1360 / #1369 / #1389 / #1393).
  * A bug that caused some large values from TCP_INFO to be misprinted
    as negative numbers has been fixed (#1372).
  * Using the -k or -n flags with --reverse no longer leak into future
    tests (#1363 / #1364).
  * There are now various debug level options available with the
    --debug option. These can be used to adjust the amount of
    debugging output (#1327).
  * A new --snd-timeout option has been added to set a termination
    timeout for idle TCP connections (#1215 / #1282).
  * iperf3 is slightly more robust to out-of-order packets during UDP
    connection setup in --reverse mode (#914 / #1123 / #1182 / #1212 /
  * iperf3 will now use different ports for each direction when the
    --cport and --bdir options are set (#1249 / #1259).
  * The iperf3 server will now exit if it can't open its log file
  * Various help message and output fixes have been made (#1299 /
  * Various compiler warnings have been fixed (#1211 / #1316).
  * Operation of bootstrap.sh has been fixed and simplified (#1335 /
  * Flow label support / compatibility under Linux has been improved
  * Various minor memory leaks have been fixed (#1332 / #1333).
  * A getter/setter has been added for the bind_port parameter
    (--cport option). (#1303, #1305)
  * Various internal documentation improvements (#1265 / #1285 / #1304).

- update to 3.11:
  * Update links to Discussions in documentation
  * Fix DSCP so that TOS = DSCP * 4 (#1162)
  * Fix --bind-dev for TCP streams (#1153)
  * Fix interface specification so doesn't overlap with IPv6 link-local addresses for -c and -B (#1157, #1180)
  * Add get/set test_unit_format function declaration to iperf_api.h
  * Auto adjustment of test-end condition for file transfers (-F), if no end condition is set, 
    it will automatically adjust it to file size in bytes
  * Exit if idle time expires waiting for a connection in one-off mode (#1187, #1197)
  * Support zerocopy by reverse mode (#1204)
  * Update help and manpage text for #1157, support bind device
  * Consistently print target_bandwidth in JSON start section (#1177)
  * Test bitrate added to JSON output (#1168)
  * Remove fsync call after every write to receiving --file (#1176, #1159)
  * Update documentation for -w (#1175)
  * Fix for #952, different JSON object names for bidir reverse channel

- update to 3.10.1:
  * Fixed a problem with autoconf scripts that made builds fail in
    some environments (#1154 / #1155).
  * GNU autoconf 2.71 or newer is now required to regenerate iperf3's
    configure scripts.

- update to 3.10:
  * Fix a bug where some --reverse tests didn't terminate (#982 /
    #1054).
  * Responsiveness of control connections is slightly improved (#1045
    / #1046 / #1063).
  * The allowable clock skew when doing authentication between client
    and server is now configurable with the new --time-skew-threshold
    (#1065 / #1070).
  * Bitrate throttling using the -b option now works when a burst size
    is specified (#1090).
  * A bug with calculating CPU utilization has been fixed (#1076 /
    #1077).
  * A --bind-dev option to support binding sockets to a given network
    interface has been added to make iperf3 work better with
    multi-homed machines and/or VRFs (#817 / #1089 / #1097).
  * --pidfile now works with --client mode (#1110).
  * The server is now less likely to get stuck due to network errors
    (#1101, #1125), controlled by the new --rcv-timeout option.
  * Fixed a few bugs in termination conditions for byte or
    block-limited tests (#1113, #1114, #1115).
  * Added tcp_info.snd_wnd to JSON output (#1148).
  * Some bugs with garbled JSON output have been fixed (#1086, #1118,
    #1143 / #1146).
  * Support for setting the IPv4 don't-fragment (DF) bit has been
    added with the new --dont-fragment option (#1119).
  * A failure with not being able to read the congestion control
    algorithm under WSL1 has been fixed (#1061 / #1126).
  * Error handling and error messages now make more sense in cases
    where sockets were not successfully opened (#1129 / #1132 /
    #1136, #1135 / #1138, #1128 / #1139).
  * Some buffer overflow hazards were fixed (#1134).
  * It is now possible to use the API to set/get the congestion
    control algorithm (#1036 / #1112).

- update to 3.9:
  * A --timestamps flag has been added, which prepends a timestamp to
    each output line.  An optional argument to this flag, which is a
    format specification to strftime(3), allows for custom timestamp
    formats (#909, #1028).
  * A --server-bitrate-limit flag has been added as a server-side
    command-line argument.  It allows a server to enforce a maximum
    throughput rate; client connections that specify a higher bitrate
    or exceed this bitrate during a test will be terminated.  The
    bitrate is expressed in bits per second, with an optional trailing
    slash and integer count that specifies an averaging interval over
    which to enforce the limit (#999).
  * A bug that caused increased CPU usage with the --bidir option has
    been fixed (#1011).
  * Fixed various minor memory leaks (#1023).

- update to 3.8.1
  * Minor bugfixes and enhancements

- update to 3.7
  * Support for simultaneous bidirectional tests with the --bidir flag
  * Use POSIX standard clock_gettime(3) interface for timekeeping where
    available
  * Passwords for authentication can be provided via environment
    variable
  * Specifying --repeating-payload and --reverse now works
  * Failed authentication doesn't count for --one-off
  * Several memory leaks related to authenticated use were fixed
  * The delay for tearing down the control connection for the default
    timed tests has been increased, to more gracefully handle
    high-delay paths
  * Various improvements to the libiperf APIs
  * Fixed build behavior when OpenSSL is absent
  * Portability fixes

- update to 3.6
  * A new --extra-data option can be used to fill in a user-defined
    string field that appears in JSON output.
  * A new --repeating-payload option makes iperf3 use a payload pattern
    similar to that used by iperf2, which could help in recreating
    results that might be affected by payload entropy (for example,
    compression).
  * -B now works properly with SCTP tests.
  * A compile fix for Solaris 10 was added.
  * Some minor bug fixes for JSON output.  In particular, warnings for
    debug and/or verbose modes with --json output and a fix for
    JSON output on CentOS 6
  * This maintenance release adds a -1 flag to make the iperf3
    execute a single test and exit, needed for an upcoming bwctl
    there is only one stream.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-28"/>
	<updated date="2023-09-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215662">SUSE bug 1215662</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38403/">CVE-2023-38403 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38403">CVE-2023-38403 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009798892" comment="iperf-3.15-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798893" comment="iperf-devel-3.15-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798894" comment="libiperf0-3.15-150000.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4407" version="1" class="patch">
	<metadata>
		<title>Security update for Golang Prometheus (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213880" ref_url="https://bugzilla.suse.com/1213880" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-29409" ref_url="https://www.suse.com/security/cve/CVE-2023-29409/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016419.html" source="SUSE-SU"/>
		<description>
This update for Golang Prometheus fixes the following issues:

golang-github-prometheus-alertmanager:

- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server
  while validating signatures for extremely large RSA keys. (bsc#1213880)
  There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.

golang-github-prometheus-node_exporter:

- CVE-2023-29409: Restrict RSA keys in certificates to less than or equal to 8192 bits to avoid DoSing client/server
  while validating signatures for extremely large RSA keys. (bsc#1213880)
  There are no direct source changes. The CVE is fixed rebuilding the sources with the patched Go version.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-28"/>
	<updated date="2023-09-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213880">SUSE bug 1213880</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29409/">CVE-2023-29409 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29409">CVE-2023-29409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009796788" comment="golang-github-prometheus-alertmanager-0.23.0-150100.4.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796789" comment="golang-github-prometheus-node_exporter-1.5.0-150100.3.26.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4408" version="1" class="patch">
	<metadata>
		<title>Security update for libqb (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214066" ref_url="https://bugzilla.suse.com/1214066" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39976" ref_url="https://www.suse.com/security/cve/CVE-2023-39976/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016462.html" source="SUSE-SU"/>
		<description>
This update for libqb fixes the following issues:

- CVE-2023-39976: Fixed potential buffer overflow with long log messages (bsc#1214066).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-29"/>
	<updated date="2023-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214066">SUSE bug 1214066</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39976/">CVE-2023-39976 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39976">CVE-2023-39976 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009794749" comment="doxygen2man-2.0.6+20220323.758044b-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794750" comment="libqb-devel-2.0.6+20220323.758044b-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794751" comment="libqb-devel-32bit-2.0.6+20220323.758044b-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794752" comment="libqb-tests-2.0.6+20220323.758044b-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794753" comment="libqb-tools-2.0.6+20220323.758044b-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794754" comment="libqb100-2.0.6+20220323.758044b-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009794755" comment="libqb100-32bit-2.0.6+20220323.758044b-150500.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4409" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215309" ref_url="https://bugzilla.suse.com/1215309" source="BUGZILLA"/>
		<reference ref_id="1215575" ref_url="https://bugzilla.suse.com/1215575" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5168" ref_url="https://www.suse.com/security/cve/CVE-2023-5168/" source="CVE"/>
		<reference ref_id="CVE-2023-5169" ref_url="https://www.suse.com/security/cve/CVE-2023-5169/" source="CVE"/>
		<reference ref_id="CVE-2023-5171" ref_url="https://www.suse.com/security/cve/CVE-2023-5171/" source="CVE"/>
		<reference ref_id="CVE-2023-5174" ref_url="https://www.suse.com/security/cve/CVE-2023-5174/" source="CVE"/>
		<reference ref_id="CVE-2023-5176" ref_url="https://www.suse.com/security/cve/CVE-2023-5176/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016461.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 115.3.0 ESR (MFSA 2023-42, bsc#1215575):

Security fixes:

- CVE-2023-5168: Out-of-bounds write in FilterNodeD2D1 (bmo#1846683).
- CVE-2023-5169: Out-of-bounds write in PathOps (bmo#1846685).
- CVE-2023-5171: Use-after-free in Ion Compiler (bmo#1851599).
- CVE-2023-5174: Double-free in process spawning on Windows (bmo#1848454).
- CVE-2023-5176: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 (bmo#1836353, bmo#1842674, bmo#1843824, bmo#1843962, bmo#1848890, bmo#1850180, bmo#1850983, bmo#1851195).

Other fixes:

  - Fix broken build with newer binutils (bsc#1215309)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-09-29"/>
	<updated date="2023-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215309">SUSE bug 1215309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215575">SUSE bug 1215575</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5168/">CVE-2023-5168 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5168">CVE-2023-5168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5169/">CVE-2023-5169 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5169">CVE-2023-5169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5171/">CVE-2023-5171 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5171">CVE-2023-5171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5174/">CVE-2023-5174 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5174">CVE-2023-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5176/">CVE-2023-5176 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5176">CVE-2023-5176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009797855" comment="MozillaFirefox-115.3.0-150200.152.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797856" comment="MozillaFirefox-branding-upstream-115.3.0-150200.152.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797857" comment="MozillaFirefox-devel-115.3.0-150200.152.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797858" comment="MozillaFirefox-translations-common-115.3.0-150200.152.108.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009797859" comment="MozillaFirefox-translations-other-115.3.0-150200.152.108.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4410" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214692" ref_url="https://bugzilla.suse.com/1214692" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016476.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2023-40217: Fixed TLS handshake bypass on closed sockets (bsc#1214692).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-02"/>
	<updated date="2023-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214692">SUSE bug 1214692</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009795050" comment="libpython2_7-1_0-2.7.18-150000.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795051" comment="libpython2_7-1_0-32bit-2.7.18-150000.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795052" comment="python-2.7.18-150000.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795053" comment="python-32bit-2.7.18-150000.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795054" comment="python-base-2.7.18-150000.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795055" comment="python-base-32bit-2.7.18-150000.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795056" comment="python-curses-2.7.18-150000.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795057" comment="python-demo-2.7.18-150000.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795058" comment="python-devel-2.7.18-150000.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795059" comment="python-doc-2.7.18-150000.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795060" comment="python-doc-pdf-2.7.18-150000.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795061" comment="python-gdbm-2.7.18-150000.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795062" comment="python-idle-2.7.18-150000.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795063" comment="python-tk-2.7.18-150000.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009795064" comment="python-xml-2.7.18-150000.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4411" version="1" class="patch">
	<metadata>
		<title>Security update for python311 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214692" ref_url="https://bugzilla.suse.com/1214692" source="BUGZILLA"/>
		<reference ref_id="1214693" ref_url="https://bugzilla.suse.com/1214693" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<reference ref_id="CVE-2023-41105" ref_url="https://www.suse.com/security/cve/CVE-2023-41105/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3943-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031897.html" source="SUSE-SU"/>
		<description>
This update for python311 fixes the following issues:

Update to 3.11.5.

- CVE-2023-40217: Fixed TLS handshake bypass on closed sockets (bsc#1214692).
- CVE-2023-41105: Fixed input truncation on null bytes in os.path.normpath (bsc#1214693).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-03"/>
	<updated date="2023-10-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214692">SUSE bug 1214692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214693">SUSE bug 1214693</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-41105/">CVE-2023-41105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41105">CVE-2023-41105 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009796626" comment="libpython3_11-1_0-3.11.5-150400.9.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796627" comment="libpython3_11-1_0-32bit-3.11.5-150400.9.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796628" comment="python311-3.11.5-150400.9.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796629" comment="python311-32bit-3.11.5-150400.9.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796630" comment="python311-base-3.11.5-150400.9.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796631" comment="python311-base-32bit-3.11.5-150400.9.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796632" comment="python311-curses-3.11.5-150400.9.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796633" comment="python311-dbm-3.11.5-150400.9.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796634" comment="python311-devel-3.11.5-150400.9.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796635" comment="python311-doc-3.11.5-150400.9.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796636" comment="python311-doc-devhelp-3.11.5-150400.9.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796637" comment="python311-idle-3.11.5-150400.9.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796638" comment="python311-testsuite-3.11.5-150400.9.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796639" comment="python311-tk-3.11.5-150400.9.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796640" comment="python311-tools-3.11.5-150400.9.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4412" version="1" class="patch">
	<metadata>
		<title>Security update for libvpx (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215778" ref_url="https://bugzilla.suse.com/1215778" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031894.html" source="SUSE-SU"/>
		<description>
This update for libvpx fixes the following issues:

- CVE-2023-5217: Fixed a heap buffer overflow (bsc#1215778).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-03"/>
	<updated date="2023-10-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215778">SUSE bug 1215778</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799301" comment="libvpx-devel-1.11.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799302" comment="libvpx7-1.11.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799303" comment="libvpx7-32bit-1.11.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799304" comment="vpx-tools-1.11.0-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4413" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215814" ref_url="https://bugzilla.suse.com/1215814" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016491.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:


Mozilla Firefox was updated to 115.3.1 ESR, fixing a security issue:

MFSA 2023-44 (bsc#1215814)

* CVE-2023-5217: Fixed a heap buffer overflow in libvpx

		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-03"/>
	<updated date="2023-10-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215814">SUSE bug 1215814</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799621" comment="MozillaFirefox-115.3.1-150200.152.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799622" comment="MozillaFirefox-branding-upstream-115.3.1-150200.152.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799623" comment="MozillaFirefox-devel-115.3.1-150200.152.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799624" comment="MozillaFirefox-translations-common-115.3.1-150200.152.111.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799625" comment="MozillaFirefox-translations-other-115.3.1-150200.152.111.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4414" version="1" class="patch">
	<metadata>
		<title>Security update for runc (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:3952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016489.html" source="SUSE-SU"/>
		<description>

This update of runc fixes the following issues:

- Update to runc v1.1.8.

  Upstream changelog is available from
  &lt;https://github.com/opencontainers/runc/releases/tag/v1.1.8&gt;.

- rebuild the package with the go 1.21 security release (bsc#1212475).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-03"/>
	<updated date="2023-10-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009781383" comment="runc-1.1.8-150000.49.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4415" version="1" class="patch">
	<metadata>
		<title>Security update for libeconf (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211078" ref_url="https://bugzilla.suse.com/1211078" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-22652" ref_url="https://www.suse.com/security/cve/CVE-2023-22652/" source="CVE"/>
		<reference ref_id="CVE-2023-30078" ref_url="https://www.suse.com/security/cve/CVE-2023-30078/" source="CVE"/>
		<reference ref_id="CVE-2023-30079" ref_url="https://www.suse.com/security/cve/CVE-2023-30079/" source="CVE"/>
		<reference ref_id="CVE-2023-32181" ref_url="https://www.suse.com/security/cve/CVE-2023-32181/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016487.html" source="SUSE-SU"/>
		<description>
This update for libeconf fixes the following issues:

Update to version 0.5.2.

- CVE-2023-30078, CVE-2023-32181: Fixed a stack-buffer-overflow vulnerability in 'econf_writeFile' function (bsc#1211078).
- CVE-2023-30079, CVE-2023-22652: Fixed a stack-buffer-overflow vulnerability in 'read_file' function. (bsc#1211078)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-03"/>
	<updated date="2023-10-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211078">SUSE bug 1211078</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22652/">CVE-2023-22652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22652">CVE-2023-22652 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-30078/">CVE-2023-30078 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30078">CVE-2023-30078 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-30079/">CVE-2023-30079 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30079">CVE-2023-30079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32181/">CVE-2023-32181 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32181">CVE-2023-32181 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009782286" comment="libeconf-devel-0.5.2-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782287" comment="libeconf-utils-0.5.2-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782288" comment="libeconf0-0.5.2-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782289" comment="libeconf0-32bit-0.5.2-150400.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4416" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-puma (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214425" ref_url="https://bugzilla.suse.com/1214425" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40175" ref_url="https://www.suse.com/security/cve/CVE-2023-40175/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3957-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031908.html" source="SUSE-SU"/>
		<description>
This update for rubygem-puma fixes the following issues:

- CVE-2023-40175: Fixed HTTP request smuggling when parsing chunked transfer encoding bodies and zero-length content-length headers (bsc#1214425).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2023-10-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214425">SUSE bug 1214425</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-40175/">CVE-2023-40175 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40175">CVE-2023-40175 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009798666" comment="ruby2.5-rubygem-puma-4.3.12-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798667" comment="ruby2.5-rubygem-puma-doc-4.3.12-150000.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4417" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215683" ref_url="https://bugzilla.suse.com/1215683" source="BUGZILLA"/>
		<reference ref_id="1215684" ref_url="https://bugzilla.suse.com/1215684" source="BUGZILLA"/>
		<reference ref_id="1215685" ref_url="https://bugzilla.suse.com/1215685" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-43785" ref_url="https://www.suse.com/security/cve/CVE-2023-43785/" source="CVE"/>
		<reference ref_id="CVE-2023-43786" ref_url="https://www.suse.com/security/cve/CVE-2023-43786/" source="CVE"/>
		<reference ref_id="CVE-2023-43787" ref_url="https://www.suse.com/security/cve/CVE-2023-43787/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3963-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031904.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- CVE-2023-43786: Fixed stack exhaustion from infinite recursion in PutSubImage() (bsc#1215684).
- CVE-2023-43787: Fixed integer overflow in XCreateImage() leading to a heap overflow (bsc#1215685).
- CVE-2023-43785: Fixed out-of-bounds memory access in _XkbReadKeySyms() (bsc#1215683).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2023-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215683">SUSE bug 1215683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215684">SUSE bug 1215684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215685">SUSE bug 1215685</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-43785/">CVE-2023-43785 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43785">CVE-2023-43785 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43786/">CVE-2023-43786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43786">CVE-2023-43786 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-43787/">CVE-2023-43787 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43787">CVE-2023-43787 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799822" comment="libX11-6-1.6.5-150000.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799823" comment="libX11-6-32bit-1.6.5-150000.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799824" comment="libX11-data-1.6.5-150000.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799825" comment="libX11-devel-1.6.5-150000.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799826" comment="libX11-devel-32bit-1.6.5-150000.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799827" comment="libX11-xcb1-1.6.5-150000.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799828" comment="libX11-xcb1-32bit-1.6.5-150000.3.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4418" version="1" class="patch">
	<metadata>
		<title>Security update for libXpm (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215686" ref_url="https://bugzilla.suse.com/1215686" source="BUGZILLA"/>
		<reference ref_id="1215687" ref_url="https://bugzilla.suse.com/1215687" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-43788" ref_url="https://www.suse.com/security/cve/CVE-2023-43788/" source="CVE"/>
		<reference ref_id="CVE-2023-43789" ref_url="https://www.suse.com/security/cve/CVE-2023-43789/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3965-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031903.html" source="SUSE-SU"/>
		<description>
This update for libXpm fixes the following issues:

- CVE-2023-43788: Fixed an out of bounds read when creating an image
  (bsc#1215686).
- CVE-2023-43789: Fixed an out of bounds read when parsing an XPM file
  with a corrupted colormap (bsc#1215687).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2023-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215686">SUSE bug 1215686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215687">SUSE bug 1215687</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43788/">CVE-2023-43788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43788">CVE-2023-43788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43789/">CVE-2023-43789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43789">CVE-2023-43789 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799829" comment="libXpm-devel-3.5.12-150000.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799830" comment="libXpm-devel-32bit-3.5.12-150000.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799831" comment="libXpm-tools-3.5.12-150000.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799832" comment="libXpm4-3.5.12-150000.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799833" comment="libXpm4-32bit-3.5.12-150000.3.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4419" version="1" class="patch">
	<metadata>
		<title>Security update for libraw (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215308" ref_url="https://bugzilla.suse.com/1215308" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-22628" ref_url="https://www.suse.com/security/cve/CVE-2020-22628/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016507.html" source="SUSE-SU"/>
		<description>
This update for libraw fixes the following issues:

 - CVE-2020-22628: Fixed buffer overflow vulnerability in LibRaw::stretch() function in libraw\src\postprocessing\aspect_ratio.cpp. (bsc#1215308)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2023-10-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215308">SUSE bug 1215308</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22628/">CVE-2020-22628 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-22628">CVE-2020-22628 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009796641" comment="libraw-devel-0.20.2-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796642" comment="libraw-devel-static-0.20.2-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796643" comment="libraw-tools-0.20.2-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796644" comment="libraw20-0.20.2-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796645" comment="libraw20-32bit-0.20.2-150400.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4420" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1023051" ref_url="https://bugzilla.suse.com/1023051" source="BUGZILLA"/>
		<reference ref_id="1120059" ref_url="https://bugzilla.suse.com/1120059" source="BUGZILLA"/>
		<reference ref_id="1177719" ref_url="https://bugzilla.suse.com/1177719" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1203329" ref_url="https://bugzilla.suse.com/1203329" source="BUGZILLA"/>
		<reference ref_id="1203330" ref_url="https://bugzilla.suse.com/1203330" source="BUGZILLA"/>
		<reference ref_id="1205462" ref_url="https://bugzilla.suse.com/1205462" source="BUGZILLA"/>
		<reference ref_id="1206453" ref_url="https://bugzilla.suse.com/1206453" source="BUGZILLA"/>
		<reference ref_id="1208902" ref_url="https://bugzilla.suse.com/1208902" source="BUGZILLA"/>
		<reference ref_id="1208949" ref_url="https://bugzilla.suse.com/1208949" source="BUGZILLA"/>
		<reference ref_id="1209284" ref_url="https://bugzilla.suse.com/1209284" source="BUGZILLA"/>
		<reference ref_id="1209799" ref_url="https://bugzilla.suse.com/1209799" source="BUGZILLA"/>
		<reference ref_id="1210048" ref_url="https://bugzilla.suse.com/1210048" source="BUGZILLA"/>
		<reference ref_id="1210448" ref_url="https://bugzilla.suse.com/1210448" source="BUGZILLA"/>
		<reference ref_id="1211220" ref_url="https://bugzilla.suse.com/1211220" source="BUGZILLA"/>
		<reference ref_id="1212091" ref_url="https://bugzilla.suse.com/1212091" source="BUGZILLA"/>
		<reference ref_id="1212142" ref_url="https://bugzilla.suse.com/1212142" source="BUGZILLA"/>
		<reference ref_id="1212423" ref_url="https://bugzilla.suse.com/1212423" source="BUGZILLA"/>
		<reference ref_id="1212526" ref_url="https://bugzilla.suse.com/1212526" source="BUGZILLA"/>
		<reference ref_id="1212857" ref_url="https://bugzilla.suse.com/1212857" source="BUGZILLA"/>
		<reference ref_id="1212873" ref_url="https://bugzilla.suse.com/1212873" source="BUGZILLA"/>
		<reference ref_id="1213026" ref_url="https://bugzilla.suse.com/1213026" source="BUGZILLA"/>
		<reference ref_id="1213123" ref_url="https://bugzilla.suse.com/1213123" source="BUGZILLA"/>
		<reference ref_id="1213546" ref_url="https://bugzilla.suse.com/1213546" source="BUGZILLA"/>
		<reference ref_id="1213580" ref_url="https://bugzilla.suse.com/1213580" source="BUGZILLA"/>
		<reference ref_id="1213601" ref_url="https://bugzilla.suse.com/1213601" source="BUGZILLA"/>
		<reference ref_id="1213666" ref_url="https://bugzilla.suse.com/1213666" source="BUGZILLA"/>
		<reference ref_id="1213733" ref_url="https://bugzilla.suse.com/1213733" source="BUGZILLA"/>
		<reference ref_id="1213757" ref_url="https://bugzilla.suse.com/1213757" source="BUGZILLA"/>
		<reference ref_id="1213759" ref_url="https://bugzilla.suse.com/1213759" source="BUGZILLA"/>
		<reference ref_id="1213916" ref_url="https://bugzilla.suse.com/1213916" source="BUGZILLA"/>
		<reference ref_id="1213921" ref_url="https://bugzilla.suse.com/1213921" source="BUGZILLA"/>
		<reference ref_id="1213927" ref_url="https://bugzilla.suse.com/1213927" source="BUGZILLA"/>
		<reference ref_id="1213946" ref_url="https://bugzilla.suse.com/1213946" source="BUGZILLA"/>
		<reference ref_id="1213949" ref_url="https://bugzilla.suse.com/1213949" source="BUGZILLA"/>
		<reference ref_id="1213968" ref_url="https://bugzilla.suse.com/1213968" source="BUGZILLA"/>
		<reference ref_id="1213970" ref_url="https://bugzilla.suse.com/1213970" source="BUGZILLA"/>
		<reference ref_id="1213971" ref_url="https://bugzilla.suse.com/1213971" source="BUGZILLA"/>
		<reference ref_id="1214000" ref_url="https://bugzilla.suse.com/1214000" source="BUGZILLA"/>
		<reference ref_id="1214019" ref_url="https://bugzilla.suse.com/1214019" source="BUGZILLA"/>
		<reference ref_id="1214073" ref_url="https://bugzilla.suse.com/1214073" source="BUGZILLA"/>
		<reference ref_id="1214120" ref_url="https://bugzilla.suse.com/1214120" source="BUGZILLA"/>
		<reference ref_id="1214149" ref_url="https://bugzilla.suse.com/1214149" source="BUGZILLA"/>
		<reference ref_id="1214180" ref_url="https://bugzilla.suse.com/1214180" source="BUGZILLA"/>
		<reference ref_id="1214233" ref_url="https://bugzilla.suse.com/1214233" source="BUGZILLA"/>
		<reference ref_id="1214238" ref_url="https://bugzilla.suse.com/1214238" source="BUGZILLA"/>
		<reference ref_id="1214285" ref_url="https://bugzilla.suse.com/1214285" source="BUGZILLA"/>
		<reference ref_id="1214297" ref_url="https://bugzilla.suse.com/1214297" source="BUGZILLA"/>
		<reference ref_id="1214299" ref_url="https://bugzilla.suse.com/1214299" source="BUGZILLA"/>
		<reference ref_id="1214305" ref_url="https://bugzilla.suse.com/1214305" source="BUGZILLA"/>
		<reference ref_id="1214350" ref_url="https://bugzilla.suse.com/1214350" source="BUGZILLA"/>
		<reference ref_id="1214368" ref_url="https://bugzilla.suse.com/1214368" source="BUGZILLA"/>
		<reference ref_id="1214370" ref_url="https://bugzilla.suse.com/1214370" source="BUGZILLA"/>
		<reference ref_id="1214371" ref_url="https://bugzilla.suse.com/1214371" source="BUGZILLA"/>
		<reference ref_id="1214372" ref_url="https://bugzilla.suse.com/1214372" source="BUGZILLA"/>
		<reference ref_id="1214380" ref_url="https://bugzilla.suse.com/1214380" source="BUGZILLA"/>
		<reference ref_id="1214386" ref_url="https://bugzilla.suse.com/1214386" source="BUGZILLA"/>
		<reference ref_id="1214392" ref_url="https://bugzilla.suse.com/1214392" source="BUGZILLA"/>
		<reference ref_id="1214393" ref_url="https://bugzilla.suse.com/1214393" source="BUGZILLA"/>
		<reference ref_id="1214397" ref_url="https://bugzilla.suse.com/1214397" source="BUGZILLA"/>
		<reference ref_id="1214404" ref_url="https://bugzilla.suse.com/1214404" source="BUGZILLA"/>
		<reference ref_id="1214428" ref_url="https://bugzilla.suse.com/1214428" source="BUGZILLA"/>
		<reference ref_id="1214451" ref_url="https://bugzilla.suse.com/1214451" source="BUGZILLA"/>
		<reference ref_id="1214635" ref_url="https://bugzilla.suse.com/1214635" source="BUGZILLA"/>
		<reference ref_id="1214659" ref_url="https://bugzilla.suse.com/1214659" source="BUGZILLA"/>
		<reference ref_id="1214661" ref_url="https://bugzilla.suse.com/1214661" source="BUGZILLA"/>
		<reference ref_id="1214727" ref_url="https://bugzilla.suse.com/1214727" source="BUGZILLA"/>
		<reference ref_id="1214729" ref_url="https://bugzilla.suse.com/1214729" source="BUGZILLA"/>
		<reference ref_id="1214742" ref_url="https://bugzilla.suse.com/1214742" source="BUGZILLA"/>
		<reference ref_id="1214743" ref_url="https://bugzilla.suse.com/1214743" source="BUGZILLA"/>
		<reference ref_id="1214756" ref_url="https://bugzilla.suse.com/1214756" source="BUGZILLA"/>
		<reference ref_id="1214976" ref_url="https://bugzilla.suse.com/1214976" source="BUGZILLA"/>
		<reference ref_id="1215522" ref_url="https://bugzilla.suse.com/1215522" source="BUGZILLA"/>
		<reference ref_id="1215523" ref_url="https://bugzilla.suse.com/1215523" source="BUGZILLA"/>
		<reference ref_id="1215552" ref_url="https://bugzilla.suse.com/1215552" source="BUGZILLA"/>
		<reference ref_id="1215553" ref_url="https://bugzilla.suse.com/1215553" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-38457" ref_url="https://www.suse.com/security/cve/CVE-2022-38457/" source="CVE"/>
		<reference ref_id="CVE-2022-40133" ref_url="https://www.suse.com/security/cve/CVE-2022-40133/" source="CVE"/>
		<reference ref_id="CVE-2023-2007" ref_url="https://www.suse.com/security/cve/CVE-2023-2007/" source="CVE"/>
		<reference ref_id="CVE-2023-20588" ref_url="https://www.suse.com/security/cve/CVE-2023-20588/" source="CVE"/>
		<reference ref_id="CVE-2023-34319" ref_url="https://www.suse.com/security/cve/CVE-2023-34319/" source="CVE"/>
		<reference ref_id="CVE-2023-3610" ref_url="https://www.suse.com/security/cve/CVE-2023-3610/" source="CVE"/>
		<reference ref_id="CVE-2023-37453" ref_url="https://www.suse.com/security/cve/CVE-2023-37453/" source="CVE"/>
		<reference ref_id="CVE-2023-3772" ref_url="https://www.suse.com/security/cve/CVE-2023-3772/" source="CVE"/>
		<reference ref_id="CVE-2023-3863" ref_url="https://www.suse.com/security/cve/CVE-2023-3863/" source="CVE"/>
		<reference ref_id="CVE-2023-40283" ref_url="https://www.suse.com/security/cve/CVE-2023-40283/" source="CVE"/>
		<reference ref_id="CVE-2023-4128" ref_url="https://www.suse.com/security/cve/CVE-2023-4128/" source="CVE"/>
		<reference ref_id="CVE-2023-4133" ref_url="https://www.suse.com/security/cve/CVE-2023-4133/" source="CVE"/>
		<reference ref_id="CVE-2023-4134" ref_url="https://www.suse.com/security/cve/CVE-2023-4134/" source="CVE"/>
		<reference ref_id="CVE-2023-4147" ref_url="https://www.suse.com/security/cve/CVE-2023-4147/" source="CVE"/>
		<reference ref_id="CVE-2023-4194" ref_url="https://www.suse.com/security/cve/CVE-2023-4194/" source="CVE"/>
		<reference ref_id="CVE-2023-4273" ref_url="https://www.suse.com/security/cve/CVE-2023-4273/" source="CVE"/>
		<reference ref_id="CVE-2023-4387" ref_url="https://www.suse.com/security/cve/CVE-2023-4387/" source="CVE"/>
		<reference ref_id="CVE-2023-4459" ref_url="https://www.suse.com/security/cve/CVE-2023-4459/" source="CVE"/>
		<reference ref_id="CVE-2023-4563" ref_url="https://www.suse.com/security/cve/CVE-2023-4563/" source="CVE"/>
		<reference ref_id="CVE-2023-4569" ref_url="https://www.suse.com/security/cve/CVE-2023-4569/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-38457: Fixed a use-after-free vulnerability in vmwgfx driver that allowed a local attacker to cause a denial of service (bsc#1203330).
- CVE-2022-40133: Fixed a use-after-free vulnerability in vmwgfx driver that allowed a local attacker to cause a denial of service (bsc#1203329).
- CVE-2023-2007: Fixed a flaw in the DPT I2O Controller driver that could allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel (bsc#1210448).
- CVE-2023-20588: Fixed a division-by-zero error on some AMD processors that can potentially return speculative data resulting in loss of confidentiality (bsc#1213927).
- CVE-2023-34319: Fixed buffer overrun triggered by unusual packet in xen/netback (XSA-432) (bsc#1213546).
- CVE-2023-3610: Fixed use-after-free vulnerability in nf_tables can be exploited to achieve local privilege escalation (bsc#1213580).
- CVE-2023-37453: Fixed oversight in SuperSpeed initialization  (bsc#1213123).
- CVE-2023-3772: Fixed a flaw in XFRM subsystem that may have allowed a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer leading to a possible kernel crash and denial of service (bsc#1213666).
- CVE-2023-3863: Fixed a use-after-free flaw was found in nfc_llcp_find_local that allowed a local user with special privileges to impact a kernel information leak issue (bsc#1213601).
- CVE-2023-40283: Fixed use-after-free in l2cap_sock_ready_cb (bsc#1214233).
- CVE-2023-4128: Fixed a use-after-free flaw in net/sched/cls_fw.c that allowed a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue (bsc#1214149).
- CVE-2023-4133: Fixed use after free bugs caused by circular dependency problem in cxgb4 (bsc#1213970).
- CVE-2023-4134: Fixed use-after-free in cyttsp4_watchdog_work() (bsc#1213971).
- CVE-2023-4147: Fixed use-after-free in nf_tables_newrule (bsc#1213968).
- CVE-2023-4194: Fixed a type confusion in net tun_chr_open() (bsc#1214019).
- CVE-2023-4273: Fixed a flaw in the exFAT driver of the Linux kernel that alloawed a local privileged attacker to overflow the kernel stack (bsc#1214120).
- CVE-2023-4387: Fixed use-after-free flaw in vmxnet3_rq_alloc_rx_buf that could allow a local attacker to crash the system due to a double-free (bsc#1214350).
- CVE-2023-4459: Fixed a NULL pointer dereference flaw in vmxnet3_rq_cleanup that may have allowed a local attacker with normal user privilege to cause a denial of service (bsc#1214451).
- CVE-2023-4563: Fixed use-after-free in nft_verdict_dump due to a race between set GC and transaction (bsc#1214727).
- CVE-2023-4569: Fixed information leak in nft_set_catchall_flush in net/netfilter/nf_tables_api.c (bsc#1214729).

The following non-security bugs were fixed:

- ACPI/IORT: Update SMMUv3 DeviceID support (bsc#1214305).
- ACPI: processor: perflib: Avoid updating frequency QoS unnecessarily (git-fixes).
- ACPI: processor: perflib: Use the 'no limit' frequency QoS (git-fixes).
- ACPI: x86: s2idle: Fix a logic error parsing AMD constraints table (git-fixes).
- ALSA: ac97: Fix possible error value of *rac97 (git-fixes).
- ALSA: hda/cs8409: Support new Dell Dolphin Variants (git-fixes).
- ALSA: hda/realtek - Remodified 3k pull low procedure (git-fixes).
- ALSA: hda/realtek: Add quirk for HP Victus 16-d1xxx to enable mute LED (git-fixes).
- ALSA: hda/realtek: Add quirk for mute LEDs on HP ENVY x360 15-eu0xxx (git-fixes).
- ALSA: hda/realtek: Add quirks for HP G11 Laptops (git-fixes).
- ALSA: hda/realtek: Switch Dell Oasis models to use SPI (git-fixes).
- ALSA: pcm: Fix missing fixup call in compat hw_refine ioctl (git-fixes).
- ALSA: usb-audio: Add support for Mythware XA001AU capture and playback interfaces (git-fixes).
- ALSA: usb-audio: Fix init call orders for UAC1 (git-fixes).
- ALSA: ymfpci: Fix the missing snd_card_free() call at probe error (git-fixes).
- ARM: dts: imx6dl: prtrvt, prtvt7, prti6q, prtwd2: fix USB related warnings (git-fixes).
- ARM: dts: imx6sll: fixup of operating points (git-fixes).
- ARM: spear: Do not use timer namespace for timer_shutdown() function (bsc#1213970).
- ASoC: SOF: Intel: fix SoundWire/HDaudio mutual exclusion (git-fixes).
- ASoC: amd: yc: Fix a non-functional mic on Lenovo 82SJ (git-fixes).
- ASoC: lower 'no backend DAIs enabled for ... Port' log severity (git-fixes).
- ASoC: meson: axg-tdm-formatter: fix channel slot allocation (git-fixes).
- ASoC: rt5665: add missed regulator_bulk_disable (git-fixes).
- ASoC: stac9766: fix build errors with REGMAP_AC97 (git-fixes).
- ASoC: tegra: Fix SFC conversion for few rates (git-fixes).
- Bluetooth: Fix potential use-after-free when clear keys (git-fixes).
- Bluetooth: L2CAP: Fix use-after-free (git-fixes).
- Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb (git-fixes).
- Bluetooth: Remove unused declaration amp_read_loc_info() (git-fixes).
- Bluetooth: btusb: Add MT7922 bluetooth ID for the Asus Ally (git-fixes).
- Bluetooth: btusb: Do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- Bluetooth: nokia: fix value check in nokia_bluetooth_serdev_probe() (git-fixes).
- CONFIG_NVME_VERBOSE_ERRORS=y     gone with a82baa8083b
- CONFIG_PRINTK_SAFE_LOG_BUF_SHIFT=13  gone with 7e152d55123
- Created new preempt kernel flavor Configs are cloned from the respective $arch/default configs. All changed configs appart from CONFIG_PREEMPT-&gt;y are a result of dependencies, namely many lock/unlock primitives are no longer inlined in the preempt kernel. TREE_RCU has been also changed to PREEMPT_RCU which is the default implementation for PREEMPT kernel.
- Documentation: devices.txt: Fix minors for ttyCPM* (git-fixes).
- Documentation: devices.txt: Remove ttyIOC* (git-fixes).
- Documentation: devices.txt: Remove ttySIOC* (git-fixes).
- Drivers: hv: Do not remap addresses that are above shared_gpa_boundary (bsc#1206453).
- Drivers: hv: Enable vmbus driver for nested root partition (bsc#1206453).
- Drivers: hv: Explicitly request decrypted in vmap_pfn() calls (bsc#1206453).
- Drivers: hv: Setup synic registers in case of nested root partition (bsc#1206453).
- Drivers: hv: vmbus: Call hv_synic_free() if hv_synic_alloc() fails (bsc#1206453).
- Drivers: hv: vmbus: Remove second mapping of VMBus monitor pages (bsc#1206453).
- Drivers: hv: vmbus: Remove second way of mapping ring buffers (bsc#1206453).
- Drivers: hv: vmbus: Remove the per-CPU post_msg_page (bsc#1206453).
- Drop amdgpu patch causing spamming (bsc#1215523)
- Drop cfg80211 lock fix patches that caused a regression (bsc#1213757)
- Drop rtsx patch that caused a regression (bsc#1214397,bsc#1214428)
- Enable Analog Devices Industrial Ethernet PHY driver (jsc#PED-4759)
- HID: add quirk for 03f0:464a HP Elite Presenter Mouse (git-fixes).
- HID: logitech-dj: Fix error handling in logi_dj_recv_switch_to_dj_mode() (git-fixes).
- HID: logitech-hidpp: Add USB and Bluetooth IDs for the Logitech G915 TKL Keyboard (git-fixes).
- HID: multitouch: Correct devm device reference for hidinput input_dev name (git-fixes).
- HID: wacom: remove the battery when the EKR is off (git-fixes).
- HWPOISON: offline support: fix spelling in Documentation/ABI/ (git-fixes).
- IB/hfi1: Fix possible panic during hotplug remove (git-fixes)
- IB/uverbs: Fix an potential error pointer dereference (git-fixes)
- Input: exc3000 - properly stop timer on shutdown (git-fixes).
- KVM: s390: fix sthyi error handling (git-fixes bsc#1214370).
- Kbuild: add -Wno-shift-negative-value where -Wextra is used (bsc#1214756).
- Kbuild: move to -std=gnu11 (bsc#1214756).
- PCI/ASPM: Avoid link retraining race (git-fixes).
- PCI/ASPM: Factor out pcie_wait_for_retrain() (git-fixes).
- PCI/ASPM: Return 0 or -ETIMEDOUT from pcie_retrain_link() (git-fixes).
- PCI: Mark NVIDIA T4 GPUs to avoid bus reset (git-fixes).
- PCI: acpiphp: Reassign resources on bridge if necessary (git-fixes).
- PCI: acpiphp: Use pci_assign_unassigned_bridge_resources() only for non-root bus (git-fixes).
- PCI: hv: Enable PCI pass-thru devices in Confidential VMs (bsc#1206453).
- PCI: hv: Replace retarget_msi_interrupt_params with (bsc#1206453).
- PCI: meson: Remove cast between incompatible function type (git-fixes).
- PCI: microchip: Correct the DED and SEC interrupt bit offsets (git-fixes).
- PCI: microchip: Remove cast between incompatible function type (git-fixes).
- PCI: pciehp: Use RMW accessors for changing LNKCTL (git-fixes).
- PCI: rockchip: Remove writes to unused registers (git-fixes).
- PCI: s390: Fix use-after-free of PCI resources with per-function hotplug (git-fixes).
- PCI: tegra194: Fix possible array out of bounds access (git-fixes).
- PM / devfreq: Fix leak in devfreq_dev_release() (git-fixes).
- RDMA/bnxt_re: Fix error handling in probe failure path (git-fixes)
- RDMA/bnxt_re: Fix max_qp count for virtual functions (git-fixes)
- RDMA/efa: Fix wrong resources deallocation order (git-fixes)
- RDMA/hns: Fix CQ and QP cache affinity (git-fixes)
- RDMA/hns: Fix incorrect post-send with direct wqe of wr-list (git-fixes)
- RDMA/hns: Fix port active speed (git-fixes)
- RDMA/irdma: Prevent zero-length STAG registration (git-fixes)
- RDMA/irdma: Replace one-element array with flexible-array member (git-fixes)
- RDMA/mlx5: Return the firmware result upon destroying QP/RQ (git-fixes)
- RDMA/qedr: Remove a duplicate assignment in irdma_query_ah() (git-fixes)
- RDMA/siw: Balance the reference of cep-&gt;kref in the error path (git-fixes)
- RDMA/siw: Correct wrong debug message (git-fixes)
- RDMA/umem: Set iova in ODP flow (git-fixes)
- README.BRANCH: Add Miroslav Franc as a SLE15-SP4 co-maintainer.
- Revert 'IB/isert: Fix incorrect release of isert connection' (git-fixes)
- Revert 'tracing: Add '(fault)' name injection to kernel probes' (git-fixes).
- SMB3: Do not send lease break acknowledgment if all file handles have been closed (git-fixes).
- Update patches.suse/cpufreq-intel_pstate-Fix-cpu-pstate.turbo_freq-initi.patch (git-fixes bsc#1212526 bsc#1214368 jsc#PED-4927 jsc#PED-4929).
- amba: bus: fix refcount leak (git-fixes).
- arm64: dts: imx8mn-var-som: add missing pull-up for onboard PHY reset pinmux (git-fixes).
- arm64: dts: qcom: qrb5165-rb5: fix thermal zone conflict (git-fixes).
- arm64: dts: rockchip: Disable HS400 for eMMC on ROCK Pi 4 (git-fixes).
- audit: fix possible soft lockup in __audit_inode_child() (git-fixes).
- backlight/bd6107: Compare against struct fb_info.device (git-fixes).
- backlight/gpio_backlight: Compare against struct fb_info.device (git-fixes).
- backlight/lv5207lp: Compare against struct fb_info.device (git-fixes).
- batman-adv: Do not get eth header before batadv_check_management_packet (git-fixes).
- batman-adv: Do not increase MTU when set by user (git-fixes).
- batman-adv: Fix TT global entry leak when client roamed back (git-fixes).
- batman-adv: Fix batadv_v_ogm_aggr_send memory leak (git-fixes).
- batman-adv: Hold rtnl lock during MTU update via netlink (git-fixes).
- batman-adv: Trigger events for auto adjusted MTU (git-fixes).
- bnx2x: fix page fault following EEH recovery (bsc#1214299).
- bpf: Disable preemption in bpf_event_output (git-fixes).
- bpftool: Print newline before '}' for struct with padding only fields (bsc#1211220 jsc#PED-3924).
- bus: mhi: host: Skip MHI reset if device is in RDDM (git-fixes).
- bus: ti-sysc: Fix build warning for 64-bit build (git-fixes).
- bus: ti-sysc: Fix cast to enum warning (git-fixes).
- bus: ti-sysc: Flush posted write on enable before reset (git-fixes).
- can: gs_usb: gs_usb_receive_bulk_callback(): count RX overflow errors also in case of OOM (git-fixes).
- ceph: defer stopping mdsc delayed_work (bsc#1214392).
- ceph: do not check for quotas on MDS stray dirs (bsc#1214238).
- ceph: never send metrics if disable_send_metrics is set (bsc#1214180).
- check-for-config-changes: ignore BUILTIN_RETURN_ADDRESS_STRIPS_PAC (bsc#1214380). gcc7 on SLE 15 does not support this while later gcc does.
- cifs: add missing return value check for cifs_sb_tlink (bsc#1193629).
- cifs: allow dumping keys for directories too (bsc#1193629).
- cifs: fix mid leak during reconnection after timeout threshold (git-fixes).
- cifs: if deferred close is disabled then close files immediately (git-fixes).
- cifs: is_network_name_deleted should return a bool (bsc#1193629).
- cifs: update internal module version number for cifs.ko (bsc#1193629).
- clk: Fix slab-out-of-bounds error in devm_clk_release() (git-fixes).
- clk: Fix undefined reference to `clk_rate_exclusive_{get,put}' (git-fixes).
- clk: imx8mp: fix sai4 clock (git-fixes).
- clk: imx: composite-8m: fix clock pauses when set_rate would be a no-op (git-fixes).
- clk: imx: pll14xx: dynamically configure PLL for 393216000/361267200Hz (git-fixes).
- clk: qcom: camcc-sc7180: fix async resume during probe (git-fixes).
- clk: qcom: gcc-mdm9615: use proper parent for pll0_vote clock (git-fixes).
- clk: qcom: gcc-sc7180: Fix up gcc_sdcc2_apps_clk_src (git-fixes).
- clk: qcom: gcc-sm8250: Fix gcc_sdcc2_apps_clk_src (git-fixes).
- clk: sunxi-ng: Modify mismatched function name (git-fixes).
- clocksource/drivers/arm_arch_timer: Do not use timer namespace for timer_shutdown() function (bsc#1213970).
- clocksource/drivers/hyper-v: Rework clocksource and sched clock setup (bsc#1206453).
- clocksource/drivers/sp804: Do not use timer namespace for timer_shutdown() function (bsc#1213970).
- clocksource: hyper-v: Add TSC page support for root partition (bsc#1206453).
- clocksource: hyper-v: Introduce TSC PFN getter (bsc#1206453).
- clocksource: hyper-v: Introduce a pointer to TSC page (bsc#1206453).
- clocksource: hyper-v: Use TSC PFN getter to map vvar page (bsc#1206453).
- clocksource: hyper-v: make sure Invariant-TSC is used if it is (bsc#1206453).
- cpu/SMT: Allow enabling partial SMT states via sysfs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/SMT: Create topology_smt_thread_allowed() (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/SMT: Move SMT prototypes into cpu_smt.h (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/SMT: Move smt/control simple exit cases earlier (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/SMT: Remove topology_smt_supported() (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/SMT: Store the current/max number of threads (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpufreq: Fix the race condition while updating the transition_task of policy (git-fixes).
- cpufreq: intel_pstate: Adjust balance_performance EPP for Sapphire Rapids (bsc#1214659).
- cpufreq: intel_pstate: Enable HWP IO boost for all servers (bsc#1208949 jsc#PED-6003 jsc#PED-6004).
- cpufreq: intel_pstate: Fix scaling for hybrid-capable systems with disabled E-cores (bsc#1212526 bsc#1214368 jsc#PED-4927 jsc#PED-4929).
- cpufreq: intel_pstate: Read all MSRs on the target CPU (bsc#1212526 bsc#1214368 jsc#PED-4927 jsc#PED-4929).
- cpufreq: intel_pstate: hybrid: Rework HWP calibration (bsc#1212526 bsc#1214368 jsc#PED-4927 jsc#PED-4929).
- cpufreq: intel_pstate: hybrid: Use known scaling factor for P-cores (bsc#1212526 bsc#1214368 jsc#PED-4927 jsc#PED-4929).
- crypto: caam - fix unchecked return value error (git-fixes).
- crypto: stm32 - Properly handle pm_runtime_get failing (git-fixes).
- define more Hyper-V related constants (bsc#1206453).
- dma-buf/sw_sync: Avoid recursive lock during fence signal (git-fixes).
- dma-buf/sync_file: Fix docs syntax (git-fixes).
- dmaengine: idxd: Modify the dependence of attribute pasid_enabled (git-fixes).
- dmaengine: mcf-edma: Fix a potential un-allocated memory access (git-fixes).
- dmaengine: pl330: Return DMA_PAUSED when transaction is paused (git-fixes).
- dmaengine: ste_dma40: Add missing IRQ check in d40_probe (git-fixes).
- docs/process/howto: Replace C89 with C11 (bsc#1214756).
- docs: kernel-parameters: Refer to the correct bitmap function (git-fixes).
- docs: networking: replace skb_hwtstamp_tx with skb_tstamp_tx (git-fixes).
- docs: printk-formats: Fix hex printing of signed values (git-fixes).
- driver core: test_async: fix an error code (git-fixes).
- drivers: clk: keystone: Fix parameter judgment in _of_pll_clk_init() (git-fixes).
- drivers: usb: smsusb: fix error handling code in smsusb_init_device (git-fixes).
- drm/amd/display: Apply 60us prefetch for DCFCLK &amp;lt;= 300Mhz (git-fixes).
- drm/amd/display: Disable phantom OTG after enable for plane disable (git-fixes).
- drm/amd/display: Do not set drr on pipe commit (git-fixes).
- drm/amd/display: Enable dcn314 DPP RCO (git-fixes).
- drm/amd/display: Ensure that planes are in the same order (git-fixes).
- drm/amd/display: Implement workaround for writing to OTG_PIXEL_RATE_DIV register (git-fixes).
- drm/amd/display: Retain phantom plane/stream if validation fails (git-fixes).
- drm/amd/display: Skip DPP DTO update if root clock is gated (git-fixes).
- drm/amd/display: Use update plane and stream routine for DCN32x (git-fixes).
- drm/amd/display: check TG is non-null before checking if enabled (git-fixes).
- drm/amd/display: check attr flag before set cursor degamma on DCN3+ (git-fixes).
- drm/amd/display: disable RCO for DCN314 (git-fixes).
- drm/amd/display: do not wait for mpc idle if tg is disabled (git-fixes).
- drm/amd/display: fix access hdcp_workqueue assert (git-fixes).
- drm/amd/display: fix the build when DRM_AMD_DC_DCN is not set (git-fixes).
- drm/amd/display: limit DPIA link rate to HBR3 (git-fixes).
- drm/amd/display: phase3 mst hdcp for multiple displays (git-fixes).
- drm/amd/display: save restore hdcp state when display is unplugged from mst hub (git-fixes).
- drm/amd/display: trigger timing sync only if TG is running (git-fixes).
- drm/amd/pm/smu7: move variables to where they are used (git-fixes).
- drm/amd/pm: avoid unintentional shutdown due to temperature momentary fluctuation (git-fixes).
- drm/amd/pm: expose swctf threshold setting for legacy powerplay (git-fixes).
- drm/amd/pm: fix variable dereferenced issue in amdgpu_device_attr_create() (git-fixes).
- drm/amd/pm: fulfill powerplay peak profiling mode shader/memory clock settings (git-fixes).
- drm/amd/pm: fulfill swsmu peak profiling mode shader/memory clock settings (git-fixes).
- drm/amd/pm: skip the RLC stop when S0i3 suspend for SMU v13.0.4/11 (git-fixes).
- drm/amd: Disable S/G for APUs when 64GB or more host memory (git-fixes).
- drm/amd: flush any delayed gfxoff on suspend entry (git-fixes).
- drm/amdgpu/pm: fix throttle_status for other than MP1 11.0.7 (git-fixes).
- drm/amdgpu: Fix integer overflow in amdgpu_cs_pass1 (git-fixes).
- drm/amdgpu: Fix potential fence use-after-free v2 (git-fixes).
- drm/amdgpu: Remove unnecessary domain argument (git-fixes).
- drm/amdgpu: Use RMW accessors for changing LNKCTL (git-fixes).
- drm/amdgpu: add S/G display parameter (git-fixes).
- drm/amdgpu: add vram reservation based on vram_usagebyfirmware_v2_2 (git-fixes).
- drm/amdgpu: avoid integer overflow warning in amdgpu_device_resize_fb_bar() (git-fixes).
- drm/amdgpu: fix calltrace warning in amddrm_buddy_fini (git-fixes).
- drm/amdgpu: fix memory leak in mes self test (git-fixes).
- drm/amdgpu: fix possible UAF in amdgpu_cs_pass1() (git-fixes).
- drm/amdgpu: install stub fence into potential unused fence pointers (git-fixes).
- drm/amdgpu: keep irq count in amdgpu_irq_disable_all (git-fixes).
- drm/amdgpu: skip fence GFX interrupts disable/enable for S0ix (git-fixes).
- drm/armada: Fix off-by-one error in armada_overlay_get_property() (git-fixes).
- drm/ast: Fix DRAM init on AST2200 (git-fixes).
- drm/atomic-helper: Update reference to drm_crtc_force_disable_all() (git-fixes).
- drm/bridge: anx7625: Drop device lock before drm_helper_hpd_irq_event() (git-fixes).
- drm/bridge: anx7625: Use common macros for DP power sequencing commands (git-fixes).
- drm/bridge: anx7625: Use common macros for HDCP capabilities (git-fixes).
- drm/bridge: fix -Wunused-const-variable= warning (git-fixes).
- drm/bridge: tc358764: Fix debug print parameter order (git-fixes).
- drm/etnaviv: fix dumping of active MMU context (git-fixes).
- drm/gma500: Use drm_aperture_remove_conflicting_pci_framebuffers (git-fixes).
- drm/i915/sdvo: fix panel_type initialization (git-fixes).
- drm/i915: Fix premature release of request's reusable memory (git-fixes).
- drm/mediatek: Fix dereference before null check (git-fixes).
- drm/mediatek: Fix potential memory leak if vmap() fail (git-fixes).
- drm/mediatek: Remove freeing not dynamic allocated memory (git-fixes).
- drm/msm/a2xx: Call adreno_gpu_init() earlier (git-fixes).
- drm/msm/dpu: fix the irq index in dpu_encoder_phys_wb_wait_for_commit_done (git-fixes).
- drm/msm/mdp5: Do not leak some plane state (git-fixes).
- drm/msm: Update dev core dump to not print backwards (git-fixes).
- drm/mxsfb: Disable overlay plane in mxsfb_plane_overlay_atomic_disable() (git-fixes).
- drm/nouveau/disp: Revert a NULL check inside nouveau_connector_get_modes (git-fixes).
- drm/nouveau/disp: fix use-after-free in error handling of nouveau_connector_create (bsc#1214073).
- drm/nouveau/gr: enable memory loads on helper invocation on all channels (git-fixes).
- drm/nouveau/nvkm/dp: Add workaround to fix DP 1.3+ DPCD issues (git-fixes).
- drm/panel: simple: Add missing connector type and pixel format for AUO T215HVN01 (git-fixes).
- drm/panel: simple: Fix AUO G121EAN01 panel timings according to the docs (git-fixes).
- drm/qxl: fix UAF on handle creation (git-fixes).
- drm/radeon: Use RMW accessors for changing LNKCTL (git-fixes).
- drm/repaper: Reduce temporary buffer size in repaper_fb_dirty() (git-fixes).
- drm/rockchip: Do not spam logs in atomic check (git-fixes).
- drm/shmem-helper: Reset vma-&gt;vm_ops before calling dma_buf_mmap() (git-fixes).
- drm/stm: ltdc: fix late dereference check (git-fixes).
- drm/tegra: dpaux: Fix incorrect return value of platform_get_irq (git-fixes).
- drm/ttm: check null pointer before accessing when swapping (git-fixes).
- drm/ttm: never consider pinned BOs for eviction&amp;swap (git-fixes).
- drm/vmwgfx: Fix shader stage validation (git-fixes).
- drm: adv7511: Fix low refresh rate register for ADV7533/5 (git-fixes).
- drm: rcar-du: remove R-Car H3 ES1.* workarounds (git-fixes).
- drm: xlnx: zynqmp_dpsub: Add missing check for dma_set_mask (git-fixes).
- dt-bindings: clock: xlnx,versal-clk: drop select:false (git-fixes).
- dt-bindings: clocks: imx8mp: make sai4 a dummy clock (git-fixes).
- dt-bindings: crypto: ti,sa2ul: make power-domains conditional (git-fixes).
- e1000: Fix typos in comments (jsc#PED-5738).
- e1000: Remove unnecessary use of kmap_atomic() (jsc#PED-5738).
- e1000: switch to napi_build_skb() (jsc#PED-5738).
- e1000: switch to napi_consume_skb() (jsc#PED-5738).
- exfat: fix unexpected EOF while reading dir (bsc#1214000).
- exfat: release s_lock before calling dir_emit() (bsc#1214000).
- exfat_iterate(): do not open-code file_inode(file) (bsc#1214000).
- fbdev/ep93xx-fb: Do not assign to struct fb_info.dev (git-fixes).
- fbdev: Fix sys_imageblit() for arbitrary image widths (git-fixes).
- fbdev: Improve performance of sys_imageblit() (git-fixes).
- fbdev: Update fbdev source file paths (git-fixes).
- fbdev: fix potential OOB read in fast_imageblit() (git-fixes).
- fbdev: mmp: fix value check in mmphw_probe() (git-fixes).
- file: reinstate f_pos locking optimization for regular files (bsc#1213759).
- firmware: arm_scmi: Drop OF node reference in the transport channel setup (git-fixes).
- firmware: cs_dsp: Fix new control name check (git-fixes).
- firmware: meson_sm: fix to avoid potential NULL pointer dereference (git-fixes).
- firmware: stratix10-svc: Fix an NULL vs IS_ERR() bug in probe (git-fixes).
- fprobe: Release rethook after the ftrace_ops is unregistered (git-fixes).
- fprobe: add unlock to match a succeeded ftrace_test_recursion_trylock (git-fixes).
- fs/sysv: Null check to prevent null-ptr-deref bug (git-fixes).
- fsi: aspeed: Reset master errors after CFAM reset (git-fixes).
- fsi: master-ast-cf: Add MODULE_FIRMWARE macro (git-fixes).
- ftrace: Fix possible warning on checking all pages used in ftrace_process_locs() (git-fixes).
- gpio: mvebu: Make use of devm_pwmchip_add (git-fixes).
- gpio: mvebu: fix irq domain leak (git-fixes).
- gpio: tps68470: Make tps68470_gpio_output() always set the initial value (git-fixes).
- hv_netvsc: Remove second mapping of send and recv buffers (bsc#1206453).
- hwmon: (pmbus/bel-pfe) Enable PMBUS_SKIP_STATUS_CHECK for pfe1100 (git-fixes).
- hwmon: (tmp513) Fix the channel number in tmp51x_is_visible() (git-fixes).
- hwrng: iproc-rng200 - Implement suspend and resume calls (git-fixes).
- hwrng: nomadik - keep clock enabled while hwrng is registered (git-fixes).
- hwrng: pic32 - use devm_clk_get_enabled (git-fixes).
- i2c: Delete error messages for failed memory allocations (git-fixes).
- i2c: Improve size determinations (git-fixes).
- i2c: bcm-iproc: Fix bcm_iproc_i2c_isr deadlock issue (git-fixes).
- i2c: designware: Correct length byte validation logic (git-fixes).
- i2c: designware: Handle invalid SMBus block data response length value (git-fixes).
- i2c: hisi: Only handle the interrupt of the driver's transfer (git-fixes).
- i2c: nomadik: Remove a useless call in the remove function (git-fixes).
- i2c: nomadik: Remove unnecessary goto label (git-fixes).
- i2c: nomadik: Use devm_clk_get_enabled() (git-fixes).
- i40e: Fix an NULL vs IS_ERR() bug for debugfs_create_dir() (git-fixes).
- iavf: fix potential races for FDIR filters (git-fixes).
- ice: Fix RDMA VSI removal during queue rebuild (git-fixes).
- ice: Fix crash by keep old cfg when update TCs more than queues (git-fixes).
- ice: Fix max_rate check while configuring TX rate limits (git-fixes).
- ice: Fix memory management in ice_ethtool_fdir.c (git-fixes).
- iio: adc: ina2xx: avoid NULL pointer dereference on OF device match (git-fixes).
- iio: adc: stx104: Implement and utilize register structures (git-fixes).
- iio: adc: stx104: Utilize iomap interface (git-fixes).
- iio: cros_ec: Fix the allocation size for cros_ec_command (git-fixes).
- intel/e1000:fix repeated words in comments (jsc#PED-5738).
- intel: remove unused macros (jsc#PED-5738).
- iommu/amd/io-pgtable: Implement map_pages io_pgtable_ops callback (bsc#1212423).
- iommu/amd/io-pgtable: Implement unmap_pages io_pgtable_ops callback (bsc#1212423).
- iommu/amd: Add PCI segment support for ivrs_ commands (git-fixes).
- iommu/amd: Add map/unmap_pages() iommu_domain_ops callback support (bsc#1212423).
- iommu/amd: Do not identity map v2 capable device when snp is enabled (git-fixes).
- iommu/amd: Fix compile warning in init code (git-fixes).
- iommu/amd: Fix ill-formed ivrs_ioapic, ivrs_hpet and ivrs_acpihid options (git-fixes).
- iommu/amd: Fix ivrs_acpihid cmdline parsing code (git-fixes).
- iommu/amd: Fix pci device refcount leak in ppr_notifier() (git-fixes).
- iommu/amd: use full 64-bit value in build_completion_wait() (git-fixes).
- iommu/arm-smmu-v3: Make default domain type of HiSilicon PTT device to identity (git-fixes).
- iommu/arm-smmu-v3: check return value after calling platform_get_resource() (git-fixes).
- iommu/arm-smmu-v3: fix event handling soft lockup (git-fixes).
- iommu/arm-smmu: fix possible null-ptr-deref in arm_smmu_device_probe() (git-fixes).
- iommu/dart: Initialize DART_STREAMS_ENABLE (git-fixes).
- iommu/dma: Fix incorrect error return on iommu deferred attach (git-fixes).
- iommu/dma: Fix iova map result check bug (git-fixes).
- iommu/dma: return error code from iommu_dma_map_sg() (git-fixes).
- iommu/fsl_pamu: Fix resource leak in fsl_pamu_probe() (git-fixes).
- iommu/io-pgtable-arm-v7s: Add a quirk to allow pgtable PA up to 35bit (git-fixes).
- iommu/iova: Fix module config properly (git-fixes).
- iommu/mediatek: Add error path for loop of mm_dts_parse (git-fixes).
- iommu/mediatek: Add platform_device_put for recovering the device refcnt (git-fixes).
- iommu/mediatek: Check return value after calling platform_get_resource() (git-fixes).
- iommu/mediatek: Set dma_mask for PGTABLE_PA_35_EN (git-fixes).
- iommu/mediatek: Use component_match_add (git-fixes).
- iommu/mediatek: Validate number of phandles associated with 'mediatek,larbs' (git-fixes).
- iommu/omap: Fix buffer overflow in debugfs (git-fixes).
- iommu/rockchip: fix permission bits in page table entries v2 (git-fixes).
- iommu/s390: Fix duplicate domain attachments (git-fixes).
- iommu/sun50i: Consider all fault sources for reset (git-fixes).
- iommu/sun50i: Fix R/W permission check (git-fixes).
- iommu/sun50i: Fix flush size (git-fixes).
- iommu/sun50i: Fix reset release (git-fixes).
- iommu/sun50i: Implement .iotlb_sync_map (git-fixes).
- iommu/sun50i: Remove IOMMU_DOMAIN_IDENTITY (git-fixes).
- iommu/vt-d: Add RPLS to quirk list to skip TE disabling (git-fixes).
- iommu/vt-d: Check correct capability for sagaw determination (git-fixes).
- iommu/vt-d: Clean up si_domain in the init_dmars() error path (git-fixes).
- iommu/vt-d: Correctly calculate sagaw value of IOMMU (git-fixes).
- iommu/vt-d: Fix PCI device refcount leak in dmar_dev_scope_init() (git-fixes).
- iommu/vt-d: Fix PCI device refcount leak in has_external_pci() (git-fixes).
- iommu/vt-d: Fix kdump kernels boot failure with scalable mode (git-fixes).
- iommu/vt-d: Preset Access bit for IOVA in FL non-leaf paging entries (git-fixes).
- iommu/vt-d: Set SRE bit only when hardware has SRS cap (git-fixes).
- ipmi:ssif: Add check for kstrdup (git-fixes).
- ipmi:ssif: Fix a memory leak when scanning for an adapter (git-fixes).
- ipmi_si: fix a memleak in try_smi_init() (git-fixes).
- jffs2: correct logic when creating a hole in jffs2_write_begin (git-fixes).
- kabi/severities: Ignore newly added SRSO mitigation functions
- kabi: Allow extra bugsints (bsc#1213927).
- kernel-binary: Common dependencies cleanup Common dependencies are copied to a subpackage, there is no need for copying defines or build dependencies there.
- kernel-binary: Drop code for kerntypes support Kerntypes was a SUSE-specific feature dropped before SLE 12.
- kunit: make kunit_test_timeout compatible with comment (git-fixes).
- leds: Fix BUG_ON check for LED_COLOR_ID_MULTI that is always false (git-fixes).
- leds: multicolor: Use rounded division when calculating color components (git-fixes).
- leds: pwm: Fix error code in led_pwm_create_fwnode() (git-fixes).
- leds: trigger: tty: Do not use LED_ON/OFF constants, use led_blink_set_oneshot instead (git-fixes).
- leds: turris-omnia: Drop unnecessary mutex locking (git-fixes).
- lib/test_meminit: allocate pages up to order MAX_ORDER (git-fixes).
- lib/test_meminit: destroy cache in kmem_cache_alloc_bulk() test (git-fixes).
- libbpf: Fix BTF-to-C converter's padding logic (bsc#1211220 jsc#PED-3924).
- libbpf: Fix btf_dump's packed struct determination (bsc#1211220 jsc#PED-3924).
- libbpf: Fix single-line struct definition output in btf_dump (bsc#1211220 jsc#PED-3924).
- libceph: fix potential hang in ceph_osdc_notify() (bsc#1214393).
- md/raid0: Factor out helper for mapping and submitting a bio (bsc#1213916).
- md/raid0: Fix performance regression for large sequential writes (bsc#1213916).
- media: ad5820: Drop unsupported ad5823 from i2c_ and of_device_id tables (git-fixes).
- media: cx24120: Add retval check for cx24120_message_send() (git-fixes).
- media: dib7000p: Fix potential division by zero (git-fixes).
- media: dvb-usb: m920x: Fix a potential memory leak in m920x_i2c_xfer() (git-fixes).
- media: go7007: Remove redundant if statement (git-fixes).
- media: i2c: ccs: Check rules is non-NULL (git-fixes).
- media: i2c: rdacm21: Fix uninitialized value (git-fixes).
- media: i2c: tvp5150: check return value of devm_kasprintf() (git-fixes).
- media: ov2680: Add ov2680_fill_format() helper function (git-fixes).
- media: ov2680: Do not take the lock for try_fmt calls (git-fixes).
- media: ov2680: Fix ov2680_bayer_order() (git-fixes).
- media: ov2680: Fix ov2680_set_fmt() which == V4L2_SUBDEV_FORMAT_TRY not working (git-fixes).
- media: ov2680: Fix regulators being left enabled on ov2680_power_on() errors (git-fixes).
- media: ov2680: Fix vflip / hflip set functions (git-fixes).
- media: ov2680: Remove VIDEO_V4L2_SUBDEV_API ifdef-s (git-fixes).
- media: ov5640: Enable MIPI interface in ov5640_set_power_mipi() (git-fixes).
- media: rkvdec: increase max supported height for H.264 (git-fixes).
- media: v4l2-core: Fix a potential resource leak in v4l2_fwnode_parse_link() (git-fixes).
- media: v4l2-mem2mem: add lock to protect parameter num_rdy (git-fixes).
- media: venus: hfi_venus: Only consider sys_idle_indicator on V1 (git-fixes).
- media: venus: hfi_venus: Write to VIDC_CTRL_INIT after unmasking interrupts (git-fixes).
- misc: rtsx: judge ASPM Mode to set PETXCFG Reg (git-fixes).
- mkspec: Allow unsupported KMPs (bsc#1214386)
- mlxsw: pci: Add shutdown method in PCI driver (git-fixes).
- mmc: block: Fix in_flight[issue_type] value error (git-fixes).
- mmc: moxart: read scr register without changing byte order (git-fixes).
- mmc: wbsd: fix double mmc_free_host() in wbsd_init() (git-fixes).
- module: avoid allocation if module is already present and ready (bsc#1213921).
- module: extract patient module check into helper (bsc#1213921).
- module: move check_modinfo() early to early_mod_check() (bsc#1213921).
- module: move early sanity checks into a helper (bsc#1213921).
- mtd: rawnand: brcmnand: Fix crash during the panic_write (git-fixes).
- mtd: rawnand: brcmnand: Fix mtd oobsize (git-fixes).
- mtd: rawnand: brcmnand: Fix potential false time out warning (git-fixes).
- mtd: rawnand: brcmnand: Fix potential out-of-bounds access in oob write (git-fixes).
- mtd: rawnand: fsl_upm: Fix an off-by one test in fun_exec_op() (git-fixes).
- mtd: rawnand: fsmc: handle clk prepare error in fsmc_nand_resume() (git-fixes).
- mtd: rawnand: omap_elm: Fix incorrect type in assignment (git-fixes).
- mtd: rawnand: rockchip: Align hwecc vs. raw page helper layouts (git-fixes).
- mtd: rawnand: rockchip: fix oobfree offset and description (git-fixes).
- mtd: spi-nor: Check bus width while setting QE bit (git-fixes).
- mtd: spinand: toshiba: Fix ecc_get_status (git-fixes).
- n_tty: Rename tail to old_tail in n_tty_read() (git-fixes).
- net: hns3: fix wrong bw weight of disabled tc issue (git-fixes).
- net: ieee802154: at86rf230: Stop leaking skb's (git-fixes).
- net: mana: Fix MANA VF unload when hardware is unresponsive (git-fixes).
- net: phy: at803x: remove set/get wol callbacks for AR8032 (git-fixes).
- net: phy: broadcom: stub c45 read/write for 54810 (git-fixes).
- net: phy: fix IRQ-based wake-on-lan over hibernate / power off (git-fixes).
- net: stmmac: tegra: Properly allocate clock bulk data (bsc#1213733)
- net: usb: lan78xx: reorder cleanup operations to avoid UAF bugs (git-fixes).
- net: usbnet: Fix WARNING in usbnet_start_xmit/usb_submit_urb (git-fixes).
- netfs: Fix lockdep warning from taking sb_writers whilst holding mmap_lock (bsc#1214742).
- netfs: Fix missing xas_retry() calls in xarray iteration (bsc#1213946 bsc#1214404).
- netfs: Fix missing xas_retry() calls in xarray iteration (bsc#1213946).
- netfs: fix parameter of cleanup() (bsc#1214743).
- nfsd: Remove incorrect check in nfsd4_validate_stateid (git-fixes).
- nilfs2: fix WARNING in mark_buffer_dirty due to discarded buffer reuse (git-fixes).
- nilfs2: fix use-after-free of nilfs_root in dirtying inodes via iput (git-fixes).
- nvme-rdma: fix potential unbalanced freeze &amp; unfreeze (bsc#1208902).
- nvme-tcp: fix potential unbalanced freeze &amp; unfreeze (bsc#1208902).
- objtool/x86: Fix SRSO mess (git-fixes).
- objtool/x86: Fixup frame-pointer vs rethunk (git-fixes).
- objtool: Union instruction::{call_dest,jump_table} (git-fixes).
- old-flavors: Drop 2.6 kernels. 2.6 based kernels are EOL, upgrading from them is no longer suported.
- pcmcia: rsrc_nonstatic: Fix memory leak in nonstatic_release_resource_db() (git-fixes).
- phy/rockchip: inno-hdmi: do not power on rk3328 post pll on reg write (git-fixes).
- phy/rockchip: inno-hdmi: round fractal pixclock in rk3328 recalc_rate (git-fixes).
- phy/rockchip: inno-hdmi: use correct vco_div_5 macro on rk3328 (git-fixes).
- phy: qcom-snps-femto-v2: keep cfg_ahb_clk enabled during runtime suspend (git-fixes).
- phy: qcom-snps-femto-v2: properly enable ref clock (git-fixes).
- phy: qcom-snps: Use dev_err_probe() to simplify code (git-fixes).
- phy: qcom-snps: correct struct qcom_snps_hsphy kerneldoc (git-fixes).
- pinctrl: amd: Mask wake bits on probe again (git-fixes).
- pinctrl: amd: Revert 'pinctrl: amd: disable and mask interrupts on probe' (git-fixes).
- pinctrl: cherryview: fix address_space_handler() argument (git-fixes).
- pinctrl: mcp23s08: check return value of devm_kasprintf() (git-fixes).
- pinctrl: renesas: rza2: Add lock around pinctrl_generic{{add,remove}_group,{add,remove}_function} (git-fixes).
- platform/x86: dell-sysman: Fix reference leak (git-fixes).
- powerpc/64e: Fix kexec build error (bsc#1212091 ltc#199106).
- powerpc/iommu: Fix iommu_table_in_use for a small default DMA window case (bsc#1212091 ltc#199106).
- powerpc/iommu: Incorrect DDW Table is referenced for SR-IOV device (bsc#1212091 ltc#199106).
- powerpc/iommu: TCEs are incorrectly manipulated with DLPAR add/remove of memory (bsc#1212091 ltc#199106).
- powerpc/iommu: do not set failed sg dma_address to DMA_MAPPING_ERROR (bsc#1212091 ltc#199106).
- powerpc/iommu: return error code from .map_sg() ops (bsc#1212091 ltc#199106).
- powerpc/kernel/iommu: Add new iommu_table_in_use() helper (bsc#1212091 ltc#199106).
- powerpc/kexec: Fix build failure from uninitialised variable (bsc#1212091 ltc#199106).
- powerpc/mm/altmap: Fix altmap boundary check (bsc#1120059 git-fixes).
- powerpc/pseries/ddw: Do not try direct mapping with persistent memory and one window (bsc#1212091 ltc#199106).
- powerpc/pseries/ddw: simplify enable_ddw() (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Add ddw_list_new_entry() helper (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Add ddw_property_create() and refactor enable_ddw() (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Add iommu_pseries_alloc_table() helper (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Add of_node_put() before break (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Allow DDW windows starting at 0x00 (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Check if the default window in use before removing it (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Create huge DMA window if no MMIO32 is present (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Find existing DDW with given property name (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Make use of DDW for indirect mapping (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Print ibm,query-pe-dma-windows parameters (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Rename 'direct window' to 'dma window' (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Reorganize iommu_table_setparms*() with new helper (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Replace hard-coded page shift (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Update remove_dma_window() to accept property name (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Use correct vfree for it_map (bsc#1212091 ltc#199106).
- powerpc/pseries: Add __init attribute to eligible functions (bsc#1212091 ltc#199106).
- powerpc/pseries: Honour current SMT state when DLPAR onlining CPUs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- powerpc/pseries: Initialise CPU hotplug callbacks earlier (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- powerpc/rtas: block error injection when locked down (bsc#1023051).
- powerpc/rtas: enture rtas_call is called with MMU enabled (bsc#1023051).
- powerpc/rtas: mandate RTAS syscall filtering (bsc#1023051).
- powerpc/rtas_flash: allow user copy to flash block cache objects (bsc#1194869).
- powerpc/security: Fix Speculation_Store_Bypass reporting on Power10 (bsc#1188885 ltc#193722 git-fixes).
- powerpc: Add HOTPLUG_SMT support (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588). Update config files.
- powerpc: Move DMA64_PROPNAME define to a header (bsc#1214297 ltc#197503).
- powerpc: fix typos in comments (bsc#1212091 ltc#199106).
- pseries/iommu/ddw: Fix kdump to work in absence of ibm,dma-window (bsc#1214297 ltc#197503).
- pstore/ram: Check start of empty przs during init (git-fixes).
- pwm: Add a stub for devm_pwmchip_add() (git-fixes).
- pwm: meson: Simplify duplicated per-channel tracking (git-fixes).
- pwm: meson: fix handling of period/duty if greater than UINT_MAX (git-fixes).
- qed: Fix scheduling in a tasklet while getting stats (git-fixes).
- regmap: rbtree: Use alloc_flags for memory allocations (git-fixes).
- ring-buffer: Do not swap cpu_buffer during resize process (git-fixes).
- ring-buffer: Fix deadloop issue on reading trace_pipe (git-fixes).
- ring-buffer: Fix wrong stat of cpu_buffer-&gt;read (git-fixes).
- rpm/mkspec-dtb: support for nested subdirs
- rpmsg: glink: Add check for kstrdup (git-fixes).
- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976).
- s390/purgatory: disable branch profiling (git-fixes bsc#1214372).
- s390/zcrypt: fix reply buffer calculations for CCA replies (bsc#1213949).
- sched/fair: Fix inaccurate tally of ttwu_move_affine (git fixes).
- sched/fair: Use recent_used_cpu to test p-&gt;cpus_ptr (git fixes).
- sched/psi: use kernfs polling functions for PSI trigger polling (bsc#1209799).
- scsi: 3w-xxxx: Add error handling for initialization failure in tw_probe() (git-fixes).
- scsi: 53c700: Check that command slot is not NULL (git-fixes).
- scsi: RDMA/srp: Fix residual handling (git-fixes)
- scsi: bsg: Increase number of devices (bsc#1210048).
- scsi: core: Do not wait for quiesce in scsi_device_block() (bsc#1209284).
- scsi: core: Do not wait for quiesce in scsi_stop_queue() (bsc#1209284).
- scsi: core: Fix legacy /proc parsing buffer overflow (git-fixes).
- scsi: core: Fix possible memory leak if device_add() fails (git-fixes).
- scsi: core: Improve warning message in scsi_device_block() (bsc#1209284).
- scsi: core: Merge scsi_internal_device_block() and device_block() (bsc#1209284).
- scsi: fnic: Replace return codes in fnic_clean_pending_aborts() (git-fixes).
- scsi: qedf: Fix NULL dereference in error handling (git-fixes).
- scsi: qedf: Fix firmware halt over suspend and resume (git-fixes).
- scsi: qedi: Fix firmware halt over suspend and resume (git-fixes).
- scsi: scsi_debug: Remove dead code (git-fixes).
- scsi: sg: Increase number of devices (bsc#1210048).
- scsi: snic: Fix double free in snic_tgt_create() (git-fixes).
- scsi: snic: Fix possible memory leak if device_add() fails (git-fixes).
- scsi: storvsc: Always set no_report_opcodes (git-fixes).
- scsi: storvsc: Fix handling of virtual Fibre Channel timeouts (git-fixes).
- scsi: storvsc: Handle SRB status value 0x30 (git-fixes).
- scsi: storvsc: Limit max_sectors for virtual Fibre Channel devices (git-fixes).
- scsi: zfcp: Defer fc_rport blocking until after ADISC response (git-fixes bsc#1214371).
- selftests/bpf: Test btf dump for struct with padding only fields (bsc#1211220 jsc#PED-3924).
- selftests/futex: Order calls to futex_lock_pi (git-fixes).
- selftests/harness: Actually report SKIP for signal tests (git-fixes).
- selftests/resctrl: Close perf value read fd on errors (git-fixes).
- selftests/resctrl: Do not leak buffer in fill_cache() (git-fixes).
- selftests/resctrl: Unmount resctrl FS if child fails to run benchmark (git-fixes).
- selftests/rseq: check if libc rseq support is registered (git-fixes).
- selftests: forwarding: Add a helper to skip test when using veth pairs (git-fixes).
- selftests: forwarding: Skip test when no interfaces are specified (git-fixes).
- selftests: forwarding: Switch off timeout (git-fixes).
- selftests: forwarding: ethtool: Skip when using veth pairs (git-fixes).
- selftests: forwarding: ethtool_extended_state: Skip when using veth pairs (git-fixes).
- selftests: forwarding: tc_actions: Use ncat instead of nc (git-fixes).
- selftests: forwarding: tc_actions: cleanup temporary files when test is aborted (git-fixes).
- selftests: forwarding: tc_flower: Relax success criterion (git-fixes).
- selftests: mirror_gre_changes: Tighten up the TTL test match (git-fixes).
- serial: sc16is7xx: fix broken port 0 uart init (git-fixes).
- serial: sc16is7xx: fix bug when first setting GPIO direction (git-fixes).
- serial: sprd: Assign sprd_port after initialized to avoid wrong access (git-fixes).
- serial: sprd: Fix DMA buffer leak issue (git-fixes).
- serial: tegra: handle clk prepare error in tegra_uart_hw_init() (git-fixes).
- sfc: fix crash when reading stats while NIC is resetting (git-fixes).
- smb3: do not set NTLMSSP_VERSION flag for negotiate not auth request (bsc#1193629).
- smb: client: Fix -Wstringop-overflow issues (bsc#1193629).
- smb: client: fix dfs link mount against w2k8 (bsc#1212142).
- smb: client: fix null auth (git-fixes).
- soc: aspeed: socinfo: Add kfree for kstrdup (git-fixes).
- soundwire: bus: pm_runtime_request_resume on peripheral attachment (git-fixes).
- soundwire: fix enumeration completion (git-fixes).
- spi: tegra20-sflash: fix to check return value of platform_get_irq() in tegra_sflash_probe() (git-fixes).
- supported.conf: fix typos for -!optional markers
- swiotlb: Remove bounce buffer remapping for Hyper-V (bsc#1206453).
- target: compare and write backend driver sense handling (bsc#1177719 bsc#1213026).
- target_core_rbd: fix leak and reduce kmalloc calls (bsc#1212873).
- target_core_rbd: fix rbd_img_request.snap_id assignment (bsc#1212857).
- target_core_rbd: remove snapshot existence validation code (bsc#1212857).
- thunderbolt: Read retimer NVM authentication status prior tb_retimer_set_inbound_sbtx() (git-fixes).
- timers: Add shutdown mechanism to the internal functions (bsc#1213970).
- timers: Provide timer_shutdown[_sync]() (bsc#1213970).
- timers: Rename del_timer() to timer_delete() (bsc#1213970).
- timers: Rename del_timer_sync() to timer_delete_sync() (bsc#1213970).
- timers: Replace BUG_ON()s (bsc#1213970).
- timers: Silently ignore timers with a NULL function (bsc#1213970).
- timers: Split [try_to_]del_timer[_sync]() to prepare for shutdown mode (bsc#1213970).
- timers: Update kernel-doc for various functions (bsc#1213970).
- timers: Use del_timer_sync() even on UP (bsc#1213970).
- tracing/histograms: Add histograms to hist_vars if they have referenced variables (git-fixes).
- tracing/histograms: Return an error if we fail to add histogram to hist_vars list (git-fixes).
- tracing/probes: Fix not to count error code to total length (git-fixes).
- tracing/probes: Fix to avoid double count of the string length on the array (git-fixes).
- tracing/probes: Fix to record 0-length data_loc in fetch_store_string*() if fails (git-fixes).
- tracing/probes: Fix to update dynamic data counter if fetcharg uses it (git-fixes).
- tracing: Fix cpu buffers unavailable due to 'record_disabled' missed (git-fixes).
- tracing: Fix memleak due to race between current_tracer and trace (git-fixes).
- tracing: Fix memory leak of iter-&gt;temp when reading trace_pipe (git-fixes).
- tracing: Fix null pointer dereference in tracing_err_log_open() (git-fixes).
- tracing: Fix warning in trace_buffered_event_disable() (git-fixes).
- tty: fix hang on tty device with no_room set (git-fixes).
- tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux (git-fixes).
- tty: serial: fsl_lpuart: Add i.MXRT1050 support (git-fixes).
- tty: serial: fsl_lpuart: Clear the error flags by writing 1 for lpuart32 platforms (git-fixes).
- tty: serial: fsl_lpuart: make rx_watermark configurable for different platforms (git-fixes).
- tty: serial: fsl_lpuart: reduce RX watermark to 0 on LS1028A (git-fixes).
- ubifs: Fix memleak when insert_old_idx() failed (git-fixes).
- usb-storage: alauda: Fix uninit-value in alauda_check_media() (git-fixes).
- usb: chipidea: imx: add missing USB PHY DPDM wakeup setting (git-fixes).
- usb: chipidea: imx: do not request QoS for imx8ulp (git-fixes).
- usb: chipidea: imx: improve logic if samsung,picophy-* parameter is 0 (git-fixes).
- usb: common: usb-conn-gpio: Prevent bailing out if initial role is none (git-fixes).
- usb: dwc3: Fix typos in gadget.c (git-fixes).
- usb: dwc3: Properly handle processing of pending events (git-fixes).
- usb: dwc3: meson-g12a: do post init to fix broken usb after resumption (git-fixes).
- usb: gadget: Fix the memory leak in raw_gadget driver (git-fixes).
- usb: gadget: f_mass_storage: Fix unused variable warning (git-fixes).
- usb: gadget: u_serial: Avoid spinlock recursion in __gs_console_push (git-fixes).
- usb: ohci-at91: Fix the unhandle interrupt when resume (git-fixes).
- usb: phy: mxs: fix getting wrong state with mxs_phy_is_otg_host() (git-fixes).
- usb: quirks: add quirk for Focusrite Scarlett (git-fixes).
- usb: serial: option: add Quectel EC200A module support (git-fixes).
- usb: serial: option: support Quectel EM060K_128 (git-fixes).
- usb: serial: simple: add Kaufmann RKS+CAN VCP (git-fixes).
- usb: serial: simple: sort driver entries (git-fixes).
- usb: typec: altmodes/displayport: Signal hpd when configuring pin assignment (git-fixes).
- usb: typec: tcpm: Fix response to vsafe0V event (git-fixes).
- usb: typec: tcpm: set initial svdm version based on pd revision (git-fixes).
- usb: zaurus: Add ID for A-300/B-500/C-700 (git-fixes).
- watchdog: sp5100_tco: support Hygon FCH/SCH (Server Controller Hub) (git-fixes).
- wifi: ath10k: Use RMW accessors for changing LNKCTL (git-fixes).
- wifi: ath11k: Use RMW accessors for changing LNKCTL (git-fixes).
- wifi: ath9k: fix races between ath9k_wmi_cmd and ath9k_wmi_ctrl_rx (git-fixes).
- wifi: ath9k: protect WMI command response buffer replacement with a lock (git-fixes).
- wifi: ath9k: use IS_ERR() with debugfs_create_dir() (git-fixes).
- wifi: cfg80211: Fix return value in scan logic (git-fixes).
- wifi: cfg80211: fix sband iftype data lookup for AP_VLAN (git-fixes).
- wifi: mt76: mt7615: do not advertise 5 GHz on first phy of MT7615D (DBDC) (git-fixes).
- wifi: mt76: mt7915: fix power-limits while chan_switch (git-fixes).
- wifi: mt76: mt7921: do not support one stream on secondary antenna only (git-fixes).
- wifi: mt76: mt7921: fix non-PSC channel scan fail (git-fixes).
- wifi: mt76: testmode: add nla_policy for MT76_TM_ATTR_TX_LENGTH (git-fixes).
- wifi: mwifiex: Fix OOB and integer underflow when rx packets (git-fixes).
- wifi: mwifiex: Fix missed return in oob checks failed path (git-fixes).
- wifi: mwifiex: avoid possible NULL skb pointer dereference (git-fixes).
- wifi: mwifiex: fix error recovery in PCIE buffer descriptor management (git-fixes).
- wifi: mwifiex: fix memory leak in mwifiex_histogram_read() (git-fixes).
- wifi: nl80211/cfg80211: add forgotten nla_policy for BSS color attribute (git-fixes).
- wifi: radiotap: fix kernel-doc notation warnings (git-fixes).
- wifi: rtw89: debug: Fix error handling in rtw89_debug_priv_btc_manual_set() (git-fixes).
- x86/CPU/AMD: Disable XSAVES on AMD family 0x17 (git-fixes).
- x86/alternative: Make custom return thunk unconditional (git-fixes).
- x86/cpu/kvm: Provide UNTRAIN_RET_VM (git-fixes).
- x86/cpu: Clean up SRSO return thunk mess (git-fixes).
- x86/cpu: Cleanup the untrain mess (git-fixes).
- x86/cpu: Fix __x86_return_thunk symbol type (git-fixes).
- x86/cpu: Fix up srso_safe_ret() and __x86_return_thunk() (git-fixes).
- x86/cpu: Rename original retbleed methods (git-fixes).
- x86/cpu: Rename srso_(.*)_alias to srso_alias_\1 (git-fixes).
- x86/hyperv: Add an interface to do nested hypercalls (bsc#1206453).
- x86/hyperv: Add support for detecting nested hypervisor (bsc#1206453).
- x86/hyperv: Change vTOM handling to use standard coco mechanisms (bsc#1206453).
- x86/hyperv: Remove BUG_ON() for kmap_local_page() (bsc#1206453).
- x86/hyperv: Reorder code to facilitate future work (bsc#1206453).
- x86/hyperv: Replace kmap() with kmap_local_page() (bsc#1206453).
- x86/ioremap: Add hypervisor callback for private MMIO mapping in coco (bsc#1206453).
- x86/mce: Make sure logged MCEs are processed after sysfs update (git-fixes).
- x86/mm: Handle decryption/re-encryption of bss_decrypted consistently (bsc#1206453).
- x86/retpoline,kprobes: Fix position of thunk sections with CONFIG_LTO_CLANG (git-fixes).
- x86/retpoline,kprobes: Skip optprobe check for indirect jumps with retpolines and IBT (git-fixes).
- x86/retpoline: Do not clobber RFLAGS during srso_safe_ret() (git-fixes).
- x86/sev: Make enc_dec_hypercall() accept a size instead of npages (bsc#1214635).
- x86/speculation: Add cpu_show_gds() prototype (git-fixes).
- x86/speculation: Mark all Skylake CPUs as vulnerable to GDS (git-fixes).
- x86/srso: Correct the mitigation status when SMT is disabled (git-fixes).
- x86/srso: Disable the mitigation on unaffected configurations (git-fixes).
- x86/srso: Explain the untraining sequences a bit more (git-fixes).
- x86/srso: Fix build breakage with the LLVM linker (git-fixes).
- x86/srso: Fix return thunks in generated code (git-fixes).
- x86/static_call: Fix __static_call_fixup() (git-fixes).
- x86/tdx: Add more registers to struct tdx_hypercall_args (bsc#1206453).
- x86/tdx: Do not corrupt frame-pointer in __tdx_hypercall() (bsc#1206453).
- x86/tdx: Expand __tdx_hypercall() to handle more arguments (bsc#1206453).
- x86/tdx: Fix typo in comment in __tdx_hypercall() (bsc#1206453).
- x86/tdx: Refactor __tdx_hypercall() to allow pass down more arguments (bsc#1206453).
- xfs: fix sb write verify for lazysbcount (bsc#1214661).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2023-10-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1023051">SUSE bug 1023051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120059">SUSE bug 1120059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177719">SUSE bug 1177719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203329">SUSE bug 1203329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203330">SUSE bug 1203330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205462">SUSE bug 1205462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206453">SUSE bug 1206453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208902">SUSE bug 1208902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208949">SUSE bug 1208949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209284">SUSE bug 1209284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209799">SUSE bug 1209799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210048">SUSE bug 1210048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210448">SUSE bug 1210448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211220">SUSE bug 1211220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212091">SUSE bug 1212091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212142">SUSE bug 1212142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212423">SUSE bug 1212423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212526">SUSE bug 1212526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212857">SUSE bug 1212857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212873">SUSE bug 1212873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213026">SUSE bug 1213026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213123">SUSE bug 1213123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213546">SUSE bug 1213546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213580">SUSE bug 1213580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213601">SUSE bug 1213601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213666">SUSE bug 1213666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213733">SUSE bug 1213733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213757">SUSE bug 1213757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213759">SUSE bug 1213759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213916">SUSE bug 1213916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213921">SUSE bug 1213921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213927">SUSE bug 1213927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213946">SUSE bug 1213946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213949">SUSE bug 1213949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213968">SUSE bug 1213968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213970">SUSE bug 1213970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213971">SUSE bug 1213971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214000">SUSE bug 1214000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214019">SUSE bug 1214019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214073">SUSE bug 1214073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214120">SUSE bug 1214120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214149">SUSE bug 1214149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214180">SUSE bug 1214180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214233">SUSE bug 1214233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214238">SUSE bug 1214238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214285">SUSE bug 1214285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214297">SUSE bug 1214297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214299">SUSE bug 1214299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214305">SUSE bug 1214305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214350">SUSE bug 1214350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214368">SUSE bug 1214368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214370">SUSE bug 1214370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214371">SUSE bug 1214371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214372">SUSE bug 1214372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214380">SUSE bug 1214380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214386">SUSE bug 1214386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214392">SUSE bug 1214392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214393">SUSE bug 1214393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214397">SUSE bug 1214397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214404">SUSE bug 1214404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214428">SUSE bug 1214428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214451">SUSE bug 1214451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214635">SUSE bug 1214635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214659">SUSE bug 1214659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214661">SUSE bug 1214661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214727">SUSE bug 1214727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214729">SUSE bug 1214729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214742">SUSE bug 1214742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214743">SUSE bug 1214743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214756">SUSE bug 1214756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214976">SUSE bug 1214976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215522">SUSE bug 1215522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215523">SUSE bug 1215523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215552">SUSE bug 1215552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215553">SUSE bug 1215553</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38457/">CVE-2022-38457 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38457">CVE-2022-38457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40133/">CVE-2022-40133 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40133">CVE-2022-40133 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-2007/">CVE-2023-2007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2007">CVE-2023-2007 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20588/">CVE-2023-20588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20588">CVE-2023-20588 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34319/">CVE-2023-34319 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34319">CVE-2023-34319 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3610/">CVE-2023-3610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3610">CVE-2023-3610 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37453/">CVE-2023-37453 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37453">CVE-2023-37453 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3772/">CVE-2023-3772 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3772">CVE-2023-3772 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3863/">CVE-2023-3863 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3863">CVE-2023-3863 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40283/">CVE-2023-40283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40283">CVE-2023-40283 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4128/">CVE-2023-4128 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4128">CVE-2023-4128 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4133/">CVE-2023-4133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4133">CVE-2023-4133 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4134/">CVE-2023-4134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4134">CVE-2023-4134 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4147/">CVE-2023-4147 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4147">CVE-2023-4147 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4194/">CVE-2023-4194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4194">CVE-2023-4194 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4273/">CVE-2023-4273 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4273">CVE-2023-4273 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4387/">CVE-2023-4387 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4387">CVE-2023-4387 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4459/">CVE-2023-4459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4459">CVE-2023-4459 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4563/">CVE-2023-4563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4563">CVE-2023-4563 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4569/">CVE-2023-4569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4569">CVE-2023-4569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009798703" comment="cluster-md-kmp-64kb-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798704" comment="cluster-md-kmp-default-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798705" comment="dlm-kmp-64kb-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798706" comment="dlm-kmp-default-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798707" comment="dtb-allwinner-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798708" comment="dtb-altera-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798709" comment="dtb-amazon-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798710" comment="dtb-amd-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798711" comment="dtb-amlogic-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798712" comment="dtb-apm-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798713" comment="dtb-apple-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798714" comment="dtb-arm-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798715" comment="dtb-broadcom-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798716" comment="dtb-cavium-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798717" comment="dtb-exynos-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798718" comment="dtb-freescale-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798719" comment="dtb-hisilicon-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798720" comment="dtb-lg-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798721" comment="dtb-marvell-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798722" comment="dtb-mediatek-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798723" comment="dtb-nvidia-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798724" comment="dtb-qcom-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798725" comment="dtb-renesas-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798726" comment="dtb-rockchip-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798727" comment="dtb-socionext-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798728" comment="dtb-sprd-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798729" comment="dtb-xilinx-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798730" comment="gfs2-kmp-64kb-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798731" comment="gfs2-kmp-default-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798732" comment="kernel-64kb-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798733" comment="kernel-64kb-devel-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798734" comment="kernel-64kb-extra-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798735" comment="kernel-64kb-livepatch-devel-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798736" comment="kernel-64kb-optional-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798737" comment="kernel-debug-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798738" comment="kernel-debug-devel-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798739" comment="kernel-debug-livepatch-devel-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798740" comment="kernel-debug-vdso-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798741" comment="kernel-default-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798742" comment="kernel-default-base-5.14.21-150500.55.28.1.150500.6.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798743" comment="kernel-default-base-rebuild-5.14.21-150500.55.28.1.150500.6.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798744" comment="kernel-default-devel-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798745" comment="kernel-default-extra-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798746" comment="kernel-default-livepatch-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798747" comment="kernel-default-livepatch-devel-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798748" comment="kernel-default-optional-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798749" comment="kernel-default-vdso-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798750" comment="kernel-devel-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798751" comment="kernel-docs-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798752" comment="kernel-docs-html-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798753" comment="kernel-kvmsmall-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798754" comment="kernel-kvmsmall-devel-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798755" comment="kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798756" comment="kernel-kvmsmall-vdso-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798757" comment="kernel-macros-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798758" comment="kernel-obs-build-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798759" comment="kernel-obs-qa-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798760" comment="kernel-source-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798761" comment="kernel-source-vanilla-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798762" comment="kernel-syms-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798763" comment="kernel-zfcpdump-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798764" comment="kselftests-kmp-64kb-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798765" comment="kselftests-kmp-default-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798766" comment="ocfs2-kmp-64kb-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798767" comment="ocfs2-kmp-default-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798768" comment="reiserfs-kmp-64kb-5.14.21-150500.55.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798769" comment="reiserfs-kmp-default-5.14.21-150500.55.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4421" version="1" class="patch">
	<metadata>
		<title>Security update for python-reportlab (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215560" ref_url="https://bugzilla.suse.com/1215560" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19450" ref_url="https://www.suse.com/security/cve/CVE-2019-19450/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016511.html" source="SUSE-SU"/>
		<description>
This update for python-reportlab fixes the following issues:

- CVE-2019-19450: Fixed an issue which allowed remote code execution via start_unichar in paraparser.py evaluating untrusted user input. (bsc#1215560)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-04"/>
	<updated date="2023-10-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215560">SUSE bug 1215560</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-19450/">CVE-2019-19450 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-19450">CVE-2019-19450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799717" comment="python3-reportlab-3.4.0-150000.3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4422" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215466" ref_url="https://bugzilla.suse.com/1215466" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-43115" ref_url="https://www.suse.com/security/cve/CVE-2023-43115/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016546.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2023-43115: Fixed remote code execution via crafted PostScript documents in gdevijs.c (bsc#1215466).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2023-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215466">SUSE bug 1215466</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-43115/">CVE-2023-43115 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43115">CVE-2023-43115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009796806" comment="ghostscript-9.52-150000.173.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796807" comment="ghostscript-devel-9.52-150000.173.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009796808" comment="ghostscript-x11-9.52-150000.173.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4423" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1023051" ref_url="https://bugzilla.suse.com/1023051" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1120059" ref_url="https://bugzilla.suse.com/1120059" source="BUGZILLA"/>
		<reference ref_id="1177719" ref_url="https://bugzilla.suse.com/1177719" source="BUGZILLA"/>
		<reference ref_id="1187236" ref_url="https://bugzilla.suse.com/1187236" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1203329" ref_url="https://bugzilla.suse.com/1203329" source="BUGZILLA"/>
		<reference ref_id="1203330" ref_url="https://bugzilla.suse.com/1203330" source="BUGZILLA"/>
		<reference ref_id="1205462" ref_url="https://bugzilla.suse.com/1205462" source="BUGZILLA"/>
		<reference ref_id="1206453" ref_url="https://bugzilla.suse.com/1206453" source="BUGZILLA"/>
		<reference ref_id="1208902" ref_url="https://bugzilla.suse.com/1208902" source="BUGZILLA"/>
		<reference ref_id="1208949" ref_url="https://bugzilla.suse.com/1208949" source="BUGZILLA"/>
		<reference ref_id="1208995" ref_url="https://bugzilla.suse.com/1208995" source="BUGZILLA"/>
		<reference ref_id="1209284" ref_url="https://bugzilla.suse.com/1209284" source="BUGZILLA"/>
		<reference ref_id="1209799" ref_url="https://bugzilla.suse.com/1209799" source="BUGZILLA"/>
		<reference ref_id="1210048" ref_url="https://bugzilla.suse.com/1210048" source="BUGZILLA"/>
		<reference ref_id="1210169" ref_url="https://bugzilla.suse.com/1210169" source="BUGZILLA"/>
		<reference ref_id="1210448" ref_url="https://bugzilla.suse.com/1210448" source="BUGZILLA"/>
		<reference ref_id="1210643" ref_url="https://bugzilla.suse.com/1210643" source="BUGZILLA"/>
		<reference ref_id="1211220" ref_url="https://bugzilla.suse.com/1211220" source="BUGZILLA"/>
		<reference ref_id="1212091" ref_url="https://bugzilla.suse.com/1212091" source="BUGZILLA"/>
		<reference ref_id="1212142" ref_url="https://bugzilla.suse.com/1212142" source="BUGZILLA"/>
		<reference ref_id="1212423" ref_url="https://bugzilla.suse.com/1212423" source="BUGZILLA"/>
		<reference ref_id="1212526" ref_url="https://bugzilla.suse.com/1212526" source="BUGZILLA"/>
		<reference ref_id="1212857" ref_url="https://bugzilla.suse.com/1212857" source="BUGZILLA"/>
		<reference ref_id="1212873" ref_url="https://bugzilla.suse.com/1212873" source="BUGZILLA"/>
		<reference ref_id="1213026" ref_url="https://bugzilla.suse.com/1213026" source="BUGZILLA"/>
		<reference ref_id="1213123" ref_url="https://bugzilla.suse.com/1213123" source="BUGZILLA"/>
		<reference ref_id="1213546" ref_url="https://bugzilla.suse.com/1213546" source="BUGZILLA"/>
		<reference ref_id="1213580" ref_url="https://bugzilla.suse.com/1213580" source="BUGZILLA"/>
		<reference ref_id="1213601" ref_url="https://bugzilla.suse.com/1213601" source="BUGZILLA"/>
		<reference ref_id="1213666" ref_url="https://bugzilla.suse.com/1213666" source="BUGZILLA"/>
		<reference ref_id="1213733" ref_url="https://bugzilla.suse.com/1213733" source="BUGZILLA"/>
		<reference ref_id="1213757" ref_url="https://bugzilla.suse.com/1213757" source="BUGZILLA"/>
		<reference ref_id="1213759" ref_url="https://bugzilla.suse.com/1213759" source="BUGZILLA"/>
		<reference ref_id="1213916" ref_url="https://bugzilla.suse.com/1213916" source="BUGZILLA"/>
		<reference ref_id="1213921" ref_url="https://bugzilla.suse.com/1213921" source="BUGZILLA"/>
		<reference ref_id="1213927" ref_url="https://bugzilla.suse.com/1213927" source="BUGZILLA"/>
		<reference ref_id="1213946" ref_url="https://bugzilla.suse.com/1213946" source="BUGZILLA"/>
		<reference ref_id="1213949" ref_url="https://bugzilla.suse.com/1213949" source="BUGZILLA"/>
		<reference ref_id="1213968" ref_url="https://bugzilla.suse.com/1213968" source="BUGZILLA"/>
		<reference ref_id="1213970" ref_url="https://bugzilla.suse.com/1213970" source="BUGZILLA"/>
		<reference ref_id="1213971" ref_url="https://bugzilla.suse.com/1213971" source="BUGZILLA"/>
		<reference ref_id="1214000" ref_url="https://bugzilla.suse.com/1214000" source="BUGZILLA"/>
		<reference ref_id="1214019" ref_url="https://bugzilla.suse.com/1214019" source="BUGZILLA"/>
		<reference ref_id="1214073" ref_url="https://bugzilla.suse.com/1214073" source="BUGZILLA"/>
		<reference ref_id="1214120" ref_url="https://bugzilla.suse.com/1214120" source="BUGZILLA"/>
		<reference ref_id="1214149" ref_url="https://bugzilla.suse.com/1214149" source="BUGZILLA"/>
		<reference ref_id="1214180" ref_url="https://bugzilla.suse.com/1214180" source="BUGZILLA"/>
		<reference ref_id="1214233" ref_url="https://bugzilla.suse.com/1214233" source="BUGZILLA"/>
		<reference ref_id="1214238" ref_url="https://bugzilla.suse.com/1214238" source="BUGZILLA"/>
		<reference ref_id="1214285" ref_url="https://bugzilla.suse.com/1214285" source="BUGZILLA"/>
		<reference ref_id="1214297" ref_url="https://bugzilla.suse.com/1214297" source="BUGZILLA"/>
		<reference ref_id="1214299" ref_url="https://bugzilla.suse.com/1214299" source="BUGZILLA"/>
		<reference ref_id="1214305" ref_url="https://bugzilla.suse.com/1214305" source="BUGZILLA"/>
		<reference ref_id="1214350" ref_url="https://bugzilla.suse.com/1214350" source="BUGZILLA"/>
		<reference ref_id="1214368" ref_url="https://bugzilla.suse.com/1214368" source="BUGZILLA"/>
		<reference ref_id="1214370" ref_url="https://bugzilla.suse.com/1214370" source="BUGZILLA"/>
		<reference ref_id="1214371" ref_url="https://bugzilla.suse.com/1214371" source="BUGZILLA"/>
		<reference ref_id="1214372" ref_url="https://bugzilla.suse.com/1214372" source="BUGZILLA"/>
		<reference ref_id="1214380" ref_url="https://bugzilla.suse.com/1214380" source="BUGZILLA"/>
		<reference ref_id="1214386" ref_url="https://bugzilla.suse.com/1214386" source="BUGZILLA"/>
		<reference ref_id="1214392" ref_url="https://bugzilla.suse.com/1214392" source="BUGZILLA"/>
		<reference ref_id="1214393" ref_url="https://bugzilla.suse.com/1214393" source="BUGZILLA"/>
		<reference ref_id="1214397" ref_url="https://bugzilla.suse.com/1214397" source="BUGZILLA"/>
		<reference ref_id="1214404" ref_url="https://bugzilla.suse.com/1214404" source="BUGZILLA"/>
		<reference ref_id="1214428" ref_url="https://bugzilla.suse.com/1214428" source="BUGZILLA"/>
		<reference ref_id="1214451" ref_url="https://bugzilla.suse.com/1214451" source="BUGZILLA"/>
		<reference ref_id="1214635" ref_url="https://bugzilla.suse.com/1214635" source="BUGZILLA"/>
		<reference ref_id="1214659" ref_url="https://bugzilla.suse.com/1214659" source="BUGZILLA"/>
		<reference ref_id="1214661" ref_url="https://bugzilla.suse.com/1214661" source="BUGZILLA"/>
		<reference ref_id="1214727" ref_url="https://bugzilla.suse.com/1214727" source="BUGZILLA"/>
		<reference ref_id="1214729" ref_url="https://bugzilla.suse.com/1214729" source="BUGZILLA"/>
		<reference ref_id="1214742" ref_url="https://bugzilla.suse.com/1214742" source="BUGZILLA"/>
		<reference ref_id="1214743" ref_url="https://bugzilla.suse.com/1214743" source="BUGZILLA"/>
		<reference ref_id="1214756" ref_url="https://bugzilla.suse.com/1214756" source="BUGZILLA"/>
		<reference ref_id="1214813" ref_url="https://bugzilla.suse.com/1214813" source="BUGZILLA"/>
		<reference ref_id="1214873" ref_url="https://bugzilla.suse.com/1214873" source="BUGZILLA"/>
		<reference ref_id="1214928" ref_url="https://bugzilla.suse.com/1214928" source="BUGZILLA"/>
		<reference ref_id="1214976" ref_url="https://bugzilla.suse.com/1214976" source="BUGZILLA"/>
		<reference ref_id="1214988" ref_url="https://bugzilla.suse.com/1214988" source="BUGZILLA"/>
		<reference ref_id="1215123" ref_url="https://bugzilla.suse.com/1215123" source="BUGZILLA"/>
		<reference ref_id="1215124" ref_url="https://bugzilla.suse.com/1215124" source="BUGZILLA"/>
		<reference ref_id="1215148" ref_url="https://bugzilla.suse.com/1215148" source="BUGZILLA"/>
		<reference ref_id="1215221" ref_url="https://bugzilla.suse.com/1215221" source="BUGZILLA"/>
		<reference ref_id="1215523" ref_url="https://bugzilla.suse.com/1215523" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-38457" ref_url="https://www.suse.com/security/cve/CVE-2022-38457/" source="CVE"/>
		<reference ref_id="CVE-2022-40133" ref_url="https://www.suse.com/security/cve/CVE-2022-40133/" source="CVE"/>
		<reference ref_id="CVE-2023-1192" ref_url="https://www.suse.com/security/cve/CVE-2023-1192/" source="CVE"/>
		<reference ref_id="CVE-2023-1859" ref_url="https://www.suse.com/security/cve/CVE-2023-1859/" source="CVE"/>
		<reference ref_id="CVE-2023-2007" ref_url="https://www.suse.com/security/cve/CVE-2023-2007/" source="CVE"/>
		<reference ref_id="CVE-2023-20588" ref_url="https://www.suse.com/security/cve/CVE-2023-20588/" source="CVE"/>
		<reference ref_id="CVE-2023-2177" ref_url="https://www.suse.com/security/cve/CVE-2023-2177/" source="CVE"/>
		<reference ref_id="CVE-2023-34319" ref_url="https://www.suse.com/security/cve/CVE-2023-34319/" source="CVE"/>
		<reference ref_id="CVE-2023-3610" ref_url="https://www.suse.com/security/cve/CVE-2023-3610/" source="CVE"/>
		<reference ref_id="CVE-2023-37453" ref_url="https://www.suse.com/security/cve/CVE-2023-37453/" source="CVE"/>
		<reference ref_id="CVE-2023-3772" ref_url="https://www.suse.com/security/cve/CVE-2023-3772/" source="CVE"/>
		<reference ref_id="CVE-2023-3863" ref_url="https://www.suse.com/security/cve/CVE-2023-3863/" source="CVE"/>
		<reference ref_id="CVE-2023-40283" ref_url="https://www.suse.com/security/cve/CVE-2023-40283/" source="CVE"/>
		<reference ref_id="CVE-2023-4128" ref_url="https://www.suse.com/security/cve/CVE-2023-4128/" source="CVE"/>
		<reference ref_id="CVE-2023-4133" ref_url="https://www.suse.com/security/cve/CVE-2023-4133/" source="CVE"/>
		<reference ref_id="CVE-2023-4134" ref_url="https://www.suse.com/security/cve/CVE-2023-4134/" source="CVE"/>
		<reference ref_id="CVE-2023-4147" ref_url="https://www.suse.com/security/cve/CVE-2023-4147/" source="CVE"/>
		<reference ref_id="CVE-2023-4194" ref_url="https://www.suse.com/security/cve/CVE-2023-4194/" source="CVE"/>
		<reference ref_id="CVE-2023-4273" ref_url="https://www.suse.com/security/cve/CVE-2023-4273/" source="CVE"/>
		<reference ref_id="CVE-2023-4387" ref_url="https://www.suse.com/security/cve/CVE-2023-4387/" source="CVE"/>
		<reference ref_id="CVE-2023-4459" ref_url="https://www.suse.com/security/cve/CVE-2023-4459/" source="CVE"/>
		<reference ref_id="CVE-2023-4563" ref_url="https://www.suse.com/security/cve/CVE-2023-4563/" source="CVE"/>
		<reference ref_id="CVE-2023-4569" ref_url="https://www.suse.com/security/cve/CVE-2023-4569/" source="CVE"/>
		<reference ref_id="CVE-2023-4881" ref_url="https://www.suse.com/security/cve/CVE-2023-4881/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-38457: Fixed a use-after-free vulnerability in vmwgfx driver that allowed a local attacker to cause a denial of service (bsc#1203330).
- CVE-2022-40133: Fixed a use-after-free vulnerability in vmwgfx driver that allowed a local attacker to cause a denial of service (bsc#1203329).
- CVE-2023-1192: Fixed use-after-free in cifs_demultiplex_thread() (bsc#1208995  CVE-2023-1192).
- CVE-2023-1859: Fixed a use-after-free flaw in xen_9pfs_front_removet that could lead to system crash and kernel information leak (bsc#1210169).
- CVE-2023-2007: Fixed a flaw in the DPT I2O Controller driver that could allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel (bsc#1210448).
- CVE-2023-20588: Fixed a division-by-zero error on some AMD processors that can potentially return speculative data resulting in loss of confidentiality (bsc#1213927).
- CVE-2023-2177: Fixed null pointer dereference issue in the sctp network protocol that could lead to system crash or DoS (bsc#1210643).
- CVE-2023-34319: Fixed buffer overrun triggered by unusual packet in xen/netback (XSA-432) (bsc#1213546).
- CVE-2023-3610: Fixed use-after-free vulnerability in nf_tables can be exploited to achieve local privilege escalation (bsc#1213580).
- CVE-2023-37453: Fixed oversight in SuperSpeed initialization  (bsc#1213123).
- CVE-2023-3772: Fixed a flaw in XFRM subsystem that may have allowed a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer leading to a possible kernel crash and denial of service (bsc#1213666).
- CVE-2023-3863: Fixed a use-after-free flaw was found in nfc_llcp_find_local that allowed a local user with special privileges to impact a kernel information leak issue (bsc#1213601).
- CVE-2023-40283: Fixed use-after-free in l2cap_sock_ready_cb (bsc#1214233).
- CVE-2023-4128: Fixed a use-after-free flaw in net/sched/cls_fw.c that allowed a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue (bsc#1214149).
- CVE-2023-4133: Fixed use after free bugs caused by circular dependency problem in cxgb4 (bsc#1213970).
- CVE-2023-4134: Fixed use-after-free in cyttsp4_watchdog_work() (bsc#1213971).
- CVE-2023-4147: Fixed use-after-free in nf_tables_newrule (bsc#1213968).
- CVE-2023-4194: Fixed a type confusion in net tun_chr_open() (bsc#1214019).
- CVE-2023-4273: Fixed a flaw in the exFAT driver of the Linux kernel that alloawed a local privileged attacker to overflow the kernel stack (bsc#1214120).
- CVE-2023-4387: Fixed use-after-free flaw in vmxnet3_rq_alloc_rx_buf that could allow a local attacker to crash the system due to a double-free (bsc#1214350).
- CVE-2023-4459: Fixed a NULL pointer dereference flaw in vmxnet3_rq_cleanup that may have allowed a local attacker with normal user privilege to cause a denial of service (bsc#1214451).
- CVE-2023-4563: Fixed use-after-free in nft_verdict_dump due to a race between set GC and transaction (bsc#1214727).
- CVE-2023-4569: Fixed information leak in nft_set_catchall_flush in net/netfilter/nf_tables_api.c (bsc#1214729).
- CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221).

The following non-security bugs were fixed:

- ACPI/IORT: Update SMMUv3 DeviceID support (bsc#1214305).
- ACPI: processor: perflib: Avoid updating frequency QoS unnecessarily (git-fixes).
- ACPI: processor: perflib: Use the 'no limit' frequency QoS (git-fixes).
- ACPI: x86: s2idle: Fix a logic error parsing AMD constraints table (git-fixes).
- ALSA: ac97: Fix possible error value of *rac97 (git-fixes).
- ALSA: hda/cirrus: Fix broken audio on hardware with two CS42L42 codecs (git-fixes).
- ALSA: hda/cs8409: Support new Dell Dolphin Variants (git-fixes).
- ALSA: hda/realtek - Remodified 3k pull low procedure (git-fixes).
- ALSA: hda/realtek: Add quirk for HP Victus 16-d1xxx to enable mute LED (git-fixes).
- ALSA: hda/realtek: Add quirk for mute LEDs on HP ENVY x360 15-eu0xxx (git-fixes).
- ALSA: hda/realtek: Add quirks for HP G11 Laptops (git-fixes).
- ALSA: hda/realtek: Switch Dell Oasis models to use SPI (git-fixes).
- ALSA: pcm: Fix missing fixup call in compat hw_refine ioctl (git-fixes).
- ALSA: usb-audio: Add support for Mythware XA001AU capture and playback interfaces (git-fixes).
- ALSA: usb-audio: Fix init call orders for UAC1 (git-fixes).
- ALSA: ymfpci: Fix the missing snd_card_free() call at probe error (git-fixes).
- ARM: dts: imx6dl: prtrvt, prtvt7, prti6q, prtwd2: fix USB related warnings (git-fixes).
- ARM: dts: imx6sll: fixup of operating points (git-fixes).
- ARM: pxa: remove use of symbol_get() (git-fixes).
- ARM: spear: Do not use timer namespace for timer_shutdown() function (bsc#1213970).
- ASoC: SOF: Intel: fix SoundWire/HDaudio mutual exclusion (git-fixes).
- ASoC: amd: yc: Fix a non-functional mic on Lenovo 82SJ (git-fixes).
- ASoC: lower 'no backend DAIs enabled for ... Port' log severity (git-fixes).
- ASoC: meson: axg-tdm-formatter: fix channel slot allocation (git-fixes).
- ASoC: rt5665: add missed regulator_bulk_disable (git-fixes).
- ASoC: stac9766: fix build errors with REGMAP_AC97 (git-fixes).
- ASoC: tegra: Fix SFC conversion for few rates (git-fixes).
- Bluetooth: Fix potential use-after-free when clear keys (git-fixes).
- Bluetooth: L2CAP: Fix use-after-free (git-fixes).
- Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb (git-fixes).
- Bluetooth: Remove unused declaration amp_read_loc_info() (git-fixes).
- Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition (git-fixes).
- Bluetooth: btusb: Add MT7922 bluetooth ID for the Asus Ally (git-fixes).
- Bluetooth: btusb: Do not call kfree_skb() under spin_lock_irqsave() (git-fixes).
- Bluetooth: nokia: fix value check in nokia_bluetooth_serdev_probe() (git-fixes).
- CONFIG_NVME_VERBOSE_ERRORS=y     gone with a82baa8083b
- CONFIG_PRINTK_SAFE_LOG_BUF_SHIFT=13  gone with 7e152d55123
- Documentation: devices.txt: Fix minors for ttyCPM* (git-fixes).
- Documentation: devices.txt: Remove ttyIOC* (git-fixes).
- Documentation: devices.txt: Remove ttySIOC* (git-fixes).
- Drivers: hv: Do not remap addresses that are above shared_gpa_boundary (bsc#1206453).
- Drivers: hv: Enable vmbus driver for nested root partition (bsc#1206453).
- Drivers: hv: Explicitly request decrypted in vmap_pfn() calls (bsc#1206453).
- Drivers: hv: Setup synic registers in case of nested root partition (bsc#1206453).
- Drivers: hv: vmbus: Call hv_synic_free() if hv_synic_alloc() fails (bsc#1206453).
- Drivers: hv: vmbus: Remove second mapping of VMBus monitor pages (bsc#1206453).
- Drivers: hv: vmbus: Remove second way of mapping ring buffers (bsc#1206453).
- Drivers: hv: vmbus: Remove the per-CPU post_msg_page (bsc#1206453).
- Drop amdgpu patch causing spamming (bsc#1215523)
- Drop cfg80211 lock fix patches that caused a regression (bsc#1213757)
- Drop rtsx patch that caused a regression (bsc#1214397,bsc#1214428)
- Enable Analog Devices Industrial Ethernet PHY driver (jsc#PED-4759)
- HID: add quirk for 03f0:464a HP Elite Presenter Mouse (git-fixes).
- HID: logitech-dj: Fix error handling in logi_dj_recv_switch_to_dj_mode() (git-fixes).
- HID: logitech-hidpp: Add USB and Bluetooth IDs for the Logitech G915 TKL Keyboard (git-fixes).
- HID: multitouch: Correct devm device reference for hidinput input_dev name (git-fixes).
- HID: wacom: remove the battery when the EKR is off (git-fixes).
- HWPOISON: offline support: fix spelling in Documentation/ABI/ (git-fixes).
- IB/hfi1: Fix possible panic during hotplug remove (git-fixes)
- IB/uverbs: Fix an potential error pointer dereference (git-fixes)
- Input: exc3000 - properly stop timer on shutdown (git-fixes).
- Input: tca6416-keypad - fix interrupt enable disbalance (git-fixes).
- KVM: SVM: Remove a duplicate definition of VMCB_AVIC_APIC_BAR_MASK (git-fixes).
- KVM: VMX: Fix header file dependency of asm/vmx.h (git-fixes).
- KVM: s390: fix sthyi error handling (git-fixes bsc#1214370).
- Kbuild: add -Wno-shift-negative-value where -Wextra is used (bsc#1214756).
- Kbuild: move to -std=gnu11 (bsc#1214756).
- PCI/ASPM: Avoid link retraining race (git-fixes).
- PCI/ASPM: Factor out pcie_wait_for_retrain() (git-fixes).
- PCI/ASPM: Return 0 or -ETIMEDOUT from pcie_retrain_link() (git-fixes).
- PCI: Free released resource after coalescing (git-fixes).
- PCI: Mark NVIDIA T4 GPUs to avoid bus reset (git-fixes).
- PCI: acpiphp: Reassign resources on bridge if necessary (git-fixes).
- PCI: acpiphp: Use pci_assign_unassigned_bridge_resources() only for non-root bus (git-fixes).
- PCI: hv: Enable PCI pass-thru devices in Confidential VMs (bsc#1206453).
- PCI: hv: Replace retarget_msi_interrupt_params with (bsc#1206453).
- PCI: meson: Remove cast between incompatible function type (git-fixes).
- PCI: microchip: Correct the DED and SEC interrupt bit offsets (git-fixes).
- PCI: microchip: Remove cast between incompatible function type (git-fixes).
- PCI: pciehp: Use RMW accessors for changing LNKCTL (git-fixes).
- PCI: rockchip: Remove writes to unused registers (git-fixes).
- PCI: s390: Fix use-after-free of PCI resources with per-function hotplug (git-fixes).
- PCI: tegra194: Fix possible array out of bounds access (git-fixes).
- PM / devfreq: Fix leak in devfreq_dev_release() (git-fixes).
- RDMA/bnxt_re: Fix error handling in probe failure path (git-fixes)
- RDMA/bnxt_re: Fix max_qp count for virtual functions (git-fixes)
- RDMA/efa: Fix wrong resources deallocation order (git-fixes)
- RDMA/hns: Fix CQ and QP cache affinity (git-fixes)
- RDMA/hns: Fix incorrect post-send with direct wqe of wr-list (git-fixes)
- RDMA/hns: Fix port active speed (git-fixes)
- RDMA/irdma: Prevent zero-length STAG registration (git-fixes)
- RDMA/irdma: Replace one-element array with flexible-array member (git-fixes)
- RDMA/mlx5: Return the firmware result upon destroying QP/RQ (git-fixes)
- RDMA/qedr: Remove a duplicate assignment in irdma_query_ah() (git-fixes)
- RDMA/siw: Balance the reference of cep-&gt;kref in the error path (git-fixes)
- RDMA/siw: Correct wrong debug message (git-fixes)
- RDMA/umem: Set iova in ODP flow (git-fixes)
- README.BRANCH: Add Miroslav Franc as a SLE15-SP4 co-maintainer.
- Revert 'IB/isert: Fix incorrect release of isert connection' (git-fixes)
- Revert 'PCI: Mark NVIDIA T4 GPUs to avoid bus reset' (git-fixes).
- Revert 'scsi: qla2xxx: Fix buffer overrun' (bsc#1214928).
- Revert 'tracing: Add '(fault)' name injection to kernel probes' (git-fixes).
- Update patches.suse/cpufreq-intel_pstate-Fix-cpu-pstate.turbo_freq-initi.patch (git-fixes bsc#1212526 bsc#1214368 jsc#PED-4927 jsc#PED-4929).
- amba: bus: fix refcount leak (git-fixes).
- arm64/hyperv: Use CPUHP_AP_HYPERV_ONLINE state to fix CPU online sequencing (bsc#1206453).
- arm64: csum: Fix OoB access in IP checksum code for negative lengths (git-fixes).
- arm64: dts: imx8mn-var-som: add missing pull-up for onboard PHY reset pinmux (git-fixes).
- arm64: dts: qcom: qrb5165-rb5: fix thermal zone conflict (git-fixes).
- arm64: dts: rockchip: Disable HS400 for eMMC on ROCK Pi 4 (git-fixes).
- ata: libata: disallow dev-initiated LPM transitions to unsupported states (git-fixes).
- ata: pata_falcon: fix IO base selection for Q40 (git-fixes).
- ata: pata_ftide010: Add missing MODULE_DESCRIPTION (git-fixes).
- ata: sata_gemini: Add missing MODULE_DESCRIPTION (git-fixes).
- audit: fix possible soft lockup in __audit_inode_child() (git-fixes).
- backlight/bd6107: Compare against struct fb_info.device (git-fixes).
- backlight/gpio_backlight: Compare against struct fb_info.device (git-fixes).
- backlight/lv5207lp: Compare against struct fb_info.device (git-fixes).
- backlight: gpio_backlight: Drop output GPIO direction check for initial power state (git-fixes).
- batman-adv: Do not get eth header before batadv_check_management_packet (git-fixes).
- batman-adv: Do not increase MTU when set by user (git-fixes).
- batman-adv: Fix TT global entry leak when client roamed back (git-fixes).
- batman-adv: Fix batadv_v_ogm_aggr_send memory leak (git-fixes).
- batman-adv: Hold rtnl lock during MTU update via netlink (git-fixes).
- batman-adv: Trigger events for auto adjusted MTU (git-fixes).
- bnx2x: fix page fault following EEH recovery (bsc#1214299).
- bpf: Clear the probe_addr for uprobe (git-fixes).
- bpf: Disable preemption in bpf_event_output (git-fixes).
- bpftool: Print newline before '}' for struct with padding only fields (bsc#1211220 jsc#PED-3924).
- btrfs: do not hold CPU for too long when defragging a file (bsc#1214988).
- bus: mhi: host: Skip MHI reset if device is in RDDM (git-fixes).
- bus: ti-sysc: Fix build warning for 64-bit build (git-fixes).
- bus: ti-sysc: Fix cast to enum warning (git-fixes).
- bus: ti-sysc: Flush posted write on enable before reset (git-fixes).
- can: gs_usb: gs_usb_receive_bulk_callback(): count RX overflow errors also in case of OOM (git-fixes).
- ceph: defer stopping mdsc delayed_work (bsc#1214392).
- ceph: do not check for quotas on MDS stray dirs (bsc#1214238).
- ceph: never send metrics if disable_send_metrics is set (bsc#1214180).
- check-for-config-changes: ignore BUILTIN_RETURN_ADDRESS_STRIPS_PAC (bsc#1214380). gcc7 on SLE 15 does not support this while later gcc does.
- cifs: add missing return value check for cifs_sb_tlink (bsc#1193629).
- cifs: allow dumping keys for directories too (bsc#1193629).
- cifs: fix mid leak during reconnection after timeout threshold (git-fixes).
- cifs: if deferred close is disabled then close files immediately (git-fixes).
- cifs: is_network_name_deleted should return a bool (bsc#1193629).
- cifs: update internal module version number for cifs.ko (bsc#1193629).
- clk: Fix slab-out-of-bounds error in devm_clk_release() (git-fixes).
- clk: Fix undefined reference to `clk_rate_exclusive_{get,put}' (git-fixes).
- clk: imx8mp: fix sai4 clock (git-fixes).
- clk: imx: composite-8m: fix clock pauses when set_rate would be a no-op (git-fixes).
- clk: imx: pll14xx: dynamically configure PLL for 393216000/361267200Hz (git-fixes).
- clk: qcom: camcc-sc7180: fix async resume during probe (git-fixes).
- clk: qcom: gcc-mdm9615: use proper parent for pll0_vote clock (git-fixes).
- clk: qcom: gcc-sc7180: Fix up gcc_sdcc2_apps_clk_src (git-fixes).
- clk: qcom: gcc-sm8250: Fix gcc_sdcc2_apps_clk_src (git-fixes).
- clk: sunxi-ng: Modify mismatched function name (git-fixes).
- clocksource/drivers/arm_arch_timer: Do not use timer namespace for timer_shutdown() function (bsc#1213970).
- clocksource/drivers/hyper-v: Rework clocksource and sched clock setup (bsc#1206453).
- clocksource/drivers/sp804: Do not use timer namespace for timer_shutdown() function (bsc#1213970).
- clocksource: hyper-v: Add TSC page support for root partition (bsc#1206453).
- clocksource: hyper-v: Introduce TSC PFN getter (bsc#1206453).
- clocksource: hyper-v: Introduce a pointer to TSC page (bsc#1206453).
- clocksource: hyper-v: Use TSC PFN getter to map vvar page (bsc#1206453).
- clocksource: hyper-v: make sure Invariant-TSC is used if it is (bsc#1206453).
- cpu/SMT: Allow enabling partial SMT states via sysfs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/SMT: Create topology_smt_thread_allowed() (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/SMT: Move SMT prototypes into cpu_smt.h (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/SMT: Move smt/control simple exit cases earlier (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/SMT: Remove topology_smt_supported() (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpu/SMT: Store the current/max number of threads (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- cpufreq: Fix the race condition while updating the transition_task of policy (git-fixes).
- cpufreq: intel_pstate: Adjust balance_performance EPP for Sapphire Rapids (bsc#1214659).
- cpufreq: intel_pstate: Enable HWP IO boost for all servers (bsc#1208949 jsc#PED-6003 jsc#PED-6004).
- cpufreq: intel_pstate: Fix scaling for hybrid-capable systems with disabled E-cores (bsc#1212526 bsc#1214368 jsc#PED-4927 jsc#PED-4929).
- cpufreq: intel_pstate: Read all MSRs on the target CPU (bsc#1212526 bsc#1214368 jsc#PED-4927 jsc#PED-4929).
- cpufreq: intel_pstate: hybrid: Rework HWP calibration (bsc#1212526 bsc#1214368 jsc#PED-4927 jsc#PED-4929).
- cpufreq: intel_pstate: hybrid: Use known scaling factor for P-cores (bsc#1212526 bsc#1214368 jsc#PED-4927 jsc#PED-4929).
- crypto: caam - fix unchecked return value error (git-fixes).
- crypto: stm32 - Properly handle pm_runtime_get failing (git-fixes).
- define more Hyper-V related constants (bsc#1206453).
- dma-buf/sw_sync: Avoid recursive lock during fence signal (git-fixes).
- dma-buf/sync_file: Fix docs syntax (git-fixes).
- dmaengine: idxd: Modify the dependence of attribute pasid_enabled (git-fixes).
- dmaengine: mcf-edma: Fix a potential un-allocated memory access (git-fixes).
- dmaengine: pl330: Return DMA_PAUSED when transaction is paused (git-fixes).
- dmaengine: ste_dma40: Add missing IRQ check in d40_probe (git-fixes).
- docs/process/howto: Replace C89 with C11 (bsc#1214756).
- docs: kernel-parameters: Refer to the correct bitmap function (git-fixes).
- docs: networking: replace skb_hwtstamp_tx with skb_tstamp_tx (git-fixes).
- docs: printk-formats: Fix hex printing of signed values (git-fixes).
- driver core: test_async: fix an error code (git-fixes).
- drivers: clk: keystone: Fix parameter judgment in _of_pll_clk_init() (git-fixes).
- drivers: usb: smsusb: fix error handling code in smsusb_init_device (git-fixes).
- drm/amd/display: Add smu write msg id fail retry process (git-fixes).
- drm/amd/display: Apply 60us prefetch for DCFCLK &amp;lt;= 300Mhz (git-fixes).
- drm/amd/display: Disable phantom OTG after enable for plane disable (git-fixes).
- drm/amd/display: Do not set drr on pipe commit (git-fixes).
- drm/amd/display: Enable dcn314 DPP RCO (git-fixes).
- drm/amd/display: Ensure that planes are in the same order (git-fixes).
- drm/amd/display: Implement workaround for writing to OTG_PIXEL_RATE_DIV register (git-fixes).
- drm/amd/display: Remove wait while locked (git-fixes).
- drm/amd/display: Retain phantom plane/stream if validation fails (git-fixes).
- drm/amd/display: Skip DPP DTO update if root clock is gated (git-fixes).
- drm/amd/display: Use update plane and stream routine for DCN32x (git-fixes).
- drm/amd/display: check TG is non-null before checking if enabled (git-fixes).
- drm/amd/display: check attr flag before set cursor degamma on DCN3+ (git-fixes).
- drm/amd/display: disable RCO for DCN314 (git-fixes).
- drm/amd/display: do not wait for mpc idle if tg is disabled (git-fixes).
- drm/amd/display: enable cursor degamma for DCN3+ DRM legacy gamma (git-fixes).
- drm/amd/display: fix access hdcp_workqueue assert (git-fixes).
- drm/amd/display: fix the build when DRM_AMD_DC_DCN is not set (git-fixes).
- drm/amd/display: fix the white screen issue when &gt;= 64GB DRAM (git-fixes).
- drm/amd/display: limit DPIA link rate to HBR3 (git-fixes).
- drm/amd/display: phase3 mst hdcp for multiple displays (git-fixes).
- drm/amd/display: prevent potential division by zero errors (git-fixes).
- drm/amd/display: register edp_backlight_control() for DCN301 (git-fixes).
- drm/amd/display: save restore hdcp state when display is unplugged from mst hub (git-fixes).
- drm/amd/display: trigger timing sync only if TG is running (git-fixes).
- drm/amd/pm/smu7: move variables to where they are used (git-fixes).
- drm/amd/pm: avoid unintentional shutdown due to temperature momentary fluctuation (git-fixes).
- drm/amd/pm: expose swctf threshold setting for legacy powerplay (git-fixes).
- drm/amd/pm: fix variable dereferenced issue in amdgpu_device_attr_create() (git-fixes).
- drm/amd/pm: fulfill powerplay peak profiling mode shader/memory clock settings (git-fixes).
- drm/amd/pm: fulfill swsmu peak profiling mode shader/memory clock settings (git-fixes).
- drm/amd/pm: skip the RLC stop when S0i3 suspend for SMU v13.0.4/11 (git-fixes).
- drm/amd: Disable S/G for APUs when 64GB or more host memory (git-fixes).
- drm/amd: flush any delayed gfxoff on suspend entry (git-fixes).
- drm/amdgpu/pm: fix throttle_status for other than MP1 11.0.7 (git-fixes).
- drm/amdgpu: Fix integer overflow in amdgpu_cs_pass1 (git-fixes).
- drm/amdgpu: Fix potential fence use-after-free v2 (git-fixes).
- drm/amdgpu: Remove unnecessary domain argument (git-fixes).
- drm/amdgpu: Use RMW accessors for changing LNKCTL (git-fixes).
- drm/amdgpu: add S/G display parameter (git-fixes).
- drm/amdgpu: add vram reservation based on vram_usagebyfirmware_v2_2 (git-fixes).
- drm/amdgpu: avoid integer overflow warning in amdgpu_device_resize_fb_bar() (git-fixes).
- drm/amdgpu: fix calltrace warning in amddrm_buddy_fini (git-fixes).
- drm/amdgpu: fix memory leak in mes self test (git-fixes).
- drm/amdgpu: fix possible UAF in amdgpu_cs_pass1() (git-fixes).
- drm/amdgpu: install stub fence into potential unused fence pointers (git-fixes).
- drm/amdgpu: keep irq count in amdgpu_irq_disable_all (git-fixes).
- drm/amdgpu: skip fence GFX interrupts disable/enable for S0ix (git-fixes).
- drm/armada: Fix off-by-one error in armada_overlay_get_property() (git-fixes).
- drm/ast: Fix DRAM init on AST2200 (git-fixes).
- drm/atomic-helper: Update reference to drm_crtc_force_disable_all() (git-fixes).
- drm/bridge: anx7625: Drop device lock before drm_helper_hpd_irq_event() (git-fixes).
- drm/bridge: anx7625: Use common macros for DP power sequencing commands (git-fixes).
- drm/bridge: anx7625: Use common macros for HDCP capabilities (git-fixes).
- drm/bridge: fix -Wunused-const-variable= warning (git-fixes).
- drm/bridge: tc358764: Fix debug print parameter order (git-fixes).
- drm/etnaviv: fix dumping of active MMU context (git-fixes).
- drm/gma500: Use drm_aperture_remove_conflicting_pci_framebuffers (git-fixes).
- drm/i915/gvt: Drop unused helper intel_vgpu_reset_gtt() (git-fixes).
- drm/i915/gvt: Put the page reference obtained by KVM's gfn_to_pfn() (git-fixes).
- drm/i915/gvt: Verify pfn is 'valid' before dereferencing 'struct page' (git-fixes).
- drm/i915/sdvo: fix panel_type initialization (git-fixes).
- drm/i915: Fix premature release of request's reusable memory (git-fixes).
- drm/i915: mark requests for GuC virtual engines to avoid use-after-free (git-fixes).
- drm/mediatek: Fix dereference before null check (git-fixes).
- drm/mediatek: Fix potential memory leak if vmap() fail (git-fixes).
- drm/mediatek: Remove freeing not dynamic allocated memory (git-fixes).
- drm/msm/a2xx: Call adreno_gpu_init() earlier (git-fixes).
- drm/msm/dpu: fix the irq index in dpu_encoder_phys_wb_wait_for_commit_done (git-fixes).
- drm/msm/mdp5: Do not leak some plane state (git-fixes).
- drm/msm: Update dev core dump to not print backwards (git-fixes).
- drm/mxsfb: Disable overlay plane in mxsfb_plane_overlay_atomic_disable() (git-fixes).
- drm/nouveau/disp: Revert a NULL check inside nouveau_connector_get_modes (git-fixes).
- drm/nouveau/disp: fix use-after-free in error handling of nouveau_connector_create (bsc#1214073).
- drm/nouveau/gr: enable memory loads on helper invocation on all channels (git-fixes).
- drm/nouveau/nvkm/dp: Add workaround to fix DP 1.3+ DPCD issues (git-fixes).
- drm/panel: simple: Add missing connector type and pixel format for AUO T215HVN01 (git-fixes).
- drm/panel: simple: Fix AUO G121EAN01 panel timings according to the docs (git-fixes).
- drm/qxl: fix UAF on handle creation (git-fixes).
- drm/radeon: Use RMW accessors for changing LNKCTL (git-fixes).
- drm/repaper: Reduce temporary buffer size in repaper_fb_dirty() (git-fixes).
- drm/rockchip: Do not spam logs in atomic check (git-fixes).
- drm/shmem-helper: Reset vma-&gt;vm_ops before calling dma_buf_mmap() (git-fixes).
- drm/stm: ltdc: fix late dereference check (git-fixes).
- drm/tegra: dpaux: Fix incorrect return value of platform_get_irq (git-fixes).
- drm/ttm: check null pointer before accessing when swapping (git-fixes).
- drm/ttm: never consider pinned BOs for eviction&amp;swap (git-fixes).
- drm/vmwgfx: Fix shader stage validation (git-fixes).
- drm: adv7511: Fix low refresh rate register for ADV7533/5 (git-fixes).
- drm: gm12u320: Fix the timeout usage for usb_bulk_msg() (git-fixes).
- drm: rcar-du: remove R-Car H3 ES1.* workarounds (git-fixes).
- drm: xlnx: zynqmp_dpsub: Add missing check for dma_set_mask (git-fixes).
- dt-bindings: clock: xlnx,versal-clk: drop select:false (git-fixes).
- dt-bindings: clocks: imx8mp: make sai4 a dummy clock (git-fixes).
- dt-bindings: crypto: ti,sa2ul: make power-domains conditional (git-fixes).
- e1000: Fix typos in comments (jsc#PED-5738).
- e1000: Remove unnecessary use of kmap_atomic() (jsc#PED-5738).
- e1000: switch to napi_build_skb() (jsc#PED-5738).
- e1000: switch to napi_consume_skb() (jsc#PED-5738).
- exfat: fix unexpected EOF while reading dir (bsc#1214000).
- exfat: release s_lock before calling dir_emit() (bsc#1214000).
- exfat_iterate(): do not open-code file_inode(file) (bsc#1214000).
- fbdev/ep93xx-fb: Do not assign to struct fb_info.dev (git-fixes).
- fbdev: Fix sys_imageblit() for arbitrary image widths (git-fixes).
- fbdev: Improve performance of sys_imageblit() (git-fixes).
- fbdev: Update fbdev source file paths (git-fixes).
- fbdev: fix potential OOB read in fast_imageblit() (git-fixes).
- fbdev: mmp: fix value check in mmphw_probe() (git-fixes).
- file: reinstate f_pos locking optimization for regular files (bsc#1213759).
- firmware: arm_scmi: Drop OF node reference in the transport channel setup (git-fixes).
- firmware: cs_dsp: Fix new control name check (git-fixes).
- firmware: meson_sm: fix to avoid potential NULL pointer dereference (git-fixes).
- firmware: stratix10-svc: Fix an NULL vs IS_ERR() bug in probe (git-fixes).
- fprobe: Release rethook after the ftrace_ops is unregistered (git-fixes).
- fprobe: add unlock to match a succeeded ftrace_test_recursion_trylock (git-fixes).
- fs/sysv: Null check to prevent null-ptr-deref bug (git-fixes).
- fs: do not update freeing inode i_io_list (bsc#1214813).
- fs: record I_DIRTY_TIME even if inode already has I_DIRTY_INODE (bsc#1214813).
- fsi: aspeed: Reset master errors after CFAM reset (git-fixes).
- fsi: master-ast-cf: Add MODULE_FIRMWARE macro (git-fixes).
- ftrace: Fix possible warning on checking all pages used in ftrace_process_locs() (git-fixes).
- gpio: mvebu: Make use of devm_pwmchip_add (git-fixes).
- gpio: mvebu: fix irq domain leak (git-fixes).
- gpio: tps68470: Make tps68470_gpio_output() always set the initial value (git-fixes).
- hv_netvsc: Remove second mapping of send and recv buffers (bsc#1206453).
- hwmon: (pmbus/bel-pfe) Enable PMBUS_SKIP_STATUS_CHECK for pfe1100 (git-fixes).
- hwmon: (tmp513) Fix the channel number in tmp51x_is_visible() (git-fixes).
- hwrng: iproc-rng200 - Implement suspend and resume calls (git-fixes).
- hwrng: nomadik - keep clock enabled while hwrng is registered (git-fixes).
- hwrng: pic32 - use devm_clk_get_enabled (git-fixes).
- i2c: Delete error messages for failed memory allocations (git-fixes).
- i2c: Improve size determinations (git-fixes).
- i2c: aspeed: Reset the i2c controller when timeout occurs (git-fixes).
- i2c: bcm-iproc: Fix bcm_iproc_i2c_isr deadlock issue (git-fixes).
- i2c: designware: Correct length byte validation logic (git-fixes).
- i2c: designware: Handle invalid SMBus block data response length value (git-fixes).
- i2c: hisi: Only handle the interrupt of the driver's transfer (git-fixes).
- i2c: nomadik: Remove a useless call in the remove function (git-fixes).
- i2c: nomadik: Remove unnecessary goto label (git-fixes).
- i2c: nomadik: Use devm_clk_get_enabled() (git-fixes).
- i3c: master: svc: fix probe failure when no i3c device exist (git-fixes).
- i40e: Fix an NULL vs IS_ERR() bug for debugfs_create_dir() (git-fixes).
- iavf: fix potential races for FDIR filters (git-fixes).
- ice: Fix RDMA VSI removal during queue rebuild (git-fixes).
- ice: Fix crash by keep old cfg when update TCs more than queues (git-fixes).
- ice: Fix max_rate check while configuring TX rate limits (git-fixes).
- ice: Fix memory management in ice_ethtool_fdir.c (git-fixes).
- idr: fix param name in idr_alloc_cyclic() doc (git-fixes).
- iio: adc: ina2xx: avoid NULL pointer dereference on OF device match (git-fixes).
- iio: adc: stx104: Implement and utilize register structures (git-fixes).
- iio: adc: stx104: Utilize iomap interface (git-fixes).
- iio: cros_ec: Fix the allocation size for cros_ec_command (git-fixes).
- intel/e1000:fix repeated words in comments (jsc#PED-5738).
- intel: remove unused macros (jsc#PED-5738).
- iommu/amd/io-pgtable: Implement map_pages io_pgtable_ops callback (bsc#1212423).
- iommu/amd/io-pgtable: Implement unmap_pages io_pgtable_ops callback (bsc#1212423).
- iommu/amd: Add PCI segment support for ivrs_ commands (git-fixes).
- iommu/amd: Add map/unmap_pages() iommu_domain_ops callback support (bsc#1212423).
- iommu/amd: Do not identity map v2 capable device when snp is enabled (git-fixes).
- iommu/amd: Fix compile warning in init code (git-fixes).
- iommu/amd: Fix ill-formed ivrs_ioapic, ivrs_hpet and ivrs_acpihid options (git-fixes).
- iommu/amd: Fix ivrs_acpihid cmdline parsing code (git-fixes).
- iommu/amd: Fix pci device refcount leak in ppr_notifier() (git-fixes).
- iommu/amd: use full 64-bit value in build_completion_wait() (git-fixes).
- iommu/arm-smmu-v3: Make default domain type of HiSilicon PTT device to identity (git-fixes).
- iommu/arm-smmu-v3: check return value after calling platform_get_resource() (git-fixes).
- iommu/arm-smmu-v3: fix event handling soft lockup (git-fixes).
- iommu/arm-smmu: fix possible null-ptr-deref in arm_smmu_device_probe() (git-fixes).
- iommu/dart: Initialize DART_STREAMS_ENABLE (git-fixes).
- iommu/dma: Fix incorrect error return on iommu deferred attach (git-fixes).
- iommu/dma: Fix iova map result check bug (git-fixes).
- iommu/dma: return error code from iommu_dma_map_sg() (git-fixes).
- iommu/fsl_pamu: Fix resource leak in fsl_pamu_probe() (git-fixes).
- iommu/io-pgtable-arm-v7s: Add a quirk to allow pgtable PA up to 35bit (git-fixes).
- iommu/iova: Fix module config properly (git-fixes).
- iommu/mediatek: Add error path for loop of mm_dts_parse (git-fixes).
- iommu/mediatek: Add platform_device_put for recovering the device refcnt (git-fixes).
- iommu/mediatek: Check return value after calling platform_get_resource() (git-fixes).
- iommu/mediatek: Set dma_mask for PGTABLE_PA_35_EN (git-fixes).
- iommu/mediatek: Use component_match_add (git-fixes).
- iommu/mediatek: Validate number of phandles associated with 'mediatek,larbs' (git-fixes).
- iommu/omap: Fix buffer overflow in debugfs (git-fixes).
- iommu/rockchip: fix permission bits in page table entries v2 (git-fixes).
- iommu/s390: Fix duplicate domain attachments (git-fixes).
- iommu/sun50i: Consider all fault sources for reset (git-fixes).
- iommu/sun50i: Fix R/W permission check (git-fixes).
- iommu/sun50i: Fix flush size (git-fixes).
- iommu/sun50i: Fix reset release (git-fixes).
- iommu/sun50i: Implement .iotlb_sync_map (git-fixes).
- iommu/sun50i: Remove IOMMU_DOMAIN_IDENTITY (git-fixes).
- iommu/vt-d: Add RPLS to quirk list to skip TE disabling (git-fixes).
- iommu/vt-d: Check correct capability for sagaw determination (git-fixes).
- iommu/vt-d: Clean up si_domain in the init_dmars() error path (git-fixes).
- iommu/vt-d: Correctly calculate sagaw value of IOMMU (git-fixes).
- iommu/vt-d: Fix PCI device refcount leak in dmar_dev_scope_init() (git-fixes).
- iommu/vt-d: Fix PCI device refcount leak in has_external_pci() (git-fixes).
- iommu/vt-d: Fix kdump kernels boot failure with scalable mode (git-fixes).
- iommu/vt-d: Preset Access bit for IOVA in FL non-leaf paging entries (git-fixes).
- iommu/vt-d: Set SRE bit only when hardware has SRS cap (git-fixes).
- ipmi:ssif: Add check for kstrdup (git-fixes).
- ipmi:ssif: Fix a memory leak when scanning for an adapter (git-fixes).
- ipmi_si: fix a memleak in try_smi_init() (git-fixes).
- jffs2: correct logic when creating a hole in jffs2_write_begin (git-fixes).
- kabi/severities: Ignore newly added SRSO mitigation functions
- kabi/severities: ignore mlx4 internal symbols
- kabi: Allow extra bugsints (bsc#1213927).
- kabi: hide changes in enum ipl_type and struct sclp_info (jsc#PED-2023 jsc#PED-2025).
- kconfig: fix possible buffer overflow (git-fixes).
- kernel-binary: Common dependencies cleanup Common dependencies are copied to a subpackage, there is no need for copying defines or build dependencies there.
- kernel-binary: Drop code for kerntypes support Kerntypes was a SUSE-specific feature dropped before SLE 12.
- kselftest/runner.sh: Propagate SIGTERM to runner child (git-fixes).
- kunit: make kunit_test_timeout compatible with comment (git-fixes).
- leds: Fix BUG_ON check for LED_COLOR_ID_MULTI that is always false (git-fixes).
- leds: multicolor: Use rounded division when calculating color components (git-fixes).
- leds: pwm: Fix error code in led_pwm_create_fwnode() (git-fixes).
- leds: trigger: tty: Do not use LED_ON/OFF constants, use led_blink_set_oneshot instead (git-fixes).
- leds: turris-omnia: Drop unnecessary mutex locking (git-fixes).
- lib/test_meminit: allocate pages up to order MAX_ORDER (git-fixes).
- lib/test_meminit: destroy cache in kmem_cache_alloc_bulk() test (git-fixes).
- libbpf: Fix BTF-to-C converter's padding logic (bsc#1211220 jsc#PED-3924).
- libbpf: Fix btf_dump's packed struct determination (bsc#1211220 jsc#PED-3924).
- libbpf: Fix single-line struct definition output in btf_dump (bsc#1211220 jsc#PED-3924).
- libceph: fix potential hang in ceph_osdc_notify() (bsc#1214393).
- md/raid0: Factor out helper for mapping and submitting a bio (bsc#1213916).
- md/raid0: Fix performance regression for large sequential writes (bsc#1213916).
- media: ad5820: Drop unsupported ad5823 from i2c_ and of_device_id tables (git-fixes).
- media: cx24120: Add retval check for cx24120_message_send() (git-fixes).
- media: dib7000p: Fix potential division by zero (git-fixes).
- media: dvb-usb: m920x: Fix a potential memory leak in m920x_i2c_xfer() (git-fixes).
- media: go7007: Remove redundant if statement (git-fixes).
- media: i2c: ccs: Check rules is non-NULL (git-fixes).
- media: i2c: rdacm21: Fix uninitialized value (git-fixes).
- media: i2c: tvp5150: check return value of devm_kasprintf() (git-fixes).
- media: ov2680: Add ov2680_fill_format() helper function (git-fixes).
- media: ov2680: Do not take the lock for try_fmt calls (git-fixes).
- media: ov2680: Fix ov2680_bayer_order() (git-fixes).
- media: ov2680: Fix ov2680_set_fmt() which == V4L2_SUBDEV_FORMAT_TRY not working (git-fixes).
- media: ov2680: Fix regulators being left enabled on ov2680_power_on() errors (git-fixes).
- media: ov2680: Fix vflip / hflip set functions (git-fixes).
- media: ov2680: Remove VIDEO_V4L2_SUBDEV_API ifdef-s (git-fixes).
- media: ov5640: Enable MIPI interface in ov5640_set_power_mipi() (git-fixes).
- media: rkvdec: increase max supported height for H.264 (git-fixes).
- media: v4l2-core: Fix a potential resource leak in v4l2_fwnode_parse_link() (git-fixes).
- media: v4l2-mem2mem: add lock to protect parameter num_rdy (git-fixes).
- media: venus: hfi_venus: Only consider sys_idle_indicator on V1 (git-fixes).
- media: venus: hfi_venus: Write to VIDC_CTRL_INIT after unmasking interrupts (git-fixes).
- misc: rtsx: judge ASPM Mode to set PETXCFG Reg (git-fixes).
- mkspec: Allow unsupported KMPs (bsc#1214386)
- mlx4: Avoid resetting MLX4_INTFF_BONDING per driver (bsc#1187236).
- mlx4: Connect the ethernet part to the auxiliary bus (bsc#1187236).
- mlx4: Connect the infiniband part to the auxiliary bus (bsc#1187236).
- mlx4: Delete custom device management logic (bsc#1187236).
- mlx4: Get rid of the mlx4_interface.activate callback (bsc#1187236).
- mlx4: Get rid of the mlx4_interface.get_dev callback (bsc#1187236).
- mlx4: Move the bond work to the core driver (bsc#1187236).
- mlx4: Register mlx4 devices to an auxiliary virtual bus (bsc#1187236).
- mlx4: Rename member mlx4_en_dev.nb to netdev_nb (bsc#1187236).
- mlx4: Replace the mlx4_interface.event callback with a notifier (bsc#1187236).
- mlx4: Use 'void *' as the event param of mlx4_dispatch_event() (bsc#1187236).
- mlxsw: pci: Add shutdown method in PCI driver (git-fixes).
- mmc: block: Fix in_flight[issue_type] value error (git-fixes).
- mmc: moxart: read scr register without changing byte order (git-fixes).
- mmc: wbsd: fix double mmc_free_host() in wbsd_init() (git-fixes).
- module: avoid allocation if module is already present and ready (bsc#1213921).
- module: extract patient module check into helper (bsc#1213921).
- module: move check_modinfo() early to early_mod_check() (bsc#1213921).
- module: move early sanity checks into a helper (bsc#1213921).
- mtd: rawnand: brcmnand: Fix crash during the panic_write (git-fixes).
- mtd: rawnand: brcmnand: Fix mtd oobsize (git-fixes).
- mtd: rawnand: brcmnand: Fix potential false time out warning (git-fixes).
- mtd: rawnand: brcmnand: Fix potential out-of-bounds access in oob write (git-fixes).
- mtd: rawnand: fsl_upm: Fix an off-by one test in fun_exec_op() (git-fixes).
- mtd: rawnand: fsmc: handle clk prepare error in fsmc_nand_resume() (git-fixes).
- mtd: rawnand: omap_elm: Fix incorrect type in assignment (git-fixes).
- mtd: rawnand: rockchip: Align hwecc vs. raw page helper layouts (git-fixes).
- mtd: rawnand: rockchip: fix oobfree offset and description (git-fixes).
- mtd: spi-nor: Check bus width while setting QE bit (git-fixes).
- mtd: spinand: toshiba: Fix ecc_get_status (git-fixes).
- n_tty: Rename tail to old_tail in n_tty_read() (git-fixes).
- net/mlx4: Remove many unnecessary NULL values (bsc#1187236).
- net: hns3: fix wrong bw weight of disabled tc issue (git-fixes).
- net: ieee802154: at86rf230: Stop leaking skb's (git-fixes).
- net: mana: Fix MANA VF unload when hardware is unresponsive (git-fixes).
- net: phy: at803x: remove set/get wol callbacks for AR8032 (git-fixes).
- net: phy: broadcom: stub c45 read/write for 54810 (git-fixes).
- net: phy: fix IRQ-based wake-on-lan over hibernate / power off (git-fixes).
- net: phy: micrel: Correct bit assignments for phy_device flags (git-fixes).
- net: stmmac: tegra: Properly allocate clock bulk data (bsc#1213733)
- net: usb: lan78xx: reorder cleanup operations to avoid UAF bugs (git-fixes).
- net: usbnet: Fix WARNING in usbnet_start_xmit/usb_submit_urb (git-fixes).
- netfs: Fix lockdep warning from taking sb_writers whilst holding mmap_lock (bsc#1214742).
- netfs: Fix missing xas_retry() calls in xarray iteration (bsc#1213946 bsc#1214404).
- netfs: Fix missing xas_retry() calls in xarray iteration (bsc#1213946).
- netfs: fix parameter of cleanup() (bsc#1214743).
- nfsd: Remove incorrect check in nfsd4_validate_stateid (git-fixes).
- nilfs2: fix WARNING in mark_buffer_dirty due to discarded buffer reuse (git-fixes).
- nilfs2: fix use-after-free of nilfs_root in dirtying inodes via iput (git-fixes).
- ntb: Clean up tx tail index on link down (git-fixes).
- ntb: Drop packets when qp link is down (git-fixes).
- ntb: Fix calculation ntb_transport_tx_free_entry() (git-fixes).
- nvme-rdma: fix potential unbalanced freeze &amp; unfreeze (bsc#1208902).
- nvme-tcp: fix potential unbalanced freeze &amp; unfreeze (bsc#1208902).
- objtool/x86: Fix SRSO mess (git-fixes).
- objtool/x86: Fixup frame-pointer vs rethunk (git-fixes).
- objtool: Union instruction::{call_dest,jump_table} (git-fixes).
- old-flavors: Drop 2.6 kernels. 2.6 based kernels are EOL, upgrading from them is no longer suported.
- pcmcia: rsrc_nonstatic: Fix memory leak in nonstatic_release_resource_db() (git-fixes).
- phy/rockchip: inno-hdmi: do not power on rk3328 post pll on reg write (git-fixes).
- phy/rockchip: inno-hdmi: round fractal pixclock in rk3328 recalc_rate (git-fixes).
- phy/rockchip: inno-hdmi: use correct vco_div_5 macro on rk3328 (git-fixes).
- phy: qcom-snps-femto-v2: keep cfg_ahb_clk enabled during runtime suspend (git-fixes).
- phy: qcom-snps-femto-v2: properly enable ref clock (git-fixes).
- phy: qcom-snps: Use dev_err_probe() to simplify code (git-fixes).
- phy: qcom-snps: correct struct qcom_snps_hsphy kerneldoc (git-fixes).
- pinctrl: amd: Mask wake bits on probe again (git-fixes).
- pinctrl: amd: Revert 'pinctrl: amd: disable and mask interrupts on probe' (git-fixes).
- pinctrl: cherryview: fix address_space_handler() argument (git-fixes).
- pinctrl: mcp23s08: check return value of devm_kasprintf() (git-fixes).
- pinctrl: renesas: rza2: Add lock around pinctrl_generic{{add,remove}_group,{add,remove}_function} (git-fixes).
- platform/mellanox: mlxbf-pmc: Fix potential buffer overflows (git-fixes).
- platform/mellanox: mlxbf-pmc: Fix reading of unprogrammed events (git-fixes).
- platform/mellanox: mlxbf-tmfifo: Drop jumbo frames (git-fixes).
- platform/mellanox: mlxbf-tmfifo: Drop the Rx packet if no more descriptors (git-fixes).
- platform/x86: dell-sysman: Fix reference leak (git-fixes).
- powerpc/64e: Fix kexec build error (bsc#1212091 ltc#199106).
- powerpc/iommu: Fix iommu_table_in_use for a small default DMA window case (bsc#1212091 ltc#199106).
- powerpc/iommu: Fix notifiers being shared by PCI and VIO buses (bsc#1065729).
- powerpc/iommu: Incorrect DDW Table is referenced for SR-IOV device (bsc#1212091 ltc#199106).
- powerpc/iommu: TCEs are incorrectly manipulated with DLPAR add/remove of memory (bsc#1212091 ltc#199106).
- powerpc/iommu: do not set failed sg dma_address to DMA_MAPPING_ERROR (bsc#1212091 ltc#199106).
- powerpc/iommu: return error code from .map_sg() ops (bsc#1212091 ltc#199106).
- powerpc/kernel/iommu: Add new iommu_table_in_use() helper (bsc#1212091 ltc#199106).
- powerpc/kexec: Fix build failure from uninitialised variable (bsc#1212091 ltc#199106).
- powerpc/mm/altmap: Fix altmap boundary check (bsc#1120059 git-fixes).
- powerpc/pseries/ddw: Do not try direct mapping with persistent memory and one window (bsc#1212091 ltc#199106).
- powerpc/pseries/ddw: simplify enable_ddw() (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Add ddw_list_new_entry() helper (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Add ddw_property_create() and refactor enable_ddw() (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Add iommu_pseries_alloc_table() helper (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Add of_node_put() before break (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Allow DDW windows starting at 0x00 (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Check if the default window in use before removing it (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Create huge DMA window if no MMIO32 is present (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Find existing DDW with given property name (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Make use of DDW for indirect mapping (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Print ibm,query-pe-dma-windows parameters (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Rename 'direct window' to 'dma window' (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Reorganize iommu_table_setparms*() with new helper (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Replace hard-coded page shift (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Update remove_dma_window() to accept property name (bsc#1212091 ltc#199106).
- powerpc/pseries/iommu: Use correct vfree for it_map (bsc#1212091 ltc#199106).
- powerpc/pseries: Add __init attribute to eligible functions (bsc#1212091 ltc#199106).
- powerpc/pseries: Honour current SMT state when DLPAR onlining CPUs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- powerpc/pseries: Initialise CPU hotplug callbacks earlier (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588).
- powerpc/rtas: block error injection when locked down (bsc#1023051).
- powerpc/rtas: enture rtas_call is called with MMU enabled (bsc#1023051).
- powerpc/rtas: mandate RTAS syscall filtering (bsc#1023051).
- powerpc/rtas_flash: allow user copy to flash block cache objects (bsc#1194869).
- powerpc/security: Fix Speculation_Store_Bypass reporting on Power10 (bsc#1188885 ltc#193722 git-fixes).
- powerpc/xics: Remove unnecessary endian conversion (bsc#1065729).
- powerpc: Add HOTPLUG_SMT support (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588). Update config files.
- powerpc: Move DMA64_PROPNAME define to a header (bsc#1214297 ltc#197503).
- powerpc: fix typos in comments (bsc#1212091 ltc#199106).
- pseries/iommu/ddw: Fix kdump to work in absence of ibm,dma-window (bsc#1214297 ltc#197503).
- pstore/ram: Check start of empty przs during init (git-fixes).
- pwm: Add a stub for devm_pwmchip_add() (git-fixes).
- pwm: lpc32xx: Remove handling of PWM channels (git-fixes).
- pwm: meson: Simplify duplicated per-channel tracking (git-fixes).
- pwm: meson: fix handling of period/duty if greater than UINT_MAX (git-fixes).
- qed: Fix scheduling in a tasklet while getting stats (git-fixes).
- regmap: rbtree: Use alloc_flags for memory allocations (git-fixes).
- ring-buffer: Do not swap cpu_buffer during resize process (git-fixes).
- ring-buffer: Fix deadloop issue on reading trace_pipe (git-fixes).
- ring-buffer: Fix wrong stat of cpu_buffer-&gt;read (git-fixes).
- rpm/mkspec-dtb: support for nested subdirs.
- rpmsg: glink: Add check for kstrdup (git-fixes).
- rt: Add helper script to refresh RT configs based on the parent (SLE Realtime Extension).
- s390/dasd: fix command reject error on ESE devices (LTC#203630 bsc#1215123 git-fixes).
- s390/dasd: fix hanging device after request requeue (git-fixes LTC#203629 bsc#1215124).
- s390/ipl: add DEFINE_GENERIC_LOADPARM() (jsc#PED-2023).
- s390/ipl: add eckd dump support (jsc#PED-2025).
- s390/ipl: add eckd support (jsc#PED-2023).
- s390/ipl: add loadparm parameter to eckd ipl/reipl data (jsc#PED-2023).
- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976).
- s390/ipl: use octal values instead of S_* macros (jsc#PED-2023).
- s390/purgatory: disable branch profiling (git-fixes bsc#1214372).
- s390/qeth: Do not call dev_close/dev_open (DOWN/UP) (bsc#1214873 git-fixes).
- s390/zcrypt: do not leak memory if dev_set_name() fails (git-fixes bsc#1215148).
- s390/zcrypt: fix reply buffer calculations for CCA replies (bsc#1213949).
- sched/fair: Fix inaccurate tally of ttwu_move_affine (git fixes).
- sched/fair: Use recent_used_cpu to test p-&gt;cpus_ptr (git fixes).
- sched/psi: use kernfs polling functions for PSI trigger polling (bsc#1209799).
- scsi: 3w-xxxx: Add error handling for initialization failure in tw_probe() (git-fixes).
- scsi: 53c700: Check that command slot is not NULL (git-fixes).
- scsi: RDMA/srp: Fix residual handling (git-fixes)
- scsi: bsg: Increase number of devices (bsc#1210048).
- scsi: core: Do not wait for quiesce in scsi_device_block() (bsc#1209284).
- scsi: core: Do not wait for quiesce in scsi_stop_queue() (bsc#1209284).
- scsi: core: Fix legacy /proc parsing buffer overflow (git-fixes).
- scsi: core: Fix possible memory leak if device_add() fails (git-fixes).
- scsi: core: Improve warning message in scsi_device_block() (bsc#1209284).
- scsi: core: Merge scsi_internal_device_block() and device_block() (bsc#1209284).
- scsi: fnic: Replace return codes in fnic_clean_pending_aborts() (git-fixes).
- scsi: lpfc: Do not abuse UUID APIs and LPFC_COMPRESS_VMID_SIZE (git-fixes).
- scsi: lpfc: Modify when a node should be put in device recovery mode during RSCN (git-fixes).
- scsi: lpfc: Remove reftag check in DIF paths (git-fixes).
- scsi: qedf: Fix NULL dereference in error handling (git-fixes).
- scsi: qedf: Fix firmware halt over suspend and resume (git-fixes).
- scsi: qedi: Fix firmware halt over suspend and resume (git-fixes).
- scsi: qla2xxx: Add logs for SFP temperature monitoring (bsc#1214928).
- scsi: qla2xxx: Allow 32-byte CDBs (bsc#1214928).
- scsi: qla2xxx: Error code did not return to upper layer (bsc#1214928).
- scsi: qla2xxx: Fix firmware resource tracking (bsc#1214928).
- scsi: qla2xxx: Fix smatch warn for qla_init_iocb_limit() (bsc#1214928).
- scsi: qla2xxx: Flush mailbox commands on chip reset (bsc#1214928).
- scsi: qla2xxx: Move resource to allow code reuse (bsc#1214928).
- scsi: qla2xxx: Remove unsupported ql2xenabledif option (bsc#1214928).
- scsi: qla2xxx: Remove unused declarations (bsc#1214928).
- scsi: qla2xxx: Remove unused variables in qla24xx_build_scsi_type_6_iocbs() (bsc#1214928).
- scsi: qla2xxx: Update version to 10.02.09.100-k (bsc#1214928).
- scsi: scsi_debug: Remove dead code (git-fixes).
- scsi: sg: Increase number of devices (bsc#1210048).
- scsi: snic: Fix double free in snic_tgt_create() (git-fixes).
- scsi: snic: Fix possible memory leak if device_add() fails (git-fixes).
- scsi: storvsc: Always set no_report_opcodes (git-fixes).
- scsi: storvsc: Fix handling of virtual Fibre Channel timeouts (git-fixes).
- scsi: storvsc: Handle SRB status value 0x30 (git-fixes).
- scsi: storvsc: Limit max_sectors for virtual Fibre Channel devices (git-fixes).
- scsi: zfcp: Defer fc_rport blocking until after ADISC response (git-fixes bsc#1214371).
- selftests/bpf: Test btf dump for struct with padding only fields (bsc#1211220 jsc#PED-3924).
- selftests/futex: Order calls to futex_lock_pi (git-fixes).
- selftests/harness: Actually report SKIP for signal tests (git-fixes).
- selftests/resctrl: Close perf value read fd on errors (git-fixes).
- selftests/resctrl: Do not leak buffer in fill_cache() (git-fixes).
- selftests/resctrl: Unmount resctrl FS if child fails to run benchmark (git-fixes).
- selftests/rseq: check if libc rseq support is registered (git-fixes).
- selftests: forwarding: Add a helper to skip test when using veth pairs (git-fixes).
- selftests: forwarding: Skip test when no interfaces are specified (git-fixes).
- selftests: forwarding: Switch off timeout (git-fixes).
- selftests: forwarding: ethtool: Skip when using veth pairs (git-fixes).
- selftests: forwarding: ethtool_extended_state: Skip when using veth pairs (git-fixes).
- selftests: forwarding: tc_actions: Use ncat instead of nc (git-fixes).
- selftests: forwarding: tc_actions: cleanup temporary files when test is aborted (git-fixes).
- selftests: forwarding: tc_flower: Relax success criterion (git-fixes).
- selftests: mirror_gre_changes: Tighten up the TTL test match (git-fixes).
- selftests: tracing: Fix to unmount tracefs for recovering environment (git-fixes).
- serial: sc16is7xx: fix broken port 0 uart init (git-fixes).
- serial: sc16is7xx: fix bug when first setting GPIO direction (git-fixes).
- serial: sprd: Assign sprd_port after initialized to avoid wrong access (git-fixes).
- serial: sprd: Fix DMA buffer leak issue (git-fixes).
- serial: tegra: handle clk prepare error in tegra_uart_hw_init() (git-fixes).
- sfc: fix crash when reading stats while NIC is resetting (git-fixes).
- smb3: Do not send lease break acknowledgment if all file handles have been closed (git-fixes).
- smb3: do not set NTLMSSP_VERSION flag for negotiate not auth request (bsc#1193629).
- smb: client: Fix -Wstringop-overflow issues (bsc#1193629).
- smb: client: fix dfs link mount against w2k8 (bsc#1212142).
- smb: client: fix null auth (git-fixes).
- soc: aspeed: socinfo: Add kfree for kstrdup (git-fixes).
- soundwire: bus: pm_runtime_request_resume on peripheral attachment (git-fixes).
- soundwire: fix enumeration completion (git-fixes).
- spi: tegra20-sflash: fix to check return value of platform_get_irq() in tegra_sflash_probe() (git-fixes).
- supported.conf: fix typos for -!optional markers
- swiotlb: Remove bounce buffer remapping for Hyper-V (bsc#1206453).
- target: compare and write backend driver sense handling (bsc#1177719 bsc#1213026).
- target_core_rbd: fix leak and reduce kmalloc calls (bsc#1212873).
- target_core_rbd: fix rbd_img_request.snap_id assignment (bsc#1212857).
- target_core_rbd: remove snapshot existence validation code (bsc#1212857).
- tcpm: Avoid soft reset when partner does not support get_status (git-fixes).
- thunderbolt: Read retimer NVM authentication status prior tb_retimer_set_inbound_sbtx() (git-fixes).
- timers: Add shutdown mechanism to the internal functions (bsc#1213970).
- timers: Provide timer_shutdown[_sync]() (bsc#1213970).
- timers: Rename del_timer() to timer_delete() (bsc#1213970).
- timers: Rename del_timer_sync() to timer_delete_sync() (bsc#1213970).
- timers: Replace BUG_ON()s (bsc#1213970).
- timers: Silently ignore timers with a NULL function (bsc#1213970).
- timers: Split [try_to_]del_timer[_sync]() to prepare for shutdown mode (bsc#1213970).
- timers: Update kernel-doc for various functions (bsc#1213970).
- timers: Use del_timer_sync() even on UP (bsc#1213970).
- tracing/histograms: Add histograms to hist_vars if they have referenced variables (git-fixes).
- tracing/histograms: Return an error if we fail to add histogram to hist_vars list (git-fixes).
- tracing/probes: Fix not to count error code to total length (git-fixes).
- tracing/probes: Fix to avoid double count of the string length on the array (git-fixes).
- tracing/probes: Fix to record 0-length data_loc in fetch_store_string*() if fails (git-fixes).
- tracing/probes: Fix to update dynamic data counter if fetcharg uses it (git-fixes).
- tracing: Fix cpu buffers unavailable due to 'record_disabled' missed (git-fixes).
- tracing: Fix memleak due to race between current_tracer and trace (git-fixes).
- tracing: Fix memory leak of iter-&gt;temp when reading trace_pipe (git-fixes).
- tracing: Fix null pointer dereference in tracing_err_log_open() (git-fixes).
- tracing: Fix race issue between cpu buffer write and swap (git-fixes).
- tracing: Fix warning in trace_buffered_event_disable() (git-fixes).
- tracing: Remove extra space at the end of hwlat_detector/mode (git-fixes).
- tracing: Remove unnecessary copying of tr-&gt;current_trace (git-fixes).
- tty: fix hang on tty device with no_room set (git-fixes).
- tty: n_gsm: fix the UAF caused by race condition in gsm_cleanup_mux (git-fixes).
- tty: serial: fsl_lpuart: Add i.MXRT1050 support (git-fixes).
- tty: serial: fsl_lpuart: Clear the error flags by writing 1 for lpuart32 platforms (git-fixes).
- tty: serial: fsl_lpuart: make rx_watermark configurable for different platforms (git-fixes).
- tty: serial: fsl_lpuart: reduce RX watermark to 0 on LS1028A (git-fixes).
- ubifs: Fix memleak when insert_old_idx() failed (git-fixes).
- uprobes/x86: Allow to probe a NOP instruction with 0x66 prefix (git-fixes).
- usb-storage: alauda: Fix uninit-value in alauda_check_media() (git-fixes).
- usb: chipidea: imx: add missing USB PHY DPDM wakeup setting (git-fixes).
- usb: chipidea: imx: do not request QoS for imx8ulp (git-fixes).
- usb: chipidea: imx: improve logic if samsung,picophy-* parameter is 0 (git-fixes).
- usb: common: usb-conn-gpio: Prevent bailing out if initial role is none (git-fixes).
- usb: dwc3: Fix typos in gadget.c (git-fixes).
- usb: dwc3: Properly handle processing of pending events (git-fixes).
- usb: dwc3: meson-g12a: do post init to fix broken usb after resumption (git-fixes).
- usb: gadget: Fix the memory leak in raw_gadget driver (git-fixes).
- usb: gadget: f_mass_storage: Fix unused variable warning (git-fixes).
- usb: gadget: u_serial: Avoid spinlock recursion in __gs_console_push (git-fixes).
- usb: ohci-at91: Fix the unhandle interrupt when resume (git-fixes).
- usb: phy: mxs: fix getting wrong state with mxs_phy_is_otg_host() (git-fixes).
- usb: quirks: add quirk for Focusrite Scarlett (git-fixes).
- usb: serial: option: add FOXCONN T99W368/T99W373 product (git-fixes).
- usb: serial: option: add Quectel EC200A module support (git-fixes).
- usb: serial: option: add Quectel EM05G variant (0x030e) (git-fixes).
- usb: serial: option: support Quectel EM060K_128 (git-fixes).
- usb: serial: simple: add Kaufmann RKS+CAN VCP (git-fixes).
- usb: serial: simple: sort driver entries (git-fixes).
- usb: typec: altmodes/displayport: Signal hpd when configuring pin assignment (git-fixes).
- usb: typec: tcpci: clear the fault status bit (git-fixes).
- usb: typec: tcpci: move tcpci.h to include/linux/usb/ (git-fixes).
- usb: typec: tcpm: Fix response to vsafe0V event (git-fixes).
- usb: typec: tcpm: set initial svdm version based on pd revision (git-fixes).
- usb: zaurus: Add ID for A-300/B-500/C-700 (git-fixes).
- watchdog: intel-mid_wdt: add MODULE_ALIAS() to allow auto-load (git-fixes).
- watchdog: sp5100_tco: support Hygon FCH/SCH (Server Controller Hub) (git-fixes).
- wifi: ath10k: Use RMW accessors for changing LNKCTL (git-fixes).
- wifi: ath11k: Use RMW accessors for changing LNKCTL (git-fixes).
- wifi: ath9k: fix races between ath9k_wmi_cmd and ath9k_wmi_ctrl_rx (git-fixes).
- wifi: ath9k: protect WMI command response buffer replacement with a lock (git-fixes).
- wifi: ath9k: use IS_ERR() with debugfs_create_dir() (git-fixes).
- wifi: cfg80211: Fix return value in scan logic (git-fixes).
- wifi: cfg80211: fix sband iftype data lookup for AP_VLAN (git-fixes).
- wifi: mt76: mt7615: do not advertise 5 GHz on first phy of MT7615D (DBDC) (git-fixes).
- wifi: mt76: mt7915: fix power-limits while chan_switch (git-fixes).
- wifi: mt76: mt7921: do not support one stream on secondary antenna only (git-fixes).
- wifi: mt76: mt7921: fix non-PSC channel scan fail (git-fixes).
- wifi: mt76: testmode: add nla_policy for MT76_TM_ATTR_TX_LENGTH (git-fixes).
- wifi: mwifiex: Fix OOB and integer underflow when rx packets (git-fixes).
- wifi: mwifiex: Fix missed return in oob checks failed path (git-fixes).
- wifi: mwifiex: avoid possible NULL skb pointer dereference (git-fixes).
- wifi: mwifiex: fix error recovery in PCIE buffer descriptor management (git-fixes).
- wifi: mwifiex: fix memory leak in mwifiex_histogram_read() (git-fixes).
- wifi: nl80211/cfg80211: add forgotten nla_policy for BSS color attribute (git-fixes).
- wifi: radiotap: fix kernel-doc notation warnings (git-fixes).
- wifi: rtw89: debug: Fix error handling in rtw89_debug_priv_btc_manual_set() (git-fixes).
- word-at-a-time: use the same return type for has_zero regardless of endianness (bsc#1065729).
- x86/CPU/AMD: Disable XSAVES on AMD family 0x17 (git-fixes).
- x86/alternative: Fix race in try_get_desc() (git-fixes).
- x86/alternative: Make custom return thunk unconditional (git-fixes).
- x86/boot/e820: Fix typo in e820.c comment (git-fixes).
- x86/bugs: Reset speculation control settings on init (git-fixes).
- x86/cpu/kvm: Provide UNTRAIN_RET_VM (git-fixes).
- x86/cpu: Add Lunar Lake M (git-fixes).
- x86/cpu: Add model number for Intel Arrow Lake processor (git-fixes).
- x86/cpu: Clean up SRSO return thunk mess (git-fixes).
- x86/cpu: Cleanup the untrain mess (git-fixes).
- x86/cpu: Fix __x86_return_thunk symbol type (git-fixes).
- x86/cpu: Fix up srso_safe_ret() and __x86_return_thunk() (git-fixes).
- x86/cpu: Rename original retbleed methods (git-fixes).
- x86/cpu: Rename srso_(.*)_alias to srso_alias_\1 (git-fixes).
- x86/fpu: Take task_struct* in copy_sigframe_from_user_to_xstate() (git-fixes).
- x86/head/64: Switch to KERNEL_CS as soon as new GDT is installed (git-fixes).
- x86/hyperv: Add an interface to do nested hypercalls (bsc#1206453).
- x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests (bsc#1206453).
- x86/hyperv: Add support for detecting nested hypervisor (bsc#1206453).
- x86/hyperv: Change vTOM handling to use standard coco mechanisms (bsc#1206453).
- x86/hyperv: Fix hyperv_pcpu_input_arg handling when CPUs go online/offline (bsc#1206453).
- x86/hyperv: Remove BUG_ON() for kmap_local_page() (bsc#1206453).
- x86/hyperv: Reorder code to facilitate future work (bsc#1206453).
- x86/hyperv: Replace kmap() with kmap_local_page() (bsc#1206453).
- x86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL (git-fixes).
- x86/ioapic: Do not return 0 from arch_dynirq_lower_bound() (git-fixes).
- x86/ioremap: Add hypervisor callback for private MMIO mapping in coco (bsc#1206453).
- x86/ioremap: Fix page aligned size calculation in __ioremap_caller() (git-fixes).
- x86/mce: Make sure logged MCEs are processed after sysfs update (git-fixes).
- x86/mce: Retrieve poison range from hardware (git-fixes).
- x86/mem_encrypt: Unbreak the AMD_MEM_ENCRYPT=n build (git-fixes).
- x86/mm: Avoid incomplete Global INVLPG flushes (git-fixes).
- x86/mm: Do not shuffle CPU entry areas without KASLR (git-fixes).
- x86/mm: Handle decryption/re-encryption of bss_decrypted consistently (bsc#1206453).
- x86/purgatory: remove PGO flags (git-fixes).
- x86/reboot: Disable virtualization in an emergency if SVM is supported (git-fixes).
- x86/resctl: fix scheduler confusion with 'current' (git-fixes).
- x86/resctrl: Fix task CLOSID/RMID update race (git-fixes).
- x86/resctrl: Fix to restore to original value when re-enabling hardware prefetch register (git-fixes).
- x86/retpoline,kprobes: Fix position of thunk sections with CONFIG_LTO_CLANG (git-fixes).
- x86/retpoline,kprobes: Skip optprobe check for indirect jumps with retpolines and IBT (git-fixes).
- x86/retpoline: Do not clobber RFLAGS during srso_safe_ret() (git-fixes).
- x86/rtc: Remove __init for runtime functions (git-fixes).
- x86/sev: Make enc_dec_hypercall() accept a size instead of npages (bsc#1214635).
- x86/sgx: Reduce delay and interference of enclave release (git-fixes).
- x86/speculation: Add cpu_show_gds() prototype (git-fixes).
- x86/speculation: Mark all Skylake CPUs as vulnerable to GDS (git-fixes).
- x86/srso: Correct the mitigation status when SMT is disabled (git-fixes).
- x86/srso: Disable the mitigation on unaffected configurations (git-fixes).
- x86/srso: Explain the untraining sequences a bit more (git-fixes).
- x86/srso: Fix build breakage with the LLVM linker (git-fixes).
- x86/srso: Fix return thunks in generated code (git-fixes).
- x86/static_call: Fix __static_call_fixup() (git-fixes).
- x86/tdx: Add more registers to struct tdx_hypercall_args (bsc#1206453).
- x86/tdx: Do not corrupt frame-pointer in __tdx_hypercall() (bsc#1206453).
- x86/tdx: Expand __tdx_hypercall() to handle more arguments (bsc#1206453).
- x86/tdx: Fix typo in comment in __tdx_hypercall() (bsc#1206453).
- x86/tdx: Refactor __tdx_hypercall() to allow pass down more arguments (bsc#1206453).
- x86/virt: Force GIF=1 prior to disabling SVM (for reboot flows) (git-fixes).
- xfs: fix sb write verify for lazysbcount (bsc#1214661).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-05"/>
	<updated date="2023-10-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1023051">SUSE bug 1023051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120059">SUSE bug 1120059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177719">SUSE bug 1177719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187236">SUSE bug 1187236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203329">SUSE bug 1203329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203330">SUSE bug 1203330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205462">SUSE bug 1205462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206453">SUSE bug 1206453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208902">SUSE bug 1208902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208949">SUSE bug 1208949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208995">SUSE bug 1208995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209284">SUSE bug 1209284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209799">SUSE bug 1209799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210048">SUSE bug 1210048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210169">SUSE bug 1210169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210448">SUSE bug 1210448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210643">SUSE bug 1210643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211220">SUSE bug 1211220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212091">SUSE bug 1212091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212142">SUSE bug 1212142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212423">SUSE bug 1212423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212526">SUSE bug 1212526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212857">SUSE bug 1212857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212873">SUSE bug 1212873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213026">SUSE bug 1213026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213123">SUSE bug 1213123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213546">SUSE bug 1213546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213580">SUSE bug 1213580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213601">SUSE bug 1213601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213666">SUSE bug 1213666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213733">SUSE bug 1213733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213757">SUSE bug 1213757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213759">SUSE bug 1213759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213916">SUSE bug 1213916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213921">SUSE bug 1213921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213927">SUSE bug 1213927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213946">SUSE bug 1213946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213949">SUSE bug 1213949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213968">SUSE bug 1213968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213970">SUSE bug 1213970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213971">SUSE bug 1213971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214000">SUSE bug 1214000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214019">SUSE bug 1214019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214073">SUSE bug 1214073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214120">SUSE bug 1214120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214149">SUSE bug 1214149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214180">SUSE bug 1214180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214233">SUSE bug 1214233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214238">SUSE bug 1214238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214285">SUSE bug 1214285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214297">SUSE bug 1214297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214299">SUSE bug 1214299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214305">SUSE bug 1214305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214350">SUSE bug 1214350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214368">SUSE bug 1214368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214370">SUSE bug 1214370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214371">SUSE bug 1214371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214372">SUSE bug 1214372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214380">SUSE bug 1214380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214386">SUSE bug 1214386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214392">SUSE bug 1214392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214393">SUSE bug 1214393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214397">SUSE bug 1214397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214404">SUSE bug 1214404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214428">SUSE bug 1214428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214451">SUSE bug 1214451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214635">SUSE bug 1214635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214659">SUSE bug 1214659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214661">SUSE bug 1214661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214727">SUSE bug 1214727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214729">SUSE bug 1214729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214742">SUSE bug 1214742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214743">SUSE bug 1214743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214756">SUSE bug 1214756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214813">SUSE bug 1214813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214873">SUSE bug 1214873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214928">SUSE bug 1214928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214976">SUSE bug 1214976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214988">SUSE bug 1214988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215123">SUSE bug 1215123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215124">SUSE bug 1215124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215148">SUSE bug 1215148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215221">SUSE bug 1215221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215523">SUSE bug 1215523</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38457/">CVE-2022-38457 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38457">CVE-2022-38457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40133/">CVE-2022-40133 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40133">CVE-2022-40133 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1192/">CVE-2023-1192 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1192">CVE-2023-1192 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1859/">CVE-2023-1859 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1859">CVE-2023-1859 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-2007/">CVE-2023-2007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2007">CVE-2023-2007 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20588/">CVE-2023-20588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20588">CVE-2023-20588 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2177/">CVE-2023-2177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2177">CVE-2023-2177 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34319/">CVE-2023-34319 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34319">CVE-2023-34319 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3610/">CVE-2023-3610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3610">CVE-2023-3610 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37453/">CVE-2023-37453 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37453">CVE-2023-37453 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3772/">CVE-2023-3772 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3772">CVE-2023-3772 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3863/">CVE-2023-3863 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3863">CVE-2023-3863 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40283/">CVE-2023-40283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40283">CVE-2023-40283 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4128/">CVE-2023-4128 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4128">CVE-2023-4128 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4133/">CVE-2023-4133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4133">CVE-2023-4133 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4134/">CVE-2023-4134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4134">CVE-2023-4134 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4147/">CVE-2023-4147 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4147">CVE-2023-4147 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4194/">CVE-2023-4194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4194">CVE-2023-4194 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4273/">CVE-2023-4273 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4273">CVE-2023-4273 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4387/">CVE-2023-4387 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4387">CVE-2023-4387 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4459/">CVE-2023-4459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4459">CVE-2023-4459 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4563/">CVE-2023-4563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4563">CVE-2023-4563 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4569/">CVE-2023-4569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4569">CVE-2023-4569 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4881/">CVE-2023-4881 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4881">CVE-2023-4881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799335" comment="cluster-md-kmp-rt-5.14.21-150500.13.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799336" comment="dlm-kmp-rt-5.14.21-150500.13.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799337" comment="gfs2-kmp-rt-5.14.21-150500.13.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799338" comment="kernel-devel-rt-5.14.21-150500.13.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799339" comment="kernel-rt-5.14.21-150500.13.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799340" comment="kernel-rt-devel-5.14.21-150500.13.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799341" comment="kernel-rt-extra-5.14.21-150500.13.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799342" comment="kernel-rt-livepatch-5.14.21-150500.13.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799343" comment="kernel-rt-livepatch-devel-5.14.21-150500.13.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799344" comment="kernel-rt-optional-5.14.21-150500.13.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799345" comment="kernel-rt-vdso-5.14.21-150500.13.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799346" comment="kernel-rt_debug-5.14.21-150500.13.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799347" comment="kernel-rt_debug-devel-5.14.21-150500.13.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799348" comment="kernel-rt_debug-livepatch-devel-5.14.21-150500.13.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799349" comment="kernel-rt_debug-vdso-5.14.21-150500.13.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799350" comment="kernel-source-rt-5.14.21-150500.13.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799351" comment="kernel-syms-rt-5.14.21-150500.13.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799352" comment="kselftests-kmp-rt-5.14.21-150500.13.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799353" comment="ocfs2-kmp-rt-5.14.21-150500.13.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799354" comment="reiserfs-kmp-rt-5.14.21-150500.13.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4424" version="1" class="patch">
	<metadata>
		<title>Security update for nghttp2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215713" ref_url="https://bugzilla.suse.com/1215713" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-35945" ref_url="https://www.suse.com/security/cve/CVE-2023-35945/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:3997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016564.html" source="SUSE-SU"/>
		<description>
This update for nghttp2 fixes the following issues:

- CVE-2023-35945: Fixed memory leak when PUSH_PROMISE or HEADERS frame cannot be sent (bsc#1215713).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-06"/>
	<updated date="2023-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215713">SUSE bug 1215713</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-35945/">CVE-2023-35945 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35945">CVE-2023-35945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009798895" comment="libnghttp2-14-1.40.0-150200.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798896" comment="libnghttp2-14-32bit-1.40.0-150200.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798897" comment="libnghttp2-devel-1.40.0-150200.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798898" comment="libnghttp2_asio-devel-1.40.0-150200.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798899" comment="libnghttp2_asio1-1.40.0-150200.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798900" comment="libnghttp2_asio1-32bit-1.40.0-150200.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798901" comment="nghttp2-1.40.0-150200.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009798902" comment="python3-nghttp2-1.40.0-150200.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4425" version="1" class="patch">
	<metadata>
		<title>Security update for yq (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215808" ref_url="https://bugzilla.suse.com/1215808" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016562.html" source="SUSE-SU"/>
		<description>
This update for yq fixes the following issues:

yq was updated to 4.35.2 (bsc#1215808):

  * Fixed number parsing as float bug in JSON #1756
  * Fixed string, null concatenation consistency #1712
  * Fixed expression parsing issue #1711

Update to 4.35.1:

  * Added Lua output support
  * Added BSD checksum format

Update to 4.34.1:

  * Added shell output format
  * Fixed nil pointer dereference

Update to 4.33.3:

  * Fixed bug when splatting empty array #1613
  * Added scalar output for TOML (#1617)
  * Fixed passing of read-only context in pipe (partial fix for
    #1631)

Update to 4.33.2:

  * Add ``--nul-output|-0`` flag to separate element with NUL
    character (#1550) Thanks @vaab!
  * Add removable-media interface plug declaration to the snap
    packaging(#1618) Thanks @brlin-tw!
  * Scalar output now handled in csv, tsv and property files

Update to 4.33.1:

  * Added read-only TOML support! #1364. Thanks @pelletier for
    making your API available in your toml lib :)
  * Added warning when auto detect by file type is outputs JSON

Update to 4.32.2:

  * Fixes parsing terraform tfstate files results in 'unknown'
    format
  * Added divide and modulo operators (#1593)
  * Add support for decoding base64 strings without padding
  * Add filter operation (#1588) - thanks @rbren!
  * Detect input format based on file name extension (#1582)
  * Auto output format when input format is automatically
    detected
  * Fixed npe in log #1596
  * Improved binary file size!

Update to 4.31.2:

  * Fixed merged anchor reference problem #1482
  * Fixed xml encoding of ProcInst #1563, improved XML
    comment handling
  * Allow build without json and xml support (#1556) Thanks

Update to 4.31.1:

  * Added shuffle command #1503
  * Added ability to sort by multiple fields #1541
  * Added @sh encoder #1526
  * Added @uri/@urid encoder/decoder #1529
  * Fixed date comparison with string date #1537
  * Added from_unix/to_unix Operators

		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-06"/>
	<updated date="2023-10-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215808">SUSE bug 1215808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799834" comment="yq-4.35.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799835" comment="yq-bash-completion-4.35.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799836" comment="yq-fish-completion-4.35.2-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799837" comment="yq-zsh-completion-4.35.2-150500.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4426" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210168" ref_url="https://bugzilla.suse.com/1210168" source="BUGZILLA"/>
		<reference ref_id="1215309" ref_url="https://bugzilla.suse.com/1215309" source="BUGZILLA"/>
		<reference ref_id="1215575" ref_url="https://bugzilla.suse.com/1215575" source="BUGZILLA"/>
		<reference ref_id="1215814" ref_url="https://bugzilla.suse.com/1215814" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5168" ref_url="https://www.suse.com/security/cve/CVE-2023-5168/" source="CVE"/>
		<reference ref_id="CVE-2023-5169" ref_url="https://www.suse.com/security/cve/CVE-2023-5169/" source="CVE"/>
		<reference ref_id="CVE-2023-5171" ref_url="https://www.suse.com/security/cve/CVE-2023-5171/" source="CVE"/>
		<reference ref_id="CVE-2023-5174" ref_url="https://www.suse.com/security/cve/CVE-2023-5174/" source="CVE"/>
		<reference ref_id="CVE-2023-5176" ref_url="https://www.suse.com/security/cve/CVE-2023-5176/" source="CVE"/>
		<reference ref_id="CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016575.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Security fixes:
- CVE-2023-5217: Fixed a heap buffer overflow in libvpx. (bsc#1215814)
- CVE-2023-5168: Out-of-bounds write in FilterNodeD2D1. (bsc#1215575)
- CVE-2023-5169: Out-of-bounds write in PathOps. (bsc#1215575)
- CVE-2023-5171: Use-after-free in Ion Compiler. (bsc#1215575)
- CVE-2023-5174: Double-free in process spawning on Windows. (bsc#1215575)
- CVE-2023-5176: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3. (bsc#1215575)

Other fixes:

- Mozilla Thunderbird 115.3.1
  * fixed: In Unified Folders view, some folders had incorrect
    unified folder parent (bmo#1852525)
  * fixed: 'Edit message as new' did not restore encrypted
    subject from selected message (bmo#1788534)
  * fixed: Importing some CalDAV calendars with yearly recurrence
    events caused Thunderbird to freeze (bmo#1850732)
  * fixed: Security fixes
  MFSA 2023-44 (bsc#1215814)
  * CVE-2023-5217 (bmo#1855550)
    Heap buffer overflow in libvpx
- Mozilla Thunderbird 115.3
  * fixed: Thunderbird could not import profiles with hostname
    ending in dot ('.') (bmo#1825374)
  * fixed: Message header was occasionally missing in message
    preview (bmo#1840943)
  * fixed: Setting an existing folder's type flag did not add
    descendant folders to the Unified Folders view (bmo#1848904)
  * fixed: Thunderbird did not always delete all temporary mail
    files, sometimes preventing messages from being sent
    (bmo#673703)
  * fixed: Status bar in Message Compose window could not be
    hidden (bmo#1806860)
  * fixed: Message header was intermittently missing from message
    preview (bmo#1840943)
  * fixed: OAuth2 did not work on some profiles created in
    Thunderbird 102.6.1 or earlier (bmo#1814823)
  * fixed: In Vertical View, decrypted subject lines were
    displayed as ellipsis ('...') in message list (bmo#1831764)
  * fixed: Condensed address preference
    (mail.showCondensedAddresses) did not show condensed
    addresses in message list (bmo#1831280)
  * fixed: Spam folder could not be assigned non-ASCII names with
    IMAP UTF-8 enabled (bmo#1816332)
  * fixed: Message header was not displayed until images finished
    loading, causing noticeable delay for messages containing
    large images (bmo#1851871)
  * fixed: Large SVG favicons did not display on RSS feeds
    (bmo#1853895)
  * fixed: Context menu items did not display a hover background
    color (bmo#1852732)
  * fixed: Security fixes
  MFSA 2023-43 (bsc#1215575)
  * CVE-2023-5168 (bmo#1846683)
    Out-of-bounds write in FilterNodeD2D1
  * CVE-2023-5169 (bmo#1846685)
    Out-of-bounds write in PathOps
  * CVE-2023-5171 (bmo#1851599)
    Use-after-free in Ion Compiler
  * CVE-2023-5174 (bmo#1848454)
    Double-free in process spawning on Windows
  * CVE-2023-5176 (bmo#1836353, bmo#1842674, bmo#1843824,
    bmo#1843962, bmo#1848890, bmo#1850180, bmo#1850983,
    bmo#1851195)
    Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3,
    and Thunderbird 115.3
- Add patch mozilla-fix-broken-ffmpeg.patch to fix broken build
  with newer binutils (bsc#1215309)
- Fix i586 build by reducing debug info to -g1. (bsc#1210168)
- Mozilla Thunderbird 115.2.3
  * changed: Card view and vertical layout are now default for
    new profiles (bmo#1849000)
  * fixed: Go - Folder menu was disabled (bmo#1849919)
  * fixed: 'Tools' menu was blank when opened from compose window
    on macOS (bmo#1848155)
  * fixed: Deleting an attachment from a message on an IMAP
    server corrupted the local copy when configured with 'mark as
    deleted' (bmo#1135434)
  * fixed: Manually entered passwords were not remembered for
    OAuth-authenticated accounts such as Yahoo mail (bmo#1673446)
  * fixed: Quick Filter's 'Keep filters applied' did not persist
    after restarting Thunderbird (bmo#1846880,bmo#1849221)
  * fixed: Top-level Quick Filter settings did not persist after
    restart (bmo#1849249)
  * fixed: Notifications for new messages with non-ASCII
    characters in the subject were garbled (bmo#1842384)
  * fixed: 'Mark Thread As Read' did not work when some messages
    in thread were already read (bmo#1850850)
  * fixed: New Groups tab in NNTP subscribe dialog id not work as
    expected (bmo#1848366)
  * fixed: Negative values were allowed in 'Share for files
    larger than' field (bmo#1850281)
  * fixed: Thunderbird sometimes crashed when deleting a parent
    folder with subfolders (bmo#1851293)
  * fixed: 'Send Message Error' appeared intermittently while
    Thunderbird was idle (bmo#1801668)
  * fixed: Focused but not selected messages were missing visual
    indication of focus in card view (bmo#1844263)
  * fixed: Notification dot did not disappear from taskbar icon
    on Windows after messages had already been read (bmo#1824889)
  * fixed: Multiple selected messages could not be opened
    simultaneously if selection included more than 19 messages
    (bmo#1851563)
  * fixed: Email replies received via BCC incorrectly populated
    From field with default identity (bmo#1851512)
  * fixed: User was not always notified of message send failures
    in outbox (bmo#1851542)
  * fixed: Tag dialog did not close properly after editing tag
    (bmo#1852414)
  * fixed: Newsgroup field in compose window did not autocomplete
    with suggested newsgroup names (bmo#1670457)
  * fixed: Canceling newsgroup messages did not check if sender
    matched user's own identity (bmo#1823274)
  * fixed: Event dialog with several invitees expanded beyond
    screen height (bmo#1848261)
  * fixed: Message check boxes were partially obstructed in
    message list (bmo#1850760)
  * unresolved: Some folders missing from Unified Folders ()
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-09"/>
	<updated date="2023-10-09"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1210168">SUSE bug 1210168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215309">SUSE bug 1215309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215575">SUSE bug 1215575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215814">SUSE bug 1215814</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5168/">CVE-2023-5168 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5168">CVE-2023-5168 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5169/">CVE-2023-5169 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5169">CVE-2023-5169 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5171/">CVE-2023-5171 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5171">CVE-2023-5171 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5174/">CVE-2023-5174 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5174">CVE-2023-5174 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5176/">CVE-2023-5176 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5176">CVE-2023-5176 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009800273" comment="MozillaThunderbird-115.3.1-150200.8.133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800274" comment="MozillaThunderbird-translations-common-115.3.1-150200.8.133.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800275" comment="MozillaThunderbird-translations-other-115.3.1-150200.8.133.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4427" version="1" class="patch">
	<metadata>
		<title>Security update for go1.21 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="1215985" ref_url="https://bugzilla.suse.com/1215985" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39323" ref_url="https://www.suse.com/security/cve/CVE-2023-39323/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016574.html" source="SUSE-SU"/>
		<description>
This update for go1.21 fixes the following issues:

- Updated to version 1.21.2 (bsc#1212475):

  - CVE-2023-39323: Fixed an arbitrary execution issue during build
    time due to path directive bypass (bsc#1215985).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-09"/>
	<updated date="2023-10-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215985">SUSE bug 1215985</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39323/">CVE-2023-39323 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39323">CVE-2023-39323 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009800298" comment="go1.21-1.21.2-150000.1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800299" comment="go1.21-doc-1.21.2-150000.1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800300" comment="go1.21-race-1.21.2-150000.1.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4428" version="1" class="patch">
	<metadata>
		<title>Security update for go1.20 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206346" ref_url="https://bugzilla.suse.com/1206346" source="BUGZILLA"/>
		<reference ref_id="1215985" ref_url="https://bugzilla.suse.com/1215985" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39323" ref_url="https://www.suse.com/security/cve/CVE-2023-39323/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016573.html" source="SUSE-SU"/>
		<description>
This update for go1.20 fixes the following issues:

- Updated to version 1.20.9 (bsc#1206346):

  - CVE-2023-39323: Fixed an arbitrary execution issue during build
    time due to path directive bypass (bsc#1215985).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-09"/>
	<updated date="2023-10-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206346">SUSE bug 1206346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215985">SUSE bug 1215985</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39323/">CVE-2023-39323 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39323">CVE-2023-39323 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009800301" comment="go1.20-1.20.9-150000.1.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800302" comment="go1.20-doc-1.20.9-150000.1.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800303" comment="go1.20-race-1.20.9-150000.1.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4429" version="1" class="patch">
	<metadata>
		<title>Security update for conmon (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215806" ref_url="https://bugzilla.suse.com/1215806" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:4022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016614.html" source="SUSE-SU"/>
		<description>
This update for conmon fixes the following issues:

conmon is rebuild with go1.21 to capture current stability, bug and security fixes. (bsc#1215806)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-10"/>
	<updated date="2023-10-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215806">SUSE bug 1215806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800154" comment="conmon-2.1.7-150500.9.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4430" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214806" ref_url="https://bugzilla.suse.com/1214806" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4641" ref_url="https://www.suse.com/security/cve/CVE-2023-4641/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016612.html" source="SUSE-SU"/>
		<description>
This update for shadow fixes the following issues:

- CVE-2023-4641: Fixed potential password leak (bsc#1214806).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-10"/>
	<updated date="2023-10-10"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1214806">SUSE bug 1214806</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4641/">CVE-2023-4641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4641">CVE-2023-4641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009782290" comment="login_defs-4.8.1-150400.10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009782291" comment="shadow-4.8.1-150400.10.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4431" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1202845" ref_url="https://bugzilla.suse.com/1202845" source="BUGZILLA"/>
		<reference ref_id="1206453" ref_url="https://bugzilla.suse.com/1206453" source="BUGZILLA"/>
		<reference ref_id="1213808" ref_url="https://bugzilla.suse.com/1213808" source="BUGZILLA"/>
		<reference ref_id="1214941" ref_url="https://bugzilla.suse.com/1214941" source="BUGZILLA"/>
		<reference ref_id="1214942" ref_url="https://bugzilla.suse.com/1214942" source="BUGZILLA"/>
		<reference ref_id="1214943" ref_url="https://bugzilla.suse.com/1214943" source="BUGZILLA"/>
		<reference ref_id="1214944" ref_url="https://bugzilla.suse.com/1214944" source="BUGZILLA"/>
		<reference ref_id="1214950" ref_url="https://bugzilla.suse.com/1214950" source="BUGZILLA"/>
		<reference ref_id="1214951" ref_url="https://bugzilla.suse.com/1214951" source="BUGZILLA"/>
		<reference ref_id="1214954" ref_url="https://bugzilla.suse.com/1214954" source="BUGZILLA"/>
		<reference ref_id="1214957" ref_url="https://bugzilla.suse.com/1214957" source="BUGZILLA"/>
		<reference ref_id="1214986" ref_url="https://bugzilla.suse.com/1214986" source="BUGZILLA"/>
		<reference ref_id="1214992" ref_url="https://bugzilla.suse.com/1214992" source="BUGZILLA"/>
		<reference ref_id="1214993" ref_url="https://bugzilla.suse.com/1214993" source="BUGZILLA"/>
		<reference ref_id="1215322" ref_url="https://bugzilla.suse.com/1215322" source="BUGZILLA"/>
		<reference ref_id="1215523" ref_url="https://bugzilla.suse.com/1215523" source="BUGZILLA"/>
		<reference ref_id="1215877" ref_url="https://bugzilla.suse.com/1215877" source="BUGZILLA"/>
		<reference ref_id="1215894" ref_url="https://bugzilla.suse.com/1215894" source="BUGZILLA"/>
		<reference ref_id="1215895" ref_url="https://bugzilla.suse.com/1215895" source="BUGZILLA"/>
		<reference ref_id="1215896" ref_url="https://bugzilla.suse.com/1215896" source="BUGZILLA"/>
		<reference ref_id="1215911" ref_url="https://bugzilla.suse.com/1215911" source="BUGZILLA"/>
		<reference ref_id="1215915" ref_url="https://bugzilla.suse.com/1215915" source="BUGZILLA"/>
		<reference ref_id="1215916" ref_url="https://bugzilla.suse.com/1215916" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1206" ref_url="https://www.suse.com/security/cve/CVE-2023-1206/" source="CVE"/>
		<reference ref_id="CVE-2023-39192" ref_url="https://www.suse.com/security/cve/CVE-2023-39192/" source="CVE"/>
		<reference ref_id="CVE-2023-39193" ref_url="https://www.suse.com/security/cve/CVE-2023-39193/" source="CVE"/>
		<reference ref_id="CVE-2023-39194" ref_url="https://www.suse.com/security/cve/CVE-2023-39194/" source="CVE"/>
		<reference ref_id="CVE-2023-4155" ref_url="https://www.suse.com/security/cve/CVE-2023-4155/" source="CVE"/>
		<reference ref_id="CVE-2023-42753" ref_url="https://www.suse.com/security/cve/CVE-2023-42753/" source="CVE"/>
		<reference ref_id="CVE-2023-42754" ref_url="https://www.suse.com/security/cve/CVE-2023-42754/" source="CVE"/>
		<reference ref_id="CVE-2023-4389" ref_url="https://www.suse.com/security/cve/CVE-2023-4389/" source="CVE"/>
		<reference ref_id="CVE-2023-4622" ref_url="https://www.suse.com/security/cve/CVE-2023-4622/" source="CVE"/>
		<reference ref_id="CVE-2023-4623" ref_url="https://www.suse.com/security/cve/CVE-2023-4623/" source="CVE"/>
		<reference ref_id="CVE-2023-4921" ref_url="https://www.suse.com/security/cve/CVE-2023-4921/" source="CVE"/>
		<reference ref_id="CVE-2023-5345" ref_url="https://www.suse.com/security/cve/CVE-2023-5345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2023-39194: Fixed an out of bounds read in the XFRM subsystem (bsc#1215861).
- CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860).
- CVE-2023-39192: Fixed an out of bounds read in the netfilter (bsc#1215858).
- CVE-2023-42754: Fixed a NULL pointer dereference in the IPv4 stack that could lead to denial of service (bsc#1215467).
- CVE-2023-4389: Fixed a reference counting issue in the Btrfs filesystem that could be exploited in order to leak internal kernel information or crash the system (bsc#1214351).
- CVE-2023-5345: fixed an use-after-free vulnerability in the fs/smb/client component which could be exploited to achieve local privilege escalation. (bsc#1215899)
- CVE-2023-42753: Fixed an array indexing vulnerability in the netfilter subsystem. This issue may have allowed a local user to crash the system or potentially escalate their privileges (bsc#1215150).
- CVE-2023-1206: Fixed a hash collision flaw in the IPv6 connection lookup table. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95% (bsc#1212703).
- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalatio (bsc#1215275).
- CVE-2023-4622: Fixed a use-after-free vulnerability in the Unix domain sockets component which could be exploited to achieve local privilege escalation (bsc#1215117).
- CVE-2023-4623: Fixed a use-after-free issue in the HFSC network scheduler which could be exploited to achieve local privilege escalation (bsc#1215115).
- CVE-2023-4155: Fixed a flaw in KVM AMD Secure Encrypted Virtualization (SEV). An attacker can trigger a stack overflow and cause a denial of service or potentially guest-to-host escape in kernel configurations without stack guard pages. (bsc#1214022)

The following non-security bugs were fixed:

- ALSA: hda/realtek: Splitting the UX3402 into two separate models (git-fixes).
- arm64: module-plts: inline linux/moduleloader.h (git-fixes)
- arm64: module: Use module_init_layout_section() to spot init sections (git-fixes)
- arm64: sdei: abort running SDEI handlers during crash (git-fixes)
- arm64: tegra: Update AHUB clock parent and rate (git-fixes)
- arm64/fpsimd: Only provide the length to cpufeature for xCR registers (git-fixes)
- ASoC: amd: yc: Fix non-functional mic on Lenovo 82QF and 82UG (git-fixes).
- ASoC: hdaudio.c: Add missing check for devm_kstrdup (git-fixes).
- ASoC: imx-audmix: Fix return error with devm_clk_get() (git-fixes).
- ASoC: meson: spdifin: start hw on dai probe (git-fixes).
- ASoC: rt5640: Fix IRQ not being free-ed for HDA jack detect mode (git-fixes).
- ASoC: rt5640: Fix sleep in atomic context (git-fixes).
- ASoC: rt5640: Revert 'Fix sleep in atomic context' (git-fixes).
- ASoC: soc-utils: Export snd_soc_dai_is_dummy() symbol (git-fixes).
- ASoC: SOF: core: Only call sof_ops_free() on remove if the probe was successful (git-fixes).
- ASoC: tegra: Fix redundant PLLA and PLLA_OUT0 updates (git-fixes).
- blk-iocost: fix divide by 0 error in calc_lcoefs() (bsc#1214986).
- blk-iocost: use spin_lock_irqsave in adjust_inuse_and_calc_cost (bsc#1214992).
- block/mq-deadline: use correct way to throttling write requests (bsc#1214993).
- bnx2x: new flag for track HW resource allocation (bsc#1202845 bsc#1215322).
- clocksource: hyper-v: Mark hyperv tsc page unencrypted in sev-snp enlightened guest (bsc#1206453).
- drivers: hv: Mark percpu hvcall input arg page unencrypted in SEV-SNP enlightened guest (bsc#1206453).
- Drivers: hv: vmbus: Bring the post_msg_page back for TDX VMs with the paravisor (bsc#1206453).
- Drivers: hv: vmbus: Support &gt;64 VPs for a fully enlightened TDX/SNP VM (bsc#1206453).
- Drivers: hv: vmbus: Support fully enlightened TDX guests (bsc#1206453).
- drm/ast: Add BMC virtual connector (bsc#1152472) Backporting changes: 	* rename ast_device to ast_private
- drm/ast: report connection status on Display Port. (bsc#1152472) Backporting changes: 	* rename ast_device to ast_private 	* context changes
- drm/display: Do not assume dual mode adaptors support i2c sub-addressing (bsc#1213808).
- drm/meson: fix memory leak on -&gt;hpd_notify callback (git-fixes).
- drm/virtio: Correct drm_gem_shmem_get_sg_table() error handling (git-fixes).
- drm/virtio: Use appropriate atomic state in virtio_gpu_plane_cleanup_fb() (git-fixes).
- ext4: avoid potential data overflow in next_linear_group (bsc#1214951).
- ext4: correct inline offset when handling xattrs in inode body (bsc#1214950).
- ext4: fix memory leaks in ext4_fname_{setup_filename,prepare_lookup} (bsc#1214954).
- ext4: fix wrong unit use in ext4_mb_clear_bb (bsc#1214943).
- ext4: fix wrong unit use in ext4_mb_new_blocks (bsc#1214944).
- ext4: get block from bh in ext4_free_blocks for fast commit replay (bsc#1214942).
- ext4: reflect error codes from ext4_multi_mount_protect() to its callers (bsc#1214941).
- ext4: Remove ext4 locking of moved directory (bsc#1214957).
- ext4: set goal start correctly in ext4_mb_normalize_request (bsc#1214940).
- fs: Establish locking order for unrelated directories (bsc#1214958).
- fs: Lock moved directories (bsc#1214959).
- fs: lockd: avoid possible wrong NULL parameter (git-fixes).
- fs: no need to check source (bsc#1215752).
- fuse: nlookup missing decrement in fuse_direntplus_link (bsc#1215581).
- gve: Add AF_XDP zero-copy support for GQI-QPL format (bsc#1214479).
- gve: Add XDP DROP and TX support for GQI-QPL format (bsc#1214479).
- gve: Add XDP REDIRECT support for GQI-QPL format (bsc#1214479).
- gve: Changes to add new TX queues (bsc#1214479).
- gve: Control path for DQO-QPL (bsc#1214479).
- gve: fix frag_list chaining (bsc#1214479).
- gve: Fix gve interrupt names (bsc#1214479).
- gve: RX path for DQO-QPL (bsc#1214479).
- gve: trivial spell fix Recive to Receive (bsc#1214479).
- gve: Tx path for DQO-QPL (bsc#1214479).
- gve: Unify duplicate GQ min pkt desc size constants (bsc#1214479).
- gve: use vmalloc_array and vcalloc (bsc#1214479).
- gve: XDP support GQI-QPL: helper function changes (bsc#1214479).
- hwrng: virtio - add an internal buffer (git-fixes).
- hwrng: virtio - always add a pending request (git-fixes).
- hwrng: virtio - do not wait on cleanup (git-fixes).
- hwrng: virtio - do not waste entropy (git-fixes).
- hwrng: virtio - Fix race on data_avail and actual data (git-fixes).
- i915/pmu: Move execlist stats initialization to execlist specific setup (git-fixes).
- iommu/virtio: Detach domain on endpoint release (git-fixes).
- iommu/virtio: Return size mapped for a detached domain (git-fixes).
- jbd2: check 'jh-&gt;b_transaction' before removing it from checkpoint (bsc#1214953).
- jbd2: correct the end of the journal recovery scan range (bsc#1214955).
- jbd2: fix a race when checking checkpoint buffer busy (bsc#1214949).
- jbd2: fix checkpoint cleanup performance regression (bsc#1214952).
- jbd2: Fix wrongly judgement for buffer head removing while doing checkpoint (bsc#1214948).
- jbd2: recheck chechpointing non-dirty buffer (bsc#1214945).
- jbd2: remove journal_clean_one_cp_list() (bsc#1214947).
- jbd2: remove t_checkpoint_io_list (bsc#1214946).
- jbd2: restore t_checkpoint_io_list to maintain kABI (bsc#1214946).
- kernel-binary: Move build-time definitions together Move source list and build architecture to buildrequires to aid in future reorganization of the spec template.
- kernel-binary: python3 is needed for build At least scripts/bpf_helpers_doc.py requires python3 since Linux 4.18 Other simimlar scripts may exist.
- KVM: s390: fix KVM_S390_GET_CMMA_BITS for GFNs in memslot holes (git-fixes bsc#1215915).
- KVM: s390: interrupt: use READ_ONCE() before cmpxchg() (git-fixes bsc#1215896).
- KVM: s390: pv: fix external interruption loop not always detected (git-fixes bsc#1215916).
- KVM: s390: vsie: Fix the initialization of the epoch extension (epdx) field (git-fixes bsc#1215894).
- KVM: s390: vsie: fix the length of APCB bitmap (git-fixes bsc#1215895).
- KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler (git-fixes bsc#1215911).
- KVM: x86: Fix KVM_CAP_SYNC_REGS's sync_regs() TOCTOU issues (git-fixes).
- KVM: x86/mmu: Include mmu.h in spte.h (git-fixes).
- loop: Fix use-after-free issues (bsc#1214991).
- loop: loop_set_status_from_info() check before assignment (bsc#1214990).
- module: Expose module_init_layout_section() (git-fixes)
- net: do not allow gso_size to be set to GSO_BY_FRAGS (git-fixes).
- net: mana: Add page pool for RX buffers (bsc#1214040).
- net: mana: Configure hwc timeout from hardware (bsc#1214037).
- net: usb: qmi_wwan: add Quectel EM05GV2 (git-fixes).
- NFS: Guard against READDIR loop when entry names exceed MAXNAMELEN (git-fixes).
- nfs/blocklayout: Use the passed in gfp flags (git-fixes).
- NFS/pNFS: Report EINVAL errors from connect() to the server (git-fixes).
- NFSD: da_addr_body field missing in some GETDEVICEINFO replies (git-fixes).
- nfsd: fix change_info in NFSv4 RENAME replies (git-fixes).
- nfsd: Fix race to FREE_STATEID and cl_revoked (git-fixes).
- NFSv4: Fix dropped lock for racing OPEN and delegation return (git-fixes).
- NFSv4: fix out path in __nfs4_get_acl_uncached (git-fixes).
- NFSv4.2: fix error handling in nfs42_proc_getxattr (git-fixes).
- NFSv4.2: fix handling of COPY ERR_OFFLOAD_NO_REQ (git-fixes).
- NFSv4/pnfs: minor fix for cleanup path in nfs4_get_device_info (git-fixes).
- nvme-auth: use chap-&gt;s2 to indicate bidirectional authentication (bsc#1214543).
- nvme-tcp: add recovery_delay to sysfs (bsc#1201284).
- nvme-tcp: delay error recovery until the next KATO interval (bsc#1201284).
- nvme-tcp: Do not terminate commands when in RESETTING (bsc#1201284).
- nvme-tcp: make 'err_work' a delayed work (bsc#1201284).
- platform/x86: intel_scu_ipc: Check status after timeout in busy_loop() (git-fixes).
- platform/x86: intel_scu_ipc: Check status upon timeout in ipc_wait_for_interrupt() (git-fixes).
- platform/x86: intel_scu_ipc: Do not override scu in intel_scu_ipc_dev_simple_command() (git-fixes).
- platform/x86: intel_scu_ipc: Fail IPC send if still busy (git-fixes).
- pNFS: Fix assignment of xprtdata.cred (git-fixes).
- powerpc/fadump: make is_kdump_kernel() return false when fadump is active (bsc#1212639 ltc#202582).
- printk: ringbuffer: Fix truncating buffer size min_t cast (bsc#1215875).
- quota: add new helper dquot_active() (bsc#1214998).
- quota: factor out dquot_write_dquot() (bsc#1214995).
- quota: fix dqput() to follow the guarantees dquot_srcu should provide (bsc#1214963).
- quota: fix warning in dqgrab() (bsc#1214962).
- quota: Properly disable quotas when add_dquot_ref() fails (bsc#1214961).
- quota: rename dquot_active() to inode_quota_active() (bsc#1214997).
- RDMA/siw: Fabricate a GID on tun and loopback devices (git-fixes)
- scsi: lpfc: Early return after marking final NLP_DROPPED flag in dev_loss_tmo (git-fixes).
- scsi: lpfc: Fix the NULL vs IS_ERR() bug for debugfs_create_file() (git-fixes).
- scsi: lpfc: Prevent use-after-free during rmmod with mapped NVMe rports (git-fixes).
- scsi: qedf: Add synchronization between I/O completions and abort (bsc#1210658).
- scsi: qla2xxx: Fix NULL vs IS_ERR() bug for debugfs_create_dir() (git-fixes).
- scsi: qla2xxx: Use raw_smp_processor_id() instead of smp_processor_id() (git-fixes).
- scsi: storvsc: Handle additional SRB status values (git-fixes).
- scsi: zfcp: Fix a double put in zfcp_port_enqueue() (git-fixes bsc#1215941).
- selftests: mlxsw: Fix test failure on Spectrum-4 (jsc#PED-1549).
- spi: Add TPM HW flow flag (bsc#1213534)
- spi: tegra210-quad: Enable TPM wait polling (bsc#1213534)
- spi: tegra210-quad: set half duplex flag (bsc#1213534)
- SUNRPC: Mark the cred for revalidation if the server rejects it (git-fixes).
- tpm_tis_spi: Add hardware wait polling (bsc#1213534)
- uapi: stddef.h: Fix __DECLARE_FLEX_ARRAY for C++ (git-fixes).
- udf: Fix extension of the last extent in the file (bsc#1214964).
- udf: Fix file corruption when appending just after end of preallocated extent (bsc#1214965).
- udf: Fix off-by-one error when discarding preallocation (bsc#1214966).
- udf: Fix uninitialized array access for some pathnames (bsc#1214967).
- Update metadata
- usb: ehci: add workaround for chipidea PORTSC.PEC bug (git-fixes).
- usb: ehci: move new member has_ci_pec_bug into hole (git-fixes).
- vhost_vdpa: fix the crash in unmap a large memory (git-fixes).
- vhost-scsi: unbreak any layout for response (git-fixes).
- vhost: allow batching hint without size (git-fixes).
- vhost: allow batching hint without size (git-fixes).
- vhost: fix hung thread due to erroneous iotlb entries (git-fixes).
- vhost: handle error while adding split ranges to iotlb (git-fixes).
- virtio_net: add checking sq is full inside xdp xmit (git-fixes).
- virtio_net: Fix probe failed when modprobe virtio_net (git-fixes).
- virtio_net: reorder some funcs (git-fixes).
- virtio_net: separate the logic of checking whether sq is full (git-fixes).
- virtio_ring: fix avail_wrap_counter in virtqueue_add_packed (git-fixes).
- virtio-blk: set req-&gt;state to MQ_RQ_COMPLETE after polling I/O is finished (git-fixes).
- virtio-mmio: do not break lifecycle of vm_dev (git-fixes).
- virtio-net: fix race between set queues and probe (git-fixes).
- virtio-net: set queues after driver_ok (git-fixes).
- virtio-rng: make device ready before making request (git-fixes).
- virtio: acknowledge all features before access (git-fixes).
- vmcore: remove dependency with is_kdump_kernel() for exporting vmcore (bsc#1212639 ltc#202582).
- x86/coco: Allow CPU online/offline for a TDX VM with the paravisor on Hyper-V (bsc#1206453).
- x86/coco: Export cc_vendor (bsc#1206453).
- x86/hyperv: Add hv_write_efer() for a TDX VM with the paravisor (bsc#1206453).
- x86/hyperv: Add hyperv-specific handling for VMMCALL under SEV-ES (bsc#1206453).
- x86/hyperv: Add missing 'inline' to hv_snp_boot_ap() stub (bsc#1206453).
- x86/hyperv: Add sev-snp enlightened guest static key (bsc#1206453)
- x86/hyperv: Add smp support for SEV-SNP guest (bsc#1206453).
- x86/hyperv: Add VTL specific structs and hypercalls (bsc#1206453).
- x86/hyperv: Fix serial console interrupts for fully enlightened TDX guests (bsc#1206453).
- x86/hyperv: Fix undefined reference to isolation_type_en_snp without CONFIG_HYPERV (bsc#1206453).
- x86/hyperv: Introduce a global variable hyperv_paravisor_present (bsc#1206453).
- x86/hyperv: Mark hv_ghcb_terminate() as noreturn (bsc#1206453).
- x86/hyperv: Mark Hyper-V vp assist page unencrypted in SEV-SNP enlightened guest (bsc#1206453).
- x86/hyperv: Move the code in ivm.c around to avoid unnecessary ifdef's (bsc#1206453).
- x86/hyperv: Remove hv_isolation_type_en_snp (bsc#1206453).
- x86/hyperv: Set Virtual Trust Level in VMBus init message (bsc#1206453).
- x86/hyperv: Support hypercalls for fully enlightened TDX guests (bsc#1206453).
- x86/hyperv: Use TDX GHCI to access some MSRs in a TDX VM with the paravisor (bsc#1206453).
- x86/hyperv: Use vmmcall to implement Hyper-V hypercall in sev-snp enlightened guest (bsc#1206453).
- x86/PVH: avoid 32-bit build warning when obtaining VGA console info (git-fixes).
- x86/srso: Do not probe microcode in a guest (git-fixes).
- x86/srso: Fix SBPB enablement for spec_rstack_overflow=off (git-fixes).
- x86/srso: Fix srso_show_state() side effect (git-fixes).
- x86/srso: Set CPUID feature bits independently of bug or mitigation status (git-fixes).
- xen: remove a confusing comment on auto-translated guest I/O (git-fixes).
- xprtrdma: Remap Receive buffers after a reconnect (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-10"/>
	<updated date="2023-10-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202845">SUSE bug 1202845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206453">SUSE bug 1206453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213808">SUSE bug 1213808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214941">SUSE bug 1214941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214942">SUSE bug 1214942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214943">SUSE bug 1214943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214944">SUSE bug 1214944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214950">SUSE bug 1214950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214951">SUSE bug 1214951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214954">SUSE bug 1214954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214957">SUSE bug 1214957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214986">SUSE bug 1214986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214992">SUSE bug 1214992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214993">SUSE bug 1214993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215322">SUSE bug 1215322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215523">SUSE bug 1215523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215877">SUSE bug 1215877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215894">SUSE bug 1215894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215895">SUSE bug 1215895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215896">SUSE bug 1215896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215911">SUSE bug 1215911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215915">SUSE bug 1215915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215916">SUSE bug 1215916</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1206/">CVE-2023-1206 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1206">CVE-2023-1206 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39192/">CVE-2023-39192 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39192">CVE-2023-39192 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39193/">CVE-2023-39193 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39193">CVE-2023-39193 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39194/">CVE-2023-39194 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39194">CVE-2023-39194 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4155/">CVE-2023-4155 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4155">CVE-2023-4155 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42753/">CVE-2023-42753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42754/">CVE-2023-42754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42754">CVE-2023-42754 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-4389/">CVE-2023-4389 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4389">CVE-2023-4389 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4622/">CVE-2023-4622 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4622">CVE-2023-4622 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4623/">CVE-2023-4623 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4921/">CVE-2023-4921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4921">CVE-2023-4921 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5345/">CVE-2023-5345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5345">CVE-2023-5345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009800738" comment="cluster-md-kmp-rt-5.14.21-150500.13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800739" comment="dlm-kmp-rt-5.14.21-150500.13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800740" comment="gfs2-kmp-rt-5.14.21-150500.13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800741" comment="kernel-devel-rt-5.14.21-150500.13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800742" comment="kernel-rt-5.14.21-150500.13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800743" comment="kernel-rt-devel-5.14.21-150500.13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800744" comment="kernel-rt-extra-5.14.21-150500.13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800745" comment="kernel-rt-livepatch-5.14.21-150500.13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800746" comment="kernel-rt-livepatch-devel-5.14.21-150500.13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800747" comment="kernel-rt-optional-5.14.21-150500.13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800748" comment="kernel-rt-vdso-5.14.21-150500.13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800749" comment="kernel-rt_debug-5.14.21-150500.13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800750" comment="kernel-rt_debug-devel-5.14.21-150500.13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800751" comment="kernel-rt_debug-livepatch-devel-5.14.21-150500.13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800752" comment="kernel-rt_debug-vdso-5.14.21-150500.13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800753" comment="kernel-source-rt-5.14.21-150500.13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800754" comment="kernel-syms-rt-5.14.21-150500.13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800755" comment="kselftests-kmp-rt-5.14.21-150500.13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800756" comment="ocfs2-kmp-rt-5.14.21-150500.13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800757" comment="reiserfs-kmp-rt-5.14.21-150500.13.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4432" version="1" class="patch">
	<metadata>
		<title>Security update for php-composer2 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215859" ref_url="https://bugzilla.suse.com/1215859" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-43655" ref_url="https://www.suse.com/security/cve/CVE-2023-43655/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016625.html" source="SUSE-SU"/>
		<description>
This update for php-composer2 fixes the following issues:

- CVE-2023-43655: Fixed a remote code execution issue that could be
  triggered if users published a web-accessible composer.phar file
  (bsc#1215859).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-10"/>
	<updated date="2023-10-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215859">SUSE bug 1215859</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-43655/">CVE-2023-43655 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43655">CVE-2023-43655 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799718" comment="php-composer2-2.2.3-150400.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4433" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215888" ref_url="https://bugzilla.suse.com/1215888" source="BUGZILLA"/>
		<reference ref_id="1215889" ref_url="https://bugzilla.suse.com/1215889" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38545" ref_url="https://www.suse.com/security/cve/CVE-2023-38545/" source="CVE"/>
		<reference ref_id="CVE-2023-38546" ref_url="https://www.suse.com/security/cve/CVE-2023-38546/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032069.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2023-38545: Fixed a heap buffer overflow in SOCKS5. (bsc#1215888)
- CVE-2023-38546: Fixed a cookie injection with none file. (bsc#1215889)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-11"/>
	<updated date="2023-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215888">SUSE bug 1215888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215889">SUSE bug 1215889</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38545/">CVE-2023-38545 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38545">CVE-2023-38545 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-38546/">CVE-2023-38546 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38546">CVE-2023-38546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009801103" comment="curl-8.0.1-150400.5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801104" comment="libcurl-devel-8.0.1-150400.5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801105" comment="libcurl-devel-32bit-8.0.1-150400.5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801106" comment="libcurl4-8.0.1-150400.5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801107" comment="libcurl4-32bit-8.0.1-150400.5.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4434" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215904" ref_url="https://bugzilla.suse.com/1215904" source="BUGZILLA"/>
		<reference ref_id="1215905" ref_url="https://bugzilla.suse.com/1215905" source="BUGZILLA"/>
		<reference ref_id="1215906" ref_url="https://bugzilla.suse.com/1215906" source="BUGZILLA"/>
		<reference ref_id="1215907" ref_url="https://bugzilla.suse.com/1215907" source="BUGZILLA"/>
		<reference ref_id="1215908" ref_url="https://bugzilla.suse.com/1215908" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3961" ref_url="https://www.suse.com/security/cve/CVE-2023-3961/" source="CVE"/>
		<reference ref_id="CVE-2023-4091" ref_url="https://www.suse.com/security/cve/CVE-2023-4091/" source="CVE"/>
		<reference ref_id="CVE-2023-4154" ref_url="https://www.suse.com/security/cve/CVE-2023-4154/" source="CVE"/>
		<reference ref_id="CVE-2023-42669" ref_url="https://www.suse.com/security/cve/CVE-2023-42669/" source="CVE"/>
		<reference ref_id="CVE-2023-42670" ref_url="https://www.suse.com/security/cve/CVE-2023-42670/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4046-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032067.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2023-4091: Fixed a bug where a client can truncate file with read-only permissions. (bsc#1215904)
- CVE-2023-42669: Fixed a bug in 'rpcecho' development server which allows Denial of Service via sleep() call on AD DC. (bsc#1215905)
- CVE-2023-42670: Fixed the procedure number which was out of range when starting Active Directory Users and Computers. (bsc#1215906)
- CVE-2023-3961: Fixed an unsanitized client pipe name passed to local_np_connect(). (bsc#1215907)
- CVE-2023-4154: Fixed a bug in dirsync which allows SYSTEM access with only 'GUID_DRS_GET_CHANGES' right. (bsc#1215908)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-11"/>
	<updated date="2023-10-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215904">SUSE bug 1215904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215905">SUSE bug 1215905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215906">SUSE bug 1215906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215907">SUSE bug 1215907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215908">SUSE bug 1215908</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-3961/">CVE-2023-3961 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3961">CVE-2023-3961 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4091/">CVE-2023-4091 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4091">CVE-2023-4091 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4154/">CVE-2023-4154 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4154">CVE-2023-4154 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42669/">CVE-2023-42669 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42669">CVE-2023-42669 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42670/">CVE-2023-42670 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42670">CVE-2023-42670 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009801170" comment="ctdb-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801171" comment="ctdb-pcp-pmda-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801172" comment="libsamba-policy-devel-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801173" comment="libsamba-policy-python3-devel-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801174" comment="libsamba-policy0-python3-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801175" comment="libsamba-policy0-python3-32bit-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801176" comment="samba-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801177" comment="samba-ceph-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801178" comment="samba-client-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801179" comment="samba-client-32bit-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801180" comment="samba-client-libs-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801181" comment="samba-client-libs-32bit-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801182" comment="samba-devel-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801183" comment="samba-devel-32bit-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801184" comment="samba-doc-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801185" comment="samba-gpupdate-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801186" comment="samba-ldb-ldap-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801187" comment="samba-libs-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801188" comment="samba-libs-32bit-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801189" comment="samba-libs-python3-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801190" comment="samba-libs-python3-32bit-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801191" comment="samba-python3-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801192" comment="samba-test-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801193" comment="samba-tool-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801194" comment="samba-winbind-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801195" comment="samba-winbind-libs-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801196" comment="samba-winbind-libs-32bit-4.17.9+git.421.abde31ca5c2-150500.3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4435" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215939" ref_url="https://bugzilla.suse.com/1215939" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5341" ref_url="https://www.suse.com/security/cve/CVE-2023-5341/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016633.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2023-5341: Fixed a heap use-after-free in coders/bmp.c. (bsc#1215939) 
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-11"/>
	<updated date="2023-10-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215939">SUSE bug 1215939</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5341/">CVE-2023-5341 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5341">CVE-2023-5341 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009800276" comment="ImageMagick-7.1.0.9-150400.6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800277" comment="ImageMagick-config-7-SUSE-7.1.0.9-150400.6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800278" comment="ImageMagick-config-7-upstream-7.1.0.9-150400.6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800279" comment="ImageMagick-devel-7.1.0.9-150400.6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800280" comment="ImageMagick-devel-32bit-7.1.0.9-150400.6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800281" comment="ImageMagick-doc-7.1.0.9-150400.6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800282" comment="ImageMagick-extra-7.1.0.9-150400.6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800283" comment="libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800284" comment="libMagick++-7_Q16HDRI5-32bit-7.1.0.9-150400.6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800285" comment="libMagick++-devel-7.1.0.9-150400.6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800286" comment="libMagick++-devel-32bit-7.1.0.9-150400.6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800287" comment="libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800288" comment="libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-150400.6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800289" comment="libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800290" comment="libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-150400.6.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800291" comment="perl-PerlMagick-7.1.0.9-150400.6.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4436" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215744" ref_url="https://bugzilla.suse.com/1215744" source="BUGZILLA"/>
		<reference ref_id="1215746" ref_url="https://bugzilla.suse.com/1215746" source="BUGZILLA"/>
		<reference ref_id="1215747" ref_url="https://bugzilla.suse.com/1215747" source="BUGZILLA"/>
		<reference ref_id="1215748" ref_url="https://bugzilla.suse.com/1215748" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-34323" ref_url="https://www.suse.com/security/cve/CVE-2023-34323/" source="CVE"/>
		<reference ref_id="CVE-2023-34325" ref_url="https://www.suse.com/security/cve/CVE-2023-34325/" source="CVE"/>
		<reference ref_id="CVE-2023-34326" ref_url="https://www.suse.com/security/cve/CVE-2023-34326/" source="CVE"/>
		<reference ref_id="CVE-2023-34327" ref_url="https://www.suse.com/security/cve/CVE-2023-34327/" source="CVE"/>
		<reference ref_id="CVE-2023-34328" ref_url="https://www.suse.com/security/cve/CVE-2023-34328/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016642.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2023-34323: A transaction conflict can crash C Xenstored (XSA-440, bsc#1215744)
- CVE-2023-34326: Missing IOMMU TLB flushing (XSA-442, bsc#1215746)
- CVE-2023-34325: Multiple vulnerabilities in libfsimage disk handling (XSA-443, bsc#1215747)
- CVE-2023-34327: Debug Mask handling (XSA-444, bsc#1215748)
- CVE-2023-34328: Debug Mask handling (XSA-444, bsc#1215748)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-12"/>
	<updated date="2023-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215744">SUSE bug 1215744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215746">SUSE bug 1215746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215747">SUSE bug 1215747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215748">SUSE bug 1215748</bugzilla>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34323/">CVE-2023-34323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34323">CVE-2023-34323 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-34325/">CVE-2023-34325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34325">CVE-2023-34325 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34326/">CVE-2023-34326 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34326">CVE-2023-34326 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34327/">CVE-2023-34327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34327">CVE-2023-34327 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34328/">CVE-2023-34328 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34328">CVE-2023-34328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009801197" comment="xen-4.17.2_06-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801198" comment="xen-devel-4.17.2_06-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801199" comment="xen-doc-html-4.17.2_06-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801200" comment="xen-libs-4.17.2_06-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801201" comment="xen-libs-32bit-4.17.2_06-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801202" comment="xen-tools-4.17.2_06-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801203" comment="xen-tools-domU-4.17.2_06-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801204" comment="xen-tools-xendomains-wait-disk-4.17.2_06-150500.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4437" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1187236" ref_url="https://bugzilla.suse.com/1187236" source="BUGZILLA"/>
		<reference ref_id="1201284" ref_url="https://bugzilla.suse.com/1201284" source="BUGZILLA"/>
		<reference ref_id="1202845" ref_url="https://bugzilla.suse.com/1202845" source="BUGZILLA"/>
		<reference ref_id="1206453" ref_url="https://bugzilla.suse.com/1206453" source="BUGZILLA"/>
		<reference ref_id="1208995" ref_url="https://bugzilla.suse.com/1208995" source="BUGZILLA"/>
		<reference ref_id="1210169" ref_url="https://bugzilla.suse.com/1210169" source="BUGZILLA"/>
		<reference ref_id="1210643" ref_url="https://bugzilla.suse.com/1210643" source="BUGZILLA"/>
		<reference ref_id="1210658" ref_url="https://bugzilla.suse.com/1210658" source="BUGZILLA"/>
		<reference ref_id="1212639" ref_url="https://bugzilla.suse.com/1212639" source="BUGZILLA"/>
		<reference ref_id="1212703" ref_url="https://bugzilla.suse.com/1212703" source="BUGZILLA"/>
		<reference ref_id="1213123" ref_url="https://bugzilla.suse.com/1213123" source="BUGZILLA"/>
		<reference ref_id="1213534" ref_url="https://bugzilla.suse.com/1213534" source="BUGZILLA"/>
		<reference ref_id="1213808" ref_url="https://bugzilla.suse.com/1213808" source="BUGZILLA"/>
		<reference ref_id="1214022" ref_url="https://bugzilla.suse.com/1214022" source="BUGZILLA"/>
		<reference ref_id="1214037" ref_url="https://bugzilla.suse.com/1214037" source="BUGZILLA"/>
		<reference ref_id="1214040" ref_url="https://bugzilla.suse.com/1214040" source="BUGZILLA"/>
		<reference ref_id="1214233" ref_url="https://bugzilla.suse.com/1214233" source="BUGZILLA"/>
		<reference ref_id="1214351" ref_url="https://bugzilla.suse.com/1214351" source="BUGZILLA"/>
		<reference ref_id="1214479" ref_url="https://bugzilla.suse.com/1214479" source="BUGZILLA"/>
		<reference ref_id="1214543" ref_url="https://bugzilla.suse.com/1214543" source="BUGZILLA"/>
		<reference ref_id="1214635" ref_url="https://bugzilla.suse.com/1214635" source="BUGZILLA"/>
		<reference ref_id="1214813" ref_url="https://bugzilla.suse.com/1214813" source="BUGZILLA"/>
		<reference ref_id="1214873" ref_url="https://bugzilla.suse.com/1214873" source="BUGZILLA"/>
		<reference ref_id="1214928" ref_url="https://bugzilla.suse.com/1214928" source="BUGZILLA"/>
		<reference ref_id="1214940" ref_url="https://bugzilla.suse.com/1214940" source="BUGZILLA"/>
		<reference ref_id="1214941" ref_url="https://bugzilla.suse.com/1214941" source="BUGZILLA"/>
		<reference ref_id="1214942" ref_url="https://bugzilla.suse.com/1214942" source="BUGZILLA"/>
		<reference ref_id="1214943" ref_url="https://bugzilla.suse.com/1214943" source="BUGZILLA"/>
		<reference ref_id="1214944" ref_url="https://bugzilla.suse.com/1214944" source="BUGZILLA"/>
		<reference ref_id="1214945" ref_url="https://bugzilla.suse.com/1214945" source="BUGZILLA"/>
		<reference ref_id="1214946" ref_url="https://bugzilla.suse.com/1214946" source="BUGZILLA"/>
		<reference ref_id="1214947" ref_url="https://bugzilla.suse.com/1214947" source="BUGZILLA"/>
		<reference ref_id="1214948" ref_url="https://bugzilla.suse.com/1214948" source="BUGZILLA"/>
		<reference ref_id="1214949" ref_url="https://bugzilla.suse.com/1214949" source="BUGZILLA"/>
		<reference ref_id="1214950" ref_url="https://bugzilla.suse.com/1214950" source="BUGZILLA"/>
		<reference ref_id="1214951" ref_url="https://bugzilla.suse.com/1214951" source="BUGZILLA"/>
		<reference ref_id="1214952" ref_url="https://bugzilla.suse.com/1214952" source="BUGZILLA"/>
		<reference ref_id="1214953" ref_url="https://bugzilla.suse.com/1214953" source="BUGZILLA"/>
		<reference ref_id="1214954" ref_url="https://bugzilla.suse.com/1214954" source="BUGZILLA"/>
		<reference ref_id="1214955" ref_url="https://bugzilla.suse.com/1214955" source="BUGZILLA"/>
		<reference ref_id="1214957" ref_url="https://bugzilla.suse.com/1214957" source="BUGZILLA"/>
		<reference ref_id="1214958" ref_url="https://bugzilla.suse.com/1214958" source="BUGZILLA"/>
		<reference ref_id="1214959" ref_url="https://bugzilla.suse.com/1214959" source="BUGZILLA"/>
		<reference ref_id="1214961" ref_url="https://bugzilla.suse.com/1214961" source="BUGZILLA"/>
		<reference ref_id="1214962" ref_url="https://bugzilla.suse.com/1214962" source="BUGZILLA"/>
		<reference ref_id="1214963" ref_url="https://bugzilla.suse.com/1214963" source="BUGZILLA"/>
		<reference ref_id="1214964" ref_url="https://bugzilla.suse.com/1214964" source="BUGZILLA"/>
		<reference ref_id="1214965" ref_url="https://bugzilla.suse.com/1214965" source="BUGZILLA"/>
		<reference ref_id="1214966" ref_url="https://bugzilla.suse.com/1214966" source="BUGZILLA"/>
		<reference ref_id="1214967" ref_url="https://bugzilla.suse.com/1214967" source="BUGZILLA"/>
		<reference ref_id="1214986" ref_url="https://bugzilla.suse.com/1214986" source="BUGZILLA"/>
		<reference ref_id="1214988" ref_url="https://bugzilla.suse.com/1214988" source="BUGZILLA"/>
		<reference ref_id="1214990" ref_url="https://bugzilla.suse.com/1214990" source="BUGZILLA"/>
		<reference ref_id="1214991" ref_url="https://bugzilla.suse.com/1214991" source="BUGZILLA"/>
		<reference ref_id="1214992" ref_url="https://bugzilla.suse.com/1214992" source="BUGZILLA"/>
		<reference ref_id="1214993" ref_url="https://bugzilla.suse.com/1214993" source="BUGZILLA"/>
		<reference ref_id="1214995" ref_url="https://bugzilla.suse.com/1214995" source="BUGZILLA"/>
		<reference ref_id="1214997" ref_url="https://bugzilla.suse.com/1214997" source="BUGZILLA"/>
		<reference ref_id="1214998" ref_url="https://bugzilla.suse.com/1214998" source="BUGZILLA"/>
		<reference ref_id="1215115" ref_url="https://bugzilla.suse.com/1215115" source="BUGZILLA"/>
		<reference ref_id="1215117" ref_url="https://bugzilla.suse.com/1215117" source="BUGZILLA"/>
		<reference ref_id="1215123" ref_url="https://bugzilla.suse.com/1215123" source="BUGZILLA"/>
		<reference ref_id="1215124" ref_url="https://bugzilla.suse.com/1215124" source="BUGZILLA"/>
		<reference ref_id="1215148" ref_url="https://bugzilla.suse.com/1215148" source="BUGZILLA"/>
		<reference ref_id="1215150" ref_url="https://bugzilla.suse.com/1215150" source="BUGZILLA"/>
		<reference ref_id="1215221" ref_url="https://bugzilla.suse.com/1215221" source="BUGZILLA"/>
		<reference ref_id="1215275" ref_url="https://bugzilla.suse.com/1215275" source="BUGZILLA"/>
		<reference ref_id="1215322" ref_url="https://bugzilla.suse.com/1215322" source="BUGZILLA"/>
		<reference ref_id="1215467" ref_url="https://bugzilla.suse.com/1215467" source="BUGZILLA"/>
		<reference ref_id="1215523" ref_url="https://bugzilla.suse.com/1215523" source="BUGZILLA"/>
		<reference ref_id="1215581" ref_url="https://bugzilla.suse.com/1215581" source="BUGZILLA"/>
		<reference ref_id="1215752" ref_url="https://bugzilla.suse.com/1215752" source="BUGZILLA"/>
		<reference ref_id="1215858" ref_url="https://bugzilla.suse.com/1215858" source="BUGZILLA"/>
		<reference ref_id="1215860" ref_url="https://bugzilla.suse.com/1215860" source="BUGZILLA"/>
		<reference ref_id="1215861" ref_url="https://bugzilla.suse.com/1215861" source="BUGZILLA"/>
		<reference ref_id="1215875" ref_url="https://bugzilla.suse.com/1215875" source="BUGZILLA"/>
		<reference ref_id="1215877" ref_url="https://bugzilla.suse.com/1215877" source="BUGZILLA"/>
		<reference ref_id="1215894" ref_url="https://bugzilla.suse.com/1215894" source="BUGZILLA"/>
		<reference ref_id="1215895" ref_url="https://bugzilla.suse.com/1215895" source="BUGZILLA"/>
		<reference ref_id="1215896" ref_url="https://bugzilla.suse.com/1215896" source="BUGZILLA"/>
		<reference ref_id="1215899" ref_url="https://bugzilla.suse.com/1215899" source="BUGZILLA"/>
		<reference ref_id="1215911" ref_url="https://bugzilla.suse.com/1215911" source="BUGZILLA"/>
		<reference ref_id="1215915" ref_url="https://bugzilla.suse.com/1215915" source="BUGZILLA"/>
		<reference ref_id="1215916" ref_url="https://bugzilla.suse.com/1215916" source="BUGZILLA"/>
		<reference ref_id="1215941" ref_url="https://bugzilla.suse.com/1215941" source="BUGZILLA"/>
		<reference ref_id="1215956" ref_url="https://bugzilla.suse.com/1215956" source="BUGZILLA"/>
		<reference ref_id="1215957" ref_url="https://bugzilla.suse.com/1215957" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1192" ref_url="https://www.suse.com/security/cve/CVE-2023-1192/" source="CVE"/>
		<reference ref_id="CVE-2023-1206" ref_url="https://www.suse.com/security/cve/CVE-2023-1206/" source="CVE"/>
		<reference ref_id="CVE-2023-1859" ref_url="https://www.suse.com/security/cve/CVE-2023-1859/" source="CVE"/>
		<reference ref_id="CVE-2023-2177" ref_url="https://www.suse.com/security/cve/CVE-2023-2177/" source="CVE"/>
		<reference ref_id="CVE-2023-37453" ref_url="https://www.suse.com/security/cve/CVE-2023-37453/" source="CVE"/>
		<reference ref_id="CVE-2023-39192" ref_url="https://www.suse.com/security/cve/CVE-2023-39192/" source="CVE"/>
		<reference ref_id="CVE-2023-39193" ref_url="https://www.suse.com/security/cve/CVE-2023-39193/" source="CVE"/>
		<reference ref_id="CVE-2023-39194" ref_url="https://www.suse.com/security/cve/CVE-2023-39194/" source="CVE"/>
		<reference ref_id="CVE-2023-40283" ref_url="https://www.suse.com/security/cve/CVE-2023-40283/" source="CVE"/>
		<reference ref_id="CVE-2023-4155" ref_url="https://www.suse.com/security/cve/CVE-2023-4155/" source="CVE"/>
		<reference ref_id="CVE-2023-42753" ref_url="https://www.suse.com/security/cve/CVE-2023-42753/" source="CVE"/>
		<reference ref_id="CVE-2023-42754" ref_url="https://www.suse.com/security/cve/CVE-2023-42754/" source="CVE"/>
		<reference ref_id="CVE-2023-4389" ref_url="https://www.suse.com/security/cve/CVE-2023-4389/" source="CVE"/>
		<reference ref_id="CVE-2023-4622" ref_url="https://www.suse.com/security/cve/CVE-2023-4622/" source="CVE"/>
		<reference ref_id="CVE-2023-4623" ref_url="https://www.suse.com/security/cve/CVE-2023-4623/" source="CVE"/>
		<reference ref_id="CVE-2023-4881" ref_url="https://www.suse.com/security/cve/CVE-2023-4881/" source="CVE"/>
		<reference ref_id="CVE-2023-4921" ref_url="https://www.suse.com/security/cve/CVE-2023-4921/" source="CVE"/>
		<reference ref_id="CVE-2023-5345" ref_url="https://www.suse.com/security/cve/CVE-2023-5345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2023-39192: Fixed an out of bounds read in the netfilter (bsc#1215858).
- CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860).
- CVE-2023-39194: Fixed an out of bounds read in the XFRM subsystem (bsc#1215861).
- CVE-2023-42754: Fixed a NULL pointer dereference in the IPv4 stack that could lead to denial of service (bsc#1215467).
- CVE-2023-4389: Fixed a reference counting issue in the Btrfs filesystem that could be exploited in order to leak internal kernel information or crash the system (bsc#1214351).
- CVE-2023-5345: fixed an use-after-free vulnerability in the fs/smb/client component which could be exploited to achieve local privilege escalation (bsc#1215899).
- CVE-2023-42753: Fixed an array indexing vulnerability in the netfilter subsystem. This issue may have allowed a local user to crash the system or potentially escalate their privileges (bsc#1215150).
- CVE-2023-1206: Fixed a hash collision flaw in the IPv6 connection lookup table which could be exploited by network adjacent attackers, increasing CPU usage by 95% (bsc#1212703).
- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalatio (bsc#1215275).
- CVE-2023-37453: Fixed oversight in SuperSpeed initialization  (bsc#1213123).
- CVE-2023-4622: Fixed a use-after-free vulnerability in the Unix domain sockets component which could be exploited to achieve local privilege escalation (bsc#1215117).
- CVE-2023-4623: Fixed a use-after-free issue in the HFSC network scheduler which could be exploited to achieve local privilege escalation (bsc#1215115).
- CVE-2023-4155: Fixed a flaw in KVM AMD Secure Encrypted Virtualization (SEV). An attacker can trigger a stack overflow and cause a denial of service or potentially guest-to-host escape in kernel configurations without stack guard pages (bsc#1214022).
- CVE-2023-1859: Fixed a use-after-free flaw in Xen transport for 9pfs which could be exploited to crash the system (bsc#1210169).
- CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221).
- CVE-2023-2177: Fixed a null pointer dereference issue in the sctp network protocol which could allow a user to crash the system (bsc#1210643).
- CVE-2023-40283: Fixed use-after-free in l2cap_sock_ready_cb (bsc#1214233).
- CVE-2023-1192: Fixed use-after-free in cifs_demultiplex_thread() (bsc#1208995).

The following non-security bugs were fixed:

- ALSA: hda/cirrus: Fix broken audio on hardware with two CS42L42 codecs (git-fixes).
- ALSA: hda/realtek: Splitting the UX3402 into two separate models (git-fixes).
- ARM: pxa: remove use of symbol_get() (git-fixes).
- ASoC: SOF: core: Only call sof_ops_free() on remove if the probe was successful (git-fixes).
- ASoC: amd: yc: Fix non-functional mic on Lenovo 82QF and 82UG (git-fixes).
- ASoC: hdaudio.c: Add missing check for devm_kstrdup (git-fixes).
- ASoC: imx-audmix: Fix return error with devm_clk_get() (git-fixes).
- ASoC: meson: spdifin: start hw on dai probe (git-fixes).
- ASoC: rt5640: Fix IRQ not being free-ed for HDA jack detect mode (git-fixes).
- ASoC: rt5640: Fix sleep in atomic context (git-fixes).
- ASoC: rt5640: Revert 'Fix sleep in atomic context' (git-fixes).
- ASoC: soc-utils: Export snd_soc_dai_is_dummy() symbol (git-fixes).
- ASoC: tegra: Fix redundant PLLA and PLLA_OUT0 updates (git-fixes).
- Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition (git-fixes).
- Drivers: hv: vmbus: Bring the post_msg_page back for TDX VMs with the paravisor (bsc#1206453).
- Drivers: hv: vmbus: Support &gt;64 VPs for a fully enlightened TDX/SNP VM (bsc#1206453).
- Drivers: hv: vmbus: Support fully enlightened TDX guests (bsc#1206453).
- Drop amdgpu patch causing spamming (bsc#1215523).
- Input: tca6416-keypad - fix interrupt enable disbalance (git-fixes).
- KVM: SVM: Remove a duplicate definition of VMCB_AVIC_APIC_BAR_MASK (git-fixes).
- KVM: VMX: Fix header file dependency of asm/vmx.h (git-fixes).
- KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler (git-fixes bsc#1215911).
- KVM: s390: fix KVM_S390_GET_CMMA_BITS for GFNs in memslot holes (git-fixes bsc#1215915).
- KVM: s390: interrupt: use READ_ONCE() before cmpxchg() (git-fixes bsc#1215896).
- KVM: s390: pv: fix external interruption loop not always detected (git-fixes bsc#1215916).
- KVM: s390: vsie: Fix the initialization of the epoch extension (epdx) field (git-fixes bsc#1215894).
- KVM: s390: vsie: fix the length of APCB bitmap (git-fixes bsc#1215895).
- KVM: x86/mmu: Include mmu.h in spte.h (git-fixes).
- KVM: x86: Fix KVM_CAP_SYNC_REGS's sync_regs() TOCTOU issues (git-fixes).
- NFS/pNFS: Report EINVAL errors from connect() to the server (git-fixes).
- NFS: Guard against READDIR loop when entry names exceed MAXNAMELEN (git-fixes).
- NFSD: da_addr_body field missing in some GETDEVICEINFO replies (git-fixes).
- NFSv4.2: fix error handling in nfs42_proc_getxattr (git-fixes).
- NFSv4.2: fix handling of COPY ERR_OFFLOAD_NO_REQ (git-fixes).
- NFSv4/pnfs: minor fix for cleanup path in nfs4_get_device_info (git-fixes).
- NFSv4: Fix dropped lock for racing OPEN and delegation return (git-fixes).
- NFSv4: fix out path in __nfs4_get_acl_uncached (git-fixes).
- PCI: Free released resource after coalescing (git-fixes).
- RDMA/siw: Fabricate a GID on tun and loopback devices (git-fixes)
- Revert 'PCI: Mark NVIDIA T4 GPUs to avoid bus reset' (git-fixes).
- Revert 'scsi: qla2xxx: Fix buffer overrun' (bsc#1214928).
- SUNRPC: Mark the cred for revalidation if the server rejects it (git-fixes).
- USB: serial: option: add FOXCONN T99W368/T99W373 product (git-fixes).
- USB: serial: option: add Quectel EM05G variant (0x030e) (git-fixes).
- arm64/fpsimd: Only provide the length to cpufeature for xCR registers (git-fixes)
- arm64/hyperv: Use CPUHP_AP_HYPERV_ONLINE state to fix CPU online sequencing (bsc#1206453).
- arm64: csum: Fix OoB access in IP checksum code for negative lengths (git-fixes).
- arm64: module-plts: inline linux/moduleloader.h (git-fixes)
- arm64: module: Use module_init_layout_section() to spot init sections (git-fixes)
- arm64: sdei: abort running SDEI handlers during crash (git-fixes)
- arm64: tegra: Update AHUB clock parent and rate (git-fixes)
- ata: libata: disallow dev-initiated LPM transitions to unsupported states (git-fixes).
- ata: pata_falcon: fix IO base selection for Q40 (git-fixes).
- ata: pata_ftide010: Add missing MODULE_DESCRIPTION (git-fixes).
- ata: sata_gemini: Add missing MODULE_DESCRIPTION (git-fixes).
- backlight: gpio_backlight: Drop output GPIO direction check for initial power state (git-fixes).
- blacklist.conf: workqueue: compiler warning on 32-bit systems with Clang (bsc#1215877)
- blk-iocost: fix divide by 0 error in calc_lcoefs() (bsc#1214986).
- blk-iocost: use spin_lock_irqsave in adjust_inuse_and_calc_cost (bsc#1214992).
- block/mq-deadline: use correct way to throttling write requests (bsc#1214993).
- bnx2x: new flag for track HW resource allocation (bsc#1202845 bsc#1215322).
- bpf: Clear the probe_addr for uprobe (git-fixes).
- btrfs: do not hold CPU for too long when defragging a file (bsc#1214988).
- clocksource: hyper-v: Mark hyperv tsc page unencrypted in sev-snp enlightened guest (bsc#1206453).
- drivers: hv: Mark percpu hvcall input arg page unencrypted in SEV-SNP enlightened guest (bsc#1206453).
- drm/amd/display: Add smu write msg id fail retry process (git-fixes).
- drm/amd/display: Remove wait while locked (git-fixes).
- drm/amd/display: enable cursor degamma for DCN3+ DRM legacy gamma (git-fixes).
- drm/amd/display: fix the white screen issue when &gt;= 64GB DRAM (git-fixes).
- drm/amd/display: prevent potential division by zero errors (git-fixes).
- drm/amd/display: register edp_backlight_control() for DCN301 (git-fixes).
- drm/ast: Add BMC virtual connector (bsc#1152472) Backporting changes: 	* rename ast_device to ast_private
- drm/ast: report connection status on Display Port. (bsc#1152472) Backporting changes: 	* rename ast_device to ast_private 	* context changes
- drm/display: Do not assume dual mode adaptors support i2c sub-addressing (bsc#1213808).
- drm/i915/gvt: Drop unused helper intel_vgpu_reset_gtt() (git-fixes).
- drm/i915/gvt: Put the page reference obtained by KVM's gfn_to_pfn() (git-fixes).
- drm/i915/gvt: Verify pfn is 'valid' before dereferencing 'struct page' (git-fixes).
- drm/i915: mark requests for GuC virtual engines to avoid use-after-free (git-fixes).
- drm/meson: fix memory leak on -&gt;hpd_notify callback (git-fixes).
- drm/virtio: Correct drm_gem_shmem_get_sg_table() error handling (git-fixes).
- drm/virtio: Use appropriate atomic state in virtio_gpu_plane_cleanup_fb() (git-fixes).
- drm: gm12u320: Fix the timeout usage for usb_bulk_msg() (git-fixes).
- ext4: Remove ext4 locking of moved directory (bsc#1214957).
- ext4: avoid potential data overflow in next_linear_group (bsc#1214951).
- ext4: correct inline offset when handling xattrs in inode body (bsc#1214950).
- ext4: fix memory leaks in ext4_fname_{setup_filename,prepare_lookup} (bsc#1214954).
- ext4: fix wrong unit use in ext4_mb_clear_bb (bsc#1214943).
- ext4: fix wrong unit use in ext4_mb_new_blocks (bsc#1214944).
- ext4: get block from bh in ext4_free_blocks for fast commit replay (bsc#1214942).
- ext4: reflect error codes from ext4_multi_mount_protect() to its callers (bsc#1214941).
- ext4: set goal start correctly in ext4_mb_normalize_request (bsc#1214940).
- fs: Establish locking order for unrelated directories (bsc#1214958).
- fs: Lock moved directories (bsc#1214959).
- fs: do not update freeing inode i_io_list (bsc#1214813).
- fs: lockd: avoid possible wrong NULL parameter (git-fixes).
- fs: no need to check source (bsc#1215752).
- fs: record I_DIRTY_TIME even if inode already has I_DIRTY_INODE (bsc#1214813).
- fuse: nlookup missing decrement in fuse_direntplus_link (bsc#1215581).
- gve: Add AF_XDP zero-copy support for GQI-QPL format (bsc#1214479).
- gve: Add XDP DROP and TX support for GQI-QPL format (bsc#1214479).
- gve: Add XDP REDIRECT support for GQI-QPL format (bsc#1214479).
- gve: Changes to add new TX queues (bsc#1214479).
- gve: Control path for DQO-QPL (bsc#1214479).
- gve: Fix gve interrupt names (bsc#1214479).
- gve: RX path for DQO-QPL (bsc#1214479).
- gve: Tx path for DQO-QPL (bsc#1214479).
- gve: Unify duplicate GQ min pkt desc size constants (bsc#1214479).
- gve: XDP support GQI-QPL: helper function changes (bsc#1214479).
- gve: fix frag_list chaining (bsc#1214479).
- gve: trivial spell fix Recive to Receive (bsc#1214479).
- gve: use vmalloc_array and vcalloc (bsc#1214479).
- hwrng: virtio - Fix race on data_avail and actual data (git-fixes).
- hwrng: virtio - add an internal buffer (git-fixes).
- hwrng: virtio - always add a pending request (git-fixes).
- hwrng: virtio - do not wait on cleanup (git-fixes).
- hwrng: virtio - do not waste entropy (git-fixes).
- i2c: aspeed: Reset the i2c controller when timeout occurs (git-fixes).
- i3c: master: svc: fix probe failure when no i3c device exist (git-fixes).
- i915/pmu: Move execlist stats initialization to execlist specific setup (git-fixes).
- idr: fix param name in idr_alloc_cyclic() doc (git-fixes).
- iommu/virtio: Detach domain on endpoint release (git-fixes).
- iommu/virtio: Return size mapped for a detached domain (git-fixes).
- jbd2: Fix wrongly judgement for buffer head removing while doing checkpoint (bsc#1214948).
- jbd2: check 'jh-&gt;b_transaction' before removing it from checkpoint (bsc#1214953).
- jbd2: correct the end of the journal recovery scan range (bsc#1214955).
- jbd2: fix a race when checking checkpoint buffer busy (bsc#1214949).
- jbd2: fix checkpoint cleanup performance regression (bsc#1214952).
- jbd2: recheck chechpointing non-dirty buffer (bsc#1214945).
- jbd2: remove journal_clean_one_cp_list() (bsc#1214947).
- jbd2: remove t_checkpoint_io_list (bsc#1214946).
- jbd2: restore t_checkpoint_io_list to maintain kABI (bsc#1214946).
- kabi/severities: ignore mlx4 internal symbols
- s390/ipl: add support for List-Directed dump from ECKD DASD (jsc#PED-2023, jsc#PED-2025).
- kconfig: fix possible buffer overflow (git-fixes).
- kernel-binary: Move build-time definitions together Move source list and build architecture to buildrequires to aid in future reorganization of the spec template.
- kernel-binary: python3 is needed for build At least scripts/bpf_helpers_doc.py requires python3 since Linux 4.18 Other simimlar scripts may exist.
- kselftest/runner.sh: Propagate SIGTERM to runner child (git-fixes).
- loop: Fix use-after-free issues (bsc#1214991).
- loop: loop_set_status_from_info() check before assignment (bsc#1214990).
- mlx4: Avoid resetting MLX4_INTFF_BONDING per driver (bsc#1187236).
- mlx4: Connect the ethernet part to the auxiliary bus (bsc#1187236).
- mlx4: Connect the infiniband part to the auxiliary bus (bsc#1187236).
- mlx4: Delete custom device management logic (bsc#1187236).
- mlx4: Get rid of the mlx4_interface.activate callback (bsc#1187236).
- mlx4: Get rid of the mlx4_interface.get_dev callback (bsc#1187236).
- mlx4: Move the bond work to the core driver (bsc#1187236).
- mlx4: Register mlx4 devices to an auxiliary virtual bus (bsc#1187236).
- mlx4: Rename member mlx4_en_dev.nb to netdev_nb (bsc#1187236).
- mlx4: Replace the mlx4_interface.event callback with a notifier (bsc#1187236).
- mlx4: Use 'void *' as the event param of mlx4_dispatch_event() (bsc#1187236).
- module: Expose module_init_layout_section() (git-fixes)
- net/mlx4: Remove many unnecessary NULL values (bsc#1187236).
- net: do not allow gso_size to be set to GSO_BY_FRAGS (git-fixes).
- net: mana: Add page pool for RX buffers (bsc#1214040).
- net: mana: Configure hwc timeout from hardware (bsc#1214037).
- net: phy: micrel: Correct bit assignments for phy_device flags (git-fixes).
- net: usb: qmi_wwan: add Quectel EM05GV2 (git-fixes).
- nfs/blocklayout: Use the passed in gfp flags (git-fixes).
- nfsd: Fix race to FREE_STATEID and cl_revoked (git-fixes).
- nfsd: fix change_info in NFSv4 RENAME replies (git-fixes).
- ntb: Clean up tx tail index on link down (git-fixes).
- ntb: Drop packets when qp link is down (git-fixes).
- ntb: Fix calculation ntb_transport_tx_free_entry() (git-fixes).
- nvme-auth: use chap-&gt;s2 to indicate bidirectional authentication (bsc#1214543).
- nvme-tcp: Do not terminate commands when in RESETTING (bsc#1201284).
- nvme-tcp: add recovery_delay to sysfs (bsc#1201284).
- nvme-tcp: delay error recovery until the next KATO interval (bsc#1201284).
- nvme-tcp: make 'err_work' a delayed work (bsc#1201284).
- pNFS: Fix assignment of xprtdata.cred (git-fixes).
- platform/mellanox: mlxbf-pmc: Fix potential buffer overflows (git-fixes).
- platform/mellanox: mlxbf-pmc: Fix reading of unprogrammed events (git-fixes).
- platform/mellanox: mlxbf-tmfifo: Drop jumbo frames (git-fixes).
- platform/mellanox: mlxbf-tmfifo: Drop the Rx packet if no more descriptors (git-fixes).
- platform/x86: intel_scu_ipc: Check status after timeout in busy_loop() (git-fixes).
- platform/x86: intel_scu_ipc: Check status upon timeout in ipc_wait_for_interrupt() (git-fixes).
- platform/x86: intel_scu_ipc: Do not override scu in intel_scu_ipc_dev_simple_command() (git-fixes).
- platform/x86: intel_scu_ipc: Fail IPC send if still busy (git-fixes).
- powerpc/fadump: make is_kdump_kernel() return false when fadump is active (bsc#1212639 ltc#202582).
- powerpc/iommu: Fix notifiers being shared by PCI and VIO buses (bsc#1065729).
- powerpc/xics: Remove unnecessary endian conversion (bsc#1065729).
- printk: ringbuffer: Fix truncating buffer size min_t cast (bsc#1215875).
- pwm: lpc32xx: Remove handling of PWM channels (git-fixes).
- quota: Properly disable quotas when add_dquot_ref() fails (bsc#1214961).
- quota: add new helper dquot_active() (bsc#1214998).
- quota: factor out dquot_write_dquot() (bsc#1214995).
- quota: fix dqput() to follow the guarantees dquot_srcu should provide (bsc#1214963).
- quota: fix warning in dqgrab() (bsc#1214962).
- quota: rename dquot_active() to inode_quota_active() (bsc#1214997).
- s390/dasd: fix hanging device after request requeue (git-fixes bsc#1215124).
- s390/qeth: Do not call dev_close/dev_open (DOWN/UP) (bsc#1214873 git-fixes).
- s390/zcrypt: do not leak memory if dev_set_name() fails (git-fixes bsc#1215148).
- s390: add z16 elf platform (git-fixes bsc#1215956, bsc#1215957).
- scsi: 3w-xxxx: Add error handling for initialization failure in tw_probe() (git-fixes).
- scsi: 53c700: Check that command slot is not NULL (git-fixes).
- scsi: core: Fix legacy /proc parsing buffer overflow (git-fixes).
- scsi: core: Fix possible memory leak if device_add() fails (git-fixes).
- scsi: fnic: Replace return codes in fnic_clean_pending_aborts() (git-fixes).
- scsi: lpfc: Do not abuse UUID APIs and LPFC_COMPRESS_VMID_SIZE (git-fixes).
- scsi: lpfc: Early return after marking final NLP_DROPPED flag in dev_loss_tmo (git-fixes).
- scsi: lpfc: Fix the NULL vs IS_ERR() bug for debugfs_create_file() (git-fixes).
- scsi: lpfc: Modify when a node should be put in device recovery mode during RSCN (git-fixes).
- scsi: lpfc: Prevent use-after-free during rmmod with mapped NVMe rports (git-fixes).
- scsi: lpfc: Remove reftag check in DIF paths (git-fixes).
- scsi: qedf: Add synchronization between I/O completions and abort (bsc#1210658).
- scsi: qedf: Fix NULL dereference in error handling (git-fixes).
- scsi: qedf: Fix firmware halt over suspend and resume (git-fixes).
- scsi: qedi: Fix firmware halt over suspend and resume (git-fixes).
- scsi: qla2xxx: Add logs for SFP temperature monitoring (bsc#1214928).
- scsi: qla2xxx: Allow 32-byte CDBs (bsc#1214928).
- scsi: qla2xxx: Error code did not return to upper layer (bsc#1214928).
- scsi: qla2xxx: Fix NULL vs IS_ERR() bug for debugfs_create_dir() (git-fixes).
- scsi: qla2xxx: Fix firmware resource tracking (bsc#1214928).
- scsi: qla2xxx: Fix smatch warn for qla_init_iocb_limit() (bsc#1214928).
- scsi: qla2xxx: Flush mailbox commands on chip reset (bsc#1214928).
- scsi: qla2xxx: Move resource to allow code reuse (bsc#1214928).
- scsi: qla2xxx: Remove unsupported ql2xenabledif option (bsc#1214928).
- scsi: qla2xxx: Remove unused declarations (bsc#1214928).
- scsi: qla2xxx: Remove unused variables in qla24xx_build_scsi_type_6_iocbs() (bsc#1214928).
- scsi: qla2xxx: Update version to 10.02.09.100-k (bsc#1214928).
- scsi: qla2xxx: Use raw_smp_processor_id() instead of smp_processor_id() (git-fixes).
- scsi: scsi_debug: Remove dead code (git-fixes).
- scsi: snic: Fix double free in snic_tgt_create() (git-fixes).
- scsi: snic: Fix possible memory leak if device_add() fails (git-fixes).
- scsi: storvsc: Handle additional SRB status values (git-fixes).
- scsi: zfcp: Fix a double put in zfcp_port_enqueue() (git-fixes bsc#1215941).
- selftests: mlxsw: Fix test failure on Spectrum-4 (jsc#PED-1549).
- selftests: tracing: Fix to unmount tracefs for recovering environment (git-fixes).
- spi: Add TPM HW flow flag (bsc#1213534)
- spi: tegra210-quad: Enable TPM wait polling (bsc#1213534)
- spi: tegra210-quad: set half duplex flag (bsc#1213534)
- tcpm: Avoid soft reset when partner does not support get_status (git-fixes).
- tpm_tis_spi: Add hardware wait polling (bsc#1213534)
- tracing: Fix race issue between cpu buffer write and swap (git-fixes).
- tracing: Remove extra space at the end of hwlat_detector/mode (git-fixes).
- tracing: Remove unnecessary copying of tr-&gt;current_trace (git-fixes).
- uapi: stddef.h: Fix __DECLARE_FLEX_ARRAY for C++ (git-fixes).
- udf: Fix extension of the last extent in the file (bsc#1214964).
- udf: Fix file corruption when appending just after end of preallocated extent (bsc#1214965).
- udf: Fix off-by-one error when discarding preallocation (bsc#1214966).
- udf: Fix uninitialized array access for some pathnames (bsc#1214967).
- uprobes/x86: Allow to probe a NOP instruction with 0x66 prefix (git-fixes).
- usb: ehci: add workaround for chipidea PORTSC.PEC bug (git-fixes).
- usb: ehci: move new member has_ci_pec_bug into hole (git-fixes).
- usb: typec: tcpci: clear the fault status bit (git-fixes).
- usb: typec: tcpci: move tcpci.h to include/linux/usb/ (git-fixes).
- vhost-scsi: unbreak any layout for response (git-fixes).
- vhost: allow batching hint without size (git-fixes).
- vhost: fix hung thread due to erroneous iotlb entries (git-fixes).
- vhost: handle error while adding split ranges to iotlb (git-fixes).
- vhost_vdpa: fix the crash in unmap a large memory (git-fixes).
- virtio-blk: set req-&gt;state to MQ_RQ_COMPLETE after polling I/O is finished (git-fixes).
- virtio-mmio: do not break lifecycle of vm_dev (git-fixes).
- virtio-net: fix race between set queues and probe (git-fixes).
- virtio-net: set queues after driver_ok (git-fixes).
- virtio-rng: make device ready before making request (git-fixes).
- virtio: acknowledge all features before access (git-fixes).
- virtio_net: Fix probe failed when modprobe virtio_net (git-fixes).
- virtio_net: add checking sq is full inside xdp xmit (git-fixes).
- virtio_net: reorder some funcs (git-fixes).
- virtio_net: separate the logic of checking whether sq is full (git-fixes).
- virtio_ring: fix avail_wrap_counter in virtqueue_add_packed (git-fixes).
- vmcore: remove dependency with is_kdump_kernel() for exporting vmcore (bsc#1212639 ltc#202582).
- watchdog: intel-mid_wdt: add MODULE_ALIAS() to allow auto-load (git-fixes).
- word-at-a-time: use the same return type for has_zero regardless of endianness (bsc#1065729).
- x86/PVH: avoid 32-bit build warning when obtaining VGA console info (git-fixes).
- x86/alternative: Fix race in try_get_desc() (git-fixes).
- x86/boot/e820: Fix typo in e820.c comment (git-fixes).
- x86/bugs: Reset speculation control settings on init (git-fixes).
- x86/coco: Allow CPU online/offline for a TDX VM with the paravisor on Hyper-V (bsc#1206453).
- x86/coco: Export cc_vendor (bsc#1206453).
- x86/cpu: Add Lunar Lake M (git-fixes).
- x86/cpu: Add model number for Intel Arrow Lake processor (git-fixes).
- x86/fpu: Take task_struct* in copy_sigframe_from_user_to_xstate() (git-fixes).
- x86/head/64: Switch to KERNEL_CS as soon as new GDT is installed (git-fixes).
- x86/hyperv: Add VTL specific structs and hypercalls (bsc#1206453).
- x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests (bsc#1206453).
- x86/hyperv: Add hv_write_efer() for a TDX VM with the paravisor (bsc#1206453).
- x86/hyperv: Add hyperv-specific handling for VMMCALL under SEV-ES (bsc#1206453).
- x86/hyperv: Add missing 'inline' to hv_snp_boot_ap() stub (bsc#1206453).
- x86/hyperv: Add sev-snp enlightened guest static key (bsc#1206453)
- x86/hyperv: Add smp support for SEV-SNP guest (bsc#1206453).
- x86/hyperv: Fix hyperv_pcpu_input_arg handling when CPUs go online/offline (bsc#1206453).
- x86/hyperv: Fix serial console interrupts for fully enlightened TDX guests (bsc#1206453).
- x86/hyperv: Fix undefined reference to isolation_type_en_snp without CONFIG_HYPERV (bsc#1206453).
- x86/hyperv: Introduce a global variable hyperv_paravisor_present (bsc#1206453).
- x86/hyperv: Mark Hyper-V vp assist page unencrypted in SEV-SNP enlightened guest (bsc#1206453).
- x86/hyperv: Mark hv_ghcb_terminate() as noreturn (bsc#1206453).
- x86/hyperv: Move the code in ivm.c around to avoid unnecessary ifdef's (bsc#1206453).
- x86/hyperv: Remove hv_isolation_type_en_snp (bsc#1206453).
- x86/hyperv: Set Virtual Trust Level in VMBus init message (bsc#1206453).
- x86/hyperv: Support hypercalls for fully enlightened TDX guests (bsc#1206453).
- x86/hyperv: Use TDX GHCI to access some MSRs in a TDX VM with the paravisor (bsc#1206453).
- x86/hyperv: Use vmmcall to implement Hyper-V hypercall in sev-snp enlightened guest (bsc#1206453).
- x86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL (git-fixes).
- x86/ioapic: Do not return 0 from arch_dynirq_lower_bound() (git-fixes).
- x86/ioremap: Fix page aligned size calculation in __ioremap_caller() (git-fixes).
- x86/mce: Retrieve poison range from hardware (git-fixes).
- x86/mem_encrypt: Unbreak the AMD_MEM_ENCRYPT=n build (git-fixes).
- x86/mm: Avoid incomplete Global INVLPG flushes (git-fixes).
- x86/mm: Do not shuffle CPU entry areas without KASLR (git-fixes).
- x86/purgatory: remove PGO flags (git-fixes).
- x86/reboot: Disable virtualization in an emergency if SVM is supported (git-fixes).
- x86/resctl: fix scheduler confusion with 'current' (git-fixes).
- x86/resctrl: Fix task CLOSID/RMID update race (git-fixes).
- x86/resctrl: Fix to restore to original value when re-enabling hardware prefetch register (git-fixes).
- x86/rtc: Remove __init for runtime functions (git-fixes).
- x86/sev: Make enc_dec_hypercall() accept a size instead of npages (bsc#1214635).
- x86/sgx: Reduce delay and interference of enclave release (git-fixes).
- x86/srso: Do not probe microcode in a guest (git-fixes).
- x86/srso: Fix SBPB enablement for spec_rstack_overflow=off (git-fixes).
- x86/srso: Fix srso_show_state() side effect (git-fixes).
- x86/srso: Set CPUID feature bits independently of bug or mitigation status (git-fixes).
- x86/virt: Force GIF=1 prior to disabling SVM (for reboot flows) (git-fixes).
- xen: remove a confusing comment on auto-translated guest I/O (git-fixes).
- xprtrdma: Remap Receive buffers after a reconnect (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-12"/>
	<updated date="2023-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187236">SUSE bug 1187236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201284">SUSE bug 1201284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202845">SUSE bug 1202845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206453">SUSE bug 1206453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208995">SUSE bug 1208995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210169">SUSE bug 1210169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210643">SUSE bug 1210643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210658">SUSE bug 1210658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212639">SUSE bug 1212639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212703">SUSE bug 1212703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213123">SUSE bug 1213123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213534">SUSE bug 1213534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213808">SUSE bug 1213808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214022">SUSE bug 1214022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214037">SUSE bug 1214037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214040">SUSE bug 1214040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214233">SUSE bug 1214233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214351">SUSE bug 1214351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214479">SUSE bug 1214479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214543">SUSE bug 1214543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214635">SUSE bug 1214635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214813">SUSE bug 1214813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214873">SUSE bug 1214873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214928">SUSE bug 1214928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214940">SUSE bug 1214940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214941">SUSE bug 1214941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214942">SUSE bug 1214942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214943">SUSE bug 1214943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214944">SUSE bug 1214944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214945">SUSE bug 1214945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214946">SUSE bug 1214946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214947">SUSE bug 1214947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214948">SUSE bug 1214948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214949">SUSE bug 1214949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214950">SUSE bug 1214950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214951">SUSE bug 1214951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214952">SUSE bug 1214952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214953">SUSE bug 1214953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214954">SUSE bug 1214954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214955">SUSE bug 1214955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214957">SUSE bug 1214957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214958">SUSE bug 1214958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214959">SUSE bug 1214959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214961">SUSE bug 1214961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214962">SUSE bug 1214962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214963">SUSE bug 1214963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214964">SUSE bug 1214964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214965">SUSE bug 1214965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214966">SUSE bug 1214966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214967">SUSE bug 1214967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214986">SUSE bug 1214986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214988">SUSE bug 1214988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214990">SUSE bug 1214990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214991">SUSE bug 1214991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214992">SUSE bug 1214992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214993">SUSE bug 1214993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214995">SUSE bug 1214995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214997">SUSE bug 1214997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214998">SUSE bug 1214998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215115">SUSE bug 1215115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215117">SUSE bug 1215117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215123">SUSE bug 1215123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215124">SUSE bug 1215124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215148">SUSE bug 1215148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215150">SUSE bug 1215150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215221">SUSE bug 1215221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215275">SUSE bug 1215275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215322">SUSE bug 1215322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215467">SUSE bug 1215467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215523">SUSE bug 1215523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215581">SUSE bug 1215581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215752">SUSE bug 1215752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215858">SUSE bug 1215858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215860">SUSE bug 1215860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215861">SUSE bug 1215861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215875">SUSE bug 1215875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215877">SUSE bug 1215877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215894">SUSE bug 1215894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215895">SUSE bug 1215895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215896">SUSE bug 1215896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215899">SUSE bug 1215899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215911">SUSE bug 1215911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215915">SUSE bug 1215915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215916">SUSE bug 1215916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215941">SUSE bug 1215941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215956">SUSE bug 1215956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215957">SUSE bug 1215957</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1192/">CVE-2023-1192 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1192">CVE-2023-1192 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1206/">CVE-2023-1206 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1206">CVE-2023-1206 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1859/">CVE-2023-1859 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1859">CVE-2023-1859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2177/">CVE-2023-2177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2177">CVE-2023-2177 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37453/">CVE-2023-37453 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37453">CVE-2023-37453 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39192/">CVE-2023-39192 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39192">CVE-2023-39192 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39193/">CVE-2023-39193 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39193">CVE-2023-39193 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39194/">CVE-2023-39194 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39194">CVE-2023-39194 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40283/">CVE-2023-40283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40283">CVE-2023-40283 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4155/">CVE-2023-4155 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4155">CVE-2023-4155 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42753/">CVE-2023-42753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42754/">CVE-2023-42754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42754">CVE-2023-42754 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-4389/">CVE-2023-4389 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4389">CVE-2023-4389 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4622/">CVE-2023-4622 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4622">CVE-2023-4622 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4623/">CVE-2023-4623 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4881/">CVE-2023-4881 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4881">CVE-2023-4881 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4921/">CVE-2023-4921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4921">CVE-2023-4921 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5345/">CVE-2023-5345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5345">CVE-2023-5345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009800722" comment="cluster-md-kmp-azure-5.14.21-150500.33.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800723" comment="dlm-kmp-azure-5.14.21-150500.33.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800724" comment="gfs2-kmp-azure-5.14.21-150500.33.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800725" comment="kernel-azure-5.14.21-150500.33.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800726" comment="kernel-azure-devel-5.14.21-150500.33.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800727" comment="kernel-azure-extra-5.14.21-150500.33.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800728" comment="kernel-azure-livepatch-devel-5.14.21-150500.33.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800729" comment="kernel-azure-optional-5.14.21-150500.33.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800730" comment="kernel-azure-vdso-5.14.21-150500.33.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800731" comment="kernel-devel-azure-5.14.21-150500.33.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800732" comment="kernel-source-azure-5.14.21-150500.33.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800733" comment="kernel-syms-azure-5.14.21-150500.33.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800734" comment="kselftests-kmp-azure-5.14.21-150500.33.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800735" comment="ocfs2-kmp-azure-5.14.21-150500.33.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800736" comment="reiserfs-kmp-azure-5.14.21-150500.33.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4438" version="1" class="patch">
	<metadata>
		<title>Security update for rage-encryption (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215657" ref_url="https://bugzilla.suse.com/1215657" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-42811" ref_url="https://www.suse.com/security/cve/CVE-2023-42811/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016645.html" source="SUSE-SU"/>
		<description>
This update for rage-encryption fixes the following issues:

 -CVE-2023-42811: chosen ciphertext attack possible against aes-gcm (bsc#1215657)

  * update vendor.tar.zst to contain aes-gcm &gt;= 0.10.3

- Update to version 0.9.2+0:

  * CI: Ensure `apt` repository is up-to-date before installing build deps
  * CI: Build Linux releases using `ubuntu-20.04` runner
  * CI: Remove most uses of `actions-rs` actions

- Update to version 0.9.2+0:

  * Fix changelog bugs and add missing entry
  * Document `PINENTRY_PROGRAM` environment variable
  * age: Add `Decryptor::new_async_buffered`
  * age: `impl AsyncBufRead for ArmoredReader`
  * Pre-initialize vectors when the capacity is known, or use arrays
  * Use `PINENTRY_PROGRAM` as environment variable for `pinentry`
  * Document why `impl AsyncWrite for StreamWriter` doesn't loop indefinitely
  * cargo update
  * cargo vet prune
  * Migrate to `cargo-vet 0.7`
  * build(deps): bump svenstaro/upload-release-action from 2.5.0 to 2.6.1
  * Correct spelling in documentation
  * build(deps): bump codecov/codecov-action from 3.1.1 to 3.1.4
  * StreamWriter AsyncWrite: fix usage with futures::io::copy()
  * rage: Use `Decryptor::new_buffered`
  * age: Add `Decryptor::new_buffered`
  * age: `impl BufRead for ArmoredReader`
  * Update Homebrew formula to v0.9.1
  * feat/pinentry: Use env var to define pinentry binary

- Update to version 0.9.1+0:

  * ssh: Fix parsing of OpenSSH private key format
  * ssh: Support `aes256-gcm@openssh.com` ciphers for encrypted keys
  * ssh: Add `aes256-gcm@openssh.com` cipher to test cases
  * ssh: Extract common key material derivation logic for encrypted keys
  * ssh: Use associated constants for key and IV sizes
  * ssh: Add test cases for encrypted keys
- Add shell completions for fish and zsh.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-12"/>
	<updated date="2023-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215657">SUSE bug 1215657</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-42811/">CVE-2023-42811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42811">CVE-2023-42811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799838" comment="rage-encryption-0.9.2+0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799839" comment="rage-encryption-bash-completion-0.9.2+0-150500.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4439" version="1" class="patch">
	<metadata>
		<title>Security update for go1.20 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206346" ref_url="https://bugzilla.suse.com/1206346" source="BUGZILLA"/>
		<reference ref_id="1216109" ref_url="https://bugzilla.suse.com/1216109" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39325" ref_url="https://www.suse.com/security/cve/CVE-2023-39325/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016681.html" source="SUSE-SU"/>
		<description>
This update for go1.20 fixes the following issues:

- Update to go1.20.10 (bsc#1206346)
- CVE-2023-39325: Fixed a flaw that can lead to a DoS due to a rapid stream resets causing excessive work. This is also known as CVE-2023-44487. (bsc#1216109)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2023-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206346">SUSE bug 1206346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216109">SUSE bug 1216109</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39325/">CVE-2023-39325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009801097" comment="go1.20-1.20.10-150000.1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801098" comment="go1.20-doc-1.20.10-150000.1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801099" comment="go1.20-race-1.20.10-150000.1.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4440" version="1" class="patch">
	<metadata>
		<title>Security update for go1.21 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="1216109" ref_url="https://bugzilla.suse.com/1216109" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39325" ref_url="https://www.suse.com/security/cve/CVE-2023-39325/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016680.html" source="SUSE-SU"/>
		<description>
This update for go1.21 fixes the following issues:

- Update to go1.21.3 (bsc#1212475)
- CVE-2023-39325: Fixed a flaw that can lead to a DoS due to a rapid stream resets causing excessive work. This is also known as CVE-2023-44487. (bsc#1216109)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2023-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216109">SUSE bug 1216109</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39325/">CVE-2023-39325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009801100" comment="go1.21-1.21.3-150000.1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801101" comment="go1.21-doc-1.21.3-150000.1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801102" comment="go1.21-race-1.21.3-150000.1.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4441" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1187236" ref_url="https://bugzilla.suse.com/1187236" source="BUGZILLA"/>
		<reference ref_id="1201284" ref_url="https://bugzilla.suse.com/1201284" source="BUGZILLA"/>
		<reference ref_id="1202845" ref_url="https://bugzilla.suse.com/1202845" source="BUGZILLA"/>
		<reference ref_id="1206453" ref_url="https://bugzilla.suse.com/1206453" source="BUGZILLA"/>
		<reference ref_id="1208995" ref_url="https://bugzilla.suse.com/1208995" source="BUGZILLA"/>
		<reference ref_id="1210169" ref_url="https://bugzilla.suse.com/1210169" source="BUGZILLA"/>
		<reference ref_id="1210643" ref_url="https://bugzilla.suse.com/1210643" source="BUGZILLA"/>
		<reference ref_id="1210658" ref_url="https://bugzilla.suse.com/1210658" source="BUGZILLA"/>
		<reference ref_id="1212639" ref_url="https://bugzilla.suse.com/1212639" source="BUGZILLA"/>
		<reference ref_id="1212703" ref_url="https://bugzilla.suse.com/1212703" source="BUGZILLA"/>
		<reference ref_id="1213534" ref_url="https://bugzilla.suse.com/1213534" source="BUGZILLA"/>
		<reference ref_id="1213808" ref_url="https://bugzilla.suse.com/1213808" source="BUGZILLA"/>
		<reference ref_id="1214022" ref_url="https://bugzilla.suse.com/1214022" source="BUGZILLA"/>
		<reference ref_id="1214037" ref_url="https://bugzilla.suse.com/1214037" source="BUGZILLA"/>
		<reference ref_id="1214040" ref_url="https://bugzilla.suse.com/1214040" source="BUGZILLA"/>
		<reference ref_id="1214351" ref_url="https://bugzilla.suse.com/1214351" source="BUGZILLA"/>
		<reference ref_id="1214479" ref_url="https://bugzilla.suse.com/1214479" source="BUGZILLA"/>
		<reference ref_id="1214543" ref_url="https://bugzilla.suse.com/1214543" source="BUGZILLA"/>
		<reference ref_id="1214635" ref_url="https://bugzilla.suse.com/1214635" source="BUGZILLA"/>
		<reference ref_id="1214813" ref_url="https://bugzilla.suse.com/1214813" source="BUGZILLA"/>
		<reference ref_id="1214873" ref_url="https://bugzilla.suse.com/1214873" source="BUGZILLA"/>
		<reference ref_id="1214928" ref_url="https://bugzilla.suse.com/1214928" source="BUGZILLA"/>
		<reference ref_id="1214940" ref_url="https://bugzilla.suse.com/1214940" source="BUGZILLA"/>
		<reference ref_id="1214941" ref_url="https://bugzilla.suse.com/1214941" source="BUGZILLA"/>
		<reference ref_id="1214942" ref_url="https://bugzilla.suse.com/1214942" source="BUGZILLA"/>
		<reference ref_id="1214943" ref_url="https://bugzilla.suse.com/1214943" source="BUGZILLA"/>
		<reference ref_id="1214944" ref_url="https://bugzilla.suse.com/1214944" source="BUGZILLA"/>
		<reference ref_id="1214945" ref_url="https://bugzilla.suse.com/1214945" source="BUGZILLA"/>
		<reference ref_id="1214946" ref_url="https://bugzilla.suse.com/1214946" source="BUGZILLA"/>
		<reference ref_id="1214947" ref_url="https://bugzilla.suse.com/1214947" source="BUGZILLA"/>
		<reference ref_id="1214948" ref_url="https://bugzilla.suse.com/1214948" source="BUGZILLA"/>
		<reference ref_id="1214949" ref_url="https://bugzilla.suse.com/1214949" source="BUGZILLA"/>
		<reference ref_id="1214950" ref_url="https://bugzilla.suse.com/1214950" source="BUGZILLA"/>
		<reference ref_id="1214951" ref_url="https://bugzilla.suse.com/1214951" source="BUGZILLA"/>
		<reference ref_id="1214952" ref_url="https://bugzilla.suse.com/1214952" source="BUGZILLA"/>
		<reference ref_id="1214953" ref_url="https://bugzilla.suse.com/1214953" source="BUGZILLA"/>
		<reference ref_id="1214954" ref_url="https://bugzilla.suse.com/1214954" source="BUGZILLA"/>
		<reference ref_id="1214955" ref_url="https://bugzilla.suse.com/1214955" source="BUGZILLA"/>
		<reference ref_id="1214957" ref_url="https://bugzilla.suse.com/1214957" source="BUGZILLA"/>
		<reference ref_id="1214958" ref_url="https://bugzilla.suse.com/1214958" source="BUGZILLA"/>
		<reference ref_id="1214959" ref_url="https://bugzilla.suse.com/1214959" source="BUGZILLA"/>
		<reference ref_id="1214961" ref_url="https://bugzilla.suse.com/1214961" source="BUGZILLA"/>
		<reference ref_id="1214962" ref_url="https://bugzilla.suse.com/1214962" source="BUGZILLA"/>
		<reference ref_id="1214963" ref_url="https://bugzilla.suse.com/1214963" source="BUGZILLA"/>
		<reference ref_id="1214964" ref_url="https://bugzilla.suse.com/1214964" source="BUGZILLA"/>
		<reference ref_id="1214965" ref_url="https://bugzilla.suse.com/1214965" source="BUGZILLA"/>
		<reference ref_id="1214966" ref_url="https://bugzilla.suse.com/1214966" source="BUGZILLA"/>
		<reference ref_id="1214967" ref_url="https://bugzilla.suse.com/1214967" source="BUGZILLA"/>
		<reference ref_id="1214986" ref_url="https://bugzilla.suse.com/1214986" source="BUGZILLA"/>
		<reference ref_id="1214988" ref_url="https://bugzilla.suse.com/1214988" source="BUGZILLA"/>
		<reference ref_id="1214990" ref_url="https://bugzilla.suse.com/1214990" source="BUGZILLA"/>
		<reference ref_id="1214991" ref_url="https://bugzilla.suse.com/1214991" source="BUGZILLA"/>
		<reference ref_id="1214992" ref_url="https://bugzilla.suse.com/1214992" source="BUGZILLA"/>
		<reference ref_id="1214993" ref_url="https://bugzilla.suse.com/1214993" source="BUGZILLA"/>
		<reference ref_id="1214995" ref_url="https://bugzilla.suse.com/1214995" source="BUGZILLA"/>
		<reference ref_id="1214997" ref_url="https://bugzilla.suse.com/1214997" source="BUGZILLA"/>
		<reference ref_id="1214998" ref_url="https://bugzilla.suse.com/1214998" source="BUGZILLA"/>
		<reference ref_id="1215115" ref_url="https://bugzilla.suse.com/1215115" source="BUGZILLA"/>
		<reference ref_id="1215117" ref_url="https://bugzilla.suse.com/1215117" source="BUGZILLA"/>
		<reference ref_id="1215123" ref_url="https://bugzilla.suse.com/1215123" source="BUGZILLA"/>
		<reference ref_id="1215124" ref_url="https://bugzilla.suse.com/1215124" source="BUGZILLA"/>
		<reference ref_id="1215148" ref_url="https://bugzilla.suse.com/1215148" source="BUGZILLA"/>
		<reference ref_id="1215150" ref_url="https://bugzilla.suse.com/1215150" source="BUGZILLA"/>
		<reference ref_id="1215221" ref_url="https://bugzilla.suse.com/1215221" source="BUGZILLA"/>
		<reference ref_id="1215275" ref_url="https://bugzilla.suse.com/1215275" source="BUGZILLA"/>
		<reference ref_id="1215322" ref_url="https://bugzilla.suse.com/1215322" source="BUGZILLA"/>
		<reference ref_id="1215467" ref_url="https://bugzilla.suse.com/1215467" source="BUGZILLA"/>
		<reference ref_id="1215581" ref_url="https://bugzilla.suse.com/1215581" source="BUGZILLA"/>
		<reference ref_id="1215752" ref_url="https://bugzilla.suse.com/1215752" source="BUGZILLA"/>
		<reference ref_id="1215858" ref_url="https://bugzilla.suse.com/1215858" source="BUGZILLA"/>
		<reference ref_id="1215860" ref_url="https://bugzilla.suse.com/1215860" source="BUGZILLA"/>
		<reference ref_id="1215861" ref_url="https://bugzilla.suse.com/1215861" source="BUGZILLA"/>
		<reference ref_id="1215875" ref_url="https://bugzilla.suse.com/1215875" source="BUGZILLA"/>
		<reference ref_id="1215877" ref_url="https://bugzilla.suse.com/1215877" source="BUGZILLA"/>
		<reference ref_id="1215894" ref_url="https://bugzilla.suse.com/1215894" source="BUGZILLA"/>
		<reference ref_id="1215895" ref_url="https://bugzilla.suse.com/1215895" source="BUGZILLA"/>
		<reference ref_id="1215896" ref_url="https://bugzilla.suse.com/1215896" source="BUGZILLA"/>
		<reference ref_id="1215899" ref_url="https://bugzilla.suse.com/1215899" source="BUGZILLA"/>
		<reference ref_id="1215911" ref_url="https://bugzilla.suse.com/1215911" source="BUGZILLA"/>
		<reference ref_id="1215915" ref_url="https://bugzilla.suse.com/1215915" source="BUGZILLA"/>
		<reference ref_id="1215916" ref_url="https://bugzilla.suse.com/1215916" source="BUGZILLA"/>
		<reference ref_id="1215941" ref_url="https://bugzilla.suse.com/1215941" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1192" ref_url="https://www.suse.com/security/cve/CVE-2023-1192/" source="CVE"/>
		<reference ref_id="CVE-2023-1206" ref_url="https://www.suse.com/security/cve/CVE-2023-1206/" source="CVE"/>
		<reference ref_id="CVE-2023-1859" ref_url="https://www.suse.com/security/cve/CVE-2023-1859/" source="CVE"/>
		<reference ref_id="CVE-2023-2177" ref_url="https://www.suse.com/security/cve/CVE-2023-2177/" source="CVE"/>
		<reference ref_id="CVE-2023-39192" ref_url="https://www.suse.com/security/cve/CVE-2023-39192/" source="CVE"/>
		<reference ref_id="CVE-2023-39193" ref_url="https://www.suse.com/security/cve/CVE-2023-39193/" source="CVE"/>
		<reference ref_id="CVE-2023-39194" ref_url="https://www.suse.com/security/cve/CVE-2023-39194/" source="CVE"/>
		<reference ref_id="CVE-2023-4155" ref_url="https://www.suse.com/security/cve/CVE-2023-4155/" source="CVE"/>
		<reference ref_id="CVE-2023-42753" ref_url="https://www.suse.com/security/cve/CVE-2023-42753/" source="CVE"/>
		<reference ref_id="CVE-2023-42754" ref_url="https://www.suse.com/security/cve/CVE-2023-42754/" source="CVE"/>
		<reference ref_id="CVE-2023-4389" ref_url="https://www.suse.com/security/cve/CVE-2023-4389/" source="CVE"/>
		<reference ref_id="CVE-2023-4622" ref_url="https://www.suse.com/security/cve/CVE-2023-4622/" source="CVE"/>
		<reference ref_id="CVE-2023-4623" ref_url="https://www.suse.com/security/cve/CVE-2023-4623/" source="CVE"/>
		<reference ref_id="CVE-2023-4881" ref_url="https://www.suse.com/security/cve/CVE-2023-4881/" source="CVE"/>
		<reference ref_id="CVE-2023-4921" ref_url="https://www.suse.com/security/cve/CVE-2023-4921/" source="CVE"/>
		<reference ref_id="CVE-2023-5345" ref_url="https://www.suse.com/security/cve/CVE-2023-5345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2023-39194: Fixed a flaw in the processing of state filters which could allow a local attackers to disclose sensitive information. (bsc#1215861)
- CVE-2023-39193: Fixed a flaw in the processing of state filters which could allow a local attackers to disclose sensitive information. (bsc#1215860)
- CVE-2023-39192: Fixed a flaw in the u32_match_it function which could allow a local attackers to disclose sensitive information. (bsc#1215858)
- CVE-2023-42754: Fixed a null pointer dereference in ipv4_link_failure which could lead an authenticated attacker to trigger a DoS. (bsc#1215467)
- CVE-2023-5345: fixed an use-after-free vulnerability in the fs/smb/client component which could be exploited to achieve local privilege escalation. (bsc#1215899)
- CVE-2023-4155: Fixed a flaw in KVM AMD Secure Encrypted Virtualization (SEV). An attacker can trigger a stack overflow and cause a denial of service or potentially guest-to-host escape in kernel configurations without stack guard pages. (bsc#1214022)
- CVE-2023-4389: Fixed a reference counting issue in the Btrfs filesystem that could be exploited in order to leak internal kernel information or crash the system (bsc#1214351).
- CVE-2023-42753: Fixed an array indexing vulnerability in the netfilter subsystem. This issue may have allowed a local user to crash the system or potentially escalate their privileges (bsc#1215150).
- CVE-2023-1206: Fixed a hash collision flaw in the IPv6 connection lookup table. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95% (bsc#1212703).
- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalatio (bsc#1215275).
- CVE-2023-4622: Fixed a use-after-free vulnerability in the Unix domain sockets component which could be exploited to achieve local privilege escalation (bsc#1215117).
- CVE-2023-4623: Fixed a use-after-free issue in the HFSC network scheduler which could be exploited to achieve local privilege escalation (bsc#1215115).
- CVE-2023-1859: Fixed a use-after-free flaw in Xen transport for 9pfs which could be exploited to crash the system (bsc#1210169).
- CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221).
- CVE-2023-2177: Fixed a null pointer dereference issue in the sctp network protocol which could allow a user to crash the system (bsc#1210643).
- CVE-2023-1192: Fixed use-after-free in cifs_demultiplex_thread() (bsc#1208995).

The following non-security bugs were fixed:

- ALSA: hda/cirrus: Fix broken audio on hardware with two CS42L42 codecs (git-fixes).
- ALSA: hda/realtek: Splitting the UX3402 into two separate models (git-fixes).
- ARM: pxa: remove use of symbol_get() (git-fixes).
- arm64: csum: Fix OoB access in IP checksum code for negative lengths (git-fixes).
- arm64: module-plts: inline linux/moduleloader.h (git-fixes)
- arm64: module: Use module_init_layout_section() to spot init sections (git-fixes)
- arm64: sdei: abort running SDEI handlers during crash (git-fixes)
- arm64: tegra: Update AHUB clock parent and rate (git-fixes)
- arm64/fpsimd: Only provide the length to cpufeature for xCR registers (git-fixes)
- arm64/hyperv: Use CPUHP_AP_HYPERV_ONLINE state to fix CPU online sequencing (bsc#1206453).
- ASoC: amd: yc: Fix non-functional mic on Lenovo 82QF and 82UG (git-fixes).
- ASoC: hdaudio.c: Add missing check for devm_kstrdup (git-fixes).
- ASoC: imx-audmix: Fix return error with devm_clk_get() (git-fixes).
- ASoC: meson: spdifin: start hw on dai probe (git-fixes).
- ASoC: rt5640: Fix IRQ not being free-ed for HDA jack detect mode (git-fixes).
- ASoC: rt5640: Fix sleep in atomic context (git-fixes).
- ASoC: rt5640: Revert 'Fix sleep in atomic context' (git-fixes).
- ASoC: soc-utils: Export snd_soc_dai_is_dummy() symbol (git-fixes).
- ASoC: SOF: core: Only call sof_ops_free() on remove if the probe was successful (git-fixes).
- ASoC: tegra: Fix redundant PLLA and PLLA_OUT0 updates (git-fixes).
- ata: libata: disallow dev-initiated LPM transitions to unsupported states (git-fixes).
- ata: pata_falcon: fix IO base selection for Q40 (git-fixes).
- ata: pata_ftide010: Add missing MODULE_DESCRIPTION (git-fixes).
- ata: sata_gemini: Add missing MODULE_DESCRIPTION (git-fixes).
- backlight: gpio_backlight: Drop output GPIO direction check for initial power state (git-fixes).
- blk-iocost: fix divide by 0 error in calc_lcoefs() (bsc#1214986).
- blk-iocost: use spin_lock_irqsave in adjust_inuse_and_calc_cost (bsc#1214992).
- block/mq-deadline: use correct way to throttling write requests (bsc#1214993).
- Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition (git-fixes).
- bnx2x: new flag for track HW resource allocation (bsc#1202845 bsc#1215322).
- bpf: Clear the probe_addr for uprobe (git-fixes).
- btrfs: do not hold CPU for too long when defragging a file (bsc#1214988).
- clocksource: hyper-v: Mark hyperv tsc page unencrypted in sev-snp enlightened guest (bsc#1206453).
- drivers: hv: Mark percpu hvcall input arg page unencrypted in SEV-SNP enlightened guest (bsc#1206453).
- Drivers: hv: vmbus: Bring the post_msg_page back for TDX VMs with the paravisor (bsc#1206453).
- Drivers: hv: vmbus: Support &gt;64 VPs for a fully enlightened TDX/SNP VM (bsc#1206453).
- Drivers: hv: vmbus: Support fully enlightened TDX guests (bsc#1206453).
- drm: gm12u320: Fix the timeout usage for usb_bulk_msg() (git-fixes).
- drm/amd/display: Add smu write msg id fail retry process (git-fixes).
- drm/amd/display: enable cursor degamma for DCN3+ DRM legacy gamma (git-fixes).
- drm/amd/display: fix the white screen issue when &gt;= 64GB DRAM (git-fixes).
- drm/amd/display: prevent potential division by zero errors (git-fixes).
- drm/amd/display: register edp_backlight_control() for DCN301 (git-fixes).
- drm/amd/display: Remove wait while locked (git-fixes).
- drm/ast: Add BMC virtual connector (bsc#1152472) Backporting changes: 	* rename ast_device to ast_private
- drm/ast: report connection status on Display Port. (bsc#1152472) Backporting changes: 	* rename ast_device to ast_private 	* context changes
- drm/display: Do not assume dual mode adaptors support i2c sub-addressing (bsc#1213808).
- drm/i915: mark requests for GuC virtual engines to avoid use-after-free (git-fixes).
- drm/i915/gvt: Drop unused helper intel_vgpu_reset_gtt() (git-fixes).
- drm/i915/gvt: Put the page reference obtained by KVM's gfn_to_pfn() (git-fixes).
- drm/i915/gvt: Verify pfn is 'valid' before dereferencing 'struct page' (git-fixes).
- drm/meson: fix memory leak on -&gt;hpd_notify callback (git-fixes).
- drm/virtio: Correct drm_gem_shmem_get_sg_table() error handling (git-fixes).
- drm/virtio: Use appropriate atomic state in virtio_gpu_plane_cleanup_fb() (git-fixes).
- ext4: avoid potential data overflow in next_linear_group (bsc#1214951).
- ext4: correct inline offset when handling xattrs in inode body (bsc#1214950).
- ext4: fix memory leaks in ext4_fname_{setup_filename,prepare_lookup} (bsc#1214954).
- ext4: fix wrong unit use in ext4_mb_clear_bb (bsc#1214943).
- ext4: fix wrong unit use in ext4_mb_new_blocks (bsc#1214944).
- ext4: get block from bh in ext4_free_blocks for fast commit replay (bsc#1214942).
- ext4: reflect error codes from ext4_multi_mount_protect() to its callers (bsc#1214941).
- ext4: Remove ext4 locking of moved directory (bsc#1214957).
- ext4: set goal start correctly in ext4_mb_normalize_request (bsc#1214940).
- fs: do not update freeing inode i_io_list (bsc#1214813).
- fs: Establish locking order for unrelated directories (bsc#1214958).
- fs: Lock moved directories (bsc#1214959).
- fs: lockd: avoid possible wrong NULL parameter (git-fixes).
- fs: no need to check source (bsc#1215752).
- fs: record I_DIRTY_TIME even if inode already has I_DIRTY_INODE (bsc#1214813).
- fuse: nlookup missing decrement in fuse_direntplus_link (bsc#1215581).
- gve: Add AF_XDP zero-copy support for GQI-QPL format (bsc#1214479).
- gve: Add XDP DROP and TX support for GQI-QPL format (bsc#1214479).
- gve: Add XDP REDIRECT support for GQI-QPL format (bsc#1214479).
- gve: Changes to add new TX queues (bsc#1214479).
- gve: Control path for DQO-QPL (bsc#1214479).
- gve: fix frag_list chaining (bsc#1214479).
- gve: Fix gve interrupt names (bsc#1214479).
- gve: RX path for DQO-QPL (bsc#1214479).
- gve: trivial spell fix Recive to Receive (bsc#1214479).
- gve: Tx path for DQO-QPL (bsc#1214479).
- gve: Unify duplicate GQ min pkt desc size constants (bsc#1214479).
- gve: use vmalloc_array and vcalloc (bsc#1214479).
- gve: XDP support GQI-QPL: helper function changes (bsc#1214479).
- hwrng: virtio - add an internal buffer (git-fixes).
- hwrng: virtio - always add a pending request (git-fixes).
- hwrng: virtio - do not wait on cleanup (git-fixes).
- hwrng: virtio - do not waste entropy (git-fixes).
- hwrng: virtio - Fix race on data_avail and actual data (git-fixes).
- i2c: aspeed: Reset the i2c controller when timeout occurs (git-fixes).
- i3c: master: svc: fix probe failure when no i3c device exist (git-fixes).
- i915/pmu: Move execlist stats initialization to execlist specific setup (git-fixes).
- idr: fix param name in idr_alloc_cyclic() doc (git-fixes).
- Input: tca6416-keypad - fix interrupt enable disbalance (git-fixes).
- iommu/virtio: Detach domain on endpoint release (git-fixes).
- iommu/virtio: Return size mapped for a detached domain (git-fixes).
- jbd2: check 'jh-&gt;b_transaction' before removing it from checkpoint (bsc#1214953).
- jbd2: correct the end of the journal recovery scan range (bsc#1214955).
- jbd2: fix a race when checking checkpoint buffer busy (bsc#1214949).
- jbd2: fix checkpoint cleanup performance regression (bsc#1214952).
- jbd2: Fix wrongly judgement for buffer head removing while doing checkpoint (bsc#1214948).
- jbd2: recheck chechpointing non-dirty buffer (bsc#1214945).
- jbd2: remove journal_clean_one_cp_list() (bsc#1214947).
- jbd2: remove t_checkpoint_io_list (bsc#1214946).
- jbd2: restore t_checkpoint_io_list to maintain kABI (bsc#1214946).
- kabi: hide changes in enum ipl_type and struct sclp_info (jsc#PED-2023 jsc#PED-2025).
- kabi/severities: ignore mlx4 internal symbols
- kconfig: fix possible buffer overflow (git-fixes).
- kernel-binary: Move build-time definitions together Move source list and build architecture to buildrequires to aid in future reorganization of the spec template.
- kernel-binary: python3 is needed for build At least scripts/bpf_helpers_doc.py requires python3 since Linux 4.18 Other simimlar scripts may exist.
- kselftest/runner.sh: Propagate SIGTERM to runner child (git-fixes).
- KVM: s390: fix KVM_S390_GET_CMMA_BITS for GFNs in memslot holes (git-fixes bsc#1215915).
- KVM: s390: interrupt: use READ_ONCE() before cmpxchg() (git-fixes bsc#1215896).
- KVM: s390: pv: fix external interruption loop not always detected (git-fixes bsc#1215916).
- KVM: s390: vsie: Fix the initialization of the epoch extension (epdx) field (git-fixes bsc#1215894).
- KVM: s390: vsie: fix the length of APCB bitmap (git-fixes bsc#1215895).
- KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler (git-fixes bsc#1215911).
- KVM: SVM: Remove a duplicate definition of VMCB_AVIC_APIC_BAR_MASK (git-fixes).
- KVM: VMX: Fix header file dependency of asm/vmx.h (git-fixes).
- KVM: x86: Fix KVM_CAP_SYNC_REGS's sync_regs() TOCTOU issues (git-fixes).
- KVM: x86/mmu: Include mmu.h in spte.h (git-fixes).
- loop: Fix use-after-free issues (bsc#1214991).
- loop: loop_set_status_from_info() check before assignment (bsc#1214990).
- mlx4: Avoid resetting MLX4_INTFF_BONDING per driver (bsc#1187236).
- mlx4: Connect the ethernet part to the auxiliary bus (bsc#1187236).
- mlx4: Connect the infiniband part to the auxiliary bus (bsc#1187236).
- mlx4: Delete custom device management logic (bsc#1187236).
- mlx4: Get rid of the mlx4_interface.activate callback (bsc#1187236).
- mlx4: Get rid of the mlx4_interface.get_dev callback (bsc#1187236).
- mlx4: Move the bond work to the core driver (bsc#1187236).
- mlx4: Register mlx4 devices to an auxiliary virtual bus (bsc#1187236).
- mlx4: Rename member mlx4_en_dev.nb to netdev_nb (bsc#1187236).
- mlx4: Replace the mlx4_interface.event callback with a notifier (bsc#1187236).
- mlx4: Use 'void *' as the event param of mlx4_dispatch_event() (bsc#1187236).
- module: Expose module_init_layout_section() (git-fixes)
- net: do not allow gso_size to be set to GSO_BY_FRAGS (git-fixes).
- net: mana: Add page pool for RX buffers (bsc#1214040).
- net: mana: Configure hwc timeout from hardware (bsc#1214037).
- net: phy: micrel: Correct bit assignments for phy_device flags (git-fixes).
- net: usb: qmi_wwan: add Quectel EM05GV2 (git-fixes).
- net/mlx4: Remove many unnecessary NULL values (bsc#1187236).
- NFS: Guard against READDIR loop when entry names exceed MAXNAMELEN (git-fixes).
- NFS/blocklayout: Use the passed in gfp flags (git-fixes).
- NFS/pNFS: Report EINVAL errors from connect() to the server (git-fixes).
- NFSD: da_addr_body field missing in some GETDEVICEINFO replies (git-fixes).
- NFSD: fix change_info in NFSv4 RENAME replies (git-fixes).
- NFSD: Fix race to FREE_STATEID and cl_revoked (git-fixes).
- NFSv4: Fix dropped lock for racing OPEN and delegation return (git-fixes).
- NFSv4: fix out path in __nfs4_get_acl_uncached (git-fixes).
- NFSv4.2: fix error handling in nfs42_proc_getxattr (git-fixes).
- NFSv4.2: fix handling of COPY ERR_OFFLOAD_NO_REQ (git-fixes).
- NFSv4/pnfs: minor fix for cleanup path in nfs4_get_device_info (git-fixes).
- ntb: Clean up tx tail index on link down (git-fixes).
- ntb: Drop packets when qp link is down (git-fixes).
- ntb: Fix calculation ntb_transport_tx_free_entry() (git-fixes).
- nvme-auth: use chap-&gt;s2 to indicate bidirectional authentication (bsc#1214543).
- nvme-tcp: add recovery_delay to sysfs (bsc#1201284).
- nvme-tcp: delay error recovery until the next KATO interval (bsc#1201284).
- nvme-tcp: Do not terminate commands when in RESETTING (bsc#1201284).
- nvme-tcp: make 'err_work' a delayed work (bsc#1201284).
- PCI: Free released resource after coalescing (git-fixes).
- platform/mellanox: mlxbf-pmc: Fix potential buffer overflows (git-fixes).
- platform/mellanox: mlxbf-pmc: Fix reading of unprogrammed events (git-fixes).
- platform/mellanox: mlxbf-tmfifo: Drop jumbo frames (git-fixes).
- platform/mellanox: mlxbf-tmfifo: Drop the Rx packet if no more descriptors (git-fixes).
- platform/x86: intel_scu_ipc: Check status after timeout in busy_loop() (git-fixes).
- platform/x86: intel_scu_ipc: Check status upon timeout in ipc_wait_for_interrupt() (git-fixes).
- platform/x86: intel_scu_ipc: Do not override scu in intel_scu_ipc_dev_simple_command() (git-fixes).
- platform/x86: intel_scu_ipc: Fail IPC send if still busy (git-fixes).
- pNFS: Fix assignment of xprtdata.cred (git-fixes).
- powerpc/fadump: make is_kdump_kernel() return false when fadump is active (bsc#1212639 ltc#202582).
- powerpc/iommu: Fix notifiers being shared by PCI and VIO buses (bsc#1065729).
- powerpc/xics: Remove unnecessary endian conversion (bsc#1065729).
- printk: ringbuffer: Fix truncating buffer size min_t cast (bsc#1215875).
- pwm: lpc32xx: Remove handling of PWM channels (git-fixes).
- quota: add new helper dquot_active() (bsc#1214998).
- quota: factor out dquot_write_dquot() (bsc#1214995).
- quota: fix dqput() to follow the guarantees dquot_srcu should provide (bsc#1214963).
- quota: fix warning in dqgrab() (bsc#1214962).
- quota: Properly disable quotas when add_dquot_ref() fails (bsc#1214961).
- quota: rename dquot_active() to inode_quota_active() (bsc#1214997).
- RDMA/siw: Fabricate a GID on tun and loopback devices (git-fixes)
- s390/dasd: fix command reject error on ESE devices (LTC#203630 bsc#1215123 git-fixes).
- s390/dasd: fix hanging device after request requeue (git-fixes LTC#203629 bsc#1215124).
- s390/ipl: add DEFINE_GENERIC_LOADPARM() (jsc#PED-2023).
- s390/ipl: add eckd dump support (jsc#PED-2025).
- s390/ipl: add eckd support (jsc#PED-2023).
- s390/ipl: add loadparm parameter to eckd ipl/reipl data (jsc#PED-2023).
- s390/ipl: use octal values instead of S_* macros (jsc#PED-2023).
- s390/qeth: Do not call dev_close/dev_open (DOWN/UP) (bsc#1214873 git-fixes).
- s390/zcrypt: do not leak memory if dev_set_name() fails (git-fixes bsc#1215148).
- scsi: 3w-xxxx: Add error handling for initialization failure in tw_probe() (git-fixes).
- scsi: 53c700: Check that command slot is not NULL (git-fixes).
- scsi: core: Fix legacy /proc parsing buffer overflow (git-fixes).
- scsi: core: Fix possible memory leak if device_add() fails (git-fixes).
- scsi: fnic: Replace return codes in fnic_clean_pending_aborts() (git-fixes).
- scsi: lpfc: Do not abuse UUID APIs and LPFC_COMPRESS_VMID_SIZE (git-fixes).
- scsi: lpfc: Early return after marking final NLP_DROPPED flag in dev_loss_tmo (git-fixes).
- scsi: lpfc: Fix the NULL vs IS_ERR() bug for debugfs_create_file() (git-fixes).
- scsi: lpfc: Modify when a node should be put in device recovery mode during RSCN (git-fixes).
- scsi: lpfc: Prevent use-after-free during rmmod with mapped NVMe rports (git-fixes).
- scsi: lpfc: Remove reftag check in DIF paths (git-fixes).
- scsi: qedf: Add synchronization between I/O completions and abort (bsc#1210658).
- scsi: qedf: Fix firmware halt over suspend and resume (git-fixes).
- scsi: qedf: Fix NULL dereference in error handling (git-fixes).
- scsi: qedi: Fix firmware halt over suspend and resume (git-fixes).
- scsi: qla2xxx: Add logs for SFP temperature monitoring (bsc#1214928).
- scsi: qla2xxx: Allow 32-byte CDBs (bsc#1214928).
- scsi: qla2xxx: Error code did not return to upper layer (bsc#1214928).
- scsi: qla2xxx: Fix firmware resource tracking (bsc#1214928).
- scsi: qla2xxx: Fix NULL vs IS_ERR() bug for debugfs_create_dir() (git-fixes).
- scsi: qla2xxx: Fix smatch warn for qla_init_iocb_limit() (bsc#1214928).
- scsi: qla2xxx: Flush mailbox commands on chip reset (bsc#1214928).
- scsi: qla2xxx: Move resource to allow code reuse (bsc#1214928).
- scsi: qla2xxx: Remove unsupported ql2xenabledif option (bsc#1214928).
- scsi: qla2xxx: Remove unused declarations (bsc#1214928).
- scsi: qla2xxx: Remove unused variables in qla24xx_build_scsi_type_6_iocbs() (bsc#1214928).
- scsi: qla2xxx: Update version to 10.02.09.100-k (bsc#1214928).
- scsi: qla2xxx: Use raw_smp_processor_id() instead of smp_processor_id() (git-fixes).
- scsi: scsi_debug: Remove dead code (git-fixes).
- scsi: snic: Fix double free in snic_tgt_create() (git-fixes).
- scsi: snic: Fix possible memory leak if device_add() fails (git-fixes).
- scsi: storvsc: Handle additional SRB status values (git-fixes).
- scsi: zfcp: Fix a double put in zfcp_port_enqueue() (git-fixes bsc#1215941).
- selftests: mlxsw: Fix test failure on Spectrum-4 (jsc#PED-1549).
- selftests: tracing: Fix to unmount tracefs for recovering environment (git-fixes).
- spi: Add TPM HW flow flag (bsc#1213534)
- spi: tegra210-quad: Enable TPM wait polling (bsc#1213534)
- spi: tegra210-quad: set half duplex flag (bsc#1213534)
- SUNRPC: Mark the cred for revalidation if the server rejects it (git-fixes).
- tcpm: Avoid soft reset when partner does not support get_status (git-fixes).
- tpm_tis_spi: Add hardware wait polling (bsc#1213534)
- tracing: Fix race issue between cpu buffer write and swap (git-fixes).
- tracing: Remove extra space at the end of hwlat_detector/mode (git-fixes).
- tracing: Remove unnecessary copying of tr-&gt;current_trace (git-fixes).
- uapi: stddef.h: Fix __DECLARE_FLEX_ARRAY for C++ (git-fixes).
- udf: Fix extension of the last extent in the file (bsc#1214964).
- udf: Fix file corruption when appending just after end of preallocated extent (bsc#1214965).
- udf: Fix off-by-one error when discarding preallocation (bsc#1214966).
- udf: Fix uninitialized array access for some pathnames (bsc#1214967).
- Update metadata
- uprobes/x86: Allow to probe a NOP instruction with 0x66 prefix (git-fixes).
- usb: ehci: add workaround for chipidea PORTSC.PEC bug (git-fixes).
- usb: ehci: move new member has_ci_pec_bug into hole (git-fixes).
- usb: serial: option: add FOXCONN T99W368/T99W373 product (git-fixes).
- usb: serial: option: add Quectel EM05G variant (0x030e) (git-fixes).
- usb: typec: tcpci: clear the fault status bit (git-fixes).
- usb: typec: tcpci: move tcpci.h to include/linux/usb/ (git-fixes).
- vhost_vdpa: fix the crash in unmap a large memory (git-fixes).
- vhost-scsi: unbreak any layout for response (git-fixes).
- vhost: allow batching hint without size (git-fixes).
- vhost: allow batching hint without size (git-fixes).
- vhost: fix hung thread due to erroneous iotlb entries (git-fixes).
- vhost: handle error while adding split ranges to iotlb (git-fixes).
- virtio_net: add checking sq is full inside xdp xmit (git-fixes).
- virtio_net: Fix probe failed when modprobe virtio_net (git-fixes).
- virtio_net: reorder some funcs (git-fixes).
- virtio_net: separate the logic of checking whether sq is full (git-fixes).
- virtio_ring: fix avail_wrap_counter in virtqueue_add_packed (git-fixes).
- virtio-blk: set req-&gt;state to MQ_RQ_COMPLETE after polling I/O is finished (git-fixes).
- virtio-mmio: do not break lifecycle of vm_dev (git-fixes).
- virtio-net: fix race between set queues and probe (git-fixes).
- virtio-net: set queues after driver_ok (git-fixes).
- virtio-rng: make device ready before making request (git-fixes).
- virtio: acknowledge all features before access (git-fixes).
- vmcore: remove dependency with is_kdump_kernel() for exporting vmcore (bsc#1212639 ltc#202582).
- watchdog: intel-mid_wdt: add MODULE_ALIAS() to allow auto-load (git-fixes).
- word-at-a-time: use the same return type for has_zero regardless of endianness (bsc#1065729).
- x86/alternative: Fix race in try_get_desc() (git-fixes).
- x86/boot/e820: Fix typo in e820.c comment (git-fixes).
- x86/bugs: Reset speculation control settings on init (git-fixes).
- x86/coco: Allow CPU online/offline for a TDX VM with the paravisor on Hyper-V (bsc#1206453).
- x86/coco: Export cc_vendor (bsc#1206453).
- x86/cpu: Add Lunar Lake M (git-fixes).
- x86/cpu: Add model number for Intel Arrow Lake processor (git-fixes).
- x86/fpu: Take task_struct* in copy_sigframe_from_user_to_xstate() (git-fixes).
- x86/head/64: Switch to KERNEL_CS as soon as new GDT is installed (git-fixes).
- x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests (bsc#1206453).
- x86/hyperv: Add hv_write_efer() for a TDX VM with the paravisor (bsc#1206453).
- x86/hyperv: Add hyperv-specific handling for VMMCALL under SEV-ES (bsc#1206453).
- x86/hyperv: Add missing 'inline' to hv_snp_boot_ap() stub (bsc#1206453).
- x86/hyperv: Add sev-snp enlightened guest static key (bsc#1206453)
- x86/hyperv: Add smp support for SEV-SNP guest (bsc#1206453).
- x86/hyperv: Add VTL specific structs and hypercalls (bsc#1206453).
- x86/hyperv: Fix hyperv_pcpu_input_arg handling when CPUs go online/offline (bsc#1206453).
- x86/hyperv: Fix serial console interrupts for fully enlightened TDX guests (bsc#1206453).
- x86/hyperv: Fix undefined reference to isolation_type_en_snp without CONFIG_HYPERV (bsc#1206453).
- x86/hyperv: Introduce a global variable hyperv_paravisor_present (bsc#1206453).
- x86/hyperv: Mark hv_ghcb_terminate() as noreturn (bsc#1206453).
- x86/hyperv: Mark Hyper-V vp assist page unencrypted in SEV-SNP enlightened guest (bsc#1206453).
- x86/hyperv: Move the code in ivm.c around to avoid unnecessary ifdef's (bsc#1206453).
- x86/hyperv: Remove hv_isolation_type_en_snp (bsc#1206453).
- x86/hyperv: Set Virtual Trust Level in VMBus init message (bsc#1206453).
- x86/hyperv: Support hypercalls for fully enlightened TDX guests (bsc#1206453).
- x86/hyperv: Use TDX GHCI to access some MSRs in a TDX VM with the paravisor (bsc#1206453).
- x86/hyperv: Use vmmcall to implement Hyper-V hypercall in sev-snp enlightened guest (bsc#1206453).
- x86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL (git-fixes).
- x86/ioapic: Do not return 0 from arch_dynirq_lower_bound() (git-fixes).
- x86/ioremap: Fix page aligned size calculation in __ioremap_caller() (git-fixes).
- x86/mce: Retrieve poison range from hardware (git-fixes).
- x86/mem_encrypt: Unbreak the AMD_MEM_ENCRYPT=n build (git-fixes).
- x86/mm: Avoid incomplete Global INVLPG flushes (git-fixes).
- x86/mm: Do not shuffle CPU entry areas without KASLR (git-fixes).
- x86/purgatory: remove PGO flags (git-fixes).
- x86/PVH: avoid 32-bit build warning when obtaining VGA console info (git-fixes).
- x86/reboot: Disable virtualization in an emergency if SVM is supported (git-fixes).
- x86/resctl: fix scheduler confusion with 'current' (git-fixes).
- x86/resctrl: Fix task CLOSID/RMID update race (git-fixes).
- x86/resctrl: Fix to restore to original value when re-enabling hardware prefetch register (git-fixes).
- x86/rtc: Remove __init for runtime functions (git-fixes).
- x86/sev: Make enc_dec_hypercall() accept a size instead of npages (bsc#1214635).
- x86/sgx: Reduce delay and interference of enclave release (git-fixes).
- x86/srso: Do not probe microcode in a guest (git-fixes).
- x86/srso: Fix SBPB enablement for spec_rstack_overflow=off (git-fixes).
- x86/srso: Fix srso_show_state() side effect (git-fixes).
- x86/srso: Set CPUID feature bits independently of bug or mitigation status (git-fixes).
- x86/virt: Force GIF=1 prior to disabling SVM (for reboot flows) (git-fixes).
- xen: remove a confusing comment on auto-translated guest I/O (git-fixes).
- xprtrdma: Remap Receive buffers after a reconnect (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-13"/>
	<updated date="2023-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187236">SUSE bug 1187236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201284">SUSE bug 1201284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202845">SUSE bug 1202845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206453">SUSE bug 1206453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208995">SUSE bug 1208995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210169">SUSE bug 1210169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210643">SUSE bug 1210643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210658">SUSE bug 1210658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212639">SUSE bug 1212639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212703">SUSE bug 1212703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213534">SUSE bug 1213534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213808">SUSE bug 1213808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214022">SUSE bug 1214022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214037">SUSE bug 1214037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214040">SUSE bug 1214040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214351">SUSE bug 1214351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214479">SUSE bug 1214479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214543">SUSE bug 1214543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214635">SUSE bug 1214635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214813">SUSE bug 1214813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214873">SUSE bug 1214873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214928">SUSE bug 1214928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214940">SUSE bug 1214940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214941">SUSE bug 1214941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214942">SUSE bug 1214942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214943">SUSE bug 1214943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214944">SUSE bug 1214944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214945">SUSE bug 1214945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214946">SUSE bug 1214946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214947">SUSE bug 1214947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214948">SUSE bug 1214948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214949">SUSE bug 1214949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214950">SUSE bug 1214950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214951">SUSE bug 1214951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214952">SUSE bug 1214952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214953">SUSE bug 1214953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214954">SUSE bug 1214954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214955">SUSE bug 1214955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214957">SUSE bug 1214957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214958">SUSE bug 1214958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214959">SUSE bug 1214959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214961">SUSE bug 1214961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214962">SUSE bug 1214962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214963">SUSE bug 1214963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214964">SUSE bug 1214964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214965">SUSE bug 1214965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214966">SUSE bug 1214966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214967">SUSE bug 1214967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214986">SUSE bug 1214986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214988">SUSE bug 1214988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214990">SUSE bug 1214990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214991">SUSE bug 1214991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214992">SUSE bug 1214992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214993">SUSE bug 1214993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214995">SUSE bug 1214995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214997">SUSE bug 1214997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214998">SUSE bug 1214998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215115">SUSE bug 1215115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215117">SUSE bug 1215117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215123">SUSE bug 1215123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215124">SUSE bug 1215124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215148">SUSE bug 1215148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215150">SUSE bug 1215150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215221">SUSE bug 1215221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215275">SUSE bug 1215275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215322">SUSE bug 1215322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215467">SUSE bug 1215467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215581">SUSE bug 1215581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215752">SUSE bug 1215752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215858">SUSE bug 1215858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215860">SUSE bug 1215860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215861">SUSE bug 1215861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215875">SUSE bug 1215875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215877">SUSE bug 1215877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215894">SUSE bug 1215894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215895">SUSE bug 1215895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215896">SUSE bug 1215896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215899">SUSE bug 1215899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215911">SUSE bug 1215911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215915">SUSE bug 1215915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215916">SUSE bug 1215916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215941">SUSE bug 1215941</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1192/">CVE-2023-1192 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1192">CVE-2023-1192 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1206/">CVE-2023-1206 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1206">CVE-2023-1206 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1859/">CVE-2023-1859 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1859">CVE-2023-1859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2177/">CVE-2023-2177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2177">CVE-2023-2177 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39192/">CVE-2023-39192 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39192">CVE-2023-39192 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39193/">CVE-2023-39193 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39193">CVE-2023-39193 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39194/">CVE-2023-39194 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39194">CVE-2023-39194 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4155/">CVE-2023-4155 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4155">CVE-2023-4155 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42753/">CVE-2023-42753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42754/">CVE-2023-42754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42754">CVE-2023-42754 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-4389/">CVE-2023-4389 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4389">CVE-2023-4389 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4622/">CVE-2023-4622 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4622">CVE-2023-4622 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4623/">CVE-2023-4623 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4881/">CVE-2023-4881 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4881">CVE-2023-4881 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4921/">CVE-2023-4921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4921">CVE-2023-4921 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5345/">CVE-2023-5345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5345">CVE-2023-5345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009800655" comment="cluster-md-kmp-64kb-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800656" comment="cluster-md-kmp-default-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800657" comment="dlm-kmp-64kb-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800658" comment="dlm-kmp-default-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800659" comment="dtb-allwinner-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800660" comment="dtb-altera-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800661" comment="dtb-amazon-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800662" comment="dtb-amd-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800663" comment="dtb-amlogic-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800664" comment="dtb-apm-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800665" comment="dtb-apple-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800666" comment="dtb-arm-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800667" comment="dtb-broadcom-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800668" comment="dtb-cavium-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800669" comment="dtb-exynos-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800670" comment="dtb-freescale-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800671" comment="dtb-hisilicon-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800672" comment="dtb-lg-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800673" comment="dtb-marvell-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800674" comment="dtb-mediatek-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800675" comment="dtb-nvidia-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800676" comment="dtb-qcom-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800677" comment="dtb-renesas-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800678" comment="dtb-rockchip-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800679" comment="dtb-socionext-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800680" comment="dtb-sprd-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800681" comment="dtb-xilinx-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800682" comment="gfs2-kmp-64kb-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800683" comment="gfs2-kmp-default-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800684" comment="kernel-64kb-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800685" comment="kernel-64kb-devel-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800686" comment="kernel-64kb-extra-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800687" comment="kernel-64kb-livepatch-devel-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800688" comment="kernel-64kb-optional-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800689" comment="kernel-debug-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800690" comment="kernel-debug-devel-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800691" comment="kernel-debug-livepatch-devel-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800692" comment="kernel-debug-vdso-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800693" comment="kernel-default-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800694" comment="kernel-default-base-5.14.21-150500.55.31.1.150500.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800695" comment="kernel-default-base-rebuild-5.14.21-150500.55.31.1.150500.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800696" comment="kernel-default-devel-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800697" comment="kernel-default-extra-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800698" comment="kernel-default-livepatch-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800699" comment="kernel-default-livepatch-devel-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800700" comment="kernel-default-optional-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800701" comment="kernel-default-vdso-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800702" comment="kernel-devel-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800703" comment="kernel-docs-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800704" comment="kernel-docs-html-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800705" comment="kernel-kvmsmall-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800706" comment="kernel-kvmsmall-devel-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800707" comment="kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800708" comment="kernel-kvmsmall-vdso-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800709" comment="kernel-macros-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800710" comment="kernel-obs-build-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800711" comment="kernel-obs-qa-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800712" comment="kernel-source-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800713" comment="kernel-source-vanilla-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800714" comment="kernel-syms-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800715" comment="kernel-zfcpdump-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800716" comment="kselftests-kmp-64kb-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800717" comment="kselftests-kmp-default-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800718" comment="ocfs2-kmp-64kb-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800719" comment="ocfs2-kmp-default-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800720" comment="reiserfs-kmp-64kb-5.14.21-150500.55.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800721" comment="reiserfs-kmp-default-5.14.21-150500.55.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4442" version="1" class="patch">
	<metadata>
		<title>Security update for cni-plugins (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="1216006" ref_url="https://bugzilla.suse.com/1216006" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:4075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016683.html" source="SUSE-SU"/>
		<description>

This update of cni-plugins fixes the following issues:

- rebuild the package with the go 1.21 security release (bsc#1212475).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2023-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216006">SUSE bug 1216006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801169" comment="cni-plugins-1.1.1-150500.3.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4443" version="1" class="patch">
	<metadata>
		<title>Security update for cni (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="1216006" ref_url="https://bugzilla.suse.com/1216006" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:4076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016682.html" source="SUSE-SU"/>
		<description>

This update of cni fixes the following issues:

- rebuild the package with the go 1.21 security release (bsc#1212475).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-13"/>
	<updated date="2023-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216006">SUSE bug 1216006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800737" comment="cni-1.1.2-150500.3.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4444" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215959" ref_url="https://bugzilla.suse.com/1215959" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5371" ref_url="https://www.suse.com/security/cve/CVE-2023-5371/" source="CVE"/>
		<description>
This update for wireshark fixes the following issues:

Updated to version 3.6.17:

- CVE-2023-5371: Fixed a memory leak issue in the RTPS dissector
  (bsc#1215959).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-16"/>
	<updated date="2023-10-16"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1215959">SUSE bug 1215959</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5371/">CVE-2023-5371 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5371">CVE-2023-5371 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009800539" comment="libwireshark15-3.6.17-150000.3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800540" comment="libwiretap12-3.6.17-150000.3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800541" comment="libwsutil13-3.6.17-150000.3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800542" comment="wireshark-3.6.17-150000.3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800543" comment="wireshark-devel-3.6.17-150000.3.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800544" comment="wireshark-ui-qt-3.6.17-150000.3.103.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4445" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215761" ref_url="https://bugzilla.suse.com/1215761" source="BUGZILLA"/>
		<reference ref_id="1215762" ref_url="https://bugzilla.suse.com/1215762" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40660" ref_url="https://www.suse.com/security/cve/CVE-2023-40660/" source="CVE"/>
		<reference ref_id="CVE-2023-40661" ref_url="https://www.suse.com/security/cve/CVE-2023-40661/" source="CVE"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2023-40660: Fixed a PIN bypass that could be triggered when
  cards tracked their own login state (bsc#1215762).
- CVE-2023-40661: Fixed several memory safety issues that could happen
  during the card enrollment process using pkcs15-init (bsc#1215761).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-16"/>
	<updated date="2023-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215761">SUSE bug 1215761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215762">SUSE bug 1215762</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40660/">CVE-2023-40660 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40660">CVE-2023-40660 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-40661/">CVE-2023-40661 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40661">CVE-2023-40661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009801095" comment="opensc-0.22.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801096" comment="opensc-32bit-0.22.0-150400.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4446" version="1" class="patch">
	<metadata>
		<title>Security update for libcue (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215728" ref_url="https://bugzilla.suse.com/1215728" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-43641" ref_url="https://www.suse.com/security/cve/CVE-2023-43641/" source="CVE"/>
		<description>
This update for libcue fixes the following issues:

- CVE-2023-43641: Fixed a buffer overflow while parsing a malicious
  file (bsc#1215728).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-17"/>
	<updated date="2023-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215728">SUSE bug 1215728</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-43641/">CVE-2023-43641 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43641">CVE-2023-43641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009802140" comment="libcue-devel-2.1.0-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802141" comment="libcue2-2.1.0-150000.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4447" version="1" class="patch">
	<metadata>
		<title>Security update for python-gevent (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215469" ref_url="https://bugzilla.suse.com/1215469" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-41419" ref_url="https://www.suse.com/security/cve/CVE-2023-41419/" source="CVE"/>
		<description>
This update for python-gevent fixes the following issues:

- CVE-2023-41419: Fixed a http request smuggling (bsc#1215469).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-17"/>
	<updated date="2023-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215469">SUSE bug 1215469</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-41419/">CVE-2023-41419 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41419">CVE-2023-41419 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799556" comment="python-gevent-doc-1.2.2-150000.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799557" comment="python3-gevent-1.2.2-150000.5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4448" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215978" ref_url="https://bugzilla.suse.com/1215978" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-43665" ref_url="https://www.suse.com/security/cve/CVE-2023-43665/" source="CVE"/>
		<description>
This update for python-Django fixes the following issues:

- CVE-2023-43665: Fixed a Denial-of-service in django.utils.text.Truncator. (bsc#1215978)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-17"/>
	<updated date="2023-10-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215978">SUSE bug 1215978</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-43665/">CVE-2023-43665 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43665">CVE-2023-43665 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802013" comment="python3-Django-2.0.7-150000.1.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4449" version="1" class="patch">
	<metadata>
		<title>Security update for buildah (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="1216005" ref_url="https://bugzilla.suse.com/1216005" source="BUGZILLA"/>
		<description>

This update of buildah fixes the following issues:

- rebuild the package with the go 1.21 security release (bsc#1212475).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-17"/>
	<updated date="2023-10-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216005">SUSE bug 1216005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801618" comment="buildah-1.29.1-150500.3.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4450" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215968" ref_url="https://bugzilla.suse.com/1215968" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-43804" ref_url="https://www.suse.com/security/cve/CVE-2023-43804/" source="CVE"/>
		<description>
This update for python-urllib3 fixes the following issues:

- CVE-2023-43804: Fixed a potential cookie leak via HTTP redirect if
  the user manually set the corresponding header (bsc#1215968).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-18"/>
	<updated date="2023-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215968">SUSE bug 1215968</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-43804/">CVE-2023-43804 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43804">CVE-2023-43804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800538" comment="python3-urllib3-1.25.10-150300.4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4451" version="1" class="patch">
	<metadata>
		<title>Security update for erlang (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1205318" ref_url="https://bugzilla.suse.com/1205318" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-37026" ref_url="https://www.suse.com/security/cve/CVE-2022-37026/" source="CVE"/>
		<description>
This update for erlang fixes the following issues:

- Updated to version 23.3.4.19 (jsc#PED-6209):
  - CVE-2022-37026: Complete a previous insufficient fix for an
    authentication bypass (bsc#1205318).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-18"/>
	<updated date="2023-10-18"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1205318">SUSE bug 1205318</bugzilla>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-37026/">CVE-2022-37026 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37026">CVE-2022-37026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009799697" comment="erlang-23.3.4.19-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799698" comment="erlang-debugger-23.3.4.19-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799699" comment="erlang-debugger-src-23.3.4.19-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799700" comment="erlang-dialyzer-23.3.4.19-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799701" comment="erlang-dialyzer-src-23.3.4.19-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799702" comment="erlang-diameter-23.3.4.19-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799703" comment="erlang-diameter-src-23.3.4.19-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799704" comment="erlang-doc-23.3.4.19-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799705" comment="erlang-epmd-23.3.4.19-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799706" comment="erlang-et-23.3.4.19-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799707" comment="erlang-et-src-23.3.4.19-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799708" comment="erlang-jinterface-23.3.4.19-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799709" comment="erlang-jinterface-src-23.3.4.19-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799710" comment="erlang-observer-23.3.4.19-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799711" comment="erlang-observer-src-23.3.4.19-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799712" comment="erlang-reltool-23.3.4.19-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799713" comment="erlang-reltool-src-23.3.4.19-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799714" comment="erlang-src-23.3.4.19-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799715" comment="erlang-wx-23.3.4.19-150300.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009799716" comment="erlang-wx-src-23.3.4.19-150300.3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4452" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215286" ref_url="https://bugzilla.suse.com/1215286" source="BUGZILLA"/>
		<reference ref_id="1215891" ref_url="https://bugzilla.suse.com/1215891" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4813" ref_url="https://www.suse.com/security/cve/CVE-2023-4813/" source="CVE"/>
		<description>
This update for glibc fixes the following issues:

Security issue fixed:

- CVE-2023-4813: Fixed a potential use-after-free in gaih_inet() (bsc#1215286, BZ #28931)

Also a regression from a previous update was fixed:

- elf: Align argument of __munmap to page size (bsc#1215891, BZ #28676)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-18"/>
	<updated date="2023-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215286">SUSE bug 1215286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215891">SUSE bug 1215891</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4813/">CVE-2023-4813 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4813">CVE-2023-4813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009800130" comment="glibc-2.31-150300.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800131" comment="glibc-32bit-2.31-150300.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800132" comment="glibc-devel-2.31-150300.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800133" comment="glibc-devel-32bit-2.31-150300.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800134" comment="glibc-devel-static-2.31-150300.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800135" comment="glibc-devel-static-32bit-2.31-150300.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800136" comment="glibc-extra-2.31-150300.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800137" comment="glibc-html-2.31-150300.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800138" comment="glibc-i18ndata-2.31-150300.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800139" comment="glibc-info-2.31-150300.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800140" comment="glibc-lang-2.31-150300.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800141" comment="glibc-locale-2.31-150300.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800142" comment="glibc-locale-base-2.31-150300.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800143" comment="glibc-locale-base-32bit-2.31-150300.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800144" comment="glibc-profile-2.31-150300.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800145" comment="glibc-profile-32bit-2.31-150300.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800146" comment="glibc-utils-2.31-150300.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800147" comment="glibc-utils-32bit-2.31-150300.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800148" comment="nscd-2.31-150300.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4453" version="1" class="patch">
	<metadata>
		<title>Security update for slurm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1208810" ref_url="https://bugzilla.suse.com/1208810" source="BUGZILLA"/>
		<reference ref_id="1216207" ref_url="https://bugzilla.suse.com/1216207" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-41914" ref_url="https://www.suse.com/security/cve/CVE-2023-41914/" source="CVE"/>
		<description>
This update for slurm fixes the following issues:

- CVE-2023-41914: Fixed a filesystem handling race conditions that could lead to an attacker taking control of an arbitrary file. (bsc#1216207)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-18"/>
	<updated date="2023-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208810">SUSE bug 1208810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216207">SUSE bug 1216207</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-41914/">CVE-2023-41914 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41914">CVE-2023-41914 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009802115" comment="libnss_slurm2_20_02-20.02.7-150100.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802116" comment="libpmi0_20_02-20.02.7-150100.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802117" comment="perl-slurm_20_02-20.02.7-150100.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802118" comment="slurm_20_02-20.02.7-150100.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802119" comment="slurm_20_02-auth-none-20.02.7-150100.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802120" comment="slurm_20_02-config-20.02.7-150100.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802121" comment="slurm_20_02-config-man-20.02.7-150100.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802122" comment="slurm_20_02-cray-20.02.7-150100.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802123" comment="slurm_20_02-devel-20.02.7-150100.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802124" comment="slurm_20_02-doc-20.02.7-150100.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802125" comment="slurm_20_02-hdf5-20.02.7-150100.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802126" comment="slurm_20_02-lua-20.02.7-150100.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802127" comment="slurm_20_02-munge-20.02.7-150100.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802128" comment="slurm_20_02-node-20.02.7-150100.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802129" comment="slurm_20_02-openlava-20.02.7-150100.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802130" comment="slurm_20_02-pam_slurm-20.02.7-150100.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802131" comment="slurm_20_02-plugins-20.02.7-150100.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802132" comment="slurm_20_02-rest-20.02.7-150100.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802133" comment="slurm_20_02-seff-20.02.7-150100.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802134" comment="slurm_20_02-sjstat-20.02.7-150100.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802135" comment="slurm_20_02-slurmdbd-20.02.7-150100.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802136" comment="slurm_20_02-sql-20.02.7-150100.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802137" comment="slurm_20_02-sview-20.02.7-150100.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802146" comment="slurm_20_02-testsuite-20.02.7-150100.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802138" comment="slurm_20_02-torque-20.02.7-150100.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802139" comment="slurm_20_02-webdoc-20.02.7-150100.3.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4454" version="1" class="patch">
	<metadata>
		<title>Security update for helm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1183043" ref_url="https://bugzilla.suse.com/1183043" source="BUGZILLA"/>
		<reference ref_id="1215588" ref_url="https://bugzilla.suse.com/1215588" source="BUGZILLA"/>
		<reference ref_id="1215711" ref_url="https://bugzilla.suse.com/1215711" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41723" ref_url="https://www.suse.com/security/cve/CVE-2022-41723/" source="CVE"/>
		<reference ref_id="CVE-2023-25173" ref_url="https://www.suse.com/security/cve/CVE-2023-25173/" source="CVE"/>
		<description>
This update for helm fixes the following issues:

helm was updated to version 3.13.1:

  * Fixing precedence issue with the import of values.
  * Add missing with clause to release gh action
  * FIX Default ServiceAccount yaml
  * fix(registry): unswallow error
  * remove useless print during prepareUpgrade
  * fix(registry): address anonymous pull issue
  * Fix missing run statement on release action
  * Write latest version to get.helm.sh bucket
  * Increased release information key name max length.

helm was updated to version 3.13.0 (bsc#1215588):

  * Fix leaking goroutines in Install
  * Update Helm to use k8s 1.28.2 libraries
  * make the dependabot k8s.io group explicit
  * use dependabot's group support for k8s.io dependencies
  * doc:Executing helm rollback release 0 will roll back to the
    previous release
  * Use labels instead of selectorLabels for pod labels
  * fix(helm): fix GetPodLogs, the hooks should be sorted before
    get the logs of each hook
  * chore: HTTPGetter add default timeout
  * Avoid nil dereference if passing a nil resolver
  * Add required changes after merge
  * Fix #3352, add support for --ignore-not-found just like kubectl
    delete
  * Fix helm may identify achieve of the application/x-gzip as
    application/vnd.ms-fontobject
  * Restore `helm get metadata` command
  * Revert 'Add `helm get metadata` command'
  * test: replace `ensure.TempDir` with `t.TempDir`
  * use json api url + report curl/wget error on fail
  * Added error in case try to supply custom label with name of
    system label during install/upgrade
  * fix(main): fix basic auth for helm pull or push
  * cmd: support generating index in JSON format
  * repo: detect JSON and unmarshal efficiently
  * Tweaking new dry-run internal handling
  * bump kubernetes modules to v0.27.3
  * Remove warning for template directory not found.
  * Added tests for created OCI annotation time format
  * Add created OCI annotation
  * Fix multiple bugs in values handling
  * chore: fix a typo in `manager.go`
  * add GetRegistryClient method
  * oci: add tests for plain HTTP and insecure HTTPS registries
  * oci: Add flag `--plain-http` to enable working with HTTP
    registries
  * docs: add an example for using the upgrade command with
    existing values
  * Replace `fmt.Fprintf` with `fmt.Fprint` in get_metadata.go
  * Replace `fmt.Fprintln` with `fmt.Fprintf` in get_metadata.go
  * update kubernetes dependencies from v0.27.0 to v0.27.1
  * Add ClientOptResolver to test util file
  * Check that missing keys are still handled in tpl
  * tests: change crd golden file to match after #11870
  * Adding details on the Factory interface
  * update autoscaling/v2beta1 to autoscaling/v2 in skeleton chart
  * feat(helm): add ability for --dry-run to do lookup functions
    When a helm command is run with the --dry-run flag, it will try
    to connect to the cluster to be able to render lookup
    functions. Closes #8137
  * bugfix:(#11391) helm lint infinite loop  when malformed
    template object
  * pkg/engine: fix nil-dereference
  * pkg/chartutil: fix nil-dereference
  * pkg/action: fix nil-dereference
  * full source path when output-dir is not provided
  * added Contributing.md section and ref link in the README
  * feat(helm): add ability for --dry-run to do lookup functions
    When a helm command is run with the --dry-run flag, it will try
    to connect to the cluster if the value is 'server' to be able
    to render lookup functions. Closes #8137
  * feat(helm): add ability for --dry-run to do lookup functions
  * Add `CHART`, `VERSION` and `APP_VERSION` fields to `get all`
    command output
  * Adjust `get` command description to account metadata
  * add volumes and volumeMounts in chartutil
  * Seed a default switch to control `automountServiceAccountToken`
  * Avoid confusing error when passing in '--version X.Y.Z'
  * Add `helm get metadata` command
  * Use wrapped error so that ErrNoObjectsVisited can be compared
    after return.
  * Add exact version test.
  * strict file permissions of repository.yaml
  * Check redefinition of define and include in tpl
  * Check that `.Template` is passed through `tpl`
  * Make sure empty `tpl` values render empty.
  * Pick the test improvement out of PR#8371
  * #11369 Use the correct index repo cache directory in the
    `parallelRepoUpdate` method as well
  * #11369 Add a test case to prove the bug and its resolution
  * ref(helm): export DescriptorPullSummary fields
  * feat(helm): add 'ClientOptResolver' ClientOption
  * Fix flaky TestSQLCreate test by making sqlmock ignore order of
    sql requests
  * Fixing tests after adding labels to release fixture
  * Make default release fixture contain custom labels to make
    tests check that labels are not lost
  * Added support for storing custom labels in SQL storage driver
  * Adding support merging new custom labels with original release
    labels during upgrade
  * Added note to install/upgrade commands that original release
    labels wouldn't be persisted in upgraded release
  * Added unit tests for implemented install/upgrade labels logic
  * Remove redudant types from util_test.go
  * Added tests for newly introduced util.go functions
  * Fix broken tests for SQL storage driver
  * Fix broken tests for configmap and secret storage drivers
  * Make superseded releases keep labels
  * Support configmap storage driver for install/upgrade actions
    --labels argument
  * Added upgrade --install labels argument support
  * Add labels support for install action with secret storage
    backend
  * test: added tests to load plugin from home dir with space
  * fix: plugin does not load when helm base dir contains space
  * Add priority class to kind sorter
  * Fixes #10566
  * test(search): add mixedCase test case
  * fix(search): print repo search result in original case
  * Adjust error message wrongly claiming that there is a resource
    conflict
  * Throw an error from jobReady() if the job exceeds its
    BackoffLimit
  * github: add Asset Transparency action for GitHub releases

Update to version 3.12.3:

* bump kubernetes modules to v0.27.3
* Add priority class to kind sorter

Update to version 3.12.2:

* add GetRegistryClient method

Update to version 3.12.1:

  * bugfix:(#11391) helm lint infinite loop  when malformed
    template object
  * update autoscaling/v2beta1 to autoscaling/v2 in skeleton chart
  * test(search): add mixedCase test case
  * fix(search): print repo search result in original case
  * strict file permissions of repository.yaml
  * update kubernetes dependencies from v0.27.0 to v0.27.1

Update to version 3.12.0:

  * Attach annotations to OCI artifacts
  * Fix goroutine leak in action install
  * fix quiet lint does not fail on non-linting errors
  * create failing test for quietly linting a chart that doesn't
    exist
  * Fixes Readiness Check for statefulsets using partitioned
    rolling update. (#11774)
  * fix: failed testcase on windows
  * Fix 32bit-x86 typo in testsuite
  * Handle failed DNS case for Go 1.20+
  * Updating the Go version in go.mod
  * Fix goroutine leak in perform
  * Properly invalidate client after CRD install
  * Provide a helper to set the registryClient in cmd
  * Reimplemented change in httpgetter for insecure TLS option
  * Added insecure option to login subcommand
  * Added support for insecure OCI registries
  * Enable custom certificates option for OCI
  * Add testing to default and release branches
  * Remove job dependency. Should have done when I moved job to new
    file
  * Remove check to run only in helm org
  * Add why comments
  * Convert remaining CircleCI config to GitHub Actions
  * Changed how the setup-go action sets go version
  * chore:Use http constants as http.request parameters
  * update k8s registry domain
  * don't mark issues as stale where a PR is in progress
  * Update to func handling
  * Add option to support cascade deletion options
  * the linter varcheck and deadcode are deprecated (since v1.49.0)
  * Check status code before retrying request
  * Fix improper use of Table request/response to k8s API
  * fix template --output-dir issue
  * Add protection for stack-overflows for nested keys
  * feature(helm): add --set-literal flag for literal string
    interpretation

Update to version 3.11.3:

  * Fix goroutine leak in perform
  * Fix goroutine leak in action install
  * Fix 32bit-x86 typo in testsuite
  * Fixes Readiness Check for statefulsets using partitioned rolling update. (#11774)

- avoid CGO to workaround missing gold dependency (bsc#1183043)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-19"/>
	<updated date="2023-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183043">SUSE bug 1183043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215588">SUSE bug 1215588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215711">SUSE bug 1215711</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41723/">CVE-2022-41723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-25173/">CVE-2023-25173 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25173">CVE-2023-25173 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009801577" comment="helm-3.13.1-150000.1.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801578" comment="helm-bash-completion-3.13.1-150000.1.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801579" comment="helm-fish-completion-3.13.1-150000.1.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801580" comment="helm-zsh-completion-3.13.1-150000.1.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4455" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214666" ref_url="https://bugzilla.suse.com/1214666" source="BUGZILLA"/>
		<reference ref_id="1216182" ref_url="https://bugzilla.suse.com/1216182" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-41080" ref_url="https://www.suse.com/security/cve/CVE-2023-41080/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<description>
This update for tomcat fixes the following issues:

Tomcat was updated to version 9.0.82 (jsc#PED-6376, jsc#PED-6377):
    
- Security issues fixed:

  * CVE-2023-41080: Avoid protocol relative redirects in FORM authentication. (bsc#1214666)
  * CVE-2023-44487: Fix HTTP/2 Rapid Reset Attack. (bsc#1216182)
 
- Update to Tomcat 9.0.82:
    
  * Catalina
    
    + Add: 65770: Provide a lifecycle listener that will
      automatically reload TLS configurations a set time before the
      certificate is due to expire. This is intended to be used with
      third-party tools that regularly renew TLS certificates.
    + Fix: Fix handling of an error reading a context descriptor on
      deployment.
    + Fix: Fix rewrite rule qsd (query string discard) being ignored
      if qsa was also use, while it should instead take precedence.
    + Fix: 67472: Send fewer CORS-related headers when CORS is not
      actually being engaged.
    + Add: Improve handling of failures within recycle() methods.
 
  * Coyote
 
    + Fix: 67670: Fix regression with HTTP compression after code
      refactoring.
    + Fix: 67198: Ensure that the AJP connector attribute
      tomcatAuthorization takes precedence over the
      tomcatAuthentication attribute when processing an auth_type
      attribute received from a proxy server.
    + Fix: 67235: Fix a NullPointerException when an AsyncListener
      handles an error with a dispatch rather than a complete.
    + Fix: When an error occurs during asynchronous processing,
      ensure that the error handling process is only triggered once
      per asynchronous cycle.
    + Fix: Fix logic issue trying to match no argument method in
      IntropectionUtil.
    + Fix: Improve thread safety around readNotify and writeNotify
      in the NIO2 endpoint.
    + Fix: Avoid rare thread safety issue accessing message digest
      map.
    + Fix: Improve statistics collection for upgraded connections
      under load.
    + Fix: Align validation of HTTP trailer fields with standard
      fields.
    + Fix: Improvements to HTTP/2 overhead protection (bsc#1216182,
      CVE-2023-44487)
  
  * jdbc-pool
  
    + Fix: 67664: Correct a regression in the clean-up of
      unnecessary use of fully qualified class names in 9.0.81
      that broke the jdbc-pool.
    
  * Jasper
  
    + Fix: 67080: Improve performance of EL expressions in JSPs that
      use implicit objects
    
- Update to Tomcat 9.0.80 (jsc#PED-6376, jsc#PED-6377):
    
  * Catalina:
   
    + Add RateLimitFilter which can be used to mitigate DoS and Brute Force attacks
    + Move the management of the utility executor from the init()/destroy() methods of components to the start()/stop()
      methods.
    + Add org.apache.catalina.core.StandardVirtualThreadExecutor, a virtual thread based executor that may be used with
      one or more Connectors to process requests received by those Connectors using virtual threads. This Executor
      requires a minimum Java version of Java 21.
    + Add a per session Semaphore to the PersistentValve that ensures that, within a single Tomcat instance, there is no
      more than one concurrent request per session. Also expand the debug logging to include whether a request bypasses
      the Valve and the reason if a request fails to obtain the per session Semaphore.
    + Ensure that the default servlet correctly escapes file names in directory listings when using XML output.
    + Add a numeric last modified field to the XML directory listings produced by the default servlet to enable sorting
      in the XSLT.
    + Attempts to lock a collection with WebDAV may incorrectly fail if a child collection has an expired lock.
    + Deprecate the xssProtectionEnabled setting from the HttpHeaderSecurityFilter and change the default value to false
      as support for the associated HTTP header has been removed from all major browsers.
    + Add org.apache.catalina.core.ContextNamingInfoListener, a listener which creates context naming information
      environment entries.
    + Add org.apache.catalina.core.PropertiesRoleMappingListener, a listener which populates the context's role mapping
      from a properties file.
    + Fix an edge case where intra-web application symlinks would be followed if the web applications were deliberately
      crafted to allow it even when allowLinking was set to false.
    + Add utility config file resource lookup on Context to allow looking up resources from the webapp 
      (prefixed with webapp:) and make the resource lookup API more visible.
    + Fix potential database connection leaks in DataSourceUserDatabase identified by Coverity Scan.
    + Make parsing of ExtendedAccessLogValve patterns more robust.
    + Fix failure trying to persist configuration for an internal credential handler.
    + When serializing a session during the session presistence process, do not log a warning that null Principals are
      not serializable.
    + Catch NamingException in JNDIRealm#getPrincipal. It is used in Java up to 17 to signal closed connections.
    + Use the same naming format in log messages for Connector instances as the associated ProtocolHandler instance.
    + The parts count should also lower the actual maxParameterCount used for parsing parameters if parts are parsed
      first.
    + If an application or library sets both a non-500 error code and the javax.servlet.error.exception request
      attribute, use the provided error code during error page processing rather than assuming an error code of 500.
    + Update code comments and Tomcat output to use MiB for 1024 * 1024 bytes and KiB for 1024 bytes rather than MB and
      kB.

  * Coyote:

    + Update the HTTP/2 implementation to use the prioritization scheme defined in RFC 9218 rather than the one defined
      in RFC 7540.
    + Fix not sending WINDOW_UPDATE when dataLength is ZERO on call SwallowedDataFramePayload.
    + Restore the documented behaviour of MessageBytes.getType() that it returns the type of the original content rather
      than reflecting the most recent conversion.
    + Correct certificate logging on start-up so it differentiates between keystore based keys/certificates:
      PEM file based keys/certificates and logs the relevant information for each.
    + Refactor blocking reads and writes for the NIO connector to remove code paths that could allow a notification from
      the Poller to be missed resuting in a timeout rather than the expected read or write.
    + Refactor waiting for an HTTP/2 stream or connection window update to handle spurious wake-ups during the wait.
    + Correct a regression introduced in 9.0.78 and use the correct constant when constructing the default value for the
      certificateKeystoreFile attribute of an SSLHostConfigCertificate instance.
    + Refactor HTTP/2 implementation to reduce pinning when using virtual threads.
    + Pass through ciphers referring to an OpenSSL profile, such as PROFILE=SYSTEM instead of producing an error trying
      to parse it.
    + Ensure that AsyncListener.onError() is called after an error during asynchronous processing with HTTP/2.
    + When using asynchronous I/O (the default for NIO and NIO2), include DATA frames when calculating the HTTP/2
      overhead count to ensure that connections are not prematurely terminated.
    + Correct a race condition that could cause spurious RST messages to be sent after the response had been written to
      an HTTP/2 stream.

  * WebSocket:

    + Expand the validation of the value of the Sec-Websocket-Key header in the HTTP upgrade request that initiates a
      WebSocket connection. The value is not decoded but it is checked for the correct length and that only valid
      characters from the base64 alphabet are used.
    + Improve handling of error conditions for the WebSocket server, particularly during Tomcat shutdown.
    + Correct a regression in the fix for 66574 that meant the WebSocket session could return false for onOpen() before 
      the onClose() event had been completed.
    + Fix a NullPointerException when flushing batched messages with compression enabled using permessage-deflate.
    
  * Web applications:

    + Add RateLimitFilter which can be used to mitigate DoS and Brute Force attacks attribute in the configuration
      section for the Digest authentication value.
    + Documentation: Expand the security guidance to cover the embedded use case and add notes on the uses made of the
      java.io.tmpdir system property.
    + Documentation: Fix a typo in the name of the algorithms
    + Documentation: Update documentation to use MiB for 1024 * 1024 bytes and KiB for 1024 bytes rather than MB and kB.

  * jdbc-pool:

    + Fix the releaseIdleCounter does not increment when testAllIdle releases them.
    + Fix the ConnectionState state will be inconsistent with actual state on the connection when an exception occurs
      while writing.

  * Other:

    + Update to Commons Daemon 1.3.4.
    + Improvements to French translations.
    + Update Checkstyle to 10.12.0.
    + Update the packaged version of the Apache Tomcat Native Library to 1.2.37 to pick up the Windows binaries built
      with with OpenSSL 1.1.1u.
    + Include the Windows specific binary distributions in the files uploaded to Maven Central.
    + Improvements to French translations.
    + Improvements to Japanese translations.
    + Update UnboundID to 6.0.9.
    + Update Checkstyle to 10.12.1.
    + Update BND to 6.4.1.66665:
    + Update JSign to 5.0.
    + Correct properties for JSign dependency.
    + Align documentation for maxParameterCount to match hard-coded defaults.
    + Update NSIS to 3.0.9.
    + Update Checkstyle to 10.12.2.
    + Improvements to French translations.
    + Improvements to Japanese translations.
    + Fix quoting so users can use the _RUNJAVA environment variable as intended on Windows when the path to the Java
      executable contains spaces.
    + Update Tomcat Native to 1.2.38 to pick up Windows binaries built with OpenSSL 1.1.1v.
    + Improvements to Chinese translations.
    + Improvements to French translations.
    + Improvements to Japanese translations
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-19"/>
	<updated date="2023-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214666">SUSE bug 1214666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216182">SUSE bug 1216182</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-41080/">CVE-2023-41080 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41080">CVE-2023-41080 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009801949" comment="tomcat-9.0.82-150200.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801950" comment="tomcat-admin-webapps-9.0.82-150200.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801951" comment="tomcat-docs-webapp-9.0.82-150200.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801952" comment="tomcat-el-3_0-api-9.0.82-150200.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801953" comment="tomcat-embed-9.0.82-150200.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801954" comment="tomcat-javadoc-9.0.82-150200.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801955" comment="tomcat-jsp-2_3-api-9.0.82-150200.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801956" comment="tomcat-jsvc-9.0.82-150200.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801957" comment="tomcat-lib-9.0.82-150200.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801958" comment="tomcat-servlet-4_0-api-9.0.82-150200.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801959" comment="tomcat-webapps-9.0.82-150200.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4456" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs18 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216190" ref_url="https://bugzilla.suse.com/1216190" source="BUGZILLA"/>
		<reference ref_id="1216205" ref_url="https://bugzilla.suse.com/1216205" source="BUGZILLA"/>
		<reference ref_id="1216272" ref_url="https://bugzilla.suse.com/1216272" source="BUGZILLA"/>
		<reference ref_id="1216273" ref_url="https://bugzilla.suse.com/1216273" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38552" ref_url="https://www.suse.com/security/cve/CVE-2023-38552/" source="CVE"/>
		<reference ref_id="CVE-2023-39333" ref_url="https://www.suse.com/security/cve/CVE-2023-39333/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="CVE-2023-45143" ref_url="https://www.suse.com/security/cve/CVE-2023-45143/" source="CVE"/>
		<description>
This update for nodejs18 fixes the following issues:

- Update to version 18.18.2
- CVE-2023-44487: Fixed the Rapid Reset attack in nghttp2. (bsc#1216190)
- CVE-2023-45143: Fixed a cookie leakage in undici. (bsc#1216205)
- CVE-2023-38552: Fixed an integrity checks according to policies that could be circumvented. (bsc#1216272)
- CVE-2023-39333: Fixed a code injection via WebAssembly export names. (bsc#1216273)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-19"/>
	<updated date="2023-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216190">SUSE bug 1216190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216205">SUSE bug 1216205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216272">SUSE bug 1216272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216273">SUSE bug 1216273</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-38552/">CVE-2023-38552 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38552">CVE-2023-38552 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-39333/">CVE-2023-39333 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39333">CVE-2023-39333 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45143/">CVE-2023-45143 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45143">CVE-2023-45143 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009802108" comment="corepack18-18.18.2-150400.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802109" comment="nodejs18-18.18.2-150400.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802110" comment="nodejs18-devel-18.18.2-150400.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802111" comment="nodejs18-docs-18.18.2-150400.9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802112" comment="npm18-18.18.2-150400.9.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4457" version="1" class="patch">
	<metadata>
		<title>Security update for suse-module-tools (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1205767" ref_url="https://bugzilla.suse.com/1205767" source="BUGZILLA"/>
		<reference ref_id="1210335" ref_url="https://bugzilla.suse.com/1210335" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1829" ref_url="https://www.suse.com/security/cve/CVE-2023-1829/" source="CVE"/>
		<reference ref_id="CVE-2023-23559" ref_url="https://www.suse.com/security/cve/CVE-2023-23559/" source="CVE"/>
		<description>
This update for suse-module-tools fixes the following issues:

- Update to version 15.5.3:

  - CVE-2023-1829: Blacklisted the Linux kernel tcindex classifier
    module (bsc#1210335).
  - CVE-2023-23559: Blacklisted the Linux kernel RNDIS modules
    (bsc#1205767, jsc#PED-5731).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-19"/>
	<updated date="2023-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205767">SUSE bug 1205767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210335">SUSE bug 1210335</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1829/">CVE-2023-1829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1829">CVE-2023-1829 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-23559/">CVE-2023-23559 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23559">CVE-2023-23559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009802011" comment="suse-module-tools-15.5.3-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802012" comment="suse-module-tools-legacy-15.5.3-150500.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4458" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1201300" ref_url="https://bugzilla.suse.com/1201300" source="BUGZILLA"/>
		<reference ref_id="1215935" ref_url="https://bugzilla.suse.com/1215935" source="BUGZILLA"/>
		<reference ref_id="1215936" ref_url="https://bugzilla.suse.com/1215936" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4692" ref_url="https://www.suse.com/security/cve/CVE-2023-4692/" source="CVE"/>
		<reference ref_id="CVE-2023-4693" ref_url="https://www.suse.com/security/cve/CVE-2023-4693/" source="CVE"/>
		<description>
This update for grub2 fixes the following issues:

Security fixes:
- CVE-2023-4692: Fixed an out-of-bounds write at fs/ntfs.c which may lead to unsigned code execution. (bsc#1215935)
- CVE-2023-4693: Fixed an out-of-bounds read at fs/ntfs.c which may lead to leak sensitive information. (bsc#1215936)

Other fixes:
- Fix a boot delay issue in PowerPC PXE boot (bsc#1201300)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-20"/>
	<updated date="2023-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1201300">SUSE bug 1201300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215935">SUSE bug 1215935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215936">SUSE bug 1215936</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4692/">CVE-2023-4692 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4692">CVE-2023-4692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4693/">CVE-2023-4693 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4693">CVE-2023-4693 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009801148" comment="grub2-2.06-150500.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801149" comment="grub2-arm64-efi-2.06-150500.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801150" comment="grub2-arm64-efi-debug-2.06-150500.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801151" comment="grub2-arm64-efi-extras-2.06-150500.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801152" comment="grub2-branding-upstream-2.06-150500.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801153" comment="grub2-i386-pc-2.06-150500.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801154" comment="grub2-i386-pc-debug-2.06-150500.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801155" comment="grub2-i386-pc-extras-2.06-150500.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801156" comment="grub2-powerpc-ieee1275-2.06-150500.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801157" comment="grub2-powerpc-ieee1275-debug-2.06-150500.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801158" comment="grub2-powerpc-ieee1275-extras-2.06-150500.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801159" comment="grub2-s390x-emu-2.06-150500.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801160" comment="grub2-s390x-emu-debug-2.06-150500.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801161" comment="grub2-s390x-emu-extras-2.06-150500.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801162" comment="grub2-snapper-plugin-2.06-150500.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801163" comment="grub2-systemd-sleep-plugin-2.06-150500.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801164" comment="grub2-x86_64-efi-2.06-150500.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801165" comment="grub2-x86_64-efi-debug-2.06-150500.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801166" comment="grub2-x86_64-efi-extras-2.06-150500.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801167" comment="grub2-x86_64-xen-2.06-150500.29.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801168" comment="grub2-x86_64-xen-extras-2.06-150500.29.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4459" version="1" class="patch">
	<metadata>
		<title>Security update for gcc13 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206480" ref_url="https://bugzilla.suse.com/1206480" source="BUGZILLA"/>
		<reference ref_id="1206684" ref_url="https://bugzilla.suse.com/1206684" source="BUGZILLA"/>
		<reference ref_id="1210557" ref_url="https://bugzilla.suse.com/1210557" source="BUGZILLA"/>
		<reference ref_id="1211427" ref_url="https://bugzilla.suse.com/1211427" source="BUGZILLA"/>
		<reference ref_id="1212101" ref_url="https://bugzilla.suse.com/1212101" source="BUGZILLA"/>
		<reference ref_id="1213915" ref_url="https://bugzilla.suse.com/1213915" source="BUGZILLA"/>
		<reference ref_id="1214052" ref_url="https://bugzilla.suse.com/1214052" source="BUGZILLA"/>
		<reference ref_id="1214460" ref_url="https://bugzilla.suse.com/1214460" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4039" ref_url="https://www.suse.com/security/cve/CVE-2023-4039/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016811.html" source="SUSE-SU"/>
		<description>
This update for gcc13 fixes the following issues:

This update ship the GCC 13.2 compiler suite and its base libraries.

The compiler base libraries are provided for all SUSE Linux Enterprise 15
versions and replace the same named GCC 12 ones.

The new compilers for C, C++, and Fortran are provided for SUSE Linux
Enterprise 15 SP4 and SP5, and provided in the 'Development Tools' module.

The Go, D, Ada and Modula 2 language compiler parts are available
unsupported via the PackageHub repositories.

To use gcc13 compilers use:

- install 'gcc13' or 'gcc13-c++' or one of the other 'gcc13-COMPILER' frontend packages.
- override your Makefile to use CC=gcc13, CXX=g++13 and similar overrides for the other languages.

For a full changelog with all new GCC13 features, check out

        https://gcc.gnu.org/gcc-13/changes.html


Detailed changes:


* CVE-2023-4039: Fixed -fstack-protector issues on aarch64 with variable
  length stack allocations.  (bsc#1214052)

- Turn cross compiler to s390x to a glibc cross. [bsc#1214460]

- Also handle -static-pie in the default-PIE specs
- Fixed missed optimization in Skia resulting in Firefox crashes when
  building with LTO.  [bsc#1212101]
- Make libstdc++6-devel packages own their directories since they
  can be installed standalone.  [bsc#1211427]
- Add new x86-related intrinsics (amxcomplexintrin.h).
- RISC-V: Add support for inlining subword atomic operations
- Use --enable-link-serialization rather that --enable-link-mutex,
  the benefit of the former one is that the linker jobs are not
  holding tokens of the make's jobserver.
- Add cross-bpf packages.  See https://gcc.gnu.org/wiki/BPFBackEnd
  for the general state of BPF with GCC.
- Add bootstrap conditional to allow --without=bootstrap to be
  specified to speed up local builds for testing.
- Bump included newlib to version 4.3.0. 
- Also package libhwasan_preinit.o on aarch64.
- Configure external timezone database provided by the timezone
  package.  Make libstdc++6 recommend timezone to get a fully
  working std::chrono.  Install timezone when running the testsuite.
- Package libhwasan_preinit.o on x86_64.
- Fixed unwinding on aarch64 with pointer signing.  [bsc#1206684]
- Enable PRU flavour for gcc13
- update floatn fixinclude pickup to check each header separately (bsc#1206480)
- Redo floatn fixinclude pick-up to simply keep what is there. 
- Bump libgo SONAME to libgo22.
- Do not package libhwasan for biarch (32-bit architecture)
  as the extension depends on 64-bit pointers.
- Adjust floatn fixincludes guard to work with SLE12 and earlier
  SLE15.
- Depend on at least LLVM 13 for GCN cross compiler.
- Update embedded newlib to version 4.2.0
- Allow cross-pru-gcc12-bootstrap for armv7l architecture.
  PRU architecture is used for real-time MCUs embedded into TI
  armv7l and aarch64 SoCs. We need to have cross-pru-gcc12 for
  armv7l in order to build both host applications and PRU firmware
  during the same build.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-23"/>
	<updated date="2023-10-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206480">SUSE bug 1206480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206684">SUSE bug 1206684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210557">SUSE bug 1210557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211427">SUSE bug 1211427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212101">SUSE bug 1212101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213915">SUSE bug 1213915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214052">SUSE bug 1214052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214460">SUSE bug 1214460</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4039/">CVE-2023-4039 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4039">CVE-2023-4039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009801788" comment="cpp13-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800995" comment="cross-nvptx-gcc13-13.2.1+git7813-150000.1.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009800996" comment="cross-nvptx-newlib13-devel-13.2.1+git7813-150000.1.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801789" comment="gcc13-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801790" comment="gcc13-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801791" comment="gcc13-PIE-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801792" comment="gcc13-ada-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801793" comment="gcc13-ada-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801794" comment="gcc13-c++-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801795" comment="gcc13-c++-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801796" comment="gcc13-d-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801797" comment="gcc13-d-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801798" comment="gcc13-fortran-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801799" comment="gcc13-fortran-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801800" comment="gcc13-go-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801801" comment="gcc13-go-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801802" comment="gcc13-info-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801803" comment="gcc13-locale-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801804" comment="gcc13-m2-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801805" comment="gcc13-m2-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801806" comment="gcc13-obj-c++-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801807" comment="gcc13-obj-c++-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801808" comment="gcc13-objc-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801809" comment="gcc13-objc-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801810" comment="libada13-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801811" comment="libada13-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801812" comment="libasan8-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801813" comment="libasan8-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801814" comment="libatomic1-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801815" comment="libatomic1-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801816" comment="libgcc_s1-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801817" comment="libgcc_s1-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801818" comment="libgdruntime4-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801819" comment="libgdruntime4-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801820" comment="libgfortran5-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801821" comment="libgfortran5-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801822" comment="libgo22-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801823" comment="libgo22-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801824" comment="libgomp1-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801825" comment="libgomp1-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801826" comment="libgphobos4-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801827" comment="libgphobos4-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801828" comment="libhwasan0-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801829" comment="libitm1-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801830" comment="libitm1-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801831" comment="liblsan0-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801832" comment="libm2cor18-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801833" comment="libm2cor18-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801834" comment="libm2iso18-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801835" comment="libm2iso18-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801836" comment="libm2log18-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801837" comment="libm2log18-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801838" comment="libm2min18-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801839" comment="libm2min18-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801840" comment="libm2pim18-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801841" comment="libm2pim18-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801842" comment="libobjc4-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801843" comment="libobjc4-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801844" comment="libquadmath0-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801845" comment="libquadmath0-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801846" comment="libstdc++6-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801847" comment="libstdc++6-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801848" comment="libstdc++6-devel-gcc13-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801849" comment="libstdc++6-devel-gcc13-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801850" comment="libstdc++6-locale-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801851" comment="libstdc++6-pp-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801852" comment="libstdc++6-pp-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801853" comment="libtsan2-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801854" comment="libubsan1-13.2.1+git7813-150000.1.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801855" comment="libubsan1-32bit-13.2.1+git7813-150000.1.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4460" version="1" class="patch">
	<metadata>
		<title>Security update for netty, netty-tcnative (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216169" ref_url="https://bugzilla.suse.com/1216169" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016824.html" source="SUSE-SU"/>
		<description>
This update for netty, netty-tcnative fixes the following issues:

- Updated netty to version 4.1.100:

  - CVE-2023-44487: Fixed a potential denial of service scenario via
    RST frame floods (bsc#1216169).

- Updated netty-tcnative to version 2.0.62 Final.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-24"/>
	<updated date="2023-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216169">SUSE bug 1216169</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009801611" comment="netty-4.1.100-150200.4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801612" comment="netty-javadoc-4.1.100-150200.4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801613" comment="netty-poms-4.1.100-150200.4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801614" comment="netty-tcnative-2.0.62-150200.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801615" comment="netty-tcnative-javadoc-2.0.62-150200.3.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4461" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.5 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1193035" ref_url="https://bugzilla.suse.com/1193035" source="BUGZILLA"/>
		<reference ref_id="1205726" ref_url="https://bugzilla.suse.com/1205726" source="BUGZILLA"/>
		<reference ref_id="1209891" ref_url="https://bugzilla.suse.com/1209891" source="BUGZILLA"/>
		<reference ref_id="1209967" ref_url="https://bugzilla.suse.com/1209967" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33621" ref_url="https://www.suse.com/security/cve/CVE-2021-33621/" source="CVE"/>
		<reference ref_id="CVE-2021-41817" ref_url="https://www.suse.com/security/cve/CVE-2021-41817/" source="CVE"/>
		<reference ref_id="CVE-2023-28755" ref_url="https://www.suse.com/security/cve/CVE-2023-28755/" source="CVE"/>
		<reference ref_id="CVE-2023-28756" ref_url="https://www.suse.com/security/cve/CVE-2023-28756/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4176-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032354.html" source="SUSE-SU"/>
		<description>
This update for ruby2.5 fixes the following issues:

- CVE-2023-28755: Fixed a ReDoS vulnerability in URI. (bsc#1209891)
- CVE-2023-28756: Fixed an expensive regexp in the RFC2822 time parser. (bsc#1209967)
- CVE-2021-41817: Fixed a Regular Expression Denial of Service Vulnerability of Date Parsing Methods. (bsc#1193035)
- CVE-2021-33621: Fixed a HTTP response splitting vulnerability in CGI gem. (bsc#1205726)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-24"/>
	<updated date="2023-10-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193035">SUSE bug 1193035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205726">SUSE bug 1205726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209891">SUSE bug 1209891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209967">SUSE bug 1209967</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33621/">CVE-2021-33621 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33621">CVE-2021-33621 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41817/">CVE-2021-41817 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41817">CVE-2021-41817 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28755/">CVE-2023-28755 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28755">CVE-2023-28755 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28756/">CVE-2023-28756 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28756">CVE-2023-28756 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009802672" comment="libruby2_5-2_5-2.5.9-150000.4.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802673" comment="ruby2.5-2.5.9-150000.4.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802674" comment="ruby2.5-devel-2.5.9-150000.4.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802675" comment="ruby2.5-devel-extra-2.5.9-150000.4.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802676" comment="ruby2.5-doc-2.5.9-150000.4.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802677" comment="ruby2.5-doc-ri-2.5.9-150000.4.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802678" comment="ruby2.5-stdlib-2.5.9-150000.4.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4462" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs18 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1200303" ref_url="https://bugzilla.suse.com/1200303" source="BUGZILLA"/>
		<reference ref_id="1201325" ref_url="https://bugzilla.suse.com/1201325" source="BUGZILLA"/>
		<reference ref_id="1201326" ref_url="https://bugzilla.suse.com/1201326" source="BUGZILLA"/>
		<reference ref_id="1201327" ref_url="https://bugzilla.suse.com/1201327" source="BUGZILLA"/>
		<reference ref_id="1201328" ref_url="https://bugzilla.suse.com/1201328" source="BUGZILLA"/>
		<reference ref_id="1203831" ref_url="https://bugzilla.suse.com/1203831" source="BUGZILLA"/>
		<reference ref_id="1203832" ref_url="https://bugzilla.suse.com/1203832" source="BUGZILLA"/>
		<reference ref_id="1205042" ref_url="https://bugzilla.suse.com/1205042" source="BUGZILLA"/>
		<reference ref_id="1205119" ref_url="https://bugzilla.suse.com/1205119" source="BUGZILLA"/>
		<reference ref_id="1205236" ref_url="https://bugzilla.suse.com/1205236" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32212" ref_url="https://www.suse.com/security/cve/CVE-2022-32212/" source="CVE"/>
		<reference ref_id="CVE-2022-32213" ref_url="https://www.suse.com/security/cve/CVE-2022-32213/" source="CVE"/>
		<reference ref_id="CVE-2022-32214" ref_url="https://www.suse.com/security/cve/CVE-2022-32214/" source="CVE"/>
		<reference ref_id="CVE-2022-32215" ref_url="https://www.suse.com/security/cve/CVE-2022-32215/" source="CVE"/>
		<reference ref_id="CVE-2022-35255" ref_url="https://www.suse.com/security/cve/CVE-2022-35255/" source="CVE"/>
		<reference ref_id="CVE-2022-35256" ref_url="https://www.suse.com/security/cve/CVE-2022-35256/" source="CVE"/>
		<reference ref_id="CVE-2022-43548" ref_url="https://www.suse.com/security/cve/CVE-2022-43548/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:0419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013766.html" source="SUSE-SU"/>
		<description>
This update for nodejs18 fixes the following issues:

This update ships nodejs18 (jsc#PED-2097)

Update to NodejJS 18.13.0 LTS:

* build: disable v8 snapshot compression by default
* crypto: update root certificates
* deps: update ICU to 72.1
* doc:

  + add doc-only deprecation for headers/trailers setters
  + add Rafael to the tsc
  + deprecate use of invalid ports in url.parse
  + deprecate url.parse()

* lib: drop fetch experimental warning
* net: add autoSelectFamily and autoSelectFamilyAttemptTimeout options
* src:

  + add uvwasi version
  + add initial shadow realm support

* test_runner:

  + add t.after() hook
  + don't use a symbol for runHook()

* tls:

  + add 'ca' property to certificate object

* util:

  + add fast path for utf8 encoding
  + improve textdecoder decode performance
  + add MIME utilities

- Fixes compatibility with ICU 72.1 (bsc#1205236)
- Fix migration to openssl-3 (bsc#1205042)

Update to NodeJS 18.12.1 LTS:

* inspector: DNS rebinding in --inspect via invalid octal IP
  (bsc#1205119, CVE-2022-43548)

Update to NodeJS 18.12.0 LTS:

* Running in 'watch' mode using node --watch restarts the process
  when an imported file is changed.
* fs: add FileHandle.prototype.readLines
* http: add writeEarlyHints function to ServerResponse
* http2: make early hints generic
* util: add default value option to parsearg

Update to NodeJS 18.11.0:

* added experimental watch mode -- running in 'watch' mode using
  node --watch restarts the process when an imported file is changed
* fs: add FileHandle.prototype.readLines
* http: add writeEarlyHints function to ServerResponse
* http2: make early hints generic
* lib: refactor transferable AbortSignal
* src: add detailed embedder process initialization API
* util: add default value option to parsearg

Update to NodeJS 18.10.0:

* deps: upgrade npm to 8.19.2
* http: throw error on content-length mismatch
* stream: add ReadableByteStream.tee()

Update to Nodejs 18.9.1:

* deps: llhttp updated to 6.0.10

  + CVE-2022-32213 bypass via obs-fold mechanic (bsc#1201325)
  + Incorrect Parsing of Multi-line Transfer-Encoding
    (CVE-2022-32215, bsc#1201327)
  + Incorrect Parsing of Header Fields (CVE-2022-35256, bsc#1203832)

* crypto: fix weak randomness in WebCrypto keygen
  (CVE-2022-35255, bsc#1203831)

Update to Nodejs 18.9.0:

* lib - add diagnostics channel for process and worker
* os - add machine method
* report - expose report public native apis
* src - expose environment RequestInterrupt api
* vm - include vm context in the embedded snapshot

Changes in 18.8.0:

* bootstrap: implement run-time user-land snapshots via
  --build-snapshot and --snapshot-blob. See
* crypto:
  + allow zero-length IKM in HKDF and in webcrypto PBKDF2
  + allow zero-length secret KeyObject
* deps: upgrade npm to 8.18.0
* http: make idle http parser count configurable
* net: add local family
* src: print source map error source on demand
* tls: pass a valid socket on tlsClientError

Update to Nodejs 18.7.0:

* events: add CustomEvent
* http: add drop request event for http server
* lib: improved diagnostics_channel subscribe/unsubscribe
* util: add tokens to parseArgs

- enable crypto policy ciphers for TW and SLE15 SP4+ (bsc#1200303)

Update to Nodejs 18.6.0:

* Experimental ESM Loader Hooks API. For details see,
  https://nodejs.org/api/esm.html
* dns: export error code constants from dns/promises
* esm: add chaining to loaders
* http: add diagnostics channel for http client
* http: add perf_hooks detail for http request and client
* module: add isBuiltIn method
* net: add drop event for net server
* test_runner: expose describe and it
* v8: add v8.startupSnapshot utils

For details, see
https://github.com/nodejs/node/blob/main/doc/changelogs/CHANGELOG_V18.md#18.6.0

Update to Nodejs 18.5.0:

* http: stricter Transfer-Encoding and header separator parsing
  (bsc#1201325, bsc#1201326, bsc#1201327,
   CVE-2022-32213, CVE-2022-32214, CVE-2022-32215)
* src: fix IPv4 validation in inspector_socket
  (bsc#1201328, CVE-2022-32212)

For details, see
https://github.com/nodejs/node/blob/main/doc/changelogs/CHANGELOG_V18.md#18.5.0

Update to Nodejs 18.4.0. For detailed changes see,

https://github.com/nodejs/node/blob/main/doc/changelogs/CHANGELOG_V18.md#18.4.0

Initial packaging of Nodejs 18.2.0. For detailed changes since previous versions, see
https://github.com/nodejs/node/blob/master/doc/changelogs/CHANGELOG_V18.md#18.2.0

		</description>
<advisory from="security@suse.de">
	<issued date="2023-02-15"/>
	<updated date="2023-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1200303">SUSE bug 1200303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201325">SUSE bug 1201325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201326">SUSE bug 1201326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201327">SUSE bug 1201327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201328">SUSE bug 1201328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203831">SUSE bug 1203831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203832">SUSE bug 1203832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205042">SUSE bug 1205042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205119">SUSE bug 1205119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205236">SUSE bug 1205236</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32212/">CVE-2022-32212 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32212">CVE-2022-32212 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32213/">CVE-2022-32213 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32213">CVE-2022-32213 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32214/">CVE-2022-32214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32214">CVE-2022-32214 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32215/">CVE-2022-32215 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32215">CVE-2022-32215 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-35255/">CVE-2022-35255 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35255">CVE-2022-35255 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-35256/">CVE-2022-35256 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35256">CVE-2022-35256 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-43548/">CVE-2022-43548 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43548">CVE-2022-43548 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009752683" comment="corepack18-18.13.0-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009752684" comment="nodejs18-18.13.0-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009752685" comment="nodejs18-devel-18.13.0-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009737226" comment="nodejs18-docs-18.13.0-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009752686" comment="npm18-18.13.0-150400.9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4463" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213853" ref_url="https://bugzilla.suse.com/1213853" source="BUGZILLA"/>
		<reference ref_id="1216163" ref_url="https://bugzilla.suse.com/1216163" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3817" ref_url="https://www.suse.com/security/cve/CVE-2023-3817/" source="CVE"/>
		<reference ref_id="CVE-2023-5363" ref_url="https://www.suse.com/security/cve/CVE-2023-5363/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016834.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2023-5363: Incorrect cipher key and IV length processing. (bsc#1216163)
- CVE-2023-3817: Add test of DH_check() with q = p + 1. (bsc#1213853)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-25"/>
	<updated date="2023-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213853">SUSE bug 1213853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216163">SUSE bug 1216163</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3817/">CVE-2023-3817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3817">CVE-2023-3817 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5363/">CVE-2023-5363 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5363">CVE-2023-5363 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009803256" comment="libopenssl-3-devel-3.0.8-150500.5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803257" comment="libopenssl-3-devel-32bit-3.0.8-150500.5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803258" comment="libopenssl3-3.0.8-150500.5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803259" comment="libopenssl3-32bit-3.0.8-150500.5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803260" comment="openssl-3-3.0.8-150500.5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803261" comment="openssl-3-doc-3.0.8-150500.5.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4464" version="1" class="patch">
	<metadata>
		<title>Recommended update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<reference ref_id="SUSE-RU-2023:4192-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032381.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

- Upgrade to version 1.11.0 in SLE-15: [jsc#PED-7040]

Update to 1.11.0:

  * Enhancements and bugfixes

    - Adds support for encrypt-then-mac (ETM) MACs
    - Adds support for AES-GCM crypto protocols
    - Adds support for sk-ecdsa-sha2-nistp256 and sk-ssh-ed25519 keys
    - Adds support for RSA certificate authentication
    - Adds FIDO support with *_sk() functions
    - Adds RSA-SHA2 key upgrading to OpenSSL, WinCNG, mbedTLS, OS400 backends
    - Adds Agent Forwarding and libssh2_agent_sign()
    - Adds support for Channel Signal message libssh2_channel_signal_ex()
    - Adds support to get the user auth banner message libssh2_userauth_banner()
    - Adds LIBSSH2_NO_{MD5, HMAC_RIPEMD, DSA, RSA, RSA_SHA1, ECDSA, ED25519,
      AES_CBC, AES_CTR, BLOWFISH, RC4, CAST, 3DES} options
    - Adds direct stream UNIX sockets with libssh2_channel_direct_streamlocal_ex()
    - Adds wolfSSL support to CMake file
    - Adds mbedTLS 3.x support
    - Adds LibreSSL 3.5 support
    - Adds support for CMake 'unity' builds
    - Adds CMake support for building shared and static libs in a single pass
    - Adds symbol hiding support to CMake
    - Adds support for libssh2.rc for all build tools
    - Adds .zip, .tar.xz and .tar.bz2 release tarballs
    - Enables ed25519 key support for LibreSSL 3.7.0 or higher
    - Improves OpenSSL 1.1 and 3 compatibility
    - Now requires OpenSSL 1.0.2 or newer
    - Now requires CMake 3.1 or newer
    - SFTP: Adds libssh2_sftp_open_ex_r() and libssh2_sftp_open_r() extended APIs
    - SFTP: No longer has a packet limit when reading a directory
    - SFTP: now parses attribute extensions if they exist
    - SFTP: no longer will busy loop if SFTP fails to initialize
    - SFTP: now clear various errors as expected
    - SFTP: no longer skips files if the line buffer is too small
    - SCP: add option to not quote paths
    - SCP: Enables 64-bit offset support unconditionally
    - Now skips leading \r and \n characters in banner_receive()
    - Enables secure memory zeroing with all build tools on all platforms
    - No longer logs SSH_MSG_REQUEST_FAILURE packets from keepalive
    - Speed up base64 encoding by 7x
    - Assert if there is an attempt to write a value that is too large
    - WinCNG: fix memory leak in _libssh2_dh_secret()
    - Added protection against possible null pointer dereferences
    - Agent now handles overly large comment lengths
    - Now ensure KEX replies don't include extra bytes
    - Fixed possible buffer overflow when receiving SSH_MSG_USERAUTH_BANNER
    - Fixed possible buffer overflow in keyboard interactive code path
    - Fixed overlapping memcpy()
    - Fixed Windows UWP builds
    - Fixed DLL import name
    - Renamed local RANDOM_PADDING macro to avoid unexpected define on Windows
    - Support for building with gcc versions older than 8
    - Improvements to CMake, Makefile, NMakefile, GNUmakefile, autoreconf files
    - Restores ANSI C89 compliance
    - Enabled new compiler warnings and fixed/silenced them
    - Improved error messages
    - Now uses CIFuzz
    - Numerous minor code improvements
    - Improvements to CI builds
    - Improvements to unit tests
    - Improvements to doc files
    - Improvements to example files
    - Removed 'old gex' build option
    - Removed no-encryption/no-mac builds
    - Removed support for NetWare and Watcom wmake build files

- Bump to version 1.10.0

  * Enhancements and bugfixes:

      * support ECDSA certificate authentication
      * fix detailed _libssh2_error being overwritten by generic errors
      * unified error handling
      * fix _libssh2_random() silently discarding errors
      * don't error if using keys without RSA
      * avoid OpenSSL latent error in FIPS mode
      * fix EVP_Cipher interface change in openssl 3
      * fix potential overwrite of buffer when reading stdout of command
      * use string_buf in ecdh_sha2_nistp() to avoid attempting to parse malformed data
      * correct a typo which may lead to stack overflow
      * fix random big number generation to match openssl
      * added key exchange group16-sha512 and group18-sha512.
      * add support for an OSS Fuzzer fuzzing target
      * adds support for ECDSA for both key exchange and host key algorithms
      * clean up curve25519 code
      * update the min, preferred and max DH group values based on RFC 8270.
      * changed type of LIBSSH2_FX_* constants to unsigned long
      * added diffie-hellman-group14-sha256 kex
      * fix for use of uninitialized aes_ctr_cipher.key_len when using HAVE_OPAQUE_STRUCTS, regression
      * fixes memory leaks and use after free AES EVP_CIPHER contexts when using OpenSSL 1.0.x.
      * fixes crash with delayed compression option using Bitvise server.
      * adds support for PKIX key reading
      * use new API to parse data in packet_x11_open() for better bounds checking.
      * double the static buffer size when reading and writing known hosts
      * improved bounds checking in packet_queue_listener
      * improve message parsing (CVE-2019-17498)
      * improve bounds checking in kex_agree_methods()
      * adding SSH agent forwarding.
      * fix agent forwarding message, updated example.
      * added integration test code and cmake target. Added example to cmake list.
      * don't call `libssh2_crypto_exit()` until `_libssh2_initialized` count is down to zero.
      * add an EWOULDBLOCK check for better portability
      * fix off by one error when loading public keys with no id
      * fix use-after-free crash on reinitialization of openssl backend
      * preserve error info from agent_list_identities()
      * make sure the error code is set in _libssh2_channel_open()
      * fixed misspellings
      * fix potential typecast error for `_libssh2_ecdsa_key_get_curve_type`
      * rename _libssh2_ecdsa_key_get_curve_type to _libssh2_ecdsa_get_curve_type
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-25"/>
	<updated date="2023-10-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-17498">CVE-2019-17498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009803262" comment="libssh2-1-1.11.0-150000.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803250" comment="libssh2-1-32bit-1.11.0-150000.4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803251" comment="libssh2-devel-1.11.0-150000.4.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4465" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214790" ref_url="https://bugzilla.suse.com/1214790" source="BUGZILLA"/>
		<reference ref_id="1216374" ref_url="https://bugzilla.suse.com/1216374" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016848.html" source="SUSE-SU"/>
		<description>
This update for java-11-openjdk fixes the following issues:

- Upgraded to JDK 11.0.21+9 (October 2023 CPU):

  - CVE-2023-22081: Fixed a partial denial of service issue that
    could be triggered via HTTPS (bsc#1216374).

Please visit the Oracle Release Notes page for the full changelog:

https://www.oracle.com/java/technologies/javase/11all-relnotes.html
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-25"/>
	<updated date="2023-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214790">SUSE bug 1214790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216374">SUSE bug 1216374</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009802352" comment="java-11-openjdk-11.0.21.0-150000.3.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802353" comment="java-11-openjdk-demo-11.0.21.0-150000.3.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802354" comment="java-11-openjdk-devel-11.0.21.0-150000.3.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802355" comment="java-11-openjdk-headless-11.0.21.0-150000.3.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802356" comment="java-11-openjdk-javadoc-11.0.21.0-150000.3.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802357" comment="java-11-openjdk-jmods-11.0.21.0-150000.3.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802358" comment="java-11-openjdk-src-11.0.21.0-150000.3.107.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4466" version="1" class="patch">
	<metadata>
		<title>Security update for nghttp2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216123" ref_url="https://bugzilla.suse.com/1216123" source="BUGZILLA"/>
		<reference ref_id="1216174" ref_url="https://bugzilla.suse.com/1216174" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016846.html" source="SUSE-SU"/>
		<description>
This update for nghttp2 fixes the following issues:

- CVE-2023-44487: Fixed HTTP/2 Rapid Reset attack. (bsc#1216174)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-25"/>
	<updated date="2023-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216123">SUSE bug 1216123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216174">SUSE bug 1216174</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009802646" comment="libnghttp2-14-1.40.0-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802532" comment="libnghttp2-14-32bit-1.40.0-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802647" comment="libnghttp2-devel-1.40.0-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802648" comment="libnghttp2_asio-devel-1.40.0-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802649" comment="libnghttp2_asio1-1.40.0-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802650" comment="libnghttp2_asio1-32bit-1.40.0-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802651" comment="nghttp2-1.40.0-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802652" comment="python3-nghttp2-1.40.0-150200.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4467" version="1" class="patch">
	<metadata>
		<title>Security update for jetty-minimal (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215415" ref_url="https://bugzilla.suse.com/1215415" source="BUGZILLA"/>
		<reference ref_id="1215416" ref_url="https://bugzilla.suse.com/1215416" source="BUGZILLA"/>
		<reference ref_id="1215417" ref_url="https://bugzilla.suse.com/1215417" source="BUGZILLA"/>
		<reference ref_id="1216162" ref_url="https://bugzilla.suse.com/1216162" source="BUGZILLA"/>
		<reference ref_id="1216169" ref_url="https://bugzilla.suse.com/1216169" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-36478" ref_url="https://www.suse.com/security/cve/CVE-2023-36478/" source="CVE"/>
		<reference ref_id="CVE-2023-36479" ref_url="https://www.suse.com/security/cve/CVE-2023-36479/" source="CVE"/>
		<reference ref_id="CVE-2023-40167" ref_url="https://www.suse.com/security/cve/CVE-2023-40167/" source="CVE"/>
		<reference ref_id="CVE-2023-41900" ref_url="https://www.suse.com/security/cve/CVE-2023-41900/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032390.html" source="SUSE-SU"/>
		<description>
This update for jetty-minimal fixes the following issues:

- Updated to version 9.4.53.v20231009:

  - CVE-2023-44487: Fixed a potential denial of service scenario via
    RST frame floods (bsc#1216169).
  - CVE-2023-36478: Fixed an integer overflow in the HTTP/2 HPACK
    decoder (bsc#1216162).
  - CVE-2023-40167: Fixed a permissive HTTP header parsing issue that
    could potentially lead to HTTP smuggling attacks (bsc#1215417).
  - CVE-2023-36479: Fixed an incorrect command execution when sending
    requests with certain characters in requested filenames
    (bsc#1215415).
  - CVE-2023-41900: Fixed an issue where an invalidated session would
    be allowed to perform a single request (bsc#1215416).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-26"/>
	<updated date="2023-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215415">SUSE bug 1215415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215416">SUSE bug 1215416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215417">SUSE bug 1215417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216162">SUSE bug 1216162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216169">SUSE bug 1216169</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-36478/">CVE-2023-36478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36478">CVE-2023-36478 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-36479/">CVE-2023-36479 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36479">CVE-2023-36479 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-40167/">CVE-2023-40167 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40167">CVE-2023-40167 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-41900/">CVE-2023-41900 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41900">CVE-2023-41900 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009801582" comment="jetty-annotations-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801583" comment="jetty-ant-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801584" comment="jetty-cdi-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801585" comment="jetty-client-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801586" comment="jetty-continuation-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801587" comment="jetty-deploy-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801588" comment="jetty-fcgi-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801589" comment="jetty-http-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801590" comment="jetty-http-spi-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801591" comment="jetty-io-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801592" comment="jetty-jaas-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801593" comment="jetty-jmx-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801594" comment="jetty-jndi-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801595" comment="jetty-jsp-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801596" comment="jetty-minimal-javadoc-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801597" comment="jetty-openid-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801598" comment="jetty-plus-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801599" comment="jetty-proxy-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801600" comment="jetty-quickstart-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801601" comment="jetty-rewrite-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801602" comment="jetty-security-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801603" comment="jetty-server-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801604" comment="jetty-servlet-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801605" comment="jetty-servlets-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801606" comment="jetty-start-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801607" comment="jetty-util-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801608" comment="jetty-util-ajax-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801609" comment="jetty-webapp-9.4.53-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801610" comment="jetty-xml-9.4.53-150200.3.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4468" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216338" ref_url="https://bugzilla.suse.com/1216338" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5721" ref_url="https://www.suse.com/security/cve/CVE-2023-5721/" source="CVE"/>
		<reference ref_id="CVE-2023-5722" ref_url="https://www.suse.com/security/cve/CVE-2023-5722/" source="CVE"/>
		<reference ref_id="CVE-2023-5723" ref_url="https://www.suse.com/security/cve/CVE-2023-5723/" source="CVE"/>
		<reference ref_id="CVE-2023-5724" ref_url="https://www.suse.com/security/cve/CVE-2023-5724/" source="CVE"/>
		<reference ref_id="CVE-2023-5725" ref_url="https://www.suse.com/security/cve/CVE-2023-5725/" source="CVE"/>
		<reference ref_id="CVE-2023-5726" ref_url="https://www.suse.com/security/cve/CVE-2023-5726/" source="CVE"/>
		<reference ref_id="CVE-2023-5727" ref_url="https://www.suse.com/security/cve/CVE-2023-5727/" source="CVE"/>
		<reference ref_id="CVE-2023-5728" ref_url="https://www.suse.com/security/cve/CVE-2023-5728/" source="CVE"/>
		<reference ref_id="CVE-2023-5729" ref_url="https://www.suse.com/security/cve/CVE-2023-5729/" source="CVE"/>
		<reference ref_id="CVE-2023-5730" ref_url="https://www.suse.com/security/cve/CVE-2023-5730/" source="CVE"/>
		<reference ref_id="CVE-2023-5731" ref_url="https://www.suse.com/security/cve/CVE-2023-5731/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016853.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Updated to version 115.4.0 ESR (bsc#1216338):

  - CVE-2023-5721: Fixed a potential clickjack via queued up
    rendering.
  - CVE-2023-5722: Fixed a cross-Origin size and header leakage.
  - CVE-2023-5723: Fixed unexpected errors when handling invalid
    cookie characters.
  - CVE-2023-5724: Fixed a crash due to a large WebGL draw.
  - CVE-2023-5725: Fixed an issue where WebExtensions could open
    arbitrary URLs.
  - CVE-2023-5726: Fixed an issue where fullscreen notifications would
    be obscured by file the open dialog on macOS.
  - CVE-2023-5727: Fixed a download protection bypass on on Windows.
  - CVE-2023-5728: Fixed a crash caused by improper object tracking
    during GC in the JavaScript engine.
  - CVE-2023-5729: Fixed an issue where fullscreen notifications would
    be obscured by WebAuthn prompts.
  - CVE-2023-5730: Fixed multiple memory safety issues.
  - CVE-2023-5731: Fixed multiple memory safety issues.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-26"/>
	<updated date="2023-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216338">SUSE bug 1216338</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5721/">CVE-2023-5721 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5721">CVE-2023-5721 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5722/">CVE-2023-5722 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5722">CVE-2023-5722 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5723/">CVE-2023-5723 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5723">CVE-2023-5723 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5724/">CVE-2023-5724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5724">CVE-2023-5724 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5725/">CVE-2023-5725 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5725">CVE-2023-5725 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5726/">CVE-2023-5726 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5726">CVE-2023-5726 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5727/">CVE-2023-5727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5727">CVE-2023-5727 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5728/">CVE-2023-5728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5728">CVE-2023-5728 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5729/">CVE-2023-5729 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5729">CVE-2023-5729 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5730/">CVE-2023-5730 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5730">CVE-2023-5730 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5731/">CVE-2023-5731 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5731">CVE-2023-5731 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009802694" comment="MozillaFirefox-115.4.0-150200.152.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802695" comment="MozillaFirefox-branding-upstream-115.4.0-150200.152.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802696" comment="MozillaFirefox-devel-115.4.0-150200.152.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802697" comment="MozillaFirefox-translations-common-115.4.0-150200.152.114.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802698" comment="MozillaFirefox-translations-other-115.4.0-150200.152.114.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4469" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216378" ref_url="https://bugzilla.suse.com/1216378" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45853" ref_url="https://www.suse.com/security/cve/CVE-2023-45853/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016852.html" source="SUSE-SU"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2023-45853: Fixed an integer overflow that would lead to a
  buffer overflow in the minizip subcomponent (bsc#1216378).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-26"/>
	<updated date="2023-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216378">SUSE bug 1216378</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45853/">CVE-2023-45853 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45853">CVE-2023-45853 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009802521" comment="libminizip1-1.2.13-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802522" comment="libminizip1-32bit-1.2.13-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802523" comment="libz1-1.2.13-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802524" comment="libz1-32bit-1.2.13-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802525" comment="minizip-devel-1.2.13-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802526" comment="zlib-devel-1.2.13-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802527" comment="zlib-devel-32bit-1.2.13-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802528" comment="zlib-devel-static-1.2.13-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802529" comment="zlib-devel-static-32bit-1.2.13-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802530" comment="zlib-testsuite-1.2.13-150500.4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4470" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210638" ref_url="https://bugzilla.suse.com/1210638" source="BUGZILLA"/>
		<reference ref_id="1214685" ref_url="https://bugzilla.suse.com/1214685" source="BUGZILLA"/>
		<reference ref_id="1214691" ref_url="https://bugzilla.suse.com/1214691" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48565" ref_url="https://www.suse.com/security/cve/CVE-2022-48565/" source="CVE"/>
		<reference ref_id="CVE-2022-48566" ref_url="https://www.suse.com/security/cve/CVE-2022-48566/" source="CVE"/>
		<reference ref_id="CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016861.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2022-48566: Fixed a potential timing side channel due to
  inadequate checking during HMAC comparison (bsc#1214691).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-26"/>
	<updated date="2023-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210638">SUSE bug 1210638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214685">SUSE bug 1214685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214691">SUSE bug 1214691</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48565/">CVE-2022-48565 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48565">CVE-2022-48565 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-48566/">CVE-2022-48566 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48566">CVE-2022-48566 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009802679" comment="libpython2_7-1_0-2.7.18-150000.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802680" comment="libpython2_7-1_0-32bit-2.7.18-150000.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802681" comment="python-2.7.18-150000.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802682" comment="python-32bit-2.7.18-150000.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802683" comment="python-base-2.7.18-150000.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802684" comment="python-base-32bit-2.7.18-150000.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802685" comment="python-curses-2.7.18-150000.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802686" comment="python-demo-2.7.18-150000.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802687" comment="python-devel-2.7.18-150000.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802688" comment="python-doc-2.7.18-150000.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802689" comment="python-doc-pdf-2.7.18-150000.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802690" comment="python-gdbm-2.7.18-150000.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802691" comment="python-idle-2.7.18-150000.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802692" comment="python-tk-2.7.18-150000.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802693" comment="python-xml-2.7.18-150000.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4471" version="1" class="patch">
	<metadata>
		<title>Security update for libnbd (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215799" ref_url="https://bugzilla.suse.com/1215799" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5215" ref_url="https://www.suse.com/security/cve/CVE-2023-5215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016882.html" source="SUSE-SU"/>
		<description>
This update for libnbd fixes the following issues:

- Updated to version 1.18.1
- Updated to version 1.18.0:

  - CVE-2023-5215: Fixed an issue where an NBD server returning an
    unexpected block size might crash an application (bsc#1215799).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-27"/>
	<updated date="2023-10-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215799">SUSE bug 1215799</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5215/">CVE-2023-5215 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5215">CVE-2023-5215 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009803403" comment="libnbd-1.18.1-150300.8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803404" comment="libnbd-bash-completion-1.18.1-150300.8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803405" comment="libnbd-devel-1.18.1-150300.8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803406" comment="libnbd0-1.18.1-150300.8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803407" comment="nbdfuse-1.18.1-150300.8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803416" comment="python3-libnbd-1.18.1-150300.8.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4472" version="1" class="patch">
	<metadata>
		<title>Security update for zchunk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216268" ref_url="https://bugzilla.suse.com/1216268" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46228" ref_url="https://www.suse.com/security/cve/CVE-2023-46228/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016891.html" source="SUSE-SU"/>
		<description>
This update for zchunk fixes the following issues:

- CVE-2023-46228: Fixed a handle overflow errors in malformed zchunk files. (bsc#1216268)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-27"/>
	<updated date="2023-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216268">SUSE bug 1216268</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-46228/">CVE-2023-46228 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46228">CVE-2023-46228 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009802653" comment="libzck-devel-1.1.16-150400.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802654" comment="libzck1-1.1.16-150400.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802655" comment="zchunk-1.1.16-150400.3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4473" version="1" class="patch">
	<metadata>
		<title>Security update for open-vm-tools (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216432" ref_url="https://bugzilla.suse.com/1216432" source="BUGZILLA"/>
		<reference ref_id="1216433" ref_url="https://bugzilla.suse.com/1216433" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-34058" ref_url="https://www.suse.com/security/cve/CVE-2023-34058/" source="CVE"/>
		<reference ref_id="CVE-2023-34059" ref_url="https://www.suse.com/security/cve/CVE-2023-34059/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016890.html" source="SUSE-SU"/>
		<description>
This update for open-vm-tools fixes the following issues:

- CVE-2023-34058: Fixed a SAML token signature bypass issue
  (bsc#1216432).
- CVE-2023-34059: Fixed a privilege escalation issue through
  vmware-user-suid-wrapper (bsc#1216433).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-27"/>
	<updated date="2023-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216432">SUSE bug 1216432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216433">SUSE bug 1216433</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34058/">CVE-2023-34058 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34058">CVE-2023-34058 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-34059/">CVE-2023-34059 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34059">CVE-2023-34059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009803758" comment="libvmtools-devel-12.3.0-150300.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803759" comment="libvmtools0-12.3.0-150300.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803760" comment="open-vm-tools-12.3.0-150300.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803761" comment="open-vm-tools-containerinfo-12.3.0-150300.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803762" comment="open-vm-tools-desktop-12.3.0-150300.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803763" comment="open-vm-tools-salt-minion-12.3.0-150300.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803764" comment="open-vm-tools-sdmp-12.3.0-150300.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4474" version="1" class="patch">
	<metadata>
		<title>Security update for vorbis-tools (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215942" ref_url="https://bugzilla.suse.com/1215942" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-43361" ref_url="https://www.suse.com/security/cve/CVE-2023-43361/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016919.html" source="SUSE-SU"/>
		<description>
This update for vorbis-tools fixes the following issues:

- CVE-2023-43361: Fixed a buffer overflow vulnerability during the conversion of wav files to ogg files. (bsc#1215942)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2023-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215942">SUSE bug 1215942</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-43361/">CVE-2023-43361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43361">CVE-2023-43361 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009802704" comment="vorbis-tools-1.4.0-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802705" comment="vorbis-tools-lang-1.4.0-150000.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4475" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216133" ref_url="https://bugzilla.suse.com/1216133" source="BUGZILLA"/>
		<reference ref_id="1216135" ref_url="https://bugzilla.suse.com/1216135" source="BUGZILLA"/>
		<reference ref_id="1216261" ref_url="https://bugzilla.suse.com/1216261" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5367" ref_url="https://www.suse.com/security/cve/CVE-2023-5367/" source="CVE"/>
		<reference ref_id="CVE-2023-5380" ref_url="https://www.suse.com/security/cve/CVE-2023-5380/" source="CVE"/>
		<reference ref_id="CVE-2023-5574" ref_url="https://www.suse.com/security/cve/CVE-2023-5574/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016929.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2023-5574: Fixed a privilege escalation issue that could be
  triggered via the Damage extension protocol (bsc#1216261).
- CVE-2023-5380: Fixed a memory safety issue that could be triggered
  when using multiple protocol screens (bsc#1216133).
- CVE-2023-5367: Fixed a memory safety issue in both the XI2 and RandR
  protocols (bsc#1216135).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2023-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216133">SUSE bug 1216133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216135">SUSE bug 1216135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216261">SUSE bug 1216261</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5367/">CVE-2023-5367 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5367">CVE-2023-5367 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5380/">CVE-2023-5380 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5380">CVE-2023-5380 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5574/">CVE-2023-5574 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5574">CVE-2023-5574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807383" comment="xorg-x11-server-21.1.4-150500.7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807384" comment="xorg-x11-server-Xvfb-21.1.4-150500.7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807385" comment="xorg-x11-server-extra-21.1.4-150500.7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807386" comment="xorg-x11-server-sdk-21.1.4-150500.7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807387" comment="xorg-x11-server-source-21.1.4-150500.7.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4476" version="1" class="patch">
	<metadata>
		<title>Security update for python-Werkzeug (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216581" ref_url="https://bugzilla.suse.com/1216581" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46136" ref_url="https://www.suse.com/security/cve/CVE-2023-46136/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016952.html" source="SUSE-SU"/>
		<description>
This update for python-Werkzeug fixes the following issues:

- CVE-2023-46136: Fixed a potential denial of service via large
  multipart file uploads (bsc#1216581).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-31"/>
	<updated date="2023-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216581">SUSE bug 1216581</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46136/">CVE-2023-46136 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46136">CVE-2023-46136 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803756" comment="python311-Werkzeug-2.3.6-150400.6.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4477" version="1" class="patch">
	<metadata>
		<title>Security update for java-17-openjdk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214790" ref_url="https://bugzilla.suse.com/1214790" source="BUGZILLA"/>
		<reference ref_id="1216339" ref_url="https://bugzilla.suse.com/1216339" source="BUGZILLA"/>
		<reference ref_id="1216374" ref_url="https://bugzilla.suse.com/1216374" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-22025" ref_url="https://www.suse.com/security/cve/CVE-2023-22025/" source="CVE"/>
		<reference ref_id="CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016951.html" source="SUSE-SU"/>
		<description>
This update for java-17-openjdk fixes the following issues:

- Updated to JDK 17.0.9+9 (October 2023 CPU):

  - CVE-2023-22081: Fixed a partial denial of service issue that could
    be triggered via HTTPS (bsc#1216374).
  - CVE-2023-22025: Fixed a memory corruption issue in applications
    using AVX-512 (bsc#1216339).

Please visit the Oracle Release Notes page for the full changelog:

https://www.oracle.com/java/technologies/javase/17all-relnotes.html
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-31"/>
	<updated date="2023-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214790">SUSE bug 1214790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216339">SUSE bug 1216339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216374">SUSE bug 1216374</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22025/">CVE-2023-22025 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22025">CVE-2023-22025 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009802665" comment="java-17-openjdk-17.0.9.0-150400.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802666" comment="java-17-openjdk-demo-17.0.9.0-150400.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802667" comment="java-17-openjdk-devel-17.0.9.0-150400.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802668" comment="java-17-openjdk-headless-17.0.9.0-150400.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802669" comment="java-17-openjdk-javadoc-17.0.9.0-150400.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802670" comment="java-17-openjdk-jmods-17.0.9.0-150400.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802671" comment="java-17-openjdk-src-17.0.9.0-150400.3.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4478" version="1" class="patch">
	<metadata>
		<title>Security update for redis (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216376" ref_url="https://bugzilla.suse.com/1216376" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45145" ref_url="https://www.suse.com/security/cve/CVE-2023-45145/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016950.html" source="SUSE-SU"/>
		<description>
This update for redis fixes the following issues:

- CVE-2023-45145: Fixed a potential permission bypass due to a race
  condition during UNIX socket creation (bsc#1216376).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-31"/>
	<updated date="2023-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216376">SUSE bug 1216376</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-45145/">CVE-2023-45145 at SUSE</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45145">CVE-2023-45145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802703" comment="redis-6.2.6-150400.3.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4479" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213888" ref_url="https://bugzilla.suse.com/1213888" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-34872" ref_url="https://www.suse.com/security/cve/CVE-2023-34872/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016949.html" source="SUSE-SU"/>
		<description>
This update for poppler fixes the following issues:

- CVE-2023-34872: Fixed a remote denial-of-service in Outline.cc. (bsc#1213888)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-31"/>
	<updated date="2023-10-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213888">SUSE bug 1213888</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-34872/">CVE-2023-34872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34872">CVE-2023-34872 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009803105" comment="libpoppler-cpp0-23.01.0-150500.3.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803106" comment="libpoppler-cpp0-32bit-23.01.0-150500.3.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803107" comment="libpoppler-devel-23.01.0-150500.3.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803108" comment="libpoppler-glib-devel-23.01.0-150500.3.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803109" comment="libpoppler-glib8-23.01.0-150500.3.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803110" comment="libpoppler-glib8-32bit-23.01.0-150500.3.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803111" comment="libpoppler-qt5-1-23.01.0-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803112" comment="libpoppler-qt5-1-32bit-23.01.0-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803113" comment="libpoppler-qt5-devel-23.01.0-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803114" comment="libpoppler-qt6-3-23.01.0-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803115" comment="libpoppler-qt6-devel-23.01.0-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803116" comment="libpoppler126-23.01.0-150500.3.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803117" comment="libpoppler126-32bit-23.01.0-150500.3.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803118" comment="poppler-tools-23.01.0-150500.3.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803119" comment="typelib-1_0-Poppler-0_18-23.01.0-150500.3.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4480" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214093" ref_url="https://bugzilla.suse.com/1214093" source="BUGZILLA"/>
		<reference ref_id="1214640" ref_url="https://bugzilla.suse.com/1214640" source="BUGZILLA"/>
		<reference ref_id="1214835" ref_url="https://bugzilla.suse.com/1214835" source="BUGZILLA"/>
		<reference ref_id="1215072" ref_url="https://bugzilla.suse.com/1215072" source="BUGZILLA"/>
		<reference ref_id="1215661" ref_url="https://bugzilla.suse.com/1215661" source="BUGZILLA"/>
		<reference ref_id="1215866" ref_url="https://bugzilla.suse.com/1215866" source="BUGZILLA"/>
		<reference ref_id="1215867" ref_url="https://bugzilla.suse.com/1215867" source="BUGZILLA"/>
		<reference ref_id="1215868" ref_url="https://bugzilla.suse.com/1215868" source="BUGZILLA"/>
		<reference ref_id="1215869" ref_url="https://bugzilla.suse.com/1215869" source="BUGZILLA"/>
		<reference ref_id="1215870" ref_url="https://bugzilla.suse.com/1215870" source="BUGZILLA"/>
		<reference ref_id="1216483" ref_url="https://bugzilla.suse.com/1216483" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-35074" ref_url="https://www.suse.com/security/cve/CVE-2023-35074/" source="CVE"/>
		<reference ref_id="CVE-2023-39434" ref_url="https://www.suse.com/security/cve/CVE-2023-39434/" source="CVE"/>
		<reference ref_id="CVE-2023-39928" ref_url="https://www.suse.com/security/cve/CVE-2023-39928/" source="CVE"/>
		<reference ref_id="CVE-2023-40451" ref_url="https://www.suse.com/security/cve/CVE-2023-40451/" source="CVE"/>
		<reference ref_id="CVE-2023-41074" ref_url="https://www.suse.com/security/cve/CVE-2023-41074/" source="CVE"/>
		<reference ref_id="CVE-2023-41993" ref_url="https://www.suse.com/security/cve/CVE-2023-41993/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016946.html" source="SUSE-SU"/>
		<description>

This update for webkit2gtk3 ships missing Lang packages to SUSE Linux Enterprise 15 SP4 and SP5.

Security fixes:

- CVE-2023-41993: Fixed an issue where processing malicious web
  content could have lead to arbitrary code execution (bsc#1215661).
- CVE-2023-39928: Fixed a use-after-free that could be exploited to
  execute arbitrary code when visiting a malicious webpage
  (bsc#1215868).
- CVE-2023-41074: Fixed an issue where processing malicious web
  content could have lead to arbitrary code execution (bsc#1215870).

Other fixes:

- Fixed missing package dependencies (bsc#1215072).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-31"/>
	<updated date="2023-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214093">SUSE bug 1214093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214640">SUSE bug 1214640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214835">SUSE bug 1214835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215072">SUSE bug 1215072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215661">SUSE bug 1215661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215866">SUSE bug 1215866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215867">SUSE bug 1215867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215868">SUSE bug 1215868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215869">SUSE bug 1215869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215870">SUSE bug 1215870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216483">SUSE bug 1216483</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35074/">CVE-2023-35074 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35074">CVE-2023-35074 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39434/">CVE-2023-39434 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39434">CVE-2023-39434 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39928/">CVE-2023-39928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39928">CVE-2023-39928 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40451/">CVE-2023-40451 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40451">CVE-2023-40451 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-41074/">CVE-2023-41074 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41074">CVE-2023-41074 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-41993/">CVE-2023-41993 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41993">CVE-2023-41993 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009803333" comment="WebKitGTK-4.0-lang-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803334" comment="WebKitGTK-4.1-lang-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803335" comment="WebKitGTK-6.0-lang-2.42.1-150400.4.57.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803336" comment="libjavascriptcoregtk-4_0-18-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803337" comment="libjavascriptcoregtk-4_0-18-32bit-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803338" comment="libjavascriptcoregtk-4_0-18-64bit-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803339" comment="libjavascriptcoregtk-4_1-0-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803340" comment="libjavascriptcoregtk-4_1-0-32bit-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803341" comment="libjavascriptcoregtk-4_1-0-64bit-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803342" comment="libjavascriptcoregtk-6_0-1-2.42.1-150400.4.57.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803343" comment="libwebkit2gtk-4_0-37-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803344" comment="libwebkit2gtk-4_0-37-32bit-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803345" comment="libwebkit2gtk-4_0-37-64bit-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803346" comment="libwebkit2gtk-4_1-0-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803347" comment="libwebkit2gtk-4_1-0-32bit-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803348" comment="libwebkit2gtk-4_1-0-64bit-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803349" comment="libwebkitgtk-6_0-4-2.42.1-150400.4.57.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803350" comment="typelib-1_0-JavaScriptCore-4_0-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803351" comment="typelib-1_0-JavaScriptCore-4_1-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803352" comment="typelib-1_0-JavaScriptCore-6_0-2.42.1-150400.4.57.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803353" comment="typelib-1_0-WebKit-6_0-2.42.1-150400.4.57.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803354" comment="typelib-1_0-WebKit2-4_0-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803355" comment="typelib-1_0-WebKit2-4_1-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803356" comment="typelib-1_0-WebKit2WebExtension-4_0-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803357" comment="typelib-1_0-WebKit2WebExtension-4_1-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803358" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.42.1-150400.4.57.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803359" comment="webkit-jsc-4-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803360" comment="webkit-jsc-4.1-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803361" comment="webkit-jsc-6.0-2.42.1-150400.4.57.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803362" comment="webkit2gtk-4_0-injected-bundles-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803363" comment="webkit2gtk-4_1-injected-bundles-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803364" comment="webkit2gtk3-devel-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803365" comment="webkit2gtk3-minibrowser-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803366" comment="webkit2gtk3-soup2-devel-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803367" comment="webkit2gtk3-soup2-minibrowser-2.42.1-150400.4.57.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803368" comment="webkit2gtk4-devel-2.42.1-150400.4.57.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803369" comment="webkit2gtk4-minibrowser-2.42.1-150400.4.57.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803370" comment="webkitgtk-6_0-injected-bundles-2.42.1-150400.4.57.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4481" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216338" ref_url="https://bugzilla.suse.com/1216338" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5721" ref_url="https://www.suse.com/security/cve/CVE-2023-5721/" source="CVE"/>
		<reference ref_id="CVE-2023-5724" ref_url="https://www.suse.com/security/cve/CVE-2023-5724/" source="CVE"/>
		<reference ref_id="CVE-2023-5725" ref_url="https://www.suse.com/security/cve/CVE-2023-5725/" source="CVE"/>
		<reference ref_id="CVE-2023-5726" ref_url="https://www.suse.com/security/cve/CVE-2023-5726/" source="CVE"/>
		<reference ref_id="CVE-2023-5727" ref_url="https://www.suse.com/security/cve/CVE-2023-5727/" source="CVE"/>
		<reference ref_id="CVE-2023-5728" ref_url="https://www.suse.com/security/cve/CVE-2023-5728/" source="CVE"/>
		<reference ref_id="CVE-2023-5730" ref_url="https://www.suse.com/security/cve/CVE-2023-5730/" source="CVE"/>
		<reference ref_id="CVE-2023-5732" ref_url="https://www.suse.com/security/cve/CVE-2023-5732/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016943.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Updated to version 115.4.1:

  - CVE-2023-5721: Fixed a potential clickjack via queued up
    rendering.
  - CVE-2023-5732: Fixed an address bar spoofing via bidirectional
    characters
  - CVE-2023-5724: Fixed a crash due to a large WebGL draw.
  - CVE-2023-5725: Fixed an issue where WebExtensions could open
    arbitrary URLs.
  - CVE-2023-5726: Fixed an issue where fullscreen notifications would
    be obscured by file the open dialog on macOS.
  - CVE-2023-5727: Fixed a download protection bypass on on Windows.
  - CVE-2023-5728: Fixed a crash caused by improper object tracking
    during GC in the JavaScript engine.
  - CVE-2023-5730: Fixed multiple memory safety issues.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-31"/>
	<updated date="2023-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216338">SUSE bug 1216338</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5721/">CVE-2023-5721 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5721">CVE-2023-5721 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5724/">CVE-2023-5724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5724">CVE-2023-5724 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5725/">CVE-2023-5725 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5725">CVE-2023-5725 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5726/">CVE-2023-5726 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5726">CVE-2023-5726 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5727/">CVE-2023-5727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5727">CVE-2023-5727 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5728/">CVE-2023-5728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5728">CVE-2023-5728 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5730/">CVE-2023-5730 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5730">CVE-2023-5730 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5732/">CVE-2023-5732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5732">CVE-2023-5732 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009803720" comment="MozillaThunderbird-115.4.1-150200.8.136.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803721" comment="MozillaThunderbird-translations-common-115.4.1-150200.8.136.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803722" comment="MozillaThunderbird-translations-other-115.4.1-150200.8.136.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4482" version="1" class="patch">
	<metadata>
		<title>Security update for xwayland (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216135" ref_url="https://bugzilla.suse.com/1216135" source="BUGZILLA"/>
		<reference ref_id="1216261" ref_url="https://bugzilla.suse.com/1216261" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5367" ref_url="https://www.suse.com/security/cve/CVE-2023-5367/" source="CVE"/>
		<reference ref_id="CVE-2023-5574" ref_url="https://www.suse.com/security/cve/CVE-2023-5574/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4306-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3DLU3SRCIDHQQAZA4SYMSJKDW6AWQV4B/" source="SUSE-SU"/>
		<description>
This update for xwayland fixes the following issues:

- CVE-2023-5574: Fixed a privilege escalation issue that could be
  triggered via the Damage extension protocol (bsc#1216261).
- CVE-2023-5367: Fixed a memory safety issue in both the XI2 and RandR
  protocols (bsc#1216135).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-10-31"/>
	<updated date="2023-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216135">SUSE bug 1216135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216261">SUSE bug 1216261</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5367/">CVE-2023-5367 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5367">CVE-2023-5367 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5574/">CVE-2023-5574 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5574">CVE-2023-5574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807381" comment="xwayland-22.1.5-150500.7.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807382" comment="xwayland-devel-22.1.5-150500.7.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4483" version="1" class="patch">
	<metadata>
		<title>Security update for slurm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1208810" ref_url="https://bugzilla.suse.com/1208810" source="BUGZILLA"/>
		<reference ref_id="1216207" ref_url="https://bugzilla.suse.com/1216207" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-41914" ref_url="https://www.suse.com/security/cve/CVE-2023-41914/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016969.html" source="SUSE-SU"/>
		<description>
This update for slurm fixes the following issues:

- CVE-2023-41914: Fixed a filesystem handling race conditions that could lead to an attacker taking control of an arbitrary file. (bsc#1216207)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-01"/>
	<updated date="2023-11-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208810">SUSE bug 1208810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216207">SUSE bug 1216207</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-41914/">CVE-2023-41914 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41914">CVE-2023-41914 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009801986" comment="libnss_slurm2_20_11-20.11.9-150200.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801987" comment="libpmi0_20_11-20.11.9-150200.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801988" comment="perl-slurm_20_11-20.11.9-150200.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801989" comment="slurm_20_11-20.11.9-150200.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801990" comment="slurm_20_11-auth-none-20.11.9-150200.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801991" comment="slurm_20_11-config-20.11.9-150200.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801992" comment="slurm_20_11-config-man-20.11.9-150200.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801993" comment="slurm_20_11-cray-20.11.9-150200.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801994" comment="slurm_20_11-devel-20.11.9-150200.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801995" comment="slurm_20_11-doc-20.11.9-150200.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801996" comment="slurm_20_11-hdf5-20.11.9-150200.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801997" comment="slurm_20_11-lua-20.11.9-150200.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801998" comment="slurm_20_11-munge-20.11.9-150200.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801999" comment="slurm_20_11-node-20.11.9-150200.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802000" comment="slurm_20_11-openlava-20.11.9-150200.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802001" comment="slurm_20_11-pam_slurm-20.11.9-150200.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802002" comment="slurm_20_11-plugins-20.11.9-150200.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802003" comment="slurm_20_11-rest-20.11.9-150200.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802004" comment="slurm_20_11-seff-20.11.9-150200.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802005" comment="slurm_20_11-sjstat-20.11.9-150200.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802006" comment="slurm_20_11-slurmdbd-20.11.9-150200.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802007" comment="slurm_20_11-sql-20.11.9-150200.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802008" comment="slurm_20_11-sview-20.11.9-150200.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802009" comment="slurm_20_11-torque-20.11.9-150200.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009802010" comment="slurm_20_11-webdoc-20.11.9-150200.6.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4484" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213451" ref_url="https://bugzilla.suse.com/1213451" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-33065" ref_url="https://www.suse.com/security/cve/CVE-2022-33065/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016968.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2022-33065: Fixed an integer overflow that could cause memory
  safety issues when reading a MAT4 file (bsc#1213451).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-01"/>
	<updated date="2023-11-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213451">SUSE bug 1213451</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-33065/">CVE-2022-33065 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33065">CVE-2022-33065 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009803090" comment="libsndfile-devel-1.0.28-150000.5.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803091" comment="libsndfile-progs-1.0.28-150000.5.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803092" comment="libsndfile1-1.0.28-150000.5.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803093" comment="libsndfile1-32bit-1.0.28-150000.5.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4485" version="1" class="patch">
	<metadata>
		<title>Recommended update for slurm (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215437" ref_url="https://bugzilla.suse.com/1215437" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29500" ref_url="https://www.suse.com/security/cve/CVE-2022-29500/" source="CVE"/>
		<reference ref_id="SUSE-RU-2023:4332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032559.html" source="SUSE-SU"/>
		<description>
This update for slurm fixes the following issues:

- Updated to version 23.02.5 with the following changes:

  * Bug Fixes:

    + Revert a change in 23.02 where `SLURM_NTASKS` was no longer set in the
      job's environment when `--ntasks-per-node` was requested.
      The method that is is being set, however, is different and should be more
      accurate in more situations.
    + Change pmi2 plugin to honor the `SrunPortRange` option. This matches the
      new behavior of the pmix plugin in 23.02.0. Note that neither of these
      plugins makes use of the `MpiParams=ports=` option, and previously
      were only limited by the systems ephemeral port range.
    + Fix regression in 23.02.2 that caused slurmctld -R to crash on startup if
      a node features plugin is configured.
    + Fix and prevent reoccurring reservations from overlapping.
    + `job_container/tmpfs` - Avoid attempts to share BasePath between nodes.
    + With `CR_Cpu_Memory`, fix node selection for jobs that request gres and
      `--mem-per-cpu`.
    + Fix a regression from 22.05.7 in which some jobs were allocated too few
      nodes, thus overcommitting cpus to some tasks.
    + Fix a job being stuck in the completing state if the job ends while the
      primary controller is down or unresponsive and the backup controller has
      not yet taken over.
    + Fix `slurmctld` segfault when a node registers with a configured
      `CpuSpecList` while `slurmctld` configuration has the node without
      `CpuSpecList`.
    + Fix cloud nodes getting stuck in `POWERED_DOWN+NO_RESPOND` state after
      not registering by `ResumeTimeout`.
    + `slurmstepd` - Avoid cleanup of `config.json-less` containers spooldir
      getting skipped.
    + Fix scontrol segfault when 'completing' command requested repeatedly in
      interactive mode.
    + Properly handle a race condition between `bind()` and `listen()` calls
      in the network stack when running with SrunPortRange set.
    + Federation - Fix revoked jobs being returned regardless of the
      `-a`/`--all` option for privileged users.
    + Federation - Fix canceling pending federated jobs from non-origin
      clusters which could leave federated jobs orphaned from the origin
      cluster.
    + Fix sinfo segfault when printing multiple clusters with `--noheader`
      option.
    + Federation - fix clusters not syncing if clusters are added to a
      federation before they have registered with the dbd.
    + `node_features/helpers` - Fix node selection for jobs requesting
      changeable.
      features with the `|` operator, which could prevent jobs from
      running on some valid nodes.
    + `node_features/helpers` - Fix inconsistent handling of `&amp;` and `|`,
      where an AND'd feature was sometimes AND'd to all sets of features
      instead of just the current set. E.g. `foo|bar&amp;baz` was interpreted
      as `{foo,baz}` or `{bar,baz}` instead of how it is documented:
      `{foo} or {bar,baz}`.
    + Fix job accounting so that when a job is requeued its allocated node
      count is cleared. After the requeue, sacct will correctly show that
      the job has 0 `AllocNodes` while it is pending or if it is canceled
      before restarting.
    + `sacct` - `AllocCPUS` now correctly shows 0 if a job has not yet
      received an allocation or if the job was canceled before getting one.
    + Fix intel OneAPI autodetect: detect the `/dev/dri/renderD[0-9]+` GPUs,
      and do not detect `/dev/dri/card[0-9]+`.
    + Fix node selection for jobs that request `--gpus` and a number of
      tasks fewer than GPUs, which resulted in incorrectly rejecting these
      jobs.
    + Remove `MYSQL_OPT_RECONNECT` completely.
    + Fix cloud nodes in `POWERING_UP` state disappearing (getting set
      to `FUTURE`)
      when an `scontrol reconfigure` happens.
    + `openapi/dbv0.0.39` - Avoid assert / segfault on missing coordinators
      list.
    + `slurmrestd` - Correct memory leak while parsing OpenAPI specification
      templates with server overrides.
    + Fix overwriting user node reason with system message.
    + Prevent deadlock when `rpc_queue` is enabled.
    + `slurmrestd` - Correct OpenAPI specification generation bug where
      fields with overlapping parent paths would not get generated.
    + Fix memory leak as a result of a partition info query.
    + Fix memory leak as a result of a job info query.
    + For step allocations, fix `--gres=none` sometimes not ignoring gres
      from the job.
    + Fix `--exclusive` jobs incorrectly gang-scheduling where they shouldn't.
    + Fix allocations with `CR_SOCKET`, gres not assigned to a specific
      socket, and block core distribion potentially allocating more sockets
      than required.
    + Revert a change in 23.02.3 where Slurm would kill a script's process
      group as soon as the script ended instead of waiting as long as any
      process in that process group held the stdout/stderr file descriptors
      open. That change broke some scripts that relied on the previous
      behavior. Setting time limits for scripts (such as
      `PrologEpilogTimeout`) is strongly encouraged to avoid Slurm waiting
      indefinitely for scripts to finish.
    + Fix `slurmdbd -R` not returning an error under certain conditions.
    + `slurmdbd` - Avoid potential NULL pointer dereference in the mysql
      plugin.
    + Fix regression in 23.02.3 which broken X11 forwarding for hosts when
      MUNGE sends a localhost address in the encode host field. This is caused
      when the node hostname is mapped to 127.0.0.1 (or similar) in
      `/etc/hosts`.
    + `openapi/[db]v0.0.39` - fix memory leak on parsing error.
    + `data_parser/v0.0.39` - fix updating qos for associations.
    + `openapi/dbv0.0.39` - fix updating values for associations with null
      users.
    + Fix minor memory leak with `--tres-per-task` and licenses.
    + Fix cyclic socket cpu distribution for tasks in a step where
      `--cpus-per-task` &lt; usable threads per core.
    + `slurmrestd` - For `GET /slurm/v0.0.39/node[s]`, change format of
      node's energy field `current_watts` to a dictionary to account for
      unset value instead of dumping 4294967294.
    + `slurmrestd` - For `GET /slurm/v0.0.39/qos`, change format of QOS's
      field 'priority' to a dictionary to account for unset value instead of
      dumping 4294967294.
    + slurmrestd - For `GET /slurm/v0.0.39/job[s]`, the 'return code'
      code field in `v0.0.39_job_exit`_code will be set to -127 instead of
      being left unset where job does not have a relevant return code.

  * Other Changes:

    + Remove --uid / --gid options from salloc and srun commands. These options
      did not work correctly since the CVE-2022-29500 fix in combination with
      some changes made in 23.02.0.
    + Add the `JobId` to `debug()` messages indicating when
      `cpus_per_task/mem_per_cpu` or `pn_min_cpus` are being automatically
      adjusted.
    + Change the log message warning for rate limited users from verbose to
      info.
    + `slurmstepd` - Cleanup per task generated environment for containers in
      spooldir.
    + Format batch, extern, interactive, and pending step ids into strings that
      are human readable.
    + `slurmrestd` - Reduce memory usage when printing out job CPU frequency.
    + `data_parser/v0.0.39` - Add `required/memory_per_cpu` and
      `required/memory_per_node` to `sacct --json` and `sacct --yaml` and
      `GET /slurmdb/v0.0.39/jobs` from slurmrestd.
    + `gpu/oneapi` - Store cores correctly so CPU affinity is tracked.
    + Allow `slurmdbd -R` to work if the root assoc id is not 1.
    + Limit periodic node registrations to 50 instead of the full `TreeWidth`.
      Since unresolvable `cloud/dynamic` nodes must disable fanout by setting
      `TreeWidth` to a large number, this would cause all nodes to register at
      once.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-02"/>
	<updated date="2023-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215437">SUSE bug 1215437</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29500/">CVE-2022-29500 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29500">CVE-2022-29500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009808142" comment="libnss_slurm2-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808143" comment="libpmi0-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808144" comment="libslurm39-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808145" comment="perl-slurm-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808146" comment="slurm-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808147" comment="slurm-auth-none-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808148" comment="slurm-config-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808149" comment="slurm-config-man-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808150" comment="slurm-cray-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808151" comment="slurm-devel-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808152" comment="slurm-doc-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808153" comment="slurm-hdf5-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808154" comment="slurm-lua-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808155" comment="slurm-munge-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808156" comment="slurm-node-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808157" comment="slurm-openlava-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808158" comment="slurm-pam_slurm-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808159" comment="slurm-plugin-ext-sensors-rrd-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808161" comment="slurm-plugins-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808162" comment="slurm-rest-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808163" comment="slurm-seff-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808164" comment="slurm-sjstat-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808165" comment="slurm-slurmdbd-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808166" comment="slurm-sql-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808167" comment="slurm-sview-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808168" comment="slurm-testsuite-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808170" comment="slurm-torque-23.02.5-150500.5.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808171" comment="slurm-webdoc-23.02.5-150500.5.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4486" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211162" ref_url="https://bugzilla.suse.com/1211162" source="BUGZILLA"/>
		<reference ref_id="1211307" ref_url="https://bugzilla.suse.com/1211307" source="BUGZILLA"/>
		<reference ref_id="1213772" ref_url="https://bugzilla.suse.com/1213772" source="BUGZILLA"/>
		<reference ref_id="1214754" ref_url="https://bugzilla.suse.com/1214754" source="BUGZILLA"/>
		<reference ref_id="1214874" ref_url="https://bugzilla.suse.com/1214874" source="BUGZILLA"/>
		<reference ref_id="1215545" ref_url="https://bugzilla.suse.com/1215545" source="BUGZILLA"/>
		<reference ref_id="1215921" ref_url="https://bugzilla.suse.com/1215921" source="BUGZILLA"/>
		<reference ref_id="1215955" ref_url="https://bugzilla.suse.com/1215955" source="BUGZILLA"/>
		<reference ref_id="1216062" ref_url="https://bugzilla.suse.com/1216062" source="BUGZILLA"/>
		<reference ref_id="1216202" ref_url="https://bugzilla.suse.com/1216202" source="BUGZILLA"/>
		<reference ref_id="1216322" ref_url="https://bugzilla.suse.com/1216322" source="BUGZILLA"/>
		<reference ref_id="1216324" ref_url="https://bugzilla.suse.com/1216324" source="BUGZILLA"/>
		<reference ref_id="1216333" ref_url="https://bugzilla.suse.com/1216333" source="BUGZILLA"/>
		<reference ref_id="1216512" ref_url="https://bugzilla.suse.com/1216512" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2163" ref_url="https://www.suse.com/security/cve/CVE-2023-2163/" source="CVE"/>
		<reference ref_id="CVE-2023-2860" ref_url="https://www.suse.com/security/cve/CVE-2023-2860/" source="CVE"/>
		<reference ref_id="CVE-2023-31085" ref_url="https://www.suse.com/security/cve/CVE-2023-31085/" source="CVE"/>
		<reference ref_id="CVE-2023-34324" ref_url="https://www.suse.com/security/cve/CVE-2023-34324/" source="CVE"/>
		<reference ref_id="CVE-2023-39189" ref_url="https://www.suse.com/security/cve/CVE-2023-39189/" source="CVE"/>
		<reference ref_id="CVE-2023-39191" ref_url="https://www.suse.com/security/cve/CVE-2023-39191/" source="CVE"/>
		<reference ref_id="CVE-2023-39193" ref_url="https://www.suse.com/security/cve/CVE-2023-39193/" source="CVE"/>
		<reference ref_id="CVE-2023-45862" ref_url="https://www.suse.com/security/cve/CVE-2023-45862/" source="CVE"/>
		<reference ref_id="CVE-2023-5178" ref_url="https://www.suse.com/security/cve/CVE-2023-5178/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032578.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2023-31085: Fixed a divide-by-zero error in do_div(sz,mtd-&gt;erasesize) that could cause a local DoS. (bsc#1210778)
- CVE-2023-45862: Fixed an issue in the ENE UB6250 reader driver whwere an object could potentially extend beyond the end of an allocation causing. (bsc#1216051)
- CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860).
- CVE-2023-5178: Fixed an UAF in queue intialization setup.  (bsc#1215768)
- CVE-2023-2163: Fixed an incorrect verifier pruning in BPF that could lead to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape. (bsc#1215518)
- CVE-2023-34324: Fixed a possible deadlock in Linux kernel event handling. (bsc#1215745).
- CVE-2023-39189: Fixed a flaw in the Netfilter subsystem that could allow a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure. (bsc#1216046)
- CVE-2023-39191: Fixed a lack of validation of dynamic pointers within user-supplied eBPF programs that may have allowed an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code. (bsc#1215863)
- CVE-2023-2860: Fixed an out-of-bounds read vulnerability in the processing of seg6 attributes. This flaw allowed a privileged local user to disclose sensitive information. (bsc#1211592)

The following non-security bugs were fixed:

- 9p: virtio: make sure 'offs' is initialized in zc_request (git-fixes).
- ACPI: irq: Fix incorrect return value in acpi_register_gsi() (git-fixes).
- ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CBA (git-fixes).
- ALSA: hda/realtek - ALC287 I2S speaker platform support (git-fixes).
- ALSA: hda/realtek - ALC287 merge RTK codec with CS CS35L41 AMP (git-fixes).
- ALSA: hda/realtek - Fixed ASUS platform headset Mic issue (git-fixes).
- ALSA: hda/realtek - Fixed two speaker platform (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS ROG GU603ZV (git-fixes).
- ALSA: hda/realtek: Change model for Intel RVP board (git-fixes).
- ALSA: hda/relatek: Enable Mute LED on HP Laptop 15s-fq5xxx (git-fixes).
- ALSA: hda: Disable power save for solving pop issue on Lenovo ThinkCentre M70q (git-fixes).
- ALSA: hda: intel-dsp-cfg: add LunarLake support (git-fixes).
- ALSA: hda: intel-sdw-acpi: Use u8 type for link index (git-fixes).
- ALSA: usb-audio: Fix microphone sound on Nexigo webcam (git-fixes).
- ALSA: usb-audio: Fix microphone sound on Opencomm2 Headset (git-fixes).
- ASoC: amd: yc: Fix non-functional mic on Lenovo 82YM (git-fixes).
- ASoC: codecs: wcd938x-sdw: fix runtime PM imbalance on probe errors (git-fixes).
- ASoC: codecs: wcd938x-sdw: fix use after free on driver unbind (git-fixes).
- ASoC: codecs: wcd938x: drop bogus bind error handling (git-fixes).
- ASoC: codecs: wcd938x: fix unbind tear down order (git-fixes).
- ASoC: fsl: imx-pcm-rpmsg: Add SNDRV_PCM_INFO_BATCH flag (git-fixes).
- ASoC: imx-rpmsg: Set ignore_pmdown_time for dai_link (git-fixes).
- ASoC: pxa: fix a memory leak in probe() (git-fixes).
- Bluetooth: Avoid redundant authentication (git-fixes).
- Bluetooth: Fix a refcnt underflow problem for hci_conn (git-fixes).
- Bluetooth: ISO: Fix handling of listen for unicast (git-fixes).
- Bluetooth: Reject connection with the device which has same BD_ADDR (git-fixes).
- Bluetooth: avoid memcmp() out of bounds warning (git-fixes).
- Bluetooth: btusb: add shutdown function for QCA6174 (git-fixes).
- Bluetooth: hci_codec: Fix leaking content of local_codecs (git-fixes).
- Bluetooth: hci_event: Fix coding style (git-fixes).
- Bluetooth: hci_event: Fix using memcmp when comparing keys (git-fixes).
- Bluetooth: hci_event: Ignore NULL link key (git-fixes).
- Bluetooth: hci_sock: Correctly bounds check and pad HCI_MON_NEW_INDEX name (git-fixes).
- Bluetooth: hci_sock: fix slab oob read in create_monitor_event (git-fixes).
- Bluetooth: vhci: Fix race when opening vhci device (git-fixes).
- Documentation: qat: change kernel version (PED-6401).
- Documentation: qat: rewrite description (PED-6401).
- Drivers: hv: vmbus: Call hv_synic_free() if hv_synic_alloc() fails (git-fixes).
- Drivers: hv: vmbus: Fix vmbus_wait_for_unload() to scan present CPUs (git-fixes).
- Fix metadata references
- HID: holtek: fix slab-out-of-bounds Write in holtek_kbd_input_event (git-fixes).
- HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit (git-fixes).
- HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect (git-fixes).
- HID: multitouch: Add required quirk for Synaptics 0xcd7e device (git-fixes).
- HID: sony: Fix a potential memory leak in sony_probe() (git-fixes).
- HID: sony: remove duplicate NULL check before calling usb_free_urb() (git-fixes).
- IB/mlx4: Fix the size of a buffer in add_port_entries() (git-fixes)
- Input: goodix - ensure int GPIO is in input for gpio_count == 1 &amp;&amp; gpio_int_idx == 0 case (git-fixes).
- Input: powermate - fix use-after-free in powermate_config_complete (git-fixes).
- Input: psmouse - fix fast_reconnect function for PS/2 mode (git-fixes).
- Input: xpad - add PXN V900 support (git-fixes).
- KVM: SVM: Do not kill SEV guest if SMAP erratum triggers in usermode (git-fixes).
- KVM: SVM: INTERCEPT_RDTSCP is never intercepted anyway (git-fixes).
- KVM: s390: fix gisa destroy operation might lead to cpu stalls (git-fixes bsc#1216512).
- KVM: x86/mmu: Reconstruct shadow page root if the guest PDPTEs is changed (git-fixes).
- KVM: x86: Fix clang -Wimplicit-fallthrough in do_host_cpuid() (git-fixes).
- KVM: x86: Move open-coded CPUID leaf 0x80000021 EAX bit propagation code (bsc#1213772).
- KVM: x86: Propagate the AMD Automatic IBRS feature to the guest (bsc#1213772).
- KVM: x86: add support for CPUID leaf 0x80000021 (bsc#1213772).
- KVM: x86: synthesize CPUID leaf 0x80000021h if useful (bsc#1213772).
- KVM: x86: work around QEMU issue with synthetic CPUID leaves (git-fixes).
- NFS: Fix O_DIRECT locking issues (bsc#1211162).
- NFS: Fix a few more clear_bit() instances that need release semantics (bsc#1211162).
- NFS: Fix a potential data corruption (bsc#1211162).
- NFS: Fix a use after free in nfs_direct_join_group() (bsc#1211162).
- NFS: Fix error handling for O_DIRECT write scheduling (bsc#1211162).
- NFS: More O_DIRECT accounting fixes for error paths (bsc#1211162).
- NFS: More fixes for nfs_direct_write_reschedule_io() (bsc#1211162).
- NFS: Use the correct commit info in nfs_join_page_group() (bsc#1211162).
- NFSD: Never call nfsd_file_gc() in foreground paths (bsc#1215545).
- RDMA/cma: Fix truncation compilation warning in make_cma_ports (git-fixes)
- RDMA/cma: Initialize ib_sa_multicast structure to 0 when join (git-fixes)
- RDMA/core: Require admin capabilities to set system parameters (git-fixes)
- RDMA/cxgb4: Check skb value for failure to allocate (git-fixes)
- RDMA/mlx5: Fix NULL string error (git-fixes)
- RDMA/mlx5: Fix mutex unlocking on error flow for steering anchor creation (git-fixes)
- RDMA/siw: Fix connection failure handling (git-fixes)
- RDMA/srp: Do not call scsi_done() from srp_abort() (git-fixes)
- RDMA/uverbs: Fix typo of sizeof argument (git-fixes)
- Revert 'pinctrl: avoid unsafe code pattern in find_pinctrl()' (git-fixes).
- Revert 'tty: n_gsm: fix UAF in gsm_cleanup_mux' (git-fixes).
- USB: serial: option: add Fibocom to DELL custom modem FM101R-GL (git-fixes).
- USB: serial: option: add Telit LE910C4-WWX 0x1035 composition (git-fixes).
- USB: serial: option: add entry for Sierra EM9191 with new firmware (git-fixes).
- arm64/smmu: use TLBI ASID when invalidating entire range (bsc#1215921)
- ata: libata-core: Do not register PM operations for SAS ports (git-fixes).
- ata: libata-core: Fix ata_port_request_pm() locking (git-fixes).
- ata: libata-core: Fix port and device removal (git-fixes).
- ata: libata-sata: increase PMP SRST timeout to 10s (git-fixes).
- ata: libata-scsi: ignore reserved bits for REPORT SUPPORTED OPERATION CODES (git-fixes).
- blk-cgroup: Fix NULL deref caused by blkg_policy_data being installed before init (bsc#1216062).
- blk-cgroup: support to track if policy is online (bsc#1216062).
- bonding: Fix extraction of ports from the packet headers (bsc#1214754).
- bonding: Return pointer to data after pull on skb (bsc#1214754).
- bonding: do not assume skb mac_header is set (bsc#1214754).
- bpf: Add copy_map_value_long to copy to remote percpu memory (git-fixes).
- bpf: Add missing btf_put to register_btf_id_dtor_kfuncs (git-fixes).
- bpf: Add override check to kprobe multi link attach (git-fixes).
- bpf: Add zero_map_value to zero map value with special fields (git-fixes).
- bpf: Cleanup check_refcount_ok (git-fixes).
- bpf: Fix max stack depth check for async callbacks (git-fixes).
- bpf: Fix offset calculation error in __copy_map_value and zero_map_value (git-fixes).
- bpf: Fix ref_obj_id for dynptr data slices in verifier (git-fixes).
- bpf: Fix resetting logic for unreferenced kptrs (git-fixes).
- bpf: Fix subprog idx logic in check_max_stack_depth (git-fixes).
- bpf: Gate dynptr API behind CAP_BPF (git-fixes).
- bpf: Prevent decl_tag from being referenced in func_proto arg (git-fixes).
- bpf: Repeat check_max_stack_depth for async callbacks (git-fixes).
- bpf: Tighten ptr_to_btf_id checks (git-fixes).
- bpf: fix precision propagation verbose logging (git-fixes).
- bpf: prevent decl_tag from being referenced in func_proto (git-fixes).
- bpf: propagate precision across all frames, not just the last one (git-fixes).
- bpf: propagate precision in ALU/ALU64 operations (git-fixes).
- btf: Export bpf_dynptr definition (git-fixes).
- btrfs: do not start transaction for scrub if the fs is mounted read-only (bsc#1214874).
- bus: ti-sysc: Fix missing AM35xx SoC matching (git-fixes).
- bus: ti-sysc: Use fsleep() instead of usleep_range() in sysc_reset() (git-fixes).
- ceph: add base64 endcoding routines for encrypted names (jsc#SES-1880).
- ceph: add encryption support to writepage and writepages (jsc#SES-1880).
- ceph: add fscrypt ioctls and ceph.fscrypt.auth vxattr (jsc#SES-1880).
- ceph: add helpers for converting names for userland presentation (jsc#SES-1880).
- ceph: add infrastructure for file encryption and decryption (jsc#SES-1880).
- ceph: add new mount option to enable sparse reads (jsc#SES-1880).
- ceph: add object version support for sync read (jsc#SES-1880).
- ceph: add read/modify/write to ceph_sync_write (jsc#SES-1880).
- ceph: add some fscrypt guardrails (jsc#SES-1880).
- ceph: add support for encrypted snapshot names (jsc#SES-1880).
- ceph: add support to readdir for encrypted names (jsc#SES-1880).
- ceph: add truncate size handling support for fscrypt (jsc#SES-1880).
- ceph: align data in pages in ceph_sync_write (jsc#SES-1880).
- ceph: allow encrypting a directory while not having Ax caps (jsc#SES-1880).
- ceph: create symlinks with encrypted and base64-encoded targets (jsc#SES-1880).
- ceph: decode alternate_name in lease info (jsc#SES-1880).
- ceph: do not use special DIO path for encrypted inodes (jsc#SES-1880).
- ceph: drop messages from MDS when unmounting (jsc#SES-1880).
- ceph: encode encrypted name in ceph_mdsc_build_path and dentry release (jsc#SES-1880).
- ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1216322).
- ceph: fix type promotion bug on 32bit systems (bsc#1216324).
- ceph: fix updating i_truncate_pagecache_size for fscrypt (jsc#SES-1880).
- ceph: fscrypt_auth handling for ceph (jsc#SES-1880).
- ceph: handle fscrypt fields in cap messages from MDS (jsc#SES-1880).
- ceph: implement -o test_dummy_encryption mount option (jsc#SES-1880).
- ceph: invalidate pages when doing direct/sync writes (jsc#SES-1880).
- ceph: make ceph_fill_trace and ceph_get_name decrypt names (jsc#SES-1880).
- ceph: make ceph_msdc_build_path use ref-walk (jsc#SES-1880).
- ceph: make d_revalidate call fscrypt revalidator for encrypted dentries (jsc#SES-1880).
- ceph: make ioctl cmds more readable in debug log (jsc#SES-1880).
- ceph: make num_fwd and num_retry to __u32 (jsc#SES-1880).
- ceph: mark directory as non-complete after loading key (jsc#SES-1880).
- ceph: pass the request to parse_reply_info_readdir() (jsc#SES-1880).
- ceph: plumb in decryption during reads (jsc#SES-1880).
- ceph: preallocate inode for ops that may create one (jsc#SES-1880).
- ceph: prevent snapshot creation in encrypted locked directories (jsc#SES-1880).
- ceph: remove unnecessary check for NULL in parse_longname() (bsc#1216333).
- ceph: send alternate_name in MClientRequest (jsc#SES-1880).
- ceph: set DCACHE_NOKEY_NAME flag in ceph_lookup/atomic_open() (jsc#SES-1880).
- ceph: size handling in MClientRequest, cap updates and inode traces (jsc#SES-1880).
- ceph: switch ceph_lookup/atomic_open() to use new fscrypt helper (jsc#SES-1880).
- ceph: use osd_req_op_extent_osd_iter for netfs reads (jsc#SES-1880).
- ceph: voluntarily drop Xx caps for requests those touch parent mtime (jsc#SES-1880).
- ceph: wait for OSD requests' callbacks to finish when unmounting (jsc#SES-1880).
- cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem (bsc#1215955).
- cgroup: Remove duplicates in cgroup v1 tasks file (bsc#1211307).
- clk: tegra: fix error return case for recalc_rate (git-fixes).
- counter: microchip-tcb-capture: Fix the use of internal GCLK logic (git-fixes).
- crypto: qat - Include algapi.h for low-level Crypto API (PED-6401).
- crypto: qat - Remove unused function declarations (PED-6401).
- crypto: qat - add fw_counters debugfs file (PED-6401).
- crypto: qat - add heartbeat counters check (PED-6401).
- crypto: qat - add heartbeat feature (PED-6401).
- crypto: qat - add internal timer for qat 4xxx (PED-6401).
- crypto: qat - add measure clock frequency (PED-6401).
- crypto: qat - add missing function declaration in adf_dbgfs.h (PED-6401).
- crypto: qat - add qat_zlib_deflate (PED-6401).
- crypto: qat - add support for 402xx devices (PED-6401).
- crypto: qat - change value of default idle filter (PED-6401).
- crypto: qat - delay sysfs initialization (PED-6401).
- crypto: qat - do not export adf_init_admin_pm() (PED-6401).
- crypto: qat - drop log level of msg in get_instance_node() (PED-6401).
- crypto: qat - drop obsolete heartbeat interface (PED-6401).
- crypto: qat - drop redundant adf_enable_aer() (PED-6401).
- crypto: qat - expose pm_idle_enabled through sysfs (PED-6401).
- crypto: qat - extend buffer list logic interface (PED-6401).
- crypto: qat - extend configuration for 4xxx (PED-6401).
- crypto: qat - fix apply custom thread-service mapping for dc service (PED-6401).
- crypto: qat - fix concurrency issue when device state changes (PED-6401).
- crypto: qat - fix crypto capability detection for 4xxx (PED-6401).
- crypto: qat - fix spelling mistakes from 'bufer' to 'buffer' (PED-6401).
- crypto: qat - make fw images name constant (PED-6401).
- crypto: qat - make state machine functions static (PED-6401).
- crypto: qat - move dbgfs init to separate file (PED-6401).
- crypto: qat - move returns to default case (PED-6401).
- crypto: qat - refactor device restart logic (PED-6401).
- crypto: qat - refactor fw config logic for 4xxx (PED-6401).
- crypto: qat - remove ADF_STATUS_PF_RUNNING flag from probe (PED-6401).
- crypto: qat - replace state machine calls (PED-6401).
- crypto: qat - replace the if statement with min() (PED-6401).
- crypto: qat - set deprecated capabilities as reserved (PED-6401).
- crypto: qat - unmap buffer before free for DH (PED-6401).
- crypto: qat - unmap buffers before free for RSA (PED-6401).
- crypto: qat - update slice mask for 4xxx devices (PED-6401).
- crypto: qat - use kfree_sensitive instead of memset/kfree() (PED-6401).
- dmaengine: idxd: use spin_lock_irqsave before wait_event_lock_irq (git-fixes).
- dmaengine: mediatek: Fix deadlock caused by synchronize_irq() (git-fixes).
- dmaengine: stm32-mdma: abort resume if no ongoing transfer (git-fixes).
- drm/amd/display: Do not check registers, if using AUX BL control (git-fixes).
- drm/amd/display: Do not set dpms_off for seamless boot (git-fixes).
- drm/amd/pm: add unique_id for gc 11.0.3 (git-fixes).
- drm/amd: Fix detection of _PR3 on the PCIe root port (git-fixes).
- drm/amdgpu/nbio4.3: set proper rmmio_remap.reg_offset for SR-IOV (git-fixes).
- drm/amdgpu/soc21: do not remap HDP registers for SR-IOV (git-fixes).
- drm/amdgpu: Handle null atom context in VBIOS info ioctl (git-fixes).
- drm/amdgpu: add missing NULL check (git-fixes).
- drm/amdkfd: Flush TLB after unmapping for GFX v9.4.3 (git-fixes).
- drm/amdkfd: Insert missing TLB flush on GFX10 and later (git-fixes).
- drm/amdkfd: Use gpu_offset for user queue's wptr (git-fixes).
- drm/atomic-helper: relax unregistered connector check (git-fixes).
- drm/bridge: ti-sn65dsi83: Do not generate HFP/HBP/HSA and EOT packet (git-fixes).
- drm/i915/gt: Fix reservation address in ggtt_reserve_guc_top (git-fixes).
- drm/i915: Retry gtt fault when out of fence registers (git-fixes).
- drm/mediatek: Correctly free sg_table in gem prime vmap (git-fixes).
- drm/msm/dp: do not reinitialize phy unless retry during link training (git-fixes).
- drm/msm/dpu: change _dpu_plane_calc_bw() to use u64 to avoid overflow (git-fixes).
- drm/msm/dsi: fix irq_of_parse_and_map() error checking (git-fixes).
- drm/msm/dsi: skip the wait for video mode done if not applicable (git-fixes).
- drm/vmwgfx: fix typo of sizeof argument (git-fixes).
- drm: panel-orientation-quirks: Add quirk for One Mix 2S (git-fixes).
- firmware: arm_ffa: Do not set the memory region attributes for MEM_LEND (git-fixes).
- firmware: imx-dsp: Fix an error handling path in imx_dsp_setup_channels() (git-fixes).
- fprobe: Ensure running fprobe_exit_handler() finished before calling rethook_free() (git-fixes).
- fscrypt: new helper function - fscrypt_prepare_lookup_partial() (jsc#SES-1880).
- gpio: aspeed: fix the GPIO number passed to pinctrl_gpio_set_config() (git-fixes).
- gpio: pmic-eic-sprd: Add can_sleep flag for PMIC EIC chip (git-fixes).
- gpio: pxa: disable pinctrl calls for MMP_GPIO (git-fixes).
- gpio: tb10x: Fix an error handling path in tb10x_gpio_probe() (git-fixes).
- gpio: timberdale: Fix potential deadlock on &amp;tgpio-&gt;lock (git-fixes).
- gpio: vf610: set value before the direction to avoid a glitch (git-fixes).
- gve: Do not fully free QPL pages on prefill errors (git-fixes).
- i2c: i801: unregister tco_pdev in i801_probe() error path (git-fixes).
- i2c: mux: Avoid potential false error message in i2c_mux_add_adapter (git-fixes).
- i2c: mux: demux-pinctrl: check the return value of devm_kstrdup() (git-fixes).
- i2c: mux: gpio: Add missing fwnode_handle_put() (git-fixes).
- i2c: mux: gpio:?Replace custom acpi_get_local_address() (git-fixes).
- i2c: npcm7xx: Fix callback completion ordering (git-fixes).
- ieee802154: ca8210: Fix a potential UAF in ca8210_probe (git-fixes).
- iio: pressure: bmp280: Fix NULL pointer exception (git-fixes).
- iio: pressure: dps310: Adjust Timeout Settings (git-fixes).
- iio: pressure: ms5611: ms5611_prom_is_valid false negative bug (git-fixes).
- intel x86 platform vsec kABI workaround (bsc#1216202).
- io_uring/fs: remove sqe-&gt;rw_flags checking from LINKAT (git-fixes).
- io_uring/rw: defer fsnotify calls to task context (git-fixes).
- io_uring/rw: ensure kiocb_end_write() is always called (git-fixes).
- io_uring/rw: remove leftover debug statement (git-fixes).
- io_uring: Replace 0-length array with flexible array (git-fixes).
- io_uring: ensure REQ_F_ISREG is set async offload (git-fixes).
- io_uring: fix fdinfo sqe offsets calculation (git-fixes).
- io_uring: fix memory leak when removing provided buffers (git-fixes).
- iommu/amd/io-pgtable: Implement map_pages io_pgtable_ops callback (bsc#1212423).
- iommu/amd/io-pgtable: Implement unmap_pages io_pgtable_ops callback (bsc#1212423).
- iommu/amd: Add map/unmap_pages() iommu_domain_ops callback support (bsc#1212423).
- iommu/arm-smmu-v3: Fix soft lockup triggered by (bsc#1215921)
- kABI: fix bpf Tighten-ptr_to_btf_id checks (git-fixes).
- kabi: blkcg_policy_data fix KABI (bsc#1216062).
- kabi: workaround for enum nft_trans_phase (bsc#1215104).
- kprobes: Prohibit probing on CFI preamble symbol (git-fixes).
- leds: Drop BUG_ON check for LED_COLOR_ID_MULTI (git-fixes).
- libceph: add CEPH_OSD_OP_ASSERT_VER support (jsc#SES-1880).
- libceph: add new iov_iter-based ceph_msg_data_type and ceph_osd_data_type (jsc#SES-1880).
- libceph: add sparse read support to OSD client (jsc#SES-1880).
- libceph: add sparse read support to msgr1 (jsc#SES-1880).
- libceph: add spinlock around osd-&gt;o_requests (jsc#SES-1880).
- libceph: allow ceph_osdc_new_request to accept a multi-op read (jsc#SES-1880).
- libceph: define struct ceph_sparse_extent and add some helpers (jsc#SES-1880).
- libceph: new sparse_read op, support sparse reads on msgr2 crc codepath (jsc#SES-1880).
- libceph: support sparse reads on msgr2 secure codepath (jsc#SES-1880).
- libceph: use kernel_connect() (bsc#1216323).
- mm, memcg: reconsider kmem.limit_in_bytes deprecation (bsc#1208788 bsc#1213705).
- mmc: core: Capture correct oemid-bits for eMMC cards (git-fixes).
- mmc: core: sdio: hold retuning if sdio in 1-bit mode (git-fixes).
- mmc: mtk-sd: Use readl_poll_timeout_atomic in msdc_reset_hw (git-fixes).
- mtd: physmap-core: Restore map_rom fallback (git-fixes).
- mtd: rawnand: arasan: Ensure program page operations are successful (git-fixes).
- mtd: rawnand: marvell: Ensure program page operations are successful (git-fixes).
- mtd: rawnand: pl353: Ensure program page operations are successful (git-fixes).
- mtd: rawnand: qcom: Unmap the right resource upon probe failure (git-fixes).
- mtd: spinand: micron: correct bitmask for ecc status (git-fixes).
- net/sched: fix netdevice reference leaks in attach_default_qdiscs() (git-fixes).
- net: mana: Fix TX CQE error handling (bsc#1215986).
- net: mana: Fix oversized sge0 for GSO packets (bsc#1215986).
- net: nfc: llcp: Add lock when modifying device list (git-fixes).
- net: rfkill: gpio: prevent value glitch during probe (git-fixes).
- net: sched: add barrier to fix packet stuck problem for lockless qdisc (bsc#1216345).
- net: sched: fixed barrier to prevent skbuff sticking in qdisc backlog (bsc#1216345).
- net: usb: dm9601: fix uninitialized variable use in dm9601_mdio_read (git-fixes).
- net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg (git-fixes).
- net: usb: smsc95xx: Fix an error code in smsc95xx_reset() (git-fixes).
- net: use sk_is_tcp() in more places (git-fixes).
- netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound set/chain (git-fixes).
- netfilter: nf_tables: unbind non-anonymous set if rule construction fails (git-fixes).
- nfc: nci: assert requested protocol is valid (git-fixes).
- nfc: nci: fix possible NULL pointer dereference in send_acknowledge() (git-fixes).
- nfs: only issue commit in DIO codepath if we have uncommitted data (bsc#1211162).
- nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() (git-fixes).
- nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() (bsc#1214842).
- phy: mapphone-mdm6600: Fix pinctrl_pm handling for sleep pins (git-fixes).
- phy: mapphone-mdm6600: Fix runtime PM for remove (git-fixes).
- phy: mapphone-mdm6600: Fix runtime disable on probe (git-fixes).
- pinctrl: avoid unsafe code pattern in find_pinctrl() (git-fixes).
- pinctrl: renesas: rzn1: Enable missing PINMUX (git-fixes).
- platform/surface: platform_profile: Propagate error if profile registration fails (git-fixes).
- platform/x86/intel/pmt: Ignore uninitialized entries (bsc#1216202).
- platform/x86/intel/pmt: telemetry: Fix fixed region handling (bsc#1216202).
- platform/x86/intel/vsec: Rework early hardware code (bsc#1216202).
- platform/x86/intel: Fix 'rmmod pmt_telemetry' panic (bsc#1216202).
- platform/x86/intel: Fix pmt_crashlog array reference (bsc#1216202).
- platform/x86: asus-wmi: Change ASUS_WMI_BRN_DOWN code from 0x20 to 0x2e (git-fixes).
- platform/x86: asus-wmi: Map 0x2a code, Ignore 0x2b and 0x2c events (git-fixes).
- platform/x86: think-lmi: Fix reference leak (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Positivo C4128B (git-fixes).
- power: supply: ucs1002: fix error code in ucs1002_get_property() (git-fixes).
- r8152: check budget for r8152_poll() (git-fixes).
- regmap: fix NULL deref on lookup (git-fixes).
- regmap: rbtree: Fix wrong register marked as in-cache when creating new node (git-fixes).
- remove unnecessary WARN_ON_ONCE() (bsc#1214823).
- ring-buffer: Avoid softlockup in ring_buffer_resize() (git-fixes).
- ring-buffer: Do not attempt to read past 'commit' (git-fixes).
- ring-buffer: Fix bytes info in per_cpu buffer stats (git-fixes).
- ring-buffer: Update 'shortest_full' in polling (git-fixes).
- s390/cio: fix a memleak in css_alloc_subchannel (git-fixes bsc#1216510).
- s390/pci: fix iommu bitmap allocation (git-fixes bsc#1216511).
- s390: add z16 elf platform (git-fixes LTC#203789 bsc#1215956 LTC#203788 bsc#1215957).
- sched/cpuset: Bring back cpuset_mutex (bsc#1215955).
- sched/deadline,rt: Remove unused parameter from pick_next_[rt|dl]_entity() (git fixes (sched)).
- sched/rt: Fix live lock between select_fallback_rq() and RT push (git fixes (sched)).
- sched/rt: Fix sysctl_sched_rr_timeslice intial value (git fixes (sched)).
- scsi: be2iscsi: Add length check when parsing nlattrs (git-fixes).
- scsi: fcoe: Fix potential deadlock on &amp;fip-&gt;ctlr_lock (git-fixes).
- scsi: iscsi: Add length check for nlattr payload (git-fixes).
- scsi: iscsi: Add strlen() check in iscsi_if_set{_host}_param() (git-fixes).
- scsi: iscsi_tcp: restrict to TCP sockets (git-fixes).
- scsi: mpi3mr: Propagate sense data for admin queue SCSI I/O (git-fixes).
- scsi: mpt3sas: Perform additional retries if doorbell read returns 0 (git-fixes).
- scsi: pm8001: Setup IRQs on resume (git-fixes).
- scsi: qedf: Do not touch __user pointer in qedf_dbg_debug_cmd_read() directly (git-fixes).
- scsi: qedf: Do not touch __user pointer in qedf_dbg_fp_int_cmd_read() directly (git-fixes).
- scsi: qedf: Do not touch __user pointer in qedf_dbg_stop_io_on_error_cmd_read() directly (git-fixes).
- scsi: qedi: Fix potential deadlock on &amp;qedi_percpu-&gt;p_work_lock (git-fixes).
- scsi: qla4xxx: Add length check when parsing nlattrs (git-fixes).
- selftests/bpf: Add more tests for check_max_stack_depth bug (git-fixes).
- selftests/bpf: Add reproducer for decl_tag in func_proto argument (git-fixes).
- selftests/bpf: Add reproducer for decl_tag in func_proto return type (git-fixes).
- selftests/bpf: Add selftest for check_stack_max_depth bug (git-fixes).
- selftests/bpf: Clean up sys_nanosleep uses (git-fixes).
- serial: 8250_port: Check IRQ data before use (git-fixes).
- soc: imx8m: Enable OCOTP clock for imx8mm before reading registers (git-fixes).
- spi: nxp-fspi: reset the FLSHxCR1 registers (git-fixes).
- spi: stm32: add a delay before SPI disable (git-fixes).
- spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain (git-fixes).
- spi: sun6i: reduce DMA RX transfer width to single byte (git-fixes).
- thunderbolt: Check that lane 1 is in CL0 before enabling lane bonding (git-fixes).
- thunderbolt: Restart XDomain discovery handshake after failure (git-fixes).
- thunderbolt: Workaround an IOMMU fault on certain systems with Intel Maple Ridge (git-fixes).
- tracing: Have current_trace inc the trace array ref count (git-fixes).
- tracing: Have event inject files inc the trace array ref count (git-fixes).
- tracing: Have option files inc the trace array ref count (git-fixes).
- tracing: Have tracing_max_latency inc the trace array ref count (git-fixes).
- tracing: Increase trace array ref count on enable and filter files (git-fixes).
- tracing: Make trace_marker{,_raw} stream-like (git-fixes).
- usb: cdnsp: Fixes issue with dequeuing not queued requests (git-fixes).
- usb: dwc3: Soft reset phy on probe for host (git-fixes).
- usb: gadget: ncm: Handle decoding of multiple NTB's in unwrap call (git-fixes).
- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).
- usb: hub: Guard against accesses to uninitialized BOS descriptors (git-fixes).
- usb: musb: Get the musb_qh poniter after musb_giveback (git-fixes).
- usb: musb: Modify the 'HWVers' register address (git-fixes).
- usb: typec: altmodes/displayport: Signal hpd low when exiting mode (git-fixes).
- usb: typec: ucsi: Clear EVENT_PENDING bit if ucsi_send_command fails (git-fixes).
- usb: xhci: xhci-ring: Use sysdev for mapping bounce buffer (git-fixes).
- vmbus_testing: fix wrong python syntax for integer value comparison (git-fixes).
- vringh: do not use vringh_kiov_advance() in vringh_iov_xfer() (git-fixes).
- watchdog: iTCO_wdt: No need to stop the timer in probe (git-fixes).
- watchdog: iTCO_wdt: Set NO_REBOOT if the watchdog is not already running (git-fixes).
- wifi: cfg80211: Fix 6GHz scan configuration (git-fixes).
- wifi: cfg80211: avoid leaking stack data into trace (git-fixes).
- wifi: iwlwifi: Ensure ack flag is properly cleared (git-fixes).
- wifi: iwlwifi: dbg_ini: fix structure packing (git-fixes).
- wifi: iwlwifi: mvm: Fix a memory corruption issue (git-fixes).
- wifi: mac80211: allow transmitting EAPOL frames with tainted key (git-fixes).
- wifi: mt76: mt76x02: fix MT76x0 external LNA gain handling (git-fixes).
- wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet (git-fixes).
- wifi: mwifiex: Fix tlv_buf_left calculation (git-fixes).
- wifi: mwifiex: Sanity check tlv_len and tlv_bitmap_len (git-fixes).
- x86/cpu, kvm: Add the NO_NESTED_DATA_BP feature (bsc#1213772).
- x86/cpu, kvm: Add the Null Selector Clears Base feature (bsc#1213772).
- x86/cpu, kvm: Add the SMM_CTL MSR not present feature (bsc#1213772).
- x86/cpu, kvm: Move X86_FEATURE_LFENCE_RDTSC to its native leaf (bsc#1213772).
- x86/cpu: Enable STIBP on AMD if Automatic IBRS is enabled (bsc#1213772).
- x86/cpu: Support AMD Automatic IBRS (bsc#1213772).
- x86/mm: Print the encryption features correctly when a paravisor is present (bsc#1206453).
- x86/platform/uv: Use alternate source for socket to node data (bsc#1215696).
- x86/sev: Check IOBM for IOIO exceptions from user-space (bsc#1212649).
- x86/sev: Check for user-space IOIO pointing to kernel space (bsc#1212649).
- x86/sev: Disable MMIO emulation from user mode (bsc#1212649).
- xen-netback: use default TX queue size for vifs (git-fixes).
- xhci: Keep interrupt disabled in initialization until host is running (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-02"/>
	<updated date="2023-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211162">SUSE bug 1211162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211307">SUSE bug 1211307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213772">SUSE bug 1213772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214754">SUSE bug 1214754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214874">SUSE bug 1214874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215545">SUSE bug 1215545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215921">SUSE bug 1215921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215955">SUSE bug 1215955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216062">SUSE bug 1216062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216202">SUSE bug 1216202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216322">SUSE bug 1216322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216324">SUSE bug 1216324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216333">SUSE bug 1216333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216512">SUSE bug 1216512</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2163/">CVE-2023-2163 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2163">CVE-2023-2163 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-2860/">CVE-2023-2860 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2860">CVE-2023-2860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31085/">CVE-2023-31085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31085">CVE-2023-31085 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34324/">CVE-2023-34324 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34324">CVE-2023-34324 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39189/">CVE-2023-39189 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39189">CVE-2023-39189 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39191/">CVE-2023-39191 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39191">CVE-2023-39191 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39193/">CVE-2023-39193 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39193">CVE-2023-39193 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-45862/">CVE-2023-45862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45862">CVE-2023-45862 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5178/">CVE-2023-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5178">CVE-2023-5178 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009808492" comment="cluster-md-kmp-rt-5.14.21-150500.13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808493" comment="dlm-kmp-rt-5.14.21-150500.13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808494" comment="gfs2-kmp-rt-5.14.21-150500.13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808495" comment="kernel-devel-rt-5.14.21-150500.13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808496" comment="kernel-rt-5.14.21-150500.13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808497" comment="kernel-rt-devel-5.14.21-150500.13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808498" comment="kernel-rt-extra-5.14.21-150500.13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808499" comment="kernel-rt-livepatch-5.14.21-150500.13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808500" comment="kernel-rt-livepatch-devel-5.14.21-150500.13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808501" comment="kernel-rt-optional-5.14.21-150500.13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808502" comment="kernel-rt-vdso-5.14.21-150500.13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808503" comment="kernel-rt_debug-5.14.21-150500.13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808504" comment="kernel-rt_debug-devel-5.14.21-150500.13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808505" comment="kernel-rt_debug-livepatch-devel-5.14.21-150500.13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808506" comment="kernel-rt_debug-vdso-5.14.21-150500.13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808507" comment="kernel-source-rt-5.14.21-150500.13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808508" comment="kernel-syms-rt-5.14.21-150500.13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808509" comment="kselftests-kmp-rt-5.14.21-150500.13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808510" comment="ocfs2-kmp-rt-5.14.21-150500.13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808511" comment="reiserfs-kmp-rt-5.14.21-150500.13.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4487" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1208995" ref_url="https://bugzilla.suse.com/1208995" source="BUGZILLA"/>
		<reference ref_id="1210169" ref_url="https://bugzilla.suse.com/1210169" source="BUGZILLA"/>
		<reference ref_id="1210778" ref_url="https://bugzilla.suse.com/1210778" source="BUGZILLA"/>
		<reference ref_id="1212703" ref_url="https://bugzilla.suse.com/1212703" source="BUGZILLA"/>
		<reference ref_id="1214233" ref_url="https://bugzilla.suse.com/1214233" source="BUGZILLA"/>
		<reference ref_id="1214380" ref_url="https://bugzilla.suse.com/1214380" source="BUGZILLA"/>
		<reference ref_id="1214386" ref_url="https://bugzilla.suse.com/1214386" source="BUGZILLA"/>
		<reference ref_id="1215115" ref_url="https://bugzilla.suse.com/1215115" source="BUGZILLA"/>
		<reference ref_id="1215117" ref_url="https://bugzilla.suse.com/1215117" source="BUGZILLA"/>
		<reference ref_id="1215221" ref_url="https://bugzilla.suse.com/1215221" source="BUGZILLA"/>
		<reference ref_id="1215275" ref_url="https://bugzilla.suse.com/1215275" source="BUGZILLA"/>
		<reference ref_id="1215299" ref_url="https://bugzilla.suse.com/1215299" source="BUGZILLA"/>
		<reference ref_id="1215467" ref_url="https://bugzilla.suse.com/1215467" source="BUGZILLA"/>
		<reference ref_id="1215745" ref_url="https://bugzilla.suse.com/1215745" source="BUGZILLA"/>
		<reference ref_id="1215858" ref_url="https://bugzilla.suse.com/1215858" source="BUGZILLA"/>
		<reference ref_id="1215860" ref_url="https://bugzilla.suse.com/1215860" source="BUGZILLA"/>
		<reference ref_id="1215861" ref_url="https://bugzilla.suse.com/1215861" source="BUGZILLA"/>
		<reference ref_id="1216046" ref_url="https://bugzilla.suse.com/1216046" source="BUGZILLA"/>
		<reference ref_id="1216051" ref_url="https://bugzilla.suse.com/1216051" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36766" ref_url="https://www.suse.com/security/cve/CVE-2020-36766/" source="CVE"/>
		<reference ref_id="CVE-2023-1192" ref_url="https://www.suse.com/security/cve/CVE-2023-1192/" source="CVE"/>
		<reference ref_id="CVE-2023-1206" ref_url="https://www.suse.com/security/cve/CVE-2023-1206/" source="CVE"/>
		<reference ref_id="CVE-2023-1859" ref_url="https://www.suse.com/security/cve/CVE-2023-1859/" source="CVE"/>
		<reference ref_id="CVE-2023-31085" ref_url="https://www.suse.com/security/cve/CVE-2023-31085/" source="CVE"/>
		<reference ref_id="CVE-2023-34324" ref_url="https://www.suse.com/security/cve/CVE-2023-34324/" source="CVE"/>
		<reference ref_id="CVE-2023-39189" ref_url="https://www.suse.com/security/cve/CVE-2023-39189/" source="CVE"/>
		<reference ref_id="CVE-2023-39192" ref_url="https://www.suse.com/security/cve/CVE-2023-39192/" source="CVE"/>
		<reference ref_id="CVE-2023-39193" ref_url="https://www.suse.com/security/cve/CVE-2023-39193/" source="CVE"/>
		<reference ref_id="CVE-2023-39194" ref_url="https://www.suse.com/security/cve/CVE-2023-39194/" source="CVE"/>
		<reference ref_id="CVE-2023-40283" ref_url="https://www.suse.com/security/cve/CVE-2023-40283/" source="CVE"/>
		<reference ref_id="CVE-2023-42754" ref_url="https://www.suse.com/security/cve/CVE-2023-42754/" source="CVE"/>
		<reference ref_id="CVE-2023-45862" ref_url="https://www.suse.com/security/cve/CVE-2023-45862/" source="CVE"/>
		<reference ref_id="CVE-2023-4622" ref_url="https://www.suse.com/security/cve/CVE-2023-4622/" source="CVE"/>
		<reference ref_id="CVE-2023-4623" ref_url="https://www.suse.com/security/cve/CVE-2023-4623/" source="CVE"/>
		<reference ref_id="CVE-2023-4881" ref_url="https://www.suse.com/security/cve/CVE-2023-4881/" source="CVE"/>
		<reference ref_id="CVE-2023-4921" ref_url="https://www.suse.com/security/cve/CVE-2023-4921/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2023-31085: Fixed a divide-by-zero error in do_div(sz,mtd-&gt;erasesize) that could cause a local DoS. (bsc#1210778)
- CVE-2023-45862: Fixed an issue in the ENE UB6250 reader driver whwere an object could potentially extend beyond the end of an allocation causing. (bsc#1216051)
- CVE-2023-34324: Fixed a possible deadlock in Linux kernel event handling. (bsc#1215745).
- CVE-2023-39189: Fixed a flaw in the Netfilter subsystem that could allow a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure. (bsc#1216046)
- CVE-2023-39194: Fixed an out of bounds read in the XFRM subsystem (bsc#1215861).
- CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860).
- CVE-2023-39192: Fixed an out of bounds read in the netfilter (bsc#1215858).
- CVE-2023-42754: Fixed a NULL pointer dereference in the IPv4 stack that could lead to denial of service (bsc#1215467).
- CVE-2023-1206: Fixed a hash collision flaw in the IPv6 connection lookup table which could be exploited by network adjacent attackers, increasing CPU usage by 95% (bsc#1212703).
- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275).
- CVE-2023-4622: Fixed a use-after-free vulnerability in the Unix domain sockets component which could be exploited to achieve local privilege escalation (bsc#1215117).
- CVE-2023-4623: Fixed a use-after-free issue in the HFSC network scheduler which could be exploited to achieve local privilege escalation (bsc#1215115).
- CVE-2020-36766: Fixed a potential information leak in in the CEC driver (bsc#1215299).
- CVE-2023-1859: Fixed a use-after-free flaw in Xen transport for 9pfs which could be exploited to crash the system (bsc#1210169).
- CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221).
- CVE-2023-40283: Fixed use-after-free in l2cap_sock_ready_cb (bsc#1214233).
- CVE-2023-1192: Fixed use-after-free in cifs_demultiplex_thread() (bsc#1208995).

The following non-security bugs were fixed:

- check-for-config-changes: ignore BUILTIN_RETURN_ADDRESS_STRIPS_PAC (bsc#1214380). gcc7 on SLE 15 does not support this while later gcc does.
- mkspec: Allow unsupported KMPs (bsc#1214386)
- old-flavors: Drop 2.6 kernels. 2.6 based kernels are EOL, upgrading from them is no longer suported.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-02"/>
	<updated date="2023-11-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208995">SUSE bug 1208995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210169">SUSE bug 1210169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210778">SUSE bug 1210778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212703">SUSE bug 1212703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214233">SUSE bug 1214233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214380">SUSE bug 1214380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214386">SUSE bug 1214386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215115">SUSE bug 1215115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215117">SUSE bug 1215117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215221">SUSE bug 1215221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215275">SUSE bug 1215275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215299">SUSE bug 1215299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215467">SUSE bug 1215467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215745">SUSE bug 1215745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215858">SUSE bug 1215858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215860">SUSE bug 1215860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215861">SUSE bug 1215861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216046">SUSE bug 1216046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216051">SUSE bug 1216051</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-36766/">CVE-2020-36766 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36766">CVE-2020-36766 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1192/">CVE-2023-1192 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1192">CVE-2023-1192 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1206/">CVE-2023-1206 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1206">CVE-2023-1206 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1859/">CVE-2023-1859 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1859">CVE-2023-1859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31085/">CVE-2023-31085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31085">CVE-2023-31085 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34324/">CVE-2023-34324 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34324">CVE-2023-34324 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39189/">CVE-2023-39189 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39189">CVE-2023-39189 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39192/">CVE-2023-39192 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39192">CVE-2023-39192 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39193/">CVE-2023-39193 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39193">CVE-2023-39193 at NVD</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39194/">CVE-2023-39194 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39194">CVE-2023-39194 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40283/">CVE-2023-40283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40283">CVE-2023-40283 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42754/">CVE-2023-42754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42754">CVE-2023-42754 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-45862/">CVE-2023-45862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45862">CVE-2023-45862 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4622/">CVE-2023-4622 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4622">CVE-2023-4622 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4623/">CVE-2023-4623 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4881/">CVE-2023-4881 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4881">CVE-2023-4881 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4921/">CVE-2023-4921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4921">CVE-2023-4921 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009808406" comment="kernel-vanilla-4.12.14-150100.197.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808407" comment="kernel-vanilla-base-4.12.14-150100.197.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808408" comment="kernel-vanilla-devel-4.12.14-150100.197.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808409" comment="kernel-vanilla-livepatch-devel-4.12.14-150100.197.160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4488" version="1" class="patch">
	<metadata>
		<title>Security update for apache-ivy (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214422" ref_url="https://bugzilla.suse.com/1214422" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-46751" ref_url="https://www.suse.com/security/cve/CVE-2022-46751/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016994.html" source="SUSE-SU"/>
		<description>
This update for apache-ivy fixes the following issues:

- Upgrade to version 2.5.2 (bsc#1214422)
- CVE-2022-46751: Fixed an XML External Entity Injections that could be exploited to exfiltrate data, access resources only the machine running Ivy has access to or disturb the execution of Ivy in different ways. (bsc#1214422)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-05"/>
	<updated date="2023-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214422">SUSE bug 1214422</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-46751/">CVE-2022-46751 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46751">CVE-2022-46751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807731" comment="apache-ivy-2.5.2-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807732" comment="apache-ivy-javadoc-2.5.2-150200.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4489" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212535" ref_url="https://bugzilla.suse.com/1212535" source="BUGZILLA"/>
		<reference ref_id="1212881" ref_url="https://bugzilla.suse.com/1212881" source="BUGZILLA"/>
		<reference ref_id="1212883" ref_url="https://bugzilla.suse.com/1212883" source="BUGZILLA"/>
		<reference ref_id="1212888" ref_url="https://bugzilla.suse.com/1212888" source="BUGZILLA"/>
		<reference ref_id="1213273" ref_url="https://bugzilla.suse.com/1213273" source="BUGZILLA"/>
		<reference ref_id="1213274" ref_url="https://bugzilla.suse.com/1213274" source="BUGZILLA"/>
		<reference ref_id="1213589" ref_url="https://bugzilla.suse.com/1213589" source="BUGZILLA"/>
		<reference ref_id="1213590" ref_url="https://bugzilla.suse.com/1213590" source="BUGZILLA"/>
		<reference ref_id="1214574" ref_url="https://bugzilla.suse.com/1214574" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-18768" ref_url="https://www.suse.com/security/cve/CVE-2020-18768/" source="CVE"/>
		<reference ref_id="CVE-2023-25433" ref_url="https://www.suse.com/security/cve/CVE-2023-25433/" source="CVE"/>
		<reference ref_id="CVE-2023-26966" ref_url="https://www.suse.com/security/cve/CVE-2023-26966/" source="CVE"/>
		<reference ref_id="CVE-2023-2908" ref_url="https://www.suse.com/security/cve/CVE-2023-2908/" source="CVE"/>
		<reference ref_id="CVE-2023-3316" ref_url="https://www.suse.com/security/cve/CVE-2023-3316/" source="CVE"/>
		<reference ref_id="CVE-2023-3576" ref_url="https://www.suse.com/security/cve/CVE-2023-3576/" source="CVE"/>
		<reference ref_id="CVE-2023-3618" ref_url="https://www.suse.com/security/cve/CVE-2023-3618/" source="CVE"/>
		<reference ref_id="CVE-2023-38288" ref_url="https://www.suse.com/security/cve/CVE-2023-38288/" source="CVE"/>
		<reference ref_id="CVE-2023-38289" ref_url="https://www.suse.com/security/cve/CVE-2023-38289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017000.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2023-38289: Fixed a NULL pointer dereference in raw2tiff
  (bsc#1213589).
- CVE-2023-38288: Fixed an integer overflow in raw2tiff (bsc#1213590).
- CVE-2023-3576: Fixed a memory leak in tiffcrop (bsc#1213273).
- CVE-2020-18768: Fixed an out of bounds read in tiffcp (bsc#1214574).
- CVE-2023-26966: Fixed an out of bounds read when transforming a
  little-endian file to a big-endian output (bsc#1212881)
- CVE-2023-3618: Fixed a NULL pointer dereference while encoding FAX3
  files (bsc#1213274).
- CVE-2023-2908: Fixed an undefined behavior issue when doing pointer
  arithmetic on a NULL pointer (bsc#1212888).
- CVE-2023-3316: Fixed a NULL pointer dereference while opening a file
  in an inaccessible path (bsc#1212535).
- CVE-2023-25433: Fixed a buffer overflow in tiffcrop (bsc#1212883).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-06"/>
	<updated date="2023-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212535">SUSE bug 1212535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212881">SUSE bug 1212881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212883">SUSE bug 1212883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212888">SUSE bug 1212888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213273">SUSE bug 1213273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213274">SUSE bug 1213274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213589">SUSE bug 1213589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213590">SUSE bug 1213590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214574">SUSE bug 1214574</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-18768/">CVE-2020-18768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18768">CVE-2020-18768 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25433/">CVE-2023-25433 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25433">CVE-2023-25433 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-26966/">CVE-2023-26966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26966">CVE-2023-26966 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2908/">CVE-2023-2908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2908">CVE-2023-2908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3316/">CVE-2023-3316 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3316">CVE-2023-3316 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3576/">CVE-2023-3576 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3576">CVE-2023-3576 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3618/">CVE-2023-3618 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3618">CVE-2023-3618 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38288/">CVE-2023-38288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38288">CVE-2023-38288 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38289/">CVE-2023-38289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38289">CVE-2023-38289 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807726" comment="libtiff-devel-4.0.9-150000.45.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807727" comment="libtiff-devel-32bit-4.0.9-150000.45.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807728" comment="libtiff5-4.0.9-150000.45.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807729" comment="libtiff5-32bit-4.0.9-150000.45.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807730" comment="tiff-4.0.9-150000.45.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4490" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1208788" ref_url="https://bugzilla.suse.com/1208788" source="BUGZILLA"/>
		<reference ref_id="1211162" ref_url="https://bugzilla.suse.com/1211162" source="BUGZILLA"/>
		<reference ref_id="1211307" ref_url="https://bugzilla.suse.com/1211307" source="BUGZILLA"/>
		<reference ref_id="1212423" ref_url="https://bugzilla.suse.com/1212423" source="BUGZILLA"/>
		<reference ref_id="1212649" ref_url="https://bugzilla.suse.com/1212649" source="BUGZILLA"/>
		<reference ref_id="1213705" ref_url="https://bugzilla.suse.com/1213705" source="BUGZILLA"/>
		<reference ref_id="1213772" ref_url="https://bugzilla.suse.com/1213772" source="BUGZILLA"/>
		<reference ref_id="1214754" ref_url="https://bugzilla.suse.com/1214754" source="BUGZILLA"/>
		<reference ref_id="1214874" ref_url="https://bugzilla.suse.com/1214874" source="BUGZILLA"/>
		<reference ref_id="1215095" ref_url="https://bugzilla.suse.com/1215095" source="BUGZILLA"/>
		<reference ref_id="1215104" ref_url="https://bugzilla.suse.com/1215104" source="BUGZILLA"/>
		<reference ref_id="1215523" ref_url="https://bugzilla.suse.com/1215523" source="BUGZILLA"/>
		<reference ref_id="1215545" ref_url="https://bugzilla.suse.com/1215545" source="BUGZILLA"/>
		<reference ref_id="1215921" ref_url="https://bugzilla.suse.com/1215921" source="BUGZILLA"/>
		<reference ref_id="1215955" ref_url="https://bugzilla.suse.com/1215955" source="BUGZILLA"/>
		<reference ref_id="1215986" ref_url="https://bugzilla.suse.com/1215986" source="BUGZILLA"/>
		<reference ref_id="1216062" ref_url="https://bugzilla.suse.com/1216062" source="BUGZILLA"/>
		<reference ref_id="1216202" ref_url="https://bugzilla.suse.com/1216202" source="BUGZILLA"/>
		<reference ref_id="1216322" ref_url="https://bugzilla.suse.com/1216322" source="BUGZILLA"/>
		<reference ref_id="1216323" ref_url="https://bugzilla.suse.com/1216323" source="BUGZILLA"/>
		<reference ref_id="1216324" ref_url="https://bugzilla.suse.com/1216324" source="BUGZILLA"/>
		<reference ref_id="1216333" ref_url="https://bugzilla.suse.com/1216333" source="BUGZILLA"/>
		<reference ref_id="1216345" ref_url="https://bugzilla.suse.com/1216345" source="BUGZILLA"/>
		<reference ref_id="1216512" ref_url="https://bugzilla.suse.com/1216512" source="BUGZILLA"/>
		<reference ref_id="1216621" ref_url="https://bugzilla.suse.com/1216621" source="BUGZILLA"/>
		<reference ref_id="802154" ref_url="https://bugzilla.suse.com/802154" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2163" ref_url="https://www.suse.com/security/cve/CVE-2023-2163/" source="CVE"/>
		<reference ref_id="CVE-2023-31085" ref_url="https://www.suse.com/security/cve/CVE-2023-31085/" source="CVE"/>
		<reference ref_id="CVE-2023-34324" ref_url="https://www.suse.com/security/cve/CVE-2023-34324/" source="CVE"/>
		<reference ref_id="CVE-2023-3777" ref_url="https://www.suse.com/security/cve/CVE-2023-3777/" source="CVE"/>
		<reference ref_id="CVE-2023-39189" ref_url="https://www.suse.com/security/cve/CVE-2023-39189/" source="CVE"/>
		<reference ref_id="CVE-2023-39191" ref_url="https://www.suse.com/security/cve/CVE-2023-39191/" source="CVE"/>
		<reference ref_id="CVE-2023-39193" ref_url="https://www.suse.com/security/cve/CVE-2023-39193/" source="CVE"/>
		<reference ref_id="CVE-2023-46813" ref_url="https://www.suse.com/security/cve/CVE-2023-46813/" source="CVE"/>
		<reference ref_id="CVE-2023-5178" ref_url="https://www.suse.com/security/cve/CVE-2023-5178/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2023-3777: Fixed a use-after-free vulnerability in netfilter: nf_tables component can be exploited to achieve local privilege escalation. (bsc#1215095)
- CVE-2023-46813: Fixed a local privilege escalation with user-space programs that have access to MMIO regions (bsc#1212649).
- CVE-2023-31085: Fixed a divide-by-zero error in do_div(sz,mtd-&gt;erasesize) that could cause a local DoS. (bsc#1210778)
- CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860).
- CVE-2023-5178: Fixed an use-after-free and a double-free flaw that could allow a malicious user to execute a remote code execution. (bsc#1215768)
- CVE-2023-2163: Fixed an incorrect verifier pruning in BPF that could lead to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape. (bsc#1215518)
- CVE-2023-34324: Fixed a possible deadlock in Linux kernel event handling. (bsc#1215745).
- CVE-2023-39189: Fixed a flaw in the Netfilter subsystem that could allow a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure. (bsc#1216046)
- CVE-2023-39191: Fixed a lack of validation of dynamic pointers within user-supplied eBPF programs that may have allowed an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code. (bsc#1215863)

The following non-security bugs were fixed:

- 9p: virtio: make sure 'offs' is initialized in zc_request (git-fixes).
- ACPI: irq: Fix incorrect return value in acpi_register_gsi() (git-fixes).
- ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CBA (git-fixes).
- ALSA: hda/realtek - ALC287 I2S speaker platform support (git-fixes).
- ALSA: hda/realtek - ALC287 merge RTK codec with CS CS35L41 AMP (git-fixes).
- ALSA: hda/realtek - Fixed ASUS platform headset Mic issue (git-fixes).
- ALSA: hda/realtek - Fixed two speaker platform (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS ROG GU603ZV (git-fixes).
- ALSA: hda/realtek: Change model for Intel RVP board (git-fixes).
- ALSA: hda/relatek: Enable Mute LED on HP Laptop 15s-fq5xxx (git-fixes).
- ALSA: hda: Disable power save for solving pop issue on Lenovo ThinkCentre M70q (git-fixes).
- ALSA: hda: intel-dsp-cfg: add LunarLake support (git-fixes).
- ALSA: hda: intel-sdw-acpi: Use u8 type for link index (git-fixes).
- ALSA: usb-audio: Fix microphone sound on Nexigo webcam (git-fixes).
- ALSA: usb-audio: Fix microphone sound on Opencomm2 Headset (git-fixes).
- ASoC: amd: yc: Fix non-functional mic on Lenovo 82YM (git-fixes).
- ASoC: codecs: wcd938x-sdw: fix runtime PM imbalance on probe errors (git-fixes).
- ASoC: codecs: wcd938x-sdw: fix use after free on driver unbind (git-fixes).
- ASoC: codecs: wcd938x: drop bogus bind error handling (git-fixes).
- ASoC: codecs: wcd938x: fix unbind tear down order (git-fixes).
- ASoC: fsl: imx-pcm-rpmsg: Add SNDRV_PCM_INFO_BATCH flag (git-fixes).
- ASoC: imx-rpmsg: Set ignore_pmdown_time for dai_link (git-fixes).
- ASoC: pxa: fix a memory leak in probe() (git-fixes).
- Bluetooth: Avoid redundant authentication (git-fixes).
- Bluetooth: Fix a refcnt underflow problem for hci_conn (git-fixes).
- Bluetooth: ISO: Fix handling of listen for unicast (git-fixes).
- Bluetooth: Reject connection with the device which has same BD_ADDR (git-fixes).
- Bluetooth: avoid memcmp() out of bounds warning (git-fixes).
- Bluetooth: btusb: add shutdown function for QCA6174 (git-fixes).
- Bluetooth: hci_codec: Fix leaking content of local_codecs (git-fixes).
- Bluetooth: hci_event: Fix coding style (git-fixes).
- Bluetooth: hci_event: Fix using memcmp when comparing keys (git-fixes).
- Bluetooth: hci_event: Ignore NULL link key (git-fixes).
- Bluetooth: hci_sock: Correctly bounds check and pad HCI_MON_NEW_INDEX name (git-fixes).
- Bluetooth: hci_sock: fix slab oob read in create_monitor_event (git-fixes).
- Bluetooth: vhci: Fix race when opening vhci device (git-fixes).
- Documentation: qat: change kernel version (PED-6401).
- Documentation: qat: rewrite description (PED-6401).
- Drivers: hv: vmbus: Call hv_synic_free() if hv_synic_alloc() fails (git-fixes).
- Drivers: hv: vmbus: Fix vmbus_wait_for_unload() to scan present CPUs (git-fixes).
- HID: holtek: fix slab-out-of-bounds Write in holtek_kbd_input_event (git-fixes).
- HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit (git-fixes).
- HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect (git-fixes).
- HID: multitouch: Add required quirk for Synaptics 0xcd7e device (git-fixes).
- HID: sony: Fix a potential memory leak in sony_probe() (git-fixes).
- HID: sony: remove duplicate NULL check before calling usb_free_urb() (git-fixes).
- IB/mlx4: Fix the size of a buffer in add_port_entries() (git-fixes)
- Input: goodix - ensure int GPIO is in input for gpio_count == 1 &amp;&amp; gpio_int_idx == 0 case (git-fixes).
- Input: powermate - fix use-after-free in powermate_config_complete (git-fixes).
- Input: psmouse - fix fast_reconnect function for PS/2 mode (git-fixes).
- Input: xpad - add PXN V900 support (git-fixes).
- KVM: SVM: Do not kill SEV guest if SMAP erratum triggers in usermode (git-fixes).
- KVM: SVM: INTERCEPT_RDTSCP is never intercepted anyway (git-fixes).
- KVM: s390: fix gisa destroy operation might lead to cpu stalls (git-fixes bsc#1216512).
- KVM: x86/mmu: Reconstruct shadow page root if the guest PDPTEs is changed (git-fixes).
- KVM: x86: Fix clang -Wimplicit-fallthrough in do_host_cpuid() (git-fixes).
- KVM: x86: Move open-coded CPUID leaf 0x80000021 EAX bit propagation code (bsc#1213772).
- KVM: x86: Propagate the AMD Automatic IBRS feature to the guest (bsc#1213772).
- KVM: x86: add support for CPUID leaf 0x80000021 (bsc#1213772).
- KVM: x86: synthesize CPUID leaf 0x80000021h if useful (bsc#1213772).
- KVM: x86: work around QEMU issue with synthetic CPUID leaves (git-fixes).
- NFS: Fix O_DIRECT locking issues (bsc#1211162).
- NFS: Fix a few more clear_bit() instances that need release semantics (bsc#1211162).
- NFS: Fix a potential data corruption (bsc#1211162).
- NFS: Fix a use after free in nfs_direct_join_group() (bsc#1211162).
- NFS: Fix error handling for O_DIRECT write scheduling (bsc#1211162).
- NFS: More O_DIRECT accounting fixes for error paths (bsc#1211162).
- NFS: More fixes for nfs_direct_write_reschedule_io() (bsc#1211162).
- NFS: Use the correct commit info in nfs_join_page_group() (bsc#1211162).
- NFS: only issue commit in DIO codepath if we have uncommitted data (bsc#1211162).
- NFSD: Never call nfsd_file_gc() in foreground paths (bsc#1215545).
- RDMA/cma: Fix truncation compilation warning in make_cma_ports (git-fixes)
- RDMA/cma: Initialize ib_sa_multicast structure to 0 when join (git-fixes)
- RDMA/core: Require admin capabilities to set system parameters (git-fixes)
- RDMA/cxgb4: Check skb value for failure to allocate (git-fixes)
- RDMA/mlx5: Fix NULL string error (git-fixes)
- RDMA/mlx5: Fix mutex unlocking on error flow for steering anchor creation (git-fixes)
- RDMA/siw: Fix connection failure handling (git-fixes)
- RDMA/srp: Do not call scsi_done() from srp_abort() (git-fixes)
- RDMA/uverbs: Fix typo of sizeof argument (git-fixes)
- arm64/smmu: use TLBI ASID when invalidating entire range (bsc#1215921)
- ata: libata-core: Do not register PM operations for SAS ports (git-fixes).
- ata: libata-core: Fix ata_port_request_pm() locking (git-fixes).
- ata: libata-core: Fix port and device removal (git-fixes).
- ata: libata-sata: increase PMP SRST timeout to 10s (git-fixes).
- ata: libata-scsi: ignore reserved bits for REPORT SUPPORTED OPERATION CODES (git-fixes).
- blk-cgroup: Fix NULL deref caused by blkg_policy_data being installed before init (bsc#1216062).
- blk-cgroup: support to track if policy is online (bsc#1216062).
- bonding: Fix extraction of ports from the packet headers (bsc#1214754).
- bonding: Return pointer to data after pull on skb (bsc#1214754).
- bonding: do not assume skb mac_header is set (bsc#1214754).
- bpf: Add copy_map_value_long to copy to remote percpu memory (git-fixes).
- bpf: Add missing btf_put to register_btf_id_dtor_kfuncs (git-fixes).
- bpf: Add override check to kprobe multi link attach (git-fixes).
- bpf: Add zero_map_value to zero map value with special fields (git-fixes).
- bpf: Cleanup check_refcount_ok (git-fixes).
- bpf: Fix max stack depth check for async callbacks (git-fixes).
- bpf: Fix offset calculation error in __copy_map_value and zero_map_value (git-fixes).
- bpf: Fix ref_obj_id for dynptr data slices in verifier (git-fixes).
- bpf: Fix resetting logic for unreferenced kptrs (git-fixes).
- bpf: Fix subprog idx logic in check_max_stack_depth (git-fixes).
- bpf: Gate dynptr API behind CAP_BPF (git-fixes).
- bpf: Prevent decl_tag from being referenced in func_proto arg (git-fixes).
- bpf: Repeat check_max_stack_depth for async callbacks (git-fixes).
- bpf: Tighten ptr_to_btf_id checks (git-fixes).
- bpf: fix precision propagation verbose logging (git-fixes).
- bpf: prevent decl_tag from being referenced in func_proto (git-fixes).
- bpf: propagate precision across all frames, not just the last one (git-fixes).
- bpf: propagate precision in ALU/ALU64 operations (git-fixes).
- bpf: propagate precision in ALU/ALU64 operations (git-fixes).
- btf: Export bpf_dynptr definition (git-fixes).
- btrfs: do not start transaction for scrub if the fs is mounted read-only (bsc#1214874).
- bus: ti-sysc: Fix missing AM35xx SoC matching (git-fixes).
- bus: ti-sysc: Use fsleep() instead of usleep_range() in sysc_reset() (git-fixes).
- ceph: add base64 endcoding routines for encrypted names (jsc#SES-1880).
- ceph: add encryption support to writepage and writepages (jsc#SES-1880).
- ceph: add fscrypt ioctls and ceph.fscrypt.auth vxattr (jsc#SES-1880).
- ceph: add helpers for converting names for userland presentation (jsc#SES-1880).
- ceph: add infrastructure for file encryption and decryption (jsc#SES-1880).
- ceph: add new mount option to enable sparse reads (jsc#SES-1880).
- ceph: add object version support for sync read (jsc#SES-1880).
- ceph: add read/modify/write to ceph_sync_write (jsc#SES-1880).
- ceph: add some fscrypt guardrails (jsc#SES-1880).
- ceph: add support for encrypted snapshot names (jsc#SES-1880).
- ceph: add support to readdir for encrypted names (jsc#SES-1880).
- ceph: add truncate size handling support for fscrypt (jsc#SES-1880).
- ceph: align data in pages in ceph_sync_write (jsc#SES-1880).
- ceph: allow encrypting a directory while not having Ax caps (jsc#SES-1880).
- ceph: create symlinks with encrypted and base64-encoded targets (jsc#SES-1880).
- ceph: decode alternate_name in lease info (jsc#SES-1880).
- ceph: do not use special DIO path for encrypted inodes (jsc#SES-1880).
- ceph: drop messages from MDS when unmounting (jsc#SES-1880).
- ceph: encode encrypted name in ceph_mdsc_build_path and dentry release (jsc#SES-1880).
- ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1216322).
- ceph: fix type promotion bug on 32bit systems (bsc#1216324).
- ceph: fix updating i_truncate_pagecache_size for fscrypt (jsc#SES-1880).
- ceph: fscrypt_auth handling for ceph (jsc#SES-1880).
- ceph: handle fscrypt fields in cap messages from MDS (jsc#SES-1880).
- ceph: implement -o test_dummy_encryption mount option (jsc#SES-1880).
- ceph: invalidate pages when doing direct/sync writes (jsc#SES-1880).
- ceph: make ceph_fill_trace and ceph_get_name decrypt names (jsc#SES-1880).
- ceph: make ceph_msdc_build_path use ref-walk (jsc#SES-1880).
- ceph: make d_revalidate call fscrypt revalidator for encrypted dentries (jsc#SES-1880).
- ceph: make ioctl cmds more readable in debug log (jsc#SES-1880).
- ceph: make num_fwd and num_retry to __u32 (jsc#SES-1880).
- ceph: mark directory as non-complete after loading key (jsc#SES-1880).
- ceph: pass the request to parse_reply_info_readdir() (jsc#SES-1880).
- ceph: plumb in decryption during reads (jsc#SES-1880).
- ceph: preallocate inode for ops that may create one (jsc#SES-1880).
- ceph: prevent snapshot creation in encrypted locked directories (jsc#SES-1880).
- ceph: remove unnecessary check for NULL in parse_longname() (bsc#1216333).
- ceph: send alternate_name in MClientRequest (jsc#SES-1880).
- ceph: set DCACHE_NOKEY_NAME flag in ceph_lookup/atomic_open() (jsc#SES-1880).
- ceph: size handling in MClientRequest, cap updates and inode traces (jsc#SES-1880).
- ceph: switch ceph_lookup/atomic_open() to use new fscrypt helper (jsc#SES-1880).
- ceph: use osd_req_op_extent_osd_iter for netfs reads (jsc#SES-1880).
- ceph: voluntarily drop Xx caps for requests those touch parent mtime (jsc#SES-1880).
- ceph: wait for OSD requests' callbacks to finish when unmounting (jsc#SES-1880).
- cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem (bsc#1215955).
- cgroup: Remove duplicates in cgroup v1 tasks file (bsc#1211307).
- clk: tegra: fix error return case for recalc_rate (git-fixes).
- counter: microchip-tcb-capture: Fix the use of internal GCLK logic (git-fixes).
- crypto: qat - Include algapi.h for low-level Crypto API (PED-6401).
- crypto: qat - Remove unused function declarations (PED-6401).
- crypto: qat - add fw_counters debugfs file (PED-6401).
- crypto: qat - add heartbeat counters check (PED-6401).
- crypto: qat - add heartbeat feature (PED-6401).
- crypto: qat - add internal timer for qat 4xxx (PED-6401).
- crypto: qat - add measure clock frequency (PED-6401).
- crypto: qat - add missing function declaration in adf_dbgfs.h (PED-6401).
- crypto: qat - add qat_zlib_deflate (PED-6401).
- crypto: qat - add support for 402xx devices (PED-6401).
- crypto: qat - change value of default idle filter (PED-6401).
- crypto: qat - delay sysfs initialization (PED-6401).
- crypto: qat - do not export adf_init_admin_pm() (PED-6401).
- crypto: qat - drop log level of msg in get_instance_node() (PED-6401).
- crypto: qat - drop obsolete heartbeat interface (PED-6401).
- crypto: qat - drop redundant adf_enable_aer() (PED-6401).
- crypto: qat - expose pm_idle_enabled through sysfs (PED-6401).
- crypto: qat - extend buffer list logic interface (PED-6401).
- crypto: qat - extend configuration for 4xxx (PED-6401).
- crypto: qat - fix apply custom thread-service mapping for dc service (PED-6401).
- crypto: qat - fix concurrency issue when device state changes (PED-6401).
- crypto: qat - fix crypto capability detection for 4xxx (PED-6401).
- crypto: qat - fix spelling mistakes from 'bufer' to 'buffer' (PED-6401).
- crypto: qat - make fw images name constant (PED-6401).
- crypto: qat - make state machine functions static (PED-6401).
- crypto: qat - move dbgfs init to separate file (PED-6401).
- crypto: qat - move returns to default case (PED-6401).
- crypto: qat - refactor device restart logic (PED-6401).
- crypto: qat - refactor fw config logic for 4xxx (PED-6401).
- crypto: qat - remove ADF_STATUS_PF_RUNNING flag from probe (PED-6401).
- crypto: qat - replace state machine calls (PED-6401).
- crypto: qat - replace the if statement with min() (PED-6401).
- crypto: qat - set deprecated capabilities as reserved (PED-6401).
- crypto: qat - unmap buffer before free for DH (PED-6401).
- crypto: qat - unmap buffers before free for RSA (PED-6401).
- crypto: qat - update slice mask for 4xxx devices (PED-6401).
- crypto: qat - use kfree_sensitive instead of memset/kfree() (PED-6401).
- dmaengine: idxd: use spin_lock_irqsave before wait_event_lock_irq (git-fixes).
- dmaengine: mediatek: Fix deadlock caused by synchronize_irq() (git-fixes).
- dmaengine: stm32-mdma: abort resume if no ongoing transfer (git-fixes).
- drm/amd/display: Do not check registers, if using AUX BL control (git-fixes).
- drm/amd/display: Do not set dpms_off for seamless boot (git-fixes).
- drm/amd/pm: add unique_id for gc 11.0.3 (git-fixes).
- drm/amd: Fix detection of _PR3 on the PCIe root port (git-fixes).
- drm/amdgpu/nbio4.3: set proper rmmio_remap.reg_offset for SR-IOV (git-fixes).
- drm/amdgpu/soc21: do not remap HDP registers for SR-IOV (git-fixes).
- drm/amdgpu: Handle null atom context in VBIOS info ioctl (git-fixes).
- drm/amdgpu: add missing NULL check (git-fixes).
- drm/amdkfd: Flush TLB after unmapping for GFX v9.4.3 (git-fixes).
- drm/amdkfd: Insert missing TLB flush on GFX10 and later (git-fixes).
- drm/amdkfd: Use gpu_offset for user queue's wptr (git-fixes).
- drm/atomic-helper: relax unregistered connector check (git-fixes).
- drm/bridge: ti-sn65dsi83: Do not generate HFP/HBP/HSA and EOT packet (git-fixes).
- drm/i915/gt: Fix reservation address in ggtt_reserve_guc_top (git-fixes).
- drm/i915/pmu: Check if pmu is closed before stopping event (git-fixes).
- drm/i915: Retry gtt fault when out of fence registers (git-fixes).
- drm/mediatek: Correctly free sg_table in gem prime vmap (git-fixes).
- drm/msm/dp: do not reinitialize phy unless retry during link training (git-fixes).
- drm/msm/dpu: change _dpu_plane_calc_bw() to use u64 to avoid overflow (git-fixes).
- drm/msm/dsi: fix irq_of_parse_and_map() error checking (git-fixes).
- drm/msm/dsi: skip the wait for video mode done if not applicable (git-fixes).
- drm/vmwgfx: fix typo of sizeof argument (git-fixes).
- drm: panel-orientation-quirks: Add quirk for One Mix 2S (git-fixes).
- firmware/imx-dsp: Fix use_after_free in imx_dsp_setup_channels() (git-fixes).
- firmware: arm_ffa: Do not set the memory region attributes for MEM_LEND (git-fixes).
- firmware: imx-dsp: Fix an error handling path in imx_dsp_setup_channels() (git-fixes).
- fix x86/mm: print the encryption features in hyperv is disabled
- fprobe: Ensure running fprobe_exit_handler() finished before calling rethook_free() (git-fixes).
- fscrypt: new helper function - fscrypt_prepare_lookup_partial() (jsc#SES-1880).
- gpio: aspeed: fix the GPIO number passed to pinctrl_gpio_set_config() (git-fixes).
- gpio: pmic-eic-sprd: Add can_sleep flag for PMIC EIC chip (git-fixes).
- gpio: pxa: disable pinctrl calls for MMP_GPIO (git-fixes).
- gpio: tb10x: Fix an error handling path in tb10x_gpio_probe() (git-fixes).
- gpio: timberdale: Fix potential deadlock on &amp;tgpio-&gt;lock (git-fixes).
- gpio: vf610: set value before the direction to avoid a glitch (git-fixes).
- gve: Do not fully free QPL pages on prefill errors (git-fixes).
- i2c: aspeed: Fix i2c bus hang in slave read (git-fixes).
- i2c: i801: unregister tco_pdev in i801_probe() error path (git-fixes).
- i2c: mux: Avoid potential false error message in i2c_mux_add_adapter (git-fixes).
- i2c: mux: demux-pinctrl: check the return value of devm_kstrdup() (git-fixes).
- i2c: mux: gpio: Add missing fwnode_handle_put() (git-fixes).
- i2c: mux: gpio:?Replace custom acpi_get_local_address() (git-fixes).
- i2c: muxes: i2c-demux-pinctrl: Use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-gpmux: Use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-pinctrl: Use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: npcm7xx: Fix callback completion ordering (git-fixes).
- i2c: stm32f7: Fix PEC handling in case of SMBUS transfers (git-fixes).
- ieee802154: ca8210: Fix a potential UAF in ca8210_probe (git-fixes).
- iio: adc: xilinx-xadc: Correct temperature offset/scale for UltraScale (git-fixes).
- iio: adc: xilinx-xadc: Do not clobber preset voltage/temperature thresholds (git-fixes).
- iio: exynos-adc: request second interupt only when touchscreen mode is used (git-fixes).
- iio: pressure: bmp280: Fix NULL pointer exception (git-fixes).
- iio: pressure: dps310: Adjust Timeout Settings (git-fixes).
- iio: pressure: ms5611: ms5611_prom_is_valid false negative bug (git-fixes).
- intel x86 platform vsec kABI workaround (bsc#1216202).
- io_uring/fs: remove sqe-&gt;rw_flags checking from LINKAT (git-fixes).
- io_uring/rw: defer fsnotify calls to task context (git-fixes).
- io_uring/rw: ensure kiocb_end_write() is always called (git-fixes).
- io_uring/rw: remove leftover debug statement (git-fixes).
- io_uring: Replace 0-length array with flexible array (git-fixes).
- io_uring: ensure REQ_F_ISREG is set async offload (git-fixes).
- io_uring: fix fdinfo sqe offsets calculation (git-fixes).
- io_uring: fix memory leak when removing provided buffers (git-fixes).
- iommu/amd/io-pgtable: Implement map_pages io_pgtable_ops callback (bsc#1212423).
- iommu/amd/io-pgtable: Implement unmap_pages io_pgtable_ops callback (bsc#1212423).
- iommu/amd: Add map/unmap_pages() iommu_domain_ops callback support (bsc#1212423).
- iommu/arm-smmu-v3: Fix soft lockup triggered by (bsc#1215921)
- kABI: fix bpf Tighten-ptr_to_btf_id checks (git-fixes).
- kabi: blkcg_policy_data fix KABI (bsc#1216062).
- kabi: workaround for enum nft_trans_phase (bsc#1215104).
- kprobes: Prohibit probing on CFI preamble symbol (git-fixes).
- leds: Drop BUG_ON check for LED_COLOR_ID_MULTI (git-fixes).
- libceph: add CEPH_OSD_OP_ASSERT_VER support (jsc#SES-1880).
- libceph: add new iov_iter-based ceph_msg_data_type and ceph_osd_data_type (jsc#SES-1880).
- libceph: add sparse read support to OSD client (jsc#SES-1880).
- libceph: add sparse read support to msgr1 (jsc#SES-1880).
- libceph: add spinlock around osd-&gt;o_requests (jsc#SES-1880).
- libceph: allow ceph_osdc_new_request to accept a multi-op read (jsc#SES-1880).
- libceph: define struct ceph_sparse_extent and add some helpers (jsc#SES-1880).
- libceph: new sparse_read op, support sparse reads on msgr2 crc codepath (jsc#SES-1880).
- libceph: support sparse reads on msgr2 secure codepath (jsc#SES-1880).
- libceph: use kernel_connect() (bsc#1216323).
- misc: fastrpc: Clean buffers on remote invocation failures (git-fixes).
- mm, memcg: reconsider kmem.limit_in_bytes deprecation (bsc#1208788 bsc#1213705).
- mmc: core: Capture correct oemid-bits for eMMC cards (git-fixes).
- mmc: core: sdio: hold retuning if sdio in 1-bit mode (git-fixes).
- mmc: mtk-sd: Use readl_poll_timeout_atomic in msdc_reset_hw (git-fixes).
- mtd: physmap-core: Restore map_rom fallback (git-fixes).
- mtd: rawnand: arasan: Ensure program page operations are successful (git-fixes).
- mtd: rawnand: marvell: Ensure program page operations are successful (git-fixes).
- mtd: rawnand: pl353: Ensure program page operations are successful (git-fixes).
- mtd: rawnand: qcom: Unmap the right resource upon probe failure (git-fixes).
- mtd: spinand: micron: correct bitmask for ecc status (git-fixes).
- net/sched: fix netdevice reference leaks in attach_default_qdiscs() (git-fixes).
- net: ieee802154: adf7242: Fix some potential buffer overflow in adf7242_stats_show() (git-fixes).
- net: mana: Fix TX CQE error handling (bsc#1215986).
- net: mana: Fix oversized sge0 for GSO packets (bsc#1215986).
- net: nfc: llcp: Add lock when modifying device list (git-fixes).
- net: rfkill: gpio: prevent value glitch during probe (git-fixes).
- net: sched: add barrier to fix packet stuck problem for lockless qdisc (bsc#1216345).
- net: sched: fixed barrier to prevent skbuff sticking in qdisc backlog (bsc#1216345).
- net: usb: dm9601: fix uninitialized variable use in dm9601_mdio_read (git-fixes).
- net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg (git-fixes).
- net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg (git-fixes).
- net: usb: smsc95xx: Fix an error code in smsc95xx_reset() (git-fixes).
- net: usb: smsc95xx: Fix uninit-value access in smsc95xx_read_reg (git-fixes).
- net: use sk_is_tcp() in more places (git-fixes).
- netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound set/chain (git-fixes).
- netfilter: nf_tables: unbind non-anonymous set if rule construction fails (git-fixes).
- nfc: nci: assert requested protocol is valid (git-fixes).
- nfc: nci: fix possible NULL pointer dereference in send_acknowledge() (git-fixes).
- nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() (git-fixes).
- nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() (bsc#1214842).
- phy: mapphone-mdm6600: Fix pinctrl_pm handling for sleep pins (git-fixes).
- phy: mapphone-mdm6600: Fix runtime PM for remove (git-fixes).
- phy: mapphone-mdm6600: Fix runtime disable on probe (git-fixes).
- pinctrl: avoid unsafe code pattern in find_pinctrl() (git-fixes).
- pinctrl: renesas: rzn1: Enable missing PINMUX (git-fixes).
- platform/surface: platform_profile: Propagate error if profile registration fails (git-fixes).
- platform/x86/intel/pmt: Ignore uninitialized entries (bsc#1216202).
- platform/x86/intel/pmt: telemetry: Fix fixed region handling (bsc#1216202).
- platform/x86/intel/vsec: Rework early hardware code (bsc#1216202).
- platform/x86/intel: Fix 'rmmod pmt_telemetry' panic (bsc#1216202).
- platform/x86/intel: Fix pmt_crashlog array reference (bsc#1216202).
- platform/x86: asus-wmi: Change ASUS_WMI_BRN_DOWN code from 0x20 to 0x2e (git-fixes).
- platform/x86: asus-wmi: Map 0x2a code, Ignore 0x2b and 0x2c events (git-fixes).
- platform/x86: think-lmi: Fix reference leak (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Positivo C4128B (git-fixes).
- power: supply: ucs1002: fix error code in ucs1002_get_property() (git-fixes).
- quota: Fix slow quotaoff (bsc#1216621).
- r8152: Cancel hw_phy_work if we have an error in probe (git-fixes).
- r8152: Increase USB control msg timeout to 5000ms as per spec (git-fixes).
- r8152: Release firmware if we have an error in probe (git-fixes).
- r8152: Run the unload routine if we have errors during probe (git-fixes).
- r8152: check budget for r8152_poll() (git-fixes).
- regmap: fix NULL deref on lookup (git-fixes).
- regmap: rbtree: Fix wrong register marked as in-cache when creating new node (git-fixes).
- ring-buffer: Avoid softlockup in ring_buffer_resize() (git-fixes).
- ring-buffer: Do not attempt to read past 'commit' (git-fixes).
- ring-buffer: Fix bytes info in per_cpu buffer stats (git-fixes).
- ring-buffer: Update 'shortest_full' in polling (git-fixes).
- s390/cio: fix a memleak in css_alloc_subchannel (git-fixes bsc#1216510).
- s390/pci: fix iommu bitmap allocation (git-fixes bsc#1216511).
- s390: add z16 elf platform (git-fixes LTC#203789 bsc#1215956 LTC#203788 bsc#1215957).
- sched/cpuset: Bring back cpuset_mutex (bsc#1215955).
- sched/deadline,rt: Remove unused parameter from pick_next_[rt|dl]_entity() (git fixes (sched)).
- sched/rt: Fix live lock between select_fallback_rq() and RT push (git fixes (sched)).
- sched/rt: Fix sysctl_sched_rr_timeslice intial value (git fixes (sched)).
- scsi: be2iscsi: Add length check when parsing nlattrs (git-fixes).
- scsi: fcoe: Fix potential deadlock on &amp;fip-&gt;ctlr_lock (git-fixes).
- scsi: iscsi: Add length check for nlattr payload (git-fixes).
- scsi: iscsi: Add strlen() check in iscsi_if_set{_host}_param() (git-fixes).
- scsi: iscsi_tcp: restrict to TCP sockets (git-fixes).
- scsi: mpi3mr: Propagate sense data for admin queue SCSI I/O (git-fixes).
- scsi: mpt3sas: Perform additional retries if doorbell read returns 0 (git-fixes).
- scsi: pm8001: Setup IRQs on resume (git-fixes).
- scsi: qedf: Do not touch __user pointer in qedf_dbg_debug_cmd_read() directly (git-fixes).
- scsi: qedf: Do not touch __user pointer in qedf_dbg_fp_int_cmd_read() directly (git-fixes).
- scsi: qedf: Do not touch __user pointer in qedf_dbg_stop_io_on_error_cmd_read() directly (git-fixes).
- scsi: qedi: Fix potential deadlock on &amp;qedi_percpu-&gt;p_work_lock (git-fixes).
- scsi: qla4xxx: Add length check when parsing nlattrs (git-fixes).
- selftests/bpf: Add more tests for check_max_stack_depth bug (git-fixes).
- selftests/bpf: Add reproducer for decl_tag in func_proto argument (git-fixes).
- selftests/bpf: Add reproducer for decl_tag in func_proto return type (git-fixes).
- selftests/bpf: Add selftest for check_stack_max_depth bug (git-fixes).
- selftests/bpf: Clean up sys_nanosleep uses (git-fixes).
- serial: 8250_port: Check IRQ data before use (git-fixes).
- soc: imx8m: Enable OCOTP clock for imx8mm before reading registers (git-fixes).
- spi: nxp-fspi: reset the FLSHxCR1 registers (git-fixes).
- spi: stm32: add a delay before SPI disable (git-fixes).
- spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain (git-fixes).
- spi: sun6i: reduce DMA RX transfer width to single byte (git-fixes).
- thunderbolt: Check that lane 1 is in CL0 before enabling lane bonding (git-fixes).
- thunderbolt: Restart XDomain discovery handshake after failure (git-fixes).
- thunderbolt: Workaround an IOMMU fault on certain systems with Intel Maple Ridge (git-fixes).
- tracing: Have current_trace inc the trace array ref count (git-fixes).
- tracing: Have event inject files inc the trace array ref count (git-fixes).
- tracing: Have option files inc the trace array ref count (git-fixes).
- tracing: Have tracing_max_latency inc the trace array ref count (git-fixes).
- tracing: Increase trace array ref count on enable and filter files (git-fixes).
- tracing: Make trace_marker{,_raw} stream-like (git-fixes).
- treewide: Spelling fix in comment (git-fixes).
- usb: cdnsp: Fixes issue with dequeuing not queued requests (git-fixes).
- usb: dwc3: Soft reset phy on probe for host (git-fixes).
- usb: gadget: ncm: Handle decoding of multiple NTB's in unwrap call (git-fixes).
- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).
- usb: hub: Guard against accesses to uninitialized BOS descriptors (git-fixes).
- usb: musb: Get the musb_qh poniter after musb_giveback (git-fixes).
- usb: musb: Modify the 'HWVers' register address (git-fixes).
- usb: serial: option: add Fibocom to DELL custom modem FM101R-GL (git-fixes).
- usb: serial: option: add Telit LE910C4-WWX 0x1035 composition (git-fixes).
- usb: serial: option: add entry for Sierra EM9191 with new firmware (git-fixes).
- usb: typec: altmodes/displayport: Signal hpd low when exiting mode (git-fixes).
- usb: typec: ucsi: Clear EVENT_PENDING bit if ucsi_send_command fails (git-fixes).
- usb: xhci: xhci-ring: Use sysdev for mapping bounce buffer (git-fixes).
- vmbus_testing: fix wrong python syntax for integer value comparison (git-fixes).
- vringh: do not use vringh_kiov_advance() in vringh_iov_xfer() (git-fixes).
- watchdog: iTCO_wdt: No need to stop the timer in probe (git-fixes).
- watchdog: iTCO_wdt: Set NO_REBOOT if the watchdog is not already running (git-fixes).
- wifi: cfg80211: Fix 6GHz scan configuration (git-fixes).
- wifi: cfg80211: avoid leaking stack data into trace (git-fixes).
- wifi: iwlwifi: Ensure ack flag is properly cleared (git-fixes).
- wifi: iwlwifi: dbg_ini: fix structure packing (git-fixes).
- wifi: iwlwifi: mvm: Fix a memory corruption issue (git-fixes).
- wifi: mac80211: allow transmitting EAPOL frames with tainted key (git-fixes).
- wifi: mt76: mt76x02: fix MT76x0 external LNA gain handling (git-fixes).
- wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet (git-fixes).
- wifi: mwifiex: Fix tlv_buf_left calculation (git-fixes).
- wifi: mwifiex: Sanity check tlv_len and tlv_bitmap_len (git-fixes).
- x86/cpu, kvm: Add the NO_NESTED_DATA_BP feature (bsc#1213772).
- x86/cpu, kvm: Add the Null Selector Clears Base feature (bsc#1213772).
- x86/cpu, kvm: Add the SMM_CTL MSR not present feature (bsc#1213772).
- x86/cpu, kvm: Move X86_FEATURE_LFENCE_RDTSC to its native leaf (bsc#1213772).
- x86/cpu: Enable STIBP on AMD if Automatic IBRS is enabled (bsc#1213772).
- x86/cpu: Support AMD Automatic IBRS (bsc#1213772).
- x86/mm: Print the encryption features correctly when a paravisor is present (bsc#1206453).
- x86/platform/uv: Use alternate source for socket to node data (bsc#1215696).
- x86/sev: Check IOBM for IOIO exceptions from user-space (bsc#1212649).
- x86/sev: Check for user-space IOIO pointing to kernel space (bsc#1212649).
- x86/sev: Disable MMIO emulation from user mode (bsc#1212649).
- x86/sev: Make enc_dec_hypercall() accept a size instead of npages (bsc#1214635).
- xen-netback: use default TX queue size for vifs (git-fixes).
- xhci: Keep interrupt disabled in initialization until host is running (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-06"/>
	<updated date="2023-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208788">SUSE bug 1208788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211162">SUSE bug 1211162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211307">SUSE bug 1211307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212423">SUSE bug 1212423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212649">SUSE bug 1212649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213705">SUSE bug 1213705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213772">SUSE bug 1213772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214754">SUSE bug 1214754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214874">SUSE bug 1214874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215095">SUSE bug 1215095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215104">SUSE bug 1215104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215523">SUSE bug 1215523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215545">SUSE bug 1215545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215921">SUSE bug 1215921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215955">SUSE bug 1215955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215986">SUSE bug 1215986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216062">SUSE bug 1216062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216202">SUSE bug 1216202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216322">SUSE bug 1216322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216323">SUSE bug 1216323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216324">SUSE bug 1216324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216333">SUSE bug 1216333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216345">SUSE bug 1216345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216512">SUSE bug 1216512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216621">SUSE bug 1216621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/802154">SUSE bug 802154</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2163/">CVE-2023-2163 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2163">CVE-2023-2163 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31085/">CVE-2023-31085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31085">CVE-2023-31085 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34324/">CVE-2023-34324 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34324">CVE-2023-34324 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3777/">CVE-2023-3777 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3777">CVE-2023-3777 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39189/">CVE-2023-39189 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39189">CVE-2023-39189 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39191/">CVE-2023-39191 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39191">CVE-2023-39191 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39193/">CVE-2023-39193 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39193">CVE-2023-39193 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-46813/">CVE-2023-46813 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46813">CVE-2023-46813 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5178/">CVE-2023-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5178">CVE-2023-5178 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009808425" comment="cluster-md-kmp-64kb-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808426" comment="cluster-md-kmp-default-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808427" comment="dlm-kmp-64kb-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808428" comment="dlm-kmp-default-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808429" comment="dtb-allwinner-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808430" comment="dtb-altera-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808431" comment="dtb-amazon-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808432" comment="dtb-amd-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808433" comment="dtb-amlogic-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808434" comment="dtb-apm-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808435" comment="dtb-apple-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808436" comment="dtb-arm-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808437" comment="dtb-broadcom-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808438" comment="dtb-cavium-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808439" comment="dtb-exynos-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808440" comment="dtb-freescale-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808441" comment="dtb-hisilicon-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808442" comment="dtb-lg-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808443" comment="dtb-marvell-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808444" comment="dtb-mediatek-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808445" comment="dtb-nvidia-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808446" comment="dtb-qcom-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808447" comment="dtb-renesas-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808448" comment="dtb-rockchip-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808449" comment="dtb-socionext-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808450" comment="dtb-sprd-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808451" comment="dtb-xilinx-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808452" comment="gfs2-kmp-64kb-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808453" comment="gfs2-kmp-default-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808454" comment="kernel-64kb-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808455" comment="kernel-64kb-devel-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808456" comment="kernel-64kb-extra-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808457" comment="kernel-64kb-livepatch-devel-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808458" comment="kernel-64kb-optional-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808459" comment="kernel-debug-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808460" comment="kernel-debug-devel-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808461" comment="kernel-debug-livepatch-devel-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808462" comment="kernel-debug-vdso-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808463" comment="kernel-default-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808464" comment="kernel-default-base-5.14.21-150500.55.36.1.150500.6.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808465" comment="kernel-default-base-rebuild-5.14.21-150500.55.36.1.150500.6.15.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808466" comment="kernel-default-devel-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808467" comment="kernel-default-extra-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808468" comment="kernel-default-livepatch-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808469" comment="kernel-default-livepatch-devel-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808470" comment="kernel-default-optional-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808471" comment="kernel-default-vdso-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808472" comment="kernel-devel-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808473" comment="kernel-docs-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808474" comment="kernel-docs-html-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808475" comment="kernel-kvmsmall-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808476" comment="kernel-kvmsmall-devel-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808477" comment="kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808478" comment="kernel-kvmsmall-vdso-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808479" comment="kernel-macros-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808480" comment="kernel-obs-build-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808481" comment="kernel-obs-qa-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808482" comment="kernel-source-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808483" comment="kernel-source-vanilla-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808484" comment="kernel-syms-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808485" comment="kernel-zfcpdump-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808486" comment="kselftests-kmp-64kb-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808487" comment="kselftests-kmp-default-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808488" comment="ocfs2-kmp-64kb-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808489" comment="ocfs2-kmp-default-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808490" comment="reiserfs-kmp-64kb-5.14.21-150500.55.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808491" comment="reiserfs-kmp-default-5.14.21-150500.55.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4491" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216495" ref_url="https://bugzilla.suse.com/1216495" source="BUGZILLA"/>
		<reference ref_id="1216498" ref_url="https://bugzilla.suse.com/1216498" source="BUGZILLA"/>
		<reference ref_id="1216500" ref_url="https://bugzilla.suse.com/1216500" source="BUGZILLA"/>
		<reference ref_id="1216803" ref_url="https://bugzilla.suse.com/1216803" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46724" ref_url="https://www.suse.com/security/cve/CVE-2023-46724/" source="CVE"/>
		<reference ref_id="CVE-2023-46846" ref_url="https://www.suse.com/security/cve/CVE-2023-46846/" source="CVE"/>
		<reference ref_id="CVE-2023-46847" ref_url="https://www.suse.com/security/cve/CVE-2023-46847/" source="CVE"/>
		<reference ref_id="CVE-2023-46848" ref_url="https://www.suse.com/security/cve/CVE-2023-46848/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017003.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2023-46846: Request/Response smuggling in HTTP/1.1 and ICAP (bsc#1216500).
- CVE-2023-46847: Denial of Service in HTTP Digest Authentication (bsc#1216495).
- CVE-2023-46724: Fix validation of certificates with CN=* (bsc#1216803).
- CVE-2023-46848: Denial of Service in FTP (bsc#1216498).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-06"/>
	<updated date="2023-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216495">SUSE bug 1216495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216498">SUSE bug 1216498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216500">SUSE bug 1216500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216803">SUSE bug 1216803</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46724/">CVE-2023-46724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46724">CVE-2023-46724 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46846/">CVE-2023-46846 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46846">CVE-2023-46846 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46847/">CVE-2023-46847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46847">CVE-2023-46847 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46848/">CVE-2023-46848 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46848">CVE-2023-46848 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808388" comment="squid-5.7-150400.3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4492" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213293" ref_url="https://bugzilla.suse.com/1213293" source="BUGZILLA"/>
		<reference ref_id="1213518" ref_url="https://bugzilla.suse.com/1213518" source="BUGZILLA"/>
		<reference ref_id="1214477" ref_url="https://bugzilla.suse.com/1214477" source="BUGZILLA"/>
		<reference ref_id="1215157" ref_url="https://bugzilla.suse.com/1215157" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-34049" ref_url="https://www.suse.com/security/cve/CVE-2023-34049/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017014.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

Security issues fixed:

- CVE-2023-34049: arbitrary code execution via symlink attack (bsc#1215157)

Bugs fixed:

- Fix optimization_order opt to prevent testsuite fails
- Improve salt.utils.json.find_json to avoid fails (bsc#1213293)
- Use salt-call from salt bundle with transactional_update
- Only call native_str on curl_debug message in tornado when needed
- Implement the calling for batch async from the salt CLI
- Fix calculation of SLS context vars when trailing dots
  on targetted sls/state (bsc#1213518)
- Rename salt-tests to python3-salt-testsuite
- Allow all primitive grain types for autosign_grains (bsc#1214477)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-09"/>
	<updated date="2023-11-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213293">SUSE bug 1213293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213518">SUSE bug 1213518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214477">SUSE bug 1214477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215157">SUSE bug 1215157</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34049/">CVE-2023-34049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-34049">CVE-2023-34049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009809131" comment="python3-salt-3006.0-150500.4.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809132" comment="salt-3006.0-150500.4.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809133" comment="salt-api-3006.0-150500.4.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809134" comment="salt-bash-completion-3006.0-150500.4.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809135" comment="salt-cloud-3006.0-150500.4.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809136" comment="salt-doc-3006.0-150500.4.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809137" comment="salt-fish-completion-3006.0-150500.4.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809138" comment="salt-master-3006.0-150500.4.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809139" comment="salt-minion-3006.0-150500.4.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809140" comment="salt-proxy-3006.0-150500.4.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809141" comment="salt-ssh-3006.0-150500.4.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809142" comment="salt-standalone-formulas-configuration-3006.0-150500.4.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809143" comment="salt-syndic-3006.0-150500.4.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809144" comment="salt-transactional-update-3006.0-150500.4.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809145" comment="salt-zsh-completion-3006.0-150500.4.24.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4493" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213293" ref_url="https://bugzilla.suse.com/1213293" source="BUGZILLA"/>
		<reference ref_id="1213518" ref_url="https://bugzilla.suse.com/1213518" source="BUGZILLA"/>
		<reference ref_id="1214477" ref_url="https://bugzilla.suse.com/1214477" source="BUGZILLA"/>
		<reference ref_id="1215157" ref_url="https://bugzilla.suse.com/1215157" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-34049" ref_url="https://www.suse.com/security/cve/CVE-2023-34049/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017012.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

Security issues fixed:

- CVE-2023-34049: arbitrary code execution via symlink attack (bsc#1215157)

Bugs fixed:

- Fix optimization_order opt to prevent testsuite fails
- Improve salt.utils.json.find_json to avoid fails (bsc#1213293)
- Use salt-call from salt bundle with transactional_update
- Only call native_str on curl_debug message in tornado when needed
- Implement the calling for batch async from the salt CLI
- Fix calculation of SLS context vars when trailing dots
  on targetted sls/state (bsc#1213518)
- Rename salt-tests to python3-salt-testsuite
- Allow all primitive grain types for autosign_grains (bsc#1214477)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-09"/>
	<updated date="2023-11-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213293">SUSE bug 1213293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213518">SUSE bug 1213518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214477">SUSE bug 1214477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215157">SUSE bug 1215157</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34049/">CVE-2023-34049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-34049">CVE-2023-34049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809115" comment="python3-simplejson-3.17.2-150300.3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4494" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1208788" ref_url="https://bugzilla.suse.com/1208788" source="BUGZILLA"/>
		<reference ref_id="1211162" ref_url="https://bugzilla.suse.com/1211162" source="BUGZILLA"/>
		<reference ref_id="1211307" ref_url="https://bugzilla.suse.com/1211307" source="BUGZILLA"/>
		<reference ref_id="1212423" ref_url="https://bugzilla.suse.com/1212423" source="BUGZILLA"/>
		<reference ref_id="1213705" ref_url="https://bugzilla.suse.com/1213705" source="BUGZILLA"/>
		<reference ref_id="1213772" ref_url="https://bugzilla.suse.com/1213772" source="BUGZILLA"/>
		<reference ref_id="1214754" ref_url="https://bugzilla.suse.com/1214754" source="BUGZILLA"/>
		<reference ref_id="1214874" ref_url="https://bugzilla.suse.com/1214874" source="BUGZILLA"/>
		<reference ref_id="1215104" ref_url="https://bugzilla.suse.com/1215104" source="BUGZILLA"/>
		<reference ref_id="1215523" ref_url="https://bugzilla.suse.com/1215523" source="BUGZILLA"/>
		<reference ref_id="1215545" ref_url="https://bugzilla.suse.com/1215545" source="BUGZILLA"/>
		<reference ref_id="1215921" ref_url="https://bugzilla.suse.com/1215921" source="BUGZILLA"/>
		<reference ref_id="1215955" ref_url="https://bugzilla.suse.com/1215955" source="BUGZILLA"/>
		<reference ref_id="1215986" ref_url="https://bugzilla.suse.com/1215986" source="BUGZILLA"/>
		<reference ref_id="1216062" ref_url="https://bugzilla.suse.com/1216062" source="BUGZILLA"/>
		<reference ref_id="1216202" ref_url="https://bugzilla.suse.com/1216202" source="BUGZILLA"/>
		<reference ref_id="1216322" ref_url="https://bugzilla.suse.com/1216322" source="BUGZILLA"/>
		<reference ref_id="1216323" ref_url="https://bugzilla.suse.com/1216323" source="BUGZILLA"/>
		<reference ref_id="1216324" ref_url="https://bugzilla.suse.com/1216324" source="BUGZILLA"/>
		<reference ref_id="1216333" ref_url="https://bugzilla.suse.com/1216333" source="BUGZILLA"/>
		<reference ref_id="1216345" ref_url="https://bugzilla.suse.com/1216345" source="BUGZILLA"/>
		<reference ref_id="1216512" ref_url="https://bugzilla.suse.com/1216512" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2163" ref_url="https://www.suse.com/security/cve/CVE-2023-2163/" source="CVE"/>
		<reference ref_id="CVE-2023-2860" ref_url="https://www.suse.com/security/cve/CVE-2023-2860/" source="CVE"/>
		<reference ref_id="CVE-2023-31085" ref_url="https://www.suse.com/security/cve/CVE-2023-31085/" source="CVE"/>
		<reference ref_id="CVE-2023-34324" ref_url="https://www.suse.com/security/cve/CVE-2023-34324/" source="CVE"/>
		<reference ref_id="CVE-2023-3777" ref_url="https://www.suse.com/security/cve/CVE-2023-3777/" source="CVE"/>
		<reference ref_id="CVE-2023-39189" ref_url="https://www.suse.com/security/cve/CVE-2023-39189/" source="CVE"/>
		<reference ref_id="CVE-2023-39191" ref_url="https://www.suse.com/security/cve/CVE-2023-39191/" source="CVE"/>
		<reference ref_id="CVE-2023-39193" ref_url="https://www.suse.com/security/cve/CVE-2023-39193/" source="CVE"/>
		<reference ref_id="CVE-2023-45862" ref_url="https://www.suse.com/security/cve/CVE-2023-45862/" source="CVE"/>
		<reference ref_id="CVE-2023-46813" ref_url="https://www.suse.com/security/cve/CVE-2023-46813/" source="CVE"/>
		<reference ref_id="CVE-2023-5178" ref_url="https://www.suse.com/security/cve/CVE-2023-5178/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2023-3777: Fixed a use-after-free vulnerability in netfilter: nf_tables component can be exploited to achieve local privilege escalation. (bsc#1215095)
- CVE-2023-46813: Fixed a local privilege escalation with user-space programs that have access to MMIO regions (bsc#1212649).
- CVE-2023-31085: Fixed a divide-by-zero error in do_div(sz,mtd-&gt;erasesize) that could cause a local DoS. (bsc#1210778)
- CVE-2023-45862: Fixed an issue in the ENE UB6250 reader driver whwere an object could potentially extend beyond the end of an allocation causing. (bsc#1216051)
- CVE-2023-39193: Fixed an out of bounds read in the xtables subsystem (bsc#1215860).
- CVE-2023-5178: Fixed an UAF in queue intialization setup.  (bsc#1215768)
- CVE-2023-2163: Fixed an incorrect verifier pruning in BPF that could lead to unsafe code paths being incorrectly marked as safe, resulting in arbitrary read/write in kernel memory, lateral privilege escalation, and container escape. (bsc#1215518)
- CVE-2023-34324: Fixed a possible deadlock in Linux kernel event handling. (bsc#1215745).
- CVE-2023-39189: Fixed a flaw in the Netfilter subsystem that could allow a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure. (bsc#1216046)
- CVE-2023-39191: Fixed a lack of validation of dynamic pointers within user-supplied eBPF programs that may have allowed an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code. (bsc#1215863)
- CVE-2023-2860: Fixed an out-of-bounds read vulnerability in the processing of seg6 attributes. This flaw allowed a privileged local user to disclose sensitive information. (bsc#1211592)

The following non-security bugs were fixed:

- 9p: virtio: make sure 'offs' is initialized in zc_request (git-fixes).
- ACPI: irq: Fix incorrect return value in acpi_register_gsi() (git-fixes).
- ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CBA (git-fixes).
- ALSA: hda/realtek - ALC287 I2S speaker platform support (git-fixes).
- ALSA: hda/realtek - ALC287 merge RTK codec with CS CS35L41 AMP (git-fixes).
- ALSA: hda/realtek - Fixed ASUS platform headset Mic issue (git-fixes).
- ALSA: hda/realtek - Fixed two speaker platform (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS ROG GU603ZV (git-fixes).
- ALSA: hda/realtek: Change model for Intel RVP board (git-fixes).
- ALSA: hda/relatek: Enable Mute LED on HP Laptop 15s-fq5xxx (git-fixes).
- ALSA: hda: Disable power save for solving pop issue on Lenovo ThinkCentre M70q (git-fixes).
- ALSA: hda: intel-dsp-cfg: add LunarLake support (git-fixes).
- ALSA: hda: intel-sdw-acpi: Use u8 type for link index (git-fixes).
- ALSA: usb-audio: Fix microphone sound on Nexigo webcam (git-fixes).
- ALSA: usb-audio: Fix microphone sound on Opencomm2 Headset (git-fixes).
- ASoC: amd: yc: Fix non-functional mic on Lenovo 82YM (git-fixes).
- ASoC: codecs: wcd938x-sdw: fix runtime PM imbalance on probe errors (git-fixes).
- ASoC: codecs: wcd938x-sdw: fix use after free on driver unbind (git-fixes).
- ASoC: codecs: wcd938x: drop bogus bind error handling (git-fixes).
- ASoC: codecs: wcd938x: fix unbind tear down order (git-fixes).
- ASoC: fsl: imx-pcm-rpmsg: Add SNDRV_PCM_INFO_BATCH flag (git-fixes).
- ASoC: imx-rpmsg: Set ignore_pmdown_time for dai_link (git-fixes).
- ASoC: pxa: fix a memory leak in probe() (git-fixes).
- Bluetooth: Avoid redundant authentication (git-fixes).
- Bluetooth: Fix a refcnt underflow problem for hci_conn (git-fixes).
- Bluetooth: ISO: Fix handling of listen for unicast (git-fixes).
- Bluetooth: Reject connection with the device which has same BD_ADDR (git-fixes).
- Bluetooth: avoid memcmp() out of bounds warning (git-fixes).
- Bluetooth: btusb: add shutdown function for QCA6174 (git-fixes).
- Bluetooth: hci_codec: Fix leaking content of local_codecs (git-fixes).
- Bluetooth: hci_event: Fix coding style (git-fixes).
- Bluetooth: hci_event: Fix using memcmp when comparing keys (git-fixes).
- Bluetooth: hci_event: Ignore NULL link key (git-fixes).
- Bluetooth: hci_sock: Correctly bounds check and pad HCI_MON_NEW_INDEX name (git-fixes).
- Bluetooth: hci_sock: fix slab oob read in create_monitor_event (git-fixes).
- Bluetooth: vhci: Fix race when opening vhci device (git-fixes).
- Documentation: qat: change kernel version (PED-6401).
- Documentation: qat: rewrite description (PED-6401).
- Drivers: hv: vmbus: Call hv_synic_free() if hv_synic_alloc() fails (git-fixes).
- Drivers: hv: vmbus: Fix vmbus_wait_for_unload() to scan present CPUs (git-fixes).
- Drop amdgpu patch causing spamming (bsc#1215523).
- HID: holtek: fix slab-out-of-bounds Write in holtek_kbd_input_event (git-fixes).
- HID: intel-ish-hid: ipc: Disable and reenable ACPI GPE bit (git-fixes).
- HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect (git-fixes).
- HID: multitouch: Add required quirk for Synaptics 0xcd7e device (git-fixes).
- HID: sony: Fix a potential memory leak in sony_probe() (git-fixes).
- HID: sony: remove duplicate NULL check before calling usb_free_urb() (git-fixes).
- IB/mlx4: Fix the size of a buffer in add_port_entries() (git-fixes)
- Input: goodix - ensure int GPIO is in input for gpio_count == 1 &amp;&amp; gpio_int_idx == 0 case (git-fixes).
- Input: powermate - fix use-after-free in powermate_config_complete (git-fixes).
- Input: psmouse - fix fast_reconnect function for PS/2 mode (git-fixes).
- Input: xpad - add PXN V900 support (git-fixes).
- KVM: SVM: Do not kill SEV guest if SMAP erratum triggers in usermode (git-fixes).
- KVM: SVM: INTERCEPT_RDTSCP is never intercepted anyway (git-fixes).
- KVM: s390: fix gisa destroy operation might lead to cpu stalls (git-fixes bsc#1216512).
- KVM: x86/mmu: Reconstruct shadow page root if the guest PDPTEs is changed (git-fixes).
- KVM: x86: Fix clang -Wimplicit-fallthrough in do_host_cpuid() (git-fixes).
- KVM: x86: Move open-coded CPUID leaf 0x80000021 EAX bit propagation code (bsc#1213772).
- KVM: x86: Propagate the AMD Automatic IBRS feature to the guest (bsc#1213772).
- KVM: x86: add support for CPUID leaf 0x80000021 (bsc#1213772).
- KVM: x86: synthesize CPUID leaf 0x80000021h if useful (bsc#1213772).
- KVM: x86: work around QEMU issue with synthetic CPUID leaves (git-fixes).
- NFS: Fix O_DIRECT locking issues (bsc#1211162).
- NFS: Fix a few more clear_bit() instances that need release semantics (bsc#1211162).
- NFS: Fix a potential data corruption (bsc#1211162).
- NFS: Fix a use after free in nfs_direct_join_group() (bsc#1211162).
- NFS: Fix error handling for O_DIRECT write scheduling (bsc#1211162).
- NFS: More O_DIRECT accounting fixes for error paths (bsc#1211162).
- NFS: More fixes for nfs_direct_write_reschedule_io() (bsc#1211162).
- NFS: Use the correct commit info in nfs_join_page_group() (bsc#1211162).
- NFSD: Never call nfsd_file_gc() in foreground paths (bsc#1215545).
- RDMA/cma: Fix truncation compilation warning in make_cma_ports (git-fixes)
- RDMA/cma: Initialize ib_sa_multicast structure to 0 when join (git-fixes)
- RDMA/core: Require admin capabilities to set system parameters (git-fixes)
- RDMA/cxgb4: Check skb value for failure to allocate (git-fixes)
- RDMA/mlx5: Fix NULL string error (git-fixes)
- RDMA/mlx5: Fix mutex unlocking on error flow for steering anchor creation (git-fixes)
- RDMA/siw: Fix connection failure handling (git-fixes)
- RDMA/srp: Do not call scsi_done() from srp_abort() (git-fixes)
- RDMA/uverbs: Fix typo of sizeof argument (git-fixes)
- Revert 'pinctrl: avoid unsafe code pattern in find_pinctrl()' (git-fixes).
- Revert 'tty: n_gsm: fix UAF in gsm_cleanup_mux' (git-fixes).
- USB: serial: option: add Fibocom to DELL custom modem FM101R-GL (git-fixes).
- USB: serial: option: add Telit LE910C4-WWX 0x1035 composition (git-fixes).
- USB: serial: option: add entry for Sierra EM9191 with new firmware (git-fixes).
- arm64/smmu: use TLBI ASID when invalidating entire range (bsc#1215921)
- ata: libata-core: Do not register PM operations for SAS ports (git-fixes).
- ata: libata-core: Fix ata_port_request_pm() locking (git-fixes).
- ata: libata-core: Fix port and device removal (git-fixes).
- ata: libata-sata: increase PMP SRST timeout to 10s (git-fixes).
- ata: libata-scsi: ignore reserved bits for REPORT SUPPORTED OPERATION CODES (git-fixes).
- blk-cgroup: Fix NULL deref caused by blkg_policy_data being installed before init (bsc#1216062).
- blk-cgroup: support to track if policy is online (bsc#1216062).
- bonding: Fix extraction of ports from the packet headers (bsc#1214754).
- bonding: Return pointer to data after pull on skb (bsc#1214754).
- bonding: do not assume skb mac_header is set (bsc#1214754).
- bpf: Add copy_map_value_long to copy to remote percpu memory (git-fixes).
- bpf: Add missing btf_put to register_btf_id_dtor_kfuncs (git-fixes).
- bpf: Add override check to kprobe multi link attach (git-fixes).
- bpf: Add zero_map_value to zero map value with special fields (git-fixes).
- bpf: Cleanup check_refcount_ok (git-fixes).
- bpf: Fix max stack depth check for async callbacks (git-fixes).
- bpf: Fix offset calculation error in __copy_map_value and zero_map_value (git-fixes).
- bpf: Fix ref_obj_id for dynptr data slices in verifier (git-fixes).
- bpf: Fix resetting logic for unreferenced kptrs (git-fixes).
- bpf: Fix subprog idx logic in check_max_stack_depth (git-fixes).
- bpf: Gate dynptr API behind CAP_BPF (git-fixes).
- bpf: Prevent decl_tag from being referenced in func_proto arg (git-fixes).
- bpf: Repeat check_max_stack_depth for async callbacks (git-fixes).
- bpf: Tighten ptr_to_btf_id checks (git-fixes).
- bpf: fix precision propagation verbose logging (git-fixes).
- bpf: prevent decl_tag from being referenced in func_proto (git-fixes).
- bpf: propagate precision across all frames, not just the last one (git-fixes).
- bpf: propagate precision in ALU/ALU64 operations (git-fixes).
- btf: Export bpf_dynptr definition (git-fixes).
- btrfs: do not start transaction for scrub if the fs is mounted read-only (bsc#1214874).
- bus: ti-sysc: Fix missing AM35xx SoC matching (git-fixes).
- bus: ti-sysc: Use fsleep() instead of usleep_range() in sysc_reset() (git-fixes).
- ceph: add base64 endcoding routines for encrypted names (jsc#SES-1880).
- ceph: add encryption support to writepage and writepages (jsc#SES-1880).
- ceph: add fscrypt ioctls and ceph.fscrypt.auth vxattr (jsc#SES-1880).
- ceph: add helpers for converting names for userland presentation (jsc#SES-1880).
- ceph: add infrastructure for file encryption and decryption (jsc#SES-1880).
- ceph: add new mount option to enable sparse reads (jsc#SES-1880).
- ceph: add object version support for sync read (jsc#SES-1880).
- ceph: add read/modify/write to ceph_sync_write (jsc#SES-1880).
- ceph: add some fscrypt guardrails (jsc#SES-1880).
- ceph: add support for encrypted snapshot names (jsc#SES-1880).
- ceph: add support to readdir for encrypted names (jsc#SES-1880).
- ceph: add truncate size handling support for fscrypt (jsc#SES-1880).
- ceph: align data in pages in ceph_sync_write (jsc#SES-1880).
- ceph: allow encrypting a directory while not having Ax caps (jsc#SES-1880).
- ceph: create symlinks with encrypted and base64-encoded targets (jsc#SES-1880).
- ceph: decode alternate_name in lease info (jsc#SES-1880).
- ceph: do not use special DIO path for encrypted inodes (jsc#SES-1880).
- ceph: drop messages from MDS when unmounting (jsc#SES-1880).
- ceph: encode encrypted name in ceph_mdsc_build_path and dentry release (jsc#SES-1880).
- ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1216322).
- ceph: fix type promotion bug on 32bit systems (bsc#1216324).
- ceph: fix updating i_truncate_pagecache_size for fscrypt (jsc#SES-1880).
- ceph: fscrypt_auth handling for ceph (jsc#SES-1880).
- ceph: handle fscrypt fields in cap messages from MDS (jsc#SES-1880).
- ceph: implement -o test_dummy_encryption mount option (jsc#SES-1880).
- ceph: invalidate pages when doing direct/sync writes (jsc#SES-1880).
- ceph: make ceph_fill_trace and ceph_get_name decrypt names (jsc#SES-1880).
- ceph: make ceph_msdc_build_path use ref-walk (jsc#SES-1880).
- ceph: make d_revalidate call fscrypt revalidator for encrypted dentries (jsc#SES-1880).
- ceph: make ioctl cmds more readable in debug log (jsc#SES-1880).
- ceph: make num_fwd and num_retry to __u32 (jsc#SES-1880).
- ceph: mark directory as non-complete after loading key (jsc#SES-1880).
- ceph: pass the request to parse_reply_info_readdir() (jsc#SES-1880).
- ceph: plumb in decryption during reads (jsc#SES-1880).
- ceph: preallocate inode for ops that may create one (jsc#SES-1880).
- ceph: prevent snapshot creation in encrypted locked directories (jsc#SES-1880).
- ceph: remove unnecessary check for NULL in parse_longname() (bsc#1216333).
- ceph: send alternate_name in MClientRequest (jsc#SES-1880).
- ceph: set DCACHE_NOKEY_NAME flag in ceph_lookup/atomic_open() (jsc#SES-1880).
- ceph: size handling in MClientRequest, cap updates and inode traces (jsc#SES-1880).
- ceph: switch ceph_lookup/atomic_open() to use new fscrypt helper (jsc#SES-1880).
- ceph: use osd_req_op_extent_osd_iter for netfs reads (jsc#SES-1880).
- ceph: voluntarily drop Xx caps for requests those touch parent mtime (jsc#SES-1880).
- ceph: wait for OSD requests' callbacks to finish when unmounting (jsc#SES-1880).
- cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem (bsc#1215955).
- cgroup: Remove duplicates in cgroup v1 tasks file (bsc#1211307).
- clk: tegra: fix error return case for recalc_rate (git-fixes).
- counter: microchip-tcb-capture: Fix the use of internal GCLK logic (git-fixes).
- crypto: qat - Include algapi.h for low-level Crypto API (PED-6401).
- crypto: qat - Remove unused function declarations (PED-6401).
- crypto: qat - add fw_counters debugfs file (PED-6401).
- crypto: qat - add heartbeat counters check (PED-6401).
- crypto: qat - add heartbeat feature (PED-6401).
- crypto: qat - add internal timer for qat 4xxx (PED-6401).
- crypto: qat - add measure clock frequency (PED-6401).
- crypto: qat - add missing function declaration in adf_dbgfs.h (PED-6401).
- crypto: qat - add qat_zlib_deflate (PED-6401).
- crypto: qat - add support for 402xx devices (PED-6401).
- crypto: qat - change value of default idle filter (PED-6401).
- crypto: qat - delay sysfs initialization (PED-6401).
- crypto: qat - do not export adf_init_admin_pm() (PED-6401).
- crypto: qat - drop log level of msg in get_instance_node() (PED-6401).
- crypto: qat - drop obsolete heartbeat interface (PED-6401).
- crypto: qat - drop redundant adf_enable_aer() (PED-6401).
- crypto: qat - expose pm_idle_enabled through sysfs (PED-6401).
- crypto: qat - extend buffer list logic interface (PED-6401).
- crypto: qat - extend configuration for 4xxx (PED-6401).
- crypto: qat - fix apply custom thread-service mapping for dc service (PED-6401).
- crypto: qat - fix concurrency issue when device state changes (PED-6401).
- crypto: qat - fix crypto capability detection for 4xxx (PED-6401).
- crypto: qat - fix spelling mistakes from 'bufer' to 'buffer' (PED-6401).
- crypto: qat - make fw images name constant (PED-6401).
- crypto: qat - make state machine functions static (PED-6401).
- crypto: qat - move dbgfs init to separate file (PED-6401).
- crypto: qat - move returns to default case (PED-6401).
- crypto: qat - refactor device restart logic (PED-6401).
- crypto: qat - refactor fw config logic for 4xxx (PED-6401).
- crypto: qat - remove ADF_STATUS_PF_RUNNING flag from probe (PED-6401).
- crypto: qat - replace state machine calls (PED-6401).
- crypto: qat - replace the if statement with min() (PED-6401).
- crypto: qat - set deprecated capabilities as reserved (PED-6401).
- crypto: qat - unmap buffer before free for DH (PED-6401).
- crypto: qat - unmap buffers before free for RSA (PED-6401).
- crypto: qat - update slice mask for 4xxx devices (PED-6401).
- crypto: qat - use kfree_sensitive instead of memset/kfree() (PED-6401).
- dmaengine: idxd: use spin_lock_irqsave before wait_event_lock_irq (git-fixes).
- dmaengine: mediatek: Fix deadlock caused by synchronize_irq() (git-fixes).
- dmaengine: stm32-mdma: abort resume if no ongoing transfer (git-fixes).
- drm/amd/display: Do not check registers, if using AUX BL control (git-fixes).
- drm/amd/display: Do not set dpms_off for seamless boot (git-fixes).
- drm/amd/pm: add unique_id for gc 11.0.3 (git-fixes).
- drm/amd: Fix detection of _PR3 on the PCIe root port (git-fixes).
- drm/amdgpu/nbio4.3: set proper rmmio_remap.reg_offset for SR-IOV (git-fixes).
- drm/amdgpu/soc21: do not remap HDP registers for SR-IOV (git-fixes).
- drm/amdgpu: Handle null atom context in VBIOS info ioctl (git-fixes).
- drm/amdgpu: add missing NULL check (git-fixes).
- drm/amdkfd: Flush TLB after unmapping for GFX v9.4.3 (git-fixes).
- drm/amdkfd: Insert missing TLB flush on GFX10 and later (git-fixes).
- drm/amdkfd: Use gpu_offset for user queue's wptr (git-fixes).
- drm/atomic-helper: relax unregistered connector check (git-fixes).
- drm/bridge: ti-sn65dsi83: Do not generate HFP/HBP/HSA and EOT packet (git-fixes).
- drm/i915/gt: Fix reservation address in ggtt_reserve_guc_top (git-fixes).
- drm/i915: Retry gtt fault when out of fence registers (git-fixes).
- drm/mediatek: Correctly free sg_table in gem prime vmap (git-fixes).
- drm/msm/dp: do not reinitialize phy unless retry during link training (git-fixes).
- drm/msm/dpu: change _dpu_plane_calc_bw() to use u64 to avoid overflow (git-fixes).
- drm/msm/dsi: fix irq_of_parse_and_map() error checking (git-fixes).
- drm/msm/dsi: skip the wait for video mode done if not applicable (git-fixes).
- drm/vmwgfx: fix typo of sizeof argument (git-fixes).
- drm: panel-orientation-quirks: Add quirk for One Mix 2S (git-fixes).
- firmware: arm_ffa: Do not set the memory region attributes for MEM_LEND (git-fixes).
- firmware: imx-dsp: Fix an error handling path in imx_dsp_setup_channels() (git-fixes).
- fprobe: Ensure running fprobe_exit_handler() finished before calling rethook_free() (git-fixes).
- fscrypt: new helper function - fscrypt_prepare_lookup_partial() (jsc#SES-1880).
- gpio: aspeed: fix the GPIO number passed to pinctrl_gpio_set_config() (git-fixes).
- gpio: pmic-eic-sprd: Add can_sleep flag for PMIC EIC chip (git-fixes).
- gpio: pxa: disable pinctrl calls for MMP_GPIO (git-fixes).
- gpio: tb10x: Fix an error handling path in tb10x_gpio_probe() (git-fixes).
- gpio: timberdale: Fix potential deadlock on &amp;tgpio-&gt;lock (git-fixes).
- gpio: vf610: set value before the direction to avoid a glitch (git-fixes).
- gve: Do not fully free QPL pages on prefill errors (git-fixes).
- i2c: i801: unregister tco_pdev in i801_probe() error path (git-fixes).
- i2c: mux: Avoid potential false error message in i2c_mux_add_adapter (git-fixes).
- i2c: mux: demux-pinctrl: check the return value of devm_kstrdup() (git-fixes).
- i2c: mux: gpio: Add missing fwnode_handle_put() (git-fixes).
- i2c: mux: gpio:?Replace custom acpi_get_local_address() (git-fixes).
- i2c: npcm7xx: Fix callback completion ordering (git-fixes).
- ieee802154: ca8210: Fix a potential UAF in ca8210_probe (git-fixes).
- iio: pressure: bmp280: Fix NULL pointer exception (git-fixes).
- iio: pressure: dps310: Adjust Timeout Settings (git-fixes).
- iio: pressure: ms5611: ms5611_prom_is_valid false negative bug (git-fixes).
- intel x86 platform vsec kABI workaround (bsc#1216202).
- io_uring/fs: remove sqe-&gt;rw_flags checking from LINKAT (git-fixes).
- io_uring/rw: defer fsnotify calls to task context (git-fixes).
- io_uring/rw: ensure kiocb_end_write() is always called (git-fixes).
- io_uring/rw: remove leftover debug statement (git-fixes).
- io_uring: Replace 0-length array with flexible array (git-fixes).
- io_uring: ensure REQ_F_ISREG is set async offload (git-fixes).
- io_uring: fix fdinfo sqe offsets calculation (git-fixes).
- io_uring: fix memory leak when removing provided buffers (git-fixes).
- iommu/amd/io-pgtable: Implement map_pages io_pgtable_ops callback (bsc#1212423).
- iommu/amd/io-pgtable: Implement unmap_pages io_pgtable_ops callback (bsc#1212423).
- iommu/amd: Add map/unmap_pages() iommu_domain_ops callback support (bsc#1212423).
- iommu/arm-smmu-v3: Fix soft lockup triggered by (bsc#1215921)
- kABI: fix bpf Tighten-ptr_to_btf_id checks (git-fixes).
- kabi: blkcg_policy_data fix KABI (bsc#1216062).
- kabi: workaround for enum nft_trans_phase (bsc#1215104).
- kprobes: Prohibit probing on CFI preamble symbol (git-fixes).
- leds: Drop BUG_ON check for LED_COLOR_ID_MULTI (git-fixes).
- libceph: add CEPH_OSD_OP_ASSERT_VER support (jsc#SES-1880).
- libceph: add new iov_iter-based ceph_msg_data_type and ceph_osd_data_type (jsc#SES-1880).
- libceph: add sparse read support to OSD client (jsc#SES-1880).
- libceph: add sparse read support to msgr1 (jsc#SES-1880).
- libceph: add spinlock around osd-&gt;o_requests (jsc#SES-1880).
- libceph: allow ceph_osdc_new_request to accept a multi-op read (jsc#SES-1880).
- libceph: define struct ceph_sparse_extent and add some helpers (jsc#SES-1880).
- libceph: new sparse_read op, support sparse reads on msgr2 crc codepath (jsc#SES-1880).
- libceph: support sparse reads on msgr2 secure codepath (jsc#SES-1880).
- libceph: use kernel_connect() (bsc#1216323).
- mm, memcg: reconsider kmem.limit_in_bytes deprecation (bsc#1208788 bsc#1213705).
- mmc: core: Capture correct oemid-bits for eMMC cards (git-fixes).
- mmc: core: sdio: hold retuning if sdio in 1-bit mode (git-fixes).
- mmc: mtk-sd: Use readl_poll_timeout_atomic in msdc_reset_hw (git-fixes).
- mtd: physmap-core: Restore map_rom fallback (git-fixes).
- mtd: rawnand: arasan: Ensure program page operations are successful (git-fixes).
- mtd: rawnand: marvell: Ensure program page operations are successful (git-fixes).
- mtd: rawnand: pl353: Ensure program page operations are successful (git-fixes).
- mtd: rawnand: qcom: Unmap the right resource upon probe failure (git-fixes).
- mtd: spinand: micron: correct bitmask for ecc status (git-fixes).
- net/sched: fix netdevice reference leaks in attach_default_qdiscs() (git-fixes).
- net: mana: Fix TX CQE error handling (bsc#1215986).
- net: mana: Fix oversized sge0 for GSO packets (bsc#1215986).
- net: nfc: llcp: Add lock when modifying device list (git-fixes).
- net: rfkill: gpio: prevent value glitch during probe (git-fixes).
- net: sched: add barrier to fix packet stuck problem for lockless qdisc (bsc#1216345).
- net: sched: fixed barrier to prevent skbuff sticking in qdisc backlog (bsc#1216345).
- net: usb: dm9601: fix uninitialized variable use in dm9601_mdio_read (git-fixes).
- net: usb: smsc75xx: Fix uninit-value access in __smsc75xx_read_reg (git-fixes).
- net: usb: smsc95xx: Fix an error code in smsc95xx_reset() (git-fixes).
- net: use sk_is_tcp() in more places (git-fixes).
- netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound set/chain (git-fixes).
- netfilter: nf_tables: unbind non-anonymous set if rule construction fails (git-fixes).
- nfc: nci: assert requested protocol is valid (git-fixes).
- nfc: nci: fix possible NULL pointer dereference in send_acknowledge() (git-fixes).
- nfs: only issue commit in DIO codepath if we have uncommitted data (bsc#1211162).
- nilfs2: fix potential use after free in nilfs_gccache_submit_read_data() (git-fixes).
- nvme-fc: Prevent null pointer dereference in nvme_fc_io_getuuid() (bsc#1214842).
- phy: mapphone-mdm6600: Fix pinctrl_pm handling for sleep pins (git-fixes).
- phy: mapphone-mdm6600: Fix runtime PM for remove (git-fixes).
- phy: mapphone-mdm6600: Fix runtime disable on probe (git-fixes).
- pinctrl: avoid unsafe code pattern in find_pinctrl() (git-fixes).
- pinctrl: renesas: rzn1: Enable missing PINMUX (git-fixes).
- platform/surface: platform_profile: Propagate error if profile registration fails (git-fixes).
- platform/x86/intel/pmt: Ignore uninitialized entries (bsc#1216202).
- platform/x86/intel/pmt: telemetry: Fix fixed region handling (bsc#1216202).
- platform/x86/intel/vsec: Rework early hardware code (bsc#1216202).
- platform/x86/intel: Fix 'rmmod pmt_telemetry' panic (bsc#1216202).
- platform/x86/intel: Fix pmt_crashlog array reference (bsc#1216202).
- platform/x86: asus-wmi: Change ASUS_WMI_BRN_DOWN code from 0x20 to 0x2e (git-fixes).
- platform/x86: asus-wmi: Map 0x2a code, Ignore 0x2b and 0x2c events (git-fixes).
- platform/x86: think-lmi: Fix reference leak (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Positivo C4128B (git-fixes).
- power: supply: ucs1002: fix error code in ucs1002_get_property() (git-fixes).
- quota: Fix slow quotaoff (bsc#1216621).
- r8152: check budget for r8152_poll() (git-fixes).
- regmap: fix NULL deref on lookup (git-fixes).
- regmap: rbtree: Fix wrong register marked as in-cache when creating new node (git-fixes).
- remove unnecessary WARN_ON_ONCE() (bsc#1214823).
- ring-buffer: Avoid softlockup in ring_buffer_resize() (git-fixes).
- ring-buffer: Do not attempt to read past 'commit' (git-fixes).
- ring-buffer: Fix bytes info in per_cpu buffer stats (git-fixes).
- ring-buffer: Update 'shortest_full' in polling (git-fixes).
- s390/cio: fix a memleak in css_alloc_subchannel (git-fixes bsc#1216510).
- s390/pci: fix iommu bitmap allocation (git-fixes bsc#1216511).
- sched/cpuset: Bring back cpuset_mutex (bsc#1215955).
- sched/deadline,rt: Remove unused parameter from pick_next_[rt|dl]_entity() (git fixes (sched)).
- sched/rt: Fix live lock between select_fallback_rq() and RT push (git fixes (sched)).
- sched/rt: Fix sysctl_sched_rr_timeslice intial value (git fixes (sched)).
- scsi: be2iscsi: Add length check when parsing nlattrs (git-fixes).
- scsi: fcoe: Fix potential deadlock on &amp;fip-&gt;ctlr_lock (git-fixes).
- scsi: iscsi: Add length check for nlattr payload (git-fixes).
- scsi: iscsi: Add strlen() check in iscsi_if_set{_host}_param() (git-fixes).
- scsi: iscsi_tcp: restrict to TCP sockets (git-fixes).
- scsi: mpi3mr: Propagate sense data for admin queue SCSI I/O (git-fixes).
- scsi: mpt3sas: Perform additional retries if doorbell read returns 0 (git-fixes).
- scsi: pm8001: Setup IRQs on resume (git-fixes).
- scsi: qedf: Do not touch __user pointer in qedf_dbg_debug_cmd_read() directly (git-fixes).
- scsi: qedf: Do not touch __user pointer in qedf_dbg_fp_int_cmd_read() directly (git-fixes).
- scsi: qedf: Do not touch __user pointer in qedf_dbg_stop_io_on_error_cmd_read() directly (git-fixes).
- scsi: qedi: Fix potential deadlock on &amp;qedi_percpu-&gt;p_work_lock (git-fixes).
- scsi: qla4xxx: Add length check when parsing nlattrs (git-fixes).
- selftests/bpf: Add more tests for check_max_stack_depth bug (git-fixes).
- selftests/bpf: Add reproducer for decl_tag in func_proto argument (git-fixes).
- selftests/bpf: Add reproducer for decl_tag in func_proto return type (git-fixes).
- selftests/bpf: Add selftest for check_stack_max_depth bug (git-fixes).
- selftests/bpf: Clean up sys_nanosleep uses (git-fixes).
- serial: 8250_port: Check IRQ data before use (git-fixes).
- soc: imx8m: Enable OCOTP clock for imx8mm before reading registers (git-fixes).
- spi: nxp-fspi: reset the FLSHxCR1 registers (git-fixes).
- spi: stm32: add a delay before SPI disable (git-fixes).
- spi: sun6i: fix race between DMA RX transfer completion and RX FIFO drain (git-fixes).
- spi: sun6i: reduce DMA RX transfer width to single byte (git-fixes).
- thunderbolt: Check that lane 1 is in CL0 before enabling lane bonding (git-fixes).
- thunderbolt: Restart XDomain discovery handshake after failure (git-fixes).
- thunderbolt: Workaround an IOMMU fault on certain systems with Intel Maple Ridge (git-fixes).
- tracing: Have current_trace inc the trace array ref count (git-fixes).
- tracing: Have event inject files inc the trace array ref count (git-fixes).
- tracing: Have option files inc the trace array ref count (git-fixes).
- tracing: Have tracing_max_latency inc the trace array ref count (git-fixes).
- tracing: Increase trace array ref count on enable and filter files (git-fixes).
- tracing: Make trace_marker{,_raw} stream-like (git-fixes).
- usb: cdnsp: Fixes issue with dequeuing not queued requests (git-fixes).
- usb: dwc3: Soft reset phy on probe for host (git-fixes).
- usb: gadget: ncm: Handle decoding of multiple NTB's in unwrap call (git-fixes).
- usb: gadget: udc-xilinx: replace memcpy with memcpy_toio (git-fixes).
- usb: hub: Guard against accesses to uninitialized BOS descriptors (git-fixes).
- usb: musb: Get the musb_qh poniter after musb_giveback (git-fixes).
- usb: musb: Modify the 'HWVers' register address (git-fixes).
- usb: typec: altmodes/displayport: Signal hpd low when exiting mode (git-fixes).
- usb: typec: ucsi: Clear EVENT_PENDING bit if ucsi_send_command fails (git-fixes).
- usb: xhci: xhci-ring: Use sysdev for mapping bounce buffer (git-fixes).
- vmbus_testing: fix wrong python syntax for integer value comparison (git-fixes).
- vringh: do not use vringh_kiov_advance() in vringh_iov_xfer() (git-fixes).
- watchdog: iTCO_wdt: No need to stop the timer in probe (git-fixes).
- watchdog: iTCO_wdt: Set NO_REBOOT if the watchdog is not already running (git-fixes).
- wifi: cfg80211: Fix 6GHz scan configuration (git-fixes).
- wifi: cfg80211: avoid leaking stack data into trace (git-fixes).
- wifi: iwlwifi: Ensure ack flag is properly cleared (git-fixes).
- wifi: iwlwifi: dbg_ini: fix structure packing (git-fixes).
- wifi: iwlwifi: mvm: Fix a memory corruption issue (git-fixes).
- wifi: mac80211: allow transmitting EAPOL frames with tainted key (git-fixes).
- wifi: mt76: mt76x02: fix MT76x0 external LNA gain handling (git-fixes).
- wifi: mwifiex: Fix oob check condition in mwifiex_process_rx_packet (git-fixes).
- wifi: mwifiex: Fix tlv_buf_left calculation (git-fixes).
- wifi: mwifiex: Sanity check tlv_len and tlv_bitmap_len (git-fixes).
- x86/cpu, kvm: Add the NO_NESTED_DATA_BP feature (bsc#1213772).
- x86/cpu, kvm: Add the Null Selector Clears Base feature (bsc#1213772).
- x86/cpu, kvm: Add the SMM_CTL MSR not present feature (bsc#1213772).
- x86/cpu, kvm: Move X86_FEATURE_LFENCE_RDTSC to its native leaf (bsc#1213772).
- x86/cpu: Enable STIBP on AMD if Automatic IBRS is enabled (bsc#1213772).
- x86/cpu: Support AMD Automatic IBRS (bsc#1213772).
- x86/mm: Print the encryption features correctly when a paravisor is present (bsc#1206453).
- x86/platform/uv: Use alternate source for socket to node data (bsc#1215696).
- x86/sev: Check IOBM for IOIO exceptions from user-space (bsc#1212649).
- x86/sev: Check for user-space IOIO pointing to kernel space (bsc#1212649).
- x86/sev: Disable MMIO emulation from user mode (bsc#1212649).
- x86/sev: Make enc_dec_hypercall() accept a size instead of npages (bsc#1214635).
- xen-netback: use default TX queue size for vifs (git-fixes).
- xhci: Keep interrupt disabled in initialization until host is running (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-10"/>
	<updated date="2023-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208788">SUSE bug 1208788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211162">SUSE bug 1211162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211307">SUSE bug 1211307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212423">SUSE bug 1212423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213705">SUSE bug 1213705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213772">SUSE bug 1213772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214754">SUSE bug 1214754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214874">SUSE bug 1214874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215104">SUSE bug 1215104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215523">SUSE bug 1215523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215545">SUSE bug 1215545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215921">SUSE bug 1215921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215955">SUSE bug 1215955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215986">SUSE bug 1215986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216062">SUSE bug 1216062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216202">SUSE bug 1216202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216322">SUSE bug 1216322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216323">SUSE bug 1216323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216324">SUSE bug 1216324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216333">SUSE bug 1216333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216345">SUSE bug 1216345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216512">SUSE bug 1216512</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2163/">CVE-2023-2163 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2163">CVE-2023-2163 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-2860/">CVE-2023-2860 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2860">CVE-2023-2860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31085/">CVE-2023-31085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31085">CVE-2023-31085 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34324/">CVE-2023-34324 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34324">CVE-2023-34324 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3777/">CVE-2023-3777 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3777">CVE-2023-3777 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39189/">CVE-2023-39189 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39189">CVE-2023-39189 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39191/">CVE-2023-39191 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39191">CVE-2023-39191 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39193/">CVE-2023-39193 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39193">CVE-2023-39193 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-45862/">CVE-2023-45862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45862">CVE-2023-45862 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-46813/">CVE-2023-46813 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46813">CVE-2023-46813 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5178/">CVE-2023-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5178">CVE-2023-5178 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009809086" comment="cluster-md-kmp-azure-5.14.21-150500.33.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809087" comment="dlm-kmp-azure-5.14.21-150500.33.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809088" comment="gfs2-kmp-azure-5.14.21-150500.33.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808885" comment="kernel-azure-5.14.21-150500.33.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808886" comment="kernel-azure-devel-5.14.21-150500.33.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809089" comment="kernel-azure-extra-5.14.21-150500.33.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809090" comment="kernel-azure-livepatch-devel-5.14.21-150500.33.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809091" comment="kernel-azure-optional-5.14.21-150500.33.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809092" comment="kernel-azure-vdso-5.14.21-150500.33.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808887" comment="kernel-devel-azure-5.14.21-150500.33.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808888" comment="kernel-source-azure-5.14.21-150500.33.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808889" comment="kernel-syms-azure-5.14.21-150500.33.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809093" comment="kselftests-kmp-azure-5.14.21-150500.33.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809094" comment="ocfs2-kmp-azure-5.14.21-150500.33.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809095" comment="reiserfs-kmp-azure-5.14.21-150500.33.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4495" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216625" ref_url="https://bugzilla.suse.com/1216625" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40477" ref_url="https://www.suse.com/security/cve/CVE-2023-40477/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017016.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- Updated to version 0.103.11:

  - CVE-2023-40477: Updated libclamunrar dependency to version 6.2.12
    (bsc#1216625).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-10"/>
	<updated date="2023-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216625">SUSE bug 1216625</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40477/">CVE-2023-40477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-40477">CVE-2023-40477 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009803752" comment="clamav-0.103.11-150000.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803753" comment="clamav-devel-0.103.11-150000.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803754" comment="libclamav9-0.103.11-150000.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803755" comment="libfreshclam2-0.103.11-150000.3.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4496" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211892" ref_url="https://bugzilla.suse.com/1211892" source="BUGZILLA"/>
		<reference ref_id="1216826" ref_url="https://bugzilla.suse.com/1216826" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-31022" ref_url="https://www.suse.com/security/cve/CVE-2023-31022/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017020.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed fixes the following issues:

Security issue fixed:

- CVE-2023-31022: Fixed NULL ptr deref in kernel module layer


Changes in kernel-firmware-nvidia-gspx-G06:

- update firmware to version 535.129.03 
- update firmware to version 535.113.01 

Changes in nvidia-open-driver-G06-signed:

- Update to version 535.129.03

- Add a devel package so other modules can be built against this
  one. [jira#PED-4964]
- disabled build of nvidia-peermem module; it's no longer needed
  and never worked anyway (it was only a stub) [bsc#1211892]
- preamble: added conflict to nvidia-gfxG05-kmp to prevent users
  from accidently installing conflicting proprietary kernelspace
  drivers from CUDA repository

- Update to version 535.113.01 

- kmp-post.sh/kmp-postun.sh:
  * add/remove nosimplefb=1 kernel option in order to fix Linux
    console also on sle15-sp6/Leap 15.6 kernel, which will come
    with simpledrm support
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-13"/>
	<updated date="2023-11-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211892">SUSE bug 1211892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216826">SUSE bug 1216826</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31022/">CVE-2023-31022 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31022">CVE-2023-31022 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009809081" comment="kernel-firmware-nvidia-gspx-G06-535.129.03-150500.11.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809082" comment="nvidia-open-driver-G06-signed-64kb-devel-535.129.03-150500.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808883" comment="nvidia-open-driver-G06-signed-azure-devel-535.129.03-150500.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809083" comment="nvidia-open-driver-G06-signed-default-devel-535.129.03-150500.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809084" comment="nvidia-open-driver-G06-signed-kmp-64kb-535.129.03_k5.14.21_150500.55.31-150500.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808884" comment="nvidia-open-driver-G06-signed-kmp-azure-535.129.03_k5.14.21_150500.33.20-150500.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809085" comment="nvidia-open-driver-G06-signed-kmp-default-535.129.03_k5.14.21_150500.55.31-150500.3.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4497" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1207399" ref_url="https://bugzilla.suse.com/1207399" source="BUGZILLA"/>
		<reference ref_id="1214357" ref_url="https://bugzilla.suse.com/1214357" source="BUGZILLA"/>
		<reference ref_id="1216424" ref_url="https://bugzilla.suse.com/1216424" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-31122" ref_url="https://www.suse.com/security/cve/CVE-2023-31122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017026.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2023-31122: Fixed an out of bounds read in mod_macro (bsc#1216424).

Non-security fixes:

-  Fixed the content type handling in mod_proxy_http2 (bsc#1214357).
-  Fixed a floating point exception crash (bsc#1207399).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-13"/>
	<updated date="2023-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207399">SUSE bug 1207399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214357">SUSE bug 1214357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216424">SUSE bug 1216424</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31122/">CVE-2023-31122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31122">CVE-2023-31122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807373" comment="apache2-2.4.51-150400.6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807374" comment="apache2-devel-2.4.51-150400.6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807375" comment="apache2-doc-2.4.51-150400.6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807376" comment="apache2-event-2.4.51-150400.6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807377" comment="apache2-example-pages-2.4.51-150400.6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807378" comment="apache2-prefork-2.4.51-150400.6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807379" comment="apache2-utils-2.4.51-150400.6.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807380" comment="apache2-worker-2.4.51-150400.6.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4498" version="1" class="patch">
	<metadata>
		<title>Security update for xterm (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214282" ref_url="https://bugzilla.suse.com/1214282" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40359" ref_url="https://www.suse.com/security/cve/CVE-2023-40359/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017031.html" source="SUSE-SU"/>
		<description>
This update for xterm fixes the following issues:

- CVE-2023-40359: Fixed reporting characterset names in ReGiS graphics mode. (bsc#1214282)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-14"/>
	<updated date="2023-11-14"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1214282">SUSE bug 1214282</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40359/">CVE-2023-40359 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40359">CVE-2023-40359 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009803088" comment="xterm-330-150200.11.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803089" comment="xterm-bin-330-150200.11.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4499" version="1" class="patch">
	<metadata>
		<title>Security update for w3m (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213323" ref_url="https://bugzilla.suse.com/1213323" source="BUGZILLA"/>
		<reference ref_id="1213324" ref_url="https://bugzilla.suse.com/1213324" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38252" ref_url="https://www.suse.com/security/cve/CVE-2023-38252/" source="CVE"/>
		<reference ref_id="CVE-2023-38253" ref_url="https://www.suse.com/security/cve/CVE-2023-38253/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017034.html" source="SUSE-SU"/>
		<description>
This update for w3m fixes the following issues:

- Update to version 0.5.3+git20230121
- CVE-2023-38252: Fixed an out-of-bounds write in function Strnew_size that allows attackers to cause a denial of service via a crafted HTML file. (bsc#1213324)
- CVE-2023-38253: Fixed an out-of-bounds write in function growbuf_to_Str that allows attackers to cause a denial of service via a crafted HTML file. (bsc#1213323)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-14"/>
	<updated date="2023-11-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213323">SUSE bug 1213323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213324">SUSE bug 1213324</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38252/">CVE-2023-38252 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38252">CVE-2023-38252 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38253/">CVE-2023-38253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38253">CVE-2023-38253 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807724" comment="w3m-0.5.3+git20230121-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807725" comment="w3m-inline-image-0.5.3+git20230121-150000.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4500" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215278" ref_url="https://bugzilla.suse.com/1215278" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-23583" ref_url="https://www.suse.com/security/cve/CVE-2023-23583/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017037.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to Intel CPU Microcode 20231114 pre-release (labeled 20231113). (bsc#1215278)
- CVE-2023-23583: Fixed potential CPU deadlocks or privilege escalation. (bsc#1215278)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-14"/>
	<updated date="2023-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215278">SUSE bug 1215278</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23583/">CVE-2023-23583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23583">CVE-2023-23583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810296" comment="ucode-intel-20231113-150200.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4501" version="1" class="patch">
	<metadata>
		<title>Security update for exfatprogs (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216701" ref_url="https://bugzilla.suse.com/1216701" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45897" ref_url="https://www.suse.com/security/cve/CVE-2023-45897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017041.html" source="SUSE-SU"/>
		<description>
This update for exfatprogs fixes the following issues:

- CVE-2023-45897: Fixed out-of-bound memory issues in fsck (bsc#1216701).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-15"/>
	<updated date="2023-11-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216701">SUSE bug 1216701</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45897/">CVE-2023-45897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45897">CVE-2023-45897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009808848" comment="exfatprogs-1.0.4-150300.3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4502" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216022" ref_url="https://bugzilla.suse.com/1216022" source="BUGZILLA"/>
		<reference ref_id="1216734" ref_url="https://bugzilla.suse.com/1216734" source="BUGZILLA"/>
		<reference ref_id="1216960" ref_url="https://bugzilla.suse.com/1216960" source="BUGZILLA"/>
		<reference ref_id="1216961" ref_url="https://bugzilla.suse.com/1216961" source="BUGZILLA"/>
		<reference ref_id="1216962" ref_url="https://bugzilla.suse.com/1216962" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5868" ref_url="https://www.suse.com/security/cve/CVE-2023-5868/" source="CVE"/>
		<reference ref_id="CVE-2023-5869" ref_url="https://www.suse.com/security/cve/CVE-2023-5869/" source="CVE"/>
		<reference ref_id="CVE-2023-5870" ref_url="https://www.suse.com/security/cve/CVE-2023-5870/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017045.html" source="SUSE-SU"/>
		<description>
This update for postgresql12 fixes the following issues:

Security issues fixed:

* CVE-2023-5868: Fix handling of unknown-type
  arguments in DISTINCT 'any' aggregate functions. This error led
  to a text-type value being interpreted as an unknown-type value
  (that is, a zero-terminated string) at runtime. This could
  result in disclosure of server memory following the text value. (bsc#1216962)
* CVE-2023-5869: Detect integer overflow while
  computing new array dimensions. When assigning new elements to
  array subscripts that are outside the current array bounds, an
  undetected integer overflow could occur in edge cases. Memory
  stomps that are potentially exploitable for arbitrary code
  execution are possible, and so is disclosure of server memory. (bsc#1216961)
* CVE-2023-5870: Prevent the pg_signal_backend role
  from signalling background workers and autovacuum processes.
  The documentation says that pg_signal_backend cannot issue
  signals to superuser-owned processes. It was able to signal
  these background  processes, though, because they advertise a
  role OID of zero. Treat that as indicating superuser ownership.
  The security implications of cancelling one of these process
  types are fairly small so far as the core code goes (we'll just
  start another one), but extensions might add background workers
  that are more vulnerable.
  Also ensure that the is_superuser parameter is set correctly in
  such processes. No specific security consequences are known for
  that oversight, but it might be significant for some extensions.
  (bsc#1216960)

- Updated to 12.17: https://www.postgresql.org/docs/12/release-12-17.html

- Overhaul postgresql-README.SUSE and move it from the binary
  package to the noarch wrapper package.
- Change the unix domain socket location from /var/run to /run.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-16"/>
	<updated date="2023-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216022">SUSE bug 1216022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216734">SUSE bug 1216734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216960">SUSE bug 1216960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216961">SUSE bug 1216961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216962">SUSE bug 1216962</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5868/">CVE-2023-5868 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5868">CVE-2023-5868 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5869/">CVE-2023-5869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5870/">CVE-2023-5870 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5870">CVE-2023-5870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009809792" comment="postgresql12-12.17-150200.8.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809793" comment="postgresql12-contrib-12.17-150200.8.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809794" comment="postgresql12-devel-12.17-150200.8.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809795" comment="postgresql12-docs-12.17-150200.8.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809796" comment="postgresql12-llvmjit-12.17-150200.8.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809797" comment="postgresql12-llvmjit-devel-12.17-150200.8.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809798" comment="postgresql12-plperl-12.17-150200.8.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809799" comment="postgresql12-plpython-12.17-150200.8.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809800" comment="postgresql12-pltcl-12.17-150200.8.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809801" comment="postgresql12-server-12.17-150200.8.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809802" comment="postgresql12-server-devel-12.17-150200.8.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809803" comment="postgresql12-test-12.17-150200.8.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4503" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216022" ref_url="https://bugzilla.suse.com/1216022" source="BUGZILLA"/>
		<reference ref_id="1216734" ref_url="https://bugzilla.suse.com/1216734" source="BUGZILLA"/>
		<reference ref_id="1216960" ref_url="https://bugzilla.suse.com/1216960" source="BUGZILLA"/>
		<reference ref_id="1216961" ref_url="https://bugzilla.suse.com/1216961" source="BUGZILLA"/>
		<reference ref_id="1216962" ref_url="https://bugzilla.suse.com/1216962" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5868" ref_url="https://www.suse.com/security/cve/CVE-2023-5868/" source="CVE"/>
		<reference ref_id="CVE-2023-5869" ref_url="https://www.suse.com/security/cve/CVE-2023-5869/" source="CVE"/>
		<reference ref_id="CVE-2023-5870" ref_url="https://www.suse.com/security/cve/CVE-2023-5870/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017044.html" source="SUSE-SU"/>
		<description>
This update for postgresql13 fixes the following issues:

Security issues fixed:

* CVE-2023-5868: Fix handling of unknown-type
  arguments in DISTINCT 'any' aggregate functions. This error led
  to a text-type value being interpreted as an unknown-type value
  (that is, a zero-terminated string) at runtime. This could
  result in disclosure of server memory following the text value. (bsc#1216962)
* CVE-2023-5869: Detect integer overflow while
  computing new array dimensions. When assigning new elements to
  array subscripts that are outside the current array bounds, an
  undetected integer overflow could occur in edge cases. Memory
  stomps that are potentially exploitable for arbitrary code
  execution are possible, and so is disclosure of server memory. (bsc#1216961)
* CVE-2023-5870: Prevent the pg_signal_backend role
  from signalling background workers and autovacuum processes.
  The documentation says that pg_signal_backend cannot issue
  signals to superuser-owned processes. It was able to signal
  these background  processes, though, because they advertise a
  role OID of zero. Treat that as indicating superuser ownership.
  The security implications of cancelling one of these process
  types are fairly small so far as the core code goes (we'll just
  start another one), but extensions might add background workers
  that are more vulnerable.
  Also ensure that the is_superuser parameter is set correctly in
  such processes. No specific security consequences are known for
  that oversight, but it might be significant for some extensions.
  (bsc#1216960)


- Updated to 13.13: https://www.postgresql.org/docs/13/release-13-13.html

- Overhaul postgresql-README.SUSE and move it from the binary
  package to the noarch wrapper package.
- Change the unix domain socket location from /var/run to /run.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-16"/>
	<updated date="2023-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216022">SUSE bug 1216022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216734">SUSE bug 1216734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216960">SUSE bug 1216960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216961">SUSE bug 1216961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216962">SUSE bug 1216962</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5868/">CVE-2023-5868 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5868">CVE-2023-5868 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5869/">CVE-2023-5869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5870/">CVE-2023-5870 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5870">CVE-2023-5870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009809780" comment="postgresql13-13.13-150200.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809781" comment="postgresql13-contrib-13.13-150200.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809782" comment="postgresql13-devel-13.13-150200.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809783" comment="postgresql13-docs-13.13-150200.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809784" comment="postgresql13-llvmjit-13.13-150200.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809785" comment="postgresql13-llvmjit-devel-13.13-150200.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809786" comment="postgresql13-plperl-13.13-150200.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809787" comment="postgresql13-plpython-13.13-150200.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809788" comment="postgresql13-pltcl-13.13-150200.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809789" comment="postgresql13-server-13.13-150200.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809790" comment="postgresql13-server-devel-13.13-150200.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809791" comment="postgresql13-test-13.13-150200.5.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4504" version="1" class="patch">
	<metadata>
		<title>Security update for gcc13 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206480" ref_url="https://bugzilla.suse.com/1206480" source="BUGZILLA"/>
		<reference ref_id="1206684" ref_url="https://bugzilla.suse.com/1206684" source="BUGZILLA"/>
		<reference ref_id="1210557" ref_url="https://bugzilla.suse.com/1210557" source="BUGZILLA"/>
		<reference ref_id="1211427" ref_url="https://bugzilla.suse.com/1211427" source="BUGZILLA"/>
		<reference ref_id="1212101" ref_url="https://bugzilla.suse.com/1212101" source="BUGZILLA"/>
		<reference ref_id="1213915" ref_url="https://bugzilla.suse.com/1213915" source="BUGZILLA"/>
		<reference ref_id="1214052" ref_url="https://bugzilla.suse.com/1214052" source="BUGZILLA"/>
		<reference ref_id="1214460" ref_url="https://bugzilla.suse.com/1214460" source="BUGZILLA"/>
		<reference ref_id="1215427" ref_url="https://bugzilla.suse.com/1215427" source="BUGZILLA"/>
		<reference ref_id="1216664" ref_url="https://bugzilla.suse.com/1216664" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4039" ref_url="https://www.suse.com/security/cve/CVE-2023-4039/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017046.html" source="SUSE-SU"/>
		<description>
This update for gcc13 fixes the following issues:

This update ship the GCC 13.2 compiler suite and its base libraries.

The compiler base libraries are provided for all SUSE Linux Enterprise 15
versions and replace the same named GCC 12 ones.

The new compilers for C, C++, and Fortran are provided for SUSE Linux
Enterprise 15 SP4 and SP5, and provided in the 'Development Tools' module.

The Go, D, Ada and Modula 2 language compiler parts are available
unsupported via the PackageHub repositories.

To use gcc13 compilers use:

- install 'gcc13' or 'gcc13-c++' or one of the other 'gcc13-COMPILER' frontend packages.
- override your Makefile to use CC=gcc-13, CXX=g++-13 and similar overrides for the other languages.

For a full changelog with all new GCC13 features, check out

        https://gcc.gnu.org/gcc-13/changes.html


Detailed changes:


* CVE-2023-4039: Fixed -fstack-protector issues on aarch64 with variable
  length stack allocations.  (bsc#1214052)

- Work around third party app crash during C++ standard library initialization.  [bsc#1216664]
- Fixed that GCC13 fails to compile some packages with error: unrecognizable insn (bsc#1215427)
- Bump included newlib to version 4.3.0.
- Update to GCC trunk head (r13-5254-g05b9868b182bb9)
- Redo floatn fixinclude pick-up to simply keep what is there.
- Turn cross compiler to s390x to a glibc cross. [bsc#1214460]

- Also handle -static-pie in the default-PIE specs
- Fixed missed optimization in Skia resulting in Firefox crashes when
  building with LTO.  [bsc#1212101]
- Make libstdc++6-devel packages own their directories since they
  can be installed standalone.  [bsc#1211427]
- Add new x86-related intrinsics (amxcomplexintrin.h).
- RISC-V: Add support for inlining subword atomic operations
- Use --enable-link-serialization rather that --enable-link-mutex,
  the benefit of the former one is that the linker jobs are not
  holding tokens of the make's jobserver.
- Add cross-bpf packages.  See https://gcc.gnu.org/wiki/BPFBackEnd
  for the general state of BPF with GCC.
- Add bootstrap conditional to allow --without=bootstrap to be
  specified to speed up local builds for testing.
- Bump included newlib to version 4.3.0. 
- Also package libhwasan_preinit.o on aarch64.
- Configure external timezone database provided by the timezone
  package.  Make libstdc++6 recommend timezone to get a fully
  working std::chrono.  Install timezone when running the testsuite.
- Package libhwasan_preinit.o on x86_64.
- Fixed unwinding on aarch64 with pointer signing.  [bsc#1206684]
- Enable PRU flavour for gcc13
- update floatn fixinclude pickup to check each header separately (bsc#1206480)
- Redo floatn fixinclude pick-up to simply keep what is there. 
- Bump libgo SONAME to libgo22.
- Do not package libhwasan for biarch (32-bit architecture)
  as the extension depends on 64-bit pointers.
- Adjust floatn fixincludes guard to work with SLE12 and earlier
  SLE15.
- Depend on at least LLVM 13 for GCN cross compiler.
- Update embedded newlib to version 4.2.0
- Allow cross-pru-gcc12-bootstrap for armv7l architecture.
  PRU architecture is used for real-time MCUs embedded into TI
  armv7l and aarch64 SoCs. We need to have cross-pru-gcc12 for
  armv7l in order to build both host applications and PRU firmware
  during the same build.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-16"/>
	<updated date="2023-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206480">SUSE bug 1206480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206684">SUSE bug 1206684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210557">SUSE bug 1210557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211427">SUSE bug 1211427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212101">SUSE bug 1212101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213915">SUSE bug 1213915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214052">SUSE bug 1214052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214460">SUSE bug 1214460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215427">SUSE bug 1215427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216664">SUSE bug 1216664</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4039/">CVE-2023-4039 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4039">CVE-2023-4039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009809311" comment="cpp13-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809312" comment="cross-nvptx-gcc13-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809313" comment="cross-nvptx-newlib13-devel-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809314" comment="gcc13-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809315" comment="gcc13-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809316" comment="gcc13-PIE-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809317" comment="gcc13-ada-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809318" comment="gcc13-ada-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809319" comment="gcc13-c++-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809320" comment="gcc13-c++-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809321" comment="gcc13-d-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809322" comment="gcc13-d-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809323" comment="gcc13-fortran-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809324" comment="gcc13-fortran-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809325" comment="gcc13-go-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809326" comment="gcc13-go-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809327" comment="gcc13-info-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809328" comment="gcc13-locale-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809329" comment="gcc13-m2-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809330" comment="gcc13-m2-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809331" comment="gcc13-obj-c++-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809332" comment="gcc13-obj-c++-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809333" comment="gcc13-objc-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809334" comment="gcc13-objc-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809335" comment="libada13-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809336" comment="libada13-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809337" comment="libasan8-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809338" comment="libasan8-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809339" comment="libatomic1-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809340" comment="libatomic1-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809341" comment="libgcc_s1-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809342" comment="libgcc_s1-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809343" comment="libgdruntime4-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809344" comment="libgdruntime4-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809345" comment="libgfortran5-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809346" comment="libgfortran5-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809347" comment="libgo22-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809348" comment="libgo22-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809349" comment="libgomp1-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809350" comment="libgomp1-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809351" comment="libgphobos4-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809352" comment="libgphobos4-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809353" comment="libhwasan0-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809354" comment="libitm1-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809355" comment="libitm1-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809356" comment="liblsan0-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809357" comment="libm2cor18-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809358" comment="libm2cor18-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809359" comment="libm2iso18-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809360" comment="libm2iso18-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809361" comment="libm2log18-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809362" comment="libm2log18-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809363" comment="libm2min18-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809364" comment="libm2min18-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809365" comment="libm2pim18-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809366" comment="libm2pim18-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809367" comment="libobjc4-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809368" comment="libobjc4-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809369" comment="libquadmath0-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809370" comment="libquadmath0-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809371" comment="libstdc++6-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809372" comment="libstdc++6-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809373" comment="libstdc++6-devel-gcc13-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809374" comment="libstdc++6-devel-gcc13-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809375" comment="libstdc++6-locale-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809376" comment="libstdc++6-pp-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809377" comment="libstdc++6-pp-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809378" comment="libtsan2-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809379" comment="libubsan1-13.2.1+git7813-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809380" comment="libubsan1-32bit-13.2.1+git7813-150000.1.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4505" version="1" class="patch">
	<metadata>
		<title>Security update for libnbd (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216769" ref_url="https://bugzilla.suse.com/1216769" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5871" ref_url="https://www.suse.com/security/cve/CVE-2023-5871/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017056.html" source="SUSE-SU"/>
		<description>
This update for libnbd fixes the following issues:

- CVE-2023-5871: Fixed an assertion problem in ext-mode BLOCK_STATUS (bsc#1216769).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-16"/>
	<updated date="2023-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216769">SUSE bug 1216769</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5871/">CVE-2023-5871 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5871">CVE-2023-5871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810471" comment="libnbd-1.18.1-150300.8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810472" comment="libnbd-bash-completion-1.18.1-150300.8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810473" comment="libnbd-devel-1.18.1-150300.8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810474" comment="libnbd0-1.18.1-150300.8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810475" comment="nbdfuse-1.18.1-150300.8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810497" comment="python3-libnbd-1.18.1-150300.8.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4506" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216129" ref_url="https://bugzilla.suse.com/1216129" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45322" ref_url="https://www.suse.com/security/cve/CVE-2023-45322/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017055.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2023-45322: Fixed a use-after-free in xmlUnlinkNode() in tree.c (bsc#1216129).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-16"/>
	<updated date="2023-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216129">SUSE bug 1216129</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45322/">CVE-2023-45322 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45322">CVE-2023-45322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810388" comment="python3-libxml2-python-2.9.7-150000.3.63.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4507" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216894" ref_url="https://bugzilla.suse.com/1216894" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-44271" ref_url="https://www.suse.com/security/cve/CVE-2023-44271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017054.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

- CVE-2023-44271: Fixed uncontrolled resource consumption when textlength in an ImageDraw instance operates on a long text argument (bsc#1216894).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-16"/>
	<updated date="2023-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216894">SUSE bug 1216894</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44271/">CVE-2023-44271 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44271">CVE-2023-44271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009809862" comment="python3-Pillow-7.2.0-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809863" comment="python3-Pillow-tk-7.2.0-150300.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4508" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216377" ref_url="https://bugzilla.suse.com/1216377" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45803" ref_url="https://www.suse.com/security/cve/CVE-2023-45803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017052.html" source="SUSE-SU"/>
		<description>
This update for python-urllib3 fixes the following issues:

- CVE-2023-45803: Fix a request body leak that could occur when
  receiving a 303 HTTP response (bsc#1216377).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-16"/>
	<updated date="2023-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216377">SUSE bug 1216377</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45803/">CVE-2023-45803 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45803">CVE-2023-45803 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803402" comment="python3-urllib3-1.25.10-150300.4.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4509" version="1" class="patch">
	<metadata>
		<title>Security update for go1.21-openssl (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="1212667" ref_url="https://bugzilla.suse.com/1212667" source="BUGZILLA"/>
		<reference ref_id="1212669" ref_url="https://bugzilla.suse.com/1212669" source="BUGZILLA"/>
		<reference ref_id="1215084" ref_url="https://bugzilla.suse.com/1215084" source="BUGZILLA"/>
		<reference ref_id="1215085" ref_url="https://bugzilla.suse.com/1215085" source="BUGZILLA"/>
		<reference ref_id="1215086" ref_url="https://bugzilla.suse.com/1215086" source="BUGZILLA"/>
		<reference ref_id="1215087" ref_url="https://bugzilla.suse.com/1215087" source="BUGZILLA"/>
		<reference ref_id="1215090" ref_url="https://bugzilla.suse.com/1215090" source="BUGZILLA"/>
		<reference ref_id="1215985" ref_url="https://bugzilla.suse.com/1215985" source="BUGZILLA"/>
		<reference ref_id="1216109" ref_url="https://bugzilla.suse.com/1216109" source="BUGZILLA"/>
		<reference ref_id="1216943" ref_url="https://bugzilla.suse.com/1216943" source="BUGZILLA"/>
		<reference ref_id="1216944" ref_url="https://bugzilla.suse.com/1216944" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39318" ref_url="https://www.suse.com/security/cve/CVE-2023-39318/" source="CVE"/>
		<reference ref_id="CVE-2023-39319" ref_url="https://www.suse.com/security/cve/CVE-2023-39319/" source="CVE"/>
		<reference ref_id="CVE-2023-39320" ref_url="https://www.suse.com/security/cve/CVE-2023-39320/" source="CVE"/>
		<reference ref_id="CVE-2023-39321" ref_url="https://www.suse.com/security/cve/CVE-2023-39321/" source="CVE"/>
		<reference ref_id="CVE-2023-39322" ref_url="https://www.suse.com/security/cve/CVE-2023-39322/" source="CVE"/>
		<reference ref_id="CVE-2023-39323" ref_url="https://www.suse.com/security/cve/CVE-2023-39323/" source="CVE"/>
		<reference ref_id="CVE-2023-39325" ref_url="https://www.suse.com/security/cve/CVE-2023-39325/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="CVE-2023-45283" ref_url="https://www.suse.com/security/cve/CVE-2023-45283/" source="CVE"/>
		<reference ref_id="CVE-2023-45284" ref_url="https://www.suse.com/security/cve/CVE-2023-45284/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017050.html" source="SUSE-SU"/>
		<description>
This update for go1.21-openssl fixes the following issues:

Update to version 1.21.4.1 cut from the go1.21-openssl-fips
branch at the revision tagged go1.21.4-1-openssl-fips.

* Update to go1.21.4


go1.21.4 (released 2023-11-07) includes security fixes to the
path/filepath package, as well as bug fixes to the linker, the
runtime, the compiler, and the go/types, net/http, and
runtime/cgo packages.

* security: fix CVE-2023-45283 CVE-2023-45284 path/filepath: insecure parsing of Windows paths (bsc#1216943, bsc#1216944)
* spec: update unification rules
* cmd/compile: internal compiler error: expected struct value to have type struct
* cmd/link: split text sections for arm 32-bit
* runtime: MADV_COLLAPSE causes production performance issues on Linux
* go/types, x/tools/go/ssa: panic: type param without replacement encountered
* cmd/compile: -buildmode=c-archive produces code not suitable for use in a shared object on arm64
* net/http: http2 page fails on firefox/safari if pushing resources


Initial package go1.21-openssl version 1.21.3.1 cut from the
go1.21-openssl-fips branch at the revision tagged
go1.21.3-1-openssl-fips.  (jsc#SLE-18320)

* Go upstream merged branch dev.boringcrypto in go1.19+.
* In go1.x enable BoringCrypto via GOEXPERIMENT=boringcrypto.
* In go1.x-openssl enable FIPS mode (or boring mode as the
  package is named) either via an environment variable
  GOLANG_FIPS=1 or by virtue of booting the host in FIPS mode.
* When the operating system is operating in FIPS mode, Go
  applications which import crypto/tls/fipsonly limit operations
  to the FIPS ciphersuite.
* go1.x-openssl is delivered as two large patches to go1.x
  applying necessary modifications from the golang-fips/go GitHub
  project for the Go crypto library to use OpenSSL as the
  external cryptographic library in a FIPS compliant way.
* go1.x-openssl modifies the crypto/* packages to use OpenSSL for
  cryptographic operations.
* go1.x-openssl uses dlopen() to call into OpenSSL.
* SUSE RPM packaging introduces a fourth version digit go1.x.y.z
  corresponding to the golang-fips/go patchset tagged revision.
* Patchset improvements can be updated independently of upstream
  Go maintenance releases.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-16"/>
	<updated date="2023-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212667">SUSE bug 1212667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212669">SUSE bug 1212669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215084">SUSE bug 1215084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215085">SUSE bug 1215085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215086">SUSE bug 1215086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215087">SUSE bug 1215087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215090">SUSE bug 1215090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215985">SUSE bug 1215985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216109">SUSE bug 1216109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216943">SUSE bug 1216943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216944">SUSE bug 1216944</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39318/">CVE-2023-39318 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39318">CVE-2023-39318 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39319/">CVE-2023-39319 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39319">CVE-2023-39319 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39320/">CVE-2023-39320 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39320">CVE-2023-39320 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39321/">CVE-2023-39321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39321">CVE-2023-39321 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39322/">CVE-2023-39322 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39322">CVE-2023-39322 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39323/">CVE-2023-39323 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39323">CVE-2023-39323 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39325/">CVE-2023-39325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45283/">CVE-2023-45283 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45283">CVE-2023-45283 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45284/">CVE-2023-45284 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45284">CVE-2023-45284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009809848" comment="go1.21-openssl-1.21.4.1-150000.1.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809849" comment="go1.21-openssl-doc-1.21.4.1-150000.1.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809850" comment="go1.21-openssl-race-1.21.4.1-150000.1.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4510" version="1" class="patch">
	<metadata>
		<title>Security update for go1.20 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206346" ref_url="https://bugzilla.suse.com/1206346" source="BUGZILLA"/>
		<reference ref_id="1216943" ref_url="https://bugzilla.suse.com/1216943" source="BUGZILLA"/>
		<reference ref_id="1216944" ref_url="https://bugzilla.suse.com/1216944" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45283" ref_url="https://www.suse.com/security/cve/CVE-2023-45283/" source="CVE"/>
		<reference ref_id="CVE-2023-45284" ref_url="https://www.suse.com/security/cve/CVE-2023-45284/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017049.html" source="SUSE-SU"/>
		<description>
This update for go1.20 fixes the following issues:

go1.20.11 (released 2023-11-07) includes security fixes to the
path/filepath package, as well as bug fixes to the linker and the
net/http package.

* security: fix CVE-2023-45283 CVE-2023-45284 path/filepath: insecure parsing of Windows paths (bsc#1216943, bsc#1216944)
* cmd/link: split text sections for arm 32-bit
* net/http: http2 page fails on firefox/safari if pushing resources
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-16"/>
	<updated date="2023-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206346">SUSE bug 1206346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216943">SUSE bug 1216943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216944">SUSE bug 1216944</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45283/">CVE-2023-45283 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45283">CVE-2023-45283 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45284/">CVE-2023-45284 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45284">CVE-2023-45284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009809851" comment="go1.20-1.20.11-150000.1.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809852" comment="go1.20-doc-1.20.11-150000.1.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809853" comment="go1.20-race-1.20.11-150000.1.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4511" version="1" class="patch">
	<metadata>
		<title>Security update for go1.21 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="1216943" ref_url="https://bugzilla.suse.com/1216943" source="BUGZILLA"/>
		<reference ref_id="1216944" ref_url="https://bugzilla.suse.com/1216944" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45283" ref_url="https://www.suse.com/security/cve/CVE-2023-45283/" source="CVE"/>
		<reference ref_id="CVE-2023-45284" ref_url="https://www.suse.com/security/cve/CVE-2023-45284/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017048.html" source="SUSE-SU"/>
		<description>
This update for go1.21 fixes the following issues:

go1.21.4 (released 2023-11-07) includes security fixes to the
path/filepath package, as well as bug fixes to the linker, the
runtime, the compiler, and the go/types, net/http, and
runtime/cgo packages.

* security: fix CVE-2023-45283 CVE-2023-45284 path/filepath: insecure parsing of Windows paths (bsc#1216943, bsc#1216944)
* spec: update unification rules
* cmd/compile: internal compiler error: expected struct value to have type struct
* cmd/link: split text sections for arm 32-bit
* runtime: MADV_COLLAPSE causes production performance issues on Linux
* go/types, x/tools/go/ssa: panic: type param without replacement encountered
* cmd/compile: -buildmode=c-archive produces code not suitable for use in a shared object on arm64
* net/http: http2 page fails on firefox/safari if pushing resources
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-16"/>
	<updated date="2023-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216943">SUSE bug 1216943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216944">SUSE bug 1216944</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45283/">CVE-2023-45283 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45283">CVE-2023-45283 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45284/">CVE-2023-45284 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45284">CVE-2023-45284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009809854" comment="go1.21-1.21.4-150000.1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809855" comment="go1.21-doc-1.21.4-150000.1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809856" comment="go1.21-race-1.21.4-150000.1.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4512" version="1" class="patch">
	<metadata>
		<title>Security update for go1.20-openssl (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206346" ref_url="https://bugzilla.suse.com/1206346" source="BUGZILLA"/>
		<reference ref_id="1215985" ref_url="https://bugzilla.suse.com/1215985" source="BUGZILLA"/>
		<reference ref_id="1216109" ref_url="https://bugzilla.suse.com/1216109" source="BUGZILLA"/>
		<reference ref_id="1216943" ref_url="https://bugzilla.suse.com/1216943" source="BUGZILLA"/>
		<reference ref_id="1216944" ref_url="https://bugzilla.suse.com/1216944" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39323" ref_url="https://www.suse.com/security/cve/CVE-2023-39323/" source="CVE"/>
		<reference ref_id="CVE-2023-39325" ref_url="https://www.suse.com/security/cve/CVE-2023-39325/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="CVE-2023-45283" ref_url="https://www.suse.com/security/cve/CVE-2023-45283/" source="CVE"/>
		<reference ref_id="CVE-2023-45284" ref_url="https://www.suse.com/security/cve/CVE-2023-45284/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017047.html" source="SUSE-SU"/>
		<description>
This update for go1.20-openssl fixes the following issues:

Update to version 1.20.11.1 cut from the go1.20-openssl-fips
branch at the revision tagged go1.20.11-1-openssl-fips.

* Update to go1.20.11


go1.20.11 (released 2023-11-07) includes security fixes to the
path/filepath package, as well as bug fixes to the linker and the
net/http package.

* security: fix CVE-2023-45283 CVE-2023-45284 path/filepath: insecure parsing of Windows paths (bsc#1216943, bsc#1216944)
* cmd/link: split text sections for arm 32-bit
* net/http: http2 page fails on firefox/safari if pushing resources


Update to version 1.20.10.1 cut from the go1.20-openssl-fips
branch at the revision tagged go1.20.10-1-openssl-fips.

* Update to go1.20.10


go1.20.10 (released 2023-10-10) includes a security fix to the
net/http package.

* security: fix CVE-2023-39325 CVE-2023-44487 net/http: rapid stream resets can cause excessive work (bsc#1216109)

  
go1.20.9 (released 2023-10-05) includes one security fixes to the
cmd/go package, as well as bug fixes to the go command and the
linker.

* security: fix CVE-2023-39323 cmd/go: line directives allows arbitrary execution during build (bsc#1215985)
* cmd/link: issues with Apple's new linker in Xcode 15 beta
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-16"/>
	<updated date="2023-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206346">SUSE bug 1206346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215985">SUSE bug 1215985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216109">SUSE bug 1216109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216943">SUSE bug 1216943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216944">SUSE bug 1216944</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39323/">CVE-2023-39323 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39323">CVE-2023-39323 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39325/">CVE-2023-39325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45283/">CVE-2023-45283 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45283">CVE-2023-45283 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45284/">CVE-2023-45284 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45284">CVE-2023-45284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009809857" comment="go1.20-openssl-1.20.11.1-150000.1.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809858" comment="go1.20-openssl-doc-1.20.11.1-150000.1.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809859" comment="go1.20-openssl-race-1.20.11.1-150000.1.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4513" version="1" class="patch">
	<metadata>
		<title>Security update for frr (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216626" ref_url="https://bugzilla.suse.com/1216626" source="BUGZILLA"/>
		<reference ref_id="1216627" ref_url="https://bugzilla.suse.com/1216627" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46752" ref_url="https://www.suse.com/security/cve/CVE-2023-46752/" source="CVE"/>
		<reference ref_id="CVE-2023-46753" ref_url="https://www.suse.com/security/cve/CVE-2023-46753/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017060.html" source="SUSE-SU"/>
		<description>
This update for frr fixes the following issues:

- CVE-2023-46753: Fixed a crash caused from a crafted BGP UPDATE message. (bsc#1216626)
- CVE-2023-46752: Fixed a crash caused from a mishandled malformed MP_REACH_NLRI data. (bsc#1216627)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-17"/>
	<updated date="2023-11-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216626">SUSE bug 1216626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216627">SUSE bug 1216627</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46752/">CVE-2023-46752 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46752">CVE-2023-46752 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46753/">CVE-2023-46753 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46753">CVE-2023-46753 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009807734" comment="frr-8.4-150500.4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807735" comment="frr-devel-8.4-150500.4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807736" comment="libfrr0-8.4-150500.4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807737" comment="libfrr_pb0-8.4-150500.4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807738" comment="libfrrcares0-8.4-150500.4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807739" comment="libfrrfpm_pb0-8.4-150500.4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807740" comment="libfrrospfapiclient0-8.4-150500.4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807741" comment="libfrrsnmp0-8.4-150500.4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807742" comment="libfrrzmq0-8.4-150500.4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009807743" comment="libmlag_pb0-8.4-150500.4.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4514" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1215145" ref_url="https://bugzilla.suse.com/1215145" source="BUGZILLA"/>
		<reference ref_id="1215474" ref_url="https://bugzilla.suse.com/1215474" source="BUGZILLA"/>
		<reference ref_id="1215746" ref_url="https://bugzilla.suse.com/1215746" source="BUGZILLA"/>
		<reference ref_id="1215747" ref_url="https://bugzilla.suse.com/1215747" source="BUGZILLA"/>
		<reference ref_id="1215748" ref_url="https://bugzilla.suse.com/1215748" source="BUGZILLA"/>
		<reference ref_id="1216654" ref_url="https://bugzilla.suse.com/1216654" source="BUGZILLA"/>
		<reference ref_id="1216807" ref_url="https://bugzilla.suse.com/1216807" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-20588" ref_url="https://www.suse.com/security/cve/CVE-2023-20588/" source="CVE"/>
		<reference ref_id="CVE-2023-34322" ref_url="https://www.suse.com/security/cve/CVE-2023-34322/" source="CVE"/>
		<reference ref_id="CVE-2023-34325" ref_url="https://www.suse.com/security/cve/CVE-2023-34325/" source="CVE"/>
		<reference ref_id="CVE-2023-34326" ref_url="https://www.suse.com/security/cve/CVE-2023-34326/" source="CVE"/>
		<reference ref_id="CVE-2023-34327" ref_url="https://www.suse.com/security/cve/CVE-2023-34327/" source="CVE"/>
		<reference ref_id="CVE-2023-34328" ref_url="https://www.suse.com/security/cve/CVE-2023-34328/" source="CVE"/>
		<reference ref_id="CVE-2023-46835" ref_url="https://www.suse.com/security/cve/CVE-2023-46835/" source="CVE"/>
		<reference ref_id="CVE-2023-46836" ref_url="https://www.suse.com/security/cve/CVE-2023-46836/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017059.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2023-20588: AMD CPU transitional execution leak via division by zero (XSA-439) (bsc#1215474).
- CVE-2023-34322: top-level shadow reference dropped too early for 64-bit PV guests (XSA-438) (bsc#1215145).
- CVE-2023-34325: Multiple vulnerabilities in libfsimage disk handling (XSA-443) (bsc#1215747).
- CVE-2023-34326: x86/AMD: missing IOMMU TLB flushing (XSA-442) (bsc#1215746).
- CVE-2023-34327,CVE-2023-34328: x86/AMD: Debug Mask handling (XSA-444) (bsc#1215748).
- CVE-2023-46835: x86/AMD: mismatch in IOMMU quarantine page table levels (XSA-445) (bsc#1216654).
- CVE-2023-46836: x86: BTC/SRSO fixes not fully effective (XSA-446) (bsc#1216807).

- Upstream bug fixes (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-17"/>
	<updated date="2023-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215145">SUSE bug 1215145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215474">SUSE bug 1215474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215746">SUSE bug 1215746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215747">SUSE bug 1215747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215748">SUSE bug 1215748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216654">SUSE bug 1216654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216807">SUSE bug 1216807</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20588/">CVE-2023-20588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20588">CVE-2023-20588 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34322/">CVE-2023-34322 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34322">CVE-2023-34322 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-34325/">CVE-2023-34325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34325">CVE-2023-34325 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34326/">CVE-2023-34326 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34326">CVE-2023-34326 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34327/">CVE-2023-34327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34327">CVE-2023-34327 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34328/">CVE-2023-34328 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34328">CVE-2023-34328 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46835/">CVE-2023-46835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46835">CVE-2023-46835 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46836/">CVE-2023-46836 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46836">CVE-2023-46836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810481" comment="xen-4.17.2_08-150500.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810482" comment="xen-devel-4.17.2_08-150500.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810483" comment="xen-doc-html-4.17.2_08-150500.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810484" comment="xen-libs-4.17.2_08-150500.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810485" comment="xen-libs-32bit-4.17.2_08-150500.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810486" comment="xen-tools-4.17.2_08-150500.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810487" comment="xen-tools-domU-4.17.2_08-150500.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810488" comment="xen-tools-xendomains-wait-disk-4.17.2_08-150500.3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4515" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql14 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216022" ref_url="https://bugzilla.suse.com/1216022" source="BUGZILLA"/>
		<reference ref_id="1216734" ref_url="https://bugzilla.suse.com/1216734" source="BUGZILLA"/>
		<reference ref_id="1216960" ref_url="https://bugzilla.suse.com/1216960" source="BUGZILLA"/>
		<reference ref_id="1216961" ref_url="https://bugzilla.suse.com/1216961" source="BUGZILLA"/>
		<reference ref_id="1216962" ref_url="https://bugzilla.suse.com/1216962" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5868" ref_url="https://www.suse.com/security/cve/CVE-2023-5868/" source="CVE"/>
		<reference ref_id="CVE-2023-5869" ref_url="https://www.suse.com/security/cve/CVE-2023-5869/" source="CVE"/>
		<reference ref_id="CVE-2023-5870" ref_url="https://www.suse.com/security/cve/CVE-2023-5870/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017120.html" source="SUSE-SU"/>
		<description>
This update for postgresql14 fixes the following issues:

Security issues fixed:

* CVE-2023-5868: Fix handling of unknown-type
  arguments in DISTINCT 'any' aggregate functions. This error led
  to a text-type value being interpreted as an unknown-type value
  (that is, a zero-terminated string) at runtime. This could
  result in disclosure of server memory following the text value. (bsc#1216962)
* CVE-2023-5869: Detect integer overflow while
  computing new array dimensions. When assigning new elements to
  array subscripts that are outside the current array bounds, an
  undetected integer overflow could occur in edge cases. Memory
  stomps that are potentially exploitable for arbitrary code
  execution are possible, and so is disclosure of server memory. (bsc#1216961)
* CVE-2023-5870: Prevent the pg_signal_backend role
  from signalling background workers and autovacuum processes.
  The documentation says that pg_signal_backend cannot issue
  signals to superuser-owned processes. It was able to signal
  these background  processes, though, because they advertise a
  role OID of zero. Treat that as indicating superuser ownership.
  The security implications of cancelling one of these process
  types are fairly small so far as the core code goes (we'll just
  start another one), but extensions might add background workers
  that are more vulnerable.
  Also ensure that the is_superuser parameter is set correctly in
  such processes. No specific security consequences are known for
  that oversight, but it might be significant for some extensions.
  (bsc#1216960)


- update to 14.10: https://www.postgresql.org/docs/14/release-14-10.html

- Overhaul postgresql-README.SUSE and move it from the binary
  package to the noarch wrapper package.
- Change the unix domain socket location from /var/run to /run.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-20"/>
	<updated date="2023-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216022">SUSE bug 1216022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216734">SUSE bug 1216734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216960">SUSE bug 1216960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216961">SUSE bug 1216961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216962">SUSE bug 1216962</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5868/">CVE-2023-5868 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5868">CVE-2023-5868 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5869/">CVE-2023-5869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5870/">CVE-2023-5870 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5870">CVE-2023-5870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009809768" comment="postgresql14-14.10-150200.5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809769" comment="postgresql14-contrib-14.10-150200.5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809770" comment="postgresql14-devel-14.10-150200.5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809771" comment="postgresql14-docs-14.10-150200.5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809772" comment="postgresql14-llvmjit-14.10-150200.5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809773" comment="postgresql14-llvmjit-devel-14.10-150200.5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809774" comment="postgresql14-plperl-14.10-150200.5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809775" comment="postgresql14-plpython-14.10-150200.5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809776" comment="postgresql14-pltcl-14.10-150200.5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809777" comment="postgresql14-server-14.10-150200.5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809778" comment="postgresql14-server-devel-14.10-150200.5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809779" comment="postgresql14-test-14.10-150200.5.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4516" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql15, postgresql16 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1122892" ref_url="https://bugzilla.suse.com/1122892" source="BUGZILLA"/>
		<reference ref_id="1179231" ref_url="https://bugzilla.suse.com/1179231" source="BUGZILLA"/>
		<reference ref_id="1206796" ref_url="https://bugzilla.suse.com/1206796" source="BUGZILLA"/>
		<reference ref_id="1209208" ref_url="https://bugzilla.suse.com/1209208" source="BUGZILLA"/>
		<reference ref_id="1216022" ref_url="https://bugzilla.suse.com/1216022" source="BUGZILLA"/>
		<reference ref_id="1216734" ref_url="https://bugzilla.suse.com/1216734" source="BUGZILLA"/>
		<reference ref_id="1216960" ref_url="https://bugzilla.suse.com/1216960" source="BUGZILLA"/>
		<reference ref_id="1216961" ref_url="https://bugzilla.suse.com/1216961" source="BUGZILLA"/>
		<reference ref_id="1216962" ref_url="https://bugzilla.suse.com/1216962" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5868" ref_url="https://www.suse.com/security/cve/CVE-2023-5868/" source="CVE"/>
		<reference ref_id="CVE-2023-5869" ref_url="https://www.suse.com/security/cve/CVE-2023-5869/" source="CVE"/>
		<reference ref_id="CVE-2023-5870" ref_url="https://www.suse.com/security/cve/CVE-2023-5870/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017129.html" source="SUSE-SU"/>
		<description>
This update for postgresql, postgresql15, postgresql16 fixes the following issues:

This update ships postgresql 16.

Security issues fixed:

* CVE-2023-5868: Fix handling of unknown-type
  arguments in DISTINCT 'any' aggregate functions. This error led
  to a text-type value being interpreted as an unknown-type value
  (that is, a zero-terminated string) at runtime. This could
  result in disclosure of server memory following the text value. (bsc#1216962)
* CVE-2023-5869: Detect integer overflow while
  computing new array dimensions. When assigning new elements to
  array subscripts that are outside the current array bounds, an
  undetected integer overflow could occur in edge cases. Memory
  stomps that are potentially exploitable for arbitrary code
  execution are possible, and so is disclosure of server memory. (bsc#1216961)
* CVE-2023-5870: Prevent the pg_signal_backend role
  from signalling background workers and autovacuum processes.
  The documentation says that pg_signal_backend cannot issue
  signals to superuser-owned processes. It was able to signal
  these background  processes, though, because they advertise a
  role OID of zero. Treat that as indicating superuser ownership.
  The security implications of cancelling one of these process
  types are fairly small so far as the core code goes (we'll just
  start another one), but extensions might add background workers
  that are more vulnerable.
  Also ensure that the is_superuser parameter is set correctly in
  such processes. No specific security consequences are known for
  that oversight, but it might be significant for some extensions.
  (bsc#1216960)

Changes in postgresql16:

- Upgrade to 16.1:

  * https://www.postgresql.org/about/news/2715
  * https://www.postgresql.org/docs/16/release-16.html
  * https://www.postgresql.org/docs/16/release-16-1.html

- Overhaul postgresql-README.SUSE and move it from the binary
  package to the noarch wrapper package.
- Change the unix domain socket location from /var/run to /run.

Changes in postgresql15:

- Update to 15.5 https://www.postgresql.org/docs/15/release-15-5.html

- The libs and mini package are now provided by postgresql16.

- Overhaul postgresql-README.SUSE and move it from the binary
  package to the noarch wrapper package.
- Change the unix domain socket location from /var/run to /run.

Changes in postgresql:

- Interlock version and release of all noarch packages except for
  the postgresql-docs.
- bsc#1122892: Add a sysconfig variable for initdb.
- Overhaul postgresql-README.SUSE and move it from the binary
  package to the noarch wrapper package.
- bsc#1179231: Add an explanation for the /tmp -&gt; /run/postgresql
  move and permission change.
- Add postgresql-README as a separate source file.
- bsc#1209208: Drop hard dependency on systemd
- bsc#1206796: Refine the distinction of where to use sysusers and
  use bcond to have the expression only in one place.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-21"/>
	<updated date="2023-11-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1122892">SUSE bug 1122892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179231">SUSE bug 1179231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206796">SUSE bug 1206796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209208">SUSE bug 1209208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216022">SUSE bug 1216022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216734">SUSE bug 1216734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216960">SUSE bug 1216960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216961">SUSE bug 1216961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216962">SUSE bug 1216962</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5868/">CVE-2023-5868 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5868">CVE-2023-5868 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5869/">CVE-2023-5869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5870/">CVE-2023-5870 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5870">CVE-2023-5870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009809727" comment="libecpg6-16.1-150200.5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809728" comment="libecpg6-32bit-16.1-150200.5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809729" comment="libpq5-16.1-150200.5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809730" comment="libpq5-32bit-16.1-150200.5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809893" comment="postgresql-16-150500.10.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809894" comment="postgresql-contrib-16-150500.10.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809895" comment="postgresql-devel-16-150500.10.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809896" comment="postgresql-docs-16-150500.10.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809897" comment="postgresql-llvmjit-16-150500.10.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809898" comment="postgresql-llvmjit-devel-16-150500.10.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809899" comment="postgresql-plperl-16-150500.10.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809900" comment="postgresql-plpython-16-150500.10.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809901" comment="postgresql-pltcl-16-150500.10.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809902" comment="postgresql-server-16-150500.10.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809903" comment="postgresql-server-devel-16-150500.10.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809904" comment="postgresql-test-16-150500.10.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809743" comment="postgresql15-15.5-150200.5.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809744" comment="postgresql15-contrib-15.5-150200.5.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809745" comment="postgresql15-devel-15.5-150200.5.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809746" comment="postgresql15-docs-15.5-150200.5.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809747" comment="postgresql15-llvmjit-15.5-150200.5.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809748" comment="postgresql15-llvmjit-devel-15.5-150200.5.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809749" comment="postgresql15-plperl-15.5-150200.5.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809750" comment="postgresql15-plpython-15.5-150200.5.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809751" comment="postgresql15-pltcl-15.5-150200.5.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809752" comment="postgresql15-server-15.5-150200.5.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809753" comment="postgresql15-server-devel-15.5-150200.5.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809754" comment="postgresql15-test-15.5-150200.5.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809755" comment="postgresql16-16.1-150200.5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809756" comment="postgresql16-contrib-16.1-150200.5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809757" comment="postgresql16-devel-16.1-150200.5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809758" comment="postgresql16-devel-mini-16.1-150200.5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809759" comment="postgresql16-docs-16.1-150200.5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809760" comment="postgresql16-llvmjit-16.1-150200.5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809761" comment="postgresql16-llvmjit-devel-16.1-150200.5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809762" comment="postgresql16-plperl-16.1-150200.5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809763" comment="postgresql16-plpython-16.1-150200.5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809764" comment="postgresql16-pltcl-16.1-150200.5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809765" comment="postgresql16-server-16.1-150200.5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809766" comment="postgresql16-server-devel-16.1-150200.5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809767" comment="postgresql16-test-16.1-150200.5.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4517" version="1" class="patch">
	<metadata>
		<title>Security update for libreoffice (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1209243" ref_url="https://bugzilla.suse.com/1209243" source="BUGZILLA"/>
		<reference ref_id="1212444" ref_url="https://bugzilla.suse.com/1212444" source="BUGZILLA"/>
		<reference ref_id="1215595" ref_url="https://bugzilla.suse.com/1215595" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1183" ref_url="https://www.suse.com/security/cve/CVE-2023-1183/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017133.html" source="SUSE-SU"/>
		<description>
This update for fixes the following issues:

libreoffice was updated rom 7.5.4.1 to 7.6.2.1 (jsc#PED-6799, jsc#PED-6800):

- For the highlights of changes of version 7.6 please consult the official release notes:

  * https://wiki.documentfoundation.org/ReleaseNotes/7.6

- You can check for each minor release notes here:

  * https://wiki.documentfoundation.org/Releases/7.6.2/RC1
  * https://wiki.documentfoundation.org/Releases/7.6.1/RC2
  * https://wiki.documentfoundation.org/Releases/7.6.1/RC1
  * https://wiki.documentfoundation.org/Releases/7.6.0/RC3
  * https://wiki.documentfoundation.org/Releases/7.6.0/RC2
  * https://wiki.documentfoundation.org/Releases/7.6.0/RC1

- Security issues fixed:

  * CVE-2023-1183: Fixed arbitrary file write in LibreOffice Base (bsc#1212444, bsc#1209243)

- Updated bundled dependencies:

  * boost version update from 1_80_0 to 1_82_0
  * curl version update from 8.0.1 to 8.2.1
  * icu4c-data version update from 72_1 to 73_2
  * icu4c version update from 72_1 to 73_2
  * pdfium version update from 5408 to 5778
  * poppler version update from 22.12.0 to 23.06.0
  * poppler-data version update from 0.4.11 to 0.4.12
  * skia version from m103-b301ff025004c9cd82816c86c547588e6c24b466 to 
    skia-m111-a31e897fb3dcbc96b2b40999751611d029bf5404

- New bundled dependencies:

  * graphite2-minimal-1.3.14.tgz
  * harfbuzz-8.0.0.tar.xz

- New build dependencies:

  * frozen-devel
  * liborcus-0_18-0
  * libixion
  * mdds-2_1

- New runtime dependencies:

  * `libreoffice-draw` requires `libreoffice-impress` (bsc#1215595)

frozen was implemented:

- New Libreoffice package dependency

libixion was updated to version 0.18.1:
    
- Updated to 0.18.1:

  * Fixed a 32-bit Linux build issue as discovered on Debian, due to a clash on
    two 32-bit unsigned integer types being used with std::variant.

- Updated to 0.18.0:

  * Removed the formula_model_access interface from model_context, and switched
    to using model_context directly everywhere.
  * Revised formula_tokens_t type to remove use of std::unique_ptr for each
    formula_token instance.  This should improve memory locality when
    iterating through an array of formula token values.  A similar change has
    also been made to lexer_tokens_t and lexer_token types.
  * Added 41 built-in functions
  * Added support for multi-sheet references in Excel A1 and Excel R1C1
    grammers.

liborcus was updated to version 0.18.1:

- Updated to 0.18.1:

  * sax parser:

    + added support for optionally skipping multiple BOM's in the beginning of
      XML stream.  This affects all XML-based file format filters such as
      xls-xml (aka Excel 2003 XML).

  * xml-map:

    + fixed a bug where an XML document consisting of simple single-column
      records were not properly converted to sheet data

  * xls-xml:

    + fixed a bug where the filter would always pass border color even when it
      was not set

  * buildsystem:

    + added new configure switches --without-benchmark and --without-doc-example
      to optinally skip building of these two directories

mdds-2_1 was implemented:

- New Libreoffice package dependency

		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-21"/>
	<updated date="2023-11-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209243">SUSE bug 1209243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212444">SUSE bug 1212444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215595">SUSE bug 1215595</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-1183/">CVE-2023-1183 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1183">CVE-2023-1183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811399" comment="frozen-devel-1.1.1-150400.9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811400" comment="libixion-0_18-0-0.18.1-150400.14.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811401" comment="libixion-devel-0.18.1-150400.14.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811402" comment="libixion-tools-0.18.1-150400.14.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811403" comment="liborcus-0_18-0-0.18.1-150400.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811404" comment="liborcus-devel-0.18.1-150400.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811405" comment="liborcus-tools-0.18.1-150400.13.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811406" comment="libreoffice-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811407" comment="libreoffice-base-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811408" comment="libreoffice-base-drivers-postgresql-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811409" comment="libreoffice-branding-upstream-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811410" comment="libreoffice-calc-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811411" comment="libreoffice-calc-extensions-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811412" comment="libreoffice-draw-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811413" comment="libreoffice-filters-optional-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811414" comment="libreoffice-gdb-pretty-printers-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811415" comment="libreoffice-glade-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811416" comment="libreoffice-gnome-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811417" comment="libreoffice-gtk3-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811418" comment="libreoffice-icon-themes-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811419" comment="libreoffice-impress-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811420" comment="libreoffice-l10n-af-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811421" comment="libreoffice-l10n-am-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811422" comment="libreoffice-l10n-ar-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811423" comment="libreoffice-l10n-as-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811424" comment="libreoffice-l10n-ast-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811425" comment="libreoffice-l10n-be-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811426" comment="libreoffice-l10n-bg-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811427" comment="libreoffice-l10n-bn-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811428" comment="libreoffice-l10n-bn_IN-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811429" comment="libreoffice-l10n-bo-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811430" comment="libreoffice-l10n-br-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811431" comment="libreoffice-l10n-brx-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811432" comment="libreoffice-l10n-bs-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811433" comment="libreoffice-l10n-ca-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811434" comment="libreoffice-l10n-ca_valencia-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811435" comment="libreoffice-l10n-ckb-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811436" comment="libreoffice-l10n-cs-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811437" comment="libreoffice-l10n-cy-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811438" comment="libreoffice-l10n-da-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811439" comment="libreoffice-l10n-de-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811440" comment="libreoffice-l10n-dgo-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811441" comment="libreoffice-l10n-dsb-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811442" comment="libreoffice-l10n-dz-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811443" comment="libreoffice-l10n-el-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811444" comment="libreoffice-l10n-en-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811445" comment="libreoffice-l10n-en_GB-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811446" comment="libreoffice-l10n-en_ZA-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811447" comment="libreoffice-l10n-eo-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811448" comment="libreoffice-l10n-es-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811449" comment="libreoffice-l10n-et-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811450" comment="libreoffice-l10n-eu-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811451" comment="libreoffice-l10n-fa-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811452" comment="libreoffice-l10n-fi-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811453" comment="libreoffice-l10n-fr-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811454" comment="libreoffice-l10n-fur-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811455" comment="libreoffice-l10n-fy-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811456" comment="libreoffice-l10n-ga-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811457" comment="libreoffice-l10n-gd-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811458" comment="libreoffice-l10n-gl-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811459" comment="libreoffice-l10n-gu-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811460" comment="libreoffice-l10n-gug-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811461" comment="libreoffice-l10n-he-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811462" comment="libreoffice-l10n-hi-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811463" comment="libreoffice-l10n-hr-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811464" comment="libreoffice-l10n-hsb-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811465" comment="libreoffice-l10n-hu-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811466" comment="libreoffice-l10n-id-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811467" comment="libreoffice-l10n-is-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811468" comment="libreoffice-l10n-it-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811469" comment="libreoffice-l10n-ja-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811470" comment="libreoffice-l10n-ka-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811471" comment="libreoffice-l10n-kab-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811472" comment="libreoffice-l10n-kk-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811473" comment="libreoffice-l10n-km-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811474" comment="libreoffice-l10n-kmr_Latn-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811475" comment="libreoffice-l10n-kn-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811476" comment="libreoffice-l10n-ko-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811477" comment="libreoffice-l10n-kok-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811478" comment="libreoffice-l10n-ks-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811479" comment="libreoffice-l10n-lb-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811480" comment="libreoffice-l10n-lo-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811481" comment="libreoffice-l10n-lt-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811482" comment="libreoffice-l10n-lv-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811483" comment="libreoffice-l10n-mai-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811484" comment="libreoffice-l10n-mk-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811485" comment="libreoffice-l10n-ml-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811486" comment="libreoffice-l10n-mn-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811487" comment="libreoffice-l10n-mni-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811488" comment="libreoffice-l10n-mr-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811489" comment="libreoffice-l10n-my-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811490" comment="libreoffice-l10n-nb-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811491" comment="libreoffice-l10n-ne-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811492" comment="libreoffice-l10n-nl-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811493" comment="libreoffice-l10n-nn-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811494" comment="libreoffice-l10n-nr-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811495" comment="libreoffice-l10n-nso-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811496" comment="libreoffice-l10n-oc-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811497" comment="libreoffice-l10n-om-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811498" comment="libreoffice-l10n-or-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811499" comment="libreoffice-l10n-pa-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811500" comment="libreoffice-l10n-pl-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811501" comment="libreoffice-l10n-pt_BR-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811502" comment="libreoffice-l10n-pt_PT-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811503" comment="libreoffice-l10n-ro-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811504" comment="libreoffice-l10n-ru-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811505" comment="libreoffice-l10n-rw-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811506" comment="libreoffice-l10n-sa_IN-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811507" comment="libreoffice-l10n-sat-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811508" comment="libreoffice-l10n-sd-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811509" comment="libreoffice-l10n-si-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811510" comment="libreoffice-l10n-sid-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811511" comment="libreoffice-l10n-sk-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811512" comment="libreoffice-l10n-sl-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811513" comment="libreoffice-l10n-sq-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811514" comment="libreoffice-l10n-sr-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811515" comment="libreoffice-l10n-ss-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811516" comment="libreoffice-l10n-st-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811517" comment="libreoffice-l10n-sv-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811518" comment="libreoffice-l10n-sw_TZ-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811519" comment="libreoffice-l10n-szl-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811520" comment="libreoffice-l10n-ta-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811521" comment="libreoffice-l10n-te-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811522" comment="libreoffice-l10n-tg-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811523" comment="libreoffice-l10n-th-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811524" comment="libreoffice-l10n-tn-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811525" comment="libreoffice-l10n-tr-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811526" comment="libreoffice-l10n-ts-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811527" comment="libreoffice-l10n-tt-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811528" comment="libreoffice-l10n-ug-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811529" comment="libreoffice-l10n-uk-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811530" comment="libreoffice-l10n-uz-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811531" comment="libreoffice-l10n-ve-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811532" comment="libreoffice-l10n-vec-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811533" comment="libreoffice-l10n-vi-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811534" comment="libreoffice-l10n-xh-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811535" comment="libreoffice-l10n-zh_CN-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811536" comment="libreoffice-l10n-zh_TW-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811537" comment="libreoffice-l10n-zu-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811538" comment="libreoffice-librelogo-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811539" comment="libreoffice-mailmerge-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811540" comment="libreoffice-math-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811541" comment="libreoffice-officebean-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811542" comment="libreoffice-pyuno-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811543" comment="libreoffice-qt5-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811544" comment="libreoffice-sdk-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811545" comment="libreoffice-sdk-doc-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811546" comment="libreoffice-writer-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811547" comment="libreoffice-writer-extensions-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811548" comment="libreofficekit-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811549" comment="libreofficekit-devel-7.6.2.1-150400.17.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811550" comment="mdds-2_1-devel-2.1.1-150400.9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811551" comment="python3-libixion-0.18.1-150400.14.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811552" comment="python3-liborcus-0.18.1-150400.13.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4518" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215278" ref_url="https://bugzilla.suse.com/1215278" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-23583" ref_url="https://www.suse.com/security/cve/CVE-2023-23583/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017131.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to Intel CPU Microcode 20231114 release. (bsc#1215278)
- CVE-2023-23583: Fixed potential CPU deadlocks or privilege escalation. (bsc#1215278)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-21"/>
	<updated date="2023-11-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215278">SUSE bug 1215278</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23583/">CVE-2023-23583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23583">CVE-2023-23583 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810835" comment="ucode-intel-20231114-150200.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4519" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215947" ref_url="https://bugzilla.suse.com/1215947" source="BUGZILLA"/>
		<reference ref_id="1216419" ref_url="https://bugzilla.suse.com/1216419" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38470" ref_url="https://www.suse.com/security/cve/CVE-2023-38470/" source="CVE"/>
		<reference ref_id="CVE-2023-38473" ref_url="https://www.suse.com/security/cve/CVE-2023-38473/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017144.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2023-38470: Ensure each label is at least one byte long (bsc#1215947).
- CVE-2023-38473: Fixed a reachable assertion when parsing a host name (bsc#1216419).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-21"/>
	<updated date="2023-11-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215947">SUSE bug 1215947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216419">SUSE bug 1216419</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38470/">CVE-2023-38470 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38470">CVE-2023-38470 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38473/">CVE-2023-38473 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38473">CVE-2023-38473 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009809804" comment="avahi-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809805" comment="avahi-autoipd-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809806" comment="avahi-compat-howl-devel-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809807" comment="avahi-compat-mDNSResponder-devel-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809808" comment="avahi-lang-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809809" comment="avahi-utils-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809810" comment="avahi-utils-gtk-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809811" comment="libavahi-client3-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809812" comment="libavahi-client3-32bit-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809813" comment="libavahi-common3-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809814" comment="libavahi-common3-32bit-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809815" comment="libavahi-core7-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809816" comment="libavahi-devel-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809817" comment="libavahi-glib-devel-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809818" comment="libavahi-glib1-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809819" comment="libavahi-glib1-32bit-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809820" comment="libavahi-gobject-devel-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809821" comment="libavahi-gobject0-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809822" comment="libavahi-libevent1-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809823" comment="libavahi-qt5-1-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809824" comment="libavahi-qt5-devel-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809825" comment="libavahi-ui-gtk3-0-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809826" comment="libdns_sd-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809827" comment="libdns_sd-32bit-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809828" comment="libhowl0-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809829" comment="python3-avahi-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809830" comment="python3-avahi-gtk-0.8-150400.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809831" comment="typelib-1_0-Avahi-0_6-0.8-150400.7.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4520" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216129" ref_url="https://bugzilla.suse.com/1216129" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45322" ref_url="https://www.suse.com/security/cve/CVE-2023-45322/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017143.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2023-45322: Fixed a use-after-free in xmlUnlinkNode() in tree.c (bsc#1216129).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-21"/>
	<updated date="2023-11-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216129">SUSE bug 1216129</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45322/">CVE-2023-45322 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45322">CVE-2023-45322 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810356" comment="libxml2-2-2.10.3-150500.5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810357" comment="libxml2-2-32bit-2.10.3-150500.5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810358" comment="libxml2-devel-2.10.3-150500.5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810359" comment="libxml2-devel-32bit-2.10.3-150500.5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810360" comment="libxml2-doc-2.10.3-150500.5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810361" comment="libxml2-tools-2.10.3-150500.5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810362" comment="python3-libxml2-2.10.3-150500.5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810363" comment="python311-libxml2-2.10.3-150500.5.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4521" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211968" ref_url="https://bugzilla.suse.com/1211968" source="BUGZILLA"/>
		<reference ref_id="1216374" ref_url="https://bugzilla.suse.com/1216374" source="BUGZILLA"/>
		<reference ref_id="1216379" ref_url="https://bugzilla.suse.com/1216379" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2023-22067" ref_url="https://www.suse.com/security/cve/CVE-2023-22067/" source="CVE"/>
		<reference ref_id="CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017141.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version jdk8u392 (icedtea-3.29.0) October 2023 CPU:

- CVE-2023-22067: Fixed IOR deserialization issue in CORBA (bsc#1216379).
- CVE-2023-22081: Fixed certificate path validation issue during client authentication (bsc#1216374).
- CVE-2015-4000: Fixed Logjam issue in SLES12SP5 (bsc#1211968).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-21"/>
	<updated date="2023-11-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1211968">SUSE bug 1211968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216374">SUSE bug 1216374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216379">SUSE bug 1216379</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4000">CVE-2015-4000 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22067/">CVE-2023-22067 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22067">CVE-2023-22067 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810441" comment="java-1_8_0-openjdk-1.8.0.392-150000.3.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810442" comment="java-1_8_0-openjdk-accessibility-1.8.0.392-150000.3.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810443" comment="java-1_8_0-openjdk-demo-1.8.0.392-150000.3.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810444" comment="java-1_8_0-openjdk-devel-1.8.0.392-150000.3.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810445" comment="java-1_8_0-openjdk-headless-1.8.0.392-150000.3.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810446" comment="java-1_8_0-openjdk-javadoc-1.8.0.392-150000.3.85.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810447" comment="java-1_8_0-openjdk-src-1.8.0.392-150000.3.85.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4522" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_jk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1114612" ref_url="https://bugzilla.suse.com/1114612" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-11759" ref_url="https://www.suse.com/security/cve/CVE-2018-11759/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017156.html" source="SUSE-SU"/>
		<description>
This update for apache2-mod_jk fixes the following issues:

Update to version 1.2.49:
  Apache
    * Retrieve default request id from mod_unique_id. It can also be
      taken from an arbitrary environment variable by configuring
      'JkRequestIdIndicator'.
    * Don't delegate the generatation of the response body to httpd
      when the status code represents an error if the request used
      the HEAD method.
    * Only export the main module symbol. Visibility of module 
      internal symbols led to crashes when conflicting with library
      symbols. Based on a patch provided by Josef Čejka.
    * Remove support for implicit mapping of requests to workers. 
      All mappings must now be explicit.
  IIS
    * Set default request id as a GUID. It can also be taken from an
      arbitrary request header by configuring 'request_id_header'.
    * Fix non-empty check for the Translate header.
  Common
    * Fix compiler warning when initializing and copying fixed 
      length strings.
    * Add a request id to mod_jk log lines.
    * Enable configure to find the correct sizes for pid_t and 
      pthread_t when building on MacOS.
    * Fix Clang 15/16 compatability. Pull request #6 provided by 
      Sam James.
    * Improve XSS hardening in status worker.
    * Add additional bounds and error checking when reading AJP 
      messages.
  Docs
    * Remove support for the Netscape / Sun ONE / Oracle iPlanet Web
      Server as the product has been retired.
    * Remove links to the old JK2 documentation. The JK2 
      documentation is still available, it is just no longer linked
      from the current JK documentation.
    * Restructure subsections in changelog starting with version 
      1.2.45.

Changes for 1.2.47 and 1.2.48 updates:
  * Add: Apache: Extend trace level logging of method entry/exit to
    aid debugging of request mapping issues.
  * Fix: Apache: Fix a bug in the normalization checks that prevented
    file based requests, such as SSI file includes, from being processed.
  * Fix: Apache: When using JkAutoAlias, ensure that files that include
    spaces in their name are accessible.
  * Update: Common: Update the documentation to reflect that the source
    code for the Apache Tomcat Connectors has moved from Subversion to Git.
  * Fix: Common: When using set_session_cookie, ensure that an updated session
    cookie is issued if the load-balancer has to failover to a different worker.
  * Update: Common: Update config.guess and config.sub from
    https://git.savannah.gnu.org/git/config.git.
  * Update: Common: Update release script for migration to git.

Update to version 1.2.46
  Fixes:
    * Apache: Fix regression in 1.2.44 which resulted in
      socket_connect_timeout to be interpreted in units of seconds
      instead of milliseconds on platforms that provide poll(). (rjung)
    * Security: CVE-2018-11759 Connector path traversal [bsc#1114612]

Update to version 1.2.45
  Fixes:
    * Correct regression in 1.2.44 that broke request handling for
      OPTIONS * requests. (rjung)
    * Improve path parameter parsing so that the session ID specified
      by the session_path worker property for load-balanced workers
      can be extracted from a path parameter in any segment of the
      URI, rather than only from the final segment. (markt)
    * Apache: Improve path parameter handling so that JkStripSession
      can remove session IDs that are specified on path parameters in any
      segment of the URI rather than only the final segment. (markt)
    * IIS: Improve path parameter handling so that strip_session can
      remove session IDs that are specified on path parameters in any
      segment of the URI rather than only the final segment. (markt) 
  Updates:
    * Apache: Update the documentation to note additional
      limitations of the JkAutoAlias directive. (markt)
  Code:
    * Common: Optimize path parameter handling. (rjung)

Update to version 1.2.44
  Updates:
    * Remove the Novell Netware make files and Netware specific source
      code since there has not been a supported version of Netware
      available for over five years. (markt)
    * Apache: Update the documentation to use httpd 2.4.x style access
      control directives. (markt)
    * Update PCRE bundled with the ISAPI redirector to 8.42. (rjung)
    * Update config.guess and config.sub from
      https://git.savannah.gnu.org/git/config.git. (rjung)
  Fixes:
    * Common: Use Local, rather than Global, mutexs on Windows to
      better support multi-user environments. (markt)
    * Apache: Use poll rather than select to avoid the limitations of
      select triggering an httpd crash. Patch provided by Koen Wilde. (markt)
    * ISAPI: Remove the check that rejects requests that contain path
      segments that match WEB-INF or META-INF as it duplicates a check
      that Tomcat performs and, because ISAPI does not have visibility of
      the current context path, it is impossible to implement this check
      without valid requests being rejected. (markt)
    * Refactor normalisation of request URIs to a common location and align
      the normalisation implementation for mod_jk with that implemented by
      Tomcat. (markt)
  Add:
    * Clarify the behvaiour of lb workers when all ajp13 workers fail with
      particular reference to the role of the retries attribute. (markt)
    * Add the new load-balancer worker property lb_retries to improve the
      control over the number of retries. Based on a patch provided by
      Frederik Nosi. (markt)
    * Add a note to the documentation that the CollapseSlashes options are
      now effectively hard-coded to CollpaseSlashesAll due to the changes
      made to align normalization with that implemented in Tomcat. (markt)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-21"/>
	<updated date="2023-11-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1114612">SUSE bug 1114612</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11759/">CVE-2018-11759 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11759">CVE-2018-11759 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809861" comment="apache2-mod_jk-1.2.49-150100.6.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4523" version="1" class="patch">
	<metadata>
		<title>Security update for python3-setuptools (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206667" ref_url="https://bugzilla.suse.com/1206667" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-40897" ref_url="https://www.suse.com/security/cve/CVE-2022-40897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017152.html" source="SUSE-SU"/>
		<description>
This update for python3-setuptools fixes the following issues:

- CVE-2022-40897: Fixed Regular Expression Denial of Service (ReDoS) in package_index.py (bsc#1206667).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-21"/>
	<updated date="2023-11-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206667">SUSE bug 1206667</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40897/">CVE-2022-40897 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40897">CVE-2022-40897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810448" comment="python3-setuptools-44.1.1-150400.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810449" comment="python3-setuptools-test-44.1.1-150400.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810450" comment="python3-setuptools-wheel-44.1.1-150400.9.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4524" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216922" ref_url="https://bugzilla.suse.com/1216922" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5678" ref_url="https://www.suse.com/security/cve/CVE-2023-5678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017151.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2023-5678: Fixed generating and checking of excessively long X9.42 DH keys that resulted in a possible Denial of Service (bsc#1216922).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-21"/>
	<updated date="2023-11-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216922">SUSE bug 1216922</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5678/">CVE-2023-5678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810489" comment="libopenssl-1_1-devel-1.1.1l-150500.17.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810490" comment="libopenssl-1_1-devel-32bit-1.1.1l-150500.17.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810491" comment="libopenssl1_1-1.1.1l-150500.17.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810492" comment="libopenssl1_1-32bit-1.1.1l-150500.17.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810493" comment="libopenssl1_1-hmac-1.1.1l-150500.17.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810494" comment="libopenssl1_1-hmac-32bit-1.1.1l-150500.17.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810495" comment="openssl-1_1-1.1.1l-150500.17.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810496" comment="openssl-1_1-doc-1.1.1l-150500.17.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4525" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_0_0 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216922" ref_url="https://bugzilla.suse.com/1216922" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5678" ref_url="https://www.suse.com/security/cve/CVE-2023-5678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017147.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_0_0 fixes the following issues:

- CVE-2023-5678: Fixed generating and checking of excessively long X9.42 DH keys that resulted in a possible Denial of Service (bsc#1216922).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-21"/>
	<updated date="2023-11-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216922">SUSE bug 1216922</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5678/">CVE-2023-5678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810451" comment="libopenssl-1_0_0-devel-1.0.2p-150000.3.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810452" comment="libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810453" comment="libopenssl10-1.0.2p-150000.3.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810454" comment="libopenssl1_0_0-1.0.2p-150000.3.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810455" comment="libopenssl1_0_0-32bit-1.0.2p-150000.3.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810456" comment="libopenssl1_0_0-hmac-1.0.2p-150000.3.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810457" comment="libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810458" comment="libopenssl1_0_0-steam-1.0.2p-150000.3.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810459" comment="libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810460" comment="openssl-1_0_0-1.0.2p-150000.3.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810461" comment="openssl-1_0_0-cavs-1.0.2p-150000.3.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810462" comment="openssl-1_0_0-doc-1.0.2p-150000.3.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4526" version="1" class="patch">
	<metadata>
		<title>Security update for maven, maven-resolver, sbt, xmvn (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1162112" ref_url="https://bugzilla.suse.com/1162112" source="BUGZILLA"/>
		<reference ref_id="1216529" ref_url="https://bugzilla.suse.com/1216529" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46122" ref_url="https://www.suse.com/security/cve/CVE-2023-46122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017163.html" source="SUSE-SU"/>
		<description>
This update for maven, maven-resolver, sbt, xmvn fixes the following issues:

- CVE-2023-46122: Fixed an arbitrary file write when extracting a
  crafted zip file with sbt (bsc#1216529).
- Upgraded maven to version 3.9.4
- Upgraded maven-resolver to version 1.9.15.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-22"/>
	<updated date="2023-11-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1162112">SUSE bug 1162112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216529">SUSE bug 1216529</bugzilla>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-46122/">CVE-2023-46122 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46122">CVE-2023-46122 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009803371" comment="maven-3.9.4-150200.4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803372" comment="maven-javadoc-3.9.4-150200.4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803373" comment="maven-lib-3.9.4-150200.4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803374" comment="maven-resolver-1.9.15-150200.3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803375" comment="maven-resolver-api-1.9.15-150200.3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803376" comment="maven-resolver-connector-basic-1.9.15-150200.3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803377" comment="maven-resolver-impl-1.9.15-150200.3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803378" comment="maven-resolver-javadoc-1.9.15-150200.3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803379" comment="maven-resolver-named-locks-1.9.15-150200.3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803380" comment="maven-resolver-spi-1.9.15-150200.3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803381" comment="maven-resolver-test-util-1.9.15-150200.3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803382" comment="maven-resolver-transport-classpath-1.9.15-150200.3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803383" comment="maven-resolver-transport-file-1.9.15-150200.3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803384" comment="maven-resolver-transport-http-1.9.15-150200.3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803385" comment="maven-resolver-transport-wagon-1.9.15-150200.3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803386" comment="maven-resolver-util-1.9.15-150200.3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803387" comment="sbt-0.13.18-150200.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803388" comment="sbt-bootstrap-0.13.18-150200.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803389" comment="xmvn-4.2.0-150200.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803390" comment="xmvn-api-4.2.0-150200.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803391" comment="xmvn-connector-4.2.0-150200.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803392" comment="xmvn-connector-javadoc-4.2.0-150200.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803393" comment="xmvn-core-4.2.0-150200.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803394" comment="xmvn-install-4.2.0-150200.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803395" comment="xmvn-minimal-4.2.0-150200.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803396" comment="xmvn-mojo-4.2.0-150200.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803397" comment="xmvn-mojo-javadoc-4.2.0-150200.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803398" comment="xmvn-parent-4.2.0-150200.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803399" comment="xmvn-resolve-4.2.0-150200.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803400" comment="xmvn-subst-4.2.0-150200.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803401" comment="xmvn-tools-javadoc-4.2.0-150200.3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4527" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216894" ref_url="https://bugzilla.suse.com/1216894" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-44271" ref_url="https://www.suse.com/security/cve/CVE-2023-44271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017162.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

- CVE-2023-44271: Fixed uncontrolled resource consumption when textlength in an ImageDraw instance operates on a long text argument (bsc#1216894).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-22"/>
	<updated date="2023-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216894">SUSE bug 1216894</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44271/">CVE-2023-44271 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44271">CVE-2023-44271 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810294" comment="python311-Pillow-9.5.0-150400.5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810295" comment="python311-Pillow-tk-9.5.0-150400.5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4528" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216901" ref_url="https://bugzilla.suse.com/1216901" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-41913" ref_url="https://www.suse.com/security/cve/CVE-2023-41913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017161.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2023-41913: Fixed a bug in charon-tkm related to handling DH public values that can lead to remote code execution (bsc#1216901).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-22"/>
	<updated date="2023-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216901">SUSE bug 1216901</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-41913/">CVE-2023-41913 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41913">CVE-2023-41913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811579" comment="strongswan-5.9.11-150500.5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811580" comment="strongswan-doc-5.9.11-150500.5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811581" comment="strongswan-hmac-5.9.11-150500.5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811582" comment="strongswan-ipsec-5.9.11-150500.5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811583" comment="strongswan-libs0-5.9.11-150500.5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811584" comment="strongswan-mysql-5.9.11-150500.5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811585" comment="strongswan-nm-5.9.11-150500.5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811586" comment="strongswan-sqlite-5.9.11-150500.5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4529" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216926" ref_url="https://bugzilla.suse.com/1216926" source="BUGZILLA"/>
		<reference ref_id="1217274" ref_url="https://bugzilla.suse.com/1217274" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46728" ref_url="https://www.suse.com/security/cve/CVE-2023-46728/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017206.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2023-46728: Remove gopher support (bsc#1216926).
- Fixed overread in HTTP request header parsing (bsc#1217274).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-24"/>
	<updated date="2023-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216926">SUSE bug 1216926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217274">SUSE bug 1217274</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46728/">CVE-2023-46728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46728">CVE-2023-46728 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811393" comment="squid-5.7-150400.3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4530" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216338" ref_url="https://bugzilla.suse.com/1216338" source="BUGZILLA"/>
		<reference ref_id="1217230" ref_url="https://bugzilla.suse.com/1217230" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5721" ref_url="https://www.suse.com/security/cve/CVE-2023-5721/" source="CVE"/>
		<reference ref_id="CVE-2023-5724" ref_url="https://www.suse.com/security/cve/CVE-2023-5724/" source="CVE"/>
		<reference ref_id="CVE-2023-5725" ref_url="https://www.suse.com/security/cve/CVE-2023-5725/" source="CVE"/>
		<reference ref_id="CVE-2023-5726" ref_url="https://www.suse.com/security/cve/CVE-2023-5726/" source="CVE"/>
		<reference ref_id="CVE-2023-5727" ref_url="https://www.suse.com/security/cve/CVE-2023-5727/" source="CVE"/>
		<reference ref_id="CVE-2023-5728" ref_url="https://www.suse.com/security/cve/CVE-2023-5728/" source="CVE"/>
		<reference ref_id="CVE-2023-5730" ref_url="https://www.suse.com/security/cve/CVE-2023-5730/" source="CVE"/>
		<reference ref_id="CVE-2023-5732" ref_url="https://www.suse.com/security/cve/CVE-2023-5732/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017199.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 115.5.0 ESR Placeholder changelog-entry (bsc#1217230)

  * Fixed: Various security fixes and other quality improvements. MFSA 2023-46 (bsc#1216338)
  * CVE-2023-5721: Queued up rendering could have allowed websites to clickjack
  * CVE-2023-5732: Address bar spoofing via bidirectional characters
  * CVE-2023-5724: Large WebGL draw could have led to a crash
  * CVE-2023-5725: WebExtensions could open arbitrary URLs
  * CVE-2023-5726: Full screen notification obscured by file open dialog on macOS
  * CVE-2023-5727: Download Protections were bypassed by .msix, .msixbundle, .appx, and .appxbundle files on Windows
  * CVE-2023-5728: Improper object tracking during GC in the JavaScript engine could have led to a crash.
  * CVE-2023-5730: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4.1
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-24"/>
	<updated date="2023-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216338">SUSE bug 1216338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217230">SUSE bug 1217230</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5721/">CVE-2023-5721 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5721">CVE-2023-5721 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5724/">CVE-2023-5724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5724">CVE-2023-5724 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5725/">CVE-2023-5725 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5725">CVE-2023-5725 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5726/">CVE-2023-5726 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5726">CVE-2023-5726 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5727/">CVE-2023-5727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5727">CVE-2023-5727 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5728/">CVE-2023-5728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5728">CVE-2023-5728 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5730/">CVE-2023-5730 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5730">CVE-2023-5730 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5732/">CVE-2023-5732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5732">CVE-2023-5732 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811378" comment="MozillaFirefox-115.5.0-150200.152.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811379" comment="MozillaFirefox-branding-upstream-115.5.0-150200.152.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811380" comment="MozillaFirefox-devel-115.5.0-150200.152.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811381" comment="MozillaFirefox-translations-common-115.5.0-150200.152.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811382" comment="MozillaFirefox-translations-other-115.5.0-150200.152.117.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4531" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214922" ref_url="https://bugzilla.suse.com/1214922" source="BUGZILLA"/>
		<reference ref_id="1214924" ref_url="https://bugzilla.suse.com/1214924" source="BUGZILLA"/>
		<reference ref_id="1214925" ref_url="https://bugzilla.suse.com/1214925" source="BUGZILLA"/>
		<reference ref_id="1215004" ref_url="https://bugzilla.suse.com/1215004" source="BUGZILLA"/>
		<reference ref_id="1215006" ref_url="https://bugzilla.suse.com/1215006" source="BUGZILLA"/>
		<reference ref_id="1215033" ref_url="https://bugzilla.suse.com/1215033" source="BUGZILLA"/>
		<reference ref_id="1215940" ref_url="https://bugzilla.suse.com/1215940" source="BUGZILLA"/>
		<reference ref_id="1216001" ref_url="https://bugzilla.suse.com/1216001" source="BUGZILLA"/>
		<reference ref_id="1216167" ref_url="https://bugzilla.suse.com/1216167" source="BUGZILLA"/>
		<reference ref_id="1216696" ref_url="https://bugzilla.suse.com/1216696" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46246" ref_url="https://www.suse.com/security/cve/CVE-2023-46246/" source="CVE"/>
		<reference ref_id="CVE-2023-4733" ref_url="https://www.suse.com/security/cve/CVE-2023-4733/" source="CVE"/>
		<reference ref_id="CVE-2023-4734" ref_url="https://www.suse.com/security/cve/CVE-2023-4734/" source="CVE"/>
		<reference ref_id="CVE-2023-4735" ref_url="https://www.suse.com/security/cve/CVE-2023-4735/" source="CVE"/>
		<reference ref_id="CVE-2023-4738" ref_url="https://www.suse.com/security/cve/CVE-2023-4738/" source="CVE"/>
		<reference ref_id="CVE-2023-4752" ref_url="https://www.suse.com/security/cve/CVE-2023-4752/" source="CVE"/>
		<reference ref_id="CVE-2023-4781" ref_url="https://www.suse.com/security/cve/CVE-2023-4781/" source="CVE"/>
		<reference ref_id="CVE-2023-5344" ref_url="https://www.suse.com/security/cve/CVE-2023-5344/" source="CVE"/>
		<reference ref_id="CVE-2023-5441" ref_url="https://www.suse.com/security/cve/CVE-2023-5441/" source="CVE"/>
		<reference ref_id="CVE-2023-5535" ref_url="https://www.suse.com/security/cve/CVE-2023-5535/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017223.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

Updated to version 9.0 with patch level 2103, fixes the following security problems

* CVE-2023-5344: vim: Heap-based Buffer Overflow in vim prior to 9.0.1969 (bsc#1215940)
* CVE-2023-5441: vim: segfault in exmode when redrawing (bsc#1216001)
* CVE-2023-5535: vim: use-after-free from buf_contents_changed() (bsc#1216167)
* CVE-2023-46246: vim: Integer Overflow in :history command (bsc#1216696)
* CVE-2023-4738: vim: heap-buffer-overflow in vim_regsub_both (bsc#1214922)
* CVE-2023-4735: vim: OOB Write ops.c (bsc#1214924)
* CVE-2023-4734: vim: segmentation fault in function f_fullcommand (bsc#1214925)
* CVE-2023-4733: vim: use-after-free in function buflist_altfpos (bsc#1215004)
* CVE-2023-4752: vim: Heap Use After Free in function ins_compl_get_exp (bsc#1215006)
* CVE-2023-4781: vim: heap-buffer-overflow in function vim_regsub_both (bsc#1215033)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-24"/>
	<updated date="2023-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214922">SUSE bug 1214922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214924">SUSE bug 1214924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214925">SUSE bug 1214925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215004">SUSE bug 1215004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215006">SUSE bug 1215006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215033">SUSE bug 1215033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215940">SUSE bug 1215940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216001">SUSE bug 1216001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216167">SUSE bug 1216167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216696">SUSE bug 1216696</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-46246/">CVE-2023-46246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46246">CVE-2023-46246 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4733/">CVE-2023-4733 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4733">CVE-2023-4733 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4734/">CVE-2023-4734 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4734">CVE-2023-4734 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-4735/">CVE-2023-4735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4735">CVE-2023-4735 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4738/">CVE-2023-4738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4738">CVE-2023-4738 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4752/">CVE-2023-4752 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4752">CVE-2023-4752 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4781/">CVE-2023-4781 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4781">CVE-2023-4781 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5344/">CVE-2023-5344 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5344">CVE-2023-5344 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5441/">CVE-2023-5441 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5441">CVE-2023-5441 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5535/">CVE-2023-5535 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5535">CVE-2023-5535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009812242" comment="gvim-9.0.2103-150500.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812243" comment="vim-9.0.2103-150500.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812244" comment="vim-data-9.0.2103-150500.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812245" comment="vim-data-common-9.0.2103-150500.20.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812246" comment="vim-small-9.0.2103-150500.20.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4532" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217210" ref_url="https://bugzilla.suse.com/1217210" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-32919" ref_url="https://www.suse.com/security/cve/CVE-2022-32919/" source="CVE"/>
		<reference ref_id="CVE-2022-32933" ref_url="https://www.suse.com/security/cve/CVE-2022-32933/" source="CVE"/>
		<reference ref_id="CVE-2022-46705" ref_url="https://www.suse.com/security/cve/CVE-2022-46705/" source="CVE"/>
		<reference ref_id="CVE-2022-46725" ref_url="https://www.suse.com/security/cve/CVE-2022-46725/" source="CVE"/>
		<reference ref_id="CVE-2023-32359" ref_url="https://www.suse.com/security/cve/CVE-2023-32359/" source="CVE"/>
		<reference ref_id="CVE-2023-41983" ref_url="https://www.suse.com/security/cve/CVE-2023-41983/" source="CVE"/>
		<reference ref_id="CVE-2023-42852" ref_url="https://www.suse.com/security/cve/CVE-2023-42852/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017219.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.42.2 (bsc#1217210):

- CVE-2023-41983: Processing web content may lead to a denial-of-service.
- CVE-2023-42852: Processing web content may lead to arbitrary code execution.

Already previously fixed:

- CVE-2022-32919: Visiting a website that frames malicious content may lead to UI spoofing (fixed already in 2.38.4).
- CVE-2022-32933: A website may be able to track the websites a user visited in private browsing mode (fixed already in 2.38.0).
- CVE-2022-46705: Visiting a malicious website may lead to address bar spoofing (fixed already in 2.38.4).
- CVE-2022-46725: Visiting a malicious website may lead to address bar spoofing (fixed already in 2.38.4).
- CVE-2023-32359: A user’s password may be read aloud by a text-to-speech accessibility feature (fixed already in 2.42.0).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-24"/>
	<updated date="2023-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217210">SUSE bug 1217210</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32919/">CVE-2022-32919 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32919">CVE-2022-32919 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32933/">CVE-2022-32933 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32933">CVE-2022-32933 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-46705/">CVE-2022-46705 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46705">CVE-2022-46705 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-46725/">CVE-2022-46725 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46725">CVE-2022-46725 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32359/">CVE-2023-32359 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32359">CVE-2023-32359 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-41983/">CVE-2023-41983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41983">CVE-2023-41983 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42852/">CVE-2023-42852 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42852">CVE-2023-42852 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009812153" comment="WebKitGTK-4.0-lang-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812154" comment="WebKitGTK-4.1-lang-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812155" comment="WebKitGTK-6.0-lang-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812156" comment="libjavascriptcoregtk-4_0-18-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812157" comment="libjavascriptcoregtk-4_0-18-32bit-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812158" comment="libjavascriptcoregtk-4_0-18-64bit-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812159" comment="libjavascriptcoregtk-4_1-0-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812160" comment="libjavascriptcoregtk-4_1-0-32bit-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812161" comment="libjavascriptcoregtk-4_1-0-64bit-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812162" comment="libjavascriptcoregtk-6_0-1-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812163" comment="libwebkit2gtk-4_0-37-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812164" comment="libwebkit2gtk-4_0-37-32bit-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812165" comment="libwebkit2gtk-4_0-37-64bit-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812166" comment="libwebkit2gtk-4_1-0-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812167" comment="libwebkit2gtk-4_1-0-32bit-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812168" comment="libwebkit2gtk-4_1-0-64bit-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812169" comment="libwebkitgtk-6_0-4-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812170" comment="typelib-1_0-JavaScriptCore-4_0-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812171" comment="typelib-1_0-JavaScriptCore-4_1-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812172" comment="typelib-1_0-JavaScriptCore-6_0-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812173" comment="typelib-1_0-WebKit-6_0-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812174" comment="typelib-1_0-WebKit2-4_0-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812175" comment="typelib-1_0-WebKit2-4_1-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812176" comment="typelib-1_0-WebKit2WebExtension-4_0-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812177" comment="typelib-1_0-WebKit2WebExtension-4_1-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812178" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812179" comment="webkit-jsc-4-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812180" comment="webkit-jsc-4.1-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812181" comment="webkit-jsc-6.0-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812182" comment="webkit2gtk-4_0-injected-bundles-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812183" comment="webkit2gtk-4_1-injected-bundles-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812184" comment="webkit2gtk3-devel-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812185" comment="webkit2gtk3-minibrowser-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812186" comment="webkit2gtk3-soup2-devel-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812187" comment="webkit2gtk3-soup2-minibrowser-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812188" comment="webkit2gtk4-devel-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812189" comment="webkit2gtk4-minibrowser-2.42.2-150400.4.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812190" comment="webkitgtk-6_0-injected-bundles-2.42.2-150400.4.64.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4533" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1204264" ref_url="https://bugzilla.suse.com/1204264" source="BUGZILLA"/>
		<reference ref_id="1216339" ref_url="https://bugzilla.suse.com/1216339" source="BUGZILLA"/>
		<reference ref_id="1216374" ref_url="https://bugzilla.suse.com/1216374" source="BUGZILLA"/>
		<reference ref_id="1216379" ref_url="https://bugzilla.suse.com/1216379" source="BUGZILLA"/>
		<reference ref_id="1216640" ref_url="https://bugzilla.suse.com/1216640" source="BUGZILLA"/>
		<reference ref_id="1217214" ref_url="https://bugzilla.suse.com/1217214" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-22025" ref_url="https://www.suse.com/security/cve/CVE-2023-22025/" source="CVE"/>
		<reference ref_id="CVE-2023-22067" ref_url="https://www.suse.com/security/cve/CVE-2023-22067/" source="CVE"/>
		<reference ref_id="CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081/" source="CVE"/>
		<reference ref_id="CVE-2023-5676" ref_url="https://www.suse.com/security/cve/CVE-2023-5676/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017234.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 8 Fix Pack 15:
  * Oracle October 17 2023 CPU [bsc#1216640]

Security fixes:

- CVE-2023-22081: Fixed enhanced TLS connections (bsc#1216374)
- CVE-2023-22067: Fixed IOR deserialization issue in CORBA (bsc#1216379)
- CVE-2023-22025: Fixed memory corruption issue on x86_64 with AVX-512 (bsc#1216339)
- CVE-2023-5676: Fixed receiving a signal before initialization may lead to an infinite loop or unexpected crash (bsc#1217214)

Bug fixes:

- IBM Java idlj compiler switch definition because IBM java idlj seems to confuse char and wchar for typedef types (bsc#1204264).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-27"/>
	<updated date="2023-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204264">SUSE bug 1204264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216339">SUSE bug 1216339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216374">SUSE bug 1216374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216379">SUSE bug 1216379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216640">SUSE bug 1216640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217214">SUSE bug 1217214</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22025/">CVE-2023-22025 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22025">CVE-2023-22025 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22067/">CVE-2023-22067 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22067">CVE-2023-22067 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5676/">CVE-2023-5676 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5676">CVE-2023-5676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811385" comment="java-1_8_0-ibm-1.8.0_sr8.15-150000.3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811386" comment="java-1_8_0-ibm-32bit-1.8.0_sr8.15-150000.3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811387" comment="java-1_8_0-ibm-alsa-1.8.0_sr8.15-150000.3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811388" comment="java-1_8_0-ibm-demo-1.8.0_sr8.15-150000.3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811389" comment="java-1_8_0-ibm-devel-1.8.0_sr8.15-150000.3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811390" comment="java-1_8_0-ibm-devel-32bit-1.8.0_sr8.15-150000.3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811391" comment="java-1_8_0-ibm-plugin-1.8.0_sr8.15-150000.3.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811392" comment="java-1_8_0-ibm-src-1.8.0_sr8.15-150000.3.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4534" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216002" ref_url="https://bugzilla.suse.com/1216002" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5366" ref_url="https://www.suse.com/security/cve/CVE-2023-5366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017233.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:

- CVE-2023-5366: Fixed missing masks on a final stage with ports trie (bsc#1216002).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-27"/>
	<updated date="2023-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216002">SUSE bug 1216002</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5366/">CVE-2023-5366 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5366">CVE-2023-5366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811361" comment="libopenvswitch-2_14-0-2.14.2-150400.24.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811362" comment="libovn-20_06-0-20.06.2-150400.24.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811363" comment="openvswitch-2.14.2-150400.24.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811364" comment="openvswitch-devel-2.14.2-150400.24.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811365" comment="openvswitch-doc-2.14.2-150400.24.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811366" comment="openvswitch-ipsec-2.14.2-150400.24.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811367" comment="openvswitch-pki-2.14.2-150400.24.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811368" comment="openvswitch-test-2.14.2-150400.24.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811369" comment="openvswitch-vtep-2.14.2-150400.24.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811370" comment="ovn-20.06.2-150400.24.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811371" comment="ovn-central-20.06.2-150400.24.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811372" comment="ovn-devel-20.06.2-150400.24.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811373" comment="ovn-doc-20.06.2-150400.24.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811374" comment="ovn-docker-20.06.2-150400.24.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811375" comment="ovn-host-20.06.2-150400.24.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811376" comment="ovn-vtep-20.06.2-150400.24.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811377" comment="python3-ovs-2.14.2-150400.24.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4535" version="1" class="patch">
	<metadata>
		<title>Security update for xrdp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215803" ref_url="https://bugzilla.suse.com/1215803" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-42822" ref_url="https://www.suse.com/security/cve/CVE-2023-42822/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017229.html" source="SUSE-SU"/>
		<description>
This update for xrdp fixes the following issues:

- CVE-2023-42822: Fixed unchecked access to font glyph info (bsc#1215803).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-27"/>
	<updated date="2023-11-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215803">SUSE bug 1215803</bugzilla>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-42822/">CVE-2023-42822 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42822">CVE-2023-42822 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009812149" comment="libpainter0-0.9.13.1-150200.4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812150" comment="librfxencode0-0.9.13.1-150200.4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812151" comment="xrdp-0.9.13.1-150200.4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812152" comment="xrdp-devel-0.9.13.1-150200.4.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4536" version="1" class="patch">
	<metadata>
		<title>Security update for slurm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216207" ref_url="https://bugzilla.suse.com/1216207" source="BUGZILLA"/>
		<reference ref_id="1216869" ref_url="https://bugzilla.suse.com/1216869" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-41914" ref_url="https://www.suse.com/security/cve/CVE-2023-41914/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017228.html" source="SUSE-SU"/>
		<description>
This update for slurm fixes the following issues:

- CVE-2023-41914: Fixed a filesystem handling race conditions that could have led to an attacker taking control of an arbitrary file, or removing entire directoy contents (bsc#1216207).

Bug fixes:

- Add missing dependencies to slurm-config to plugins package. These should help to tie down the slurm version and help to avoid a package mix (bsc#1216869).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-27"/>
	<updated date="2023-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216207">SUSE bug 1216207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216869">SUSE bug 1216869</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-41914/">CVE-2023-41914 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41914">CVE-2023-41914 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009812214" comment="libnss_slurm2-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812215" comment="libpmi0-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812216" comment="libslurm39-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812217" comment="perl-slurm-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812218" comment="slurm-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812219" comment="slurm-auth-none-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812220" comment="slurm-config-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812221" comment="slurm-config-man-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812222" comment="slurm-cray-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812223" comment="slurm-devel-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812224" comment="slurm-doc-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812225" comment="slurm-hdf5-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812226" comment="slurm-lua-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812227" comment="slurm-munge-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812228" comment="slurm-node-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812229" comment="slurm-openlava-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812230" comment="slurm-pam_slurm-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812231" comment="slurm-plugin-ext-sensors-rrd-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812232" comment="slurm-plugins-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812233" comment="slurm-rest-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812234" comment="slurm-seff-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812235" comment="slurm-sjstat-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812236" comment="slurm-slurmdbd-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812237" comment="slurm-sql-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812238" comment="slurm-sview-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812239" comment="slurm-testsuite-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812240" comment="slurm-torque-23.02.6-150500.5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812241" comment="slurm-webdoc-23.02.6-150500.5.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4537" version="1" class="patch">
	<metadata>
		<title>Security update for slurm_22_05 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1208810" ref_url="https://bugzilla.suse.com/1208810" source="BUGZILLA"/>
		<reference ref_id="1216207" ref_url="https://bugzilla.suse.com/1216207" source="BUGZILLA"/>
		<reference ref_id="1216869" ref_url="https://bugzilla.suse.com/1216869" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-41914" ref_url="https://www.suse.com/security/cve/CVE-2023-41914/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017227.html" source="SUSE-SU"/>
		<description>
This update for slurm_22_05 fixes the following issues:

- CVE-2023-41914: Fixed a filesystem handling race condition that could have led to an attacker taking control of an arbitrary file, or removing entire directory contents (bsc#1216207).

Bug fixes:

- Add missing dependencies to slurm-config to plugins package. These should help to tie down the slurm version and help to avoid a package mix (bsc#1216869).
- Add missing Provides:, Conflicts: and Obsoletes: to slurm-cray, slurm-hdf5 and slurm-testsuite to avoid package conflicts (bsc#1208810).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-27"/>
	<updated date="2023-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1208810">SUSE bug 1208810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216207">SUSE bug 1216207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216869">SUSE bug 1216869</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-41914/">CVE-2023-41914 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41914">CVE-2023-41914 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009812934" comment="libnss_slurm2_22_05-22.05.10-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812935" comment="libpmi0_22_05-22.05.10-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812936" comment="libslurm38-22.05.10-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812937" comment="perl-slurm_22_05-22.05.10-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812938" comment="slurm_22_05-22.05.10-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812939" comment="slurm_22_05-auth-none-22.05.10-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812940" comment="slurm_22_05-config-22.05.10-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812941" comment="slurm_22_05-config-man-22.05.10-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812942" comment="slurm_22_05-cray-22.05.10-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812943" comment="slurm_22_05-devel-22.05.10-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812944" comment="slurm_22_05-doc-22.05.10-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812945" comment="slurm_22_05-hdf5-22.05.10-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812946" comment="slurm_22_05-lua-22.05.10-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812947" comment="slurm_22_05-munge-22.05.10-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812948" comment="slurm_22_05-node-22.05.10-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812949" comment="slurm_22_05-openlava-22.05.10-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812950" comment="slurm_22_05-pam_slurm-22.05.10-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812951" comment="slurm_22_05-plugins-22.05.10-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812952" comment="slurm_22_05-rest-22.05.10-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812953" comment="slurm_22_05-seff-22.05.10-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812954" comment="slurm_22_05-sjstat-22.05.10-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812955" comment="slurm_22_05-slurmdbd-22.05.10-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812956" comment="slurm_22_05-sql-22.05.10-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812957" comment="slurm_22_05-sview-22.05.10-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812958" comment="slurm_22_05-testsuite-22.05.10-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812959" comment="slurm_22_05-torque-22.05.10-150300.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812960" comment="slurm_22_05-webdoc-22.05.10-150300.7.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4538" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-c (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216156" ref_url="https://bugzilla.suse.com/1216156" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-37536" ref_url="https://www.suse.com/security/cve/CVE-2023-37536/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017240.html" source="SUSE-SU"/>
		<description>
This update for xerces-c fixes the following issues:

- CVE-2023-37536: Fixed an integer overflow that could have led to a out-of-bounds memory accesses (bsc#1216156).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-27"/>
	<updated date="2023-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216156">SUSE bug 1216156</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-37536/">CVE-2023-37536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37536">CVE-2023-37536 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009812121" comment="libxerces-c-3_2-3.2.3-150300.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812122" comment="libxerces-c-3_2-32bit-3.2.3-150300.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812123" comment="libxerces-c-devel-3.2.3-150300.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812124" comment="xerces-c-3.2.3-150300.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812125" comment="xerces-c-doc-3.2.3-150300.3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4539" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217230" ref_url="https://bugzilla.suse.com/1217230" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-6204" ref_url="https://www.suse.com/security/cve/CVE-2023-6204/" source="CVE"/>
		<reference ref_id="CVE-2023-6205" ref_url="https://www.suse.com/security/cve/CVE-2023-6205/" source="CVE"/>
		<reference ref_id="CVE-2023-6206" ref_url="https://www.suse.com/security/cve/CVE-2023-6206/" source="CVE"/>
		<reference ref_id="CVE-2023-6207" ref_url="https://www.suse.com/security/cve/CVE-2023-6207/" source="CVE"/>
		<reference ref_id="CVE-2023-6208" ref_url="https://www.suse.com/security/cve/CVE-2023-6208/" source="CVE"/>
		<reference ref_id="CVE-2023-6209" ref_url="https://www.suse.com/security/cve/CVE-2023-6209/" source="CVE"/>
		<reference ref_id="CVE-2023-6212" ref_url="https://www.suse.com/security/cve/CVE-2023-6212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017238.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Mozilla Thunderbird 115.5.0 MFSA 2023-52 (bsc#1217230)

  * CVE-2023-6204: Out-of-bound memory access in WebGL2 blitFramebuffer
  * CVE-2023-6205: Use-after-free in MessagePort::Entangled
  * CVE-2023-6206: Clickjacking permission prompts using the fullscreen transition
  * CVE-2023-6207: Use-after-free in ReadableByteStreamQueueEntry::Buffer
  * CVE-2023-6208: Using Selection API would copy contents into X11 primary selection.
  * CVE-2023-6209: Incorrect parsing of relative URLs starting with '///'
  * CVE-2023-6212: Memory safety bugs
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-27"/>
	<updated date="2023-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217230">SUSE bug 1217230</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6204/">CVE-2023-6204 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6204">CVE-2023-6204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6205/">CVE-2023-6205 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6205">CVE-2023-6205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6206/">CVE-2023-6206 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6206">CVE-2023-6206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6207/">CVE-2023-6207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6207">CVE-2023-6207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6208/">CVE-2023-6208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6208">CVE-2023-6208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6209/">CVE-2023-6209 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6209">CVE-2023-6209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6212/">CVE-2023-6212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6212">CVE-2023-6212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009812195" comment="MozillaThunderbird-115.5.0-150200.8.139.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812196" comment="MozillaThunderbird-translations-common-115.5.0-150200.8.139.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812197" comment="MozillaThunderbird-translations-other-115.5.0-150200.8.139.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4540" version="1" class="patch">
	<metadata>
		<title>Security update for squashfs (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1189936" ref_url="https://bugzilla.suse.com/1189936" source="BUGZILLA"/>
		<reference ref_id="1190531" ref_url="https://bugzilla.suse.com/1190531" source="BUGZILLA"/>
		<reference ref_id="935380" ref_url="https://bugzilla.suse.com/935380" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4645" ref_url="https://www.suse.com/security/cve/CVE-2015-4645/" source="CVE"/>
		<reference ref_id="CVE-2015-4646" ref_url="https://www.suse.com/security/cve/CVE-2015-4646/" source="CVE"/>
		<reference ref_id="CVE-2021-40153" ref_url="https://www.suse.com/security/cve/CVE-2021-40153/" source="CVE"/>
		<reference ref_id="CVE-2021-41072" ref_url="https://www.suse.com/security/cve/CVE-2021-41072/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017236.html" source="SUSE-SU"/>
		<description>
This update for squashfs fixes the following issues:

- CVE-2015-4645,CVE-2015-4646: Multiple buffer overflows fixed in squashfs-tools (bsc#935380)
- CVE-2021-40153: Fixed an issue where an attacker might have been able to write a file outside of destination (bsc#1189936)
- CVE-2021-41072: Fixed an issue where an attacker might have been
  able to write a file outside the destination directory via a
  symlink (bsc#1190531).

update to 4.6.1:

  * Race condition which can cause corruption of the 'fragment
    table' fixed.  This is a regression introduced in August 2022,
    and it has been seen when tailend packing is used (-tailends option).
  * Fix build failure when the tools are being built without
    extended attribute (XATTRs) support.
  * Fix XATTR error message when an unrecognised prefix is
    found
  * Fix incorrect free of pointer when an unrecognised XATTR
    prefix is found.
  * Major improvements in extended attribute handling,
    pseudo file handling, and miscellaneous new options and
    improvements
  * Extended attribute handling improved in Mksquashfs and
    Sqfstar
  * New Pseudo file xattr definition to add extended
    attributes to files.
  * New xattrs-add Action to add extended attributes to files
  * Extended attribute handling improved in Unsquashfs
  * Other major improvements
  * Unsquashfs can now output Pseudo files to standard out.
  * Mksquashfs can now input Pseudo files from standard in.
  * Squashfs filesystems can now be converted (different
    block size compression etc) without unpacking to an
    intermediate filesystem or mounting, by piping the output of
    Unsquashfs to Mksquashfs.
  * Pseudo files are now supported by Sqfstar.
  * 'Non-anchored' excludes are now supported by Unsquashfs.

update to 4.5.1 (bsc#1190531, CVE-2021-41072):

  * This release adds Manpages for Mksquashfs(1), Unsquashfs(1),
    Sqfstar(1) and Sqfscat(1).
  * The -help text output from the utilities has been improved
    and extended as well (but the Manpages are now more
    comprehensive).
  * CVE-2021-41072 which is a writing outside of destination
    exploit, has been fixed.
  * The number of hard-links in the filesystem is now also
    displayed by Mksquashfs in the output summary.
  * The number of hard-links written by Unsquashfs is now
    also displayed in the output summary.
  * Unsquashfs will now write to a pre-existing destination
    directory, rather than aborting.
  * Unsquashfs now allows '.' to used as the destination, to
    extract to the current directory.
  * The Unsquashfs progress bar now tracks empty files and
    hardlinks, in addition to data blocks.
  * -no-hardlinks option has been implemented for Sqfstar.
  * More sanity checking for 'corrupted' filesystems, including
    checks for multiply linked directories and directory loops.
  * Options that may cause filesystems to be unmountable have
    been moved into a new 'experts' category in the Mksquashfs
    help text (and Manpage).
  * Maximum cpiostyle filename limited to PATH_MAX.  This
    prevents attempts to overflow the stack, or cause system
    calls to fail with a too long pathname.
  * Don't always use 'max open file limit' when calculating
    length of queues, as a very large file limit can cause
    Unsquashfs to abort.  Instead use the smaller of max open
    file limit and cache size.
  * Fix Mksquashfs silently ignoring Pseudo file definitions
    when appending.
  * Don't abort if no XATTR support has been built in, and
    there's XATTRs in the filesystem.  This is a regression
    introduced in 2019 in Version 4.4.
  * Fix duplicate check when the last file block is sparse.

update to 4.5:

  * Mksquashfs now supports 'Actions'.
  * New sqfstar command which will create a Squashfs image from a tar archive.
  * Tar style handling of source pathnames in Mksquashfs.
  * Cpio style handling of source pathnames in Mksquashfs.
  * New option to throttle the amount of CPU and I/O.
  * Mksquashfs now allows no source directory to be specified.
  * New Pseudo file 'R' definition which allows a Regular file
    o be created with data stored within the Pseudo file.
  * Symbolic links are now followed in extract files
  * Unsquashfs now supports 'exclude' files.
  * Max depth traversal option added.
  * Unsquashfs can now output a 'Pseudo file' representing the
    input Squashfs filesystem.
  * New -one-file-system option in Mksquashfs.
  * New -no-hardlinks option in Mksquashfs.
  * Exit code in Unsquashfs changed to distinguish between
    non-fatal errors (exit 2), and fatal errors (exit 1).
  * Xattr id count added in Unsquashfs '-stat' output.
  * Unsquashfs 'write outside directory' exploit fixed.
  * Error handling in Unsquashfs writer thread fixed.
  * Fix failure to truncate destination if appending aborted.
  * Prevent Mksquashfs reading the destination file. 
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-27"/>
	<updated date="2023-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189936">SUSE bug 1189936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190531">SUSE bug 1190531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/935380">SUSE bug 935380</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-4645/">CVE-2015-4645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2015-4645">CVE-2015-4645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-4646/">CVE-2015-4646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-4646">CVE-2015-4646 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-40153/">CVE-2021-40153 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40153">CVE-2021-40153 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-41072/">CVE-2021-41072 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41072">CVE-2021-41072 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009803757" comment="squashfs-4.6.1-150300.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4541" version="1" class="patch">
	<metadata>
		<title>Security update for python3-Twisted (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216588" ref_url="https://bugzilla.suse.com/1216588" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46137" ref_url="https://www.suse.com/security/cve/CVE-2023-46137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017255.html" source="SUSE-SU"/>
		<description>
This update for python3-Twisted fixes the following issues:

- CVE-2023-46137: Fixed issue inside serializing pipelined HTTP requests. (bsc#1216588)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-29"/>
	<updated date="2023-11-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216588">SUSE bug 1216588</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46137/">CVE-2023-46137 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46137">CVE-2023-46137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810836" comment="python3-Twisted-22.2.0-150400.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4542" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216588" ref_url="https://bugzilla.suse.com/1216588" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46137" ref_url="https://www.suse.com/security/cve/CVE-2023-46137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017254.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issues:

- CVE-2023-46137: Fixed issue inside serializing pipelined HTTP requests. (bsc#1216588)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-29"/>
	<updated date="2023-11-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216588">SUSE bug 1216588</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46137/">CVE-2023-46137 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46137">CVE-2023-46137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810837" comment="python311-Twisted-22.10.0-150400.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810838" comment="python311-Twisted-all_non_platform-22.10.0-150400.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810839" comment="python311-Twisted-conch-22.10.0-150400.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810840" comment="python311-Twisted-conch_nacl-22.10.0-150400.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810841" comment="python311-Twisted-contextvars-22.10.0-150400.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810842" comment="python311-Twisted-http2-22.10.0-150400.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810843" comment="python311-Twisted-serial-22.10.0-150400.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810844" comment="python311-Twisted-tls-22.10.0-150400.5.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4543" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openj9 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216374" ref_url="https://bugzilla.suse.com/1216374" source="BUGZILLA"/>
		<reference ref_id="1216379" ref_url="https://bugzilla.suse.com/1216379" source="BUGZILLA"/>
		<reference ref_id="1217214" ref_url="https://bugzilla.suse.com/1217214" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-22067" ref_url="https://www.suse.com/security/cve/CVE-2023-22067/" source="CVE"/>
		<reference ref_id="CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081/" source="CVE"/>
		<reference ref_id="CVE-2023-5676" ref_url="https://www.suse.com/security/cve/CVE-2023-5676/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017260.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openj9 fixes the following issues:

Update to OpenJDK 8u392 build 08 with OpenJ9 0.41.0 virtual machine

- CVE-2023-22067: Fixed an IOR deserialization issue in CORBA (bsc#1216379).
- CVE-2023-22081: Fixed a certificate path validation issue during client authentication (bsc#1216374).
- CVE-2023-5676: Fixed receiving a signal before initialization may lead to an infinite loop or unexpected crash (bsc#1217214).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-29"/>
	<updated date="2023-11-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216374">SUSE bug 1216374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216379">SUSE bug 1216379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217214">SUSE bug 1217214</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22067/">CVE-2023-22067 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22067">CVE-2023-22067 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5676/">CVE-2023-5676 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5676">CVE-2023-5676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009813787" comment="java-1_8_0-openj9-1.8.0.392-150200.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813788" comment="java-1_8_0-openj9-accessibility-1.8.0.392-150200.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813789" comment="java-1_8_0-openj9-demo-1.8.0.392-150200.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813790" comment="java-1_8_0-openj9-devel-1.8.0.392-150200.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813791" comment="java-1_8_0-openj9-headless-1.8.0.392-150200.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813792" comment="java-1_8_0-openj9-javadoc-1.8.0.392-150200.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813793" comment="java-1_8_0-openj9-src-1.8.0.392-150200.3.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4544" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210660" ref_url="https://bugzilla.suse.com/1210660" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2137" ref_url="https://www.suse.com/security/cve/CVE-2023-2137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4619-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032971.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

- CVE-2023-2137: Fixed heap buffer overflow (bsc#1210660).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2023-11-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210660">SUSE bug 1210660</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2137/">CVE-2023-2137 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2137">CVE-2023-2137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009812928" comment="libsqlite3-0-3.44.0-150000.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812929" comment="libsqlite3-0-32bit-3.44.0-150000.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812930" comment="sqlite3-3.44.0-150000.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812931" comment="sqlite3-devel-3.44.0-150000.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812932" comment="sqlite3-doc-3.44.0-150000.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812933" comment="sqlite3-tcl-3.44.0-150000.3.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4545" version="1" class="patch">
	<metadata>
		<title>Security update for traceroute (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216591" ref_url="https://bugzilla.suse.com/1216591" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46316" ref_url="https://www.suse.com/security/cve/CVE-2023-46316/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017265.html" source="SUSE-SU"/>
		<description>
This update for traceroute fixes the following issues:

- CVE-2023-46316: wrapper scripts do not properly parse command lines (bsc#1216591).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2023-11-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216591">SUSE bug 1216591</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46316/">CVE-2023-46316 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46316">CVE-2023-46316 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813336" comment="traceroute-2.0.21-150000.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4546" version="1" class="patch">
	<metadata>
		<title>Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container, virt-pr-helper-container (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018051.html" source="SUSE-SU"/>
		<description>
This update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container, virt-pr-helper-container fixes the following issues:

Update to version 1.1.0

- Release notes https://github.com/kubevirt/kubevirt/releases/tag/v1.1.0

Update to version 1.0.1

- Release notes https://github.com/kubevirt/kubevirt/releases/tag/v1.0.1
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-01"/>
	<updated date="2023-12-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009813391" comment="kubevirt-container-disk-1.1.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813392" comment="kubevirt-manifests-1.1.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813393" comment="kubevirt-tests-1.1.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813394" comment="kubevirt-virt-api-1.1.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813395" comment="kubevirt-virt-controller-1.1.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813396" comment="kubevirt-virt-exportproxy-1.1.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813397" comment="kubevirt-virt-exportserver-1.1.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813398" comment="kubevirt-virt-handler-1.1.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813399" comment="kubevirt-virt-launcher-1.1.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813400" comment="kubevirt-virt-operator-1.1.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813401" comment="kubevirt-virtctl-1.1.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813402" comment="obs-service-kubevirt_containers_meta-1.1.0-150500.8.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4547" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1194187" ref_url="https://bugzilla.suse.com/1194187" source="BUGZILLA"/>
		<reference ref_id="1207472" ref_url="https://bugzilla.suse.com/1207472" source="BUGZILLA"/>
		<reference ref_id="1216922" ref_url="https://bugzilla.suse.com/1216922" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5678" ref_url="https://www.suse.com/security/cve/CVE-2023-5678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033009.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2023-5678: Fixed generating and checking of excessively long X9.42 DH keys that resulted in a possible Denial of Service (bsc#1216922).

Bug fixes:

- The default /etc/ssl/openssl3.cnf file will include any configuration
  files that other packages might place into /etc/ssl/engines3.d/ and
  /etc/ssl/engdef3.d/.
- Create the two new necessary directores for the above
  patch. [bsc#1194187, bsc#1207472]
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-02"/>
	<updated date="2023-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194187">SUSE bug 1194187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207472">SUSE bug 1207472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216922">SUSE bug 1216922</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5678/">CVE-2023-5678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009813339" comment="libopenssl-3-devel-3.0.8-150500.5.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813340" comment="libopenssl-3-devel-32bit-3.0.8-150500.5.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813341" comment="libopenssl3-3.0.8-150500.5.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813342" comment="libopenssl3-32bit-3.0.8-150500.5.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813343" comment="openssl-3-3.0.8-150500.5.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813344" comment="openssl-3-doc-3.0.8-150500.5.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4548" version="1" class="patch">
	<metadata>
		<title>Security update for haproxy (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217653" ref_url="https://bugzilla.suse.com/1217653" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45539" ref_url="https://www.suse.com/security/cve/CVE-2023-45539/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017410.html" source="SUSE-SU"/>
		<description>
This update for haproxy fixes the following issues:

- CVE-2023-45539: Fixed misinterpretation of a path_end rule with # as part of the URI component (bsc#1217653).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-06"/>
	<updated date="2023-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1217653">SUSE bug 1217653</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45539/">CVE-2023-45539 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45539">CVE-2023-45539 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814062" comment="haproxy-2.4.22+git0.f8e3218e2-150400.3.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4549" version="1" class="patch">
	<metadata>
		<title>Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="SUSE-SU-2023:4652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017404.html" source="SUSE-SU"/>
		<description>
This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer fixes the following issues:

Update to version 1.58.0

- Release notes https://github.com/kubevirt/containerized-data-importer/releases/tag/v1.58.0

		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-06"/>
	<updated date="2023-12-06"/>
	<severity>Important</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009813403" comment="containerized-data-importer-api-1.58.0-150500.6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813404" comment="containerized-data-importer-cloner-1.58.0-150500.6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813405" comment="containerized-data-importer-controller-1.58.0-150500.6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813406" comment="containerized-data-importer-importer-1.58.0-150500.6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813407" comment="containerized-data-importer-manifests-1.58.0-150500.6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813408" comment="containerized-data-importer-operator-1.58.0-150500.6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813409" comment="containerized-data-importer-uploadproxy-1.58.0-150500.6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813410" comment="containerized-data-importer-uploadserver-1.58.0-150500.6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813411" comment="obs-service-cdi_containers_meta-1.58.0-150500.6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4550" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216002" ref_url="https://bugzilla.suse.com/1216002" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5366" ref_url="https://www.suse.com/security/cve/CVE-2023-5366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017288.html" source="SUSE-SU"/>
		<description>
This update for openvswitch3 fixes the following issues:

- CVE-2023-5366: Fixed missing masks on a final stage with ports trie (bsc#1216002).  
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-06"/>
	<updated date="2023-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216002">SUSE bug 1216002</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5366/">CVE-2023-5366 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5366">CVE-2023-5366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009814369" comment="libopenvswitch-3_1-0-3.1.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814370" comment="libovn-23_03-0-23.03.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814371" comment="openvswitch3-3.1.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814372" comment="openvswitch3-devel-3.1.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814373" comment="openvswitch3-doc-3.1.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814374" comment="openvswitch3-ipsec-3.1.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814375" comment="openvswitch3-pki-3.1.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814376" comment="openvswitch3-test-3.1.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814377" comment="openvswitch3-vtep-3.1.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814378" comment="ovn3-23.03.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814379" comment="ovn3-central-23.03.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814380" comment="ovn3-devel-23.03.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814381" comment="ovn3-doc-23.03.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814382" comment="ovn3-docker-23.03.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814383" comment="ovn3-host-23.03.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814384" comment="ovn3-vtep-23.03.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814385" comment="python3-ovs3-3.1.0-150500.3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4551" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217573" ref_url="https://bugzilla.suse.com/1217573" source="BUGZILLA"/>
		<reference ref_id="1217574" ref_url="https://bugzilla.suse.com/1217574" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46218" ref_url="https://www.suse.com/security/cve/CVE-2023-46218/" source="CVE"/>
		<reference ref_id="CVE-2023-46219" ref_url="https://www.suse.com/security/cve/CVE-2023-46219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033029.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2023-46218: Fixed cookie mixed case PSL bypass (bsc#1217573).
- CVE-2023-46219: HSTS long file name clears contents (bsc#1217574).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-06"/>
	<updated date="2023-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1217573">SUSE bug 1217573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217574">SUSE bug 1217574</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-46218/">CVE-2023-46218 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46218">CVE-2023-46218 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46219/">CVE-2023-46219 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46219">CVE-2023-46219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009815099" comment="curl-8.0.1-150400.5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815100" comment="libcurl-devel-8.0.1-150400.5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815101" comment="libcurl-devel-32bit-8.0.1-150400.5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815102" comment="libcurl4-8.0.1-150400.5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815103" comment="libcurl4-32bit-8.0.1-150400.5.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4552" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215823" ref_url="https://bugzilla.suse.com/1215823" source="BUGZILLA"/>
		<reference ref_id="1215831" ref_url="https://bugzilla.suse.com/1215831" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26345" ref_url="https://www.suse.com/security/cve/CVE-2021-26345/" source="CVE"/>
		<reference ref_id="CVE-2021-46766" ref_url="https://www.suse.com/security/cve/CVE-2021-46766/" source="CVE"/>
		<reference ref_id="CVE-2021-46774" ref_url="https://www.suse.com/security/cve/CVE-2021-46774/" source="CVE"/>
		<reference ref_id="CVE-2022-23820" ref_url="https://www.suse.com/security/cve/CVE-2022-23820/" source="CVE"/>
		<reference ref_id="CVE-2022-23830" ref_url="https://www.suse.com/security/cve/CVE-2022-23830/" source="CVE"/>
		<reference ref_id="CVE-2023-20519" ref_url="https://www.suse.com/security/cve/CVE-2023-20519/" source="CVE"/>
		<reference ref_id="CVE-2023-20521" ref_url="https://www.suse.com/security/cve/CVE-2023-20521/" source="CVE"/>
		<reference ref_id="CVE-2023-20526" ref_url="https://www.suse.com/security/cve/CVE-2023-20526/" source="CVE"/>
		<reference ref_id="CVE-2023-20533" ref_url="https://www.suse.com/security/cve/CVE-2023-20533/" source="CVE"/>
		<reference ref_id="CVE-2023-20566" ref_url="https://www.suse.com/security/cve/CVE-2023-20566/" source="CVE"/>
		<reference ref_id="CVE-2023-20592" ref_url="https://www.suse.com/security/cve/CVE-2023-20592/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017402.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

Update AMD ucode to 20231030 (bsc#1215831):

- CVE-2022-23820: Failure to validate the AMD SMM communication buffer may allow an attacker to corrupt the SMRAM potentially leading to arbitrary code execution.
- CVE-2021-46774: Insufficient input validation in ABL may enable a privileged attacker to perform arbitrary DRAM writes, potentially resulting in code execution and privilege escalation.
- CVE-2023-20533: Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker using DMA to read/write from/to invalid DRAM address potentially resulting in denial-of-service.
0 CVE-2023-20519: A Use-After-Free vulnerability in the management of an SNP guest context page may allow a malicious hypervisor to masquerade as the guest's migration agent resulting in a potential loss of guest integrity.
- CVE-2023-20566: Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity.
- CVE-2023-20521: TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.
- CVE-2021-46766: Improper clearing of sensitive data in the ASP Bootloader may expose secret keys to a privileged attacker accessing ASP SRAM, potentially leading to a loss of confidentiality.
- CVE-2022-23830: SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.
- CVE-2023-20526: Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality.
- CVE-2021-26345: Failure to validate the value in APCB may allow an attacker with physical access to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service.
- CVE-2023-20592: Issue with INVD instruction aka CacheWarpAttack (bsc#1215823).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-06"/>
	<updated date="2023-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215823">SUSE bug 1215823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215831">SUSE bug 1215831</bugzilla>
	<cve impact="low" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-26345/">CVE-2021-26345 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26345">CVE-2021-26345 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46766/">CVE-2021-46766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46766">CVE-2021-46766 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-46774/">CVE-2021-46774 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46774">CVE-2021-46774 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23820/">CVE-2022-23820 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23820">CVE-2022-23820 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-23830/">CVE-2022-23830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23830">CVE-2022-23830 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-20519/">CVE-2023-20519 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20519">CVE-2023-20519 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-20521/">CVE-2023-20521 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20521">CVE-2023-20521 at NVD</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20526/">CVE-2023-20526 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20526">CVE-2023-20526 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-20533/">CVE-2023-20533 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20533">CVE-2023-20533 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-20566/">CVE-2023-20566 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20566">CVE-2023-20566 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-20592/">CVE-2023-20592 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20592">CVE-2023-20592 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009815140" comment="kernel-firmware-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815141" comment="kernel-firmware-all-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815142" comment="kernel-firmware-amdgpu-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815143" comment="kernel-firmware-ath10k-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815144" comment="kernel-firmware-ath11k-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815145" comment="kernel-firmware-atheros-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815146" comment="kernel-firmware-bluetooth-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815147" comment="kernel-firmware-bnx2-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815148" comment="kernel-firmware-brcm-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815149" comment="kernel-firmware-chelsio-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815150" comment="kernel-firmware-dpaa2-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815151" comment="kernel-firmware-i915-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815152" comment="kernel-firmware-intel-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815153" comment="kernel-firmware-iwlwifi-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815154" comment="kernel-firmware-liquidio-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815155" comment="kernel-firmware-marvell-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815156" comment="kernel-firmware-media-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815157" comment="kernel-firmware-mediatek-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815158" comment="kernel-firmware-mellanox-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815159" comment="kernel-firmware-mwifiex-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815160" comment="kernel-firmware-network-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815161" comment="kernel-firmware-nfp-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815162" comment="kernel-firmware-nvidia-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815163" comment="kernel-firmware-platform-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815164" comment="kernel-firmware-prestera-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815165" comment="kernel-firmware-qcom-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815166" comment="kernel-firmware-qlogic-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815167" comment="kernel-firmware-radeon-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815168" comment="kernel-firmware-realtek-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815169" comment="kernel-firmware-serial-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815170" comment="kernel-firmware-sound-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815171" comment="kernel-firmware-ti-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815172" comment="kernel-firmware-ueagle-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815173" comment="kernel-firmware-usb-network-20230724-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815174" comment="ucode-amd-20230724-150500.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4553" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216002" ref_url="https://bugzilla.suse.com/1216002" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5366" ref_url="https://www.suse.com/security/cve/CVE-2023-5366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4661-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033028.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:

- CVE-2023-5366: Fixed missing masks on a final stage with ports trie (bsc#1216002). 
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-06"/>
	<updated date="2023-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216002">SUSE bug 1216002</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5366/">CVE-2023-5366 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5366">CVE-2023-5366 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009814351" comment="libopenvswitch-2_14-0-2.14.2-150400.24.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814352" comment="libovn-20_06-0-20.06.2-150400.24.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814353" comment="openvswitch-2.14.2-150400.24.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814354" comment="openvswitch-devel-2.14.2-150400.24.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814355" comment="openvswitch-doc-2.14.2-150400.24.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814356" comment="openvswitch-ipsec-2.14.2-150400.24.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814357" comment="openvswitch-pki-2.14.2-150400.24.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814358" comment="openvswitch-test-2.14.2-150400.24.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814359" comment="openvswitch-vtep-2.14.2-150400.24.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814360" comment="ovn-20.06.2-150400.24.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814361" comment="ovn-central-20.06.2-150400.24.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814362" comment="ovn-devel-20.06.2-150400.24.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814363" comment="ovn-doc-20.06.2-150400.24.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814364" comment="ovn-docker-20.06.2-150400.24.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814365" comment="ovn-host-20.06.2-150400.24.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814366" comment="ovn-vtep-20.06.2-150400.24.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814367" comment="python3-ovs-2.14.2-150400.24.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4554" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1188609" ref_url="https://bugzilla.suse.com/1188609" source="BUGZILLA"/>
		<reference ref_id="1212850" ref_url="https://bugzilla.suse.com/1212850" source="BUGZILLA"/>
		<reference ref_id="1213210" ref_url="https://bugzilla.suse.com/1213210" source="BUGZILLA"/>
		<reference ref_id="1213925" ref_url="https://bugzilla.suse.com/1213925" source="BUGZILLA"/>
		<reference ref_id="1215311" ref_url="https://bugzilla.suse.com/1215311" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3638" ref_url="https://www.suse.com/security/cve/CVE-2021-3638/" source="CVE"/>
		<reference ref_id="CVE-2023-3180" ref_url="https://www.suse.com/security/cve/CVE-2023-3180/" source="CVE"/>
		<reference ref_id="CVE-2023-3354" ref_url="https://www.suse.com/security/cve/CVE-2023-3354/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4662-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033027.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2021-3638: hw/display/ati_2d: Fix buffer overflow in ati_2d_blt (bsc#1188609)
- CVE-2023-3180: virtio-crypto: verify src and dst buffer length for sym request (bsc#1213925)
- CVE-2023-3354: io: remove io watch if TLS channel is closed during handshake (bsc#1212850)
- [openSUSE] roms/ipxe: Backport 0aa2e4ec9635, in preparation of binutils 2.41 (bsc#1215311)
- target/s390x: Fix the 'ignored match' case in VSTRS (bsc#1213210)
- linux-user/elfload: Enable vxe2 on s390x (bsc#1213210)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-06"/>
	<updated date="2023-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188609">SUSE bug 1188609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212850">SUSE bug 1212850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213210">SUSE bug 1213210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213925">SUSE bug 1213925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215311">SUSE bug 1215311</bugzilla>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3638/">CVE-2021-3638 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3638">CVE-2021-3638 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3180/">CVE-2023-3180 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3180">CVE-2023-3180 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3354/">CVE-2023-3354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3354">CVE-2023-3354 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009814156" comment="qemu-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814157" comment="qemu-SLOF-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814158" comment="qemu-accel-qtest-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814159" comment="qemu-accel-tcg-x86-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814160" comment="qemu-arm-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814161" comment="qemu-audio-alsa-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814162" comment="qemu-audio-dbus-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814163" comment="qemu-audio-jack-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814164" comment="qemu-audio-pa-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814165" comment="qemu-audio-spice-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814166" comment="qemu-block-curl-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814167" comment="qemu-block-dmg-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814168" comment="qemu-block-gluster-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814169" comment="qemu-block-iscsi-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814170" comment="qemu-block-nfs-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814171" comment="qemu-block-rbd-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814172" comment="qemu-block-ssh-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814173" comment="qemu-chardev-baum-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814174" comment="qemu-chardev-spice-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814175" comment="qemu-extra-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814176" comment="qemu-guest-agent-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814177" comment="qemu-hw-display-qxl-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814178" comment="qemu-hw-display-virtio-gpu-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814179" comment="qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814180" comment="qemu-hw-display-virtio-vga-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814181" comment="qemu-hw-s390x-virtio-gpu-ccw-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814182" comment="qemu-hw-usb-host-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814183" comment="qemu-hw-usb-redirect-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814184" comment="qemu-hw-usb-smartcard-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814185" comment="qemu-ipxe-1.0.0+-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814186" comment="qemu-ivshmem-tools-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814187" comment="qemu-ksm-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814188" comment="qemu-kvm-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814189" comment="qemu-lang-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814190" comment="qemu-microvm-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814191" comment="qemu-ppc-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814192" comment="qemu-s390x-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814193" comment="qemu-seabios-1.16.0_0_gd239552-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814194" comment="qemu-sgabios-8-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814195" comment="qemu-skiboot-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814196" comment="qemu-tools-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814197" comment="qemu-ui-curses-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814198" comment="qemu-ui-dbus-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814199" comment="qemu-ui-gtk-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814200" comment="qemu-ui-opengl-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814201" comment="qemu-ui-spice-app-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814202" comment="qemu-ui-spice-core-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814203" comment="qemu-vgabios-1.16.0_0_gd239552-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814204" comment="qemu-vhost-user-gpu-7.1.0-150500.49.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814205" comment="qemu-x86-7.1.0-150500.49.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4555" version="1" class="patch">
	<metadata>
		<title>Security update for frr (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216896" ref_url="https://bugzilla.suse.com/1216896" source="BUGZILLA"/>
		<reference ref_id="1216897" ref_url="https://bugzilla.suse.com/1216897" source="BUGZILLA"/>
		<reference ref_id="1216899" ref_url="https://bugzilla.suse.com/1216899" source="BUGZILLA"/>
		<reference ref_id="1216900" ref_url="https://bugzilla.suse.com/1216900" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38406" ref_url="https://www.suse.com/security/cve/CVE-2023-38406/" source="CVE"/>
		<reference ref_id="CVE-2023-38407" ref_url="https://www.suse.com/security/cve/CVE-2023-38407/" source="CVE"/>
		<reference ref_id="CVE-2023-47234" ref_url="https://www.suse.com/security/cve/CVE-2023-47234/" source="CVE"/>
		<reference ref_id="CVE-2023-47235" ref_url="https://www.suse.com/security/cve/CVE-2023-47235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017287.html" source="SUSE-SU"/>
		<description>
This update for frr fixes the following issues:

- CVE-2023-47235: Fixed denial of service caused by malformed BGP UPDATE message with an EOR is processed (bsc#1216896).
- CVE-2023-47234: Fixed denial of service caused by crafted BGP UPDATE message with a MP_UNREACH_NLRI attribute (bsc#1216897).
- CVE-2023-38407: Fixed read beyond the end of the stream during labeled unicast parsing (bsc#1216899).
- CVE-2023-38406: Fixed mishandling of nlri length of zero, aka a 'flowspec overflow (bsc#1216900).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-06"/>
	<updated date="2023-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216896">SUSE bug 1216896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216897">SUSE bug 1216897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216899">SUSE bug 1216899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216900">SUSE bug 1216900</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38406/">CVE-2023-38406 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38406">CVE-2023-38406 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38407/">CVE-2023-38407 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38407">CVE-2023-38407 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47234/">CVE-2023-47234 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47234">CVE-2023-47234 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47235/">CVE-2023-47235 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47235">CVE-2023-47235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009814863" comment="frr-8.4-150500.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814864" comment="frr-devel-8.4-150500.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814865" comment="libfrr0-8.4-150500.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814866" comment="libfrr_pb0-8.4-150500.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814867" comment="libfrrcares0-8.4-150500.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814868" comment="libfrrfpm_pb0-8.4-150500.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814869" comment="libfrrospfapiclient0-8.4-150500.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814870" comment="libfrrsnmp0-8.4-150500.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814871" comment="libfrrzmq0-8.4-150500.4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814872" comment="libmlag_pb0-8.4-150500.4.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4556" version="1" class="patch">
	<metadata>
		<title>Security update for suse-build-key (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216410" ref_url="https://bugzilla.suse.com/1216410" source="BUGZILLA"/>
		<reference ref_id="1217215" ref_url="https://bugzilla.suse.com/1217215" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:4672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033022.html" source="SUSE-SU"/>
		<description>
This update for suse-build-key fixes the following issues:

This update runs a import-suse-build-key script.

The previous libzypp-post-script based installation is replaced
with a systemd timer and service (bsc#1217215 bsc#1216410 jsc#PED-2777).
  - suse-build-key-import.service
  - suse-build-key-import.timer

It imports the future SUSE Linux Enterprise 15 4096 bit RSA key primary and reserve keys.
After successful import the timer is disabled.

To manually import them you can also run:

# rpm --import /usr/lib/rpm/gnupg/keys/gpg-pubkey-3fa1d6ce-63c9481c.asc
# rpm --import /usr/lib/rpm/gnupg/keys/gpg-pubkey-d588dc46-63c939db.asc
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-06"/>
	<updated date="2023-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216410">SUSE bug 1216410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217215">SUSE bug 1217215</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813335" comment="suse-build-key-12.0-150000.8.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4557" version="1" class="patch">
	<metadata>
		<title>Security update for gimp (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217160" ref_url="https://bugzilla.suse.com/1217160" source="BUGZILLA"/>
		<reference ref_id="1217161" ref_url="https://bugzilla.suse.com/1217161" source="BUGZILLA"/>
		<reference ref_id="1217162" ref_url="https://bugzilla.suse.com/1217162" source="BUGZILLA"/>
		<reference ref_id="1217163" ref_url="https://bugzilla.suse.com/1217163" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-44441" ref_url="https://www.suse.com/security/cve/CVE-2023-44441/" source="CVE"/>
		<reference ref_id="CVE-2023-44442" ref_url="https://www.suse.com/security/cve/CVE-2023-44442/" source="CVE"/>
		<reference ref_id="CVE-2023-44443" ref_url="https://www.suse.com/security/cve/CVE-2023-44443/" source="CVE"/>
		<reference ref_id="CVE-2023-44444" ref_url="https://www.suse.com/security/cve/CVE-2023-44444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017408.html" source="SUSE-SU"/>
		<description>
This update for gimp fixes the following issues:

- CVE-2023-44441: Fixed Heap-based Buffer Overflow in DDS (bsc#1217160).
- CVE-2023-44442: Fixed Heap-based Buffer Overflow in PSD (bsc#1217161).
- CVE-2023-44443: Fixed Integer Overflow in PSP (bsc#1217162).
- CVE-2023-44444: Fixed Off-By-One om PSP (bsc#1217163).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-07"/>
	<updated date="2023-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217160">SUSE bug 1217160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217161">SUSE bug 1217161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217162">SUSE bug 1217162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217163">SUSE bug 1217163</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44441/">CVE-2023-44441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-44441">CVE-2023-44441 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44442/">CVE-2023-44442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-44442">CVE-2023-44442 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44443/">CVE-2023-44443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-44443">CVE-2023-44443 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-44444/">CVE-2023-44444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-44444">CVE-2023-44444 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009815009" comment="gimp-2.10.30-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815010" comment="gimp-devel-2.10.30-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815011" comment="gimp-lang-2.10.30-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815012" comment="gimp-plugin-aa-2.10.30-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815013" comment="libgimp-2_0-0-2.10.30-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815014" comment="libgimp-2_0-0-32bit-2.10.30-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815015" comment="libgimpui-2_0-0-2.10.30-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815016" comment="libgimpui-2_0-0-32bit-2.10.30-150400.3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4558" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217654" ref_url="https://bugzilla.suse.com/1217654" source="BUGZILLA"/>
		<reference ref_id="1217813" ref_url="https://bugzilla.suse.com/1217813" source="BUGZILLA"/>
		<reference ref_id="1217815" ref_url="https://bugzilla.suse.com/1217815" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-49285" ref_url="https://www.suse.com/security/cve/CVE-2023-49285/" source="CVE"/>
		<reference ref_id="CVE-2023-49286" ref_url="https://www.suse.com/security/cve/CVE-2023-49286/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017407.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2023-49285: Fixed buffer over read bug on HTTP Message processing flow (bsc#1217813)
- CVE-2023-49286: Fixed Denial of Service vulnerability in helper process management (bsc#1217815)
- Fix X-Forwarded-For Stack Overflow (bsc#1217654)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-08"/>
	<updated date="2023-12-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217654">SUSE bug 1217654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217813">SUSE bug 1217813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217815">SUSE bug 1217815</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49285/">CVE-2023-49285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49285">CVE-2023-49285 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49286/">CVE-2023-49286 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49286">CVE-2023-49286 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815008" comment="squid-5.7-150400.3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4559" version="1" class="patch">
	<metadata>
		<title>Security update for go1.20 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206346" ref_url="https://bugzilla.suse.com/1206346" source="BUGZILLA"/>
		<reference ref_id="1216943" ref_url="https://bugzilla.suse.com/1216943" source="BUGZILLA"/>
		<reference ref_id="1217833" ref_url="https://bugzilla.suse.com/1217833" source="BUGZILLA"/>
		<reference ref_id="1217834" ref_url="https://bugzilla.suse.com/1217834" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39326" ref_url="https://www.suse.com/security/cve/CVE-2023-39326/" source="CVE"/>
		<reference ref_id="CVE-2023-45284" ref_url="https://www.suse.com/security/cve/CVE-2023-45284/" source="CVE"/>
		<reference ref_id="CVE-2023-45285" ref_url="https://www.suse.com/security/cve/CVE-2023-45285/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017307.html" source="SUSE-SU"/>
		<description>
This update for go1.20 fixes the following issues:

Update to go1.20.12:

- CVE-2023-45285: cmd/go: git VCS qualifier in module path uses git:// scheme (bsc#1217834).
- CVE-2023-45284: path/filepath: Clean removes ending slash for volume on Windows in Go 1.21.4 (bsc#1216943).
- CVE-2023-39326: net/http: limit chunked data overhead (bsc#1217833).
- cmd/compile: internal compiler error: panic during prove while compiling: unexpected induction with too many parents
- cmd/go: TestScript/mod_get_direct fails with 'Filename too long' on Windows
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-11"/>
	<updated date="2023-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206346">SUSE bug 1206346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216943">SUSE bug 1216943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217833">SUSE bug 1217833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217834">SUSE bug 1217834</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39326/">CVE-2023-39326 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39326">CVE-2023-39326 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45284/">CVE-2023-45284 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45284">CVE-2023-45284 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-45285/">CVE-2023-45285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009815091" comment="go1.20-1.20.12-150000.1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815092" comment="go1.20-doc-1.20.12-150000.1.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815093" comment="go1.20-race-1.20.12-150000.1.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4560" version="1" class="patch">
	<metadata>
		<title>Security update for go1.21 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="1216943" ref_url="https://bugzilla.suse.com/1216943" source="BUGZILLA"/>
		<reference ref_id="1217833" ref_url="https://bugzilla.suse.com/1217833" source="BUGZILLA"/>
		<reference ref_id="1217834" ref_url="https://bugzilla.suse.com/1217834" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39326" ref_url="https://www.suse.com/security/cve/CVE-2023-39326/" source="CVE"/>
		<reference ref_id="CVE-2023-45284" ref_url="https://www.suse.com/security/cve/CVE-2023-45284/" source="CVE"/>
		<reference ref_id="CVE-2023-45285" ref_url="https://www.suse.com/security/cve/CVE-2023-45285/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017389.html" source="SUSE-SU"/>
		<description>
This update for go1.21 fixes the following issues:

Update to go1.21.5:

- CVE-2023-45285: cmd/go: git VCS qualifier in module path uses git:// scheme (bsc#1217834).
- CVE-2023-45284: path/filepath: Clean removes ending slash for volume on Windows in Go 1.21.4 (bsc#1216943).
- CVE-2023-39326: net/http: limit chunked data overhead (bsc#1217833).
- cmd/go: go mod download needs to support toolchain upgrades
- cmd/compile: invalid pointer found on stack when compiled with -race
- os: NTFS deduped file changed from regular to irregular
- net: TCPConn.ReadFrom hangs when io.Reader is TCPConn or UnixConn, Linux kernel &lt; 5.1
- cmd/compile: internal compiler error: panic during prove while compiling: unexpected induction with too many parents
- syscall: TestOpenFileLimit unintentionally runs on non-Unix platforms
- runtime: self-deadlock on mheap_.lock
- crypto/rand: Legacy RtlGenRandom use on Windows
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-11"/>
	<updated date="2023-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216943">SUSE bug 1216943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217833">SUSE bug 1217833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217834">SUSE bug 1217834</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39326/">CVE-2023-39326 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39326">CVE-2023-39326 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45284/">CVE-2023-45284 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45284">CVE-2023-45284 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-45285/">CVE-2023-45285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009815094" comment="go1.21-1.21.5-150000.1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815095" comment="go1.21-doc-1.21.5-150000.1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815096" comment="go1.21-race-1.21.5-150000.1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4561" version="1" class="patch">
	<metadata>
		<title>Security update for hplip (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214399" ref_url="https://bugzilla.suse.com/1214399" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:4710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017306.html" source="SUSE-SU"/>
		<description>
This update for hplip fixes the following issues:

- Fixed insecure /tmp file paths inside hppsfilter booklet printing (bsc#1214399)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-11"/>
	<updated date="2023-12-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214399">SUSE bug 1214399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009811394" comment="hplip-3.21.10-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811395" comment="hplip-devel-3.21.10-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811396" comment="hplip-hpijs-3.21.10-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811397" comment="hplip-sane-3.21.10-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009811398" comment="hplip-scan-utils-3.21.10-150400.3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4562" version="1" class="patch">
	<metadata>
		<title>Security update for catatonit, containerd, runc (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1200528" ref_url="https://bugzilla.suse.com/1200528" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1996" ref_url="https://www.suse.com/security/cve/CVE-2022-1996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033070.html" source="SUSE-SU"/>
		<description>

This update of runc and containerd fixes the following issues:

containerd:

- Update to containerd v1.7.8. Upstream release notes:
  https://github.com/containerd/containerd/releases/tag/v1.7.8

    * CVE-2022-1996: Fixed CORS bypass in go-restful (bsc#1200528)

catatonit:

- Update to catatonit v0.2.0.
  * Change license to GPL-2.0-or-later.

- Update to catatont v0.1.7
  * This release adds the ability for catatonit to be used as the only
    process in a pause container, by passing the -P flag (in this mode no
    subprocess is spawned and thus no signal forwarding is done).

- Update to catatonit v0.1.6, which fixes a few bugs -- mainly ones related to
  socket activation or features somewhat adjacent to socket activation (such as
  passing file descriptors).

runc:

- Update to runc v1.1.10. Upstream changelog is available from
  https://github.com/opencontainers/runc/releases/tag/v1.1.10

		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-12"/>
	<updated date="2023-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200528">SUSE bug 1200528</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1996/">CVE-2022-1996 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1996">CVE-2022-1996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009813757" comment="containerd-1.7.8-150000.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813758" comment="containerd-ctr-1.7.8-150000.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813803" comment="containerd-devel-1.7.8-150000.103.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813765" comment="runc-1.1.10-150000.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4563" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1084909" ref_url="https://bugzilla.suse.com/1084909" source="BUGZILLA"/>
		<reference ref_id="1207948" ref_url="https://bugzilla.suse.com/1207948" source="BUGZILLA"/>
		<reference ref_id="1210447" ref_url="https://bugzilla.suse.com/1210447" source="BUGZILLA"/>
		<reference ref_id="1214286" ref_url="https://bugzilla.suse.com/1214286" source="BUGZILLA"/>
		<reference ref_id="1214700" ref_url="https://bugzilla.suse.com/1214700" source="BUGZILLA"/>
		<reference ref_id="1214840" ref_url="https://bugzilla.suse.com/1214840" source="BUGZILLA"/>
		<reference ref_id="1214976" ref_url="https://bugzilla.suse.com/1214976" source="BUGZILLA"/>
		<reference ref_id="1215123" ref_url="https://bugzilla.suse.com/1215123" source="BUGZILLA"/>
		<reference ref_id="1215124" ref_url="https://bugzilla.suse.com/1215124" source="BUGZILLA"/>
		<reference ref_id="1215292" ref_url="https://bugzilla.suse.com/1215292" source="BUGZILLA"/>
		<reference ref_id="1215420" ref_url="https://bugzilla.suse.com/1215420" source="BUGZILLA"/>
		<reference ref_id="1215458" ref_url="https://bugzilla.suse.com/1215458" source="BUGZILLA"/>
		<reference ref_id="1215710" ref_url="https://bugzilla.suse.com/1215710" source="BUGZILLA"/>
		<reference ref_id="1215802" ref_url="https://bugzilla.suse.com/1215802" source="BUGZILLA"/>
		<reference ref_id="1215931" ref_url="https://bugzilla.suse.com/1215931" source="BUGZILLA"/>
		<reference ref_id="1216058" ref_url="https://bugzilla.suse.com/1216058" source="BUGZILLA"/>
		<reference ref_id="1216105" ref_url="https://bugzilla.suse.com/1216105" source="BUGZILLA"/>
		<reference ref_id="1216259" ref_url="https://bugzilla.suse.com/1216259" source="BUGZILLA"/>
		<reference ref_id="1216527" ref_url="https://bugzilla.suse.com/1216527" source="BUGZILLA"/>
		<reference ref_id="1216584" ref_url="https://bugzilla.suse.com/1216584" source="BUGZILLA"/>
		<reference ref_id="1216687" ref_url="https://bugzilla.suse.com/1216687" source="BUGZILLA"/>
		<reference ref_id="1216693" ref_url="https://bugzilla.suse.com/1216693" source="BUGZILLA"/>
		<reference ref_id="1216759" ref_url="https://bugzilla.suse.com/1216759" source="BUGZILLA"/>
		<reference ref_id="1216788" ref_url="https://bugzilla.suse.com/1216788" source="BUGZILLA"/>
		<reference ref_id="1216844" ref_url="https://bugzilla.suse.com/1216844" source="BUGZILLA"/>
		<reference ref_id="1216861" ref_url="https://bugzilla.suse.com/1216861" source="BUGZILLA"/>
		<reference ref_id="1216909" ref_url="https://bugzilla.suse.com/1216909" source="BUGZILLA"/>
		<reference ref_id="1216959" ref_url="https://bugzilla.suse.com/1216959" source="BUGZILLA"/>
		<reference ref_id="1216965" ref_url="https://bugzilla.suse.com/1216965" source="BUGZILLA"/>
		<reference ref_id="1216976" ref_url="https://bugzilla.suse.com/1216976" source="BUGZILLA"/>
		<reference ref_id="1217036" ref_url="https://bugzilla.suse.com/1217036" source="BUGZILLA"/>
		<reference ref_id="1217068" ref_url="https://bugzilla.suse.com/1217068" source="BUGZILLA"/>
		<reference ref_id="1217086" ref_url="https://bugzilla.suse.com/1217086" source="BUGZILLA"/>
		<reference ref_id="1217095" ref_url="https://bugzilla.suse.com/1217095" source="BUGZILLA"/>
		<reference ref_id="1217124" ref_url="https://bugzilla.suse.com/1217124" source="BUGZILLA"/>
		<reference ref_id="1217140" ref_url="https://bugzilla.suse.com/1217140" source="BUGZILLA"/>
		<reference ref_id="1217147" ref_url="https://bugzilla.suse.com/1217147" source="BUGZILLA"/>
		<reference ref_id="1217195" ref_url="https://bugzilla.suse.com/1217195" source="BUGZILLA"/>
		<reference ref_id="1217196" ref_url="https://bugzilla.suse.com/1217196" source="BUGZILLA"/>
		<reference ref_id="1217200" ref_url="https://bugzilla.suse.com/1217200" source="BUGZILLA"/>
		<reference ref_id="1217205" ref_url="https://bugzilla.suse.com/1217205" source="BUGZILLA"/>
		<reference ref_id="1217332" ref_url="https://bugzilla.suse.com/1217332" source="BUGZILLA"/>
		<reference ref_id="1217366" ref_url="https://bugzilla.suse.com/1217366" source="BUGZILLA"/>
		<reference ref_id="1217511" ref_url="https://bugzilla.suse.com/1217511" source="BUGZILLA"/>
		<reference ref_id="1217515" ref_url="https://bugzilla.suse.com/1217515" source="BUGZILLA"/>
		<reference ref_id="1217598" ref_url="https://bugzilla.suse.com/1217598" source="BUGZILLA"/>
		<reference ref_id="1217599" ref_url="https://bugzilla.suse.com/1217599" source="BUGZILLA"/>
		<reference ref_id="1217609" ref_url="https://bugzilla.suse.com/1217609" source="BUGZILLA"/>
		<reference ref_id="1217687" ref_url="https://bugzilla.suse.com/1217687" source="BUGZILLA"/>
		<reference ref_id="1217731" ref_url="https://bugzilla.suse.com/1217731" source="BUGZILLA"/>
		<reference ref_id="1217780" ref_url="https://bugzilla.suse.com/1217780" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2006" ref_url="https://www.suse.com/security/cve/CVE-2023-2006/" source="CVE"/>
		<reference ref_id="CVE-2023-25775" ref_url="https://www.suse.com/security/cve/CVE-2023-25775/" source="CVE"/>
		<reference ref_id="CVE-2023-39197" ref_url="https://www.suse.com/security/cve/CVE-2023-39197/" source="CVE"/>
		<reference ref_id="CVE-2023-39198" ref_url="https://www.suse.com/security/cve/CVE-2023-39198/" source="CVE"/>
		<reference ref_id="CVE-2023-4244" ref_url="https://www.suse.com/security/cve/CVE-2023-4244/" source="CVE"/>
		<reference ref_id="CVE-2023-45863" ref_url="https://www.suse.com/security/cve/CVE-2023-45863/" source="CVE"/>
		<reference ref_id="CVE-2023-45871" ref_url="https://www.suse.com/security/cve/CVE-2023-45871/" source="CVE"/>
		<reference ref_id="CVE-2023-46862" ref_url="https://www.suse.com/security/cve/CVE-2023-46862/" source="CVE"/>
		<reference ref_id="CVE-2023-5158" ref_url="https://www.suse.com/security/cve/CVE-2023-5158/" source="CVE"/>
		<reference ref_id="CVE-2023-5633" ref_url="https://www.suse.com/security/cve/CVE-2023-5633/" source="CVE"/>
		<reference ref_id="CVE-2023-5717" ref_url="https://www.suse.com/security/cve/CVE-2023-5717/" source="CVE"/>
		<reference ref_id="CVE-2023-6039" ref_url="https://www.suse.com/security/cve/CVE-2023-6039/" source="CVE"/>
		<reference ref_id="CVE-2023-6176" ref_url="https://www.suse.com/security/cve/CVE-2023-6176/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).
- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).
- CVE-2023-5633: Fixed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface (bsc#1216527).
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).
- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).
- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).
- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).
- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).
- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).

The following non-security bugs were fixed:

- ACPI: FPDT: properly handle invalid FPDT subtables (git-fixes).
- ACPI: resource: Do IRQ override on TongFang GMxXGxx (git-fixes).
- ACPI: resource: Skip IRQ override on ASUS ExpertBook B1402CVA (git-fixes).
- ACPI: sysfs: Fix create_pnp_modalias() and create_of_modalias() (git-fixes).
- ALSA: hda/realtek - ALC287 Realtek I2S speaker platform support (git-fixes).
- ALSA: hda/realtek - Add Dell ALC295 to pin fall back table (git-fixes).
- ALSA: hda/realtek - Enable internal speaker of ASUS K6500ZC (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS UX7602ZM (git-fixes).
- ALSA: hda/realtek: Add quirks for ASUS 2024 Zenbooks (git-fixes).
- ALSA: hda/realtek: Add quirks for HP Laptops (git-fixes).
- ALSA: hda/realtek: Add support dual speaker for Dell (git-fixes).
- ALSA: hda/realtek: Enable Mute LED on HP 255 G10 (git-fixes).
- ALSA: hda/realtek: Enable Mute LED on HP 255 G8 (git-fixes).
- ALSA: hda: ASUS UM5302LA: Added quirks for cs35L41/10431A83 on i2c bus (git-fixes).
- ALSA: hda: Disable power-save on KONTRON SinglePC (bsc#1217140).
- ALSA: hda: Fix possible null-ptr-deref when assigning a stream (git-fixes).
- ALSA: hda: cs35l41: Fix unbalanced pm_runtime_get() (git-fixes).
- ALSA: hda: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).
- ALSA: hda: intel-dsp-config: Fix JSL Chromebook quirk detection (git-fixes).
- ALSA: info: Fix potential deadlock at disconnection (git-fixes).
- ALSA: usb-audio: add quirk flag to enable native DSD for McIntosh devices (git-fixes).
- ARM: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).
- ASoC: Intel: Skylake: Fix mem leak when parsing UUIDs fails (git-fixes).
- ASoC: SOF: core: Ensure sof_ops_free() is still called when probe never ran (git-fixes).
- ASoC: ams-delta.c: use component after check (git-fixes).
- ASoC: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).
- ASoC: cs35l41: Undo runtime PM changes at driver exit time (git-fixes).
- ASoC: cs35l41: Verify PM runtime resume errors in IRQ handler (git-fixes).
- ASoC: fsl: Fix PM disable depth imbalance in fsl_easrc_probe (git-fixes).
- ASoC: fsl: mpc5200_dma.c: Fix warning of Function parameter or member not described (git-fixes).
- ASoC: hdmi-codec: register hpd callback on component probe (git-fixes).
- ASoC: rt5650: fix the wrong result of key button (git-fixes).
- ASoC: simple-card: fixup asoc_simple_probe() error handling (git-fixes).
- ASoC: ti: omap-mcbsp: Fix runtime PM underflow warnings (git-fixes).
- Bluetooth: btusb: Add 0bda:b85b for Fn-Link RTL8852BE (git-fixes).
- Bluetooth: btusb: Add RTW8852BE device 13d3:3570 to device tables (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0cb8:0xc559 (git-fixes).
- Bluetooth: btusb: Add date-&gt;evt_skb is NULL check (git-fixes).
- Documentation: networking: correct possessive 'its' (bsc#1215458).
- Drivers: hv: vmbus: Remove unused extern declaration vmbus_ontimer() (git-fixes).
- Fix termination state for idr_for_each_entry_ul() (git-fixes).
- HID: Add quirk for Dell Pro Wireless Keyboard and Mouse KM5221W (git-fixes).
- HID: hyperv: Replace one-element array with flexible-array member (git-fixes).
- HID: hyperv: avoid struct memcpy overrun warning (git-fixes).
- HID: hyperv: remove unused struct synthhid_msg (git-fixes).
- HID: lenovo: Detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).
- HID: logitech-hidpp: Do not restart IO, instead defer hid_connect() only (git-fixes).
- HID: logitech-hidpp: Move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).
- HID: logitech-hidpp: Remove HIDPP_QUIRK_NO_HIDINPUT quirk (git-fixes).
- HID: logitech-hidpp: Revert 'Do not restart communication if not necessary' (git-fixes).
- Input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).
- Input: synaptics-rmi4 - handle reset delay when using SMBus trsnsport (git-fixes).
- Input: xpad - add VID for Turtle Beach controllers (git-fixes).
- NFS: Fix access to page-&gt;mapping (bsc#1216788).
- PCI/ASPM: Fix L1 substate handling in aspm_attr_store_common() (git-fixes).
- PCI/sysfs: Protect driver's D3cold preference from user space (git-fixes).
- PCI: Disable ATS for specific Intel IPU E2000 devices (bsc#1215458).
- PCI: Extract ATS disabling to a helper function (bsc#1215458).
- PCI: Prevent xHCI driver from claiming AMD VanGogh USB3 DRD device (git-fixes).
- PCI: Use FIELD_GET() in Sapphire RX 5600 XT Pulse quirk (git-fixes).
- PCI: Use FIELD_GET() to extract Link Width (git-fixes).
- PCI: exynos: Do not discard .remove() callback (git-fixes).
- PCI: keystone: Do not discard .probe() callback (git-fixes).
- PCI: keystone: Do not discard .remove() callback (git-fixes).
- PCI: tegra194: Use FIELD_GET()/FIELD_PREP() with Link Width fields (git-fixes).
- PCI: vmd: Correct PCI Header Type Register's multi-function check (git-fixes).
- PM / devfreq: rockchip-dfi: Make pmu regmap mandatory (git-fixes).
- PM: hibernate: Use __get_safe_page() rather than touching the list (git-fixes).
- USB: dwc2: write HCINT with INTMASK applied (bsc#1214286).
- USB: dwc3: qcom: fix ACPI platform device leak (git-fixes).
- USB: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).
- USB: dwc3: qcom: fix software node leak on probe errors (git-fixes).
- USB: dwc3: qcom: fix wakeup after probe deferral (git-fixes).
- USB: serial: option: add Fibocom L7xx modules (git-fixes).
- USB: serial: option: add Luat Air72*U series products (git-fixes).
- USB: serial: option: do not claim interface 4 for ZTE MF290 (git-fixes).
- USB: serial: option: fix FM101R-GL defines (git-fixes).
- USB: usbip: fix stub_dev hub disconnect (git-fixes).
- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).
- arm64: Add Cortex-A520 CPU part definition (git-fixes)
- arm64: allow kprobes on EL0 handlers (git-fixes)
- arm64: armv8_deprecated move emulation functions (git-fixes)
- arm64: armv8_deprecated: fix unused-function error (git-fixes)
- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)
- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)
- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)
- arm64: consistently pass ESR_ELx to die() (git-fixes)
- arm64: die(): pass 'err' as long (git-fixes)
- arm64: factor insn read out of call_undef_hook() (git-fixes)
- arm64: factor out EL1 SSBS emulation hook (git-fixes)
- arm64: report EL1 UNDEFs better (git-fixes)
- arm64: rework BTI exception handling (git-fixes)
- arm64: rework EL0 MRS emulation (git-fixes)
- arm64: rework FPAC exception handling (git-fixes)
- arm64: split EL0/EL1 UNDEF handlers (git-fixes)
- ata: pata_isapnp: Add missing error check for devm_ioport_map() (git-fixes).
- atl1c: Work around the DMA RX overflow issue (git-fixes).
- atm: iphase: Do PCI error checks on own line (git-fixes).
- blk-mq: Do not clear driver tags own mapping (bsc#1217366).
- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).
- bluetooth: Add device 0bda:887b to device tables (git-fixes).
- bluetooth: Add device 13d3:3571 to device tables (git-fixes).
- btrfs: always log symlinks in full mode (bsc#1214840).
- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).
- can: dev: can_restart(): do not crash kernel if carrier is OK (git-fixes).
- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).
- can: isotp: add local echo tx processing for consecutive frames (git-fixes).
- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).
- can: isotp: fix tx state handling for echo tx processing (git-fixes).
- can: isotp: handle wait_event_interruptible() return values (git-fixes).
- can: isotp: isotp_bind(): return -EINVAL on incorrect CAN ID formatting (git-fixes).
- can: isotp: isotp_sendmsg(): fix TX state detection and wait behavior (git-fixes).
- can: isotp: remove re-binding of bound socket (git-fixes).
- can: isotp: sanitize CAN ID checks in isotp_bind() (git-fixes).
- can: isotp: set max PDU size to 64 kByte (git-fixes).
- can: isotp: split tx timer into transmission and timeout (git-fixes).
- can: sja1000: Fix comment (git-fixes).
- clk: Sanitize possible_parent_show to Handle Return Value of of_clk_get_parent_name (git-fixes).
- clk: imx: Select MXC_CLK for CLK_IMX8QXP (git-fixes).
- clk: imx: imx8mq: correct error handling path (git-fixes).
- clk: imx: imx8qxp: Fix elcdif_pll clock (git-fixes).
- clk: keystone: pll: fix a couple NULL vs IS_ERR() checks (git-fixes).
- clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data (git-fixes).
- clk: npcm7xx: Fix incorrect kfree (git-fixes).
- clk: qcom: clk-rcg2: Fix clock rate overflow for high parent frequencies (git-fixes).
- clk: qcom: config IPQ_APSS_6018 should depend on QCOM_SMEM (git-fixes).
- clk: qcom: gcc-sm8150: Fix gcc_sdcc2_apps_clk_src (git-fixes).
- clk: qcom: ipq6018: drop the CLK_SET_RATE_PARENT flag from PLL clocks (git-fixes).
- clk: qcom: mmcc-msm8998: Do not check halt bit on some branch clks (git-fixes).
- clk: qcom: mmcc-msm8998: Fix the SMMU GDSC (git-fixes).
- clk: scmi: Free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).
- clk: ti: Add ti_dt_clk_name() helper to use clock-output-names (git-fixes).
- clk: ti: Update component clocks to use ti_dt_clk_name() (git-fixes).
- clk: ti: Update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).
- clk: ti: change ti_clk_register[_omap_hw]() API (git-fixes).
- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).
- clocksource/drivers/timer-atmel-tcb: Fix initialization on SAM9 hardware (git-fixes).
- clocksource/drivers/timer-imx-gpt: Fix potential memory leak (git-fixes).
- crypto: caam/jr - fix Chacha20 + Poly1305 self test failure (git-fixes).
- crypto: caam/qi2 - fix Chacha20 + Poly1305 self test failure (git-fixes).
- crypto: hisilicon/hpre - Fix a erroneous check after snprintf() (git-fixes).
- dmaengine: pxa_dma: Remove an erroneous BUG_ON() in pxad_free_desc() (git-fixes).
- dmaengine: ste_dma40: Fix PM disable depth imbalance in d40_probe (git-fixes).
- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).
- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).
- drm/amd/display: Avoid NULL dereference of timing generator (git-fixes).
- drm/amd/display: Change the DMCUB mailbox memory location from FB to inbox (git-fixes).
- drm/amd/display: Refactor dm_get_plane_scale helper (git-fixes).
- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).
- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).
- drm/amd/pm: Handle non-terminated overdrive commands (git-fixes).
- drm/amd: Disable ASPM for VI w/ all Intel systems (git-fixes).
- drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (git-fixes).
- drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 (git-fixes).
- drm/amd: Move helper for dynamic speed switch check out of smu13 (git-fixes).
- drm/amd: Update `update_pcie_parameters` functions to use uint8_t arguments (git-fixes).
- drm/amdgpu/vkms: fix a possible null pointer dereference (git-fixes).
- drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (git-fixes).
- drm/amdgpu: Fix potential null pointer derefernce (git-fixes).
- drm/amdgpu: Remove unnecessary domain argument (git-fixes).
- drm/amdgpu: Reserve fences for VM update (git-fixes).
- drm/amdgpu: add drv_vram_usage_va for virt data exchange (bsc#1215802).
- drm/amdgpu: add vram reservation based on vram_usagebyfirmware_v2_2 (git-fixes).
- drm/amdgpu: do not use ATRM for external devices (git-fixes).
- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).
- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).
- drm/amdgpu: not to save bo in the case of RAS err_event_athub (git-fixes).
- drm/amdgpu: skip vram reserve on firmware_v2_2 for bare-metal (bsc#1215802).
- drm/amdkfd: Fix a race condition of vram buffer unref in svm code (git-fixes).
- drm/amdkfd: Fix shift out-of-bounds issue (git-fixes).
- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).
- drm/bridge: Fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).
- drm/bridge: lt8912b: Add missing drm_bridge_attach call (git-fixes).
- drm/bridge: lt8912b: Fix bridge_detach (git-fixes).
- drm/bridge: lt8912b: Fix crash on bridge detach (git-fixes).
- drm/bridge: lt8912b: Manually disable HPD only if it was enabled (git-fixes).
- drm/bridge: lt8912b: Register and attach our DSI device at probe (git-fixes).
- drm/bridge: lt8912b: Switch to devm MIPI-DSI helpers (git-fixes).
- drm/bridge: lt9611uxc: Register and attach our DSI device at probe (git-fixes).
- drm/bridge: lt9611uxc: Switch to devm MIPI-DSI helpers (git-fixes).
- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).
- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).
- drm/bridge: tc358768: Clean up clock period code (git-fixes).
- drm/bridge: tc358768: Disable non-continuous clock mode (git-fixes).
- drm/bridge: tc358768: Fix bit updates (git-fixes).
- drm/bridge: tc358768: Fix tc358768_ns_to_cnt() (git-fixes).
- drm/bridge: tc358768: Fix use of uninitialized variable (git-fixes).
- drm/bridge: tc358768: Print logical values, not raw register values (git-fixes).
- drm/bridge: tc358768: Rename dsibclk to hsbyteclk (git-fixes).
- drm/bridge: tc358768: Use dev for dbg prints, not priv-&gt;dev (git-fixes).
- drm/bridge: tc358768: Use struct videomode (git-fixes).
- drm/bridge: tc358768: remove unused variable (git-fixes).
- drm/dp_mst: Fix NULL deref in get_mst_branch_device_by_guid_helper() (git-fixes).
- drm/gma500: Fix call trace when psb_gem_mm_init() fails (git-fixes).
- drm/gud: Use size_add() in call to struct_size() (git-fixes).
- drm/i915: Fix potential spectre vulnerability (git-fixes).
- drm/i915: Flush WC GGTT only on required platforms (git-fixes).
- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).
- drm/mediatek: Fix iommu fault by swapping FBs after updating plane state (git-fixes).
- drm/mediatek: Fix iommu fault during crtc enabling (git-fixes).
- drm/mipi-dsi: Create devm device attachment (git-fixes).
- drm/mipi-dsi: Create devm device registration (git-fixes).
- drm/msm/dp: skip validity check for DP CTS EDID checksum (git-fixes).
- drm/msm/dsi: free TX buffer in unbind (git-fixes).
- drm/msm/dsi: use msm_gem_kernel_put to free TX buffer (git-fixes).
- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).
- drm/panel: fix a possible null pointer dereference (git-fixes).
- drm/panel: simple: Fix Innolux G101ICE-L01 bus flags (git-fixes).
- drm/panel: simple: Fix Innolux G101ICE-L01 timings (git-fixes).
- drm/panel: st7703: Pick different reset sequence (git-fixes).
- drm/qxl: prevent memory leak (git-fixes).
- drm/radeon: fix a possible null pointer dereference (git-fixes).
- drm/radeon: possible buffer overflow (git-fixes).
- drm/rockchip: Fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).
- drm/rockchip: cdn-dp: Fix some error handling paths in cdn_dp_probe() (git-fixes).
- drm/rockchip: vop: Fix call to crtc reset helper (git-fixes).
- drm/rockchip: vop: Fix color for RGB888/BGR888 format on VOP full (git-fixes).
- drm/rockchip: vop: Fix reset of state in duplicate state crtc funcs (git-fixes).
- drm/syncobj: fix DRM_SYNCOBJ_WAIT_FLAGS_WAIT_AVAILABLE (git-fixes).
- drm/ttm: Reorder sys manager cleanup step (git-fixes).
- drm/vc4: fix typo (git-fixes).
- drm/vmwgfx: Remove the duplicate bo_free function (bsc#1216527)
- drm/vmwgfx: Rename vmw_buffer_object to vmw_bo (bsc#1216527)
- drm: bridge: it66121: Fix invalid connector dereference (git-fixes).
- drm: mediatek: mtk_dsi: Fix NO_EOT_PACKET settings/handling (git-fixes).
- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).
- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).
- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).
- fbdev: atyfb: only use ioremap_uc() on i386 and ia64 (git-fixes).
- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).
- fbdev: imsttfb: Fix error path of imsttfb_probe() (git-fixes).
- fbdev: imsttfb: Release framebuffer and dealloc cmap on error path (git-fixes).
- fbdev: imsttfb: fix a resource leak in probe (git-fixes).
- fbdev: imsttfb: fix double free in probe() (git-fixes).
- fbdev: omapfb: Drop unused remove function (git-fixes).
- fbdev: uvesafb: Call cn_del_callback() at the end of uvesafb_exit() (git-fixes).
- firewire: core: fix possible memory leak in create_units() (git-fixes).
- gpio: mockup: fix kerneldoc (git-fixes).
- gpio: mockup: remove unused field (git-fixes).
- gpu: host1x: Correct allocated size for contexts (git-fixes).
- hid: cp2112: Fix duplicate workqueue initialization (git-fixes).
- hv: simplify sysctl registration (git-fixes).
- hv_netvsc: Fix race of register_netdevice_notifier and VF register (git-fixes).
- hv_netvsc: Mark VF as slave before exposing it to user-mode (git-fixes).
- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).
- hv_netvsc: fix race of netvsc and VF register_netdevice (git-fixes).
- hwmon: (coretemp) Fix potentially truncated sysfs attribute name (git-fixes).
- i2c: core: Run atomic i2c xfer when !preemptible (git-fixes).
- i2c: designware: Disable TX_EMPTY irq while waiting for block length byte (git-fixes).
- i2c: dev: copy userspace array safely (git-fixes).
- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).
- i2c: iproc: handle invalid slave state (git-fixes).
- i2c: sun6i-p2wi: Prevent potential division by zero (git-fixes).
- i3c: Fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).
- i3c: master: cdns: Fix reading status register (git-fixes).
- i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data (git-fixes).
- i3c: master: svc: fix SDA keep low when polling IBIWON timeout happen (git-fixes).
- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).
- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).
- i3c: master: svc: fix race condition in ibi work thread (git-fixes).
- i3c: master: svc: fix wrong data return when IBI happen during start frame (git-fixes).
- i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler (git-fixes).
- i915/perf: Fix NULL deref bugs with drm_dbg() calls (git-fixes).
- idpf: add RX splitq napi poll support (bsc#1215458).
- idpf: add SRIOV support and other ndo_ops (bsc#1215458).
- idpf: add TX splitq napi poll support (bsc#1215458).
- idpf: add controlq init and reset checks (bsc#1215458).
- idpf: add core init and interrupt request (bsc#1215458).
- idpf: add create vport and netdev configuration (bsc#1215458).
- idpf: add ethtool callbacks (bsc#1215458).
- idpf: add module register and probe functionality (bsc#1215458).
- idpf: add ptypes and MAC filter support (bsc#1215458).
- idpf: add singleq start_xmit and napi poll (bsc#1215458).
- idpf: add splitq start_xmit (bsc#1215458).
- idpf: cancel mailbox work in error path (bsc#1215458).
- idpf: configure resources for RX queues (bsc#1215458).
- idpf: configure resources for TX queues (bsc#1215458).
- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).
- idpf: initialize interrupts and enable vport (bsc#1215458).
- idpf: set scheduling mode for completion queue (bsc#1215458).
- irqchip/stm32-exti: add missing DT IRQ flag translation (git-fixes).
- leds: pwm: Do not disable the PWM when the LED should be off (git-fixes).
- leds: trigger: ledtrig-cpu:: Fix 'output may be truncated' issue for 'cpu' (git-fixes).
- leds: turris-omnia: Do not use SMBUS calls (git-fixes).
- lsm: fix default return value for inode_getsecctx (git-fixes).
- lsm: fix default return value for vm_enough_memory (git-fixes).
- media: bttv: fix use after free error due to btv-&gt;timeout timer (git-fixes).
- media: ccs: Correctly initialise try compose rectangle (git-fixes).
- media: ccs: Fix driver quirk struct documentation (git-fixes).
- media: cedrus: Fix clock/reset sequence (git-fixes).
- media: cobalt: Use FIELD_GET() to extract Link Width (git-fixes).
- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).
- media: i2c: max9286: Fix some redundant of_node_put() calls (git-fixes).
- media: imon: fix access to invalid resource for the second interface (git-fixes).
- media: lirc: drop trailing space from scancode transmit (git-fixes).
- media: qcom: camss: Fix VFE-17x vfe_disable_output() (git-fixes).
- media: qcom: camss: Fix missing vfe_lite clocks check (git-fixes).
- media: qcom: camss: Fix pm_domain_on sequence in probe (git-fixes).
- media: qcom: camss: Fix vfe_get() error jump (git-fixes).
- media: sharp: fix sharp encoding (git-fixes).
- media: siano: Drop unnecessary error check for debugfs_create_dir/file() (git-fixes).
- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).
- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).
- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).
- media: venus: hfi_parser: Add check to keep the number of codecs within range (git-fixes).
- media: vidtv: mux: Add check and kfree for kstrdup (git-fixes).
- media: vidtv: psi: Add check for kstrdup (git-fixes).
- media: vivid: avoid integer overflow (git-fixes).
- mfd: arizona-spi: Set pdata.hpdet_channel for ACPI enumerated devs (git-fixes).
- mfd: core: Ensure disabled devices are skipped without aborting (git-fixes).
- mfd: dln2: Fix double put in dln2_probe (git-fixes).
- misc: pci_endpoint_test: Add Device ID for R-Car S4-8 PCIe controller (git-fixes).
- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#PED-7237, git-fixes).
- mmc: block: Be sure to wait while busy in CQE error recovery (git-fixes).
- mmc: block: Do not lose cache flush during CQE error recovery (git-fixes).
- mmc: block: Retry commands in CQE error recovery (git-fixes).
- mmc: cqhci: Fix task clearing in CQE error recovery (git-fixes).
- mmc: cqhci: Increase recovery halt timeout (git-fixes).
- mmc: cqhci: Warn of halt or task clear failure (git-fixes).
- mmc: meson-gx: Remove setting of CMD_CFG_ERROR (git-fixes).
- mmc: sdhci-pci-gli: A workaround to allow GL9750 to enter ASPM L1.2 (git-fixes).
- mmc: sdhci-pci-gli: GL9750: Mask the replay timer timeout of AER (git-fixes).
- mmc: sdhci_am654: fix start loop index for TAP value parsing (git-fixes).
- mmc: vub300: fix an error code (git-fixes).
- modpost: fix tee MODULE_DEVICE_TABLE built on big-endian host (git-fixes).
- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).
- mtd: cfi_cmdset_0001: Byte swap OTP info (git-fixes).
- mtd: rawnand: arasan: Include ECC syndrome along with in-band data while checking for ECC failure (git-fixes).
- net-memcg: Fix scope of sockmem pressure indicators (bsc#1216759).
- net: Avoid address overwrite in kernel_connect (bsc#1216861).
- net: add macro netif_subqueue_completed_wake (bsc#1215458).
- net: fix use-after-free in tw_timer_handler (bsc#1217195).
- net: mana: Fix return type of mana_start_xmit() (git-fixes).
- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).
- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).
- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).
- nvme: update firmware version after commit (bsc#1215292).
- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).
- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).
- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).
- pinctrl: avoid reload of p state in list iteration (git-fixes).
- platform/x86/intel-uncore-freq: Return error on write frequency (bsc#1217147).
- platform/x86/intel-uncore-freq: Split common and enumeration part (bsc#1217147).
- platform/x86/intel-uncore-freq: Support for cluster level controls (bsc#1217147).
- platform/x86/intel-uncore-freq: Uncore frequency control via TPMI (bsc#1217147).
- platform/x86/intel-uncore-freq: tpmi: Provide cluster level control (bsc#1217147).
- platform/x86/intel/tpmi: ADD tpmi external interface for tpmi feature drivers (bsc#1217147).
- platform/x86/intel/tpmi: Fix double free reported by Smatch (bsc#1217147).
- platform/x86/intel/tpmi: Process CPU package mapping (bsc#1217147).
- platform/x86/intel/uncore-freq: Display uncore current frequency (bsc#1217147).
- platform/x86/intel/uncore-freq: Move to uncore-frequency folder (bsc#1217147).
- platform/x86/intel/uncore-freq: Use sysfs API to create attributes (bsc#1217147).
- platform/x86/intel/vsec: Add TPMI ID (bsc#1217147).
- platform/x86/intel/vsec: Enhance and Export intel_vsec_add_aux() (bsc#1217147).
- platform/x86/intel/vsec: Support private data (bsc#1217147).
- platform/x86/intel/vsec: Use mutex for ida_alloc() and ida_free() (bsc#1217147).
- platform/x86/intel: Intel TPMI enumeration driver (bsc#1217147).
- platform/x86/intel: tpmi: Fix double free in tpmi_create_device() (bsc#1217147).
- platform/x86: intel-uncore-freq: Add client processors (bsc#1217147).
- platform/x86: intel-uncore-freq: Conditionally create attribute for read frequency (bsc#1217147).
- platform/x86: intel-uncore-freq: Prevent driver loading in guests (bsc#1217147).
- platform/x86: intel-uncore-freq: Use sysfs_emit() to instead of scnprintf() (bsc#1217147).
- platform/x86: intel-uncore-freq: fix uncore_freq_common_init() error codes (bsc#1217147).
- platform/x86: intel-uncore-frequency: Move to intel sub-directory (bsc#1217147).
- platform/x86: intel-uncore-frequency: use default_groups in kobj_type (bsc#1217147).
- platform/x86: thinkpad_acpi: Add battery quirk for Thinkpad X120e (git-fixes).
- platform/x86: wmi: Fix opening of char device (git-fixes).
- platform/x86: wmi: Fix probe failure when failing to register WMI devices (git-fixes).
- platform/x86: wmi: remove unnecessary initializations (git-fixes).
- powerpc/perf/hv-24x7: Update domain value check (bsc#1215931).
- powerpc/vas: Limit open window failure messages in log bufffer (bsc#1216687 ltc#203927).
- powerpc: Do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).
- pwm: Fix double shift bug (git-fixes).
- pwm: brcmstb: Utilize appropriate clock APIs in suspend/resume (git-fixes).
- pwm: sti: Reduce number of allocations and drop usage of chip_data (git-fixes).
- r8152: Check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).
- r8152: Check for unplug in rtl_phy_patch_request() (git-fixes).
- regmap: Ensure range selector registers are updated after cache sync (git-fixes).
- regmap: debugfs: Fix a erroneous check after snprintf() (git-fixes).
- regmap: prevent noinc writes from clobbering cache (git-fixes).
- s390/ap: fix AP bus crash on early config change callback invocation (git-fixes bsc#1217687).
- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).
- s390/cmma: fix detection of DAT pages (LTC#203997 bsc#1217086).
- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (LTC#203997 bsc#1217086).
- s390/cmma: fix initial kernel address space page table walk (LTC#203997 bsc#1217086).
- s390/crashdump: fix TOD programmable field size (git-fixes bsc#1217205).
- s390/dasd: fix hanging device after request requeue (git-fixes LTC#203629 bsc#1215124).
- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).
- s390/dasd: use correct number of retries for ERP requests (git-fixes bsc#1217598).
- s390/ipl: add missing IPL_TYPE_ECKD_DUMP case to ipl_init() (git-fixes bsc#1217511).
- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).
- s390/mm: add missing arch_set_page_dat() call to gmap allocations (LTC#203997 bsc#1217086).
- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (LTC#203997 bsc#1217086).
- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).
- s390/ptrace: fix PTRACE_GET_LAST_BREAK error handling (git-fixes bsc#1217599).
- sbitmap: fix batched wait_cnt accounting (bsc#1217095 bsc#1217196).
- sbitmap: fix up kABI for sbitmap_queue_wake_up() (bsc#1217095 bsc#1217196).
- sbsa_gwdt: Calculate timeout with 64-bit math (git-fixes).
- scsi: lpfc: Copyright updates for 14.2.0.16 patches (bsc#1217731).
- scsi: lpfc: Correct maximum PCI function value for RAS fw logging (bsc#1217731).
- scsi: lpfc: Eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).
- scsi: lpfc: Enhance driver logging for selected discovery events (bsc#1217731).
- scsi: lpfc: Fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).
- scsi: lpfc: Fix possible file string name overflow when updating firmware (bsc#1217731).
- scsi: lpfc: Introduce LOG_NODE_VERBOSE messaging flag (bsc#1217124).
- scsi: lpfc: Refactor and clean up mailbox command memory free (bsc#1217731).
- scsi: lpfc: Reject received PRLIs with only initiator fcn role for NPIV ports (bsc#1217124).
- scsi: lpfc: Remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).
- scsi: lpfc: Return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).
- scsi: lpfc: Treat IOERR_SLI_DOWN I/O completion status the same as pci offline (bsc#1217124).
- scsi: lpfc: Update lpfc version to 14.2.0.15 (bsc#1217124).
- scsi: lpfc: Update lpfc version to 14.2.0.16 (bsc#1217731).
- scsi: lpfc: Validate ELS LS_ACC completion payload (bsc#1217124).
- scsi: qla2xxx: Fix double free of dsd_list during driver load (git-fixes).
- scsi: qla2xxx: Use FIELD_GET() to extract PCIe capability fields (git-fixes).
- selftests/efivarfs: create-read: fix a resource leak (git-fixes).
- selftests/pidfd: Fix ksft print formats (git-fixes).
- selftests/resctrl: Ensure the benchmark commands fits to its array (git-fixes).
- selftests/resctrl: Reduce failures due to outliers in MBA/MBM tests (git-fixes).
- selftests/resctrl: Remove duplicate feature check from CMT test (git-fixes).
- seq_buf: fix a misleading comment (git-fixes).
- serial: exar: Revert 'serial: exar: Add support for Sealevel 7xxxC serial cards' (git-fixes).
- serial: meson: Use platform_get_irq() to get the interrupt (git-fixes).
- soc: qcom: llcc: Handle a second device without data corruption (git-fixes).
- spi: nxp-fspi: use the correct ioremap function (git-fixes).
- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).
- spi: tegra: Fix missing IRQ check in tegra_slink_probe() (git-fixes).
- staging: media: ipu3: remove ftrace-like logging (git-fixes).
- string.h: add array-wrappers for (v)memdup_user() (git-fixes).
- supported.conf: marked idpf supported
- thermal: core: prevent potential string overflow (git-fixes).
- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).
- tty: 8250: Add Brainboxes Oxford Semiconductor-based quirks (git-fixes).
- tty: 8250: Add support for Brainboxes UP cards (git-fixes).
- tty: 8250: Add support for Intashield IS-100 (git-fixes).
- tty: 8250: Add support for Intashield IX cards (git-fixes).
- tty: 8250: Add support for additional Brainboxes PX cards (git-fixes).
- tty: 8250: Add support for additional Brainboxes UC cards (git-fixes).
- tty: 8250: Fix port count of PX-257 (git-fixes).
- tty: 8250: Fix up PX-803/PX-857 (git-fixes).
- tty: 8250: Remove UC-257 and UC-431 (git-fixes).
- tty: Fix uninit-value access in ppp_sync_receive() (git-fixes).
- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).
- tty: serial: meson: fix hard LOCKUP on crtscts mode (git-fixes).
- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).
- tty: vcc: Add check for kstrdup() in vcc_probe() (git-fixes).
- usb: cdnsp: Fix deadlock issue during using NCM gadget (git-fixes).
- usb: chipidea: Fix DMA overwrite for Tegra (git-fixes).
- usb: chipidea: Simplify Tegra DMA alignment code (git-fixes).
- usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency (git-fixes).
- usb: dwc3: Fix default mode initialization (git-fixes).
- usb: dwc3: set the dma max_seg_size (git-fixes).
- usb: gadget: f_ncm: Always set current gadget in ncm_bind() (git-fixes).
- usb: raw-gadget: properly handle interrupted requests (git-fixes).
- usb: storage: set 1.50 as the lower bcdDevice for older 'Super Top' compatibility (git-fixes).
- usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm() (git-fixes).
- usb: typec: tcpm: Skip hard reset when in error recovery (git-fixes).
- virtchnl: add virtchnl version 2 ops (bsc#1215458).
- wifi: ath10k: Do not touch the CE interrupt registers after power up (git-fixes).
- wifi: ath10k: fix clang-specific fortify warning (git-fixes).
- wifi: ath11k: debugfs: fix to work with multiple PCI devices (git-fixes).
- wifi: ath11k: fix dfs radar event locking (git-fixes).
- wifi: ath11k: fix gtk offload status event locking (git-fixes).
- wifi: ath11k: fix htt pktlog locking (git-fixes).
- wifi: ath11k: fix temperature event locking (git-fixes).
- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).
- wifi: iwlwifi: Use FW rate for non-data frames (git-fixes).
- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).
- wifi: iwlwifi: empty overflow queue during flush (git-fixes).
- wifi: iwlwifi: honor the enable_ini value (git-fixes).
- wifi: iwlwifi: pcie: synchronize IRQs before NAPI (git-fixes).
- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).
- wifi: mac80211: fix # of MSDU in A-MSDU calculation (git-fixes).
- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).
- wifi: rtlwifi: fix EDCA limit set by BT coexistence (git-fixes).
- wifi: rtw88: debug: Fix the NULL vs IS_ERR() bug for debugfs_create_file() (git-fixes).
- x86/alternative: Add a __alt_reloc_selftest() prototype (git-fixes).
- x86/cpu: Clear SVM feature if disabled by BIOS (bsc#1214700).
- x86/cpu: Fix AMD erratum #1485 on Zen4-based CPUs (git-fixes).
- x86/fpu: Set X86_FEATURE_OSXSAVE feature after enabling OSXSAVE in CR4 (git-fixes).
- x86/hyperv: Add HV_EXPOSE_INVARIANT_TSC define (git-fixes).
- x86/hyperv: Improve code for referencing hyperv_pcpu_input_arg (git-fixes).
- x86/hyperv: Make hv_get_nmi_reason public (git-fixes).
- x86/hyperv: fix a warning in mshyperv.h (git-fixes).
- x86/sev: Do not try to parse for the CC blob on non-AMD hardware (git-fixes).
- x86/sev: Fix calculation of end address based on number of pages (git-fixes).
- x86/sev: Use the GHCB protocol when available for SNP CPUID requests (git-fixes).
- x86: Move gds_ucode_mitigated() declaration to header (git-fixes).
- xfs: add attr state machine tracepoints (git-fixes).
- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).
- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).
- xfs: constify btree function parameters that are not modified (git-fixes).
- xfs: convert AGF log flags to unsigned (git-fixes).
- xfs: convert AGI log flags to unsigned (git-fixes).
- xfs: convert attr type flags to unsigned (git-fixes).
- xfs: convert bmap extent type flags to unsigned (git-fixes).
- xfs: convert bmapi flags to unsigned (git-fixes).
- xfs: convert btree buffer log flags to unsigned (git-fixes).
- xfs: convert buffer flags to unsigned (git-fixes).
- xfs: convert buffer log item flags to unsigned (git-fixes).
- xfs: convert da btree operations flags to unsigned (git-fixes).
- xfs: convert dquot flags to unsigned (git-fixes).
- xfs: convert inode lock flags to unsigned (git-fixes).
- xfs: convert log item tracepoint flags to unsigned (git-fixes).
- xfs: convert log ticket and iclog flags to unsigned (git-fixes).
- xfs: convert quota options flags to unsigned (git-fixes).
- xfs: convert scrub type flags to unsigned (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).
- xfs: make the key parameters to all btree key comparison functions const (git-fixes).
- xfs: make the key parameters to all btree query range functions const (git-fixes).
- xfs: make the keys and records passed to btree inorder functions const (git-fixes).
- xfs: make the pointer passed to btree set_root functions const (git-fixes).
- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).
- xfs: make the start pointer passed to btree update_lastrec functions const (git-fixes).
- xfs: mark the record passed into btree init_key functions as const (git-fixes).
- xfs: mark the record passed into xchk_btree functions as const (git-fixes).
- xfs: remove xfs_btree_cur_t typedef (git-fixes).
- xfs: rename i_disk_size fields in ftrace output (git-fixes).
- xfs: resolve fork names in trace output (git-fixes).
- xfs: standardize AG block number formatting in ftrace output (git-fixes).
- xfs: standardize AG number formatting in ftrace output (git-fixes).
- xfs: standardize daddr formatting in ftrace output (git-fixes).
- xfs: standardize inode generation formatting in ftrace output (git-fixes).
- xfs: standardize inode number formatting in ftrace output (git-fixes).
- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).
- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).
- xhci: Enable RPM on controllers that support low-power states (git-fixes).
- xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-12"/>
	<updated date="2023-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1084909">SUSE bug 1084909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207948">SUSE bug 1207948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210447">SUSE bug 1210447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214286">SUSE bug 1214286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214700">SUSE bug 1214700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214840">SUSE bug 1214840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214976">SUSE bug 1214976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215123">SUSE bug 1215123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215124">SUSE bug 1215124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215292">SUSE bug 1215292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215420">SUSE bug 1215420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215458">SUSE bug 1215458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215710">SUSE bug 1215710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215802">SUSE bug 1215802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215931">SUSE bug 1215931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216058">SUSE bug 1216058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216105">SUSE bug 1216105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216259">SUSE bug 1216259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216527">SUSE bug 1216527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216584">SUSE bug 1216584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216687">SUSE bug 1216687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216693">SUSE bug 1216693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216759">SUSE bug 1216759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216788">SUSE bug 1216788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216844">SUSE bug 1216844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216861">SUSE bug 1216861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216909">SUSE bug 1216909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216959">SUSE bug 1216959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216965">SUSE bug 1216965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216976">SUSE bug 1216976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217036">SUSE bug 1217036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217068">SUSE bug 1217068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217086">SUSE bug 1217086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217095">SUSE bug 1217095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217124">SUSE bug 1217124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217140">SUSE bug 1217140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217147">SUSE bug 1217147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217195">SUSE bug 1217195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217196">SUSE bug 1217196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217200">SUSE bug 1217200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217205">SUSE bug 1217205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217332">SUSE bug 1217332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217366">SUSE bug 1217366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217511">SUSE bug 1217511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217515">SUSE bug 1217515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217598">SUSE bug 1217598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217599">SUSE bug 1217599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217609">SUSE bug 1217609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217687">SUSE bug 1217687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217731">SUSE bug 1217731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217780">SUSE bug 1217780</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2006/">CVE-2023-2006 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2006">CVE-2023-2006 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-25775/">CVE-2023-25775 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25775">CVE-2023-25775 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39197/">CVE-2023-39197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39197">CVE-2023-39197 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39198/">CVE-2023-39198 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39198">CVE-2023-39198 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4244/">CVE-2023-4244 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4244">CVE-2023-4244 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-45863/">CVE-2023-45863 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45863">CVE-2023-45863 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45871/">CVE-2023-45871 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45871">CVE-2023-45871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46862/">CVE-2023-46862 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46862">CVE-2023-46862 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5158/">CVE-2023-5158 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5158">CVE-2023-5158 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5633/">CVE-2023-5633 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5633">CVE-2023-5633 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5717/">CVE-2023-5717 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5717">CVE-2023-5717 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6039/">CVE-2023-6039 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6039">CVE-2023-6039 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6176/">CVE-2023-6176 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6176">CVE-2023-6176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009814873" comment="cluster-md-kmp-64kb-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814874" comment="cluster-md-kmp-default-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814875" comment="dlm-kmp-64kb-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814876" comment="dlm-kmp-default-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814877" comment="dtb-allwinner-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814878" comment="dtb-altera-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814879" comment="dtb-amazon-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814880" comment="dtb-amd-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814881" comment="dtb-amlogic-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814882" comment="dtb-apm-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814883" comment="dtb-apple-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814884" comment="dtb-arm-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814885" comment="dtb-broadcom-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814886" comment="dtb-cavium-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814887" comment="dtb-exynos-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814888" comment="dtb-freescale-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814889" comment="dtb-hisilicon-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814890" comment="dtb-lg-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814891" comment="dtb-marvell-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814892" comment="dtb-mediatek-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814893" comment="dtb-nvidia-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814894" comment="dtb-qcom-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814895" comment="dtb-renesas-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814896" comment="dtb-rockchip-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814897" comment="dtb-socionext-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814898" comment="dtb-sprd-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814899" comment="dtb-xilinx-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814900" comment="gfs2-kmp-64kb-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814901" comment="gfs2-kmp-default-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814902" comment="kernel-64kb-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814903" comment="kernel-64kb-devel-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814904" comment="kernel-64kb-extra-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814905" comment="kernel-64kb-livepatch-devel-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814906" comment="kernel-64kb-optional-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814907" comment="kernel-debug-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814908" comment="kernel-debug-devel-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814909" comment="kernel-debug-livepatch-devel-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814910" comment="kernel-debug-vdso-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814911" comment="kernel-default-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814912" comment="kernel-default-base-5.14.21-150500.55.39.1.150500.6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814913" comment="kernel-default-base-rebuild-5.14.21-150500.55.39.1.150500.6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814914" comment="kernel-default-devel-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814915" comment="kernel-default-extra-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814916" comment="kernel-default-livepatch-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814917" comment="kernel-default-livepatch-devel-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814918" comment="kernel-default-optional-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814919" comment="kernel-default-vdso-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814920" comment="kernel-devel-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814921" comment="kernel-docs-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814922" comment="kernel-docs-html-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814923" comment="kernel-kvmsmall-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814924" comment="kernel-kvmsmall-devel-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814925" comment="kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814926" comment="kernel-kvmsmall-vdso-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814927" comment="kernel-macros-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814928" comment="kernel-obs-build-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814929" comment="kernel-obs-qa-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814930" comment="kernel-source-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814931" comment="kernel-source-vanilla-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814932" comment="kernel-syms-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814933" comment="kernel-zfcpdump-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814934" comment="kselftests-kmp-64kb-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814935" comment="kselftests-kmp-default-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814936" comment="ocfs2-kmp-64kb-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814937" comment="ocfs2-kmp-default-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814938" comment="reiserfs-kmp-64kb-5.14.21-150500.55.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814939" comment="reiserfs-kmp-default-5.14.21-150500.55.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4564" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1207948" ref_url="https://bugzilla.suse.com/1207948" source="BUGZILLA"/>
		<reference ref_id="1210447" ref_url="https://bugzilla.suse.com/1210447" source="BUGZILLA"/>
		<reference ref_id="1212649" ref_url="https://bugzilla.suse.com/1212649" source="BUGZILLA"/>
		<reference ref_id="1214286" ref_url="https://bugzilla.suse.com/1214286" source="BUGZILLA"/>
		<reference ref_id="1214700" ref_url="https://bugzilla.suse.com/1214700" source="BUGZILLA"/>
		<reference ref_id="1214840" ref_url="https://bugzilla.suse.com/1214840" source="BUGZILLA"/>
		<reference ref_id="1214976" ref_url="https://bugzilla.suse.com/1214976" source="BUGZILLA"/>
		<reference ref_id="1215095" ref_url="https://bugzilla.suse.com/1215095" source="BUGZILLA"/>
		<reference ref_id="1215123" ref_url="https://bugzilla.suse.com/1215123" source="BUGZILLA"/>
		<reference ref_id="1215124" ref_url="https://bugzilla.suse.com/1215124" source="BUGZILLA"/>
		<reference ref_id="1215292" ref_url="https://bugzilla.suse.com/1215292" source="BUGZILLA"/>
		<reference ref_id="1215420" ref_url="https://bugzilla.suse.com/1215420" source="BUGZILLA"/>
		<reference ref_id="1215458" ref_url="https://bugzilla.suse.com/1215458" source="BUGZILLA"/>
		<reference ref_id="1215710" ref_url="https://bugzilla.suse.com/1215710" source="BUGZILLA"/>
		<reference ref_id="1215802" ref_url="https://bugzilla.suse.com/1215802" source="BUGZILLA"/>
		<reference ref_id="1215931" ref_url="https://bugzilla.suse.com/1215931" source="BUGZILLA"/>
		<reference ref_id="1216058" ref_url="https://bugzilla.suse.com/1216058" source="BUGZILLA"/>
		<reference ref_id="1216105" ref_url="https://bugzilla.suse.com/1216105" source="BUGZILLA"/>
		<reference ref_id="1216259" ref_url="https://bugzilla.suse.com/1216259" source="BUGZILLA"/>
		<reference ref_id="1216527" ref_url="https://bugzilla.suse.com/1216527" source="BUGZILLA"/>
		<reference ref_id="1216584" ref_url="https://bugzilla.suse.com/1216584" source="BUGZILLA"/>
		<reference ref_id="1216621" ref_url="https://bugzilla.suse.com/1216621" source="BUGZILLA"/>
		<reference ref_id="1216687" ref_url="https://bugzilla.suse.com/1216687" source="BUGZILLA"/>
		<reference ref_id="1216693" ref_url="https://bugzilla.suse.com/1216693" source="BUGZILLA"/>
		<reference ref_id="1216759" ref_url="https://bugzilla.suse.com/1216759" source="BUGZILLA"/>
		<reference ref_id="1216761" ref_url="https://bugzilla.suse.com/1216761" source="BUGZILLA"/>
		<reference ref_id="1216788" ref_url="https://bugzilla.suse.com/1216788" source="BUGZILLA"/>
		<reference ref_id="1216844" ref_url="https://bugzilla.suse.com/1216844" source="BUGZILLA"/>
		<reference ref_id="1216861" ref_url="https://bugzilla.suse.com/1216861" source="BUGZILLA"/>
		<reference ref_id="1216909" ref_url="https://bugzilla.suse.com/1216909" source="BUGZILLA"/>
		<reference ref_id="1216959" ref_url="https://bugzilla.suse.com/1216959" source="BUGZILLA"/>
		<reference ref_id="1216965" ref_url="https://bugzilla.suse.com/1216965" source="BUGZILLA"/>
		<reference ref_id="1216976" ref_url="https://bugzilla.suse.com/1216976" source="BUGZILLA"/>
		<reference ref_id="1217036" ref_url="https://bugzilla.suse.com/1217036" source="BUGZILLA"/>
		<reference ref_id="1217068" ref_url="https://bugzilla.suse.com/1217068" source="BUGZILLA"/>
		<reference ref_id="1217086" ref_url="https://bugzilla.suse.com/1217086" source="BUGZILLA"/>
		<reference ref_id="1217095" ref_url="https://bugzilla.suse.com/1217095" source="BUGZILLA"/>
		<reference ref_id="1217124" ref_url="https://bugzilla.suse.com/1217124" source="BUGZILLA"/>
		<reference ref_id="1217140" ref_url="https://bugzilla.suse.com/1217140" source="BUGZILLA"/>
		<reference ref_id="1217147" ref_url="https://bugzilla.suse.com/1217147" source="BUGZILLA"/>
		<reference ref_id="1217195" ref_url="https://bugzilla.suse.com/1217195" source="BUGZILLA"/>
		<reference ref_id="1217196" ref_url="https://bugzilla.suse.com/1217196" source="BUGZILLA"/>
		<reference ref_id="1217200" ref_url="https://bugzilla.suse.com/1217200" source="BUGZILLA"/>
		<reference ref_id="1217205" ref_url="https://bugzilla.suse.com/1217205" source="BUGZILLA"/>
		<reference ref_id="1217332" ref_url="https://bugzilla.suse.com/1217332" source="BUGZILLA"/>
		<reference ref_id="1217366" ref_url="https://bugzilla.suse.com/1217366" source="BUGZILLA"/>
		<reference ref_id="1217511" ref_url="https://bugzilla.suse.com/1217511" source="BUGZILLA"/>
		<reference ref_id="1217515" ref_url="https://bugzilla.suse.com/1217515" source="BUGZILLA"/>
		<reference ref_id="1217598" ref_url="https://bugzilla.suse.com/1217598" source="BUGZILLA"/>
		<reference ref_id="1217599" ref_url="https://bugzilla.suse.com/1217599" source="BUGZILLA"/>
		<reference ref_id="1217609" ref_url="https://bugzilla.suse.com/1217609" source="BUGZILLA"/>
		<reference ref_id="1217687" ref_url="https://bugzilla.suse.com/1217687" source="BUGZILLA"/>
		<reference ref_id="1217731" ref_url="https://bugzilla.suse.com/1217731" source="BUGZILLA"/>
		<reference ref_id="1217780" ref_url="https://bugzilla.suse.com/1217780" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2006" ref_url="https://www.suse.com/security/cve/CVE-2023-2006/" source="CVE"/>
		<reference ref_id="CVE-2023-25775" ref_url="https://www.suse.com/security/cve/CVE-2023-25775/" source="CVE"/>
		<reference ref_id="CVE-2023-3777" ref_url="https://www.suse.com/security/cve/CVE-2023-3777/" source="CVE"/>
		<reference ref_id="CVE-2023-39197" ref_url="https://www.suse.com/security/cve/CVE-2023-39197/" source="CVE"/>
		<reference ref_id="CVE-2023-39198" ref_url="https://www.suse.com/security/cve/CVE-2023-39198/" source="CVE"/>
		<reference ref_id="CVE-2023-4244" ref_url="https://www.suse.com/security/cve/CVE-2023-4244/" source="CVE"/>
		<reference ref_id="CVE-2023-45863" ref_url="https://www.suse.com/security/cve/CVE-2023-45863/" source="CVE"/>
		<reference ref_id="CVE-2023-45871" ref_url="https://www.suse.com/security/cve/CVE-2023-45871/" source="CVE"/>
		<reference ref_id="CVE-2023-46813" ref_url="https://www.suse.com/security/cve/CVE-2023-46813/" source="CVE"/>
		<reference ref_id="CVE-2023-46862" ref_url="https://www.suse.com/security/cve/CVE-2023-46862/" source="CVE"/>
		<reference ref_id="CVE-2023-5158" ref_url="https://www.suse.com/security/cve/CVE-2023-5158/" source="CVE"/>
		<reference ref_id="CVE-2023-5633" ref_url="https://www.suse.com/security/cve/CVE-2023-5633/" source="CVE"/>
		<reference ref_id="CVE-2023-5717" ref_url="https://www.suse.com/security/cve/CVE-2023-5717/" source="CVE"/>
		<reference ref_id="CVE-2023-6039" ref_url="https://www.suse.com/security/cve/CVE-2023-6039/" source="CVE"/>
		<reference ref_id="CVE-2023-6176" ref_url="https://www.suse.com/security/cve/CVE-2023-6176/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).
- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).
- CVE-2023-3777: Fixed a use-after-free vulnerability in netfilter: nf_tables component can be exploited to achieve local privilege escalation. (bsc#1215095)
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).
- CVE-2023-46813: Fixed SEV-ES local priv escalation (bsc#1212649).
- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).
- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).
- CVE-2023-5633: Fixed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface (bsc#1216527).
- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).
- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).
- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).

The following non-security bugs were fixed:

- acpi: fpdt: properly handle invalid fpdt subtables (git-fixes).
- acpi: resource: do irq override on tongfang gmxxgxx (git-fixes).
- acpi: resource: skip irq override on asus expertbook b1402cva (git-fixes).
- acpi: sysfs: fix create_pnp_modalias() and create_of_modalias() (git-fixes).
- alsa: hda/realtek - add dell alc295 to pin fall back table (git-fixes).
- alsa: hda/realtek - alc287 realtek i2s speaker platform support (git-fixes).
- alsa: hda/realtek - enable internal speaker of asus k6500zc (git-fixes).
- alsa: hda/realtek: add quirk for asus ux7602zm (git-fixes).
- alsa: hda/realtek: add quirks for asus 2024 zenbooks (git-fixes).
- alsa: hda/realtek: add quirks for hp laptops (git-fixes).
- alsa: hda/realtek: add support dual speaker for dell (git-fixes).
- alsa: hda/realtek: enable mute led on hp 255 g10 (git-fixes).
- alsa: hda/realtek: enable mute led on hp 255 g8 (git-fixes).
- alsa: hda: asus um5302la: added quirks for cs35l41/10431a83 on i2c bus (git-fixes).
- alsa: hda: cs35l41: fix unbalanced pm_runtime_get() (git-fixes).
- alsa: hda: cs35l41: undo runtime pm changes at driver exit time (git-fixes).
- alsa: hda: disable power-save on kontron singlepc (bsc#1217140).
- alsa: hda: fix possible null-ptr-deref when assigning a stream (git-fixes).
- alsa: hda: intel-dsp-config: fix jsl chromebook quirk detection (git-fixes).
- alsa: info: fix potential deadlock at disconnection (git-fixes).
- alsa: usb-audio: add quirk flag to enable native dsd for mcintosh devices (git-fixes).
- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).
- arm64: add cortex-a520 cpu part definition (git-fixes)
- arm64: allow kprobes on el0 handlers (git-fixes)
- arm64: armv8_deprecated move emulation functions (git-fixes)
- arm64: armv8_deprecated: fix unused-function error (git-fixes)
- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)
- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)
- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)
- arm64: consistently pass esr_elx to die() (git-fixes)
- arm64: die(): pass 'err' as long (git-fixes)
- arm64: factor insn read out of call_undef_hook() (git-fixes)
- arm64: factor out el1 ssbs emulation hook (git-fixes)
- arm64: report el1 undefs better (git-fixes)
- arm64: rework bti exception handling (git-fixes)
- arm64: rework el0 mrs emulation (git-fixes)
- arm64: rework fpac exception handling (git-fixes)
- arm64: split el0/el1 undef handlers (git-fixes)
- arm: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).
- asoc: ams-delta.c: use component after check (git-fixes).
- asoc: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).
- asoc: cs35l41: undo runtime pm changes at driver exit time (git-fixes).
- asoc: cs35l41: verify pm runtime resume errors in irq handler (git-fixes).
- asoc: fsl: fix pm disable depth imbalance in fsl_easrc_probe (git-fixes).
- asoc: fsl: mpc5200_dma.c: fix warning of function parameter or member not described (git-fixes).
- asoc: hdmi-codec: register hpd callback on component probe (git-fixes).
- asoc: intel: skylake: fix mem leak when parsing uuids fails (git-fixes).
- asoc: rt5650: fix the wrong result of key button (git-fixes).
- asoc: simple-card: fixup asoc_simple_probe() error handling (git-fixes).
- asoc: sof: core: ensure sof_ops_free() is still called when probe never ran (git-fixes).
- asoc: ti: omap-mcbsp: fix runtime pm underflow warnings (git-fixes).
- ata: pata_isapnp: add missing error check for devm_ioport_map() (git-fixes).
- atl1c: work around the dma rx overflow issue (git-fixes).
- atm: iphase: do pci error checks on own line (git-fixes).
- blk-mq: do not clear driver tags own mapping (bsc#1217366).
- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).
- bluetooth: add device 0bda:887b to device tables (git-fixes).
- bluetooth: add device 13d3:3571 to device tables (git-fixes).
- bluetooth: btusb: add 0bda:b85b for fn-link rtl8852be (git-fixes).
- bluetooth: btusb: add date-&gt;evt_skb is null check (git-fixes).
- bluetooth: btusb: add realtek rtl8852be support id 0x0cb8:0xc559 (git-fixes).
- bluetooth: btusb: add rtw8852be device 13d3:3570 to device tables (git-fixes).
- btrfs: always log symlinks in full mode (bsc#1214840).
- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).
- can: dev: can_restart(): do not crash kernel if carrier is ok (git-fixes).
- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).
- can: isotp: add local echo tx processing for consecutive frames (git-fixes).
- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).
- can: isotp: fix tx state handling for echo tx processing (git-fixes).
- can: isotp: handle wait_event_interruptible() return values (git-fixes).
- can: isotp: isotp_bind(): return -einval on incorrect can id formatting (git-fixes).
- can: isotp: isotp_sendmsg(): fix tx state detection and wait behavior (git-fixes).
- can: isotp: remove re-binding of bound socket (git-fixes).
- can: isotp: sanitize can id checks in isotp_bind() (git-fixes).
- can: isotp: set max pdu size to 64 kbyte (git-fixes).
- can: isotp: split tx timer into transmission and timeout (git-fixes).
- can: sja1000: fix comment (git-fixes).
- clk: imx: imx8mq: correct error handling path (git-fixes).
- clk: imx: imx8qxp: fix elcdif_pll clock (git-fixes).
- clk: imx: select mxc_clk for clk_imx8qxp (git-fixes).
- clk: keystone: pll: fix a couple null vs is_err() checks (git-fixes).
- clk: mediatek: clk-mt2701: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6765: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6779: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6797: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629-eth: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629: add check for mtk_alloc_clk_data (git-fixes).
- clk: npcm7xx: fix incorrect kfree (git-fixes).
- clk: qcom: clk-rcg2: fix clock rate overflow for high parent frequencies (git-fixes).
- clk: qcom: config ipq_apss_6018 should depend on qcom_smem (git-fixes).
- clk: qcom: gcc-sm8150: fix gcc_sdcc2_apps_clk_src (git-fixes).
- clk: qcom: ipq6018: drop the clk_set_rate_parent flag from pll clocks (git-fixes).
- clk: qcom: mmcc-msm8998: do not check halt bit on some branch clks (git-fixes).
- clk: qcom: mmcc-msm8998: fix the smmu gdsc (git-fixes).
- clk: sanitize possible_parent_show to handle return value of of_clk_get_parent_name (git-fixes).
- clk: scmi: free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).
- clk: ti: add ti_dt_clk_name() helper to use clock-output-names (git-fixes).
- clk: ti: change ti_clk_register[_omap_hw]() api (git-fixes).
- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).
- clk: ti: update component clocks to use ti_dt_clk_name() (git-fixes).
- clk: ti: update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).
- clocksource/drivers/timer-atmel-tcb: fix initialization on sam9 hardware (git-fixes).
- clocksource/drivers/timer-imx-gpt: fix potential memory leak (git-fixes).
- crypto: caam/jr - fix chacha20 + poly1305 self test failure (git-fixes).
- crypto: caam/qi2 - fix chacha20 + poly1305 self test failure (git-fixes).
- crypto: hisilicon/hpre - fix a erroneous check after snprintf() (git-fixes).
- disable loongson drivers loongson is a mips architecture, it does not make sense to build loongson drivers on other architectures.
- dmaengine: pxa_dma: remove an erroneous bug_on() in pxad_free_desc() (git-fixes).
- dmaengine: ste_dma40: fix pm disable depth imbalance in d40_probe (git-fixes).
- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).
- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).
- docs: net: move the probe and open/close sections of driver.rst up (bsc#1215458).
- docs: net: reformat driver.rst from a list to sections (bsc#1215458).
- docs: net: use c syntax highlight in driver.rst (bsc#1215458).
- documentation: networking: correct possessive 'its' (bsc#1215458).
- drivers: hv: vmbus: remove unused extern declaration vmbus_ontimer() (git-fixes).
- drm/amd/display: avoid null dereference of timing generator (git-fixes).
- drm/amd/display: change the dmcub mailbox memory location from fb to inbox (git-fixes).
- drm/amd/display: refactor dm_get_plane_scale helper (git-fixes).
- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).
- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).
- drm/amd/pm: handle non-terminated overdrive commands (git-fixes).
- drm/amd: disable aspm for vi w/ all intel systems (git-fixes).
- drm/amd: fix ubsan array-index-out-of-bounds for polaris and tonga (git-fixes).
- drm/amd: fix ubsan array-index-out-of-bounds for smu7 (git-fixes).
- drm/amd: move helper for dynamic speed switch check out of smu13 (git-fixes).
- drm/amd: update `update_pcie_parameters` functions to use uint8_t arguments (git-fixes).
- drm/amdgpu/vkms: fix a possible null pointer dereference (git-fixes).
- drm/amdgpu: add drv_vram_usage_va for virt data exchange (bsc#1215802).
- drm/amdgpu: add vram reservation based on vram_usagebyfirmware_v2_2 (git-fixes).
- drm/amdgpu: do not use atrm for external devices (git-fixes).
- drm/amdgpu: fix a null pointer access when the smc_rreg pointer is null (git-fixes).
- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).
- drm/amdgpu: fix potential null pointer derefernce (git-fixes).
- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).
- drm/amdgpu: not to save bo in the case of ras err_event_athub (git-fixes).
- drm/amdgpu: remove unnecessary domain argument (git-fixes).
- drm/amdgpu: reserve fences for vm update (git-fixes).
- drm/amdgpu: skip vram reserve on firmware_v2_2 for bare-metal (bsc#1215802).
- drm/amdkfd: fix a race condition of vram buffer unref in svm code (git-fixes).
- drm/amdkfd: fix shift out-of-bounds issue (git-fixes).
- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).
- drm/bridge: fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).
- drm/bridge: lt8912b: add missing drm_bridge_attach call (git-fixes).
- drm/bridge: lt8912b: fix bridge_detach (git-fixes).
- drm/bridge: lt8912b: fix crash on bridge detach (git-fixes).
- drm/bridge: lt8912b: manually disable hpd only if it was enabled (git-fixes).
- drm/bridge: lt8912b: register and attach our dsi device at probe (git-fixes).
- drm/bridge: lt8912b: switch to devm mipi-dsi helpers (git-fixes).
- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).
- drm/bridge: lt9611uxc: register and attach our dsi device at probe (git-fixes).
- drm/bridge: lt9611uxc: switch to devm mipi-dsi helpers (git-fixes).
- drm/bridge: tc358768: clean up clock period code (git-fixes).
- drm/bridge: tc358768: disable non-continuous clock mode (git-fixes).
- drm/bridge: tc358768: fix bit updates (git-fixes).
- drm/bridge: tc358768: fix tc358768_ns_to_cnt() (git-fixes).
- drm/bridge: tc358768: fix use of uninitialized variable (git-fixes).
- drm/bridge: tc358768: print logical values, not raw register values (git-fixes).
- drm/bridge: tc358768: remove unused variable (git-fixes).
- drm/bridge: tc358768: rename dsibclk to hsbyteclk (git-fixes).
- drm/bridge: tc358768: use dev for dbg prints, not priv-&gt;dev (git-fixes).
- drm/bridge: tc358768: use struct videomode (git-fixes).
- drm/dp_mst: fix null deref in get_mst_branch_device_by_guid_helper() (git-fixes).
- drm/gma500: fix call trace when psb_gem_mm_init() fails (git-fixes).
- drm/gud: use size_add() in call to struct_size() (git-fixes).
- drm/i915/pmu: check if pmu is closed before stopping event (git-fixes).
- drm/i915: fix potential spectre vulnerability (git-fixes).
- drm/i915: flush wc ggtt only on required platforms (git-fixes).
- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).
- drm/mediatek: fix iommu fault by swapping fbs after updating plane state (git-fixes).
- drm/mediatek: fix iommu fault during crtc enabling (git-fixes).
- drm/mipi-dsi: create devm device attachment (git-fixes).
- drm/mipi-dsi: create devm device registration (git-fixes).
- drm/msm/dp: skip validity check for dp cts edid checksum (git-fixes).
- drm/msm/dsi: free tx buffer in unbind (git-fixes).
- drm/msm/dsi: use msm_gem_kernel_put to free tx buffer (git-fixes).
- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).
- drm/panel: fix a possible null pointer dereference (git-fixes).
- drm/panel: simple: fix innolux g101ice-l01 bus flags (git-fixes).
- drm/panel: simple: fix innolux g101ice-l01 timings (git-fixes).
- drm/panel: st7703: pick different reset sequence (git-fixes).
- drm/qxl: prevent memory leak (git-fixes).
- drm/radeon: fix a possible null pointer dereference (git-fixes).
- drm/radeon: possible buffer overflow (git-fixes).
- drm/rockchip: cdn-dp: fix some error handling paths in cdn_dp_probe() (git-fixes).
- drm/rockchip: fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).
- drm/rockchip: vop: fix call to crtc reset helper (git-fixes).
- drm/rockchip: vop: fix color for rgb888/bgr888 format on vop full (git-fixes).
- drm/rockchip: vop: fix reset of state in duplicate state crtc funcs (git-fixes).
- drm/syncobj: fix drm_syncobj_wait_flags_wait_available (git-fixes).
- drm/ttm: reorder sys manager cleanup step (git-fixes).
- drm/vc4: fix typo (git-fixes).
- drm/vmwgfx: remove the duplicate bo_free function (bsc#1216527)
- drm/vmwgfx: rename vmw_buffer_object to vmw_bo (bsc#1216527)
- drm: bridge: it66121: fix invalid connector dereference (git-fixes).
- drm: mediatek: mtk_dsi: fix no_eot_packet settings/handling (git-fixes).
- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).
- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).
- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).
- ensure ia32_emulation is always enabled for kernel-obs-build if ia32_emulation is disabled by default, ensure it is enabled back for obs kernel to allow building 32bit binaries (jsc#ped-3184) [ms: always pass the parameter, no need to grep through the config which may not be very reliable]
- fbdev: atyfb: only use ioremap_uc() on i386 and ia64 (git-fixes).
- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).
- fbdev: imsttfb: fix a resource leak in probe (git-fixes).
- fbdev: imsttfb: fix double free in probe() (git-fixes).
- fbdev: imsttfb: fix error path of imsttfb_probe() (git-fixes).
- fbdev: imsttfb: release framebuffer and dealloc cmap on error path (git-fixes).
- fbdev: omapfb: drop unused remove function (git-fixes).
- fbdev: uvesafb: call cn_del_callback() at the end of uvesafb_exit() (git-fixes).
- firewire: core: fix possible memory leak in create_units() (git-fixes).
- firmware/imx-dsp: fix use_after_free in imx_dsp_setup_channels() (git-fixes).
- fix termination state for idr_for_each_entry_ul() (git-fixes).
- fix x86/mm: print the encryption features in hyperv is disabled
- gpio: mockup: fix kerneldoc (git-fixes).
- gpio: mockup: remove unused field (git-fixes).
- gpu: host1x: correct allocated size for contexts (git-fixes).
- hid: add quirk for dell pro wireless keyboard and mouse km5221w (git-fixes).
- hid: cp2112: fix duplicate workqueue initialization (git-fixes).
- hid: hyperv: avoid struct memcpy overrun warning (git-fixes).
- hid: hyperv: remove unused struct synthhid_msg (git-fixes).
- hid: hyperv: replace one-element array with flexible-array member (git-fixes).
- hid: lenovo: detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).
- hid: logitech-hidpp: do not restart io, instead defer hid_connect() only (git-fixes).
- hid: logitech-hidpp: move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).
- hid: logitech-hidpp: remove hidpp_quirk_no_hidinput quirk (git-fixes).
- hid: logitech-hidpp: revert 'do not restart communication if not necessary' (git-fixes).
- hv: simplify sysctl registration (git-fixes).
- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).
- hv_netvsc: fix race of netvsc and vf register_netdevice (git-fixes).
- hv_netvsc: fix race of register_netdevice_notifier and vf register (git-fixes).
- hv_netvsc: mark vf as slave before exposing it to user-mode (git-fixes).
- hwmon: (coretemp) fix potentially truncated sysfs attribute name (git-fixes).
- i2c: aspeed: fix i2c bus hang in slave read (git-fixes).
- i2c: core: run atomic i2c xfer when !preemptible (git-fixes).
- i2c: designware: disable tx_empty irq while waiting for block length byte (git-fixes).
- i2c: dev: copy userspace array safely (git-fixes).
- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).
- i2c: iproc: handle invalid slave state (git-fixes).
- i2c: muxes: i2c-demux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-gpmux: use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: stm32f7: fix pec handling in case of smbus transfers (git-fixes).
- i2c: sun6i-p2wi: prevent potential division by zero (git-fixes).
- i3c: fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).
- i3c: master: cdns: fix reading status register (git-fixes).
- i3c: master: mipi-i3c-hci: fix a kernel panic for accessing dat_data (git-fixes).
- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).
- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).
- i3c: master: svc: fix race condition in ibi work thread (git-fixes).
- i3c: master: svc: fix sda keep low when polling ibiwon timeout happen (git-fixes).
- i3c: master: svc: fix wrong data return when ibi happen during start frame (git-fixes).
- i3c: mipi-i3c-hci: fix out of bounds access in hci_dma_irq_handler (git-fixes).
- i915/perf: fix null deref bugs with drm_dbg() calls (git-fixes).
- idpf: add controlq init and reset checks (bsc#1215458).
- idpf: add core init and interrupt request (bsc#1215458).
- idpf: add create vport and netdev configuration (bsc#1215458).
- idpf: add ethtool callbacks (bsc#1215458).
- idpf: add module register and probe functionality (bsc#1215458).
- idpf: add ptypes and mac filter support (bsc#1215458).
- idpf: add rx splitq napi poll support (bsc#1215458).
- idpf: add singleq start_xmit and napi poll (bsc#1215458).
- idpf: add splitq start_xmit (bsc#1215458).
- idpf: add sriov support and other ndo_ops (bsc#1215458).
- idpf: add tx splitq napi poll support (bsc#1215458).
- idpf: cancel mailbox work in error path (bsc#1215458).
- idpf: configure resources for rx queues (bsc#1215458).
- idpf: configure resources for tx queues (bsc#1215458).
- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).
- idpf: initialize interrupts and enable vport (bsc#1215458).
- idpf: set scheduling mode for completion queue (bsc#1215458).
- iio: adc: xilinx-xadc: correct temperature offset/scale for ultrascale (git-fixes).
- iio: adc: xilinx-xadc: do not clobber preset voltage/temperature thresholds (git-fixes).
- iio: exynos-adc: request second interupt only when touchscreen mode is used (git-fixes).
- input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).
- input: synaptics-rmi4 - handle reset delay when using smbus trsnsport (git-fixes).
- input: xpad - add vid for turtle beach controllers (git-fixes).
- irqchip/stm32-exti: add missing dt irq flag translation (git-fixes).
- kabi/severities: ignore kabi in rxrpc (bsc#1210447) the rxrpc module is built since sle15-sp3 but it is not shipped as part of any sle product, only in leap (in kernel-*-optional).
- kernel-binary: suse-module-tools is also required when installed requires(pre) adds dependency for the specific sciptlet. however, suse-module-tools also ships modprobe.d files which may be needed at posttrans time or any time the kernel is on the system for generating ramdisk. add plain requires as well.
- kernel-source: move provides after sources
- kernel/fork: beware of __put_task_struct() calling context (bsc#1216761).
- leds: pwm: do not disable the pwm when the led should be off (git-fixes).
- leds: trigger: ledtrig-cpu:: fix 'output may be truncated' issue for 'cpu' (git-fixes).
- leds: turris-omnia: do not use smbus calls (git-fixes).
- lsm: fix default return value for inode_getsecctx (git-fixes).
- lsm: fix default return value for vm_enough_memory (git-fixes).
- media: bttv: fix use after free error due to btv-&gt;timeout timer (git-fixes).
- media: ccs: correctly initialise try compose rectangle (git-fixes).
- media: ccs: fix driver quirk struct documentation (git-fixes).
- media: cedrus: fix clock/reset sequence (git-fixes).
- media: cobalt: use field_get() to extract link width (git-fixes).
- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).
- media: i2c: max9286: fix some redundant of_node_put() calls (git-fixes).
- media: imon: fix access to invalid resource for the second interface (git-fixes).
- media: lirc: drop trailing space from scancode transmit (git-fixes).
- media: qcom: camss: fix missing vfe_lite clocks check (git-fixes).
- media: qcom: camss: fix pm_domain_on sequence in probe (git-fixes).
- media: qcom: camss: fix vfe-17x vfe_disable_output() (git-fixes).
- media: qcom: camss: fix vfe_get() error jump (git-fixes).
- media: sharp: fix sharp encoding (git-fixes).
- media: siano: drop unnecessary error check for debugfs_create_dir/file() (git-fixes).
- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).
- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).
- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).
- media: venus: hfi_parser: add check to keep the number of codecs within range (git-fixes).
- media: vidtv: mux: add check and kfree for kstrdup (git-fixes).
- media: vidtv: psi: add check for kstrdup (git-fixes).
- media: vivid: avoid integer overflow (git-fixes).
- mfd: arizona-spi: set pdata.hpdet_channel for acpi enumerated devs (git-fixes).
- mfd: core: ensure disabled devices are skipped without aborting (git-fixes).
- mfd: dln2: fix double put in dln2_probe (git-fixes).
- misc: fastrpc: clean buffers on remote invocation failures (git-fixes).
- misc: pci_endpoint_test: add device id for r-car s4-8 pcie controller (git-fixes).
- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#ped-7237, git-fixes).
- mmc: block: be sure to wait while busy in cqe error recovery (git-fixes).
- mmc: block: do not lose cache flush during cqe error recovery (git-fixes).
- mmc: block: retry commands in cqe error recovery (git-fixes).
- mmc: cqhci: fix task clearing in cqe error recovery (git-fixes).
- mmc: cqhci: increase recovery halt timeout (git-fixes).
- mmc: cqhci: warn of halt or task clear failure (git-fixes).
- mmc: meson-gx: remove setting of cmd_cfg_error (git-fixes).
- mmc: sdhci-pci-gli: a workaround to allow gl9750 to enter aspm l1.2 (git-fixes).
- mmc: sdhci-pci-gli: gl9750: mask the replay timer timeout of aer (git-fixes).
- mmc: sdhci_am654: fix start loop index for tap value parsing (git-fixes).
- mmc: vub300: fix an error code (git-fixes).
- modpost: fix tee module_device_table built on big-endian host (git-fixes).
- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).
- mtd: cfi_cmdset_0001: byte swap otp info (git-fixes).
- mtd: rawnand: arasan: include ecc syndrome along with in-band data while checking for ecc failure (git-fixes).
- net-memcg: fix scope of sockmem pressure indicators (bsc#1216759).
- net: add macro netif_subqueue_completed_wake (bsc#1215458).
- net: avoid address overwrite in kernel_connect (bsc#1216861).
- net: fix use-after-free in tw_timer_handler (bsc#1217195).
- net: ieee802154: adf7242: fix some potential buffer overflow in adf7242_stats_show() (git-fixes).
- net: mana: fix return type of mana_start_xmit() (git-fixes).
- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).
- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).
- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).
- net: usb: smsc95xx: fix uninit-value access in smsc95xx_read_reg (git-fixes).
- nfs: fix access to page-&gt;mapping (bsc#1216788).
- nvme: update firmware version after commit (bsc#1215292).
- pci/aspm: fix l1 substate handling in aspm_attr_store_common() (git-fixes).
- pci/sysfs: protect driver's d3cold preference from user space (git-fixes).
- pci: disable ats for specific intel ipu e2000 devices (bsc#1215458).
- pci: extract ats disabling to a helper function (bsc#1215458).
- pci: exynos: do not discard .remove() callback (git-fixes).
- pci: keystone: do not discard .probe() callback (git-fixes).
- pci: keystone: do not discard .remove() callback (git-fixes).
- pci: prevent xhci driver from claiming amd vangogh usb3 drd device (git-fixes).
- pci: tegra194: use field_get()/field_prep() with link width fields (git-fixes).
- pci: use field_get() in sapphire rx 5600 xt pulse quirk (git-fixes).
- pci: use field_get() to extract link width (git-fixes).
- pci: vmd: correct pci header type register's multi-function check (git-fixes).
- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).
- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).
- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).
- pinctrl: avoid reload of p state in list iteration (git-fixes).
- platform/x86/intel-uncore-freq: return error on write frequency (bsc#1217147).
- platform/x86/intel-uncore-freq: split common and enumeration part (bsc#1217147).
- platform/x86/intel-uncore-freq: support for cluster level controls (bsc#1217147).
- platform/x86/intel-uncore-freq: tpmi: provide cluster level control (bsc#1217147).
- platform/x86/intel-uncore-freq: uncore frequency control via tpmi (bsc#1217147).
- platform/x86/intel/tpmi: add tpmi external interface for tpmi feature drivers (bsc#1217147).
- platform/x86/intel/tpmi: fix double free reported by smatch (bsc#1217147).
- platform/x86/intel/tpmi: process cpu package mapping (bsc#1217147).
- platform/x86/intel/uncore-freq: display uncore current frequency (bsc#1217147).
- platform/x86/intel/uncore-freq: move to uncore-frequency folder (bsc#1217147).
- platform/x86/intel/uncore-freq: use sysfs api to create attributes (bsc#1217147).
- platform/x86/intel/vsec: add tpmi id (bsc#1217147).
- platform/x86/intel/vsec: enhance and export intel_vsec_add_aux() (bsc#1217147).
- platform/x86/intel/vsec: support private data (bsc#1217147).
- platform/x86/intel/vsec: use mutex for ida_alloc() and ida_free() (bsc#1217147).
- platform/x86/intel: intel tpmi enumeration driver (bsc#1217147).
- platform/x86/intel: tpmi: fix double free in tpmi_create_device() (bsc#1217147).
- platform/x86: intel-uncore-freq: add client processors (bsc#1217147).
- platform/x86: intel-uncore-freq: conditionally create attribute for read frequency (bsc#1217147).
- platform/x86: intel-uncore-freq: fix uncore_freq_common_init() error codes (bsc#1217147).
- platform/x86: intel-uncore-freq: prevent driver loading in guests (bsc#1217147).
- platform/x86: intel-uncore-freq: use sysfs_emit() to instead of scnprintf() (bsc#1217147).
- platform/x86: intel-uncore-frequency: move to intel sub-directory (bsc#1217147).
- platform/x86: intel-uncore-frequency: use default_groups in kobj_type (bsc#1217147).
- platform/x86: thinkpad_acpi: add battery quirk for thinkpad x120e (git-fixes).
- platform/x86: wmi: fix opening of char device (git-fixes).
- platform/x86: wmi: fix probe failure when failing to register wmi devices (git-fixes).
- platform/x86: wmi: remove unnecessary initializations (git-fixes).
- pm / devfreq: rockchip-dfi: make pmu regmap mandatory (git-fixes).
- pm: hibernate: use __get_safe_page() rather than touching the list (git-fixes).
- powerpc/perf/hv-24x7: update domain value check (bsc#1215931).
- powerpc/vas: limit open window failure messages in log bufffer (bsc#1216687 ltc#203927).
- powerpc: do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).
- pwm: brcmstb: utilize appropriate clock apis in suspend/resume (git-fixes).
- pwm: fix double shift bug (git-fixes).
- pwm: sti: reduce number of allocations and drop usage of chip_data (git-fixes).
- quota: fix slow quotaoff (bsc#1216621).
- r8152: cancel hw_phy_work if we have an error in probe (git-fixes).
- r8152: check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).
- r8152: check for unplug in rtl_phy_patch_request() (git-fixes).
- r8152: increase usb control msg timeout to 5000ms as per spec (git-fixes).
- r8152: release firmware if we have an error in probe (git-fixes).
- r8152: run the unload routine if we have errors during probe (git-fixes).
- regmap: debugfs: fix a erroneous check after snprintf() (git-fixes).
- regmap: ensure range selector registers are updated after cache sync (git-fixes).
- regmap: prevent noinc writes from clobbering cache (git-fixes).
- revert 'i2c: pxa: move to generic gpio recovery' (git-fixes).
- revert 'mmc: core: capture correct oemid-bits for emmc cards' (git-fixes).
- revert 'tracing: fix warning in trace_buffered_event_disable()' (bsc#1217036) 
- revert amdgpu patches that caused a regression (bsc#1215802) 
- rpm/check-for-config-changes: add as_wruss to ignored_configs_re add as_wruss as an ignored_configs_re entry in check-for-config-changes to fix build on x86_32. there was a fix submitted to upstream but it was not accepted: https://lore.kernel.org/all/20231031140504.gczuejkmpxsredh3ma@fat_crate.local/ so carry this in ignored_configs_re instead.
- rpm/check-for-config-changes: add have_shadow_call_stack to ignored_configs_re not supported by our compiler.
- rpm/mkspec-dtb: add riscv64 dtb-allwinner subpackage
- run scripts/renamepatches for sle15-sp4
- s390/ap: fix ap bus crash on early config change callback invocation (git-fixes bsc#1217687).
- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).
- s390/cmma: fix detection of dat pages (ltc#203997 bsc#1217086).
- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (ltc#203997 bsc#1217086).
- s390/cmma: fix initial kernel address space page table walk (ltc#203997 bsc#1217086).
- s390/crashdump: fix tod programmable field size (git-fixes bsc#1217205).
- s390/dasd: fix hanging device after request requeue (git-fixes ltc#203629 bsc#1215124).
- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).
- s390/dasd: use correct number of retries for erp requests (git-fixes bsc#1217598).
- s390/ipl: add missing ipl_type_eckd_dump case to ipl_init() (git-fixes bsc#1217511).
- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).
- s390/mm: add missing arch_set_page_dat() call to gmap allocations (ltc#203997 bsc#1217086).
- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (ltc#203997 bsc#1217086).
- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).
- s390/ptrace: fix ptrace_get_last_break error handling (git-fixes bsc#1217599).
- sbitmap: fix batched wait_cnt accounting (bsc#1217095 bsc#1217196).
- sbitmap: fix up kabi for sbitmap_queue_wake_up() (bsc#1217095 bsc#1217196).
- sbsa_gwdt: calculate timeout with 64-bit math (git-fixes).
- scsi: lpfc: copyright updates for 14.2.0.16 patches (bsc#1217731).
- scsi: lpfc: correct maximum pci function value for ras fw logging (bsc#1217731).
- scsi: lpfc: eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).
- scsi: lpfc: enhance driver logging for selected discovery events (bsc#1217731).
- scsi: lpfc: fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).
- scsi: lpfc: fix possible file string name overflow when updating firmware (bsc#1217731).
- scsi: lpfc: introduce log_node_verbose messaging flag (bsc#1217124).
- scsi: lpfc: refactor and clean up mailbox command memory free (bsc#1217731).
- scsi: lpfc: reject received prlis with only initiator fcn role for npiv ports (bsc#1217124).
- scsi: lpfc: remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).
- scsi: lpfc: return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).
- scsi: lpfc: treat ioerr_sli_down i/o completion status the same as pci offline (bsc#1217124).
- scsi: lpfc: update lpfc version to 14.2.0.15 (bsc#1217124).
- scsi: lpfc: update lpfc version to 14.2.0.16 (bsc#1217731).
- scsi: lpfc: validate els ls_acc completion payload (bsc#1217124).
- scsi: qla2xxx: fix double free of dsd_list during driver load (git-fixes).
- scsi: qla2xxx: use field_get() to extract pcie capability fields (git-fixes).
- selftests/efivarfs: create-read: fix a resource leak (git-fixes).
- selftests/pidfd: fix ksft print formats (git-fixes).
- selftests/resctrl: ensure the benchmark commands fits to its array (git-fixes).
- selftests/resctrl: reduce failures due to outliers in mba/mbm tests (git-fixes).
- selftests/resctrl: remove duplicate feature check from cmt test (git-fixes).
- seq_buf: fix a misleading comment (git-fixes).
- serial: exar: revert 'serial: exar: add support for sealevel 7xxxc serial cards' (git-fixes).
- serial: meson: use platform_get_irq() to get the interrupt (git-fixes).
- soc: qcom: llcc: handle a second device without data corruption (git-fixes).
- spi: nxp-fspi: use the correct ioremap function (git-fixes).
- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).
- spi: tegra: fix missing irq check in tegra_slink_probe() (git-fixes).
- staging: media: ipu3: remove ftrace-like logging (git-fixes).
- string.h: add array-wrappers for (v)memdup_user() (git-fixes).
- supported.conf: marked idpf supported
- thermal: core: prevent potential string overflow (git-fixes).
- treewide: spelling fix in comment (git-fixes).
- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).
- tty: 8250: add brainboxes oxford semiconductor-based quirks (git-fixes).
- tty: 8250: add support for additional brainboxes px cards (git-fixes).
- tty: 8250: add support for additional brainboxes uc cards (git-fixes).
- tty: 8250: add support for brainboxes up cards (git-fixes).
- tty: 8250: add support for intashield is-100 (git-fixes).
- tty: 8250: add support for intashield ix cards (git-fixes).
- tty: 8250: fix port count of px-257 (git-fixes).
- tty: 8250: fix up px-803/px-857 (git-fixes).
- tty: 8250: remove uc-257 and uc-431 (git-fixes).
- tty: fix uninit-value access in ppp_sync_receive() (git-fixes).
- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).
- tty: serial: meson: fix hard lockup on crtscts mode (git-fixes).
- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).
- tty: vcc: add check for kstrdup() in vcc_probe() (git-fixes).
- update ath11k hibernation fix patch set (bsc#1207948) 
- update metadata s390-ipl-add-missing-secure-has_secure-file-to-ipl-type-unknown (bsc#1214976 git-fixes).
- usb: cdnsp: fix deadlock issue during using ncm gadget (git-fixes).
- usb: chipidea: fix dma overwrite for tegra (git-fixes).
- usb: chipidea: simplify tegra dma alignment code (git-fixes).
- usb: dwc2: fix possible null pointer dereference caused by driver concurrency (git-fixes).
- usb: dwc2: write hcint with intmask applied (bsc#1214286).
- usb: dwc3: fix default mode initialization (git-fixes).
- usb: dwc3: qcom: fix acpi platform device leak (git-fixes).
- usb: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).
- usb: dwc3: qcom: fix software node leak on probe errors (git-fixes).
- usb: dwc3: qcom: fix wakeup after probe deferral (git-fixes).
- usb: dwc3: set the dma max_seg_size (git-fixes).
- usb: gadget: f_ncm: always set current gadget in ncm_bind() (git-fixes).
- usb: raw-gadget: properly handle interrupted requests (git-fixes).
- usb: serial: option: add fibocom l7xx modules (git-fixes).
- usb: serial: option: do not claim interface 4 for zte mf290 (git-fixes).
- usb: serial: option: fix fm101r-gl defines (git-fixes).
- usb: storage: set 1.50 as the lower bcddevice for older 'super top' compatibility (git-fixes).
- usb: typec: tcpm: fix null pointer dereference in tcpm_pd_svdm() (git-fixes).
- usb: typec: tcpm: skip hard reset when in error recovery (git-fixes).
- usb: usbip: fix stub_dev hub disconnect (git-fixes).
- virtchnl: add virtchnl version 2 ops (bsc#1215458).
- wifi: ath10k: do not touch the ce interrupt registers after power up (git-fixes).
- wifi: ath10k: fix clang-specific fortify warning (git-fixes).
- wifi: ath11k: debugfs: fix to work with multiple pci devices (git-fixes).
- wifi: ath11k: fix dfs radar event locking (git-fixes).
- wifi: ath11k: fix gtk offload status event locking (git-fixes).
- wifi: ath11k: fix htt pktlog locking (git-fixes).
- wifi: ath11k: fix temperature event locking (git-fixes).
- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).
- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).
- wifi: iwlwifi: empty overflow queue during flush (git-fixes).
- wifi: iwlwifi: honor the enable_ini value (git-fixes).
- wifi: iwlwifi: pcie: synchronize irqs before napi (git-fixes).
- wifi: iwlwifi: use fw rate for non-data frames (git-fixes).
- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).
- wifi: mac80211: fix # of msdu in a-msdu calculation (git-fixes).
- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).
- wifi: rtlwifi: fix edca limit set by bt coexistence (git-fixes).
- wifi: rtw88: debug: fix the null vs is_err() bug for debugfs_create_file() (git-fixes).
- x86/alternative: add a __alt_reloc_selftest() prototype (git-fixes).
- x86/cpu: clear svm feature if disabled by bios (bsc#1214700).
- x86/cpu: fix amd erratum #1485 on zen4-based cpus (git-fixes).
- x86/fpu: set x86_feature_osxsave feature after enabling osxsave in cr4 (git-fixes).
- x86/hyperv: add hv_expose_invariant_tsc define (git-fixes).
- x86/hyperv: fix a warning in mshyperv.h (git-fixes).
- x86/hyperv: improve code for referencing hyperv_pcpu_input_arg (git-fixes).
- x86/hyperv: make hv_get_nmi_reason public (git-fixes).
- x86/sev: do not try to parse for the cc blob on non-amd hardware (git-fixes).
- x86/sev: fix calculation of end address based on number of pages (git-fixes).
- x86/sev: use the ghcb protocol when available for snp cpuid requests (git-fixes).
- x86: move gds_ucode_mitigated() declaration to header (git-fixes).
- xfs: add attr state machine tracepoints (git-fixes).
- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).
- xfs: constify btree function parameters that are not modified (git-fixes).
- xfs: convert agf log flags to unsigned (git-fixes).
- xfs: convert agi log flags to unsigned (git-fixes).
- xfs: convert attr type flags to unsigned (git-fixes).
- xfs: convert bmap extent type flags to unsigned (git-fixes).
- xfs: convert bmapi flags to unsigned (git-fixes).
- xfs: convert btree buffer log flags to unsigned (git-fixes).
- xfs: convert buffer flags to unsigned (git-fixes).
- xfs: convert buffer log item flags to unsigned (git-fixes).
- xfs: convert da btree operations flags to unsigned (git-fixes).
- xfs: convert dquot flags to unsigned (git-fixes).
- xfs: convert inode lock flags to unsigned (git-fixes).
- xfs: convert log item tracepoint flags to unsigned (git-fixes).
- xfs: convert log ticket and iclog flags to unsigned (git-fixes).
- xfs: convert quota options flags to unsigned (git-fixes).
- xfs: convert scrub type flags to unsigned (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).
- xfs: make the key parameters to all btree key comparison functions const (git-fixes).
- xfs: make the key parameters to all btree query range functions const (git-fixes).
- xfs: make the keys and records passed to btree inorder functions const (git-fixes).
- xfs: make the pointer passed to btree set_root functions const (git-fixes).
- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).
- xfs: make the start pointer passed to btree update_lastrec functions const (git-fixes).
- xfs: mark the record passed into btree init_key functions as const (git-fixes).
- xfs: mark the record passed into xchk_btree functions as const (git-fixes).
- xfs: remove xfs_btree_cur_t typedef (git-fixes).
- xfs: rename i_disk_size fields in ftrace output (git-fixes).
- xfs: resolve fork names in trace output (git-fixes).
- xfs: standardize ag block number formatting in ftrace output (git-fixes).
- xfs: standardize ag number formatting in ftrace output (git-fixes).
- xfs: standardize daddr formatting in ftrace output (git-fixes).
- xfs: standardize inode generation formatting in ftrace output (git-fixes).
- xfs: standardize inode number formatting in ftrace output (git-fixes).
- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).
- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).
- xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 (git-fixes).
- xhci: enable rpm on controllers that support low-power states (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-12"/>
	<updated date="2023-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207948">SUSE bug 1207948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210447">SUSE bug 1210447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212649">SUSE bug 1212649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214286">SUSE bug 1214286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214700">SUSE bug 1214700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214840">SUSE bug 1214840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214976">SUSE bug 1214976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215095">SUSE bug 1215095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215123">SUSE bug 1215123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215124">SUSE bug 1215124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215292">SUSE bug 1215292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215420">SUSE bug 1215420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215458">SUSE bug 1215458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215710">SUSE bug 1215710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215802">SUSE bug 1215802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215931">SUSE bug 1215931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216058">SUSE bug 1216058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216105">SUSE bug 1216105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216259">SUSE bug 1216259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216527">SUSE bug 1216527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216584">SUSE bug 1216584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216621">SUSE bug 1216621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216687">SUSE bug 1216687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216693">SUSE bug 1216693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216759">SUSE bug 1216759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216761">SUSE bug 1216761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216788">SUSE bug 1216788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216844">SUSE bug 1216844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216861">SUSE bug 1216861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216909">SUSE bug 1216909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216959">SUSE bug 1216959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216965">SUSE bug 1216965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216976">SUSE bug 1216976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217036">SUSE bug 1217036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217068">SUSE bug 1217068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217086">SUSE bug 1217086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217095">SUSE bug 1217095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217124">SUSE bug 1217124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217140">SUSE bug 1217140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217147">SUSE bug 1217147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217195">SUSE bug 1217195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217196">SUSE bug 1217196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217200">SUSE bug 1217200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217205">SUSE bug 1217205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217332">SUSE bug 1217332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217366">SUSE bug 1217366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217511">SUSE bug 1217511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217515">SUSE bug 1217515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217598">SUSE bug 1217598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217599">SUSE bug 1217599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217609">SUSE bug 1217609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217687">SUSE bug 1217687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217731">SUSE bug 1217731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217780">SUSE bug 1217780</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2006/">CVE-2023-2006 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2006">CVE-2023-2006 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-25775/">CVE-2023-25775 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25775">CVE-2023-25775 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3777/">CVE-2023-3777 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3777">CVE-2023-3777 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39197/">CVE-2023-39197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39197">CVE-2023-39197 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39198/">CVE-2023-39198 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39198">CVE-2023-39198 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4244/">CVE-2023-4244 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4244">CVE-2023-4244 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-45863/">CVE-2023-45863 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45863">CVE-2023-45863 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45871/">CVE-2023-45871 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45871">CVE-2023-45871 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-46813/">CVE-2023-46813 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46813">CVE-2023-46813 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46862/">CVE-2023-46862 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46862">CVE-2023-46862 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5158/">CVE-2023-5158 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5158">CVE-2023-5158 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5633/">CVE-2023-5633 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5633">CVE-2023-5633 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5717/">CVE-2023-5717 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5717">CVE-2023-5717 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6039/">CVE-2023-6039 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6039">CVE-2023-6039 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6176/">CVE-2023-6176 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6176">CVE-2023-6176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009815422" comment="cluster-md-kmp-rt-5.14.21-150500.13.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815423" comment="dlm-kmp-rt-5.14.21-150500.13.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815424" comment="gfs2-kmp-rt-5.14.21-150500.13.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815425" comment="kernel-devel-rt-5.14.21-150500.13.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815426" comment="kernel-rt-5.14.21-150500.13.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815427" comment="kernel-rt-devel-5.14.21-150500.13.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815428" comment="kernel-rt-extra-5.14.21-150500.13.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815429" comment="kernel-rt-livepatch-5.14.21-150500.13.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815430" comment="kernel-rt-livepatch-devel-5.14.21-150500.13.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815431" comment="kernel-rt-optional-5.14.21-150500.13.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815432" comment="kernel-rt-vdso-5.14.21-150500.13.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815433" comment="kernel-rt_debug-5.14.21-150500.13.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815434" comment="kernel-rt_debug-devel-5.14.21-150500.13.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815435" comment="kernel-rt_debug-livepatch-devel-5.14.21-150500.13.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815436" comment="kernel-rt_debug-vdso-5.14.21-150500.13.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815437" comment="kernel-source-rt-5.14.21-150500.13.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815438" comment="kernel-syms-rt-5.14.21-150500.13.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815439" comment="kselftests-kmp-rt-5.14.21-150500.13.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815440" comment="ocfs2-kmp-rt-5.14.21-150500.13.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815441" comment="reiserfs-kmp-rt-5.14.21-150500.13.27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4565" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1084909" ref_url="https://bugzilla.suse.com/1084909" source="BUGZILLA"/>
		<reference ref_id="1207948" ref_url="https://bugzilla.suse.com/1207948" source="BUGZILLA"/>
		<reference ref_id="1210447" ref_url="https://bugzilla.suse.com/1210447" source="BUGZILLA"/>
		<reference ref_id="1214286" ref_url="https://bugzilla.suse.com/1214286" source="BUGZILLA"/>
		<reference ref_id="1214700" ref_url="https://bugzilla.suse.com/1214700" source="BUGZILLA"/>
		<reference ref_id="1214840" ref_url="https://bugzilla.suse.com/1214840" source="BUGZILLA"/>
		<reference ref_id="1214976" ref_url="https://bugzilla.suse.com/1214976" source="BUGZILLA"/>
		<reference ref_id="1215123" ref_url="https://bugzilla.suse.com/1215123" source="BUGZILLA"/>
		<reference ref_id="1215124" ref_url="https://bugzilla.suse.com/1215124" source="BUGZILLA"/>
		<reference ref_id="1215292" ref_url="https://bugzilla.suse.com/1215292" source="BUGZILLA"/>
		<reference ref_id="1215420" ref_url="https://bugzilla.suse.com/1215420" source="BUGZILLA"/>
		<reference ref_id="1215458" ref_url="https://bugzilla.suse.com/1215458" source="BUGZILLA"/>
		<reference ref_id="1215710" ref_url="https://bugzilla.suse.com/1215710" source="BUGZILLA"/>
		<reference ref_id="1215802" ref_url="https://bugzilla.suse.com/1215802" source="BUGZILLA"/>
		<reference ref_id="1215931" ref_url="https://bugzilla.suse.com/1215931" source="BUGZILLA"/>
		<reference ref_id="1216058" ref_url="https://bugzilla.suse.com/1216058" source="BUGZILLA"/>
		<reference ref_id="1216105" ref_url="https://bugzilla.suse.com/1216105" source="BUGZILLA"/>
		<reference ref_id="1216259" ref_url="https://bugzilla.suse.com/1216259" source="BUGZILLA"/>
		<reference ref_id="1216527" ref_url="https://bugzilla.suse.com/1216527" source="BUGZILLA"/>
		<reference ref_id="1216584" ref_url="https://bugzilla.suse.com/1216584" source="BUGZILLA"/>
		<reference ref_id="1216687" ref_url="https://bugzilla.suse.com/1216687" source="BUGZILLA"/>
		<reference ref_id="1216693" ref_url="https://bugzilla.suse.com/1216693" source="BUGZILLA"/>
		<reference ref_id="1216759" ref_url="https://bugzilla.suse.com/1216759" source="BUGZILLA"/>
		<reference ref_id="1216788" ref_url="https://bugzilla.suse.com/1216788" source="BUGZILLA"/>
		<reference ref_id="1216844" ref_url="https://bugzilla.suse.com/1216844" source="BUGZILLA"/>
		<reference ref_id="1216861" ref_url="https://bugzilla.suse.com/1216861" source="BUGZILLA"/>
		<reference ref_id="1216909" ref_url="https://bugzilla.suse.com/1216909" source="BUGZILLA"/>
		<reference ref_id="1216959" ref_url="https://bugzilla.suse.com/1216959" source="BUGZILLA"/>
		<reference ref_id="1216965" ref_url="https://bugzilla.suse.com/1216965" source="BUGZILLA"/>
		<reference ref_id="1216976" ref_url="https://bugzilla.suse.com/1216976" source="BUGZILLA"/>
		<reference ref_id="1217036" ref_url="https://bugzilla.suse.com/1217036" source="BUGZILLA"/>
		<reference ref_id="1217068" ref_url="https://bugzilla.suse.com/1217068" source="BUGZILLA"/>
		<reference ref_id="1217086" ref_url="https://bugzilla.suse.com/1217086" source="BUGZILLA"/>
		<reference ref_id="1217095" ref_url="https://bugzilla.suse.com/1217095" source="BUGZILLA"/>
		<reference ref_id="1217124" ref_url="https://bugzilla.suse.com/1217124" source="BUGZILLA"/>
		<reference ref_id="1217140" ref_url="https://bugzilla.suse.com/1217140" source="BUGZILLA"/>
		<reference ref_id="1217147" ref_url="https://bugzilla.suse.com/1217147" source="BUGZILLA"/>
		<reference ref_id="1217195" ref_url="https://bugzilla.suse.com/1217195" source="BUGZILLA"/>
		<reference ref_id="1217196" ref_url="https://bugzilla.suse.com/1217196" source="BUGZILLA"/>
		<reference ref_id="1217200" ref_url="https://bugzilla.suse.com/1217200" source="BUGZILLA"/>
		<reference ref_id="1217205" ref_url="https://bugzilla.suse.com/1217205" source="BUGZILLA"/>
		<reference ref_id="1217332" ref_url="https://bugzilla.suse.com/1217332" source="BUGZILLA"/>
		<reference ref_id="1217366" ref_url="https://bugzilla.suse.com/1217366" source="BUGZILLA"/>
		<reference ref_id="1217511" ref_url="https://bugzilla.suse.com/1217511" source="BUGZILLA"/>
		<reference ref_id="1217515" ref_url="https://bugzilla.suse.com/1217515" source="BUGZILLA"/>
		<reference ref_id="1217598" ref_url="https://bugzilla.suse.com/1217598" source="BUGZILLA"/>
		<reference ref_id="1217599" ref_url="https://bugzilla.suse.com/1217599" source="BUGZILLA"/>
		<reference ref_id="1217609" ref_url="https://bugzilla.suse.com/1217609" source="BUGZILLA"/>
		<reference ref_id="1217687" ref_url="https://bugzilla.suse.com/1217687" source="BUGZILLA"/>
		<reference ref_id="1217731" ref_url="https://bugzilla.suse.com/1217731" source="BUGZILLA"/>
		<reference ref_id="1217780" ref_url="https://bugzilla.suse.com/1217780" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-2006" ref_url="https://www.suse.com/security/cve/CVE-2023-2006/" source="CVE"/>
		<reference ref_id="CVE-2023-25775" ref_url="https://www.suse.com/security/cve/CVE-2023-25775/" source="CVE"/>
		<reference ref_id="CVE-2023-39197" ref_url="https://www.suse.com/security/cve/CVE-2023-39197/" source="CVE"/>
		<reference ref_id="CVE-2023-39198" ref_url="https://www.suse.com/security/cve/CVE-2023-39198/" source="CVE"/>
		<reference ref_id="CVE-2023-4244" ref_url="https://www.suse.com/security/cve/CVE-2023-4244/" source="CVE"/>
		<reference ref_id="CVE-2023-45863" ref_url="https://www.suse.com/security/cve/CVE-2023-45863/" source="CVE"/>
		<reference ref_id="CVE-2023-45871" ref_url="https://www.suse.com/security/cve/CVE-2023-45871/" source="CVE"/>
		<reference ref_id="CVE-2023-46862" ref_url="https://www.suse.com/security/cve/CVE-2023-46862/" source="CVE"/>
		<reference ref_id="CVE-2023-5158" ref_url="https://www.suse.com/security/cve/CVE-2023-5158/" source="CVE"/>
		<reference ref_id="CVE-2023-5633" ref_url="https://www.suse.com/security/cve/CVE-2023-5633/" source="CVE"/>
		<reference ref_id="CVE-2023-5717" ref_url="https://www.suse.com/security/cve/CVE-2023-5717/" source="CVE"/>
		<reference ref_id="CVE-2023-6039" ref_url="https://www.suse.com/security/cve/CVE-2023-6039/" source="CVE"/>
		<reference ref_id="CVE-2023-6176" ref_url="https://www.suse.com/security/cve/CVE-2023-6176/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2023-2006: Fixed a race condition in the RxRPC network protocol (bsc#1210447).
- CVE-2023-25775: Fixed improper access control in the Intel Ethernet Controller RDMA driver (bsc#1216959).
- CVE-2023-39197: Fixed a out-of-bounds read in nf_conntrack_dccp_packet() (bsc#1216976).
- CVE-2023-39198: Fixed a race condition leading to use-after-free in qxl_mode_dumb_create() (bsc#1216965).
- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).
- CVE-2023-45863: Fixed a out-of-bounds write in fill_kobj_path() (bsc#1216058).
- CVE-2023-45871: Fixed an issue in the IGB driver, where the buffer size may not be adequate for frames larger than the MTU (bsc#1216259).
- CVE-2023-46862: Fixed a NULL pointer dereference in io_uring_show_fdinfo() (bsc#1216693).
- CVE-2023-5158: Fixed a denial of service in vringh_kiov_advance() in drivers/vhost/vringh.c in the host side of a virtio ring (bsc#1215710).
- CVE-2023-5633: Fixed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface (bsc#1216527).
- CVE-2023-5717: Fixed a heap out-of-bounds write vulnerability in the Performance Events component (bsc#1216584).
- CVE-2023-6039: Fixed a use-after-free in lan78xx_disconnect in drivers/net/usb/lan78xx.c (bsc#1217068).
- CVE-2023-6176: Fixed a denial of service in the cryptographic algorithm scatterwalk functionality (bsc#1217332).

The following non-security bugs were fixed:

- acpi: fpdt: properly handle invalid fpdt subtables (git-fixes).
- acpi: resource: do irq override on tongfang gmxxgxx (git-fixes).
- acpi: resource: skip irq override on asus expertbook b1402cva (git-fixes).
- acpi: sysfs: fix create_pnp_modalias() and create_of_modalias() (git-fixes).
- alsa: hda/realtek - add dell alc295 to pin fall back table (git-fixes).
- alsa: hda/realtek - alc287 realtek i2s speaker platform support (git-fixes).
- alsa: hda/realtek - enable internal speaker of asus k6500zc (git-fixes).
- alsa: hda/realtek: add quirk for asus ux7602zm (git-fixes).
- alsa: hda/realtek: add quirks for asus 2024 zenbooks (git-fixes).
- alsa: hda/realtek: add quirks for hp laptops (git-fixes).
- alsa: hda/realtek: add support dual speaker for dell (git-fixes).
- alsa: hda/realtek: enable mute led on hp 255 g10 (git-fixes).
- alsa: hda/realtek: enable mute led on hp 255 g8 (git-fixes).
- alsa: hda: asus um5302la: added quirks for cs35l41/10431a83 on i2c bus (git-fixes).
- alsa: hda: cs35l41: fix unbalanced pm_runtime_get() (git-fixes).
- alsa: hda: cs35l41: undo runtime pm changes at driver exit time (git-fixes).
- alsa: hda: disable power-save on kontron singlepc (bsc#1217140).
- alsa: hda: fix possible null-ptr-deref when assigning a stream (git-fixes).
- alsa: hda: intel-dsp-config: fix jsl chromebook quirk detection (git-fixes).
- alsa: info: fix potential deadlock at disconnection (git-fixes).
- alsa: usb-audio: add quirk flag to enable native dsd for mcintosh devices (git-fixes).
- arm/xen: fix xen_vcpu_info allocation alignment (git-fixes).
- arm64: add cortex-a520 cpu part definition (git-fixes)
- arm64: allow kprobes on el0 handlers (git-fixes)
- arm64: armv8_deprecated move emulation functions (git-fixes)
- arm64: armv8_deprecated: fix unused-function error (git-fixes)
- arm64: armv8_deprecated: fold ops into insn_emulation (git-fixes)
- arm64: armv8_deprecated: move aarch32 helper earlier (git-fixes)
- arm64: armv8_deprecated: rework deprected instruction handling (git-fixes)
- arm64: consistently pass esr_elx to die() (git-fixes)
- arm64: die(): pass 'err' as long (git-fixes)
- arm64: factor insn read out of call_undef_hook() (git-fixes)
- arm64: factor out el1 ssbs emulation hook (git-fixes)
- arm64: report el1 undefs better (git-fixes)
- arm64: rework bti exception handling (git-fixes)
- arm64: rework el0 mrs emulation (git-fixes)
- arm64: rework fpac exception handling (git-fixes)
- arm64: split el0/el1 undef handlers (git-fixes)
- arm: 9321/1: memset: cast the constant byte to unsigned char (git-fixes).
- asoc: ams-delta.c: use component after check (git-fixes).
- asoc: codecs: wsa-macro: fix uninitialized stack variables with name prefix (git-fixes).
- asoc: cs35l41: undo runtime pm changes at driver exit time (git-fixes).
- asoc: cs35l41: verify pm runtime resume errors in irq handler (git-fixes).
- asoc: fsl: fix pm disable depth imbalance in fsl_easrc_probe (git-fixes).
- asoc: fsl: mpc5200_dma.c: fix warning of function parameter or member not described (git-fixes).
- asoc: hdmi-codec: register hpd callback on component probe (git-fixes).
- asoc: intel: skylake: fix mem leak when parsing uuids fails (git-fixes).
- asoc: rt5650: fix the wrong result of key button (git-fixes).
- asoc: simple-card: fixup asoc_simple_probe() error handling (git-fixes).
- asoc: sof: core: ensure sof_ops_free() is still called when probe never ran (git-fixes).
- asoc: ti: omap-mcbsp: fix runtime pm underflow warnings (git-fixes).
- ata: pata_isapnp: add missing error check for devm_ioport_map() (git-fixes).
- atl1c: work around the dma rx overflow issue (git-fixes).
- atm: iphase: do pci error checks on own line (git-fixes).
- blk-mq: do not clear driver tags own mapping (bsc#1217366).
- blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping() (bsc#1217366).
- bluetooth: add device 0bda:887b to device tables (git-fixes).
- bluetooth: add device 13d3:3571 to device tables (git-fixes).
- bluetooth: btusb: add 0bda:b85b for fn-link rtl8852be (git-fixes).
- bluetooth: btusb: add date-&gt;evt_skb is null check (git-fixes).
- bluetooth: btusb: add realtek rtl8852be support id 0x0cb8:0xc559 (git-fixes).
- bluetooth: btusb: add rtw8852be device 13d3:3570 to device tables (git-fixes).
- btrfs: always log symlinks in full mode (bsc#1214840).
- can: dev: can_put_echo_skb(): do not crash kernel if can_priv::echo_skb is accessed out of bounds (git-fixes).
- can: dev: can_restart(): do not crash kernel if carrier is ok (git-fixes).
- can: dev: can_restart(): fix race condition between controller restart and netif_carrier_on() (git-fixes).
- can: isotp: add local echo tx processing for consecutive frames (git-fixes).
- can: isotp: fix race between isotp_sendsmg() and isotp_release() (git-fixes).
- can: isotp: fix tx state handling for echo tx processing (git-fixes).
- can: isotp: handle wait_event_interruptible() return values (git-fixes).
- can: isotp: isotp_bind(): return -einval on incorrect can id formatting (git-fixes).
- can: isotp: isotp_sendmsg(): fix tx state detection and wait behavior (git-fixes).
- can: isotp: remove re-binding of bound socket (git-fixes).
- can: isotp: sanitize can id checks in isotp_bind() (git-fixes).
- can: isotp: set max pdu size to 64 kbyte (git-fixes).
- can: isotp: split tx timer into transmission and timeout (git-fixes).
- can: sja1000: fix comment (git-fixes).
- clk: imx: imx8mq: correct error handling path (git-fixes).
- clk: imx: imx8qxp: fix elcdif_pll clock (git-fixes).
- clk: imx: select mxc_clk for clk_imx8qxp (git-fixes).
- clk: keystone: pll: fix a couple null vs is_err() checks (git-fixes).
- clk: mediatek: clk-mt2701: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6765: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6779: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt6797: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629-eth: add check for mtk_alloc_clk_data (git-fixes).
- clk: mediatek: clk-mt7629: add check for mtk_alloc_clk_data (git-fixes).
- clk: npcm7xx: fix incorrect kfree (git-fixes).
- clk: qcom: clk-rcg2: fix clock rate overflow for high parent frequencies (git-fixes).
- clk: qcom: config ipq_apss_6018 should depend on qcom_smem (git-fixes).
- clk: qcom: gcc-sm8150: fix gcc_sdcc2_apps_clk_src (git-fixes).
- clk: qcom: ipq6018: drop the clk_set_rate_parent flag from pll clocks (git-fixes).
- clk: qcom: mmcc-msm8998: do not check halt bit on some branch clks (git-fixes).
- clk: qcom: mmcc-msm8998: fix the smmu gdsc (git-fixes).
- clk: sanitize possible_parent_show to handle return value of of_clk_get_parent_name (git-fixes).
- clk: scmi: free scmi_clk allocated when the clocks with invalid info are skipped (git-fixes).
- clk: ti: add ti_dt_clk_name() helper to use clock-output-names (git-fixes).
- clk: ti: change ti_clk_register[_omap_hw]() api (git-fixes).
- clk: ti: fix double free in of_ti_divider_clk_setup() (git-fixes).
- clk: ti: update component clocks to use ti_dt_clk_name() (git-fixes).
- clk: ti: update pll and clockdomain clocks to use ti_dt_clk_name() (git-fixes).
- clocksource/drivers/timer-atmel-tcb: fix initialization on sam9 hardware (git-fixes).
- clocksource/drivers/timer-imx-gpt: fix potential memory leak (git-fixes).
- crypto: caam/jr - fix chacha20 + poly1305 self test failure (git-fixes).
- crypto: caam/qi2 - fix chacha20 + poly1305 self test failure (git-fixes).
- crypto: hisilicon/hpre - fix a erroneous check after snprintf() (git-fixes).
- disable loongson drivers loongson is a mips architecture, it does not make sense to build loongson drivers on other architectures.
- dmaengine: pxa_dma: remove an erroneous bug_on() in pxad_free_desc() (git-fixes).
- dmaengine: ste_dma40: fix pm disable depth imbalance in d40_probe (git-fixes).
- dmaengine: stm32-mdma: correct desc prep when channel running (git-fixes).
- dmaengine: ti: edma: handle irq_of_parse_and_map() errors (git-fixes).
- doc/readme.suse: adjust heading style (jsc#ped-5021) * underscore all headings as a preparation for markdown conversion. * use title-style capitalization for the document name and sentence-style capitalization for section headings, as recommended in the current suse documentation style guide.
- doc/readme.suse: bring information about compiling up to date (jsc#ped-5021) * when building the kernel, do not mention to initially change the current directory to /usr/src/linux because later description discourages it and specifies to use 'make -c /usr/src/linux'. * avoid writing additional details in parentheses, incorporate them instead properly in the text. * fix the obsolete name of /etc/modprobe.d/unsupported-modules -&gt; /etc/modprobe.d/10-unsupported-modules.conf. * drop a note that a newly built kernel should be added to the boot manager because that normally happens automatically when running 'make install'. * update a link to the kernel module packages manual. * when preparing a build for external modules, mention use of the upstream recommended 'make modules_prepare' instead of a pair of 'make prepare' + 'make scripts'. * fix some typos+grammar.
- doc/readme.suse: bring the overview section up to date (jsc#ped-5021) * update information in the overview section that was no longer accurate. * improve wording and fix some typos+grammar.
- doc/readme.suse: convert the document to markdown (jsc#ped-5021)
- doc/readme.suse: minor content clean up (jsc#ped-5021) * mark the user's build directory as a variable, not a command: 'make -c $(your_build_dir)' -&gt; 'make -c $your_build_dir'. * unify how to get the current directory: 'm=$(pwd)' -&gt; 'm=$pwd'. * 'git' / 'git' -&gt; 'git'.
- doc/readme.suse: reflow text to 80-column width (jsc#ped-5021)
- doc/readme.suse: update information about (un)supported modules (jsc#ped-5021) * update the list of taint flags. convert it to a table that matches the upstream documentation format and describe specifically flags that are related to module support status. * fix some typos and wording.
- doc/readme.suse: update information about config files (jsc#ped-5021) * use version variables to describe a name of the /boot/config-... file instead of using specific example versions which get outdated quickly. * replace removed silentoldconfig with oldconfig. * mention that oldconfig can automatically pick a base config from '/boot/config-$(uname -r)'. * avoid writing additional details in parentheses, incorporate them instead properly in the text.
- doc/readme.suse: update information about custom patches (jsc#ped-5021) * replace mention of various patches.* directories with only patches.suse as the typical location for patches. * replace i386 with x86_64 in the example how to define a config addon. * fix some typos and wording.
- doc/readme.suse: update information about dud (jsc#ped-5021) remove a dead link to description of device update disks found previously on novell.com. replace it with a short section summarizing what dud is and reference the mkdud + mksusecd tools and their documentation for more information.
- doc/readme.suse: update information about module paths (jsc#ped-5021) * use version variables to describe names of the /lib/modules/$version-$release-$flavor/... directories instead of using specific example versions which get outdated quickly. * note: keep the /lib/modules/ prefix instead of using the new /usr/lib/modules/ location for now. the updated readme is expected to be incorporated to various branches that are not yet usrmerged.
- doc/readme.suse: update the references list (jsc#ped-5021) * remove the reference to linux documentation project. it has been inactive for years and mostly contains old manuals that are not relevant for contemporary systems and hardware. * update the name and link to lwn.net. the original name 'linux weekly news' has been deemphasized over time by its authors. * update the link to kernel newbies website. * update the reference to the linux kernel module programming guide. the document has not been updated for over a decade but it looks its content is still relevant for today. * point kernel module packages manual to the current version. * add a reference to suse soliddriver program.
- doc/readme.suse: update title information (jsc#ped-5021) * drop the mention of kernel versions from the readme title. * remove information about the original authors of the document. rely as in case of other readmes on git metadata to get information about all contributions. * strip the table of contents. the document is short and easy to navigate just by scrolling through it.
- docs: net: move the probe and open/close sections of driver.rst up (bsc#1215458).
- docs: net: reformat driver.rst from a list to sections (bsc#1215458).
- docs: net: use c syntax highlight in driver.rst (bsc#1215458).
- documentation: networking: correct possessive 'its' (bsc#1215458).
- drivers: hv: vmbus: remove unused extern declaration vmbus_ontimer() (git-fixes).
- drm/amd/display: avoid null dereference of timing generator (git-fixes).
- drm/amd/display: change the dmcub mailbox memory location from fb to inbox (git-fixes).
- drm/amd/display: refactor dm_get_plane_scale helper (git-fixes).
- drm/amd/display: remove useless check in should_enable_fbc() (git-fixes).
- drm/amd/display: use full update for clip size increase of large plane source (git-fixes).
- drm/amd/pm: handle non-terminated overdrive commands (git-fixes).
- drm/amd: disable aspm for vi w/ all intel systems (git-fixes).
- drm/amd: fix ubsan array-index-out-of-bounds for polaris and tonga (git-fixes).
- drm/amd: fix ubsan array-index-out-of-bounds for smu7 (git-fixes).
- drm/amd: move helper for dynamic speed switch check out of smu13 (git-fixes).
- drm/amdgpu/vkms: fix a possible null pointer dereference (git-fixes).
- drm/amdgpu: add drv_vram_usage_va for virt data exchange (bsc#1215802).
- drm/amdgpu: add vram reservation based on vram_usagebyfirmware_v2_2 (git-fixes).
- drm/amdgpu: do not use atrm for external devices (git-fixes).
- drm/amdgpu: fix a null pointer access when the smc_rreg pointer is null (git-fixes).
- drm/amdgpu: fix error handling in amdgpu_bo_list_get() (git-fixes).
- drm/amdgpu: fix potential null pointer derefernce (git-fixes).
- drm/amdgpu: fix software pci_unplug on some chips (git-fixes).
- drm/amdgpu: not to save bo in the case of ras err_event_athub (git-fixes).
- drm/amdgpu: remove unnecessary domain argument (git-fixes).
- drm/amdgpu: reserve fences for vm update (git-fixes).
- drm/amdgpu: skip vram reserve on firmware_v2_2 for bare-metal (bsc#1215802).
- drm/amdkfd: fix a race condition of vram buffer unref in svm code (git-fixes).
- drm/amdkfd: fix shift out-of-bounds issue (git-fixes).
- drm/amdkfd: fix some race conditions in vram buffer alloc/free of svm code (git-fixes).
- drm/bridge: fix kernel-doc typo in desc of output_bus_cfg in drm_bridge_state (git-fixes).
- drm/bridge: lt8912b: add missing drm_bridge_attach call (git-fixes).
- drm/bridge: lt8912b: fix bridge_detach (git-fixes).
- drm/bridge: lt8912b: fix crash on bridge detach (git-fixes).
- drm/bridge: lt8912b: manually disable hpd only if it was enabled (git-fixes).
- drm/bridge: lt8912b: register and attach our dsi device at probe (git-fixes).
- drm/bridge: lt8912b: switch to devm mipi-dsi helpers (git-fixes).
- drm/bridge: lt9611uxc: fix the race in the error path (git-fixes).
- drm/bridge: lt9611uxc: register and attach our dsi device at probe (git-fixes).
- drm/bridge: lt9611uxc: switch to devm mipi-dsi helpers (git-fixes).
- drm/bridge: tc358768: clean up clock period code (git-fixes).
- drm/bridge: tc358768: disable non-continuous clock mode (git-fixes).
- drm/bridge: tc358768: fix bit updates (git-fixes).
- drm/bridge: tc358768: fix tc358768_ns_to_cnt() (git-fixes).
- drm/bridge: tc358768: fix use of uninitialized variable (git-fixes).
- drm/bridge: tc358768: print logical values, not raw register values (git-fixes).
- drm/bridge: tc358768: remove unused variable (git-fixes).
- drm/bridge: tc358768: rename dsibclk to hsbyteclk (git-fixes).
- drm/bridge: tc358768: use dev for dbg prints, not priv-&gt;dev (git-fixes).
- drm/bridge: tc358768: use struct videomode (git-fixes).
- drm/dp_mst: fix null deref in get_mst_branch_device_by_guid_helper() (git-fixes).
- drm/gma500: fix call trace when psb_gem_mm_init() fails (git-fixes).
- drm/gud: use size_add() in call to struct_size() (git-fixes).
- drm/i915/pmu: check if pmu is closed before stopping event (git-fixes).
- drm/i915: fix potential spectre vulnerability (git-fixes).
- drm/i915: flush wc ggtt only on required platforms (git-fixes).
- drm/komeda: drop all currently held locks if deadlock happens (git-fixes).
- drm/mediatek: fix iommu fault by swapping fbs after updating plane state (git-fixes).
- drm/mediatek: fix iommu fault during crtc enabling (git-fixes).
- drm/mipi-dsi: create devm device attachment (git-fixes).
- drm/mipi-dsi: create devm device registration (git-fixes).
- drm/msm/dp: skip validity check for dp cts edid checksum (git-fixes).
- drm/msm/dsi: free tx buffer in unbind (git-fixes).
- drm/msm/dsi: use msm_gem_kernel_put to free tx buffer (git-fixes).
- drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference (git-fixes).
- drm/panel: fix a possible null pointer dereference (git-fixes).
- drm/panel: simple: fix innolux g101ice-l01 bus flags (git-fixes).
- drm/panel: simple: fix innolux g101ice-l01 timings (git-fixes).
- drm/panel: st7703: pick different reset sequence (git-fixes).
- drm/qxl: prevent memory leak (git-fixes).
- drm/radeon: fix a possible null pointer dereference (git-fixes).
- drm/radeon: possible buffer overflow (git-fixes).
- drm/rockchip: cdn-dp: fix some error handling paths in cdn_dp_probe() (git-fixes).
- drm/rockchip: fix type promotion bug in rockchip_gem_iommu_map() (git-fixes).
- drm/rockchip: vop: fix call to crtc reset helper (git-fixes).
- drm/rockchip: vop: fix color for rgb888/bgr888 format on vop full (git-fixes).
- drm/rockchip: vop: fix reset of state in duplicate state crtc funcs (git-fixes).
- drm/syncobj: fix drm_syncobj_wait_flags_wait_available (git-fixes).
- drm/ttm: reorder sys manager cleanup step (git-fixes).
- drm/vc4: fix typo (git-fixes).
- drm/vmwgfx: remove the duplicate bo_free function (bsc#1216527)
- drm/vmwgfx: rename vmw_buffer_object to vmw_bo (bsc#1216527)
- drm: bridge: it66121: fix invalid connector dereference (git-fixes).
- drm: mediatek: mtk_dsi: fix no_eot_packet settings/handling (git-fixes).
- drm: vmwgfx_surface.c: copy user-array safely (git-fixes).
- dt-bindings: usb: hcd: add missing phy name to example (git-fixes).
- dt-bindings: usb: qcom,dwc3: fix example wakeup interrupt types (git-fixes).
- ensure ia32_emulation is always enabled for kernel-obs-build if ia32_emulation is disabled by default, ensure it is enabled back for obs kernel to allow building 32bit binaries (jsc#ped-3184) [ms: always pass the parameter, no need to grep through the config which may not be very reliable]
- fbdev: atyfb: only use ioremap_uc() on i386 and ia64 (git-fixes).
- fbdev: fsl-diu-fb: mark wr_reg_wa() static (git-fixes).
- fbdev: imsttfb: fix a resource leak in probe (git-fixes).
- fbdev: imsttfb: fix double free in probe() (git-fixes).
- fbdev: imsttfb: fix error path of imsttfb_probe() (git-fixes).
- fbdev: imsttfb: release framebuffer and dealloc cmap on error path (git-fixes).
- fbdev: omapfb: drop unused remove function (git-fixes).
- fbdev: uvesafb: call cn_del_callback() at the end of uvesafb_exit() (git-fixes).
- firewire: core: fix possible memory leak in create_units() (git-fixes).
- firmware/imx-dsp: fix use_after_free in imx_dsp_setup_channels() (git-fixes).
- fix termination state for idr_for_each_entry_ul() (git-fixes).
- fix x86/mm: print the encryption features in hyperv is disabled
- gpio: mockup: fix kerneldoc (git-fixes).
- gpio: mockup: remove unused field (git-fixes).
- gpu: host1x: correct allocated size for contexts (git-fixes).
- hid: add quirk for dell pro wireless keyboard and mouse km5221w (git-fixes).
- hid: cp2112: fix duplicate workqueue initialization (git-fixes).
- hid: hyperv: avoid struct memcpy overrun warning (git-fixes).
- hid: hyperv: remove unused struct synthhid_msg (git-fixes).
- hid: hyperv: replace one-element array with flexible-array member (git-fixes).
- hid: lenovo: detect quirk-free fw on cptkbd and stop applying workaround (git-fixes).
- hid: logitech-hidpp: do not restart io, instead defer hid_connect() only (git-fixes).
- hid: logitech-hidpp: move get_wireless_feature_index() check to hidpp_connect_event() (git-fixes).
- hid: logitech-hidpp: remove hidpp_quirk_no_hidinput quirk (git-fixes).
- hid: logitech-hidpp: revert 'do not restart communication if not necessary' (git-fixes).
- hv: simplify sysctl registration (git-fixes).
- hv_netvsc: fix netvsc_send_completion to avoid multiple message length checks (git-fixes).
- hv_netvsc: fix race of netvsc and vf register_netdevice (git-fixes).
- hv_netvsc: fix race of register_netdevice_notifier and vf register (git-fixes).
- hv_netvsc: mark vf as slave before exposing it to user-mode (git-fixes).
- hwmon: (coretemp) fix potentially truncated sysfs attribute name (git-fixes).
- i2c: aspeed: fix i2c bus hang in slave read (git-fixes).
- i2c: core: run atomic i2c xfer when !preemptible (git-fixes).
- i2c: designware: disable tx_empty irq while waiting for block length byte (git-fixes).
- i2c: dev: copy userspace array safely (git-fixes).
- i2c: i801: fix potential race in i801_block_transaction_byte_by_byte (git-fixes).
- i2c: iproc: handle invalid slave state (git-fixes).
- i2c: muxes: i2c-demux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-gpmux: use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: muxes: i2c-mux-pinctrl: use of_get_i2c_adapter_by_node() (git-fixes).
- i2c: stm32f7: fix pec handling in case of smbus transfers (git-fixes).
- i2c: sun6i-p2wi: prevent potential division by zero (git-fixes).
- i3c: fix potential refcount leak in i3c_master_register_new_i3c_devs (git-fixes).
- i3c: master: cdns: fix reading status register (git-fixes).
- i3c: master: mipi-i3c-hci: fix a kernel panic for accessing dat_data (git-fixes).
- i3c: master: svc: fix check wrong status register in irq handler (git-fixes).
- i3c: master: svc: fix ibi may not return mandatory data byte (git-fixes).
- i3c: master: svc: fix race condition in ibi work thread (git-fixes).
- i3c: master: svc: fix sda keep low when polling ibiwon timeout happen (git-fixes).
- i3c: master: svc: fix wrong data return when ibi happen during start frame (git-fixes).
- i3c: mipi-i3c-hci: fix out of bounds access in hci_dma_irq_handler (git-fixes).
- i915/perf: fix null deref bugs with drm_dbg() calls (git-fixes).
- idpf: add controlq init and reset checks (bsc#1215458).
- idpf: add core init and interrupt request (bsc#1215458).
- idpf: add create vport and netdev configuration (bsc#1215458).
- idpf: add ethtool callbacks (bsc#1215458).
- idpf: add module register and probe functionality (bsc#1215458).
- idpf: add ptypes and mac filter support (bsc#1215458).
- idpf: add rx splitq napi poll support (bsc#1215458).
- idpf: add singleq start_xmit and napi poll (bsc#1215458).
- idpf: add splitq start_xmit (bsc#1215458).
- idpf: add sriov support and other ndo_ops (bsc#1215458).
- idpf: add tx splitq napi poll support (bsc#1215458).
- idpf: cancel mailbox work in error path (bsc#1215458).
- idpf: configure resources for rx queues (bsc#1215458).
- idpf: configure resources for tx queues (bsc#1215458).
- idpf: fix potential use-after-free in idpf_tso() (bsc#1215458).
- idpf: initialize interrupts and enable vport (bsc#1215458).
- idpf: set scheduling mode for completion queue (bsc#1215458).
- iio: adc: xilinx-xadc: correct temperature offset/scale for ultrascale (git-fixes).
- iio: adc: xilinx-xadc: do not clobber preset voltage/temperature thresholds (git-fixes).
- iio: exynos-adc: request second interupt only when touchscreen mode is used (git-fixes).
- input: synaptics-rmi4 - fix use after free in rmi_unregister_function() (git-fixes).
- input: synaptics-rmi4 - handle reset delay when using smbus trsnsport (git-fixes).
- input: xpad - add vid for turtle beach controllers (git-fixes).
- irqchip/stm32-exti: add missing dt irq flag translation (git-fixes).
- kabi/severities: ignore kabi in rxrpc (bsc#1210447) the rxrpc module is built since sle15-sp3 but it is not shipped as part of any sle product, only in leap (in kernel-*-optional).
- kernel-binary: suse-module-tools is also required when installed requires(pre) adds dependency for the specific sciptlet. however, suse-module-tools also ships modprobe.d files which may be needed at posttrans time or any time the kernel is on the system for generating ramdisk. add plain requires as well.
- kernel-source: move provides after sources
- leds: pwm: do not disable the pwm when the led should be off (git-fixes).
- leds: trigger: ledtrig-cpu:: fix 'output may be truncated' issue for 'cpu' (git-fixes).
- leds: turris-omnia: do not use smbus calls (git-fixes).
- lsm: fix default return value for inode_getsecctx (git-fixes).
- lsm: fix default return value for vm_enough_memory (git-fixes).
- media: bttv: fix use after free error due to btv-&gt;timeout timer (git-fixes).
- media: ccs: correctly initialise try compose rectangle (git-fixes).
- media: ccs: fix driver quirk struct documentation (git-fixes).
- media: cedrus: fix clock/reset sequence (git-fixes).
- media: cobalt: use field_get() to extract link width (git-fixes).
- media: gspca: cpia1: shift-out-of-bounds in set_flicker (git-fixes).
- media: i2c: max9286: fix some redundant of_node_put() calls (git-fixes).
- media: imon: fix access to invalid resource for the second interface (git-fixes).
- media: lirc: drop trailing space from scancode transmit (git-fixes).
- media: qcom: camss: fix missing vfe_lite clocks check (git-fixes).
- media: qcom: camss: fix pm_domain_on sequence in probe (git-fixes).
- media: qcom: camss: fix vfe-17x vfe_disable_output() (git-fixes).
- media: qcom: camss: fix vfe_get() error jump (git-fixes).
- media: sharp: fix sharp encoding (git-fixes).
- media: siano: drop unnecessary error check for debugfs_create_dir/file() (git-fixes).
- media: venus: hfi: add checks to handle capabilities from firmware (git-fixes).
- media: venus: hfi: add checks to perform sanity on queue pointers (git-fixes).
- media: venus: hfi: fix the check to handle session buffer requirement (git-fixes).
- media: venus: hfi_parser: add check to keep the number of codecs within range (git-fixes).
- media: vidtv: mux: add check and kfree for kstrdup (git-fixes).
- media: vidtv: psi: add check for kstrdup (git-fixes).
- media: vivid: avoid integer overflow (git-fixes).
- mfd: arizona-spi: set pdata.hpdet_channel for acpi enumerated devs (git-fixes).
- mfd: core: ensure disabled devices are skipped without aborting (git-fixes).
- mfd: dln2: fix double put in dln2_probe (git-fixes).
- misc: fastrpc: clean buffers on remote invocation failures (git-fixes).
- misc: pci_endpoint_test: add device id for r-car s4-8 pcie controller (git-fixes).
- mm/hmm: fault non-owner device private entries (bsc#1216844, jsc#ped-7237, git-fixes).
- mmc: block: be sure to wait while busy in cqe error recovery (git-fixes).
- mmc: block: do not lose cache flush during cqe error recovery (git-fixes).
- mmc: block: retry commands in cqe error recovery (git-fixes).
- mmc: cqhci: fix task clearing in cqe error recovery (git-fixes).
- mmc: cqhci: increase recovery halt timeout (git-fixes).
- mmc: cqhci: warn of halt or task clear failure (git-fixes).
- mmc: meson-gx: remove setting of cmd_cfg_error (git-fixes).
- mmc: sdhci-pci-gli: a workaround to allow gl9750 to enter aspm l1.2 (git-fixes).
- mmc: sdhci-pci-gli: gl9750: mask the replay timer timeout of aer (git-fixes).
- mmc: sdhci_am654: fix start loop index for tap value parsing (git-fixes).
- mmc: vub300: fix an error code (git-fixes).
- modpost: fix tee module_device_table built on big-endian host (git-fixes).
- mt76: dma: use kzalloc instead of devm_kzalloc for txwi (git-fixes).
- mtd: cfi_cmdset_0001: byte swap otp info (git-fixes).
- mtd: rawnand: arasan: include ecc syndrome along with in-band data while checking for ecc failure (git-fixes).
- net-memcg: fix scope of sockmem pressure indicators (bsc#1216759).
- net: add macro netif_subqueue_completed_wake (bsc#1215458).
- net: avoid address overwrite in kernel_connect (bsc#1216861).
- net: fix use-after-free in tw_timer_handler (bsc#1217195).
- net: ieee802154: adf7242: fix some potential buffer overflow in adf7242_stats_show() (git-fixes).
- net: mana: fix return type of mana_start_xmit() (git-fixes).
- net: piggy back on the memory barrier in bql when waking queues (bsc#1215458).
- net: provide macros for commonly copied lockless queue stop/wake code (bsc#1215458).
- net: usb: ax88179_178a: fix failed operations during ax88179_reset (git-fixes).
- net: usb: smsc95xx: fix uninit-value access in smsc95xx_read_reg (git-fixes).
- nfs: fix access to page-&gt;mapping (bsc#1216788).
- nvme: update firmware version after commit (bsc#1215292).
- pci/aspm: fix l1 substate handling in aspm_attr_store_common() (git-fixes).
- pci/sysfs: protect driver's d3cold preference from user space (git-fixes).
- pci: disable ats for specific intel ipu e2000 devices (bsc#1215458).
- pci: extract ats disabling to a helper function (bsc#1215458).
- pci: exynos: do not discard .remove() callback (git-fixes).
- pci: keystone: do not discard .probe() callback (git-fixes).
- pci: keystone: do not discard .remove() callback (git-fixes).
- pci: prevent xhci driver from claiming amd vangogh usb3 drd device (git-fixes).
- pci: tegra194: use field_get()/field_prep() with link width fields (git-fixes).
- pci: use field_get() in sapphire rx 5600 xt pulse quirk (git-fixes).
- pci: use field_get() to extract link width (git-fixes).
- pci: vmd: correct pci header type register's multi-function check (git-fixes).
- pcmcia: cs: fix possible hung task and memory leak pccardd() (git-fixes).
- pcmcia: ds: fix possible name leak in error path in pcmcia_device_add() (git-fixes).
- pcmcia: ds: fix refcount leak in pcmcia_device_add() (git-fixes).
- pinctrl: avoid reload of p state in list iteration (git-fixes).
- platform/x86/intel-uncore-freq: return error on write frequency (bsc#1217147).
- platform/x86/intel-uncore-freq: split common and enumeration part (bsc#1217147).
- platform/x86/intel-uncore-freq: support for cluster level controls (bsc#1217147).
- platform/x86/intel-uncore-freq: tpmi: provide cluster level control (bsc#1217147).
- platform/x86/intel-uncore-freq: uncore frequency control via tpmi (bsc#1217147).
- platform/x86/intel/tpmi: add tpmi external interface for tpmi feature drivers (bsc#1217147).
- platform/x86/intel/tpmi: fix double free reported by smatch (bsc#1217147).
- platform/x86/intel/tpmi: process cpu package mapping (bsc#1217147).
- platform/x86/intel/uncore-freq: display uncore current frequency (bsc#1217147).
- platform/x86/intel/uncore-freq: move to uncore-frequency folder (bsc#1217147).
- platform/x86/intel/uncore-freq: use sysfs api to create attributes (bsc#1217147).
- platform/x86/intel/vsec: add tpmi id (bsc#1217147).
- platform/x86/intel/vsec: enhance and export intel_vsec_add_aux() (bsc#1217147).
- platform/x86/intel/vsec: support private data (bsc#1217147).
- platform/x86/intel/vsec: use mutex for ida_alloc() and ida_free() (bsc#1217147).
- platform/x86/intel: intel tpmi enumeration driver (bsc#1217147).
- platform/x86/intel: tpmi: fix double free in tpmi_create_device() (bsc#1217147).
- platform/x86: intel-uncore-freq: add client processors (bsc#1217147).
- platform/x86: intel-uncore-freq: conditionally create attribute for read frequency (bsc#1217147).
- platform/x86: intel-uncore-freq: fix uncore_freq_common_init() error codes (bsc#1217147).
- platform/x86: intel-uncore-freq: prevent driver loading in guests (bsc#1217147).
- platform/x86: intel-uncore-freq: use sysfs_emit() to instead of scnprintf() (bsc#1217147).
- platform/x86: intel-uncore-frequency: move to intel sub-directory (bsc#1217147).
- platform/x86: intel-uncore-frequency: use default_groups in kobj_type (bsc#1217147).
- platform/x86: thinkpad_acpi: add battery quirk for thinkpad x120e (git-fixes).
- platform/x86: wmi: fix opening of char device (git-fixes).
- platform/x86: wmi: fix probe failure when failing to register wmi devices (git-fixes).
- platform/x86: wmi: remove unnecessary initializations (git-fixes).
- pm / devfreq: rockchip-dfi: make pmu regmap mandatory (git-fixes).
- pm: hibernate: use __get_safe_page() rather than touching the list (git-fixes).
- powerpc/perf/hv-24x7: update domain value check (bsc#1215931).
- powerpc/vas: limit open window failure messages in log bufffer (bsc#1216687 ltc#203927).
- powerpc: do not clobber f0/vs0 during fp|altivec register save (bsc#1217780).
- pwm: brcmstb: utilize appropriate clock apis in suspend/resume (git-fixes).
- pwm: fix double shift bug (git-fixes).
- pwm: sti: reduce number of allocations and drop usage of chip_data (git-fixes).
- r8152: cancel hw_phy_work if we have an error in probe (git-fixes).
- r8152: check for unplug in r8153b_ups_en() / r8153c_ups_en() (git-fixes).
- r8152: check for unplug in rtl_phy_patch_request() (git-fixes).
- r8152: increase usb control msg timeout to 5000ms as per spec (git-fixes).
- r8152: release firmware if we have an error in probe (git-fixes).
- r8152: run the unload routine if we have errors during probe (git-fixes).
- regmap: debugfs: fix a erroneous check after snprintf() (git-fixes).
- regmap: ensure range selector registers are updated after cache sync (git-fixes).
- regmap: prevent noinc writes from clobbering cache (git-fixes).
- revert 'i2c: pxa: move to generic gpio recovery' (git-fixes).
- revert 'mmc: core: capture correct oemid-bits for emmc cards' (git-fixes).
- revert 'tracing: fix warning in trace_buffered_event_disable()' (bsc#1217036) 
- rpm/check-for-config-changes: add as_wruss to ignored_configs_re add as_wruss as an ignored_configs_re entry in check-for-config-changes to fix build on x86_32. there was a fix submitted to upstream but it was not accepted: https://lore.kernel.org/all/20231031140504.gczuejkmpxsredh3ma@fat_crate.local/ so carry this in ignored_configs_re instead.
- rpm/check-for-config-changes: add have_shadow_call_stack to ignored_configs_re not supported by our compiler.
- rpm/mkspec-dtb: add riscv64 dtb-allwinner subpackage
- run scripts/renamepatches for sle15-sp4
- s390/ap: fix ap bus crash on early config change callback invocation (git-fixes bsc#1217687).
- s390/cio: unregister device when the only path is gone (git-fixes bsc#1217609).
- s390/cmma: fix detection of dat pages (ltc#203997 bsc#1217086).
- s390/cmma: fix handling of swapper_pg_dir and invalid_pg_dir (ltc#203997 bsc#1217086).
- s390/cmma: fix initial kernel address space page table walk (ltc#203997 bsc#1217086).
- s390/crashdump: fix tod programmable field size (git-fixes bsc#1217205).
- s390/dasd: fix hanging device after request requeue (git-fixes ltc#203629 bsc#1215124).
- s390/dasd: protect device queue against concurrent access (git-fixes bsc#1217515).
- s390/dasd: use correct number of retries for erp requests (git-fixes bsc#1217598).
- s390/ipl: add missing ipl_type_eckd_dump case to ipl_init() (git-fixes bsc#1217511).
- s390/ipl: add missing secure/has_secure file to ipl type 'unknown' (bsc#1214976 git-fixes).
- s390/mm: add missing arch_set_page_dat() call to gmap allocations (ltc#203997 bsc#1217086).
- s390/mm: add missing arch_set_page_dat() call to vmem_crst_alloc() (ltc#203997 bsc#1217086).
- s390/pkey: fix/harmonize internal keyblob headers (git-fixes bsc#1217200).
- s390/ptrace: fix ptrace_get_last_break error handling (git-fixes bsc#1217599).
- sbitmap: fix batched wait_cnt accounting (bsc#1217095 bsc#1217196).
- sbitmap: fix up kabi for sbitmap_queue_wake_up() (bsc#1217095 bsc#1217196).
- sbsa_gwdt: calculate timeout with 64-bit math (git-fixes).
- scsi: lpfc: copyright updates for 14.2.0.16 patches (bsc#1217731).
- scsi: lpfc: correct maximum pci function value for ras fw logging (bsc#1217731).
- scsi: lpfc: eliminate unnecessary relocking in lpfc_check_nlp_post_devloss() (bsc#1217731).
- scsi: lpfc: enhance driver logging for selected discovery events (bsc#1217731).
- scsi: lpfc: fix list_entry null check warning in lpfc_cmpl_els_plogi() (bsc#1217731).
- scsi: lpfc: fix possible file string name overflow when updating firmware (bsc#1217731).
- scsi: lpfc: introduce log_node_verbose messaging flag (bsc#1217124).
- scsi: lpfc: refactor and clean up mailbox command memory free (bsc#1217731).
- scsi: lpfc: reject received prlis with only initiator fcn role for npiv ports (bsc#1217124).
- scsi: lpfc: remove unnecessary zero return code assignment in lpfc_sli4_hba_setup (bsc#1217124).
- scsi: lpfc: return early in lpfc_poll_eratt() when the driver is unloading (bsc#1217731).
- scsi: lpfc: treat ioerr_sli_down i/o completion status the same as pci offline (bsc#1217124).
- scsi: lpfc: update lpfc version to 14.2.0.15 (bsc#1217124).
- scsi: lpfc: update lpfc version to 14.2.0.16 (bsc#1217731).
- scsi: lpfc: validate els ls_acc completion payload (bsc#1217124).
- scsi: qla2xxx: fix double free of dsd_list during driver load (git-fixes).
- scsi: qla2xxx: use field_get() to extract pcie capability fields (git-fixes).
- selftests/efivarfs: create-read: fix a resource leak (git-fixes).
- selftests/pidfd: fix ksft print formats (git-fixes).
- selftests/resctrl: ensure the benchmark commands fits to its array (git-fixes).
- selftests/resctrl: reduce failures due to outliers in mba/mbm tests (git-fixes).
- selftests/resctrl: remove duplicate feature check from cmt test (git-fixes).
- seq_buf: fix a misleading comment (git-fixes).
- serial: exar: revert 'serial: exar: add support for sealevel 7xxxc serial cards' (git-fixes).
- serial: meson: use platform_get_irq() to get the interrupt (git-fixes).
- soc: qcom: llcc: handle a second device without data corruption (git-fixes).
- spi: nxp-fspi: use the correct ioremap function (git-fixes).
- spi: spi-zynq-qspi: add spi-mem to driver kconfig dependencies (git-fixes).
- spi: tegra: fix missing irq check in tegra_slink_probe() (git-fixes).
- staging: media: ipu3: remove ftrace-like logging (git-fixes).
- string.h: add array-wrappers for (v)memdup_user() (git-fixes).
- supported.conf: marked idpf supported
- thermal: core: prevent potential string overflow (git-fixes).
- treewide: spelling fix in comment (git-fixes).
- tty/sysrq: replace smp_processor_id() with get_cpu() (git-fixes).
- tty: 8250: add brainboxes oxford semiconductor-based quirks (git-fixes).
- tty: 8250: add support for additional brainboxes px cards (git-fixes).
- tty: 8250: add support for additional brainboxes uc cards (git-fixes).
- tty: 8250: add support for brainboxes up cards (git-fixes).
- tty: 8250: add support for intashield is-100 (git-fixes).
- tty: 8250: add support for intashield ix cards (git-fixes).
- tty: 8250: fix port count of px-257 (git-fixes).
- tty: 8250: fix up px-803/px-857 (git-fixes).
- tty: 8250: remove uc-257 and uc-431 (git-fixes).
- tty: fix uninit-value access in ppp_sync_receive() (git-fixes).
- tty: n_gsm: fix race condition in status line change on dead connections (git-fixes).
- tty: serial: meson: fix hard lockup on crtscts mode (git-fixes).
- tty: tty_jobctrl: fix pid memleak in disassociate_ctty() (git-fixes).
- tty: vcc: add check for kstrdup() in vcc_probe() (git-fixes).
- update metadata patches.suse/s390-ipl-add-missing-secure-has_secure-file-to-ipl-type-unknown (bsc#1214976 git-fixes).
- usb: cdnsp: fix deadlock issue during using ncm gadget (git-fixes).
- usb: chipidea: fix dma overwrite for tegra (git-fixes).
- usb: chipidea: simplify tegra dma alignment code (git-fixes).
- usb: dwc2: fix possible null pointer dereference caused by driver concurrency (git-fixes).
- usb: dwc2: write hcint with intmask applied (bsc#1214286).
- usb: dwc3: fix default mode initialization (git-fixes).
- usb: dwc3: qcom: fix acpi platform device leak (git-fixes).
- usb: dwc3: qcom: fix resource leaks on probe deferral (git-fixes).
- usb: dwc3: qcom: fix software node leak on probe errors (git-fixes).
- usb: dwc3: qcom: fix wakeup after probe deferral (git-fixes).
- usb: dwc3: set the dma max_seg_size (git-fixes).
- usb: gadget: f_ncm: always set current gadget in ncm_bind() (git-fixes).
- usb: raw-gadget: properly handle interrupted requests (git-fixes).
- usb: serial: option: add fibocom l7xx modules (git-fixes).
- usb: serial: option: do not claim interface 4 for zte mf290 (git-fixes).
- usb: serial: option: fix fm101r-gl defines (git-fixes).
- usb: storage: set 1.50 as the lower bcddevice for older 'super top' compatibility (git-fixes).
- usb: typec: tcpm: fix null pointer dereference in tcpm_pd_svdm() (git-fixes).
- usb: typec: tcpm: skip hard reset when in error recovery (git-fixes).
- usb: usbip: fix stub_dev hub disconnect (git-fixes).
- virtchnl: add virtchnl version 2 ops (bsc#1215458).
- wifi: ath10k: do not touch the ce interrupt registers after power up (git-fixes).
- wifi: ath10k: fix clang-specific fortify warning (git-fixes).
- wifi: ath11k: debugfs: fix to work with multiple pci devices (git-fixes).
- wifi: ath11k: fix dfs radar event locking (git-fixes).
- wifi: ath11k: fix gtk offload status event locking (git-fixes).
- wifi: ath11k: fix htt pktlog locking (git-fixes).
- wifi: ath11k: fix temperature event locking (git-fixes).
- wifi: ath9k: fix clang-specific fortify warnings (git-fixes).
- wifi: iwlwifi: call napi_synchronize() before freeing rx/tx queues (git-fixes).
- wifi: iwlwifi: empty overflow queue during flush (git-fixes).
- wifi: iwlwifi: honor the enable_ini value (git-fixes).
- wifi: iwlwifi: pcie: synchronize irqs before napi (git-fixes).
- wifi: iwlwifi: use fw rate for non-data frames (git-fixes).
- wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (git-fixes).
- wifi: mac80211: fix # of msdu in a-msdu calculation (git-fixes).
- wifi: mt76: mt7603: rework/fix rx pse hang check (git-fixes).
- wifi: rtlwifi: fix edca limit set by bt coexistence (git-fixes).
- wifi: rtw88: debug: fix the null vs is_err() bug for debugfs_create_file() (git-fixes).
- x86/alternative: add a __alt_reloc_selftest() prototype (git-fixes).
- x86/cpu: clear svm feature if disabled by bios (bsc#1214700).
- x86/cpu: fix amd erratum #1485 on zen4-based cpus (git-fixes).
- x86/fpu: set x86_feature_osxsave feature after enabling osxsave in cr4 (git-fixes).
- x86/hyperv: add hv_expose_invariant_tsc define (git-fixes).
- x86/hyperv: fix a warning in mshyperv.h (git-fixes).
- x86/hyperv: improve code for referencing hyperv_pcpu_input_arg (git-fixes).
- x86/hyperv: make hv_get_nmi_reason public (git-fixes).
- x86/sev: do not try to parse for the cc blob on non-amd hardware (git-fixes).
- x86/sev: fix calculation of end address based on number of pages (git-fixes).
- x86/sev: use the ghcb protocol when available for snp cpuid requests (git-fixes).
- x86: move gds_ucode_mitigated() declaration to header (git-fixes).
- xfs: add attr state machine tracepoints (git-fixes).
- xfs: can't use kmem_zalloc() for attribute buffers (bsc#1216909).
- xfs: constify btree function parameters that are not modified (git-fixes).
- xfs: convert agf log flags to unsigned (git-fixes).
- xfs: convert agi log flags to unsigned (git-fixes).
- xfs: convert attr type flags to unsigned (git-fixes).
- xfs: convert bmap extent type flags to unsigned (git-fixes).
- xfs: convert bmapi flags to unsigned (git-fixes).
- xfs: convert btree buffer log flags to unsigned (git-fixes).
- xfs: convert buffer flags to unsigned (git-fixes).
- xfs: convert buffer log item flags to unsigned (git-fixes).
- xfs: convert da btree operations flags to unsigned (git-fixes).
- xfs: convert dquot flags to unsigned (git-fixes).
- xfs: convert inode lock flags to unsigned (git-fixes).
- xfs: convert log item tracepoint flags to unsigned (git-fixes).
- xfs: convert log ticket and iclog flags to unsigned (git-fixes).
- xfs: convert quota options flags to unsigned (git-fixes).
- xfs: convert scrub type flags to unsigned (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'blkno', 'block', or 'bno' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'count' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'len' (git-fixes).
- xfs: disambiguate units for ftrace fields tagged 'offset' (git-fixes).
- xfs: make the key parameters to all btree key comparison functions const (git-fixes).
- xfs: make the key parameters to all btree query range functions const (git-fixes).
- xfs: make the keys and records passed to btree inorder functions const (git-fixes).
- xfs: make the pointer passed to btree set_root functions const (git-fixes).
- xfs: make the start pointer passed to btree alloc_block functions const (git-fixes).
- xfs: mark the record passed into btree init_key functions as const (git-fixes).
- xfs: mark the record passed into xchk_btree functions as const (git-fixes).
- xfs: remove xfs_btree_cur_t typedef (git-fixes).
- xfs: rename i_disk_size fields in ftrace output (git-fixes).
- xfs: resolve fork names in trace output (git-fixes).
- xfs: standardize ag block number formatting in ftrace output (git-fixes).
- xfs: standardize ag number formatting in ftrace output (git-fixes).
- xfs: standardize daddr formatting in ftrace output (git-fixes).
- xfs: standardize inode generation formatting in ftrace output (git-fixes).
- xfs: standardize inode number formatting in ftrace output (git-fixes).
- xfs: standardize remaining xfs_buf length tracepoints (git-fixes).
- xfs: standardize rmap owner number formatting in ftrace output (git-fixes).
- xhci: Loosen RPM as default policy to cover for AMD xHC 1.1 (git-fixes).
- xhci: enable rpm on controllers that support low-power states (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-12"/>
	<updated date="2023-12-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1084909">SUSE bug 1084909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207948">SUSE bug 1207948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210447">SUSE bug 1210447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214286">SUSE bug 1214286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214700">SUSE bug 1214700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214840">SUSE bug 1214840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214976">SUSE bug 1214976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215123">SUSE bug 1215123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215124">SUSE bug 1215124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215292">SUSE bug 1215292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215420">SUSE bug 1215420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215458">SUSE bug 1215458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215710">SUSE bug 1215710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215802">SUSE bug 1215802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215931">SUSE bug 1215931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216058">SUSE bug 1216058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216105">SUSE bug 1216105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216259">SUSE bug 1216259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216527">SUSE bug 1216527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216584">SUSE bug 1216584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216687">SUSE bug 1216687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216693">SUSE bug 1216693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216759">SUSE bug 1216759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216788">SUSE bug 1216788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216844">SUSE bug 1216844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216861">SUSE bug 1216861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216909">SUSE bug 1216909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216959">SUSE bug 1216959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216965">SUSE bug 1216965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216976">SUSE bug 1216976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217036">SUSE bug 1217036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217068">SUSE bug 1217068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217086">SUSE bug 1217086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217095">SUSE bug 1217095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217124">SUSE bug 1217124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217140">SUSE bug 1217140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217147">SUSE bug 1217147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217195">SUSE bug 1217195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217196">SUSE bug 1217196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217200">SUSE bug 1217200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217205">SUSE bug 1217205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217332">SUSE bug 1217332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217366">SUSE bug 1217366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217511">SUSE bug 1217511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217515">SUSE bug 1217515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217598">SUSE bug 1217598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217599">SUSE bug 1217599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217609">SUSE bug 1217609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217687">SUSE bug 1217687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217731">SUSE bug 1217731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217780">SUSE bug 1217780</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2006/">CVE-2023-2006 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2006">CVE-2023-2006 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-25775/">CVE-2023-25775 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25775">CVE-2023-25775 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39197/">CVE-2023-39197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39197">CVE-2023-39197 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39198/">CVE-2023-39198 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39198">CVE-2023-39198 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4244/">CVE-2023-4244 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4244">CVE-2023-4244 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-45863/">CVE-2023-45863 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45863">CVE-2023-45863 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45871/">CVE-2023-45871 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45871">CVE-2023-45871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46862/">CVE-2023-46862 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46862">CVE-2023-46862 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5158/">CVE-2023-5158 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5158">CVE-2023-5158 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5633/">CVE-2023-5633 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5633">CVE-2023-5633 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5717/">CVE-2023-5717 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5717">CVE-2023-5717 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6039/">CVE-2023-6039 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6039">CVE-2023-6039 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6176/">CVE-2023-6176 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6176">CVE-2023-6176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009815442" comment="cluster-md-kmp-azure-5.14.21-150500.33.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815443" comment="dlm-kmp-azure-5.14.21-150500.33.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815444" comment="gfs2-kmp-azure-5.14.21-150500.33.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815445" comment="kernel-azure-5.14.21-150500.33.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815446" comment="kernel-azure-devel-5.14.21-150500.33.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815447" comment="kernel-azure-extra-5.14.21-150500.33.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815448" comment="kernel-azure-livepatch-devel-5.14.21-150500.33.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815449" comment="kernel-azure-optional-5.14.21-150500.33.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815450" comment="kernel-azure-vdso-5.14.21-150500.33.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815451" comment="kernel-devel-azure-5.14.21-150500.33.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815452" comment="kernel-source-azure-5.14.21-150500.33.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815453" comment="kernel-syms-azure-5.14.21-150500.33.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815454" comment="kselftests-kmp-azure-5.14.21-150500.33.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815455" comment="ocfs2-kmp-azure-5.14.21-150500.33.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815456" comment="reiserfs-kmp-azure-5.14.21-150500.33.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4566" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217765" ref_url="https://bugzilla.suse.com/1217765" source="BUGZILLA"/>
		<reference ref_id="1217766" ref_url="https://bugzilla.suse.com/1217766" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-6377" ref_url="https://www.suse.com/security/cve/CVE-2023-6377/" source="CVE"/>
		<reference ref_id="CVE-2023-6478" ref_url="https://www.suse.com/security/cve/CVE-2023-6478/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017332.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2023-6377: Fixed Out-of-bounds memory write in XKB button actions(bsc#1217765).
- CVE-2023-6478: Fixed Out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (bsc#1217766).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2023-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217765">SUSE bug 1217765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217766">SUSE bug 1217766</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6377/">CVE-2023-6377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6377">CVE-2023-6377 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6478/">CVE-2023-6478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6478">CVE-2023-6478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816162" comment="xorg-x11-server-21.1.4-150500.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816163" comment="xorg-x11-server-Xvfb-21.1.4-150500.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816164" comment="xorg-x11-server-extra-21.1.4-150500.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816165" comment="xorg-x11-server-sdk-21.1.4-150500.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816166" comment="xorg-x11-server-source-21.1.4-150500.7.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4567" version="1" class="patch">
	<metadata>
		<title>Security update for xwayland (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217765" ref_url="https://bugzilla.suse.com/1217765" source="BUGZILLA"/>
		<reference ref_id="1217766" ref_url="https://bugzilla.suse.com/1217766" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-6377" ref_url="https://www.suse.com/security/cve/CVE-2023-6377/" source="CVE"/>
		<reference ref_id="CVE-2023-6478" ref_url="https://www.suse.com/security/cve/CVE-2023-6478/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017331.html" source="SUSE-SU"/>
		<description>
This update for xwayland fixes the following issues:

- CVE-2023-6377: Fixed Out-of-bounds memory write in XKB button actions(bsc#1217765).
- CVE-2023-6478: Fixed Out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (bsc#1217766).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-13"/>
	<updated date="2023-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217765">SUSE bug 1217765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217766">SUSE bug 1217766</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6377/">CVE-2023-6377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6377">CVE-2023-6377 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6478/">CVE-2023-6478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6478">CVE-2023-6478 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816167" comment="xwayland-22.1.5-150500.7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816168" comment="xwayland-devel-22.1.5-150500.7.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4568" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217844" ref_url="https://bugzilla.suse.com/1217844" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-42916" ref_url="https://www.suse.com/security/cve/CVE-2023-42916/" source="CVE"/>
		<reference ref_id="CVE-2023-42917" ref_url="https://www.suse.com/security/cve/CVE-2023-42917/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017365.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.42.3 (bsc#1217844):

- Fix flickering while playing videos with DMA-BUF sink.
- Fix color picker being triggered in the inspector when typing 'tan'.
- Do not special case the 'sans' font family name.
- Fix build failure with libxml2 version 2.12.0 due to an API change.
- Fix several crashes and rendering issues.
- Security fixes: CVE-2023-42916, CVE-2023-42917.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-14"/>
	<updated date="2023-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217844">SUSE bug 1217844</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-42916/">CVE-2023-42916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42916">CVE-2023-42916 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42917/">CVE-2023-42917 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42917">CVE-2023-42917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009815717" comment="WebKitGTK-4.0-lang-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815718" comment="WebKitGTK-4.1-lang-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815719" comment="WebKitGTK-6.0-lang-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815720" comment="libjavascriptcoregtk-4_0-18-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815721" comment="libjavascriptcoregtk-4_0-18-32bit-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815722" comment="libjavascriptcoregtk-4_1-0-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815723" comment="libjavascriptcoregtk-4_1-0-32bit-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815724" comment="libjavascriptcoregtk-6_0-1-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815725" comment="libwebkit2gtk-4_0-37-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815726" comment="libwebkit2gtk-4_0-37-32bit-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815727" comment="libwebkit2gtk-4_1-0-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815728" comment="libwebkit2gtk-4_1-0-32bit-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815729" comment="libwebkitgtk-6_0-4-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815730" comment="typelib-1_0-JavaScriptCore-4_0-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815731" comment="typelib-1_0-JavaScriptCore-4_1-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815732" comment="typelib-1_0-JavaScriptCore-6_0-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815733" comment="typelib-1_0-WebKit-6_0-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815734" comment="typelib-1_0-WebKit2-4_0-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815735" comment="typelib-1_0-WebKit2-4_1-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815736" comment="typelib-1_0-WebKit2WebExtension-4_0-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815737" comment="typelib-1_0-WebKit2WebExtension-4_1-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815738" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815739" comment="webkit-jsc-4-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815740" comment="webkit-jsc-4.1-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815741" comment="webkit-jsc-6.0-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815742" comment="webkit2gtk-4_0-injected-bundles-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815743" comment="webkit2gtk-4_1-injected-bundles-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815744" comment="webkit2gtk3-devel-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815745" comment="webkit2gtk3-minibrowser-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815746" comment="webkit2gtk3-soup2-devel-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815747" comment="webkit2gtk3-soup2-minibrowser-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815748" comment="webkit2gtk4-devel-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815749" comment="webkit2gtk4-minibrowser-2.42.3-150400.4.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815750" comment="webkitgtk-6_0-injected-bundles-2.42.3-150400.4.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4569" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217592" ref_url="https://bugzilla.suse.com/1217592" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-49083" ref_url="https://www.suse.com/security/cve/CVE-2023-49083/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017362.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2023-49083: Fixed a NULL pointer dereference when loading certificates from a PKCS#7 bundle (bsc#1217592).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-14"/>
	<updated date="2023-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1217592">SUSE bug 1217592</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49083/">CVE-2023-49083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49083">CVE-2023-49083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813785" comment="python311-cryptography-41.0.3-150400.16.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4570" version="1" class="patch">
	<metadata>
		<title>Security update for python3-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217592" ref_url="https://bugzilla.suse.com/1217592" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-49083" ref_url="https://www.suse.com/security/cve/CVE-2023-49083/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017361.html" source="SUSE-SU"/>
		<description>
This update for python3-cryptography fixes the following issues:

- CVE-2023-49083: Fixed a NULL pointer dereference when loading certificates from a PKCS#7 bundle (bsc#1217592).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-14"/>
	<updated date="2023-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1217592">SUSE bug 1217592</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49083/">CVE-2023-49083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49083">CVE-2023-49083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813786" comment="python3-cryptography-3.3.2-150400.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4571" version="1" class="patch">
	<metadata>
		<title>Security update for tracker-miners (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216199" ref_url="https://bugzilla.suse.com/1216199" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5557" ref_url="https://www.suse.com/security/cve/CVE-2023-5557/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017422.html" source="SUSE-SU"/>
		<description>
This update for tracker-miners fixes the following issues:

- CVE-2023-5557: Fixed a sandbox escape by adding seccomp rules and applying it to the whole process (bsc#1216199)
- rebuild against current ICU 73.
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-14"/>
	<updated date="2023-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216199">SUSE bug 1216199</bugzilla>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-5557/">CVE-2023-5557 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5557">CVE-2023-5557 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009815947" comment="tracker-miner-files-3.2.2-150400.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815948" comment="tracker-miners-3.2.2-150400.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815949" comment="tracker-miners-lang-3.2.2-150400.3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4572" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1199483" ref_url="https://bugzilla.suse.com/1199483" source="BUGZILLA"/>
		<reference ref_id="1210231" ref_url="https://bugzilla.suse.com/1210231" source="BUGZILLA"/>
		<reference ref_id="1211478" ref_url="https://bugzilla.suse.com/1211478" source="BUGZILLA"/>
		<reference ref_id="1212398" ref_url="https://bugzilla.suse.com/1212398" source="BUGZILLA"/>
		<reference ref_id="1214680" ref_url="https://bugzilla.suse.com/1214680" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1622" ref_url="https://www.suse.com/security/cve/CVE-2022-1622/" source="CVE"/>
		<reference ref_id="CVE-2022-40090" ref_url="https://www.suse.com/security/cve/CVE-2022-40090/" source="CVE"/>
		<reference ref_id="CVE-2023-1916" ref_url="https://www.suse.com/security/cve/CVE-2023-1916/" source="CVE"/>
		<reference ref_id="CVE-2023-26965" ref_url="https://www.suse.com/security/cve/CVE-2023-26965/" source="CVE"/>
		<reference ref_id="CVE-2023-2731" ref_url="https://www.suse.com/security/cve/CVE-2023-2731/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017421.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2023-2731: Fix null pointer deference in LZWDecode() (bsc#1211478).
- CVE-2023-1916: Fix out-of-bounds read in extractImageSection() (bsc#1210231).
- CVE-2023-26965: Fix heap-based use after free in loadImage() (bsc#1212398).
- CVE-2022-40090: Fix infinite loop in TIFFReadDirectory() (bsc#1214680).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-14"/>
	<updated date="2023-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199483">SUSE bug 1199483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210231">SUSE bug 1210231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211478">SUSE bug 1211478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212398">SUSE bug 1212398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214680">SUSE bug 1214680</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1622/">CVE-2022-1622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1622">CVE-2022-1622 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40090/">CVE-2022-40090 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40090">CVE-2022-40090 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1916/">CVE-2023-1916 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1916">CVE-2023-1916 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26965/">CVE-2023-26965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26965">CVE-2023-26965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2731/">CVE-2023-2731 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2731">CVE-2023-2731 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009815409" comment="libtiff-devel-4.0.9-150000.45.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815410" comment="libtiff-devel-32bit-4.0.9-150000.45.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815411" comment="libtiff5-4.0.9-150000.45.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815412" comment="libtiff5-32bit-4.0.9-150000.45.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815413" comment="tiff-4.0.9-150000.45.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4573" version="1" class="patch">
	<metadata>
		<title>Security update for cosign (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216933" ref_url="https://bugzilla.suse.com/1216933" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46737" ref_url="https://www.suse.com/security/cve/CVE-2023-46737/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017420.html" source="SUSE-SU"/>
		<description>
This update for cosign fixes the following issues:

Updated to 2.2.1 (jsc#SLE-23879)

- Enhancements:
  * CVE-2023-46737: Possible endless data attack from attacker-controlled registry (bsc#1216933)
  * feat: Support basic auth and bearer auth login to registry (#3310)
  * add support for ignoring certificates with pkcs11 (#3334)
  * Support ReplaceOp in Signatures (#3315)
  * feat: added ability to get image digest back via triangulate (#3255)
  * feat: add `--only` flag in `cosign copy` to copy sign, att &amp; sbom (#3247)
  * feat: add support attaching a Rekor bundle to a container (#3246)
  * feat: add support outputting rekor response on signing (#3248)
  * feat: improve dockerfile verify subcommand (#3264)
  * Add guard flag for experimental OCI 1.1 verify. (#3272)
  * Deprecate SBOM attachments (#3256)
  * feat: dedent line in cosign copy doc (#3244)
  * feat: add platform flag to cosign copy command (#3234)
  * Add SLSA 1.0 attestation support to cosign. Closes #2860 (#3219)
  * attest: pass OCI remote opts to att resolver. (#3225)
- Bug Fixes:
  * Merge pull request from GHSA-vfp6-jrw2-99g9
  * fix: allow cosign download sbom when image is absent (#3245)
  * ci: add a OCI registry test for referrers support (#3253)
  * Fix ReplaceSignatures (#3292)
  * Stop using deprecated in_toto.ProvenanceStatement (#3243)
  * Fixes #3236, disable SCT checking for a cosign verification when using .. (#3237)
  * fix: update error in `SignedEntity` to be more descriptive (#3233)
  * Fail timestamp verification if no root is provided (#3224)
- Documentation:
  * Add some docs about verifying in an air-gapped environment (#3321)
  * Update CONTRIBUTING.md (#3268)
  * docs: improves the Contribution guidelines (#3257)
  * Remove security policy (#3230)
- Others:
  * Set go to min 1.21 and update dependencies  (#3327)
  * Update contact for code of conduct (#3266)
  * Update .ko.yaml (#3240)


Updated to 2.2.0 (jsc#SLE-23879)

- Enhancements
  * switch to uploading DSSE types to rekor instead of intoto (#3113)
  * add 'cosign sign' command-line parameters for mTLS (#3052)
  * improve error messages around bundle != payload hash (#3146)
  * make VerifyImageAttestation function public (#3156)
  * Switch to cryptoutils function for SANS (#3185)
  * Handle HTTP_1_1_REQUIRED errors in github provider (#3172)
- Bug Fixes
  * Fix nondeterminsitic timestamps (#3121)
- Documentation
  * doc: Add example of sign-blob with key in env var (#3152)
  * add deprecation notice for cosign-releases GCS bucket (#3148)
  * update doc links (#3186)


Updated to 2.1.1 (jsc#SLE-23879)

- Bug Fixes
  * wait for the workers become available again to continue the execution (#3084)
  * fix help text when in a container (#3082)


Updated to 2.1.0 (jsc#SLE-23879)

- Breaking Change: The predicate is now a required flag in the attest commands, set via the --type flag.
- Enhancements
  * Verify sigs and attestations in parallel (#3066)
  * Deep inspect attestations when filtering download (#3031)
  * refactor bundle validation code, add support for DSSE rekor type (#3016)
  * Allow overriding remote options (#3049)
  * feat: adds no cert found on sig exit code (#3038)
  * Make predicate a required flag in attest commands (#3033)
  * Added support for attaching Time stamp authority Response in attach command (#3001)
  * Add sign --sign-container-identity CLI (#2984)
  * Feature: Allow cosign to sign digests before they are uploaded. (#2959)
  * accepts attachment-tag-prefix for cosign copy (#3014)
  * Feature: adds '--allow-insecure-registry' for cosign load (#3000)
  * download attestation: support --platform flag (#2980)
  * Cleanup: Add Digest to the SignedEntity interface. (#2960)
  * verify command: support keyless verification using only a provided certificate chain with non-fulcio roots (#2845)
  * verify: use workers to limit the paralellism when verifying images with --max-workers flag (#3069)
- Bug Fixes
  * Fix pkg/cosign/errors (#3050)
  * Fix: update doc to refer to github-actions oidc provider (#3040)
  * Fix: prefer GitHub OIDC provider if enabled (#3044)
  * Fix --sig-only in cosign copy (#3074)
- Documentation
  * Fix links to sigstore/docs in markdown files (#3064)


Update to 2.0.2 (jsc#SLE-23879)

  - Enhancements
    * Update sigstore/sigstore to v1.6.2 to pick up TUF CDN change (#2891)
    * feat: Make cosign copy faster (#2901)
    * remove sget (#2885)
    * Require a payload to be provided with a signature (#2785)
  - Bug Fixes
    * cmd: Change error message from KeyParseError to PubKeyParseError for verify-blob. (#2876)
    * Use SOURCE_DATE_EPOCH for OCI CreatedAt times (#2878)
  - Documentation
    * Remove experimental warning from Fulcio flags (#2923)
    * add missing oidc provider (#2922)
    * Add zot as a supported registry (#2920)
    * deprecates kms_support docs (#2900)
    * chore(docs) deprecate note for usage docs (#2906)
    * adds note of deprecation for examples.md docs (#2899)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-14"/>
	<updated date="2023-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216933">SUSE bug 1216933</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-46737/">CVE-2023-46737 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46737">CVE-2023-46737 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809860" comment="cosign-2.2.1-150400.3.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4574" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1201384" ref_url="https://bugzilla.suse.com/1201384" source="BUGZILLA"/>
		<reference ref_id="1218014" ref_url="https://bugzilla.suse.com/1218014" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-50495" ref_url="https://www.suse.com/security/cve/CVE-2023-50495/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017440.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

- CVE-2023-50495: Fixed a segmentation fault via _nc_wrap_entry() (bsc#1218014)
- Modify reset command to avoid altering clocal if the terminal uses a modem (bsc#1201384)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-18"/>
	<updated date="2023-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1201384">SUSE bug 1201384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218014">SUSE bug 1218014</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50495/">CVE-2023-50495 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50495">CVE-2023-50495 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816148" comment="libncurses5-6.1-150000.5.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816149" comment="libncurses5-32bit-6.1-150000.5.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816150" comment="libncurses6-6.1-150000.5.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816151" comment="libncurses6-32bit-6.1-150000.5.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816152" comment="ncurses-devel-6.1-150000.5.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816153" comment="ncurses-devel-32bit-6.1-150000.5.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816154" comment="ncurses-utils-6.1-150000.5.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816155" comment="ncurses5-devel-6.1-150000.5.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816156" comment="ncurses5-devel-32bit-6.1-150000.5.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816157" comment="tack-6.1-150000.5.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816158" comment="terminfo-6.1-150000.5.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816159" comment="terminfo-base-6.1-150000.5.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816160" comment="terminfo-iterm-6.1-150000.5.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816161" comment="terminfo-screen-6.1-150000.5.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4575" version="1" class="patch">
	<metadata>
		<title>Security update for freerdp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214856" ref_url="https://bugzilla.suse.com/1214856" source="BUGZILLA"/>
		<reference ref_id="1214857" ref_url="https://bugzilla.suse.com/1214857" source="BUGZILLA"/>
		<reference ref_id="1214858" ref_url="https://bugzilla.suse.com/1214858" source="BUGZILLA"/>
		<reference ref_id="1214859" ref_url="https://bugzilla.suse.com/1214859" source="BUGZILLA"/>
		<reference ref_id="1214860" ref_url="https://bugzilla.suse.com/1214860" source="BUGZILLA"/>
		<reference ref_id="1214862" ref_url="https://bugzilla.suse.com/1214862" source="BUGZILLA"/>
		<reference ref_id="1214863" ref_url="https://bugzilla.suse.com/1214863" source="BUGZILLA"/>
		<reference ref_id="1214864" ref_url="https://bugzilla.suse.com/1214864" source="BUGZILLA"/>
		<reference ref_id="1214866" ref_url="https://bugzilla.suse.com/1214866" source="BUGZILLA"/>
		<reference ref_id="1214867" ref_url="https://bugzilla.suse.com/1214867" source="BUGZILLA"/>
		<reference ref_id="1214868" ref_url="https://bugzilla.suse.com/1214868" source="BUGZILLA"/>
		<reference ref_id="1214869" ref_url="https://bugzilla.suse.com/1214869" source="BUGZILLA"/>
		<reference ref_id="1214870" ref_url="https://bugzilla.suse.com/1214870" source="BUGZILLA"/>
		<reference ref_id="1214871" ref_url="https://bugzilla.suse.com/1214871" source="BUGZILLA"/>
		<reference ref_id="1214872" ref_url="https://bugzilla.suse.com/1214872" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39350" ref_url="https://www.suse.com/security/cve/CVE-2023-39350/" source="CVE"/>
		<reference ref_id="CVE-2023-39351" ref_url="https://www.suse.com/security/cve/CVE-2023-39351/" source="CVE"/>
		<reference ref_id="CVE-2023-39352" ref_url="https://www.suse.com/security/cve/CVE-2023-39352/" source="CVE"/>
		<reference ref_id="CVE-2023-39353" ref_url="https://www.suse.com/security/cve/CVE-2023-39353/" source="CVE"/>
		<reference ref_id="CVE-2023-39354" ref_url="https://www.suse.com/security/cve/CVE-2023-39354/" source="CVE"/>
		<reference ref_id="CVE-2023-39356" ref_url="https://www.suse.com/security/cve/CVE-2023-39356/" source="CVE"/>
		<reference ref_id="CVE-2023-40181" ref_url="https://www.suse.com/security/cve/CVE-2023-40181/" source="CVE"/>
		<reference ref_id="CVE-2023-40186" ref_url="https://www.suse.com/security/cve/CVE-2023-40186/" source="CVE"/>
		<reference ref_id="CVE-2023-40188" ref_url="https://www.suse.com/security/cve/CVE-2023-40188/" source="CVE"/>
		<reference ref_id="CVE-2023-40567" ref_url="https://www.suse.com/security/cve/CVE-2023-40567/" source="CVE"/>
		<reference ref_id="CVE-2023-40569" ref_url="https://www.suse.com/security/cve/CVE-2023-40569/" source="CVE"/>
		<reference ref_id="CVE-2023-40574" ref_url="https://www.suse.com/security/cve/CVE-2023-40574/" source="CVE"/>
		<reference ref_id="CVE-2023-40575" ref_url="https://www.suse.com/security/cve/CVE-2023-40575/" source="CVE"/>
		<reference ref_id="CVE-2023-40576" ref_url="https://www.suse.com/security/cve/CVE-2023-40576/" source="CVE"/>
		<reference ref_id="CVE-2023-40589" ref_url="https://www.suse.com/security/cve/CVE-2023-40589/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017438.html" source="SUSE-SU"/>
		<description>
This update for freerdp fixes the following issues:

- CVE-2023-39350: Fixed incorrect offset calculation leading to DoS (bsc#1214856).
- CVE-2023-39351: Fixed Null Pointer Dereference leading DoS in RemoteFX (bsc#1214857).
- CVE-2023-39352: Fixed Invalid offset validation leading to Out Of Bound Write (bsc#1214858).
- CVE-2023-39353: Fixed Missing offset validation leading to Out Of Bound Read (bsc#1214859).
- CVE-2023-39354: Fixed Out-Of-Bounds Read in nsc_rle_decompress_data (bsc#1214860).
- CVE-2023-39356: Fixed Missing offset validation leading to Out-of-Bounds Read in gdi_multi_opaque_rect (bsc#1214862).
- CVE-2023-40181: Fixed Integer-Underflow leading to Out-Of-Bound Read in zgfx_decompress_segment (bsc#1214863).
- CVE-2023-40186: Fixed IntegerOverflow leading to Out-Of-Bound Write Vulnerability in gdi_CreateSurface (bsc#1214864).
- CVE-2023-40188: Fixed Out-Of-Bounds Read in general_LumaToYUV444 (bsc#1214866).
- CVE-2023-40567: Fixed Out-Of-Bounds Write in clear_decompress_bands_data (bsc#1214867).
- CVE-2023-40569: Fixed Out-Of-Bounds Write in progressive_decompress (bsc#1214868).
- CVE-2023-40574: Fixed Out-Of-Bounds Write in general_YUV444ToRGB_8u_P3AC4R_BGRX (bsc#1214869).
- CVE-2023-40575: Fixed Out-Of-Bounds Read in general_YUV444ToRGB_8u_P3AC4R_BGRX (bsc#1214870).
- CVE-2023-40576: Fixed Out-Of-Bounds Read in RleDecompress (bsc#1214871).
- CVE-2023-40589: Fixed Global-Buffer-Overflow in ncrush_decompress (bsc#1214872).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-18"/>
	<updated date="2023-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214856">SUSE bug 1214856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214857">SUSE bug 1214857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214858">SUSE bug 1214858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214859">SUSE bug 1214859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214860">SUSE bug 1214860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214862">SUSE bug 1214862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214863">SUSE bug 1214863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214864">SUSE bug 1214864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214866">SUSE bug 1214866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214867">SUSE bug 1214867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214868">SUSE bug 1214868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214869">SUSE bug 1214869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214870">SUSE bug 1214870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214871">SUSE bug 1214871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214872">SUSE bug 1214872</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39350/">CVE-2023-39350 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39350">CVE-2023-39350 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39351/">CVE-2023-39351 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39351">CVE-2023-39351 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39352/">CVE-2023-39352 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39352">CVE-2023-39352 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39353/">CVE-2023-39353 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39353">CVE-2023-39353 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39354/">CVE-2023-39354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39354">CVE-2023-39354 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39356/">CVE-2023-39356 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39356">CVE-2023-39356 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40181/">CVE-2023-40181 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40181">CVE-2023-40181 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-40186/">CVE-2023-40186 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40186">CVE-2023-40186 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40188/">CVE-2023-40188 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40188">CVE-2023-40188 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-40567/">CVE-2023-40567 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40567">CVE-2023-40567 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-40569/">CVE-2023-40569 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40569">CVE-2023-40569 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-40574/">CVE-2023-40574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40574">CVE-2023-40574 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40575/">CVE-2023-40575 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40575">CVE-2023-40575 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40576/">CVE-2023-40576 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40576">CVE-2023-40576 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40589/">CVE-2023-40589 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40589">CVE-2023-40589 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009810845" comment="freerdp-2.4.0-150400.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810846" comment="freerdp-devel-2.4.0-150400.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810847" comment="freerdp-proxy-2.4.0-150400.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810848" comment="freerdp-server-2.4.0-150400.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810849" comment="freerdp-wayland-2.4.0-150400.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810850" comment="libfreerdp2-2.4.0-150400.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810851" comment="libuwac0-0-2.4.0-150400.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810852" comment="libwinpr2-2.4.0-150400.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810853" comment="uwac0-0-devel-2.4.0-150400.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009810854" comment="winpr2-devel-2.4.0-150400.3.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4576" version="1" class="patch">
	<metadata>
		<title>Security update for libsass (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214573" ref_url="https://bugzilla.suse.com/1214573" source="BUGZILLA"/>
		<reference ref_id="1214575" ref_url="https://bugzilla.suse.com/1214575" source="BUGZILLA"/>
		<reference ref_id="1214576" ref_url="https://bugzilla.suse.com/1214576" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26592" ref_url="https://www.suse.com/security/cve/CVE-2022-26592/" source="CVE"/>
		<reference ref_id="CVE-2022-43357" ref_url="https://www.suse.com/security/cve/CVE-2022-43357/" source="CVE"/>
		<reference ref_id="CVE-2022-43358" ref_url="https://www.suse.com/security/cve/CVE-2022-43358/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017441.html" source="SUSE-SU"/>
		<description>
This update for libsass fixes the following issues:

- CVE-2022-26592: Fixed Stack Overflow vulnerability in libsass 3.6.5 via the CompoundSelector:has_real_parent_ref function (bsc#1214576)
- CVE-2022-43358: Fixed Stack overflow vulnerability in ast_selectors.cpp (bsc#1214575).
- CVE-2022-43357: Fixed Stack overflow vulnerability in ast_selectors.cpp (bsc#1214573).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-18"/>
	<updated date="2023-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214573">SUSE bug 1214573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214575">SUSE bug 1214575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214576">SUSE bug 1214576</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-26592/">CVE-2022-26592 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26592">CVE-2022-26592 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-43357/">CVE-2022-43357 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43357">CVE-2022-43357 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-43358/">CVE-2022-43358 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43358">CVE-2022-43358 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816746" comment="libsass-3_6_5-1-3.6.5-150200.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816747" comment="libsass-devel-3.6.5-150200.4.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4577" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216853" ref_url="https://bugzilla.suse.com/1216853" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38472" ref_url="https://www.suse.com/security/cve/CVE-2023-38472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017448.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2023-38472: Fixed reachable assertion in avahi_rdata_parse (bsc#1216853).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-19"/>
	<updated date="2023-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216853">SUSE bug 1216853</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38472/">CVE-2023-38472 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38472">CVE-2023-38472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009814835" comment="avahi-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814836" comment="avahi-autoipd-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814837" comment="avahi-compat-howl-devel-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814838" comment="avahi-compat-mDNSResponder-devel-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814839" comment="avahi-lang-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814840" comment="avahi-utils-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814841" comment="avahi-utils-gtk-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814842" comment="libavahi-client3-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814843" comment="libavahi-client3-32bit-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814844" comment="libavahi-common3-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814845" comment="libavahi-common3-32bit-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814846" comment="libavahi-core7-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814847" comment="libavahi-devel-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814848" comment="libavahi-glib-devel-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814849" comment="libavahi-glib1-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814850" comment="libavahi-glib1-32bit-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814851" comment="libavahi-gobject-devel-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814852" comment="libavahi-gobject0-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814853" comment="libavahi-libevent1-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814854" comment="libavahi-qt5-1-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814855" comment="libavahi-qt5-devel-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814856" comment="libavahi-ui-gtk3-0-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814857" comment="libdns_sd-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814858" comment="libdns_sd-32bit-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814859" comment="libhowl0-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814860" comment="python3-avahi-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814861" comment="python3-avahi-gtk-0.8-150400.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814862" comment="typelib-1_0-Avahi-0_6-0.8-150400.7.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4578" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214788" ref_url="https://bugzilla.suse.com/1214788" source="BUGZILLA"/>
		<reference ref_id="1217950" ref_url="https://bugzilla.suse.com/1217950" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017494.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity (bsc#1217950).

the following non-security bug was fixed:

- Fix the 'no route to host' error when connecting via ProxyJump
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-19"/>
	<updated date="2023-12-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214788">SUSE bug 1214788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217950">SUSE bug 1217950</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816827" comment="openssh-8.4p1-150300.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816828" comment="openssh-askpass-gnome-8.4p1-150300.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816829" comment="openssh-cavs-8.4p1-150300.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816830" comment="openssh-clients-8.4p1-150300.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816831" comment="openssh-common-8.4p1-150300.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816832" comment="openssh-fips-8.4p1-150300.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816833" comment="openssh-helpers-8.4p1-150300.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816834" comment="openssh-server-8.4p1-150300.3.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4579" version="1" class="patch">
	<metadata>
		<title>Security update for python-aiohttp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217174" ref_url="https://bugzilla.suse.com/1217174" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-47641" ref_url="https://www.suse.com/security/cve/CVE-2023-47641/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017488.html" source="SUSE-SU"/>
		<description>
This update for python-aiohttp fixes the following issues:

- CVE-2023-47641: Fixed inconsistent interpretation of the http protocol, if 
      content-length and transport-encoding are in the same header with
      transport-encoding value of 'chunked*' (bsc#1217174)
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-19"/>
	<updated date="2023-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1217174">SUSE bug 1217174</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-47641/">CVE-2023-47641 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47641">CVE-2023-47641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009812203" comment="python-aiohttp-doc-3.6.0-150100.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812204" comment="python3-aiohttp-3.6.0-150100.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4580" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217871" ref_url="https://bugzilla.suse.com/1217871" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46751" ref_url="https://www.suse.com/security/cve/CVE-2023-46751/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017498.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2023-46751: Fixed dangling pointer in gdev_prn_open_printer_seekable() (bsc#1217871).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-20"/>
	<updated date="2023-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217871">SUSE bug 1217871</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46751/">CVE-2023-46751 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46751">CVE-2023-46751 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009815955" comment="ghostscript-9.52-150000.177.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815956" comment="ghostscript-devel-9.52-150000.177.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815957" comment="ghostscript-x11-9.52-150000.177.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4581" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217765" ref_url="https://bugzilla.suse.com/1217765" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-6377" ref_url="https://www.suse.com/security/cve/CVE-2023-6377/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017496.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2023-6377: Fixed out-of-bounds memory write in XKB button actions (bsc#1217765).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-20"/>
	<updated date="2023-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217765">SUSE bug 1217765</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6377/">CVE-2023-6377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6377">CVE-2023-6377 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816493" comment="xorg-x11-server-21.1.4-150500.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816494" comment="xorg-x11-server-Xvfb-21.1.4-150500.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816495" comment="xorg-x11-server-extra-21.1.4-150500.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816496" comment="xorg-x11-server-sdk-21.1.4-150500.7.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816497" comment="xorg-x11-server-source-21.1.4-150500.7.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4582" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217230" ref_url="https://bugzilla.suse.com/1217230" source="BUGZILLA"/>
		<reference ref_id="1217974" ref_url="https://bugzilla.suse.com/1217974" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-6204" ref_url="https://www.suse.com/security/cve/CVE-2023-6204/" source="CVE"/>
		<reference ref_id="CVE-2023-6205" ref_url="https://www.suse.com/security/cve/CVE-2023-6205/" source="CVE"/>
		<reference ref_id="CVE-2023-6206" ref_url="https://www.suse.com/security/cve/CVE-2023-6206/" source="CVE"/>
		<reference ref_id="CVE-2023-6207" ref_url="https://www.suse.com/security/cve/CVE-2023-6207/" source="CVE"/>
		<reference ref_id="CVE-2023-6208" ref_url="https://www.suse.com/security/cve/CVE-2023-6208/" source="CVE"/>
		<reference ref_id="CVE-2023-6209" ref_url="https://www.suse.com/security/cve/CVE-2023-6209/" source="CVE"/>
		<reference ref_id="CVE-2023-6212" ref_url="https://www.suse.com/security/cve/CVE-2023-6212/" source="CVE"/>
		<reference ref_id="CVE-2023-6856" ref_url="https://www.suse.com/security/cve/CVE-2023-6856/" source="CVE"/>
		<reference ref_id="CVE-2023-6857" ref_url="https://www.suse.com/security/cve/CVE-2023-6857/" source="CVE"/>
		<reference ref_id="CVE-2023-6858" ref_url="https://www.suse.com/security/cve/CVE-2023-6858/" source="CVE"/>
		<reference ref_id="CVE-2023-6859" ref_url="https://www.suse.com/security/cve/CVE-2023-6859/" source="CVE"/>
		<reference ref_id="CVE-2023-6860" ref_url="https://www.suse.com/security/cve/CVE-2023-6860/" source="CVE"/>
		<reference ref_id="CVE-2023-6861" ref_url="https://www.suse.com/security/cve/CVE-2023-6861/" source="CVE"/>
		<reference ref_id="CVE-2023-6862" ref_url="https://www.suse.com/security/cve/CVE-2023-6862/" source="CVE"/>
		<reference ref_id="CVE-2023-6863" ref_url="https://www.suse.com/security/cve/CVE-2023-6863/" source="CVE"/>
		<reference ref_id="CVE-2023-6864" ref_url="https://www.suse.com/security/cve/CVE-2023-6864/" source="CVE"/>
		<reference ref_id="CVE-2023-6865" ref_url="https://www.suse.com/security/cve/CVE-2023-6865/" source="CVE"/>
		<reference ref_id="CVE-2023-6867" ref_url="https://www.suse.com/security/cve/CVE-2023-6867/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 115.6.0 ESR changelog-entry (bsc#1217974).
  * CVE-2023-6856: Heap-buffer-overflow affecting WebGL  DrawElementsInstanced method with Mesa VM driver (bmo#1843782).
  * CVE-2023-6857: Symlinks may resolve to smaller than expected buffers (bmo#1796023).
  * CVE-2023-6858: Heap buffer overflow in nsTextFragment (bmo#1826791).
  * CVE-2023-6859: Use-after-free in PR_GetIdentitiesLayer (bmo#1840144).
  * CVE-2023-6860: Potential sandbox escape due to VideoBridge lack of texture validation (bmo#1854669).
  * CVE-2023-6861: Heap buffer overflow affected nsWindow::PickerOpen(void) in headless mode (bmo#1864118).
  * CVE-2023-6862: Use-after-free in nsDNSService (bsc#1868042).
  * CVE-2023-6863: Undefined behavior in ShutdownObserver() (bmo#1868901).
  * CVE-2023-6864: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6.
  * CVE-2023-6865: Potential exposure of uninitialized data in EncryptingOutputStream (bmo#1864123).
  * CVE-2023-6867: Clickjacking permission prompts using the popup transition (bmo#1863863).
    
    
- Fixed: Various security fixes and other quality improvements MFSA 2023-50 (bsc#1217230)
  * CVE-2023-6204 (bmo#1841050)
    Out-of-bound memory access in WebGL2 blitFramebuffer
  * CVE-2023-6205 (bmo#1854076)
    Use-after-free in MessagePort::Entangled
  * CVE-2023-6206 (bmo#1857430)
    Clickjacking permission prompts using the fullscreen
    transition
  * CVE-2023-6207 (bmo#1861344)
    Use-after-free in ReadableByteStreamQueueEntry::Buffer
  * CVE-2023-6208 (bmo#1855345)
    Using Selection API would copy contents into X11 primary
    selection.
  * CVE-2023-6209 (bmo#1858570)
    Incorrect parsing of relative URLs starting with '///'
  * CVE-2023-6212 (bmo#1658432, bmo#1820983, bmo#1829252,
    bmo#1856072, bmo#1856091, bmo#1859030, bmo#1860943,
    bmo#1862782)
    Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5,
    and Thunderbird 115.5		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-20"/>
	<updated date="2023-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217230">SUSE bug 1217230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6204/">CVE-2023-6204 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6204">CVE-2023-6204 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6205/">CVE-2023-6205 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6205">CVE-2023-6205 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6206/">CVE-2023-6206 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6206">CVE-2023-6206 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6207/">CVE-2023-6207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6207">CVE-2023-6207 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6208/">CVE-2023-6208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6208">CVE-2023-6208 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6209/">CVE-2023-6209 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6209">CVE-2023-6209 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6212/">CVE-2023-6212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6212">CVE-2023-6212 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6856/">CVE-2023-6856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6856">CVE-2023-6856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6857/">CVE-2023-6857 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6857">CVE-2023-6857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6858/">CVE-2023-6858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6858">CVE-2023-6858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6859/">CVE-2023-6859 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6859">CVE-2023-6859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6860/">CVE-2023-6860 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6860">CVE-2023-6860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6861/">CVE-2023-6861 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6861">CVE-2023-6861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6862/">CVE-2023-6862 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6862">CVE-2023-6862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6863/">CVE-2023-6863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6863">CVE-2023-6863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6864/">CVE-2023-6864 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6864">CVE-2023-6864 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6865/">CVE-2023-6865 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6865">CVE-2023-6865 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6867/">CVE-2023-6867 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6867">CVE-2023-6867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816835" comment="MozillaFirefox-115.6.0-150200.152.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816836" comment="MozillaFirefox-branding-upstream-115.6.0-150200.152.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816837" comment="MozillaFirefox-devel-115.6.0-150200.152.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816838" comment="MozillaFirefox-translations-common-115.6.0-150200.152.120.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816839" comment="MozillaFirefox-translations-other-115.6.0-150200.152.120.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4583" version="1" class="patch">
	<metadata>
		<title>Security update for go1.20-openssl (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206346" ref_url="https://bugzilla.suse.com/1206346" source="BUGZILLA"/>
		<reference ref_id="1216943" ref_url="https://bugzilla.suse.com/1216943" source="BUGZILLA"/>
		<reference ref_id="1217833" ref_url="https://bugzilla.suse.com/1217833" source="BUGZILLA"/>
		<reference ref_id="1217834" ref_url="https://bugzilla.suse.com/1217834" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39326" ref_url="https://www.suse.com/security/cve/CVE-2023-39326/" source="CVE"/>
		<reference ref_id="CVE-2023-45284" ref_url="https://www.suse.com/security/cve/CVE-2023-45284/" source="CVE"/>
		<reference ref_id="CVE-2023-45285" ref_url="https://www.suse.com/security/cve/CVE-2023-45285/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017504.html" source="SUSE-SU"/>
		<description>
This update for go1.20-openssl fixes the following issues:

Update to version 1.20.12.1:

- CVE-2023-45285: cmd/go: git VCS qualifier in module path uses git:// scheme (bsc#1217834).
- CVE-2023-45284: path/filepath: Clean removes ending slash for volume on Windows in Go 1.21.4 (bsc#1216943).
- CVE-2023-39326: net/http: limit chunked data overhead (bsc#1217833).
- cmd/compile: internal compiler error: panic during prove while compiling: unexpected induction with too many parents
- cmd/go: TestScript/mod_get_direct fails with 'Filename too long' on Windows
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-20"/>
	<updated date="2023-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1206346">SUSE bug 1206346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216943">SUSE bug 1216943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217833">SUSE bug 1217833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217834">SUSE bug 1217834</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39326/">CVE-2023-39326 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39326">CVE-2023-39326 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45284/">CVE-2023-45284 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45284">CVE-2023-45284 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-45285/">CVE-2023-45285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816498" comment="go1.20-openssl-1.20.12.1-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816499" comment="go1.20-openssl-doc-1.20.12.1-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816500" comment="go1.20-openssl-race-1.20.12.1-150000.1.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4584" version="1" class="patch">
	<metadata>
		<title>Security update for go1.21-openssl (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="1216943" ref_url="https://bugzilla.suse.com/1216943" source="BUGZILLA"/>
		<reference ref_id="1217833" ref_url="https://bugzilla.suse.com/1217833" source="BUGZILLA"/>
		<reference ref_id="1217834" ref_url="https://bugzilla.suse.com/1217834" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39326" ref_url="https://www.suse.com/security/cve/CVE-2023-39326/" source="CVE"/>
		<reference ref_id="CVE-2023-45284" ref_url="https://www.suse.com/security/cve/CVE-2023-45284/" source="CVE"/>
		<reference ref_id="CVE-2023-45285" ref_url="https://www.suse.com/security/cve/CVE-2023-45285/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017503.html" source="SUSE-SU"/>
		<description>
This update for go1.21-openssl fixes the following issues:

Update to version 1.21.5.1:

- CVE-2023-45285: cmd/go: git VCS qualifier in module path uses git:// scheme (bsc#1217834).
- CVE-2023-45284: path/filepath: Clean removes ending slash for volume on Windows in Go 1.21.4 (bsc#1216943).
- CVE-2023-39326: net/http: limit chunked data overhead (bsc#1217833).
- cmd/go: go mod download needs to support toolchain upgrades
- cmd/compile: invalid pointer found on stack when compiled with -race
- os: NTFS deduped file changed from regular to irregular
- net: TCPConn.ReadFrom hangs when io.Reader is TCPConn or UnixConn, Linux kernel &lt; 5.1
- cmd/compile: internal compiler error: panic during prove while compiling: unexpected induction with too many parents
- syscall: TestOpenFileLimit unintentionally runs on non-Unix platforms
- runtime: self-deadlock on mheap_.lock
- crypto/rand: Legacy RtlGenRandom use on Windows
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-20"/>
	<updated date="2023-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216943">SUSE bug 1216943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217833">SUSE bug 1217833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217834">SUSE bug 1217834</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39326/">CVE-2023-39326 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39326">CVE-2023-39326 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45284/">CVE-2023-45284 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45284">CVE-2023-45284 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-45285/">CVE-2023-45285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816501" comment="go1.21-openssl-1.21.5.1-150000.1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816502" comment="go1.21-openssl-doc-1.21.5.1-150000.1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816503" comment="go1.21-openssl-race-1.21.5.1-150000.1.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4585" version="1" class="patch">
	<metadata>
		<title>Security update for libreoffice (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217577" ref_url="https://bugzilla.suse.com/1217577" source="BUGZILLA"/>
		<reference ref_id="1217578" ref_url="https://bugzilla.suse.com/1217578" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-6185" ref_url="https://www.suse.com/security/cve/CVE-2023-6185/" source="CVE"/>
		<reference ref_id="CVE-2023-6186" ref_url="https://www.suse.com/security/cve/CVE-2023-6186/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017502.html" source="SUSE-SU"/>
		<description>
This update for libreoffice fixes the following issues:

- CVE-2023-6186: Fixed link targets allow arbitrary script execution (bsc#1217578).
- CVE-2023-6185: Fixed Improper input validation enabling arbitrary Gstreamer pipeline injection (bsc#1217577).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-20"/>
	<updated date="2023-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217577">SUSE bug 1217577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217578">SUSE bug 1217578</bugzilla>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6185/">CVE-2023-6185 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6185">CVE-2023-6185 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6186/">CVE-2023-6186 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6186">CVE-2023-6186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009817537" comment="libreoffice-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817538" comment="libreoffice-base-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817539" comment="libreoffice-base-drivers-postgresql-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817540" comment="libreoffice-branding-upstream-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817541" comment="libreoffice-calc-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817542" comment="libreoffice-calc-extensions-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817543" comment="libreoffice-draw-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817544" comment="libreoffice-filters-optional-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817545" comment="libreoffice-gdb-pretty-printers-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817546" comment="libreoffice-glade-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817547" comment="libreoffice-gnome-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817548" comment="libreoffice-gtk3-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817549" comment="libreoffice-icon-themes-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817550" comment="libreoffice-impress-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817551" comment="libreoffice-l10n-af-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817552" comment="libreoffice-l10n-am-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817553" comment="libreoffice-l10n-ar-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817554" comment="libreoffice-l10n-as-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817555" comment="libreoffice-l10n-ast-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817556" comment="libreoffice-l10n-be-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817557" comment="libreoffice-l10n-bg-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817558" comment="libreoffice-l10n-bn-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817559" comment="libreoffice-l10n-bn_IN-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817560" comment="libreoffice-l10n-bo-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817561" comment="libreoffice-l10n-br-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817562" comment="libreoffice-l10n-brx-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817563" comment="libreoffice-l10n-bs-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817564" comment="libreoffice-l10n-ca-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817565" comment="libreoffice-l10n-ca_valencia-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817566" comment="libreoffice-l10n-ckb-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817567" comment="libreoffice-l10n-cs-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817568" comment="libreoffice-l10n-cy-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817569" comment="libreoffice-l10n-da-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817570" comment="libreoffice-l10n-de-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817571" comment="libreoffice-l10n-dgo-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817572" comment="libreoffice-l10n-dsb-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817573" comment="libreoffice-l10n-dz-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817574" comment="libreoffice-l10n-el-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817575" comment="libreoffice-l10n-en-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817576" comment="libreoffice-l10n-en_GB-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817577" comment="libreoffice-l10n-en_ZA-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817578" comment="libreoffice-l10n-eo-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817579" comment="libreoffice-l10n-es-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817580" comment="libreoffice-l10n-et-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817581" comment="libreoffice-l10n-eu-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817582" comment="libreoffice-l10n-fa-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817583" comment="libreoffice-l10n-fi-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817584" comment="libreoffice-l10n-fr-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817585" comment="libreoffice-l10n-fur-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817586" comment="libreoffice-l10n-fy-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817587" comment="libreoffice-l10n-ga-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817588" comment="libreoffice-l10n-gd-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817589" comment="libreoffice-l10n-gl-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817590" comment="libreoffice-l10n-gu-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817591" comment="libreoffice-l10n-gug-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817592" comment="libreoffice-l10n-he-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817593" comment="libreoffice-l10n-hi-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817594" comment="libreoffice-l10n-hr-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817595" comment="libreoffice-l10n-hsb-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817596" comment="libreoffice-l10n-hu-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817597" comment="libreoffice-l10n-id-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817598" comment="libreoffice-l10n-is-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817599" comment="libreoffice-l10n-it-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817600" comment="libreoffice-l10n-ja-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817601" comment="libreoffice-l10n-ka-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817602" comment="libreoffice-l10n-kab-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817603" comment="libreoffice-l10n-kk-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817604" comment="libreoffice-l10n-km-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817605" comment="libreoffice-l10n-kmr_Latn-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817606" comment="libreoffice-l10n-kn-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817607" comment="libreoffice-l10n-ko-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817608" comment="libreoffice-l10n-kok-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817609" comment="libreoffice-l10n-ks-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817610" comment="libreoffice-l10n-lb-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817611" comment="libreoffice-l10n-lo-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817612" comment="libreoffice-l10n-lt-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817613" comment="libreoffice-l10n-lv-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817614" comment="libreoffice-l10n-mai-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817615" comment="libreoffice-l10n-mk-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817616" comment="libreoffice-l10n-ml-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817617" comment="libreoffice-l10n-mn-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817618" comment="libreoffice-l10n-mni-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817619" comment="libreoffice-l10n-mr-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817620" comment="libreoffice-l10n-my-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817621" comment="libreoffice-l10n-nb-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817622" comment="libreoffice-l10n-ne-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817623" comment="libreoffice-l10n-nl-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817624" comment="libreoffice-l10n-nn-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817625" comment="libreoffice-l10n-nr-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817626" comment="libreoffice-l10n-nso-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817627" comment="libreoffice-l10n-oc-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817628" comment="libreoffice-l10n-om-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817629" comment="libreoffice-l10n-or-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817630" comment="libreoffice-l10n-pa-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817631" comment="libreoffice-l10n-pl-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817632" comment="libreoffice-l10n-pt_BR-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817633" comment="libreoffice-l10n-pt_PT-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817634" comment="libreoffice-l10n-ro-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817635" comment="libreoffice-l10n-ru-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817636" comment="libreoffice-l10n-rw-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817637" comment="libreoffice-l10n-sa_IN-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817638" comment="libreoffice-l10n-sat-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817639" comment="libreoffice-l10n-sd-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817640" comment="libreoffice-l10n-si-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817641" comment="libreoffice-l10n-sid-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817642" comment="libreoffice-l10n-sk-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817643" comment="libreoffice-l10n-sl-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817644" comment="libreoffice-l10n-sq-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817645" comment="libreoffice-l10n-sr-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817646" comment="libreoffice-l10n-ss-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817647" comment="libreoffice-l10n-st-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817648" comment="libreoffice-l10n-sv-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817649" comment="libreoffice-l10n-sw_TZ-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817650" comment="libreoffice-l10n-szl-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817651" comment="libreoffice-l10n-ta-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817652" comment="libreoffice-l10n-te-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817653" comment="libreoffice-l10n-tg-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817654" comment="libreoffice-l10n-th-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817655" comment="libreoffice-l10n-tn-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817656" comment="libreoffice-l10n-tr-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817657" comment="libreoffice-l10n-ts-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817658" comment="libreoffice-l10n-tt-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817659" comment="libreoffice-l10n-ug-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817660" comment="libreoffice-l10n-uk-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817661" comment="libreoffice-l10n-uz-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817662" comment="libreoffice-l10n-ve-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817663" comment="libreoffice-l10n-vec-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817664" comment="libreoffice-l10n-vi-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817665" comment="libreoffice-l10n-xh-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817666" comment="libreoffice-l10n-zh_CN-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817667" comment="libreoffice-l10n-zh_TW-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817668" comment="libreoffice-l10n-zu-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817669" comment="libreoffice-librelogo-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817670" comment="libreoffice-mailmerge-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817671" comment="libreoffice-math-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817672" comment="libreoffice-officebean-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817673" comment="libreoffice-pyuno-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817674" comment="libreoffice-qt5-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817675" comment="libreoffice-sdk-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817676" comment="libreoffice-sdk-doc-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817677" comment="libreoffice-writer-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817678" comment="libreoffice-writer-extensions-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817679" comment="libreofficekit-7.6.2.1-150400.17.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817680" comment="libreofficekit-devel-7.6.2.1-150400.17.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4586" version="1" class="patch">
	<metadata>
		<title>Security update for xwayland (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217765" ref_url="https://bugzilla.suse.com/1217765" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-6377" ref_url="https://www.suse.com/security/cve/CVE-2023-6377/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017513.html" source="SUSE-SU"/>
		<description>
This update for xwayland fixes the following issues:

- CVE-2023-6377: Fixed out-of-bounds memory write in XKB button actions (bsc#1217765).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-20"/>
	<updated date="2023-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217765">SUSE bug 1217765</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6377/">CVE-2023-6377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6377">CVE-2023-6377 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816491" comment="xwayland-22.1.5-150500.7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816492" comment="xwayland-devel-22.1.5-150500.7.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4587" version="1" class="patch">
	<metadata>
		<title>Security update for docker, rootlesskit (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1170415" ref_url="https://bugzilla.suse.com/1170415" source="BUGZILLA"/>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1178760" ref_url="https://bugzilla.suse.com/1178760" source="BUGZILLA"/>
		<reference ref_id="1210141" ref_url="https://bugzilla.suse.com/1210141" source="BUGZILLA"/>
		<reference ref_id="1213229" ref_url="https://bugzilla.suse.com/1213229" source="BUGZILLA"/>
		<reference ref_id="1213500" ref_url="https://bugzilla.suse.com/1213500" source="BUGZILLA"/>
		<reference ref_id="1215323" ref_url="https://bugzilla.suse.com/1215323" source="BUGZILLA"/>
		<reference ref_id="1217513" ref_url="https://bugzilla.suse.com/1217513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12912" ref_url="https://www.suse.com/security/cve/CVE-2020-12912/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017510.html" source="SUSE-SU"/>
		<description>
This update for docker, rootlesskit fixes the following issues:

docker:

- Update to Docker 24.0.7-ce. See upstream changelong online at
  https://docs.docker.com/engine/release-notes/24.0/#2407&gt;. bsc#1217513
  * Deny containers access to /sys/devices/virtual/powercap by default.
    - CVE-2020-8694 bsc#1170415
    - CVE-2020-8695 bsc#1170446
    - CVE-2020-12912 bsc#1178760

- Update to Docker 24.0.6-ce. See upstream changelong online at

  	https://docs.docker.com/engine/release-notes/24.0/#2406 . bsc#1215323

- Add a docker.socket unit file, but with socket activation effectively
  disabled to ensure that Docker will always run even if you start the socket
  individually. Users should probably just ignore this unit file. bsc#1210141

- Update to Docker 24.0.5-ce. See upstream changelong online at

	https://docs.docker.com/engine/release-notes/24.0/#2405 . bsc#1213229

This update ships docker-rootless support in the docker-rootless-extra package. (jsc#PED-6180)

rootlesskit:

- new package, for docker rootless support. (jsc#PED-6180)

		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-20"/>
	<updated date="2023-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178760">SUSE bug 1178760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210141">SUSE bug 1210141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213229">SUSE bug 1213229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213500">SUSE bug 1213500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215323">SUSE bug 1215323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217513">SUSE bug 1217513</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12912/">CVE-2020-12912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12912">CVE-2020-12912 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8694">CVE-2020-8694 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8695">CVE-2020-8695 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009815940" comment="docker-24.0.7_ce-150000.190.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815941" comment="docker-bash-completion-24.0.7_ce-150000.190.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815942" comment="docker-fish-completion-24.0.7_ce-150000.190.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815943" comment="docker-rootless-extras-24.0.7_ce-150000.190.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815944" comment="docker-zsh-completion-24.0.7_ce-150000.190.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815945" comment="rootlesskit-1.1.1-150000.1.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4588" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217272" ref_url="https://bugzilla.suse.com/1217272" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-6175" ref_url="https://www.suse.com/security/cve/CVE-2023-6175/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017509.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update to 3.6.19:

- CVE-2023-6175: NetScreen file parser crash (bsc#1217272).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-20"/>
	<updated date="2023-12-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1217272">SUSE bug 1217272</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6175/">CVE-2023-6175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6175">CVE-2023-6175 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009812205" comment="libwireshark15-3.6.19-150000.3.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812206" comment="libwiretap12-3.6.19-150000.3.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812207" comment="libwsutil13-3.6.19-150000.3.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812208" comment="wireshark-3.6.19-150000.3.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812209" comment="wireshark-devel-3.6.19-150000.3.106.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812210" comment="wireshark-ui-qt-3.6.19-150000.3.106.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4589" version="1" class="patch">
	<metadata>
		<title>Security update for rabbitmq-server (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216582" ref_url="https://bugzilla.suse.com/1216582" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46118" ref_url="https://www.suse.com/security/cve/CVE-2023-46118/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017508.html" source="SUSE-SU"/>
		<description>
This update for rabbitmq-server fixes the following issues:

- CVE-2023-46118: Introduce HTTP request body limit for definition uploads (bsc#1216582).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-20"/>
	<updated date="2023-12-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216582">SUSE bug 1216582</bugzilla>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46118/">CVE-2023-46118 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46118">CVE-2023-46118 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009812191" comment="erlang-rabbitmq-client-3.8.11-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812192" comment="rabbitmq-server-3.8.11-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812193" comment="rabbitmq-server-plugins-3.8.11-150300.3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4590" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1216654" ref_url="https://bugzilla.suse.com/1216654" source="BUGZILLA"/>
		<reference ref_id="1216807" ref_url="https://bugzilla.suse.com/1216807" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46835" ref_url="https://www.suse.com/security/cve/CVE-2023-46835/" source="CVE"/>
		<reference ref_id="CVE-2023-46836" ref_url="https://www.suse.com/security/cve/CVE-2023-46836/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017515.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2023-46836: Fixed BTC/SRSO fixes not fully effective (bsc#1216807).
- CVE-2023-46835: Fixed mismatch in IOMMU quarantine page table levels on x86/AMD (bsc#1216654).

Update to Xen 4.17.3 bug fix release (bsc#1027519).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-21"/>
	<updated date="2023-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216654">SUSE bug 1216654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216807">SUSE bug 1216807</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46835/">CVE-2023-46835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46835">CVE-2023-46835 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46836/">CVE-2023-46836 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46836">CVE-2023-46836 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009817359" comment="xen-4.17.3_02-150500.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817360" comment="xen-devel-4.17.3_02-150500.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817361" comment="xen-doc-html-4.17.3_02-150500.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817362" comment="xen-libs-4.17.3_02-150500.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817363" comment="xen-libs-32bit-4.17.3_02-150500.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817364" comment="xen-tools-4.17.3_02-150500.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817365" comment="xen-tools-domU-4.17.3_02-150500.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817366" comment="xen-tools-xendomains-wait-disk-4.17.3_02-150500.3.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4591" version="1" class="patch">
	<metadata>
		<title>Security update for zbar (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214770" ref_url="https://bugzilla.suse.com/1214770" source="BUGZILLA"/>
		<reference ref_id="1214771" ref_url="https://bugzilla.suse.com/1214771" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40889" ref_url="https://www.suse.com/security/cve/CVE-2023-40889/" source="CVE"/>
		<reference ref_id="CVE-2023-40890" ref_url="https://www.suse.com/security/cve/CVE-2023-40890/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017529.html" source="SUSE-SU"/>
		<description>
This update for zbar fixes the following issues:

- CVE-2023-40889: Fixed heap-based buffer overflow in the qr_reader_match_centers function (bsc#1214770).
- CVE-2023-40890: Fixed stack-based buffer overflow in the lookup_sequence function (bsc#1214771).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-21"/>
	<updated date="2023-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214770">SUSE bug 1214770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214771">SUSE bug 1214771</bugzilla>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-40889/">CVE-2023-40889 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40889">CVE-2023-40889 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-40890/">CVE-2023-40890 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40890">CVE-2023-40890 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009817527" comment="libzbar-devel-0.23.1-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817528" comment="libzbar0-0.23.1-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817529" comment="libzbar0-32bit-0.23.1-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817530" comment="libzbarqt-devel-0.23.1-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817531" comment="libzbarqt0-0.23.1-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817532" comment="libzbarqt0-32bit-0.23.1-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817533" comment="zbar-0.23.1-150300.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4592" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214327" ref_url="https://bugzilla.suse.com/1214327" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-37369" ref_url="https://www.suse.com/security/cve/CVE-2023-37369/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017523.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- CVE-2023-37369: Fixed buffer overflow in QXmlStreamReader (bsc#1214327).

- libq5-qtbase was rebuild against icu 73. jsc#PED-6193
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-21"/>
	<updated date="2023-12-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214327">SUSE bug 1214327</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37369/">CVE-2023-37369 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37369">CVE-2023-37369 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009814625" comment="libQt5Bootstrap-devel-static-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814626" comment="libQt5Bootstrap-devel-static-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814627" comment="libQt5Concurrent-devel-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814628" comment="libQt5Concurrent-devel-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814629" comment="libQt5Concurrent5-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814630" comment="libQt5Concurrent5-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814631" comment="libQt5Core-devel-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814632" comment="libQt5Core-devel-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814633" comment="libQt5Core-private-headers-devel-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814634" comment="libQt5Core5-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814635" comment="libQt5Core5-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814636" comment="libQt5DBus-devel-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814637" comment="libQt5DBus-devel-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814638" comment="libQt5DBus-private-headers-devel-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814639" comment="libQt5DBus5-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814640" comment="libQt5DBus5-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814641" comment="libQt5Gui-devel-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814642" comment="libQt5Gui-devel-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814643" comment="libQt5Gui-private-headers-devel-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814644" comment="libQt5Gui5-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814645" comment="libQt5Gui5-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814646" comment="libQt5KmsSupport-devel-static-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814647" comment="libQt5KmsSupport-private-headers-devel-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814648" comment="libQt5Network-devel-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814649" comment="libQt5Network-devel-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814650" comment="libQt5Network-private-headers-devel-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814651" comment="libQt5Network5-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814652" comment="libQt5Network5-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814653" comment="libQt5OpenGL-devel-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814654" comment="libQt5OpenGL-devel-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814655" comment="libQt5OpenGL-private-headers-devel-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814656" comment="libQt5OpenGL5-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814657" comment="libQt5OpenGL5-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814658" comment="libQt5OpenGLExtensions-devel-static-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814659" comment="libQt5OpenGLExtensions-devel-static-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814660" comment="libQt5PlatformHeaders-devel-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814661" comment="libQt5PlatformSupport-devel-static-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814662" comment="libQt5PlatformSupport-devel-static-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814663" comment="libQt5PlatformSupport-private-headers-devel-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814664" comment="libQt5PrintSupport-devel-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814665" comment="libQt5PrintSupport-devel-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814666" comment="libQt5PrintSupport-private-headers-devel-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814667" comment="libQt5PrintSupport5-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814668" comment="libQt5PrintSupport5-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814669" comment="libQt5Sql-devel-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814670" comment="libQt5Sql-devel-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814671" comment="libQt5Sql-private-headers-devel-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814672" comment="libQt5Sql5-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814673" comment="libQt5Sql5-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814674" comment="libQt5Sql5-mysql-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814675" comment="libQt5Sql5-mysql-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814676" comment="libQt5Sql5-postgresql-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814677" comment="libQt5Sql5-postgresql-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814678" comment="libQt5Sql5-sqlite-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814679" comment="libQt5Sql5-sqlite-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814680" comment="libQt5Sql5-unixODBC-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814681" comment="libQt5Sql5-unixODBC-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814682" comment="libQt5Test-devel-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814683" comment="libQt5Test-devel-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814684" comment="libQt5Test-private-headers-devel-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814685" comment="libQt5Test5-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814686" comment="libQt5Test5-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814687" comment="libQt5Widgets-devel-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814688" comment="libQt5Widgets-devel-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814689" comment="libQt5Widgets-private-headers-devel-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814690" comment="libQt5Widgets5-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814691" comment="libQt5Widgets5-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814692" comment="libQt5Xml-devel-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814693" comment="libQt5Xml-devel-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814694" comment="libQt5Xml5-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814695" comment="libQt5Xml5-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814696" comment="libqt5-qtbase-common-devel-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814697" comment="libqt5-qtbase-devel-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814698" comment="libqt5-qtbase-examples-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814699" comment="libqt5-qtbase-examples-32bit-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814700" comment="libqt5-qtbase-platformtheme-gtk3-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814701" comment="libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.8+kde185-150500.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814702" comment="libqt5-qtbase-private-headers-devel-5.15.8+kde185-150500.4.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4593" version="1" class="patch">
	<metadata>
		<title>Security update for tinyxml (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218040" ref_url="https://bugzilla.suse.com/1218040" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-34194" ref_url="https://www.suse.com/security/cve/CVE-2023-34194/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017526.html" source="SUSE-SU"/>
		<description>
This update for tinyxml fixes the following issues:

- CVE-2023-34194: Fixed reachable assertion may lead to denial of service (bsc#1218040).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-22"/>
	<updated date="2023-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218040">SUSE bug 1218040</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-34194/">CVE-2023-34194 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34194">CVE-2023-34194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009817749" comment="libtinyxml0-2.6.2-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817750" comment="tinyxml-devel-2.6.2-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817751" comment="tinyxml-docs-2.6.2-150000.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4594" version="1" class="patch">
	<metadata>
		<title>Security update for ppp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218251" ref_url="https://bugzilla.suse.com/1218251" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4603" ref_url="https://www.suse.com/security/cve/CVE-2022-4603/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017549.html" source="SUSE-SU"/>
		<description>
This update for ppp fixes the following issues:

- CVE-2022-4603: Fixed improper validation of array index of the component pppdump (bsc#1218251).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-22"/>
	<updated date="2023-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218251">SUSE bug 1218251</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-4603/">CVE-2022-4603 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4603">CVE-2022-4603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009817752" comment="ppp-2.4.7-150000.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817753" comment="ppp-devel-2.4.7-150000.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817754" comment="ppp-modem-2.4.7-150000.5.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4595" version="1" class="patch">
	<metadata>
		<title>Security update for jbigkit (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1198146" ref_url="https://bugzilla.suse.com/1198146" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1210" ref_url="https://www.suse.com/security/cve/CVE-2022-1210/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4968-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033491.html" source="SUSE-SU"/>
		<description>
This update for jbigkit fixes the following issues:

- CVE-2022-1210: Fixed denial of service in TIFF File Handler (bsc#1198146).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-25"/>
	<updated date="2023-12-25"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1198146">SUSE bug 1198146</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1210/">CVE-2022-1210 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1210">CVE-2022-1210 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009817522" comment="jbigkit-2.1-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817523" comment="libjbig-devel-2.1-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817524" comment="libjbig-devel-32bit-2.1-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817525" comment="libjbig2-2.1-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817526" comment="libjbig2-32bit-2.1-150000.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4596" version="1" class="patch">
	<metadata>
		<title>Security update for distribution (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216491" ref_url="https://bugzilla.suse.com/1216491" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2023:4974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017561.html" source="SUSE-SU"/>
		<description>
This update for distribution fixes the following issues:

distribution was updated to 2.8.3 (bsc#1216491):

* Pass `BUILDTAGS` argument to `go build`
* Enable Go build tags
* `reference`: replace deprecated function `SplitHostname`
* Dont parse errors as JSON unless Content-Type is set to JSON
* update to go 1.20.8
* Set `Content-Type` header in registry client `ReadFrom`
* deprecate reference package, migrate to github.com/distribution/reference
* `digestset`: deprecate package in favor of `go-digest/digestset`
* Do not close HTTP request body in HTTP handler
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-26"/>
	<updated date="2023-12-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216491">SUSE bug 1216491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009813390" comment="distribution-registry-2.8.3-150400.9.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4597" version="1" class="patch">
	<metadata>
		<title>Security update for postfix (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218304" ref_url="https://bugzilla.suse.com/1218304" source="BUGZILLA"/>
		<reference ref_id="1218314" ref_url="https://bugzilla.suse.com/1218314" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-51764" ref_url="https://www.suse.com/security/cve/CVE-2023-51764/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017566.html" source="SUSE-SU"/>
		<description>
This update for postfix fixes the following issues:

- CVE-2023-51764: Fixed new SMTP smuggling attack (bsc#1218304).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-28"/>
	<updated date="2023-12-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218304">SUSE bug 1218304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218314">SUSE bug 1218314</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-51764/">CVE-2023-51764 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51764">CVE-2023-51764 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009817925" comment="postfix-3.7.3-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817926" comment="postfix-bdb-3.7.3-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817927" comment="postfix-bdb-lmdb-3.7.3-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817928" comment="postfix-devel-3.7.3-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817929" comment="postfix-doc-3.7.3-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817930" comment="postfix-ldap-3.7.3-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817931" comment="postfix-mysql-3.7.3-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817932" comment="postfix-postgresql-3.7.3-150500.3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4598" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217277" ref_url="https://bugzilla.suse.com/1217277" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5981" ref_url="https://www.suse.com/security/cve/CVE-2023-5981/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017571.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

- CVE-2023-5981: Fixed timing side-channel inside RSA-PSK key exchange (bsc#1217277).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-28"/>
	<updated date="2023-12-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1217277">SUSE bug 1217277</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5981/">CVE-2023-5981 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5981">CVE-2023-5981 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009814063" comment="gnutls-3.7.3-150400.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814064" comment="gnutls-guile-3.7.3-150400.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814065" comment="libgnutls-devel-3.7.3-150400.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814066" comment="libgnutls-devel-32bit-3.7.3-150400.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814067" comment="libgnutls30-3.7.3-150400.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814068" comment="libgnutls30-32bit-3.7.3-150400.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814069" comment="libgnutls30-hmac-3.7.3-150400.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814070" comment="libgnutls30-hmac-32bit-3.7.3-150400.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814071" comment="libgnutlsxx-devel-3.7.3-150400.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009814072" comment="libgnutlsxx28-3.7.3-150400.4.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4599" version="1" class="patch">
	<metadata>
		<title>Security update for python-pip (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217353" ref_url="https://bugzilla.suse.com/1217353" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5752" ref_url="https://www.suse.com/security/cve/CVE-2023-5752/" source="CVE"/>
		<reference ref_id="SUSE-SU-2023:4988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017567.html" source="SUSE-SU"/>
		<description>
This update for python-pip fixes the following issues:

- CVE-2023-5752: Fixed injection of arbitrary configuration through Mercurial parameter (bsc#1217353).
		</description>
<advisory from="security@suse.de">
	<issued date="2023-12-28"/>
	<updated date="2023-12-28"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1217353">SUSE bug 1217353</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5752/">CVE-2023-5752 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5752">CVE-2023-5752 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009812194" comment="python311-pip-22.3.1-150400.17.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4600" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220048" ref_url="https://bugzilla.suse.com/1220048" source="BUGZILLA"/>
		<reference ref_id="1221327" ref_url="https://bugzilla.suse.com/1221327" source="BUGZILLA"/>
		<reference ref_id="1221850" ref_url="https://bugzilla.suse.com/1221850" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5388" ref_url="https://www.suse.com/security/cve/CVE-2023-5388/" source="CVE"/>
		<reference ref_id="CVE-2024-0743" ref_url="https://www.suse.com/security/cve/CVE-2024-0743/" source="CVE"/>
		<reference ref_id="CVE-2024-1546" ref_url="https://www.suse.com/security/cve/CVE-2024-1546/" source="CVE"/>
		<reference ref_id="CVE-2024-1547" ref_url="https://www.suse.com/security/cve/CVE-2024-1547/" source="CVE"/>
		<reference ref_id="CVE-2024-1548" ref_url="https://www.suse.com/security/cve/CVE-2024-1548/" source="CVE"/>
		<reference ref_id="CVE-2024-1549" ref_url="https://www.suse.com/security/cve/CVE-2024-1549/" source="CVE"/>
		<reference ref_id="CVE-2024-1550" ref_url="https://www.suse.com/security/cve/CVE-2024-1550/" source="CVE"/>
		<reference ref_id="CVE-2024-1551" ref_url="https://www.suse.com/security/cve/CVE-2024-1551/" source="CVE"/>
		<reference ref_id="CVE-2024-1552" ref_url="https://www.suse.com/security/cve/CVE-2024-1552/" source="CVE"/>
		<reference ref_id="CVE-2024-1553" ref_url="https://www.suse.com/security/cve/CVE-2024-1553/" source="CVE"/>
		<reference ref_id="CVE-2024-2605" ref_url="https://www.suse.com/security/cve/CVE-2024-2605/" source="CVE"/>
		<reference ref_id="CVE-2024-2607" ref_url="https://www.suse.com/security/cve/CVE-2024-2607/" source="CVE"/>
		<reference ref_id="CVE-2024-2608" ref_url="https://www.suse.com/security/cve/CVE-2024-2608/" source="CVE"/>
		<reference ref_id="CVE-2024-2610" ref_url="https://www.suse.com/security/cve/CVE-2024-2610/" source="CVE"/>
		<reference ref_id="CVE-2024-2611" ref_url="https://www.suse.com/security/cve/CVE-2024-2611/" source="CVE"/>
		<reference ref_id="CVE-2024-2612" ref_url="https://www.suse.com/security/cve/CVE-2024-2612/" source="CVE"/>
		<reference ref_id="CVE-2024-2614" ref_url="https://www.suse.com/security/cve/CVE-2024-2614/" source="CVE"/>
		<reference ref_id="CVE-2024-2616" ref_url="https://www.suse.com/security/cve/CVE-2024-2616/" source="CVE"/>
		<reference ref_id="CVE-2024-29944" ref_url="https://www.suse.com/security/cve/CVE-2024-29944/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 115.9.1esr ESR MFSA 2024-16 (bsc#1221850).

- CVE-2024-29944: Privileged JavaScript Execution via Event Handlers (bmo#1886852).


Firefox Extended Support Release 115.9.0 ESR (bsc#1221327):
    
- CVE-2024-0743: Crash in NSS TLS method (bmo#1867408).    
- CVE-2024-2605: Windows Error Reporter could be used as a Sandbox escape
    vector (bmo#1872920).
- CVE-2024-2607: JIT code failed to save return registers on Armv7-A (bmo#1879939).
- CVE-2024-2608: Integer overflow could have led to out of bounds write (bmo#1880692).
- CVE-2024-2616: Improve handling of out-of-memory conditions in ICU (bmo#1846197).
- CVE-2023-5388: NSS susceptible to timing attack against RSA decryption (bmo#1780432).
- CVE-2024-2610: Improper handling of html and body tags enabled CSP nonce
    leakage (bmo#1871112).
- CVE-2024-2611: Clickjacking vulnerability could have led to a user
    accidentally granting permissions (bmo#1876675).
- CVE-2024-2612: Self referencing object could have potentially led to a use-
    after-free (bmo#1879444).
- CVE-2024-2614: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9,
    and Thunderbird 115.9 (bmo#1685358, bmo#1861016, bmo#1880405,
    bmo#1881093).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-27"/>
	<updated date="2024-03-27"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1220048">SUSE bug 1220048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221327">SUSE bug 1221327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221850">SUSE bug 1221850</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5388/">CVE-2023-5388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5388">CVE-2023-5388 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0743/">CVE-2024-0743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0743">CVE-2024-0743 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1546/">CVE-2024-1546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1546">CVE-2024-1546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1547/">CVE-2024-1547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1547">CVE-2024-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1548/">CVE-2024-1548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1548">CVE-2024-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1549/">CVE-2024-1549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1549">CVE-2024-1549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1550/">CVE-2024-1550 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1550">CVE-2024-1550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1551/">CVE-2024-1551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1551">CVE-2024-1551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1552/">CVE-2024-1552 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1552">CVE-2024-1552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1553/">CVE-2024-1553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1553">CVE-2024-1553 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2605/">CVE-2024-2605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2605">CVE-2024-2605 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2607/">CVE-2024-2607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2607">CVE-2024-2607 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2608/">CVE-2024-2608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2608">CVE-2024-2608 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2610/">CVE-2024-2610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2610">CVE-2024-2610 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2611/">CVE-2024-2611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2611">CVE-2024-2611 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2612/">CVE-2024-2612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2612">CVE-2024-2612 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2614/">CVE-2024-2614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2614">CVE-2024-2614 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-2616/">CVE-2024-2616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2616">CVE-2024-2616 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-29944/">CVE-2024-29944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29944">CVE-2024-29944 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851991" comment="MozillaFirefox-115.9.1-150200.152.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851992" comment="MozillaFirefox-branding-upstream-115.9.1-150200.152.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851993" comment="MozillaFirefox-devel-115.9.1-150200.152.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851994" comment="MozillaFirefox-translations-common-115.9.1-150200.152.131.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851995" comment="MozillaFirefox-translations-other-115.9.1-150200.152.131.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4601" version="1" class="patch">
	<metadata>
		<title>Security update for python39 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211301" ref_url="https://bugzilla.suse.com/1211301" source="BUGZILLA"/>
		<reference ref_id="1219559" ref_url="https://bugzilla.suse.com/1219559" source="BUGZILLA"/>
		<reference ref_id="1219666" ref_url="https://bugzilla.suse.com/1219666" source="BUGZILLA"/>
		<reference ref_id="1221854" ref_url="https://bugzilla.suse.com/1221854" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<reference ref_id="CVE-2023-6597" ref_url="https://www.suse.com/security/cve/CVE-2023-6597/" source="CVE"/>
		<reference ref_id="CVE-2024-0450" ref_url="https://www.suse.com/security/cve/CVE-2024-0450/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018226.html" source="SUSE-SU"/>
		<description>
This update for python39 fixes the following issues:

- CVE-2023-52425: Fixed denial of service (resource consumption) caused by processing large tokens in expat (bsc#1219559).
- CVE-2023-6597: Fixed symlink race condition in tempfile.TemporaryDirectory (bsc#1219666).
- CVE-2024-0450: Fixed 'quoted-overlap' in zipfile module (bsc#1221854).

The following non-security bugs were fixed:

- Use the system-wide crypto-policies (bsc#1211301).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-27"/>
	<updated date="2024-03-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211301">SUSE bug 1211301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219559">SUSE bug 1219559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219666">SUSE bug 1219666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221854">SUSE bug 1221854</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6597/">CVE-2023-6597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6597">CVE-2023-6597 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0450/">CVE-2024-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851996" comment="libpython3_9-1_0-3.9.19-150300.4.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851997" comment="libpython3_9-1_0-32bit-3.9.19-150300.4.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851998" comment="python39-3.9.19-150300.4.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851999" comment="python39-32bit-3.9.19-150300.4.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852000" comment="python39-base-3.9.19-150300.4.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852001" comment="python39-base-32bit-3.9.19-150300.4.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852002" comment="python39-curses-3.9.19-150300.4.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852003" comment="python39-dbm-3.9.19-150300.4.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852004" comment="python39-devel-3.9.19-150300.4.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852005" comment="python39-doc-3.9.19-150300.4.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852006" comment="python39-doc-devhelp-3.9.19-150300.4.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852007" comment="python39-idle-3.9.19-150300.4.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852008" comment="python39-testsuite-3.9.19-150300.4.41.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852009" comment="python39-tk-3.9.19-150300.4.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852010" comment="python39-tools-3.9.19-150300.4.41.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4602" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216594" ref_url="https://bugzilla.suse.com/1216594" source="BUGZILLA"/>
		<reference ref_id="1216598" ref_url="https://bugzilla.suse.com/1216598" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38469" ref_url="https://www.suse.com/security/cve/CVE-2023-38469/" source="CVE"/>
		<reference ref_id="CVE-2023-38471" ref_url="https://www.suse.com/security/cve/CVE-2023-38471/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018228.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2023-38471: Fixed reachable assertion in dbus_set_host_name (bsc#1216594).
- CVE-2023-38469: Fixed reachable assertions in avahi (bsc#1216598).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-27"/>
	<updated date="2024-03-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216594">SUSE bug 1216594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216598">SUSE bug 1216598</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38469/">CVE-2023-38469 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38469">CVE-2023-38469 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38471/">CVE-2023-38471 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38471">CVE-2023-38471 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009852011" comment="avahi-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852012" comment="avahi-autoipd-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852013" comment="avahi-compat-howl-devel-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852014" comment="avahi-compat-mDNSResponder-devel-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852015" comment="avahi-lang-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852016" comment="avahi-utils-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852017" comment="avahi-utils-gtk-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852018" comment="libavahi-client3-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852019" comment="libavahi-client3-32bit-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852020" comment="libavahi-common3-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852021" comment="libavahi-common3-32bit-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852022" comment="libavahi-core7-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852023" comment="libavahi-devel-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852024" comment="libavahi-glib-devel-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852025" comment="libavahi-glib1-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852026" comment="libavahi-glib1-32bit-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852027" comment="libavahi-gobject-devel-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852028" comment="libavahi-gobject0-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852029" comment="libavahi-libevent1-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852030" comment="libavahi-qt5-1-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852031" comment="libavahi-qt5-devel-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852032" comment="libavahi-ui-gtk3-0-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852033" comment="libdns_sd-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852034" comment="libdns_sd-32bit-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852035" comment="libhowl0-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852036" comment="python3-avahi-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852037" comment="python3-avahi-gtk-0.8-150400.7.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852038" comment="typelib-1_0-Avahi-0_6-0.8-150400.7.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4603" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionpack-5_1 (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1172182" ref_url="https://bugzilla.suse.com/1172182" source="BUGZILLA"/>
		<reference ref_id="1215707" ref_url="https://bugzilla.suse.com/1215707" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8166" ref_url="https://www.suse.com/security/cve/CVE-2020-8166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017656.html" source="SUSE-SU"/>
		<description>
This update for rubygem-actionpack-5_1 fixes the following issues:

  - CVE-2020-8166: Fixed ability to forge per-form CSRF tokens given a global CSRF (bsc#1172182).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-15"/>
	<updated date="2024-01-15"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1172182">SUSE bug 1172182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215707">SUSE bug 1215707</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8166/">CVE-2020-8166 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8166">CVE-2020-8166 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009819231" comment="ruby2.5-rubygem-actionpack-5_1-5.1.4-150000.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819232" comment="ruby2.5-rubygem-actionpack-doc-5_1-5.1.4-150000.3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4604" version="1" class="patch">
	<metadata>
		<title>Security update for PackageKit (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1209138" ref_url="https://bugzilla.suse.com/1209138" source="BUGZILLA"/>
		<reference ref_id="1218544" ref_url="https://bugzilla.suse.com/1218544" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0217" ref_url="https://www.suse.com/security/cve/CVE-2024-0217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1046-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-March/034807.html" source="SUSE-SU"/>
		<description>
This update for PackageKit fixes the following issues:

- CVE-2024-0217: Check that Finished signal is emitted at most once (bsc#1218544).
- Dropped unnecessary executable permission (bsc#1209138).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2024-03-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209138">SUSE bug 1209138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218544">SUSE bug 1218544</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-0217/">CVE-2024-0217 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0217">CVE-2024-0217 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009852406" comment="PackageKit-1.2.4-150400.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852407" comment="PackageKit-backend-dnf-1.2.4-150400.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852408" comment="PackageKit-backend-zypp-1.2.4-150400.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852409" comment="PackageKit-branding-upstream-1.2.4-150400.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852410" comment="PackageKit-devel-1.2.4-150400.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852411" comment="PackageKit-gstreamer-plugin-1.2.4-150400.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852412" comment="PackageKit-gtk3-module-1.2.4-150400.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852413" comment="PackageKit-lang-1.2.4-150400.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852414" comment="libpackagekit-glib2-18-1.2.4-150400.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852415" comment="libpackagekit-glib2-18-32bit-1.2.4-150400.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852416" comment="libpackagekit-glib2-devel-1.2.4-150400.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852417" comment="libpackagekit-glib2-devel-32bit-1.2.4-150400.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852418" comment="typelib-1_0-PackageKitGlib-1_0-1.2.4-150400.3.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4605" version="1" class="patch">
	<metadata>
		<title>Security update for qpid-proton (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1041090" ref_url="https://bugzilla.suse.com/1041090" source="BUGZILLA"/>
		<reference ref_id="1084627" ref_url="https://bugzilla.suse.com/1084627" source="BUGZILLA"/>
		<reference ref_id="1133158" ref_url="https://bugzilla.suse.com/1133158" source="BUGZILLA"/>
		<reference ref_id="1172267" ref_url="https://bugzilla.suse.com/1172267" source="BUGZILLA"/>
		<reference ref_id="1191783" ref_url="https://bugzilla.suse.com/1191783" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-0223" ref_url="https://www.suse.com/security/cve/CVE-2019-0223/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034819.html" source="SUSE-SU"/>
		<description>
This update for qpid-proton fixes the following issues:

- CVE-2019-0223: Fixed TLS Man in the Middle Vulnerability (bsc#1133158).

The following non-security bugs were fixed:

- Fix build with OpenSSL 3.0.0 (bsc#1172267)
- Sort linked .o files to make package build reproducible (bsc#1041090)
- Fix build with gcc8 (bsc#1084627)
- Move libqpid-proton-core to a different package to fix a rpmlint
  error (bsc#1191783)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-30"/>
	<updated date="2024-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1041090">SUSE bug 1041090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084627">SUSE bug 1084627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133158">SUSE bug 1133158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172267">SUSE bug 1172267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191783">SUSE bug 1191783</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-0223/">CVE-2019-0223 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-0223">CVE-2019-0223 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009852614" comment="python3-python-qpid-proton-0.38.0-150000.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852615" comment="qpid-proton-devel-0.38.0-150000.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852616" comment="qpid-proton-devel-doc-0.38.0-150000.6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4606" version="1" class="patch">
	<metadata>
		<title>Security update for netty, netty-tcnative (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222045" ref_url="https://bugzilla.suse.com/1222045" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-29025" ref_url="https://www.suse.com/security/cve/CVE-2024-29025/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1079-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034828.html" source="SUSE-SU"/>
		<description>
This update for netty, netty-tcnative fixes the following issues:

- CVE-2024-29025: Fixed out of memory due to large number of form fields (bsc#1222045).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-02"/>
	<updated date="2024-04-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222045">SUSE bug 1222045</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-29025/">CVE-2024-29025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29025">CVE-2024-29025 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009852664" comment="netty-4.1.108-150200.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852665" comment="netty-javadoc-4.1.108-150200.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852666" comment="netty-poms-4.1.108-150200.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852667" comment="netty-tcnative-2.0.65-150200.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852668" comment="netty-tcnative-javadoc-2.0.65-150200.3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4607" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBD-SQLite (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218946" ref_url="https://bugzilla.suse.com/1218946" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2024:1086-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034834.html" source="SUSE-SU"/>
		<description>
This update for perl-DBD-SQLite fixes the following issues:

- rebuild against current system sqlite. (bsc#1218946)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-02"/>
	<updated date="2024-04-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218946">SUSE bug 1218946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852669" comment="perl-DBD-SQLite-1.66-150300.3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4608" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218176" ref_url="https://bugzilla.suse.com/1218176" source="BUGZILLA"/>
		<reference ref_id="1218240" ref_url="https://bugzilla.suse.com/1218240" source="BUGZILLA"/>
		<reference ref_id="1218582" ref_url="https://bugzilla.suse.com/1218582" source="BUGZILLA"/>
		<reference ref_id="1218583" ref_url="https://bugzilla.suse.com/1218583" source="BUGZILLA"/>
		<reference ref_id="1218584" ref_url="https://bugzilla.suse.com/1218584" source="BUGZILLA"/>
		<reference ref_id="1218585" ref_url="https://bugzilla.suse.com/1218585" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-6816" ref_url="https://www.suse.com/security/cve/CVE-2023-6816/" source="CVE"/>
		<reference ref_id="CVE-2024-0229" ref_url="https://www.suse.com/security/cve/CVE-2024-0229/" source="CVE"/>
		<reference ref_id="CVE-2024-21885" ref_url="https://www.suse.com/security/cve/CVE-2024-21885/" source="CVE"/>
		<reference ref_id="CVE-2024-21886" ref_url="https://www.suse.com/security/cve/CVE-2024-21886/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017675.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

Security fixes:

  - CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)
  - CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)
  - CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)
  - CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)

Other:

- Fix vmware graphics driver  crash (bsc#1218176)
- Fix xserver crash when Xinerama is enabled (bsc#1218240)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-16"/>
	<updated date="2024-01-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218176">SUSE bug 1218176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218240">SUSE bug 1218240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218582">SUSE bug 1218582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218583">SUSE bug 1218583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218584">SUSE bug 1218584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218585">SUSE bug 1218585</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6816/">CVE-2023-6816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6816">CVE-2023-6816 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0229/">CVE-2024-0229 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0229">CVE-2024-0229 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21885/">CVE-2024-21885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21885">CVE-2024-21885 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21886/">CVE-2024-21886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21886">CVE-2024-21886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009819599" comment="xorg-x11-server-21.1.4-150500.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819600" comment="xorg-x11-server-Xvfb-21.1.4-150500.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819601" comment="xorg-x11-server-extra-21.1.4-150500.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819602" comment="xorg-x11-server-sdk-21.1.4-150500.7.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819603" comment="xorg-x11-server-source-21.1.4-150500.7.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4609" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214223" ref_url="https://bugzilla.suse.com/1214223" source="BUGZILLA"/>
		<reference ref_id="1216980" ref_url="https://bugzilla.suse.com/1216980" source="BUGZILLA"/>
		<reference ref_id="1220512" ref_url="https://bugzilla.suse.com/1220512" source="BUGZILLA"/>
		<reference ref_id="1221237" ref_url="https://bugzilla.suse.com/1221237" source="BUGZILLA"/>
		<reference ref_id="1221468" ref_url="https://bugzilla.suse.com/1221468" source="BUGZILLA"/>
		<reference ref_id="1221815" ref_url="https://bugzilla.suse.com/1221815" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-1441" ref_url="https://www.suse.com/security/cve/CVE-2024-1441/" source="CVE"/>
		<reference ref_id="CVE-2024-2494" ref_url="https://www.suse.com/security/cve/CVE-2024-2494/" source="CVE"/>
		<reference ref_id="CVE-2024-2496" ref_url="https://www.suse.com/security/cve/CVE-2024-2496/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034896.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2024-2494: Add a check for negative array lengths before allocation to prevent potential DoS. (bsc#1221815)
- CVE-2024-2496: Fixed NULL pointer dereference in udevConnectListAllInterfaces() (bsc#1221468).
- CVE-2024-1441: Fix off-by-one error in udevListInterfacesByStatus (bsc#1221237)
- qemu: domain: Fix logic when tainting domain (bsc#1220512)
- conf: Remove some firmware validation checks (bsc#1216980)
- libxl: Fix connection to modular network daemon (bsc#1214223)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-03"/>
	<updated date="2024-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214223">SUSE bug 1214223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216980">SUSE bug 1216980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220512">SUSE bug 1220512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221237">SUSE bug 1221237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221468">SUSE bug 1221468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221815">SUSE bug 1221815</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-1441/">CVE-2024-1441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1441">CVE-2024-1441 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2494/">CVE-2024-2494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2494">CVE-2024-2494 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2496/">CVE-2024-2496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2496">CVE-2024-2496 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009852723" comment="libvirt-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852724" comment="libvirt-client-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852725" comment="libvirt-client-qemu-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852726" comment="libvirt-daemon-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852727" comment="libvirt-daemon-config-network-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852728" comment="libvirt-daemon-config-nwfilter-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852729" comment="libvirt-daemon-driver-interface-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852730" comment="libvirt-daemon-driver-libxl-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852731" comment="libvirt-daemon-driver-lxc-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852732" comment="libvirt-daemon-driver-network-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852733" comment="libvirt-daemon-driver-nodedev-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852734" comment="libvirt-daemon-driver-nwfilter-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852735" comment="libvirt-daemon-driver-qemu-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852736" comment="libvirt-daemon-driver-secret-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852737" comment="libvirt-daemon-driver-storage-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852738" comment="libvirt-daemon-driver-storage-core-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852739" comment="libvirt-daemon-driver-storage-disk-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852740" comment="libvirt-daemon-driver-storage-gluster-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852741" comment="libvirt-daemon-driver-storage-iscsi-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852742" comment="libvirt-daemon-driver-storage-iscsi-direct-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852743" comment="libvirt-daemon-driver-storage-logical-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852744" comment="libvirt-daemon-driver-storage-mpath-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852745" comment="libvirt-daemon-driver-storage-rbd-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852746" comment="libvirt-daemon-driver-storage-scsi-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852747" comment="libvirt-daemon-hooks-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852748" comment="libvirt-daemon-lxc-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852749" comment="libvirt-daemon-qemu-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852750" comment="libvirt-daemon-xen-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852751" comment="libvirt-devel-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852752" comment="libvirt-devel-32bit-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852753" comment="libvirt-doc-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852754" comment="libvirt-libs-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852755" comment="libvirt-lock-sanlock-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852756" comment="libvirt-nss-9.0.0-150500.6.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852757" comment="wireshark-plugin-libvirt-9.0.0-150500.6.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4610" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1219885" ref_url="https://bugzilla.suse.com/1219885" source="BUGZILLA"/>
		<reference ref_id="1221332" ref_url="https://bugzilla.suse.com/1221332" source="BUGZILLA"/>
		<reference ref_id="1221334" ref_url="https://bugzilla.suse.com/1221334" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<reference ref_id="CVE-2023-46841" ref_url="https://www.suse.com/security/cve/CVE-2023-46841/" source="CVE"/>
		<reference ref_id="CVE-2024-2193" ref_url="https://www.suse.com/security/cve/CVE-2024-2193/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1102-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034893.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2023-28746: Register File Data Sampling (bsc#1221332)
- CVE-2024-2193: Fixed GhostRace, a speculative race conditions. (bsc#1221334)
- CVE-2023-46841: Hhadow stack vs exceptions from emulation stubs (bsc#1219885)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-03"/>
	<updated date="2024-04-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219885">SUSE bug 1219885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221332">SUSE bug 1221332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221334">SUSE bug 1221334</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46841/">CVE-2023-46841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46841">CVE-2023-46841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2193/">CVE-2024-2193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2193">CVE-2024-2193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009852758" comment="xen-4.17.3_08-150500.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852759" comment="xen-devel-4.17.3_08-150500.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852760" comment="xen-doc-html-4.17.3_08-150500.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852761" comment="xen-libs-4.17.3_08-150500.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852762" comment="xen-libs-32bit-4.17.3_08-150500.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852763" comment="xen-tools-4.17.3_08-150500.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852764" comment="xen-tools-domU-4.17.3_08-150500.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852765" comment="xen-tools-xendomains-wait-disk-4.17.3_08-150500.3.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4611" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1205316" ref_url="https://bugzilla.suse.com/1205316" source="BUGZILLA"/>
		<reference ref_id="1209554" ref_url="https://bugzilla.suse.com/1209554" source="BUGZILLA"/>
		<reference ref_id="1218484" ref_url="https://bugzilla.suse.com/1218484" source="BUGZILLA"/>
		<reference ref_id="1220062" ref_url="https://bugzilla.suse.com/1220062" source="BUGZILLA"/>
		<reference ref_id="1220065" ref_url="https://bugzilla.suse.com/1220065" source="BUGZILLA"/>
		<reference ref_id="1220134" ref_url="https://bugzilla.suse.com/1220134" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1544" ref_url="https://www.suse.com/security/cve/CVE-2023-1544/" source="CVE"/>
		<reference ref_id="CVE-2023-6693" ref_url="https://www.suse.com/security/cve/CVE-2023-6693/" source="CVE"/>
		<reference ref_id="CVE-2024-24474" ref_url="https://www.suse.com/security/cve/CVE-2024-24474/" source="CVE"/>
		<reference ref_id="CVE-2024-26327" ref_url="https://www.suse.com/security/cve/CVE-2024-26327/" source="CVE"/>
		<reference ref_id="CVE-2024-26328" ref_url="https://www.suse.com/security/cve/CVE-2024-26328/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1103-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034892.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2024-26327: Fixed buffer overflow via invalid SR/IOV NumVFs value (bsc#1220062).
- CVE-2024-24474: Fixed integer overflow results in buffer overflow via SCSI command (bsc#1220134).
- CVE-2023-6693: Fixed stack buffer overflow in virtio_net_flush_tx() (bsc#1218484).
- CVE-2023-1544: Fixed out-of-bounds read in pvrdma_ring_next_elem_read() (bsc#1209554).
- CVE-2024-26328: Fixed invalid NumVFs value handled in NVME SR/IOV implementation (bsc#1220065).

The following non-security bug was fixed:

- Removing in-use mediated device should fail with error message instead of hang (bsc#1205316).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-03"/>
	<updated date="2024-04-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205316">SUSE bug 1205316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209554">SUSE bug 1209554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218484">SUSE bug 1218484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220062">SUSE bug 1220062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220065">SUSE bug 1220065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220134">SUSE bug 1220134</bugzilla>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1544/">CVE-2023-1544 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1544">CVE-2023-1544 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6693/">CVE-2023-6693 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6693">CVE-2023-6693 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-24474/">CVE-2024-24474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24474">CVE-2024-24474 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26327/">CVE-2024-26327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26327">CVE-2024-26327 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26328/">CVE-2024-26328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26328">CVE-2024-26328 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009852766" comment="qemu-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852767" comment="qemu-SLOF-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852768" comment="qemu-accel-qtest-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852769" comment="qemu-accel-tcg-x86-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852770" comment="qemu-arm-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852771" comment="qemu-audio-alsa-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852772" comment="qemu-audio-dbus-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852773" comment="qemu-audio-jack-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852774" comment="qemu-audio-pa-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852775" comment="qemu-audio-spice-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852776" comment="qemu-block-curl-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852777" comment="qemu-block-dmg-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852778" comment="qemu-block-gluster-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852779" comment="qemu-block-iscsi-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852780" comment="qemu-block-nfs-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852781" comment="qemu-block-rbd-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852782" comment="qemu-block-ssh-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852783" comment="qemu-chardev-baum-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852784" comment="qemu-chardev-spice-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852785" comment="qemu-extra-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852786" comment="qemu-guest-agent-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852787" comment="qemu-hw-display-qxl-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852788" comment="qemu-hw-display-virtio-gpu-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852789" comment="qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852790" comment="qemu-hw-display-virtio-vga-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852791" comment="qemu-hw-s390x-virtio-gpu-ccw-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852792" comment="qemu-hw-usb-host-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852793" comment="qemu-hw-usb-redirect-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852794" comment="qemu-hw-usb-smartcard-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852795" comment="qemu-ipxe-1.0.0+-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852796" comment="qemu-ivshmem-tools-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852797" comment="qemu-ksm-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852798" comment="qemu-kvm-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852799" comment="qemu-lang-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852800" comment="qemu-microvm-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852801" comment="qemu-ppc-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852802" comment="qemu-s390x-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852803" comment="qemu-seabios-1.16.0_0_gd239552-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852804" comment="qemu-sgabios-8-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852805" comment="qemu-skiboot-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852806" comment="qemu-tools-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852807" comment="qemu-ui-curses-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852808" comment="qemu-ui-dbus-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852809" comment="qemu-ui-gtk-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852810" comment="qemu-ui-opengl-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852811" comment="qemu-ui-spice-app-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852812" comment="qemu-ui-spice-core-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852813" comment="qemu-vgabios-1.16.0_0_gd239552-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852814" comment="qemu-vhost-user-gpu-7.1.0-150500.49.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852815" comment="qemu-x86-7.1.0-150500.49.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4612" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216715" ref_url="https://bugzilla.suse.com/1216715" source="BUGZILLA"/>
		<reference ref_id="1219960" ref_url="https://bugzilla.suse.com/1219960" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-25111" ref_url="https://www.suse.com/security/cve/CVE-2024-25111/" source="CVE"/>
		<reference ref_id="CVE-2024-25617" ref_url="https://www.suse.com/security/cve/CVE-2024-25617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1113-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034847.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2024-25617: Fixes denial of service in HTTP header parser (bsc#1219960)
- CVE-2024-25111: Fixes Chunked Encoding Stack Overflow (bsc#1216715)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-04"/>
	<updated date="2024-04-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216715">SUSE bug 1216715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219960">SUSE bug 1219960</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25111/">CVE-2024-25111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25111">CVE-2024-25111 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25617/">CVE-2024-25617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25617">CVE-2024-25617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853175" comment="squid-5.7-150400.3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4613" version="1" class="patch">
	<metadata>
		<title>Security update for gradle, gradle-bootstrap (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1145903" ref_url="https://bugzilla.suse.com/1145903" source="BUGZILLA"/>
		<reference ref_id="1184799" ref_url="https://bugzilla.suse.com/1184799" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15052" ref_url="https://www.suse.com/security/cve/CVE-2019-15052/" source="CVE"/>
		<reference ref_id="CVE-2021-29429" ref_url="https://www.suse.com/security/cve/CVE-2021-29429/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1119-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034851.html" source="SUSE-SU"/>
		<description>
This update for gradle, gradle-bootstrap fixes the following issues:

- CVE-2021-29429: Fixed information disclosure through temporary directory permissions (bsc#1184799).
- CVE-2019-15052: Fixed authentication credentials disclosure (bsc#1145903).

gradle:

- Fixed RPM package building issues due to changed dependencies

gradle-bootstrap:

- Added missing dependency of aopalliance
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-05"/>
	<updated date="2024-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1145903">SUSE bug 1145903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184799">SUSE bug 1184799</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2019-15052/">CVE-2019-15052 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-15052">CVE-2019-15052 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29429/">CVE-2021-29429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29429">CVE-2021-29429 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853252" comment="gpars-bootstrap-1.2.1-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853253" comment="gradle-4.4.1-150200.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853254" comment="gradle-bootstrap-4.4.1-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853255" comment="groovy-bootstrap-2.4.21-150200.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4614" version="1" class="patch">
	<metadata>
		<title>Security update for go1.22 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218424" ref_url="https://bugzilla.suse.com/1218424" source="BUGZILLA"/>
		<reference ref_id="1221400" ref_url="https://bugzilla.suse.com/1221400" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1121-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034852.html" source="SUSE-SU"/>
		<description>
This update for go1.22 fixes the following issues:

- CVE-2023-45288: Fixed denial of service via HTTP/2 continuation frames (bsc#1221400)
                                                                                
Other changes:                                                                  
- go minor release upgrade to 1.22.2 (bsc#1218424)  
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-05"/>
	<updated date="2024-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218424">SUSE bug 1218424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221400">SUSE bug 1221400</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853256" comment="go1.22-1.22.2-150000.1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853257" comment="go1.22-doc-1.22.2-150000.1.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853258" comment="go1.22-race-1.22.2-150000.1.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4615" version="1" class="patch">
	<metadata>
		<title>Security update for go1.21 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="1221400" ref_url="https://bugzilla.suse.com/1221400" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1122-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034854.html" source="SUSE-SU"/>
		<description>
This update for go1.21 fixes the following issues:

- CVE-2023-45288: Fixed denial of service via HTTP/2 continuation frames (bsc#1221400)
                                                                                
Other changes:                                                                  
- go minor release upgrade to 1.21.9 (bsc#1212475)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-05"/>
	<updated date="2024-04-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221400">SUSE bug 1221400</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853259" comment="go1.21-1.21.9-150000.1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853260" comment="go1.21-doc-1.21.9-150000.1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853261" comment="go1.21-race-1.21.9-150000.1.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4616" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219559" ref_url="https://bugzilla.suse.com/1219559" source="BUGZILLA"/>
		<reference ref_id="1221289" ref_url="https://bugzilla.suse.com/1221289" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<reference ref_id="CVE-2024-28757" ref_url="https://www.suse.com/security/cve/CVE-2024-28757/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018262.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2023-52425: Fixed a DoS caused by processing large tokens. (bsc#1219559) 
- CVE-2024-28757: Fixed an XML Entity Expansion. (bsc#1221289)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219559">SUSE bug 1219559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221289">SUSE bug 1221289</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28757/">CVE-2024-28757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28757">CVE-2024-28757 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853305" comment="expat-2.4.4-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853306" comment="libexpat-devel-2.4.4-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853307" comment="libexpat-devel-32bit-2.4.4-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853308" comment="libexpat1-2.4.4-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853309" comment="libexpat1-32bit-2.4.4-150400.3.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4617" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220061" ref_url="https://bugzilla.suse.com/1220061" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45918" ref_url="https://www.suse.com/security/cve/CVE-2023-45918/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1133-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034889.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

- CVE-2023-45918: Fixed NULL pointer dereference via corrupted xterm-256color file (bsc#1220061).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1220061">SUSE bug 1220061</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-45918/">CVE-2023-45918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45918">CVE-2023-45918 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853310" comment="libncurses5-6.1-150000.5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853311" comment="libncurses5-32bit-6.1-150000.5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853312" comment="libncurses6-6.1-150000.5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853313" comment="libncurses6-32bit-6.1-150000.5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853314" comment="ncurses-devel-6.1-150000.5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853315" comment="ncurses-devel-32bit-6.1-150000.5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853316" comment="ncurses-utils-6.1-150000.5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853317" comment="ncurses5-devel-6.1-150000.5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853318" comment="ncurses5-devel-32bit-6.1-150000.5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853319" comment="tack-6.1-150000.5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853320" comment="terminfo-6.1-150000.5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853321" comment="terminfo-base-6.1-150000.5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853322" comment="terminfo-iterm-6.1-150000.5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853323" comment="terminfo-screen-6.1-150000.5.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4618" version="1" class="patch">
	<metadata>
		<title>Security update for c-ares (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220279" ref_url="https://bugzilla.suse.com/1220279" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-25629" ref_url="https://www.suse.com/security/cve/CVE-2024-25629/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034886.html" source="SUSE-SU"/>
		<description>
This update for c-ares fixes the following issues:

- CVE-2024-25629: Fixed out of bounds read in ares__read_line() (bsc#1220279).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1220279">SUSE bug 1220279</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25629/">CVE-2024-25629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25629">CVE-2024-25629 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853324" comment="c-ares-devel-1.19.1-150000.3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853325" comment="c-ares-utils-1.19.1-150000.3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853326" comment="libcares2-1.19.1-150000.3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853327" comment="libcares2-32bit-1.19.1-150000.3.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4619" version="1" class="patch">
	<metadata>
		<title>Security update for helm (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219969" ref_url="https://bugzilla.suse.com/1219969" source="BUGZILLA"/>
		<reference ref_id="1220207" ref_url="https://bugzilla.suse.com/1220207" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-25620" ref_url="https://www.suse.com/security/cve/CVE-2024-25620/" source="CVE"/>
		<reference ref_id="CVE-2024-26147" ref_url="https://www.suse.com/security/cve/CVE-2024-26147/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034885.html" source="SUSE-SU"/>
		<description>
This update for helm fixes the following issues:

- CVE-2024-25620: Fixed with dependency management path traversal (bsc#1219969).
- CVE-2024-26147: Fixed uninitialized variable in yaml parsing (bsc#1220207).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219969">SUSE bug 1219969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220207">SUSE bug 1220207</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-25620/">CVE-2024-25620 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25620">CVE-2024-25620 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26147/">CVE-2024-26147 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26147">CVE-2024-26147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853328" comment="helm-3.13.3-150000.1.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853329" comment="helm-bash-completion-3.13.3-150000.1.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853330" comment="helm-fish-completion-3.13.3-150000.1.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853331" comment="helm-zsh-completion-3.13.3-150000.1.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4620" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1221323" ref_url="https://bugzilla.suse.com/1221323" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-22655" ref_url="https://www.suse.com/security/cve/CVE-2023-22655/" source="CVE"/>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<reference ref_id="CVE-2023-38575" ref_url="https://www.suse.com/security/cve/CVE-2023-38575/" source="CVE"/>
		<reference ref_id="CVE-2023-39368" ref_url="https://www.suse.com/security/cve/CVE-2023-39368/" source="CVE"/>
		<reference ref_id="CVE-2023-43490" ref_url="https://www.suse.com/security/cve/CVE-2023-43490/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034883.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated to Intel CPU Microcode 20240312 release. (bsc#1221323)
- CVE-2023-39368: Protection mechanism failure of bus lock regulator
  for some Intel Processors may allow an unauthenticated user to
  potentially enable denial of service via network access
- CVE-2023-38575: Non-transparent sharing of return predictor targets
  between contexts in some Intel Processors may allow an authorized
  user to potentially enable information disclosure via local access.
- CVE-2023-28746: Information exposure through microarchitectural
  state after transient execution from some register files for some
  Intel Atom Processors may allow an authenticated user to potentially
  enable information disclosure via local access.
- CVE-2023-22655 Protection mechanism failure in some 3rd and 4th
  Generation Intel Xeon Processors when using Intel SGX or Intel TDX
  may allow a privileged user to potentially enable escalation of
  privilege via local access.
- CVE-2023-43490: Incorrect calculation in microcode keying mechanism
  for some Intel Xeon D Processors with Intel? SGX may allow a
  privileged user to potentially enable information disclosure via
  local access.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1221323">SUSE bug 1221323</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-22655/">CVE-2023-22655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-22655">CVE-2023-22655 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-38575/">CVE-2023-38575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38575">CVE-2023-38575 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39368/">CVE-2023-39368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39368">CVE-2023-39368 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-43490/">CVE-2023-43490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-43490">CVE-2023-43490 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853332" comment="ucode-intel-20240312-150200.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4621" version="1" class="patch">
	<metadata>
		<title>Security update for xwayland (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218582" ref_url="https://bugzilla.suse.com/1218582" source="BUGZILLA"/>
		<reference ref_id="1218583" ref_url="https://bugzilla.suse.com/1218583" source="BUGZILLA"/>
		<reference ref_id="1218584" ref_url="https://bugzilla.suse.com/1218584" source="BUGZILLA"/>
		<reference ref_id="1218585" ref_url="https://bugzilla.suse.com/1218585" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-6816" ref_url="https://www.suse.com/security/cve/CVE-2023-6816/" source="CVE"/>
		<reference ref_id="CVE-2024-0229" ref_url="https://www.suse.com/security/cve/CVE-2024-0229/" source="CVE"/>
		<reference ref_id="CVE-2024-21885" ref_url="https://www.suse.com/security/cve/CVE-2024-21885/" source="CVE"/>
		<reference ref_id="CVE-2024-21886" ref_url="https://www.suse.com/security/cve/CVE-2024-21886/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017670.html" source="SUSE-SU"/>
		<description>
This update for xwayland fixes the following issues:

  - CVE-2023-6816: Fixed heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (bsc#1218582)
  - CVE-2024-0229: Fixed reattaching to different master device may lead to out-of-bounds memory access (bsc#1218583)
  - CVE-2024-21885: Fixed heap buffer overflow in XISendDeviceHierarchyEvent (bsc#1218584)
  - CVE-2024-21886: Fixed heap buffer overflow in DisableDevice (bsc#1218585)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-16"/>
	<updated date="2024-01-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218582">SUSE bug 1218582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218583">SUSE bug 1218583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218584">SUSE bug 1218584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218585">SUSE bug 1218585</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6816/">CVE-2023-6816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6816">CVE-2023-6816 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0229/">CVE-2024-0229 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0229">CVE-2024-0229 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21885/">CVE-2024-21885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21885">CVE-2024-21885 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21886/">CVE-2024-21886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21886">CVE-2024-21886 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009819604" comment="xwayland-22.1.5-150500.7.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819605" comment="xwayland-devel-22.1.5-150500.7.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4622" version="1" class="patch">
	<metadata>
		<title>Security update for buildah (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219563" ref_url="https://bugzilla.suse.com/1219563" source="BUGZILLA"/>
		<reference ref_id="1220568" ref_url="https://bugzilla.suse.com/1220568" source="BUGZILLA"/>
		<reference ref_id="1221677" ref_url="https://bugzilla.suse.com/1221677" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-1753" ref_url="https://www.suse.com/security/cve/CVE-2024-1753/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1143-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034879.html" source="SUSE-SU"/>
		<description>
This update for buildah fixes the following issues:

- CVE-2024-1753: Fixed an issue to prevent a full container escape at build time. (bsc#1221677)
- Update to version 1.34.1 for compatibility with Docker 25.0
  (which is not in SLES yet, but will eventually be) (bsc#1219563).
  See the corresponding release notes:
  * https://github.com/containers/buildah/releases/tag/v1.34.1
  * https://github.com/containers/buildah/releases/tag/v1.34.0
  * https://github.com/containers/buildah/releases/tag/v1.33.0
  * https://github.com/containers/buildah/releases/tag/v1.32.0
  * https://github.com/containers/buildah/releases/tag/v1.31.0
  * https://github.com/containers/buildah/releases/tag/v1.30.0

- Require cni-plugins (bsc#1220568)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219563">SUSE bug 1219563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220568">SUSE bug 1220568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221677">SUSE bug 1221677</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1753/">CVE-2024-1753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1753">CVE-2024-1753 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853333" comment="buildah-1.34.1-150500.3.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4623" version="1" class="patch">
	<metadata>
		<title>Security update for podman (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1221677" ref_url="https://bugzilla.suse.com/1221677" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-1753" ref_url="https://www.suse.com/security/cve/CVE-2024-1753/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034876.html" source="SUSE-SU"/>
		<description>
This update for podman fixes the following issues:

- CVE-2024-1753: Fixed an issue to prevent a full container escape at build time. (bsc#1221677)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221677">SUSE bug 1221677</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1753/">CVE-2024-1753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1753">CVE-2024-1753 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853334" comment="podman-4.8.3-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853335" comment="podman-docker-4.8.3-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853336" comment="podman-remote-4.8.3-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853337" comment="podmansh-4.8.3-150500.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4624" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1221327" ref_url="https://bugzilla.suse.com/1221327" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5388" ref_url="https://www.suse.com/security/cve/CVE-2023-5388/" source="CVE"/>
		<reference ref_id="CVE-2024-0743" ref_url="https://www.suse.com/security/cve/CVE-2024-0743/" source="CVE"/>
		<reference ref_id="CVE-2024-2605" ref_url="https://www.suse.com/security/cve/CVE-2024-2605/" source="CVE"/>
		<reference ref_id="CVE-2024-2607" ref_url="https://www.suse.com/security/cve/CVE-2024-2607/" source="CVE"/>
		<reference ref_id="CVE-2024-2608" ref_url="https://www.suse.com/security/cve/CVE-2024-2608/" source="CVE"/>
		<reference ref_id="CVE-2024-2610" ref_url="https://www.suse.com/security/cve/CVE-2024-2610/" source="CVE"/>
		<reference ref_id="CVE-2024-2611" ref_url="https://www.suse.com/security/cve/CVE-2024-2611/" source="CVE"/>
		<reference ref_id="CVE-2024-2612" ref_url="https://www.suse.com/security/cve/CVE-2024-2612/" source="CVE"/>
		<reference ref_id="CVE-2024-2614" ref_url="https://www.suse.com/security/cve/CVE-2024-2614/" source="CVE"/>
		<reference ref_id="CVE-2024-2616" ref_url="https://www.suse.com/security/cve/CVE-2024-2616/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034875.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Mozilla Thunderbird 115.9 (bsc#1221327)
- CVE-2024-0743: Crash in NSS TLS method
- CVE-2024-2605: Windows Error Reporter could be used as a Sandbox escape vector
- CVE-2024-2607: JIT code failed to save return registers on Armv7-A
- CVE-2024-2608: Integer overflow could have led to out of bounds write
- CVE-2024-2616: Improve handling of out-of-memory conditions in ICU
- CVE-2023-5388: NSS susceptible to timing attack against RSA decryption
- CVE-2024-2610: Improper handling of html and body tags enabled CSP nonce leakage
- CVE-2024-2611: Clickjacking vulnerability could have led to a user accidentally granting permissions
- CVE-2024-2612: Self referencing object could have potentially led to a use- after-free
- CVE-2024-2614: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221327">SUSE bug 1221327</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5388/">CVE-2023-5388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5388">CVE-2023-5388 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0743/">CVE-2024-0743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0743">CVE-2024-0743 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2605/">CVE-2024-2605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2605">CVE-2024-2605 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2607/">CVE-2024-2607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2607">CVE-2024-2607 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2608/">CVE-2024-2608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2608">CVE-2024-2608 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2610/">CVE-2024-2610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2610">CVE-2024-2610 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2611/">CVE-2024-2611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2611">CVE-2024-2611 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2612/">CVE-2024-2612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2612">CVE-2024-2612 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2614/">CVE-2024-2614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2614">CVE-2024-2614 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-2616/">CVE-2024-2616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2616">CVE-2024-2616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853338" comment="MozillaThunderbird-115.9.0-150200.8.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853339" comment="MozillaThunderbird-translations-common-115.9.0-150200.8.154.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853340" comment="MozillaThunderbird-translations-other-115.9.0-150200.8.154.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4625" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1179610" ref_url="https://bugzilla.suse.com/1179610" source="BUGZILLA"/>
		<reference ref_id="1183045" ref_url="https://bugzilla.suse.com/1183045" source="BUGZILLA"/>
		<reference ref_id="1211162" ref_url="https://bugzilla.suse.com/1211162" source="BUGZILLA"/>
		<reference ref_id="1211226" ref_url="https://bugzilla.suse.com/1211226" source="BUGZILLA"/>
		<reference ref_id="1212139" ref_url="https://bugzilla.suse.com/1212139" source="BUGZILLA"/>
		<reference ref_id="1212584" ref_url="https://bugzilla.suse.com/1212584" source="BUGZILLA"/>
		<reference ref_id="1214117" ref_url="https://bugzilla.suse.com/1214117" source="BUGZILLA"/>
		<reference ref_id="1214747" ref_url="https://bugzilla.suse.com/1214747" source="BUGZILLA"/>
		<reference ref_id="1214823" ref_url="https://bugzilla.suse.com/1214823" source="BUGZILLA"/>
		<reference ref_id="1215237" ref_url="https://bugzilla.suse.com/1215237" source="BUGZILLA"/>
		<reference ref_id="1215696" ref_url="https://bugzilla.suse.com/1215696" source="BUGZILLA"/>
		<reference ref_id="1215885" ref_url="https://bugzilla.suse.com/1215885" source="BUGZILLA"/>
		<reference ref_id="1215952" ref_url="https://bugzilla.suse.com/1215952" source="BUGZILLA"/>
		<reference ref_id="1216032" ref_url="https://bugzilla.suse.com/1216032" source="BUGZILLA"/>
		<reference ref_id="1216057" ref_url="https://bugzilla.suse.com/1216057" source="BUGZILLA"/>
		<reference ref_id="1216559" ref_url="https://bugzilla.suse.com/1216559" source="BUGZILLA"/>
		<reference ref_id="1216776" ref_url="https://bugzilla.suse.com/1216776" source="BUGZILLA"/>
		<reference ref_id="1217036" ref_url="https://bugzilla.suse.com/1217036" source="BUGZILLA"/>
		<reference ref_id="1217217" ref_url="https://bugzilla.suse.com/1217217" source="BUGZILLA"/>
		<reference ref_id="1217250" ref_url="https://bugzilla.suse.com/1217250" source="BUGZILLA"/>
		<reference ref_id="1217602" ref_url="https://bugzilla.suse.com/1217602" source="BUGZILLA"/>
		<reference ref_id="1217692" ref_url="https://bugzilla.suse.com/1217692" source="BUGZILLA"/>
		<reference ref_id="1217790" ref_url="https://bugzilla.suse.com/1217790" source="BUGZILLA"/>
		<reference ref_id="1217801" ref_url="https://bugzilla.suse.com/1217801" source="BUGZILLA"/>
		<reference ref_id="1217822" ref_url="https://bugzilla.suse.com/1217822" source="BUGZILLA"/>
		<reference ref_id="1217927" ref_url="https://bugzilla.suse.com/1217927" source="BUGZILLA"/>
		<reference ref_id="1217933" ref_url="https://bugzilla.suse.com/1217933" source="BUGZILLA"/>
		<reference ref_id="1217938" ref_url="https://bugzilla.suse.com/1217938" source="BUGZILLA"/>
		<reference ref_id="1217946" ref_url="https://bugzilla.suse.com/1217946" source="BUGZILLA"/>
		<reference ref_id="1217947" ref_url="https://bugzilla.suse.com/1217947" source="BUGZILLA"/>
		<reference ref_id="1217980" ref_url="https://bugzilla.suse.com/1217980" source="BUGZILLA"/>
		<reference ref_id="1217981" ref_url="https://bugzilla.suse.com/1217981" source="BUGZILLA"/>
		<reference ref_id="1217982" ref_url="https://bugzilla.suse.com/1217982" source="BUGZILLA"/>
		<reference ref_id="1218056" ref_url="https://bugzilla.suse.com/1218056" source="BUGZILLA"/>
		<reference ref_id="1218092" ref_url="https://bugzilla.suse.com/1218092" source="BUGZILLA"/>
		<reference ref_id="1218139" ref_url="https://bugzilla.suse.com/1218139" source="BUGZILLA"/>
		<reference ref_id="1218184" ref_url="https://bugzilla.suse.com/1218184" source="BUGZILLA"/>
		<reference ref_id="1218229" ref_url="https://bugzilla.suse.com/1218229" source="BUGZILLA"/>
		<reference ref_id="1218234" ref_url="https://bugzilla.suse.com/1218234" source="BUGZILLA"/>
		<reference ref_id="1218253" ref_url="https://bugzilla.suse.com/1218253" source="BUGZILLA"/>
		<reference ref_id="1218258" ref_url="https://bugzilla.suse.com/1218258" source="BUGZILLA"/>
		<reference ref_id="1218335" ref_url="https://bugzilla.suse.com/1218335" source="BUGZILLA"/>
		<reference ref_id="1218357" ref_url="https://bugzilla.suse.com/1218357" source="BUGZILLA"/>
		<reference ref_id="1218397" ref_url="https://bugzilla.suse.com/1218397" source="BUGZILLA"/>
		<reference ref_id="1218447" ref_url="https://bugzilla.suse.com/1218447" source="BUGZILLA"/>
		<reference ref_id="1218461" ref_url="https://bugzilla.suse.com/1218461" source="BUGZILLA"/>
		<reference ref_id="1218515" ref_url="https://bugzilla.suse.com/1218515" source="BUGZILLA"/>
		<reference ref_id="1218559" ref_url="https://bugzilla.suse.com/1218559" source="BUGZILLA"/>
		<reference ref_id="1218569" ref_url="https://bugzilla.suse.com/1218569" source="BUGZILLA"/>
		<reference ref_id="1218643" ref_url="https://bugzilla.suse.com/1218643" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26555" ref_url="https://www.suse.com/security/cve/CVE-2020-26555/" source="CVE"/>
		<reference ref_id="CVE-2023-51779" ref_url="https://www.suse.com/security/cve/CVE-2023-51779/" source="CVE"/>
		<reference ref_id="CVE-2023-6121" ref_url="https://www.suse.com/security/cve/CVE-2023-6121/" source="CVE"/>
		<reference ref_id="CVE-2023-6531" ref_url="https://www.suse.com/security/cve/CVE-2023-6531/" source="CVE"/>
		<reference ref_id="CVE-2023-6546" ref_url="https://www.suse.com/security/cve/CVE-2023-6546/" source="CVE"/>
		<reference ref_id="CVE-2023-6606" ref_url="https://www.suse.com/security/cve/CVE-2023-6606/" source="CVE"/>
		<reference ref_id="CVE-2023-6610" ref_url="https://www.suse.com/security/cve/CVE-2023-6610/" source="CVE"/>
		<reference ref_id="CVE-2023-6622" ref_url="https://www.suse.com/security/cve/CVE-2023-6622/" source="CVE"/>
		<reference ref_id="CVE-2023-6931" ref_url="https://www.suse.com/security/cve/CVE-2023-6931/" source="CVE"/>
		<reference ref_id="CVE-2023-6932" ref_url="https://www.suse.com/security/cve/CVE-2023-6932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447).
- CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946).
- CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559).
- CVE-2020-26555: Fixed Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B that may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN (bsc#1179610 bsc#1215237).
- CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947).
- CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1218335).
- CVE-2023-6931: Fixed a heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component that could lead to local privilege escalation. (bsc#1218258).
- CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's ipv4: igmp component that could lead to local privilege escalation (bsc#1218253).
- CVE-2023-6622: Fixed a null pointer dereference vulnerability in nft_dynset_init() that could allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service (bsc#1217938).
- CVE-2023-6121: Fixed an out-of-bounds read vulnerability in the NVMe-oF/TCP subsystem that could lead to information leak (bsc#1217250).

The following non-security bugs were fixed:

- Documentation: KVM: add separate directories for architecture-specific documentation (jsc#PED-7167).
- Documentation: KVM: update amd-memory-encryption.rst references (jsc#PED-7167).
- Documentation: KVM: update msr.rst reference (jsc#PED-7167).
- Documentation: KVM: update s390-diag.rst reference (jsc#PED-7167).
- Documentation: KVM: update s390-pv.rst reference (jsc#PED-7167).
- Documentation: drop more IDE boot options and ide-cd.rst (git-fixes).
- Documentation: qat: Use code block for qat sysfs example (git-fixes).
- Drop Documentation/ide/ (git-fixes).
- Fix crash on screen resize (bsc#1218229)
- Fix drm gem object underflow (bsc#1218092)
- KVM: arm64: Prevent kmemleak from accessing pKVM memory (jsc#PED-7167).
- KVM: s390/mm: Properly reset no-dat (git-fixes bsc#1218056).
- KVM: s390: vsie: fix wrong VIR 37 when MSO is used (git-fixes bsc#1217933).
- Revert 'PCI/ASPM: Remove pcie_aspm_pm_state_change()' (git-fixes).
- Revert 'PCI: acpiphp: Reassign resources on bridge if necessary' (git-fixes).
- Revert 'md: unlock mddev before reap sync_thread in action_store' (git-fixes).
- Revert 'swiotlb: panic if nslabs is too small' (git-fixes).
- Revert 'xhci: Loosen RPM as default policy to cover for AMD xHC 1.1' (git-fixes).
- USB: serial: ftdi_sio: update Actisense PIDs constant names (git-fixes).
- USB: serial: option: add Foxconn T99W265 with new baseline (git-fixes).
- USB: serial: option: add Quectel EG912Y module support (git-fixes).
- USB: serial: option: add Quectel RM500Q R13 firmware support (git-fixes).
- Update: drm/vmwgfx: Keep a gem reference to user bos in surfaces
- acpi: video: Add backlight=native DMI quirk for Lenovo Ideapad Z470 (git-fixes).
- acpi: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects (git-fixes).
- acpica: Add AML_NO_OPERAND_RESOLVE flag to Timer (git-fixes).
- afs: Fix afs_server_list to be cleaned up with RCU (git-fixes).
- afs: Fix dynamic root lookup DNS check (git-fixes).
- afs: Fix file locking on R/O volumes to operate in local mode (git-fixes).
- afs: Fix overwriting of result of DNS query (git-fixes).
- afs: Fix refcount underflow from error handling race (git-fixes).
- afs: Fix the dynamic root's d_delete to always delete unused dentries (git-fixes).
- afs: Fix use-after-free due to get/remove race in volume tree (git-fixes).
- afs: Make error on cell lookup failure consistent with OpenAFS (git-fixes).
- afs: Return ENOENT if no cell DNS record can be found (git-fixes).
- alsa: hda - Fix speaker and headset mic pin config for CHUWI CoreBook XPro (git-fixes).
- alsa: hda/hdmi: add force-connect quirk for NUC5CPYB (git-fixes).
- alsa: hda/hdmi: add force-connect quirks for ASUSTeK Z170 variants (git-fixes).
- alsa: hda/realtek: Add Framework laptop 16 to quirks (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS ROG GV302XA (git-fixes).
- alsa: hda/realtek: Add supported ALC257 for ChromeOS (git-fixes).
- alsa: hda/realtek: Apply mute LED quirk for HP15-db (git-fixes).
- alsa: hda/realtek: Enable headset on Lenovo M90 Gen5 (git-fixes).
- alsa: hda/realtek: Fix mute and mic-mute LEDs for HP ProBook 440 G6 (git-fixes).
- alsa: hda/realtek: Headset Mic VREF to 100% (git-fixes).
- alsa: hda/realtek: add new Framework laptop to quirks (git-fixes).
- alsa: hda/realtek: enable SND_PCI_QUIRK for hp pavilion 14-ec1xxx series (git-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs for a HP ZBook (git-fixes).
- alsa: hda/realtek: fix speakers on XPS 9530 (2023) (git-fixes).
- alsa: hda: intel-dsp-cfg: add LunarLake support (git-fixes).
- alsa: pcm: fix out-of-bounds in snd_pcm_state_names (git-fixes).
- alsa: seq: oss: Fix racy open/close of MIDI devices (git-fixes).
- alsa: usb-audio: Add Pioneer DJM-450 mixer controls (git-fixes).
- alsa: usb-audio: Increase delay in MOTU M quirk (git-fixes).
- apparmor: Free up __cleanup() name (jsc#PED-7167).
- arm64: dts: arm: add missing cache properties (git-fixes)
- arm64: dts: imx8mm: Add sound-dai-cells to micfil node (git-fixes)
- arm64: dts: imx8mn: Add sound-dai-cells to micfil node (git-fixes)
- arm64: dts: imx8mq-librem5: Remove dis_u3_susphy_quirk from (git-fixes)
- arm64: kdump: Skip kmemleak scan reserved memory for kdump (jsc#PED-7167).
- arm64: mm: Fix 'rodata=on' when CONFIG_RODATA_FULL_DEFAULT_ENABLED=y (git-fixes)
- arm: oMAP2+: Fix null pointer dereference and memory leak in omap_soc_device_init (git-fixes).
- arm: pL011: Fix DMA support (git-fixes).
- asoc: fsl_rpmsg: Fix error handler with pm_runtime_enable (git-fixes).
- asoc: hdmi-codec: fix missing report for jack initial status (git-fixes).
- asoc: meson: g12a-toacodec: Fix event generation (git-fixes).
- asoc: meson: g12a-toacodec: Validate written enum values (git-fixes).
- asoc: meson: g12a-tohdmitx: Fix event generation for S/PDIF mux (git-fixes).
- asoc: meson: g12a-tohdmitx: Validate written enum values (git-fixes).
- asoc: wm_adsp: fix memleak in wm_adsp_buffer_populate (git-fixes).
- bitmap: unify find_bit operations (jsc#PED-7167).
- block: fix revalidate performance regression (bsc#1216057).
- bluetooth: Fix deadlock in vhci_send_frame (git-fixes).
- bluetooth: L2CAP: Send reject on command corrupted request (git-fixes).
- bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE (git-fixes).
- bluetooth: btusb: Add new PID/VID 0489:e0f2 for MT7921 (bsc#1218461).
- bluetooth: hci_event: Fix not checking if HCI_OP_INQUIRY has been sent (git-fixes).
- bluetooth: hci_event: shut up a false-positive warning (git-fixes).
- bluetooth: hci_qca: Fix the teardown problem for real (git-fixes).
- bnxt: do not handle XDP in netpoll (jsc#PED-1495).
- bnxt_en: Clear resource reservation during resume (jsc#PED-1495).
- bnxt_en: Fix HWTSTAMP_FILTER_ALL packet timestamp logic (jsc#PED-1495).
- bnxt_en: Fix max_mtu setting for multi-buf XDP (jsc#PED-1495).
- bnxt_en: Fix page pool logic for page size &gt;= 64K (jsc#PED-1495).
- bnxt_en: Fix wrong return value check in bnxt_close_nic() (jsc#PED-1495).
- bnxt_en: Flush XDP for bnxt_poll_nitroa0()'s NAPI (jsc#PED-1495).
- bpf: Adjust insufficient default bpf_jit_limit (bsc#1218234 git-fixes).
- bus: ti-sysc: Flush posted write only after srst_udelay (git-fixes).
- ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1217980).
- ceph: fix type promotion bug on 32bit systems (bsc#1217982).
- cleanup: Make no_free_ptr() __must_check (jsc#PED-7167).
- clocksource: Add a Kconfig option for WATCHDOG_MAX_SKEW (bsc#1215885 bsc#1217217).
- clocksource: Enable TSC watchdog checking of HPET and PMTMR only when requested (bsc#1215885 bsc#1217217).
- clocksource: Handle negative skews in 'skew is too large' messages (bsc#1215885 bsc#1217217).
- clocksource: Improve 'skew is too large' messages (bsc#1215885 bsc#1217217).
- clocksource: Improve read-back-delay message (bsc#1215885 bsc#1217217).
- clocksource: Loosen clocksource watchdog constraints (bsc#1215885 bsc#1217217).
- clocksource: Print clocksource name when clocksource is tested unstable (bsc#1215885 bsc#1217217).
- clocksource: Verify HPET and PMTMR when TSC unverified (bsc#1215885 bsc#1217217).
- configfs-tsm: Introduce a shared ABI for attestation reports (jsc#PED-7167).
- crypto: ccp - Add SEV_INIT rc error logging on init (jsc#PED-7167).
- crypto: ccp - Add SEV_INIT_EX support (jsc#PED-7167).
- crypto: ccp - Add a header for multiple drivers to use `__psp_pa` (jsc#PED-7167).
- crypto: ccp - Add a quirk to firmware update (jsc#PED-7167).
- crypto: ccp - Add psp_init_on_probe module parameter (jsc#PED-7167).
- crypto: ccp - Drop TEE support for IRQ handler (jsc#PED-7167).
- crypto: ccp - Ensure psp_ret is always init'd in __sev_platform_init_locked() (jsc#PED-7167).
- crypto: ccp - Fail the PSP initialization when writing psp data file failed (jsc#PED-7167).
- crypto: ccp - Fix the INIT_EX data file open failure (jsc#PED-7167).
- crypto: ccp - Fix whitespace in sev_cmd_buffer_len() (jsc#PED-7167).
- crypto: ccp - Flush the SEV-ES TMR memory before giving it to firmware (jsc#PED-7167).
- crypto: ccp - Initialize PSP when reading psp data file failed (jsc#PED-7167).
- crypto: ccp - Log when resetting PSP SEV state (jsc#PED-7167).
- crypto: ccp - Move SEV_INIT retry for corrupted data (jsc#PED-7167).
- crypto: ccp - Move some PSP mailbox bit definitions into common header (jsc#PED-7167).
- crypto: ccp - Name -1 return value as SEV_RET_NO_FW_CALL (jsc#PED-7167).
- crypto: ccp - Refactor out sev_fw_alloc() (jsc#PED-7167).
- crypto: ccp - remove unneeded semicolon (jsc#PED-7167).
- crypto: ccp: Get rid of __sev_platform_init_locked()'s local function pointer (jsc#PED-7167).
- dm verity: initialize fec io before freeing it (git-fixes).
- dm-verity: do not use blocking calls from tasklets (git-fixes).
- dm: add cond_resched() to dm_wq_requeue_work() (git-fixes).
- dm: do not attempt to queue IO under RCU protection (git-fixes).
- dm: fix __send_duplicate_bios() to always allow for splitting IO (bsc#1215952).
- dm: fix improper splitting for abnormal bios (bsc#1215952).
- dm: verity-loadpin: Add NULL pointer check for 'bdev' parameter (git-fixes).
- dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045, bsc#1216776).
- dmaengine: ioat: Free up __cleanup() name (jsc#PED-7167).
- doc/README.SUSE: Add how to update the config for module signing (jsc#PED-5021)
- doc/README.SUSE: Remove how to build modules using kernel-source (jsc#PED-5021)
- doc/README.SUSE: Simplify the list of references (jsc#PED-5021)
- drm/amd/amdgpu: Fix warnings in amdgpu/amdgpu_display.c (git-fixes).
- drm/amdgpu/sdma5.2: add begin/end_use ring callbacks (bsc#1212139).
- drm/amdgpu: Add EEPROM I2C address support for ip discovery (git-fixes).
- drm/amdgpu: Add I2C EEPROM support on smu v13_0_6 (git-fixes).
- drm/amdgpu: Add support for RAS table at 0x40000 (git-fixes).
- drm/amdgpu: Decouple RAS EEPROM addresses from chips (git-fixes).
- drm/amdgpu: Remove redundant I2C EEPROM address (git-fixes).
- drm/amdgpu: Remove second moot switch to set EEPROM I2C address (git-fixes).
- drm/amdgpu: Return from switch early for EEPROM I2C address (git-fixes).
- drm/amdgpu: Update EEPROM I2C address for smu v13_0_0 (git-fixes).
- drm/amdgpu: Update ras eeprom support for smu v13_0_0 and v13_0_10 (git-fixes).
- drm/amdgpu: correct chunk_ptr to a pointer to chunk (git-fixes).
- drm/amdgpu: correct the amdgpu runtime dereference usage count (git-fixes).
- drm/amdgpu: fix tear down order in amdgpu_vm_pt_free (git-fixes).
- drm/amdgpu: simplify amdgpu_ras_eeprom.c (git-fixes).
- drm/bridge: parade-ps8640: Never store more than msg-&gt;size bytes in AUX xfer (git-fixes).
- drm/bridge: ps8640: Fix size mismatch warning w/ len (git-fixes).
- drm/bridge: tc358768: select CONFIG_VIDEOMODE_HELPERS (git-fixes).
- drm/bridge: ti-sn65dsi86: Never store more than msg-&gt;size bytes in AUX xfer (git-fixes).
- drm/i915/display: Drop check for doublescan mode in modevalid (git-fixes).
- drm/i915/dp: Fix passing the correct DPCD_REV for drm_dp_set_phy_test_pattern (git-fixes).
- drm/i915/dpt: Only do the POT stride remap when using DPT (git-fixes).
- drm/i915/lvds: Use REG_BIT() &amp; co (git-fixes).
- drm/i915/mtl: limit second scaler vertical scaling in ver &gt;= 14 (git-fixes).
- drm/i915/sdvo: stop caching has_hdmi_monitor in struct intel_sdvo (git-fixes).
- drm/i915: Fix intel_atomic_setup_scalers() plane_state handling (git-fixes).
- drm/i915: Fix remapped stride with CCS on ADL+ (git-fixes).
- drm/i915: Reject async flips with bigjoiner (git-fixes).
- drm/i915: Relocate intel_atomic_setup_scalers() (git-fixes).
- drm/i915: fix MAX_ORDER usage in i915_gem_object_get_pages_internal() (jsc#PED-7167).
- drm/mediatek: Add spinlock for setting vblank event in atomic_begin (git-fixes).
- drm/mgag200: Fix gamma lut not initialized for G200ER, G200EV, G200SE (git-fixes).
- efi/libstub: Implement support for unaccepted memory (jsc#PED-7167).
- efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory (jsc#PED-7167).
- efi/unaccepted: Fix off-by-one when checking for overlapping ranges (jsc#PED-7167).
- efi/unaccepted: Fix soft lockups caused by parallel memory acceptance (jsc#PED-7167).
- efi/unaccepted: Make sure unaccepted table is mapped (jsc#PED-7167).
- efi/unaccepted: Use ACPI reclaim memory for unaccepted memory table (jsc#PED-7167).
- efi/x86: Get full memory map in allocate_e820() (jsc#PED-7167).
- efi: Add unaccepted memory support (jsc#PED-7167).
- efi: libstub: avoid efi_get_memory_map() for allocating the virt map (jsc#PED-7167).
- efi: libstub: install boot-time memory map as config table (jsc#PED-7167).
- efi: libstub: remove DT dependency from generic stub (jsc#PED-7167).
- efi: libstub: remove pointless goto kludge (jsc#PED-7167).
- efi: libstub: simplify efi_get_memory_map() and struct efi_boot_memmap (jsc#PED-7167).
- efi: libstub: unify initrd loading between architectures (jsc#PED-7167).
- floppy: fix MAX_ORDER usage (jsc#PED-7167).
- fprobe: Fix to ensure the number of active retprobes is not zero (git-fixes).
- fs/jfs: Add check for negative db_l2nbperpage (git-fixes).
- fs/jfs: Add validity check for db_maxag and db_agpref (git-fixes).
- fs/jfs: prevent double-free in dbUnmount() after failed jfs_remount() (git-fixes).
- fs/remap: constrain dedupe of EOF blocks (git-fixes).
- fs: avoid empty option when generating legacy mount string (git-fixes).
- fs: fix an infinite loop in iomap_fiemap (git-fixes).
- fs: ocfs2: namei: check return value of ocfs2_add_entry() (git-fixes).
- genwqe: fix MAX_ORDER usage (jsc#PED-7167).
- gfs2: Add wrapper for iomap_file_buffered_write (git-fixes).
- gfs2: Check sb_bsize_shift after reading superblock (git-fixes).
- gfs2: Clean up function may_grant (git-fixes).
- gfs2: Fix filesystem block deallocation for short writes (git-fixes).
- gfs2: Fix gfs2_release for non-writers regression (git-fixes).
- gfs2: Fix inode height consistency check (git-fixes).
- gfs2: Fix length of holes reported at end-of-file (git-fixes).
- gfs2: Fix possible data races in gfs2_show_options() (git-fixes).
- gfs2: Improve gfs2_make_fs_rw error handling (git-fixes).
- gfs2: Make sure FITRIM minlen is rounded up to fs block size (git-fixes).
- gfs2: Silence 'suspicious RCU usage in gfs2_permission' warning (git-fixes).
- gfs2: Switch from strlcpy to strscpy (git-fixes).
- gfs2: fix an oops in gfs2_permission (git-fixes).
- gfs2: gfs2_setattr_size error path fix (git-fixes).
- gfs2: ignore negated quota changes (git-fixes).
- gfs2: jdata writepage fix (git-fixes).
- gfs2: use i_lock spin_lock for inode qadata (git-fixes).
- gpiolib: sysfs: Fix error handling on failed export (git-fixes).
- gve: Fixes for napi_poll when budget is 0 (git-fixes).
- gve: Use size_add() in call to struct_size() (git-fixes).
- hid: add ALWAYS_POLL quirk for Apple kb (git-fixes).
- hid: glorious: fix Glorious Model I HID report (git-fixes).
- hid: hid-asus: add const to read-only outgoing usb buffer (git-fixes).
- hid: hid-asus: reset the backlight brightness level on resume (git-fixes).
- hid: lenovo: Restrict detection of patched firmware only to USB cptkbd (git-fixes).
- hid: multitouch: Add quirk for HONOR GLO-GXXX touchpad (git-fixes).
- hwmon: (acpi_power_meter) Fix 4.29 MW bug (git-fixes).
- hwmon: (nzxt-kraken2) Fix error handling path in kraken2_probe() (git-fixes).
- i2c: aspeed: Handle the coalesced stop conditions with the start conditions (git-fixes).
- i2c: core: Fix atomic xfer check for non-preempt config (git-fixes).
- i2c: designware: Fix corrupted memory seen in the ISR (git-fixes).
- i40e: Fix I40E_FLAG_VF_VLAN_PRUNING value (jsc#PED-372).
- i40e: Fix VF VLAN offloading when port VLAN is configured (jsc#PED-372).
- i40e: Fix unexpected MFS warning message (jsc#PED-372).
- i40e: Fix wrong check for I40E_TXR_FLAGS_WB_ON_ITR (jsc#PED-372).
- i40e: fix misleading debug logs (jsc#PED-372).
- i40e: fix potential NULL pointer dereferencing of pf-&gt;vf i40e_sync_vsi_filters() (jsc#PED-372).
- i40e: fix potential memory leaks in i40e_remove() (jsc#PED-372).
- i40e: prevent crash on probe if hw registers have invalid values (jsc#PED-372).
- ib/mlx5: Fix init stage error handling to avoid double free of same QP and UAF (git-fixes)
- ib/mlx5: Fix rdma counter binding for RAW QP (git-fixes)
- igb: Avoid starting unnecessary workqueues (jsc#PED-370).
- igb: Change IGB_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-370).
- igb: Fix potential memory leak in igb_add_ethtool_nfc_entry (jsc#PED-370).
- igb: clean up in all error paths when enabling SR-IOV (jsc#PED-370).
- igb: disable virtualization features on 82580 (jsc#PED-370).
- igbvf: Change IGBVF_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-370).
- igc: Change IGC_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-375).
- igc: Expose tx-usecs coalesce setting to user (jsc#PED-375).
- igc: Fix ambiguity in the ethtool advertising (jsc#PED-375).
- igc: Fix infinite initialization loop with early XDP redirect (jsc#PED-375).
- igc: Fix the typo in the PTM Control macro (jsc#PED-375).
- iio: adc: ti_am335x_adc: Fix return value check of tiadc_request_dma() (git-fixes).
- iio: common: ms_sensors: ms_sensors_i2c: fix humidity conversion time table (git-fixes).
- iio: imu: inv_mpu6050: fix an error code problem in inv_mpu6050_read_raw (git-fixes).
- iio: triggered-buffer: prevent possible freeing of wrong buffer (git-fixes).
- input: i8042 - add quirk for TUXEDO Gemini 17 Gen1/Clevo PD70PN (git-fixes).
- input: ipaq-micro-keys - add error handling for devm_kmemdup (git-fixes).
- input: soc_button_array - add mapping for airplane mode button (git-fixes).
- input: xpad - add HyperX Clutch Gladiate Support (git-fixes).
- interconnect: Treat xlate() returning NULL node as an error (git-fixes).
- iomap: Fix iomap_dio_rw return value for user copies (git-fixes).
- iommu: fix MAX_ORDER usage in __iommu_dma_alloc_pages() (jsc#PED-7167).
- iov_iter, x86: Be consistent about the __user tag on copy_mc_to_user() (git-fixes).
- jfs: fix array-index-out-of-bounds in dbFindLeaf (git-fixes).
- jfs: fix array-index-out-of-bounds in diAlloc (git-fixes).
- jfs: fix invalid free of JFS_IP(ipimap)-&gt;i_imap in diUnmount (git-fixes).
- jfs: validate max amount of blocks before allocation (git-fixes).
- kABI: Preserve the type of rethook::handler (git-fixes).
- kABI: restore void return to typec_altmode_attention (git-fixes).
- kabi/severities: ignore kABI for asus-wmi drivers Tolerate the kABI changes, as used only locally for asus-wmi stuff
- kabi/severities: make snp_issue_guest_request PASS (jsc#PED-7167)
- kabi: fix of_reserved_mem_* due to struct vm_struct became defined (jsc#PED-7167).
- kabi: fix sev-dev due to fs_struct became defined (jsc#PED-7167).
- kabi: fix struct efi after adding unaccepted memory table (jsc#PED-7167).
- kabi: fix struct zone kabi after adding unaccepted_pages and NR_UNACCEPTED (jsc#PED-7167).
- kbuild: Drop -Wdeclaration-after-statement (jsc#PED-7167).
- kconfig: fix memory leak from range properties (git-fixes).
- kernel-source: Remove config-options.changes (jsc#PED-5021)
- kprobes: consistent rcu api usage for kretprobe holder (git-fixes).
- lib/vsprintf: Fix %pfwf when current node refcount == 0 (git-fixes).
- libceph: use kernel_connect() (bsc#1217981).
- locking: Introduce __cleanup() based infrastructure (jsc#PED-7167).
- locks: fix KASAN: use-after-free in trace_event_raw_event_filelock_lock (git-fixes).
- md/bitmap: do not set max_write_behind if there is no write mostly device (git-fixes).
- md/md-bitmap: hold 'reconfig_mutex' in backlog_store() (git-fixes).
- md/md-bitmap: remove unnecessary local variable in backlog_store() (git-fixes).
- md/raid0: add discard support for the 'original' layout (git-fixes).
- md/raid10: do not call bio_start_io_acct twice for bio which experienced read error (git-fixes).
- md/raid10: factor out code from wait_barrier() to stop_waiting_barrier() (git-fixes).
- md/raid10: factor out dereference_rdev_and_rrdev() (git-fixes).
- md/raid10: fix io loss while replacement replace rdev (git-fixes).
- md/raid10: fix leak of 'r10bio-&gt;remaining' for recovery (git-fixes).
- md/raid10: fix memleak for 'conf-&gt;bio_split' (git-fixes).
- md/raid10: fix memleak of md thread (git-fixes).
- md/raid10: fix null-ptr-deref in raid10_sync_request (git-fixes).
- md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request (git-fixes).
- md/raid10: fix overflow of md/safe_mode_delay (git-fixes).
- md/raid10: fix task hung in raid10d (git-fixes).
- md/raid10: fix the condition to call bio_end_io_acct() (git-fixes).
- md/raid10: fix wrong setting of max_corr_read_errors (git-fixes).
- md/raid10: prevent soft lockup while flush writes (git-fixes).
- md/raid10: use dereference_rdev_and_rrdev() to get devices (git-fixes).
- md/raid1: fix error: ISO C90 forbids mixed declarations (git-fixes).
- md/raid1: free the r1bio before waiting for blocked rdev (git-fixes).
- md/raid1: hold the barrier until handle_read_error() finishes (git-fixes).
- md/raid5-cache: fix a deadlock in r5l_exit_log() (git-fixes).
- md/raid5-cache: fix null-ptr-deref for r5l_flush_stripe_to_raid() (git-fixes).
- md/raid5: fix miscalculation of 'end_sector' in raid5_read_one_chunk() (git-fixes).
- md: Put the right device in md_seq_next (bsc#1217822).
- md: Set MD_BROKEN for RAID1 and RAID10 (git-fixes).
- md: avoid signed overflow in slot_store() (git-fixes).
- md: do not update recovery_cp when curr_resync is ACTIVE (git-fixes).
- md: drop queue limitation for RAID1 and RAID10 (git-fixes).
- md: raid0: account for split bio in iostat accounting (git-fixes).
- md: raid10 add nowait support (git-fixes).
- md: raid1: fix potential OOB in raid1_remove_disk() (git-fixes).
- md: restore 'noio_flag' for the last mddev_resume() (git-fixes).
- md: select BLOCK_LEGACY_AUTOLOAD (git-fixes).
- memblock: exclude MEMBLOCK_NOMAP regions from kmemleak (jsc#PED-7167).
- memblock: make memblock_find_in_range method private (jsc#PED-7167).
- misc: mei: client.c: fix problem of return '-EOVERFLOW' in mei_cl_write (git-fixes).
- misc: mei: client.c: return negative error code in mei_cl_write (git-fixes).
- mkspec: Add multibuild support (JSC-SLE#5501, boo#1211226, bsc#1218184) When MULTIBUILD option in config.sh is enabled generate a _multibuild file listing all spec files.
- mm/page_alloc: make deferred page init free pages in MAX_ORDER blocks (jsc#PED-7167).
- mm/pgtable: Fix multiple -Wstringop-overflow warnings (jsc#PED-7167).
- mm/slab: Add __free() support for kvfree (jsc#PED-7167).
- mm/slub: fix MAX_ORDER usage in calculate_order() (jsc#PED-7167).
- mm: Add PAGE_ALIGN_DOWN macro (jsc#PED-7167).
- mm: Add support for unaccepted memory (jsc#PED-7167).
- mm: add pageblock_align() macro (jsc#PED-7167).
- mm: add pageblock_aligned() macro (jsc#PED-7167).
- mm: avoid passing 0 to __ffs() (jsc#PED-7167).
- mm: kmem: drop __GFP_NOFAIL when allocating objcg vectors (bsc#1218515).
- mm: move kvmalloc-related functions to slab.h (jsc#PED-7167).
- mm: new primitive kvmemdup() (jsc#PED-7167).
- mm: reuse pageblock_start/end_pfn() macro (jsc#PED-7167).
- mmc: meson-mx-sdhc: Fix initialization frozen issue (git-fixes).
- mmc: rpmb: fixes pause retune on all RPMB partitions (git-fixes).
- mmc: sdhci-sprd: Fix eMMC init failure after hw reset (git-fixes).
- neighbor: tracing: Move pin6 inside CONFIG_IPV6=y section (git-fixes).
- net/rose: Fix Use-After-Free in rose_ioctl (git-fixes).
- net/smc: Fix pos miscalculation in statistics (bsc#1218139).
- net/tg3: fix race condition in tg3_reset_task() (bsc#1217801).
- net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes).
- net: bnxt: fix a potential use-after-free in bnxt_init_tc (jsc#PED-1495).
- net: ena: Destroy correct number of xdp queues upon failure (git-fixes).
- net: ena: Fix XDP redirection error (git-fixes).
- net: ena: Fix xdp drops handling due to multibuf packets (git-fixes).
- net: ena: Flush XDP packets on error (git-fixes).
- net: mana: select PAGE_POOL (git-fixes).
- net: rfkill: gpio: set GPIO direction (git-fixes).
- net: usb: ax88179_178a: avoid failed operations when device is disconnected (git-fixes).
- net: usb: ax88179_178a: clean up pm calls (git-fixes).
- net: usb: ax88179_178a: wol optimizations (git-fixes).
- net: usb: qmi_wwan: claim interface 4 for ZTE MF290 (git-fixes).
- nfc: llcp_core: Hold a ref to llcp_local-&gt;dev when holding a ref to llcp_local (git-fixes).
- nfs: Fix O_DIRECT locking issues (bsc#1211162).
- nfs: Fix a few more clear_bit() instances that need release semantics (bsc#1211162).
- nfs: Fix a potential data corruption (bsc#1211162).
- nfs: Fix a use after free in nfs_direct_join_group() (bsc#1211162).
- nfs: Fix error handling for O_DIRECT write scheduling (bsc#1211162).
- nfs: More O_DIRECT accounting fixes for error paths (bsc#1211162).
- nfs: More fixes for nfs_direct_write_reschedule_io() (bsc#1211162).
- nfs: Use the correct commit info in nfs_join_page_group() (bsc#1211162).
- nfs: only issue commit in DIO codepath if we have uncommitted data (bsc#1211162).
- nilfs2: fix missing error check for sb_set_blocksize call (git-fixes).
- nilfs2: prevent WARNING in nilfs_sufile_set_segment_usage() (git-fixes).
- nlm: Defend against file_lock changes after vfs_test_lock() (bsc#1217692).
- null_blk: fix poll request timeout handling (git-fixes).
- nvme-core: check for too small lba shift (bsc#1214117).
- nvme-pci: Add sleep quirk for Kingston drives (git-fixes).
- nvme-pci: always return an ERR_PTR from nvme_pci_alloc_dev (git-fixes).
- nvme-pci: do not set the NUMA node of device if it has none (git-fixes).
- nvme-pci: factor out a nvme_pci_alloc_dev helper (git-fixes).
- nvme-rdma: do not try to stop unallocated queues (git-fixes).
- nvme: sanitize metadata bounce buffer for reads (git-fixes).
- nvmet-auth: complete a request only after freeing the dhchap pointers (git-fixes).
- of: reserved_mem: Have kmemleak ignore dynamically allocated reserved mem (jsc#PED-7167).
- orangefs: Fix kmemleak in orangefs_prepare_debugfs_help_string() (git-fixes).
- orangefs: Fix kmemleak in orangefs_{kernel,client}_debug_init() (git-fixes).
- orangefs: Fix sysfs not cleanup when dev init failed (git-fixes).
- orangefs: Fix the size of a memory allocation in orangefs_bufmap_alloc() (git-fixes).
- padata: Fix refcnt handling in padata_free_shell() (git-fixes).
- parport: Add support for Brainboxes IX/UC/PX parallel cards (git-fixes).
- pci: loongson: Limit MRRS to 256 (git-fixes).
- perf/core: fix MAX_ORDER usage in rb_alloc_aux_page() (jsc#PED-7167).
- pinctrl: at91-pio4: use dedicated lock class for IRQ (git-fixes).
- platform/surface: aggregator: fix recv_buf() return value (git-fixes).
- platform/x86: asus-wmi: Add support for ROG X13 tablet mode (git-fixes).
- platform/x86: asus-wmi: Adjust tablet/lidflip handling to use enum (git-fixes).
- platform/x86: asus-wmi: Fix kbd_dock_devid tablet-switch reporting (git-fixes).
- platform/x86: asus-wmi: Move i8042 filter install to shared asus-wmi code (git-fixes).
- platform/x86: asus-wmi: Simplify tablet-mode-switch handling (git-fixes).
- platform/x86: asus-wmi: Simplify tablet-mode-switch probing (git-fixes).
- platform/x86: wmi: Allow duplicate GUIDs for drivers that use struct wmi_driver (git-fixes).
- platform/x86: wmi: Skip blocks with zero instances (git-fixes).
- powerpc/pseries/vas: Migration suspend waits for no in-progress open windows (bsc#1218397 ltc#204523).
- qed/red_ll2: Fix undefined behavior bug in struct qed_ll2_info (jsc#PED-1526).
- qed: Fix a potential use-after-free in qed_cxt_tables_alloc (jsc#PED-1526).
- qed: fix LL2 RX buffer allocation (jsc#PED-1526).
- qede: fix firmware halt over suspend and resume (jsc#PED-1526).
- qla2xxx: add debug log for deprecated hw detected (bsc#1216032).
- r8152: Add RTL8152_INACCESSIBLE checks to more loops (git-fixes).
- r8152: Add RTL8152_INACCESSIBLE to r8153_aldps_en() (git-fixes).
- r8152: Add RTL8152_INACCESSIBLE to r8153_pre_firmware_1() (git-fixes).
- r8152: Add RTL8152_INACCESSIBLE to r8156b_wait_loading_flash() (git-fixes).
- r8152: Rename RTL8152_UNPLUG to RTL8152_INACCESSIBLE (git-fixes).
- r8169: Fix PCI error on system resume (git-fixes).
- rdma/bnxt_re: Correct module description string (jsc#PED-1495).
- rdma/core: Use size_{add,sub,mul}() in calls to struct_size() (git-fixes)
- rdma/hfi1: Use FIELD_GET() to extract Link Width (git-fixes)
- rdma/hfi1: Workaround truncation compilation error (git-fixes)
- rdma/hns: Add check for SL (git-fixes)
- rdma/hns: Fix printing level of asynchronous events (git-fixes)
- rdma/hns: Fix signed-unsigned mixed comparisons (git-fixes)
- rdma/hns: Fix uninitialized ucmd in hns_roce_create_qp_common() (git-fixes)
- rdma/hns: The UD mode can only be configured with DCQCN (git-fixes)
- regmap: fix bogus error on regcache_sync success (git-fixes).
- reiserfs: Check the return value from __getblk() (git-fixes).
- reiserfs: Replace 1-element array with C99 style flex-array (git-fixes).
- remove unnecessary WARN_ON_ONCE() (bsc#1214823 bsc#1218569).
- reset: Fix crash when freeing non-existent optional resets (git-fixes).
- restore renamed device IDs for USB HID devices (git-fixes).
- rethook: Fix to use WRITE_ONCE() for rethook:: Handler (git-fixes).
- rethook: Use __rcu pointer for rethook::handler (git-fixes).
- ring-buffer: Do not try to put back write_stamp (git-fixes).
- ring-buffer: Do not update before stamp when switching sub-buffers (git-fixes).
- ring-buffer: Fix a race in rb_time_cmpxchg() for 32 bit archs (git-fixes).
- ring-buffer: Fix memory leak of free page (git-fixes).
- ring-buffer: Fix slowpath of interrupted event (git-fixes).
- ring-buffer: Fix wake ups when buffer_percent is set to 100 (git-fixes).
- ring-buffer: Fix writing to the buffer with max_data_size (git-fixes).
- ring-buffer: Force absolute timestamp on discard of event (git-fixes).
- ring-buffer: Have saved event hold the entire event (git-fixes).
- ring-buffer: Remove useless update to write_stamp in rb_try_to_discard() (git-fixes).
- s390/vx: fix save/restore of fpu kernel context (git-fixes bsc#1218357).
- scsi: lpfc: use unsigned type for num_sge (bsc#1214747).
- serial: 8250: 8250_omap: Clear UART_HAS_RHR_IT_DIS bit (git-fixes).
- serial: 8250: 8250_omap: Do not start RX DMA on THRI interrupt (git-fixes).
- serial: sc16is7xx: address RX timeout interrupt errata (git-fixes).
- soundwire: stream: fix NULL pointer dereference for multi_link (git-fixes).
- spi: atmel: Fix clock issue when using devices with different polarities (git-fixes).
- statfs: enforce statfs[64] structure initialization (git-fixes).
- supported.conf: add drivers/virt/coco/tsm (jsc#PED-7167)
- swiotlb: always set the number of areas before allocating the pool (git-fixes).
- swiotlb: do not panic! (git-fixes).
- swiotlb: fix a braino in the alignment check fix (bsc#1216559).
- swiotlb: fix debugfs reporting of reserved memory pools (git-fixes).
- swiotlb: fix slot alignment checks (bsc#1216559).
- swiotlb: fix the deadlock in swiotlb_do_find_slots (git-fixes).
- swiotlb: mark swiotlb_memblock_alloc() as __init (git-fixes).
- swiotlb: reduce the number of areas to match actual memory pool size (git-fixes).
- swiotlb: reduce the swiotlb buffer size on allocation failure (git-fixes).
- swiotlb: use the calculated number of areas (git-fixes).
- tracing / synthetic: Disable events after testing in synth_event_gen_test_init() (git-fixes).
- tracing/kprobes: Fix the description of variable length arguments (git-fixes).
- tracing/kprobes: Fix the order of argument descriptions (git-fixes).
- tracing/perf: Add interrupt_context_level() helper (git-fixes).
- tracing/synthetic: fix kernel-doc warnings (git-fixes).
- tracing: Always update snapshot buffer size (git-fixes).
- tracing: Disable preemption when using the filter buffer (bsc#1217036).
- tracing: Disable snapshot buffer when stopping instance tracers (git-fixes).
- tracing: Fix a possible race when disabling buffered events (bsc#1217036).
- tracing: Fix a warning when allocating buffered events fails (bsc#1217036).
- tracing: Fix blocked reader of snapshot buffer (git-fixes).
- tracing: Fix incomplete locking when disabling buffered events (bsc#1217036).
- tracing: Fix warning in trace_buffered_event_disable() (git-fixes, bsc#1217036).
- tracing: Have the user copy of synthetic event address use correct context (git-fixes).
- tracing: Reuse logic from perf's get_recursion_context() (git-fixes).
- tracing: Set actual size after ring buffer resize (git-fixes).
- tracing: Stop current tracer when resizing buffer (git-fixes).
- tracing: Update snapshot buffer on resize if it is allocated (git-fixes).
- tracing: Use __this_cpu_read() in trace_event_buffer_lock_reserver() (bsc#1217036).
- tracing: relax trace_event_eval_update() execution with cond_resched() (git-fixes).
- uapi: propagate __struct_group() attributes to the container union (jsc#SLE-18978).
- ubifs: Fix memory leak of bud-&gt;log_hash (git-fixes).
- ubifs: fix possible dereference after free (git-fixes).
- usb-storage: Add quirk for incorrect WP on Kingston DT Ultimate 3.0 G3 (git-fixes).
- usb: aqc111: check packet for fixup for true limit (git-fixes).
- usb: config: fix iteration issue in 'usb_get_bos_descriptor()' (git-fixes).
- usb: host: xhci-plat: fix possible kernel oops while resuming (git-fixes).
- usb: hub: Guard against accesses to uninitialized BOS descriptors (git-fixes).
- usb: typec: bus: verify partner exists in typec_altmode_attention (git-fixes).
- usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes).
- usb: typec: ucsi: acpi: add quirk for ASUS Zenbook UM325 (git-fixes).
- virt/coco/sev-guest: Double-buffer messages (jsc#PED-7167).
- virt: coco: Add a coco/Makefile and coco/Kconfig (jsc#PED-7167).
- virt: sevguest: Add TSM_REPORTS support for SNP_GET_EXT_REPORT (jsc#PED-7167).
- virt: sevguest: Fix passing a stack buffer as a scatterlist target (jsc#PED-7167).
- virt: sevguest: Prep for kernel internal get_ext_report() (jsc#PED-7167).
- virt: tdx-guest: Add Quote generation support using TSM_REPORTS (jsc#PED-7167).
- vsprintf/kallsyms: Prevent invalid data when printing symbol (bsc#1217602).
- wifi: cfg80211: Add my certificate (git-fixes).
- wifi: cfg80211: fix certs build to not depend on file order (git-fixes).
- wifi: iwlwifi: pcie: add another missing bh-disable for rxq-&gt;lock (git-fixes).
- wifi: iwlwifi: pcie: do not synchronize IRQs from IRQ (git-fixes).
- wifi: mac80211: mesh: check element parsing succeeded (git-fixes).
- wifi: mac80211: mesh_plink: fix matches_local logic (git-fixes).
- x86/CPU/AMD: Check vendor in the AMD microcode callback (git-fixes).
- x86/alternatives: Disable KASAN in apply_alternatives() (git-fixes).
- x86/alternatives: Disable interrupts and sync when optimizing NOPs in place (git-fixes).
- x86/alternatives: Sync core before enabling interrupts (git-fixes).
- x86/boot/compressed: Handle unaccepted memory (jsc#PED-7167).
- x86/boot/compressed: Reserve more memory for page tables (git-fixes).
- x86/boot: Add an efi.h header for the decompressor (jsc#PED-7167).
- x86/boot: Centralize __pa()/__va() definitions (jsc#PED-7167).
- x86/boot: Fix incorrect startup_gdt_descr.size (git-fixes).
- x86/cpu/amd: Enable Zenbleed fix for AMD Custom APU 0405 (git-fixes).
- x86/cpu: Do not write CSTAR MSR on Intel CPUs (jsc#PED-7167).
- x86/cpu: Fix amd_check_microcode() declaration (git-fixes).
- x86/efi: Safely enable unaccepted memory in UEFI (jsc#PED-7167).
- x86/entry: Convert INT 0x80 emulation to IDTENTRY (bsc#1217927).
- x86/entry: Do not allow external 0x80 interrupts (bsc#1217927).
- x86/fpu/xstate: Prevent false-positive warning in __copy_xstate_uabi_buf() (git-fixes).
- x86/fpu: Invalidate FPU state correctly on exec() (git-fixes).
- x86/platform/uv: Use alternate source for socket to node data (bsc#1215696 bsc#1217790).
- x86/purgatory: Remove LTO flags (git-fixes).
- x86/resctrl: Fix kernel-doc warnings (git-fixes).
- x86/sev-es: Replace open-coded hlt-loop with sev_es_terminate() (jsc#PED-7167).
- x86/sev-es: Use insn_decode_mmio() for MMIO implementation (jsc#PED-7167).
- x86/sev: Add SNP-specific unaccepted memory support (jsc#PED-7167).
- x86/sev: Allow for use of the early boot GHCB for PSC requests (jsc#PED-7167).
- x86/sev: Change npages to unsigned long in snp_accept_memory() (jsc#PED-7167).
- x86/sev: Change snp_guest_issue_request()'s fw_err argument (jsc#PED-7167).
- x86/sev: Fix address space sparse warning (jsc#PED-7167).
- x86/sev: Get rid of special sev_es_enable_key (jsc#PED-7167).
- x86/sev: Mark snp_abort() noreturn (jsc#PED-7167).
- x86/sev: Put PSC struct on the stack in prep for unaccepted memory support (jsc#PED-7167).
- x86/sev: Use large PSC requests if applicable (jsc#PED-7167).
- x86/smp: Use dedicated cache-line for mwait_play_dead() (git-fixes).
- x86/srso: Add SRSO mitigation for Hygon processors (git-fixes).
- x86/srso: Fix SBPB enablement for (possible) future fixed HW  (git-fixes).
- x86/srso: Fix vulnerability reporting for missing microcode (git-fixes).
- x86/tdx: Add unaccepted memory support (jsc#PED-7167).
- x86/tdx: Disable NOTIFY_ENABLES (jsc#PED-7167).
- x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub (jsc#PED-7167).
- x86/tdx: Refactor try_accept_one() (jsc#PED-7167).
- x86/tdx: Relax SEPT_VE_DISABLE check for debug TD (jsc#PED-7167).
- x86/tdx: Use ReportFatalError to report missing SEPT_VE_DISABLE (jsc#PED-7167).
- x86/tsc: Add option to force frequency recalibration with HW timer (bsc#1215885 bsc#1217217).
- x86/tsc: Be consistent about use_tsc_delay() (bsc#1215885 bsc#1217217).
- x86/tsc: Extend watchdog check exemption to 4-Sockets platform (bsc#1215885 bsc#1217217).
- x86/unwind/orc: Unwind ftrace trampolines with correct ORC entry (git-fixes).
- xfs: Rename __xfs_attr_rmtval_remove (git-fixes).
- xfs: Use kvcalloc() instead of kvzalloc() (git-fixes).
- xfs: aborting inodes on shutdown may need buffer lock (git-fixes).
- xfs: add selinux labels to whiteout inodes (git-fixes).
- xfs: clean up '%Ld/%Lu' which does not meet C standard (git-fixes).
- xfs: convert flex-array declarations in struct xfs_attrlist* (git-fixes).
- xfs: convert flex-array declarations in xfs attr leaf blocks (git-fixes).
- xfs: convert flex-array declarations in xfs attr shortform objects (git-fixes).
- xfs: decode scrub flags in ftrace output (git-fixes).
- xfs: dump log intent items that cannot be recovered due to corruption (git-fixes).
- xfs: fix a bug in the online fsck directory leaf1 bestcount check (git-fixes).
- xfs: fix agf_fllast when repairing an empty AGFL (git-fixes).
- xfs: fix incorrect unit conversion in scrub tracepoint (git-fixes).
- xfs: fix silly whitespace problems with kernel libxfs (git-fixes).
- xfs: fix uninit warning in xfs_growfs_data (git-fixes).
- xfs: fix units conversion error in xfs_bmap_del_extent_delay (git-fixes).
- xfs: make sure maxlen is still congruent with prod when rounding down (git-fixes).
- xfs: remove kmem_alloc_io() (git-fixes).
- xfs: remove the xfs_dinode_t typedef (git-fixes).
- xfs: remove the xfs_dqblk_t typedef (git-fixes).
- xfs: remove the xfs_dsb_t typedef (git-fixes).
- xfs: rename xfs_has_attr() (git-fixes).
- xfs: replace snprintf in show functions with sysfs_emit (git-fixes).
- xfs: return EINTR when a fatal signal terminates scrub (git-fixes).
- xfs: sb verifier does not handle uncached sb buffer (git-fixes).
- xfs: simplify two-level sysctl registration for xfs_table (git-fixes).
- xfs: sysfs: use default_groups in kobj_type (git-fixes).
- xfs: use swap() to make dabtree code cleaner (git-fixes).
- xhci: Clear EHB bit only at end of interrupt handler (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-16"/>
	<updated date="2024-01-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183045">SUSE bug 1183045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211162">SUSE bug 1211162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211226">SUSE bug 1211226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212139">SUSE bug 1212139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212584">SUSE bug 1212584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214117">SUSE bug 1214117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214747">SUSE bug 1214747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214823">SUSE bug 1214823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215237">SUSE bug 1215237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215696">SUSE bug 1215696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215885">SUSE bug 1215885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215952">SUSE bug 1215952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216032">SUSE bug 1216032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216057">SUSE bug 1216057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216559">SUSE bug 1216559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216776">SUSE bug 1216776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217036">SUSE bug 1217036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217217">SUSE bug 1217217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217250">SUSE bug 1217250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217602">SUSE bug 1217602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217692">SUSE bug 1217692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217790">SUSE bug 1217790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217801">SUSE bug 1217801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217822">SUSE bug 1217822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217927">SUSE bug 1217927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217933">SUSE bug 1217933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217938">SUSE bug 1217938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217946">SUSE bug 1217946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217947">SUSE bug 1217947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217980">SUSE bug 1217980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217981">SUSE bug 1217981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217982">SUSE bug 1217982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218056">SUSE bug 1218056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218092">SUSE bug 1218092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218139">SUSE bug 1218139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218184">SUSE bug 1218184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218229">SUSE bug 1218229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218234">SUSE bug 1218234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218253">SUSE bug 1218253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218258">SUSE bug 1218258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218335">SUSE bug 1218335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218357">SUSE bug 1218357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218397">SUSE bug 1218397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218447">SUSE bug 1218447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218461">SUSE bug 1218461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218515">SUSE bug 1218515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218559">SUSE bug 1218559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218569">SUSE bug 1218569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218643">SUSE bug 1218643</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26555/">CVE-2020-26555 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26555">CVE-2020-26555 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51779/">CVE-2023-51779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51779">CVE-2023-51779 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-6121/">CVE-2023-6121 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6121">CVE-2023-6121 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6531/">CVE-2023-6531 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6531">CVE-2023-6531 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6546/">CVE-2023-6546 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6546">CVE-2023-6546 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6606/">CVE-2023-6606 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6606">CVE-2023-6606 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6610/">CVE-2023-6610 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6610">CVE-2023-6610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6622/">CVE-2023-6622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6622">CVE-2023-6622 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6931/">CVE-2023-6931 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6931">CVE-2023-6931 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6932/">CVE-2023-6932 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6932">CVE-2023-6932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009819606" comment="cluster-md-kmp-rt-5.14.21-150500.13.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819607" comment="dlm-kmp-rt-5.14.21-150500.13.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819608" comment="gfs2-kmp-rt-5.14.21-150500.13.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819609" comment="kernel-devel-rt-5.14.21-150500.13.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819610" comment="kernel-rt-5.14.21-150500.13.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819611" comment="kernel-rt-devel-5.14.21-150500.13.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819612" comment="kernel-rt-extra-5.14.21-150500.13.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819613" comment="kernel-rt-livepatch-5.14.21-150500.13.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819614" comment="kernel-rt-livepatch-devel-5.14.21-150500.13.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819615" comment="kernel-rt-optional-5.14.21-150500.13.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819616" comment="kernel-rt-vdso-5.14.21-150500.13.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819617" comment="kernel-rt_debug-5.14.21-150500.13.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819618" comment="kernel-rt_debug-devel-5.14.21-150500.13.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819619" comment="kernel-rt_debug-livepatch-devel-5.14.21-150500.13.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819620" comment="kernel-rt_debug-vdso-5.14.21-150500.13.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819621" comment="kernel-source-rt-5.14.21-150500.13.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819622" comment="kernel-syms-rt-5.14.21-150500.13.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819623" comment="kselftests-kmp-rt-5.14.21-150500.13.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819624" comment="ocfs2-kmp-rt-5.14.21-150500.13.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819625" comment="reiserfs-kmp-rt-5.14.21-150500.13.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4626" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1221665" ref_url="https://bugzilla.suse.com/1221665" source="BUGZILLA"/>
		<reference ref_id="1221667" ref_url="https://bugzilla.suse.com/1221667" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2004" ref_url="https://www.suse.com/security/cve/CVE-2024-2004/" source="CVE"/>
		<reference ref_id="CVE-2024-2398" ref_url="https://www.suse.com/security/cve/CVE-2024-2398/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034871.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2024-2004: Fix the uUsage of disabled protocol logic. (bsc#1221665)
- CVE-2024-2398: Fix HTTP/2 push headers memory-leak. (bsc#1221667)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1221665">SUSE bug 1221665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221667">SUSE bug 1221667</bugzilla>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2004/">CVE-2024-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2004">CVE-2024-2004 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2398/">CVE-2024-2398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2398">CVE-2024-2398 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853341" comment="curl-8.0.1-150400.5.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853342" comment="libcurl-devel-8.0.1-150400.5.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853343" comment="libcurl-devel-32bit-8.0.1-150400.5.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853344" comment="libcurl4-8.0.1-150400.5.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853345" comment="libcurl4-32bit-8.0.1-150400.5.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4627" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222262" ref_url="https://bugzilla.suse.com/1222262" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-28219" ref_url="https://www.suse.com/security/cve/CVE-2024-28219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1154-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034869.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:
  
- CVE-2024-28219: Fixed buffer overflow in _imagingcms.c (bsc#1222262) 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222262">SUSE bug 1222262</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-28219/">CVE-2024-28219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28219">CVE-2024-28219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853346" comment="python3-Pillow-7.2.0-150300.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853347" comment="python3-Pillow-tk-7.2.0-150300.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4628" version="1" class="patch">
	<metadata>
		<title>Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="SUSE-SU-2024:1157-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034866.html" source="SUSE-SU"/>
		<description>
This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer fixes the following issues:

- rebuild against current security and bugfixes.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Important</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853348" comment="containerized-data-importer-api-1.58.0-150500.6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853349" comment="containerized-data-importer-cloner-1.58.0-150500.6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853350" comment="containerized-data-importer-controller-1.58.0-150500.6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853351" comment="containerized-data-importer-importer-1.58.0-150500.6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853352" comment="containerized-data-importer-manifests-1.58.0-150500.6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853353" comment="containerized-data-importer-operator-1.58.0-150500.6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853354" comment="containerized-data-importer-uploadproxy-1.58.0-150500.6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853355" comment="containerized-data-importer-uploadserver-1.58.0-150500.6.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853356" comment="obs-service-cdi_containers_meta-1.58.0-150500.6.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4629" version="1" class="patch">
	<metadata>
		<title>Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container, virt-pr-helper-container (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1221538" ref_url="https://bugzilla.suse.com/1221538" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2024:1158-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034865.html" source="SUSE-SU"/>
		<description>
This update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container, virt-pr-helper-container fixes the following issues:

- rebuild against current security updates

- Install qemu-hw-usb-host to enable USB passthrough (bsc#1221538)
- Group together arch specific parts of the code
- Cleanup after writing config files with augtool
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221538">SUSE bug 1221538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853357" comment="kubevirt-container-disk-1.1.1-150500.8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853358" comment="kubevirt-manifests-1.1.1-150500.8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853359" comment="kubevirt-tests-1.1.1-150500.8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853360" comment="kubevirt-virt-api-1.1.1-150500.8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853361" comment="kubevirt-virt-controller-1.1.1-150500.8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853362" comment="kubevirt-virt-exportproxy-1.1.1-150500.8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853363" comment="kubevirt-virt-exportserver-1.1.1-150500.8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853364" comment="kubevirt-virt-handler-1.1.1-150500.8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853365" comment="kubevirt-virt-launcher-1.1.1-150500.8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853366" comment="kubevirt-virt-operator-1.1.1-150500.8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853367" comment="kubevirt-virtctl-1.1.1-150500.8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853368" comment="obs-service-kubevirt_containers_meta-1.1.1-150500.8.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4630" version="1" class="patch">
	<metadata>
		<title>Security update for python310 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1189495" ref_url="https://bugzilla.suse.com/1189495" source="BUGZILLA"/>
		<reference ref_id="1211301" ref_url="https://bugzilla.suse.com/1211301" source="BUGZILLA"/>
		<reference ref_id="1219559" ref_url="https://bugzilla.suse.com/1219559" source="BUGZILLA"/>
		<reference ref_id="1219666" ref_url="https://bugzilla.suse.com/1219666" source="BUGZILLA"/>
		<reference ref_id="1221854" ref_url="https://bugzilla.suse.com/1221854" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<reference ref_id="CVE-2023-6597" ref_url="https://www.suse.com/security/cve/CVE-2023-6597/" source="CVE"/>
		<reference ref_id="CVE-2024-0450" ref_url="https://www.suse.com/security/cve/CVE-2024-0450/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034861.html" source="SUSE-SU"/>
		<description>
This update for python310 fixes the following issues:

- CVE-2024-0450: Fixed 'quoted-overlap' in zipfile module is python310 (bsc#1221854)
- CVE-2023-52425: Fixed denial of service caused by processing large tokens in expat module in python310 (bsc#1219559)
- CVE-2023-6597: Fixed tempfile.TemporaryDirectory fails on removing dir in some edge cases related to symlinks in python310 (bsc#1219666)
    
    Other changes:

- Revert %autopatch due to missing parameter support (bsc#1189495)
- Extended crypto-policies support (bsc#1211301)

		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189495">SUSE bug 1189495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211301">SUSE bug 1211301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219559">SUSE bug 1219559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219666">SUSE bug 1219666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221854">SUSE bug 1221854</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6597/">CVE-2023-6597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6597">CVE-2023-6597 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0450/">CVE-2024-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853369" comment="libpython3_10-1_0-3.10.14-150400.4.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853370" comment="libpython3_10-1_0-32bit-3.10.14-150400.4.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853371" comment="python310-3.10.14-150400.4.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853372" comment="python310-32bit-3.10.14-150400.4.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853373" comment="python310-base-3.10.14-150400.4.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853374" comment="python310-base-32bit-3.10.14-150400.4.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853375" comment="python310-curses-3.10.14-150400.4.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853376" comment="python310-dbm-3.10.14-150400.4.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853377" comment="python310-devel-3.10.14-150400.4.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853378" comment="python310-doc-3.10.14-150400.4.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853379" comment="python310-doc-devhelp-3.10.14-150400.4.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853380" comment="python310-idle-3.10.14-150400.4.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853381" comment="python310-testsuite-3.10.14-150400.4.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853382" comment="python310-tk-3.10.14-150400.4.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853383" comment="python310-tools-3.10.14-150400.4.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4631" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.23 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219964" ref_url="https://bugzilla.suse.com/1219964" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0793" ref_url="https://www.suse.com/security/cve/CVE-2024-0793/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034901.html" source="SUSE-SU"/>
		<description>
This update for kubernetes1.23 fixes the following issues:

- CVE-2024-0793: Fixed a DoS caused via a malformed HPA v1 manifest. (bsc#1219964)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219964">SUSE bug 1219964</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0793/">CVE-2024-0793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0793">CVE-2024-0793 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853384" comment="kubernetes1.23-apiserver-1.23.17-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853385" comment="kubernetes1.23-client-1.23.17-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853386" comment="kubernetes1.23-client-bash-completion-1.23.17-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853387" comment="kubernetes1.23-client-common-1.23.17-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853388" comment="kubernetes1.23-client-fish-completion-1.23.17-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853389" comment="kubernetes1.23-controller-manager-1.23.17-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853390" comment="kubernetes1.23-kubeadm-1.23.17-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853391" comment="kubernetes1.23-kubelet-1.23.17-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853392" comment="kubernetes1.23-kubelet-common-1.23.17-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853393" comment="kubernetes1.23-proxy-1.23.17-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853394" comment="kubernetes1.23-scheduler-1.23.17-150500.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4632" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.23 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219964" ref_url="https://bugzilla.suse.com/1219964" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0793" ref_url="https://www.suse.com/security/cve/CVE-2024-0793/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1164-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034900.html" source="SUSE-SU"/>
		<description>
This update for kubernetes1.23 fixes the following issues:

- CVE-2024-0793: Fixed a DoS caused via a malformed HPA v1 manifest. (bsc#1219964)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219964">SUSE bug 1219964</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0793/">CVE-2024-0793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0793">CVE-2024-0793 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853395" comment="kubernetes1.24-apiserver-1.24.17-150500.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853396" comment="kubernetes1.24-client-1.24.17-150500.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853397" comment="kubernetes1.24-client-bash-completion-1.24.17-150500.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853398" comment="kubernetes1.24-client-common-1.24.17-150500.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853399" comment="kubernetes1.24-client-fish-completion-1.24.17-150500.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853400" comment="kubernetes1.24-controller-manager-1.24.17-150500.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853401" comment="kubernetes1.24-kubeadm-1.24.17-150500.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853402" comment="kubernetes1.24-kubelet-1.24.17-150500.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853403" comment="kubernetes1.24-kubelet-common-1.24.17-150500.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853404" comment="kubernetes1.24-proxy-1.24.17-150500.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853405" comment="kubernetes1.24-scheduler-1.24.17-150500.3.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4633" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.23 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1062303" ref_url="https://bugzilla.suse.com/1062303" source="BUGZILLA"/>
		<reference ref_id="1219964" ref_url="https://bugzilla.suse.com/1219964" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0793" ref_url="https://www.suse.com/security/cve/CVE-2024-0793/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034899.html" source="SUSE-SU"/>
		<description>
This update for kubernetes1.23 fixes the following issues:

- Upgrade from v1.25.14 to v1.25.16
- CVE-2024-0793: Fixed a DoS caused via a malformed HPA v1 manifest. (bsc#1219964)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062303">SUSE bug 1062303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219964">SUSE bug 1219964</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0793/">CVE-2024-0793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0793">CVE-2024-0793 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853406" comment="kubernetes1.25-client-1.25.16-150400.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853407" comment="kubernetes1.25-client-common-1.25.16-150400.9.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4634" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.23 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219964" ref_url="https://bugzilla.suse.com/1219964" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0793" ref_url="https://www.suse.com/security/cve/CVE-2024-0793/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1166-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034898.html" source="SUSE-SU"/>
		<description>
This update for kubernetes1.23 fixes the following issues:

- Upgrade from v1.26.9 to v1.26.14
- CVE-2024-0793: Fixed a DoS caused via a malformed HPA v1 manifest. (bsc#1219964)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219964">SUSE bug 1219964</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0793/">CVE-2024-0793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0793">CVE-2024-0793 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853408" comment="kubernetes1.26-client-1.26.14-150400.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853409" comment="kubernetes1.26-client-common-1.26.14-150400.9.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4635" version="1" class="patch">
	<metadata>
		<title>Security update for nghttp2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1221399" ref_url="https://bugzilla.suse.com/1221399" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-28182" ref_url="https://www.suse.com/security/cve/CVE-2024-28182/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1167-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034897.html" source="SUSE-SU"/>
		<description>
This update for nghttp2 fixes the following issues:

- CVE-2024-28182: Fixed denial of service via http/2 continuation frames (bsc#1221399)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-08"/>
	<updated date="2024-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221399">SUSE bug 1221399</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28182/">CVE-2024-28182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28182">CVE-2024-28182 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853410" comment="libnghttp2-14-1.40.0-150200.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853411" comment="libnghttp2-14-32bit-1.40.0-150200.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853412" comment="libnghttp2-devel-1.40.0-150200.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853413" comment="libnghttp2_asio-devel-1.40.0-150200.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853414" comment="libnghttp2_asio1-1.40.0-150200.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853415" comment="libnghttp2_asio1-32bit-1.40.0-150200.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853416" comment="nghttp2-1.40.0-150200.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853417" comment="python3-nghttp2-1.40.0-150200.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4636" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1207987" ref_url="https://bugzilla.suse.com/1207987" source="BUGZILLA"/>
		<reference ref_id="1221831" ref_url="https://bugzilla.suse.com/1221831" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-28085" ref_url="https://www.suse.com/security/cve/CVE-2024-28085/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1172-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034902.html" source="SUSE-SU"/>
		<description>
This update for util-linux fixes the following issues:

- CVE-2024-28085: Properly neutralize escape sequences in wall. (bsc#1221831)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207987">SUSE bug 1207987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221831">SUSE bug 1221831</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-28085/">CVE-2024-28085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28085">CVE-2024-28085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853729" comment="libblkid-devel-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853730" comment="libblkid-devel-32bit-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853731" comment="libblkid-devel-static-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853732" comment="libblkid1-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853733" comment="libblkid1-32bit-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853734" comment="libfdisk-devel-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853735" comment="libfdisk-devel-32bit-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853736" comment="libfdisk-devel-static-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853737" comment="libfdisk1-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853738" comment="libfdisk1-32bit-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853739" comment="libmount-devel-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853740" comment="libmount-devel-32bit-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853741" comment="libmount-devel-static-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853742" comment="libmount1-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853743" comment="libmount1-32bit-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853744" comment="libsmartcols-devel-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853745" comment="libsmartcols-devel-32bit-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853746" comment="libsmartcols-devel-static-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853747" comment="libsmartcols1-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853748" comment="libsmartcols1-32bit-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853749" comment="libuuid-devel-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853750" comment="libuuid-devel-32bit-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853751" comment="libuuid-devel-static-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853752" comment="libuuid1-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853753" comment="libuuid1-32bit-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853754" comment="python3-libmount-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853755" comment="util-linux-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853756" comment="util-linux-lang-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853757" comment="util-linux-systemd-2.37.4-150500.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853758" comment="uuidd-2.37.4-150500.9.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4637" version="1" class="patch">
	<metadata>
		<title>Security update for qt6-base (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1221926" ref_url="https://bugzilla.suse.com/1221926" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-30161" ref_url="https://www.suse.com/security/cve/CVE-2024-30161/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1174-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034910.html" source="SUSE-SU"/>
		<description>
This update for qt6-base fixes the following issues:

- CVE-2024-30161: Fixed QNetworkReply header data access via a dangling pointer (bsc#1221926).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-09"/>
	<updated date="2024-04-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1221926">SUSE bug 1221926</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-30161/">CVE-2024-30161 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30161">CVE-2024-30161 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009853759" comment="libQt6Concurrent6-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853760" comment="libQt6Core6-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853761" comment="libQt6DBus6-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853762" comment="libQt6Gui6-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853763" comment="libQt6Network6-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853764" comment="libQt6OpenGL6-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853765" comment="libQt6OpenGLWidgets6-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853766" comment="libQt6PrintSupport6-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853767" comment="libQt6Sql6-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853768" comment="libQt6Test6-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853769" comment="libQt6Widgets6-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853770" comment="libQt6Xml6-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853771" comment="qt6-base-common-devel-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853772" comment="qt6-base-devel-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853773" comment="qt6-base-docs-html-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853774" comment="qt6-base-docs-qch-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853775" comment="qt6-base-examples-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853776" comment="qt6-base-private-devel-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853777" comment="qt6-concurrent-devel-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853778" comment="qt6-core-devel-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853779" comment="qt6-core-private-devel-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853780" comment="qt6-dbus-devel-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853781" comment="qt6-dbus-private-devel-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853782" comment="qt6-docs-common-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853783" comment="qt6-gui-devel-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853784" comment="qt6-gui-private-devel-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853785" comment="qt6-kmssupport-devel-static-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853786" comment="qt6-kmssupport-private-devel-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853787" comment="qt6-network-devel-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853788" comment="qt6-network-private-devel-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853789" comment="qt6-network-tls-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853790" comment="qt6-networkinformation-glib-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853791" comment="qt6-networkinformation-nm-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853792" comment="qt6-opengl-devel-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853793" comment="qt6-opengl-private-devel-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853794" comment="qt6-openglwidgets-devel-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853795" comment="qt6-platformsupport-devel-static-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853796" comment="qt6-platformsupport-private-devel-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853797" comment="qt6-platformtheme-gtk3-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853798" comment="qt6-platformtheme-xdgdesktopportal-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853799" comment="qt6-printsupport-cups-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853800" comment="qt6-printsupport-devel-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853801" comment="qt6-printsupport-private-devel-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853802" comment="qt6-sql-devel-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853803" comment="qt6-sql-mysql-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853804" comment="qt6-sql-postgresql-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853805" comment="qt6-sql-private-devel-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853806" comment="qt6-sql-sqlite-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853807" comment="qt6-sql-unixODBC-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853808" comment="qt6-test-devel-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853809" comment="qt6-test-private-devel-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853810" comment="qt6-widgets-devel-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853811" comment="qt6-widgets-private-devel-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853812" comment="qt6-xml-devel-6.4.2-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009853813" comment="qt6-xml-private-devel-6.4.2-150500.3.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4638" version="1" class="patch">
	<metadata>
		<title>Security update for less (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219901" ref_url="https://bugzilla.suse.com/1219901" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48624" ref_url="https://www.suse.com/security/cve/CVE-2022-48624/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1192-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034922.html" source="SUSE-SU"/>
		<description>
This update for less fixes the following issues:

- CVE-2022-48624: Fixed LESSCLOSE handling in less that does not quote shell metacharacters (bsc#1219901).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2024-04-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219901">SUSE bug 1219901</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48624/">CVE-2022-48624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48624">CVE-2022-48624 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854006" comment="less-590-150400.3.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4639" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat10 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1221385" ref_url="https://bugzilla.suse.com/1221385" source="BUGZILLA"/>
		<reference ref_id="1221386" ref_url="https://bugzilla.suse.com/1221386" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-23672" ref_url="https://www.suse.com/security/cve/CVE-2024-23672/" source="CVE"/>
		<reference ref_id="CVE-2024-24549" ref_url="https://www.suse.com/security/cve/CVE-2024-24549/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034931.html" source="SUSE-SU"/>
		<description>
This update for tomcat10 fixes the following issues:

- CVE-2024-24549: Fixed denial of service during header validation for HTTP/2 stream (bsc#1221386)
- CVE-2024-23672: Fixed denial of service due to malicious WebSocket client keeping connection open (bsc#1221385)

Other fixes:
- Update to Tomcat 10.1.20
  * Catalina
    + Fix:  Minor performance improvement for building filter chains. 
      Based on ideas from #702 by Luke Miao. (remm)
    + Fix:  Align error handling for Writer and OutputStream. Ensure 
      use of either once the response has been recycled triggers a 
      NullPointerException provided that discardFacades is configured with 
      the default value of true. (markt)
    + Fix:  68692: The standard thread pool implementations that are 
      configured using the Executor element now implement ExecutorService 
      for better support NIO2. (remm)
    + Fix:  68495: When restoring a saved POST request after a 
      successful FORM authentication, ensure that neither the URI, the 
      query string nor the protocol are corrupted when restoring the 
      request body. (markt)
    + Fix:  After forwarding a request, attempt to unwrap the 
      response in order to suspend it, instead of simply closing it if it 
      was wrapped. Add a new suspendWrappedResponseAfterForward boolean 
      attribute on Context to control the bahavior, defaulting to false. 
      (remm)
    + Fix:  68721: Workaround a possible cause of duplicate class 
      definitions when using ClassFileTransformers and the transformation 
      of a class also triggers the loading of the same class. (markt)
    + Fix:  The rewrite valve should not do a rewrite if the output 
      is identical to the input. (remm)
    + Update:  Add a new valveSkip (or VS) rule flag to the rewrite 
      valve to allow skipping over the next valve in the Catalina pipeline. 
      (remm)
    + Update:  Add highConcurrencyStatus attribute to the 
      SemaphoreValve to optionally allow the valve to return an error 
      status code to the client when a permit cannot be acquired from the 
      semaphore. (remm)
    + Add:  Add checking of the 'age' of the running Tomcat instance 
      since its build-date to the SecurityListener, and log a warning if 
      the server is old. (schultz)
    + Fix:  When using the AsyncContext, throw an 
      IllegalStateException, rather than allowing an NullPointerException, 
      if an attempt is made to use the AsyncContext after it has been 
      recycled. (markt)
    + Fix:  Correct JPMS and OSGi meta-data for tomcat-embed-core.jar 
      by removing reference to org.apache.catalina.ssi package that is no 
      longer included in the JAR. Based on pull request #684 by Jendrik 
      Johannes. (markt)
    + Fix:  Fix ServiceBindingPropertySource so that trailing \r\n 
      sequences are correctly removed from files containing property values 
      when configured to do so. Bug identified by Coverity Scan. (markt)
    + Add:  Add improvements to the CSRF prevention filter including 
      the ability to skip adding nonces for resource name and subtree URL 
      patterns. (schultz)
    + Fix:  Review usage of debug logging and downgrade trace or data 
      dumping operations from debug level to trace. (remm)
    + Fix:  68089: Further improve the performance of request 
      attribute access for ApplicationHttpRequest and ApplicationRequest. 
      (markt)
    + Fix:  68559: Allow asynchronous error handling to write to the 
      response after an error during asynchronous processing. (markt)
  * Coyote
    + Fix:  Improve the HTTP/2 stream prioritisation process. If a 
      stream uses all of the connection windows and still has content to 
      write, it will now be added to the backlog immediately rather than 
      waiting until the write attempt for the remaining content. (markt)
    + Fix:  Add threadsMaxIdleTime attribute to the endpoint, to 
      allow configuring the amount of time before an internal executor will 
      scale back to the configured minSpareThreads size. (remm)
    + Fix:  Correct a regression in the support for user provided 
      SSLContext instances that broke the 
      org.apache.catalina.security.TLSCertificateReloadListener. (markt)
    + Fix:  Setting a null value for a cookie attribute should remove 
      the attribute. (markt)
    + Fix:  Make asynchronous error handling more robust. Ensure that 
      once a connection is marked to be closed, further asynchronous 
      processing cannot change that. (markt)
    + Fix:  Make asynchronous error handling more robust. Ensure that 
      once the call to AsyncListener.onError() has returned to the 
      container, only container threads can access the AsyncContext. This 
      protects against various race conditions that woudl otherwise occur 
      if application threads continued to access the AsyncContext.
    + Fix:  Review usage of debug logging and downgrade trace or data 
      dumping operations from debug level to trace. In particular, most of 
      the HTTP/2 debug logging has been changed to trace level. (remm)
    + Fix:  Add support for user provided SSLContext instances 
      configured on SSLHostConfigCertificate instances. Based on pull 
      request #673 provided by Hakan Altındağ. (markt)
    + Fix:  Partial fix for 68558: Cache the result of converting to 
      String for request URI, HTTP header names and the request 
      Content-Type value to improve performance by reducing repeated byte[] 
      to String conversions. (markt)
    + Fix:  Improve error reporting to HTTP/2 clients for header 
      processing errors by reporting problems at the end of the frame where 
      the error was detected rather than at the end of the headers. (markt)
    + Fix:  Remove the remaining reference to a stream once the 
      stream has been recycled. This makes the stream eligible for garbage 
      collection earlier and thereby improves scalability. (markt)
  * Jasper
    + Add:  Add support for specifying Java 22 (with the value 22) as 
      the compiler source and/or compiler target for JSP compilation. If 
      used with an Eclipse JDT compiler version that does not support these 
      values, a warning will be logged and the default will used. (markt)
    + Fix:  Handle the case where the JSP engine forwards a 
      request/response to a Servlet that uses an OutputStream rather than a 
      Writer. This was triggering an IllegalStateException on code paths 
      where there was a subsequent attempt to obtain a Writer. (markt)
    + Fix:  Correctly handle the case where a tag library is packaged 
      in a JAR file and the web application is deployed as a WAR file 
      rather than an unpacked directory. (markt)
    + Fix:  68546: Generate optimal size and types for JSP imports 
      maps, as suggested by John Engebretson. (remm)
    + Fix:  Review usage of debug logging and downgrade trace or data 
      dumping operations from debug level to trace. (remm)
  *	Cluster
    + Fix:  Avoid updating request count stats on async. (remm)
  * WebSocket
    + Fix:  Correct a regression in the fix for 66508 that could 
      cause an UpgradeProcessor leak in some circumstances. (markt)
    + Fix:  Review usage of debug logging and downgrade trace or data 
      dumping operations from debug level to trace. (remm)
    + Fix:  Ensure that WebSocket connection closure completes if the 
      connection is closed when the server side has used the proprietary 
      suspend/resume feature to suspend the connection. (markt)
  * Web applications
      Add:  Add support for responses in JSON format from the examples 
      application RequestHeaderExample. (schultz)
  * Other
    + Add:  Improvements to French translations. (remm)
    + Add:  Improvements to Japanese translations by tak7iji. (markt)
    + Fix:  57130: Allow digest.(sh|bat) to accept password from a 
      file or stdin. (csutherl/schultz)
    + Update:  Update Checkstyle to 10.14.1. (markt)
    + Fix:  Correct the remaining OSGi contract references in the 
      manifest files to refer to the Jakarta EE contract names rather than 
      the Java EE contract names. Based on pull request #685 provided by 
      Paul A. Nicolucci. (markt)
    + Update:  Update Checkstyle to 10.13.0. (markt)
    + Update:  Update JSign to 6.0. (markt)
    + Update:  Update the packaged version of the Tomcat Migration 
      Tool for Jakarta EE to 1.0.7. (markt)
    + Update:  Update Tomcat Native to 2.0.7. (markt)
    + Update:  Add strings for debug level messages. (remm)
    + Add:  Improvements to French translations. (remm)
    + Add:  Improvements to Japanese translations by tak7iji. (markt)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-11"/>
	<updated date="2024-04-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221385">SUSE bug 1221385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221386">SUSE bug 1221386</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23672/">CVE-2024-23672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23672">CVE-2024-23672 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24549/">CVE-2024-24549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24549">CVE-2024-24549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854111" comment="tomcat10-10.1.20-150200.5.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854112" comment="tomcat10-admin-webapps-10.1.20-150200.5.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854113" comment="tomcat10-docs-webapp-10.1.20-150200.5.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854114" comment="tomcat10-el-5_0-api-10.1.20-150200.5.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854115" comment="tomcat10-embed-10.1.20-150200.5.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854116" comment="tomcat10-jsp-3_1-api-10.1.20-150200.5.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854117" comment="tomcat10-jsvc-10.1.20-150200.5.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854118" comment="tomcat10-lib-10.1.20-150200.5.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854119" comment="tomcat10-servlet-6_0-api-10.1.20-150200.5.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854120" comment="tomcat10-webapps-10.1.20-150200.5.22.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4640" version="1" class="patch">
	<metadata>
		<title>Security update for perl-Net-CIDR-Lite (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1221564" ref_url="https://bugzilla.suse.com/1221564" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-47154" ref_url="https://www.suse.com/security/cve/CVE-2021-47154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1256-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034948.html" source="SUSE-SU"/>
		<description>
This update for perl-Net-CIDR-Lite fixes the following issues:

- CVE-2021-47154: Fixed leading zeroes in IPv4 octets may allow attackers to bypass certain access controls (bsc#1221564).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-12"/>
	<updated date="2024-04-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1221564">SUSE bug 1221564</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47154/">CVE-2021-47154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47154">CVE-2021-47154 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854388" comment="perl-Net-CIDR-Lite-0.21-150100.6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4641" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222262" ref_url="https://bugzilla.suse.com/1222262" source="BUGZILLA"/>
		<reference ref_id="1222553" ref_url="https://bugzilla.suse.com/1222553" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-28219" ref_url="https://www.suse.com/security/cve/CVE-2024-28219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1258-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034965.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

- CVE-2024-28219: Fixed buffer overflow in _imagingcms.c (bsc#1222262)

Other fixes:
- Re-enabled build tests for s390x and ppc (bsc#1222553)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-12"/>
	<updated date="2024-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222262">SUSE bug 1222262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222553">SUSE bug 1222553</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-28219/">CVE-2024-28219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28219">CVE-2024-28219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854389" comment="python311-Pillow-9.5.0-150400.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854390" comment="python311-Pillow-tk-9.5.0-150400.5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4642" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222309" ref_url="https://bugzilla.suse.com/1222309" source="BUGZILLA"/>
		<reference ref_id="1222310" ref_url="https://bugzilla.suse.com/1222310" source="BUGZILLA"/>
		<reference ref_id="1222311" ref_url="https://bugzilla.suse.com/1222311" source="BUGZILLA"/>
		<reference ref_id="1222312" ref_url="https://bugzilla.suse.com/1222312" source="BUGZILLA"/>
		<reference ref_id="1222442" ref_url="https://bugzilla.suse.com/1222442" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-31080" ref_url="https://www.suse.com/security/cve/CVE-2024-31080/" source="CVE"/>
		<reference ref_id="CVE-2024-31081" ref_url="https://www.suse.com/security/cve/CVE-2024-31081/" source="CVE"/>
		<reference ref_id="CVE-2024-31082" ref_url="https://www.suse.com/security/cve/CVE-2024-31082/" source="CVE"/>
		<reference ref_id="CVE-2024-31083" ref_url="https://www.suse.com/security/cve/CVE-2024-31083/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034961.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2024-31080: Fixed ProcXIGetSelectedEvents to use unswapped length (bsc#1222309).
- CVE-2024-31081: Fixed ProcXIPassiveGrabDevice to use unswapped length to send reply (bsc#1222310).
- CVE-2024-31082: Fixed ProcAppleDRICreatePixmap to use unswapped length to send reply (bsc#1222311).
- CVE-2024-31083: Fixed refcounting of glyphs during ProcRenderAddGlyphs (bsc#1222312).

Other fixes:
- Fixed regression for security fix for CVE-2024-31083 when using Android Studio (bnc#1222442)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-12"/>
	<updated date="2024-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222309">SUSE bug 1222309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222310">SUSE bug 1222310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222311">SUSE bug 1222311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222312">SUSE bug 1222312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222442">SUSE bug 1222442</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31080/">CVE-2024-31080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31080">CVE-2024-31080 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31081/">CVE-2024-31081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31081">CVE-2024-31081 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31082/">CVE-2024-31082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31082">CVE-2024-31082 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31083/">CVE-2024-31083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31083">CVE-2024-31083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854391" comment="xorg-x11-server-21.1.4-150500.7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854392" comment="xorg-x11-server-Xvfb-21.1.4-150500.7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854393" comment="xorg-x11-server-extra-21.1.4-150500.7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854394" comment="xorg-x11-server-sdk-21.1.4-150500.7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854395" comment="xorg-x11-server-source-21.1.4-150500.7.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4643" version="1" class="patch">
	<metadata>
		<title>Security update for xwayland (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222309" ref_url="https://bugzilla.suse.com/1222309" source="BUGZILLA"/>
		<reference ref_id="1222310" ref_url="https://bugzilla.suse.com/1222310" source="BUGZILLA"/>
		<reference ref_id="1222312" ref_url="https://bugzilla.suse.com/1222312" source="BUGZILLA"/>
		<reference ref_id="1222442" ref_url="https://bugzilla.suse.com/1222442" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-31080" ref_url="https://www.suse.com/security/cve/CVE-2024-31080/" source="CVE"/>
		<reference ref_id="CVE-2024-31081" ref_url="https://www.suse.com/security/cve/CVE-2024-31081/" source="CVE"/>
		<reference ref_id="CVE-2024-31083" ref_url="https://www.suse.com/security/cve/CVE-2024-31083/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034959.html" source="SUSE-SU"/>
		<description>
This update for xwayland fixes the following issues:

- CVE-2024-31080: Fixed ProcXIGetSelectedEvents to use unswapped length (bsc#1222309).
- CVE-2024-31081: Fixed ProcXIPassiveGrabDevice to use unswapped length to send reply (bsc#1222310).
- CVE-2024-31083: Fixed refcounting of glyphs during ProcRenderAddGlyphs (bsc#1222312).

Other fixes:
- Fixed regression for security fix for CVE-2024-31083 when using Android Studio (bnc#1222442)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-12"/>
	<updated date="2024-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222309">SUSE bug 1222309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222310">SUSE bug 1222310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222312">SUSE bug 1222312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222442">SUSE bug 1222442</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31080/">CVE-2024-31080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31080">CVE-2024-31080 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31081/">CVE-2024-31081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31081">CVE-2024-31081 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31083/">CVE-2024-31083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31083">CVE-2024-31083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854396" comment="xwayland-22.1.5-150500.7.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854397" comment="xwayland-devel-22.1.5-150500.7.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4644" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222010" ref_url="https://bugzilla.suse.com/1222010" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-42843" ref_url="https://www.suse.com/security/cve/CVE-2023-42843/" source="CVE"/>
		<reference ref_id="CVE-2023-42950" ref_url="https://www.suse.com/security/cve/CVE-2023-42950/" source="CVE"/>
		<reference ref_id="CVE-2023-42956" ref_url="https://www.suse.com/security/cve/CVE-2023-42956/" source="CVE"/>
		<reference ref_id="CVE-2024-23252" ref_url="https://www.suse.com/security/cve/CVE-2024-23252/" source="CVE"/>
		<reference ref_id="CVE-2024-23254" ref_url="https://www.suse.com/security/cve/CVE-2024-23254/" source="CVE"/>
		<reference ref_id="CVE-2024-23263" ref_url="https://www.suse.com/security/cve/CVE-2024-23263/" source="CVE"/>
		<reference ref_id="CVE-2024-23280" ref_url="https://www.suse.com/security/cve/CVE-2024-23280/" source="CVE"/>
		<reference ref_id="CVE-2024-23284" ref_url="https://www.suse.com/security/cve/CVE-2024-23284/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1270-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034954.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:                                                                                            

- CVE-2024-23252: Fixed denial of service via crafted web content (bsc#1222010).
- CVE-2024-23254: Fixed possible audio data exilftration cross-origin via malicious website (bsc#1222010).
- CVE-2024-23263: Fixed lack of Content Security Policy enforcing via malicious crafted web content (bsc#1222010).
- CVE-2024-23280: Fixed possible user fingeprint via malicious crafted web content (bsc#1222010).
- CVE-2024-23284: Fixed lack of Content Security Policy enforcing via malicious crafted web content (bsc#1222010).
- CVE-2023-42950: Fixed arbitrary code execution via crafted web content (bsc#1222010).
- CVE-2023-42956: Fixed denial of service via crafted web content (bsc#1222010).                                                                   
- CVE-2023-42843: Fixed address bar spoofing via malicious website (bsc#1222010).

Other fixes:

- Update to version 2.44.0 (bsc#1222010):                                                                                                                         
  + Make the DOM accessibility tree reachable from UI process with                                                                     
    GTK4.                                                                        
  + Removed the X11 and WPE renderers in favor of DMA-BUF.
  + Improved vblank synchronization when rendering.       
  + Removed key event reinjection in GTK4 to make keyboard                                                                             
    shortcuts work in web sites.                                                 
  + Fix gamepads detection by correctly handling focused window in                                                                     
    GTK4.                                                                                                                                          
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-12"/>
	<updated date="2024-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222010">SUSE bug 1222010</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-42843/">CVE-2023-42843 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42843">CVE-2023-42843 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42950/">CVE-2023-42950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42950">CVE-2023-42950 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42956/">CVE-2023-42956 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42956">CVE-2023-42956 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23252/">CVE-2024-23252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23252">CVE-2024-23252 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23254/">CVE-2024-23254 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23254">CVE-2024-23254 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-23263/">CVE-2024-23263 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23263">CVE-2024-23263 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23280/">CVE-2024-23280 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23280">CVE-2024-23280 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-23284/">CVE-2024-23284 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23284">CVE-2024-23284 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854398" comment="WebKitGTK-4.0-lang-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854399" comment="WebKitGTK-4.1-lang-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854400" comment="WebKitGTK-6.0-lang-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854401" comment="libjavascriptcoregtk-4_0-18-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854402" comment="libjavascriptcoregtk-4_0-18-32bit-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854403" comment="libjavascriptcoregtk-4_1-0-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854404" comment="libjavascriptcoregtk-4_1-0-32bit-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854405" comment="libjavascriptcoregtk-6_0-1-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854406" comment="libwebkit2gtk-4_0-37-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854407" comment="libwebkit2gtk-4_0-37-32bit-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854408" comment="libwebkit2gtk-4_1-0-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854409" comment="libwebkit2gtk-4_1-0-32bit-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854410" comment="libwebkitgtk-6_0-4-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854411" comment="typelib-1_0-JavaScriptCore-4_0-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854412" comment="typelib-1_0-JavaScriptCore-4_1-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854413" comment="typelib-1_0-JavaScriptCore-6_0-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854414" comment="typelib-1_0-WebKit-6_0-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854415" comment="typelib-1_0-WebKit2-4_0-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854416" comment="typelib-1_0-WebKit2-4_1-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854417" comment="typelib-1_0-WebKit2WebExtension-4_0-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854418" comment="typelib-1_0-WebKit2WebExtension-4_1-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854419" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854420" comment="webkit-jsc-4-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854421" comment="webkit-jsc-4.1-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854422" comment="webkit-jsc-6.0-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854423" comment="webkit2gtk-4_0-injected-bundles-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854424" comment="webkit2gtk-4_1-injected-bundles-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854425" comment="webkit2gtk3-devel-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854426" comment="webkit2gtk3-minibrowser-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854427" comment="webkit2gtk3-soup2-devel-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854428" comment="webkit2gtk3-soup2-minibrowser-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854429" comment="webkit2gtk4-devel-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854430" comment="webkit2gtk4-minibrowser-2.44.0-150400.4.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854431" comment="webkitgtk-6_0-injected-bundles-2.44.0-150400.4.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4645" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1221242" ref_url="https://bugzilla.suse.com/1221242" source="BUGZILLA"/>
		<reference ref_id="1221746" ref_url="https://bugzilla.suse.com/1221746" source="BUGZILLA"/>
		<reference ref_id="1221747" ref_url="https://bugzilla.suse.com/1221747" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-28834" ref_url="https://www.suse.com/security/cve/CVE-2024-28834/" source="CVE"/>
		<reference ref_id="CVE-2024-28835" ref_url="https://www.suse.com/security/cve/CVE-2024-28835/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034953.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

- CVE-2024-28834: Fixed side-channel in the deterministic ECDSA (bsc#1221746)
- CVE-2024-28835: Fixed denial of service during certificate chain verification (bsc#1221747)

Other fixes:
  - jitterentropy: Release the memory of the entropy collector when
    using jitterentropy with phtreads as there is also a
    pre-intitization done in the main thread (bsc#1221242)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-12"/>
	<updated date="2024-04-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1221242">SUSE bug 1221242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221746">SUSE bug 1221746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221747">SUSE bug 1221747</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-28834/">CVE-2024-28834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28834">CVE-2024-28834 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28835/">CVE-2024-28835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28835">CVE-2024-28835 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854432" comment="gnutls-3.7.3-150400.4.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854433" comment="gnutls-guile-3.7.3-150400.4.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854434" comment="libgnutls-devel-3.7.3-150400.4.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854435" comment="libgnutls-devel-32bit-3.7.3-150400.4.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854436" comment="libgnutls30-3.7.3-150400.4.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854437" comment="libgnutls30-32bit-3.7.3-150400.4.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854438" comment="libgnutls30-hmac-3.7.3-150400.4.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854439" comment="libgnutls30-hmac-32bit-3.7.3-150400.4.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854440" comment="libgnutlsxx-devel-3.7.3-150400.4.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854441" comment="libgnutlsxx28-3.7.3-150400.4.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4646" version="1" class="patch">
	<metadata>
		<title>Security update for cloud-init (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1198269" ref_url="https://bugzilla.suse.com/1198269" source="BUGZILLA"/>
		<reference ref_id="1201010" ref_url="https://bugzilla.suse.com/1201010" source="BUGZILLA"/>
		<reference ref_id="1214169" ref_url="https://bugzilla.suse.com/1214169" source="BUGZILLA"/>
		<reference ref_id="1215740" ref_url="https://bugzilla.suse.com/1215740" source="BUGZILLA"/>
		<reference ref_id="1215794" ref_url="https://bugzilla.suse.com/1215794" source="BUGZILLA"/>
		<reference ref_id="1216007" ref_url="https://bugzilla.suse.com/1216007" source="BUGZILLA"/>
		<reference ref_id="1216011" ref_url="https://bugzilla.suse.com/1216011" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1786" ref_url="https://www.suse.com/security/cve/CVE-2023-1786/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0128-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-January/033759.html" source="SUSE-SU"/>
		<description>
This update for cloud-init contains the following fixes:

- Move fdupes call back to %install.(bsc#1214169)

- Update to version 23.3. (bsc#1216011)
  * (bsc#1215794)
  * (bsc#1215740)
  * (bsc#1216007)
  + Bump pycloudlib to 1!5.1.0 for ec2 mantic daily image support (#4390)
  + Fix cc_keyboard in mantic (LP: #2030788)
  + ec2: initialize get_instance_userdata return value to bytes (#4387)
    [Noah Meyerhans]
  + cc_users_groups: Add doas/opendoas support (#4363) [dermotbradley]
  + Fix pip-managed ansible
  + status: treat SubState=running and MainPID=0 as service exited
  + azure/imds: increase read-timeout to 30s (#4372) [Chris Patterson]
  + collect-logs fix memory usage (SC-1590) (#4289)
    [Alec Warren] (LP: #1980150)
  + cc_mounts: Use fallocate to create swapfile on btrfs (#4369)
  + Undocument nocloud-net (#4318)
  + feat(akamai): add akamai to settings.py and apport.py (#4370)
  + read-version: fallback to get_version when git describe fails (#4366)
  + apt: fix cloud-init status --wait blocking on systemd v 253 (#4364)
  + integration tests: Pass username to pycloudlib (#4324)
  + Bump pycloudlib to 1!5.1.0 (#4353)
  + cloud.cfg.tmpl: reorganise, minimise/reduce duplication (#4272)
    [dermotbradley]
  + analyze: fix (unexpected) timestamp parsing (#4347) [Mina Galić]
  + cc_growpart: fix tests to run on FreeBSD (#4351) [Mina Galić]
  + subp: Fix spurious test failure on FreeBSD (#4355) [Mina Galić]
  + cmd/clean: fix tests on non-Linux platforms (#4352) [Mina Galić]
  + util: Fix get_proc_ppid() on non-Linux systems (#4348) [Mina Galić]
  + cc_wireguard: make tests pass on FreeBSD (#4346) [Mina Galić]
  + unittests: fix breakage in test_read_cfg_paths_fetches_cached_datasource
    (#4328) [Ani Sinha]
  + Fix test_tools.py collection (#4315)
  + cc_keyboard: add Alpine support (#4278) [dermotbradley]
  + Flake8 fixes (#4340) [Robert Schweikert]
  + cc_mounts: Fix swapfile not working on btrfs (#4319) [王煎饼] (LP: #1884127)
  + ds-identify/CloudStack: $DS_MAYBE if vm running on vmware/xen (#4281)
    [Wei Zhou]
  + ec2: Support double encoded userdata (#4275) [Noah Meyerhans]
  + cc_mounts: xfs is a Linux only FS (#4334) [Mina Galić]
  + tests/net: fix TestGetInterfaces' mock coverage for get_master (#4336)
    [Chris Patterson]
  + change openEuler to openeuler and fix some bugs in openEuler (#4317)
    [sxt1001]
  + Replace flake8 with ruff (#4314)
  + NM renderer: set default IPv6 addr-gen-mode for all interfaces to eui64
    (#4291) [Ani Sinha]
  + cc_ssh_import_id: add Alpine support and add doas support (#4277)
    [dermotbradley]
  + sudoers not idempotent (SC-1589)  (#4296) [Alec Warren] (LP: #1998539)
  + Added support for Akamai Connected Cloud (formerly Linode) (#4167)
    [Will Smith]
  + Fix reference before assignment (#4292)
  + Overhaul module reference page (#4237) [Sally]
  + replaced spaces with commas for setting passenv (#4269) [Alec Warren]
  + DS VMware: modify a few log level (#4284) [PengpengSun]
  + tools/read-version refactors and unit tests (#4268)
  + Ensure get_features() grabs all features (#4285)
  + Don't always require passlib dependency (#4274)
  + tests: avoid leaks into host system checking of ovs-vsctl cmd (#4275)
  + Fix NoCloud kernel commandline key parsing (#4273)
  + testing: Clear all LRU caches after each test (#4249)
  + Remove the crypt dependency (#2139) [Gon?ri Le Bouder]
  + logging: keep current file mode of log file if its stricter than the
    new mode (#4250) [Ani Sinha]
  + Remove default membership in redundant groups (#4258)
    [Dave Jones] (LP: #1923363)
  + doc: improve datasource_creation.rst (#4262)
  + Remove duplicate Integration testing button (#4261) [Rishita Shaw]
  + tools/read-version: fix the tool so that it can handle version parsing
    errors (#4234) [Ani Sinha]
  + net/dhcp: add udhcpc support (#4190) [Jean-Fran?ois Roche]
  + DS VMware: add i386 arch dir to deployPkg plugin search path
    [PengpengSun]
  + LXD moved from linuxcontainers.org to Canonical [Simon Deziel]
  + cc_mounts.py: Add note about issue with creating mounts inside mounts
    (#4232) [dermotbradley]
  + lxd: install lxd from snap, not deb if absent in image
  + landscape: use landscape-config to write configuration
  + Add deprecation log during init of DataSourceDigitalOcean (#4194)
    [tyb-truth]
  + doc: fix typo on apt.primary.arches (#4238) [Dan Bungert]
  + Inspect systemd state for cloud-init status (#4230)
  + instance-data: add system-info and features to combined-cloud-config
    (#4224)
  + systemd: Block login until config stage completes (#2111) (LP: #2013403)
  + tests: proposed should invoke apt-get install -t=&lt;release&gt;-proposed
    (#4235)
  + cloud.cfg.tmpl: reinstate ca_certs entry (#4236) [dermotbradley]
  + Remove feature flag override ability (#4228)
  + tests: drop stray unrelated file presence test (#4227)
  + Update LXD URL (#4223) [Sally]
  + schema: add network v1 schema definition and validation functions
  + tests: daily PPA for devel series is version 99.daily update tests to
    match (#4225)
  + instance-data: write /run/cloud-init/combined-cloud-config.json
  + mount parse: Fix matching non-existent directories (#4222) [Mina Galić]
  + Specify build-system for pep517 (#4218)
  + Fix network v2 metric rendering (#4220)
  + Migrate content out of FAQ page (SD-1187) (#4205) [Sally]
  + setup: fix generation of init templates (#4209) [Mina Galić]
  + docs: Correct some bootcmd example wording
  + fix changelog
  + tests: reboot client to assert x-shellscript-per-boot is triggered
  + nocloud: parse_cmdline no longer detects nocloud-net datasource (#4204)
    (LP: 4203, #2025180)
  + Add docstring and typing to mergemanydict (#4200)
  + BSD: add dsidentify to early startup scripts (#4182) [Mina Galić]
  + handler: report errors on skipped merged cloud-config.txt parts
    (LP: #1999952)
  + Add cloud-init summit writeups (#4179) [Sally]
  + tests: Update test_clean_log for oci (#4187)
  + gce: improve ephemeral fallback NIC selection (CPC-2578) (#4163)
  + tests: pin pytest 7.3.1 to avoid adverse testpaths behavior (#4184)
  + Ephemeral Networking for FreeBSD (#2165) [Mina Galić]
  + Clarify directory syntax for nocloud local filesystem. (#4178)
  + Set default renderer as sysconfig for centos/rhel (#4165) [Ani Sinha]
  + Test static routes and netplan 0.106
  + FreeBSD fix parsing of mount and mount options (#2146) [Mina Galić]
  + test: add tracking bug id (#4164)
  + tests: can't match MAC for LXD container veth due to netplan 0.106
    (#4162)
  + Add kaiwalyakoparkar as a contributor (#4156) [Kaiwalya Koparkar]
  + BSD: remove datasource_list from cloud.cfg template (#4159) [Mina Galić]
  + launching salt-minion in masterless mode (#4110) [Denis Halturin]
  + tools: fix run-container builds for rockylinux/8 git hash mismatch
    (#4161)
  + fix doc lint: spellchecker tripped up (#4160) [Mina Galić]
  + Support Ephemeral Networking for BSD (#2127)
  + Added / fixed support for static routes on OpenBSD and FreeBSD (#2157)
    [Kadir Mueller]
  + cc_rsyslog: Refactor for better multi-platform support (#4119)
    [Mina Galić] (LP: #1798055)
  + tests: fix test_lp1835584 (#4154)
  + cloud.cfg mod names: docs and rename salt_minion and set_password (#4153)
  + vultr: remove check_route check (#2151) [Jonas Chevalier]
  + Update SECURITY.md (#4150) [Indrranil Pawar]
  + Update CONTRIBUTING.rst (#4149) [Indrranil Pawar]
  + Update .github-cla-signers (#4151) [Indrranil Pawar]
  + Standardise module names in cloud.cfg.tmpl to only use underscore
    (#4128) [dermotbradley]
  + Modify PR template so autoclose works
From 23.2.2
  + Fix NoCloud kernel commandline key parsing (#4273) (Fixes: #4271)
    (LP: #2028562)
  + Fix reference before assignment (#4292) (Fixes: #4288) (LP: #2028784)
From 23.2.1
  + nocloud: Fix parse_cmdline detection of nocloud-net datasource (#4204)
    (Fixes: 4203) (LP: #2025180)
From 23.2
  + BSD: simplify finding MBR partitions by removing duplicate code
   [Mina Galić]
  + tests: bump pycloudlib version for mantic builds
  + network-manager: Set higher autoconnect priority for nm keyfiles (#3671)
    [Ani Sinha]
  + alpine.py: change the locale file used (#4139) [dermotbradley]
  + cc_ntp: Sync up with current FreeBSD ntp.conf (#4122) [Mina Galić]
  + config: drop refresh_rmc_and_interface as RHEL 7 no longer supported
    [Robert Schweikert]
  + docs: Add feedback button to docs
  + net/sysconfig: enable sysconfig renderer if network manager has ifcfg-rh
    plugin (#4132) [Ani Sinha]
  + For Alpine use os-release PRETTY_NAME (#4138) [dermotbradley]
  + network_manager: add a method for ipv6 static IP configuration (#4127)
    [Ani Sinha]
  + correct misnamed template file host.mariner.tmpl (#4124) [dermotbradley]
  + nm: generate ipv6 stateful dhcp config at par with sysconfig (#4115)
    [Ani Sinha]
  + Add templates for GitHub Issues
  + Add 'peers' and 'allow' directives in cc_ntp (#3124) [Jacob Salmela]
  + FreeBSD: Fix user account locking (#4114) [Mina Galić] (GH: #1854594)
  + FreeBSD: add ResizeGrowFS class to cc_growpart (#2334) [Mina Galić]
  + Update tests in Azure TestCanDevBeReformatted class (#2771)
    [Ksenija Stanojevic]
  + Replace Launchpad references with GitHub Issues
  + Fix KeyError in iproute pformat (#3287) [Dmitry Zykov]
  + schema: read_cfg_paths call init.fetch to lookup /v/l/c/instance
  + azure/errors: introduce reportable errors for imds (#3647)
    [Chris Patterson]
  + FreeBSD (and friends): better identify MBR slices (#2168)
    [Mina Galić] (LP: #2016350)
  + azure/errors: add host reporting for dhcp errors (#2167)
    [Chris Patterson]
  + net: purge blacklist_drivers across net and azure (#2160)
    [Chris Patterson]
  + net: refactor hyper-v VF filtering and apply to get_interfaces() (#2153)
    [Chris Patterson]
  + tests: avoid leaks to underlying filesystem for /etc/cloud/clean.d
    (#2251)
  + net: refactor find_candidate_nics_on_linux() to use get_interfaces()
    (#2159) [Chris Patterson]
  + resolv_conf: Allow &gt; 3 nameservers (#2152) [Major Hayden]
  + Remove mount NTFS error message (#2134) [Ksenija Stanojevic]
  + integration tests: fix image specification parsing (#2166)
  + ci: add hypothesis scheduled GH check (#2149)
  + Move supported distros list to docs (#2162)
  + Fix logger, use instance rather than module function (#2163)
  + README: Point to Github Actions build status (#2158)
  + Revert 'fix linux-specific code on bsd (#2143)' (#2161)
  + Do not generate dsa and ed25519 key types when crypto FIPS mode is
    enabled (#2142) [Ani Sinha] (LP: 2017761)
  + Add documentation label automatically (#2156)
  + sources/azure: report success to host and introduce kvp module (#2141)
    [Chris Patterson]
  + setup.py: use pkg-config for udev/rules path (#2137) [dankm]
  + openstack/static: honor the DNS servers associated with a network
    (#2138) [Gon?ri Le Bouder]
  + fix linux-specific code on bsd (#2143)
  + cli: schema validation of jinja template user-data (SC-1385) (#2132)
    (LP: #1881925)
  + gce: activate network discovery on every boot (#2128)
  + tests: update integration test to assert 640 across reboots (#2145)
  + Make user/vendor data sensitive and remove log permissions (#2144)
    (LP: #2013967)
  + Update kernel command line docs (SC-1457) (#2133)
  + docs: update network configuration path links (#2140) [d1r3ct0r]
  + sources/azure: report failures to host via kvp (#2136) [Chris Patterson]
  + net: Document use of `ip route append` to add routes (#2130)
  + dhcp: Add missing mocks (#2135)
  + azure/imds: retry fetching metadata up to 300 seconds (#2121)
    [Chris Patterson]
  + [1/2] DHCP: Refactor dhcp client code  (#2122)
  + azure/errors: treat traceback_base64 as string (#2131) [Chris Patterson]
  + azure/errors: introduce reportable errors (#2129) [Chris Patterson]
  + users: schema permit empty list to indicate create no users
  + azure: introduce identity module (#2116) [Chris Patterson]
  + Standardize disabling cloud-init on non-systemd (#2112)
  + Update .github-cla-signers (#2126) [Rob Tongue]
  + NoCloud: Use seedfrom protocol to determine mode (#2107)
  + rhel: Remove sysvinit files. (#2114)
  + tox.ini: set -vvvv --showlocals for pytest (#2104) [Chris Patterson]
  + Fix NoCloud kernel commandline semi-colon args
  + run-container: make the container/VM timeout configurable (#2118)
    [Paride Legovini]
  + suse: Remove sysvinit files. (#2115)
  + test: Backport assert_call_count for old requests (#2119)
  + Add 'licebmi' as contributor (#2113) [Mark Martinez]
  + Adapt DataSourceScaleway to upcoming IPv6 support (#2033)
    [Louis Bouchard]
  + rhel: make sure previous-hostname file ends with a new line (#2108)
    [Ani Sinha]
  + Adding contributors for DataSourceAkamai (#2110) [acourdavAkamai]
  + Cleanup ephemeral IP routes on exception (#2100) [sxt1001]
  + commit 09a64badfb3f51b1b391fa29be19962381a4bbeb [sxt1001] (LP: #2011291)
  + Standardize kernel commandline user interface (#2093)
  + config/cc_resizefs: fix do_resize arguments (#2106) [Chris Patterson]
  + Fix test_dhclient_exits_with_error (#2105)
  + net/dhcp: catch dhclient failures and raise NoDHCPLeaseError (#2083)
    [Chris Patterson]
  + sources/azure: move pps handling out of _poll_imds() (#2075)
    [Chris Patterson]
  + tests: bump pycloudlib version (#2102)
  + schema: do not manipulate draft4 metaschema for jsonschema 2.6.0 (#2098)
  + sources/azure/imds: don't count timeout errors as connection errors
    (#2074) [Chris Patterson]
  + Fix Python 3.12 unit test failures (#2099)
  + integration tests: Refactor instance checking (#1989)
  + ci: migrate remaining jobs from travis to gh (#2085)
  + missing ending quote in instancedata docs(#2094) [Hong L]
  + refactor: stop passing log instances to cc_* handlers (#2016) [d1r3ct0r]
  + tests/vmware: fix test_no_data_access_method failure (#2092)
    [Chris Patterson]
  + Don't change permissions of netrules target (#2076) (LP: #2011783)
  + tests/sources: patch util.get_cmdline() for datasource tests (#2091)
    [Chris Patterson]
  + macs: ignore duplicate MAC for devs with driver driver qmi_wwan (#2090)
    (LP: #2008888)
  + Fedora: Enable CA handling (#2086) [František Zatloukal]
  + Send dhcp-client-identifier for InfiniBand ports (#2043) [Waleed Mousa]
  + cc_ansible: complete the examples and doc (#2082) [Yves]
  + bddeb: for dev package, derive debhelper-compat from host system
  + apport: only prompt for cloud_name when instance-data.json is absent
  + datasource: Optimize datasource detection, fix bugs (#2060)
  + Handle non existent ca-cert-config situation (#2073) [Shreenidhi Shedi]
  + sources/azure: add networking check for all source PPS (#2061)
    [Chris Patterson]
  + do not attempt dns resolution on ip addresses (#2040)
  + chore: fix style tip (#2071)
  + Fix metadata IP in instancedata.rst (#2063) [Brian Haley]
  + util: Pass deprecation schedule in deprecate_call() (#2064)
  + config: Update grub-dpkg docs (#2058)
  + docs: Cosmetic improvements and styling (#2057) [s-makin]
  + cc_grub_dpkg: Added UEFI support (#2029) [Alexander Birkner]
  + tests: Write to /var/spool/rsyslog to adhere to apparmor profile (#2059)
  + oracle-ds: prefer system_cfg over ds network config source (#1998)
    (LP: #1956788)
  + Remove dead code (#2038)
  + source: Force OpenStack when it is only option (#2045) (LP: #2008727)
  + cc_ubuntu_advantage: improve UA logs discovery
  + sources/azure: fix regressions in IMDS behavior (#2041) [Chris Patterson]
  + tests: fix test_schema (#2042)
  + dhcp: Cleanup unused kwarg (#2037)
  + sources/vmware/imc: fix-missing-catch-few-negtive-scenarios (#2027)
    [PengpengSun]
  + dhclient_hook: remove vestigal dhclient_hook command (#2015)
  + log: Add standardized deprecation tooling (SC-1312) (#2026)
  + Enable SUSE based distros for ca handling (#2036) [Robert Schweikert]
From 23.1.2
  + Make user/vendor data sensitive and remove log permissions
    (LP: #2013967) (CVE-2023-1786)

- Remove six dependency (bsc#1198269)
- Update to version 22.4 (bsc#1201010)

  		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-16"/>
	<updated date="2024-01-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198269">SUSE bug 1198269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201010">SUSE bug 1201010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214169">SUSE bug 1214169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215740">SUSE bug 1215740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215794">SUSE bug 1215794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216007">SUSE bug 1216007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216011">SUSE bug 1216011</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1786/">CVE-2023-1786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1786">CVE-2023-1786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009817911" comment="cloud-init-23.3-150100.8.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817912" comment="cloud-init-config-suse-23.3-150100.8.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817913" comment="cloud-init-doc-23.3-150100.8.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4647" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215005" ref_url="https://bugzilla.suse.com/1215005" source="BUGZILLA"/>
		<reference ref_id="1217316" ref_url="https://bugzilla.suse.com/1217316" source="BUGZILLA"/>
		<reference ref_id="1217320" ref_url="https://bugzilla.suse.com/1217320" source="BUGZILLA"/>
		<reference ref_id="1217321" ref_url="https://bugzilla.suse.com/1217321" source="BUGZILLA"/>
		<reference ref_id="1217324" ref_url="https://bugzilla.suse.com/1217324" source="BUGZILLA"/>
		<reference ref_id="1217326" ref_url="https://bugzilla.suse.com/1217326" source="BUGZILLA"/>
		<reference ref_id="1217329" ref_url="https://bugzilla.suse.com/1217329" source="BUGZILLA"/>
		<reference ref_id="1217330" ref_url="https://bugzilla.suse.com/1217330" source="BUGZILLA"/>
		<reference ref_id="1217432" ref_url="https://bugzilla.suse.com/1217432" source="BUGZILLA"/>
		<reference ref_id="1219581" ref_url="https://bugzilla.suse.com/1219581" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4750" ref_url="https://www.suse.com/security/cve/CVE-2023-4750/" source="CVE"/>
		<reference ref_id="CVE-2023-48231" ref_url="https://www.suse.com/security/cve/CVE-2023-48231/" source="CVE"/>
		<reference ref_id="CVE-2023-48232" ref_url="https://www.suse.com/security/cve/CVE-2023-48232/" source="CVE"/>
		<reference ref_id="CVE-2023-48233" ref_url="https://www.suse.com/security/cve/CVE-2023-48233/" source="CVE"/>
		<reference ref_id="CVE-2023-48234" ref_url="https://www.suse.com/security/cve/CVE-2023-48234/" source="CVE"/>
		<reference ref_id="CVE-2023-48235" ref_url="https://www.suse.com/security/cve/CVE-2023-48235/" source="CVE"/>
		<reference ref_id="CVE-2023-48236" ref_url="https://www.suse.com/security/cve/CVE-2023-48236/" source="CVE"/>
		<reference ref_id="CVE-2023-48237" ref_url="https://www.suse.com/security/cve/CVE-2023-48237/" source="CVE"/>
		<reference ref_id="CVE-2023-48706" ref_url="https://www.suse.com/security/cve/CVE-2023-48706/" source="CVE"/>
		<reference ref_id="CVE-2024-22667" ref_url="https://www.suse.com/security/cve/CVE-2024-22667/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018354.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

Updated to version 9.1.0111, fixes the following security problems

- CVE-2023-48231: Use-After-Free in win_close() (bsc#1217316).
- CVE-2023-48232: Floating point Exception in adjust_plines_for_skipcol() (bsc#1217320).
- CVE-2023-48233: overflow with count for :s command (bsc#1217321).
- CVE-2023-48234: overflow in nv_z_get_count (bsc#1217324).
- CVE-2023-48235: overflow in ex address parsing (CVE-2023-48235).
- CVE-2023-48236: overflow in get_number (bsc#1217329).
- CVE-2023-48237: overflow in shift_line (bsc#1217330).
- CVE-2023-48706: heap-use-after-free in ex_substitute (bsc#1217432).
- CVE-2024-22667: stack-based buffer overflow in did_set_langmap function in map.c (bsc#1219581).
- CVE-2023-4750: Heap use-after-free in function bt_quickfix (bsc#1215005).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-15"/>
	<updated date="2024-04-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215005">SUSE bug 1215005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217316">SUSE bug 1217316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217320">SUSE bug 1217320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217321">SUSE bug 1217321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217324">SUSE bug 1217324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217326">SUSE bug 1217326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217329">SUSE bug 1217329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217330">SUSE bug 1217330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217432">SUSE bug 1217432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219581">SUSE bug 1219581</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4750/">CVE-2023-4750 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4750">CVE-2023-4750 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-48231/">CVE-2023-48231 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48231">CVE-2023-48231 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-48232/">CVE-2023-48232 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48232">CVE-2023-48232 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-48233/">CVE-2023-48233 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48233">CVE-2023-48233 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-48234/">CVE-2023-48234 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48234">CVE-2023-48234 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-48235/">CVE-2023-48235 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48235">CVE-2023-48235 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-48236/">CVE-2023-48236 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48236">CVE-2023-48236 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-48237/">CVE-2023-48237 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48237">CVE-2023-48237 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-48706/">CVE-2023-48706 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48706">CVE-2023-48706 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22667/">CVE-2024-22667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22667">CVE-2024-22667 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854716" comment="gvim-9.1.0111-150500.20.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854717" comment="vim-9.1.0111-150500.20.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854718" comment="vim-data-9.1.0111-150500.20.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854719" comment="vim-data-common-9.1.0111-150500.20.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854720" comment="vim-small-9.1.0111-150500.20.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4648" version="1" class="patch">
	<metadata>
		<title>Security update for emacs (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222050" ref_url="https://bugzilla.suse.com/1222050" source="BUGZILLA"/>
		<reference ref_id="1222052" ref_url="https://bugzilla.suse.com/1222052" source="BUGZILLA"/>
		<reference ref_id="1222053" ref_url="https://bugzilla.suse.com/1222053" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-30203" ref_url="https://www.suse.com/security/cve/CVE-2024-30203/" source="CVE"/>
		<reference ref_id="CVE-2024-30204" ref_url="https://www.suse.com/security/cve/CVE-2024-30204/" source="CVE"/>
		<reference ref_id="CVE-2024-30205" ref_url="https://www.suse.com/security/cve/CVE-2024-30205/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1294-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034984.html" source="SUSE-SU"/>
		<description>
This update for emacs fixes the following issues:

- CVE-2024-30203: Fixed treating inline MIME contents as trusted (bsc#1222053)
- CVE-2024-30204: Fixed LaTeX preview enabled by default for e-mail attachments (bsc#1222052)
- CVE-2024-30205: Fixed Org mode considering contents of remote files as trusted (bsc#1222050)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-15"/>
	<updated date="2024-04-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1222050">SUSE bug 1222050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222052">SUSE bug 1222052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222053">SUSE bug 1222053</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-30203/">CVE-2024-30203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30203">CVE-2024-30203 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-30204/">CVE-2024-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30204">CVE-2024-30204 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-30205/">CVE-2024-30205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30205">CVE-2024-30205 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854721" comment="emacs-27.2-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854722" comment="emacs-el-27.2-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854723" comment="emacs-info-27.2-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854724" comment="emacs-nox-27.2-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854725" comment="emacs-x11-27.2-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854726" comment="etags-27.2-150400.3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4649" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1221984" ref_url="https://bugzilla.suse.com/1221984" source="BUGZILLA"/>
		<reference ref_id="1222302" ref_url="https://bugzilla.suse.com/1222302" source="BUGZILLA"/>
		<reference ref_id="1222453" ref_url="https://bugzilla.suse.com/1222453" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46842" ref_url="https://www.suse.com/security/cve/CVE-2023-46842/" source="CVE"/>
		<reference ref_id="CVE-2024-2201" ref_url="https://www.suse.com/security/cve/CVE-2024-2201/" source="CVE"/>
		<reference ref_id="CVE-2024-31142" ref_url="https://www.suse.com/security/cve/CVE-2024-31142/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1295-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034983.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2023-46842: Fixed denial of service due to Xen bug check triggered by HVM hypercalls (XSA-454) in xen x86 (bsc#1221984)
- CVE-2024-31142: Fixed incorrect logic for BTC/SRSO mitigations (XSA-455) in xen x86 (bsc#1222302)
- CVE-2024-2201: Fixed memory disclosure via Native Branch History Injection (XSA-456) in xen x86 (bsc#1222453)

Other fixes:

- Update to Xen 4.17.4 (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-15"/>
	<updated date="2024-04-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221984">SUSE bug 1221984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222302">SUSE bug 1222302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222453">SUSE bug 1222453</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46842/">CVE-2023-46842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46842">CVE-2023-46842 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2201/">CVE-2024-2201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2201">CVE-2024-2201 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-31142/">CVE-2024-31142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31142">CVE-2024-31142 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854727" comment="xen-4.17.4_02-150500.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854728" comment="xen-devel-4.17.4_02-150500.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854729" comment="xen-doc-html-4.17.4_02-150500.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854730" comment="xen-libs-4.17.4_02-150500.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854731" comment="xen-libs-32bit-4.17.4_02-150500.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854732" comment="xen-tools-4.17.4_02-150500.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854733" comment="xen-tools-domU-4.17.4_02-150500.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854734" comment="xen-tools-xendomains-wait-disk-4.17.4_02-150500.3.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4650" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs20 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220053" ref_url="https://bugzilla.suse.com/1220053" source="BUGZILLA"/>
		<reference ref_id="1222244" ref_url="https://bugzilla.suse.com/1222244" source="BUGZILLA"/>
		<reference ref_id="1222384" ref_url="https://bugzilla.suse.com/1222384" source="BUGZILLA"/>
		<reference ref_id="1222530" ref_url="https://bugzilla.suse.com/1222530" source="BUGZILLA"/>
		<reference ref_id="1222603" ref_url="https://bugzilla.suse.com/1222603" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-24806" ref_url="https://www.suse.com/security/cve/CVE-2024-24806/" source="CVE"/>
		<reference ref_id="CVE-2024-27982" ref_url="https://www.suse.com/security/cve/CVE-2024-27982/" source="CVE"/>
		<reference ref_id="CVE-2024-27983" ref_url="https://www.suse.com/security/cve/CVE-2024-27983/" source="CVE"/>
		<reference ref_id="CVE-2024-30260" ref_url="https://www.suse.com/security/cve/CVE-2024-30260/" source="CVE"/>
		<reference ref_id="CVE-2024-30261" ref_url="https://www.suse.com/security/cve/CVE-2024-30261/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034986.html" source="SUSE-SU"/>
		<description>
This update for nodejs20 fixes the following issues:

Update to 20.12.1

Security fixes:

 - CVE-2024-27983: Fixed failed assertion in node::http2::Http2Session::~Http2Session() that could lead to HTTP/2 server crash (bsc#1222244)
 - CVE-2024-27982: Fixed HTTP Request Smuggling via Content Length Obfuscation (bsc#1222384)
 - CVE-2024-30260: Fixed proxy-authorization header not cleared on cross-origin redirect in undici (bsc#1222530)
 - CVE-2024-30261: Fixed fetch with integrity option is too lax when algorithm is specified but hash value is in incorrect in undici (bsc#1222603)  
 - CVE-2024-24806: Fixed improper domain lookup that potentially leads to SSRF attacks in libuv (bsc#1220053)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220053">SUSE bug 1220053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222244">SUSE bug 1222244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222384">SUSE bug 1222384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222530">SUSE bug 1222530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222603">SUSE bug 1222603</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-24806/">CVE-2024-24806 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24806">CVE-2024-24806 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-27982/">CVE-2024-27982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27982">CVE-2024-27982 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27983/">CVE-2024-27983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27983">CVE-2024-27983 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-30260/">CVE-2024-30260 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-30260">CVE-2024-30260 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-30261/">CVE-2024-30261 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-30261">CVE-2024-30261 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854735" comment="corepack20-20.12.1-150500.11.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854736" comment="nodejs20-20.12.1-150500.11.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854737" comment="nodejs20-devel-20.12.1-150500.11.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854738" comment="nodejs20-docs-20.12.1-150500.11.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854739" comment="npm20-20.12.1-150500.11.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4651" version="1" class="patch">
	<metadata>
		<title>Security update for eclipse, maven-surefire, tycho (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216992" ref_url="https://bugzilla.suse.com/1216992" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4218" ref_url="https://www.suse.com/security/cve/CVE-2023-4218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1304-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034994.html" source="SUSE-SU"/>
		<description>
This update for eclipse, maven-surefire, tycho fixes the following issues:

eclipse received the following security fix:

- CVE-2023-4218: Fixed a bug where parsing files with xml content laeds to XXE attacks. (bsc#1216992)

maven-sunfire was updated from version 2.22.0 to 2.22.2:

- Changes in version 2.22.2:

  * Bugs fixed:

    + Fixed JUnit Runner that writes to System.out corrupts Surefire’s STDOUT when using JUnit’s Vintage
      Engine

- Changes in version 2.22.1:

  * Bugs fixed:

    + Fixed Surefire unable to run testng suites in parallel
    + Fixed Git wrongly considering PNG files as changed when there is no change
    + Fixed the surefire XSD published on maven site lacking of some rerun element
    + Fixed XML Report elements rerunError, rerunFailure, flakyFailure, flakyError
    + Fixed overriding platform version through project/plugin dependencies
    + Fixed mixed up characters in standard output
    + Logs in Parallel Tests are mixed up when `forkMode=never` or `forkCount=0`
    + MIME type for javascript is now officially application/javascript

  * Improvements:

    + Elapsed time in XML Report should satisfy pattern in XSD.
    + Fix old test resources TEST-*.xml in favor of continuing with SUREFIRE-1550
    + Nil element “failureMessage” in failsafe-summary.xml should have self closed tag
    + Removed obsolete module `surefire-setup-integration-tests`
    + Support Java 11
    + Surefire should support parameterized reportsDirectory

  * Dependency upgrades:

    + Upgraded maven-plugins parent to version 32
    + Upgraded maven-plugins parent to version 33

tycho received the following bug fixes:

- Fixed build against maven-surefire 2.22.1 and newer
- Fixed build against newer plexus-compiler
- Fixed issues with plexus-archiver 4.4.0 and newer
- Require explicitely artifacts that will not be required automatically any more
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-04-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1216992">SUSE bug 1216992</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4218/">CVE-2023-4218 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4218">CVE-2023-4218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854839" comment="eclipse-contributor-tools-4.15-150200.4.16.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854840" comment="eclipse-emf-core-2.22.0-150200.4.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854841" comment="eclipse-emf-core-bootstrap-2.22.0-150200.4.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854842" comment="eclipse-emf-runtime-2.22.0-150200.4.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854843" comment="eclipse-emf-sdk-2.22.0-150200.4.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854844" comment="eclipse-emf-xsd-2.22.0-150200.4.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854845" comment="eclipse-equinox-osgi-4.15-150200.4.16.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854846" comment="eclipse-equinox-osgi-bootstrap-4.15-150200.4.16.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854847" comment="eclipse-jdt-4.15-150200.4.16.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854848" comment="eclipse-jdt-bootstrap-4.15-150200.4.16.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854849" comment="eclipse-p2-discovery-4.15-150200.4.16.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854850" comment="eclipse-p2-discovery-bootstrap-4.15-150200.4.16.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854851" comment="eclipse-pde-4.15-150200.4.16.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854852" comment="eclipse-pde-bootstrap-4.15-150200.4.16.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854853" comment="eclipse-platform-4.15-150200.4.16.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854854" comment="eclipse-platform-bootstrap-4.15-150200.4.16.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854855" comment="eclipse-swt-4.15-150200.4.16.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854856" comment="eclipse-swt-bootstrap-4.15-150200.4.16.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854857" comment="maven-failsafe-plugin-2.22.2-150200.3.9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854858" comment="maven-failsafe-plugin-bootstrap-2.22.2-150200.3.9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854859" comment="maven-surefire-2.22.2-150200.3.9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854860" comment="maven-surefire-javadoc-2.22.2-150200.3.9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854861" comment="maven-surefire-plugin-2.22.2-150200.3.9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854862" comment="maven-surefire-plugin-bootstrap-2.22.2-150200.3.9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854863" comment="maven-surefire-plugins-javadoc-2.22.2-150200.3.9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854864" comment="maven-surefire-provider-junit-2.22.2-150200.3.9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854865" comment="maven-surefire-provider-junit5-2.22.2-150200.3.9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854866" comment="maven-surefire-provider-junit5-javadoc-2.22.2-150200.3.9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854867" comment="maven-surefire-provider-testng-2.22.2-150200.3.9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854868" comment="maven-surefire-report-parser-2.22.2-150200.3.9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854869" comment="maven-surefire-report-plugin-2.22.2-150200.3.9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854870" comment="maven-surefire-report-plugin-bootstrap-2.22.2-150200.3.9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854871" comment="tycho-1.6.0-150200.4.9.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854872" comment="tycho-bootstrap-1.6.0-150200.4.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854873" comment="tycho-javadoc-1.6.0-150200.4.9.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4652" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs18 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220053" ref_url="https://bugzilla.suse.com/1220053" source="BUGZILLA"/>
		<reference ref_id="1222244" ref_url="https://bugzilla.suse.com/1222244" source="BUGZILLA"/>
		<reference ref_id="1222384" ref_url="https://bugzilla.suse.com/1222384" source="BUGZILLA"/>
		<reference ref_id="1222530" ref_url="https://bugzilla.suse.com/1222530" source="BUGZILLA"/>
		<reference ref_id="1222603" ref_url="https://bugzilla.suse.com/1222603" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-24806" ref_url="https://www.suse.com/security/cve/CVE-2024-24806/" source="CVE"/>
		<reference ref_id="CVE-2024-27982" ref_url="https://www.suse.com/security/cve/CVE-2024-27982/" source="CVE"/>
		<reference ref_id="CVE-2024-27983" ref_url="https://www.suse.com/security/cve/CVE-2024-27983/" source="CVE"/>
		<reference ref_id="CVE-2024-30260" ref_url="https://www.suse.com/security/cve/CVE-2024-30260/" source="CVE"/>
		<reference ref_id="CVE-2024-30261" ref_url="https://www.suse.com/security/cve/CVE-2024-30261/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1309-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034989.html" source="SUSE-SU"/>
		<description>
This update for nodejs18 fixes the following issues:

Update to 18.20.1

Security fixes:

 - CVE-2024-27983: Fixed failed assertion in node::http2::Http2Session::~Http2Session() that could lead to HTTP/2 server crash (bsc#1222244)
 - CVE-2024-27982: Fixed HTTP Request Smuggling via Content Length Obfuscation (bsc#1222384)
 - CVE-2024-30260: Fixed proxy-authorization header not cleared on cross-origin redirect in undici (bsc#1222530)
 - CVE-2024-30261: Fixed fetch with integrity option is too lax when algorithm is specified but hash value is in incorrect in undici (bsc#1222603)  
 - CVE-2024-24806: Fixed improper domain lookup that potentially leads to SSRF attacks in libuv (bsc#1220053)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220053">SUSE bug 1220053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222244">SUSE bug 1222244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222384">SUSE bug 1222384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222530">SUSE bug 1222530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222603">SUSE bug 1222603</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-24806/">CVE-2024-24806 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24806">CVE-2024-24806 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-27982/">CVE-2024-27982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27982">CVE-2024-27982 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27983/">CVE-2024-27983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27983">CVE-2024-27983 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-30260/">CVE-2024-30260 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-30260">CVE-2024-30260 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-30261/">CVE-2024-30261 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-30261">CVE-2024-30261 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854874" comment="corepack18-18.20.1-150400.9.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854875" comment="nodejs18-18.20.1-150400.9.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854876" comment="nodejs18-devel-18.20.1-150400.9.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854877" comment="nodejs18-docs-18.20.1-150400.9.21.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854878" comment="npm18-18.20.1-150400.9.21.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4653" version="1" class="patch">
	<metadata>
		<title>Security update for texlive (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222126" ref_url="https://bugzilla.suse.com/1222126" source="BUGZILLA"/>
		<reference ref_id="1222127" ref_url="https://bugzilla.suse.com/1222127" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46048" ref_url="https://www.suse.com/security/cve/CVE-2023-46048/" source="CVE"/>
		<reference ref_id="CVE-2023-46051" ref_url="https://www.suse.com/security/cve/CVE-2023-46051/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034988.html" source="SUSE-SU"/>
		<description>
This update for texlive fixes the following issues:

- CVE-2023-46048: Fixed NULL pointer dereference in texk/web2c/pdftexdir/writet1.c (bsc#1222126)
- CVE-2023-46051: Fixed NULL pointer dereference in texk/web2c/pdftexdir/tounicode.c (bsc#1222127)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-04-16"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1222126">SUSE bug 1222126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222127">SUSE bug 1222127</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-46048/">CVE-2023-46048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46048">CVE-2023-46048 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-46051/">CVE-2023-46051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46051">CVE-2023-46051 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009854879" comment="libkpathsea6-6.3.3-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854880" comment="libptexenc1-1.3.9-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854881" comment="libsynctex2-1.21-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854882" comment="libtexlua53-5-5.3.6-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854883" comment="libtexluajit2-2.1.0beta3-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854884" comment="perl-biber-2021.20210325.svn30357-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854885" comment="texlive-2021.20210325-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854886" comment="texlive-a2ping-bin-2021.20210325.svn27321-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854887" comment="texlive-accfonts-bin-2021.20210325.svn12688-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854888" comment="texlive-adhocfilelist-bin-2021.20210325.svn28038-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854889" comment="texlive-afm2pl-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854890" comment="texlive-albatross-bin-2021.20210325.svn57089-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854891" comment="texlive-aleph-bin-2021.20210325.svn58378-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854892" comment="texlive-amstex-bin-2021.20210325.svn3006-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854893" comment="texlive-arara-bin-2021.20210325.svn29036-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854894" comment="texlive-asymptote-bin-2021.20210325.svn57890-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854895" comment="texlive-attachfile2-bin-2021.20210325.svn52909-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854896" comment="texlive-authorindex-bin-2021.20210325.svn18790-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854897" comment="texlive-autosp-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854898" comment="texlive-axodraw2-bin-2021.20210325.svn58378-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854899" comment="texlive-bib2gls-bin-2021.20210325.svn45266-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854900" comment="texlive-biber-bin-2021.20210325.svn57273-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854901" comment="texlive-bibexport-bin-2021.20210325.svn16219-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854902" comment="texlive-bibtex-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854903" comment="texlive-bibtex8-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854904" comment="texlive-bibtexu-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854905" comment="texlive-bin-devel-2021.20210325-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854906" comment="texlive-bundledoc-bin-2021.20210325.svn17794-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854907" comment="texlive-cachepic-bin-2021.20210325.svn15543-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854908" comment="texlive-checkcites-bin-2021.20210325.svn25623-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854909" comment="texlive-checklistings-bin-2021.20210325.svn38300-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854910" comment="texlive-chklref-bin-2021.20210325.svn52631-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854911" comment="texlive-chktex-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854912" comment="texlive-cjk-gs-integrate-bin-2021.20210325.svn37223-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854913" comment="texlive-cjkutils-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854914" comment="texlive-clojure-pamphlet-bin-2021.20210325.svn51944-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854915" comment="texlive-cluttex-bin-2021.20210325.svn48871-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854916" comment="texlive-context-bin-2021.20210325.svn34112-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854917" comment="texlive-convbkmk-bin-2021.20210325.svn30408-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854918" comment="texlive-crossrefware-bin-2021.20210325.svn45927-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854919" comment="texlive-cslatex-bin-2021.20210325.svn3006-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854920" comment="texlive-csplain-bin-2021.20210325.svn50528-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854921" comment="texlive-ctan-o-mat-bin-2021.20210325.svn46996-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854922" comment="texlive-ctanbib-bin-2021.20210325.svn48478-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854923" comment="texlive-ctanify-bin-2021.20210325.svn24061-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854924" comment="texlive-ctanupload-bin-2021.20210325.svn23866-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854925" comment="texlive-ctie-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854926" comment="texlive-cweb-bin-2021.20210325.svn58136-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854927" comment="texlive-cyrillic-bin-bin-2021.20210325.svn53554-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854928" comment="texlive-de-macro-bin-2021.20210325.svn17399-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854929" comment="texlive-detex-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854930" comment="texlive-diadia-bin-2021.20210325.svn37645-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854931" comment="texlive-dosepsbin-bin-2021.20210325.svn24759-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854932" comment="texlive-dtl-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854933" comment="texlive-dtxgen-bin-2021.20210325.svn29031-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854934" comment="texlive-dviasm-bin-2021.20210325.svn8329-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854935" comment="texlive-dvicopy-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854936" comment="texlive-dvidvi-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854937" comment="texlive-dviinfox-bin-2021.20210325.svn44515-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854938" comment="texlive-dviljk-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854939" comment="texlive-dviout-util-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854940" comment="texlive-dvipdfmx-bin-2021.20210325.svn58535-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854941" comment="texlive-dvipng-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854942" comment="texlive-dvipos-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854943" comment="texlive-dvips-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854944" comment="texlive-dvisvgm-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854945" comment="texlive-eplain-bin-2021.20210325.svn3006-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854946" comment="texlive-epspdf-bin-2021.20210325.svn29050-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854947" comment="texlive-epstopdf-bin-2021.20210325.svn18336-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854948" comment="texlive-exceltex-bin-2021.20210325.svn25860-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854949" comment="texlive-fig4latex-bin-2021.20210325.svn14752-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854950" comment="texlive-findhyph-bin-2021.20210325.svn14758-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854951" comment="texlive-fontinst-bin-2021.20210325.svn53554-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854952" comment="texlive-fontools-bin-2021.20210325.svn25997-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854953" comment="texlive-fontware-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854954" comment="texlive-fragmaster-bin-2021.20210325.svn13663-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854955" comment="texlive-getmap-bin-2021.20210325.svn34971-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854956" comment="texlive-git-latexdiff-bin-2021.20210325.svn54732-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854957" comment="texlive-glossaries-bin-2021.20210325.svn37813-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854958" comment="texlive-gregoriotex-bin-2021.20210325.svn58378-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854959" comment="texlive-gsftopk-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854960" comment="texlive-hyperxmp-bin-2021.20210325.svn56984-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854961" comment="texlive-jadetex-bin-2021.20210325.svn3006-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854962" comment="texlive-jfmutil-bin-2021.20210325.svn44835-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854963" comment="texlive-ketcindy-bin-2021.20210325.svn49033-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854964" comment="texlive-kotex-utils-bin-2021.20210325.svn32101-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854965" comment="texlive-kpathsea-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854966" comment="texlive-kpathsea-devel-6.3.3-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854967" comment="texlive-l3build-bin-2021.20210325.svn46894-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854968" comment="texlive-lacheck-bin-2021.20210325.svn53999-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854969" comment="texlive-latex-bin-bin-2021.20210325.svn54358-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854970" comment="texlive-latex-bin-dev-bin-2021.20210325.svn53999-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854971" comment="texlive-latex-git-log-bin-2021.20210325.svn30983-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854972" comment="texlive-latex-papersize-bin-2021.20210325.svn42296-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854973" comment="texlive-latex2man-bin-2021.20210325.svn13663-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854974" comment="texlive-latex2nemeth-bin-2021.20210325.svn42300-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854975" comment="texlive-latexdiff-bin-2021.20210325.svn16420-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854976" comment="texlive-latexfileversion-bin-2021.20210325.svn25012-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854977" comment="texlive-latexindent-bin-2021.20210325.svn32150-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854978" comment="texlive-latexmk-bin-2021.20210325.svn10937-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854979" comment="texlive-latexpand-bin-2021.20210325.svn27025-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854980" comment="texlive-lcdftypetools-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854981" comment="texlive-light-latex-make-bin-2021.20210325.svn56352-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854982" comment="texlive-lilyglyphs-bin-2021.20210325.svn31696-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854983" comment="texlive-listbib-bin-2021.20210325.svn26126-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854984" comment="texlive-listings-ext-bin-2021.20210325.svn15093-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854985" comment="texlive-lollipop-bin-2021.20210325.svn41465-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854986" comment="texlive-ltxfileinfo-bin-2021.20210325.svn29005-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854987" comment="texlive-ltximg-bin-2021.20210325.svn32346-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854988" comment="texlive-luahbtex-bin-2021.20210325.svn58535-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854989" comment="texlive-luajittex-bin-2021.20210325.svn58535-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854990" comment="texlive-luaotfload-bin-2021.20210325.svn34647-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854991" comment="texlive-luatex-bin-2021.20210325.svn58535-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854992" comment="texlive-lwarp-bin-2021.20210325.svn43292-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854993" comment="texlive-m-tx-bin-2021.20210325.svn50281-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854994" comment="texlive-make4ht-bin-2021.20210325.svn37750-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854995" comment="texlive-makedtx-bin-2021.20210325.svn38769-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854996" comment="texlive-makeindex-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854997" comment="texlive-match_parens-bin-2021.20210325.svn23500-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854998" comment="texlive-mathspic-bin-2021.20210325.svn23661-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009854999" comment="texlive-metafont-bin-2021.20210325.svn58378-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855000" comment="texlive-metapost-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855001" comment="texlive-mex-bin-2021.20210325.svn3006-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855002" comment="texlive-mf2pt1-bin-2021.20210325.svn23406-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855003" comment="texlive-mflua-bin-2021.20210325.svn58535-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855004" comment="texlive-mfware-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855005" comment="texlive-mkgrkindex-bin-2021.20210325.svn14428-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855006" comment="texlive-mkjobtexmf-bin-2021.20210325.svn8457-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855007" comment="texlive-mkpic-bin-2021.20210325.svn33688-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855008" comment="texlive-mltex-bin-2021.20210325.svn3006-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855009" comment="texlive-mptopdf-bin-2021.20210325.svn18674-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855010" comment="texlive-multibibliography-bin-2021.20210325.svn30534-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855011" comment="texlive-musixtex-bin-2021.20210325.svn37026-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855012" comment="texlive-musixtnt-bin-2021.20210325.svn50281-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855013" comment="texlive-omegaware-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855014" comment="texlive-optex-bin-2021.20210325.svn53804-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855015" comment="texlive-patgen-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855016" comment="texlive-pax-bin-2021.20210325.svn10843-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855017" comment="texlive-pdfbook2-bin-2021.20210325.svn37537-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855018" comment="texlive-pdfcrop-bin-2021.20210325.svn14387-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855019" comment="texlive-pdfjam-bin-2021.20210325.svn52858-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855020" comment="texlive-pdflatexpicscale-bin-2021.20210325.svn41779-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855021" comment="texlive-pdftex-bin-2021.20210325.svn58535-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855022" comment="texlive-pdftex-quiet-bin-2021.20210325.svn49140-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855023" comment="texlive-pdftosrc-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855024" comment="texlive-pdfxup-bin-2021.20210325.svn40690-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855025" comment="texlive-pedigree-perl-bin-2021.20210325.svn25962-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855026" comment="texlive-perltex-bin-2021.20210325.svn16181-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855027" comment="texlive-petri-nets-bin-2021.20210325.svn39165-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855028" comment="texlive-pfarrei-bin-2021.20210325.svn29348-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855029" comment="texlive-pkfix-bin-2021.20210325.svn13364-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855030" comment="texlive-pkfix-helper-bin-2021.20210325.svn13663-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855031" comment="texlive-platex-bin-2021.20210325.svn52800-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855032" comment="texlive-pmx-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855033" comment="texlive-pmxchords-bin-2021.20210325.svn32405-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855034" comment="texlive-ps2eps-bin-2021.20210325.svn50281-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855035" comment="texlive-ps2pk-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855036" comment="texlive-pst-pdf-bin-2021.20210325.svn7838-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855037" comment="texlive-pst2pdf-bin-2021.20210325.svn29333-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855038" comment="texlive-ptex-bin-2021.20210325.svn58378-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855039" comment="texlive-ptex-fontmaps-bin-2021.20210325.svn44206-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855040" comment="texlive-ptex2pdf-bin-2021.20210325.svn29335-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855041" comment="texlive-ptexenc-devel-1.3.9-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855042" comment="texlive-purifyeps-bin-2021.20210325.svn13663-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855043" comment="texlive-pygmentex-bin-2021.20210325.svn34996-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855044" comment="texlive-pythontex-bin-2021.20210325.svn31638-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855045" comment="texlive-rubik-bin-2021.20210325.svn32919-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855046" comment="texlive-scripts-bin-2021.20210325.svn55172-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855047" comment="texlive-scripts-extra-bin-2021.20210325.svn53577-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855048" comment="texlive-seetexk-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855049" comment="texlive-spix-bin-2021.20210325.svn55933-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855050" comment="texlive-splitindex-bin-2021.20210325.svn29688-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855051" comment="texlive-srcredact-bin-2021.20210325.svn38710-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855052" comment="texlive-sty2dtx-bin-2021.20210325.svn21215-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855053" comment="texlive-svn-multi-bin-2021.20210325.svn13663-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855054" comment="texlive-synctex-bin-2021.20210325.svn58136-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855055" comment="texlive-synctex-devel-1.21-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855056" comment="texlive-tex-bin-2021.20210325.svn58378-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855057" comment="texlive-tex4ebook-bin-2021.20210325.svn37771-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855058" comment="texlive-tex4ht-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855059" comment="texlive-texcount-bin-2021.20210325.svn13013-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855060" comment="texlive-texdef-bin-2021.20210325.svn45011-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855061" comment="texlive-texdiff-bin-2021.20210325.svn15506-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855062" comment="texlive-texdirflatten-bin-2021.20210325.svn12782-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855063" comment="texlive-texdoc-bin-2021.20210325.svn47948-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855064" comment="texlive-texdoctk-bin-2021.20210325.svn29741-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855065" comment="texlive-texfot-bin-2021.20210325.svn33155-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855066" comment="texlive-texliveonfly-bin-2021.20210325.svn24062-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855067" comment="texlive-texloganalyser-bin-2021.20210325.svn13663-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855068" comment="texlive-texlua-devel-5.3.6-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855069" comment="texlive-texluajit-devel-2.1.0beta3-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855070" comment="texlive-texosquery-bin-2021.20210325.svn43596-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855071" comment="texlive-texplate-bin-2021.20210325.svn53444-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855072" comment="texlive-texsis-bin-2021.20210325.svn3006-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855073" comment="texlive-texware-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855074" comment="texlive-thumbpdf-bin-2021.20210325.svn6898-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855075" comment="texlive-tie-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855076" comment="texlive-tikztosvg-bin-2021.20210325.svn55132-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855077" comment="texlive-tpic2pdftex-bin-2021.20210325.svn50281-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855078" comment="texlive-ttfutils-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855079" comment="texlive-typeoutfileinfo-bin-2021.20210325.svn25648-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855080" comment="texlive-ulqda-bin-2021.20210325.svn13663-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855081" comment="texlive-uplatex-bin-2021.20210325.svn52800-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855082" comment="texlive-uptex-bin-2021.20210325.svn58378-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855083" comment="texlive-urlbst-bin-2021.20210325.svn23262-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855084" comment="texlive-velthuis-bin-2021.20210325.svn50281-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855085" comment="texlive-vlna-bin-2021.20210325.svn50281-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855086" comment="texlive-vpe-bin-2021.20210325.svn6897-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855087" comment="texlive-web-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855088" comment="texlive-webquiz-bin-2021.20210325.svn50419-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855089" comment="texlive-wordcount-bin-2021.20210325.svn46165-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855090" comment="texlive-xdvi-bin-2021.20210325.svn58378-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855091" comment="texlive-xelatex-dev-bin-2021.20210325.svn53999-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855092" comment="texlive-xetex-bin-2021.20210325.svn58378-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855093" comment="texlive-xindex-bin-2021.20210325.svn49312-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855094" comment="texlive-xml2pmx-bin-2021.20210325.svn57878-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855095" comment="texlive-xmltex-bin-2021.20210325.svn3006-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855096" comment="texlive-xpdfopen-bin-2021.20210325.svn52917-150400.31.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855097" comment="texlive-yplan-bin-2021.20210325.svn34398-150400.31.6.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4654" version="1" class="patch">
	<metadata>
		<title>Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container, virt-pr-helper-container (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222699" ref_url="https://bugzilla.suse.com/1222699" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2024:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018361.html" source="SUSE-SU"/>
		<description>
This update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container, virt-pr-helper-container fixes the following issues:

- Improve the OrdinalPodInterfaceName mechanism (bsc#1222699)

Also containers were rebuilt against the current released updates.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-16"/>
	<updated date="2024-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222699">SUSE bug 1222699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855098" comment="kubevirt-container-disk-1.1.1-150500.8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855099" comment="kubevirt-manifests-1.1.1-150500.8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855100" comment="kubevirt-tests-1.1.1-150500.8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855101" comment="kubevirt-virt-api-1.1.1-150500.8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855102" comment="kubevirt-virt-controller-1.1.1-150500.8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855103" comment="kubevirt-virt-exportproxy-1.1.1-150500.8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855104" comment="kubevirt-virt-exportserver-1.1.1-150500.8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855105" comment="kubevirt-virt-handler-1.1.1-150500.8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855106" comment="kubevirt-virt-launcher-1.1.1-150500.8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855107" comment="kubevirt-virt-operator-1.1.1-150500.8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855108" comment="kubevirt-virtctl-1.1.1-150500.8.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855109" comment="obs-service-kubevirt_containers_meta-1.1.1-150500.8.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4655" version="1" class="patch">
	<metadata>
		<title>Security update for pgadmin4 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1221172" ref_url="https://bugzilla.suse.com/1221172" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2044" ref_url="https://www.suse.com/security/cve/CVE-2024-2044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018379.html" source="SUSE-SU"/>
		<description>
This update for pgadmin4 fixes the following issues:

- CVE-2024-2044: Fixed unsafe deserialization and Remote Code Execution by an authenticated user (bsc#1221172)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-18"/>
	<updated date="2024-04-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221172">SUSE bug 1221172</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2044/">CVE-2024-2044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2044">CVE-2024-2044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855316" comment="pgadmin4-4.30-150300.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855317" comment="pgadmin4-doc-4.30-150300.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855318" comment="pgadmin4-web-4.30-150300.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855319" comment="pgadmin4-web-uwsgi-4.30-150300.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4656" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1221385" ref_url="https://bugzilla.suse.com/1221385" source="BUGZILLA"/>
		<reference ref_id="1221386" ref_url="https://bugzilla.suse.com/1221386" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-23672" ref_url="https://www.suse.com/security/cve/CVE-2024-23672/" source="CVE"/>
		<reference ref_id="CVE-2024-24549" ref_url="https://www.suse.com/security/cve/CVE-2024-24549/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018380.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2024-24549: Fixed denial of service during header validation for HTTP/2 stream (bsc#1221386)
- CVE-2024-23672: Fixed denial of service due to malicious WebSocket client keeping connection open (bsc#1221385)

Other fixes:
- Update to Tomcat 9.0.87    
  * Catalina
    + Fix:  Minor performance improvement for building filter chains. Based 
      on ideas from #702 by Luke Miao. (remm)
    + Fix:  Align error handling for Writer and OutputStream. Ensure use of 
      either once the response has been recycled triggers a 
      NullPointerException provided that discardFacades is configured with 
      the default value of true. (markt)
    + Fix:  68692: The standard thread pool implementations that are configured
      using the Executor element now implement ExecutorService for better 
      support NIO2. (remm)
    + Fix:  68495: When restoring a saved POST request after a successful FORM 
      authentication, ensure that neither the URI, the query string nor the 
      protocol are corrupted when restoring the request body. (markt)
    + Fix:  68721: Workaround a possible cause of duplicate class definitions 
      when using ClassFileTransformers and the transformation of a class also
      triggers the loading of the same class. (markt)
    + Fix:  The rewrite valve should not do a rewrite if the output is 
      identical to the input. (remm)
    + Update:  Add a new valveSkip (or VS) rule flag to the rewrite valve to 
      allow skipping over the next valve in the Catalina pipeline. (remm)
    + Fix:  Correct JPMS and OSGi meta-data for tomcat-enbed-core.jar by 
      removing reference to org.apache.catalina.ssi package that is no longer 
      included in the JAR. Based on pull request #684 by Jendrik Johannes. 
      (markt)
    + Fix:  Fix ServiceBindingPropertySource so that trailing \r\n sequences 
      are correctly removed from files containing property values when 
      configured to do so. Bug identified by Coverity Scan. (markt)
    + Add:  Add improvements to the CSRF prevention filter including the 
      ability to skip adding nonces for resource name and subtree URL patterns.
      (schultz)
    + Fix:  Review usage of debug logging and downgrade trace or data dumping 
      operations from debug level to trace. (remm)
    + Fix:  68089: Further improve the performance of request attribute 
      access for ApplicationHttpRequest and ApplicationRequest. (markt)
    + Fix:  68559: Allow asynchronous error handling to write to the 
      response after an error during asynchronous processing. (markt)
  * Coyote
    + Fix:  Improve the HTTP/2 stream prioritisation process. If a stream 
      uses all of the connection windows and still has content to write, it 
      will now be added to the backlog immediately rather than waiting until 
      the write  attempt for the remaining content. (markt)
    + Fix:  Make asynchronous error handling more robust. Ensure that once 
      a connection is marked to be closed, further asynchronous processing 
      cannot change that. (markt)
    + Fix:  Make asynchronous error handling more robust. Ensure that once 
      the call to AsyncListener.onError() has returned to the container, only 
      container threads can access the AsyncContext. This protects against 
      various race conditions that woudl otherwise occur if application threads
      continued to access the AsyncContext.
    + Fix:  Review usage of debug logging and downgrade trace or data 
      dumping operations from debug level to trace. In particular, most of the 
      HTTP/2 debug logging has been changed to trace level. (remm)
    + Fix:  Add support for user provided SSLContext instances configured 
      on SSLHostConfigCertificate instances. Based on pull request #673 
      provided by Hakan Altındağ. (markt)
    + Fix:  Improve the Tomcat Native shutdown process to reduce the likelihood
      of a JVM crash during Tomcat shutdown. (markt)
    + Fix:  Partial fix for 68558: Cache the result of converting to String 
      for request URI, HTTP header names and the request Content-Type value to 
      improve performance by reducing repeated byte[] to String conversions. 
      (markt)
    + Fix:  Improve error reporting to HTTP/2 clients for header processing 
      errors by reporting problems at the end of the frame where the error was 
      detected rather than at the end of the headers. (markt)
    + Fix:  Remove the remaining reference to a stream once the stream has 
      been recycled. This makes the stream eligible for garbage collection 
      earlier and thereby improves scalability. (markt)
  * Jasper
    + Add:  Add support for specifying Java 22 (with the value 22) as the 
      compiler source and/or compiler target for JSP compilation. If used with 
      an  Eclipse JDT compiler version that does not support these values, a 
      warning will be logged and the default will used. (markt)
    + Fix:  68546: Generate optimal size and types for JSP imports maps, as 
      suggested by John Engebretson. (remm)
    + Fix:  Review usage of debug logging and downgrade trace or data 
      dumping operations from debug level to trace. (remm)
  * Cluster
    + Fix:  Avoid updating request count stats on async. (remm)
  * WebSocket
    + Fix:  Correct a regression in the fix for 66508 that could cause an 
      UpgradeProcessor leak in some circumstances. (markt)
    + Fix:  Review usage of debug logging and downgrade trace or data dumping
      operations from debug level to trace. (remm)
    + Fix:  Ensure that WebSocket connection closure completes if the 
      connection is closed when the server side has used the proprietary 
      suspend/resume feature to suspend the connection. (markt)
  * Web applications
    + Add:  Add support for responses in JSON format from the examples 
      application RequestHeaderExample. (schultz)
  * Other
    + Add:  Improvements to French translations. (remm)
    + Add:  Improvements to Japanese translations by tak7iji. (markt)
    + Update:  Update Checkstyle to 10.13.0. (markt)
    + Update:  Update JSign to 6.0. (markt)
    + Update:  Add strings for debug level messages. (remm)
    + Update:  Update Tomcat Native to 1.3.0. (markt)
    + Add:  Improvements to French translations. (remm)
    + Add:  Improvements to Japanese translations by tak7iji. (markt)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-18"/>
	<updated date="2024-04-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221385">SUSE bug 1221385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221386">SUSE bug 1221386</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23672/">CVE-2024-23672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23672">CVE-2024-23672 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24549/">CVE-2024-24549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24549">CVE-2024-24549 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855320" comment="apache-commons-daemon-1.3.4-150200.11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855321" comment="apache-commons-daemon-javadoc-1.3.4-150200.11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855322" comment="apache-commons-daemon-jsvc-1.3.4-150200.11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855323" comment="apache-commons-dbcp-2.1.1-150200.10.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855324" comment="apache-commons-dbcp-javadoc-2.1.1-150200.10.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855325" comment="apache-commons-pool2-2.4.2-150200.11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855326" comment="apache-commons-pool2-javadoc-2.4.2-150200.11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855327" comment="geronimo-annotation-1_0-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855328" comment="geronimo-commonj-1_1-apis-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855329" comment="geronimo-corba-1_0-apis-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855330" comment="geronimo-corba-2_3-apis-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855331" comment="geronimo-ejb-2_1-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855332" comment="geronimo-ejb-3_0-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855333" comment="geronimo-el-1_0-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855334" comment="geronimo-interceptor-3_0-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855335" comment="geronimo-j2ee-1_4-apis-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855336" comment="geronimo-j2ee-connector-1_5-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855337" comment="geronimo-j2ee-deployment-1_1-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855338" comment="geronimo-j2ee-management-1_0-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855339" comment="geronimo-j2ee-management-1_1-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855340" comment="geronimo-jacc-1_0-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855341" comment="geronimo-jacc-1_1-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855342" comment="geronimo-jaf-1_0_2-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855343" comment="geronimo-jaf-1_1-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855344" comment="geronimo-javaee-deployment-1_1-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855345" comment="geronimo-javamail-1_3_1-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855346" comment="geronimo-javamail-1_4-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855347" comment="geronimo-jaxr-1_0-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855348" comment="geronimo-jaxrpc-1_1-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855349" comment="geronimo-jms-1_1-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855350" comment="geronimo-jpa-3_0-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855351" comment="geronimo-jsp-2_0-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855352" comment="geronimo-jsp-2_1-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855353" comment="geronimo-jta-1_0_1B-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855354" comment="geronimo-jta-1_1-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855355" comment="geronimo-qname-1_1-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855356" comment="geronimo-saaj-1_1-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855357" comment="geronimo-servlet-2_4-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855358" comment="geronimo-servlet-2_5-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855359" comment="geronimo-stax-1_0-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855360" comment="geronimo-ws-metadata-2_0-api-1.2-150200.15.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855361" comment="jakarta-taglibs-standard-1.1.1-150000.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855362" comment="jakarta-taglibs-standard-javadoc-1.1.1-150000.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855363" comment="tomcat-9.0.87-150200.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855364" comment="tomcat-admin-webapps-9.0.87-150200.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855365" comment="tomcat-docs-webapp-9.0.87-150200.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855366" comment="tomcat-el-3_0-api-9.0.87-150200.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855367" comment="tomcat-embed-9.0.87-150200.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855368" comment="tomcat-javadoc-9.0.87-150200.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855369" comment="tomcat-jsp-2_3-api-9.0.87-150200.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855370" comment="tomcat-jsvc-9.0.87-150200.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855371" comment="tomcat-lib-9.0.87-150200.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855372" comment="tomcat-servlet-4_0-api-9.0.87-150200.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855373" comment="tomcat-webapps-9.0.87-150200.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4657" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220181" ref_url="https://bugzilla.suse.com/1220181" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-24476" ref_url="https://www.suse.com/security/cve/CVE-2024-24476/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018383.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Security fixes:

- CVE-2024-24476: Fixed a denial of service in ws_manuf_lookup_str() (bsc#1220181)

Other fixes:

- Wireshark 3.6.22:
- Further features, bug fixes and updated protocol support as listed in:
  https://www.wireshark.org/docs/relnotes/wireshark-3.6.22.html
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220181">SUSE bug 1220181</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24476/">CVE-2024-24476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24476">CVE-2024-24476 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855407" comment="libwireshark15-3.6.22-150000.3.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855408" comment="libwiretap12-3.6.22-150000.3.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855409" comment="libwsutil13-3.6.22-150000.3.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855410" comment="wireshark-3.6.22-150000.3.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855411" comment="wireshark-devel-3.6.22-150000.3.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855412" comment="wireshark-ui-qt-3.6.22-150000.3.112.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4658" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222535" ref_url="https://bugzilla.suse.com/1222535" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2609" ref_url="https://www.suse.com/security/cve/CVE-2024-2609/" source="CVE"/>
		<reference ref_id="CVE-2024-3302" ref_url="https://www.suse.com/security/cve/CVE-2024-3302/" source="CVE"/>
		<reference ref_id="CVE-2024-3852" ref_url="https://www.suse.com/security/cve/CVE-2024-3852/" source="CVE"/>
		<reference ref_id="CVE-2024-3854" ref_url="https://www.suse.com/security/cve/CVE-2024-3854/" source="CVE"/>
		<reference ref_id="CVE-2024-3857" ref_url="https://www.suse.com/security/cve/CVE-2024-3857/" source="CVE"/>
		<reference ref_id="CVE-2024-3859" ref_url="https://www.suse.com/security/cve/CVE-2024-3859/" source="CVE"/>
		<reference ref_id="CVE-2024-3861" ref_url="https://www.suse.com/security/cve/CVE-2024-3861/" source="CVE"/>
		<reference ref_id="CVE-2024-3863" ref_url="https://www.suse.com/security/cve/CVE-2024-3863/" source="CVE"/>
		<reference ref_id="CVE-2024-3864" ref_url="https://www.suse.com/security/cve/CVE-2024-3864/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018382.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 115.10.0 ESR (MSFA 2024-19) (bsc#1222535):

  - CVE-2024-3852: GetBoundName in the JIT returned the wrong object
  - CVE-2024-3854: Out-of-bounds-read after mis-optimized switch statement
  - CVE-2024-3857: Incorrect JITting of arguments led to use-after-free during garbage collection
  - CVE-2024-2609: Permission prompt input delay could expire when not in focus
  - CVE-2024-3859: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer
  - CVE-2024-3861: Potential use-after-free due to AlignedBuffer self-move
  - CVE-2024-3863: Download Protections were bypassed by .xrm-ms files on Windows
  - CVE-2024-3302: Denial of Service using HTTP/2 CONTINUATION frames
  - CVE-2024-3864: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222535">SUSE bug 1222535</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2609/">CVE-2024-2609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2609">CVE-2024-2609 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-3302/">CVE-2024-3302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3302">CVE-2024-3302 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3852/">CVE-2024-3852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3852">CVE-2024-3852 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3854/">CVE-2024-3854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3854">CVE-2024-3854 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3857/">CVE-2024-3857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3857">CVE-2024-3857 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3859/">CVE-2024-3859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3859">CVE-2024-3859 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3861/">CVE-2024-3861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3861">CVE-2024-3861 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-3863/">CVE-2024-3863 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3863">CVE-2024-3863 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3864/">CVE-2024-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3864">CVE-2024-3864 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855413" comment="MozillaFirefox-115.10.0-150200.152.134.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855414" comment="MozillaFirefox-branding-upstream-115.10.0-150200.152.134.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855415" comment="MozillaFirefox-devel-115.10.0-150200.152.134.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855416" comment="MozillaFirefox-translations-common-115.10.0-150200.152.134.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855417" comment="MozillaFirefox-translations-other-115.10.0-150200.152.134.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4659" version="1" class="patch">
	<metadata>
		<title>Security update for graphviz (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219491" ref_url="https://bugzilla.suse.com/1219491" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46045" ref_url="https://www.suse.com/security/cve/CVE-2023-46045/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035027.html" source="SUSE-SU"/>
		<description>
This update for graphviz fixes the following issues:

- CVE-2023-46045: Fixed out-of-bounds read via a crafted config6a file (bsc#1219491)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2024-04-19"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1219491">SUSE bug 1219491</bugzilla>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-46045/">CVE-2023-46045 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46045">CVE-2023-46045 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855418" comment="graphviz-2.48.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855419" comment="graphviz-devel-2.48.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855420" comment="graphviz-doc-2.48.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855421" comment="graphviz-gd-2.48.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855422" comment="graphviz-gnome-2.48.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855423" comment="graphviz-guile-2.48.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855424" comment="graphviz-gvedit-2.48.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855425" comment="graphviz-java-2.48.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855426" comment="graphviz-lua-2.48.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855427" comment="graphviz-perl-2.48.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855428" comment="graphviz-php-2.48.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855429" comment="graphviz-plugins-core-2.48.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855430" comment="graphviz-ruby-2.48.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855431" comment="graphviz-smyrna-2.48.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855432" comment="graphviz-tcl-2.48.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855433" comment="graphviz-webp-2.48.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855434" comment="graphviz-x11-2.48.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855435" comment="libgraphviz6-2.48.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855436" comment="python3-gv-2.48.0-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4660" version="1" class="patch">
	<metadata>
		<title>Security update for pam (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217000" ref_url="https://bugzilla.suse.com/1217000" source="BUGZILLA"/>
		<reference ref_id="1218475" ref_url="https://bugzilla.suse.com/1218475" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-22365" ref_url="https://www.suse.com/security/cve/CVE-2024-22365/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017681.html" source="SUSE-SU"/>
		<description>
This update for pam fixes the following issues:

- CVE-2024-22365: Fixed a local denial of service during PAM login
  due to a missing check during path manipulation (bsc#1218475).
- Check localtime_r() return value to fix crashing (bsc#1217000) 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-18"/>
	<updated date="2024-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1217000">SUSE bug 1217000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218475">SUSE bug 1218475</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22365/">CVE-2024-22365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22365">CVE-2024-22365 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009819718" comment="pam-1.3.0-150000.6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819712" comment="pam-32bit-1.3.0-150000.6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819719" comment="pam-devel-1.3.0-150000.6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819714" comment="pam-devel-32bit-1.3.0-150000.6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819715" comment="pam-doc-1.3.0-150000.6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819720" comment="pam-extra-1.3.0-150000.6.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819717" comment="pam-extra-32bit-1.3.0-150000.6.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4661" version="1" class="patch">
	<metadata>
		<title>Security update for apache-commons-configuration2 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1221793" ref_url="https://bugzilla.suse.com/1221793" source="BUGZILLA"/>
		<reference ref_id="1221797" ref_url="https://bugzilla.suse.com/1221797" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-29131" ref_url="https://www.suse.com/security/cve/CVE-2024-29131/" source="CVE"/>
		<reference ref_id="CVE-2024-29133" ref_url="https://www.suse.com/security/cve/CVE-2024-29133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035047.html" source="SUSE-SU"/>
		<description>
This update for apache-commons-configuration2 fixes the following issues:

- CVE-2024-29131: Fixed StackOverflowError adding property in AbstractListDelimiterHandler.flattenIterator() (bsc#1221797).
- CVE-2024-29133: Fixed StackOverflowError calling ListDelimiterHandler.flatten(Object, int) with a cyclical object tree (bsc#1221793).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-22"/>
	<updated date="2024-04-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1221793">SUSE bug 1221793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221797">SUSE bug 1221797</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-29131/">CVE-2024-29131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29131">CVE-2024-29131 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-29133/">CVE-2024-29133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29133">CVE-2024-29133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855730" comment="apache-commons-configuration2-2.10.1-150200.5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855731" comment="apache-commons-configuration2-javadoc-2.10.1-150200.5.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4662" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1198101" ref_url="https://bugzilla.suse.com/1198101" source="BUGZILLA"/>
		<reference ref_id="1205588" ref_url="https://bugzilla.suse.com/1205588" source="BUGZILLA"/>
		<reference ref_id="1205855" ref_url="https://bugzilla.suse.com/1205855" source="BUGZILLA"/>
		<reference ref_id="1210382" ref_url="https://bugzilla.suse.com/1210382" source="BUGZILLA"/>
		<reference ref_id="1213945" ref_url="https://bugzilla.suse.com/1213945" source="BUGZILLA"/>
		<reference ref_id="1215098" ref_url="https://bugzilla.suse.com/1215098" source="BUGZILLA"/>
		<reference ref_id="1215099" ref_url="https://bugzilla.suse.com/1215099" source="BUGZILLA"/>
		<reference ref_id="1215100" ref_url="https://bugzilla.suse.com/1215100" source="BUGZILLA"/>
		<reference ref_id="1215101" ref_url="https://bugzilla.suse.com/1215101" source="BUGZILLA"/>
		<reference ref_id="1215102" ref_url="https://bugzilla.suse.com/1215102" source="BUGZILLA"/>
		<reference ref_id="1215103" ref_url="https://bugzilla.suse.com/1215103" source="BUGZILLA"/>
		<reference ref_id="1219460" ref_url="https://bugzilla.suse.com/1219460" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-28737" ref_url="https://www.suse.com/security/cve/CVE-2022-28737/" source="CVE"/>
		<reference ref_id="CVE-2023-40546" ref_url="https://www.suse.com/security/cve/CVE-2023-40546/" source="CVE"/>
		<reference ref_id="CVE-2023-40547" ref_url="https://www.suse.com/security/cve/CVE-2023-40547/" source="CVE"/>
		<reference ref_id="CVE-2023-40548" ref_url="https://www.suse.com/security/cve/CVE-2023-40548/" source="CVE"/>
		<reference ref_id="CVE-2023-40549" ref_url="https://www.suse.com/security/cve/CVE-2023-40549/" source="CVE"/>
		<reference ref_id="CVE-2023-40550" ref_url="https://www.suse.com/security/cve/CVE-2023-40550/" source="CVE"/>
		<reference ref_id="CVE-2023-40551" ref_url="https://www.suse.com/security/cve/CVE-2023-40551/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035046.html" source="SUSE-SU"/>
		<description>
This update for shim fixes the following issues:

- Update shim-install to set the TPM2 SRK algorithm (bsc#1213945)
- Limit the requirement of fde-tpm-helper-macros to the distro with
  suse_version 1600 and above (bsc#1219460)

Update to version 15.8:

Security issues fixed:

- mok: fix LogError() invocation (bsc#1215099,CVE-2023-40546)
- avoid incorrectly trusting HTTP headers (bsc#1215098,CVE-2023-40547)
- Fix integer overflow on SBAT section size on 32-bit system (bsc#1215100,CVE-2023-40548)
- Authenticode: verify that the signature header is in bounds (bsc#1215101,CVE-2023-40549)
- pe: Fix an out-of-bound read in verify_buffer_sbat() (bsc#1215102,CVE-2023-40550)
- pe-relocate: Fix bounds check for MZ binaries (bsc#1215103,CVE-2023-40551)

        
The NX flag is disable which is same as the default value of shim-15.8, hence, not need to enable it by this patch now.

- Generate dbx during build so we don't include binary files in sources
- Don't require grub so shim can still be used with systemd-boot
- Update shim-install to fix boot failure of ext4 root file system
  on RAID10 (bsc#1205855)
- Adopt the macros from fde-tpm-helper-macros to update the
  signature in the sealed key after a bootloader upgrade

- Update shim-install to amend full disk encryption support
  - Adopt TPM 2.0 Key File for grub2 TPM 2.0 protector
  - Use the long name to specify the grub2 key protector
  - cryptodisk: support TPM authorized policies
  - Do not use tpm_record_pcrs unless the command is in command.lst

- Removed POST_PROCESS_PE_FLAGS=-N from the build command in shim.spec to
  enable the NX compatibility flag when using post-process-pe after
  discussed with grub2 experts in mail. It's useful for further development
  and testing. (bsc#1205588)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-22"/>
	<updated date="2024-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198101">SUSE bug 1198101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205588">SUSE bug 1205588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205855">SUSE bug 1205855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210382">SUSE bug 1210382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213945">SUSE bug 1213945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215098">SUSE bug 1215098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215099">SUSE bug 1215099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215100">SUSE bug 1215100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215101">SUSE bug 1215101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215102">SUSE bug 1215102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215103">SUSE bug 1215103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219460">SUSE bug 1219460</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28737/">CVE-2022-28737 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28737">CVE-2022-28737 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40546/">CVE-2023-40546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40546">CVE-2023-40546 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40547/">CVE-2023-40547 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40547">CVE-2023-40547 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40548/">CVE-2023-40548 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40548">CVE-2023-40548 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40549/">CVE-2023-40549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40549">CVE-2023-40549 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40550/">CVE-2023-40550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40550">CVE-2023-40550 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40551/">CVE-2023-40551 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40551">CVE-2023-40551 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855732" comment="shim-15.8-150300.4.20.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4663" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222992" ref_url="https://bugzilla.suse.com/1222992" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2961" ref_url="https://www.suse.com/security/cve/CVE-2024-2961/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035052.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- iconv: ISO-2022-CN-EXT: fix out-of-bound writes when writing escape sequence (CVE-2024-2961, bsc#1222992)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-22"/>
	<updated date="2024-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222992">SUSE bug 1222992</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-2961/">CVE-2024-2961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2961">CVE-2024-2961 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855733" comment="glibc-2.31-150300.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855734" comment="glibc-32bit-2.31-150300.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855735" comment="glibc-devel-2.31-150300.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855736" comment="glibc-devel-32bit-2.31-150300.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855737" comment="glibc-devel-static-2.31-150300.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855738" comment="glibc-devel-static-32bit-2.31-150300.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855739" comment="glibc-extra-2.31-150300.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855740" comment="glibc-html-2.31-150300.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855741" comment="glibc-i18ndata-2.31-150300.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855742" comment="glibc-info-2.31-150300.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855743" comment="glibc-lang-2.31-150300.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855744" comment="glibc-locale-2.31-150300.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855745" comment="glibc-locale-base-2.31-150300.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855746" comment="glibc-locale-base-32bit-2.31-150300.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855747" comment="glibc-profile-2.31-150300.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855748" comment="glibc-profile-32bit-2.31-150300.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855749" comment="glibc-utils-2.31-150300.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855750" comment="glibc-utils-32bit-2.31-150300.74.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855751" comment="nscd-2.31-150300.74.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4664" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1209282" ref_url="https://bugzilla.suse.com/1209282" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2024:1376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035051.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

- Change permissions for rules folders (bsc#1209282)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-22"/>
	<updated date="2024-04-22"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1209282">SUSE bug 1209282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855752" comment="libpolkit-agent-1-0-121-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855753" comment="libpolkit-agent-1-0-32bit-121-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855754" comment="libpolkit-gobject-1-0-121-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855755" comment="libpolkit-gobject-1-0-32bit-121-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855756" comment="pkexec-121-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855757" comment="polkit-121-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855758" comment="polkit-devel-121-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855759" comment="polkit-doc-121-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855760" comment="typelib-1_0-Polkit-1_0-121-150500.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4665" version="1" class="patch">
	<metadata>
		<title>Security update for apache-commons-configuration (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1221793" ref_url="https://bugzilla.suse.com/1221793" source="BUGZILLA"/>
		<reference ref_id="1221797" ref_url="https://bugzilla.suse.com/1221797" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-29131" ref_url="https://www.suse.com/security/cve/CVE-2024-29131/" source="CVE"/>
		<reference ref_id="CVE-2024-29133" ref_url="https://www.suse.com/security/cve/CVE-2024-29133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035050.html" source="SUSE-SU"/>
		<description>
This update for apache-commons-configuration fixes the following issues:

- CVE-2024-29131: Fixed StackOverflowError adding property in AbstractListDelimiterHandler.flattenIterator() (bsc#1221797).
- CVE-2024-29133: Fixed StackOverflowError calling ListDelimiterHandler.flatten(Object, int) with a cyclical object tree (bsc#1221793).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-22"/>
	<updated date="2024-04-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1221793">SUSE bug 1221793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221797">SUSE bug 1221797</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-29131/">CVE-2024-29131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29131">CVE-2024-29131 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-29133/">CVE-2024-29133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29133">CVE-2024-29133 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855761" comment="apache-commons-configuration-1.10-150200.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855762" comment="apache-commons-configuration-javadoc-1.10-150200.3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4666" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218413" ref_url="https://bugzilla.suse.com/1218413" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-51714" ref_url="https://www.suse.com/security/cve/CVE-2023-51714/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017679.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- CVE-2023-51714: Fixed an incorrect integer overflow check (bsc#1218413).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-18"/>
	<updated date="2024-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218413">SUSE bug 1218413</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-51714/">CVE-2023-51714 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51714">CVE-2023-51714 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009818443" comment="libQt5Bootstrap-devel-static-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818444" comment="libQt5Bootstrap-devel-static-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818445" comment="libQt5Concurrent-devel-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818446" comment="libQt5Concurrent-devel-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818447" comment="libQt5Concurrent5-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818448" comment="libQt5Concurrent5-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818449" comment="libQt5Core-devel-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818450" comment="libQt5Core-devel-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818451" comment="libQt5Core-private-headers-devel-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818452" comment="libQt5Core5-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818453" comment="libQt5Core5-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818454" comment="libQt5DBus-devel-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818455" comment="libQt5DBus-devel-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818456" comment="libQt5DBus-private-headers-devel-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818457" comment="libQt5DBus5-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818458" comment="libQt5DBus5-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818459" comment="libQt5Gui-devel-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818460" comment="libQt5Gui-devel-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818461" comment="libQt5Gui-private-headers-devel-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818462" comment="libQt5Gui5-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818463" comment="libQt5Gui5-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818464" comment="libQt5KmsSupport-devel-static-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818465" comment="libQt5KmsSupport-private-headers-devel-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818466" comment="libQt5Network-devel-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818467" comment="libQt5Network-devel-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818468" comment="libQt5Network-private-headers-devel-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818469" comment="libQt5Network5-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818470" comment="libQt5Network5-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818471" comment="libQt5OpenGL-devel-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818472" comment="libQt5OpenGL-devel-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818473" comment="libQt5OpenGL-private-headers-devel-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818474" comment="libQt5OpenGL5-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818475" comment="libQt5OpenGL5-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818476" comment="libQt5OpenGLExtensions-devel-static-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818477" comment="libQt5OpenGLExtensions-devel-static-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818478" comment="libQt5PlatformHeaders-devel-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818479" comment="libQt5PlatformSupport-devel-static-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818480" comment="libQt5PlatformSupport-devel-static-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818481" comment="libQt5PlatformSupport-private-headers-devel-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818482" comment="libQt5PrintSupport-devel-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818483" comment="libQt5PrintSupport-devel-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818484" comment="libQt5PrintSupport-private-headers-devel-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818485" comment="libQt5PrintSupport5-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818486" comment="libQt5PrintSupport5-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818487" comment="libQt5Sql-devel-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818488" comment="libQt5Sql-devel-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818489" comment="libQt5Sql-private-headers-devel-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818490" comment="libQt5Sql5-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818491" comment="libQt5Sql5-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818492" comment="libQt5Sql5-mysql-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818493" comment="libQt5Sql5-mysql-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818494" comment="libQt5Sql5-postgresql-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818495" comment="libQt5Sql5-postgresql-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818496" comment="libQt5Sql5-sqlite-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818497" comment="libQt5Sql5-sqlite-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818498" comment="libQt5Sql5-unixODBC-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818499" comment="libQt5Sql5-unixODBC-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818500" comment="libQt5Test-devel-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818501" comment="libQt5Test-devel-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818502" comment="libQt5Test-private-headers-devel-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818503" comment="libQt5Test5-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818504" comment="libQt5Test5-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818505" comment="libQt5Widgets-devel-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818506" comment="libQt5Widgets-devel-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818507" comment="libQt5Widgets-private-headers-devel-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818508" comment="libQt5Widgets5-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818509" comment="libQt5Widgets5-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818510" comment="libQt5Xml-devel-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818511" comment="libQt5Xml-devel-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818512" comment="libQt5Xml5-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818513" comment="libQt5Xml5-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818514" comment="libqt5-qtbase-common-devel-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818515" comment="libqt5-qtbase-devel-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818516" comment="libqt5-qtbase-examples-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818517" comment="libqt5-qtbase-examples-32bit-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818518" comment="libqt5-qtbase-platformtheme-gtk3-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818519" comment="libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.8+kde185-150500.4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818520" comment="libqt5-qtbase-private-headers-devel-5.15.8+kde185-150500.4.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4667" version="1" class="patch">
	<metadata>
		<title>Security update for libssh (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1211188" ref_url="https://bugzilla.suse.com/1211188" source="BUGZILLA"/>
		<reference ref_id="1211190" ref_url="https://bugzilla.suse.com/1211190" source="BUGZILLA"/>
		<reference ref_id="1218126" ref_url="https://bugzilla.suse.com/1218126" source="BUGZILLA"/>
		<reference ref_id="1218186" ref_url="https://bugzilla.suse.com/1218186" source="BUGZILLA"/>
		<reference ref_id="1218209" ref_url="https://bugzilla.suse.com/1218209" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-1667" ref_url="https://www.suse.com/security/cve/CVE-2023-1667/" source="CVE"/>
		<reference ref_id="CVE-2023-2283" ref_url="https://www.suse.com/security/cve/CVE-2023-2283/" source="CVE"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="CVE-2023-6004" ref_url="https://www.suse.com/security/cve/CVE-2023-6004/" source="CVE"/>
		<reference ref_id="CVE-2023-6918" ref_url="https://www.suse.com/security/cve/CVE-2023-6918/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017678.html" source="SUSE-SU"/>
		<description>
This update for libssh fixes the following issues:

Security fixes:

  - CVE-2023-6004: Fixed command injection using proxycommand (bsc#1218209)
  - CVE-2023-48795: Fixed potential downgrade attack using strict kex (bsc#1218126)
  - CVE-2023-6918: Fixed missing checks for return values of MD functions (bsc#1218186)
  - CVE-2023-1667: Fixed NULL dereference during rekeying with algorithm  guessing (bsc#1211188)
  - CVE-2023-2283: Fixed possible authorization bypass in pki_verify_data_signature under low-memory conditions (bsc#1211190)

Other fixes:

- Update to version 0.9.8
  - Allow @ in usernames when parsing from URI composes

- Update to version 0.9.7
  - Fix several memory leaks in GSSAPI handling code
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-18"/>
	<updated date="2024-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1211188">SUSE bug 1211188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211190">SUSE bug 1211190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218126">SUSE bug 1218126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218186">SUSE bug 1218186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218209">SUSE bug 1218209</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1667/">CVE-2023-1667 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1667">CVE-2023-1667 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-2283/">CVE-2023-2283 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2283">CVE-2023-2283 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6004/">CVE-2023-6004 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6004">CVE-2023-6004 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-6918/">CVE-2023-6918 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6918">CVE-2023-6918 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009819301" comment="libssh-config-0.9.8-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819302" comment="libssh-devel-0.9.8-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819303" comment="libssh4-0.9.8-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819304" comment="libssh4-32bit-0.9.8-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4668" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219386" ref_url="https://bugzilla.suse.com/1219386" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5992" ref_url="https://www.suse.com/security/cve/CVE-2023-5992/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1402-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035071.html" source="SUSE-SU"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2023-5992: Fixed side-channel leaks while stripping encryption PKCS#1 padding (bsc#1219386)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2024-04-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219386">SUSE bug 1219386</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5992/">CVE-2023-5992 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5992">CVE-2023-5992 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855867" comment="opensc-0.22.0-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855868" comment="opensc-32bit-0.22.0-150400.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4669" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.24 (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222539" ref_url="https://bugzilla.suse.com/1222539" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-3177" ref_url="https://www.suse.com/security/cve/CVE-2024-3177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1403-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035070.html" source="SUSE-SU"/>
		<description>
This update for kubernetes1.24 fixes the following issues:

- CVE-2024-3177: Fixed bypass of mountable secrets policy imposed by the ServiceAccount admission plugin (bsc#1222539)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2024-04-23"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1222539">SUSE bug 1222539</bugzilla>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-3177/">CVE-2024-3177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3177">CVE-2024-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855869" comment="kubernetes1.24-apiserver-1.24.17-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855870" comment="kubernetes1.24-client-1.24.17-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855871" comment="kubernetes1.24-client-bash-completion-1.24.17-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855872" comment="kubernetes1.24-client-common-1.24.17-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855873" comment="kubernetes1.24-client-fish-completion-1.24.17-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855874" comment="kubernetes1.24-controller-manager-1.24.17-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855875" comment="kubernetes1.24-kubeadm-1.24.17-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855876" comment="kubernetes1.24-kubelet-1.24.17-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855877" comment="kubernetes1.24-kubelet-common-1.24.17-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855878" comment="kubernetes1.24-proxy-1.24.17-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855879" comment="kubernetes1.24-scheduler-1.24.17-150500.3.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4670" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.23 (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222539" ref_url="https://bugzilla.suse.com/1222539" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-3177" ref_url="https://www.suse.com/security/cve/CVE-2024-3177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1404-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035069.html" source="SUSE-SU"/>
		<description>
This update for kubernetes1.23 fixes the following issues:

- CVE-2024-3177: Fixed bypass of mountable secrets policy imposed by the ServiceAccount admission plugin (bsc#1222539)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-23"/>
	<updated date="2024-04-23"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1222539">SUSE bug 1222539</bugzilla>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-3177/">CVE-2024-3177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3177">CVE-2024-3177 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009855880" comment="kubernetes1.23-apiserver-1.23.17-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855881" comment="kubernetes1.23-client-1.23.17-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855882" comment="kubernetes1.23-client-bash-completion-1.23.17-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855883" comment="kubernetes1.23-client-common-1.23.17-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855884" comment="kubernetes1.23-client-fish-completion-1.23.17-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855885" comment="kubernetes1.23-controller-manager-1.23.17-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855886" comment="kubernetes1.23-kubeadm-1.23.17-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855887" comment="kubernetes1.23-kubelet-1.23.17-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855888" comment="kubernetes1.23-kubelet-common-1.23.17-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855889" comment="kubernetes1.23-proxy-1.23.17-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009855890" comment="kubernetes1.23-scheduler-1.23.17-150500.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4671" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1108281" ref_url="https://bugzilla.suse.com/1108281" source="BUGZILLA"/>
		<reference ref_id="1179610" ref_url="https://bugzilla.suse.com/1179610" source="BUGZILLA"/>
		<reference ref_id="1183045" ref_url="https://bugzilla.suse.com/1183045" source="BUGZILLA"/>
		<reference ref_id="1211162" ref_url="https://bugzilla.suse.com/1211162" source="BUGZILLA"/>
		<reference ref_id="1211226" ref_url="https://bugzilla.suse.com/1211226" source="BUGZILLA"/>
		<reference ref_id="1212139" ref_url="https://bugzilla.suse.com/1212139" source="BUGZILLA"/>
		<reference ref_id="1212584" ref_url="https://bugzilla.suse.com/1212584" source="BUGZILLA"/>
		<reference ref_id="1214117" ref_url="https://bugzilla.suse.com/1214117" source="BUGZILLA"/>
		<reference ref_id="1214747" ref_url="https://bugzilla.suse.com/1214747" source="BUGZILLA"/>
		<reference ref_id="1214823" ref_url="https://bugzilla.suse.com/1214823" source="BUGZILLA"/>
		<reference ref_id="1215237" ref_url="https://bugzilla.suse.com/1215237" source="BUGZILLA"/>
		<reference ref_id="1215696" ref_url="https://bugzilla.suse.com/1215696" source="BUGZILLA"/>
		<reference ref_id="1215885" ref_url="https://bugzilla.suse.com/1215885" source="BUGZILLA"/>
		<reference ref_id="1215952" ref_url="https://bugzilla.suse.com/1215952" source="BUGZILLA"/>
		<reference ref_id="1216032" ref_url="https://bugzilla.suse.com/1216032" source="BUGZILLA"/>
		<reference ref_id="1216057" ref_url="https://bugzilla.suse.com/1216057" source="BUGZILLA"/>
		<reference ref_id="1216559" ref_url="https://bugzilla.suse.com/1216559" source="BUGZILLA"/>
		<reference ref_id="1216776" ref_url="https://bugzilla.suse.com/1216776" source="BUGZILLA"/>
		<reference ref_id="1217036" ref_url="https://bugzilla.suse.com/1217036" source="BUGZILLA"/>
		<reference ref_id="1217217" ref_url="https://bugzilla.suse.com/1217217" source="BUGZILLA"/>
		<reference ref_id="1217250" ref_url="https://bugzilla.suse.com/1217250" source="BUGZILLA"/>
		<reference ref_id="1217602" ref_url="https://bugzilla.suse.com/1217602" source="BUGZILLA"/>
		<reference ref_id="1217692" ref_url="https://bugzilla.suse.com/1217692" source="BUGZILLA"/>
		<reference ref_id="1217790" ref_url="https://bugzilla.suse.com/1217790" source="BUGZILLA"/>
		<reference ref_id="1217801" ref_url="https://bugzilla.suse.com/1217801" source="BUGZILLA"/>
		<reference ref_id="1217822" ref_url="https://bugzilla.suse.com/1217822" source="BUGZILLA"/>
		<reference ref_id="1217927" ref_url="https://bugzilla.suse.com/1217927" source="BUGZILLA"/>
		<reference ref_id="1217933" ref_url="https://bugzilla.suse.com/1217933" source="BUGZILLA"/>
		<reference ref_id="1217938" ref_url="https://bugzilla.suse.com/1217938" source="BUGZILLA"/>
		<reference ref_id="1217946" ref_url="https://bugzilla.suse.com/1217946" source="BUGZILLA"/>
		<reference ref_id="1217947" ref_url="https://bugzilla.suse.com/1217947" source="BUGZILLA"/>
		<reference ref_id="1217980" ref_url="https://bugzilla.suse.com/1217980" source="BUGZILLA"/>
		<reference ref_id="1217981" ref_url="https://bugzilla.suse.com/1217981" source="BUGZILLA"/>
		<reference ref_id="1217982" ref_url="https://bugzilla.suse.com/1217982" source="BUGZILLA"/>
		<reference ref_id="1218056" ref_url="https://bugzilla.suse.com/1218056" source="BUGZILLA"/>
		<reference ref_id="1218092" ref_url="https://bugzilla.suse.com/1218092" source="BUGZILLA"/>
		<reference ref_id="1218139" ref_url="https://bugzilla.suse.com/1218139" source="BUGZILLA"/>
		<reference ref_id="1218184" ref_url="https://bugzilla.suse.com/1218184" source="BUGZILLA"/>
		<reference ref_id="1218229" ref_url="https://bugzilla.suse.com/1218229" source="BUGZILLA"/>
		<reference ref_id="1218234" ref_url="https://bugzilla.suse.com/1218234" source="BUGZILLA"/>
		<reference ref_id="1218253" ref_url="https://bugzilla.suse.com/1218253" source="BUGZILLA"/>
		<reference ref_id="1218258" ref_url="https://bugzilla.suse.com/1218258" source="BUGZILLA"/>
		<reference ref_id="1218335" ref_url="https://bugzilla.suse.com/1218335" source="BUGZILLA"/>
		<reference ref_id="1218357" ref_url="https://bugzilla.suse.com/1218357" source="BUGZILLA"/>
		<reference ref_id="1218397" ref_url="https://bugzilla.suse.com/1218397" source="BUGZILLA"/>
		<reference ref_id="1218447" ref_url="https://bugzilla.suse.com/1218447" source="BUGZILLA"/>
		<reference ref_id="1218461" ref_url="https://bugzilla.suse.com/1218461" source="BUGZILLA"/>
		<reference ref_id="1218515" ref_url="https://bugzilla.suse.com/1218515" source="BUGZILLA"/>
		<reference ref_id="1218559" ref_url="https://bugzilla.suse.com/1218559" source="BUGZILLA"/>
		<reference ref_id="1218569" ref_url="https://bugzilla.suse.com/1218569" source="BUGZILLA"/>
		<reference ref_id="1218643" ref_url="https://bugzilla.suse.com/1218643" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26555" ref_url="https://www.suse.com/security/cve/CVE-2020-26555/" source="CVE"/>
		<reference ref_id="CVE-2023-51779" ref_url="https://www.suse.com/security/cve/CVE-2023-51779/" source="CVE"/>
		<reference ref_id="CVE-2023-6121" ref_url="https://www.suse.com/security/cve/CVE-2023-6121/" source="CVE"/>
		<reference ref_id="CVE-2023-6531" ref_url="https://www.suse.com/security/cve/CVE-2023-6531/" source="CVE"/>
		<reference ref_id="CVE-2023-6546" ref_url="https://www.suse.com/security/cve/CVE-2023-6546/" source="CVE"/>
		<reference ref_id="CVE-2023-6606" ref_url="https://www.suse.com/security/cve/CVE-2023-6606/" source="CVE"/>
		<reference ref_id="CVE-2023-6610" ref_url="https://www.suse.com/security/cve/CVE-2023-6610/" source="CVE"/>
		<reference ref_id="CVE-2023-6622" ref_url="https://www.suse.com/security/cve/CVE-2023-6622/" source="CVE"/>
		<reference ref_id="CVE-2023-6931" ref_url="https://www.suse.com/security/cve/CVE-2023-6931/" source="CVE"/>
		<reference ref_id="CVE-2023-6932" ref_url="https://www.suse.com/security/cve/CVE-2023-6932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447).
- CVE-2023-6610: Fixed an out of bounds read in the SMB client when printing debug information (bsc#1217946).
- CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559).
- CVE-2020-26555: Fixed Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B that may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN (bsc#1179610 bsc#1215237).
- CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving a malformed length from a server (bsc#1217947).
- CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1218335).
- CVE-2023-6931: Fixed a heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component that could lead to local privilege escalation. (bsc#1218258).
- CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's ipv4: igmp component that could lead to local privilege escalation (bsc#1218253).
- CVE-2023-6622: Fixed a null pointer dereference vulnerability in nft_dynset_init() that could allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service (bsc#1217938).
- CVE-2023-6121: Fixed an out-of-bounds read vulnerability in the NVMe-oF/TCP subsystem that could lead to information leak (bsc#1217250).

The following non-security bugs were fixed:

- Documentation: KVM: add separate directories for architecture-specific documentation (jsc#PED-7167).
- Documentation: KVM: update amd-memory-encryption.rst references (jsc#PED-7167).
- Documentation: KVM: update msr.rst reference (jsc#PED-7167).
- Documentation: KVM: update s390-diag.rst reference (jsc#PED-7167).
- Documentation: KVM: update s390-pv.rst reference (jsc#PED-7167).
- Documentation: drop more IDE boot options and ide-cd.rst (git-fixes).
- Documentation: qat: Use code block for qat sysfs example (git-fixes).
- Drop Documentation/ide/ (git-fixes).
- Fix crash on screen resize (bsc#1218229)
- Fix drm gem object underflow (bsc#1218092)
- Revert 'Limit kernel-source-azure build to architectures for which we build binaries (bsc#1108281).'
- Revert 'PCI/ASPM: Remove pcie_aspm_pm_state_change()' (git-fixes).
- Revert 'PCI: acpiphp: Reassign resources on bridge if necessary' (git-fixes).
- Revert 'md: unlock mddev before reap sync_thread in action_store' (git-fixes).
- Revert 'swiotlb: panic if nslabs is too small' (git-fixes).
- Revert 'xhci: Loosen RPM as default policy to cover for AMD xHC 1.1' (git-fixes).
- Update: drm/vmwgfx: Keep a gem reference to user bos in surfaces
- acpi: video: Add backlight=native DMI quirk for Lenovo Ideapad Z470 (git-fixes).
- acpi: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects (git-fixes).
- acpica: Add AML_NO_OPERAND_RESOLVE flag to Timer (git-fixes).
- afs: Fix afs_server_list to be cleaned up with RCU (git-fixes).
- afs: Fix dynamic root lookup DNS check (git-fixes).
- afs: Fix file locking on R/O volumes to operate in local mode (git-fixes).
- afs: Fix overwriting of result of DNS query (git-fixes).
- afs: Fix refcount underflow from error handling race (git-fixes).
- afs: Fix the dynamic root's d_delete to always delete unused dentries (git-fixes).
- afs: Fix use-after-free due to get/remove race in volume tree (git-fixes).
- afs: Make error on cell lookup failure consistent with OpenAFS (git-fixes).
- afs: Return ENOENT if no cell DNS record can be found (git-fixes).
- alsa: hda - Fix speaker and headset mic pin config for CHUWI CoreBook XPro (git-fixes).
- alsa: hda/hdmi: add force-connect quirk for NUC5CPYB (git-fixes).
- alsa: hda/hdmi: add force-connect quirks for ASUSTeK Z170 variants (git-fixes).
- alsa: hda/realtek: Add Framework laptop 16 to quirks (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS ROG GV302XA (git-fixes).
- alsa: hda/realtek: Add supported ALC257 for ChromeOS (git-fixes).
- alsa: hda/realtek: Apply mute LED quirk for HP15-db (git-fixes).
- alsa: hda/realtek: Enable headset on Lenovo M90 Gen5 (git-fixes).
- alsa: hda/realtek: Fix mute and mic-mute LEDs for HP ProBook 440 G6 (git-fixes).
- alsa: hda/realtek: Headset Mic VREF to 100% (git-fixes).
- alsa: hda/realtek: add new Framework laptop to quirks (git-fixes).
- alsa: hda/realtek: enable SND_PCI_QUIRK for hp pavilion 14-ec1xxx series (git-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs for a HP ZBook (git-fixes).
- alsa: hda/realtek: fix speakers on XPS 9530 (2023) (git-fixes).
- alsa: hda: intel-dsp-cfg: add LunarLake support (git-fixes).
- alsa: pcm: fix out-of-bounds in snd_pcm_state_names (git-fixes).
- alsa: seq: oss: Fix racy open/close of MIDI devices (git-fixes).
- alsa: usb-audio: Add Pioneer DJM-450 mixer controls (git-fixes).
- alsa: usb-audio: Increase delay in MOTU M quirk (git-fixes).
- apparmor: Free up __cleanup() name (jsc#PED-7167).
- arm64: dts: arm: add missing cache properties (git-fixes)
- arm64: dts: imx8mm: Add sound-dai-cells to micfil node (git-fixes)
- arm64: dts: imx8mn: Add sound-dai-cells to micfil node (git-fixes)
- arm64: dts: imx8mq-librem5: Remove dis_u3_susphy_quirk from (git-fixes)
- arm64: kdump: Skip kmemleak scan reserved memory for kdump (jsc#PED-7167).
- arm64: mm: Fix 'rodata=on' when CONFIG_RODATA_FULL_DEFAULT_ENABLED=y (git-fixes)
- arm: oMAP2+: Fix null pointer dereference and memory leak in omap_soc_device_init (git-fixes).
- arm: pL011: Fix DMA support (git-fixes).
- asoc: fsl_rpmsg: Fix error handler with pm_runtime_enable (git-fixes).
- asoc: hdmi-codec: fix missing report for jack initial status (git-fixes).
- asoc: meson: g12a-toacodec: Fix event generation (git-fixes).
- asoc: meson: g12a-toacodec: Validate written enum values (git-fixes).
- asoc: meson: g12a-tohdmitx: Fix event generation for S/PDIF mux (git-fixes).
- asoc: meson: g12a-tohdmitx: Validate written enum values (git-fixes).
- asoc: wm_adsp: fix memleak in wm_adsp_buffer_populate (git-fixes).
- bitmap: unify find_bit operations (jsc#PED-7167).
- block: fix revalidate performance regression (bsc#1216057).
- bluetooth: Fix deadlock in vhci_send_frame (git-fixes).
- bluetooth: L2CAP: Send reject on command corrupted request (git-fixes).
- bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE (git-fixes).
- bluetooth: btusb: Add new PID/VID 0489:e0f2 for MT7921 (bsc#1218461).
- bluetooth: hci_event: Fix not checking if HCI_OP_INQUIRY has been sent (git-fixes).
- bluetooth: hci_event: shut up a false-positive warning (git-fixes).
- bluetooth: hci_qca: Fix the teardown problem for real (git-fixes).
- bnxt: do not handle XDP in netpoll (jsc#PED-1495).
- bnxt_en: Clear resource reservation during resume (jsc#PED-1495).
- bnxt_en: Fix HWTSTAMP_FILTER_ALL packet timestamp logic (jsc#PED-1495).
- bnxt_en: Fix max_mtu setting for multi-buf XDP (jsc#PED-1495).
- bnxt_en: Fix page pool logic for page size &gt;= 64K (jsc#PED-1495).
- bnxt_en: Fix wrong return value check in bnxt_close_nic() (jsc#PED-1495).
- bnxt_en: Flush XDP for bnxt_poll_nitroa0()'s NAPI (jsc#PED-1495).
- bpf: Adjust insufficient default bpf_jit_limit (bsc#1218234 git-fixes).
- bus: ti-sysc: Flush posted write only after srst_udelay (git-fixes).
- ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1217980).
- ceph: fix type promotion bug on 32bit systems (bsc#1217982).
- cleanup: Make no_free_ptr() __must_check (jsc#PED-7167).
- clocksource: Add a Kconfig option for WATCHDOG_MAX_SKEW (bsc#1215885 bsc#1217217).
- clocksource: Enable TSC watchdog checking of HPET and PMTMR only when requested (bsc#1215885 bsc#1217217).
- clocksource: Handle negative skews in 'skew is too large' messages (bsc#1215885 bsc#1217217).
- clocksource: Improve 'skew is too large' messages (bsc#1215885 bsc#1217217).
- clocksource: Improve read-back-delay message (bsc#1215885 bsc#1217217).
- clocksource: Loosen clocksource watchdog constraints (bsc#1215885 bsc#1217217).
- clocksource: Print clocksource name when clocksource is tested unstable (bsc#1215885 bsc#1217217).
- clocksource: Verify HPET and PMTMR when TSC unverified (bsc#1215885 bsc#1217217).
- configfs-tsm: Introduce a shared ABI for attestation reports (jsc#PED-7167).
- crypto: ccp - Add SEV_INIT rc error logging on init (jsc#PED-7167).
- crypto: ccp - Add SEV_INIT_EX support (jsc#PED-7167).
- crypto: ccp - Add a header for multiple drivers to use `__psp_pa` (jsc#PED-7167).
- crypto: ccp - Add a quirk to firmware update (jsc#PED-7167).
- crypto: ccp - Add psp_init_on_probe module parameter (jsc#PED-7167).
- crypto: ccp - Drop TEE support for IRQ handler (jsc#PED-7167).
- crypto: ccp - Ensure psp_ret is always init'd in __sev_platform_init_locked() (jsc#PED-7167).
- crypto: ccp - Fail the PSP initialization when writing psp data file failed (jsc#PED-7167).
- crypto: ccp - Fix the INIT_EX data file open failure (jsc#PED-7167).
- crypto: ccp - Fix whitespace in sev_cmd_buffer_len() (jsc#PED-7167).
- crypto: ccp - Flush the SEV-ES TMR memory before giving it to firmware (jsc#PED-7167).
- crypto: ccp - Initialize PSP when reading psp data file failed (jsc#PED-7167).
- crypto: ccp - Log when resetting PSP SEV state (jsc#PED-7167).
- crypto: ccp - Move SEV_INIT retry for corrupted data (jsc#PED-7167).
- crypto: ccp - Move some PSP mailbox bit definitions into common header (jsc#PED-7167).
- crypto: ccp - Name -1 return value as SEV_RET_NO_FW_CALL (jsc#PED-7167).
- crypto: ccp - Refactor out sev_fw_alloc() (jsc#PED-7167).
- crypto: ccp - remove unneeded semicolon (jsc#PED-7167).
- crypto: ccp: Get rid of __sev_platform_init_locked()'s local function pointer (jsc#PED-7167).
- dm verity: initialize fec io before freeing it (git-fixes).
- dm-verity: do not use blocking calls from tasklets (git-fixes).
- dm: add cond_resched() to dm_wq_requeue_work() (git-fixes).
- dm: do not attempt to queue IO under RCU protection (git-fixes).
- dm: fix __send_duplicate_bios() to always allow for splitting IO (bsc#1215952).
- dm: fix improper splitting for abnormal bios (bsc#1215952).
- dm: verity-loadpin: Add NULL pointer check for 'bdev' parameter (git-fixes).
- dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045, bsc#1216776).
- dmaengine: ioat: Free up __cleanup() name (jsc#PED-7167).
- doc/README.SUSE: Add how to update the config for module signing (jsc#PED-5021)
- doc/README.SUSE: Remove how to build modules using kernel-source (jsc#PED-5021)
- doc/README.SUSE: Simplify the list of references (jsc#PED-5021)
- drm/amd/amdgpu: Fix warnings in amdgpu/amdgpu_display.c (git-fixes).
- drm/amdgpu/sdma5.2: add begin/end_use ring callbacks (bsc#1212139).
- drm/amdgpu: Add EEPROM I2C address support for ip discovery (git-fixes).
- drm/amdgpu: Add I2C EEPROM support on smu v13_0_6 (git-fixes).
- drm/amdgpu: Add support for RAS table at 0x40000 (git-fixes).
- drm/amdgpu: Decouple RAS EEPROM addresses from chips (git-fixes).
- drm/amdgpu: Remove redundant I2C EEPROM address (git-fixes).
- drm/amdgpu: Remove second moot switch to set EEPROM I2C address (git-fixes).
- drm/amdgpu: Return from switch early for EEPROM I2C address (git-fixes).
- drm/amdgpu: Update EEPROM I2C address for smu v13_0_0 (git-fixes).
- drm/amdgpu: Update ras eeprom support for smu v13_0_0 and v13_0_10 (git-fixes).
- drm/amdgpu: correct chunk_ptr to a pointer to chunk (git-fixes).
- drm/amdgpu: correct the amdgpu runtime dereference usage count (git-fixes).
- drm/amdgpu: fix tear down order in amdgpu_vm_pt_free (git-fixes).
- drm/amdgpu: simplify amdgpu_ras_eeprom.c (git-fixes).
- drm/bridge: parade-ps8640: Never store more than msg-&gt;size bytes in AUX xfer (git-fixes).
- drm/bridge: ps8640: Fix size mismatch warning w/ len (git-fixes).
- drm/bridge: tc358768: select CONFIG_VIDEOMODE_HELPERS (git-fixes).
- drm/bridge: ti-sn65dsi86: Never store more than msg-&gt;size bytes in AUX xfer (git-fixes).
- drm/i915/display: Drop check for doublescan mode in modevalid (git-fixes).
- drm/i915/dp: Fix passing the correct DPCD_REV for drm_dp_set_phy_test_pattern (git-fixes).
- drm/i915/dpt: Only do the POT stride remap when using DPT (git-fixes).
- drm/i915/lvds: Use REG_BIT() &amp; co (git-fixes).
- drm/i915/mtl: limit second scaler vertical scaling in ver &gt;= 14 (git-fixes).
- drm/i915/sdvo: stop caching has_hdmi_monitor in struct intel_sdvo (git-fixes).
- drm/i915: Fix intel_atomic_setup_scalers() plane_state handling (git-fixes).
- drm/i915: Fix remapped stride with CCS on ADL+ (git-fixes).
- drm/i915: Reject async flips with bigjoiner (git-fixes).
- drm/i915: Relocate intel_atomic_setup_scalers() (git-fixes).
- drm/i915: fix MAX_ORDER usage in i915_gem_object_get_pages_internal() (jsc#PED-7167).
- drm/mediatek: Add spinlock for setting vblank event in atomic_begin (git-fixes).
- drm/mgag200: Fix gamma lut not initialized for G200ER, G200EV, G200SE (git-fixes).
- efi/libstub: Implement support for unaccepted memory (jsc#PED-7167).
- efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory (jsc#PED-7167).
- efi/unaccepted: Fix off-by-one when checking for overlapping ranges (jsc#PED-7167).
- efi/unaccepted: Fix soft lockups caused by parallel memory acceptance (jsc#PED-7167).
- efi/unaccepted: Make sure unaccepted table is mapped (jsc#PED-7167).
- efi/unaccepted: Use ACPI reclaim memory for unaccepted memory table (jsc#PED-7167).
- efi/x86: Get full memory map in allocate_e820() (jsc#PED-7167).
- efi: Add unaccepted memory support (jsc#PED-7167).
- efi: libstub: avoid efi_get_memory_map() for allocating the virt map (jsc#PED-7167).
- efi: libstub: install boot-time memory map as config table (jsc#PED-7167).
- efi: libstub: remove DT dependency from generic stub (jsc#PED-7167).
- efi: libstub: remove pointless goto kludge (jsc#PED-7167).
- efi: libstub: simplify efi_get_memory_map() and struct efi_boot_memmap (jsc#PED-7167).
- efi: libstub: unify initrd loading between architectures (jsc#PED-7167).
- floppy: fix MAX_ORDER usage (jsc#PED-7167).
- fprobe: Fix to ensure the number of active retprobes is not zero (git-fixes).
- fs/jfs: Add check for negative db_l2nbperpage (git-fixes).
- fs/jfs: Add validity check for db_maxag and db_agpref (git-fixes).
- fs/jfs: prevent double-free in dbUnmount() after failed jfs_remount() (git-fixes).
- fs/remap: constrain dedupe of EOF blocks (git-fixes).
- fs: avoid empty option when generating legacy mount string (git-fixes).
- fs: fix an infinite loop in iomap_fiemap (git-fixes).
- fs: ocfs2: namei: check return value of ocfs2_add_entry() (git-fixes).
- genwqe: fix MAX_ORDER usage (jsc#PED-7167).
- gfs2: Add wrapper for iomap_file_buffered_write (git-fixes).
- gfs2: Check sb_bsize_shift after reading superblock (git-fixes).
- gfs2: Clean up function may_grant (git-fixes).
- gfs2: Fix filesystem block deallocation for short writes (git-fixes).
- gfs2: Fix gfs2_release for non-writers regression (git-fixes).
- gfs2: Fix inode height consistency check (git-fixes).
- gfs2: Fix length of holes reported at end-of-file (git-fixes).
- gfs2: Fix possible data races in gfs2_show_options() (git-fixes).
- gfs2: Improve gfs2_make_fs_rw error handling (git-fixes).
- gfs2: Make sure FITRIM minlen is rounded up to fs block size (git-fixes).
- gfs2: Silence 'suspicious RCU usage in gfs2_permission' warning (git-fixes).
- gfs2: Switch from strlcpy to strscpy (git-fixes).
- gfs2: fix an oops in gfs2_permission (git-fixes).
- gfs2: gfs2_setattr_size error path fix (git-fixes).
- gfs2: ignore negated quota changes (git-fixes).
- gfs2: jdata writepage fix (git-fixes).
- gfs2: use i_lock spin_lock for inode qadata (git-fixes).
- gpiolib: sysfs: Fix error handling on failed export (git-fixes).
- gve: Fixes for napi_poll when budget is 0 (git-fixes).
- gve: Use size_add() in call to struct_size() (git-fixes).
- hid: add ALWAYS_POLL quirk for Apple kb (git-fixes).
- hid: glorious: fix Glorious Model I HID report (git-fixes).
- hid: hid-asus: add const to read-only outgoing usb buffer (git-fixes).
- hid: hid-asus: reset the backlight brightness level on resume (git-fixes).
- hid: lenovo: Restrict detection of patched firmware only to USB cptkbd (git-fixes).
- hid: multitouch: Add quirk for HONOR GLO-GXXX touchpad (git-fixes).
- hwmon: (acpi_power_meter) Fix 4.29 MW bug (git-fixes).
- hwmon: (nzxt-kraken2) Fix error handling path in kraken2_probe() (git-fixes).
- i2c: aspeed: Handle the coalesced stop conditions with the start conditions (git-fixes).
- i2c: core: Fix atomic xfer check for non-preempt config (git-fixes).
- i2c: designware: Fix corrupted memory seen in the ISR (git-fixes).
- i40e: Fix I40E_FLAG_VF_VLAN_PRUNING value (jsc#PED-372).
- i40e: Fix VF VLAN offloading when port VLAN is configured (jsc#PED-372).
- i40e: Fix unexpected MFS warning message (jsc#PED-372).
- i40e: Fix wrong check for I40E_TXR_FLAGS_WB_ON_ITR (jsc#PED-372).
- i40e: fix misleading debug logs (jsc#PED-372).
- i40e: fix potential NULL pointer dereferencing of pf-&gt;vf i40e_sync_vsi_filters() (jsc#PED-372).
- i40e: fix potential memory leaks in i40e_remove() (jsc#PED-372).
- i40e: prevent crash on probe if hw registers have invalid values (jsc#PED-372).
- ib/mlx5: Fix init stage error handling to avoid double free of same QP and UAF (git-fixes)
- ib/mlx5: Fix rdma counter binding for RAW QP (git-fixes)
- igb: Avoid starting unnecessary workqueues (jsc#PED-370).
- igb: Change IGB_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-370).
- igb: Fix potential memory leak in igb_add_ethtool_nfc_entry (jsc#PED-370).
- igb: clean up in all error paths when enabling SR-IOV (jsc#PED-370).
- igb: disable virtualization features on 82580 (jsc#PED-370).
- igbvf: Change IGBVF_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-370).
- igc: Change IGC_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-375).
- igc: Expose tx-usecs coalesce setting to user (jsc#PED-375).
- igc: Fix ambiguity in the ethtool advertising (jsc#PED-375).
- igc: Fix infinite initialization loop with early XDP redirect (jsc#PED-375).
- igc: Fix the typo in the PTM Control macro (jsc#PED-375).
- iio: adc: ti_am335x_adc: Fix return value check of tiadc_request_dma() (git-fixes).
- iio: common: ms_sensors: ms_sensors_i2c: fix humidity conversion time table (git-fixes).
- iio: imu: inv_mpu6050: fix an error code problem in inv_mpu6050_read_raw (git-fixes).
- iio: triggered-buffer: prevent possible freeing of wrong buffer (git-fixes).
- input: i8042 - add quirk for TUXEDO Gemini 17 Gen1/Clevo PD70PN (git-fixes).
- input: ipaq-micro-keys - add error handling for devm_kmemdup (git-fixes).
- input: soc_button_array - add mapping for airplane mode button (git-fixes).
- input: xpad - add HyperX Clutch Gladiate Support (git-fixes).
- interconnect: Treat xlate() returning NULL node as an error (git-fixes).
- iomap: Fix iomap_dio_rw return value for user copies (git-fixes).
- iommu: fix MAX_ORDER usage in __iommu_dma_alloc_pages() (jsc#PED-7167).
- iov_iter, x86: Be consistent about the __user tag on copy_mc_to_user() (git-fixes).
- jfs: fix array-index-out-of-bounds in dbFindLeaf (git-fixes).
- jfs: fix array-index-out-of-bounds in diAlloc (git-fixes).
- jfs: fix invalid free of JFS_IP(ipimap)-&gt;i_imap in diUnmount (git-fixes).
- jfs: validate max amount of blocks before allocation (git-fixes).
- kABI: Preserve the type of rethook::handler (git-fixes).
- kABI: restore void return to typec_altmode_attention (git-fixes).
- kabi/severities: ignore kABI for asus-wmi drivers Tolerate the kABI changes, as used only locally for asus-wmi stuff
- kabi/severities: make snp_issue_guest_request PASS (jsc#PED-7167)
- kabi: fix of_reserved_mem_* due to struct vm_struct became defined (jsc#PED-7167).
- kabi: fix sev-dev due to fs_struct became defined (jsc#PED-7167).
- kabi: fix struct efi after adding unaccepted memory table (jsc#PED-7167).
- kabi: fix struct zone kabi after adding unaccepted_pages and NR_UNACCEPTED (jsc#PED-7167).
- kbuild: Drop -Wdeclaration-after-statement (jsc#PED-7167).
- kconfig: fix memory leak from range properties (git-fixes).
- kernel-source: Remove config-options.changes (jsc#PED-5021)
- kprobes: consistent rcu api usage for kretprobe holder (git-fixes).
- kvm: arm64: Prevent kmemleak from accessing pKVM memory (jsc#PED-7167).
- kvm: s390/mm: Properly reset no-dat (git-fixes bsc#1218056).
- kvm: s390: vsie: fix wrong VIR 37 when MSO is used (git-fixes bsc#1217933).
- lib/vsprintf: Fix %pfwf when current node refcount == 0 (git-fixes).
- libceph: use kernel_connect() (bsc#1217981).
- limit kernel-source build to architectures for which the kernel binary is built (bsc#1108281).
- locking: Introduce __cleanup() based infrastructure (jsc#PED-7167).
- locks: fix KASAN: use-after-free in trace_event_raw_event_filelock_lock (git-fixes).
- md/bitmap: do not set max_write_behind if there is no write mostly device (git-fixes).
- md/md-bitmap: hold 'reconfig_mutex' in backlog_store() (git-fixes).
- md/md-bitmap: remove unnecessary local variable in backlog_store() (git-fixes).
- md/raid0: add discard support for the 'original' layout (git-fixes).
- md/raid10: do not call bio_start_io_acct twice for bio which experienced read error (git-fixes).
- md/raid10: factor out code from wait_barrier() to stop_waiting_barrier() (git-fixes).
- md/raid10: factor out dereference_rdev_and_rrdev() (git-fixes).
- md/raid10: fix io loss while replacement replace rdev (git-fixes).
- md/raid10: fix leak of 'r10bio-&gt;remaining' for recovery (git-fixes).
- md/raid10: fix memleak for 'conf-&gt;bio_split' (git-fixes).
- md/raid10: fix memleak of md thread (git-fixes).
- md/raid10: fix null-ptr-deref in raid10_sync_request (git-fixes).
- md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request (git-fixes).
- md/raid10: fix overflow of md/safe_mode_delay (git-fixes).
- md/raid10: fix task hung in raid10d (git-fixes).
- md/raid10: fix the condition to call bio_end_io_acct() (git-fixes).
- md/raid10: fix wrong setting of max_corr_read_errors (git-fixes).
- md/raid10: prevent soft lockup while flush writes (git-fixes).
- md/raid10: use dereference_rdev_and_rrdev() to get devices (git-fixes).
- md/raid1: fix error: ISO C90 forbids mixed declarations (git-fixes).
- md/raid1: free the r1bio before waiting for blocked rdev (git-fixes).
- md/raid1: hold the barrier until handle_read_error() finishes (git-fixes).
- md/raid5-cache: fix a deadlock in r5l_exit_log() (git-fixes).
- md/raid5-cache: fix null-ptr-deref for r5l_flush_stripe_to_raid() (git-fixes).
- md/raid5: fix miscalculation of 'end_sector' in raid5_read_one_chunk() (git-fixes).
- md: Put the right device in md_seq_next (bsc#1217822).
- md: Set MD_BROKEN for RAID1 and RAID10 (git-fixes).
- md: avoid signed overflow in slot_store() (git-fixes).
- md: do not update recovery_cp when curr_resync is ACTIVE (git-fixes).
- md: drop queue limitation for RAID1 and RAID10 (git-fixes).
- md: raid0: account for split bio in iostat accounting (git-fixes).
- md: raid10 add nowait support (git-fixes).
- md: raid1: fix potential OOB in raid1_remove_disk() (git-fixes).
- md: restore 'noio_flag' for the last mddev_resume() (git-fixes).
- md: select BLOCK_LEGACY_AUTOLOAD (git-fixes).
- memblock: exclude MEMBLOCK_NOMAP regions from kmemleak (jsc#PED-7167).
- memblock: make memblock_find_in_range method private (jsc#PED-7167).
- misc: mei: client.c: fix problem of return '-EOVERFLOW' in mei_cl_write (git-fixes).
- misc: mei: client.c: return negative error code in mei_cl_write (git-fixes).
- mkspec: Add multibuild support (JSC-SLE#5501, boo#1211226, bsc#1218184) When MULTIBUILD option in config.sh is enabled generate a _multibuild file listing all spec files.
- mm/page_alloc: make deferred page init free pages in MAX_ORDER blocks (jsc#PED-7167).
- mm/pgtable: Fix multiple -Wstringop-overflow warnings (jsc#PED-7167).
- mm/slab: Add __free() support for kvfree (jsc#PED-7167).
- mm/slub: fix MAX_ORDER usage in calculate_order() (jsc#PED-7167).
- mm: Add PAGE_ALIGN_DOWN macro (jsc#PED-7167).
- mm: Add support for unaccepted memory (jsc#PED-7167).
- mm: add pageblock_align() macro (jsc#PED-7167).
- mm: add pageblock_aligned() macro (jsc#PED-7167).
- mm: avoid passing 0 to __ffs() (jsc#PED-7167).
- mm: kmem: drop __GFP_NOFAIL when allocating objcg vectors (bsc#1218515).
- mm: move kvmalloc-related functions to slab.h (jsc#PED-7167).
- mm: new primitive kvmemdup() (jsc#PED-7167).
- mm: reuse pageblock_start/end_pfn() macro (jsc#PED-7167).
- mmc: meson-mx-sdhc: Fix initialization frozen issue (git-fixes).
- mmc: rpmb: fixes pause retune on all RPMB partitions (git-fixes).
- mmc: sdhci-sprd: Fix eMMC init failure after hw reset (git-fixes).
- neighbor: tracing: Move pin6 inside CONFIG_IPV6=y section (git-fixes).
- net/rose: Fix Use-After-Free in rose_ioctl (git-fixes).
- net/smc: Fix pos miscalculation in statistics (bsc#1218139).
- net/tg3: fix race condition in tg3_reset_task() (bsc#1217801).
- net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes).
- net: bnxt: fix a potential use-after-free in bnxt_init_tc (jsc#PED-1495).
- net: ena: Destroy correct number of xdp queues upon failure (git-fixes).
- net: ena: Fix XDP redirection error (git-fixes).
- net: ena: Fix xdp drops handling due to multibuf packets (git-fixes).
- net: ena: Flush XDP packets on error (git-fixes).
- net: mana: select PAGE_POOL (git-fixes).
- net: rfkill: gpio: set GPIO direction (git-fixes).
- net: usb: ax88179_178a: avoid failed operations when device is disconnected (git-fixes).
- net: usb: ax88179_178a: clean up pm calls (git-fixes).
- net: usb: ax88179_178a: wol optimizations (git-fixes).
- net: usb: qmi_wwan: claim interface 4 for ZTE MF290 (git-fixes).
- nfc: llcp_core: Hold a ref to llcp_local-&gt;dev when holding a ref to llcp_local (git-fixes).
- nfs: Fix O_DIRECT locking issues (bsc#1211162).
- nfs: Fix a few more clear_bit() instances that need release semantics (bsc#1211162).
- nfs: Fix a potential data corruption (bsc#1211162).
- nfs: Fix a use after free in nfs_direct_join_group() (bsc#1211162).
- nfs: Fix error handling for O_DIRECT write scheduling (bsc#1211162).
- nfs: More O_DIRECT accounting fixes for error paths (bsc#1211162).
- nfs: More fixes for nfs_direct_write_reschedule_io() (bsc#1211162).
- nfs: Use the correct commit info in nfs_join_page_group() (bsc#1211162).
- nfs: only issue commit in DIO codepath if we have uncommitted data (bsc#1211162).
- nilfs2: fix missing error check for sb_set_blocksize call (git-fixes).
- nilfs2: prevent WARNING in nilfs_sufile_set_segment_usage() (git-fixes).
- nlm: Defend against file_lock changes after vfs_test_lock() (bsc#1217692).
- null_blk: fix poll request timeout handling (git-fixes).
- nvme-core: check for too small lba shift (bsc#1214117).
- nvme-pci: Add sleep quirk for Kingston drives (git-fixes).
- nvme-pci: always return an ERR_PTR from nvme_pci_alloc_dev (git-fixes).
- nvme-pci: do not set the NUMA node of device if it has none (git-fixes).
- nvme-pci: factor out a nvme_pci_alloc_dev helper (git-fixes).
- nvme-rdma: do not try to stop unallocated queues (git-fixes).
- nvme: sanitize metadata bounce buffer for reads (git-fixes).
- nvmet-auth: complete a request only after freeing the dhchap pointers (git-fixes).
- of: reserved_mem: Have kmemleak ignore dynamically allocated reserved mem (jsc#PED-7167).
- orangefs: Fix kmemleak in orangefs_prepare_debugfs_help_string() (git-fixes).
- orangefs: Fix kmemleak in orangefs_{kernel,client}_debug_init() (git-fixes).
- orangefs: Fix sysfs not cleanup when dev init failed (git-fixes).
- orangefs: Fix the size of a memory allocation in orangefs_bufmap_alloc() (git-fixes).
- padata: Fix refcnt handling in padata_free_shell() (git-fixes).
- parport: Add support for Brainboxes IX/UC/PX parallel cards (git-fixes).
- pci: loongson: Limit MRRS to 256 (git-fixes).
- perf/core: fix MAX_ORDER usage in rb_alloc_aux_page() (jsc#PED-7167).
- pinctrl: at91-pio4: use dedicated lock class for IRQ (git-fixes).
- platform/surface: aggregator: fix recv_buf() return value (git-fixes).
- platform/x86: asus-wmi: Add support for ROG X13 tablet mode (git-fixes).
- platform/x86: asus-wmi: Adjust tablet/lidflip handling to use enum (git-fixes).
- platform/x86: asus-wmi: Fix kbd_dock_devid tablet-switch reporting (git-fixes).
- platform/x86: asus-wmi: Move i8042 filter install to shared asus-wmi code (git-fixes).
- platform/x86: asus-wmi: Simplify tablet-mode-switch handling (git-fixes).
- platform/x86: asus-wmi: Simplify tablet-mode-switch probing (git-fixes).
- platform/x86: wmi: Allow duplicate GUIDs for drivers that use struct wmi_driver (git-fixes).
- platform/x86: wmi: Skip blocks with zero instances (git-fixes).
- powerpc/pseries/vas: Migration suspend waits for no in-progress open windows (bsc#1218397 ltc#204523).
- qed/red_ll2: Fix undefined behavior bug in struct qed_ll2_info (jsc#PED-1526).
- qed: Fix a potential use-after-free in qed_cxt_tables_alloc (jsc#PED-1526).
- qed: fix LL2 RX buffer allocation (jsc#PED-1526).
- qede: fix firmware halt over suspend and resume (jsc#PED-1526).
- qla2xxx: add debug log for deprecated hw detected (bsc#1216032).
- r8152: Add RTL8152_INACCESSIBLE checks to more loops (git-fixes).
- r8152: Add RTL8152_INACCESSIBLE to r8153_aldps_en() (git-fixes).
- r8152: Add RTL8152_INACCESSIBLE to r8153_pre_firmware_1() (git-fixes).
- r8152: Add RTL8152_INACCESSIBLE to r8156b_wait_loading_flash() (git-fixes).
- r8152: Rename RTL8152_UNPLUG to RTL8152_INACCESSIBLE (git-fixes).
- r8169: Fix PCI error on system resume (git-fixes).
- rdma/bnxt_re: Correct module description string (jsc#PED-1495).
- rdma/core: Use size_{add,sub,mul}() in calls to struct_size() (git-fixes)
- rdma/hfi1: Use FIELD_GET() to extract Link Width (git-fixes)
- rdma/hfi1: Workaround truncation compilation error (git-fixes)
- rdma/hns: Add check for SL (git-fixes)
- rdma/hns: Fix printing level of asynchronous events (git-fixes)
- rdma/hns: Fix signed-unsigned mixed comparisons (git-fixes)
- rdma/hns: Fix uninitialized ucmd in hns_roce_create_qp_common() (git-fixes)
- rdma/hns: The UD mode can only be configured with DCQCN (git-fixes)
- regmap: fix bogus error on regcache_sync success (git-fixes).
- reiserfs: Check the return value from __getblk() (git-fixes).
- reiserfs: Replace 1-element array with C99 style flex-array (git-fixes).
- remove unnecessary WARN_ON_ONCE() (bsc#1214823 bsc#1218569).
- reset: Fix crash when freeing non-existent optional resets (git-fixes).
- restore renamed device IDs for USB HID devices (git-fixes).
- rethook: Fix to use WRITE_ONCE() for rethook:: Handler (git-fixes).
- rethook: Use __rcu pointer for rethook::handler (git-fixes).
- ring-buffer: Do not try to put back write_stamp (git-fixes).
- ring-buffer: Do not update before stamp when switching sub-buffers (git-fixes).
- ring-buffer: Fix a race in rb_time_cmpxchg() for 32 bit archs (git-fixes).
- ring-buffer: Fix memory leak of free page (git-fixes).
- ring-buffer: Fix slowpath of interrupted event (git-fixes).
- ring-buffer: Fix wake ups when buffer_percent is set to 100 (git-fixes).
- ring-buffer: Fix writing to the buffer with max_data_size (git-fixes).
- ring-buffer: Force absolute timestamp on discard of event (git-fixes).
- ring-buffer: Have saved event hold the entire event (git-fixes).
- ring-buffer: Remove useless update to write_stamp in rb_try_to_discard() (git-fixes).
- s390/vx: fix save/restore of fpu kernel context (git-fixes bsc#1218357).
- scsi: lpfc: use unsigned type for num_sge (bsc#1214747).
- serial: 8250: 8250_omap: Clear UART_HAS_RHR_IT_DIS bit (git-fixes).
- serial: 8250: 8250_omap: Do not start RX DMA on THRI interrupt (git-fixes).
- serial: sc16is7xx: address RX timeout interrupt errata (git-fixes).
- soundwire: stream: fix NULL pointer dereference for multi_link (git-fixes).
- spi: atmel: Fix clock issue when using devices with different polarities (git-fixes).
- statfs: enforce statfs[64] structure initialization (git-fixes).
- supported.conf: add drivers/virt/coco/tsm (jsc#PED-7167)
- swiotlb: always set the number of areas before allocating the pool (git-fixes).
- swiotlb: do not panic! (git-fixes).
- swiotlb: fix a braino in the alignment check fix (bsc#1216559).
- swiotlb: fix debugfs reporting of reserved memory pools (git-fixes).
- swiotlb: fix slot alignment checks (bsc#1216559).
- swiotlb: fix the deadlock in swiotlb_do_find_slots (git-fixes).
- swiotlb: mark swiotlb_memblock_alloc() as __init (git-fixes).
- swiotlb: reduce the number of areas to match actual memory pool size (git-fixes).
- swiotlb: reduce the swiotlb buffer size on allocation failure (git-fixes).
- swiotlb: use the calculated number of areas (git-fixes).
- tracing / synthetic: Disable events after testing in synth_event_gen_test_init() (git-fixes).
- tracing/kprobes: Fix the description of variable length arguments (git-fixes).
- tracing/kprobes: Fix the order of argument descriptions (git-fixes).
- tracing/perf: Add interrupt_context_level() helper (git-fixes).
- tracing/synthetic: fix kernel-doc warnings (git-fixes).
- tracing: Always update snapshot buffer size (git-fixes).
- tracing: Disable preemption when using the filter buffer (bsc#1217036).
- tracing: Disable snapshot buffer when stopping instance tracers (git-fixes).
- tracing: Fix a possible race when disabling buffered events (bsc#1217036).
- tracing: Fix a warning when allocating buffered events fails (bsc#1217036).
- tracing: Fix blocked reader of snapshot buffer (git-fixes).
- tracing: Fix incomplete locking when disabling buffered events (bsc#1217036).
- tracing: Fix warning in trace_buffered_event_disable() (git-fixes, bsc#1217036).
- tracing: Have the user copy of synthetic event address use correct context (git-fixes).
- tracing: Reuse logic from perf's get_recursion_context() (git-fixes).
- tracing: Set actual size after ring buffer resize (git-fixes).
- tracing: Stop current tracer when resizing buffer (git-fixes).
- tracing: Update snapshot buffer on resize if it is allocated (git-fixes).
- tracing: Use __this_cpu_read() in trace_event_buffer_lock_reserver() (bsc#1217036).
- tracing: relax trace_event_eval_update() execution with cond_resched() (git-fixes).
- uapi: propagate __struct_group() attributes to the container union (jsc#SLE-18978).
- ubifs: Fix memory leak of bud-&gt;log_hash (git-fixes).
- ubifs: fix possible dereference after free (git-fixes).
- usb-storage: Add quirk for incorrect WP on Kingston DT Ultimate 3.0 G3 (git-fixes).
- usb: aqc111: check packet for fixup for true limit (git-fixes).
- usb: config: fix iteration issue in 'usb_get_bos_descriptor()' (git-fixes).
- usb: host: xhci-plat: fix possible kernel oops while resuming (git-fixes).
- usb: hub: Guard against accesses to uninitialized BOS descriptors (git-fixes).
- usb: serial: ftdi_sio: update Actisense PIDs constant names (git-fixes).
- usb: serial: option: add Foxconn T99W265 with new baseline (git-fixes).
- usb: serial: option: add Quectel EG912Y module support (git-fixes).
- usb: serial: option: add Quectel RM500Q R13 firmware support (git-fixes).
- usb: typec: bus: verify partner exists in typec_altmode_attention (git-fixes).
- usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes).
- usb: typec: ucsi: acpi: add quirk for ASUS Zenbook UM325 (git-fixes).
- virt/coco/sev-guest: Double-buffer messages (jsc#PED-7167).
- virt: coco: Add a coco/Makefile and coco/Kconfig (jsc#PED-7167).
- virt: sevguest: Add TSM_REPORTS support for SNP_GET_EXT_REPORT (jsc#PED-7167).
- virt: sevguest: Fix passing a stack buffer as a scatterlist target (jsc#PED-7167).
- virt: sevguest: Prep for kernel internal get_ext_report() (jsc#PED-7167).
- virt: tdx-guest: Add Quote generation support using TSM_REPORTS (jsc#PED-7167).
- vsprintf/kallsyms: Prevent invalid data when printing symbol (bsc#1217602).
- wifi: cfg80211: Add my certificate (git-fixes).
- wifi: cfg80211: fix certs build to not depend on file order (git-fixes).
- wifi: iwlwifi: pcie: add another missing bh-disable for rxq-&gt;lock (git-fixes).
- wifi: iwlwifi: pcie: do not synchronize IRQs from IRQ (git-fixes).
- wifi: mac80211: mesh: check element parsing succeeded (git-fixes).
- wifi: mac80211: mesh_plink: fix matches_local logic (git-fixes).
- x86/CPU/AMD: Check vendor in the AMD microcode callback (git-fixes).
- x86/alternatives: Disable KASAN in apply_alternatives() (git-fixes).
- x86/alternatives: Disable interrupts and sync when optimizing NOPs in place (git-fixes).
- x86/alternatives: Sync core before enabling interrupts (git-fixes).
- x86/boot/compressed: Handle unaccepted memory (jsc#PED-7167).
- x86/boot/compressed: Reserve more memory for page tables (git-fixes).
- x86/boot: Add an efi.h header for the decompressor (jsc#PED-7167).
- x86/boot: Centralize __pa()/__va() definitions (jsc#PED-7167).
- x86/boot: Fix incorrect startup_gdt_descr.size (git-fixes).
- x86/cpu/amd: Enable Zenbleed fix for AMD Custom APU 0405 (git-fixes).
- x86/cpu: Do not write CSTAR MSR on Intel CPUs (jsc#PED-7167).
- x86/cpu: Fix amd_check_microcode() declaration (git-fixes).
- x86/efi: Safely enable unaccepted memory in UEFI (jsc#PED-7167).
- x86/entry: Convert INT 0x80 emulation to IDTENTRY (bsc#1217927).
- x86/entry: Do not allow external 0x80 interrupts (bsc#1217927).
- x86/fpu/xstate: Prevent false-positive warning in __copy_xstate_uabi_buf() (git-fixes).
- x86/fpu: Invalidate FPU state correctly on exec() (git-fixes).
- x86/platform/uv: Use alternate source for socket to node data (bsc#1215696 bsc#1217790).
- x86/purgatory: Remove LTO flags (git-fixes).
- x86/resctrl: Fix kernel-doc warnings (git-fixes).
- x86/sev-es: Replace open-coded hlt-loop with sev_es_terminate() (jsc#PED-7167).
- x86/sev-es: Use insn_decode_mmio() for MMIO implementation (jsc#PED-7167).
- x86/sev: Add SNP-specific unaccepted memory support (jsc#PED-7167).
- x86/sev: Allow for use of the early boot GHCB for PSC requests (jsc#PED-7167).
- x86/sev: Change npages to unsigned long in snp_accept_memory() (jsc#PED-7167).
- x86/sev: Change snp_guest_issue_request()'s fw_err argument (jsc#PED-7167).
- x86/sev: Fix address space sparse warning (jsc#PED-7167).
- x86/sev: Get rid of special sev_es_enable_key (jsc#PED-7167).
- x86/sev: Mark snp_abort() noreturn (jsc#PED-7167).
- x86/sev: Put PSC struct on the stack in prep for unaccepted memory support (jsc#PED-7167).
- x86/sev: Use large PSC requests if applicable (jsc#PED-7167).
- x86/smp: Use dedicated cache-line for mwait_play_dead() (git-fixes).
- x86/srso: Add SRSO mitigation for Hygon processors (git-fixes).
- x86/srso: Fix SBPB enablement for (possible) future fixed HW  (git-fixes).
- x86/srso: Fix vulnerability reporting for missing microcode (git-fixes).
- x86/tdx: Add unaccepted memory support (jsc#PED-7167).
- x86/tdx: Disable NOTIFY_ENABLES (jsc#PED-7167).
- x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub (jsc#PED-7167).
- x86/tdx: Refactor try_accept_one() (jsc#PED-7167).
- x86/tdx: Relax SEPT_VE_DISABLE check for debug TD (jsc#PED-7167).
- x86/tdx: Use ReportFatalError to report missing SEPT_VE_DISABLE (jsc#PED-7167).
- x86/tsc: Add option to force frequency recalibration with HW timer (bsc#1215885 bsc#1217217).
- x86/tsc: Be consistent about use_tsc_delay() (bsc#1215885 bsc#1217217).
- x86/tsc: Extend watchdog check exemption to 4-Sockets platform (bsc#1215885 bsc#1217217).
- x86/unwind/orc: Unwind ftrace trampolines with correct ORC entry (git-fixes).
- xfs: Rename __xfs_attr_rmtval_remove (git-fixes).
- xfs: Use kvcalloc() instead of kvzalloc() (git-fixes).
- xfs: aborting inodes on shutdown may need buffer lock (git-fixes).
- xfs: add selinux labels to whiteout inodes (git-fixes).
- xfs: clean up '%Ld/%Lu' which does not meet C standard (git-fixes).
- xfs: convert flex-array declarations in struct xfs_attrlist* (git-fixes).
- xfs: convert flex-array declarations in xfs attr leaf blocks (git-fixes).
- xfs: convert flex-array declarations in xfs attr shortform objects (git-fixes).
- xfs: decode scrub flags in ftrace output (git-fixes).
- xfs: dump log intent items that cannot be recovered due to corruption (git-fixes).
- xfs: fix a bug in the online fsck directory leaf1 bestcount check (git-fixes).
- xfs: fix agf_fllast when repairing an empty AGFL (git-fixes).
- xfs: fix incorrect unit conversion in scrub tracepoint (git-fixes).
- xfs: fix silly whitespace problems with kernel libxfs (git-fixes).
- xfs: fix uninit warning in xfs_growfs_data (git-fixes).
- xfs: fix units conversion error in xfs_bmap_del_extent_delay (git-fixes).
- xfs: make sure maxlen is still congruent with prod when rounding down (git-fixes).
- xfs: remove kmem_alloc_io() (git-fixes).
- xfs: remove the xfs_dinode_t typedef (git-fixes).
- xfs: remove the xfs_dqblk_t typedef (git-fixes).
- xfs: remove the xfs_dsb_t typedef (git-fixes).
- xfs: rename xfs_has_attr() (git-fixes).
- xfs: replace snprintf in show functions with sysfs_emit (git-fixes).
- xfs: return EINTR when a fatal signal terminates scrub (git-fixes).
- xfs: sb verifier does not handle uncached sb buffer (git-fixes).
- xfs: simplify two-level sysctl registration for xfs_table (git-fixes).
- xfs: sysfs: use default_groups in kobj_type (git-fixes).
- xfs: use swap() to make dabtree code cleaner (git-fixes).
- xhci: Clear EHB bit only at end of interrupt handler (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-18"/>
	<updated date="2024-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1108281">SUSE bug 1108281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183045">SUSE bug 1183045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211162">SUSE bug 1211162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211226">SUSE bug 1211226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212139">SUSE bug 1212139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212584">SUSE bug 1212584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214117">SUSE bug 1214117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214747">SUSE bug 1214747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214823">SUSE bug 1214823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215237">SUSE bug 1215237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215696">SUSE bug 1215696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215885">SUSE bug 1215885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215952">SUSE bug 1215952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216032">SUSE bug 1216032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216057">SUSE bug 1216057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216559">SUSE bug 1216559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216776">SUSE bug 1216776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217036">SUSE bug 1217036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217217">SUSE bug 1217217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217250">SUSE bug 1217250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217602">SUSE bug 1217602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217692">SUSE bug 1217692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217790">SUSE bug 1217790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217801">SUSE bug 1217801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217822">SUSE bug 1217822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217927">SUSE bug 1217927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217933">SUSE bug 1217933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217938">SUSE bug 1217938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217946">SUSE bug 1217946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217947">SUSE bug 1217947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217980">SUSE bug 1217980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217981">SUSE bug 1217981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217982">SUSE bug 1217982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218056">SUSE bug 1218056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218092">SUSE bug 1218092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218139">SUSE bug 1218139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218184">SUSE bug 1218184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218229">SUSE bug 1218229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218234">SUSE bug 1218234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218253">SUSE bug 1218253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218258">SUSE bug 1218258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218335">SUSE bug 1218335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218357">SUSE bug 1218357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218397">SUSE bug 1218397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218447">SUSE bug 1218447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218461">SUSE bug 1218461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218515">SUSE bug 1218515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218559">SUSE bug 1218559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218569">SUSE bug 1218569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218643">SUSE bug 1218643</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26555/">CVE-2020-26555 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26555">CVE-2020-26555 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51779/">CVE-2023-51779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51779">CVE-2023-51779 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-6121/">CVE-2023-6121 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6121">CVE-2023-6121 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6531/">CVE-2023-6531 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6531">CVE-2023-6531 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6546/">CVE-2023-6546 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6546">CVE-2023-6546 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6606/">CVE-2023-6606 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6606">CVE-2023-6606 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6610/">CVE-2023-6610 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6610">CVE-2023-6610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6622/">CVE-2023-6622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6622">CVE-2023-6622 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6931/">CVE-2023-6931 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6931">CVE-2023-6931 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6932/">CVE-2023-6932 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6932">CVE-2023-6932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009819766" comment="cluster-md-kmp-azure-5.14.21-150500.33.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819767" comment="dlm-kmp-azure-5.14.21-150500.33.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819768" comment="gfs2-kmp-azure-5.14.21-150500.33.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819769" comment="kernel-azure-5.14.21-150500.33.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819770" comment="kernel-azure-devel-5.14.21-150500.33.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819771" comment="kernel-azure-extra-5.14.21-150500.33.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819772" comment="kernel-azure-livepatch-devel-5.14.21-150500.33.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819773" comment="kernel-azure-optional-5.14.21-150500.33.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819774" comment="kernel-azure-vdso-5.14.21-150500.33.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819775" comment="kernel-devel-azure-5.14.21-150500.33.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819776" comment="kernel-source-azure-5.14.21-150500.33.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819777" comment="kernel-syms-azure-5.14.21-150500.33.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819778" comment="kselftests-kmp-azure-5.14.21-150500.33.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819779" comment="ocfs2-kmp-azure-5.14.21-150500.33.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819780" comment="reiserfs-kmp-azure-5.14.21-150500.33.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4672" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222535" ref_url="https://bugzilla.suse.com/1222535" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2609" ref_url="https://www.suse.com/security/cve/CVE-2024-2609/" source="CVE"/>
		<reference ref_id="CVE-2024-3302" ref_url="https://www.suse.com/security/cve/CVE-2024-3302/" source="CVE"/>
		<reference ref_id="CVE-2024-3852" ref_url="https://www.suse.com/security/cve/CVE-2024-3852/" source="CVE"/>
		<reference ref_id="CVE-2024-3854" ref_url="https://www.suse.com/security/cve/CVE-2024-3854/" source="CVE"/>
		<reference ref_id="CVE-2024-3857" ref_url="https://www.suse.com/security/cve/CVE-2024-3857/" source="CVE"/>
		<reference ref_id="CVE-2024-3859" ref_url="https://www.suse.com/security/cve/CVE-2024-3859/" source="CVE"/>
		<reference ref_id="CVE-2024-3861" ref_url="https://www.suse.com/security/cve/CVE-2024-3861/" source="CVE"/>
		<reference ref_id="CVE-2024-3863" ref_url="https://www.suse.com/security/cve/CVE-2024-3863/" source="CVE"/>
		<reference ref_id="CVE-2024-3864" ref_url="https://www.suse.com/security/cve/CVE-2024-3864/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035096.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Update to Mozilla Thunderbird 115.10.1

Security fixes (MFSA 2024-20) (bsc#1222535):

- CVE-2024-3852: GetBoundName in the JIT returned the wrong object (bmo#1883542) 
- CVE-2024-3854: Out-of-bounds-read after mis-optimized switch statement (bmo#1884552) 
- CVE-2024-3857: Incorrect JITting of arguments led to use-after-free during garbage collection (bmo#1886683) 
- CVE-2024-2609: Permission prompt input delay could expire when not in focus (bmo#1866100) 
- CVE-2024-3859: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer (bmo#1874489) 
- CVE-2024-3861: Potential use-after-free due to AlignedBuffer self-move (bmo#1883158) 
- CVE-2024-3863: Download Protections were bypassed by .xrm-ms files on Windows (bmo#1885855) 
- CVE-2024-3302: Denial of Service using HTTP/2 CONTINUATION frames (bmo#1881183, https://kb.cert.org/vuls/id/421644)
- CVE-2024-3864: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10 (bmo#1888333)

Other Fixes:
  * fixed: Thunderbird processes did not exit cleanly; user
    intervention was required via task manager (bmo#1891889)
  * unresolved: After changing password on an IMAP account, the
    account could become locked due to too many failed login
    attempts (bmo#1862111)
  * fixed: Creating a tag in General Settings with a number as
    the tag name did not work (bmo#1881124)
  * fixed: Quick Filter button selections did not persist after
    restart (bmo#1847265)
  * fixed: Collapsing and expanding message list headers
    sometimes caused header to scroll out of view (bmo#1862197)
  * fixed: Single message with no children inside a parent thread
    sometimes displayed incorrectly as a thread with a duplicate
    of itself as its child (bmo#1427546)
  * fixed: 'Get selected messages' menu items did not work
    (bmo#1867091)
  * fixed: 'Download and Sync Messages' dialog was too short when
    using Russian locale, obscuring OK button (bmo#1881795)
  * fixed: After changing password on an IMAP account, the
    account could become locked due to too many failed login
    attempts (bmo#1862111)
  * fixed: Retrieving multiline POP3 message from server failed
    if message chunk ended in newline instead of carriage return
    and newline (bmo#1883760)
  * fixed: IMAP, POP3, and SMTP Exchange autoconfiguration did
    not support encryption configuration (bmo#1876992)
  * fixed: Non-empty address book search bar interfered with
    displaying/editing contacts (bmo#1833031)
  * fixed: Deleting attendees from 'Invite Attendees' view
    removed attendees from view, but not from invite
    (bmo#1874450)
  * fixed: Splitter arrow between task list and task description
    did not behave as expected (bmo#1889562)
  * fixed: Performance improvements and code cleanup
    (bmo#1878257,bmo#1883550)
  * fixed: Security fixes
  * unresolved: Thunderbird processes did not exit cleanly; user
    intervention was required via task manager (bmo#1891889)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-25"/>
	<updated date="2024-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222535">SUSE bug 1222535</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2609/">CVE-2024-2609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2609">CVE-2024-2609 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-3302/">CVE-2024-3302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3302">CVE-2024-3302 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3852/">CVE-2024-3852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3852">CVE-2024-3852 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3854/">CVE-2024-3854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3854">CVE-2024-3854 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3857/">CVE-2024-3857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3857">CVE-2024-3857 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3859/">CVE-2024-3859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3859">CVE-2024-3859 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3861/">CVE-2024-3861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3861">CVE-2024-3861 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-3863/">CVE-2024-3863 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3863">CVE-2024-3863 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3864/">CVE-2024-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3864">CVE-2024-3864 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009857740" comment="MozillaThunderbird-115.10.1-150200.8.157.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857741" comment="MozillaThunderbird-translations-common-115.10.1-150200.8.157.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857742" comment="MozillaThunderbird-translations-other-115.10.1-150200.8.157.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4673" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213269" ref_url="https://bugzilla.suse.com/1213269" source="BUGZILLA"/>
		<reference ref_id="1218889" ref_url="https://bugzilla.suse.com/1218889" source="BUGZILLA"/>
		<reference ref_id="1222843" ref_url="https://bugzilla.suse.com/1222843" source="BUGZILLA"/>
		<reference ref_id="1222845" ref_url="https://bugzilla.suse.com/1222845" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3019" ref_url="https://www.suse.com/security/cve/CVE-2023-3019/" source="CVE"/>
		<reference ref_id="CVE-2023-6683" ref_url="https://www.suse.com/security/cve/CVE-2023-6683/" source="CVE"/>
		<reference ref_id="CVE-2024-3446" ref_url="https://www.suse.com/security/cve/CVE-2024-3446/" source="CVE"/>
		<reference ref_id="CVE-2024-3447" ref_url="https://www.suse.com/security/cve/CVE-2024-3447/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1438-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035105.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2024-3447: Fixed heap buffer overflow in sdhci_write_dataport() (bsc#1222845)         
- CVE-2023-6683: Fixed NULL pointer dereference in qemu_clipboard_request() (bsc#1218889)   
- CVE-2024-3446: Fixed DMA reentrancy issue leads to double free vulnerability (bsc#1222843)
- CVE-2023-3019: Fixed heap use-after-free in e1000e_write_packet_to_guest() (bsc#1213269)  
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-25"/>
	<updated date="2024-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1213269">SUSE bug 1213269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218889">SUSE bug 1218889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222843">SUSE bug 1222843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222845">SUSE bug 1222845</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3019/">CVE-2023-3019 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3019">CVE-2023-3019 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6683/">CVE-2023-6683 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6683">CVE-2023-6683 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3446/">CVE-2024-3446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3446">CVE-2024-3446 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3447/">CVE-2024-3447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3447">CVE-2024-3447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009857743" comment="qemu-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857744" comment="qemu-SLOF-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857745" comment="qemu-accel-qtest-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857746" comment="qemu-accel-tcg-x86-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857747" comment="qemu-arm-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857748" comment="qemu-audio-alsa-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857749" comment="qemu-audio-dbus-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857750" comment="qemu-audio-jack-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857751" comment="qemu-audio-pa-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857752" comment="qemu-audio-spice-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857753" comment="qemu-block-curl-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857754" comment="qemu-block-dmg-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857755" comment="qemu-block-gluster-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857756" comment="qemu-block-iscsi-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857757" comment="qemu-block-nfs-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857758" comment="qemu-block-rbd-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857759" comment="qemu-block-ssh-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857760" comment="qemu-chardev-baum-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857761" comment="qemu-chardev-spice-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857762" comment="qemu-extra-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857763" comment="qemu-guest-agent-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857764" comment="qemu-hw-display-qxl-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857765" comment="qemu-hw-display-virtio-gpu-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857766" comment="qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857767" comment="qemu-hw-display-virtio-vga-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857768" comment="qemu-hw-s390x-virtio-gpu-ccw-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857769" comment="qemu-hw-usb-host-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857770" comment="qemu-hw-usb-redirect-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857771" comment="qemu-hw-usb-smartcard-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857772" comment="qemu-ipxe-1.0.0+-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857773" comment="qemu-ivshmem-tools-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857774" comment="qemu-ksm-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857775" comment="qemu-kvm-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857776" comment="qemu-lang-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857777" comment="qemu-microvm-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857778" comment="qemu-ppc-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857779" comment="qemu-s390x-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857780" comment="qemu-seabios-1.16.0_0_gd239552-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857781" comment="qemu-sgabios-8-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857782" comment="qemu-skiboot-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857783" comment="qemu-tools-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857784" comment="qemu-ui-curses-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857785" comment="qemu-ui-dbus-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857786" comment="qemu-ui-gtk-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857787" comment="qemu-ui-opengl-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857788" comment="qemu-ui-spice-app-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857789" comment="qemu-ui-spice-core-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857790" comment="qemu-vgabios-1.16.0_0_gd239552-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857791" comment="qemu-vhost-user-gpu-7.1.0-150500.49.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857792" comment="qemu-x86-7.1.0-150500.49.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4674" version="1" class="patch">
	<metadata>
		<title>Security update for python-idna (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222842" ref_url="https://bugzilla.suse.com/1222842" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-3651" ref_url="https://www.suse.com/security/cve/CVE-2024-3651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1439-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035104.html" source="SUSE-SU"/>
		<description>
This update for python-idna fixes the following issues:

- CVE-2024-3651: Fixed potential DoS via resource consumption via specially crafted inputs to idna.encode() (bsc#1222842).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-25"/>
	<updated date="2024-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1222842">SUSE bug 1222842</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3651/">CVE-2024-3651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3651">CVE-2024-3651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857793" comment="python3-idna-2.6-150000.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4675" version="1" class="patch">
	<metadata>
		<title>Security update for python-gunicorn (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222950" ref_url="https://bugzilla.suse.com/1222950" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-1135" ref_url="https://www.suse.com/security/cve/CVE-2024-1135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1440-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035103.html" source="SUSE-SU"/>
		<description>
This update for python-gunicorn fixes the following issues:

- CVE-2024-1135: Fixed HTTP Request Smuggling (bsc#1222950)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-26"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222950">SUSE bug 1222950</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-1135/">CVE-2024-1135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1135">CVE-2024-1135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857888" comment="python311-gunicorn-20.1.0-150400.12.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4676" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222857" ref_url="https://bugzilla.suse.com/1222857" source="BUGZILLA"/>
		<reference ref_id="1222858" ref_url="https://bugzilla.suse.com/1222858" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2756" ref_url="https://www.suse.com/security/cve/CVE-2024-2756/" source="CVE"/>
		<reference ref_id="CVE-2024-3096" ref_url="https://www.suse.com/security/cve/CVE-2024-3096/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035099.html" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2024-2756: Fixed bypass of security fix applied for CVE-2022-31629 that lead PHP to consider not secure cookies as secure (bsc#1222857)
- CVE-2024-3096: Fixed bypass on null byte leading passwords checked via password_verify (bsc#1222858)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-26"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1222857">SUSE bug 1222857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222858">SUSE bug 1222858</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-2756/">CVE-2024-2756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2756">CVE-2024-2756 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3096/">CVE-2024-3096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3096">CVE-2024-3096 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009857889" comment="apache2-mod_php7-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857890" comment="php7-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857891" comment="php7-bcmath-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857892" comment="php7-bz2-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857893" comment="php7-calendar-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857894" comment="php7-cli-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857895" comment="php7-ctype-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857896" comment="php7-curl-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857897" comment="php7-dba-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857898" comment="php7-devel-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857899" comment="php7-dom-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857900" comment="php7-embed-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857901" comment="php7-enchant-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857902" comment="php7-exif-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857903" comment="php7-fastcgi-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857904" comment="php7-fileinfo-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857905" comment="php7-fpm-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857906" comment="php7-ftp-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857907" comment="php7-gd-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857908" comment="php7-gettext-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857909" comment="php7-gmp-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857910" comment="php7-iconv-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857911" comment="php7-intl-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857912" comment="php7-json-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857913" comment="php7-ldap-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857914" comment="php7-mbstring-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857915" comment="php7-mysql-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857916" comment="php7-odbc-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857917" comment="php7-opcache-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857918" comment="php7-openssl-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857919" comment="php7-pcntl-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857920" comment="php7-pdo-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857921" comment="php7-pgsql-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857922" comment="php7-phar-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857923" comment="php7-posix-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857924" comment="php7-readline-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857925" comment="php7-shmop-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857926" comment="php7-snmp-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857927" comment="php7-soap-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857928" comment="php7-sockets-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857929" comment="php7-sodium-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857930" comment="php7-sqlite-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857931" comment="php7-sysvmsg-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857932" comment="php7-sysvsem-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857933" comment="php7-sysvshm-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857934" comment="php7-test-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857935" comment="php7-tidy-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857936" comment="php7-tokenizer-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857937" comment="php7-xmlreader-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857938" comment="php7-xmlrpc-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857939" comment="php7-xmlwriter-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857940" comment="php7-xsl-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857941" comment="php7-zip-7.4.33-150400.4.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857942" comment="php7-zlib-7.4.33-150400.4.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4677" version="1" class="patch">
	<metadata>
		<title>Security update for php8 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222857" ref_url="https://bugzilla.suse.com/1222857" source="BUGZILLA"/>
		<reference ref_id="1222858" ref_url="https://bugzilla.suse.com/1222858" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2756" ref_url="https://www.suse.com/security/cve/CVE-2024-2756/" source="CVE"/>
		<reference ref_id="CVE-2024-3096" ref_url="https://www.suse.com/security/cve/CVE-2024-3096/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018424.html" source="SUSE-SU"/>
		<description>
This update for php8 fixes the following issues:

- CVE-2024-2756: Fixed bypass of security fix applied for CVE-2022-31629 that lead PHP to consider not secure cookies as secure (bsc#1222857)
- CVE-2024-3096: Fixed bypass on null byte leading passwords checked via password_verify (bsc#1222858)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-26"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1222857">SUSE bug 1222857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222858">SUSE bug 1222858</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-2756/">CVE-2024-2756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2756">CVE-2024-2756 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3096/">CVE-2024-3096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3096">CVE-2024-3096 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009857943" comment="apache2-mod_php8-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857944" comment="php8-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857945" comment="php8-bcmath-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857946" comment="php8-bz2-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857947" comment="php8-calendar-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857948" comment="php8-cli-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857949" comment="php8-ctype-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857950" comment="php8-curl-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857951" comment="php8-dba-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857952" comment="php8-devel-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857953" comment="php8-dom-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857954" comment="php8-embed-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857955" comment="php8-enchant-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857956" comment="php8-exif-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857957" comment="php8-fastcgi-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857958" comment="php8-fileinfo-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857959" comment="php8-fpm-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857960" comment="php8-ftp-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857961" comment="php8-gd-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857962" comment="php8-gettext-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857963" comment="php8-gmp-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857964" comment="php8-iconv-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857965" comment="php8-intl-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857966" comment="php8-ldap-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857967" comment="php8-mbstring-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857968" comment="php8-mysql-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857969" comment="php8-odbc-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857970" comment="php8-opcache-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857971" comment="php8-openssl-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857972" comment="php8-pcntl-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857973" comment="php8-pdo-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857974" comment="php8-pgsql-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857975" comment="php8-phar-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857976" comment="php8-posix-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857977" comment="php8-readline-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857978" comment="php8-shmop-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857979" comment="php8-snmp-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857980" comment="php8-soap-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857981" comment="php8-sockets-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857982" comment="php8-sodium-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857983" comment="php8-sqlite-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857984" comment="php8-sysvmsg-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857985" comment="php8-sysvsem-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857986" comment="php8-sysvshm-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857987" comment="php8-test-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857988" comment="php8-tidy-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857989" comment="php8-tokenizer-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857990" comment="php8-xmlreader-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857991" comment="php8-xmlwriter-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857992" comment="php8-xsl-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857993" comment="php8-zip-8.0.30-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857994" comment="php8-zlib-8.0.30-150400.4.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4678" version="1" class="patch">
	<metadata>
		<title>Security update for openCryptoki (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219217" ref_url="https://bugzilla.suse.com/1219217" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0914" ref_url="https://www.suse.com/security/cve/CVE-2024-0914/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018430.html" source="SUSE-SU"/>
		<description>
This update for openCryptoki fixes the following issues:

Upgrade openCryptoki to version 3.23 (jsc#PED-3360, jsc#PED-3361)

* EP11: Add support for FIPS-session mode
* CVE-2024-0914: Updates to harden against RSA timing attacks (bsc#1219217)
* Bug fixes

- provide user(pkcs11) and group(pkcs11)

Upgrade to version 3.22 (jsc#PED-3361)

- CCA: Add support for the AES-XTS key type using CPACF protected keys
- p11sak: Add support for managing certificate objects
- p11sak: Add support for public sessions (no-login option)
- p11sak: Add support for logging in as SO (security Officer)
- p11sak: Add support for importing/exporting Edwards and Montgomery keys
- p11sak: Add support for importing of RSA-PSS keys and certificates
- CCA/EP11/Soft/ICA: Ensure that the 2 key parts of an AES-XTS key are different

Update to version 3.21 (jsc#PED-3360, jsc#PED-3361)

- EP11 and CCA: Support concurrent HSM master key changes
- CCA: protected-key option
- pkcsslotd: no longer run as root user and further hardening
- p11sak: Add support for additional key types (DH, DSA, generic secret)
- p11sak: Allow wildcards in label filter
- p11sak: Allow to specify hex value for CKA_ID attribute
- p11sak: Support sorting when listing keys
- p11sak: New commands: set-key-attr, copy-key to modify and copy keys
- p11sak: New commands: import-key, export-key to import and export keys
- Remove support for --disable-locks (transactional memory)
- Updates to harden against RSA timing attacks
- Bug fixes
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-26"/>
	<updated date="2024-04-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219217">SUSE bug 1219217</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-0914/">CVE-2024-0914 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0914">CVE-2024-0914 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009857995" comment="openCryptoki-3.23.0-150500.3.3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857996" comment="openCryptoki-64bit-3.23.0-150500.3.3.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009857997" comment="openCryptoki-devel-3.23.0-150500.3.3.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4679" version="1" class="patch">
	<metadata>
		<title>Feature update for python-M2Crypto (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1205042" ref_url="https://bugzilla.suse.com/1205042" source="BUGZILLA"/>
		<reference ref_id="1212757" ref_url="https://bugzilla.suse.com/1212757" source="BUGZILLA"/>
		<reference ref_id="1217782" ref_url="https://bugzilla.suse.com/1217782" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25657" ref_url="https://www.suse.com/security/cve/CVE-2020-25657/" source="CVE"/>
		<reference ref_id="SUSE-FU-2024:1448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035107.html" source="SUSE-SU"/>
		<description>
This update for python-M2Crypto fixes the following issue:

- Build for modern python stack
- Adds python311-M2Crypto
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-26"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1205042">SUSE bug 1205042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212757">SUSE bug 1212757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217782">SUSE bug 1217782</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25657/">CVE-2020-25657 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-25657">CVE-2020-25657 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858075" comment="python-M2Crypto-doc-0.40.0-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858076" comment="python311-M2Crypto-0.40.0-150400.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4680" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213470" ref_url="https://bugzilla.suse.com/1213470" source="BUGZILLA"/>
		<reference ref_id="1222979" ref_url="https://bugzilla.suse.com/1222979" source="BUGZILLA"/>
		<reference ref_id="1222983" ref_url="https://bugzilla.suse.com/1222983" source="BUGZILLA"/>
		<reference ref_id="1222984" ref_url="https://bugzilla.suse.com/1222984" source="BUGZILLA"/>
		<reference ref_id="1222986" ref_url="https://bugzilla.suse.com/1222986" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011/" source="CVE"/>
		<reference ref_id="CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068/" source="CVE"/>
		<reference ref_id="CVE-2024-21085" ref_url="https://www.suse.com/security/cve/CVE-2024-21085/" source="CVE"/>
		<reference ref_id="CVE-2024-21094" ref_url="https://www.suse.com/security/cve/CVE-2024-21094/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1451-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035112.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- CVE-2024-21011: Fixed denial of service due to long Exception message logging (JDK-8319851,bsc#1222979)
- CVE-2024-21068: Fixed integer overflow in C1 compiler address generation (JDK-8322122,bsc#1222983)
- CVE-2024-21085: Fixed Pack200 excessive memory allocation (JDK-8322114,bsc#1222984)
- CVE-2024-21094: Fixed unauthorized data modification due to C2 compilation failure with 'Exceeded _node_regs array' (JDK-8317507,JDK-8325348,bsc#1222986)

Other fixes:
- Update to version jdk8u412 (icedtea-3.31.0) (April 2024 CPU)
  * Security fixes
    + JDK-8318340: Improve RSA key implementations
  * Import of OpenJDK 8 u412 build 08
    + JDK-8011180: Delete obsolete scripts
    + JDK-8016451: Scary messages emitted by
      build.tools.generatenimbus.PainterGenerator during build
    + JDK-8021961: setAlwaysOnTop doesn't behave correctly in
      Linux/Solaris under certain scenarios
    + JDK-8023735: [TESTBUG][macosx]
      runtime/XCheckJniJsig/XCheckJSig.java fails on MacOS X
    + JDK-8074860: Structured Exception Catcher missing around
      CreateJavaVM on Windows
    + JDK-8079441: Intermittent failures on Windows with 'Unexpected
      exit from test [exit code: 1080890248]' (0x406d1388)
    + JDK-8155590: Dubious collection management in
      sun.net.www.http.KeepAliveCache
    + JDK-8168518: rcache interop with krb5-1.15
    + JDK-8183503: Update hotspot tests to allow for unique test
      classes directory
    + JDK-8186095: upgrade to jtreg 4.2 b08
    + JDK-8186199: [windows] JNI_DestroyJavaVM not covered by SEH
    + JDK-8192931: Regression test
      java/awt/font/TextLayout/CombiningPerf.java fails
    + JDK-8208655: use JTreg skipped status in hotspot tests
    + JDK-8208701: Fix for JDK-8208655 causes test failures in CI
      tier1
    + JDK-8208706: compiler/tiered/
      /ConstantGettersTransitionsTest.java fails to compile
    + JDK-8213410: UseCompressedOops requirement check fails fails
      on 32-bit system
    + JDK-8222323: ChildAlwaysOnTopTest.java fails with
      'RuntimeException: Failed to unset alwaysOnTop'
    + JDK-8224768: Test ActalisCA.java fails
    + JDK-8251155: HostIdentifier fails to canonicalize hostnames
      starting with digits
    + JDK-8251551: Use .md filename extension for README
    + JDK-8268678: LetsEncryptCA.java test fails as Let’s Encrypt
      Authority X3 is retired
    + JDK-8270280: security/infra/java/security/cert/
      /CertPathValidator/certification/LetsEncryptCA.java OCSP
      response error
    + JDK-8270517: Add Zero support for LoongArch
    + JDK-8272708: [Test]: Cleanup: test/jdk/security/infra/java/
      /security/cert/CertPathValidator/certification/BuypassCA.java
      no longer needs ocspEnabled
    + JDK-8276139: TestJpsHostName.java not reliable, better to
      expand HostIdentifierCreate.java test
    + JDK-8288132: Update test artifacts in QuoVadis CA interop
      tests
    + JDK-8297955: LDAP CertStore should use LdapName and not
      String for DNs
    + JDK-8301310: The SendRawSysexMessage test may cause a JVM
      crash
    + JDK-8308592: Framework for CA interoperability testing
    + JDK-8312126: NullPointerException in CertStore.getCRLs after
      8297955
    + JDK-8315042: NPE in PKCS7.parseOldSignedData
    + JDK-8315757: [8u] Add cacerts JTREG tests to GHA tier1 test
      set
    + JDK-8320713: Bump update version of OpenJDK: 8u412
    + JDK-8321060: [8u] hotspot needs to recognise VS2022
    + JDK-8321408: Add Certainly roots R1 and E1
    + JDK-8322725: (tz) Update Timezone Data to 2023d
    + JDK-8322750: Test 'api/java_awt/interactive/
      /SystemTrayTests.html' failed because A blue ball icon is
      added outside of the system tray
    + JDK-8323202: [8u] Remove get_source.sh and hgforest.sh
    + JDK-8323640: [TESTBUG]testMemoryFailCount in jdk/internal/
      /platform/docker/TestDockerMemoryMetrics.java always fail
      because OOM killed
    + JDK-8324530: Build error with gcc 10
    + JDK-8325150: (tz) Update Timezone Data to 2024a
  * Bug fixes
    + Support make 4.4

- Do not recommend timezone-java8 (bsc#1213470)

- Use %patch -P N instead of deprecated %patchN.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-26"/>
	<updated date="2024-04-26"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1213470">SUSE bug 1213470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222979">SUSE bug 1222979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222983">SUSE bug 1222983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222984">SUSE bug 1222984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222986">SUSE bug 1222986</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21085/">CVE-2024-21085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21085">CVE-2024-21085 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21094/">CVE-2024-21094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21094">CVE-2024-21094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858077" comment="java-1_8_0-openjdk-1.8.0.412-150000.3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858078" comment="java-1_8_0-openjdk-accessibility-1.8.0.412-150000.3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858079" comment="java-1_8_0-openjdk-demo-1.8.0.412-150000.3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858080" comment="java-1_8_0-openjdk-devel-1.8.0.412-150000.3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858081" comment="java-1_8_0-openjdk-headless-1.8.0.412-150000.3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858082" comment="java-1_8_0-openjdk-javadoc-1.8.0.412-150000.3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858083" comment="java-1_8_0-openjdk-src-1.8.0.412-150000.3.91.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4681" version="1" class="patch">
	<metadata>
		<title>Security update for frr (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220548" ref_url="https://bugzilla.suse.com/1220548" source="BUGZILLA"/>
		<reference ref_id="1222518" ref_url="https://bugzilla.suse.com/1222518" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-27913" ref_url="https://www.suse.com/security/cve/CVE-2024-27913/" source="CVE"/>
		<reference ref_id="CVE-2024-31948" ref_url="https://www.suse.com/security/cve/CVE-2024-31948/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1453-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035110.html" source="SUSE-SU"/>
		<description>
This update for frr fixes the following issues:

- CVE-2024-27913: Fixed a denial of service issue via a malformed OSPF LSA packet (bsc#1220548).
- CVE-2024-31948: Fixed denial of service due to malformed Prefix SID attribute in BGP Update packet (bsc#1222518).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-26"/>
	<updated date="2024-04-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220548">SUSE bug 1220548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222518">SUSE bug 1222518</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27913/">CVE-2024-27913 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27913">CVE-2024-27913 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31948/">CVE-2024-31948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31948">CVE-2024-31948 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858084" comment="frr-8.4-150500.4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858085" comment="frr-devel-8.4-150500.4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858086" comment="libfrr0-8.4-150500.4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858087" comment="libfrr_pb0-8.4-150500.4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858088" comment="libfrrcares0-8.4-150500.4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858089" comment="libfrrfpm_pb0-8.4-150500.4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858090" comment="libfrrospfapiclient0-8.4-150500.4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858091" comment="libfrrsnmp0-8.4-150500.4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858092" comment="libfrrzmq0-8.4-150500.4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858093" comment="libmlag_pb0-8.4-150500.4.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4682" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223155" ref_url="https://bugzilla.suse.com/1223155" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-31744" ref_url="https://www.suse.com/security/cve/CVE-2024-31744/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019274.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2024-31744: Fixed denial of service through assertion failure in jpc_streamlist_remove() (bsc#1223155).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-29"/>
	<updated date="2024-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223155">SUSE bug 1223155</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31744/">CVE-2024-31744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31744">CVE-2024-31744 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858167" comment="jasper-2.0.14-150000.3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858168" comment="libjasper-devel-2.0.14-150000.3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858169" comment="libjasper4-2.0.14-150000.3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858170" comment="libjasper4-32bit-2.0.14-150000.3.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4683" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1200465" ref_url="https://bugzilla.suse.com/1200465" source="BUGZILLA"/>
		<reference ref_id="1205316" ref_url="https://bugzilla.suse.com/1205316" source="BUGZILLA"/>
		<reference ref_id="1207948" ref_url="https://bugzilla.suse.com/1207948" source="BUGZILLA"/>
		<reference ref_id="1209635" ref_url="https://bugzilla.suse.com/1209635" source="BUGZILLA"/>
		<reference ref_id="1209657" ref_url="https://bugzilla.suse.com/1209657" source="BUGZILLA"/>
		<reference ref_id="1212514" ref_url="https://bugzilla.suse.com/1212514" source="BUGZILLA"/>
		<reference ref_id="1213456" ref_url="https://bugzilla.suse.com/1213456" source="BUGZILLA"/>
		<reference ref_id="1214852" ref_url="https://bugzilla.suse.com/1214852" source="BUGZILLA"/>
		<reference ref_id="1215221" ref_url="https://bugzilla.suse.com/1215221" source="BUGZILLA"/>
		<reference ref_id="1215322" ref_url="https://bugzilla.suse.com/1215322" source="BUGZILLA"/>
		<reference ref_id="1217339" ref_url="https://bugzilla.suse.com/1217339" source="BUGZILLA"/>
		<reference ref_id="1217829" ref_url="https://bugzilla.suse.com/1217829" source="BUGZILLA"/>
		<reference ref_id="1217959" ref_url="https://bugzilla.suse.com/1217959" source="BUGZILLA"/>
		<reference ref_id="1217987" ref_url="https://bugzilla.suse.com/1217987" source="BUGZILLA"/>
		<reference ref_id="1217988" ref_url="https://bugzilla.suse.com/1217988" source="BUGZILLA"/>
		<reference ref_id="1217989" ref_url="https://bugzilla.suse.com/1217989" source="BUGZILLA"/>
		<reference ref_id="1218321" ref_url="https://bugzilla.suse.com/1218321" source="BUGZILLA"/>
		<reference ref_id="1218336" ref_url="https://bugzilla.suse.com/1218336" source="BUGZILLA"/>
		<reference ref_id="1218479" ref_url="https://bugzilla.suse.com/1218479" source="BUGZILLA"/>
		<reference ref_id="1218562" ref_url="https://bugzilla.suse.com/1218562" source="BUGZILLA"/>
		<reference ref_id="1218643" ref_url="https://bugzilla.suse.com/1218643" source="BUGZILLA"/>
		<reference ref_id="1218777" ref_url="https://bugzilla.suse.com/1218777" source="BUGZILLA"/>
		<reference ref_id="1219169" ref_url="https://bugzilla.suse.com/1219169" source="BUGZILLA"/>
		<reference ref_id="1219170" ref_url="https://bugzilla.suse.com/1219170" source="BUGZILLA"/>
		<reference ref_id="1219264" ref_url="https://bugzilla.suse.com/1219264" source="BUGZILLA"/>
		<reference ref_id="1219834" ref_url="https://bugzilla.suse.com/1219834" source="BUGZILLA"/>
		<reference ref_id="1220114" ref_url="https://bugzilla.suse.com/1220114" source="BUGZILLA"/>
		<reference ref_id="1220176" ref_url="https://bugzilla.suse.com/1220176" source="BUGZILLA"/>
		<reference ref_id="1220237" ref_url="https://bugzilla.suse.com/1220237" source="BUGZILLA"/>
		<reference ref_id="1220251" ref_url="https://bugzilla.suse.com/1220251" source="BUGZILLA"/>
		<reference ref_id="1220320" ref_url="https://bugzilla.suse.com/1220320" source="BUGZILLA"/>
		<reference ref_id="1220325" ref_url="https://bugzilla.suse.com/1220325" source="BUGZILLA"/>
		<reference ref_id="1220328" ref_url="https://bugzilla.suse.com/1220328" source="BUGZILLA"/>
		<reference ref_id="1220337" ref_url="https://bugzilla.suse.com/1220337" source="BUGZILLA"/>
		<reference ref_id="1220340" ref_url="https://bugzilla.suse.com/1220340" source="BUGZILLA"/>
		<reference ref_id="1220365" ref_url="https://bugzilla.suse.com/1220365" source="BUGZILLA"/>
		<reference ref_id="1220366" ref_url="https://bugzilla.suse.com/1220366" source="BUGZILLA"/>
		<reference ref_id="1220398" ref_url="https://bugzilla.suse.com/1220398" source="BUGZILLA"/>
		<reference ref_id="1220411" ref_url="https://bugzilla.suse.com/1220411" source="BUGZILLA"/>
		<reference ref_id="1220413" ref_url="https://bugzilla.suse.com/1220413" source="BUGZILLA"/>
		<reference ref_id="1220433" ref_url="https://bugzilla.suse.com/1220433" source="BUGZILLA"/>
		<reference ref_id="1220439" ref_url="https://bugzilla.suse.com/1220439" source="BUGZILLA"/>
		<reference ref_id="1220443" ref_url="https://bugzilla.suse.com/1220443" source="BUGZILLA"/>
		<reference ref_id="1220445" ref_url="https://bugzilla.suse.com/1220445" source="BUGZILLA"/>
		<reference ref_id="1220466" ref_url="https://bugzilla.suse.com/1220466" source="BUGZILLA"/>
		<reference ref_id="1220469" ref_url="https://bugzilla.suse.com/1220469" source="BUGZILLA"/>
		<reference ref_id="1220478" ref_url="https://bugzilla.suse.com/1220478" source="BUGZILLA"/>
		<reference ref_id="1220482" ref_url="https://bugzilla.suse.com/1220482" source="BUGZILLA"/>
		<reference ref_id="1220484" ref_url="https://bugzilla.suse.com/1220484" source="BUGZILLA"/>
		<reference ref_id="1220486" ref_url="https://bugzilla.suse.com/1220486" source="BUGZILLA"/>
		<reference ref_id="1220487" ref_url="https://bugzilla.suse.com/1220487" source="BUGZILLA"/>
		<reference ref_id="1220492" ref_url="https://bugzilla.suse.com/1220492" source="BUGZILLA"/>
		<reference ref_id="1220703" ref_url="https://bugzilla.suse.com/1220703" source="BUGZILLA"/>
		<reference ref_id="1220735" ref_url="https://bugzilla.suse.com/1220735" source="BUGZILLA"/>
		<reference ref_id="1220736" ref_url="https://bugzilla.suse.com/1220736" source="BUGZILLA"/>
		<reference ref_id="1220775" ref_url="https://bugzilla.suse.com/1220775" source="BUGZILLA"/>
		<reference ref_id="1220790" ref_url="https://bugzilla.suse.com/1220790" source="BUGZILLA"/>
		<reference ref_id="1220797" ref_url="https://bugzilla.suse.com/1220797" source="BUGZILLA"/>
		<reference ref_id="1220831" ref_url="https://bugzilla.suse.com/1220831" source="BUGZILLA"/>
		<reference ref_id="1220833" ref_url="https://bugzilla.suse.com/1220833" source="BUGZILLA"/>
		<reference ref_id="1220836" ref_url="https://bugzilla.suse.com/1220836" source="BUGZILLA"/>
		<reference ref_id="1220839" ref_url="https://bugzilla.suse.com/1220839" source="BUGZILLA"/>
		<reference ref_id="1220840" ref_url="https://bugzilla.suse.com/1220840" source="BUGZILLA"/>
		<reference ref_id="1220843" ref_url="https://bugzilla.suse.com/1220843" source="BUGZILLA"/>
		<reference ref_id="1220845" ref_url="https://bugzilla.suse.com/1220845" source="BUGZILLA"/>
		<reference ref_id="1220848" ref_url="https://bugzilla.suse.com/1220848" source="BUGZILLA"/>
		<reference ref_id="1220870" ref_url="https://bugzilla.suse.com/1220870" source="BUGZILLA"/>
		<reference ref_id="1220871" ref_url="https://bugzilla.suse.com/1220871" source="BUGZILLA"/>
		<reference ref_id="1220872" ref_url="https://bugzilla.suse.com/1220872" source="BUGZILLA"/>
		<reference ref_id="1220878" ref_url="https://bugzilla.suse.com/1220878" source="BUGZILLA"/>
		<reference ref_id="1220879" ref_url="https://bugzilla.suse.com/1220879" source="BUGZILLA"/>
		<reference ref_id="1220883" ref_url="https://bugzilla.suse.com/1220883" source="BUGZILLA"/>
		<reference ref_id="1220885" ref_url="https://bugzilla.suse.com/1220885" source="BUGZILLA"/>
		<reference ref_id="1220887" ref_url="https://bugzilla.suse.com/1220887" source="BUGZILLA"/>
		<reference ref_id="1220898" ref_url="https://bugzilla.suse.com/1220898" source="BUGZILLA"/>
		<reference ref_id="1220917" ref_url="https://bugzilla.suse.com/1220917" source="BUGZILLA"/>
		<reference ref_id="1220918" ref_url="https://bugzilla.suse.com/1220918" source="BUGZILLA"/>
		<reference ref_id="1220920" ref_url="https://bugzilla.suse.com/1220920" source="BUGZILLA"/>
		<reference ref_id="1220921" ref_url="https://bugzilla.suse.com/1220921" source="BUGZILLA"/>
		<reference ref_id="1220926" ref_url="https://bugzilla.suse.com/1220926" source="BUGZILLA"/>
		<reference ref_id="1220927" ref_url="https://bugzilla.suse.com/1220927" source="BUGZILLA"/>
		<reference ref_id="1220929" ref_url="https://bugzilla.suse.com/1220929" source="BUGZILLA"/>
		<reference ref_id="1220930" ref_url="https://bugzilla.suse.com/1220930" source="BUGZILLA"/>
		<reference ref_id="1220931" ref_url="https://bugzilla.suse.com/1220931" source="BUGZILLA"/>
		<reference ref_id="1220932" ref_url="https://bugzilla.suse.com/1220932" source="BUGZILLA"/>
		<reference ref_id="1220933" ref_url="https://bugzilla.suse.com/1220933" source="BUGZILLA"/>
		<reference ref_id="1220937" ref_url="https://bugzilla.suse.com/1220937" source="BUGZILLA"/>
		<reference ref_id="1220938" ref_url="https://bugzilla.suse.com/1220938" source="BUGZILLA"/>
		<reference ref_id="1220940" ref_url="https://bugzilla.suse.com/1220940" source="BUGZILLA"/>
		<reference ref_id="1220954" ref_url="https://bugzilla.suse.com/1220954" source="BUGZILLA"/>
		<reference ref_id="1220955" ref_url="https://bugzilla.suse.com/1220955" source="BUGZILLA"/>
		<reference ref_id="1220959" ref_url="https://bugzilla.suse.com/1220959" source="BUGZILLA"/>
		<reference ref_id="1220960" ref_url="https://bugzilla.suse.com/1220960" source="BUGZILLA"/>
		<reference ref_id="1220961" ref_url="https://bugzilla.suse.com/1220961" source="BUGZILLA"/>
		<reference ref_id="1220965" ref_url="https://bugzilla.suse.com/1220965" source="BUGZILLA"/>
		<reference ref_id="1220969" ref_url="https://bugzilla.suse.com/1220969" source="BUGZILLA"/>
		<reference ref_id="1220978" ref_url="https://bugzilla.suse.com/1220978" source="BUGZILLA"/>
		<reference ref_id="1220979" ref_url="https://bugzilla.suse.com/1220979" source="BUGZILLA"/>
		<reference ref_id="1220981" ref_url="https://bugzilla.suse.com/1220981" source="BUGZILLA"/>
		<reference ref_id="1220982" ref_url="https://bugzilla.suse.com/1220982" source="BUGZILLA"/>
		<reference ref_id="1220983" ref_url="https://bugzilla.suse.com/1220983" source="BUGZILLA"/>
		<reference ref_id="1220985" ref_url="https://bugzilla.suse.com/1220985" source="BUGZILLA"/>
		<reference ref_id="1220986" ref_url="https://bugzilla.suse.com/1220986" source="BUGZILLA"/>
		<reference ref_id="1220987" ref_url="https://bugzilla.suse.com/1220987" source="BUGZILLA"/>
		<reference ref_id="1220989" ref_url="https://bugzilla.suse.com/1220989" source="BUGZILLA"/>
		<reference ref_id="1220990" ref_url="https://bugzilla.suse.com/1220990" source="BUGZILLA"/>
		<reference ref_id="1221009" ref_url="https://bugzilla.suse.com/1221009" source="BUGZILLA"/>
		<reference ref_id="1221012" ref_url="https://bugzilla.suse.com/1221012" source="BUGZILLA"/>
		<reference ref_id="1221015" ref_url="https://bugzilla.suse.com/1221015" source="BUGZILLA"/>
		<reference ref_id="1221022" ref_url="https://bugzilla.suse.com/1221022" source="BUGZILLA"/>
		<reference ref_id="1221039" ref_url="https://bugzilla.suse.com/1221039" source="BUGZILLA"/>
		<reference ref_id="1221040" ref_url="https://bugzilla.suse.com/1221040" source="BUGZILLA"/>
		<reference ref_id="1221044" ref_url="https://bugzilla.suse.com/1221044" source="BUGZILLA"/>
		<reference ref_id="1221045" ref_url="https://bugzilla.suse.com/1221045" source="BUGZILLA"/>
		<reference ref_id="1221046" ref_url="https://bugzilla.suse.com/1221046" source="BUGZILLA"/>
		<reference ref_id="1221048" ref_url="https://bugzilla.suse.com/1221048" source="BUGZILLA"/>
		<reference ref_id="1221055" ref_url="https://bugzilla.suse.com/1221055" source="BUGZILLA"/>
		<reference ref_id="1221056" ref_url="https://bugzilla.suse.com/1221056" source="BUGZILLA"/>
		<reference ref_id="1221058" ref_url="https://bugzilla.suse.com/1221058" source="BUGZILLA"/>
		<reference ref_id="1221060" ref_url="https://bugzilla.suse.com/1221060" source="BUGZILLA"/>
		<reference ref_id="1221061" ref_url="https://bugzilla.suse.com/1221061" source="BUGZILLA"/>
		<reference ref_id="1221062" ref_url="https://bugzilla.suse.com/1221062" source="BUGZILLA"/>
		<reference ref_id="1221066" ref_url="https://bugzilla.suse.com/1221066" source="BUGZILLA"/>
		<reference ref_id="1221067" ref_url="https://bugzilla.suse.com/1221067" source="BUGZILLA"/>
		<reference ref_id="1221068" ref_url="https://bugzilla.suse.com/1221068" source="BUGZILLA"/>
		<reference ref_id="1221069" ref_url="https://bugzilla.suse.com/1221069" source="BUGZILLA"/>
		<reference ref_id="1221070" ref_url="https://bugzilla.suse.com/1221070" source="BUGZILLA"/>
		<reference ref_id="1221071" ref_url="https://bugzilla.suse.com/1221071" source="BUGZILLA"/>
		<reference ref_id="1221077" ref_url="https://bugzilla.suse.com/1221077" source="BUGZILLA"/>
		<reference ref_id="1221082" ref_url="https://bugzilla.suse.com/1221082" source="BUGZILLA"/>
		<reference ref_id="1221090" ref_url="https://bugzilla.suse.com/1221090" source="BUGZILLA"/>
		<reference ref_id="1221097" ref_url="https://bugzilla.suse.com/1221097" source="BUGZILLA"/>
		<reference ref_id="1221156" ref_url="https://bugzilla.suse.com/1221156" source="BUGZILLA"/>
		<reference ref_id="1221252" ref_url="https://bugzilla.suse.com/1221252" source="BUGZILLA"/>
		<reference ref_id="1221273" ref_url="https://bugzilla.suse.com/1221273" source="BUGZILLA"/>
		<reference ref_id="1221274" ref_url="https://bugzilla.suse.com/1221274" source="BUGZILLA"/>
		<reference ref_id="1221276" ref_url="https://bugzilla.suse.com/1221276" source="BUGZILLA"/>
		<reference ref_id="1221277" ref_url="https://bugzilla.suse.com/1221277" source="BUGZILLA"/>
		<reference ref_id="1221291" ref_url="https://bugzilla.suse.com/1221291" source="BUGZILLA"/>
		<reference ref_id="1221293" ref_url="https://bugzilla.suse.com/1221293" source="BUGZILLA"/>
		<reference ref_id="1221298" ref_url="https://bugzilla.suse.com/1221298" source="BUGZILLA"/>
		<reference ref_id="1221337" ref_url="https://bugzilla.suse.com/1221337" source="BUGZILLA"/>
		<reference ref_id="1221338" ref_url="https://bugzilla.suse.com/1221338" source="BUGZILLA"/>
		<reference ref_id="1221375" ref_url="https://bugzilla.suse.com/1221375" source="BUGZILLA"/>
		<reference ref_id="1221379" ref_url="https://bugzilla.suse.com/1221379" source="BUGZILLA"/>
		<reference ref_id="1221551" ref_url="https://bugzilla.suse.com/1221551" source="BUGZILLA"/>
		<reference ref_id="1221553" ref_url="https://bugzilla.suse.com/1221553" source="BUGZILLA"/>
		<reference ref_id="1221613" ref_url="https://bugzilla.suse.com/1221613" source="BUGZILLA"/>
		<reference ref_id="1221614" ref_url="https://bugzilla.suse.com/1221614" source="BUGZILLA"/>
		<reference ref_id="1221616" ref_url="https://bugzilla.suse.com/1221616" source="BUGZILLA"/>
		<reference ref_id="1221618" ref_url="https://bugzilla.suse.com/1221618" source="BUGZILLA"/>
		<reference ref_id="1221631" ref_url="https://bugzilla.suse.com/1221631" source="BUGZILLA"/>
		<reference ref_id="1221633" ref_url="https://bugzilla.suse.com/1221633" source="BUGZILLA"/>
		<reference ref_id="1221713" ref_url="https://bugzilla.suse.com/1221713" source="BUGZILLA"/>
		<reference ref_id="1221725" ref_url="https://bugzilla.suse.com/1221725" source="BUGZILLA"/>
		<reference ref_id="1221777" ref_url="https://bugzilla.suse.com/1221777" source="BUGZILLA"/>
		<reference ref_id="1221814" ref_url="https://bugzilla.suse.com/1221814" source="BUGZILLA"/>
		<reference ref_id="1221816" ref_url="https://bugzilla.suse.com/1221816" source="BUGZILLA"/>
		<reference ref_id="1221830" ref_url="https://bugzilla.suse.com/1221830" source="BUGZILLA"/>
		<reference ref_id="1221951" ref_url="https://bugzilla.suse.com/1221951" source="BUGZILLA"/>
		<reference ref_id="1222033" ref_url="https://bugzilla.suse.com/1222033" source="BUGZILLA"/>
		<reference ref_id="1222056" ref_url="https://bugzilla.suse.com/1222056" source="BUGZILLA"/>
		<reference ref_id="1222060" ref_url="https://bugzilla.suse.com/1222060" source="BUGZILLA"/>
		<reference ref_id="1222070" ref_url="https://bugzilla.suse.com/1222070" source="BUGZILLA"/>
		<reference ref_id="1222073" ref_url="https://bugzilla.suse.com/1222073" source="BUGZILLA"/>
		<reference ref_id="1222117" ref_url="https://bugzilla.suse.com/1222117" source="BUGZILLA"/>
		<reference ref_id="1222274" ref_url="https://bugzilla.suse.com/1222274" source="BUGZILLA"/>
		<reference ref_id="1222291" ref_url="https://bugzilla.suse.com/1222291" source="BUGZILLA"/>
		<reference ref_id="1222300" ref_url="https://bugzilla.suse.com/1222300" source="BUGZILLA"/>
		<reference ref_id="1222304" ref_url="https://bugzilla.suse.com/1222304" source="BUGZILLA"/>
		<reference ref_id="1222317" ref_url="https://bugzilla.suse.com/1222317" source="BUGZILLA"/>
		<reference ref_id="1222331" ref_url="https://bugzilla.suse.com/1222331" source="BUGZILLA"/>
		<reference ref_id="1222355" ref_url="https://bugzilla.suse.com/1222355" source="BUGZILLA"/>
		<reference ref_id="1222356" ref_url="https://bugzilla.suse.com/1222356" source="BUGZILLA"/>
		<reference ref_id="1222360" ref_url="https://bugzilla.suse.com/1222360" source="BUGZILLA"/>
		<reference ref_id="1222366" ref_url="https://bugzilla.suse.com/1222366" source="BUGZILLA"/>
		<reference ref_id="1222373" ref_url="https://bugzilla.suse.com/1222373" source="BUGZILLA"/>
		<reference ref_id="1222619" ref_url="https://bugzilla.suse.com/1222619" source="BUGZILLA"/>
		<reference ref_id="1222952" ref_url="https://bugzilla.suse.com/1222952" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46925" ref_url="https://www.suse.com/security/cve/CVE-2021-46925/" source="CVE"/>
		<reference ref_id="CVE-2021-46926" ref_url="https://www.suse.com/security/cve/CVE-2021-46926/" source="CVE"/>
		<reference ref_id="CVE-2021-46927" ref_url="https://www.suse.com/security/cve/CVE-2021-46927/" source="CVE"/>
		<reference ref_id="CVE-2021-46929" ref_url="https://www.suse.com/security/cve/CVE-2021-46929/" source="CVE"/>
		<reference ref_id="CVE-2021-46930" ref_url="https://www.suse.com/security/cve/CVE-2021-46930/" source="CVE"/>
		<reference ref_id="CVE-2021-46931" ref_url="https://www.suse.com/security/cve/CVE-2021-46931/" source="CVE"/>
		<reference ref_id="CVE-2021-46933" ref_url="https://www.suse.com/security/cve/CVE-2021-46933/" source="CVE"/>
		<reference ref_id="CVE-2021-46934" ref_url="https://www.suse.com/security/cve/CVE-2021-46934/" source="CVE"/>
		<reference ref_id="CVE-2021-46936" ref_url="https://www.suse.com/security/cve/CVE-2021-46936/" source="CVE"/>
		<reference ref_id="CVE-2021-47082" ref_url="https://www.suse.com/security/cve/CVE-2021-47082/" source="CVE"/>
		<reference ref_id="CVE-2021-47083" ref_url="https://www.suse.com/security/cve/CVE-2021-47083/" source="CVE"/>
		<reference ref_id="CVE-2021-47087" ref_url="https://www.suse.com/security/cve/CVE-2021-47087/" source="CVE"/>
		<reference ref_id="CVE-2021-47091" ref_url="https://www.suse.com/security/cve/CVE-2021-47091/" source="CVE"/>
		<reference ref_id="CVE-2021-47093" ref_url="https://www.suse.com/security/cve/CVE-2021-47093/" source="CVE"/>
		<reference ref_id="CVE-2021-47094" ref_url="https://www.suse.com/security/cve/CVE-2021-47094/" source="CVE"/>
		<reference ref_id="CVE-2021-47095" ref_url="https://www.suse.com/security/cve/CVE-2021-47095/" source="CVE"/>
		<reference ref_id="CVE-2021-47096" ref_url="https://www.suse.com/security/cve/CVE-2021-47096/" source="CVE"/>
		<reference ref_id="CVE-2021-47097" ref_url="https://www.suse.com/security/cve/CVE-2021-47097/" source="CVE"/>
		<reference ref_id="CVE-2021-47098" ref_url="https://www.suse.com/security/cve/CVE-2021-47098/" source="CVE"/>
		<reference ref_id="CVE-2021-47099" ref_url="https://www.suse.com/security/cve/CVE-2021-47099/" source="CVE"/>
		<reference ref_id="CVE-2021-47100" ref_url="https://www.suse.com/security/cve/CVE-2021-47100/" source="CVE"/>
		<reference ref_id="CVE-2021-47101" ref_url="https://www.suse.com/security/cve/CVE-2021-47101/" source="CVE"/>
		<reference ref_id="CVE-2021-47102" ref_url="https://www.suse.com/security/cve/CVE-2021-47102/" source="CVE"/>
		<reference ref_id="CVE-2021-47104" ref_url="https://www.suse.com/security/cve/CVE-2021-47104/" source="CVE"/>
		<reference ref_id="CVE-2021-47105" ref_url="https://www.suse.com/security/cve/CVE-2021-47105/" source="CVE"/>
		<reference ref_id="CVE-2021-47107" ref_url="https://www.suse.com/security/cve/CVE-2021-47107/" source="CVE"/>
		<reference ref_id="CVE-2021-47108" ref_url="https://www.suse.com/security/cve/CVE-2021-47108/" source="CVE"/>
		<reference ref_id="CVE-2022-4744" ref_url="https://www.suse.com/security/cve/CVE-2022-4744/" source="CVE"/>
		<reference ref_id="CVE-2022-48626" ref_url="https://www.suse.com/security/cve/CVE-2022-48626/" source="CVE"/>
		<reference ref_id="CVE-2022-48627" ref_url="https://www.suse.com/security/cve/CVE-2022-48627/" source="CVE"/>
		<reference ref_id="CVE-2022-48628" ref_url="https://www.suse.com/security/cve/CVE-2022-48628/" source="CVE"/>
		<reference ref_id="CVE-2022-48629" ref_url="https://www.suse.com/security/cve/CVE-2022-48629/" source="CVE"/>
		<reference ref_id="CVE-2022-48630" ref_url="https://www.suse.com/security/cve/CVE-2022-48630/" source="CVE"/>
		<reference ref_id="CVE-2023-0160" ref_url="https://www.suse.com/security/cve/CVE-2023-0160/" source="CVE"/>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<reference ref_id="CVE-2023-35827" ref_url="https://www.suse.com/security/cve/CVE-2023-35827/" source="CVE"/>
		<reference ref_id="CVE-2023-4881" ref_url="https://www.suse.com/security/cve/CVE-2023-4881/" source="CVE"/>
		<reference ref_id="CVE-2023-52447" ref_url="https://www.suse.com/security/cve/CVE-2023-52447/" source="CVE"/>
		<reference ref_id="CVE-2023-52450" ref_url="https://www.suse.com/security/cve/CVE-2023-52450/" source="CVE"/>
		<reference ref_id="CVE-2023-52453" ref_url="https://www.suse.com/security/cve/CVE-2023-52453/" source="CVE"/>
		<reference ref_id="CVE-2023-52454" ref_url="https://www.suse.com/security/cve/CVE-2023-52454/" source="CVE"/>
		<reference ref_id="CVE-2023-52462" ref_url="https://www.suse.com/security/cve/CVE-2023-52462/" source="CVE"/>
		<reference ref_id="CVE-2023-52463" ref_url="https://www.suse.com/security/cve/CVE-2023-52463/" source="CVE"/>
		<reference ref_id="CVE-2023-52467" ref_url="https://www.suse.com/security/cve/CVE-2023-52467/" source="CVE"/>
		<reference ref_id="CVE-2023-52469" ref_url="https://www.suse.com/security/cve/CVE-2023-52469/" source="CVE"/>
		<reference ref_id="CVE-2023-52470" ref_url="https://www.suse.com/security/cve/CVE-2023-52470/" source="CVE"/>
		<reference ref_id="CVE-2023-52474" ref_url="https://www.suse.com/security/cve/CVE-2023-52474/" source="CVE"/>
		<reference ref_id="CVE-2023-52476" ref_url="https://www.suse.com/security/cve/CVE-2023-52476/" source="CVE"/>
		<reference ref_id="CVE-2023-52477" ref_url="https://www.suse.com/security/cve/CVE-2023-52477/" source="CVE"/>
		<reference ref_id="CVE-2023-52481" ref_url="https://www.suse.com/security/cve/CVE-2023-52481/" source="CVE"/>
		<reference ref_id="CVE-2023-52482" ref_url="https://www.suse.com/security/cve/CVE-2023-52482/" source="CVE"/>
		<reference ref_id="CVE-2023-52484" ref_url="https://www.suse.com/security/cve/CVE-2023-52484/" source="CVE"/>
		<reference ref_id="CVE-2023-52486" ref_url="https://www.suse.com/security/cve/CVE-2023-52486/" source="CVE"/>
		<reference ref_id="CVE-2023-52492" ref_url="https://www.suse.com/security/cve/CVE-2023-52492/" source="CVE"/>
		<reference ref_id="CVE-2023-52493" ref_url="https://www.suse.com/security/cve/CVE-2023-52493/" source="CVE"/>
		<reference ref_id="CVE-2023-52494" ref_url="https://www.suse.com/security/cve/CVE-2023-52494/" source="CVE"/>
		<reference ref_id="CVE-2023-52497" ref_url="https://www.suse.com/security/cve/CVE-2023-52497/" source="CVE"/>
		<reference ref_id="CVE-2023-52500" ref_url="https://www.suse.com/security/cve/CVE-2023-52500/" source="CVE"/>
		<reference ref_id="CVE-2023-52501" ref_url="https://www.suse.com/security/cve/CVE-2023-52501/" source="CVE"/>
		<reference ref_id="CVE-2023-52502" ref_url="https://www.suse.com/security/cve/CVE-2023-52502/" source="CVE"/>
		<reference ref_id="CVE-2023-52504" ref_url="https://www.suse.com/security/cve/CVE-2023-52504/" source="CVE"/>
		<reference ref_id="CVE-2023-52507" ref_url="https://www.suse.com/security/cve/CVE-2023-52507/" source="CVE"/>
		<reference ref_id="CVE-2023-52508" ref_url="https://www.suse.com/security/cve/CVE-2023-52508/" source="CVE"/>
		<reference ref_id="CVE-2023-52509" ref_url="https://www.suse.com/security/cve/CVE-2023-52509/" source="CVE"/>
		<reference ref_id="CVE-2023-52510" ref_url="https://www.suse.com/security/cve/CVE-2023-52510/" source="CVE"/>
		<reference ref_id="CVE-2023-52511" ref_url="https://www.suse.com/security/cve/CVE-2023-52511/" source="CVE"/>
		<reference ref_id="CVE-2023-52513" ref_url="https://www.suse.com/security/cve/CVE-2023-52513/" source="CVE"/>
		<reference ref_id="CVE-2023-52515" ref_url="https://www.suse.com/security/cve/CVE-2023-52515/" source="CVE"/>
		<reference ref_id="CVE-2023-52517" ref_url="https://www.suse.com/security/cve/CVE-2023-52517/" source="CVE"/>
		<reference ref_id="CVE-2023-52518" ref_url="https://www.suse.com/security/cve/CVE-2023-52518/" source="CVE"/>
		<reference ref_id="CVE-2023-52519" ref_url="https://www.suse.com/security/cve/CVE-2023-52519/" source="CVE"/>
		<reference ref_id="CVE-2023-52520" ref_url="https://www.suse.com/security/cve/CVE-2023-52520/" source="CVE"/>
		<reference ref_id="CVE-2023-52523" ref_url="https://www.suse.com/security/cve/CVE-2023-52523/" source="CVE"/>
		<reference ref_id="CVE-2023-52524" ref_url="https://www.suse.com/security/cve/CVE-2023-52524/" source="CVE"/>
		<reference ref_id="CVE-2023-52525" ref_url="https://www.suse.com/security/cve/CVE-2023-52525/" source="CVE"/>
		<reference ref_id="CVE-2023-52528" ref_url="https://www.suse.com/security/cve/CVE-2023-52528/" source="CVE"/>
		<reference ref_id="CVE-2023-52529" ref_url="https://www.suse.com/security/cve/CVE-2023-52529/" source="CVE"/>
		<reference ref_id="CVE-2023-52530" ref_url="https://www.suse.com/security/cve/CVE-2023-52530/" source="CVE"/>
		<reference ref_id="CVE-2023-52531" ref_url="https://www.suse.com/security/cve/CVE-2023-52531/" source="CVE"/>
		<reference ref_id="CVE-2023-52532" ref_url="https://www.suse.com/security/cve/CVE-2023-52532/" source="CVE"/>
		<reference ref_id="CVE-2023-52559" ref_url="https://www.suse.com/security/cve/CVE-2023-52559/" source="CVE"/>
		<reference ref_id="CVE-2023-52563" ref_url="https://www.suse.com/security/cve/CVE-2023-52563/" source="CVE"/>
		<reference ref_id="CVE-2023-52564" ref_url="https://www.suse.com/security/cve/CVE-2023-52564/" source="CVE"/>
		<reference ref_id="CVE-2023-52566" ref_url="https://www.suse.com/security/cve/CVE-2023-52566/" source="CVE"/>
		<reference ref_id="CVE-2023-52567" ref_url="https://www.suse.com/security/cve/CVE-2023-52567/" source="CVE"/>
		<reference ref_id="CVE-2023-52569" ref_url="https://www.suse.com/security/cve/CVE-2023-52569/" source="CVE"/>
		<reference ref_id="CVE-2023-52574" ref_url="https://www.suse.com/security/cve/CVE-2023-52574/" source="CVE"/>
		<reference ref_id="CVE-2023-52575" ref_url="https://www.suse.com/security/cve/CVE-2023-52575/" source="CVE"/>
		<reference ref_id="CVE-2023-52576" ref_url="https://www.suse.com/security/cve/CVE-2023-52576/" source="CVE"/>
		<reference ref_id="CVE-2023-52582" ref_url="https://www.suse.com/security/cve/CVE-2023-52582/" source="CVE"/>
		<reference ref_id="CVE-2023-52583" ref_url="https://www.suse.com/security/cve/CVE-2023-52583/" source="CVE"/>
		<reference ref_id="CVE-2023-52587" ref_url="https://www.suse.com/security/cve/CVE-2023-52587/" source="CVE"/>
		<reference ref_id="CVE-2023-52591" ref_url="https://www.suse.com/security/cve/CVE-2023-52591/" source="CVE"/>
		<reference ref_id="CVE-2023-52594" ref_url="https://www.suse.com/security/cve/CVE-2023-52594/" source="CVE"/>
		<reference ref_id="CVE-2023-52595" ref_url="https://www.suse.com/security/cve/CVE-2023-52595/" source="CVE"/>
		<reference ref_id="CVE-2023-52597" ref_url="https://www.suse.com/security/cve/CVE-2023-52597/" source="CVE"/>
		<reference ref_id="CVE-2023-52598" ref_url="https://www.suse.com/security/cve/CVE-2023-52598/" source="CVE"/>
		<reference ref_id="CVE-2023-52599" ref_url="https://www.suse.com/security/cve/CVE-2023-52599/" source="CVE"/>
		<reference ref_id="CVE-2023-52600" ref_url="https://www.suse.com/security/cve/CVE-2023-52600/" source="CVE"/>
		<reference ref_id="CVE-2023-52601" ref_url="https://www.suse.com/security/cve/CVE-2023-52601/" source="CVE"/>
		<reference ref_id="CVE-2023-52602" ref_url="https://www.suse.com/security/cve/CVE-2023-52602/" source="CVE"/>
		<reference ref_id="CVE-2023-52603" ref_url="https://www.suse.com/security/cve/CVE-2023-52603/" source="CVE"/>
		<reference ref_id="CVE-2023-52604" ref_url="https://www.suse.com/security/cve/CVE-2023-52604/" source="CVE"/>
		<reference ref_id="CVE-2023-52605" ref_url="https://www.suse.com/security/cve/CVE-2023-52605/" source="CVE"/>
		<reference ref_id="CVE-2023-52606" ref_url="https://www.suse.com/security/cve/CVE-2023-52606/" source="CVE"/>
		<reference ref_id="CVE-2023-52607" ref_url="https://www.suse.com/security/cve/CVE-2023-52607/" source="CVE"/>
		<reference ref_id="CVE-2023-52608" ref_url="https://www.suse.com/security/cve/CVE-2023-52608/" source="CVE"/>
		<reference ref_id="CVE-2023-52612" ref_url="https://www.suse.com/security/cve/CVE-2023-52612/" source="CVE"/>
		<reference ref_id="CVE-2023-52615" ref_url="https://www.suse.com/security/cve/CVE-2023-52615/" source="CVE"/>
		<reference ref_id="CVE-2023-52617" ref_url="https://www.suse.com/security/cve/CVE-2023-52617/" source="CVE"/>
		<reference ref_id="CVE-2023-52619" ref_url="https://www.suse.com/security/cve/CVE-2023-52619/" source="CVE"/>
		<reference ref_id="CVE-2023-52621" ref_url="https://www.suse.com/security/cve/CVE-2023-52621/" source="CVE"/>
		<reference ref_id="CVE-2023-52623" ref_url="https://www.suse.com/security/cve/CVE-2023-52623/" source="CVE"/>
		<reference ref_id="CVE-2023-52628" ref_url="https://www.suse.com/security/cve/CVE-2023-52628/" source="CVE"/>
		<reference ref_id="CVE-2023-52632" ref_url="https://www.suse.com/security/cve/CVE-2023-52632/" source="CVE"/>
		<reference ref_id="CVE-2023-52637" ref_url="https://www.suse.com/security/cve/CVE-2023-52637/" source="CVE"/>
		<reference ref_id="CVE-2023-52639" ref_url="https://www.suse.com/security/cve/CVE-2023-52639/" source="CVE"/>
		<reference ref_id="CVE-2023-6270" ref_url="https://www.suse.com/security/cve/CVE-2023-6270/" source="CVE"/>
		<reference ref_id="CVE-2023-6356" ref_url="https://www.suse.com/security/cve/CVE-2023-6356/" source="CVE"/>
		<reference ref_id="CVE-2023-6535" ref_url="https://www.suse.com/security/cve/CVE-2023-6535/" source="CVE"/>
		<reference ref_id="CVE-2023-6536" ref_url="https://www.suse.com/security/cve/CVE-2023-6536/" source="CVE"/>
		<reference ref_id="CVE-2023-7042" ref_url="https://www.suse.com/security/cve/CVE-2023-7042/" source="CVE"/>
		<reference ref_id="CVE-2023-7192" ref_url="https://www.suse.com/security/cve/CVE-2023-7192/" source="CVE"/>
		<reference ref_id="CVE-2024-0841" ref_url="https://www.suse.com/security/cve/CVE-2024-0841/" source="CVE"/>
		<reference ref_id="CVE-2024-2201" ref_url="https://www.suse.com/security/cve/CVE-2024-2201/" source="CVE"/>
		<reference ref_id="CVE-2024-22099" ref_url="https://www.suse.com/security/cve/CVE-2024-22099/" source="CVE"/>
		<reference ref_id="CVE-2024-23307" ref_url="https://www.suse.com/security/cve/CVE-2024-23307/" source="CVE"/>
		<reference ref_id="CVE-2024-25739" ref_url="https://www.suse.com/security/cve/CVE-2024-25739/" source="CVE"/>
		<reference ref_id="CVE-2024-25742" ref_url="https://www.suse.com/security/cve/CVE-2024-25742/" source="CVE"/>
		<reference ref_id="CVE-2024-26599" ref_url="https://www.suse.com/security/cve/CVE-2024-26599/" source="CVE"/>
		<reference ref_id="CVE-2024-26600" ref_url="https://www.suse.com/security/cve/CVE-2024-26600/" source="CVE"/>
		<reference ref_id="CVE-2024-26602" ref_url="https://www.suse.com/security/cve/CVE-2024-26602/" source="CVE"/>
		<reference ref_id="CVE-2024-26607" ref_url="https://www.suse.com/security/cve/CVE-2024-26607/" source="CVE"/>
		<reference ref_id="CVE-2024-26612" ref_url="https://www.suse.com/security/cve/CVE-2024-26612/" source="CVE"/>
		<reference ref_id="CVE-2024-26614" ref_url="https://www.suse.com/security/cve/CVE-2024-26614/" source="CVE"/>
		<reference ref_id="CVE-2024-26620" ref_url="https://www.suse.com/security/cve/CVE-2024-26620/" source="CVE"/>
		<reference ref_id="CVE-2024-26627" ref_url="https://www.suse.com/security/cve/CVE-2024-26627/" source="CVE"/>
		<reference ref_id="CVE-2024-26629" ref_url="https://www.suse.com/security/cve/CVE-2024-26629/" source="CVE"/>
		<reference ref_id="CVE-2024-26642" ref_url="https://www.suse.com/security/cve/CVE-2024-26642/" source="CVE"/>
		<reference ref_id="CVE-2024-26645" ref_url="https://www.suse.com/security/cve/CVE-2024-26645/" source="CVE"/>
		<reference ref_id="CVE-2024-26646" ref_url="https://www.suse.com/security/cve/CVE-2024-26646/" source="CVE"/>
		<reference ref_id="CVE-2024-26651" ref_url="https://www.suse.com/security/cve/CVE-2024-26651/" source="CVE"/>
		<reference ref_id="CVE-2024-26654" ref_url="https://www.suse.com/security/cve/CVE-2024-26654/" source="CVE"/>
		<reference ref_id="CVE-2024-26659" ref_url="https://www.suse.com/security/cve/CVE-2024-26659/" source="CVE"/>
		<reference ref_id="CVE-2024-26664" ref_url="https://www.suse.com/security/cve/CVE-2024-26664/" source="CVE"/>
		<reference ref_id="CVE-2024-26667" ref_url="https://www.suse.com/security/cve/CVE-2024-26667/" source="CVE"/>
		<reference ref_id="CVE-2024-26670" ref_url="https://www.suse.com/security/cve/CVE-2024-26670/" source="CVE"/>
		<reference ref_id="CVE-2024-26695" ref_url="https://www.suse.com/security/cve/CVE-2024-26695/" source="CVE"/>
		<reference ref_id="CVE-2024-26717" ref_url="https://www.suse.com/security/cve/CVE-2024-26717/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.

NOTE: This update has been retracted due to a bug in the BHI CPU sidechannel mitigation, which led to incorrect selection of other CPU mitigations.

The following security bugs were fixed:

- CVE-2021-46925: Fixed kernel panic caused by race of smc_sock (bsc#1220466).
- CVE-2021-46926: Fixed bug when detecting controllers in ALSA/hda/intel-sdw-acpi (bsc#1220478).
- CVE-2021-46927: Fixed assertion bug in nitro_enclaves: Use get_user_pages_unlocked() (bsc#1220443).
- CVE-2021-46929: Fixed use-after-free issue in sctp_sock_dump() (bsc#1220482).
- CVE-2021-46930: Fixed usb/mtu3 list_head check warning (bsc#1220484).
- CVE-2021-46931: Fixed wrong type casting in mlx5e_tx_reporter_dump_sq() (bsc#1220486).
- CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).
- CVE-2021-46934: Fixed a bug by validating user data in compat ioctl (bsc#1220469).
- CVE-2021-46936: Fixed use-after-free in tw_timer_handler() (bsc#1220439).
- CVE-2021-47082: Fixed ouble free in tun_free_netdev() (bsc#1220969).
- CVE-2021-47083: Fixed a global-out-of-bounds issue in mediatek: (bsc#1220917).
- CVE-2021-47087: Fixed incorrect page free bug in tee/optee (bsc#1220954).
- CVE-2021-47091: Fixed locking in ieee80211_start_ap()) error path (bsc#1220959).
- CVE-2021-47093: Fixed memleak on registration failure in intel_pmc_core (bsc#1220978).
- CVE-2021-47094: Fixed possible memory leak in KVM x86/mmu (bsc#1221551).
- CVE-2021-47095: Fixed missing initialization in ipmi/ssif (bsc#1220979).
- CVE-2021-47096: Fixed uninitalized user_pversion in ALSA rawmidi (bsc#1220981).
- CVE-2021-47097: Fixed stack out of bound access in elantech_change_report_id() (bsc#1220982).
- CVE-2021-47098: Fixed integer overflow/underflow in hysteresis calculations hwmon: (lm90) (bsc#1220983).
- CVE-2021-47099: Fixed BUG_ON assertion in veth when skb entering GRO are cloned (bsc#1220955).
- CVE-2021-47100: Fixed UAF when uninstall in ipmi (bsc#1220985).
- CVE-2021-47101: Fixed uninit-value in asix_mdio_read() (bsc#1220987).
- CVE-2021-47102: Fixed incorrect structure access In line: upper = info-&gt;upper_dev in net/marvell/prestera (bsc#1221009).
- CVE-2021-47104: Fixed memory leak in qib_user_sdma_queue_pkts() (bsc#1220960).
- CVE-2021-47105: Fixed potential memory leak in ice/xsk (bsc#1220961).
- CVE-2021-47107: Fixed READDIR buffer overflow in NFSD (bsc#1220965).
- CVE-2021-47108: Fixed possible NULL pointer dereference for mtk_hdmi_conf in drm/mediatek (bsc#1220986).
- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209635).
- CVE-2022-48626: Fixed a potential use-after-free on remove path moxart (bsc#1220366).
- CVE-2022-48627: Fixed a memory overlapping when deleting chars in the buffer (bsc#1220845).
- CVE-2022-48628: Fixed possible lock in ceph (bsc#1220848).
- CVE-2022-48629: Fixed possible memory leak in qcom-rng (bsc#1220989).
- CVE-2022-48630: Fixed infinite loop on requests not multiple of WORD_SZ in crypto: qcom-rng (bsc#1220990).
- CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to potentially crash the system (bsc#1209657).
- CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
- CVE-2023-35827: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc#1212514).
- CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221).
- CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround  (bsc#1220251).
- CVE-2023-52450: Fixed NULL pointer dereference issue in upi_fill_topology() (bsc#1220237).
- CVE-2023-52453: Fixed data corruption in hisi_acc_vfio_pci (bsc#1220337).
- CVE-2023-52454: Fixed a kernel panic when host sends an invalid H2C PDU length (bsc#1220320).
- CVE-2023-52462: Fixed check for attempt to corrupt spilled pointer (bsc#1220325).
- CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328).
- CVE-2023-52467: Fixed a null pointer dereference in of_syscon_register (bsc#1220433).
- CVE-2023-52469: Fixed a use-after-free in kv_parse_power_table (bsc#1220411).
- CVE-2023-52470: Fixed null-ptr-deref in radeon_crtc_init() (bsc#1220413).
- CVE-2023-52474: Fixed a vulnerability with non-PAGE_SIZE-end multi-iovec user SDMA requests (bsc#1220445).
- CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI during vsyscall (bsc#1220703).
- CVE-2023-52477: Fixed USB Hub accesses to uninitialized BOS descriptors (bsc#1220790).
- CVE-2023-52481: Fixed speculative unprivileged load in Cortex-A520 (bsc#1220887).
- CVE-2023-52482: Fixed a bug by adding SRSO mitigation for Hygon processors (bsc#1220735).
- CVE-2023-52484: Fixed a soft lockup triggered by arm_smmu_mm_invalidate_range (bsc#1220797).
- CVE-2023-52486: Fixed possible use-after-free in drm (bsc#1221277).
- CVE-2023-52492: Fixed a null-pointer-dereference in channel unregistration function __dma_async_device_channel_register() (bsc#1221276).
- CVE-2023-52493: Fixed possible soft lockup in bus/mhi/host (bsc#1221274).
- CVE-2023-52494: Fixed missing alignment check for event ring read pointer in bus/mhi/host (bsc#1221273).
- CVE-2023-52497: Fixed data corruption in erofs (bsc#1220879).
- CVE-2023-52500: Fixed information leaking when processing OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883).
- CVE-2023-52501: Fixed possible memory corruption in ring-buffer (bsc#1220885).
- CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220831).
- CVE-2023-52504: Fixed possible out-of bounds in apply_alternatives() on a 5-level paging machine (bsc#1221553).
- CVE-2023-52507: Fixed possible shift-out-of-bounds in nfc/nci (bsc#1220833).
- CVE-2023-52508: Fixed null pointer dereference in nvme_fc_io_getuuid() (bsc#1221015).
- CVE-2023-52509: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc#1220836).
- CVE-2023-52510: Fixed a potential UAF in ca8210_probe() (bsc#1220898).
- CVE-2023-52511: Fixed possible memory corruption in spi/sun6i (bsc#1221012).
- CVE-2023-52513: Fixed connection failure handling  in RDMA/siw (bsc#1221022).
- CVE-2023-52515: Fixed possible use-after-free in RDMA/srp (bsc#1221048).
- CVE-2023-52517: Fixed race between DMA RX transfer completion and RX FIFO drain in spi/sun6i (bsc#1221055).
- CVE-2023-52518: Fixed information leak in bluetooth/hci_codec (bsc#1221056).
- CVE-2023-52519: Fixed possible overflow in HID/intel-ish-hid/ipc (bsc#1220920).
- CVE-2023-52520: Fixed reference leak in platform/x86/think-lmi (bsc#1220921).
- CVE-2023-52523: Fixed wrong redirects to non-TCP sockets in bpf (bsc#1220926).
- CVE-2023-52524: Fixed possible corruption in nfc/llcp (bsc#1220927).
- CVE-2023-52525: Fixed out of bounds check mwifiex_process_rx_packet() (bsc#1220840).
- CVE-2023-52528: Fixed uninit-value access in __smsc75xx_read_reg() (bsc#1220843).
- CVE-2023-52529: Fixed a potential memory leak in sony_probe() (bsc#1220929).
- CVE-2023-52530: Fixed a potential key use-after-free in wifi mac80211 (bsc#1220930).
- CVE-2023-52531: Fixed a memory corruption issue in iwlwifi (bsc#1220931).
- CVE-2023-52532: Fixed a bug in TX CQE error handling (bsc#1220932).
- CVE-2023-52559: Fixed a bug by avoiding memory allocation in iommu_suspend (bsc#1220933).
- CVE-2023-52563: Fixed memory leak on -&gt;hpd_notify callback() in drm/meson (bsc#1220937).
- CVE-2023-52564: Reverted invalid fix for UAF in gsm_cleanup_mux() (bsc#1220938).
- CVE-2023-52566: Fixed potential use after free in nilfs_gccache_submit_read_data() (bsc#1220940).
- CVE-2023-52567: Fixed possible Oops in  serial/8250_port: when using IRQ polling (irq = 0) (bsc#1220839).
- CVE-2023-52569: Fixed a bug in btrfs by remoning BUG() after failure to insert delayed dir index item (bsc#1220918).
- CVE-2023-52574: Fixed a bug by hiding new member header_ops (bsc#1220870).
- CVE-2023-52575: Fixed SBPB enablement for spec_rstack_overflow=off (bsc#1220871).
- CVE-2023-52576: Fixed potential use after free in memblock_isolate_range() (bsc#1220872).
- CVE-2023-52582: Fixed possible oops in netfs (bsc#1220878).
- CVE-2023-52583: Fixed deadlock or deadcode of misusing dget() inside ceph (bsc#1221058).
- CVE-2023-52587: Fixed mcast list locking in IB/ipoib (bsc#1221082).
- CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044).
- CVE-2023-52594: Fixed potential array-index-out-of-bounds read in ath9k_htc_txstatus() (bsc#1221045).
- CVE-2023-52595: Fixed possible deadlock in wifi/rt2x00 (bsc#1221046).
- CVE-2023-52597: Fixed a setting of fpc register in KVM (bsc#1221040).
- CVE-2023-52598: Fixed wrong setting of fpc register in s390/ptrace (bsc#1221060).
- CVE-2023-52599: Fixed array-index-out-of-bounds in diNewExt() in jfs (bsc#1221062).
- CVE-2023-52600: Fixed uaf in jfs_evict_inode() (bsc#1221071).
- CVE-2023-52601: Fixed array-index-out-of-bounds in dbAdjTree() in jfs (bsc#1221068).
- CVE-2023-52602: Fixed slab-out-of-bounds Read in dtSearch() in jfs (bsc#1221070).
- CVE-2023-52603: Fixed array-index-out-of-bounds in dtSplitRoot() (bsc#1221066).
- CVE-2023-52604: Fixed array-index-out-of-bounds in dbAdjTree() (bsc#1221067).
- CVE-2023-52605: Fixed a NULL pointer dereference check (bsc#1221039)
- CVE-2023-52606: Fixed possible kernel stack corruption in powerpc/lib (bsc#1221069).
- CVE-2023-52607: Fixed a null-pointer-dereference in pgtable_cache_add kasprintf() (bsc#1221061).
- CVE-2023-52608: Fixed possible race condition in firmware/arm_scmi (bsc#1221375).
- CVE-2023-52612: Fixed req-&gt;dst buffer overflow in crypto/scomp (bsc#1221616).
- CVE-2023-52615: Fixed page fault dead lock on mmap-ed hwrng (bsc#1221614).
- CVE-2023-52617: Fixed stdev_release() crash after surprise hot remove (bsc#1221613).
- CVE-2023-52619: Fixed possible crash when setting number of cpus to an odd number in pstore/ram (bsc#1221618).
- CVE-2023-52621: Fixed missing asserion in bpf (bsc#1222073).
- CVE-2023-52623: Fixed suspicious RCU usage in SUNRPC (bsc#1222060).
- CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222117).
- CVE-2023-52632: Fixed lock dependency warning with srcu in drm/amdkfd (bsc#1222274).
- CVE-2023-52637: Fixed UAF in j1939_sk_match_filter() in can/k1939 (bsc#1222291).
- CVE-2023-52639: Fixed race during shadow creation in KVM/s390/vsie Fixed (bsc#1222300).
- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).
- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).
- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).
- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).
- CVE-2023-7042: Fixed a null-pointer-dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).
- CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c (bsc#1218479).
- CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).
- CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
- CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170).
- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).
- CVE-2024-25739: Fixed possible crash in create_empty_lvol() in drivers/mtd/ubi/vtbl.c (bsc#1219834).
- CVE-2024-25742: Fixed insufficient validation during #VC instruction emulation in x86/sev (bsc#1221725).
- CVE-2024-26599: Fixed out-of-bounds access in of_pwm_single_xlate() (bsc#1220365).
- CVE-2024-26600: Fixed NULL pointer dereference for SRP in phy-omap-usb2 (bsc#1220340).
- CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398).
- CVE-2024-26607: Fixed a probing race issue in sii902x: (bsc#1220736).
- CVE-2024-26612: Fixed Oops in fscache_put_cache() This function dereferences  (bsc#1221291).
- CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks (bsc#1221293).
- CVE-2024-26620: Fixed possible device model violation in s390/vfio-ap (bsc#1221298).
- CVE-2024-26627: Fixed possible hard lockup in scsi (bsc#1221090).
- CVE-2024-26629: Fixed possible protocol violation via RELEASE_LOCKOWNER in nfsd (bsc#1221379).
- CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter nf_tables (bsc#1221830).
- CVE-2024-26645: Fixed missing visibility when inserting an element into tracing_map (bsc#1222056).
- CVE-2024-26646: Fixed potential memory corruption when resuming from suspend or hibernation in thermal/intel/hfi (bsc#1222070).
- CVE-2024-26651: Fixed possible oops via malicious devices in sr9800 (bsc#1221337).
- CVE-2024-26654: Fixed use after free in ALSA/sh/aica (bsc#1222304).
- CVE-2024-26659: Fixed wrong handling of isoc Babble and Buffer Overrun events in xhci (bsc#1222317).
- CVE-2024-26664: Fixed out-of-bounds memory access in create_core_data() in hwmon coretemp (bsc#1222355).
- CVE-2024-26667: Fixed null pointer reference in dpu_encoder_helper_phys_cleanup in drm/msm/dpu (bsc#1222331).
- CVE-2024-26670: Fixed ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD workaround in kernel arm64 (bsc#1222356).
- CVE-2024-26695: Fixed null pointer dereference in __sev_platform_shutdown_locked in crypto ccp (bsc#1222373).
- CVE-2024-26717: Fixed null pointer dereference on failed power up in HID i2c-hid-of (bsc#1222360).


The following non-security bugs were fixed:

- acpi: CPPC: enable AMD CPPC V2 support for family 17h processors (git-fixes).
- acpi: processor_idle: Fix memory leak in acpi_processor_power_exit() (git-fixes).
- acpi: resource: Add Infinity laptops to irq1_edge_low_force_override (stable-fixes).
- acpi: resource: Add MAIBENBEN X577 to irq1_edge_low_force_override (git-fixes).
- acpi: resource: Do IRQ override on Lunnen Ground laptops (stable-fixes).
- acpi: scan: Fix device check notification handling (git-fixes).
- acpica: debugger: check status of acpi_evaluate_object() in acpi_db_walk_for_fields() (git-fixes).
- alsa: aaci: Delete unused variable in aaci_do_suspend (git-fixes).
- alsa: aoa: avoid false-positive format truncation warning (git-fixes).
- alsa: aw2: avoid casting function pointers (git-fixes).
- alsa: ctxfi: avoid casting function pointers (git-fixes).
- alsa: hda/realtek - ALC285 reduce pop noise from Headphone port (stable-fixes).
- alsa: hda/realtek - Add Headset Mic supported Acer NB platform (stable-fixes).
- alsa: hda/realtek - Fix headset Mic no show at resume back for Lenovo ALC897 platform (git-fixes).
- alsa: hda/realtek: Enable Mute LED on HP 840 G8 (MB 8AB8) (git-fixes).
- alsa: hda/realtek: Update Panasonic CF-SZ6 quirk to support headset with microphone (git-fixes).
- alsa: hda/realtek: fix ALC285 issues on HP Envy x360 laptops (stable-fixes).
- alsa: hda/realtek: fix mute/micmute LED For HP mt440 (git-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs for HP EliteBook (stable-fixes).
- alsa: seq: fix function cast warnings (git-fixes).
- alsa: sh: aica: reorder cleanup operations to avoid UAF bugs (git-fixes).
- alsa: usb-audio: Stop parsing channels bits when all channels are found (git-fixes).
- arm64: dts: allwinner: h6: Add RX DMA channel for SPDIF (git-fixes)
- arm64: dts: broadcom: bcmbca: bcm4908: drop invalid switch cells (git-fixes)
- arm64: dts: imx8mm-kontron: Add support for ultra high speed modes on (git-fixes)
- arm64: dts: imx8mm-venice-gw71xx: fix USB OTG VBUS (git-fixes)
- arm64: dts: marvell: reorder crypto interrupts on Armada SoCs (git-fixes)
- arm64: dts: rockchip: add ES8316 codec for ROCK Pi 4 (git-fixes)
- arm64: dts: rockchip: add SPDIF node for ROCK Pi 4 (git-fixes)
- arm64: dts: rockchip: fix regulator name on rk3399-rock-4 (git-fixes)
- arm64: dts: rockchip: set num-cs property for spi on px30 (git-fixes)
- arm64: mm: fix VA-range sanity check (git-fixes)
- arm64: set __exception_irq_entry with __irq_entry as a default (git-fixes)
- asoc: Intel: bytcr_rt5640: Add an extra entry for the Chuwi Vi8 tablet (stable-fixes).
- asoc: amd: acp: Add missing error handling in sof-mach (git-fixes).
- asoc: amd: acp: fix for acp_init function error handling (git-fixes).
- asoc: madera: Fix typo in madera_set_fll_clks shift value (git-fixes).
- asoc: meson: Use dev_err_probe() helper (stable-fixes).
- asoc: meson: aiu: fix function pointer type mismatch (git-fixes).
- asoc: meson: axg-tdm-interface: add frame rate constraint (git-fixes).
- asoc: meson: axg-tdm-interface: fix mclk setup without mclk-fs (git-fixes).
- asoc: meson: t9015: fix function pointer type mismatch (git-fixes).
- asoc: ops: Fix wraparound for mask in snd_soc_get_volsw (git-fixes).
- asoc: rcar: adg: correct TIMSEL setting for SSI9 (git-fixes).
- asoc: rt5645: Make LattePanda board DMI match more precise (stable-fixes).
- asoc: rt5682-sdw: fix locking sequence (git-fixes).
- asoc: rt711-sdca: fix locking sequence (git-fixes).
- asoc: rt711-sdw: fix locking sequence (git-fixes).
- asoc: wm8962: Enable both SPKOUTR_ENA and SPKOUTL_ENA in mono mode (stable-fixes).
- asoc: wm8962: Enable oscillator if selecting WM8962_FLL_OSC (stable-fixes).
- asoc: wm8962: Fix up incorrect error message in wm8962_set_fll (stable-fixes).
- ata: sata_mv: Fix PCI device ID table declaration compilation warning (git-fixes).
- ata: sata_sx4: fix pdc20621_get_from_dimm() on 64-bit (git-fixes).
- backlight: da9052: Fully initialize backlight_properties during probe (git-fixes).
- backlight: lm3630a: Do not set bl-&gt;props.brightness in get_brightness (git-fixes).
- backlight: lm3630a: Initialize backlight_properties on init (git-fixes).
- backlight: lm3639: Fully initialize backlight_properties during probe (git-fixes).
- backlight: lp8788: Fully initialize backlight_properties during probe (git-fixes).
- blocklayoutdriver: Fix reference leak of pnfs_device_node (git-fixes).
- bluetooth: Remove HCI_POWER_OFF_TIMEOUT (git-fixes).
- bluetooth: Remove superfluous call to hci_conn_check_pending() (git-fixes).
- bluetooth: hci_core: Fix possible buffer overflow (git-fixes).
- bluetooth: mgmt: Remove leftover queuing of power_off work (git-fixes).
- bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security (stable-fixes).
- bpf, scripts: Correct GPL license name (git-fixes).
- bpf, sockmap: Fix preempt_rt splat when using raw_spin_lock_t (git-fixes).
- can: softing: remove redundant NULL check (git-fixes).
- clk: zynq: Prevent null pointer dereference caused by kmalloc failure (git-fixes).
- comedi: comedi_test: Prevent timers rescheduling during deletion (git-fixes).
- coresight: etm4x: Do not access TRCIDR1 for identification (bsc#1220775)
- coresight: etm4x: Fix accesses to TRCSEQRSTEVR and TRCSEQSTR (bsc#1220775)
- coresight: etm: Override TRCIDR3.CCITMIN on errata affected cpus (bsc#1220775)
- cpufreq: amd-pstate: Fix min_perf assignment in amd_pstate_adjust_perf() (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's return value (git-fixes).
- crypto: arm/sha - fix function cast warnings (git-fixes).
- crypto: qat - avoid division by zero (git-fixes).
- crypto: qat - fix deadlock in backlog processing (git-fixes).
- crypto: qat - fix double free during reset (git-fixes).
- crypto: qat - fix state machines cleanup paths (bsc#1218321).
- crypto: qat - fix unregistration of compression algorithms (git-fixes).
- crypto: qat - fix unregistration of crypto algorithms (git-fixes).
- crypto: qat - ignore subsequent state up commands (git-fixes).
- crypto: qat - increase size of buffers (git-fixes).
- crypto: qat - resolve race condition during AER recovery (git-fixes).
- crypto: xilinx - call finalize with bh disabled (git-fixes).
- doc-guide: kernel-doc: tell about object-like macros (git-fixes).
- doc/README.SUSE: Update information about module support status (jsc#PED-5759)
- drivers: hv: vmbus: Calculate ring buffer size for more efficient use of memory (git-fixes).
- drm/amd/display: Add FAMS validation before trying to use it (git-fixes).
- drm/amd/display: Add function for validate and update new stream (git-fixes).
- drm/amd/display: Avoid ABM when ODM combine is enabled for eDP (git-fixes).
- drm/amd/display: Blocking invalid 420 modes on HDMI TMDS for DCN31 (git-fixes).
- drm/amd/display: Check if link state is valid (git-fixes).
- drm/amd/display: Copy DC context in the commit streams (git-fixes).
- drm/amd/display: Disable PSR-SU on Parade 0803 TCON again (git-fixes).
- drm/amd/display: Enable fast plane updates on DCN3.2 and above (git-fixes).
- drm/amd/display: Enable new commit sequence only for DCN32x (git-fixes).
- drm/amd/display: Exit idle optimizations before attempt to access PHY (git-fixes).
- drm/amd/display: Expand kernel doc for DC (git-fixes).
- drm/amd/display: Fix a bug when searching for insert_above_mpcc (git-fixes).
- drm/amd/display: Fix a potential buffer overflow in 'dp_dsc_clock_en_read()' (git-fixes).
- drm/amd/display: Fix possible underflow for displays with large vblank (git-fixes).
- drm/amd/display: Fix the delta clamping for shaper LUT (git-fixes).
- drm/amd/display: Fix underflow issue on 175hz timing (git-fixes).
- drm/amd/display: For prefetch mode &gt; 0, extend prefetch if possible (git-fixes).
- drm/amd/display: Guard DCN31 PHYD32CLK logic against chip family (git-fixes).
- drm/amd/display: Guard against invalid RPTR/WPTR being set (git-fixes).
- drm/amd/display: Handle seamless boot stream (git-fixes).
- drm/amd/display: Handle virtual hardware detect (git-fixes).
- drm/amd/display: Include surface of unaffected streams (git-fixes).
- drm/amd/display: Include udelay when waiting for INBOX0 ACK (git-fixes).
- drm/amd/display: Increase frame warning limit with KASAN or KCSAN in dml (git-fixes).
- drm/amd/display: Keep PHY active for dp config (git-fixes).
- drm/amd/display: Prevent vtotal from being set to 0 (git-fixes).
- drm/amd/display: Remove min_dst_y_next_start check for Z8 (git-fixes).
- drm/amd/display: Restore rptr/wptr for DMCUB as workaround (git-fixes).
- drm/amd/display: Return the correct HDCP error code (stable-fixes).
- drm/amd/display: Revert vblank change that causes null pointer crash (git-fixes).
- drm/amd/display: Rework comments on dc file (git-fixes).
- drm/amd/display: Rework context change check (git-fixes).
- drm/amd/display: Set minimum requirement for using PSR-SU on Phoenix (git-fixes).
- drm/amd/display: Set minimum requirement for using PSR-SU on Rembrandt (git-fixes).
- drm/amd/display: Update OTG instance in the commit stream (git-fixes).
- drm/amd/display: Update correct DCN314 register header (git-fixes).
- drm/amd/display: Update min Z8 residency time to 2100 for DCN314 (git-fixes).
- drm/amd/display: Use DRAM speed from validation for dummy p-state (git-fixes).
- drm/amd/display: Use DTBCLK as refclk instead of DPREFCLK (git-fixes).
- drm/amd/display: Use min transition for all SubVP plane add/remove (git-fixes).
- drm/amd/display: Write to correct dirty_rect (git-fixes).
- drm/amd/display: Wrong colorimetry workaround (git-fixes).
- drm/amd/display: add FB_DAMAGE_CLIPS support (git-fixes).
- drm/amd/display: add ODM case when looking for first split pipe (git-fixes).
- drm/amd/display: always switch off ODM before committing more streams (git-fixes).
- drm/amd/display: clean code-style issues in dcn30_set_mpc_shaper_3dlut (git-fixes).
- drm/amd/display: dc.h: eliminate kernel-doc warnings (git-fixes).
- drm/amd/display: ensure async flips are only accepted for fast updates (git-fixes).
- drm/amd/display: fix ABM disablement (git-fixes).
- drm/amd/display: fix a NULL pointer dereference in amdgpu_dm_i2c_xfer() (git-fixes).
- drm/amd/display: fix dc/core/dc.c kernel-doc (git-fixes).
- drm/amd/display: fix hw rotated modes when PSR-SU is enabled (git-fixes).
- drm/amd/display: fix kernel-doc issues in dc.h (git-fixes).
- drm/amd/display: fix unbounded requesting for high pixel rate modes on dcn315 (git-fixes).
- drm/amd/display: handle range offsets in VRR ranges (stable-fixes).
- drm/amd/display: perform a bounds check before filling dirty rectangles (git-fixes).
- drm/amd/display: set per pipe dppclk to 0 when dpp is off (git-fixes).
- drm/amd/display: update extended blank for dcn314 onwards (git-fixes).
- drm/amd/display: use low clocks for no plane configs (git-fixes).
- drm/amd/pm: Fix error of MACO flag setting code (git-fixes).
- drm/amd/pm: fix a memleak in aldebaran_tables_init (git-fixes).
- drm/amd/smu: use AverageGfxclkFrequency* to replace previous GFX Curr Clock (git-fixes).
- drm/amd: Enable PCIe PME from D3 (git-fixes).
- drm/amdgpu/pm: Fix the error of pwm1_enable setting (stable-fixes).
- drm/amdgpu/pm: make gfxclock consistent for sienna cichlid (git-fixes).
- drm/amdgpu/pm: make mclk consistent for smu 13.0.7 (git-fixes).
- drm/amdgpu/smu13: drop compute workload workaround (git-fixes).
- drm/amdgpu: Enable gpu reset for S3 abort cases on Raven series (stable-fixes).
- drm/amdgpu: Fix missing break in ATOM_ARG_IMM Case of atom_get_src_int() (git-fixes).
- drm/amdgpu: Force order between a read and write to the same address (git-fixes).
- drm/amdgpu: Match against exact bootloader status (git-fixes).
- drm/amdgpu: Unset context priority is now invalid (git-fixes).
- drm/amdgpu: Update min() to min_t() in 'amdgpu_info_ioctl' (git-fixes).
- drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag (stable-fixes).
- drm/amdgpu: lower CS errors to debug severity (git-fixes).
- drm/amdkfd: fix TLB flush after unmap for GFX9.4.2 (stable-fixes).
- drm/bridge: tc358762: Instruct DSI host to generate HSE packets (git-fixes).
- drm/display: fix typo (git-fixes).
- drm/edid: Add quirk for OSVR HDK 2.0 (git-fixes).
- drm/etnaviv: Restore some id values (git-fixes).
- drm/exynos: do not return negative values from .get_modes() (stable-fixes).
- drm/exynos: fix a possible null-pointer dereference due to data race in exynos_drm_crtc_atomic_disable() (git-fixes).
- drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode() (stable-fixes).
- drm/i915/gt: Do not generate the command streamer for all the CCS (git-fixes).
- drm/i915/gt: Reset queue_priority_hint on parking (git-fixes).
- drm/i915/gt: Use i915_vm_put on ppgtt_create error paths (git-fixes).
- drm/i915/selftests: Fix dependency of some timeouts on HZ (git-fixes).
- drm/i915: Add missing CCS documentation (git-fixes).
- drm/i915: Call intel_pre_plane_updates() also for pipes getting enabled (git-fixes).
- drm/i915: Check before removing mm notifier (git-fixes).
- drm/lima: fix a memleak in lima_heap_alloc (git-fixes).
- drm/mediatek: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip (git-fixes).
- drm/mediatek: dsi: Fix DSI RGB666 formats and definitions (git-fixes).
- drm/msm/dpu: Only enable DSC_MODE_MULTIPLEX if dsc_merge is enabled (git-fixes).
- drm/msm/dpu: add division of drm_display_mode's hskew parameter (git-fixes).
- drm/msm/dpu: fix the programming of INTF_CFG2_DATA_HCTL_EN (git-fixes).
- drm/msm/dpu: improve DSC allocation (git-fixes).
- drm/panel-edp: use put_sync in unprepare (git-fixes).
- drm/panel: Move AUX B116XW03 out of panel-edp back to panel-simple (git-fixes).
- drm/panel: auo,b101uan08.3: Fine tune the panel power sequence (git-fixes).
- drm/panel: boe-tv101wum-nl6: Fine tune the panel power sequence (git-fixes).
- drm/panel: do not return negative error codes from drm_panel_get_modes() (stable-fixes).
- drm/panfrost: fix power transition timeout warnings (git-fixes).
- drm/probe-helper: warn about negative .get_modes() (stable-fixes).
- drm/qxl: remove unused `count` variable from `qxl_surface_id_alloc()` (git-fixes).
- drm/qxl: remove unused variable from `qxl_process_single_command()` (git-fixes).
- drm/radeon/ni: Fix wrong firmware size logging in ni_init_microcode() (git-fixes).
- drm/radeon/ni_dpm: remove redundant NULL check (git-fixes).
- drm/radeon: remove dead code in ni_mc_load_microcode() (git-fixes).
- drm/rockchip: dsi: Clean up 'usage_mode' when failing to attach (git-fixes).
- drm/rockchip: inno_hdmi: Fix video timing (git-fixes).
- drm/rockchip: lvds: do not overwrite error code (git-fixes).
- drm/rockchip: lvds: do not print scary message when probing defer (git-fixes).
- drm/tegra: dpaux: Fix PM disable depth imbalance in tegra_dpaux_probe (git-fixes).
- drm/tegra: dsi: Add missing check for of_find_device_by_node (git-fixes).
- drm/tegra: dsi: Fix missing pm_runtime_disable() in the error handling path of tegra_dsi_probe() (git-fixes).
- drm/tegra: dsi: Fix some error handling paths in tegra_dsi_probe() (git-fixes).
- drm/tegra: dsi: Make use of the helper function dev_err_probe() (stable-fixes).
- drm/tegra: hdmi: Convert to devm_platform_ioremap_resource() (stable-fixes).
- drm/tegra: hdmi: Fix some error handling paths in tegra_hdmi_probe() (git-fixes).
- drm/tegra: output: Fix missing i2c_put_adapter() in the error handling paths of tegra_output_probe() (git-fixes).
- drm/tegra: put drm_gem_object ref on error in tegra_fb_create (git-fixes).
- drm/tegra: rgb: Fix missing clk_put() in the error handling paths of tegra_dc_rgb_probe() (git-fixes).
- drm/tegra: rgb: Fix some error handling paths in tegra_dc_rgb_probe() (git-fixes).
- drm/tidss: Fix initial plane zpos values (git-fixes).
- drm/tidss: Fix sync-lost issue with two displays (git-fixes).
- drm/ttm: Do not leak a resource on eviction error (git-fixes).
- drm/ttm: Do not print error message if eviction was interrupted (git-fixes).
- drm/vc4: Add module dependency on hdmi-codec (git-fixes).
- drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed (git-fixes).
- drm/vmwgfx: Fix possible null pointer derefence with invalid contexts (git-fixes).
- drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node (git-fixes).
- drm: Do not treat 0 as -1 in drm_fixp2int_ceil (git-fixes).
- drm: Fix drm_fixp2int_round() making it add 0.5 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Acer Switch V 10 (SW5-017) (git-fixes).
- firewire: core: use long bus reset on gap count error (stable-fixes).
- fix 'coresight: etm4x: Change etm4_platform_driver driver for MMIO devices' (bsc#1220775) Hunk with clk_put(drvdata-&gt;pclk) was incorrectly moved to another function.
- hid: amd_sfh: Update HPD sensor structure elements (git-fixes).
- hid: lenovo: Add middleclick_workaround sysfs knob for cptkbd (git-fixes).
- hid: multitouch: Add required quirk for Synaptics 0xcddc device (stable-fixes).
- hv_netvsc: Calculate correct ring size when PAGE_SIZE is not 4 Kbytes (git-fixes).
- hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove (git-fixes).
- hv_netvsc: Register VF in netvsc_probe if NET_DEVICE_REGISTER missed (git-fixes).
- i2c: aspeed: Fix the dummy irq expected print (git-fixes).
- i2c: i801: Avoid potential double call to gpiod_remove_lookup_table (git-fixes).
- i2c: wmt: Fix an error handling path in wmt_i2c_probe() (git-fixes).
- ib/ipoib: Fix mcast list locking (git-fixes)
- iio: dummy_evgen: remove Excess kernel-doc comments (git-fixes).
- iio: pressure: dlhl60d: Initialize empty DLH bytes (git-fixes).
- input: gpio_keys_polled - suppress deferred probe error for gpio (stable-fixes).
- input: i8042 - add Fujitsu Lifebook E5411 to i8042 quirk table (git-fixes).
- input: i8042 - add Fujitsu Lifebook U728 to i8042 quirk table (git-fixes).
- input: i8042 - add quirk for Fujitsu Lifebook A574/H (git-fixes).
- input: i8042 - fix strange behavior of touchpad on Clevo NS70PU (git-fixes).
- input: pm8941-powerkey - fix debounce on gen2+ PMICs (git-fixes).
- input: pm8941-pwrkey - add software key press debouncing support (git-fixes).
- input: pm8941-pwrkey - add support for PON GEN3 base addresses (git-fixes).
- input: synaptics-rmi4 - fix UAF of IRQ domain on driver removal (git-fixes).
- input: xpad - add Lenovo Legion Go controllers (git-fixes).
- iommu/amd: Mark interrupt as managed (git-fixes).
- iommu/dma: Trace bounce buffer usage when mapping buffers (git-fixes).
- iommu/mediatek-v1: Fix an error handling path in mtk_iommu_v1_probe() (git-fixes).
- iommu/mediatek: Fix forever loop in error handling (git-fixes).
- iommu/vt-d: Allow to use flush-queue when first level is default (git-fixes).
- iommu/vt-d: Do not issue ATS Invalidation request when device is disconnected (git-fixes).
- iommu/vt-d: Fix PASID directory pointer coherency (git-fixes).
- iommu/vt-d: Set No Execute Enable bit in PASID table entry (git-fixes).
- kabi: PCI: Add locking to RMW PCI Express Capability Register accessors (kabi).
- kconfig: fix infinite loop when expanding a macro at the end of file (git-fixes).
- kvm: s390: only deliver the set service event bits (git-fixes bsc#1221631).
- lan78xx: enable auto speed configuration for LAN7850 if no EEPROM is detected (git-commit).
- leds: aw2013: Unlock mutex before destroying it (git-fixes).
- lib/cmdline: Fix an invalid format specifier in an assertion msg (git-fixes).
- make NVIDIA Grace-Hopper TPM related drivers build-ins (bsc#1221156)
- md/raid10: check slab-out-of-bounds in md_bitmap_get_counter (git-fixes).
- md/raid5: release batch_last before waiting for another stripe_head (git-fixes).
- md/raid6: use valid sector values to determine if an I/O should wait on the reshape (git-fixes).
- md: Do not ignore suspended array in md_check_recovery() (git-fixes).
- md: Make sure md_do_sync() will set MD_RECOVERY_DONE (git-fixes).
- md: Whenassemble the array, consult the superblock of the freshest device (git-fixes).
- md: do not leave 'MD_RECOVERY_FROZEN' in error path of md_set_readonly() (git-fixes).
- md: fix data corruption for raid456 when reshape restart while grow up (git-fixes).
- md: introduce md_ro_state (git-fixes).
- media: dvb-frontends: avoid stack overflow warnings with clang (git-fixes).
- media: edia: dvbdev: fix a use-after-free (git-fixes).
- media: em28xx: annotate unchecked call to media_device_register() (git-fixes).
- media: go7007: add check of return value of go7007_read_addr() (git-fixes).
- media: go7007: fix a memleak in go7007_load_encoder (git-fixes).
- media: imx: csc/scaler: fix v4l2_ctrl_handler memory leak (git-fixes).
- media: pvrusb2: fix pvr2_stream_callback casts (git-fixes).
- media: pvrusb2: fix uaf in pvr2_context_set_notify (git-fixes).
- media: pvrusb2: remove redundant NULL check (git-fixes).
- media: staging: ipu3-imgu: Set fields before media_entity_pads_init() (git-fixes).
- media: sun8i-di: Fix chroma difference threshold (git-fixes).
- media: sun8i-di: Fix coefficient writes (git-fixes).
- media: sun8i-di: Fix power on/off sequences (git-fixes).
- media: tc358743: register v4l2 async device only after successful setup (git-fixes).
- media: ttpci: fix two memleaks in budget_av_attach (git-fixes).
- media: usbtv: Remove useless locks in usbtv_video_free() (git-fixes).
- media: v4l2-mem2mem: fix a memleak in v4l2_m2m_register_entity (git-fixes).
- media: v4l2-tpg: fix some memleaks in tpg_alloc (git-fixes).
- media: xc4000: Fix atomicity violation in xc4000_get_frequency (git-fixes).
- mfd: altera-sysmgr: Call of_node_put() only when of_parse_phandle() takes a ref (git-fixes).
- mfd: syscon: Call of_node_put() only when of_parse_phandle() takes a ref (git-fixes).
- mm,page_owner: Defer enablement of static branch (bsc#1222366).
- mm,page_owner: Fix accounting of pages when migrating (bsc#1222366).
- mm,page_owner: Fix printing of stack records (bsc#1222366).
- mm,page_owner: Fix refcount imbalance (bsc#1222366).
- mm,page_owner: Update metadata for tail pages (bsc#1222366).
- mm,page_owner: check for null stack_record before bumping its refcount (bsc#1222366).
- mm,page_owner: drop unnecessary check (bsc#1222366).
- mm,page_owner: fix recursion (bsc#1222366).
- mm/vmalloc: huge vmalloc backing pages should be split rather than compound (bsc#1217829).
- mmc: core: Avoid negative index with array access (git-fixes).
- mmc: core: Fix switch on gp3 partition (git-fixes).
- mmc: core: Initialize mmc_blk_ioc_data (git-fixes).
- mmc: mmci: stm32: fix DMA API overlapping mappings warning (git-fixes).
- mmc: mmci: stm32: use a buffer for unaligned DMA requests (git-fixes).
- mmc: tmio: avoid concurrent runs of mmc_request_done() (git-fixes).
- mmc: wmt-sdmmc: remove an incorrect release_mem_region() call in the .remove function (git-fixes).
- mtd: maps: physmap-core: fix flash size larger than 32-bit (git-fixes).
- mtd: rawnand: lpc32xx_mlc: fix irq handler prototype (git-fixes).
- mtd: rawnand: meson: fix scrambling mode value in command macro (git-fixes).
- net/bnx2x: Prevent access to a freed page in page_pool (bsc#1215322).
- net/x25: fix incorrect parameter validation in the x25_getsockopt() function (git-fixes).
- net: Fix features skip in for_each_netdev_feature() (git-fixes).
- net: lan78xx: fix runtime PM count underflow on link stop (git-fixes).
- net: ll_temac: platform_get_resource replaced by wrong function (git-fixes).
- net: mana: Fix Rx DMA datasize and skb_over_panic (git-fixes).
- net: phy: fix phy_get_internal_delay accessing an empty array (git-fixes).
- net: sunrpc: Fix an off by one in rpc_sockaddr2uaddr() (git-fixes).
- net: usb: dm9601: fix wrong return value in dm9601_mdio_read (git-fixes).
- nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet (git-fixes).
- nfs: fix an off by one in root_nfs_cat() (git-fixes).
- nfs: rename nfs_client_kset to nfs_kset (git-fixes).
- nfsd: change LISTXATTRS cookie encoding to big-endian (git-fixes).
- nfsd: convert the callback workqueue to use delayed_work (git-fixes).
- nfsd: do not take fi_lock in nfsd_break_deleg_cb() (git-fixes).
- nfsd: fix LISTXATTRS returning a short list with eof=TRUE (git-fixes).
- nfsd: fix LISTXATTRS returning more bytes than maxcount (git-fixes).
- nfsd: fix file memleak on client_opens_release (git-fixes).
- nfsd: fix nfsd4_listxattr_validate_cookie (git-fixes).
- nfsd: lock_rename() needs both directories to live on the same fs (git-fixes).
- nfsd: reschedule CB operations when backchannel rpc_clnt is shut down (git-fixes).
- nfsd: reset cb_seq_status after NFS4ERR_DELAY (git-fixes).
- nfsd: retransmit callbacks after client reconnects (git-fixes).
- nfsd: use vfs setgid helper (git-fixes).
- nfsv4.1/pnfs: Ensure we handle the error NFS4ERR_RETURNCONFLICT (git-fixes).
- nfsv4.1: fix SP4_MACH_CRED protection for pnfs IO (git-fixes).
- nfsv4.1: fixup use EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes).
- nfsv4.1: use EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes).
- nfsv4.2: fix listxattr maximum XDR buffer size (git-fixes).
- nfsv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 (git-fixes).
- nfsv4.2: fix wrong shrinker_id (git-fixes).
- nfsv4: fix a nfs4_state_manager() race (git-fixes).
- nfsv4: fix a state manager thread deadlock regression (git-fixes).
- nilfs2: fix failure to detect DAT corruption in btree and direct mappings (git-fixes).
- nilfs2: prevent kernel bug at submit_bh_wbc() (git-fixes).
- nouveau/dmem: handle kcalloc() allocation failure (git-fixes).
- nouveau: reset the bo resource bus info after an eviction (git-fixes).
- ntfs: fix use-after-free in ntfs_ucsncmp() (bsc#1221713).
- nvme-fc: do not wait in vain when unloading module (git-fixes).
- nvme: fix reconnection fail due to reserved tag allocation (git-fixes).
- nvmet-fc: abort command when there is no binding (git-fixes).
- nvmet-fc: avoid deadlock on delete association path (git-fixes).
- nvmet-fc: defer cleanup using RCU properly (git-fixes).
- nvmet-fc: hold reference on hostport match (git-fixes).
- nvmet-fc: release reference on target port (git-fixes).
- nvmet-fc: take ref count on tgtport before delete assoc (git-fixes).
- nvmet-fcloop: swap the list_add_tail arguments (git-fixes).
- nvmet-tcp: fix nvme tcp ida memory leak (git-fixes).
- pci/aer: fix rootport attribute paths in ABI docs (git-fixes).
- pci/aspm: Use RMW accessors for changing LNKCTL (git-fixes).
- pci/dpc: print all TLP Prefixes, not just the first (git-fixes).
- pci/msi: prevent MSI hardware interrupt number truncation (bsc#1218777)
- pci/p2pdma: Fix a sleeping issue in a RCU read section (git-fixes).
- pci: add locking to RMW PCI Express Capability Register accessors (git-fixes).
- pci: dwc: Fix a 64bit bug in dw_pcie_ep_raise_msix_irq() (git-fixes).
- pci: dwc: endpoint: Fix advertised resizable BAR size (git-fixes).
- pci: dwc: endpoint: Fix dw_pcie_ep_raise_msix_irq() alignment support (git-fixes).
- pci: fu740: Set the number of MSI vectors (git-fixes).
- pci: lengthen reset delay for VideoPropulsion Torrent QN16e card (git-fixes).
- pci: make link retraining use RMW accessors for changing LNKCTL (git-fixes).
- pci: mark 3ware-9650SE Root Port Extended Tags as broken (git-fixes).
- pci: mediatek-gen3: Fix translation window size calculation (git-fixes).
- pci: mediatek: Clear interrupt status before dispatching handler (git-fixes).
- pci: qcom: Enable BDF to SID translation properly (git-fixes).
- pci: qcom: Use DWC helpers for modifying the read-only DBI registers (git-fixes).
- pci: rockchip: Do not advertise MSI-X in PCIe capabilities (git-fixes).
- pci: rockchip: Fix window mapping and address translation for endpoint (git-fixes).
- pci: rockchip: Use 64-bit mask on MSI 64-bit PCI address (git-fixes).
- pci: switchtec: Fix an error handling path in switchtec_pci_probe() (git-fixes).
- pinctrl: mediatek: Drop bogus slew rate register range for MT8192 (git-fixes).
- platform/mellanox: mlxreg-hotplug: Remove redundant NULL-check (git-fixes).
- pm: suspend: Set mem_sleep_current during kernel command line setup (git-fixes).
- pnfs/flexfiles: Check the layout validity in ff_layout_mirror_prepare_stats (git-fixes).
- pnfs: Fix a hang in nfs4_evict_inode() (git-fixes).
- pnfs: Fix the pnfs block driver's calculation of layoutget size (git-fixes).
- powerpc/64s: POWER10 CPU Kconfig build option (bsc#1194869).
- powerpc/boot: Disable power10 features after BOOTAFLAGS assignment (bsc#1194869).
- powerpc/boot: Fix boot wrapper code generation with CONFIG_POWER10_CPU (bsc#1194869).
- powerpc/lib/sstep: Do not use __{get/put}_user() on kernel addresses (bsc#1194869).
- powerpc/lib/sstep: Remove unneeded #ifdef __powerpc64__ (bsc#1194869).
- powerpc/lib/sstep: Use l1_dcache_bytes() instead of opencoding (bsc#1194869).
- powerpc/lib/sstep: use truncate_if_32bit() (bsc#1194869).
- powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV (bsc#1220492 ltc#205270).
- powerpc/pseries: Fix potential memleak in papr_get_attr() (bsc#1200465 ltc#197256 jsc#SLE-18130 git-fixes).
- powerpc/sstep: Use bitwise instead of arithmetic operator for flags (bsc#1194869).
- powerpc: add compile-time support for lbarx, lharx (bsc#1194869).
- pwm: mediatek: Update kernel doc for struct pwm_mediatek_of_data (git-fixes).
- qedf: Do not process stag work during unload (bsc#1214852).
- qedf: Wait for stag work during unload (bsc#1214852).
- raid1: fix use-after-free for original bio in raid1_write_request() (bsc#1221097).
- ras/amd/fmpm: Add debugfs interface to print record entries (jsc#PED-7619).
- ras/amd/fmpm: Avoid NULL ptr deref in get_saved_records() (jsc#PED-7619).
- ras/amd/fmpm: Fix build when debugfs is not enabled (jsc#PED-7619).
- ras/amd/fmpm: Fix off by one when unwinding on error (jsc#PED-7619).
- ras/amd/fmpm: Safely handle saved records of various sizes (jsc#PED-7619).
- ras/amd/fmpm: Save SPA values (jsc#PED-7619).
- ras: Avoid build errors when CONFIG_DEBUG_FS=n (git-fixes).
- ras: export helper to get ras_debugfs_dir (jsc#PED-7619).
- rdma/device: Fix a race between mad_client and cm_client init (git-fixes)
- rdma/hns: fix mis-modifying default congestion control algorithm (git-fixes)
- rdma/ipoib: Fix error code return in ipoib_mcast_join (git-fixes)
- rdma/irdma: Remove duplicate assignment (git-fixes)
- rdma/mana_ib: Fix bug in creation of dma regions (git-fixes).
- rdma/mlx5: fix fortify source warning while accessing Eth segment (git-fixes)
- rdma/mlx5: relax DEVX access upon modify commands (git-fixes)
- rdma/rtrs-clt: Check strnlen return len in sysfs mpath_policy_store() (git-fixes)
- rdma/srpt: do not register event handler until srpt device is fully setup (git-fixes)
- revert 'PCI: tegra194: Enable support for 256 Byte payload' (git-fixes).
- revert 'Revert 'drm/amdgpu/display: change pipe policy for DCN 2.0'' (git-fixes).
- revert 'SUNRPC dont update timeout value on connection reset' (git-fixes).
- revert 'drm/amd: Disable PSR-SU on Parade 0803 TCON' (git-fixes).
- revert 'drm/amd: Disable S/G for APUs when 64GB or more host memory' (git-fixes).
- revert 'drm/amdgpu/display: change pipe policy for DCN 2.0' (git-fixes).
- revert 'drm/amdgpu/display: change pipe policy for DCN 2.1' (git-fixes).
- revert 'drm/vc4: hdmi: Enforce the minimum rate at runtime_resume' (git-fixes).
- revert 'fbdev: flush deferred IO before closing (git-fixes).' (bsc#1221814)
- ring-buffer: Clean ring_buffer_poll_wait() error return (git-fixes).
- rtc: mt6397: select IRQ_DOMAIN instead of depending on it (git-fixes).
- s390/pai: fix attr_event_free upper limit for pai device drivers (git-fixes bsc#1221633).
- s390/vfio-ap: realize the VFIO_DEVICE_GET_IRQ_INFO ioctl (bsc#1205316).
- s390/vfio-ap: realize the VFIO_DEVICE_SET_IRQS ioctl (bsc#1205316).
- s390/vfio-ap: wire in the vfio_device_ops request callback (bsc#1205316).
- s390/vtime: fix average steal time calculation (git-fixes bsc#1221951).
- sched/rt: Disallow writing invalid values to sched_rt_period_us (bsc#1220176).
- sched/rt: sysctl_sched_rr_timeslice show default timeslice after reset (bsc#1220176).
- scsi: lpfc: Copyright updates for 14.4.0.1 patches (bsc#1221777).
- scsi: lpfc: Correct size for cmdwqe/rspwqe for memset() (bsc#1221777).
- scsi: lpfc: Correct size for wqe for memset() (bsc#1221777).
- scsi: lpfc: Define lpfc_dmabuf type for ctx_buf ptr (bsc#1221777).
- scsi: lpfc: Define lpfc_nodelist type for ctx_ndlp ptr (bsc#1221777).
- scsi: lpfc: Define types in a union for generic void *context3 ptr (bsc#1221777).
- scsi: lpfc: Move NPIV's transport unregistration to after resource clean up (bsc#1221777).
- scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1221777).
- scsi: lpfc: Remove IRQF_ONESHOT flag from threaded IRQ handling (bsc#1221777 bsc#1217959).
- scsi: lpfc: Remove unnecessary log message in queuecommand path (bsc#1221777).
- scsi: lpfc: Replace hbalock with ndlp lock in lpfc_nvme_unregister_port() (bsc#1221777).
- scsi: lpfc: Update lpfc version to 14.4.0.1 (bsc#1221777).
- scsi: lpfc: Update lpfc_ramp_down_queue_handler() logic (bsc#1221777).
- scsi: lpfc: Use a dedicated lock for ras_fwlog state (bsc#1221777).
- scsi: qedf: Remove set but unused variable 'page' (bsc#1214852).
- scsi: qedf: Remove unused 'num_handled' variable (bsc#1214852).
- scsi: qedf: Remove unused declaration (bsc#1214852).
- scsi: qla2xxx: Change debug message during driver unload (bsc1221816).
- scsi: qla2xxx: Delay I/O Abort on PCI error (bsc1221816).
- scsi: qla2xxx: Fix N2N stuck connection (bsc1221816).
- scsi: qla2xxx: Fix command flush on cable pull (bsc1221816).
- scsi: qla2xxx: Fix double free of fcport (bsc1221816).
- scsi: qla2xxx: Fix double free of the ha-&gt;vp_map pointer (bsc1221816).
- scsi: qla2xxx: NVME|FCP prefer flag not being honored (bsc1221816).
- scsi: qla2xxx: Prevent command send on chip reset (bsc1221816).
- scsi: qla2xxx: Split FCE|EFT trace control (bsc1221816).
- scsi: qla2xxx: Update manufacturer detail (bsc1221816).
- scsi: qla2xxx: Update version to 10.02.09.200-k (bsc1221816).
- scsi: storvsc: Fix ring buffer size calculation (git-fixes).
- scsi: target: core: Silence the message about unknown VPD pages (bsc#1221252).
- selftests/bpf: add generic BPF program tester-loader (bsc#1222033).
- serial: 8250_exar: Do not remove GPIO device on suspend (git-fixes).
- serial: max310x: fix syntax error in IRQ error message (git-fixes).
- slimbus: core: Remove usage of the deprecated ida_simple_xx() API (git-fixes).
- soc: fsl: qbman: Always disable interrupts when taking cgr_lock (git-fixes).
- spi: lm70llp: fix links in doc and comments (git-fixes).
- spi: spi-mt65xx: Fix NULL pointer access in interrupt handler (git-fixes).
- sr9800: Add check for usbnet_get_endpoints (git-fixes).
- stackdepot: rename pool_index to pool_index_plus_1 (git-fixes).
- staging: vc04_services: fix information leak in create_component() (git-fixes).
- sunrpc: Add an IS_ERR() check back to where it was (git-fixes).
- sunrpc: ECONNRESET might require a rebind (git-fixes).
- sunrpc: Fix RPC client cleaned up the freed pipefs dentries (git-fixes).
- sunrpc: Fix a suspicious RCU usage warning (git-fixes).
- sunrpc: fix a memleak in gss_import_v2_context (git-fixes).
- sunrpc: fix some memleaks in gssx_dec_option_array (git-fixes).
- svcrdma: Drop connection after an RDMA Read error (git-fixes).
- topology/sysfs: Hide PPIN on systems that do not support it (jsc#PED-7618).
- topology: Fix up build warning in topology_is_visible() (jsc#PED-7618).
- tracing/probes: Fix to show a parse error for bad type for $comm (git-fixes).
- tracing: Fix wasted memory in saved_cmdlines logic (git-fixes).
- tracing: Inform kmemleak of saved_cmdlines allocation (git-fixes).
- tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (bsc#1222619).
- tty: serial: fsl_lpuart: avoid idle preamble pending if CTS is enabled (git-fixes).
- tty: serial: samsung: fix tx_empty() to return TIOCSER_TEMT (git-fixes).
- tty: vt: fix 20 vs 0x20 typo in EScsiignore (git-fixes).
- ubifs: Queue up space reservation tasks if retrying many times (git-fixes).
- ubifs: Remove unreachable code in dbg_check_ltab_lnum (git-fixes).
- ubifs: Set page uptodate in the correct place (git-fixes).
- ubifs: dbg_check_idx_size: Fix kmemleak if loading znode failed (git-fixes).
- ubifs: fix sort function prototype (git-fixes).
- usb: audio-v2: Correct comments for struct uac_clock_selector_descriptor (git-fixes).
- usb: cdc-wdm: close race between read and workqueue (git-fixes).
- usb: core: Fix deadlock in usb_deauthorize_interface() (git-fixes).
- usb: dwc2: gadget: Fix exiting from clock gating (git-fixes).
- usb: dwc2: gadget: LPM flow fix (git-fixes).
- usb: dwc2: host: Fix ISOC flow in DDMA mode (git-fixes).
- usb: dwc2: host: Fix hibernation flow (git-fixes).
- usb: dwc2: host: Fix remote wakeup from hibernation (git-fixes).
- usb: dwc3: Properly set system wakeup (git-fixes).
- usb: f_mass_storage: forbid async queue when shutdown happen (git-fixes).
- usb: gadget: ncm: Fix handling of zero block length packets (git-fixes).
- usb: gadget: net2272: Use irqflags in the call to net2272_probe_fin (git-fixes).
- usb: hub: Replace hardcoded quirk value with BIT() macro (git-fixes).
- usb: port: Do not try to peer unused USB ports based on location (git-fixes).
- usb: typec: Return size of buffer if pd_set operation succeeds (git-fixes).
- usb: typec: ucsi: Check for notifications after init (git-fixes).
- usb: typec: ucsi: Clean up UCSI_CABLE_PROP macros (git-fixes).
- usb: typec: ucsi: Clear EVENT_PENDING under PPM lock (git-fixes).
- usb: usb-storage: Prevent divide-by-0 error in isd200_ata_command (git-fixes).
- usb: xhci: Add error handling in xhci_map_urb_for_dma (git-fixes).
- vboxsf: Avoid an spurious warning if load_nls_xxx() fails (git-fixes).
- vt: fix unicode buffer corruption when deleting characters (git-fixes).
- watchdog: stm32_iwdg: initialize default timeout (git-fixes).
- wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (git-fixes).
- wifi: ath11k: decrease MHI channel buffer length to 8KB (bsc#1207948).
- wifi: ath11k: initialize rx_mcs_80 and rx_mcs_160 before use (git-fixes).
- wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete (git-fixes).
- wifi: b43: Disable QoS for bcm4331 (git-fixes).
- wifi: b43: Stop correct queue in DMA worker when QoS is disabled (git-fixes).
- wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabled (git-fixes).
- wifi: b43: Stop/wake correct queue in PIO Tx path when QoS is disabled (git-fixes).
- wifi: brcmfmac: fix copyright year mentioned in platform_data header (git-fixes).
- wifi: brcmsmac: avoid function pointer casts (git-fixes).
- wifi: iwlwifi: dbg-tlv: ensure NUL termination (git-fixes).
- wifi: iwlwifi: fix EWRD table validity check (git-fixes).
- wifi: iwlwifi: fw: do not always use FW dump trig (git-fixes).
- wifi: iwlwifi: mvm: do not set replay counters to 0xff (git-fixes).
- wifi: iwlwifi: mvm: report beacon protection failures (git-fixes).
- wifi: iwlwifi: mvm: rfi: fix potential response leaks (git-fixes).
- wifi: iwlwifi: mvm: use FW rate for non-data only on new devices (git-fixes).
- wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer() (git-fixes).
- wifi: mwifiex: debugfs: Drop unnecessary error check for debugfs_create_dir() (git-fixes).
- wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work (git-fixes).
- wifi: rtw88: 8821c: Fix false alarm count (git-fixes).
- wifi: wilc1000: fix RCU usage in connect path (git-fixes).
- wifi: wilc1000: fix declarations ordering (stable-fixes).
- wifi: wilc1000: fix multi-vif management when deleting a vif (git-fixes).
- wifi: wilc1000: prevent use-after-free on vif when cleaning up all interfaces (git-fixes).
- x86/CPU/AMD: Update the Zenbleed microcode revisions (git-fixes).
- x86/bugs: Fix the SRSO mitigation on Zen3/4 (git-fixes).
- x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (git-fixes).
- xhci: handle isoc Babble and Buffer Overrun events properly (git-fixes).
- xhci: process isoc TD properly when there was a transaction error mid TD (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-29"/>
	<updated date="2024-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200465">SUSE bug 1200465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205316">SUSE bug 1205316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207948">SUSE bug 1207948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209635">SUSE bug 1209635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209657">SUSE bug 1209657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212514">SUSE bug 1212514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213456">SUSE bug 1213456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214852">SUSE bug 1214852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215221">SUSE bug 1215221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215322">SUSE bug 1215322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217339">SUSE bug 1217339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217829">SUSE bug 1217829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217959">SUSE bug 1217959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217987">SUSE bug 1217987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217988">SUSE bug 1217988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217989">SUSE bug 1217989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218321">SUSE bug 1218321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218336">SUSE bug 1218336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218479">SUSE bug 1218479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218562">SUSE bug 1218562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218643">SUSE bug 1218643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218777">SUSE bug 1218777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219169">SUSE bug 1219169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219170">SUSE bug 1219170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219264">SUSE bug 1219264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219834">SUSE bug 1219834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220114">SUSE bug 1220114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220176">SUSE bug 1220176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220237">SUSE bug 1220237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220251">SUSE bug 1220251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220320">SUSE bug 1220320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220325">SUSE bug 1220325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220328">SUSE bug 1220328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220337">SUSE bug 1220337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220340">SUSE bug 1220340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220365">SUSE bug 1220365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220366">SUSE bug 1220366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220398">SUSE bug 1220398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220411">SUSE bug 1220411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220413">SUSE bug 1220413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220433">SUSE bug 1220433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220439">SUSE bug 1220439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220443">SUSE bug 1220443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220445">SUSE bug 1220445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220466">SUSE bug 1220466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220469">SUSE bug 1220469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220478">SUSE bug 1220478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220482">SUSE bug 1220482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220484">SUSE bug 1220484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220486">SUSE bug 1220486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220487">SUSE bug 1220487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220492">SUSE bug 1220492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220703">SUSE bug 1220703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220735">SUSE bug 1220735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220736">SUSE bug 1220736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220775">SUSE bug 1220775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220790">SUSE bug 1220790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220797">SUSE bug 1220797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220831">SUSE bug 1220831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220833">SUSE bug 1220833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220836">SUSE bug 1220836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220839">SUSE bug 1220839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220840">SUSE bug 1220840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220843">SUSE bug 1220843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220845">SUSE bug 1220845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220848">SUSE bug 1220848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220870">SUSE bug 1220870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220871">SUSE bug 1220871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220872">SUSE bug 1220872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220878">SUSE bug 1220878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220879">SUSE bug 1220879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220883">SUSE bug 1220883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220885">SUSE bug 1220885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220887">SUSE bug 1220887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220898">SUSE bug 1220898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220917">SUSE bug 1220917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220918">SUSE bug 1220918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220920">SUSE bug 1220920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220921">SUSE bug 1220921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220926">SUSE bug 1220926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220927">SUSE bug 1220927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220929">SUSE bug 1220929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220930">SUSE bug 1220930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220931">SUSE bug 1220931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220932">SUSE bug 1220932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220933">SUSE bug 1220933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220937">SUSE bug 1220937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220938">SUSE bug 1220938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220940">SUSE bug 1220940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220954">SUSE bug 1220954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220955">SUSE bug 1220955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220959">SUSE bug 1220959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220960">SUSE bug 1220960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220961">SUSE bug 1220961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220965">SUSE bug 1220965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220969">SUSE bug 1220969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220978">SUSE bug 1220978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220979">SUSE bug 1220979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220981">SUSE bug 1220981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220982">SUSE bug 1220982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220983">SUSE bug 1220983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220985">SUSE bug 1220985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220986">SUSE bug 1220986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220987">SUSE bug 1220987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220989">SUSE bug 1220989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220990">SUSE bug 1220990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221009">SUSE bug 1221009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221012">SUSE bug 1221012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221015">SUSE bug 1221015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221022">SUSE bug 1221022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221039">SUSE bug 1221039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221040">SUSE bug 1221040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221044">SUSE bug 1221044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221045">SUSE bug 1221045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221046">SUSE bug 1221046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221048">SUSE bug 1221048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221055">SUSE bug 1221055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221056">SUSE bug 1221056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221058">SUSE bug 1221058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221060">SUSE bug 1221060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221061">SUSE bug 1221061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221062">SUSE bug 1221062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221066">SUSE bug 1221066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221067">SUSE bug 1221067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221068">SUSE bug 1221068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221069">SUSE bug 1221069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221070">SUSE bug 1221070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221071">SUSE bug 1221071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221077">SUSE bug 1221077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221082">SUSE bug 1221082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221090">SUSE bug 1221090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221097">SUSE bug 1221097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221156">SUSE bug 1221156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221252">SUSE bug 1221252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221273">SUSE bug 1221273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221274">SUSE bug 1221274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221276">SUSE bug 1221276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221277">SUSE bug 1221277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221291">SUSE bug 1221291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221293">SUSE bug 1221293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221298">SUSE bug 1221298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221337">SUSE bug 1221337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221338">SUSE bug 1221338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221375">SUSE bug 1221375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221379">SUSE bug 1221379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221551">SUSE bug 1221551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221553">SUSE bug 1221553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221613">SUSE bug 1221613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221614">SUSE bug 1221614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221616">SUSE bug 1221616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221618">SUSE bug 1221618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221631">SUSE bug 1221631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221633">SUSE bug 1221633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221713">SUSE bug 1221713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221725">SUSE bug 1221725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221777">SUSE bug 1221777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221814">SUSE bug 1221814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221816">SUSE bug 1221816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221830">SUSE bug 1221830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221951">SUSE bug 1221951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222033">SUSE bug 1222033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222056">SUSE bug 1222056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222060">SUSE bug 1222060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222070">SUSE bug 1222070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222073">SUSE bug 1222073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222117">SUSE bug 1222117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222274">SUSE bug 1222274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222291">SUSE bug 1222291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222300">SUSE bug 1222300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222304">SUSE bug 1222304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222317">SUSE bug 1222317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222331">SUSE bug 1222331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222355">SUSE bug 1222355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222356">SUSE bug 1222356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222360">SUSE bug 1222360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222366">SUSE bug 1222366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222373">SUSE bug 1222373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222619">SUSE bug 1222619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222952">SUSE bug 1222952</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46925/">CVE-2021-46925 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46925">CVE-2021-46925 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46926/">CVE-2021-46926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46926">CVE-2021-46926 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46927/">CVE-2021-46927 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46927">CVE-2021-46927 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46929/">CVE-2021-46929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46929">CVE-2021-46929 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46930/">CVE-2021-46930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46930">CVE-2021-46930 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46931/">CVE-2021-46931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46931">CVE-2021-46931 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46933/">CVE-2021-46933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46933">CVE-2021-46933 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46934/">CVE-2021-46934 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46934">CVE-2021-46934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46936/">CVE-2021-46936 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46936">CVE-2021-46936 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47082/">CVE-2021-47082 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47082">CVE-2021-47082 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47083/">CVE-2021-47083 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47083">CVE-2021-47083 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47087/">CVE-2021-47087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47087">CVE-2021-47087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47091/">CVE-2021-47091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47091">CVE-2021-47091 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47093/">CVE-2021-47093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47093">CVE-2021-47093 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47094/">CVE-2021-47094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47094">CVE-2021-47094 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47095/">CVE-2021-47095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47095">CVE-2021-47095 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47096/">CVE-2021-47096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47096">CVE-2021-47096 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47097/">CVE-2021-47097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47097">CVE-2021-47097 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47098/">CVE-2021-47098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47098">CVE-2021-47098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47099/">CVE-2021-47099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47099">CVE-2021-47099 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47100/">CVE-2021-47100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47100">CVE-2021-47100 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47101/">CVE-2021-47101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47101">CVE-2021-47101 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47102/">CVE-2021-47102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47102">CVE-2021-47102 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47104/">CVE-2021-47104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47104">CVE-2021-47104 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47105/">CVE-2021-47105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47105">CVE-2021-47105 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47107/">CVE-2021-47107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47107">CVE-2021-47107 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47108/">CVE-2021-47108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47108">CVE-2021-47108 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4744/">CVE-2022-4744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4744">CVE-2022-4744 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48626/">CVE-2022-48626 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48626">CVE-2022-48626 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48627/">CVE-2022-48627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48627">CVE-2022-48627 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48628/">CVE-2022-48628 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48628">CVE-2022-48628 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48629/">CVE-2022-48629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48629">CVE-2022-48629 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48630/">CVE-2022-48630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48630">CVE-2022-48630 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0160/">CVE-2023-0160 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0160">CVE-2023-0160 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35827/">CVE-2023-35827 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35827">CVE-2023-35827 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4881/">CVE-2023-4881 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4881">CVE-2023-4881 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52447/">CVE-2023-52447 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52447">CVE-2023-52447 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52450/">CVE-2023-52450 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52450">CVE-2023-52450 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52453/">CVE-2023-52453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52453">CVE-2023-52453 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52454/">CVE-2023-52454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52454">CVE-2023-52454 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52462/">CVE-2023-52462 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52462">CVE-2023-52462 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52463/">CVE-2023-52463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52463">CVE-2023-52463 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52467/">CVE-2023-52467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52467">CVE-2023-52467 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52469/">CVE-2023-52469 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52469">CVE-2023-52469 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52470/">CVE-2023-52470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52470">CVE-2023-52470 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-52474/">CVE-2023-52474 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52474">CVE-2023-52474 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52476/">CVE-2023-52476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52476">CVE-2023-52476 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52477/">CVE-2023-52477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52477">CVE-2023-52477 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52481/">CVE-2023-52481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52481">CVE-2023-52481 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52482/">CVE-2023-52482 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52482">CVE-2023-52482 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52484/">CVE-2023-52484 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52484">CVE-2023-52484 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52486/">CVE-2023-52486 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52486">CVE-2023-52486 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52492/">CVE-2023-52492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52492">CVE-2023-52492 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52493/">CVE-2023-52493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52493">CVE-2023-52493 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52494/">CVE-2023-52494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52494">CVE-2023-52494 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52497/">CVE-2023-52497 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52497">CVE-2023-52497 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52500/">CVE-2023-52500 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52500">CVE-2023-52500 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52501/">CVE-2023-52501 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52501">CVE-2023-52501 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52502/">CVE-2023-52502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52502">CVE-2023-52502 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52504/">CVE-2023-52504 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52504">CVE-2023-52504 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52507/">CVE-2023-52507 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52507">CVE-2023-52507 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52508/">CVE-2023-52508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52508">CVE-2023-52508 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52509/">CVE-2023-52509 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52509">CVE-2023-52509 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52510/">CVE-2023-52510 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52510">CVE-2023-52510 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52511/">CVE-2023-52511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52511">CVE-2023-52511 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52513/">CVE-2023-52513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52513">CVE-2023-52513 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52515/">CVE-2023-52515 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52515">CVE-2023-52515 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52517/">CVE-2023-52517 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52517">CVE-2023-52517 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52518/">CVE-2023-52518 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52518">CVE-2023-52518 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52519/">CVE-2023-52519 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52519">CVE-2023-52519 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52520/">CVE-2023-52520 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52520">CVE-2023-52520 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52523/">CVE-2023-52523 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52523">CVE-2023-52523 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52524/">CVE-2023-52524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52524">CVE-2023-52524 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52525/">CVE-2023-52525 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52525">CVE-2023-52525 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52528/">CVE-2023-52528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52528">CVE-2023-52528 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52529/">CVE-2023-52529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52529">CVE-2023-52529 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52530/">CVE-2023-52530 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52530">CVE-2023-52530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52531/">CVE-2023-52531 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52531">CVE-2023-52531 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52532/">CVE-2023-52532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52532">CVE-2023-52532 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52559/">CVE-2023-52559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52559">CVE-2023-52559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52563/">CVE-2023-52563 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52563">CVE-2023-52563 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52564/">CVE-2023-52564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52564">CVE-2023-52564 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52566/">CVE-2023-52566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52566">CVE-2023-52566 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52567/">CVE-2023-52567 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52567">CVE-2023-52567 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52569/">CVE-2023-52569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52569">CVE-2023-52569 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52574/">CVE-2023-52574 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52574">CVE-2023-52574 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52575/">CVE-2023-52575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52575">CVE-2023-52575 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52576/">CVE-2023-52576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52576">CVE-2023-52576 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52582/">CVE-2023-52582 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52582">CVE-2023-52582 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52583/">CVE-2023-52583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52583">CVE-2023-52583 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52587/">CVE-2023-52587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52587">CVE-2023-52587 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52591/">CVE-2023-52591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52591">CVE-2023-52591 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52594/">CVE-2023-52594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52594">CVE-2023-52594 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52595/">CVE-2023-52595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52595">CVE-2023-52595 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52597/">CVE-2023-52597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52597">CVE-2023-52597 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52598/">CVE-2023-52598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52598">CVE-2023-52598 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52599/">CVE-2023-52599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52599">CVE-2023-52599 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52600/">CVE-2023-52600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52600">CVE-2023-52600 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52601/">CVE-2023-52601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52601">CVE-2023-52601 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52602/">CVE-2023-52602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52602">CVE-2023-52602 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52603/">CVE-2023-52603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52603">CVE-2023-52603 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52604/">CVE-2023-52604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52604">CVE-2023-52604 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52605/">CVE-2023-52605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52605">CVE-2023-52605 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52606/">CVE-2023-52606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52606">CVE-2023-52606 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52607/">CVE-2023-52607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52607">CVE-2023-52607 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52608/">CVE-2023-52608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52608">CVE-2023-52608 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52612/">CVE-2023-52612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52612">CVE-2023-52612 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52615/">CVE-2023-52615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52615">CVE-2023-52615 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52617/">CVE-2023-52617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52617">CVE-2023-52617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52619/">CVE-2023-52619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52619">CVE-2023-52619 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52621/">CVE-2023-52621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52621">CVE-2023-52621 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52623/">CVE-2023-52623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52623">CVE-2023-52623 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52628/">CVE-2023-52628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52628">CVE-2023-52628 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52632/">CVE-2023-52632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52632">CVE-2023-52632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52637/">CVE-2023-52637 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52637">CVE-2023-52637 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52639/">CVE-2023-52639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52639">CVE-2023-52639 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6270/">CVE-2023-6270 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6356/">CVE-2023-6356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6356">CVE-2023-6356 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6535/">CVE-2023-6535 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6535">CVE-2023-6535 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6536/">CVE-2023-6536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6536">CVE-2023-6536 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-7042/">CVE-2023-7042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7042">CVE-2023-7042 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-7192/">CVE-2023-7192 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7192">CVE-2023-7192 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0841/">CVE-2024-0841 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0841">CVE-2024-0841 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2201/">CVE-2024-2201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2201">CVE-2024-2201 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22099/">CVE-2024-22099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22099">CVE-2024-22099 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23307/">CVE-2024-23307 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23307">CVE-2024-23307 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25739/">CVE-2024-25739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25739">CVE-2024-25739 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25742/">CVE-2024-25742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25742">CVE-2024-25742 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26599/">CVE-2024-26599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26599">CVE-2024-26599 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26600/">CVE-2024-26600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26600">CVE-2024-26600 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26602/">CVE-2024-26602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26602">CVE-2024-26602 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26607/">CVE-2024-26607 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26607">CVE-2024-26607 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26612/">CVE-2024-26612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26612">CVE-2024-26612 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26614/">CVE-2024-26614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26614">CVE-2024-26614 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-26620/">CVE-2024-26620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26620">CVE-2024-26620 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26627/">CVE-2024-26627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26627">CVE-2024-26627 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26629/">CVE-2024-26629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26629">CVE-2024-26629 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26642/">CVE-2024-26642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26642">CVE-2024-26642 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26645/">CVE-2024-26645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26645">CVE-2024-26645 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-26646/">CVE-2024-26646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26646">CVE-2024-26646 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26651/">CVE-2024-26651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26651">CVE-2024-26651 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26654/">CVE-2024-26654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26654">CVE-2024-26654 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26659/">CVE-2024-26659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26659">CVE-2024-26659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26664/">CVE-2024-26664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26664">CVE-2024-26664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26667/">CVE-2024-26667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26667">CVE-2024-26667 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26670/">CVE-2024-26670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26670">CVE-2024-26670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26695/">CVE-2024-26695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26695">CVE-2024-26695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26717/">CVE-2024-26717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26717">CVE-2024-26717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858171" comment="cluster-md-kmp-rt-5.14.21-150500.13.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858172" comment="dlm-kmp-rt-5.14.21-150500.13.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858173" comment="gfs2-kmp-rt-5.14.21-150500.13.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858174" comment="kernel-devel-rt-5.14.21-150500.13.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858175" comment="kernel-rt-5.14.21-150500.13.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858176" comment="kernel-rt-devel-5.14.21-150500.13.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858177" comment="kernel-rt-extra-5.14.21-150500.13.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858178" comment="kernel-rt-livepatch-5.14.21-150500.13.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858179" comment="kernel-rt-livepatch-devel-5.14.21-150500.13.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858180" comment="kernel-rt-optional-5.14.21-150500.13.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858181" comment="kernel-rt-vdso-5.14.21-150500.13.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858182" comment="kernel-rt_debug-5.14.21-150500.13.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858183" comment="kernel-rt_debug-devel-5.14.21-150500.13.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858184" comment="kernel-rt_debug-livepatch-devel-5.14.21-150500.13.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858185" comment="kernel-rt_debug-vdso-5.14.21-150500.13.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858186" comment="kernel-source-rt-5.14.21-150500.13.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858187" comment="kernel-syms-rt-5.14.21-150500.13.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858188" comment="kselftests-kmp-rt-5.14.21-150500.13.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858189" comment="ocfs2-kmp-rt-5.14.21-150500.13.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858190" comment="reiserfs-kmp-rt-5.14.21-150500.13.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4684" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1190721" ref_url="https://bugzilla.suse.com/1190721" source="BUGZILLA"/>
		<reference ref_id="1190724" ref_url="https://bugzilla.suse.com/1190724" source="BUGZILLA"/>
		<reference ref_id="1190727" ref_url="https://bugzilla.suse.com/1190727" source="BUGZILLA"/>
		<reference ref_id="1190728" ref_url="https://bugzilla.suse.com/1190728" source="BUGZILLA"/>
		<reference ref_id="1190731" ref_url="https://bugzilla.suse.com/1190731" source="BUGZILLA"/>
		<reference ref_id="1190732" ref_url="https://bugzilla.suse.com/1190732" source="BUGZILLA"/>
		<reference ref_id="1223070" ref_url="https://bugzilla.suse.com/1223070" source="BUGZILLA"/>
		<reference ref_id="1223235" ref_url="https://bugzilla.suse.com/1223235" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-20894" ref_url="https://www.suse.com/security/cve/CVE-2020-20894/" source="CVE"/>
		<reference ref_id="CVE-2020-20898" ref_url="https://www.suse.com/security/cve/CVE-2020-20898/" source="CVE"/>
		<reference ref_id="CVE-2020-20900" ref_url="https://www.suse.com/security/cve/CVE-2020-20900/" source="CVE"/>
		<reference ref_id="CVE-2020-20901" ref_url="https://www.suse.com/security/cve/CVE-2020-20901/" source="CVE"/>
		<reference ref_id="CVE-2021-38090" ref_url="https://www.suse.com/security/cve/CVE-2021-38090/" source="CVE"/>
		<reference ref_id="CVE-2021-38091" ref_url="https://www.suse.com/security/cve/CVE-2021-38091/" source="CVE"/>
		<reference ref_id="CVE-2021-38094" ref_url="https://www.suse.com/security/cve/CVE-2021-38094/" source="CVE"/>
		<reference ref_id="CVE-2023-49502" ref_url="https://www.suse.com/security/cve/CVE-2023-49502/" source="CVE"/>
		<reference ref_id="CVE-2024-31578" ref_url="https://www.suse.com/security/cve/CVE-2024-31578/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1468-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035126.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg fixes the following issues:

- CVE-2024-31578: Fixed heap use-after-free via av_hwframe_ctx_init() when vulkan_frames init failed (bsc#1223070)
- CVE-2023-49502: Fixed heap buffer overflow via the ff_bwdif_filter_intra_c function in libavfilter/bwdifdsp.c (bsc#1223235)

Adding references for already fixed issues:
  
- CVE-2021-38091: Fixed integer overflow in function filter16_sobel in libavfilter/vf_convolution.c (bsc#1190732)
- CVE-2021-38090: Fixed integer overflow in function filter16_roberts in libavfilter/vf_convolution.c (bsc#1190731)
- CVE-2020-20898: Fixed integer overflow vulnerability in function filter16_prewitt in libavfilter/vf_convolution.c (bsc#1190724)
- CVE-2020-20901: Fixed buffer overflow vulnerability in function filter_frame in libavfilter/vf_fieldorder.c (bsc#1190728)
- CVE-2020-20900: Fixed buffer overflow vulnerability in function gaussian_blur in libavfilter/vf_edgedetect.c (bsc#1190727)
- CVE-2020-20894: Fixed buffer Overflow vulnerability in function gaussian_blur in libavfilter/vf_edgedetect.c (bsc#1190721)   
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-29"/>
	<updated date="2024-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190721">SUSE bug 1190721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190724">SUSE bug 1190724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190727">SUSE bug 1190727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190728">SUSE bug 1190728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190731">SUSE bug 1190731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190732">SUSE bug 1190732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223070">SUSE bug 1223070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223235">SUSE bug 1223235</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20894/">CVE-2020-20894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-20894">CVE-2020-20894 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20898/">CVE-2020-20898 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-20898">CVE-2020-20898 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20900/">CVE-2020-20900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-20900">CVE-2020-20900 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20901/">CVE-2020-20901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2020-20901">CVE-2020-20901 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38090/">CVE-2021-38090 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38090">CVE-2021-38090 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38091/">CVE-2021-38091 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38091">CVE-2021-38091 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38094/">CVE-2021-38094 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38094">CVE-2021-38094 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-49502/">CVE-2023-49502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-49502">CVE-2023-49502 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31578/">CVE-2024-31578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31578">CVE-2024-31578 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858191" comment="ffmpeg-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858192" comment="ffmpeg-private-devel-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858193" comment="libavcodec-devel-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858194" comment="libavcodec57-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858195" comment="libavcodec57-32bit-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858196" comment="libavdevice-devel-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858197" comment="libavdevice57-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858198" comment="libavdevice57-32bit-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858199" comment="libavfilter-devel-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858200" comment="libavfilter6-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858201" comment="libavfilter6-32bit-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858202" comment="libavformat-devel-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858203" comment="libavformat57-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858204" comment="libavformat57-32bit-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858205" comment="libavresample-devel-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858206" comment="libavresample3-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858207" comment="libavresample3-32bit-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858208" comment="libavutil-devel-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858209" comment="libavutil55-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858210" comment="libavutil55-32bit-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858211" comment="libpostproc-devel-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858212" comment="libpostproc54-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858213" comment="libpostproc54-32bit-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858214" comment="libswresample-devel-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858215" comment="libswresample2-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858216" comment="libswresample2-32bit-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858217" comment="libswscale-devel-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858218" comment="libswscale4-3.4.2-150200.11.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858219" comment="libswscale4-32bit-3.4.2-150200.11.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4685" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg-4 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223070" ref_url="https://bugzilla.suse.com/1223070" source="BUGZILLA"/>
		<reference ref_id="1223235" ref_url="https://bugzilla.suse.com/1223235" source="BUGZILLA"/>
		<reference ref_id="1223272" ref_url="https://bugzilla.suse.com/1223272" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-49502" ref_url="https://www.suse.com/security/cve/CVE-2023-49502/" source="CVE"/>
		<reference ref_id="CVE-2023-51793" ref_url="https://www.suse.com/security/cve/CVE-2023-51793/" source="CVE"/>
		<reference ref_id="CVE-2024-31578" ref_url="https://www.suse.com/security/cve/CVE-2024-31578/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035125.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg-4 fixes the following issues:

- CVE-2024-31578: Fixed heap use-after-free via av_hwframe_ctx_init() when vulkan_frames init failed (bsc#1223070)
- CVE-2023-49502: Fixed heap buffer overflow via the ff_bwdif_filter_intra_c function in libavfilter/bwdifdsp.c (bsc#1223235)
- CVE-2023-51793: Fixed heap buffer overflow in the image_copy_plane function in libavutil/imgutils.c (bsc#1223272)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-29"/>
	<updated date="2024-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223070">SUSE bug 1223070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223235">SUSE bug 1223235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223272">SUSE bug 1223272</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-49502/">CVE-2023-49502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-49502">CVE-2023-49502 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51793/">CVE-2023-51793 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51793">CVE-2023-51793 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31578/">CVE-2024-31578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31578">CVE-2024-31578 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858220" comment="ffmpeg-4-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858221" comment="ffmpeg-4-libavcodec-devel-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858222" comment="ffmpeg-4-libavdevice-devel-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858223" comment="ffmpeg-4-libavfilter-devel-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858224" comment="ffmpeg-4-libavformat-devel-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858225" comment="ffmpeg-4-libavresample-devel-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858226" comment="ffmpeg-4-libavutil-devel-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858227" comment="ffmpeg-4-libpostproc-devel-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858228" comment="ffmpeg-4-libswresample-devel-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858229" comment="ffmpeg-4-libswscale-devel-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858230" comment="ffmpeg-4-private-devel-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858231" comment="libavcodec58_134-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858232" comment="libavcodec58_134-32bit-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858233" comment="libavdevice58_13-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858234" comment="libavdevice58_13-32bit-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858235" comment="libavfilter7_110-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858236" comment="libavfilter7_110-32bit-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858237" comment="libavformat58_76-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858238" comment="libavformat58_76-32bit-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858239" comment="libavresample4_0-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858240" comment="libavresample4_0-32bit-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858241" comment="libavutil56_70-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858242" comment="libavutil56_70-32bit-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858243" comment="libpostproc55_9-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858244" comment="libpostproc55_9-32bit-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858245" comment="libswresample3_9-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858246" comment="libswresample3_9-32bit-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858247" comment="libswscale5_9-4.4-150400.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858248" comment="libswscale5_9-32bit-4.4-150400.3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4686" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1200465" ref_url="https://bugzilla.suse.com/1200465" source="BUGZILLA"/>
		<reference ref_id="1205316" ref_url="https://bugzilla.suse.com/1205316" source="BUGZILLA"/>
		<reference ref_id="1207948" ref_url="https://bugzilla.suse.com/1207948" source="BUGZILLA"/>
		<reference ref_id="1209635" ref_url="https://bugzilla.suse.com/1209635" source="BUGZILLA"/>
		<reference ref_id="1209657" ref_url="https://bugzilla.suse.com/1209657" source="BUGZILLA"/>
		<reference ref_id="1212514" ref_url="https://bugzilla.suse.com/1212514" source="BUGZILLA"/>
		<reference ref_id="1213456" ref_url="https://bugzilla.suse.com/1213456" source="BUGZILLA"/>
		<reference ref_id="1214852" ref_url="https://bugzilla.suse.com/1214852" source="BUGZILLA"/>
		<reference ref_id="1215221" ref_url="https://bugzilla.suse.com/1215221" source="BUGZILLA"/>
		<reference ref_id="1215322" ref_url="https://bugzilla.suse.com/1215322" source="BUGZILLA"/>
		<reference ref_id="1217339" ref_url="https://bugzilla.suse.com/1217339" source="BUGZILLA"/>
		<reference ref_id="1217829" ref_url="https://bugzilla.suse.com/1217829" source="BUGZILLA"/>
		<reference ref_id="1217959" ref_url="https://bugzilla.suse.com/1217959" source="BUGZILLA"/>
		<reference ref_id="1217987" ref_url="https://bugzilla.suse.com/1217987" source="BUGZILLA"/>
		<reference ref_id="1217988" ref_url="https://bugzilla.suse.com/1217988" source="BUGZILLA"/>
		<reference ref_id="1217989" ref_url="https://bugzilla.suse.com/1217989" source="BUGZILLA"/>
		<reference ref_id="1218321" ref_url="https://bugzilla.suse.com/1218321" source="BUGZILLA"/>
		<reference ref_id="1218336" ref_url="https://bugzilla.suse.com/1218336" source="BUGZILLA"/>
		<reference ref_id="1218479" ref_url="https://bugzilla.suse.com/1218479" source="BUGZILLA"/>
		<reference ref_id="1218562" ref_url="https://bugzilla.suse.com/1218562" source="BUGZILLA"/>
		<reference ref_id="1218643" ref_url="https://bugzilla.suse.com/1218643" source="BUGZILLA"/>
		<reference ref_id="1218777" ref_url="https://bugzilla.suse.com/1218777" source="BUGZILLA"/>
		<reference ref_id="1219169" ref_url="https://bugzilla.suse.com/1219169" source="BUGZILLA"/>
		<reference ref_id="1219170" ref_url="https://bugzilla.suse.com/1219170" source="BUGZILLA"/>
		<reference ref_id="1219264" ref_url="https://bugzilla.suse.com/1219264" source="BUGZILLA"/>
		<reference ref_id="1219443" ref_url="https://bugzilla.suse.com/1219443" source="BUGZILLA"/>
		<reference ref_id="1219834" ref_url="https://bugzilla.suse.com/1219834" source="BUGZILLA"/>
		<reference ref_id="1220114" ref_url="https://bugzilla.suse.com/1220114" source="BUGZILLA"/>
		<reference ref_id="1220176" ref_url="https://bugzilla.suse.com/1220176" source="BUGZILLA"/>
		<reference ref_id="1220237" ref_url="https://bugzilla.suse.com/1220237" source="BUGZILLA"/>
		<reference ref_id="1220251" ref_url="https://bugzilla.suse.com/1220251" source="BUGZILLA"/>
		<reference ref_id="1220320" ref_url="https://bugzilla.suse.com/1220320" source="BUGZILLA"/>
		<reference ref_id="1220325" ref_url="https://bugzilla.suse.com/1220325" source="BUGZILLA"/>
		<reference ref_id="1220328" ref_url="https://bugzilla.suse.com/1220328" source="BUGZILLA"/>
		<reference ref_id="1220337" ref_url="https://bugzilla.suse.com/1220337" source="BUGZILLA"/>
		<reference ref_id="1220340" ref_url="https://bugzilla.suse.com/1220340" source="BUGZILLA"/>
		<reference ref_id="1220365" ref_url="https://bugzilla.suse.com/1220365" source="BUGZILLA"/>
		<reference ref_id="1220366" ref_url="https://bugzilla.suse.com/1220366" source="BUGZILLA"/>
		<reference ref_id="1220393" ref_url="https://bugzilla.suse.com/1220393" source="BUGZILLA"/>
		<reference ref_id="1220398" ref_url="https://bugzilla.suse.com/1220398" source="BUGZILLA"/>
		<reference ref_id="1220411" ref_url="https://bugzilla.suse.com/1220411" source="BUGZILLA"/>
		<reference ref_id="1220413" ref_url="https://bugzilla.suse.com/1220413" source="BUGZILLA"/>
		<reference ref_id="1220433" ref_url="https://bugzilla.suse.com/1220433" source="BUGZILLA"/>
		<reference ref_id="1220439" ref_url="https://bugzilla.suse.com/1220439" source="BUGZILLA"/>
		<reference ref_id="1220443" ref_url="https://bugzilla.suse.com/1220443" source="BUGZILLA"/>
		<reference ref_id="1220445" ref_url="https://bugzilla.suse.com/1220445" source="BUGZILLA"/>
		<reference ref_id="1220466" ref_url="https://bugzilla.suse.com/1220466" source="BUGZILLA"/>
		<reference ref_id="1220469" ref_url="https://bugzilla.suse.com/1220469" source="BUGZILLA"/>
		<reference ref_id="1220478" ref_url="https://bugzilla.suse.com/1220478" source="BUGZILLA"/>
		<reference ref_id="1220482" ref_url="https://bugzilla.suse.com/1220482" source="BUGZILLA"/>
		<reference ref_id="1220484" ref_url="https://bugzilla.suse.com/1220484" source="BUGZILLA"/>
		<reference ref_id="1220486" ref_url="https://bugzilla.suse.com/1220486" source="BUGZILLA"/>
		<reference ref_id="1220487" ref_url="https://bugzilla.suse.com/1220487" source="BUGZILLA"/>
		<reference ref_id="1220492" ref_url="https://bugzilla.suse.com/1220492" source="BUGZILLA"/>
		<reference ref_id="1220703" ref_url="https://bugzilla.suse.com/1220703" source="BUGZILLA"/>
		<reference ref_id="1220735" ref_url="https://bugzilla.suse.com/1220735" source="BUGZILLA"/>
		<reference ref_id="1220736" ref_url="https://bugzilla.suse.com/1220736" source="BUGZILLA"/>
		<reference ref_id="1220775" ref_url="https://bugzilla.suse.com/1220775" source="BUGZILLA"/>
		<reference ref_id="1220790" ref_url="https://bugzilla.suse.com/1220790" source="BUGZILLA"/>
		<reference ref_id="1220797" ref_url="https://bugzilla.suse.com/1220797" source="BUGZILLA"/>
		<reference ref_id="1220831" ref_url="https://bugzilla.suse.com/1220831" source="BUGZILLA"/>
		<reference ref_id="1220833" ref_url="https://bugzilla.suse.com/1220833" source="BUGZILLA"/>
		<reference ref_id="1220836" ref_url="https://bugzilla.suse.com/1220836" source="BUGZILLA"/>
		<reference ref_id="1220839" ref_url="https://bugzilla.suse.com/1220839" source="BUGZILLA"/>
		<reference ref_id="1220840" ref_url="https://bugzilla.suse.com/1220840" source="BUGZILLA"/>
		<reference ref_id="1220843" ref_url="https://bugzilla.suse.com/1220843" source="BUGZILLA"/>
		<reference ref_id="1220845" ref_url="https://bugzilla.suse.com/1220845" source="BUGZILLA"/>
		<reference ref_id="1220848" ref_url="https://bugzilla.suse.com/1220848" source="BUGZILLA"/>
		<reference ref_id="1220870" ref_url="https://bugzilla.suse.com/1220870" source="BUGZILLA"/>
		<reference ref_id="1220871" ref_url="https://bugzilla.suse.com/1220871" source="BUGZILLA"/>
		<reference ref_id="1220872" ref_url="https://bugzilla.suse.com/1220872" source="BUGZILLA"/>
		<reference ref_id="1220878" ref_url="https://bugzilla.suse.com/1220878" source="BUGZILLA"/>
		<reference ref_id="1220879" ref_url="https://bugzilla.suse.com/1220879" source="BUGZILLA"/>
		<reference ref_id="1220883" ref_url="https://bugzilla.suse.com/1220883" source="BUGZILLA"/>
		<reference ref_id="1220885" ref_url="https://bugzilla.suse.com/1220885" source="BUGZILLA"/>
		<reference ref_id="1220887" ref_url="https://bugzilla.suse.com/1220887" source="BUGZILLA"/>
		<reference ref_id="1220898" ref_url="https://bugzilla.suse.com/1220898" source="BUGZILLA"/>
		<reference ref_id="1220917" ref_url="https://bugzilla.suse.com/1220917" source="BUGZILLA"/>
		<reference ref_id="1220918" ref_url="https://bugzilla.suse.com/1220918" source="BUGZILLA"/>
		<reference ref_id="1220920" ref_url="https://bugzilla.suse.com/1220920" source="BUGZILLA"/>
		<reference ref_id="1220921" ref_url="https://bugzilla.suse.com/1220921" source="BUGZILLA"/>
		<reference ref_id="1220926" ref_url="https://bugzilla.suse.com/1220926" source="BUGZILLA"/>
		<reference ref_id="1220927" ref_url="https://bugzilla.suse.com/1220927" source="BUGZILLA"/>
		<reference ref_id="1220929" ref_url="https://bugzilla.suse.com/1220929" source="BUGZILLA"/>
		<reference ref_id="1220930" ref_url="https://bugzilla.suse.com/1220930" source="BUGZILLA"/>
		<reference ref_id="1220931" ref_url="https://bugzilla.suse.com/1220931" source="BUGZILLA"/>
		<reference ref_id="1220932" ref_url="https://bugzilla.suse.com/1220932" source="BUGZILLA"/>
		<reference ref_id="1220933" ref_url="https://bugzilla.suse.com/1220933" source="BUGZILLA"/>
		<reference ref_id="1220937" ref_url="https://bugzilla.suse.com/1220937" source="BUGZILLA"/>
		<reference ref_id="1220938" ref_url="https://bugzilla.suse.com/1220938" source="BUGZILLA"/>
		<reference ref_id="1220940" ref_url="https://bugzilla.suse.com/1220940" source="BUGZILLA"/>
		<reference ref_id="1220954" ref_url="https://bugzilla.suse.com/1220954" source="BUGZILLA"/>
		<reference ref_id="1220955" ref_url="https://bugzilla.suse.com/1220955" source="BUGZILLA"/>
		<reference ref_id="1220959" ref_url="https://bugzilla.suse.com/1220959" source="BUGZILLA"/>
		<reference ref_id="1220960" ref_url="https://bugzilla.suse.com/1220960" source="BUGZILLA"/>
		<reference ref_id="1220961" ref_url="https://bugzilla.suse.com/1220961" source="BUGZILLA"/>
		<reference ref_id="1220965" ref_url="https://bugzilla.suse.com/1220965" source="BUGZILLA"/>
		<reference ref_id="1220969" ref_url="https://bugzilla.suse.com/1220969" source="BUGZILLA"/>
		<reference ref_id="1220978" ref_url="https://bugzilla.suse.com/1220978" source="BUGZILLA"/>
		<reference ref_id="1220979" ref_url="https://bugzilla.suse.com/1220979" source="BUGZILLA"/>
		<reference ref_id="1220981" ref_url="https://bugzilla.suse.com/1220981" source="BUGZILLA"/>
		<reference ref_id="1220982" ref_url="https://bugzilla.suse.com/1220982" source="BUGZILLA"/>
		<reference ref_id="1220983" ref_url="https://bugzilla.suse.com/1220983" source="BUGZILLA"/>
		<reference ref_id="1220985" ref_url="https://bugzilla.suse.com/1220985" source="BUGZILLA"/>
		<reference ref_id="1220986" ref_url="https://bugzilla.suse.com/1220986" source="BUGZILLA"/>
		<reference ref_id="1220987" ref_url="https://bugzilla.suse.com/1220987" source="BUGZILLA"/>
		<reference ref_id="1220989" ref_url="https://bugzilla.suse.com/1220989" source="BUGZILLA"/>
		<reference ref_id="1220990" ref_url="https://bugzilla.suse.com/1220990" source="BUGZILLA"/>
		<reference ref_id="1221009" ref_url="https://bugzilla.suse.com/1221009" source="BUGZILLA"/>
		<reference ref_id="1221012" ref_url="https://bugzilla.suse.com/1221012" source="BUGZILLA"/>
		<reference ref_id="1221015" ref_url="https://bugzilla.suse.com/1221015" source="BUGZILLA"/>
		<reference ref_id="1221022" ref_url="https://bugzilla.suse.com/1221022" source="BUGZILLA"/>
		<reference ref_id="1221039" ref_url="https://bugzilla.suse.com/1221039" source="BUGZILLA"/>
		<reference ref_id="1221040" ref_url="https://bugzilla.suse.com/1221040" source="BUGZILLA"/>
		<reference ref_id="1221044" ref_url="https://bugzilla.suse.com/1221044" source="BUGZILLA"/>
		<reference ref_id="1221045" ref_url="https://bugzilla.suse.com/1221045" source="BUGZILLA"/>
		<reference ref_id="1221046" ref_url="https://bugzilla.suse.com/1221046" source="BUGZILLA"/>
		<reference ref_id="1221048" ref_url="https://bugzilla.suse.com/1221048" source="BUGZILLA"/>
		<reference ref_id="1221055" ref_url="https://bugzilla.suse.com/1221055" source="BUGZILLA"/>
		<reference ref_id="1221056" ref_url="https://bugzilla.suse.com/1221056" source="BUGZILLA"/>
		<reference ref_id="1221058" ref_url="https://bugzilla.suse.com/1221058" source="BUGZILLA"/>
		<reference ref_id="1221060" ref_url="https://bugzilla.suse.com/1221060" source="BUGZILLA"/>
		<reference ref_id="1221061" ref_url="https://bugzilla.suse.com/1221061" source="BUGZILLA"/>
		<reference ref_id="1221062" ref_url="https://bugzilla.suse.com/1221062" source="BUGZILLA"/>
		<reference ref_id="1221066" ref_url="https://bugzilla.suse.com/1221066" source="BUGZILLA"/>
		<reference ref_id="1221067" ref_url="https://bugzilla.suse.com/1221067" source="BUGZILLA"/>
		<reference ref_id="1221068" ref_url="https://bugzilla.suse.com/1221068" source="BUGZILLA"/>
		<reference ref_id="1221069" ref_url="https://bugzilla.suse.com/1221069" source="BUGZILLA"/>
		<reference ref_id="1221070" ref_url="https://bugzilla.suse.com/1221070" source="BUGZILLA"/>
		<reference ref_id="1221071" ref_url="https://bugzilla.suse.com/1221071" source="BUGZILLA"/>
		<reference ref_id="1221077" ref_url="https://bugzilla.suse.com/1221077" source="BUGZILLA"/>
		<reference ref_id="1221082" ref_url="https://bugzilla.suse.com/1221082" source="BUGZILLA"/>
		<reference ref_id="1221090" ref_url="https://bugzilla.suse.com/1221090" source="BUGZILLA"/>
		<reference ref_id="1221097" ref_url="https://bugzilla.suse.com/1221097" source="BUGZILLA"/>
		<reference ref_id="1221156" ref_url="https://bugzilla.suse.com/1221156" source="BUGZILLA"/>
		<reference ref_id="1221252" ref_url="https://bugzilla.suse.com/1221252" source="BUGZILLA"/>
		<reference ref_id="1221273" ref_url="https://bugzilla.suse.com/1221273" source="BUGZILLA"/>
		<reference ref_id="1221274" ref_url="https://bugzilla.suse.com/1221274" source="BUGZILLA"/>
		<reference ref_id="1221276" ref_url="https://bugzilla.suse.com/1221276" source="BUGZILLA"/>
		<reference ref_id="1221277" ref_url="https://bugzilla.suse.com/1221277" source="BUGZILLA"/>
		<reference ref_id="1221291" ref_url="https://bugzilla.suse.com/1221291" source="BUGZILLA"/>
		<reference ref_id="1221293" ref_url="https://bugzilla.suse.com/1221293" source="BUGZILLA"/>
		<reference ref_id="1221298" ref_url="https://bugzilla.suse.com/1221298" source="BUGZILLA"/>
		<reference ref_id="1221337" ref_url="https://bugzilla.suse.com/1221337" source="BUGZILLA"/>
		<reference ref_id="1221338" ref_url="https://bugzilla.suse.com/1221338" source="BUGZILLA"/>
		<reference ref_id="1221375" ref_url="https://bugzilla.suse.com/1221375" source="BUGZILLA"/>
		<reference ref_id="1221379" ref_url="https://bugzilla.suse.com/1221379" source="BUGZILLA"/>
		<reference ref_id="1221551" ref_url="https://bugzilla.suse.com/1221551" source="BUGZILLA"/>
		<reference ref_id="1221553" ref_url="https://bugzilla.suse.com/1221553" source="BUGZILLA"/>
		<reference ref_id="1221613" ref_url="https://bugzilla.suse.com/1221613" source="BUGZILLA"/>
		<reference ref_id="1221614" ref_url="https://bugzilla.suse.com/1221614" source="BUGZILLA"/>
		<reference ref_id="1221616" ref_url="https://bugzilla.suse.com/1221616" source="BUGZILLA"/>
		<reference ref_id="1221618" ref_url="https://bugzilla.suse.com/1221618" source="BUGZILLA"/>
		<reference ref_id="1221631" ref_url="https://bugzilla.suse.com/1221631" source="BUGZILLA"/>
		<reference ref_id="1221633" ref_url="https://bugzilla.suse.com/1221633" source="BUGZILLA"/>
		<reference ref_id="1221713" ref_url="https://bugzilla.suse.com/1221713" source="BUGZILLA"/>
		<reference ref_id="1221725" ref_url="https://bugzilla.suse.com/1221725" source="BUGZILLA"/>
		<reference ref_id="1221777" ref_url="https://bugzilla.suse.com/1221777" source="BUGZILLA"/>
		<reference ref_id="1221814" ref_url="https://bugzilla.suse.com/1221814" source="BUGZILLA"/>
		<reference ref_id="1221816" ref_url="https://bugzilla.suse.com/1221816" source="BUGZILLA"/>
		<reference ref_id="1221830" ref_url="https://bugzilla.suse.com/1221830" source="BUGZILLA"/>
		<reference ref_id="1221951" ref_url="https://bugzilla.suse.com/1221951" source="BUGZILLA"/>
		<reference ref_id="1222033" ref_url="https://bugzilla.suse.com/1222033" source="BUGZILLA"/>
		<reference ref_id="1222056" ref_url="https://bugzilla.suse.com/1222056" source="BUGZILLA"/>
		<reference ref_id="1222060" ref_url="https://bugzilla.suse.com/1222060" source="BUGZILLA"/>
		<reference ref_id="1222070" ref_url="https://bugzilla.suse.com/1222070" source="BUGZILLA"/>
		<reference ref_id="1222073" ref_url="https://bugzilla.suse.com/1222073" source="BUGZILLA"/>
		<reference ref_id="1222117" ref_url="https://bugzilla.suse.com/1222117" source="BUGZILLA"/>
		<reference ref_id="1222274" ref_url="https://bugzilla.suse.com/1222274" source="BUGZILLA"/>
		<reference ref_id="1222291" ref_url="https://bugzilla.suse.com/1222291" source="BUGZILLA"/>
		<reference ref_id="1222300" ref_url="https://bugzilla.suse.com/1222300" source="BUGZILLA"/>
		<reference ref_id="1222304" ref_url="https://bugzilla.suse.com/1222304" source="BUGZILLA"/>
		<reference ref_id="1222317" ref_url="https://bugzilla.suse.com/1222317" source="BUGZILLA"/>
		<reference ref_id="1222331" ref_url="https://bugzilla.suse.com/1222331" source="BUGZILLA"/>
		<reference ref_id="1222355" ref_url="https://bugzilla.suse.com/1222355" source="BUGZILLA"/>
		<reference ref_id="1222356" ref_url="https://bugzilla.suse.com/1222356" source="BUGZILLA"/>
		<reference ref_id="1222360" ref_url="https://bugzilla.suse.com/1222360" source="BUGZILLA"/>
		<reference ref_id="1222366" ref_url="https://bugzilla.suse.com/1222366" source="BUGZILLA"/>
		<reference ref_id="1222373" ref_url="https://bugzilla.suse.com/1222373" source="BUGZILLA"/>
		<reference ref_id="1222619" ref_url="https://bugzilla.suse.com/1222619" source="BUGZILLA"/>
		<reference ref_id="1222952" ref_url="https://bugzilla.suse.com/1222952" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46925" ref_url="https://www.suse.com/security/cve/CVE-2021-46925/" source="CVE"/>
		<reference ref_id="CVE-2021-46926" ref_url="https://www.suse.com/security/cve/CVE-2021-46926/" source="CVE"/>
		<reference ref_id="CVE-2021-46927" ref_url="https://www.suse.com/security/cve/CVE-2021-46927/" source="CVE"/>
		<reference ref_id="CVE-2021-46929" ref_url="https://www.suse.com/security/cve/CVE-2021-46929/" source="CVE"/>
		<reference ref_id="CVE-2021-46930" ref_url="https://www.suse.com/security/cve/CVE-2021-46930/" source="CVE"/>
		<reference ref_id="CVE-2021-46931" ref_url="https://www.suse.com/security/cve/CVE-2021-46931/" source="CVE"/>
		<reference ref_id="CVE-2021-46933" ref_url="https://www.suse.com/security/cve/CVE-2021-46933/" source="CVE"/>
		<reference ref_id="CVE-2021-46934" ref_url="https://www.suse.com/security/cve/CVE-2021-46934/" source="CVE"/>
		<reference ref_id="CVE-2021-46936" ref_url="https://www.suse.com/security/cve/CVE-2021-46936/" source="CVE"/>
		<reference ref_id="CVE-2021-47082" ref_url="https://www.suse.com/security/cve/CVE-2021-47082/" source="CVE"/>
		<reference ref_id="CVE-2021-47083" ref_url="https://www.suse.com/security/cve/CVE-2021-47083/" source="CVE"/>
		<reference ref_id="CVE-2021-47087" ref_url="https://www.suse.com/security/cve/CVE-2021-47087/" source="CVE"/>
		<reference ref_id="CVE-2021-47091" ref_url="https://www.suse.com/security/cve/CVE-2021-47091/" source="CVE"/>
		<reference ref_id="CVE-2021-47093" ref_url="https://www.suse.com/security/cve/CVE-2021-47093/" source="CVE"/>
		<reference ref_id="CVE-2021-47094" ref_url="https://www.suse.com/security/cve/CVE-2021-47094/" source="CVE"/>
		<reference ref_id="CVE-2021-47095" ref_url="https://www.suse.com/security/cve/CVE-2021-47095/" source="CVE"/>
		<reference ref_id="CVE-2021-47096" ref_url="https://www.suse.com/security/cve/CVE-2021-47096/" source="CVE"/>
		<reference ref_id="CVE-2021-47097" ref_url="https://www.suse.com/security/cve/CVE-2021-47097/" source="CVE"/>
		<reference ref_id="CVE-2021-47098" ref_url="https://www.suse.com/security/cve/CVE-2021-47098/" source="CVE"/>
		<reference ref_id="CVE-2021-47099" ref_url="https://www.suse.com/security/cve/CVE-2021-47099/" source="CVE"/>
		<reference ref_id="CVE-2021-47100" ref_url="https://www.suse.com/security/cve/CVE-2021-47100/" source="CVE"/>
		<reference ref_id="CVE-2021-47101" ref_url="https://www.suse.com/security/cve/CVE-2021-47101/" source="CVE"/>
		<reference ref_id="CVE-2021-47102" ref_url="https://www.suse.com/security/cve/CVE-2021-47102/" source="CVE"/>
		<reference ref_id="CVE-2021-47104" ref_url="https://www.suse.com/security/cve/CVE-2021-47104/" source="CVE"/>
		<reference ref_id="CVE-2021-47105" ref_url="https://www.suse.com/security/cve/CVE-2021-47105/" source="CVE"/>
		<reference ref_id="CVE-2021-47107" ref_url="https://www.suse.com/security/cve/CVE-2021-47107/" source="CVE"/>
		<reference ref_id="CVE-2021-47108" ref_url="https://www.suse.com/security/cve/CVE-2021-47108/" source="CVE"/>
		<reference ref_id="CVE-2022-4744" ref_url="https://www.suse.com/security/cve/CVE-2022-4744/" source="CVE"/>
		<reference ref_id="CVE-2022-48626" ref_url="https://www.suse.com/security/cve/CVE-2022-48626/" source="CVE"/>
		<reference ref_id="CVE-2022-48627" ref_url="https://www.suse.com/security/cve/CVE-2022-48627/" source="CVE"/>
		<reference ref_id="CVE-2022-48628" ref_url="https://www.suse.com/security/cve/CVE-2022-48628/" source="CVE"/>
		<reference ref_id="CVE-2022-48629" ref_url="https://www.suse.com/security/cve/CVE-2022-48629/" source="CVE"/>
		<reference ref_id="CVE-2022-48630" ref_url="https://www.suse.com/security/cve/CVE-2022-48630/" source="CVE"/>
		<reference ref_id="CVE-2023-0160" ref_url="https://www.suse.com/security/cve/CVE-2023-0160/" source="CVE"/>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<reference ref_id="CVE-2023-35827" ref_url="https://www.suse.com/security/cve/CVE-2023-35827/" source="CVE"/>
		<reference ref_id="CVE-2023-4881" ref_url="https://www.suse.com/security/cve/CVE-2023-4881/" source="CVE"/>
		<reference ref_id="CVE-2023-52447" ref_url="https://www.suse.com/security/cve/CVE-2023-52447/" source="CVE"/>
		<reference ref_id="CVE-2023-52450" ref_url="https://www.suse.com/security/cve/CVE-2023-52450/" source="CVE"/>
		<reference ref_id="CVE-2023-52453" ref_url="https://www.suse.com/security/cve/CVE-2023-52453/" source="CVE"/>
		<reference ref_id="CVE-2023-52454" ref_url="https://www.suse.com/security/cve/CVE-2023-52454/" source="CVE"/>
		<reference ref_id="CVE-2023-52462" ref_url="https://www.suse.com/security/cve/CVE-2023-52462/" source="CVE"/>
		<reference ref_id="CVE-2023-52463" ref_url="https://www.suse.com/security/cve/CVE-2023-52463/" source="CVE"/>
		<reference ref_id="CVE-2023-52467" ref_url="https://www.suse.com/security/cve/CVE-2023-52467/" source="CVE"/>
		<reference ref_id="CVE-2023-52469" ref_url="https://www.suse.com/security/cve/CVE-2023-52469/" source="CVE"/>
		<reference ref_id="CVE-2023-52470" ref_url="https://www.suse.com/security/cve/CVE-2023-52470/" source="CVE"/>
		<reference ref_id="CVE-2023-52474" ref_url="https://www.suse.com/security/cve/CVE-2023-52474/" source="CVE"/>
		<reference ref_id="CVE-2023-52476" ref_url="https://www.suse.com/security/cve/CVE-2023-52476/" source="CVE"/>
		<reference ref_id="CVE-2023-52477" ref_url="https://www.suse.com/security/cve/CVE-2023-52477/" source="CVE"/>
		<reference ref_id="CVE-2023-52481" ref_url="https://www.suse.com/security/cve/CVE-2023-52481/" source="CVE"/>
		<reference ref_id="CVE-2023-52482" ref_url="https://www.suse.com/security/cve/CVE-2023-52482/" source="CVE"/>
		<reference ref_id="CVE-2023-52484" ref_url="https://www.suse.com/security/cve/CVE-2023-52484/" source="CVE"/>
		<reference ref_id="CVE-2023-52486" ref_url="https://www.suse.com/security/cve/CVE-2023-52486/" source="CVE"/>
		<reference ref_id="CVE-2023-52492" ref_url="https://www.suse.com/security/cve/CVE-2023-52492/" source="CVE"/>
		<reference ref_id="CVE-2023-52493" ref_url="https://www.suse.com/security/cve/CVE-2023-52493/" source="CVE"/>
		<reference ref_id="CVE-2023-52494" ref_url="https://www.suse.com/security/cve/CVE-2023-52494/" source="CVE"/>
		<reference ref_id="CVE-2023-52497" ref_url="https://www.suse.com/security/cve/CVE-2023-52497/" source="CVE"/>
		<reference ref_id="CVE-2023-52500" ref_url="https://www.suse.com/security/cve/CVE-2023-52500/" source="CVE"/>
		<reference ref_id="CVE-2023-52501" ref_url="https://www.suse.com/security/cve/CVE-2023-52501/" source="CVE"/>
		<reference ref_id="CVE-2023-52502" ref_url="https://www.suse.com/security/cve/CVE-2023-52502/" source="CVE"/>
		<reference ref_id="CVE-2023-52504" ref_url="https://www.suse.com/security/cve/CVE-2023-52504/" source="CVE"/>
		<reference ref_id="CVE-2023-52507" ref_url="https://www.suse.com/security/cve/CVE-2023-52507/" source="CVE"/>
		<reference ref_id="CVE-2023-52508" ref_url="https://www.suse.com/security/cve/CVE-2023-52508/" source="CVE"/>
		<reference ref_id="CVE-2023-52509" ref_url="https://www.suse.com/security/cve/CVE-2023-52509/" source="CVE"/>
		<reference ref_id="CVE-2023-52510" ref_url="https://www.suse.com/security/cve/CVE-2023-52510/" source="CVE"/>
		<reference ref_id="CVE-2023-52511" ref_url="https://www.suse.com/security/cve/CVE-2023-52511/" source="CVE"/>
		<reference ref_id="CVE-2023-52513" ref_url="https://www.suse.com/security/cve/CVE-2023-52513/" source="CVE"/>
		<reference ref_id="CVE-2023-52515" ref_url="https://www.suse.com/security/cve/CVE-2023-52515/" source="CVE"/>
		<reference ref_id="CVE-2023-52517" ref_url="https://www.suse.com/security/cve/CVE-2023-52517/" source="CVE"/>
		<reference ref_id="CVE-2023-52518" ref_url="https://www.suse.com/security/cve/CVE-2023-52518/" source="CVE"/>
		<reference ref_id="CVE-2023-52519" ref_url="https://www.suse.com/security/cve/CVE-2023-52519/" source="CVE"/>
		<reference ref_id="CVE-2023-52520" ref_url="https://www.suse.com/security/cve/CVE-2023-52520/" source="CVE"/>
		<reference ref_id="CVE-2023-52523" ref_url="https://www.suse.com/security/cve/CVE-2023-52523/" source="CVE"/>
		<reference ref_id="CVE-2023-52524" ref_url="https://www.suse.com/security/cve/CVE-2023-52524/" source="CVE"/>
		<reference ref_id="CVE-2023-52525" ref_url="https://www.suse.com/security/cve/CVE-2023-52525/" source="CVE"/>
		<reference ref_id="CVE-2023-52528" ref_url="https://www.suse.com/security/cve/CVE-2023-52528/" source="CVE"/>
		<reference ref_id="CVE-2023-52529" ref_url="https://www.suse.com/security/cve/CVE-2023-52529/" source="CVE"/>
		<reference ref_id="CVE-2023-52530" ref_url="https://www.suse.com/security/cve/CVE-2023-52530/" source="CVE"/>
		<reference ref_id="CVE-2023-52531" ref_url="https://www.suse.com/security/cve/CVE-2023-52531/" source="CVE"/>
		<reference ref_id="CVE-2023-52532" ref_url="https://www.suse.com/security/cve/CVE-2023-52532/" source="CVE"/>
		<reference ref_id="CVE-2023-52559" ref_url="https://www.suse.com/security/cve/CVE-2023-52559/" source="CVE"/>
		<reference ref_id="CVE-2023-52563" ref_url="https://www.suse.com/security/cve/CVE-2023-52563/" source="CVE"/>
		<reference ref_id="CVE-2023-52564" ref_url="https://www.suse.com/security/cve/CVE-2023-52564/" source="CVE"/>
		<reference ref_id="CVE-2023-52566" ref_url="https://www.suse.com/security/cve/CVE-2023-52566/" source="CVE"/>
		<reference ref_id="CVE-2023-52567" ref_url="https://www.suse.com/security/cve/CVE-2023-52567/" source="CVE"/>
		<reference ref_id="CVE-2023-52569" ref_url="https://www.suse.com/security/cve/CVE-2023-52569/" source="CVE"/>
		<reference ref_id="CVE-2023-52574" ref_url="https://www.suse.com/security/cve/CVE-2023-52574/" source="CVE"/>
		<reference ref_id="CVE-2023-52575" ref_url="https://www.suse.com/security/cve/CVE-2023-52575/" source="CVE"/>
		<reference ref_id="CVE-2023-52576" ref_url="https://www.suse.com/security/cve/CVE-2023-52576/" source="CVE"/>
		<reference ref_id="CVE-2023-52582" ref_url="https://www.suse.com/security/cve/CVE-2023-52582/" source="CVE"/>
		<reference ref_id="CVE-2023-52583" ref_url="https://www.suse.com/security/cve/CVE-2023-52583/" source="CVE"/>
		<reference ref_id="CVE-2023-52587" ref_url="https://www.suse.com/security/cve/CVE-2023-52587/" source="CVE"/>
		<reference ref_id="CVE-2023-52591" ref_url="https://www.suse.com/security/cve/CVE-2023-52591/" source="CVE"/>
		<reference ref_id="CVE-2023-52594" ref_url="https://www.suse.com/security/cve/CVE-2023-52594/" source="CVE"/>
		<reference ref_id="CVE-2023-52595" ref_url="https://www.suse.com/security/cve/CVE-2023-52595/" source="CVE"/>
		<reference ref_id="CVE-2023-52597" ref_url="https://www.suse.com/security/cve/CVE-2023-52597/" source="CVE"/>
		<reference ref_id="CVE-2023-52598" ref_url="https://www.suse.com/security/cve/CVE-2023-52598/" source="CVE"/>
		<reference ref_id="CVE-2023-52599" ref_url="https://www.suse.com/security/cve/CVE-2023-52599/" source="CVE"/>
		<reference ref_id="CVE-2023-52600" ref_url="https://www.suse.com/security/cve/CVE-2023-52600/" source="CVE"/>
		<reference ref_id="CVE-2023-52601" ref_url="https://www.suse.com/security/cve/CVE-2023-52601/" source="CVE"/>
		<reference ref_id="CVE-2023-52602" ref_url="https://www.suse.com/security/cve/CVE-2023-52602/" source="CVE"/>
		<reference ref_id="CVE-2023-52603" ref_url="https://www.suse.com/security/cve/CVE-2023-52603/" source="CVE"/>
		<reference ref_id="CVE-2023-52604" ref_url="https://www.suse.com/security/cve/CVE-2023-52604/" source="CVE"/>
		<reference ref_id="CVE-2023-52605" ref_url="https://www.suse.com/security/cve/CVE-2023-52605/" source="CVE"/>
		<reference ref_id="CVE-2023-52606" ref_url="https://www.suse.com/security/cve/CVE-2023-52606/" source="CVE"/>
		<reference ref_id="CVE-2023-52607" ref_url="https://www.suse.com/security/cve/CVE-2023-52607/" source="CVE"/>
		<reference ref_id="CVE-2023-52608" ref_url="https://www.suse.com/security/cve/CVE-2023-52608/" source="CVE"/>
		<reference ref_id="CVE-2023-52612" ref_url="https://www.suse.com/security/cve/CVE-2023-52612/" source="CVE"/>
		<reference ref_id="CVE-2023-52615" ref_url="https://www.suse.com/security/cve/CVE-2023-52615/" source="CVE"/>
		<reference ref_id="CVE-2023-52617" ref_url="https://www.suse.com/security/cve/CVE-2023-52617/" source="CVE"/>
		<reference ref_id="CVE-2023-52619" ref_url="https://www.suse.com/security/cve/CVE-2023-52619/" source="CVE"/>
		<reference ref_id="CVE-2023-52621" ref_url="https://www.suse.com/security/cve/CVE-2023-52621/" source="CVE"/>
		<reference ref_id="CVE-2023-52623" ref_url="https://www.suse.com/security/cve/CVE-2023-52623/" source="CVE"/>
		<reference ref_id="CVE-2023-52628" ref_url="https://www.suse.com/security/cve/CVE-2023-52628/" source="CVE"/>
		<reference ref_id="CVE-2023-52632" ref_url="https://www.suse.com/security/cve/CVE-2023-52632/" source="CVE"/>
		<reference ref_id="CVE-2023-52637" ref_url="https://www.suse.com/security/cve/CVE-2023-52637/" source="CVE"/>
		<reference ref_id="CVE-2023-52639" ref_url="https://www.suse.com/security/cve/CVE-2023-52639/" source="CVE"/>
		<reference ref_id="CVE-2023-6270" ref_url="https://www.suse.com/security/cve/CVE-2023-6270/" source="CVE"/>
		<reference ref_id="CVE-2023-6356" ref_url="https://www.suse.com/security/cve/CVE-2023-6356/" source="CVE"/>
		<reference ref_id="CVE-2023-6535" ref_url="https://www.suse.com/security/cve/CVE-2023-6535/" source="CVE"/>
		<reference ref_id="CVE-2023-6536" ref_url="https://www.suse.com/security/cve/CVE-2023-6536/" source="CVE"/>
		<reference ref_id="CVE-2023-7042" ref_url="https://www.suse.com/security/cve/CVE-2023-7042/" source="CVE"/>
		<reference ref_id="CVE-2023-7192" ref_url="https://www.suse.com/security/cve/CVE-2023-7192/" source="CVE"/>
		<reference ref_id="CVE-2024-0841" ref_url="https://www.suse.com/security/cve/CVE-2024-0841/" source="CVE"/>
		<reference ref_id="CVE-2024-2201" ref_url="https://www.suse.com/security/cve/CVE-2024-2201/" source="CVE"/>
		<reference ref_id="CVE-2024-22099" ref_url="https://www.suse.com/security/cve/CVE-2024-22099/" source="CVE"/>
		<reference ref_id="CVE-2024-23307" ref_url="https://www.suse.com/security/cve/CVE-2024-23307/" source="CVE"/>
		<reference ref_id="CVE-2024-25739" ref_url="https://www.suse.com/security/cve/CVE-2024-25739/" source="CVE"/>
		<reference ref_id="CVE-2024-25742" ref_url="https://www.suse.com/security/cve/CVE-2024-25742/" source="CVE"/>
		<reference ref_id="CVE-2024-25743" ref_url="https://www.suse.com/security/cve/CVE-2024-25743/" source="CVE"/>
		<reference ref_id="CVE-2024-26599" ref_url="https://www.suse.com/security/cve/CVE-2024-26599/" source="CVE"/>
		<reference ref_id="CVE-2024-26600" ref_url="https://www.suse.com/security/cve/CVE-2024-26600/" source="CVE"/>
		<reference ref_id="CVE-2024-26602" ref_url="https://www.suse.com/security/cve/CVE-2024-26602/" source="CVE"/>
		<reference ref_id="CVE-2024-26607" ref_url="https://www.suse.com/security/cve/CVE-2024-26607/" source="CVE"/>
		<reference ref_id="CVE-2024-26612" ref_url="https://www.suse.com/security/cve/CVE-2024-26612/" source="CVE"/>
		<reference ref_id="CVE-2024-26614" ref_url="https://www.suse.com/security/cve/CVE-2024-26614/" source="CVE"/>
		<reference ref_id="CVE-2024-26620" ref_url="https://www.suse.com/security/cve/CVE-2024-26620/" source="CVE"/>
		<reference ref_id="CVE-2024-26627" ref_url="https://www.suse.com/security/cve/CVE-2024-26627/" source="CVE"/>
		<reference ref_id="CVE-2024-26629" ref_url="https://www.suse.com/security/cve/CVE-2024-26629/" source="CVE"/>
		<reference ref_id="CVE-2024-26642" ref_url="https://www.suse.com/security/cve/CVE-2024-26642/" source="CVE"/>
		<reference ref_id="CVE-2024-26645" ref_url="https://www.suse.com/security/cve/CVE-2024-26645/" source="CVE"/>
		<reference ref_id="CVE-2024-26646" ref_url="https://www.suse.com/security/cve/CVE-2024-26646/" source="CVE"/>
		<reference ref_id="CVE-2024-26651" ref_url="https://www.suse.com/security/cve/CVE-2024-26651/" source="CVE"/>
		<reference ref_id="CVE-2024-26654" ref_url="https://www.suse.com/security/cve/CVE-2024-26654/" source="CVE"/>
		<reference ref_id="CVE-2024-26659" ref_url="https://www.suse.com/security/cve/CVE-2024-26659/" source="CVE"/>
		<reference ref_id="CVE-2024-26664" ref_url="https://www.suse.com/security/cve/CVE-2024-26664/" source="CVE"/>
		<reference ref_id="CVE-2024-26667" ref_url="https://www.suse.com/security/cve/CVE-2024-26667/" source="CVE"/>
		<reference ref_id="CVE-2024-26670" ref_url="https://www.suse.com/security/cve/CVE-2024-26670/" source="CVE"/>
		<reference ref_id="CVE-2024-26695" ref_url="https://www.suse.com/security/cve/CVE-2024-26695/" source="CVE"/>
		<reference ref_id="CVE-2024-26717" ref_url="https://www.suse.com/security/cve/CVE-2024-26717/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2021-46925: Fixed kernel panic caused by race of smc_sock (bsc#1220466).
- CVE-2021-46926: Fixed bug when detecting controllers in ALSA/hda/intel-sdw-acpi (bsc#1220478).
- CVE-2021-46927: Fixed assertion bug in nitro_enclaves: Use get_user_pages_unlocked() (bsc#1220443).
- CVE-2021-46929: Fixed use-after-free issue in sctp_sock_dump() (bsc#1220482).
- CVE-2021-46930: Fixed usb/mtu3 list_head check warning (bsc#1220484).
- CVE-2021-46931: Fixed wrong type casting in mlx5e_tx_reporter_dump_sq() (bsc#1220486).
- CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).
- CVE-2021-46934: Fixed a bug by validating user data in compat ioctl (bsc#1220469).
- CVE-2021-46936: Fixed use-after-free in tw_timer_handler() (bsc#1220439).
- CVE-2021-47082: Fixed ouble free in tun_free_netdev() (bsc#1220969).
- CVE-2021-47083: Fixed a global-out-of-bounds issue in mediatek: (bsc#1220917).
- CVE-2021-47087: Fixed incorrect page free bug in tee/optee (bsc#1220954).
- CVE-2021-47091: Fixed locking in ieee80211_start_ap()) error path (bsc#1220959).
- CVE-2021-47093: Fixed memleak on registration failure in intel_pmc_core (bsc#1220978).
- CVE-2021-47094: Fixed possible memory leak in KVM x86/mmu (bsc#1221551).
- CVE-2021-47095: Fixed missing initialization in ipmi/ssif (bsc#1220979).
- CVE-2021-47096: Fixed uninitalized user_pversion in ALSA rawmidi (bsc#1220981).
- CVE-2021-47097: Fixed stack out of bound access in elantech_change_report_id() (bsc#1220982).
- CVE-2021-47098: Fixed integer overflow/underflow in hysteresis calculations hwmon: (lm90) (bsc#1220983).
- CVE-2021-47099: Fixed BUG_ON assertion in veth when skb entering GRO are cloned (bsc#1220955).
- CVE-2021-47100: Fixed UAF when uninstall in ipmi (bsc#1220985).
- CVE-2021-47101: Fixed uninit-value in asix_mdio_read() (bsc#1220987).
- CVE-2021-47102: Fixed incorrect structure access In line: upper = info-&gt;upper_dev in net/marvell/prestera (bsc#1221009).
- CVE-2021-47104: Fixed memory leak in qib_user_sdma_queue_pkts() (bsc#1220960).
- CVE-2021-47105: Fixed potential memory leak in ice/xsk (bsc#1220961).
- CVE-2021-47107: Fixed READDIR buffer overflow in NFSD (bsc#1220965).
- CVE-2021-47108: Fixed possible NULL pointer dereference for mtk_hdmi_conf in drm/mediatek (bsc#1220986).
- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209635).
- CVE-2022-48626: Fixed a potential use-after-free on remove path moxart (bsc#1220366).
- CVE-2022-48627: Fixed a memory overlapping when deleting chars in the buffer (bsc#1220845).
- CVE-2022-48628: Fixed possible lock in ceph (bsc#1220848).
- CVE-2022-48629: Fixed possible memory leak in qcom-rng (bsc#1220989).
- CVE-2022-48630: Fixed infinite loop on requests not multiple of WORD_SZ in crypto: qcom-rng (bsc#1220990).
- CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to potentially crash the system (bsc#1209657).
- CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
- CVE-2023-35827: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc#1212514).
- CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221).
- CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround  (bsc#1220251).
- CVE-2023-52450: Fixed NULL pointer dereference issue in upi_fill_topology() (bsc#1220237).
- CVE-2023-52453: Fixed data corruption in hisi_acc_vfio_pci (bsc#1220337).
- CVE-2023-52454: Fixed a kernel panic when host sends an invalid H2C PDU length (bsc#1220320).
- CVE-2023-52462: Fixed check for attempt to corrupt spilled pointer (bsc#1220325).
- CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328).
- CVE-2023-52467: Fixed a null pointer dereference in of_syscon_register (bsc#1220433).
- CVE-2023-52469: Fixed a use-after-free in kv_parse_power_table (bsc#1220411).
- CVE-2023-52470: Fixed null-ptr-deref in radeon_crtc_init() (bsc#1220413).
- CVE-2023-52474: Fixed a vulnerability with non-PAGE_SIZE-end multi-iovec user SDMA requests (bsc#1220445).
- CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI during vsyscall (bsc#1220703).
- CVE-2023-52477: Fixed USB Hub accesses to uninitialized BOS descriptors (bsc#1220790).
- CVE-2023-52481: Fixed speculative unprivileged load in Cortex-A520 (bsc#1220887).
- CVE-2023-52482: Fixed a bug by adding SRSO mitigation for Hygon processors (bsc#1220735).
- CVE-2023-52484: Fixed a soft lockup triggered by arm_smmu_mm_invalidate_range (bsc#1220797).
- CVE-2023-52486: Fixed possible use-after-free in drm (bsc#1221277).
- CVE-2023-52492: Fixed a null-pointer-dereference in channel unregistration function __dma_async_device_channel_register() (bsc#1221276).
- CVE-2023-52493: Fixed possible soft lockup in bus/mhi/host (bsc#1221274).
- CVE-2023-52494: Fixed missing alignment check for event ring read pointer in bus/mhi/host (bsc#1221273).
- CVE-2023-52497: Fixed data corruption in erofs (bsc#1220879).
- CVE-2023-52500: Fixed information leaking when processing OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883).
- CVE-2023-52501: Fixed possible memory corruption in ring-buffer (bsc#1220885).
- CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220831).
- CVE-2023-52504: Fixed possible out-of bounds in apply_alternatives() on a 5-level paging machine (bsc#1221553).
- CVE-2023-52507: Fixed possible shift-out-of-bounds in nfc/nci (bsc#1220833).
- CVE-2023-52508: Fixed null pointer dereference in nvme_fc_io_getuuid() (bsc#1221015).
- CVE-2023-52509: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc#1220836).
- CVE-2023-52510: Fixed a potential UAF in ca8210_probe() (bsc#1220898).
- CVE-2023-52511: Fixed possible memory corruption in spi/sun6i (bsc#1221012).
- CVE-2023-52513: Fixed connection failure handling  in RDMA/siw (bsc#1221022).
- CVE-2023-52515: Fixed possible use-after-free in RDMA/srp (bsc#1221048).
- CVE-2023-52517: Fixed race between DMA RX transfer completion and RX FIFO drain in spi/sun6i (bsc#1221055).
- CVE-2023-52518: Fixed information leak in bluetooth/hci_codec (bsc#1221056).
- CVE-2023-52519: Fixed possible overflow in HID/intel-ish-hid/ipc (bsc#1220920).
- CVE-2023-52520: Fixed reference leak in platform/x86/think-lmi (bsc#1220921).
- CVE-2023-52523: Fixed wrong redirects to non-TCP sockets in bpf (bsc#1220926).
- CVE-2023-52524: Fixed possible corruption in nfc/llcp (bsc#1220927).
- CVE-2023-52525: Fixed out of bounds check mwifiex_process_rx_packet() (bsc#1220840).
- CVE-2023-52528: Fixed uninit-value access in __smsc75xx_read_reg() (bsc#1220843).
- CVE-2023-52529: Fixed a potential memory leak in sony_probe() (bsc#1220929).
- CVE-2023-52530: Fixed a potential key use-after-free in wifi mac80211 (bsc#1220930).
- CVE-2023-52531: Fixed a memory corruption issue in iwlwifi (bsc#1220931).
- CVE-2023-52532: Fixed a bug in TX CQE error handling (bsc#1220932).
- CVE-2023-52559: Fixed a bug by avoiding memory allocation in iommu_suspend (bsc#1220933).
- CVE-2023-52563: Fixed memory leak on -&gt;hpd_notify callback() in drm/meson (bsc#1220937).
- CVE-2023-52564: Reverted invalid fix for UAF in gsm_cleanup_mux() (bsc#1220938).
- CVE-2023-52566: Fixed potential use after free in nilfs_gccache_submit_read_data() (bsc#1220940).
- CVE-2023-52567: Fixed possible Oops in  serial/8250_port: when using IRQ polling (irq = 0) (bsc#1220839).
- CVE-2023-52569: Fixed a bug in btrfs by remoning BUG() after failure to insert delayed dir index item (bsc#1220918).
- CVE-2023-52574: Fixed a bug by hiding new member header_ops (bsc#1220870).
- CVE-2023-52575: Fixed SBPB enablement for spec_rstack_overflow=off (bsc#1220871).
- CVE-2023-52576: Fixed potential use after free in memblock_isolate_range() (bsc#1220872).
- CVE-2023-52582: Fixed possible oops in netfs (bsc#1220878).
- CVE-2023-52583: Fixed deadlock or deadcode of misusing dget() inside ceph (bsc#1221058).
- CVE-2023-52587: Fixed mcast list locking in IB/ipoib (bsc#1221082).
- CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044).
- CVE-2023-52594: Fixed potential array-index-out-of-bounds read in ath9k_htc_txstatus() (bsc#1221045).
- CVE-2023-52595: Fixed possible deadlock in wifi/rt2x00 (bsc#1221046).
- CVE-2023-52597: Fixed a setting of fpc register in KVM (bsc#1221040).
- CVE-2023-52598: Fixed wrong setting of fpc register in s390/ptrace (bsc#1221060).
- CVE-2023-52599: Fixed array-index-out-of-bounds in diNewExt() in jfs (bsc#1221062).
- CVE-2023-52600: Fixed uaf in jfs_evict_inode() (bsc#1221071).
- CVE-2023-52601: Fixed array-index-out-of-bounds in dbAdjTree() in jfs (bsc#1221068).
- CVE-2023-52602: Fixed slab-out-of-bounds Read in dtSearch() in jfs (bsc#1221070).
- CVE-2023-52603: Fixed array-index-out-of-bounds in dtSplitRoot() (bsc#1221066).
- CVE-2023-52604: Fixed array-index-out-of-bounds in dbAdjTree() (bsc#1221067).
- CVE-2023-52605: Fixed a NULL pointer dereference check (bsc#1221039)
- CVE-2023-52606: Fixed possible kernel stack corruption in powerpc/lib (bsc#1221069).
- CVE-2023-52607: Fixed a null-pointer-dereference in pgtable_cache_add kasprintf() (bsc#1221061).
- CVE-2023-52608: Fixed possible race condition in firmware/arm_scmi (bsc#1221375).
- CVE-2023-52612: Fixed req-&gt;dst buffer overflow in crypto/scomp (bsc#1221616).
- CVE-2023-52615: Fixed page fault dead lock on mmap-ed hwrng (bsc#1221614).
- CVE-2023-52617: Fixed stdev_release() crash after surprise hot remove (bsc#1221613).
- CVE-2023-52619: Fixed possible crash when setting number of cpus to an odd number in pstore/ram (bsc#1221618).
- CVE-2023-52621: Fixed missing asserion in bpf (bsc#1222073).
- CVE-2023-52623: Fixed suspicious RCU usage in SUNRPC (bsc#1222060).
- CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222117).
- CVE-2023-52632: Fixed lock dependency warning with srcu in drm/amdkfd (bsc#1222274).
- CVE-2023-52637: Fixed UAF in j1939_sk_match_filter() in can/k1939 (bsc#1222291).
- CVE-2023-52639: Fixed race during shadow creation in KVM/s390/vsie Fixed (bsc#1222300).
- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).
- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).
- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).
- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).
- CVE-2023-7042: Fixed a null-pointer-dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).
- CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c (bsc#1218479).
- CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).
- CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
- CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170).
- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).
- CVE-2024-25739: Fixed possible crash in create_empty_lvol() in drivers/mtd/ubi/vtbl.c (bsc#1219834).
- CVE-2024-25742: Fixed insufficient validation during #VC instruction emulation in x86/sev (bsc#1221725).
- CVE-2024-25743: Fixed insufficient validation during #VC instruction emulation in x86/sev (bsc#1221725).
- CVE-2024-26599: Fixed out-of-bounds access in of_pwm_single_xlate() (bsc#1220365).
- CVE-2024-26600: Fixed NULL pointer dereference for SRP in phy-omap-usb2 (bsc#1220340).
- CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398).
- CVE-2024-26607: Fixed a probing race issue in sii902x: (bsc#1220736).
- CVE-2024-26612: Fixed Oops in fscache_put_cache() This function dereferences  (bsc#1221291).
- CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks (bsc#1221293).
- CVE-2024-26620: Fixed possible device model violation in s390/vfio-ap (bsc#1221298).
- CVE-2024-26627: Fixed possible hard lockup in scsi (bsc#1221090).
- CVE-2024-26629: Fixed possible protocol violation via RELEASE_LOCKOWNER in nfsd (bsc#1221379).
- CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter nf_tables (bsc#1221830).
- CVE-2024-26645: Fixed missing visibility when inserting an element into tracing_map (bsc#1222056).
- CVE-2024-26646: Fixed potential memory corruption when resuming from suspend or hibernation in thermal/intel/hfi (bsc#1222070).
- CVE-2024-26651: Fixed possible oops via malicious devices in sr9800 (bsc#1221337).
- CVE-2024-26654: Fixed use after free in ALSA/sh/aica (bsc#1222304).
- CVE-2024-26659: Fixed wrong handling of isoc Babble and Buffer Overrun events in xhci (bsc#1222317).
- CVE-2024-26664: Fixed out-of-bounds memory access in create_core_data() in hwmon coretemp (bsc#1222355).
- CVE-2024-26667: Fixed null pointer reference in dpu_encoder_helper_phys_cleanup in drm/msm/dpu (bsc#1222331).
- CVE-2024-26670: Fixed ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD workaround in kernel arm64 (bsc#1222356).
- CVE-2024-26695: Fixed null pointer dereference in __sev_platform_shutdown_locked in crypto ccp (bsc#1222373).
- CVE-2024-26717: Fixed null pointer dereference on failed power up in HID i2c-hid-of (bsc#1222360).

The following non-security bugs were fixed:

- acpi: CPPC: enable AMD CPPC V2 support for family 17h processors (git-fixes).
- acpi: processor_idle: Fix memory leak in acpi_processor_power_exit() (git-fixes).
- acpi: resource: Add Infinity laptops to irq1_edge_low_force_override (stable-fixes).
- acpi: resource: Add MAIBENBEN X577 to irq1_edge_low_force_override (git-fixes).
- acpi: resource: Do IRQ override on Lunnen Ground laptops (stable-fixes).
- acpi: scan: Fix device check notification handling (git-fixes).
- acpica: debugger: check status of acpi_evaluate_object() in acpi_db_walk_for_fields() (git-fixes).
- alsa: aaci: Delete unused variable in aaci_do_suspend (git-fixes).
- alsa: aoa: avoid false-positive format truncation warning (git-fixes).
- alsa: aw2: avoid casting function pointers (git-fixes).
- alsa: ctxfi: avoid casting function pointers (git-fixes).
- alsa: hda/realtek - ALC285 reduce pop noise from Headphone port (stable-fixes).
- alsa: hda/realtek - Add Headset Mic supported Acer NB platform (stable-fixes).
- alsa: hda/realtek - Fix headset Mic no show at resume back for Lenovo ALC897 platform (git-fixes).
- alsa: hda/realtek: Enable Mute LED on HP 840 G8 (MB 8AB8) (git-fixes).
- alsa: hda/realtek: Update Panasonic CF-SZ6 quirk to support headset with microphone (git-fixes).
- alsa: hda/realtek: fix ALC285 issues on HP Envy x360 laptops (stable-fixes).
- alsa: hda/realtek: fix mute/micmute LED For HP mt440 (git-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs for HP EliteBook (stable-fixes).
- alsa: seq: fix function cast warnings (git-fixes).
- alsa: sh: aica: reorder cleanup operations to avoid UAF bugs (git-fixes).
- alsa: usb-audio: Stop parsing channels bits when all channels are found (git-fixes).
- arm64: dts: allwinner: h6: add rx dma channel for spdif (git-fixes)
- arm64: dts: broadcom: bcmbca: bcm4908: drop invalid switch cells (git-fixes)
- arm64: dts: imx8mm-kontron: add support for ultra high speed modes on (git-fixes)
- arm64: dts: imx8mm-venice-gw71xx: fix usb otg vbus (git-fixes)
- arm64: dts: marvell: reorder crypto interrupts on armada socs (git-fixes)
- arm64: dts: rockchip: add es8316 codec for rock pi 4 (git-fixes)
- arm64: dts: rockchip: add spdif node for rock pi 4 (git-fixes)
- arm64: dts: rockchip: fix regulator name on rk3399-rock-4 (git-fixes)
- arm64: dts: rockchip: set num-cs property for spi on px30 (git-fixes)
- arm64: mm: fix va-range sanity check (git-fixes)
- arm64: set __exception_irq_entry with __irq_entry as a default (git-fixes)
- asoc: Intel: bytcr_rt5640: Add an extra entry for the Chuwi Vi8 tablet (stable-fixes).
- asoc: amd: acp: Add missing error handling in sof-mach (git-fixes).
- asoc: amd: acp: fix for acp_init function error handling (git-fixes).
- asoc: madera: Fix typo in madera_set_fll_clks shift value (git-fixes).
- asoc: meson: Use dev_err_probe() helper (stable-fixes).
- asoc: meson: aiu: fix function pointer type mismatch (git-fixes).
- asoc: meson: axg-tdm-interface: add frame rate constraint (git-fixes).
- asoc: meson: axg-tdm-interface: fix mclk setup without mclk-fs (git-fixes).
- asoc: meson: t9015: fix function pointer type mismatch (git-fixes).
- asoc: ops: Fix wraparound for mask in snd_soc_get_volsw (git-fixes).
- asoc: rcar: adg: correct TIMSEL setting for SSI9 (git-fixes).
- asoc: rt5645: Make LattePanda board DMI match more precise (stable-fixes).
- asoc: rt5682-sdw: fix locking sequence (git-fixes).
- asoc: rt711-sdca: fix locking sequence (git-fixes).
- asoc: rt711-sdw: fix locking sequence (git-fixes).
- asoc: wm8962: Enable both SPKOUTR_ENA and SPKOUTL_ENA in mono mode (stable-fixes).
- asoc: wm8962: Enable oscillator if selecting WM8962_FLL_OSC (stable-fixes).
- asoc: wm8962: Fix up incorrect error message in wm8962_set_fll (stable-fixes).
- ata: sata_mv: fix pci device id table declaration compilation warning (git-fixes).
- ata: sata_sx4: fix pdc20621_get_from_dimm() on 64-bit (git-fixes).
- backlight: da9052: fully initialize backlight_properties during probe (git-fixes).
- backlight: lm3630a: do not set bl-&gt;props.brightness in get_brightness (git-fixes).
- backlight: lm3630a: initialize backlight_properties on init (git-fixes).
- backlight: lm3639: fully initialize backlight_properties during probe (git-fixes).
- backlight: lp8788: fully initialize backlight_properties during probe (git-fixes).
- blocklayoutdriver: fix reference leak of pnfs_device_node (git-fixes).
- bluetooth: Remove HCI_POWER_OFF_TIMEOUT (git-fixes).
- bluetooth: Remove superfluous call to hci_conn_check_pending() (git-fixes).
- bluetooth: hci_core: Fix possible buffer overflow (git-fixes).
- bluetooth: mgmt: Remove leftover queuing of power_off work (git-fixes).
- bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security (stable-fixes).
- bpf, scripts: correct gpl license name (git-fixes).
- bpf, sockmap: fix preempt_rt splat when using raw_spin_lock_t (git-fixes).
- can: softing: remove redundant null check (git-fixes).
- clk: zynq: prevent null pointer dereference caused by kmalloc failure (git-fixes).
- comedi: comedi_test: prevent timers rescheduling during deletion (git-fixes).
- coresight: etm4x: do not access trcidr1 for identification (bsc#1220775)
- coresight: etm4x: fix accesses to trcseqrstevr and trcseqstr (bsc#1220775)
- coresight: etm: override trcidr3.ccitmin on errata affected cpus (bsc#1220775)
- cpufreq: amd-pstate: fix min_perf assignment in amd_pstate_adjust_perf() (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's return value (git-fixes).
- crypto: arm/sha - fix function cast warnings (git-fixes).
- crypto: qat - avoid division by zero (git-fixes).
- crypto: qat - fix deadlock in backlog processing (git-fixes).
- crypto: qat - fix double free during reset (git-fixes).
- crypto: qat - fix state machines cleanup paths (bsc#1218321).
- crypto: qat - fix unregistration of compression algorithms (git-fixes).
- crypto: qat - fix unregistration of crypto algorithms (git-fixes).
- crypto: qat - ignore subsequent state up commands (git-fixes).
- crypto: qat - increase size of buffers (git-fixes).
- crypto: qat - resolve race condition during aer recovery (git-fixes).
- crypto: xilinx - call finalize with bh disabled (git-fixes).
- doc-guide: kernel-doc: tell about object-like macros (git-fixes).
- doc/readme.suse: update information about module support status (jsc#ped-5759)
- drivers: hv: vmbus: Calculate ring buffer size for more efficient use of memory (git-fixes).
- drm/amd/display: add fams validation before trying to use it (git-fixes).
- drm/amd/display: add fb_damage_clips support (git-fixes).
- drm/amd/display: add function for validate and update new stream (git-fixes).
- drm/amd/display: add odm case when looking for first split pipe (git-fixes).
- drm/amd/display: always switch off odm before committing more streams (git-fixes).
- drm/amd/display: avoid abm when odm combine is enabled for edp (git-fixes).
- drm/amd/display: blocking invalid 420 modes on hdmi tmds for dcn31 (git-fixes).
- drm/amd/display: check if link state is valid (git-fixes).
- drm/amd/display: clean code-style issues in dcn30_set_mpc_shaper_3dlut (git-fixes).
- drm/amd/display: copy dc context in the commit streams (git-fixes).
- drm/amd/display: dc.h: eliminate kernel-doc warnings (git-fixes).
- drm/amd/display: disable psr-su on parade 0803 tcon again (git-fixes).
- drm/amd/display: enable fast plane updates on dcn3.2 and above (git-fixes).
- drm/amd/display: enable new commit sequence only for dcn32x (git-fixes).
- drm/amd/display: ensure async flips are only accepted for fast updates (git-fixes).
- drm/amd/display: exit idle optimizations before attempt to access phy (git-fixes).
- drm/amd/display: expand kernel doc for dc (git-fixes).
- drm/amd/display: fix a bug when searching for insert_above_mpcc (git-fixes).
- drm/amd/display: fix a null pointer dereference in amdgpu_dm_i2c_xfer() (git-fixes).
- drm/amd/display: fix a potential buffer overflow in 'dp_dsc_clock_en_read()' (git-fixes).
- drm/amd/display: fix abm disablement (git-fixes).
- drm/amd/display: fix dc/core/dc.c kernel-doc (git-fixes).
- drm/amd/display: fix hw rotated modes when psr-su is enabled (git-fixes).
- drm/amd/display: fix kernel-doc issues in dc.h (git-fixes).
- drm/amd/display: fix possible underflow for displays with large vblank (git-fixes).
- drm/amd/display: fix the delta clamping for shaper lut (git-fixes).
- drm/amd/display: fix unbounded requesting for high pixel rate modes on dcn315 (git-fixes).
- drm/amd/display: fix underflow issue on 175hz timing (git-fixes).
- drm/amd/display: for prefetch mode &gt; 0, extend prefetch if possible (git-fixes).
- drm/amd/display: guard against invalid rptr/wptr being set (git-fixes).
- drm/amd/display: guard dcn31 phyd32clk logic against chip family (git-fixes).
- drm/amd/display: handle range offsets in vrr ranges (stable-fixes).
- drm/amd/display: handle seamless boot stream (git-fixes).
- drm/amd/display: handle virtual hardware detect (git-fixes).
- drm/amd/display: include surface of unaffected streams (git-fixes).
- drm/amd/display: include udelay when waiting for inbox0 ack (git-fixes).
- drm/amd/display: increase frame warning limit with kasan or kcsan in dml (git-fixes).
- drm/amd/display: keep phy active for dp config (git-fixes).
- drm/amd/display: perform a bounds check before filling dirty rectangles (git-fixes).
- drm/amd/display: prevent vtotal from being set to 0 (git-fixes).
- drm/amd/display: remove min_dst_y_next_start check for z8 (git-fixes).
- drm/amd/display: restore rptr/wptr for dmcub as workaround (git-fixes).
- drm/amd/display: return the correct hdcp error code (stable-fixes).
- drm/amd/display: revert vblank change that causes null pointer crash (git-fixes).
- drm/amd/display: rework comments on dc file (git-fixes).
- drm/amd/display: rework context change check (git-fixes).
- drm/amd/display: set minimum requirement for using psr-su on phoenix (git-fixes).
- drm/amd/display: set minimum requirement for using psr-su on rembrandt (git-fixes).
- drm/amd/display: set per pipe dppclk to 0 when dpp is off (git-fixes).
- drm/amd/display: update correct dcn314 register header (git-fixes).
- drm/amd/display: update extended blank for dcn314 onwards (git-fixes).
- drm/amd/display: update min z8 residency time to 2100 for dcn314 (git-fixes).
- drm/amd/display: update otg instance in the commit stream (git-fixes).
- drm/amd/display: use dram speed from validation for dummy p-state (git-fixes).
- drm/amd/display: use dtbclk as refclk instead of dprefclk (git-fixes).
- drm/amd/display: use low clocks for no plane configs (git-fixes).
- drm/amd/display: use min transition for all subvp plane add/remove (git-fixes).
- drm/amd/display: write to correct dirty_rect (git-fixes).
- drm/amd/display: wrong colorimetry workaround (git-fixes).
- drm/amd/pm: fix a memleak in aldebaran_tables_init (git-fixes).
- drm/amd/pm: fix error of maco flag setting code (git-fixes).
- drm/amd/smu: use averagegfxclkfrequency* to replace previous gfx curr clock (git-fixes).
- drm/amd: enable pcie pme from d3 (git-fixes).
- drm/amdgpu/pm: fix the error of pwm1_enable setting (stable-fixes).
- drm/amdgpu/pm: make gfxclock consistent for sienna cichlid (git-fixes).
- drm/amdgpu/pm: make mclk consistent for smu 13.0.7 (git-fixes).
- drm/amdgpu/smu13: drop compute workload workaround (git-fixes).
- drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag (stable-fixes).
- drm/amdgpu: enable gpu reset for s3 abort cases on raven series (stable-fixes).
- drm/amdgpu: fix missing break in atom_arg_imm case of atom_get_src_int() (git-fixes).
- drm/amdgpu: force order between a read and write to the same address (git-fixes).
- drm/amdgpu: lower cs errors to debug severity (git-fixes).
- drm/amdgpu: match against exact bootloader status (git-fixes).
- drm/amdgpu: unset context priority is now invalid (git-fixes).
- drm/amdgpu: update min() to min_t() in 'amdgpu_info_ioctl' (git-fixes).
- drm/amdkfd: fix tlb flush after unmap for gfx9.4.2 (stable-fixes).
- drm/bridge: tc358762: instruct dsi host to generate hse packets (git-fixes).
- drm/display: fix typo (git-fixes).
- drm/edid: add quirk for osvr hdk 2.0 (git-fixes).
- drm/etnaviv: restore some id values (git-fixes).
- drm/exynos: do not return negative values from .get_modes() (stable-fixes).
- drm/exynos: fix a possible null-pointer dereference due to data race in exynos_drm_crtc_atomic_disable() (git-fixes).
- drm/i915/bios: tolerate devdata==null in intel_bios_encoder_supports_dp_dual_mode() (stable-fixes).
- drm/i915/gt: do not generate the command streamer for all the ccs (git-fixes).
- drm/i915/gt: reset queue_priority_hint on parking (git-fixes).
- drm/i915/gt: use i915_vm_put on ppgtt_create error paths (git-fixes).
- drm/i915/selftests: fix dependency of some timeouts on hz (git-fixes).
- drm/i915: add missing ccs documentation (git-fixes).
- drm/i915: call intel_pre_plane_updates() also for pipes getting enabled (git-fixes).
- drm/i915: check before removing mm notifier (git-fixes).
- drm/lima: fix a memleak in lima_heap_alloc (git-fixes).
- drm/mediatek: dsi: fix dsi rgb666 formats and definitions (git-fixes).
- drm/mediatek: fix a null pointer crash in mtk_drm_crtc_finish_page_flip (git-fixes).
- drm/msm/dpu: add division of drm_display_mode's hskew parameter (git-fixes).
- drm/msm/dpu: fix the programming of intf_cfg2_data_hctl_en (git-fixes).
- drm/msm/dpu: improve dsc allocation (git-fixes).
- drm/msm/dpu: only enable dsc_mode_multiplex if dsc_merge is enabled (git-fixes).
- drm/panel-edp: use put_sync in unprepare (git-fixes).
- drm/panel: auo,b101uan08.3: fine tune the panel power sequence (git-fixes).
- drm/panel: boe-tv101wum-nl6: fine tune the panel power sequence (git-fixes).
- drm/panel: do not return negative error codes from drm_panel_get_modes() (stable-fixes).
- drm/panel: move aux b116xw03 out of panel-edp back to panel-simple (git-fixes).
- drm/panfrost: fix power transition timeout warnings (git-fixes).
- drm/probe-helper: warn about negative .get_modes() (stable-fixes).
- drm/qxl: remove unused `count` variable from `qxl_surface_id_alloc()` (git-fixes).
- drm/qxl: remove unused variable from `qxl_process_single_command()` (git-fixes).
- drm/radeon/ni: fix wrong firmware size logging in ni_init_microcode() (git-fixes).
- drm/radeon/ni_dpm: remove redundant null check (git-fixes).
- drm/radeon: remove dead code in ni_mc_load_microcode() (git-fixes).
- drm/rockchip: dsi: clean up 'usage_mode' when failing to attach (git-fixes).
- drm/rockchip: inno_hdmi: fix video timing (git-fixes).
- drm/rockchip: lvds: do not overwrite error code (git-fixes).
- drm/rockchip: lvds: do not print scary message when probing defer (git-fixes).
- drm/tegra: dpaux: fix pm disable depth imbalance in tegra_dpaux_probe (git-fixes).
- drm/tegra: dsi: add missing check for of_find_device_by_node (git-fixes).
- drm/tegra: dsi: fix missing pm_runtime_disable() in the error handling path of tegra_dsi_probe() (git-fixes).
- drm/tegra: dsi: fix some error handling paths in tegra_dsi_probe() (git-fixes).
- drm/tegra: dsi: make use of the helper function dev_err_probe() (stable-fixes).
- drm/tegra: hdmi: convert to devm_platform_ioremap_resource() (stable-fixes).
- drm/tegra: hdmi: fix some error handling paths in tegra_hdmi_probe() (git-fixes).
- drm/tegra: output: fix missing i2c_put_adapter() in the error handling paths of tegra_output_probe() (git-fixes).
- drm/tegra: put drm_gem_object ref on error in tegra_fb_create (git-fixes).
- drm/tegra: rgb: fix missing clk_put() in the error handling paths of tegra_dc_rgb_probe() (git-fixes).
- drm/tegra: rgb: fix some error handling paths in tegra_dc_rgb_probe() (git-fixes).
- drm/tidss: fix initial plane zpos values (git-fixes).
- drm/tidss: fix sync-lost issue with two displays (git-fixes).
- drm/ttm: do not leak a resource on eviction error (git-fixes).
- drm/ttm: do not print error message if eviction was interrupted (git-fixes).
- drm/vc4: add module dependency on hdmi-codec (git-fixes).
- drm/vmwgfx: create debugfs ttm_resource_manager entry only if needed (git-fixes).
- drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node (git-fixes).
- drm/vmwgfx: fix possible null pointer derefence with invalid contexts (git-fixes).
- drm: do not treat 0 as -1 in drm_fixp2int_ceil (git-fixes).
- drm: fix drm_fixp2int_round() making it add 0.5 (git-fixes).
- drm: panel-orientation-quirks: add quirk for acer switch v 10 (sw5-017) (git-fixes).
- firewire: core: use long bus reset on gap count error (stable-fixes).
- fix 'coresight: etm4x: Change etm4_platform_driver driver for MMIO devices' (bsc#1220775)
- hid: amd_sfh: Update HPD sensor structure elements (git-fixes).
- hid: lenovo: Add middleclick_workaround sysfs knob for cptkbd (git-fixes).
- hid: multitouch: Add required quirk for Synaptics 0xcddc device (stable-fixes).
- hv_netvsc: calculate correct ring size when page_size is not 4 kbytes (git-fixes).
- hv_netvsc: fix race condition between netvsc_probe and netvsc_remove (git-fixes).
- hv_netvsc: register vf in netvsc_probe if net_device_register missed (git-fixes).
- i2c: aspeed: fix the dummy irq expected print (git-fixes).
- i2c: i801: avoid potential double call to gpiod_remove_lookup_table (git-fixes).
- i2c: wmt: fix an error handling path in wmt_i2c_probe() (git-fixes).
- ib/ipoib: Fix mcast list locking (git-fixes)
- iio: dummy_evgen: remove excess kernel-doc comments (git-fixes).
- iio: pressure: dlhl60d: initialize empty dlh bytes (git-fixes).
- input: gpio_keys_polled - suppress deferred probe error for gpio (stable-fixes).
- input: i8042 - add Fujitsu Lifebook E5411 to i8042 quirk table (git-fixes).
- input: i8042 - add Fujitsu Lifebook U728 to i8042 quirk table (git-fixes).
- input: i8042 - add quirk for Fujitsu Lifebook A574/H (git-fixes).
- input: i8042 - fix strange behavior of touchpad on Clevo NS70PU (git-fixes).
- input: pm8941-powerkey - fix debounce on gen2+ PMICs (git-fixes).
- input: pm8941-pwrkey - add software key press debouncing support (git-fixes).
- input: pm8941-pwrkey - add support for PON GEN3 base addresses (git-fixes).
- input: synaptics-rmi4 - fix UAF of IRQ domain on driver removal (git-fixes).
- input: xpad - add Lenovo Legion Go controllers (git-fixes).
- iommu/amd: mark interrupt as managed (git-fixes).
- iommu/dma: trace bounce buffer usage when mapping buffers (git-fixes).
- iommu/mediatek-v1: fix an error handling path in mtk_iommu_v1_probe() (git-fixes).
- iommu/mediatek: fix forever loop in error handling (git-fixes).
- iommu/vt-d: allow to use flush-queue when first level is default (git-fixes).
- iommu/vt-d: do not issue ats invalidation request when device is disconnected (git-fixes).
- iommu/vt-d: fix pasid directory pointer coherency (git-fixes).
- iommu/vt-d: set no execute enable bit in pasid table entry (git-fixes).
- kabi: pci: add locking to rmw pci express capability register accessors (kabi).
- kconfig: fix infinite loop when expanding a macro at the end of file (git-fixes).
- kvm: s390: only deliver the set service event bits (git-fixes bsc#1221631).
- lan78xx: enable auto speed configuration for lan7850 if no eeprom is detected (git-commit).
- leds: aw2013: unlock mutex before destroying it (git-fixes).
- lib/cmdline: fix an invalid format specifier in an assertion msg (git-fixes).
- make nvidiA Grace-Hopper TPM related drivers build-ins (bsc#1221156)
- md/raid10: check slab-out-of-bounds in md_bitmap_get_counter (git-fixes).
- md/raid5: release batch_last before waiting for another stripe_head (git-fixes).
- md/raid6: use valid sector values to determine if an i/o should wait on the reshape (git-fixes).
- md: do not ignore suspended array in md_check_recovery() (git-fixes).
- md: do not leave 'md_recovery_frozen' in error path of md_set_readonly() (git-fixes).
- md: fix data corruption for raid456 when reshape restart while grow up (git-fixes).
- md: introduce md_ro_state (git-fixes).
- md: make sure md_do_sync() will set md_recovery_done (git-fixes).
- md: whenassemble the array, consult the superblock of the freshest device (git-fixes).
- media: dvb-frontends: avoid stack overflow warnings with clang (git-fixes).
- media: edia: dvbdev: fix a use-after-free (git-fixes).
- media: em28xx: annotate unchecked call to media_device_register() (git-fixes).
- media: go7007: add check of return value of go7007_read_addr() (git-fixes).
- media: go7007: fix a memleak in go7007_load_encoder (git-fixes).
- media: imx: csc/scaler: fix v4l2_ctrl_handler memory leak (git-fixes).
- media: pvrusb2: fix pvr2_stream_callback casts (git-fixes).
- media: pvrusb2: fix uaf in pvr2_context_set_notify (git-fixes).
- media: pvrusb2: remove redundant null check (git-fixes).
- media: staging: ipu3-imgu: set fields before media_entity_pads_init() (git-fixes).
- media: sun8i-di: fix chroma difference threshold (git-fixes).
- media: sun8i-di: fix coefficient writes (git-fixes).
- media: sun8i-di: fix power on/off sequences (git-fixes).
- media: tc358743: register v4l2 async device only after successful setup (git-fixes).
- media: ttpci: fix two memleaks in budget_av_attach (git-fixes).
- media: usbtv: remove useless locks in usbtv_video_free() (git-fixes).
- media: v4l2-mem2mem: fix a memleak in v4l2_m2m_register_entity (git-fixes).
- media: v4l2-tpg: fix some memleaks in tpg_alloc (git-fixes).
- media: xc4000: fix atomicity violation in xc4000_get_frequency (git-fixes).
- mfd: altera-sysmgr: call of_node_put() only when of_parse_phandle() takes a ref (git-fixes).
- mfd: syscon: call of_node_put() only when of_parse_phandle() takes a ref (git-fixes).
- mm,page_owner: Defer enablement of static branch (bsc#1222366).
- mm,page_owner: check for null stack_record before bumping its refcount (bsc#1222366).
- mm,page_owner: drop unnecessary check (bsc#1222366).
- mm,page_owner: fix accounting of pages when migrating (bsc#1222366).
- mm,page_owner: fix printing of stack records (bsc#1222366).
- mm,page_owner: fix recursion (bsc#1222366).
- mm,page_owner: fix refcount imbalance (bsc#1222366).
- mm,page_owner: update metadata for tail pages (bsc#1222366).
- mm/vmalloc: huge vmalloc backing pages should be split rather than compound (bsc#1217829).
- mmc: core: avoid negative index with array access (git-fixes).
- mmc: core: fix switch on gp3 partition (git-fixes).
- mmc: core: initialize mmc_blk_ioc_data (git-fixes).
- mmc: mmci: stm32: fix dma api overlapping mappings warning (git-fixes).
- mmc: mmci: stm32: use a buffer for unaligned dma requests (git-fixes).
- mmc: tmio: avoid concurrent runs of mmc_request_done() (git-fixes).
- mmc: wmt-sdmmc: remove an incorrect release_mem_region() call in the .remove function (git-fixes).
- mtd: maps: physmap-core: fix flash size larger than 32-bit (git-fixes).
- mtd: rawnand: lpc32xx_mlc: fix irq handler prototype (git-fixes).
- mtd: rawnand: meson: fix scrambling mode value in command macro (git-fixes).
- net/bnx2x: prevent access to a freed page in page_pool (bsc#1215322).
- net/x25: fix incorrect parameter validation in the x25_getsockopt() function (git-fixes).
- net: fix features skip in for_each_netdev_feature() (git-fixes).
- net: lan78xx: fix runtime pm count underflow on link stop (git-fixes).
- net: ll_temac: platform_get_resource replaced by wrong function (git-fixes).
- net: mana: fix rx dma datasize and skb_over_panic (git-fixes).
- net: phy: fix phy_get_internal_delay accessing an empty array (git-fixes).
- net: sunrpc: fix an off by one in rpc_sockaddr2uaddr() (git-fixes).
- net: usb: dm9601: fix wrong return value in dm9601_mdio_read (git-fixes).
- nfc: nci: fix uninit-value in nci_dev_up and nci_ntf_packet (git-fixes).
- nfs: fix an off by one in root_nfs_cat() (git-fixes).
- nfs: rename nfs_client_kset to nfs_kset (git-fixes).
- nfsd: change LISTXATTRS cookie encoding to big-endian (git-fixes).
- nfsd: convert the callback workqueue to use delayed_work (git-fixes).
- nfsd: do not take fi_lock in nfsd_break_deleg_cb() (git-fixes).
- nfsd: fix LISTXATTRS returning a short list with eof=TRUE (git-fixes).
- nfsd: fix LISTXATTRS returning more bytes than maxcount (git-fixes).
- nfsd: fix file memleak on client_opens_release (git-fixes).
- nfsd: fix nfsd4_listxattr_validate_cookie (git-fixes).
- nfsd: lock_rename() needs both directories to live on the same fs (git-fixes).
- nfsd: reschedule CB operations when backchannel rpc_clnt is shut down (git-fixes).
- nfsd: reset cb_seq_status after NFS4ERR_DELAY (git-fixes).
- nfsd: retransmit callbacks after client reconnects (git-fixes).
- nfsd: use vfs setgid helper (git-fixes).
- nfsv4.1/pnfs: Ensure we handle the error NFS4ERR_RETURNCONFLICT (git-fixes).
- nfsv4.1: fix SP4_MACH_CRED protection for pnfs IO (git-fixes).
- nfsv4.1: fixup use EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes).
- nfsv4.1: use EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes).
- nfsv4.2: fix listxattr maximum XDR buffer size (git-fixes).
- nfsv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 (git-fixes).
- nfsv4.2: fix wrong shrinker_id (git-fixes).
- nfsv4: fix a nfs4_state_manager() race (git-fixes).
- nfsv4: fix a state manager thread deadlock regression (git-fixes).
- nilfs2: fix failure to detect dat corruption in btree and direct mappings (git-fixes).
- nilfs2: prevent kernel bug at submit_bh_wbc() (git-fixes).
- nouveau/dmem: handle kcalloc() allocation failure (git-fixes).
- nouveau: reset the bo resource bus info after an eviction (git-fixes).
- ntfs: fix use-after-free in ntfs_ucsncmp() (bsc#1221713).
- nvme-fc: do not wait in vain when unloading module (git-fixes).
- nvme: fix reconnection fail due to reserved tag allocation (git-fixes).
- nvmet-fc: abort command when there is no binding (git-fixes).
- nvmet-fc: avoid deadlock on delete association path (git-fixes).
- nvmet-fc: defer cleanup using rcu properly (git-fixes).
- nvmet-fc: hold reference on hostport match (git-fixes).
- nvmet-fc: release reference on target port (git-fixes).
- nvmet-fc: take ref count on tgtport before delete assoc (git-fixes).
- nvmet-fcloop: swap the list_add_tail arguments (git-fixes).
- nvmet-tcp: fix nvme tcp ida memory leak (git-fixes).
- pci/aer: fix rootport attribute paths in ABI docs (git-fixes).
- pci/aspm: Use RMW accessors for changing LNKCTL (git-fixes).
- pci/dpc: print all TLP Prefixes, not just the first (git-fixes).
- pci/msi: prevent MSI hardware interrupt number truncation (bsc#1218777)
- pci/p2pdma: Fix a sleeping issue in a RCU read section (git-fixes).
- pci: add locking to RMW PCI Express Capability Register accessors (git-fixes).
- pci: dwc: Fix a 64bit bug in dw_pcie_ep_raise_msix_irq() (git-fixes).
- pci: dwc: endpoint: Fix advertised resizable BAR size (git-fixes).
- pci: dwc: endpoint: Fix dw_pcie_ep_raise_msix_irq() alignment support (git-fixes).
- pci: fu740: Set the number of MSI vectors (git-fixes).
- pci: lengthen reset delay for VideoPropulsion Torrent QN16e card (git-fixes).
- pci: make link retraining use RMW accessors for changing LNKCTL (git-fixes).
- pci: mark 3ware-9650SE Root Port Extended Tags as broken (git-fixes).
- pci: mediatek-gen3: Fix translation window size calculation (git-fixes).
- pci: mediatek: Clear interrupt status before dispatching handler (git-fixes).
- pci: qcom: Enable BDF to SID translation properly (git-fixes).
- pci: qcom: Use DWC helpers for modifying the read-only DBI registers (git-fixes).
- pci: rockchip: Do not advertise MSI-X in PCIe capabilities (git-fixes).
- pci: rockchip: Fix window mapping and address translation for endpoint (git-fixes).
- pci: rockchip: Use 64-bit mask on MSI 64-bit PCI address (git-fixes).
- pci: switchtec: Fix an error handling path in switchtec_pci_probe() (git-fixes).
- pinctrl: mediatek: drop bogus slew rate register range for mt8192 (git-fixes).
- platform/mellanox: mlxreg-hotplug: Remove redundant NULL-check (git-fixes).
- pm: suspend: Set mem_sleep_current during kernel command line setup (git-fixes).
- pnfs/flexfiles: check the layout validity in ff_layout_mirror_prepare_stats (git-fixes).
- pnfs: fix a hang in nfs4_evict_inode() (git-fixes).
- pnfs: fix the pnfs block driver's calculation of layoutget size (git-fixes).
- powerpc/64s: POWER10 CPU Kconfig build option (bsc#1194869).
- powerpc/boot: Disable power10 features after BOOTAFLAGS assignment (bsc#1194869).
- powerpc/boot: Fix boot wrapper code generation with CONFIG_POWER10_CPU (bsc#1194869).
- powerpc/lib/sstep: Do not use __{get/put}_user() on kernel addresses (bsc#1194869).
- powerpc/lib/sstep: Remove unneeded #ifdef __powerpc64__ (bsc#1194869).
- powerpc/lib/sstep: Use l1_dcache_bytes() instead of opencoding (bsc#1194869).
- powerpc/lib/sstep: use truncate_if_32bit() (bsc#1194869).
- powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV (bsc#1220492 ltc#205270).
- powerpc/pseries: Fix potential memleak in papr_get_attr() (bsc#1200465 ltc#197256 jsc#SLE-18130 git-fixes).
- powerpc/sstep: Use bitwise instead of arithmetic operator for flags (bsc#1194869).
- powerpc: add compile-time support for lbarx, lharx (bsc#1194869).
- pwm: mediatek: Update kernel doc for struct pwm_mediatek_of_data (git-fixes).
- qedf: Do not process stag work during unload (bsc#1214852).
- qedf: Wait for stag work during unload (bsc#1214852).
- raid1: fix use-after-free for original bio in raid1_write_request() (bsc#1221097).
- ras/amd/fmpm: Add debugfs interface to print record entries (jsc#PED-7619).
- ras/amd/fmpm: Avoid NULL ptr deref in get_saved_records() (jsc#PED-7619).
- ras/amd/fmpm: Fix build when debugfs is not enabled (jsc#PED-7619).
- ras/amd/fmpm: Fix off by one when unwinding on error (jsc#PED-7619).
- ras/amd/fmpm: Safely handle saved records of various sizes (jsc#PED-7619).
- ras/amd/fmpm: Save SPA values (jsc#PED-7619).
- ras: Avoid build errors when CONFIG_DEBUG_FS=n (git-fixes).
- ras: export helper to get ras_debugfs_dir (jsc#PED-7619).
- rdma/device: fix a race between mad_client and cm_client init (git-fixes)
- rdma/hns: fix mis-modifying default congestion control algorithm (git-fixes)
- rdma/ipoib: fix error code return in ipoib_mcast_join (git-fixes)
- rdma/irdma: remove duplicate assignment (git-fixes)
- rdma/mana_ib: fix bug in creation of dma regions (git-fixes).
- rdma/mlx5: fix fortify source warning while accessing eth segment (git-fixes)
- rdma/mlx5: relax devx access upon modify commands (git-fixes)
- rdma/rtrs-clt: check strnlen return len in sysfs mpath_policy_store() (git-fixes)
- rdma/srpt: do not register event handler until srpt device is fully setup (git-fixes)
- revert 'drm/amd: disable psr-su on parade 0803 tcon' (git-fixes).
- revert 'drm/amd: disable s/g for apus when 64gb or more host memory' (git-fixes).
- revert 'drm/amdgpu/display: change pipe policy for dcn 2.0' (git-fixes).
- revert 'drm/amdgpu/display: change pipe policy for dcn 2.1' (git-fixes).
- revert 'drm/vc4: hdmi: enforce the minimum rate at runtime_resume' (git-fixes).
- revert 'fbdev: flush deferred io before closing (git-fixes).' (bsc#1221814)
- revert 'pci: tegra194: enable support for 256 byte payload' (git-fixes).
- revert 'revert 'drm/amdgpu/display: change pipe policy for dcn 2.0'' (git-fixes).
- revert 'sunrpc dont update timeout value on connection reset' (git-fixes).
- ring-buffer: Clean ring_buffer_poll_wait() error return (git-fixes).
- rtc: mt6397: select IRQ_DOMAIN instead of depending on it (git-fixes).
- s390/pai: fix attr_event_free upper limit for pai device drivers (git-fixes bsc#1221633).
- s390/vfio-ap: realize the VFIO_DEVICE_GET_IRQ_INFO ioctl (bsc#1205316).
- s390/vfio-ap: realize the VFIO_DEVICE_SET_IRQS ioctl (bsc#1205316).
- s390/vfio-ap: wire in the vfio_device_ops request callback (bsc#1205316).
- s390/vtime: fix average steal time calculation (git-fixes bsc#1221951).
- sched/rt: Disallow writing invalid values to sched_rt_period_us (bsc#1220176).
- sched/rt: sysctl_sched_rr_timeslice show default timeslice after reset (bsc#1220176).
- scsi: lpfc: Correct size for cmdwqe/rspwqe for memset() (bsc#1221777).
- scsi: lpfc: Correct size for wqe for memset() (bsc#1221777).
- scsi: lpfc: Define lpfc_dmabuf type for ctx_buf ptr (bsc#1221777).
- scsi: lpfc: Define lpfc_nodelist type for ctx_ndlp ptr (bsc#1221777).
- scsi: lpfc: Define types in a union for generic void *context3 ptr (bsc#1221777).
- scsi: lpfc: Move NPIV's transport unregistration to after resource clean up (bsc#1221777).
- scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1221777).
- scsi: lpfc: Remove IRQF_ONESHOT flag from threaded IRQ handling (bsc#1221777 bsc#1217959).
- scsi: lpfc: Remove unnecessary log message in queuecommand path (bsc#1221777).
- scsi: lpfc: Replace hbalock with ndlp lock in lpfc_nvme_unregister_port() (bsc#1221777).
- scsi: lpfc: Update lpfc version to 14.4.0.1 (bsc#1221777).
- scsi: lpfc: Update lpfc_ramp_down_queue_handler() logic (bsc#1221777).
- scsi: lpfc: Use a dedicated lock for ras_fwlog state (bsc#1221777).
- scsi: qedf: Remove set but unused variable 'page' (bsc#1214852).
- scsi: qedf: Remove unused 'num_handled' variable (bsc#1214852).
- scsi: qedf: Remove unused declaration (bsc#1214852).
- scsi: qla2xxx: Change debug message during driver unload (bsc1221816).
- scsi: qla2xxx: Delay I/O Abort on PCI error (bsc1221816).
- scsi: qla2xxx: Fix N2N stuck connection (bsc1221816).
- scsi: qla2xxx: Fix command flush on cable pull (bsc1221816).
- scsi: qla2xxx: Fix double free of fcport (bsc1221816).
- scsi: qla2xxx: Fix double free of the ha-&gt;vp_map pointer (bsc1221816).
- scsi: qla2xxx: NVME|FCP prefer flag not being honored (bsc1221816).
- scsi: qla2xxx: Prevent command send on chip reset (bsc1221816).
- scsi: qla2xxx: Split FCE|EFT trace control (bsc1221816).
- scsi: qla2xxx: Update manufacturer detail (bsc1221816).
- scsi: qla2xxx: Update version to 10.02.09.200-k (bsc1221816).
- scsi: storvsc: Fix ring buffer size calculation (git-fixes).
- scsi: target: core: Silence the message about unknown VPD pages (bsc#1221252).
- selftests/bpf: add generic BPF program tester-loader (bsc#1222033).
- serial: 8250_exar: Do not remove GPIO device on suspend (git-fixes).
- serial: max310x: fix syntax error in IRQ error message (git-fixes).
- slimbus: core: Remove usage of the deprecated ida_simple_xx() API (git-fixes).
- soc: fsl: qbman: Always disable interrupts when taking cgr_lock (git-fixes).
- spi: lm70llp: fix links in doc and comments (git-fixes).
- spi: spi-mt65xx: Fix NULL pointer access in interrupt handler (git-fixes).
- sr9800: Add check for usbnet_get_endpoints (git-fixes).
- stackdepot: rename pool_index to pool_index_plus_1 (git-fixes).
- staging: vc04_services: fix information leak in create_component() (git-fixes).
- sunrpc: add an is_err() check back to where it was (git-fixes).
- sunrpc: econnreset might require a rebind (git-fixes).
- sunrpc: fix a memleak in gss_import_v2_context (git-fixes).
- sunrpc: fix a suspicious rcu usage warning (git-fixes).
- sunrpc: fix rpc client cleaned up the freed pipefs dentries (git-fixes).
- sunrpc: fix some memleaks in gssx_dec_option_array (git-fixes).
- svcrdma: Drop connection after an RDMA Read error (git-fixes).
- topology/sysfs: Hide PPIN on systems that do not support it (jsc#PED-7618).
- topology: Fix up build warning in topology_is_visible() (jsc#PED-7618).
- tracing/probes: Fix to show a parse error for bad type for $comm (git-fixes).
- tracing: Fix wasted memory in saved_cmdlines logic (git-fixes).
- tracing: Inform kmemleak of saved_cmdlines allocation (git-fixes).
- tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (bsc#1222619).
- tty: serial: fsl_lpuart: avoid idle preamble pending if CTS is enabled (git-fixes).
- tty: serial: samsung: fix tx_empty() to return TIOCSER_TEMT (git-fixes).
- tty: vt: fix 20 vs 0x20 typo in EScsiignore (git-fixes).
- ubifs: Queue up space reservation tasks if retrying many times (git-fixes).
- ubifs: Remove unreachable code in dbg_check_ltab_lnum (git-fixes).
- ubifs: Set page uptodate in the correct place (git-fixes).
- ubifs: dbg_check_idx_size: Fix kmemleak if loading znode failed (git-fixes).
- ubifs: fix sort function prototype (git-fixes).
- usb: audio-v2: Correct comments for struct uac_clock_selector_descriptor (git-fixes).
- usb: cdc-wdm: close race between read and workqueue (git-fixes).
- usb: core: fix deadlock in usb_deauthorize_interface() (git-fixes).
- usb: dwc2: gadget: Fix exiting from clock gating (git-fixes).
- usb: dwc2: gadget: LPM flow fix (git-fixes).
- usb: dwc2: host: Fix ISOC flow in DDMA mode (git-fixes).
- usb: dwc2: host: Fix hibernation flow (git-fixes).
- usb: dwc2: host: Fix remote wakeup from hibernation (git-fixes).
- usb: dwc3: Properly set system wakeup (git-fixes).
- usb: f_mass_storage: forbid async queue when shutdown happen (git-fixes).
- usb: gadget: ncm: Fix handling of zero block length packets (git-fixes).
- usb: gadget: net2272: Use irqflags in the call to net2272_probe_fin (git-fixes).
- usb: hub: Replace hardcoded quirk value with BIT() macro (git-fixes).
- usb: port: Do not try to peer unused USB ports based on location (git-fixes).
- usb: typec: Return size of buffer if pd_set operation succeeds (git-fixes).
- usb: typec: ucsi: Check for notifications after init (git-fixes).
- usb: typec: ucsi: Clean up UCSI_CABLE_PROP macros (git-fixes).
- usb: typec: ucsi: Clear EVENT_PENDING under PPM lock (git-fixes).
- usb: usb-storage: prevent divide-by-0 error in isd200_ata_command (git-fixes).
- usb: xhci: Add error handling in xhci_map_urb_for_dma (git-fixes).
- vboxsf: Avoid an spurious warning if load_nls_xxx() fails (git-fixes).
- vt: fix unicode buffer corruption when deleting characters (git-fixes).
- watchdog: stm32_iwdg: initialize default timeout (git-fixes).
- wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (git-fixes).
- wifi: ath11k: decrease MHI channel buffer length to 8KB (bsc#1207948).
- wifi: ath11k: initialize rx_mcs_80 and rx_mcs_160 before use (git-fixes).
- wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete (git-fixes).
- wifi: b43: Disable QoS for bcm4331 (git-fixes).
- wifi: b43: Stop correct queue in DMA worker when QoS is disabled (git-fixes).
- wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabled (git-fixes).
- wifi: b43: Stop/wake correct queue in PIO Tx path when QoS is disabled (git-fixes).
- wifi: brcmfmac: fix copyright year mentioned in platform_data header (git-fixes).
- wifi: brcmsmac: avoid function pointer casts (git-fixes).
- wifi: iwlwifi: dbg-tlv: ensure NUL termination (git-fixes).
- wifi: iwlwifi: fix EWRD table validity check (git-fixes).
- wifi: iwlwifi: fw: do not always use FW dump trig (git-fixes).
- wifi: iwlwifi: mvm: do not set replay counters to 0xff (git-fixes).
- wifi: iwlwifi: mvm: report beacon protection failures (git-fixes).
- wifi: iwlwifi: mvm: rfi: fix potential response leaks (git-fixes).
- wifi: iwlwifi: mvm: use FW rate for non-data only on new devices (git-fixes).
- wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer() (git-fixes).
- wifi: mwifiex: debugfs: Drop unnecessary error check for debugfs_create_dir() (git-fixes).
- wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work (git-fixes).
- wifi: rtw88: 8821c: Fix false alarm count (git-fixes).
- wifi: wilc1000: fix RCU usage in connect path (git-fixes).
- wifi: wilc1000: fix declarations ordering (stable-fixes).
- wifi: wilc1000: fix multi-vif management when deleting a vif (git-fixes).
- wifi: wilc1000: prevent use-after-free on vif when cleaning up all interfaces (git-fixes).
- x86/CPU/AMD: Update the Zenbleed microcode revisions (git-fixes).
- x86/bugs: Fix the SRSO mitigation on Zen3/4 (git-fixes).
- x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (git-fixes).
- xhci: handle isoc Babble and Buffer Overrun events properly (git-fixes).
- xhci: process isoc TD properly when there was a transaction error mid TD (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-04-30"/>
	<updated date="2024-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200465">SUSE bug 1200465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205316">SUSE bug 1205316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207948">SUSE bug 1207948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209635">SUSE bug 1209635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209657">SUSE bug 1209657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212514">SUSE bug 1212514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213456">SUSE bug 1213456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214852">SUSE bug 1214852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215221">SUSE bug 1215221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215322">SUSE bug 1215322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217339">SUSE bug 1217339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217829">SUSE bug 1217829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217959">SUSE bug 1217959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217987">SUSE bug 1217987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217988">SUSE bug 1217988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217989">SUSE bug 1217989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218321">SUSE bug 1218321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218336">SUSE bug 1218336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218479">SUSE bug 1218479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218562">SUSE bug 1218562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218643">SUSE bug 1218643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218777">SUSE bug 1218777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219169">SUSE bug 1219169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219170">SUSE bug 1219170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219264">SUSE bug 1219264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219443">SUSE bug 1219443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219834">SUSE bug 1219834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220114">SUSE bug 1220114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220176">SUSE bug 1220176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220237">SUSE bug 1220237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220251">SUSE bug 1220251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220320">SUSE bug 1220320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220325">SUSE bug 1220325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220328">SUSE bug 1220328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220337">SUSE bug 1220337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220340">SUSE bug 1220340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220365">SUSE bug 1220365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220366">SUSE bug 1220366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220393">SUSE bug 1220393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220398">SUSE bug 1220398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220411">SUSE bug 1220411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220413">SUSE bug 1220413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220433">SUSE bug 1220433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220439">SUSE bug 1220439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220443">SUSE bug 1220443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220445">SUSE bug 1220445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220466">SUSE bug 1220466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220469">SUSE bug 1220469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220478">SUSE bug 1220478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220482">SUSE bug 1220482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220484">SUSE bug 1220484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220486">SUSE bug 1220486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220487">SUSE bug 1220487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220492">SUSE bug 1220492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220703">SUSE bug 1220703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220735">SUSE bug 1220735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220736">SUSE bug 1220736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220775">SUSE bug 1220775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220790">SUSE bug 1220790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220797">SUSE bug 1220797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220831">SUSE bug 1220831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220833">SUSE bug 1220833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220836">SUSE bug 1220836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220839">SUSE bug 1220839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220840">SUSE bug 1220840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220843">SUSE bug 1220843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220845">SUSE bug 1220845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220848">SUSE bug 1220848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220870">SUSE bug 1220870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220871">SUSE bug 1220871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220872">SUSE bug 1220872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220878">SUSE bug 1220878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220879">SUSE bug 1220879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220883">SUSE bug 1220883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220885">SUSE bug 1220885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220887">SUSE bug 1220887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220898">SUSE bug 1220898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220917">SUSE bug 1220917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220918">SUSE bug 1220918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220920">SUSE bug 1220920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220921">SUSE bug 1220921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220926">SUSE bug 1220926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220927">SUSE bug 1220927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220929">SUSE bug 1220929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220930">SUSE bug 1220930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220931">SUSE bug 1220931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220932">SUSE bug 1220932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220933">SUSE bug 1220933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220937">SUSE bug 1220937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220938">SUSE bug 1220938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220940">SUSE bug 1220940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220954">SUSE bug 1220954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220955">SUSE bug 1220955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220959">SUSE bug 1220959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220960">SUSE bug 1220960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220961">SUSE bug 1220961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220965">SUSE bug 1220965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220969">SUSE bug 1220969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220978">SUSE bug 1220978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220979">SUSE bug 1220979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220981">SUSE bug 1220981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220982">SUSE bug 1220982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220983">SUSE bug 1220983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220985">SUSE bug 1220985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220986">SUSE bug 1220986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220987">SUSE bug 1220987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220989">SUSE bug 1220989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220990">SUSE bug 1220990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221009">SUSE bug 1221009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221012">SUSE bug 1221012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221015">SUSE bug 1221015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221022">SUSE bug 1221022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221039">SUSE bug 1221039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221040">SUSE bug 1221040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221044">SUSE bug 1221044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221045">SUSE bug 1221045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221046">SUSE bug 1221046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221048">SUSE bug 1221048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221055">SUSE bug 1221055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221056">SUSE bug 1221056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221058">SUSE bug 1221058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221060">SUSE bug 1221060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221061">SUSE bug 1221061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221062">SUSE bug 1221062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221066">SUSE bug 1221066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221067">SUSE bug 1221067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221068">SUSE bug 1221068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221069">SUSE bug 1221069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221070">SUSE bug 1221070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221071">SUSE bug 1221071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221077">SUSE bug 1221077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221082">SUSE bug 1221082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221090">SUSE bug 1221090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221097">SUSE bug 1221097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221156">SUSE bug 1221156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221252">SUSE bug 1221252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221273">SUSE bug 1221273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221274">SUSE bug 1221274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221276">SUSE bug 1221276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221277">SUSE bug 1221277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221291">SUSE bug 1221291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221293">SUSE bug 1221293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221298">SUSE bug 1221298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221337">SUSE bug 1221337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221338">SUSE bug 1221338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221375">SUSE bug 1221375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221379">SUSE bug 1221379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221551">SUSE bug 1221551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221553">SUSE bug 1221553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221613">SUSE bug 1221613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221614">SUSE bug 1221614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221616">SUSE bug 1221616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221618">SUSE bug 1221618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221631">SUSE bug 1221631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221633">SUSE bug 1221633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221713">SUSE bug 1221713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221725">SUSE bug 1221725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221777">SUSE bug 1221777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221814">SUSE bug 1221814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221816">SUSE bug 1221816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221830">SUSE bug 1221830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221951">SUSE bug 1221951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222033">SUSE bug 1222033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222056">SUSE bug 1222056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222060">SUSE bug 1222060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222070">SUSE bug 1222070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222073">SUSE bug 1222073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222117">SUSE bug 1222117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222274">SUSE bug 1222274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222291">SUSE bug 1222291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222300">SUSE bug 1222300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222304">SUSE bug 1222304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222317">SUSE bug 1222317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222331">SUSE bug 1222331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222355">SUSE bug 1222355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222356">SUSE bug 1222356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222360">SUSE bug 1222360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222366">SUSE bug 1222366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222373">SUSE bug 1222373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222619">SUSE bug 1222619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222952">SUSE bug 1222952</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46925/">CVE-2021-46925 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46925">CVE-2021-46925 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46926/">CVE-2021-46926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46926">CVE-2021-46926 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46927/">CVE-2021-46927 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46927">CVE-2021-46927 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46929/">CVE-2021-46929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46929">CVE-2021-46929 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46930/">CVE-2021-46930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46930">CVE-2021-46930 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46931/">CVE-2021-46931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46931">CVE-2021-46931 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46933/">CVE-2021-46933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46933">CVE-2021-46933 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46934/">CVE-2021-46934 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46934">CVE-2021-46934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46936/">CVE-2021-46936 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46936">CVE-2021-46936 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47082/">CVE-2021-47082 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47082">CVE-2021-47082 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47083/">CVE-2021-47083 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47083">CVE-2021-47083 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47087/">CVE-2021-47087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47087">CVE-2021-47087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47091/">CVE-2021-47091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47091">CVE-2021-47091 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47093/">CVE-2021-47093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47093">CVE-2021-47093 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47094/">CVE-2021-47094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47094">CVE-2021-47094 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47095/">CVE-2021-47095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47095">CVE-2021-47095 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47096/">CVE-2021-47096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47096">CVE-2021-47096 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47097/">CVE-2021-47097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47097">CVE-2021-47097 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47098/">CVE-2021-47098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47098">CVE-2021-47098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47099/">CVE-2021-47099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47099">CVE-2021-47099 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47100/">CVE-2021-47100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47100">CVE-2021-47100 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47101/">CVE-2021-47101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47101">CVE-2021-47101 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47102/">CVE-2021-47102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47102">CVE-2021-47102 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47104/">CVE-2021-47104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47104">CVE-2021-47104 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47105/">CVE-2021-47105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47105">CVE-2021-47105 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47107/">CVE-2021-47107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47107">CVE-2021-47107 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47108/">CVE-2021-47108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47108">CVE-2021-47108 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4744/">CVE-2022-4744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4744">CVE-2022-4744 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48626/">CVE-2022-48626 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48626">CVE-2022-48626 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48627/">CVE-2022-48627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48627">CVE-2022-48627 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48628/">CVE-2022-48628 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48628">CVE-2022-48628 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48629/">CVE-2022-48629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48629">CVE-2022-48629 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48630/">CVE-2022-48630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48630">CVE-2022-48630 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0160/">CVE-2023-0160 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0160">CVE-2023-0160 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35827/">CVE-2023-35827 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35827">CVE-2023-35827 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4881/">CVE-2023-4881 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4881">CVE-2023-4881 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52447/">CVE-2023-52447 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52447">CVE-2023-52447 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52450/">CVE-2023-52450 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52450">CVE-2023-52450 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52453/">CVE-2023-52453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52453">CVE-2023-52453 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52454/">CVE-2023-52454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52454">CVE-2023-52454 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52462/">CVE-2023-52462 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52462">CVE-2023-52462 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52463/">CVE-2023-52463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52463">CVE-2023-52463 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52467/">CVE-2023-52467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52467">CVE-2023-52467 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52469/">CVE-2023-52469 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52469">CVE-2023-52469 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52470/">CVE-2023-52470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52470">CVE-2023-52470 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-52474/">CVE-2023-52474 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52474">CVE-2023-52474 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52476/">CVE-2023-52476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52476">CVE-2023-52476 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52477/">CVE-2023-52477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52477">CVE-2023-52477 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52481/">CVE-2023-52481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52481">CVE-2023-52481 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52482/">CVE-2023-52482 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52482">CVE-2023-52482 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52484/">CVE-2023-52484 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52484">CVE-2023-52484 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52486/">CVE-2023-52486 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52486">CVE-2023-52486 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52492/">CVE-2023-52492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52492">CVE-2023-52492 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52493/">CVE-2023-52493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52493">CVE-2023-52493 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52494/">CVE-2023-52494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52494">CVE-2023-52494 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52497/">CVE-2023-52497 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52497">CVE-2023-52497 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52500/">CVE-2023-52500 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52500">CVE-2023-52500 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52501/">CVE-2023-52501 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52501">CVE-2023-52501 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52502/">CVE-2023-52502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52502">CVE-2023-52502 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52504/">CVE-2023-52504 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52504">CVE-2023-52504 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52507/">CVE-2023-52507 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52507">CVE-2023-52507 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52508/">CVE-2023-52508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52508">CVE-2023-52508 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52509/">CVE-2023-52509 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52509">CVE-2023-52509 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52510/">CVE-2023-52510 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52510">CVE-2023-52510 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52511/">CVE-2023-52511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52511">CVE-2023-52511 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52513/">CVE-2023-52513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52513">CVE-2023-52513 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52515/">CVE-2023-52515 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52515">CVE-2023-52515 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52517/">CVE-2023-52517 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52517">CVE-2023-52517 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52518/">CVE-2023-52518 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52518">CVE-2023-52518 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52519/">CVE-2023-52519 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52519">CVE-2023-52519 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52520/">CVE-2023-52520 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52520">CVE-2023-52520 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52523/">CVE-2023-52523 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52523">CVE-2023-52523 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52524/">CVE-2023-52524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52524">CVE-2023-52524 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52525/">CVE-2023-52525 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52525">CVE-2023-52525 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52528/">CVE-2023-52528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52528">CVE-2023-52528 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52529/">CVE-2023-52529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52529">CVE-2023-52529 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52530/">CVE-2023-52530 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52530">CVE-2023-52530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52531/">CVE-2023-52531 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52531">CVE-2023-52531 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52532/">CVE-2023-52532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52532">CVE-2023-52532 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52559/">CVE-2023-52559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52559">CVE-2023-52559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52563/">CVE-2023-52563 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52563">CVE-2023-52563 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52564/">CVE-2023-52564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52564">CVE-2023-52564 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52566/">CVE-2023-52566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52566">CVE-2023-52566 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52567/">CVE-2023-52567 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52567">CVE-2023-52567 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52569/">CVE-2023-52569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52569">CVE-2023-52569 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52574/">CVE-2023-52574 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52574">CVE-2023-52574 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52575/">CVE-2023-52575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52575">CVE-2023-52575 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52576/">CVE-2023-52576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52576">CVE-2023-52576 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52582/">CVE-2023-52582 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52582">CVE-2023-52582 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52583/">CVE-2023-52583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52583">CVE-2023-52583 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52587/">CVE-2023-52587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52587">CVE-2023-52587 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52591/">CVE-2023-52591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52591">CVE-2023-52591 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52594/">CVE-2023-52594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52594">CVE-2023-52594 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52595/">CVE-2023-52595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52595">CVE-2023-52595 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52597/">CVE-2023-52597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52597">CVE-2023-52597 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52598/">CVE-2023-52598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52598">CVE-2023-52598 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52599/">CVE-2023-52599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52599">CVE-2023-52599 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52600/">CVE-2023-52600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52600">CVE-2023-52600 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52601/">CVE-2023-52601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52601">CVE-2023-52601 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52602/">CVE-2023-52602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52602">CVE-2023-52602 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52603/">CVE-2023-52603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52603">CVE-2023-52603 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52604/">CVE-2023-52604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52604">CVE-2023-52604 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52605/">CVE-2023-52605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52605">CVE-2023-52605 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52606/">CVE-2023-52606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52606">CVE-2023-52606 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52607/">CVE-2023-52607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52607">CVE-2023-52607 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52608/">CVE-2023-52608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52608">CVE-2023-52608 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52612/">CVE-2023-52612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52612">CVE-2023-52612 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52615/">CVE-2023-52615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52615">CVE-2023-52615 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52617/">CVE-2023-52617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52617">CVE-2023-52617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52619/">CVE-2023-52619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52619">CVE-2023-52619 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52621/">CVE-2023-52621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52621">CVE-2023-52621 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52623/">CVE-2023-52623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52623">CVE-2023-52623 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52628/">CVE-2023-52628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52628">CVE-2023-52628 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52632/">CVE-2023-52632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52632">CVE-2023-52632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52637/">CVE-2023-52637 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52637">CVE-2023-52637 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52639/">CVE-2023-52639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52639">CVE-2023-52639 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6270/">CVE-2023-6270 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6356/">CVE-2023-6356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6356">CVE-2023-6356 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6535/">CVE-2023-6535 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6535">CVE-2023-6535 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6536/">CVE-2023-6536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6536">CVE-2023-6536 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-7042/">CVE-2023-7042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7042">CVE-2023-7042 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-7192/">CVE-2023-7192 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7192">CVE-2023-7192 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0841/">CVE-2024-0841 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0841">CVE-2024-0841 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2201/">CVE-2024-2201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2201">CVE-2024-2201 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22099/">CVE-2024-22099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22099">CVE-2024-22099 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23307/">CVE-2024-23307 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23307">CVE-2024-23307 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25739/">CVE-2024-25739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25739">CVE-2024-25739 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25742/">CVE-2024-25742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25742">CVE-2024-25742 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-25743/">CVE-2024-25743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25743">CVE-2024-25743 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26599/">CVE-2024-26599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26599">CVE-2024-26599 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26600/">CVE-2024-26600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26600">CVE-2024-26600 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26602/">CVE-2024-26602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26602">CVE-2024-26602 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26607/">CVE-2024-26607 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26607">CVE-2024-26607 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26612/">CVE-2024-26612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26612">CVE-2024-26612 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26614/">CVE-2024-26614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26614">CVE-2024-26614 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-26620/">CVE-2024-26620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26620">CVE-2024-26620 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26627/">CVE-2024-26627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26627">CVE-2024-26627 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26629/">CVE-2024-26629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26629">CVE-2024-26629 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26642/">CVE-2024-26642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26642">CVE-2024-26642 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26645/">CVE-2024-26645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26645">CVE-2024-26645 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-26646/">CVE-2024-26646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26646">CVE-2024-26646 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26651/">CVE-2024-26651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26651">CVE-2024-26651 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26654/">CVE-2024-26654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26654">CVE-2024-26654 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26659/">CVE-2024-26659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26659">CVE-2024-26659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26664/">CVE-2024-26664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26664">CVE-2024-26664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26667/">CVE-2024-26667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26667">CVE-2024-26667 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26670/">CVE-2024-26670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26670">CVE-2024-26670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26695/">CVE-2024-26695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26695">CVE-2024-26695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26717/">CVE-2024-26717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26717">CVE-2024-26717 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858494" comment="cluster-md-kmp-64kb-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858495" comment="cluster-md-kmp-default-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858496" comment="dlm-kmp-64kb-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858497" comment="dlm-kmp-default-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858498" comment="dtb-allwinner-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858499" comment="dtb-altera-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858500" comment="dtb-amazon-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858501" comment="dtb-amd-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858502" comment="dtb-amlogic-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858503" comment="dtb-apm-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858504" comment="dtb-apple-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858505" comment="dtb-arm-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858506" comment="dtb-broadcom-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858507" comment="dtb-cavium-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858508" comment="dtb-exynos-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858509" comment="dtb-freescale-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858510" comment="dtb-hisilicon-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858511" comment="dtb-lg-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858512" comment="dtb-marvell-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858513" comment="dtb-mediatek-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858514" comment="dtb-nvidia-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858515" comment="dtb-qcom-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858516" comment="dtb-renesas-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858517" comment="dtb-rockchip-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858518" comment="dtb-socionext-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858519" comment="dtb-sprd-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858520" comment="dtb-xilinx-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858521" comment="gfs2-kmp-64kb-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858522" comment="gfs2-kmp-default-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858523" comment="kernel-64kb-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858524" comment="kernel-64kb-devel-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858525" comment="kernel-64kb-extra-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858526" comment="kernel-64kb-livepatch-devel-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858527" comment="kernel-64kb-optional-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858528" comment="kernel-debug-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858529" comment="kernel-debug-devel-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858530" comment="kernel-debug-livepatch-devel-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858531" comment="kernel-debug-vdso-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858532" comment="kernel-default-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858533" comment="kernel-default-base-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858534" comment="kernel-default-base-rebuild-5.14.21-150500.55.59.1.150500.6.25.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858535" comment="kernel-default-devel-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858536" comment="kernel-default-extra-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858537" comment="kernel-default-livepatch-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858538" comment="kernel-default-livepatch-devel-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858539" comment="kernel-default-optional-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858540" comment="kernel-default-vdso-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858541" comment="kernel-devel-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858542" comment="kernel-docs-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858543" comment="kernel-docs-html-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858544" comment="kernel-kvmsmall-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858545" comment="kernel-kvmsmall-devel-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858546" comment="kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858547" comment="kernel-kvmsmall-vdso-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858548" comment="kernel-macros-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858549" comment="kernel-obs-build-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858550" comment="kernel-obs-qa-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858551" comment="kernel-source-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858552" comment="kernel-source-vanilla-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858553" comment="kernel-syms-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858554" comment="kernel-zfcpdump-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858555" comment="kselftests-kmp-64kb-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858556" comment="kselftests-kmp-default-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858557" comment="ocfs2-kmp-64kb-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858558" comment="ocfs2-kmp-default-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858559" comment="reiserfs-kmp-64kb-5.14.21-150500.55.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858560" comment="reiserfs-kmp-default-5.14.21-150500.55.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4687" version="1" class="patch">
	<metadata>
		<title>Security update for cosign (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222835" ref_url="https://bugzilla.suse.com/1222835" source="BUGZILLA"/>
		<reference ref_id="1222837" ref_url="https://bugzilla.suse.com/1222837" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-29902" ref_url="https://www.suse.com/security/cve/CVE-2024-29902/" source="CVE"/>
		<reference ref_id="CVE-2024-29903" ref_url="https://www.suse.com/security/cve/CVE-2024-29903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019271.html" source="SUSE-SU"/>
		<description>
This update for cosign fixes the following issues:

- CVE-2024-29902: Fixed denial of service on host machine via remote image with a malicious attachments (bsc#1222835)
- CVE-2024-29903: Fixed denial of service on host machine via malicious software artifacts (bsc#1222837)

Other fixes:
- Updated to 2.2.4 (jsc#SLE-23879)
    * Fixes for GHSA-88jx-383q-w4qc and GHSA-95pr-fxf5-86gv (#3661)
    * ErrNoSignaturesFound should be used when there is no signature attached to an image. (#3526)
    * fix semgrep issues for dgryski.semgrep-go ruleset (#3541)
    * Honor creation timestamp for signatures again (#3549)
  * Features
    * Adds Support for Fulcio Client Credentials Flow, and Argument to Set Flow Explicitly (#3578)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-02"/>
	<updated date="2024-05-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1222835">SUSE bug 1222835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222837">SUSE bug 1222837</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-29902/">CVE-2024-29902 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-29902">CVE-2024-29902 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-29903/">CVE-2024-29903 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-29903">CVE-2024-29903 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858723" comment="cosign-2.2.4-150400.3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4688" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1177529" ref_url="https://bugzilla.suse.com/1177529" source="BUGZILLA"/>
		<reference ref_id="1192145" ref_url="https://bugzilla.suse.com/1192145" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1200465" ref_url="https://bugzilla.suse.com/1200465" source="BUGZILLA"/>
		<reference ref_id="1205316" ref_url="https://bugzilla.suse.com/1205316" source="BUGZILLA"/>
		<reference ref_id="1207948" ref_url="https://bugzilla.suse.com/1207948" source="BUGZILLA"/>
		<reference ref_id="1209635" ref_url="https://bugzilla.suse.com/1209635" source="BUGZILLA"/>
		<reference ref_id="1209657" ref_url="https://bugzilla.suse.com/1209657" source="BUGZILLA"/>
		<reference ref_id="1212514" ref_url="https://bugzilla.suse.com/1212514" source="BUGZILLA"/>
		<reference ref_id="1213456" ref_url="https://bugzilla.suse.com/1213456" source="BUGZILLA"/>
		<reference ref_id="1214852" ref_url="https://bugzilla.suse.com/1214852" source="BUGZILLA"/>
		<reference ref_id="1215221" ref_url="https://bugzilla.suse.com/1215221" source="BUGZILLA"/>
		<reference ref_id="1215322" ref_url="https://bugzilla.suse.com/1215322" source="BUGZILLA"/>
		<reference ref_id="1217339" ref_url="https://bugzilla.suse.com/1217339" source="BUGZILLA"/>
		<reference ref_id="1217829" ref_url="https://bugzilla.suse.com/1217829" source="BUGZILLA"/>
		<reference ref_id="1217959" ref_url="https://bugzilla.suse.com/1217959" source="BUGZILLA"/>
		<reference ref_id="1217987" ref_url="https://bugzilla.suse.com/1217987" source="BUGZILLA"/>
		<reference ref_id="1217988" ref_url="https://bugzilla.suse.com/1217988" source="BUGZILLA"/>
		<reference ref_id="1217989" ref_url="https://bugzilla.suse.com/1217989" source="BUGZILLA"/>
		<reference ref_id="1218321" ref_url="https://bugzilla.suse.com/1218321" source="BUGZILLA"/>
		<reference ref_id="1218336" ref_url="https://bugzilla.suse.com/1218336" source="BUGZILLA"/>
		<reference ref_id="1218479" ref_url="https://bugzilla.suse.com/1218479" source="BUGZILLA"/>
		<reference ref_id="1218643" ref_url="https://bugzilla.suse.com/1218643" source="BUGZILLA"/>
		<reference ref_id="1218777" ref_url="https://bugzilla.suse.com/1218777" source="BUGZILLA"/>
		<reference ref_id="1219126" ref_url="https://bugzilla.suse.com/1219126" source="BUGZILLA"/>
		<reference ref_id="1219169" ref_url="https://bugzilla.suse.com/1219169" source="BUGZILLA"/>
		<reference ref_id="1219170" ref_url="https://bugzilla.suse.com/1219170" source="BUGZILLA"/>
		<reference ref_id="1219264" ref_url="https://bugzilla.suse.com/1219264" source="BUGZILLA"/>
		<reference ref_id="1219834" ref_url="https://bugzilla.suse.com/1219834" source="BUGZILLA"/>
		<reference ref_id="1220114" ref_url="https://bugzilla.suse.com/1220114" source="BUGZILLA"/>
		<reference ref_id="1220176" ref_url="https://bugzilla.suse.com/1220176" source="BUGZILLA"/>
		<reference ref_id="1220237" ref_url="https://bugzilla.suse.com/1220237" source="BUGZILLA"/>
		<reference ref_id="1220251" ref_url="https://bugzilla.suse.com/1220251" source="BUGZILLA"/>
		<reference ref_id="1220320" ref_url="https://bugzilla.suse.com/1220320" source="BUGZILLA"/>
		<reference ref_id="1220337" ref_url="https://bugzilla.suse.com/1220337" source="BUGZILLA"/>
		<reference ref_id="1220340" ref_url="https://bugzilla.suse.com/1220340" source="BUGZILLA"/>
		<reference ref_id="1220365" ref_url="https://bugzilla.suse.com/1220365" source="BUGZILLA"/>
		<reference ref_id="1220366" ref_url="https://bugzilla.suse.com/1220366" source="BUGZILLA"/>
		<reference ref_id="1220398" ref_url="https://bugzilla.suse.com/1220398" source="BUGZILLA"/>
		<reference ref_id="1220411" ref_url="https://bugzilla.suse.com/1220411" source="BUGZILLA"/>
		<reference ref_id="1220413" ref_url="https://bugzilla.suse.com/1220413" source="BUGZILLA"/>
		<reference ref_id="1220439" ref_url="https://bugzilla.suse.com/1220439" source="BUGZILLA"/>
		<reference ref_id="1220443" ref_url="https://bugzilla.suse.com/1220443" source="BUGZILLA"/>
		<reference ref_id="1220445" ref_url="https://bugzilla.suse.com/1220445" source="BUGZILLA"/>
		<reference ref_id="1220466" ref_url="https://bugzilla.suse.com/1220466" source="BUGZILLA"/>
		<reference ref_id="1220478" ref_url="https://bugzilla.suse.com/1220478" source="BUGZILLA"/>
		<reference ref_id="1220482" ref_url="https://bugzilla.suse.com/1220482" source="BUGZILLA"/>
		<reference ref_id="1220484" ref_url="https://bugzilla.suse.com/1220484" source="BUGZILLA"/>
		<reference ref_id="1220486" ref_url="https://bugzilla.suse.com/1220486" source="BUGZILLA"/>
		<reference ref_id="1220487" ref_url="https://bugzilla.suse.com/1220487" source="BUGZILLA"/>
		<reference ref_id="1220492" ref_url="https://bugzilla.suse.com/1220492" source="BUGZILLA"/>
		<reference ref_id="1220703" ref_url="https://bugzilla.suse.com/1220703" source="BUGZILLA"/>
		<reference ref_id="1220775" ref_url="https://bugzilla.suse.com/1220775" source="BUGZILLA"/>
		<reference ref_id="1220790" ref_url="https://bugzilla.suse.com/1220790" source="BUGZILLA"/>
		<reference ref_id="1220797" ref_url="https://bugzilla.suse.com/1220797" source="BUGZILLA"/>
		<reference ref_id="1220831" ref_url="https://bugzilla.suse.com/1220831" source="BUGZILLA"/>
		<reference ref_id="1220833" ref_url="https://bugzilla.suse.com/1220833" source="BUGZILLA"/>
		<reference ref_id="1220836" ref_url="https://bugzilla.suse.com/1220836" source="BUGZILLA"/>
		<reference ref_id="1220839" ref_url="https://bugzilla.suse.com/1220839" source="BUGZILLA"/>
		<reference ref_id="1220840" ref_url="https://bugzilla.suse.com/1220840" source="BUGZILLA"/>
		<reference ref_id="1220843" ref_url="https://bugzilla.suse.com/1220843" source="BUGZILLA"/>
		<reference ref_id="1220870" ref_url="https://bugzilla.suse.com/1220870" source="BUGZILLA"/>
		<reference ref_id="1220871" ref_url="https://bugzilla.suse.com/1220871" source="BUGZILLA"/>
		<reference ref_id="1220872" ref_url="https://bugzilla.suse.com/1220872" source="BUGZILLA"/>
		<reference ref_id="1220878" ref_url="https://bugzilla.suse.com/1220878" source="BUGZILLA"/>
		<reference ref_id="1220879" ref_url="https://bugzilla.suse.com/1220879" source="BUGZILLA"/>
		<reference ref_id="1220883" ref_url="https://bugzilla.suse.com/1220883" source="BUGZILLA"/>
		<reference ref_id="1220885" ref_url="https://bugzilla.suse.com/1220885" source="BUGZILLA"/>
		<reference ref_id="1220887" ref_url="https://bugzilla.suse.com/1220887" source="BUGZILLA"/>
		<reference ref_id="1220898" ref_url="https://bugzilla.suse.com/1220898" source="BUGZILLA"/>
		<reference ref_id="1220901" ref_url="https://bugzilla.suse.com/1220901" source="BUGZILLA"/>
		<reference ref_id="1220915" ref_url="https://bugzilla.suse.com/1220915" source="BUGZILLA"/>
		<reference ref_id="1220918" ref_url="https://bugzilla.suse.com/1220918" source="BUGZILLA"/>
		<reference ref_id="1220920" ref_url="https://bugzilla.suse.com/1220920" source="BUGZILLA"/>
		<reference ref_id="1220921" ref_url="https://bugzilla.suse.com/1220921" source="BUGZILLA"/>
		<reference ref_id="1220926" ref_url="https://bugzilla.suse.com/1220926" source="BUGZILLA"/>
		<reference ref_id="1220927" ref_url="https://bugzilla.suse.com/1220927" source="BUGZILLA"/>
		<reference ref_id="1220929" ref_url="https://bugzilla.suse.com/1220929" source="BUGZILLA"/>
		<reference ref_id="1220932" ref_url="https://bugzilla.suse.com/1220932" source="BUGZILLA"/>
		<reference ref_id="1220935" ref_url="https://bugzilla.suse.com/1220935" source="BUGZILLA"/>
		<reference ref_id="1220937" ref_url="https://bugzilla.suse.com/1220937" source="BUGZILLA"/>
		<reference ref_id="1220938" ref_url="https://bugzilla.suse.com/1220938" source="BUGZILLA"/>
		<reference ref_id="1220940" ref_url="https://bugzilla.suse.com/1220940" source="BUGZILLA"/>
		<reference ref_id="1220954" ref_url="https://bugzilla.suse.com/1220954" source="BUGZILLA"/>
		<reference ref_id="1220955" ref_url="https://bugzilla.suse.com/1220955" source="BUGZILLA"/>
		<reference ref_id="1220959" ref_url="https://bugzilla.suse.com/1220959" source="BUGZILLA"/>
		<reference ref_id="1220960" ref_url="https://bugzilla.suse.com/1220960" source="BUGZILLA"/>
		<reference ref_id="1220961" ref_url="https://bugzilla.suse.com/1220961" source="BUGZILLA"/>
		<reference ref_id="1220965" ref_url="https://bugzilla.suse.com/1220965" source="BUGZILLA"/>
		<reference ref_id="1220969" ref_url="https://bugzilla.suse.com/1220969" source="BUGZILLA"/>
		<reference ref_id="1220978" ref_url="https://bugzilla.suse.com/1220978" source="BUGZILLA"/>
		<reference ref_id="1220979" ref_url="https://bugzilla.suse.com/1220979" source="BUGZILLA"/>
		<reference ref_id="1220981" ref_url="https://bugzilla.suse.com/1220981" source="BUGZILLA"/>
		<reference ref_id="1220982" ref_url="https://bugzilla.suse.com/1220982" source="BUGZILLA"/>
		<reference ref_id="1220983" ref_url="https://bugzilla.suse.com/1220983" source="BUGZILLA"/>
		<reference ref_id="1220985" ref_url="https://bugzilla.suse.com/1220985" source="BUGZILLA"/>
		<reference ref_id="1220986" ref_url="https://bugzilla.suse.com/1220986" source="BUGZILLA"/>
		<reference ref_id="1220987" ref_url="https://bugzilla.suse.com/1220987" source="BUGZILLA"/>
		<reference ref_id="1220989" ref_url="https://bugzilla.suse.com/1220989" source="BUGZILLA"/>
		<reference ref_id="1220990" ref_url="https://bugzilla.suse.com/1220990" source="BUGZILLA"/>
		<reference ref_id="1221009" ref_url="https://bugzilla.suse.com/1221009" source="BUGZILLA"/>
		<reference ref_id="1221012" ref_url="https://bugzilla.suse.com/1221012" source="BUGZILLA"/>
		<reference ref_id="1221015" ref_url="https://bugzilla.suse.com/1221015" source="BUGZILLA"/>
		<reference ref_id="1221022" ref_url="https://bugzilla.suse.com/1221022" source="BUGZILLA"/>
		<reference ref_id="1221039" ref_url="https://bugzilla.suse.com/1221039" source="BUGZILLA"/>
		<reference ref_id="1221040" ref_url="https://bugzilla.suse.com/1221040" source="BUGZILLA"/>
		<reference ref_id="1221044" ref_url="https://bugzilla.suse.com/1221044" source="BUGZILLA"/>
		<reference ref_id="1221045" ref_url="https://bugzilla.suse.com/1221045" source="BUGZILLA"/>
		<reference ref_id="1221046" ref_url="https://bugzilla.suse.com/1221046" source="BUGZILLA"/>
		<reference ref_id="1221048" ref_url="https://bugzilla.suse.com/1221048" source="BUGZILLA"/>
		<reference ref_id="1221055" ref_url="https://bugzilla.suse.com/1221055" source="BUGZILLA"/>
		<reference ref_id="1221056" ref_url="https://bugzilla.suse.com/1221056" source="BUGZILLA"/>
		<reference ref_id="1221058" ref_url="https://bugzilla.suse.com/1221058" source="BUGZILLA"/>
		<reference ref_id="1221060" ref_url="https://bugzilla.suse.com/1221060" source="BUGZILLA"/>
		<reference ref_id="1221061" ref_url="https://bugzilla.suse.com/1221061" source="BUGZILLA"/>
		<reference ref_id="1221062" ref_url="https://bugzilla.suse.com/1221062" source="BUGZILLA"/>
		<reference ref_id="1221066" ref_url="https://bugzilla.suse.com/1221066" source="BUGZILLA"/>
		<reference ref_id="1221067" ref_url="https://bugzilla.suse.com/1221067" source="BUGZILLA"/>
		<reference ref_id="1221068" ref_url="https://bugzilla.suse.com/1221068" source="BUGZILLA"/>
		<reference ref_id="1221069" ref_url="https://bugzilla.suse.com/1221069" source="BUGZILLA"/>
		<reference ref_id="1221070" ref_url="https://bugzilla.suse.com/1221070" source="BUGZILLA"/>
		<reference ref_id="1221071" ref_url="https://bugzilla.suse.com/1221071" source="BUGZILLA"/>
		<reference ref_id="1221077" ref_url="https://bugzilla.suse.com/1221077" source="BUGZILLA"/>
		<reference ref_id="1221082" ref_url="https://bugzilla.suse.com/1221082" source="BUGZILLA"/>
		<reference ref_id="1221090" ref_url="https://bugzilla.suse.com/1221090" source="BUGZILLA"/>
		<reference ref_id="1221097" ref_url="https://bugzilla.suse.com/1221097" source="BUGZILLA"/>
		<reference ref_id="1221156" ref_url="https://bugzilla.suse.com/1221156" source="BUGZILLA"/>
		<reference ref_id="1221162" ref_url="https://bugzilla.suse.com/1221162" source="BUGZILLA"/>
		<reference ref_id="1221252" ref_url="https://bugzilla.suse.com/1221252" source="BUGZILLA"/>
		<reference ref_id="1221273" ref_url="https://bugzilla.suse.com/1221273" source="BUGZILLA"/>
		<reference ref_id="1221274" ref_url="https://bugzilla.suse.com/1221274" source="BUGZILLA"/>
		<reference ref_id="1221276" ref_url="https://bugzilla.suse.com/1221276" source="BUGZILLA"/>
		<reference ref_id="1221277" ref_url="https://bugzilla.suse.com/1221277" source="BUGZILLA"/>
		<reference ref_id="1221291" ref_url="https://bugzilla.suse.com/1221291" source="BUGZILLA"/>
		<reference ref_id="1221293" ref_url="https://bugzilla.suse.com/1221293" source="BUGZILLA"/>
		<reference ref_id="1221298" ref_url="https://bugzilla.suse.com/1221298" source="BUGZILLA"/>
		<reference ref_id="1221337" ref_url="https://bugzilla.suse.com/1221337" source="BUGZILLA"/>
		<reference ref_id="1221338" ref_url="https://bugzilla.suse.com/1221338" source="BUGZILLA"/>
		<reference ref_id="1221375" ref_url="https://bugzilla.suse.com/1221375" source="BUGZILLA"/>
		<reference ref_id="1221379" ref_url="https://bugzilla.suse.com/1221379" source="BUGZILLA"/>
		<reference ref_id="1221551" ref_url="https://bugzilla.suse.com/1221551" source="BUGZILLA"/>
		<reference ref_id="1221553" ref_url="https://bugzilla.suse.com/1221553" source="BUGZILLA"/>
		<reference ref_id="1221613" ref_url="https://bugzilla.suse.com/1221613" source="BUGZILLA"/>
		<reference ref_id="1221614" ref_url="https://bugzilla.suse.com/1221614" source="BUGZILLA"/>
		<reference ref_id="1221616" ref_url="https://bugzilla.suse.com/1221616" source="BUGZILLA"/>
		<reference ref_id="1221618" ref_url="https://bugzilla.suse.com/1221618" source="BUGZILLA"/>
		<reference ref_id="1221631" ref_url="https://bugzilla.suse.com/1221631" source="BUGZILLA"/>
		<reference ref_id="1221633" ref_url="https://bugzilla.suse.com/1221633" source="BUGZILLA"/>
		<reference ref_id="1221713" ref_url="https://bugzilla.suse.com/1221713" source="BUGZILLA"/>
		<reference ref_id="1221725" ref_url="https://bugzilla.suse.com/1221725" source="BUGZILLA"/>
		<reference ref_id="1221777" ref_url="https://bugzilla.suse.com/1221777" source="BUGZILLA"/>
		<reference ref_id="1221791" ref_url="https://bugzilla.suse.com/1221791" source="BUGZILLA"/>
		<reference ref_id="1221814" ref_url="https://bugzilla.suse.com/1221814" source="BUGZILLA"/>
		<reference ref_id="1221816" ref_url="https://bugzilla.suse.com/1221816" source="BUGZILLA"/>
		<reference ref_id="1221830" ref_url="https://bugzilla.suse.com/1221830" source="BUGZILLA"/>
		<reference ref_id="1221951" ref_url="https://bugzilla.suse.com/1221951" source="BUGZILLA"/>
		<reference ref_id="1222011" ref_url="https://bugzilla.suse.com/1222011" source="BUGZILLA"/>
		<reference ref_id="1222033" ref_url="https://bugzilla.suse.com/1222033" source="BUGZILLA"/>
		<reference ref_id="1222051" ref_url="https://bugzilla.suse.com/1222051" source="BUGZILLA"/>
		<reference ref_id="1222056" ref_url="https://bugzilla.suse.com/1222056" source="BUGZILLA"/>
		<reference ref_id="1222060" ref_url="https://bugzilla.suse.com/1222060" source="BUGZILLA"/>
		<reference ref_id="1222070" ref_url="https://bugzilla.suse.com/1222070" source="BUGZILLA"/>
		<reference ref_id="1222073" ref_url="https://bugzilla.suse.com/1222073" source="BUGZILLA"/>
		<reference ref_id="1222117" ref_url="https://bugzilla.suse.com/1222117" source="BUGZILLA"/>
		<reference ref_id="1222247" ref_url="https://bugzilla.suse.com/1222247" source="BUGZILLA"/>
		<reference ref_id="1222266" ref_url="https://bugzilla.suse.com/1222266" source="BUGZILLA"/>
		<reference ref_id="1222274" ref_url="https://bugzilla.suse.com/1222274" source="BUGZILLA"/>
		<reference ref_id="1222291" ref_url="https://bugzilla.suse.com/1222291" source="BUGZILLA"/>
		<reference ref_id="1222300" ref_url="https://bugzilla.suse.com/1222300" source="BUGZILLA"/>
		<reference ref_id="1222304" ref_url="https://bugzilla.suse.com/1222304" source="BUGZILLA"/>
		<reference ref_id="1222317" ref_url="https://bugzilla.suse.com/1222317" source="BUGZILLA"/>
		<reference ref_id="1222331" ref_url="https://bugzilla.suse.com/1222331" source="BUGZILLA"/>
		<reference ref_id="1222355" ref_url="https://bugzilla.suse.com/1222355" source="BUGZILLA"/>
		<reference ref_id="1222356" ref_url="https://bugzilla.suse.com/1222356" source="BUGZILLA"/>
		<reference ref_id="1222360" ref_url="https://bugzilla.suse.com/1222360" source="BUGZILLA"/>
		<reference ref_id="1222366" ref_url="https://bugzilla.suse.com/1222366" source="BUGZILLA"/>
		<reference ref_id="1222373" ref_url="https://bugzilla.suse.com/1222373" source="BUGZILLA"/>
		<reference ref_id="1222416" ref_url="https://bugzilla.suse.com/1222416" source="BUGZILLA"/>
		<reference ref_id="1222422" ref_url="https://bugzilla.suse.com/1222422" source="BUGZILLA"/>
		<reference ref_id="1222427" ref_url="https://bugzilla.suse.com/1222427" source="BUGZILLA"/>
		<reference ref_id="1222428" ref_url="https://bugzilla.suse.com/1222428" source="BUGZILLA"/>
		<reference ref_id="1222431" ref_url="https://bugzilla.suse.com/1222431" source="BUGZILLA"/>
		<reference ref_id="1222437" ref_url="https://bugzilla.suse.com/1222437" source="BUGZILLA"/>
		<reference ref_id="1222445" ref_url="https://bugzilla.suse.com/1222445" source="BUGZILLA"/>
		<reference ref_id="1222449" ref_url="https://bugzilla.suse.com/1222449" source="BUGZILLA"/>
		<reference ref_id="1222503" ref_url="https://bugzilla.suse.com/1222503" source="BUGZILLA"/>
		<reference ref_id="1222520" ref_url="https://bugzilla.suse.com/1222520" source="BUGZILLA"/>
		<reference ref_id="1222536" ref_url="https://bugzilla.suse.com/1222536" source="BUGZILLA"/>
		<reference ref_id="1222549" ref_url="https://bugzilla.suse.com/1222549" source="BUGZILLA"/>
		<reference ref_id="1222550" ref_url="https://bugzilla.suse.com/1222550" source="BUGZILLA"/>
		<reference ref_id="1222557" ref_url="https://bugzilla.suse.com/1222557" source="BUGZILLA"/>
		<reference ref_id="1222585" ref_url="https://bugzilla.suse.com/1222585" source="BUGZILLA"/>
		<reference ref_id="1222586" ref_url="https://bugzilla.suse.com/1222586" source="BUGZILLA"/>
		<reference ref_id="1222596" ref_url="https://bugzilla.suse.com/1222596" source="BUGZILLA"/>
		<reference ref_id="1222609" ref_url="https://bugzilla.suse.com/1222609" source="BUGZILLA"/>
		<reference ref_id="1222610" ref_url="https://bugzilla.suse.com/1222610" source="BUGZILLA"/>
		<reference ref_id="1222619" ref_url="https://bugzilla.suse.com/1222619" source="BUGZILLA"/>
		<reference ref_id="1222630" ref_url="https://bugzilla.suse.com/1222630" source="BUGZILLA"/>
		<reference ref_id="1222632" ref_url="https://bugzilla.suse.com/1222632" source="BUGZILLA"/>
		<reference ref_id="1222660" ref_url="https://bugzilla.suse.com/1222660" source="BUGZILLA"/>
		<reference ref_id="1222662" ref_url="https://bugzilla.suse.com/1222662" source="BUGZILLA"/>
		<reference ref_id="1222664" ref_url="https://bugzilla.suse.com/1222664" source="BUGZILLA"/>
		<reference ref_id="1222669" ref_url="https://bugzilla.suse.com/1222669" source="BUGZILLA"/>
		<reference ref_id="1222677" ref_url="https://bugzilla.suse.com/1222677" source="BUGZILLA"/>
		<reference ref_id="1222678" ref_url="https://bugzilla.suse.com/1222678" source="BUGZILLA"/>
		<reference ref_id="1222680" ref_url="https://bugzilla.suse.com/1222680" source="BUGZILLA"/>
		<reference ref_id="1222706" ref_url="https://bugzilla.suse.com/1222706" source="BUGZILLA"/>
		<reference ref_id="1222720" ref_url="https://bugzilla.suse.com/1222720" source="BUGZILLA"/>
		<reference ref_id="1222724" ref_url="https://bugzilla.suse.com/1222724" source="BUGZILLA"/>
		<reference ref_id="1222726" ref_url="https://bugzilla.suse.com/1222726" source="BUGZILLA"/>
		<reference ref_id="1222727" ref_url="https://bugzilla.suse.com/1222727" source="BUGZILLA"/>
		<reference ref_id="1222764" ref_url="https://bugzilla.suse.com/1222764" source="BUGZILLA"/>
		<reference ref_id="1222772" ref_url="https://bugzilla.suse.com/1222772" source="BUGZILLA"/>
		<reference ref_id="1222781" ref_url="https://bugzilla.suse.com/1222781" source="BUGZILLA"/>
		<reference ref_id="1222784" ref_url="https://bugzilla.suse.com/1222784" source="BUGZILLA"/>
		<reference ref_id="1222798" ref_url="https://bugzilla.suse.com/1222798" source="BUGZILLA"/>
		<reference ref_id="1222801" ref_url="https://bugzilla.suse.com/1222801" source="BUGZILLA"/>
		<reference ref_id="1222952" ref_url="https://bugzilla.suse.com/1222952" source="BUGZILLA"/>
		<reference ref_id="1223030" ref_url="https://bugzilla.suse.com/1223030" source="BUGZILLA"/>
		<reference ref_id="1223067" ref_url="https://bugzilla.suse.com/1223067" source="BUGZILLA"/>
		<reference ref_id="1223068" ref_url="https://bugzilla.suse.com/1223068" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46925" ref_url="https://www.suse.com/security/cve/CVE-2021-46925/" source="CVE"/>
		<reference ref_id="CVE-2021-46926" ref_url="https://www.suse.com/security/cve/CVE-2021-46926/" source="CVE"/>
		<reference ref_id="CVE-2021-46927" ref_url="https://www.suse.com/security/cve/CVE-2021-46927/" source="CVE"/>
		<reference ref_id="CVE-2021-46929" ref_url="https://www.suse.com/security/cve/CVE-2021-46929/" source="CVE"/>
		<reference ref_id="CVE-2021-46930" ref_url="https://www.suse.com/security/cve/CVE-2021-46930/" source="CVE"/>
		<reference ref_id="CVE-2021-46931" ref_url="https://www.suse.com/security/cve/CVE-2021-46931/" source="CVE"/>
		<reference ref_id="CVE-2021-46933" ref_url="https://www.suse.com/security/cve/CVE-2021-46933/" source="CVE"/>
		<reference ref_id="CVE-2021-46936" ref_url="https://www.suse.com/security/cve/CVE-2021-46936/" source="CVE"/>
		<reference ref_id="CVE-2021-47082" ref_url="https://www.suse.com/security/cve/CVE-2021-47082/" source="CVE"/>
		<reference ref_id="CVE-2021-47087" ref_url="https://www.suse.com/security/cve/CVE-2021-47087/" source="CVE"/>
		<reference ref_id="CVE-2021-47091" ref_url="https://www.suse.com/security/cve/CVE-2021-47091/" source="CVE"/>
		<reference ref_id="CVE-2021-47093" ref_url="https://www.suse.com/security/cve/CVE-2021-47093/" source="CVE"/>
		<reference ref_id="CVE-2021-47094" ref_url="https://www.suse.com/security/cve/CVE-2021-47094/" source="CVE"/>
		<reference ref_id="CVE-2021-47095" ref_url="https://www.suse.com/security/cve/CVE-2021-47095/" source="CVE"/>
		<reference ref_id="CVE-2021-47096" ref_url="https://www.suse.com/security/cve/CVE-2021-47096/" source="CVE"/>
		<reference ref_id="CVE-2021-47097" ref_url="https://www.suse.com/security/cve/CVE-2021-47097/" source="CVE"/>
		<reference ref_id="CVE-2021-47098" ref_url="https://www.suse.com/security/cve/CVE-2021-47098/" source="CVE"/>
		<reference ref_id="CVE-2021-47099" ref_url="https://www.suse.com/security/cve/CVE-2021-47099/" source="CVE"/>
		<reference ref_id="CVE-2021-47100" ref_url="https://www.suse.com/security/cve/CVE-2021-47100/" source="CVE"/>
		<reference ref_id="CVE-2021-47101" ref_url="https://www.suse.com/security/cve/CVE-2021-47101/" source="CVE"/>
		<reference ref_id="CVE-2021-47102" ref_url="https://www.suse.com/security/cve/CVE-2021-47102/" source="CVE"/>
		<reference ref_id="CVE-2021-47104" ref_url="https://www.suse.com/security/cve/CVE-2021-47104/" source="CVE"/>
		<reference ref_id="CVE-2021-47105" ref_url="https://www.suse.com/security/cve/CVE-2021-47105/" source="CVE"/>
		<reference ref_id="CVE-2021-47107" ref_url="https://www.suse.com/security/cve/CVE-2021-47107/" source="CVE"/>
		<reference ref_id="CVE-2021-47108" ref_url="https://www.suse.com/security/cve/CVE-2021-47108/" source="CVE"/>
		<reference ref_id="CVE-2021-47181" ref_url="https://www.suse.com/security/cve/CVE-2021-47181/" source="CVE"/>
		<reference ref_id="CVE-2021-47182" ref_url="https://www.suse.com/security/cve/CVE-2021-47182/" source="CVE"/>
		<reference ref_id="CVE-2021-47183" ref_url="https://www.suse.com/security/cve/CVE-2021-47183/" source="CVE"/>
		<reference ref_id="CVE-2021-47185" ref_url="https://www.suse.com/security/cve/CVE-2021-47185/" source="CVE"/>
		<reference ref_id="CVE-2021-47189" ref_url="https://www.suse.com/security/cve/CVE-2021-47189/" source="CVE"/>
		<reference ref_id="CVE-2022-4744" ref_url="https://www.suse.com/security/cve/CVE-2022-4744/" source="CVE"/>
		<reference ref_id="CVE-2022-48626" ref_url="https://www.suse.com/security/cve/CVE-2022-48626/" source="CVE"/>
		<reference ref_id="CVE-2022-48629" ref_url="https://www.suse.com/security/cve/CVE-2022-48629/" source="CVE"/>
		<reference ref_id="CVE-2022-48630" ref_url="https://www.suse.com/security/cve/CVE-2022-48630/" source="CVE"/>
		<reference ref_id="CVE-2023-0160" ref_url="https://www.suse.com/security/cve/CVE-2023-0160/" source="CVE"/>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<reference ref_id="CVE-2023-35827" ref_url="https://www.suse.com/security/cve/CVE-2023-35827/" source="CVE"/>
		<reference ref_id="CVE-2023-4881" ref_url="https://www.suse.com/security/cve/CVE-2023-4881/" source="CVE"/>
		<reference ref_id="CVE-2023-52447" ref_url="https://www.suse.com/security/cve/CVE-2023-52447/" source="CVE"/>
		<reference ref_id="CVE-2023-52450" ref_url="https://www.suse.com/security/cve/CVE-2023-52450/" source="CVE"/>
		<reference ref_id="CVE-2023-52453" ref_url="https://www.suse.com/security/cve/CVE-2023-52453/" source="CVE"/>
		<reference ref_id="CVE-2023-52454" ref_url="https://www.suse.com/security/cve/CVE-2023-52454/" source="CVE"/>
		<reference ref_id="CVE-2023-52469" ref_url="https://www.suse.com/security/cve/CVE-2023-52469/" source="CVE"/>
		<reference ref_id="CVE-2023-52470" ref_url="https://www.suse.com/security/cve/CVE-2023-52470/" source="CVE"/>
		<reference ref_id="CVE-2023-52474" ref_url="https://www.suse.com/security/cve/CVE-2023-52474/" source="CVE"/>
		<reference ref_id="CVE-2023-52476" ref_url="https://www.suse.com/security/cve/CVE-2023-52476/" source="CVE"/>
		<reference ref_id="CVE-2023-52477" ref_url="https://www.suse.com/security/cve/CVE-2023-52477/" source="CVE"/>
		<reference ref_id="CVE-2023-52481" ref_url="https://www.suse.com/security/cve/CVE-2023-52481/" source="CVE"/>
		<reference ref_id="CVE-2023-52484" ref_url="https://www.suse.com/security/cve/CVE-2023-52484/" source="CVE"/>
		<reference ref_id="CVE-2023-52486" ref_url="https://www.suse.com/security/cve/CVE-2023-52486/" source="CVE"/>
		<reference ref_id="CVE-2023-52488" ref_url="https://www.suse.com/security/cve/CVE-2023-52488/" source="CVE"/>
		<reference ref_id="CVE-2023-52492" ref_url="https://www.suse.com/security/cve/CVE-2023-52492/" source="CVE"/>
		<reference ref_id="CVE-2023-52493" ref_url="https://www.suse.com/security/cve/CVE-2023-52493/" source="CVE"/>
		<reference ref_id="CVE-2023-52494" ref_url="https://www.suse.com/security/cve/CVE-2023-52494/" source="CVE"/>
		<reference ref_id="CVE-2023-52497" ref_url="https://www.suse.com/security/cve/CVE-2023-52497/" source="CVE"/>
		<reference ref_id="CVE-2023-52500" ref_url="https://www.suse.com/security/cve/CVE-2023-52500/" source="CVE"/>
		<reference ref_id="CVE-2023-52501" ref_url="https://www.suse.com/security/cve/CVE-2023-52501/" source="CVE"/>
		<reference ref_id="CVE-2023-52502" ref_url="https://www.suse.com/security/cve/CVE-2023-52502/" source="CVE"/>
		<reference ref_id="CVE-2023-52503" ref_url="https://www.suse.com/security/cve/CVE-2023-52503/" source="CVE"/>
		<reference ref_id="CVE-2023-52504" ref_url="https://www.suse.com/security/cve/CVE-2023-52504/" source="CVE"/>
		<reference ref_id="CVE-2023-52507" ref_url="https://www.suse.com/security/cve/CVE-2023-52507/" source="CVE"/>
		<reference ref_id="CVE-2023-52508" ref_url="https://www.suse.com/security/cve/CVE-2023-52508/" source="CVE"/>
		<reference ref_id="CVE-2023-52509" ref_url="https://www.suse.com/security/cve/CVE-2023-52509/" source="CVE"/>
		<reference ref_id="CVE-2023-52510" ref_url="https://www.suse.com/security/cve/CVE-2023-52510/" source="CVE"/>
		<reference ref_id="CVE-2023-52511" ref_url="https://www.suse.com/security/cve/CVE-2023-52511/" source="CVE"/>
		<reference ref_id="CVE-2023-52513" ref_url="https://www.suse.com/security/cve/CVE-2023-52513/" source="CVE"/>
		<reference ref_id="CVE-2023-52515" ref_url="https://www.suse.com/security/cve/CVE-2023-52515/" source="CVE"/>
		<reference ref_id="CVE-2023-52517" ref_url="https://www.suse.com/security/cve/CVE-2023-52517/" source="CVE"/>
		<reference ref_id="CVE-2023-52518" ref_url="https://www.suse.com/security/cve/CVE-2023-52518/" source="CVE"/>
		<reference ref_id="CVE-2023-52519" ref_url="https://www.suse.com/security/cve/CVE-2023-52519/" source="CVE"/>
		<reference ref_id="CVE-2023-52520" ref_url="https://www.suse.com/security/cve/CVE-2023-52520/" source="CVE"/>
		<reference ref_id="CVE-2023-52523" ref_url="https://www.suse.com/security/cve/CVE-2023-52523/" source="CVE"/>
		<reference ref_id="CVE-2023-52524" ref_url="https://www.suse.com/security/cve/CVE-2023-52524/" source="CVE"/>
		<reference ref_id="CVE-2023-52525" ref_url="https://www.suse.com/security/cve/CVE-2023-52525/" source="CVE"/>
		<reference ref_id="CVE-2023-52528" ref_url="https://www.suse.com/security/cve/CVE-2023-52528/" source="CVE"/>
		<reference ref_id="CVE-2023-52529" ref_url="https://www.suse.com/security/cve/CVE-2023-52529/" source="CVE"/>
		<reference ref_id="CVE-2023-52532" ref_url="https://www.suse.com/security/cve/CVE-2023-52532/" source="CVE"/>
		<reference ref_id="CVE-2023-52561" ref_url="https://www.suse.com/security/cve/CVE-2023-52561/" source="CVE"/>
		<reference ref_id="CVE-2023-52563" ref_url="https://www.suse.com/security/cve/CVE-2023-52563/" source="CVE"/>
		<reference ref_id="CVE-2023-52564" ref_url="https://www.suse.com/security/cve/CVE-2023-52564/" source="CVE"/>
		<reference ref_id="CVE-2023-52566" ref_url="https://www.suse.com/security/cve/CVE-2023-52566/" source="CVE"/>
		<reference ref_id="CVE-2023-52567" ref_url="https://www.suse.com/security/cve/CVE-2023-52567/" source="CVE"/>
		<reference ref_id="CVE-2023-52569" ref_url="https://www.suse.com/security/cve/CVE-2023-52569/" source="CVE"/>
		<reference ref_id="CVE-2023-52574" ref_url="https://www.suse.com/security/cve/CVE-2023-52574/" source="CVE"/>
		<reference ref_id="CVE-2023-52575" ref_url="https://www.suse.com/security/cve/CVE-2023-52575/" source="CVE"/>
		<reference ref_id="CVE-2023-52576" ref_url="https://www.suse.com/security/cve/CVE-2023-52576/" source="CVE"/>
		<reference ref_id="CVE-2023-52582" ref_url="https://www.suse.com/security/cve/CVE-2023-52582/" source="CVE"/>
		<reference ref_id="CVE-2023-52583" ref_url="https://www.suse.com/security/cve/CVE-2023-52583/" source="CVE"/>
		<reference ref_id="CVE-2023-52587" ref_url="https://www.suse.com/security/cve/CVE-2023-52587/" source="CVE"/>
		<reference ref_id="CVE-2023-52591" ref_url="https://www.suse.com/security/cve/CVE-2023-52591/" source="CVE"/>
		<reference ref_id="CVE-2023-52594" ref_url="https://www.suse.com/security/cve/CVE-2023-52594/" source="CVE"/>
		<reference ref_id="CVE-2023-52595" ref_url="https://www.suse.com/security/cve/CVE-2023-52595/" source="CVE"/>
		<reference ref_id="CVE-2023-52597" ref_url="https://www.suse.com/security/cve/CVE-2023-52597/" source="CVE"/>
		<reference ref_id="CVE-2023-52598" ref_url="https://www.suse.com/security/cve/CVE-2023-52598/" source="CVE"/>
		<reference ref_id="CVE-2023-52599" ref_url="https://www.suse.com/security/cve/CVE-2023-52599/" source="CVE"/>
		<reference ref_id="CVE-2023-52600" ref_url="https://www.suse.com/security/cve/CVE-2023-52600/" source="CVE"/>
		<reference ref_id="CVE-2023-52601" ref_url="https://www.suse.com/security/cve/CVE-2023-52601/" source="CVE"/>
		<reference ref_id="CVE-2023-52602" ref_url="https://www.suse.com/security/cve/CVE-2023-52602/" source="CVE"/>
		<reference ref_id="CVE-2023-52603" ref_url="https://www.suse.com/security/cve/CVE-2023-52603/" source="CVE"/>
		<reference ref_id="CVE-2023-52604" ref_url="https://www.suse.com/security/cve/CVE-2023-52604/" source="CVE"/>
		<reference ref_id="CVE-2023-52605" ref_url="https://www.suse.com/security/cve/CVE-2023-52605/" source="CVE"/>
		<reference ref_id="CVE-2023-52606" ref_url="https://www.suse.com/security/cve/CVE-2023-52606/" source="CVE"/>
		<reference ref_id="CVE-2023-52607" ref_url="https://www.suse.com/security/cve/CVE-2023-52607/" source="CVE"/>
		<reference ref_id="CVE-2023-52608" ref_url="https://www.suse.com/security/cve/CVE-2023-52608/" source="CVE"/>
		<reference ref_id="CVE-2023-52612" ref_url="https://www.suse.com/security/cve/CVE-2023-52612/" source="CVE"/>
		<reference ref_id="CVE-2023-52615" ref_url="https://www.suse.com/security/cve/CVE-2023-52615/" source="CVE"/>
		<reference ref_id="CVE-2023-52617" ref_url="https://www.suse.com/security/cve/CVE-2023-52617/" source="CVE"/>
		<reference ref_id="CVE-2023-52619" ref_url="https://www.suse.com/security/cve/CVE-2023-52619/" source="CVE"/>
		<reference ref_id="CVE-2023-52621" ref_url="https://www.suse.com/security/cve/CVE-2023-52621/" source="CVE"/>
		<reference ref_id="CVE-2023-52623" ref_url="https://www.suse.com/security/cve/CVE-2023-52623/" source="CVE"/>
		<reference ref_id="CVE-2023-52627" ref_url="https://www.suse.com/security/cve/CVE-2023-52627/" source="CVE"/>
		<reference ref_id="CVE-2023-52628" ref_url="https://www.suse.com/security/cve/CVE-2023-52628/" source="CVE"/>
		<reference ref_id="CVE-2023-52632" ref_url="https://www.suse.com/security/cve/CVE-2023-52632/" source="CVE"/>
		<reference ref_id="CVE-2023-52636" ref_url="https://www.suse.com/security/cve/CVE-2023-52636/" source="CVE"/>
		<reference ref_id="CVE-2023-52637" ref_url="https://www.suse.com/security/cve/CVE-2023-52637/" source="CVE"/>
		<reference ref_id="CVE-2023-52639" ref_url="https://www.suse.com/security/cve/CVE-2023-52639/" source="CVE"/>
		<reference ref_id="CVE-2023-6356" ref_url="https://www.suse.com/security/cve/CVE-2023-6356/" source="CVE"/>
		<reference ref_id="CVE-2023-6535" ref_url="https://www.suse.com/security/cve/CVE-2023-6535/" source="CVE"/>
		<reference ref_id="CVE-2023-6536" ref_url="https://www.suse.com/security/cve/CVE-2023-6536/" source="CVE"/>
		<reference ref_id="CVE-2023-7042" ref_url="https://www.suse.com/security/cve/CVE-2023-7042/" source="CVE"/>
		<reference ref_id="CVE-2023-7192" ref_url="https://www.suse.com/security/cve/CVE-2023-7192/" source="CVE"/>
		<reference ref_id="CVE-2024-0841" ref_url="https://www.suse.com/security/cve/CVE-2024-0841/" source="CVE"/>
		<reference ref_id="CVE-2024-2201" ref_url="https://www.suse.com/security/cve/CVE-2024-2201/" source="CVE"/>
		<reference ref_id="CVE-2024-22099" ref_url="https://www.suse.com/security/cve/CVE-2024-22099/" source="CVE"/>
		<reference ref_id="CVE-2024-23307" ref_url="https://www.suse.com/security/cve/CVE-2024-23307/" source="CVE"/>
		<reference ref_id="CVE-2024-23850" ref_url="https://www.suse.com/security/cve/CVE-2024-23850/" source="CVE"/>
		<reference ref_id="CVE-2024-25739" ref_url="https://www.suse.com/security/cve/CVE-2024-25739/" source="CVE"/>
		<reference ref_id="CVE-2024-25742" ref_url="https://www.suse.com/security/cve/CVE-2024-25742/" source="CVE"/>
		<reference ref_id="CVE-2024-26599" ref_url="https://www.suse.com/security/cve/CVE-2024-26599/" source="CVE"/>
		<reference ref_id="CVE-2024-26600" ref_url="https://www.suse.com/security/cve/CVE-2024-26600/" source="CVE"/>
		<reference ref_id="CVE-2024-26602" ref_url="https://www.suse.com/security/cve/CVE-2024-26602/" source="CVE"/>
		<reference ref_id="CVE-2024-26612" ref_url="https://www.suse.com/security/cve/CVE-2024-26612/" source="CVE"/>
		<reference ref_id="CVE-2024-26614" ref_url="https://www.suse.com/security/cve/CVE-2024-26614/" source="CVE"/>
		<reference ref_id="CVE-2024-26620" ref_url="https://www.suse.com/security/cve/CVE-2024-26620/" source="CVE"/>
		<reference ref_id="CVE-2024-26627" ref_url="https://www.suse.com/security/cve/CVE-2024-26627/" source="CVE"/>
		<reference ref_id="CVE-2024-26629" ref_url="https://www.suse.com/security/cve/CVE-2024-26629/" source="CVE"/>
		<reference ref_id="CVE-2024-26642" ref_url="https://www.suse.com/security/cve/CVE-2024-26642/" source="CVE"/>
		<reference ref_id="CVE-2024-26645" ref_url="https://www.suse.com/security/cve/CVE-2024-26645/" source="CVE"/>
		<reference ref_id="CVE-2024-26646" ref_url="https://www.suse.com/security/cve/CVE-2024-26646/" source="CVE"/>
		<reference ref_id="CVE-2024-26651" ref_url="https://www.suse.com/security/cve/CVE-2024-26651/" source="CVE"/>
		<reference ref_id="CVE-2024-26654" ref_url="https://www.suse.com/security/cve/CVE-2024-26654/" source="CVE"/>
		<reference ref_id="CVE-2024-26659" ref_url="https://www.suse.com/security/cve/CVE-2024-26659/" source="CVE"/>
		<reference ref_id="CVE-2024-26660" ref_url="https://www.suse.com/security/cve/CVE-2024-26660/" source="CVE"/>
		<reference ref_id="CVE-2024-26664" ref_url="https://www.suse.com/security/cve/CVE-2024-26664/" source="CVE"/>
		<reference ref_id="CVE-2024-26667" ref_url="https://www.suse.com/security/cve/CVE-2024-26667/" source="CVE"/>
		<reference ref_id="CVE-2024-26670" ref_url="https://www.suse.com/security/cve/CVE-2024-26670/" source="CVE"/>
		<reference ref_id="CVE-2024-26680" ref_url="https://www.suse.com/security/cve/CVE-2024-26680/" source="CVE"/>
		<reference ref_id="CVE-2024-26681" ref_url="https://www.suse.com/security/cve/CVE-2024-26681/" source="CVE"/>
		<reference ref_id="CVE-2024-26684" ref_url="https://www.suse.com/security/cve/CVE-2024-26684/" source="CVE"/>
		<reference ref_id="CVE-2024-26685" ref_url="https://www.suse.com/security/cve/CVE-2024-26685/" source="CVE"/>
		<reference ref_id="CVE-2024-26689" ref_url="https://www.suse.com/security/cve/CVE-2024-26689/" source="CVE"/>
		<reference ref_id="CVE-2024-26695" ref_url="https://www.suse.com/security/cve/CVE-2024-26695/" source="CVE"/>
		<reference ref_id="CVE-2024-26696" ref_url="https://www.suse.com/security/cve/CVE-2024-26696/" source="CVE"/>
		<reference ref_id="CVE-2024-26697" ref_url="https://www.suse.com/security/cve/CVE-2024-26697/" source="CVE"/>
		<reference ref_id="CVE-2024-26704" ref_url="https://www.suse.com/security/cve/CVE-2024-26704/" source="CVE"/>
		<reference ref_id="CVE-2024-26717" ref_url="https://www.suse.com/security/cve/CVE-2024-26717/" source="CVE"/>
		<reference ref_id="CVE-2024-26718" ref_url="https://www.suse.com/security/cve/CVE-2024-26718/" source="CVE"/>
		<reference ref_id="CVE-2024-26722" ref_url="https://www.suse.com/security/cve/CVE-2024-26722/" source="CVE"/>
		<reference ref_id="CVE-2024-26727" ref_url="https://www.suse.com/security/cve/CVE-2024-26727/" source="CVE"/>
		<reference ref_id="CVE-2024-26733" ref_url="https://www.suse.com/security/cve/CVE-2024-26733/" source="CVE"/>
		<reference ref_id="CVE-2024-26736" ref_url="https://www.suse.com/security/cve/CVE-2024-26736/" source="CVE"/>
		<reference ref_id="CVE-2024-26737" ref_url="https://www.suse.com/security/cve/CVE-2024-26737/" source="CVE"/>
		<reference ref_id="CVE-2024-26743" ref_url="https://www.suse.com/security/cve/CVE-2024-26743/" source="CVE"/>
		<reference ref_id="CVE-2024-26744" ref_url="https://www.suse.com/security/cve/CVE-2024-26744/" source="CVE"/>
		<reference ref_id="CVE-2024-26745" ref_url="https://www.suse.com/security/cve/CVE-2024-26745/" source="CVE"/>
		<reference ref_id="CVE-2024-26747" ref_url="https://www.suse.com/security/cve/CVE-2024-26747/" source="CVE"/>
		<reference ref_id="CVE-2024-26749" ref_url="https://www.suse.com/security/cve/CVE-2024-26749/" source="CVE"/>
		<reference ref_id="CVE-2024-26751" ref_url="https://www.suse.com/security/cve/CVE-2024-26751/" source="CVE"/>
		<reference ref_id="CVE-2024-26754" ref_url="https://www.suse.com/security/cve/CVE-2024-26754/" source="CVE"/>
		<reference ref_id="CVE-2024-26760" ref_url="https://www.suse.com/security/cve/CVE-2024-26760/" source="CVE"/>
		<reference ref_id="CVE-2024-26763" ref_url="https://www.suse.com/security/cve/CVE-2024-26763/" source="CVE"/>
		<reference ref_id="CVE-2024-26766" ref_url="https://www.suse.com/security/cve/CVE-2024-26766/" source="CVE"/>
		<reference ref_id="CVE-2024-26769" ref_url="https://www.suse.com/security/cve/CVE-2024-26769/" source="CVE"/>
		<reference ref_id="CVE-2024-26771" ref_url="https://www.suse.com/security/cve/CVE-2024-26771/" source="CVE"/>
		<reference ref_id="CVE-2024-26776" ref_url="https://www.suse.com/security/cve/CVE-2024-26776/" source="CVE"/>
		<reference ref_id="CVE-2024-26779" ref_url="https://www.suse.com/security/cve/CVE-2024-26779/" source="CVE"/>
		<reference ref_id="CVE-2024-26787" ref_url="https://www.suse.com/security/cve/CVE-2024-26787/" source="CVE"/>
		<reference ref_id="CVE-2024-26790" ref_url="https://www.suse.com/security/cve/CVE-2024-26790/" source="CVE"/>
		<reference ref_id="CVE-2024-26793" ref_url="https://www.suse.com/security/cve/CVE-2024-26793/" source="CVE"/>
		<reference ref_id="CVE-2024-26798" ref_url="https://www.suse.com/security/cve/CVE-2024-26798/" source="CVE"/>
		<reference ref_id="CVE-2024-26805" ref_url="https://www.suse.com/security/cve/CVE-2024-26805/" source="CVE"/>
		<reference ref_id="CVE-2024-26807" ref_url="https://www.suse.com/security/cve/CVE-2024-26807/" source="CVE"/>
		<reference ref_id="CVE-2024-26848" ref_url="https://www.suse.com/security/cve/CVE-2024-26848/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2021-46925: Fixed kernel panic caused by race of smc_sock (bsc#1220466).
- CVE-2021-46926: Fixed bug when detecting controllers in ALSA/hda/intel-sdw-acpi (bsc#1220478).
- CVE-2021-46927: Fixed assertion bug in nitro_enclaves: Use get_user_pages_unlocked() (bsc#1220443).
- CVE-2021-46929: Fixed use-after-free issue in sctp_sock_dump() (bsc#1220482).
- CVE-2021-46930: Fixed usb/mtu3 list_head check warning (bsc#1220484).
- CVE-2021-46931: Fixed wrong type casting in mlx5e_tx_reporter_dump_sq() (bsc#1220486).
- CVE-2021-46933: Fixed possible underflow in ffs_data_clear() (bsc#1220487).
- CVE-2021-46936: Fixed use-after-free in tw_timer_handler() (bsc#1220439).
- CVE-2021-47082: Fixed ouble free in tun_free_netdev() (bsc#1220969).
- CVE-2021-47087: Fixed incorrect page free bug in tee/optee (bsc#1220954).
- CVE-2021-47091: Fixed locking in ieee80211_start_ap()) error path (bsc#1220959).
- CVE-2021-47093: Fixed memleak on registration failure in intel_pmc_core (bsc#1220978).
- CVE-2021-47094: Fixed possible memory leak in KVM x86/mmu (bsc#1221551).
- CVE-2021-47095: Fixed missing initialization in ipmi/ssif (bsc#1220979).
- CVE-2021-47096: Fixed uninitalized user_pversion in ALSA rawmidi (bsc#1220981).
- CVE-2021-47097: Fixed stack out of bound access in elantech_change_report_id() (bsc#1220982).
- CVE-2021-47098: Fixed integer overflow/underflow in hysteresis calculations hwmon: (lm90) (bsc#1220983).
- CVE-2021-47099: Fixed BUG_ON assertion in veth when skb entering GRO are cloned (bsc#1220955).
- CVE-2021-47100: Fixed UAF when uninstall in ipmi (bsc#1220985).
- CVE-2021-47101: Fixed uninit-value in asix_mdio_read() (bsc#1220987).
- CVE-2021-47102: Fixed incorrect structure access In line: upper = info-&gt;upper_dev in net/marvell/prestera (bsc#1221009).
- CVE-2021-47104: Fixed memory leak in qib_user_sdma_queue_pkts() (bsc#1220960).
- CVE-2021-47105: Fixed potential memory leak in ice/xsk (bsc#1220961).
- CVE-2021-47107: Fixed READDIR buffer overflow in NFSD (bsc#1220965).
- CVE-2021-47108: Fixed possible NULL pointer dereference for mtk_hdmi_conf in drm/mediatek (bsc#1220986).
- CVE-2021-47181: Fixed a null pointer dereference caused by calling platform_get_resource()  (bsc#1222660).
- CVE-2021-47182: Fixed buffer length handling in scsi_mode_sense() in scsi core (bsc#1222662).
- CVE-2021-47183: Fixed a null pointer dereference during link down processing in scsi lpfc (bsc#1192145, bsc#1222664).
- CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer (bsc#1222669).
- CVE-2021-47189: Fixed denial of service due to memory ordering issues between normal and ordered work functions in btrfs (bsc#1222706).
- CVE-2022-4744: Fixed double-free that could lead to DoS or privilege escalation in TUN/TAP device driver functionality (bsc#1209635).
- CVE-2022-48626: Fixed a potential use-after-free on remove path moxart (bsc#1220366).
- CVE-2022-48629: Fixed possible memory leak in qcom-rng (bsc#1220989).
- CVE-2022-48630: Fixed infinite loop on requests not multiple of WORD_SZ in crypto: qcom-rng (bsc#1220990).
- CVE-2023-0160: Fixed deadlock flaw in BPF that could allow a local user to potentially crash the system (bsc#1209657).
- CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
- CVE-2023-35827: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc#1212514).
- CVE-2023-4881: Fixed a out-of-bounds write flaw in the netfilter subsystem that could lead to potential information disclosure or a denial of service (bsc#1215221).
- CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround  (bsc#1220251).
- CVE-2023-52450: Fixed NULL pointer dereference issue in upi_fill_topology() (bsc#1220237).
- CVE-2023-52453: Fixed data corruption in hisi_acc_vfio_pci (bsc#1220337).
- CVE-2023-52454: Fixed a kernel panic when host sends an invalid H2C PDU length (bsc#1220320).
- CVE-2023-52469: Fixed a use-after-free in kv_parse_power_table (bsc#1220411).
- CVE-2023-52470: Fixed null-ptr-deref in radeon_crtc_init() (bsc#1220413).
- CVE-2023-52474: Fixed a vulnerability with non-PAGE_SIZE-end multi-iovec user SDMA requests (bsc#1220445).
- CVE-2023-52476: Fixed possible unhandled page fault via perf sampling NMI during vsyscall (bsc#1220703).
- CVE-2023-52477: Fixed USB Hub accesses to uninitialized BOS descriptors (bsc#1220790).
- CVE-2023-52481: Fixed speculative unprivileged load in Cortex-A520 (bsc#1220887).
- CVE-2023-52484: Fixed a soft lockup triggered by arm_smmu_mm_invalidate_range (bsc#1220797).
- CVE-2023-52486: Fixed possible use-after-free in drm (bsc#1221277).
- CVE-2023-52488: Fixed data corruption due to error on incrementing register address in regmap functions for FIFO in serial sc16is7xx (bsc#1221162).
- CVE-2023-52492: Fixed a null-pointer-dereference in channel unregistration function __dma_async_device_channel_register() (bsc#1221276).
- CVE-2023-52493: Fixed possible soft lockup in bus/mhi/host (bsc#1221274).
- CVE-2023-52494: Fixed missing alignment check for event ring read pointer in bus/mhi/host (bsc#1221273).
- CVE-2023-52497: Fixed data corruption in erofs (bsc#1220879).
- CVE-2023-52500: Fixed information leaking when processing OPC_INB_SET_CONTROLLER_CONFIG command (bsc#1220883).
- CVE-2023-52501: Fixed possible memory corruption in ring-buffer (bsc#1220885).
- CVE-2023-52502: Fixed a race condition in nfc_llcp_sock_get() and nfc_llcp_sock_get_sn() (bsc#1220831).
- CVE-2023-52503: Fixed use-after-free in amdtee_close_session due to race condition with amdtee_open_session in tee amdtee (bsc#1220915).
- CVE-2023-52504: Fixed possible out-of bounds in apply_alternatives() on a 5-level paging machine (bsc#1221553).
- CVE-2023-52507: Fixed possible shift-out-of-bounds in nfc/nci (bsc#1220833).
- CVE-2023-52508: Fixed null pointer dereference in nvme_fc_io_getuuid() (bsc#1221015).
- CVE-2023-52509: Fixed a use-after-free issue in ravb_tx_timeout_work() (bsc#1220836).
- CVE-2023-52510: Fixed a potential UAF in ca8210_probe() (bsc#1220898).
- CVE-2023-52511: Fixed possible memory corruption in spi/sun6i (bsc#1221012).
- CVE-2023-52513: Fixed connection failure handling  in RDMA/siw (bsc#1221022).
- CVE-2023-52515: Fixed possible use-after-free in RDMA/srp (bsc#1221048).
- CVE-2023-52517: Fixed race between DMA RX transfer completion and RX FIFO drain in spi/sun6i (bsc#1221055).
- CVE-2023-52518: Fixed information leak in bluetooth/hci_codec (bsc#1221056).
- CVE-2023-52519: Fixed possible overflow in HID/intel-ish-hid/ipc (bsc#1220920).
- CVE-2023-52520: Fixed reference leak in platform/x86/think-lmi (bsc#1220921).
- CVE-2023-52523: Fixed wrong redirects to non-TCP sockets in bpf (bsc#1220926).
- CVE-2023-52524: Fixed possible corruption in nfc/llcp (bsc#1220927).
- CVE-2023-52525: Fixed out of bounds check mwifiex_process_rx_packet() (bsc#1220840).
- CVE-2023-52528: Fixed uninit-value access in __smsc75xx_read_reg() (bsc#1220843).
- CVE-2023-52529: Fixed a potential memory leak in sony_probe() (bsc#1220929).
- CVE-2023-52532: Fixed a bug in TX CQE error handling (bsc#1220932).
- CVE-2023-52561: Fixed denial of service due to missing reserved attribute on cont splash memory region in arm64 dts qcom sdm845-db845c (bsc#1220935).
- CVE-2023-52563: Fixed memory leak on -&gt;hpd_notify callback() in drm/meson (bsc#1220937).
- CVE-2023-52564: Reverted invalid fix for UAF in gsm_cleanup_mux() (bsc#1220938).
- CVE-2023-52566: Fixed potential use after free in nilfs_gccache_submit_read_data() (bsc#1220940).
- CVE-2023-52567: Fixed possible Oops in  serial/8250_port: when using IRQ polling (irq = 0) (bsc#1220839).
- CVE-2023-52569: Fixed a bug in btrfs by remoning BUG() after failure to insert delayed dir index item (bsc#1220918).
- CVE-2023-52574: Fixed a bug by hiding new member header_ops (bsc#1220870).
- CVE-2023-52575: Fixed SBPB enablement for spec_rstack_overflow=off (bsc#1220871).
- CVE-2023-52576: Fixed potential use after free in memblock_isolate_range() (bsc#1220872).
- CVE-2023-52582: Fixed possible oops in netfs (bsc#1220878).
- CVE-2023-52583: Fixed deadlock or deadcode of misusing dget() inside ceph (bsc#1221058).
- CVE-2023-52587: Fixed mcast list locking in IB/ipoib (bsc#1221082).
- CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044).
- CVE-2023-52594: Fixed potential array-index-out-of-bounds read in ath9k_htc_txstatus() (bsc#1221045).
- CVE-2023-52595: Fixed possible deadlock in wifi/rt2x00 (bsc#1221046).
- CVE-2023-52597: Fixed a setting of fpc register in KVM (bsc#1221040).
- CVE-2023-52598: Fixed wrong setting of fpc register in s390/ptrace (bsc#1221060).
- CVE-2023-52599: Fixed array-index-out-of-bounds in diNewExt() in jfs (bsc#1221062).
- CVE-2023-52600: Fixed uaf in jfs_evict_inode() (bsc#1221071).
- CVE-2023-52601: Fixed array-index-out-of-bounds in dbAdjTree() in jfs (bsc#1221068).
- CVE-2023-52602: Fixed slab-out-of-bounds Read in dtSearch() in jfs (bsc#1221070).
- CVE-2023-52603: Fixed array-index-out-of-bounds in dtSplitRoot() (bsc#1221066).
- CVE-2023-52604: Fixed array-index-out-of-bounds in dbAdjTree() (bsc#1221067).
- CVE-2023-52605: Fixed a NULL pointer dereference check (bsc#1221039)
- CVE-2023-52606: Fixed possible kernel stack corruption in powerpc/lib (bsc#1221069).
- CVE-2023-52607: Fixed a null-pointer-dereference in pgtable_cache_add kasprintf() (bsc#1221061).
- CVE-2023-52608: Fixed possible race condition in firmware/arm_scmi (bsc#1221375).
- CVE-2023-52612: Fixed req-&gt;dst buffer overflow in crypto/scomp (bsc#1221616).
- CVE-2023-52615: Fixed page fault dead lock on mmap-ed hwrng (bsc#1221614).
- CVE-2023-52617: Fixed stdev_release() crash after surprise hot remove (bsc#1221613).
- CVE-2023-52619: Fixed possible crash when setting number of cpus to an odd number in pstore/ram (bsc#1221618).
- CVE-2023-52621: Fixed missing asserion in bpf (bsc#1222073).
- CVE-2023-52623: Fixed suspicious RCU usage in SUNRPC (bsc#1222060).
- CVE-2023-52627: Fixed null pointer dereference due to lack of callback functions in iio adc ad7091r (bsc#1222051)
- CVE-2023-52628: Fixed 4-byte stack OOB write in nftables (bsc#1222117).
- CVE-2023-52632: Fixed lock dependency warning with srcu in drm/amdkfd (bsc#1222274).
- CVE-2023-52636: Fixed denial of service due to wrongly init the cursor when preparing sparse read in msgr2 in libceph  (bsc#1222247).
- CVE-2023-52637: Fixed UAF in j1939_sk_match_filter() in can/k1939 (bsc#1222291).
- CVE-2023-52639: Fixed race during shadow creation in KVM/s390/vsie Fixed (bsc#1222300).
- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).
- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).
- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).
- CVE-2023-7042: Fixed a null-pointer-dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (bsc#1218336).
- CVE-2023-7192: Fixed a memory leak problem in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c (bsc#1218479).
- CVE-2024-0841: Fixed null pointer dereference in hugetlbfs_fill_super() (bsc#1219264).
- CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
- CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170).
- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).
- CVE-2024-23850: Fixed denial of service due to assertion failure due to subvolume readed before root item insertion in btrfs_get_root_ref in btrfs (bsc#1219126).
- CVE-2024-23850: Fixed double free of anonymous device after snapshot  creation failure (bsc#1219126).
- CVE-2024-25739: Fixed possible crash in create_empty_lvol() in drivers/mtd/ubi/vtbl.c (bsc#1219834).
- CVE-2024-25742: Fixed insufficient validation during #VC instruction emulation in x86/sev (bsc#1221725).
- CVE-2024-26599: Fixed out-of-bounds access in of_pwm_single_xlate() (bsc#1220365).
- CVE-2024-26600: Fixed NULL pointer dereference for SRP in phy-omap-usb2 (bsc#1220340).
- CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398).
- CVE-2024-26612: Fixed Oops in fscache_put_cache() This function dereferences  (bsc#1221291).
- CVE-2024-26614: Fixed the initialization of accept_queue's spinlocks (bsc#1221293).
- CVE-2024-26620: Fixed possible device model violation in s390/vfio-ap (bsc#1221298).
- CVE-2024-26627: Fixed possible hard lockup in scsi (bsc#1221090).
- CVE-2024-26629: Fixed possible protocol violation via RELEASE_LOCKOWNER in nfsd (bsc#1221379).
- CVE-2024-26642: Fixed the set of anonymous timeout flag in netfilter nf_tables (bsc#1221830).
- CVE-2024-26645: Fixed missing visibility when inserting an element into tracing_map (bsc#1222056).
- CVE-2024-26646: Fixed potential memory corruption when resuming from suspend or hibernation in thermal/intel/hfi (bsc#1222070).
- CVE-2024-26651: Fixed possible oops via malicious devices in sr9800 (bsc#1221337).
- CVE-2024-26654: Fixed use after free in ALSA/sh/aica (bsc#1222304).
- CVE-2024-26659: Fixed wrong handling of isoc Babble and Buffer Overrun events in xhci (bsc#1222317).
- CVE-2024-26660: Fixed buffer overflow in dcn301_stream_encoder_create in drm amd display (bsc#1222266)
- CVE-2024-26664: Fixed out-of-bounds memory access in create_core_data() in hwmon coretemp (bsc#1222355).
- CVE-2024-26667: Fixed null pointer reference in dpu_encoder_helper_phys_cleanup in drm/msm/dpu (bsc#1222331).
- CVE-2024-26670: Fixed ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD workaround in kernel arm64 (bsc#1222356).
- CVE-2024-26680: Fixed denial of service due to DMA mapping for PTP hwts ring in net atlantic (bsc#1222427).
- CVE-2024-26681: Fixed denial of service in nsim_dev_trap_report_work() in netdevsim (bsc#1222431).
- CVE-2024-26684: Fixed handling of DPP safety error for DMA channels in net stmmac xgmac (bsc#1222445).
- CVE-2024-26685: Fixed denial of service in end_buffer_async_write() in nilfs2 (bsc#1222437).
- CVE-2024-26689: Fixed use-after-free in encode_cap_msg() in ceph (bsc#1222503).
- CVE-2024-26695: Fixed null pointer dereference in __sev_platform_shutdown_locked in crypto ccp (bsc#1222373).
- CVE-2024-26696: Fixed denial of service in nilfs_lookup_dirty_data_buffers() in nilfs2 (bsc#1222549).
- CVE-2024-26697: Fixed data corruption in dsync block recovery for small block sizes in nilfs2 (bsc#1222550).
- CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422).
- CVE-2024-26717: Fixed null pointer dereference on failed power up in HID i2c-hid-of (bsc#1222360).
- CVE-2024-26718: Fixed memory corruption in tasklet_unlock via disabling tasklets in dm-crypt and dm-verify (bsc#1222416).
- CVE-2024-26722: Fixed denial of service in rt5645_jack_detect_work() due to mutex left locked forever in ASoC rt5645 (bsc#1222520).
- CVE-2024-26727: Fixed denial of service due to assertion failure during subvolume creation (bsc#1222536).
- CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
- CVE-2024-26736: Fixed buffer overflow in afs_update_volume_status() in afs (bsc#1222586).
- CVE-2024-26737: Fixed use-after-free due to race between bpf_timer_cancel_and_free and bpf_timer_cancel in bpf (bsc#1222557).
- CVE-2024-26743: Fixed memory leak in qedr_create_user_qp error flow in rdma/qedr (bsc#1222677)
- CVE-2024-26744: Fixed null pointer dereference in srpt_service_guid parameter in rdma/srpt (bsc#1222449)
- CVE-2024-26745: Fixed null pointer dereference due to IOMMU table not initialized for kdump over SR-IOV (bsc#1220492, bsc#1222678).
- CVE-2024-26747: Fixed null pointer issue when put module's reference in usb roles  (bsc#1222609).
- CVE-2024-26749: Fixed use-after-free at cdns3_gadget_ep_disable() in usb cdns3 (bsc#1222680).
- CVE-2024-26751: Fixed denial of service due to gpiod_lookup_table search loop not ending correctly (bsc#1222724)
- CVE-2024-26754: Fixed an use-after-free and null-ptr-deref in gtp_genl_dump_pdp() in gtp  (bsc#1222632).
- CVE-2024-26760: Fixed null pointer dereference on error case in bio_put() in scsi target pscsi (bsc#1222596)
- CVE-2024-26763: Fixed user corruption via by writing data with O_DIRECT on device in dm-crypt (bsc#1222720).
- CVE-2024-26766: Fixed off-by-one error in sdma.h tx-&gt;num_descs in ib/hfi1 (bsc#1222726)
- CVE-2024-26769: Fixed deadlock on delete association path in nvmet-fc  (bsc#1222727).
- CVE-2024-26771: Fixed a null pointer dereference on edma_probe in dmaengine ti edma  (bsc#1222610)
- CVE-2024-26776: Fixed null pointer dereference due to null value returned by interrupt handler in spi hisi-sfc-v3xx (bsc#1222764)
- CVE-2024-26779: Fixed denial of service due to race condition on enabling fast-xmit in wifi mac80211  (bsc#1222772).
- CVE-2024-26787: Fixed DMA API overlapping mappings in mmc mmci stm32 (bsc#1222781)
- CVE-2024-26790: Fixed denial of service on 16 bytes unaligned read in dmaengine fsl-qdma (bsc#1222784)
- CVE-2024-26793: Fixed an use-after-free and null-ptr-deref in gtp_newlink() in gtp  (bsc#1222428).
- CVE-2024-26798: Fixed denial of service due to wrongly restore fond data upon failure in fbcon (bsc#1222798).
- CVE-2024-26805: Fixed a kernel-infoleak-after-free in __skb_datagram_iter in netlink  (bsc#1222630).
- CVE-2024-26807: Fixed memory corruption due to wrong pointer reference in spi cadence-qspi (bsc#1222801)
- CVE-2024-26848: Fixed denial of service due to endless loop in directory parsing in afs (bsc#1223030).

The following non-security bugs were fixed:

- Revert 'PCI: tegra194: Enable support for 256 Byte payload' (git-fixes).
- Revert 'Revert 'drm/amdgpu/display: change pipe policy for DCN 2.0'' (git-fixes).
- Revert 'SUNRPC dont update timeout value on connection reset' (git-fixes).
- Revert 'drm/amd: Disable PSR-SU on Parade 0803 TCON' (git-fixes).
- Revert 'drm/amd: Disable S/G for APUs when 64GB or more host memory' (git-fixes).
- Revert 'drm/amdgpu/display: change pipe policy for DCN 2.0' (git-fixes).
- Revert 'drm/amdgpu/display: change pipe policy for DCN 2.1' (git-fixes).
- Revert 'drm/vc4: hdmi: Enforce the minimum rate at runtime_resume' (git-fixes).
- Revert 'fbdev: flush deferred IO before closing (git-fixes).' (bsc#1221814)
- acpi: CPPC: enable AMD CPPC V2 support for family 17h processors (git-fixes).
- acpi: processor_idle: Fix memory leak in acpi_processor_power_exit() (git-fixes).
- acpi: resource: Add Infinity laptops to irq1_edge_low_force_override (stable-fixes).
- acpi: resource: Add MAIBENBEN X577 to irq1_edge_low_force_override (git-fixes).
- acpi: resource: Do IRQ override on Lunnen Ground laptops (stable-fixes).
- acpi: scan: Fix device check notification handling (git-fixes).
- acpica: debugger: check status of acpi_evaluate_object() in acpi_db_walk_for_fields() (git-fixes).
- alsa: aaci: Delete unused variable in aaci_do_suspend (git-fixes).
- alsa: aoa: avoid false-positive format truncation warning (git-fixes).
- alsa: aw2: avoid casting function pointers (git-fixes).
- alsa: ctxfi: avoid casting function pointers (git-fixes).
- alsa: hda/realtek - ALC285 reduce pop noise from Headphone port (stable-fixes).
- alsa: hda/realtek - Add Headset Mic supported Acer NB platform (stable-fixes).
- alsa: hda/realtek - Fix headset Mic no show at resume back for Lenovo ALC897 platform (git-fixes).
- alsa: hda/realtek: Enable Mute LED on HP 840 G8 (MB 8AB8) (git-fixes).
- alsa: hda/realtek: Update Panasonic CF-SZ6 quirk to support headset with microphone (git-fixes).
- alsa: hda/realtek: fix ALC285 issues on HP Envy x360 laptops (stable-fixes).
- alsa: hda/realtek: fix mute/micmute LED For HP mt440 (git-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs for HP EliteBook (stable-fixes).
- alsa: seq: fix function cast warnings (git-fixes).
- alsa: sh: aica: reorder cleanup operations to avoid UAF bugs (git-fixes).
- alsa: usb-audio: Stop parsing channels bits when all channels are found (git-fixes).
- arm64: dts: allwinner: h6: Add RX DMA channel for SPDIF (git-fixes)
- arm64: dts: broadcom: bcmbca: bcm4908: drop invalid switch cells (git-fixes)
- arm64: dts: imx8mm-kontron: Add support for ultra high speed modes on (git-fixes)
- arm64: dts: imx8mm-venice-gw71xx: fix USB OTG VBUS (git-fixes)
- arm64: dts: marvell: reorder crypto interrupts on Armada SoCs (git-fixes)
- arm64: dts: rockchip: add ES8316 codec for ROCK Pi 4 (git-fixes)
- arm64: dts: rockchip: add SPDIF node for ROCK Pi 4 (git-fixes)
- arm64: dts: rockchip: fix regulator name on rk3399-rock-4 (git-fixes)
- arm64: dts: rockchip: set num-cs property for spi on px30 (git-fixes)
- arm64: mm: fix VA-range sanity check (git-fixes)
- arm64: set __exception_irq_entry with __irq_entry as a default (git-fixes)
- asoc: Intel: bytcr_rt5640: Add an extra entry for the Chuwi Vi8 tablet (stable-fixes).
- asoc: amd: acp: Add missing error handling in sof-mach (git-fixes).
- asoc: amd: acp: fix for acp_init function error handling (git-fixes).
- asoc: madera: Fix typo in madera_set_fll_clks shift value (git-fixes).
- asoc: meson: Use dev_err_probe() helper (stable-fixes).
- asoc: meson: aiu: fix function pointer type mismatch (git-fixes).
- asoc: meson: axg-tdm-interface: add frame rate constraint (git-fixes).
- asoc: meson: axg-tdm-interface: fix mclk setup without mclk-fs (git-fixes).
- asoc: meson: t9015: fix function pointer type mismatch (git-fixes).
- asoc: ops: Fix wraparound for mask in snd_soc_get_volsw (git-fixes).
- asoc: rcar: adg: correct TIMSEL setting for SSI9 (git-fixes).
- asoc: rt5645: Make LattePanda board DMI match more precise (stable-fixes).
- asoc: rt5682-sdw: fix locking sequence (git-fixes).
- asoc: rt711-sdca: fix locking sequence (git-fixes).
- asoc: rt711-sdw: fix locking sequence (git-fixes).
- asoc: wm8962: Enable both SPKOUTR_ENA and SPKOUTL_ENA in mono mode (stable-fixes).
- asoc: wm8962: Enable oscillator if selecting WM8962_FLL_OSC (stable-fixes).
- asoc: wm8962: Fix up incorrect error message in wm8962_set_fll (stable-fixes).
- ata: sata_mv: Fix PCI device ID table declaration compilation warning (git-fixes).
- ata: sata_sx4: fix pdc20621_get_from_dimm() on 64-bit (git-fixes).
- backlight: da9052: Fully initialize backlight_properties during probe (git-fixes).
- backlight: lm3630a: Do not set bl-&gt;props.brightness in get_brightness (git-fixes).
- backlight: lm3630a: Initialize backlight_properties on init (git-fixes).
- backlight: lm3639: Fully initialize backlight_properties during probe (git-fixes).
- backlight: lp8788: Fully initialize backlight_properties during probe (git-fixes).
- bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent (git-fixes).
- bcache: Remove dead references to cache_readaheads (git-fixes).
- bcache: Remove unnecessary NULL point check in node allocations (git-fixes).
- bcache: add code comments for bch_btree_node_get() and __bch_btree_node_alloc() (git-fixes).
- bcache: avoid NULL checking to c-&gt;root in run_cache_set() (git-fixes).
- bcache: avoid oversize memory allocation by small stripe_size (git-fixes).
- bcache: bset: Fix comment typos (git-fixes).
- bcache: check return value from btree_node_alloc_replacement() (git-fixes).
- bcache: fix NULL pointer reference in cached_dev_detach_finish (git-fixes).
- bcache: fix error info in register_bcache() (git-fixes).
- bcache: fixup bcache_dev_sectors_dirty_add() multithreaded CPU false sharing (git-fixes).
- bcache: fixup btree_cache_wait list damage (git-fixes).
- bcache: fixup init dirty data errors (git-fixes).
- bcache: fixup lock c-&gt;root error (git-fixes).
- bcache: fixup multi-threaded bch_sectors_dirty_init() wake-up race (git-fixes).
- bcache: move calc_cached_dev_sectors to proper place on backing device detach (git-fixes).
- bcache: move uapi header bcache.h to bcache code directory (git-fixes).
- bcache: prevent potential division by zero error (git-fixes).
- bcache: remove EXPERIMENTAL for Kconfig option 'Asynchronous device registration' (git-fixes).
- bcache: remove bch_crc64_update (git-fixes).
- bcache: remove redundant assignment to variable cur_idx (git-fixes).
- bcache: remove the backing_dev_name field from struct cached_dev (git-fixes).
- bcache: remove the cache_dev_name field from struct cache (git-fixes).
- bcache: remove unnecessary flush_workqueue (git-fixes).
- bcache: remove unused bch_mark_cache_readahead function def in stats.h (git-fixes).
- bcache: replace a mistaken IS_ERR() by IS_ERR_OR_NULL() in btree_gc_coalesce() (git-fixes).
- bcache: replace snprintf in show functions with sysfs_emit (git-fixes).
- bcache: revert replacing IS_ERR_OR_NULL with IS_ERR (git-fixes).
- bcache: use bvec_kmap_local in bch_data_verify (git-fixes).
- bcache: use bvec_kmap_local in bio_csum (git-fixes).
- bcache: use default_groups in kobj_type (git-fixes).
- bcache:: fix repeated words in comments (git-fixes).
- blocklayoutdriver: Fix reference leak of pnfs_device_node (git-fixes).
- bluetooth: hci_core: Fix possible buffer overflow (git-fixes).
- bluetooth: mgmt: Remove leftover queuing of power_off work (git-fixes).
- bluetooth: remove HCI_POWER_OFF_TIMEOUT (git-fixes).
- bluetooth: remove superfluous call to hci_conn_check_pending() (git-fixes).
- bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security (stable-fixes).
- bpf, scripts: Correct GPL license name (git-fixes).
- bpf, sockmap: Fix preempt_rt splat when using raw_spin_lock_t (git-fixes).
- can: softing: remove redundant NULL check (git-fixes).
- ceph: stop copying to iter at EOF on sync reads (bsc#1223068).
- ceph: switch to corrected encoding of max_xattr_size in mdsmap (bsc#1223067).
- clk: zynq: Prevent null pointer dereference caused by kmalloc failure (git-fixes).
- comedi: comedi_test: Prevent timers rescheduling during deletion (git-fixes).
- coresight: etm4x: Do not access TRCIDR1 for identification (bsc#1220775)
- coresight: etm4x: Fix accesses to TRCSEQRSTEVR and TRCSEQSTR (bsc#1220775)
- coresight: etm: Override TRCIDR3.CCITMIN on errata affected cpus (bsc#1220775)
- cpufreq: amd-pstate: Fix min_perf assignment in amd_pstate_adjust_perf() (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: add check for cpufreq_cpu_get's return value (git-fixes).
- crypto: arm/sha - fix function cast warnings (git-fixes).
- crypto: qat - avoid division by zero (git-fixes).
- crypto: qat - fix deadlock in backlog processing (git-fixes).
- crypto: qat - fix double free during reset (git-fixes).
- crypto: qat - fix state machines cleanup paths (bsc#1218321).
- crypto: qat - fix unregistration of compression algorithms (git-fixes).
- crypto: qat - fix unregistration of crypto algorithms (git-fixes).
- crypto: qat - ignore subsequent state up commands (git-fixes).
- crypto: qat - increase size of buffers (git-fixes).
- crypto: qat - resolve race condition during AER recovery (git-fixes).
- crypto: xilinx - call finalize with bh disabled (git-fixes).
- dm cache policy smq: ensure IO does not prevent cleaner policy progress (git-fixes).
- dm cache: add cond_resched() to various workqueue loops (git-fixes).
- dm clone: call kmem_cache_destroy() in dm_clone_init() error path (git-fixes).
- dm crypt: add cond_resched() to dmcrypt_write() (git-fixes).
- dm crypt: avoid accessing uninitialized tasklet (git-fixes).
- dm flakey: do not corrupt the zero page (git-fixes).
- dm flakey: fix a bug with 32-bit highmem systems (git-fixes).
- dm flakey: fix a crash with invalid table line (git-fixes).
- dm flakey: fix logic when corrupting a bio (git-fixes).
- dm init: add dm-mod.waitfor to wait for asynchronously probed block devices (git-fixes).
- dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path (git-fixes).
- dm integrity: fix out-of-range warning (git-fixes).
- dm integrity: reduce vmalloc space footprint on 32-bit architectures (git-fixes).
- dm raid: clean up four equivalent goto tags in raid_ctr() (git-fixes).
- dm raid: fix false positive for requeue needed during reshape (git-fixes).
- dm raid: fix missing reconfig_mutex unlock in raid_ctr() error paths (git-fixes).
- dm stats: check for and propagate alloc_percpu failure (git-fixes).
- dm thin metadata: Fix ABBA deadlock by resetting dm_bufio_client (git-fixes).
- dm thin metadata: check fail_io before using data_sm (git-fixes).
- dm thin: add cond_resched() to various workqueue loops (git-fixes).
- dm thin: fix deadlock when swapping to thin device (bsc#1177529).
- dm verity: do not perform FEC for failed readahead IO (git-fixes).
- dm verity: fix error handling for check_at_most_once on FEC (git-fixes).
- dm zoned: free dmz-&gt;ddev array in dmz_put_zoned_devices (git-fixes).
- dm-delay: fix a race between delay_presuspend and delay_bio (git-fixes).
- dm-integrity: do not modify bio's immutable bio_vec in integrity_metadata() (git-fixes).
- dm-raid: fix lockdep waring in 'pers-&gt;hot_add_disk' (git-fixes).
- dm-verity, dm-crypt: align 'struct bvec_iter' correctly (git-fixes).
- dm-verity: align struct dm_verity_fec_io properly (git-fixes).
- dm: add cond_resched() to dm_wq_work() (git-fixes).
- dm: call the resume method on internal suspend (git-fixes).
- dm: do not lock fs when the map is NULL during suspend or resume (git-fixes).
- dm: do not lock fs when the map is NULL in process of resume (git-fixes).
- dm: remove flush_scheduled_work() during local_exit() (git-fixes).
- dm: send just one event on resize, not two (git-fixes).
- doc-guide: kernel-doc: tell about object-like macros (git-fixes).
- doc/README.SUSE: Update information about module support status (jsc#PED-5759)
- drivers: hv: vmbus: Calculate ring buffer size for more efficient use of memory (git-fixes).
- drm/amd/display: Add FAMS validation before trying to use it (git-fixes).
- drm/amd/display: Add function for validate and update new stream (git-fixes).
- drm/amd/display: Avoid ABM when ODM combine is enabled for eDP (git-fixes).
- drm/amd/display: Blocking invalid 420 modes on HDMI TMDS for DCN31 (git-fixes).
- drm/amd/display: Check if link state is valid (git-fixes).
- drm/amd/display: Copy DC context in the commit streams (git-fixes).
- drm/amd/display: Disable PSR-SU on Parade 0803 TCON again (git-fixes).
- drm/amd/display: Enable fast plane updates on DCN3.2 and above (git-fixes).
- drm/amd/display: Enable new commit sequence only for DCN32x (git-fixes).
- drm/amd/display: Exit idle optimizations before attempt to access PHY (git-fixes).
- drm/amd/display: Expand kernel doc for DC (git-fixes).
- drm/amd/display: Fix a bug when searching for insert_above_mpcc (git-fixes).
- drm/amd/display: Fix a potential buffer overflow in 'dp_dsc_clock_en_read()' (git-fixes).
- drm/amd/display: Fix possible underflow for displays with large vblank (git-fixes).
- drm/amd/display: Fix the delta clamping for shaper LUT (git-fixes).
- drm/amd/display: Fix underflow issue on 175hz timing (git-fixes).
- drm/amd/display: For prefetch mode &gt; 0, extend prefetch if possible (git-fixes).
- drm/amd/display: Guard DCN31 PHYD32CLK logic against chip family (git-fixes).
- drm/amd/display: Guard against invalid RPTR/WPTR being set (git-fixes).
- drm/amd/display: Handle seamless boot stream (git-fixes).
- drm/amd/display: Handle virtual hardware detect (git-fixes).
- drm/amd/display: Include surface of unaffected streams (git-fixes).
- drm/amd/display: Include udelay when waiting for INBOX0 ACK (git-fixes).
- drm/amd/display: Increase frame warning limit with KASAN or KCSAN in dml (git-fixes).
- drm/amd/display: Keep PHY active for dp config (git-fixes).
- drm/amd/display: Prevent vtotal from being set to 0 (git-fixes).
- drm/amd/display: Remove min_dst_y_next_start check for Z8 (git-fixes).
- drm/amd/display: Restore rptr/wptr for DMCUB as workaround (git-fixes).
- drm/amd/display: Return the correct HDCP error code (stable-fixes).
- drm/amd/display: Revert vblank change that causes null pointer crash (git-fixes).
- drm/amd/display: Rework comments on dc file (git-fixes).
- drm/amd/display: Rework context change check (git-fixes).
- drm/amd/display: Set minimum requirement for using PSR-SU on Phoenix (git-fixes).
- drm/amd/display: Set minimum requirement for using PSR-SU on Rembrandt (git-fixes).
- drm/amd/display: Update OTG instance in the commit stream (git-fixes).
- drm/amd/display: Update correct DCN314 register header (git-fixes).
- drm/amd/display: Update min Z8 residency time to 2100 for DCN314 (git-fixes).
- drm/amd/display: Use DRAM speed from validation for dummy p-state (git-fixes).
- drm/amd/display: Use DTBCLK as refclk instead of DPREFCLK (git-fixes).
- drm/amd/display: Use min transition for all SubVP plane add/remove (git-fixes).
- drm/amd/display: Write to correct dirty_rect (git-fixes).
- drm/amd/display: Wrong colorimetry workaround (git-fixes).
- drm/amd/display: add FB_DAMAGE_CLIPS support (git-fixes).
- drm/amd/display: add ODM case when looking for first split pipe (git-fixes).
- drm/amd/display: always switch off ODM before committing more streams (git-fixes).
- drm/amd/display: clean code-style issues in dcn30_set_mpc_shaper_3dlut (git-fixes).
- drm/amd/display: dc.h: eliminate kernel-doc warnings (git-fixes).
- drm/amd/display: ensure async flips are only accepted for fast updates (git-fixes).
- drm/amd/display: fix ABM disablement (git-fixes).
- drm/amd/display: fix a NULL pointer dereference in amdgpu_dm_i2c_xfer() (git-fixes).
- drm/amd/display: fix dc/core/dc.c kernel-doc (git-fixes).
- drm/amd/display: fix hw rotated modes when PSR-SU is enabled (git-fixes).
- drm/amd/display: fix kernel-doc issues in dc.h (git-fixes).
- drm/amd/display: fix unbounded requesting for high pixel rate modes on dcn315 (git-fixes).
- drm/amd/display: handle range offsets in VRR ranges (stable-fixes).
- drm/amd/display: perform a bounds check before filling dirty rectangles (git-fixes).
- drm/amd/display: set per pipe dppclk to 0 when dpp is off (git-fixes).
- drm/amd/display: update extended blank for dcn314 onwards (git-fixes).
- drm/amd/display: use low clocks for no plane configs (git-fixes).
- drm/amd/pm: Fix error of MACO flag setting code (git-fixes).
- drm/amd/pm: fix a memleak in aldebaran_tables_init (git-fixes).
- drm/amd/smu: use AverageGfxclkFrequency* to replace previous GFX Curr Clock (git-fixes).
- drm/amd: Enable PCIe PME from D3 (git-fixes).
- drm/amdgpu/pm: Fix the error of pwm1_enable setting (stable-fixes).
- drm/amdgpu/pm: make gfxclock consistent for sienna cichlid (git-fixes).
- drm/amdgpu/pm: make mclk consistent for smu 13.0.7 (git-fixes).
- drm/amdgpu/smu13: drop compute workload workaround (git-fixes).
- drm/amdgpu: Enable gpu reset for S3 abort cases on Raven series (stable-fixes).
- drm/amdgpu: Fix missing break in ATOM_ARG_IMM Case of atom_get_src_int() (git-fixes).
- drm/amdgpu: Force order between a read and write to the same address (git-fixes).
- drm/amdgpu: Match against exact bootloader status (git-fixes).
- drm/amdgpu: Unset context priority is now invalid (git-fixes).
- drm/amdgpu: Update min() to min_t() in 'amdgpu_info_ioctl' (git-fixes).
- drm/amdgpu: amdgpu_ttm_gart_bind set gtt bound flag (stable-fixes).
- drm/amdgpu: lower CS errors to debug severity (git-fixes).
- drm/amdkfd: fix TLB flush after unmap for GFX9.4.2 (stable-fixes).
- drm/bridge: tc358762: Instruct DSI host to generate HSE packets (git-fixes).
- drm/display: fix typo (git-fixes).
- drm/edid: Add quirk for OSVR HDK 2.0 (git-fixes).
- drm/etnaviv: Restore some id values (git-fixes).
- drm/exynos: do not return negative values from .get_modes() (stable-fixes).
- drm/exynos: fix a possible null-pointer dereference due to data race in exynos_drm_crtc_atomic_disable() (git-fixes).
- drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode() (stable-fixes).
- drm/i915/gt: Do not generate the command streamer for all the CCS (git-fixes).
- drm/i915/gt: Reset queue_priority_hint on parking (git-fixes).
- drm/i915/gt: Use i915_vm_put on ppgtt_create error paths (git-fixes).
- drm/i915/selftests: Fix dependency of some timeouts on HZ (git-fixes).
- drm/i915: Add missing CCS documentation (git-fixes).
- drm/i915: Call intel_pre_plane_updates() also for pipes getting enabled (git-fixes).
- drm/i915: Check before removing mm notifier (git-fixes).
- drm/lima: fix a memleak in lima_heap_alloc (git-fixes).
- drm/mediatek: Fix a null pointer crash in mtk_drm_crtc_finish_page_flip (git-fixes).
- drm/mediatek: dsi: Fix DSI RGB666 formats and definitions (git-fixes).
- drm/msm/dpu: Only enable DSC_MODE_MULTIPLEX if dsc_merge is enabled (git-fixes).
- drm/msm/dpu: add division of drm_display_mode's hskew parameter (git-fixes).
- drm/msm/dpu: fix the programming of INTF_CFG2_DATA_HCTL_EN (git-fixes).
- drm/msm/dpu: improve DSC allocation (git-fixes).
- drm/panel-edp: use put_sync in unprepare (git-fixes).
- drm/panel: Move AUX B116XW03 out of panel-edp back to panel-simple (git-fixes).
- drm/panel: auo,b101uan08.3: Fine tune the panel power sequence (git-fixes).
- drm/panel: boe-tv101wum-nl6: Fine tune the panel power sequence (git-fixes).
- drm/panel: do not return negative error codes from drm_panel_get_modes() (stable-fixes).
- drm/panfrost: fix power transition timeout warnings (git-fixes).
- drm/probe-helper: warn about negative .get_modes() (stable-fixes).
- drm/qxl: remove unused `count` variable from `qxl_surface_id_alloc()` (git-fixes).
- drm/qxl: remove unused variable from `qxl_process_single_command()` (git-fixes).
- drm/radeon/ni: Fix wrong firmware size logging in ni_init_microcode() (git-fixes).
- drm/radeon/ni_dpm: remove redundant NULL check (git-fixes).
- drm/radeon: remove dead code in ni_mc_load_microcode() (git-fixes).
- drm/rockchip: dsi: Clean up 'usage_mode' when failing to attach (git-fixes).
- drm/rockchip: inno_hdmi: Fix video timing (git-fixes).
- drm/rockchip: lvds: do not overwrite error code (git-fixes).
- drm/rockchip: lvds: do not print scary message when probing defer (git-fixes).
- drm/tegra: dpaux: Fix PM disable depth imbalance in tegra_dpaux_probe (git-fixes).
- drm/tegra: dsi: Add missing check for of_find_device_by_node (git-fixes).
- drm/tegra: dsi: Fix missing pm_runtime_disable() in the error handling path of tegra_dsi_probe() (git-fixes).
- drm/tegra: dsi: Fix some error handling paths in tegra_dsi_probe() (git-fixes).
- drm/tegra: dsi: Make use of the helper function dev_err_probe() (stable-fixes).
- drm/tegra: hdmi: Convert to devm_platform_ioremap_resource() (stable-fixes).
- drm/tegra: hdmi: Fix some error handling paths in tegra_hdmi_probe() (git-fixes).
- drm/tegra: output: Fix missing i2c_put_adapter() in the error handling paths of tegra_output_probe() (git-fixes).
- drm/tegra: put drm_gem_object ref on error in tegra_fb_create (git-fixes).
- drm/tegra: rgb: Fix missing clk_put() in the error handling paths of tegra_dc_rgb_probe() (git-fixes).
- drm/tegra: rgb: Fix some error handling paths in tegra_dc_rgb_probe() (git-fixes).
- drm/tidss: Fix initial plane zpos values (git-fixes).
- drm/tidss: Fix sync-lost issue with two displays (git-fixes).
- drm/ttm: Do not leak a resource on eviction error (git-fixes).
- drm/ttm: Do not print error message if eviction was interrupted (git-fixes).
- drm/vc4: Add module dependency on hdmi-codec (git-fixes).
- drm/vmwgfx: Create debugfs ttm_resource_manager entry only if needed (git-fixes).
- drm/vmwgfx: Fix possible null pointer derefence with invalid contexts (git-fixes).
- drm/vmwgfx: fix a memleak in vmw_gmrid_man_get_node (git-fixes).
- drm: Do not treat 0 as -1 in drm_fixp2int_ceil (git-fixes).
- drm: Fix drm_fixp2int_round() making it add 0.5 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Acer Switch V 10 (SW5-017) (git-fixes).
- firewire: core: use long bus reset on gap count error (stable-fixes).
- fix 'coresight: etm4x: Change etm4_platform_driver driver for MMIO devices' (bsc#1220775) Hunk with clk_put(drvdata-&gt;pclk) was incorrectly moved to another function.
- force config_TCG_TIS_CORE=m on aarch64 for workaround kconfig issues
- group-source-files.pl: Quote filenames (boo#1221077). The kernel source now contains a file with a space in the name. Add quotes in group-source-files.pl to avoid splitting the filename. Also use -print0 / -0 when updating timestamps.
- hid: amd_sfh: Update HPD sensor structure elements (git-fixes).
- hid: lenovo: Add middleclick_workaround sysfs knob for cptkbd (git-fixes).
- hid: multitouch: Add required quirk for Synaptics 0xcddc device (stable-fixes).
- hv_netvsc: Calculate correct ring size when PAGE_SIZE is not 4 Kbytes (git-fixes).
- hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove (git-fixes).
- hv_netvsc: Register VF in netvsc_probe if NET_DEVICE_REGISTER missed (git-fixes).
- i2c: aspeed: Fix the dummy irq expected print (git-fixes).
- i2c: i801: Avoid potential double call to gpiod_remove_lookup_table (git-fixes).
- i2c: wmt: Fix an error handling path in wmt_i2c_probe() (git-fixes).
- ib/ipoib: fix mcast list locking (git-fixes)
- iio: dummy_evgen: remove Excess kernel-doc comments (git-fixes).
- iio: pressure: dlhl60d: Initialize empty DLH bytes (git-fixes).
- input: gpio_keys_polled - suppress deferred probe error for gpio (stable-fixes).
- input: synaptics-rmi4 - fix UAF of IRQ domain on driver removal (git-fixes).
- iommu/amd: Add a length limitation for the ivrs_acpihid command-line parameter (git-fixes).
- iommu/amd: Do not block updates to GATag if guest mode is on (git-fixes).
- iommu/amd: Fix 'Guest Virtual APIC Table Root Pointer' configuration in IRTE (git-fixes).
- iommu/amd: Fix domain flush size when syncing iotlb (git-fixes).
- iommu/amd: Fix error handling for pdev_pri_ats_enable() (git-fixes).
- iommu/amd: Mark interrupt as managed (git-fixes).
- iommu/arm-smmu-qcom: Limit the SMR groups to 128 (git-fixes).
- iommu/arm-smmu-v3: Acknowledge pri/event queue overflow if any (git-fixes).
- iommu/arm-smmu-v3: Work around MMU-600 erratum 1076982 (git-fixes).
- iommu/dma: Trace bounce buffer usage when mapping buffers (git-fixes).
- iommu/fsl: fix all kernel-doc warnings in fsl_pamu.c (git-fixes).
- iommu/iova: Fix alloc iova overflows issue (git-fixes).
- iommu/mediatek-v1: Fix an error handling path in mtk_iommu_v1_probe() (git-fixes).
- iommu/mediatek: Fix forever loop in error handling (git-fixes).
- iommu/mediatek: Flush IOTLB completely only if domain has been attached (git-fixes).
- iommu/rockchip: Fix unwind goto issue (git-fixes).
- iommu/sprd: Release dma buffer to avoid memory leak (git-fixes).
- iommu/vt-d: Allocate local memory for page request queue (git-fixes).
- iommu/vt-d: Allow to use flush-queue when first level is default (git-fixes).
- iommu/vt-d: Allow zero SAGAW if second-stage not supported (git-fixes).
- iommu/vt-d: Do not issue ATS Invalidation request when device is disconnected (git-fixes).
- iommu/vt-d: Fix PASID directory pointer coherency (git-fixes).
- iommu/vt-d: Fix error handling in sva enable/disable paths (git-fixes).
- iommu/vt-d: Set No Execute Enable bit in PASID table entry (git-fixes).
- iommu: Fix error unwind in iommu_group_alloc() (git-fixes).
- kABI: PCI: Add locking to RMW PCI Express Capability Register accessors (kabi).
- kabi: Adjust trace_iterator.wait_index (git-fixes).
- kconfig: fix infinite loop when expanding a macro at the end of file (git-fixes).
- kernel-binary: Fix i386 build Fixes: 89eaf4cdce05 ('rpm templates: Move macro definitions below buildrequires')
- kernel-binary: Move build script to the end All other spec templates have the build script at the end, only kernel-binary has it in the middle. Align with the other templates.
- kernel-binary: certs: Avoid trailing space
- kernel-binary: vdso: fix filelist for non-usrmerged kernel Fixes: a6ad8af207e6 ('rpm templates: Always define usrmerged')
- kprobes: Fix double free of kretprobe_holder (bsc#1220901).
- kvm: s390: only deliver the set service event bits (git-fixes bsc#1221631).
- leds: aw2013: Unlock mutex before destroying it (git-fixes).
- lib/cmdline: Fix an invalid format specifier in an assertion msg (git-fixes).
- libnvdimm/of_pmem: Use devm_kstrdup instead of kstrdup and check its return value (git-fixes).
- libnvdimm/region: Allow setting align attribute on regions without mappings (git-fixes).
- make nvidia Grace-Hopper TPM related drivers build-ins (bsc#1221156)
- md/raid1: fix choose next idle in read_balance() (git-fixes).
- md: Do not clear MD_CLOSING when the raid is about to stop (git-fixes).
- md: do not clear MD_RECOVERY_FROZEN for new dm-raid until resume (git-fixes).
- md: fix data corruption for raid456 when reshape restart while grow up (git-fixes).
- media: dvb-frontends: avoid stack overflow warnings with clang (git-fixes).
- media: edia: dvbdev: fix a use-after-free (git-fixes).
- media: em28xx: annotate unchecked call to media_device_register() (git-fixes).
- media: go7007: add check of return value of go7007_read_addr() (git-fixes).
- media: go7007: fix a memleak in go7007_load_encoder (git-fixes).
- media: imx: csc/scaler: fix v4l2_ctrl_handler memory leak (git-fixes).
- media: pvrusb2: fix pvr2_stream_callback casts (git-fixes).
- media: pvrusb2: fix uaf in pvr2_context_set_notify (git-fixes).
- media: pvrusb2: remove redundant NULL check (git-fixes).
- media: staging: ipu3-imgu: Set fields before media_entity_pads_init() (git-fixes).
- media: sun8i-di: Fix chroma difference threshold (git-fixes).
- media: sun8i-di: Fix coefficient writes (git-fixes).
- media: sun8i-di: Fix power on/off sequences (git-fixes).
- media: tc358743: register v4l2 async device only after successful setup (git-fixes).
- media: ttpci: fix two memleaks in budget_av_attach (git-fixes).
- media: usbtv: Remove useless locks in usbtv_video_free() (git-fixes).
- media: v4l2-mem2mem: fix a memleak in v4l2_m2m_register_entity (git-fixes).
- media: v4l2-tpg: fix some memleaks in tpg_alloc (git-fixes).
- media: xc4000: Fix atomicity violation in xc4000_get_frequency (git-fixes).
- mfd: altera-sysmgr: Call of_node_put() only when of_parse_phandle() takes a ref (git-fixes).
- mfd: syscon: Call of_node_put() only when of_parse_phandle() takes a ref (git-fixes).
- mm,page_owner: Defer enablement of static branch (bsc#1222366).
- mm,page_owner: Fix accounting of pages when migrating (bsc#1222366).
- mm,page_owner: Fix printing of stack records (bsc#1222366).
- mm,page_owner: Fix refcount imbalance (bsc#1222366).
- mm,page_owner: Update metadata for tail pages (bsc#1222366).
- mm,page_owner: check for null stack_record before bumping its refcount (bsc#1222366).
- mm,page_owner: drop unnecessary check (bsc#1222366).
- mm,page_owner: fix recursion (bsc#1222366).
- mm/vmalloc: huge vmalloc backing pages should be split rather than compound (bsc#1217829).
- mmc: core: Avoid negative index with array access (git-fixes).
- mmc: core: Fix switch on gp3 partition (git-fixes).
- mmc: core: Initialize mmc_blk_ioc_data (git-fixes).
- mmc: mmci: stm32: fix DMA API overlapping mappings warning (git-fixes).
- mmc: mmci: stm32: use a buffer for unaligned DMA requests (git-fixes).
- mmc: tmio: avoid concurrent runs of mmc_request_done() (git-fixes).
- mmc: wmt-sdmmc: remove an incorrect release_mem_region() call in the .remove function (git-fixes).
- mtd: maps: physmap-core: fix flash size larger than 32-bit (git-fixes).
- mtd: rawnand: lpc32xx_mlc: fix irq handler prototype (git-fixes).
- mtd: rawnand: meson: fix scrambling mode value in command macro (git-fixes).
- nd_btt: Make BTT lanes preemptible (git-fixes).
- net/bnx2x: Prevent access to a freed page in page_pool (bsc#1215322).
- net/x25: fix incorrect parameter validation in the x25_getsockopt() function (git-fixes).
- net: Fix features skip in for_each_netdev_feature() (git-fixes).
- net: lan78xx: fix runtime PM count underflow on link stop (git-fixes).
- net: ll_temac: platform_get_resource replaced by wrong function (git-fixes).
- net: mana: Fix Rx DMA datasize and skb_over_panic (git-fixes).
- net: phy: fix phy_get_internal_delay accessing an empty array (git-fixes).
- net: sunrpc: Fix an off by one in rpc_sockaddr2uaddr() (git-fixes).
- net: usb: ax88179_178a: avoid the interface always configured as random address (git-fixes).
- nfc: nci: Fix uninit-value in nci_dev_up and nci_ntf_packet (git-fixes).
- nfs: avoid spurious warning of lost lock that is being unlocked (bsc#1221791).
- nfs: fix an off by one in root_nfs_cat() (git-fixes).
- nfs: rename nfs_client_kset to nfs_kset (git-fixes).
- nfsd: change LISTXATTRS cookie encoding to big-endian (git-fixes).
- nfsd: convert the callback workqueue to use delayed_work (git-fixes).
- nfsd: do not take fi_lock in nfsd_break_deleg_cb() (git-fixes).
- nfsd: fix file memleak on client_opens_release (git-fixes).
- nfsd: fix liSTXATTRS returning a short list with eof=TRUE (git-fixes).
- nfsd: fix liSTXATTRS returning more bytes than maxcount (git-fixes).
- nfsd: fix nfsd4_listxattr_validate_cookie (git-fixes).
- nfsd: lock_rename() needs both directories to live on the same fs (git-fixes).
- nfsd: reschedule CB operations when backchannel rpc_clnt is shut down (git-fixes).
- nfsd: reset cb_seq_status after NFS4ERR_DELAY (git-fixes).
- nfsd: retransmit callbacks after client reconnects (git-fixes).
- nfsd: use vfs setgid helper (git-fixes).
- nfsv4.1/pnfs: Ensure we handle the error NFS4ERR_RETURNCONFLICT (git-fixes).
- nfsv4.1: fix SP4_MACH_CRED protection for pnfs IO (git-fixes).
- nfsv4.1: fixup use EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes).
- nfsv4.1: use EXCHGID4_FLAG_USE_PNFS_DS for DS server (git-fixes).
- nfsv4.2: fix listxattr maximum XDR buffer size (git-fixes).
- nfsv4.2: fix nfs4_listxattr kernel BUG at mm/usercopy.c:102 (git-fixes).
- nfsv4.2: fix wrong shrinker_id (git-fixes).
- nfsv4: fix a nfs4_state_manager() race (git-fixes).
- nfsv4: fix a state manager thread deadlock regression (git-fixes).
- nilfs2: fix failure to detect DAT corruption in btree and direct mappings (git-fixes).
- nilfs2: prevent kernel bug at submit_bh_wbc() (git-fixes).
- nouveau/dmem: handle kcalloc() allocation failure (git-fixes).
- nouveau: reset the bo resource bus info after an eviction (git-fixes).
- ntfs: fix use-after-free in ntfs_ucsncmp() (bsc#1221713).
- nvdimm/namespace: drop nested variable in create_namespace_pmem() (git-fixes).
- nvdimm: Allow overwrite in the presence of disabled dimms (git-fixes).
- nvdimm: Fix badblocks clear off-by-one error (git-fixes).
- nvdimm: Fix dereference after free in register_nvdimm_pmu() (git-fixes).
- nvdimm: Fix firmware activation deadlock scenarios (git-fixes).
- nvdimm: Fix memleak of pmu attr_groups in unregister_nvdimm_pmu() (git-fixes).
- nvme-fc: do not wait in vain when unloading module (git-fixes).
- nvme: fix reconnection fail due to reserved tag allocation (git-fixes).
- nvmet-fc: abort command when there is no binding (git-fixes).
- nvmet-fc: avoid deadlock on delete association path (git-fixes).
- nvmet-fc: defer cleanup using RCU properly (git-fixes).
- nvmet-fc: hold reference on hostport match (git-fixes).
- nvmet-fc: release reference on target port (git-fixes).
- nvmet-fc: take ref count on tgtport before delete assoc (git-fixes).
- nvmet-fcloop: swap the list_add_tail arguments (git-fixes).
- nvmet-tcp: fix nvme tcp ida memory leak (git-fixes).
- pNFS/flexfiles: Check the layout validity in ff_layout_mirror_prepare_stats (git-fixes).
- pNFS: Fix a hang in nfs4_evict_inode() (git-fixes).
- pNFS: Fix the pnfs block driver's calculation of layoutget size (git-fixes).
- pci/aer: Block runtime suspend when handling errors (git-fixes).
- pci/aer: fix rootport attribute paths in ABI docs (git-fixes).
- pci/aspm: use RMW accessors for changing LNKCTL (git-fixes).
- pci/dpc: Quirk PIO log size for Intel Ice Lake Root Ports (git-fixes).
- pci/dpc: Quirk PIO log size for Intel Raptor Lake Root Ports (git-fixes).
- pci/dpc: Quirk PIO log size for certain Intel Root Ports (git-fixes).
- pci/dpc: print all TLP Prefixes, not just the first (git-fixes).
- pci/msi: prevent MSI hardware interrupt number truncation (bsc#1218777)
- pci/p2pdma: Fix a sleeping issue in a RCU read section (git-fixes).
- pci/pm: Drain runtime-idle callbacks before driver removal (git-fixes).
- pci: Drop pci_device_remove() test of pci_dev-&gt;driver (git-fixes).
- pci: add locking to RMW PCI Express Capability Register accessors (git-fixes).
- pci: dwc: endpoint: Fix advertised resizable BAR size (git-fixes).
- pci: dwc: endpoint: Fix dw_pcie_ep_raise_msix_irq() alignment support (git-fixes).
- pci: dwc: fix a 64bit bug in dw_pcie_ep_raise_msix_irq() (git-fixes).
- pci: fu740: Set the number of MSI vectors (git-fixes).
- pci: lengthen reset delay for VideoPropulsion Torrent QN16e card (git-fixes).
- pci: make link retraining use RMW accessors for changing LNKCTL (git-fixes).
- pci: mark 3ware-9650SE Root Port Extended Tags as broken (git-fixes).
- pci: mediatek-gen3: Fix translation window size calculation (git-fixes).
- pci: mediatek: Clear interrupt status before dispatching handler (git-fixes).
- pci: qcom: enable BDF to SID translation properly (git-fixes).
- pci: qcom: use DWC helpers for modifying the read-only DBI registers (git-fixes).
- pci: rockchip: Do not advertise MSI-X in PCIe capabilities (git-fixes).
- pci: rockchip: Fix window mapping and address translation for endpoint (git-fixes).
- pci: rockchip: Use 64-bit mask on MSI 64-bit PCI address (git-fixes).
- pci: switchtec: Fix an error handling path in switchtec_pci_probe() (git-fixes).
- pci_iounmap(): Fix MMIO mapping leak (git-fixes).
- pinctrl: mediatek: Drop bogus slew rate register range for MT8192 (git-fixes).
- platform/mellanox: mlxreg-hotplug: Remove redundant NULL-check (git-fixes).
- pm: suspend: Set mem_sleep_current during kernel command line setup (git-fixes).
- powerpc/64s: POWER10 CPU Kconfig build option (bsc#1194869).
- powerpc/boot: Disable power10 features after BOOTAFLAGS assignment (bsc#1194869).
- powerpc/boot: Fix boot wrapper code generation with CONFIG_POWER10_CPU (bsc#1194869).
- powerpc/lib/sstep: Do not use __{get/put}_user() on kernel addresses (bsc#1194869).
- powerpc/lib/sstep: Remove unneeded #ifdef __powerpc64__ (bsc#1194869).
- powerpc/lib/sstep: Use l1_dcache_bytes() instead of opencoding (bsc#1194869).
- powerpc/lib/sstep: use truncate_if_32bit() (bsc#1194869).
- powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV (bsc#1220492 ltc#205270).
- powerpc/pseries/iommu: LPAR panics when rebooted with a frozen PE (bsc#1222011 ltc#205900).
- powerpc/pseries: Fix potential memleak in papr_get_attr() (bsc#1200465 ltc#197256 jsc#SLE-18130 git-fixes).
- powerpc/sstep: Use bitwise instead of arithmetic operator for flags (bsc#1194869).
- powerpc: add compile-time support for lbarx, lharx (bsc#1194869).
- pwm: mediatek: Update kernel doc for struct pwm_mediatek_of_data (git-fixes).
- qedf: Do not process stag work during unload (bsc#1214852).
- qedf: Wait for stag work during unload (bsc#1214852).
- raid1: fix use-after-free for original bio in raid1_write_request() (bsc#1221097).
- ras/amd/fmpm: Add debugfs interface to print record entries (jsc#PED-7619).
- ras/amd/fmpm: Avoid NULL ptr deref in get_saved_records() (jsc#PED-7619).
- ras/amd/fmpm: Fix build when debugfs is not enabled (jsc#PED-7619).
- ras/amd/fmpm: Fix off by one when unwinding on error (jsc#PED-7619).
- ras/amd/fmpm: Safely handle saved records of various sizes (jsc#PED-7619).
- ras/amd/fmpm: Save SPA values (jsc#PED-7619).
- ras: Avoid build errors when CONFIG_DEBUG_FS=n (git-fixes).
- ras: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619).
- ras: export helper to get ras_debugfs_dir (jsc#PED-7619).
- rdma/cm: add timeout to cm_destroy_id wait (git-fixes)
- rdma/device: Fix a race between mad_client and cm_client init (git-fixes)
- rdma/hns: fix mis-modifying default congestion control algorithm (git-fixes)
- rdma/ipoib: Fix error code return in ipoib_mcast_join (git-fixes)
- rdma/irdma: Remove duplicate assignment (git-fixes)
- rdma/mana_ib: Fix bug in creation of dma regions (git-fixes).
- rdma/mlx5: fix fortify source warning while accessing Eth segment (git-fixes)
- rdma/mlx5: relax DEVX access upon modify commands (git-fixes)
- rdma/rtrs-clt: Check strnlen return len in sysfs mpath_policy_store() (git-fixes)
- rdma/srpt: do not register event handler until srpt device is fully setup (git-fixes)
- ring-buffer: Do not set shortest_full when full target is hit (git-fixes).
- ring-buffer: Fix full_waiters_pending in poll (git-fixes).
- ring-buffer: Fix resetting of shortest_full (git-fixes).
- ring-buffer: Fix waking up ring buffer readers (git-fixes).
- ring-buffer: Make wake once of ring_buffer_wait() more robust (git-fixes).
- ring-buffer: Use wait_event_interruptible() in ring_buffer_wait() (git-fixes).
- rtc: mt6397: select IRQ_DOMAIN instead of depending on it (git-fixes).
- s390/pai: fix attr_event_free upper limit for pai device drivers (git-fixes bsc#1221633).
- s390/vfio-ap: realize the VFIO_DEVICE_GET_IRQ_INFO ioctl (bsc#1205316).
- s390/vfio-ap: realize the VFIO_DEVICE_SET_IRQS ioctl (bsc#1205316).
- s390/vfio-ap: wire in the vfio_device_ops request callback (bsc#1205316).
- s390/vtime: fix average steal time calculation (git-fixes bsc#1221951).
- sched/rt: Disallow writing invalid values to sched_rt_period_us (bsc#1220176).
- sched/rt: sysctl_sched_rr_timeslice show default timeslice after reset (bsc#1220176).
- scsi: lpfc: Copyright updates for 14.4.0.1 patches (bsc#1221777).
- scsi: lpfc: Correct size for cmdwqe/rspwqe for memset() (bsc#1221777).
- scsi: lpfc: Correct size for wqe for memset() (bsc#1221777).
- scsi: lpfc: Define lpfc_dmabuf type for ctx_buf ptr (bsc#1221777).
- scsi: lpfc: Define lpfc_nodelist type for ctx_ndlp ptr (bsc#1221777).
- scsi: lpfc: Define types in a union for generic void *context3 ptr (bsc#1221777).
- scsi: lpfc: Move NPIV's transport unregistration to after resource clean up (bsc#1221777).
- scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1221777).
- scsi: lpfc: Remove IRQF_ONESHOT flag from threaded IRQ handling (bsc#1221777 bsc#1217959).
- scsi: lpfc: Remove unnecessary log message in queuecommand path (bsc#1221777).
- scsi: lpfc: Replace hbalock with ndlp lock in lpfc_nvme_unregister_port() (bsc#1221777).
- scsi: lpfc: Update lpfc version to 14.4.0.1 (bsc#1221777).
- scsi: lpfc: Update lpfc_ramp_down_queue_handler() logic (bsc#1221777).
- scsi: lpfc: Use a dedicated lock for ras_fwlog state (bsc#1221777).
- scsi: qedf: Remove set but unused variable 'page' (bsc#1214852).
- scsi: qedf: Remove unused 'num_handled' variable (bsc#1214852).
- scsi: qedf: Remove unused declaration (bsc#1214852).
- scsi: qla2xxx: Change debug message during driver unload (bsc1221816).
- scsi: qla2xxx: Delay I/O Abort on PCI error (bsc1221816).
- scsi: qla2xxx: Fix N2N stuck connection (bsc1221816).
- scsi: qla2xxx: Fix command flush on cable pull (bsc1221816).
- scsi: qla2xxx: Fix double free of fcport (bsc1221816).
- scsi: qla2xxx: Fix double free of the ha-&gt;vp_map pointer (bsc1221816).
- scsi: qla2xxx: NVME|FCP prefer flag not being honored (bsc1221816).
- scsi: qla2xxx: Prevent command send on chip reset (bsc1221816).
- scsi: qla2xxx: Split FCE|EFT trace control (bsc1221816).
- scsi: qla2xxx: Update manufacturer detail (bsc1221816).
- scsi: qla2xxx: Update version to 10.02.09.200-k (bsc1221816).
- scsi: storvsc: Fix ring buffer size calculation (git-fixes).
- scsi: target: core: Silence the message about unknown VPD pages (bsc#1221252).
- selftests/bpf: add generic BPF program tester-loader (bsc#1222033).
- serial: 8250_exar: Do not remove GPIO device on suspend (git-fixes).
- serial: max310x: fix syntax error in IRQ error message (git-fixes).
- slimbus: core: Remove usage of the deprecated ida_simple_xx() API (git-fixes).
- soc: fsl: qbman: Always disable interrupts when taking cgr_lock (git-fixes).
- spi: lm70llp: fix links in doc and comments (git-fixes).
- spi: spi-mt65xx: Fix NULL pointer access in interrupt handler (git-fixes).
- sr9800: Add check for usbnet_get_endpoints (git-fixes).
- stackdepot: rename pool_index to pool_index_plus_1 (git-fixes).
- staging: vc04_services: fix information leak in create_component() (git-fixes).
- sunrpc: Add an IS_ERR() check back to where it was (git-fixes).
- sunrpc: ECONNRESET might require a rebind (git-fixes).
- sunrpc: Fix RPC client cleaned up the freed pipefs dentries (git-fixes).
- sunrpc: Fix a suspicious RCU usage warning (git-fixes).
- sunrpc: fix a memleak in gss_import_v2_context (git-fixes).
- sunrpc: fix some memleaks in gssx_dec_option_array (git-fixes).
- svcrdma: Drop connection after an RDMA Read error (git-fixes).
- tracing/ring-buffer: Fix wait_on_pipe() race (git-fixes).
- tracing: Have saved_cmdlines arrays all in one allocation (git-fixes).
- tracing: Remove precision vsnprintf() check from print event (git-fixes).
- tracing: Use .flush() call to wake up readers (git-fixes).
- tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc (bsc#1222619).
- tty: serial: fsl_lpuart: avoid idle preamble pending if CTS is enabled (git-fixes).
- tty: serial: samsung: fix tx_empty() to return TIOCSER_TEMT (git-fixes).
- tty: vt: fix 20 vs 0x20 typo in EScsiignore (git-fixes).
- ubifs: Queue up space reservation tasks if retrying many times (git-fixes).
- ubifs: Remove unreachable code in dbg_check_ltab_lnum (git-fixes).
- ubifs: Set page uptodate in the correct place (git-fixes).
- ubifs: dbg_check_idx_size: Fix kmemleak if loading znode failed (git-fixes).
- ubifs: fix sort function prototype (git-fixes).
- usb: audio-v2: Correct comments for struct uac_clock_selector_descriptor (git-fixes).
- usb: cdc-wdm: close race between read and workqueue (git-fixes).
- usb: core: Fix deadlock in usb_deauthorize_interface() (git-fixes).
- usb: dwc2: gadget: Fix exiting from clock gating (git-fixes).
- usb: dwc2: gadget: LPM flow fix (git-fixes).
- usb: dwc2: host: Fix ISOC flow in DDMA mode (git-fixes).
- usb: dwc2: host: Fix hibernation flow (git-fixes).
- usb: dwc2: host: Fix remote wakeup from hibernation (git-fixes).
- usb: dwc3: Properly set system wakeup (git-fixes).
- usb: gadget: ncm: Fix handling of zero block length packets (git-fixes).
- usb: gadget: net2272: Use irqflags in the call to net2272_probe_fin (git-fixes).
- usb: port: Do not try to peer unused USB ports based on location (git-fixes).
- usb: typec: Return size of buffer if pd_set operation succeeds (git-fixes).
- usb: typec: ucsi: Check for notifications after init (git-fixes).
- usb: typec: ucsi: Clean up UCSI_CABLE_PROP macros (git-fixes).
- usb: typec: ucsi: Clear EVENT_PENDING under PPM lock (git-fixes).
- usb: usb-storage: Prevent divide-by-0 error in isd200_ata_command (git-fixes).
- usb: xhci: Add error handling in xhci_map_urb_for_dma (git-fixes).
- vboxsf: Avoid an spurious warning if load_nls_xxx() fails (git-fixes).
- vdpa/mlx5: Allow CVQ size changes (git-fixes).
- vt: fix unicode buffer corruption when deleting characters (git-fixes).
- watchdog: stm32_iwdg: initialize default timeout (git-fixes).
- wifi: ath10k: fix NULL pointer dereference in ath10k_wmi_tlv_op_pull_mgmt_tx_compl_ev() (git-fixes).
- wifi: ath11k: decrease MHI channel buffer length to 8KB (bsc#1207948).
- wifi: ath11k: initialize rx_mcs_80 and rx_mcs_160 before use (git-fixes).
- wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete (git-fixes).
- wifi: b43: Disable QoS for bcm4331 (git-fixes).
- wifi: b43: Stop correct queue in DMA worker when QoS is disabled (git-fixes).
- wifi: b43: Stop/wake correct queue in DMA Tx path when QoS is disabled (git-fixes).
- wifi: b43: Stop/wake correct queue in PIO Tx path when QoS is disabled (git-fixes).
- wifi: brcmfmac: fix copyright year mentioned in platform_data header (git-fixes).
- wifi: brcmsmac: avoid function pointer casts (git-fixes).
- wifi: iwlwifi: dbg-tlv: ensure NUL termination (git-fixes).
- wifi: iwlwifi: fix EWRD table validity check (git-fixes).
- wifi: iwlwifi: fw: do not always use FW dump trig (git-fixes).
- wifi: iwlwifi: mvm: do not set replay counters to 0xff (git-fixes).
- wifi: iwlwifi: mvm: report beacon protection failures (git-fixes).
- wifi: iwlwifi: mvm: rfi: fix potential response leaks (git-fixes).
- wifi: iwlwifi: mvm: use FW rate for non-data only on new devices (git-fixes).
- wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer() (git-fixes).
- wifi: mwifiex: debugfs: Drop unnecessary error check for debugfs_create_dir() (git-fixes).
- wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work (git-fixes).
- wifi: rtw88: 8821c: Fix false alarm count (git-fixes).
- wifi: wilc1000: fix RCU usage in connect path (git-fixes).
- wifi: wilc1000: fix declarations ordering (stable-fixes).
- wifi: wilc1000: fix multi-vif management when deleting a vif (git-fixes).
- wifi: wilc1000: prevent use-after-free on vif when cleaning up all interfaces (git-fixes).
- x86/CPU/AMD: Update the Zenbleed microcode revisions (git-fixes).
- x86/bugs: Fix the SRSO mitigation on Zen3/4 (git-fixes).
- x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (git-fixes).
- x86/xen: Add some null pointer checking to smp.c (git-fixes).
- x86/xen: add CPU dependencies for 32-bit build (git-fixes).
- x86/xen: fix percpu vcpu_info allocation (git-fixes).
- xen-netback: properly sync TX responses (git-fixes).
- xen-netfront: Add missing skb_mark_for_recycle (git-fixes).
- xen/gntdev: Fix the abuse of underlying struct page in DMA-buf import (git-fixes).
- xen/xenbus: document will_handle argument for xenbus_watch_path() (git-fixes).
- xhci: handle isoc Babble and Buffer Overrun events properly (git-fixes).
- xhci: process isoc TD properly when there was a transaction error mid TD (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-03"/>
	<updated date="2024-05-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177529">SUSE bug 1177529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192145">SUSE bug 1192145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200465">SUSE bug 1200465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205316">SUSE bug 1205316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207948">SUSE bug 1207948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209635">SUSE bug 1209635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209657">SUSE bug 1209657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212514">SUSE bug 1212514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213456">SUSE bug 1213456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214852">SUSE bug 1214852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215221">SUSE bug 1215221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215322">SUSE bug 1215322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217339">SUSE bug 1217339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217829">SUSE bug 1217829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217959">SUSE bug 1217959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217987">SUSE bug 1217987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217988">SUSE bug 1217988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217989">SUSE bug 1217989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218321">SUSE bug 1218321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218336">SUSE bug 1218336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218479">SUSE bug 1218479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218643">SUSE bug 1218643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218777">SUSE bug 1218777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219126">SUSE bug 1219126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219169">SUSE bug 1219169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219170">SUSE bug 1219170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219264">SUSE bug 1219264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219834">SUSE bug 1219834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220114">SUSE bug 1220114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220176">SUSE bug 1220176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220237">SUSE bug 1220237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220251">SUSE bug 1220251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220320">SUSE bug 1220320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220337">SUSE bug 1220337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220340">SUSE bug 1220340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220365">SUSE bug 1220365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220366">SUSE bug 1220366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220398">SUSE bug 1220398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220411">SUSE bug 1220411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220413">SUSE bug 1220413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220439">SUSE bug 1220439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220443">SUSE bug 1220443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220445">SUSE bug 1220445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220466">SUSE bug 1220466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220478">SUSE bug 1220478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220482">SUSE bug 1220482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220484">SUSE bug 1220484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220486">SUSE bug 1220486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220487">SUSE bug 1220487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220492">SUSE bug 1220492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220703">SUSE bug 1220703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220775">SUSE bug 1220775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220790">SUSE bug 1220790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220797">SUSE bug 1220797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220831">SUSE bug 1220831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220833">SUSE bug 1220833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220836">SUSE bug 1220836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220839">SUSE bug 1220839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220840">SUSE bug 1220840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220843">SUSE bug 1220843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220870">SUSE bug 1220870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220871">SUSE bug 1220871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220872">SUSE bug 1220872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220878">SUSE bug 1220878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220879">SUSE bug 1220879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220883">SUSE bug 1220883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220885">SUSE bug 1220885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220887">SUSE bug 1220887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220898">SUSE bug 1220898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220901">SUSE bug 1220901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220915">SUSE bug 1220915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220918">SUSE bug 1220918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220920">SUSE bug 1220920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220921">SUSE bug 1220921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220926">SUSE bug 1220926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220927">SUSE bug 1220927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220929">SUSE bug 1220929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220932">SUSE bug 1220932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220935">SUSE bug 1220935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220937">SUSE bug 1220937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220938">SUSE bug 1220938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220940">SUSE bug 1220940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220954">SUSE bug 1220954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220955">SUSE bug 1220955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220959">SUSE bug 1220959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220960">SUSE bug 1220960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220961">SUSE bug 1220961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220965">SUSE bug 1220965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220969">SUSE bug 1220969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220978">SUSE bug 1220978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220979">SUSE bug 1220979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220981">SUSE bug 1220981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220982">SUSE bug 1220982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220983">SUSE bug 1220983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220985">SUSE bug 1220985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220986">SUSE bug 1220986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220987">SUSE bug 1220987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220989">SUSE bug 1220989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220990">SUSE bug 1220990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221009">SUSE bug 1221009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221012">SUSE bug 1221012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221015">SUSE bug 1221015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221022">SUSE bug 1221022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221039">SUSE bug 1221039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221040">SUSE bug 1221040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221044">SUSE bug 1221044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221045">SUSE bug 1221045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221046">SUSE bug 1221046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221048">SUSE bug 1221048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221055">SUSE bug 1221055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221056">SUSE bug 1221056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221058">SUSE bug 1221058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221060">SUSE bug 1221060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221061">SUSE bug 1221061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221062">SUSE bug 1221062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221066">SUSE bug 1221066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221067">SUSE bug 1221067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221068">SUSE bug 1221068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221069">SUSE bug 1221069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221070">SUSE bug 1221070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221071">SUSE bug 1221071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221077">SUSE bug 1221077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221082">SUSE bug 1221082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221090">SUSE bug 1221090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221097">SUSE bug 1221097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221156">SUSE bug 1221156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221162">SUSE bug 1221162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221252">SUSE bug 1221252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221273">SUSE bug 1221273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221274">SUSE bug 1221274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221276">SUSE bug 1221276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221277">SUSE bug 1221277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221291">SUSE bug 1221291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221293">SUSE bug 1221293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221298">SUSE bug 1221298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221337">SUSE bug 1221337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221338">SUSE bug 1221338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221375">SUSE bug 1221375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221379">SUSE bug 1221379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221551">SUSE bug 1221551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221553">SUSE bug 1221553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221613">SUSE bug 1221613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221614">SUSE bug 1221614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221616">SUSE bug 1221616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221618">SUSE bug 1221618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221631">SUSE bug 1221631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221633">SUSE bug 1221633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221713">SUSE bug 1221713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221725">SUSE bug 1221725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221777">SUSE bug 1221777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221791">SUSE bug 1221791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221814">SUSE bug 1221814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221816">SUSE bug 1221816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221830">SUSE bug 1221830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221951">SUSE bug 1221951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222011">SUSE bug 1222011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222033">SUSE bug 1222033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222051">SUSE bug 1222051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222056">SUSE bug 1222056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222060">SUSE bug 1222060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222070">SUSE bug 1222070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222073">SUSE bug 1222073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222117">SUSE bug 1222117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222247">SUSE bug 1222247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222266">SUSE bug 1222266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222274">SUSE bug 1222274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222291">SUSE bug 1222291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222300">SUSE bug 1222300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222304">SUSE bug 1222304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222317">SUSE bug 1222317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222331">SUSE bug 1222331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222355">SUSE bug 1222355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222356">SUSE bug 1222356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222360">SUSE bug 1222360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222366">SUSE bug 1222366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222373">SUSE bug 1222373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222416">SUSE bug 1222416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222422">SUSE bug 1222422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222427">SUSE bug 1222427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222428">SUSE bug 1222428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222431">SUSE bug 1222431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222437">SUSE bug 1222437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222445">SUSE bug 1222445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222449">SUSE bug 1222449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222503">SUSE bug 1222503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222520">SUSE bug 1222520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222536">SUSE bug 1222536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222549">SUSE bug 1222549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222550">SUSE bug 1222550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222557">SUSE bug 1222557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222585">SUSE bug 1222585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222586">SUSE bug 1222586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222596">SUSE bug 1222596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222609">SUSE bug 1222609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222610">SUSE bug 1222610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222619">SUSE bug 1222619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222630">SUSE bug 1222630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222632">SUSE bug 1222632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222660">SUSE bug 1222660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222662">SUSE bug 1222662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222664">SUSE bug 1222664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222669">SUSE bug 1222669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222677">SUSE bug 1222677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222678">SUSE bug 1222678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222680">SUSE bug 1222680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222706">SUSE bug 1222706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222720">SUSE bug 1222720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222724">SUSE bug 1222724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222726">SUSE bug 1222726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222727">SUSE bug 1222727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222764">SUSE bug 1222764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222772">SUSE bug 1222772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222781">SUSE bug 1222781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222784">SUSE bug 1222784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222798">SUSE bug 1222798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222801">SUSE bug 1222801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222952">SUSE bug 1222952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223030">SUSE bug 1223030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223067">SUSE bug 1223067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223068">SUSE bug 1223068</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46925/">CVE-2021-46925 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46925">CVE-2021-46925 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46926/">CVE-2021-46926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46926">CVE-2021-46926 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46927/">CVE-2021-46927 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46927">CVE-2021-46927 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46929/">CVE-2021-46929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46929">CVE-2021-46929 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46930/">CVE-2021-46930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46930">CVE-2021-46930 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46931/">CVE-2021-46931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46931">CVE-2021-46931 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-46933/">CVE-2021-46933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46933">CVE-2021-46933 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46936/">CVE-2021-46936 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46936">CVE-2021-46936 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47082/">CVE-2021-47082 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47082">CVE-2021-47082 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47087/">CVE-2021-47087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47087">CVE-2021-47087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47091/">CVE-2021-47091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47091">CVE-2021-47091 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47093/">CVE-2021-47093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47093">CVE-2021-47093 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47094/">CVE-2021-47094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47094">CVE-2021-47094 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47095/">CVE-2021-47095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47095">CVE-2021-47095 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47096/">CVE-2021-47096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47096">CVE-2021-47096 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47097/">CVE-2021-47097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47097">CVE-2021-47097 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47098/">CVE-2021-47098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47098">CVE-2021-47098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47099/">CVE-2021-47099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47099">CVE-2021-47099 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47100/">CVE-2021-47100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47100">CVE-2021-47100 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47101/">CVE-2021-47101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47101">CVE-2021-47101 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47102/">CVE-2021-47102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47102">CVE-2021-47102 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47104/">CVE-2021-47104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47104">CVE-2021-47104 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47105/">CVE-2021-47105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47105">CVE-2021-47105 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47107/">CVE-2021-47107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47107">CVE-2021-47107 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47108/">CVE-2021-47108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47108">CVE-2021-47108 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47181/">CVE-2021-47181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47181">CVE-2021-47181 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47182/">CVE-2021-47182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47182">CVE-2021-47182 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47183/">CVE-2021-47183 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47183">CVE-2021-47183 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47185/">CVE-2021-47185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47185">CVE-2021-47185 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47189/">CVE-2021-47189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47189">CVE-2021-47189 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4744/">CVE-2022-4744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4744">CVE-2022-4744 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48626/">CVE-2022-48626 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48626">CVE-2022-48626 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48629/">CVE-2022-48629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48629">CVE-2022-48629 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48630/">CVE-2022-48630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48630">CVE-2022-48630 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0160/">CVE-2023-0160 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0160">CVE-2023-0160 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35827/">CVE-2023-35827 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35827">CVE-2023-35827 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4881/">CVE-2023-4881 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4881">CVE-2023-4881 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52447/">CVE-2023-52447 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52447">CVE-2023-52447 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52450/">CVE-2023-52450 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52450">CVE-2023-52450 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52453/">CVE-2023-52453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52453">CVE-2023-52453 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52454/">CVE-2023-52454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52454">CVE-2023-52454 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52469/">CVE-2023-52469 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52469">CVE-2023-52469 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52470/">CVE-2023-52470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52470">CVE-2023-52470 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-52474/">CVE-2023-52474 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52474">CVE-2023-52474 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52476/">CVE-2023-52476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52476">CVE-2023-52476 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52477/">CVE-2023-52477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52477">CVE-2023-52477 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52481/">CVE-2023-52481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52481">CVE-2023-52481 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52484/">CVE-2023-52484 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52484">CVE-2023-52484 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52486/">CVE-2023-52486 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52486">CVE-2023-52486 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52488/">CVE-2023-52488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52488">CVE-2023-52488 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52492/">CVE-2023-52492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52492">CVE-2023-52492 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52493/">CVE-2023-52493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52493">CVE-2023-52493 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52494/">CVE-2023-52494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52494">CVE-2023-52494 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52497/">CVE-2023-52497 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52497">CVE-2023-52497 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52500/">CVE-2023-52500 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52500">CVE-2023-52500 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52501/">CVE-2023-52501 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52501">CVE-2023-52501 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52502/">CVE-2023-52502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52502">CVE-2023-52502 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52503/">CVE-2023-52503 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52503">CVE-2023-52503 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52504/">CVE-2023-52504 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52504">CVE-2023-52504 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52507/">CVE-2023-52507 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52507">CVE-2023-52507 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52508/">CVE-2023-52508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52508">CVE-2023-52508 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52509/">CVE-2023-52509 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52509">CVE-2023-52509 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52510/">CVE-2023-52510 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52510">CVE-2023-52510 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52511/">CVE-2023-52511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52511">CVE-2023-52511 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52513/">CVE-2023-52513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52513">CVE-2023-52513 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52515/">CVE-2023-52515 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52515">CVE-2023-52515 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52517/">CVE-2023-52517 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52517">CVE-2023-52517 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52518/">CVE-2023-52518 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52518">CVE-2023-52518 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52519/">CVE-2023-52519 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52519">CVE-2023-52519 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52520/">CVE-2023-52520 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52520">CVE-2023-52520 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52523/">CVE-2023-52523 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52523">CVE-2023-52523 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52524/">CVE-2023-52524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52524">CVE-2023-52524 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52525/">CVE-2023-52525 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52525">CVE-2023-52525 at NVD</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52528/">CVE-2023-52528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52528">CVE-2023-52528 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52529/">CVE-2023-52529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52529">CVE-2023-52529 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52532/">CVE-2023-52532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52532">CVE-2023-52532 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52561/">CVE-2023-52561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52561">CVE-2023-52561 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52563/">CVE-2023-52563 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52563">CVE-2023-52563 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52564/">CVE-2023-52564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52564">CVE-2023-52564 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52566/">CVE-2023-52566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52566">CVE-2023-52566 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52567/">CVE-2023-52567 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52567">CVE-2023-52567 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52569/">CVE-2023-52569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52569">CVE-2023-52569 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52574/">CVE-2023-52574 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52574">CVE-2023-52574 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52575/">CVE-2023-52575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52575">CVE-2023-52575 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52576/">CVE-2023-52576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52576">CVE-2023-52576 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52582/">CVE-2023-52582 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52582">CVE-2023-52582 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52583/">CVE-2023-52583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52583">CVE-2023-52583 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52587/">CVE-2023-52587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52587">CVE-2023-52587 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52591/">CVE-2023-52591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52591">CVE-2023-52591 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52594/">CVE-2023-52594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52594">CVE-2023-52594 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52595/">CVE-2023-52595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52595">CVE-2023-52595 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52597/">CVE-2023-52597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52597">CVE-2023-52597 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52598/">CVE-2023-52598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52598">CVE-2023-52598 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52599/">CVE-2023-52599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52599">CVE-2023-52599 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52600/">CVE-2023-52600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52600">CVE-2023-52600 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52601/">CVE-2023-52601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52601">CVE-2023-52601 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52602/">CVE-2023-52602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52602">CVE-2023-52602 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52603/">CVE-2023-52603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52603">CVE-2023-52603 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52604/">CVE-2023-52604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52604">CVE-2023-52604 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52605/">CVE-2023-52605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52605">CVE-2023-52605 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52606/">CVE-2023-52606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52606">CVE-2023-52606 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52607/">CVE-2023-52607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52607">CVE-2023-52607 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52608/">CVE-2023-52608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52608">CVE-2023-52608 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52612/">CVE-2023-52612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52612">CVE-2023-52612 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52615/">CVE-2023-52615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52615">CVE-2023-52615 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52617/">CVE-2023-52617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52617">CVE-2023-52617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52619/">CVE-2023-52619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52619">CVE-2023-52619 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52621/">CVE-2023-52621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52621">CVE-2023-52621 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52623/">CVE-2023-52623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52623">CVE-2023-52623 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52627/">CVE-2023-52627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52627">CVE-2023-52627 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52628/">CVE-2023-52628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52628">CVE-2023-52628 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52632/">CVE-2023-52632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52632">CVE-2023-52632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52636/">CVE-2023-52636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52636">CVE-2023-52636 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52637/">CVE-2023-52637 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52637">CVE-2023-52637 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52639/">CVE-2023-52639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52639">CVE-2023-52639 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6356/">CVE-2023-6356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6356">CVE-2023-6356 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6535/">CVE-2023-6535 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6535">CVE-2023-6535 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6536/">CVE-2023-6536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6536">CVE-2023-6536 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-7042/">CVE-2023-7042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7042">CVE-2023-7042 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-7192/">CVE-2023-7192 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7192">CVE-2023-7192 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0841/">CVE-2024-0841 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0841">CVE-2024-0841 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2201/">CVE-2024-2201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2201">CVE-2024-2201 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22099/">CVE-2024-22099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22099">CVE-2024-22099 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23307/">CVE-2024-23307 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23307">CVE-2024-23307 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23850/">CVE-2024-23850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23850">CVE-2024-23850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25739/">CVE-2024-25739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25739">CVE-2024-25739 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25742/">CVE-2024-25742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25742">CVE-2024-25742 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26599/">CVE-2024-26599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26599">CVE-2024-26599 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26600/">CVE-2024-26600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26600">CVE-2024-26600 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26602/">CVE-2024-26602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26602">CVE-2024-26602 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26612/">CVE-2024-26612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26612">CVE-2024-26612 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26614/">CVE-2024-26614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26614">CVE-2024-26614 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-26620/">CVE-2024-26620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26620">CVE-2024-26620 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26627/">CVE-2024-26627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26627">CVE-2024-26627 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26629/">CVE-2024-26629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26629">CVE-2024-26629 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26642/">CVE-2024-26642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26642">CVE-2024-26642 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26645/">CVE-2024-26645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26645">CVE-2024-26645 at NVD</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-26646/">CVE-2024-26646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26646">CVE-2024-26646 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26651/">CVE-2024-26651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26651">CVE-2024-26651 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26654/">CVE-2024-26654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26654">CVE-2024-26654 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26659/">CVE-2024-26659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26659">CVE-2024-26659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26660/">CVE-2024-26660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26660">CVE-2024-26660 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26664/">CVE-2024-26664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26664">CVE-2024-26664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26667/">CVE-2024-26667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26667">CVE-2024-26667 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26670/">CVE-2024-26670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26670">CVE-2024-26670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26680/">CVE-2024-26680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26680">CVE-2024-26680 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26681/">CVE-2024-26681 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26681">CVE-2024-26681 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26684/">CVE-2024-26684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26684">CVE-2024-26684 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26685/">CVE-2024-26685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26685">CVE-2024-26685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26689/">CVE-2024-26689 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26689">CVE-2024-26689 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26695/">CVE-2024-26695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26695">CVE-2024-26695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26696/">CVE-2024-26696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26696">CVE-2024-26696 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26697/">CVE-2024-26697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26697">CVE-2024-26697 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26704/">CVE-2024-26704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26704">CVE-2024-26704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26717/">CVE-2024-26717 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26717">CVE-2024-26717 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26718/">CVE-2024-26718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26718">CVE-2024-26718 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26722/">CVE-2024-26722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26722">CVE-2024-26722 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26727/">CVE-2024-26727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26727">CVE-2024-26727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26733/">CVE-2024-26733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26733">CVE-2024-26733 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26736/">CVE-2024-26736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26736">CVE-2024-26736 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26737/">CVE-2024-26737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26737">CVE-2024-26737 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26743/">CVE-2024-26743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26743">CVE-2024-26743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26744/">CVE-2024-26744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26744">CVE-2024-26744 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26745/">CVE-2024-26745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26745">CVE-2024-26745 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26747/">CVE-2024-26747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26747">CVE-2024-26747 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26749/">CVE-2024-26749 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26749">CVE-2024-26749 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26751/">CVE-2024-26751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26751">CVE-2024-26751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26754/">CVE-2024-26754 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26754">CVE-2024-26754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26760/">CVE-2024-26760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26760">CVE-2024-26760 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-26763/">CVE-2024-26763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26763">CVE-2024-26763 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26766/">CVE-2024-26766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26766">CVE-2024-26766 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26769/">CVE-2024-26769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26769">CVE-2024-26769 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26771/">CVE-2024-26771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26771">CVE-2024-26771 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26776/">CVE-2024-26776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26776">CVE-2024-26776 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26779/">CVE-2024-26779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26779">CVE-2024-26779 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26787/">CVE-2024-26787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26787">CVE-2024-26787 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26790/">CVE-2024-26790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26790">CVE-2024-26790 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26793/">CVE-2024-26793 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26793">CVE-2024-26793 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26798/">CVE-2024-26798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26798">CVE-2024-26798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26805/">CVE-2024-26805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26805">CVE-2024-26805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26807/">CVE-2024-26807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26807">CVE-2024-26807 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26848/">CVE-2024-26848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26848">CVE-2024-26848 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858782" comment="cluster-md-kmp-azure-5.14.21-150500.33.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858783" comment="dlm-kmp-azure-5.14.21-150500.33.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858784" comment="gfs2-kmp-azure-5.14.21-150500.33.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858785" comment="kernel-azure-5.14.21-150500.33.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858786" comment="kernel-azure-devel-5.14.21-150500.33.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858787" comment="kernel-azure-extra-5.14.21-150500.33.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858788" comment="kernel-azure-livepatch-devel-5.14.21-150500.33.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858789" comment="kernel-azure-optional-5.14.21-150500.33.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858790" comment="kernel-azure-vdso-5.14.21-150500.33.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858791" comment="kernel-devel-azure-5.14.21-150500.33.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858792" comment="kernel-source-azure-5.14.21-150500.33.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858793" comment="kernel-syms-azure-5.14.21-150500.33.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858794" comment="kselftests-kmp-azure-5.14.21-150500.33.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858795" comment="ocfs2-kmp-azure-5.14.21-150500.33.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858796" comment="reiserfs-kmp-azure-5.14.21-150500.33.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4689" version="1" class="patch">
	<metadata>
		<title>Security update for skopeo (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215611" ref_url="https://bugzilla.suse.com/1215611" source="BUGZILLA"/>
		<reference ref_id="1219563" ref_url="https://bugzilla.suse.com/1219563" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2024:1497-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035145.html" source="SUSE-SU"/>
		<description>
This update for skopeo fixes the following issues:

- Update to version 1.14.2:
  * [release-1.14] Bump Skopeo to v1.14.2
  * [release-1.14] Bump c/image to v5.29.2, c/common to v0.57.3 (fixes bsc#1219563)

- Update to version 1.14.1:
  * Bump to v1.14.1
  * fix(deps): update module github.com/containers/common to v0.57.2
  * fix(deps): update module github.com/containers/image/v5 to v5.29.1
  * chore(deps): update dependency containers/automation_images to v20240102
  * Fix libsubid detection
  * fix(deps): update module golang.org/x/term to v0.16.0
  * fix(deps): update golang.org/x/exp digest to 02704c9
  * chore(deps): update dependency containers/automation_images to v20231208
  * [skip-ci] Update actions/stale action to v9
  * fix(deps): update module github.com/containers/common to v0.57.1
  * fix(deps): update golang.org/x/exp digest to 6522937
  * DOCS: add Gentoo in install.md
  * DOCS: Update to add Arch Linux in install.md
  * fix(deps): update module golang.org/x/term to v0.15.0
  * Bump to v1.14.1-dev

- Update to version 1.14.0:
  * Bump to v1.14.0
  * fix(deps): update module github.com/containers/common to v0.57.0
  * chore(deps): update dependency containers/automation_images to v20231116
  * fix(deps): update module github.com/containers/image/v5 to v5.29.0
  * Add documentation and smoke tests for the new --compat-auth-file options
  * Update c/image and c/common to latest
  * fix(deps): update module github.com/containers/storage to v1.51.0
  * fix(deps): update module golang.org/x/term to v0.14.0
  * fix(deps): update module github.com/spf13/cobra to v1.8.0
  * [CI:DOCS] Update dependency golangci/golangci-lint to v1.55.2
  * [CI:DOCS] Update dependency golangci/golangci-lint to v1.55.1
  * fix(deps): update github.com/containers/common digest to 3e5caa0
  * chore(deps): update module google.golang.org/grpc to v1.57.1 [security]
  * fix(deps): update module github.com/containers/ocicrypt to v1.1.9
  * Update github.com/klauspost/compress to v1.17.2
  * chore(deps): update module github.com/docker/docker to v24.0.7+incompatible [security]
  * Fix ENTRYPOINT documentation, drop others.
  * Remove unused environment variables in Cirrus
  * [CI:DOCS] Update dependency golangci/golangci-lint to v1.55.0
  * chore(deps): update dependency containers/automation_images to v20231004
  * chore(deps): update module golang.org/x/net to v0.17.0 [security]
  * copy: Note support for `zstd:chunked`
  * fix(deps): update module golang.org/x/term to v0.13.0
  * fix(deps): update module github.com/docker/distribution to v2.8.3+incompatible
  * fix(deps): update github.com/containers/common digest to 745eaa4
  * Packit: switch to @containers/packit-build team for copr failure notification comments
  * Packit: tag @lsm5 on copr build failures
  * vendor of containers/common
  * fix(deps): update module github.com/opencontainers/image-spec to v1.1.0-rc5
  * fix(deps): update module github.com/containers/common to v0.56.0
  * Cirrus: Remove multi-arch skopeo image builds
  * fix(deps): update module github.com/containers/image/v5 to v5.28.0
  * Increase the golangci-lint timeout
  * fix(deps): update module github.com/containers/storage to v1.50.2
  * fix(deps): update module github.com/containers/storage to v1.50.1
  * fix(deps): update golang.org/x/exp digest to 9212866
  * Fix a man page link
  * fix(deps): update github.com/containers/image/v5 digest to 58d5eb6
  * GHA: Closed issue/PR comment-lock test
  * fix(deps): update module github.com/containers/common to v0.55.4
  * fix(deps): update module github.com/containers/storage to v1.49.0
  * rpm: spdx compatible license field
  * chore(deps): update dependency golangci/golangci-lint to v1.54.2
  * chore(deps): update dependency containers/automation_images to v20230816
  * Packit: set eln target correctly
  * packit: Build PRs into default packit COPRs
  * DOCS: Update Go version requirement info
  * DOCS: Add information about the cross-build
  * fix(deps): update module github.com/containers/ocicrypt to v1.1.8
  * fix(deps): update module github.com/containers/common to v0.55.3
  * Update c/image after https://github.com/containers/image/pull/2070
  * chore(deps): update dependency golangci/golangci-lint to v1.54.1
  * chore(deps): update dependency containers/automation_images to v20230809
  * fix(deps): update golang.org/x/exp digest to 352e893
  * chore(deps): update dependency containers/automation_images to v20230807
  * Update to Go 1.19
  * fix(deps): update module golang.org/x/term to v0.11.0
  * Update c/image for golang.org/x/exp
  * RPM: define gobuild macro for rhel/centos stream
  * Fix handling the unexpected return value combination from IsRunningImageAllowed
  * Close the PolicyContext, as required by the API
  * Use globalOptions.getPolicyContext instead of an image-targeted SystemContext
  * Packit: remove pre-sync action
  * fix(deps): update module github.com/containers/common to v0.55.2
  * proxy: Change the imgid to uint64
  * [CI:BUILD] Packit: install golist before updating downstream spec
  * Update module golang.org/x/term to v0.10.0
  * Bump to v1.14.0-dev
  * Bump to v1.13.0

- Bump go version to 1.21 (bsc#1215611)

- Update to version 1.13.2:
  * [release-1.13] Bump to v1.13.2
  * [release-1.31] Bump c/common v0.55.3
  * Packit: remove pre-sync action
  * [release-1.13] Bump to v1.13.2-dev

- Update to version 1.13.1:
  * [release-1.13] Bump to v1.13.1
  * [release-1.13] Bump c/common to v0.55.2
  * [release-1.13 backport] [CI:BUILD] Packit: install golist before updating downstream spec
  * [release-1.13] Bump to v1.13.1-dev

- Update to version 1.13.0:
  * Bump to v1.13.0
  * proxy: Policy verification of OCI Image before pulling
  * Update module github.com/opencontainers/image-spec to v1.1.0-rc4
  * Update module github.com/containers/common to v0.55.1
  * Update module github.com/containers/common to v0.54.0
  * Update module github.com/containers/image/v5 to v5.26.0
  * [CI:BUILD] RPM: fix ELN builds
  * Update module github.com/containers/storage to v1.47.0
  * Packit: easier to read distro conditionals
  * Update dependency golangci/golangci-lint to v1.53.3
  * Help Renovate manage the golangci-lint version
  * Minor: Cleanup renovate configuration
  * Update dependency containers/automation_images to v20230614
  * Update module golang.org/x/term to v0.9.0
  * [CI:BUILD] Packit: add jobs for downstream Fedora package builds
  * Update module github.com/sirupsen/logrus to v1.9.3
  * Update dependency containers/automation_images to v20230601
  * Update golang.org/x/exp digest to 2e198f4
  * Update github.com/containers/image/v5 digest to e14c1c5
  * Update module github.com/stretchr/testify to v1.8.4
  * Update module github.com/stretchr/testify to v1.8.3
  * Update dependency containers/automation_images to v20230517
  * Update module github.com/sirupsen/logrus to v1.9.2
  * Update module github.com/docker/distribution to v2.8.2+incompatible
  * Trigger an update of the ostree_ext container image
  * Update c/image with https://github.com/containers/image/pull/1944
  * Update module github.com/containers/common to v0.53.0
  * Update module golang.org/x/term to v0.8.0
  * Update dependency containers/automation_images to v20230426
  * Update golang.org/x/exp digest to 47ecfdc
  * Emphasize the semantics of --preserve-digests a tiny bit
  * Improve the static build documentation a tiny bit
  * Bump to v1.12.1-dev
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-06"/>
	<updated date="2024-05-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215611">SUSE bug 1215611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219563">SUSE bug 1219563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858929" comment="skopeo-1.14.2-150300.11.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4690" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213470" ref_url="https://bugzilla.suse.com/1213470" source="BUGZILLA"/>
		<reference ref_id="1222979" ref_url="https://bugzilla.suse.com/1222979" source="BUGZILLA"/>
		<reference ref_id="1222983" ref_url="https://bugzilla.suse.com/1222983" source="BUGZILLA"/>
		<reference ref_id="1222984" ref_url="https://bugzilla.suse.com/1222984" source="BUGZILLA"/>
		<reference ref_id="1222986" ref_url="https://bugzilla.suse.com/1222986" source="BUGZILLA"/>
		<reference ref_id="1222987" ref_url="https://bugzilla.suse.com/1222987" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011/" source="CVE"/>
		<reference ref_id="CVE-2024-21012" ref_url="https://www.suse.com/security/cve/CVE-2024-21012/" source="CVE"/>
		<reference ref_id="CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068/" source="CVE"/>
		<reference ref_id="CVE-2024-21085" ref_url="https://www.suse.com/security/cve/CVE-2024-21085/" source="CVE"/>
		<reference ref_id="CVE-2024-21094" ref_url="https://www.suse.com/security/cve/CVE-2024-21094/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1498-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035144.html" source="SUSE-SU"/>
		<description>
This update for java-11-openjdk fixes the following issues:

- CVE-2024-21011: Fixed denial of service due to long Exception message logging (JDK-8319851,bsc#1222979)
- CVE-2024-21012: Fixed unauthorized data modification due HTTP/2 client improper reverse DNS lookup (JDK-8315708,bsc#1222987)
- CVE-2024-21068: Fixed integer overflow in C1 compiler address generation (JDK-8322122,bsc#1222983)  
- CVE-2024-21085: Fixed denial of service due to Pack200 excessive memory allocation (JDK-8322114,bsc#1222984) 
- CVE-2024-21094: Fixed unauthorized data modification due to C2 compilation failure with 'Exceeded _node_regs array' (JDK-8317507,JDK-8325348,bsc#1222986)

Other fixes:
- Upgrade to upstream tag jdk-11.0.23+9 (April 2024 CPU)
  * Security fixes
    + JDK-8318340: Improve RSA key implementations
  * Other changes
    + JDK-6928542: Chinese characters in RTF are not decoded
    + JDK-7132796: [macosx] closed/javax/swing/JComboBox/4517214/
      /bug4517214.java fails on MacOS
    + JDK-7148092: [macosx] When Alt+down arrow key is pressed,
      the combobox popup does not appear.
    + JDK-8054022: HttpURLConnection timeouts with Expect:
      100-Continue and no chunking
    + JDK-8054572: [macosx] JComboBox paints the border incorrectly
    + JDK-8058176: [mlvm] tests should not allow code cache
      exhaustion
    + JDK-8067651: LevelTransitionTest.java, fix trivial methods
      levels logic
    + JDK-8068225: nsk/jdi/EventQueue/remove_l/remove_l005
      intermittently times out
    + JDK-8156889: ListKeychainStore.sh fails in some virtualized
      environments
    + JDK-8166275: vm/mlvm/meth/stress/compiler/deoptimize keeps
      timeouting
    + JDK-8166554: Avoid compilation blocking in
      OverloadCompileQueueTest.java
    + JDK-8169475: WheelModifier.java fails by timeout
    + JDK-8180266: Convert sun/security/provider/KeyStore/DKSTest.sh
      to Java Jtreg Test
    + JDK-8186610: move ModuleUtils to top-level testlibrary
    + JDK-8192864: defmeth tests can hide failures
    + JDK-8193543: Regression automated test '/open/test/jdk/java/
      /awt/TrayIcon/SystemTrayInstance/SystemTrayInstanceTest.java'
      fails
    + JDK-8198668: MemoryPoolMBean/isUsageThresholdExceeded/
      /isexceeded001/TestDescription.java still failing
    + JDK-8202282: [TESTBUG] appcds TestCommon
      .makeCommandLineForAppCDS() can be removed
    + JDK-8202790: DnD test DisposeFrameOnDragTest.java does not
      clean up
    + JDK-8202931: [macos] java/awt/Choice/ChoicePopupLocation/
      /ChoicePopupLocation.java fails
    + JDK-8207211: [TESTBUG] Remove excessive output from
      CDS/AppCDS tests
    + JDK-8207214: Broken links in JDK API serialized-form page
    + JDK-8207855: Make applications/jcstress invoke tests in
      batches
    + JDK-8208243: vmTestbase/gc/lock/jni/jnilock002/
      /TestDescription.java fails in jdk/hs nightly
    + JDK-8208278: [mlvm] [TESTBUG] vm.mlvm.mixed.stress.java
      .findDeadlock.INDIFY_Test Deadlocked threads are not always
      detected
    + JDK-8208623: [TESTBUG] runtime/LoadClass/LongBCP.java fails
      in AUFS file system
    + JDK-8208699: remove unneeded imports from runtime tests
    + JDK-8208704: runtime/appcds/MultiReleaseJars.java timed out
      often in hs-tier7 testing
    + JDK-8208705: [TESTBUG] The -Xlog:cds,cds+hashtables vm option
      is not always required for appcds tests
    + JDK-8209549: remove VMPropsExt from TEST.ROOT
    + JDK-8209595: MonitorVmStartTerminate.java timed out
    + JDK-8209946: [TESTBUG] CDS tests should use '@run driver'
    + JDK-8211438: [Testbug] runtime/XCheckJniJsig/XCheckJSig.java
      looks for libjsig in wrong location
    + JDK-8211978: Move  testlibrary/jdk/testlibrary/
      /SimpleSSLContext.java and testkeys to network testlibrary
    + JDK-8213622: Windows VS2013 build failure - ''snprintf':
      identifier not found'
    + JDK-8213926: WB_EnqueueInitializerForCompilation requests
      compilation for NULL
    + JDK-8213927: G1 ignores AlwaysPreTouch when
      UseTransparentHugePages is enabled
    + JDK-8214908: add ctw tests for jdk.jfr and jdk.management.jfr
      modules
    + JDK-8214915: CtwRunner misses export for jdk.internal.access
    + JDK-8216408: XMLStreamWriter setDefaultNamespace(null) throws
      NullPointerException
    + JDK-8217475: Unexpected StackOverflowError in 'process
      reaper' thread
    + JDK-8218754: JDK-8068225 regression in JDIBreakpointTest
    + JDK-8219475: javap man page needs to be updated
    + JDK-8219585: [TESTBUG] sun/management/jmxremote/bootstrap/
      /JMXInterfaceBindingTest.java passes trivially when it
      shouldn't
    + JDK-8219612: [TESTBUG] compiler.codecache.stress.Helper
      .TestCaseImpl can't be defined in different runtime package as
      its nest host
    + JDK-8225471: Test utility  jdk.test.lib.util.FileUtils
      .areAllMountPointsAccessible needs to tolerate duplicates
    + JDK-8226706: (se) Reduce the number of outer loop iterations
      on Windows in java/nio/channels/Selector/RacyDeregister.java
    + JDK-8226905: unproblem list applications/ctw/modules/* tests
      on windows
    + JDK-8226910: make it possible to use jtreg's -match via
      run-test framework
    + JDK-8227438: [TESTLIB] Determine if file exists by
      Files.exists in function FileUtils.deleteFileIfExistsWithRetry
    + JDK-8231585: java/lang/management/ThreadMXBean/
      /MaxDepthForThreadInfoTest.java fails with
      java.lang.NullPointerException
    + JDK-8232839: JDI AfterThreadDeathTest.java failed due to
      'FAILED: Did not get expected IllegalThreadStateException on a
      StepRequest.enable()'
    + JDK-8233453: MLVM deoptimize stress test timed out
    + JDK-8234309: LFGarbageCollectedTest.java fails with parse
      Exception
    + JDK-8237222: [macos] java/awt/Focus/UnaccessibleChoice/
      /AccessibleChoiceTest.java fails
    + JDK-8237777: 'Dumping core ...' is shown despite claiming
      that '# No core dump will be written.'
    + JDK-8237834: com/sun/jndi/ldap/LdapDnsProviderTest.java
      failing with LDAP response read timeout
    + JDK-8238274: (sctp) JDK-7118373 is not fixed for SctpChannel
    + JDK-8239801: [macos] java/awt/Focus/UnaccessibleChoice/
      /AccessibleChoiceTest.java fails
    + JDK-8244679: JVM/TI GetCurrentContendedMonitor/contmon001
      failed due to '(IsSameObject#3) unexpected monitor object:
      0x000000562336DBA8'
    + JDK-8246222: Rename javac test T6395981.java to be more
      informative
    + JDK-8247818: GCC 10 warning stringop-overflow with symbol code
    + JDK-8249087: Always initialize _body[0..1] in Symbol
      constructor
    + JDK-8251349: Add TestCaseImpl to
      OverloadCompileQueueTest.java's build dependencies
    + JDK-8251904: vmTestbase/nsk/sysdict/vm/stress/btree/btree010/
      /btree010.java fails with ClassNotFoundException:
      nsk.sysdict.share.BTree0LLRLRLRRLR
    + JDK-8253543: sanity/client/SwingSet/src/
      /ButtonDemoScreenshotTest.java failed with 'AssertionError:
      All pixels are not black'
    + JDK-8253739: java/awt/image/MultiResolutionImage/
      /MultiResolutionImageObserverTest.java fails
    + JDK-8253820: Save test images and dumps with timestamps from
      client sanity suite
    + JDK-8255277: randomDelay in DrainDeadlockT and
      LoggingDeadlock do not randomly delay
    + JDK-8255546: Missing coverage for
      javax.smartcardio.CardPermission and ResponseAPDU
    + JDK-8255743: Relax SIGFPE match in in
      runtime/ErrorHandling/SecondaryErrorTest.java
    + JDK-8257505: nsk/share/test/StressOptions stressTime is
      scaled in getter but not when printed
    + JDK-8259801: Enable XML Signature secure validation mode by
      default
    + JDK-8264135: UnsafeGetStableArrayElement should account for
      different JIT implementation details
    + JDK-8265349: vmTestbase/../stress/compiler/deoptimize/
      /Test.java fails with OOME due to CodeCache exhaustion.
    + JDK-8269025: jsig/Testjsig.java doesn't check exit code
    + JDK-8269077: TestSystemGC uses 'require vm.gc.G1' for large
      pages subtest
    + JDK-8271094: runtime/duplAttributes/DuplAttributesTest.java
      doesn't check exit code
    + JDK-8271224: runtime/EnclosingMethodAttr/EnclMethodAttr.java
      doesn't check exit code
    + JDK-8271828: mark hotspot runtime/classFileParserBug tests
      which ignore external VM flags
    + JDK-8271829: mark hotspot runtime/Throwable tests which
      ignore external VM flags
    + JDK-8271890: mark hotspot runtime/Dictionary tests which
      ignore external VM flags
    + JDK-8272291: mark hotspot runtime/logging tests which ignore
      external VM flags
    + JDK-8272335: runtime/cds/appcds/MoveJDKTest.java doesn't
      check exit codes
    + JDK-8272551: mark hotspot runtime/modules tests which ignore
      external VM flags
    + JDK-8272552: mark hotspot runtime/cds tests which ignore
      external VM flags
    + JDK-8273803: Zero: Handle 'zero' variant in
      CommandLineOptionTest.java
    + JDK-8274122: java/io/File/createTempFile/SpecialTempFile.java
      fails in Windows 11
    + JDK-8274621: NullPointerException because listenAddress[0] is
      null
    + JDK-8276796: gc/TestSystemGC.java large pages subtest fails
      with ZGC
    + JDK-8280007: Enable Neoverse N1 optimizations for Arm
      Neoverse V1 &amp; N2
    + JDK-8281149: (fs) java/nio/file/FileStore/Basic.java  fails
      with java.lang.RuntimeException: values differ by more than
      1GB
    + JDK-8281377: Remove vmTestbase/nsk/monitoring/ThreadMXBean/
      /ThreadInfo/Deadlock/JavaDeadlock001/TestDescription.java
      from problemlist.
    + JDK-8281717: Cover logout method for several LoginModule
    + JDK-8282665: [REDO] ByteBufferTest.java: replace endless
      recursion with RuntimeException in void ck(double x, double y)
    + JDK-8284090: com/sun/security/auth/module/AllPlatforms.java
      fails to compile
    + JDK-8285756: clean up use of bad arguments for `@clean` in
      langtools tests
    + JDK-8285785: CheckCleanerBound test fails with
      PasswordCallback object is not released
    + JDK-8285867: Convert applet manual tests
      SelectionVisible.java to Frame and automate
    + JDK-8286846: test/jdk/javax/swing/plaf/aqua/
      /CustomComboBoxFocusTest.java fails on mac aarch64
    + JDK-8286969: Add a new test library API to execute kinit in
      SecurityTools.java
    + JDK-8287113: JFR: Periodic task thread uses period for method
      sampling events
    + JDK-8289511: Improve test coverage for XPath Axes: child
    + JDK-8289764: gc/lock tests failed with 'OutOfMemoryError:
      Java heap space: failed reallocation of scalar replaced
      objects'
    + JDK-8289948: Improve test coverage for XPath functions: Node
      Set Functions
    + JDK-8290399: [macos] Aqua LAF does not fire an action event
      if combo box menu is displayed
    + JDK-8290909: MemoryPoolMBean/isUsageThresholdExceeded tests
      failed with 'isUsageThresholdExceeded() returned false, and is
      still false, while threshold = MMMMMMM and used peak = NNNNNNN'
    + JDK-8292182: [TESTLIB] Enhance JAXPPolicyManager to setup
      required permissions for jtreg version 7 jar
    + JDK-8292946: GC lock/jni/jnilock001 test failed
      'assert(gch-&gt;gc_cause() == GCCause::_scavenge_alot ||
      !gch-&gt;incremental_collection_failed()) failed: Twice in a row'
    + JDK-8293819: sun/util/logging/PlatformLoggerTest.java failed
      with 'RuntimeException: Retrieved backing PlatformLogger level
      null is not the expected CONFIG'
    + JDK-8294158: HTML formatting for PassFailJFrame instructions
    + JDK-8294254: [macOS] javax/swing/plaf/aqua/
      /CustomComboBoxFocusTest.java failure
    + JDK-8294402: Add diagnostic logging to
      VMProps.checkDockerSupport
    + JDK-8294535: Add screen capture functionality to
      PassFailJFrame
    + JDK-8296083: javax/swing/JTree/6263446/bug6263446.java fails
      intermittently on a VM
    + JDK-8296384: [TESTBUG] sun/security/provider/SecureRandom/
      /AbstractDrbg/SpecTest.java intermittently timeout
    + JDK-8299494: Test vmTestbase/nsk/stress/except/except011.java
      failed: ExceptionInInitializerError: target class not found
    + JDK-8300269: The selected item in an editable JComboBox with
      titled border is not visible in Aqua LAF
    + JDK-8300727: java/awt/List/ListGarbageCollectionTest/
      /AwtListGarbageCollectionTest.java failed with 'List wasn't
      garbage collected'
    + JDK-8301310: The SendRawSysexMessage test may cause a JVM
      crash
    + JDK-8301377: adjust timeout for JLI
      GetObjectSizeIntrinsicsTest.java subtest again
    + JDK-8301846: Invalid TargetDataLine after screen lock when
      using JFileChooser or COM library
    + JDK-8302017: Allocate BadPaddingException only if it will be
      thrown
    + JDK-8302109: Trivial fixes to btree tests
    + JDK-8302149: Speed up
      compiler/jsr292/methodHandleExceptions/TestAMEnotNPE.java
    + JDK-8302607: increase timeout for
      ContinuousCallSiteTargetChange.java
    + JDK-8304074: [JMX] Add an approximation of total bytes
      allocated on the Java heap by the JVM
    + JDK-8304314: StackWalkTest.java fails after CODETOOLS-7903373
    + JDK-8304725: AsyncGetCallTrace can cause SIGBUS on M1
    + JDK-8305502: adjust timeouts in three more M&amp;M tests
    + JDK-8305505: NPE in javazic compiler
    + JDK-8305972: Update XML Security for Java to 3.0.2
    + JDK-8306072: Open source several AWT MouseInfo related tests
    + JDK-8306076: Open source AWT misc tests
    + JDK-8306409: Open source AWT KeyBoardFocusManger,
      LightWeightComponent related tests
    + JDK-8306640: Open source several AWT TextArea related tests
    + JDK-8306652: Open source AWT MenuItem related tests
    + JDK-8306681: Open source more AWT DnD related tests
    + JDK-8306683: Open source several clipboard and color AWT tests
    + JDK-8306752: Open source several container and component AWT
      tests
    + JDK-8306753: Open source several container AWT tests
    + JDK-8306755: Open source few Swing JComponent and
      AbstractButton tests
    + JDK-8306812: Open source several AWT Miscellaneous tests
    + JDK-8306871: Open source more AWT Drag &amp; Drop tests
    + JDK-8306996: Open source Swing MenuItem related tests
    + JDK-8307123: Fix deprecation warnings in DPrinter
    + JDK-8307130: Open source few Swing JMenu tests
    + JDK-8307299: Move more DnD tests to open
    + JDK-8307311: Timeouts on one macOS 12.6.1 host of two Swing
      JTableHeader tests
    + JDK-8307381: Open Source JFrame, JIF related Swing Tests
    + JDK-8307683: Loop Predication should not hoist range checks
      with trap on success projection by negating their condition
    + JDK-8308043: Deadlock in TestCSLocker.java due to blocking GC
      while allocating
    + JDK-8308116: jdk.test.lib.compiler.InMemoryJavaCompiler
      .compile does not close files
    + JDK-8308223: failure handler missed jcmd.vm.info command
    + JDK-8308232: nsk/jdb tests don't pass -verbose flag to the
      debuggee
    + JDK-8308245: Add -proc:full to describe current default
      annotation processing policy
    + JDK-8308336: Test java/net/HttpURLConnection/
      /HttpURLConnectionExpectContinueTest.java failed:
      java.net.BindException: Address already in use
    + JDK-8309104: [JVMCI] compiler/unsafe/
      /UnsafeGetStableArrayElement test asserts wrong values with
      Graal
    + JDK-8309119: [17u/11u] Redo JDK-8297951: C2: Create skeleton
      predicates for all If nodes in loop predication
    + JDK-8309462: [AIX] vmTestbase/nsk/jvmti/RunAgentThread/
      /agentthr001/TestDescription.java crashing due to empty while
      loop
    + JDK-8309778: java/nio/file/Files/CopyAndMove.java fails when
      using second test directory
    + JDK-8309870: Using -proc:full should be considered requesting
      explicit annotation processing
    + JDK-8310106: sun.security.ssl.SSLHandshake
      .getHandshakeProducer() incorrectly checks handshakeConsumers
    + JDK-8310238: [test bug] javax/swing/JTableHeader/6889007/
      /bug6889007.java fails
    + JDK-8310551: vmTestbase/nsk/jdb/interrupt/interrupt001/
      /interrupt001.java timed out due to missing prompt
    + JDK-8310807: java/nio/channels/DatagramChannel/Connect.java
      timed out
    + JDK-8311081: KeytoolReaderP12Test.java fail on localized
      Windows platform
    + JDK-8311511: Improve description of NativeLibrary JFR event
    + JDK-8311585: Add JRadioButtonMenuItem to bug8031573.java
    + JDK-8313081: MonitoringSupport_lock should be unconditionally
      initialized after 8304074
    + JDK-8313082: Enable CreateCoredumpOnCrash for testing in
      makefiles
    + JDK-8313164: src/java.desktop/windows/native/libawt/windows/
      /awt_Robot.cpp GetRGBPixels adjust releasing of resources
    + JDK-8313252: Java_sun_awt_windows_ThemeReader_paintBackground
      release resources in early returns
    + JDK-8313643: Update HarfBuzz to 8.2.2
    + JDK-8313816: Accessing jmethodID might lead to spurious
      crashes
    + JDK-8314144: gc/g1/ihop/TestIHOPStatic.java fails due to
      extra concurrent mark with -Xcomp
    + JDK-8314164: java/net/HttpURLConnection/
      /HttpURLConnectionExpectContinueTest.java fails intermittently
      in timeout
    + JDK-8314883:
      Java_java_util_prefs_FileSystemPreferences_lockFile0 write
      result errno in missing case
    + JDK-8315034: File.mkdirs() occasionally fails to create
      folders on Windows shared folder
    + JDK-8315042: NPE in PKCS7.parseOldSignedData
    + JDK-8315415: OutputAnalyzer.shouldMatchByLine() fails in some
      cases
    + JDK-8315499: build using devkit on Linux ppc64le RHEL puts
      path to devkit into libsplashscreen
    + JDK-8315594: Open source few headless Swing misc tests
    + JDK-8315600: Open source few more headless Swing misc tests
    + JDK-8315602: Open source swing security manager test
    + JDK-8315606: Open source few swing text/html tests
    + JDK-8315611: Open source swing text/html and tree test
    + JDK-8315680: java/lang/ref/ReachabilityFenceTest.java should
      run with -Xbatch
    + JDK-8315731: Open source several Swing Text related tests
    + JDK-8315761: Open source few swing JList and JMenuBar tests
    + JDK-8315986: [macos14] javax/swing/JMenuItem/4654927/
      /bug4654927.java: component must be showing on the screen to
      determine its location
    + JDK-8316001: GC: Make TestArrayAllocatorMallocLimit use
      createTestJvm
    + JDK-8316028: Update FreeType to 2.13.2
    + JDK-8316030: Update Libpng to 1.6.40
    + JDK-8316106: Open source few swing JInternalFrame and
      JMenuBar tests
    + JDK-8316461: Fix: make test outputs TEST SUCCESS after
      unsuccessful exit
    + JDK-8316947: Write a test to check textArea triggers
      MouseEntered/MouseExited events properly
    + JDK-8317307: test/jdk/com/sun/jndi/ldap/
      /LdapPoolTimeoutTest.java fails with ConnectException:
      Connection timed out: no further information
    + JDK-8317327: Remove JT_JAVA dead code in jib-profiles.js
    + JDK-8318154: Improve stability of WheelModifier.java test
    + JDK-8318410: jdk/java/lang/instrument/BootClassPath/
      /BootClassPathTest.sh fails on Japanese Windows
    + JDK-8318468: compiler/tiered/LevelTransitionTest.java fails
      with -XX:CompileThreshold=100 -XX:TieredStopAtLevel=1
    + JDK-8318603: Parallelize sun/java2d/marlin/ClipShapeTest.java
    + JDK-8318607: Enable parallelism in vmTestbase/nsk/stress/jni
      tests
    + JDK-8318608: Enable parallelism in
      vmTestbase/nsk/stress/threads tests
    + JDK-8318736: com/sun/jdi/JdwpOnThrowTest.java failed with
      'transport error 202: bind failed: Address already in use'
    + JDK-8318889: C2: add bailout after assert Bad graph detected
      in build_loop_late
    + JDK-8318951: Additional negative value check in JPEG decoding
    + JDK-8318955: Add ReleaseIntArrayElements in
      Java_sun_awt_X11_XlibWrapper_SetBitmapShape XlbWrapper.c to
      early return
    + JDK-8318971: Better Error Handling for Jar Tool When
      Processing Non-existent Files
    + JDK-8318983: Fix comment typo in PKCS12Passwd.java
    + JDK-8319124: Update XML Security for Java to 3.0.3
    + JDK-8319456: jdk/jfr/event/gc/collection/
      /TestGCCauseWith[Serial|Parallel].java : GC cause 'GCLocker
      Initiated GC' not in the valid causes
    + JDK-8319668: Fixup of jar filename typo in BadFactoryTest.sh
    + JDK-8320001: javac crashes while adding type annotations to
      the return type of a constructor
    + JDK-8320208: Update Public Suffix List to b5bf572
    + JDK-8320363: ppc64 TypeEntries::type_unknown logic looks
      wrong, missed optimization opportunity
    + JDK-8320597: RSA signature verification fails on signed data
      that does not encode params correctly
    + JDK-8320798: Console read line with zero out should zero out
      underlying buffer
    + JDK-8320884: Bump update version for OpenJDK: jdk-11.0.23
    + JDK-8320937: support latest VS2022 MSC_VER in
      abstract_vm_version.cpp
    + JDK-8321151: JDK-8294427 breaks Windows L&amp;F on all older
      Windows versions
    + JDK-8321215: Incorrect x86 instruction encoding for VSIB
      addressing mode
    + JDK-8321408: Add Certainly roots R1 and E1
    + JDK-8321480: ISO 4217 Amendment 176 Update
    + JDK-8322178: Error. can't find jdk.testlibrary
      .SimpleSSLContext in test directory or libraries
    + JDK-8322417: Console read line with zero out should zero out
      when throwing exception
    + JDK-8322725: (tz) Update Timezone Data to 2023d
    + JDK-8322750: Test 'api/java_awt/interactive/
      /SystemTrayTests.html' failed because A blue ball icon is
      added outside of the system tray
    + JDK-8322752: [11u] GetStackTraceAndRetransformTest.java is
      failing assert
    + JDK-8322772: Clean up code after JDK-8322417
    + JDK-8323008: filter out harmful -std* flags added by autoconf
      from CXX
    + JDK-8323243: JNI invocation of an abstract instance method
      corrupts the stack
    + JDK-8323515: Create test alias 'all' for all test roots
    + JDK-8323640: [TESTBUG]testMemoryFailCount in jdk/internal/
      /platform/docker/TestDockerMemoryMetrics.java always fail
      because OOM killed
    + JDK-8324184: Windows VS2010 build failed with 'error C2275:
      'int64_t''
    + JDK-8324307: [11u] hotspot fails to build with GCC 12 and
      newer (non-static data member initializers)
    + JDK-8324347: Enable 'maybe-uninitialized' warning for
      FreeType 2.13.1
    + JDK-8324659: GHA: Generic jtreg errors are not reported
    + JDK-8325096: Test java/security/cert/CertPathBuilder/akiExt/
      /AKISerialNumber.java is failing
    + JDK-8325150: (tz) Update Timezone Data to 2024a
    + JDK-8326109: GCC 13 reports maybe-uninitialized warnings for
      jni.cpp with dtrace enabled
    + JDK-8326503: [11u] java/net/HttpURLConnection/
      /HttpURLConnectionExpectContinueTest.java fail because of
      package org.junit.jupiter.api does not exist
    + JDK-8327391: Add SipHash attribution file
    + JDK-8329837: [11u] Remove designator
      DEFAULT_PROMOTED_VERSION_PRE=ea for release 11.0.23

- Removed the possibility to use the system timezone-java (bsc#1213470)

		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-06"/>
	<updated date="2024-05-06"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1213470">SUSE bug 1213470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222979">SUSE bug 1222979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222983">SUSE bug 1222983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222984">SUSE bug 1222984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222986">SUSE bug 1222986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222987">SUSE bug 1222987</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21012/">CVE-2024-21012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21012">CVE-2024-21012 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21085/">CVE-2024-21085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21085">CVE-2024-21085 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21094/">CVE-2024-21094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21094">CVE-2024-21094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858930" comment="java-11-openjdk-11.0.23.0-150000.3.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858931" comment="java-11-openjdk-demo-11.0.23.0-150000.3.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858932" comment="java-11-openjdk-devel-11.0.23.0-150000.3.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858933" comment="java-11-openjdk-headless-11.0.23.0-150000.3.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858934" comment="java-11-openjdk-javadoc-11.0.23.0-150000.3.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858935" comment="java-11-openjdk-jmods-11.0.23.0-150000.3.113.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858936" comment="java-11-openjdk-src-11.0.23.0-150000.3.113.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4691" version="1" class="patch">
	<metadata>
		<title>Security update for java-17-openjdk (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213470" ref_url="https://bugzilla.suse.com/1213470" source="BUGZILLA"/>
		<reference ref_id="1222979" ref_url="https://bugzilla.suse.com/1222979" source="BUGZILLA"/>
		<reference ref_id="1222983" ref_url="https://bugzilla.suse.com/1222983" source="BUGZILLA"/>
		<reference ref_id="1222986" ref_url="https://bugzilla.suse.com/1222986" source="BUGZILLA"/>
		<reference ref_id="1222987" ref_url="https://bugzilla.suse.com/1222987" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011/" source="CVE"/>
		<reference ref_id="CVE-2024-21012" ref_url="https://www.suse.com/security/cve/CVE-2024-21012/" source="CVE"/>
		<reference ref_id="CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068/" source="CVE"/>
		<reference ref_id="CVE-2024-21094" ref_url="https://www.suse.com/security/cve/CVE-2024-21094/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018448.html" source="SUSE-SU"/>
		<description>
This update for java-17-openjdk fixes the following issues:

- CVE-2024-21011: Fixed denial of service due to long Exception message logging (JDK-8319851,bsc#1222979)
- CVE-2024-21012: Fixed unauthorized data modification due HTTP/2 client improper reverse DNS lookup (JDK-8315708,bsc#1222987)
- CVE-2024-21068: Fixed integer overflow in C1 compiler address generation (JDK-8322122,bsc#1222983)  
- CVE-2024-21094: Fixed unauthorized data modification due to C2 compilation failure with 'Exceeded _node_regs array' (JDK-8317507,JDK-8325348,bsc#1222986)

Other fixes:
- Update to upstream tag jdk-17.0.11+9 (April 2024 CPU)
  * Security fixes
    + JDK-8318340: Improve RSA key implementations
  * Other changes
    + JDK-6928542: Chinese characters in RTF are not decoded
    + JDK-7132796: [macosx] closed/javax/swing/JComboBox/4517214/
      /bug4517214.java fails on MacOS
    + JDK-7148092: [macosx] When Alt+down arrow key is pressed, the
      combobox popup does not appear.
    + JDK-7167356: (javac) investigate failing tests in
      JavacParserTest
    + JDK-8054022: HttpURLConnection timeouts with Expect:
      100-Continue and no chunking
    + JDK-8054572: [macosx] JComboBox paints the border incorrectly
    + JDK-8169475: WheelModifier.java fails by timeout
    + JDK-8205076: [17u] Inet6AddressImpl.c: `lookupIfLocalHost`
      accesses `int InetAddress.preferIPv6Address` as a boolean
    + JDK-8209595: MonitorVmStartTerminate.java timed out
    + JDK-8210410: Refactor java.util.Currency:i18n shell tests to
      plain java tests
    + JDK-8261404: Class.getReflectionFactory() is not thread-safe
    + JDK-8261837: SIGSEGV in ciVirtualCallTypeData::translate_from
    + JDK-8263256: Test java/net/Inet6Address/serialize/
      /Inet6AddressSerializationTest.java fails due to dynamic
      reconfigurations of network interface during test
    + JDK-8269258: java/net/httpclient/ManyRequestsLegacy.java
      failed with connection timeout
    + JDK-8271118: C2: StressGCM should have higher priority than
      frequency-based policy
    + JDK-8271616: oddPart in MutableBigInteger::mutableModInverse
      contains info on final result
    + JDK-8272811: Document the effects of building with
      _GNU_SOURCE in os_posix.hpp
    + JDK-8272853: improve `JavadocTester.runTests`
    + JDK-8273454: C2: Transform (-a)*(-b) into a*b
    + JDK-8274060: C2: Incorrect computation after JDK-8273454
    + JDK-8274122: java/io/File/createTempFile/SpecialTempFile.java
      fails in Windows 11
    + JDK-8274621: NullPointerException because listenAddress[0] is
      null
    + JDK-8274632: Possible pointer overflow in PretouchTask chunk
      claiming
    + JDK-8274634: Use String.equals instead of String.compareTo in
      java.desktop
    + JDK-8276125: RunThese24H.java SIGSEGV in
      JfrThreadGroup::thread_group_id
    + JDK-8278028: [test-library] Warnings cleanup of the test
      library
    + JDK-8278312: Update SimpleSSLContext keystore to use SANs for
      localhost IP addresses
    + JDK-8278363: Create extented container test groups
    + JDK-8280241: (aio) AsynchronousSocketChannel init fails in
      IPv6 only Windows env
    + JDK-8281377: Remove vmTestbase/nsk/monitoring/ThreadMXBean/
      /ThreadInfo/Deadlock/JavaDeadlock001/TestDescription.java from
      problemlist.
    + JDK-8281543: Remove unused code/headerfile dtraceAttacher.hpp
    + JDK-8281585: Remove unused imports under test/lib and jtreg/gc
    + JDK-8283400: [macos] a11y : Screen magnifier does not reflect
      JRadioButton value change
    + JDK-8283626: AArch64: Set relocInfo::offset_unit to 4
    + JDK-8283994: Make Xerces DatatypeException stackless
    + JDK-8286312: Stop mixing signed and unsigned types in bit
      operations
    + JDK-8286846: test/jdk/javax/swing/plaf/aqua/
      /CustomComboBoxFocusTest.java fails on mac aarch64
    + JDK-8287832: jdk/jfr/event/runtime/TestActiveSettingEvent.java
      failed with 'Expected two batches of Active Setting events'
    + JDK-8288663: JFR: Disabling the JfrThreadSampler commits only
      a partially disabled state
    + JDK-8288846: misc tests fail 'assert(ms &lt; 1000) failed:
      Un-interruptable sleep, short time use only'
    + JDK-8289764: gc/lock tests failed with 'OutOfMemoryError:
      Java heap space: failed reallocation of scalar replaced
      objects'
    + JDK-8290041: ModuleDescriptor.hashCode is inconsistent
    + JDK-8290203: ProblemList vmTestbase/nsk/jvmti/scenarios/
      /capability/CM03/cm03t001/TestDescription.java on linux-all
    + JDK-8290399: [macos] Aqua LAF does not fire an action event
      if combo box menu is displayed
    + JDK-8292458: Atomic operations on scoped enums don't build
      with clang
    + JDK-8292946: GC lock/jni/jnilock001 test failed
      'assert(gch-&gt;gc_cause() == GCCause::_scavenge_alot ||
      !gch-&gt;incremental_collection_failed()) failed: Twice in a row'
    + JDK-8293117: Add atomic bitset functions
    + JDK-8293547: Add relaxed add_and_fetch for macos aarch64
      atomics
    + JDK-8294158: HTML formatting for PassFailJFrame instructions
    + JDK-8294254: [macOS] javax/swing/plaf/aqua/
      /CustomComboBoxFocusTest.java failure
    + JDK-8294535: Add screen capture functionality to
      PassFailJFrame
    + JDK-8295068: SSLEngine throws NPE parsing CertificateRequests
    + JDK-8295124: Atomic::add to pointer type may return wrong
      value
    + JDK-8295274: HelidonAppTest.java fails
      'assert(event-&gt;should_commit()) failed: invariant' from
      compiled frame'
    + JDK-8296631: NSS tests failing on OL9 linux-aarch64 hosts
    + JDK-8297968: Crash in PrintOptoAssembly
    + JDK-8298087: XML Schema Validation reports an required
      attribute twice via ErrorHandler
    + JDK-8299494: Test vmTestbase/nsk/stress/except/except011.java
      failed: ExceptionInInitializerError: target class not found
    + JDK-8300269: The selected item in an editable JComboBox with
      titled border is not visible in Aqua LAF
    + JDK-8301306: java/net/httpclient/* fail with -Xcomp
    + JDK-8301310: The SendRawSysexMessage test may cause a JVM
      crash
    + JDK-8301787: java/net/httpclient/SpecialHeadersTest failing
      after JDK-8301306
    + JDK-8301846: Invalid TargetDataLine after screen lock when
      using JFileChooser or COM library
    + JDK-8302017: Allocate BadPaddingException only if it will be
      thrown
    + JDK-8302149: Speed up compiler/jsr292/methodHandleExceptions/
      /TestAMEnotNPE.java
    + JDK-8303605: Memory leaks in Metaspace gtests
    + JDK-8304074: [JMX] Add an approximation of total bytes
      allocated on the Java heap by the JVM
    + JDK-8304696: Duplicate class names in dynamicArchive tests
      can lead to test failure
    + JDK-8305356: Fix ignored bad CompileCommands in tests
    + JDK-8305900: Use loopback IP addresses in security policy
      files of httpclient tests
    + JDK-8305906: HttpClient may use incorrect key when finding
      pooled HTTP/2 connection for IPv6 address
    + JDK-8305962: update jcstress to 0.16
    + JDK-8305972: Update XML Security for Java to 3.0.2
    + JDK-8306014: Update javax.net.ssl TLS tests to use
      SSLContextTemplate or SSLEngineTemplate
    + JDK-8306408: Fix the format of several tables in building.md
    + JDK-8307185: pkcs11 native libraries make JNI calls into java
      code while holding GC lock
    + JDK-8307926: Support byte-sized atomic bitset operations
    + JDK-8307955: Prefer to PTRACE_GETREGSET instead of
      PTRACE_GETREGS in method 'ps_proc.c::process_get_lwp_regs'
    + JDK-8307990: jspawnhelper must close its writing side of a
      pipe before reading from it
    + JDK-8308043: Deadlock in TestCSLocker.java due to blocking GC
      while allocating
    + JDK-8308245: Add -proc:full to describe current default
      annotation processing policy
    + JDK-8308336: Test java/net/HttpURLConnection/
      /HttpURLConnectionExpectContinueTest.java failed:
      java.net.BindException: Address already in use
    + JDK-8309302: java/net/Socket/Timeouts.java fails with
      AssertionError on test temporal post condition
    + JDK-8309305: sun/security/ssl/SSLSocketImpl/
      /BlockedAsyncClose.java fails with jtreg test timeout
    + JDK-8309462: [AIX] vmTestbase/nsk/jvmti/RunAgentThread/
      /agentthr001/TestDescription.java crashing due to empty while
      loop
    + JDK-8309733: [macOS, Accessibility] VoiceOver: Incorrect
      announcements of JRadioButton
    + JDK-8309870: Using -proc:full should be considered requesting
      explicit annotation processing
    + JDK-8310106: sun.security.ssl.SSLHandshake
      .getHandshakeProducer() incorrectly checks handshakeConsumers
    + JDK-8310238: [test bug] javax/swing/JTableHeader/6889007/
      /bug6889007.java fails
    + JDK-8310380: Handle problems in core-related tests on macOS
      when codesign tool does not work
    + JDK-8310631: test/jdk/sun/nio/cs/TestCharsetMapping.java is
      spuriously passing
    + JDK-8310807: java/nio/channels/DatagramChannel/Connect.java
      timed out
    + JDK-8310838: Correct range notations in MethodTypeDesc
      specification
    + JDK-8310844: [AArch64] C1 compilation fails because monitor
      offset in OSR buffer is too large for immediate
    + JDK-8310923: Refactor Currency tests to use JUnit
    + JDK-8311081: KeytoolReaderP12Test.java fail on localized
      Windows platform
    + JDK-8311160: [macOS, Accessibility] VoiceOver: No
      announcements on JRadioButtonMenuItem and JCheckBoxMenuItem
    + JDK-8311581: Remove obsolete code and comments in TestLVT.java
    + JDK-8311645: Memory leak in jspawnhelper spawnChild after
      JDK-8307990
    + JDK-8311986: Disable runtime/os/TestTracePageSizes.java for
      ShenandoahGC
    + JDK-8312428: PKCS11 tests fail with NSS 3.91
    + JDK-8312434: SPECjvm2008/xml.transform with CDS fails with
      'can't seal package nu.xom'
    + JDK-8313081: MonitoringSupport_lock should be unconditionally
      initialized after 8304074
    + JDK-8313082: Enable CreateCoredumpOnCrash for testing in
      makefiles
    + JDK-8313206: PKCS11 tests silently skip execution
    + JDK-8313575: Refactor PKCS11Test tests
    + JDK-8313621: test/jdk/jdk/internal/math/FloatingDecimal/
      /TestFloatingDecimal should use RandomFactory
    + JDK-8313643: Update HarfBuzz to 8.2.2
    + JDK-8313816: Accessing jmethodID might lead to spurious
      crashes
    + JDK-8314164: java/net/HttpURLConnection/
      /HttpURLConnectionExpectContinueTest.java fails intermittently
      in timeout
    + JDK-8314220: Configurable InlineCacheBuffer size
    + JDK-8314830: runtime/ErrorHandling/ tests ignore external VM
      flags
    + JDK-8315034: File.mkdirs() occasionally fails to create
      folders on Windows shared folder
    + JDK-8315042: NPE in PKCS7.parseOldSignedData
    + JDK-8315594: Open source few headless Swing misc tests
    + JDK-8315600: Open source few more headless Swing misc tests
    + JDK-8315602: Open source swing security manager test
    + JDK-8315611: Open source swing text/html and tree test
    + JDK-8315680: java/lang/ref/ReachabilityFenceTest.java should
      run with -Xbatch
    + JDK-8315731: Open source several Swing Text related tests
    + JDK-8315761: Open source few swing JList and JMenuBar tests
    + JDK-8315920: C2: 'control input must dominate current
      control' assert failure
    + JDK-8315986: [macos14] javax/swing/JMenuItem/4654927/
      /bug4654927.java: component must be showing on the screen to
      determine its location
    + JDK-8316001: GC: Make TestArrayAllocatorMallocLimit use
      createTestJvm
    + JDK-8316028: Update FreeType to 2.13.2
    + JDK-8316030: Update Libpng to 1.6.40
    + JDK-8316106: Open source few swing JInternalFrame and
      JMenuBar tests
    + JDK-8316304: (fs) Add support for BasicFileAttributes
      .creationTime() for Linux
    + JDK-8316392: compiler/interpreter/
      /TestVerifyStackAfterDeopt.java failed with SIGBUS in
      PcDescContainer::find_pc_desc_internal
    + JDK-8316414: C2: large byte array clone triggers 'failed:
      malformed control flow' assertion failure on linux-x86
    + JDK-8316415: Parallelize
      sun/security/rsa/SignedObjectChain.java subtests
    + JDK-8316418: containers/docker/TestMemoryWithCgroupV1.java
      get OOM killed with Parallel GC
    + JDK-8316445: Mark com/sun/management/HotSpotDiagnosticMXBean/
      /CheckOrigin.java as vm.flagless
    + JDK-8316679: C2 SuperWord: wrong result, load should not be
      moved before store if not comparable
    + JDK-8316693: Simplify at-requires checkDockerSupport()
    + JDK-8316929: Shenandoah: Shenandoah degenerated GC and full
      GC need to cleanup old OopMapCache entries
    + JDK-8316947: Write a test to check textArea triggers
      MouseEntered/MouseExited events properly
    + JDK-8317039: Enable specifying the JDK used to run jtreg
    + JDK-8317144: Exclude sun/security/pkcs11/sslecc/
      /ClientJSSEServerJSSE.java on Linux ppc64le
    + JDK-8317307: test/jdk/com/sun/jndi/ldap/
      /LdapPoolTimeoutTest.java fails with ConnectException:
      Connection timed out: no further information
    + JDK-8317603: Improve exception messages thrown by
      sun.nio.ch.Net native methods (win)
    + JDK-8317771: [macos14] Expand/collapse a JTree using keyboard
      freezes the application in macOS 14 Sonoma
    + JDK-8317807: JAVA_FLAGS removed from jtreg running in
      JDK-8317039
    + JDK-8317960: [17u] Excessive CPU usage on
      AbstractQueuedSynchronized.isEnqueued
    + JDK-8318154: Improve stability of WheelModifier.java test
    + JDK-8318183: C2: VM may crash after hitting node limit
    + JDK-8318410: jdk/java/lang/instrument/BootClassPath/
      /BootClassPathTest.sh fails on Japanese Windows
    + JDK-8318468: compiler/tiered/LevelTransitionTest.java fails
      with -XX:CompileThreshold=100 -XX:TieredStopAtLevel=1
    + JDK-8318490: Increase timeout for JDK tests that are close to
      the limit when run with libgraal
    + JDK-8318603: Parallelize sun/java2d/marlin/ClipShapeTest.java
    + JDK-8318607: Enable parallelism in vmTestbase/nsk/stress/jni
      tests
    + JDK-8318608: Enable parallelism in
      vmTestbase/nsk/stress/threads tests
    + JDK-8318689: jtreg is confused when folder name is the same
      as the test name
    + JDK-8318736: com/sun/jdi/JdwpOnThrowTest.java failed with
      'transport error 202: bind failed: Address already in use'
    + JDK-8318951: Additional negative value check in JPEG decoding
    + JDK-8318955: Add ReleaseIntArrayElements in
      Java_sun_awt_X11_XlibWrapper_SetBitmapShape XlbWrapper.c to
      early return
    + JDK-8318957: Enhance agentlib:jdwp help output by info about
      allow option
    + JDK-8318961: increase javacserver connection timeout values
      and max retry attempts
    + JDK-8318971: Better Error Handling for Jar Tool When
      Processing Non-existent Files
    + JDK-8318983: Fix comment typo in PKCS12Passwd.java
    + JDK-8319124: Update XML Security for Java to 3.0.3
    + JDK-8319213: Compatibility.java reads both stdout and stderr
      of JdkUtils
    + JDK-8319436: Proxy.newProxyInstance throws NPE if loader is
      null and interface not visible from class loader
    + JDK-8319456: jdk/jfr/event/gc/collection/
      /TestGCCauseWith[Serial|Parallel].java : GC cause 'GCLocker
      Initiated GC' not in the valid causes
    + JDK-8319668: Fixup of jar filename typo in BadFactoryTest.sh
    + JDK-8319922: libCreationTimeHelper.so fails to link in JDK 21
    + JDK-8319961: JvmtiEnvBase doesn't zero _ext_event_callbacks
    + JDK-8320001: javac crashes while adding type annotations to
      the return type of a constructor
    + JDK-8320168: handle setsocktopt return values
    + JDK-8320208: Update Public Suffix List to b5bf572
    + JDK-8320300: Adjust hs_err output in malloc/mmap error cases
    + JDK-8320363: ppc64 TypeEntries::type_unknown logic looks
      wrong, missed optimization opportunity
    + JDK-8320597: RSA signature verification fails on signed data
      that does not encode params correctly
    + JDK-8320798: Console read line with zero out should zero out
      underlying buffer
    + JDK-8320885: Bump update version for OpenJDK: jdk-17.0.11
    + JDK-8320921: GHA: Parallelize hotspot_compiler test jobs
    + JDK-8320937: support latest VS2022 MSC_VER in
      abstract_vm_version.cpp
    + JDK-8321151: JDK-8294427 breaks Windows L&amp;F on all older
      Windows versions
    + JDK-8321215: Incorrect x86 instruction encoding for VSIB
      addressing mode
    + JDK-8321408: Add Certainly roots R1 and E1
    + JDK-8321480: ISO 4217 Amendment 176 Update
    + JDK-8321599: Data loss in AVX3 Base64 decoding
    + JDK-8321815: Shenandoah: gc state should be synchronized to
      java threads only once per safepoint
    + JDK-8321972: test runtime/Unsafe/InternalErrorTest.java
      timeout on linux-riscv64 platform
    + JDK-8322098: os::Linux::print_system_memory_info enhance the
      THP output with
      /sys/kernel/mm/transparent_hugepage/hpage_pmd_size
    + JDK-8322321: Add man page doc for -XX:+VerifySharedSpaces
    + JDK-8322417: Console read line with zero out should zero out
      when throwing exception
    + JDK-8322583: RISC-V: Enable fast class initialization checks
    + JDK-8322725: (tz) Update Timezone Data to 2023d
    + JDK-8322750: Test 'api/java_awt/interactive/
      /SystemTrayTests.html' failed because A blue ball icon is
      added outside of the system tray
    + JDK-8322772: Clean up code after JDK-8322417
    + JDK-8322783: prioritize /etc/os-release over
      /etc/SuSE-release in hs_err/info output
    + JDK-8322968: [17u] Amend Atomics gtest with 1-byte tests
    + JDK-8323008: filter out harmful -std* flags added by autoconf
      from CXX
    + JDK-8323021: Shenandoah: Encountered reference count always
      attributed to first worker thread
    + JDK-8323086: Shenandoah: Heap could be corrupted by oom
      during evacuation
    + JDK-8323243: JNI invocation of an abstract instance method
      corrupts the stack
    + JDK-8323331: fix typo hpage_pdm_size
    + JDK-8323428: Shenandoah: Unused memory in regions compacted
      during a full GC should be mangled
    + JDK-8323515: Create test alias 'all' for all test roots
    + JDK-8323637: Capture hotspot replay files in GHA
    + JDK-8323640: [TESTBUG]testMemoryFailCount in
      jdk/internal/platform/docker/TestDockerMemoryMetrics.java
      always fail because OOM killed
    + JDK-8323806: [17u] VS2017 build fails with warning after
      8293117.
    + JDK-8324184: Windows VS2010 build failed with 'error C2275:
      'int64_t''
    + JDK-8324280: RISC-V: Incorrect implementation in
      VM_Version::parse_satp_mode
    + JDK-8324347: Enable 'maybe-uninitialized' warning for
      FreeType 2.13.1
    + JDK-8324514: ClassLoaderData::print_on should print address
      of class loader
    + JDK-8324647: Invalid test group of lib-test after JDK-8323515
    + JDK-8324659: GHA: Generic jtreg errors are not reported
    + JDK-8324937: GHA: Avoid multiple test suites per job
    + JDK-8325096: Test java/security/cert/CertPathBuilder/akiExt/
      /AKISerialNumber.java is failing
    + JDK-8325150: (tz) Update Timezone Data to 2024a
    + JDK-8325585: Remove no longer necessary calls to
      set/unset-in-asgct flag in JDK 17
    + JDK-8326000: Remove obsolete comments for class
      sun.security.ssl.SunJSSE
    + JDK-8327036: [macosx-aarch64] SIGBUS in
      MarkActivationClosure::do_code_blob reached from
      Unsafe_CopySwapMemory0
    + JDK-8327391: Add SipHash attribution file
    + JDK-8329836: [17u] Remove designator
      DEFAULT_PROMOTED_VERSION_PRE=ea for release 17.0.11

- Removed the possibility to use the system timezone-java (bsc#1213470).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-06"/>
	<updated date="2024-05-06"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1213470">SUSE bug 1213470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222979">SUSE bug 1222979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222983">SUSE bug 1222983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222986">SUSE bug 1222986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222987">SUSE bug 1222987</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21012/">CVE-2024-21012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21012">CVE-2024-21012 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21094/">CVE-2024-21094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21094">CVE-2024-21094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858937" comment="java-17-openjdk-17.0.11.0-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858938" comment="java-17-openjdk-demo-17.0.11.0-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858939" comment="java-17-openjdk-devel-17.0.11.0-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858940" comment="java-17-openjdk-headless-17.0.11.0-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858941" comment="java-17-openjdk-javadoc-17.0.11.0-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858942" comment="java-17-openjdk-jmods-17.0.11.0-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858943" comment="java-17-openjdk-src-17.0.11.0-150400.3.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4692" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1008037" ref_url="https://bugzilla.suse.com/1008037" source="BUGZILLA"/>
		<reference ref_id="1008038" ref_url="https://bugzilla.suse.com/1008038" source="BUGZILLA"/>
		<reference ref_id="1010940" ref_url="https://bugzilla.suse.com/1010940" source="BUGZILLA"/>
		<reference ref_id="1019021" ref_url="https://bugzilla.suse.com/1019021" source="BUGZILLA"/>
		<reference ref_id="1038785" ref_url="https://bugzilla.suse.com/1038785" source="BUGZILLA"/>
		<reference ref_id="1059235" ref_url="https://bugzilla.suse.com/1059235" source="BUGZILLA"/>
		<reference ref_id="1099805" ref_url="https://bugzilla.suse.com/1099805" source="BUGZILLA"/>
		<reference ref_id="1166389" ref_url="https://bugzilla.suse.com/1166389" source="BUGZILLA"/>
		<reference ref_id="1171823" ref_url="https://bugzilla.suse.com/1171823" source="BUGZILLA"/>
		<reference ref_id="1174145" ref_url="https://bugzilla.suse.com/1174145" source="BUGZILLA"/>
		<reference ref_id="1174302" ref_url="https://bugzilla.suse.com/1174302" source="BUGZILLA"/>
		<reference ref_id="1175993" ref_url="https://bugzilla.suse.com/1175993" source="BUGZILLA"/>
		<reference ref_id="1177948" ref_url="https://bugzilla.suse.com/1177948" source="BUGZILLA"/>
		<reference ref_id="1216854" ref_url="https://bugzilla.suse.com/1216854" source="BUGZILLA"/>
		<reference ref_id="1219002" ref_url="https://bugzilla.suse.com/1219002" source="BUGZILLA"/>
		<reference ref_id="1219912" ref_url="https://bugzilla.suse.com/1219912" source="BUGZILLA"/>
		<reference ref_id="1221092" ref_url="https://bugzilla.suse.com/1221092" source="BUGZILLA"/>
		<reference ref_id="1221465" ref_url="https://bugzilla.suse.com/1221465" source="BUGZILLA"/>
		<reference ref_id="1222155" ref_url="https://bugzilla.suse.com/1222155" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-8614" ref_url="https://www.suse.com/security/cve/CVE-2016-8614/" source="CVE"/>
		<reference ref_id="CVE-2016-8628" ref_url="https://www.suse.com/security/cve/CVE-2016-8628/" source="CVE"/>
		<reference ref_id="CVE-2016-8647" ref_url="https://www.suse.com/security/cve/CVE-2016-8647/" source="CVE"/>
		<reference ref_id="CVE-2016-9587" ref_url="https://www.suse.com/security/cve/CVE-2016-9587/" source="CVE"/>
		<reference ref_id="CVE-2017-7550" ref_url="https://www.suse.com/security/cve/CVE-2017-7550/" source="CVE"/>
		<reference ref_id="CVE-2018-10874" ref_url="https://www.suse.com/security/cve/CVE-2018-10874/" source="CVE"/>
		<reference ref_id="CVE-2020-10744" ref_url="https://www.suse.com/security/cve/CVE-2020-10744/" source="CVE"/>
		<reference ref_id="CVE-2020-14330" ref_url="https://www.suse.com/security/cve/CVE-2020-14330/" source="CVE"/>
		<reference ref_id="CVE-2020-14332" ref_url="https://www.suse.com/security/cve/CVE-2020-14332/" source="CVE"/>
		<reference ref_id="CVE-2020-14365" ref_url="https://www.suse.com/security/cve/CVE-2020-14365/" source="CVE"/>
		<reference ref_id="CVE-2020-1753" ref_url="https://www.suse.com/security/cve/CVE-2020-1753/" source="CVE"/>
		<reference ref_id="CVE-2023-5764" ref_url="https://www.suse.com/security/cve/CVE-2023-5764/" source="CVE"/>
		<reference ref_id="CVE-2023-6152" ref_url="https://www.suse.com/security/cve/CVE-2023-6152/" source="CVE"/>
		<reference ref_id="CVE-2024-0690" ref_url="https://www.suse.com/security/cve/CVE-2024-0690/" source="CVE"/>
		<reference ref_id="CVE-2024-1313" ref_url="https://www.suse.com/security/cve/CVE-2024-1313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1509-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035168.html" source="SUSE-SU"/>
		<description>
This update fixes the following issues:

POS_Image-Graphical7 was updated to version 0.1.1710765237.46af599:

- Version 0.1.1710765237.46af599

  * Moved image services to dracut-saltboot package
  * Use salt bundle

- Version 0.1.1645440615.7f1328c

  * Removed deprecated kiwi functions

POS_Image-JeOS7 was updated to version 0.1.1710765237.46af599:

- Version 0.1.1710765237.46af599

  * Moved image services to dracut-saltboot package
  * Use salt bundle

- Version 0.1.1645440615.7f1328c

  * Removed deprecated kiwi functions

ansible received the following fixes:

- Security issues fixed:

  * CVE-2023-5764: Address issues where internal templating can cause unsafe
    variables to lose their unsafe designation (bsc#1216854)

    + Breaking changes:
      assert - Nested templating may result in an inability for the conditional
      to be evaluated. See the porting guide for more information.

  * CVE-2024-0690: Address issue where ANSIBLE_NO_LOG was ignored (bsc#1219002)
  * CVE-2020-14365: Ensure that packages are GPG validated (bsc#1175993)
  * CVE-2020-10744: Fixed insecure temporary directory creation (bsc#1171823)
  * CVE-2018-10874: Fixed inventory variables loading from current working directory when running ad-hoc command that
    can lead to code execution (bsc#1099805)

- Bugs fixed:  

  * Don't Require python-coverage, it is needed only for testing (bsc#1177948)

dracut-saltboot was updated to version 0.1.1710765237.46af599:

- Version 0.1.1710765237.46af599

  * Load only first available leaseinfo (bsc#1221092)

- Version 0.1.1681904360.84ef141

grafana was updated to version 9.5.18:

- Grafana now requires Go 1.20
- Security issues fixed:

  * CVE-2024-1313: Require same organisation when deleting snapshots (bsc#1222155)
  * CVE-2023-6152: Add email verification when updating user email (bsc#1219912)

- Other non-security related changes:

  * Version 9.5.17:

    + [FEATURE] Alerting: Backport use Alertmanager API v2

  * Version 9.5.16:

    + [BUGFIX] Annotations: Split cleanup into separate queries and
      deletes to avoid deadlocks on MySQL

  * Version 9.5.15:

    + [FEATURE] Alerting: Attempt to retry retryable errors

  * Version 9.5.14:

    + [BUGFIX] Alerting: Fix state manager to not keep
      datasource_uid and ref_id labels in state after Error
    + [BUGFIX] Transformations: Config overrides being lost when
      config from query transform is applied
    + [BUGFIX] LDAP: Fix enable users on successfull login

  * Version 9.5.13:

    + [BUGFIX] BrowseDashboards: Only remember the most recent
      expanded folder
    + [BUGFIX] Licensing: Pass func to update env variables when
      starting plugin

  * Version 9.5.12:

    + [FEATURE] Azure: Add support for Workload Identity
      authentication

  * Version 9.5.9:

    + [FEATURE] SSE: Fix DSNode to not panic when response has empty
      response
    + [FEATURE] Prometheus: Handle the response with different field
      key order
    + [BUGFIX] LDAP: Fix user disabling

mgr-daemon was updated to version 4.3.9-0:

- Version 4.3.9-0

  * Update translation strings

spacecmd was updated to version 4.3.27-0:

- Version 4.3.27-0

  * Update translation strings

spacewalk-client-tools was updated to version 4.3.19-0:

- Version 4.3.19-0

  * Update translation strings

spacewalk-koan was updated to version version 4.3.6-0:

- Version 4.3.6-0

  * Change Docker image location for test

uyuni-common-libs was updated to version 4.3.10-0:

- Version 4.3.10-0

  * Add support for package signature type V4 RSA/SHA384
  * Add support for package signature type V4 RSA/SHA512 (bsc#1221465)

uyuni-proxy-systemd-services was updated to version 4.3.12-0:

- Version 4.3.12-0

  * Update to SUSE Manager 4.3.12
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-06"/>
	<updated date="2024-05-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1008037">SUSE bug 1008037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1008038">SUSE bug 1008038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010940">SUSE bug 1010940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1019021">SUSE bug 1019021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1038785">SUSE bug 1038785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059235">SUSE bug 1059235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099805">SUSE bug 1099805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166389">SUSE bug 1166389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171823">SUSE bug 1171823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174145">SUSE bug 1174145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174302">SUSE bug 1174302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175993">SUSE bug 1175993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177948">SUSE bug 1177948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216854">SUSE bug 1216854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219002">SUSE bug 1219002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219912">SUSE bug 1219912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221092">SUSE bug 1221092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221465">SUSE bug 1221465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222155">SUSE bug 1222155</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8614/">CVE-2016-8614 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8614">CVE-2016-8614 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8628/">CVE-2016-8628 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8628">CVE-2016-8628 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-8647/">CVE-2016-8647 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2016-8647">CVE-2016-8647 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-9587/">CVE-2016-9587 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-9587">CVE-2016-9587 at NVD</cve>
	<cve impact="high" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7550/">CVE-2017-7550 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-7550">CVE-2017-7550 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10874/">CVE-2018-10874 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-10874">CVE-2018-10874 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10744/">CVE-2020-10744 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10744">CVE-2020-10744 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14330/">CVE-2020-14330 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14330">CVE-2020-14330 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14332/">CVE-2020-14332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14332">CVE-2020-14332 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14365/">CVE-2020-14365 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-14365">CVE-2020-14365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2020-1753/">CVE-2020-1753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-1753">CVE-2020-1753 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-5764/">CVE-2023-5764 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5764">CVE-2023-5764 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6152/">CVE-2023-6152 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6152">CVE-2023-6152 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0690/">CVE-2024-0690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0690">CVE-2024-0690 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-1313/">CVE-2024-1313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1313">CVE-2024-1313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858944" comment="POS_Image-Graphical7-0.1.1710765237.46af599-150000.1.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858945" comment="POS_Image-JeOS7-0.1.1710765237.46af599-150000.1.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858946" comment="ansible-2.9.27-150000.1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858947" comment="ansible-doc-2.9.27-150000.1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858948" comment="ansible-test-2.9.27-150000.1.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858949" comment="dracut-saltboot-0.1.1710765237.46af599-150000.1.53.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858950" comment="golang-github-prometheus-promu-0.14.0-150000.3.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858951" comment="spacecmd-4.3.27-150000.3.116.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4693" version="1" class="patch">
	<metadata>
		<title>Security update for grafana and mybatis (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219912" ref_url="https://bugzilla.suse.com/1219912" source="BUGZILLA"/>
		<reference ref_id="1222155" ref_url="https://bugzilla.suse.com/1222155" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-6152" ref_url="https://www.suse.com/security/cve/CVE-2023-6152/" source="CVE"/>
		<reference ref_id="CVE-2024-1313" ref_url="https://www.suse.com/security/cve/CVE-2024-1313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1530-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035151.html" source="SUSE-SU"/>
		<description>
This update for grafana and mybatis fixes the following issues:

grafana was updated to version 9.5.18:

- Grafana now requires Go 1.20
- Security issues fixed:

  * CVE-2024-1313: Require same organisation when deleting snapshots (bsc#1222155)
  * CVE-2023-6152: Add email verification when updating user email (bsc#1219912)

- Other non-security related changes:

  * Version 9.5.17:

    + [FEATURE] Alerting: Backport use Alertmanager API v2

  * Version 9.5.16:

    + [BUGFIX] Annotations: Split cleanup into separate queries and
      deletes to avoid deadlocks on MySQL

  * Version 9.5.15:

    + [FEATURE] Alerting: Attempt to retry retryable errors

  * Version 9.5.14:

    + [BUGFIX] Alerting: Fix state manager to not keep
      datasource_uid and ref_id labels in state after Error
    + [BUGFIX] Transformations: Config overrides being lost when
      config from query transform is applied
    + [BUGFIX] LDAP: Fix enable users on successfull login

  * Version 9.5.13:

    + [BUGFIX] BrowseDashboards: Only remember the most recent
      expanded folder
    + [BUGFIX] Licensing: Pass func to update env variables when
      starting plugin

  * Version 9.5.12:

    + [FEATURE] Azure: Add support for Workload Identity
      authentication

  * Version 9.5.9:

    + [FEATURE] SSE: Fix DSNode to not panic when response has empty
      response
    + [FEATURE] Prometheus: Handle the response with different field
      key order
    + [BUGFIX] LDAP: Fix user disabling


mybatis:

- `apache-commons-ognl` is now a non-optional dependency
- Fixed building with log4j v1 and v2 dependencies
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-06"/>
	<updated date="2024-05-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219912">SUSE bug 1219912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222155">SUSE bug 1222155</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6152/">CVE-2023-6152 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6152">CVE-2023-6152 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-1313/">CVE-2024-1313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1313">CVE-2024-1313 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858952" comment="grafana-9.5.18-150200.3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858953" comment="mybatis-3.5.6-150200.5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858954" comment="mybatis-javadoc-3.5.6-150200.5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4694" version="1" class="patch">
	<metadata>
		<title>Security update for flatpak (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223110" ref_url="https://bugzilla.suse.com/1223110" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-32462" ref_url="https://www.suse.com/security/cve/CVE-2024-32462/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1536-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035176.html" source="SUSE-SU"/>
		<description>
This update for flatpak fixes the following issues:

- CVE-2024-32462: Fixed arbitrary code execution outside sandbox via malicious app due to insufficient 'command' argument sanitization (bsc#1223110)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-06"/>
	<updated date="2024-05-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223110">SUSE bug 1223110</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-32462/">CVE-2024-32462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32462">CVE-2024-32462 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009858955" comment="flatpak-1.14.5-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858956" comment="flatpak-devel-1.14.5-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858957" comment="flatpak-remote-flathub-1.14.5-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858958" comment="flatpak-zsh-completion-1.14.5-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858959" comment="libflatpak0-1.14.5-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858960" comment="system-user-flatpak-1.14.5-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009858961" comment="typelib-1_0-Flatpak-1_0-1.14.5-150500.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4695" version="1" class="patch">
	<metadata>
		<title>Security update for bouncycastle (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223252" ref_url="https://bugzilla.suse.com/1223252" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-30171" ref_url="https://www.suse.com/security/cve/CVE-2024-30171/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018474.html" source="SUSE-SU"/>
		<description>
This update for bouncycastle fixes the following issues:

Update to version 1.78.1, including fixes for:

- CVE-2024-30171: Fixed timing side-channel attacks against RSA decryption (both PKCS#1v1.5 and OAEP). (bsc#1223252)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-07"/>
	<updated date="2024-05-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1223252">SUSE bug 1223252</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-30171/">CVE-2024-30171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30171">CVE-2024-30171 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009859183" comment="bouncycastle-1.78.1-150200.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859184" comment="bouncycastle-javadoc-1.78.1-150200.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859185" comment="bouncycastle-jmail-1.78.1-150200.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859186" comment="bouncycastle-mail-1.78.1-150200.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859187" comment="bouncycastle-pg-1.78.1-150200.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859188" comment="bouncycastle-pkix-1.78.1-150200.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859189" comment="bouncycastle-tls-1.78.1-150200.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859190" comment="bouncycastle-util-1.78.1-150200.3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4696" version="1" class="patch">
	<metadata>
		<title>Security update for python311 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1189495" ref_url="https://bugzilla.suse.com/1189495" source="BUGZILLA"/>
		<reference ref_id="1211301" ref_url="https://bugzilla.suse.com/1211301" source="BUGZILLA"/>
		<reference ref_id="1219559" ref_url="https://bugzilla.suse.com/1219559" source="BUGZILLA"/>
		<reference ref_id="1219666" ref_url="https://bugzilla.suse.com/1219666" source="BUGZILLA"/>
		<reference ref_id="1221260" ref_url="https://bugzilla.suse.com/1221260" source="BUGZILLA"/>
		<reference ref_id="1221854" ref_url="https://bugzilla.suse.com/1221854" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<reference ref_id="CVE-2023-6597" ref_url="https://www.suse.com/security/cve/CVE-2023-6597/" source="CVE"/>
		<reference ref_id="CVE-2024-0450" ref_url="https://www.suse.com/security/cve/CVE-2024-0450/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1556-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035199.html" source="SUSE-SU"/>
		<description>
This update for python311 fixes the following issues:

- CVE-2024-0450: Fixed 'quoted-overlap' issue inside the zipfile module (bsc#1221854).
- CVE-2023-6597: Fixed removing tempfile.TemporaryDirectory in some edge cases related to symlinks (bsc#1219666).
- CVE-2023-52425: Fixed denial of service (resource consumption) caused by processing large tokens (bsc#1219559).

Bug fixes:

- Eliminate ResourceWarning which broke the test suite in test_asyncio (bsc#1221260).
- Revert use of %autopatch (bsc#1189495).
- Use the system-wide crypto-policies (bsc#1211301).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-08"/>
	<updated date="2024-05-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189495">SUSE bug 1189495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211301">SUSE bug 1211301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219559">SUSE bug 1219559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219666">SUSE bug 1219666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221260">SUSE bug 1221260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221854">SUSE bug 1221854</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6597/">CVE-2023-6597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6597">CVE-2023-6597 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0450/">CVE-2024-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009859379" comment="libpython3_11-1_0-3.11.9-150400.9.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859380" comment="libpython3_11-1_0-32bit-3.11.9-150400.9.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859381" comment="python311-3.11.9-150400.9.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859382" comment="python311-32bit-3.11.9-150400.9.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859383" comment="python311-base-3.11.9-150400.9.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859384" comment="python311-base-32bit-3.11.9-150400.9.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859385" comment="python311-curses-3.11.9-150400.9.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859386" comment="python311-dbm-3.11.9-150400.9.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859387" comment="python311-devel-3.11.9-150400.9.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859388" comment="python311-doc-3.11.9-150400.9.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859389" comment="python311-doc-devhelp-3.11.9-150400.9.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859390" comment="python311-idle-3.11.9-150400.9.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859391" comment="python311-testsuite-3.11.9-150400.9.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859392" comment="python311-tk-3.11.9-150400.9.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859393" comment="python311-tools-3.11.9-150400.9.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4697" version="1" class="patch">
	<metadata>
		<title>Security update for rpm (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1189495" ref_url="https://bugzilla.suse.com/1189495" source="BUGZILLA"/>
		<reference ref_id="1191175" ref_url="https://bugzilla.suse.com/1191175" source="BUGZILLA"/>
		<reference ref_id="1218686" ref_url="https://bugzilla.suse.com/1218686" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3521" ref_url="https://www.suse.com/security/cve/CVE-2021-3521/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018482.html" source="SUSE-SU"/>
		<description>
This update for rpm fixes the following issues:

Security fixes:
- CVE-2021-3521: Fixed missing subkey binding signature checking (bsc#1191175)

Other fixes:

- accept more signature subpackets marked as critical (bsc#1218686)
- backport limit support for the autopatch macro (bsc#1189495)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-08"/>
	<updated date="2024-05-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189495">SUSE bug 1189495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191175">SUSE bug 1191175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218686">SUSE bug 1218686</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3521/">CVE-2021-3521 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3521">CVE-2021-3521 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009859394" comment="python3-rpm-4.14.3-150400.59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859395" comment="python311-rpm-4.14.3-150400.59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859396" comment="rpm-4.14.3-150400.59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859397" comment="rpm-32bit-4.14.3-150400.59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859398" comment="rpm-build-4.14.3-150400.59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859399" comment="rpm-devel-4.14.3-150400.59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859400" comment="rpm-ndb-4.14.3-150400.59.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859401" comment="rpm-ndb-32bit-4.14.3-150400.59.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4698" version="1" class="patch">
	<metadata>
		<title>Security update for libcryptopp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218222" ref_url="https://bugzilla.suse.com/1218222" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-50981" ref_url="https://www.suse.com/security/cve/CVE-2023-50981/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017688.html" source="SUSE-SU"/>
		<description>
This update for libcryptopp fixes the following issues:

- CVE-2023-50981: Fixed a potential denial of service issue via 
  crafted DER public key data (bsc#1218222).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-18"/>
	<updated date="2024-01-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218222">SUSE bug 1218222</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-50981/">CVE-2023-50981 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50981">CVE-2023-50981 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009818860" comment="libcryptopp-devel-8.6.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818861" comment="libcryptopp8_6_0-8.6.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818862" comment="libcryptopp8_6_0-32bit-8.6.0-150400.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4699" version="1" class="patch">
	<metadata>
		<title>Security update for python-pymongo (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222492" ref_url="https://bugzilla.suse.com/1222492" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21506" ref_url="https://www.suse.com/security/cve/CVE-2024-21506/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035207.html" source="SUSE-SU"/>
		<description>
This update for python-pymongo fixes the following issues:

- CVE-2024-21506: Fixed out-of-bounds read in the BSON module (bsc#1222492)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-09"/>
	<updated date="2024-05-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222492">SUSE bug 1222492</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21506/">CVE-2024-21506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21506">CVE-2024-21506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859633" comment="python3-pymongo-3.11.0-150300.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4700" version="1" class="patch">
	<metadata>
		<title>Security update for sssd (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223100" ref_url="https://bugzilla.suse.com/1223100" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3758" ref_url="https://www.suse.com/security/cve/CVE-2023-3758/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035216.html" source="SUSE-SU"/>
		<description>
This update for sssd fixes the following issues:

- CVE-2023-3758: Fixed race condition during authorization that lead to GPO policies functioning inconsistently (bsc#1223100)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-09"/>
	<updated date="2024-05-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223100">SUSE bug 1223100</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3758/">CVE-2023-3758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-3758">CVE-2023-3758 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009859634" comment="libipa_hbac-devel-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859635" comment="libipa_hbac0-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859636" comment="libnfsidmap-sss-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859637" comment="libsss_certmap-devel-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859638" comment="libsss_certmap0-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859639" comment="libsss_idmap-devel-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859640" comment="libsss_idmap0-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859641" comment="libsss_nss_idmap-devel-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859642" comment="libsss_nss_idmap0-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859643" comment="libsss_simpleifp-devel-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859644" comment="libsss_simpleifp0-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859645" comment="python3-ipa_hbac-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859646" comment="python3-sss-murmur-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859647" comment="python3-sss_nss_idmap-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859648" comment="python3-sssd-config-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859649" comment="sssd-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859650" comment="sssd-ad-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859651" comment="sssd-common-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859652" comment="sssd-common-32bit-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859653" comment="sssd-dbus-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859654" comment="sssd-ipa-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859655" comment="sssd-kcm-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859656" comment="sssd-krb5-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859657" comment="sssd-krb5-common-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859658" comment="sssd-ldap-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859659" comment="sssd-proxy-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859660" comment="sssd-tools-2.5.2-150500.10.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009859661" comment="sssd-winbind-idmap-2.5.2-150500.10.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4701" version="1" class="patch">
	<metadata>
		<title>Security update for perl-Spreadsheet-ParseExcel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218414" ref_url="https://bugzilla.suse.com/1218414" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-7101" ref_url="https://www.suse.com/security/cve/CVE-2023-7101/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017687.html" source="SUSE-SU"/>
		<description>
This update for perl-Spreadsheet-ParseExcel fixes the following issues:

- CVE-2023-7101: Fixed a command injection issue when parsing an
  untrusted spreadsheet (bsc#1218414).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-18"/>
	<updated date="2024-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218414">SUSE bug 1218414</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-7101/">CVE-2023-7101 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7101">CVE-2023-7101 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818425" comment="perl-Spreadsheet-ParseExcel-0.65-150000.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4702" version="1" class="patch">
	<metadata>
		<title>Security update for go1.22 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218424" ref_url="https://bugzilla.suse.com/1218424" source="BUGZILLA"/>
		<reference ref_id="1224017" ref_url="https://bugzilla.suse.com/1224017" source="BUGZILLA"/>
		<reference ref_id="1224018" ref_url="https://bugzilla.suse.com/1224018" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-24787" ref_url="https://www.suse.com/security/cve/CVE-2024-24787/" source="CVE"/>
		<reference ref_id="CVE-2024-24788" ref_url="https://www.suse.com/security/cve/CVE-2024-24788/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018503.html" source="SUSE-SU"/>
		<description>
This update for go1.22 fixes the following issues:

Update to go1.22.3:

- CVE-2024-24787: cmd/go: arbitrary code execution during build on darwin (bsc#1224017)
- CVE-2024-24788: net: high cpu usage in extractExtendedRCode (bsc#1224018)
- cmd/compile: Go 1.22.x failed to be bootstrapped from 386 to ppc64le
- cmd/compile: changing a hot concrete method to interface method triggers a PGO ICE
- runtime: deterministic fallback hashes across process boundary
- net/http: TestRequestLimit/h2 becomes significantly more expensive and slower after x/net@v0.23.0
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-10"/>
	<updated date="2024-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218424">SUSE bug 1218424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224017">SUSE bug 1224017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224018">SUSE bug 1224018</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-24787/">CVE-2024-24787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24787">CVE-2024-24787 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24788/">CVE-2024-24788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24788">CVE-2024-24788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009860179" comment="go1.22-1.22.3-150000.1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860180" comment="go1.22-doc-1.22.3-150000.1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860181" comment="go1.22-race-1.22.3-150000.1.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4703" version="1" class="patch">
	<metadata>
		<title>Security update for go1.21 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="1224017" ref_url="https://bugzilla.suse.com/1224017" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-24787" ref_url="https://www.suse.com/security/cve/CVE-2024-24787/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018502.html" source="SUSE-SU"/>
		<description>
This update for go1.21 fixes the following issues:

Update to go1.21.10:

- CVE-2024-24787: cmd/go: arbitrary code execution during build on darwin (bsc#1224017)
- net/http: TestRequestLimit/h2 becomes significantly more expensive and slower after x/net@v0.23.0
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-10"/>
	<updated date="2024-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224017">SUSE bug 1224017</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-24787/">CVE-2024-24787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24787">CVE-2024-24787 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009860182" comment="go1.21-1.21.10-150000.1.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860183" comment="go1.21-doc-1.21.10-150000.1.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860184" comment="go1.21-race-1.21.10-150000.1.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4704" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223852" ref_url="https://bugzilla.suse.com/1223852" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-52722" ref_url="https://www.suse.com/security/cve/CVE-2023-52722/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018501.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2023-52722: Do not allow eexec seeds other than the Type 1 standard while using SAFER mode (bsc#1223852).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-10"/>
	<updated date="2024-05-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1223852">SUSE bug 1223852</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52722/">CVE-2023-52722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52722">CVE-2023-52722 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009860185" comment="ghostscript-9.52-150000.188.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860186" comment="ghostscript-devel-9.52-150000.188.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860187" comment="ghostscript-x11-9.52-150000.188.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4705" version="1" class="patch">
	<metadata>
		<title>Security update for python-Werkzeug (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223979" ref_url="https://bugzilla.suse.com/1223979" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-34069" ref_url="https://www.suse.com/security/cve/CVE-2024-34069/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018500.html" source="SUSE-SU"/>
		<description>
This update for python-Werkzeug fixes the following issues:

- CVE-2024-34069: Fixed a remote code execution through debugger when interacting with attacker controlled domain (bsc#1223979).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-10"/>
	<updated date="2024-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223979">SUSE bug 1223979</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-34069/">CVE-2024-34069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34069">CVE-2024-34069 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860188" comment="python311-Werkzeug-2.3.6-150400.6.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4706" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg-4 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223256" ref_url="https://bugzilla.suse.com/1223256" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-50010" ref_url="https://www.suse.com/security/cve/CVE-2023-50010/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018499.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg-4 fixes the following issues:

- CVE-2023-50010: Fixed an arbitrary code execution via the set_encoder_id() (bsc#1223256).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-10"/>
	<updated date="2024-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223256">SUSE bug 1223256</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50010/">CVE-2023-50010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-50010">CVE-2023-50010 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009860189" comment="ffmpeg-4-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860190" comment="ffmpeg-4-libavcodec-devel-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860191" comment="ffmpeg-4-libavdevice-devel-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860192" comment="ffmpeg-4-libavfilter-devel-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860193" comment="ffmpeg-4-libavformat-devel-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860194" comment="ffmpeg-4-libavresample-devel-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860195" comment="ffmpeg-4-libavutil-devel-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860196" comment="ffmpeg-4-libpostproc-devel-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860197" comment="ffmpeg-4-libswresample-devel-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860198" comment="ffmpeg-4-libswscale-devel-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860199" comment="ffmpeg-4-private-devel-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860200" comment="libavcodec58_134-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860201" comment="libavcodec58_134-32bit-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860202" comment="libavdevice58_13-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860203" comment="libavdevice58_13-32bit-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860204" comment="libavfilter7_110-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860205" comment="libavfilter7_110-32bit-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860206" comment="libavformat58_76-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860207" comment="libavformat58_76-32bit-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860208" comment="libavresample4_0-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860209" comment="libavresample4_0-32bit-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860210" comment="libavutil56_70-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860211" comment="libavutil56_70-32bit-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860212" comment="libpostproc55_9-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860213" comment="libpostproc55_9-32bit-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860214" comment="libswresample3_9-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860215" comment="libswresample3_9-32bit-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860216" comment="libswscale5_9-4.4-150400.3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860217" comment="libswscale5_9-32bit-4.4-150400.3.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4707" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223256" ref_url="https://bugzilla.suse.com/1223256" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-50010" ref_url="https://www.suse.com/security/cve/CVE-2023-50010/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018498.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg fixes the following issues:

- CVE-2023-50010: Fixed an arbitrary code execution via the set_encoder_id() (bsc#1223256).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-10"/>
	<updated date="2024-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223256">SUSE bug 1223256</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50010/">CVE-2023-50010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-50010">CVE-2023-50010 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009860218" comment="ffmpeg-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860219" comment="ffmpeg-private-devel-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860220" comment="libavcodec-devel-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860221" comment="libavcodec57-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860222" comment="libavcodec57-32bit-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860223" comment="libavdevice-devel-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860224" comment="libavdevice57-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860225" comment="libavdevice57-32bit-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860226" comment="libavfilter-devel-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860227" comment="libavfilter6-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860228" comment="libavfilter6-32bit-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860229" comment="libavformat-devel-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860230" comment="libavformat57-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860231" comment="libavformat57-32bit-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860232" comment="libavresample-devel-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860233" comment="libavresample3-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860234" comment="libavresample3-32bit-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860235" comment="libavutil-devel-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860236" comment="libavutil55-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860237" comment="libavutil55-32bit-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860238" comment="libpostproc-devel-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860239" comment="libpostproc54-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860240" comment="libpostproc54-32bit-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860241" comment="libswresample-devel-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860242" comment="libswresample2-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860243" comment="libswresample2-32bit-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860244" comment="libswscale-devel-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860245" comment="libswscale4-3.4.2-150200.11.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860246" comment="libswscale4-32bit-3.4.2-150200.11.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4708" version="1" class="patch">
	<metadata>
		<title>Security update for less (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222849" ref_url="https://bugzilla.suse.com/1222849" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-32487" ref_url="https://www.suse.com/security/cve/CVE-2024-32487/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1598-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035227.html" source="SUSE-SU"/>
		<description>
This update for less fixes the following issues:

- CVE-2024-32487: Fixed mishandling of \n character in paths when LESSOPEN is set leads to OS command execution. (bsc#1222849)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-10"/>
	<updated date="2024-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222849">SUSE bug 1222849</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32487/">CVE-2024-32487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32487">CVE-2024-32487 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860247" comment="less-590-150400.3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4709" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1179610" ref_url="https://bugzilla.suse.com/1179610" source="BUGZILLA"/>
		<reference ref_id="1183045" ref_url="https://bugzilla.suse.com/1183045" source="BUGZILLA"/>
		<reference ref_id="1211162" ref_url="https://bugzilla.suse.com/1211162" source="BUGZILLA"/>
		<reference ref_id="1211226" ref_url="https://bugzilla.suse.com/1211226" source="BUGZILLA"/>
		<reference ref_id="1212139" ref_url="https://bugzilla.suse.com/1212139" source="BUGZILLA"/>
		<reference ref_id="1212584" ref_url="https://bugzilla.suse.com/1212584" source="BUGZILLA"/>
		<reference ref_id="1214117" ref_url="https://bugzilla.suse.com/1214117" source="BUGZILLA"/>
		<reference ref_id="1214158" ref_url="https://bugzilla.suse.com/1214158" source="BUGZILLA"/>
		<reference ref_id="1214747" ref_url="https://bugzilla.suse.com/1214747" source="BUGZILLA"/>
		<reference ref_id="1214823" ref_url="https://bugzilla.suse.com/1214823" source="BUGZILLA"/>
		<reference ref_id="1215237" ref_url="https://bugzilla.suse.com/1215237" source="BUGZILLA"/>
		<reference ref_id="1215696" ref_url="https://bugzilla.suse.com/1215696" source="BUGZILLA"/>
		<reference ref_id="1215885" ref_url="https://bugzilla.suse.com/1215885" source="BUGZILLA"/>
		<reference ref_id="1215952" ref_url="https://bugzilla.suse.com/1215952" source="BUGZILLA"/>
		<reference ref_id="1216032" ref_url="https://bugzilla.suse.com/1216032" source="BUGZILLA"/>
		<reference ref_id="1216057" ref_url="https://bugzilla.suse.com/1216057" source="BUGZILLA"/>
		<reference ref_id="1216559" ref_url="https://bugzilla.suse.com/1216559" source="BUGZILLA"/>
		<reference ref_id="1216776" ref_url="https://bugzilla.suse.com/1216776" source="BUGZILLA"/>
		<reference ref_id="1217036" ref_url="https://bugzilla.suse.com/1217036" source="BUGZILLA"/>
		<reference ref_id="1217217" ref_url="https://bugzilla.suse.com/1217217" source="BUGZILLA"/>
		<reference ref_id="1217250" ref_url="https://bugzilla.suse.com/1217250" source="BUGZILLA"/>
		<reference ref_id="1217602" ref_url="https://bugzilla.suse.com/1217602" source="BUGZILLA"/>
		<reference ref_id="1217692" ref_url="https://bugzilla.suse.com/1217692" source="BUGZILLA"/>
		<reference ref_id="1217790" ref_url="https://bugzilla.suse.com/1217790" source="BUGZILLA"/>
		<reference ref_id="1217801" ref_url="https://bugzilla.suse.com/1217801" source="BUGZILLA"/>
		<reference ref_id="1217822" ref_url="https://bugzilla.suse.com/1217822" source="BUGZILLA"/>
		<reference ref_id="1217927" ref_url="https://bugzilla.suse.com/1217927" source="BUGZILLA"/>
		<reference ref_id="1217933" ref_url="https://bugzilla.suse.com/1217933" source="BUGZILLA"/>
		<reference ref_id="1217938" ref_url="https://bugzilla.suse.com/1217938" source="BUGZILLA"/>
		<reference ref_id="1217946" ref_url="https://bugzilla.suse.com/1217946" source="BUGZILLA"/>
		<reference ref_id="1217947" ref_url="https://bugzilla.suse.com/1217947" source="BUGZILLA"/>
		<reference ref_id="1217980" ref_url="https://bugzilla.suse.com/1217980" source="BUGZILLA"/>
		<reference ref_id="1217981" ref_url="https://bugzilla.suse.com/1217981" source="BUGZILLA"/>
		<reference ref_id="1217982" ref_url="https://bugzilla.suse.com/1217982" source="BUGZILLA"/>
		<reference ref_id="1218056" ref_url="https://bugzilla.suse.com/1218056" source="BUGZILLA"/>
		<reference ref_id="1218092" ref_url="https://bugzilla.suse.com/1218092" source="BUGZILLA"/>
		<reference ref_id="1218139" ref_url="https://bugzilla.suse.com/1218139" source="BUGZILLA"/>
		<reference ref_id="1218184" ref_url="https://bugzilla.suse.com/1218184" source="BUGZILLA"/>
		<reference ref_id="1218229" ref_url="https://bugzilla.suse.com/1218229" source="BUGZILLA"/>
		<reference ref_id="1218234" ref_url="https://bugzilla.suse.com/1218234" source="BUGZILLA"/>
		<reference ref_id="1218253" ref_url="https://bugzilla.suse.com/1218253" source="BUGZILLA"/>
		<reference ref_id="1218258" ref_url="https://bugzilla.suse.com/1218258" source="BUGZILLA"/>
		<reference ref_id="1218335" ref_url="https://bugzilla.suse.com/1218335" source="BUGZILLA"/>
		<reference ref_id="1218357" ref_url="https://bugzilla.suse.com/1218357" source="BUGZILLA"/>
		<reference ref_id="1218397" ref_url="https://bugzilla.suse.com/1218397" source="BUGZILLA"/>
		<reference ref_id="1218447" ref_url="https://bugzilla.suse.com/1218447" source="BUGZILLA"/>
		<reference ref_id="1218461" ref_url="https://bugzilla.suse.com/1218461" source="BUGZILLA"/>
		<reference ref_id="1218515" ref_url="https://bugzilla.suse.com/1218515" source="BUGZILLA"/>
		<reference ref_id="1218559" ref_url="https://bugzilla.suse.com/1218559" source="BUGZILLA"/>
		<reference ref_id="1218569" ref_url="https://bugzilla.suse.com/1218569" source="BUGZILLA"/>
		<reference ref_id="1218643" ref_url="https://bugzilla.suse.com/1218643" source="BUGZILLA"/>
		<reference ref_id="1218738" ref_url="https://bugzilla.suse.com/1218738" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26555" ref_url="https://www.suse.com/security/cve/CVE-2020-26555/" source="CVE"/>
		<reference ref_id="CVE-2023-51779" ref_url="https://www.suse.com/security/cve/CVE-2023-51779/" source="CVE"/>
		<reference ref_id="CVE-2023-6121" ref_url="https://www.suse.com/security/cve/CVE-2023-6121/" source="CVE"/>
		<reference ref_id="CVE-2023-6531" ref_url="https://www.suse.com/security/cve/CVE-2023-6531/" source="CVE"/>
		<reference ref_id="CVE-2023-6546" ref_url="https://www.suse.com/security/cve/CVE-2023-6546/" source="CVE"/>
		<reference ref_id="CVE-2023-6606" ref_url="https://www.suse.com/security/cve/CVE-2023-6606/" source="CVE"/>
		<reference ref_id="CVE-2023-6610" ref_url="https://www.suse.com/security/cve/CVE-2023-6610/" source="CVE"/>
		<reference ref_id="CVE-2023-6622" ref_url="https://www.suse.com/security/cve/CVE-2023-6622/" source="CVE"/>
		<reference ref_id="CVE-2023-6931" ref_url="https://www.suse.com/security/cve/CVE-2023-6931/" source="CVE"/>
		<reference ref_id="CVE-2023-6932" ref_url="https://www.suse.com/security/cve/CVE-2023-6932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-26555: Fixed Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B that may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN (bsc#1179610 bsc#1215237).
- CVE-2023-51779: Fixed a use-after-free because of a bt_sock_ioctl race condition in bt_sock_recvmsg (bsc#1218559).
- CVE-2023-6121: Fixed an out-of-bounds read vulnerability in the NVMe-oF/TCP subsystem that could lead to information leak (bsc#1217250).
- CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447).
- CVE-2023-6546: Fixed a race condition in the GSM 0710 tty multiplexor via the GSMIOC_SETCONF ioctl that could lead to local privilege escalation (bsc#1218335).
- CVE-2023-6606: Fixed an out-of-bounds read vulnerability in smbCalcSize in fs/smb/client/netmisc.c that could allow a local attacker to crash the system or leak internal kernel information (bsc#1217947).
- CVE-2023-6610: Fixed an out-of-bounds read vulnerability in smb2_dump_detail in fs/smb/client/smb2ops.c that could allow a local attacker to crash the system or leak internal kernel information (bsc#1217946).
- CVE-2023-6622: Fixed a null pointer dereference vulnerability in nft_dynset_init() that could allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service (bsc#1217938).
- CVE-2023-6931: Fixed a heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component that could lead to local privilege escalation. (bsc#1218258).
- CVE-2023-6932: Fixed a use-after-free vulnerability in the Linux kernel's ipv4: igmp component that could lead to local privilege escalation (bsc#1218253).


The following non-security bugs were fixed:

- Documentation: KVM: add separate directories for architecture-specific documentation (jsc#PED-7167).
- Documentation: KVM: update amd-memory-encryption.rst references (jsc#PED-7167).
- Documentation: KVM: update msr.rst reference (jsc#PED-7167).
- Documentation: KVM: update s390-diag.rst reference (jsc#PED-7167).
- Documentation: KVM: update s390-pv.rst reference (jsc#PED-7167).
- Documentation: drop more IDE boot options and ide-cd.rst (git-fixes).
- Documentation: qat: Use code block for qat sysfs example (git-fixes).
- Drop Documentation/ide/ (git-fixes).
- Fix crash in vmw_context_cotables_unref when 3d support is enabled (bsc#1218738)
- Fix crash on screen resize (bsc#1218229)
- Fix drm gem object underflow (bsc#1218092)
- Revert 'PCI/ASPM: Remove pcie_aspm_pm_state_change()' (git-fixes).
- Revert 'PCI: acpiphp: Reassign resources on bridge if necessary' (git-fixes).
- Revert 'md: unlock mddev before reap sync_thread in action_store' (git-fixes).
- Revert 'swiotlb: panic if nslabs is too small' (git-fixes).
- Revert 'xhci: Loosen RPM as default policy to cover for AMD xHC 1.1' (git-fixes).
- Update: drm/vmwgfx: Keep a gem reference to user bos in surfaces
- acpi: video: Add backlight=native DMI quirk for Lenovo Ideapad Z470 (git-fixes).
- acpi: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects (git-fixes).
- acpica: Add AML_NO_OPERAND_RESOLVE flag to Timer (git-fixes).
- afs: Fix afs_server_list to be cleaned up with RCU (git-fixes).
- afs: Fix dynamic root lookup DNS check (git-fixes).
- afs: Fix file locking on R/O volumes to operate in local mode (git-fixes).
- afs: Fix overwriting of result of DNS query (git-fixes).
- afs: Fix refcount underflow from error handling race (git-fixes).
- afs: Fix the dynamic root's d_delete to always delete unused dentries (git-fixes).
- afs: Fix use-after-free due to get/remove race in volume tree (git-fixes).
- afs: Make error on cell lookup failure consistent with OpenAFS (git-fixes).
- afs: Return ENOENT if no cell DNS record can be found (git-fixes).
- alsa: hda - Fix speaker and headset mic pin config for CHUWI CoreBook XPro (git-fixes).
- alsa: hda/hdmi: add force-connect quirk for NUC5CPYB (git-fixes).
- alsa: hda/hdmi: add force-connect quirks for ASUSTeK Z170 variants (git-fixes).
- alsa: hda/realtek: Add Framework laptop 16 to quirks (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS ROG GV302XA (git-fixes).
- alsa: hda/realtek: Add supported ALC257 for ChromeOS (git-fixes).
- alsa: hda/realtek: Apply mute LED quirk for HP15-db (git-fixes).
- alsa: hda/realtek: Enable headset on Lenovo M90 Gen5 (git-fixes).
- alsa: hda/realtek: Fix mute and mic-mute LEDs for HP ProBook 440 G6 (git-fixes).
- alsa: hda/realtek: Headset Mic VREF to 100% (git-fixes).
- alsa: hda/realtek: add new Framework laptop to quirks (git-fixes).
- alsa: hda/realtek: enable SND_PCI_QUIRK for hp pavilion 14-ec1xxx series (git-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs for a HP ZBook (git-fixes).
- alsa: hda/realtek: fix speakers on XPS 9530 (2023) (git-fixes).
- alsa: hda: intel-dsp-cfg: add LunarLake support (git-fixes).
- alsa: pcm: fix out-of-bounds in snd_pcm_state_names (git-fixes).
- alsa: seq: oss: Fix racy open/close of MIDI devices (git-fixes).
- alsa: usb-audio: Add Pioneer DJM-450 mixer controls (git-fixes).
- alsa: usb-audio: Increase delay in MOTU M quirk (git-fixes).
- apparmor: Free up __cleanup() name (jsc#PED-7167).
- arm64: dts: arm: add missing cache properties (git-fixes)
- arm64: dts: imx8mm: Add sound-dai-cells to micfil node (git-fixes)
- arm64: dts: imx8mn: Add sound-dai-cells to micfil node (git-fixes)
- arm64: dts: imx8mq-librem5: Remove dis_u3_susphy_quirk from (git-fixes)
- arm64: kdump: Skip kmemleak scan reserved memory for kdump (jsc#PED-7167).
- arm64: mm: Fix 'rodata=on' when CONFIG_RODATA_FULL_DEFAULT_ENABLED=y (git-fixes)
- arm: OMAP2+: Fix null pointer dereference and memory leak in omap_soc_device_init (git-fixes).
- arm: PL011: Fix DMA support (git-fixes).
- asoc: fsl_rpmsg: Fix error handler with pm_runtime_enable (git-fixes).
- asoc: hdmi-codec: fix missing report for jack initial status (git-fixes).
- asoc: meson: g12a-toacodec: Fix event generation (git-fixes).
- asoc: meson: g12a-toacodec: Validate written enum values (git-fixes).
- asoc: meson: g12a-tohdmitx: Fix event generation for S/PDIF mux (git-fixes).
- asoc: meson: g12a-tohdmitx: Validate written enum values (git-fixes).
- asoc: wm_adsp: fix memleak in wm_adsp_buffer_populate (git-fixes).
- bitmap: unify find_bit operations (jsc#PED-7167).
- block: fix revalidate performance regression (bsc#1216057).
- bluetooth: Fix deadlock in vhci_send_frame (git-fixes).
- bluetooth: L2CAP: Send reject on command corrupted request (git-fixes).
- bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE (git-fixes).
- bluetooth: btusb: Add new PID/VID 0489:e0f2 for MT7921 (bsc#1218461).
- bluetooth: hci_event: Fix not checking if HCI_OP_INQUIRY has been sent (git-fixes).
- bluetooth: hci_event: shut up a false-positive warning (git-fixes).
- bluetooth: hci_qca: Fix the teardown problem for real (git-fixes).
- bnxt: do not handle XDP in netpoll (jsc#PED-1495).
- bnxt_en: Clear resource reservation during resume (jsc#PED-1495).
- bnxt_en: Fix HWTSTAMP_FILTER_ALL packet timestamp logic (jsc#PED-1495).
- bnxt_en: Fix max_mtu setting for multi-buf XDP (jsc#PED-1495).
- bnxt_en: Fix page pool logic for page size &gt;= 64K (jsc#PED-1495).
- bnxt_en: Fix wrong return value check in bnxt_close_nic() (jsc#PED-1495).
- bnxt_en: Flush XDP for bnxt_poll_nitroa0()'s NAPI (jsc#PED-1495).
- bpf: Adjust insufficient default bpf_jit_limit (bsc#1218234 git-fixes).
- bus: ti-sysc: Flush posted write only after srst_udelay (git-fixes).
- ceph: fix incorrect revoked caps assert in ceph_fill_file_size() (bsc#1217980).
- ceph: fix type promotion bug on 32bit systems (bsc#1217982).
- cleanup: Make no_free_ptr() __must_check (jsc#PED-7167).
- clocksource: Add a Kconfig option for WATCHDOG_MAX_SKEW (bsc#1215885 bsc#1217217).
- clocksource: Enable TSC watchdog checking of HPET and PMTMR only when requested (bsc#1215885 bsc#1217217).
- clocksource: Handle negative skews in 'skew is too large' messages (bsc#1215885 bsc#1217217).
- clocksource: Improve 'skew is too large' messages (bsc#1215885 bsc#1217217).
- clocksource: Improve read-back-delay message (bsc#1215885 bsc#1217217).
- clocksource: Loosen clocksource watchdog constraints (bsc#1215885 bsc#1217217).
- clocksource: Print clocksource name when clocksource is tested unstable (bsc#1215885 bsc#1217217).
- clocksource: Verify HPET and PMTMR when TSC unverified (bsc#1215885 bsc#1217217).
- configfs-tsm: Introduce a shared ABI for attestation reports (jsc#PED-7167).
- crypto: ccp - Add SEV_INIT rc error logging on init (jsc#PED-7167).
- crypto: ccp - Add SEV_INIT_EX support (jsc#PED-7167).
- crypto: ccp - Add a header for multiple drivers to use `__psp_pa` (jsc#PED-7167).
- crypto: ccp - Add a quirk to firmware update (jsc#PED-7167).
- crypto: ccp - Add psp_init_on_probe module parameter (jsc#PED-7167).
- crypto: ccp - Drop TEE support for IRQ handler (jsc#PED-7167).
- crypto: ccp - Ensure psp_ret is always init'd in __sev_platform_init_locked() (jsc#PED-7167).
- crypto: ccp - Fail the PSP initialization when writing psp data file failed (jsc#PED-7167).
- crypto: ccp - Fix the INIT_EX data file open failure (jsc#PED-7167).
- crypto: ccp - Fix whitespace in sev_cmd_buffer_len() (jsc#PED-7167).
- crypto: ccp - Flush the SEV-ES TMR memory before giving it to firmware (jsc#PED-7167).
- crypto: ccp - Initialize PSP when reading psp data file failed (jsc#PED-7167).
- crypto: ccp - Log when resetting PSP SEV state (jsc#PED-7167).
- crypto: ccp - Move SEV_INIT retry for corrupted data (jsc#PED-7167).
- crypto: ccp - Move some PSP mailbox bit definitions into common header (jsc#PED-7167).
- crypto: ccp - Name -1 return value as SEV_RET_NO_FW_CALL (jsc#PED-7167).
- crypto: ccp - Refactor out sev_fw_alloc() (jsc#PED-7167).
- crypto: ccp - remove unneeded semicolon (jsc#PED-7167).
- crypto: ccp: Get rid of __sev_platform_init_locked()'s local function pointer (jsc#PED-7167).
- dm verity: initialize fec io before freeing it (git-fixes).
- dm-verity: do not use blocking calls from tasklets (git-fixes).
- dm: add cond_resched() to dm_wq_requeue_work() (git-fixes).
- dm: do not attempt to queue IO under RCU protection (git-fixes).
- dm: fix __send_duplicate_bios() to always allow for splitting IO (bsc#1215952).
- dm: fix improper splitting for abnormal bios (bsc#1215952).
- dm: verity-loadpin: Add NULL pointer check for 'bdev' parameter (git-fixes).
- dm_blk_ioctl: implement path failover for SG_IO (bsc#1183045, bsc#1216776).
- dmaengine: ioat: Free up __cleanup() name (jsc#PED-7167).
- doc/README.SUSE: Add how to update the config for module signing (jsc#PED-5021)
- doc/README.SUSE: Remove how to build modules using kernel-source (jsc#PED-5021)
- doc/README.SUSE: Simplify the list of references (jsc#PED-5021)
- drm/amd/amdgpu: Fix warnings in amdgpu/amdgpu_display.c (git-fixes).
- drm/amdgpu/sdma5.2: add begin/end_use ring callbacks (bsc#1212139).
- drm/amdgpu: Add EEPROM I2C address support for ip discovery (git-fixes).
- drm/amdgpu: Add I2C EEPROM support on smu v13_0_6 (git-fixes).
- drm/amdgpu: Add support for RAS table at 0x40000 (git-fixes).
- drm/amdgpu: Decouple RAS EEPROM addresses from chips (git-fixes).
- drm/amdgpu: Remove redundant I2C EEPROM address (git-fixes).
- drm/amdgpu: Remove second moot switch to set EEPROM I2C address (git-fixes).
- drm/amdgpu: Return from switch early for EEPROM I2C address (git-fixes).
- drm/amdgpu: Update EEPROM I2C address for smu v13_0_0 (git-fixes).
- drm/amdgpu: Update ras eeprom support for smu v13_0_0 and v13_0_10 (git-fixes).
- drm/amdgpu: correct chunk_ptr to a pointer to chunk (git-fixes).
- drm/amdgpu: correct the amdgpu runtime dereference usage count (git-fixes).
- drm/amdgpu: fix tear down order in amdgpu_vm_pt_free (git-fixes).
- drm/amdgpu: simplify amdgpu_ras_eeprom.c (git-fixes).
- drm/bridge: parade-ps8640: Never store more than msg-&gt;size bytes in AUX xfer (git-fixes).
- drm/bridge: ps8640: Fix size mismatch warning w/ len (git-fixes).
- drm/bridge: tc358768: select CONFIG_VIDEOMODE_HELPERS (git-fixes).
- drm/bridge: ti-sn65dsi86: Never store more than msg-&gt;size bytes in AUX xfer (git-fixes).
- drm/i915/display: Drop check for doublescan mode in modevalid (git-fixes).
- drm/i915/dp: Fix passing the correct DPCD_REV for drm_dp_set_phy_test_pattern (git-fixes).
- drm/i915/dpt: Only do the POT stride remap when using DPT (git-fixes).
- drm/i915/lvds: Use REG_BIT() &amp; co (git-fixes).
- drm/i915/mtl: limit second scaler vertical scaling in ver &gt;= 14 (git-fixes).
- drm/i915/sdvo: stop caching has_hdmi_monitor in struct intel_sdvo (git-fixes).
- drm/i915: Fix intel_atomic_setup_scalers() plane_state handling (git-fixes).
- drm/i915: Fix remapped stride with CCS on ADL+ (git-fixes).
- drm/i915: Reject async flips with bigjoiner (git-fixes).
- drm/i915: Relocate intel_atomic_setup_scalers() (git-fixes).
- drm/i915: fix MAX_ORDER usage in i915_gem_object_get_pages_internal() (jsc#PED-7167).
- drm/mediatek: Add spinlock for setting vblank event in atomic_begin (git-fixes).
- drm/mgag200: Fix gamma lut not initialized for G200ER, G200EV, G200SE (git-fixes).
- efi/libstub: Implement support for unaccepted memory (jsc#PED-7167).
- efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory (jsc#PED-7167).
- efi/unaccepted: Fix off-by-one when checking for overlapping ranges (jsc#PED-7167).
- efi/unaccepted: Fix soft lockups caused by parallel memory acceptance (jsc#PED-7167).
- efi/unaccepted: Make sure unaccepted table is mapped (jsc#PED-7167).
- efi/unaccepted: Use ACPI reclaim memory for unaccepted memory table (jsc#PED-7167).
- efi/x86: Get full memory map in allocate_e820() (jsc#PED-7167).
- efi: Add unaccepted memory support (jsc#PED-7167).
- efi: libstub: avoid efi_get_memory_map() for allocating the virt map (jsc#PED-7167).
- efi: libstub: install boot-time memory map as config table (jsc#PED-7167).
- efi: libstub: remove DT dependency from generic stub (jsc#PED-7167).
- efi: libstub: remove pointless goto kludge (jsc#PED-7167).
- efi: libstub: simplify efi_get_memory_map() and struct efi_boot_memmap (jsc#PED-7167).
- efi: libstub: unify initrd loading between architectures (jsc#PED-7167).
- floppy: fix MAX_ORDER usage (jsc#PED-7167).
- fprobe: Fix to ensure the number of active retprobes is not zero (git-fixes).
- fs/jfs: Add check for negative db_l2nbperpage (git-fixes).
- fs/jfs: Add validity check for db_maxag and db_agpref (git-fixes).
- fs/jfs: prevent double-free in dbUnmount() after failed jfs_remount() (git-fixes).
- fs/remap: constrain dedupe of EOF blocks (git-fixes).
- fs: avoid empty option when generating legacy mount string (git-fixes).
- fs: fix an infinite loop in iomap_fiemap (git-fixes).
- fs: ocfs2: namei: check return value of ocfs2_add_entry() (git-fixes).
- genwqe: fix MAX_ORDER usage (jsc#PED-7167).
- gfs2: Add wrapper for iomap_file_buffered_write (git-fixes).
- gfs2: Check sb_bsize_shift after reading superblock (git-fixes).
- gfs2: Clean up function may_grant (git-fixes).
- gfs2: Fix filesystem block deallocation for short writes (git-fixes).
- gfs2: Fix gfs2_release for non-writers regression (git-fixes).
- gfs2: Fix inode height consistency check (git-fixes).
- gfs2: Fix length of holes reported at end-of-file (git-fixes).
- gfs2: Fix possible data races in gfs2_show_options() (git-fixes).
- gfs2: Improve gfs2_make_fs_rw error handling (git-fixes).
- gfs2: Make sure FITRIM minlen is rounded up to fs block size (git-fixes).
- gfs2: Silence 'suspicious RCU usage in gfs2_permission' warning (git-fixes).
- gfs2: Switch from strlcpy to strscpy (git-fixes).
- gfs2: fix an oops in gfs2_permission (git-fixes).
- gfs2: gfs2_setattr_size error path fix (git-fixes).
- gfs2: ignore negated quota changes (git-fixes).
- gfs2: jdata writepage fix (git-fixes).
- gfs2: use i_lock spin_lock for inode qadata (git-fixes).
- gpiolib: sysfs: Fix error handling on failed export (git-fixes).
- gve: Fixes for napi_poll when budget is 0 (git-fixes).
- gve: Use size_add() in call to struct_size() (git-fixes).
- hid: add ALWAYS_POLL quirk for Apple kb (git-fixes).
- hid: glorious: fix Glorious Model I HID report (git-fixes).
- hid: hid-asus: add const to read-only outgoing usb buffer (git-fixes).
- hid: hid-asus: reset the backlight brightness level on resume (git-fixes).
- hid: lenovo: Restrict detection of patched firmware only to USB cptkbd (git-fixes).
- hid: multitouch: Add quirk for HONOR GLO-GXXX touchpad (git-fixes).
- hwmon: (acpi_power_meter) Fix 4.29 MW bug (git-fixes).
- hwmon: (nzxt-kraken2) Fix error handling path in kraken2_probe() (git-fixes).
- i2c: aspeed: Handle the coalesced stop conditions with the start conditions (git-fixes).
- i2c: core: Fix atomic xfer check for non-preempt config (git-fixes).
- i2c: designware: Fix corrupted memory seen in the ISR (git-fixes).
- i40e: Fix I40E_FLAG_VF_VLAN_PRUNING value (jsc#PED-372).
- i40e: Fix VF VLAN offloading when port VLAN is configured (jsc#PED-372).
- i40e: Fix unexpected MFS warning message (jsc#PED-372).
- i40e: Fix wrong check for I40E_TXR_FLAGS_WB_ON_ITR (jsc#PED-372).
- i40e: fix misleading debug logs (jsc#PED-372).
- i40e: fix potential NULL pointer dereferencing of pf-&gt;vf i40e_sync_vsi_filters() (jsc#PED-372).
- i40e: fix potential memory leaks in i40e_remove() (jsc#PED-372).
- i40e: prevent crash on probe if hw registers have invalid values (jsc#PED-372).
- ib/mlx5: Fix init stage error handling to avoid double free of same QP and UAF (git-fixes)
- ib/mlx5: Fix rdma counter binding for RAW QP (git-fixes)
- igb: Avoid starting unnecessary workqueues (jsc#PED-370).
- igb: Change IGB_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-370).
- igb: Fix potential memory leak in igb_add_ethtool_nfc_entry (jsc#PED-370).
- igb: clean up in all error paths when enabling SR-IOV (jsc#PED-370).
- igb: disable virtualization features on 82580 (jsc#PED-370).
- igbvf: Change IGBVF_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-370).
- igc: Change IGC_MIN to allow set rx/tx value between 64 and 80 (jsc#PED-375).
- igc: Expose tx-usecs coalesce setting to user (jsc#PED-375).
- igc: Fix ambiguity in the ethtool advertising (jsc#PED-375).
- igc: Fix infinite initialization loop with early XDP redirect (jsc#PED-375).
- igc: Fix the typo in the PTM Control macro (jsc#PED-375).
- iio: adc: ti_am335x_adc: Fix return value check of tiadc_request_dma() (git-fixes).
- iio: common: ms_sensors: ms_sensors_i2c: fix humidity conversion time table (git-fixes).
- iio: imu: inv_mpu6050: fix an error code problem in inv_mpu6050_read_raw (git-fixes).
- iio: triggered-buffer: prevent possible freeing of wrong buffer (git-fixes).
- input: i8042 - add quirk for TUXEDO Gemini 17 Gen1/Clevo PD70PN (git-fixes).
- input: ipaq-micro-keys - add error handling for devm_kmemdup (git-fixes).
- input: soc_button_array - add mapping for airplane mode button (git-fixes).
- input: xpad - add HyperX Clutch Gladiate Support (git-fixes).
- interconnect: Treat xlate() returning NULL node as an error (git-fixes).
- iomap: Fix iomap_dio_rw return value for user copies (git-fixes).
- iommu: fix MAX_ORDER usage in __iommu_dma_alloc_pages() (jsc#PED-7167).
- iov_iter, x86: Be consistent about the __user tag on copy_mc_to_user() (git-fixes).
- jfs: fix array-index-out-of-bounds in dbFindLeaf (git-fixes).
- jfs: fix array-index-out-of-bounds in diAlloc (git-fixes).
- jfs: fix invalid free of JFS_IP(ipimap)-&gt;i_imap in diUnmount (git-fixes).
- jfs: validate max amount of blocks before allocation (git-fixes).
- kABI: Preserve the type of rethook::handler (git-fixes).
- kABI: restore void return to typec_altmode_attention (git-fixes).
- kabi/severities: ignore kABI for asus-wmi drivers Tolerate the kABI changes, as used only locally for asus-wmi stuff
- kabi/severities: make snp_issue_guest_request PASS (jsc#PED-7167)
- kabi: fix of_reserved_mem_* due to struct vm_struct became defined (jsc#PED-7167).
- kabi: fix sev-dev due to fs_struct became defined (jsc#PED-7167).
- kabi: fix struct efi after adding unaccepted memory table (jsc#PED-7167).
- kabi: fix struct zone kabi after adding unaccepted_pages and NR_UNACCEPTED (jsc#PED-7167).
- kbuild: Drop -Wdeclaration-after-statement (jsc#PED-7167).
- kconfig: fix memory leak from range properties (git-fixes).
- kprobes: consistent rcu api usage for kretprobe holder (git-fixes).
- kvm: arm64: Prevent kmemleak from accessing pKVM memory (jsc#PED-7167).
- kvm: s390/mm: Properly reset no-dat (git-fixes bsc#1218056).
- kvm: s390: vsie: fix wrong VIR 37 when MSO is used (git-fixes bsc#1217933).
- lib/vsprintf: Fix %pfwf when current node refcount == 0 (git-fixes).
- libceph: use kernel_connect() (bsc#1217981).
- locking: Introduce __cleanup() based infrastructure (jsc#PED-7167).
- locks: fix KASAN: use-after-free in trace_event_raw_event_filelock_lock (git-fixes).
- md/bitmap: do not set max_write_behind if there is no write mostly device (git-fixes).
- md/md-bitmap: hold 'reconfig_mutex' in backlog_store() (git-fixes).
- md/md-bitmap: remove unnecessary local variable in backlog_store() (git-fixes).
- md/raid0: add discard support for the 'original' layout (git-fixes).
- md/raid10: do not call bio_start_io_acct twice for bio which experienced read error (git-fixes).
- md/raid10: factor out code from wait_barrier() to stop_waiting_barrier() (git-fixes).
- md/raid10: factor out dereference_rdev_and_rrdev() (git-fixes).
- md/raid10: fix io loss while replacement replace rdev (git-fixes).
- md/raid10: fix leak of 'r10bio-&gt;remaining' for recovery (git-fixes).
- md/raid10: fix memleak for 'conf-&gt;bio_split' (git-fixes).
- md/raid10: fix memleak of md thread (git-fixes).
- md/raid10: fix null-ptr-deref in raid10_sync_request (git-fixes).
- md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request (git-fixes).
- md/raid10: fix overflow of md/safe_mode_delay (git-fixes).
- md/raid10: fix task hung in raid10d (git-fixes).
- md/raid10: fix the condition to call bio_end_io_acct() (git-fixes).
- md/raid10: fix wrong setting of max_corr_read_errors (git-fixes).
- md/raid10: prevent soft lockup while flush writes (git-fixes).
- md/raid10: use dereference_rdev_and_rrdev() to get devices (git-fixes).
- md/raid1: fix error: ISO C90 forbids mixed declarations (git-fixes).
- md/raid1: free the r1bio before waiting for blocked rdev (git-fixes).
- md/raid1: hold the barrier until handle_read_error() finishes (git-fixes).
- md/raid5-cache: fix a deadlock in r5l_exit_log() (git-fixes).
- md/raid5-cache: fix null-ptr-deref for r5l_flush_stripe_to_raid() (git-fixes).
- md/raid5: fix miscalculation of 'end_sector' in raid5_read_one_chunk() (git-fixes).
- md: Put the right device in md_seq_next (bsc#1217822).
- md: Set MD_BROKEN for RAID1 and RAID10 (git-fixes).
- md: avoid signed overflow in slot_store() (git-fixes).
- md: do not update recovery_cp when curr_resync is ACTIVE (git-fixes).
- md: drop queue limitation for RAID1 and RAID10 (git-fixes).
- md: raid0: account for split bio in iostat accounting (git-fixes).
- md: raid10 add nowait support (git-fixes).
- md: raid1: fix potential OOB in raid1_remove_disk() (git-fixes).
- md: restore 'noio_flag' for the last mddev_resume() (git-fixes).
- md: select BLOCK_LEGACY_AUTOLOAD (git-fixes).
- memblock: exclude MEMBLOCK_NOMAP regions from kmemleak (jsc#PED-7167).
- memblock: make memblock_find_in_range method private (jsc#PED-7167).
- misc: mei: client.c: fix problem of return '-EOVERFLOW' in mei_cl_write (git-fixes).
- misc: mei: client.c: return negative error code in mei_cl_write (git-fixes).
- mkspec: Add multibuild support (JSC-SLE#5501, boo#1211226, bsc#1218184) When MULTIBUILD option in config.sh is enabled generate a _multibuild file listing all spec files.
- mm/page_alloc: make deferred page init free pages in MAX_ORDER blocks (jsc#PED-7167).
- mm/pgtable: Fix multiple -Wstringop-overflow warnings (jsc#PED-7167).
- mm/slab: Add __free() support for kvfree (jsc#PED-7167).
- mm/slub: fix MAX_ORDER usage in calculate_order() (jsc#PED-7167).
- mm: Add PAGE_ALIGN_DOWN macro (jsc#PED-7167).
- mm: Add support for unaccepted memory (jsc#PED-7167).
- mm: add pageblock_align() macro (jsc#PED-7167).
- mm: add pageblock_aligned() macro (jsc#PED-7167).
- mm: avoid passing 0 to __ffs() (jsc#PED-7167).
- mm: kmem: drop __GFP_NOFAIL when allocating objcg vectors (bsc#1218515).
- mm: move kvmalloc-related functions to slab.h (jsc#PED-7167).
- mm: new primitive kvmemdup() (jsc#PED-7167).
- mm: reuse pageblock_start/end_pfn() macro (jsc#PED-7167).
- mmc: meson-mx-sdhc: Fix initialization frozen issue (git-fixes).
- mmc: rpmb: fixes pause retune on all RPMB partitions (git-fixes).
- mmc: sdhci-sprd: Fix eMMC init failure after hw reset (git-fixes).
- neighbor: tracing: Move pin6 inside CONFIG_IPV6=y section (git-fixes).
- net/rose: Fix Use-After-Free in rose_ioctl (git-fixes).
- net/smc: Fix pos miscalculation in statistics (bsc#1218139).
- net/tg3: fix race condition in tg3_reset_task() (bsc#1217801).
- net: 9p: avoid freeing uninit memory in p9pdu_vreadf (git-fixes).
- net: bnxt: fix a potential use-after-free in bnxt_init_tc (jsc#PED-1495).
- net: ena: Destroy correct number of xdp queues upon failure (git-fixes).
- net: ena: Fix XDP redirection error (git-fixes).
- net: ena: Fix xdp drops handling due to multibuf packets (git-fixes).
- net: ena: Flush XDP packets on error (git-fixes).
- net: mana: select PAGE_POOL (git-fixes).
- net: rfkill: gpio: set GPIO direction (git-fixes).
- net: usb: ax88179_178a: avoid failed operations when device is disconnected (git-fixes).
- net: usb: ax88179_178a: clean up pm calls (git-fixes).
- net: usb: ax88179_178a: wol optimizations (git-fixes).
- net: usb: qmi_wwan: claim interface 4 for ZTE MF290 (git-fixes).
- nfc: llcp_core: Hold a ref to llcp_local-&gt;dev when holding a ref to llcp_local (git-fixes).
- nfs: Fix O_DIRECT locking issues (bsc#1211162).
- nfs: Fix a few more clear_bit() instances that need release semantics (bsc#1211162).
- nfs: Fix a potential data corruption (bsc#1211162).
- nfs: Fix a use after free in nfs_direct_join_group() (bsc#1211162).
- nfs: Fix error handling for O_DIRECT write scheduling (bsc#1211162).
- nfs: More O_DIRECT accounting fixes for error paths (bsc#1211162).
- nfs: More fixes for nfs_direct_write_reschedule_io() (bsc#1211162).
- nfs: Use the correct commit info in nfs_join_page_group() (bsc#1211162).
- nfs: only issue commit in DIO codepath if we have uncommitted data (bsc#1211162).
- nilfs2: fix missing error check for sb_set_blocksize call (git-fixes).
- nilfs2: prevent WARNING in nilfs_sufile_set_segment_usage() (git-fixes).
- nlm: Defend against file_lock changes after vfs_test_lock() (bsc#1217692).
- null_blk: fix poll request timeout handling (git-fixes).
- nvme-core: check for too small lba shift (bsc#1214117).
- nvme-pci: Add sleep quirk for Kingston drives (git-fixes).
- nvme-pci: always return an ERR_PTR from nvme_pci_alloc_dev (git-fixes).
- nvme-pci: do not set the NUMA node of device if it has none (git-fixes).
- nvme-pci: factor out a nvme_pci_alloc_dev helper (git-fixes).
- nvme-rdma: do not try to stop unallocated queues (git-fixes).
- nvme: sanitize metadata bounce buffer for reads (git-fixes).
- nvmet-auth: complete a request only after freeing the dhchap pointers (git-fixes).
- of: reserved_mem: Have kmemleak ignore dynamically allocated reserved mem (jsc#PED-7167).
- orangefs: Fix kmemleak in orangefs_prepare_debugfs_help_string() (git-fixes).
- orangefs: Fix kmemleak in orangefs_{kernel,client}_debug_init() (git-fixes).
- orangefs: Fix sysfs not cleanup when dev init failed (git-fixes).
- orangefs: Fix the size of a memory allocation in orangefs_bufmap_alloc() (git-fixes).
- padata: Fix refcnt handling in padata_free_shell() (git-fixes).
- parport: Add support for Brainboxes IX/UC/PX parallel cards (git-fixes).
- pci: loongson: Limit MRRS to 256 (git-fixes).
- perf/core: fix MAX_ORDER usage in rb_alloc_aux_page() (jsc#PED-7167).
- pinctrl: at91-pio4: use dedicated lock class for IRQ (git-fixes).
- platform/surface: aggregator: fix recv_buf() return value (git-fixes).
- platform/x86: asus-wmi: Add support for ROG X13 tablet mode (git-fixes).
- platform/x86: asus-wmi: Adjust tablet/lidflip handling to use enum (git-fixes).
- platform/x86: asus-wmi: Fix kbd_dock_devid tablet-switch reporting (git-fixes).
- platform/x86: asus-wmi: Move i8042 filter install to shared asus-wmi code (git-fixes).
- platform/x86: asus-wmi: Simplify tablet-mode-switch handling (git-fixes).
- platform/x86: asus-wmi: Simplify tablet-mode-switch probing (git-fixes).
- platform/x86: wmi: Allow duplicate GUIDs for drivers that use struct wmi_driver (git-fixes).
- platform/x86: wmi: Skip blocks with zero instances (git-fixes).
- powerpc/pseries/vas: Migration suspend waits for no in-progress open windows (bsc#1218397 ltc#204523).
- qed/red_ll2: Fix undefined behavior bug in struct qed_ll2_info (jsc#PED-1526).
- qed: Fix a potential use-after-free in qed_cxt_tables_alloc (jsc#PED-1526).
- qed: fix LL2 RX buffer allocation (jsc#PED-1526).
- qede: fix firmware halt over suspend and resume (jsc#PED-1526).
- qla2xxx: add debug log for deprecated hw detected (bsc#1216032).
- r8152: Add RTL8152_INACCESSIBLE checks to more loops (git-fixes).
- r8152: Add RTL8152_INACCESSIBLE to r8153_aldps_en() (git-fixes).
- r8152: Add RTL8152_INACCESSIBLE to r8153_pre_firmware_1() (git-fixes).
- r8152: Add RTL8152_INACCESSIBLE to r8156b_wait_loading_flash() (git-fixes).
- r8152: Rename RTL8152_UNPLUG to RTL8152_INACCESSIBLE (git-fixes).
- r8169: Fix PCI error on system resume (git-fixes).
- rdma/bnxt_re: Correct module description string (jsc#PED-1495).
- rdma/core: Use size_{add,sub,mul}() in calls to struct_size() (git-fixes)
- rdma/hfi1: Use FIELD_GET() to extract Link Width (git-fixes)
- rdma/hfi1: Workaround truncation compilation error (git-fixes)
- rdma/hns: Add check for SL (git-fixes)
- rdma/hns: Fix printing level of asynchronous events (git-fixes)
- rdma/hns: Fix signed-unsigned mixed comparisons (git-fixes)
- rdma/hns: Fix uninitialized ucmd in hns_roce_create_qp_common() (git-fixes)
- rdma/hns: The UD mode can only be configured with DCQCN (git-fixes)
- regmap: fix bogus error on regcache_sync success (git-fixes).
- reiserfs: Check the return value from __getblk() (git-fixes).
- reiserfs: Replace 1-element array with C99 style flex-array (git-fixes).
- remove unnecessary WARN_ON_ONCE() (bsc#1214823 bsc#1218569).
- reset: Fix crash when freeing non-existent optional resets (git-fixes).
- restore renamed device IDs for USB HID devices (git-fixes).
- rethook: Fix to use WRITE_ONCE() for rethook:: Handler (git-fixes).
- rethook: Use __rcu pointer for rethook::handler (git-fixes).
- ring-buffer: Do not try to put back write_stamp (git-fixes).
- ring-buffer: Do not update before stamp when switching sub-buffers (git-fixes).
- ring-buffer: Fix a race in rb_time_cmpxchg() for 32 bit archs (git-fixes).
- ring-buffer: Fix memory leak of free page (git-fixes).
- ring-buffer: Fix slowpath of interrupted event (git-fixes).
- ring-buffer: Fix wake ups when buffer_percent is set to 100 (git-fixes).
- ring-buffer: Fix writing to the buffer with max_data_size (git-fixes).
- ring-buffer: Force absolute timestamp on discard of event (git-fixes).
- ring-buffer: Have saved event hold the entire event (git-fixes).
- ring-buffer: Remove useless update to write_stamp in rb_try_to_discard() (git-fixes).
- s390/vx: fix save/restore of fpu kernel context (git-fixes bsc#1218357).
- scsi: lpfc: use unsigned type for num_sge (bsc#1214747).
- serial: 8250: 8250_omap: Clear UART_HAS_RHR_IT_DIS bit (git-fixes).
- serial: 8250: 8250_omap: Do not start RX DMA on THRI interrupt (git-fixes).
- serial: sc16is7xx: address RX timeout interrupt errata (git-fixes).
- soundwire: stream: fix NULL pointer dereference for multi_link (git-fixes).
- spi: atmel: Fix clock issue when using devices with different polarities (git-fixes).
- statfs: enforce statfs[64] structure initialization (git-fixes).
- supported.conf: add drivers/virt/coco/tsm (jsc#PED-7167)
- swiotlb: always set the number of areas before allocating the pool (git-fixes).
- swiotlb: do not panic! (git-fixes).
- swiotlb: fix a braino in the alignment check fix (bsc#1216559).
- swiotlb: fix debugfs reporting of reserved memory pools (git-fixes).
- swiotlb: fix slot alignment checks (bsc#1216559).
- swiotlb: fix the deadlock in swiotlb_do_find_slots (git-fixes).
- swiotlb: mark swiotlb_memblock_alloc() as __init (git-fixes).
- swiotlb: reduce the number of areas to match actual memory pool size (git-fixes).
- swiotlb: reduce the swiotlb buffer size on allocation failure (git-fixes).
- swiotlb: use the calculated number of areas (git-fixes).
- tracing / synthetic: Disable events after testing in synth_event_gen_test_init() (git-fixes).
- tracing/kprobes: Fix the description of variable length arguments (git-fixes).
- tracing/kprobes: Fix the order of argument descriptions (git-fixes).
- tracing/perf: Add interrupt_context_level() helper (git-fixes).
- tracing/synthetic: fix kernel-doc warnings (git-fixes).
- tracing: Always update snapshot buffer size (git-fixes).
- tracing: Disable preemption when using the filter buffer (bsc#1217036).
- tracing: Disable snapshot buffer when stopping instance tracers (git-fixes).
- tracing: Fix a possible race when disabling buffered events (bsc#1217036).
- tracing: Fix a warning when allocating buffered events fails (bsc#1217036).
- tracing: Fix blocked reader of snapshot buffer (git-fixes).
- tracing: Fix incomplete locking when disabling buffered events (bsc#1217036).
- tracing: Fix warning in trace_buffered_event_disable() (git-fixes, bsc#1217036).
- tracing: Have the user copy of synthetic event address use correct context (git-fixes).
- tracing: Reuse logic from perf's get_recursion_context() (git-fixes).
- tracing: Set actual size after ring buffer resize (git-fixes).
- tracing: Stop current tracer when resizing buffer (git-fixes).
- tracing: Update snapshot buffer on resize if it is allocated (git-fixes).
- tracing: Use __this_cpu_read() in trace_event_buffer_lock_reserver() (bsc#1217036).
- tracing: relax trace_event_eval_update() execution with cond_resched() (git-fixes).
- uapi: propagate __struct_group() attributes to the container union (jsc#SLE-18978).
- ubifs: Fix memory leak of bud-&gt;log_hash (git-fixes).
- ubifs: fix possible dereference after free (git-fixes).
- usb-storage: Add quirk for incorrect WP on Kingston DT Ultimate 3.0 G3 (git-fixes).
- usb: aqc111: check packet for fixup for true limit (git-fixes).
- usb: config: fix iteration issue in 'usb_get_bos_descriptor()' (git-fixes).
- usb: host: xhci-plat: fix possible kernel oops while resuming (git-fixes).
- usb: hub: Guard against accesses to uninitialized BOS descriptors (git-fixes).
- usb: serial: ftdi_sio: update Actisense PIDs constant names (git-fixes).
- usb: serial: option: add Foxconn T99W265 with new baseline (git-fixes).
- usb: serial: option: add Quectel EG912Y module support (git-fixes).
- usb: serial: option: add Quectel RM500Q R13 firmware support (git-fixes).
- usb: typec: bus: verify partner exists in typec_altmode_attention (git-fixes).
- usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes).
- usb: typec: ucsi: acpi: add quirk for ASUS Zenbook UM325 (git-fixes).
- virt/coco/sev-guest: Double-buffer messages (jsc#PED-7167).
- virt: coco: Add a coco/Makefile and coco/Kconfig (jsc#PED-7167).
- virt: sevguest: Add TSM_REPORTS support for SNP_GET_EXT_REPORT (jsc#PED-7167).
- virt: sevguest: Fix passing a stack buffer as a scatterlist target (jsc#PED-7167).
- virt: sevguest: Prep for kernel internal get_ext_report() (jsc#PED-7167).
- virt: tdx-guest: Add Quote generation support using TSM_REPORTS (jsc#PED-7167).
- vsprintf/kallsyms: Prevent invalid data when printing symbol (bsc#1217602).
- wifi: cfg80211: Add my certificate (git-fixes).
- wifi: cfg80211: fix certs build to not depend on file order (git-fixes).
- wifi: iwlwifi: pcie: add another missing bh-disable for rxq-&gt;lock (git-fixes).
- wifi: iwlwifi: pcie: do not synchronize IRQs from IRQ (git-fixes).
- wifi: mac80211: mesh: check element parsing succeeded (git-fixes).
- wifi: mac80211: mesh_plink: fix matches_local logic (git-fixes).
- x86/CPU/AMD: Check vendor in the AMD microcode callback (git-fixes).
- x86/alternatives: Disable KASAN in apply_alternatives() (git-fixes).
- x86/alternatives: Disable interrupts and sync when optimizing NOPs in place (git-fixes).
- x86/alternatives: Sync core before enabling interrupts (git-fixes).
- x86/boot/compressed: Handle unaccepted memory (jsc#PED-7167).
- x86/boot/compressed: Reserve more memory for page tables (git-fixes).
- x86/boot: Add an efi.h header for the decompressor (jsc#PED-7167).
- x86/boot: Centralize __pa()/__va() definitions (jsc#PED-7167).
- x86/boot: Fix incorrect startup_gdt_descr.size (git-fixes).
- x86/cpu/amd: Enable Zenbleed fix for AMD Custom APU 0405 (git-fixes).
- x86/cpu: Do not write CSTAR MSR on Intel CPUs (jsc#PED-7167).
- x86/cpu: Fix amd_check_microcode() declaration (git-fixes).
- x86/efi: Safely enable unaccepted memory in UEFI (jsc#PED-7167).
- x86/entry: Convert INT 0x80 emulation to IDTENTRY (bsc#1217927).
- x86/entry: Do not allow external 0x80 interrupts (bsc#1217927).
- x86/fpu/xstate: Prevent false-positive warning in __copy_xstate_uabi_buf() (git-fixes).
- x86/fpu: Invalidate FPU state correctly on exec() (git-fixes).
- x86/platform/uv: Use alternate source for socket to node data (bsc#1215696 bsc#1217790).
- x86/purgatory: Remove LTO flags (git-fixes).
- x86/resctrl: Fix kernel-doc warnings (git-fixes).
- x86/sev-es: Replace open-coded hlt-loop with sev_es_terminate() (jsc#PED-7167).
- x86/sev-es: Use insn_decode_mmio() for MMIO implementation (jsc#PED-7167).
- x86/sev: Add SNP-specific unaccepted memory support (jsc#PED-7167).
- x86/sev: Allow for use of the early boot GHCB for PSC requests (jsc#PED-7167).
- x86/sev: Change npages to unsigned long in snp_accept_memory() (jsc#PED-7167).
- x86/sev: Change snp_guest_issue_request()'s fw_err argument (jsc#PED-7167).
- x86/sev: Fix address space sparse warning (jsc#PED-7167).
- x86/sev: Get rid of special sev_es_enable_key (jsc#PED-7167).
- x86/sev: Mark snp_abort() noreturn (jsc#PED-7167).
- x86/sev: Put PSC struct on the stack in prep for unaccepted memory support (jsc#PED-7167).
- x86/sev: Use large PSC requests if applicable (jsc#PED-7167).
- x86/smp: Use dedicated cache-line for mwait_play_dead() (git-fixes).
- x86/srso: Add SRSO mitigation for Hygon processors (git-fixes).
- x86/srso: Fix SBPB enablement for (possible) future fixed HW  (git-fixes).
- x86/srso: Fix vulnerability reporting for missing microcode (git-fixes).
- x86/tdx: Add unaccepted memory support (jsc#PED-7167).
- x86/tdx: Disable NOTIFY_ENABLES (jsc#PED-7167).
- x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub (jsc#PED-7167).
- x86/tdx: Refactor try_accept_one() (jsc#PED-7167).
- x86/tdx: Relax SEPT_VE_DISABLE check for debug TD (jsc#PED-7167).
- x86/tdx: Use ReportFatalError to report missing SEPT_VE_DISABLE (jsc#PED-7167).
- x86/tsc: Add option to force frequency recalibration with HW timer (bsc#1215885 bsc#1217217).
- x86/tsc: Be consistent about use_tsc_delay() (bsc#1215885 bsc#1217217).
- x86/tsc: Extend watchdog check exemption to 4-Sockets platform (bsc#1215885 bsc#1217217).
- x86/unwind/orc: Unwind ftrace trampolines with correct ORC entry (git-fixes).
- xfs: Rename __xfs_attr_rmtval_remove (git-fixes).
- xfs: Use kvcalloc() instead of kvzalloc() (git-fixes).
- xfs: aborting inodes on shutdown may need buffer lock (git-fixes).
- xfs: add selinux labels to whiteout inodes (git-fixes).
- xfs: clean up '%Ld/%Lu' which does not meet C standard (git-fixes).
- xfs: convert flex-array declarations in struct xfs_attrlist* (git-fixes).
- xfs: convert flex-array declarations in xfs attr leaf blocks (git-fixes).
- xfs: convert flex-array declarations in xfs attr shortform objects (git-fixes).
- xfs: decode scrub flags in ftrace output (git-fixes).
- xfs: dump log intent items that cannot be recovered due to corruption (git-fixes).
- xfs: fix a bug in the online fsck directory leaf1 bestcount check (git-fixes).
- xfs: fix agf_fllast when repairing an empty AGFL (git-fixes).
- xfs: fix incorrect unit conversion in scrub tracepoint (git-fixes).
- xfs: fix silly whitespace problems with kernel libxfs (git-fixes).
- xfs: fix uninit warning in xfs_growfs_data (git-fixes).
- xfs: fix units conversion error in xfs_bmap_del_extent_delay (git-fixes).
- xfs: make sure maxlen is still congruent with prod when rounding down (git-fixes).
- xfs: remove kmem_alloc_io() (git-fixes).
- xfs: remove the xfs_dinode_t typedef (git-fixes).
- xfs: remove the xfs_dqblk_t typedef (git-fixes).
- xfs: remove the xfs_dsb_t typedef (git-fixes).
- xfs: rename xfs_has_attr() (git-fixes).
- xfs: replace snprintf in show functions with sysfs_emit (git-fixes).
- xfs: return EINTR when a fatal signal terminates scrub (git-fixes).
- xfs: sb verifier does not handle uncached sb buffer (git-fixes).
- xfs: simplify two-level sysctl registration for xfs_table (git-fixes).
- xfs: sysfs: use default_groups in kobj_type (git-fixes).
- xfs: use swap() to make dabtree code cleaner (git-fixes).
- xhci: Clear EHB bit only at end of interrupt handler (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-18"/>
	<updated date="2024-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183045">SUSE bug 1183045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211162">SUSE bug 1211162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211226">SUSE bug 1211226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212139">SUSE bug 1212139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212584">SUSE bug 1212584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214117">SUSE bug 1214117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214158">SUSE bug 1214158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214747">SUSE bug 1214747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214823">SUSE bug 1214823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215237">SUSE bug 1215237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215696">SUSE bug 1215696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215885">SUSE bug 1215885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215952">SUSE bug 1215952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216032">SUSE bug 1216032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216057">SUSE bug 1216057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216559">SUSE bug 1216559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216776">SUSE bug 1216776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217036">SUSE bug 1217036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217217">SUSE bug 1217217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217250">SUSE bug 1217250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217602">SUSE bug 1217602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217692">SUSE bug 1217692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217790">SUSE bug 1217790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217801">SUSE bug 1217801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217822">SUSE bug 1217822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217927">SUSE bug 1217927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217933">SUSE bug 1217933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217938">SUSE bug 1217938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217946">SUSE bug 1217946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217947">SUSE bug 1217947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217980">SUSE bug 1217980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217981">SUSE bug 1217981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217982">SUSE bug 1217982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218056">SUSE bug 1218056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218092">SUSE bug 1218092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218139">SUSE bug 1218139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218184">SUSE bug 1218184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218229">SUSE bug 1218229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218234">SUSE bug 1218234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218253">SUSE bug 1218253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218258">SUSE bug 1218258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218335">SUSE bug 1218335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218357">SUSE bug 1218357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218397">SUSE bug 1218397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218447">SUSE bug 1218447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218461">SUSE bug 1218461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218515">SUSE bug 1218515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218559">SUSE bug 1218559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218569">SUSE bug 1218569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218643">SUSE bug 1218643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218738">SUSE bug 1218738</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26555/">CVE-2020-26555 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26555">CVE-2020-26555 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51779/">CVE-2023-51779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51779">CVE-2023-51779 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-6121/">CVE-2023-6121 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6121">CVE-2023-6121 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6531/">CVE-2023-6531 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6531">CVE-2023-6531 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6546/">CVE-2023-6546 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6546">CVE-2023-6546 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6606/">CVE-2023-6606 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6606">CVE-2023-6606 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6610/">CVE-2023-6610 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6610">CVE-2023-6610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6622/">CVE-2023-6622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6622">CVE-2023-6622 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6931/">CVE-2023-6931 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6931">CVE-2023-6931 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6932/">CVE-2023-6932 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6932">CVE-2023-6932 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009819781" comment="cluster-md-kmp-64kb-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819782" comment="cluster-md-kmp-default-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819783" comment="dlm-kmp-64kb-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819784" comment="dlm-kmp-default-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819785" comment="dtb-allwinner-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819786" comment="dtb-altera-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819787" comment="dtb-amazon-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819788" comment="dtb-amd-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819789" comment="dtb-amlogic-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819790" comment="dtb-apm-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819791" comment="dtb-apple-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819792" comment="dtb-arm-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819793" comment="dtb-broadcom-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819794" comment="dtb-cavium-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819795" comment="dtb-exynos-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819796" comment="dtb-freescale-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819797" comment="dtb-hisilicon-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819798" comment="dtb-lg-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819799" comment="dtb-marvell-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819800" comment="dtb-mediatek-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819801" comment="dtb-nvidia-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819802" comment="dtb-qcom-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819803" comment="dtb-renesas-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819804" comment="dtb-rockchip-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819805" comment="dtb-socionext-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819806" comment="dtb-sprd-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819807" comment="dtb-xilinx-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819808" comment="gfs2-kmp-64kb-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819809" comment="gfs2-kmp-default-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819810" comment="kernel-64kb-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819811" comment="kernel-64kb-devel-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819812" comment="kernel-64kb-extra-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819813" comment="kernel-64kb-livepatch-devel-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819814" comment="kernel-64kb-optional-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819815" comment="kernel-debug-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819816" comment="kernel-debug-devel-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819817" comment="kernel-debug-livepatch-devel-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819818" comment="kernel-debug-vdso-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819819" comment="kernel-default-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819820" comment="kernel-default-base-5.14.21-150500.55.44.1.150500.6.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819821" comment="kernel-default-base-rebuild-5.14.21-150500.55.44.1.150500.6.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819822" comment="kernel-default-devel-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819823" comment="kernel-default-extra-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819824" comment="kernel-default-livepatch-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819825" comment="kernel-default-livepatch-devel-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819826" comment="kernel-default-optional-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819827" comment="kernel-default-vdso-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819828" comment="kernel-devel-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819829" comment="kernel-docs-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819830" comment="kernel-docs-html-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819831" comment="kernel-kvmsmall-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819832" comment="kernel-kvmsmall-devel-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819833" comment="kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819834" comment="kernel-kvmsmall-vdso-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819835" comment="kernel-macros-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819836" comment="kernel-obs-build-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819837" comment="kernel-obs-qa-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819838" comment="kernel-source-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819839" comment="kernel-source-vanilla-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819840" comment="kernel-syms-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819841" comment="kernel-zfcpdump-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819842" comment="kselftests-kmp-64kb-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819843" comment="kselftests-kmp-default-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819844" comment="ocfs2-kmp-64kb-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819845" comment="ocfs2-kmp-default-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819846" comment="reiserfs-kmp-64kb-5.14.21-150500.55.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819847" comment="reiserfs-kmp-default-5.14.21-150500.55.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4710" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1185784" ref_url="https://bugzilla.suse.com/1185784" source="BUGZILLA"/>
		<reference ref_id="1185785" ref_url="https://bugzilla.suse.com/1185785" source="BUGZILLA"/>
		<reference ref_id="1185786" ref_url="https://bugzilla.suse.com/1185786" source="BUGZILLA"/>
		<reference ref_id="1185803" ref_url="https://bugzilla.suse.com/1185803" source="BUGZILLA"/>
		<reference ref_id="1185804" ref_url="https://bugzilla.suse.com/1185804" source="BUGZILLA"/>
		<reference ref_id="1185805" ref_url="https://bugzilla.suse.com/1185805" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25287" ref_url="https://www.suse.com/security/cve/CVE-2021-25287/" source="CVE"/>
		<reference ref_id="CVE-2021-25288" ref_url="https://www.suse.com/security/cve/CVE-2021-25288/" source="CVE"/>
		<reference ref_id="CVE-2021-28675" ref_url="https://www.suse.com/security/cve/CVE-2021-28675/" source="CVE"/>
		<reference ref_id="CVE-2021-28676" ref_url="https://www.suse.com/security/cve/CVE-2021-28676/" source="CVE"/>
		<reference ref_id="CVE-2021-28677" ref_url="https://www.suse.com/security/cve/CVE-2021-28677/" source="CVE"/>
		<reference ref_id="CVE-2021-28678" ref_url="https://www.suse.com/security/cve/CVE-2021-28678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1607-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035237.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

- CVE-2021-25287: out-of-bounds read in J2kDecode in j2ku_graya_la (bsc#1185805)
- CVE-2021-25288: out-of-bounds read in J2kDecode in j2ku_gray_i (bsc#1185803)
- CVE-2021-28675: DoS in PsdImagePlugin (bsc#1185804)
- CVE-2021-28676: infinite loop in FliDecode.c can lead to DoS (bsc#1185786)
- CVE-2021-28677: DoS in the open phase via a malicious EPS file (bsc#1185785)
- CVE-2021-28678: improper check in BlpImagePlugin can lead to DoS (bsc#1185784)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-10"/>
	<updated date="2024-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185784">SUSE bug 1185784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185785">SUSE bug 1185785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185786">SUSE bug 1185786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185803">SUSE bug 1185803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185804">SUSE bug 1185804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185805">SUSE bug 1185805</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25287/">CVE-2021-25287 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25287">CVE-2021-25287 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25288/">CVE-2021-25288 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25288">CVE-2021-25288 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28675/">CVE-2021-28675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28675">CVE-2021-28675 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28676/">CVE-2021-28676 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28676">CVE-2021-28676 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28677/">CVE-2021-28677 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28677">CVE-2021-28677 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28678/">CVE-2021-28678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28678">CVE-2021-28678 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009860248" comment="python3-Pillow-7.2.0-150300.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860249" comment="python3-Pillow-tk-7.2.0-150300.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4711" version="1" class="patch">
	<metadata>
		<title>Security update for python-Werkzeug (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223979" ref_url="https://bugzilla.suse.com/1223979" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-34069" ref_url="https://www.suse.com/security/cve/CVE-2024-34069/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1608-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035236.html" source="SUSE-SU"/>
		<description>
This update for python-Werkzeug fixes the following issues:

- CVE-2024-34069: Fixed a remote code execution through debugger when interacting with attacker controlled domain (bsc#1223979).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-10"/>
	<updated date="2024-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223979">SUSE bug 1223979</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-34069/">CVE-2024-34069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34069">CVE-2024-34069 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860250" comment="python-Werkzeug-doc-0.14.1-150100.6.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4712" version="1" class="patch">
	<metadata>
		<title>Security update for freerdp (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223293" ref_url="https://bugzilla.suse.com/1223293" source="BUGZILLA"/>
		<reference ref_id="1223294" ref_url="https://bugzilla.suse.com/1223294" source="BUGZILLA"/>
		<reference ref_id="1223295" ref_url="https://bugzilla.suse.com/1223295" source="BUGZILLA"/>
		<reference ref_id="1223296" ref_url="https://bugzilla.suse.com/1223296" source="BUGZILLA"/>
		<reference ref_id="1223297" ref_url="https://bugzilla.suse.com/1223297" source="BUGZILLA"/>
		<reference ref_id="1223298" ref_url="https://bugzilla.suse.com/1223298" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-32039" ref_url="https://www.suse.com/security/cve/CVE-2024-32039/" source="CVE"/>
		<reference ref_id="CVE-2024-32040" ref_url="https://www.suse.com/security/cve/CVE-2024-32040/" source="CVE"/>
		<reference ref_id="CVE-2024-32041" ref_url="https://www.suse.com/security/cve/CVE-2024-32041/" source="CVE"/>
		<reference ref_id="CVE-2024-32458" ref_url="https://www.suse.com/security/cve/CVE-2024-32458/" source="CVE"/>
		<reference ref_id="CVE-2024-32459" ref_url="https://www.suse.com/security/cve/CVE-2024-32459/" source="CVE"/>
		<reference ref_id="CVE-2024-32460" ref_url="https://www.suse.com/security/cve/CVE-2024-32460/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1610-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035234.html" source="SUSE-SU"/>
		<description>
This update for freerdp fixes the following issues:

- CVE-2024-32039: Fixed an out-of-bounds write with variables of type uint32 (bsc#1223293)
- CVE-2024-32040: Fixed a integer underflow when using the 'NSC' codec (bsc#1223294)
- CVE-2024-32041: Fixed an out-of-bounds read in Stream_GetRemainingLength() (bsc#1223295)
- CVE-2024-32458: Fixed an out-of-bounds read on pSrcData[] (bsc#1223296)
- CVE-2024-32459: Fixed an out-of-bounds read in case SrcSize less than 4 (bsc#1223297)
- CVE-2024-32460: Fixed an out-of-bounds read when using '/bpp:32' legacy 'GDI' drawing path (bsc#1223298)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-10"/>
	<updated date="2024-05-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223293">SUSE bug 1223293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223294">SUSE bug 1223294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223295">SUSE bug 1223295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223296">SUSE bug 1223296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223297">SUSE bug 1223297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223298">SUSE bug 1223298</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32039/">CVE-2024-32039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32039">CVE-2024-32039 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-32040/">CVE-2024-32040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32040">CVE-2024-32040 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-32041/">CVE-2024-32041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32041">CVE-2024-32041 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-32458/">CVE-2024-32458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32458">CVE-2024-32458 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-32459/">CVE-2024-32459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32459">CVE-2024-32459 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32460/">CVE-2024-32460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32460">CVE-2024-32460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009860251" comment="freerdp-2.4.0-150400.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860252" comment="freerdp-devel-2.4.0-150400.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860253" comment="freerdp-proxy-2.4.0-150400.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860254" comment="freerdp-server-2.4.0-150400.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860255" comment="freerdp-wayland-2.4.0-150400.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860256" comment="libfreerdp2-2.4.0-150400.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860257" comment="libuwac0-0-2.4.0-150400.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860258" comment="libwinpr2-2.4.0-150400.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860259" comment="uwac0-0-devel-2.4.0-150400.3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860260" comment="winpr2-devel-2.4.0-150400.3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4713" version="1" class="patch">
	<metadata>
		<title>Security update for python-Werkzeug (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223979" ref_url="https://bugzilla.suse.com/1223979" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-34069" ref_url="https://www.suse.com/security/cve/CVE-2024-34069/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1624-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035249.html" source="SUSE-SU"/>
		<description>
This update for python-Werkzeug fixes the following issues:

- CVE-2024-34069: Fixed a remote code execution through debugger when interacting with attacker controlled domain (bsc#1223979).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-13"/>
	<updated date="2024-05-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223979">SUSE bug 1223979</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-34069/">CVE-2024-34069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34069">CVE-2024-34069 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860477" comment="python3-Werkzeug-1.0.1-150300.3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4714" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222548" ref_url="https://bugzilla.suse.com/1222548" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2511" ref_url="https://www.suse.com/security/cve/CVE-2024-2511/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035255.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2024-2511: Fixed unconstrained session cache growth in TLSv1.3 (bsc#1222548).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-14"/>
	<updated date="2024-05-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1222548">SUSE bug 1222548</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2511/">CVE-2024-2511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2511">CVE-2024-2511 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009860565" comment="libopenssl-3-devel-3.0.8-150500.5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860566" comment="libopenssl-3-devel-32bit-3.0.8-150500.5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860567" comment="libopenssl3-3.0.8-150500.5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860568" comment="libopenssl3-32bit-3.0.8-150500.5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860569" comment="openssl-3-3.0.8-150500.5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860570" comment="openssl-3-doc-3.0.8-150500.5.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4715" version="1" class="patch">
	<metadata>
		<title>Security update for tpm2-0-tss (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223690" ref_url="https://bugzilla.suse.com/1223690" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-29040" ref_url="https://www.suse.com/security/cve/CVE-2024-29040/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035254.html" source="SUSE-SU"/>
		<description>
This update for tpm2-0-tss fixes the following issues:

- CVE-2024-29040: Fixed quote data validation by Fapi_VerifyQuote (bsc#1223690).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-14"/>
	<updated date="2024-05-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1223690">SUSE bug 1223690</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-29040/">CVE-2024-29040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29040">CVE-2024-29040 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009860571" comment="libtss2-esys0-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860572" comment="libtss2-esys0-32bit-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860573" comment="libtss2-fapi1-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860574" comment="libtss2-fapi1-32bit-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860575" comment="libtss2-mu0-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860576" comment="libtss2-mu0-32bit-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860577" comment="libtss2-rc0-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860578" comment="libtss2-rc0-32bit-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860579" comment="libtss2-sys1-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860580" comment="libtss2-sys1-32bit-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860581" comment="libtss2-tcti-cmd0-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860582" comment="libtss2-tcti-cmd0-32bit-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860583" comment="libtss2-tcti-device0-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860584" comment="libtss2-tcti-device0-32bit-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860585" comment="libtss2-tcti-mssim0-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860586" comment="libtss2-tcti-mssim0-32bit-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860587" comment="libtss2-tcti-pcap0-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860588" comment="libtss2-tcti-swtpm0-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860589" comment="libtss2-tcti-swtpm0-32bit-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860590" comment="libtss2-tctildr0-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860591" comment="libtss2-tctildr0-32bit-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860592" comment="tpm2-0-tss-3.1.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860593" comment="tpm2-0-tss-devel-3.1.0-150400.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4716" version="1" class="patch">
	<metadata>
		<title>Security update for tpm2.0-tools (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223687" ref_url="https://bugzilla.suse.com/1223687" source="BUGZILLA"/>
		<reference ref_id="1223689" ref_url="https://bugzilla.suse.com/1223689" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-29038" ref_url="https://www.suse.com/security/cve/CVE-2024-29038/" source="CVE"/>
		<reference ref_id="CVE-2024-29039" ref_url="https://www.suse.com/security/cve/CVE-2024-29039/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018520.html" source="SUSE-SU"/>
		<description>
This update for tpm2.0-tools fixes the following issues:

- CVE-2024-29038: Fixed arbitrary quote data validation by tpm2_checkquote (bsc#1223687).
- CVE-2024-29039: Fixed pcr selection value to be compared with the attest (bsc#1223689).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-14"/>
	<updated date="2024-05-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1223687">SUSE bug 1223687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223689">SUSE bug 1223689</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-29038/">CVE-2024-29038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29038">CVE-2024-29038 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-29039/">CVE-2024-29039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29039">CVE-2024-29039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860594" comment="tpm2.0-tools-5.2-150400.6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4717" version="1" class="patch">
	<metadata>
		<title>Recommended update for google-cloud SDK (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210617" ref_url="https://bugzilla.suse.com/1210617" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-30608" ref_url="https://www.suse.com/security/cve/CVE-2023-30608/" source="CVE"/>
		<reference ref_id="SUSE-RU-2024:1637-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035270.html" source="SUSE-SU"/>
		<description>
This update for  google-cloud SDK fixes the following issues:

- Add python311 cloud services packages and dependencies (jsc#PED-7987, jsc#PED-6697)
- Bellow 5 binaries Obsolete the python3.6 counterpart:
    python311-google-resumable-media
    python311-google-api-core
    python311-google-cloud-storage
    python311-google-cloud-core
    python311-googleapis-common-protos

- Regular python311 updates (without Obsoletes):
    python-google-auth
    python-grpcio
    python-sqlparse

- New python311 packages:
    libcrc32c
    python-google-cloud-appengine-logging
    python-google-cloud-artifact-registry
    python-google-cloud-audit-log
    python-google-cloud-build
    python-google-cloud-compute
    python-google-cloud-dns
    python-google-cloud-domains
    python-google-cloud-iam
    python-google-cloud-kms-inventory
    python-google-cloud-kms
    python-google-cloud-logging
    python-google-cloud-run
    python-google-cloud-secret-manager
    python-google-cloud-service-directory
    python-google-cloud-spanner
    python-google-cloud-vpc-access
    python-google-crc32c
    python-grpc-google-iam-v1
    python-grpcio-status
    python-proto-plus

In python-sqlparse this security issue was fixed:

CVE-2023-30608: Fixed parser that contained a regular expression that is vulnerable to ReDOS (Regular Expression Denial of Service) (bsc#1210617)

		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-14"/>
	<updated date="2024-05-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210617">SUSE bug 1210617</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-30608/">CVE-2023-30608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30608">CVE-2023-30608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009860595" comment="libcrc32c-devel-1.1.2-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860596" comment="libcrc32c1-1.1.2-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860597" comment="libprotobuf-lite25_1_0-25.1-150400.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860598" comment="libprotobuf-lite25_1_0-32bit-25.1-150400.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860599" comment="libprotobuf25_1_0-32bit-25.1-150400.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860600" comment="libprotoc25_1_0-25.1-150400.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860601" comment="libprotoc25_1_0-32bit-25.1-150400.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860602" comment="protobuf-devel-25.1-150400.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860603" comment="protobuf-java-25.1-150400.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860604" comment="python311-apipkg-3.0.1-150400.12.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860605" comment="python311-cachetools-5.3.1-150400.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860606" comment="python311-certifi-2023.7.22-150400.12.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860607" comment="python311-cffi-1.15.1-150400.8.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860608" comment="python311-charset-normalizer-3.1.0-150400.9.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860609" comment="python311-cryptography-41.0.3-150400.16.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860610" comment="python311-google-api-core-2.15.0-150400.5.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860611" comment="python311-google-auth-2.27.0-150400.6.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860612" comment="python311-google-cloud-appengine-logging-1.4.0-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860613" comment="python311-google-cloud-artifact-registry-1.11.0-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860614" comment="python311-google-cloud-audit-log-0.2.5-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860615" comment="python311-google-cloud-build-3.22.0-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860616" comment="python311-google-cloud-compute-1.15.0-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860617" comment="python311-google-cloud-core-2.4.1-150400.5.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860618" comment="python311-google-cloud-dns-0.35.0-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860619" comment="python311-google-cloud-domains-1.7.1-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860620" comment="python311-google-cloud-iam-2.13.0-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860621" comment="python311-google-cloud-kms-2.21.0-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860622" comment="python311-google-cloud-kms-inventory-0.2.2-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860623" comment="python311-google-cloud-logging-3.9.0-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860624" comment="python311-google-cloud-run-0.10.1-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860625" comment="python311-google-cloud-secret-manager-2.17.0-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860626" comment="python311-google-cloud-service-directory-1.11.1-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860627" comment="python311-google-cloud-spanner-3.40.1-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860628" comment="python311-google-cloud-storage-2.14.0-150400.10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860629" comment="python311-google-cloud-vpc-access-1.10.0-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860630" comment="python311-google-crc32c-1.5.0-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860631" comment="python311-google-resumable-media-2.7.0-150400.10.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860632" comment="python311-googleapis-common-protos-1.62.0-150400.10.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860633" comment="python311-grpc-google-iam-v1-0.13.0-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860634" comment="python311-grpcio-1.60.1-150400.9.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860635" comment="python311-grpcio-status-1.60.1-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860636" comment="python311-idna-3.4-150400.11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860637" comment="python311-iniconfig-2.0.0-150400.10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860638" comment="python311-proto-plus-1.23.0-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860639" comment="python311-protobuf-4.25.1-150400.9.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860640" comment="python311-py-1.11.0-150400.12.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860641" comment="python311-pyOpenSSL-23.2.0-150400.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860642" comment="python311-pyasn1-0.5.0-150400.12.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860643" comment="python311-pyasn1-modules-0.3.0-150400.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860644" comment="python311-pycparser-2.21-150400.12.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860645" comment="python311-pytz-2023.3-150400.6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860646" comment="python311-requests-2.31.0-150400.6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860647" comment="python311-rsa-4.9-150400.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860648" comment="python311-setuptools-67.7.2-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860649" comment="python311-sqlparse-0.4.4-150400.6.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860650" comment="python311-urllib3-2.0.7-150400.7.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4718" version="1" class="patch">
	<metadata>
		<title>Security update for python-arcomplete, python-Fabric, python-PyGithub, python-antlr4-python3-runtime, python-avro, python-chardet, python-distro, python-docker, python-fakeredis, python-fixedint, python-httplib2, python-httpretty, python-javaproperties, python-jsondiff, python-knack, python-marshmallow, python-opencensus, python-opencensus-context, python-opencensus-ext-threading, python-opentelemetry-api, python-opentelemetry-sdk, python-opentelemetry-semantic-conventions, python-opentelemetry-test-utils, python-pycomposefile, python-pydash, python-redis, python-retrying, python-semver, python-sshtunnel, python-strictyaml, python-sure, python-vcrpy, python-xmltodict (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1209571" ref_url="https://bugzilla.suse.com/1209571" source="BUGZILLA"/>
		<reference ref_id="1209811" ref_url="https://bugzilla.suse.com/1209811" source="BUGZILLA"/>
		<reference ref_id="1209812" ref_url="https://bugzilla.suse.com/1209812" source="BUGZILLA"/>
		<reference ref_id="1216606" ref_url="https://bugzilla.suse.com/1216606" source="BUGZILLA"/>
		<reference ref_id="1222880" ref_url="https://bugzilla.suse.com/1222880" source="BUGZILLA"/>
		<reference ref_id="761162" ref_url="https://bugzilla.suse.com/761162" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-28858" ref_url="https://www.suse.com/security/cve/CVE-2023-28858/" source="CVE"/>
		<reference ref_id="CVE-2023-28859" ref_url="https://www.suse.com/security/cve/CVE-2023-28859/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1639-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018833.html" source="SUSE-SU"/>
		<description>
This update for python-argcomplete, python-Fabric, python-PyGithub, python-antlr4-python3-runtime, python-avro, python-chardet, python-distro, python-docker, python-fakeredis, python-fixedint, python-httplib2, python-httpretty, python-javaproperties, python-jsondiff, python-knack, python-marshmallow, python-opencensus, python-opencensus-context, python-opencensus-ext-threading, python-opentelemetry-api, python-opentelemetry-sdk, python-opentelemetry-semantic-conventions, python-opentelemetry-test-utils, python-pycomposefile, python-pydash, python-redis, python-retrying, python-semver, python-sshtunnel, python-strictyaml, python-sure, python-vcrpy, python-xmltodict contains the following fixes:

Changes in python-argcomplete
- Update to 3.3.0 (bsc#1222880):
  * Preserve compatibility with argparse option tuples of length 4.
    This update is required to use argcomplete on Python 3.11.9+ or
    3.12.3+.
- update to 3.2.3:
  * Allow register-python-argcomplete output to be used as lazy-loaded
    zsh completion module (#475)
    - Move debug_stream initialization to helper method to allow fd 9
      behavior to be overridden in subclasses (#471)

- update to 3.2.2:
  * Expand tilde in zsh

- Remove coverage check
- Fix zsh test failures: avoid coloring terminal

- update to 3.2.1:
  *  Allow explicit zsh global completion activation (#467)
  *  Fix and test global completion in zsh (#463, #466)
  *  Add –yes option to activate-global-python-argcomplete (#461)
  *  Test suite improvements
- drop without_zsh.patch: obsolete

- update to 3.1.6:
  *  Respect user choice in activate-global-python-argcomplete
  *  Escape colon in zsh completions. Fixes #456
  *  Call \_default as a fallback in zsh global completion

- update to 3.1.4:
  * Call \_default as a fallback in zsh global completion
  * zsh: Allow to use external script (#453)
  * Add support for Python 3.12 and drop EOL 3.6 and 3.7 (#449)
  * Use homebrew prefix by default
  * zsh: Allow to use external script (#453)


Changes in python-Fabric:
- Update to 3.2.2
- add fix-test-deps.patch to remove vendored dependencies
 *[Bug]: fabric.runners.Remote failed to properly deregister its SIGWINCH signal
    handler on shutdown; in rare situations this could cause tracebacks when
    the Python process receives SIGWINCH while no remote session is active.
    This has been fixed.
 * [Bug] #2204: The signal handling functionality added in Fabric 2.6 caused
    unrecoverable tracebacks when invoked from inside a thread (such as
    the use of fabric.group.ThreadingGroup) under certain interpreter versions.
    This has been fixed by simply refusing to register signal handlers when not
    in the main thread. Thanks to Francesco Giordano and others for the reports.
 * [Bug]: Neglected to actually add deprecated to our runtime dependency
    specification (it was still in our development dependencies). This has been fixed.
 * [Feature]: Enhanced fabric.testing in ways large and small:
    Backwards-compatibly merged the functionality of MockSFTP into MockRemote (may be
    opted-into by instantiating the latter with enable_sftp=True) so you can mock
    out both SSH and SFTP functionality in the same test, which was previously impossible.
    It also means you can use this in a Pytest autouse fixture to prevent any tests
    from accidentally hitting the network!
    A new pytest fixture, remote_with_sftp, has been added which leverages the previous
    bullet point (an all-in-one fixture suitable for, eg, preventing any incidental
    ssh/sftp attempts during test execution).
    A pile of documentation and test enhancements (yes, testing our testing helpers is a thing).
 * [Support]: Added a new runtime dependency on the Deprecated library.
 * [Support]: Language update: applied s/sanity/safety/g to the codebase
    (with the few actual API members using the term now marked deprecated &amp; new ones added
    in the meantime, mostly in fabric.testing).
 * [Feature]: Add a new CLI flag to fab, fab --list-agent-keys, which will attempt
    to connect to your local SSH agent and print a key list, similarly to ssh-add -l.
    This is mostly useful for expectations-checking Fabric and Paramiko’s agent
    functionality, or for situations where you might not have ssh-add handy.
 * [Feature]: Implement opt-in support for Paramiko 3.2’s AuthStrategy machinery, as follows:
    Added a new module and class, fabric.auth.OpenSSHAuthStrategy, which leverages
    aforementioned new Paramiko functionality to marry loaded SSH config files with
    Fabric-level and runtime-level parameters, arriving at what should
    be OpenSSH-client-compatible authentication behavior. See its API docs for details.
    Added new configuration settings:
      authentication.strategy_class, which defaults to None,
        but can be set to OpenSSHAuthStrategy to opt-in to the new behavior.
      authentication.identities, which defaults to the empty list, and can
        be a list of private key paths for use by the new strategy class.
 * [Bug] #2263: Explicitly add our dependency on decorator to setup.py instead of using
    Invoke’s old, now removed, vendored copy of same. This allows Fabric to happily use
    Invoke 2.1 and above

- Update to 3.0.1
  * [Bug] #2241: A typo prevented Fabric’s command runner from properly
    calling its superclass stop() method, which in tandem with a related
    Invoke bug meant messy or long shutdowns in many scenarios.
- Changes from 3.0.0
  * [Feature]: Change the default configuration value for inline_ssh_env
    from False to True, to better align with the practicalities of common
    SSH server configurations.
    - Warning
      This change is backwards incompatible if you were using 
      environment-variable-setting kwargs or config settings,
      such as Connection.run(command, env={'SOME': 'ENV VARS'}),
      and were not already explicitly specifying the value of inline_ssh_env.
  * [Bug] #1981: (fixed in #2195) Automatically close any open SFTP session
    during fabric.connection.Connection.close; this avoids issues encountered
    upon re-opening a previously-closed connection object.
  * [Support]: Drop support for Python &lt;3.6, including Python 2.
    - Warning
      This is a backwards incompatible change if you are not yet on
      Python 3.6 or above; however, pip shouldn’t offer you this
      version of Fabric as long as your pip version understands
      python_requires metadata.
- Drop remove-mock.patch because now in upstream.
- Drop remove-pathlib2.patch because now in upstream.

- Add %{?sle15_python_module_pythons}

- Remove conditional definition of python_module.

- Add patch remove-pathlib2.patch:
  * Drop install_requires on pathlib2. 

- Update to 2.7.1:
  * [Bug] #1924: (also #2007) Overhaul behavior and testing re: merging together
    different sources for the key_filename parameter in
    Connection.connect_kwargs. This fixes a number of type-related errors
    (string objects have no extend attribute, cannot add lists to strings, etc).

- Update to 2.7.0:
  * Add ~fabric.connection.Connection.shell, a belated port of the v1
    open_shell() feature.
  * Forward local terminal resizes to the remote end, when applicable.
    (For the technical: this means we now turn SIGWINCH into SSH
    window-change messages.)
  * Update ~fabric.connection.Connection temporarily so that it doesn't
    incidentally apply replace_env=True to local shell commands, only
    remote ones.
- Add patch remove-mock.patch:
  * Use unittest.mock, instead of mock

- pytest-relaxed now supports pytest 6, so test on all python versions. 

- Don't test on python310 -- gh#bitprophet/pytest-relaxed#12
  (This is mainly required by azure-cli in the primary python3
  flavor)

- Update to 2.6.0:
  * [Feature] #1999: Add sudo support to Group. Thanks to Bonnie Hardin for
    the report and to Winston Nolan for an early patchset.
  * [Feature] #1810: Add put/get support to Group.
  * [Feature] #1868: Ported a feature from v1: interpolating the local path
    argument in Transfer.get with connection and remote filepath attributes.
    For example, cxn.get(remote='/var/log/foo.log', local='{host}/') is now
    feasible for storing a file in per-host-named directories or files, and
    in fact Group.get does this by default.
  * [Feature]: When the local path argument to Transfer.get contains nonexistent
    directories, they are now created instead of raising an error.
    Warning: This change introduces a new runtime dependency: pathlib2.
  * [Bug]: Fix a handful of issues in the handling and mocking of SFTP local paths
    and os.path members within fabric.testing; this should remove some occasional
    “useless Mocks” as well as hewing closer to the real behavior of things like
    os.path.abspath re: path normalization.
- Update Requires from setup.py

Changes in python-PyGithub:
- Switch package to modern Python Stack on SLE-15
  + Add %{?sle15_python_module_pythons}
  + Drop %{?!python_module:%define python_module() python-%{**} python3-%{**}}
  + Drop %define skip_python2 1

- Update to 1.57 
  Breaking Changes
  * Add support for Python 3.11, drop support for Python 3.6 (#2332) (1e2f10d)
  Bug Fixes &amp; Improvements
  * Speed up get requested reviewers and teams for pr (#2349) (6725ece)
  * [WorkflowRun] - Add missing attributes (run_started_at &amp; run_attempt), remove deprecated unicode type (#2273) (3a6235b)
  * Add support for repository autolink references (#2016) (0fadd6b)
  * Add retry and pool_size to typing (#2151) (784a3ef)
  * Fix/types for repo topic team (#2341) (db9337a)
  * Add class Artifact (#2313) (#2319) (437ff84)

- Update to 1.56 
   This is the last release that will support Python 3.6.
  *Bug Fixes &amp; Improvements
   Create repo from template (#2090) (b50283a)
   Improve signature of Repository.create_repo (#2118) (001970d)
   Add support for 'visibility' attribute preview for Repositories (#1872) (8d1397a)
   Add Repository.rename_branch method (#2089) (6452ddf)
   Add function to delete pending reviews on a pull request (#1897) (c8a945b)
   Cover all code paths in search_commits (#2087) (f1faf94)
   Correctly deal when PaginatedList's data is a dict (#2084) (93b92cd)
   Add two_factor_authentication in AuthenticatedUser. (#1972) (4f00cbf)
   Add ProjectCard.edit() to the type stub (#2080) (d417e4c)
   Add method to delete Workflow runs (#2078) (b1c8eec)
   Implement organization.cancel_invitation() (#2072) (53fb498)
   Feat: Add html_url property in Team Class. (#1983) (6570892)
   Add support for Python 3.10 (#2073) (aa694f8)
   Add github actions secrets to org (#2006) (bc5e595)
   Correct replay for Organization.create_project() test (#2075) (fcc1236)
   Fix install command example (#2043) (99e00a2)
   Fix: #1671 Convert Python Bool to API Parameter for Authenticated User Notifications (#2001) (1da600a)
   Do not transform requestHeaders when logging (#1965) (1265747)
   Add type to OrderedDict (#1954) (ed7d0fe)
   Add Commit.get_pulls() to pyi (#1958) (b466470)
   Adding headers in GithubException is a breaking change (#1931) (d1644e3)

- Update to 1.55:
  * Remove client_id/client_secret authentication (#1888) (901af8c8)
  * Adjust to Github API changes regarding emails (#1890) (2c77cfad)
    + This impacts what AuthenticatedUser.get_emails() returns
  * Export headers in GithubException (#1887) (ddd437a7)
  * Do not import from unpackaged paths in typing (#1926) (27ba7838)
  * Implement hash for CompletableGithubObject (#1922) (4faff23c)
  * Use right variable in both get_check_runs() (#1889) (3003e065)
  * fix bad assertions in github.Project.edit (#1817) (6bae9e5c)
  * Add support for deleting repository secrets (#1868) (696793de)
  * Adding github actions secrets (#1681) (c90c050e)
  * Drop support for Python 3.5 (#1770) (63e4fae9)
  * Fix stubs file for Repository (fab682a5)
  * The Github.get_installation(integer) method has been removed.
  * Repository.create_deployment()'s payload parameter is now a dictionary.
  * Add support for Check Suites (#1764) (6d501b28)
  * Add missing preview features of Deployment and Deployment Statuses API
  * Add Support for Check Runs (#1727) (c77c0676)
  * Add WorkflowRun.workflow_id (#1737) (78a29a7c)
  * Added support for the Self-Hosted actions runners API (#1684) (24251f4b)
  * Fix Branch protection status in the examples (#1729) (88800844)
  * Filter the DeprecationWarning in Team tests (#1728) (23f47539)
  * Added get_installations() to Organizations (#1695) (b42fb244)
  * Fix #1507: Add new Teams: Add or update team repository endpoint
  * Added support for `Repository.get_workflow_runs` parameters
  * feat(pullrequest): add the rebaseable attribute (#1690) (ee4c7a7e)
  * Add support for deleting reactions (#1708) (f7d203c0)
  * Add get_timeline() to Issue's type stubs (#1663) (6bc9ecc8)

- Update to 1.53:
  * Add method get_team_membership for user to Team  (#1658) (749e8d35)
  * PaginatedList's totalCount is 0 if no last page (#1641) (69b37b4a)
  * Add initial support for Github Apps. (#1631) (260558c1)
  * Add delete_branch_on_merge arg to Repository.edit type stub
    (#1639) (15b5ae0c)
  * upload_asset with data in memory (#1601) (a7786393)
  * Make Issue.closed_by nullable (#1629) (06dae387)
  * Add support for workflow dispatch event (#1625) (16850ef1)
  * Do not check reaction_type before sending (#1592) (136a3e80)
  * more flexible header splitting (#1616) (85e71361)
  * Add support for deployment statuses (#1588) (048c8a1d)
  * Adds the 'twitter_username' attribute to NamedUser. (#1585) (079f75a7)
  * Add support for Workflow Runs (#1583) (4fb1d23f)
  * Small documentation correction in Repository.py (#1565) (f0f6ec83)
  * Remove 'api_preview' parameter from type stubs and docstrings
    (#1559) (cc1b884c)
  * Repository.update_file() content also accepts bytes (#1543) (9fb8588b)
  * Fix Repository.get_issues stub (#1540) (b40b75f8)
  * Check all arguments of NamedUser.get_repos() (#1532) (69bfc325)
  * Remove RateLimit.rate (#1529) (7abf6004)
  * PullRequestReview is not a completable object (#1528) (19fc43ab)
  * Remove pointless setters in GitReleaseAsset (#1527) (1dd1cf9c)
  * Drop some unimplemented methods in GitRef (#1525) (d4b61311)
  * Fixed formatting of docstrings for
    `Repository.create_git_tag_and_release()`
    and `StatsPunchCard`. (#1520) (ce400bc7)
  * Remove Repository.topics (#1505) (53d58d2b)
  * Correct Repository.get_workflows() (#1518) (8727003f)
  * correct Repository.stargazers_count return type to int (#1513) (b5737d41)
  * Raise a FutureWarning on use of client_{id,secret} (#1506) (2475fa66)
  * Improve type signature for create_from_raw_data (#1503) (c7b5eff0)
  * feat(column): move, edit and delete project columns (#1497) (a32a8965)
  * Add support for Workflows (#1496) (a1ed7c0e)
  * Add OAuth support for GitHub applications (4b437110)
  * Create AccessToken entity (4a6468aa)
  * Extend installation attributes (61808da1)

- Update to 1.51
  + New features
    * PyGithub now supports type checking
    * Ability to retrieve public events
    * Add and handle the maintainer_can_modify attribute in PullRequest
    * List matching references
    * Add create_repository_dispatch
    * Add some Organization and Repository attributes.
    * Add create project method
  + Bug Fixes &amp; Improvements
    * Drop use of shadow-cat for draft PRs
    * AuthenticatedUser.get_organization_membership() should be str
    * Drop documentation for len() of PaginatedList
    * Fix param name of projectcard's move function
    * Correct typos found with codespell
    * Export IncompletableObject in the github namespace
    * Add GitHub Action workflow for checks
    * Drop unneeded ignore rule for flake8
    * Use pytest to parametrize tests
    * Type stubs are now packaged with the build
    * Get the project column by id
- Drop parametrized and pytest-cov from BuildRequires.

- Update to 1.47
  + Bug Fixes &amp; Improvements
    * Add support to edit and delete a project (#1434) (f11f739)
    * Add method for fetching pull requests associated with a commit (#1433) (0c55381)
    * Add 'get_repo_permission' to Team class (#1416) (219bde5)
    * Add list projects support, update tests (#1431) (e44d11d)
    * Don't transform completely in PullRequest.*assignees (#1428) (b1c3549)
    * Add create_project support, add tests (#1429) (bf62f75)
    * Add draft attribute, update test (bd28524)
    * Docstring for Repository.create_git_tag_and_release (#1425) (bfeacde)
    * Create a tox docs environment (#1426) (b30c09a)
    * Add Deployments API (#1424) (3d93ee1)
    * Add support for editing project cards (#1418) (425280c)
    * Add draft flag parameter, update tests (bd0211e)
    * Switch to using pytest (#1423) (c822dd1)
    * Fix GitMembership with a hammer (#1420) (f2939eb)
    * Add support to reply to a Pull request comment (#1374) (1c82573)
    * PullRequest.update_branch(): allow expected_head_sha to be empty (#1412) (806130e)
    * Implement ProjectCard.delete() (#1417) (aeb27b7)
    * Add pre-commit plugin for black/isort/flake8 (#1398) (08b1c47)
    * Add tox (#1388) (125536f)
    * Open file in text mode in scripts/add_attribute.py (#1396) (0396a49)
    * Silence most ResourceWarnings (#1393) (dd31a70)
    * Assert more attributes in Membership (#1391) (d6dee01)
    * Assert on changed Repository attributes (#1390) (6e3ceb1)
    * Add reset to the repr for Rate (#1389) (0829af8)

- Update to 1.46
  + Bug Fixes &amp; Improvements
    * Add repo edit support for delete_branch_on_merge
    * Fix mistake in Repository.create_fork()
    * Correct two attributes in Invitation
    * Search repo issues by string label
    * Correct Repository.create_git_tag_and_release()
    * exposed seats and filled_seats for Github Organization Plan
    * Repository.create_project() body is optional
    * Implement move action for ProjectCard
    * Tidy up ProjectCard.get_content()
    * Added nested teams and parent
    * Correct parameter for Label.edit
    * doc: example of Pull Request creation
    * Fix PyPI wheel deployment
- No longer build Python 2 package
- Drop BuildRequires on mock, no longer required
- Drop no-hardcoded-dep.patch, no longer required

- Update to 1.45:
  + Breaking Changes
    * Branch.edit_{user,team}_push_restrictions() have been removed
      The new API is:
         Branch.add_{user,team}_push_restrictions() to add new members
         Branch.replace_{user,team}_push_restrictions() to replace all members
         Branch.remove_{user,team}_push_restrictions() to remove members
    * The api_preview parameter to Github() has been removed.
  + Bug Fixes &amp; Improvements
    * Allow sha=None for InputGitTreeElement
    * Support github timeline events.
    * Add support for update branch
    * Refactor Logging tests
    * Fix rtd build
    * Apply black to whole codebase
    * Fix class used returning pull request comments
    * Support for create_fork
    * Use Repository.get_contents() in tests
    * Allow GithubObject.update() to be passed headers
    * Correct URL for assignees on PRs
    * Use inclusive ordered comparison for 'parameterized' requirement
    * Deprecate Repository.get_dir_contents()
    * Apply some polish to manage.sh
- Refresh no-hardcoded-dep.patch

- Add patch to not pull in hardcoded dependencies:
  * no-hardcoded-dep.patch

- Update to 1.44.1:
  * Too many changes to enumerate.
- Drop PyGithub-drop-network-tests.patch, the test in question no longer
  requires network access.
- Drop fix-httpretty-dep.patch, the httpretty requirement has been relaxed
  upstream.
- Use %python_expand to run the test suite, it works fine on Python 3 now.
- Add mock and parameterized to BuildRequires, the test suite requires them.

- Update to 1.43.8:
  * Add two factor attributes on organizations (#1132) (a073168)
  * Add Repository methods for pending invitations (#1159) (57af1e0)
  * Adds get_issue_events to PullRequest object (#1154) (acd515a)
  * Add invitee and inviter to Invitation (#1156) (0f2beac)
  * Adding support for pending team invitations (#993) (edab176)
  * Add support for custom base_url in GithubIntegration class (#1093) (6cd0d64)
  * GithubIntegration: enable getting installation (#1135) (1818704)
  * Add sorting capability to Organization.get_repos() (#1139) (ef6f009)
  * Add new Organization.get_team_by_slug method (#1144) (4349bca)
  * Add description field when creating a new team (#1125) (4a37860)
  * Handle a path of / in Repository.get_contents() (#1070) (102c820)
  * Add issue lock/unlock (#1107) (ec7bbcf)
  * Fix bug in recursive repository contents example (#1166) (8b6b450)
  * Allow name to be specified for upload_asset (#1151) (8d2a6b5)
  * Fixes #1106 for GitHub Enterprise API (#1110) (5406579)

- Update to 1.43.7:
  * Exclude tests from PyPI distribution (#1031) (78d283b9)
  * Add codecov badge (#1090) (4c0b54c0)
- Update to 1.43.6:
  * New features
    o Add support for Python 3.7 (#1028) (6faa00ac)
    o Adding HTTP retry functionality via urllib3 (#1002) (5ae7af55)
    o Add new dismiss() method on PullRequestReview (#1053) (8ef71b1b)
    o Add since and before to get_notifications (#1074) (7ee6c417)
    o Add url parameter to include anonymous contributors in get_contributors (#1075) (293846be)
    o Provide option to extend expiration of jwt token (#1068) (86a9d8e9)
  * Bug Fixes &amp; Improvements
    o Fix the default parameter for PullRequest.create_review (#1058) (118def30)
    o Fix get_access_token (#1042) (6a89eb64)
    o Fix Organization.add_to_members role passing (#1039) (480f91cf)
  * Deprecation
    o Remove Status API (6efd6318)
- Add patch fix-httpretty-dep.patch
Changes in python-antlr4-python3-runtime:
- Switch package to modern Python Stack on SLE-15
  + Add %{?sle15_python_module_pythons}
  + Drop %{?!python_module:%define python_module() python-%{**} python3-%{**}}
  + Drop %define skip_python2 1
  + Drop support for older Python 3.x versions

- fix build for python 3.12

- require setuptools

- Update to version 4.13.1
  csharp target
  * [CSharp] Fix for #4386 -- change signatures for ReportAttemptingFullContext()
    and ReportContextSensitivity() to be identical to all other targets (target:csharp,
    type:cleanup)
  go target
  * Move GetText(), SetText(), and String() from CommonToken to BaseToken
    (target:go, type:cleanup)
  * Restore 'Obtained from string' source name. (target:go, type:cleanup)
  * fix: Fix very minor code issues spotted by goreportcard.com (target:go, type:cleanup)
  java target
  * Java: suppress this-escape warning introduced in JDK 21. (actions, target:java)
  javascript target
  * Adds default targets for babel configuration (target:javascript)
  * fix dependabot warnings (target:javascript, type:cleanup)
  swift target
  * [SWIFT] Add Antlr4Dynamic product (target:swift)
  * Cleanup duplicate SwiftTarget code (target:swift, type:cleanup)
  dart target
  * [Dart] Fix for #4320--export additional types (type:bug, target:dart)
- from version 4.13.0
  Issues fixed
  * antlr4 jar doubled in size in 4.9.3 (unicode, comp:performance)
  * Go: exponentially bad/absymal performance as of ... (type:bug, target:go)
  * Go runtime panic (type:bug, target:go)
  Improvements, features
  * Update LexerATNSimulator.cs with virtual Consume (type:improvement, target:csharp)
  * Feature/fixembedding (type:improvement, target:go, comp:performance)
  * Provide Javascript port of TokenStreamRewriter (type:feature,
    target:javascript, target:typescript)
- from version 4.12.0
  Issues fixed
  * github actions now fail for python2 and ubuntu clang and ubuntu swift
    (comp:runtime, comp:build, comp:testing)
  * js mergeArrays output differs from java (atn-analysis, target:javascript)
  * C++ target fails Performance/DropLoopEntryBranchInLRRule_4.txt
    (atn-analysis, type:bug, target:cpp)
  * Wrong grammarFileName in generated code (code-gen, type:bug)
  * C++ crashes on new test ParserExec/ListLabelsOnRuleRefStartOfAlt.txt
    (atn-analysis, type:bug, target:cpp)
  * [JavaScript runtime] Bad field name, bad comments (type:bug)
  Improvements, features
  * Fully qualify std::move invocations to fix -Wunqualified-std-cast-call
    (type:improvement, target:cpp)
  * Extract FileUtils updates by @ericvergnaud (type:improvement,
    cross-platform-issue, comp:testing)
  * Extract unit test updates by @ericvergnaud needed for TypeScript
    (type:improvement, comp:testing)
  * [Go target] Fix for #3926: Add accessors for tree navigation to interfaces
    in generated parser (trees-contexts, code-gen, type:improvement, target:go)
  * GitHub Workflows security hardening (actions, type:improvement, comp:testing)
- from version 4.11.1
  * Just fixes 4.11.0 release issue. I forgot to change runtime
    tool version so it didn't say SNAPSHOT.
- from version 4.11.0
  Issues fixed
  * Disable failing CI tests in master (comp:build, comp:testing)
  * Create accessor for Go-based IntervalSet.intervals (target:go)
  * Grammar Name Conflict Golang with SPARQL issue (target:go, type:cleanup)
  * Dependency declaration error in ANTLR 4.10.1 (comp:build)
  * Drop old version of Visual Studio C++ (2013, 2015, 2017)
    (comp:build, target:cpp)
  * Circular grammar inclusion causes stack overflow in the tool.
    (comp:tool, type:bug)
  * Cpp, Go, JavaScript, Python2/3: Template rendering error. (code-gen, comp:runtime,
    target:java, target:javascript, target:python2, target:python3, target:go)
  Improvements, features
  * Augment error message during testing to include full cause of problem.
    (type:improvement, comp:testing)
  * Include swift &amp; tool verification in CI workflow (type:improvement,
    comp:build, cross-platform-issue, target:swift)
  * Issue #3783: CI Check Builds (type:improvement, comp:build,
    cross-platform-issue, comp:testing)
  * Parallel lock free testing, remove potential deadlocks, cache static data,
    go to descriptor via test (comp:runtime, type:improvement, comp:testing)
  * update getting-started doc (type:improvement, comp:doc)
  * Getting Started has error (type:improvement, comp:doc)
  * new nuget directory for building ANTLR4 C++ runtime as 3 Nuget packages
    (type:improvement, comp:build, target:cpp)
  * Add interp tool like TestRig (comp:tool, type:feature)
  * Issue 3720: Java 2 Security issue (type:improvement, target:java)
  * Cpp: Disable warnings for external project (type:bug, type:improvement, target:cpp)
  * Fix Docker README for arm OS user (type:improvement, comp:doc)
- from version 4.10.1
  * [C++] Remove reference to antlrcpp:s2ws
  * Update publishing instruction for Dart
- from version 4.10.0
  Issues fixed
  * C++ runtime: Version identifier macro ? (target:cpp, type:cleanup)
  * Generating XPath lexer/parser (actions, type:bug)
  * do we need this C++ ATN serialization? (target:cpp, type:cleanup)
  * Incorrect type of token with number 0xFFFF because of incorrect
    ATN serialization (atn-analysis, type:bug)
  * Clean up ATN serialization: rm UUID and shifting by value of 2
    (atn-analysis, type:cleanup)
  * The parseFile method of the InterpreterDataReader class is missing
    code: 'line = br.readLine();' (type:bug, target:java)
  * antlr.runtime.standard 4.9.3 invalid strong name.
    (type:bug, comp:build, target:csharp)
  * Serialized ATN data element 810567 element 11 out of
    range 0..65535 (atn-analysis, type:cleanup)
  * Go target, unable to check when custom error strategy
    is in recovery mode (target:go)
  * Escape issue for characeters (grammars, type:bug)
  * antlr4 java.lang.NullPointerException Antlr 4 4.8
    (grammars, comp:tool, type:bug)
  * UnsupportedOperationException while generating code for large grammars.
    (atn-analysis, type:cleanup)
  * Add a more understandable message than 'Serialized ATN data element ....
    element ... out of range 0..65535' (atn-analysis, type:cleanup)
  * avoid java.lang.StackOverflowError (lexers, error-handling)
  * Getting this error: Exception in thread 'main' java.lang.UnsupportedOperationException:
    Serialized ATN data element out of range (atn-analysis, type:cleanup)
  Improvements, features
  * Updated getting started with Cpp documentation. (type:improvement, comp:doc)
  * Escape bad words during grammar generation (code-gen, type:improvement)
  * Implement caseInsensitive option (lexers, options, type:improvement)
  * Some tool bugfixes (error-handling, comp:tool, type:improvement, type:cleanup)
- Run testsuite using the tests/run.py script instead of %pyunittest
- Switch build systemd from setuptools to pyproject.toml
- Update BuildRequires from pyproject.toml
- Update filename pattern in %files section

- Update to version 4.9.3
  Issues fixed
  * Swift Target Crashes with Multi-Threading
  * JavaScript Runtime bug
  * Go target, cannot use superClass for the lexer grammar!
  * Python runtime is inconsistent with Java
  * FunctionDef source extract using getText()
  * Provide .NET Framework target in the csharp nuget package
  * Go target for Antlr tool, type ',int8' =&gt; 'int8'
  * Flutter/Dart web support
  * Allow Antlr Javascript runtime to be loaded into Kindle Touch
  * Fix Go test suite
  * Weird error
  Improvements, features
  * [C++] Use faster alternative to dynamic_cast when not testing inherit
  * Stackoverflow after upgrading from 4.6 to 4.7
- from version 4.9.2
  Issues fixed
  * CSharp and Java produce different results for identical input, identical tokens
  Improvements, features
  * Moved away from travis-ci.com
- Source upstream tarball from Github since PyPi tarball no longer ships testsuite

- Update to version 4.9.1.
  * Improve python3 performance by adding slots
  * Fix incorrect python token string templates
- Add testing.
- Skip python2 because this is for python3.
- Use python_alternative
Changes in python-avro:
- Switch package to modern Python Stack on SLE-15
  + Add %{?sle15_python_module_pythons}
  + Drop %define skip_python2 1
- Update to version 1.11.3:
  + See jira board for all the fixes addressed in this release:
    https://issues.apache.org/jira/browse/AVRO-3855?jql=project%3DAVRO%20AND%20fixVersion%3D1.11.3
- Drop py311.patch: fixed upstream.

- Add py311.patch to make tests compatible with python 3.11 gh#apache/avro#1961

- Update to 1.11.1 (from GitHub release notes):
  - Avro specification
    - Clarify which names are allowed to be qualified with
      namespaces
    - Inconsistent behaviour on types as invalid names
    - Clarify how fullnames are created, with example
    - IDL: add syntax to create optional fields
    - Improve docs for logical type annotation
  - Python
    - Scale assignment optimization
    - 'Scale' property from decimal object
    - Byte reading in avro.io does not assert bytes read
    - validate the default value of an enum field
    - Pass LogicalType to BytesDecimalSchema
  - Website
    - Website refactor
    - Document IDL support in IDEs
Changes in python-chardet:
- update to 5.2.0:
  * Adds support for running chardet CLI via `python -m chardet`

Changes in python-distro:
- Switch to autosetup macro. 

- update to 1.9.0:
  * Refactor distro.info() method to return an InfoDict [#360]
  * Ignore the file '/etc/board-release' [#353]
  * Ignore the file '/etc/ec2_version' [#359]
  * Test on modern versions of CPython and PyPy and macOS [#362]
  * Add support for ALT Linux Server 10.1 distribution [#354]
  * Add Debian Testing to the tests [#356]
  * Update archlinux resource for tests [#352]

- Remove duplicate files calling %fdupes

- add sle15_python_module_pythons

- update to 1.8.0:
  * Lowered `LinuxDistribution._distro_release_info` method complexity
    [#327]
  * Added official support for Buildroot distribution [#329]
  * Added official support for Guix distribution [#330]
  * Added support for `/etc/debian_version` [#333] &amp; [#349]
  * Fixed a typography in CONTRIBUTING.md [#340]
  * Improved README.md 'Usage' code block [#343]
  * Bumped black to v22.3.0 in pre-commit.ci configuration [#331]
  * Enabled GitHub Dependabot to keep GitHub Actions up to date [#335]

- remove shebang from distro.py
- update to version 1.7.0:
 - BACKWARD COMPATIBILITY:
 - Dropped support for EOL Pythons 2.7, 3.4 and 3.5 [[#281](https://github.com/python-distro/distro/pull/281)]
 - Dropped support for LSB and `uname` back-ends when `--root-dir` is specified [[#311](https://github.com/python-distro/distro/pull/311)]
 - Moved `distro.py` to `src/distro/distro.py` [[#315](https://github.com/python-distro/distro/pull/315)]
 - ENHANCEMENTS:
 - Documented that `distro.version()` can return an empty string on rolling releases [[#312](https://github.com/python-distro/distro/pull/312)]
 - Documented support for Python 3.10 [[#316](https://github.com/python-distro/distro/pull/316)]
 - Added official support for Rocky Linux distribution [[#318](https://github.com/python-distro/distro/pull/318)]
 - Added a shebang to `distro.py` to allow standalone execution [[#313](https://github.com/python-distro/distro/pull/313)]
 - Added support for AIX platforms [[#311](https://github.com/python-distro/distro/pull/311)]
 - Added compliance for PEP-561 [[#315](https://github.com/python-distro/distro/pull/315)]
 - BUG FIXES:
 - Fixed `include_uname` parameter oversight [[#305](https://github.com/python-distro/distro/pull/305)]
 - Fixed crash when `uname -rs` output is empty [[#304](https://github.com/python-distro/distro/pull/304)]
 - Fixed Amazon Linux identifier in `distro.id()` documentation [[#318](https://github.com/python-distro/distro/pull/318)]
 - Fixed OpenSuse &gt;= 15 support [[#319](https://github.com/python-distro/distro/pull/319)]
 - Fixed encoding issues when opening distro release files [[#324](https://github.com/python-distro/distro/pull/324)]
 - Fixed `linux_distribution` regression introduced in [[#230](https://github.com/python-distro/distro/pull/230)] [[#325](https://github.com/python-distro/distro/pull/325)]

- Tests: Set locale to UTF-8 to fix tests on Leap 15.3.

- Expliciting setting of locale is not necessary anymore
  (gh#python-distro/distro#223).

- Update to version 1.6.0
  * Deprecated the distro.linux_distribution() function. Use distro.id(), distro.version() and distro.name() instead [#296]
  * Deprecated Python 2.7, 3.4 and 3.5 support. Further releases will only support Python 3.6+
  * Added type hints to distro module [#269]
  * Added __version__ for checking distro version [#292]
  * Added support for arbitrary rootfs via the root_dir parameter [#247]
  * Added the --root-dir option to CLI [#161]
  * Added fallback to /usr/lib/os-release when /etc/os-release isn't available [#262]
  * Fixed subprocess.CalledProcessError when running lsb_release [#261]
  * Ignore /etc/iredmail-release file while parsing distribution [#268]
  * Use a binary file for /dev/null to avoid TextIOWrapper overhead [#271]

- use %pytest macro

- Enable tests properly (this is pytest, not unittest),
Changes in python-docker:
- update to 7.0.0:
  * Removed SSL version (`ssl_version`) and explicit hostname
    check (`assert_hostname`) options (#3185)
  * Python 3.7+ supports TLSv1.3 by default
  * Websocket support is no longer included by default (#3123)
  * Use `pip install docker[websockets]` to include `websocket-
    client` dependency
  * By default, `docker-py` hijacks the TCP connection and does
    not use Websockets
  * Websocket client is only required to use
    `attach_socket(container, ws=True)`
  * Python 3.7 no longer supported (reached end-of-life June
    2023) (#3187)
  * Python 3.12 support (#3185)
  * Full `networking_config` support for `containers.create()`
  * Replaces `network_driver_opt` (added in 6.1.0)
  * Add `health()` property to container that returns status
    (e.g. `unhealthy`)
  * Add `pause` option to `container.commit()` (#3159)
  * Add support for bind mount propagation (e.g. `rshared`,
    `private`)
  * Add support for `filters`, `keep_storage`, and `all` in
    `prune_builds()` on API v1.39+ (#3192)
  * Consistently return `docker.errors.NotFound` on 404 responses
  * Validate tag format before push (#3191)

- update to 6.1.3:
  * Bugfixes
    - Fix eventlet compatibility (#3132)
- update to 6.1.2:
  * Bugfixes
    - Fix for socket timeouts on long docker exec calls (#3125)
    - Respect timeout param on Windows (#3112)
- update to 6.1.1:
  * Upgrade Notes (6.1.x)
    - Errors are no longer returned during client initialization if
      the credential helper cannot be found. A warning will be
      emitted instead, and an error is returned if the credential
      helper is used.
  * Bugfixes
    - Fix containers.stats() hanging with stream=True
    - Correct return type in docs for containers.diff() method
- update to 6.1.0:
  * Upgrade Notes
    - Errors are no longer returned during client initialization if
      the credential helper cannot be found. A warning will be
      emitted instead, and an error is returned if the credential
      helper is used.
  * Features
    - Python 3.11 support
    - Use poll() instead of select() on non-Windows platforms
    - New API fields
      - network_driver_opt on container run / create
      - one-shot on container stats
      - status on services list
  * Bugfixes
    - Support for requests 2.29.0+ and urllib3 2.x
    - Do not strip characters from volume names
    - Fix connection leak on container.exec_* operations
    - Fix errors closing named pipes on Windows
- update to 6.0.1:
  * Notice
    This version is not compatible with requests 2.29+ or urllib3
    2.x.
    Either add requests &lt; 2.29 and urllib3 &lt; 2 to your requirements
    or upgrade to to the latest docker-py release.
  * Bugfixes
    - Fix for The pipe has been ended errors on Windows (#3056)
    - Support floats for timestamps in Docker logs (since / until)
      (#3031)
- update to 6.0.0:
  * Upgrade Notes
    - Minimum supported Python version is 3.7+
    - When installing with pip, the docker[tls] extra is deprecated
      and a no-op, use docker for same functionality (TLS support
      is always available now)
    - Native Python SSH client (used by default /
      use_ssh_client=False) will now
    - reject unknown host keys with
      paramiko.ssh_exception.SSHException
    - Short IDs are now 12 characters instead of 10 characters
      (same as Docker CLI)
    - Version metadata is now exposed as __version__
  * Features
    - Python 3.10 support
    - Automatically negotiate most secure TLS version
    - Add platform (e.g. linux/amd64, darwin/arm64) to container
      create &amp; run
    - Add support for GlobalJob and ReplicatedJobs for Swarm
    - Add remove() method on Image
    - Add force param to disable() on Plugin
  * Bugfixes
    - Fix install issues on Windows related to pywin32
    - Do not accept unknown SSH host keys in native Python SSH mode
    - Use 12 character short IDs for consistency with Docker CLI
    - Ignore trailing whitespace in .dockerignore files
    - Fix IPv6 host parsing when explicit port specified
    - Fix ProxyCommand option for SSH connections
    - Do not spawn extra subshell when launching external SSH
      client
    - Improve exception semantics to preserve context
    - Documentation improvements (formatting, examples, typos,
      missing params)
  * Miscellaneous
    - Upgrade dependencies in requirements.txt to latest versions
    - Remove extraneous transitive dependencies
    - Eliminate usages of deprecated functions/methods
    - Test suite reliability improvements
    - GitHub Actions workflows for linting, unit tests, integration
      tests, and publishing releases

- add sle15_python_module_pythons

- python-six is not required as well

- python-mock actually not required for build

- update to 5.0.3:
  * Add cap_add and cap_drop parameters to service create and ContainerSpec
  * Add templating parameter to config create
  * Bump urllib3 to 1.26.5
  * Bump requests to 2.26.0
  * Remove support for Python 2.7
  * Make Python 3.6 the minimum version supported

- Update to 4.4.4
From project changelog:
	4.4.4
		Bugfixes
			Remove LD_LIBRARY_PATH and SSL_CERT_FILE environment variables when shelling out to the ssh client
	4.4.3
		Features
			Add support for docker.types.Placement.MaxReplicas
		Bugfixes
			Fix SSH port parsing when shelling out to the ssh client
	4.4.2
		Bugfixes
			Fix SSH connection bug where the hostname was incorrectly trimmed and the error was hidden
			Fix docs example
		Miscellaneous
			Add Python3.8 and 3.9 in setup.py classifier list
	4.4.1
		Bugfixes
			Avoid setting unsuported parameter for subprocess.Popen on Windows
			Replace use of deprecated 'filter' argument on ''docker/api/image'

- update to 4.4.0:
  - Add an alternative SSH connection to the paramiko one, based on shelling out to the SSh client. Similar to the behaviour of Docker cli
  - Default image tag to `latest` on `pull`
  - Fix plugin model upgrade
  - Fix examples URL in ulimits
  - Improve exception messages for server and client errors
  - Bump cryptography from 2.3 to 3.2
  - Set default API version to `auto`
  - Fix conversion to bytes for `float`
  - Support OpenSSH `identityfile` option
  - Add `DeviceRequest` type to expose host resources such as GPUs
  - Add support for `DriverOpts` in EndpointConfig
  - Disable compression by default when using container.get_archive method
  - Update default API version to v1.39
  - Update test engine version to 19.03.12

- update to 4.2.2:
  - Fix context load for non-docker endpoints

- update to 4.2.1:
  - Add option on when to use `tls` on Context constructor
  - Make context orchestrator field optional

- Bump required version of pycreds to 0.4.0 (sync with requirements.txt)
- update to 3.7.0 (mandatory for latest docker-compose)
- add python-dockerpycreds dependency in the spec file
  rebase hide_py_pckgmgmt.patch
Changes in python-fakeredis:

- update to 2.21.0:
  * Implement all TOP-K commands (`TOPK.INFO`, `TOPK.LIST`,
    `TOPK.RESERVE`,
  * `TOPK.ADD`, `TOPK.COUNT`, `TOPK.QUERY`, `TOPK.INCRBY`) #278
  * Implement all cuckoo filter commands #276
  * Implement all Count-Min Sketch commands #277
  * Fix XREAD blocking bug #274 #275
  * EXAT option does not work #279

- update to 2.20.1:
  * Fix `XREAD` bug #256
  * Testing for python 3.12

- update to 2.20.0:
  * Implement `BITFIELD` command #247
  * Implement `COMMAND`, `COMMAND INFO`, `COMMAND COUNT` #248

- Remove unnecessary BR on python-lupa

- update to 2.19.0:
  * Implement Bloom filters commands #239
  * Fix error on blocking XREADGROUP #237

- update to 2.18.1:
  * Fix stream type issue #233

- update to 2.18.0:
  * Implement `PUBSUB NUMPAT` #195, `SSUBSCRIBE` #199, `SPUBLISH`
    #198, `SUNSUBSCRIBE` #200, `PUBSUB SHARDCHANNELS` #196, `PUBSUB
    SHARDNUMSUB` #197
  * Fix All aio.FakeRedis instances share the same server #218

- update to 2.17.0:
  * Implement `LPOS` #207, `LMPOP` #184, and `BLMPOP` #183
  * Implement `ZMPOP` #191, `BZMPOP` #186
  * Fix incorrect error msg for group not found #210
  * fix: use same server_key within pipeline when issued watch
    issue with ZRANGE and ZRANGESTORE with BYLEX #214
  * Implemented support for `JSON.MSET` #174, `JSON.MERGE` #181
  * Add support for version for async FakeRedis #205
  * Updated how to test django_rq #204

- update to 2.15.0:
  * Implemented support for various stream groups commands:
  * `XGROUP CREATE` #161, `XGROUP DESTROY` #164, `XGROUP SETID`
    #165, `XGROUP DELCONSUMER` #162,
  * `XGROUP CREATECONSUMER` #163, `XINFO GROUPS` #168, `XINFO
    CONSUMERS` #168, `XINFO STREAM` #169, `XREADGROUP` #171,
  * `XACK` #157, `XPENDING` #170, `XCLAIM` #159, `XAUTOCLAIM`
  * Implemented sorted set commands:
  * `ZRANDMEMBER` #192, `ZDIFF` #187, `ZINTER` #189, `ZUNION`
    #194, `ZDIFFSTORE` #188,
  * `ZINTERCARD` #190, `ZRANGESTORE` #193
  * Implemented list commands:
  * `BLMOVE` #182,
  * Improved documentation.
  * Fix documentation link
  * Fix requirement for packaging.Version #177
  * Implement `HRANDFIELD` #156
  * Implement `JSON.MSET`
  * Improve streams code

- update to 2.13.0:
  * Fixed xadd timestamp (fixes #151) (#152)
  * Implement XDEL #153
  * Improve test code
  * Fix reported security issue
  * Add support for `Connection.read_response` arguments used in
    redis-py 4.5.5 and 5.0.0
  * Adding state for scan commands (#99)
  * Improved documentation (added async sample, etc.)

- update to 2.12.0:
  * Implement `XREAD` #147
  * Unique FakeServer when no connection params are provided
  * Minor fixes supporting multiple connections
  * Update documentation
  * connection parameters awareness:
  * Creating multiple clients with the same connection parameters
    will result in the same server data structure.
  * Fix creating fakeredis.aioredis using url with user/password

- add sle15_python_module_pythons

- Update to 2.10.3:
  * Support for redis-py 5.0.0b1
  * Include tests in sdist (#133)
  * Fix import used in GenericCommandsMixin.randomkey (#135)
  * Fix async_timeout usage on py3.11 (#132)
  * Enable testing django-cache using FakeConnection.
  * All geo commands implemented
  * Fix bug for xrange
  * Fix bug for xrevrange
  * Implement XTRIM
  * Add support for MAXLEN, MAXID, LIMIT arguments for XADD command
  * Add support for ZRANGE arguments for ZRANGE command #127
  * Relax python version requirement #128
  * Support for redis-py 4.5.0 #125

- update to 2.7.1:
  * Fix import error for NoneType (#120)
  * Implement
      - JSON.ARRINDEX
      - JSON.OBJLEN
      - JSON.OBJKEYS
      - JSON.ARRPOP
      - JSON.ARRTRIM
      - JSON.NUMINCRBY
      - JSON.NUMMULTBY
      - XADD
      - XLEN
      - XRANGE
      - XREVRANGE
  * Implement `JSON.TYPE`, `JSON.ARRLEN` and `JSON.ARRAPPEND`
  * Fix encoding of None (#118)

- update to v2.5.0:
  * Implement support for BITPOS (bitmap command) (#112)
  * Fix json mget when dict is returned (#114)
  * fix: properly export (#116)
  * Extract param handling (#113)

- update to v2.4.0:
  * Implement LCS (#111), BITOP (#110)
  * Fix bug checking type in scan_iter (#109)
  * Implement GETEX (#102)
  * Implement support for JSON.STRAPPEND (json command) (#98)
  * Implement JSON.STRLEN, JSON.TOGGLE and fix bugs with JSON.DEL (#96)
  * Implement PUBSUB CHANNELS, PUBSUB NUMSUB
  * Implement JSON.CLEAR (#87)
  * Support for redis-py v4.4.0
  * Implement json.mget (#85)
  * Initial json module support - JSON.GET, JSON.SET and JSON.DEL (#80)
  * fix: add nowait for asyncio disconnect (#76)
  * Refactor how commands are registered (#79)
  * Refactor tests from redispy4_plus (#77)
  * Remove support for aioredis separate from redis-py (redis-py versions
    4.1.2 and below). (#65)
  * Add support for redis-py v4.4rc4 (#73)
  * Add mypy support  (#74)
  * Implement support for zmscore by @the-wondersmith in #67
  * What's Changed
  * implement GETDEL and SINTERCARD support by @cunla in #57
  * Test get float-type behavior by @cunla in #59
  * Implement BZPOPMIN/BZPOPMAX support by @cunla in #60
- drop fakeredis-pr54-fix-ensure_str.patch (upstream)

- Update to 1.9.3
  * Removed python-six dependency
  * zadd support for GT/LT by @cunla in #49
  * Remove six dependency by @cunla in #51
  * Add host to conn_pool_args by @cunla in #51
- Drop python-fakeredis-no-six.patch which was incomplete
  * all commits, including the missing ones in release now
- Add fakeredis-pr54-fix-ensure_str.patch

- use upstream
  https://github.com/cunla/fakeredis-py/pull/51/
- modified patches
  % python-fakeredis-no-six.patch (refreshed)

- version update to 1.9.1
  * Zrange byscore by @cunla in #44
  * Expire options by @cunla in #46
  * Enable redis7 support by @cunla in #42
- added patches
  fix https://github.com/cunla/fakeredis-py/issues/50
  + python-fakeredis-no-six.patch

- Update to 1.8.1
  * fix: allow redis 4.3.* by @terencehonles in #30
- Release 1.8
  * Fix handling url with username and password by @cunla in #27
  * Refactor tests by @cunla in #28
- Release 1.7.6
  * add IMOVE operation by @BGroever in #11
  * Add SMISMEMBER command by @OlegZv in #20
  * fix: work with redis.asyncio by @zhongkechen in #10
  * Migrate to poetry by @cunla in #12
  * Create annotation for redis4+ tests by @cunla in #14
  * Make aioredis and lupa optional dependencies by @cunla in #16
  * Remove aioredis requirement if redis-py 4.2+ by @ikornaselur in
    #19

- update to 1.7.0
  * Change a number of corner-case behaviours to match Redis 6.2.6.
  * Fix DeprecationWarning for sampling from a set
  * Improved support for constructor arguments
  * Support redis-py 4
  * Add support for GET option to SET
  * PERSIST and EXPIRE should invalidate watches

- Update to 1.6.1
  * #305 Some packaging modernisation
  * #306 Fix FakeRedisMixin.from_url for unix sockets
  * #308 Remove use of async_generator from tests
- Release 1.6.0
  * #304 Support aioredis 2
  * #302 Switch CI from Travis CI to Github Actions

- update to 1.5.2
 * support python 3.9
 * support aioredis

- Disable py2 as upstream actually disabled python2 support competely
  * The syntax simply is not compatible

- Update to 1.3.0:
  * No upstream changelog
- python2 tests are dysfunctional, test with python3 only

- Update to 1.0.5:
  * No upstream changelog

- Update to 1.0.4:
  * various bugfixes all around

- Update to v1.0.3
  * Support for redis 3.2
  (no effective changes in v1.0.2)

- Initial spec for v1.0.1
Changes in python-fixedint:

- Switch build system from setuptools to pyproject.toml
  + Add python-pip and python-wheel to BuildRequires
  + Replace %python_build with %pyproject_wheel
  + Replace %python_install with %pyproject_install
- Fix capitalization in Summary
- Limit Python files matched in %files section

- Switch package to modern Python Stack on SLE-15
  + Add %{?sle15_python_module_pythons}
  + Drop %{?!python_module:%define python_module() python-%{**} python3-%{**}}

- Initial build
  + Version 0.2.0
Changes in python-httplib2:
- require setuptools

- Clean up SPEC file.

- Add %{?sle15_python_module_pythons}

- update to 0.22.0:
  * https: disable_ssl_certificate_validation caused
    ValueError: Cannot set verify_mode to CERT_NONE when
    check_hostname is enabled

- Update to 0.21.0:
  * http: `Content-Encoding: deflate` must accept zlib encapsulation
  * https://github.com/httplib2/httplib2/pull/230
  * Begin support and CI against CPython 3.10 and 3.11.

- update to 0.20.4:
  proxy: support proxy urls with ipv6 address
  Tests compatible with Python3.10 and recent pytest.

- add pyparsing dependency

- update to 0.20.2:
  auth: support pyparsing v3
  proxy: correct extraction of errno from pysocks ProxyConnectionError
  IMPORTANT cacerts: remove expired DST Root CA X3, add ISRG Root X1, X2

- update to 0.19.1:
  * auth header parsing performance optimizations; Thanks to Paul McGuire
  * Use mock from the standard library on Python&gt;=3.3

  set first, othewise a 'ValueError: Cannot set
  verify_mode to CERT_NONE when check_hostname
  instead (bnc#761162)
          item not in cache
- initial version of python-httplib2 (0.2.0)
Changes in python-httpretty:
- Add patch 0001-Fix-test_417_openssl.py-if-pyOpenSSL-not-available.patch:
  * Fix tests without pyOpenSSL support in urllib3

- Allow building with python-urllib3 &gt;= 2.x

- Do not use python-boto3 when building in SLE where it's currently
  not available for python311

- Add %{?sle15_python_module_pythons}

- skip failing testsuite tests after requests update

- Add patch relax-test-callback-response.patch:
  * Relax timeout for test_callback_response (bsc#1209571) 

- Add patch 460-miliseconds_tests.patch (gh#gabrielfalcao/HTTPretty#460):
  * Correct tests for s390x and aarch64 because of timeout failures 
    after 2 miliseconds

- Fix test suite:
  * Remove nose idioms
  * Remove outdated test skips

- Add patch double-slash-paths.patch:
  * http.request may replace // with /, handle that in the testcase. 

- Add 453-fix-tests-pytest.patch (gh#gabrielfalcao/HTTPretty#449)
  to make tests compatible with pytest.

- Add patch remove-mock.patch:
  * Use unittest.mock in the functional tests. 

- specfile:
  * update copyright year
- update to version 1.1.4:
  * Bugfix: #435 Fallback to WARNING when logging.getLogger().level is
    None.
- changes from version 1.1.3:
  * Bugfix: #430 Respect socket timeout.
- changes from version 1.1.2:
  * Bugfix: #426 Segmentation fault when running against a large
    amount of tests with pytest --mypy.
- changes from version 1.1.1:
  * Bugfix: httpretty.disable() injects pyopenssl into
    :py:mod:`urllib3` even if it originally wasn't #417
  * Bugfix: 'Incompatibility with boto3 S3 put_object' #416
  * Bugfix: 'Regular expression for URL -&gt; TypeError: wrap_socket()
    missing 1 required' #413
  * Bugfix: 'Making requests to non-stadard port throws TimeoutError
    '#387
- changes from version 1.1.0:
  * Feature: Display mismatched URL within UnmockedError whenever
    possible. #388
  * Feature: Display mismatched URL via logging. #419
  * Add new properties to :py:class:`httpretty.core.HTTPrettyRequest`
    (protocol, host, url, path, method).

- Updater to 1.0.5
  * Bugfix: Support socket.socketpair() . #402
  * Bugfix: Prevent exceptions from re-applying monkey patches.
    #406
- Release 1.0.4
  * Python 3.8 and 3.9 support. #407

- Update to 1.0.3
  * Fix compatibility with urllib3&gt;=1.26. #410 

- Replace nose with nose2

- avoid reading DNS resolver settings
  gh#gabrielfalcao/HTTPretty#405
- remove unnecessary test packages

- Update to 1.0.2
  * Drop Python 2 support.
  * Fix usage with redis and improve overall real-socket passthrough.
  * Fix TypeError: wrap_socket() missing 1 required positional argument: 'sock'.
  * Fix simple typo: neighter -&gt; neither.
  * Updated documentation for register_uri concerning using ports.
  * Clarify relation between ``enabled`` and ``httprettized`` in API docs.
  * Align signature with builtin socket.

- Version update to 0.9.6:
  * Many fixes all around
  * Support for python 3.7
- Make sure we really run the tests

- Remove superfluous devel dependency for noarch package

Changes in python-javaproperties:
- Switch package to modern Python Stack on SLE-15
  + Add %{?sle15_python_module_pythons}

- version update to 0.8.1
  v0.8.1 (2021-10-05)
  -------------------
  - Fix a typing issue in Python 3.9
  - Support Python 3.10
  
  v0.8.0 (2020-11-28)
  -------------------
  - Drop support for Python 2.7, 3.4, and 3.5
  - Support Python 3.9
  - `ensure_ascii` parameter added to `PropertiesFile.dump()` and
    `PropertiesFile.dumps()`
  - **Bugfix**: When parsing XML input, empty `&lt;entry&gt;` tags now produce an empty
    string as a value, not `None`
  - Added type annotations
  - `Properties` and `PropertiesFile` no longer raise `TypeError` when given a
    non-string key or value, as type correctness is now expected to be enforced
    through static type checking
  - The `PropertiesElement` classes returned by `parse()` are no longer
    subclasses of `namedtuple`, but they can still be iterated over to retrieve
    their fields like a tuple
- python-six is not required
Changes in python-jsondiff:
- Switch build system from setuptools to pyproject.toml
  + Add python-pip and python-wheel to BuildRequires
  + Replace %python_build with %pyproject_wheel
  + Replace %python_install with %pyproject_install
- Limit Python files matched in %files section

- Add %{?sle15_python_module_pythons}

- Update to version 2.0.0
  * Removed deprecated function
  * Remove deprecated jsondiff entry point
- from version 1.3.1
  * Optionally allow different escape_str than '$'
  * Clarified the readme, closes #23
  * Fixed readme
- Remove jsondiff command from %install, %post, %postun and %files sections
Changes in python-knack:
- Switch package to modern Python Stack on SLE-15
  + Add %{?sle15_python_module_pythons}
  + Drop %{?!python_module:%define python_module() python-%{**} python3-%{**}}
  + Drop %define skip_python2 1

- Update to version 0.11.0
  * Declare support for Python 3.11 and drop support for Python 3.7 (#275)
  * Stop converting argument's `bool` default value to `DefaultInt` (#273)

- Update to version 0.10.1
  * Support bytearray serialization (#268)

- Update to version 0.10.0
  * Enable Virtual Terminal mode on legacy Windows terminal
    to support ANSI escape sequences (#265)
  * Drop Python 3.6 support (#259)

- python-mock is not required for build
Changes in python-marshmallow:
- Switch build system from setuptools to pyproject.toml
  + Add python-pip and python-wheel to BuildRequires
  + Replace %python_build with %pyproject_wheel
  + Replace %python_install with %pyproject_install
- Limit Python files matched in %files section

- update to 3.20.2:
  * Bug fixes: - Fix Nested field type hint for lambda Schema
    types (:pr:`2164`).
  * Other changes: - Officially support Python 3.12 (:pr:`2188`).

- update to 3.20.1:
  * Fix call to ``get_declared_fields``: pass ``dict_cls`` again
  * Add ``absolute`` parameter to ``URL`` validator and ``Url``
  * Use Abstract Base Classes to define ``FieldABC`` and
    ``SchemaABC``
  * Use `OrderedSet` as default `set_class`. Schemas are now
    ordered by default.
  * Handle ``OSError`` and ``OverflowError`` in
    ``utils.from_timestamp`` (:pr:`2102`).
  * Fix the default inheritance of nested partial schemas
  * Officially support Python 3.11 (:pr:`2067`).
  * Drop support for Python 3.7 (:pr:`2135`).

- Switch documentation to be within the main package on SLE15
- rename docs subpackage to the more common doc name
- Update to 3.19.0
  * Add timestamp and timestamp_ms formats to fields.DateTime (#612). Thanks @vgavro for    the suggestion and thanks @vanHoi for the PR.

Changes in python-opencensus:
- Add Obsoletes for old python3 package on SLE-15
- Switch build system from setuptools to pyproject.toml
  + Add python-pip and python-wheel to BuildRequires
  + Replace %python_build with %pyproject_wheel
  + Replace %python_install with %pyproject_install
- Update to 0.11.4
  * Changed bit-mapping for `httpx` and `fastapi` integrations
- Refresh patches for new version
  * opencensus-pr1002-remove-mock.patch
- Switch package to modern Python Stack on SLE-15
  * Add %{?sle15_python_module_pythons}
  * Drop %{?!python_module:%define python_module() python-%{**} python3-%{**}}

- update to 0.11.3
  * Updated azure modules
- sorry, six is still needed :(

- update to 0.11.2:
  * Updated `azure`, `fastapi`,`flask` modules
  * Updated `azure`, `httpx` modules

- Update to 0.11.0
  * Updated `azure`, `context`, `flask`, `requests` modules
- from version 0.10.0
  * Add kwargs to derived gauge (#1135)
- from version 0.9.0
  * Make sure handler.flush() doesn't deadlock (#1112)
- Refresh patches for new version
  * opencensus-pr1002-remove-mock.patch
- Update Requires from setup.py

Changes in python-opencensus-context:
- Clean up the SPEC file
- Switch package to modern Python Stack on SLE-15
  + Add %{?sle15_python_module_pythons}
  + Drop %{?!python_module:%define python_module() python-%{**} python3-%{**}}
- Update to 0.1.3
  * Move `version.py` file into `runtime_context` folder (#1143)
Changes in python-opencensus-ext-threading:
- Switch package to modern Python Stack on SLE-15
  + Add %{?sle15_python_module_pythons}
  + Drop %{?!python_module:%define python_module() python-%{**} python3-%{**}}
  + Drop build support for Python 2.x
Changes in python-opentelemetry-api:
- update to 1.23.0:
  * Use Attribute rather than boundattribute in logrecord (#3567)
  * Fix flush error when no LoggerProvider configured for LoggingHandler (#3608)
  * Fix OTLPMetricExporter ignores preferred_aggregation property (#3603)
  * Logs: set observed_timestamp field (#3565)
  * Add missing Resource SchemaURL in OTLP exporters (#3652)
  * Fix loglevel warning text (#3566)
  * Prometheus Exporter string representation for target_info labels (#3659)
  * Logs: ObservedTimestamp field is missing in console exporter output (#3564)
  * Fix explicit bucket histogram aggregation (#3429)
  * Add code.lineno, code.function and code.filepath to all logs (#3645)
  * Add Synchronous Gauge instrument (#3462)
  * Drop support for 3.7 (#3668)
  * Include key in attribute sequence warning (#3639)
  * Upgrade markupsafe, Flask and related dependencies to dev and test
    environments (#3609)
  * Handle HTTP 2XX responses as successful in OTLP exporters (#3623)
  * Improve Resource Detector timeout messaging (#3645)
  * Add Proxy classes for logging (#3575)
  * Remove dependency on 'backoff' library (#3679)

- update to 1.22.0:
  * Prometheus exporter sanitize info metric (#3572)
  * Remove Jaeger exporters (#3554)
  * Log stacktrace on `UNKNOWN` status OTLP export error  (#3536)
  * Fix OTLPExporterMixin shutdown timeout period (#3524)
  * Handle `taskName` `logrecord` attribute (#3557)

- update to 1.21.0:
  * Fix `SumAggregation`(#3390)
  * Fix handling of empty metric collection cycles (#3335)
  * Fix error when no LoggerProvider configured for
    LoggingHandler (#3423)
  * Make `opentelemetry_metrics_exporter` entrypoint support pull
    exporters (#3428)
  * Allow instrument names to have '/' and up to 255 characters
    (#3442)
  * Do not load Resource on sdk import (#3447)
  * Update semantic conventions to version 1.21.0 (#3251)
  * Add missing schema_url in global api for logging and metrics
    (#3251)
  * Prometheus exporter support for auto instrumentation  (#3413)
  * Modify Prometheus exporter to translate non-monotonic Sums
    into Gauges (#3306)
  * Update the body type in the log ($3343)
  * Add max_scale option to Exponential Bucket Histogram
    Aggregation  (#3323)
  * Use BoundedAttributes instead of raw dict to extract
    attributes from LogRecord (#3310)
  * Support dropped_attributes_count in LogRecord and exporters
    (#3351)
  * Add unit to view instrument selection criteria (#3341)
  * Upgrade opentelemetry-proto to 0.20 and regen #3355)
  * Include endpoint in Grpc transient error warning #3362)
  * Fixed bug where logging export is tracked as trace #3375)
  * Select histogram aggregation with an environment variable
  * Move Protobuf encoding to its own package (#3169)
  * Add experimental feature to detect resource detectors in auto
    instrumentation (#3181)
  * Fix exporting of ExponentialBucketHistogramAggregation from
    opentelemetry.sdk.metrics.view (#3240)
  * Fix headers types mismatch for OTLP Exporters (#3226)
  * Fix suppress instrumentation for log batch processor (#3223)
  * Add speced out environment variables and arguments for
    BatchLogRecordProcessor (#3237)

    - Fix `ParentBased` sampler for implicit parent spans. Fix also `trace_state`
      erasure for dropped spans or spans sampled by the `TraceIdRatioBased` sampler.
Changes in python-opentelemetry-sdk:

- Add missing python-wheel build dependency to BuildRequires

- update to 1.23.0:
  * Use Attribute rather than boundattribute in logrecord (#3567)
  * Fix flush error when no LoggerProvider configured for LoggingHandler (#3608)
  * Fix OTLPMetricExporter ignores preferred_aggregation property (#3603)
  * Logs: set observed_timestamp field (#3565)
  * Add missing Resource SchemaURL in OTLP exporters (#3652)
  * Fix loglevel warning text (#3566)
  * Prometheus Exporter string representation for target_info labels (#3659)
  * Logs: ObservedTimestamp field is missing in console exporter output (#3564)
  * Fix explicit bucket histogram aggregation (#3429)
  * Add code.lineno, code.function and code.filepath to all logs (#3645)
  * Add Synchronous Gauge instrument (#3462)
  * Drop support for 3.7 (#3668)
  * Include key in attribute sequence warning (#3639)
  * Upgrade markupsafe, Flask and related dependencies to dev and test
    environments (#3609)
  * Handle HTTP 2XX responses as successful in OTLP exporters (#3623)
  * Improve Resource Detector timeout messaging (#3645)
  * Add Proxy classes for logging (#3575)
  * Remove dependency on 'backoff' library (#3679)

- update to 1.23.0:
  * Use Attribute rather than boundattribute in logrecord (#3567)
  * Fix flush error when no LoggerProvider configured for LoggingHandler (#3608)
  * Fix OTLPMetricExporter ignores preferred_aggregation property (#3603)
  * Logs: set observed_timestamp field (#3565)
  * Add missing Resource SchemaURL in OTLP exporters (#3652)
  * Fix loglevel warning text (#3566)
  * Prometheus Exporter string representation for target_info labels (#3659)
  * Logs: ObservedTimestamp field is missing in console exporter output (#3564)
  * Fix explicit bucket histogram aggregation (#3429)
  * Add code.lineno, code.function and code.filepath to all logs (#3645)
  * Add Synchronous Gauge instrument (#3462)
  * Drop support for 3.7 (#3668)
  * Include key in attribute sequence warning (#3639)
  * Upgrade markupsafe, Flask and related dependencies to dev and test
    environments (#3609)
  * Handle HTTP 2XX responses as successful in OTLP exporters (#3623)
  * Improve Resource Detector timeout messaging (#3645)
  * Add Proxy classes for logging (#3575)
  * Remove dependency on 'backoff' library (#3679)

- Switch package to modern Python Stack on SLE-15
  + Add %{?sle15_python_module_pythons}

- Initial package (1.22.0)
Changes in python-opentelemetry-semantic-conventions:

- update to 0.44b0:
  * Use Attribute rather than boundattribute in logrecord (#3567)
  * Fix flush error when no LoggerProvider configured for LoggingHandler (#3608)
  * Fix OTLPMetricExporter ignores preferred_aggregation property (#3603)
  * Logs: set observed_timestamp field (#3565)
  * Add missing Resource SchemaURL in OTLP exporters (#3652)
  * Fix loglevel warning text (#3566)
  * Prometheus Exporter string representation for target_info labels (#3659)
  * Logs: ObservedTimestamp field is missing in console exporter output (#3564)
  * Fix explicit bucket histogram aggregation (#3429)
  * Add code.lineno, code.function and code.filepath to all logs (#3645)
  * Add Synchronous Gauge instrument (#3462)
  * Drop support for 3.7 (#3668)
  * Include key in attribute sequence warning (#3639)
  * Upgrade markupsafe, Flask and related dependencies to dev and test
    environments (#3609)
  * Handle HTTP 2XX responses as successful in OTLP exporters (#3623)
  * Improve Resource Detector timeout messaging (#3645)
  * Add Proxy classes for logging (#3575)
  * Remove dependency on 'backoff' library (#3679)

- update to 0.43b0:
  * Prometheus exporter sanitize info metric
  * Remove Jaeger exporters
  * Log stacktrace on `UNKNOWN` status OTLP export error
  * Fix OTLPExporterMixin shutdown timeout period
  * Handle `taskName` `logrecord` attribute
  * Fix `SumAggregation`
  * Fix handling of empty metric collection cycles
  * Fix error when no LoggerProvider configured for
    LoggingHandler
  * Make `opentelemetry_metrics_exporter` entrypoint support pull
    exporters
  * Allow instrument names to have '/' and up to 255 characters
  * Do not load Resource on sdk import
  * Update semantic conventions to version 1.21.0
  * Add missing schema_url in global api for logging and metrics
  * Prometheus exporter support for auto instrumentation
  * Drop `setuptools` runtime requirement.
  * Update the body type in the log ($3343)
  * Add max_scale option to Exponential Bucket Histogram
    Aggregation
  * Use BoundedAttributes instead of raw dict to extract
    attributes from LogRecord
  * Support dropped_attributes_count in LogRecord and exporters
  * Add unit to view instrument selection criteria
  * Upgrade opentelemetry-proto to 0.20 and regen #3355)
  * Include endpoint in Grpc transient error warning #3362)
  * Fixed bug where logging export is tracked as trace #3375)
  * Select histogram aggregation with an environment variable
  * Move Protobuf encoding to its own package
  * Add experimental feature to detect resource detectors in auto
    instrumentation
  * Fix exporting of ExponentialBucketHistogramAggregation from
    opentelemetry.sdk.metrics.view
  * Fix headers types mismatch for OTLP Exporters
  * Fix suppress instrumentation for log batch processor
  * Add speced out environment variables and arguments for
    BatchLogRecordProcessor

- Initial build
  + Version 0.25b2
Changes in python-opentelemetry-test-utils:

- update to 0.44b0:
  * Use Attribute rather than boundattribute in logrecord (#3567)
  * Fix flush error when no LoggerProvider configured for LoggingHandler (#3608)
  * Fix OTLPMetricExporter ignores preferred_aggregation property (#3603)
  * Logs: set observed_timestamp field (#3565)
  * Add missing Resource SchemaURL in OTLP exporters (#3652)
  * Fix loglevel warning text (#3566)
  * Prometheus Exporter string representation for target_info labels (#3659)
  * Logs: ObservedTimestamp field is missing in console exporter output (#3564)
  * Fix explicit bucket histogram aggregation (#3429)
  * Add code.lineno, code.function and code.filepath to all logs (#3645)
  * Add Synchronous Gauge instrument (#3462)
  * Drop support for 3.7 (#3668)
  * Include key in attribute sequence warning (#3639)
  * Upgrade markupsafe, Flask and related dependencies to dev and test
    environments (#3609)
  * Handle HTTP 2XX responses as successful in OTLP exporters (#3623)
  * Improve Resource Detector timeout messaging (#3645)
  * Add Proxy classes for logging (#3575)
  * Remove dependency on 'backoff' library (#3679)

- Initial package (0.43b0)
Changes in python-pycomposefile:

- Switch package to modern Python Stack on SLE-15
  + Add %{?sle15_python_module_pythons}

- Initial build
  + Version 0.0.30
Changes in python-pydash:

- Switch package to modern Python Stack on SLE-15
  + Add %{?sle15_python_module_pythons}
  + Drop %{?!python_module:%define python_module() python-%{**} python3-%{**}}

- Update to version 6.0.2
  * Only prevent access to object paths containing ``__globals__`` or
    ``__builtins__`` instead of all dunder-methods for non-dict/list
    objects.
- from version 6.0.1
  * Fix exception raised due to mishandling of non-string keys in functions
    like ``get()`` for non-dict/list objects that used integer index references
    like ``'[0]'``.
- from version 6.0.0
  * Prevent access to object paths containing dunder-methods in functions like
    ``get()`` for non-dict/list objects. Attempting to access dunder-methods
    using get-path keys will raise a ``KeyError`` (e.g. ``get(SomeClass(),
    '__init__'`` will raise). Access to dict keys are unaffected (e.g.
    ``get({'__init__': True}, '__init__')`` will return ``True``).
    (**breaking change**)
  * Add support for Python 3.11.
  * Drop support for Python 3.6 (**breaking change**)
- from version 5.1.2
  * Remove unnecessary type check and conversion for ``exceptions``
    argument in ``pydash.retry``.
- from version 5.1.1
  * Add support for Python 3.10.
  * Fix timing assertion issue in test for ``pydash.delay`` where it could
    fail on certain environments.
- Switch build system from setuptools to pyproject.toml
- Update BuildRequires from pyproject.toml

- version update to 5.1.0
  v5.1.0 (2021-10-02)
  -------------------
  - Support matches-style callbacks on non-dictionary objects that are compatible with ``pydash.get`` in functions like ``pydash.find``.
  v5.0.2 (2021-07-15)
  -------------------
  - Fix compatibility issue between ``pydash.py_`` / ``pydash._`` and ``typing.Protocol`` + ``typing.runtime_checkable`` 
    that caused an exception to be raised for ``isinstance(py_, SomeRuntimeCheckableProtocol)``.
  v5.0.1 (2021-06-27)
  -------------------
  - Fix bug in ``merge_with`` that prevented custom iteratee from being used when recursively merging. Thanks weineel_!
  v5.0.0 (2021-03-29)
  -------------------
  - Drop support for Python 2.7. (**breaking change**)
  - Improve Unicode word splitting in string functions to be inline with Lodash. Thanks mervynlee94_! (**breaking change**)
    - ``camel_case``
    - ``human_case``
    - ``kebab_case``
    - ``lower_case``
    - ``pascal_case``
    - ``separator_case``
    - ``slugify``
    - ``snake_case``
    - ``start_case``
    - ``upper_case``
  - Optimize regular expression constants used in ``pydash.strings`` by pre-compiling them to regular expression pattern objects.
  v4.9.3 (2021-03-03)
  -------------------
  - Fix regression introduced in ``v4.8.0`` that caused ``merge`` and ``merge_with`` to raise an exception when passing ``None`` 
    as the first argument.
  v4.9.2 (2020-12-24)
  -------------------
  - Fix regression introduced in ``v4.9.1`` that broke ``pydash.get`` for dictionaries and dot-delimited keys that reference
    integer dict-keys.
  v4.9.1 (2020-12-14)
  -------------------
  - Fix bug in ``get/has`` that caused ``defaultdict`` objects to get populated on key access.
  v4.9.0 (2020-10-27)
  -------------------
  - Add ``default_to_any``. Thanks gonzalonaveira_!
  - Fix mishandling of key names containing ``\.`` in ``set_``, ``set_with``, and ``update_with`` where the ``.`` was not
    treated as a literal value within the key name. Thanks zhaowb_!
- python-mock is not required for build

- Activate test suite
- Update to v4.8.0

- Initial spec for v4.7.6
Changes in python-redis:
- Switch build system from setuptools to pyproject.toml
  + Add python-pip and python-wheel to BuildRequires
  + Replace %python_build with %pyproject_wheel
  + Replace %python_install with %pyproject_install

- add https://github.com/redis/redis-py/pull/3005 as
  Close-various-objects-created-during-asyncio-tests.patch
  to fix tests for python 3.12

- Add patch to increase timeouts in s390x where tests take longer
  to run:
  * increase-test-timeout.patch

- Disable broken tests for ppc64le, bsc#1216606

- Add pytest.ini source needed to run tests
- Remove/disable broken tests because of suse environment

- drop tox.ini. seems it does no longer exist in 5.0.1
- add support to easily disable the testsuite at build time

- update to 5.0.1
  - New Features
    - Provide aclose() / close() for classes requiring lifetime
      management (#2898)
    - Add support for ModuleCommands in cluster (#2951)
    - Add support for multiple values in RPUSHX (#2949)
    - Add Redis.from_pool() class method, for explicitly owning and
      closing a ConnectionPool (#2913)
  - Bug Fixes
    - Fixing monitor parsing for messages containing specific
      substrings (#2950)
    - Cluster determine slot command name need to be upper (#2919)
    - Support timeout = 0 in search query (#2934)
    - Fix async sentinel: add push_request keyword argument to
      read_response (#2922)
    - Fix protocol checking for search commands (#2923)
    - Fix: SentinelManagedConnection.read_response() got an
      unexpected keyword argument 'push_request' (#2894)
    - Fix: automatically close connection pool for async Sentinel
      (#2900)
    - Save a reference to created async tasks, to avoid tasks
      potentially disappearing (#2816)
    - Avoid reference cycling by the garbage collector during
      response reading (#2932)
  - Maintenance
    - Type hint improvements (#2952)
    - Replace clear_connect_callbacks with
      _deregister_connect_callback (#2955)
    - Async fixes, remove del and other things (#2870)
    - Add pagination, sorting and grouping examples to search json
      example (#2890)
    - Remove process-id checks from asyncio. Asyncio and fork()
      does not mix. (#2911)
    - Fix resource usage and cleanup Mocks in the unit tests
      (#2936)
    - Remove mentions of tox (#2929)
    - Add 7.2 to supported Redis versions (#2896)
    - Fix resource warnings in unit tests (#2899)
    - Fix typo in redis-stream-example.ipynb (#2918)
    - Deprecate RedisGraph (#2927)
    - Fix redis 7.2.0 tests (#2902)
    - Fix test_scorer (search) (#2920)
- changes from 5.0.0
  - What's new?
    - Triggers and Functions support Triggers and Functions allow
      you to execute server-side functions triggered when key
      values are modified or created in Redis, a stream entry
      arrival, or explicitly calling them. Simply put, you can
      replace Lua scripts with easy-to-develop JavaScript or
      TypeScript code. Move your business logic closer to the data
      to ensure a lower latency, and forget about updating
      dependent key values manually in your code. Try it for
      yourself with Quick start
    - Full Redis 7.2 and RESP3 support
    - Python 3.7 End-of-Life
      - Python 3.7 has reached its end-of-life (EOL) as of June
        2023. This means that starting from this date, Python 3.7
        will no longer receive any updates, including security
        patches, bug fixes, or improvements. If you continue to use
        Python 3.7 post-EOL, you may expose your projects and
        systems to potential security vulnerabilities. We ended its
        support in this version and strongly recommend migrating to
        Python 3.10.
  - Bug Fixes
    - Fix timeout retrying on pipeline execution (#2812)
    - Fix socket garbage collection (#2859)
  - Maintenance
    - Updating client license to clear, MIT (#2884)
    - Add py.typed in accordance with PEP-561 (#2738)
    - Dependabot label change (#2880)
    - Fix type hints in SearchCommands (#2817)
    - Add sync modules (except search) tests to cluster CI (#2850)
    - Fix a duplicate word in CONTRIBUTING.md (#2848)
    - Fixing doc builds (#2869)
    - Change cluster docker to edge and enable debug command
      (#2853)
- changes from 4.6.0
  - Experimental Features
    - Support JSON.MERGE command (#2761)
    - Support JSON.MSET command (#2766)
  - New Features
    - Extract abstract async connection class (#2734)
    - Add support for WAITAOF (#2760)
    - Introduce OutOfMemoryError exception for Redis write command rejections due to OOM errors (#2778)
    - Add WITHSCORE argument to ZRANK (#2758)
  - Bug Fixes
    - Fix dead weakref in sentinel connection causing ReferenceError (#2767) (#2771)
    - Fix Key Error in parse_xinfo_stream (#2788)
    - Remove unnecessary __del__ handlers (#2755)
    - Added support for missing argument to SentinelManagedConnection.read_response() (#2756)
  - Maintenance
    - Fix type hint for retry_on_error in async cluster (#2804)
    - Clean up documents and fix some redirects (#2801)
    - Add unit tests for the connect method of all Redis connection classes (#2631)
    - Docstring formatting fix (#2796)

- update to 4.5.5:
  * Add support for CLIENT NO-TOUCH
  * Add support for CLUSTER MYSHARDID
  * Add 'address_remap' feature to RedisCluster
  * Add WITHSCORES argument to ZREVRANK command
  * Improve error output for master discovery
  * Fix XADD: allow non negative maxlen
  * Fix create single connection client from url
  * Optionally disable disconnects in read_response
  * Fix SLOWLOG GET return value
  * Fix potential race condition during disconnection
  * Return response in case of KeyError
  * Fix incorrect usage of once flag in async Sentinel
  * Fix memory leak caused by hiredis in asyncio case
  * Really do not use asyncio's timeout lib before 3.11.2

- add sle15_python_module_pythons

- Update to 4.5.4:
  * Security
    + Cancelling an async future does not, properly trigger, leading to a
      potential data leak in specific cases. (CVE-2023-28858, bsc#1209811)
    + Cancelling an async future does not, properly trigger, leading to a
      potential data leak in specific cases. (CVE-2023-28859, bsc#1209812)
  * New Features
    + Introduce AbstractConnection so that UnixDomainSocketConnection can
      call super().init (#2588)
    + Added queue_class to REDIS_ALLOWED_KEYS (#2577)
    + Made search document subscriptable (#2615)
    + Sped up the protocol parsing (#2596)
    + Use hiredis::pack_command to serialized the commands. (#2570)
    + Add support for unlink in cluster pipeline (#2562)
  * Bug Fixes
    + Fixing cancelled async futures (#2666)
    + Fix: do not use asyncio's timeout lib before 3.11.2 (#2659)
    + Fix UDS in v4.5.2: UnixDomainSocketConnection missing constructor
      argument (#2630)
    + CWE-404 AsyncIO Race Condition Fix (#2624, #2579)
    + Fix behaviour of async PythonParser to match RedisParser as for
      issue #2349 (#2582)
    + Replace async_timeout by asyncio.timeout (#2602)
    + Update json().arrindex() default values (#2611)
    + Fix #2581 UnixDomainSocketConnection object has no attribute
      _command_packer (#2583)
    + Fix issue with pack_commands returning an empty byte sequence (#2416)
    + Async HiredisParser should finish parsing after a
      Connection.disconnect() (#2557)
    + Check for none, prior to raising exception (#2569)
    + Tuple function cannot be passed more than one argument (#2573)
    + Synchronise concurrent command calls to single-client to single-client
      mode (#2568)
    + Async: added 'blocking' argument to call lock method (#2454)
    + Added a replacement for the default cluster node in the event of
      failure. (#2463)
    + Fixed geosearch: Wrong number of arguments for geosearch command (#2464)
- Clean up BuildRequires and Requires.

- Disable broken test test_xautoclaim gh#redis/redis-py#2554
- udpate to 4.3.5:
  * Add support for TIMESERIES 1.8 (#2296)
  * Graph - add counters for removed labels and properties (#2292)
  * Add support for TDIGEST.QUANTILE extensions (#2317)
  * Add TDIGEST.TRIMMED_MEAN (#2300)
  * Add support for async GRAPH module (#2273)
  * Support TDIGEST.MERGESTORE and make compression optional on TDIGEST.CREATE
    (#2319)
  * Adding reserve as an alias for create, so that we have BF.RESERVE and
    CF.RESERVE accuratenly supported (#2331)
  * Fix async connection.is_connected to return a boolean value (#2278)
  * Fix: workaround asyncio bug on connection reset by peer (#2259)
  * Fix crash: key expire while search (#2270)
  * Async cluster: fix concurrent pipeline (#2280)
  * Fix async SEARCH pipeline (#2316)
  * Fix KeyError in async cluster - initialize before execute multi key
    commands (#2439)
  * Supply chain risk reduction: remove dependency on library named deprecated
    (#2386)
  * Search test - Ignore order of the items in the response (#2322)
  * Fix GRAPH.LIST &amp; TDIGEST.QUANTILE tests (#2335)
  * Fix TimeSeries range aggregation (twa) tests (#2358)
  * Mark TOPK.COUNT as deprecated (#2363)

- update to 4.3.4:
  * Fix backward compatibility from 4.3.2 in Lock.acquire()
  * Fix XAUTOCLAIM to return the full response, instead of only keys 2+
  * Added dynamic_startup_nodes configuration to RedisCluster.
  * Fix retries in async mode
  * Async cluster: fix simultaneous initialize
  * Uppercased commands in CommandsParser.get_keys
  * Late eval of the skip condition in async tests
  * Reuse the old nodes' connections when a cluster topology refresh is being done
  * Docs: add pipeline examples
  * Correct retention_msecs value
  * Cluster: use pipeline to execute split commands
  * Docs: Add a note about client_setname and client_name difference

- Delete unused redismod.conf, remove duplicate Source entry for
  tox.ini

- Add redismod.conf and tox.ini as Sources to SPEC file.

- Update to version 4.3.3
  * Fix Lock crash, and versioning 4.3.3 (#2210)
  * Async cluster: improve docs (#2208)
- Release 4.3.2
  * SHUTDOWN - add support for the new NOW, FORCE and ABORT modifiers (#2150)
  * Adding pipeline support for async cluster (#2199)
  * Support CF.MEXISTS + Clean bf/commands.py (#2184)
  * Extending query_params for FT.PROFILE (#2198)
  * Implementing ClusterPipeline Lock (#2190)
  * Set default response_callbacks to redis.asyncio.cluster.ClusterNode (#2201)
  * Add default None for maxlen at xtrim command (#2188)
  * Async cluster: add/update typing (#2195)
  * Changed list type to single element type (#2203)
  * Made sync lock consistent and added types to it (#2137)
  * Async cluster: optimisations (#2205)
  * Fix typos in README (#2206)
  * Fix modules links to https://redis.io/commands/ (#2185)

- Update to version 4.3.1
    * Allow negative `retries` for `Retry` class to retry forever
    * Add `items` parameter to `hset` signature
    * Create codeql-analysis.yml (#1988). Thanks @chayim
    * Add limited support for Lua scripting with RedisCluster
    * Implement `.lock()` method on RedisCluster
    * Fix cursor returned by SCAN for RedisCluster &amp; change default
      target to PRIMARIES
    * Fix scan_iter for RedisCluster
    * Remove verbose logging when initializing ClusterPubSub,
      ClusterPipeline or RedisCluster
    * Fix broken connection writer lock-up for asyncio (#2065)
    * Fix auth bug when provided with no username (#2086)
- Release 4.1.3
    * Fix flushdb and flushall (#1926)
    * Add redis5 and redis4 dockers (#1871)
    * Change json.clear test multi to be up to date with redisjson
      (#1922)
    * Fixing volume for unstable_cluster docker (#1914)
    * Update changes file with changes since 4.0.0-beta2 (#1915)
- Release 4.1.2
    * Invalid OCSP certificates should raise ConnectionError on
      failed validation (#1907)
    * Added retry mechanism on socket timeouts when connecting to
      the server (#1895)
    * LMOVE, BLMOVE return incorrect responses (#1906)
    * Fixing AttributeError in UnixDomainSocketConnection (#1903)
    * Fixing TypeError in GraphCommands.explain (#1901)
    * For tests, increasing wait time for the cluster (#1908)
    * Increased pubsub's wait_for_messages timeout to prevent flaky
      tests (#1893)
    * README code snippets formatted to highlight properly (#1888)
    * Fix link in the main page (#1897)
    * Documentation fixes: JSON Example, SSL Connection Examples,
      RTD version (#1887)
    * Direct link to readthedocs (#1885)
- Release 4.1.1
    * Add retries to connections in Sentinel Pools (#1879)
    * OCSP Stapling Support (#1873)
    * Define incr/decr as aliases of incrby/decrby (#1874)
    * FT.CREATE - support MAXTEXTFIELDS, TEMPORARY, NOHL, NOFREQS,
      SKIPINITIALSCAN (#1847)
    * Timeseries docs fix (#1877)
    * get_connection: catch OSError too (#1832)
    * Set keys var otherwise variable not created (#1853)
    * Clusters should optionally require full slot coverage (#1845)
    * Triple quote docstrings in client.py PEP 257 (#1876)
    * syncing requirements (#1870)
    * Typo and typing in GraphCommands documentation (#1855)
    * Allowing poetry and redis-py to install together (#1854)
    * setup.py: Add project_urls for PyPI (#1867)
    * Support test with redis unstable docker (#1850)
    * Connection examples (#1835)
    * Documentation cleanup (#1841)
- Release 4.1.0
    * OCSP stapling support (#1820)
    * Support for SELECT (#1825)
    * Support for specifying error types with retry (#1817)
    * Support for RESET command since Redis 6.2.0 (#1824)
    * Support CLIENT TRACKING (#1612)
    * Support WRITE in CLIENT PAUSE (#1549)
    * JSON set_file and set_path support (#1818)
    * Allow ssl_ca_path with rediss:// urls (#1814)
    * Support for password-encrypted SSL private keys (#1782)
    * Support SYNC and PSYNC (#1741)
    * Retry on error exception and timeout fixes (#1821)
    * Fixing read race condition during pubsub (#1737)
    * Fixing exception in listen (#1823)
    * Fixed MovedError, and stopped iterating through startup nodes
      when slots are fully covered (#1819)
    * Socket not closing after server disconnect (#1797)
    * Single sourcing the package version (#1791)
    * Ensure redis_connect_func is set on uds connection (#1794)
    * SRTALGO - Skip for redis versions greater than 7.0.0 (#1831)
    * Documentation updates (#1822)
    * Add CI action to install package from repository commit hash
      (#1781) (#1790)
    * Fix link in lmove docstring (#1793)
    * Disabling JSON.DEBUG tests (#1787)
    * Migrated targeted nodes to kwargs in Cluster Mode (#1762)
    * Added support for MONITOR in clusters (#1756)
    * Adding ROLE Command (#1610)
    * Integrate RedisBloom support (#1683)
    * Adding RedisGraph support (#1556)
    * Allow overriding connection class via keyword arguments
      (#1752)
    * Aggregation LOAD * support for RediSearch (#1735)
    * Adding cluster, bloom, and graph docs (#1779)
    * Add packaging to setup_requires, and use &gt;= to play nice to
      setup.py (fixes #1625) (#1780)
    * Fixing the license link in the readme (#1778)
    * Removing distutils from tests (#1773)
    * Fix cluster ACL tests (#1774)
    * Improved RedisCluster's reinitialize_steps and documentation
      (#1765)
    * Added black and isort (#1734)
    * Link Documents for all module commands (#1711)
    * Pyupgrade + flynt + f-strings (#1759)
    * Remove unused aggregation subclasses in RediSearch (#1754)
    * Adding RedisCluster client to support Redis Cluster Mode
      (#1660)
    * Support RediSearch FT.PROFILE command (#1727)
    * Adding support for non-decodable commands (#1731)
    * COMMAND GETKEYS support (#1738)
    * RedisJSON 2.0.4 behaviour support (#1747)
    * Removing deprecating distutils (PEP 632) (#1730)
    * Updating PR template (#1745)
    * Removing duplication of Script class (#1751)
    * Splitting documentation for read the docs (#1743)
    * Improve code coverage for aggregation tests (#1713)
    * Fixing COMMAND GETKEYS tests (#1750)
    * GitHub release improvements (#1684)
- Release 4.0.2
    * Restoring Sentinel commands to redis client (#1723)
    * Better removal of hiredis warning (#1726)
    * Adding links to redis documents in function calls (#1719)
- Release 4.0.1
    * Removing command on initial connections (#1722)
    * Removing hiredis warning when not installed (#1721)
- Release 4.0.0
    * FT.EXPLAINCLI intentionally raising NotImplementedError
    * Restoring ZRANGE desc for Redis &lt; 6.2.0 (#1697)
    * Response parsing occasionally fails to parse floats (#1692)
    * Re-enabling read-the-docs (#1707)
    * Call HSET after FT.CREATE to avoid keyspace scan (#1706)
    * Unit tests fixes for compatibility (#1703)
    * Improve documentation about Locks (#1701)
    * Fixes to allow --redis-url to pass through all tests (#1700)
    * Fix unit tests running against Redis 4.0.0 (#1699)
    * Search alias test fix (#1695)
    * Adding RediSearch/RedisJSON tests (#1691)
    * Updating codecov rules (#1689)
    * Tests to validate custom JSON decoders (#1681)
    * Added breaking icon to release drafter (#1702)
    * Removing dependency on six (#1676)
    * Re-enable pipeline support for JSON and TimeSeries (#1674)
    * Export Sentinel, and SSL like other classes (#1671)
    * Restore zrange functionality for older versions of Redis
      (#1670)
    * Fixed garbage collection deadlock (#1578)
    * Tests to validate built python packages (#1678)
    * Sleep for flaky search test (#1680)
    * Test function renames, to match standards (#1679)
    * Docstring improvements for Redis class (#1675)
    * Fix georadius tests (#1672)
    * Improvements to JSON coverage (#1666)
    * Add python_requires setuptools check for python &gt; 3.6 (#1656)
    * SMISMEMBER support (#1667)
    * Exposing the module version in loaded_modules (#1648)
    * RedisTimeSeries support (#1652)
    * Support for json multipath ($) (#1663)
    * Added boolean parsing to PEXPIRE and PEXPIREAT (#1665)
    * Add python_requires setuptools check for python &gt; 3.6 (#1656)
    * Adding vulture for static analysis (#1655)
    * Starting to clean the docs (#1657)
    * Update README.md (#1654)
    * Adding description format for package (#1651)
    * Publish to pypi as releases are generated with the release
      drafter (#1647)
    * Restore actions to prs (#1653)
    * Fixing the package to include commands (#1649)
    * Re-enabling codecov as part of CI process (#1646)
    * Adding support for redisearch (#1640) Thanks @chayim
    * redisjson support (#1636) Thanks @chayim
    * Sentinel: Add SentinelManagedSSLConnection (#1419) Thanks
      @AbdealiJK
    * Enable floating parameters in SET (ex and px) (#1635) Thanks
      @AvitalFineRedis
    * Add warning when hiredis not installed. Recommend
      installation. (#1621) Thanks @adiamzn
    * Raising NotImplementedError for SCRIPT DEBUG and DEBUG
      SEGFAULT (#1624) Thanks @chayim
    * CLIENT REDIR command support (#1623) Thanks @chayim
    * REPLICAOF command implementation (#1622) Thanks @chayim
    * Add support to NX XX and CH to GEOADD (#1605) Thanks
      @AvitalFineRedis
    * Add support to ZRANGE and ZRANGESTORE parameters (#1603)
      Thanks @AvitalFineRedis
    * Pre 6.2 redis should default to None for script flush (#1641)
      Thanks @chayim
    * Add FULL option to XINFO SUMMARY (#1638) Thanks @agusdmb
    * Geosearch test should use any=True (#1594) Thanks
      @Andrew-Chen-Wang
    * Removing packaging dependency (#1626) Thanks @chayim
    * Fix client_kill_filter docs for skimpy (#1596) Thanks
      @Andrew-Chen-Wang
    * Normalize minid and maxlen docs (#1593) Thanks
      @Andrew-Chen-Wang
    * Update docs for multiple usernames for ACL DELUSER (#1595)
      Thanks @Andrew-Chen-Wang
    * Fix grammar of get param in set command (#1588) Thanks
      @Andrew-Chen-Wang
    * Fix docs for client_kill_filter (#1584) Thanks
      @Andrew-Chen-Wang
    * Convert README &amp; CONTRIBUTING from rst to md (#1633) Thanks
      @davidylee
    * Test BYLEX param in zrangestore (#1634) Thanks
      @AvitalFineRedis
    * Tox integrations with invoke and docker (#1632) Thanks
      @chayim
    * Adding the release drafter to help simplify release notes
      (#1618). Thanks @chayim
    * BACKWARDS INCOMPATIBLE: Removed support for end of life
      Python 2.7. #1318
    * BACKWARDS INCOMPATIBLE: All values within Redis URLs are
      unquoted via urllib.parse.unquote. Prior versions of redis-py
      supported this by specifying the ``decode_components`` flag
      to the ``from_url`` functions. This is now done by default
      and cannot be disabled. #589
    * POTENTIALLY INCOMPATIBLE: Redis commands were moved into a
      mixin (see commands.py). Anyone importing ``redis.client`` to
      access commands directly should import ``redis.commands``.
      #1534, #1550
    * Removed technical debt on REDIS_6_VERSION placeholder. Thanks
      @chayim #1582.
    * Various docus fixes. Thanks @Andrew-Chen-Wang #1585, #1586.
    * Support for LOLWUT command, available since Redis 5.0.0.
      Thanks @brainix #1568.
    * Added support for CLIENT REPLY, available in Redis 3.2.0.
      Thanks @chayim #1581.
    * Support for Auto-reconnect PubSub on get_message. Thanks
      @luhn #1574.
    * Fix RST syntax error in README/ Thanks @JanCBrammer #1451.
    * IDLETIME and FREQ support for RESTORE. Thanks @chayim #1580.
    * Supporting args with MODULE LOAD. Thanks @chayim #1579.
    * Updating RedisLabs with Redis. Thanks @gkorland #1575.
    * Added support for ASYNC to SCRIPT FLUSH available in Redis
      6.2.0. Thanks @chayim. #1567
    * Added CLIENT LIST fix to support multiple client ids
      available in Redis 2.8.12. Thanks @chayim #1563.
    * Added DISCARD support for pipelines available in Redis 2.0.0.
      Thanks @chayim #1565.
    * Added ACL DELUSER support for deleting lists of users
      available in Redis 6.2.0. Thanks @chayim. #1562
    * Added CLIENT TRACKINFO support available in Redis 6.2.0.
      Thanks @chayim. #1560
    * Added GEOSEARCH and GEOSEARCHSTORE support available in Redis
      6.2.0. Thanks @AvitalFine Redis. #1526
    * Added LPUSHX support for lists available in Redis 4.0.0.
      Thanks @chayim. #1559
    * Added support for QUIT available in Redis 1.0.0. Thanks
      @chayim. #1558
    * Added support for COMMAND COUNT available in Redis 2.8.13.
      Thanks @chayim. #1554.
    * Added CREATECONSUMER support for XGROUP available in Redis
      6.2.0. Thanks @AvitalFineRedis. #1553
    * Including slowly complexity in INFO if available. Thanks
      @ian28223 #1489.
    * Added support for STRALGO available in Redis 6.0.0. Thanks
      @AvitalFineRedis. #1528
    * Addes support for ZMSCORE available in Redis 6.2.0. Thanks
      @2014BDuck and @jiekun.zhu. #1437
    * Support MINID and LIMIT on XADD available in Redis 6.2.0.
      Thanks @AvitalFineRedis. #1548
    * Added sentinel commands FLUSHCONFIG, CKQUORUM, FAILOVER, and
      RESET available in Redis 2.8.12. Thanks @otherpirate. #834
    * Migrated Version instead of StrictVersion for Python 3.10.
      Thanks @tirkarthi. #1552
    * Added retry mechanism with backoff. Thanks @nbraun-amazon.
      #1494
    * Migrated commands to a mixin. Thanks @chayim. #1534
    * Added support for ZUNION, available in Redis 6.2.0. Thanks
      @AvitalFineRedis. #1522
    * Added support for CLIENT LIST with ID, available in Redis
      6.2.0. Thanks @chayim. #1505
    * Added support for MINID and LIMIT with xtrim, available in
      Reds 6.2.0. Thanks @chayim. #1508
    * Implemented LMOVE and BLMOVE commands, available in Redis
      6.2.0. Thanks @chayim. #1504
    * Added GET argument to SET command, available in Redis 6.2.0.
      Thanks @2014BDuck. #1412
    * Documentation fixes. Thanks @enjoy-binbin @jonher937. #1496
      #1532
    * Added support for XAUTOCLAIM, available in Redis 6.2.0.
      Thanks @AvitalFineRedis. #1529
    * Added IDLE support for XPENDING, available in Redis 6.2.0.
      Thanks @AvitalFineRedis. #1523
    * Add a count parameter to lpop/rpop, available in Redis 6.2.0.
      Thanks @wavenator. #1487
    * Added a (pypy) trove classifier for Python 3.9. Thanks @D3X.
      #1535
    * Added ZINTER support, available in Redis 6.2.0. Thanks
      @AvitalFineRedis. #1520
    * Added ZINTER support, available in Redis 6.2.0. Thanks
      @AvitalFineRedis. #1520
    * Added ZDIFF and ZDIFFSTORE support, available in Redis 6.2.0.
      Thanks @AvitalFineRedis. #1518
    * Added ZRANGESTORE support, available in Redis 6.2.0. Thanks
      @AvitalFineRedis. #1521
    * Added LT and GT support for ZADD, available in Redis 6.2.0.
      Thanks @chayim. #1509
    * Added ZRANDMEMBER support, available in Redis 6.2.0. Thanks
      @AvitalFineRedis. #1519
    * Added GETDEL support, available in Redis 6.2.0. Thanks
      @AvitalFineRedis. #1514
    * Added CLIENT KILL laddr filter, available in Redis 6.2.0.
      Thanks @chayim. #1506
    * Added CLIENT UNPAUSE, available in Redis 6.2.0. Thanks
      @chayim. #1512
    * Added NOMKSTREAM support for XADD, available in Redis 6.2.0.
      Thanks @chayim. #1507
    * Added HRANDFIELD support, available in Redis 6.2.0. Thanks
      @AvitalFineRedis. #1513
    * Added CLIENT INFO support, available in Redis 6.2.0. Thanks
      @AvitalFineRedis. #1517
    * Added GETEX support, available in Redis 6.2.0. Thanks
      @AvitalFineRedis. #1515
    * Added support for COPY command, available in Redis 6.2.0.
      Thanks @malinaa96. #1492
    * Provide a development and testing environment via docker.
      Thanks @abrookins. #1365
    * Added support for the LPOS command available in Redis 6.0.6.
      Thanks @aparcar #1353/#1354
    * Added support for the ACL LOG command available in Redis 6.
      Thanks @2014BDuck. #1307
    * Added support for ABSTTL option of the RESTORE command
      available in Redis 5.0. Thanks @charettes. #1423
- Drop account-defaults-redis.patch merged upstream

- Add account-defaults-redis.patch which fixes failing tests by
  taking into consideration redis defaults, not overwriting them
  (gh#andymccurdy/redis-py#1499).

- Skipp two tests because of gh#andymccurdy/redis-py#1459.

- update to 3.5.3
  * Restore try/except clauses to __del__ methods. These will be removed
    in 4.0 when more explicit resource management if enforced. #1339
  * Update the master_address when Sentinels promote a new master. #847
  * Update SentinelConnectionPool to not forcefully disconnect other in-use
    connections which can negatively affect threaded applications. #1345
  3.5.2
  * Tune the locking in ConnectionPool.get_connection so that the lock is
    not held while waiting for the socket to establish and validate the
    TCP connection.
  3.5.1
  * Fix for HSET argument validation to allow any non-None key. Thanks
    @AleksMat, #1337, #1341
  3.5.0
  * Removed exception trapping from __del__ methods. redis-py objects that
    hold various resources implement __del__ cleanup methods to release
    those resources when the object goes out of scope. This provides a
    fallback for when these objects aren't explicitly closed by user code.
    Prior to this change any errors encountered in closing these resources
    would be hidden from the user. Thanks @jdufresne. #1281
  * Expanded support for connection strings specifying a username connecting
    to pre-v6 servers. #1274
  * Optimized Lock's blocking_timeout and sleep. If the lock cannot be
    acquired and the sleep value would cause the loop to sleep beyond
    blocking_timeout, fail immediately. Thanks @clslgrnc. #1263
  * Added support for passing Python memoryviews to Redis command args that
    expect strings or bytes. The memoryview instance is sent directly to
    the socket such that there are zero copies made of the underlying data
    during command packing. Thanks @Cody-G. #1265, #1285
  * HSET command now can accept multiple pairs. HMSET has been marked as
    deprecated now. Thanks to @laixintao #1271
  * Don't manually DISCARD when encountering an ExecAbortError.
    Thanks @nickgaya, #1300/#1301
  * Reset the watched state of pipelines after calling exec. This saves
    a roundtrip to the server by not having to call UNWATCH within
    Pipeline.reset(). Thanks @nickgaya, #1299/#1302
  * Added the KEEPTTL option for the SET command. Thanks
    @laixintao #1304/#1280
  * Added the MEMORY STATS command. #1268
  * Lock.extend() now has a new option, `replace_ttl`. When False (the
    default), Lock.extend() adds the `additional_time` to the lock's existing
    TTL. When replace_ttl=True, the lock's existing TTL is replaced with
    the value of `additional_time`.
  * Add testing and support for PyPy.

- downgrade requires for redis to recommends

  * Better error handling
Changes in python-retrying:
- Switch package to modern Python Stack on SLE-15
  + Add %{?sle15_python_module_pythons}

- require setuptools

- Switch to pyproject macros.
- Stop using greedy globs in %files.

- Update to version 1.3.4
  * Added Greg Roodt as maintainer
  * Formatted code with black
  * Updated repository references

- Improve summary.

- Remove superfluous devel dependency for noarch package

- Initial package
Changes in python-semver:
- update to 3.0.2:
  * :pr:`418`: Replace :class:`~collection.OrderedDict` with
    :class:`dict`.
  * The dict datatype is ordered since Python 3.7. As we do not
    support Python 3.6 anymore, it can be considered safe to avoid
    :class:`~collection.OrderedDict`.
  * :pr:`431`: Clarify version policy for the different semver
    versions (v2, v3, &gt;v3) and the supported Python versions.
  * :gh:`432`: Improve external doc links to Python and Pydantic.
  * :pr:`417`: Amend GitHub Actions to check against MacOS.

- remove obsolete setup-remove-asterisk.patch
- update to version 3.0.1:
 - Remove incorrect dependencies from build-system section of pyproject.toml by @mgorny in #405
 - correct typo in function description of next_version by @treee111 in #406
 - Improve GitHub Action by @tomschr in #408
 - Add CITATION.cff for citation by @tomschr in #409
 - Add Version class to __all__ export. Fix #410 by @Soneji in #411
 - Configure docformatter by @tomschr in #412
 - Prepare version 3.0.1 by @tomschr in #413

- update to version 3.0.0:
 - Bugfixes
  - :gh:`291`: Disallow negative numbers in VersionInfo arguments
    for ``major``, ``minor``, and ``patch``.
  * :gh:`310`: Rework API documentation.
    Follow a more 'semi-manual' attempt and add auto directives
    into :file:`docs/api.rst`.
  * :gh:`344`: Allow empty string, a string with a prefix, or ``None``
    as token in
    :meth:`~semver.version.Version.bump_build` and
    :meth:`~semver.version.Version.bump_prerelease`.
  * :pr:`384`: General cleanup, reformat files:
    * Reformat source code with black again as some config options
      did accidentely exclude the semver source code.
      Mostly remove some includes/excludes in the black config.
    * Integrate concurrency in GH Action
    * Ignore Python files on project dirs in .gitignore
    * Remove unused patterns in MANIFEST.in
    * Use ``extend-exclude`` for flake in :file:`setup.cfg`` and adapt list.
    * Use ``skip_install=True`` in :file:`tox.ini` for black
  * :pr:`393`: Fix command :command:`python -m semver` to avoid the error 'invalid choice'
  * :pr:`396`: Calling :meth:`~semver.version.Version.parse` on a derived class will show correct type of derived class.
 - Deprecations
  * :gh:`169`: Deprecate CLI functions not imported from ``semver.cli``.
  * :gh:`234`: In :file:`setup.py` simplified file and remove
    ``Tox`` and ``Clean`` classes
  * :gh:`284`: Deprecate the use of :meth:`~Version.isvalid`.
    Rename :meth:`~semver.version.Version.isvalid`
    to :meth:`~semver.version.Version.is_valid`
    for consistency reasons with :meth:`~semver.version.Version.is_compatible`.
  * :pr:`402`: Keep :func:`semver.compare &lt;semver._deprecated.compare&gt;`.
     Although it breaks consistency with module level functions, it seems it's
     a much needed/used function. It's still unclear if we should deprecate
     this function or not (that's why we use :py:exc:`PendingDeprecationWarning`).
     As we don't have a uniform initializer yet, this function stays in the
     :file:`_deprecated.py` file for the time being until we find a better solution. See :gh:`258` for details.
 - Features
  * Remove :file:`semver.py`
  * Create :file:`src/semver/__init__.py`
  * Create :file:`src/semver/cli.py` for all CLI methods
  * Create :file:`src/semver/_deprecated.py` for the ``deprecated`` decorator and other deprecated functions
  * Create :file:`src/semver/__main__.py` to allow calling the CLI using :command:`python -m semver`
  * Create :file:`src/semver/_types.py` to hold type aliases
  * Create :file:`src/semver/version.py` to hold the :class:`Version` class (old name :class:`VersionInfo`) and its utility functions
  * Create :file:`src/semver/__about__.py` for all the metadata variables
  * :gh:`213`: Add typing information
  * :gh:`284`: Implement :meth:`~semver.version.Version.is_compatible` to make 'is self compatible with X'.
  * :gh:`305`: Rename :class:`~semver.version.VersionInfo` to :class:`~semver.version.Version` but keep an alias for compatibility

- add setup-remove-asterisk.patch to fix build error
- update to version 3.0.0-dev.4:
 - Bug Fixes:
 - :gh:`374`: Correct Towncrier's config entries in the :file:`pyproject.toml` file.
   The old entries ``[[tool.towncrier.type]]`` are deprecated and need
   to be replaced by ``[tool.towncrier.fragment.&lt;TYPE&gt;]``.
 - Deprecations:
 - :gh:`372`: Deprecate support for Python 3.6.
   Python 3.6 reached its end of life and isn't supported anymore.
   At the time of writing (Dec 2022), the lowest version is 3.7.
   Although the `poll &lt;https://github.com/python-semver/python-semver/discussions/371&gt;`_
   didn't cast many votes, the majority agree to remove support for
   Python 3.6.
 - Improved Documentation:
 - :gh:`335`: Add new section 'Converting versions between PyPI and semver' the limitations
   and possible use cases to convert from one into the other versioning scheme.
 - :gh:`340`: Describe how to get version from a file
 - :gh:`343`: Describe combining Pydantic with semver in the 'Advanced topic'
   section.
 - :gh:`350`: Restructure usage section. Create subdirectory 'usage/' and splitted
   all section into different files.
 - :gh:`351`: Introduce new topics for:
   * 'Migration to semver3'
   * 'Advanced topics'
 - Features:
 - :pr:`359`: Add optional parameter ``optional_minor_and_patch`` in :meth:`.Version.parse`  to allow optional
   minor and patch parts.
 - :pr:`362`: Make :meth:`.Version.match` accept a bare version string as match expression, defaulting to
   equality testing.
 - :gh:`364`: Enhance :file:`pyproject.toml` to make it possible to use the
   :command:`pyproject-build` command from the build module.
   For more information, see :ref:`build-semver`.
 - :gh:`365`: Improve :file:`pyproject.toml`.
   * Use setuptools, add metadata. Taken approach from
     `A Practical Guide to Setuptools and Pyproject.toml
     &lt;https://godatadriven.com/blog/a-practical-guide-to-setuptools-and-pyproject-toml/&gt;`_.
   * Doc: Describe building of semver
   * Remove :file:`.travis.yml` in :file:`MANIFEST.in`
     (not needed anymore)
   * Distinguish between Python 3.6 and others in :file:`tox.ini`
   * Add skip_missing_interpreters option for :file:`tox.ini`
   * GH Action: Upgrade setuptools and setuptools-scm and test
     against 3.11.0-rc.2
 - Trivial/Internal Changes:
 - :gh:`378`: Fix some typos in Towncrier configuration

- switch to the tagged version rather than a gh branch tarball

- fix support for Python 3.10 with update to development version:
- update to revision g4d2df08:
 - Changes for the upcoming release can be found in:
 - the `'changelog.d' directory &lt;https://github.com/python-semver/python-semver/tree/master/changelog.d&gt;`_:
 - in our repository.:
- update to version 3.0.0-dev.2:
 - Deprecations:
 - :gh:`169`: Deprecate CLI functions not imported from ``semver.cli``.
 - Features:
 - :gh:`169`: Create semver package and split code among different modules in the packages.
   * Remove :file:`semver.py`
   * Create :file:`src/semver/__init__.py`
   * Create :file:`src/semver/cli.py` for all CLI methods
   * Create :file:`src/semver/_deprecated.py` for the ``deprecated`` decorator and other deprecated functions
   * Create :file:`src/semver/__main__.py` to allow calling the CLI using :command:`python -m semver`
   * Create :file:`src/semver/_types.py` to hold type aliases
   * Create :file:`src/semver/version.py` to hold the :class:`Version` class (old name :class:`VersionInfo`) and its utility functions
   * Create :file:`src/semver/__about__.py` for all the metadata variables
 - :gh:`305`: Rename :class:`VersionInfo` to :class:`Version` but keep an alias for compatibility
 - Improved Documentation:
 - :gh:`304`: Several improvements in documentation:
   * Reorganize API documentation.
   * Add migration chapter from semver2 to semver3.
   * Distinguish between changlog for version 2 and 3
 - :gh:`305`: Add note about :class:`Version` rename.
 - Trivial/Internal Changes:
 - :gh:`169`: Adapted infrastructure code to the new project layout.
   * Replace :file:`setup.py` with :file:`setup.cfg` because the :file:`setup.cfg` is easier to use
   * Adapt documentation code snippets where needed
   * Adapt tests
   * Changed the ``deprecated`` to hardcode the ``semver`` package name in the warning.
   Increase coverage to 100% for all non-deprecated APIs
 - :gh:`304`: Support PEP-561 :file:`py.typed`.
   According to the mentioned PEP:
     'Package maintainers who wish to support type checking
     of their code MUST add a marker file named :file:`py.typed`
     to their package supporting typing.'
   Add package_data to :file:`setup.cfg` to include this marker in dist
   and whl file.
- update to version 3.0.0-dev.1:
 - Deprecations:
 - :pr:`290`: For semver 3.0.0-alpha0:
   * Remove anything related to Python2
   * In :file:`tox.ini` and :file:`.travis.yml`
     Remove targets py27, py34, py35, and pypy.
     Add py38, py39, and nightly (allow to fail)
   * In :file:`setup.py` simplified file and remove
     ``Tox`` and ``Clean`` classes
   * Remove old Python versions (2.7, 3.4, 3.5, and pypy)
     from Travis
 - :gh:`234`: In :file:`setup.py` simplified file and remove
   ``Tox`` and ``Clean`` classes
 - Features:
 - :pr:`290`: Create semver 3.0.0-alpha0
   * Update :file:`README.rst`, mention maintenance
     branch ``maint/v2``.
   * Remove old code mainly used for Python2 compatibility,
     adjusted code to support Python3 features.
   * Split test suite into separate files under :file:`tests/`
     directory
   * Adjust and update :file:`setup.py`. Requires Python &gt;=3.6.*
     Extract metadata directly from source (affects all the ``__version__``,
     ``__author__`` etc. variables)
 - :gh:`270`: Configure Towncrier (:pr:`273`:)
   * Add :file:`changelog.d/.gitignore` to keep this directory
   * Create :file:`changelog.d/README.rst` with some descriptions
   * Add :file:`changelog.d/_template.rst` as Towncrier template
   * Add ``[tool.towncrier]`` section in :file:`pyproject.toml`
   * Add 'changelog' target into :file:`tox.ini`. Use it like
     :command:`tox -e changelog -- CMD` whereas ``CMD`` is a
     Towncrier command. The default :command:`tox -e changelog`
     calls Towncrier to create a draft of the changelog file
     and output it to stdout.
   * Update documentation and add include a new section
     'Changelog' included from :file:`changelog.d/README.rst`.
 - :gh:`276`: Document how to create a sublass from :class:`VersionInfo` class
 - :gh:`213`: Add typing information
 - Bug Fixes:
 - :gh:`291`: Disallow negative numbers in VersionInfo arguments
   for ``major``, ``minor``, and ``patch``.
 - Improved Documentation:
 - :pr:`290`: Several improvements in the documentation:
   * New layout to distinguish from the semver2 development line.
   * Create new logo.
   * Remove any occurances of Python2.
   * Describe changelog process with Towncrier.
   * Update the release process.
 - Trivial/Internal Changes:
 - :pr:`290`: Add supported Python versions to :command:`black`.
 * PR #62. Support custom default names for pre and build
Changes in python-sshtunnel:
- Require update-alternatives for the scriptlets. 

- Switch build system from setuptools to pyproject.toml
  + Add python-pip and python-wheel to BuildRequires
  + Replace %python_build with %pyproject_wheel
  + Replace %python_install with %pyproject_install
- Limit Python files matched in %files section

- Use %sle15_python_module_pythons

- do not require python-mock for build

- update to 0.4.0:
    + Change the daemon mod flag for all tunnel threads (is not fully backward
      compatible) to prevent unexpected hangs (`#219`_) + Add docker based end to end
      functinal tests for Mongo/Postgres/MySQL
    + Add docker based end to end hangs tests
    + Fix host key directory detection
    + Unify default ssh config folder to `~/.ssh`
    + Increase open connection timeout to 10 secods
    + Change default with context behavior to use `.stop(force=True)` on exit
    + Remove useless `daemon_forward_servers = True` hack for hangs prevention
    + Set transport keepalive to 5 second by default
    + Set default transport timeout to 0.1
    + Deprecate and remove `block_on_close` option
    + Fix 'deadlocks' / 'tunneling hangs'
    + Add `.stop(force=True)` for force close active connections
    + Fixes bug with orphan thread for a tunnel that is DOWN 
    + Support IPv6 without proxy command. Use built-in paramiko create socket
      logic. The logic tries to use ipv6 socket family first, then ipv4 socket
      family.

Changes in python-strictyaml:

- require setuptools

- update to 1.7.3:
  * REFACTOR : Fix pipeline.
  * TOOLING : Improvements to pyenv multi-environment tester.
  * FEATURE : Upgraded package to use pyproject.toml files
  * REFACTOR : Fixed linter errors.
  * TOOLING : Build wheel and sdist that both work.

- Add %{?sle15_python_module_pythons}

- Update to 1.6.2
  No relevant code changes.
  see details changelog: https://hitchdev.com/strictyaml/changelog/#latest

- update to 1.6.1
  too many changes to be listed here
  see detailed changelog: https://hitchdev.com/strictyaml/changelog/

- update to 1.4.4
  * Add support for NaN and infinity representations
  * Optional keys in mappings and set value to None
  * Support underscores in int and decimal
  * NullNone - parse 'null' as None like YAML 1.2 does.
  * Bundle last propertly working ruamel.yaml version in with strictyaml.

- version update to 1.0.6
  * BUGFIX : Fix accidental python 2 breakage.
  * BUGFIX : Accidental misrecognition of boolean values as numbers - cause of #85.
  * BUGFIX : Fix for #86 - handle changing multiline strings.
  * BUGFIX: handle deprecated collections import in the parser (#82)

- Update to 1.0.5:
  * BUGFIX : Fixed python 2 bug introduced when fixing #72.
  * FEATURE : Include tests / stories in package.
  * BUG: issue #72. Now setitem uses schema.

- Expand %description.

- Initial spec for v1.0.3
Changes in python-sure:
- Switch build system from setuptools to pyproject.toml
  + Add python-pip and python-wheel to BuildRequires
  + Replace %python_build with %pyproject_wheel
  + Replace %python_install with %pyproject_install

- update to 2.0.1:
  * Fixes CI build (Github Actions)
  * Fixes broken tests
  * Housekeeping: Licensing
  * Disable nosetests for testing leaving only pytest as
    supported test-runner for now

- Add %{?sle15_python_module_pythons}

- Remove mock from BuildRequires.
- Rebase python-sure-no-mock.patch to remove one missed import.

- do not require mock for build nor runtime
- added patches
  fix https://github.com/gabrielfalcao/sure/pull/161
  + python-sure-no-mock.patch

- Update to 2.0.0
  * No longer patch the builtin dir() function, which fixes pytest
    in some cases such as projects using gevent.

- switch to pytest

- Version update to 1.4.11:
  * Reading the version dynamically was causing import errors that caused error when installing package. Refs #144

Changes in python-vcrpy:
- Update to 6.0.1
  * BREAKING: Fix issue with httpx support (thanks @parkerhancock) in #784.
  * BREAKING: Drop support for `boto` (vcrpy still supports boto3, but is dropping the deprecated `boto` support in this release. (thanks @jairhenrique)
  * Fix compatibility issue with Python 3.12 (thanks @hartwork)
  * Drop simplejson (fixes some compatibility issues) (thanks @jairhenrique)
  * Run CI on Python 3.12 and PyPy 3.9-3.10 (thanks @mgorny)
  * Various linting and docs improvements (thanks @jairhenrique)
  * Tornado fixes (thanks @graingert)

- version update to 5.1.0
  * Use ruff for linting (instead of current flake8/isort/pyflakes) - thanks @jairhenrique
  * Enable rule B (flake8-bugbear) on ruff - thanks @jairhenrique
  * Configure read the docs V2 - thanks @jairhenrique
  * Fix typo in docs - thanks @quasimik
  * Make json.loads of Python &gt;=3.6 decode bytes by itself - thanks @hartwork
  * Fix body matcher for chunked requests (fixes #734) - thanks @hartwork
  * Fix query param filter for aiohttp (fixes #517) - thanks @hartwork and @salomvary
  * Remove unnecessary dependency on six. - thanks @charettes
  * build(deps): update sphinx requirement from &lt;7 to &lt;8 - thanks @jairhenrique
  * Add action to validate docs - thanks @jairhenrique
  * Add editorconfig file - thanks @jairhenrique
  * Drop iscoroutinefunction fallback function for unsupported python thanks @jairhenrique
- for changelog for older releases refer to https://github.com/kevin1024/vcrpy/releases
- six is not required

- Use sle15_python_module_pythons

- Restrict urllib3 &lt; 2 -- gh#kevin1024/vcrpy#688

- Update to version 4.2.1 
  * Fix a bug where the first request in a redirect chain was not being recorded with aiohttp
  * Various typos and small fixes, thanks @jairhenrique, @timgates42

- Update to 4.1.1:
  * Fix HTTPX support for versions greater than 0.15 (thanks @jairhenrique)
  * Include a trailing newline on json cassettes (thanks @AaronRobson)

- Update to 4.1.0:
  * Add support for httpx!! (thanks @herdigiorgi)
  * Add the new allow_playback_repeats option (thanks @tysonholub)
  * Several aiohttp improvements (cookie support, multiple headers with same
    key) (Thanks @pauloromeira)
  * Use enums for record modes (thanks @aaronbannin)
  * Bugfix: Do not redirect on 304 in aiohttp (Thanks @royjs)
  * Bugfix: Fix test suite by switching to mockbin (thanks @jairhenrique)

- Remove patch 0001-Revert-v4.0.x-Remove-legacy-python-and-add-python3.8.patch
  as we dropped py2 integration support on Tumbleweed

- Added patch 0001-Revert-v4.0.x-Remove-legacy-python-and-add-python3.8.patch
  * Enable python2 again since it breaks many packages
- Fix locale on Leap

- update to version 4.0.2
  * Remove Python2 support
  * Add Python 3.8 TravisCI support
  * Correct mock imports

Changes in python-xmltodict:
- Clean up the SPEC file.

- add sle15_python_module_pythons

- update to 0.13.0:
  * Add install info to readme for openSUSE. (#205)
  * Support defaultdict for namespace mapping (#211)
  * parse(generator) is now possible (#212)
  * Processing comments on parsing from xml to dict (connected to #109) (#221)
  * Add expand_iter kw to unparse to expand iterables (#213)
  * Fixed some typos
  * Add support for python3.8
  * Drop Jython/Python 2 and add Python 3.9/3.10.
  * Drop OrderedDict in Python &gt;= 3.7
  * Do not use len() to determine if a sequence is empty
  * Add more namespace attribute tests
  * Fix encoding issue in setup.py

- Add patch skip-tests-expat-245.patch:
  * Do not run tests that make no sense with a current Expat.

Changes in python-asgiref:

First package shipment.

  		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-01"/>
	<updated date="2024-07-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1209571">SUSE bug 1209571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209811">SUSE bug 1209811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209812">SUSE bug 1209812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216606">SUSE bug 1216606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222880">SUSE bug 1222880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/761162">SUSE bug 761162</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28858/">CVE-2023-28858 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28858">CVE-2023-28858 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28859/">CVE-2023-28859 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28859">CVE-2023-28859 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009860651" comment="python-paramiko-doc-3.4.0-150400.13.10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860652" comment="python-tqdm-bash-completion-4.66.1-150400.9.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860653" comment="python311-Automat-22.10.0-150400.3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860654" comment="python311-Deprecated-1.2.14-150400.10.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860866" comment="python311-Fabric-3.2.2-150400.10.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860867" comment="python311-PyGithub-1.57-150400.10.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860655" comment="python311-PyJWT-2.8.0-150400.8.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860656" comment="python311-Pygments-2.15.1-150400.7.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860657" comment="python311-Twisted-22.10.0-150400.5.17.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860658" comment="python311-Twisted-all_non_platform-22.10.0-150400.5.17.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860659" comment="python311-Twisted-conch-22.10.0-150400.5.17.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860660" comment="python311-Twisted-conch_nacl-22.10.0-150400.5.17.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860661" comment="python311-Twisted-contextvars-22.10.0-150400.5.17.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860662" comment="python311-Twisted-http2-22.10.0-150400.5.17.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860663" comment="python311-Twisted-serial-22.10.0-150400.5.17.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860664" comment="python311-Twisted-tls-22.10.0-150400.5.17.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860665" comment="python311-aiohttp-3.9.3-150400.10.18.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860666" comment="python311-aiosignal-1.3.1-150400.9.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860868" comment="python311-antlr4-python3-runtime-4.13.1-150400.10.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860667" comment="python311-argcomplete-3.3.0-150400.12.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860869" comment="python311-asgiref-3.6.0-150400.9.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860668" comment="python311-async_timeout-4.0.2-150400.10.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860870" comment="python311-avro-1.11.3-150400.10.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860669" comment="python311-blinker-1.6.2-150400.12.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860670" comment="python311-chardet-5.2.0-150400.13.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860671" comment="python311-constantly-15.1.0-150400.12.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860672" comment="python311-decorator-5.1.1-150400.12.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860673" comment="python311-distro-1.9.0-150400.12.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860871" comment="python311-docker-7.0.0-150400.8.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860872" comment="python311-fakeredis-2.21.0-150400.9.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860873" comment="python311-fixedint-0.2.0-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860674" comment="python311-fluidity-sm-0.2.0-150400.10.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860675" comment="python311-frozenlist-1.3.3-150400.9.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860874" comment="python311-httplib2-0.22.0-150400.10.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860875" comment="python311-httpretty-1.1.4-150400.11.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860676" comment="python311-humanfriendly-10.0-150400.13.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860677" comment="python311-hyperlink-21.0.0-150400.12.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860678" comment="python311-importlib-metadata-6.8.0-150400.10.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860679" comment="python311-incremental-22.10.0-150400.3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860680" comment="python311-invoke-2.1.2-150400.10.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860681" comment="python311-isodate-0.6.1-150400.12.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860876" comment="python311-javaproperties-0.8.1-150400.10.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860877" comment="python311-jsondiff-2.0.0-150400.10.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860878" comment="python311-knack-0.11.0-150400.10.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860682" comment="python311-lexicon-2.0.1-150400.10.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860879" comment="python311-marshmallow-3.20.2-150400.9.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860683" comment="python311-multidict-6.0.4-150400.7.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860684" comment="python311-oauthlib-3.2.2-150400.12.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860880" comment="python311-opencensus-0.11.4-150400.10.6.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860881" comment="python311-opencensus-context-0.1.3-150400.10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860882" comment="python311-opencensus-ext-threading-0.1.2-150400.10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860685" comment="python311-opentelemetry-api-1.23.0-150400.10.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860883" comment="python311-opentelemetry-sdk-1.23.0-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860884" comment="python311-opentelemetry-semantic-conventions-0.44b0-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860885" comment="python311-opentelemetry-test-utils-0.44b0-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860686" comment="python311-paramiko-3.4.0-150400.13.10.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860687" comment="python311-pathspec-0.11.1-150400.9.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860688" comment="python311-pip-22.3.1-150400.17.16.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860689" comment="python311-pkginfo-1.9.6-150400.7.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860690" comment="python311-portalocker-2.7.0-150400.10.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860691" comment="python311-psutil-5.9.5-150400.6.9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860886" comment="python311-pycomposefile-0.0.30-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860887" comment="python311-pydash-6.0.2-150400.9.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860692" comment="python311-pyparsing-3.0.9-150400.5.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860888" comment="python311-redis-5.0.1-150400.12.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860693" comment="python311-requests-oauthlib-1.3.1-150400.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860889" comment="python311-retrying-1.3.4-150400.12.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860694" comment="python311-scp-0.14.5-150400.12.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860890" comment="python311-semver-3.0.2-150400.10.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860695" comment="python311-service_identity-23.1.0-150400.8.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860696" comment="python311-sortedcontainers-2.4.0-150400.8.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860891" comment="python311-sshtunnel-0.4.0-150400.5.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860892" comment="python311-strictyaml-1.7.3-150400.9.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860893" comment="python311-sure-2.0.1-150400.12.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860697" comment="python311-tabulate-0.9.0-150400.11.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860698" comment="python311-tqdm-4.66.1-150400.9.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860699" comment="python311-typing_extensions-4.5.0-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860894" comment="python311-vcrpy-6.0.1-150400.7.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860700" comment="python311-websocket-client-1.5.1-150400.13.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860701" comment="python311-wheel-0.40.0-150400.13.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860702" comment="python311-wrapt-1.15.0-150400.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860895" comment="python311-xmltodict-0.13.0-150400.12.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860703" comment="python311-yarl-1.9.2-150400.8.7.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860704" comment="python311-zipp-3.15.0-150400.10.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860705" comment="python311-zope.interface-6.0-150400.12.7.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4719" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1141539" ref_url="https://bugzilla.suse.com/1141539" source="BUGZILLA"/>
		<reference ref_id="1190576" ref_url="https://bugzilla.suse.com/1190576" source="BUGZILLA"/>
		<reference ref_id="1192145" ref_url="https://bugzilla.suse.com/1192145" source="BUGZILLA"/>
		<reference ref_id="1192837" ref_url="https://bugzilla.suse.com/1192837" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1196869" ref_url="https://bugzilla.suse.com/1196869" source="BUGZILLA"/>
		<reference ref_id="1200313" ref_url="https://bugzilla.suse.com/1200313" source="BUGZILLA"/>
		<reference ref_id="1201308" ref_url="https://bugzilla.suse.com/1201308" source="BUGZILLA"/>
		<reference ref_id="1201489" ref_url="https://bugzilla.suse.com/1201489" source="BUGZILLA"/>
		<reference ref_id="1203906" ref_url="https://bugzilla.suse.com/1203906" source="BUGZILLA"/>
		<reference ref_id="1203935" ref_url="https://bugzilla.suse.com/1203935" source="BUGZILLA"/>
		<reference ref_id="1204614" ref_url="https://bugzilla.suse.com/1204614" source="BUGZILLA"/>
		<reference ref_id="1207361" ref_url="https://bugzilla.suse.com/1207361" source="BUGZILLA"/>
		<reference ref_id="1211592" ref_url="https://bugzilla.suse.com/1211592" source="BUGZILLA"/>
		<reference ref_id="1213573" ref_url="https://bugzilla.suse.com/1213573" source="BUGZILLA"/>
		<reference ref_id="1217339" ref_url="https://bugzilla.suse.com/1217339" source="BUGZILLA"/>
		<reference ref_id="1217408" ref_url="https://bugzilla.suse.com/1217408" source="BUGZILLA"/>
		<reference ref_id="1218562" ref_url="https://bugzilla.suse.com/1218562" source="BUGZILLA"/>
		<reference ref_id="1218917" ref_url="https://bugzilla.suse.com/1218917" source="BUGZILLA"/>
		<reference ref_id="1219104" ref_url="https://bugzilla.suse.com/1219104" source="BUGZILLA"/>
		<reference ref_id="1219126" ref_url="https://bugzilla.suse.com/1219126" source="BUGZILLA"/>
		<reference ref_id="1219141" ref_url="https://bugzilla.suse.com/1219141" source="BUGZILLA"/>
		<reference ref_id="1219169" ref_url="https://bugzilla.suse.com/1219169" source="BUGZILLA"/>
		<reference ref_id="1219170" ref_url="https://bugzilla.suse.com/1219170" source="BUGZILLA"/>
		<reference ref_id="1219264" ref_url="https://bugzilla.suse.com/1219264" source="BUGZILLA"/>
		<reference ref_id="1220342" ref_url="https://bugzilla.suse.com/1220342" source="BUGZILLA"/>
		<reference ref_id="1220569" ref_url="https://bugzilla.suse.com/1220569" source="BUGZILLA"/>
		<reference ref_id="1220761" ref_url="https://bugzilla.suse.com/1220761" source="BUGZILLA"/>
		<reference ref_id="1221042" ref_url="https://bugzilla.suse.com/1221042" source="BUGZILLA"/>
		<reference ref_id="1221044" ref_url="https://bugzilla.suse.com/1221044" source="BUGZILLA"/>
		<reference ref_id="1221080" ref_url="https://bugzilla.suse.com/1221080" source="BUGZILLA"/>
		<reference ref_id="1221084" ref_url="https://bugzilla.suse.com/1221084" source="BUGZILLA"/>
		<reference ref_id="1221088" ref_url="https://bugzilla.suse.com/1221088" source="BUGZILLA"/>
		<reference ref_id="1221299" ref_url="https://bugzilla.suse.com/1221299" source="BUGZILLA"/>
		<reference ref_id="1221612" ref_url="https://bugzilla.suse.com/1221612" source="BUGZILLA"/>
		<reference ref_id="1221617" ref_url="https://bugzilla.suse.com/1221617" source="BUGZILLA"/>
		<reference ref_id="1221645" ref_url="https://bugzilla.suse.com/1221645" source="BUGZILLA"/>
		<reference ref_id="1221825" ref_url="https://bugzilla.suse.com/1221825" source="BUGZILLA"/>
		<reference ref_id="1222294" ref_url="https://bugzilla.suse.com/1222294" source="BUGZILLA"/>
		<reference ref_id="1222307" ref_url="https://bugzilla.suse.com/1222307" source="BUGZILLA"/>
		<reference ref_id="1222357" ref_url="https://bugzilla.suse.com/1222357" source="BUGZILLA"/>
		<reference ref_id="1222368" ref_url="https://bugzilla.suse.com/1222368" source="BUGZILLA"/>
		<reference ref_id="1222379" ref_url="https://bugzilla.suse.com/1222379" source="BUGZILLA"/>
		<reference ref_id="1222385" ref_url="https://bugzilla.suse.com/1222385" source="BUGZILLA"/>
		<reference ref_id="1222424" ref_url="https://bugzilla.suse.com/1222424" source="BUGZILLA"/>
		<reference ref_id="1222430" ref_url="https://bugzilla.suse.com/1222430" source="BUGZILLA"/>
		<reference ref_id="1222435" ref_url="https://bugzilla.suse.com/1222435" source="BUGZILLA"/>
		<reference ref_id="1222482" ref_url="https://bugzilla.suse.com/1222482" source="BUGZILLA"/>
		<reference ref_id="1222559" ref_url="https://bugzilla.suse.com/1222559" source="BUGZILLA"/>
		<reference ref_id="1222585" ref_url="https://bugzilla.suse.com/1222585" source="BUGZILLA"/>
		<reference ref_id="1222613" ref_url="https://bugzilla.suse.com/1222613" source="BUGZILLA"/>
		<reference ref_id="1222615" ref_url="https://bugzilla.suse.com/1222615" source="BUGZILLA"/>
		<reference ref_id="1222618" ref_url="https://bugzilla.suse.com/1222618" source="BUGZILLA"/>
		<reference ref_id="1222624" ref_url="https://bugzilla.suse.com/1222624" source="BUGZILLA"/>
		<reference ref_id="1222666" ref_url="https://bugzilla.suse.com/1222666" source="BUGZILLA"/>
		<reference ref_id="1222669" ref_url="https://bugzilla.suse.com/1222669" source="BUGZILLA"/>
		<reference ref_id="1222671" ref_url="https://bugzilla.suse.com/1222671" source="BUGZILLA"/>
		<reference ref_id="1222703" ref_url="https://bugzilla.suse.com/1222703" source="BUGZILLA"/>
		<reference ref_id="1222704" ref_url="https://bugzilla.suse.com/1222704" source="BUGZILLA"/>
		<reference ref_id="1222709" ref_url="https://bugzilla.suse.com/1222709" source="BUGZILLA"/>
		<reference ref_id="1222710" ref_url="https://bugzilla.suse.com/1222710" source="BUGZILLA"/>
		<reference ref_id="1222721" ref_url="https://bugzilla.suse.com/1222721" source="BUGZILLA"/>
		<reference ref_id="1222726" ref_url="https://bugzilla.suse.com/1222726" source="BUGZILLA"/>
		<reference ref_id="1222773" ref_url="https://bugzilla.suse.com/1222773" source="BUGZILLA"/>
		<reference ref_id="1222776" ref_url="https://bugzilla.suse.com/1222776" source="BUGZILLA"/>
		<reference ref_id="1222785" ref_url="https://bugzilla.suse.com/1222785" source="BUGZILLA"/>
		<reference ref_id="1222787" ref_url="https://bugzilla.suse.com/1222787" source="BUGZILLA"/>
		<reference ref_id="1222790" ref_url="https://bugzilla.suse.com/1222790" source="BUGZILLA"/>
		<reference ref_id="1222791" ref_url="https://bugzilla.suse.com/1222791" source="BUGZILLA"/>
		<reference ref_id="1222792" ref_url="https://bugzilla.suse.com/1222792" source="BUGZILLA"/>
		<reference ref_id="1222793" ref_url="https://bugzilla.suse.com/1222793" source="BUGZILLA"/>
		<reference ref_id="1222796" ref_url="https://bugzilla.suse.com/1222796" source="BUGZILLA"/>
		<reference ref_id="1222812" ref_url="https://bugzilla.suse.com/1222812" source="BUGZILLA"/>
		<reference ref_id="1222824" ref_url="https://bugzilla.suse.com/1222824" source="BUGZILLA"/>
		<reference ref_id="1222829" ref_url="https://bugzilla.suse.com/1222829" source="BUGZILLA"/>
		<reference ref_id="1222832" ref_url="https://bugzilla.suse.com/1222832" source="BUGZILLA"/>
		<reference ref_id="1222836" ref_url="https://bugzilla.suse.com/1222836" source="BUGZILLA"/>
		<reference ref_id="1222838" ref_url="https://bugzilla.suse.com/1222838" source="BUGZILLA"/>
		<reference ref_id="1222866" ref_url="https://bugzilla.suse.com/1222866" source="BUGZILLA"/>
		<reference ref_id="1222867" ref_url="https://bugzilla.suse.com/1222867" source="BUGZILLA"/>
		<reference ref_id="1222869" ref_url="https://bugzilla.suse.com/1222869" source="BUGZILLA"/>
		<reference ref_id="1222870" ref_url="https://bugzilla.suse.com/1222870" source="BUGZILLA"/>
		<reference ref_id="1222876" ref_url="https://bugzilla.suse.com/1222876" source="BUGZILLA"/>
		<reference ref_id="1222878" ref_url="https://bugzilla.suse.com/1222878" source="BUGZILLA"/>
		<reference ref_id="1222879" ref_url="https://bugzilla.suse.com/1222879" source="BUGZILLA"/>
		<reference ref_id="1222881" ref_url="https://bugzilla.suse.com/1222881" source="BUGZILLA"/>
		<reference ref_id="1222883" ref_url="https://bugzilla.suse.com/1222883" source="BUGZILLA"/>
		<reference ref_id="1222888" ref_url="https://bugzilla.suse.com/1222888" source="BUGZILLA"/>
		<reference ref_id="1222894" ref_url="https://bugzilla.suse.com/1222894" source="BUGZILLA"/>
		<reference ref_id="1222901" ref_url="https://bugzilla.suse.com/1222901" source="BUGZILLA"/>
		<reference ref_id="1222968" ref_url="https://bugzilla.suse.com/1222968" source="BUGZILLA"/>
		<reference ref_id="1222976" ref_url="https://bugzilla.suse.com/1222976" source="BUGZILLA"/>
		<reference ref_id="1223012" ref_url="https://bugzilla.suse.com/1223012" source="BUGZILLA"/>
		<reference ref_id="1223014" ref_url="https://bugzilla.suse.com/1223014" source="BUGZILLA"/>
		<reference ref_id="1223016" ref_url="https://bugzilla.suse.com/1223016" source="BUGZILLA"/>
		<reference ref_id="1223024" ref_url="https://bugzilla.suse.com/1223024" source="BUGZILLA"/>
		<reference ref_id="1223033" ref_url="https://bugzilla.suse.com/1223033" source="BUGZILLA"/>
		<reference ref_id="1223034" ref_url="https://bugzilla.suse.com/1223034" source="BUGZILLA"/>
		<reference ref_id="1223035" ref_url="https://bugzilla.suse.com/1223035" source="BUGZILLA"/>
		<reference ref_id="1223036" ref_url="https://bugzilla.suse.com/1223036" source="BUGZILLA"/>
		<reference ref_id="1223037" ref_url="https://bugzilla.suse.com/1223037" source="BUGZILLA"/>
		<reference ref_id="1223041" ref_url="https://bugzilla.suse.com/1223041" source="BUGZILLA"/>
		<reference ref_id="1223042" ref_url="https://bugzilla.suse.com/1223042" source="BUGZILLA"/>
		<reference ref_id="1223051" ref_url="https://bugzilla.suse.com/1223051" source="BUGZILLA"/>
		<reference ref_id="1223052" ref_url="https://bugzilla.suse.com/1223052" source="BUGZILLA"/>
		<reference ref_id="1223056" ref_url="https://bugzilla.suse.com/1223056" source="BUGZILLA"/>
		<reference ref_id="1223057" ref_url="https://bugzilla.suse.com/1223057" source="BUGZILLA"/>
		<reference ref_id="1223058" ref_url="https://bugzilla.suse.com/1223058" source="BUGZILLA"/>
		<reference ref_id="1223060" ref_url="https://bugzilla.suse.com/1223060" source="BUGZILLA"/>
		<reference ref_id="1223061" ref_url="https://bugzilla.suse.com/1223061" source="BUGZILLA"/>
		<reference ref_id="1223065" ref_url="https://bugzilla.suse.com/1223065" source="BUGZILLA"/>
		<reference ref_id="1223066" ref_url="https://bugzilla.suse.com/1223066" source="BUGZILLA"/>
		<reference ref_id="1223076" ref_url="https://bugzilla.suse.com/1223076" source="BUGZILLA"/>
		<reference ref_id="1223078" ref_url="https://bugzilla.suse.com/1223078" source="BUGZILLA"/>
		<reference ref_id="1223111" ref_url="https://bugzilla.suse.com/1223111" source="BUGZILLA"/>
		<reference ref_id="1223115" ref_url="https://bugzilla.suse.com/1223115" source="BUGZILLA"/>
		<reference ref_id="1223118" ref_url="https://bugzilla.suse.com/1223118" source="BUGZILLA"/>
		<reference ref_id="1223119" ref_url="https://bugzilla.suse.com/1223119" source="BUGZILLA"/>
		<reference ref_id="1223140" ref_url="https://bugzilla.suse.com/1223140" source="BUGZILLA"/>
		<reference ref_id="1223187" ref_url="https://bugzilla.suse.com/1223187" source="BUGZILLA"/>
		<reference ref_id="1223189" ref_url="https://bugzilla.suse.com/1223189" source="BUGZILLA"/>
		<reference ref_id="1223190" ref_url="https://bugzilla.suse.com/1223190" source="BUGZILLA"/>
		<reference ref_id="1223191" ref_url="https://bugzilla.suse.com/1223191" source="BUGZILLA"/>
		<reference ref_id="1223196" ref_url="https://bugzilla.suse.com/1223196" source="BUGZILLA"/>
		<reference ref_id="1223197" ref_url="https://bugzilla.suse.com/1223197" source="BUGZILLA"/>
		<reference ref_id="1223198" ref_url="https://bugzilla.suse.com/1223198" source="BUGZILLA"/>
		<reference ref_id="1223207" ref_url="https://bugzilla.suse.com/1223207" source="BUGZILLA"/>
		<reference ref_id="1223275" ref_url="https://bugzilla.suse.com/1223275" source="BUGZILLA"/>
		<reference ref_id="1223323" ref_url="https://bugzilla.suse.com/1223323" source="BUGZILLA"/>
		<reference ref_id="1223360" ref_url="https://bugzilla.suse.com/1223360" source="BUGZILLA"/>
		<reference ref_id="1223369" ref_url="https://bugzilla.suse.com/1223369" source="BUGZILLA"/>
		<reference ref_id="1223380" ref_url="https://bugzilla.suse.com/1223380" source="BUGZILLA"/>
		<reference ref_id="1223432" ref_url="https://bugzilla.suse.com/1223432" source="BUGZILLA"/>
		<reference ref_id="1223473" ref_url="https://bugzilla.suse.com/1223473" source="BUGZILLA"/>
		<reference ref_id="1223474" ref_url="https://bugzilla.suse.com/1223474" source="BUGZILLA"/>
		<reference ref_id="1223475" ref_url="https://bugzilla.suse.com/1223475" source="BUGZILLA"/>
		<reference ref_id="1223477" ref_url="https://bugzilla.suse.com/1223477" source="BUGZILLA"/>
		<reference ref_id="1223478" ref_url="https://bugzilla.suse.com/1223478" source="BUGZILLA"/>
		<reference ref_id="1223479" ref_url="https://bugzilla.suse.com/1223479" source="BUGZILLA"/>
		<reference ref_id="1223481" ref_url="https://bugzilla.suse.com/1223481" source="BUGZILLA"/>
		<reference ref_id="1223482" ref_url="https://bugzilla.suse.com/1223482" source="BUGZILLA"/>
		<reference ref_id="1223484" ref_url="https://bugzilla.suse.com/1223484" source="BUGZILLA"/>
		<reference ref_id="1223487" ref_url="https://bugzilla.suse.com/1223487" source="BUGZILLA"/>
		<reference ref_id="1223490" ref_url="https://bugzilla.suse.com/1223490" source="BUGZILLA"/>
		<reference ref_id="1223496" ref_url="https://bugzilla.suse.com/1223496" source="BUGZILLA"/>
		<reference ref_id="1223498" ref_url="https://bugzilla.suse.com/1223498" source="BUGZILLA"/>
		<reference ref_id="1223499" ref_url="https://bugzilla.suse.com/1223499" source="BUGZILLA"/>
		<reference ref_id="1223501" ref_url="https://bugzilla.suse.com/1223501" source="BUGZILLA"/>
		<reference ref_id="1223502" ref_url="https://bugzilla.suse.com/1223502" source="BUGZILLA"/>
		<reference ref_id="1223503" ref_url="https://bugzilla.suse.com/1223503" source="BUGZILLA"/>
		<reference ref_id="1223505" ref_url="https://bugzilla.suse.com/1223505" source="BUGZILLA"/>
		<reference ref_id="1223509" ref_url="https://bugzilla.suse.com/1223509" source="BUGZILLA"/>
		<reference ref_id="1223511" ref_url="https://bugzilla.suse.com/1223511" source="BUGZILLA"/>
		<reference ref_id="1223512" ref_url="https://bugzilla.suse.com/1223512" source="BUGZILLA"/>
		<reference ref_id="1223513" ref_url="https://bugzilla.suse.com/1223513" source="BUGZILLA"/>
		<reference ref_id="1223516" ref_url="https://bugzilla.suse.com/1223516" source="BUGZILLA"/>
		<reference ref_id="1223517" ref_url="https://bugzilla.suse.com/1223517" source="BUGZILLA"/>
		<reference ref_id="1223518" ref_url="https://bugzilla.suse.com/1223518" source="BUGZILLA"/>
		<reference ref_id="1223519" ref_url="https://bugzilla.suse.com/1223519" source="BUGZILLA"/>
		<reference ref_id="1223520" ref_url="https://bugzilla.suse.com/1223520" source="BUGZILLA"/>
		<reference ref_id="1223522" ref_url="https://bugzilla.suse.com/1223522" source="BUGZILLA"/>
		<reference ref_id="1223523" ref_url="https://bugzilla.suse.com/1223523" source="BUGZILLA"/>
		<reference ref_id="1223525" ref_url="https://bugzilla.suse.com/1223525" source="BUGZILLA"/>
		<reference ref_id="1223536" ref_url="https://bugzilla.suse.com/1223536" source="BUGZILLA"/>
		<reference ref_id="1223539" ref_url="https://bugzilla.suse.com/1223539" source="BUGZILLA"/>
		<reference ref_id="1223574" ref_url="https://bugzilla.suse.com/1223574" source="BUGZILLA"/>
		<reference ref_id="1223595" ref_url="https://bugzilla.suse.com/1223595" source="BUGZILLA"/>
		<reference ref_id="1223598" ref_url="https://bugzilla.suse.com/1223598" source="BUGZILLA"/>
		<reference ref_id="1223628" ref_url="https://bugzilla.suse.com/1223628" source="BUGZILLA"/>
		<reference ref_id="1223634" ref_url="https://bugzilla.suse.com/1223634" source="BUGZILLA"/>
		<reference ref_id="1223640" ref_url="https://bugzilla.suse.com/1223640" source="BUGZILLA"/>
		<reference ref_id="1223643" ref_url="https://bugzilla.suse.com/1223643" source="BUGZILLA"/>
		<reference ref_id="1223644" ref_url="https://bugzilla.suse.com/1223644" source="BUGZILLA"/>
		<reference ref_id="1223645" ref_url="https://bugzilla.suse.com/1223645" source="BUGZILLA"/>
		<reference ref_id="1223646" ref_url="https://bugzilla.suse.com/1223646" source="BUGZILLA"/>
		<reference ref_id="1223648" ref_url="https://bugzilla.suse.com/1223648" source="BUGZILLA"/>
		<reference ref_id="1223655" ref_url="https://bugzilla.suse.com/1223655" source="BUGZILLA"/>
		<reference ref_id="1223657" ref_url="https://bugzilla.suse.com/1223657" source="BUGZILLA"/>
		<reference ref_id="1223660" ref_url="https://bugzilla.suse.com/1223660" source="BUGZILLA"/>
		<reference ref_id="1223661" ref_url="https://bugzilla.suse.com/1223661" source="BUGZILLA"/>
		<reference ref_id="1223663" ref_url="https://bugzilla.suse.com/1223663" source="BUGZILLA"/>
		<reference ref_id="1223664" ref_url="https://bugzilla.suse.com/1223664" source="BUGZILLA"/>
		<reference ref_id="1223668" ref_url="https://bugzilla.suse.com/1223668" source="BUGZILLA"/>
		<reference ref_id="1223670" ref_url="https://bugzilla.suse.com/1223670" source="BUGZILLA"/>
		<reference ref_id="1223679" ref_url="https://bugzilla.suse.com/1223679" source="BUGZILLA"/>
		<reference ref_id="1223686" ref_url="https://bugzilla.suse.com/1223686" source="BUGZILLA"/>
		<reference ref_id="1223693" ref_url="https://bugzilla.suse.com/1223693" source="BUGZILLA"/>
		<reference ref_id="1223705" ref_url="https://bugzilla.suse.com/1223705" source="BUGZILLA"/>
		<reference ref_id="1223714" ref_url="https://bugzilla.suse.com/1223714" source="BUGZILLA"/>
		<reference ref_id="1223735" ref_url="https://bugzilla.suse.com/1223735" source="BUGZILLA"/>
		<reference ref_id="1223738" ref_url="https://bugzilla.suse.com/1223738" source="BUGZILLA"/>
		<reference ref_id="1223745" ref_url="https://bugzilla.suse.com/1223745" source="BUGZILLA"/>
		<reference ref_id="1223784" ref_url="https://bugzilla.suse.com/1223784" source="BUGZILLA"/>
		<reference ref_id="1223785" ref_url="https://bugzilla.suse.com/1223785" source="BUGZILLA"/>
		<reference ref_id="1223790" ref_url="https://bugzilla.suse.com/1223790" source="BUGZILLA"/>
		<reference ref_id="1223816" ref_url="https://bugzilla.suse.com/1223816" source="BUGZILLA"/>
		<reference ref_id="1223821" ref_url="https://bugzilla.suse.com/1223821" source="BUGZILLA"/>
		<reference ref_id="1223822" ref_url="https://bugzilla.suse.com/1223822" source="BUGZILLA"/>
		<reference ref_id="1223823" ref_url="https://bugzilla.suse.com/1223823" source="BUGZILLA"/>
		<reference ref_id="1223824" ref_url="https://bugzilla.suse.com/1223824" source="BUGZILLA"/>
		<reference ref_id="1223827" ref_url="https://bugzilla.suse.com/1223827" source="BUGZILLA"/>
		<reference ref_id="1223834" ref_url="https://bugzilla.suse.com/1223834" source="BUGZILLA"/>
		<reference ref_id="1223858" ref_url="https://bugzilla.suse.com/1223858" source="BUGZILLA"/>
		<reference ref_id="1223875" ref_url="https://bugzilla.suse.com/1223875" source="BUGZILLA"/>
		<reference ref_id="1223876" ref_url="https://bugzilla.suse.com/1223876" source="BUGZILLA"/>
		<reference ref_id="1223877" ref_url="https://bugzilla.suse.com/1223877" source="BUGZILLA"/>
		<reference ref_id="1223878" ref_url="https://bugzilla.suse.com/1223878" source="BUGZILLA"/>
		<reference ref_id="1223879" ref_url="https://bugzilla.suse.com/1223879" source="BUGZILLA"/>
		<reference ref_id="1223894" ref_url="https://bugzilla.suse.com/1223894" source="BUGZILLA"/>
		<reference ref_id="1223921" ref_url="https://bugzilla.suse.com/1223921" source="BUGZILLA"/>
		<reference ref_id="1223922" ref_url="https://bugzilla.suse.com/1223922" source="BUGZILLA"/>
		<reference ref_id="1223923" ref_url="https://bugzilla.suse.com/1223923" source="BUGZILLA"/>
		<reference ref_id="1223924" ref_url="https://bugzilla.suse.com/1223924" source="BUGZILLA"/>
		<reference ref_id="1223929" ref_url="https://bugzilla.suse.com/1223929" source="BUGZILLA"/>
		<reference ref_id="1223931" ref_url="https://bugzilla.suse.com/1223931" source="BUGZILLA"/>
		<reference ref_id="1223932" ref_url="https://bugzilla.suse.com/1223932" source="BUGZILLA"/>
		<reference ref_id="1223934" ref_url="https://bugzilla.suse.com/1223934" source="BUGZILLA"/>
		<reference ref_id="1223941" ref_url="https://bugzilla.suse.com/1223941" source="BUGZILLA"/>
		<reference ref_id="1223948" ref_url="https://bugzilla.suse.com/1223948" source="BUGZILLA"/>
		<reference ref_id="1223949" ref_url="https://bugzilla.suse.com/1223949" source="BUGZILLA"/>
		<reference ref_id="1223950" ref_url="https://bugzilla.suse.com/1223950" source="BUGZILLA"/>
		<reference ref_id="1223951" ref_url="https://bugzilla.suse.com/1223951" source="BUGZILLA"/>
		<reference ref_id="1223952" ref_url="https://bugzilla.suse.com/1223952" source="BUGZILLA"/>
		<reference ref_id="1223953" ref_url="https://bugzilla.suse.com/1223953" source="BUGZILLA"/>
		<reference ref_id="1223956" ref_url="https://bugzilla.suse.com/1223956" source="BUGZILLA"/>
		<reference ref_id="1223957" ref_url="https://bugzilla.suse.com/1223957" source="BUGZILLA"/>
		<reference ref_id="1223960" ref_url="https://bugzilla.suse.com/1223960" source="BUGZILLA"/>
		<reference ref_id="1223962" ref_url="https://bugzilla.suse.com/1223962" source="BUGZILLA"/>
		<reference ref_id="1223963" ref_url="https://bugzilla.suse.com/1223963" source="BUGZILLA"/>
		<reference ref_id="1223964" ref_url="https://bugzilla.suse.com/1223964" source="BUGZILLA"/>
		<reference ref_id="1223996" ref_url="https://bugzilla.suse.com/1223996" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-47047" ref_url="https://www.suse.com/security/cve/CVE-2021-47047/" source="CVE"/>
		<reference ref_id="CVE-2021-47184" ref_url="https://www.suse.com/security/cve/CVE-2021-47184/" source="CVE"/>
		<reference ref_id="CVE-2021-47185" ref_url="https://www.suse.com/security/cve/CVE-2021-47185/" source="CVE"/>
		<reference ref_id="CVE-2021-47187" ref_url="https://www.suse.com/security/cve/CVE-2021-47187/" source="CVE"/>
		<reference ref_id="CVE-2021-47188" ref_url="https://www.suse.com/security/cve/CVE-2021-47188/" source="CVE"/>
		<reference ref_id="CVE-2021-47191" ref_url="https://www.suse.com/security/cve/CVE-2021-47191/" source="CVE"/>
		<reference ref_id="CVE-2021-47192" ref_url="https://www.suse.com/security/cve/CVE-2021-47192/" source="CVE"/>
		<reference ref_id="CVE-2021-47193" ref_url="https://www.suse.com/security/cve/CVE-2021-47193/" source="CVE"/>
		<reference ref_id="CVE-2021-47194" ref_url="https://www.suse.com/security/cve/CVE-2021-47194/" source="CVE"/>
		<reference ref_id="CVE-2021-47195" ref_url="https://www.suse.com/security/cve/CVE-2021-47195/" source="CVE"/>
		<reference ref_id="CVE-2021-47196" ref_url="https://www.suse.com/security/cve/CVE-2021-47196/" source="CVE"/>
		<reference ref_id="CVE-2021-47197" ref_url="https://www.suse.com/security/cve/CVE-2021-47197/" source="CVE"/>
		<reference ref_id="CVE-2021-47198" ref_url="https://www.suse.com/security/cve/CVE-2021-47198/" source="CVE"/>
		<reference ref_id="CVE-2021-47199" ref_url="https://www.suse.com/security/cve/CVE-2021-47199/" source="CVE"/>
		<reference ref_id="CVE-2021-47200" ref_url="https://www.suse.com/security/cve/CVE-2021-47200/" source="CVE"/>
		<reference ref_id="CVE-2021-47201" ref_url="https://www.suse.com/security/cve/CVE-2021-47201/" source="CVE"/>
		<reference ref_id="CVE-2021-47202" ref_url="https://www.suse.com/security/cve/CVE-2021-47202/" source="CVE"/>
		<reference ref_id="CVE-2021-47203" ref_url="https://www.suse.com/security/cve/CVE-2021-47203/" source="CVE"/>
		<reference ref_id="CVE-2021-47204" ref_url="https://www.suse.com/security/cve/CVE-2021-47204/" source="CVE"/>
		<reference ref_id="CVE-2021-47205" ref_url="https://www.suse.com/security/cve/CVE-2021-47205/" source="CVE"/>
		<reference ref_id="CVE-2021-47206" ref_url="https://www.suse.com/security/cve/CVE-2021-47206/" source="CVE"/>
		<reference ref_id="CVE-2021-47207" ref_url="https://www.suse.com/security/cve/CVE-2021-47207/" source="CVE"/>
		<reference ref_id="CVE-2021-47209" ref_url="https://www.suse.com/security/cve/CVE-2021-47209/" source="CVE"/>
		<reference ref_id="CVE-2021-47210" ref_url="https://www.suse.com/security/cve/CVE-2021-47210/" source="CVE"/>
		<reference ref_id="CVE-2021-47211" ref_url="https://www.suse.com/security/cve/CVE-2021-47211/" source="CVE"/>
		<reference ref_id="CVE-2021-47212" ref_url="https://www.suse.com/security/cve/CVE-2021-47212/" source="CVE"/>
		<reference ref_id="CVE-2021-47214" ref_url="https://www.suse.com/security/cve/CVE-2021-47214/" source="CVE"/>
		<reference ref_id="CVE-2021-47215" ref_url="https://www.suse.com/security/cve/CVE-2021-47215/" source="CVE"/>
		<reference ref_id="CVE-2021-47216" ref_url="https://www.suse.com/security/cve/CVE-2021-47216/" source="CVE"/>
		<reference ref_id="CVE-2021-47217" ref_url="https://www.suse.com/security/cve/CVE-2021-47217/" source="CVE"/>
		<reference ref_id="CVE-2021-47218" ref_url="https://www.suse.com/security/cve/CVE-2021-47218/" source="CVE"/>
		<reference ref_id="CVE-2021-47219" ref_url="https://www.suse.com/security/cve/CVE-2021-47219/" source="CVE"/>
		<reference ref_id="CVE-2022-48631" ref_url="https://www.suse.com/security/cve/CVE-2022-48631/" source="CVE"/>
		<reference ref_id="CVE-2022-48632" ref_url="https://www.suse.com/security/cve/CVE-2022-48632/" source="CVE"/>
		<reference ref_id="CVE-2022-48634" ref_url="https://www.suse.com/security/cve/CVE-2022-48634/" source="CVE"/>
		<reference ref_id="CVE-2022-48636" ref_url="https://www.suse.com/security/cve/CVE-2022-48636/" source="CVE"/>
		<reference ref_id="CVE-2022-48637" ref_url="https://www.suse.com/security/cve/CVE-2022-48637/" source="CVE"/>
		<reference ref_id="CVE-2022-48638" ref_url="https://www.suse.com/security/cve/CVE-2022-48638/" source="CVE"/>
		<reference ref_id="CVE-2022-48639" ref_url="https://www.suse.com/security/cve/CVE-2022-48639/" source="CVE"/>
		<reference ref_id="CVE-2022-48640" ref_url="https://www.suse.com/security/cve/CVE-2022-48640/" source="CVE"/>
		<reference ref_id="CVE-2022-48642" ref_url="https://www.suse.com/security/cve/CVE-2022-48642/" source="CVE"/>
		<reference ref_id="CVE-2022-48644" ref_url="https://www.suse.com/security/cve/CVE-2022-48644/" source="CVE"/>
		<reference ref_id="CVE-2022-48646" ref_url="https://www.suse.com/security/cve/CVE-2022-48646/" source="CVE"/>
		<reference ref_id="CVE-2022-48647" ref_url="https://www.suse.com/security/cve/CVE-2022-48647/" source="CVE"/>
		<reference ref_id="CVE-2022-48648" ref_url="https://www.suse.com/security/cve/CVE-2022-48648/" source="CVE"/>
		<reference ref_id="CVE-2022-48650" ref_url="https://www.suse.com/security/cve/CVE-2022-48650/" source="CVE"/>
		<reference ref_id="CVE-2022-48651" ref_url="https://www.suse.com/security/cve/CVE-2022-48651/" source="CVE"/>
		<reference ref_id="CVE-2022-48652" ref_url="https://www.suse.com/security/cve/CVE-2022-48652/" source="CVE"/>
		<reference ref_id="CVE-2022-48653" ref_url="https://www.suse.com/security/cve/CVE-2022-48653/" source="CVE"/>
		<reference ref_id="CVE-2022-48654" ref_url="https://www.suse.com/security/cve/CVE-2022-48654/" source="CVE"/>
		<reference ref_id="CVE-2022-48655" ref_url="https://www.suse.com/security/cve/CVE-2022-48655/" source="CVE"/>
		<reference ref_id="CVE-2022-48656" ref_url="https://www.suse.com/security/cve/CVE-2022-48656/" source="CVE"/>
		<reference ref_id="CVE-2022-48657" ref_url="https://www.suse.com/security/cve/CVE-2022-48657/" source="CVE"/>
		<reference ref_id="CVE-2022-48658" ref_url="https://www.suse.com/security/cve/CVE-2022-48658/" source="CVE"/>
		<reference ref_id="CVE-2022-48659" ref_url="https://www.suse.com/security/cve/CVE-2022-48659/" source="CVE"/>
		<reference ref_id="CVE-2022-48660" ref_url="https://www.suse.com/security/cve/CVE-2022-48660/" source="CVE"/>
		<reference ref_id="CVE-2022-48662" ref_url="https://www.suse.com/security/cve/CVE-2022-48662/" source="CVE"/>
		<reference ref_id="CVE-2022-48663" ref_url="https://www.suse.com/security/cve/CVE-2022-48663/" source="CVE"/>
		<reference ref_id="CVE-2022-48667" ref_url="https://www.suse.com/security/cve/CVE-2022-48667/" source="CVE"/>
		<reference ref_id="CVE-2022-48668" ref_url="https://www.suse.com/security/cve/CVE-2022-48668/" source="CVE"/>
		<reference ref_id="CVE-2022-48671" ref_url="https://www.suse.com/security/cve/CVE-2022-48671/" source="CVE"/>
		<reference ref_id="CVE-2022-48672" ref_url="https://www.suse.com/security/cve/CVE-2022-48672/" source="CVE"/>
		<reference ref_id="CVE-2022-48673" ref_url="https://www.suse.com/security/cve/CVE-2022-48673/" source="CVE"/>
		<reference ref_id="CVE-2022-48675" ref_url="https://www.suse.com/security/cve/CVE-2022-48675/" source="CVE"/>
		<reference ref_id="CVE-2022-48686" ref_url="https://www.suse.com/security/cve/CVE-2022-48686/" source="CVE"/>
		<reference ref_id="CVE-2022-48687" ref_url="https://www.suse.com/security/cve/CVE-2022-48687/" source="CVE"/>
		<reference ref_id="CVE-2022-48688" ref_url="https://www.suse.com/security/cve/CVE-2022-48688/" source="CVE"/>
		<reference ref_id="CVE-2022-48690" ref_url="https://www.suse.com/security/cve/CVE-2022-48690/" source="CVE"/>
		<reference ref_id="CVE-2022-48692" ref_url="https://www.suse.com/security/cve/CVE-2022-48692/" source="CVE"/>
		<reference ref_id="CVE-2022-48693" ref_url="https://www.suse.com/security/cve/CVE-2022-48693/" source="CVE"/>
		<reference ref_id="CVE-2022-48694" ref_url="https://www.suse.com/security/cve/CVE-2022-48694/" source="CVE"/>
		<reference ref_id="CVE-2022-48695" ref_url="https://www.suse.com/security/cve/CVE-2022-48695/" source="CVE"/>
		<reference ref_id="CVE-2022-48697" ref_url="https://www.suse.com/security/cve/CVE-2022-48697/" source="CVE"/>
		<reference ref_id="CVE-2022-48698" ref_url="https://www.suse.com/security/cve/CVE-2022-48698/" source="CVE"/>
		<reference ref_id="CVE-2022-48699" ref_url="https://www.suse.com/security/cve/CVE-2022-48699/" source="CVE"/>
		<reference ref_id="CVE-2022-48700" ref_url="https://www.suse.com/security/cve/CVE-2022-48700/" source="CVE"/>
		<reference ref_id="CVE-2022-48701" ref_url="https://www.suse.com/security/cve/CVE-2022-48701/" source="CVE"/>
		<reference ref_id="CVE-2022-48702" ref_url="https://www.suse.com/security/cve/CVE-2022-48702/" source="CVE"/>
		<reference ref_id="CVE-2022-48703" ref_url="https://www.suse.com/security/cve/CVE-2022-48703/" source="CVE"/>
		<reference ref_id="CVE-2022-48704" ref_url="https://www.suse.com/security/cve/CVE-2022-48704/" source="CVE"/>
		<reference ref_id="CVE-2023-2860" ref_url="https://www.suse.com/security/cve/CVE-2023-2860/" source="CVE"/>
		<reference ref_id="CVE-2023-52585" ref_url="https://www.suse.com/security/cve/CVE-2023-52585/" source="CVE"/>
		<reference ref_id="CVE-2023-52589" ref_url="https://www.suse.com/security/cve/CVE-2023-52589/" source="CVE"/>
		<reference ref_id="CVE-2023-52590" ref_url="https://www.suse.com/security/cve/CVE-2023-52590/" source="CVE"/>
		<reference ref_id="CVE-2023-52591" ref_url="https://www.suse.com/security/cve/CVE-2023-52591/" source="CVE"/>
		<reference ref_id="CVE-2023-52593" ref_url="https://www.suse.com/security/cve/CVE-2023-52593/" source="CVE"/>
		<reference ref_id="CVE-2023-52614" ref_url="https://www.suse.com/security/cve/CVE-2023-52614/" source="CVE"/>
		<reference ref_id="CVE-2023-52616" ref_url="https://www.suse.com/security/cve/CVE-2023-52616/" source="CVE"/>
		<reference ref_id="CVE-2023-52620" ref_url="https://www.suse.com/security/cve/CVE-2023-52620/" source="CVE"/>
		<reference ref_id="CVE-2023-52635" ref_url="https://www.suse.com/security/cve/CVE-2023-52635/" source="CVE"/>
		<reference ref_id="CVE-2023-52645" ref_url="https://www.suse.com/security/cve/CVE-2023-52645/" source="CVE"/>
		<reference ref_id="CVE-2023-52646" ref_url="https://www.suse.com/security/cve/CVE-2023-52646/" source="CVE"/>
		<reference ref_id="CVE-2023-52652" ref_url="https://www.suse.com/security/cve/CVE-2023-52652/" source="CVE"/>
		<reference ref_id="CVE-2023-6270" ref_url="https://www.suse.com/security/cve/CVE-2023-6270/" source="CVE"/>
		<reference ref_id="CVE-2024-0639" ref_url="https://www.suse.com/security/cve/CVE-2024-0639/" source="CVE"/>
		<reference ref_id="CVE-2024-0841" ref_url="https://www.suse.com/security/cve/CVE-2024-0841/" source="CVE"/>
		<reference ref_id="CVE-2024-2201" ref_url="https://www.suse.com/security/cve/CVE-2024-2201/" source="CVE"/>
		<reference ref_id="CVE-2024-22099" ref_url="https://www.suse.com/security/cve/CVE-2024-22099/" source="CVE"/>
		<reference ref_id="CVE-2024-23307" ref_url="https://www.suse.com/security/cve/CVE-2024-23307/" source="CVE"/>
		<reference ref_id="CVE-2024-23848" ref_url="https://www.suse.com/security/cve/CVE-2024-23848/" source="CVE"/>
		<reference ref_id="CVE-2024-23850" ref_url="https://www.suse.com/security/cve/CVE-2024-23850/" source="CVE"/>
		<reference ref_id="CVE-2024-26601" ref_url="https://www.suse.com/security/cve/CVE-2024-26601/" source="CVE"/>
		<reference ref_id="CVE-2024-26610" ref_url="https://www.suse.com/security/cve/CVE-2024-26610/" source="CVE"/>
		<reference ref_id="CVE-2024-26656" ref_url="https://www.suse.com/security/cve/CVE-2024-26656/" source="CVE"/>
		<reference ref_id="CVE-2024-26671" ref_url="https://www.suse.com/security/cve/CVE-2024-26671/" source="CVE"/>
		<reference ref_id="CVE-2024-26673" ref_url="https://www.suse.com/security/cve/CVE-2024-26673/" source="CVE"/>
		<reference ref_id="CVE-2024-26675" ref_url="https://www.suse.com/security/cve/CVE-2024-26675/" source="CVE"/>
		<reference ref_id="CVE-2024-26679" ref_url="https://www.suse.com/security/cve/CVE-2024-26679/" source="CVE"/>
		<reference ref_id="CVE-2024-26687" ref_url="https://www.suse.com/security/cve/CVE-2024-26687/" source="CVE"/>
		<reference ref_id="CVE-2024-26688" ref_url="https://www.suse.com/security/cve/CVE-2024-26688/" source="CVE"/>
		<reference ref_id="CVE-2024-26700" ref_url="https://www.suse.com/security/cve/CVE-2024-26700/" source="CVE"/>
		<reference ref_id="CVE-2024-26702" ref_url="https://www.suse.com/security/cve/CVE-2024-26702/" source="CVE"/>
		<reference ref_id="CVE-2024-26733" ref_url="https://www.suse.com/security/cve/CVE-2024-26733/" source="CVE"/>
		<reference ref_id="CVE-2024-26739" ref_url="https://www.suse.com/security/cve/CVE-2024-26739/" source="CVE"/>
		<reference ref_id="CVE-2024-26764" ref_url="https://www.suse.com/security/cve/CVE-2024-26764/" source="CVE"/>
		<reference ref_id="CVE-2024-26766" ref_url="https://www.suse.com/security/cve/CVE-2024-26766/" source="CVE"/>
		<reference ref_id="CVE-2024-26772" ref_url="https://www.suse.com/security/cve/CVE-2024-26772/" source="CVE"/>
		<reference ref_id="CVE-2024-26773" ref_url="https://www.suse.com/security/cve/CVE-2024-26773/" source="CVE"/>
		<reference ref_id="CVE-2024-26783" ref_url="https://www.suse.com/security/cve/CVE-2024-26783/" source="CVE"/>
		<reference ref_id="CVE-2024-26791" ref_url="https://www.suse.com/security/cve/CVE-2024-26791/" source="CVE"/>
		<reference ref_id="CVE-2024-26792" ref_url="https://www.suse.com/security/cve/CVE-2024-26792/" source="CVE"/>
		<reference ref_id="CVE-2024-26816" ref_url="https://www.suse.com/security/cve/CVE-2024-26816/" source="CVE"/>
		<reference ref_id="CVE-2024-26817" ref_url="https://www.suse.com/security/cve/CVE-2024-26817/" source="CVE"/>
		<reference ref_id="CVE-2024-26820" ref_url="https://www.suse.com/security/cve/CVE-2024-26820/" source="CVE"/>
		<reference ref_id="CVE-2024-26825" ref_url="https://www.suse.com/security/cve/CVE-2024-26825/" source="CVE"/>
		<reference ref_id="CVE-2024-26830" ref_url="https://www.suse.com/security/cve/CVE-2024-26830/" source="CVE"/>
		<reference ref_id="CVE-2024-26833" ref_url="https://www.suse.com/security/cve/CVE-2024-26833/" source="CVE"/>
		<reference ref_id="CVE-2024-26836" ref_url="https://www.suse.com/security/cve/CVE-2024-26836/" source="CVE"/>
		<reference ref_id="CVE-2024-26840" ref_url="https://www.suse.com/security/cve/CVE-2024-26840/" source="CVE"/>
		<reference ref_id="CVE-2024-26843" ref_url="https://www.suse.com/security/cve/CVE-2024-26843/" source="CVE"/>
		<reference ref_id="CVE-2024-26852" ref_url="https://www.suse.com/security/cve/CVE-2024-26852/" source="CVE"/>
		<reference ref_id="CVE-2024-26853" ref_url="https://www.suse.com/security/cve/CVE-2024-26853/" source="CVE"/>
		<reference ref_id="CVE-2024-26855" ref_url="https://www.suse.com/security/cve/CVE-2024-26855/" source="CVE"/>
		<reference ref_id="CVE-2024-26856" ref_url="https://www.suse.com/security/cve/CVE-2024-26856/" source="CVE"/>
		<reference ref_id="CVE-2024-26857" ref_url="https://www.suse.com/security/cve/CVE-2024-26857/" source="CVE"/>
		<reference ref_id="CVE-2024-26861" ref_url="https://www.suse.com/security/cve/CVE-2024-26861/" source="CVE"/>
		<reference ref_id="CVE-2024-26862" ref_url="https://www.suse.com/security/cve/CVE-2024-26862/" source="CVE"/>
		<reference ref_id="CVE-2024-26866" ref_url="https://www.suse.com/security/cve/CVE-2024-26866/" source="CVE"/>
		<reference ref_id="CVE-2024-26872" ref_url="https://www.suse.com/security/cve/CVE-2024-26872/" source="CVE"/>
		<reference ref_id="CVE-2024-26875" ref_url="https://www.suse.com/security/cve/CVE-2024-26875/" source="CVE"/>
		<reference ref_id="CVE-2024-26876" ref_url="https://www.suse.com/security/cve/CVE-2024-26876/" source="CVE"/>
		<reference ref_id="CVE-2024-26877" ref_url="https://www.suse.com/security/cve/CVE-2024-26877/" source="CVE"/>
		<reference ref_id="CVE-2024-26878" ref_url="https://www.suse.com/security/cve/CVE-2024-26878/" source="CVE"/>
		<reference ref_id="CVE-2024-26879" ref_url="https://www.suse.com/security/cve/CVE-2024-26879/" source="CVE"/>
		<reference ref_id="CVE-2024-26881" ref_url="https://www.suse.com/security/cve/CVE-2024-26881/" source="CVE"/>
		<reference ref_id="CVE-2024-26882" ref_url="https://www.suse.com/security/cve/CVE-2024-26882/" source="CVE"/>
		<reference ref_id="CVE-2024-26883" ref_url="https://www.suse.com/security/cve/CVE-2024-26883/" source="CVE"/>
		<reference ref_id="CVE-2024-26884" ref_url="https://www.suse.com/security/cve/CVE-2024-26884/" source="CVE"/>
		<reference ref_id="CVE-2024-26885" ref_url="https://www.suse.com/security/cve/CVE-2024-26885/" source="CVE"/>
		<reference ref_id="CVE-2024-26891" ref_url="https://www.suse.com/security/cve/CVE-2024-26891/" source="CVE"/>
		<reference ref_id="CVE-2024-26893" ref_url="https://www.suse.com/security/cve/CVE-2024-26893/" source="CVE"/>
		<reference ref_id="CVE-2024-26895" ref_url="https://www.suse.com/security/cve/CVE-2024-26895/" source="CVE"/>
		<reference ref_id="CVE-2024-26896" ref_url="https://www.suse.com/security/cve/CVE-2024-26896/" source="CVE"/>
		<reference ref_id="CVE-2024-26897" ref_url="https://www.suse.com/security/cve/CVE-2024-26897/" source="CVE"/>
		<reference ref_id="CVE-2024-26898" ref_url="https://www.suse.com/security/cve/CVE-2024-26898/" source="CVE"/>
		<reference ref_id="CVE-2024-26901" ref_url="https://www.suse.com/security/cve/CVE-2024-26901/" source="CVE"/>
		<reference ref_id="CVE-2024-26903" ref_url="https://www.suse.com/security/cve/CVE-2024-26903/" source="CVE"/>
		<reference ref_id="CVE-2024-26915" ref_url="https://www.suse.com/security/cve/CVE-2024-26915/" source="CVE"/>
		<reference ref_id="CVE-2024-26917" ref_url="https://www.suse.com/security/cve/CVE-2024-26917/" source="CVE"/>
		<reference ref_id="CVE-2024-26927" ref_url="https://www.suse.com/security/cve/CVE-2024-26927/" source="CVE"/>
		<reference ref_id="CVE-2024-26933" ref_url="https://www.suse.com/security/cve/CVE-2024-26933/" source="CVE"/>
		<reference ref_id="CVE-2024-26939" ref_url="https://www.suse.com/security/cve/CVE-2024-26939/" source="CVE"/>
		<reference ref_id="CVE-2024-26948" ref_url="https://www.suse.com/security/cve/CVE-2024-26948/" source="CVE"/>
		<reference ref_id="CVE-2024-26950" ref_url="https://www.suse.com/security/cve/CVE-2024-26950/" source="CVE"/>
		<reference ref_id="CVE-2024-26951" ref_url="https://www.suse.com/security/cve/CVE-2024-26951/" source="CVE"/>
		<reference ref_id="CVE-2024-26955" ref_url="https://www.suse.com/security/cve/CVE-2024-26955/" source="CVE"/>
		<reference ref_id="CVE-2024-26956" ref_url="https://www.suse.com/security/cve/CVE-2024-26956/" source="CVE"/>
		<reference ref_id="CVE-2024-26960" ref_url="https://www.suse.com/security/cve/CVE-2024-26960/" source="CVE"/>
		<reference ref_id="CVE-2024-26965" ref_url="https://www.suse.com/security/cve/CVE-2024-26965/" source="CVE"/>
		<reference ref_id="CVE-2024-26966" ref_url="https://www.suse.com/security/cve/CVE-2024-26966/" source="CVE"/>
		<reference ref_id="CVE-2024-26969" ref_url="https://www.suse.com/security/cve/CVE-2024-26969/" source="CVE"/>
		<reference ref_id="CVE-2024-26970" ref_url="https://www.suse.com/security/cve/CVE-2024-26970/" source="CVE"/>
		<reference ref_id="CVE-2024-26972" ref_url="https://www.suse.com/security/cve/CVE-2024-26972/" source="CVE"/>
		<reference ref_id="CVE-2024-26979" ref_url="https://www.suse.com/security/cve/CVE-2024-26979/" source="CVE"/>
		<reference ref_id="CVE-2024-26981" ref_url="https://www.suse.com/security/cve/CVE-2024-26981/" source="CVE"/>
		<reference ref_id="CVE-2024-26982" ref_url="https://www.suse.com/security/cve/CVE-2024-26982/" source="CVE"/>
		<reference ref_id="CVE-2024-26993" ref_url="https://www.suse.com/security/cve/CVE-2024-26993/" source="CVE"/>
		<reference ref_id="CVE-2024-27013" ref_url="https://www.suse.com/security/cve/CVE-2024-27013/" source="CVE"/>
		<reference ref_id="CVE-2024-27014" ref_url="https://www.suse.com/security/cve/CVE-2024-27014/" source="CVE"/>
		<reference ref_id="CVE-2024-27030" ref_url="https://www.suse.com/security/cve/CVE-2024-27030/" source="CVE"/>
		<reference ref_id="CVE-2024-27038" ref_url="https://www.suse.com/security/cve/CVE-2024-27038/" source="CVE"/>
		<reference ref_id="CVE-2024-27039" ref_url="https://www.suse.com/security/cve/CVE-2024-27039/" source="CVE"/>
		<reference ref_id="CVE-2024-27041" ref_url="https://www.suse.com/security/cve/CVE-2024-27041/" source="CVE"/>
		<reference ref_id="CVE-2024-27042" ref_url="https://www.suse.com/security/cve/CVE-2024-27042/" source="CVE"/>
		<reference ref_id="CVE-2024-27043" ref_url="https://www.suse.com/security/cve/CVE-2024-27043/" source="CVE"/>
		<reference ref_id="CVE-2024-27046" ref_url="https://www.suse.com/security/cve/CVE-2024-27046/" source="CVE"/>
		<reference ref_id="CVE-2024-27056" ref_url="https://www.suse.com/security/cve/CVE-2024-27056/" source="CVE"/>
		<reference ref_id="CVE-2024-27059" ref_url="https://www.suse.com/security/cve/CVE-2024-27059/" source="CVE"/>
		<reference ref_id="CVE-2024-27062" ref_url="https://www.suse.com/security/cve/CVE-2024-27062/" source="CVE"/>
		<reference ref_id="CVE-2024-27389" ref_url="https://www.suse.com/security/cve/CVE-2024-27389/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-27389: Fixed pstore inode handling with d_invalidate() (bsc#1223705).
- CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).
- CVE-2024-27056: Fixed wifi/iwlwifi/mvm to ensure offloading TID queue exists (bsc#1223822).
- CVE-2024-27046: Fixed nfp/flower handling acti_netdevs allocation failure (bsc#1223827).
- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).
- CVE-2024-27042: Fixed drm/amdgpu for potential out-of-bounds access in amdgpu_discovery_reg_base_init() (bsc#1223823).
- CVE-2024-27041: Fixed drm/amd/display NULL checks for adev-&gt;dm.dc in amdgpu_dm_fini() (bsc#1223714).
- CVE-2024-27039: Fixed clk/hisilicon/hi3559a an erroneous devm_kfree() (bsc#1223821).
- CVE-2024-27038: Fixed clk_core_get NULL pointer dereference (bsc#1223816).
- CVE-2024-27030: Fixed octeontx2-af to use separate handlers for interrupts (bsc#1223790).
- CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS (bsc#1223735).
- CVE-2024-27013: Fixed tun limit printing rate when illegal packet received by tun device (bsc#1223745).
- CVE-2024-26993: Fixed fs/sysfs reference leak in sysfs_break_active_protection() (bsc#1223693).
- CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value of zero (bsc#1223634).
- CVE-2024-26970: Fixed clk/qcom/gcc-ipq6018 termination of frequency table arrays (bsc#1223644).
- CVE-2024-26969: Fixed clk/qcom/gcc-ipq8074 termination of frequency table arrays (bsc#1223645).
- CVE-2024-26966: Fixed clk/qcom/mmcc-apq8084 termination of frequency table arrays (bsc#1223646).
- CVE-2024-26965: Fixed clk/qcom/mmcc-msm8974 termination of frequency table arrays (bsc#1223648).
- CVE-2024-26960: Fixed mm/swap race between free_swap_and_cache() and swapoff() (bsc#1223655).
- CVE-2024-26951: Fixed wireguard/netlink check for dangling peer via is_dead instead of empty list (bsc#1223660).
- CVE-2024-26950: Fixed wireguard/netlink to access device through ctx instead of peer (bsc#1223661).
- CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in dc_state_release (bsc#1223664).
- CVE-2024-26939: Fixed drm/i915/vma UAF on destroy against retire race (bsc#1223679).
- CVE-2024-26927: Fixed ASoC/SOF bounds checking to firmware data Smatch (bsc#1223525).
- CVE-2024-26915: Fixed drm/amdgpu reset IH OVERFLOW_CLEAR bit (bsc#1223207).
- CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent kernel-infoleak (bsc#1223198).
- CVE-2024-26898: Fixed aoe potential use-after-free problem in aoecmd_cfg_pkts (bsc#1223016).
- CVE-2024-26896: Fixed wifi/wfx memory leak when starting AP (bsc#1223042).
- CVE-2024-26893: Fixed firmware/arm_scmi for possible double free in SMC transport cleanup path (bsc#1223196).
- CVE-2024-26885: Fixed bpf DEVMAP_HASH overflow check on 32-bit arches (bsc#1223190).
- CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches (bsc#1223189).
- CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches (bsc#1223035).
- CVE-2024-26882: Fixed net/ip_tunnel to make sure to pull inner header in ip_tunnel_rcv() (bsc#1223034).
- CVE-2024-26881: Fixed net/hns3 kernel crash when 1588 is received on HIP08 devices (bsc#1223041).
- CVE-2024-26879: Fixed clk/meson by adding missing clocks to axg_clk_regmaps (bsc#1223066).
- CVE-2024-26878: Fixed quota for potential NULL pointer dereference (bsc#1223060).
- CVE-2024-26876: Fixed drm/bridge/adv7511 crash on irq during probe (bsc#1223119).
- CVE-2024-26866: Fixed spi/spi-fsl-lpspi by removing redundant spi_controller_put call (bsc#1223024).
- CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111).
- CVE-2024-26861: Fixed wireguard/receive annotate data-race around receiving_counter.counter (bsc#1223076).
- CVE-2024-26857: Fixed geneve to make sure to pull inner header in geneve_rx() (bsc#1223058).
- CVE-2024-26856: Fixed use-after-free inside sparx5_del_mact_entry (bsc#1223052).
- CVE-2024-26855: Fixed net/ice potential NULL pointer dereference in ice_bridge_setlink() (bsc#1223051).
- CVE-2024-26853: Fixed igc returning frame twice in XDP_REDIRECT (bsc#1223061).
- CVE-2024-26852: Fixed net/ipv6 to avoid possible UAF in ip6_route_mpath_notify() (bsc#1223057).
- CVE-2024-26840: Fixed a memory leak in cachefiles_add_cache() (bsc#1222976).
- CVE-2024-26836: Fixed platform/x86/think-lmi password opcode ordering for workstations (bsc#1222968).
- CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove administratively set MAC (bsc#1223012).
- CVE-2024-26817: Fixed amdkfd to use calloc instead of kzalloc to avoid integer overflow (bsc#1222812).
- CVE-2024-26816: Fixed relocations in .notes section when building with CONFIG_XEN_PV=y by ignoring them (bsc#1222624).
- CVE-2024-26791: Fixed btrfs/dev-replace properly validate device names (bsc#1222793).
- CVE-2024-26783: Fixed mm/vmscan bug when calling wakeup_kswapd() with a wrong zone index (bsc#1222615).
- CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618).
- CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (bsc#1222613).
- CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222726).
- CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct aio_kiocb conversion (bsc#1222721).
- CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
- CVE-2024-26700: Fixed drm/amd/display MST Null pointer dereference  for RV (bsc#1222870).
- CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup (bsc#1222435).
- CVE-2024-26679: Fixed inet read sk-&gt;sk_family once in inet_recv_error() (bsc#1222385).
- CVE-2024-26675: Fixed ppp_async to limit MRU to 64K (bsc#1222379).
- CVE-2024-26673: Fixed netfilter/nft_ct layer 3 and 4 protocol sanitization (bsc#1222368).
- CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race (bsc#1222357).
- CVE-2024-26656: Fixed drm/amdgpu use-after-free bug (bsc#1222307).
- CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).
- CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay (bsc#1220342).
- CVE-2024-23850: Fixed double free of anonymous device after snapshot  creation failure (bsc#1219126).
- CVE-2024-23848: Fixed media/cec for possible use-after-free in cec_queue_msg_fh (bsc#1219104).
- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).
- CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170).
- CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
- CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).
- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).
- CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device() (bsc#1223686).
- CVE-2023-52645: Fixed pmdomain/mediatek race conditions with genpd (bsc#1223033).
- CVE-2023-52635: Fixed PM/devfreq to synchronize devfreq_monitor_[start/stop] (bsc#1222294).
- CVE-2023-52620: Fixed netfilter/nf_tables to disallow timeout for anonymous sets never used from userspace (bsc#1221825).
- CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in mpi_ec_init (bsc#1221612).
- CVE-2023-52614: Fixed PM/devfreq buffer overflow in trans_stat_show (bsc#1221617).
- CVE-2023-52593: Fixed wifi/wfx possible NULL pointer dereference in wfx_set_mfp_ap() (bsc#1221042).
- CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044).
- CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory renaming (bsc#1221088).
- CVE-2023-52589: Fixed media/rkisp1 IRQ disable race issue (bsc#1221084).
- CVE-2023-52585: Fixed drm/amdgpu for possible NULL pointer dereference in amdgpu_ras_query_error_status_helper() (bsc#1221080).
- CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223505).
- CVE-2022-48659: Fixed mm/slub to return errno if kmalloc() fails (bsc#1223498).
- CVE-2022-48658: Fixed mm/slub to avoid a problem in flush_cpu_slab()/__free_slab() task context (bsc#1223496).
- CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb-&gt;mac_header (bsc#1223513).
- CVE-2022-48642: Fixed netfilter/nf_tables percpu memory leak at nf_tables_addchain() (bsc#1223478).
- CVE-2022-48640: Fixed bonding for possible NULL pointer dereference in bond_rr_gen_slave_id (bsc#1223499).
- CVE-2022-48631: Fixed a bug in ext4, when parsing extents where eh_entries == 0 and eh_depth &gt; 0 (bsc#1223475).
- CVE-2021-47214: Fixed hugetlb/userfaultfd during restore reservation in hugetlb_mcopy_atomic_pte() (bsc#1222710).
- CVE-2021-47211: Fixed a null pointer dereference on pointer cs_desc in usb-audio (bsc#1222869).
- CVE-2021-47207: Fixed a null pointer dereference on pointer block in gus (bsc#1222790).
- CVE-2021-47205: Unregistered clocks/resets when unbinding in sunxi-ng (bsc#1222888).
- CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions (bsc#1222878)
- CVE-2021-47200: Fixed drm/prime for possible use-after-free in mmap within drm_gem_ttm_mmap() and drm_gem_ttm_mmap() (bsc#1222838).
- CVE-2021-47195: Fixed use-after-free inside SPI via add_lock mutex (bsc#1222832).
- CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer (bsc#1222669).
- CVE-2021-47184: Fixed NULL pointer dereference on VSI filter sync (bsc#1222666).

The following non-security bugs were fixed:

- ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block counter (stable-fixes).
- ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC (stable-fixes).
- ALSA: hda/realtek - Fix inactive headset mic jack (stable-fixes).
- ALSA: hda/realtek: Add quirk for HP SnowWhite laptops (stable-fixes).
- ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes).
- ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git-fixes).
- ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable-fixes).
- ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable-fixes).
- ALSA: scarlett2: Add correct product series name to messages (stable-fixes).
- ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes).
- ALSA: scarlett2: Default mixer driver to enabled (stable-fixes).
- ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes).
- ASoC: meson: axg-card: make links nonatomic (git-fixes).
- ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes).
- ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes).
- ASoC: soc-core.c: Skip dummy codec when adding platforms (stable-fixes).
- ASoC: tegra: Fix DSPK 16-bit playback (git-fixes).
- ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes).
- Bluetooth: Add new quirk for broken read key length on ATS2851 (git-fixes).
- Bluetooth: Fix TOCTOU in HCI debugfs implementation (git-fixes).
- Bluetooth: Fix memory leak in hci_req_sync_complete() (git-fixes).
- Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable-fixes).
- Bluetooth: L2CAP: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: RFCOMM: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: SCO: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: add quirk for broken address properties (git-fixes).
- Bluetooth: btintel: Fix null ptr deref in btintel_read_version (stable-fixes).
- Bluetooth: btintel: Fixe build regression (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable-fixes).
- Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes).
- Bluetooth: hci_event: set the conn encrypted before conn establishes (stable-fixes).
- Bluetooth: hci_sock: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes).
- Documentation: Add missing documentation for EXPORT_OP flags (stable-fixes).
- HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev-&gt;devc (git-fixes).
- HID: logitech-dj: allow mice to use all types of reports (git-fixes).
- HID: uhid: Use READ_ONCE()/WRITE_ONCE() for -&gt;running (stable-fixes).
- Input: allocate keycode for Display refresh rate toggle (stable-fixes).
- Input: synaptics-rmi4 - fail probing if memory allocation for 'phys' fails (stable-fixes).
- NFC: trf7970a: disable all regulators on removal (git-fixes).
- PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369 ltc#205888).
- RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes).
- Reapply 'drm/qxl: simplify qxl_fence_wait' (stable-fixes).
- Revert 'ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default' (stable-fixes).
- Revert 'drm/qxl: simplify qxl_fence_wait' (git-fixes).
- Revert 'ice: Fix ice VF reset during iavf initialization (jsc#PED-376).' (bsc#1223275)
- Revert 'usb: cdc-wdm: close race between read and workqueue' (git-fixes).
- Revert 'usb: phy: generic: Get the vbus supply' (git-fixes).
- USB: UAS: return ENODEV when submit urbs fail with device not attached (stable-fixes).
- USB: core: Add hub_get() and hub_put() routines (git-fixes).
- USB: core: Fix access violation during port device removal (git-fixes).
- USB: core: Fix deadlock in port 'disable' sysfs attribute (git-fixes).
- USB: serial: add device ID for VeriFone adapter (stable-fixes).
- USB: serial: cp210x: add ID for MGP Instruments PDS100 (stable-fixes).
- USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M (stable-fixes).
- USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB (stable-fixes).
- USB: serial: option: add Fibocom FM135-GL variants (stable-fixes).
- USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes).
- USB: serial: option: add MeiG Smart SLM320 product (stable-fixes).
- USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable-fixes).
- USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes).
- USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes).
- USB: serial: option: support Quectel EM060K sub-models (stable-fixes).
- nfsd: Fixed mount kerberized nfs4 share issue (git-fixes bsc#1223858).
- s390: Fixed kernel backtrack (bsc#1141539 git-fixes).
- nfsd: Fixed mount issue with KOTD (bsc#1223380 bsc#1217408 bsc#1223640).
- s390: Fixed LPM of lpar failure with error HSCLA2CF in 19th loops (jsc#PED-542 git-fixes bsc#1213573 ltc#203238).
- ahci: asm1064: asm1166: do not limit reported ports (git-fixes).
- ahci: asm1064: correct count of reported ports (stable-fixes).
- arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes)
- arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git-fixes)
- arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git-fixes)
- arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes)
- arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git-fixes)
- arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes)
- arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes)
- arm64: hibernate: Fix level3 translation fault in swsusp_save() (git-fixes).
- ax25: fix use-after-free bugs caused by ax25_ds_del_timer (git-fixes).
- batman-adv: Avoid infinite loop trying to resize local TT (git-fixes).
- clk: Get runtime PM before walking tree during disable_unused (git-fixes).
- clk: Initialize struct clk_core kref earlier (stable-fixes).
- clk: Mark 'all_lists' as const (stable-fixes).
- clk: Print an info line before disabling unused clocks (stable-fixes).
- clk: Remove prepare_lock hold assertion in __clk_release() (git-fixes).
- clk: remove extra empty line (stable-fixes).
- comedi: vmk80xx: fix incomplete endpoint checking (git-fixes).
- dma: xilinx_dpdma: Fix locking (git-fixes).
- dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes).
- dmaengine: owl: fix register access functions (git-fixes).
- dmaengine: tegra186: Fix residual calculation (git-fixes).
- docs: Document the FAN_FS_ERROR event (stable-fixes).
- drm-print: add drm_dbg_driver to improve namespace symmetry (stable-fixes).
- drm/amd/display: Do not recursively call manual trigger programming (stable-fixes).
- drm/amd/display: Fix nanosec stat overflow (stable-fixes).
- drm/amd/display: fix disable otg wa logic in DCN316 (stable-fixes).
- drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 (stable-fixes).
- drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes).
- drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes).
- drm/amdgpu: Reset dGPU if suspend got aborted (stable-fixes).
- drm/amdgpu: always force full reset for SOC21 (stable-fixes).
- drm/amdgpu: fix incorrect active rb bitmap for gfx11 (stable-fixes).
- drm/amdgpu: fix incorrect number of active RBs for gfx11 (stable-fixes).
- drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 (git-fixes).
- drm/amdgpu: validate the parameters of bo mapping operations more clearly (git-fixes).
- drm/amdkfd: Reset GPU on queue preemption failure (stable-fixes).
- drm/ast: Fix soft lockup (git-fixes).
- drm/client: Fully protect modes[] with dev-&gt;mode_config.mutex (stable-fixes).
- drm/i915/cdclk: Fix CDCLK programming order when pipes are active (git-fixes).
- drm/i915/vrr: Disable VRR when using bigjoiner (stable-fixes).
- drm/i915: Disable port sync when bigjoiner is used (stable-fixes).
- drm/msm/dp: fix typo in dp_display_handle_port_status_changed() (git-fixes).
- drm/nouveau/nvkm: add a replacement for nvkm_notify (bsc#1223834)
- drm/panel: ili9341: Respect deferred probe (git-fixes).
- drm/panel: ili9341: Use predefined error codes (git-fixes).
- drm/panel: visionox-rm69299: do not unregister DSI device (git-fixes).
- drm/vc4: do not check if plane-&gt;state-&gt;fb == state-&gt;fb (stable-fixes).
- drm/vmwgfx: Enable DMA mappings with SEV (git-fixes).
- drm/vmwgfx: Fix crtc's atomic check conditional (git-fixes).
- drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes).
- drm/vmwgfx: Sort primary plane formats by order of preference (git-fixes).
- drm: nv04: Fix out of bounds access (git-fixes).
- drm: panel-orientation-quirks: Add quirk for GPD Win Mini (stable-fixes).
- drm: panel-orientation-quirks: Add quirk for Lenovo Legion Go (stable-fixes).
- dump_stack: Do not get cpu_sync for panic CPU (bsc#1223574).
- fbdev: fix incorrect address computation in deferred IO (git-fixes).
- fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 (stable-fixes).
- fbmon: prevent division by zero in fb_videomode_from_videomode() (stable-fixes).
- fuse: do not unhash root (bsc#1223951).
- fuse: fix root lookup with nonzero generation (bsc#1223950).
- hwmon: (amc6821) add of_match table (stable-fixes).
- i2c: pxa: hide unused icr_bits[] variable (git-fixes).
- i2c: smbus: fix NULL function pointer dereference (git-fixes).
- i40e: Fix VF MAC filter removal (git-fixes).
- idma64: Do not try to serve interrupts when device is powered off (git-fixes).
- iio: accel: mxc4005: Interrupt handling fixes (git-fixes).
- iio:imu: adis16475: Fix sync mode setting (git-fixes).
- init/main.c: Fix potential static_command_line memory overflow (git-fixes).
- ipv6/addrconf: fix a potential refcount underflow for idev (git-fixes).
- irqchip/gic-v3-its: Prevent double free on error (git-fixes).
- kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).
- livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539).
- media: cec: core: remove length check of Timer Status (stable-fixes).
- media: sta2x11: fix irq handler cast (stable-fixes).
- mei: me: add arrow lake point H DID (stable-fixes).
- mei: me: add arrow lake point S DID (stable-fixes).
- mei: me: disable RPL-S on SPS and IGN firmwares (git-fixes).
- mm/vmscan: make sure wakeup_kswapd with managed zone (bsc#1223473).
- mmc: sdhci-msm: pervent access to suspended controller (git-fixes).
- mtd: diskonchip: work around ubsan link failure (stable-fixes).
- net: bridge: vlan: fix memory leak in __allowed_ingress (git-fixes).
- net: fix a memleak when uncloning an skb dst and its metadata (git-fixes).
- net: fix skb leak in __skb_tstamp_tx() (git-fixes).
- net: ipv6: ensure we call ipv6_mc_down() at most once (git-fixes).
- net: mld: fix reference count leak in mld_{query | report}_work() (git-fixes).
- net: stream: purge sk_error_queue in sk_stream_kill_queues() (git-fixes).
- net: usb: ax88179_178a: avoid writing the mac address before first reading (git-fixes).
- net: usb: ax88179_178a: stop lying about skb-&gt;truesize (git-fixes).
- net: vlan: fix underflow for the real_dev refcnt (git-fixes).
- net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360).
- netfilter: br_netfilter: Drop dst references before setting (git-fixes).
- netfilter: ipt_CLUSTERIP: fix refcount leak in clusterip_tg_check() (git-fixes).
- netfilter: nft_ct: fix l3num expectations with inet pseudo family (git-fixes).
- nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380 bsc#1217408).
- nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
- nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
- nouveau: fix function cast warning (git-fixes).
- nouveau: fix instmem race condition around ptr stores (git-fixes).
- phy: tegra: xusb: Add API to retrieve the port number of phy (stable-fixes).
- pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs (stable-fixes).
- platform/x86: intel-vbtn: Update tablet mode switch at end of probe (git-fixes).
- platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi Vi8 tablet (stable-fixes).
- powerpc/kasan: Do not instrument non-maskable or raw interrupts (bsc#1223191).
- powerpc/rtas: define pr_fmt and convert printk call sites (bsc#1223369 ltc#205888).
- powerpc/rtas: export rtas_error_rc() for reuse (bsc#1223369 ltc#205888).
- powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645 ltc#205739 bsc#1223191).
- powerpc: Refactor verification of MSR_RI (bsc#1223191).
- printk: Add this_cpu_in_panic() (bsc#1223574).
- printk: Adjust mapping for 32bit seq macros (bsc#1223574).
- printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1223574).
- printk: Disable passing console lock owner completely during panic() (bsc#1223574).
- printk: Drop console_sem during panic (bsc#1223574).
- printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic() (bsc#1223574).
- printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1223574).
- printk: Wait for all reserved records with pr_flush() (bsc#1223574).
- printk: nbcon: Relocate 32bit seq macros (bsc#1223574).
- printk: ringbuffer: Clarify special lpos values (bsc#1223574).
- printk: ringbuffer: Cleanup reader terminology (bsc#1223574).
- printk: ringbuffer: Do not skip non-finalized records with prb_next_seq() (bsc#1223574).
- printk: ringbuffer: Improve prb_next_seq() performance (bsc#1223574).
- printk: ringbuffer: Skip non-finalized records in panic (bsc#1223574).
- pstore/zone: Add a null pointer check to the psz_kmsg_read (stable-fixes).
- ring-buffer: Only update pages_touched when a new page is touched (git-fixes).
- ring-buffer: use READ_ONCE() to read cpu_buffer-&gt;commit_page in concurrent environment (git-fixes).
- s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223875).
- s390/decompressor: fix misaligned symbol build error (git-fixes bsc#1223785).
- s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223877).
- s390/mm: Fix storage key clearing for guest huge pages (git-fixes bsc#1223878).
- s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223879).
- s390/scm: fix virtual vs physical address confusion (git-fixes bsc#1223784).
- s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes bsc#1223876).
- s390/vdso: drop '-fPIC' from LDFLAGS (git-fixes bsc#1223598).
- s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes bsc#1223595).
- serial/pmac_zilog: Remove flawed mitigation for rx irq flood (git-fixes).
- serial: core: Provide port lock wrappers (stable-fixes).
- serial: core: fix kernel-doc for uart_port_unlock_irqrestore() (git-fixes).
- serial: mxs-auart: add spinlock around changing cts state (git-fixes).
- slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes).
- speakup: Avoid crash on very long word (git-fixes).
- speakup: Fix 8bit characters from direct synth (git-fixes).
- spi: hisi-kunpeng: Delete the dump interface of data registers in debugfs (git-fixes).
- tcp/udp: Fix memleaks of sk and zerocopy skbs with TX timestamp (git-fixes).
- thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes).
- thunderbolt: Fix wake configurations after device unplug (stable-fixes).
- tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string (git-fixes).
- tracing: Show size of requested perf buffer (git-fixes).
- usb: Disable USB3 LPM at shutdown (stable-fixes).
- usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed device (git-fixes).
- usb: dwc2: host: Fix dereference issue in DDMA completion flow (git-fixes).
- usb: dwc3: core: Prevent phy suspend during init (Git-fixes).
- usb: gadget: composite: fix OS descriptors w_value logic (git-fixes).
- usb: gadget: f_fs: Fix a race condition when processing setup packets (git-fixes).
- usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error (stable-fixes).
- usb: gadget: tegra-xudc: Fix USB3 PHY retrieval logic (git-fixes).
- usb: ohci: Prevent missed ohci interrupts (git-fixes).
- usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined (stable-fixes).
- usb: typec: tcpci: add generic tcpci fallback compatible (stable-fixes).
- usb: typec: tcpm: Check for port partner validity before consuming it (git-fixes).
- usb: typec: tcpm: unregister existing source caps before re-registration (bsc#1220569).
- usb: typec: ucsi: Ack unsupported commands (stable-fixes).
- usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset (stable-fixes).
- usb: typec: ucsi: Fix connector check on init (git-fixes).
- usb: udc: remove warning when queue disabled ep (stable-fixes).
- virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223949).
- wifi: ath9k: fix LNA selection in ath_ant_try_scan() (stable-fixes).
- wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git-fixes).
- wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes).
- wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes (stable-fixes).
- wifi: nl80211: do not free NULL coalescing rule (git-fixes).
- x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES (git-fixes).
- x86/bugs: Fix BHI documentation (git-fixes).
- x86/bugs: Fix BHI handling of RRSBA (git-fixes).
- x86/bugs: Fix BHI retpoline check (git-fixes).
- x86/bugs: Fix return type of spectre_bhi_state() (git-fixes).
- x86/bugs: Rename various 'ia32_cap' variables to 'x86_arch_cap_msr' (git-fixes).
- x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ (git-fixes).
- x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type (jsc#PED-7167 git-fixes).
- x86/sev: Skip ROM range scans and validation for SEV-SNP guests (jsc#PED-7167 git-fixes).
- xfrm6: fix inet6_dev refcount underflow problem (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-14"/>
	<updated date="2024-05-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141539">SUSE bug 1141539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190576">SUSE bug 1190576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192145">SUSE bug 1192145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192837">SUSE bug 1192837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196869">SUSE bug 1196869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200313">SUSE bug 1200313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201308">SUSE bug 1201308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201489">SUSE bug 1201489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203906">SUSE bug 1203906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203935">SUSE bug 1203935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204614">SUSE bug 1204614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207361">SUSE bug 1207361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211592">SUSE bug 1211592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213573">SUSE bug 1213573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217339">SUSE bug 1217339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217408">SUSE bug 1217408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218562">SUSE bug 1218562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218917">SUSE bug 1218917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219104">SUSE bug 1219104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219126">SUSE bug 1219126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219141">SUSE bug 1219141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219169">SUSE bug 1219169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219170">SUSE bug 1219170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219264">SUSE bug 1219264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220342">SUSE bug 1220342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220569">SUSE bug 1220569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220761">SUSE bug 1220761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221042">SUSE bug 1221042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221044">SUSE bug 1221044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221080">SUSE bug 1221080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221084">SUSE bug 1221084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221088">SUSE bug 1221088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221299">SUSE bug 1221299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221612">SUSE bug 1221612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221617">SUSE bug 1221617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221645">SUSE bug 1221645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221825">SUSE bug 1221825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222294">SUSE bug 1222294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222307">SUSE bug 1222307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222357">SUSE bug 1222357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222368">SUSE bug 1222368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222379">SUSE bug 1222379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222385">SUSE bug 1222385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222424">SUSE bug 1222424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222430">SUSE bug 1222430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222435">SUSE bug 1222435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222482">SUSE bug 1222482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222559">SUSE bug 1222559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222585">SUSE bug 1222585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222613">SUSE bug 1222613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222615">SUSE bug 1222615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222618">SUSE bug 1222618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222624">SUSE bug 1222624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222666">SUSE bug 1222666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222669">SUSE bug 1222669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222671">SUSE bug 1222671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222703">SUSE bug 1222703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222704">SUSE bug 1222704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222709">SUSE bug 1222709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222710">SUSE bug 1222710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222721">SUSE bug 1222721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222726">SUSE bug 1222726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222773">SUSE bug 1222773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222776">SUSE bug 1222776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222785">SUSE bug 1222785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222787">SUSE bug 1222787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222790">SUSE bug 1222790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222791">SUSE bug 1222791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222792">SUSE bug 1222792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222793">SUSE bug 1222793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222796">SUSE bug 1222796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222812">SUSE bug 1222812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222824">SUSE bug 1222824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222829">SUSE bug 1222829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222832">SUSE bug 1222832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222836">SUSE bug 1222836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222838">SUSE bug 1222838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222866">SUSE bug 1222866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222867">SUSE bug 1222867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222869">SUSE bug 1222869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222870">SUSE bug 1222870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222876">SUSE bug 1222876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222878">SUSE bug 1222878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222879">SUSE bug 1222879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222881">SUSE bug 1222881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222883">SUSE bug 1222883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222888">SUSE bug 1222888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222894">SUSE bug 1222894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222901">SUSE bug 1222901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222968">SUSE bug 1222968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222976">SUSE bug 1222976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223012">SUSE bug 1223012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223014">SUSE bug 1223014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223016">SUSE bug 1223016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223024">SUSE bug 1223024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223033">SUSE bug 1223033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223034">SUSE bug 1223034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223035">SUSE bug 1223035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223036">SUSE bug 1223036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223037">SUSE bug 1223037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223041">SUSE bug 1223041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223042">SUSE bug 1223042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223051">SUSE bug 1223051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223052">SUSE bug 1223052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223056">SUSE bug 1223056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223057">SUSE bug 1223057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223058">SUSE bug 1223058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223060">SUSE bug 1223060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223061">SUSE bug 1223061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223065">SUSE bug 1223065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223066">SUSE bug 1223066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223076">SUSE bug 1223076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223078">SUSE bug 1223078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223111">SUSE bug 1223111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223115">SUSE bug 1223115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223118">SUSE bug 1223118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223119">SUSE bug 1223119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223140">SUSE bug 1223140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223187">SUSE bug 1223187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223189">SUSE bug 1223189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223190">SUSE bug 1223190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223191">SUSE bug 1223191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223196">SUSE bug 1223196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223197">SUSE bug 1223197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223198">SUSE bug 1223198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223207">SUSE bug 1223207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223275">SUSE bug 1223275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223323">SUSE bug 1223323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223360">SUSE bug 1223360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223369">SUSE bug 1223369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223380">SUSE bug 1223380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223432">SUSE bug 1223432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223473">SUSE bug 1223473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223474">SUSE bug 1223474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223475">SUSE bug 1223475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223477">SUSE bug 1223477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223478">SUSE bug 1223478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223479">SUSE bug 1223479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223481">SUSE bug 1223481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223482">SUSE bug 1223482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223484">SUSE bug 1223484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223487">SUSE bug 1223487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223490">SUSE bug 1223490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223496">SUSE bug 1223496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223498">SUSE bug 1223498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223499">SUSE bug 1223499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223501">SUSE bug 1223501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223502">SUSE bug 1223502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223503">SUSE bug 1223503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223505">SUSE bug 1223505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223509">SUSE bug 1223509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223511">SUSE bug 1223511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223512">SUSE bug 1223512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223513">SUSE bug 1223513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223516">SUSE bug 1223516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223517">SUSE bug 1223517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223518">SUSE bug 1223518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223519">SUSE bug 1223519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223520">SUSE bug 1223520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223522">SUSE bug 1223522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223523">SUSE bug 1223523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223525">SUSE bug 1223525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223536">SUSE bug 1223536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223539">SUSE bug 1223539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223574">SUSE bug 1223574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223595">SUSE bug 1223595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223598">SUSE bug 1223598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223628">SUSE bug 1223628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223634">SUSE bug 1223634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223640">SUSE bug 1223640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223643">SUSE bug 1223643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223644">SUSE bug 1223644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223645">SUSE bug 1223645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223646">SUSE bug 1223646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223648">SUSE bug 1223648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223655">SUSE bug 1223655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223657">SUSE bug 1223657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223660">SUSE bug 1223660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223661">SUSE bug 1223661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223663">SUSE bug 1223663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223664">SUSE bug 1223664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223668">SUSE bug 1223668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223670">SUSE bug 1223670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223679">SUSE bug 1223679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223686">SUSE bug 1223686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223693">SUSE bug 1223693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223705">SUSE bug 1223705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223714">SUSE bug 1223714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223735">SUSE bug 1223735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223738">SUSE bug 1223738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223745">SUSE bug 1223745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223784">SUSE bug 1223784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223785">SUSE bug 1223785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223790">SUSE bug 1223790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223816">SUSE bug 1223816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223821">SUSE bug 1223821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223822">SUSE bug 1223822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223823">SUSE bug 1223823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223824">SUSE bug 1223824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223827">SUSE bug 1223827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223834">SUSE bug 1223834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223858">SUSE bug 1223858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223875">SUSE bug 1223875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223876">SUSE bug 1223876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223877">SUSE bug 1223877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223878">SUSE bug 1223878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223879">SUSE bug 1223879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223894">SUSE bug 1223894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223921">SUSE bug 1223921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223922">SUSE bug 1223922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223923">SUSE bug 1223923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223924">SUSE bug 1223924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223929">SUSE bug 1223929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223931">SUSE bug 1223931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223932">SUSE bug 1223932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223934">SUSE bug 1223934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223941">SUSE bug 1223941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223948">SUSE bug 1223948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223949">SUSE bug 1223949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223950">SUSE bug 1223950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223951">SUSE bug 1223951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223952">SUSE bug 1223952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223953">SUSE bug 1223953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223956">SUSE bug 1223956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223957">SUSE bug 1223957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223960">SUSE bug 1223960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223962">SUSE bug 1223962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223963">SUSE bug 1223963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223964">SUSE bug 1223964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223996">SUSE bug 1223996</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47047/">CVE-2021-47047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47047">CVE-2021-47047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47184/">CVE-2021-47184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47184">CVE-2021-47184 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47185/">CVE-2021-47185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47185">CVE-2021-47185 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47187/">CVE-2021-47187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47187">CVE-2021-47187 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47188/">CVE-2021-47188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47188">CVE-2021-47188 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47191/">CVE-2021-47191 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47191">CVE-2021-47191 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47192/">CVE-2021-47192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47192">CVE-2021-47192 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47193/">CVE-2021-47193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47193">CVE-2021-47193 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47194/">CVE-2021-47194 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47194">CVE-2021-47194 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47195/">CVE-2021-47195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47195">CVE-2021-47195 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47196/">CVE-2021-47196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47196">CVE-2021-47196 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47197/">CVE-2021-47197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47197">CVE-2021-47197 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47198/">CVE-2021-47198 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47198">CVE-2021-47198 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47199/">CVE-2021-47199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47199">CVE-2021-47199 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47200/">CVE-2021-47200 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47200">CVE-2021-47200 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47201/">CVE-2021-47201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47201">CVE-2021-47201 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47202/">CVE-2021-47202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47202">CVE-2021-47202 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47203/">CVE-2021-47203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47203">CVE-2021-47203 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47204/">CVE-2021-47204 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47204">CVE-2021-47204 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47205/">CVE-2021-47205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47205">CVE-2021-47205 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47206/">CVE-2021-47206 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47206">CVE-2021-47206 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47207/">CVE-2021-47207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47207">CVE-2021-47207 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47209/">CVE-2021-47209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47209">CVE-2021-47209 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47210/">CVE-2021-47210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47210">CVE-2021-47210 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47211/">CVE-2021-47211 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47211">CVE-2021-47211 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47212/">CVE-2021-47212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47212">CVE-2021-47212 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47214/">CVE-2021-47214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47214">CVE-2021-47214 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47215/">CVE-2021-47215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47215">CVE-2021-47215 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47216/">CVE-2021-47216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47216">CVE-2021-47216 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47217/">CVE-2021-47217 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47217">CVE-2021-47217 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47218/">CVE-2021-47218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47218">CVE-2021-47218 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47219/">CVE-2021-47219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47219">CVE-2021-47219 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48631/">CVE-2022-48631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48631">CVE-2022-48631 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48632/">CVE-2022-48632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48632">CVE-2022-48632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48634/">CVE-2022-48634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48634">CVE-2022-48634 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48636/">CVE-2022-48636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48636">CVE-2022-48636 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48637/">CVE-2022-48637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48637">CVE-2022-48637 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48638/">CVE-2022-48638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48638">CVE-2022-48638 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48639/">CVE-2022-48639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48639">CVE-2022-48639 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48640/">CVE-2022-48640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48640">CVE-2022-48640 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48642/">CVE-2022-48642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48642">CVE-2022-48642 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48644/">CVE-2022-48644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48644">CVE-2022-48644 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48646/">CVE-2022-48646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48646">CVE-2022-48646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48647/">CVE-2022-48647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48647">CVE-2022-48647 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48648/">CVE-2022-48648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48648">CVE-2022-48648 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48650/">CVE-2022-48650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48650">CVE-2022-48650 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48651/">CVE-2022-48651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48651">CVE-2022-48651 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48652/">CVE-2022-48652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48652">CVE-2022-48652 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48653/">CVE-2022-48653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48653">CVE-2022-48653 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48654/">CVE-2022-48654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48654">CVE-2022-48654 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48655/">CVE-2022-48655 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48655">CVE-2022-48655 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48656/">CVE-2022-48656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48656">CVE-2022-48656 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48657/">CVE-2022-48657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48657">CVE-2022-48657 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48658/">CVE-2022-48658 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48658">CVE-2022-48658 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48659/">CVE-2022-48659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48659">CVE-2022-48659 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48660/">CVE-2022-48660 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48660">CVE-2022-48660 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48662/">CVE-2022-48662 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48662">CVE-2022-48662 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48663/">CVE-2022-48663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48663">CVE-2022-48663 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48667/">CVE-2022-48667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48667">CVE-2022-48667 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48668/">CVE-2022-48668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48668">CVE-2022-48668 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48671/">CVE-2022-48671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48671">CVE-2022-48671 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48672/">CVE-2022-48672 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48672">CVE-2022-48672 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48673/">CVE-2022-48673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48673">CVE-2022-48673 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48675/">CVE-2022-48675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48675">CVE-2022-48675 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48686/">CVE-2022-48686 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48686">CVE-2022-48686 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48687/">CVE-2022-48687 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48687">CVE-2022-48687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48688/">CVE-2022-48688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48688">CVE-2022-48688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48690/">CVE-2022-48690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48690">CVE-2022-48690 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48692/">CVE-2022-48692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48692">CVE-2022-48692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48693/">CVE-2022-48693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48693">CVE-2022-48693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48694/">CVE-2022-48694 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48694">CVE-2022-48694 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48695/">CVE-2022-48695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48695">CVE-2022-48695 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48697/">CVE-2022-48697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48697">CVE-2022-48697 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48698/">CVE-2022-48698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48698">CVE-2022-48698 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48699/">CVE-2022-48699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48699">CVE-2022-48699 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48700/">CVE-2022-48700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48700">CVE-2022-48700 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48701/">CVE-2022-48701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48701">CVE-2022-48701 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48702/">CVE-2022-48702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48702">CVE-2022-48702 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48703/">CVE-2022-48703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48703">CVE-2022-48703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48704/">CVE-2022-48704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48704">CVE-2022-48704 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-2860/">CVE-2023-2860 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2860">CVE-2023-2860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52585/">CVE-2023-52585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52585">CVE-2023-52585 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52589/">CVE-2023-52589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52589">CVE-2023-52589 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52590/">CVE-2023-52590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52590">CVE-2023-52590 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52591/">CVE-2023-52591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52591">CVE-2023-52591 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52593/">CVE-2023-52593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52593">CVE-2023-52593 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52614/">CVE-2023-52614 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52614">CVE-2023-52614 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52616/">CVE-2023-52616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52616">CVE-2023-52616 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52620/">CVE-2023-52620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52620">CVE-2023-52620 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52635/">CVE-2023-52635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52635">CVE-2023-52635 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52645/">CVE-2023-52645 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52645">CVE-2023-52645 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52646/">CVE-2023-52646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52646">CVE-2023-52646 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52652/">CVE-2023-52652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52652">CVE-2023-52652 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6270/">CVE-2023-6270 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0639/">CVE-2024-0639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0639">CVE-2024-0639 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0841/">CVE-2024-0841 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0841">CVE-2024-0841 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2201/">CVE-2024-2201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2201">CVE-2024-2201 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22099/">CVE-2024-22099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22099">CVE-2024-22099 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23307/">CVE-2024-23307 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23307">CVE-2024-23307 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-23848/">CVE-2024-23848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23848">CVE-2024-23848 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23850/">CVE-2024-23850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23850">CVE-2024-23850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26601/">CVE-2024-26601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26601">CVE-2024-26601 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26610/">CVE-2024-26610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26610">CVE-2024-26610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26656/">CVE-2024-26656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26656">CVE-2024-26656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26671/">CVE-2024-26671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26671">CVE-2024-26671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26673/">CVE-2024-26673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26673">CVE-2024-26673 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26675/">CVE-2024-26675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26675">CVE-2024-26675 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26679/">CVE-2024-26679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26679">CVE-2024-26679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26687/">CVE-2024-26687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26687">CVE-2024-26687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26688/">CVE-2024-26688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26688">CVE-2024-26688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26700/">CVE-2024-26700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26700">CVE-2024-26700 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26702/">CVE-2024-26702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26702">CVE-2024-26702 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26733/">CVE-2024-26733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26733">CVE-2024-26733 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26739/">CVE-2024-26739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26739">CVE-2024-26739 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26764/">CVE-2024-26764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26764">CVE-2024-26764 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26766/">CVE-2024-26766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26766">CVE-2024-26766 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26772/">CVE-2024-26772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26772">CVE-2024-26772 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26773/">CVE-2024-26773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26773">CVE-2024-26773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26783/">CVE-2024-26783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26783">CVE-2024-26783 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26791/">CVE-2024-26791 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26791">CVE-2024-26791 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26792/">CVE-2024-26792 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26792">CVE-2024-26792 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26816/">CVE-2024-26816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26816">CVE-2024-26816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26817/">CVE-2024-26817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26817">CVE-2024-26817 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26820/">CVE-2024-26820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26820">CVE-2024-26820 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26825/">CVE-2024-26825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26825">CVE-2024-26825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26830/">CVE-2024-26830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26830">CVE-2024-26830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26833/">CVE-2024-26833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26833">CVE-2024-26833 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26836/">CVE-2024-26836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26836">CVE-2024-26836 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26840/">CVE-2024-26840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26840">CVE-2024-26840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26843/">CVE-2024-26843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26843">CVE-2024-26843 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26852/">CVE-2024-26852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26852">CVE-2024-26852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26853/">CVE-2024-26853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26853">CVE-2024-26853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26855/">CVE-2024-26855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26855">CVE-2024-26855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26856/">CVE-2024-26856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26856">CVE-2024-26856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26857/">CVE-2024-26857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26857">CVE-2024-26857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26861/">CVE-2024-26861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26861">CVE-2024-26861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26862/">CVE-2024-26862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26862">CVE-2024-26862 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26866/">CVE-2024-26866 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26866">CVE-2024-26866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26872/">CVE-2024-26872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26872">CVE-2024-26872 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26875/">CVE-2024-26875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26875">CVE-2024-26875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26876/">CVE-2024-26876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26876">CVE-2024-26876 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26877/">CVE-2024-26877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26877">CVE-2024-26877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26878/">CVE-2024-26878 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26878">CVE-2024-26878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26879/">CVE-2024-26879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26879">CVE-2024-26879 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26881/">CVE-2024-26881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26881">CVE-2024-26881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26882/">CVE-2024-26882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26882">CVE-2024-26882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26883/">CVE-2024-26883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26883">CVE-2024-26883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26884/">CVE-2024-26884 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26884">CVE-2024-26884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26885/">CVE-2024-26885 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26885">CVE-2024-26885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26891/">CVE-2024-26891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26891">CVE-2024-26891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26893/">CVE-2024-26893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26893">CVE-2024-26893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26895/">CVE-2024-26895 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26895">CVE-2024-26895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26896/">CVE-2024-26896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26896">CVE-2024-26896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26897/">CVE-2024-26897 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26897">CVE-2024-26897 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26898/">CVE-2024-26898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26898">CVE-2024-26898 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26901/">CVE-2024-26901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26901">CVE-2024-26901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26903/">CVE-2024-26903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26903">CVE-2024-26903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26915/">CVE-2024-26915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26915">CVE-2024-26915 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26917/">CVE-2024-26917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26917">CVE-2024-26917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26927/">CVE-2024-26927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26927">CVE-2024-26927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26933/">CVE-2024-26933 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26933">CVE-2024-26933 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26939/">CVE-2024-26939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26939">CVE-2024-26939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26948/">CVE-2024-26948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26948">CVE-2024-26948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26950/">CVE-2024-26950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26950">CVE-2024-26950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26951/">CVE-2024-26951 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26951">CVE-2024-26951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26955/">CVE-2024-26955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26955">CVE-2024-26955 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26956/">CVE-2024-26956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26956">CVE-2024-26956 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26960/">CVE-2024-26960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26960">CVE-2024-26960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26965/">CVE-2024-26965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26965">CVE-2024-26965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26966/">CVE-2024-26966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26966">CVE-2024-26966 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26969/">CVE-2024-26969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26969">CVE-2024-26969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26970/">CVE-2024-26970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26970">CVE-2024-26970 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26972/">CVE-2024-26972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26972">CVE-2024-26972 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26979/">CVE-2024-26979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26979">CVE-2024-26979 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26981/">CVE-2024-26981 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26981">CVE-2024-26981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26982/">CVE-2024-26982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26982">CVE-2024-26982 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26993/">CVE-2024-26993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26993">CVE-2024-26993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27013/">CVE-2024-27013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27013">CVE-2024-27013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27014/">CVE-2024-27014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27014">CVE-2024-27014 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27030/">CVE-2024-27030 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27030">CVE-2024-27030 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27038/">CVE-2024-27038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27038">CVE-2024-27038 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27039/">CVE-2024-27039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27039">CVE-2024-27039 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27041/">CVE-2024-27041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27041">CVE-2024-27041 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-27042/">CVE-2024-27042 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27042">CVE-2024-27042 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27043/">CVE-2024-27043 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27043">CVE-2024-27043 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27046/">CVE-2024-27046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27046">CVE-2024-27046 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27056/">CVE-2024-27056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27056">CVE-2024-27056 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27059/">CVE-2024-27059 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27059">CVE-2024-27059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27062/">CVE-2024-27062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27062">CVE-2024-27062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27389/">CVE-2024-27389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27389">CVE-2024-27389 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009860706" comment="cluster-md-kmp-azure-5.14.21-150500.33.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860707" comment="dlm-kmp-azure-5.14.21-150500.33.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860708" comment="gfs2-kmp-azure-5.14.21-150500.33.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860709" comment="kernel-azure-5.14.21-150500.33.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860710" comment="kernel-azure-devel-5.14.21-150500.33.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860711" comment="kernel-azure-extra-5.14.21-150500.33.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860712" comment="kernel-azure-livepatch-devel-5.14.21-150500.33.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860713" comment="kernel-azure-optional-5.14.21-150500.33.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860714" comment="kernel-azure-vdso-5.14.21-150500.33.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860715" comment="kernel-devel-azure-5.14.21-150500.33.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860716" comment="kernel-source-azure-5.14.21-150500.33.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860717" comment="kernel-syms-azure-5.14.21-150500.33.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860718" comment="kselftests-kmp-azure-5.14.21-150500.33.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860719" comment="ocfs2-kmp-azure-5.14.21-150500.33.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009860720" comment="reiserfs-kmp-azure-5.14.21-150500.33.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4720" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql16 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224038" ref_url="https://bugzilla.suse.com/1224038" source="BUGZILLA"/>
		<reference ref_id="1224051" ref_url="https://bugzilla.suse.com/1224051" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-4317" ref_url="https://www.suse.com/security/cve/CVE-2024-4317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1652-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035278.html" source="SUSE-SU"/>
		<description>
This update for postgresql16 fixes the following issues:

PostgreSQL upgrade to version 16.3 (bsc#1224051):

- CVE-2024-4317: Fixed visibility restriction of pg_stats_ext and pg_stats_ext_exprs entries to the table owner (bsc#1224038).

Bug fixes:

- Fix incompatibility with LLVM 18.
- Prepare for PostgreSQL 17.
- Make sure all compilation and doc generation happens in %build.
- Require LLVM &lt;= 17 for now, because LLVM 18 doesn't seem to work.
- Remove constraints file because improved memory usage for s390x
- Use %patch -P N instead of deprecated %patchN.

Release notes:

- https://www.postgresql.org/docs/release/16.3/
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-05-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1224038">SUSE bug 1224038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224051">SUSE bug 1224051</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-4317/">CVE-2024-4317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4317">CVE-2024-4317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861105" comment="libecpg6-16.3-150200.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861106" comment="libecpg6-32bit-16.3-150200.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861107" comment="libpq5-16.3-150200.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861108" comment="libpq5-32bit-16.3-150200.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861109" comment="postgresql16-16.3-150200.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861110" comment="postgresql16-contrib-16.3-150200.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861111" comment="postgresql16-devel-16.3-150200.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861112" comment="postgresql16-devel-mini-16.3-150200.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861113" comment="postgresql16-docs-16.3-150200.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861114" comment="postgresql16-llvmjit-16.3-150200.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861115" comment="postgresql16-llvmjit-devel-16.3-150200.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861116" comment="postgresql16-plperl-16.3-150200.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861117" comment="postgresql16-plpython-16.3-150200.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861118" comment="postgresql16-pltcl-16.3-150200.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861119" comment="postgresql16-server-16.3-150200.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861120" comment="postgresql16-server-devel-16.3-150200.5.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861121" comment="postgresql16-test-16.3-150200.5.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4721" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1177529" ref_url="https://bugzilla.suse.com/1177529" source="BUGZILLA"/>
		<reference ref_id="1192145" ref_url="https://bugzilla.suse.com/1192145" source="BUGZILLA"/>
		<reference ref_id="1211592" ref_url="https://bugzilla.suse.com/1211592" source="BUGZILLA"/>
		<reference ref_id="1217408" ref_url="https://bugzilla.suse.com/1217408" source="BUGZILLA"/>
		<reference ref_id="1218562" ref_url="https://bugzilla.suse.com/1218562" source="BUGZILLA"/>
		<reference ref_id="1218917" ref_url="https://bugzilla.suse.com/1218917" source="BUGZILLA"/>
		<reference ref_id="1219104" ref_url="https://bugzilla.suse.com/1219104" source="BUGZILLA"/>
		<reference ref_id="1219126" ref_url="https://bugzilla.suse.com/1219126" source="BUGZILLA"/>
		<reference ref_id="1219169" ref_url="https://bugzilla.suse.com/1219169" source="BUGZILLA"/>
		<reference ref_id="1219170" ref_url="https://bugzilla.suse.com/1219170" source="BUGZILLA"/>
		<reference ref_id="1219264" ref_url="https://bugzilla.suse.com/1219264" source="BUGZILLA"/>
		<reference ref_id="1220342" ref_url="https://bugzilla.suse.com/1220342" source="BUGZILLA"/>
		<reference ref_id="1220569" ref_url="https://bugzilla.suse.com/1220569" source="BUGZILLA"/>
		<reference ref_id="1220761" ref_url="https://bugzilla.suse.com/1220761" source="BUGZILLA"/>
		<reference ref_id="1220901" ref_url="https://bugzilla.suse.com/1220901" source="BUGZILLA"/>
		<reference ref_id="1220915" ref_url="https://bugzilla.suse.com/1220915" source="BUGZILLA"/>
		<reference ref_id="1220935" ref_url="https://bugzilla.suse.com/1220935" source="BUGZILLA"/>
		<reference ref_id="1221042" ref_url="https://bugzilla.suse.com/1221042" source="BUGZILLA"/>
		<reference ref_id="1221044" ref_url="https://bugzilla.suse.com/1221044" source="BUGZILLA"/>
		<reference ref_id="1221080" ref_url="https://bugzilla.suse.com/1221080" source="BUGZILLA"/>
		<reference ref_id="1221084" ref_url="https://bugzilla.suse.com/1221084" source="BUGZILLA"/>
		<reference ref_id="1221088" ref_url="https://bugzilla.suse.com/1221088" source="BUGZILLA"/>
		<reference ref_id="1221162" ref_url="https://bugzilla.suse.com/1221162" source="BUGZILLA"/>
		<reference ref_id="1221299" ref_url="https://bugzilla.suse.com/1221299" source="BUGZILLA"/>
		<reference ref_id="1221612" ref_url="https://bugzilla.suse.com/1221612" source="BUGZILLA"/>
		<reference ref_id="1221617" ref_url="https://bugzilla.suse.com/1221617" source="BUGZILLA"/>
		<reference ref_id="1221645" ref_url="https://bugzilla.suse.com/1221645" source="BUGZILLA"/>
		<reference ref_id="1221791" ref_url="https://bugzilla.suse.com/1221791" source="BUGZILLA"/>
		<reference ref_id="1221825" ref_url="https://bugzilla.suse.com/1221825" source="BUGZILLA"/>
		<reference ref_id="1222011" ref_url="https://bugzilla.suse.com/1222011" source="BUGZILLA"/>
		<reference ref_id="1222051" ref_url="https://bugzilla.suse.com/1222051" source="BUGZILLA"/>
		<reference ref_id="1222247" ref_url="https://bugzilla.suse.com/1222247" source="BUGZILLA"/>
		<reference ref_id="1222266" ref_url="https://bugzilla.suse.com/1222266" source="BUGZILLA"/>
		<reference ref_id="1222294" ref_url="https://bugzilla.suse.com/1222294" source="BUGZILLA"/>
		<reference ref_id="1222307" ref_url="https://bugzilla.suse.com/1222307" source="BUGZILLA"/>
		<reference ref_id="1222357" ref_url="https://bugzilla.suse.com/1222357" source="BUGZILLA"/>
		<reference ref_id="1222368" ref_url="https://bugzilla.suse.com/1222368" source="BUGZILLA"/>
		<reference ref_id="1222379" ref_url="https://bugzilla.suse.com/1222379" source="BUGZILLA"/>
		<reference ref_id="1222416" ref_url="https://bugzilla.suse.com/1222416" source="BUGZILLA"/>
		<reference ref_id="1222422" ref_url="https://bugzilla.suse.com/1222422" source="BUGZILLA"/>
		<reference ref_id="1222424" ref_url="https://bugzilla.suse.com/1222424" source="BUGZILLA"/>
		<reference ref_id="1222427" ref_url="https://bugzilla.suse.com/1222427" source="BUGZILLA"/>
		<reference ref_id="1222428" ref_url="https://bugzilla.suse.com/1222428" source="BUGZILLA"/>
		<reference ref_id="1222430" ref_url="https://bugzilla.suse.com/1222430" source="BUGZILLA"/>
		<reference ref_id="1222431" ref_url="https://bugzilla.suse.com/1222431" source="BUGZILLA"/>
		<reference ref_id="1222435" ref_url="https://bugzilla.suse.com/1222435" source="BUGZILLA"/>
		<reference ref_id="1222437" ref_url="https://bugzilla.suse.com/1222437" source="BUGZILLA"/>
		<reference ref_id="1222445" ref_url="https://bugzilla.suse.com/1222445" source="BUGZILLA"/>
		<reference ref_id="1222449" ref_url="https://bugzilla.suse.com/1222449" source="BUGZILLA"/>
		<reference ref_id="1222482" ref_url="https://bugzilla.suse.com/1222482" source="BUGZILLA"/>
		<reference ref_id="1222503" ref_url="https://bugzilla.suse.com/1222503" source="BUGZILLA"/>
		<reference ref_id="1222520" ref_url="https://bugzilla.suse.com/1222520" source="BUGZILLA"/>
		<reference ref_id="1222536" ref_url="https://bugzilla.suse.com/1222536" source="BUGZILLA"/>
		<reference ref_id="1222549" ref_url="https://bugzilla.suse.com/1222549" source="BUGZILLA"/>
		<reference ref_id="1222550" ref_url="https://bugzilla.suse.com/1222550" source="BUGZILLA"/>
		<reference ref_id="1222557" ref_url="https://bugzilla.suse.com/1222557" source="BUGZILLA"/>
		<reference ref_id="1222559" ref_url="https://bugzilla.suse.com/1222559" source="BUGZILLA"/>
		<reference ref_id="1222585" ref_url="https://bugzilla.suse.com/1222585" source="BUGZILLA"/>
		<reference ref_id="1222586" ref_url="https://bugzilla.suse.com/1222586" source="BUGZILLA"/>
		<reference ref_id="1222596" ref_url="https://bugzilla.suse.com/1222596" source="BUGZILLA"/>
		<reference ref_id="1222609" ref_url="https://bugzilla.suse.com/1222609" source="BUGZILLA"/>
		<reference ref_id="1222610" ref_url="https://bugzilla.suse.com/1222610" source="BUGZILLA"/>
		<reference ref_id="1222613" ref_url="https://bugzilla.suse.com/1222613" source="BUGZILLA"/>
		<reference ref_id="1222615" ref_url="https://bugzilla.suse.com/1222615" source="BUGZILLA"/>
		<reference ref_id="1222618" ref_url="https://bugzilla.suse.com/1222618" source="BUGZILLA"/>
		<reference ref_id="1222624" ref_url="https://bugzilla.suse.com/1222624" source="BUGZILLA"/>
		<reference ref_id="1222630" ref_url="https://bugzilla.suse.com/1222630" source="BUGZILLA"/>
		<reference ref_id="1222632" ref_url="https://bugzilla.suse.com/1222632" source="BUGZILLA"/>
		<reference ref_id="1222660" ref_url="https://bugzilla.suse.com/1222660" source="BUGZILLA"/>
		<reference ref_id="1222662" ref_url="https://bugzilla.suse.com/1222662" source="BUGZILLA"/>
		<reference ref_id="1222664" ref_url="https://bugzilla.suse.com/1222664" source="BUGZILLA"/>
		<reference ref_id="1222666" ref_url="https://bugzilla.suse.com/1222666" source="BUGZILLA"/>
		<reference ref_id="1222669" ref_url="https://bugzilla.suse.com/1222669" source="BUGZILLA"/>
		<reference ref_id="1222671" ref_url="https://bugzilla.suse.com/1222671" source="BUGZILLA"/>
		<reference ref_id="1222677" ref_url="https://bugzilla.suse.com/1222677" source="BUGZILLA"/>
		<reference ref_id="1222678" ref_url="https://bugzilla.suse.com/1222678" source="BUGZILLA"/>
		<reference ref_id="1222680" ref_url="https://bugzilla.suse.com/1222680" source="BUGZILLA"/>
		<reference ref_id="1222703" ref_url="https://bugzilla.suse.com/1222703" source="BUGZILLA"/>
		<reference ref_id="1222704" ref_url="https://bugzilla.suse.com/1222704" source="BUGZILLA"/>
		<reference ref_id="1222706" ref_url="https://bugzilla.suse.com/1222706" source="BUGZILLA"/>
		<reference ref_id="1222709" ref_url="https://bugzilla.suse.com/1222709" source="BUGZILLA"/>
		<reference ref_id="1222710" ref_url="https://bugzilla.suse.com/1222710" source="BUGZILLA"/>
		<reference ref_id="1222720" ref_url="https://bugzilla.suse.com/1222720" source="BUGZILLA"/>
		<reference ref_id="1222721" ref_url="https://bugzilla.suse.com/1222721" source="BUGZILLA"/>
		<reference ref_id="1222724" ref_url="https://bugzilla.suse.com/1222724" source="BUGZILLA"/>
		<reference ref_id="1222726" ref_url="https://bugzilla.suse.com/1222726" source="BUGZILLA"/>
		<reference ref_id="1222727" ref_url="https://bugzilla.suse.com/1222727" source="BUGZILLA"/>
		<reference ref_id="1222764" ref_url="https://bugzilla.suse.com/1222764" source="BUGZILLA"/>
		<reference ref_id="1222772" ref_url="https://bugzilla.suse.com/1222772" source="BUGZILLA"/>
		<reference ref_id="1222773" ref_url="https://bugzilla.suse.com/1222773" source="BUGZILLA"/>
		<reference ref_id="1222776" ref_url="https://bugzilla.suse.com/1222776" source="BUGZILLA"/>
		<reference ref_id="1222781" ref_url="https://bugzilla.suse.com/1222781" source="BUGZILLA"/>
		<reference ref_id="1222784" ref_url="https://bugzilla.suse.com/1222784" source="BUGZILLA"/>
		<reference ref_id="1222785" ref_url="https://bugzilla.suse.com/1222785" source="BUGZILLA"/>
		<reference ref_id="1222787" ref_url="https://bugzilla.suse.com/1222787" source="BUGZILLA"/>
		<reference ref_id="1222790" ref_url="https://bugzilla.suse.com/1222790" source="BUGZILLA"/>
		<reference ref_id="1222791" ref_url="https://bugzilla.suse.com/1222791" source="BUGZILLA"/>
		<reference ref_id="1222792" ref_url="https://bugzilla.suse.com/1222792" source="BUGZILLA"/>
		<reference ref_id="1222796" ref_url="https://bugzilla.suse.com/1222796" source="BUGZILLA"/>
		<reference ref_id="1222798" ref_url="https://bugzilla.suse.com/1222798" source="BUGZILLA"/>
		<reference ref_id="1222801" ref_url="https://bugzilla.suse.com/1222801" source="BUGZILLA"/>
		<reference ref_id="1222812" ref_url="https://bugzilla.suse.com/1222812" source="BUGZILLA"/>
		<reference ref_id="1222824" ref_url="https://bugzilla.suse.com/1222824" source="BUGZILLA"/>
		<reference ref_id="1222829" ref_url="https://bugzilla.suse.com/1222829" source="BUGZILLA"/>
		<reference ref_id="1222832" ref_url="https://bugzilla.suse.com/1222832" source="BUGZILLA"/>
		<reference ref_id="1222836" ref_url="https://bugzilla.suse.com/1222836" source="BUGZILLA"/>
		<reference ref_id="1222838" ref_url="https://bugzilla.suse.com/1222838" source="BUGZILLA"/>
		<reference ref_id="1222866" ref_url="https://bugzilla.suse.com/1222866" source="BUGZILLA"/>
		<reference ref_id="1222867" ref_url="https://bugzilla.suse.com/1222867" source="BUGZILLA"/>
		<reference ref_id="1222869" ref_url="https://bugzilla.suse.com/1222869" source="BUGZILLA"/>
		<reference ref_id="1222876" ref_url="https://bugzilla.suse.com/1222876" source="BUGZILLA"/>
		<reference ref_id="1222878" ref_url="https://bugzilla.suse.com/1222878" source="BUGZILLA"/>
		<reference ref_id="1222879" ref_url="https://bugzilla.suse.com/1222879" source="BUGZILLA"/>
		<reference ref_id="1222881" ref_url="https://bugzilla.suse.com/1222881" source="BUGZILLA"/>
		<reference ref_id="1222883" ref_url="https://bugzilla.suse.com/1222883" source="BUGZILLA"/>
		<reference ref_id="1222888" ref_url="https://bugzilla.suse.com/1222888" source="BUGZILLA"/>
		<reference ref_id="1222894" ref_url="https://bugzilla.suse.com/1222894" source="BUGZILLA"/>
		<reference ref_id="1222901" ref_url="https://bugzilla.suse.com/1222901" source="BUGZILLA"/>
		<reference ref_id="1222968" ref_url="https://bugzilla.suse.com/1222968" source="BUGZILLA"/>
		<reference ref_id="1223012" ref_url="https://bugzilla.suse.com/1223012" source="BUGZILLA"/>
		<reference ref_id="1223014" ref_url="https://bugzilla.suse.com/1223014" source="BUGZILLA"/>
		<reference ref_id="1223016" ref_url="https://bugzilla.suse.com/1223016" source="BUGZILLA"/>
		<reference ref_id="1223024" ref_url="https://bugzilla.suse.com/1223024" source="BUGZILLA"/>
		<reference ref_id="1223030" ref_url="https://bugzilla.suse.com/1223030" source="BUGZILLA"/>
		<reference ref_id="1223033" ref_url="https://bugzilla.suse.com/1223033" source="BUGZILLA"/>
		<reference ref_id="1223034" ref_url="https://bugzilla.suse.com/1223034" source="BUGZILLA"/>
		<reference ref_id="1223035" ref_url="https://bugzilla.suse.com/1223035" source="BUGZILLA"/>
		<reference ref_id="1223036" ref_url="https://bugzilla.suse.com/1223036" source="BUGZILLA"/>
		<reference ref_id="1223037" ref_url="https://bugzilla.suse.com/1223037" source="BUGZILLA"/>
		<reference ref_id="1223041" ref_url="https://bugzilla.suse.com/1223041" source="BUGZILLA"/>
		<reference ref_id="1223042" ref_url="https://bugzilla.suse.com/1223042" source="BUGZILLA"/>
		<reference ref_id="1223051" ref_url="https://bugzilla.suse.com/1223051" source="BUGZILLA"/>
		<reference ref_id="1223052" ref_url="https://bugzilla.suse.com/1223052" source="BUGZILLA"/>
		<reference ref_id="1223056" ref_url="https://bugzilla.suse.com/1223056" source="BUGZILLA"/>
		<reference ref_id="1223057" ref_url="https://bugzilla.suse.com/1223057" source="BUGZILLA"/>
		<reference ref_id="1223058" ref_url="https://bugzilla.suse.com/1223058" source="BUGZILLA"/>
		<reference ref_id="1223060" ref_url="https://bugzilla.suse.com/1223060" source="BUGZILLA"/>
		<reference ref_id="1223061" ref_url="https://bugzilla.suse.com/1223061" source="BUGZILLA"/>
		<reference ref_id="1223065" ref_url="https://bugzilla.suse.com/1223065" source="BUGZILLA"/>
		<reference ref_id="1223066" ref_url="https://bugzilla.suse.com/1223066" source="BUGZILLA"/>
		<reference ref_id="1223067" ref_url="https://bugzilla.suse.com/1223067" source="BUGZILLA"/>
		<reference ref_id="1223068" ref_url="https://bugzilla.suse.com/1223068" source="BUGZILLA"/>
		<reference ref_id="1223076" ref_url="https://bugzilla.suse.com/1223076" source="BUGZILLA"/>
		<reference ref_id="1223078" ref_url="https://bugzilla.suse.com/1223078" source="BUGZILLA"/>
		<reference ref_id="1223111" ref_url="https://bugzilla.suse.com/1223111" source="BUGZILLA"/>
		<reference ref_id="1223115" ref_url="https://bugzilla.suse.com/1223115" source="BUGZILLA"/>
		<reference ref_id="1223118" ref_url="https://bugzilla.suse.com/1223118" source="BUGZILLA"/>
		<reference ref_id="1223187" ref_url="https://bugzilla.suse.com/1223187" source="BUGZILLA"/>
		<reference ref_id="1223189" ref_url="https://bugzilla.suse.com/1223189" source="BUGZILLA"/>
		<reference ref_id="1223190" ref_url="https://bugzilla.suse.com/1223190" source="BUGZILLA"/>
		<reference ref_id="1223191" ref_url="https://bugzilla.suse.com/1223191" source="BUGZILLA"/>
		<reference ref_id="1223196" ref_url="https://bugzilla.suse.com/1223196" source="BUGZILLA"/>
		<reference ref_id="1223197" ref_url="https://bugzilla.suse.com/1223197" source="BUGZILLA"/>
		<reference ref_id="1223198" ref_url="https://bugzilla.suse.com/1223198" source="BUGZILLA"/>
		<reference ref_id="1223275" ref_url="https://bugzilla.suse.com/1223275" source="BUGZILLA"/>
		<reference ref_id="1223323" ref_url="https://bugzilla.suse.com/1223323" source="BUGZILLA"/>
		<reference ref_id="1223369" ref_url="https://bugzilla.suse.com/1223369" source="BUGZILLA"/>
		<reference ref_id="1223380" ref_url="https://bugzilla.suse.com/1223380" source="BUGZILLA"/>
		<reference ref_id="1223473" ref_url="https://bugzilla.suse.com/1223473" source="BUGZILLA"/>
		<reference ref_id="1223474" ref_url="https://bugzilla.suse.com/1223474" source="BUGZILLA"/>
		<reference ref_id="1223475" ref_url="https://bugzilla.suse.com/1223475" source="BUGZILLA"/>
		<reference ref_id="1223477" ref_url="https://bugzilla.suse.com/1223477" source="BUGZILLA"/>
		<reference ref_id="1223478" ref_url="https://bugzilla.suse.com/1223478" source="BUGZILLA"/>
		<reference ref_id="1223479" ref_url="https://bugzilla.suse.com/1223479" source="BUGZILLA"/>
		<reference ref_id="1223481" ref_url="https://bugzilla.suse.com/1223481" source="BUGZILLA"/>
		<reference ref_id="1223482" ref_url="https://bugzilla.suse.com/1223482" source="BUGZILLA"/>
		<reference ref_id="1223484" ref_url="https://bugzilla.suse.com/1223484" source="BUGZILLA"/>
		<reference ref_id="1223487" ref_url="https://bugzilla.suse.com/1223487" source="BUGZILLA"/>
		<reference ref_id="1223490" ref_url="https://bugzilla.suse.com/1223490" source="BUGZILLA"/>
		<reference ref_id="1223496" ref_url="https://bugzilla.suse.com/1223496" source="BUGZILLA"/>
		<reference ref_id="1223498" ref_url="https://bugzilla.suse.com/1223498" source="BUGZILLA"/>
		<reference ref_id="1223499" ref_url="https://bugzilla.suse.com/1223499" source="BUGZILLA"/>
		<reference ref_id="1223501" ref_url="https://bugzilla.suse.com/1223501" source="BUGZILLA"/>
		<reference ref_id="1223502" ref_url="https://bugzilla.suse.com/1223502" source="BUGZILLA"/>
		<reference ref_id="1223503" ref_url="https://bugzilla.suse.com/1223503" source="BUGZILLA"/>
		<reference ref_id="1223505" ref_url="https://bugzilla.suse.com/1223505" source="BUGZILLA"/>
		<reference ref_id="1223509" ref_url="https://bugzilla.suse.com/1223509" source="BUGZILLA"/>
		<reference ref_id="1223511" ref_url="https://bugzilla.suse.com/1223511" source="BUGZILLA"/>
		<reference ref_id="1223512" ref_url="https://bugzilla.suse.com/1223512" source="BUGZILLA"/>
		<reference ref_id="1223513" ref_url="https://bugzilla.suse.com/1223513" source="BUGZILLA"/>
		<reference ref_id="1223516" ref_url="https://bugzilla.suse.com/1223516" source="BUGZILLA"/>
		<reference ref_id="1223517" ref_url="https://bugzilla.suse.com/1223517" source="BUGZILLA"/>
		<reference ref_id="1223518" ref_url="https://bugzilla.suse.com/1223518" source="BUGZILLA"/>
		<reference ref_id="1223519" ref_url="https://bugzilla.suse.com/1223519" source="BUGZILLA"/>
		<reference ref_id="1223520" ref_url="https://bugzilla.suse.com/1223520" source="BUGZILLA"/>
		<reference ref_id="1223522" ref_url="https://bugzilla.suse.com/1223522" source="BUGZILLA"/>
		<reference ref_id="1223523" ref_url="https://bugzilla.suse.com/1223523" source="BUGZILLA"/>
		<reference ref_id="1223525" ref_url="https://bugzilla.suse.com/1223525" source="BUGZILLA"/>
		<reference ref_id="1223539" ref_url="https://bugzilla.suse.com/1223539" source="BUGZILLA"/>
		<reference ref_id="1223574" ref_url="https://bugzilla.suse.com/1223574" source="BUGZILLA"/>
		<reference ref_id="1223595" ref_url="https://bugzilla.suse.com/1223595" source="BUGZILLA"/>
		<reference ref_id="1223598" ref_url="https://bugzilla.suse.com/1223598" source="BUGZILLA"/>
		<reference ref_id="1223634" ref_url="https://bugzilla.suse.com/1223634" source="BUGZILLA"/>
		<reference ref_id="1223643" ref_url="https://bugzilla.suse.com/1223643" source="BUGZILLA"/>
		<reference ref_id="1223644" ref_url="https://bugzilla.suse.com/1223644" source="BUGZILLA"/>
		<reference ref_id="1223645" ref_url="https://bugzilla.suse.com/1223645" source="BUGZILLA"/>
		<reference ref_id="1223646" ref_url="https://bugzilla.suse.com/1223646" source="BUGZILLA"/>
		<reference ref_id="1223648" ref_url="https://bugzilla.suse.com/1223648" source="BUGZILLA"/>
		<reference ref_id="1223655" ref_url="https://bugzilla.suse.com/1223655" source="BUGZILLA"/>
		<reference ref_id="1223657" ref_url="https://bugzilla.suse.com/1223657" source="BUGZILLA"/>
		<reference ref_id="1223660" ref_url="https://bugzilla.suse.com/1223660" source="BUGZILLA"/>
		<reference ref_id="1223661" ref_url="https://bugzilla.suse.com/1223661" source="BUGZILLA"/>
		<reference ref_id="1223663" ref_url="https://bugzilla.suse.com/1223663" source="BUGZILLA"/>
		<reference ref_id="1223664" ref_url="https://bugzilla.suse.com/1223664" source="BUGZILLA"/>
		<reference ref_id="1223668" ref_url="https://bugzilla.suse.com/1223668" source="BUGZILLA"/>
		<reference ref_id="1223686" ref_url="https://bugzilla.suse.com/1223686" source="BUGZILLA"/>
		<reference ref_id="1223693" ref_url="https://bugzilla.suse.com/1223693" source="BUGZILLA"/>
		<reference ref_id="1223705" ref_url="https://bugzilla.suse.com/1223705" source="BUGZILLA"/>
		<reference ref_id="1223714" ref_url="https://bugzilla.suse.com/1223714" source="BUGZILLA"/>
		<reference ref_id="1223735" ref_url="https://bugzilla.suse.com/1223735" source="BUGZILLA"/>
		<reference ref_id="1223745" ref_url="https://bugzilla.suse.com/1223745" source="BUGZILLA"/>
		<reference ref_id="1223784" ref_url="https://bugzilla.suse.com/1223784" source="BUGZILLA"/>
		<reference ref_id="1223785" ref_url="https://bugzilla.suse.com/1223785" source="BUGZILLA"/>
		<reference ref_id="1223790" ref_url="https://bugzilla.suse.com/1223790" source="BUGZILLA"/>
		<reference ref_id="1223816" ref_url="https://bugzilla.suse.com/1223816" source="BUGZILLA"/>
		<reference ref_id="1223821" ref_url="https://bugzilla.suse.com/1223821" source="BUGZILLA"/>
		<reference ref_id="1223822" ref_url="https://bugzilla.suse.com/1223822" source="BUGZILLA"/>
		<reference ref_id="1223824" ref_url="https://bugzilla.suse.com/1223824" source="BUGZILLA"/>
		<reference ref_id="1223827" ref_url="https://bugzilla.suse.com/1223827" source="BUGZILLA"/>
		<reference ref_id="1223834" ref_url="https://bugzilla.suse.com/1223834" source="BUGZILLA"/>
		<reference ref_id="1223875" ref_url="https://bugzilla.suse.com/1223875" source="BUGZILLA"/>
		<reference ref_id="1223876" ref_url="https://bugzilla.suse.com/1223876" source="BUGZILLA"/>
		<reference ref_id="1223877" ref_url="https://bugzilla.suse.com/1223877" source="BUGZILLA"/>
		<reference ref_id="1223878" ref_url="https://bugzilla.suse.com/1223878" source="BUGZILLA"/>
		<reference ref_id="1223879" ref_url="https://bugzilla.suse.com/1223879" source="BUGZILLA"/>
		<reference ref_id="1223894" ref_url="https://bugzilla.suse.com/1223894" source="BUGZILLA"/>
		<reference ref_id="1223921" ref_url="https://bugzilla.suse.com/1223921" source="BUGZILLA"/>
		<reference ref_id="1223922" ref_url="https://bugzilla.suse.com/1223922" source="BUGZILLA"/>
		<reference ref_id="1223923" ref_url="https://bugzilla.suse.com/1223923" source="BUGZILLA"/>
		<reference ref_id="1223924" ref_url="https://bugzilla.suse.com/1223924" source="BUGZILLA"/>
		<reference ref_id="1223929" ref_url="https://bugzilla.suse.com/1223929" source="BUGZILLA"/>
		<reference ref_id="1223931" ref_url="https://bugzilla.suse.com/1223931" source="BUGZILLA"/>
		<reference ref_id="1223932" ref_url="https://bugzilla.suse.com/1223932" source="BUGZILLA"/>
		<reference ref_id="1223934" ref_url="https://bugzilla.suse.com/1223934" source="BUGZILLA"/>
		<reference ref_id="1223941" ref_url="https://bugzilla.suse.com/1223941" source="BUGZILLA"/>
		<reference ref_id="1223948" ref_url="https://bugzilla.suse.com/1223948" source="BUGZILLA"/>
		<reference ref_id="1223949" ref_url="https://bugzilla.suse.com/1223949" source="BUGZILLA"/>
		<reference ref_id="1223950" ref_url="https://bugzilla.suse.com/1223950" source="BUGZILLA"/>
		<reference ref_id="1223951" ref_url="https://bugzilla.suse.com/1223951" source="BUGZILLA"/>
		<reference ref_id="1223952" ref_url="https://bugzilla.suse.com/1223952" source="BUGZILLA"/>
		<reference ref_id="1223953" ref_url="https://bugzilla.suse.com/1223953" source="BUGZILLA"/>
		<reference ref_id="1223956" ref_url="https://bugzilla.suse.com/1223956" source="BUGZILLA"/>
		<reference ref_id="1223957" ref_url="https://bugzilla.suse.com/1223957" source="BUGZILLA"/>
		<reference ref_id="1223960" ref_url="https://bugzilla.suse.com/1223960" source="BUGZILLA"/>
		<reference ref_id="1223962" ref_url="https://bugzilla.suse.com/1223962" source="BUGZILLA"/>
		<reference ref_id="1223963" ref_url="https://bugzilla.suse.com/1223963" source="BUGZILLA"/>
		<reference ref_id="1223964" ref_url="https://bugzilla.suse.com/1223964" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-47047" ref_url="https://www.suse.com/security/cve/CVE-2021-47047/" source="CVE"/>
		<reference ref_id="CVE-2021-47181" ref_url="https://www.suse.com/security/cve/CVE-2021-47181/" source="CVE"/>
		<reference ref_id="CVE-2021-47182" ref_url="https://www.suse.com/security/cve/CVE-2021-47182/" source="CVE"/>
		<reference ref_id="CVE-2021-47183" ref_url="https://www.suse.com/security/cve/CVE-2021-47183/" source="CVE"/>
		<reference ref_id="CVE-2021-47184" ref_url="https://www.suse.com/security/cve/CVE-2021-47184/" source="CVE"/>
		<reference ref_id="CVE-2021-47185" ref_url="https://www.suse.com/security/cve/CVE-2021-47185/" source="CVE"/>
		<reference ref_id="CVE-2021-47187" ref_url="https://www.suse.com/security/cve/CVE-2021-47187/" source="CVE"/>
		<reference ref_id="CVE-2021-47188" ref_url="https://www.suse.com/security/cve/CVE-2021-47188/" source="CVE"/>
		<reference ref_id="CVE-2021-47189" ref_url="https://www.suse.com/security/cve/CVE-2021-47189/" source="CVE"/>
		<reference ref_id="CVE-2021-47191" ref_url="https://www.suse.com/security/cve/CVE-2021-47191/" source="CVE"/>
		<reference ref_id="CVE-2021-47192" ref_url="https://www.suse.com/security/cve/CVE-2021-47192/" source="CVE"/>
		<reference ref_id="CVE-2021-47193" ref_url="https://www.suse.com/security/cve/CVE-2021-47193/" source="CVE"/>
		<reference ref_id="CVE-2021-47194" ref_url="https://www.suse.com/security/cve/CVE-2021-47194/" source="CVE"/>
		<reference ref_id="CVE-2021-47195" ref_url="https://www.suse.com/security/cve/CVE-2021-47195/" source="CVE"/>
		<reference ref_id="CVE-2021-47196" ref_url="https://www.suse.com/security/cve/CVE-2021-47196/" source="CVE"/>
		<reference ref_id="CVE-2021-47197" ref_url="https://www.suse.com/security/cve/CVE-2021-47197/" source="CVE"/>
		<reference ref_id="CVE-2021-47198" ref_url="https://www.suse.com/security/cve/CVE-2021-47198/" source="CVE"/>
		<reference ref_id="CVE-2021-47199" ref_url="https://www.suse.com/security/cve/CVE-2021-47199/" source="CVE"/>
		<reference ref_id="CVE-2021-47200" ref_url="https://www.suse.com/security/cve/CVE-2021-47200/" source="CVE"/>
		<reference ref_id="CVE-2021-47201" ref_url="https://www.suse.com/security/cve/CVE-2021-47201/" source="CVE"/>
		<reference ref_id="CVE-2021-47202" ref_url="https://www.suse.com/security/cve/CVE-2021-47202/" source="CVE"/>
		<reference ref_id="CVE-2021-47203" ref_url="https://www.suse.com/security/cve/CVE-2021-47203/" source="CVE"/>
		<reference ref_id="CVE-2021-47204" ref_url="https://www.suse.com/security/cve/CVE-2021-47204/" source="CVE"/>
		<reference ref_id="CVE-2021-47205" ref_url="https://www.suse.com/security/cve/CVE-2021-47205/" source="CVE"/>
		<reference ref_id="CVE-2021-47206" ref_url="https://www.suse.com/security/cve/CVE-2021-47206/" source="CVE"/>
		<reference ref_id="CVE-2021-47207" ref_url="https://www.suse.com/security/cve/CVE-2021-47207/" source="CVE"/>
		<reference ref_id="CVE-2021-47209" ref_url="https://www.suse.com/security/cve/CVE-2021-47209/" source="CVE"/>
		<reference ref_id="CVE-2021-47210" ref_url="https://www.suse.com/security/cve/CVE-2021-47210/" source="CVE"/>
		<reference ref_id="CVE-2021-47211" ref_url="https://www.suse.com/security/cve/CVE-2021-47211/" source="CVE"/>
		<reference ref_id="CVE-2021-47212" ref_url="https://www.suse.com/security/cve/CVE-2021-47212/" source="CVE"/>
		<reference ref_id="CVE-2021-47214" ref_url="https://www.suse.com/security/cve/CVE-2021-47214/" source="CVE"/>
		<reference ref_id="CVE-2021-47215" ref_url="https://www.suse.com/security/cve/CVE-2021-47215/" source="CVE"/>
		<reference ref_id="CVE-2021-47216" ref_url="https://www.suse.com/security/cve/CVE-2021-47216/" source="CVE"/>
		<reference ref_id="CVE-2021-47217" ref_url="https://www.suse.com/security/cve/CVE-2021-47217/" source="CVE"/>
		<reference ref_id="CVE-2021-47218" ref_url="https://www.suse.com/security/cve/CVE-2021-47218/" source="CVE"/>
		<reference ref_id="CVE-2021-47219" ref_url="https://www.suse.com/security/cve/CVE-2021-47219/" source="CVE"/>
		<reference ref_id="CVE-2022-48631" ref_url="https://www.suse.com/security/cve/CVE-2022-48631/" source="CVE"/>
		<reference ref_id="CVE-2022-48632" ref_url="https://www.suse.com/security/cve/CVE-2022-48632/" source="CVE"/>
		<reference ref_id="CVE-2022-48634" ref_url="https://www.suse.com/security/cve/CVE-2022-48634/" source="CVE"/>
		<reference ref_id="CVE-2022-48636" ref_url="https://www.suse.com/security/cve/CVE-2022-48636/" source="CVE"/>
		<reference ref_id="CVE-2022-48637" ref_url="https://www.suse.com/security/cve/CVE-2022-48637/" source="CVE"/>
		<reference ref_id="CVE-2022-48638" ref_url="https://www.suse.com/security/cve/CVE-2022-48638/" source="CVE"/>
		<reference ref_id="CVE-2022-48639" ref_url="https://www.suse.com/security/cve/CVE-2022-48639/" source="CVE"/>
		<reference ref_id="CVE-2022-48640" ref_url="https://www.suse.com/security/cve/CVE-2022-48640/" source="CVE"/>
		<reference ref_id="CVE-2022-48642" ref_url="https://www.suse.com/security/cve/CVE-2022-48642/" source="CVE"/>
		<reference ref_id="CVE-2022-48644" ref_url="https://www.suse.com/security/cve/CVE-2022-48644/" source="CVE"/>
		<reference ref_id="CVE-2022-48646" ref_url="https://www.suse.com/security/cve/CVE-2022-48646/" source="CVE"/>
		<reference ref_id="CVE-2022-48647" ref_url="https://www.suse.com/security/cve/CVE-2022-48647/" source="CVE"/>
		<reference ref_id="CVE-2022-48648" ref_url="https://www.suse.com/security/cve/CVE-2022-48648/" source="CVE"/>
		<reference ref_id="CVE-2022-48650" ref_url="https://www.suse.com/security/cve/CVE-2022-48650/" source="CVE"/>
		<reference ref_id="CVE-2022-48651" ref_url="https://www.suse.com/security/cve/CVE-2022-48651/" source="CVE"/>
		<reference ref_id="CVE-2022-48652" ref_url="https://www.suse.com/security/cve/CVE-2022-48652/" source="CVE"/>
		<reference ref_id="CVE-2022-48653" ref_url="https://www.suse.com/security/cve/CVE-2022-48653/" source="CVE"/>
		<reference ref_id="CVE-2022-48654" ref_url="https://www.suse.com/security/cve/CVE-2022-48654/" source="CVE"/>
		<reference ref_id="CVE-2022-48655" ref_url="https://www.suse.com/security/cve/CVE-2022-48655/" source="CVE"/>
		<reference ref_id="CVE-2022-48656" ref_url="https://www.suse.com/security/cve/CVE-2022-48656/" source="CVE"/>
		<reference ref_id="CVE-2022-48657" ref_url="https://www.suse.com/security/cve/CVE-2022-48657/" source="CVE"/>
		<reference ref_id="CVE-2022-48658" ref_url="https://www.suse.com/security/cve/CVE-2022-48658/" source="CVE"/>
		<reference ref_id="CVE-2022-48659" ref_url="https://www.suse.com/security/cve/CVE-2022-48659/" source="CVE"/>
		<reference ref_id="CVE-2022-48660" ref_url="https://www.suse.com/security/cve/CVE-2022-48660/" source="CVE"/>
		<reference ref_id="CVE-2022-48662" ref_url="https://www.suse.com/security/cve/CVE-2022-48662/" source="CVE"/>
		<reference ref_id="CVE-2022-48663" ref_url="https://www.suse.com/security/cve/CVE-2022-48663/" source="CVE"/>
		<reference ref_id="CVE-2022-48667" ref_url="https://www.suse.com/security/cve/CVE-2022-48667/" source="CVE"/>
		<reference ref_id="CVE-2022-48668" ref_url="https://www.suse.com/security/cve/CVE-2022-48668/" source="CVE"/>
		<reference ref_id="CVE-2022-48671" ref_url="https://www.suse.com/security/cve/CVE-2022-48671/" source="CVE"/>
		<reference ref_id="CVE-2022-48672" ref_url="https://www.suse.com/security/cve/CVE-2022-48672/" source="CVE"/>
		<reference ref_id="CVE-2022-48673" ref_url="https://www.suse.com/security/cve/CVE-2022-48673/" source="CVE"/>
		<reference ref_id="CVE-2022-48675" ref_url="https://www.suse.com/security/cve/CVE-2022-48675/" source="CVE"/>
		<reference ref_id="CVE-2022-48686" ref_url="https://www.suse.com/security/cve/CVE-2022-48686/" source="CVE"/>
		<reference ref_id="CVE-2022-48687" ref_url="https://www.suse.com/security/cve/CVE-2022-48687/" source="CVE"/>
		<reference ref_id="CVE-2022-48688" ref_url="https://www.suse.com/security/cve/CVE-2022-48688/" source="CVE"/>
		<reference ref_id="CVE-2022-48690" ref_url="https://www.suse.com/security/cve/CVE-2022-48690/" source="CVE"/>
		<reference ref_id="CVE-2022-48692" ref_url="https://www.suse.com/security/cve/CVE-2022-48692/" source="CVE"/>
		<reference ref_id="CVE-2022-48693" ref_url="https://www.suse.com/security/cve/CVE-2022-48693/" source="CVE"/>
		<reference ref_id="CVE-2022-48694" ref_url="https://www.suse.com/security/cve/CVE-2022-48694/" source="CVE"/>
		<reference ref_id="CVE-2022-48695" ref_url="https://www.suse.com/security/cve/CVE-2022-48695/" source="CVE"/>
		<reference ref_id="CVE-2022-48697" ref_url="https://www.suse.com/security/cve/CVE-2022-48697/" source="CVE"/>
		<reference ref_id="CVE-2022-48698" ref_url="https://www.suse.com/security/cve/CVE-2022-48698/" source="CVE"/>
		<reference ref_id="CVE-2022-48700" ref_url="https://www.suse.com/security/cve/CVE-2022-48700/" source="CVE"/>
		<reference ref_id="CVE-2022-48701" ref_url="https://www.suse.com/security/cve/CVE-2022-48701/" source="CVE"/>
		<reference ref_id="CVE-2022-48702" ref_url="https://www.suse.com/security/cve/CVE-2022-48702/" source="CVE"/>
		<reference ref_id="CVE-2022-48703" ref_url="https://www.suse.com/security/cve/CVE-2022-48703/" source="CVE"/>
		<reference ref_id="CVE-2022-48704" ref_url="https://www.suse.com/security/cve/CVE-2022-48704/" source="CVE"/>
		<reference ref_id="CVE-2023-2860" ref_url="https://www.suse.com/security/cve/CVE-2023-2860/" source="CVE"/>
		<reference ref_id="CVE-2023-52488" ref_url="https://www.suse.com/security/cve/CVE-2023-52488/" source="CVE"/>
		<reference ref_id="CVE-2023-52503" ref_url="https://www.suse.com/security/cve/CVE-2023-52503/" source="CVE"/>
		<reference ref_id="CVE-2023-52561" ref_url="https://www.suse.com/security/cve/CVE-2023-52561/" source="CVE"/>
		<reference ref_id="CVE-2023-52585" ref_url="https://www.suse.com/security/cve/CVE-2023-52585/" source="CVE"/>
		<reference ref_id="CVE-2023-52589" ref_url="https://www.suse.com/security/cve/CVE-2023-52589/" source="CVE"/>
		<reference ref_id="CVE-2023-52590" ref_url="https://www.suse.com/security/cve/CVE-2023-52590/" source="CVE"/>
		<reference ref_id="CVE-2023-52591" ref_url="https://www.suse.com/security/cve/CVE-2023-52591/" source="CVE"/>
		<reference ref_id="CVE-2023-52593" ref_url="https://www.suse.com/security/cve/CVE-2023-52593/" source="CVE"/>
		<reference ref_id="CVE-2023-52614" ref_url="https://www.suse.com/security/cve/CVE-2023-52614/" source="CVE"/>
		<reference ref_id="CVE-2023-52616" ref_url="https://www.suse.com/security/cve/CVE-2023-52616/" source="CVE"/>
		<reference ref_id="CVE-2023-52620" ref_url="https://www.suse.com/security/cve/CVE-2023-52620/" source="CVE"/>
		<reference ref_id="CVE-2023-52627" ref_url="https://www.suse.com/security/cve/CVE-2023-52627/" source="CVE"/>
		<reference ref_id="CVE-2023-52635" ref_url="https://www.suse.com/security/cve/CVE-2023-52635/" source="CVE"/>
		<reference ref_id="CVE-2023-52636" ref_url="https://www.suse.com/security/cve/CVE-2023-52636/" source="CVE"/>
		<reference ref_id="CVE-2023-52645" ref_url="https://www.suse.com/security/cve/CVE-2023-52645/" source="CVE"/>
		<reference ref_id="CVE-2023-52652" ref_url="https://www.suse.com/security/cve/CVE-2023-52652/" source="CVE"/>
		<reference ref_id="CVE-2023-6270" ref_url="https://www.suse.com/security/cve/CVE-2023-6270/" source="CVE"/>
		<reference ref_id="CVE-2024-0639" ref_url="https://www.suse.com/security/cve/CVE-2024-0639/" source="CVE"/>
		<reference ref_id="CVE-2024-0841" ref_url="https://www.suse.com/security/cve/CVE-2024-0841/" source="CVE"/>
		<reference ref_id="CVE-2024-22099" ref_url="https://www.suse.com/security/cve/CVE-2024-22099/" source="CVE"/>
		<reference ref_id="CVE-2024-23307" ref_url="https://www.suse.com/security/cve/CVE-2024-23307/" source="CVE"/>
		<reference ref_id="CVE-2024-23848" ref_url="https://www.suse.com/security/cve/CVE-2024-23848/" source="CVE"/>
		<reference ref_id="CVE-2024-23850" ref_url="https://www.suse.com/security/cve/CVE-2024-23850/" source="CVE"/>
		<reference ref_id="CVE-2024-26601" ref_url="https://www.suse.com/security/cve/CVE-2024-26601/" source="CVE"/>
		<reference ref_id="CVE-2024-26610" ref_url="https://www.suse.com/security/cve/CVE-2024-26610/" source="CVE"/>
		<reference ref_id="CVE-2024-26656" ref_url="https://www.suse.com/security/cve/CVE-2024-26656/" source="CVE"/>
		<reference ref_id="CVE-2024-26660" ref_url="https://www.suse.com/security/cve/CVE-2024-26660/" source="CVE"/>
		<reference ref_id="CVE-2024-26671" ref_url="https://www.suse.com/security/cve/CVE-2024-26671/" source="CVE"/>
		<reference ref_id="CVE-2024-26673" ref_url="https://www.suse.com/security/cve/CVE-2024-26673/" source="CVE"/>
		<reference ref_id="CVE-2024-26675" ref_url="https://www.suse.com/security/cve/CVE-2024-26675/" source="CVE"/>
		<reference ref_id="CVE-2024-26680" ref_url="https://www.suse.com/security/cve/CVE-2024-26680/" source="CVE"/>
		<reference ref_id="CVE-2024-26681" ref_url="https://www.suse.com/security/cve/CVE-2024-26681/" source="CVE"/>
		<reference ref_id="CVE-2024-26684" ref_url="https://www.suse.com/security/cve/CVE-2024-26684/" source="CVE"/>
		<reference ref_id="CVE-2024-26685" ref_url="https://www.suse.com/security/cve/CVE-2024-26685/" source="CVE"/>
		<reference ref_id="CVE-2024-26687" ref_url="https://www.suse.com/security/cve/CVE-2024-26687/" source="CVE"/>
		<reference ref_id="CVE-2024-26688" ref_url="https://www.suse.com/security/cve/CVE-2024-26688/" source="CVE"/>
		<reference ref_id="CVE-2024-26689" ref_url="https://www.suse.com/security/cve/CVE-2024-26689/" source="CVE"/>
		<reference ref_id="CVE-2024-26696" ref_url="https://www.suse.com/security/cve/CVE-2024-26696/" source="CVE"/>
		<reference ref_id="CVE-2024-26697" ref_url="https://www.suse.com/security/cve/CVE-2024-26697/" source="CVE"/>
		<reference ref_id="CVE-2024-26702" ref_url="https://www.suse.com/security/cve/CVE-2024-26702/" source="CVE"/>
		<reference ref_id="CVE-2024-26704" ref_url="https://www.suse.com/security/cve/CVE-2024-26704/" source="CVE"/>
		<reference ref_id="CVE-2024-26718" ref_url="https://www.suse.com/security/cve/CVE-2024-26718/" source="CVE"/>
		<reference ref_id="CVE-2024-26722" ref_url="https://www.suse.com/security/cve/CVE-2024-26722/" source="CVE"/>
		<reference ref_id="CVE-2024-26727" ref_url="https://www.suse.com/security/cve/CVE-2024-26727/" source="CVE"/>
		<reference ref_id="CVE-2024-26733" ref_url="https://www.suse.com/security/cve/CVE-2024-26733/" source="CVE"/>
		<reference ref_id="CVE-2024-26736" ref_url="https://www.suse.com/security/cve/CVE-2024-26736/" source="CVE"/>
		<reference ref_id="CVE-2024-26737" ref_url="https://www.suse.com/security/cve/CVE-2024-26737/" source="CVE"/>
		<reference ref_id="CVE-2024-26739" ref_url="https://www.suse.com/security/cve/CVE-2024-26739/" source="CVE"/>
		<reference ref_id="CVE-2024-26743" ref_url="https://www.suse.com/security/cve/CVE-2024-26743/" source="CVE"/>
		<reference ref_id="CVE-2024-26744" ref_url="https://www.suse.com/security/cve/CVE-2024-26744/" source="CVE"/>
		<reference ref_id="CVE-2024-26745" ref_url="https://www.suse.com/security/cve/CVE-2024-26745/" source="CVE"/>
		<reference ref_id="CVE-2024-26747" ref_url="https://www.suse.com/security/cve/CVE-2024-26747/" source="CVE"/>
		<reference ref_id="CVE-2024-26749" ref_url="https://www.suse.com/security/cve/CVE-2024-26749/" source="CVE"/>
		<reference ref_id="CVE-2024-26751" ref_url="https://www.suse.com/security/cve/CVE-2024-26751/" source="CVE"/>
		<reference ref_id="CVE-2024-26754" ref_url="https://www.suse.com/security/cve/CVE-2024-26754/" source="CVE"/>
		<reference ref_id="CVE-2024-26760" ref_url="https://www.suse.com/security/cve/CVE-2024-26760/" source="CVE"/>
		<reference ref_id="CVE-2024-26763" ref_url="https://www.suse.com/security/cve/CVE-2024-26763/" source="CVE"/>
		<reference ref_id="CVE-2024-26764" ref_url="https://www.suse.com/security/cve/CVE-2024-26764/" source="CVE"/>
		<reference ref_id="CVE-2024-26766" ref_url="https://www.suse.com/security/cve/CVE-2024-26766/" source="CVE"/>
		<reference ref_id="CVE-2024-26769" ref_url="https://www.suse.com/security/cve/CVE-2024-26769/" source="CVE"/>
		<reference ref_id="CVE-2024-26771" ref_url="https://www.suse.com/security/cve/CVE-2024-26771/" source="CVE"/>
		<reference ref_id="CVE-2024-26772" ref_url="https://www.suse.com/security/cve/CVE-2024-26772/" source="CVE"/>
		<reference ref_id="CVE-2024-26773" ref_url="https://www.suse.com/security/cve/CVE-2024-26773/" source="CVE"/>
		<reference ref_id="CVE-2024-26776" ref_url="https://www.suse.com/security/cve/CVE-2024-26776/" source="CVE"/>
		<reference ref_id="CVE-2024-26779" ref_url="https://www.suse.com/security/cve/CVE-2024-26779/" source="CVE"/>
		<reference ref_id="CVE-2024-26783" ref_url="https://www.suse.com/security/cve/CVE-2024-26783/" source="CVE"/>
		<reference ref_id="CVE-2024-26787" ref_url="https://www.suse.com/security/cve/CVE-2024-26787/" source="CVE"/>
		<reference ref_id="CVE-2024-26790" ref_url="https://www.suse.com/security/cve/CVE-2024-26790/" source="CVE"/>
		<reference ref_id="CVE-2024-26792" ref_url="https://www.suse.com/security/cve/CVE-2024-26792/" source="CVE"/>
		<reference ref_id="CVE-2024-26793" ref_url="https://www.suse.com/security/cve/CVE-2024-26793/" source="CVE"/>
		<reference ref_id="CVE-2024-26798" ref_url="https://www.suse.com/security/cve/CVE-2024-26798/" source="CVE"/>
		<reference ref_id="CVE-2024-26805" ref_url="https://www.suse.com/security/cve/CVE-2024-26805/" source="CVE"/>
		<reference ref_id="CVE-2024-26807" ref_url="https://www.suse.com/security/cve/CVE-2024-26807/" source="CVE"/>
		<reference ref_id="CVE-2024-26816" ref_url="https://www.suse.com/security/cve/CVE-2024-26816/" source="CVE"/>
		<reference ref_id="CVE-2024-26817" ref_url="https://www.suse.com/security/cve/CVE-2024-26817/" source="CVE"/>
		<reference ref_id="CVE-2024-26820" ref_url="https://www.suse.com/security/cve/CVE-2024-26820/" source="CVE"/>
		<reference ref_id="CVE-2024-26825" ref_url="https://www.suse.com/security/cve/CVE-2024-26825/" source="CVE"/>
		<reference ref_id="CVE-2024-26830" ref_url="https://www.suse.com/security/cve/CVE-2024-26830/" source="CVE"/>
		<reference ref_id="CVE-2024-26833" ref_url="https://www.suse.com/security/cve/CVE-2024-26833/" source="CVE"/>
		<reference ref_id="CVE-2024-26836" ref_url="https://www.suse.com/security/cve/CVE-2024-26836/" source="CVE"/>
		<reference ref_id="CVE-2024-26843" ref_url="https://www.suse.com/security/cve/CVE-2024-26843/" source="CVE"/>
		<reference ref_id="CVE-2024-26848" ref_url="https://www.suse.com/security/cve/CVE-2024-26848/" source="CVE"/>
		<reference ref_id="CVE-2024-26852" ref_url="https://www.suse.com/security/cve/CVE-2024-26852/" source="CVE"/>
		<reference ref_id="CVE-2024-26853" ref_url="https://www.suse.com/security/cve/CVE-2024-26853/" source="CVE"/>
		<reference ref_id="CVE-2024-26855" ref_url="https://www.suse.com/security/cve/CVE-2024-26855/" source="CVE"/>
		<reference ref_id="CVE-2024-26856" ref_url="https://www.suse.com/security/cve/CVE-2024-26856/" source="CVE"/>
		<reference ref_id="CVE-2024-26857" ref_url="https://www.suse.com/security/cve/CVE-2024-26857/" source="CVE"/>
		<reference ref_id="CVE-2024-26861" ref_url="https://www.suse.com/security/cve/CVE-2024-26861/" source="CVE"/>
		<reference ref_id="CVE-2024-26862" ref_url="https://www.suse.com/security/cve/CVE-2024-26862/" source="CVE"/>
		<reference ref_id="CVE-2024-26866" ref_url="https://www.suse.com/security/cve/CVE-2024-26866/" source="CVE"/>
		<reference ref_id="CVE-2024-26872" ref_url="https://www.suse.com/security/cve/CVE-2024-26872/" source="CVE"/>
		<reference ref_id="CVE-2024-26875" ref_url="https://www.suse.com/security/cve/CVE-2024-26875/" source="CVE"/>
		<reference ref_id="CVE-2024-26878" ref_url="https://www.suse.com/security/cve/CVE-2024-26878/" source="CVE"/>
		<reference ref_id="CVE-2024-26879" ref_url="https://www.suse.com/security/cve/CVE-2024-26879/" source="CVE"/>
		<reference ref_id="CVE-2024-26881" ref_url="https://www.suse.com/security/cve/CVE-2024-26881/" source="CVE"/>
		<reference ref_id="CVE-2024-26882" ref_url="https://www.suse.com/security/cve/CVE-2024-26882/" source="CVE"/>
		<reference ref_id="CVE-2024-26883" ref_url="https://www.suse.com/security/cve/CVE-2024-26883/" source="CVE"/>
		<reference ref_id="CVE-2024-26884" ref_url="https://www.suse.com/security/cve/CVE-2024-26884/" source="CVE"/>
		<reference ref_id="CVE-2024-26885" ref_url="https://www.suse.com/security/cve/CVE-2024-26885/" source="CVE"/>
		<reference ref_id="CVE-2024-26891" ref_url="https://www.suse.com/security/cve/CVE-2024-26891/" source="CVE"/>
		<reference ref_id="CVE-2024-26893" ref_url="https://www.suse.com/security/cve/CVE-2024-26893/" source="CVE"/>
		<reference ref_id="CVE-2024-26895" ref_url="https://www.suse.com/security/cve/CVE-2024-26895/" source="CVE"/>
		<reference ref_id="CVE-2024-26896" ref_url="https://www.suse.com/security/cve/CVE-2024-26896/" source="CVE"/>
		<reference ref_id="CVE-2024-26897" ref_url="https://www.suse.com/security/cve/CVE-2024-26897/" source="CVE"/>
		<reference ref_id="CVE-2024-26898" ref_url="https://www.suse.com/security/cve/CVE-2024-26898/" source="CVE"/>
		<reference ref_id="CVE-2024-26901" ref_url="https://www.suse.com/security/cve/CVE-2024-26901/" source="CVE"/>
		<reference ref_id="CVE-2024-26903" ref_url="https://www.suse.com/security/cve/CVE-2024-26903/" source="CVE"/>
		<reference ref_id="CVE-2024-26917" ref_url="https://www.suse.com/security/cve/CVE-2024-26917/" source="CVE"/>
		<reference ref_id="CVE-2024-26927" ref_url="https://www.suse.com/security/cve/CVE-2024-26927/" source="CVE"/>
		<reference ref_id="CVE-2024-26948" ref_url="https://www.suse.com/security/cve/CVE-2024-26948/" source="CVE"/>
		<reference ref_id="CVE-2024-26950" ref_url="https://www.suse.com/security/cve/CVE-2024-26950/" source="CVE"/>
		<reference ref_id="CVE-2024-26951" ref_url="https://www.suse.com/security/cve/CVE-2024-26951/" source="CVE"/>
		<reference ref_id="CVE-2024-26955" ref_url="https://www.suse.com/security/cve/CVE-2024-26955/" source="CVE"/>
		<reference ref_id="CVE-2024-26956" ref_url="https://www.suse.com/security/cve/CVE-2024-26956/" source="CVE"/>
		<reference ref_id="CVE-2024-26960" ref_url="https://www.suse.com/security/cve/CVE-2024-26960/" source="CVE"/>
		<reference ref_id="CVE-2024-26965" ref_url="https://www.suse.com/security/cve/CVE-2024-26965/" source="CVE"/>
		<reference ref_id="CVE-2024-26966" ref_url="https://www.suse.com/security/cve/CVE-2024-26966/" source="CVE"/>
		<reference ref_id="CVE-2024-26969" ref_url="https://www.suse.com/security/cve/CVE-2024-26969/" source="CVE"/>
		<reference ref_id="CVE-2024-26970" ref_url="https://www.suse.com/security/cve/CVE-2024-26970/" source="CVE"/>
		<reference ref_id="CVE-2024-26972" ref_url="https://www.suse.com/security/cve/CVE-2024-26972/" source="CVE"/>
		<reference ref_id="CVE-2024-26981" ref_url="https://www.suse.com/security/cve/CVE-2024-26981/" source="CVE"/>
		<reference ref_id="CVE-2024-26982" ref_url="https://www.suse.com/security/cve/CVE-2024-26982/" source="CVE"/>
		<reference ref_id="CVE-2024-26993" ref_url="https://www.suse.com/security/cve/CVE-2024-26993/" source="CVE"/>
		<reference ref_id="CVE-2024-27013" ref_url="https://www.suse.com/security/cve/CVE-2024-27013/" source="CVE"/>
		<reference ref_id="CVE-2024-27014" ref_url="https://www.suse.com/security/cve/CVE-2024-27014/" source="CVE"/>
		<reference ref_id="CVE-2024-27030" ref_url="https://www.suse.com/security/cve/CVE-2024-27030/" source="CVE"/>
		<reference ref_id="CVE-2024-27038" ref_url="https://www.suse.com/security/cve/CVE-2024-27038/" source="CVE"/>
		<reference ref_id="CVE-2024-27039" ref_url="https://www.suse.com/security/cve/CVE-2024-27039/" source="CVE"/>
		<reference ref_id="CVE-2024-27041" ref_url="https://www.suse.com/security/cve/CVE-2024-27041/" source="CVE"/>
		<reference ref_id="CVE-2024-27043" ref_url="https://www.suse.com/security/cve/CVE-2024-27043/" source="CVE"/>
		<reference ref_id="CVE-2024-27046" ref_url="https://www.suse.com/security/cve/CVE-2024-27046/" source="CVE"/>
		<reference ref_id="CVE-2024-27056" ref_url="https://www.suse.com/security/cve/CVE-2024-27056/" source="CVE"/>
		<reference ref_id="CVE-2024-27062" ref_url="https://www.suse.com/security/cve/CVE-2024-27062/" source="CVE"/>
		<reference ref_id="CVE-2024-27389" ref_url="https://www.suse.com/security/cve/CVE-2024-27389/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-26760: Fixed scsi/target/pscsi bio_put() for error case (bsc#1222596).
- CVE-2024-27389: Fixed pstore inode handling with d_invalidate() (bsc#1223705).
- CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).
- CVE-2024-27056: Fixed wifi/iwlwifi/mvm to ensure offloading TID queue exists (bsc#1223822).
- CVE-2024-27046: Fixed nfp/flower handling acti_netdevs allocation failure (bsc#1223827).
- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).
- CVE-2024-27041: Fixed drm/amd/display NULL checks for adev-&gt;dm.dc in amdgpu_dm_fini() (bsc#1223714).
- CVE-2024-27039: Fixed clk/hisilicon/hi3559a an erroneous devm_kfree() (bsc#1223821).
- CVE-2024-27038: Fixed clk_core_get NULL pointer dereference (bsc#1223816).
- CVE-2024-27030: Fixed octeontx2-af to use separate handlers for interrupts (bsc#1223790).
- CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS (bsc#1223735).
- CVE-2024-27013: Fixed tun limit printing rate when illegal packet received by tun device (bsc#1223745).
- CVE-2024-26993: Fixed fs/sysfs reference leak in sysfs_break_active_protection() (bsc#1223693).
- CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value of zero (bsc#1223634).
- CVE-2024-26970: Fixed clk/qcom/gcc-ipq6018 termination of frequency table arrays (bsc#1223644).
- CVE-2024-26969: Fixed clk/qcom/gcc-ipq8074 termination of frequency table arrays (bsc#1223645).
- CVE-2024-26966: Fixed clk/qcom/mmcc-apq8084 termination of frequency table arrays (bsc#1223646).
- CVE-2024-26965: Fixed clk/qcom/mmcc-msm8974 termination of frequency table arrays (bsc#1223648).
- CVE-2024-26960: Fixed mm/swap race between free_swap_and_cache() and swapoff() (bsc#1223655).
- CVE-2024-26951: Fixed wireguard/netlink check for dangling peer via is_dead instead of empty list (bsc#1223660).
- CVE-2024-26950: Fixed wireguard/netlink to access device through ctx instead of peer (bsc#1223661).
- CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in dc_state_release (bsc#1223664).
- CVE-2024-26927: Fixed ASoC/SOF bounds checking to firmware data Smatch (bsc#1223525).
- CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent kernel-infoleak (bsc#1223198).
- CVE-2024-26896: Fixed wifi/wfx memory leak when starting AP (bsc#1223042).
- CVE-2024-26893: Fixed firmware/arm_scmi for possible double free in SMC transport cleanup path (bsc#1223196).
- CVE-2024-26885: Fixed bpf DEVMAP_HASH overflow check on 32-bit arches (bsc#1223190).
- CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches (bsc#1223189).
- CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches (bsc#1223035).
- CVE-2024-26882: Fixed net/ip_tunnel to make sure to pull inner header in ip_tunnel_rcv() (bsc#1223034).
- CVE-2024-26881: Fixed net/hns3 kernel crash when 1588 is received on HIP08 devices (bsc#1223041).
- CVE-2024-26879: Fixed clk/meson by adding missing clocks to axg_clk_regmaps (bsc#1223066).
- CVE-2024-26878: Fixed quota for potential NULL pointer dereference (bsc#1223060).
- CVE-2024-26866: Fixed spi/spi-fsl-lpspi by removing redundant spi_controller_put call (bsc#1223024).
- CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111).
- CVE-2024-26861: Fixed wireguard/receive annotate data-race around receiving_counter.counter (bsc#1223076).
- CVE-2024-26857: Fixed geneve to make sure to pull inner header in geneve_rx() (bsc#1223058).
- CVE-2024-26856: Fixed use-after-free inside sparx5_del_mact_entry (bsc#1223052).
- CVE-2024-26855: Fixed net/ice potential NULL pointer dereference in ice_bridge_setlink() (bsc#1223051).
- CVE-2024-26853: Fixed igc returning frame twice in XDP_REDIRECT (bsc#1223061).
- CVE-2024-26852: Fixed net/ipv6 to avoid possible UAF in ip6_route_mpath_notify() (bsc#1223057).
- CVE-2024-26848: Fixed afs endless loop in directory parsing (bsc#1223030).
- CVE-2024-26836: Fixed platform/x86/think-lmi password opcode ordering for workstations (bsc#1222968).
- CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove administratively set MAC (bsc#1223012).
- CVE-2024-26817: Fixed amdkfd to use calloc instead of kzalloc to avoid integer overflow (bsc#1222812).
- CVE-2024-26816: Fixed relocations in .notes section when building with CONFIG_XEN_PV=y by ignoring them (bsc#1222624).
- CVE-2024-26807: Fixed spi/cadence-qspi NULL pointer reference in runtime PM hooks (bsc#1222801).
- CVE-2024-26805: Fixed a kernel-infoleak-after-free in __skb_datagram_iter in netlink  (bsc#1222630).
- CVE-2024-26793: Fixed an use-after-free and null-ptr-deref in gtp_newlink() in gtp  (bsc#1222428).
- CVE-2024-26783: Fixed mm/vmscan bug when calling wakeup_kswapd() with a wrong zone index (bsc#1222615).
- CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618).
- CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (bsc#1222613).
- CVE-2024-26771: Fixed a null pointer dereference on edma_probe in dmaengine ti edma  (bsc#1222610)
- CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222726).
- CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct aio_kiocb conversion (bsc#1222721).
- CVE-2024-26763: Fixed user corruption via by writing data with O_DIRECT on device in dm-crypt (bsc#1222720).
- CVE-2024-26754: Fixed an use-after-free and null-ptr-deref in gtp_genl_dump_pdp() in gtp  (bsc#1222632).
- CVE-2024-26751: Fixed ARM/ep93xx terminator to gpiod_lookup_table (bsc#1222724).
- CVE-2024-26744: Fixed null pointer dereference in srpt_service_guid parameter in rdma/srpt (bsc#1222449).
- CVE-2024-26743: Fixed memory leak in qedr_create_user_qp error flow in rdma/qedr (bsc#1222677).
- CVE-2024-26737: Fixed selftests/bpf racing between bpf_timer_cancel_and_free and bpf_timer_cancel (bsc#1222557).
- CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
- CVE-2024-26727: Fixed assertion if a newly created btrfs subvolume already gets read (bsc#1222536).
- CVE-2024-26718: Fixed dm-crypt/dm-verity disable tasklets (bsc#1222416).
- CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422).
- CVE-2024-26696: Fixed nilfs2 hang in nilfs_lookup_dirty_data_buffers() (bsc#1222549).
- CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).
- CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup (bsc#1222435).
- CVE-2024-26685: Fixed nilfs2 potential bug in end_buffer_async_write (bsc#1222437).
- CVE-2024-26684: Fixed net/stmmac/xgmac handling of DPP safety error for DMA channels (bsc#1222445).
- CVE-2024-26681: Fixed netdevsim to avoid potential loop in nsim_dev_trap_report_work() (bsc#1222431).
- CVE-2024-26680: Fixed net/atlantic DMA mapping for PTP hwts ring (bsc#1222427).
- CVE-2024-26675: Fixed ppp_async to limit MRU to 64K (bsc#1222379).
- CVE-2024-26673: Fixed netfilter/nft_ct layer 3 and 4 protocol sanitization (bsc#1222368).
- CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race (bsc#1222357).
- CVE-2024-26660: Fixed drm/amd/display bounds check for stream encoder creation (bsc#1222266).
- CVE-2024-26656: Fixed drm/amdgpu use-after-free bug (bsc#1222307).
- CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).
- CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay (bsc#1220342).
- CVE-2024-23850: Fixed double free of anonymous device after snapshot  creation failure (bsc#1219126).
- CVE-2024-23848: Fixed media/cec for possible use-after-free in cec_queue_msg_fh (bsc#1219104).
- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).
- CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170).
- CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).
- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).
- CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device() (bsc#1223686).
- CVE-2023-52645: Fixed pmdomain/mediatek race conditions with genpd (bsc#1223033).
- CVE-2023-52636: Fixed libceph cursor init when preparing sparse read in msgr2 (bsc#1222247).
- CVE-2023-52635: Fixed PM/devfreq to synchronize devfreq_monitor_[start/stop] (bsc#1222294).
- CVE-2023-52627: Fixed iio:adc:ad7091r exports into IIO_AD7091R namespace (bsc#1222051).
- CVE-2023-52620: Fixed netfilter/nf_tables to disallow timeout for anonymous sets never used from userspace (bsc#1221825).
- CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in mpi_ec_init (bsc#1221612).
- CVE-2023-52614: Fixed PM/devfreq buffer overflow in trans_stat_show (bsc#1221617).
- CVE-2023-52593: Fixed wifi/wfx possible NULL pointer dereference in wfx_set_mfp_ap() (bsc#1221042).
- CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044).
- CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory renaming (bsc#1221088).
- CVE-2023-52589: Fixed media/rkisp1 IRQ disable race issue (bsc#1221084).
- CVE-2023-52585: Fixed drm/amdgpu for possible NULL pointer dereference in amdgpu_ras_query_error_status_helper() (bsc#1221080).
- CVE-2023-52561: Fixed arm64/dts/qcom/sdm845-db845c to mark cont splash memory region (bsc#1220935).
- CVE-2023-52503: Fixed tee/amdtee use-after-free vulnerability in amdtee_close_session (bsc#1220915).
- CVE-2023-52488: Fixed serial/sc16is7xx convert from _raw_ to _noinc_ regmap functions for FIFO (bsc#1221162).
- CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223505).
- CVE-2022-48659: Fixed mm/slub to return errno if kmalloc() fails (bsc#1223498).
- CVE-2022-48658: Fixed mm/slub to avoid a problem in flush_cpu_slab()/__free_slab() task context (bsc#1223496).
- CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb-&gt;mac_header (bsc#1223513).
- CVE-2022-48642: Fixed netfilter/nf_tables percpu memory leak at nf_tables_addchain() (bsc#1223478).
- CVE-2022-48640: Fixed bonding for possible NULL pointer dereference in bond_rr_gen_slave_id (bsc#1223499).
- CVE-2022-48631: Fixed a bug in ext4, when parsing extents where eh_entries == 0 and eh_depth &gt; 0 (bsc#1223475).
- CVE-2021-47214: Fixed hugetlb/userfaultfd during restore reservation in hugetlb_mcopy_atomic_pte() (bsc#1222710).
- CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions (bsc#1222878)
- CVE-2021-47200: Fixed drm/prime for possible use-after-free in mmap within drm_gem_ttm_mmap() and drm_gem_ttm_mmap() (bsc#1222838).
- CVE-2021-47195: Fixed use-after-free inside SPI via add_lock mutex (bsc#1222832).
- CVE-2021-47189: Fixed denial of service due to memory ordering issues between normal and ordered work functions in btrfs (bsc#1222706).
- CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer (bsc#1222669).
- CVE-2021-47183: Fixed a null pointer dereference during link down processing in scsi lpfc (bsc#1192145, bsc#1222664).
- CVE-2021-47182: Fixed scsi_mode_sense() buffer length handling (bsc#1222662).
- CVE-2021-47181: Fixed a null pointer dereference caused by calling platform_get_resource()  (bsc#1222660).

The following non-security bugs were fixed:

- ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block counter (stable-fixes).
- ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC (stable-fixes).
- ALSA: hda/realtek - Fix inactive headset mic jack (stable-fixes).
- ALSA: hda/realtek: Add quirk for HP SnowWhite laptops (stable-fixes).
- ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes).
- ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git-fixes).
- ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable-fixes).
- ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable-fixes).
- ALSA: scarlett2: Add correct product series name to messages (stable-fixes).
- ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes).
- ALSA: scarlett2: Default mixer driver to enabled (stable-fixes).
- ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes).
- ASoC: meson: axg-card: make links nonatomic (git-fixes).
- ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes).
- ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes).
- ASoC: soc-core.c: Skip dummy codec when adding platforms (stable-fixes).
- ASoC: tegra: Fix DSPK 16-bit playback (git-fixes).
- ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes).
- Bluetooth: Add new quirk for broken read key length on ATS2851 (git-fixes).
- Bluetooth: Fix TOCTOU in HCI debugfs implementation (git-fixes).
- Bluetooth: Fix memory leak in hci_req_sync_complete() (git-fixes).
- Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable-fixes).
- Bluetooth: L2CAP: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: RFCOMM: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: SCO: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: add quirk for broken address properties (git-fixes).
- Bluetooth: btintel: Fix null ptr deref in btintel_read_version (stable-fixes).
- Bluetooth: btintel: Fixe build regression (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable-fixes).
- Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes).
- Bluetooth: hci_event: set the conn encrypted before conn establishes (stable-fixes).
- Bluetooth: hci_sock: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes).
- Documentation: Add missing documentation for EXPORT_OP flags (stable-fixes).
- HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev-&gt;devc (git-fixes).
- HID: logitech-dj: allow mice to use all types of reports (git-fixes).
- HID: uhid: Use READ_ONCE()/WRITE_ONCE() for -&gt;running (stable-fixes).
- Input: synaptics-rmi4 - fail probing if memory allocation for 'phys' fails (stable-fixes).
- NFC: trf7970a: disable all regulators on removal (git-fixes).
- NFS: avoid spurious warning of lost lock that is being unlocked (bsc#1221791).
- PCI/AER: Block runtime suspend when handling errors (git-fixes).
- PCI/DPC: Quirk PIO log size for Intel Ice Lake Root Ports (git-fixes).
- PCI/DPC: Quirk PIO log size for Intel Raptor Lake Root Ports (git-fixes).
- PCI/DPC: Quirk PIO log size for certain Intel Root Ports (git-fixes).
- PCI/PM: Drain runtime-idle callbacks before driver removal (git-fixes).
- PCI: Drop pci_device_remove() test of pci_dev-&gt;driver (git-fixes).
- PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369 ltc#205888).
- RAS: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619).
- RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes).
- RDMA/cm: add timeout to cm_destroy_id wait (git-fixes)
- Reapply 'drm/qxl: simplify qxl_fence_wait' (stable-fixes).
- Revert 'ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default' (stable-fixes).
- Revert 'drm/qxl: simplify qxl_fence_wait' (git-fixes).
- Revert 'ice: Fix ice VF reset during iavf initialization (jsc#PED-376).' (bsc#1223275) 
- Revert 'usb: cdc-wdm: close race between read and workqueue' (git-fixes).
- Revert 'usb: phy: generic: Get the vbus supply' (git-fixes).
- USB: UAS: return ENODEV when submit urbs fail with device not attached (stable-fixes).
- USB: serial: add device ID for VeriFone adapter (stable-fixes).
- USB: serial: cp210x: add ID for MGP Instruments PDS100 (stable-fixes).
- USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M (stable-fixes).
- USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB (stable-fixes).
- USB: serial: option: add Fibocom FM135-GL variants (stable-fixes).
- USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes).
- USB: serial: option: add MeiG Smart SLM320 product (stable-fixes).
- USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable-fixes).
- USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes).
- USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes).
- USB: serial: option: support Quectel EM060K sub-models (stable-fixes).
- ahci: asm1064: asm1166: do not limit reported ports (git-fixes).
- ahci: asm1064: correct count of reported ports (stable-fixes).
- arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes)
- arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git-fixes)
- arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git-fixes)
- arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes)
- arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git-fixes)
- arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes)
- arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes)
- arm64: hibernate: Fix level3 translation fault in swsusp_save() (git-fixes).
- ax25: fix use-after-free bugs caused by ax25_ds_del_timer (git-fixes).
- batman-adv: Avoid infinite loop trying to resize local TT (git-fixes).
- bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent (git-fixes).
- bcache: Remove dead references to cache_readaheads (git-fixes).
- bcache: Remove unnecessary NULL point check in node allocations (git-fixes).
- bcache: add code comments for bch_btree_node_get() and __bch_btree_node_alloc() (git-fixes).
- bcache: avoid NULL checking to c-&gt;root in run_cache_set() (git-fixes).
- bcache: avoid oversize memory allocation by small stripe_size (git-fixes).
- bcache: bset: Fix comment typos (git-fixes).
- bcache: check return value from btree_node_alloc_replacement() (git-fixes).
- bcache: fix NULL pointer reference in cached_dev_detach_finish (git-fixes).
- bcache: fix error info in register_bcache() (git-fixes).
- bcache: fixup bcache_dev_sectors_dirty_add() multithreaded CPU false sharing (git-fixes).
- bcache: fixup btree_cache_wait list damage (git-fixes).
- bcache: fixup init dirty data errors (git-fixes).
- bcache: fixup lock c-&gt;root error (git-fixes).
- bcache: fixup multi-threaded bch_sectors_dirty_init() wake-up race (git-fixes).
- bcache: move calc_cached_dev_sectors to proper place on backing device detach (git-fixes).
- bcache: move uapi header bcache.h to bcache code directory (git-fixes).
- bcache: prevent potential division by zero error (git-fixes).
- bcache: remove EXPERIMENTAL for Kconfig option 'Asynchronous device registration' (git-fixes).
- bcache: remove redundant assignment to variable cur_idx (git-fixes).
- bcache: remove the backing_dev_name field from struct cached_dev (git-fixes).
- bcache: remove the cache_dev_name field from struct cache (git-fixes).
- bcache: remove unnecessary flush_workqueue (git-fixes).
- bcache: remove unused bch_mark_cache_readahead function def in stats.h (git-fixes).
- bcache: replace a mistaken IS_ERR() by IS_ERR_OR_NULL() in btree_gc_coalesce() (git-fixes).
- bcache: replace snprintf in show functions with sysfs_emit (git-fixes).
- bcache: revert replacing IS_ERR_OR_NULL with IS_ERR (git-fixes).
- bcache: use bvec_kmap_local in bch_data_verify (git-fixes).
- bcache: use bvec_kmap_local in bio_csum (git-fixes).
- bcache: use default_groups in kobj_type (git-fixes).
- bcache:: fix repeated words in comments (git-fixes).
- ceph: stop copying to iter at EOF on sync reads (bsc#1223068).
- ceph: switch to corrected encoding of max_xattr_size in mdsmap (bsc#1223067).
- clk: Get runtime PM before walking tree during disable_unused (git-fixes).
- clk: Initialize struct clk_core kref earlier (stable-fixes).
- clk: Mark 'all_lists' as const (stable-fixes).
- clk: Print an info line before disabling unused clocks (stable-fixes).
- clk: Remove prepare_lock hold assertion in __clk_release() (git-fixes).
- clk: remove extra empty line (stable-fixes).
- comedi: vmk80xx: fix incomplete endpoint checking (git-fixes).
- dm cache policy smq: ensure IO does not prevent cleaner policy progress (git-fixes).
- dm cache: add cond_resched() to various workqueue loops (git-fixes).
- dm clone: call kmem_cache_destroy() in dm_clone_init() error path (git-fixes).
- dm crypt: add cond_resched() to dmcrypt_write() (git-fixes).
- dm crypt: avoid accessing uninitialized tasklet (git-fixes).
- dm flakey: do not corrupt the zero page (git-fixes).
- dm flakey: fix a bug with 32-bit highmem systems (git-fixes).
- dm flakey: fix a crash with invalid table line (git-fixes).
- dm flakey: fix logic when corrupting a bio (git-fixes).
- dm init: add dm-mod.waitfor to wait for asynchronously probed block devices (git-fixes).
- dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path (git-fixes).
- dm integrity: fix out-of-range warning (git-fixes).
- dm integrity: reduce vmalloc space footprint on 32-bit architectures (git-fixes).
- dm raid: clean up four equivalent goto tags in raid_ctr() (git-fixes).
- dm raid: fix false positive for requeue needed during reshape (git-fixes).
- dm raid: fix missing reconfig_mutex unlock in raid_ctr() error paths (git-fixes).
- dm stats: check for and propagate alloc_percpu failure (git-fixes).
- dm thin metadata: Fix ABBA deadlock by resetting dm_bufio_client (git-fixes).
- dm thin metadata: check fail_io before using data_sm (git-fixes).
- dm thin: add cond_resched() to various workqueue loops (git-fixes).
- dm thin: fix deadlock when swapping to thin device (bsc#1177529).
- dm verity: do not perform FEC for failed readahead IO (git-fixes).
- dm verity: fix error handling for check_at_most_once on FEC (git-fixes).
- dm zoned: free dmz-&gt;ddev array in dmz_put_zoned_devices (git-fixes).
- dm-delay: fix a race between delay_presuspend and delay_bio (git-fixes).
- dm-integrity: do not modify bio's immutable bio_vec in integrity_metadata() (git-fixes).
- dm-raid: fix lockdep waring in 'pers-&gt;hot_add_disk' (git-fixes).
- dm-verity, dm-crypt: align 'struct bvec_iter' correctly (git-fixes).
- dm-verity: align struct dm_verity_fec_io properly (git-fixes).
- dm: add cond_resched() to dm_wq_work() (git-fixes).
- dm: call the resume method on internal suspend (git-fixes).
- dm: do not lock fs when the map is NULL during suspend or resume (git-fixes).
- dm: do not lock fs when the map is NULL in process of resume (git-fixes).
- dm: remove flush_scheduled_work() during local_exit() (git-fixes).
- dm: send just one event on resize, not two (git-fixes).
- dma: xilinx_dpdma: Fix locking (git-fixes).
- dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes).
- dmaengine: owl: fix register access functions (git-fixes).
- dmaengine: tegra186: Fix residual calculation (git-fixes).
- docs: Document the FAN_FS_ERROR event (stable-fixes).
- drm-print: add drm_dbg_driver to improve namespace symmetry (stable-fixes).
- drm/amd/display: Do not recursively call manual trigger programming (stable-fixes).
- drm/amd/display: Fix nanosec stat overflow (stable-fixes).
- drm/amd/display: fix disable otg wa logic in DCN316 (stable-fixes).
- drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 (stable-fixes).
- drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes).
- drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes).
- drm/amdgpu: Reset dGPU if suspend got aborted (stable-fixes).
- drm/amdgpu: always force full reset for SOC21 (stable-fixes).
- drm/amdgpu: fix incorrect active rb bitmap for gfx11 (stable-fixes).
- drm/amdgpu: fix incorrect number of active RBs for gfx11 (stable-fixes).
- drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 (git-fixes).
- drm/amdgpu: validate the parameters of bo mapping operations more clearly (git-fixes).
- drm/amdkfd: Reset GPU on queue preemption failure (stable-fixes).
- drm/ast: Fix soft lockup (git-fixes).
- drm/client: Fully protect modes[] with dev-&gt;mode_config.mutex (stable-fixes).
- drm/i915/cdclk: Fix CDCLK programming order when pipes are active (git-fixes).
- drm/i915/vrr: Disable VRR when using bigjoiner (stable-fixes).
- drm/i915: Disable port sync when bigjoiner is used (stable-fixes).
- drm/msm/dp: fix typo in dp_display_handle_port_status_changed() (git-fixes).
- drm/nouveau/nvkm: add a replacement for nvkm_notify (bsc#1223834)
- drm/panel: ili9341: Respect deferred probe (git-fixes).
- drm/panel: ili9341: Use predefined error codes (git-fixes).
- drm/panel: visionox-rm69299: do not unregister DSI device (git-fixes).
- drm/vc4: do not check if plane-&gt;state-&gt;fb == state-&gt;fb (stable-fixes).
- drm/vmwgfx: Enable DMA mappings with SEV (git-fixes).
- drm/vmwgfx: Fix crtc's atomic check conditional (git-fixes).
- drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes).
- drm/vmwgfx: Sort primary plane formats by order of preference (git-fixes).
- drm: nv04: Fix out of bounds access (git-fixes).
- drm: panel-orientation-quirks: Add quirk for GPD Win Mini (stable-fixes).
- drm: panel-orientation-quirks: Add quirk for Lenovo Legion Go (stable-fixes).
- dump_stack: Do not get cpu_sync for panic CPU (bsc#1223574).
- fbdev: fix incorrect address computation in deferred IO (git-fixes).
- fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 (stable-fixes).
- fbmon: prevent division by zero in fb_videomode_from_videomode() (stable-fixes).
- fix build warning
- fuse: do not unhash root (bsc#1223951).
- fuse: fix root lookup with nonzero generation (bsc#1223950).
- hwmon: (amc6821) add of_match table (stable-fixes).
- i2c: pxa: hide unused icr_bits[] variable (git-fixes).
- i2c: smbus: fix NULL function pointer dereference (git-fixes).
- i40e: Fix VF MAC filter removal (git-fixes).
- idma64: Do not try to serve interrupts when device is powered off (git-fixes).
- iio: accel: mxc4005: Interrupt handling fixes (git-fixes).
- iio:imu: adis16475: Fix sync mode setting (git-fixes).
- init/main.c: Fix potential static_command_line memory overflow (git-fixes).
- iommu/amd: Add a length limitation for the ivrs_acpihid command-line parameter (git-fixes).
- iommu/amd: Fix 'Guest Virtual APIC Table Root Pointer' configuration in IRTE (git-fixes).
- iommu/amd: Fix domain flush size when syncing iotlb (git-fixes).
- iommu/amd: Fix error handling for pdev_pri_ats_enable() (git-fixes).
- iommu/arm-smmu-qcom: Limit the SMR groups to 128 (git-fixes).
- iommu/arm-smmu-v3: Acknowledge pri/event queue overflow if any (git-fixes).
- iommu/fsl: fix all kernel-doc warnings in fsl_pamu.c (git-fixes).
- iommu/iova: Fix alloc iova overflows issue (git-fixes).
- iommu/mediatek: Flush IOTLB completely only if domain has been attached (git-fixes).
- iommu/rockchip: Fix unwind goto issue (git-fixes).
- iommu/sprd: Release dma buffer to avoid memory leak (git-fixes).
- iommu/vt-d: Allocate local memory for page request queue (git-fixes).
- iommu/vt-d: Allow zero SAGAW if second-stage not supported (git-fixes).
- iommu/vt-d: Fix error handling in sva enable/disable paths (git-fixes).
- iommu: Fix error unwind in iommu_group_alloc() (git-fixes).
- ipv6/addrconf: fix a potential refcount underflow for idev (git-fixes).
- kABI: Adjust trace_iterator.wait_index (git-fixes).
- kprobes: Fix double free of kretprobe_holder (bsc#1220901).
- kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).
- libnvdimm/of_pmem: Use devm_kstrdup instead of kstrdup and check its return value (git-fixes).
- libnvdimm/region: Allow setting align attribute on regions without mappings (git-fixes).
- livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539).
- md/raid1: fix choose next idle in read_balance() (git-fixes).
- md: Do not clear MD_CLOSING when the raid is about to stop (git-fixes).
- md: do not clear MD_RECOVERY_FROZEN for new dm-raid until resume (git-fixes).
- media: cec: core: remove length check of Timer Status (stable-fixes).
- media: sta2x11: fix irq handler cast (stable-fixes).
- mei: me: add arrow lake point H DID (stable-fixes).
- mei: me: add arrow lake point S DID (stable-fixes).
- mei: me: disable RPL-S on SPS and IGN firmwares (git-fixes).
- mm/vmscan: make sure wakeup_kswapd with managed zone (bsc#1223473).
- mmc: sdhci-msm: pervent access to suspended controller (git-fixes).
- mtd: diskonchip: work around ubsan link failure (stable-fixes).
- nd_btt: Make BTT lanes preemptible (git-fixes).
- net: bridge: vlan: fix memory leak in __allowed_ingress (git-fixes).
- net: fix a memleak when uncloning an skb dst and its metadata (git-fixes).
- net: fix skb leak in __skb_tstamp_tx() (git-fixes).
- net: ipv6: ensure we call ipv6_mc_down() at most once (git-fixes).
- net: mld: fix reference count leak in mld_{query | report}_work() (git-fixes).
- net: stream: purge sk_error_queue in sk_stream_kill_queues() (git-fixes).
- net: usb: ax88179_178a: avoid the interface always configured as random address (git-fixes).
- net: usb: ax88179_178a: avoid writing the mac address before first reading (git-fixes).
- net: usb: ax88179_178a: stop lying about skb-&gt;truesize (git-fixes).
- net: vlan: fix underflow for the real_dev refcnt (git-fixes).
- netfilter: br_netfilter: Drop dst references before setting (git-fixes).
- netfilter: ipt_CLUSTERIP: fix refcount leak in clusterip_tg_check() (git-fixes).
- netfilter: nft_ct: fix l3num expectations with inet pseudo family (git-fixes).
- nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380 bsc#1217408).
- nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
- nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
- nouveau: fix function cast warning (git-fixes).
- nouveau: fix instmem race condition around ptr stores (git-fixes).
- nvdimm/namespace: drop nested variable in create_namespace_pmem() (git-fixes).
- nvdimm: Allow overwrite in the presence of disabled dimms (git-fixes).
- nvdimm: Fix badblocks clear off-by-one error (git-fixes).
- nvdimm: Fix dereference after free in register_nvdimm_pmu() (git-fixes).
- nvdimm: Fix firmware activation deadlock scenarios (git-fixes).
- nvdimm: Fix memleak of pmu attr_groups in unregister_nvdimm_pmu() (git-fixes).
- pci_iounmap(): Fix MMIO mapping leak (git-fixes).
- phy: tegra: xusb: Add API to retrieve the port number of phy (stable-fixes).
- pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs (stable-fixes).
- platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi Vi8 tablet (stable-fixes).
- powerpc/kasan: Do not instrument non-maskable or raw interrupts (bsc#1223191).
- powerpc/pseries/iommu: LPAR panics when rebooted with a frozen PE (bsc#1222011 ltc#205900).
- powerpc/rtas: define pr_fmt and convert printk call sites (bsc#1223369 ltc#205888).
- powerpc/rtas: export rtas_error_rc() for reuse (bsc#1223369 ltc#205888).
- powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645 ltc#205739 bsc#1223191).
- powerpc: Refactor verification of MSR_RI (bsc#1223191).
- printk: Add this_cpu_in_panic() (bsc#1223574).
- printk: Adjust mapping for 32bit seq macros (bsc#1223574).
- printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1223574).
- printk: Disable passing console lock owner completely during panic() (bsc#1223574).
- printk: Drop console_sem during panic (bsc#1223574).
- printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic() (bsc#1223574).
- printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1223574).
- printk: Wait for all reserved records with pr_flush() (bsc#1223574).
- printk: nbcon: Relocate 32bit seq macros (bsc#1223574).
- printk: ringbuffer: Clarify special lpos values (bsc#1223574).
- printk: ringbuffer: Cleanup reader terminology (bsc#1223574).
- printk: ringbuffer: Do not skip non-finalized records with prb_next_seq() (bsc#1223574).
- printk: ringbuffer: Improve prb_next_seq() performance (bsc#1223574).
- printk: ringbuffer: Skip non-finalized records in panic (bsc#1223574).
- pstore/zone: Add a null pointer check to the psz_kmsg_read (stable-fixes).
- ring-buffer: Do not set shortest_full when full target is hit (git-fixes).
- ring-buffer: Fix full_waiters_pending in poll (git-fixes).
- ring-buffer: Fix resetting of shortest_full (git-fixes).
- ring-buffer: Fix waking up ring buffer readers (git-fixes).
- ring-buffer: Make wake once of ring_buffer_wait() more robust (git-fixes).
- ring-buffer: Use wait_event_interruptible() in ring_buffer_wait() (git-fixes).
- ring-buffer: use READ_ONCE() to read cpu_buffer-&gt;commit_page in concurrent environment (git-fixes).
- s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223875).
- s390/decompressor: fix misaligned symbol build error (git-fixes bsc#1223785).
- s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223877).
- s390/mm: Fix storage key clearing for guest huge pages (git-fixes bsc#1223878).
- s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223879).
- s390/scm: fix virtual vs physical address confusion (git-fixes bsc#1223784).
- s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes bsc#1223876).
- s390/vdso: drop '-fPIC' from LDFLAGS (git-fixes bsc#1223598).
- s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes bsc#1223595).
- serial/pmac_zilog: Remove flawed mitigation for rx irq flood (git-fixes).
- serial: core: Provide port lock wrappers (stable-fixes).
- serial: core: fix kernel-doc for uart_port_unlock_irqrestore() (git-fixes).
- serial: mxs-auart: add spinlock around changing cts state (git-fixes).
- slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes).
- speakup: Avoid crash on very long word (git-fixes).
- speakup: Fix 8bit characters from direct synth (git-fixes).
- tcp/udp: Fix memleaks of sk and zerocopy skbs with TX timestamp (git-fixes).
- thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes).
- thunderbolt: Fix wake configurations after device unplug (stable-fixes).
- tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string (git-fixes).
- tracing/ring-buffer: Fix wait_on_pipe() race (git-fixes).
- tracing: Have saved_cmdlines arrays all in one allocation (git-fixes).
- tracing: Remove precision vsnprintf() check from print event (git-fixes).
- tracing: Show size of requested perf buffer (git-fixes).
- tracing: Use .flush() call to wake up readers (git-fixes).
- usb: Disable USB3 LPM at shutdown (stable-fixes).
- usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed device (git-fixes).
- usb: dwc2: host: Fix dereference issue in DDMA completion flow (git-fixes).
- usb: gadget: composite: fix OS descriptors w_value logic (git-fixes).
- usb: gadget: f_fs: Fix a race condition when processing setup packets (git-fixes).
- usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error (stable-fixes).
- usb: gadget: tegra-xudc: Fix USB3 PHY retrieval logic (git-fixes).
- usb: ohci: Prevent missed ohci interrupts (git-fixes).
- usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined (stable-fixes).
- usb: typec: tcpci: add generic tcpci fallback compatible (stable-fixes).
- usb: typec: tcpm: Check for port partner validity before consuming it (git-fixes).
- usb: typec: tcpm: unregister existing source caps before re-registration (bsc#1220569).
- usb: typec: ucsi: Ack unsupported commands (stable-fixes).
- usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset (stable-fixes).
- usb: typec: ucsi: Fix connector check on init (git-fixes).
- usb: udc: remove warning when queue disabled ep (stable-fixes).
- vdpa/mlx5: Allow CVQ size changes (git-fixes).
- virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223949).
- wifi: ath9k: fix LNA selection in ath_ant_try_scan() (stable-fixes).
- wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git-fixes).
- wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes).
- wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes (stable-fixes).
- wifi: nl80211: do not free NULL coalescing rule (git-fixes).
- x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ (git-fixes).
- x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type (jsc#PED-7167 git-fixes).
- x86/sev: Skip ROM range scans and validation for SEV-SNP guests (jsc#PED-7167 git-fixes).
- x86/xen: Add some null pointer checking to smp.c (git-fixes).
- x86/xen: add CPU dependencies for 32-bit build (git-fixes).
- x86/xen: fix percpu vcpu_info allocation (git-fixes).
- xen-netback: properly sync TX responses (git-fixes).
- xen-netfront: Add missing skb_mark_for_recycle (git-fixes).
- xen/gntdev: Fix the abuse of underlying struct page in DMA-buf import (git-fixes).
- xen/xenbus: document will_handle argument for xenbus_watch_path() (git-fixes).
- xfrm6: fix inet6_dev refcount underflow problem (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-05-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177529">SUSE bug 1177529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192145">SUSE bug 1192145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211592">SUSE bug 1211592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217408">SUSE bug 1217408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218562">SUSE bug 1218562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218917">SUSE bug 1218917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219104">SUSE bug 1219104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219126">SUSE bug 1219126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219169">SUSE bug 1219169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219170">SUSE bug 1219170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219264">SUSE bug 1219264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220342">SUSE bug 1220342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220569">SUSE bug 1220569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220761">SUSE bug 1220761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220901">SUSE bug 1220901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220915">SUSE bug 1220915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220935">SUSE bug 1220935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221042">SUSE bug 1221042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221044">SUSE bug 1221044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221080">SUSE bug 1221080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221084">SUSE bug 1221084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221088">SUSE bug 1221088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221162">SUSE bug 1221162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221299">SUSE bug 1221299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221612">SUSE bug 1221612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221617">SUSE bug 1221617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221645">SUSE bug 1221645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221791">SUSE bug 1221791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221825">SUSE bug 1221825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222011">SUSE bug 1222011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222051">SUSE bug 1222051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222247">SUSE bug 1222247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222266">SUSE bug 1222266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222294">SUSE bug 1222294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222307">SUSE bug 1222307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222357">SUSE bug 1222357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222368">SUSE bug 1222368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222379">SUSE bug 1222379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222416">SUSE bug 1222416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222422">SUSE bug 1222422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222424">SUSE bug 1222424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222427">SUSE bug 1222427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222428">SUSE bug 1222428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222430">SUSE bug 1222430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222431">SUSE bug 1222431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222435">SUSE bug 1222435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222437">SUSE bug 1222437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222445">SUSE bug 1222445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222449">SUSE bug 1222449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222482">SUSE bug 1222482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222503">SUSE bug 1222503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222520">SUSE bug 1222520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222536">SUSE bug 1222536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222549">SUSE bug 1222549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222550">SUSE bug 1222550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222557">SUSE bug 1222557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222559">SUSE bug 1222559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222585">SUSE bug 1222585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222586">SUSE bug 1222586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222596">SUSE bug 1222596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222609">SUSE bug 1222609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222610">SUSE bug 1222610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222613">SUSE bug 1222613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222615">SUSE bug 1222615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222618">SUSE bug 1222618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222624">SUSE bug 1222624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222630">SUSE bug 1222630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222632">SUSE bug 1222632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222660">SUSE bug 1222660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222662">SUSE bug 1222662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222664">SUSE bug 1222664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222666">SUSE bug 1222666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222669">SUSE bug 1222669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222671">SUSE bug 1222671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222677">SUSE bug 1222677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222678">SUSE bug 1222678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222680">SUSE bug 1222680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222703">SUSE bug 1222703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222704">SUSE bug 1222704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222706">SUSE bug 1222706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222709">SUSE bug 1222709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222710">SUSE bug 1222710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222720">SUSE bug 1222720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222721">SUSE bug 1222721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222724">SUSE bug 1222724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222726">SUSE bug 1222726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222727">SUSE bug 1222727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222764">SUSE bug 1222764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222772">SUSE bug 1222772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222773">SUSE bug 1222773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222776">SUSE bug 1222776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222781">SUSE bug 1222781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222784">SUSE bug 1222784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222785">SUSE bug 1222785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222787">SUSE bug 1222787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222790">SUSE bug 1222790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222791">SUSE bug 1222791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222792">SUSE bug 1222792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222796">SUSE bug 1222796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222798">SUSE bug 1222798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222801">SUSE bug 1222801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222812">SUSE bug 1222812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222824">SUSE bug 1222824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222829">SUSE bug 1222829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222832">SUSE bug 1222832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222836">SUSE bug 1222836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222838">SUSE bug 1222838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222866">SUSE bug 1222866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222867">SUSE bug 1222867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222869">SUSE bug 1222869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222876">SUSE bug 1222876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222878">SUSE bug 1222878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222879">SUSE bug 1222879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222881">SUSE bug 1222881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222883">SUSE bug 1222883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222888">SUSE bug 1222888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222894">SUSE bug 1222894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222901">SUSE bug 1222901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222968">SUSE bug 1222968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223012">SUSE bug 1223012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223014">SUSE bug 1223014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223016">SUSE bug 1223016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223024">SUSE bug 1223024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223030">SUSE bug 1223030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223033">SUSE bug 1223033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223034">SUSE bug 1223034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223035">SUSE bug 1223035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223036">SUSE bug 1223036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223037">SUSE bug 1223037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223041">SUSE bug 1223041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223042">SUSE bug 1223042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223051">SUSE bug 1223051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223052">SUSE bug 1223052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223056">SUSE bug 1223056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223057">SUSE bug 1223057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223058">SUSE bug 1223058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223060">SUSE bug 1223060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223061">SUSE bug 1223061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223065">SUSE bug 1223065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223066">SUSE bug 1223066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223067">SUSE bug 1223067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223068">SUSE bug 1223068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223076">SUSE bug 1223076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223078">SUSE bug 1223078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223111">SUSE bug 1223111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223115">SUSE bug 1223115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223118">SUSE bug 1223118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223187">SUSE bug 1223187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223189">SUSE bug 1223189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223190">SUSE bug 1223190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223191">SUSE bug 1223191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223196">SUSE bug 1223196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223197">SUSE bug 1223197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223198">SUSE bug 1223198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223275">SUSE bug 1223275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223323">SUSE bug 1223323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223369">SUSE bug 1223369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223380">SUSE bug 1223380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223473">SUSE bug 1223473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223474">SUSE bug 1223474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223475">SUSE bug 1223475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223477">SUSE bug 1223477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223478">SUSE bug 1223478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223479">SUSE bug 1223479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223481">SUSE bug 1223481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223482">SUSE bug 1223482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223484">SUSE bug 1223484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223487">SUSE bug 1223487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223490">SUSE bug 1223490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223496">SUSE bug 1223496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223498">SUSE bug 1223498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223499">SUSE bug 1223499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223501">SUSE bug 1223501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223502">SUSE bug 1223502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223503">SUSE bug 1223503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223505">SUSE bug 1223505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223509">SUSE bug 1223509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223511">SUSE bug 1223511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223512">SUSE bug 1223512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223513">SUSE bug 1223513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223516">SUSE bug 1223516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223517">SUSE bug 1223517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223518">SUSE bug 1223518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223519">SUSE bug 1223519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223520">SUSE bug 1223520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223522">SUSE bug 1223522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223523">SUSE bug 1223523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223525">SUSE bug 1223525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223539">SUSE bug 1223539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223574">SUSE bug 1223574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223595">SUSE bug 1223595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223598">SUSE bug 1223598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223634">SUSE bug 1223634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223643">SUSE bug 1223643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223644">SUSE bug 1223644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223645">SUSE bug 1223645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223646">SUSE bug 1223646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223648">SUSE bug 1223648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223655">SUSE bug 1223655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223657">SUSE bug 1223657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223660">SUSE bug 1223660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223661">SUSE bug 1223661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223663">SUSE bug 1223663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223664">SUSE bug 1223664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223668">SUSE bug 1223668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223686">SUSE bug 1223686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223693">SUSE bug 1223693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223705">SUSE bug 1223705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223714">SUSE bug 1223714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223735">SUSE bug 1223735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223745">SUSE bug 1223745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223784">SUSE bug 1223784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223785">SUSE bug 1223785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223790">SUSE bug 1223790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223816">SUSE bug 1223816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223821">SUSE bug 1223821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223822">SUSE bug 1223822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223824">SUSE bug 1223824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223827">SUSE bug 1223827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223834">SUSE bug 1223834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223875">SUSE bug 1223875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223876">SUSE bug 1223876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223877">SUSE bug 1223877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223878">SUSE bug 1223878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223879">SUSE bug 1223879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223894">SUSE bug 1223894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223921">SUSE bug 1223921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223922">SUSE bug 1223922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223923">SUSE bug 1223923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223924">SUSE bug 1223924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223929">SUSE bug 1223929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223931">SUSE bug 1223931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223932">SUSE bug 1223932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223934">SUSE bug 1223934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223941">SUSE bug 1223941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223948">SUSE bug 1223948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223949">SUSE bug 1223949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223950">SUSE bug 1223950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223951">SUSE bug 1223951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223952">SUSE bug 1223952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223953">SUSE bug 1223953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223956">SUSE bug 1223956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223957">SUSE bug 1223957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223960">SUSE bug 1223960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223962">SUSE bug 1223962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223963">SUSE bug 1223963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223964">SUSE bug 1223964</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47047/">CVE-2021-47047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47047">CVE-2021-47047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47181/">CVE-2021-47181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47181">CVE-2021-47181 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47182/">CVE-2021-47182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47182">CVE-2021-47182 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47183/">CVE-2021-47183 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47183">CVE-2021-47183 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47184/">CVE-2021-47184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47184">CVE-2021-47184 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47185/">CVE-2021-47185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47185">CVE-2021-47185 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47187/">CVE-2021-47187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47187">CVE-2021-47187 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47188/">CVE-2021-47188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47188">CVE-2021-47188 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47189/">CVE-2021-47189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47189">CVE-2021-47189 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47191/">CVE-2021-47191 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47191">CVE-2021-47191 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47192/">CVE-2021-47192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47192">CVE-2021-47192 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47193/">CVE-2021-47193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47193">CVE-2021-47193 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47194/">CVE-2021-47194 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47194">CVE-2021-47194 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47195/">CVE-2021-47195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47195">CVE-2021-47195 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47196/">CVE-2021-47196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47196">CVE-2021-47196 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47197/">CVE-2021-47197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47197">CVE-2021-47197 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47198/">CVE-2021-47198 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47198">CVE-2021-47198 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47199/">CVE-2021-47199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47199">CVE-2021-47199 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47200/">CVE-2021-47200 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47200">CVE-2021-47200 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47201/">CVE-2021-47201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47201">CVE-2021-47201 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47202/">CVE-2021-47202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47202">CVE-2021-47202 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47203/">CVE-2021-47203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47203">CVE-2021-47203 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47204/">CVE-2021-47204 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47204">CVE-2021-47204 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47205/">CVE-2021-47205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47205">CVE-2021-47205 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47206/">CVE-2021-47206 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47206">CVE-2021-47206 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47207/">CVE-2021-47207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47207">CVE-2021-47207 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47209/">CVE-2021-47209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47209">CVE-2021-47209 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47210/">CVE-2021-47210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47210">CVE-2021-47210 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47211/">CVE-2021-47211 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47211">CVE-2021-47211 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47212/">CVE-2021-47212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47212">CVE-2021-47212 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47214/">CVE-2021-47214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47214">CVE-2021-47214 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47215/">CVE-2021-47215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47215">CVE-2021-47215 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47216/">CVE-2021-47216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47216">CVE-2021-47216 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47217/">CVE-2021-47217 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47217">CVE-2021-47217 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47218/">CVE-2021-47218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47218">CVE-2021-47218 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47219/">CVE-2021-47219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47219">CVE-2021-47219 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48631/">CVE-2022-48631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48631">CVE-2022-48631 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48632/">CVE-2022-48632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48632">CVE-2022-48632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48634/">CVE-2022-48634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48634">CVE-2022-48634 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48636/">CVE-2022-48636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48636">CVE-2022-48636 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48637/">CVE-2022-48637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48637">CVE-2022-48637 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48638/">CVE-2022-48638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48638">CVE-2022-48638 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48639/">CVE-2022-48639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48639">CVE-2022-48639 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48640/">CVE-2022-48640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48640">CVE-2022-48640 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48642/">CVE-2022-48642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48642">CVE-2022-48642 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48644/">CVE-2022-48644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48644">CVE-2022-48644 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48646/">CVE-2022-48646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48646">CVE-2022-48646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48647/">CVE-2022-48647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48647">CVE-2022-48647 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48648/">CVE-2022-48648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48648">CVE-2022-48648 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48650/">CVE-2022-48650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48650">CVE-2022-48650 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48651/">CVE-2022-48651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48651">CVE-2022-48651 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48652/">CVE-2022-48652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48652">CVE-2022-48652 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48653/">CVE-2022-48653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48653">CVE-2022-48653 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48654/">CVE-2022-48654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48654">CVE-2022-48654 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48655/">CVE-2022-48655 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48655">CVE-2022-48655 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48656/">CVE-2022-48656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48656">CVE-2022-48656 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48657/">CVE-2022-48657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48657">CVE-2022-48657 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48658/">CVE-2022-48658 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48658">CVE-2022-48658 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48659/">CVE-2022-48659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48659">CVE-2022-48659 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48660/">CVE-2022-48660 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48660">CVE-2022-48660 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48662/">CVE-2022-48662 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48662">CVE-2022-48662 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48663/">CVE-2022-48663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48663">CVE-2022-48663 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48667/">CVE-2022-48667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48667">CVE-2022-48667 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48668/">CVE-2022-48668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48668">CVE-2022-48668 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48671/">CVE-2022-48671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48671">CVE-2022-48671 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48672/">CVE-2022-48672 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48672">CVE-2022-48672 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48673/">CVE-2022-48673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48673">CVE-2022-48673 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48675/">CVE-2022-48675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48675">CVE-2022-48675 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48686/">CVE-2022-48686 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48686">CVE-2022-48686 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48687/">CVE-2022-48687 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48687">CVE-2022-48687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48688/">CVE-2022-48688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48688">CVE-2022-48688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48690/">CVE-2022-48690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48690">CVE-2022-48690 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48692/">CVE-2022-48692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48692">CVE-2022-48692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48693/">CVE-2022-48693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48693">CVE-2022-48693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48694/">CVE-2022-48694 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48694">CVE-2022-48694 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48695/">CVE-2022-48695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48695">CVE-2022-48695 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48697/">CVE-2022-48697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48697">CVE-2022-48697 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48698/">CVE-2022-48698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48698">CVE-2022-48698 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48700/">CVE-2022-48700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48700">CVE-2022-48700 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48701/">CVE-2022-48701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48701">CVE-2022-48701 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48702/">CVE-2022-48702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48702">CVE-2022-48702 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48703/">CVE-2022-48703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48703">CVE-2022-48703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48704/">CVE-2022-48704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48704">CVE-2022-48704 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-2860/">CVE-2023-2860 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2860">CVE-2023-2860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52488/">CVE-2023-52488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52488">CVE-2023-52488 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52503/">CVE-2023-52503 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52503">CVE-2023-52503 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52561/">CVE-2023-52561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52561">CVE-2023-52561 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52585/">CVE-2023-52585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52585">CVE-2023-52585 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52589/">CVE-2023-52589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52589">CVE-2023-52589 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52590/">CVE-2023-52590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52590">CVE-2023-52590 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52591/">CVE-2023-52591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52591">CVE-2023-52591 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52593/">CVE-2023-52593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52593">CVE-2023-52593 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52614/">CVE-2023-52614 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52614">CVE-2023-52614 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52616/">CVE-2023-52616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52616">CVE-2023-52616 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52620/">CVE-2023-52620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52620">CVE-2023-52620 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52627/">CVE-2023-52627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52627">CVE-2023-52627 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52635/">CVE-2023-52635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52635">CVE-2023-52635 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52636/">CVE-2023-52636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52636">CVE-2023-52636 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52645/">CVE-2023-52645 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52645">CVE-2023-52645 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52652/">CVE-2023-52652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52652">CVE-2023-52652 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6270/">CVE-2023-6270 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0639/">CVE-2024-0639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0639">CVE-2024-0639 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0841/">CVE-2024-0841 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0841">CVE-2024-0841 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22099/">CVE-2024-22099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22099">CVE-2024-22099 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23307/">CVE-2024-23307 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23307">CVE-2024-23307 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-23848/">CVE-2024-23848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23848">CVE-2024-23848 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23850/">CVE-2024-23850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23850">CVE-2024-23850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26601/">CVE-2024-26601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26601">CVE-2024-26601 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26610/">CVE-2024-26610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26610">CVE-2024-26610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26656/">CVE-2024-26656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26656">CVE-2024-26656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26660/">CVE-2024-26660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26660">CVE-2024-26660 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26671/">CVE-2024-26671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26671">CVE-2024-26671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26673/">CVE-2024-26673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26673">CVE-2024-26673 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26675/">CVE-2024-26675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26675">CVE-2024-26675 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26680/">CVE-2024-26680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26680">CVE-2024-26680 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26681/">CVE-2024-26681 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26681">CVE-2024-26681 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26684/">CVE-2024-26684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26684">CVE-2024-26684 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26685/">CVE-2024-26685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26685">CVE-2024-26685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26687/">CVE-2024-26687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26687">CVE-2024-26687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26688/">CVE-2024-26688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26688">CVE-2024-26688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26689/">CVE-2024-26689 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26689">CVE-2024-26689 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26696/">CVE-2024-26696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26696">CVE-2024-26696 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26697/">CVE-2024-26697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26697">CVE-2024-26697 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26702/">CVE-2024-26702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26702">CVE-2024-26702 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26704/">CVE-2024-26704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26704">CVE-2024-26704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26718/">CVE-2024-26718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26718">CVE-2024-26718 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26722/">CVE-2024-26722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26722">CVE-2024-26722 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26727/">CVE-2024-26727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26727">CVE-2024-26727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26733/">CVE-2024-26733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26733">CVE-2024-26733 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26736/">CVE-2024-26736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26736">CVE-2024-26736 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26737/">CVE-2024-26737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26737">CVE-2024-26737 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26739/">CVE-2024-26739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26739">CVE-2024-26739 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26743/">CVE-2024-26743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26743">CVE-2024-26743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26744/">CVE-2024-26744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26744">CVE-2024-26744 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26745/">CVE-2024-26745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26745">CVE-2024-26745 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26747/">CVE-2024-26747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26747">CVE-2024-26747 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26749/">CVE-2024-26749 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26749">CVE-2024-26749 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26751/">CVE-2024-26751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26751">CVE-2024-26751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26754/">CVE-2024-26754 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26754">CVE-2024-26754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26760/">CVE-2024-26760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26760">CVE-2024-26760 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-26763/">CVE-2024-26763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26763">CVE-2024-26763 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26764/">CVE-2024-26764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26764">CVE-2024-26764 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26766/">CVE-2024-26766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26766">CVE-2024-26766 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26769/">CVE-2024-26769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26769">CVE-2024-26769 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26771/">CVE-2024-26771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26771">CVE-2024-26771 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26772/">CVE-2024-26772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26772">CVE-2024-26772 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26773/">CVE-2024-26773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26773">CVE-2024-26773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26776/">CVE-2024-26776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26776">CVE-2024-26776 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26779/">CVE-2024-26779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26779">CVE-2024-26779 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26783/">CVE-2024-26783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26783">CVE-2024-26783 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26787/">CVE-2024-26787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26787">CVE-2024-26787 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26790/">CVE-2024-26790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26790">CVE-2024-26790 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26792/">CVE-2024-26792 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26792">CVE-2024-26792 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26793/">CVE-2024-26793 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26793">CVE-2024-26793 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26798/">CVE-2024-26798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26798">CVE-2024-26798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26805/">CVE-2024-26805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26805">CVE-2024-26805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26807/">CVE-2024-26807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26807">CVE-2024-26807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26816/">CVE-2024-26816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26816">CVE-2024-26816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26817/">CVE-2024-26817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26817">CVE-2024-26817 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26820/">CVE-2024-26820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26820">CVE-2024-26820 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26825/">CVE-2024-26825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26825">CVE-2024-26825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26830/">CVE-2024-26830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26830">CVE-2024-26830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26833/">CVE-2024-26833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26833">CVE-2024-26833 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26836/">CVE-2024-26836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26836">CVE-2024-26836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26843/">CVE-2024-26843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26843">CVE-2024-26843 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26848/">CVE-2024-26848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26848">CVE-2024-26848 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26852/">CVE-2024-26852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26852">CVE-2024-26852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26853/">CVE-2024-26853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26853">CVE-2024-26853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26855/">CVE-2024-26855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26855">CVE-2024-26855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26856/">CVE-2024-26856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26856">CVE-2024-26856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26857/">CVE-2024-26857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26857">CVE-2024-26857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26861/">CVE-2024-26861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26861">CVE-2024-26861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26862/">CVE-2024-26862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26862">CVE-2024-26862 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26866/">CVE-2024-26866 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26866">CVE-2024-26866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26872/">CVE-2024-26872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26872">CVE-2024-26872 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26875/">CVE-2024-26875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26875">CVE-2024-26875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26878/">CVE-2024-26878 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26878">CVE-2024-26878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26879/">CVE-2024-26879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26879">CVE-2024-26879 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26881/">CVE-2024-26881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26881">CVE-2024-26881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26882/">CVE-2024-26882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26882">CVE-2024-26882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26883/">CVE-2024-26883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26883">CVE-2024-26883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26884/">CVE-2024-26884 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26884">CVE-2024-26884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26885/">CVE-2024-26885 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26885">CVE-2024-26885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26891/">CVE-2024-26891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26891">CVE-2024-26891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26893/">CVE-2024-26893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26893">CVE-2024-26893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26895/">CVE-2024-26895 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26895">CVE-2024-26895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26896/">CVE-2024-26896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26896">CVE-2024-26896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26897/">CVE-2024-26897 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26897">CVE-2024-26897 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26898/">CVE-2024-26898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26898">CVE-2024-26898 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26901/">CVE-2024-26901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26901">CVE-2024-26901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26903/">CVE-2024-26903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26903">CVE-2024-26903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26917/">CVE-2024-26917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26917">CVE-2024-26917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26927/">CVE-2024-26927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26927">CVE-2024-26927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26948/">CVE-2024-26948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26948">CVE-2024-26948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26950/">CVE-2024-26950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26950">CVE-2024-26950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26951/">CVE-2024-26951 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26951">CVE-2024-26951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26955/">CVE-2024-26955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26955">CVE-2024-26955 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26956/">CVE-2024-26956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26956">CVE-2024-26956 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26960/">CVE-2024-26960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26960">CVE-2024-26960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26965/">CVE-2024-26965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26965">CVE-2024-26965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26966/">CVE-2024-26966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26966">CVE-2024-26966 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26969/">CVE-2024-26969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26969">CVE-2024-26969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26970/">CVE-2024-26970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26970">CVE-2024-26970 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26972/">CVE-2024-26972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26972">CVE-2024-26972 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26981/">CVE-2024-26981 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26981">CVE-2024-26981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26982/">CVE-2024-26982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26982">CVE-2024-26982 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26993/">CVE-2024-26993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26993">CVE-2024-26993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27013/">CVE-2024-27013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27013">CVE-2024-27013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27014/">CVE-2024-27014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27014">CVE-2024-27014 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27030/">CVE-2024-27030 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27030">CVE-2024-27030 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27038/">CVE-2024-27038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27038">CVE-2024-27038 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27039/">CVE-2024-27039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27039">CVE-2024-27039 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27041/">CVE-2024-27041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27041">CVE-2024-27041 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27043/">CVE-2024-27043 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27043">CVE-2024-27043 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27046/">CVE-2024-27046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27046">CVE-2024-27046 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27056/">CVE-2024-27056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27056">CVE-2024-27056 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27062/">CVE-2024-27062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27062">CVE-2024-27062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27389/">CVE-2024-27389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27389">CVE-2024-27389 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861122" comment="cluster-md-kmp-64kb-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861123" comment="cluster-md-kmp-default-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861124" comment="dlm-kmp-64kb-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861125" comment="dlm-kmp-default-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861126" comment="dtb-allwinner-5.14.21-150500.55.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861127" comment="dtb-altera-5.14.21-150500.55.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861128" comment="dtb-amazon-5.14.21-150500.55.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861129" comment="dtb-amd-5.14.21-150500.55.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861130" comment="dtb-amlogic-5.14.21-150500.55.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861131" comment="dtb-apm-5.14.21-150500.55.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861132" comment="dtb-apple-5.14.21-150500.55.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861133" comment="dtb-arm-5.14.21-150500.55.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861134" comment="dtb-broadcom-5.14.21-150500.55.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861135" comment="dtb-cavium-5.14.21-150500.55.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861136" comment="dtb-exynos-5.14.21-150500.55.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861137" comment="dtb-freescale-5.14.21-150500.55.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861138" comment="dtb-hisilicon-5.14.21-150500.55.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861139" comment="dtb-lg-5.14.21-150500.55.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861140" comment="dtb-marvell-5.14.21-150500.55.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861141" comment="dtb-mediatek-5.14.21-150500.55.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861142" comment="dtb-nvidia-5.14.21-150500.55.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861143" comment="dtb-qcom-5.14.21-150500.55.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861144" comment="dtb-renesas-5.14.21-150500.55.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861145" comment="dtb-rockchip-5.14.21-150500.55.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861146" comment="dtb-socionext-5.14.21-150500.55.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861147" comment="dtb-sprd-5.14.21-150500.55.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861148" comment="dtb-xilinx-5.14.21-150500.55.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861149" comment="gfs2-kmp-64kb-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861150" comment="gfs2-kmp-default-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861151" comment="kernel-64kb-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861152" comment="kernel-64kb-devel-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861153" comment="kernel-64kb-extra-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861154" comment="kernel-64kb-livepatch-devel-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861155" comment="kernel-64kb-optional-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861156" comment="kernel-debug-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861157" comment="kernel-debug-devel-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861158" comment="kernel-debug-livepatch-devel-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861159" comment="kernel-debug-vdso-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861160" comment="kernel-default-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861161" comment="kernel-default-base-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861162" comment="kernel-default-base-rebuild-5.14.21-150500.55.62.2.150500.6.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861163" comment="kernel-default-devel-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861164" comment="kernel-default-extra-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861165" comment="kernel-default-livepatch-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861166" comment="kernel-default-livepatch-devel-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861167" comment="kernel-default-optional-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861168" comment="kernel-default-vdso-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861169" comment="kernel-devel-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861170" comment="kernel-docs-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861171" comment="kernel-docs-html-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861172" comment="kernel-kvmsmall-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861173" comment="kernel-kvmsmall-devel-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861174" comment="kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861175" comment="kernel-kvmsmall-vdso-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861176" comment="kernel-macros-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861177" comment="kernel-obs-build-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861178" comment="kernel-obs-qa-5.14.21-150500.55.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861179" comment="kernel-source-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861180" comment="kernel-source-vanilla-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861181" comment="kernel-syms-5.14.21-150500.55.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861182" comment="kernel-zfcpdump-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861183" comment="kselftests-kmp-64kb-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861184" comment="kselftests-kmp-default-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861185" comment="ocfs2-kmp-64kb-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861186" comment="ocfs2-kmp-default-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861187" comment="reiserfs-kmp-64kb-5.14.21-150500.55.62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861188" comment="reiserfs-kmp-default-5.14.21-150500.55.62.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4722" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1141539" ref_url="https://bugzilla.suse.com/1141539" source="BUGZILLA"/>
		<reference ref_id="1177529" ref_url="https://bugzilla.suse.com/1177529" source="BUGZILLA"/>
		<reference ref_id="1190576" ref_url="https://bugzilla.suse.com/1190576" source="BUGZILLA"/>
		<reference ref_id="1192145" ref_url="https://bugzilla.suse.com/1192145" source="BUGZILLA"/>
		<reference ref_id="1192837" ref_url="https://bugzilla.suse.com/1192837" source="BUGZILLA"/>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1196869" ref_url="https://bugzilla.suse.com/1196869" source="BUGZILLA"/>
		<reference ref_id="1200313" ref_url="https://bugzilla.suse.com/1200313" source="BUGZILLA"/>
		<reference ref_id="1201308" ref_url="https://bugzilla.suse.com/1201308" source="BUGZILLA"/>
		<reference ref_id="1201489" ref_url="https://bugzilla.suse.com/1201489" source="BUGZILLA"/>
		<reference ref_id="1203906" ref_url="https://bugzilla.suse.com/1203906" source="BUGZILLA"/>
		<reference ref_id="1203935" ref_url="https://bugzilla.suse.com/1203935" source="BUGZILLA"/>
		<reference ref_id="1204614" ref_url="https://bugzilla.suse.com/1204614" source="BUGZILLA"/>
		<reference ref_id="1207361" ref_url="https://bugzilla.suse.com/1207361" source="BUGZILLA"/>
		<reference ref_id="1211592" ref_url="https://bugzilla.suse.com/1211592" source="BUGZILLA"/>
		<reference ref_id="1213573" ref_url="https://bugzilla.suse.com/1213573" source="BUGZILLA"/>
		<reference ref_id="1217408" ref_url="https://bugzilla.suse.com/1217408" source="BUGZILLA"/>
		<reference ref_id="1218562" ref_url="https://bugzilla.suse.com/1218562" source="BUGZILLA"/>
		<reference ref_id="1218917" ref_url="https://bugzilla.suse.com/1218917" source="BUGZILLA"/>
		<reference ref_id="1219104" ref_url="https://bugzilla.suse.com/1219104" source="BUGZILLA"/>
		<reference ref_id="1219126" ref_url="https://bugzilla.suse.com/1219126" source="BUGZILLA"/>
		<reference ref_id="1219141" ref_url="https://bugzilla.suse.com/1219141" source="BUGZILLA"/>
		<reference ref_id="1219169" ref_url="https://bugzilla.suse.com/1219169" source="BUGZILLA"/>
		<reference ref_id="1219170" ref_url="https://bugzilla.suse.com/1219170" source="BUGZILLA"/>
		<reference ref_id="1219264" ref_url="https://bugzilla.suse.com/1219264" source="BUGZILLA"/>
		<reference ref_id="1220342" ref_url="https://bugzilla.suse.com/1220342" source="BUGZILLA"/>
		<reference ref_id="1220492" ref_url="https://bugzilla.suse.com/1220492" source="BUGZILLA"/>
		<reference ref_id="1220569" ref_url="https://bugzilla.suse.com/1220569" source="BUGZILLA"/>
		<reference ref_id="1220761" ref_url="https://bugzilla.suse.com/1220761" source="BUGZILLA"/>
		<reference ref_id="1220901" ref_url="https://bugzilla.suse.com/1220901" source="BUGZILLA"/>
		<reference ref_id="1220915" ref_url="https://bugzilla.suse.com/1220915" source="BUGZILLA"/>
		<reference ref_id="1220935" ref_url="https://bugzilla.suse.com/1220935" source="BUGZILLA"/>
		<reference ref_id="1221042" ref_url="https://bugzilla.suse.com/1221042" source="BUGZILLA"/>
		<reference ref_id="1221044" ref_url="https://bugzilla.suse.com/1221044" source="BUGZILLA"/>
		<reference ref_id="1221080" ref_url="https://bugzilla.suse.com/1221080" source="BUGZILLA"/>
		<reference ref_id="1221084" ref_url="https://bugzilla.suse.com/1221084" source="BUGZILLA"/>
		<reference ref_id="1221088" ref_url="https://bugzilla.suse.com/1221088" source="BUGZILLA"/>
		<reference ref_id="1221162" ref_url="https://bugzilla.suse.com/1221162" source="BUGZILLA"/>
		<reference ref_id="1221299" ref_url="https://bugzilla.suse.com/1221299" source="BUGZILLA"/>
		<reference ref_id="1221612" ref_url="https://bugzilla.suse.com/1221612" source="BUGZILLA"/>
		<reference ref_id="1221617" ref_url="https://bugzilla.suse.com/1221617" source="BUGZILLA"/>
		<reference ref_id="1221645" ref_url="https://bugzilla.suse.com/1221645" source="BUGZILLA"/>
		<reference ref_id="1221791" ref_url="https://bugzilla.suse.com/1221791" source="BUGZILLA"/>
		<reference ref_id="1221825" ref_url="https://bugzilla.suse.com/1221825" source="BUGZILLA"/>
		<reference ref_id="1222011" ref_url="https://bugzilla.suse.com/1222011" source="BUGZILLA"/>
		<reference ref_id="1222051" ref_url="https://bugzilla.suse.com/1222051" source="BUGZILLA"/>
		<reference ref_id="1222247" ref_url="https://bugzilla.suse.com/1222247" source="BUGZILLA"/>
		<reference ref_id="1222266" ref_url="https://bugzilla.suse.com/1222266" source="BUGZILLA"/>
		<reference ref_id="1222294" ref_url="https://bugzilla.suse.com/1222294" source="BUGZILLA"/>
		<reference ref_id="1222307" ref_url="https://bugzilla.suse.com/1222307" source="BUGZILLA"/>
		<reference ref_id="1222357" ref_url="https://bugzilla.suse.com/1222357" source="BUGZILLA"/>
		<reference ref_id="1222368" ref_url="https://bugzilla.suse.com/1222368" source="BUGZILLA"/>
		<reference ref_id="1222379" ref_url="https://bugzilla.suse.com/1222379" source="BUGZILLA"/>
		<reference ref_id="1222416" ref_url="https://bugzilla.suse.com/1222416" source="BUGZILLA"/>
		<reference ref_id="1222422" ref_url="https://bugzilla.suse.com/1222422" source="BUGZILLA"/>
		<reference ref_id="1222424" ref_url="https://bugzilla.suse.com/1222424" source="BUGZILLA"/>
		<reference ref_id="1222427" ref_url="https://bugzilla.suse.com/1222427" source="BUGZILLA"/>
		<reference ref_id="1222428" ref_url="https://bugzilla.suse.com/1222428" source="BUGZILLA"/>
		<reference ref_id="1222430" ref_url="https://bugzilla.suse.com/1222430" source="BUGZILLA"/>
		<reference ref_id="1222431" ref_url="https://bugzilla.suse.com/1222431" source="BUGZILLA"/>
		<reference ref_id="1222435" ref_url="https://bugzilla.suse.com/1222435" source="BUGZILLA"/>
		<reference ref_id="1222437" ref_url="https://bugzilla.suse.com/1222437" source="BUGZILLA"/>
		<reference ref_id="1222445" ref_url="https://bugzilla.suse.com/1222445" source="BUGZILLA"/>
		<reference ref_id="1222449" ref_url="https://bugzilla.suse.com/1222449" source="BUGZILLA"/>
		<reference ref_id="1222482" ref_url="https://bugzilla.suse.com/1222482" source="BUGZILLA"/>
		<reference ref_id="1222503" ref_url="https://bugzilla.suse.com/1222503" source="BUGZILLA"/>
		<reference ref_id="1222520" ref_url="https://bugzilla.suse.com/1222520" source="BUGZILLA"/>
		<reference ref_id="1222536" ref_url="https://bugzilla.suse.com/1222536" source="BUGZILLA"/>
		<reference ref_id="1222549" ref_url="https://bugzilla.suse.com/1222549" source="BUGZILLA"/>
		<reference ref_id="1222550" ref_url="https://bugzilla.suse.com/1222550" source="BUGZILLA"/>
		<reference ref_id="1222557" ref_url="https://bugzilla.suse.com/1222557" source="BUGZILLA"/>
		<reference ref_id="1222559" ref_url="https://bugzilla.suse.com/1222559" source="BUGZILLA"/>
		<reference ref_id="1222585" ref_url="https://bugzilla.suse.com/1222585" source="BUGZILLA"/>
		<reference ref_id="1222586" ref_url="https://bugzilla.suse.com/1222586" source="BUGZILLA"/>
		<reference ref_id="1222596" ref_url="https://bugzilla.suse.com/1222596" source="BUGZILLA"/>
		<reference ref_id="1222609" ref_url="https://bugzilla.suse.com/1222609" source="BUGZILLA"/>
		<reference ref_id="1222610" ref_url="https://bugzilla.suse.com/1222610" source="BUGZILLA"/>
		<reference ref_id="1222613" ref_url="https://bugzilla.suse.com/1222613" source="BUGZILLA"/>
		<reference ref_id="1222615" ref_url="https://bugzilla.suse.com/1222615" source="BUGZILLA"/>
		<reference ref_id="1222618" ref_url="https://bugzilla.suse.com/1222618" source="BUGZILLA"/>
		<reference ref_id="1222624" ref_url="https://bugzilla.suse.com/1222624" source="BUGZILLA"/>
		<reference ref_id="1222630" ref_url="https://bugzilla.suse.com/1222630" source="BUGZILLA"/>
		<reference ref_id="1222632" ref_url="https://bugzilla.suse.com/1222632" source="BUGZILLA"/>
		<reference ref_id="1222660" ref_url="https://bugzilla.suse.com/1222660" source="BUGZILLA"/>
		<reference ref_id="1222662" ref_url="https://bugzilla.suse.com/1222662" source="BUGZILLA"/>
		<reference ref_id="1222664" ref_url="https://bugzilla.suse.com/1222664" source="BUGZILLA"/>
		<reference ref_id="1222666" ref_url="https://bugzilla.suse.com/1222666" source="BUGZILLA"/>
		<reference ref_id="1222669" ref_url="https://bugzilla.suse.com/1222669" source="BUGZILLA"/>
		<reference ref_id="1222671" ref_url="https://bugzilla.suse.com/1222671" source="BUGZILLA"/>
		<reference ref_id="1222677" ref_url="https://bugzilla.suse.com/1222677" source="BUGZILLA"/>
		<reference ref_id="1222678" ref_url="https://bugzilla.suse.com/1222678" source="BUGZILLA"/>
		<reference ref_id="1222680" ref_url="https://bugzilla.suse.com/1222680" source="BUGZILLA"/>
		<reference ref_id="1222703" ref_url="https://bugzilla.suse.com/1222703" source="BUGZILLA"/>
		<reference ref_id="1222704" ref_url="https://bugzilla.suse.com/1222704" source="BUGZILLA"/>
		<reference ref_id="1222706" ref_url="https://bugzilla.suse.com/1222706" source="BUGZILLA"/>
		<reference ref_id="1222709" ref_url="https://bugzilla.suse.com/1222709" source="BUGZILLA"/>
		<reference ref_id="1222710" ref_url="https://bugzilla.suse.com/1222710" source="BUGZILLA"/>
		<reference ref_id="1222720" ref_url="https://bugzilla.suse.com/1222720" source="BUGZILLA"/>
		<reference ref_id="1222721" ref_url="https://bugzilla.suse.com/1222721" source="BUGZILLA"/>
		<reference ref_id="1222724" ref_url="https://bugzilla.suse.com/1222724" source="BUGZILLA"/>
		<reference ref_id="1222726" ref_url="https://bugzilla.suse.com/1222726" source="BUGZILLA"/>
		<reference ref_id="1222727" ref_url="https://bugzilla.suse.com/1222727" source="BUGZILLA"/>
		<reference ref_id="1222764" ref_url="https://bugzilla.suse.com/1222764" source="BUGZILLA"/>
		<reference ref_id="1222772" ref_url="https://bugzilla.suse.com/1222772" source="BUGZILLA"/>
		<reference ref_id="1222773" ref_url="https://bugzilla.suse.com/1222773" source="BUGZILLA"/>
		<reference ref_id="1222776" ref_url="https://bugzilla.suse.com/1222776" source="BUGZILLA"/>
		<reference ref_id="1222781" ref_url="https://bugzilla.suse.com/1222781" source="BUGZILLA"/>
		<reference ref_id="1222784" ref_url="https://bugzilla.suse.com/1222784" source="BUGZILLA"/>
		<reference ref_id="1222785" ref_url="https://bugzilla.suse.com/1222785" source="BUGZILLA"/>
		<reference ref_id="1222787" ref_url="https://bugzilla.suse.com/1222787" source="BUGZILLA"/>
		<reference ref_id="1222790" ref_url="https://bugzilla.suse.com/1222790" source="BUGZILLA"/>
		<reference ref_id="1222791" ref_url="https://bugzilla.suse.com/1222791" source="BUGZILLA"/>
		<reference ref_id="1222792" ref_url="https://bugzilla.suse.com/1222792" source="BUGZILLA"/>
		<reference ref_id="1222796" ref_url="https://bugzilla.suse.com/1222796" source="BUGZILLA"/>
		<reference ref_id="1222798" ref_url="https://bugzilla.suse.com/1222798" source="BUGZILLA"/>
		<reference ref_id="1222801" ref_url="https://bugzilla.suse.com/1222801" source="BUGZILLA"/>
		<reference ref_id="1222812" ref_url="https://bugzilla.suse.com/1222812" source="BUGZILLA"/>
		<reference ref_id="1222824" ref_url="https://bugzilla.suse.com/1222824" source="BUGZILLA"/>
		<reference ref_id="1222829" ref_url="https://bugzilla.suse.com/1222829" source="BUGZILLA"/>
		<reference ref_id="1222832" ref_url="https://bugzilla.suse.com/1222832" source="BUGZILLA"/>
		<reference ref_id="1222836" ref_url="https://bugzilla.suse.com/1222836" source="BUGZILLA"/>
		<reference ref_id="1222838" ref_url="https://bugzilla.suse.com/1222838" source="BUGZILLA"/>
		<reference ref_id="1222866" ref_url="https://bugzilla.suse.com/1222866" source="BUGZILLA"/>
		<reference ref_id="1222867" ref_url="https://bugzilla.suse.com/1222867" source="BUGZILLA"/>
		<reference ref_id="1222869" ref_url="https://bugzilla.suse.com/1222869" source="BUGZILLA"/>
		<reference ref_id="1222876" ref_url="https://bugzilla.suse.com/1222876" source="BUGZILLA"/>
		<reference ref_id="1222878" ref_url="https://bugzilla.suse.com/1222878" source="BUGZILLA"/>
		<reference ref_id="1222879" ref_url="https://bugzilla.suse.com/1222879" source="BUGZILLA"/>
		<reference ref_id="1222881" ref_url="https://bugzilla.suse.com/1222881" source="BUGZILLA"/>
		<reference ref_id="1222883" ref_url="https://bugzilla.suse.com/1222883" source="BUGZILLA"/>
		<reference ref_id="1222888" ref_url="https://bugzilla.suse.com/1222888" source="BUGZILLA"/>
		<reference ref_id="1222894" ref_url="https://bugzilla.suse.com/1222894" source="BUGZILLA"/>
		<reference ref_id="1222901" ref_url="https://bugzilla.suse.com/1222901" source="BUGZILLA"/>
		<reference ref_id="1222968" ref_url="https://bugzilla.suse.com/1222968" source="BUGZILLA"/>
		<reference ref_id="1223012" ref_url="https://bugzilla.suse.com/1223012" source="BUGZILLA"/>
		<reference ref_id="1223014" ref_url="https://bugzilla.suse.com/1223014" source="BUGZILLA"/>
		<reference ref_id="1223016" ref_url="https://bugzilla.suse.com/1223016" source="BUGZILLA"/>
		<reference ref_id="1223024" ref_url="https://bugzilla.suse.com/1223024" source="BUGZILLA"/>
		<reference ref_id="1223030" ref_url="https://bugzilla.suse.com/1223030" source="BUGZILLA"/>
		<reference ref_id="1223033" ref_url="https://bugzilla.suse.com/1223033" source="BUGZILLA"/>
		<reference ref_id="1223034" ref_url="https://bugzilla.suse.com/1223034" source="BUGZILLA"/>
		<reference ref_id="1223035" ref_url="https://bugzilla.suse.com/1223035" source="BUGZILLA"/>
		<reference ref_id="1223036" ref_url="https://bugzilla.suse.com/1223036" source="BUGZILLA"/>
		<reference ref_id="1223037" ref_url="https://bugzilla.suse.com/1223037" source="BUGZILLA"/>
		<reference ref_id="1223041" ref_url="https://bugzilla.suse.com/1223041" source="BUGZILLA"/>
		<reference ref_id="1223042" ref_url="https://bugzilla.suse.com/1223042" source="BUGZILLA"/>
		<reference ref_id="1223051" ref_url="https://bugzilla.suse.com/1223051" source="BUGZILLA"/>
		<reference ref_id="1223052" ref_url="https://bugzilla.suse.com/1223052" source="BUGZILLA"/>
		<reference ref_id="1223056" ref_url="https://bugzilla.suse.com/1223056" source="BUGZILLA"/>
		<reference ref_id="1223057" ref_url="https://bugzilla.suse.com/1223057" source="BUGZILLA"/>
		<reference ref_id="1223058" ref_url="https://bugzilla.suse.com/1223058" source="BUGZILLA"/>
		<reference ref_id="1223060" ref_url="https://bugzilla.suse.com/1223060" source="BUGZILLA"/>
		<reference ref_id="1223061" ref_url="https://bugzilla.suse.com/1223061" source="BUGZILLA"/>
		<reference ref_id="1223065" ref_url="https://bugzilla.suse.com/1223065" source="BUGZILLA"/>
		<reference ref_id="1223066" ref_url="https://bugzilla.suse.com/1223066" source="BUGZILLA"/>
		<reference ref_id="1223067" ref_url="https://bugzilla.suse.com/1223067" source="BUGZILLA"/>
		<reference ref_id="1223068" ref_url="https://bugzilla.suse.com/1223068" source="BUGZILLA"/>
		<reference ref_id="1223076" ref_url="https://bugzilla.suse.com/1223076" source="BUGZILLA"/>
		<reference ref_id="1223078" ref_url="https://bugzilla.suse.com/1223078" source="BUGZILLA"/>
		<reference ref_id="1223111" ref_url="https://bugzilla.suse.com/1223111" source="BUGZILLA"/>
		<reference ref_id="1223115" ref_url="https://bugzilla.suse.com/1223115" source="BUGZILLA"/>
		<reference ref_id="1223118" ref_url="https://bugzilla.suse.com/1223118" source="BUGZILLA"/>
		<reference ref_id="1223187" ref_url="https://bugzilla.suse.com/1223187" source="BUGZILLA"/>
		<reference ref_id="1223189" ref_url="https://bugzilla.suse.com/1223189" source="BUGZILLA"/>
		<reference ref_id="1223190" ref_url="https://bugzilla.suse.com/1223190" source="BUGZILLA"/>
		<reference ref_id="1223191" ref_url="https://bugzilla.suse.com/1223191" source="BUGZILLA"/>
		<reference ref_id="1223196" ref_url="https://bugzilla.suse.com/1223196" source="BUGZILLA"/>
		<reference ref_id="1223197" ref_url="https://bugzilla.suse.com/1223197" source="BUGZILLA"/>
		<reference ref_id="1223198" ref_url="https://bugzilla.suse.com/1223198" source="BUGZILLA"/>
		<reference ref_id="1223275" ref_url="https://bugzilla.suse.com/1223275" source="BUGZILLA"/>
		<reference ref_id="1223323" ref_url="https://bugzilla.suse.com/1223323" source="BUGZILLA"/>
		<reference ref_id="1223369" ref_url="https://bugzilla.suse.com/1223369" source="BUGZILLA"/>
		<reference ref_id="1223380" ref_url="https://bugzilla.suse.com/1223380" source="BUGZILLA"/>
		<reference ref_id="1223473" ref_url="https://bugzilla.suse.com/1223473" source="BUGZILLA"/>
		<reference ref_id="1223474" ref_url="https://bugzilla.suse.com/1223474" source="BUGZILLA"/>
		<reference ref_id="1223475" ref_url="https://bugzilla.suse.com/1223475" source="BUGZILLA"/>
		<reference ref_id="1223477" ref_url="https://bugzilla.suse.com/1223477" source="BUGZILLA"/>
		<reference ref_id="1223478" ref_url="https://bugzilla.suse.com/1223478" source="BUGZILLA"/>
		<reference ref_id="1223479" ref_url="https://bugzilla.suse.com/1223479" source="BUGZILLA"/>
		<reference ref_id="1223481" ref_url="https://bugzilla.suse.com/1223481" source="BUGZILLA"/>
		<reference ref_id="1223482" ref_url="https://bugzilla.suse.com/1223482" source="BUGZILLA"/>
		<reference ref_id="1223484" ref_url="https://bugzilla.suse.com/1223484" source="BUGZILLA"/>
		<reference ref_id="1223487" ref_url="https://bugzilla.suse.com/1223487" source="BUGZILLA"/>
		<reference ref_id="1223490" ref_url="https://bugzilla.suse.com/1223490" source="BUGZILLA"/>
		<reference ref_id="1223496" ref_url="https://bugzilla.suse.com/1223496" source="BUGZILLA"/>
		<reference ref_id="1223498" ref_url="https://bugzilla.suse.com/1223498" source="BUGZILLA"/>
		<reference ref_id="1223499" ref_url="https://bugzilla.suse.com/1223499" source="BUGZILLA"/>
		<reference ref_id="1223501" ref_url="https://bugzilla.suse.com/1223501" source="BUGZILLA"/>
		<reference ref_id="1223502" ref_url="https://bugzilla.suse.com/1223502" source="BUGZILLA"/>
		<reference ref_id="1223503" ref_url="https://bugzilla.suse.com/1223503" source="BUGZILLA"/>
		<reference ref_id="1223505" ref_url="https://bugzilla.suse.com/1223505" source="BUGZILLA"/>
		<reference ref_id="1223509" ref_url="https://bugzilla.suse.com/1223509" source="BUGZILLA"/>
		<reference ref_id="1223511" ref_url="https://bugzilla.suse.com/1223511" source="BUGZILLA"/>
		<reference ref_id="1223512" ref_url="https://bugzilla.suse.com/1223512" source="BUGZILLA"/>
		<reference ref_id="1223513" ref_url="https://bugzilla.suse.com/1223513" source="BUGZILLA"/>
		<reference ref_id="1223516" ref_url="https://bugzilla.suse.com/1223516" source="BUGZILLA"/>
		<reference ref_id="1223517" ref_url="https://bugzilla.suse.com/1223517" source="BUGZILLA"/>
		<reference ref_id="1223518" ref_url="https://bugzilla.suse.com/1223518" source="BUGZILLA"/>
		<reference ref_id="1223519" ref_url="https://bugzilla.suse.com/1223519" source="BUGZILLA"/>
		<reference ref_id="1223520" ref_url="https://bugzilla.suse.com/1223520" source="BUGZILLA"/>
		<reference ref_id="1223522" ref_url="https://bugzilla.suse.com/1223522" source="BUGZILLA"/>
		<reference ref_id="1223523" ref_url="https://bugzilla.suse.com/1223523" source="BUGZILLA"/>
		<reference ref_id="1223525" ref_url="https://bugzilla.suse.com/1223525" source="BUGZILLA"/>
		<reference ref_id="1223536" ref_url="https://bugzilla.suse.com/1223536" source="BUGZILLA"/>
		<reference ref_id="1223539" ref_url="https://bugzilla.suse.com/1223539" source="BUGZILLA"/>
		<reference ref_id="1223574" ref_url="https://bugzilla.suse.com/1223574" source="BUGZILLA"/>
		<reference ref_id="1223595" ref_url="https://bugzilla.suse.com/1223595" source="BUGZILLA"/>
		<reference ref_id="1223598" ref_url="https://bugzilla.suse.com/1223598" source="BUGZILLA"/>
		<reference ref_id="1223634" ref_url="https://bugzilla.suse.com/1223634" source="BUGZILLA"/>
		<reference ref_id="1223640" ref_url="https://bugzilla.suse.com/1223640" source="BUGZILLA"/>
		<reference ref_id="1223643" ref_url="https://bugzilla.suse.com/1223643" source="BUGZILLA"/>
		<reference ref_id="1223644" ref_url="https://bugzilla.suse.com/1223644" source="BUGZILLA"/>
		<reference ref_id="1223645" ref_url="https://bugzilla.suse.com/1223645" source="BUGZILLA"/>
		<reference ref_id="1223646" ref_url="https://bugzilla.suse.com/1223646" source="BUGZILLA"/>
		<reference ref_id="1223648" ref_url="https://bugzilla.suse.com/1223648" source="BUGZILLA"/>
		<reference ref_id="1223655" ref_url="https://bugzilla.suse.com/1223655" source="BUGZILLA"/>
		<reference ref_id="1223657" ref_url="https://bugzilla.suse.com/1223657" source="BUGZILLA"/>
		<reference ref_id="1223660" ref_url="https://bugzilla.suse.com/1223660" source="BUGZILLA"/>
		<reference ref_id="1223661" ref_url="https://bugzilla.suse.com/1223661" source="BUGZILLA"/>
		<reference ref_id="1223663" ref_url="https://bugzilla.suse.com/1223663" source="BUGZILLA"/>
		<reference ref_id="1223664" ref_url="https://bugzilla.suse.com/1223664" source="BUGZILLA"/>
		<reference ref_id="1223668" ref_url="https://bugzilla.suse.com/1223668" source="BUGZILLA"/>
		<reference ref_id="1223686" ref_url="https://bugzilla.suse.com/1223686" source="BUGZILLA"/>
		<reference ref_id="1223693" ref_url="https://bugzilla.suse.com/1223693" source="BUGZILLA"/>
		<reference ref_id="1223705" ref_url="https://bugzilla.suse.com/1223705" source="BUGZILLA"/>
		<reference ref_id="1223714" ref_url="https://bugzilla.suse.com/1223714" source="BUGZILLA"/>
		<reference ref_id="1223735" ref_url="https://bugzilla.suse.com/1223735" source="BUGZILLA"/>
		<reference ref_id="1223745" ref_url="https://bugzilla.suse.com/1223745" source="BUGZILLA"/>
		<reference ref_id="1223784" ref_url="https://bugzilla.suse.com/1223784" source="BUGZILLA"/>
		<reference ref_id="1223785" ref_url="https://bugzilla.suse.com/1223785" source="BUGZILLA"/>
		<reference ref_id="1223790" ref_url="https://bugzilla.suse.com/1223790" source="BUGZILLA"/>
		<reference ref_id="1223816" ref_url="https://bugzilla.suse.com/1223816" source="BUGZILLA"/>
		<reference ref_id="1223821" ref_url="https://bugzilla.suse.com/1223821" source="BUGZILLA"/>
		<reference ref_id="1223822" ref_url="https://bugzilla.suse.com/1223822" source="BUGZILLA"/>
		<reference ref_id="1223824" ref_url="https://bugzilla.suse.com/1223824" source="BUGZILLA"/>
		<reference ref_id="1223827" ref_url="https://bugzilla.suse.com/1223827" source="BUGZILLA"/>
		<reference ref_id="1223834" ref_url="https://bugzilla.suse.com/1223834" source="BUGZILLA"/>
		<reference ref_id="1223875" ref_url="https://bugzilla.suse.com/1223875" source="BUGZILLA"/>
		<reference ref_id="1223876" ref_url="https://bugzilla.suse.com/1223876" source="BUGZILLA"/>
		<reference ref_id="1223877" ref_url="https://bugzilla.suse.com/1223877" source="BUGZILLA"/>
		<reference ref_id="1223878" ref_url="https://bugzilla.suse.com/1223878" source="BUGZILLA"/>
		<reference ref_id="1223879" ref_url="https://bugzilla.suse.com/1223879" source="BUGZILLA"/>
		<reference ref_id="1223894" ref_url="https://bugzilla.suse.com/1223894" source="BUGZILLA"/>
		<reference ref_id="1223921" ref_url="https://bugzilla.suse.com/1223921" source="BUGZILLA"/>
		<reference ref_id="1223922" ref_url="https://bugzilla.suse.com/1223922" source="BUGZILLA"/>
		<reference ref_id="1223923" ref_url="https://bugzilla.suse.com/1223923" source="BUGZILLA"/>
		<reference ref_id="1223924" ref_url="https://bugzilla.suse.com/1223924" source="BUGZILLA"/>
		<reference ref_id="1223929" ref_url="https://bugzilla.suse.com/1223929" source="BUGZILLA"/>
		<reference ref_id="1223931" ref_url="https://bugzilla.suse.com/1223931" source="BUGZILLA"/>
		<reference ref_id="1223932" ref_url="https://bugzilla.suse.com/1223932" source="BUGZILLA"/>
		<reference ref_id="1223934" ref_url="https://bugzilla.suse.com/1223934" source="BUGZILLA"/>
		<reference ref_id="1223941" ref_url="https://bugzilla.suse.com/1223941" source="BUGZILLA"/>
		<reference ref_id="1223948" ref_url="https://bugzilla.suse.com/1223948" source="BUGZILLA"/>
		<reference ref_id="1223949" ref_url="https://bugzilla.suse.com/1223949" source="BUGZILLA"/>
		<reference ref_id="1223950" ref_url="https://bugzilla.suse.com/1223950" source="BUGZILLA"/>
		<reference ref_id="1223951" ref_url="https://bugzilla.suse.com/1223951" source="BUGZILLA"/>
		<reference ref_id="1223952" ref_url="https://bugzilla.suse.com/1223952" source="BUGZILLA"/>
		<reference ref_id="1223953" ref_url="https://bugzilla.suse.com/1223953" source="BUGZILLA"/>
		<reference ref_id="1223956" ref_url="https://bugzilla.suse.com/1223956" source="BUGZILLA"/>
		<reference ref_id="1223957" ref_url="https://bugzilla.suse.com/1223957" source="BUGZILLA"/>
		<reference ref_id="1223960" ref_url="https://bugzilla.suse.com/1223960" source="BUGZILLA"/>
		<reference ref_id="1223962" ref_url="https://bugzilla.suse.com/1223962" source="BUGZILLA"/>
		<reference ref_id="1223963" ref_url="https://bugzilla.suse.com/1223963" source="BUGZILLA"/>
		<reference ref_id="1223964" ref_url="https://bugzilla.suse.com/1223964" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-47047" ref_url="https://www.suse.com/security/cve/CVE-2021-47047/" source="CVE"/>
		<reference ref_id="CVE-2021-47181" ref_url="https://www.suse.com/security/cve/CVE-2021-47181/" source="CVE"/>
		<reference ref_id="CVE-2021-47182" ref_url="https://www.suse.com/security/cve/CVE-2021-47182/" source="CVE"/>
		<reference ref_id="CVE-2021-47183" ref_url="https://www.suse.com/security/cve/CVE-2021-47183/" source="CVE"/>
		<reference ref_id="CVE-2021-47184" ref_url="https://www.suse.com/security/cve/CVE-2021-47184/" source="CVE"/>
		<reference ref_id="CVE-2021-47185" ref_url="https://www.suse.com/security/cve/CVE-2021-47185/" source="CVE"/>
		<reference ref_id="CVE-2021-47187" ref_url="https://www.suse.com/security/cve/CVE-2021-47187/" source="CVE"/>
		<reference ref_id="CVE-2021-47188" ref_url="https://www.suse.com/security/cve/CVE-2021-47188/" source="CVE"/>
		<reference ref_id="CVE-2021-47189" ref_url="https://www.suse.com/security/cve/CVE-2021-47189/" source="CVE"/>
		<reference ref_id="CVE-2021-47191" ref_url="https://www.suse.com/security/cve/CVE-2021-47191/" source="CVE"/>
		<reference ref_id="CVE-2021-47192" ref_url="https://www.suse.com/security/cve/CVE-2021-47192/" source="CVE"/>
		<reference ref_id="CVE-2021-47193" ref_url="https://www.suse.com/security/cve/CVE-2021-47193/" source="CVE"/>
		<reference ref_id="CVE-2021-47194" ref_url="https://www.suse.com/security/cve/CVE-2021-47194/" source="CVE"/>
		<reference ref_id="CVE-2021-47195" ref_url="https://www.suse.com/security/cve/CVE-2021-47195/" source="CVE"/>
		<reference ref_id="CVE-2021-47196" ref_url="https://www.suse.com/security/cve/CVE-2021-47196/" source="CVE"/>
		<reference ref_id="CVE-2021-47197" ref_url="https://www.suse.com/security/cve/CVE-2021-47197/" source="CVE"/>
		<reference ref_id="CVE-2021-47198" ref_url="https://www.suse.com/security/cve/CVE-2021-47198/" source="CVE"/>
		<reference ref_id="CVE-2021-47199" ref_url="https://www.suse.com/security/cve/CVE-2021-47199/" source="CVE"/>
		<reference ref_id="CVE-2021-47200" ref_url="https://www.suse.com/security/cve/CVE-2021-47200/" source="CVE"/>
		<reference ref_id="CVE-2021-47201" ref_url="https://www.suse.com/security/cve/CVE-2021-47201/" source="CVE"/>
		<reference ref_id="CVE-2021-47202" ref_url="https://www.suse.com/security/cve/CVE-2021-47202/" source="CVE"/>
		<reference ref_id="CVE-2021-47203" ref_url="https://www.suse.com/security/cve/CVE-2021-47203/" source="CVE"/>
		<reference ref_id="CVE-2021-47204" ref_url="https://www.suse.com/security/cve/CVE-2021-47204/" source="CVE"/>
		<reference ref_id="CVE-2021-47205" ref_url="https://www.suse.com/security/cve/CVE-2021-47205/" source="CVE"/>
		<reference ref_id="CVE-2021-47206" ref_url="https://www.suse.com/security/cve/CVE-2021-47206/" source="CVE"/>
		<reference ref_id="CVE-2021-47207" ref_url="https://www.suse.com/security/cve/CVE-2021-47207/" source="CVE"/>
		<reference ref_id="CVE-2021-47209" ref_url="https://www.suse.com/security/cve/CVE-2021-47209/" source="CVE"/>
		<reference ref_id="CVE-2021-47210" ref_url="https://www.suse.com/security/cve/CVE-2021-47210/" source="CVE"/>
		<reference ref_id="CVE-2021-47211" ref_url="https://www.suse.com/security/cve/CVE-2021-47211/" source="CVE"/>
		<reference ref_id="CVE-2021-47212" ref_url="https://www.suse.com/security/cve/CVE-2021-47212/" source="CVE"/>
		<reference ref_id="CVE-2021-47214" ref_url="https://www.suse.com/security/cve/CVE-2021-47214/" source="CVE"/>
		<reference ref_id="CVE-2021-47215" ref_url="https://www.suse.com/security/cve/CVE-2021-47215/" source="CVE"/>
		<reference ref_id="CVE-2021-47216" ref_url="https://www.suse.com/security/cve/CVE-2021-47216/" source="CVE"/>
		<reference ref_id="CVE-2021-47217" ref_url="https://www.suse.com/security/cve/CVE-2021-47217/" source="CVE"/>
		<reference ref_id="CVE-2021-47218" ref_url="https://www.suse.com/security/cve/CVE-2021-47218/" source="CVE"/>
		<reference ref_id="CVE-2021-47219" ref_url="https://www.suse.com/security/cve/CVE-2021-47219/" source="CVE"/>
		<reference ref_id="CVE-2022-48631" ref_url="https://www.suse.com/security/cve/CVE-2022-48631/" source="CVE"/>
		<reference ref_id="CVE-2022-48632" ref_url="https://www.suse.com/security/cve/CVE-2022-48632/" source="CVE"/>
		<reference ref_id="CVE-2022-48634" ref_url="https://www.suse.com/security/cve/CVE-2022-48634/" source="CVE"/>
		<reference ref_id="CVE-2022-48636" ref_url="https://www.suse.com/security/cve/CVE-2022-48636/" source="CVE"/>
		<reference ref_id="CVE-2022-48637" ref_url="https://www.suse.com/security/cve/CVE-2022-48637/" source="CVE"/>
		<reference ref_id="CVE-2022-48638" ref_url="https://www.suse.com/security/cve/CVE-2022-48638/" source="CVE"/>
		<reference ref_id="CVE-2022-48639" ref_url="https://www.suse.com/security/cve/CVE-2022-48639/" source="CVE"/>
		<reference ref_id="CVE-2022-48640" ref_url="https://www.suse.com/security/cve/CVE-2022-48640/" source="CVE"/>
		<reference ref_id="CVE-2022-48642" ref_url="https://www.suse.com/security/cve/CVE-2022-48642/" source="CVE"/>
		<reference ref_id="CVE-2022-48644" ref_url="https://www.suse.com/security/cve/CVE-2022-48644/" source="CVE"/>
		<reference ref_id="CVE-2022-48646" ref_url="https://www.suse.com/security/cve/CVE-2022-48646/" source="CVE"/>
		<reference ref_id="CVE-2022-48647" ref_url="https://www.suse.com/security/cve/CVE-2022-48647/" source="CVE"/>
		<reference ref_id="CVE-2022-48648" ref_url="https://www.suse.com/security/cve/CVE-2022-48648/" source="CVE"/>
		<reference ref_id="CVE-2022-48650" ref_url="https://www.suse.com/security/cve/CVE-2022-48650/" source="CVE"/>
		<reference ref_id="CVE-2022-48651" ref_url="https://www.suse.com/security/cve/CVE-2022-48651/" source="CVE"/>
		<reference ref_id="CVE-2022-48652" ref_url="https://www.suse.com/security/cve/CVE-2022-48652/" source="CVE"/>
		<reference ref_id="CVE-2022-48653" ref_url="https://www.suse.com/security/cve/CVE-2022-48653/" source="CVE"/>
		<reference ref_id="CVE-2022-48654" ref_url="https://www.suse.com/security/cve/CVE-2022-48654/" source="CVE"/>
		<reference ref_id="CVE-2022-48655" ref_url="https://www.suse.com/security/cve/CVE-2022-48655/" source="CVE"/>
		<reference ref_id="CVE-2022-48656" ref_url="https://www.suse.com/security/cve/CVE-2022-48656/" source="CVE"/>
		<reference ref_id="CVE-2022-48657" ref_url="https://www.suse.com/security/cve/CVE-2022-48657/" source="CVE"/>
		<reference ref_id="CVE-2022-48658" ref_url="https://www.suse.com/security/cve/CVE-2022-48658/" source="CVE"/>
		<reference ref_id="CVE-2022-48659" ref_url="https://www.suse.com/security/cve/CVE-2022-48659/" source="CVE"/>
		<reference ref_id="CVE-2022-48660" ref_url="https://www.suse.com/security/cve/CVE-2022-48660/" source="CVE"/>
		<reference ref_id="CVE-2022-48662" ref_url="https://www.suse.com/security/cve/CVE-2022-48662/" source="CVE"/>
		<reference ref_id="CVE-2022-48663" ref_url="https://www.suse.com/security/cve/CVE-2022-48663/" source="CVE"/>
		<reference ref_id="CVE-2022-48667" ref_url="https://www.suse.com/security/cve/CVE-2022-48667/" source="CVE"/>
		<reference ref_id="CVE-2022-48668" ref_url="https://www.suse.com/security/cve/CVE-2022-48668/" source="CVE"/>
		<reference ref_id="CVE-2022-48671" ref_url="https://www.suse.com/security/cve/CVE-2022-48671/" source="CVE"/>
		<reference ref_id="CVE-2022-48672" ref_url="https://www.suse.com/security/cve/CVE-2022-48672/" source="CVE"/>
		<reference ref_id="CVE-2022-48673" ref_url="https://www.suse.com/security/cve/CVE-2022-48673/" source="CVE"/>
		<reference ref_id="CVE-2022-48675" ref_url="https://www.suse.com/security/cve/CVE-2022-48675/" source="CVE"/>
		<reference ref_id="CVE-2022-48686" ref_url="https://www.suse.com/security/cve/CVE-2022-48686/" source="CVE"/>
		<reference ref_id="CVE-2022-48687" ref_url="https://www.suse.com/security/cve/CVE-2022-48687/" source="CVE"/>
		<reference ref_id="CVE-2022-48688" ref_url="https://www.suse.com/security/cve/CVE-2022-48688/" source="CVE"/>
		<reference ref_id="CVE-2022-48690" ref_url="https://www.suse.com/security/cve/CVE-2022-48690/" source="CVE"/>
		<reference ref_id="CVE-2022-48692" ref_url="https://www.suse.com/security/cve/CVE-2022-48692/" source="CVE"/>
		<reference ref_id="CVE-2022-48693" ref_url="https://www.suse.com/security/cve/CVE-2022-48693/" source="CVE"/>
		<reference ref_id="CVE-2022-48694" ref_url="https://www.suse.com/security/cve/CVE-2022-48694/" source="CVE"/>
		<reference ref_id="CVE-2022-48695" ref_url="https://www.suse.com/security/cve/CVE-2022-48695/" source="CVE"/>
		<reference ref_id="CVE-2022-48697" ref_url="https://www.suse.com/security/cve/CVE-2022-48697/" source="CVE"/>
		<reference ref_id="CVE-2022-48698" ref_url="https://www.suse.com/security/cve/CVE-2022-48698/" source="CVE"/>
		<reference ref_id="CVE-2022-48700" ref_url="https://www.suse.com/security/cve/CVE-2022-48700/" source="CVE"/>
		<reference ref_id="CVE-2022-48701" ref_url="https://www.suse.com/security/cve/CVE-2022-48701/" source="CVE"/>
		<reference ref_id="CVE-2022-48702" ref_url="https://www.suse.com/security/cve/CVE-2022-48702/" source="CVE"/>
		<reference ref_id="CVE-2022-48703" ref_url="https://www.suse.com/security/cve/CVE-2022-48703/" source="CVE"/>
		<reference ref_id="CVE-2022-48704" ref_url="https://www.suse.com/security/cve/CVE-2022-48704/" source="CVE"/>
		<reference ref_id="CVE-2023-2860" ref_url="https://www.suse.com/security/cve/CVE-2023-2860/" source="CVE"/>
		<reference ref_id="CVE-2023-52488" ref_url="https://www.suse.com/security/cve/CVE-2023-52488/" source="CVE"/>
		<reference ref_id="CVE-2023-52503" ref_url="https://www.suse.com/security/cve/CVE-2023-52503/" source="CVE"/>
		<reference ref_id="CVE-2023-52561" ref_url="https://www.suse.com/security/cve/CVE-2023-52561/" source="CVE"/>
		<reference ref_id="CVE-2023-52585" ref_url="https://www.suse.com/security/cve/CVE-2023-52585/" source="CVE"/>
		<reference ref_id="CVE-2023-52589" ref_url="https://www.suse.com/security/cve/CVE-2023-52589/" source="CVE"/>
		<reference ref_id="CVE-2023-52590" ref_url="https://www.suse.com/security/cve/CVE-2023-52590/" source="CVE"/>
		<reference ref_id="CVE-2023-52591" ref_url="https://www.suse.com/security/cve/CVE-2023-52591/" source="CVE"/>
		<reference ref_id="CVE-2023-52593" ref_url="https://www.suse.com/security/cve/CVE-2023-52593/" source="CVE"/>
		<reference ref_id="CVE-2023-52614" ref_url="https://www.suse.com/security/cve/CVE-2023-52614/" source="CVE"/>
		<reference ref_id="CVE-2023-52616" ref_url="https://www.suse.com/security/cve/CVE-2023-52616/" source="CVE"/>
		<reference ref_id="CVE-2023-52620" ref_url="https://www.suse.com/security/cve/CVE-2023-52620/" source="CVE"/>
		<reference ref_id="CVE-2023-52627" ref_url="https://www.suse.com/security/cve/CVE-2023-52627/" source="CVE"/>
		<reference ref_id="CVE-2023-52635" ref_url="https://www.suse.com/security/cve/CVE-2023-52635/" source="CVE"/>
		<reference ref_id="CVE-2023-52636" ref_url="https://www.suse.com/security/cve/CVE-2023-52636/" source="CVE"/>
		<reference ref_id="CVE-2023-52645" ref_url="https://www.suse.com/security/cve/CVE-2023-52645/" source="CVE"/>
		<reference ref_id="CVE-2023-52652" ref_url="https://www.suse.com/security/cve/CVE-2023-52652/" source="CVE"/>
		<reference ref_id="CVE-2023-6270" ref_url="https://www.suse.com/security/cve/CVE-2023-6270/" source="CVE"/>
		<reference ref_id="CVE-2024-0639" ref_url="https://www.suse.com/security/cve/CVE-2024-0639/" source="CVE"/>
		<reference ref_id="CVE-2024-0841" ref_url="https://www.suse.com/security/cve/CVE-2024-0841/" source="CVE"/>
		<reference ref_id="CVE-2024-22099" ref_url="https://www.suse.com/security/cve/CVE-2024-22099/" source="CVE"/>
		<reference ref_id="CVE-2024-23307" ref_url="https://www.suse.com/security/cve/CVE-2024-23307/" source="CVE"/>
		<reference ref_id="CVE-2024-23848" ref_url="https://www.suse.com/security/cve/CVE-2024-23848/" source="CVE"/>
		<reference ref_id="CVE-2024-23850" ref_url="https://www.suse.com/security/cve/CVE-2024-23850/" source="CVE"/>
		<reference ref_id="CVE-2024-26601" ref_url="https://www.suse.com/security/cve/CVE-2024-26601/" source="CVE"/>
		<reference ref_id="CVE-2024-26610" ref_url="https://www.suse.com/security/cve/CVE-2024-26610/" source="CVE"/>
		<reference ref_id="CVE-2024-26656" ref_url="https://www.suse.com/security/cve/CVE-2024-26656/" source="CVE"/>
		<reference ref_id="CVE-2024-26660" ref_url="https://www.suse.com/security/cve/CVE-2024-26660/" source="CVE"/>
		<reference ref_id="CVE-2024-26671" ref_url="https://www.suse.com/security/cve/CVE-2024-26671/" source="CVE"/>
		<reference ref_id="CVE-2024-26673" ref_url="https://www.suse.com/security/cve/CVE-2024-26673/" source="CVE"/>
		<reference ref_id="CVE-2024-26675" ref_url="https://www.suse.com/security/cve/CVE-2024-26675/" source="CVE"/>
		<reference ref_id="CVE-2024-26680" ref_url="https://www.suse.com/security/cve/CVE-2024-26680/" source="CVE"/>
		<reference ref_id="CVE-2024-26681" ref_url="https://www.suse.com/security/cve/CVE-2024-26681/" source="CVE"/>
		<reference ref_id="CVE-2024-26684" ref_url="https://www.suse.com/security/cve/CVE-2024-26684/" source="CVE"/>
		<reference ref_id="CVE-2024-26685" ref_url="https://www.suse.com/security/cve/CVE-2024-26685/" source="CVE"/>
		<reference ref_id="CVE-2024-26687" ref_url="https://www.suse.com/security/cve/CVE-2024-26687/" source="CVE"/>
		<reference ref_id="CVE-2024-26688" ref_url="https://www.suse.com/security/cve/CVE-2024-26688/" source="CVE"/>
		<reference ref_id="CVE-2024-26689" ref_url="https://www.suse.com/security/cve/CVE-2024-26689/" source="CVE"/>
		<reference ref_id="CVE-2024-26696" ref_url="https://www.suse.com/security/cve/CVE-2024-26696/" source="CVE"/>
		<reference ref_id="CVE-2024-26697" ref_url="https://www.suse.com/security/cve/CVE-2024-26697/" source="CVE"/>
		<reference ref_id="CVE-2024-26702" ref_url="https://www.suse.com/security/cve/CVE-2024-26702/" source="CVE"/>
		<reference ref_id="CVE-2024-26704" ref_url="https://www.suse.com/security/cve/CVE-2024-26704/" source="CVE"/>
		<reference ref_id="CVE-2024-26718" ref_url="https://www.suse.com/security/cve/CVE-2024-26718/" source="CVE"/>
		<reference ref_id="CVE-2024-26722" ref_url="https://www.suse.com/security/cve/CVE-2024-26722/" source="CVE"/>
		<reference ref_id="CVE-2024-26727" ref_url="https://www.suse.com/security/cve/CVE-2024-26727/" source="CVE"/>
		<reference ref_id="CVE-2024-26733" ref_url="https://www.suse.com/security/cve/CVE-2024-26733/" source="CVE"/>
		<reference ref_id="CVE-2024-26736" ref_url="https://www.suse.com/security/cve/CVE-2024-26736/" source="CVE"/>
		<reference ref_id="CVE-2024-26737" ref_url="https://www.suse.com/security/cve/CVE-2024-26737/" source="CVE"/>
		<reference ref_id="CVE-2024-26739" ref_url="https://www.suse.com/security/cve/CVE-2024-26739/" source="CVE"/>
		<reference ref_id="CVE-2024-26743" ref_url="https://www.suse.com/security/cve/CVE-2024-26743/" source="CVE"/>
		<reference ref_id="CVE-2024-26744" ref_url="https://www.suse.com/security/cve/CVE-2024-26744/" source="CVE"/>
		<reference ref_id="CVE-2024-26745" ref_url="https://www.suse.com/security/cve/CVE-2024-26745/" source="CVE"/>
		<reference ref_id="CVE-2024-26747" ref_url="https://www.suse.com/security/cve/CVE-2024-26747/" source="CVE"/>
		<reference ref_id="CVE-2024-26749" ref_url="https://www.suse.com/security/cve/CVE-2024-26749/" source="CVE"/>
		<reference ref_id="CVE-2024-26751" ref_url="https://www.suse.com/security/cve/CVE-2024-26751/" source="CVE"/>
		<reference ref_id="CVE-2024-26754" ref_url="https://www.suse.com/security/cve/CVE-2024-26754/" source="CVE"/>
		<reference ref_id="CVE-2024-26760" ref_url="https://www.suse.com/security/cve/CVE-2024-26760/" source="CVE"/>
		<reference ref_id="CVE-2024-26763" ref_url="https://www.suse.com/security/cve/CVE-2024-26763/" source="CVE"/>
		<reference ref_id="CVE-2024-26764" ref_url="https://www.suse.com/security/cve/CVE-2024-26764/" source="CVE"/>
		<reference ref_id="CVE-2024-26766" ref_url="https://www.suse.com/security/cve/CVE-2024-26766/" source="CVE"/>
		<reference ref_id="CVE-2024-26769" ref_url="https://www.suse.com/security/cve/CVE-2024-26769/" source="CVE"/>
		<reference ref_id="CVE-2024-26771" ref_url="https://www.suse.com/security/cve/CVE-2024-26771/" source="CVE"/>
		<reference ref_id="CVE-2024-26772" ref_url="https://www.suse.com/security/cve/CVE-2024-26772/" source="CVE"/>
		<reference ref_id="CVE-2024-26773" ref_url="https://www.suse.com/security/cve/CVE-2024-26773/" source="CVE"/>
		<reference ref_id="CVE-2024-26776" ref_url="https://www.suse.com/security/cve/CVE-2024-26776/" source="CVE"/>
		<reference ref_id="CVE-2024-26779" ref_url="https://www.suse.com/security/cve/CVE-2024-26779/" source="CVE"/>
		<reference ref_id="CVE-2024-26783" ref_url="https://www.suse.com/security/cve/CVE-2024-26783/" source="CVE"/>
		<reference ref_id="CVE-2024-26787" ref_url="https://www.suse.com/security/cve/CVE-2024-26787/" source="CVE"/>
		<reference ref_id="CVE-2024-26790" ref_url="https://www.suse.com/security/cve/CVE-2024-26790/" source="CVE"/>
		<reference ref_id="CVE-2024-26792" ref_url="https://www.suse.com/security/cve/CVE-2024-26792/" source="CVE"/>
		<reference ref_id="CVE-2024-26793" ref_url="https://www.suse.com/security/cve/CVE-2024-26793/" source="CVE"/>
		<reference ref_id="CVE-2024-26798" ref_url="https://www.suse.com/security/cve/CVE-2024-26798/" source="CVE"/>
		<reference ref_id="CVE-2024-26805" ref_url="https://www.suse.com/security/cve/CVE-2024-26805/" source="CVE"/>
		<reference ref_id="CVE-2024-26807" ref_url="https://www.suse.com/security/cve/CVE-2024-26807/" source="CVE"/>
		<reference ref_id="CVE-2024-26816" ref_url="https://www.suse.com/security/cve/CVE-2024-26816/" source="CVE"/>
		<reference ref_id="CVE-2024-26817" ref_url="https://www.suse.com/security/cve/CVE-2024-26817/" source="CVE"/>
		<reference ref_id="CVE-2024-26820" ref_url="https://www.suse.com/security/cve/CVE-2024-26820/" source="CVE"/>
		<reference ref_id="CVE-2024-26825" ref_url="https://www.suse.com/security/cve/CVE-2024-26825/" source="CVE"/>
		<reference ref_id="CVE-2024-26830" ref_url="https://www.suse.com/security/cve/CVE-2024-26830/" source="CVE"/>
		<reference ref_id="CVE-2024-26833" ref_url="https://www.suse.com/security/cve/CVE-2024-26833/" source="CVE"/>
		<reference ref_id="CVE-2024-26836" ref_url="https://www.suse.com/security/cve/CVE-2024-26836/" source="CVE"/>
		<reference ref_id="CVE-2024-26843" ref_url="https://www.suse.com/security/cve/CVE-2024-26843/" source="CVE"/>
		<reference ref_id="CVE-2024-26848" ref_url="https://www.suse.com/security/cve/CVE-2024-26848/" source="CVE"/>
		<reference ref_id="CVE-2024-26852" ref_url="https://www.suse.com/security/cve/CVE-2024-26852/" source="CVE"/>
		<reference ref_id="CVE-2024-26853" ref_url="https://www.suse.com/security/cve/CVE-2024-26853/" source="CVE"/>
		<reference ref_id="CVE-2024-26855" ref_url="https://www.suse.com/security/cve/CVE-2024-26855/" source="CVE"/>
		<reference ref_id="CVE-2024-26856" ref_url="https://www.suse.com/security/cve/CVE-2024-26856/" source="CVE"/>
		<reference ref_id="CVE-2024-26857" ref_url="https://www.suse.com/security/cve/CVE-2024-26857/" source="CVE"/>
		<reference ref_id="CVE-2024-26861" ref_url="https://www.suse.com/security/cve/CVE-2024-26861/" source="CVE"/>
		<reference ref_id="CVE-2024-26862" ref_url="https://www.suse.com/security/cve/CVE-2024-26862/" source="CVE"/>
		<reference ref_id="CVE-2024-26866" ref_url="https://www.suse.com/security/cve/CVE-2024-26866/" source="CVE"/>
		<reference ref_id="CVE-2024-26872" ref_url="https://www.suse.com/security/cve/CVE-2024-26872/" source="CVE"/>
		<reference ref_id="CVE-2024-26875" ref_url="https://www.suse.com/security/cve/CVE-2024-26875/" source="CVE"/>
		<reference ref_id="CVE-2024-26878" ref_url="https://www.suse.com/security/cve/CVE-2024-26878/" source="CVE"/>
		<reference ref_id="CVE-2024-26879" ref_url="https://www.suse.com/security/cve/CVE-2024-26879/" source="CVE"/>
		<reference ref_id="CVE-2024-26881" ref_url="https://www.suse.com/security/cve/CVE-2024-26881/" source="CVE"/>
		<reference ref_id="CVE-2024-26882" ref_url="https://www.suse.com/security/cve/CVE-2024-26882/" source="CVE"/>
		<reference ref_id="CVE-2024-26883" ref_url="https://www.suse.com/security/cve/CVE-2024-26883/" source="CVE"/>
		<reference ref_id="CVE-2024-26884" ref_url="https://www.suse.com/security/cve/CVE-2024-26884/" source="CVE"/>
		<reference ref_id="CVE-2024-26885" ref_url="https://www.suse.com/security/cve/CVE-2024-26885/" source="CVE"/>
		<reference ref_id="CVE-2024-26891" ref_url="https://www.suse.com/security/cve/CVE-2024-26891/" source="CVE"/>
		<reference ref_id="CVE-2024-26893" ref_url="https://www.suse.com/security/cve/CVE-2024-26893/" source="CVE"/>
		<reference ref_id="CVE-2024-26895" ref_url="https://www.suse.com/security/cve/CVE-2024-26895/" source="CVE"/>
		<reference ref_id="CVE-2024-26896" ref_url="https://www.suse.com/security/cve/CVE-2024-26896/" source="CVE"/>
		<reference ref_id="CVE-2024-26897" ref_url="https://www.suse.com/security/cve/CVE-2024-26897/" source="CVE"/>
		<reference ref_id="CVE-2024-26898" ref_url="https://www.suse.com/security/cve/CVE-2024-26898/" source="CVE"/>
		<reference ref_id="CVE-2024-26901" ref_url="https://www.suse.com/security/cve/CVE-2024-26901/" source="CVE"/>
		<reference ref_id="CVE-2024-26903" ref_url="https://www.suse.com/security/cve/CVE-2024-26903/" source="CVE"/>
		<reference ref_id="CVE-2024-26917" ref_url="https://www.suse.com/security/cve/CVE-2024-26917/" source="CVE"/>
		<reference ref_id="CVE-2024-26927" ref_url="https://www.suse.com/security/cve/CVE-2024-26927/" source="CVE"/>
		<reference ref_id="CVE-2024-26948" ref_url="https://www.suse.com/security/cve/CVE-2024-26948/" source="CVE"/>
		<reference ref_id="CVE-2024-26950" ref_url="https://www.suse.com/security/cve/CVE-2024-26950/" source="CVE"/>
		<reference ref_id="CVE-2024-26951" ref_url="https://www.suse.com/security/cve/CVE-2024-26951/" source="CVE"/>
		<reference ref_id="CVE-2024-26955" ref_url="https://www.suse.com/security/cve/CVE-2024-26955/" source="CVE"/>
		<reference ref_id="CVE-2024-26956" ref_url="https://www.suse.com/security/cve/CVE-2024-26956/" source="CVE"/>
		<reference ref_id="CVE-2024-26960" ref_url="https://www.suse.com/security/cve/CVE-2024-26960/" source="CVE"/>
		<reference ref_id="CVE-2024-26965" ref_url="https://www.suse.com/security/cve/CVE-2024-26965/" source="CVE"/>
		<reference ref_id="CVE-2024-26966" ref_url="https://www.suse.com/security/cve/CVE-2024-26966/" source="CVE"/>
		<reference ref_id="CVE-2024-26969" ref_url="https://www.suse.com/security/cve/CVE-2024-26969/" source="CVE"/>
		<reference ref_id="CVE-2024-26970" ref_url="https://www.suse.com/security/cve/CVE-2024-26970/" source="CVE"/>
		<reference ref_id="CVE-2024-26972" ref_url="https://www.suse.com/security/cve/CVE-2024-26972/" source="CVE"/>
		<reference ref_id="CVE-2024-26981" ref_url="https://www.suse.com/security/cve/CVE-2024-26981/" source="CVE"/>
		<reference ref_id="CVE-2024-26982" ref_url="https://www.suse.com/security/cve/CVE-2024-26982/" source="CVE"/>
		<reference ref_id="CVE-2024-26993" ref_url="https://www.suse.com/security/cve/CVE-2024-26993/" source="CVE"/>
		<reference ref_id="CVE-2024-27013" ref_url="https://www.suse.com/security/cve/CVE-2024-27013/" source="CVE"/>
		<reference ref_id="CVE-2024-27014" ref_url="https://www.suse.com/security/cve/CVE-2024-27014/" source="CVE"/>
		<reference ref_id="CVE-2024-27030" ref_url="https://www.suse.com/security/cve/CVE-2024-27030/" source="CVE"/>
		<reference ref_id="CVE-2024-27038" ref_url="https://www.suse.com/security/cve/CVE-2024-27038/" source="CVE"/>
		<reference ref_id="CVE-2024-27039" ref_url="https://www.suse.com/security/cve/CVE-2024-27039/" source="CVE"/>
		<reference ref_id="CVE-2024-27041" ref_url="https://www.suse.com/security/cve/CVE-2024-27041/" source="CVE"/>
		<reference ref_id="CVE-2024-27043" ref_url="https://www.suse.com/security/cve/CVE-2024-27043/" source="CVE"/>
		<reference ref_id="CVE-2024-27046" ref_url="https://www.suse.com/security/cve/CVE-2024-27046/" source="CVE"/>
		<reference ref_id="CVE-2024-27056" ref_url="https://www.suse.com/security/cve/CVE-2024-27056/" source="CVE"/>
		<reference ref_id="CVE-2024-27062" ref_url="https://www.suse.com/security/cve/CVE-2024-27062/" source="CVE"/>
		<reference ref_id="CVE-2024-27389" ref_url="https://www.suse.com/security/cve/CVE-2024-27389/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 Real Time kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-27389: Fixed pstore inode handling with d_invalidate() (bsc#1223705).
- CVE-2024-27062: Fixed nouveau lock inside client object tree (bsc#1223834).
- CVE-2024-27056: Fixed wifi/iwlwifi/mvm to ensure offloading TID queue exists (bsc#1223822).
- CVE-2024-27046: Fixed nfp/flower handling acti_netdevs allocation failure (bsc#1223827).
- CVE-2024-27043: Fixed a use-after-free in edia/dvbdev in different places (bsc#1223824).
- CVE-2024-27041: Fixed drm/amd/display NULL checks for adev-&gt;dm.dc in amdgpu_dm_fini() (bsc#1223714).
- CVE-2024-27039: Fixed clk/hisilicon/hi3559a an erroneous devm_kfree() (bsc#1223821).
- CVE-2024-27038: Fixed clk_core_get NULL pointer dereference (bsc#1223816).
- CVE-2024-27030: Fixed octeontx2-af to use separate handlers for interrupts (bsc#1223790).
- CVE-2024-27014: Fixed net/mlx5e to prevent deadlock while disabling aRFS (bsc#1223735).
- CVE-2024-27013: Fixed tun limit printing rate when illegal packet received by tun device (bsc#1223745).
- CVE-2024-26993: Fixed fs/sysfs reference leak in sysfs_break_active_protection() (bsc#1223693).
- CVE-2024-26982: Fixed Squashfs inode number check not to be an invalid value of zero (bsc#1223634).
- CVE-2024-26970: Fixed clk/qcom/gcc-ipq6018 termination of frequency table arrays (bsc#1223644).
- CVE-2024-26969: Fixed clk/qcom/gcc-ipq8074 termination of frequency table arrays (bsc#1223645).
- CVE-2024-26966: Fixed clk/qcom/mmcc-apq8084 termination of frequency table arrays (bsc#1223646).
- CVE-2024-26965: Fixed clk/qcom/mmcc-msm8974 termination of frequency table arrays (bsc#1223648).
- CVE-2024-26960: Fixed mm/swap race between free_swap_and_cache() and swapoff() (bsc#1223655).
- CVE-2024-26951: Fixed wireguard/netlink check for dangling peer via is_dead instead of empty list (bsc#1223660).
- CVE-2024-26950: Fixed wireguard/netlink to access device through ctx instead of peer (bsc#1223661).
- CVE-2024-26948: Fixed drm/amd/display by adding dc_state NULL check in dc_state_release (bsc#1223664).
- CVE-2024-26927: Fixed ASoC/SOF bounds checking to firmware data Smatch (bsc#1223525).
- CVE-2024-26901: Fixed do_sys_name_to_handle() to use kzalloc() to prevent kernel-infoleak (bsc#1223198).
- CVE-2024-26896: Fixed wifi/wfx memory leak when starting AP (bsc#1223042).
- CVE-2024-26893: Fixed firmware/arm_scmi for possible double free in SMC transport cleanup path (bsc#1223196).
- CVE-2024-26885: Fixed bpf DEVMAP_HASH overflow check on 32-bit arches (bsc#1223190).
- CVE-2024-26884: Fixed bpf hashtab overflow check on 32-bit arches (bsc#1223189).
- CVE-2024-26883: Fixed bpf stackmap overflow check on 32-bit arches (bsc#1223035).
- CVE-2024-26882: Fixed net/ip_tunnel to make sure to pull inner header in ip_tunnel_rcv() (bsc#1223034).
- CVE-2024-26881: Fixed net/hns3 kernel crash when 1588 is received on HIP08 devices (bsc#1223041).
- CVE-2024-26879: Fixed clk/meson by adding missing clocks to axg_clk_regmaps (bsc#1223066).
- CVE-2024-26878: Fixed quota for potential NULL pointer dereference (bsc#1223060).
- CVE-2024-26866: Fixed spi/spi-fsl-lpspi by removing redundant spi_controller_put call (bsc#1223024).
- CVE-2024-26862: Fixed packet annotate data-races around ignore_outgoing (bsc#1223111).
- CVE-2024-26861: Fixed wireguard/receive annotate data-race around receiving_counter.counter (bsc#1223076).
- CVE-2024-26857: Fixed geneve to make sure to pull inner header in geneve_rx() (bsc#1223058).
- CVE-2024-26856: Fixed use-after-free inside sparx5_del_mact_entry (bsc#1223052).
- CVE-2024-26855: Fixed net/ice potential NULL pointer dereference in ice_bridge_setlink() (bsc#1223051).
- CVE-2024-26853: Fixed igc returning frame twice in XDP_REDIRECT (bsc#1223061).
- CVE-2024-26852: Fixed net/ipv6 to avoid possible UAF in ip6_route_mpath_notify() (bsc#1223057).
- CVE-2024-26848: Fixed afs endless loop in directory parsing (bsc#1223030).
- CVE-2024-26836: Fixed platform/x86/think-lmi password opcode ordering for workstations (bsc#1222968).
- CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove administratively set MAC (bsc#1223012).
- CVE-2024-26817: Fixed amdkfd to use calloc instead of kzalloc to avoid integer overflow (bsc#1222812).
- CVE-2024-26816: Fixed relocations in .notes section when building with CONFIG_XEN_PV=y by ignoring them (bsc#1222624).
- CVE-2024-26807: Fixed spi/cadence-qspi NULL pointer reference in runtime PM hooks (bsc#1222801).
- CVE-2024-26805: Fixed a kernel-infoleak-after-free in __skb_datagram_iter in netlink  (bsc#1222630).
- CVE-2024-26793: Fixed an use-after-free and null-ptr-deref in gtp_newlink() in gtp  (bsc#1222428).
- CVE-2024-26783: Fixed mm/vmscan bug when calling wakeup_kswapd() with a wrong zone index (bsc#1222615).
- CVE-2024-26779: Fixed a race condition on enabling fast-xmit in mac80211 (bsc#1222772).
- CVE-2024-26773: Fixed ext4 block allocation from corrupted group in ext4_mb_try_best_found() (bsc#1222618).
- CVE-2024-26772: Fixed ext4 to avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (bsc#1222613).
- CVE-2024-26771: Fixed a null pointer dereference on edma_probe in dmaengine ti edma  (bsc#1222610)
- CVE-2024-26766: Fixed SDMA off-by-one error in _pad_sdma_tx_descs() (bsc#1222726).
- CVE-2024-26764: Fixed IOCB_AIO_RW check in fs/aio before the struct aio_kiocb conversion (bsc#1222721).
- CVE-2024-26763: Fixed user corruption via by writing data with O_DIRECT on device in dm-crypt (bsc#1222720).
- CVE-2024-26760: Fixed scsi/target/pscsi bio_put() for error case (bsc#1222596).
- CVE-2024-267600: Fixed scsi/target/pscsi error case in bio_put() (bsc#1222596).
- CVE-2024-26754: Fixed an use-after-free and null-ptr-deref in gtp_genl_dump_pdp() in gtp  (bsc#1222632).
- CVE-2024-26751: Fixed ARM/ep93xx terminator to gpiod_lookup_table (bsc#1222724).
- CVE-2024-26747: Fixed a NULL pointer issue with USB parent module's reference (bsc#1222609).
- CVE-2024-26744: Fixed null pointer dereference in srpt_service_guid parameter in rdma/srpt (bsc#1222449).
- CVE-2024-26743: Fixed memory leak in qedr_create_user_qp error flow in rdma/qedr (bsc#1222677).
- CVE-2024-26737: Fixed selftests/bpf racing between bpf_timer_cancel_and_free and bpf_timer_cancel (bsc#1222557).
- CVE-2024-26733: Fixed an overflow in arp_req_get() in arp (bsc#1222585).
- CVE-2024-26727: Fixed assertion if a newly created btrfs subvolume already gets read (bsc#1222536).
- CVE-2024-26718: Fixed dm-crypt/dm-verity disable tasklets (bsc#1222416).
- CVE-2024-26704: Fixed a double-free of blocks due to wrong extents moved_len in ext4 (bsc#1222422).
- CVE-2024-26696: Fixed nilfs2 hang in nilfs_lookup_dirty_data_buffers() (bsc#1222549).
- CVE-2024-26689: Fixed a use-after-free in encode_cap_msg() (bsc#1222503).
- CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup (bsc#1222435).
- CVE-2024-26685: Fixed nilfs2 potential bug in end_buffer_async_write (bsc#1222437).
- CVE-2024-26684: Fixed net/stmmac/xgmac handling of DPP safety error for DMA channels (bsc#1222445).
- CVE-2024-26681: Fixed netdevsim to avoid potential loop in nsim_dev_trap_report_work() (bsc#1222431).
- CVE-2024-26680: Fixed net/atlantic DMA mapping for PTP hwts ring (bsc#1222427).
- CVE-2024-26675: Fixed ppp_async to limit MRU to 64K (bsc#1222379).
- CVE-2024-26673: Fixed netfilter/nft_ct layer 3 and 4 protocol sanitization (bsc#1222368).
- CVE-2024-26671: Fixed blk-mq IO hang from sbitmap wakeup race (bsc#1222357).
- CVE-2024-26660: Fixed drm/amd/display bounds check for stream encoder creation (bsc#1222266).
- CVE-2024-26656: Fixed drm/amdgpu use-after-free bug (bsc#1222307).
- CVE-2024-26610: Fixed memory corruption in wifi/iwlwifi (bsc#1221299).
- CVE-2024-26601: Fixed ext4 buddy bitmap corruption via fast commit replay (bsc#1220342).
- CVE-2024-23850: Fixed double free of anonymous device after snapshot  creation failure (bsc#1219126).
- CVE-2024-23848: Fixed media/cec for possible use-after-free in cec_queue_msg_fh (bsc#1219104).
- CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86 and ARM md, raid, raid5 modules (bsc#1219169).
- CVE-2024-22099: Fixed a null-pointer-dereference in rfcomm_check_security (bsc#1219170).
- CVE-2024-0841: Fixed a null pointer dereference in the hugetlbfs_fill_super function in hugetlbfs (HugeTLB pages) functionality (bsc#1219264).
- CVE-2024-0639: Fixed a denial-of-service vulnerability due to a deadlock found in sctp_auto_asconf_init in net/sctp/socket.c (bsc#1218917).
- CVE-2023-6270: Fixed a use-after-free issue in aoecmd_cfg_pkts (bsc#1218562).
- CVE-2023-52652: Fixed NTB for possible name leak in ntb_register_device() (bsc#1223686).
- CVE-2023-52645: Fixed pmdomain/mediatek race conditions with genpd (bsc#1223033).
- CVE-2023-52636: Fixed libceph cursor init when preparing sparse read in msgr2 (bsc#1222247).
- CVE-2023-52635: Fixed PM/devfreq to synchronize devfreq_monitor_[start/stop] (bsc#1222294).
- CVE-2023-52627: Fixed iio:adc:ad7091r exports into IIO_AD7091R namespace (bsc#1222051).
- CVE-2023-52620: Fixed netfilter/nf_tables to disallow timeout for anonymous sets never used from userspace (bsc#1221825).
- CVE-2023-52616: Fixed unexpected pointer access in crypto/lib/mpi in mpi_ec_init (bsc#1221612).
- CVE-2023-52614: Fixed PM/devfreq buffer overflow in trans_stat_show (bsc#1221617).
- CVE-2023-52593: Fixed wifi/wfx possible NULL pointer dereference in wfx_set_mfp_ap() (bsc#1221042).
- CVE-2023-52591: Fixed a possible reiserfs filesystem corruption via directory renaming (bsc#1221044).
- CVE-2023-52590: Fixed a possible ocfs2 filesystem corruption via directory renaming (bsc#1221088).
- CVE-2023-52589: Fixed media/rkisp1 IRQ disable race issue (bsc#1221084).
- CVE-2023-52585: Fixed drm/amdgpu for possible NULL pointer dereference in amdgpu_ras_query_error_status_helper() (bsc#1221080).
- CVE-2023-52561: Fixed arm64/dts/qcom/sdm845-db845c to mark cont splash memory region (bsc#1220935).
- CVE-2023-52503: Fixed tee/amdtee use-after-free vulnerability in amdtee_close_session (bsc#1220915).
- CVE-2023-52488: Fixed serial/sc16is7xx convert from _raw_ to _noinc_ regmap functions for FIFO (bsc#1221162).
- CVE-2022-48701: Fixed an out-of-bounds bug in __snd_usb_parse_audio_interface() (bsc#1223921).
- CVE-2022-48662: Fixed a general protection fault (GPF) in i915_perf_open_ioctl (bsc#1223505).
- CVE-2022-48659: Fixed mm/slub to return errno if kmalloc() fails (bsc#1223498).
- CVE-2022-48658: Fixed mm/slub to avoid a problem in flush_cpu_slab()/__free_slab() task context (bsc#1223496).
- CVE-2022-48651: Fixed an out-of-bound bug in ipvlan caused by unset skb-&gt;mac_header (bsc#1223513).
- CVE-2022-48642: Fixed netfilter/nf_tables percpu memory leak at nf_tables_addchain() (bsc#1223478).
- CVE-2022-48640: Fixed bonding for possible NULL pointer dereference in bond_rr_gen_slave_id (bsc#1223499).
- CVE-2022-48631: Fixed a bug in ext4, when parsing extents where eh_entries == 0 and eh_depth &gt; 0 (bsc#1223475).
- CVE-2021-47214: Fixed hugetlb/userfaultfd during restore reservation in hugetlb_mcopy_atomic_pte() (bsc#1222710).
- CVE-2021-47211: Fixed a null pointer dereference on pointer cs_desc in usb-audio (bsc#1222869).
- CVE-2021-47207: Fixed a null pointer dereference on pointer block in gus (bsc#1222790).
- CVE-2021-47205: Unregistered clocks/resets when unbinding in sunxi-ng (bsc#1222888).
- CVE-2021-47202: Fixed NULL pointer dereferences in of_thermal_ functions (bsc#1222878)
- CVE-2021-47200: Fixed drm/prime for possible use-after-free in mmap within drm_gem_ttm_mmap() and drm_gem_ttm_mmap() (bsc#1222838).
- CVE-2021-47195: Fixed use-after-free inside SPI via add_lock mutex (bsc#1222832).
- CVE-2021-47189: Fixed denial of service due to memory ordering issues between normal and ordered work functions in btrfs (bsc#1222706).
- CVE-2021-47185: Fixed a softlockup issue in flush_to_ldisc in tty tty_buffer (bsc#1222669).
- CVE-2021-47184: Fixed NULL pointer dereference on VSI filter sync (bsc#1222666).
- CVE-2021-47183: Fixed a null pointer dereference during link down processing in scsi lpfc (bsc#1192145, bsc#1222664).
- CVE-2021-47182: Fixed scsi_mode_sense() buffer length handling (bsc#1222662).
- CVE-2021-47181: Fixed a null pointer dereference caused by calling platform_get_resource()  (bsc#1222660).

The following non-security bugs were fixed:

- ALSA: firewire-lib: handle quirk to calculate payload quadlets as data block counter (stable-fixes).
- ALSA: hda/realtek - Enable audio jacks of Haier Boyue G42 with ALC269VC (stable-fixes).
- ALSA: hda/realtek - Fix inactive headset mic jack (stable-fixes).
- ALSA: hda/realtek: Add quirk for HP SnowWhite laptops (stable-fixes).
- ALSA: hda/realtek: Fix mute led of HP Laptop 15-da3001TU (stable-fixes).
- ALSA: hda: intel-sdw-acpi: fix usage of device_get_named_child_node() (git-fixes).
- ALSA: scarlett2: Add Focusrite Clarett 2Pre and 4Pre USB support (stable-fixes).
- ALSA: scarlett2: Add Focusrite Clarett+ 2Pre and 4Pre support (stable-fixes).
- ALSA: scarlett2: Add correct product series name to messages (stable-fixes).
- ALSA: scarlett2: Add support for Clarett 8Pre USB (stable-fixes).
- ALSA: scarlett2: Default mixer driver to enabled (stable-fixes).
- ALSA: scarlett2: Move USB IDs out from device_info struct (stable-fixes).
- ASoC: meson: axg-card: make links nonatomic (git-fixes).
- ASoC: meson: axg-tdm-interface: manage formatters in trigger (git-fixes).
- ASoC: meson: cards: select SND_DYNAMIC_MINORS (git-fixes).
- ASoC: soc-core.c: Skip dummy codec when adding platforms (stable-fixes).
- ASoC: tegra: Fix DSPK 16-bit playback (git-fixes).
- ASoC: ti: davinci-mcasp: Fix race condition during probe (git-fixes).
- Bluetooth: Add new quirk for broken read key length on ATS2851 (git-fixes).
- Bluetooth: Fix TOCTOU in HCI debugfs implementation (git-fixes).
- Bluetooth: Fix memory leak in hci_req_sync_complete() (git-fixes).
- Bluetooth: Fix type of len in {l2cap,sco}_sock_getsockopt_old() (stable-fixes).
- Bluetooth: L2CAP: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: RFCOMM: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: SCO: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: add quirk for broken address properties (git-fixes).
- Bluetooth: btintel: Fix null ptr deref in btintel_read_version (stable-fixes).
- Bluetooth: btintel: Fixe build regression (git-fixes).
- Bluetooth: btusb: Add Realtek RTL8852BE support ID 0x0bda:0x4853 (stable-fixes).
- Bluetooth: hci_event: Fix sending HCI_OP_READ_ENC_KEY_SIZE (git-fixes).
- Bluetooth: hci_event: set the conn encrypted before conn establishes (stable-fixes).
- Bluetooth: hci_sock: Fix not validating setsockopt user input (git-fixes).
- Bluetooth: qca: fix NULL-deref on non-serdev suspend (git-fixes).
- Documentation: Add missing documentation for EXPORT_OP flags (stable-fixes).
- HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev-&gt;devc (git-fixes).
- HID: logitech-dj: allow mice to use all types of reports (git-fixes).
- HID: uhid: Use READ_ONCE()/WRITE_ONCE() for -&gt;running (stable-fixes).
- Input: allocate keycode for Display refresh rate toggle (stable-fixes).
- Input: synaptics-rmi4 - fail probing if memory allocation for 'phys' fails (stable-fixes).
- NFC: trf7970a: disable all regulators on removal (git-fixes).
- NFS: avoid spurious warning of lost lock that is being unlocked (bsc#1221791).
- PCI/AER: Block runtime suspend when handling errors (git-fixes).
- PCI/DPC: Quirk PIO log size for Intel Ice Lake Root Ports (git-fixes).
- PCI/DPC: Quirk PIO log size for Intel Raptor Lake Root Ports (git-fixes).
- PCI/DPC: Quirk PIO log size for certain Intel Root Ports (git-fixes).
- PCI/PM: Drain runtime-idle callbacks before driver removal (git-fixes).
- PCI: Drop pci_device_remove() test of pci_dev-&gt;driver (git-fixes).
- PCI: rpaphp: Error out on busy status from get-sensor-state (bsc#1223369 ltc#205888).
- RAS: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619).
- RDMA/cm: Print the old state when cm_destroy_id gets timeout (git-fixes).
- RDMA/cm: add timeout to cm_destroy_id wait (git-fixes)
- README.BRANCH: Correct email address for Petr Tesarik
- README.BRANCH: Remove copy of branch name
- Reapply 'drm/qxl: simplify qxl_fence_wait' (stable-fixes).
- Revert 'ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default' (stable-fixes).
- Revert 'drm/qxl: simplify qxl_fence_wait' (git-fixes).
- Revert 'ice: Fix ice VF reset during iavf initialization (jsc#PED-376).' (bsc#1223275)
- Revert 'usb: cdc-wdm: close race between read and workqueue' (git-fixes).
- Revert 'usb: phy: generic: Get the vbus supply' (git-fixes).
- USB: UAS: return ENODEV when submit urbs fail with device not attached (stable-fixes).
- USB: serial: add device ID for VeriFone adapter (stable-fixes).
- USB: serial: cp210x: add ID for MGP Instruments PDS100 (stable-fixes).
- USB: serial: cp210x: add pid/vid for TDK NC0110013M and MM0110113M (stable-fixes).
- USB: serial: ftdi_sio: add support for GMC Z216C Adapter IR-USB (stable-fixes).
- USB: serial: option: add Fibocom FM135-GL variants (stable-fixes).
- USB: serial: option: add Lonsung U8300/U9300 product (stable-fixes).
- USB: serial: option: add MeiG Smart SLM320 product (stable-fixes).
- USB: serial: option: add Rolling RW101-GL and RW135-GL support (stable-fixes).
- USB: serial: option: add Telit FN920C04 rmnet compositions (stable-fixes).
- USB: serial: option: add support for Fibocom FM650/FG650 (stable-fixes).
- USB: serial: option: support Quectel EM060K sub-models (stable-fixes).
- ahci: asm1064: asm1166: do not limit reported ports (git-fixes).
- ahci: asm1064: correct count of reported ports (stable-fixes).
- arm64: dts: imx8-ss-conn: fix usdhc wrong lpcg clock order (git-fixes)
- arm64: dts: rockchip: Remove unsupported node from the Pinebook Pro (git-fixes)
- arm64: dts: rockchip: enable internal pull-up for Q7_THRM# on RK3399 (git-fixes)
- arm64: dts: rockchip: enable internal pull-up on PCIE_WAKE# for (git-fixes)
- arm64: dts: rockchip: enable internal pull-up on Q7_USB_ID for RK3399 (git-fixes)
- arm64: dts: rockchip: fix rk3328 hdmi ports node (git-fixes)
- arm64: dts: rockchip: fix rk3399 hdmi ports node (git-fixes)
- arm64: hibernate: Fix level3 translation fault in swsusp_save() (git-fixes).
- ax25: fix use-after-free bugs caused by ax25_ds_del_timer (git-fixes).
- batman-adv: Avoid infinite loop trying to resize local TT (git-fixes).
- bcache: Fix __bch_btree_node_alloc to make the failure behavior consistent (git-fixes).
- bcache: Remove dead references to cache_readaheads (git-fixes).
- bcache: Remove unnecessary NULL point check in node allocations (git-fixes).
- bcache: add code comments for bch_btree_node_get() and __bch_btree_node_alloc() (git-fixes).
- bcache: avoid NULL checking to c-&gt;root in run_cache_set() (git-fixes).
- bcache: avoid oversize memory allocation by small stripe_size (git-fixes).
- bcache: bset: Fix comment typos (git-fixes).
- bcache: check return value from btree_node_alloc_replacement() (git-fixes).
- bcache: fix NULL pointer reference in cached_dev_detach_finish (git-fixes).
- bcache: fix error info in register_bcache() (git-fixes).
- bcache: fixup bcache_dev_sectors_dirty_add() multithreaded CPU false sharing (git-fixes).
- bcache: fixup btree_cache_wait list damage (git-fixes).
- bcache: fixup init dirty data errors (git-fixes).
- bcache: fixup lock c-&gt;root error (git-fixes).
- bcache: fixup multi-threaded bch_sectors_dirty_init() wake-up race (git-fixes).
- bcache: move calc_cached_dev_sectors to proper place on backing device detach (git-fixes).
- bcache: move uapi header bcache.h to bcache code directory (git-fixes).
- bcache: prevent potential division by zero error (git-fixes).
- bcache: remove EXPERIMENTAL for Kconfig option 'Asynchronous device registration' (git-fixes).
- bcache: remove redundant assignment to variable cur_idx (git-fixes).
- bcache: remove the backing_dev_name field from struct cached_dev (git-fixes).
- bcache: remove the cache_dev_name field from struct cache (git-fixes).
- bcache: remove unnecessary flush_workqueue (git-fixes).
- bcache: remove unused bch_mark_cache_readahead function def in stats.h (git-fixes).
- bcache: replace a mistaken IS_ERR() by IS_ERR_OR_NULL() in btree_gc_coalesce() (git-fixes).
- bcache: replace snprintf in show functions with sysfs_emit (git-fixes).
- bcache: revert replacing IS_ERR_OR_NULL with IS_ERR (git-fixes).
- bcache: use bvec_kmap_local in bch_data_verify (git-fixes).
- bcache: use bvec_kmap_local in bio_csum (git-fixes).
- bcache: use default_groups in kobj_type (git-fixes).
- bcache:: fix repeated words in comments (git-fixes).
- ceph: stop copying to iter at EOF on sync reads (bsc#1223068).
- ceph: switch to corrected encoding of max_xattr_size in mdsmap (bsc#1223067).
- clk: Get runtime PM before walking tree during disable_unused (git-fixes).
- clk: Initialize struct clk_core kref earlier (stable-fixes).
- clk: Mark 'all_lists' as const (stable-fixes).
- clk: Print an info line before disabling unused clocks (stable-fixes).
- clk: Remove prepare_lock hold assertion in __clk_release() (git-fixes).
- clk: remove extra empty line (stable-fixes).
- comedi: vmk80xx: fix incomplete endpoint checking (git-fixes).
- dm cache policy smq: ensure IO does not prevent cleaner policy progress (git-fixes).
- dm cache: add cond_resched() to various workqueue loops (git-fixes).
- dm clone: call kmem_cache_destroy() in dm_clone_init() error path (git-fixes).
- dm crypt: add cond_resched() to dmcrypt_write() (git-fixes).
- dm crypt: avoid accessing uninitialized tasklet (git-fixes).
- dm flakey: do not corrupt the zero page (git-fixes).
- dm flakey: fix a bug with 32-bit highmem systems (git-fixes).
- dm flakey: fix a crash with invalid table line (git-fixes).
- dm flakey: fix logic when corrupting a bio (git-fixes).
- dm init: add dm-mod.waitfor to wait for asynchronously probed block devices (git-fixes).
- dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path (git-fixes).
- dm integrity: fix out-of-range warning (git-fixes).
- dm integrity: reduce vmalloc space footprint on 32-bit architectures (git-fixes).
- dm raid: clean up four equivalent goto tags in raid_ctr() (git-fixes).
- dm raid: fix false positive for requeue needed during reshape (git-fixes).
- dm raid: fix missing reconfig_mutex unlock in raid_ctr() error paths (git-fixes).
- dm stats: check for and propagate alloc_percpu failure (git-fixes).
- dm thin metadata: Fix ABBA deadlock by resetting dm_bufio_client (git-fixes).
- dm thin metadata: check fail_io before using data_sm (git-fixes).
- dm thin: add cond_resched() to various workqueue loops (git-fixes).
- dm thin: fix deadlock when swapping to thin device (bsc#1177529).
- dm verity: do not perform FEC for failed readahead IO (git-fixes).
- dm verity: fix error handling for check_at_most_once on FEC (git-fixes).
- dm zoned: free dmz-&gt;ddev array in dmz_put_zoned_devices (git-fixes).
- dm-delay: fix a race between delay_presuspend and delay_bio (git-fixes).
- dm-integrity: do not modify bio's immutable bio_vec in integrity_metadata() (git-fixes).
- dm-raid: fix lockdep waring in 'pers-&gt;hot_add_disk' (git-fixes).
- dm-verity, dm-crypt: align 'struct bvec_iter' correctly (git-fixes).
- dm-verity: align struct dm_verity_fec_io properly (git-fixes).
- dm: add cond_resched() to dm_wq_work() (git-fixes).
- dm: call the resume method on internal suspend (git-fixes).
- dm: do not lock fs when the map is NULL during suspend or resume (git-fixes).
- dm: do not lock fs when the map is NULL in process of resume (git-fixes).
- dm: remove flush_scheduled_work() during local_exit() (git-fixes).
- dm: send just one event on resize, not two (git-fixes).
- dma: xilinx_dpdma: Fix locking (git-fixes).
- dmaengine: idxd: Fix oops during rmmod on single-CPU platforms (git-fixes).
- dmaengine: owl: fix register access functions (git-fixes).
- dmaengine: tegra186: Fix residual calculation (git-fixes).
- docs: Document the FAN_FS_ERROR event (stable-fixes).
- drm-print: add drm_dbg_driver to improve namespace symmetry (stable-fixes).
- drm/amd/display: Do not recursively call manual trigger programming (stable-fixes).
- drm/amd/display: Fix nanosec stat overflow (stable-fixes).
- drm/amd/display: fix disable otg wa logic in DCN316 (stable-fixes).
- drm/amd/pm: fixes a random hang in S4 for SMU v13.0.4/11 (stable-fixes).
- drm/amdgpu/sdma5.2: use legacy HDP flush for SDMA2/3 (stable-fixes).
- drm/amdgpu: Fix leak when GPU memory allocation fails (stable-fixes).
- drm/amdgpu: Reset dGPU if suspend got aborted (stable-fixes).
- drm/amdgpu: always force full reset for SOC21 (stable-fixes).
- drm/amdgpu: fix incorrect active rb bitmap for gfx11 (stable-fixes).
- drm/amdgpu: fix incorrect number of active RBs for gfx11 (stable-fixes).
- drm/amdgpu: once more fix the call oder in amdgpu_ttm_move() v2 (git-fixes).
- drm/amdgpu: validate the parameters of bo mapping operations more clearly (git-fixes).
- drm/amdkfd: Reset GPU on queue preemption failure (stable-fixes).
- drm/ast: Fix soft lockup (git-fixes).
- drm/client: Fully protect modes[] with dev-&gt;mode_config.mutex (stable-fixes).
- drm/i915/cdclk: Fix CDCLK programming order when pipes are active (git-fixes).
- drm/i915/vrr: Disable VRR when using bigjoiner (stable-fixes).
- drm/i915: Disable port sync when bigjoiner is used (stable-fixes).
- drm/msm/dp: fix typo in dp_display_handle_port_status_changed() (git-fixes).
- drm/nouveau/nvkm: add a replacement for nvkm_notify (bsc#1223834)
- drm/panel: ili9341: Respect deferred probe (git-fixes).
- drm/panel: ili9341: Use predefined error codes (git-fixes).
- drm/panel: visionox-rm69299: do not unregister DSI device (git-fixes).
- drm/vc4: do not check if plane-&gt;state-&gt;fb == state-&gt;fb (stable-fixes).
- drm/vmwgfx: Enable DMA mappings with SEV (git-fixes).
- drm/vmwgfx: Fix crtc's atomic check conditional (git-fixes).
- drm/vmwgfx: Fix invalid reads in fence signaled events (git-fixes).
- drm/vmwgfx: Sort primary plane formats by order of preference (git-fixes).
- drm: nv04: Fix out of bounds access (git-fixes).
- drm: panel-orientation-quirks: Add quirk for GPD Win Mini (stable-fixes).
- drm: panel-orientation-quirks: Add quirk for Lenovo Legion Go (stable-fixes).
- dump_stack: Do not get cpu_sync for panic CPU (bsc#1223574).
- fbdev: fix incorrect address computation in deferred IO (git-fixes).
- fbdev: viafb: fix typo in hw_bitblt_1 and hw_bitblt_2 (stable-fixes).
- fbmon: prevent division by zero in fb_videomode_from_videomode() (stable-fixes).
- fix build warning
- fuse: do not unhash root (bsc#1223951).
- fuse: fix root lookup with nonzero generation (bsc#1223950).
- hwmon: (amc6821) add of_match table (stable-fixes).
- i2c: pxa: hide unused icr_bits[] variable (git-fixes).
- i2c: smbus: fix NULL function pointer dereference (git-fixes).
- i40e: Fix VF MAC filter removal (git-fixes).
- idma64: Do not try to serve interrupts when device is powered off (git-fixes).
- iio: accel: mxc4005: Interrupt handling fixes (git-fixes).
- iio:imu: adis16475: Fix sync mode setting (git-fixes).
- init/main.c: Fix potential static_command_line memory overflow (git-fixes).
- iommu/amd: Add a length limitation for the ivrs_acpihid command-line parameter (git-fixes).
- iommu/amd: Do not block updates to GATag if guest mode is on (git-fixes).
- iommu/amd: Fix 'Guest Virtual APIC Table Root Pointer' configuration in IRTE (git-fixes).
- iommu/amd: Fix domain flush size when syncing iotlb (git-fixes).
- iommu/amd: Fix error handling for pdev_pri_ats_enable() (git-fixes).
- iommu/arm-smmu-qcom: Limit the SMR groups to 128 (git-fixes).
- iommu/arm-smmu-v3: Acknowledge pri/event queue overflow if any (git-fixes).
- iommu/arm-smmu-v3: Work around MMU-600 erratum 1076982 (git-fixes).
- iommu/fsl: fix all kernel-doc warnings in fsl_pamu.c (git-fixes).
- iommu/iova: Fix alloc iova overflows issue (git-fixes).
- iommu/mediatek: Flush IOTLB completely only if domain has been attached (git-fixes).
- iommu/rockchip: Fix unwind goto issue (git-fixes).
- iommu/sprd: Release dma buffer to avoid memory leak (git-fixes).
- iommu/vt-d: Allocate local memory for page request queue (git-fixes).
- iommu/vt-d: Allow zero SAGAW if second-stage not supported (git-fixes).
- iommu/vt-d: Fix error handling in sva enable/disable paths (git-fixes).
- iommu: Fix error unwind in iommu_group_alloc() (git-fixes).
- ipv6/addrconf: fix a potential refcount underflow for idev (git-fixes).
- kABI: Adjust trace_iterator.wait_index (git-fixes).
- kprobes: Fix double free of kretprobe_holder (bsc#1220901).
- kprobes: Fix possible use-after-free issue on kprobe registration (git-fixes).
- libnvdimm/of_pmem: Use devm_kstrdup instead of kstrdup and check its return value (git-fixes).
- libnvdimm/region: Allow setting align attribute on regions without mappings (git-fixes).
- livepatch: Fix missing newline character in klp_resolve_symbols() (bsc#1223539).
- md/raid1: fix choose next idle in read_balance() (git-fixes).
- md: Do not clear MD_CLOSING when the raid is about to stop (git-fixes).
- md: do not clear MD_RECOVERY_FROZEN for new dm-raid until resume (git-fixes).
- media: cec: core: remove length check of Timer Status (stable-fixes).
- media: sta2x11: fix irq handler cast (stable-fixes).
- mei: me: add arrow lake point H DID (stable-fixes).
- mei: me: add arrow lake point S DID (stable-fixes).
- mei: me: disable RPL-S on SPS and IGN firmwares (git-fixes).
- mm/vmscan: make sure wakeup_kswapd with managed zone (bsc#1223473).
- mmc: sdhci-msm: pervent access to suspended controller (git-fixes).
- mtd: diskonchip: work around ubsan link failure (stable-fixes).
- nd_btt: Make BTT lanes preemptible (git-fixes).
- net: bridge: vlan: fix memory leak in __allowed_ingress (git-fixes).
- net: fix a memleak when uncloning an skb dst and its metadata (git-fixes).
- net: fix skb leak in __skb_tstamp_tx() (git-fixes).
- net: ipv6: ensure we call ipv6_mc_down() at most once (git-fixes).
- net: mld: fix reference count leak in mld_{query | report}_work() (git-fixes).
- net: stream: purge sk_error_queue in sk_stream_kill_queues() (git-fixes).
- net: usb: ax88179_178a: avoid the interface always configured as random address (git-fixes).
- net: usb: ax88179_178a: avoid writing the mac address before first reading (git-fixes).
- net: usb: ax88179_178a: stop lying about skb-&gt;truesize (git-fixes).
- net: vlan: fix underflow for the real_dev refcnt (git-fixes).
- netfilter: br_netfilter: Drop dst references before setting (git-fixes).
- netfilter: ipt_CLUSTERIP: fix refcount leak in clusterip_tg_check() (git-fixes).
- netfilter: nft_ct: fix l3num expectations with inet pseudo family (git-fixes).
- nfsd: Fixed mount issue with KOTD (bsc#1223380 bsc#1217408 bsc#1223640).
- nfsd: use __fput_sync() to avoid delayed closing of files (bsc#1223380 bsc#1217408).
- nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
- nilfs2: fix OOB in nilfs_set_de_type (git-fixes).
- nouveau: fix function cast warning (git-fixes).
- nouveau: fix instmem race condition around ptr stores (git-fixes).
- nvdimm/namespace: drop nested variable in create_namespace_pmem() (git-fixes).
- nvdimm: Allow overwrite in the presence of disabled dimms (git-fixes).
- nvdimm: Fix badblocks clear off-by-one error (git-fixes).
- nvdimm: Fix dereference after free in register_nvdimm_pmu() (git-fixes).
- nvdimm: Fix firmware activation deadlock scenarios (git-fixes).
- nvdimm: Fix memleak of pmu attr_groups in unregister_nvdimm_pmu() (git-fixes).
- pci_iounmap(): Fix MMIO mapping leak (git-fixes).
- phy: tegra: xusb: Add API to retrieve the port number of phy (stable-fixes).
- pinctrl: renesas: checker: Limit cfg reg enum checks to provided IDs (stable-fixes).
- platform/x86: intel-vbtn: Update tablet mode switch at end of probe (git-fixes).
- platform/x86: touchscreen_dmi: Add an extra entry for a variant of the Chuwi Vi8 tablet (stable-fixes).
- powerpc/kasan: Do not instrument non-maskable or raw interrupts (bsc#1223191).
- powerpc/pseries/iommu: LPAR panics when rebooted with a frozen PE (bsc#1222011 ltc#205900).
- powerpc/rtas: define pr_fmt and convert printk call sites (bsc#1223369 ltc#205888).
- powerpc/rtas: export rtas_error_rc() for reuse (bsc#1223369 ltc#205888).
- powerpc: Avoid nmi_enter/nmi_exit in real mode interrupt (bsc#1221645 ltc#205739 bsc#1223191).
- powerpc: Refactor verification of MSR_RI (bsc#1223191).
- printk: Add this_cpu_in_panic() (bsc#1223574).
- printk: Adjust mapping for 32bit seq macros (bsc#1223574).
- printk: Avoid non-panic CPUs writing to ringbuffer (bsc#1223574).
- printk: Disable passing console lock owner completely during panic() (bsc#1223574).
- printk: Drop console_sem during panic (bsc#1223574).
- printk: Rename abandon_console_lock_in_panic() to other_cpu_in_panic() (bsc#1223574).
- printk: Use prb_first_seq() as base for 32bit seq macros (bsc#1223574).
- printk: Wait for all reserved records with pr_flush() (bsc#1223574).
- printk: nbcon: Relocate 32bit seq macros (bsc#1223574).
- printk: ringbuffer: Clarify special lpos values (bsc#1223574).
- printk: ringbuffer: Cleanup reader terminology (bsc#1223574).
- printk: ringbuffer: Do not skip non-finalized records with prb_next_seq() (bsc#1223574).
- printk: ringbuffer: Improve prb_next_seq() performance (bsc#1223574).
- printk: ringbuffer: Skip non-finalized records in panic (bsc#1223574).
- pstore/zone: Add a null pointer check to the psz_kmsg_read (stable-fixes).
- ring-buffer: Do not set shortest_full when full target is hit (git-fixes).
- ring-buffer: Fix full_waiters_pending in poll (git-fixes).
- ring-buffer: Fix resetting of shortest_full (git-fixes).
- ring-buffer: Fix waking up ring buffer readers (git-fixes).
- ring-buffer: Make wake once of ring_buffer_wait() more robust (git-fixes).
- ring-buffer: Use wait_event_interruptible() in ring_buffer_wait() (git-fixes).
- ring-buffer: use READ_ONCE() to read cpu_buffer-&gt;commit_page in concurrent environment (git-fixes).
- s390/cio: Ensure the copied buf is NUL terminated (git-fixes bsc#1223875).
- s390/decompressor: fix misaligned symbol build error (git-fixes bsc#1223785).
- s390/mm: Fix clearing storage keys for huge pages (git-fixes bsc#1223877).
- s390/mm: Fix storage key clearing for guest huge pages (git-fixes bsc#1223878).
- s390/qeth: Fix kernel panic after setting hsuid (git-fixes bsc#1223879).
- s390/scm: fix virtual vs physical address confusion (git-fixes bsc#1223784).
- s390/vdso: Add CFI for RA register to asm macro vdso_func (git-fixes bsc#1223876).
- s390/vdso: drop '-fPIC' from LDFLAGS (git-fixes bsc#1223598).
- s390/zcrypt: fix reference counting on zcrypt card objects (git-fixes bsc#1223595).
- s390: Fixed LPM of lpar failure with error HSCLA2CF in 19th loops (jsc#PED-542 git-fixes bsc#1213573 ltc#203238).
- s390: Fixed kernel backtrack (bsc#1141539 git-fixes).
- serial/pmac_zilog: Remove flawed mitigation for rx irq flood (git-fixes).
- serial: core: Provide port lock wrappers (stable-fixes).
- serial: core: fix kernel-doc for uart_port_unlock_irqrestore() (git-fixes).
- serial: mxs-auart: add spinlock around changing cts state (git-fixes).
- slimbus: qcom-ngd-ctrl: Add timeout for wait operation (git-fixes).
- speakup: Avoid crash on very long word (git-fixes).
- speakup: Fix 8bit characters from direct synth (git-fixes).
- tcp/udp: Fix memleaks of sk and zerocopy skbs with TX timestamp (git-fixes).
- thunderbolt: Avoid notify PM core about runtime PM resume (stable-fixes).
- thunderbolt: Fix wake configurations after device unplug (stable-fixes).
- tracing/net_sched: Fix tracepoints that save qdisc_dev() as a string (git-fixes).
- tracing/ring-buffer: Fix wait_on_pipe() race (git-fixes).
- tracing: Have saved_cmdlines arrays all in one allocation (git-fixes).
- tracing: Remove precision vsnprintf() check from print event (git-fixes).
- tracing: Show size of requested perf buffer (git-fixes).
- tracing: Use .flush() call to wake up readers (git-fixes).
- usb: Disable USB3 LPM at shutdown (stable-fixes).
- usb: Fix regression caused by invalid ep0 maxpacket in virtual SuperSpeed device (git-fixes).
- usb: dwc2: host: Fix dereference issue in DDMA completion flow (git-fixes).
- usb: gadget: composite: fix OS descriptors w_value logic (git-fixes).
- usb: gadget: f_fs: Fix a race condition when processing setup packets (git-fixes).
- usb: gadget: f_ncm: Fix UAF ncm object at re-bind after usb ep transport error (stable-fixes).
- usb: gadget: tegra-xudc: Fix USB3 PHY retrieval logic (git-fixes).
- usb: ohci: Prevent missed ohci interrupts (git-fixes).
- usb: sl811-hcd: only defined function checkdone if QUIRK2 is defined (stable-fixes).
- usb: typec: tcpci: add generic tcpci fallback compatible (stable-fixes).
- usb: typec: tcpm: Check for port partner validity before consuming it (git-fixes).
- usb: typec: tcpm: unregister existing source caps before re-registration (bsc#1220569).
- usb: typec: ucsi: Ack unsupported commands (stable-fixes).
- usb: typec: ucsi: Clear UCSI_CCI_RESET_COMPLETE before reset (stable-fixes).
- usb: typec: ucsi: Fix connector check on init (git-fixes).
- usb: udc: remove warning when queue disabled ep (stable-fixes).
- vdpa/mlx5: Allow CVQ size changes (git-fixes).
- virtio: treat alloc_dax() -EOPNOTSUPP failure as non-fatal (bsc#1223949).
- wifi: ath9k: fix LNA selection in ath_ant_try_scan() (stable-fixes).
- wifi: iwlwifi: mvm: remove old PASN station when adding a new one (git-fixes).
- wifi: iwlwifi: mvm: return uid from iwl_mvm_build_scan_cmd (git-fixes).
- wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes (stable-fixes).
- wifi: nl80211: do not free NULL coalescing rule (git-fixes).
- x86/cpufeatures: Fix dependencies for GFNI, VAES, and VPCLMULQDQ (git-fixes).
- x86/mm: Ensure input to pfn_to_kaddr() is treated as a 64-bit type (jsc#PED-7167 git-fixes).
- x86/sev: Skip ROM range scans and validation for SEV-SNP guests (jsc#PED-7167 git-fixes).
- x86/xen: Add some null pointer checking to smp.c (git-fixes).
- x86/xen: add CPU dependencies for 32-bit build (git-fixes).
- x86/xen: fix percpu vcpu_info allocation (git-fixes).
- xen-netback: properly sync TX responses (git-fixes).
- xen-netfront: Add missing skb_mark_for_recycle (git-fixes).
- xen/gntdev: Fix the abuse of underlying struct page in DMA-buf import (git-fixes).
- xen/xenbus: document will_handle argument for xenbus_watch_path() (git-fixes).
- xfrm6: fix inet6_dev refcount underflow problem (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-15"/>
	<updated date="2024-05-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141539">SUSE bug 1141539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177529">SUSE bug 1177529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190576">SUSE bug 1190576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192145">SUSE bug 1192145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192837">SUSE bug 1192837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196869">SUSE bug 1196869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200313">SUSE bug 1200313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201308">SUSE bug 1201308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201489">SUSE bug 1201489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203906">SUSE bug 1203906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203935">SUSE bug 1203935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204614">SUSE bug 1204614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207361">SUSE bug 1207361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211592">SUSE bug 1211592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213573">SUSE bug 1213573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217408">SUSE bug 1217408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218562">SUSE bug 1218562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218917">SUSE bug 1218917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219104">SUSE bug 1219104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219126">SUSE bug 1219126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219141">SUSE bug 1219141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219169">SUSE bug 1219169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219170">SUSE bug 1219170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219264">SUSE bug 1219264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220342">SUSE bug 1220342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220492">SUSE bug 1220492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220569">SUSE bug 1220569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220761">SUSE bug 1220761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220901">SUSE bug 1220901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220915">SUSE bug 1220915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220935">SUSE bug 1220935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221042">SUSE bug 1221042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221044">SUSE bug 1221044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221080">SUSE bug 1221080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221084">SUSE bug 1221084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221088">SUSE bug 1221088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221162">SUSE bug 1221162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221299">SUSE bug 1221299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221612">SUSE bug 1221612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221617">SUSE bug 1221617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221645">SUSE bug 1221645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221791">SUSE bug 1221791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221825">SUSE bug 1221825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222011">SUSE bug 1222011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222051">SUSE bug 1222051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222247">SUSE bug 1222247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222266">SUSE bug 1222266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222294">SUSE bug 1222294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222307">SUSE bug 1222307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222357">SUSE bug 1222357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222368">SUSE bug 1222368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222379">SUSE bug 1222379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222416">SUSE bug 1222416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222422">SUSE bug 1222422</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222424">SUSE bug 1222424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222427">SUSE bug 1222427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222428">SUSE bug 1222428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222430">SUSE bug 1222430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222431">SUSE bug 1222431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222435">SUSE bug 1222435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222437">SUSE bug 1222437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222445">SUSE bug 1222445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222449">SUSE bug 1222449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222482">SUSE bug 1222482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222503">SUSE bug 1222503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222520">SUSE bug 1222520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222536">SUSE bug 1222536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222549">SUSE bug 1222549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222550">SUSE bug 1222550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222557">SUSE bug 1222557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222559">SUSE bug 1222559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222585">SUSE bug 1222585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222586">SUSE bug 1222586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222596">SUSE bug 1222596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222609">SUSE bug 1222609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222610">SUSE bug 1222610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222613">SUSE bug 1222613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222615">SUSE bug 1222615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222618">SUSE bug 1222618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222624">SUSE bug 1222624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222630">SUSE bug 1222630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222632">SUSE bug 1222632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222660">SUSE bug 1222660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222662">SUSE bug 1222662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222664">SUSE bug 1222664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222666">SUSE bug 1222666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222669">SUSE bug 1222669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222671">SUSE bug 1222671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222677">SUSE bug 1222677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222678">SUSE bug 1222678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222680">SUSE bug 1222680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222703">SUSE bug 1222703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222704">SUSE bug 1222704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222706">SUSE bug 1222706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222709">SUSE bug 1222709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222710">SUSE bug 1222710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222720">SUSE bug 1222720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222721">SUSE bug 1222721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222724">SUSE bug 1222724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222726">SUSE bug 1222726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222727">SUSE bug 1222727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222764">SUSE bug 1222764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222772">SUSE bug 1222772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222773">SUSE bug 1222773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222776">SUSE bug 1222776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222781">SUSE bug 1222781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222784">SUSE bug 1222784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222785">SUSE bug 1222785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222787">SUSE bug 1222787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222790">SUSE bug 1222790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222791">SUSE bug 1222791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222792">SUSE bug 1222792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222796">SUSE bug 1222796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222798">SUSE bug 1222798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222801">SUSE bug 1222801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222812">SUSE bug 1222812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222824">SUSE bug 1222824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222829">SUSE bug 1222829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222832">SUSE bug 1222832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222836">SUSE bug 1222836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222838">SUSE bug 1222838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222866">SUSE bug 1222866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222867">SUSE bug 1222867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222869">SUSE bug 1222869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222876">SUSE bug 1222876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222878">SUSE bug 1222878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222879">SUSE bug 1222879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222881">SUSE bug 1222881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222883">SUSE bug 1222883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222888">SUSE bug 1222888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222894">SUSE bug 1222894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222901">SUSE bug 1222901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222968">SUSE bug 1222968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223012">SUSE bug 1223012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223014">SUSE bug 1223014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223016">SUSE bug 1223016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223024">SUSE bug 1223024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223030">SUSE bug 1223030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223033">SUSE bug 1223033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223034">SUSE bug 1223034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223035">SUSE bug 1223035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223036">SUSE bug 1223036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223037">SUSE bug 1223037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223041">SUSE bug 1223041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223042">SUSE bug 1223042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223051">SUSE bug 1223051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223052">SUSE bug 1223052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223056">SUSE bug 1223056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223057">SUSE bug 1223057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223058">SUSE bug 1223058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223060">SUSE bug 1223060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223061">SUSE bug 1223061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223065">SUSE bug 1223065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223066">SUSE bug 1223066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223067">SUSE bug 1223067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223068">SUSE bug 1223068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223076">SUSE bug 1223076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223078">SUSE bug 1223078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223111">SUSE bug 1223111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223115">SUSE bug 1223115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223118">SUSE bug 1223118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223187">SUSE bug 1223187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223189">SUSE bug 1223189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223190">SUSE bug 1223190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223191">SUSE bug 1223191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223196">SUSE bug 1223196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223197">SUSE bug 1223197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223198">SUSE bug 1223198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223275">SUSE bug 1223275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223323">SUSE bug 1223323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223369">SUSE bug 1223369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223380">SUSE bug 1223380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223473">SUSE bug 1223473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223474">SUSE bug 1223474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223475">SUSE bug 1223475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223477">SUSE bug 1223477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223478">SUSE bug 1223478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223479">SUSE bug 1223479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223481">SUSE bug 1223481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223482">SUSE bug 1223482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223484">SUSE bug 1223484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223487">SUSE bug 1223487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223490">SUSE bug 1223490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223496">SUSE bug 1223496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223498">SUSE bug 1223498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223499">SUSE bug 1223499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223501">SUSE bug 1223501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223502">SUSE bug 1223502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223503">SUSE bug 1223503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223505">SUSE bug 1223505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223509">SUSE bug 1223509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223511">SUSE bug 1223511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223512">SUSE bug 1223512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223513">SUSE bug 1223513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223516">SUSE bug 1223516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223517">SUSE bug 1223517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223518">SUSE bug 1223518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223519">SUSE bug 1223519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223520">SUSE bug 1223520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223522">SUSE bug 1223522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223523">SUSE bug 1223523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223525">SUSE bug 1223525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223536">SUSE bug 1223536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223539">SUSE bug 1223539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223574">SUSE bug 1223574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223595">SUSE bug 1223595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223598">SUSE bug 1223598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223634">SUSE bug 1223634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223640">SUSE bug 1223640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223643">SUSE bug 1223643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223644">SUSE bug 1223644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223645">SUSE bug 1223645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223646">SUSE bug 1223646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223648">SUSE bug 1223648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223655">SUSE bug 1223655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223657">SUSE bug 1223657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223660">SUSE bug 1223660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223661">SUSE bug 1223661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223663">SUSE bug 1223663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223664">SUSE bug 1223664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223668">SUSE bug 1223668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223686">SUSE bug 1223686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223693">SUSE bug 1223693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223705">SUSE bug 1223705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223714">SUSE bug 1223714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223735">SUSE bug 1223735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223745">SUSE bug 1223745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223784">SUSE bug 1223784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223785">SUSE bug 1223785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223790">SUSE bug 1223790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223816">SUSE bug 1223816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223821">SUSE bug 1223821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223822">SUSE bug 1223822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223824">SUSE bug 1223824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223827">SUSE bug 1223827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223834">SUSE bug 1223834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223875">SUSE bug 1223875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223876">SUSE bug 1223876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223877">SUSE bug 1223877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223878">SUSE bug 1223878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223879">SUSE bug 1223879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223894">SUSE bug 1223894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223921">SUSE bug 1223921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223922">SUSE bug 1223922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223923">SUSE bug 1223923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223924">SUSE bug 1223924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223929">SUSE bug 1223929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223931">SUSE bug 1223931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223932">SUSE bug 1223932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223934">SUSE bug 1223934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223941">SUSE bug 1223941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223948">SUSE bug 1223948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223949">SUSE bug 1223949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223950">SUSE bug 1223950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223951">SUSE bug 1223951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223952">SUSE bug 1223952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223953">SUSE bug 1223953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223956">SUSE bug 1223956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223957">SUSE bug 1223957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223960">SUSE bug 1223960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223962">SUSE bug 1223962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223963">SUSE bug 1223963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223964">SUSE bug 1223964</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47047/">CVE-2021-47047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47047">CVE-2021-47047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47181/">CVE-2021-47181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47181">CVE-2021-47181 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47182/">CVE-2021-47182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47182">CVE-2021-47182 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47183/">CVE-2021-47183 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47183">CVE-2021-47183 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47184/">CVE-2021-47184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47184">CVE-2021-47184 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47185/">CVE-2021-47185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47185">CVE-2021-47185 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47187/">CVE-2021-47187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47187">CVE-2021-47187 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47188/">CVE-2021-47188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47188">CVE-2021-47188 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47189/">CVE-2021-47189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47189">CVE-2021-47189 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47191/">CVE-2021-47191 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47191">CVE-2021-47191 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47192/">CVE-2021-47192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47192">CVE-2021-47192 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47193/">CVE-2021-47193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47193">CVE-2021-47193 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47194/">CVE-2021-47194 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47194">CVE-2021-47194 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47195/">CVE-2021-47195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47195">CVE-2021-47195 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47196/">CVE-2021-47196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47196">CVE-2021-47196 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47197/">CVE-2021-47197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47197">CVE-2021-47197 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47198/">CVE-2021-47198 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47198">CVE-2021-47198 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47199/">CVE-2021-47199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47199">CVE-2021-47199 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47200/">CVE-2021-47200 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47200">CVE-2021-47200 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47201/">CVE-2021-47201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47201">CVE-2021-47201 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47202/">CVE-2021-47202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47202">CVE-2021-47202 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47203/">CVE-2021-47203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47203">CVE-2021-47203 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47204/">CVE-2021-47204 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47204">CVE-2021-47204 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47205/">CVE-2021-47205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47205">CVE-2021-47205 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47206/">CVE-2021-47206 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47206">CVE-2021-47206 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47207/">CVE-2021-47207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47207">CVE-2021-47207 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47209/">CVE-2021-47209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47209">CVE-2021-47209 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47210/">CVE-2021-47210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47210">CVE-2021-47210 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47211/">CVE-2021-47211 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47211">CVE-2021-47211 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47212/">CVE-2021-47212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47212">CVE-2021-47212 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47214/">CVE-2021-47214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47214">CVE-2021-47214 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47215/">CVE-2021-47215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47215">CVE-2021-47215 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47216/">CVE-2021-47216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47216">CVE-2021-47216 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47217/">CVE-2021-47217 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47217">CVE-2021-47217 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47218/">CVE-2021-47218 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47218">CVE-2021-47218 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47219/">CVE-2021-47219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47219">CVE-2021-47219 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48631/">CVE-2022-48631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48631">CVE-2022-48631 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48632/">CVE-2022-48632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48632">CVE-2022-48632 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48634/">CVE-2022-48634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48634">CVE-2022-48634 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48636/">CVE-2022-48636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48636">CVE-2022-48636 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48637/">CVE-2022-48637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48637">CVE-2022-48637 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48638/">CVE-2022-48638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48638">CVE-2022-48638 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48639/">CVE-2022-48639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48639">CVE-2022-48639 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48640/">CVE-2022-48640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48640">CVE-2022-48640 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48642/">CVE-2022-48642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48642">CVE-2022-48642 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48644/">CVE-2022-48644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48644">CVE-2022-48644 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48646/">CVE-2022-48646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48646">CVE-2022-48646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48647/">CVE-2022-48647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48647">CVE-2022-48647 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48648/">CVE-2022-48648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48648">CVE-2022-48648 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48650/">CVE-2022-48650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48650">CVE-2022-48650 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48651/">CVE-2022-48651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48651">CVE-2022-48651 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48652/">CVE-2022-48652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48652">CVE-2022-48652 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48653/">CVE-2022-48653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48653">CVE-2022-48653 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48654/">CVE-2022-48654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48654">CVE-2022-48654 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48655/">CVE-2022-48655 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48655">CVE-2022-48655 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48656/">CVE-2022-48656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48656">CVE-2022-48656 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48657/">CVE-2022-48657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48657">CVE-2022-48657 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48658/">CVE-2022-48658 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48658">CVE-2022-48658 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48659/">CVE-2022-48659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48659">CVE-2022-48659 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48660/">CVE-2022-48660 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48660">CVE-2022-48660 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48662/">CVE-2022-48662 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48662">CVE-2022-48662 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48663/">CVE-2022-48663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48663">CVE-2022-48663 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48667/">CVE-2022-48667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48667">CVE-2022-48667 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48668/">CVE-2022-48668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48668">CVE-2022-48668 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48671/">CVE-2022-48671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48671">CVE-2022-48671 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48672/">CVE-2022-48672 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48672">CVE-2022-48672 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48673/">CVE-2022-48673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48673">CVE-2022-48673 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48675/">CVE-2022-48675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48675">CVE-2022-48675 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48686/">CVE-2022-48686 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48686">CVE-2022-48686 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48687/">CVE-2022-48687 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48687">CVE-2022-48687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48688/">CVE-2022-48688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48688">CVE-2022-48688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48690/">CVE-2022-48690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48690">CVE-2022-48690 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48692/">CVE-2022-48692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48692">CVE-2022-48692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48693/">CVE-2022-48693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48693">CVE-2022-48693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48694/">CVE-2022-48694 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48694">CVE-2022-48694 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48695/">CVE-2022-48695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48695">CVE-2022-48695 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48697/">CVE-2022-48697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48697">CVE-2022-48697 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48698/">CVE-2022-48698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48698">CVE-2022-48698 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48700/">CVE-2022-48700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48700">CVE-2022-48700 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48701/">CVE-2022-48701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48701">CVE-2022-48701 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48702/">CVE-2022-48702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48702">CVE-2022-48702 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48703/">CVE-2022-48703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48703">CVE-2022-48703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48704/">CVE-2022-48704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48704">CVE-2022-48704 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-2860/">CVE-2023-2860 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2860">CVE-2023-2860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52488/">CVE-2023-52488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52488">CVE-2023-52488 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52503/">CVE-2023-52503 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52503">CVE-2023-52503 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52561/">CVE-2023-52561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52561">CVE-2023-52561 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52585/">CVE-2023-52585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52585">CVE-2023-52585 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52589/">CVE-2023-52589 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52589">CVE-2023-52589 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52590/">CVE-2023-52590 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52590">CVE-2023-52590 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52591/">CVE-2023-52591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52591">CVE-2023-52591 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52593/">CVE-2023-52593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52593">CVE-2023-52593 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52614/">CVE-2023-52614 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52614">CVE-2023-52614 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52616/">CVE-2023-52616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52616">CVE-2023-52616 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52620/">CVE-2023-52620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52620">CVE-2023-52620 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52627/">CVE-2023-52627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52627">CVE-2023-52627 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52635/">CVE-2023-52635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52635">CVE-2023-52635 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52636/">CVE-2023-52636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52636">CVE-2023-52636 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52645/">CVE-2023-52645 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52645">CVE-2023-52645 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52652/">CVE-2023-52652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52652">CVE-2023-52652 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6270/">CVE-2023-6270 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0639/">CVE-2024-0639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0639">CVE-2024-0639 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0841/">CVE-2024-0841 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0841">CVE-2024-0841 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22099/">CVE-2024-22099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22099">CVE-2024-22099 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23307/">CVE-2024-23307 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23307">CVE-2024-23307 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-23848/">CVE-2024-23848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23848">CVE-2024-23848 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23850/">CVE-2024-23850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23850">CVE-2024-23850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26601/">CVE-2024-26601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26601">CVE-2024-26601 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26610/">CVE-2024-26610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26610">CVE-2024-26610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26656/">CVE-2024-26656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26656">CVE-2024-26656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26660/">CVE-2024-26660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26660">CVE-2024-26660 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26671/">CVE-2024-26671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26671">CVE-2024-26671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26673/">CVE-2024-26673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26673">CVE-2024-26673 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26675/">CVE-2024-26675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26675">CVE-2024-26675 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26680/">CVE-2024-26680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26680">CVE-2024-26680 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26681/">CVE-2024-26681 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26681">CVE-2024-26681 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26684/">CVE-2024-26684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26684">CVE-2024-26684 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26685/">CVE-2024-26685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26685">CVE-2024-26685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26687/">CVE-2024-26687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26687">CVE-2024-26687 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26688/">CVE-2024-26688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26688">CVE-2024-26688 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26689/">CVE-2024-26689 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26689">CVE-2024-26689 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26696/">CVE-2024-26696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26696">CVE-2024-26696 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26697/">CVE-2024-26697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26697">CVE-2024-26697 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26702/">CVE-2024-26702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26702">CVE-2024-26702 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26704/">CVE-2024-26704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26704">CVE-2024-26704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26718/">CVE-2024-26718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26718">CVE-2024-26718 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26722/">CVE-2024-26722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26722">CVE-2024-26722 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26727/">CVE-2024-26727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26727">CVE-2024-26727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26733/">CVE-2024-26733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26733">CVE-2024-26733 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26736/">CVE-2024-26736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26736">CVE-2024-26736 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26737/">CVE-2024-26737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26737">CVE-2024-26737 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26739/">CVE-2024-26739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26739">CVE-2024-26739 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26743/">CVE-2024-26743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26743">CVE-2024-26743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26744/">CVE-2024-26744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26744">CVE-2024-26744 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26745/">CVE-2024-26745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26745">CVE-2024-26745 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26747/">CVE-2024-26747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26747">CVE-2024-26747 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26749/">CVE-2024-26749 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26749">CVE-2024-26749 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26751/">CVE-2024-26751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26751">CVE-2024-26751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26754/">CVE-2024-26754 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26754">CVE-2024-26754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26760/">CVE-2024-26760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26760">CVE-2024-26760 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-26763/">CVE-2024-26763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26763">CVE-2024-26763 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26764/">CVE-2024-26764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26764">CVE-2024-26764 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26766/">CVE-2024-26766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26766">CVE-2024-26766 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26769/">CVE-2024-26769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26769">CVE-2024-26769 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26771/">CVE-2024-26771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26771">CVE-2024-26771 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26772/">CVE-2024-26772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26772">CVE-2024-26772 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26773/">CVE-2024-26773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26773">CVE-2024-26773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26776/">CVE-2024-26776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26776">CVE-2024-26776 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26779/">CVE-2024-26779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26779">CVE-2024-26779 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26783/">CVE-2024-26783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26783">CVE-2024-26783 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26787/">CVE-2024-26787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26787">CVE-2024-26787 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26790/">CVE-2024-26790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26790">CVE-2024-26790 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26792/">CVE-2024-26792 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26792">CVE-2024-26792 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26793/">CVE-2024-26793 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26793">CVE-2024-26793 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26798/">CVE-2024-26798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26798">CVE-2024-26798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26805/">CVE-2024-26805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26805">CVE-2024-26805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26807/">CVE-2024-26807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26807">CVE-2024-26807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26816/">CVE-2024-26816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26816">CVE-2024-26816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26817/">CVE-2024-26817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26817">CVE-2024-26817 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26820/">CVE-2024-26820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26820">CVE-2024-26820 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26825/">CVE-2024-26825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26825">CVE-2024-26825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26830/">CVE-2024-26830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26830">CVE-2024-26830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26833/">CVE-2024-26833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26833">CVE-2024-26833 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26836/">CVE-2024-26836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26836">CVE-2024-26836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26843/">CVE-2024-26843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26843">CVE-2024-26843 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26848/">CVE-2024-26848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26848">CVE-2024-26848 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26852/">CVE-2024-26852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26852">CVE-2024-26852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26853/">CVE-2024-26853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26853">CVE-2024-26853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26855/">CVE-2024-26855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26855">CVE-2024-26855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26856/">CVE-2024-26856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26856">CVE-2024-26856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26857/">CVE-2024-26857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26857">CVE-2024-26857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26861/">CVE-2024-26861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26861">CVE-2024-26861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26862/">CVE-2024-26862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26862">CVE-2024-26862 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26866/">CVE-2024-26866 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26866">CVE-2024-26866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26872/">CVE-2024-26872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26872">CVE-2024-26872 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26875/">CVE-2024-26875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26875">CVE-2024-26875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26878/">CVE-2024-26878 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26878">CVE-2024-26878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26879/">CVE-2024-26879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26879">CVE-2024-26879 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26881/">CVE-2024-26881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26881">CVE-2024-26881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26882/">CVE-2024-26882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26882">CVE-2024-26882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26883/">CVE-2024-26883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26883">CVE-2024-26883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26884/">CVE-2024-26884 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26884">CVE-2024-26884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26885/">CVE-2024-26885 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26885">CVE-2024-26885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26891/">CVE-2024-26891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26891">CVE-2024-26891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26893/">CVE-2024-26893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26893">CVE-2024-26893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26895/">CVE-2024-26895 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26895">CVE-2024-26895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26896/">CVE-2024-26896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26896">CVE-2024-26896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26897/">CVE-2024-26897 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26897">CVE-2024-26897 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26898/">CVE-2024-26898 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26898">CVE-2024-26898 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26901/">CVE-2024-26901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26901">CVE-2024-26901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26903/">CVE-2024-26903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26903">CVE-2024-26903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26917/">CVE-2024-26917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26917">CVE-2024-26917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26927/">CVE-2024-26927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26927">CVE-2024-26927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26948/">CVE-2024-26948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26948">CVE-2024-26948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26950/">CVE-2024-26950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26950">CVE-2024-26950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26951/">CVE-2024-26951 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26951">CVE-2024-26951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26955/">CVE-2024-26955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26955">CVE-2024-26955 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26956/">CVE-2024-26956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26956">CVE-2024-26956 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26960/">CVE-2024-26960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26960">CVE-2024-26960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26965/">CVE-2024-26965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26965">CVE-2024-26965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26966/">CVE-2024-26966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26966">CVE-2024-26966 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26969/">CVE-2024-26969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26969">CVE-2024-26969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26970/">CVE-2024-26970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26970">CVE-2024-26970 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26972/">CVE-2024-26972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26972">CVE-2024-26972 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26981/">CVE-2024-26981 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26981">CVE-2024-26981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26982/">CVE-2024-26982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26982">CVE-2024-26982 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26993/">CVE-2024-26993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26993">CVE-2024-26993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27013/">CVE-2024-27013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27013">CVE-2024-27013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27014/">CVE-2024-27014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27014">CVE-2024-27014 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27030/">CVE-2024-27030 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27030">CVE-2024-27030 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27038/">CVE-2024-27038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27038">CVE-2024-27038 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27039/">CVE-2024-27039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27039">CVE-2024-27039 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27041/">CVE-2024-27041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27041">CVE-2024-27041 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27043/">CVE-2024-27043 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27043">CVE-2024-27043 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27046/">CVE-2024-27046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27046">CVE-2024-27046 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27056/">CVE-2024-27056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27056">CVE-2024-27056 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27062/">CVE-2024-27062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27062">CVE-2024-27062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27389/">CVE-2024-27389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27389">CVE-2024-27389 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861189" comment="cluster-md-kmp-rt-5.14.21-150500.13.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861190" comment="dlm-kmp-rt-5.14.21-150500.13.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861191" comment="gfs2-kmp-rt-5.14.21-150500.13.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861192" comment="kernel-devel-rt-5.14.21-150500.13.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861193" comment="kernel-rt-5.14.21-150500.13.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861194" comment="kernel-rt-devel-5.14.21-150500.13.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861195" comment="kernel-rt-extra-5.14.21-150500.13.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861196" comment="kernel-rt-livepatch-5.14.21-150500.13.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861197" comment="kernel-rt-livepatch-devel-5.14.21-150500.13.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861198" comment="kernel-rt-optional-5.14.21-150500.13.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861199" comment="kernel-rt-vdso-5.14.21-150500.13.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861200" comment="kernel-rt_debug-5.14.21-150500.13.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861201" comment="kernel-rt_debug-devel-5.14.21-150500.13.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861202" comment="kernel-rt_debug-livepatch-devel-5.14.21-150500.13.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861203" comment="kernel-rt_debug-vdso-5.14.21-150500.13.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861204" comment="kernel-source-rt-5.14.21-150500.13.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861205" comment="kernel-syms-rt-5.14.21-150500.13.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861206" comment="kselftests-kmp-rt-5.14.21-150500.13.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861207" comment="ocfs2-kmp-rt-5.14.21-150500.13.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861208" comment="reiserfs-kmp-rt-5.14.21-150500.13.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4723" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1180833" ref_url="https://bugzilla.suse.com/1180833" source="BUGZILLA"/>
		<reference ref_id="1183101" ref_url="https://bugzilla.suse.com/1183101" source="BUGZILLA"/>
		<reference ref_id="1183102" ref_url="https://bugzilla.suse.com/1183102" source="BUGZILLA"/>
		<reference ref_id="1183103" ref_url="https://bugzilla.suse.com/1183103" source="BUGZILLA"/>
		<reference ref_id="1183105" ref_url="https://bugzilla.suse.com/1183105" source="BUGZILLA"/>
		<reference ref_id="1183107" ref_url="https://bugzilla.suse.com/1183107" source="BUGZILLA"/>
		<reference ref_id="1183108" ref_url="https://bugzilla.suse.com/1183108" source="BUGZILLA"/>
		<reference ref_id="1183110" ref_url="https://bugzilla.suse.com/1183110" source="BUGZILLA"/>
		<reference ref_id="1188574" ref_url="https://bugzilla.suse.com/1188574" source="BUGZILLA"/>
		<reference ref_id="1190229" ref_url="https://bugzilla.suse.com/1190229" source="BUGZILLA"/>
		<reference ref_id="1194551" ref_url="https://bugzilla.suse.com/1194551" source="BUGZILLA"/>
		<reference ref_id="1194552" ref_url="https://bugzilla.suse.com/1194552" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35654" ref_url="https://www.suse.com/security/cve/CVE-2020-35654/" source="CVE"/>
		<reference ref_id="CVE-2021-23437" ref_url="https://www.suse.com/security/cve/CVE-2021-23437/" source="CVE"/>
		<reference ref_id="CVE-2021-25289" ref_url="https://www.suse.com/security/cve/CVE-2021-25289/" source="CVE"/>
		<reference ref_id="CVE-2021-25290" ref_url="https://www.suse.com/security/cve/CVE-2021-25290/" source="CVE"/>
		<reference ref_id="CVE-2021-25292" ref_url="https://www.suse.com/security/cve/CVE-2021-25292/" source="CVE"/>
		<reference ref_id="CVE-2021-25293" ref_url="https://www.suse.com/security/cve/CVE-2021-25293/" source="CVE"/>
		<reference ref_id="CVE-2021-27921" ref_url="https://www.suse.com/security/cve/CVE-2021-27921/" source="CVE"/>
		<reference ref_id="CVE-2021-27922" ref_url="https://www.suse.com/security/cve/CVE-2021-27922/" source="CVE"/>
		<reference ref_id="CVE-2021-27923" ref_url="https://www.suse.com/security/cve/CVE-2021-27923/" source="CVE"/>
		<reference ref_id="CVE-2021-34552" ref_url="https://www.suse.com/security/cve/CVE-2021-34552/" source="CVE"/>
		<reference ref_id="CVE-2022-22815" ref_url="https://www.suse.com/security/cve/CVE-2022-22815/" source="CVE"/>
		<reference ref_id="CVE-2022-22816" ref_url="https://www.suse.com/security/cve/CVE-2022-22816/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018541.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

- Fixed ImagePath.Path array handling (bsc#1194552, CVE-2022-22815, bsc#1194551, CVE-2022-22816)
- Use snprintf instead of sprintf (bsc#1188574, CVE-2021-34552)
- Fix Memory DOS in Icns, Ico and Blp Image Plugins. (bsc#1183110, CVE-2021-27921, bsc#1183108, CVE-2021-27922, bsc#1183107, CVE-2021-27923)
- Fix OOB read in SgiRleDecode.c (bsc#1183102, CVE-2021-25293)
- Use more specific regex chars to prevent ReDoS (bsc#1183101, CVE-2021-25292)
- Fix negative size read in TiffDecode.c (bsc#1183105, CVE-2021-25290)
- Raise ValueError if color specifier is too long (bsc#1190229, CVE-2021-23437)
- Incorrect error code checking in TiffDecode.c (bsc#1183103, CVE-2021-25289)
- OOB Write in TiffDecode.c (bsc#1180833, CVE-2020-35654)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-17"/>
	<updated date="2024-05-17"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1180833">SUSE bug 1180833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183101">SUSE bug 1183101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183102">SUSE bug 1183102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183103">SUSE bug 1183103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183105">SUSE bug 1183105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183107">SUSE bug 1183107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183108">SUSE bug 1183108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183110">SUSE bug 1183110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188574">SUSE bug 1188574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190229">SUSE bug 1190229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194551">SUSE bug 1194551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194552">SUSE bug 1194552</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35654/">CVE-2020-35654 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-35654">CVE-2020-35654 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23437/">CVE-2021-23437 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23437">CVE-2021-23437 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25289/">CVE-2021-25289 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25289">CVE-2021-25289 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25290/">CVE-2021-25290 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25290">CVE-2021-25290 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25292/">CVE-2021-25292 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25292">CVE-2021-25292 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25293/">CVE-2021-25293 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25293">CVE-2021-25293 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27921/">CVE-2021-27921 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27921">CVE-2021-27921 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27922/">CVE-2021-27922 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27922">CVE-2021-27922 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27923/">CVE-2021-27923 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-27923">CVE-2021-27923 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34552/">CVE-2021-34552 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34552">CVE-2021-34552 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22815/">CVE-2022-22815 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22815">CVE-2022-22815 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22816/">CVE-2022-22816 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22816">CVE-2022-22816 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861535" comment="python3-Pillow-7.2.0-150300.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861536" comment="python3-Pillow-tk-7.2.0-150300.3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4724" version="1" class="patch">
	<metadata>
		<title>Security update for python-aiohttp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217682" ref_url="https://bugzilla.suse.com/1217682" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-49082" ref_url="https://www.suse.com/security/cve/CVE-2023-49082/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017713.html" source="SUSE-SU"/>
		<description>
This update for python-aiohttp fixes the following issues:

Updated to version 3.8.6:

  - CVE-2023-49082: Fixed an HTTP header injection via a crafted method (bsc#1217682).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-19"/>
	<updated date="2024-01-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1217682">SUSE bug 1217682</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-49082/">CVE-2023-49082 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49082">CVE-2023-49082 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819172" comment="python311-aiohttp-3.8.6-150400.10.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4725" version="1" class="patch">
	<metadata>
		<title>Security update for python310 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219559" ref_url="https://bugzilla.suse.com/1219559" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035306.html" source="SUSE-SU"/>
		<description>
This update for python310 fixes the following issues:

- CVE-2023-52425: Fixed using the system libexpat (bsc#1219559).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-20"/>
	<updated date="2024-05-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219559">SUSE bug 1219559</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861635" comment="libpython3_10-1_0-3.10.14-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861636" comment="libpython3_10-1_0-32bit-3.10.14-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861637" comment="python310-3.10.14-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861638" comment="python310-32bit-3.10.14-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861639" comment="python310-base-3.10.14-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861640" comment="python310-base-32bit-3.10.14-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861641" comment="python310-curses-3.10.14-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861642" comment="python310-dbm-3.10.14-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861643" comment="python310-devel-3.10.14-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861644" comment="python310-doc-3.10.14-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861645" comment="python310-doc-devhelp-3.10.14-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861646" comment="python310-idle-3.10.14-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861647" comment="python310-testsuite-3.10.14-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861648" comment="python310-tk-3.10.14-150400.4.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861649" comment="python310-tools-3.10.14-150400.4.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4726" version="1" class="patch">
	<metadata>
		<title>Security update for cairo (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1122321" ref_url="https://bugzilla.suse.com/1122321" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-6462" ref_url="https://www.suse.com/security/cve/CVE-2019-6462/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018555.html" source="SUSE-SU"/>
		<description>
This update for cairo fixes the following issues:

- CVE-2019-6462: Fixed a potentially infinite loop (bsc#1122321).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-20"/>
	<updated date="2024-05-20"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1122321">SUSE bug 1122321</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6462/">CVE-2019-6462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-6462">CVE-2019-6462 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861650" comment="cairo-devel-1.16.0-150400.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861651" comment="cairo-devel-32bit-1.16.0-150400.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861652" comment="cairo-tools-1.16.0-150400.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861653" comment="libcairo-gobject2-1.16.0-150400.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861654" comment="libcairo-gobject2-32bit-1.16.0-150400.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861655" comment="libcairo-script-interpreter2-1.16.0-150400.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861656" comment="libcairo-script-interpreter2-32bit-1.16.0-150400.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861657" comment="libcairo2-1.16.0-150400.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861658" comment="libcairo2-32bit-1.16.0-150400.11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4727" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218690" ref_url="https://bugzilla.suse.com/1218690" source="BUGZILLA"/>
		<reference ref_id="1218810" ref_url="https://bugzilla.suse.com/1218810" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-6129" ref_url="https://www.suse.com/security/cve/CVE-2023-6129/" source="CVE"/>
		<reference ref_id="CVE-2023-6237" ref_url="https://www.suse.com/security/cve/CVE-2023-6237/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017739.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2023-6129: Fixed vector register clobbering on PowerPC. (bsc#1218690)
- CVE-2023-6237: Fixed excessive time spent checking invalid RSA public keys. (bsc#1218810)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-22"/>
	<updated date="2024-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218690">SUSE bug 1218690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218810">SUSE bug 1218810</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6129/">CVE-2023-6129 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6129">CVE-2023-6129 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6237/">CVE-2023-6237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6237">CVE-2023-6237 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009820042" comment="libopenssl-3-devel-3.0.8-150500.5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820043" comment="libopenssl-3-devel-32bit-3.0.8-150500.5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820044" comment="libopenssl3-3.0.8-150500.5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820045" comment="libopenssl3-32bit-3.0.8-150500.5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820046" comment="openssl-3-3.0.8-150500.5.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009820047" comment="openssl-3-doc-3.0.8-150500.5.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4728" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1082216" ref_url="https://bugzilla.suse.com/1082216" source="BUGZILLA"/>
		<reference ref_id="1082233" ref_url="https://bugzilla.suse.com/1082233" source="BUGZILLA"/>
		<reference ref_id="1213638" ref_url="https://bugzilla.suse.com/1213638" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-6798" ref_url="https://www.suse.com/security/cve/CVE-2018-6798/" source="CVE"/>
		<reference ref_id="CVE-2018-6913" ref_url="https://www.suse.com/security/cve/CVE-2018-6913/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035342.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

Security issues fixed:

- CVE-2018-6913: Fixed space calculation issues in pp_pack.c (bsc#1082216)
- CVE-2018-6798: Fixed heap buffer overflow in regexec.c (bsc#1082233)

Non-security issue fixed:

- make Net::FTP work with TLS 1.3 (bsc#1213638)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-22"/>
	<updated date="2024-05-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082216">SUSE bug 1082216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082233">SUSE bug 1082233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213638">SUSE bug 1213638</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2018-6798/">CVE-2018-6798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6798">CVE-2018-6798 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6913/">CVE-2018-6913 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6913">CVE-2018-6913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861869" comment="perl-5.26.1-150300.17.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861870" comment="perl-32bit-5.26.1-150300.17.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861871" comment="perl-base-5.26.1-150300.17.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861872" comment="perl-base-32bit-5.26.1-150300.17.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861873" comment="perl-core-DB_File-5.26.1-150300.17.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861874" comment="perl-core-DB_File-32bit-5.26.1-150300.17.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861875" comment="perl-doc-5.26.1-150300.17.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4729" version="1" class="patch">
	<metadata>
		<title>Security update for python-sqlparse (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223603" ref_url="https://bugzilla.suse.com/1223603" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-4340" ref_url="https://www.suse.com/security/cve/CVE-2024-4340/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018596.html" source="SUSE-SU"/>
		<description>
This update for python-sqlparse fixes the following issues:

- CVE-2024-4340: Catch RecursionError to avoid a denial of service. (bsc#1223603) 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223603">SUSE bug 1223603</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4340/">CVE-2024-4340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4340">CVE-2024-4340 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861955" comment="python311-sqlparse-0.4.4-150400.6.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4730" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql14 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224038" ref_url="https://bugzilla.suse.com/1224038" source="BUGZILLA"/>
		<reference ref_id="1224051" ref_url="https://bugzilla.suse.com/1224051" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-4317" ref_url="https://www.suse.com/security/cve/CVE-2024-4317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018595.html" source="SUSE-SU"/>
		<description>
This update for postgresql14 fixes the following issues:

PostgreSQL upgrade to version 14.12 (bsc#1224051):

- CVE-2024-4317: Fixed visibility restriction of pg_stats_ext and pg_stats_ext_exprs entries to the table owner (bsc#1224038).

Bug fixes:

- Fix incompatibility with LLVM 18.
- Prepare for PostgreSQL 17.
- Make sure all compilation and doc generation happens in %build.
- Require LLVM &lt;= 17 for now, because LLVM 18 doesn't seem to work.
- Remove constraints file because improved memory usage for s390x
- Use %patch -P N instead of deprecated %patchN.

Release notes:

- https://www.postgresql.org/docs/release/14.12/
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1224038">SUSE bug 1224038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224051">SUSE bug 1224051</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-4317/">CVE-2024-4317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4317">CVE-2024-4317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861956" comment="postgresql14-14.12-150200.5.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861957" comment="postgresql14-contrib-14.12-150200.5.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861958" comment="postgresql14-devel-14.12-150200.5.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861959" comment="postgresql14-docs-14.12-150200.5.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861960" comment="postgresql14-llvmjit-14.12-150200.5.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861961" comment="postgresql14-llvmjit-devel-14.12-150200.5.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861962" comment="postgresql14-plperl-14.12-150200.5.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861963" comment="postgresql14-plpython-14.12-150200.5.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861964" comment="postgresql14-pltcl-14.12-150200.5.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861965" comment="postgresql14-server-14.12-150200.5.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861966" comment="postgresql14-server-devel-14.12-150200.5.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861967" comment="postgresql14-test-14.12-150200.5.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4731" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222535" ref_url="https://bugzilla.suse.com/1222535" source="BUGZILLA"/>
		<reference ref_id="1224056" ref_url="https://bugzilla.suse.com/1224056" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2609" ref_url="https://www.suse.com/security/cve/CVE-2024-2609/" source="CVE"/>
		<reference ref_id="CVE-2024-3302" ref_url="https://www.suse.com/security/cve/CVE-2024-3302/" source="CVE"/>
		<reference ref_id="CVE-2024-3852" ref_url="https://www.suse.com/security/cve/CVE-2024-3852/" source="CVE"/>
		<reference ref_id="CVE-2024-3854" ref_url="https://www.suse.com/security/cve/CVE-2024-3854/" source="CVE"/>
		<reference ref_id="CVE-2024-3857" ref_url="https://www.suse.com/security/cve/CVE-2024-3857/" source="CVE"/>
		<reference ref_id="CVE-2024-3859" ref_url="https://www.suse.com/security/cve/CVE-2024-3859/" source="CVE"/>
		<reference ref_id="CVE-2024-3861" ref_url="https://www.suse.com/security/cve/CVE-2024-3861/" source="CVE"/>
		<reference ref_id="CVE-2024-3863" ref_url="https://www.suse.com/security/cve/CVE-2024-3863/" source="CVE"/>
		<reference ref_id="CVE-2024-3864" ref_url="https://www.suse.com/security/cve/CVE-2024-3864/" source="CVE"/>
		<reference ref_id="CVE-2024-4367" ref_url="https://www.suse.com/security/cve/CVE-2024-4367/" source="CVE"/>
		<reference ref_id="CVE-2024-4767" ref_url="https://www.suse.com/security/cve/CVE-2024-4767/" source="CVE"/>
		<reference ref_id="CVE-2024-4768" ref_url="https://www.suse.com/security/cve/CVE-2024-4768/" source="CVE"/>
		<reference ref_id="CVE-2024-4769" ref_url="https://www.suse.com/security/cve/CVE-2024-4769/" source="CVE"/>
		<reference ref_id="CVE-2024-4770" ref_url="https://www.suse.com/security/cve/CVE-2024-4770/" source="CVE"/>
		<reference ref_id="CVE-2024-4777" ref_url="https://www.suse.com/security/cve/CVE-2024-4777/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to version 115.11.0 ESR (bsc#1224056):

- CVE-2024-4367: Arbitrary JavaScript execution in PDF.js
- CVE-2024-4767: IndexedDB files retained in private browsing mode
- CVE-2024-4768: Potential permissions request bypass via clickjacking
- CVE-2024-4769: Cross-origin responses could be distinguished between script and non-script content-types
- CVE-2024-4770: Use-after-free could occur when printing to PDF
- CVE-2024-4777: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222535">SUSE bug 1222535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224056">SUSE bug 1224056</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2609/">CVE-2024-2609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2609">CVE-2024-2609 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-3302/">CVE-2024-3302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3302">CVE-2024-3302 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3852/">CVE-2024-3852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3852">CVE-2024-3852 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3854/">CVE-2024-3854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3854">CVE-2024-3854 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3857/">CVE-2024-3857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3857">CVE-2024-3857 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3859/">CVE-2024-3859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3859">CVE-2024-3859 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3861/">CVE-2024-3861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3861">CVE-2024-3861 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-3863/">CVE-2024-3863 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3863">CVE-2024-3863 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3864/">CVE-2024-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3864">CVE-2024-3864 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4367/">CVE-2024-4367 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4367">CVE-2024-4367 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4767/">CVE-2024-4767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4767">CVE-2024-4767 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4768/">CVE-2024-4768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4768">CVE-2024-4768 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4769/">CVE-2024-4769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4769">CVE-2024-4769 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4770/">CVE-2024-4770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4770">CVE-2024-4770 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4777/">CVE-2024-4777 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4777">CVE-2024-4777 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009861968" comment="MozillaFirefox-115.11.0-150200.152.137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861969" comment="MozillaFirefox-branding-upstream-115.11.0-150200.152.137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861970" comment="MozillaFirefox-devel-115.11.0-150200.152.137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861971" comment="MozillaFirefox-translations-common-115.11.0-150200.152.137.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009861972" comment="MozillaFirefox-translations-other-115.11.0-150200.152.137.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4732" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224277" ref_url="https://bugzilla.suse.com/1224277" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45733" ref_url="https://www.suse.com/security/cve/CVE-2023-45733/" source="CVE"/>
		<reference ref_id="CVE-2023-45745" ref_url="https://www.suse.com/security/cve/CVE-2023-45745/" source="CVE"/>
		<reference ref_id="CVE-2023-46103" ref_url="https://www.suse.com/security/cve/CVE-2023-46103/" source="CVE"/>
		<reference ref_id="CVE-2023-47855" ref_url="https://www.suse.com/security/cve/CVE-2023-47855/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018598.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Intel CPU Microcode was updated to the 20240514 release (bsc#1224277)

- CVE-2023-45733: Fixed a potential security vulnerability in some
  Intel? Processors that may have allowed information disclosure.
- CVE-2023-46103: Fixed a potential security vulnerability in Intel?
  Core™ Ultra Processors that may have allowed denial of service.
- CVE-2023-45745,CVE-2023-47855: Fixed a potential security
  vulnerabilities in some Intel? Trust Domain Extensions (TDX) module
  software that may have allowed escalation of privilege.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-23"/>
	<updated date="2024-05-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1224277">SUSE bug 1224277</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45733/">CVE-2023-45733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45733">CVE-2023-45733 at NVD</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45745/">CVE-2023-45745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45745">CVE-2023-45745 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46103/">CVE-2023-46103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46103">CVE-2023-46103 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-47855/">CVE-2023-47855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-47855">CVE-2023-47855 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862123" comment="ucode-intel-20240514-150200.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4733" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql15 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224038" ref_url="https://bugzilla.suse.com/1224038" source="BUGZILLA"/>
		<reference ref_id="1224051" ref_url="https://bugzilla.suse.com/1224051" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-4317" ref_url="https://www.suse.com/security/cve/CVE-2024-4317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018600.html" source="SUSE-SU"/>
		<description>
This update for postgresql15 fixes the following issues:

PostgreSQL upgrade to version 15.7 (bsc#1224051):

- CVE-2024-4317: Fixed visibility restriction of pg_stats_ext and pg_stats_ext_exprs entries to the table owner (bsc#1224038).

Bug fixes:

- Fix incompatibility with LLVM 18.
- Prepare for PostgreSQL 17.
- Make sure all compilation and doc generation happens in %build.
- Require LLVM &lt;= 17 for now, because LLVM 18 doesn't seem to work.
- Remove constraints file because improved memory usage for s390x
- Use %patch -P N instead of deprecated %patchN.

Release notes:

- https://www.postgresql.org/docs/release/15.7/
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-24"/>
	<updated date="2024-05-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1224038">SUSE bug 1224038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224051">SUSE bug 1224051</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-4317/">CVE-2024-4317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4317">CVE-2024-4317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009862124" comment="postgresql15-15.7-150200.5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862125" comment="postgresql15-contrib-15.7-150200.5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862126" comment="postgresql15-devel-15.7-150200.5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862127" comment="postgresql15-docs-15.7-150200.5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862128" comment="postgresql15-llvmjit-15.7-150200.5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862129" comment="postgresql15-llvmjit-devel-15.7-150200.5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862130" comment="postgresql15-plperl-15.7-150200.5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862131" comment="postgresql15-plpython-15.7-150200.5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862132" comment="postgresql15-pltcl-15.7-150200.5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862133" comment="postgresql15-server-15.7-150200.5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862134" comment="postgresql15-server-devel-15.7-150200.5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862135" comment="postgresql15-test-15.7-150200.5.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4734" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223858" ref_url="https://bugzilla.suse.com/1223858" source="BUGZILLA"/>
		<reference ref_id="1224169" ref_url="https://bugzilla.suse.com/1224169" source="BUGZILLA"/>
		<reference ref_id="1224340" ref_url="https://bugzilla.suse.com/1224340" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2024:1787-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035367.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.

This update fixes a regression with kerberized nfs4 shares in the previous update (bsc#1223858).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-27"/>
	<updated date="2024-05-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223858">SUSE bug 1223858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224169">SUSE bug 1224169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224340">SUSE bug 1224340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009862252" comment="cluster-md-kmp-64kb-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862253" comment="cluster-md-kmp-default-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862254" comment="dlm-kmp-64kb-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862255" comment="dlm-kmp-default-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862256" comment="dtb-allwinner-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862257" comment="dtb-altera-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862258" comment="dtb-amazon-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862259" comment="dtb-amd-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862260" comment="dtb-amlogic-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862261" comment="dtb-apm-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862262" comment="dtb-apple-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862263" comment="dtb-arm-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862264" comment="dtb-broadcom-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862265" comment="dtb-cavium-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862266" comment="dtb-exynos-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862267" comment="dtb-freescale-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862268" comment="dtb-hisilicon-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862269" comment="dtb-lg-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862270" comment="dtb-marvell-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862271" comment="dtb-mediatek-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862272" comment="dtb-nvidia-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862273" comment="dtb-qcom-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862274" comment="dtb-renesas-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862275" comment="dtb-rockchip-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862276" comment="dtb-socionext-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862277" comment="dtb-sprd-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862278" comment="dtb-xilinx-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862279" comment="gfs2-kmp-64kb-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862280" comment="gfs2-kmp-default-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862281" comment="kernel-64kb-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862282" comment="kernel-64kb-devel-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862283" comment="kernel-64kb-extra-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862284" comment="kernel-64kb-livepatch-devel-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862285" comment="kernel-64kb-optional-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862286" comment="kernel-debug-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862287" comment="kernel-debug-devel-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862288" comment="kernel-debug-livepatch-devel-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862289" comment="kernel-debug-vdso-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862290" comment="kernel-default-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862291" comment="kernel-default-base-5.14.21-150500.55.65.1.150500.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862292" comment="kernel-default-base-rebuild-5.14.21-150500.55.65.1.150500.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862293" comment="kernel-default-devel-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862294" comment="kernel-default-extra-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862295" comment="kernel-default-livepatch-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862296" comment="kernel-default-livepatch-devel-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862297" comment="kernel-default-optional-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862298" comment="kernel-default-vdso-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862299" comment="kernel-devel-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862300" comment="kernel-docs-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862301" comment="kernel-docs-html-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862302" comment="kernel-kvmsmall-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862303" comment="kernel-kvmsmall-devel-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862304" comment="kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862305" comment="kernel-kvmsmall-vdso-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862306" comment="kernel-macros-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862307" comment="kernel-obs-build-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862308" comment="kernel-obs-qa-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862309" comment="kernel-source-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862310" comment="kernel-source-vanilla-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862311" comment="kernel-syms-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862312" comment="kernel-zfcpdump-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862313" comment="kselftests-kmp-64kb-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862314" comment="kselftests-kmp-default-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862315" comment="ocfs2-kmp-64kb-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862316" comment="ocfs2-kmp-default-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862317" comment="reiserfs-kmp-64kb-5.14.21-150500.55.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862318" comment="reiserfs-kmp-default-5.14.21-150500.55.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4735" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224388" ref_url="https://bugzilla.suse.com/1224388" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-4603" ref_url="https://www.suse.com/security/cve/CVE-2024-4603/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035365.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2024-4603: Fixed DSA parameter checks for excessive sizes before validating (bsc#1224388).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-27"/>
	<updated date="2024-05-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1224388">SUSE bug 1224388</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4603/">CVE-2024-4603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4603">CVE-2024-4603 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009862319" comment="libopenssl-3-devel-3.0.8-150500.5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862320" comment="libopenssl-3-devel-32bit-3.0.8-150500.5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862321" comment="libopenssl3-3.0.8-150500.5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862322" comment="libopenssl3-32bit-3.0.8-150500.5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862323" comment="openssl-3-3.0.8-150500.5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862324" comment="openssl-3-doc-3.0.8-150500.5.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4736" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openj9 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213470" ref_url="https://bugzilla.suse.com/1213470" source="BUGZILLA"/>
		<reference ref_id="1222979" ref_url="https://bugzilla.suse.com/1222979" source="BUGZILLA"/>
		<reference ref_id="1222983" ref_url="https://bugzilla.suse.com/1222983" source="BUGZILLA"/>
		<reference ref_id="1222984" ref_url="https://bugzilla.suse.com/1222984" source="BUGZILLA"/>
		<reference ref_id="1222986" ref_url="https://bugzilla.suse.com/1222986" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011/" source="CVE"/>
		<reference ref_id="CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068/" source="CVE"/>
		<reference ref_id="CVE-2024-21085" ref_url="https://www.suse.com/security/cve/CVE-2024-21085/" source="CVE"/>
		<reference ref_id="CVE-2024-21094" ref_url="https://www.suse.com/security/cve/CVE-2024-21094/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018606.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openj9 fixes the following issues:

Update to OpenJDK 8u412 build 08 with OpenJ9 0.44.0 virtual machine:

- CVE-2024-21094: Fixed C2 compilation failure with 'Exceeded _node_regs array' (bsc#1222986).
- CVE-2024-21011: Fixed long Exception message leading to crash (bsc#1222979).
- CVE-2024-21085: Fixed Pack200 excessive memory allocation (bsc#1222984).
- CVE-2024-21068: Fixed integer overflow in C1 compiler address generation (bsc#1222983).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-27"/>
	<updated date="2024-05-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213470">SUSE bug 1213470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222979">SUSE bug 1222979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222983">SUSE bug 1222983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222984">SUSE bug 1222984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222986">SUSE bug 1222986</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21085/">CVE-2024-21085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21085">CVE-2024-21085 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21094/">CVE-2024-21094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21094">CVE-2024-21094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009862325" comment="java-1_8_0-openj9-1.8.0.412-150200.3.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862326" comment="java-1_8_0-openj9-accessibility-1.8.0.412-150200.3.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862327" comment="java-1_8_0-openj9-demo-1.8.0.412-150200.3.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862328" comment="java-1_8_0-openj9-devel-1.8.0.412-150200.3.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862329" comment="java-1_8_0-openj9-headless-1.8.0.412-150200.3.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862330" comment="java-1_8_0-openj9-javadoc-1.8.0.412-150200.3.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862331" comment="java-1_8_0-openj9-src-1.8.0.412-150200.3.45.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4737" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223858" ref_url="https://bugzilla.suse.com/1223858" source="BUGZILLA"/>
		<reference ref_id="1224169" ref_url="https://bugzilla.suse.com/1224169" source="BUGZILLA"/>
		<reference ref_id="1224340" ref_url="https://bugzilla.suse.com/1224340" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2024:1801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035375.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.

This update fixes a regression with kerberized nfs4 shares in the previous update (bsc#1223858).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223858">SUSE bug 1223858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224169">SUSE bug 1224169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224340">SUSE bug 1224340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009862383" comment="cluster-md-kmp-azure-5.14.21-150500.33.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862384" comment="dlm-kmp-azure-5.14.21-150500.33.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862385" comment="gfs2-kmp-azure-5.14.21-150500.33.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862386" comment="kernel-azure-5.14.21-150500.33.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862387" comment="kernel-azure-devel-5.14.21-150500.33.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862388" comment="kernel-azure-extra-5.14.21-150500.33.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862389" comment="kernel-azure-livepatch-devel-5.14.21-150500.33.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862390" comment="kernel-azure-optional-5.14.21-150500.33.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862391" comment="kernel-azure-vdso-5.14.21-150500.33.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862392" comment="kernel-devel-azure-5.14.21-150500.33.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862393" comment="kernel-source-azure-5.14.21-150500.33.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862394" comment="kernel-syms-azure-5.14.21-150500.33.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862395" comment="kselftests-kmp-azure-5.14.21-150500.33.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862396" comment="ocfs2-kmp-azure-5.14.21-150500.33.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862397" comment="reiserfs-kmp-azure-5.14.21-150500.33.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4738" version="1" class="patch">
	<metadata>
		<title>Security update for xdg-desktop-portal (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223110" ref_url="https://bugzilla.suse.com/1223110" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-32462" ref_url="https://www.suse.com/security/cve/CVE-2024-32462/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035373.html" source="SUSE-SU"/>
		<description>
This update for xdg-desktop-portal fixes the following issues:

- CVE-2024-32462: Fixed sandbox escape via RequestBackground portal (bsc#1223110).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223110">SUSE bug 1223110</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-32462/">CVE-2024-32462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32462">CVE-2024-32462 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009862398" comment="xdg-desktop-portal-1.16.0-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862399" comment="xdg-desktop-portal-devel-1.16.0-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862400" comment="xdg-desktop-portal-lang-1.16.0-150500.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4739" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224168" ref_url="https://bugzilla.suse.com/1224168" source="BUGZILLA"/>
		<reference ref_id="1224170" ref_url="https://bugzilla.suse.com/1224170" source="BUGZILLA"/>
		<reference ref_id="1224171" ref_url="https://bugzilla.suse.com/1224171" source="BUGZILLA"/>
		<reference ref_id="1224172" ref_url="https://bugzilla.suse.com/1224172" source="BUGZILLA"/>
		<reference ref_id="1224173" ref_url="https://bugzilla.suse.com/1224173" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-32002" ref_url="https://www.suse.com/security/cve/CVE-2024-32002/" source="CVE"/>
		<reference ref_id="CVE-2024-32004" ref_url="https://www.suse.com/security/cve/CVE-2024-32004/" source="CVE"/>
		<reference ref_id="CVE-2024-32020" ref_url="https://www.suse.com/security/cve/CVE-2024-32020/" source="CVE"/>
		<reference ref_id="CVE-2024-32021" ref_url="https://www.suse.com/security/cve/CVE-2024-32021/" source="CVE"/>
		<reference ref_id="CVE-2024-32465" ref_url="https://www.suse.com/security/cve/CVE-2024-32465/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035389.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- CVE-2024-32002: Fixed recursive clones on case-insensitive filesystems that support symbolic links are susceptible to case confusion (bsc#1224168).
- CVE-2024-32004: Fixed arbitrary code execution during local clones (bsc#1224170).
- CVE-2024-32020: Fixed file overwriting vulnerability during local clones (bsc#1224171).
- CVE-2024-32021: Fixed git may create hardlinks to arbitrary user-readable files (bsc#1224172).
- CVE-2024-32465: Fixed arbitrary code execution during clone operations (bsc#1224173).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-05-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1224168">SUSE bug 1224168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224170">SUSE bug 1224170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224171">SUSE bug 1224171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224172">SUSE bug 1224172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224173">SUSE bug 1224173</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32002/">CVE-2024-32002 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32002">CVE-2024-32002 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32004/">CVE-2024-32004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32004">CVE-2024-32004 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-32020/">CVE-2024-32020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32020">CVE-2024-32020 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-32021/">CVE-2024-32021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32021">CVE-2024-32021 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32465/">CVE-2024-32465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32465">CVE-2024-32465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009862401" comment="git-2.35.3-150300.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862402" comment="git-arch-2.35.3-150300.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862403" comment="git-core-2.35.3-150300.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862404" comment="git-credential-gnome-keyring-2.35.3-150300.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862405" comment="git-credential-libsecret-2.35.3-150300.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862406" comment="git-cvs-2.35.3-150300.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862407" comment="git-daemon-2.35.3-150300.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862408" comment="git-doc-2.35.3-150300.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862409" comment="git-email-2.35.3-150300.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862410" comment="git-gui-2.35.3-150300.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862411" comment="git-p4-2.35.3-150300.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862412" comment="git-svn-2.35.3-150300.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862413" comment="git-web-2.35.3-150300.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862414" comment="gitk-2.35.3-150300.10.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862415" comment="perl-Git-2.35.3-150300.10.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4740" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222548" ref_url="https://bugzilla.suse.com/1222548" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2511" ref_url="https://www.suse.com/security/cve/CVE-2024-2511/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035388.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2024-2511: Fixed unconstrained session cache growth in TLSv1.3 (bsc#1222548).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-28"/>
	<updated date="2024-05-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1222548">SUSE bug 1222548</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2511/">CVE-2024-2511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2511">CVE-2024-2511 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009862416" comment="libopenssl-1_1-devel-1.1.1l-150500.17.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862417" comment="libopenssl-1_1-devel-32bit-1.1.1l-150500.17.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862418" comment="libopenssl1_1-1.1.1l-150500.17.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862419" comment="libopenssl1_1-32bit-1.1.1l-150500.17.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862420" comment="libopenssl1_1-hmac-1.1.1l-150500.17.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862421" comment="libopenssl1_1-hmac-32bit-1.1.1l-150500.17.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862422" comment="openssl-1_1-1.1.1l-150500.17.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862423" comment="openssl-1_1-doc-1.1.1l-150500.17.28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4741" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223858" ref_url="https://bugzilla.suse.com/1223858" source="BUGZILLA"/>
		<reference ref_id="1224169" ref_url="https://bugzilla.suse.com/1224169" source="BUGZILLA"/>
		<reference ref_id="1224340" ref_url="https://bugzilla.suse.com/1224340" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2024:1813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018615.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.

This update fixes a regression with kerberized nfs4 shares in the previous update (bsc#1223858).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-05-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223858">SUSE bug 1223858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224169">SUSE bug 1224169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224340">SUSE bug 1224340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009862550" comment="cluster-md-kmp-rt-5.14.21-150500.13.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862551" comment="dlm-kmp-rt-5.14.21-150500.13.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862552" comment="gfs2-kmp-rt-5.14.21-150500.13.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862553" comment="kernel-devel-rt-5.14.21-150500.13.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862554" comment="kernel-rt-5.14.21-150500.13.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862555" comment="kernel-rt-devel-5.14.21-150500.13.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862556" comment="kernel-rt-extra-5.14.21-150500.13.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862557" comment="kernel-rt-livepatch-5.14.21-150500.13.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862558" comment="kernel-rt-livepatch-devel-5.14.21-150500.13.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862559" comment="kernel-rt-optional-5.14.21-150500.13.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862560" comment="kernel-rt-vdso-5.14.21-150500.13.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862561" comment="kernel-rt_debug-5.14.21-150500.13.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862562" comment="kernel-rt_debug-devel-5.14.21-150500.13.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862563" comment="kernel-rt_debug-livepatch-devel-5.14.21-150500.13.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862564" comment="kernel-rt_debug-vdso-5.14.21-150500.13.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862565" comment="kernel-source-rt-5.14.21-150500.13.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862566" comment="kernel-syms-rt-5.14.21-150500.13.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862567" comment="kselftests-kmp-rt-5.14.21-150500.13.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862568" comment="ocfs2-kmp-rt-5.14.21-150500.13.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862569" comment="reiserfs-kmp-rt-5.14.21-150500.13.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4742" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218300" ref_url="https://bugzilla.suse.com/1218300" source="BUGZILLA"/>
		<reference ref_id="1218301" ref_url="https://bugzilla.suse.com/1218301" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-50229" ref_url="https://www.suse.com/security/cve/CVE-2023-50229/" source="CVE"/>
		<reference ref_id="CVE-2023-50230" ref_url="https://www.suse.com/security/cve/CVE-2023-50230/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017740.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2023-50229: Fixed an out of bounds write in the primary version
  counter for the Phone Book Access Profile implementation
  (bsc#1218300).
- CVE-2023-50230: Fixed an out of bounds write in the secondary
  version counter for the Phone Book Access Profile implementation
  (bsc#1218301).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-23"/>
	<updated date="2024-01-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218300">SUSE bug 1218300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218301">SUSE bug 1218301</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50229/">CVE-2023-50229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-50229">CVE-2023-50229 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50230/">CVE-2023-50230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-50230">CVE-2023-50230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844239" comment="bluez-5.65-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844240" comment="bluez-auto-enable-devices-5.65-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844241" comment="bluez-cups-5.65-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844242" comment="bluez-deprecated-5.65-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844243" comment="bluez-devel-5.65-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844244" comment="bluez-devel-32bit-5.65-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844245" comment="bluez-obexd-5.65-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844246" comment="bluez-test-5.65-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844247" comment="bluez-zsh-completion-5.65-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844248" comment="libbluetooth3-5.65-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844249" comment="libbluetooth3-32bit-5.65-150500.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4743" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224044" ref_url="https://bugzilla.suse.com/1224044" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-34397" ref_url="https://www.suse.com/security/cve/CVE-2024-34397/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018626.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2024-34397: Fixed signal subscription unicast spoofing vulnerability (bsc#1224044).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-05-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1224044">SUSE bug 1224044</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-34397/">CVE-2024-34397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34397">CVE-2024-34397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009862570" comment="gio-branding-upstream-2.70.5-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862571" comment="glib2-devel-2.70.5-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862572" comment="glib2-devel-32bit-2.70.5-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862573" comment="glib2-devel-static-2.70.5-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862574" comment="glib2-doc-2.70.5-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862575" comment="glib2-lang-2.70.5-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862576" comment="glib2-tests-devel-2.70.5-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862577" comment="glib2-tools-2.70.5-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862578" comment="glib2-tools-32bit-2.70.5-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862579" comment="libgio-2_0-0-2.70.5-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862580" comment="libgio-2_0-0-32bit-2.70.5-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862581" comment="libglib-2_0-0-2.70.5-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862582" comment="libglib-2_0-0-32bit-2.70.5-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862583" comment="libgmodule-2_0-0-2.70.5-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862584" comment="libgmodule-2_0-0-32bit-2.70.5-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862585" comment="libgobject-2_0-0-2.70.5-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862586" comment="libgobject-2_0-0-32bit-2.70.5-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862587" comment="libgthread-2_0-0-2.70.5-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862588" comment="libgthread-2_0-0-32bit-2.70.5-150400.3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4744" version="1" class="patch">
	<metadata>
		<title>Security update for warewulf4 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216994" ref_url="https://bugzilla.suse.com/1216994" source="BUGZILLA"/>
		<reference ref_id="1224124" ref_url="https://bugzilla.suse.com/1224124" source="BUGZILLA"/>
		<reference ref_id="1225402" ref_url="https://bugzilla.suse.com/1225402" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1838-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035406.html" source="SUSE-SU"/>
		<description>
This update for warewulf4 fixes the following issues:

- fixed wwctl configure --all doesn't configure ssh (bsc#1225402)

- update to 4.5.2 with following changes:
  * Reorder dnsmasq config to put iPXE last
  * Update go-digest dependency to fix 
      CVE-2024-3727: digest values not always validated (bsc#1224124)

- updated to version 4.5.1 with following changes
  * wwctl [profile|node] list -a handles now slices correclty
  * Fix a locking issue with concurrent read/writes for node status

- Remove API package as use of this wasn't documented

- use tftp.socket for activation (bsc#1216994)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-05-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216994">SUSE bug 1216994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224124">SUSE bug 1224124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225402">SUSE bug 1225402</bugzilla>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009862589" comment="warewulf4-4.5.2-150500.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862590" comment="warewulf4-man-4.5.2-150500.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862591" comment="warewulf4-overlay-4.5.2-150500.6.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009862592" comment="warewulf4-overlay-slurm-4.5.2-150500.6.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4745" version="1" class="patch">
	<metadata>
		<title>Recommended update for tmux (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1185572" ref_url="https://bugzilla.suse.com/1185572" source="BUGZILLA"/>
		<reference ref_id="1207393" ref_url="https://bugzilla.suse.com/1207393" source="BUGZILLA"/>
		<reference ref_id="1210552" ref_url="https://bugzilla.suse.com/1210552" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-47016" ref_url="https://www.suse.com/security/cve/CVE-2022-47016/" source="CVE"/>
		<reference ref_id="SUSE-RU-2024:0184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-January/033902.html" source="SUSE-SU"/>
		<description>
This update for tmux fixes the following issues:

- tmux: Null pointer dereference in window.c (bsc#1207393) (CVE-2022-47016)
- add patch for compactibility with new ncurses fixes bsc#1210552
- disable utf8proc (following upstreams not use it by default on non-macOS) 
- switch to screen-256color as default terminal to fix incompatibility
  with yast2-ruby-testsuite 
- update to 3.3a:
- build with utf8proc enabled
- refresh tmux-socket-path patch: 
  restore ability to overwrite socket path using $TMUX_TMPDIR (bsc#1185572)
- Drop pkgconfig(systemd) BuildRequires: there is no reason to pull
  in systemd into the build.
- Use %tmpfiles_create instead of calling systemd-tmpfiles
  directly.
- Replace systemd_requires with systemd_ordering: tmux is very well
  capable to run without systemd (and by using tmpfiles_create, the
  post script can also cope with the absence of if).		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-23"/>
	<updated date="2024-01-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185572">SUSE bug 1185572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207393">SUSE bug 1207393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210552">SUSE bug 1210552</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-47016/">CVE-2022-47016 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47016">CVE-2022-47016 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844253" comment="tmux-3.3a-150300.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4746" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219048" ref_url="https://bugzilla.suse.com/1219048" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-50447" ref_url="https://www.suse.com/security/cve/CVE-2023-50447/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017746.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

- CVE-2023-50447: Fixed arbitrary code execution via the environment parameter. (bsc#1219048)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-23"/>
	<updated date="2024-01-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219048">SUSE bug 1219048</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50447/">CVE-2023-50447 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50447">CVE-2023-50447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844250" comment="python3-Pillow-7.2.0-150300.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844251" comment="python3-Pillow-tk-7.2.0-150300.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4747" version="1" class="patch">
	<metadata>
		<title>Security update for python-PyMySQL (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1225070" ref_url="https://bugzilla.suse.com/1225070" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-36039" ref_url="https://www.suse.com/security/cve/CVE-2024-36039/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019265.html" source="SUSE-SU"/>
		<description>
This update for python-PyMySQL fixes the following issues:

- CVE-2024-36039: Fixed SQL injection if used with untrusted JSON input (bsc#1225070).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1225070">SUSE bug 1225070</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36039/">CVE-2024-36039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36039">CVE-2024-36039 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863199" comment="python3-PyMySQL-0.7.11-150000.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4748" version="1" class="patch">
	<metadata>
		<title>Security update for freerdp (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223346" ref_url="https://bugzilla.suse.com/1223346" source="BUGZILLA"/>
		<reference ref_id="1223347" ref_url="https://bugzilla.suse.com/1223347" source="BUGZILLA"/>
		<reference ref_id="1223348" ref_url="https://bugzilla.suse.com/1223348" source="BUGZILLA"/>
		<reference ref_id="1223353" ref_url="https://bugzilla.suse.com/1223353" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-32658" ref_url="https://www.suse.com/security/cve/CVE-2024-32658/" source="CVE"/>
		<reference ref_id="CVE-2024-32659" ref_url="https://www.suse.com/security/cve/CVE-2024-32659/" source="CVE"/>
		<reference ref_id="CVE-2024-32660" ref_url="https://www.suse.com/security/cve/CVE-2024-32660/" source="CVE"/>
		<reference ref_id="CVE-2024-32661" ref_url="https://www.suse.com/security/cve/CVE-2024-32661/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019266.html" source="SUSE-SU"/>
		<description>
This update for freerdp fixes the following issues:

- CVE-2024-32658: Fixed out-of-bounds read in Interleaved RLE Bitmap Codec (bsc#1223353).
- CVE-2024-32659: Fixed out-of-bounds read if `((nWidth == 0) and (nHeight == 0))` (bsc#1223346)
- CVE-2024-32660: Fixed client crash via invalid huge allocation size (bsc#1223347)
- CVE-2024-32661: Fixed client NULL pointer dereference (bsc#1223348)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223346">SUSE bug 1223346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223347">SUSE bug 1223347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223348">SUSE bug 1223348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223353">SUSE bug 1223353</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32658/">CVE-2024-32658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32658">CVE-2024-32658 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32659/">CVE-2024-32659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32659">CVE-2024-32659 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32660/">CVE-2024-32660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32660">CVE-2024-32660 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32661/">CVE-2024-32661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32661">CVE-2024-32661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009863200" comment="freerdp-2.4.0-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863201" comment="freerdp-devel-2.4.0-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863202" comment="freerdp-proxy-2.4.0-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863203" comment="freerdp-server-2.4.0-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863204" comment="freerdp-wayland-2.4.0-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863205" comment="libfreerdp2-2.4.0-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863206" comment="libuwac0-0-2.4.0-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863207" comment="libwinpr2-2.4.0-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863208" comment="uwac0-0-devel-2.4.0-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863209" comment="winpr2-devel-2.4.0-150400.3.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4749" version="1" class="patch">
	<metadata>
		<title>Security update for python-requests (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224788" ref_url="https://bugzilla.suse.com/1224788" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-35195" ref_url="https://www.suse.com/security/cve/CVE-2024-35195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019261.html" source="SUSE-SU"/>
		<description>
This update for python-requests fixes the following issues:

- CVE-2024-35195: Fixed cert verification regardless of changes to the value of `verify` (bsc#1224788).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1224788">SUSE bug 1224788</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-35195/">CVE-2024-35195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35195">CVE-2024-35195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863210" comment="python311-requests-2.31.0-150400.6.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4750" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224056" ref_url="https://bugzilla.suse.com/1224056" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-4367" ref_url="https://www.suse.com/security/cve/CVE-2024-4367/" source="CVE"/>
		<reference ref_id="CVE-2024-4767" ref_url="https://www.suse.com/security/cve/CVE-2024-4767/" source="CVE"/>
		<reference ref_id="CVE-2024-4768" ref_url="https://www.suse.com/security/cve/CVE-2024-4768/" source="CVE"/>
		<reference ref_id="CVE-2024-4769" ref_url="https://www.suse.com/security/cve/CVE-2024-4769/" source="CVE"/>
		<reference ref_id="CVE-2024-4770" ref_url="https://www.suse.com/security/cve/CVE-2024-4770/" source="CVE"/>
		<reference ref_id="CVE-2024-4777" ref_url="https://www.suse.com/security/cve/CVE-2024-4777/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019264.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Update to version 115.11 (bsc#1224056):

- CVE-2024-4367: Arbitrary JavaScript execution in PDF.js
- CVE-2024-4767: IndexedDB files retained in private browsing mode
- CVE-2024-4768: Potential permissions request bypass via clickjacking
- CVE-2024-4769: Cross-origin responses could be distinguished between script and non-script content-types
- CVE-2024-4770: Use-after-free could occur when printing to PDF
- CVE-2024-4777: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11
- fixed: Splitter arrow between task list and task description did not behave as expected
- fixed: Calendar Event Attendees dialog had incorrectly sized rows
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1224056">SUSE bug 1224056</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4367/">CVE-2024-4367 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4367">CVE-2024-4367 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4767/">CVE-2024-4767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4767">CVE-2024-4767 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4768/">CVE-2024-4768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4768">CVE-2024-4768 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4769/">CVE-2024-4769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4769">CVE-2024-4769 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4770/">CVE-2024-4770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4770">CVE-2024-4770 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4777/">CVE-2024-4777 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4777">CVE-2024-4777 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009863211" comment="MozillaThunderbird-115.11.0-150200.8.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863212" comment="MozillaThunderbird-translations-common-115.11.0-150200.8.160.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863213" comment="MozillaThunderbird-translations-other-115.11.0-150200.8.160.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4751" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222979" ref_url="https://bugzilla.suse.com/1222979" source="BUGZILLA"/>
		<reference ref_id="1222983" ref_url="https://bugzilla.suse.com/1222983" source="BUGZILLA"/>
		<reference ref_id="1222984" ref_url="https://bugzilla.suse.com/1222984" source="BUGZILLA"/>
		<reference ref_id="1222986" ref_url="https://bugzilla.suse.com/1222986" source="BUGZILLA"/>
		<reference ref_id="1222987" ref_url="https://bugzilla.suse.com/1222987" source="BUGZILLA"/>
		<reference ref_id="1223470" ref_url="https://bugzilla.suse.com/1223470" source="BUGZILLA"/>
		<reference ref_id="1224164" ref_url="https://bugzilla.suse.com/1224164" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38264" ref_url="https://www.suse.com/security/cve/CVE-2023-38264/" source="CVE"/>
		<reference ref_id="CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011/" source="CVE"/>
		<reference ref_id="CVE-2024-21012" ref_url="https://www.suse.com/security/cve/CVE-2024-21012/" source="CVE"/>
		<reference ref_id="CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068/" source="CVE"/>
		<reference ref_id="CVE-2024-21085" ref_url="https://www.suse.com/security/cve/CVE-2024-21085/" source="CVE"/>
		<reference ref_id="CVE-2024-21094" ref_url="https://www.suse.com/security/cve/CVE-2024-21094/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019263.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update to Java 8.0 Service Refresh 8 Fix Pack 25 (bsc#1223470):

- CVE-2023-38264: Fixed Object Request Broker (ORB) denial of service (bsc#1224164).
- CVE-2024-21094: Fixed C2 compilation fails with 'Exceeded _node_regs array' (bsc#1222986).
- CVE-2024-21068: Fixed integer overflow in C1 compiler address generation (bsc#1222983).
- CVE-2024-21085: Fixed Pack200 excessive memory allocation (bsc#1222984).
- CVE-2024-21011: Fixed Long Exception message leading to crash (bsc#1222979).
- CVE-2024-21012: Fixed HTTP/2 client improper reverse DNS lookup (bsc#1222987).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222979">SUSE bug 1222979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222983">SUSE bug 1222983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222984">SUSE bug 1222984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222986">SUSE bug 1222986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222987">SUSE bug 1222987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223470">SUSE bug 1223470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224164">SUSE bug 1224164</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38264/">CVE-2023-38264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38264">CVE-2023-38264 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21012/">CVE-2024-21012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21012">CVE-2024-21012 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21085/">CVE-2024-21085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21085">CVE-2024-21085 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21094/">CVE-2024-21094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21094">CVE-2024-21094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009863214" comment="java-1_8_0-ibm-1.8.0_sr8.25-150000.3.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863215" comment="java-1_8_0-ibm-32bit-1.8.0_sr8.25-150000.3.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863216" comment="java-1_8_0-ibm-alsa-1.8.0_sr8.25-150000.3.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863217" comment="java-1_8_0-ibm-demo-1.8.0_sr8.25-150000.3.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863218" comment="java-1_8_0-ibm-devel-1.8.0_sr8.25-150000.3.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863219" comment="java-1_8_0-ibm-devel-32bit-1.8.0_sr8.25-150000.3.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863220" comment="java-1_8_0-ibm-plugin-1.8.0_sr8.25-150000.3.89.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863221" comment="java-1_8_0-ibm-src-1.8.0_sr8.25-150000.3.89.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4752" version="1" class="patch">
	<metadata>
		<title>Security update for uriparser (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223887" ref_url="https://bugzilla.suse.com/1223887" source="BUGZILLA"/>
		<reference ref_id="1223888" ref_url="https://bugzilla.suse.com/1223888" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-34402" ref_url="https://www.suse.com/security/cve/CVE-2024-34402/" source="CVE"/>
		<reference ref_id="CVE-2024-34403" ref_url="https://www.suse.com/security/cve/CVE-2024-34403/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019254.html" source="SUSE-SU"/>
		<description>
This update for uriparser fixes the following issues:

- CVE-2024-34402: Fixed integer overflow protection in ComposeQueryEngine (bsc#1223887).
- CVE-2024-34403: Fixed integer overflow protection in ComposeQueryMallocExMm (bsc#1223888).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223887">SUSE bug 1223887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223888">SUSE bug 1223888</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-34402/">CVE-2024-34402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34402">CVE-2024-34402 at NVD</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-34403/">CVE-2024-34403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34403">CVE-2024-34403 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009863222" comment="liburiparser1-0.8.5-150000.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863223" comment="liburiparser1-32bit-0.8.5-150000.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863224" comment="uriparser-0.8.5-150000.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863225" comment="uriparser-devel-0.8.5-150000.3.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4753" version="1" class="patch">
	<metadata>
		<title>Security update for python3-sqlparse (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223603" ref_url="https://bugzilla.suse.com/1223603" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-4340" ref_url="https://www.suse.com/security/cve/CVE-2024-4340/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019255.html" source="SUSE-SU"/>
		<description>
This update for python3-sqlparse fixes the following issues:

- CVE-2024-4340: Fixed RecursionError catch to avoid a denial-of-service issue (bsc#1223603).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223603">SUSE bug 1223603</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4340/">CVE-2024-4340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4340">CVE-2024-4340 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863226" comment="python3-sqlparse-0.4.2-150300.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4754" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214675" ref_url="https://bugzilla.suse.com/1214675" source="BUGZILLA"/>
		<reference ref_id="1219306" ref_url="https://bugzilla.suse.com/1219306" source="BUGZILLA"/>
		<reference ref_id="1219559" ref_url="https://bugzilla.suse.com/1219559" source="BUGZILLA"/>
		<reference ref_id="1220970" ref_url="https://bugzilla.suse.com/1220970" source="BUGZILLA"/>
		<reference ref_id="1221854" ref_url="https://bugzilla.suse.com/1221854" source="BUGZILLA"/>
		<reference ref_id="1222537" ref_url="https://bugzilla.suse.com/1222537" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48560" ref_url="https://www.suse.com/security/cve/CVE-2022-48560/" source="CVE"/>
		<reference ref_id="CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043/" source="CVE"/>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<reference ref_id="CVE-2024-0450" ref_url="https://www.suse.com/security/cve/CVE-2024-0450/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019258.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2023-52425: Fixed using the system libexpat (bsc#1219559).
- CVE-2023-27043: Modifed fix for unicode string handling in email.utils.parseaddr() (bsc#1222537).
- CVE-2022-48560: Fixed use-after-free in Python via heappushpop in heapq (bsc#1214675).
- CVE-2024-0450: Detect the vulnerability of the 'quoted-overlap' zipbomb (bsc#1221854).

Bug fixes:

- Switch off tests. ONLY FOR FACTORY!!! (bsc#1219306).
- Build with -std=gnu89 to build correctly with gcc14 (bsc#1220970).
- Switch from %patchN style to the %patch -P N one.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214675">SUSE bug 1214675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219306">SUSE bug 1219306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219559">SUSE bug 1219559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220970">SUSE bug 1220970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221854">SUSE bug 1221854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222537">SUSE bug 1222537</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48560/">CVE-2022-48560 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48560">CVE-2022-48560 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0450/">CVE-2024-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009863227" comment="libpython2_7-1_0-2.7.18-150000.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863228" comment="libpython2_7-1_0-32bit-2.7.18-150000.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863229" comment="python-2.7.18-150000.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863230" comment="python-32bit-2.7.18-150000.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863231" comment="python-base-2.7.18-150000.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863232" comment="python-base-32bit-2.7.18-150000.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863233" comment="python-curses-2.7.18-150000.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863234" comment="python-demo-2.7.18-150000.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863235" comment="python-devel-2.7.18-150000.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863236" comment="python-doc-2.7.18-150000.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863237" comment="python-doc-pdf-2.7.18-150000.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863238" comment="python-gdbm-2.7.18-150000.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863239" comment="python-idle-2.7.18-150000.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863240" comment="python-tk-2.7.18-150000.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863241" comment="python-xml-2.7.18-150000.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4755" version="1" class="patch">
	<metadata>
		<title>Security update for python-Jinja2 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218722" ref_url="https://bugzilla.suse.com/1218722" source="BUGZILLA"/>
		<reference ref_id="1223980" ref_url="https://bugzilla.suse.com/1223980" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-22195" ref_url="https://www.suse.com/security/cve/CVE-2024-22195/" source="CVE"/>
		<reference ref_id="CVE-2024-34064" ref_url="https://www.suse.com/security/cve/CVE-2024-34064/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019260.html" source="SUSE-SU"/>
		<description>
This update for python-Jinja2 fixes the following issues:

- Fixed HTML attribute injection when passing user input as keys to xmlattr filter (CVE-2024-34064, bsc#1223980, CVE-2024-22195, bsc#1218722)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218722">SUSE bug 1218722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223980">SUSE bug 1223980</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-22195/">CVE-2024-22195 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22195">CVE-2024-22195 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-34064/">CVE-2024-34064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34064">CVE-2024-34064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009863242" comment="python-Jinja2-emacs-2.10.1-150000.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863243" comment="python-Jinja2-vim-2.10.1-150000.3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863244" comment="python3-Jinja2-2.10.1-150000.3.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4756" version="1" class="patch">
	<metadata>
		<title>Security update for python-Jinja2 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218722" ref_url="https://bugzilla.suse.com/1218722" source="BUGZILLA"/>
		<reference ref_id="1223980" ref_url="https://bugzilla.suse.com/1223980" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-22195" ref_url="https://www.suse.com/security/cve/CVE-2024-22195/" source="CVE"/>
		<reference ref_id="CVE-2024-34064" ref_url="https://www.suse.com/security/cve/CVE-2024-34064/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019259.html" source="SUSE-SU"/>
		<description>
This update for python-Jinja2 fixes the following issues:

- Fixed HTML attribute injection when passing user input as keys to xmlattr filter (CVE-2024-34064, bsc#1223980, CVE-2024-22195, bsc#1218722)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218722">SUSE bug 1218722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223980">SUSE bug 1223980</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-22195/">CVE-2024-22195 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22195">CVE-2024-22195 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-34064/">CVE-2024-34064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34064">CVE-2024-34064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863245" comment="python311-Jinja2-3.1.2-150400.12.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4757" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224259" ref_url="https://bugzilla.suse.com/1224259" source="BUGZILLA"/>
		<reference ref_id="1224274" ref_url="https://bugzilla.suse.com/1224274" source="BUGZILLA"/>
		<reference ref_id="1224276" ref_url="https://bugzilla.suse.com/1224276" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-4853" ref_url="https://www.suse.com/security/cve/CVE-2024-4853/" source="CVE"/>
		<reference ref_id="CVE-2024-4854" ref_url="https://www.suse.com/security/cve/CVE-2024-4854/" source="CVE"/>
		<reference ref_id="CVE-2024-4855" ref_url="https://www.suse.com/security/cve/CVE-2024-4855/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019251.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update to version 3.6.22:

- CVE-2024-4854: MONGO and ZigBee TLV dissector infinite loops (bsc#1224274)
- CVE-2024-4853: The editcap command line utility could crash
  when chopping bytes from the beginning of a packet (bsc#1224259)
- CVE-2024-4855: The editcap command line utility could crash
  when injecting secrets while writing multiple files (bsc#1224276)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1224259">SUSE bug 1224259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224274">SUSE bug 1224274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224276">SUSE bug 1224276</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4853/">CVE-2024-4853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4853">CVE-2024-4853 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4854/">CVE-2024-4854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4854">CVE-2024-4854 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-4855/">CVE-2024-4855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4855">CVE-2024-4855 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009863246" comment="libwireshark15-3.6.23-150000.3.115.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863247" comment="libwiretap12-3.6.23-150000.3.115.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863248" comment="libwsutil13-3.6.23-150000.3.115.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863249" comment="wireshark-3.6.23-150000.3.115.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863250" comment="wireshark-devel-3.6.23-150000.3.115.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863251" comment="wireshark-ui-qt-3.6.23-150000.3.115.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4758" version="1" class="patch">
	<metadata>
		<title>Security update for python-aiohttp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223098" ref_url="https://bugzilla.suse.com/1223098" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-27306" ref_url="https://www.suse.com/security/cve/CVE-2024-27306/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019253.html" source="SUSE-SU"/>
		<description>
This update for python-aiohttp fixes the following issues:

- CVE-2024-27306: Fixed XSS on index pages for static file handling (bsc#1223098)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1223098">SUSE bug 1223098</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-27306/">CVE-2024-27306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27306">CVE-2024-27306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863252" comment="python311-aiohttp-3.9.3-150400.10.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4759" version="1" class="patch">
	<metadata>
		<title>Security update for fwupdate (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1209188" ref_url="https://bugzilla.suse.com/1209188" source="BUGZILLA"/>
		<reference ref_id="1221301" ref_url="https://bugzilla.suse.com/1221301" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2024:1867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019256.html" source="SUSE-SU"/>
		<description>

This update of fwupdate fixes the following issues:

- rebuild the package with the new secure boot key (bsc#1209188).
- Update the email address of security team in SBAT (bsc#1221301)
- elf_aarch64_efi.lds: set the memory permission explicitly to
  avoid ld warning like 'LOAD segment with RWX permissions'
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1209188">SUSE bug 1209188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221301">SUSE bug 1221301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009863253" comment="fwupdate-12-150100.11.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863254" comment="fwupdate-devel-12-150100.11.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863255" comment="fwupdate-efi-12-150100.11.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863256" comment="libfwup1-12-150100.11.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4760" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1221401" ref_url="https://bugzilla.suse.com/1221401" source="BUGZILLA"/>
		<reference ref_id="1222330" ref_url="https://bugzilla.suse.com/1222330" source="BUGZILLA"/>
		<reference ref_id="1222332" ref_url="https://bugzilla.suse.com/1222332" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38709" ref_url="https://www.suse.com/security/cve/CVE-2023-38709/" source="CVE"/>
		<reference ref_id="CVE-2024-24795" ref_url="https://www.suse.com/security/cve/CVE-2024-24795/" source="CVE"/>
		<reference ref_id="CVE-2024-27316" ref_url="https://www.suse.com/security/cve/CVE-2024-27316/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019070.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2023-38709: Fixed faulty input validation inside the HTTP response splitting code (bsc#1222330).
- CVE-2024-24795: Fixed handling of malicious HTTP splitting response headers in multiple modules (bsc#1222332).
- CVE-2024-27316: Fixed HTTP/2 CONTINUATION frames that could have been utilized for DoS attacks (bsc#1221401).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-05-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221401">SUSE bug 1221401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222330">SUSE bug 1222330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222332">SUSE bug 1222332</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-38709/">CVE-2023-38709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38709">CVE-2023-38709 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-24795/">CVE-2024-24795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24795">CVE-2024-24795 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27316/">CVE-2024-27316 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27316">CVE-2024-27316 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009863257" comment="apache2-2.4.51-150400.6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863258" comment="apache2-devel-2.4.51-150400.6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863259" comment="apache2-doc-2.4.51-150400.6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863260" comment="apache2-event-2.4.51-150400.6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863261" comment="apache2-example-pages-2.4.51-150400.6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863262" comment="apache2-prefork-2.4.51-150400.6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863263" comment="apache2-utils-2.4.51-150400.6.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863264" comment="apache2-worker-2.4.51-150400.6.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4761" version="1" class="patch">
	<metadata>
		<title>Security update for python-tqdm (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223880" ref_url="https://bugzilla.suse.com/1223880" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-34062" ref_url="https://www.suse.com/security/cve/CVE-2024-34062/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019257.html" source="SUSE-SU"/>
		<description>
This update for python-tqdm fixes the following issues:

Update to version 4.66.4:

* rich: fix completion
* cli: eval safety (CVE-2024-34062, bsc#1223880)
* pandas: add DataFrame.progress_map
* notebook: fix HTML padding
* keras: fix resuming training when verbose&gt;=2
* fix format_num negative fractions missing leading zero
* fix Python 3.12 DeprecationWarning on import
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-30"/>
	<updated date="2024-05-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1223880">SUSE bug 1223880</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-34062/">CVE-2024-34062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34062">CVE-2024-34062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009863265" comment="python-tqdm-bash-completion-4.66.4-150400.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863266" comment="python311-tqdm-4.66.4-150400.9.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4762" version="1" class="patch">
	<metadata>
		<title>Security update for Java (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1187446" ref_url="https://bugzilla.suse.com/1187446" source="BUGZILLA"/>
		<reference ref_id="1224410" ref_url="https://bugzilla.suse.com/1224410" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33813" ref_url="https://www.suse.com/security/cve/CVE-2021-33813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035436.html" source="SUSE-SU"/>
		<description>
This update for Java fixes thefollowing issues:

apiguardian was updated to vesion 1.1.2:

- Added LICENSE/NOTICE to the generated jar
- Allow @API to be declared at the package level
- Explain usage of Status.DEPRECATED
- Include OSGi metadata in manifest

assertj-core was implemented at version 3.25.3:

- New package implementation needed by Junit5

byte-buddy was updated to version v1.14.16:

- `byte-buddy` is required by `assertj-core`
- Changes in version v1.14.16:

  * Update ASM and introduce support for Java 23.

- Changes in version v1.14.15:

  * Allow attaching from root on J9.

- Changes of v1.14.14:

  * Adjust type validation to accept additional names that are
    legal in the class file format.
  * Fix dynamic attach on Windows when a service user is active.
  * Avoid failure when using Android's strict mode.

dom4j was updated to version 2.1.4:

- Improvements and potentially breaking changes:

  * Added new factory method org.dom4j.io.SAXReader.createDefault(). It has more secure defaults than new SAXReader(),
    which uses system XMLReaderFactory.createXMLReader() or SAXParserFactory.newInstance().newSAXParser().
  * If you use some optional dependency of dom4j (for example Jaxen, xsdlib etc.), you need to specify an explicit
    dependency on it in your project. They are no longer marked as a mandatory transitive dependency by dom4j.
  * Following SAX parser features are disabled by default in DocumentHelper.parse() for security reasons (they were
    enabled in previous versions):
      
    + http://xml.org/sax/properties/external-general-entities
    + http://xml.org/sax/properties/external-parameter-entities

- Other changes:

  * Do not depend on jtidy, since it is not used during build
  * Fixed license to Plexus
  * JPMS: Add the Automatic-Module-Name attribute to the manifest.
  * Make a separate flavour for a minimal `dom4j-bootstrap` package used to build `jaxen` and full `dom4j`
  * Updated pull-parser version
  * Reuse the writeAttribute method in writeAttributes
  * Support build on OS with non-UTF8 as default charset
  * Gradle: add an automatic module name
  * Use Correct License Name 'Plexus'
  * Possible vulnerability of DocumentHelper.parseText() to XML injection
  * CVS directories left in the source tree
  * XMLWriter does not escape supplementary unicode characters correctly
  * writer.writeOpen(x) doesn't write namespaces
  * Fixed concurrency problem with QNameCache
  * All dependencies are optional
  * SAXReader: hardcoded namespace features
  * Validate QNames
  * StringIndexOutOfBoundsException in XMLWriter.writeElementContent()
  * TreeNode has grown some generics
  * QName serialization fix
  * DocumentException initialize with nested exception
  * Accidentally occurring error in a multi-threaded test
  * Added compatibility with W3C DOM Level 3
  * Use Java generics

hamcrest:

-  `hamcrest-core` has been replaced by `hamcrest` (no source changes)

junit had the following change:

- Require hamcrest &gt;= 2.2

junit5 was updated to version 5.10.2:
    
- Conditional execution based on OS architectures
- Configurable cleanup mode for @TempDir
- Configurable thread mode for @Timeout
- Custom class loader support for class/method selectors, @MethodSource, @EnabledIf, and @DisabledIf
- Dry-run mode for test execution
- Failure threshold for @RepeatedTest
- Fixed build with the latest open-test-reporting milestone
- Fixed dependencies in module-info.java files
- Fixed unreported exception error that is fatal with JDK 21
- Improved configurability of parallel execution
- New @SelectMethod support in test @Suite classes.
- New ConsoleLauncher subcommand for test discovery without execution
- New convenience base classes for implementing ArgumentsProvider and ArgumentConverter
- New IterationSelector
- New LauncherInterceptor SPI
- New NamespacedHierarchicalStore for use in third-party test engines
- New TempDirFactory SPI for customizing how temporary directories are created
- New testfeed details mode for ConsoleLauncher
- New TestInstancePreConstructCallback extension API
- Numerous bug fixes and minor improvements
- Parameter injection for @MethodSource methods
- Promotion of various experimental APIs to stable
- Reusable parameter resolution for custom extension methods via ExecutableInvoker
- Stacktrace pruning to hide internal JUnit calls
- The binaries are compatible with java 1.8
- Various improvements to ConsoleLauncher
- XML reports in new Open Test Reporting format

jdom:

- Security issues fixed:

  * CVE-2021-33813: Fixed an XXE issue in SAXBuilder in JDOM through 2.0.6 allows attackers to cause a denial of service
    via a crafted HTTP request (bsc#1187446)

- Other changes and bugs fixed:
    
  * Fixed wrong entries in changelog (bsc#1224410)
  * The packages `jaxen`, `saxpath` and `xom` are now separate standalone packages instead of being part of `jdom`

jaxen was implemented at version 2.0.0:

- New standalone RPM package implementation, originally part of `jdom` source package
- Classpaths are much smaller and less complex, and will suppress a lot of noise from static analysis tools.
- The Jaxen core code is also a little smaller and has fixed a few minor bugs in XPath evaluation
- Despite the major version bump, this should be a drop in replacement for almost every project. 
  The two major possible incompatibilities are:
  
  * The minimum supported Java version is now 1.5, up from 1.4 in 1.2.0 and 1.3 in 1.1.6.
  * dom4j, XOM, and JDOM are now optional dependencies so if a project was depending on them to be loaded transitively
    it will need to add explicit dependencies to build.

jopt-simple:

- Included jopt-simple to Package Hub 15 SP5 (no source changes)

objectweb-asm was updated to version 9.7:

- New Opcodes.V23 constant for Java 23
- Bugs fixed
  * Fixed unit test regression in dex2jar.
  * Fixed 'ClassNode#outerClass' with incorrect JavaDocs.
  * asm-bom packaging should be 'pom'.
  * The Textifier prints a supplementary space at the end of each method that throws at least one exception.


open-test-reporting:

- Included `open-test-reporting-events` and `open-test-reporting-schema` to the channels as they are runtime 
  dependencies of Junit5 (no source changes)

saxpath was implemented at version 1.0 FCS:

- New standalone RPM package implementation, originally part of `jdom` source package (openSUSE Leap 15.5 package only)

xom was implemented at version 1.3.9:

- New standalone RPM package implementation, originally part of `jdom` source package
- The Nodes and Elements classes are iterable so you can use the enhanced for loop syntax on instances of these classes.
- The copy() method is now covariant.
- Adds Automatic-Moduole-Name to jar
- Remove direct dependency on xml-apis:xml-apis artifact since these classes are now available in the core runtime.
- Eliminate usage of com.sun classes to make XOM compatible with JDK 16.
- Replace remaining usages of StringBuffer with StringBuilder to slightly improve performance.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-31"/>
	<updated date="2024-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187446">SUSE bug 1187446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224410">SUSE bug 1224410</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33813/">CVE-2021-33813 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33813">CVE-2021-33813 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009863396" comment="apiguardian-1.1.2-150200.3.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863397" comment="apiguardian-javadoc-1.1.2-150200.3.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863398" comment="assertj-core-3.25.3-150200.5.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863399" comment="byte-buddy-1.14.16-150200.5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863400" comment="dom4j-2.1.4-150200.12.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863401" comment="dom4j-demo-2.1.4-150200.12.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863402" comment="dom4j-javadoc-2.1.4-150200.12.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863403" comment="hamcrest-2.2-150200.12.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863404" comment="hamcrest-javadoc-2.2-150200.12.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863405" comment="jaxen-2.0.0-150200.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863406" comment="jdom-1.1.3-150200.12.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863407" comment="jopt-simple-5.0.4-150200.3.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863408" comment="jopt-simple-javadoc-5.0.4-150200.3.4.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863409" comment="junit-4.13.2-150200.3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863410" comment="junit-javadoc-4.13.2-150200.3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863411" comment="junit-manual-4.13.2-150200.3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863412" comment="junit5-5.10.2-150200.3.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863413" comment="junit5-bom-5.10.2-150200.3.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863414" comment="junit5-guide-5.10.2-150200.3.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863415" comment="junit5-javadoc-5.10.2-150200.3.10.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863416" comment="junit5-minimal-5.10.2-150200.3.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863417" comment="objectweb-asm-9.7-150200.3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863418" comment="objectweb-asm-javadoc-9.7-150200.3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863419" comment="open-test-reporting-events-0.1.0~M2-150200.5.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863420" comment="open-test-reporting-schema-0.1.0~M2-150200.5.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863421" comment="saxpath-1.0-150200.5.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863422" comment="xom-1.3.9-150200.5.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4763" version="1" class="patch">
	<metadata>
		<title>Security update for python-requests (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224788" ref_url="https://bugzilla.suse.com/1224788" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-35195" ref_url="https://www.suse.com/security/cve/CVE-2024-35195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1880-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035430.html" source="SUSE-SU"/>
		<description>
This update for python-requests fixes the following issues:

- CVE-2024-35195: Fixed cert verification regardless of changes to the value of `verify` (bsc#1224788).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-31"/>
	<updated date="2024-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1224788">SUSE bug 1224788</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-35195/">CVE-2024-35195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35195">CVE-2024-35195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863423" comment="python3-requests-2.25.1-150300.3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4764" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-base (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224806" ref_url="https://bugzilla.suse.com/1224806" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-4453" ref_url="https://www.suse.com/security/cve/CVE-2024-4453/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1882-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035429.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-base fixes the following issues:

- CVE-2024-4453: Fixed lack of proper validation of user-supplied data when parsing EXIF metadata (bsc#1224806)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-31"/>
	<updated date="2024-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1224806">SUSE bug 1224806</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4453/">CVE-2024-4453 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4453">CVE-2024-4453 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009863424" comment="gstreamer-plugins-base-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863425" comment="gstreamer-plugins-base-32bit-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863426" comment="gstreamer-plugins-base-devel-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863427" comment="gstreamer-plugins-base-devel-32bit-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863428" comment="gstreamer-plugins-base-lang-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863429" comment="libgstallocators-1_0-0-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863430" comment="libgstallocators-1_0-0-32bit-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863431" comment="libgstapp-1_0-0-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863432" comment="libgstapp-1_0-0-32bit-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863433" comment="libgstaudio-1_0-0-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863434" comment="libgstaudio-1_0-0-32bit-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863435" comment="libgstfft-1_0-0-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863436" comment="libgstfft-1_0-0-32bit-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863437" comment="libgstgl-1_0-0-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863438" comment="libgstgl-1_0-0-32bit-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863439" comment="libgstpbutils-1_0-0-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863440" comment="libgstpbutils-1_0-0-32bit-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863441" comment="libgstriff-1_0-0-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863442" comment="libgstriff-1_0-0-32bit-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863443" comment="libgstrtp-1_0-0-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863444" comment="libgstrtp-1_0-0-32bit-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863445" comment="libgstrtsp-1_0-0-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863446" comment="libgstrtsp-1_0-0-32bit-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863447" comment="libgstsdp-1_0-0-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863448" comment="libgstsdp-1_0-0-32bit-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863449" comment="libgsttag-1_0-0-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863450" comment="libgsttag-1_0-0-32bit-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863451" comment="libgstvideo-1_0-0-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863452" comment="libgstvideo-1_0-0-32bit-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863453" comment="typelib-1_0-GstAllocators-1_0-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863454" comment="typelib-1_0-GstApp-1_0-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863455" comment="typelib-1_0-GstAudio-1_0-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863456" comment="typelib-1_0-GstGL-1_0-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863457" comment="typelib-1_0-GstGLEGL-1_0-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863458" comment="typelib-1_0-GstGLWayland-1_0-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863459" comment="typelib-1_0-GstGLX11-1_0-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863460" comment="typelib-1_0-GstPbutils-1_0-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863461" comment="typelib-1_0-GstRtp-1_0-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863462" comment="typelib-1_0-GstRtsp-1_0-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863463" comment="typelib-1_0-GstSdp-1_0-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863464" comment="typelib-1_0-GstTag-1_0-1.22.0-150500.3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863465" comment="typelib-1_0-GstVideo-1_0-1.22.0-150500.3.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4765" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1221940" ref_url="https://bugzilla.suse.com/1221940" source="BUGZILLA"/>
		<reference ref_id="1223423" ref_url="https://bugzilla.suse.com/1223423" source="BUGZILLA"/>
		<reference ref_id="1223424" ref_url="https://bugzilla.suse.com/1223424" source="BUGZILLA"/>
		<reference ref_id="1223425" ref_url="https://bugzilla.suse.com/1223425" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-33599" ref_url="https://www.suse.com/security/cve/CVE-2024-33599/" source="CVE"/>
		<reference ref_id="CVE-2024-33600" ref_url="https://www.suse.com/security/cve/CVE-2024-33600/" source="CVE"/>
		<reference ref_id="CVE-2024-33601" ref_url="https://www.suse.com/security/cve/CVE-2024-33601/" source="CVE"/>
		<reference ref_id="CVE-2024-33602" ref_url="https://www.suse.com/security/cve/CVE-2024-33602/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018639.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2024-33599: Fixed a stack-based buffer overflow in netgroup cache in nscd (bsc#1223423)
- CVE-2024-33600: Avoid null pointer crashes after notfound response in nscd (bsc#1223424)
- CVE-2024-33600: Do not send missing not-found response in addgetnetgrentX in nscd (bsc#1223424)
- CVE-2024-33601, CVE-2024-33602: Fixed use of two buffers in addgetnetgrentX ( bsc#1223425)
- CVE-2024-33602: Use time_t for return type of addgetnetgrentX (bsc#1223425)

- Avoid creating userspace live patching prologue for _start routine (bsc#1221940)

		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-03"/>
	<updated date="2024-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221940">SUSE bug 1221940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223423">SUSE bug 1223423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223424">SUSE bug 1223424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223425">SUSE bug 1223425</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-33599/">CVE-2024-33599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33599">CVE-2024-33599 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33600/">CVE-2024-33600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33600">CVE-2024-33600 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33601/">CVE-2024-33601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33601">CVE-2024-33601 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-33602/">CVE-2024-33602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33602">CVE-2024-33602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009863571" comment="glibc-2.31-150300.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863572" comment="glibc-32bit-2.31-150300.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863573" comment="glibc-devel-2.31-150300.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863574" comment="glibc-devel-32bit-2.31-150300.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863575" comment="glibc-devel-static-2.31-150300.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863576" comment="glibc-devel-static-32bit-2.31-150300.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863577" comment="glibc-extra-2.31-150300.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863578" comment="glibc-html-2.31-150300.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863579" comment="glibc-i18ndata-2.31-150300.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863580" comment="glibc-info-2.31-150300.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863581" comment="glibc-lang-2.31-150300.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863582" comment="glibc-locale-2.31-150300.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863583" comment="glibc-locale-base-2.31-150300.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863584" comment="glibc-locale-base-32bit-2.31-150300.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863585" comment="glibc-profile-2.31-150300.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863586" comment="glibc-profile-32bit-2.31-150300.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863587" comment="glibc-utils-2.31-150300.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863588" comment="glibc-utils-32bit-2.31-150300.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863589" comment="nscd-2.31-150300.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4766" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1225417" ref_url="https://bugzilla.suse.com/1225417" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-33427" ref_url="https://www.suse.com/security/cve/CVE-2024-33427/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018643.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2024-33427: Fixed possible buffer overread that could have led to a denial-of-service (bsc#1225417).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-03"/>
	<updated date="2024-06-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1225417">SUSE bug 1225417</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33427/">CVE-2024-33427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33427">CVE-2024-33427 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863590" comment="squid-5.7-150400.3.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4767" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg-4 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1186586" ref_url="https://bugzilla.suse.com/1186586" source="BUGZILLA"/>
		<reference ref_id="1223437" ref_url="https://bugzilla.suse.com/1223437" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-22021" ref_url="https://www.suse.com/security/cve/CVE-2020-22021/" source="CVE"/>
		<reference ref_id="CVE-2023-51794" ref_url="https://www.suse.com/security/cve/CVE-2023-51794/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035465.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg-4 fixes the following issues:

- CVE-2020-22021: Fixed a buffer overflow vulnerability in filter_edges() (bsc#1186586)
- CVE-2023-51794: Fixed a heap buffer overflow in libavfilter. (bsc#1223437)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-03"/>
	<updated date="2024-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186586">SUSE bug 1186586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223437">SUSE bug 1223437</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22021/">CVE-2020-22021 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-22021">CVE-2020-22021 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-51794/">CVE-2023-51794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51794">CVE-2023-51794 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009863591" comment="ffmpeg-4-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863592" comment="ffmpeg-4-libavcodec-devel-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863593" comment="ffmpeg-4-libavdevice-devel-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863594" comment="ffmpeg-4-libavfilter-devel-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863595" comment="ffmpeg-4-libavformat-devel-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863596" comment="ffmpeg-4-libavresample-devel-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863597" comment="ffmpeg-4-libavutil-devel-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863598" comment="ffmpeg-4-libpostproc-devel-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863599" comment="ffmpeg-4-libswresample-devel-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863600" comment="ffmpeg-4-libswscale-devel-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863601" comment="ffmpeg-4-private-devel-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863602" comment="libavcodec58_134-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863603" comment="libavcodec58_134-32bit-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863604" comment="libavdevice58_13-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863605" comment="libavdevice58_13-32bit-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863606" comment="libavfilter7_110-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863607" comment="libavfilter7_110-32bit-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863608" comment="libavformat58_76-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863609" comment="libavformat58_76-32bit-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863610" comment="libavresample4_0-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863611" comment="libavresample4_0-32bit-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863612" comment="libavutil56_70-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863613" comment="libavutil56_70-32bit-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863614" comment="libpostproc55_9-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863615" comment="libpostproc55_9-32bit-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863616" comment="libswresample3_9-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863617" comment="libswresample3_9-32bit-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863618" comment="libswscale5_9-4.4-150400.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863619" comment="libswscale5_9-32bit-4.4-150400.3.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4768" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223437" ref_url="https://bugzilla.suse.com/1223437" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-51794" ref_url="https://www.suse.com/security/cve/CVE-2023-51794/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1908-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035464.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg fixes the following issues:

- CVE-2023-51794: Fixed a heap buffer overflow in libavfilter. (bsc#1223437)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-03"/>
	<updated date="2024-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223437">SUSE bug 1223437</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-51794/">CVE-2023-51794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51794">CVE-2023-51794 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009863620" comment="ffmpeg-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863621" comment="ffmpeg-private-devel-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863622" comment="libavcodec-devel-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863623" comment="libavcodec57-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863624" comment="libavcodec57-32bit-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863625" comment="libavdevice-devel-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863626" comment="libavdevice57-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863627" comment="libavdevice57-32bit-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863628" comment="libavfilter-devel-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863629" comment="libavfilter6-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863630" comment="libavfilter6-32bit-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863631" comment="libavformat-devel-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863632" comment="libavformat57-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863633" comment="libavformat57-32bit-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863634" comment="libavresample-devel-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863635" comment="libavresample3-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863636" comment="libavresample3-32bit-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863637" comment="libavutil-devel-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863638" comment="libavutil55-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863639" comment="libavutil55-32bit-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863640" comment="libpostproc-devel-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863641" comment="libpostproc54-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863642" comment="libpostproc54-32bit-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863643" comment="libswresample-devel-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863644" comment="libswresample2-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863645" comment="libswresample2-32bit-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863646" comment="libswscale-devel-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863647" comment="libswscale4-3.4.2-150200.11.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009863648" comment="libswscale4-32bit-3.4.2-150200.11.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4769" version="1" class="patch">
	<metadata>
		<title>Security update for python-docker (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224788" ref_url="https://bugzilla.suse.com/1224788" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-35195" ref_url="https://www.suse.com/security/cve/CVE-2024-35195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1937-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035849.html" source="SUSE-SU"/>
		<description>
This update for python-docker fixes the following issues:

- CVE-2024-35195: Fixed missing certificate verification (bsc#1224788).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-08"/>
	<updated date="2024-07-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1224788">SUSE bug 1224788</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-35195/">CVE-2024-35195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35195">CVE-2024-35195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864937" comment="python311-docker-7.0.0-150400.8.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4770" version="1" class="patch">
	<metadata>
		<title>Security update for python-docker (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224788" ref_url="https://bugzilla.suse.com/1224788" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-35195" ref_url="https://www.suse.com/security/cve/CVE-2024-35195/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1938-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035535.html" source="SUSE-SU"/>
		<description>
This update for python-docker fixes the following issues:

- CVE-2024-35195: Fix failure with updated python-requests. (bsc#1224788)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-07"/>
	<updated date="2024-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1224788">SUSE bug 1224788</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-35195/">CVE-2024-35195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35195">CVE-2024-35195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864779" comment="python3-docker-4.2.0-150200.3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4771" version="1" class="patch">
	<metadata>
		<title>Security update for python-idna (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222842" ref_url="https://bugzilla.suse.com/1222842" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-3651" ref_url="https://www.suse.com/security/cve/CVE-2024-3651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1939-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035533.html" source="SUSE-SU"/>
		<description>
This update for python-idna fixes the following issues:

- CVE-2024-3651: Fixed a denial of service via resource consumption through 
  specially crafted inputs to idna.encode() (bsc#1222842)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-07"/>
	<updated date="2024-06-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1222842">SUSE bug 1222842</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3651/">CVE-2024-3651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3651">CVE-2024-3651 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009864780" comment="python311-idna-3.4-150400.11.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4772" version="1" class="patch">
	<metadata>
		<title>Security update for python-Brotli (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1175825" ref_url="https://bugzilla.suse.com/1175825" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8927" ref_url="https://www.suse.com/security/cve/CVE-2020-8927/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1968-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035525.html" source="SUSE-SU"/>
		<description>
This update for python-Brotli fixes the following issues:

- CVE-2020-8927: Fixed integer overflow when input chunk is larger than 2GiB. (bsc#1175825)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-10"/>
	<updated date="2024-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175825">SUSE bug 1175825</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8927/">CVE-2020-8927 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-8927">CVE-2020-8927 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865177" comment="python3-Brotli-1.0.7-150200.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4773" version="1" class="patch">
	<metadata>
		<title>Security update for go1.21 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="1225973" ref_url="https://bugzilla.suse.com/1225973" source="BUGZILLA"/>
		<reference ref_id="1225974" ref_url="https://bugzilla.suse.com/1225974" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-24789" ref_url="https://www.suse.com/security/cve/CVE-2024-24789/" source="CVE"/>
		<reference ref_id="CVE-2024-24790" ref_url="https://www.suse.com/security/cve/CVE-2024-24790/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035524.html" source="SUSE-SU"/>
		<description>
This update for go1.21 fixes the following issues:

go1.21.11 release (bsc#1212475).

- CVE-2024-24789: Fixed mishandling of corrupt central directory record in archive/zip (bsc#1225973).
- CVE-2024-24790: Fixed unexpected behavior from Is methods for IPv4-mapped IPv6 addresses (bsc#1225974).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-10"/>
	<updated date="2024-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225973">SUSE bug 1225973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225974">SUSE bug 1225974</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24789/">CVE-2024-24789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24789">CVE-2024-24789 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-24790/">CVE-2024-24790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865178" comment="go1.21-1.21.11-150000.1.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865179" comment="go1.21-doc-1.21.11-150000.1.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865180" comment="go1.21-race-1.21.11-150000.1.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4774" version="1" class="patch">
	<metadata>
		<title>Security update for go1.22 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218424" ref_url="https://bugzilla.suse.com/1218424" source="BUGZILLA"/>
		<reference ref_id="1225973" ref_url="https://bugzilla.suse.com/1225973" source="BUGZILLA"/>
		<reference ref_id="1225974" ref_url="https://bugzilla.suse.com/1225974" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-24789" ref_url="https://www.suse.com/security/cve/CVE-2024-24789/" source="CVE"/>
		<reference ref_id="CVE-2024-24790" ref_url="https://www.suse.com/security/cve/CVE-2024-24790/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018674.html" source="SUSE-SU"/>
		<description>
This update for go1.22 fixes the following issues:

go1.21.11 release (bsc#1212475).

- CVE-2024-24789: Fixed mishandling of corrupt central directory record in archive/zip (bsc#1225973).
- CVE-2024-24790: Fixed unexpected behavior from Is methods for IPv4-mapped IPv6 addresses (bsc#1225974).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-10"/>
	<updated date="2024-06-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218424">SUSE bug 1218424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225973">SUSE bug 1225973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225974">SUSE bug 1225974</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24789/">CVE-2024-24789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24789">CVE-2024-24789 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-24790/">CVE-2024-24790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865181" comment="go1.22-1.22.4-150000.1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865182" comment="go1.22-doc-1.22.4-150000.1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865183" comment="go1.22-race-1.22.4-150000.1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4775" version="1" class="patch">
	<metadata>
		<title>Security update for frr (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222526" ref_url="https://bugzilla.suse.com/1222526" source="BUGZILLA"/>
		<reference ref_id="1222528" ref_url="https://bugzilla.suse.com/1222528" source="BUGZILLA"/>
		<reference ref_id="1223786" ref_url="https://bugzilla.suse.com/1223786" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-31950" ref_url="https://www.suse.com/security/cve/CVE-2024-31950/" source="CVE"/>
		<reference ref_id="CVE-2024-31951" ref_url="https://www.suse.com/security/cve/CVE-2024-31951/" source="CVE"/>
		<reference ref_id="CVE-2024-34088" ref_url="https://www.suse.com/security/cve/CVE-2024-34088/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018673.html" source="SUSE-SU"/>
		<description>
This update for frr fixes the following issues:

- CVE-2024-34088: Fixed null pointer via get_edge() function can trigger a denial of service (bsc#1223786).
- CVE-2024-31951: Fixed buffer overflow in ospf_te_parse_ext_link (bsc#1222528).
- CVE-2024-31950: Fixed buffer overflow and daemon crash in ospf_te_parse_ri (bsc#1222526).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-10"/>
	<updated date="2024-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222526">SUSE bug 1222526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222528">SUSE bug 1222528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223786">SUSE bug 1223786</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31950/">CVE-2024-31950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31950">CVE-2024-31950 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31951/">CVE-2024-31951 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31951">CVE-2024-31951 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34088/">CVE-2024-34088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34088">CVE-2024-34088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865184" comment="frr-8.4-150500.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865185" comment="frr-devel-8.4-150500.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865186" comment="libfrr0-8.4-150500.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865187" comment="libfrr_pb0-8.4-150500.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865188" comment="libfrrcares0-8.4-150500.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865189" comment="libfrrfpm_pb0-8.4-150500.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865190" comment="libfrrospfapiclient0-8.4-150500.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865191" comment="libfrrsnmp0-8.4-150500.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865192" comment="libfrrzmq0-8.4-150500.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865193" comment="libmlag_pb0-8.4-150500.4.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4776" version="1" class="patch">
	<metadata>
		<title>Security update for rmt-server (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1203171" ref_url="https://bugzilla.suse.com/1203171" source="BUGZILLA"/>
		<reference ref_id="1225997" ref_url="https://bugzilla.suse.com/1225997" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-28103" ref_url="https://www.suse.com/security/cve/CVE-2024-28103/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1974-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035541.html" source="SUSE-SU"/>
		<description>
This update for rmt-server fixes the following issues:


- Update to version 2.17
- CVE-2024-28103: Fixed Permissions-Policy that was only served on responses with an HTML related Content-Type. (bsc#1225997)
  		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-11"/>
	<updated date="2024-06-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1203171">SUSE bug 1203171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225997">SUSE bug 1225997</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-28103/">CVE-2024-28103 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-28103">CVE-2024-28103 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865337" comment="rmt-server-2.17-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865338" comment="rmt-server-config-2.17-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865339" comment="rmt-server-pubcloud-2.17-150500.3.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4777" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223375" ref_url="https://bugzilla.suse.com/1223375" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-4141" ref_url="https://www.suse.com/security/cve/CVE-2024-4141/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1980-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035557.html" source="SUSE-SU"/>
		<description>
This update for poppler fixes the following issues:

- CVE-2024-4141: Fixed out-of-bounds array write (bsc#1223375).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-11"/>
	<updated date="2024-06-11"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1223375">SUSE bug 1223375</bugzilla>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4141/">CVE-2024-4141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4141">CVE-2024-4141 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865340" comment="libpoppler-cpp0-23.01.0-150500.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865341" comment="libpoppler-cpp0-32bit-23.01.0-150500.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865342" comment="libpoppler-devel-23.01.0-150500.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865343" comment="libpoppler-glib-devel-23.01.0-150500.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865344" comment="libpoppler-glib8-23.01.0-150500.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865345" comment="libpoppler-glib8-32bit-23.01.0-150500.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865346" comment="libpoppler-qt5-1-23.01.0-150500.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865347" comment="libpoppler-qt5-1-32bit-23.01.0-150500.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865348" comment="libpoppler-qt5-devel-23.01.0-150500.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865349" comment="libpoppler-qt6-3-23.01.0-150500.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865350" comment="libpoppler-qt6-devel-23.01.0-150500.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865351" comment="libpoppler126-23.01.0-150500.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865352" comment="libpoppler126-32bit-23.01.0-150500.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865353" comment="poppler-tools-23.01.0-150500.3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865354" comment="typelib-1_0-Poppler-0_18-23.01.0-150500.3.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4778" version="1" class="patch">
	<metadata>
		<title>Security update for iperf (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224262" ref_url="https://bugzilla.suse.com/1224262" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-26306" ref_url="https://www.suse.com/security/cve/CVE-2024-26306/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1981-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035556.html" source="SUSE-SU"/>
		<description>
This update for iperf fixes the following issues:

- Update to version 3.17.1
- CVE-2024-26306: Fixed a vulnerability that could led to marvin attack if the authentication option is used. (bsc#1224262)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-11"/>
	<updated date="2024-06-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1224262">SUSE bug 1224262</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26306/">CVE-2024-26306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26306">CVE-2024-26306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865355" comment="iperf-3.17.1-150000.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865356" comment="iperf-devel-3.17.1-150000.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865357" comment="libiperf0-3.17.1-150000.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4779" version="1" class="patch">
	<metadata>
		<title>Security update for aws-nitro-enclaves-cli (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218501" ref_url="https://bugzilla.suse.com/1218501" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-50711" ref_url="https://www.suse.com/security/cve/CVE-2023-50711/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1984-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035551.html" source="SUSE-SU"/>
		<description>
This update for aws-nitro-enclaves-cli fixes the following issues:

- CVE-2023-50711: Fixed out of bounds memory accesses in embedded vmm-sys-util (bsc#1218501).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-11"/>
	<updated date="2024-06-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218501">SUSE bug 1218501</bugzilla>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-50711/">CVE-2023-50711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50711">CVE-2023-50711 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865358" comment="aws-nitro-enclaves-binaryblobs-upstream-1.3.0~git1.db34c02-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865359" comment="aws-nitro-enclaves-cli-1.3.0~git1.db34c02-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865360" comment="system-group-ne-1.3.0~git1.db34c02-150400.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4780" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217405" ref_url="https://bugzilla.suse.com/1217405" source="BUGZILLA"/>
		<reference ref_id="1225983" ref_url="https://bugzilla.suse.com/1225983" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-22084" ref_url="https://www.suse.com/security/cve/CVE-2023-22084/" source="CVE"/>
		<reference ref_id="CVE-2024-21096" ref_url="https://www.suse.com/security/cve/CVE-2024-21096/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035550.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

- CVE-2024-21096: Fixed mysqldump unspecified vulnerability (bsc#1225983).
- CVE-2023-22084: Fixed a vulnerability allows high privileged attacker with network access via multiple protocols to compromise the server (bsc#1217405).

- Update to 10.6.18.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-11"/>
	<updated date="2024-06-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1217405">SUSE bug 1217405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225983">SUSE bug 1225983</bugzilla>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22084/">CVE-2023-22084 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22084">CVE-2023-22084 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-21096/">CVE-2024-21096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21096">CVE-2024-21096 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865361" comment="libmariadbd-devel-10.6.18-150400.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865362" comment="libmariadbd19-10.6.18-150400.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865363" comment="mariadb-10.6.18-150400.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865364" comment="mariadb-bench-10.6.18-150400.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865365" comment="mariadb-client-10.6.18-150400.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865366" comment="mariadb-errormessages-10.6.18-150400.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865367" comment="mariadb-galera-10.6.18-150400.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865368" comment="mariadb-rpm-macros-10.6.18-150400.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865369" comment="mariadb-test-10.6.18-150400.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865370" comment="mariadb-tools-10.6.18-150400.3.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4781" version="1" class="patch">
	<metadata>
		<title>Security update for skopeo (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224123" ref_url="https://bugzilla.suse.com/1224123" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-28180" ref_url="https://www.suse.com/security/cve/CVE-2024-28180/" source="CVE"/>
		<reference ref_id="CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035548.html" source="SUSE-SU"/>
		<description>
This update for skopeo fixes the following issues:

- Update to version 1.14.4:
- CVE-2024-3727: Fixed a vulnerability that allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, resource exhaustion, local path traversal and other attacks. (bsc#1224123)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-11"/>
	<updated date="2024-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1224123">SUSE bug 1224123</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28180/">CVE-2024-28180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28180">CVE-2024-28180 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865371" comment="skopeo-1.14.4-150300.11.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4782" version="1" class="patch">
	<metadata>
		<title>Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224119" ref_url="https://bugzilla.suse.com/1224119" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1988-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035547.html" source="SUSE-SU"/>
		<description>
This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer fixes the following issues:

Rebuild against current updated packages and go compiler.

- Bump github.com/containers/image/v5 (bsc#1224119, CVE-2024-3727)
- Add LABEL with source URL
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-11"/>
	<updated date="2024-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1224119">SUSE bug 1224119</bugzilla>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865372" comment="containerized-data-importer-api-1.58.0-150500.6.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865373" comment="containerized-data-importer-cloner-1.58.0-150500.6.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865374" comment="containerized-data-importer-controller-1.58.0-150500.6.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865375" comment="containerized-data-importer-importer-1.58.0-150500.6.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865376" comment="containerized-data-importer-manifests-1.58.0-150500.6.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865377" comment="containerized-data-importer-operator-1.58.0-150500.6.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865378" comment="containerized-data-importer-uploadproxy-1.58.0-150500.6.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865379" comment="containerized-data-importer-uploadserver-1.58.0-150500.6.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865380" comment="obs-service-cdi_containers_meta-1.58.0-150500.6.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4783" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223356" ref_url="https://bugzilla.suse.com/1223356" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0090" ref_url="https://www.suse.com/security/cve/CVE-2024-0090/" source="CVE"/>
		<reference ref_id="CVE-2024-0091" ref_url="https://www.suse.com/security/cve/CVE-2024-0091/" source="CVE"/>
		<reference ref_id="CVE-2024-0092" ref_url="https://www.suse.com/security/cve/CVE-2024-0092/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1990-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035545.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed fixes the following issues:

Security Update 550.90.07:

- CVE-2024-0090: Fixed out of bounds write (bsc#1223356).
- CVE-2024-0092: Fixed incorrect exception handling (bsc#1223356).
- CVE-2024-0091: Fixed untrusted pointer dereference (bsc#1223356).

		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-11"/>
	<updated date="2024-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223356">SUSE bug 1223356</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0090/">CVE-2024-0090 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0090">CVE-2024-0090 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0091/">CVE-2024-0091 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0091">CVE-2024-0091 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0092/">CVE-2024-0092 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0092">CVE-2024-0092 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865381" comment="kernel-firmware-nvidia-gspx-G06-550.90.07-150500.11.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865382" comment="nvidia-open-driver-G06-signed-64kb-devel-550.90.07-150500.3.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865383" comment="nvidia-open-driver-G06-signed-azure-devel-550.90.07-150500.3.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865384" comment="nvidia-open-driver-G06-signed-default-devel-550.90.07-150500.3.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865385" comment="nvidia-open-driver-G06-signed-kmp-64kb-550.90.07_k5.14.21_150500.55.65-150500.3.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865386" comment="nvidia-open-driver-G06-signed-kmp-azure-550.90.07_k5.14.21_150500.33.54-150500.3.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865387" comment="nvidia-open-driver-G06-signed-kmp-default-550.90.07_k5.14.21_150500.55.65-150500.3.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4784" version="1" class="patch">
	<metadata>
		<title>Security update for unbound (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1202031" ref_url="https://bugzilla.suse.com/1202031" source="BUGZILLA"/>
		<reference ref_id="1202033" ref_url="https://bugzilla.suse.com/1202033" source="BUGZILLA"/>
		<reference ref_id="1203643" ref_url="https://bugzilla.suse.com/1203643" source="BUGZILLA"/>
		<reference ref_id="1219823" ref_url="https://bugzilla.suse.com/1219823" source="BUGZILLA"/>
		<reference ref_id="1219826" ref_url="https://bugzilla.suse.com/1219826" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-30698" ref_url="https://www.suse.com/security/cve/CVE-2022-30698/" source="CVE"/>
		<reference ref_id="CVE-2022-30699" ref_url="https://www.suse.com/security/cve/CVE-2022-30699/" source="CVE"/>
		<reference ref_id="CVE-2022-3204" ref_url="https://www.suse.com/security/cve/CVE-2022-3204/" source="CVE"/>
		<reference ref_id="CVE-2023-50387" ref_url="https://www.suse.com/security/cve/CVE-2023-50387/" source="CVE"/>
		<reference ref_id="CVE-2023-50868" ref_url="https://www.suse.com/security/cve/CVE-2023-50868/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018692.html" source="SUSE-SU"/>
		<description>
This update for unbound fixes the following issues:

unbound was updated to 1.20.0:

* A lot of bugfixes and added features.
  For a complete list take a look at the changelog located at:
  /usr/share/doc/packages/unbound/Changelog or
  https://www.nlnetlabs.nl/projects/unbound/download/

Some Noteworthy Changes:

* Removed DLV. The DLV has been decommisioned since unbound
  1.5.4 and has been advised to stop using it since. The use of
  dlv options displays a warning.
* Remove EDNS lame procedure, do not re-query without EDNS after
  timeout.
* Add DNS over HTTPS
* libunbound has been upgraded to major version 8

Security Fixes:
* CVE-2023-50387: DNSSEC verification complexity can be
  exploited to exhaust CPU resources and stall DNS resolvers.  [bsc#1219823]
* CVE-2023-50868: NSEC3 closest encloser proof can exhaust CPU.
  [bsc#1219826]
* CVE-2022-30698: Novel 'ghost domain names' attack by
  introducing subdomain delegations.  [bsc#1202033]
* CVE-2022-30699: Novel 'ghost domain names' attack by
  updating almost expired delegation information.  [bsc#1202031]
* CVE-2022-3204: NRDelegation attack leads to uncontrolled
  resource consumption (Non-Responsive Delegation Attack).  [bsc#1203643]

Packaging Changes:

* Use prefixes instead of sudo in unbound.service
* Remove no longer necessary BuildRequires: libfstrm-devel and
  libprotobuf-c-devel
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-11"/>
	<updated date="2024-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202031">SUSE bug 1202031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202033">SUSE bug 1202033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203643">SUSE bug 1203643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219823">SUSE bug 1219823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219826">SUSE bug 1219826</bugzilla>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-30698/">CVE-2022-30698 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30698">CVE-2022-30698 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-30699/">CVE-2022-30699 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30699">CVE-2022-30699 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3204/">CVE-2022-3204 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3204">CVE-2022-3204 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50387/">CVE-2023-50387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50868/">CVE-2023-50868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865388" comment="libunbound8-1.20.0-150100.10.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865389" comment="unbound-1.20.0-150100.10.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865390" comment="unbound-anchor-1.20.0-150100.10.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865391" comment="unbound-devel-1.20.0-150100.10.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865392" comment="unbound-munin-1.20.0-150100.10.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865393" comment="unbound-python-1.20.0-150100.10.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4785" version="1" class="patch">
	<metadata>
		<title>Security update for redis7 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212119" ref_url="https://bugzilla.suse.com/1212119" source="BUGZILLA"/>
		<reference ref_id="1216376" ref_url="https://bugzilla.suse.com/1216376" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45145" ref_url="https://www.suse.com/security/cve/CVE-2023-45145/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017742.html" source="SUSE-SU"/>
		<description>
This update for redis7 fixes the following issues:

- CVE-2023-45145: Fixed a potential permission bypass due to a race
  condition during UNIX socket creation (bsc#1216376).

The following non-security issues were fixed:

- Redis services are no longer disabled after an upgrade (bsc#1212119).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-23"/>
	<updated date="2024-01-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212119">SUSE bug 1212119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216376">SUSE bug 1216376</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-45145/">CVE-2023-45145 at SUSE</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45145">CVE-2023-45145 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844252" comment="redis7-7.0.8-150500.3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4786" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223179" ref_url="https://bugzilla.suse.com/1223179" source="BUGZILLA"/>
		<reference ref_id="1225365" ref_url="https://bugzilla.suse.com/1225365" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-35235" ref_url="https://www.suse.com/security/cve/CVE-2024-35235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018704.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2024-35235: Fixed a bug in cupsd that could allow an attacker to change the permissions of other files in the system. (bsc#1225365)
- Handle local 'Negotiate' authentication response for cli clients (bsc#1223179)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-12"/>
	<updated date="2024-06-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223179">SUSE bug 1223179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225365">SUSE bug 1225365</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35235/">CVE-2024-35235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35235">CVE-2024-35235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865599" comment="cups-2.2.7-150000.3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865600" comment="cups-client-2.2.7-150000.3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865601" comment="cups-config-2.2.7-150000.3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865602" comment="cups-ddk-2.2.7-150000.3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865603" comment="cups-devel-2.2.7-150000.3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865604" comment="cups-devel-32bit-2.2.7-150000.3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865605" comment="libcups2-2.2.7-150000.3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865606" comment="libcups2-32bit-2.2.7-150000.3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865607" comment="libcupscgi1-2.2.7-150000.3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865608" comment="libcupscgi1-32bit-2.2.7-150000.3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865609" comment="libcupsimage2-2.2.7-150000.3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865610" comment="libcupsimage2-32bit-2.2.7-150000.3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865611" comment="libcupsmime1-2.2.7-150000.3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865612" comment="libcupsmime1-32bit-2.2.7-150000.3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865613" comment="libcupsppdc1-2.2.7-150000.3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865614" comment="libcupsppdc1-32bit-2.2.7-150000.3.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4787" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1141539" ref_url="https://bugzilla.suse.com/1141539" source="BUGZILLA"/>
		<reference ref_id="1174585" ref_url="https://bugzilla.suse.com/1174585" source="BUGZILLA"/>
		<reference ref_id="1181674" ref_url="https://bugzilla.suse.com/1181674" source="BUGZILLA"/>
		<reference ref_id="1187716" ref_url="https://bugzilla.suse.com/1187716" source="BUGZILLA"/>
		<reference ref_id="1190569" ref_url="https://bugzilla.suse.com/1190569" source="BUGZILLA"/>
		<reference ref_id="1191949" ref_url="https://bugzilla.suse.com/1191949" source="BUGZILLA"/>
		<reference ref_id="1192107" ref_url="https://bugzilla.suse.com/1192107" source="BUGZILLA"/>
		<reference ref_id="1193983" ref_url="https://bugzilla.suse.com/1193983" source="BUGZILLA"/>
		<reference ref_id="1194288" ref_url="https://bugzilla.suse.com/1194288" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1196956" ref_url="https://bugzilla.suse.com/1196956" source="BUGZILLA"/>
		<reference ref_id="1197915" ref_url="https://bugzilla.suse.com/1197915" source="BUGZILLA"/>
		<reference ref_id="1200465" ref_url="https://bugzilla.suse.com/1200465" source="BUGZILLA"/>
		<reference ref_id="1205205" ref_url="https://bugzilla.suse.com/1205205" source="BUGZILLA"/>
		<reference ref_id="1207284" ref_url="https://bugzilla.suse.com/1207284" source="BUGZILLA"/>
		<reference ref_id="1207361" ref_url="https://bugzilla.suse.com/1207361" source="BUGZILLA"/>
		<reference ref_id="1207948" ref_url="https://bugzilla.suse.com/1207948" source="BUGZILLA"/>
		<reference ref_id="1208149" ref_url="https://bugzilla.suse.com/1208149" source="BUGZILLA"/>
		<reference ref_id="1209657" ref_url="https://bugzilla.suse.com/1209657" source="BUGZILLA"/>
		<reference ref_id="1209799" ref_url="https://bugzilla.suse.com/1209799" source="BUGZILLA"/>
		<reference ref_id="1209834" ref_url="https://bugzilla.suse.com/1209834" source="BUGZILLA"/>
		<reference ref_id="1209980" ref_url="https://bugzilla.suse.com/1209980" source="BUGZILLA"/>
		<reference ref_id="1210335" ref_url="https://bugzilla.suse.com/1210335" source="BUGZILLA"/>
		<reference ref_id="1213863" ref_url="https://bugzilla.suse.com/1213863" source="BUGZILLA"/>
		<reference ref_id="1214852" ref_url="https://bugzilla.suse.com/1214852" source="BUGZILLA"/>
		<reference ref_id="1215322" ref_url="https://bugzilla.suse.com/1215322" source="BUGZILLA"/>
		<reference ref_id="1215702" ref_url="https://bugzilla.suse.com/1215702" source="BUGZILLA"/>
		<reference ref_id="1216358" ref_url="https://bugzilla.suse.com/1216358" source="BUGZILLA"/>
		<reference ref_id="1216702" ref_url="https://bugzilla.suse.com/1216702" source="BUGZILLA"/>
		<reference ref_id="1217169" ref_url="https://bugzilla.suse.com/1217169" source="BUGZILLA"/>
		<reference ref_id="1217339" ref_url="https://bugzilla.suse.com/1217339" source="BUGZILLA"/>
		<reference ref_id="1217515" ref_url="https://bugzilla.suse.com/1217515" source="BUGZILLA"/>
		<reference ref_id="1218447" ref_url="https://bugzilla.suse.com/1218447" source="BUGZILLA"/>
		<reference ref_id="1220021" ref_url="https://bugzilla.suse.com/1220021" source="BUGZILLA"/>
		<reference ref_id="1220267" ref_url="https://bugzilla.suse.com/1220267" source="BUGZILLA"/>
		<reference ref_id="1220363" ref_url="https://bugzilla.suse.com/1220363" source="BUGZILLA"/>
		<reference ref_id="1220783" ref_url="https://bugzilla.suse.com/1220783" source="BUGZILLA"/>
		<reference ref_id="1221044" ref_url="https://bugzilla.suse.com/1221044" source="BUGZILLA"/>
		<reference ref_id="1221081" ref_url="https://bugzilla.suse.com/1221081" source="BUGZILLA"/>
		<reference ref_id="1221615" ref_url="https://bugzilla.suse.com/1221615" source="BUGZILLA"/>
		<reference ref_id="1221777" ref_url="https://bugzilla.suse.com/1221777" source="BUGZILLA"/>
		<reference ref_id="1221816" ref_url="https://bugzilla.suse.com/1221816" source="BUGZILLA"/>
		<reference ref_id="1221829" ref_url="https://bugzilla.suse.com/1221829" source="BUGZILLA"/>
		<reference ref_id="1222011" ref_url="https://bugzilla.suse.com/1222011" source="BUGZILLA"/>
		<reference ref_id="1222374" ref_url="https://bugzilla.suse.com/1222374" source="BUGZILLA"/>
		<reference ref_id="1222385" ref_url="https://bugzilla.suse.com/1222385" source="BUGZILLA"/>
		<reference ref_id="1222413" ref_url="https://bugzilla.suse.com/1222413" source="BUGZILLA"/>
		<reference ref_id="1222464" ref_url="https://bugzilla.suse.com/1222464" source="BUGZILLA"/>
		<reference ref_id="1222513" ref_url="https://bugzilla.suse.com/1222513" source="BUGZILLA"/>
		<reference ref_id="1222559" ref_url="https://bugzilla.suse.com/1222559" source="BUGZILLA"/>
		<reference ref_id="1222561" ref_url="https://bugzilla.suse.com/1222561" source="BUGZILLA"/>
		<reference ref_id="1222608" ref_url="https://bugzilla.suse.com/1222608" source="BUGZILLA"/>
		<reference ref_id="1222619" ref_url="https://bugzilla.suse.com/1222619" source="BUGZILLA"/>
		<reference ref_id="1222627" ref_url="https://bugzilla.suse.com/1222627" source="BUGZILLA"/>
		<reference ref_id="1222721" ref_url="https://bugzilla.suse.com/1222721" source="BUGZILLA"/>
		<reference ref_id="1222765" ref_url="https://bugzilla.suse.com/1222765" source="BUGZILLA"/>
		<reference ref_id="1222770" ref_url="https://bugzilla.suse.com/1222770" source="BUGZILLA"/>
		<reference ref_id="1222783" ref_url="https://bugzilla.suse.com/1222783" source="BUGZILLA"/>
		<reference ref_id="1222793" ref_url="https://bugzilla.suse.com/1222793" source="BUGZILLA"/>
		<reference ref_id="1222838" ref_url="https://bugzilla.suse.com/1222838" source="BUGZILLA"/>
		<reference ref_id="1222870" ref_url="https://bugzilla.suse.com/1222870" source="BUGZILLA"/>
		<reference ref_id="1222893" ref_url="https://bugzilla.suse.com/1222893" source="BUGZILLA"/>
		<reference ref_id="1222960" ref_url="https://bugzilla.suse.com/1222960" source="BUGZILLA"/>
		<reference ref_id="1222961" ref_url="https://bugzilla.suse.com/1222961" source="BUGZILLA"/>
		<reference ref_id="1222974" ref_url="https://bugzilla.suse.com/1222974" source="BUGZILLA"/>
		<reference ref_id="1222975" ref_url="https://bugzilla.suse.com/1222975" source="BUGZILLA"/>
		<reference ref_id="1222976" ref_url="https://bugzilla.suse.com/1222976" source="BUGZILLA"/>
		<reference ref_id="1223011" ref_url="https://bugzilla.suse.com/1223011" source="BUGZILLA"/>
		<reference ref_id="1223023" ref_url="https://bugzilla.suse.com/1223023" source="BUGZILLA"/>
		<reference ref_id="1223027" ref_url="https://bugzilla.suse.com/1223027" source="BUGZILLA"/>
		<reference ref_id="1223031" ref_url="https://bugzilla.suse.com/1223031" source="BUGZILLA"/>
		<reference ref_id="1223043" ref_url="https://bugzilla.suse.com/1223043" source="BUGZILLA"/>
		<reference ref_id="1223046" ref_url="https://bugzilla.suse.com/1223046" source="BUGZILLA"/>
		<reference ref_id="1223048" ref_url="https://bugzilla.suse.com/1223048" source="BUGZILLA"/>
		<reference ref_id="1223049" ref_url="https://bugzilla.suse.com/1223049" source="BUGZILLA"/>
		<reference ref_id="1223084" ref_url="https://bugzilla.suse.com/1223084" source="BUGZILLA"/>
		<reference ref_id="1223113" ref_url="https://bugzilla.suse.com/1223113" source="BUGZILLA"/>
		<reference ref_id="1223119" ref_url="https://bugzilla.suse.com/1223119" source="BUGZILLA"/>
		<reference ref_id="1223137" ref_url="https://bugzilla.suse.com/1223137" source="BUGZILLA"/>
		<reference ref_id="1223138" ref_url="https://bugzilla.suse.com/1223138" source="BUGZILLA"/>
		<reference ref_id="1223140" ref_url="https://bugzilla.suse.com/1223140" source="BUGZILLA"/>
		<reference ref_id="1223188" ref_url="https://bugzilla.suse.com/1223188" source="BUGZILLA"/>
		<reference ref_id="1223203" ref_url="https://bugzilla.suse.com/1223203" source="BUGZILLA"/>
		<reference ref_id="1223207" ref_url="https://bugzilla.suse.com/1223207" source="BUGZILLA"/>
		<reference ref_id="1223315" ref_url="https://bugzilla.suse.com/1223315" source="BUGZILLA"/>
		<reference ref_id="1223360" ref_url="https://bugzilla.suse.com/1223360" source="BUGZILLA"/>
		<reference ref_id="1223384" ref_url="https://bugzilla.suse.com/1223384" source="BUGZILLA"/>
		<reference ref_id="1223390" ref_url="https://bugzilla.suse.com/1223390" source="BUGZILLA"/>
		<reference ref_id="1223432" ref_url="https://bugzilla.suse.com/1223432" source="BUGZILLA"/>
		<reference ref_id="1223489" ref_url="https://bugzilla.suse.com/1223489" source="BUGZILLA"/>
		<reference ref_id="1223505" ref_url="https://bugzilla.suse.com/1223505" source="BUGZILLA"/>
		<reference ref_id="1223532" ref_url="https://bugzilla.suse.com/1223532" source="BUGZILLA"/>
		<reference ref_id="1223575" ref_url="https://bugzilla.suse.com/1223575" source="BUGZILLA"/>
		<reference ref_id="1223595" ref_url="https://bugzilla.suse.com/1223595" source="BUGZILLA"/>
		<reference ref_id="1223626" ref_url="https://bugzilla.suse.com/1223626" source="BUGZILLA"/>
		<reference ref_id="1223627" ref_url="https://bugzilla.suse.com/1223627" source="BUGZILLA"/>
		<reference ref_id="1223628" ref_url="https://bugzilla.suse.com/1223628" source="BUGZILLA"/>
		<reference ref_id="1223631" ref_url="https://bugzilla.suse.com/1223631" source="BUGZILLA"/>
		<reference ref_id="1223633" ref_url="https://bugzilla.suse.com/1223633" source="BUGZILLA"/>
		<reference ref_id="1223638" ref_url="https://bugzilla.suse.com/1223638" source="BUGZILLA"/>
		<reference ref_id="1223650" ref_url="https://bugzilla.suse.com/1223650" source="BUGZILLA"/>
		<reference ref_id="1223653" ref_url="https://bugzilla.suse.com/1223653" source="BUGZILLA"/>
		<reference ref_id="1223666" ref_url="https://bugzilla.suse.com/1223666" source="BUGZILLA"/>
		<reference ref_id="1223670" ref_url="https://bugzilla.suse.com/1223670" source="BUGZILLA"/>
		<reference ref_id="1223671" ref_url="https://bugzilla.suse.com/1223671" source="BUGZILLA"/>
		<reference ref_id="1223675" ref_url="https://bugzilla.suse.com/1223675" source="BUGZILLA"/>
		<reference ref_id="1223677" ref_url="https://bugzilla.suse.com/1223677" source="BUGZILLA"/>
		<reference ref_id="1223678" ref_url="https://bugzilla.suse.com/1223678" source="BUGZILLA"/>
		<reference ref_id="1223679" ref_url="https://bugzilla.suse.com/1223679" source="BUGZILLA"/>
		<reference ref_id="1223698" ref_url="https://bugzilla.suse.com/1223698" source="BUGZILLA"/>
		<reference ref_id="1223712" ref_url="https://bugzilla.suse.com/1223712" source="BUGZILLA"/>
		<reference ref_id="1223715" ref_url="https://bugzilla.suse.com/1223715" source="BUGZILLA"/>
		<reference ref_id="1223717" ref_url="https://bugzilla.suse.com/1223717" source="BUGZILLA"/>
		<reference ref_id="1223718" ref_url="https://bugzilla.suse.com/1223718" source="BUGZILLA"/>
		<reference ref_id="1223737" ref_url="https://bugzilla.suse.com/1223737" source="BUGZILLA"/>
		<reference ref_id="1223738" ref_url="https://bugzilla.suse.com/1223738" source="BUGZILLA"/>
		<reference ref_id="1223741" ref_url="https://bugzilla.suse.com/1223741" source="BUGZILLA"/>
		<reference ref_id="1223744" ref_url="https://bugzilla.suse.com/1223744" source="BUGZILLA"/>
		<reference ref_id="1223747" ref_url="https://bugzilla.suse.com/1223747" source="BUGZILLA"/>
		<reference ref_id="1223748" ref_url="https://bugzilla.suse.com/1223748" source="BUGZILLA"/>
		<reference ref_id="1223750" ref_url="https://bugzilla.suse.com/1223750" source="BUGZILLA"/>
		<reference ref_id="1223752" ref_url="https://bugzilla.suse.com/1223752" source="BUGZILLA"/>
		<reference ref_id="1223754" ref_url="https://bugzilla.suse.com/1223754" source="BUGZILLA"/>
		<reference ref_id="1223756" ref_url="https://bugzilla.suse.com/1223756" source="BUGZILLA"/>
		<reference ref_id="1223757" ref_url="https://bugzilla.suse.com/1223757" source="BUGZILLA"/>
		<reference ref_id="1223762" ref_url="https://bugzilla.suse.com/1223762" source="BUGZILLA"/>
		<reference ref_id="1223769" ref_url="https://bugzilla.suse.com/1223769" source="BUGZILLA"/>
		<reference ref_id="1223770" ref_url="https://bugzilla.suse.com/1223770" source="BUGZILLA"/>
		<reference ref_id="1223779" ref_url="https://bugzilla.suse.com/1223779" source="BUGZILLA"/>
		<reference ref_id="1223780" ref_url="https://bugzilla.suse.com/1223780" source="BUGZILLA"/>
		<reference ref_id="1223781" ref_url="https://bugzilla.suse.com/1223781" source="BUGZILLA"/>
		<reference ref_id="1223788" ref_url="https://bugzilla.suse.com/1223788" source="BUGZILLA"/>
		<reference ref_id="1223802" ref_url="https://bugzilla.suse.com/1223802" source="BUGZILLA"/>
		<reference ref_id="1223819" ref_url="https://bugzilla.suse.com/1223819" source="BUGZILLA"/>
		<reference ref_id="1223823" ref_url="https://bugzilla.suse.com/1223823" source="BUGZILLA"/>
		<reference ref_id="1223826" ref_url="https://bugzilla.suse.com/1223826" source="BUGZILLA"/>
		<reference ref_id="1223828" ref_url="https://bugzilla.suse.com/1223828" source="BUGZILLA"/>
		<reference ref_id="1223829" ref_url="https://bugzilla.suse.com/1223829" source="BUGZILLA"/>
		<reference ref_id="1223837" ref_url="https://bugzilla.suse.com/1223837" source="BUGZILLA"/>
		<reference ref_id="1223842" ref_url="https://bugzilla.suse.com/1223842" source="BUGZILLA"/>
		<reference ref_id="1223843" ref_url="https://bugzilla.suse.com/1223843" source="BUGZILLA"/>
		<reference ref_id="1223844" ref_url="https://bugzilla.suse.com/1223844" source="BUGZILLA"/>
		<reference ref_id="1223847" ref_url="https://bugzilla.suse.com/1223847" source="BUGZILLA"/>
		<reference ref_id="1223858" ref_url="https://bugzilla.suse.com/1223858" source="BUGZILLA"/>
		<reference ref_id="1223875" ref_url="https://bugzilla.suse.com/1223875" source="BUGZILLA"/>
		<reference ref_id="1223879" ref_url="https://bugzilla.suse.com/1223879" source="BUGZILLA"/>
		<reference ref_id="1223895" ref_url="https://bugzilla.suse.com/1223895" source="BUGZILLA"/>
		<reference ref_id="1223959" ref_url="https://bugzilla.suse.com/1223959" source="BUGZILLA"/>
		<reference ref_id="1223961" ref_url="https://bugzilla.suse.com/1223961" source="BUGZILLA"/>
		<reference ref_id="1223991" ref_url="https://bugzilla.suse.com/1223991" source="BUGZILLA"/>
		<reference ref_id="1223996" ref_url="https://bugzilla.suse.com/1223996" source="BUGZILLA"/>
		<reference ref_id="1224020" ref_url="https://bugzilla.suse.com/1224020" source="BUGZILLA"/>
		<reference ref_id="1224076" ref_url="https://bugzilla.suse.com/1224076" source="BUGZILLA"/>
		<reference ref_id="1224096" ref_url="https://bugzilla.suse.com/1224096" source="BUGZILLA"/>
		<reference ref_id="1224098" ref_url="https://bugzilla.suse.com/1224098" source="BUGZILLA"/>
		<reference ref_id="1224099" ref_url="https://bugzilla.suse.com/1224099" source="BUGZILLA"/>
		<reference ref_id="1224137" ref_url="https://bugzilla.suse.com/1224137" source="BUGZILLA"/>
		<reference ref_id="1224166" ref_url="https://bugzilla.suse.com/1224166" source="BUGZILLA"/>
		<reference ref_id="1224174" ref_url="https://bugzilla.suse.com/1224174" source="BUGZILLA"/>
		<reference ref_id="1224177" ref_url="https://bugzilla.suse.com/1224177" source="BUGZILLA"/>
		<reference ref_id="1224180" ref_url="https://bugzilla.suse.com/1224180" source="BUGZILLA"/>
		<reference ref_id="1224181" ref_url="https://bugzilla.suse.com/1224181" source="BUGZILLA"/>
		<reference ref_id="1224187" ref_url="https://bugzilla.suse.com/1224187" source="BUGZILLA"/>
		<reference ref_id="1224331" ref_url="https://bugzilla.suse.com/1224331" source="BUGZILLA"/>
		<reference ref_id="1224346" ref_url="https://bugzilla.suse.com/1224346" source="BUGZILLA"/>
		<reference ref_id="1224423" ref_url="https://bugzilla.suse.com/1224423" source="BUGZILLA"/>
		<reference ref_id="1224432" ref_url="https://bugzilla.suse.com/1224432" source="BUGZILLA"/>
		<reference ref_id="1224437" ref_url="https://bugzilla.suse.com/1224437" source="BUGZILLA"/>
		<reference ref_id="1224438" ref_url="https://bugzilla.suse.com/1224438" source="BUGZILLA"/>
		<reference ref_id="1224442" ref_url="https://bugzilla.suse.com/1224442" source="BUGZILLA"/>
		<reference ref_id="1224443" ref_url="https://bugzilla.suse.com/1224443" source="BUGZILLA"/>
		<reference ref_id="1224445" ref_url="https://bugzilla.suse.com/1224445" source="BUGZILLA"/>
		<reference ref_id="1224449" ref_url="https://bugzilla.suse.com/1224449" source="BUGZILLA"/>
		<reference ref_id="1224479" ref_url="https://bugzilla.suse.com/1224479" source="BUGZILLA"/>
		<reference ref_id="1224482" ref_url="https://bugzilla.suse.com/1224482" source="BUGZILLA"/>
		<reference ref_id="1224487" ref_url="https://bugzilla.suse.com/1224487" source="BUGZILLA"/>
		<reference ref_id="1224488" ref_url="https://bugzilla.suse.com/1224488" source="BUGZILLA"/>
		<reference ref_id="1224492" ref_url="https://bugzilla.suse.com/1224492" source="BUGZILLA"/>
		<reference ref_id="1224494" ref_url="https://bugzilla.suse.com/1224494" source="BUGZILLA"/>
		<reference ref_id="1224495" ref_url="https://bugzilla.suse.com/1224495" source="BUGZILLA"/>
		<reference ref_id="1224502" ref_url="https://bugzilla.suse.com/1224502" source="BUGZILLA"/>
		<reference ref_id="1224508" ref_url="https://bugzilla.suse.com/1224508" source="BUGZILLA"/>
		<reference ref_id="1224509" ref_url="https://bugzilla.suse.com/1224509" source="BUGZILLA"/>
		<reference ref_id="1224511" ref_url="https://bugzilla.suse.com/1224511" source="BUGZILLA"/>
		<reference ref_id="1224519" ref_url="https://bugzilla.suse.com/1224519" source="BUGZILLA"/>
		<reference ref_id="1224524" ref_url="https://bugzilla.suse.com/1224524" source="BUGZILLA"/>
		<reference ref_id="1224525" ref_url="https://bugzilla.suse.com/1224525" source="BUGZILLA"/>
		<reference ref_id="1224530" ref_url="https://bugzilla.suse.com/1224530" source="BUGZILLA"/>
		<reference ref_id="1224531" ref_url="https://bugzilla.suse.com/1224531" source="BUGZILLA"/>
		<reference ref_id="1224534" ref_url="https://bugzilla.suse.com/1224534" source="BUGZILLA"/>
		<reference ref_id="1224535" ref_url="https://bugzilla.suse.com/1224535" source="BUGZILLA"/>
		<reference ref_id="1224537" ref_url="https://bugzilla.suse.com/1224537" source="BUGZILLA"/>
		<reference ref_id="1224541" ref_url="https://bugzilla.suse.com/1224541" source="BUGZILLA"/>
		<reference ref_id="1224543" ref_url="https://bugzilla.suse.com/1224543" source="BUGZILLA"/>
		<reference ref_id="1224549" ref_url="https://bugzilla.suse.com/1224549" source="BUGZILLA"/>
		<reference ref_id="1224550" ref_url="https://bugzilla.suse.com/1224550" source="BUGZILLA"/>
		<reference ref_id="1224558" ref_url="https://bugzilla.suse.com/1224558" source="BUGZILLA"/>
		<reference ref_id="1224559" ref_url="https://bugzilla.suse.com/1224559" source="BUGZILLA"/>
		<reference ref_id="1224566" ref_url="https://bugzilla.suse.com/1224566" source="BUGZILLA"/>
		<reference ref_id="1224567" ref_url="https://bugzilla.suse.com/1224567" source="BUGZILLA"/>
		<reference ref_id="1224571" ref_url="https://bugzilla.suse.com/1224571" source="BUGZILLA"/>
		<reference ref_id="1224575" ref_url="https://bugzilla.suse.com/1224575" source="BUGZILLA"/>
		<reference ref_id="1224576" ref_url="https://bugzilla.suse.com/1224576" source="BUGZILLA"/>
		<reference ref_id="1224579" ref_url="https://bugzilla.suse.com/1224579" source="BUGZILLA"/>
		<reference ref_id="1224580" ref_url="https://bugzilla.suse.com/1224580" source="BUGZILLA"/>
		<reference ref_id="1224581" ref_url="https://bugzilla.suse.com/1224581" source="BUGZILLA"/>
		<reference ref_id="1224582" ref_url="https://bugzilla.suse.com/1224582" source="BUGZILLA"/>
		<reference ref_id="1224586" ref_url="https://bugzilla.suse.com/1224586" source="BUGZILLA"/>
		<reference ref_id="1224587" ref_url="https://bugzilla.suse.com/1224587" source="BUGZILLA"/>
		<reference ref_id="1224592" ref_url="https://bugzilla.suse.com/1224592" source="BUGZILLA"/>
		<reference ref_id="1224598" ref_url="https://bugzilla.suse.com/1224598" source="BUGZILLA"/>
		<reference ref_id="1224601" ref_url="https://bugzilla.suse.com/1224601" source="BUGZILLA"/>
		<reference ref_id="1224607" ref_url="https://bugzilla.suse.com/1224607" source="BUGZILLA"/>
		<reference ref_id="1224608" ref_url="https://bugzilla.suse.com/1224608" source="BUGZILLA"/>
		<reference ref_id="1224611" ref_url="https://bugzilla.suse.com/1224611" source="BUGZILLA"/>
		<reference ref_id="1224615" ref_url="https://bugzilla.suse.com/1224615" source="BUGZILLA"/>
		<reference ref_id="1224617" ref_url="https://bugzilla.suse.com/1224617" source="BUGZILLA"/>
		<reference ref_id="1224618" ref_url="https://bugzilla.suse.com/1224618" source="BUGZILLA"/>
		<reference ref_id="1224621" ref_url="https://bugzilla.suse.com/1224621" source="BUGZILLA"/>
		<reference ref_id="1224622" ref_url="https://bugzilla.suse.com/1224622" source="BUGZILLA"/>
		<reference ref_id="1224624" ref_url="https://bugzilla.suse.com/1224624" source="BUGZILLA"/>
		<reference ref_id="1224627" ref_url="https://bugzilla.suse.com/1224627" source="BUGZILLA"/>
		<reference ref_id="1224628" ref_url="https://bugzilla.suse.com/1224628" source="BUGZILLA"/>
		<reference ref_id="1224629" ref_url="https://bugzilla.suse.com/1224629" source="BUGZILLA"/>
		<reference ref_id="1224632" ref_url="https://bugzilla.suse.com/1224632" source="BUGZILLA"/>
		<reference ref_id="1224636" ref_url="https://bugzilla.suse.com/1224636" source="BUGZILLA"/>
		<reference ref_id="1224637" ref_url="https://bugzilla.suse.com/1224637" source="BUGZILLA"/>
		<reference ref_id="1224638" ref_url="https://bugzilla.suse.com/1224638" source="BUGZILLA"/>
		<reference ref_id="1224640" ref_url="https://bugzilla.suse.com/1224640" source="BUGZILLA"/>
		<reference ref_id="1224643" ref_url="https://bugzilla.suse.com/1224643" source="BUGZILLA"/>
		<reference ref_id="1224644" ref_url="https://bugzilla.suse.com/1224644" source="BUGZILLA"/>
		<reference ref_id="1224645" ref_url="https://bugzilla.suse.com/1224645" source="BUGZILLA"/>
		<reference ref_id="1224647" ref_url="https://bugzilla.suse.com/1224647" source="BUGZILLA"/>
		<reference ref_id="1224648" ref_url="https://bugzilla.suse.com/1224648" source="BUGZILLA"/>
		<reference ref_id="1224649" ref_url="https://bugzilla.suse.com/1224649" source="BUGZILLA"/>
		<reference ref_id="1224650" ref_url="https://bugzilla.suse.com/1224650" source="BUGZILLA"/>
		<reference ref_id="1224651" ref_url="https://bugzilla.suse.com/1224651" source="BUGZILLA"/>
		<reference ref_id="1224657" ref_url="https://bugzilla.suse.com/1224657" source="BUGZILLA"/>
		<reference ref_id="1224659" ref_url="https://bugzilla.suse.com/1224659" source="BUGZILLA"/>
		<reference ref_id="1224660" ref_url="https://bugzilla.suse.com/1224660" source="BUGZILLA"/>
		<reference ref_id="1224663" ref_url="https://bugzilla.suse.com/1224663" source="BUGZILLA"/>
		<reference ref_id="1224664" ref_url="https://bugzilla.suse.com/1224664" source="BUGZILLA"/>
		<reference ref_id="1224665" ref_url="https://bugzilla.suse.com/1224665" source="BUGZILLA"/>
		<reference ref_id="1224666" ref_url="https://bugzilla.suse.com/1224666" source="BUGZILLA"/>
		<reference ref_id="1224667" ref_url="https://bugzilla.suse.com/1224667" source="BUGZILLA"/>
		<reference ref_id="1224668" ref_url="https://bugzilla.suse.com/1224668" source="BUGZILLA"/>
		<reference ref_id="1224671" ref_url="https://bugzilla.suse.com/1224671" source="BUGZILLA"/>
		<reference ref_id="1224672" ref_url="https://bugzilla.suse.com/1224672" source="BUGZILLA"/>
		<reference ref_id="1224676" ref_url="https://bugzilla.suse.com/1224676" source="BUGZILLA"/>
		<reference ref_id="1224678" ref_url="https://bugzilla.suse.com/1224678" source="BUGZILLA"/>
		<reference ref_id="1224679" ref_url="https://bugzilla.suse.com/1224679" source="BUGZILLA"/>
		<reference ref_id="1224680" ref_url="https://bugzilla.suse.com/1224680" source="BUGZILLA"/>
		<reference ref_id="1224681" ref_url="https://bugzilla.suse.com/1224681" source="BUGZILLA"/>
		<reference ref_id="1224682" ref_url="https://bugzilla.suse.com/1224682" source="BUGZILLA"/>
		<reference ref_id="1224685" ref_url="https://bugzilla.suse.com/1224685" source="BUGZILLA"/>
		<reference ref_id="1224686" ref_url="https://bugzilla.suse.com/1224686" source="BUGZILLA"/>
		<reference ref_id="1224692" ref_url="https://bugzilla.suse.com/1224692" source="BUGZILLA"/>
		<reference ref_id="1224697" ref_url="https://bugzilla.suse.com/1224697" source="BUGZILLA"/>
		<reference ref_id="1224699" ref_url="https://bugzilla.suse.com/1224699" source="BUGZILLA"/>
		<reference ref_id="1224701" ref_url="https://bugzilla.suse.com/1224701" source="BUGZILLA"/>
		<reference ref_id="1224703" ref_url="https://bugzilla.suse.com/1224703" source="BUGZILLA"/>
		<reference ref_id="1224705" ref_url="https://bugzilla.suse.com/1224705" source="BUGZILLA"/>
		<reference ref_id="1224707" ref_url="https://bugzilla.suse.com/1224707" source="BUGZILLA"/>
		<reference ref_id="1224717" ref_url="https://bugzilla.suse.com/1224717" source="BUGZILLA"/>
		<reference ref_id="1224718" ref_url="https://bugzilla.suse.com/1224718" source="BUGZILLA"/>
		<reference ref_id="1224721" ref_url="https://bugzilla.suse.com/1224721" source="BUGZILLA"/>
		<reference ref_id="1224722" ref_url="https://bugzilla.suse.com/1224722" source="BUGZILLA"/>
		<reference ref_id="1224723" ref_url="https://bugzilla.suse.com/1224723" source="BUGZILLA"/>
		<reference ref_id="1224725" ref_url="https://bugzilla.suse.com/1224725" source="BUGZILLA"/>
		<reference ref_id="1224727" ref_url="https://bugzilla.suse.com/1224727" source="BUGZILLA"/>
		<reference ref_id="1224728" ref_url="https://bugzilla.suse.com/1224728" source="BUGZILLA"/>
		<reference ref_id="1224729" ref_url="https://bugzilla.suse.com/1224729" source="BUGZILLA"/>
		<reference ref_id="1224730" ref_url="https://bugzilla.suse.com/1224730" source="BUGZILLA"/>
		<reference ref_id="1224731" ref_url="https://bugzilla.suse.com/1224731" source="BUGZILLA"/>
		<reference ref_id="1224732" ref_url="https://bugzilla.suse.com/1224732" source="BUGZILLA"/>
		<reference ref_id="1224733" ref_url="https://bugzilla.suse.com/1224733" source="BUGZILLA"/>
		<reference ref_id="1224736" ref_url="https://bugzilla.suse.com/1224736" source="BUGZILLA"/>
		<reference ref_id="1224738" ref_url="https://bugzilla.suse.com/1224738" source="BUGZILLA"/>
		<reference ref_id="1224739" ref_url="https://bugzilla.suse.com/1224739" source="BUGZILLA"/>
		<reference ref_id="1224740" ref_url="https://bugzilla.suse.com/1224740" source="BUGZILLA"/>
		<reference ref_id="1224747" ref_url="https://bugzilla.suse.com/1224747" source="BUGZILLA"/>
		<reference ref_id="1224749" ref_url="https://bugzilla.suse.com/1224749" source="BUGZILLA"/>
		<reference ref_id="1224759" ref_url="https://bugzilla.suse.com/1224759" source="BUGZILLA"/>
		<reference ref_id="1224763" ref_url="https://bugzilla.suse.com/1224763" source="BUGZILLA"/>
		<reference ref_id="1224764" ref_url="https://bugzilla.suse.com/1224764" source="BUGZILLA"/>
		<reference ref_id="1224765" ref_url="https://bugzilla.suse.com/1224765" source="BUGZILLA"/>
		<reference ref_id="1224766" ref_url="https://bugzilla.suse.com/1224766" source="BUGZILLA"/>
		<reference ref_id="1224794" ref_url="https://bugzilla.suse.com/1224794" source="BUGZILLA"/>
		<reference ref_id="1224795" ref_url="https://bugzilla.suse.com/1224795" source="BUGZILLA"/>
		<reference ref_id="1224796" ref_url="https://bugzilla.suse.com/1224796" source="BUGZILLA"/>
		<reference ref_id="1224803" ref_url="https://bugzilla.suse.com/1224803" source="BUGZILLA"/>
		<reference ref_id="1224816" ref_url="https://bugzilla.suse.com/1224816" source="BUGZILLA"/>
		<reference ref_id="1224895" ref_url="https://bugzilla.suse.com/1224895" source="BUGZILLA"/>
		<reference ref_id="1224898" ref_url="https://bugzilla.suse.com/1224898" source="BUGZILLA"/>
		<reference ref_id="1224900" ref_url="https://bugzilla.suse.com/1224900" source="BUGZILLA"/>
		<reference ref_id="1224901" ref_url="https://bugzilla.suse.com/1224901" source="BUGZILLA"/>
		<reference ref_id="1224902" ref_url="https://bugzilla.suse.com/1224902" source="BUGZILLA"/>
		<reference ref_id="1224903" ref_url="https://bugzilla.suse.com/1224903" source="BUGZILLA"/>
		<reference ref_id="1224904" ref_url="https://bugzilla.suse.com/1224904" source="BUGZILLA"/>
		<reference ref_id="1224905" ref_url="https://bugzilla.suse.com/1224905" source="BUGZILLA"/>
		<reference ref_id="1224907" ref_url="https://bugzilla.suse.com/1224907" source="BUGZILLA"/>
		<reference ref_id="1224909" ref_url="https://bugzilla.suse.com/1224909" source="BUGZILLA"/>
		<reference ref_id="1224910" ref_url="https://bugzilla.suse.com/1224910" source="BUGZILLA"/>
		<reference ref_id="1224911" ref_url="https://bugzilla.suse.com/1224911" source="BUGZILLA"/>
		<reference ref_id="1224912" ref_url="https://bugzilla.suse.com/1224912" source="BUGZILLA"/>
		<reference ref_id="1224913" ref_url="https://bugzilla.suse.com/1224913" source="BUGZILLA"/>
		<reference ref_id="1224914" ref_url="https://bugzilla.suse.com/1224914" source="BUGZILLA"/>
		<reference ref_id="1224915" ref_url="https://bugzilla.suse.com/1224915" source="BUGZILLA"/>
		<reference ref_id="1224920" ref_url="https://bugzilla.suse.com/1224920" source="BUGZILLA"/>
		<reference ref_id="1224928" ref_url="https://bugzilla.suse.com/1224928" source="BUGZILLA"/>
		<reference ref_id="1224929" ref_url="https://bugzilla.suse.com/1224929" source="BUGZILLA"/>
		<reference ref_id="1224930" ref_url="https://bugzilla.suse.com/1224930" source="BUGZILLA"/>
		<reference ref_id="1224931" ref_url="https://bugzilla.suse.com/1224931" source="BUGZILLA"/>
		<reference ref_id="1224932" ref_url="https://bugzilla.suse.com/1224932" source="BUGZILLA"/>
		<reference ref_id="1224936" ref_url="https://bugzilla.suse.com/1224936" source="BUGZILLA"/>
		<reference ref_id="1224937" ref_url="https://bugzilla.suse.com/1224937" source="BUGZILLA"/>
		<reference ref_id="1224941" ref_url="https://bugzilla.suse.com/1224941" source="BUGZILLA"/>
		<reference ref_id="1224942" ref_url="https://bugzilla.suse.com/1224942" source="BUGZILLA"/>
		<reference ref_id="1224944" ref_url="https://bugzilla.suse.com/1224944" source="BUGZILLA"/>
		<reference ref_id="1224945" ref_url="https://bugzilla.suse.com/1224945" source="BUGZILLA"/>
		<reference ref_id="1224947" ref_url="https://bugzilla.suse.com/1224947" source="BUGZILLA"/>
		<reference ref_id="1224956" ref_url="https://bugzilla.suse.com/1224956" source="BUGZILLA"/>
		<reference ref_id="1224988" ref_url="https://bugzilla.suse.com/1224988" source="BUGZILLA"/>
		<reference ref_id="1224992" ref_url="https://bugzilla.suse.com/1224992" source="BUGZILLA"/>
		<reference ref_id="1225000" ref_url="https://bugzilla.suse.com/1225000" source="BUGZILLA"/>
		<reference ref_id="1225003" ref_url="https://bugzilla.suse.com/1225003" source="BUGZILLA"/>
		<reference ref_id="1225005" ref_url="https://bugzilla.suse.com/1225005" source="BUGZILLA"/>
		<reference ref_id="1225008" ref_url="https://bugzilla.suse.com/1225008" source="BUGZILLA"/>
		<reference ref_id="1225009" ref_url="https://bugzilla.suse.com/1225009" source="BUGZILLA"/>
		<reference ref_id="1225022" ref_url="https://bugzilla.suse.com/1225022" source="BUGZILLA"/>
		<reference ref_id="1225031" ref_url="https://bugzilla.suse.com/1225031" source="BUGZILLA"/>
		<reference ref_id="1225032" ref_url="https://bugzilla.suse.com/1225032" source="BUGZILLA"/>
		<reference ref_id="1225036" ref_url="https://bugzilla.suse.com/1225036" source="BUGZILLA"/>
		<reference ref_id="1225041" ref_url="https://bugzilla.suse.com/1225041" source="BUGZILLA"/>
		<reference ref_id="1225044" ref_url="https://bugzilla.suse.com/1225044" source="BUGZILLA"/>
		<reference ref_id="1225053" ref_url="https://bugzilla.suse.com/1225053" source="BUGZILLA"/>
		<reference ref_id="1225076" ref_url="https://bugzilla.suse.com/1225076" source="BUGZILLA"/>
		<reference ref_id="1225077" ref_url="https://bugzilla.suse.com/1225077" source="BUGZILLA"/>
		<reference ref_id="1225082" ref_url="https://bugzilla.suse.com/1225082" source="BUGZILLA"/>
		<reference ref_id="1225085" ref_url="https://bugzilla.suse.com/1225085" source="BUGZILLA"/>
		<reference ref_id="1225086" ref_url="https://bugzilla.suse.com/1225086" source="BUGZILLA"/>
		<reference ref_id="1225092" ref_url="https://bugzilla.suse.com/1225092" source="BUGZILLA"/>
		<reference ref_id="1225095" ref_url="https://bugzilla.suse.com/1225095" source="BUGZILLA"/>
		<reference ref_id="1225096" ref_url="https://bugzilla.suse.com/1225096" source="BUGZILLA"/>
		<reference ref_id="1225097" ref_url="https://bugzilla.suse.com/1225097" source="BUGZILLA"/>
		<reference ref_id="1225106" ref_url="https://bugzilla.suse.com/1225106" source="BUGZILLA"/>
		<reference ref_id="1225108" ref_url="https://bugzilla.suse.com/1225108" source="BUGZILLA"/>
		<reference ref_id="1225109" ref_url="https://bugzilla.suse.com/1225109" source="BUGZILLA"/>
		<reference ref_id="1225114" ref_url="https://bugzilla.suse.com/1225114" source="BUGZILLA"/>
		<reference ref_id="1225118" ref_url="https://bugzilla.suse.com/1225118" source="BUGZILLA"/>
		<reference ref_id="1225121" ref_url="https://bugzilla.suse.com/1225121" source="BUGZILLA"/>
		<reference ref_id="1225122" ref_url="https://bugzilla.suse.com/1225122" source="BUGZILLA"/>
		<reference ref_id="1225123" ref_url="https://bugzilla.suse.com/1225123" source="BUGZILLA"/>
		<reference ref_id="1225125" ref_url="https://bugzilla.suse.com/1225125" source="BUGZILLA"/>
		<reference ref_id="1225126" ref_url="https://bugzilla.suse.com/1225126" source="BUGZILLA"/>
		<reference ref_id="1225127" ref_url="https://bugzilla.suse.com/1225127" source="BUGZILLA"/>
		<reference ref_id="1225129" ref_url="https://bugzilla.suse.com/1225129" source="BUGZILLA"/>
		<reference ref_id="1225131" ref_url="https://bugzilla.suse.com/1225131" source="BUGZILLA"/>
		<reference ref_id="1225132" ref_url="https://bugzilla.suse.com/1225132" source="BUGZILLA"/>
		<reference ref_id="1225138" ref_url="https://bugzilla.suse.com/1225138" source="BUGZILLA"/>
		<reference ref_id="1225139" ref_url="https://bugzilla.suse.com/1225139" source="BUGZILLA"/>
		<reference ref_id="1225145" ref_url="https://bugzilla.suse.com/1225145" source="BUGZILLA"/>
		<reference ref_id="1225151" ref_url="https://bugzilla.suse.com/1225151" source="BUGZILLA"/>
		<reference ref_id="1225153" ref_url="https://bugzilla.suse.com/1225153" source="BUGZILLA"/>
		<reference ref_id="1225156" ref_url="https://bugzilla.suse.com/1225156" source="BUGZILLA"/>
		<reference ref_id="1225158" ref_url="https://bugzilla.suse.com/1225158" source="BUGZILLA"/>
		<reference ref_id="1225160" ref_url="https://bugzilla.suse.com/1225160" source="BUGZILLA"/>
		<reference ref_id="1225161" ref_url="https://bugzilla.suse.com/1225161" source="BUGZILLA"/>
		<reference ref_id="1225164" ref_url="https://bugzilla.suse.com/1225164" source="BUGZILLA"/>
		<reference ref_id="1225167" ref_url="https://bugzilla.suse.com/1225167" source="BUGZILLA"/>
		<reference ref_id="1225180" ref_url="https://bugzilla.suse.com/1225180" source="BUGZILLA"/>
		<reference ref_id="1225183" ref_url="https://bugzilla.suse.com/1225183" source="BUGZILLA"/>
		<reference ref_id="1225184" ref_url="https://bugzilla.suse.com/1225184" source="BUGZILLA"/>
		<reference ref_id="1225186" ref_url="https://bugzilla.suse.com/1225186" source="BUGZILLA"/>
		<reference ref_id="1225187" ref_url="https://bugzilla.suse.com/1225187" source="BUGZILLA"/>
		<reference ref_id="1225189" ref_url="https://bugzilla.suse.com/1225189" source="BUGZILLA"/>
		<reference ref_id="1225190" ref_url="https://bugzilla.suse.com/1225190" source="BUGZILLA"/>
		<reference ref_id="1225191" ref_url="https://bugzilla.suse.com/1225191" source="BUGZILLA"/>
		<reference ref_id="1225192" ref_url="https://bugzilla.suse.com/1225192" source="BUGZILLA"/>
		<reference ref_id="1225193" ref_url="https://bugzilla.suse.com/1225193" source="BUGZILLA"/>
		<reference ref_id="1225195" ref_url="https://bugzilla.suse.com/1225195" source="BUGZILLA"/>
		<reference ref_id="1225198" ref_url="https://bugzilla.suse.com/1225198" source="BUGZILLA"/>
		<reference ref_id="1225201" ref_url="https://bugzilla.suse.com/1225201" source="BUGZILLA"/>
		<reference ref_id="1225203" ref_url="https://bugzilla.suse.com/1225203" source="BUGZILLA"/>
		<reference ref_id="1225205" ref_url="https://bugzilla.suse.com/1225205" source="BUGZILLA"/>
		<reference ref_id="1225206" ref_url="https://bugzilla.suse.com/1225206" source="BUGZILLA"/>
		<reference ref_id="1225207" ref_url="https://bugzilla.suse.com/1225207" source="BUGZILLA"/>
		<reference ref_id="1225208" ref_url="https://bugzilla.suse.com/1225208" source="BUGZILLA"/>
		<reference ref_id="1225209" ref_url="https://bugzilla.suse.com/1225209" source="BUGZILLA"/>
		<reference ref_id="1225210" ref_url="https://bugzilla.suse.com/1225210" source="BUGZILLA"/>
		<reference ref_id="1225214" ref_url="https://bugzilla.suse.com/1225214" source="BUGZILLA"/>
		<reference ref_id="1225222" ref_url="https://bugzilla.suse.com/1225222" source="BUGZILLA"/>
		<reference ref_id="1225223" ref_url="https://bugzilla.suse.com/1225223" source="BUGZILLA"/>
		<reference ref_id="1225224" ref_url="https://bugzilla.suse.com/1225224" source="BUGZILLA"/>
		<reference ref_id="1225225" ref_url="https://bugzilla.suse.com/1225225" source="BUGZILLA"/>
		<reference ref_id="1225227" ref_url="https://bugzilla.suse.com/1225227" source="BUGZILLA"/>
		<reference ref_id="1225228" ref_url="https://bugzilla.suse.com/1225228" source="BUGZILLA"/>
		<reference ref_id="1225229" ref_url="https://bugzilla.suse.com/1225229" source="BUGZILLA"/>
		<reference ref_id="1225230" ref_url="https://bugzilla.suse.com/1225230" source="BUGZILLA"/>
		<reference ref_id="1225232" ref_url="https://bugzilla.suse.com/1225232" source="BUGZILLA"/>
		<reference ref_id="1225233" ref_url="https://bugzilla.suse.com/1225233" source="BUGZILLA"/>
		<reference ref_id="1225235" ref_url="https://bugzilla.suse.com/1225235" source="BUGZILLA"/>
		<reference ref_id="1225236" ref_url="https://bugzilla.suse.com/1225236" source="BUGZILLA"/>
		<reference ref_id="1225237" ref_url="https://bugzilla.suse.com/1225237" source="BUGZILLA"/>
		<reference ref_id="1225238" ref_url="https://bugzilla.suse.com/1225238" source="BUGZILLA"/>
		<reference ref_id="1225239" ref_url="https://bugzilla.suse.com/1225239" source="BUGZILLA"/>
		<reference ref_id="1225240" ref_url="https://bugzilla.suse.com/1225240" source="BUGZILLA"/>
		<reference ref_id="1225241" ref_url="https://bugzilla.suse.com/1225241" source="BUGZILLA"/>
		<reference ref_id="1225242" ref_url="https://bugzilla.suse.com/1225242" source="BUGZILLA"/>
		<reference ref_id="1225243" ref_url="https://bugzilla.suse.com/1225243" source="BUGZILLA"/>
		<reference ref_id="1225244" ref_url="https://bugzilla.suse.com/1225244" source="BUGZILLA"/>
		<reference ref_id="1225245" ref_url="https://bugzilla.suse.com/1225245" source="BUGZILLA"/>
		<reference ref_id="1225246" ref_url="https://bugzilla.suse.com/1225246" source="BUGZILLA"/>
		<reference ref_id="1225247" ref_url="https://bugzilla.suse.com/1225247" source="BUGZILLA"/>
		<reference ref_id="1225248" ref_url="https://bugzilla.suse.com/1225248" source="BUGZILLA"/>
		<reference ref_id="1225249" ref_url="https://bugzilla.suse.com/1225249" source="BUGZILLA"/>
		<reference ref_id="1225250" ref_url="https://bugzilla.suse.com/1225250" source="BUGZILLA"/>
		<reference ref_id="1225251" ref_url="https://bugzilla.suse.com/1225251" source="BUGZILLA"/>
		<reference ref_id="1225252" ref_url="https://bugzilla.suse.com/1225252" source="BUGZILLA"/>
		<reference ref_id="1225253" ref_url="https://bugzilla.suse.com/1225253" source="BUGZILLA"/>
		<reference ref_id="1225254" ref_url="https://bugzilla.suse.com/1225254" source="BUGZILLA"/>
		<reference ref_id="1225255" ref_url="https://bugzilla.suse.com/1225255" source="BUGZILLA"/>
		<reference ref_id="1225256" ref_url="https://bugzilla.suse.com/1225256" source="BUGZILLA"/>
		<reference ref_id="1225257" ref_url="https://bugzilla.suse.com/1225257" source="BUGZILLA"/>
		<reference ref_id="1225258" ref_url="https://bugzilla.suse.com/1225258" source="BUGZILLA"/>
		<reference ref_id="1225259" ref_url="https://bugzilla.suse.com/1225259" source="BUGZILLA"/>
		<reference ref_id="1225260" ref_url="https://bugzilla.suse.com/1225260" source="BUGZILLA"/>
		<reference ref_id="1225261" ref_url="https://bugzilla.suse.com/1225261" source="BUGZILLA"/>
		<reference ref_id="1225262" ref_url="https://bugzilla.suse.com/1225262" source="BUGZILLA"/>
		<reference ref_id="1225263" ref_url="https://bugzilla.suse.com/1225263" source="BUGZILLA"/>
		<reference ref_id="1225268" ref_url="https://bugzilla.suse.com/1225268" source="BUGZILLA"/>
		<reference ref_id="1225301" ref_url="https://bugzilla.suse.com/1225301" source="BUGZILLA"/>
		<reference ref_id="1225303" ref_url="https://bugzilla.suse.com/1225303" source="BUGZILLA"/>
		<reference ref_id="1225304" ref_url="https://bugzilla.suse.com/1225304" source="BUGZILLA"/>
		<reference ref_id="1225306" ref_url="https://bugzilla.suse.com/1225306" source="BUGZILLA"/>
		<reference ref_id="1225316" ref_url="https://bugzilla.suse.com/1225316" source="BUGZILLA"/>
		<reference ref_id="1225318" ref_url="https://bugzilla.suse.com/1225318" source="BUGZILLA"/>
		<reference ref_id="1225320" ref_url="https://bugzilla.suse.com/1225320" source="BUGZILLA"/>
		<reference ref_id="1225321" ref_url="https://bugzilla.suse.com/1225321" source="BUGZILLA"/>
		<reference ref_id="1225322" ref_url="https://bugzilla.suse.com/1225322" source="BUGZILLA"/>
		<reference ref_id="1225323" ref_url="https://bugzilla.suse.com/1225323" source="BUGZILLA"/>
		<reference ref_id="1225326" ref_url="https://bugzilla.suse.com/1225326" source="BUGZILLA"/>
		<reference ref_id="1225327" ref_url="https://bugzilla.suse.com/1225327" source="BUGZILLA"/>
		<reference ref_id="1225328" ref_url="https://bugzilla.suse.com/1225328" source="BUGZILLA"/>
		<reference ref_id="1225329" ref_url="https://bugzilla.suse.com/1225329" source="BUGZILLA"/>
		<reference ref_id="1225330" ref_url="https://bugzilla.suse.com/1225330" source="BUGZILLA"/>
		<reference ref_id="1225331" ref_url="https://bugzilla.suse.com/1225331" source="BUGZILLA"/>
		<reference ref_id="1225332" ref_url="https://bugzilla.suse.com/1225332" source="BUGZILLA"/>
		<reference ref_id="1225333" ref_url="https://bugzilla.suse.com/1225333" source="BUGZILLA"/>
		<reference ref_id="1225334" ref_url="https://bugzilla.suse.com/1225334" source="BUGZILLA"/>
		<reference ref_id="1225335" ref_url="https://bugzilla.suse.com/1225335" source="BUGZILLA"/>
		<reference ref_id="1225336" ref_url="https://bugzilla.suse.com/1225336" source="BUGZILLA"/>
		<reference ref_id="1225337" ref_url="https://bugzilla.suse.com/1225337" source="BUGZILLA"/>
		<reference ref_id="1225338" ref_url="https://bugzilla.suse.com/1225338" source="BUGZILLA"/>
		<reference ref_id="1225339" ref_url="https://bugzilla.suse.com/1225339" source="BUGZILLA"/>
		<reference ref_id="1225341" ref_url="https://bugzilla.suse.com/1225341" source="BUGZILLA"/>
		<reference ref_id="1225342" ref_url="https://bugzilla.suse.com/1225342" source="BUGZILLA"/>
		<reference ref_id="1225344" ref_url="https://bugzilla.suse.com/1225344" source="BUGZILLA"/>
		<reference ref_id="1225346" ref_url="https://bugzilla.suse.com/1225346" source="BUGZILLA"/>
		<reference ref_id="1225347" ref_url="https://bugzilla.suse.com/1225347" source="BUGZILLA"/>
		<reference ref_id="1225351" ref_url="https://bugzilla.suse.com/1225351" source="BUGZILLA"/>
		<reference ref_id="1225353" ref_url="https://bugzilla.suse.com/1225353" source="BUGZILLA"/>
		<reference ref_id="1225354" ref_url="https://bugzilla.suse.com/1225354" source="BUGZILLA"/>
		<reference ref_id="1225355" ref_url="https://bugzilla.suse.com/1225355" source="BUGZILLA"/>
		<reference ref_id="1225357" ref_url="https://bugzilla.suse.com/1225357" source="BUGZILLA"/>
		<reference ref_id="1225358" ref_url="https://bugzilla.suse.com/1225358" source="BUGZILLA"/>
		<reference ref_id="1225360" ref_url="https://bugzilla.suse.com/1225360" source="BUGZILLA"/>
		<reference ref_id="1225361" ref_url="https://bugzilla.suse.com/1225361" source="BUGZILLA"/>
		<reference ref_id="1225366" ref_url="https://bugzilla.suse.com/1225366" source="BUGZILLA"/>
		<reference ref_id="1225367" ref_url="https://bugzilla.suse.com/1225367" source="BUGZILLA"/>
		<reference ref_id="1225368" ref_url="https://bugzilla.suse.com/1225368" source="BUGZILLA"/>
		<reference ref_id="1225369" ref_url="https://bugzilla.suse.com/1225369" source="BUGZILLA"/>
		<reference ref_id="1225370" ref_url="https://bugzilla.suse.com/1225370" source="BUGZILLA"/>
		<reference ref_id="1225372" ref_url="https://bugzilla.suse.com/1225372" source="BUGZILLA"/>
		<reference ref_id="1225373" ref_url="https://bugzilla.suse.com/1225373" source="BUGZILLA"/>
		<reference ref_id="1225374" ref_url="https://bugzilla.suse.com/1225374" source="BUGZILLA"/>
		<reference ref_id="1225375" ref_url="https://bugzilla.suse.com/1225375" source="BUGZILLA"/>
		<reference ref_id="1225376" ref_url="https://bugzilla.suse.com/1225376" source="BUGZILLA"/>
		<reference ref_id="1225377" ref_url="https://bugzilla.suse.com/1225377" source="BUGZILLA"/>
		<reference ref_id="1225379" ref_url="https://bugzilla.suse.com/1225379" source="BUGZILLA"/>
		<reference ref_id="1225380" ref_url="https://bugzilla.suse.com/1225380" source="BUGZILLA"/>
		<reference ref_id="1225382" ref_url="https://bugzilla.suse.com/1225382" source="BUGZILLA"/>
		<reference ref_id="1225383" ref_url="https://bugzilla.suse.com/1225383" source="BUGZILLA"/>
		<reference ref_id="1225384" ref_url="https://bugzilla.suse.com/1225384" source="BUGZILLA"/>
		<reference ref_id="1225386" ref_url="https://bugzilla.suse.com/1225386" source="BUGZILLA"/>
		<reference ref_id="1225387" ref_url="https://bugzilla.suse.com/1225387" source="BUGZILLA"/>
		<reference ref_id="1225388" ref_url="https://bugzilla.suse.com/1225388" source="BUGZILLA"/>
		<reference ref_id="1225390" ref_url="https://bugzilla.suse.com/1225390" source="BUGZILLA"/>
		<reference ref_id="1225392" ref_url="https://bugzilla.suse.com/1225392" source="BUGZILLA"/>
		<reference ref_id="1225393" ref_url="https://bugzilla.suse.com/1225393" source="BUGZILLA"/>
		<reference ref_id="1225396" ref_url="https://bugzilla.suse.com/1225396" source="BUGZILLA"/>
		<reference ref_id="1225400" ref_url="https://bugzilla.suse.com/1225400" source="BUGZILLA"/>
		<reference ref_id="1225404" ref_url="https://bugzilla.suse.com/1225404" source="BUGZILLA"/>
		<reference ref_id="1225405" ref_url="https://bugzilla.suse.com/1225405" source="BUGZILLA"/>
		<reference ref_id="1225408" ref_url="https://bugzilla.suse.com/1225408" source="BUGZILLA"/>
		<reference ref_id="1225409" ref_url="https://bugzilla.suse.com/1225409" source="BUGZILLA"/>
		<reference ref_id="1225410" ref_url="https://bugzilla.suse.com/1225410" source="BUGZILLA"/>
		<reference ref_id="1225411" ref_url="https://bugzilla.suse.com/1225411" source="BUGZILLA"/>
		<reference ref_id="1225424" ref_url="https://bugzilla.suse.com/1225424" source="BUGZILLA"/>
		<reference ref_id="1225425" ref_url="https://bugzilla.suse.com/1225425" source="BUGZILLA"/>
		<reference ref_id="1225427" ref_url="https://bugzilla.suse.com/1225427" source="BUGZILLA"/>
		<reference ref_id="1225431" ref_url="https://bugzilla.suse.com/1225431" source="BUGZILLA"/>
		<reference ref_id="1225435" ref_url="https://bugzilla.suse.com/1225435" source="BUGZILLA"/>
		<reference ref_id="1225436" ref_url="https://bugzilla.suse.com/1225436" source="BUGZILLA"/>
		<reference ref_id="1225437" ref_url="https://bugzilla.suse.com/1225437" source="BUGZILLA"/>
		<reference ref_id="1225438" ref_url="https://bugzilla.suse.com/1225438" source="BUGZILLA"/>
		<reference ref_id="1225439" ref_url="https://bugzilla.suse.com/1225439" source="BUGZILLA"/>
		<reference ref_id="1225441" ref_url="https://bugzilla.suse.com/1225441" source="BUGZILLA"/>
		<reference ref_id="1225442" ref_url="https://bugzilla.suse.com/1225442" source="BUGZILLA"/>
		<reference ref_id="1225443" ref_url="https://bugzilla.suse.com/1225443" source="BUGZILLA"/>
		<reference ref_id="1225444" ref_url="https://bugzilla.suse.com/1225444" source="BUGZILLA"/>
		<reference ref_id="1225445" ref_url="https://bugzilla.suse.com/1225445" source="BUGZILLA"/>
		<reference ref_id="1225446" ref_url="https://bugzilla.suse.com/1225446" source="BUGZILLA"/>
		<reference ref_id="1225447" ref_url="https://bugzilla.suse.com/1225447" source="BUGZILLA"/>
		<reference ref_id="1225450" ref_url="https://bugzilla.suse.com/1225450" source="BUGZILLA"/>
		<reference ref_id="1225453" ref_url="https://bugzilla.suse.com/1225453" source="BUGZILLA"/>
		<reference ref_id="1225455" ref_url="https://bugzilla.suse.com/1225455" source="BUGZILLA"/>
		<reference ref_id="1225461" ref_url="https://bugzilla.suse.com/1225461" source="BUGZILLA"/>
		<reference ref_id="1225463" ref_url="https://bugzilla.suse.com/1225463" source="BUGZILLA"/>
		<reference ref_id="1225464" ref_url="https://bugzilla.suse.com/1225464" source="BUGZILLA"/>
		<reference ref_id="1225466" ref_url="https://bugzilla.suse.com/1225466" source="BUGZILLA"/>
		<reference ref_id="1225467" ref_url="https://bugzilla.suse.com/1225467" source="BUGZILLA"/>
		<reference ref_id="1225468" ref_url="https://bugzilla.suse.com/1225468" source="BUGZILLA"/>
		<reference ref_id="1225471" ref_url="https://bugzilla.suse.com/1225471" source="BUGZILLA"/>
		<reference ref_id="1225472" ref_url="https://bugzilla.suse.com/1225472" source="BUGZILLA"/>
		<reference ref_id="1225478" ref_url="https://bugzilla.suse.com/1225478" source="BUGZILLA"/>
		<reference ref_id="1225479" ref_url="https://bugzilla.suse.com/1225479" source="BUGZILLA"/>
		<reference ref_id="1225480" ref_url="https://bugzilla.suse.com/1225480" source="BUGZILLA"/>
		<reference ref_id="1225482" ref_url="https://bugzilla.suse.com/1225482" source="BUGZILLA"/>
		<reference ref_id="1225483" ref_url="https://bugzilla.suse.com/1225483" source="BUGZILLA"/>
		<reference ref_id="1225486" ref_url="https://bugzilla.suse.com/1225486" source="BUGZILLA"/>
		<reference ref_id="1225488" ref_url="https://bugzilla.suse.com/1225488" source="BUGZILLA"/>
		<reference ref_id="1225490" ref_url="https://bugzilla.suse.com/1225490" source="BUGZILLA"/>
		<reference ref_id="1225492" ref_url="https://bugzilla.suse.com/1225492" source="BUGZILLA"/>
		<reference ref_id="1225495" ref_url="https://bugzilla.suse.com/1225495" source="BUGZILLA"/>
		<reference ref_id="1225499" ref_url="https://bugzilla.suse.com/1225499" source="BUGZILLA"/>
		<reference ref_id="1225500" ref_url="https://bugzilla.suse.com/1225500" source="BUGZILLA"/>
		<reference ref_id="1225501" ref_url="https://bugzilla.suse.com/1225501" source="BUGZILLA"/>
		<reference ref_id="1225502" ref_url="https://bugzilla.suse.com/1225502" source="BUGZILLA"/>
		<reference ref_id="1225506" ref_url="https://bugzilla.suse.com/1225506" source="BUGZILLA"/>
		<reference ref_id="1225508" ref_url="https://bugzilla.suse.com/1225508" source="BUGZILLA"/>
		<reference ref_id="1225510" ref_url="https://bugzilla.suse.com/1225510" source="BUGZILLA"/>
		<reference ref_id="1225513" ref_url="https://bugzilla.suse.com/1225513" source="BUGZILLA"/>
		<reference ref_id="1225515" ref_url="https://bugzilla.suse.com/1225515" source="BUGZILLA"/>
		<reference ref_id="1225529" ref_url="https://bugzilla.suse.com/1225529" source="BUGZILLA"/>
		<reference ref_id="1225530" ref_url="https://bugzilla.suse.com/1225530" source="BUGZILLA"/>
		<reference ref_id="1225532" ref_url="https://bugzilla.suse.com/1225532" source="BUGZILLA"/>
		<reference ref_id="1225534" ref_url="https://bugzilla.suse.com/1225534" source="BUGZILLA"/>
		<reference ref_id="1225535" ref_url="https://bugzilla.suse.com/1225535" source="BUGZILLA"/>
		<reference ref_id="1225548" ref_url="https://bugzilla.suse.com/1225548" source="BUGZILLA"/>
		<reference ref_id="1225549" ref_url="https://bugzilla.suse.com/1225549" source="BUGZILLA"/>
		<reference ref_id="1225550" ref_url="https://bugzilla.suse.com/1225550" source="BUGZILLA"/>
		<reference ref_id="1225553" ref_url="https://bugzilla.suse.com/1225553" source="BUGZILLA"/>
		<reference ref_id="1225554" ref_url="https://bugzilla.suse.com/1225554" source="BUGZILLA"/>
		<reference ref_id="1225555" ref_url="https://bugzilla.suse.com/1225555" source="BUGZILLA"/>
		<reference ref_id="1225556" ref_url="https://bugzilla.suse.com/1225556" source="BUGZILLA"/>
		<reference ref_id="1225557" ref_url="https://bugzilla.suse.com/1225557" source="BUGZILLA"/>
		<reference ref_id="1225559" ref_url="https://bugzilla.suse.com/1225559" source="BUGZILLA"/>
		<reference ref_id="1225560" ref_url="https://bugzilla.suse.com/1225560" source="BUGZILLA"/>
		<reference ref_id="1225565" ref_url="https://bugzilla.suse.com/1225565" source="BUGZILLA"/>
		<reference ref_id="1225566" ref_url="https://bugzilla.suse.com/1225566" source="BUGZILLA"/>
		<reference ref_id="1225568" ref_url="https://bugzilla.suse.com/1225568" source="BUGZILLA"/>
		<reference ref_id="1225569" ref_url="https://bugzilla.suse.com/1225569" source="BUGZILLA"/>
		<reference ref_id="1225570" ref_url="https://bugzilla.suse.com/1225570" source="BUGZILLA"/>
		<reference ref_id="1225571" ref_url="https://bugzilla.suse.com/1225571" source="BUGZILLA"/>
		<reference ref_id="1225572" ref_url="https://bugzilla.suse.com/1225572" source="BUGZILLA"/>
		<reference ref_id="1225577" ref_url="https://bugzilla.suse.com/1225577" source="BUGZILLA"/>
		<reference ref_id="1225583" ref_url="https://bugzilla.suse.com/1225583" source="BUGZILLA"/>
		<reference ref_id="1225584" ref_url="https://bugzilla.suse.com/1225584" source="BUGZILLA"/>
		<reference ref_id="1225587" ref_url="https://bugzilla.suse.com/1225587" source="BUGZILLA"/>
		<reference ref_id="1225588" ref_url="https://bugzilla.suse.com/1225588" source="BUGZILLA"/>
		<reference ref_id="1225589" ref_url="https://bugzilla.suse.com/1225589" source="BUGZILLA"/>
		<reference ref_id="1225590" ref_url="https://bugzilla.suse.com/1225590" source="BUGZILLA"/>
		<reference ref_id="1225591" ref_url="https://bugzilla.suse.com/1225591" source="BUGZILLA"/>
		<reference ref_id="1225592" ref_url="https://bugzilla.suse.com/1225592" source="BUGZILLA"/>
		<reference ref_id="1225593" ref_url="https://bugzilla.suse.com/1225593" source="BUGZILLA"/>
		<reference ref_id="1225595" ref_url="https://bugzilla.suse.com/1225595" source="BUGZILLA"/>
		<reference ref_id="1225599" ref_url="https://bugzilla.suse.com/1225599" source="BUGZILLA"/>
		<reference ref_id="1225616" ref_url="https://bugzilla.suse.com/1225616" source="BUGZILLA"/>
		<reference ref_id="1225640" ref_url="https://bugzilla.suse.com/1225640" source="BUGZILLA"/>
		<reference ref_id="1225642" ref_url="https://bugzilla.suse.com/1225642" source="BUGZILLA"/>
		<reference ref_id="1225705" ref_url="https://bugzilla.suse.com/1225705" source="BUGZILLA"/>
		<reference ref_id="1225708" ref_url="https://bugzilla.suse.com/1225708" source="BUGZILLA"/>
		<reference ref_id="1225715" ref_url="https://bugzilla.suse.com/1225715" source="BUGZILLA"/>
		<reference ref_id="1225720" ref_url="https://bugzilla.suse.com/1225720" source="BUGZILLA"/>
		<reference ref_id="1225722" ref_url="https://bugzilla.suse.com/1225722" source="BUGZILLA"/>
		<reference ref_id="1225734" ref_url="https://bugzilla.suse.com/1225734" source="BUGZILLA"/>
		<reference ref_id="1225735" ref_url="https://bugzilla.suse.com/1225735" source="BUGZILLA"/>
		<reference ref_id="1225747" ref_url="https://bugzilla.suse.com/1225747" source="BUGZILLA"/>
		<reference ref_id="1225748" ref_url="https://bugzilla.suse.com/1225748" source="BUGZILLA"/>
		<reference ref_id="1225756" ref_url="https://bugzilla.suse.com/1225756" source="BUGZILLA"/>
		<reference ref_id="1225761" ref_url="https://bugzilla.suse.com/1225761" source="BUGZILLA"/>
		<reference ref_id="1225766" ref_url="https://bugzilla.suse.com/1225766" source="BUGZILLA"/>
		<reference ref_id="1225775" ref_url="https://bugzilla.suse.com/1225775" source="BUGZILLA"/>
		<reference ref_id="1225810" ref_url="https://bugzilla.suse.com/1225810" source="BUGZILLA"/>
		<reference ref_id="1225820" ref_url="https://bugzilla.suse.com/1225820" source="BUGZILLA"/>
		<reference ref_id="1225829" ref_url="https://bugzilla.suse.com/1225829" source="BUGZILLA"/>
		<reference ref_id="1225835" ref_url="https://bugzilla.suse.com/1225835" source="BUGZILLA"/>
		<reference ref_id="1225842" ref_url="https://bugzilla.suse.com/1225842" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36788" ref_url="https://www.suse.com/security/cve/CVE-2020-36788/" source="CVE"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2021-4148" ref_url="https://www.suse.com/security/cve/CVE-2021-4148/" source="CVE"/>
		<reference ref_id="CVE-2021-42327" ref_url="https://www.suse.com/security/cve/CVE-2021-42327/" source="CVE"/>
		<reference ref_id="CVE-2021-43056" ref_url="https://www.suse.com/security/cve/CVE-2021-43056/" source="CVE"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<reference ref_id="CVE-2021-47200" ref_url="https://www.suse.com/security/cve/CVE-2021-47200/" source="CVE"/>
		<reference ref_id="CVE-2021-47358" ref_url="https://www.suse.com/security/cve/CVE-2021-47358/" source="CVE"/>
		<reference ref_id="CVE-2021-47359" ref_url="https://www.suse.com/security/cve/CVE-2021-47359/" source="CVE"/>
		<reference ref_id="CVE-2021-47360" ref_url="https://www.suse.com/security/cve/CVE-2021-47360/" source="CVE"/>
		<reference ref_id="CVE-2021-47361" ref_url="https://www.suse.com/security/cve/CVE-2021-47361/" source="CVE"/>
		<reference ref_id="CVE-2021-47362" ref_url="https://www.suse.com/security/cve/CVE-2021-47362/" source="CVE"/>
		<reference ref_id="CVE-2021-47363" ref_url="https://www.suse.com/security/cve/CVE-2021-47363/" source="CVE"/>
		<reference ref_id="CVE-2021-47364" ref_url="https://www.suse.com/security/cve/CVE-2021-47364/" source="CVE"/>
		<reference ref_id="CVE-2021-47365" ref_url="https://www.suse.com/security/cve/CVE-2021-47365/" source="CVE"/>
		<reference ref_id="CVE-2021-47366" ref_url="https://www.suse.com/security/cve/CVE-2021-47366/" source="CVE"/>
		<reference ref_id="CVE-2021-47367" ref_url="https://www.suse.com/security/cve/CVE-2021-47367/" source="CVE"/>
		<reference ref_id="CVE-2021-47368" ref_url="https://www.suse.com/security/cve/CVE-2021-47368/" source="CVE"/>
		<reference ref_id="CVE-2021-47369" ref_url="https://www.suse.com/security/cve/CVE-2021-47369/" source="CVE"/>
		<reference ref_id="CVE-2021-47370" ref_url="https://www.suse.com/security/cve/CVE-2021-47370/" source="CVE"/>
		<reference ref_id="CVE-2021-47371" ref_url="https://www.suse.com/security/cve/CVE-2021-47371/" source="CVE"/>
		<reference ref_id="CVE-2021-47372" ref_url="https://www.suse.com/security/cve/CVE-2021-47372/" source="CVE"/>
		<reference ref_id="CVE-2021-47373" ref_url="https://www.suse.com/security/cve/CVE-2021-47373/" source="CVE"/>
		<reference ref_id="CVE-2021-47374" ref_url="https://www.suse.com/security/cve/CVE-2021-47374/" source="CVE"/>
		<reference ref_id="CVE-2021-47375" ref_url="https://www.suse.com/security/cve/CVE-2021-47375/" source="CVE"/>
		<reference ref_id="CVE-2021-47376" ref_url="https://www.suse.com/security/cve/CVE-2021-47376/" source="CVE"/>
		<reference ref_id="CVE-2021-47378" ref_url="https://www.suse.com/security/cve/CVE-2021-47378/" source="CVE"/>
		<reference ref_id="CVE-2021-47379" ref_url="https://www.suse.com/security/cve/CVE-2021-47379/" source="CVE"/>
		<reference ref_id="CVE-2021-47380" ref_url="https://www.suse.com/security/cve/CVE-2021-47380/" source="CVE"/>
		<reference ref_id="CVE-2021-47381" ref_url="https://www.suse.com/security/cve/CVE-2021-47381/" source="CVE"/>
		<reference ref_id="CVE-2021-47382" ref_url="https://www.suse.com/security/cve/CVE-2021-47382/" source="CVE"/>
		<reference ref_id="CVE-2021-47383" ref_url="https://www.suse.com/security/cve/CVE-2021-47383/" source="CVE"/>
		<reference ref_id="CVE-2021-47384" ref_url="https://www.suse.com/security/cve/CVE-2021-47384/" source="CVE"/>
		<reference ref_id="CVE-2021-47385" ref_url="https://www.suse.com/security/cve/CVE-2021-47385/" source="CVE"/>
		<reference ref_id="CVE-2021-47386" ref_url="https://www.suse.com/security/cve/CVE-2021-47386/" source="CVE"/>
		<reference ref_id="CVE-2021-47387" ref_url="https://www.suse.com/security/cve/CVE-2021-47387/" source="CVE"/>
		<reference ref_id="CVE-2021-47388" ref_url="https://www.suse.com/security/cve/CVE-2021-47388/" source="CVE"/>
		<reference ref_id="CVE-2021-47389" ref_url="https://www.suse.com/security/cve/CVE-2021-47389/" source="CVE"/>
		<reference ref_id="CVE-2021-47390" ref_url="https://www.suse.com/security/cve/CVE-2021-47390/" source="CVE"/>
		<reference ref_id="CVE-2021-47391" ref_url="https://www.suse.com/security/cve/CVE-2021-47391/" source="CVE"/>
		<reference ref_id="CVE-2021-47392" ref_url="https://www.suse.com/security/cve/CVE-2021-47392/" source="CVE"/>
		<reference ref_id="CVE-2021-47393" ref_url="https://www.suse.com/security/cve/CVE-2021-47393/" source="CVE"/>
		<reference ref_id="CVE-2021-47394" ref_url="https://www.suse.com/security/cve/CVE-2021-47394/" source="CVE"/>
		<reference ref_id="CVE-2021-47395" ref_url="https://www.suse.com/security/cve/CVE-2021-47395/" source="CVE"/>
		<reference ref_id="CVE-2021-47396" ref_url="https://www.suse.com/security/cve/CVE-2021-47396/" source="CVE"/>
		<reference ref_id="CVE-2021-47397" ref_url="https://www.suse.com/security/cve/CVE-2021-47397/" source="CVE"/>
		<reference ref_id="CVE-2021-47398" ref_url="https://www.suse.com/security/cve/CVE-2021-47398/" source="CVE"/>
		<reference ref_id="CVE-2021-47399" ref_url="https://www.suse.com/security/cve/CVE-2021-47399/" source="CVE"/>
		<reference ref_id="CVE-2021-47400" ref_url="https://www.suse.com/security/cve/CVE-2021-47400/" source="CVE"/>
		<reference ref_id="CVE-2021-47401" ref_url="https://www.suse.com/security/cve/CVE-2021-47401/" source="CVE"/>
		<reference ref_id="CVE-2021-47402" ref_url="https://www.suse.com/security/cve/CVE-2021-47402/" source="CVE"/>
		<reference ref_id="CVE-2021-47403" ref_url="https://www.suse.com/security/cve/CVE-2021-47403/" source="CVE"/>
		<reference ref_id="CVE-2021-47404" ref_url="https://www.suse.com/security/cve/CVE-2021-47404/" source="CVE"/>
		<reference ref_id="CVE-2021-47405" ref_url="https://www.suse.com/security/cve/CVE-2021-47405/" source="CVE"/>
		<reference ref_id="CVE-2021-47406" ref_url="https://www.suse.com/security/cve/CVE-2021-47406/" source="CVE"/>
		<reference ref_id="CVE-2021-47407" ref_url="https://www.suse.com/security/cve/CVE-2021-47407/" source="CVE"/>
		<reference ref_id="CVE-2021-47408" ref_url="https://www.suse.com/security/cve/CVE-2021-47408/" source="CVE"/>
		<reference ref_id="CVE-2021-47409" ref_url="https://www.suse.com/security/cve/CVE-2021-47409/" source="CVE"/>
		<reference ref_id="CVE-2021-47410" ref_url="https://www.suse.com/security/cve/CVE-2021-47410/" source="CVE"/>
		<reference ref_id="CVE-2021-47412" ref_url="https://www.suse.com/security/cve/CVE-2021-47412/" source="CVE"/>
		<reference ref_id="CVE-2021-47413" ref_url="https://www.suse.com/security/cve/CVE-2021-47413/" source="CVE"/>
		<reference ref_id="CVE-2021-47414" ref_url="https://www.suse.com/security/cve/CVE-2021-47414/" source="CVE"/>
		<reference ref_id="CVE-2021-47415" ref_url="https://www.suse.com/security/cve/CVE-2021-47415/" source="CVE"/>
		<reference ref_id="CVE-2021-47416" ref_url="https://www.suse.com/security/cve/CVE-2021-47416/" source="CVE"/>
		<reference ref_id="CVE-2021-47417" ref_url="https://www.suse.com/security/cve/CVE-2021-47417/" source="CVE"/>
		<reference ref_id="CVE-2021-47418" ref_url="https://www.suse.com/security/cve/CVE-2021-47418/" source="CVE"/>
		<reference ref_id="CVE-2021-47419" ref_url="https://www.suse.com/security/cve/CVE-2021-47419/" source="CVE"/>
		<reference ref_id="CVE-2021-47420" ref_url="https://www.suse.com/security/cve/CVE-2021-47420/" source="CVE"/>
		<reference ref_id="CVE-2021-47421" ref_url="https://www.suse.com/security/cve/CVE-2021-47421/" source="CVE"/>
		<reference ref_id="CVE-2021-47422" ref_url="https://www.suse.com/security/cve/CVE-2021-47422/" source="CVE"/>
		<reference ref_id="CVE-2021-47423" ref_url="https://www.suse.com/security/cve/CVE-2021-47423/" source="CVE"/>
		<reference ref_id="CVE-2021-47424" ref_url="https://www.suse.com/security/cve/CVE-2021-47424/" source="CVE"/>
		<reference ref_id="CVE-2021-47425" ref_url="https://www.suse.com/security/cve/CVE-2021-47425/" source="CVE"/>
		<reference ref_id="CVE-2021-47426" ref_url="https://www.suse.com/security/cve/CVE-2021-47426/" source="CVE"/>
		<reference ref_id="CVE-2021-47427" ref_url="https://www.suse.com/security/cve/CVE-2021-47427/" source="CVE"/>
		<reference ref_id="CVE-2021-47428" ref_url="https://www.suse.com/security/cve/CVE-2021-47428/" source="CVE"/>
		<reference ref_id="CVE-2021-47429" ref_url="https://www.suse.com/security/cve/CVE-2021-47429/" source="CVE"/>
		<reference ref_id="CVE-2021-47430" ref_url="https://www.suse.com/security/cve/CVE-2021-47430/" source="CVE"/>
		<reference ref_id="CVE-2021-47431" ref_url="https://www.suse.com/security/cve/CVE-2021-47431/" source="CVE"/>
		<reference ref_id="CVE-2021-47433" ref_url="https://www.suse.com/security/cve/CVE-2021-47433/" source="CVE"/>
		<reference ref_id="CVE-2021-47434" ref_url="https://www.suse.com/security/cve/CVE-2021-47434/" source="CVE"/>
		<reference ref_id="CVE-2021-47435" ref_url="https://www.suse.com/security/cve/CVE-2021-47435/" source="CVE"/>
		<reference ref_id="CVE-2021-47436" ref_url="https://www.suse.com/security/cve/CVE-2021-47436/" source="CVE"/>
		<reference ref_id="CVE-2021-47437" ref_url="https://www.suse.com/security/cve/CVE-2021-47437/" source="CVE"/>
		<reference ref_id="CVE-2021-47438" ref_url="https://www.suse.com/security/cve/CVE-2021-47438/" source="CVE"/>
		<reference ref_id="CVE-2021-47439" ref_url="https://www.suse.com/security/cve/CVE-2021-47439/" source="CVE"/>
		<reference ref_id="CVE-2021-47440" ref_url="https://www.suse.com/security/cve/CVE-2021-47440/" source="CVE"/>
		<reference ref_id="CVE-2021-47441" ref_url="https://www.suse.com/security/cve/CVE-2021-47441/" source="CVE"/>
		<reference ref_id="CVE-2021-47442" ref_url="https://www.suse.com/security/cve/CVE-2021-47442/" source="CVE"/>
		<reference ref_id="CVE-2021-47443" ref_url="https://www.suse.com/security/cve/CVE-2021-47443/" source="CVE"/>
		<reference ref_id="CVE-2021-47444" ref_url="https://www.suse.com/security/cve/CVE-2021-47444/" source="CVE"/>
		<reference ref_id="CVE-2021-47445" ref_url="https://www.suse.com/security/cve/CVE-2021-47445/" source="CVE"/>
		<reference ref_id="CVE-2021-47446" ref_url="https://www.suse.com/security/cve/CVE-2021-47446/" source="CVE"/>
		<reference ref_id="CVE-2021-47447" ref_url="https://www.suse.com/security/cve/CVE-2021-47447/" source="CVE"/>
		<reference ref_id="CVE-2021-47448" ref_url="https://www.suse.com/security/cve/CVE-2021-47448/" source="CVE"/>
		<reference ref_id="CVE-2021-47449" ref_url="https://www.suse.com/security/cve/CVE-2021-47449/" source="CVE"/>
		<reference ref_id="CVE-2021-47450" ref_url="https://www.suse.com/security/cve/CVE-2021-47450/" source="CVE"/>
		<reference ref_id="CVE-2021-47451" ref_url="https://www.suse.com/security/cve/CVE-2021-47451/" source="CVE"/>
		<reference ref_id="CVE-2021-47452" ref_url="https://www.suse.com/security/cve/CVE-2021-47452/" source="CVE"/>
		<reference ref_id="CVE-2021-47453" ref_url="https://www.suse.com/security/cve/CVE-2021-47453/" source="CVE"/>
		<reference ref_id="CVE-2021-47454" ref_url="https://www.suse.com/security/cve/CVE-2021-47454/" source="CVE"/>
		<reference ref_id="CVE-2021-47455" ref_url="https://www.suse.com/security/cve/CVE-2021-47455/" source="CVE"/>
		<reference ref_id="CVE-2021-47456" ref_url="https://www.suse.com/security/cve/CVE-2021-47456/" source="CVE"/>
		<reference ref_id="CVE-2021-47457" ref_url="https://www.suse.com/security/cve/CVE-2021-47457/" source="CVE"/>
		<reference ref_id="CVE-2021-47458" ref_url="https://www.suse.com/security/cve/CVE-2021-47458/" source="CVE"/>
		<reference ref_id="CVE-2021-47459" ref_url="https://www.suse.com/security/cve/CVE-2021-47459/" source="CVE"/>
		<reference ref_id="CVE-2021-47460" ref_url="https://www.suse.com/security/cve/CVE-2021-47460/" source="CVE"/>
		<reference ref_id="CVE-2021-47461" ref_url="https://www.suse.com/security/cve/CVE-2021-47461/" source="CVE"/>
		<reference ref_id="CVE-2021-47462" ref_url="https://www.suse.com/security/cve/CVE-2021-47462/" source="CVE"/>
		<reference ref_id="CVE-2021-47463" ref_url="https://www.suse.com/security/cve/CVE-2021-47463/" source="CVE"/>
		<reference ref_id="CVE-2021-47464" ref_url="https://www.suse.com/security/cve/CVE-2021-47464/" source="CVE"/>
		<reference ref_id="CVE-2021-47465" ref_url="https://www.suse.com/security/cve/CVE-2021-47465/" source="CVE"/>
		<reference ref_id="CVE-2021-47466" ref_url="https://www.suse.com/security/cve/CVE-2021-47466/" source="CVE"/>
		<reference ref_id="CVE-2021-47467" ref_url="https://www.suse.com/security/cve/CVE-2021-47467/" source="CVE"/>
		<reference ref_id="CVE-2021-47468" ref_url="https://www.suse.com/security/cve/CVE-2021-47468/" source="CVE"/>
		<reference ref_id="CVE-2021-47469" ref_url="https://www.suse.com/security/cve/CVE-2021-47469/" source="CVE"/>
		<reference ref_id="CVE-2021-47470" ref_url="https://www.suse.com/security/cve/CVE-2021-47470/" source="CVE"/>
		<reference ref_id="CVE-2021-47471" ref_url="https://www.suse.com/security/cve/CVE-2021-47471/" source="CVE"/>
		<reference ref_id="CVE-2021-47472" ref_url="https://www.suse.com/security/cve/CVE-2021-47472/" source="CVE"/>
		<reference ref_id="CVE-2021-47473" ref_url="https://www.suse.com/security/cve/CVE-2021-47473/" source="CVE"/>
		<reference ref_id="CVE-2021-47474" ref_url="https://www.suse.com/security/cve/CVE-2021-47474/" source="CVE"/>
		<reference ref_id="CVE-2021-47475" ref_url="https://www.suse.com/security/cve/CVE-2021-47475/" source="CVE"/>
		<reference ref_id="CVE-2021-47476" ref_url="https://www.suse.com/security/cve/CVE-2021-47476/" source="CVE"/>
		<reference ref_id="CVE-2021-47477" ref_url="https://www.suse.com/security/cve/CVE-2021-47477/" source="CVE"/>
		<reference ref_id="CVE-2021-47478" ref_url="https://www.suse.com/security/cve/CVE-2021-47478/" source="CVE"/>
		<reference ref_id="CVE-2021-47479" ref_url="https://www.suse.com/security/cve/CVE-2021-47479/" source="CVE"/>
		<reference ref_id="CVE-2021-47480" ref_url="https://www.suse.com/security/cve/CVE-2021-47480/" source="CVE"/>
		<reference ref_id="CVE-2021-47481" ref_url="https://www.suse.com/security/cve/CVE-2021-47481/" source="CVE"/>
		<reference ref_id="CVE-2021-47482" ref_url="https://www.suse.com/security/cve/CVE-2021-47482/" source="CVE"/>
		<reference ref_id="CVE-2021-47483" ref_url="https://www.suse.com/security/cve/CVE-2021-47483/" source="CVE"/>
		<reference ref_id="CVE-2021-47484" ref_url="https://www.suse.com/security/cve/CVE-2021-47484/" source="CVE"/>
		<reference ref_id="CVE-2021-47485" ref_url="https://www.suse.com/security/cve/CVE-2021-47485/" source="CVE"/>
		<reference ref_id="CVE-2021-47486" ref_url="https://www.suse.com/security/cve/CVE-2021-47486/" source="CVE"/>
		<reference ref_id="CVE-2021-47488" ref_url="https://www.suse.com/security/cve/CVE-2021-47488/" source="CVE"/>
		<reference ref_id="CVE-2021-47489" ref_url="https://www.suse.com/security/cve/CVE-2021-47489/" source="CVE"/>
		<reference ref_id="CVE-2021-47490" ref_url="https://www.suse.com/security/cve/CVE-2021-47490/" source="CVE"/>
		<reference ref_id="CVE-2021-47491" ref_url="https://www.suse.com/security/cve/CVE-2021-47491/" source="CVE"/>
		<reference ref_id="CVE-2021-47492" ref_url="https://www.suse.com/security/cve/CVE-2021-47492/" source="CVE"/>
		<reference ref_id="CVE-2021-47493" ref_url="https://www.suse.com/security/cve/CVE-2021-47493/" source="CVE"/>
		<reference ref_id="CVE-2021-47494" ref_url="https://www.suse.com/security/cve/CVE-2021-47494/" source="CVE"/>
		<reference ref_id="CVE-2021-47495" ref_url="https://www.suse.com/security/cve/CVE-2021-47495/" source="CVE"/>
		<reference ref_id="CVE-2021-47496" ref_url="https://www.suse.com/security/cve/CVE-2021-47496/" source="CVE"/>
		<reference ref_id="CVE-2021-47497" ref_url="https://www.suse.com/security/cve/CVE-2021-47497/" source="CVE"/>
		<reference ref_id="CVE-2021-47498" ref_url="https://www.suse.com/security/cve/CVE-2021-47498/" source="CVE"/>
		<reference ref_id="CVE-2021-47499" ref_url="https://www.suse.com/security/cve/CVE-2021-47499/" source="CVE"/>
		<reference ref_id="CVE-2021-47500" ref_url="https://www.suse.com/security/cve/CVE-2021-47500/" source="CVE"/>
		<reference ref_id="CVE-2021-47501" ref_url="https://www.suse.com/security/cve/CVE-2021-47501/" source="CVE"/>
		<reference ref_id="CVE-2021-47502" ref_url="https://www.suse.com/security/cve/CVE-2021-47502/" source="CVE"/>
		<reference ref_id="CVE-2021-47503" ref_url="https://www.suse.com/security/cve/CVE-2021-47503/" source="CVE"/>
		<reference ref_id="CVE-2021-47504" ref_url="https://www.suse.com/security/cve/CVE-2021-47504/" source="CVE"/>
		<reference ref_id="CVE-2021-47505" ref_url="https://www.suse.com/security/cve/CVE-2021-47505/" source="CVE"/>
		<reference ref_id="CVE-2021-47506" ref_url="https://www.suse.com/security/cve/CVE-2021-47506/" source="CVE"/>
		<reference ref_id="CVE-2021-47507" ref_url="https://www.suse.com/security/cve/CVE-2021-47507/" source="CVE"/>
		<reference ref_id="CVE-2021-47508" ref_url="https://www.suse.com/security/cve/CVE-2021-47508/" source="CVE"/>
		<reference ref_id="CVE-2021-47509" ref_url="https://www.suse.com/security/cve/CVE-2021-47509/" source="CVE"/>
		<reference ref_id="CVE-2021-47510" ref_url="https://www.suse.com/security/cve/CVE-2021-47510/" source="CVE"/>
		<reference ref_id="CVE-2021-47511" ref_url="https://www.suse.com/security/cve/CVE-2021-47511/" source="CVE"/>
		<reference ref_id="CVE-2021-47512" ref_url="https://www.suse.com/security/cve/CVE-2021-47512/" source="CVE"/>
		<reference ref_id="CVE-2021-47513" ref_url="https://www.suse.com/security/cve/CVE-2021-47513/" source="CVE"/>
		<reference ref_id="CVE-2021-47514" ref_url="https://www.suse.com/security/cve/CVE-2021-47514/" source="CVE"/>
		<reference ref_id="CVE-2021-47516" ref_url="https://www.suse.com/security/cve/CVE-2021-47516/" source="CVE"/>
		<reference ref_id="CVE-2021-47518" ref_url="https://www.suse.com/security/cve/CVE-2021-47518/" source="CVE"/>
		<reference ref_id="CVE-2021-47520" ref_url="https://www.suse.com/security/cve/CVE-2021-47520/" source="CVE"/>
		<reference ref_id="CVE-2021-47521" ref_url="https://www.suse.com/security/cve/CVE-2021-47521/" source="CVE"/>
		<reference ref_id="CVE-2021-47522" ref_url="https://www.suse.com/security/cve/CVE-2021-47522/" source="CVE"/>
		<reference ref_id="CVE-2021-47523" ref_url="https://www.suse.com/security/cve/CVE-2021-47523/" source="CVE"/>
		<reference ref_id="CVE-2021-47524" ref_url="https://www.suse.com/security/cve/CVE-2021-47524/" source="CVE"/>
		<reference ref_id="CVE-2021-47525" ref_url="https://www.suse.com/security/cve/CVE-2021-47525/" source="CVE"/>
		<reference ref_id="CVE-2021-47526" ref_url="https://www.suse.com/security/cve/CVE-2021-47526/" source="CVE"/>
		<reference ref_id="CVE-2021-47528" ref_url="https://www.suse.com/security/cve/CVE-2021-47528/" source="CVE"/>
		<reference ref_id="CVE-2021-47529" ref_url="https://www.suse.com/security/cve/CVE-2021-47529/" source="CVE"/>
		<reference ref_id="CVE-2021-47530" ref_url="https://www.suse.com/security/cve/CVE-2021-47530/" source="CVE"/>
		<reference ref_id="CVE-2021-47531" ref_url="https://www.suse.com/security/cve/CVE-2021-47531/" source="CVE"/>
		<reference ref_id="CVE-2021-47532" ref_url="https://www.suse.com/security/cve/CVE-2021-47532/" source="CVE"/>
		<reference ref_id="CVE-2021-47533" ref_url="https://www.suse.com/security/cve/CVE-2021-47533/" source="CVE"/>
		<reference ref_id="CVE-2021-47534" ref_url="https://www.suse.com/security/cve/CVE-2021-47534/" source="CVE"/>
		<reference ref_id="CVE-2021-47535" ref_url="https://www.suse.com/security/cve/CVE-2021-47535/" source="CVE"/>
		<reference ref_id="CVE-2021-47536" ref_url="https://www.suse.com/security/cve/CVE-2021-47536/" source="CVE"/>
		<reference ref_id="CVE-2021-47537" ref_url="https://www.suse.com/security/cve/CVE-2021-47537/" source="CVE"/>
		<reference ref_id="CVE-2021-47540" ref_url="https://www.suse.com/security/cve/CVE-2021-47540/" source="CVE"/>
		<reference ref_id="CVE-2021-47541" ref_url="https://www.suse.com/security/cve/CVE-2021-47541/" source="CVE"/>
		<reference ref_id="CVE-2021-47542" ref_url="https://www.suse.com/security/cve/CVE-2021-47542/" source="CVE"/>
		<reference ref_id="CVE-2021-47544" ref_url="https://www.suse.com/security/cve/CVE-2021-47544/" source="CVE"/>
		<reference ref_id="CVE-2021-47548" ref_url="https://www.suse.com/security/cve/CVE-2021-47548/" source="CVE"/>
		<reference ref_id="CVE-2021-47549" ref_url="https://www.suse.com/security/cve/CVE-2021-47549/" source="CVE"/>
		<reference ref_id="CVE-2021-47550" ref_url="https://www.suse.com/security/cve/CVE-2021-47550/" source="CVE"/>
		<reference ref_id="CVE-2021-47551" ref_url="https://www.suse.com/security/cve/CVE-2021-47551/" source="CVE"/>
		<reference ref_id="CVE-2021-47552" ref_url="https://www.suse.com/security/cve/CVE-2021-47552/" source="CVE"/>
		<reference ref_id="CVE-2021-47553" ref_url="https://www.suse.com/security/cve/CVE-2021-47553/" source="CVE"/>
		<reference ref_id="CVE-2021-47554" ref_url="https://www.suse.com/security/cve/CVE-2021-47554/" source="CVE"/>
		<reference ref_id="CVE-2021-47555" ref_url="https://www.suse.com/security/cve/CVE-2021-47555/" source="CVE"/>
		<reference ref_id="CVE-2021-47556" ref_url="https://www.suse.com/security/cve/CVE-2021-47556/" source="CVE"/>
		<reference ref_id="CVE-2021-47557" ref_url="https://www.suse.com/security/cve/CVE-2021-47557/" source="CVE"/>
		<reference ref_id="CVE-2021-47558" ref_url="https://www.suse.com/security/cve/CVE-2021-47558/" source="CVE"/>
		<reference ref_id="CVE-2021-47559" ref_url="https://www.suse.com/security/cve/CVE-2021-47559/" source="CVE"/>
		<reference ref_id="CVE-2021-47560" ref_url="https://www.suse.com/security/cve/CVE-2021-47560/" source="CVE"/>
		<reference ref_id="CVE-2021-47562" ref_url="https://www.suse.com/security/cve/CVE-2021-47562/" source="CVE"/>
		<reference ref_id="CVE-2021-47563" ref_url="https://www.suse.com/security/cve/CVE-2021-47563/" source="CVE"/>
		<reference ref_id="CVE-2021-47564" ref_url="https://www.suse.com/security/cve/CVE-2021-47564/" source="CVE"/>
		<reference ref_id="CVE-2021-47565" ref_url="https://www.suse.com/security/cve/CVE-2021-47565/" source="CVE"/>
		<reference ref_id="CVE-2021-47569" ref_url="https://www.suse.com/security/cve/CVE-2021-47569/" source="CVE"/>
		<reference ref_id="CVE-2022-48633" ref_url="https://www.suse.com/security/cve/CVE-2022-48633/" source="CVE"/>
		<reference ref_id="CVE-2022-48662" ref_url="https://www.suse.com/security/cve/CVE-2022-48662/" source="CVE"/>
		<reference ref_id="CVE-2022-48669" ref_url="https://www.suse.com/security/cve/CVE-2022-48669/" source="CVE"/>
		<reference ref_id="CVE-2022-48689" ref_url="https://www.suse.com/security/cve/CVE-2022-48689/" source="CVE"/>
		<reference ref_id="CVE-2022-48691" ref_url="https://www.suse.com/security/cve/CVE-2022-48691/" source="CVE"/>
		<reference ref_id="CVE-2022-48699" ref_url="https://www.suse.com/security/cve/CVE-2022-48699/" source="CVE"/>
		<reference ref_id="CVE-2022-48705" ref_url="https://www.suse.com/security/cve/CVE-2022-48705/" source="CVE"/>
		<reference ref_id="CVE-2022-48708" ref_url="https://www.suse.com/security/cve/CVE-2022-48708/" source="CVE"/>
		<reference ref_id="CVE-2022-48709" ref_url="https://www.suse.com/security/cve/CVE-2022-48709/" source="CVE"/>
		<reference ref_id="CVE-2022-48710" ref_url="https://www.suse.com/security/cve/CVE-2022-48710/" source="CVE"/>
		<reference ref_id="CVE-2023-0160" ref_url="https://www.suse.com/security/cve/CVE-2023-0160/" source="CVE"/>
		<reference ref_id="CVE-2023-1829" ref_url="https://www.suse.com/security/cve/CVE-2023-1829/" source="CVE"/>
		<reference ref_id="CVE-2023-42755" ref_url="https://www.suse.com/security/cve/CVE-2023-42755/" source="CVE"/>
		<reference ref_id="CVE-2023-47233" ref_url="https://www.suse.com/security/cve/CVE-2023-47233/" source="CVE"/>
		<reference ref_id="CVE-2023-52586" ref_url="https://www.suse.com/security/cve/CVE-2023-52586/" source="CVE"/>
		<reference ref_id="CVE-2023-52591" ref_url="https://www.suse.com/security/cve/CVE-2023-52591/" source="CVE"/>
		<reference ref_id="CVE-2023-52618" ref_url="https://www.suse.com/security/cve/CVE-2023-52618/" source="CVE"/>
		<reference ref_id="CVE-2023-52642" ref_url="https://www.suse.com/security/cve/CVE-2023-52642/" source="CVE"/>
		<reference ref_id="CVE-2023-52643" ref_url="https://www.suse.com/security/cve/CVE-2023-52643/" source="CVE"/>
		<reference ref_id="CVE-2023-52644" ref_url="https://www.suse.com/security/cve/CVE-2023-52644/" source="CVE"/>
		<reference ref_id="CVE-2023-52646" ref_url="https://www.suse.com/security/cve/CVE-2023-52646/" source="CVE"/>
		<reference ref_id="CVE-2023-52650" ref_url="https://www.suse.com/security/cve/CVE-2023-52650/" source="CVE"/>
		<reference ref_id="CVE-2023-52653" ref_url="https://www.suse.com/security/cve/CVE-2023-52653/" source="CVE"/>
		<reference ref_id="CVE-2023-52654" ref_url="https://www.suse.com/security/cve/CVE-2023-52654/" source="CVE"/>
		<reference ref_id="CVE-2023-52655" ref_url="https://www.suse.com/security/cve/CVE-2023-52655/" source="CVE"/>
		<reference ref_id="CVE-2023-52656" ref_url="https://www.suse.com/security/cve/CVE-2023-52656/" source="CVE"/>
		<reference ref_id="CVE-2023-52657" ref_url="https://www.suse.com/security/cve/CVE-2023-52657/" source="CVE"/>
		<reference ref_id="CVE-2023-52659" ref_url="https://www.suse.com/security/cve/CVE-2023-52659/" source="CVE"/>
		<reference ref_id="CVE-2023-52660" ref_url="https://www.suse.com/security/cve/CVE-2023-52660/" source="CVE"/>
		<reference ref_id="CVE-2023-52661" ref_url="https://www.suse.com/security/cve/CVE-2023-52661/" source="CVE"/>
		<reference ref_id="CVE-2023-52662" ref_url="https://www.suse.com/security/cve/CVE-2023-52662/" source="CVE"/>
		<reference ref_id="CVE-2023-52664" ref_url="https://www.suse.com/security/cve/CVE-2023-52664/" source="CVE"/>
		<reference ref_id="CVE-2023-52669" ref_url="https://www.suse.com/security/cve/CVE-2023-52669/" source="CVE"/>
		<reference ref_id="CVE-2023-52671" ref_url="https://www.suse.com/security/cve/CVE-2023-52671/" source="CVE"/>
		<reference ref_id="CVE-2023-52674" ref_url="https://www.suse.com/security/cve/CVE-2023-52674/" source="CVE"/>
		<reference ref_id="CVE-2023-52676" ref_url="https://www.suse.com/security/cve/CVE-2023-52676/" source="CVE"/>
		<reference ref_id="CVE-2023-52678" ref_url="https://www.suse.com/security/cve/CVE-2023-52678/" source="CVE"/>
		<reference ref_id="CVE-2023-52679" ref_url="https://www.suse.com/security/cve/CVE-2023-52679/" source="CVE"/>
		<reference ref_id="CVE-2023-52680" ref_url="https://www.suse.com/security/cve/CVE-2023-52680/" source="CVE"/>
		<reference ref_id="CVE-2023-52683" ref_url="https://www.suse.com/security/cve/CVE-2023-52683/" source="CVE"/>
		<reference ref_id="CVE-2023-52685" ref_url="https://www.suse.com/security/cve/CVE-2023-52685/" source="CVE"/>
		<reference ref_id="CVE-2023-52686" ref_url="https://www.suse.com/security/cve/CVE-2023-52686/" source="CVE"/>
		<reference ref_id="CVE-2023-52690" ref_url="https://www.suse.com/security/cve/CVE-2023-52690/" source="CVE"/>
		<reference ref_id="CVE-2023-52691" ref_url="https://www.suse.com/security/cve/CVE-2023-52691/" source="CVE"/>
		<reference ref_id="CVE-2023-52692" ref_url="https://www.suse.com/security/cve/CVE-2023-52692/" source="CVE"/>
		<reference ref_id="CVE-2023-52693" ref_url="https://www.suse.com/security/cve/CVE-2023-52693/" source="CVE"/>
		<reference ref_id="CVE-2023-52694" ref_url="https://www.suse.com/security/cve/CVE-2023-52694/" source="CVE"/>
		<reference ref_id="CVE-2023-52696" ref_url="https://www.suse.com/security/cve/CVE-2023-52696/" source="CVE"/>
		<reference ref_id="CVE-2023-52698" ref_url="https://www.suse.com/security/cve/CVE-2023-52698/" source="CVE"/>
		<reference ref_id="CVE-2023-52699" ref_url="https://www.suse.com/security/cve/CVE-2023-52699/" source="CVE"/>
		<reference ref_id="CVE-2023-52702" ref_url="https://www.suse.com/security/cve/CVE-2023-52702/" source="CVE"/>
		<reference ref_id="CVE-2023-52703" ref_url="https://www.suse.com/security/cve/CVE-2023-52703/" source="CVE"/>
		<reference ref_id="CVE-2023-52705" ref_url="https://www.suse.com/security/cve/CVE-2023-52705/" source="CVE"/>
		<reference ref_id="CVE-2023-52707" ref_url="https://www.suse.com/security/cve/CVE-2023-52707/" source="CVE"/>
		<reference ref_id="CVE-2023-52708" ref_url="https://www.suse.com/security/cve/CVE-2023-52708/" source="CVE"/>
		<reference ref_id="CVE-2023-52730" ref_url="https://www.suse.com/security/cve/CVE-2023-52730/" source="CVE"/>
		<reference ref_id="CVE-2023-52731" ref_url="https://www.suse.com/security/cve/CVE-2023-52731/" source="CVE"/>
		<reference ref_id="CVE-2023-52732" ref_url="https://www.suse.com/security/cve/CVE-2023-52732/" source="CVE"/>
		<reference ref_id="CVE-2023-52733" ref_url="https://www.suse.com/security/cve/CVE-2023-52733/" source="CVE"/>
		<reference ref_id="CVE-2023-52736" ref_url="https://www.suse.com/security/cve/CVE-2023-52736/" source="CVE"/>
		<reference ref_id="CVE-2023-52738" ref_url="https://www.suse.com/security/cve/CVE-2023-52738/" source="CVE"/>
		<reference ref_id="CVE-2023-52739" ref_url="https://www.suse.com/security/cve/CVE-2023-52739/" source="CVE"/>
		<reference ref_id="CVE-2023-52740" ref_url="https://www.suse.com/security/cve/CVE-2023-52740/" source="CVE"/>
		<reference ref_id="CVE-2023-52741" ref_url="https://www.suse.com/security/cve/CVE-2023-52741/" source="CVE"/>
		<reference ref_id="CVE-2023-52742" ref_url="https://www.suse.com/security/cve/CVE-2023-52742/" source="CVE"/>
		<reference ref_id="CVE-2023-52743" ref_url="https://www.suse.com/security/cve/CVE-2023-52743/" source="CVE"/>
		<reference ref_id="CVE-2023-52744" ref_url="https://www.suse.com/security/cve/CVE-2023-52744/" source="CVE"/>
		<reference ref_id="CVE-2023-52745" ref_url="https://www.suse.com/security/cve/CVE-2023-52745/" source="CVE"/>
		<reference ref_id="CVE-2023-52746" ref_url="https://www.suse.com/security/cve/CVE-2023-52746/" source="CVE"/>
		<reference ref_id="CVE-2023-52747" ref_url="https://www.suse.com/security/cve/CVE-2023-52747/" source="CVE"/>
		<reference ref_id="CVE-2023-52753" ref_url="https://www.suse.com/security/cve/CVE-2023-52753/" source="CVE"/>
		<reference ref_id="CVE-2023-52754" ref_url="https://www.suse.com/security/cve/CVE-2023-52754/" source="CVE"/>
		<reference ref_id="CVE-2023-52756" ref_url="https://www.suse.com/security/cve/CVE-2023-52756/" source="CVE"/>
		<reference ref_id="CVE-2023-52757" ref_url="https://www.suse.com/security/cve/CVE-2023-52757/" source="CVE"/>
		<reference ref_id="CVE-2023-52759" ref_url="https://www.suse.com/security/cve/CVE-2023-52759/" source="CVE"/>
		<reference ref_id="CVE-2023-52763" ref_url="https://www.suse.com/security/cve/CVE-2023-52763/" source="CVE"/>
		<reference ref_id="CVE-2023-52764" ref_url="https://www.suse.com/security/cve/CVE-2023-52764/" source="CVE"/>
		<reference ref_id="CVE-2023-52766" ref_url="https://www.suse.com/security/cve/CVE-2023-52766/" source="CVE"/>
		<reference ref_id="CVE-2023-52773" ref_url="https://www.suse.com/security/cve/CVE-2023-52773/" source="CVE"/>
		<reference ref_id="CVE-2023-52774" ref_url="https://www.suse.com/security/cve/CVE-2023-52774/" source="CVE"/>
		<reference ref_id="CVE-2023-52777" ref_url="https://www.suse.com/security/cve/CVE-2023-52777/" source="CVE"/>
		<reference ref_id="CVE-2023-52781" ref_url="https://www.suse.com/security/cve/CVE-2023-52781/" source="CVE"/>
		<reference ref_id="CVE-2023-52788" ref_url="https://www.suse.com/security/cve/CVE-2023-52788/" source="CVE"/>
		<reference ref_id="CVE-2023-52789" ref_url="https://www.suse.com/security/cve/CVE-2023-52789/" source="CVE"/>
		<reference ref_id="CVE-2023-52791" ref_url="https://www.suse.com/security/cve/CVE-2023-52791/" source="CVE"/>
		<reference ref_id="CVE-2023-52795" ref_url="https://www.suse.com/security/cve/CVE-2023-52795/" source="CVE"/>
		<reference ref_id="CVE-2023-52796" ref_url="https://www.suse.com/security/cve/CVE-2023-52796/" source="CVE"/>
		<reference ref_id="CVE-2023-52798" ref_url="https://www.suse.com/security/cve/CVE-2023-52798/" source="CVE"/>
		<reference ref_id="CVE-2023-52799" ref_url="https://www.suse.com/security/cve/CVE-2023-52799/" source="CVE"/>
		<reference ref_id="CVE-2023-52800" ref_url="https://www.suse.com/security/cve/CVE-2023-52800/" source="CVE"/>
		<reference ref_id="CVE-2023-52803" ref_url="https://www.suse.com/security/cve/CVE-2023-52803/" source="CVE"/>
		<reference ref_id="CVE-2023-52804" ref_url="https://www.suse.com/security/cve/CVE-2023-52804/" source="CVE"/>
		<reference ref_id="CVE-2023-52805" ref_url="https://www.suse.com/security/cve/CVE-2023-52805/" source="CVE"/>
		<reference ref_id="CVE-2023-52806" ref_url="https://www.suse.com/security/cve/CVE-2023-52806/" source="CVE"/>
		<reference ref_id="CVE-2023-52807" ref_url="https://www.suse.com/security/cve/CVE-2023-52807/" source="CVE"/>
		<reference ref_id="CVE-2023-52808" ref_url="https://www.suse.com/security/cve/CVE-2023-52808/" source="CVE"/>
		<reference ref_id="CVE-2023-52809" ref_url="https://www.suse.com/security/cve/CVE-2023-52809/" source="CVE"/>
		<reference ref_id="CVE-2023-52810" ref_url="https://www.suse.com/security/cve/CVE-2023-52810/" source="CVE"/>
		<reference ref_id="CVE-2023-52811" ref_url="https://www.suse.com/security/cve/CVE-2023-52811/" source="CVE"/>
		<reference ref_id="CVE-2023-52814" ref_url="https://www.suse.com/security/cve/CVE-2023-52814/" source="CVE"/>
		<reference ref_id="CVE-2023-52815" ref_url="https://www.suse.com/security/cve/CVE-2023-52815/" source="CVE"/>
		<reference ref_id="CVE-2023-52816" ref_url="https://www.suse.com/security/cve/CVE-2023-52816/" source="CVE"/>
		<reference ref_id="CVE-2023-52817" ref_url="https://www.suse.com/security/cve/CVE-2023-52817/" source="CVE"/>
		<reference ref_id="CVE-2023-52818" ref_url="https://www.suse.com/security/cve/CVE-2023-52818/" source="CVE"/>
		<reference ref_id="CVE-2023-52819" ref_url="https://www.suse.com/security/cve/CVE-2023-52819/" source="CVE"/>
		<reference ref_id="CVE-2023-52821" ref_url="https://www.suse.com/security/cve/CVE-2023-52821/" source="CVE"/>
		<reference ref_id="CVE-2023-52825" ref_url="https://www.suse.com/security/cve/CVE-2023-52825/" source="CVE"/>
		<reference ref_id="CVE-2023-52826" ref_url="https://www.suse.com/security/cve/CVE-2023-52826/" source="CVE"/>
		<reference ref_id="CVE-2023-52832" ref_url="https://www.suse.com/security/cve/CVE-2023-52832/" source="CVE"/>
		<reference ref_id="CVE-2023-52833" ref_url="https://www.suse.com/security/cve/CVE-2023-52833/" source="CVE"/>
		<reference ref_id="CVE-2023-52834" ref_url="https://www.suse.com/security/cve/CVE-2023-52834/" source="CVE"/>
		<reference ref_id="CVE-2023-52838" ref_url="https://www.suse.com/security/cve/CVE-2023-52838/" source="CVE"/>
		<reference ref_id="CVE-2023-52840" ref_url="https://www.suse.com/security/cve/CVE-2023-52840/" source="CVE"/>
		<reference ref_id="CVE-2023-52841" ref_url="https://www.suse.com/security/cve/CVE-2023-52841/" source="CVE"/>
		<reference ref_id="CVE-2023-52844" ref_url="https://www.suse.com/security/cve/CVE-2023-52844/" source="CVE"/>
		<reference ref_id="CVE-2023-52847" ref_url="https://www.suse.com/security/cve/CVE-2023-52847/" source="CVE"/>
		<reference ref_id="CVE-2023-52851" ref_url="https://www.suse.com/security/cve/CVE-2023-52851/" source="CVE"/>
		<reference ref_id="CVE-2023-52853" ref_url="https://www.suse.com/security/cve/CVE-2023-52853/" source="CVE"/>
		<reference ref_id="CVE-2023-52854" ref_url="https://www.suse.com/security/cve/CVE-2023-52854/" source="CVE"/>
		<reference ref_id="CVE-2023-52855" ref_url="https://www.suse.com/security/cve/CVE-2023-52855/" source="CVE"/>
		<reference ref_id="CVE-2023-52856" ref_url="https://www.suse.com/security/cve/CVE-2023-52856/" source="CVE"/>
		<reference ref_id="CVE-2023-52858" ref_url="https://www.suse.com/security/cve/CVE-2023-52858/" source="CVE"/>
		<reference ref_id="CVE-2023-52860" ref_url="https://www.suse.com/security/cve/CVE-2023-52860/" source="CVE"/>
		<reference ref_id="CVE-2023-52861" ref_url="https://www.suse.com/security/cve/CVE-2023-52861/" source="CVE"/>
		<reference ref_id="CVE-2023-52864" ref_url="https://www.suse.com/security/cve/CVE-2023-52864/" source="CVE"/>
		<reference ref_id="CVE-2023-52865" ref_url="https://www.suse.com/security/cve/CVE-2023-52865/" source="CVE"/>
		<reference ref_id="CVE-2023-52867" ref_url="https://www.suse.com/security/cve/CVE-2023-52867/" source="CVE"/>
		<reference ref_id="CVE-2023-52868" ref_url="https://www.suse.com/security/cve/CVE-2023-52868/" source="CVE"/>
		<reference ref_id="CVE-2023-52870" ref_url="https://www.suse.com/security/cve/CVE-2023-52870/" source="CVE"/>
		<reference ref_id="CVE-2023-52871" ref_url="https://www.suse.com/security/cve/CVE-2023-52871/" source="CVE"/>
		<reference ref_id="CVE-2023-52872" ref_url="https://www.suse.com/security/cve/CVE-2023-52872/" source="CVE"/>
		<reference ref_id="CVE-2023-52873" ref_url="https://www.suse.com/security/cve/CVE-2023-52873/" source="CVE"/>
		<reference ref_id="CVE-2023-52875" ref_url="https://www.suse.com/security/cve/CVE-2023-52875/" source="CVE"/>
		<reference ref_id="CVE-2023-52876" ref_url="https://www.suse.com/security/cve/CVE-2023-52876/" source="CVE"/>
		<reference ref_id="CVE-2023-52877" ref_url="https://www.suse.com/security/cve/CVE-2023-52877/" source="CVE"/>
		<reference ref_id="CVE-2023-52878" ref_url="https://www.suse.com/security/cve/CVE-2023-52878/" source="CVE"/>
		<reference ref_id="CVE-2023-52880" ref_url="https://www.suse.com/security/cve/CVE-2023-52880/" source="CVE"/>
		<reference ref_id="CVE-2023-6531" ref_url="https://www.suse.com/security/cve/CVE-2023-6531/" source="CVE"/>
		<reference ref_id="CVE-2024-2201" ref_url="https://www.suse.com/security/cve/CVE-2024-2201/" source="CVE"/>
		<reference ref_id="CVE-2024-26597" ref_url="https://www.suse.com/security/cve/CVE-2024-26597/" source="CVE"/>
		<reference ref_id="CVE-2024-26643" ref_url="https://www.suse.com/security/cve/CVE-2024-26643/" source="CVE"/>
		<reference ref_id="CVE-2024-26679" ref_url="https://www.suse.com/security/cve/CVE-2024-26679/" source="CVE"/>
		<reference ref_id="CVE-2024-26692" ref_url="https://www.suse.com/security/cve/CVE-2024-26692/" source="CVE"/>
		<reference ref_id="CVE-2024-26698" ref_url="https://www.suse.com/security/cve/CVE-2024-26698/" source="CVE"/>
		<reference ref_id="CVE-2024-26700" ref_url="https://www.suse.com/security/cve/CVE-2024-26700/" source="CVE"/>
		<reference ref_id="CVE-2024-26715" ref_url="https://www.suse.com/security/cve/CVE-2024-26715/" source="CVE"/>
		<reference ref_id="CVE-2024-26739" ref_url="https://www.suse.com/security/cve/CVE-2024-26739/" source="CVE"/>
		<reference ref_id="CVE-2024-26742" ref_url="https://www.suse.com/security/cve/CVE-2024-26742/" source="CVE"/>
		<reference ref_id="CVE-2024-26748" ref_url="https://www.suse.com/security/cve/CVE-2024-26748/" source="CVE"/>
		<reference ref_id="CVE-2024-26758" ref_url="https://www.suse.com/security/cve/CVE-2024-26758/" source="CVE"/>
		<reference ref_id="CVE-2024-26764" ref_url="https://www.suse.com/security/cve/CVE-2024-26764/" source="CVE"/>
		<reference ref_id="CVE-2024-26775" ref_url="https://www.suse.com/security/cve/CVE-2024-26775/" source="CVE"/>
		<reference ref_id="CVE-2024-26777" ref_url="https://www.suse.com/security/cve/CVE-2024-26777/" source="CVE"/>
		<reference ref_id="CVE-2024-26778" ref_url="https://www.suse.com/security/cve/CVE-2024-26778/" source="CVE"/>
		<reference ref_id="CVE-2024-26788" ref_url="https://www.suse.com/security/cve/CVE-2024-26788/" source="CVE"/>
		<reference ref_id="CVE-2024-26791" ref_url="https://www.suse.com/security/cve/CVE-2024-26791/" source="CVE"/>
		<reference ref_id="CVE-2024-26801" ref_url="https://www.suse.com/security/cve/CVE-2024-26801/" source="CVE"/>
		<reference ref_id="CVE-2024-26822" ref_url="https://www.suse.com/security/cve/CVE-2024-26822/" source="CVE"/>
		<reference ref_id="CVE-2024-26828" ref_url="https://www.suse.com/security/cve/CVE-2024-26828/" source="CVE"/>
		<reference ref_id="CVE-2024-26829" ref_url="https://www.suse.com/security/cve/CVE-2024-26829/" source="CVE"/>
		<reference ref_id="CVE-2024-26838" ref_url="https://www.suse.com/security/cve/CVE-2024-26838/" source="CVE"/>
		<reference ref_id="CVE-2024-26839" ref_url="https://www.suse.com/security/cve/CVE-2024-26839/" source="CVE"/>
		<reference ref_id="CVE-2024-26840" ref_url="https://www.suse.com/security/cve/CVE-2024-26840/" source="CVE"/>
		<reference ref_id="CVE-2024-26846" ref_url="https://www.suse.com/security/cve/CVE-2024-26846/" source="CVE"/>
		<reference ref_id="CVE-2024-26859" ref_url="https://www.suse.com/security/cve/CVE-2024-26859/" source="CVE"/>
		<reference ref_id="CVE-2024-26870" ref_url="https://www.suse.com/security/cve/CVE-2024-26870/" source="CVE"/>
		<reference ref_id="CVE-2024-26874" ref_url="https://www.suse.com/security/cve/CVE-2024-26874/" source="CVE"/>
		<reference ref_id="CVE-2024-26876" ref_url="https://www.suse.com/security/cve/CVE-2024-26876/" source="CVE"/>
		<reference ref_id="CVE-2024-26877" ref_url="https://www.suse.com/security/cve/CVE-2024-26877/" source="CVE"/>
		<reference ref_id="CVE-2024-26880" ref_url="https://www.suse.com/security/cve/CVE-2024-26880/" source="CVE"/>
		<reference ref_id="CVE-2024-26889" ref_url="https://www.suse.com/security/cve/CVE-2024-26889/" source="CVE"/>
		<reference ref_id="CVE-2024-26894" ref_url="https://www.suse.com/security/cve/CVE-2024-26894/" source="CVE"/>
		<reference ref_id="CVE-2024-26900" ref_url="https://www.suse.com/security/cve/CVE-2024-26900/" source="CVE"/>
		<reference ref_id="CVE-2024-26907" ref_url="https://www.suse.com/security/cve/CVE-2024-26907/" source="CVE"/>
		<reference ref_id="CVE-2024-26915" ref_url="https://www.suse.com/security/cve/CVE-2024-26915/" source="CVE"/>
		<reference ref_id="CVE-2024-26916" ref_url="https://www.suse.com/security/cve/CVE-2024-26916/" source="CVE"/>
		<reference ref_id="CVE-2024-26919" ref_url="https://www.suse.com/security/cve/CVE-2024-26919/" source="CVE"/>
		<reference ref_id="CVE-2024-26920" ref_url="https://www.suse.com/security/cve/CVE-2024-26920/" source="CVE"/>
		<reference ref_id="CVE-2024-26921" ref_url="https://www.suse.com/security/cve/CVE-2024-26921/" source="CVE"/>
		<reference ref_id="CVE-2024-26922" ref_url="https://www.suse.com/security/cve/CVE-2024-26922/" source="CVE"/>
		<reference ref_id="CVE-2024-26925" ref_url="https://www.suse.com/security/cve/CVE-2024-26925/" source="CVE"/>
		<reference ref_id="CVE-2024-26928" ref_url="https://www.suse.com/security/cve/CVE-2024-26928/" source="CVE"/>
		<reference ref_id="CVE-2024-26929" ref_url="https://www.suse.com/security/cve/CVE-2024-26929/" source="CVE"/>
		<reference ref_id="CVE-2024-26930" ref_url="https://www.suse.com/security/cve/CVE-2024-26930/" source="CVE"/>
		<reference ref_id="CVE-2024-26931" ref_url="https://www.suse.com/security/cve/CVE-2024-26931/" source="CVE"/>
		<reference ref_id="CVE-2024-26933" ref_url="https://www.suse.com/security/cve/CVE-2024-26933/" source="CVE"/>
		<reference ref_id="CVE-2024-26934" ref_url="https://www.suse.com/security/cve/CVE-2024-26934/" source="CVE"/>
		<reference ref_id="CVE-2024-26935" ref_url="https://www.suse.com/security/cve/CVE-2024-26935/" source="CVE"/>
		<reference ref_id="CVE-2024-26937" ref_url="https://www.suse.com/security/cve/CVE-2024-26937/" source="CVE"/>
		<reference ref_id="CVE-2024-26938" ref_url="https://www.suse.com/security/cve/CVE-2024-26938/" source="CVE"/>
		<reference ref_id="CVE-2024-26939" ref_url="https://www.suse.com/security/cve/CVE-2024-26939/" source="CVE"/>
		<reference ref_id="CVE-2024-26940" ref_url="https://www.suse.com/security/cve/CVE-2024-26940/" source="CVE"/>
		<reference ref_id="CVE-2024-26943" ref_url="https://www.suse.com/security/cve/CVE-2024-26943/" source="CVE"/>
		<reference ref_id="CVE-2024-26957" ref_url="https://www.suse.com/security/cve/CVE-2024-26957/" source="CVE"/>
		<reference ref_id="CVE-2024-26958" ref_url="https://www.suse.com/security/cve/CVE-2024-26958/" source="CVE"/>
		<reference ref_id="CVE-2024-26964" ref_url="https://www.suse.com/security/cve/CVE-2024-26964/" source="CVE"/>
		<reference ref_id="CVE-2024-26974" ref_url="https://www.suse.com/security/cve/CVE-2024-26974/" source="CVE"/>
		<reference ref_id="CVE-2024-26977" ref_url="https://www.suse.com/security/cve/CVE-2024-26977/" source="CVE"/>
		<reference ref_id="CVE-2024-26979" ref_url="https://www.suse.com/security/cve/CVE-2024-26979/" source="CVE"/>
		<reference ref_id="CVE-2024-26984" ref_url="https://www.suse.com/security/cve/CVE-2024-26984/" source="CVE"/>
		<reference ref_id="CVE-2024-26988" ref_url="https://www.suse.com/security/cve/CVE-2024-26988/" source="CVE"/>
		<reference ref_id="CVE-2024-26989" ref_url="https://www.suse.com/security/cve/CVE-2024-26989/" source="CVE"/>
		<reference ref_id="CVE-2024-26994" ref_url="https://www.suse.com/security/cve/CVE-2024-26994/" source="CVE"/>
		<reference ref_id="CVE-2024-26996" ref_url="https://www.suse.com/security/cve/CVE-2024-26996/" source="CVE"/>
		<reference ref_id="CVE-2024-26997" ref_url="https://www.suse.com/security/cve/CVE-2024-26997/" source="CVE"/>
		<reference ref_id="CVE-2024-26999" ref_url="https://www.suse.com/security/cve/CVE-2024-26999/" source="CVE"/>
		<reference ref_id="CVE-2024-27000" ref_url="https://www.suse.com/security/cve/CVE-2024-27000/" source="CVE"/>
		<reference ref_id="CVE-2024-27001" ref_url="https://www.suse.com/security/cve/CVE-2024-27001/" source="CVE"/>
		<reference ref_id="CVE-2024-27004" ref_url="https://www.suse.com/security/cve/CVE-2024-27004/" source="CVE"/>
		<reference ref_id="CVE-2024-27008" ref_url="https://www.suse.com/security/cve/CVE-2024-27008/" source="CVE"/>
		<reference ref_id="CVE-2024-27028" ref_url="https://www.suse.com/security/cve/CVE-2024-27028/" source="CVE"/>
		<reference ref_id="CVE-2024-27037" ref_url="https://www.suse.com/security/cve/CVE-2024-27037/" source="CVE"/>
		<reference ref_id="CVE-2024-27042" ref_url="https://www.suse.com/security/cve/CVE-2024-27042/" source="CVE"/>
		<reference ref_id="CVE-2024-27045" ref_url="https://www.suse.com/security/cve/CVE-2024-27045/" source="CVE"/>
		<reference ref_id="CVE-2024-27047" ref_url="https://www.suse.com/security/cve/CVE-2024-27047/" source="CVE"/>
		<reference ref_id="CVE-2024-27051" ref_url="https://www.suse.com/security/cve/CVE-2024-27051/" source="CVE"/>
		<reference ref_id="CVE-2024-27052" ref_url="https://www.suse.com/security/cve/CVE-2024-27052/" source="CVE"/>
		<reference ref_id="CVE-2024-27053" ref_url="https://www.suse.com/security/cve/CVE-2024-27053/" source="CVE"/>
		<reference ref_id="CVE-2024-27054" ref_url="https://www.suse.com/security/cve/CVE-2024-27054/" source="CVE"/>
		<reference ref_id="CVE-2024-27059" ref_url="https://www.suse.com/security/cve/CVE-2024-27059/" source="CVE"/>
		<reference ref_id="CVE-2024-27072" ref_url="https://www.suse.com/security/cve/CVE-2024-27072/" source="CVE"/>
		<reference ref_id="CVE-2024-27073" ref_url="https://www.suse.com/security/cve/CVE-2024-27073/" source="CVE"/>
		<reference ref_id="CVE-2024-27074" ref_url="https://www.suse.com/security/cve/CVE-2024-27074/" source="CVE"/>
		<reference ref_id="CVE-2024-27075" ref_url="https://www.suse.com/security/cve/CVE-2024-27075/" source="CVE"/>
		<reference ref_id="CVE-2024-27076" ref_url="https://www.suse.com/security/cve/CVE-2024-27076/" source="CVE"/>
		<reference ref_id="CVE-2024-27077" ref_url="https://www.suse.com/security/cve/CVE-2024-27077/" source="CVE"/>
		<reference ref_id="CVE-2024-27078" ref_url="https://www.suse.com/security/cve/CVE-2024-27078/" source="CVE"/>
		<reference ref_id="CVE-2024-27388" ref_url="https://www.suse.com/security/cve/CVE-2024-27388/" source="CVE"/>
		<reference ref_id="CVE-2024-27393" ref_url="https://www.suse.com/security/cve/CVE-2024-27393/" source="CVE"/>
		<reference ref_id="CVE-2024-27395" ref_url="https://www.suse.com/security/cve/CVE-2024-27395/" source="CVE"/>
		<reference ref_id="CVE-2024-27396" ref_url="https://www.suse.com/security/cve/CVE-2024-27396/" source="CVE"/>
		<reference ref_id="CVE-2024-27398" ref_url="https://www.suse.com/security/cve/CVE-2024-27398/" source="CVE"/>
		<reference ref_id="CVE-2024-27399" ref_url="https://www.suse.com/security/cve/CVE-2024-27399/" source="CVE"/>
		<reference ref_id="CVE-2024-27400" ref_url="https://www.suse.com/security/cve/CVE-2024-27400/" source="CVE"/>
		<reference ref_id="CVE-2024-27401" ref_url="https://www.suse.com/security/cve/CVE-2024-27401/" source="CVE"/>
		<reference ref_id="CVE-2024-27405" ref_url="https://www.suse.com/security/cve/CVE-2024-27405/" source="CVE"/>
		<reference ref_id="CVE-2024-27410" ref_url="https://www.suse.com/security/cve/CVE-2024-27410/" source="CVE"/>
		<reference ref_id="CVE-2024-27412" ref_url="https://www.suse.com/security/cve/CVE-2024-27412/" source="CVE"/>
		<reference ref_id="CVE-2024-27413" ref_url="https://www.suse.com/security/cve/CVE-2024-27413/" source="CVE"/>
		<reference ref_id="CVE-2024-27416" ref_url="https://www.suse.com/security/cve/CVE-2024-27416/" source="CVE"/>
		<reference ref_id="CVE-2024-27417" ref_url="https://www.suse.com/security/cve/CVE-2024-27417/" source="CVE"/>
		<reference ref_id="CVE-2024-27419" ref_url="https://www.suse.com/security/cve/CVE-2024-27419/" source="CVE"/>
		<reference ref_id="CVE-2024-27431" ref_url="https://www.suse.com/security/cve/CVE-2024-27431/" source="CVE"/>
		<reference ref_id="CVE-2024-27435" ref_url="https://www.suse.com/security/cve/CVE-2024-27435/" source="CVE"/>
		<reference ref_id="CVE-2024-27436" ref_url="https://www.suse.com/security/cve/CVE-2024-27436/" source="CVE"/>
		<reference ref_id="CVE-2024-35789" ref_url="https://www.suse.com/security/cve/CVE-2024-35789/" source="CVE"/>
		<reference ref_id="CVE-2024-35791" ref_url="https://www.suse.com/security/cve/CVE-2024-35791/" source="CVE"/>
		<reference ref_id="CVE-2024-35796" ref_url="https://www.suse.com/security/cve/CVE-2024-35796/" source="CVE"/>
		<reference ref_id="CVE-2024-35799" ref_url="https://www.suse.com/security/cve/CVE-2024-35799/" source="CVE"/>
		<reference ref_id="CVE-2024-35801" ref_url="https://www.suse.com/security/cve/CVE-2024-35801/" source="CVE"/>
		<reference ref_id="CVE-2024-35804" ref_url="https://www.suse.com/security/cve/CVE-2024-35804/" source="CVE"/>
		<reference ref_id="CVE-2024-35806" ref_url="https://www.suse.com/security/cve/CVE-2024-35806/" source="CVE"/>
		<reference ref_id="CVE-2024-35809" ref_url="https://www.suse.com/security/cve/CVE-2024-35809/" source="CVE"/>
		<reference ref_id="CVE-2024-35811" ref_url="https://www.suse.com/security/cve/CVE-2024-35811/" source="CVE"/>
		<reference ref_id="CVE-2024-35812" ref_url="https://www.suse.com/security/cve/CVE-2024-35812/" source="CVE"/>
		<reference ref_id="CVE-2024-35813" ref_url="https://www.suse.com/security/cve/CVE-2024-35813/" source="CVE"/>
		<reference ref_id="CVE-2024-35815" ref_url="https://www.suse.com/security/cve/CVE-2024-35815/" source="CVE"/>
		<reference ref_id="CVE-2024-35817" ref_url="https://www.suse.com/security/cve/CVE-2024-35817/" source="CVE"/>
		<reference ref_id="CVE-2024-35821" ref_url="https://www.suse.com/security/cve/CVE-2024-35821/" source="CVE"/>
		<reference ref_id="CVE-2024-35822" ref_url="https://www.suse.com/security/cve/CVE-2024-35822/" source="CVE"/>
		<reference ref_id="CVE-2024-35823" ref_url="https://www.suse.com/security/cve/CVE-2024-35823/" source="CVE"/>
		<reference ref_id="CVE-2024-35825" ref_url="https://www.suse.com/security/cve/CVE-2024-35825/" source="CVE"/>
		<reference ref_id="CVE-2024-35828" ref_url="https://www.suse.com/security/cve/CVE-2024-35828/" source="CVE"/>
		<reference ref_id="CVE-2024-35829" ref_url="https://www.suse.com/security/cve/CVE-2024-35829/" source="CVE"/>
		<reference ref_id="CVE-2024-35830" ref_url="https://www.suse.com/security/cve/CVE-2024-35830/" source="CVE"/>
		<reference ref_id="CVE-2024-35833" ref_url="https://www.suse.com/security/cve/CVE-2024-35833/" source="CVE"/>
		<reference ref_id="CVE-2024-35845" ref_url="https://www.suse.com/security/cve/CVE-2024-35845/" source="CVE"/>
		<reference ref_id="CVE-2024-35847" ref_url="https://www.suse.com/security/cve/CVE-2024-35847/" source="CVE"/>
		<reference ref_id="CVE-2024-35849" ref_url="https://www.suse.com/security/cve/CVE-2024-35849/" source="CVE"/>
		<reference ref_id="CVE-2024-35851" ref_url="https://www.suse.com/security/cve/CVE-2024-35851/" source="CVE"/>
		<reference ref_id="CVE-2024-35852" ref_url="https://www.suse.com/security/cve/CVE-2024-35852/" source="CVE"/>
		<reference ref_id="CVE-2024-35854" ref_url="https://www.suse.com/security/cve/CVE-2024-35854/" source="CVE"/>
		<reference ref_id="CVE-2024-35860" ref_url="https://www.suse.com/security/cve/CVE-2024-35860/" source="CVE"/>
		<reference ref_id="CVE-2024-35861" ref_url="https://www.suse.com/security/cve/CVE-2024-35861/" source="CVE"/>
		<reference ref_id="CVE-2024-35862" ref_url="https://www.suse.com/security/cve/CVE-2024-35862/" source="CVE"/>
		<reference ref_id="CVE-2024-35863" ref_url="https://www.suse.com/security/cve/CVE-2024-35863/" source="CVE"/>
		<reference ref_id="CVE-2024-35864" ref_url="https://www.suse.com/security/cve/CVE-2024-35864/" source="CVE"/>
		<reference ref_id="CVE-2024-35865" ref_url="https://www.suse.com/security/cve/CVE-2024-35865/" source="CVE"/>
		<reference ref_id="CVE-2024-35866" ref_url="https://www.suse.com/security/cve/CVE-2024-35866/" source="CVE"/>
		<reference ref_id="CVE-2024-35867" ref_url="https://www.suse.com/security/cve/CVE-2024-35867/" source="CVE"/>
		<reference ref_id="CVE-2024-35868" ref_url="https://www.suse.com/security/cve/CVE-2024-35868/" source="CVE"/>
		<reference ref_id="CVE-2024-35869" ref_url="https://www.suse.com/security/cve/CVE-2024-35869/" source="CVE"/>
		<reference ref_id="CVE-2024-35870" ref_url="https://www.suse.com/security/cve/CVE-2024-35870/" source="CVE"/>
		<reference ref_id="CVE-2024-35872" ref_url="https://www.suse.com/security/cve/CVE-2024-35872/" source="CVE"/>
		<reference ref_id="CVE-2024-35875" ref_url="https://www.suse.com/security/cve/CVE-2024-35875/" source="CVE"/>
		<reference ref_id="CVE-2024-35877" ref_url="https://www.suse.com/security/cve/CVE-2024-35877/" source="CVE"/>
		<reference ref_id="CVE-2024-35878" ref_url="https://www.suse.com/security/cve/CVE-2024-35878/" source="CVE"/>
		<reference ref_id="CVE-2024-35879" ref_url="https://www.suse.com/security/cve/CVE-2024-35879/" source="CVE"/>
		<reference ref_id="CVE-2024-35885" ref_url="https://www.suse.com/security/cve/CVE-2024-35885/" source="CVE"/>
		<reference ref_id="CVE-2024-35887" ref_url="https://www.suse.com/security/cve/CVE-2024-35887/" source="CVE"/>
		<reference ref_id="CVE-2024-35895" ref_url="https://www.suse.com/security/cve/CVE-2024-35895/" source="CVE"/>
		<reference ref_id="CVE-2024-35901" ref_url="https://www.suse.com/security/cve/CVE-2024-35901/" source="CVE"/>
		<reference ref_id="CVE-2024-35904" ref_url="https://www.suse.com/security/cve/CVE-2024-35904/" source="CVE"/>
		<reference ref_id="CVE-2024-35905" ref_url="https://www.suse.com/security/cve/CVE-2024-35905/" source="CVE"/>
		<reference ref_id="CVE-2024-35907" ref_url="https://www.suse.com/security/cve/CVE-2024-35907/" source="CVE"/>
		<reference ref_id="CVE-2024-35912" ref_url="https://www.suse.com/security/cve/CVE-2024-35912/" source="CVE"/>
		<reference ref_id="CVE-2024-35914" ref_url="https://www.suse.com/security/cve/CVE-2024-35914/" source="CVE"/>
		<reference ref_id="CVE-2024-35915" ref_url="https://www.suse.com/security/cve/CVE-2024-35915/" source="CVE"/>
		<reference ref_id="CVE-2024-35922" ref_url="https://www.suse.com/security/cve/CVE-2024-35922/" source="CVE"/>
		<reference ref_id="CVE-2024-35924" ref_url="https://www.suse.com/security/cve/CVE-2024-35924/" source="CVE"/>
		<reference ref_id="CVE-2024-35930" ref_url="https://www.suse.com/security/cve/CVE-2024-35930/" source="CVE"/>
		<reference ref_id="CVE-2024-35932" ref_url="https://www.suse.com/security/cve/CVE-2024-35932/" source="CVE"/>
		<reference ref_id="CVE-2024-35933" ref_url="https://www.suse.com/security/cve/CVE-2024-35933/" source="CVE"/>
		<reference ref_id="CVE-2024-35935" ref_url="https://www.suse.com/security/cve/CVE-2024-35935/" source="CVE"/>
		<reference ref_id="CVE-2024-35936" ref_url="https://www.suse.com/security/cve/CVE-2024-35936/" source="CVE"/>
		<reference ref_id="CVE-2024-35938" ref_url="https://www.suse.com/security/cve/CVE-2024-35938/" source="CVE"/>
		<reference ref_id="CVE-2024-35939" ref_url="https://www.suse.com/security/cve/CVE-2024-35939/" source="CVE"/>
		<reference ref_id="CVE-2024-35940" ref_url="https://www.suse.com/security/cve/CVE-2024-35940/" source="CVE"/>
		<reference ref_id="CVE-2024-35943" ref_url="https://www.suse.com/security/cve/CVE-2024-35943/" source="CVE"/>
		<reference ref_id="CVE-2024-35944" ref_url="https://www.suse.com/security/cve/CVE-2024-35944/" source="CVE"/>
		<reference ref_id="CVE-2024-35947" ref_url="https://www.suse.com/security/cve/CVE-2024-35947/" source="CVE"/>
		<reference ref_id="CVE-2024-35950" ref_url="https://www.suse.com/security/cve/CVE-2024-35950/" source="CVE"/>
		<reference ref_id="CVE-2024-35951" ref_url="https://www.suse.com/security/cve/CVE-2024-35951/" source="CVE"/>
		<reference ref_id="CVE-2024-35952" ref_url="https://www.suse.com/security/cve/CVE-2024-35952/" source="CVE"/>
		<reference ref_id="CVE-2024-35955" ref_url="https://www.suse.com/security/cve/CVE-2024-35955/" source="CVE"/>
		<reference ref_id="CVE-2024-35959" ref_url="https://www.suse.com/security/cve/CVE-2024-35959/" source="CVE"/>
		<reference ref_id="CVE-2024-35963" ref_url="https://www.suse.com/security/cve/CVE-2024-35963/" source="CVE"/>
		<reference ref_id="CVE-2024-35964" ref_url="https://www.suse.com/security/cve/CVE-2024-35964/" source="CVE"/>
		<reference ref_id="CVE-2024-35965" ref_url="https://www.suse.com/security/cve/CVE-2024-35965/" source="CVE"/>
		<reference ref_id="CVE-2024-35966" ref_url="https://www.suse.com/security/cve/CVE-2024-35966/" source="CVE"/>
		<reference ref_id="CVE-2024-35967" ref_url="https://www.suse.com/security/cve/CVE-2024-35967/" source="CVE"/>
		<reference ref_id="CVE-2024-35969" ref_url="https://www.suse.com/security/cve/CVE-2024-35969/" source="CVE"/>
		<reference ref_id="CVE-2024-35973" ref_url="https://www.suse.com/security/cve/CVE-2024-35973/" source="CVE"/>
		<reference ref_id="CVE-2024-35976" ref_url="https://www.suse.com/security/cve/CVE-2024-35976/" source="CVE"/>
		<reference ref_id="CVE-2024-35978" ref_url="https://www.suse.com/security/cve/CVE-2024-35978/" source="CVE"/>
		<reference ref_id="CVE-2024-35982" ref_url="https://www.suse.com/security/cve/CVE-2024-35982/" source="CVE"/>
		<reference ref_id="CVE-2024-35984" ref_url="https://www.suse.com/security/cve/CVE-2024-35984/" source="CVE"/>
		<reference ref_id="CVE-2024-35989" ref_url="https://www.suse.com/security/cve/CVE-2024-35989/" source="CVE"/>
		<reference ref_id="CVE-2024-35990" ref_url="https://www.suse.com/security/cve/CVE-2024-35990/" source="CVE"/>
		<reference ref_id="CVE-2024-35998" ref_url="https://www.suse.com/security/cve/CVE-2024-35998/" source="CVE"/>
		<reference ref_id="CVE-2024-35999" ref_url="https://www.suse.com/security/cve/CVE-2024-35999/" source="CVE"/>
		<reference ref_id="CVE-2024-36006" ref_url="https://www.suse.com/security/cve/CVE-2024-36006/" source="CVE"/>
		<reference ref_id="CVE-2024-36007" ref_url="https://www.suse.com/security/cve/CVE-2024-36007/" source="CVE"/>
		<reference ref_id="CVE-2024-36012" ref_url="https://www.suse.com/security/cve/CVE-2024-36012/" source="CVE"/>
		<reference ref_id="CVE-2024-36014" ref_url="https://www.suse.com/security/cve/CVE-2024-36014/" source="CVE"/>
		<reference ref_id="CVE-2024-36015" ref_url="https://www.suse.com/security/cve/CVE-2024-36015/" source="CVE"/>
		<reference ref_id="CVE-2024-36016" ref_url="https://www.suse.com/security/cve/CVE-2024-36016/" source="CVE"/>
		<reference ref_id="CVE-2024-36026" ref_url="https://www.suse.com/security/cve/CVE-2024-36026/" source="CVE"/>
		<reference ref_id="CVE-2024-36029" ref_url="https://www.suse.com/security/cve/CVE-2024-36029/" source="CVE"/>
		<reference ref_id="CVE-2024-36032" ref_url="https://www.suse.com/security/cve/CVE-2024-36032/" source="CVE"/>
		<reference ref_id="CVE-2024-36880" ref_url="https://www.suse.com/security/cve/CVE-2024-36880/" source="CVE"/>
		<reference ref_id="CVE-2024-36893" ref_url="https://www.suse.com/security/cve/CVE-2024-36893/" source="CVE"/>
		<reference ref_id="CVE-2024-36896" ref_url="https://www.suse.com/security/cve/CVE-2024-36896/" source="CVE"/>
		<reference ref_id="CVE-2024-36897" ref_url="https://www.suse.com/security/cve/CVE-2024-36897/" source="CVE"/>
		<reference ref_id="CVE-2024-36906" ref_url="https://www.suse.com/security/cve/CVE-2024-36906/" source="CVE"/>
		<reference ref_id="CVE-2024-36918" ref_url="https://www.suse.com/security/cve/CVE-2024-36918/" source="CVE"/>
		<reference ref_id="CVE-2024-36924" ref_url="https://www.suse.com/security/cve/CVE-2024-36924/" source="CVE"/>
		<reference ref_id="CVE-2024-36926" ref_url="https://www.suse.com/security/cve/CVE-2024-36926/" source="CVE"/>
		<reference ref_id="CVE-2024-36928" ref_url="https://www.suse.com/security/cve/CVE-2024-36928/" source="CVE"/>
		<reference ref_id="CVE-2024-36931" ref_url="https://www.suse.com/security/cve/CVE-2024-36931/" source="CVE"/>
		<reference ref_id="CVE-2024-36938" ref_url="https://www.suse.com/security/cve/CVE-2024-36938/" source="CVE"/>
		<reference ref_id="CVE-2024-36940" ref_url="https://www.suse.com/security/cve/CVE-2024-36940/" source="CVE"/>
		<reference ref_id="CVE-2024-36941" ref_url="https://www.suse.com/security/cve/CVE-2024-36941/" source="CVE"/>
		<reference ref_id="CVE-2024-36942" ref_url="https://www.suse.com/security/cve/CVE-2024-36942/" source="CVE"/>
		<reference ref_id="CVE-2024-36944" ref_url="https://www.suse.com/security/cve/CVE-2024-36944/" source="CVE"/>
		<reference ref_id="CVE-2024-36947" ref_url="https://www.suse.com/security/cve/CVE-2024-36947/" source="CVE"/>
		<reference ref_id="CVE-2024-36950" ref_url="https://www.suse.com/security/cve/CVE-2024-36950/" source="CVE"/>
		<reference ref_id="CVE-2024-36952" ref_url="https://www.suse.com/security/cve/CVE-2024-36952/" source="CVE"/>
		<reference ref_id="CVE-2024-36955" ref_url="https://www.suse.com/security/cve/CVE-2024-36955/" source="CVE"/>
		<reference ref_id="CVE-2024-36959" ref_url="https://www.suse.com/security/cve/CVE-2024-36959/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506)
- CVE-2022-48689: Fixed data-race in lru_add_fn (bsc#1223959)
- CVE-2022-48691: Fixed memory leak in netfilter (bsc#1223961)
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).
- CVE-2023-42755: Check user supplied offsets (bsc#1215702).
- CVE-2023-52586: Fixed  mutex lock in control vblank irq (bsc#1221081).
- CVE-2023-52618: Fixed string overflow in block/rnbd-srv (bsc#1221615).
- CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187).
- CVE-2023-52660: Fiedx IRQ handling due to shared interrupts  (bsc#1224443).
- CVE-2023-52664: Eliminate double free in error handling logic  (bsc#1224747).
- CVE-2023-52671: Fixed hang/underflow when transitioning to ODM4:1 (bsc#1224729).
- CVE-2023-52674: Add clamp() in scarlett2_mixer_ctl_put()  (bsc#1224727).
- CVE-2023-52680: Fixed missing error checks to *_ctl_get()  (bsc#1224608).
- CVE-2023-52692: Fixed missing error check to  scarlett2_usb_set_config() (bsc#1224628).
- CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass()  (CVE-2023-52698 bsc#1224621)
- CVE-2023-52746: Prevent potential spectre v1 gadget in xfrm_xlate32_attr()  (bsc#1225114)
- CVE-2023-52757: Fixed potential deadlock when releasing mids  (bsc#1225548).
- CVE-2023-52795: Fixed use after free in vhost_vdpa_probe()  (bsc#1225085).
- CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
- CVE-2023-52807: Fixed out-of-bounds access may occur when coalesce  info is read via debugfs (bsc#1225097).
- CVE-2023-52860: Fixed null pointer dereference in hisi_hns3 (bsc#1224936).
- CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
- CVE-2024-26643: Fixed mark set as dead when unbinding anonymous  set with timeout (bsc#1221829).
- CVE-2024-26679: Fixed read sk-&gt;sk_family once in inet_recv_error() (bsc#1222385).
- CVE-2024-26692: Fixed regression in writes when non-standard maximum write  size negotiated (bsc#1222464).
- CVE-2024-26715: Fixed NULL pointer dereference in  dwc3_gadget_suspend (bsc#1222561).
- CVE-2024-26742: Fixed disable_managed_interrupts (git-fixes  bsc#1222608).
- CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).
- CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793)
- CVE-2024-26822: Set correct id, uid and cruid for multiuser  automounts (bsc#1223011).
- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).
- CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119).
- CVE-2024-26900: Fixed kmemleak of rdev-&gt;serial (bsc#1223046).
- CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)
- CVE-2024-26919: Fixed debugfs directory leak (bsc#1223847).
- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
- CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path (bsc#1223390).
- CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show() (bsc#1223532).
- CVE-2024-26939: Fixed UAF on destroy against retire race (bsc#1223679).
- CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).
- CVE-2024-27042: Fixed potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()' (bsc#1223823).
- CVE-2024-27395: Fixed Use-After-Free in ovs_ct_exit (bsc#1224098).
- CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).
- CVE-2024-27401: Fixed user_length taken into account when  fetching packet contents (bsc#1224181).
- CVE-2024-27417: Fixed potential 'struct net' leak in inet6_rtm_getaddr()  (bsc#1224721)
- CVE-2024-27419: Fixed data-races around sysctl_net_busy_read  (bsc#1224759)
- CVE-2024-27431: Fixed Zero-initialise xdp_rxq_info struct before running  XDP program (bsc#1224718).
- CVE-2024-35791: Flush pages under kvm-&gt;lock to fix UAF in  svm_register_enc_region() (bsc#1224725).
- CVE-2024-35799: Prevent crash when disable stream (bsc#1224740).
- CVE-2024-35804: Mark target gfn of emulated atomic instruction as  dirty (bsc#1224638).
- CVE-2024-35852: Fixed memory leak when canceling rehash  work (bsc#1224502).
- CVE-2024-35854: Fixed possible use-after-free during  rehash (bsc#1224636).
- CVE-2024-35860: struct bpf_link and bpf_link_ops kABI workaround  (bsc#1224531).
- CVE-2024-35861: Fixed potential UAF in  cifs_signal_cifsd_for_reconnect() (bsc#1224766).
- CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()  (bsc#1224764).
- CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1224763).
- CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()  (bsc#1224765).
- CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break()  (bsc#1224668).
- CVE-2024-35866: Fixed potential UAF in cifs_dump_full_key()  (bsc#1224667).
- CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664).
- CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write() (bsc#1224678).
- CVE-2024-35869: Guarantee refcounted children from parent session  (bsc#1224679).
- CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224672).
- CVE-2024-35872: Fixed GUP-fast succeeding on secretmem folios  (bsc#1224530).
- CVE-2024-35875: Require seeding RNG with RDRAND on CoCo systems (bsc#1224665).
- CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).
- CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf()  (bsc#1224671).
- CVE-2024-35879: kABI workaround for drivers/of/dynamic.c (bsc#1224524).
- CVE-2024-35885: Stop interface during shutdown (bsc#1224519).
- CVE-2024-35904: Fixed dereference of garbage after mount failure (bsc#1224494).
- CVE-2024-35905: Fixed int overflow for stack access size  (bsc#1224488).
- CVE-2024-35907: Call request_irq() after NAPI initialized  (bsc#1224492).
- CVE-2024-35924: Limit read size on v1.2 (bsc#1224657).
- CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure (bsc#1224535).
- CVE-2024-35943: Fixed a null pointer dereference in omap_prm_domain_init (bsc#1224649).
- CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host()  (bsc#1224648).
- CVE-2024-35951: Fixed the error path in panfrost_mmu_map_fault_addr() (bsc#1224701).
- CVE-2024-35959: Fixed mlx5e_priv_init() cleanup flow (bsc#1224666).
- CVE-2024-35964: Fixed not validating setsockopt user input  (bsc#1224581).
- CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr  (bsc#1224580).
- CVE-2024-35973: Fixed header validation in geneve[6]_xmit_skb  (bsc#1224586).
- CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING  (bsc#1224575).
- CVE-2024-35998: Fixed lock ordering potential deadlock in  cifs_sync_mid_result (bsc#1224549).
- CVE-2024-35999: Fixed missing lock when picking channel (bsc#1224550).
- CVE-2024-36006: Fixed incorrect list API usage  (bsc#1224541).
- CVE-2024-36007: Fixed warning during rehash  (bsc#1224543).
- CVE-2024-36938: Fixed NULL pointer dereference in  sk_psock_skb_ingress_enqueue (bsc#1225761).

The following non-security bugs were fixed:

- 9p: explicitly deny setlease attempts (git-fixes).
- ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes).
- ACPI: disable -Wstringop-truncation (git-fixes).
- ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes).
- ACPI: LPSS: Advertise number of chip selects via property (git-fixes).
- admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET (git-fixes).
- af_unix: annote lockless accesses to unix_tot_inflight &amp; gc_in_progress (bsc#1223384).
- af_unix: Do not use atomic ops for unix_sk(sk)-&gt;inflight (bsc#1223384).
- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
- ALSA: core: Fix NULL module pointer assignment at card init (git-fixes).
- ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes).
- ALSA: line6: Zero-initialize message buffers (stable-fixes).
- ARM: 9381/1: kasan: clear stale stack poison (git-fixes).
- ASoC: Intel: avs: Fix ASRC module initialization (git-fixes).
- ASoC: Intel: avs: Fix potential integer overflow (git-fixes).
- ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes).
- ASoC: Intel: Disable route checks for Skylake boards (git-fixes).
- ASoC: kirkwood: Fix potential NULL dereference (git-fixes).
- ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes).
- ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes).
- ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes).
- ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes).
- ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).
- ata: pata_legacy: make legacy_exit() work again (git-fixes).
- ata: sata_gemini: Check clk_enable() result (stable-fixes).
- autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166).
- Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes).
- Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor() (git-fixes).
- Bluetooth: hci_sync: Do not double print name in add/remove adv_monitor (bsc#1216358).
- Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes).
- Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes).
- Bluetooth: qca: add missing firmware sanity checks (git-fixes).
- Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes).
- Bluetooth: qca: fix firmware check error path (git-fixes).
- Bluetooth: qca: fix info leak when fetching fw build id (git-fixes).
- Bluetooth: qca: fix NVM configuration parsing (git-fixes).
- bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git-fixes)
- bpf: decouple prune and jump points (bsc#1225756).
- bpf: fix precision backtracking instruction iteration (bsc#1225756).
- bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes).
- bpf: handle ldimm64 properly in check_cfg() (bsc#1225756).
- bpf: mostly decouple jump history management from is_state_visited() (bsc#1225756).
- bpf: remove unnecessary prune and jump points (bsc#1225756).
- btrfs: add error messages to all unrecognized mount options (git-fixes)
- btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes)
- btrfs: export: handle invalid inode or root reference in btrfs_get_parent() (git-fixes)
- btrfs: extend locking to all space_info members accesses (git-fixes)
- btrfs: fix btrfs_submit_compressed_write cgroup attribution (git-fixes)
- btrfs: fix fallocate to use file_modified to update permissions consistently (git-fixes)
- btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes)
- btrfs: fix missing blkdev_put() call in btrfs_scan_one_device() (git-fixes)
- btrfs: fix off-by-one chunk length calculation at contains_pending_extent() (git-fixes)
- btrfs: fix qgroup reserve overflow the qgroup limit (git-fixes)
- btrfs: fix silent failure when deleting root reference (git-fixes)
- btrfs: fix use-after-free after failure to create a snapshot (git-fixes)
- btrfs: free exchange changeset on failures (git-fixes)
- btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git-fixes)
- btrfs: make search_csum_tree return 0 if we get -EFBIG (git-fixes)
- btrfs: prevent copying too big compressed lzo segment (git-fixes)
- btrfs: remove BUG_ON(!eie) in find_parent_nodes (git-fixes)
- btrfs: remove BUG_ON() in find_parent_nodes() (git-fixes)
- btrfs: repair super block num_devices automatically (git-fixes)
- btrfs: replace the BUG_ON in btrfs_del_root_ref with proper error handling (git-fixes)
- btrfs: send: ensure send_fd is writable (git-fixes)
- btrfs: send: handle path ref underflow in header iterate_inode_ref() (git-fixes)
- btrfs: send: in case of IO error log it (git-fixes)
- btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes)
- btrfs: tree-checker: check item_size for dev_item (git-fixes)
- btrfs: tree-checker: check item_size for inode_item (git-fixes)
- cifs: account for primary channel in the interface list (bsc#1224020).
- cifs: cifs_chan_is_iface_active should be called with chan_lock held (bsc#1224020).
- cifs: distribute channels across interfaces based on speed (bsc#1224020).
- cifs: do not pass cifs_sb when trying to add channels (bsc#1224020).
- cifs: failure to add channel on iface should bump up weight (git-fixes, bsc#1224020).
- cifs: fix charset issue in reconnection (bsc#1224020).
- cifs: fix leak of iface for primary channel (git-fixes, bsc#1224020).
- cifs: handle cases where a channel is closed (bsc#1224020).
- cifs: handle cases where multiple sessions share connection (bsc#1224020).
- cifs: reconnect work should have reference on server struct (bsc#1224020).
- clk: Do not hold prepare_lock when calling kref_put() (stable-fixes).
- clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes).
- counter: stm32-lptimer-cnt: Provide defines for clock polarities (git-fixes).
- counter: stm32-timer-cnt: Provide defines for slave mode selection (git-fixes).
- cppc_cpufreq: Fix possible null pointer dereference (git-fixes).
- cpu/hotplug: Remove the 'cpu' member of cpuhp_cpu_state (git-fixes).
- cpumask: Add for_each_cpu_from() (bsc#1225053).
- crypto: bcm - Fix pointer arithmetic (git-fixes).
- crypto: ccp - drop platform ifdef checks (git-fixes).
- crypto: ecdsa - Fix module auto-load on add-key (git-fixes).
- crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes).
- crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes).
- crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes).
- dmaengine: axi-dmac: fix possible race in remove() (git-fixes).
- dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes).
- dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11 users (git-fixes).
- dm-multipath: dont't attempt SG_IO on non-SCSI-disks (bsc#1223575).
- docs: kernel_include.py: Cope with docutils 0.21 (stable-fixes).
- drivers/nvme: Add quirks for device 126f:2262 (git-fixes).
- drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes).
- drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes).
- drm/amd/display: Fix potential index out of bounds in color transformation function (git-fixes).
- drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes).
- drm/amd: Flush GFXOFF requests in prepare stage (git-fixes).
- drm/amdgpu: Refine IB schedule error logging (stable-fixes).
- drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git-fixes).
- drm/arm/malidp: fix a possible null pointer dereference (git-fixes).
- drm/bridge: anx7625: Do not log an error when DSI host can't be found (git-fixes).
- drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git-fixes).
- drm/bridge: dpc3433: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: icn6211: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: lt8912b: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: lt9611: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: tc358775: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes).
- drm/connector: Add \n to message about demoting connector force-probes (git-fixes).
- drm/i915/bios: Fix parsing backlight BDB data (git-fixes).
- drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes).
- drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes).
- drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes).
- drm/meson: dw-hdmi: power up phy on device init (git-fixes).
- drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes).
- drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes).
- drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes).
- drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk (git-fixes).
- drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes).
- drm/panel: atna33xc20: Fix unbalanced regulator in the case HPD does not assert (git-fixes).
- drm/panel: novatek-nt35950: Do not log an error when DSI host can't be found (git-fixes).
- drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector (git-fixes).
- drm: vc4: Fix possible null pointer dereference (git-fixes).
- dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes)
- dyndbg: fix old BUG_ON in &gt;control parser (stable-fixes).
- efi: libstub: only free priv.runtime_map when allocated (git-fixes).
- extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes).
- fail_function: fix wrong use of fei_attr_remove().
- fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes).
- fbdev: shmobile: fix snprintf truncation (git-fixes).
- fbdev: sisfb: hide unused variables (git-fixes).
- firewire: ohci: mask bus reset interrupts between ISR and bottom half (stable-fixes).
- firmware: dmi-id: add a release callback function (git-fixes).
- firmware: raspberrypi: Use correct device for DMA mappings (git-fixes).
- fs/9p: drop inodes immediately on non-.L too (git-fixes).
- fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes).
- fs/9p: translate O_TRUNC into OTRUNC (git-fixes).
- gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes).
- gpio: wcove: Use -ENOTSUPP consistently (stable-fixes).
- gpu: host1x: Do not setup DMA for virtual devices (stable-fixes).
- HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes).
- hwmon: (corsair-cpro) Protect ccp-&gt;wait_input_report with a spinlock (git-fixes).
- hwmon: (corsair-cpro) Use a separate buffer for sending commands (git-fixes).
- hwmon: (corsair-cpro) Use complete_all() instead of complete() in ccp_raw_event() (git-fixes).
- hwmon: (lm70) fix links in doc and comments (git-fixes).
- hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes).
- i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame (git-fixes).
- i3c: master: svc: fix invalidate IBI type and miss call client IBI handler (git-fixes).
- IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes)
- idpf: extend tx watchdog timeout (bsc#1224137).
- iio: core: Leave private pointer NULL when no private data supplied (git-fixes).
- iio: pressure: dps310: support negative temperature values (git-fixes).
- Input: cyapa - add missing input core locking to suspend/resume functions (git-fixes).
- Input: ims-pcu - fix printf string overflow (git-fixes).
- Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes).
- iomap: Fix inline extent handling in iomap_readpage (git-fixes)
- iomap: iomap: fix memory corruption when recording errors during writeback (git-fixes)
- iomap: Support partial direct I/O on user copy failures (git-fixes)
- iommu/dma: Force swiotlb_max_mapping_size on an untrusted device (bsc#1224331)
- io_uring/unix: drop usage of io_uring socket (git-fixes).
- irqchip/gic-v3-its: Prevent double free on error (git-fixes).
- jffs2: prevent xattr node from overflowing the eraseblock (git-fixes).
- kABI: bpf: struct bpf_insn_aux_data kABI workaround (bsc#1225756).
- kcm: do not sense pfmemalloc status in kcm_sendpage() (git-fixes bsc#1223959)
- KEYS: trusted: Do not use WARN when encode fails (git-fixes).
- KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes).
- KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1224794).
- KVM: x86: Delete duplicate documentation for KVM_X86_SET_MSR_FILTER (git-fixes).
- leds: pwm: Disable PWM when going to suspend (git-fixes).
- libsubcmd: Fix parse-options memory leak (git-fixes).
- locking/atomic: Make test_and_*_bit() ordered on failure (git-fixes).
- media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries (git-fixes).
- media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes).
- media: mc: mark the media devnode as registered from the, start (git-fixes).
- media: ngene: Add dvb_ca_en50221_init return value check (git-fixes).
- media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes).
- mei: me: add lunar lake point M DID (stable-fixes).
- mfd: intel-lpss: Revert 'Add missing check for platform_get_resource' (git-fixes).
- mfd: ti_am335x_tscadc: Support the correctly spelled DT property (git-fixes).
- mfd: tqmx86: Specify IO port register range more precisely (git-fixes).
- mlxbf_gige: Enable the GigE port in mlxbf_gige_open (git-fixes).
- mlxbf_gige: Fix intermittent no ip issue (git-fixes).
- mlxbf_gige: stop PHY during open() error paths (git-fixes).
- mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes).
- mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes).
- mtd: core: Report error if first mtd_otp_size() call fails in mtd_otp_nvmem_add() (git-fixes).
- mtd: rawnand: hynix: fixed typo (git-fixes).
- net: do not sense pfmemalloc status in skb_append_pagefrags() (git-fixes bsc#1223959)
- netfilter: nf_tables: bail out early if hardware offload is not supported (git-fixes bsc#1223961)
- net: introduce __skb_fill_page_desc_noacc (git-fixes bsc#1223959)
- net: nfc: remove inappropriate attrs check (stable-fixes).
- net: qualcomm: rmnet: fix global oob in rmnet_policy (git-fixes).
- net: usb: ax88179_178a: fix link status when link is set to down/up (git-fixes).
- net:usb:qmi_wwan: support Rolling modules (stable-fixes).
- net: usb: smsc95xx: stop lying about skb-&gt;truesize (git-fixes).
- net: usb: sr9700: stop lying about skb-&gt;truesize (git-fixes).
- net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360).
- nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git-fixes).
- nfc: nci: Fix uninit-value in nci_rx_work (git-fixes).
- nilfs2: fix out-of-range warning (git-fixes).
- nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes).
- nilfs2: fix use-after-free of timer for log writer thread (git-fixes).
- nilfs2: make superblock data array index computation sparse friendly (git-fixes).
- nvme: ensure disabling pairs with unquiesce (bsc#1224534).
- nvme: fix miss command type check (git-fixes).
- nvme: fix multipath batched completion accounting (git-fixes).
- nvme-multipath: fix io accounting on failover (git-fixes).
- nvmet: fix ns enable/disable possible hang (git-fixes).
- PCI: dwc: Detect iATU settings after getting 'addr_space' resource (git-fixes).
- PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host (git-fixes).
- PCI: dwc: Use the bitmap API to allocate bitmaps (git-fixes).
- PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes).
- PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes).
- PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes).
- PCI: tegra194: Fix probe path for Endpoint mode (git-fixes).
- pinctrl: armada-37xx: remove an unused variable (git-fixes).
- pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes).
- pinctrl: core: handle radix_tree_insert() errors in pinctrl_register_one_pin() (stable-fixes).
- pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes).
- pinctrl/meson: fix typo in PDM's pin name (git-fixes).
- pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git-fixes).
- platform/x86/intel-uncore-freq: Do not present root domain on error (git-fixes).
- platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git-fixes).
- powerpc/eeh: Permanently disable the removed device (bsc#1223991 ltc#205740).
- powerpc/eeh: Small refactor of eeh_handle_normal_event() (bsc#1223991 ltc#205740).
- powerpc/eeh: Use a goto for recovery failures (bsc#1223991 ltc#205740).
- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).
- powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes).
- powerpc/pseries/vio: Do not return ENODEV if node or compatible missing (bsc#1220783).
- powerpc/uaccess: Fix build errors seen with GCC 13/14 (bsc#1194869).
- powerpc/uaccess: Use YZ asm constraint for ld (bsc#1194869).
- power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes).
- ppdev: Add an error check in register_device (git-fixes).
- printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1225616).
- qibfs: fix dentry leak (git-fixes)
- RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git-fixes)
- RDMA/hns: Fix deadlock on SRQ async events. (git-fixes)
- RDMA/hns: Fix GMV table pagesize (git-fixes)
- RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes)
- RDMA/hns: Fix UAF for cq async event (git-fixes)
- RDMA/hns: Modify the print level of CQE error (git-fixes)
- RDMA/hns: Use complete parentheses in macros (git-fixes)
- RDMA/IPoIB: Fix format truncation compilation errors (git-fixes)
- RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes)
- RDMA/mlx5: Fix port number for counter query in multi-port configuration (git-fixes)
- RDMA/rxe: Add ibdev_dbg macros for rxe (git-fixes)
- RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes)
- RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes)
- RDMA/rxe: Fix the problem 'mutex_destroy missing' (git-fixes)
- RDMA/rxe: Replace pr_xxx by rxe_dbg_xxx in rxe_net.c (git-fixes)
- RDMA/rxe: Split rxe_run_task() into two subroutines (git-fixes)
- regulator: bd71828: Do not overwrite runtime voltages (git-fixes).
- regulator: core: fix debugfs creation regression (git-fixes).
- regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes).
- remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes).
- Rename colliding patches before origin/cve/linux-5.14-LTSS -&gt; SLE15-SP5 merge
- Revert 'cifs: reconnect work should have reference on server struct' (git-fixes, bsc#1224020).
- Revert 'drm/bridge: ti-sn65dsi83: Fix enable error path' (git-fixes).
- ring-buffer: Fix a race between readers and resize checks (git-fixes).
- s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224795).
- s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224796).
- s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224346).
- s390/ipl: Fix incorrect initialization of len fields in nvme reipl block (git-fixes bsc#1225139).
- s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes bsc#1225138).
- sched/topology: Optimize topology_span_sane() (bsc#1225053).
- scsi: arcmsr: Support new PCI device IDs 1883 and 1886 (git-fixes).
- scsi: bfa: Fix function pointer type mismatch for hcb_qe-&gt;cbfn (git-fixes).
- scsi: core: Consult supported VPD page list prior to fetching page (git-fixes).
- scsi: core: Fix unremoved procfs host directory regression (git-fixes).
- scsi: csiostor: Avoid function pointer casts (git-fixes).
- scsi: libfc: Do not schedule abort twice (git-fixes).
- scsi: libfc: Fix up timeout error in fc_fcp_rec_error() (git-fixes).
- scsi: lpfc: Add support for 32 byte CDBs (bsc#1225842).
- scsi: lpfc: Change default logging level for unsolicited CT MIB commands (bsc#1225842).
- scsi: lpfc: Change lpfc_hba hba_flag member into a bitmask (bsc#1225842).
- scsi: lpfc: Clear deferred RSCN processing flag when driver is unloading (bsc#1225842).
- scsi: lpfc: Copyright updates for 14.4.0.2 patches (bsc#1225842).
- scsi: lpfc: Introduce rrq_list_lock to protect active_rrq_list (bsc#1225842).
- scsi: lpfc: Update logging of protection type for T10 DIF I/O (bsc#1225842).
- scsi: lpfc: Update lpfc version to 14.4.0.2 (bsc#1225842).
- scsi: mpt3sas: Prevent sending diag_reset when the controller is ready (git-fixes).
- scsi: mylex: Fix sysfs buffer lengths (git-fixes).
- scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes).
- scsi: sd: Unregister device if device_add_disk() failed in sd_probe() (git-fixes).
- selftests/pidfd: Fix config for pidfd_setns_test (git-fixes).
- serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes).
- serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable-fixes).
- serial: max3100: Fix bitwise types (git-fixes).
- serial: max3100: Lock port-&gt;lock when calling uart_handle_cts_change() (git-fixes).
- serial: max3100: Update uart_driver_registered on driver removal (git-fixes).
- serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git-fixes).
- serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler (git-fixes).
- serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes).
- smb3: show beginning time for per share stats (bsc#1224020).
- smb: client: ensure to try all targets when finding nested links (bsc#1224020).
- smb: client: fix mount when dns_resolver key is not available (git-fixes, bsc#1224020).
- smb: client: get rid of dfs code dep in namespace.c (bsc#1224020).
- smb: client: get rid of dfs naming in automount code (bsc#1224020).
- smb: client: introduce DFS_CACHE_TGT_LIST() (bsc#1224020).
- smb: client: reduce stack usage in cifs_try_adding_channels() (bsc#1224020).
- smb: client: remove extra @chan_count check in __cifs_put_smb_ses() (bsc#1224020).
- smb: client: rename cifs_dfs_ref.c to namespace.c (bsc#1224020).
- soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes).
- soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes).
- Sort recent BHI patches
- speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes).
- spmi: Add a check for remove callback when removing a SPMI driver (git-fixes).
- spmi: hisi-spmi-controller: Do not override device identifier (git-fixes).
- swiotlb: extend buffer pre-padding to alloc_align_mask if necessary (bsc#1224331). 
- swiotlb: Fix alignment checks when both allocation and DMA masks are (bsc#1224331)
- swiotlb: Fix double-allocation of slots due to broken alignment (bsc#1224331)
- swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc() (bsc#1224331)
- sysv: do not call sb_bread() with pointers_lock held (git-fixes).
- thermal/drivers/tsens: Fix null pointer dereference (git-fixes).
- tools/latency-collector: Fix -Wformat-security compile warns (git-fixes).
- tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer (bsc#1225535)
- tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer (git-fixes).
- tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes).
- tracing: hide unused ftrace_event_id_fops (git-fixes).
- tty: n_gsm: fix missing receive state reset after mode switch (git-fixes).
- tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes).
- Update patches.suse/ring-buffer-Fix-a-race-between-readers-and-resize-checks.patch (bsc#1222893).
- Update patches.suse/scsi-qedf-Don-t-process-stag-work-during-unload.patch (bsc#1214852)
- Update patches.suse/scsi-qedf-Wait-for-stag-work-during-unload.patch (bsc#1214852)
- usb: aqc111: stop lying about skb-&gt;truesize (git-fixes).
- USB: core: Add hub_get() and hub_put() routines (git-fixes).
- USB: core: Fix access violation during port device removal (git-fixes).
- USB: core: Fix deadlock in port 'disable' sysfs attribute (git-fixes).
- usb: dwc3: core: Prevent phy suspend during init (Git-fixes).
- usb: gadget: u_audio: Clear uac pointer when freed (git-fixes).
- usb: typec: tipd: fix event checking for tps6598x (git-fixes).
- usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes).
- VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes).
- VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler() (stable-fixes).
- vmci: prevent speculation leaks by sanitizing event in event_deliver() (git-fixes).
- watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git-fixes).
- watchdog: ixp4xx: Make sure restart always works (git-fixes).
- watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin (git-fixes).
- wifi: ar5523: enable proper endpoint verification (git-fixes).
- wifi: ath10k: Fix an error code problem in ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes).
- wifi: ath10k: poll service ready message before failing (git-fixes).
- wifi: ath10k: populate board data for WCN3990 (git-fixes).
- wifi: ath11k: do not force enable power save on non-running vdevs (git-fixes).
- wifi: carl9170: add a proper sanity check for endpoints (git-fixes).
- wifi: carl9170: re-fix fortified-memset warning (git-fixes).
- wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes).
- wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes).
- wifi: mwl8k: initialize cmd-&gt;addr[] properly (git-fixes).
- x86/boot: Ignore NMIs during very early boot (git-fixes).
- x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES (git-fixes).
- x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file (git-fixes).
- x86/bugs: Fix BHI documentation (git-fixes).
- x86/bugs: Fix BHI handling of RRSBA (git-fixes).
- x86/bugs: Fix BHI retpoline check (git-fixes).
- x86/bugs: Fix return type of spectre_bhi_state() (git-fixes).
- x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git-fixes).
- x86/bugs: Rename various 'ia32_cap' variables to 'x86_arch_cap_msr' (git-fixes).
- x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI (git-fixes).
- x86: Fix CPUIDLE_FLAG_IRQ_ENABLE leaking timer reprogram (git-fixes).
- x86/kvm: Do not try to disable kvmclock if it was not enabled (git-fixes).
- x86/lib: Fix overflow when counting digits (git-fixes).
- x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes).
- x86/nmi: Drop unused declaration of proc_nmi_enabled() (git-fixes).
- x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for !SRSO (git-fixes).
- x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git-fixes).
- x86/sme: Fix memory encryption setting if enabled by default and not overridden (git-fixes).
- x86/tdx: Preserve shared bit on mprotect() (git-fixes).
- xfs: add missing cmap-&gt;br_state = XFS_EXT_NORM update (git-fixes).
- xfs: fix exception caused by unexpected illegal bestcount in leaf dir (git-fixes).
- xfs: Fix false ENOSPC when performing direct write on a delalloc extent in cow fork (git-fixes).
- xfs: fix imprecise logic in xchk_btree_check_block_owner (git-fixes).
- xfs: fix inode reservation space for removing transaction (git-fixes).
- xfs: shrink failure needs to hold AGI buffer (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-12"/>
	<updated date="2024-06-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141539">SUSE bug 1141539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174585">SUSE bug 1174585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181674">SUSE bug 1181674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187716">SUSE bug 1187716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190569">SUSE bug 1190569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191949">SUSE bug 1191949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192107">SUSE bug 1192107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193983">SUSE bug 1193983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194288">SUSE bug 1194288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196956">SUSE bug 1196956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197915">SUSE bug 1197915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200465">SUSE bug 1200465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205205">SUSE bug 1205205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207284">SUSE bug 1207284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207361">SUSE bug 1207361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207948">SUSE bug 1207948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208149">SUSE bug 1208149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209657">SUSE bug 1209657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209799">SUSE bug 1209799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209834">SUSE bug 1209834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209980">SUSE bug 1209980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210335">SUSE bug 1210335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213863">SUSE bug 1213863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214852">SUSE bug 1214852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215322">SUSE bug 1215322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215702">SUSE bug 1215702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216358">SUSE bug 1216358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216702">SUSE bug 1216702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217169">SUSE bug 1217169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217339">SUSE bug 1217339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217515">SUSE bug 1217515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218447">SUSE bug 1218447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220021">SUSE bug 1220021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220267">SUSE bug 1220267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220363">SUSE bug 1220363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220783">SUSE bug 1220783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221044">SUSE bug 1221044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221081">SUSE bug 1221081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221615">SUSE bug 1221615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221777">SUSE bug 1221777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221816">SUSE bug 1221816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221829">SUSE bug 1221829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222011">SUSE bug 1222011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222374">SUSE bug 1222374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222385">SUSE bug 1222385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222413">SUSE bug 1222413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222464">SUSE bug 1222464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222513">SUSE bug 1222513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222559">SUSE bug 1222559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222561">SUSE bug 1222561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222608">SUSE bug 1222608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222619">SUSE bug 1222619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222627">SUSE bug 1222627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222721">SUSE bug 1222721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222765">SUSE bug 1222765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222770">SUSE bug 1222770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222783">SUSE bug 1222783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222793">SUSE bug 1222793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222838">SUSE bug 1222838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222870">SUSE bug 1222870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222893">SUSE bug 1222893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222960">SUSE bug 1222960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222961">SUSE bug 1222961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222974">SUSE bug 1222974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222975">SUSE bug 1222975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222976">SUSE bug 1222976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223011">SUSE bug 1223011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223023">SUSE bug 1223023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223027">SUSE bug 1223027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223031">SUSE bug 1223031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223043">SUSE bug 1223043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223046">SUSE bug 1223046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223048">SUSE bug 1223048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223049">SUSE bug 1223049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223084">SUSE bug 1223084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223113">SUSE bug 1223113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223119">SUSE bug 1223119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223137">SUSE bug 1223137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223138">SUSE bug 1223138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223140">SUSE bug 1223140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223188">SUSE bug 1223188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223203">SUSE bug 1223203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223207">SUSE bug 1223207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223315">SUSE bug 1223315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223360">SUSE bug 1223360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223384">SUSE bug 1223384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223390">SUSE bug 1223390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223432">SUSE bug 1223432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223489">SUSE bug 1223489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223505">SUSE bug 1223505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223532">SUSE bug 1223532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223575">SUSE bug 1223575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223595">SUSE bug 1223595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223626">SUSE bug 1223626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223627">SUSE bug 1223627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223628">SUSE bug 1223628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223631">SUSE bug 1223631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223633">SUSE bug 1223633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223638">SUSE bug 1223638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223650">SUSE bug 1223650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223653">SUSE bug 1223653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223666">SUSE bug 1223666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223670">SUSE bug 1223670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223671">SUSE bug 1223671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223675">SUSE bug 1223675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223677">SUSE bug 1223677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223678">SUSE bug 1223678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223679">SUSE bug 1223679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223698">SUSE bug 1223698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223712">SUSE bug 1223712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223715">SUSE bug 1223715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223717">SUSE bug 1223717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223718">SUSE bug 1223718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223737">SUSE bug 1223737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223738">SUSE bug 1223738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223741">SUSE bug 1223741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223744">SUSE bug 1223744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223747">SUSE bug 1223747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223748">SUSE bug 1223748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223750">SUSE bug 1223750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223752">SUSE bug 1223752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223754">SUSE bug 1223754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223756">SUSE bug 1223756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223757">SUSE bug 1223757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223762">SUSE bug 1223762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223769">SUSE bug 1223769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223770">SUSE bug 1223770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223779">SUSE bug 1223779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223780">SUSE bug 1223780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223781">SUSE bug 1223781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223788">SUSE bug 1223788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223802">SUSE bug 1223802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223819">SUSE bug 1223819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223823">SUSE bug 1223823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223826">SUSE bug 1223826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223828">SUSE bug 1223828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223829">SUSE bug 1223829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223837">SUSE bug 1223837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223842">SUSE bug 1223842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223843">SUSE bug 1223843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223844">SUSE bug 1223844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223847">SUSE bug 1223847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223858">SUSE bug 1223858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223875">SUSE bug 1223875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223879">SUSE bug 1223879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223895">SUSE bug 1223895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223959">SUSE bug 1223959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223961">SUSE bug 1223961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223991">SUSE bug 1223991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223996">SUSE bug 1223996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224020">SUSE bug 1224020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224076">SUSE bug 1224076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224096">SUSE bug 1224096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224098">SUSE bug 1224098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224099">SUSE bug 1224099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224137">SUSE bug 1224137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224166">SUSE bug 1224166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224174">SUSE bug 1224174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224177">SUSE bug 1224177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224180">SUSE bug 1224180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224181">SUSE bug 1224181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224187">SUSE bug 1224187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224331">SUSE bug 1224331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224346">SUSE bug 1224346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224423">SUSE bug 1224423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224432">SUSE bug 1224432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224437">SUSE bug 1224437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224438">SUSE bug 1224438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224442">SUSE bug 1224442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224443">SUSE bug 1224443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224445">SUSE bug 1224445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224449">SUSE bug 1224449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224479">SUSE bug 1224479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224482">SUSE bug 1224482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224487">SUSE bug 1224487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224488">SUSE bug 1224488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224492">SUSE bug 1224492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224494">SUSE bug 1224494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224495">SUSE bug 1224495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224502">SUSE bug 1224502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224508">SUSE bug 1224508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224509">SUSE bug 1224509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224511">SUSE bug 1224511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224519">SUSE bug 1224519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224524">SUSE bug 1224524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224525">SUSE bug 1224525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224530">SUSE bug 1224530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224531">SUSE bug 1224531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224534">SUSE bug 1224534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224535">SUSE bug 1224535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224537">SUSE bug 1224537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224541">SUSE bug 1224541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224543">SUSE bug 1224543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224549">SUSE bug 1224549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224550">SUSE bug 1224550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224558">SUSE bug 1224558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224559">SUSE bug 1224559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224566">SUSE bug 1224566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224567">SUSE bug 1224567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224571">SUSE bug 1224571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224575">SUSE bug 1224575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224576">SUSE bug 1224576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224579">SUSE bug 1224579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224580">SUSE bug 1224580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224581">SUSE bug 1224581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224582">SUSE bug 1224582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224586">SUSE bug 1224586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224587">SUSE bug 1224587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224592">SUSE bug 1224592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224598">SUSE bug 1224598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224601">SUSE bug 1224601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224607">SUSE bug 1224607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224608">SUSE bug 1224608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224611">SUSE bug 1224611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224615">SUSE bug 1224615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224617">SUSE bug 1224617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224618">SUSE bug 1224618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224621">SUSE bug 1224621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224622">SUSE bug 1224622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224624">SUSE bug 1224624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224627">SUSE bug 1224627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224628">SUSE bug 1224628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224629">SUSE bug 1224629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224632">SUSE bug 1224632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224636">SUSE bug 1224636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224637">SUSE bug 1224637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224638">SUSE bug 1224638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224640">SUSE bug 1224640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224643">SUSE bug 1224643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224644">SUSE bug 1224644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224645">SUSE bug 1224645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224647">SUSE bug 1224647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224648">SUSE bug 1224648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224649">SUSE bug 1224649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224650">SUSE bug 1224650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224651">SUSE bug 1224651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224657">SUSE bug 1224657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224659">SUSE bug 1224659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224660">SUSE bug 1224660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224663">SUSE bug 1224663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224664">SUSE bug 1224664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224665">SUSE bug 1224665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224666">SUSE bug 1224666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224667">SUSE bug 1224667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224668">SUSE bug 1224668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224671">SUSE bug 1224671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224672">SUSE bug 1224672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224676">SUSE bug 1224676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224678">SUSE bug 1224678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224679">SUSE bug 1224679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224680">SUSE bug 1224680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224681">SUSE bug 1224681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224682">SUSE bug 1224682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224685">SUSE bug 1224685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224686">SUSE bug 1224686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224692">SUSE bug 1224692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224697">SUSE bug 1224697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224699">SUSE bug 1224699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224701">SUSE bug 1224701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224703">SUSE bug 1224703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224705">SUSE bug 1224705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224707">SUSE bug 1224707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224717">SUSE bug 1224717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224718">SUSE bug 1224718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224721">SUSE bug 1224721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224722">SUSE bug 1224722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224723">SUSE bug 1224723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224725">SUSE bug 1224725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224727">SUSE bug 1224727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224728">SUSE bug 1224728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224729">SUSE bug 1224729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224730">SUSE bug 1224730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224731">SUSE bug 1224731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224732">SUSE bug 1224732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224733">SUSE bug 1224733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224736">SUSE bug 1224736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224738">SUSE bug 1224738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224739">SUSE bug 1224739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224740">SUSE bug 1224740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224747">SUSE bug 1224747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224749">SUSE bug 1224749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224759">SUSE bug 1224759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224763">SUSE bug 1224763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224764">SUSE bug 1224764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224765">SUSE bug 1224765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224766">SUSE bug 1224766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224794">SUSE bug 1224794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224795">SUSE bug 1224795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224796">SUSE bug 1224796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224803">SUSE bug 1224803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224816">SUSE bug 1224816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224895">SUSE bug 1224895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224898">SUSE bug 1224898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224900">SUSE bug 1224900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224901">SUSE bug 1224901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224902">SUSE bug 1224902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224903">SUSE bug 1224903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224904">SUSE bug 1224904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224905">SUSE bug 1224905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224907">SUSE bug 1224907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224909">SUSE bug 1224909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224910">SUSE bug 1224910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224911">SUSE bug 1224911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224912">SUSE bug 1224912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224913">SUSE bug 1224913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224914">SUSE bug 1224914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224915">SUSE bug 1224915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224920">SUSE bug 1224920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224928">SUSE bug 1224928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224929">SUSE bug 1224929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224930">SUSE bug 1224930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224931">SUSE bug 1224931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224932">SUSE bug 1224932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224936">SUSE bug 1224936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224937">SUSE bug 1224937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224941">SUSE bug 1224941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224942">SUSE bug 1224942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224944">SUSE bug 1224944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224945">SUSE bug 1224945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224947">SUSE bug 1224947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224956">SUSE bug 1224956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224988">SUSE bug 1224988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224992">SUSE bug 1224992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225000">SUSE bug 1225000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225003">SUSE bug 1225003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225005">SUSE bug 1225005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225008">SUSE bug 1225008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225009">SUSE bug 1225009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225022">SUSE bug 1225022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225031">SUSE bug 1225031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225032">SUSE bug 1225032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225036">SUSE bug 1225036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225041">SUSE bug 1225041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225044">SUSE bug 1225044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225053">SUSE bug 1225053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225076">SUSE bug 1225076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225077">SUSE bug 1225077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225082">SUSE bug 1225082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225085">SUSE bug 1225085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225086">SUSE bug 1225086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225092">SUSE bug 1225092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225095">SUSE bug 1225095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225096">SUSE bug 1225096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225097">SUSE bug 1225097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225106">SUSE bug 1225106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225108">SUSE bug 1225108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225109">SUSE bug 1225109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225114">SUSE bug 1225114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225118">SUSE bug 1225118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225121">SUSE bug 1225121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225122">SUSE bug 1225122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225123">SUSE bug 1225123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225125">SUSE bug 1225125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225126">SUSE bug 1225126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225127">SUSE bug 1225127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225129">SUSE bug 1225129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225131">SUSE bug 1225131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225132">SUSE bug 1225132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225138">SUSE bug 1225138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225139">SUSE bug 1225139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225145">SUSE bug 1225145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225151">SUSE bug 1225151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225153">SUSE bug 1225153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225156">SUSE bug 1225156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225158">SUSE bug 1225158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225160">SUSE bug 1225160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225161">SUSE bug 1225161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225164">SUSE bug 1225164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225167">SUSE bug 1225167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225180">SUSE bug 1225180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225183">SUSE bug 1225183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225184">SUSE bug 1225184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225186">SUSE bug 1225186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225187">SUSE bug 1225187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225189">SUSE bug 1225189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225190">SUSE bug 1225190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225191">SUSE bug 1225191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225192">SUSE bug 1225192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225193">SUSE bug 1225193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225195">SUSE bug 1225195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225198">SUSE bug 1225198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225201">SUSE bug 1225201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225203">SUSE bug 1225203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225205">SUSE bug 1225205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225206">SUSE bug 1225206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225207">SUSE bug 1225207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225208">SUSE bug 1225208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225209">SUSE bug 1225209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225210">SUSE bug 1225210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225214">SUSE bug 1225214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225222">SUSE bug 1225222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225223">SUSE bug 1225223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225224">SUSE bug 1225224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225225">SUSE bug 1225225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225227">SUSE bug 1225227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225228">SUSE bug 1225228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225229">SUSE bug 1225229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225230">SUSE bug 1225230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225232">SUSE bug 1225232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225233">SUSE bug 1225233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225235">SUSE bug 1225235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225236">SUSE bug 1225236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225237">SUSE bug 1225237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225238">SUSE bug 1225238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225239">SUSE bug 1225239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225240">SUSE bug 1225240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225241">SUSE bug 1225241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225242">SUSE bug 1225242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225243">SUSE bug 1225243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225244">SUSE bug 1225244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225245">SUSE bug 1225245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225246">SUSE bug 1225246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225247">SUSE bug 1225247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225248">SUSE bug 1225248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225249">SUSE bug 1225249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225250">SUSE bug 1225250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225251">SUSE bug 1225251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225252">SUSE bug 1225252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225253">SUSE bug 1225253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225254">SUSE bug 1225254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225255">SUSE bug 1225255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225256">SUSE bug 1225256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225257">SUSE bug 1225257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225258">SUSE bug 1225258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225259">SUSE bug 1225259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225260">SUSE bug 1225260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225261">SUSE bug 1225261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225262">SUSE bug 1225262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225263">SUSE bug 1225263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225268">SUSE bug 1225268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225301">SUSE bug 1225301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225303">SUSE bug 1225303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225304">SUSE bug 1225304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225306">SUSE bug 1225306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225316">SUSE bug 1225316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225318">SUSE bug 1225318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225320">SUSE bug 1225320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225321">SUSE bug 1225321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225322">SUSE bug 1225322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225323">SUSE bug 1225323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225326">SUSE bug 1225326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225327">SUSE bug 1225327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225328">SUSE bug 1225328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225329">SUSE bug 1225329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225330">SUSE bug 1225330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225331">SUSE bug 1225331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225332">SUSE bug 1225332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225333">SUSE bug 1225333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225334">SUSE bug 1225334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225335">SUSE bug 1225335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225336">SUSE bug 1225336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225337">SUSE bug 1225337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225338">SUSE bug 1225338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225339">SUSE bug 1225339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225341">SUSE bug 1225341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225342">SUSE bug 1225342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225344">SUSE bug 1225344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225346">SUSE bug 1225346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225347">SUSE bug 1225347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225351">SUSE bug 1225351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225353">SUSE bug 1225353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225354">SUSE bug 1225354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225355">SUSE bug 1225355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225357">SUSE bug 1225357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225358">SUSE bug 1225358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225360">SUSE bug 1225360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225361">SUSE bug 1225361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225366">SUSE bug 1225366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225367">SUSE bug 1225367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225368">SUSE bug 1225368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225369">SUSE bug 1225369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225370">SUSE bug 1225370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225372">SUSE bug 1225372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225373">SUSE bug 1225373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225374">SUSE bug 1225374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225375">SUSE bug 1225375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225376">SUSE bug 1225376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225377">SUSE bug 1225377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225379">SUSE bug 1225379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225380">SUSE bug 1225380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225382">SUSE bug 1225382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225383">SUSE bug 1225383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225384">SUSE bug 1225384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225386">SUSE bug 1225386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225387">SUSE bug 1225387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225388">SUSE bug 1225388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225390">SUSE bug 1225390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225392">SUSE bug 1225392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225393">SUSE bug 1225393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225396">SUSE bug 1225396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225400">SUSE bug 1225400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225404">SUSE bug 1225404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225405">SUSE bug 1225405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225408">SUSE bug 1225408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225409">SUSE bug 1225409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225410">SUSE bug 1225410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225411">SUSE bug 1225411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225424">SUSE bug 1225424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225425">SUSE bug 1225425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225427">SUSE bug 1225427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225431">SUSE bug 1225431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225435">SUSE bug 1225435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225436">SUSE bug 1225436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225437">SUSE bug 1225437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225438">SUSE bug 1225438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225439">SUSE bug 1225439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225441">SUSE bug 1225441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225442">SUSE bug 1225442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225443">SUSE bug 1225443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225444">SUSE bug 1225444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225445">SUSE bug 1225445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225446">SUSE bug 1225446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225447">SUSE bug 1225447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225450">SUSE bug 1225450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225453">SUSE bug 1225453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225455">SUSE bug 1225455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225461">SUSE bug 1225461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225463">SUSE bug 1225463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225464">SUSE bug 1225464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225466">SUSE bug 1225466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225467">SUSE bug 1225467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225468">SUSE bug 1225468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225471">SUSE bug 1225471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225472">SUSE bug 1225472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225478">SUSE bug 1225478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225479">SUSE bug 1225479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225480">SUSE bug 1225480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225482">SUSE bug 1225482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225483">SUSE bug 1225483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225486">SUSE bug 1225486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225488">SUSE bug 1225488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225490">SUSE bug 1225490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225492">SUSE bug 1225492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225495">SUSE bug 1225495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225499">SUSE bug 1225499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225500">SUSE bug 1225500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225501">SUSE bug 1225501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225502">SUSE bug 1225502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225506">SUSE bug 1225506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225508">SUSE bug 1225508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225510">SUSE bug 1225510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225513">SUSE bug 1225513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225515">SUSE bug 1225515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225529">SUSE bug 1225529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225530">SUSE bug 1225530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225532">SUSE bug 1225532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225534">SUSE bug 1225534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225535">SUSE bug 1225535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225548">SUSE bug 1225548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225549">SUSE bug 1225549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225550">SUSE bug 1225550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225553">SUSE bug 1225553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225554">SUSE bug 1225554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225555">SUSE bug 1225555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225556">SUSE bug 1225556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225557">SUSE bug 1225557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225559">SUSE bug 1225559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225560">SUSE bug 1225560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225565">SUSE bug 1225565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225566">SUSE bug 1225566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225568">SUSE bug 1225568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225569">SUSE bug 1225569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225570">SUSE bug 1225570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225571">SUSE bug 1225571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225572">SUSE bug 1225572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225577">SUSE bug 1225577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225583">SUSE bug 1225583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225584">SUSE bug 1225584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225587">SUSE bug 1225587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225588">SUSE bug 1225588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225589">SUSE bug 1225589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225590">SUSE bug 1225590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225591">SUSE bug 1225591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225592">SUSE bug 1225592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225593">SUSE bug 1225593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225595">SUSE bug 1225595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225599">SUSE bug 1225599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225616">SUSE bug 1225616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225640">SUSE bug 1225640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225642">SUSE bug 1225642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225705">SUSE bug 1225705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225708">SUSE bug 1225708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225715">SUSE bug 1225715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225720">SUSE bug 1225720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225722">SUSE bug 1225722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225734">SUSE bug 1225734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225735">SUSE bug 1225735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225747">SUSE bug 1225747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225748">SUSE bug 1225748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225756">SUSE bug 1225756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225761">SUSE bug 1225761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225766">SUSE bug 1225766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225775">SUSE bug 1225775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225810">SUSE bug 1225810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225820">SUSE bug 1225820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225829">SUSE bug 1225829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225835">SUSE bug 1225835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225842">SUSE bug 1225842</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-36788/">CVE-2020-36788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36788">CVE-2020-36788 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39698">CVE-2021-39698 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4148/">CVE-2021-4148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4148">CVE-2021-4148 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42327/">CVE-2021-42327 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42327">CVE-2021-42327 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43056/">CVE-2021-43056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43056">CVE-2021-43056 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47200/">CVE-2021-47200 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47200">CVE-2021-47200 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47358/">CVE-2021-47358 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47358">CVE-2021-47358 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47359/">CVE-2021-47359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47359">CVE-2021-47359 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47360/">CVE-2021-47360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47360">CVE-2021-47360 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47361/">CVE-2021-47361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47361">CVE-2021-47361 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47362/">CVE-2021-47362 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47362">CVE-2021-47362 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47363/">CVE-2021-47363 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47363">CVE-2021-47363 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47364/">CVE-2021-47364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47364">CVE-2021-47364 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47365/">CVE-2021-47365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47365">CVE-2021-47365 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-47366/">CVE-2021-47366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47366">CVE-2021-47366 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47367/">CVE-2021-47367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47367">CVE-2021-47367 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47368/">CVE-2021-47368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47368">CVE-2021-47368 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47369/">CVE-2021-47369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47369">CVE-2021-47369 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47370/">CVE-2021-47370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47370">CVE-2021-47370 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47371/">CVE-2021-47371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47371">CVE-2021-47371 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47372/">CVE-2021-47372 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47372">CVE-2021-47372 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47373/">CVE-2021-47373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47373">CVE-2021-47373 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47374/">CVE-2021-47374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47374">CVE-2021-47374 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47375/">CVE-2021-47375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47375">CVE-2021-47375 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47376/">CVE-2021-47376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47376">CVE-2021-47376 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47378/">CVE-2021-47378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47378">CVE-2021-47378 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47379/">CVE-2021-47379 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47379">CVE-2021-47379 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47380/">CVE-2021-47380 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47380">CVE-2021-47380 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47381/">CVE-2021-47381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47381">CVE-2021-47381 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47382/">CVE-2021-47382 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47382">CVE-2021-47382 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47383/">CVE-2021-47383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47383">CVE-2021-47383 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47384/">CVE-2021-47384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47384">CVE-2021-47384 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47385/">CVE-2021-47385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47385">CVE-2021-47385 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47386/">CVE-2021-47386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47386">CVE-2021-47386 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47387/">CVE-2021-47387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47387">CVE-2021-47387 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47388/">CVE-2021-47388 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47388">CVE-2021-47388 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47389/">CVE-2021-47389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47389">CVE-2021-47389 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47390/">CVE-2021-47390 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47390">CVE-2021-47390 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47391/">CVE-2021-47391 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47391">CVE-2021-47391 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47392/">CVE-2021-47392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47392">CVE-2021-47392 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47393/">CVE-2021-47393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47393">CVE-2021-47393 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47394/">CVE-2021-47394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47394">CVE-2021-47394 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47395/">CVE-2021-47395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47395">CVE-2021-47395 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47396/">CVE-2021-47396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47396">CVE-2021-47396 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47397/">CVE-2021-47397 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47397">CVE-2021-47397 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47398/">CVE-2021-47398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47398">CVE-2021-47398 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47399/">CVE-2021-47399 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47399">CVE-2021-47399 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47400/">CVE-2021-47400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47400">CVE-2021-47400 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47401/">CVE-2021-47401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47401">CVE-2021-47401 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47402/">CVE-2021-47402 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47402">CVE-2021-47402 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47403/">CVE-2021-47403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47403">CVE-2021-47403 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47404/">CVE-2021-47404 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47404">CVE-2021-47404 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47405/">CVE-2021-47405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47405">CVE-2021-47405 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47406/">CVE-2021-47406 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47406">CVE-2021-47406 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47407/">CVE-2021-47407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47407">CVE-2021-47407 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47408/">CVE-2021-47408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47408">CVE-2021-47408 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47409/">CVE-2021-47409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47409">CVE-2021-47409 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47410/">CVE-2021-47410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47410">CVE-2021-47410 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47412/">CVE-2021-47412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47412">CVE-2021-47412 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47413/">CVE-2021-47413 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47413">CVE-2021-47413 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47414/">CVE-2021-47414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47414">CVE-2021-47414 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47415/">CVE-2021-47415 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47415">CVE-2021-47415 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47416/">CVE-2021-47416 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47416">CVE-2021-47416 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47417/">CVE-2021-47417 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47417">CVE-2021-47417 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47418/">CVE-2021-47418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47418">CVE-2021-47418 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47419/">CVE-2021-47419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47419">CVE-2021-47419 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47420/">CVE-2021-47420 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47420">CVE-2021-47420 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47421/">CVE-2021-47421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47421">CVE-2021-47421 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47422/">CVE-2021-47422 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47422">CVE-2021-47422 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47423/">CVE-2021-47423 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47423">CVE-2021-47423 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47424/">CVE-2021-47424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47424">CVE-2021-47424 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47425/">CVE-2021-47425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47425">CVE-2021-47425 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47426/">CVE-2021-47426 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47426">CVE-2021-47426 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47427/">CVE-2021-47427 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47427">CVE-2021-47427 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47428/">CVE-2021-47428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47428">CVE-2021-47428 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47429/">CVE-2021-47429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47429">CVE-2021-47429 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47430/">CVE-2021-47430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47430">CVE-2021-47430 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47431/">CVE-2021-47431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47431">CVE-2021-47431 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-47433/">CVE-2021-47433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47433">CVE-2021-47433 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47434/">CVE-2021-47434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47434">CVE-2021-47434 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47435/">CVE-2021-47435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47435">CVE-2021-47435 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47436/">CVE-2021-47436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47436">CVE-2021-47436 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47437/">CVE-2021-47437 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47437">CVE-2021-47437 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47438/">CVE-2021-47438 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47438">CVE-2021-47438 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47439/">CVE-2021-47439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47439">CVE-2021-47439 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47440/">CVE-2021-47440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47440">CVE-2021-47440 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47441/">CVE-2021-47441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47441">CVE-2021-47441 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47442/">CVE-2021-47442 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47442">CVE-2021-47442 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47443/">CVE-2021-47443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47443">CVE-2021-47443 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47444/">CVE-2021-47444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47444">CVE-2021-47444 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47445/">CVE-2021-47445 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47445">CVE-2021-47445 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47446/">CVE-2021-47446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47446">CVE-2021-47446 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47447/">CVE-2021-47447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47447">CVE-2021-47447 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47448/">CVE-2021-47448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47448">CVE-2021-47448 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47449/">CVE-2021-47449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47449">CVE-2021-47449 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47450/">CVE-2021-47450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47450">CVE-2021-47450 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47451/">CVE-2021-47451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47451">CVE-2021-47451 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47452/">CVE-2021-47452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47452">CVE-2021-47452 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47453/">CVE-2021-47453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47453">CVE-2021-47453 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47454/">CVE-2021-47454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47454">CVE-2021-47454 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47455/">CVE-2021-47455 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47455">CVE-2021-47455 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47456/">CVE-2021-47456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47456">CVE-2021-47456 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47457/">CVE-2021-47457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47457">CVE-2021-47457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47458/">CVE-2021-47458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47458">CVE-2021-47458 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47459/">CVE-2021-47459 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47459">CVE-2021-47459 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47460/">CVE-2021-47460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47460">CVE-2021-47460 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47461/">CVE-2021-47461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47461">CVE-2021-47461 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47462/">CVE-2021-47462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47462">CVE-2021-47462 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47463/">CVE-2021-47463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47463">CVE-2021-47463 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47464/">CVE-2021-47464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47464">CVE-2021-47464 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47465/">CVE-2021-47465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47465">CVE-2021-47465 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47466/">CVE-2021-47466 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47466">CVE-2021-47466 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47467/">CVE-2021-47467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47467">CVE-2021-47467 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47468/">CVE-2021-47468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47468">CVE-2021-47468 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47469/">CVE-2021-47469 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47469">CVE-2021-47469 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47470/">CVE-2021-47470 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47470">CVE-2021-47470 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47471/">CVE-2021-47471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47471">CVE-2021-47471 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47472/">CVE-2021-47472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47472">CVE-2021-47472 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47473/">CVE-2021-47473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47473">CVE-2021-47473 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47474/">CVE-2021-47474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47474">CVE-2021-47474 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47475/">CVE-2021-47475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47475">CVE-2021-47475 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47476/">CVE-2021-47476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47476">CVE-2021-47476 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47477/">CVE-2021-47477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47477">CVE-2021-47477 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47478/">CVE-2021-47478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47478">CVE-2021-47478 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47479/">CVE-2021-47479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47479">CVE-2021-47479 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47480/">CVE-2021-47480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47480">CVE-2021-47480 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47481/">CVE-2021-47481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47481">CVE-2021-47481 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47482/">CVE-2021-47482 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47482">CVE-2021-47482 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47483/">CVE-2021-47483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47483">CVE-2021-47483 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47484/">CVE-2021-47484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47484">CVE-2021-47484 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47485/">CVE-2021-47485 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47485">CVE-2021-47485 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47486/">CVE-2021-47486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47486">CVE-2021-47486 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47488/">CVE-2021-47488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47488">CVE-2021-47488 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47489/">CVE-2021-47489 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47489">CVE-2021-47489 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47490/">CVE-2021-47490 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47490">CVE-2021-47490 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47491/">CVE-2021-47491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47491">CVE-2021-47491 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47492/">CVE-2021-47492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47492">CVE-2021-47492 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47493/">CVE-2021-47493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47493">CVE-2021-47493 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47494/">CVE-2021-47494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47494">CVE-2021-47494 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47495/">CVE-2021-47495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47495">CVE-2021-47495 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47496/">CVE-2021-47496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47496">CVE-2021-47496 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47497/">CVE-2021-47497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47497">CVE-2021-47497 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47498/">CVE-2021-47498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47498">CVE-2021-47498 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47499/">CVE-2021-47499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47499">CVE-2021-47499 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47500/">CVE-2021-47500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47500">CVE-2021-47500 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47501/">CVE-2021-47501 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47501">CVE-2021-47501 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47502/">CVE-2021-47502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47502">CVE-2021-47502 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47503/">CVE-2021-47503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47503">CVE-2021-47503 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47504/">CVE-2021-47504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47504">CVE-2021-47504 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47505/">CVE-2021-47505 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47505">CVE-2021-47505 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47506/">CVE-2021-47506 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47506">CVE-2021-47506 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47507/">CVE-2021-47507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47507">CVE-2021-47507 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47508/">CVE-2021-47508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47508">CVE-2021-47508 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47509/">CVE-2021-47509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47509">CVE-2021-47509 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47510/">CVE-2021-47510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47510">CVE-2021-47510 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47511/">CVE-2021-47511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47511">CVE-2021-47511 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47512/">CVE-2021-47512 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47512">CVE-2021-47512 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47513/">CVE-2021-47513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47513">CVE-2021-47513 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47514/">CVE-2021-47514 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47514">CVE-2021-47514 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47516/">CVE-2021-47516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47516">CVE-2021-47516 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47518/">CVE-2021-47518 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47518">CVE-2021-47518 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47520/">CVE-2021-47520 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47520">CVE-2021-47520 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47521/">CVE-2021-47521 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47521">CVE-2021-47521 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47522/">CVE-2021-47522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47522">CVE-2021-47522 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47523/">CVE-2021-47523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47523">CVE-2021-47523 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47524/">CVE-2021-47524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47524">CVE-2021-47524 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47525/">CVE-2021-47525 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47525">CVE-2021-47525 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47526/">CVE-2021-47526 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47526">CVE-2021-47526 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47528/">CVE-2021-47528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47528">CVE-2021-47528 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47529/">CVE-2021-47529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47529">CVE-2021-47529 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47530/">CVE-2021-47530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47530">CVE-2021-47530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47531/">CVE-2021-47531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47531">CVE-2021-47531 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47532/">CVE-2021-47532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47532">CVE-2021-47532 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47533/">CVE-2021-47533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47533">CVE-2021-47533 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47534/">CVE-2021-47534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47534">CVE-2021-47534 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47535/">CVE-2021-47535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47535">CVE-2021-47535 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47536/">CVE-2021-47536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47536">CVE-2021-47536 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47537/">CVE-2021-47537 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47537">CVE-2021-47537 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47540/">CVE-2021-47540 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47540">CVE-2021-47540 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47541/">CVE-2021-47541 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47541">CVE-2021-47541 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47542/">CVE-2021-47542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47542">CVE-2021-47542 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47544/">CVE-2021-47544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47544">CVE-2021-47544 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47548/">CVE-2021-47548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47548">CVE-2021-47548 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47549/">CVE-2021-47549 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47549">CVE-2021-47549 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47550/">CVE-2021-47550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47550">CVE-2021-47550 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47551/">CVE-2021-47551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47551">CVE-2021-47551 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47552/">CVE-2021-47552 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47552">CVE-2021-47552 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47553/">CVE-2021-47553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47553">CVE-2021-47553 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47554/">CVE-2021-47554 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47554">CVE-2021-47554 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47555/">CVE-2021-47555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47555">CVE-2021-47555 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47556/">CVE-2021-47556 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47556">CVE-2021-47556 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47557/">CVE-2021-47557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47557">CVE-2021-47557 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47558/">CVE-2021-47558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47558">CVE-2021-47558 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47559/">CVE-2021-47559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47559">CVE-2021-47559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47560/">CVE-2021-47560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47560">CVE-2021-47560 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47562/">CVE-2021-47562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47562">CVE-2021-47562 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47563/">CVE-2021-47563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47563">CVE-2021-47563 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47564/">CVE-2021-47564 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47564">CVE-2021-47564 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47565/">CVE-2021-47565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47565">CVE-2021-47565 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47569/">CVE-2021-47569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47569">CVE-2021-47569 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48633/">CVE-2022-48633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48633">CVE-2022-48633 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48662/">CVE-2022-48662 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48662">CVE-2022-48662 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48669/">CVE-2022-48669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48669">CVE-2022-48669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48689/">CVE-2022-48689 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48689">CVE-2022-48689 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48691/">CVE-2022-48691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48691">CVE-2022-48691 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48699/">CVE-2022-48699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48699">CVE-2022-48699 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48705/">CVE-2022-48705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48705">CVE-2022-48705 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48708/">CVE-2022-48708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48708">CVE-2022-48708 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48709/">CVE-2022-48709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48709">CVE-2022-48709 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48710/">CVE-2022-48710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48710">CVE-2022-48710 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0160/">CVE-2023-0160 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0160">CVE-2023-0160 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1829/">CVE-2023-1829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1829">CVE-2023-1829 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42755/">CVE-2023-42755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42755">CVE-2023-42755 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47233/">CVE-2023-47233 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47233">CVE-2023-47233 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52586/">CVE-2023-52586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52586">CVE-2023-52586 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52591/">CVE-2023-52591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52591">CVE-2023-52591 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52618/">CVE-2023-52618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52618">CVE-2023-52618 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52642/">CVE-2023-52642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52642">CVE-2023-52642 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52643/">CVE-2023-52643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52643">CVE-2023-52643 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52644/">CVE-2023-52644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52644">CVE-2023-52644 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52646/">CVE-2023-52646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52646">CVE-2023-52646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52650/">CVE-2023-52650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52650">CVE-2023-52650 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52653/">CVE-2023-52653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52653">CVE-2023-52653 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52654/">CVE-2023-52654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52654">CVE-2023-52654 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52655/">CVE-2023-52655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52655">CVE-2023-52655 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52656/">CVE-2023-52656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52656">CVE-2023-52656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52657/">CVE-2023-52657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52657">CVE-2023-52657 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52659/">CVE-2023-52659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52659">CVE-2023-52659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52660/">CVE-2023-52660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52660">CVE-2023-52660 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-52661/">CVE-2023-52661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52661">CVE-2023-52661 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52662/">CVE-2023-52662 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52662">CVE-2023-52662 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52664/">CVE-2023-52664 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52664">CVE-2023-52664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52669/">CVE-2023-52669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52669">CVE-2023-52669 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52671/">CVE-2023-52671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52671">CVE-2023-52671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52674/">CVE-2023-52674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52674">CVE-2023-52674 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52676/">CVE-2023-52676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52676">CVE-2023-52676 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52678/">CVE-2023-52678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52678">CVE-2023-52678 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52679/">CVE-2023-52679 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52679">CVE-2023-52679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52680/">CVE-2023-52680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52680">CVE-2023-52680 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52683/">CVE-2023-52683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52683">CVE-2023-52683 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52685/">CVE-2023-52685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52685">CVE-2023-52685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52686/">CVE-2023-52686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52686">CVE-2023-52686 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52690/">CVE-2023-52690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52690">CVE-2023-52690 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52691/">CVE-2023-52691 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52691">CVE-2023-52691 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52692/">CVE-2023-52692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52692">CVE-2023-52692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52693/">CVE-2023-52693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52693">CVE-2023-52693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52694/">CVE-2023-52694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52694">CVE-2023-52694 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52696/">CVE-2023-52696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52696">CVE-2023-52696 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52698/">CVE-2023-52698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52698">CVE-2023-52698 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52699/">CVE-2023-52699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52699">CVE-2023-52699 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52702/">CVE-2023-52702 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52702">CVE-2023-52702 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52703/">CVE-2023-52703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52703">CVE-2023-52703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52705/">CVE-2023-52705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52705">CVE-2023-52705 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52707/">CVE-2023-52707 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52707">CVE-2023-52707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52708/">CVE-2023-52708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52708">CVE-2023-52708 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52730/">CVE-2023-52730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52730">CVE-2023-52730 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52731/">CVE-2023-52731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52731">CVE-2023-52731 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52732/">CVE-2023-52732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52732">CVE-2023-52732 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52733/">CVE-2023-52733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52733">CVE-2023-52733 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52736/">CVE-2023-52736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52736">CVE-2023-52736 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52738/">CVE-2023-52738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52738">CVE-2023-52738 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52739/">CVE-2023-52739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52739">CVE-2023-52739 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52740/">CVE-2023-52740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52740">CVE-2023-52740 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52741/">CVE-2023-52741 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52741">CVE-2023-52741 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52742/">CVE-2023-52742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52742">CVE-2023-52742 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52743/">CVE-2023-52743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52743">CVE-2023-52743 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52744/">CVE-2023-52744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52744">CVE-2023-52744 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52745/">CVE-2023-52745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52745">CVE-2023-52745 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52746/">CVE-2023-52746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52746">CVE-2023-52746 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52747/">CVE-2023-52747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52747">CVE-2023-52747 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52753/">CVE-2023-52753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52753">CVE-2023-52753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52754/">CVE-2023-52754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52754">CVE-2023-52754 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52756/">CVE-2023-52756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52756">CVE-2023-52756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52757/">CVE-2023-52757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52757">CVE-2023-52757 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52759/">CVE-2023-52759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52759">CVE-2023-52759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52763/">CVE-2023-52763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52763">CVE-2023-52763 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52764/">CVE-2023-52764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52764">CVE-2023-52764 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52766/">CVE-2023-52766 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52766">CVE-2023-52766 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52773/">CVE-2023-52773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52773">CVE-2023-52773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52774/">CVE-2023-52774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52774">CVE-2023-52774 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52777/">CVE-2023-52777 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52777">CVE-2023-52777 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52781/">CVE-2023-52781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52781">CVE-2023-52781 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52788/">CVE-2023-52788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52788">CVE-2023-52788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52789/">CVE-2023-52789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52789">CVE-2023-52789 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52791/">CVE-2023-52791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52791">CVE-2023-52791 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52795/">CVE-2023-52795 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52795">CVE-2023-52795 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52796/">CVE-2023-52796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52796">CVE-2023-52796 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52798/">CVE-2023-52798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52798">CVE-2023-52798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52799/">CVE-2023-52799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52799">CVE-2023-52799 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52800/">CVE-2023-52800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52800">CVE-2023-52800 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52803/">CVE-2023-52803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52803">CVE-2023-52803 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52804/">CVE-2023-52804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52804">CVE-2023-52804 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52805/">CVE-2023-52805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52805">CVE-2023-52805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52806/">CVE-2023-52806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52806">CVE-2023-52806 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52807/">CVE-2023-52807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52807">CVE-2023-52807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52808/">CVE-2023-52808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52808">CVE-2023-52808 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52809/">CVE-2023-52809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52809">CVE-2023-52809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52810/">CVE-2023-52810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52810">CVE-2023-52810 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52811/">CVE-2023-52811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52811">CVE-2023-52811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52814/">CVE-2023-52814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52814">CVE-2023-52814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52815/">CVE-2023-52815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52815">CVE-2023-52815 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52816/">CVE-2023-52816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52816">CVE-2023-52816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52817/">CVE-2023-52817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52817">CVE-2023-52817 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52818/">CVE-2023-52818 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52818">CVE-2023-52818 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52819/">CVE-2023-52819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52819">CVE-2023-52819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52821/">CVE-2023-52821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52821">CVE-2023-52821 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52825/">CVE-2023-52825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52825">CVE-2023-52825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52826/">CVE-2023-52826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52826">CVE-2023-52826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52832/">CVE-2023-52832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52832">CVE-2023-52832 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52833/">CVE-2023-52833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52833">CVE-2023-52833 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52834/">CVE-2023-52834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52834">CVE-2023-52834 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52838/">CVE-2023-52838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52838">CVE-2023-52838 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52840/">CVE-2023-52840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52840">CVE-2023-52840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52841/">CVE-2023-52841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52841">CVE-2023-52841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52844/">CVE-2023-52844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52844">CVE-2023-52844 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52847/">CVE-2023-52847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52847">CVE-2023-52847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52851/">CVE-2023-52851 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52851">CVE-2023-52851 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52853/">CVE-2023-52853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52853">CVE-2023-52853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52854/">CVE-2023-52854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52854">CVE-2023-52854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52855/">CVE-2023-52855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52855">CVE-2023-52855 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52856/">CVE-2023-52856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52856">CVE-2023-52856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52858/">CVE-2023-52858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52858">CVE-2023-52858 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52860/">CVE-2023-52860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52860">CVE-2023-52860 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52861/">CVE-2023-52861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52861">CVE-2023-52861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52864/">CVE-2023-52864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52864">CVE-2023-52864 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52865/">CVE-2023-52865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52865">CVE-2023-52865 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52867/">CVE-2023-52867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52867">CVE-2023-52867 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52868/">CVE-2023-52868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52868">CVE-2023-52868 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52870/">CVE-2023-52870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52870">CVE-2023-52870 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52871/">CVE-2023-52871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52871">CVE-2023-52871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52872/">CVE-2023-52872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52872">CVE-2023-52872 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52873/">CVE-2023-52873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52873">CVE-2023-52873 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52875/">CVE-2023-52875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52875">CVE-2023-52875 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52876/">CVE-2023-52876 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52876">CVE-2023-52876 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52877/">CVE-2023-52877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52877">CVE-2023-52877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52878/">CVE-2023-52878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52878">CVE-2023-52878 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52880/">CVE-2023-52880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52880">CVE-2023-52880 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6531/">CVE-2023-6531 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6531">CVE-2023-6531 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2201/">CVE-2024-2201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2201">CVE-2024-2201 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26597/">CVE-2024-26597 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26597">CVE-2024-26597 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26643/">CVE-2024-26643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26643">CVE-2024-26643 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26679/">CVE-2024-26679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26679">CVE-2024-26679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26692/">CVE-2024-26692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26692">CVE-2024-26692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26698/">CVE-2024-26698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26698">CVE-2024-26698 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26700/">CVE-2024-26700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26700">CVE-2024-26700 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26715/">CVE-2024-26715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26715">CVE-2024-26715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26739/">CVE-2024-26739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26739">CVE-2024-26739 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26742/">CVE-2024-26742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26742">CVE-2024-26742 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26748/">CVE-2024-26748 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26748">CVE-2024-26748 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26758/">CVE-2024-26758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26758">CVE-2024-26758 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26764/">CVE-2024-26764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26764">CVE-2024-26764 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26775/">CVE-2024-26775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26775">CVE-2024-26775 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26777/">CVE-2024-26777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26777">CVE-2024-26777 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26778/">CVE-2024-26778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26778">CVE-2024-26778 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26788/">CVE-2024-26788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26788">CVE-2024-26788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26791/">CVE-2024-26791 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26791">CVE-2024-26791 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26801/">CVE-2024-26801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26801">CVE-2024-26801 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26822/">CVE-2024-26822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26822">CVE-2024-26822 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26828/">CVE-2024-26828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26828">CVE-2024-26828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26829/">CVE-2024-26829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26829">CVE-2024-26829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26838/">CVE-2024-26838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26838">CVE-2024-26838 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26839/">CVE-2024-26839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26839">CVE-2024-26839 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26840/">CVE-2024-26840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26840">CVE-2024-26840 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26846/">CVE-2024-26846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26846">CVE-2024-26846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26859/">CVE-2024-26859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26859">CVE-2024-26859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26870/">CVE-2024-26870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26870">CVE-2024-26870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26874/">CVE-2024-26874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26874">CVE-2024-26874 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26876/">CVE-2024-26876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26876">CVE-2024-26876 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26877/">CVE-2024-26877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26877">CVE-2024-26877 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26880/">CVE-2024-26880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26880">CVE-2024-26880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26889/">CVE-2024-26889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26889">CVE-2024-26889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26894/">CVE-2024-26894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26894">CVE-2024-26894 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26900/">CVE-2024-26900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26900">CVE-2024-26900 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26907/">CVE-2024-26907 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26907">CVE-2024-26907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26915/">CVE-2024-26915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26915">CVE-2024-26915 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26916/">CVE-2024-26916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26916">CVE-2024-26916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26919/">CVE-2024-26919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26919">CVE-2024-26919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26920/">CVE-2024-26920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26920">CVE-2024-26920 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26921/">CVE-2024-26921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26921">CVE-2024-26921 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26922/">CVE-2024-26922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26922">CVE-2024-26922 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26925/">CVE-2024-26925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26925">CVE-2024-26925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26928/">CVE-2024-26928 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26928">CVE-2024-26928 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26929/">CVE-2024-26929 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26929">CVE-2024-26929 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26930/">CVE-2024-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26930">CVE-2024-26930 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26931/">CVE-2024-26931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26931">CVE-2024-26931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26933/">CVE-2024-26933 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26933">CVE-2024-26933 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26934/">CVE-2024-26934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26934">CVE-2024-26934 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26935/">CVE-2024-26935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26935">CVE-2024-26935 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26937/">CVE-2024-26937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26937">CVE-2024-26937 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26938/">CVE-2024-26938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26938">CVE-2024-26938 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26939/">CVE-2024-26939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26939">CVE-2024-26939 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26940/">CVE-2024-26940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26940">CVE-2024-26940 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26943/">CVE-2024-26943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26943">CVE-2024-26943 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26957/">CVE-2024-26957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26957">CVE-2024-26957 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26958/">CVE-2024-26958 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26958">CVE-2024-26958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26964/">CVE-2024-26964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26964">CVE-2024-26964 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26974/">CVE-2024-26974 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26974">CVE-2024-26974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26977/">CVE-2024-26977 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26977">CVE-2024-26977 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26979/">CVE-2024-26979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26979">CVE-2024-26979 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26984/">CVE-2024-26984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26984">CVE-2024-26984 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26988/">CVE-2024-26988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26988">CVE-2024-26988 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26989/">CVE-2024-26989 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26989">CVE-2024-26989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26994/">CVE-2024-26994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26994">CVE-2024-26994 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26996/">CVE-2024-26996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26996">CVE-2024-26996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26997/">CVE-2024-26997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26997">CVE-2024-26997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26999/">CVE-2024-26999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26999">CVE-2024-26999 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27000/">CVE-2024-27000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27000">CVE-2024-27000 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27001/">CVE-2024-27001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27001">CVE-2024-27001 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27004/">CVE-2024-27004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27004">CVE-2024-27004 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-27008/">CVE-2024-27008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27008">CVE-2024-27008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27028/">CVE-2024-27028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27028">CVE-2024-27028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27037/">CVE-2024-27037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27037">CVE-2024-27037 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-27042/">CVE-2024-27042 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27042">CVE-2024-27042 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-27045/">CVE-2024-27045 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27045">CVE-2024-27045 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27047/">CVE-2024-27047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27047">CVE-2024-27047 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27051/">CVE-2024-27051 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27051">CVE-2024-27051 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27052/">CVE-2024-27052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27052">CVE-2024-27052 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27053/">CVE-2024-27053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27053">CVE-2024-27053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27054/">CVE-2024-27054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27054">CVE-2024-27054 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27059/">CVE-2024-27059 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27059">CVE-2024-27059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27072/">CVE-2024-27072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27072">CVE-2024-27072 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27073/">CVE-2024-27073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27073">CVE-2024-27073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27074/">CVE-2024-27074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27074">CVE-2024-27074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27075/">CVE-2024-27075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27075">CVE-2024-27075 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27076/">CVE-2024-27076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27076">CVE-2024-27076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27077/">CVE-2024-27077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27077">CVE-2024-27077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27078/">CVE-2024-27078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27078">CVE-2024-27078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27388/">CVE-2024-27388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27388">CVE-2024-27388 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27393/">CVE-2024-27393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27393">CVE-2024-27393 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27395/">CVE-2024-27395 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27395">CVE-2024-27395 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27396/">CVE-2024-27396 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27396">CVE-2024-27396 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27398/">CVE-2024-27398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27398">CVE-2024-27398 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27399/">CVE-2024-27399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27399">CVE-2024-27399 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27400/">CVE-2024-27400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27400">CVE-2024-27400 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27401/">CVE-2024-27401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27401">CVE-2024-27401 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27405/">CVE-2024-27405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27405">CVE-2024-27405 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27410/">CVE-2024-27410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27410">CVE-2024-27410 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27412/">CVE-2024-27412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27412">CVE-2024-27412 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27413/">CVE-2024-27413 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27413">CVE-2024-27413 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27416/">CVE-2024-27416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27416">CVE-2024-27416 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27417/">CVE-2024-27417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27417">CVE-2024-27417 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-27419/">CVE-2024-27419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27419">CVE-2024-27419 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27431/">CVE-2024-27431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27431">CVE-2024-27431 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27435/">CVE-2024-27435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27435">CVE-2024-27435 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27436/">CVE-2024-27436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27436">CVE-2024-27436 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35789/">CVE-2024-35789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35789">CVE-2024-35789 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35791/">CVE-2024-35791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35791">CVE-2024-35791 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35796/">CVE-2024-35796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35796">CVE-2024-35796 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35799/">CVE-2024-35799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35799">CVE-2024-35799 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35801/">CVE-2024-35801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35801">CVE-2024-35801 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35804/">CVE-2024-35804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35804">CVE-2024-35804 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35806/">CVE-2024-35806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35806">CVE-2024-35806 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35809/">CVE-2024-35809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35809">CVE-2024-35809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35811/">CVE-2024-35811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35811">CVE-2024-35811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35812/">CVE-2024-35812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35812">CVE-2024-35812 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35813/">CVE-2024-35813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35813">CVE-2024-35813 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35815/">CVE-2024-35815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35815">CVE-2024-35815 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35817/">CVE-2024-35817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35817">CVE-2024-35817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35821/">CVE-2024-35821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35821">CVE-2024-35821 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35822/">CVE-2024-35822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35822">CVE-2024-35822 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35823/">CVE-2024-35823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35823">CVE-2024-35823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35825/">CVE-2024-35825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35825">CVE-2024-35825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35828/">CVE-2024-35828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35828">CVE-2024-35828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35829/">CVE-2024-35829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35829">CVE-2024-35829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35830/">CVE-2024-35830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35830">CVE-2024-35830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35833/">CVE-2024-35833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35833">CVE-2024-35833 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35845/">CVE-2024-35845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35845">CVE-2024-35845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35847/">CVE-2024-35847 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35847">CVE-2024-35847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35849/">CVE-2024-35849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35849">CVE-2024-35849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35851/">CVE-2024-35851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35851">CVE-2024-35851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35852/">CVE-2024-35852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35852">CVE-2024-35852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35854/">CVE-2024-35854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35854">CVE-2024-35854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35860/">CVE-2024-35860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35860">CVE-2024-35860 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35861/">CVE-2024-35861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35861">CVE-2024-35861 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35862/">CVE-2024-35862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35862">CVE-2024-35862 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35863/">CVE-2024-35863 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35863">CVE-2024-35863 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35864/">CVE-2024-35864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35864">CVE-2024-35864 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35865/">CVE-2024-35865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35865">CVE-2024-35865 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35866/">CVE-2024-35866 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35866">CVE-2024-35866 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35867/">CVE-2024-35867 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35867">CVE-2024-35867 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35868/">CVE-2024-35868 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35868">CVE-2024-35868 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35869/">CVE-2024-35869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35869">CVE-2024-35869 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35870/">CVE-2024-35870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35870">CVE-2024-35870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35872/">CVE-2024-35872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35872">CVE-2024-35872 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35875/">CVE-2024-35875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35875">CVE-2024-35875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35877/">CVE-2024-35877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35877">CVE-2024-35877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35878/">CVE-2024-35878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35878">CVE-2024-35878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35879/">CVE-2024-35879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35879">CVE-2024-35879 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35885/">CVE-2024-35885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35885">CVE-2024-35885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35887/">CVE-2024-35887 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35887">CVE-2024-35887 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35895/">CVE-2024-35895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35895">CVE-2024-35895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35901/">CVE-2024-35901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35901">CVE-2024-35901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35904/">CVE-2024-35904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35904">CVE-2024-35904 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35905/">CVE-2024-35905 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35905">CVE-2024-35905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35907/">CVE-2024-35907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35907">CVE-2024-35907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35912/">CVE-2024-35912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35912">CVE-2024-35912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-35914/">CVE-2024-35914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35914">CVE-2024-35914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35915/">CVE-2024-35915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35915">CVE-2024-35915 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35922/">CVE-2024-35922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35922">CVE-2024-35922 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35924/">CVE-2024-35924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35924">CVE-2024-35924 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35930/">CVE-2024-35930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35930">CVE-2024-35930 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35932/">CVE-2024-35932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35932">CVE-2024-35932 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35933/">CVE-2024-35933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35933">CVE-2024-35933 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35935/">CVE-2024-35935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35935">CVE-2024-35935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35936/">CVE-2024-35936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35936">CVE-2024-35936 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35938/">CVE-2024-35938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35938">CVE-2024-35938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35939/">CVE-2024-35939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35939">CVE-2024-35939 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35940/">CVE-2024-35940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35940">CVE-2024-35940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35943/">CVE-2024-35943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35943">CVE-2024-35943 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-35944/">CVE-2024-35944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35944">CVE-2024-35944 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35947/">CVE-2024-35947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35947">CVE-2024-35947 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35950/">CVE-2024-35950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35950">CVE-2024-35950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35951/">CVE-2024-35951 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35951">CVE-2024-35951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35952/">CVE-2024-35952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35952">CVE-2024-35952 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35955/">CVE-2024-35955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35955">CVE-2024-35955 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35959/">CVE-2024-35959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35959">CVE-2024-35959 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35963/">CVE-2024-35963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35963">CVE-2024-35963 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35964/">CVE-2024-35964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35964">CVE-2024-35964 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35965/">CVE-2024-35965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35965">CVE-2024-35965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35966/">CVE-2024-35966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35966">CVE-2024-35966 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35967/">CVE-2024-35967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35967">CVE-2024-35967 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35969/">CVE-2024-35969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35969">CVE-2024-35969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35973/">CVE-2024-35973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35973">CVE-2024-35973 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35976/">CVE-2024-35976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35976">CVE-2024-35976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35978/">CVE-2024-35978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35978">CVE-2024-35978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35982/">CVE-2024-35982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35982">CVE-2024-35982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35984/">CVE-2024-35984 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35984">CVE-2024-35984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35989/">CVE-2024-35989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35989">CVE-2024-35989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35990/">CVE-2024-35990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35990">CVE-2024-35990 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35998/">CVE-2024-35998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35998">CVE-2024-35998 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-35999/">CVE-2024-35999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35999">CVE-2024-35999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36006/">CVE-2024-36006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36006">CVE-2024-36006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36007/">CVE-2024-36007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36007">CVE-2024-36007 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36012/">CVE-2024-36012 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36012">CVE-2024-36012 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36014/">CVE-2024-36014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36014">CVE-2024-36014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36015/">CVE-2024-36015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36015">CVE-2024-36015 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36016/">CVE-2024-36016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36016">CVE-2024-36016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36026/">CVE-2024-36026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36026">CVE-2024-36026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36029/">CVE-2024-36029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36029">CVE-2024-36029 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36032/">CVE-2024-36032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36032">CVE-2024-36032 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36880/">CVE-2024-36880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36880">CVE-2024-36880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36893/">CVE-2024-36893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36893">CVE-2024-36893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36896/">CVE-2024-36896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36896">CVE-2024-36896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36897/">CVE-2024-36897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36897">CVE-2024-36897 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36906/">CVE-2024-36906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36906">CVE-2024-36906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36918/">CVE-2024-36918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36918">CVE-2024-36918 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36924/">CVE-2024-36924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36924">CVE-2024-36924 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36926/">CVE-2024-36926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36926">CVE-2024-36926 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36928/">CVE-2024-36928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36928">CVE-2024-36928 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36931/">CVE-2024-36931 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36931">CVE-2024-36931 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36938/">CVE-2024-36938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36938">CVE-2024-36938 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36940/">CVE-2024-36940 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36940">CVE-2024-36940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36941/">CVE-2024-36941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36941">CVE-2024-36941 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36942/">CVE-2024-36942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36942">CVE-2024-36942 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36944/">CVE-2024-36944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36944">CVE-2024-36944 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36947/">CVE-2024-36947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36947">CVE-2024-36947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36950/">CVE-2024-36950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36950">CVE-2024-36950 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36952/">CVE-2024-36952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36952">CVE-2024-36952 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36955/">CVE-2024-36955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36955">CVE-2024-36955 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36959/">CVE-2024-36959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36959">CVE-2024-36959 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865615" comment="cluster-md-kmp-rt-5.14.21-150500.13.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865616" comment="dlm-kmp-rt-5.14.21-150500.13.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865617" comment="gfs2-kmp-rt-5.14.21-150500.13.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865618" comment="kernel-devel-rt-5.14.21-150500.13.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865619" comment="kernel-rt-5.14.21-150500.13.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865620" comment="kernel-rt-devel-5.14.21-150500.13.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865621" comment="kernel-rt-extra-5.14.21-150500.13.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865622" comment="kernel-rt-livepatch-5.14.21-150500.13.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865623" comment="kernel-rt-livepatch-devel-5.14.21-150500.13.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865624" comment="kernel-rt-optional-5.14.21-150500.13.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865625" comment="kernel-rt-vdso-5.14.21-150500.13.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865626" comment="kernel-rt_debug-5.14.21-150500.13.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865627" comment="kernel-rt_debug-devel-5.14.21-150500.13.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865628" comment="kernel-rt_debug-livepatch-devel-5.14.21-150500.13.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865629" comment="kernel-rt_debug-vdso-5.14.21-150500.13.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865630" comment="kernel-source-rt-5.14.21-150500.13.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865631" comment="kernel-syms-rt-5.14.21-150500.13.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865632" comment="kselftests-kmp-rt-5.14.21-150500.13.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865633" comment="ocfs2-kmp-rt-5.14.21-150500.13.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865634" comment="reiserfs-kmp-rt-5.14.21-150500.13.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4788" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1141539" ref_url="https://bugzilla.suse.com/1141539" source="BUGZILLA"/>
		<reference ref_id="1174585" ref_url="https://bugzilla.suse.com/1174585" source="BUGZILLA"/>
		<reference ref_id="1181674" ref_url="https://bugzilla.suse.com/1181674" source="BUGZILLA"/>
		<reference ref_id="1187716" ref_url="https://bugzilla.suse.com/1187716" source="BUGZILLA"/>
		<reference ref_id="1190569" ref_url="https://bugzilla.suse.com/1190569" source="BUGZILLA"/>
		<reference ref_id="1191949" ref_url="https://bugzilla.suse.com/1191949" source="BUGZILLA"/>
		<reference ref_id="1192107" ref_url="https://bugzilla.suse.com/1192107" source="BUGZILLA"/>
		<reference ref_id="1193983" ref_url="https://bugzilla.suse.com/1193983" source="BUGZILLA"/>
		<reference ref_id="1194288" ref_url="https://bugzilla.suse.com/1194288" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1196956" ref_url="https://bugzilla.suse.com/1196956" source="BUGZILLA"/>
		<reference ref_id="1197915" ref_url="https://bugzilla.suse.com/1197915" source="BUGZILLA"/>
		<reference ref_id="1200465" ref_url="https://bugzilla.suse.com/1200465" source="BUGZILLA"/>
		<reference ref_id="1205205" ref_url="https://bugzilla.suse.com/1205205" source="BUGZILLA"/>
		<reference ref_id="1207284" ref_url="https://bugzilla.suse.com/1207284" source="BUGZILLA"/>
		<reference ref_id="1207361" ref_url="https://bugzilla.suse.com/1207361" source="BUGZILLA"/>
		<reference ref_id="1207948" ref_url="https://bugzilla.suse.com/1207948" source="BUGZILLA"/>
		<reference ref_id="1208149" ref_url="https://bugzilla.suse.com/1208149" source="BUGZILLA"/>
		<reference ref_id="1209657" ref_url="https://bugzilla.suse.com/1209657" source="BUGZILLA"/>
		<reference ref_id="1209799" ref_url="https://bugzilla.suse.com/1209799" source="BUGZILLA"/>
		<reference ref_id="1209834" ref_url="https://bugzilla.suse.com/1209834" source="BUGZILLA"/>
		<reference ref_id="1209980" ref_url="https://bugzilla.suse.com/1209980" source="BUGZILLA"/>
		<reference ref_id="1210335" ref_url="https://bugzilla.suse.com/1210335" source="BUGZILLA"/>
		<reference ref_id="1213863" ref_url="https://bugzilla.suse.com/1213863" source="BUGZILLA"/>
		<reference ref_id="1214852" ref_url="https://bugzilla.suse.com/1214852" source="BUGZILLA"/>
		<reference ref_id="1215322" ref_url="https://bugzilla.suse.com/1215322" source="BUGZILLA"/>
		<reference ref_id="1215702" ref_url="https://bugzilla.suse.com/1215702" source="BUGZILLA"/>
		<reference ref_id="1216358" ref_url="https://bugzilla.suse.com/1216358" source="BUGZILLA"/>
		<reference ref_id="1216702" ref_url="https://bugzilla.suse.com/1216702" source="BUGZILLA"/>
		<reference ref_id="1217169" ref_url="https://bugzilla.suse.com/1217169" source="BUGZILLA"/>
		<reference ref_id="1217515" ref_url="https://bugzilla.suse.com/1217515" source="BUGZILLA"/>
		<reference ref_id="1218447" ref_url="https://bugzilla.suse.com/1218447" source="BUGZILLA"/>
		<reference ref_id="1220021" ref_url="https://bugzilla.suse.com/1220021" source="BUGZILLA"/>
		<reference ref_id="1220363" ref_url="https://bugzilla.suse.com/1220363" source="BUGZILLA"/>
		<reference ref_id="1220783" ref_url="https://bugzilla.suse.com/1220783" source="BUGZILLA"/>
		<reference ref_id="1221044" ref_url="https://bugzilla.suse.com/1221044" source="BUGZILLA"/>
		<reference ref_id="1221081" ref_url="https://bugzilla.suse.com/1221081" source="BUGZILLA"/>
		<reference ref_id="1221615" ref_url="https://bugzilla.suse.com/1221615" source="BUGZILLA"/>
		<reference ref_id="1221777" ref_url="https://bugzilla.suse.com/1221777" source="BUGZILLA"/>
		<reference ref_id="1221816" ref_url="https://bugzilla.suse.com/1221816" source="BUGZILLA"/>
		<reference ref_id="1221829" ref_url="https://bugzilla.suse.com/1221829" source="BUGZILLA"/>
		<reference ref_id="1222011" ref_url="https://bugzilla.suse.com/1222011" source="BUGZILLA"/>
		<reference ref_id="1222374" ref_url="https://bugzilla.suse.com/1222374" source="BUGZILLA"/>
		<reference ref_id="1222413" ref_url="https://bugzilla.suse.com/1222413" source="BUGZILLA"/>
		<reference ref_id="1222464" ref_url="https://bugzilla.suse.com/1222464" source="BUGZILLA"/>
		<reference ref_id="1222513" ref_url="https://bugzilla.suse.com/1222513" source="BUGZILLA"/>
		<reference ref_id="1222561" ref_url="https://bugzilla.suse.com/1222561" source="BUGZILLA"/>
		<reference ref_id="1222608" ref_url="https://bugzilla.suse.com/1222608" source="BUGZILLA"/>
		<reference ref_id="1222619" ref_url="https://bugzilla.suse.com/1222619" source="BUGZILLA"/>
		<reference ref_id="1222627" ref_url="https://bugzilla.suse.com/1222627" source="BUGZILLA"/>
		<reference ref_id="1222721" ref_url="https://bugzilla.suse.com/1222721" source="BUGZILLA"/>
		<reference ref_id="1222765" ref_url="https://bugzilla.suse.com/1222765" source="BUGZILLA"/>
		<reference ref_id="1222770" ref_url="https://bugzilla.suse.com/1222770" source="BUGZILLA"/>
		<reference ref_id="1222783" ref_url="https://bugzilla.suse.com/1222783" source="BUGZILLA"/>
		<reference ref_id="1222893" ref_url="https://bugzilla.suse.com/1222893" source="BUGZILLA"/>
		<reference ref_id="1222960" ref_url="https://bugzilla.suse.com/1222960" source="BUGZILLA"/>
		<reference ref_id="1222961" ref_url="https://bugzilla.suse.com/1222961" source="BUGZILLA"/>
		<reference ref_id="1222974" ref_url="https://bugzilla.suse.com/1222974" source="BUGZILLA"/>
		<reference ref_id="1222975" ref_url="https://bugzilla.suse.com/1222975" source="BUGZILLA"/>
		<reference ref_id="1223011" ref_url="https://bugzilla.suse.com/1223011" source="BUGZILLA"/>
		<reference ref_id="1223023" ref_url="https://bugzilla.suse.com/1223023" source="BUGZILLA"/>
		<reference ref_id="1223027" ref_url="https://bugzilla.suse.com/1223027" source="BUGZILLA"/>
		<reference ref_id="1223031" ref_url="https://bugzilla.suse.com/1223031" source="BUGZILLA"/>
		<reference ref_id="1223043" ref_url="https://bugzilla.suse.com/1223043" source="BUGZILLA"/>
		<reference ref_id="1223046" ref_url="https://bugzilla.suse.com/1223046" source="BUGZILLA"/>
		<reference ref_id="1223048" ref_url="https://bugzilla.suse.com/1223048" source="BUGZILLA"/>
		<reference ref_id="1223049" ref_url="https://bugzilla.suse.com/1223049" source="BUGZILLA"/>
		<reference ref_id="1223084" ref_url="https://bugzilla.suse.com/1223084" source="BUGZILLA"/>
		<reference ref_id="1223113" ref_url="https://bugzilla.suse.com/1223113" source="BUGZILLA"/>
		<reference ref_id="1223137" ref_url="https://bugzilla.suse.com/1223137" source="BUGZILLA"/>
		<reference ref_id="1223138" ref_url="https://bugzilla.suse.com/1223138" source="BUGZILLA"/>
		<reference ref_id="1223188" ref_url="https://bugzilla.suse.com/1223188" source="BUGZILLA"/>
		<reference ref_id="1223203" ref_url="https://bugzilla.suse.com/1223203" source="BUGZILLA"/>
		<reference ref_id="1223315" ref_url="https://bugzilla.suse.com/1223315" source="BUGZILLA"/>
		<reference ref_id="1223384" ref_url="https://bugzilla.suse.com/1223384" source="BUGZILLA"/>
		<reference ref_id="1223390" ref_url="https://bugzilla.suse.com/1223390" source="BUGZILLA"/>
		<reference ref_id="1223489" ref_url="https://bugzilla.suse.com/1223489" source="BUGZILLA"/>
		<reference ref_id="1223532" ref_url="https://bugzilla.suse.com/1223532" source="BUGZILLA"/>
		<reference ref_id="1223575" ref_url="https://bugzilla.suse.com/1223575" source="BUGZILLA"/>
		<reference ref_id="1223595" ref_url="https://bugzilla.suse.com/1223595" source="BUGZILLA"/>
		<reference ref_id="1223626" ref_url="https://bugzilla.suse.com/1223626" source="BUGZILLA"/>
		<reference ref_id="1223627" ref_url="https://bugzilla.suse.com/1223627" source="BUGZILLA"/>
		<reference ref_id="1223631" ref_url="https://bugzilla.suse.com/1223631" source="BUGZILLA"/>
		<reference ref_id="1223633" ref_url="https://bugzilla.suse.com/1223633" source="BUGZILLA"/>
		<reference ref_id="1223638" ref_url="https://bugzilla.suse.com/1223638" source="BUGZILLA"/>
		<reference ref_id="1223650" ref_url="https://bugzilla.suse.com/1223650" source="BUGZILLA"/>
		<reference ref_id="1223653" ref_url="https://bugzilla.suse.com/1223653" source="BUGZILLA"/>
		<reference ref_id="1223666" ref_url="https://bugzilla.suse.com/1223666" source="BUGZILLA"/>
		<reference ref_id="1223671" ref_url="https://bugzilla.suse.com/1223671" source="BUGZILLA"/>
		<reference ref_id="1223675" ref_url="https://bugzilla.suse.com/1223675" source="BUGZILLA"/>
		<reference ref_id="1223677" ref_url="https://bugzilla.suse.com/1223677" source="BUGZILLA"/>
		<reference ref_id="1223678" ref_url="https://bugzilla.suse.com/1223678" source="BUGZILLA"/>
		<reference ref_id="1223698" ref_url="https://bugzilla.suse.com/1223698" source="BUGZILLA"/>
		<reference ref_id="1223712" ref_url="https://bugzilla.suse.com/1223712" source="BUGZILLA"/>
		<reference ref_id="1223715" ref_url="https://bugzilla.suse.com/1223715" source="BUGZILLA"/>
		<reference ref_id="1223717" ref_url="https://bugzilla.suse.com/1223717" source="BUGZILLA"/>
		<reference ref_id="1223718" ref_url="https://bugzilla.suse.com/1223718" source="BUGZILLA"/>
		<reference ref_id="1223737" ref_url="https://bugzilla.suse.com/1223737" source="BUGZILLA"/>
		<reference ref_id="1223741" ref_url="https://bugzilla.suse.com/1223741" source="BUGZILLA"/>
		<reference ref_id="1223744" ref_url="https://bugzilla.suse.com/1223744" source="BUGZILLA"/>
		<reference ref_id="1223747" ref_url="https://bugzilla.suse.com/1223747" source="BUGZILLA"/>
		<reference ref_id="1223748" ref_url="https://bugzilla.suse.com/1223748" source="BUGZILLA"/>
		<reference ref_id="1223750" ref_url="https://bugzilla.suse.com/1223750" source="BUGZILLA"/>
		<reference ref_id="1223752" ref_url="https://bugzilla.suse.com/1223752" source="BUGZILLA"/>
		<reference ref_id="1223754" ref_url="https://bugzilla.suse.com/1223754" source="BUGZILLA"/>
		<reference ref_id="1223756" ref_url="https://bugzilla.suse.com/1223756" source="BUGZILLA"/>
		<reference ref_id="1223757" ref_url="https://bugzilla.suse.com/1223757" source="BUGZILLA"/>
		<reference ref_id="1223762" ref_url="https://bugzilla.suse.com/1223762" source="BUGZILLA"/>
		<reference ref_id="1223769" ref_url="https://bugzilla.suse.com/1223769" source="BUGZILLA"/>
		<reference ref_id="1223770" ref_url="https://bugzilla.suse.com/1223770" source="BUGZILLA"/>
		<reference ref_id="1223779" ref_url="https://bugzilla.suse.com/1223779" source="BUGZILLA"/>
		<reference ref_id="1223780" ref_url="https://bugzilla.suse.com/1223780" source="BUGZILLA"/>
		<reference ref_id="1223781" ref_url="https://bugzilla.suse.com/1223781" source="BUGZILLA"/>
		<reference ref_id="1223788" ref_url="https://bugzilla.suse.com/1223788" source="BUGZILLA"/>
		<reference ref_id="1223802" ref_url="https://bugzilla.suse.com/1223802" source="BUGZILLA"/>
		<reference ref_id="1223819" ref_url="https://bugzilla.suse.com/1223819" source="BUGZILLA"/>
		<reference ref_id="1223826" ref_url="https://bugzilla.suse.com/1223826" source="BUGZILLA"/>
		<reference ref_id="1223828" ref_url="https://bugzilla.suse.com/1223828" source="BUGZILLA"/>
		<reference ref_id="1223829" ref_url="https://bugzilla.suse.com/1223829" source="BUGZILLA"/>
		<reference ref_id="1223837" ref_url="https://bugzilla.suse.com/1223837" source="BUGZILLA"/>
		<reference ref_id="1223842" ref_url="https://bugzilla.suse.com/1223842" source="BUGZILLA"/>
		<reference ref_id="1223843" ref_url="https://bugzilla.suse.com/1223843" source="BUGZILLA"/>
		<reference ref_id="1223844" ref_url="https://bugzilla.suse.com/1223844" source="BUGZILLA"/>
		<reference ref_id="1223847" ref_url="https://bugzilla.suse.com/1223847" source="BUGZILLA"/>
		<reference ref_id="1223858" ref_url="https://bugzilla.suse.com/1223858" source="BUGZILLA"/>
		<reference ref_id="1223875" ref_url="https://bugzilla.suse.com/1223875" source="BUGZILLA"/>
		<reference ref_id="1223879" ref_url="https://bugzilla.suse.com/1223879" source="BUGZILLA"/>
		<reference ref_id="1223895" ref_url="https://bugzilla.suse.com/1223895" source="BUGZILLA"/>
		<reference ref_id="1223959" ref_url="https://bugzilla.suse.com/1223959" source="BUGZILLA"/>
		<reference ref_id="1223961" ref_url="https://bugzilla.suse.com/1223961" source="BUGZILLA"/>
		<reference ref_id="1223991" ref_url="https://bugzilla.suse.com/1223991" source="BUGZILLA"/>
		<reference ref_id="1224020" ref_url="https://bugzilla.suse.com/1224020" source="BUGZILLA"/>
		<reference ref_id="1224076" ref_url="https://bugzilla.suse.com/1224076" source="BUGZILLA"/>
		<reference ref_id="1224096" ref_url="https://bugzilla.suse.com/1224096" source="BUGZILLA"/>
		<reference ref_id="1224098" ref_url="https://bugzilla.suse.com/1224098" source="BUGZILLA"/>
		<reference ref_id="1224099" ref_url="https://bugzilla.suse.com/1224099" source="BUGZILLA"/>
		<reference ref_id="1224137" ref_url="https://bugzilla.suse.com/1224137" source="BUGZILLA"/>
		<reference ref_id="1224166" ref_url="https://bugzilla.suse.com/1224166" source="BUGZILLA"/>
		<reference ref_id="1224174" ref_url="https://bugzilla.suse.com/1224174" source="BUGZILLA"/>
		<reference ref_id="1224177" ref_url="https://bugzilla.suse.com/1224177" source="BUGZILLA"/>
		<reference ref_id="1224180" ref_url="https://bugzilla.suse.com/1224180" source="BUGZILLA"/>
		<reference ref_id="1224181" ref_url="https://bugzilla.suse.com/1224181" source="BUGZILLA"/>
		<reference ref_id="1224187" ref_url="https://bugzilla.suse.com/1224187" source="BUGZILLA"/>
		<reference ref_id="1224331" ref_url="https://bugzilla.suse.com/1224331" source="BUGZILLA"/>
		<reference ref_id="1224346" ref_url="https://bugzilla.suse.com/1224346" source="BUGZILLA"/>
		<reference ref_id="1224423" ref_url="https://bugzilla.suse.com/1224423" source="BUGZILLA"/>
		<reference ref_id="1224432" ref_url="https://bugzilla.suse.com/1224432" source="BUGZILLA"/>
		<reference ref_id="1224437" ref_url="https://bugzilla.suse.com/1224437" source="BUGZILLA"/>
		<reference ref_id="1224438" ref_url="https://bugzilla.suse.com/1224438" source="BUGZILLA"/>
		<reference ref_id="1224442" ref_url="https://bugzilla.suse.com/1224442" source="BUGZILLA"/>
		<reference ref_id="1224443" ref_url="https://bugzilla.suse.com/1224443" source="BUGZILLA"/>
		<reference ref_id="1224445" ref_url="https://bugzilla.suse.com/1224445" source="BUGZILLA"/>
		<reference ref_id="1224449" ref_url="https://bugzilla.suse.com/1224449" source="BUGZILLA"/>
		<reference ref_id="1224479" ref_url="https://bugzilla.suse.com/1224479" source="BUGZILLA"/>
		<reference ref_id="1224482" ref_url="https://bugzilla.suse.com/1224482" source="BUGZILLA"/>
		<reference ref_id="1224487" ref_url="https://bugzilla.suse.com/1224487" source="BUGZILLA"/>
		<reference ref_id="1224488" ref_url="https://bugzilla.suse.com/1224488" source="BUGZILLA"/>
		<reference ref_id="1224492" ref_url="https://bugzilla.suse.com/1224492" source="BUGZILLA"/>
		<reference ref_id="1224494" ref_url="https://bugzilla.suse.com/1224494" source="BUGZILLA"/>
		<reference ref_id="1224495" ref_url="https://bugzilla.suse.com/1224495" source="BUGZILLA"/>
		<reference ref_id="1224502" ref_url="https://bugzilla.suse.com/1224502" source="BUGZILLA"/>
		<reference ref_id="1224508" ref_url="https://bugzilla.suse.com/1224508" source="BUGZILLA"/>
		<reference ref_id="1224509" ref_url="https://bugzilla.suse.com/1224509" source="BUGZILLA"/>
		<reference ref_id="1224511" ref_url="https://bugzilla.suse.com/1224511" source="BUGZILLA"/>
		<reference ref_id="1224519" ref_url="https://bugzilla.suse.com/1224519" source="BUGZILLA"/>
		<reference ref_id="1224524" ref_url="https://bugzilla.suse.com/1224524" source="BUGZILLA"/>
		<reference ref_id="1224525" ref_url="https://bugzilla.suse.com/1224525" source="BUGZILLA"/>
		<reference ref_id="1224530" ref_url="https://bugzilla.suse.com/1224530" source="BUGZILLA"/>
		<reference ref_id="1224531" ref_url="https://bugzilla.suse.com/1224531" source="BUGZILLA"/>
		<reference ref_id="1224534" ref_url="https://bugzilla.suse.com/1224534" source="BUGZILLA"/>
		<reference ref_id="1224535" ref_url="https://bugzilla.suse.com/1224535" source="BUGZILLA"/>
		<reference ref_id="1224537" ref_url="https://bugzilla.suse.com/1224537" source="BUGZILLA"/>
		<reference ref_id="1224541" ref_url="https://bugzilla.suse.com/1224541" source="BUGZILLA"/>
		<reference ref_id="1224543" ref_url="https://bugzilla.suse.com/1224543" source="BUGZILLA"/>
		<reference ref_id="1224549" ref_url="https://bugzilla.suse.com/1224549" source="BUGZILLA"/>
		<reference ref_id="1224550" ref_url="https://bugzilla.suse.com/1224550" source="BUGZILLA"/>
		<reference ref_id="1224558" ref_url="https://bugzilla.suse.com/1224558" source="BUGZILLA"/>
		<reference ref_id="1224559" ref_url="https://bugzilla.suse.com/1224559" source="BUGZILLA"/>
		<reference ref_id="1224566" ref_url="https://bugzilla.suse.com/1224566" source="BUGZILLA"/>
		<reference ref_id="1224567" ref_url="https://bugzilla.suse.com/1224567" source="BUGZILLA"/>
		<reference ref_id="1224571" ref_url="https://bugzilla.suse.com/1224571" source="BUGZILLA"/>
		<reference ref_id="1224575" ref_url="https://bugzilla.suse.com/1224575" source="BUGZILLA"/>
		<reference ref_id="1224576" ref_url="https://bugzilla.suse.com/1224576" source="BUGZILLA"/>
		<reference ref_id="1224579" ref_url="https://bugzilla.suse.com/1224579" source="BUGZILLA"/>
		<reference ref_id="1224580" ref_url="https://bugzilla.suse.com/1224580" source="BUGZILLA"/>
		<reference ref_id="1224581" ref_url="https://bugzilla.suse.com/1224581" source="BUGZILLA"/>
		<reference ref_id="1224582" ref_url="https://bugzilla.suse.com/1224582" source="BUGZILLA"/>
		<reference ref_id="1224586" ref_url="https://bugzilla.suse.com/1224586" source="BUGZILLA"/>
		<reference ref_id="1224587" ref_url="https://bugzilla.suse.com/1224587" source="BUGZILLA"/>
		<reference ref_id="1224592" ref_url="https://bugzilla.suse.com/1224592" source="BUGZILLA"/>
		<reference ref_id="1224598" ref_url="https://bugzilla.suse.com/1224598" source="BUGZILLA"/>
		<reference ref_id="1224601" ref_url="https://bugzilla.suse.com/1224601" source="BUGZILLA"/>
		<reference ref_id="1224607" ref_url="https://bugzilla.suse.com/1224607" source="BUGZILLA"/>
		<reference ref_id="1224608" ref_url="https://bugzilla.suse.com/1224608" source="BUGZILLA"/>
		<reference ref_id="1224611" ref_url="https://bugzilla.suse.com/1224611" source="BUGZILLA"/>
		<reference ref_id="1224615" ref_url="https://bugzilla.suse.com/1224615" source="BUGZILLA"/>
		<reference ref_id="1224617" ref_url="https://bugzilla.suse.com/1224617" source="BUGZILLA"/>
		<reference ref_id="1224618" ref_url="https://bugzilla.suse.com/1224618" source="BUGZILLA"/>
		<reference ref_id="1224621" ref_url="https://bugzilla.suse.com/1224621" source="BUGZILLA"/>
		<reference ref_id="1224622" ref_url="https://bugzilla.suse.com/1224622" source="BUGZILLA"/>
		<reference ref_id="1224624" ref_url="https://bugzilla.suse.com/1224624" source="BUGZILLA"/>
		<reference ref_id="1224627" ref_url="https://bugzilla.suse.com/1224627" source="BUGZILLA"/>
		<reference ref_id="1224628" ref_url="https://bugzilla.suse.com/1224628" source="BUGZILLA"/>
		<reference ref_id="1224629" ref_url="https://bugzilla.suse.com/1224629" source="BUGZILLA"/>
		<reference ref_id="1224632" ref_url="https://bugzilla.suse.com/1224632" source="BUGZILLA"/>
		<reference ref_id="1224636" ref_url="https://bugzilla.suse.com/1224636" source="BUGZILLA"/>
		<reference ref_id="1224637" ref_url="https://bugzilla.suse.com/1224637" source="BUGZILLA"/>
		<reference ref_id="1224638" ref_url="https://bugzilla.suse.com/1224638" source="BUGZILLA"/>
		<reference ref_id="1224640" ref_url="https://bugzilla.suse.com/1224640" source="BUGZILLA"/>
		<reference ref_id="1224643" ref_url="https://bugzilla.suse.com/1224643" source="BUGZILLA"/>
		<reference ref_id="1224644" ref_url="https://bugzilla.suse.com/1224644" source="BUGZILLA"/>
		<reference ref_id="1224645" ref_url="https://bugzilla.suse.com/1224645" source="BUGZILLA"/>
		<reference ref_id="1224647" ref_url="https://bugzilla.suse.com/1224647" source="BUGZILLA"/>
		<reference ref_id="1224648" ref_url="https://bugzilla.suse.com/1224648" source="BUGZILLA"/>
		<reference ref_id="1224649" ref_url="https://bugzilla.suse.com/1224649" source="BUGZILLA"/>
		<reference ref_id="1224650" ref_url="https://bugzilla.suse.com/1224650" source="BUGZILLA"/>
		<reference ref_id="1224651" ref_url="https://bugzilla.suse.com/1224651" source="BUGZILLA"/>
		<reference ref_id="1224657" ref_url="https://bugzilla.suse.com/1224657" source="BUGZILLA"/>
		<reference ref_id="1224659" ref_url="https://bugzilla.suse.com/1224659" source="BUGZILLA"/>
		<reference ref_id="1224660" ref_url="https://bugzilla.suse.com/1224660" source="BUGZILLA"/>
		<reference ref_id="1224663" ref_url="https://bugzilla.suse.com/1224663" source="BUGZILLA"/>
		<reference ref_id="1224664" ref_url="https://bugzilla.suse.com/1224664" source="BUGZILLA"/>
		<reference ref_id="1224665" ref_url="https://bugzilla.suse.com/1224665" source="BUGZILLA"/>
		<reference ref_id="1224666" ref_url="https://bugzilla.suse.com/1224666" source="BUGZILLA"/>
		<reference ref_id="1224667" ref_url="https://bugzilla.suse.com/1224667" source="BUGZILLA"/>
		<reference ref_id="1224668" ref_url="https://bugzilla.suse.com/1224668" source="BUGZILLA"/>
		<reference ref_id="1224671" ref_url="https://bugzilla.suse.com/1224671" source="BUGZILLA"/>
		<reference ref_id="1224672" ref_url="https://bugzilla.suse.com/1224672" source="BUGZILLA"/>
		<reference ref_id="1224676" ref_url="https://bugzilla.suse.com/1224676" source="BUGZILLA"/>
		<reference ref_id="1224678" ref_url="https://bugzilla.suse.com/1224678" source="BUGZILLA"/>
		<reference ref_id="1224679" ref_url="https://bugzilla.suse.com/1224679" source="BUGZILLA"/>
		<reference ref_id="1224680" ref_url="https://bugzilla.suse.com/1224680" source="BUGZILLA"/>
		<reference ref_id="1224681" ref_url="https://bugzilla.suse.com/1224681" source="BUGZILLA"/>
		<reference ref_id="1224682" ref_url="https://bugzilla.suse.com/1224682" source="BUGZILLA"/>
		<reference ref_id="1224685" ref_url="https://bugzilla.suse.com/1224685" source="BUGZILLA"/>
		<reference ref_id="1224686" ref_url="https://bugzilla.suse.com/1224686" source="BUGZILLA"/>
		<reference ref_id="1224692" ref_url="https://bugzilla.suse.com/1224692" source="BUGZILLA"/>
		<reference ref_id="1224697" ref_url="https://bugzilla.suse.com/1224697" source="BUGZILLA"/>
		<reference ref_id="1224699" ref_url="https://bugzilla.suse.com/1224699" source="BUGZILLA"/>
		<reference ref_id="1224701" ref_url="https://bugzilla.suse.com/1224701" source="BUGZILLA"/>
		<reference ref_id="1224703" ref_url="https://bugzilla.suse.com/1224703" source="BUGZILLA"/>
		<reference ref_id="1224705" ref_url="https://bugzilla.suse.com/1224705" source="BUGZILLA"/>
		<reference ref_id="1224707" ref_url="https://bugzilla.suse.com/1224707" source="BUGZILLA"/>
		<reference ref_id="1224717" ref_url="https://bugzilla.suse.com/1224717" source="BUGZILLA"/>
		<reference ref_id="1224718" ref_url="https://bugzilla.suse.com/1224718" source="BUGZILLA"/>
		<reference ref_id="1224721" ref_url="https://bugzilla.suse.com/1224721" source="BUGZILLA"/>
		<reference ref_id="1224722" ref_url="https://bugzilla.suse.com/1224722" source="BUGZILLA"/>
		<reference ref_id="1224723" ref_url="https://bugzilla.suse.com/1224723" source="BUGZILLA"/>
		<reference ref_id="1224725" ref_url="https://bugzilla.suse.com/1224725" source="BUGZILLA"/>
		<reference ref_id="1224727" ref_url="https://bugzilla.suse.com/1224727" source="BUGZILLA"/>
		<reference ref_id="1224728" ref_url="https://bugzilla.suse.com/1224728" source="BUGZILLA"/>
		<reference ref_id="1224729" ref_url="https://bugzilla.suse.com/1224729" source="BUGZILLA"/>
		<reference ref_id="1224730" ref_url="https://bugzilla.suse.com/1224730" source="BUGZILLA"/>
		<reference ref_id="1224731" ref_url="https://bugzilla.suse.com/1224731" source="BUGZILLA"/>
		<reference ref_id="1224732" ref_url="https://bugzilla.suse.com/1224732" source="BUGZILLA"/>
		<reference ref_id="1224733" ref_url="https://bugzilla.suse.com/1224733" source="BUGZILLA"/>
		<reference ref_id="1224736" ref_url="https://bugzilla.suse.com/1224736" source="BUGZILLA"/>
		<reference ref_id="1224738" ref_url="https://bugzilla.suse.com/1224738" source="BUGZILLA"/>
		<reference ref_id="1224739" ref_url="https://bugzilla.suse.com/1224739" source="BUGZILLA"/>
		<reference ref_id="1224740" ref_url="https://bugzilla.suse.com/1224740" source="BUGZILLA"/>
		<reference ref_id="1224747" ref_url="https://bugzilla.suse.com/1224747" source="BUGZILLA"/>
		<reference ref_id="1224749" ref_url="https://bugzilla.suse.com/1224749" source="BUGZILLA"/>
		<reference ref_id="1224759" ref_url="https://bugzilla.suse.com/1224759" source="BUGZILLA"/>
		<reference ref_id="1224763" ref_url="https://bugzilla.suse.com/1224763" source="BUGZILLA"/>
		<reference ref_id="1224764" ref_url="https://bugzilla.suse.com/1224764" source="BUGZILLA"/>
		<reference ref_id="1224765" ref_url="https://bugzilla.suse.com/1224765" source="BUGZILLA"/>
		<reference ref_id="1224766" ref_url="https://bugzilla.suse.com/1224766" source="BUGZILLA"/>
		<reference ref_id="1224794" ref_url="https://bugzilla.suse.com/1224794" source="BUGZILLA"/>
		<reference ref_id="1224795" ref_url="https://bugzilla.suse.com/1224795" source="BUGZILLA"/>
		<reference ref_id="1224796" ref_url="https://bugzilla.suse.com/1224796" source="BUGZILLA"/>
		<reference ref_id="1224803" ref_url="https://bugzilla.suse.com/1224803" source="BUGZILLA"/>
		<reference ref_id="1224816" ref_url="https://bugzilla.suse.com/1224816" source="BUGZILLA"/>
		<reference ref_id="1224895" ref_url="https://bugzilla.suse.com/1224895" source="BUGZILLA"/>
		<reference ref_id="1224898" ref_url="https://bugzilla.suse.com/1224898" source="BUGZILLA"/>
		<reference ref_id="1224900" ref_url="https://bugzilla.suse.com/1224900" source="BUGZILLA"/>
		<reference ref_id="1224901" ref_url="https://bugzilla.suse.com/1224901" source="BUGZILLA"/>
		<reference ref_id="1224902" ref_url="https://bugzilla.suse.com/1224902" source="BUGZILLA"/>
		<reference ref_id="1224903" ref_url="https://bugzilla.suse.com/1224903" source="BUGZILLA"/>
		<reference ref_id="1224904" ref_url="https://bugzilla.suse.com/1224904" source="BUGZILLA"/>
		<reference ref_id="1224905" ref_url="https://bugzilla.suse.com/1224905" source="BUGZILLA"/>
		<reference ref_id="1224907" ref_url="https://bugzilla.suse.com/1224907" source="BUGZILLA"/>
		<reference ref_id="1224909" ref_url="https://bugzilla.suse.com/1224909" source="BUGZILLA"/>
		<reference ref_id="1224910" ref_url="https://bugzilla.suse.com/1224910" source="BUGZILLA"/>
		<reference ref_id="1224911" ref_url="https://bugzilla.suse.com/1224911" source="BUGZILLA"/>
		<reference ref_id="1224912" ref_url="https://bugzilla.suse.com/1224912" source="BUGZILLA"/>
		<reference ref_id="1224913" ref_url="https://bugzilla.suse.com/1224913" source="BUGZILLA"/>
		<reference ref_id="1224914" ref_url="https://bugzilla.suse.com/1224914" source="BUGZILLA"/>
		<reference ref_id="1224915" ref_url="https://bugzilla.suse.com/1224915" source="BUGZILLA"/>
		<reference ref_id="1224920" ref_url="https://bugzilla.suse.com/1224920" source="BUGZILLA"/>
		<reference ref_id="1224928" ref_url="https://bugzilla.suse.com/1224928" source="BUGZILLA"/>
		<reference ref_id="1224929" ref_url="https://bugzilla.suse.com/1224929" source="BUGZILLA"/>
		<reference ref_id="1224930" ref_url="https://bugzilla.suse.com/1224930" source="BUGZILLA"/>
		<reference ref_id="1224931" ref_url="https://bugzilla.suse.com/1224931" source="BUGZILLA"/>
		<reference ref_id="1224932" ref_url="https://bugzilla.suse.com/1224932" source="BUGZILLA"/>
		<reference ref_id="1224936" ref_url="https://bugzilla.suse.com/1224936" source="BUGZILLA"/>
		<reference ref_id="1224937" ref_url="https://bugzilla.suse.com/1224937" source="BUGZILLA"/>
		<reference ref_id="1224941" ref_url="https://bugzilla.suse.com/1224941" source="BUGZILLA"/>
		<reference ref_id="1224942" ref_url="https://bugzilla.suse.com/1224942" source="BUGZILLA"/>
		<reference ref_id="1224944" ref_url="https://bugzilla.suse.com/1224944" source="BUGZILLA"/>
		<reference ref_id="1224945" ref_url="https://bugzilla.suse.com/1224945" source="BUGZILLA"/>
		<reference ref_id="1224947" ref_url="https://bugzilla.suse.com/1224947" source="BUGZILLA"/>
		<reference ref_id="1224956" ref_url="https://bugzilla.suse.com/1224956" source="BUGZILLA"/>
		<reference ref_id="1224988" ref_url="https://bugzilla.suse.com/1224988" source="BUGZILLA"/>
		<reference ref_id="1224992" ref_url="https://bugzilla.suse.com/1224992" source="BUGZILLA"/>
		<reference ref_id="1225000" ref_url="https://bugzilla.suse.com/1225000" source="BUGZILLA"/>
		<reference ref_id="1225003" ref_url="https://bugzilla.suse.com/1225003" source="BUGZILLA"/>
		<reference ref_id="1225005" ref_url="https://bugzilla.suse.com/1225005" source="BUGZILLA"/>
		<reference ref_id="1225008" ref_url="https://bugzilla.suse.com/1225008" source="BUGZILLA"/>
		<reference ref_id="1225009" ref_url="https://bugzilla.suse.com/1225009" source="BUGZILLA"/>
		<reference ref_id="1225022" ref_url="https://bugzilla.suse.com/1225022" source="BUGZILLA"/>
		<reference ref_id="1225031" ref_url="https://bugzilla.suse.com/1225031" source="BUGZILLA"/>
		<reference ref_id="1225032" ref_url="https://bugzilla.suse.com/1225032" source="BUGZILLA"/>
		<reference ref_id="1225036" ref_url="https://bugzilla.suse.com/1225036" source="BUGZILLA"/>
		<reference ref_id="1225041" ref_url="https://bugzilla.suse.com/1225041" source="BUGZILLA"/>
		<reference ref_id="1225044" ref_url="https://bugzilla.suse.com/1225044" source="BUGZILLA"/>
		<reference ref_id="1225053" ref_url="https://bugzilla.suse.com/1225053" source="BUGZILLA"/>
		<reference ref_id="1225076" ref_url="https://bugzilla.suse.com/1225076" source="BUGZILLA"/>
		<reference ref_id="1225077" ref_url="https://bugzilla.suse.com/1225077" source="BUGZILLA"/>
		<reference ref_id="1225082" ref_url="https://bugzilla.suse.com/1225082" source="BUGZILLA"/>
		<reference ref_id="1225085" ref_url="https://bugzilla.suse.com/1225085" source="BUGZILLA"/>
		<reference ref_id="1225086" ref_url="https://bugzilla.suse.com/1225086" source="BUGZILLA"/>
		<reference ref_id="1225092" ref_url="https://bugzilla.suse.com/1225092" source="BUGZILLA"/>
		<reference ref_id="1225095" ref_url="https://bugzilla.suse.com/1225095" source="BUGZILLA"/>
		<reference ref_id="1225096" ref_url="https://bugzilla.suse.com/1225096" source="BUGZILLA"/>
		<reference ref_id="1225097" ref_url="https://bugzilla.suse.com/1225097" source="BUGZILLA"/>
		<reference ref_id="1225106" ref_url="https://bugzilla.suse.com/1225106" source="BUGZILLA"/>
		<reference ref_id="1225108" ref_url="https://bugzilla.suse.com/1225108" source="BUGZILLA"/>
		<reference ref_id="1225109" ref_url="https://bugzilla.suse.com/1225109" source="BUGZILLA"/>
		<reference ref_id="1225114" ref_url="https://bugzilla.suse.com/1225114" source="BUGZILLA"/>
		<reference ref_id="1225118" ref_url="https://bugzilla.suse.com/1225118" source="BUGZILLA"/>
		<reference ref_id="1225121" ref_url="https://bugzilla.suse.com/1225121" source="BUGZILLA"/>
		<reference ref_id="1225122" ref_url="https://bugzilla.suse.com/1225122" source="BUGZILLA"/>
		<reference ref_id="1225123" ref_url="https://bugzilla.suse.com/1225123" source="BUGZILLA"/>
		<reference ref_id="1225125" ref_url="https://bugzilla.suse.com/1225125" source="BUGZILLA"/>
		<reference ref_id="1225126" ref_url="https://bugzilla.suse.com/1225126" source="BUGZILLA"/>
		<reference ref_id="1225127" ref_url="https://bugzilla.suse.com/1225127" source="BUGZILLA"/>
		<reference ref_id="1225129" ref_url="https://bugzilla.suse.com/1225129" source="BUGZILLA"/>
		<reference ref_id="1225131" ref_url="https://bugzilla.suse.com/1225131" source="BUGZILLA"/>
		<reference ref_id="1225132" ref_url="https://bugzilla.suse.com/1225132" source="BUGZILLA"/>
		<reference ref_id="1225138" ref_url="https://bugzilla.suse.com/1225138" source="BUGZILLA"/>
		<reference ref_id="1225139" ref_url="https://bugzilla.suse.com/1225139" source="BUGZILLA"/>
		<reference ref_id="1225145" ref_url="https://bugzilla.suse.com/1225145" source="BUGZILLA"/>
		<reference ref_id="1225151" ref_url="https://bugzilla.suse.com/1225151" source="BUGZILLA"/>
		<reference ref_id="1225153" ref_url="https://bugzilla.suse.com/1225153" source="BUGZILLA"/>
		<reference ref_id="1225156" ref_url="https://bugzilla.suse.com/1225156" source="BUGZILLA"/>
		<reference ref_id="1225158" ref_url="https://bugzilla.suse.com/1225158" source="BUGZILLA"/>
		<reference ref_id="1225160" ref_url="https://bugzilla.suse.com/1225160" source="BUGZILLA"/>
		<reference ref_id="1225161" ref_url="https://bugzilla.suse.com/1225161" source="BUGZILLA"/>
		<reference ref_id="1225164" ref_url="https://bugzilla.suse.com/1225164" source="BUGZILLA"/>
		<reference ref_id="1225167" ref_url="https://bugzilla.suse.com/1225167" source="BUGZILLA"/>
		<reference ref_id="1225180" ref_url="https://bugzilla.suse.com/1225180" source="BUGZILLA"/>
		<reference ref_id="1225183" ref_url="https://bugzilla.suse.com/1225183" source="BUGZILLA"/>
		<reference ref_id="1225184" ref_url="https://bugzilla.suse.com/1225184" source="BUGZILLA"/>
		<reference ref_id="1225186" ref_url="https://bugzilla.suse.com/1225186" source="BUGZILLA"/>
		<reference ref_id="1225187" ref_url="https://bugzilla.suse.com/1225187" source="BUGZILLA"/>
		<reference ref_id="1225189" ref_url="https://bugzilla.suse.com/1225189" source="BUGZILLA"/>
		<reference ref_id="1225190" ref_url="https://bugzilla.suse.com/1225190" source="BUGZILLA"/>
		<reference ref_id="1225191" ref_url="https://bugzilla.suse.com/1225191" source="BUGZILLA"/>
		<reference ref_id="1225192" ref_url="https://bugzilla.suse.com/1225192" source="BUGZILLA"/>
		<reference ref_id="1225193" ref_url="https://bugzilla.suse.com/1225193" source="BUGZILLA"/>
		<reference ref_id="1225195" ref_url="https://bugzilla.suse.com/1225195" source="BUGZILLA"/>
		<reference ref_id="1225198" ref_url="https://bugzilla.suse.com/1225198" source="BUGZILLA"/>
		<reference ref_id="1225201" ref_url="https://bugzilla.suse.com/1225201" source="BUGZILLA"/>
		<reference ref_id="1225203" ref_url="https://bugzilla.suse.com/1225203" source="BUGZILLA"/>
		<reference ref_id="1225205" ref_url="https://bugzilla.suse.com/1225205" source="BUGZILLA"/>
		<reference ref_id="1225206" ref_url="https://bugzilla.suse.com/1225206" source="BUGZILLA"/>
		<reference ref_id="1225207" ref_url="https://bugzilla.suse.com/1225207" source="BUGZILLA"/>
		<reference ref_id="1225208" ref_url="https://bugzilla.suse.com/1225208" source="BUGZILLA"/>
		<reference ref_id="1225209" ref_url="https://bugzilla.suse.com/1225209" source="BUGZILLA"/>
		<reference ref_id="1225210" ref_url="https://bugzilla.suse.com/1225210" source="BUGZILLA"/>
		<reference ref_id="1225214" ref_url="https://bugzilla.suse.com/1225214" source="BUGZILLA"/>
		<reference ref_id="1225222" ref_url="https://bugzilla.suse.com/1225222" source="BUGZILLA"/>
		<reference ref_id="1225223" ref_url="https://bugzilla.suse.com/1225223" source="BUGZILLA"/>
		<reference ref_id="1225224" ref_url="https://bugzilla.suse.com/1225224" source="BUGZILLA"/>
		<reference ref_id="1225225" ref_url="https://bugzilla.suse.com/1225225" source="BUGZILLA"/>
		<reference ref_id="1225227" ref_url="https://bugzilla.suse.com/1225227" source="BUGZILLA"/>
		<reference ref_id="1225228" ref_url="https://bugzilla.suse.com/1225228" source="BUGZILLA"/>
		<reference ref_id="1225229" ref_url="https://bugzilla.suse.com/1225229" source="BUGZILLA"/>
		<reference ref_id="1225230" ref_url="https://bugzilla.suse.com/1225230" source="BUGZILLA"/>
		<reference ref_id="1225232" ref_url="https://bugzilla.suse.com/1225232" source="BUGZILLA"/>
		<reference ref_id="1225233" ref_url="https://bugzilla.suse.com/1225233" source="BUGZILLA"/>
		<reference ref_id="1225235" ref_url="https://bugzilla.suse.com/1225235" source="BUGZILLA"/>
		<reference ref_id="1225236" ref_url="https://bugzilla.suse.com/1225236" source="BUGZILLA"/>
		<reference ref_id="1225237" ref_url="https://bugzilla.suse.com/1225237" source="BUGZILLA"/>
		<reference ref_id="1225238" ref_url="https://bugzilla.suse.com/1225238" source="BUGZILLA"/>
		<reference ref_id="1225239" ref_url="https://bugzilla.suse.com/1225239" source="BUGZILLA"/>
		<reference ref_id="1225240" ref_url="https://bugzilla.suse.com/1225240" source="BUGZILLA"/>
		<reference ref_id="1225241" ref_url="https://bugzilla.suse.com/1225241" source="BUGZILLA"/>
		<reference ref_id="1225242" ref_url="https://bugzilla.suse.com/1225242" source="BUGZILLA"/>
		<reference ref_id="1225243" ref_url="https://bugzilla.suse.com/1225243" source="BUGZILLA"/>
		<reference ref_id="1225244" ref_url="https://bugzilla.suse.com/1225244" source="BUGZILLA"/>
		<reference ref_id="1225245" ref_url="https://bugzilla.suse.com/1225245" source="BUGZILLA"/>
		<reference ref_id="1225246" ref_url="https://bugzilla.suse.com/1225246" source="BUGZILLA"/>
		<reference ref_id="1225247" ref_url="https://bugzilla.suse.com/1225247" source="BUGZILLA"/>
		<reference ref_id="1225248" ref_url="https://bugzilla.suse.com/1225248" source="BUGZILLA"/>
		<reference ref_id="1225249" ref_url="https://bugzilla.suse.com/1225249" source="BUGZILLA"/>
		<reference ref_id="1225250" ref_url="https://bugzilla.suse.com/1225250" source="BUGZILLA"/>
		<reference ref_id="1225251" ref_url="https://bugzilla.suse.com/1225251" source="BUGZILLA"/>
		<reference ref_id="1225252" ref_url="https://bugzilla.suse.com/1225252" source="BUGZILLA"/>
		<reference ref_id="1225253" ref_url="https://bugzilla.suse.com/1225253" source="BUGZILLA"/>
		<reference ref_id="1225254" ref_url="https://bugzilla.suse.com/1225254" source="BUGZILLA"/>
		<reference ref_id="1225255" ref_url="https://bugzilla.suse.com/1225255" source="BUGZILLA"/>
		<reference ref_id="1225256" ref_url="https://bugzilla.suse.com/1225256" source="BUGZILLA"/>
		<reference ref_id="1225257" ref_url="https://bugzilla.suse.com/1225257" source="BUGZILLA"/>
		<reference ref_id="1225258" ref_url="https://bugzilla.suse.com/1225258" source="BUGZILLA"/>
		<reference ref_id="1225259" ref_url="https://bugzilla.suse.com/1225259" source="BUGZILLA"/>
		<reference ref_id="1225260" ref_url="https://bugzilla.suse.com/1225260" source="BUGZILLA"/>
		<reference ref_id="1225261" ref_url="https://bugzilla.suse.com/1225261" source="BUGZILLA"/>
		<reference ref_id="1225262" ref_url="https://bugzilla.suse.com/1225262" source="BUGZILLA"/>
		<reference ref_id="1225263" ref_url="https://bugzilla.suse.com/1225263" source="BUGZILLA"/>
		<reference ref_id="1225268" ref_url="https://bugzilla.suse.com/1225268" source="BUGZILLA"/>
		<reference ref_id="1225301" ref_url="https://bugzilla.suse.com/1225301" source="BUGZILLA"/>
		<reference ref_id="1225303" ref_url="https://bugzilla.suse.com/1225303" source="BUGZILLA"/>
		<reference ref_id="1225304" ref_url="https://bugzilla.suse.com/1225304" source="BUGZILLA"/>
		<reference ref_id="1225306" ref_url="https://bugzilla.suse.com/1225306" source="BUGZILLA"/>
		<reference ref_id="1225316" ref_url="https://bugzilla.suse.com/1225316" source="BUGZILLA"/>
		<reference ref_id="1225318" ref_url="https://bugzilla.suse.com/1225318" source="BUGZILLA"/>
		<reference ref_id="1225320" ref_url="https://bugzilla.suse.com/1225320" source="BUGZILLA"/>
		<reference ref_id="1225321" ref_url="https://bugzilla.suse.com/1225321" source="BUGZILLA"/>
		<reference ref_id="1225322" ref_url="https://bugzilla.suse.com/1225322" source="BUGZILLA"/>
		<reference ref_id="1225323" ref_url="https://bugzilla.suse.com/1225323" source="BUGZILLA"/>
		<reference ref_id="1225326" ref_url="https://bugzilla.suse.com/1225326" source="BUGZILLA"/>
		<reference ref_id="1225327" ref_url="https://bugzilla.suse.com/1225327" source="BUGZILLA"/>
		<reference ref_id="1225328" ref_url="https://bugzilla.suse.com/1225328" source="BUGZILLA"/>
		<reference ref_id="1225329" ref_url="https://bugzilla.suse.com/1225329" source="BUGZILLA"/>
		<reference ref_id="1225330" ref_url="https://bugzilla.suse.com/1225330" source="BUGZILLA"/>
		<reference ref_id="1225331" ref_url="https://bugzilla.suse.com/1225331" source="BUGZILLA"/>
		<reference ref_id="1225332" ref_url="https://bugzilla.suse.com/1225332" source="BUGZILLA"/>
		<reference ref_id="1225333" ref_url="https://bugzilla.suse.com/1225333" source="BUGZILLA"/>
		<reference ref_id="1225334" ref_url="https://bugzilla.suse.com/1225334" source="BUGZILLA"/>
		<reference ref_id="1225335" ref_url="https://bugzilla.suse.com/1225335" source="BUGZILLA"/>
		<reference ref_id="1225336" ref_url="https://bugzilla.suse.com/1225336" source="BUGZILLA"/>
		<reference ref_id="1225337" ref_url="https://bugzilla.suse.com/1225337" source="BUGZILLA"/>
		<reference ref_id="1225338" ref_url="https://bugzilla.suse.com/1225338" source="BUGZILLA"/>
		<reference ref_id="1225339" ref_url="https://bugzilla.suse.com/1225339" source="BUGZILLA"/>
		<reference ref_id="1225341" ref_url="https://bugzilla.suse.com/1225341" source="BUGZILLA"/>
		<reference ref_id="1225342" ref_url="https://bugzilla.suse.com/1225342" source="BUGZILLA"/>
		<reference ref_id="1225344" ref_url="https://bugzilla.suse.com/1225344" source="BUGZILLA"/>
		<reference ref_id="1225346" ref_url="https://bugzilla.suse.com/1225346" source="BUGZILLA"/>
		<reference ref_id="1225347" ref_url="https://bugzilla.suse.com/1225347" source="BUGZILLA"/>
		<reference ref_id="1225351" ref_url="https://bugzilla.suse.com/1225351" source="BUGZILLA"/>
		<reference ref_id="1225353" ref_url="https://bugzilla.suse.com/1225353" source="BUGZILLA"/>
		<reference ref_id="1225354" ref_url="https://bugzilla.suse.com/1225354" source="BUGZILLA"/>
		<reference ref_id="1225355" ref_url="https://bugzilla.suse.com/1225355" source="BUGZILLA"/>
		<reference ref_id="1225357" ref_url="https://bugzilla.suse.com/1225357" source="BUGZILLA"/>
		<reference ref_id="1225358" ref_url="https://bugzilla.suse.com/1225358" source="BUGZILLA"/>
		<reference ref_id="1225360" ref_url="https://bugzilla.suse.com/1225360" source="BUGZILLA"/>
		<reference ref_id="1225361" ref_url="https://bugzilla.suse.com/1225361" source="BUGZILLA"/>
		<reference ref_id="1225366" ref_url="https://bugzilla.suse.com/1225366" source="BUGZILLA"/>
		<reference ref_id="1225367" ref_url="https://bugzilla.suse.com/1225367" source="BUGZILLA"/>
		<reference ref_id="1225368" ref_url="https://bugzilla.suse.com/1225368" source="BUGZILLA"/>
		<reference ref_id="1225369" ref_url="https://bugzilla.suse.com/1225369" source="BUGZILLA"/>
		<reference ref_id="1225370" ref_url="https://bugzilla.suse.com/1225370" source="BUGZILLA"/>
		<reference ref_id="1225372" ref_url="https://bugzilla.suse.com/1225372" source="BUGZILLA"/>
		<reference ref_id="1225373" ref_url="https://bugzilla.suse.com/1225373" source="BUGZILLA"/>
		<reference ref_id="1225374" ref_url="https://bugzilla.suse.com/1225374" source="BUGZILLA"/>
		<reference ref_id="1225375" ref_url="https://bugzilla.suse.com/1225375" source="BUGZILLA"/>
		<reference ref_id="1225376" ref_url="https://bugzilla.suse.com/1225376" source="BUGZILLA"/>
		<reference ref_id="1225377" ref_url="https://bugzilla.suse.com/1225377" source="BUGZILLA"/>
		<reference ref_id="1225379" ref_url="https://bugzilla.suse.com/1225379" source="BUGZILLA"/>
		<reference ref_id="1225380" ref_url="https://bugzilla.suse.com/1225380" source="BUGZILLA"/>
		<reference ref_id="1225382" ref_url="https://bugzilla.suse.com/1225382" source="BUGZILLA"/>
		<reference ref_id="1225383" ref_url="https://bugzilla.suse.com/1225383" source="BUGZILLA"/>
		<reference ref_id="1225384" ref_url="https://bugzilla.suse.com/1225384" source="BUGZILLA"/>
		<reference ref_id="1225386" ref_url="https://bugzilla.suse.com/1225386" source="BUGZILLA"/>
		<reference ref_id="1225387" ref_url="https://bugzilla.suse.com/1225387" source="BUGZILLA"/>
		<reference ref_id="1225388" ref_url="https://bugzilla.suse.com/1225388" source="BUGZILLA"/>
		<reference ref_id="1225390" ref_url="https://bugzilla.suse.com/1225390" source="BUGZILLA"/>
		<reference ref_id="1225392" ref_url="https://bugzilla.suse.com/1225392" source="BUGZILLA"/>
		<reference ref_id="1225393" ref_url="https://bugzilla.suse.com/1225393" source="BUGZILLA"/>
		<reference ref_id="1225396" ref_url="https://bugzilla.suse.com/1225396" source="BUGZILLA"/>
		<reference ref_id="1225400" ref_url="https://bugzilla.suse.com/1225400" source="BUGZILLA"/>
		<reference ref_id="1225404" ref_url="https://bugzilla.suse.com/1225404" source="BUGZILLA"/>
		<reference ref_id="1225405" ref_url="https://bugzilla.suse.com/1225405" source="BUGZILLA"/>
		<reference ref_id="1225408" ref_url="https://bugzilla.suse.com/1225408" source="BUGZILLA"/>
		<reference ref_id="1225409" ref_url="https://bugzilla.suse.com/1225409" source="BUGZILLA"/>
		<reference ref_id="1225410" ref_url="https://bugzilla.suse.com/1225410" source="BUGZILLA"/>
		<reference ref_id="1225411" ref_url="https://bugzilla.suse.com/1225411" source="BUGZILLA"/>
		<reference ref_id="1225424" ref_url="https://bugzilla.suse.com/1225424" source="BUGZILLA"/>
		<reference ref_id="1225425" ref_url="https://bugzilla.suse.com/1225425" source="BUGZILLA"/>
		<reference ref_id="1225427" ref_url="https://bugzilla.suse.com/1225427" source="BUGZILLA"/>
		<reference ref_id="1225431" ref_url="https://bugzilla.suse.com/1225431" source="BUGZILLA"/>
		<reference ref_id="1225435" ref_url="https://bugzilla.suse.com/1225435" source="BUGZILLA"/>
		<reference ref_id="1225436" ref_url="https://bugzilla.suse.com/1225436" source="BUGZILLA"/>
		<reference ref_id="1225437" ref_url="https://bugzilla.suse.com/1225437" source="BUGZILLA"/>
		<reference ref_id="1225438" ref_url="https://bugzilla.suse.com/1225438" source="BUGZILLA"/>
		<reference ref_id="1225439" ref_url="https://bugzilla.suse.com/1225439" source="BUGZILLA"/>
		<reference ref_id="1225441" ref_url="https://bugzilla.suse.com/1225441" source="BUGZILLA"/>
		<reference ref_id="1225442" ref_url="https://bugzilla.suse.com/1225442" source="BUGZILLA"/>
		<reference ref_id="1225443" ref_url="https://bugzilla.suse.com/1225443" source="BUGZILLA"/>
		<reference ref_id="1225444" ref_url="https://bugzilla.suse.com/1225444" source="BUGZILLA"/>
		<reference ref_id="1225445" ref_url="https://bugzilla.suse.com/1225445" source="BUGZILLA"/>
		<reference ref_id="1225446" ref_url="https://bugzilla.suse.com/1225446" source="BUGZILLA"/>
		<reference ref_id="1225447" ref_url="https://bugzilla.suse.com/1225447" source="BUGZILLA"/>
		<reference ref_id="1225450" ref_url="https://bugzilla.suse.com/1225450" source="BUGZILLA"/>
		<reference ref_id="1225453" ref_url="https://bugzilla.suse.com/1225453" source="BUGZILLA"/>
		<reference ref_id="1225455" ref_url="https://bugzilla.suse.com/1225455" source="BUGZILLA"/>
		<reference ref_id="1225461" ref_url="https://bugzilla.suse.com/1225461" source="BUGZILLA"/>
		<reference ref_id="1225463" ref_url="https://bugzilla.suse.com/1225463" source="BUGZILLA"/>
		<reference ref_id="1225464" ref_url="https://bugzilla.suse.com/1225464" source="BUGZILLA"/>
		<reference ref_id="1225466" ref_url="https://bugzilla.suse.com/1225466" source="BUGZILLA"/>
		<reference ref_id="1225467" ref_url="https://bugzilla.suse.com/1225467" source="BUGZILLA"/>
		<reference ref_id="1225468" ref_url="https://bugzilla.suse.com/1225468" source="BUGZILLA"/>
		<reference ref_id="1225471" ref_url="https://bugzilla.suse.com/1225471" source="BUGZILLA"/>
		<reference ref_id="1225472" ref_url="https://bugzilla.suse.com/1225472" source="BUGZILLA"/>
		<reference ref_id="1225478" ref_url="https://bugzilla.suse.com/1225478" source="BUGZILLA"/>
		<reference ref_id="1225479" ref_url="https://bugzilla.suse.com/1225479" source="BUGZILLA"/>
		<reference ref_id="1225480" ref_url="https://bugzilla.suse.com/1225480" source="BUGZILLA"/>
		<reference ref_id="1225482" ref_url="https://bugzilla.suse.com/1225482" source="BUGZILLA"/>
		<reference ref_id="1225483" ref_url="https://bugzilla.suse.com/1225483" source="BUGZILLA"/>
		<reference ref_id="1225486" ref_url="https://bugzilla.suse.com/1225486" source="BUGZILLA"/>
		<reference ref_id="1225488" ref_url="https://bugzilla.suse.com/1225488" source="BUGZILLA"/>
		<reference ref_id="1225490" ref_url="https://bugzilla.suse.com/1225490" source="BUGZILLA"/>
		<reference ref_id="1225492" ref_url="https://bugzilla.suse.com/1225492" source="BUGZILLA"/>
		<reference ref_id="1225495" ref_url="https://bugzilla.suse.com/1225495" source="BUGZILLA"/>
		<reference ref_id="1225499" ref_url="https://bugzilla.suse.com/1225499" source="BUGZILLA"/>
		<reference ref_id="1225500" ref_url="https://bugzilla.suse.com/1225500" source="BUGZILLA"/>
		<reference ref_id="1225501" ref_url="https://bugzilla.suse.com/1225501" source="BUGZILLA"/>
		<reference ref_id="1225502" ref_url="https://bugzilla.suse.com/1225502" source="BUGZILLA"/>
		<reference ref_id="1225506" ref_url="https://bugzilla.suse.com/1225506" source="BUGZILLA"/>
		<reference ref_id="1225508" ref_url="https://bugzilla.suse.com/1225508" source="BUGZILLA"/>
		<reference ref_id="1225510" ref_url="https://bugzilla.suse.com/1225510" source="BUGZILLA"/>
		<reference ref_id="1225513" ref_url="https://bugzilla.suse.com/1225513" source="BUGZILLA"/>
		<reference ref_id="1225515" ref_url="https://bugzilla.suse.com/1225515" source="BUGZILLA"/>
		<reference ref_id="1225529" ref_url="https://bugzilla.suse.com/1225529" source="BUGZILLA"/>
		<reference ref_id="1225530" ref_url="https://bugzilla.suse.com/1225530" source="BUGZILLA"/>
		<reference ref_id="1225532" ref_url="https://bugzilla.suse.com/1225532" source="BUGZILLA"/>
		<reference ref_id="1225534" ref_url="https://bugzilla.suse.com/1225534" source="BUGZILLA"/>
		<reference ref_id="1225535" ref_url="https://bugzilla.suse.com/1225535" source="BUGZILLA"/>
		<reference ref_id="1225548" ref_url="https://bugzilla.suse.com/1225548" source="BUGZILLA"/>
		<reference ref_id="1225549" ref_url="https://bugzilla.suse.com/1225549" source="BUGZILLA"/>
		<reference ref_id="1225550" ref_url="https://bugzilla.suse.com/1225550" source="BUGZILLA"/>
		<reference ref_id="1225553" ref_url="https://bugzilla.suse.com/1225553" source="BUGZILLA"/>
		<reference ref_id="1225554" ref_url="https://bugzilla.suse.com/1225554" source="BUGZILLA"/>
		<reference ref_id="1225555" ref_url="https://bugzilla.suse.com/1225555" source="BUGZILLA"/>
		<reference ref_id="1225556" ref_url="https://bugzilla.suse.com/1225556" source="BUGZILLA"/>
		<reference ref_id="1225557" ref_url="https://bugzilla.suse.com/1225557" source="BUGZILLA"/>
		<reference ref_id="1225559" ref_url="https://bugzilla.suse.com/1225559" source="BUGZILLA"/>
		<reference ref_id="1225560" ref_url="https://bugzilla.suse.com/1225560" source="BUGZILLA"/>
		<reference ref_id="1225565" ref_url="https://bugzilla.suse.com/1225565" source="BUGZILLA"/>
		<reference ref_id="1225566" ref_url="https://bugzilla.suse.com/1225566" source="BUGZILLA"/>
		<reference ref_id="1225568" ref_url="https://bugzilla.suse.com/1225568" source="BUGZILLA"/>
		<reference ref_id="1225569" ref_url="https://bugzilla.suse.com/1225569" source="BUGZILLA"/>
		<reference ref_id="1225570" ref_url="https://bugzilla.suse.com/1225570" source="BUGZILLA"/>
		<reference ref_id="1225571" ref_url="https://bugzilla.suse.com/1225571" source="BUGZILLA"/>
		<reference ref_id="1225572" ref_url="https://bugzilla.suse.com/1225572" source="BUGZILLA"/>
		<reference ref_id="1225577" ref_url="https://bugzilla.suse.com/1225577" source="BUGZILLA"/>
		<reference ref_id="1225583" ref_url="https://bugzilla.suse.com/1225583" source="BUGZILLA"/>
		<reference ref_id="1225584" ref_url="https://bugzilla.suse.com/1225584" source="BUGZILLA"/>
		<reference ref_id="1225587" ref_url="https://bugzilla.suse.com/1225587" source="BUGZILLA"/>
		<reference ref_id="1225588" ref_url="https://bugzilla.suse.com/1225588" source="BUGZILLA"/>
		<reference ref_id="1225589" ref_url="https://bugzilla.suse.com/1225589" source="BUGZILLA"/>
		<reference ref_id="1225590" ref_url="https://bugzilla.suse.com/1225590" source="BUGZILLA"/>
		<reference ref_id="1225591" ref_url="https://bugzilla.suse.com/1225591" source="BUGZILLA"/>
		<reference ref_id="1225592" ref_url="https://bugzilla.suse.com/1225592" source="BUGZILLA"/>
		<reference ref_id="1225593" ref_url="https://bugzilla.suse.com/1225593" source="BUGZILLA"/>
		<reference ref_id="1225595" ref_url="https://bugzilla.suse.com/1225595" source="BUGZILLA"/>
		<reference ref_id="1225599" ref_url="https://bugzilla.suse.com/1225599" source="BUGZILLA"/>
		<reference ref_id="1225616" ref_url="https://bugzilla.suse.com/1225616" source="BUGZILLA"/>
		<reference ref_id="1225640" ref_url="https://bugzilla.suse.com/1225640" source="BUGZILLA"/>
		<reference ref_id="1225642" ref_url="https://bugzilla.suse.com/1225642" source="BUGZILLA"/>
		<reference ref_id="1225705" ref_url="https://bugzilla.suse.com/1225705" source="BUGZILLA"/>
		<reference ref_id="1225708" ref_url="https://bugzilla.suse.com/1225708" source="BUGZILLA"/>
		<reference ref_id="1225715" ref_url="https://bugzilla.suse.com/1225715" source="BUGZILLA"/>
		<reference ref_id="1225720" ref_url="https://bugzilla.suse.com/1225720" source="BUGZILLA"/>
		<reference ref_id="1225722" ref_url="https://bugzilla.suse.com/1225722" source="BUGZILLA"/>
		<reference ref_id="1225734" ref_url="https://bugzilla.suse.com/1225734" source="BUGZILLA"/>
		<reference ref_id="1225735" ref_url="https://bugzilla.suse.com/1225735" source="BUGZILLA"/>
		<reference ref_id="1225747" ref_url="https://bugzilla.suse.com/1225747" source="BUGZILLA"/>
		<reference ref_id="1225748" ref_url="https://bugzilla.suse.com/1225748" source="BUGZILLA"/>
		<reference ref_id="1225756" ref_url="https://bugzilla.suse.com/1225756" source="BUGZILLA"/>
		<reference ref_id="1225761" ref_url="https://bugzilla.suse.com/1225761" source="BUGZILLA"/>
		<reference ref_id="1225766" ref_url="https://bugzilla.suse.com/1225766" source="BUGZILLA"/>
		<reference ref_id="1225775" ref_url="https://bugzilla.suse.com/1225775" source="BUGZILLA"/>
		<reference ref_id="1225810" ref_url="https://bugzilla.suse.com/1225810" source="BUGZILLA"/>
		<reference ref_id="1225820" ref_url="https://bugzilla.suse.com/1225820" source="BUGZILLA"/>
		<reference ref_id="1225829" ref_url="https://bugzilla.suse.com/1225829" source="BUGZILLA"/>
		<reference ref_id="1225835" ref_url="https://bugzilla.suse.com/1225835" source="BUGZILLA"/>
		<reference ref_id="1225842" ref_url="https://bugzilla.suse.com/1225842" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36788" ref_url="https://www.suse.com/security/cve/CVE-2020-36788/" source="CVE"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2021-4148" ref_url="https://www.suse.com/security/cve/CVE-2021-4148/" source="CVE"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<reference ref_id="CVE-2021-47358" ref_url="https://www.suse.com/security/cve/CVE-2021-47358/" source="CVE"/>
		<reference ref_id="CVE-2021-47359" ref_url="https://www.suse.com/security/cve/CVE-2021-47359/" source="CVE"/>
		<reference ref_id="CVE-2021-47360" ref_url="https://www.suse.com/security/cve/CVE-2021-47360/" source="CVE"/>
		<reference ref_id="CVE-2021-47361" ref_url="https://www.suse.com/security/cve/CVE-2021-47361/" source="CVE"/>
		<reference ref_id="CVE-2021-47362" ref_url="https://www.suse.com/security/cve/CVE-2021-47362/" source="CVE"/>
		<reference ref_id="CVE-2021-47363" ref_url="https://www.suse.com/security/cve/CVE-2021-47363/" source="CVE"/>
		<reference ref_id="CVE-2021-47364" ref_url="https://www.suse.com/security/cve/CVE-2021-47364/" source="CVE"/>
		<reference ref_id="CVE-2021-47365" ref_url="https://www.suse.com/security/cve/CVE-2021-47365/" source="CVE"/>
		<reference ref_id="CVE-2021-47366" ref_url="https://www.suse.com/security/cve/CVE-2021-47366/" source="CVE"/>
		<reference ref_id="CVE-2021-47367" ref_url="https://www.suse.com/security/cve/CVE-2021-47367/" source="CVE"/>
		<reference ref_id="CVE-2021-47368" ref_url="https://www.suse.com/security/cve/CVE-2021-47368/" source="CVE"/>
		<reference ref_id="CVE-2021-47369" ref_url="https://www.suse.com/security/cve/CVE-2021-47369/" source="CVE"/>
		<reference ref_id="CVE-2021-47370" ref_url="https://www.suse.com/security/cve/CVE-2021-47370/" source="CVE"/>
		<reference ref_id="CVE-2021-47371" ref_url="https://www.suse.com/security/cve/CVE-2021-47371/" source="CVE"/>
		<reference ref_id="CVE-2021-47372" ref_url="https://www.suse.com/security/cve/CVE-2021-47372/" source="CVE"/>
		<reference ref_id="CVE-2021-47373" ref_url="https://www.suse.com/security/cve/CVE-2021-47373/" source="CVE"/>
		<reference ref_id="CVE-2021-47374" ref_url="https://www.suse.com/security/cve/CVE-2021-47374/" source="CVE"/>
		<reference ref_id="CVE-2021-47375" ref_url="https://www.suse.com/security/cve/CVE-2021-47375/" source="CVE"/>
		<reference ref_id="CVE-2021-47376" ref_url="https://www.suse.com/security/cve/CVE-2021-47376/" source="CVE"/>
		<reference ref_id="CVE-2021-47378" ref_url="https://www.suse.com/security/cve/CVE-2021-47378/" source="CVE"/>
		<reference ref_id="CVE-2021-47379" ref_url="https://www.suse.com/security/cve/CVE-2021-47379/" source="CVE"/>
		<reference ref_id="CVE-2021-47380" ref_url="https://www.suse.com/security/cve/CVE-2021-47380/" source="CVE"/>
		<reference ref_id="CVE-2021-47381" ref_url="https://www.suse.com/security/cve/CVE-2021-47381/" source="CVE"/>
		<reference ref_id="CVE-2021-47382" ref_url="https://www.suse.com/security/cve/CVE-2021-47382/" source="CVE"/>
		<reference ref_id="CVE-2021-47383" ref_url="https://www.suse.com/security/cve/CVE-2021-47383/" source="CVE"/>
		<reference ref_id="CVE-2021-47384" ref_url="https://www.suse.com/security/cve/CVE-2021-47384/" source="CVE"/>
		<reference ref_id="CVE-2021-47385" ref_url="https://www.suse.com/security/cve/CVE-2021-47385/" source="CVE"/>
		<reference ref_id="CVE-2021-47386" ref_url="https://www.suse.com/security/cve/CVE-2021-47386/" source="CVE"/>
		<reference ref_id="CVE-2021-47387" ref_url="https://www.suse.com/security/cve/CVE-2021-47387/" source="CVE"/>
		<reference ref_id="CVE-2021-47388" ref_url="https://www.suse.com/security/cve/CVE-2021-47388/" source="CVE"/>
		<reference ref_id="CVE-2021-47389" ref_url="https://www.suse.com/security/cve/CVE-2021-47389/" source="CVE"/>
		<reference ref_id="CVE-2021-47390" ref_url="https://www.suse.com/security/cve/CVE-2021-47390/" source="CVE"/>
		<reference ref_id="CVE-2021-47391" ref_url="https://www.suse.com/security/cve/CVE-2021-47391/" source="CVE"/>
		<reference ref_id="CVE-2021-47392" ref_url="https://www.suse.com/security/cve/CVE-2021-47392/" source="CVE"/>
		<reference ref_id="CVE-2021-47393" ref_url="https://www.suse.com/security/cve/CVE-2021-47393/" source="CVE"/>
		<reference ref_id="CVE-2021-47394" ref_url="https://www.suse.com/security/cve/CVE-2021-47394/" source="CVE"/>
		<reference ref_id="CVE-2021-47395" ref_url="https://www.suse.com/security/cve/CVE-2021-47395/" source="CVE"/>
		<reference ref_id="CVE-2021-47396" ref_url="https://www.suse.com/security/cve/CVE-2021-47396/" source="CVE"/>
		<reference ref_id="CVE-2021-47397" ref_url="https://www.suse.com/security/cve/CVE-2021-47397/" source="CVE"/>
		<reference ref_id="CVE-2021-47398" ref_url="https://www.suse.com/security/cve/CVE-2021-47398/" source="CVE"/>
		<reference ref_id="CVE-2021-47399" ref_url="https://www.suse.com/security/cve/CVE-2021-47399/" source="CVE"/>
		<reference ref_id="CVE-2021-47400" ref_url="https://www.suse.com/security/cve/CVE-2021-47400/" source="CVE"/>
		<reference ref_id="CVE-2021-47401" ref_url="https://www.suse.com/security/cve/CVE-2021-47401/" source="CVE"/>
		<reference ref_id="CVE-2021-47402" ref_url="https://www.suse.com/security/cve/CVE-2021-47402/" source="CVE"/>
		<reference ref_id="CVE-2021-47403" ref_url="https://www.suse.com/security/cve/CVE-2021-47403/" source="CVE"/>
		<reference ref_id="CVE-2021-47404" ref_url="https://www.suse.com/security/cve/CVE-2021-47404/" source="CVE"/>
		<reference ref_id="CVE-2021-47405" ref_url="https://www.suse.com/security/cve/CVE-2021-47405/" source="CVE"/>
		<reference ref_id="CVE-2021-47406" ref_url="https://www.suse.com/security/cve/CVE-2021-47406/" source="CVE"/>
		<reference ref_id="CVE-2021-47407" ref_url="https://www.suse.com/security/cve/CVE-2021-47407/" source="CVE"/>
		<reference ref_id="CVE-2021-47408" ref_url="https://www.suse.com/security/cve/CVE-2021-47408/" source="CVE"/>
		<reference ref_id="CVE-2021-47409" ref_url="https://www.suse.com/security/cve/CVE-2021-47409/" source="CVE"/>
		<reference ref_id="CVE-2021-47410" ref_url="https://www.suse.com/security/cve/CVE-2021-47410/" source="CVE"/>
		<reference ref_id="CVE-2021-47412" ref_url="https://www.suse.com/security/cve/CVE-2021-47412/" source="CVE"/>
		<reference ref_id="CVE-2021-47413" ref_url="https://www.suse.com/security/cve/CVE-2021-47413/" source="CVE"/>
		<reference ref_id="CVE-2021-47414" ref_url="https://www.suse.com/security/cve/CVE-2021-47414/" source="CVE"/>
		<reference ref_id="CVE-2021-47415" ref_url="https://www.suse.com/security/cve/CVE-2021-47415/" source="CVE"/>
		<reference ref_id="CVE-2021-47416" ref_url="https://www.suse.com/security/cve/CVE-2021-47416/" source="CVE"/>
		<reference ref_id="CVE-2021-47417" ref_url="https://www.suse.com/security/cve/CVE-2021-47417/" source="CVE"/>
		<reference ref_id="CVE-2021-47418" ref_url="https://www.suse.com/security/cve/CVE-2021-47418/" source="CVE"/>
		<reference ref_id="CVE-2021-47419" ref_url="https://www.suse.com/security/cve/CVE-2021-47419/" source="CVE"/>
		<reference ref_id="CVE-2021-47420" ref_url="https://www.suse.com/security/cve/CVE-2021-47420/" source="CVE"/>
		<reference ref_id="CVE-2021-47421" ref_url="https://www.suse.com/security/cve/CVE-2021-47421/" source="CVE"/>
		<reference ref_id="CVE-2021-47422" ref_url="https://www.suse.com/security/cve/CVE-2021-47422/" source="CVE"/>
		<reference ref_id="CVE-2021-47423" ref_url="https://www.suse.com/security/cve/CVE-2021-47423/" source="CVE"/>
		<reference ref_id="CVE-2021-47424" ref_url="https://www.suse.com/security/cve/CVE-2021-47424/" source="CVE"/>
		<reference ref_id="CVE-2021-47425" ref_url="https://www.suse.com/security/cve/CVE-2021-47425/" source="CVE"/>
		<reference ref_id="CVE-2021-47426" ref_url="https://www.suse.com/security/cve/CVE-2021-47426/" source="CVE"/>
		<reference ref_id="CVE-2021-47427" ref_url="https://www.suse.com/security/cve/CVE-2021-47427/" source="CVE"/>
		<reference ref_id="CVE-2021-47428" ref_url="https://www.suse.com/security/cve/CVE-2021-47428/" source="CVE"/>
		<reference ref_id="CVE-2021-47429" ref_url="https://www.suse.com/security/cve/CVE-2021-47429/" source="CVE"/>
		<reference ref_id="CVE-2021-47430" ref_url="https://www.suse.com/security/cve/CVE-2021-47430/" source="CVE"/>
		<reference ref_id="CVE-2021-47431" ref_url="https://www.suse.com/security/cve/CVE-2021-47431/" source="CVE"/>
		<reference ref_id="CVE-2021-47433" ref_url="https://www.suse.com/security/cve/CVE-2021-47433/" source="CVE"/>
		<reference ref_id="CVE-2021-47434" ref_url="https://www.suse.com/security/cve/CVE-2021-47434/" source="CVE"/>
		<reference ref_id="CVE-2021-47435" ref_url="https://www.suse.com/security/cve/CVE-2021-47435/" source="CVE"/>
		<reference ref_id="CVE-2021-47436" ref_url="https://www.suse.com/security/cve/CVE-2021-47436/" source="CVE"/>
		<reference ref_id="CVE-2021-47437" ref_url="https://www.suse.com/security/cve/CVE-2021-47437/" source="CVE"/>
		<reference ref_id="CVE-2021-47438" ref_url="https://www.suse.com/security/cve/CVE-2021-47438/" source="CVE"/>
		<reference ref_id="CVE-2021-47439" ref_url="https://www.suse.com/security/cve/CVE-2021-47439/" source="CVE"/>
		<reference ref_id="CVE-2021-47440" ref_url="https://www.suse.com/security/cve/CVE-2021-47440/" source="CVE"/>
		<reference ref_id="CVE-2021-47441" ref_url="https://www.suse.com/security/cve/CVE-2021-47441/" source="CVE"/>
		<reference ref_id="CVE-2021-47442" ref_url="https://www.suse.com/security/cve/CVE-2021-47442/" source="CVE"/>
		<reference ref_id="CVE-2021-47443" ref_url="https://www.suse.com/security/cve/CVE-2021-47443/" source="CVE"/>
		<reference ref_id="CVE-2021-47444" ref_url="https://www.suse.com/security/cve/CVE-2021-47444/" source="CVE"/>
		<reference ref_id="CVE-2021-47445" ref_url="https://www.suse.com/security/cve/CVE-2021-47445/" source="CVE"/>
		<reference ref_id="CVE-2021-47446" ref_url="https://www.suse.com/security/cve/CVE-2021-47446/" source="CVE"/>
		<reference ref_id="CVE-2021-47447" ref_url="https://www.suse.com/security/cve/CVE-2021-47447/" source="CVE"/>
		<reference ref_id="CVE-2021-47448" ref_url="https://www.suse.com/security/cve/CVE-2021-47448/" source="CVE"/>
		<reference ref_id="CVE-2021-47449" ref_url="https://www.suse.com/security/cve/CVE-2021-47449/" source="CVE"/>
		<reference ref_id="CVE-2021-47450" ref_url="https://www.suse.com/security/cve/CVE-2021-47450/" source="CVE"/>
		<reference ref_id="CVE-2021-47451" ref_url="https://www.suse.com/security/cve/CVE-2021-47451/" source="CVE"/>
		<reference ref_id="CVE-2021-47452" ref_url="https://www.suse.com/security/cve/CVE-2021-47452/" source="CVE"/>
		<reference ref_id="CVE-2021-47453" ref_url="https://www.suse.com/security/cve/CVE-2021-47453/" source="CVE"/>
		<reference ref_id="CVE-2021-47454" ref_url="https://www.suse.com/security/cve/CVE-2021-47454/" source="CVE"/>
		<reference ref_id="CVE-2021-47455" ref_url="https://www.suse.com/security/cve/CVE-2021-47455/" source="CVE"/>
		<reference ref_id="CVE-2021-47456" ref_url="https://www.suse.com/security/cve/CVE-2021-47456/" source="CVE"/>
		<reference ref_id="CVE-2021-47457" ref_url="https://www.suse.com/security/cve/CVE-2021-47457/" source="CVE"/>
		<reference ref_id="CVE-2021-47458" ref_url="https://www.suse.com/security/cve/CVE-2021-47458/" source="CVE"/>
		<reference ref_id="CVE-2021-47459" ref_url="https://www.suse.com/security/cve/CVE-2021-47459/" source="CVE"/>
		<reference ref_id="CVE-2021-47460" ref_url="https://www.suse.com/security/cve/CVE-2021-47460/" source="CVE"/>
		<reference ref_id="CVE-2021-47461" ref_url="https://www.suse.com/security/cve/CVE-2021-47461/" source="CVE"/>
		<reference ref_id="CVE-2021-47462" ref_url="https://www.suse.com/security/cve/CVE-2021-47462/" source="CVE"/>
		<reference ref_id="CVE-2021-47463" ref_url="https://www.suse.com/security/cve/CVE-2021-47463/" source="CVE"/>
		<reference ref_id="CVE-2021-47464" ref_url="https://www.suse.com/security/cve/CVE-2021-47464/" source="CVE"/>
		<reference ref_id="CVE-2021-47465" ref_url="https://www.suse.com/security/cve/CVE-2021-47465/" source="CVE"/>
		<reference ref_id="CVE-2021-47466" ref_url="https://www.suse.com/security/cve/CVE-2021-47466/" source="CVE"/>
		<reference ref_id="CVE-2021-47467" ref_url="https://www.suse.com/security/cve/CVE-2021-47467/" source="CVE"/>
		<reference ref_id="CVE-2021-47468" ref_url="https://www.suse.com/security/cve/CVE-2021-47468/" source="CVE"/>
		<reference ref_id="CVE-2021-47469" ref_url="https://www.suse.com/security/cve/CVE-2021-47469/" source="CVE"/>
		<reference ref_id="CVE-2021-47470" ref_url="https://www.suse.com/security/cve/CVE-2021-47470/" source="CVE"/>
		<reference ref_id="CVE-2021-47471" ref_url="https://www.suse.com/security/cve/CVE-2021-47471/" source="CVE"/>
		<reference ref_id="CVE-2021-47472" ref_url="https://www.suse.com/security/cve/CVE-2021-47472/" source="CVE"/>
		<reference ref_id="CVE-2021-47473" ref_url="https://www.suse.com/security/cve/CVE-2021-47473/" source="CVE"/>
		<reference ref_id="CVE-2021-47474" ref_url="https://www.suse.com/security/cve/CVE-2021-47474/" source="CVE"/>
		<reference ref_id="CVE-2021-47475" ref_url="https://www.suse.com/security/cve/CVE-2021-47475/" source="CVE"/>
		<reference ref_id="CVE-2021-47476" ref_url="https://www.suse.com/security/cve/CVE-2021-47476/" source="CVE"/>
		<reference ref_id="CVE-2021-47477" ref_url="https://www.suse.com/security/cve/CVE-2021-47477/" source="CVE"/>
		<reference ref_id="CVE-2021-47478" ref_url="https://www.suse.com/security/cve/CVE-2021-47478/" source="CVE"/>
		<reference ref_id="CVE-2021-47479" ref_url="https://www.suse.com/security/cve/CVE-2021-47479/" source="CVE"/>
		<reference ref_id="CVE-2021-47480" ref_url="https://www.suse.com/security/cve/CVE-2021-47480/" source="CVE"/>
		<reference ref_id="CVE-2021-47481" ref_url="https://www.suse.com/security/cve/CVE-2021-47481/" source="CVE"/>
		<reference ref_id="CVE-2021-47482" ref_url="https://www.suse.com/security/cve/CVE-2021-47482/" source="CVE"/>
		<reference ref_id="CVE-2021-47483" ref_url="https://www.suse.com/security/cve/CVE-2021-47483/" source="CVE"/>
		<reference ref_id="CVE-2021-47484" ref_url="https://www.suse.com/security/cve/CVE-2021-47484/" source="CVE"/>
		<reference ref_id="CVE-2021-47485" ref_url="https://www.suse.com/security/cve/CVE-2021-47485/" source="CVE"/>
		<reference ref_id="CVE-2021-47486" ref_url="https://www.suse.com/security/cve/CVE-2021-47486/" source="CVE"/>
		<reference ref_id="CVE-2021-47488" ref_url="https://www.suse.com/security/cve/CVE-2021-47488/" source="CVE"/>
		<reference ref_id="CVE-2021-47489" ref_url="https://www.suse.com/security/cve/CVE-2021-47489/" source="CVE"/>
		<reference ref_id="CVE-2021-47490" ref_url="https://www.suse.com/security/cve/CVE-2021-47490/" source="CVE"/>
		<reference ref_id="CVE-2021-47491" ref_url="https://www.suse.com/security/cve/CVE-2021-47491/" source="CVE"/>
		<reference ref_id="CVE-2021-47492" ref_url="https://www.suse.com/security/cve/CVE-2021-47492/" source="CVE"/>
		<reference ref_id="CVE-2021-47493" ref_url="https://www.suse.com/security/cve/CVE-2021-47493/" source="CVE"/>
		<reference ref_id="CVE-2021-47494" ref_url="https://www.suse.com/security/cve/CVE-2021-47494/" source="CVE"/>
		<reference ref_id="CVE-2021-47495" ref_url="https://www.suse.com/security/cve/CVE-2021-47495/" source="CVE"/>
		<reference ref_id="CVE-2021-47496" ref_url="https://www.suse.com/security/cve/CVE-2021-47496/" source="CVE"/>
		<reference ref_id="CVE-2021-47497" ref_url="https://www.suse.com/security/cve/CVE-2021-47497/" source="CVE"/>
		<reference ref_id="CVE-2021-47498" ref_url="https://www.suse.com/security/cve/CVE-2021-47498/" source="CVE"/>
		<reference ref_id="CVE-2021-47499" ref_url="https://www.suse.com/security/cve/CVE-2021-47499/" source="CVE"/>
		<reference ref_id="CVE-2021-47500" ref_url="https://www.suse.com/security/cve/CVE-2021-47500/" source="CVE"/>
		<reference ref_id="CVE-2021-47501" ref_url="https://www.suse.com/security/cve/CVE-2021-47501/" source="CVE"/>
		<reference ref_id="CVE-2021-47502" ref_url="https://www.suse.com/security/cve/CVE-2021-47502/" source="CVE"/>
		<reference ref_id="CVE-2021-47503" ref_url="https://www.suse.com/security/cve/CVE-2021-47503/" source="CVE"/>
		<reference ref_id="CVE-2021-47504" ref_url="https://www.suse.com/security/cve/CVE-2021-47504/" source="CVE"/>
		<reference ref_id="CVE-2021-47505" ref_url="https://www.suse.com/security/cve/CVE-2021-47505/" source="CVE"/>
		<reference ref_id="CVE-2021-47506" ref_url="https://www.suse.com/security/cve/CVE-2021-47506/" source="CVE"/>
		<reference ref_id="CVE-2021-47507" ref_url="https://www.suse.com/security/cve/CVE-2021-47507/" source="CVE"/>
		<reference ref_id="CVE-2021-47508" ref_url="https://www.suse.com/security/cve/CVE-2021-47508/" source="CVE"/>
		<reference ref_id="CVE-2021-47509" ref_url="https://www.suse.com/security/cve/CVE-2021-47509/" source="CVE"/>
		<reference ref_id="CVE-2021-47510" ref_url="https://www.suse.com/security/cve/CVE-2021-47510/" source="CVE"/>
		<reference ref_id="CVE-2021-47511" ref_url="https://www.suse.com/security/cve/CVE-2021-47511/" source="CVE"/>
		<reference ref_id="CVE-2021-47512" ref_url="https://www.suse.com/security/cve/CVE-2021-47512/" source="CVE"/>
		<reference ref_id="CVE-2021-47513" ref_url="https://www.suse.com/security/cve/CVE-2021-47513/" source="CVE"/>
		<reference ref_id="CVE-2021-47514" ref_url="https://www.suse.com/security/cve/CVE-2021-47514/" source="CVE"/>
		<reference ref_id="CVE-2021-47516" ref_url="https://www.suse.com/security/cve/CVE-2021-47516/" source="CVE"/>
		<reference ref_id="CVE-2021-47518" ref_url="https://www.suse.com/security/cve/CVE-2021-47518/" source="CVE"/>
		<reference ref_id="CVE-2021-47520" ref_url="https://www.suse.com/security/cve/CVE-2021-47520/" source="CVE"/>
		<reference ref_id="CVE-2021-47521" ref_url="https://www.suse.com/security/cve/CVE-2021-47521/" source="CVE"/>
		<reference ref_id="CVE-2021-47522" ref_url="https://www.suse.com/security/cve/CVE-2021-47522/" source="CVE"/>
		<reference ref_id="CVE-2021-47523" ref_url="https://www.suse.com/security/cve/CVE-2021-47523/" source="CVE"/>
		<reference ref_id="CVE-2021-47524" ref_url="https://www.suse.com/security/cve/CVE-2021-47524/" source="CVE"/>
		<reference ref_id="CVE-2021-47525" ref_url="https://www.suse.com/security/cve/CVE-2021-47525/" source="CVE"/>
		<reference ref_id="CVE-2021-47526" ref_url="https://www.suse.com/security/cve/CVE-2021-47526/" source="CVE"/>
		<reference ref_id="CVE-2021-47528" ref_url="https://www.suse.com/security/cve/CVE-2021-47528/" source="CVE"/>
		<reference ref_id="CVE-2021-47529" ref_url="https://www.suse.com/security/cve/CVE-2021-47529/" source="CVE"/>
		<reference ref_id="CVE-2021-47530" ref_url="https://www.suse.com/security/cve/CVE-2021-47530/" source="CVE"/>
		<reference ref_id="CVE-2021-47531" ref_url="https://www.suse.com/security/cve/CVE-2021-47531/" source="CVE"/>
		<reference ref_id="CVE-2021-47532" ref_url="https://www.suse.com/security/cve/CVE-2021-47532/" source="CVE"/>
		<reference ref_id="CVE-2021-47533" ref_url="https://www.suse.com/security/cve/CVE-2021-47533/" source="CVE"/>
		<reference ref_id="CVE-2021-47534" ref_url="https://www.suse.com/security/cve/CVE-2021-47534/" source="CVE"/>
		<reference ref_id="CVE-2021-47535" ref_url="https://www.suse.com/security/cve/CVE-2021-47535/" source="CVE"/>
		<reference ref_id="CVE-2021-47536" ref_url="https://www.suse.com/security/cve/CVE-2021-47536/" source="CVE"/>
		<reference ref_id="CVE-2021-47537" ref_url="https://www.suse.com/security/cve/CVE-2021-47537/" source="CVE"/>
		<reference ref_id="CVE-2021-47540" ref_url="https://www.suse.com/security/cve/CVE-2021-47540/" source="CVE"/>
		<reference ref_id="CVE-2021-47541" ref_url="https://www.suse.com/security/cve/CVE-2021-47541/" source="CVE"/>
		<reference ref_id="CVE-2021-47542" ref_url="https://www.suse.com/security/cve/CVE-2021-47542/" source="CVE"/>
		<reference ref_id="CVE-2021-47544" ref_url="https://www.suse.com/security/cve/CVE-2021-47544/" source="CVE"/>
		<reference ref_id="CVE-2021-47548" ref_url="https://www.suse.com/security/cve/CVE-2021-47548/" source="CVE"/>
		<reference ref_id="CVE-2021-47549" ref_url="https://www.suse.com/security/cve/CVE-2021-47549/" source="CVE"/>
		<reference ref_id="CVE-2021-47550" ref_url="https://www.suse.com/security/cve/CVE-2021-47550/" source="CVE"/>
		<reference ref_id="CVE-2021-47551" ref_url="https://www.suse.com/security/cve/CVE-2021-47551/" source="CVE"/>
		<reference ref_id="CVE-2021-47552" ref_url="https://www.suse.com/security/cve/CVE-2021-47552/" source="CVE"/>
		<reference ref_id="CVE-2021-47553" ref_url="https://www.suse.com/security/cve/CVE-2021-47553/" source="CVE"/>
		<reference ref_id="CVE-2021-47554" ref_url="https://www.suse.com/security/cve/CVE-2021-47554/" source="CVE"/>
		<reference ref_id="CVE-2021-47555" ref_url="https://www.suse.com/security/cve/CVE-2021-47555/" source="CVE"/>
		<reference ref_id="CVE-2021-47556" ref_url="https://www.suse.com/security/cve/CVE-2021-47556/" source="CVE"/>
		<reference ref_id="CVE-2021-47557" ref_url="https://www.suse.com/security/cve/CVE-2021-47557/" source="CVE"/>
		<reference ref_id="CVE-2021-47558" ref_url="https://www.suse.com/security/cve/CVE-2021-47558/" source="CVE"/>
		<reference ref_id="CVE-2021-47559" ref_url="https://www.suse.com/security/cve/CVE-2021-47559/" source="CVE"/>
		<reference ref_id="CVE-2021-47560" ref_url="https://www.suse.com/security/cve/CVE-2021-47560/" source="CVE"/>
		<reference ref_id="CVE-2021-47562" ref_url="https://www.suse.com/security/cve/CVE-2021-47562/" source="CVE"/>
		<reference ref_id="CVE-2021-47563" ref_url="https://www.suse.com/security/cve/CVE-2021-47563/" source="CVE"/>
		<reference ref_id="CVE-2021-47564" ref_url="https://www.suse.com/security/cve/CVE-2021-47564/" source="CVE"/>
		<reference ref_id="CVE-2021-47565" ref_url="https://www.suse.com/security/cve/CVE-2021-47565/" source="CVE"/>
		<reference ref_id="CVE-2021-47569" ref_url="https://www.suse.com/security/cve/CVE-2021-47569/" source="CVE"/>
		<reference ref_id="CVE-2022-48633" ref_url="https://www.suse.com/security/cve/CVE-2022-48633/" source="CVE"/>
		<reference ref_id="CVE-2022-48669" ref_url="https://www.suse.com/security/cve/CVE-2022-48669/" source="CVE"/>
		<reference ref_id="CVE-2022-48689" ref_url="https://www.suse.com/security/cve/CVE-2022-48689/" source="CVE"/>
		<reference ref_id="CVE-2022-48691" ref_url="https://www.suse.com/security/cve/CVE-2022-48691/" source="CVE"/>
		<reference ref_id="CVE-2022-48705" ref_url="https://www.suse.com/security/cve/CVE-2022-48705/" source="CVE"/>
		<reference ref_id="CVE-2022-48708" ref_url="https://www.suse.com/security/cve/CVE-2022-48708/" source="CVE"/>
		<reference ref_id="CVE-2022-48709" ref_url="https://www.suse.com/security/cve/CVE-2022-48709/" source="CVE"/>
		<reference ref_id="CVE-2022-48710" ref_url="https://www.suse.com/security/cve/CVE-2022-48710/" source="CVE"/>
		<reference ref_id="CVE-2023-0160" ref_url="https://www.suse.com/security/cve/CVE-2023-0160/" source="CVE"/>
		<reference ref_id="CVE-2023-1829" ref_url="https://www.suse.com/security/cve/CVE-2023-1829/" source="CVE"/>
		<reference ref_id="CVE-2023-42755" ref_url="https://www.suse.com/security/cve/CVE-2023-42755/" source="CVE"/>
		<reference ref_id="CVE-2023-47233" ref_url="https://www.suse.com/security/cve/CVE-2023-47233/" source="CVE"/>
		<reference ref_id="CVE-2023-52586" ref_url="https://www.suse.com/security/cve/CVE-2023-52586/" source="CVE"/>
		<reference ref_id="CVE-2023-52591" ref_url="https://www.suse.com/security/cve/CVE-2023-52591/" source="CVE"/>
		<reference ref_id="CVE-2023-52618" ref_url="https://www.suse.com/security/cve/CVE-2023-52618/" source="CVE"/>
		<reference ref_id="CVE-2023-52642" ref_url="https://www.suse.com/security/cve/CVE-2023-52642/" source="CVE"/>
		<reference ref_id="CVE-2023-52643" ref_url="https://www.suse.com/security/cve/CVE-2023-52643/" source="CVE"/>
		<reference ref_id="CVE-2023-52644" ref_url="https://www.suse.com/security/cve/CVE-2023-52644/" source="CVE"/>
		<reference ref_id="CVE-2023-52650" ref_url="https://www.suse.com/security/cve/CVE-2023-52650/" source="CVE"/>
		<reference ref_id="CVE-2023-52653" ref_url="https://www.suse.com/security/cve/CVE-2023-52653/" source="CVE"/>
		<reference ref_id="CVE-2023-52654" ref_url="https://www.suse.com/security/cve/CVE-2023-52654/" source="CVE"/>
		<reference ref_id="CVE-2023-52655" ref_url="https://www.suse.com/security/cve/CVE-2023-52655/" source="CVE"/>
		<reference ref_id="CVE-2023-52656" ref_url="https://www.suse.com/security/cve/CVE-2023-52656/" source="CVE"/>
		<reference ref_id="CVE-2023-52657" ref_url="https://www.suse.com/security/cve/CVE-2023-52657/" source="CVE"/>
		<reference ref_id="CVE-2023-52659" ref_url="https://www.suse.com/security/cve/CVE-2023-52659/" source="CVE"/>
		<reference ref_id="CVE-2023-52660" ref_url="https://www.suse.com/security/cve/CVE-2023-52660/" source="CVE"/>
		<reference ref_id="CVE-2023-52661" ref_url="https://www.suse.com/security/cve/CVE-2023-52661/" source="CVE"/>
		<reference ref_id="CVE-2023-52662" ref_url="https://www.suse.com/security/cve/CVE-2023-52662/" source="CVE"/>
		<reference ref_id="CVE-2023-52664" ref_url="https://www.suse.com/security/cve/CVE-2023-52664/" source="CVE"/>
		<reference ref_id="CVE-2023-52669" ref_url="https://www.suse.com/security/cve/CVE-2023-52669/" source="CVE"/>
		<reference ref_id="CVE-2023-52671" ref_url="https://www.suse.com/security/cve/CVE-2023-52671/" source="CVE"/>
		<reference ref_id="CVE-2023-52674" ref_url="https://www.suse.com/security/cve/CVE-2023-52674/" source="CVE"/>
		<reference ref_id="CVE-2023-52676" ref_url="https://www.suse.com/security/cve/CVE-2023-52676/" source="CVE"/>
		<reference ref_id="CVE-2023-52678" ref_url="https://www.suse.com/security/cve/CVE-2023-52678/" source="CVE"/>
		<reference ref_id="CVE-2023-52679" ref_url="https://www.suse.com/security/cve/CVE-2023-52679/" source="CVE"/>
		<reference ref_id="CVE-2023-52680" ref_url="https://www.suse.com/security/cve/CVE-2023-52680/" source="CVE"/>
		<reference ref_id="CVE-2023-52683" ref_url="https://www.suse.com/security/cve/CVE-2023-52683/" source="CVE"/>
		<reference ref_id="CVE-2023-52685" ref_url="https://www.suse.com/security/cve/CVE-2023-52685/" source="CVE"/>
		<reference ref_id="CVE-2023-52686" ref_url="https://www.suse.com/security/cve/CVE-2023-52686/" source="CVE"/>
		<reference ref_id="CVE-2023-52690" ref_url="https://www.suse.com/security/cve/CVE-2023-52690/" source="CVE"/>
		<reference ref_id="CVE-2023-52691" ref_url="https://www.suse.com/security/cve/CVE-2023-52691/" source="CVE"/>
		<reference ref_id="CVE-2023-52692" ref_url="https://www.suse.com/security/cve/CVE-2023-52692/" source="CVE"/>
		<reference ref_id="CVE-2023-52693" ref_url="https://www.suse.com/security/cve/CVE-2023-52693/" source="CVE"/>
		<reference ref_id="CVE-2023-52694" ref_url="https://www.suse.com/security/cve/CVE-2023-52694/" source="CVE"/>
		<reference ref_id="CVE-2023-52696" ref_url="https://www.suse.com/security/cve/CVE-2023-52696/" source="CVE"/>
		<reference ref_id="CVE-2023-52698" ref_url="https://www.suse.com/security/cve/CVE-2023-52698/" source="CVE"/>
		<reference ref_id="CVE-2023-52699" ref_url="https://www.suse.com/security/cve/CVE-2023-52699/" source="CVE"/>
		<reference ref_id="CVE-2023-52702" ref_url="https://www.suse.com/security/cve/CVE-2023-52702/" source="CVE"/>
		<reference ref_id="CVE-2023-52703" ref_url="https://www.suse.com/security/cve/CVE-2023-52703/" source="CVE"/>
		<reference ref_id="CVE-2023-52705" ref_url="https://www.suse.com/security/cve/CVE-2023-52705/" source="CVE"/>
		<reference ref_id="CVE-2023-52707" ref_url="https://www.suse.com/security/cve/CVE-2023-52707/" source="CVE"/>
		<reference ref_id="CVE-2023-52708" ref_url="https://www.suse.com/security/cve/CVE-2023-52708/" source="CVE"/>
		<reference ref_id="CVE-2023-52730" ref_url="https://www.suse.com/security/cve/CVE-2023-52730/" source="CVE"/>
		<reference ref_id="CVE-2023-52731" ref_url="https://www.suse.com/security/cve/CVE-2023-52731/" source="CVE"/>
		<reference ref_id="CVE-2023-52732" ref_url="https://www.suse.com/security/cve/CVE-2023-52732/" source="CVE"/>
		<reference ref_id="CVE-2023-52733" ref_url="https://www.suse.com/security/cve/CVE-2023-52733/" source="CVE"/>
		<reference ref_id="CVE-2023-52736" ref_url="https://www.suse.com/security/cve/CVE-2023-52736/" source="CVE"/>
		<reference ref_id="CVE-2023-52738" ref_url="https://www.suse.com/security/cve/CVE-2023-52738/" source="CVE"/>
		<reference ref_id="CVE-2023-52739" ref_url="https://www.suse.com/security/cve/CVE-2023-52739/" source="CVE"/>
		<reference ref_id="CVE-2023-52740" ref_url="https://www.suse.com/security/cve/CVE-2023-52740/" source="CVE"/>
		<reference ref_id="CVE-2023-52741" ref_url="https://www.suse.com/security/cve/CVE-2023-52741/" source="CVE"/>
		<reference ref_id="CVE-2023-52742" ref_url="https://www.suse.com/security/cve/CVE-2023-52742/" source="CVE"/>
		<reference ref_id="CVE-2023-52743" ref_url="https://www.suse.com/security/cve/CVE-2023-52743/" source="CVE"/>
		<reference ref_id="CVE-2023-52744" ref_url="https://www.suse.com/security/cve/CVE-2023-52744/" source="CVE"/>
		<reference ref_id="CVE-2023-52745" ref_url="https://www.suse.com/security/cve/CVE-2023-52745/" source="CVE"/>
		<reference ref_id="CVE-2023-52746" ref_url="https://www.suse.com/security/cve/CVE-2023-52746/" source="CVE"/>
		<reference ref_id="CVE-2023-52747" ref_url="https://www.suse.com/security/cve/CVE-2023-52747/" source="CVE"/>
		<reference ref_id="CVE-2023-52753" ref_url="https://www.suse.com/security/cve/CVE-2023-52753/" source="CVE"/>
		<reference ref_id="CVE-2023-52754" ref_url="https://www.suse.com/security/cve/CVE-2023-52754/" source="CVE"/>
		<reference ref_id="CVE-2023-52756" ref_url="https://www.suse.com/security/cve/CVE-2023-52756/" source="CVE"/>
		<reference ref_id="CVE-2023-52757" ref_url="https://www.suse.com/security/cve/CVE-2023-52757/" source="CVE"/>
		<reference ref_id="CVE-2023-52759" ref_url="https://www.suse.com/security/cve/CVE-2023-52759/" source="CVE"/>
		<reference ref_id="CVE-2023-52763" ref_url="https://www.suse.com/security/cve/CVE-2023-52763/" source="CVE"/>
		<reference ref_id="CVE-2023-52764" ref_url="https://www.suse.com/security/cve/CVE-2023-52764/" source="CVE"/>
		<reference ref_id="CVE-2023-52766" ref_url="https://www.suse.com/security/cve/CVE-2023-52766/" source="CVE"/>
		<reference ref_id="CVE-2023-52773" ref_url="https://www.suse.com/security/cve/CVE-2023-52773/" source="CVE"/>
		<reference ref_id="CVE-2023-52774" ref_url="https://www.suse.com/security/cve/CVE-2023-52774/" source="CVE"/>
		<reference ref_id="CVE-2023-52777" ref_url="https://www.suse.com/security/cve/CVE-2023-52777/" source="CVE"/>
		<reference ref_id="CVE-2023-52781" ref_url="https://www.suse.com/security/cve/CVE-2023-52781/" source="CVE"/>
		<reference ref_id="CVE-2023-52788" ref_url="https://www.suse.com/security/cve/CVE-2023-52788/" source="CVE"/>
		<reference ref_id="CVE-2023-52789" ref_url="https://www.suse.com/security/cve/CVE-2023-52789/" source="CVE"/>
		<reference ref_id="CVE-2023-52791" ref_url="https://www.suse.com/security/cve/CVE-2023-52791/" source="CVE"/>
		<reference ref_id="CVE-2023-52795" ref_url="https://www.suse.com/security/cve/CVE-2023-52795/" source="CVE"/>
		<reference ref_id="CVE-2023-52796" ref_url="https://www.suse.com/security/cve/CVE-2023-52796/" source="CVE"/>
		<reference ref_id="CVE-2023-52798" ref_url="https://www.suse.com/security/cve/CVE-2023-52798/" source="CVE"/>
		<reference ref_id="CVE-2023-52799" ref_url="https://www.suse.com/security/cve/CVE-2023-52799/" source="CVE"/>
		<reference ref_id="CVE-2023-52800" ref_url="https://www.suse.com/security/cve/CVE-2023-52800/" source="CVE"/>
		<reference ref_id="CVE-2023-52803" ref_url="https://www.suse.com/security/cve/CVE-2023-52803/" source="CVE"/>
		<reference ref_id="CVE-2023-52804" ref_url="https://www.suse.com/security/cve/CVE-2023-52804/" source="CVE"/>
		<reference ref_id="CVE-2023-52805" ref_url="https://www.suse.com/security/cve/CVE-2023-52805/" source="CVE"/>
		<reference ref_id="CVE-2023-52806" ref_url="https://www.suse.com/security/cve/CVE-2023-52806/" source="CVE"/>
		<reference ref_id="CVE-2023-52807" ref_url="https://www.suse.com/security/cve/CVE-2023-52807/" source="CVE"/>
		<reference ref_id="CVE-2023-52808" ref_url="https://www.suse.com/security/cve/CVE-2023-52808/" source="CVE"/>
		<reference ref_id="CVE-2023-52809" ref_url="https://www.suse.com/security/cve/CVE-2023-52809/" source="CVE"/>
		<reference ref_id="CVE-2023-52810" ref_url="https://www.suse.com/security/cve/CVE-2023-52810/" source="CVE"/>
		<reference ref_id="CVE-2023-52811" ref_url="https://www.suse.com/security/cve/CVE-2023-52811/" source="CVE"/>
		<reference ref_id="CVE-2023-52814" ref_url="https://www.suse.com/security/cve/CVE-2023-52814/" source="CVE"/>
		<reference ref_id="CVE-2023-52815" ref_url="https://www.suse.com/security/cve/CVE-2023-52815/" source="CVE"/>
		<reference ref_id="CVE-2023-52816" ref_url="https://www.suse.com/security/cve/CVE-2023-52816/" source="CVE"/>
		<reference ref_id="CVE-2023-52817" ref_url="https://www.suse.com/security/cve/CVE-2023-52817/" source="CVE"/>
		<reference ref_id="CVE-2023-52818" ref_url="https://www.suse.com/security/cve/CVE-2023-52818/" source="CVE"/>
		<reference ref_id="CVE-2023-52819" ref_url="https://www.suse.com/security/cve/CVE-2023-52819/" source="CVE"/>
		<reference ref_id="CVE-2023-52821" ref_url="https://www.suse.com/security/cve/CVE-2023-52821/" source="CVE"/>
		<reference ref_id="CVE-2023-52825" ref_url="https://www.suse.com/security/cve/CVE-2023-52825/" source="CVE"/>
		<reference ref_id="CVE-2023-52826" ref_url="https://www.suse.com/security/cve/CVE-2023-52826/" source="CVE"/>
		<reference ref_id="CVE-2023-52832" ref_url="https://www.suse.com/security/cve/CVE-2023-52832/" source="CVE"/>
		<reference ref_id="CVE-2023-52833" ref_url="https://www.suse.com/security/cve/CVE-2023-52833/" source="CVE"/>
		<reference ref_id="CVE-2023-52834" ref_url="https://www.suse.com/security/cve/CVE-2023-52834/" source="CVE"/>
		<reference ref_id="CVE-2023-52838" ref_url="https://www.suse.com/security/cve/CVE-2023-52838/" source="CVE"/>
		<reference ref_id="CVE-2023-52840" ref_url="https://www.suse.com/security/cve/CVE-2023-52840/" source="CVE"/>
		<reference ref_id="CVE-2023-52841" ref_url="https://www.suse.com/security/cve/CVE-2023-52841/" source="CVE"/>
		<reference ref_id="CVE-2023-52844" ref_url="https://www.suse.com/security/cve/CVE-2023-52844/" source="CVE"/>
		<reference ref_id="CVE-2023-52847" ref_url="https://www.suse.com/security/cve/CVE-2023-52847/" source="CVE"/>
		<reference ref_id="CVE-2023-52851" ref_url="https://www.suse.com/security/cve/CVE-2023-52851/" source="CVE"/>
		<reference ref_id="CVE-2023-52853" ref_url="https://www.suse.com/security/cve/CVE-2023-52853/" source="CVE"/>
		<reference ref_id="CVE-2023-52854" ref_url="https://www.suse.com/security/cve/CVE-2023-52854/" source="CVE"/>
		<reference ref_id="CVE-2023-52855" ref_url="https://www.suse.com/security/cve/CVE-2023-52855/" source="CVE"/>
		<reference ref_id="CVE-2023-52856" ref_url="https://www.suse.com/security/cve/CVE-2023-52856/" source="CVE"/>
		<reference ref_id="CVE-2023-52858" ref_url="https://www.suse.com/security/cve/CVE-2023-52858/" source="CVE"/>
		<reference ref_id="CVE-2023-52860" ref_url="https://www.suse.com/security/cve/CVE-2023-52860/" source="CVE"/>
		<reference ref_id="CVE-2023-52861" ref_url="https://www.suse.com/security/cve/CVE-2023-52861/" source="CVE"/>
		<reference ref_id="CVE-2023-52864" ref_url="https://www.suse.com/security/cve/CVE-2023-52864/" source="CVE"/>
		<reference ref_id="CVE-2023-52865" ref_url="https://www.suse.com/security/cve/CVE-2023-52865/" source="CVE"/>
		<reference ref_id="CVE-2023-52867" ref_url="https://www.suse.com/security/cve/CVE-2023-52867/" source="CVE"/>
		<reference ref_id="CVE-2023-52868" ref_url="https://www.suse.com/security/cve/CVE-2023-52868/" source="CVE"/>
		<reference ref_id="CVE-2023-52870" ref_url="https://www.suse.com/security/cve/CVE-2023-52870/" source="CVE"/>
		<reference ref_id="CVE-2023-52871" ref_url="https://www.suse.com/security/cve/CVE-2023-52871/" source="CVE"/>
		<reference ref_id="CVE-2023-52872" ref_url="https://www.suse.com/security/cve/CVE-2023-52872/" source="CVE"/>
		<reference ref_id="CVE-2023-52873" ref_url="https://www.suse.com/security/cve/CVE-2023-52873/" source="CVE"/>
		<reference ref_id="CVE-2023-52875" ref_url="https://www.suse.com/security/cve/CVE-2023-52875/" source="CVE"/>
		<reference ref_id="CVE-2023-52876" ref_url="https://www.suse.com/security/cve/CVE-2023-52876/" source="CVE"/>
		<reference ref_id="CVE-2023-52877" ref_url="https://www.suse.com/security/cve/CVE-2023-52877/" source="CVE"/>
		<reference ref_id="CVE-2023-52878" ref_url="https://www.suse.com/security/cve/CVE-2023-52878/" source="CVE"/>
		<reference ref_id="CVE-2023-52880" ref_url="https://www.suse.com/security/cve/CVE-2023-52880/" source="CVE"/>
		<reference ref_id="CVE-2023-6531" ref_url="https://www.suse.com/security/cve/CVE-2023-6531/" source="CVE"/>
		<reference ref_id="CVE-2024-26597" ref_url="https://www.suse.com/security/cve/CVE-2024-26597/" source="CVE"/>
		<reference ref_id="CVE-2024-26643" ref_url="https://www.suse.com/security/cve/CVE-2024-26643/" source="CVE"/>
		<reference ref_id="CVE-2024-26692" ref_url="https://www.suse.com/security/cve/CVE-2024-26692/" source="CVE"/>
		<reference ref_id="CVE-2024-26698" ref_url="https://www.suse.com/security/cve/CVE-2024-26698/" source="CVE"/>
		<reference ref_id="CVE-2024-26715" ref_url="https://www.suse.com/security/cve/CVE-2024-26715/" source="CVE"/>
		<reference ref_id="CVE-2024-26742" ref_url="https://www.suse.com/security/cve/CVE-2024-26742/" source="CVE"/>
		<reference ref_id="CVE-2024-26748" ref_url="https://www.suse.com/security/cve/CVE-2024-26748/" source="CVE"/>
		<reference ref_id="CVE-2024-26758" ref_url="https://www.suse.com/security/cve/CVE-2024-26758/" source="CVE"/>
		<reference ref_id="CVE-2024-26764" ref_url="https://www.suse.com/security/cve/CVE-2024-26764/" source="CVE"/>
		<reference ref_id="CVE-2024-26775" ref_url="https://www.suse.com/security/cve/CVE-2024-26775/" source="CVE"/>
		<reference ref_id="CVE-2024-26777" ref_url="https://www.suse.com/security/cve/CVE-2024-26777/" source="CVE"/>
		<reference ref_id="CVE-2024-26778" ref_url="https://www.suse.com/security/cve/CVE-2024-26778/" source="CVE"/>
		<reference ref_id="CVE-2024-26788" ref_url="https://www.suse.com/security/cve/CVE-2024-26788/" source="CVE"/>
		<reference ref_id="CVE-2024-26801" ref_url="https://www.suse.com/security/cve/CVE-2024-26801/" source="CVE"/>
		<reference ref_id="CVE-2024-26822" ref_url="https://www.suse.com/security/cve/CVE-2024-26822/" source="CVE"/>
		<reference ref_id="CVE-2024-26828" ref_url="https://www.suse.com/security/cve/CVE-2024-26828/" source="CVE"/>
		<reference ref_id="CVE-2024-26829" ref_url="https://www.suse.com/security/cve/CVE-2024-26829/" source="CVE"/>
		<reference ref_id="CVE-2024-26838" ref_url="https://www.suse.com/security/cve/CVE-2024-26838/" source="CVE"/>
		<reference ref_id="CVE-2024-26839" ref_url="https://www.suse.com/security/cve/CVE-2024-26839/" source="CVE"/>
		<reference ref_id="CVE-2024-26846" ref_url="https://www.suse.com/security/cve/CVE-2024-26846/" source="CVE"/>
		<reference ref_id="CVE-2024-26859" ref_url="https://www.suse.com/security/cve/CVE-2024-26859/" source="CVE"/>
		<reference ref_id="CVE-2024-26870" ref_url="https://www.suse.com/security/cve/CVE-2024-26870/" source="CVE"/>
		<reference ref_id="CVE-2024-26874" ref_url="https://www.suse.com/security/cve/CVE-2024-26874/" source="CVE"/>
		<reference ref_id="CVE-2024-26880" ref_url="https://www.suse.com/security/cve/CVE-2024-26880/" source="CVE"/>
		<reference ref_id="CVE-2024-26889" ref_url="https://www.suse.com/security/cve/CVE-2024-26889/" source="CVE"/>
		<reference ref_id="CVE-2024-26894" ref_url="https://www.suse.com/security/cve/CVE-2024-26894/" source="CVE"/>
		<reference ref_id="CVE-2024-26900" ref_url="https://www.suse.com/security/cve/CVE-2024-26900/" source="CVE"/>
		<reference ref_id="CVE-2024-26907" ref_url="https://www.suse.com/security/cve/CVE-2024-26907/" source="CVE"/>
		<reference ref_id="CVE-2024-26916" ref_url="https://www.suse.com/security/cve/CVE-2024-26916/" source="CVE"/>
		<reference ref_id="CVE-2024-26919" ref_url="https://www.suse.com/security/cve/CVE-2024-26919/" source="CVE"/>
		<reference ref_id="CVE-2024-26920" ref_url="https://www.suse.com/security/cve/CVE-2024-26920/" source="CVE"/>
		<reference ref_id="CVE-2024-26921" ref_url="https://www.suse.com/security/cve/CVE-2024-26921/" source="CVE"/>
		<reference ref_id="CVE-2024-26922" ref_url="https://www.suse.com/security/cve/CVE-2024-26922/" source="CVE"/>
		<reference ref_id="CVE-2024-26925" ref_url="https://www.suse.com/security/cve/CVE-2024-26925/" source="CVE"/>
		<reference ref_id="CVE-2024-26928" ref_url="https://www.suse.com/security/cve/CVE-2024-26928/" source="CVE"/>
		<reference ref_id="CVE-2024-26929" ref_url="https://www.suse.com/security/cve/CVE-2024-26929/" source="CVE"/>
		<reference ref_id="CVE-2024-26930" ref_url="https://www.suse.com/security/cve/CVE-2024-26930/" source="CVE"/>
		<reference ref_id="CVE-2024-26931" ref_url="https://www.suse.com/security/cve/CVE-2024-26931/" source="CVE"/>
		<reference ref_id="CVE-2024-26934" ref_url="https://www.suse.com/security/cve/CVE-2024-26934/" source="CVE"/>
		<reference ref_id="CVE-2024-26935" ref_url="https://www.suse.com/security/cve/CVE-2024-26935/" source="CVE"/>
		<reference ref_id="CVE-2024-26937" ref_url="https://www.suse.com/security/cve/CVE-2024-26937/" source="CVE"/>
		<reference ref_id="CVE-2024-26938" ref_url="https://www.suse.com/security/cve/CVE-2024-26938/" source="CVE"/>
		<reference ref_id="CVE-2024-26940" ref_url="https://www.suse.com/security/cve/CVE-2024-26940/" source="CVE"/>
		<reference ref_id="CVE-2024-26943" ref_url="https://www.suse.com/security/cve/CVE-2024-26943/" source="CVE"/>
		<reference ref_id="CVE-2024-26957" ref_url="https://www.suse.com/security/cve/CVE-2024-26957/" source="CVE"/>
		<reference ref_id="CVE-2024-26958" ref_url="https://www.suse.com/security/cve/CVE-2024-26958/" source="CVE"/>
		<reference ref_id="CVE-2024-26964" ref_url="https://www.suse.com/security/cve/CVE-2024-26964/" source="CVE"/>
		<reference ref_id="CVE-2024-26974" ref_url="https://www.suse.com/security/cve/CVE-2024-26974/" source="CVE"/>
		<reference ref_id="CVE-2024-26977" ref_url="https://www.suse.com/security/cve/CVE-2024-26977/" source="CVE"/>
		<reference ref_id="CVE-2024-26984" ref_url="https://www.suse.com/security/cve/CVE-2024-26984/" source="CVE"/>
		<reference ref_id="CVE-2024-26988" ref_url="https://www.suse.com/security/cve/CVE-2024-26988/" source="CVE"/>
		<reference ref_id="CVE-2024-26989" ref_url="https://www.suse.com/security/cve/CVE-2024-26989/" source="CVE"/>
		<reference ref_id="CVE-2024-26994" ref_url="https://www.suse.com/security/cve/CVE-2024-26994/" source="CVE"/>
		<reference ref_id="CVE-2024-26996" ref_url="https://www.suse.com/security/cve/CVE-2024-26996/" source="CVE"/>
		<reference ref_id="CVE-2024-26997" ref_url="https://www.suse.com/security/cve/CVE-2024-26997/" source="CVE"/>
		<reference ref_id="CVE-2024-26999" ref_url="https://www.suse.com/security/cve/CVE-2024-26999/" source="CVE"/>
		<reference ref_id="CVE-2024-27000" ref_url="https://www.suse.com/security/cve/CVE-2024-27000/" source="CVE"/>
		<reference ref_id="CVE-2024-27001" ref_url="https://www.suse.com/security/cve/CVE-2024-27001/" source="CVE"/>
		<reference ref_id="CVE-2024-27004" ref_url="https://www.suse.com/security/cve/CVE-2024-27004/" source="CVE"/>
		<reference ref_id="CVE-2024-27008" ref_url="https://www.suse.com/security/cve/CVE-2024-27008/" source="CVE"/>
		<reference ref_id="CVE-2024-27028" ref_url="https://www.suse.com/security/cve/CVE-2024-27028/" source="CVE"/>
		<reference ref_id="CVE-2024-27037" ref_url="https://www.suse.com/security/cve/CVE-2024-27037/" source="CVE"/>
		<reference ref_id="CVE-2024-27045" ref_url="https://www.suse.com/security/cve/CVE-2024-27045/" source="CVE"/>
		<reference ref_id="CVE-2024-27047" ref_url="https://www.suse.com/security/cve/CVE-2024-27047/" source="CVE"/>
		<reference ref_id="CVE-2024-27051" ref_url="https://www.suse.com/security/cve/CVE-2024-27051/" source="CVE"/>
		<reference ref_id="CVE-2024-27052" ref_url="https://www.suse.com/security/cve/CVE-2024-27052/" source="CVE"/>
		<reference ref_id="CVE-2024-27053" ref_url="https://www.suse.com/security/cve/CVE-2024-27053/" source="CVE"/>
		<reference ref_id="CVE-2024-27054" ref_url="https://www.suse.com/security/cve/CVE-2024-27054/" source="CVE"/>
		<reference ref_id="CVE-2024-27072" ref_url="https://www.suse.com/security/cve/CVE-2024-27072/" source="CVE"/>
		<reference ref_id="CVE-2024-27073" ref_url="https://www.suse.com/security/cve/CVE-2024-27073/" source="CVE"/>
		<reference ref_id="CVE-2024-27074" ref_url="https://www.suse.com/security/cve/CVE-2024-27074/" source="CVE"/>
		<reference ref_id="CVE-2024-27075" ref_url="https://www.suse.com/security/cve/CVE-2024-27075/" source="CVE"/>
		<reference ref_id="CVE-2024-27076" ref_url="https://www.suse.com/security/cve/CVE-2024-27076/" source="CVE"/>
		<reference ref_id="CVE-2024-27077" ref_url="https://www.suse.com/security/cve/CVE-2024-27077/" source="CVE"/>
		<reference ref_id="CVE-2024-27078" ref_url="https://www.suse.com/security/cve/CVE-2024-27078/" source="CVE"/>
		<reference ref_id="CVE-2024-27388" ref_url="https://www.suse.com/security/cve/CVE-2024-27388/" source="CVE"/>
		<reference ref_id="CVE-2024-27393" ref_url="https://www.suse.com/security/cve/CVE-2024-27393/" source="CVE"/>
		<reference ref_id="CVE-2024-27395" ref_url="https://www.suse.com/security/cve/CVE-2024-27395/" source="CVE"/>
		<reference ref_id="CVE-2024-27396" ref_url="https://www.suse.com/security/cve/CVE-2024-27396/" source="CVE"/>
		<reference ref_id="CVE-2024-27398" ref_url="https://www.suse.com/security/cve/CVE-2024-27398/" source="CVE"/>
		<reference ref_id="CVE-2024-27399" ref_url="https://www.suse.com/security/cve/CVE-2024-27399/" source="CVE"/>
		<reference ref_id="CVE-2024-27400" ref_url="https://www.suse.com/security/cve/CVE-2024-27400/" source="CVE"/>
		<reference ref_id="CVE-2024-27401" ref_url="https://www.suse.com/security/cve/CVE-2024-27401/" source="CVE"/>
		<reference ref_id="CVE-2024-27405" ref_url="https://www.suse.com/security/cve/CVE-2024-27405/" source="CVE"/>
		<reference ref_id="CVE-2024-27410" ref_url="https://www.suse.com/security/cve/CVE-2024-27410/" source="CVE"/>
		<reference ref_id="CVE-2024-27412" ref_url="https://www.suse.com/security/cve/CVE-2024-27412/" source="CVE"/>
		<reference ref_id="CVE-2024-27413" ref_url="https://www.suse.com/security/cve/CVE-2024-27413/" source="CVE"/>
		<reference ref_id="CVE-2024-27416" ref_url="https://www.suse.com/security/cve/CVE-2024-27416/" source="CVE"/>
		<reference ref_id="CVE-2024-27417" ref_url="https://www.suse.com/security/cve/CVE-2024-27417/" source="CVE"/>
		<reference ref_id="CVE-2024-27419" ref_url="https://www.suse.com/security/cve/CVE-2024-27419/" source="CVE"/>
		<reference ref_id="CVE-2024-27431" ref_url="https://www.suse.com/security/cve/CVE-2024-27431/" source="CVE"/>
		<reference ref_id="CVE-2024-27435" ref_url="https://www.suse.com/security/cve/CVE-2024-27435/" source="CVE"/>
		<reference ref_id="CVE-2024-27436" ref_url="https://www.suse.com/security/cve/CVE-2024-27436/" source="CVE"/>
		<reference ref_id="CVE-2024-35789" ref_url="https://www.suse.com/security/cve/CVE-2024-35789/" source="CVE"/>
		<reference ref_id="CVE-2024-35791" ref_url="https://www.suse.com/security/cve/CVE-2024-35791/" source="CVE"/>
		<reference ref_id="CVE-2024-35796" ref_url="https://www.suse.com/security/cve/CVE-2024-35796/" source="CVE"/>
		<reference ref_id="CVE-2024-35799" ref_url="https://www.suse.com/security/cve/CVE-2024-35799/" source="CVE"/>
		<reference ref_id="CVE-2024-35801" ref_url="https://www.suse.com/security/cve/CVE-2024-35801/" source="CVE"/>
		<reference ref_id="CVE-2024-35804" ref_url="https://www.suse.com/security/cve/CVE-2024-35804/" source="CVE"/>
		<reference ref_id="CVE-2024-35806" ref_url="https://www.suse.com/security/cve/CVE-2024-35806/" source="CVE"/>
		<reference ref_id="CVE-2024-35809" ref_url="https://www.suse.com/security/cve/CVE-2024-35809/" source="CVE"/>
		<reference ref_id="CVE-2024-35811" ref_url="https://www.suse.com/security/cve/CVE-2024-35811/" source="CVE"/>
		<reference ref_id="CVE-2024-35812" ref_url="https://www.suse.com/security/cve/CVE-2024-35812/" source="CVE"/>
		<reference ref_id="CVE-2024-35813" ref_url="https://www.suse.com/security/cve/CVE-2024-35813/" source="CVE"/>
		<reference ref_id="CVE-2024-35815" ref_url="https://www.suse.com/security/cve/CVE-2024-35815/" source="CVE"/>
		<reference ref_id="CVE-2024-35817" ref_url="https://www.suse.com/security/cve/CVE-2024-35817/" source="CVE"/>
		<reference ref_id="CVE-2024-35821" ref_url="https://www.suse.com/security/cve/CVE-2024-35821/" source="CVE"/>
		<reference ref_id="CVE-2024-35822" ref_url="https://www.suse.com/security/cve/CVE-2024-35822/" source="CVE"/>
		<reference ref_id="CVE-2024-35823" ref_url="https://www.suse.com/security/cve/CVE-2024-35823/" source="CVE"/>
		<reference ref_id="CVE-2024-35825" ref_url="https://www.suse.com/security/cve/CVE-2024-35825/" source="CVE"/>
		<reference ref_id="CVE-2024-35828" ref_url="https://www.suse.com/security/cve/CVE-2024-35828/" source="CVE"/>
		<reference ref_id="CVE-2024-35829" ref_url="https://www.suse.com/security/cve/CVE-2024-35829/" source="CVE"/>
		<reference ref_id="CVE-2024-35830" ref_url="https://www.suse.com/security/cve/CVE-2024-35830/" source="CVE"/>
		<reference ref_id="CVE-2024-35833" ref_url="https://www.suse.com/security/cve/CVE-2024-35833/" source="CVE"/>
		<reference ref_id="CVE-2024-35845" ref_url="https://www.suse.com/security/cve/CVE-2024-35845/" source="CVE"/>
		<reference ref_id="CVE-2024-35847" ref_url="https://www.suse.com/security/cve/CVE-2024-35847/" source="CVE"/>
		<reference ref_id="CVE-2024-35849" ref_url="https://www.suse.com/security/cve/CVE-2024-35849/" source="CVE"/>
		<reference ref_id="CVE-2024-35851" ref_url="https://www.suse.com/security/cve/CVE-2024-35851/" source="CVE"/>
		<reference ref_id="CVE-2024-35852" ref_url="https://www.suse.com/security/cve/CVE-2024-35852/" source="CVE"/>
		<reference ref_id="CVE-2024-35854" ref_url="https://www.suse.com/security/cve/CVE-2024-35854/" source="CVE"/>
		<reference ref_id="CVE-2024-35860" ref_url="https://www.suse.com/security/cve/CVE-2024-35860/" source="CVE"/>
		<reference ref_id="CVE-2024-35861" ref_url="https://www.suse.com/security/cve/CVE-2024-35861/" source="CVE"/>
		<reference ref_id="CVE-2024-35862" ref_url="https://www.suse.com/security/cve/CVE-2024-35862/" source="CVE"/>
		<reference ref_id="CVE-2024-35863" ref_url="https://www.suse.com/security/cve/CVE-2024-35863/" source="CVE"/>
		<reference ref_id="CVE-2024-35864" ref_url="https://www.suse.com/security/cve/CVE-2024-35864/" source="CVE"/>
		<reference ref_id="CVE-2024-35865" ref_url="https://www.suse.com/security/cve/CVE-2024-35865/" source="CVE"/>
		<reference ref_id="CVE-2024-35866" ref_url="https://www.suse.com/security/cve/CVE-2024-35866/" source="CVE"/>
		<reference ref_id="CVE-2024-35867" ref_url="https://www.suse.com/security/cve/CVE-2024-35867/" source="CVE"/>
		<reference ref_id="CVE-2024-35868" ref_url="https://www.suse.com/security/cve/CVE-2024-35868/" source="CVE"/>
		<reference ref_id="CVE-2024-35869" ref_url="https://www.suse.com/security/cve/CVE-2024-35869/" source="CVE"/>
		<reference ref_id="CVE-2024-35870" ref_url="https://www.suse.com/security/cve/CVE-2024-35870/" source="CVE"/>
		<reference ref_id="CVE-2024-35872" ref_url="https://www.suse.com/security/cve/CVE-2024-35872/" source="CVE"/>
		<reference ref_id="CVE-2024-35875" ref_url="https://www.suse.com/security/cve/CVE-2024-35875/" source="CVE"/>
		<reference ref_id="CVE-2024-35877" ref_url="https://www.suse.com/security/cve/CVE-2024-35877/" source="CVE"/>
		<reference ref_id="CVE-2024-35878" ref_url="https://www.suse.com/security/cve/CVE-2024-35878/" source="CVE"/>
		<reference ref_id="CVE-2024-35879" ref_url="https://www.suse.com/security/cve/CVE-2024-35879/" source="CVE"/>
		<reference ref_id="CVE-2024-35885" ref_url="https://www.suse.com/security/cve/CVE-2024-35885/" source="CVE"/>
		<reference ref_id="CVE-2024-35887" ref_url="https://www.suse.com/security/cve/CVE-2024-35887/" source="CVE"/>
		<reference ref_id="CVE-2024-35895" ref_url="https://www.suse.com/security/cve/CVE-2024-35895/" source="CVE"/>
		<reference ref_id="CVE-2024-35901" ref_url="https://www.suse.com/security/cve/CVE-2024-35901/" source="CVE"/>
		<reference ref_id="CVE-2024-35904" ref_url="https://www.suse.com/security/cve/CVE-2024-35904/" source="CVE"/>
		<reference ref_id="CVE-2024-35905" ref_url="https://www.suse.com/security/cve/CVE-2024-35905/" source="CVE"/>
		<reference ref_id="CVE-2024-35907" ref_url="https://www.suse.com/security/cve/CVE-2024-35907/" source="CVE"/>
		<reference ref_id="CVE-2024-35912" ref_url="https://www.suse.com/security/cve/CVE-2024-35912/" source="CVE"/>
		<reference ref_id="CVE-2024-35914" ref_url="https://www.suse.com/security/cve/CVE-2024-35914/" source="CVE"/>
		<reference ref_id="CVE-2024-35915" ref_url="https://www.suse.com/security/cve/CVE-2024-35915/" source="CVE"/>
		<reference ref_id="CVE-2024-35922" ref_url="https://www.suse.com/security/cve/CVE-2024-35922/" source="CVE"/>
		<reference ref_id="CVE-2024-35924" ref_url="https://www.suse.com/security/cve/CVE-2024-35924/" source="CVE"/>
		<reference ref_id="CVE-2024-35930" ref_url="https://www.suse.com/security/cve/CVE-2024-35930/" source="CVE"/>
		<reference ref_id="CVE-2024-35932" ref_url="https://www.suse.com/security/cve/CVE-2024-35932/" source="CVE"/>
		<reference ref_id="CVE-2024-35933" ref_url="https://www.suse.com/security/cve/CVE-2024-35933/" source="CVE"/>
		<reference ref_id="CVE-2024-35935" ref_url="https://www.suse.com/security/cve/CVE-2024-35935/" source="CVE"/>
		<reference ref_id="CVE-2024-35936" ref_url="https://www.suse.com/security/cve/CVE-2024-35936/" source="CVE"/>
		<reference ref_id="CVE-2024-35938" ref_url="https://www.suse.com/security/cve/CVE-2024-35938/" source="CVE"/>
		<reference ref_id="CVE-2024-35939" ref_url="https://www.suse.com/security/cve/CVE-2024-35939/" source="CVE"/>
		<reference ref_id="CVE-2024-35940" ref_url="https://www.suse.com/security/cve/CVE-2024-35940/" source="CVE"/>
		<reference ref_id="CVE-2024-35943" ref_url="https://www.suse.com/security/cve/CVE-2024-35943/" source="CVE"/>
		<reference ref_id="CVE-2024-35944" ref_url="https://www.suse.com/security/cve/CVE-2024-35944/" source="CVE"/>
		<reference ref_id="CVE-2024-35947" ref_url="https://www.suse.com/security/cve/CVE-2024-35947/" source="CVE"/>
		<reference ref_id="CVE-2024-35950" ref_url="https://www.suse.com/security/cve/CVE-2024-35950/" source="CVE"/>
		<reference ref_id="CVE-2024-35951" ref_url="https://www.suse.com/security/cve/CVE-2024-35951/" source="CVE"/>
		<reference ref_id="CVE-2024-35952" ref_url="https://www.suse.com/security/cve/CVE-2024-35952/" source="CVE"/>
		<reference ref_id="CVE-2024-35955" ref_url="https://www.suse.com/security/cve/CVE-2024-35955/" source="CVE"/>
		<reference ref_id="CVE-2024-35959" ref_url="https://www.suse.com/security/cve/CVE-2024-35959/" source="CVE"/>
		<reference ref_id="CVE-2024-35963" ref_url="https://www.suse.com/security/cve/CVE-2024-35963/" source="CVE"/>
		<reference ref_id="CVE-2024-35964" ref_url="https://www.suse.com/security/cve/CVE-2024-35964/" source="CVE"/>
		<reference ref_id="CVE-2024-35965" ref_url="https://www.suse.com/security/cve/CVE-2024-35965/" source="CVE"/>
		<reference ref_id="CVE-2024-35966" ref_url="https://www.suse.com/security/cve/CVE-2024-35966/" source="CVE"/>
		<reference ref_id="CVE-2024-35967" ref_url="https://www.suse.com/security/cve/CVE-2024-35967/" source="CVE"/>
		<reference ref_id="CVE-2024-35969" ref_url="https://www.suse.com/security/cve/CVE-2024-35969/" source="CVE"/>
		<reference ref_id="CVE-2024-35973" ref_url="https://www.suse.com/security/cve/CVE-2024-35973/" source="CVE"/>
		<reference ref_id="CVE-2024-35976" ref_url="https://www.suse.com/security/cve/CVE-2024-35976/" source="CVE"/>
		<reference ref_id="CVE-2024-35978" ref_url="https://www.suse.com/security/cve/CVE-2024-35978/" source="CVE"/>
		<reference ref_id="CVE-2024-35982" ref_url="https://www.suse.com/security/cve/CVE-2024-35982/" source="CVE"/>
		<reference ref_id="CVE-2024-35984" ref_url="https://www.suse.com/security/cve/CVE-2024-35984/" source="CVE"/>
		<reference ref_id="CVE-2024-35989" ref_url="https://www.suse.com/security/cve/CVE-2024-35989/" source="CVE"/>
		<reference ref_id="CVE-2024-35990" ref_url="https://www.suse.com/security/cve/CVE-2024-35990/" source="CVE"/>
		<reference ref_id="CVE-2024-35998" ref_url="https://www.suse.com/security/cve/CVE-2024-35998/" source="CVE"/>
		<reference ref_id="CVE-2024-35999" ref_url="https://www.suse.com/security/cve/CVE-2024-35999/" source="CVE"/>
		<reference ref_id="CVE-2024-36006" ref_url="https://www.suse.com/security/cve/CVE-2024-36006/" source="CVE"/>
		<reference ref_id="CVE-2024-36007" ref_url="https://www.suse.com/security/cve/CVE-2024-36007/" source="CVE"/>
		<reference ref_id="CVE-2024-36012" ref_url="https://www.suse.com/security/cve/CVE-2024-36012/" source="CVE"/>
		<reference ref_id="CVE-2024-36014" ref_url="https://www.suse.com/security/cve/CVE-2024-36014/" source="CVE"/>
		<reference ref_id="CVE-2024-36015" ref_url="https://www.suse.com/security/cve/CVE-2024-36015/" source="CVE"/>
		<reference ref_id="CVE-2024-36016" ref_url="https://www.suse.com/security/cve/CVE-2024-36016/" source="CVE"/>
		<reference ref_id="CVE-2024-36026" ref_url="https://www.suse.com/security/cve/CVE-2024-36026/" source="CVE"/>
		<reference ref_id="CVE-2024-36029" ref_url="https://www.suse.com/security/cve/CVE-2024-36029/" source="CVE"/>
		<reference ref_id="CVE-2024-36032" ref_url="https://www.suse.com/security/cve/CVE-2024-36032/" source="CVE"/>
		<reference ref_id="CVE-2024-36880" ref_url="https://www.suse.com/security/cve/CVE-2024-36880/" source="CVE"/>
		<reference ref_id="CVE-2024-36893" ref_url="https://www.suse.com/security/cve/CVE-2024-36893/" source="CVE"/>
		<reference ref_id="CVE-2024-36896" ref_url="https://www.suse.com/security/cve/CVE-2024-36896/" source="CVE"/>
		<reference ref_id="CVE-2024-36897" ref_url="https://www.suse.com/security/cve/CVE-2024-36897/" source="CVE"/>
		<reference ref_id="CVE-2024-36906" ref_url="https://www.suse.com/security/cve/CVE-2024-36906/" source="CVE"/>
		<reference ref_id="CVE-2024-36918" ref_url="https://www.suse.com/security/cve/CVE-2024-36918/" source="CVE"/>
		<reference ref_id="CVE-2024-36924" ref_url="https://www.suse.com/security/cve/CVE-2024-36924/" source="CVE"/>
		<reference ref_id="CVE-2024-36926" ref_url="https://www.suse.com/security/cve/CVE-2024-36926/" source="CVE"/>
		<reference ref_id="CVE-2024-36928" ref_url="https://www.suse.com/security/cve/CVE-2024-36928/" source="CVE"/>
		<reference ref_id="CVE-2024-36931" ref_url="https://www.suse.com/security/cve/CVE-2024-36931/" source="CVE"/>
		<reference ref_id="CVE-2024-36938" ref_url="https://www.suse.com/security/cve/CVE-2024-36938/" source="CVE"/>
		<reference ref_id="CVE-2024-36940" ref_url="https://www.suse.com/security/cve/CVE-2024-36940/" source="CVE"/>
		<reference ref_id="CVE-2024-36941" ref_url="https://www.suse.com/security/cve/CVE-2024-36941/" source="CVE"/>
		<reference ref_id="CVE-2024-36942" ref_url="https://www.suse.com/security/cve/CVE-2024-36942/" source="CVE"/>
		<reference ref_id="CVE-2024-36944" ref_url="https://www.suse.com/security/cve/CVE-2024-36944/" source="CVE"/>
		<reference ref_id="CVE-2024-36947" ref_url="https://www.suse.com/security/cve/CVE-2024-36947/" source="CVE"/>
		<reference ref_id="CVE-2024-36950" ref_url="https://www.suse.com/security/cve/CVE-2024-36950/" source="CVE"/>
		<reference ref_id="CVE-2024-36952" ref_url="https://www.suse.com/security/cve/CVE-2024-36952/" source="CVE"/>
		<reference ref_id="CVE-2024-36955" ref_url="https://www.suse.com/security/cve/CVE-2024-36955/" source="CVE"/>
		<reference ref_id="CVE-2024-36959" ref_url="https://www.suse.com/security/cve/CVE-2024-36959/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2024-35924: Limit read size on v1.2 (bsc#1224657).
- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
- CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING  (bsc#1224575).
- CVE-2024-36938: Fixed NULL pointer dereference in  sk_psock_skb_ingress_enqueue (bsc#1225761).
- CVE-2024-35905: Fixed int overflow for stack access size  (bsc#1224488).
- CVE-2023-52795: Fixed use after free in vhost_vdpa_probe()  (bsc#1225085).
- CVE-2024-35998: Fixed lock ordering potential deadlock in  cifs_sync_mid_result (bsc#1224549).
- CVE-2023-52757: Fixed potential deadlock when releasing mids  (bsc#1225548).
- CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506)
- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).
- CVE-2024-26822: Set correct id, uid and cruid for multiuser  automounts (bsc#1223011).
- CVE-2024-35999: Fixed missing lock when picking channel (bsc#1224550).
- CVE-2024-35861: Fixed potential UAF in  cifs_signal_cifsd_for_reconnect() (bsc#1224766).
- CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()  (bsc#1224764).
- CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1224763).
- CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break()  (bsc#1224668).
- CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()  (bsc#1224765).
- CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664).
- CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write() (bsc#1224678).
- CVE-2024-35866: Fixed potential UAF in cifs_dump_full_key()  (bsc#1224667).
- CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show() (bsc#1223532).
- CVE-2024-35869: Guarantee refcounted children from parent session  (bsc#1224679).
- CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224672).
- CVE-2024-26692: Fixed regression in writes when non-standard maximum write  size negotiated (bsc#1222464).
- CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path (bsc#1223390).
- CVE-2023-42755: Check user supplied offsets (bsc#1215702).
- CVE-2024-35964: Fixed not validating setsockopt user input  (bsc#1224581).
- CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass()  (CVE-2023-52698 bsc#1224621)
- CVE-2023-52664: Eliminate double free in error handling logic  (bsc#1224747).
- CVE-2023-52807: Fixed out-of-bounds access may occur when coalesce  info is read via debugfs (bsc#1225097).
- CVE-2024-27431: Fixed Zero-initialise xdp_rxq_info struct before running  XDP program (bsc#1224718).
- CVE-2024-35860: struct bpf_link and bpf_link_ops kABI workaround  (bsc#1224531).
- CVE-2023-52671: Fixed hang/underflow when transitioning to ODM4:1 (bsc#1224729).
- CVE-2024-35799: Prevent crash when disable stream (bsc#1224740).
- CVE-2024-35951: Fixed the error path in panfrost_mmu_map_fault_addr() (bsc#1224701).
- CVE-2024-27413: Fixed incorrect allocation size (bsc#1224438).
- CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1224736).
- CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).
- CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr  (bsc#1224580).
- CVE-2023-52746: Prevent potential spectre v1 gadget in xfrm_xlate32_attr()  (bsc#1225114)
- CVE-2024-35872: Fixed GUP-fast succeeding on secretmem folios  (bsc#1224530).
- CVE-2024-35852: Fixed memory leak when canceling rehash  work (bsc#1224502).
- CVE-2024-36006: Fixed incorrect list API usage  (bsc#1224541).
- CVE-2024-36007: Fixed warning during rehash  (bsc#1224543).
- CVE-2024-35885: Stop interface during shutdown (bsc#1224519).
- CVE-2024-35907: Call request_irq() after NAPI initialized  (bsc#1224492).
- CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
- CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure (bsc#1224535).
- CVE-2024-35875: Require seeding RNG with RDRAND on CoCo systems (bsc#1224665).
- CVE-2024-35804: Mark target gfn of emulated atomic instruction as  dirty (bsc#1224638).
- CVE-2024-35791: Flush pages under kvm-&gt;lock to fix UAF in  svm_register_enc_region() (bsc#1224725).
- CVE-2024-35904: Fixed dereference of garbage after mount failure (bsc#1224494).
- CVE-2023-52660: Fiedx IRQ handling due to shared interrupts  (bsc#1224443).
- CVE-2024-35879: kABI workaround for drivers/of/dynamic.c (bsc#1224524).
- CVE-2024-35943: Fixed a null pointer dereference in omap_prm_domain_init (bsc#1224649).
- CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf()  (bsc#1224671).
- CVE-2023-52860: Fixed null pointer dereference in hisi_hns3 (bsc#1224936).
- CVE-2024-35959: Fixed mlx5e_priv_init() cleanup flow (bsc#1224666).
- CVE-2024-35854: Fixed possible use-after-free during  rehash (bsc#1224636).
- CVE-2024-35973: Fixed header validation in geneve[6]_xmit_skb  (bsc#1224586).
- CVE-2024-27417: Fixed potential 'struct net' leak in inet6_rtm_getaddr()  (bsc#1224721)
- CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187).
- CVE-2023-52674: Add clamp() in scarlett2_mixer_ctl_put()  (bsc#1224727).
- CVE-2023-52680: Fixed missing error checks to *_ctl_get()  (bsc#1224608).
- CVE-2023-52692: Fixed missing error check to  scarlett2_usb_set_config() (bsc#1224628).
- CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host()  (bsc#1224648).
- CVE-2024-26742: Fixed disable_managed_interrupts (git-fixes  bsc#1222608).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).
- CVE-2023-52586: Fixed  mutex lock in control vblank irq (bsc#1221081).
- CVE-2024-27395: Fixed Use-After-Free in ovs_ct_exit (bsc#1224098).
- CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).
- CVE-2024-26715: Fixed NULL pointer dereference in  dwc3_gadget_suspend (bsc#1222561).
- CVE-2024-26919: Fixed debugfs directory leak (bsc#1223847).
- CVE-2024-27401: Fixed user_length taken into account when  fetching packet contents (bsc#1224181).
- CVE-2024-26900: Fixed kmemleak of rdev-&gt;serial (bsc#1223046).
- CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).
- CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).
- CVE-2024-26643: Fixed mark set as dead when unbinding anonymous  set with timeout (bsc#1221829).
- CVE-2023-52618: Fixed string overflow in block/rnbd-srv (bsc#1221615).
- CVE-2022-48689: Fixed data-race in lru_add_fn (bsc#1223959)
- CVE-2022-48691: Fixed memory leak in netfilter (bsc#1223961)
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).

The following non-security bugs were fixed:

- 9p: explicitly deny setlease attempts (git-fixes).
- ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes).
- ACPI: disable -Wstringop-truncation (git-fixes).
- ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes).
- ACPI: LPSS: Advertise number of chip selects via property (git-fixes).
- admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET (git-fixes).
- af_unix: annote lockless accesses to unix_tot_inflight &amp; gc_in_progress (bsc#1223384).
- af_unix: Do not use atomic ops for unix_sk(sk)-&gt;inflight (bsc#1223384).
- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
- ALSA: core: Fix NULL module pointer assignment at card init (git-fixes).
- ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes).
- ALSA: line6: Zero-initialize message buffers (stable-fixes).
- ARM: 9381/1: kasan: clear stale stack poison (git-fixes).
- ASoC: Intel: avs: Fix ASRC module initialization (git-fixes).
- ASoC: Intel: avs: Fix potential integer overflow (git-fixes).
- ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes).
- ASoC: Intel: Disable route checks for Skylake boards (git-fixes).
- ASoC: kirkwood: Fix potential NULL dereference (git-fixes).
- ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes).
- ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes).
- ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes).
- ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes).
- ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).
- ata: pata_legacy: make legacy_exit() work again (git-fixes).
- ata: sata_gemini: Check clk_enable() result (stable-fixes).
- autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166).
- Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes).
- Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor() (git-fixes).
- Bluetooth: hci_sync: Do not double print name in add/remove adv_monitor (bsc#1216358).
- Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes).
- Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes).
- Bluetooth: qca: add missing firmware sanity checks (git-fixes).
- Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes).
- Bluetooth: qca: fix firmware check error path (git-fixes).
- Bluetooth: qca: fix info leak when fetching fw build id (git-fixes).
- Bluetooth: qca: fix NVM configuration parsing (git-fixes).
- bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git-fixes)
- bpf: decouple prune and jump points (bsc#1225756).
- bpf: fix precision backtracking instruction iteration (bsc#1225756).
- bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes).
- bpf: handle ldimm64 properly in check_cfg() (bsc#1225756).
- bpf: mostly decouple jump history management from is_state_visited() (bsc#1225756).
- bpf: remove unnecessary prune and jump points (bsc#1225756).
- btrfs: add error messages to all unrecognized mount options (git-fixes)
- btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes)
- btrfs: export: handle invalid inode or root reference in btrfs_get_parent() (git-fixes)
- btrfs: extend locking to all space_info members accesses (git-fixes)
- btrfs: fix btrfs_submit_compressed_write cgroup attribution (git-fixes)
- btrfs: fix fallocate to use file_modified to update permissions consistently (git-fixes)
- btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes)
- btrfs: fix missing blkdev_put() call in btrfs_scan_one_device() (git-fixes)
- btrfs: fix off-by-one chunk length calculation at contains_pending_extent() (git-fixes)
- btrfs: fix qgroup reserve overflow the qgroup limit (git-fixes)
- btrfs: fix silent failure when deleting root reference (git-fixes)
- btrfs: fix use-after-free after failure to create a snapshot (git-fixes)
- btrfs: free exchange changeset on failures (git-fixes)
- btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git-fixes)
- btrfs: make search_csum_tree return 0 if we get -EFBIG (git-fixes)
- btrfs: prevent copying too big compressed lzo segment (git-fixes)
- btrfs: remove BUG_ON(!eie) in find_parent_nodes (git-fixes)
- btrfs: remove BUG_ON() in find_parent_nodes() (git-fixes)
- btrfs: repair super block num_devices automatically (git-fixes)
- btrfs: replace the BUG_ON in btrfs_del_root_ref with proper error handling (git-fixes)
- btrfs: send: ensure send_fd is writable (git-fixes)
- btrfs: send: handle path ref underflow in header iterate_inode_ref() (git-fixes)
- btrfs: send: in case of IO error log it (git-fixes)
- btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes)
- btrfs: tree-checker: check item_size for dev_item (git-fixes)
- btrfs: tree-checker: check item_size for inode_item (git-fixes)
- cifs: account for primary channel in the interface list (bsc#1224020).
- cifs: cifs_chan_is_iface_active should be called with chan_lock held (bsc#1224020).
- cifs: distribute channels across interfaces based on speed (bsc#1224020).
- cifs: do not pass cifs_sb when trying to add channels (bsc#1224020).
- cifs: failure to add channel on iface should bump up weight (git-fixes, bsc#1224020).
- cifs: fix charset issue in reconnection (bsc#1224020).
- cifs: fix leak of iface for primary channel (git-fixes, bsc#1224020).
- cifs: handle cases where a channel is closed (bsc#1224020).
- cifs: handle cases where multiple sessions share connection (bsc#1224020).
- cifs: reconnect work should have reference on server struct (bsc#1224020).
- clk: Do not hold prepare_lock when calling kref_put() (stable-fixes).
- clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes).
- counter: stm32-lptimer-cnt: Provide defines for clock polarities (git-fixes).
- counter: stm32-timer-cnt: Provide defines for slave mode selection (git-fixes).
- cppc_cpufreq: Fix possible null pointer dereference (git-fixes).
- cpu/hotplug: Remove the 'cpu' member of cpuhp_cpu_state (git-fixes).
- cpumask: Add for_each_cpu_from() (bsc#1225053).
- crypto: bcm - Fix pointer arithmetic (git-fixes).
- crypto: ccp - drop platform ifdef checks (git-fixes).
- crypto: ecdsa - Fix module auto-load on add-key (git-fixes).
- crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes).
- crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes).
- crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes).
- dm-multipath: dont't attempt SG_IO on non-SCSI-disks (bsc#1223575).
- dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11 users (git-fixes).
- dmaengine: axi-dmac: fix possible race in remove() (git-fixes).
- dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes).
- docs: kernel_include.py: Cope with docutils 0.21 (stable-fixes).
- drivers/nvme: Add quirks for device 126f:2262 (git-fixes).
- drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git-fixes).
- drm: vc4: Fix possible null pointer dereference (git-fixes).
- drm/amd: Flush GFXOFF requests in prepare stage (git-fixes).
- drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes).
- drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes).
- drm/amd/display: Fix potential index out of bounds in color transformation function (git-fixes).
- drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes).
- drm/amdgpu: Refine IB schedule error logging (stable-fixes).
- drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git-fixes).
- drm/arm/malidp: fix a possible null pointer dereference (git-fixes).
- drm/bridge: anx7625: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: dpc3433: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: icn6211: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: lt8912b: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: lt9611: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: tc358775: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes).
- drm/connector: Add \n to message about demoting connector force-probes (git-fixes).
- drm/i915/bios: Fix parsing backlight BDB data (git-fixes).
- drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes).
- drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes).
- drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes).
- drm/meson: dw-hdmi: power up phy on device init (git-fixes).
- drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes).
- drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes).
- drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes).
- drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk (git-fixes).
- drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes).
- drm/panel: atna33xc20: Fix unbalanced regulator in the case HPD does not assert (git-fixes).
- drm/panel: novatek-nt35950: Do not log an error when DSI host can't be found (git-fixes).
- drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector (git-fixes).
- dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes)
- dyndbg: fix old BUG_ON in &gt;control parser (stable-fixes).
- efi: libstub: only free priv.runtime_map when allocated (git-fixes).
- extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes).
- fail_function: fix wrong use of fei_attr_remove().
- fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes).
- fbdev: shmobile: fix snprintf truncation (git-fixes).
- fbdev: sisfb: hide unused variables (git-fixes).
- firewire: ohci: mask bus reset interrupts between ISR and bottom half (stable-fixes).
- firmware: dmi-id: add a release callback function (git-fixes).
- firmware: raspberrypi: Use correct device for DMA mappings (git-fixes).
- fs/9p: drop inodes immediately on non-.L too (git-fixes).
- fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes).
- fs/9p: translate O_TRUNC into OTRUNC (git-fixes).
- gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes).
- gpio: wcove: Use -ENOTSUPP consistently (stable-fixes).
- gpu: host1x: Do not setup DMA for virtual devices (stable-fixes).
- HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes).
- hwmon: (corsair-cpro) Protect ccp-&gt;wait_input_report with a spinlock (git-fixes).
- hwmon: (corsair-cpro) Use a separate buffer for sending commands (git-fixes).
- hwmon: (corsair-cpro) Use complete_all() instead of complete() in ccp_raw_event() (git-fixes).
- hwmon: (lm70) fix links in doc and comments (git-fixes).
- hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes).
- i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame (git-fixes).
- i3c: master: svc: fix invalidate IBI type and miss call client IBI handler (git-fixes).
- IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes)
- idpf: extend tx watchdog timeout (bsc#1224137).
- iio: core: Leave private pointer NULL when no private data supplied (git-fixes).
- iio: pressure: dps310: support negative temperature values (git-fixes).
- Input: cyapa - add missing input core locking to suspend/resume functions (git-fixes).
- Input: ims-pcu - fix printf string overflow (git-fixes).
- Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes).
- io_uring/unix: drop usage of io_uring socket (git-fixes).
- iomap: Fix inline extent handling in iomap_readpage (git-fixes)
- iomap: iomap: fix memory corruption when recording errors during writeback (git-fixes)
- iomap: Support partial direct I/O on user copy failures (git-fixes)
- iommu/dma: Force swiotlb_max_mapping_size on an untrusted device (bsc#1224331)
- jffs2: prevent xattr node from overflowing the eraseblock (git-fixes).
- kABI: bpf: struct bpf_insn_aux_data kABI workaround (bsc#1225756).
- kcm: do not sense pfmemalloc status in kcm_sendpage() (git-fixes bsc#1223959)
- KEYS: trusted: Do not use WARN when encode fails (git-fixes).
- KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes).
- KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1224794).
- KVM: x86: Delete duplicate documentation for KVM_X86_SET_MSR_FILTER (git-fixes).
- leds: pwm: Disable PWM when going to suspend (git-fixes).
- libsubcmd: Fix parse-options memory leak (git-fixes).
- locking/atomic: Make test_and_*_bit() ordered on failure (git-fixes).
- media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries (git-fixes).
- media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes).
- media: mc: mark the media devnode as registered from the, start (git-fixes).
- media: ngene: Add dvb_ca_en50221_init return value check (git-fixes).
- media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes).
- mei: me: add lunar lake point M DID (stable-fixes).
- mfd: intel-lpss: Revert 'Add missing check for platform_get_resource' (git-fixes).
- mfd: ti_am335x_tscadc: Support the correctly spelled DT property (git-fixes).
- mfd: tqmx86: Specify IO port register range more precisely (git-fixes).
- mlxbf_gige: Enable the GigE port in mlxbf_gige_open (git-fixes).
- mlxbf_gige: Fix intermittent no ip issue (git-fixes).
- mlxbf_gige: stop PHY during open() error paths (git-fixes).
- mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes).
- mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes).
- mtd: core: Report error if first mtd_otp_size() call fails in mtd_otp_nvmem_add() (git-fixes).
- mtd: rawnand: hynix: fixed typo (git-fixes).
- net: do not sense pfmemalloc status in skb_append_pagefrags() (git-fixes bsc#1223959)
- net: introduce __skb_fill_page_desc_noacc (git-fixes bsc#1223959)
- net: nfc: remove inappropriate attrs check (stable-fixes).
- net: qualcomm: rmnet: fix global oob in rmnet_policy (git-fixes).
- net: usb: ax88179_178a: fix link status when link is set to down/up (git-fixes).
- net: usb: smsc95xx: stop lying about skb-&gt;truesize (git-fixes).
- net: usb: sr9700: stop lying about skb-&gt;truesize (git-fixes).
- net:usb:qmi_wwan: support Rolling modules (stable-fixes).
- netfilter: nf_tables: bail out early if hardware offload is not supported (git-fixes bsc#1223961)
- nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git-fixes).
- nfc: nci: Fix uninit-value in nci_rx_work (git-fixes).
- nilfs2: fix out-of-range warning (git-fixes).
- nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes).
- nilfs2: fix use-after-free of timer for log writer thread (git-fixes).
- nilfs2: make superblock data array index computation sparse friendly (git-fixes).
- nvme-multipath: fix io accounting on failover (git-fixes).
- nvme: ensure disabling pairs with unquiesce (bsc#1224534).
- nvme: fix miss command type check (git-fixes).
- nvme: fix multipath batched completion accounting (git-fixes).
- nvmet: fix ns enable/disable possible hang (git-fixes).
- PCI: dwc: Detect iATU settings after getting 'addr_space' resource (git-fixes).
- PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host (git-fixes).
- PCI: dwc: Use the bitmap API to allocate bitmaps (git-fixes).
- PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes).
- PCI: tegra194: Fix probe path for Endpoint mode (git-fixes).
- PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes).
- PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes).
- pinctrl: armada-37xx: remove an unused variable (git-fixes).
- pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes).
- pinctrl: core: handle radix_tree_insert() errors in pinctrl_register_one_pin() (stable-fixes).
- pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes).
- pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git-fixes).
- pinctrl/meson: fix typo in PDM's pin name (git-fixes).
- platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git-fixes).
- platform/x86/intel-uncore-freq: Do not present root domain on error (git-fixes).
- power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes).
- powerpc/eeh: Permanently disable the removed device (bsc#1223991 ltc#205740).
- powerpc/eeh: Small refactor of eeh_handle_normal_event() (bsc#1223991 ltc#205740).
- powerpc/eeh: Use a goto for recovery failures (bsc#1223991 ltc#205740).
- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).
- powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes).
- powerpc/pseries/vio: Do not return ENODEV if node or compatible missing (bsc#1220783).
- powerpc/uaccess: Fix build errors seen with GCC 13/14 (bsc#1194869).
- powerpc/uaccess: Use YZ asm constraint for ld (bsc#1194869).
- ppdev: Add an error check in register_device (git-fixes).
- printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1225616).
- qibfs: fix dentry leak (git-fixes)
- RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git-fixes)
- RDMA/hns: Fix deadlock on SRQ async events. (git-fixes)
- RDMA/hns: Fix GMV table pagesize (git-fixes)
- RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes)
- RDMA/hns: Fix UAF for cq async event (git-fixes)
- RDMA/hns: Modify the print level of CQE error (git-fixes)
- RDMA/hns: Use complete parentheses in macros (git-fixes)
- RDMA/IPoIB: Fix format truncation compilation errors (git-fixes)
- RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes)
- RDMA/mlx5: Fix port number for counter query in multi-port configuration (git-fixes)
- RDMA/rxe: Add ibdev_dbg macros for rxe (git-fixes)
- RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes)
- RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes)
- RDMA/rxe: Fix the problem 'mutex_destroy missing' (git-fixes)
- RDMA/rxe: Replace pr_xxx by rxe_dbg_xxx in rxe_net.c (git-fixes)
- RDMA/rxe: Split rxe_run_task() into two subroutines (git-fixes)
- regulator: bd71828: Do not overwrite runtime voltages (git-fixes).
- regulator: core: fix debugfs creation regression (git-fixes).
- regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes).
- remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes).
- ring-buffer: Fix a race between readers and resize checks (git-fixes).
- s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224795).
- s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224796).
- s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224346).
- s390/ipl: Fix incorrect initialization of len fields in nvme reipl block (git-fixes bsc#1225139).
- s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes bsc#1225138).
- sched/topology: Optimize topology_span_sane() (bsc#1225053).
- scsi: arcmsr: Support new PCI device IDs 1883 and 1886 (git-fixes).
- scsi: bfa: Fix function pointer type mismatch for hcb_qe-&gt;cbfn (git-fixes).
- scsi: core: Consult supported VPD page list prior to fetching page (git-fixes).
- scsi: core: Fix unremoved procfs host directory regression (git-fixes).
- scsi: csiostor: Avoid function pointer casts (git-fixes).
- scsi: libfc: Do not schedule abort twice (git-fixes).
- scsi: libfc: Fix up timeout error in fc_fcp_rec_error() (git-fixes).
- scsi: lpfc: Add support for 32 byte CDBs (bsc#1225842).
- scsi: lpfc: Change default logging level for unsolicited CT MIB commands (bsc#1225842).
- scsi: lpfc: Change lpfc_hba hba_flag member into a bitmask (bsc#1225842).
- scsi: lpfc: Clear deferred RSCN processing flag when driver is unloading (bsc#1225842).
- scsi: lpfc: Copyright updates for 14.4.0.2 patches (bsc#1225842).
- scsi: lpfc: Introduce rrq_list_lock to protect active_rrq_list (bsc#1225842).
- scsi: lpfc: Update logging of protection type for T10 DIF I/O (bsc#1225842).
- scsi: lpfc: Update lpfc version to 14.4.0.2 (bsc#1225842).
- scsi: mpt3sas: Prevent sending diag_reset when the controller is ready (git-fixes).
- scsi: mylex: Fix sysfs buffer lengths (git-fixes).
- scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes).
- scsi: sd: Unregister device if device_add_disk() failed in sd_probe() (git-fixes).
- selftests/pidfd: Fix config for pidfd_setns_test (git-fixes).
- serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes).
- serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable-fixes).
- serial: max3100: Fix bitwise types (git-fixes).
- serial: max3100: Lock port-&gt;lock when calling uart_handle_cts_change() (git-fixes).
- serial: max3100: Update uart_driver_registered on driver removal (git-fixes).
- serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git-fixes).
- serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler (git-fixes).
- serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes).
- smb: client: ensure to try all targets when finding nested links (bsc#1224020).
- smb: client: fix mount when dns_resolver key is not available (git-fixes, bsc#1224020).
- smb: client: get rid of dfs code dep in namespace.c (bsc#1224020).
- smb: client: get rid of dfs naming in automount code (bsc#1224020).
- smb: client: introduce DFS_CACHE_TGT_LIST() (bsc#1224020).
- smb: client: reduce stack usage in cifs_try_adding_channels() (bsc#1224020).
- smb: client: remove extra @chan_count check in __cifs_put_smb_ses() (bsc#1224020).
- smb: client: rename cifs_dfs_ref.c to namespace.c (bsc#1224020).
- smb3: show beginning time for per share stats (bsc#1224020).
- soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes).
- soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes).
- speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes).
- spmi: Add a check for remove callback when removing a SPMI driver (git-fixes).
- spmi: hisi-spmi-controller: Do not override device identifier (git-fixes).
- swiotlb: extend buffer pre-padding to alloc_align_mask if necessary (bsc#1224331).
- swiotlb: Fix alignment checks when both allocation and DMA masks are (bsc#1224331)
- swiotlb: Fix double-allocation of slots due to broken alignment (bsc#1224331)
- swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc() (bsc#1224331)
- sysv: do not call sb_bread() with pointers_lock held (git-fixes).
- thermal/drivers/tsens: Fix null pointer dereference (git-fixes).
- tools/latency-collector: Fix -Wformat-security compile warns (git-fixes).
- tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer (bsc#1225535)
- tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer (git-fixes).
- tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes).
- tracing: hide unused ftrace_event_id_fops (git-fixes).
- tty: n_gsm: fix missing receive state reset after mode switch (git-fixes).
- tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes).
- usb: aqc111: stop lying about skb-&gt;truesize (git-fixes).
- usb: gadget: u_audio: Clear uac pointer when freed (git-fixes).
- usb: typec: tipd: fix event checking for tps6598x (git-fixes).
- usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes).
- VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes).
- VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler() (stable-fixes).
- vmci: prevent speculation leaks by sanitizing event in event_deliver() (git-fixes).
- watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git-fixes).
- watchdog: ixp4xx: Make sure restart always works (git-fixes).
- watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin (git-fixes).
- wifi: ar5523: enable proper endpoint verification (git-fixes).
- wifi: ath10k: Fix an error code problem in ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes).
- wifi: ath10k: poll service ready message before failing (git-fixes).
- wifi: ath10k: populate board data for WCN3990 (git-fixes).
- wifi: ath11k: do not force enable power save on non-running vdevs (git-fixes).
- wifi: carl9170: add a proper sanity check for endpoints (git-fixes).
- wifi: carl9170: re-fix fortified-memset warning (git-fixes).
- wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes).
- wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes).
- wifi: mwl8k: initialize cmd-&gt;addr[] properly (git-fixes).
- x86: Fix CPUIDLE_FLAG_IRQ_ENABLE leaking timer reprogram (git-fixes).
- x86/boot: Ignore NMIs during very early boot (git-fixes).
- x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file (git-fixes).
- x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git-fixes).
- x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI (git-fixes).
- x86/kvm: Do not try to disable kvmclock if it was not enabled (git-fixes).
- x86/lib: Fix overflow when counting digits (git-fixes).
- x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes).
- x86/nmi: Drop unused declaration of proc_nmi_enabled() (git-fixes).
- x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for !SRSO (git-fixes).
- x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git-fixes).
- x86/sme: Fix memory encryption setting if enabled by default and not overridden (git-fixes).
- x86/tdx: Preserve shared bit on mprotect() (git-fixes).
- xfs: add missing cmap-&gt;br_state = XFS_EXT_NORM update (git-fixes).
- xfs: fix exception caused by unexpected illegal bestcount in leaf dir (git-fixes).
- xfs: Fix false ENOSPC when performing direct write on a delalloc extent in cow fork (git-fixes).
- xfs: fix imprecise logic in xchk_btree_check_block_owner (git-fixes).
- xfs: fix inode reservation space for removing transaction (git-fixes).
- xfs: shrink failure needs to hold AGI buffer (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141539">SUSE bug 1141539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174585">SUSE bug 1174585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181674">SUSE bug 1181674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187716">SUSE bug 1187716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190569">SUSE bug 1190569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191949">SUSE bug 1191949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192107">SUSE bug 1192107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193983">SUSE bug 1193983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194288">SUSE bug 1194288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196956">SUSE bug 1196956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197915">SUSE bug 1197915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200465">SUSE bug 1200465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205205">SUSE bug 1205205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207284">SUSE bug 1207284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207361">SUSE bug 1207361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207948">SUSE bug 1207948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208149">SUSE bug 1208149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209657">SUSE bug 1209657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209799">SUSE bug 1209799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209834">SUSE bug 1209834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209980">SUSE bug 1209980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210335">SUSE bug 1210335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213863">SUSE bug 1213863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214852">SUSE bug 1214852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215322">SUSE bug 1215322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215702">SUSE bug 1215702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216358">SUSE bug 1216358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216702">SUSE bug 1216702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217169">SUSE bug 1217169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217515">SUSE bug 1217515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218447">SUSE bug 1218447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220021">SUSE bug 1220021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220363">SUSE bug 1220363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220783">SUSE bug 1220783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221044">SUSE bug 1221044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221081">SUSE bug 1221081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221615">SUSE bug 1221615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221777">SUSE bug 1221777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221816">SUSE bug 1221816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221829">SUSE bug 1221829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222011">SUSE bug 1222011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222374">SUSE bug 1222374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222413">SUSE bug 1222413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222464">SUSE bug 1222464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222513">SUSE bug 1222513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222561">SUSE bug 1222561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222608">SUSE bug 1222608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222619">SUSE bug 1222619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222627">SUSE bug 1222627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222721">SUSE bug 1222721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222765">SUSE bug 1222765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222770">SUSE bug 1222770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222783">SUSE bug 1222783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222893">SUSE bug 1222893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222960">SUSE bug 1222960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222961">SUSE bug 1222961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222974">SUSE bug 1222974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222975">SUSE bug 1222975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223011">SUSE bug 1223011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223023">SUSE bug 1223023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223027">SUSE bug 1223027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223031">SUSE bug 1223031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223043">SUSE bug 1223043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223046">SUSE bug 1223046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223048">SUSE bug 1223048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223049">SUSE bug 1223049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223084">SUSE bug 1223084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223113">SUSE bug 1223113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223137">SUSE bug 1223137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223138">SUSE bug 1223138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223188">SUSE bug 1223188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223203">SUSE bug 1223203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223315">SUSE bug 1223315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223384">SUSE bug 1223384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223390">SUSE bug 1223390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223489">SUSE bug 1223489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223532">SUSE bug 1223532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223575">SUSE bug 1223575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223595">SUSE bug 1223595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223626">SUSE bug 1223626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223627">SUSE bug 1223627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223631">SUSE bug 1223631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223633">SUSE bug 1223633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223638">SUSE bug 1223638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223650">SUSE bug 1223650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223653">SUSE bug 1223653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223666">SUSE bug 1223666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223671">SUSE bug 1223671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223675">SUSE bug 1223675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223677">SUSE bug 1223677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223678">SUSE bug 1223678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223698">SUSE bug 1223698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223712">SUSE bug 1223712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223715">SUSE bug 1223715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223717">SUSE bug 1223717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223718">SUSE bug 1223718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223737">SUSE bug 1223737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223741">SUSE bug 1223741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223744">SUSE bug 1223744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223747">SUSE bug 1223747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223748">SUSE bug 1223748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223750">SUSE bug 1223750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223752">SUSE bug 1223752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223754">SUSE bug 1223754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223756">SUSE bug 1223756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223757">SUSE bug 1223757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223762">SUSE bug 1223762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223769">SUSE bug 1223769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223770">SUSE bug 1223770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223779">SUSE bug 1223779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223780">SUSE bug 1223780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223781">SUSE bug 1223781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223788">SUSE bug 1223788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223802">SUSE bug 1223802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223819">SUSE bug 1223819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223826">SUSE bug 1223826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223828">SUSE bug 1223828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223829">SUSE bug 1223829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223837">SUSE bug 1223837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223842">SUSE bug 1223842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223843">SUSE bug 1223843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223844">SUSE bug 1223844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223847">SUSE bug 1223847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223858">SUSE bug 1223858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223875">SUSE bug 1223875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223879">SUSE bug 1223879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223895">SUSE bug 1223895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223959">SUSE bug 1223959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223961">SUSE bug 1223961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223991">SUSE bug 1223991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224020">SUSE bug 1224020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224076">SUSE bug 1224076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224096">SUSE bug 1224096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224098">SUSE bug 1224098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224099">SUSE bug 1224099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224137">SUSE bug 1224137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224166">SUSE bug 1224166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224174">SUSE bug 1224174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224177">SUSE bug 1224177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224180">SUSE bug 1224180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224181">SUSE bug 1224181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224187">SUSE bug 1224187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224331">SUSE bug 1224331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224346">SUSE bug 1224346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224423">SUSE bug 1224423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224432">SUSE bug 1224432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224437">SUSE bug 1224437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224438">SUSE bug 1224438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224442">SUSE bug 1224442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224443">SUSE bug 1224443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224445">SUSE bug 1224445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224449">SUSE bug 1224449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224479">SUSE bug 1224479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224482">SUSE bug 1224482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224487">SUSE bug 1224487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224488">SUSE bug 1224488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224492">SUSE bug 1224492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224494">SUSE bug 1224494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224495">SUSE bug 1224495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224502">SUSE bug 1224502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224508">SUSE bug 1224508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224509">SUSE bug 1224509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224511">SUSE bug 1224511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224519">SUSE bug 1224519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224524">SUSE bug 1224524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224525">SUSE bug 1224525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224530">SUSE bug 1224530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224531">SUSE bug 1224531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224534">SUSE bug 1224534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224535">SUSE bug 1224535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224537">SUSE bug 1224537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224541">SUSE bug 1224541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224543">SUSE bug 1224543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224549">SUSE bug 1224549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224550">SUSE bug 1224550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224558">SUSE bug 1224558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224559">SUSE bug 1224559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224566">SUSE bug 1224566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224567">SUSE bug 1224567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224571">SUSE bug 1224571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224575">SUSE bug 1224575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224576">SUSE bug 1224576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224579">SUSE bug 1224579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224580">SUSE bug 1224580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224581">SUSE bug 1224581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224582">SUSE bug 1224582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224586">SUSE bug 1224586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224587">SUSE bug 1224587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224592">SUSE bug 1224592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224598">SUSE bug 1224598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224601">SUSE bug 1224601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224607">SUSE bug 1224607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224608">SUSE bug 1224608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224611">SUSE bug 1224611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224615">SUSE bug 1224615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224617">SUSE bug 1224617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224618">SUSE bug 1224618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224621">SUSE bug 1224621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224622">SUSE bug 1224622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224624">SUSE bug 1224624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224627">SUSE bug 1224627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224628">SUSE bug 1224628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224629">SUSE bug 1224629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224632">SUSE bug 1224632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224636">SUSE bug 1224636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224637">SUSE bug 1224637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224638">SUSE bug 1224638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224640">SUSE bug 1224640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224643">SUSE bug 1224643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224644">SUSE bug 1224644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224645">SUSE bug 1224645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224647">SUSE bug 1224647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224648">SUSE bug 1224648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224649">SUSE bug 1224649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224650">SUSE bug 1224650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224651">SUSE bug 1224651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224657">SUSE bug 1224657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224659">SUSE bug 1224659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224660">SUSE bug 1224660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224663">SUSE bug 1224663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224664">SUSE bug 1224664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224665">SUSE bug 1224665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224666">SUSE bug 1224666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224667">SUSE bug 1224667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224668">SUSE bug 1224668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224671">SUSE bug 1224671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224672">SUSE bug 1224672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224676">SUSE bug 1224676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224678">SUSE bug 1224678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224679">SUSE bug 1224679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224680">SUSE bug 1224680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224681">SUSE bug 1224681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224682">SUSE bug 1224682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224685">SUSE bug 1224685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224686">SUSE bug 1224686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224692">SUSE bug 1224692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224697">SUSE bug 1224697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224699">SUSE bug 1224699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224701">SUSE bug 1224701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224703">SUSE bug 1224703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224705">SUSE bug 1224705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224707">SUSE bug 1224707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224717">SUSE bug 1224717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224718">SUSE bug 1224718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224721">SUSE bug 1224721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224722">SUSE bug 1224722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224723">SUSE bug 1224723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224725">SUSE bug 1224725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224727">SUSE bug 1224727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224728">SUSE bug 1224728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224729">SUSE bug 1224729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224730">SUSE bug 1224730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224731">SUSE bug 1224731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224732">SUSE bug 1224732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224733">SUSE bug 1224733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224736">SUSE bug 1224736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224738">SUSE bug 1224738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224739">SUSE bug 1224739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224740">SUSE bug 1224740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224747">SUSE bug 1224747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224749">SUSE bug 1224749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224759">SUSE bug 1224759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224763">SUSE bug 1224763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224764">SUSE bug 1224764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224765">SUSE bug 1224765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224766">SUSE bug 1224766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224794">SUSE bug 1224794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224795">SUSE bug 1224795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224796">SUSE bug 1224796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224803">SUSE bug 1224803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224816">SUSE bug 1224816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224895">SUSE bug 1224895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224898">SUSE bug 1224898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224900">SUSE bug 1224900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224901">SUSE bug 1224901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224902">SUSE bug 1224902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224903">SUSE bug 1224903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224904">SUSE bug 1224904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224905">SUSE bug 1224905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224907">SUSE bug 1224907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224909">SUSE bug 1224909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224910">SUSE bug 1224910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224911">SUSE bug 1224911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224912">SUSE bug 1224912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224913">SUSE bug 1224913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224914">SUSE bug 1224914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224915">SUSE bug 1224915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224920">SUSE bug 1224920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224928">SUSE bug 1224928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224929">SUSE bug 1224929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224930">SUSE bug 1224930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224931">SUSE bug 1224931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224932">SUSE bug 1224932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224936">SUSE bug 1224936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224937">SUSE bug 1224937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224941">SUSE bug 1224941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224942">SUSE bug 1224942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224944">SUSE bug 1224944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224945">SUSE bug 1224945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224947">SUSE bug 1224947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224956">SUSE bug 1224956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224988">SUSE bug 1224988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224992">SUSE bug 1224992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225000">SUSE bug 1225000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225003">SUSE bug 1225003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225005">SUSE bug 1225005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225008">SUSE bug 1225008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225009">SUSE bug 1225009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225022">SUSE bug 1225022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225031">SUSE bug 1225031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225032">SUSE bug 1225032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225036">SUSE bug 1225036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225041">SUSE bug 1225041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225044">SUSE bug 1225044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225053">SUSE bug 1225053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225076">SUSE bug 1225076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225077">SUSE bug 1225077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225082">SUSE bug 1225082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225085">SUSE bug 1225085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225086">SUSE bug 1225086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225092">SUSE bug 1225092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225095">SUSE bug 1225095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225096">SUSE bug 1225096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225097">SUSE bug 1225097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225106">SUSE bug 1225106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225108">SUSE bug 1225108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225109">SUSE bug 1225109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225114">SUSE bug 1225114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225118">SUSE bug 1225118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225121">SUSE bug 1225121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225122">SUSE bug 1225122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225123">SUSE bug 1225123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225125">SUSE bug 1225125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225126">SUSE bug 1225126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225127">SUSE bug 1225127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225129">SUSE bug 1225129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225131">SUSE bug 1225131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225132">SUSE bug 1225132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225138">SUSE bug 1225138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225139">SUSE bug 1225139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225145">SUSE bug 1225145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225151">SUSE bug 1225151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225153">SUSE bug 1225153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225156">SUSE bug 1225156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225158">SUSE bug 1225158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225160">SUSE bug 1225160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225161">SUSE bug 1225161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225164">SUSE bug 1225164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225167">SUSE bug 1225167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225180">SUSE bug 1225180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225183">SUSE bug 1225183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225184">SUSE bug 1225184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225186">SUSE bug 1225186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225187">SUSE bug 1225187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225189">SUSE bug 1225189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225190">SUSE bug 1225190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225191">SUSE bug 1225191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225192">SUSE bug 1225192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225193">SUSE bug 1225193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225195">SUSE bug 1225195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225198">SUSE bug 1225198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225201">SUSE bug 1225201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225203">SUSE bug 1225203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225205">SUSE bug 1225205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225206">SUSE bug 1225206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225207">SUSE bug 1225207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225208">SUSE bug 1225208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225209">SUSE bug 1225209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225210">SUSE bug 1225210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225214">SUSE bug 1225214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225222">SUSE bug 1225222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225223">SUSE bug 1225223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225224">SUSE bug 1225224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225225">SUSE bug 1225225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225227">SUSE bug 1225227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225228">SUSE bug 1225228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225229">SUSE bug 1225229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225230">SUSE bug 1225230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225232">SUSE bug 1225232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225233">SUSE bug 1225233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225235">SUSE bug 1225235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225236">SUSE bug 1225236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225237">SUSE bug 1225237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225238">SUSE bug 1225238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225239">SUSE bug 1225239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225240">SUSE bug 1225240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225241">SUSE bug 1225241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225242">SUSE bug 1225242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225243">SUSE bug 1225243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225244">SUSE bug 1225244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225245">SUSE bug 1225245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225246">SUSE bug 1225246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225247">SUSE bug 1225247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225248">SUSE bug 1225248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225249">SUSE bug 1225249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225250">SUSE bug 1225250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225251">SUSE bug 1225251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225252">SUSE bug 1225252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225253">SUSE bug 1225253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225254">SUSE bug 1225254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225255">SUSE bug 1225255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225256">SUSE bug 1225256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225257">SUSE bug 1225257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225258">SUSE bug 1225258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225259">SUSE bug 1225259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225260">SUSE bug 1225260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225261">SUSE bug 1225261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225262">SUSE bug 1225262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225263">SUSE bug 1225263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225268">SUSE bug 1225268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225301">SUSE bug 1225301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225303">SUSE bug 1225303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225304">SUSE bug 1225304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225306">SUSE bug 1225306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225316">SUSE bug 1225316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225318">SUSE bug 1225318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225320">SUSE bug 1225320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225321">SUSE bug 1225321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225322">SUSE bug 1225322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225323">SUSE bug 1225323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225326">SUSE bug 1225326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225327">SUSE bug 1225327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225328">SUSE bug 1225328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225329">SUSE bug 1225329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225330">SUSE bug 1225330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225331">SUSE bug 1225331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225332">SUSE bug 1225332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225333">SUSE bug 1225333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225334">SUSE bug 1225334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225335">SUSE bug 1225335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225336">SUSE bug 1225336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225337">SUSE bug 1225337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225338">SUSE bug 1225338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225339">SUSE bug 1225339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225341">SUSE bug 1225341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225342">SUSE bug 1225342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225344">SUSE bug 1225344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225346">SUSE bug 1225346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225347">SUSE bug 1225347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225351">SUSE bug 1225351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225353">SUSE bug 1225353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225354">SUSE bug 1225354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225355">SUSE bug 1225355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225357">SUSE bug 1225357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225358">SUSE bug 1225358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225360">SUSE bug 1225360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225361">SUSE bug 1225361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225366">SUSE bug 1225366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225367">SUSE bug 1225367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225368">SUSE bug 1225368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225369">SUSE bug 1225369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225370">SUSE bug 1225370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225372">SUSE bug 1225372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225373">SUSE bug 1225373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225374">SUSE bug 1225374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225375">SUSE bug 1225375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225376">SUSE bug 1225376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225377">SUSE bug 1225377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225379">SUSE bug 1225379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225380">SUSE bug 1225380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225382">SUSE bug 1225382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225383">SUSE bug 1225383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225384">SUSE bug 1225384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225386">SUSE bug 1225386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225387">SUSE bug 1225387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225388">SUSE bug 1225388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225390">SUSE bug 1225390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225392">SUSE bug 1225392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225393">SUSE bug 1225393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225396">SUSE bug 1225396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225400">SUSE bug 1225400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225404">SUSE bug 1225404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225405">SUSE bug 1225405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225408">SUSE bug 1225408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225409">SUSE bug 1225409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225410">SUSE bug 1225410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225411">SUSE bug 1225411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225424">SUSE bug 1225424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225425">SUSE bug 1225425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225427">SUSE bug 1225427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225431">SUSE bug 1225431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225435">SUSE bug 1225435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225436">SUSE bug 1225436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225437">SUSE bug 1225437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225438">SUSE bug 1225438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225439">SUSE bug 1225439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225441">SUSE bug 1225441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225442">SUSE bug 1225442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225443">SUSE bug 1225443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225444">SUSE bug 1225444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225445">SUSE bug 1225445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225446">SUSE bug 1225446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225447">SUSE bug 1225447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225450">SUSE bug 1225450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225453">SUSE bug 1225453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225455">SUSE bug 1225455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225461">SUSE bug 1225461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225463">SUSE bug 1225463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225464">SUSE bug 1225464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225466">SUSE bug 1225466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225467">SUSE bug 1225467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225468">SUSE bug 1225468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225471">SUSE bug 1225471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225472">SUSE bug 1225472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225478">SUSE bug 1225478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225479">SUSE bug 1225479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225480">SUSE bug 1225480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225482">SUSE bug 1225482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225483">SUSE bug 1225483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225486">SUSE bug 1225486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225488">SUSE bug 1225488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225490">SUSE bug 1225490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225492">SUSE bug 1225492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225495">SUSE bug 1225495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225499">SUSE bug 1225499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225500">SUSE bug 1225500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225501">SUSE bug 1225501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225502">SUSE bug 1225502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225506">SUSE bug 1225506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225508">SUSE bug 1225508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225510">SUSE bug 1225510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225513">SUSE bug 1225513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225515">SUSE bug 1225515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225529">SUSE bug 1225529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225530">SUSE bug 1225530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225532">SUSE bug 1225532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225534">SUSE bug 1225534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225535">SUSE bug 1225535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225548">SUSE bug 1225548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225549">SUSE bug 1225549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225550">SUSE bug 1225550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225553">SUSE bug 1225553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225554">SUSE bug 1225554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225555">SUSE bug 1225555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225556">SUSE bug 1225556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225557">SUSE bug 1225557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225559">SUSE bug 1225559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225560">SUSE bug 1225560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225565">SUSE bug 1225565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225566">SUSE bug 1225566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225568">SUSE bug 1225568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225569">SUSE bug 1225569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225570">SUSE bug 1225570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225571">SUSE bug 1225571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225572">SUSE bug 1225572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225577">SUSE bug 1225577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225583">SUSE bug 1225583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225584">SUSE bug 1225584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225587">SUSE bug 1225587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225588">SUSE bug 1225588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225589">SUSE bug 1225589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225590">SUSE bug 1225590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225591">SUSE bug 1225591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225592">SUSE bug 1225592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225593">SUSE bug 1225593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225595">SUSE bug 1225595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225599">SUSE bug 1225599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225616">SUSE bug 1225616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225640">SUSE bug 1225640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225642">SUSE bug 1225642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225705">SUSE bug 1225705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225708">SUSE bug 1225708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225715">SUSE bug 1225715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225720">SUSE bug 1225720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225722">SUSE bug 1225722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225734">SUSE bug 1225734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225735">SUSE bug 1225735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225747">SUSE bug 1225747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225748">SUSE bug 1225748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225756">SUSE bug 1225756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225761">SUSE bug 1225761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225766">SUSE bug 1225766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225775">SUSE bug 1225775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225810">SUSE bug 1225810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225820">SUSE bug 1225820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225829">SUSE bug 1225829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225835">SUSE bug 1225835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225842">SUSE bug 1225842</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-36788/">CVE-2020-36788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36788">CVE-2020-36788 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-39698">CVE-2021-39698 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4148/">CVE-2021-4148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4148">CVE-2021-4148 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47358/">CVE-2021-47358 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47358">CVE-2021-47358 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47359/">CVE-2021-47359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47359">CVE-2021-47359 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47360/">CVE-2021-47360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47360">CVE-2021-47360 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47361/">CVE-2021-47361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47361">CVE-2021-47361 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47362/">CVE-2021-47362 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47362">CVE-2021-47362 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47363/">CVE-2021-47363 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47363">CVE-2021-47363 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47364/">CVE-2021-47364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47364">CVE-2021-47364 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47365/">CVE-2021-47365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47365">CVE-2021-47365 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-47366/">CVE-2021-47366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47366">CVE-2021-47366 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47367/">CVE-2021-47367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47367">CVE-2021-47367 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47368/">CVE-2021-47368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47368">CVE-2021-47368 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47369/">CVE-2021-47369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47369">CVE-2021-47369 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47370/">CVE-2021-47370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47370">CVE-2021-47370 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47371/">CVE-2021-47371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47371">CVE-2021-47371 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47372/">CVE-2021-47372 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47372">CVE-2021-47372 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47373/">CVE-2021-47373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47373">CVE-2021-47373 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47374/">CVE-2021-47374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47374">CVE-2021-47374 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47375/">CVE-2021-47375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47375">CVE-2021-47375 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47376/">CVE-2021-47376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47376">CVE-2021-47376 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47378/">CVE-2021-47378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47378">CVE-2021-47378 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47379/">CVE-2021-47379 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47379">CVE-2021-47379 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47380/">CVE-2021-47380 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47380">CVE-2021-47380 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47381/">CVE-2021-47381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47381">CVE-2021-47381 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47382/">CVE-2021-47382 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47382">CVE-2021-47382 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47383/">CVE-2021-47383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47383">CVE-2021-47383 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47384/">CVE-2021-47384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47384">CVE-2021-47384 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47385/">CVE-2021-47385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47385">CVE-2021-47385 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47386/">CVE-2021-47386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47386">CVE-2021-47386 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47387/">CVE-2021-47387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47387">CVE-2021-47387 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47388/">CVE-2021-47388 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47388">CVE-2021-47388 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47389/">CVE-2021-47389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47389">CVE-2021-47389 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47390/">CVE-2021-47390 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47390">CVE-2021-47390 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47391/">CVE-2021-47391 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47391">CVE-2021-47391 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47392/">CVE-2021-47392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47392">CVE-2021-47392 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47393/">CVE-2021-47393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47393">CVE-2021-47393 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47394/">CVE-2021-47394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47394">CVE-2021-47394 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47395/">CVE-2021-47395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47395">CVE-2021-47395 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47396/">CVE-2021-47396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47396">CVE-2021-47396 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47397/">CVE-2021-47397 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47397">CVE-2021-47397 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47398/">CVE-2021-47398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47398">CVE-2021-47398 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47399/">CVE-2021-47399 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47399">CVE-2021-47399 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47400/">CVE-2021-47400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47400">CVE-2021-47400 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47401/">CVE-2021-47401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47401">CVE-2021-47401 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47402/">CVE-2021-47402 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47402">CVE-2021-47402 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47403/">CVE-2021-47403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47403">CVE-2021-47403 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47404/">CVE-2021-47404 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47404">CVE-2021-47404 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47405/">CVE-2021-47405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47405">CVE-2021-47405 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47406/">CVE-2021-47406 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47406">CVE-2021-47406 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47407/">CVE-2021-47407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47407">CVE-2021-47407 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47408/">CVE-2021-47408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47408">CVE-2021-47408 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47409/">CVE-2021-47409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47409">CVE-2021-47409 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47410/">CVE-2021-47410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47410">CVE-2021-47410 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47412/">CVE-2021-47412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47412">CVE-2021-47412 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47413/">CVE-2021-47413 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47413">CVE-2021-47413 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47414/">CVE-2021-47414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47414">CVE-2021-47414 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47415/">CVE-2021-47415 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47415">CVE-2021-47415 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47416/">CVE-2021-47416 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47416">CVE-2021-47416 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47417/">CVE-2021-47417 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47417">CVE-2021-47417 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47418/">CVE-2021-47418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47418">CVE-2021-47418 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47419/">CVE-2021-47419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47419">CVE-2021-47419 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47420/">CVE-2021-47420 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47420">CVE-2021-47420 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47421/">CVE-2021-47421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47421">CVE-2021-47421 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47422/">CVE-2021-47422 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47422">CVE-2021-47422 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47423/">CVE-2021-47423 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47423">CVE-2021-47423 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47424/">CVE-2021-47424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47424">CVE-2021-47424 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47425/">CVE-2021-47425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47425">CVE-2021-47425 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47426/">CVE-2021-47426 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47426">CVE-2021-47426 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47427/">CVE-2021-47427 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47427">CVE-2021-47427 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47428/">CVE-2021-47428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47428">CVE-2021-47428 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47429/">CVE-2021-47429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47429">CVE-2021-47429 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47430/">CVE-2021-47430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47430">CVE-2021-47430 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47431/">CVE-2021-47431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47431">CVE-2021-47431 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-47433/">CVE-2021-47433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47433">CVE-2021-47433 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47434/">CVE-2021-47434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47434">CVE-2021-47434 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47435/">CVE-2021-47435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47435">CVE-2021-47435 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47436/">CVE-2021-47436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47436">CVE-2021-47436 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47437/">CVE-2021-47437 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47437">CVE-2021-47437 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47438/">CVE-2021-47438 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47438">CVE-2021-47438 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47439/">CVE-2021-47439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47439">CVE-2021-47439 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47440/">CVE-2021-47440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47440">CVE-2021-47440 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47441/">CVE-2021-47441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47441">CVE-2021-47441 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47442/">CVE-2021-47442 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47442">CVE-2021-47442 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47443/">CVE-2021-47443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47443">CVE-2021-47443 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47444/">CVE-2021-47444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47444">CVE-2021-47444 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47445/">CVE-2021-47445 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47445">CVE-2021-47445 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47446/">CVE-2021-47446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47446">CVE-2021-47446 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47447/">CVE-2021-47447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47447">CVE-2021-47447 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47448/">CVE-2021-47448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47448">CVE-2021-47448 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47449/">CVE-2021-47449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47449">CVE-2021-47449 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47450/">CVE-2021-47450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47450">CVE-2021-47450 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47451/">CVE-2021-47451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47451">CVE-2021-47451 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47452/">CVE-2021-47452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47452">CVE-2021-47452 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47453/">CVE-2021-47453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47453">CVE-2021-47453 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47454/">CVE-2021-47454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47454">CVE-2021-47454 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47455/">CVE-2021-47455 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47455">CVE-2021-47455 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47456/">CVE-2021-47456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47456">CVE-2021-47456 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47457/">CVE-2021-47457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47457">CVE-2021-47457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47458/">CVE-2021-47458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47458">CVE-2021-47458 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47459/">CVE-2021-47459 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47459">CVE-2021-47459 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47460/">CVE-2021-47460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47460">CVE-2021-47460 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47461/">CVE-2021-47461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47461">CVE-2021-47461 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47462/">CVE-2021-47462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47462">CVE-2021-47462 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47463/">CVE-2021-47463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47463">CVE-2021-47463 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47464/">CVE-2021-47464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47464">CVE-2021-47464 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47465/">CVE-2021-47465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47465">CVE-2021-47465 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47466/">CVE-2021-47466 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47466">CVE-2021-47466 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47467/">CVE-2021-47467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47467">CVE-2021-47467 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47468/">CVE-2021-47468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47468">CVE-2021-47468 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47469/">CVE-2021-47469 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47469">CVE-2021-47469 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47470/">CVE-2021-47470 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47470">CVE-2021-47470 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47471/">CVE-2021-47471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47471">CVE-2021-47471 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47472/">CVE-2021-47472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47472">CVE-2021-47472 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47473/">CVE-2021-47473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47473">CVE-2021-47473 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47474/">CVE-2021-47474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47474">CVE-2021-47474 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47475/">CVE-2021-47475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47475">CVE-2021-47475 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47476/">CVE-2021-47476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47476">CVE-2021-47476 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47477/">CVE-2021-47477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47477">CVE-2021-47477 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47478/">CVE-2021-47478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47478">CVE-2021-47478 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47479/">CVE-2021-47479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47479">CVE-2021-47479 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47480/">CVE-2021-47480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47480">CVE-2021-47480 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47481/">CVE-2021-47481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47481">CVE-2021-47481 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47482/">CVE-2021-47482 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47482">CVE-2021-47482 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47483/">CVE-2021-47483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47483">CVE-2021-47483 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47484/">CVE-2021-47484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47484">CVE-2021-47484 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47485/">CVE-2021-47485 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47485">CVE-2021-47485 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47486/">CVE-2021-47486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47486">CVE-2021-47486 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47488/">CVE-2021-47488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47488">CVE-2021-47488 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47489/">CVE-2021-47489 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47489">CVE-2021-47489 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47490/">CVE-2021-47490 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47490">CVE-2021-47490 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47491/">CVE-2021-47491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47491">CVE-2021-47491 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47492/">CVE-2021-47492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47492">CVE-2021-47492 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47493/">CVE-2021-47493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47493">CVE-2021-47493 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47494/">CVE-2021-47494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47494">CVE-2021-47494 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47495/">CVE-2021-47495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47495">CVE-2021-47495 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47496/">CVE-2021-47496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47496">CVE-2021-47496 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47497/">CVE-2021-47497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47497">CVE-2021-47497 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47498/">CVE-2021-47498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47498">CVE-2021-47498 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47499/">CVE-2021-47499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47499">CVE-2021-47499 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47500/">CVE-2021-47500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47500">CVE-2021-47500 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47501/">CVE-2021-47501 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47501">CVE-2021-47501 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47502/">CVE-2021-47502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47502">CVE-2021-47502 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47503/">CVE-2021-47503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47503">CVE-2021-47503 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47504/">CVE-2021-47504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47504">CVE-2021-47504 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47505/">CVE-2021-47505 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47505">CVE-2021-47505 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47506/">CVE-2021-47506 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47506">CVE-2021-47506 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47507/">CVE-2021-47507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47507">CVE-2021-47507 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47508/">CVE-2021-47508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47508">CVE-2021-47508 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47509/">CVE-2021-47509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47509">CVE-2021-47509 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47510/">CVE-2021-47510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47510">CVE-2021-47510 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47511/">CVE-2021-47511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47511">CVE-2021-47511 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47512/">CVE-2021-47512 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47512">CVE-2021-47512 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47513/">CVE-2021-47513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47513">CVE-2021-47513 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47514/">CVE-2021-47514 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47514">CVE-2021-47514 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47516/">CVE-2021-47516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47516">CVE-2021-47516 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47518/">CVE-2021-47518 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47518">CVE-2021-47518 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47520/">CVE-2021-47520 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47520">CVE-2021-47520 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47521/">CVE-2021-47521 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47521">CVE-2021-47521 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47522/">CVE-2021-47522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47522">CVE-2021-47522 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47523/">CVE-2021-47523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47523">CVE-2021-47523 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47524/">CVE-2021-47524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47524">CVE-2021-47524 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47525/">CVE-2021-47525 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47525">CVE-2021-47525 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47526/">CVE-2021-47526 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47526">CVE-2021-47526 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47528/">CVE-2021-47528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47528">CVE-2021-47528 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47529/">CVE-2021-47529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47529">CVE-2021-47529 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47530/">CVE-2021-47530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47530">CVE-2021-47530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47531/">CVE-2021-47531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47531">CVE-2021-47531 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47532/">CVE-2021-47532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47532">CVE-2021-47532 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47533/">CVE-2021-47533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47533">CVE-2021-47533 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47534/">CVE-2021-47534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47534">CVE-2021-47534 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47535/">CVE-2021-47535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47535">CVE-2021-47535 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47536/">CVE-2021-47536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47536">CVE-2021-47536 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47537/">CVE-2021-47537 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47537">CVE-2021-47537 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47540/">CVE-2021-47540 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47540">CVE-2021-47540 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47541/">CVE-2021-47541 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47541">CVE-2021-47541 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47542/">CVE-2021-47542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47542">CVE-2021-47542 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47544/">CVE-2021-47544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47544">CVE-2021-47544 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47548/">CVE-2021-47548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47548">CVE-2021-47548 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47549/">CVE-2021-47549 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47549">CVE-2021-47549 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47550/">CVE-2021-47550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47550">CVE-2021-47550 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47551/">CVE-2021-47551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47551">CVE-2021-47551 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47552/">CVE-2021-47552 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47552">CVE-2021-47552 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47553/">CVE-2021-47553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47553">CVE-2021-47553 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47554/">CVE-2021-47554 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47554">CVE-2021-47554 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47555/">CVE-2021-47555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47555">CVE-2021-47555 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47556/">CVE-2021-47556 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47556">CVE-2021-47556 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47557/">CVE-2021-47557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47557">CVE-2021-47557 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47558/">CVE-2021-47558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47558">CVE-2021-47558 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47559/">CVE-2021-47559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47559">CVE-2021-47559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47560/">CVE-2021-47560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47560">CVE-2021-47560 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47562/">CVE-2021-47562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47562">CVE-2021-47562 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47563/">CVE-2021-47563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47563">CVE-2021-47563 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47564/">CVE-2021-47564 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47564">CVE-2021-47564 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47565/">CVE-2021-47565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47565">CVE-2021-47565 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47569/">CVE-2021-47569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47569">CVE-2021-47569 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48633/">CVE-2022-48633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48633">CVE-2022-48633 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48669/">CVE-2022-48669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48669">CVE-2022-48669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48689/">CVE-2022-48689 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48689">CVE-2022-48689 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48691/">CVE-2022-48691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48691">CVE-2022-48691 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48705/">CVE-2022-48705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48705">CVE-2022-48705 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48708/">CVE-2022-48708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48708">CVE-2022-48708 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48709/">CVE-2022-48709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48709">CVE-2022-48709 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48710/">CVE-2022-48710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48710">CVE-2022-48710 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0160/">CVE-2023-0160 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0160">CVE-2023-0160 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1829/">CVE-2023-1829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1829">CVE-2023-1829 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42755/">CVE-2023-42755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42755">CVE-2023-42755 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47233/">CVE-2023-47233 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47233">CVE-2023-47233 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52586/">CVE-2023-52586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52586">CVE-2023-52586 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52591/">CVE-2023-52591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52591">CVE-2023-52591 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52618/">CVE-2023-52618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52618">CVE-2023-52618 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52642/">CVE-2023-52642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52642">CVE-2023-52642 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52643/">CVE-2023-52643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52643">CVE-2023-52643 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52644/">CVE-2023-52644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52644">CVE-2023-52644 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52650/">CVE-2023-52650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52650">CVE-2023-52650 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52653/">CVE-2023-52653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52653">CVE-2023-52653 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52654/">CVE-2023-52654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52654">CVE-2023-52654 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52655/">CVE-2023-52655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52655">CVE-2023-52655 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52656/">CVE-2023-52656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52656">CVE-2023-52656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52657/">CVE-2023-52657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52657">CVE-2023-52657 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52659/">CVE-2023-52659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52659">CVE-2023-52659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52660/">CVE-2023-52660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52660">CVE-2023-52660 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-52661/">CVE-2023-52661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52661">CVE-2023-52661 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52662/">CVE-2023-52662 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52662">CVE-2023-52662 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52664/">CVE-2023-52664 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52664">CVE-2023-52664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52669/">CVE-2023-52669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52669">CVE-2023-52669 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52671/">CVE-2023-52671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52671">CVE-2023-52671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52674/">CVE-2023-52674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52674">CVE-2023-52674 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52676/">CVE-2023-52676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52676">CVE-2023-52676 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52678/">CVE-2023-52678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52678">CVE-2023-52678 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52679/">CVE-2023-52679 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52679">CVE-2023-52679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52680/">CVE-2023-52680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52680">CVE-2023-52680 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52683/">CVE-2023-52683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52683">CVE-2023-52683 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52685/">CVE-2023-52685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52685">CVE-2023-52685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52686/">CVE-2023-52686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52686">CVE-2023-52686 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52690/">CVE-2023-52690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52690">CVE-2023-52690 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52691/">CVE-2023-52691 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52691">CVE-2023-52691 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52692/">CVE-2023-52692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52692">CVE-2023-52692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52693/">CVE-2023-52693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52693">CVE-2023-52693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52694/">CVE-2023-52694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52694">CVE-2023-52694 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52696/">CVE-2023-52696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52696">CVE-2023-52696 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52698/">CVE-2023-52698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52698">CVE-2023-52698 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52699/">CVE-2023-52699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52699">CVE-2023-52699 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52702/">CVE-2023-52702 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52702">CVE-2023-52702 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52703/">CVE-2023-52703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52703">CVE-2023-52703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52705/">CVE-2023-52705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52705">CVE-2023-52705 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52707/">CVE-2023-52707 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52707">CVE-2023-52707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52708/">CVE-2023-52708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52708">CVE-2023-52708 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52730/">CVE-2023-52730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52730">CVE-2023-52730 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52731/">CVE-2023-52731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52731">CVE-2023-52731 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52732/">CVE-2023-52732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52732">CVE-2023-52732 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52733/">CVE-2023-52733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52733">CVE-2023-52733 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52736/">CVE-2023-52736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52736">CVE-2023-52736 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52738/">CVE-2023-52738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52738">CVE-2023-52738 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52739/">CVE-2023-52739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52739">CVE-2023-52739 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52740/">CVE-2023-52740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52740">CVE-2023-52740 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52741/">CVE-2023-52741 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52741">CVE-2023-52741 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52742/">CVE-2023-52742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52742">CVE-2023-52742 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52743/">CVE-2023-52743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52743">CVE-2023-52743 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52744/">CVE-2023-52744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52744">CVE-2023-52744 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52745/">CVE-2023-52745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52745">CVE-2023-52745 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52746/">CVE-2023-52746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52746">CVE-2023-52746 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52747/">CVE-2023-52747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52747">CVE-2023-52747 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52753/">CVE-2023-52753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52753">CVE-2023-52753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52754/">CVE-2023-52754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52754">CVE-2023-52754 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52756/">CVE-2023-52756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52756">CVE-2023-52756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52757/">CVE-2023-52757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52757">CVE-2023-52757 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52759/">CVE-2023-52759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52759">CVE-2023-52759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52763/">CVE-2023-52763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52763">CVE-2023-52763 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52764/">CVE-2023-52764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52764">CVE-2023-52764 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52766/">CVE-2023-52766 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52766">CVE-2023-52766 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52773/">CVE-2023-52773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52773">CVE-2023-52773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52774/">CVE-2023-52774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52774">CVE-2023-52774 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52777/">CVE-2023-52777 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52777">CVE-2023-52777 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52781/">CVE-2023-52781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52781">CVE-2023-52781 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52788/">CVE-2023-52788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52788">CVE-2023-52788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52789/">CVE-2023-52789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52789">CVE-2023-52789 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52791/">CVE-2023-52791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52791">CVE-2023-52791 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52795/">CVE-2023-52795 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52795">CVE-2023-52795 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52796/">CVE-2023-52796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52796">CVE-2023-52796 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52798/">CVE-2023-52798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52798">CVE-2023-52798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52799/">CVE-2023-52799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52799">CVE-2023-52799 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52800/">CVE-2023-52800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52800">CVE-2023-52800 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52803/">CVE-2023-52803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52803">CVE-2023-52803 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52804/">CVE-2023-52804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52804">CVE-2023-52804 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52805/">CVE-2023-52805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52805">CVE-2023-52805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52806/">CVE-2023-52806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52806">CVE-2023-52806 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52807/">CVE-2023-52807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52807">CVE-2023-52807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52808/">CVE-2023-52808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52808">CVE-2023-52808 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52809/">CVE-2023-52809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52809">CVE-2023-52809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52810/">CVE-2023-52810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52810">CVE-2023-52810 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52811/">CVE-2023-52811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52811">CVE-2023-52811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52814/">CVE-2023-52814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52814">CVE-2023-52814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52815/">CVE-2023-52815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52815">CVE-2023-52815 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52816/">CVE-2023-52816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52816">CVE-2023-52816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52817/">CVE-2023-52817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52817">CVE-2023-52817 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52818/">CVE-2023-52818 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52818">CVE-2023-52818 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52819/">CVE-2023-52819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52819">CVE-2023-52819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52821/">CVE-2023-52821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52821">CVE-2023-52821 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52825/">CVE-2023-52825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52825">CVE-2023-52825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52826/">CVE-2023-52826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52826">CVE-2023-52826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52832/">CVE-2023-52832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52832">CVE-2023-52832 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52833/">CVE-2023-52833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52833">CVE-2023-52833 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52834/">CVE-2023-52834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52834">CVE-2023-52834 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52838/">CVE-2023-52838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52838">CVE-2023-52838 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52840/">CVE-2023-52840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52840">CVE-2023-52840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52841/">CVE-2023-52841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52841">CVE-2023-52841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52844/">CVE-2023-52844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52844">CVE-2023-52844 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52847/">CVE-2023-52847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52847">CVE-2023-52847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52851/">CVE-2023-52851 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52851">CVE-2023-52851 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52853/">CVE-2023-52853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52853">CVE-2023-52853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52854/">CVE-2023-52854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52854">CVE-2023-52854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52855/">CVE-2023-52855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52855">CVE-2023-52855 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52856/">CVE-2023-52856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52856">CVE-2023-52856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52858/">CVE-2023-52858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52858">CVE-2023-52858 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52860/">CVE-2023-52860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52860">CVE-2023-52860 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52861/">CVE-2023-52861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52861">CVE-2023-52861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52864/">CVE-2023-52864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52864">CVE-2023-52864 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52865/">CVE-2023-52865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52865">CVE-2023-52865 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52867/">CVE-2023-52867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52867">CVE-2023-52867 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52868/">CVE-2023-52868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52868">CVE-2023-52868 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52870/">CVE-2023-52870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52870">CVE-2023-52870 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52871/">CVE-2023-52871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52871">CVE-2023-52871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52872/">CVE-2023-52872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52872">CVE-2023-52872 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52873/">CVE-2023-52873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52873">CVE-2023-52873 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52875/">CVE-2023-52875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52875">CVE-2023-52875 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52876/">CVE-2023-52876 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52876">CVE-2023-52876 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52877/">CVE-2023-52877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52877">CVE-2023-52877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52878/">CVE-2023-52878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52878">CVE-2023-52878 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52880/">CVE-2023-52880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52880">CVE-2023-52880 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6531/">CVE-2023-6531 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6531">CVE-2023-6531 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26597/">CVE-2024-26597 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26597">CVE-2024-26597 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26643/">CVE-2024-26643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26643">CVE-2024-26643 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26692/">CVE-2024-26692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26692">CVE-2024-26692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26698/">CVE-2024-26698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26698">CVE-2024-26698 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26715/">CVE-2024-26715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26715">CVE-2024-26715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26742/">CVE-2024-26742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26742">CVE-2024-26742 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26748/">CVE-2024-26748 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26748">CVE-2024-26748 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26758/">CVE-2024-26758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26758">CVE-2024-26758 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26764/">CVE-2024-26764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26764">CVE-2024-26764 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26775/">CVE-2024-26775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26775">CVE-2024-26775 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26777/">CVE-2024-26777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26777">CVE-2024-26777 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26778/">CVE-2024-26778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26778">CVE-2024-26778 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26788/">CVE-2024-26788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26788">CVE-2024-26788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26801/">CVE-2024-26801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26801">CVE-2024-26801 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26822/">CVE-2024-26822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26822">CVE-2024-26822 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26828/">CVE-2024-26828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26828">CVE-2024-26828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26829/">CVE-2024-26829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26829">CVE-2024-26829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26838/">CVE-2024-26838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26838">CVE-2024-26838 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26839/">CVE-2024-26839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26839">CVE-2024-26839 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26846/">CVE-2024-26846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26846">CVE-2024-26846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26859/">CVE-2024-26859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26859">CVE-2024-26859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26870/">CVE-2024-26870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26870">CVE-2024-26870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26874/">CVE-2024-26874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26874">CVE-2024-26874 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26880/">CVE-2024-26880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26880">CVE-2024-26880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26889/">CVE-2024-26889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26889">CVE-2024-26889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26894/">CVE-2024-26894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26894">CVE-2024-26894 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26900/">CVE-2024-26900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26900">CVE-2024-26900 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26907/">CVE-2024-26907 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26907">CVE-2024-26907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26916/">CVE-2024-26916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26916">CVE-2024-26916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26919/">CVE-2024-26919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26919">CVE-2024-26919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26920/">CVE-2024-26920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26920">CVE-2024-26920 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26921/">CVE-2024-26921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26921">CVE-2024-26921 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26922/">CVE-2024-26922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26922">CVE-2024-26922 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26925/">CVE-2024-26925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26925">CVE-2024-26925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26928/">CVE-2024-26928 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26928">CVE-2024-26928 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26929/">CVE-2024-26929 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26929">CVE-2024-26929 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26930/">CVE-2024-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26930">CVE-2024-26930 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26931/">CVE-2024-26931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26931">CVE-2024-26931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26934/">CVE-2024-26934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26934">CVE-2024-26934 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26935/">CVE-2024-26935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26935">CVE-2024-26935 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26937/">CVE-2024-26937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26937">CVE-2024-26937 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26938/">CVE-2024-26938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26938">CVE-2024-26938 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26940/">CVE-2024-26940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26940">CVE-2024-26940 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26943/">CVE-2024-26943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26943">CVE-2024-26943 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26957/">CVE-2024-26957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26957">CVE-2024-26957 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26958/">CVE-2024-26958 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26958">CVE-2024-26958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26964/">CVE-2024-26964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26964">CVE-2024-26964 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26974/">CVE-2024-26974 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26974">CVE-2024-26974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26977/">CVE-2024-26977 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26977">CVE-2024-26977 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26984/">CVE-2024-26984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26984">CVE-2024-26984 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26988/">CVE-2024-26988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26988">CVE-2024-26988 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26989/">CVE-2024-26989 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26989">CVE-2024-26989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26994/">CVE-2024-26994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26994">CVE-2024-26994 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26996/">CVE-2024-26996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26996">CVE-2024-26996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26997/">CVE-2024-26997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26997">CVE-2024-26997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26999/">CVE-2024-26999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26999">CVE-2024-26999 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27000/">CVE-2024-27000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27000">CVE-2024-27000 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27001/">CVE-2024-27001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27001">CVE-2024-27001 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27004/">CVE-2024-27004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27004">CVE-2024-27004 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-27008/">CVE-2024-27008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27008">CVE-2024-27008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27028/">CVE-2024-27028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27028">CVE-2024-27028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27037/">CVE-2024-27037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27037">CVE-2024-27037 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-27045/">CVE-2024-27045 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27045">CVE-2024-27045 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27047/">CVE-2024-27047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27047">CVE-2024-27047 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27051/">CVE-2024-27051 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27051">CVE-2024-27051 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27052/">CVE-2024-27052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27052">CVE-2024-27052 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27053/">CVE-2024-27053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27053">CVE-2024-27053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27054/">CVE-2024-27054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27054">CVE-2024-27054 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27072/">CVE-2024-27072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27072">CVE-2024-27072 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27073/">CVE-2024-27073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27073">CVE-2024-27073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27074/">CVE-2024-27074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27074">CVE-2024-27074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27075/">CVE-2024-27075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27075">CVE-2024-27075 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27076/">CVE-2024-27076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27076">CVE-2024-27076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27077/">CVE-2024-27077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27077">CVE-2024-27077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27078/">CVE-2024-27078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27078">CVE-2024-27078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27388/">CVE-2024-27388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27388">CVE-2024-27388 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27393/">CVE-2024-27393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27393">CVE-2024-27393 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27395/">CVE-2024-27395 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27395">CVE-2024-27395 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27396/">CVE-2024-27396 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27396">CVE-2024-27396 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27398/">CVE-2024-27398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27398">CVE-2024-27398 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27399/">CVE-2024-27399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27399">CVE-2024-27399 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27400/">CVE-2024-27400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27400">CVE-2024-27400 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27401/">CVE-2024-27401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27401">CVE-2024-27401 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27405/">CVE-2024-27405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27405">CVE-2024-27405 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27410/">CVE-2024-27410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27410">CVE-2024-27410 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27412/">CVE-2024-27412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27412">CVE-2024-27412 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27413/">CVE-2024-27413 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27413">CVE-2024-27413 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27416/">CVE-2024-27416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27416">CVE-2024-27416 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27417/">CVE-2024-27417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27417">CVE-2024-27417 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-27419/">CVE-2024-27419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27419">CVE-2024-27419 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27431/">CVE-2024-27431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27431">CVE-2024-27431 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27435/">CVE-2024-27435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27435">CVE-2024-27435 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27436/">CVE-2024-27436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27436">CVE-2024-27436 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35789/">CVE-2024-35789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35789">CVE-2024-35789 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35791/">CVE-2024-35791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35791">CVE-2024-35791 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35796/">CVE-2024-35796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35796">CVE-2024-35796 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35799/">CVE-2024-35799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35799">CVE-2024-35799 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35801/">CVE-2024-35801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35801">CVE-2024-35801 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35804/">CVE-2024-35804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35804">CVE-2024-35804 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35806/">CVE-2024-35806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35806">CVE-2024-35806 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35809/">CVE-2024-35809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35809">CVE-2024-35809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35811/">CVE-2024-35811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35811">CVE-2024-35811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35812/">CVE-2024-35812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35812">CVE-2024-35812 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35813/">CVE-2024-35813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35813">CVE-2024-35813 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35815/">CVE-2024-35815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35815">CVE-2024-35815 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35817/">CVE-2024-35817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35817">CVE-2024-35817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35821/">CVE-2024-35821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35821">CVE-2024-35821 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35822/">CVE-2024-35822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35822">CVE-2024-35822 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35823/">CVE-2024-35823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35823">CVE-2024-35823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35825/">CVE-2024-35825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35825">CVE-2024-35825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35828/">CVE-2024-35828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35828">CVE-2024-35828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35829/">CVE-2024-35829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35829">CVE-2024-35829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35830/">CVE-2024-35830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35830">CVE-2024-35830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35833/">CVE-2024-35833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35833">CVE-2024-35833 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35845/">CVE-2024-35845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35845">CVE-2024-35845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35847/">CVE-2024-35847 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35847">CVE-2024-35847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35849/">CVE-2024-35849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35849">CVE-2024-35849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35851/">CVE-2024-35851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35851">CVE-2024-35851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35852/">CVE-2024-35852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35852">CVE-2024-35852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35854/">CVE-2024-35854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35854">CVE-2024-35854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35860/">CVE-2024-35860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35860">CVE-2024-35860 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35861/">CVE-2024-35861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35861">CVE-2024-35861 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35862/">CVE-2024-35862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35862">CVE-2024-35862 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35863/">CVE-2024-35863 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35863">CVE-2024-35863 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35864/">CVE-2024-35864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35864">CVE-2024-35864 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35865/">CVE-2024-35865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35865">CVE-2024-35865 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35866/">CVE-2024-35866 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35866">CVE-2024-35866 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35867/">CVE-2024-35867 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35867">CVE-2024-35867 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35868/">CVE-2024-35868 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35868">CVE-2024-35868 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35869/">CVE-2024-35869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35869">CVE-2024-35869 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35870/">CVE-2024-35870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35870">CVE-2024-35870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35872/">CVE-2024-35872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35872">CVE-2024-35872 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35875/">CVE-2024-35875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35875">CVE-2024-35875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35877/">CVE-2024-35877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35877">CVE-2024-35877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35878/">CVE-2024-35878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35878">CVE-2024-35878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35879/">CVE-2024-35879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35879">CVE-2024-35879 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35885/">CVE-2024-35885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35885">CVE-2024-35885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35887/">CVE-2024-35887 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35887">CVE-2024-35887 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35895/">CVE-2024-35895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35895">CVE-2024-35895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35901/">CVE-2024-35901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35901">CVE-2024-35901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35904/">CVE-2024-35904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35904">CVE-2024-35904 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35905/">CVE-2024-35905 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35905">CVE-2024-35905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35907/">CVE-2024-35907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35907">CVE-2024-35907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35912/">CVE-2024-35912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35912">CVE-2024-35912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-35914/">CVE-2024-35914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35914">CVE-2024-35914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35915/">CVE-2024-35915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35915">CVE-2024-35915 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35922/">CVE-2024-35922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35922">CVE-2024-35922 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35924/">CVE-2024-35924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35924">CVE-2024-35924 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35930/">CVE-2024-35930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35930">CVE-2024-35930 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35932/">CVE-2024-35932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35932">CVE-2024-35932 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35933/">CVE-2024-35933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35933">CVE-2024-35933 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35935/">CVE-2024-35935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35935">CVE-2024-35935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35936/">CVE-2024-35936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35936">CVE-2024-35936 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35938/">CVE-2024-35938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35938">CVE-2024-35938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35939/">CVE-2024-35939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35939">CVE-2024-35939 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35940/">CVE-2024-35940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35940">CVE-2024-35940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35943/">CVE-2024-35943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35943">CVE-2024-35943 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-35944/">CVE-2024-35944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35944">CVE-2024-35944 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35947/">CVE-2024-35947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35947">CVE-2024-35947 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35950/">CVE-2024-35950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35950">CVE-2024-35950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35951/">CVE-2024-35951 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35951">CVE-2024-35951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35952/">CVE-2024-35952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35952">CVE-2024-35952 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35955/">CVE-2024-35955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35955">CVE-2024-35955 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35959/">CVE-2024-35959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35959">CVE-2024-35959 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35963/">CVE-2024-35963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35963">CVE-2024-35963 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35964/">CVE-2024-35964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35964">CVE-2024-35964 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35965/">CVE-2024-35965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35965">CVE-2024-35965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35966/">CVE-2024-35966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35966">CVE-2024-35966 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35967/">CVE-2024-35967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35967">CVE-2024-35967 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35969/">CVE-2024-35969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35969">CVE-2024-35969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35973/">CVE-2024-35973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35973">CVE-2024-35973 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35976/">CVE-2024-35976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35976">CVE-2024-35976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35978/">CVE-2024-35978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35978">CVE-2024-35978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35982/">CVE-2024-35982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35982">CVE-2024-35982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35984/">CVE-2024-35984 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35984">CVE-2024-35984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35989/">CVE-2024-35989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35989">CVE-2024-35989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35990/">CVE-2024-35990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35990">CVE-2024-35990 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35998/">CVE-2024-35998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35998">CVE-2024-35998 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-35999/">CVE-2024-35999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35999">CVE-2024-35999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36006/">CVE-2024-36006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36006">CVE-2024-36006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36007/">CVE-2024-36007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36007">CVE-2024-36007 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36012/">CVE-2024-36012 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36012">CVE-2024-36012 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36014/">CVE-2024-36014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36014">CVE-2024-36014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36015/">CVE-2024-36015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36015">CVE-2024-36015 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36016/">CVE-2024-36016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36016">CVE-2024-36016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36026/">CVE-2024-36026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36026">CVE-2024-36026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36029/">CVE-2024-36029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36029">CVE-2024-36029 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36032/">CVE-2024-36032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36032">CVE-2024-36032 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36880/">CVE-2024-36880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36880">CVE-2024-36880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36893/">CVE-2024-36893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36893">CVE-2024-36893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36896/">CVE-2024-36896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36896">CVE-2024-36896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36897/">CVE-2024-36897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36897">CVE-2024-36897 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36906/">CVE-2024-36906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36906">CVE-2024-36906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36918/">CVE-2024-36918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36918">CVE-2024-36918 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36924/">CVE-2024-36924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36924">CVE-2024-36924 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36926/">CVE-2024-36926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36926">CVE-2024-36926 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36928/">CVE-2024-36928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36928">CVE-2024-36928 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36931/">CVE-2024-36931 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36931">CVE-2024-36931 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36938/">CVE-2024-36938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36938">CVE-2024-36938 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36940/">CVE-2024-36940 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36940">CVE-2024-36940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36941/">CVE-2024-36941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36941">CVE-2024-36941 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36942/">CVE-2024-36942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36942">CVE-2024-36942 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36944/">CVE-2024-36944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36944">CVE-2024-36944 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36947/">CVE-2024-36947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36947">CVE-2024-36947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36950/">CVE-2024-36950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36950">CVE-2024-36950 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36952/">CVE-2024-36952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36952">CVE-2024-36952 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36955/">CVE-2024-36955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36955">CVE-2024-36955 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36959/">CVE-2024-36959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36959">CVE-2024-36959 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865725" comment="cluster-md-kmp-azure-5.14.21-150500.33.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865726" comment="dlm-kmp-azure-5.14.21-150500.33.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865727" comment="gfs2-kmp-azure-5.14.21-150500.33.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865728" comment="kernel-azure-5.14.21-150500.33.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865729" comment="kernel-azure-devel-5.14.21-150500.33.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865730" comment="kernel-azure-extra-5.14.21-150500.33.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865731" comment="kernel-azure-livepatch-devel-5.14.21-150500.33.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865732" comment="kernel-azure-optional-5.14.21-150500.33.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865733" comment="kernel-azure-vdso-5.14.21-150500.33.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865734" comment="kernel-devel-azure-5.14.21-150500.33.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865735" comment="kernel-source-azure-5.14.21-150500.33.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865736" comment="kernel-syms-azure-5.14.21-150500.33.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865737" comment="kselftests-kmp-azure-5.14.21-150500.33.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865738" comment="ocfs2-kmp-azure-5.14.21-150500.33.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865739" comment="reiserfs-kmp-azure-5.14.21-150500.33.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4789" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1225551" ref_url="https://bugzilla.suse.com/1225551" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-4741" ref_url="https://www.suse.com/security/cve/CVE-2024-4741/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018712.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers. (bsc#1225551)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1225551">SUSE bug 1225551</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4741/">CVE-2024-4741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4741">CVE-2024-4741 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865740" comment="libopenssl-3-devel-3.0.8-150500.5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865741" comment="libopenssl-3-devel-32bit-3.0.8-150500.5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865742" comment="libopenssl3-3.0.8-150500.5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865743" comment="libopenssl3-32bit-3.0.8-150500.5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865744" comment="openssl-3-3.0.8-150500.5.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865745" comment="openssl-3-doc-3.0.8-150500.5.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4790" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212233" ref_url="https://bugzilla.suse.com/1212233" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3164" ref_url="https://www.suse.com/security/cve/CVE-2023-3164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2028-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035583.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2023-3164: Fixed a heap buffer overflow in tiffcrop. (bsc#1212233)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212233">SUSE bug 1212233</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3164/">CVE-2023-3164 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3164">CVE-2023-3164 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865746" comment="libtiff-devel-4.0.9-150000.45.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865747" comment="libtiff-devel-32bit-4.0.9-150000.45.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865748" comment="libtiff5-4.0.9-150000.45.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865749" comment="libtiff5-32bit-4.0.9-150000.45.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865750" comment="tiff-4.0.9-150000.45.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4791" version="1" class="patch">
	<metadata>
		<title>Security update for python-scikit-learn (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226185" ref_url="https://bugzilla.suse.com/1226185" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-5206" ref_url="https://www.suse.com/security/cve/CVE-2024-5206/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018715.html" source="SUSE-SU"/>
		<description>
This update for python-scikit-learn fixes the following issues:

-CVE-2024-5206: Fixed a possible sensitive data leak in TfidfVectorizer. (bsc#1226185)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-13"/>
	<updated date="2024-06-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1226185">SUSE bug 1226185</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-5206/">CVE-2024-5206 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5206">CVE-2024-5206 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865751" comment="python3-scikit-learn-0.23.2-150300.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4792" version="1" class="patch">
	<metadata>
		<title>Security update for podman (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224122" ref_url="https://bugzilla.suse.com/1224122" source="BUGZILLA"/>
		<reference ref_id="1226136" ref_url="https://bugzilla.suse.com/1226136" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786/" source="CVE"/>
		<reference ref_id="CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018720.html" source="SUSE-SU"/>
		<description>
This update for podman fixes the following issues:

- Update to version 4.9.5
- CVE-2024-3727: Fixed a flaw that allowed attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks. (bsc#1224122)
- CVE-2024-24786: Fixed an infinite loop in protojson. (bsc#1226136)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-14"/>
	<updated date="2024-06-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1224122">SUSE bug 1224122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226136">SUSE bug 1226136</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009865822" comment="podman-4.9.5-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865823" comment="podman-docker-4.9.5-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865824" comment="podman-remote-4.9.5-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009865825" comment="podmansh-4.9.5-150500.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4793" version="1" class="patch">
	<metadata>
		<title>Security update for php8 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226073" ref_url="https://bugzilla.suse.com/1226073" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-5458" ref_url="https://www.suse.com/security/cve/CVE-2024-5458/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2038-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035601.html" source="SUSE-SU"/>
		<description>
This update for php8 fixes the following issues:

- CVE-2024-5458: Fixed an issue that allows to bypass filters in filter_var FILTER_VALIDATE_URL. (bsc#1226073)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-17"/>
	<updated date="2024-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1226073">SUSE bug 1226073</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-5458/">CVE-2024-5458 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5458">CVE-2024-5458 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009867239" comment="apache2-mod_php7-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867240" comment="php7-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867241" comment="php7-bcmath-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867242" comment="php7-bz2-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867243" comment="php7-calendar-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867244" comment="php7-cli-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867245" comment="php7-ctype-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867246" comment="php7-curl-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867247" comment="php7-dba-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867248" comment="php7-devel-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867249" comment="php7-dom-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867250" comment="php7-embed-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867251" comment="php7-enchant-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867252" comment="php7-exif-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867253" comment="php7-fastcgi-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867254" comment="php7-fileinfo-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867255" comment="php7-fpm-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867256" comment="php7-ftp-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867257" comment="php7-gd-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867258" comment="php7-gettext-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867259" comment="php7-gmp-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867260" comment="php7-iconv-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867261" comment="php7-intl-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867262" comment="php7-json-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867263" comment="php7-ldap-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867264" comment="php7-mbstring-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867265" comment="php7-mysql-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867266" comment="php7-odbc-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867267" comment="php7-opcache-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867268" comment="php7-openssl-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867269" comment="php7-pcntl-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867270" comment="php7-pdo-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867271" comment="php7-pgsql-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867272" comment="php7-phar-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867273" comment="php7-posix-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867274" comment="php7-readline-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867275" comment="php7-shmop-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867276" comment="php7-snmp-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867277" comment="php7-soap-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867278" comment="php7-sockets-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867279" comment="php7-sodium-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867280" comment="php7-sqlite-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867281" comment="php7-sysvmsg-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867282" comment="php7-sysvsem-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867283" comment="php7-sysvshm-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867284" comment="php7-test-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867285" comment="php7-tidy-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867286" comment="php7-tokenizer-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867287" comment="php7-xmlreader-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867288" comment="php7-xmlrpc-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867289" comment="php7-xmlwriter-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867290" comment="php7-xsl-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867291" comment="php7-zip-7.4.33-150400.4.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867292" comment="php7-zlib-7.4.33-150400.4.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4794" version="1" class="patch">
	<metadata>
		<title>Security update for php8 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226073" ref_url="https://bugzilla.suse.com/1226073" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-5458" ref_url="https://www.suse.com/security/cve/CVE-2024-5458/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035600.html" source="SUSE-SU"/>
		<description>
This update for php8 fixes the following issues:

- CVE-2024-5458: Fixed an issue that allows to bypass filters in filter_var FILTER_VALIDATE_URL. (bsc#1226073)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-17"/>
	<updated date="2024-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1226073">SUSE bug 1226073</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-5458/">CVE-2024-5458 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5458">CVE-2024-5458 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009867293" comment="apache2-mod_php8-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867294" comment="php8-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867295" comment="php8-bcmath-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867296" comment="php8-bz2-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867297" comment="php8-calendar-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867298" comment="php8-cli-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867299" comment="php8-ctype-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867300" comment="php8-curl-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867301" comment="php8-dba-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867302" comment="php8-devel-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867303" comment="php8-dom-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867304" comment="php8-embed-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867305" comment="php8-enchant-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867306" comment="php8-exif-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867307" comment="php8-fastcgi-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867308" comment="php8-fileinfo-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867309" comment="php8-fpm-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867310" comment="php8-ftp-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867311" comment="php8-gd-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867312" comment="php8-gettext-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867313" comment="php8-gmp-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867314" comment="php8-iconv-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867315" comment="php8-intl-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867316" comment="php8-ldap-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867317" comment="php8-mbstring-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867318" comment="php8-mysql-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867319" comment="php8-odbc-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867320" comment="php8-opcache-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867321" comment="php8-openssl-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867322" comment="php8-pcntl-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867323" comment="php8-pdo-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867324" comment="php8-pgsql-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867325" comment="php8-phar-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867326" comment="php8-posix-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867327" comment="php8-readline-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867328" comment="php8-shmop-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867329" comment="php8-snmp-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867330" comment="php8-soap-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867331" comment="php8-sockets-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867332" comment="php8-sodium-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867333" comment="php8-sqlite-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867334" comment="php8-sysvmsg-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867335" comment="php8-sysvsem-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867336" comment="php8-sysvshm-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867337" comment="php8-test-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867338" comment="php8-tidy-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867339" comment="php8-tokenizer-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867340" comment="php8-xmlreader-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867341" comment="php8-xmlwriter-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867342" comment="php8-xsl-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867343" comment="php8-zip-8.0.30-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867344" comment="php8-zlib-8.0.30-150400.4.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4795" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219048" ref_url="https://bugzilla.suse.com/1219048" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-50447" ref_url="https://www.suse.com/security/cve/CVE-2023-50447/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017753.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

- CVE-2023-50447: Fixed arbitrary code execution via the environment parameter. (bsc#1219048)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2024-01-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219048">SUSE bug 1219048</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50447/">CVE-2023-50447 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50447">CVE-2023-50447 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844299" comment="python311-Pillow-9.5.0-150400.5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844300" comment="python311-Pillow-tk-9.5.0-150400.5.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4796" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1225551" ref_url="https://bugzilla.suse.com/1225551" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-4741" ref_url="https://www.suse.com/security/cve/CVE-2024-4741/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018732.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2024-4741: Fixed a use-after-free with SSL_free_buffers. (bsc#1225551)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-18"/>
	<updated date="2024-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1225551">SUSE bug 1225551</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4741/">CVE-2024-4741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4741">CVE-2024-4741 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009867988" comment="libopenssl-1_1-devel-1.1.1l-150500.17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867989" comment="libopenssl-1_1-devel-32bit-1.1.1l-150500.17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867990" comment="libopenssl1_1-1.1.1l-150500.17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867991" comment="libopenssl1_1-32bit-1.1.1l-150500.17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867992" comment="libopenssl1_1-hmac-1.1.1l-150500.17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867993" comment="libopenssl1_1-hmac-32bit-1.1.1l-150500.17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867994" comment="openssl-1_1-1.1.1l-150500.17.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867995" comment="openssl-1_1-doc-1.1.1l-150500.17.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4797" version="1" class="patch">
	<metadata>
		<title>Security update for libaom (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226020" ref_url="https://bugzilla.suse.com/1226020" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-5171" ref_url="https://www.suse.com/security/cve/CVE-2024-5171/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019250.html" source="SUSE-SU"/>
		<description>
This update for libaom fixes the following issues:

- CVE-2024-5171: Fixed heap buffer overflow in img_alloc_helper() caused by integer overflow (bsc#1226020).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-18"/>
	<updated date="2024-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1226020">SUSE bug 1226020</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-5171/">CVE-2024-5171 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5171">CVE-2024-5171 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009867996" comment="aom-tools-3.2.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867997" comment="libaom-devel-3.2.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867998" comment="libaom-devel-doc-3.2.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009867999" comment="libaom3-3.2.0-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868000" comment="libaom3-32bit-3.2.0-150400.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4798" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226027" ref_url="https://bugzilla.suse.com/1226027" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-5688" ref_url="https://www.suse.com/security/cve/CVE-2024-5688/" source="CVE"/>
		<reference ref_id="CVE-2024-5690" ref_url="https://www.suse.com/security/cve/CVE-2024-5690/" source="CVE"/>
		<reference ref_id="CVE-2024-5691" ref_url="https://www.suse.com/security/cve/CVE-2024-5691/" source="CVE"/>
		<reference ref_id="CVE-2024-5692" ref_url="https://www.suse.com/security/cve/CVE-2024-5692/" source="CVE"/>
		<reference ref_id="CVE-2024-5693" ref_url="https://www.suse.com/security/cve/CVE-2024-5693/" source="CVE"/>
		<reference ref_id="CVE-2024-5696" ref_url="https://www.suse.com/security/cve/CVE-2024-5696/" source="CVE"/>
		<reference ref_id="CVE-2024-5700" ref_url="https://www.suse.com/security/cve/CVE-2024-5700/" source="CVE"/>
		<reference ref_id="CVE-2024-5702" ref_url="https://www.suse.com/security/cve/CVE-2024-5702/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035620.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Update to version 115.12.0 ESR (bsc#1226027)
- CVE-2024-5702: Use-after-free in networking
- CVE-2024-5688: Use-after-free in JavaScript object transplant
- CVE-2024-5690: External protocol handlers leaked by timing attack
- CVE-2024-5691: Sandboxed iframes were able to bypass sandbox restrictions to open a new window
- CVE-2024-5692: Bypass of file name restrictions during saving
- CVE-2024-5693: Cross-Origin Image leak via Offscreen Canvas
- CVE-2024-5696: Memory Corruption in Text Fragments
- CVE-2024-5700: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 
  		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-18"/>
	<updated date="2024-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1226027">SUSE bug 1226027</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5688/">CVE-2024-5688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5688">CVE-2024-5688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5690/">CVE-2024-5690 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5690">CVE-2024-5690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5691/">CVE-2024-5691 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5691">CVE-2024-5691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5692/">CVE-2024-5692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5692">CVE-2024-5692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5693/">CVE-2024-5693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5693">CVE-2024-5693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5696/">CVE-2024-5696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5696">CVE-2024-5696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5700/">CVE-2024-5700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5700">CVE-2024-5700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5702/">CVE-2024-5702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5702">CVE-2024-5702 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868001" comment="MozillaFirefox-115.12.0-150200.152.140.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868002" comment="MozillaFirefox-branding-upstream-115.12.0-150200.152.140.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868003" comment="MozillaFirefox-devel-115.12.0-150200.152.140.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868004" comment="MozillaFirefox-translations-common-115.12.0-150200.152.140.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868005" comment="MozillaFirefox-translations-other-115.12.0-150200.152.140.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4799" version="1" class="patch">
	<metadata>
		<title>Security update for booth (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226032" ref_url="https://bugzilla.suse.com/1226032" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-3049" ref_url="https://www.suse.com/security/cve/CVE-2024-3049/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2063-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035618.html" source="SUSE-SU"/>
		<description>
This update for booth fixes the following issues:

- CVE-2024-3049: Fixed a vulnerability where a specially crafted hash can lead to invalid HMAC being accepted by Booth server. (bsc#1226032)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-18"/>
	<updated date="2024-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1226032">SUSE bug 1226032</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-3049/">CVE-2024-3049 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3049">CVE-2024-3049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868006" comment="booth-1.0+20220815.f40c2d5-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868007" comment="booth-test-1.0+20220815.f40c2d5-150500.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4800" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222905" ref_url="https://bugzilla.suse.com/1222905" source="BUGZILLA"/>
		<reference ref_id="1225071" ref_url="https://bugzilla.suse.com/1225071" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-23226" ref_url="https://www.suse.com/security/cve/CVE-2024-23226/" source="CVE"/>
		<reference ref_id="CVE-2024-27834" ref_url="https://www.suse.com/security/cve/CVE-2024-27834/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2065-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035615.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.44.2
- CVE-2024-27834: Fixed a vulnerability where an attacker with arbitrary read and write capability may be able to bypass Pointer Authentication. (bsc#1225071)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-18"/>
	<updated date="2024-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222905">SUSE bug 1222905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225071">SUSE bug 1225071</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23226/">CVE-2024-23226 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23226">CVE-2024-23226 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27834/">CVE-2024-27834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27834">CVE-2024-27834 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868008" comment="WebKitGTK-4.0-lang-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868009" comment="WebKitGTK-4.1-lang-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868010" comment="WebKitGTK-6.0-lang-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868011" comment="libjavascriptcoregtk-4_0-18-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868012" comment="libjavascriptcoregtk-4_0-18-32bit-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868013" comment="libjavascriptcoregtk-4_1-0-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868014" comment="libjavascriptcoregtk-4_1-0-32bit-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868015" comment="libjavascriptcoregtk-6_0-1-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868016" comment="libwebkit2gtk-4_0-37-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868017" comment="libwebkit2gtk-4_0-37-32bit-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868018" comment="libwebkit2gtk-4_1-0-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868019" comment="libwebkit2gtk-4_1-0-32bit-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868020" comment="libwebkitgtk-6_0-4-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868021" comment="typelib-1_0-JavaScriptCore-4_0-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868022" comment="typelib-1_0-JavaScriptCore-4_1-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868023" comment="typelib-1_0-JavaScriptCore-6_0-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868024" comment="typelib-1_0-WebKit-6_0-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868025" comment="typelib-1_0-WebKit2-4_0-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868026" comment="typelib-1_0-WebKit2-4_1-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868027" comment="typelib-1_0-WebKit2WebExtension-4_0-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868028" comment="typelib-1_0-WebKit2WebExtension-4_1-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868029" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868030" comment="webkit-jsc-4-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868031" comment="webkit-jsc-4.1-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868032" comment="webkit-jsc-6.0-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868033" comment="webkit2gtk-4_0-injected-bundles-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868034" comment="webkit2gtk-4_1-injected-bundles-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868035" comment="webkit2gtk3-devel-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868036" comment="webkit2gtk3-minibrowser-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868037" comment="webkit2gtk3-soup2-devel-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868038" comment="webkit2gtk3-soup2-minibrowser-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868039" comment="webkit2gtk4-devel-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868040" comment="webkit2gtk4-minibrowser-2.44.2-150400.4.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868041" comment="webkitgtk-6_0-injected-bundles-2.44.2-150400.4.83.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4801" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226027" ref_url="https://bugzilla.suse.com/1226027" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-5688" ref_url="https://www.suse.com/security/cve/CVE-2024-5688/" source="CVE"/>
		<reference ref_id="CVE-2024-5690" ref_url="https://www.suse.com/security/cve/CVE-2024-5690/" source="CVE"/>
		<reference ref_id="CVE-2024-5691" ref_url="https://www.suse.com/security/cve/CVE-2024-5691/" source="CVE"/>
		<reference ref_id="CVE-2024-5692" ref_url="https://www.suse.com/security/cve/CVE-2024-5692/" source="CVE"/>
		<reference ref_id="CVE-2024-5693" ref_url="https://www.suse.com/security/cve/CVE-2024-5693/" source="CVE"/>
		<reference ref_id="CVE-2024-5696" ref_url="https://www.suse.com/security/cve/CVE-2024-5696/" source="CVE"/>
		<reference ref_id="CVE-2024-5700" ref_url="https://www.suse.com/security/cve/CVE-2024-5700/" source="CVE"/>
		<reference ref_id="CVE-2024-5702" ref_url="https://www.suse.com/security/cve/CVE-2024-5702/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035629.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Update to version 115.12.0 ESR (bsc#1226027)
- CVE-2024-5702: Use-after-free in networking
- CVE-2024-5688: Use-after-free in JavaScript object transplant
- CVE-2024-5690: External protocol handlers leaked by timing attack
- CVE-2024-5691: Sandboxed iframes were able to bypass sandbox restrictions to open a new window
- CVE-2024-5692: Bypass of file name restrictions during saving
- CVE-2024-5693: Cross-Origin Image leak via Offscreen Canvas
- CVE-2024-5696: Memory Corruption in Text Fragments
- CVE-2024-5700: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-18"/>
	<updated date="2024-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1226027">SUSE bug 1226027</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5688/">CVE-2024-5688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5688">CVE-2024-5688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5690/">CVE-2024-5690 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5690">CVE-2024-5690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5691/">CVE-2024-5691 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5691">CVE-2024-5691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5692/">CVE-2024-5692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5692">CVE-2024-5692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5693/">CVE-2024-5693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5693">CVE-2024-5693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5696/">CVE-2024-5696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5696">CVE-2024-5696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5700/">CVE-2024-5700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5700">CVE-2024-5700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5702/">CVE-2024-5702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5702">CVE-2024-5702 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868042" comment="MozillaThunderbird-115.12.0-150200.8.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868043" comment="MozillaThunderbird-translations-common-115.12.0-150200.8.163.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868044" comment="MozillaThunderbird-translations-other-115.12.0-150200.8.163.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4802" version="1" class="patch">
	<metadata>
		<title>Security update for gdk-pixbuf (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1195391" ref_url="https://bugzilla.suse.com/1195391" source="BUGZILLA"/>
		<reference ref_id="1219276" ref_url="https://bugzilla.suse.com/1219276" source="BUGZILLA"/>
		<reference ref_id="1223903" ref_url="https://bugzilla.suse.com/1223903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48622" ref_url="https://www.suse.com/security/cve/CVE-2022-48622/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035643.html" source="SUSE-SU"/>
		<description>
This update for gdk-pixbuf fixes the following issues:

gdk-pixbuf was updated to version 2.42.12:

- Security issues fixed:

  * CVE-2022-48622: Fixed heap memory corruption on gdk-pixbuf (bsc#1219276)

- Changes in version 2.42.12:

  + ani: Reject files with multiple INA or IART chunks,
  + ani: validate chunk size,
  + Updated translations.

- Enable other image loaders such as xpm and xbm (bsc#1223903)

- Changes in version 2.42.11:

  + Disable fringe loaders by default.
  + Introspection fixes.
  + Updated translations.

- Changes in version 2.42.10:

  + Search for rst2man.py.
  + Update the memory size limit for JPEG images.
  + Updated translations.

- Fixed loading of larger images
- Avoid Bash specific syntax in baselibs postscript (bsc#1195391) 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-19"/>
	<updated date="2024-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195391">SUSE bug 1195391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219276">SUSE bug 1219276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223903">SUSE bug 1223903</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48622/">CVE-2022-48622 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48622">CVE-2022-48622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868205" comment="gdk-pixbuf-devel-2.42.12-150400.5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868206" comment="gdk-pixbuf-devel-32bit-2.42.12-150400.5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868207" comment="gdk-pixbuf-lang-2.42.12-150400.5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868208" comment="gdk-pixbuf-query-loaders-2.42.12-150400.5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868209" comment="gdk-pixbuf-query-loaders-32bit-2.42.12-150400.5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868210" comment="gdk-pixbuf-thumbnailer-2.42.12-150400.5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868211" comment="libgdk_pixbuf-2_0-0-2.42.12-150400.5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868212" comment="libgdk_pixbuf-2_0-0-32bit-2.42.12-150400.5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868213" comment="typelib-1_0-GdkPixbuf-2_0-2.42.12-150400.5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868214" comment="typelib-1_0-GdkPixdata-2_0-2.42.12-150400.5.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4803" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat10 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217649" ref_url="https://bugzilla.suse.com/1217649" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46589" ref_url="https://www.suse.com/security/cve/CVE-2023-46589/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017751.html" source="SUSE-SU"/>
		<description>
This update for tomcat10 fixes the following issues:

Updated to Tomcat 10.1.18

- CVE-2023-46589: Fixed HTTP request smuggling due to incorrect headers parsing (bsc#1217649)

Find the full release notes at:

https://tomcat.apache.org/tomcat-9.0-doc/changelog.html
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2024-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1217649">SUSE bug 1217649</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46589/">CVE-2023-46589 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46589">CVE-2023-46589 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844301" comment="tomcat10-10.1.18-150200.5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844302" comment="tomcat10-admin-webapps-10.1.18-150200.5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844303" comment="tomcat10-docs-webapp-10.1.18-150200.5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844304" comment="tomcat10-el-5_0-api-10.1.18-150200.5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844305" comment="tomcat10-embed-10.1.18-150200.5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844306" comment="tomcat10-jsp-3_1-api-10.1.18-150200.5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844307" comment="tomcat10-jsvc-10.1.18-150200.5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844308" comment="tomcat10-lib-10.1.18-150200.5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844309" comment="tomcat10-servlet-6_0-api-10.1.18-150200.5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844310" comment="tomcat10-webapps-10.1.18-150200.5.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4804" version="1" class="patch">
	<metadata>
		<title>Security update for erlang (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218192" ref_url="https://bugzilla.suse.com/1218192" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017749.html" source="SUSE-SU"/>
		<description>
This update for erlang fixes the following issues:

- CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity aka Terrapin Attack (bsc#1218192)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2024-01-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218192">SUSE bug 1218192</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844311" comment="erlang-23.3.4.19-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844312" comment="erlang-debugger-23.3.4.19-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844313" comment="erlang-debugger-src-23.3.4.19-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844314" comment="erlang-dialyzer-23.3.4.19-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844315" comment="erlang-dialyzer-src-23.3.4.19-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844316" comment="erlang-diameter-23.3.4.19-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844317" comment="erlang-diameter-src-23.3.4.19-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844318" comment="erlang-doc-23.3.4.19-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844319" comment="erlang-epmd-23.3.4.19-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844320" comment="erlang-et-23.3.4.19-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844321" comment="erlang-et-src-23.3.4.19-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844322" comment="erlang-jinterface-23.3.4.19-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844323" comment="erlang-jinterface-src-23.3.4.19-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844324" comment="erlang-observer-23.3.4.19-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844325" comment="erlang-observer-src-23.3.4.19-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844326" comment="erlang-reltool-23.3.4.19-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844327" comment="erlang-reltool-src-23.3.4.19-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844328" comment="erlang-src-23.3.4.19-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844329" comment="erlang-wx-23.3.4.19-150300.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844330" comment="erlang-wx-src-23.3.4.19-150300.3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4805" version="1" class="patch">
	<metadata>
		<title>Security update for opencc (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1108310" ref_url="https://bugzilla.suse.com/1108310" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16982" ref_url="https://www.suse.com/security/cve/CVE-2018-16982/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2102-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035661.html" source="SUSE-SU"/>
		<description>
This update for opencc fixes the following issues:

- CVE-2018-16982: Check offset bounds in BinaryDict::NewFromFile method. (bsc#1108310)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-19"/>
	<updated date="2024-06-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1108310">SUSE bug 1108310</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16982/">CVE-2018-16982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16982">CVE-2018-16982 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868215" comment="libopencc2-1.0.5-150000.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868216" comment="opencc-1.0.5-150000.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868217" comment="opencc-data-1.0.5-150000.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868218" comment="opencc-devel-1.0.5-150000.5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4806" version="1" class="patch">
	<metadata>
		<title>Security update for php-composer2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226181" ref_url="https://bugzilla.suse.com/1226181" source="BUGZILLA"/>
		<reference ref_id="1226182" ref_url="https://bugzilla.suse.com/1226182" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-35241" ref_url="https://www.suse.com/security/cve/CVE-2024-35241/" source="CVE"/>
		<reference ref_id="CVE-2024-35242" ref_url="https://www.suse.com/security/cve/CVE-2024-35242/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018770.html" source="SUSE-SU"/>
		<description>
This update for php-composer2 fixes the following issues:

- CVE-2024-35241: Fixed code execution when installing packages in repository with specially crafted branch names (bsc#1226181).
- CVE-2024-35242: Fixed command injection via specially crafted branch names during repository cloning (bsc#1226182).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-20"/>
	<updated date="2024-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1226181">SUSE bug 1226181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226182">SUSE bug 1226182</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35241/">CVE-2024-35241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35241">CVE-2024-35241 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35242/">CVE-2024-35242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35242">CVE-2024-35242 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868402" comment="php-composer2-2.2.3-150400.3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4807" version="1" class="patch">
	<metadata>
		<title>Security update for containerd (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1221400" ref_url="https://bugzilla.suse.com/1221400" source="BUGZILLA"/>
		<reference ref_id="1224323" ref_url="https://bugzilla.suse.com/1224323" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018771.html" source="SUSE-SU"/>
		<description>
This update for containerd fixes the following issues:

Update to containerd v1.7.17.

- CVE-2023-45288: Fixed the limit of CONTINUATION frames read for an HTTP/2 request (bsc#1221400).
- Fixed /sys/devices/virtual/powercap accessibility by default containers to mitigate power-based side channel attacks (bsc#1224323).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-20"/>
	<updated date="2024-06-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221400">SUSE bug 1221400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224323">SUSE bug 1224323</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868403" comment="containerd-1.7.17-150000.111.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868404" comment="containerd-ctr-1.7.17-150000.111.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868405" comment="containerd-devel-1.7.17-150000.111.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4808" version="1" class="patch">
	<metadata>
		<title>Security update for xwayland (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218845" ref_url="https://bugzilla.suse.com/1218845" source="BUGZILLA"/>
		<reference ref_id="1218846" ref_url="https://bugzilla.suse.com/1218846" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0408" ref_url="https://www.suse.com/security/cve/CVE-2024-0408/" source="CVE"/>
		<reference ref_id="CVE-2024-0409" ref_url="https://www.suse.com/security/cve/CVE-2024-0409/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017747.html" source="SUSE-SU"/>
		<description>
This update for xwayland fixes the following issues:

- CVE-2024-0408: Fixed SELinux unlabeled GLX PBuffer. (bsc#1218845)
- CVE-2024-0409: Fixed SELinux context corruption. (bsc#1218846)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-24"/>
	<updated date="2024-01-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218845">SUSE bug 1218845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218846">SUSE bug 1218846</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-0408/">CVE-2024-0408 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0408">CVE-2024-0408 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-0409/">CVE-2024-0409 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0409">CVE-2024-0409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844331" comment="xwayland-22.1.5-150500.7.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844332" comment="xwayland-devel-22.1.5-150500.7.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4809" version="1" class="patch">
	<metadata>
		<title>Security update for podofo (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1127514" ref_url="https://bugzilla.suse.com/1127514" source="BUGZILLA"/>
		<reference ref_id="1127855" ref_url="https://bugzilla.suse.com/1127855" source="BUGZILLA"/>
		<reference ref_id="1131544" ref_url="https://bugzilla.suse.com/1131544" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20797" ref_url="https://www.suse.com/security/cve/CVE-2018-20797/" source="CVE"/>
		<reference ref_id="CVE-2019-10723" ref_url="https://www.suse.com/security/cve/CVE-2019-10723/" source="CVE"/>
		<reference ref_id="CVE-2019-9199" ref_url="https://www.suse.com/security/cve/CVE-2019-9199/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035680.html" source="SUSE-SU"/>
		<description>
This update for podofo fixes the following issues:

- CVE-2019-9199: Fixed a NULL pointer dereference in podofoimpose (bsc#1127855)
- CVE-2018-20797: Fixed an excessive memory allocation in PoDoFo:podofo_calloc (bsc#1127514)
- CVE-2019-10723: Fixed a memory leak in PdfPagesTreeCache (bsc#1131544)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-21"/>
	<updated date="2024-06-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1127514">SUSE bug 1127514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127855">SUSE bug 1127855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131544">SUSE bug 1131544</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20797/">CVE-2018-20797 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-20797">CVE-2018-20797 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10723/">CVE-2019-10723 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-10723">CVE-2019-10723 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9199/">CVE-2019-9199 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-9199">CVE-2019-9199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868532" comment="libpodofo-devel-0.9.6-150300.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868533" comment="libpodofo0_9_6-0.9.6-150300.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868534" comment="podofo-0.9.6-150300.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4810" version="1" class="patch">
	<metadata>
		<title>Security update for gnome-settings-daemon (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226423" ref_url="https://bugzilla.suse.com/1226423" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-38394" ref_url="https://www.suse.com/security/cve/CVE-2024-38394/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2168-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035708.html" source="SUSE-SU"/>
		<description>
This update for gnome-settings-daemon fixes the following issues:

- CVE-2024-38394: Fixed mismatches in interpreting USB authorization policy (bsc#1226423).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1226423">SUSE bug 1226423</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38394/">CVE-2024-38394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38394">CVE-2024-38394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868535" comment="gnome-settings-daemon-41.0-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868536" comment="gnome-settings-daemon-devel-41.0-150500.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868537" comment="gnome-settings-daemon-lang-41.0-150500.4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4811" version="1" class="patch">
	<metadata>
		<title>Security update for libarchive (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1225971" ref_url="https://bugzilla.suse.com/1225971" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-20696" ref_url="https://www.suse.com/security/cve/CVE-2024-20696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2171-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035706.html" source="SUSE-SU"/>
		<description>
This update for libarchive fixes the following issues:

- CVE-2024-20696: Fixed heap based out-of-bounds write (bsc#1225971).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-22"/>
	<updated date="2024-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1225971">SUSE bug 1225971</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-20696/">CVE-2024-20696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20696">CVE-2024-20696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868654" comment="bsdtar-3.5.1-150400.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868655" comment="libarchive-devel-3.5.1-150400.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868656" comment="libarchive13-3.5.1-150400.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868657" comment="libarchive13-32bit-3.5.1-150400.3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4812" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226419" ref_url="https://bugzilla.suse.com/1226419" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-38428" ref_url="https://www.suse.com/security/cve/CVE-2024-38428/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2174-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035703.html" source="SUSE-SU"/>
		<description>
This update for wget fixes the following issues:

- CVE-2024-38428: Fix mishandled semicolons in the userinfo subcomponent of a URI. (bsc#1226419)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-06-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1226419">SUSE bug 1226419</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-38428/">CVE-2024-38428 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38428">CVE-2024-38428 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868691" comment="wget-1.20.3-150000.3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868692" comment="wget-lang-1.20.3-150000.3.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4813" version="1" class="patch">
	<metadata>
		<title>Security update for vte (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226134" ref_url="https://bugzilla.suse.com/1226134" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-37535" ref_url="https://www.suse.com/security/cve/CVE-2024-37535/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018805.html" source="SUSE-SU"/>
		<description>
This update for vte fixes the following issues:

- CVE-2024-37535: Fixed a bug that allowed an attacker to cause a denial of service (memory consumption) via a window resize escape. (bsc#1226134)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-24"/>
	<updated date="2024-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1226134">SUSE bug 1226134</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37535/">CVE-2024-37535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37535">CVE-2024-37535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868693" comment="glade-catalog-vte-0.66.2-150400.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868694" comment="libvte-2_91-0-0.66.2-150400.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868695" comment="typelib-1_0-Vte-2.91-0.66.2-150400.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868696" comment="vte-devel-0.66.2-150400.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868697" comment="vte-lang-0.66.2-150400.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868698" comment="vte-tools-0.66.2-150400.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4814" version="1" class="patch">
	<metadata>
		<title>Security update for ntfs-3g_ntfsprogs (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226007" ref_url="https://bugzilla.suse.com/1226007" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-52890" ref_url="https://www.suse.com/security/cve/CVE-2023-52890/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019247.html" source="SUSE-SU"/>
		<description>
This update for ntfs-3g_ntfsprogs fixes the following issue:

- CVE-2023-52890: fix a use after free in ntfs_uppercase_mbs (bsc#1226007)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-25"/>
	<updated date="2024-06-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1226007">SUSE bug 1226007</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52890/">CVE-2023-52890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52890">CVE-2023-52890 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868802" comment="libntfs-3g-devel-2022.5.17-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868803" comment="libntfs-3g87-2022.5.17-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868804" comment="ntfs-3g-2022.5.17-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868805" comment="ntfsprogs-2022.5.17-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868806" comment="ntfsprogs-extra-2022.5.17-150000.3.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4815" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1141539" ref_url="https://bugzilla.suse.com/1141539" source="BUGZILLA"/>
		<reference ref_id="1174585" ref_url="https://bugzilla.suse.com/1174585" source="BUGZILLA"/>
		<reference ref_id="1181674" ref_url="https://bugzilla.suse.com/1181674" source="BUGZILLA"/>
		<reference ref_id="1187716" ref_url="https://bugzilla.suse.com/1187716" source="BUGZILLA"/>
		<reference ref_id="1190569" ref_url="https://bugzilla.suse.com/1190569" source="BUGZILLA"/>
		<reference ref_id="1191949" ref_url="https://bugzilla.suse.com/1191949" source="BUGZILLA"/>
		<reference ref_id="1192107" ref_url="https://bugzilla.suse.com/1192107" source="BUGZILLA"/>
		<reference ref_id="1193983" ref_url="https://bugzilla.suse.com/1193983" source="BUGZILLA"/>
		<reference ref_id="1194288" ref_url="https://bugzilla.suse.com/1194288" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1196956" ref_url="https://bugzilla.suse.com/1196956" source="BUGZILLA"/>
		<reference ref_id="1197915" ref_url="https://bugzilla.suse.com/1197915" source="BUGZILLA"/>
		<reference ref_id="1200465" ref_url="https://bugzilla.suse.com/1200465" source="BUGZILLA"/>
		<reference ref_id="1205205" ref_url="https://bugzilla.suse.com/1205205" source="BUGZILLA"/>
		<reference ref_id="1207284" ref_url="https://bugzilla.suse.com/1207284" source="BUGZILLA"/>
		<reference ref_id="1207361" ref_url="https://bugzilla.suse.com/1207361" source="BUGZILLA"/>
		<reference ref_id="1207948" ref_url="https://bugzilla.suse.com/1207948" source="BUGZILLA"/>
		<reference ref_id="1208149" ref_url="https://bugzilla.suse.com/1208149" source="BUGZILLA"/>
		<reference ref_id="1209657" ref_url="https://bugzilla.suse.com/1209657" source="BUGZILLA"/>
		<reference ref_id="1209799" ref_url="https://bugzilla.suse.com/1209799" source="BUGZILLA"/>
		<reference ref_id="1209834" ref_url="https://bugzilla.suse.com/1209834" source="BUGZILLA"/>
		<reference ref_id="1209980" ref_url="https://bugzilla.suse.com/1209980" source="BUGZILLA"/>
		<reference ref_id="1210335" ref_url="https://bugzilla.suse.com/1210335" source="BUGZILLA"/>
		<reference ref_id="1213863" ref_url="https://bugzilla.suse.com/1213863" source="BUGZILLA"/>
		<reference ref_id="1214852" ref_url="https://bugzilla.suse.com/1214852" source="BUGZILLA"/>
		<reference ref_id="1215322" ref_url="https://bugzilla.suse.com/1215322" source="BUGZILLA"/>
		<reference ref_id="1215702" ref_url="https://bugzilla.suse.com/1215702" source="BUGZILLA"/>
		<reference ref_id="1216358" ref_url="https://bugzilla.suse.com/1216358" source="BUGZILLA"/>
		<reference ref_id="1216702" ref_url="https://bugzilla.suse.com/1216702" source="BUGZILLA"/>
		<reference ref_id="1217169" ref_url="https://bugzilla.suse.com/1217169" source="BUGZILLA"/>
		<reference ref_id="1217339" ref_url="https://bugzilla.suse.com/1217339" source="BUGZILLA"/>
		<reference ref_id="1217515" ref_url="https://bugzilla.suse.com/1217515" source="BUGZILLA"/>
		<reference ref_id="1218447" ref_url="https://bugzilla.suse.com/1218447" source="BUGZILLA"/>
		<reference ref_id="1220021" ref_url="https://bugzilla.suse.com/1220021" source="BUGZILLA"/>
		<reference ref_id="1220267" ref_url="https://bugzilla.suse.com/1220267" source="BUGZILLA"/>
		<reference ref_id="1220363" ref_url="https://bugzilla.suse.com/1220363" source="BUGZILLA"/>
		<reference ref_id="1220783" ref_url="https://bugzilla.suse.com/1220783" source="BUGZILLA"/>
		<reference ref_id="1221044" ref_url="https://bugzilla.suse.com/1221044" source="BUGZILLA"/>
		<reference ref_id="1221081" ref_url="https://bugzilla.suse.com/1221081" source="BUGZILLA"/>
		<reference ref_id="1221615" ref_url="https://bugzilla.suse.com/1221615" source="BUGZILLA"/>
		<reference ref_id="1221777" ref_url="https://bugzilla.suse.com/1221777" source="BUGZILLA"/>
		<reference ref_id="1221816" ref_url="https://bugzilla.suse.com/1221816" source="BUGZILLA"/>
		<reference ref_id="1221829" ref_url="https://bugzilla.suse.com/1221829" source="BUGZILLA"/>
		<reference ref_id="1222011" ref_url="https://bugzilla.suse.com/1222011" source="BUGZILLA"/>
		<reference ref_id="1222374" ref_url="https://bugzilla.suse.com/1222374" source="BUGZILLA"/>
		<reference ref_id="1222385" ref_url="https://bugzilla.suse.com/1222385" source="BUGZILLA"/>
		<reference ref_id="1222413" ref_url="https://bugzilla.suse.com/1222413" source="BUGZILLA"/>
		<reference ref_id="1222464" ref_url="https://bugzilla.suse.com/1222464" source="BUGZILLA"/>
		<reference ref_id="1222513" ref_url="https://bugzilla.suse.com/1222513" source="BUGZILLA"/>
		<reference ref_id="1222559" ref_url="https://bugzilla.suse.com/1222559" source="BUGZILLA"/>
		<reference ref_id="1222561" ref_url="https://bugzilla.suse.com/1222561" source="BUGZILLA"/>
		<reference ref_id="1222608" ref_url="https://bugzilla.suse.com/1222608" source="BUGZILLA"/>
		<reference ref_id="1222619" ref_url="https://bugzilla.suse.com/1222619" source="BUGZILLA"/>
		<reference ref_id="1222627" ref_url="https://bugzilla.suse.com/1222627" source="BUGZILLA"/>
		<reference ref_id="1222721" ref_url="https://bugzilla.suse.com/1222721" source="BUGZILLA"/>
		<reference ref_id="1222765" ref_url="https://bugzilla.suse.com/1222765" source="BUGZILLA"/>
		<reference ref_id="1222770" ref_url="https://bugzilla.suse.com/1222770" source="BUGZILLA"/>
		<reference ref_id="1222783" ref_url="https://bugzilla.suse.com/1222783" source="BUGZILLA"/>
		<reference ref_id="1222793" ref_url="https://bugzilla.suse.com/1222793" source="BUGZILLA"/>
		<reference ref_id="1222870" ref_url="https://bugzilla.suse.com/1222870" source="BUGZILLA"/>
		<reference ref_id="1222893" ref_url="https://bugzilla.suse.com/1222893" source="BUGZILLA"/>
		<reference ref_id="1222960" ref_url="https://bugzilla.suse.com/1222960" source="BUGZILLA"/>
		<reference ref_id="1222961" ref_url="https://bugzilla.suse.com/1222961" source="BUGZILLA"/>
		<reference ref_id="1222974" ref_url="https://bugzilla.suse.com/1222974" source="BUGZILLA"/>
		<reference ref_id="1222975" ref_url="https://bugzilla.suse.com/1222975" source="BUGZILLA"/>
		<reference ref_id="1222976" ref_url="https://bugzilla.suse.com/1222976" source="BUGZILLA"/>
		<reference ref_id="1223011" ref_url="https://bugzilla.suse.com/1223011" source="BUGZILLA"/>
		<reference ref_id="1223023" ref_url="https://bugzilla.suse.com/1223023" source="BUGZILLA"/>
		<reference ref_id="1223027" ref_url="https://bugzilla.suse.com/1223027" source="BUGZILLA"/>
		<reference ref_id="1223031" ref_url="https://bugzilla.suse.com/1223031" source="BUGZILLA"/>
		<reference ref_id="1223043" ref_url="https://bugzilla.suse.com/1223043" source="BUGZILLA"/>
		<reference ref_id="1223046" ref_url="https://bugzilla.suse.com/1223046" source="BUGZILLA"/>
		<reference ref_id="1223048" ref_url="https://bugzilla.suse.com/1223048" source="BUGZILLA"/>
		<reference ref_id="1223049" ref_url="https://bugzilla.suse.com/1223049" source="BUGZILLA"/>
		<reference ref_id="1223084" ref_url="https://bugzilla.suse.com/1223084" source="BUGZILLA"/>
		<reference ref_id="1223113" ref_url="https://bugzilla.suse.com/1223113" source="BUGZILLA"/>
		<reference ref_id="1223119" ref_url="https://bugzilla.suse.com/1223119" source="BUGZILLA"/>
		<reference ref_id="1223137" ref_url="https://bugzilla.suse.com/1223137" source="BUGZILLA"/>
		<reference ref_id="1223138" ref_url="https://bugzilla.suse.com/1223138" source="BUGZILLA"/>
		<reference ref_id="1223140" ref_url="https://bugzilla.suse.com/1223140" source="BUGZILLA"/>
		<reference ref_id="1223188" ref_url="https://bugzilla.suse.com/1223188" source="BUGZILLA"/>
		<reference ref_id="1223203" ref_url="https://bugzilla.suse.com/1223203" source="BUGZILLA"/>
		<reference ref_id="1223207" ref_url="https://bugzilla.suse.com/1223207" source="BUGZILLA"/>
		<reference ref_id="1223315" ref_url="https://bugzilla.suse.com/1223315" source="BUGZILLA"/>
		<reference ref_id="1223360" ref_url="https://bugzilla.suse.com/1223360" source="BUGZILLA"/>
		<reference ref_id="1223384" ref_url="https://bugzilla.suse.com/1223384" source="BUGZILLA"/>
		<reference ref_id="1223390" ref_url="https://bugzilla.suse.com/1223390" source="BUGZILLA"/>
		<reference ref_id="1223432" ref_url="https://bugzilla.suse.com/1223432" source="BUGZILLA"/>
		<reference ref_id="1223489" ref_url="https://bugzilla.suse.com/1223489" source="BUGZILLA"/>
		<reference ref_id="1223505" ref_url="https://bugzilla.suse.com/1223505" source="BUGZILLA"/>
		<reference ref_id="1223532" ref_url="https://bugzilla.suse.com/1223532" source="BUGZILLA"/>
		<reference ref_id="1223575" ref_url="https://bugzilla.suse.com/1223575" source="BUGZILLA"/>
		<reference ref_id="1223595" ref_url="https://bugzilla.suse.com/1223595" source="BUGZILLA"/>
		<reference ref_id="1223626" ref_url="https://bugzilla.suse.com/1223626" source="BUGZILLA"/>
		<reference ref_id="1223627" ref_url="https://bugzilla.suse.com/1223627" source="BUGZILLA"/>
		<reference ref_id="1223628" ref_url="https://bugzilla.suse.com/1223628" source="BUGZILLA"/>
		<reference ref_id="1223631" ref_url="https://bugzilla.suse.com/1223631" source="BUGZILLA"/>
		<reference ref_id="1223633" ref_url="https://bugzilla.suse.com/1223633" source="BUGZILLA"/>
		<reference ref_id="1223638" ref_url="https://bugzilla.suse.com/1223638" source="BUGZILLA"/>
		<reference ref_id="1223650" ref_url="https://bugzilla.suse.com/1223650" source="BUGZILLA"/>
		<reference ref_id="1223653" ref_url="https://bugzilla.suse.com/1223653" source="BUGZILLA"/>
		<reference ref_id="1223666" ref_url="https://bugzilla.suse.com/1223666" source="BUGZILLA"/>
		<reference ref_id="1223670" ref_url="https://bugzilla.suse.com/1223670" source="BUGZILLA"/>
		<reference ref_id="1223671" ref_url="https://bugzilla.suse.com/1223671" source="BUGZILLA"/>
		<reference ref_id="1223675" ref_url="https://bugzilla.suse.com/1223675" source="BUGZILLA"/>
		<reference ref_id="1223677" ref_url="https://bugzilla.suse.com/1223677" source="BUGZILLA"/>
		<reference ref_id="1223678" ref_url="https://bugzilla.suse.com/1223678" source="BUGZILLA"/>
		<reference ref_id="1223679" ref_url="https://bugzilla.suse.com/1223679" source="BUGZILLA"/>
		<reference ref_id="1223698" ref_url="https://bugzilla.suse.com/1223698" source="BUGZILLA"/>
		<reference ref_id="1223712" ref_url="https://bugzilla.suse.com/1223712" source="BUGZILLA"/>
		<reference ref_id="1223715" ref_url="https://bugzilla.suse.com/1223715" source="BUGZILLA"/>
		<reference ref_id="1223717" ref_url="https://bugzilla.suse.com/1223717" source="BUGZILLA"/>
		<reference ref_id="1223718" ref_url="https://bugzilla.suse.com/1223718" source="BUGZILLA"/>
		<reference ref_id="1223737" ref_url="https://bugzilla.suse.com/1223737" source="BUGZILLA"/>
		<reference ref_id="1223738" ref_url="https://bugzilla.suse.com/1223738" source="BUGZILLA"/>
		<reference ref_id="1223741" ref_url="https://bugzilla.suse.com/1223741" source="BUGZILLA"/>
		<reference ref_id="1223744" ref_url="https://bugzilla.suse.com/1223744" source="BUGZILLA"/>
		<reference ref_id="1223747" ref_url="https://bugzilla.suse.com/1223747" source="BUGZILLA"/>
		<reference ref_id="1223748" ref_url="https://bugzilla.suse.com/1223748" source="BUGZILLA"/>
		<reference ref_id="1223750" ref_url="https://bugzilla.suse.com/1223750" source="BUGZILLA"/>
		<reference ref_id="1223752" ref_url="https://bugzilla.suse.com/1223752" source="BUGZILLA"/>
		<reference ref_id="1223754" ref_url="https://bugzilla.suse.com/1223754" source="BUGZILLA"/>
		<reference ref_id="1223756" ref_url="https://bugzilla.suse.com/1223756" source="BUGZILLA"/>
		<reference ref_id="1223757" ref_url="https://bugzilla.suse.com/1223757" source="BUGZILLA"/>
		<reference ref_id="1223762" ref_url="https://bugzilla.suse.com/1223762" source="BUGZILLA"/>
		<reference ref_id="1223769" ref_url="https://bugzilla.suse.com/1223769" source="BUGZILLA"/>
		<reference ref_id="1223770" ref_url="https://bugzilla.suse.com/1223770" source="BUGZILLA"/>
		<reference ref_id="1223779" ref_url="https://bugzilla.suse.com/1223779" source="BUGZILLA"/>
		<reference ref_id="1223780" ref_url="https://bugzilla.suse.com/1223780" source="BUGZILLA"/>
		<reference ref_id="1223781" ref_url="https://bugzilla.suse.com/1223781" source="BUGZILLA"/>
		<reference ref_id="1223788" ref_url="https://bugzilla.suse.com/1223788" source="BUGZILLA"/>
		<reference ref_id="1223802" ref_url="https://bugzilla.suse.com/1223802" source="BUGZILLA"/>
		<reference ref_id="1223819" ref_url="https://bugzilla.suse.com/1223819" source="BUGZILLA"/>
		<reference ref_id="1223823" ref_url="https://bugzilla.suse.com/1223823" source="BUGZILLA"/>
		<reference ref_id="1223826" ref_url="https://bugzilla.suse.com/1223826" source="BUGZILLA"/>
		<reference ref_id="1223828" ref_url="https://bugzilla.suse.com/1223828" source="BUGZILLA"/>
		<reference ref_id="1223829" ref_url="https://bugzilla.suse.com/1223829" source="BUGZILLA"/>
		<reference ref_id="1223837" ref_url="https://bugzilla.suse.com/1223837" source="BUGZILLA"/>
		<reference ref_id="1223842" ref_url="https://bugzilla.suse.com/1223842" source="BUGZILLA"/>
		<reference ref_id="1223843" ref_url="https://bugzilla.suse.com/1223843" source="BUGZILLA"/>
		<reference ref_id="1223844" ref_url="https://bugzilla.suse.com/1223844" source="BUGZILLA"/>
		<reference ref_id="1223847" ref_url="https://bugzilla.suse.com/1223847" source="BUGZILLA"/>
		<reference ref_id="1223858" ref_url="https://bugzilla.suse.com/1223858" source="BUGZILLA"/>
		<reference ref_id="1223875" ref_url="https://bugzilla.suse.com/1223875" source="BUGZILLA"/>
		<reference ref_id="1223879" ref_url="https://bugzilla.suse.com/1223879" source="BUGZILLA"/>
		<reference ref_id="1223895" ref_url="https://bugzilla.suse.com/1223895" source="BUGZILLA"/>
		<reference ref_id="1223959" ref_url="https://bugzilla.suse.com/1223959" source="BUGZILLA"/>
		<reference ref_id="1223961" ref_url="https://bugzilla.suse.com/1223961" source="BUGZILLA"/>
		<reference ref_id="1223991" ref_url="https://bugzilla.suse.com/1223991" source="BUGZILLA"/>
		<reference ref_id="1223996" ref_url="https://bugzilla.suse.com/1223996" source="BUGZILLA"/>
		<reference ref_id="1224020" ref_url="https://bugzilla.suse.com/1224020" source="BUGZILLA"/>
		<reference ref_id="1224076" ref_url="https://bugzilla.suse.com/1224076" source="BUGZILLA"/>
		<reference ref_id="1224096" ref_url="https://bugzilla.suse.com/1224096" source="BUGZILLA"/>
		<reference ref_id="1224098" ref_url="https://bugzilla.suse.com/1224098" source="BUGZILLA"/>
		<reference ref_id="1224099" ref_url="https://bugzilla.suse.com/1224099" source="BUGZILLA"/>
		<reference ref_id="1224137" ref_url="https://bugzilla.suse.com/1224137" source="BUGZILLA"/>
		<reference ref_id="1224166" ref_url="https://bugzilla.suse.com/1224166" source="BUGZILLA"/>
		<reference ref_id="1224174" ref_url="https://bugzilla.suse.com/1224174" source="BUGZILLA"/>
		<reference ref_id="1224177" ref_url="https://bugzilla.suse.com/1224177" source="BUGZILLA"/>
		<reference ref_id="1224180" ref_url="https://bugzilla.suse.com/1224180" source="BUGZILLA"/>
		<reference ref_id="1224181" ref_url="https://bugzilla.suse.com/1224181" source="BUGZILLA"/>
		<reference ref_id="1224187" ref_url="https://bugzilla.suse.com/1224187" source="BUGZILLA"/>
		<reference ref_id="1224331" ref_url="https://bugzilla.suse.com/1224331" source="BUGZILLA"/>
		<reference ref_id="1224346" ref_url="https://bugzilla.suse.com/1224346" source="BUGZILLA"/>
		<reference ref_id="1224423" ref_url="https://bugzilla.suse.com/1224423" source="BUGZILLA"/>
		<reference ref_id="1224432" ref_url="https://bugzilla.suse.com/1224432" source="BUGZILLA"/>
		<reference ref_id="1224437" ref_url="https://bugzilla.suse.com/1224437" source="BUGZILLA"/>
		<reference ref_id="1224438" ref_url="https://bugzilla.suse.com/1224438" source="BUGZILLA"/>
		<reference ref_id="1224442" ref_url="https://bugzilla.suse.com/1224442" source="BUGZILLA"/>
		<reference ref_id="1224443" ref_url="https://bugzilla.suse.com/1224443" source="BUGZILLA"/>
		<reference ref_id="1224445" ref_url="https://bugzilla.suse.com/1224445" source="BUGZILLA"/>
		<reference ref_id="1224449" ref_url="https://bugzilla.suse.com/1224449" source="BUGZILLA"/>
		<reference ref_id="1224479" ref_url="https://bugzilla.suse.com/1224479" source="BUGZILLA"/>
		<reference ref_id="1224482" ref_url="https://bugzilla.suse.com/1224482" source="BUGZILLA"/>
		<reference ref_id="1224487" ref_url="https://bugzilla.suse.com/1224487" source="BUGZILLA"/>
		<reference ref_id="1224488" ref_url="https://bugzilla.suse.com/1224488" source="BUGZILLA"/>
		<reference ref_id="1224492" ref_url="https://bugzilla.suse.com/1224492" source="BUGZILLA"/>
		<reference ref_id="1224494" ref_url="https://bugzilla.suse.com/1224494" source="BUGZILLA"/>
		<reference ref_id="1224495" ref_url="https://bugzilla.suse.com/1224495" source="BUGZILLA"/>
		<reference ref_id="1224502" ref_url="https://bugzilla.suse.com/1224502" source="BUGZILLA"/>
		<reference ref_id="1224508" ref_url="https://bugzilla.suse.com/1224508" source="BUGZILLA"/>
		<reference ref_id="1224509" ref_url="https://bugzilla.suse.com/1224509" source="BUGZILLA"/>
		<reference ref_id="1224511" ref_url="https://bugzilla.suse.com/1224511" source="BUGZILLA"/>
		<reference ref_id="1224519" ref_url="https://bugzilla.suse.com/1224519" source="BUGZILLA"/>
		<reference ref_id="1224524" ref_url="https://bugzilla.suse.com/1224524" source="BUGZILLA"/>
		<reference ref_id="1224525" ref_url="https://bugzilla.suse.com/1224525" source="BUGZILLA"/>
		<reference ref_id="1224530" ref_url="https://bugzilla.suse.com/1224530" source="BUGZILLA"/>
		<reference ref_id="1224531" ref_url="https://bugzilla.suse.com/1224531" source="BUGZILLA"/>
		<reference ref_id="1224534" ref_url="https://bugzilla.suse.com/1224534" source="BUGZILLA"/>
		<reference ref_id="1224535" ref_url="https://bugzilla.suse.com/1224535" source="BUGZILLA"/>
		<reference ref_id="1224537" ref_url="https://bugzilla.suse.com/1224537" source="BUGZILLA"/>
		<reference ref_id="1224541" ref_url="https://bugzilla.suse.com/1224541" source="BUGZILLA"/>
		<reference ref_id="1224543" ref_url="https://bugzilla.suse.com/1224543" source="BUGZILLA"/>
		<reference ref_id="1224549" ref_url="https://bugzilla.suse.com/1224549" source="BUGZILLA"/>
		<reference ref_id="1224550" ref_url="https://bugzilla.suse.com/1224550" source="BUGZILLA"/>
		<reference ref_id="1224558" ref_url="https://bugzilla.suse.com/1224558" source="BUGZILLA"/>
		<reference ref_id="1224559" ref_url="https://bugzilla.suse.com/1224559" source="BUGZILLA"/>
		<reference ref_id="1224566" ref_url="https://bugzilla.suse.com/1224566" source="BUGZILLA"/>
		<reference ref_id="1224567" ref_url="https://bugzilla.suse.com/1224567" source="BUGZILLA"/>
		<reference ref_id="1224571" ref_url="https://bugzilla.suse.com/1224571" source="BUGZILLA"/>
		<reference ref_id="1224575" ref_url="https://bugzilla.suse.com/1224575" source="BUGZILLA"/>
		<reference ref_id="1224576" ref_url="https://bugzilla.suse.com/1224576" source="BUGZILLA"/>
		<reference ref_id="1224579" ref_url="https://bugzilla.suse.com/1224579" source="BUGZILLA"/>
		<reference ref_id="1224580" ref_url="https://bugzilla.suse.com/1224580" source="BUGZILLA"/>
		<reference ref_id="1224581" ref_url="https://bugzilla.suse.com/1224581" source="BUGZILLA"/>
		<reference ref_id="1224582" ref_url="https://bugzilla.suse.com/1224582" source="BUGZILLA"/>
		<reference ref_id="1224586" ref_url="https://bugzilla.suse.com/1224586" source="BUGZILLA"/>
		<reference ref_id="1224587" ref_url="https://bugzilla.suse.com/1224587" source="BUGZILLA"/>
		<reference ref_id="1224592" ref_url="https://bugzilla.suse.com/1224592" source="BUGZILLA"/>
		<reference ref_id="1224598" ref_url="https://bugzilla.suse.com/1224598" source="BUGZILLA"/>
		<reference ref_id="1224601" ref_url="https://bugzilla.suse.com/1224601" source="BUGZILLA"/>
		<reference ref_id="1224607" ref_url="https://bugzilla.suse.com/1224607" source="BUGZILLA"/>
		<reference ref_id="1224608" ref_url="https://bugzilla.suse.com/1224608" source="BUGZILLA"/>
		<reference ref_id="1224611" ref_url="https://bugzilla.suse.com/1224611" source="BUGZILLA"/>
		<reference ref_id="1224615" ref_url="https://bugzilla.suse.com/1224615" source="BUGZILLA"/>
		<reference ref_id="1224617" ref_url="https://bugzilla.suse.com/1224617" source="BUGZILLA"/>
		<reference ref_id="1224618" ref_url="https://bugzilla.suse.com/1224618" source="BUGZILLA"/>
		<reference ref_id="1224621" ref_url="https://bugzilla.suse.com/1224621" source="BUGZILLA"/>
		<reference ref_id="1224622" ref_url="https://bugzilla.suse.com/1224622" source="BUGZILLA"/>
		<reference ref_id="1224624" ref_url="https://bugzilla.suse.com/1224624" source="BUGZILLA"/>
		<reference ref_id="1224627" ref_url="https://bugzilla.suse.com/1224627" source="BUGZILLA"/>
		<reference ref_id="1224628" ref_url="https://bugzilla.suse.com/1224628" source="BUGZILLA"/>
		<reference ref_id="1224629" ref_url="https://bugzilla.suse.com/1224629" source="BUGZILLA"/>
		<reference ref_id="1224632" ref_url="https://bugzilla.suse.com/1224632" source="BUGZILLA"/>
		<reference ref_id="1224636" ref_url="https://bugzilla.suse.com/1224636" source="BUGZILLA"/>
		<reference ref_id="1224637" ref_url="https://bugzilla.suse.com/1224637" source="BUGZILLA"/>
		<reference ref_id="1224638" ref_url="https://bugzilla.suse.com/1224638" source="BUGZILLA"/>
		<reference ref_id="1224640" ref_url="https://bugzilla.suse.com/1224640" source="BUGZILLA"/>
		<reference ref_id="1224643" ref_url="https://bugzilla.suse.com/1224643" source="BUGZILLA"/>
		<reference ref_id="1224644" ref_url="https://bugzilla.suse.com/1224644" source="BUGZILLA"/>
		<reference ref_id="1224645" ref_url="https://bugzilla.suse.com/1224645" source="BUGZILLA"/>
		<reference ref_id="1224647" ref_url="https://bugzilla.suse.com/1224647" source="BUGZILLA"/>
		<reference ref_id="1224648" ref_url="https://bugzilla.suse.com/1224648" source="BUGZILLA"/>
		<reference ref_id="1224649" ref_url="https://bugzilla.suse.com/1224649" source="BUGZILLA"/>
		<reference ref_id="1224650" ref_url="https://bugzilla.suse.com/1224650" source="BUGZILLA"/>
		<reference ref_id="1224651" ref_url="https://bugzilla.suse.com/1224651" source="BUGZILLA"/>
		<reference ref_id="1224657" ref_url="https://bugzilla.suse.com/1224657" source="BUGZILLA"/>
		<reference ref_id="1224659" ref_url="https://bugzilla.suse.com/1224659" source="BUGZILLA"/>
		<reference ref_id="1224660" ref_url="https://bugzilla.suse.com/1224660" source="BUGZILLA"/>
		<reference ref_id="1224663" ref_url="https://bugzilla.suse.com/1224663" source="BUGZILLA"/>
		<reference ref_id="1224664" ref_url="https://bugzilla.suse.com/1224664" source="BUGZILLA"/>
		<reference ref_id="1224665" ref_url="https://bugzilla.suse.com/1224665" source="BUGZILLA"/>
		<reference ref_id="1224666" ref_url="https://bugzilla.suse.com/1224666" source="BUGZILLA"/>
		<reference ref_id="1224667" ref_url="https://bugzilla.suse.com/1224667" source="BUGZILLA"/>
		<reference ref_id="1224668" ref_url="https://bugzilla.suse.com/1224668" source="BUGZILLA"/>
		<reference ref_id="1224671" ref_url="https://bugzilla.suse.com/1224671" source="BUGZILLA"/>
		<reference ref_id="1224672" ref_url="https://bugzilla.suse.com/1224672" source="BUGZILLA"/>
		<reference ref_id="1224676" ref_url="https://bugzilla.suse.com/1224676" source="BUGZILLA"/>
		<reference ref_id="1224678" ref_url="https://bugzilla.suse.com/1224678" source="BUGZILLA"/>
		<reference ref_id="1224679" ref_url="https://bugzilla.suse.com/1224679" source="BUGZILLA"/>
		<reference ref_id="1224680" ref_url="https://bugzilla.suse.com/1224680" source="BUGZILLA"/>
		<reference ref_id="1224681" ref_url="https://bugzilla.suse.com/1224681" source="BUGZILLA"/>
		<reference ref_id="1224682" ref_url="https://bugzilla.suse.com/1224682" source="BUGZILLA"/>
		<reference ref_id="1224685" ref_url="https://bugzilla.suse.com/1224685" source="BUGZILLA"/>
		<reference ref_id="1224686" ref_url="https://bugzilla.suse.com/1224686" source="BUGZILLA"/>
		<reference ref_id="1224692" ref_url="https://bugzilla.suse.com/1224692" source="BUGZILLA"/>
		<reference ref_id="1224697" ref_url="https://bugzilla.suse.com/1224697" source="BUGZILLA"/>
		<reference ref_id="1224699" ref_url="https://bugzilla.suse.com/1224699" source="BUGZILLA"/>
		<reference ref_id="1224701" ref_url="https://bugzilla.suse.com/1224701" source="BUGZILLA"/>
		<reference ref_id="1224703" ref_url="https://bugzilla.suse.com/1224703" source="BUGZILLA"/>
		<reference ref_id="1224705" ref_url="https://bugzilla.suse.com/1224705" source="BUGZILLA"/>
		<reference ref_id="1224707" ref_url="https://bugzilla.suse.com/1224707" source="BUGZILLA"/>
		<reference ref_id="1224717" ref_url="https://bugzilla.suse.com/1224717" source="BUGZILLA"/>
		<reference ref_id="1224718" ref_url="https://bugzilla.suse.com/1224718" source="BUGZILLA"/>
		<reference ref_id="1224721" ref_url="https://bugzilla.suse.com/1224721" source="BUGZILLA"/>
		<reference ref_id="1224722" ref_url="https://bugzilla.suse.com/1224722" source="BUGZILLA"/>
		<reference ref_id="1224723" ref_url="https://bugzilla.suse.com/1224723" source="BUGZILLA"/>
		<reference ref_id="1224725" ref_url="https://bugzilla.suse.com/1224725" source="BUGZILLA"/>
		<reference ref_id="1224727" ref_url="https://bugzilla.suse.com/1224727" source="BUGZILLA"/>
		<reference ref_id="1224728" ref_url="https://bugzilla.suse.com/1224728" source="BUGZILLA"/>
		<reference ref_id="1224729" ref_url="https://bugzilla.suse.com/1224729" source="BUGZILLA"/>
		<reference ref_id="1224730" ref_url="https://bugzilla.suse.com/1224730" source="BUGZILLA"/>
		<reference ref_id="1224731" ref_url="https://bugzilla.suse.com/1224731" source="BUGZILLA"/>
		<reference ref_id="1224732" ref_url="https://bugzilla.suse.com/1224732" source="BUGZILLA"/>
		<reference ref_id="1224733" ref_url="https://bugzilla.suse.com/1224733" source="BUGZILLA"/>
		<reference ref_id="1224736" ref_url="https://bugzilla.suse.com/1224736" source="BUGZILLA"/>
		<reference ref_id="1224738" ref_url="https://bugzilla.suse.com/1224738" source="BUGZILLA"/>
		<reference ref_id="1224739" ref_url="https://bugzilla.suse.com/1224739" source="BUGZILLA"/>
		<reference ref_id="1224740" ref_url="https://bugzilla.suse.com/1224740" source="BUGZILLA"/>
		<reference ref_id="1224747" ref_url="https://bugzilla.suse.com/1224747" source="BUGZILLA"/>
		<reference ref_id="1224749" ref_url="https://bugzilla.suse.com/1224749" source="BUGZILLA"/>
		<reference ref_id="1224759" ref_url="https://bugzilla.suse.com/1224759" source="BUGZILLA"/>
		<reference ref_id="1224763" ref_url="https://bugzilla.suse.com/1224763" source="BUGZILLA"/>
		<reference ref_id="1224764" ref_url="https://bugzilla.suse.com/1224764" source="BUGZILLA"/>
		<reference ref_id="1224765" ref_url="https://bugzilla.suse.com/1224765" source="BUGZILLA"/>
		<reference ref_id="1224766" ref_url="https://bugzilla.suse.com/1224766" source="BUGZILLA"/>
		<reference ref_id="1224794" ref_url="https://bugzilla.suse.com/1224794" source="BUGZILLA"/>
		<reference ref_id="1224795" ref_url="https://bugzilla.suse.com/1224795" source="BUGZILLA"/>
		<reference ref_id="1224796" ref_url="https://bugzilla.suse.com/1224796" source="BUGZILLA"/>
		<reference ref_id="1224803" ref_url="https://bugzilla.suse.com/1224803" source="BUGZILLA"/>
		<reference ref_id="1224816" ref_url="https://bugzilla.suse.com/1224816" source="BUGZILLA"/>
		<reference ref_id="1224895" ref_url="https://bugzilla.suse.com/1224895" source="BUGZILLA"/>
		<reference ref_id="1224898" ref_url="https://bugzilla.suse.com/1224898" source="BUGZILLA"/>
		<reference ref_id="1224900" ref_url="https://bugzilla.suse.com/1224900" source="BUGZILLA"/>
		<reference ref_id="1224901" ref_url="https://bugzilla.suse.com/1224901" source="BUGZILLA"/>
		<reference ref_id="1224902" ref_url="https://bugzilla.suse.com/1224902" source="BUGZILLA"/>
		<reference ref_id="1224903" ref_url="https://bugzilla.suse.com/1224903" source="BUGZILLA"/>
		<reference ref_id="1224904" ref_url="https://bugzilla.suse.com/1224904" source="BUGZILLA"/>
		<reference ref_id="1224905" ref_url="https://bugzilla.suse.com/1224905" source="BUGZILLA"/>
		<reference ref_id="1224907" ref_url="https://bugzilla.suse.com/1224907" source="BUGZILLA"/>
		<reference ref_id="1224909" ref_url="https://bugzilla.suse.com/1224909" source="BUGZILLA"/>
		<reference ref_id="1224910" ref_url="https://bugzilla.suse.com/1224910" source="BUGZILLA"/>
		<reference ref_id="1224911" ref_url="https://bugzilla.suse.com/1224911" source="BUGZILLA"/>
		<reference ref_id="1224912" ref_url="https://bugzilla.suse.com/1224912" source="BUGZILLA"/>
		<reference ref_id="1224913" ref_url="https://bugzilla.suse.com/1224913" source="BUGZILLA"/>
		<reference ref_id="1224914" ref_url="https://bugzilla.suse.com/1224914" source="BUGZILLA"/>
		<reference ref_id="1224915" ref_url="https://bugzilla.suse.com/1224915" source="BUGZILLA"/>
		<reference ref_id="1224920" ref_url="https://bugzilla.suse.com/1224920" source="BUGZILLA"/>
		<reference ref_id="1224928" ref_url="https://bugzilla.suse.com/1224928" source="BUGZILLA"/>
		<reference ref_id="1224929" ref_url="https://bugzilla.suse.com/1224929" source="BUGZILLA"/>
		<reference ref_id="1224930" ref_url="https://bugzilla.suse.com/1224930" source="BUGZILLA"/>
		<reference ref_id="1224931" ref_url="https://bugzilla.suse.com/1224931" source="BUGZILLA"/>
		<reference ref_id="1224932" ref_url="https://bugzilla.suse.com/1224932" source="BUGZILLA"/>
		<reference ref_id="1224936" ref_url="https://bugzilla.suse.com/1224936" source="BUGZILLA"/>
		<reference ref_id="1224937" ref_url="https://bugzilla.suse.com/1224937" source="BUGZILLA"/>
		<reference ref_id="1224941" ref_url="https://bugzilla.suse.com/1224941" source="BUGZILLA"/>
		<reference ref_id="1224942" ref_url="https://bugzilla.suse.com/1224942" source="BUGZILLA"/>
		<reference ref_id="1224944" ref_url="https://bugzilla.suse.com/1224944" source="BUGZILLA"/>
		<reference ref_id="1224945" ref_url="https://bugzilla.suse.com/1224945" source="BUGZILLA"/>
		<reference ref_id="1224947" ref_url="https://bugzilla.suse.com/1224947" source="BUGZILLA"/>
		<reference ref_id="1224956" ref_url="https://bugzilla.suse.com/1224956" source="BUGZILLA"/>
		<reference ref_id="1224988" ref_url="https://bugzilla.suse.com/1224988" source="BUGZILLA"/>
		<reference ref_id="1224992" ref_url="https://bugzilla.suse.com/1224992" source="BUGZILLA"/>
		<reference ref_id="1225000" ref_url="https://bugzilla.suse.com/1225000" source="BUGZILLA"/>
		<reference ref_id="1225003" ref_url="https://bugzilla.suse.com/1225003" source="BUGZILLA"/>
		<reference ref_id="1225005" ref_url="https://bugzilla.suse.com/1225005" source="BUGZILLA"/>
		<reference ref_id="1225008" ref_url="https://bugzilla.suse.com/1225008" source="BUGZILLA"/>
		<reference ref_id="1225009" ref_url="https://bugzilla.suse.com/1225009" source="BUGZILLA"/>
		<reference ref_id="1225022" ref_url="https://bugzilla.suse.com/1225022" source="BUGZILLA"/>
		<reference ref_id="1225031" ref_url="https://bugzilla.suse.com/1225031" source="BUGZILLA"/>
		<reference ref_id="1225032" ref_url="https://bugzilla.suse.com/1225032" source="BUGZILLA"/>
		<reference ref_id="1225036" ref_url="https://bugzilla.suse.com/1225036" source="BUGZILLA"/>
		<reference ref_id="1225041" ref_url="https://bugzilla.suse.com/1225041" source="BUGZILLA"/>
		<reference ref_id="1225044" ref_url="https://bugzilla.suse.com/1225044" source="BUGZILLA"/>
		<reference ref_id="1225053" ref_url="https://bugzilla.suse.com/1225053" source="BUGZILLA"/>
		<reference ref_id="1225076" ref_url="https://bugzilla.suse.com/1225076" source="BUGZILLA"/>
		<reference ref_id="1225077" ref_url="https://bugzilla.suse.com/1225077" source="BUGZILLA"/>
		<reference ref_id="1225082" ref_url="https://bugzilla.suse.com/1225082" source="BUGZILLA"/>
		<reference ref_id="1225085" ref_url="https://bugzilla.suse.com/1225085" source="BUGZILLA"/>
		<reference ref_id="1225086" ref_url="https://bugzilla.suse.com/1225086" source="BUGZILLA"/>
		<reference ref_id="1225092" ref_url="https://bugzilla.suse.com/1225092" source="BUGZILLA"/>
		<reference ref_id="1225095" ref_url="https://bugzilla.suse.com/1225095" source="BUGZILLA"/>
		<reference ref_id="1225096" ref_url="https://bugzilla.suse.com/1225096" source="BUGZILLA"/>
		<reference ref_id="1225097" ref_url="https://bugzilla.suse.com/1225097" source="BUGZILLA"/>
		<reference ref_id="1225106" ref_url="https://bugzilla.suse.com/1225106" source="BUGZILLA"/>
		<reference ref_id="1225108" ref_url="https://bugzilla.suse.com/1225108" source="BUGZILLA"/>
		<reference ref_id="1225109" ref_url="https://bugzilla.suse.com/1225109" source="BUGZILLA"/>
		<reference ref_id="1225114" ref_url="https://bugzilla.suse.com/1225114" source="BUGZILLA"/>
		<reference ref_id="1225118" ref_url="https://bugzilla.suse.com/1225118" source="BUGZILLA"/>
		<reference ref_id="1225121" ref_url="https://bugzilla.suse.com/1225121" source="BUGZILLA"/>
		<reference ref_id="1225122" ref_url="https://bugzilla.suse.com/1225122" source="BUGZILLA"/>
		<reference ref_id="1225123" ref_url="https://bugzilla.suse.com/1225123" source="BUGZILLA"/>
		<reference ref_id="1225125" ref_url="https://bugzilla.suse.com/1225125" source="BUGZILLA"/>
		<reference ref_id="1225126" ref_url="https://bugzilla.suse.com/1225126" source="BUGZILLA"/>
		<reference ref_id="1225127" ref_url="https://bugzilla.suse.com/1225127" source="BUGZILLA"/>
		<reference ref_id="1225129" ref_url="https://bugzilla.suse.com/1225129" source="BUGZILLA"/>
		<reference ref_id="1225131" ref_url="https://bugzilla.suse.com/1225131" source="BUGZILLA"/>
		<reference ref_id="1225132" ref_url="https://bugzilla.suse.com/1225132" source="BUGZILLA"/>
		<reference ref_id="1225138" ref_url="https://bugzilla.suse.com/1225138" source="BUGZILLA"/>
		<reference ref_id="1225139" ref_url="https://bugzilla.suse.com/1225139" source="BUGZILLA"/>
		<reference ref_id="1225145" ref_url="https://bugzilla.suse.com/1225145" source="BUGZILLA"/>
		<reference ref_id="1225151" ref_url="https://bugzilla.suse.com/1225151" source="BUGZILLA"/>
		<reference ref_id="1225153" ref_url="https://bugzilla.suse.com/1225153" source="BUGZILLA"/>
		<reference ref_id="1225156" ref_url="https://bugzilla.suse.com/1225156" source="BUGZILLA"/>
		<reference ref_id="1225158" ref_url="https://bugzilla.suse.com/1225158" source="BUGZILLA"/>
		<reference ref_id="1225160" ref_url="https://bugzilla.suse.com/1225160" source="BUGZILLA"/>
		<reference ref_id="1225161" ref_url="https://bugzilla.suse.com/1225161" source="BUGZILLA"/>
		<reference ref_id="1225164" ref_url="https://bugzilla.suse.com/1225164" source="BUGZILLA"/>
		<reference ref_id="1225167" ref_url="https://bugzilla.suse.com/1225167" source="BUGZILLA"/>
		<reference ref_id="1225180" ref_url="https://bugzilla.suse.com/1225180" source="BUGZILLA"/>
		<reference ref_id="1225183" ref_url="https://bugzilla.suse.com/1225183" source="BUGZILLA"/>
		<reference ref_id="1225184" ref_url="https://bugzilla.suse.com/1225184" source="BUGZILLA"/>
		<reference ref_id="1225186" ref_url="https://bugzilla.suse.com/1225186" source="BUGZILLA"/>
		<reference ref_id="1225187" ref_url="https://bugzilla.suse.com/1225187" source="BUGZILLA"/>
		<reference ref_id="1225189" ref_url="https://bugzilla.suse.com/1225189" source="BUGZILLA"/>
		<reference ref_id="1225190" ref_url="https://bugzilla.suse.com/1225190" source="BUGZILLA"/>
		<reference ref_id="1225191" ref_url="https://bugzilla.suse.com/1225191" source="BUGZILLA"/>
		<reference ref_id="1225192" ref_url="https://bugzilla.suse.com/1225192" source="BUGZILLA"/>
		<reference ref_id="1225193" ref_url="https://bugzilla.suse.com/1225193" source="BUGZILLA"/>
		<reference ref_id="1225195" ref_url="https://bugzilla.suse.com/1225195" source="BUGZILLA"/>
		<reference ref_id="1225198" ref_url="https://bugzilla.suse.com/1225198" source="BUGZILLA"/>
		<reference ref_id="1225201" ref_url="https://bugzilla.suse.com/1225201" source="BUGZILLA"/>
		<reference ref_id="1225203" ref_url="https://bugzilla.suse.com/1225203" source="BUGZILLA"/>
		<reference ref_id="1225205" ref_url="https://bugzilla.suse.com/1225205" source="BUGZILLA"/>
		<reference ref_id="1225206" ref_url="https://bugzilla.suse.com/1225206" source="BUGZILLA"/>
		<reference ref_id="1225207" ref_url="https://bugzilla.suse.com/1225207" source="BUGZILLA"/>
		<reference ref_id="1225208" ref_url="https://bugzilla.suse.com/1225208" source="BUGZILLA"/>
		<reference ref_id="1225209" ref_url="https://bugzilla.suse.com/1225209" source="BUGZILLA"/>
		<reference ref_id="1225210" ref_url="https://bugzilla.suse.com/1225210" source="BUGZILLA"/>
		<reference ref_id="1225214" ref_url="https://bugzilla.suse.com/1225214" source="BUGZILLA"/>
		<reference ref_id="1225222" ref_url="https://bugzilla.suse.com/1225222" source="BUGZILLA"/>
		<reference ref_id="1225223" ref_url="https://bugzilla.suse.com/1225223" source="BUGZILLA"/>
		<reference ref_id="1225224" ref_url="https://bugzilla.suse.com/1225224" source="BUGZILLA"/>
		<reference ref_id="1225225" ref_url="https://bugzilla.suse.com/1225225" source="BUGZILLA"/>
		<reference ref_id="1225227" ref_url="https://bugzilla.suse.com/1225227" source="BUGZILLA"/>
		<reference ref_id="1225228" ref_url="https://bugzilla.suse.com/1225228" source="BUGZILLA"/>
		<reference ref_id="1225229" ref_url="https://bugzilla.suse.com/1225229" source="BUGZILLA"/>
		<reference ref_id="1225230" ref_url="https://bugzilla.suse.com/1225230" source="BUGZILLA"/>
		<reference ref_id="1225232" ref_url="https://bugzilla.suse.com/1225232" source="BUGZILLA"/>
		<reference ref_id="1225233" ref_url="https://bugzilla.suse.com/1225233" source="BUGZILLA"/>
		<reference ref_id="1225235" ref_url="https://bugzilla.suse.com/1225235" source="BUGZILLA"/>
		<reference ref_id="1225236" ref_url="https://bugzilla.suse.com/1225236" source="BUGZILLA"/>
		<reference ref_id="1225237" ref_url="https://bugzilla.suse.com/1225237" source="BUGZILLA"/>
		<reference ref_id="1225238" ref_url="https://bugzilla.suse.com/1225238" source="BUGZILLA"/>
		<reference ref_id="1225239" ref_url="https://bugzilla.suse.com/1225239" source="BUGZILLA"/>
		<reference ref_id="1225240" ref_url="https://bugzilla.suse.com/1225240" source="BUGZILLA"/>
		<reference ref_id="1225241" ref_url="https://bugzilla.suse.com/1225241" source="BUGZILLA"/>
		<reference ref_id="1225242" ref_url="https://bugzilla.suse.com/1225242" source="BUGZILLA"/>
		<reference ref_id="1225243" ref_url="https://bugzilla.suse.com/1225243" source="BUGZILLA"/>
		<reference ref_id="1225244" ref_url="https://bugzilla.suse.com/1225244" source="BUGZILLA"/>
		<reference ref_id="1225245" ref_url="https://bugzilla.suse.com/1225245" source="BUGZILLA"/>
		<reference ref_id="1225246" ref_url="https://bugzilla.suse.com/1225246" source="BUGZILLA"/>
		<reference ref_id="1225247" ref_url="https://bugzilla.suse.com/1225247" source="BUGZILLA"/>
		<reference ref_id="1225248" ref_url="https://bugzilla.suse.com/1225248" source="BUGZILLA"/>
		<reference ref_id="1225249" ref_url="https://bugzilla.suse.com/1225249" source="BUGZILLA"/>
		<reference ref_id="1225250" ref_url="https://bugzilla.suse.com/1225250" source="BUGZILLA"/>
		<reference ref_id="1225251" ref_url="https://bugzilla.suse.com/1225251" source="BUGZILLA"/>
		<reference ref_id="1225252" ref_url="https://bugzilla.suse.com/1225252" source="BUGZILLA"/>
		<reference ref_id="1225253" ref_url="https://bugzilla.suse.com/1225253" source="BUGZILLA"/>
		<reference ref_id="1225254" ref_url="https://bugzilla.suse.com/1225254" source="BUGZILLA"/>
		<reference ref_id="1225255" ref_url="https://bugzilla.suse.com/1225255" source="BUGZILLA"/>
		<reference ref_id="1225256" ref_url="https://bugzilla.suse.com/1225256" source="BUGZILLA"/>
		<reference ref_id="1225257" ref_url="https://bugzilla.suse.com/1225257" source="BUGZILLA"/>
		<reference ref_id="1225258" ref_url="https://bugzilla.suse.com/1225258" source="BUGZILLA"/>
		<reference ref_id="1225259" ref_url="https://bugzilla.suse.com/1225259" source="BUGZILLA"/>
		<reference ref_id="1225260" ref_url="https://bugzilla.suse.com/1225260" source="BUGZILLA"/>
		<reference ref_id="1225261" ref_url="https://bugzilla.suse.com/1225261" source="BUGZILLA"/>
		<reference ref_id="1225262" ref_url="https://bugzilla.suse.com/1225262" source="BUGZILLA"/>
		<reference ref_id="1225263" ref_url="https://bugzilla.suse.com/1225263" source="BUGZILLA"/>
		<reference ref_id="1225268" ref_url="https://bugzilla.suse.com/1225268" source="BUGZILLA"/>
		<reference ref_id="1225301" ref_url="https://bugzilla.suse.com/1225301" source="BUGZILLA"/>
		<reference ref_id="1225303" ref_url="https://bugzilla.suse.com/1225303" source="BUGZILLA"/>
		<reference ref_id="1225304" ref_url="https://bugzilla.suse.com/1225304" source="BUGZILLA"/>
		<reference ref_id="1225306" ref_url="https://bugzilla.suse.com/1225306" source="BUGZILLA"/>
		<reference ref_id="1225316" ref_url="https://bugzilla.suse.com/1225316" source="BUGZILLA"/>
		<reference ref_id="1225318" ref_url="https://bugzilla.suse.com/1225318" source="BUGZILLA"/>
		<reference ref_id="1225320" ref_url="https://bugzilla.suse.com/1225320" source="BUGZILLA"/>
		<reference ref_id="1225321" ref_url="https://bugzilla.suse.com/1225321" source="BUGZILLA"/>
		<reference ref_id="1225322" ref_url="https://bugzilla.suse.com/1225322" source="BUGZILLA"/>
		<reference ref_id="1225323" ref_url="https://bugzilla.suse.com/1225323" source="BUGZILLA"/>
		<reference ref_id="1225326" ref_url="https://bugzilla.suse.com/1225326" source="BUGZILLA"/>
		<reference ref_id="1225327" ref_url="https://bugzilla.suse.com/1225327" source="BUGZILLA"/>
		<reference ref_id="1225328" ref_url="https://bugzilla.suse.com/1225328" source="BUGZILLA"/>
		<reference ref_id="1225329" ref_url="https://bugzilla.suse.com/1225329" source="BUGZILLA"/>
		<reference ref_id="1225330" ref_url="https://bugzilla.suse.com/1225330" source="BUGZILLA"/>
		<reference ref_id="1225331" ref_url="https://bugzilla.suse.com/1225331" source="BUGZILLA"/>
		<reference ref_id="1225332" ref_url="https://bugzilla.suse.com/1225332" source="BUGZILLA"/>
		<reference ref_id="1225333" ref_url="https://bugzilla.suse.com/1225333" source="BUGZILLA"/>
		<reference ref_id="1225334" ref_url="https://bugzilla.suse.com/1225334" source="BUGZILLA"/>
		<reference ref_id="1225335" ref_url="https://bugzilla.suse.com/1225335" source="BUGZILLA"/>
		<reference ref_id="1225336" ref_url="https://bugzilla.suse.com/1225336" source="BUGZILLA"/>
		<reference ref_id="1225337" ref_url="https://bugzilla.suse.com/1225337" source="BUGZILLA"/>
		<reference ref_id="1225338" ref_url="https://bugzilla.suse.com/1225338" source="BUGZILLA"/>
		<reference ref_id="1225339" ref_url="https://bugzilla.suse.com/1225339" source="BUGZILLA"/>
		<reference ref_id="1225341" ref_url="https://bugzilla.suse.com/1225341" source="BUGZILLA"/>
		<reference ref_id="1225342" ref_url="https://bugzilla.suse.com/1225342" source="BUGZILLA"/>
		<reference ref_id="1225344" ref_url="https://bugzilla.suse.com/1225344" source="BUGZILLA"/>
		<reference ref_id="1225346" ref_url="https://bugzilla.suse.com/1225346" source="BUGZILLA"/>
		<reference ref_id="1225347" ref_url="https://bugzilla.suse.com/1225347" source="BUGZILLA"/>
		<reference ref_id="1225351" ref_url="https://bugzilla.suse.com/1225351" source="BUGZILLA"/>
		<reference ref_id="1225353" ref_url="https://bugzilla.suse.com/1225353" source="BUGZILLA"/>
		<reference ref_id="1225354" ref_url="https://bugzilla.suse.com/1225354" source="BUGZILLA"/>
		<reference ref_id="1225355" ref_url="https://bugzilla.suse.com/1225355" source="BUGZILLA"/>
		<reference ref_id="1225357" ref_url="https://bugzilla.suse.com/1225357" source="BUGZILLA"/>
		<reference ref_id="1225358" ref_url="https://bugzilla.suse.com/1225358" source="BUGZILLA"/>
		<reference ref_id="1225360" ref_url="https://bugzilla.suse.com/1225360" source="BUGZILLA"/>
		<reference ref_id="1225361" ref_url="https://bugzilla.suse.com/1225361" source="BUGZILLA"/>
		<reference ref_id="1225366" ref_url="https://bugzilla.suse.com/1225366" source="BUGZILLA"/>
		<reference ref_id="1225367" ref_url="https://bugzilla.suse.com/1225367" source="BUGZILLA"/>
		<reference ref_id="1225368" ref_url="https://bugzilla.suse.com/1225368" source="BUGZILLA"/>
		<reference ref_id="1225369" ref_url="https://bugzilla.suse.com/1225369" source="BUGZILLA"/>
		<reference ref_id="1225370" ref_url="https://bugzilla.suse.com/1225370" source="BUGZILLA"/>
		<reference ref_id="1225372" ref_url="https://bugzilla.suse.com/1225372" source="BUGZILLA"/>
		<reference ref_id="1225373" ref_url="https://bugzilla.suse.com/1225373" source="BUGZILLA"/>
		<reference ref_id="1225374" ref_url="https://bugzilla.suse.com/1225374" source="BUGZILLA"/>
		<reference ref_id="1225375" ref_url="https://bugzilla.suse.com/1225375" source="BUGZILLA"/>
		<reference ref_id="1225376" ref_url="https://bugzilla.suse.com/1225376" source="BUGZILLA"/>
		<reference ref_id="1225377" ref_url="https://bugzilla.suse.com/1225377" source="BUGZILLA"/>
		<reference ref_id="1225379" ref_url="https://bugzilla.suse.com/1225379" source="BUGZILLA"/>
		<reference ref_id="1225380" ref_url="https://bugzilla.suse.com/1225380" source="BUGZILLA"/>
		<reference ref_id="1225382" ref_url="https://bugzilla.suse.com/1225382" source="BUGZILLA"/>
		<reference ref_id="1225383" ref_url="https://bugzilla.suse.com/1225383" source="BUGZILLA"/>
		<reference ref_id="1225384" ref_url="https://bugzilla.suse.com/1225384" source="BUGZILLA"/>
		<reference ref_id="1225386" ref_url="https://bugzilla.suse.com/1225386" source="BUGZILLA"/>
		<reference ref_id="1225387" ref_url="https://bugzilla.suse.com/1225387" source="BUGZILLA"/>
		<reference ref_id="1225388" ref_url="https://bugzilla.suse.com/1225388" source="BUGZILLA"/>
		<reference ref_id="1225390" ref_url="https://bugzilla.suse.com/1225390" source="BUGZILLA"/>
		<reference ref_id="1225392" ref_url="https://bugzilla.suse.com/1225392" source="BUGZILLA"/>
		<reference ref_id="1225393" ref_url="https://bugzilla.suse.com/1225393" source="BUGZILLA"/>
		<reference ref_id="1225396" ref_url="https://bugzilla.suse.com/1225396" source="BUGZILLA"/>
		<reference ref_id="1225400" ref_url="https://bugzilla.suse.com/1225400" source="BUGZILLA"/>
		<reference ref_id="1225404" ref_url="https://bugzilla.suse.com/1225404" source="BUGZILLA"/>
		<reference ref_id="1225405" ref_url="https://bugzilla.suse.com/1225405" source="BUGZILLA"/>
		<reference ref_id="1225408" ref_url="https://bugzilla.suse.com/1225408" source="BUGZILLA"/>
		<reference ref_id="1225409" ref_url="https://bugzilla.suse.com/1225409" source="BUGZILLA"/>
		<reference ref_id="1225410" ref_url="https://bugzilla.suse.com/1225410" source="BUGZILLA"/>
		<reference ref_id="1225411" ref_url="https://bugzilla.suse.com/1225411" source="BUGZILLA"/>
		<reference ref_id="1225424" ref_url="https://bugzilla.suse.com/1225424" source="BUGZILLA"/>
		<reference ref_id="1225425" ref_url="https://bugzilla.suse.com/1225425" source="BUGZILLA"/>
		<reference ref_id="1225427" ref_url="https://bugzilla.suse.com/1225427" source="BUGZILLA"/>
		<reference ref_id="1225431" ref_url="https://bugzilla.suse.com/1225431" source="BUGZILLA"/>
		<reference ref_id="1225435" ref_url="https://bugzilla.suse.com/1225435" source="BUGZILLA"/>
		<reference ref_id="1225436" ref_url="https://bugzilla.suse.com/1225436" source="BUGZILLA"/>
		<reference ref_id="1225437" ref_url="https://bugzilla.suse.com/1225437" source="BUGZILLA"/>
		<reference ref_id="1225438" ref_url="https://bugzilla.suse.com/1225438" source="BUGZILLA"/>
		<reference ref_id="1225439" ref_url="https://bugzilla.suse.com/1225439" source="BUGZILLA"/>
		<reference ref_id="1225441" ref_url="https://bugzilla.suse.com/1225441" source="BUGZILLA"/>
		<reference ref_id="1225442" ref_url="https://bugzilla.suse.com/1225442" source="BUGZILLA"/>
		<reference ref_id="1225443" ref_url="https://bugzilla.suse.com/1225443" source="BUGZILLA"/>
		<reference ref_id="1225444" ref_url="https://bugzilla.suse.com/1225444" source="BUGZILLA"/>
		<reference ref_id="1225445" ref_url="https://bugzilla.suse.com/1225445" source="BUGZILLA"/>
		<reference ref_id="1225446" ref_url="https://bugzilla.suse.com/1225446" source="BUGZILLA"/>
		<reference ref_id="1225447" ref_url="https://bugzilla.suse.com/1225447" source="BUGZILLA"/>
		<reference ref_id="1225450" ref_url="https://bugzilla.suse.com/1225450" source="BUGZILLA"/>
		<reference ref_id="1225453" ref_url="https://bugzilla.suse.com/1225453" source="BUGZILLA"/>
		<reference ref_id="1225455" ref_url="https://bugzilla.suse.com/1225455" source="BUGZILLA"/>
		<reference ref_id="1225461" ref_url="https://bugzilla.suse.com/1225461" source="BUGZILLA"/>
		<reference ref_id="1225463" ref_url="https://bugzilla.suse.com/1225463" source="BUGZILLA"/>
		<reference ref_id="1225464" ref_url="https://bugzilla.suse.com/1225464" source="BUGZILLA"/>
		<reference ref_id="1225466" ref_url="https://bugzilla.suse.com/1225466" source="BUGZILLA"/>
		<reference ref_id="1225467" ref_url="https://bugzilla.suse.com/1225467" source="BUGZILLA"/>
		<reference ref_id="1225468" ref_url="https://bugzilla.suse.com/1225468" source="BUGZILLA"/>
		<reference ref_id="1225471" ref_url="https://bugzilla.suse.com/1225471" source="BUGZILLA"/>
		<reference ref_id="1225472" ref_url="https://bugzilla.suse.com/1225472" source="BUGZILLA"/>
		<reference ref_id="1225478" ref_url="https://bugzilla.suse.com/1225478" source="BUGZILLA"/>
		<reference ref_id="1225479" ref_url="https://bugzilla.suse.com/1225479" source="BUGZILLA"/>
		<reference ref_id="1225480" ref_url="https://bugzilla.suse.com/1225480" source="BUGZILLA"/>
		<reference ref_id="1225482" ref_url="https://bugzilla.suse.com/1225482" source="BUGZILLA"/>
		<reference ref_id="1225483" ref_url="https://bugzilla.suse.com/1225483" source="BUGZILLA"/>
		<reference ref_id="1225486" ref_url="https://bugzilla.suse.com/1225486" source="BUGZILLA"/>
		<reference ref_id="1225488" ref_url="https://bugzilla.suse.com/1225488" source="BUGZILLA"/>
		<reference ref_id="1225490" ref_url="https://bugzilla.suse.com/1225490" source="BUGZILLA"/>
		<reference ref_id="1225492" ref_url="https://bugzilla.suse.com/1225492" source="BUGZILLA"/>
		<reference ref_id="1225495" ref_url="https://bugzilla.suse.com/1225495" source="BUGZILLA"/>
		<reference ref_id="1225499" ref_url="https://bugzilla.suse.com/1225499" source="BUGZILLA"/>
		<reference ref_id="1225500" ref_url="https://bugzilla.suse.com/1225500" source="BUGZILLA"/>
		<reference ref_id="1225501" ref_url="https://bugzilla.suse.com/1225501" source="BUGZILLA"/>
		<reference ref_id="1225502" ref_url="https://bugzilla.suse.com/1225502" source="BUGZILLA"/>
		<reference ref_id="1225506" ref_url="https://bugzilla.suse.com/1225506" source="BUGZILLA"/>
		<reference ref_id="1225508" ref_url="https://bugzilla.suse.com/1225508" source="BUGZILLA"/>
		<reference ref_id="1225510" ref_url="https://bugzilla.suse.com/1225510" source="BUGZILLA"/>
		<reference ref_id="1225513" ref_url="https://bugzilla.suse.com/1225513" source="BUGZILLA"/>
		<reference ref_id="1225515" ref_url="https://bugzilla.suse.com/1225515" source="BUGZILLA"/>
		<reference ref_id="1225529" ref_url="https://bugzilla.suse.com/1225529" source="BUGZILLA"/>
		<reference ref_id="1225530" ref_url="https://bugzilla.suse.com/1225530" source="BUGZILLA"/>
		<reference ref_id="1225532" ref_url="https://bugzilla.suse.com/1225532" source="BUGZILLA"/>
		<reference ref_id="1225534" ref_url="https://bugzilla.suse.com/1225534" source="BUGZILLA"/>
		<reference ref_id="1225535" ref_url="https://bugzilla.suse.com/1225535" source="BUGZILLA"/>
		<reference ref_id="1225548" ref_url="https://bugzilla.suse.com/1225548" source="BUGZILLA"/>
		<reference ref_id="1225549" ref_url="https://bugzilla.suse.com/1225549" source="BUGZILLA"/>
		<reference ref_id="1225550" ref_url="https://bugzilla.suse.com/1225550" source="BUGZILLA"/>
		<reference ref_id="1225553" ref_url="https://bugzilla.suse.com/1225553" source="BUGZILLA"/>
		<reference ref_id="1225554" ref_url="https://bugzilla.suse.com/1225554" source="BUGZILLA"/>
		<reference ref_id="1225555" ref_url="https://bugzilla.suse.com/1225555" source="BUGZILLA"/>
		<reference ref_id="1225556" ref_url="https://bugzilla.suse.com/1225556" source="BUGZILLA"/>
		<reference ref_id="1225557" ref_url="https://bugzilla.suse.com/1225557" source="BUGZILLA"/>
		<reference ref_id="1225559" ref_url="https://bugzilla.suse.com/1225559" source="BUGZILLA"/>
		<reference ref_id="1225560" ref_url="https://bugzilla.suse.com/1225560" source="BUGZILLA"/>
		<reference ref_id="1225565" ref_url="https://bugzilla.suse.com/1225565" source="BUGZILLA"/>
		<reference ref_id="1225566" ref_url="https://bugzilla.suse.com/1225566" source="BUGZILLA"/>
		<reference ref_id="1225568" ref_url="https://bugzilla.suse.com/1225568" source="BUGZILLA"/>
		<reference ref_id="1225569" ref_url="https://bugzilla.suse.com/1225569" source="BUGZILLA"/>
		<reference ref_id="1225570" ref_url="https://bugzilla.suse.com/1225570" source="BUGZILLA"/>
		<reference ref_id="1225571" ref_url="https://bugzilla.suse.com/1225571" source="BUGZILLA"/>
		<reference ref_id="1225572" ref_url="https://bugzilla.suse.com/1225572" source="BUGZILLA"/>
		<reference ref_id="1225577" ref_url="https://bugzilla.suse.com/1225577" source="BUGZILLA"/>
		<reference ref_id="1225583" ref_url="https://bugzilla.suse.com/1225583" source="BUGZILLA"/>
		<reference ref_id="1225584" ref_url="https://bugzilla.suse.com/1225584" source="BUGZILLA"/>
		<reference ref_id="1225587" ref_url="https://bugzilla.suse.com/1225587" source="BUGZILLA"/>
		<reference ref_id="1225588" ref_url="https://bugzilla.suse.com/1225588" source="BUGZILLA"/>
		<reference ref_id="1225589" ref_url="https://bugzilla.suse.com/1225589" source="BUGZILLA"/>
		<reference ref_id="1225590" ref_url="https://bugzilla.suse.com/1225590" source="BUGZILLA"/>
		<reference ref_id="1225591" ref_url="https://bugzilla.suse.com/1225591" source="BUGZILLA"/>
		<reference ref_id="1225592" ref_url="https://bugzilla.suse.com/1225592" source="BUGZILLA"/>
		<reference ref_id="1225593" ref_url="https://bugzilla.suse.com/1225593" source="BUGZILLA"/>
		<reference ref_id="1225595" ref_url="https://bugzilla.suse.com/1225595" source="BUGZILLA"/>
		<reference ref_id="1225599" ref_url="https://bugzilla.suse.com/1225599" source="BUGZILLA"/>
		<reference ref_id="1225616" ref_url="https://bugzilla.suse.com/1225616" source="BUGZILLA"/>
		<reference ref_id="1225640" ref_url="https://bugzilla.suse.com/1225640" source="BUGZILLA"/>
		<reference ref_id="1225642" ref_url="https://bugzilla.suse.com/1225642" source="BUGZILLA"/>
		<reference ref_id="1225705" ref_url="https://bugzilla.suse.com/1225705" source="BUGZILLA"/>
		<reference ref_id="1225708" ref_url="https://bugzilla.suse.com/1225708" source="BUGZILLA"/>
		<reference ref_id="1225715" ref_url="https://bugzilla.suse.com/1225715" source="BUGZILLA"/>
		<reference ref_id="1225720" ref_url="https://bugzilla.suse.com/1225720" source="BUGZILLA"/>
		<reference ref_id="1225722" ref_url="https://bugzilla.suse.com/1225722" source="BUGZILLA"/>
		<reference ref_id="1225734" ref_url="https://bugzilla.suse.com/1225734" source="BUGZILLA"/>
		<reference ref_id="1225735" ref_url="https://bugzilla.suse.com/1225735" source="BUGZILLA"/>
		<reference ref_id="1225747" ref_url="https://bugzilla.suse.com/1225747" source="BUGZILLA"/>
		<reference ref_id="1225748" ref_url="https://bugzilla.suse.com/1225748" source="BUGZILLA"/>
		<reference ref_id="1225756" ref_url="https://bugzilla.suse.com/1225756" source="BUGZILLA"/>
		<reference ref_id="1225761" ref_url="https://bugzilla.suse.com/1225761" source="BUGZILLA"/>
		<reference ref_id="1225766" ref_url="https://bugzilla.suse.com/1225766" source="BUGZILLA"/>
		<reference ref_id="1225775" ref_url="https://bugzilla.suse.com/1225775" source="BUGZILLA"/>
		<reference ref_id="1225810" ref_url="https://bugzilla.suse.com/1225810" source="BUGZILLA"/>
		<reference ref_id="1225820" ref_url="https://bugzilla.suse.com/1225820" source="BUGZILLA"/>
		<reference ref_id="1225829" ref_url="https://bugzilla.suse.com/1225829" source="BUGZILLA"/>
		<reference ref_id="1225835" ref_url="https://bugzilla.suse.com/1225835" source="BUGZILLA"/>
		<reference ref_id="1225842" ref_url="https://bugzilla.suse.com/1225842" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36788" ref_url="https://www.suse.com/security/cve/CVE-2020-36788/" source="CVE"/>
		<reference ref_id="CVE-2021-4148" ref_url="https://www.suse.com/security/cve/CVE-2021-4148/" source="CVE"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<reference ref_id="CVE-2021-47358" ref_url="https://www.suse.com/security/cve/CVE-2021-47358/" source="CVE"/>
		<reference ref_id="CVE-2021-47359" ref_url="https://www.suse.com/security/cve/CVE-2021-47359/" source="CVE"/>
		<reference ref_id="CVE-2021-47360" ref_url="https://www.suse.com/security/cve/CVE-2021-47360/" source="CVE"/>
		<reference ref_id="CVE-2021-47361" ref_url="https://www.suse.com/security/cve/CVE-2021-47361/" source="CVE"/>
		<reference ref_id="CVE-2021-47362" ref_url="https://www.suse.com/security/cve/CVE-2021-47362/" source="CVE"/>
		<reference ref_id="CVE-2021-47363" ref_url="https://www.suse.com/security/cve/CVE-2021-47363/" source="CVE"/>
		<reference ref_id="CVE-2021-47364" ref_url="https://www.suse.com/security/cve/CVE-2021-47364/" source="CVE"/>
		<reference ref_id="CVE-2021-47365" ref_url="https://www.suse.com/security/cve/CVE-2021-47365/" source="CVE"/>
		<reference ref_id="CVE-2021-47366" ref_url="https://www.suse.com/security/cve/CVE-2021-47366/" source="CVE"/>
		<reference ref_id="CVE-2021-47367" ref_url="https://www.suse.com/security/cve/CVE-2021-47367/" source="CVE"/>
		<reference ref_id="CVE-2021-47368" ref_url="https://www.suse.com/security/cve/CVE-2021-47368/" source="CVE"/>
		<reference ref_id="CVE-2021-47369" ref_url="https://www.suse.com/security/cve/CVE-2021-47369/" source="CVE"/>
		<reference ref_id="CVE-2021-47370" ref_url="https://www.suse.com/security/cve/CVE-2021-47370/" source="CVE"/>
		<reference ref_id="CVE-2021-47371" ref_url="https://www.suse.com/security/cve/CVE-2021-47371/" source="CVE"/>
		<reference ref_id="CVE-2021-47372" ref_url="https://www.suse.com/security/cve/CVE-2021-47372/" source="CVE"/>
		<reference ref_id="CVE-2021-47373" ref_url="https://www.suse.com/security/cve/CVE-2021-47373/" source="CVE"/>
		<reference ref_id="CVE-2021-47374" ref_url="https://www.suse.com/security/cve/CVE-2021-47374/" source="CVE"/>
		<reference ref_id="CVE-2021-47375" ref_url="https://www.suse.com/security/cve/CVE-2021-47375/" source="CVE"/>
		<reference ref_id="CVE-2021-47376" ref_url="https://www.suse.com/security/cve/CVE-2021-47376/" source="CVE"/>
		<reference ref_id="CVE-2021-47378" ref_url="https://www.suse.com/security/cve/CVE-2021-47378/" source="CVE"/>
		<reference ref_id="CVE-2021-47379" ref_url="https://www.suse.com/security/cve/CVE-2021-47379/" source="CVE"/>
		<reference ref_id="CVE-2021-47380" ref_url="https://www.suse.com/security/cve/CVE-2021-47380/" source="CVE"/>
		<reference ref_id="CVE-2021-47381" ref_url="https://www.suse.com/security/cve/CVE-2021-47381/" source="CVE"/>
		<reference ref_id="CVE-2021-47382" ref_url="https://www.suse.com/security/cve/CVE-2021-47382/" source="CVE"/>
		<reference ref_id="CVE-2021-47383" ref_url="https://www.suse.com/security/cve/CVE-2021-47383/" source="CVE"/>
		<reference ref_id="CVE-2021-47384" ref_url="https://www.suse.com/security/cve/CVE-2021-47384/" source="CVE"/>
		<reference ref_id="CVE-2021-47385" ref_url="https://www.suse.com/security/cve/CVE-2021-47385/" source="CVE"/>
		<reference ref_id="CVE-2021-47386" ref_url="https://www.suse.com/security/cve/CVE-2021-47386/" source="CVE"/>
		<reference ref_id="CVE-2021-47387" ref_url="https://www.suse.com/security/cve/CVE-2021-47387/" source="CVE"/>
		<reference ref_id="CVE-2021-47388" ref_url="https://www.suse.com/security/cve/CVE-2021-47388/" source="CVE"/>
		<reference ref_id="CVE-2021-47389" ref_url="https://www.suse.com/security/cve/CVE-2021-47389/" source="CVE"/>
		<reference ref_id="CVE-2021-47390" ref_url="https://www.suse.com/security/cve/CVE-2021-47390/" source="CVE"/>
		<reference ref_id="CVE-2021-47391" ref_url="https://www.suse.com/security/cve/CVE-2021-47391/" source="CVE"/>
		<reference ref_id="CVE-2021-47392" ref_url="https://www.suse.com/security/cve/CVE-2021-47392/" source="CVE"/>
		<reference ref_id="CVE-2021-47393" ref_url="https://www.suse.com/security/cve/CVE-2021-47393/" source="CVE"/>
		<reference ref_id="CVE-2021-47394" ref_url="https://www.suse.com/security/cve/CVE-2021-47394/" source="CVE"/>
		<reference ref_id="CVE-2021-47395" ref_url="https://www.suse.com/security/cve/CVE-2021-47395/" source="CVE"/>
		<reference ref_id="CVE-2021-47396" ref_url="https://www.suse.com/security/cve/CVE-2021-47396/" source="CVE"/>
		<reference ref_id="CVE-2021-47397" ref_url="https://www.suse.com/security/cve/CVE-2021-47397/" source="CVE"/>
		<reference ref_id="CVE-2021-47398" ref_url="https://www.suse.com/security/cve/CVE-2021-47398/" source="CVE"/>
		<reference ref_id="CVE-2021-47399" ref_url="https://www.suse.com/security/cve/CVE-2021-47399/" source="CVE"/>
		<reference ref_id="CVE-2021-47400" ref_url="https://www.suse.com/security/cve/CVE-2021-47400/" source="CVE"/>
		<reference ref_id="CVE-2021-47401" ref_url="https://www.suse.com/security/cve/CVE-2021-47401/" source="CVE"/>
		<reference ref_id="CVE-2021-47402" ref_url="https://www.suse.com/security/cve/CVE-2021-47402/" source="CVE"/>
		<reference ref_id="CVE-2021-47403" ref_url="https://www.suse.com/security/cve/CVE-2021-47403/" source="CVE"/>
		<reference ref_id="CVE-2021-47404" ref_url="https://www.suse.com/security/cve/CVE-2021-47404/" source="CVE"/>
		<reference ref_id="CVE-2021-47405" ref_url="https://www.suse.com/security/cve/CVE-2021-47405/" source="CVE"/>
		<reference ref_id="CVE-2021-47406" ref_url="https://www.suse.com/security/cve/CVE-2021-47406/" source="CVE"/>
		<reference ref_id="CVE-2021-47407" ref_url="https://www.suse.com/security/cve/CVE-2021-47407/" source="CVE"/>
		<reference ref_id="CVE-2021-47408" ref_url="https://www.suse.com/security/cve/CVE-2021-47408/" source="CVE"/>
		<reference ref_id="CVE-2021-47409" ref_url="https://www.suse.com/security/cve/CVE-2021-47409/" source="CVE"/>
		<reference ref_id="CVE-2021-47410" ref_url="https://www.suse.com/security/cve/CVE-2021-47410/" source="CVE"/>
		<reference ref_id="CVE-2021-47412" ref_url="https://www.suse.com/security/cve/CVE-2021-47412/" source="CVE"/>
		<reference ref_id="CVE-2021-47413" ref_url="https://www.suse.com/security/cve/CVE-2021-47413/" source="CVE"/>
		<reference ref_id="CVE-2021-47414" ref_url="https://www.suse.com/security/cve/CVE-2021-47414/" source="CVE"/>
		<reference ref_id="CVE-2021-47415" ref_url="https://www.suse.com/security/cve/CVE-2021-47415/" source="CVE"/>
		<reference ref_id="CVE-2021-47416" ref_url="https://www.suse.com/security/cve/CVE-2021-47416/" source="CVE"/>
		<reference ref_id="CVE-2021-47417" ref_url="https://www.suse.com/security/cve/CVE-2021-47417/" source="CVE"/>
		<reference ref_id="CVE-2021-47418" ref_url="https://www.suse.com/security/cve/CVE-2021-47418/" source="CVE"/>
		<reference ref_id="CVE-2021-47419" ref_url="https://www.suse.com/security/cve/CVE-2021-47419/" source="CVE"/>
		<reference ref_id="CVE-2021-47420" ref_url="https://www.suse.com/security/cve/CVE-2021-47420/" source="CVE"/>
		<reference ref_id="CVE-2021-47421" ref_url="https://www.suse.com/security/cve/CVE-2021-47421/" source="CVE"/>
		<reference ref_id="CVE-2021-47422" ref_url="https://www.suse.com/security/cve/CVE-2021-47422/" source="CVE"/>
		<reference ref_id="CVE-2021-47423" ref_url="https://www.suse.com/security/cve/CVE-2021-47423/" source="CVE"/>
		<reference ref_id="CVE-2021-47424" ref_url="https://www.suse.com/security/cve/CVE-2021-47424/" source="CVE"/>
		<reference ref_id="CVE-2021-47425" ref_url="https://www.suse.com/security/cve/CVE-2021-47425/" source="CVE"/>
		<reference ref_id="CVE-2021-47426" ref_url="https://www.suse.com/security/cve/CVE-2021-47426/" source="CVE"/>
		<reference ref_id="CVE-2021-47427" ref_url="https://www.suse.com/security/cve/CVE-2021-47427/" source="CVE"/>
		<reference ref_id="CVE-2021-47428" ref_url="https://www.suse.com/security/cve/CVE-2021-47428/" source="CVE"/>
		<reference ref_id="CVE-2021-47429" ref_url="https://www.suse.com/security/cve/CVE-2021-47429/" source="CVE"/>
		<reference ref_id="CVE-2021-47430" ref_url="https://www.suse.com/security/cve/CVE-2021-47430/" source="CVE"/>
		<reference ref_id="CVE-2021-47431" ref_url="https://www.suse.com/security/cve/CVE-2021-47431/" source="CVE"/>
		<reference ref_id="CVE-2021-47433" ref_url="https://www.suse.com/security/cve/CVE-2021-47433/" source="CVE"/>
		<reference ref_id="CVE-2021-47434" ref_url="https://www.suse.com/security/cve/CVE-2021-47434/" source="CVE"/>
		<reference ref_id="CVE-2021-47435" ref_url="https://www.suse.com/security/cve/CVE-2021-47435/" source="CVE"/>
		<reference ref_id="CVE-2021-47436" ref_url="https://www.suse.com/security/cve/CVE-2021-47436/" source="CVE"/>
		<reference ref_id="CVE-2021-47437" ref_url="https://www.suse.com/security/cve/CVE-2021-47437/" source="CVE"/>
		<reference ref_id="CVE-2021-47438" ref_url="https://www.suse.com/security/cve/CVE-2021-47438/" source="CVE"/>
		<reference ref_id="CVE-2021-47439" ref_url="https://www.suse.com/security/cve/CVE-2021-47439/" source="CVE"/>
		<reference ref_id="CVE-2021-47440" ref_url="https://www.suse.com/security/cve/CVE-2021-47440/" source="CVE"/>
		<reference ref_id="CVE-2021-47441" ref_url="https://www.suse.com/security/cve/CVE-2021-47441/" source="CVE"/>
		<reference ref_id="CVE-2021-47442" ref_url="https://www.suse.com/security/cve/CVE-2021-47442/" source="CVE"/>
		<reference ref_id="CVE-2021-47443" ref_url="https://www.suse.com/security/cve/CVE-2021-47443/" source="CVE"/>
		<reference ref_id="CVE-2021-47444" ref_url="https://www.suse.com/security/cve/CVE-2021-47444/" source="CVE"/>
		<reference ref_id="CVE-2021-47445" ref_url="https://www.suse.com/security/cve/CVE-2021-47445/" source="CVE"/>
		<reference ref_id="CVE-2021-47446" ref_url="https://www.suse.com/security/cve/CVE-2021-47446/" source="CVE"/>
		<reference ref_id="CVE-2021-47447" ref_url="https://www.suse.com/security/cve/CVE-2021-47447/" source="CVE"/>
		<reference ref_id="CVE-2021-47448" ref_url="https://www.suse.com/security/cve/CVE-2021-47448/" source="CVE"/>
		<reference ref_id="CVE-2021-47449" ref_url="https://www.suse.com/security/cve/CVE-2021-47449/" source="CVE"/>
		<reference ref_id="CVE-2021-47450" ref_url="https://www.suse.com/security/cve/CVE-2021-47450/" source="CVE"/>
		<reference ref_id="CVE-2021-47451" ref_url="https://www.suse.com/security/cve/CVE-2021-47451/" source="CVE"/>
		<reference ref_id="CVE-2021-47452" ref_url="https://www.suse.com/security/cve/CVE-2021-47452/" source="CVE"/>
		<reference ref_id="CVE-2021-47453" ref_url="https://www.suse.com/security/cve/CVE-2021-47453/" source="CVE"/>
		<reference ref_id="CVE-2021-47454" ref_url="https://www.suse.com/security/cve/CVE-2021-47454/" source="CVE"/>
		<reference ref_id="CVE-2021-47455" ref_url="https://www.suse.com/security/cve/CVE-2021-47455/" source="CVE"/>
		<reference ref_id="CVE-2021-47456" ref_url="https://www.suse.com/security/cve/CVE-2021-47456/" source="CVE"/>
		<reference ref_id="CVE-2021-47457" ref_url="https://www.suse.com/security/cve/CVE-2021-47457/" source="CVE"/>
		<reference ref_id="CVE-2021-47458" ref_url="https://www.suse.com/security/cve/CVE-2021-47458/" source="CVE"/>
		<reference ref_id="CVE-2021-47459" ref_url="https://www.suse.com/security/cve/CVE-2021-47459/" source="CVE"/>
		<reference ref_id="CVE-2021-47460" ref_url="https://www.suse.com/security/cve/CVE-2021-47460/" source="CVE"/>
		<reference ref_id="CVE-2021-47461" ref_url="https://www.suse.com/security/cve/CVE-2021-47461/" source="CVE"/>
		<reference ref_id="CVE-2021-47462" ref_url="https://www.suse.com/security/cve/CVE-2021-47462/" source="CVE"/>
		<reference ref_id="CVE-2021-47463" ref_url="https://www.suse.com/security/cve/CVE-2021-47463/" source="CVE"/>
		<reference ref_id="CVE-2021-47464" ref_url="https://www.suse.com/security/cve/CVE-2021-47464/" source="CVE"/>
		<reference ref_id="CVE-2021-47465" ref_url="https://www.suse.com/security/cve/CVE-2021-47465/" source="CVE"/>
		<reference ref_id="CVE-2021-47466" ref_url="https://www.suse.com/security/cve/CVE-2021-47466/" source="CVE"/>
		<reference ref_id="CVE-2021-47467" ref_url="https://www.suse.com/security/cve/CVE-2021-47467/" source="CVE"/>
		<reference ref_id="CVE-2021-47468" ref_url="https://www.suse.com/security/cve/CVE-2021-47468/" source="CVE"/>
		<reference ref_id="CVE-2021-47469" ref_url="https://www.suse.com/security/cve/CVE-2021-47469/" source="CVE"/>
		<reference ref_id="CVE-2021-47470" ref_url="https://www.suse.com/security/cve/CVE-2021-47470/" source="CVE"/>
		<reference ref_id="CVE-2021-47471" ref_url="https://www.suse.com/security/cve/CVE-2021-47471/" source="CVE"/>
		<reference ref_id="CVE-2021-47472" ref_url="https://www.suse.com/security/cve/CVE-2021-47472/" source="CVE"/>
		<reference ref_id="CVE-2021-47473" ref_url="https://www.suse.com/security/cve/CVE-2021-47473/" source="CVE"/>
		<reference ref_id="CVE-2021-47474" ref_url="https://www.suse.com/security/cve/CVE-2021-47474/" source="CVE"/>
		<reference ref_id="CVE-2021-47475" ref_url="https://www.suse.com/security/cve/CVE-2021-47475/" source="CVE"/>
		<reference ref_id="CVE-2021-47476" ref_url="https://www.suse.com/security/cve/CVE-2021-47476/" source="CVE"/>
		<reference ref_id="CVE-2021-47477" ref_url="https://www.suse.com/security/cve/CVE-2021-47477/" source="CVE"/>
		<reference ref_id="CVE-2021-47478" ref_url="https://www.suse.com/security/cve/CVE-2021-47478/" source="CVE"/>
		<reference ref_id="CVE-2021-47479" ref_url="https://www.suse.com/security/cve/CVE-2021-47479/" source="CVE"/>
		<reference ref_id="CVE-2021-47480" ref_url="https://www.suse.com/security/cve/CVE-2021-47480/" source="CVE"/>
		<reference ref_id="CVE-2021-47481" ref_url="https://www.suse.com/security/cve/CVE-2021-47481/" source="CVE"/>
		<reference ref_id="CVE-2021-47482" ref_url="https://www.suse.com/security/cve/CVE-2021-47482/" source="CVE"/>
		<reference ref_id="CVE-2021-47483" ref_url="https://www.suse.com/security/cve/CVE-2021-47483/" source="CVE"/>
		<reference ref_id="CVE-2021-47484" ref_url="https://www.suse.com/security/cve/CVE-2021-47484/" source="CVE"/>
		<reference ref_id="CVE-2021-47485" ref_url="https://www.suse.com/security/cve/CVE-2021-47485/" source="CVE"/>
		<reference ref_id="CVE-2021-47486" ref_url="https://www.suse.com/security/cve/CVE-2021-47486/" source="CVE"/>
		<reference ref_id="CVE-2021-47488" ref_url="https://www.suse.com/security/cve/CVE-2021-47488/" source="CVE"/>
		<reference ref_id="CVE-2021-47489" ref_url="https://www.suse.com/security/cve/CVE-2021-47489/" source="CVE"/>
		<reference ref_id="CVE-2021-47490" ref_url="https://www.suse.com/security/cve/CVE-2021-47490/" source="CVE"/>
		<reference ref_id="CVE-2021-47491" ref_url="https://www.suse.com/security/cve/CVE-2021-47491/" source="CVE"/>
		<reference ref_id="CVE-2021-47492" ref_url="https://www.suse.com/security/cve/CVE-2021-47492/" source="CVE"/>
		<reference ref_id="CVE-2021-47493" ref_url="https://www.suse.com/security/cve/CVE-2021-47493/" source="CVE"/>
		<reference ref_id="CVE-2021-47494" ref_url="https://www.suse.com/security/cve/CVE-2021-47494/" source="CVE"/>
		<reference ref_id="CVE-2021-47495" ref_url="https://www.suse.com/security/cve/CVE-2021-47495/" source="CVE"/>
		<reference ref_id="CVE-2021-47496" ref_url="https://www.suse.com/security/cve/CVE-2021-47496/" source="CVE"/>
		<reference ref_id="CVE-2021-47497" ref_url="https://www.suse.com/security/cve/CVE-2021-47497/" source="CVE"/>
		<reference ref_id="CVE-2021-47498" ref_url="https://www.suse.com/security/cve/CVE-2021-47498/" source="CVE"/>
		<reference ref_id="CVE-2021-47499" ref_url="https://www.suse.com/security/cve/CVE-2021-47499/" source="CVE"/>
		<reference ref_id="CVE-2021-47500" ref_url="https://www.suse.com/security/cve/CVE-2021-47500/" source="CVE"/>
		<reference ref_id="CVE-2021-47501" ref_url="https://www.suse.com/security/cve/CVE-2021-47501/" source="CVE"/>
		<reference ref_id="CVE-2021-47502" ref_url="https://www.suse.com/security/cve/CVE-2021-47502/" source="CVE"/>
		<reference ref_id="CVE-2021-47503" ref_url="https://www.suse.com/security/cve/CVE-2021-47503/" source="CVE"/>
		<reference ref_id="CVE-2021-47504" ref_url="https://www.suse.com/security/cve/CVE-2021-47504/" source="CVE"/>
		<reference ref_id="CVE-2021-47505" ref_url="https://www.suse.com/security/cve/CVE-2021-47505/" source="CVE"/>
		<reference ref_id="CVE-2021-47506" ref_url="https://www.suse.com/security/cve/CVE-2021-47506/" source="CVE"/>
		<reference ref_id="CVE-2021-47507" ref_url="https://www.suse.com/security/cve/CVE-2021-47507/" source="CVE"/>
		<reference ref_id="CVE-2021-47508" ref_url="https://www.suse.com/security/cve/CVE-2021-47508/" source="CVE"/>
		<reference ref_id="CVE-2021-47509" ref_url="https://www.suse.com/security/cve/CVE-2021-47509/" source="CVE"/>
		<reference ref_id="CVE-2021-47510" ref_url="https://www.suse.com/security/cve/CVE-2021-47510/" source="CVE"/>
		<reference ref_id="CVE-2021-47511" ref_url="https://www.suse.com/security/cve/CVE-2021-47511/" source="CVE"/>
		<reference ref_id="CVE-2021-47512" ref_url="https://www.suse.com/security/cve/CVE-2021-47512/" source="CVE"/>
		<reference ref_id="CVE-2021-47513" ref_url="https://www.suse.com/security/cve/CVE-2021-47513/" source="CVE"/>
		<reference ref_id="CVE-2021-47514" ref_url="https://www.suse.com/security/cve/CVE-2021-47514/" source="CVE"/>
		<reference ref_id="CVE-2021-47516" ref_url="https://www.suse.com/security/cve/CVE-2021-47516/" source="CVE"/>
		<reference ref_id="CVE-2021-47518" ref_url="https://www.suse.com/security/cve/CVE-2021-47518/" source="CVE"/>
		<reference ref_id="CVE-2021-47520" ref_url="https://www.suse.com/security/cve/CVE-2021-47520/" source="CVE"/>
		<reference ref_id="CVE-2021-47521" ref_url="https://www.suse.com/security/cve/CVE-2021-47521/" source="CVE"/>
		<reference ref_id="CVE-2021-47522" ref_url="https://www.suse.com/security/cve/CVE-2021-47522/" source="CVE"/>
		<reference ref_id="CVE-2021-47523" ref_url="https://www.suse.com/security/cve/CVE-2021-47523/" source="CVE"/>
		<reference ref_id="CVE-2021-47524" ref_url="https://www.suse.com/security/cve/CVE-2021-47524/" source="CVE"/>
		<reference ref_id="CVE-2021-47525" ref_url="https://www.suse.com/security/cve/CVE-2021-47525/" source="CVE"/>
		<reference ref_id="CVE-2021-47526" ref_url="https://www.suse.com/security/cve/CVE-2021-47526/" source="CVE"/>
		<reference ref_id="CVE-2021-47528" ref_url="https://www.suse.com/security/cve/CVE-2021-47528/" source="CVE"/>
		<reference ref_id="CVE-2021-47529" ref_url="https://www.suse.com/security/cve/CVE-2021-47529/" source="CVE"/>
		<reference ref_id="CVE-2021-47530" ref_url="https://www.suse.com/security/cve/CVE-2021-47530/" source="CVE"/>
		<reference ref_id="CVE-2021-47531" ref_url="https://www.suse.com/security/cve/CVE-2021-47531/" source="CVE"/>
		<reference ref_id="CVE-2021-47532" ref_url="https://www.suse.com/security/cve/CVE-2021-47532/" source="CVE"/>
		<reference ref_id="CVE-2021-47533" ref_url="https://www.suse.com/security/cve/CVE-2021-47533/" source="CVE"/>
		<reference ref_id="CVE-2021-47534" ref_url="https://www.suse.com/security/cve/CVE-2021-47534/" source="CVE"/>
		<reference ref_id="CVE-2021-47535" ref_url="https://www.suse.com/security/cve/CVE-2021-47535/" source="CVE"/>
		<reference ref_id="CVE-2021-47536" ref_url="https://www.suse.com/security/cve/CVE-2021-47536/" source="CVE"/>
		<reference ref_id="CVE-2021-47537" ref_url="https://www.suse.com/security/cve/CVE-2021-47537/" source="CVE"/>
		<reference ref_id="CVE-2021-47540" ref_url="https://www.suse.com/security/cve/CVE-2021-47540/" source="CVE"/>
		<reference ref_id="CVE-2021-47541" ref_url="https://www.suse.com/security/cve/CVE-2021-47541/" source="CVE"/>
		<reference ref_id="CVE-2021-47542" ref_url="https://www.suse.com/security/cve/CVE-2021-47542/" source="CVE"/>
		<reference ref_id="CVE-2021-47544" ref_url="https://www.suse.com/security/cve/CVE-2021-47544/" source="CVE"/>
		<reference ref_id="CVE-2021-47548" ref_url="https://www.suse.com/security/cve/CVE-2021-47548/" source="CVE"/>
		<reference ref_id="CVE-2021-47549" ref_url="https://www.suse.com/security/cve/CVE-2021-47549/" source="CVE"/>
		<reference ref_id="CVE-2021-47550" ref_url="https://www.suse.com/security/cve/CVE-2021-47550/" source="CVE"/>
		<reference ref_id="CVE-2021-47551" ref_url="https://www.suse.com/security/cve/CVE-2021-47551/" source="CVE"/>
		<reference ref_id="CVE-2021-47552" ref_url="https://www.suse.com/security/cve/CVE-2021-47552/" source="CVE"/>
		<reference ref_id="CVE-2021-47553" ref_url="https://www.suse.com/security/cve/CVE-2021-47553/" source="CVE"/>
		<reference ref_id="CVE-2021-47554" ref_url="https://www.suse.com/security/cve/CVE-2021-47554/" source="CVE"/>
		<reference ref_id="CVE-2021-47555" ref_url="https://www.suse.com/security/cve/CVE-2021-47555/" source="CVE"/>
		<reference ref_id="CVE-2021-47556" ref_url="https://www.suse.com/security/cve/CVE-2021-47556/" source="CVE"/>
		<reference ref_id="CVE-2021-47557" ref_url="https://www.suse.com/security/cve/CVE-2021-47557/" source="CVE"/>
		<reference ref_id="CVE-2021-47558" ref_url="https://www.suse.com/security/cve/CVE-2021-47558/" source="CVE"/>
		<reference ref_id="CVE-2021-47559" ref_url="https://www.suse.com/security/cve/CVE-2021-47559/" source="CVE"/>
		<reference ref_id="CVE-2021-47560" ref_url="https://www.suse.com/security/cve/CVE-2021-47560/" source="CVE"/>
		<reference ref_id="CVE-2021-47562" ref_url="https://www.suse.com/security/cve/CVE-2021-47562/" source="CVE"/>
		<reference ref_id="CVE-2021-47563" ref_url="https://www.suse.com/security/cve/CVE-2021-47563/" source="CVE"/>
		<reference ref_id="CVE-2021-47564" ref_url="https://www.suse.com/security/cve/CVE-2021-47564/" source="CVE"/>
		<reference ref_id="CVE-2021-47565" ref_url="https://www.suse.com/security/cve/CVE-2021-47565/" source="CVE"/>
		<reference ref_id="CVE-2021-47569" ref_url="https://www.suse.com/security/cve/CVE-2021-47569/" source="CVE"/>
		<reference ref_id="CVE-2022-48633" ref_url="https://www.suse.com/security/cve/CVE-2022-48633/" source="CVE"/>
		<reference ref_id="CVE-2022-48662" ref_url="https://www.suse.com/security/cve/CVE-2022-48662/" source="CVE"/>
		<reference ref_id="CVE-2022-48669" ref_url="https://www.suse.com/security/cve/CVE-2022-48669/" source="CVE"/>
		<reference ref_id="CVE-2022-48689" ref_url="https://www.suse.com/security/cve/CVE-2022-48689/" source="CVE"/>
		<reference ref_id="CVE-2022-48691" ref_url="https://www.suse.com/security/cve/CVE-2022-48691/" source="CVE"/>
		<reference ref_id="CVE-2022-48699" ref_url="https://www.suse.com/security/cve/CVE-2022-48699/" source="CVE"/>
		<reference ref_id="CVE-2022-48705" ref_url="https://www.suse.com/security/cve/CVE-2022-48705/" source="CVE"/>
		<reference ref_id="CVE-2022-48708" ref_url="https://www.suse.com/security/cve/CVE-2022-48708/" source="CVE"/>
		<reference ref_id="CVE-2022-48709" ref_url="https://www.suse.com/security/cve/CVE-2022-48709/" source="CVE"/>
		<reference ref_id="CVE-2022-48710" ref_url="https://www.suse.com/security/cve/CVE-2022-48710/" source="CVE"/>
		<reference ref_id="CVE-2023-0160" ref_url="https://www.suse.com/security/cve/CVE-2023-0160/" source="CVE"/>
		<reference ref_id="CVE-2023-1829" ref_url="https://www.suse.com/security/cve/CVE-2023-1829/" source="CVE"/>
		<reference ref_id="CVE-2023-42755" ref_url="https://www.suse.com/security/cve/CVE-2023-42755/" source="CVE"/>
		<reference ref_id="CVE-2023-47233" ref_url="https://www.suse.com/security/cve/CVE-2023-47233/" source="CVE"/>
		<reference ref_id="CVE-2023-52586" ref_url="https://www.suse.com/security/cve/CVE-2023-52586/" source="CVE"/>
		<reference ref_id="CVE-2023-52591" ref_url="https://www.suse.com/security/cve/CVE-2023-52591/" source="CVE"/>
		<reference ref_id="CVE-2023-52618" ref_url="https://www.suse.com/security/cve/CVE-2023-52618/" source="CVE"/>
		<reference ref_id="CVE-2023-52642" ref_url="https://www.suse.com/security/cve/CVE-2023-52642/" source="CVE"/>
		<reference ref_id="CVE-2023-52643" ref_url="https://www.suse.com/security/cve/CVE-2023-52643/" source="CVE"/>
		<reference ref_id="CVE-2023-52644" ref_url="https://www.suse.com/security/cve/CVE-2023-52644/" source="CVE"/>
		<reference ref_id="CVE-2023-52646" ref_url="https://www.suse.com/security/cve/CVE-2023-52646/" source="CVE"/>
		<reference ref_id="CVE-2023-52650" ref_url="https://www.suse.com/security/cve/CVE-2023-52650/" source="CVE"/>
		<reference ref_id="CVE-2023-52653" ref_url="https://www.suse.com/security/cve/CVE-2023-52653/" source="CVE"/>
		<reference ref_id="CVE-2023-52654" ref_url="https://www.suse.com/security/cve/CVE-2023-52654/" source="CVE"/>
		<reference ref_id="CVE-2023-52655" ref_url="https://www.suse.com/security/cve/CVE-2023-52655/" source="CVE"/>
		<reference ref_id="CVE-2023-52656" ref_url="https://www.suse.com/security/cve/CVE-2023-52656/" source="CVE"/>
		<reference ref_id="CVE-2023-52657" ref_url="https://www.suse.com/security/cve/CVE-2023-52657/" source="CVE"/>
		<reference ref_id="CVE-2023-52659" ref_url="https://www.suse.com/security/cve/CVE-2023-52659/" source="CVE"/>
		<reference ref_id="CVE-2023-52660" ref_url="https://www.suse.com/security/cve/CVE-2023-52660/" source="CVE"/>
		<reference ref_id="CVE-2023-52661" ref_url="https://www.suse.com/security/cve/CVE-2023-52661/" source="CVE"/>
		<reference ref_id="CVE-2023-52662" ref_url="https://www.suse.com/security/cve/CVE-2023-52662/" source="CVE"/>
		<reference ref_id="CVE-2023-52664" ref_url="https://www.suse.com/security/cve/CVE-2023-52664/" source="CVE"/>
		<reference ref_id="CVE-2023-52669" ref_url="https://www.suse.com/security/cve/CVE-2023-52669/" source="CVE"/>
		<reference ref_id="CVE-2023-52671" ref_url="https://www.suse.com/security/cve/CVE-2023-52671/" source="CVE"/>
		<reference ref_id="CVE-2023-52674" ref_url="https://www.suse.com/security/cve/CVE-2023-52674/" source="CVE"/>
		<reference ref_id="CVE-2023-52676" ref_url="https://www.suse.com/security/cve/CVE-2023-52676/" source="CVE"/>
		<reference ref_id="CVE-2023-52678" ref_url="https://www.suse.com/security/cve/CVE-2023-52678/" source="CVE"/>
		<reference ref_id="CVE-2023-52679" ref_url="https://www.suse.com/security/cve/CVE-2023-52679/" source="CVE"/>
		<reference ref_id="CVE-2023-52680" ref_url="https://www.suse.com/security/cve/CVE-2023-52680/" source="CVE"/>
		<reference ref_id="CVE-2023-52683" ref_url="https://www.suse.com/security/cve/CVE-2023-52683/" source="CVE"/>
		<reference ref_id="CVE-2023-52685" ref_url="https://www.suse.com/security/cve/CVE-2023-52685/" source="CVE"/>
		<reference ref_id="CVE-2023-52686" ref_url="https://www.suse.com/security/cve/CVE-2023-52686/" source="CVE"/>
		<reference ref_id="CVE-2023-52690" ref_url="https://www.suse.com/security/cve/CVE-2023-52690/" source="CVE"/>
		<reference ref_id="CVE-2023-52691" ref_url="https://www.suse.com/security/cve/CVE-2023-52691/" source="CVE"/>
		<reference ref_id="CVE-2023-52692" ref_url="https://www.suse.com/security/cve/CVE-2023-52692/" source="CVE"/>
		<reference ref_id="CVE-2023-52693" ref_url="https://www.suse.com/security/cve/CVE-2023-52693/" source="CVE"/>
		<reference ref_id="CVE-2023-52694" ref_url="https://www.suse.com/security/cve/CVE-2023-52694/" source="CVE"/>
		<reference ref_id="CVE-2023-52696" ref_url="https://www.suse.com/security/cve/CVE-2023-52696/" source="CVE"/>
		<reference ref_id="CVE-2023-52698" ref_url="https://www.suse.com/security/cve/CVE-2023-52698/" source="CVE"/>
		<reference ref_id="CVE-2023-52699" ref_url="https://www.suse.com/security/cve/CVE-2023-52699/" source="CVE"/>
		<reference ref_id="CVE-2023-52702" ref_url="https://www.suse.com/security/cve/CVE-2023-52702/" source="CVE"/>
		<reference ref_id="CVE-2023-52703" ref_url="https://www.suse.com/security/cve/CVE-2023-52703/" source="CVE"/>
		<reference ref_id="CVE-2023-52705" ref_url="https://www.suse.com/security/cve/CVE-2023-52705/" source="CVE"/>
		<reference ref_id="CVE-2023-52707" ref_url="https://www.suse.com/security/cve/CVE-2023-52707/" source="CVE"/>
		<reference ref_id="CVE-2023-52708" ref_url="https://www.suse.com/security/cve/CVE-2023-52708/" source="CVE"/>
		<reference ref_id="CVE-2023-52730" ref_url="https://www.suse.com/security/cve/CVE-2023-52730/" source="CVE"/>
		<reference ref_id="CVE-2023-52731" ref_url="https://www.suse.com/security/cve/CVE-2023-52731/" source="CVE"/>
		<reference ref_id="CVE-2023-52732" ref_url="https://www.suse.com/security/cve/CVE-2023-52732/" source="CVE"/>
		<reference ref_id="CVE-2023-52733" ref_url="https://www.suse.com/security/cve/CVE-2023-52733/" source="CVE"/>
		<reference ref_id="CVE-2023-52736" ref_url="https://www.suse.com/security/cve/CVE-2023-52736/" source="CVE"/>
		<reference ref_id="CVE-2023-52738" ref_url="https://www.suse.com/security/cve/CVE-2023-52738/" source="CVE"/>
		<reference ref_id="CVE-2023-52739" ref_url="https://www.suse.com/security/cve/CVE-2023-52739/" source="CVE"/>
		<reference ref_id="CVE-2023-52740" ref_url="https://www.suse.com/security/cve/CVE-2023-52740/" source="CVE"/>
		<reference ref_id="CVE-2023-52741" ref_url="https://www.suse.com/security/cve/CVE-2023-52741/" source="CVE"/>
		<reference ref_id="CVE-2023-52742" ref_url="https://www.suse.com/security/cve/CVE-2023-52742/" source="CVE"/>
		<reference ref_id="CVE-2023-52743" ref_url="https://www.suse.com/security/cve/CVE-2023-52743/" source="CVE"/>
		<reference ref_id="CVE-2023-52744" ref_url="https://www.suse.com/security/cve/CVE-2023-52744/" source="CVE"/>
		<reference ref_id="CVE-2023-52745" ref_url="https://www.suse.com/security/cve/CVE-2023-52745/" source="CVE"/>
		<reference ref_id="CVE-2023-52746" ref_url="https://www.suse.com/security/cve/CVE-2023-52746/" source="CVE"/>
		<reference ref_id="CVE-2023-52747" ref_url="https://www.suse.com/security/cve/CVE-2023-52747/" source="CVE"/>
		<reference ref_id="CVE-2023-52753" ref_url="https://www.suse.com/security/cve/CVE-2023-52753/" source="CVE"/>
		<reference ref_id="CVE-2023-52754" ref_url="https://www.suse.com/security/cve/CVE-2023-52754/" source="CVE"/>
		<reference ref_id="CVE-2023-52756" ref_url="https://www.suse.com/security/cve/CVE-2023-52756/" source="CVE"/>
		<reference ref_id="CVE-2023-52757" ref_url="https://www.suse.com/security/cve/CVE-2023-52757/" source="CVE"/>
		<reference ref_id="CVE-2023-52759" ref_url="https://www.suse.com/security/cve/CVE-2023-52759/" source="CVE"/>
		<reference ref_id="CVE-2023-52763" ref_url="https://www.suse.com/security/cve/CVE-2023-52763/" source="CVE"/>
		<reference ref_id="CVE-2023-52764" ref_url="https://www.suse.com/security/cve/CVE-2023-52764/" source="CVE"/>
		<reference ref_id="CVE-2023-52766" ref_url="https://www.suse.com/security/cve/CVE-2023-52766/" source="CVE"/>
		<reference ref_id="CVE-2023-52773" ref_url="https://www.suse.com/security/cve/CVE-2023-52773/" source="CVE"/>
		<reference ref_id="CVE-2023-52774" ref_url="https://www.suse.com/security/cve/CVE-2023-52774/" source="CVE"/>
		<reference ref_id="CVE-2023-52777" ref_url="https://www.suse.com/security/cve/CVE-2023-52777/" source="CVE"/>
		<reference ref_id="CVE-2023-52781" ref_url="https://www.suse.com/security/cve/CVE-2023-52781/" source="CVE"/>
		<reference ref_id="CVE-2023-52788" ref_url="https://www.suse.com/security/cve/CVE-2023-52788/" source="CVE"/>
		<reference ref_id="CVE-2023-52789" ref_url="https://www.suse.com/security/cve/CVE-2023-52789/" source="CVE"/>
		<reference ref_id="CVE-2023-52791" ref_url="https://www.suse.com/security/cve/CVE-2023-52791/" source="CVE"/>
		<reference ref_id="CVE-2023-52795" ref_url="https://www.suse.com/security/cve/CVE-2023-52795/" source="CVE"/>
		<reference ref_id="CVE-2023-52796" ref_url="https://www.suse.com/security/cve/CVE-2023-52796/" source="CVE"/>
		<reference ref_id="CVE-2023-52798" ref_url="https://www.suse.com/security/cve/CVE-2023-52798/" source="CVE"/>
		<reference ref_id="CVE-2023-52799" ref_url="https://www.suse.com/security/cve/CVE-2023-52799/" source="CVE"/>
		<reference ref_id="CVE-2023-52800" ref_url="https://www.suse.com/security/cve/CVE-2023-52800/" source="CVE"/>
		<reference ref_id="CVE-2023-52803" ref_url="https://www.suse.com/security/cve/CVE-2023-52803/" source="CVE"/>
		<reference ref_id="CVE-2023-52804" ref_url="https://www.suse.com/security/cve/CVE-2023-52804/" source="CVE"/>
		<reference ref_id="CVE-2023-52805" ref_url="https://www.suse.com/security/cve/CVE-2023-52805/" source="CVE"/>
		<reference ref_id="CVE-2023-52806" ref_url="https://www.suse.com/security/cve/CVE-2023-52806/" source="CVE"/>
		<reference ref_id="CVE-2023-52807" ref_url="https://www.suse.com/security/cve/CVE-2023-52807/" source="CVE"/>
		<reference ref_id="CVE-2023-52808" ref_url="https://www.suse.com/security/cve/CVE-2023-52808/" source="CVE"/>
		<reference ref_id="CVE-2023-52809" ref_url="https://www.suse.com/security/cve/CVE-2023-52809/" source="CVE"/>
		<reference ref_id="CVE-2023-52810" ref_url="https://www.suse.com/security/cve/CVE-2023-52810/" source="CVE"/>
		<reference ref_id="CVE-2023-52811" ref_url="https://www.suse.com/security/cve/CVE-2023-52811/" source="CVE"/>
		<reference ref_id="CVE-2023-52814" ref_url="https://www.suse.com/security/cve/CVE-2023-52814/" source="CVE"/>
		<reference ref_id="CVE-2023-52815" ref_url="https://www.suse.com/security/cve/CVE-2023-52815/" source="CVE"/>
		<reference ref_id="CVE-2023-52816" ref_url="https://www.suse.com/security/cve/CVE-2023-52816/" source="CVE"/>
		<reference ref_id="CVE-2023-52817" ref_url="https://www.suse.com/security/cve/CVE-2023-52817/" source="CVE"/>
		<reference ref_id="CVE-2023-52818" ref_url="https://www.suse.com/security/cve/CVE-2023-52818/" source="CVE"/>
		<reference ref_id="CVE-2023-52819" ref_url="https://www.suse.com/security/cve/CVE-2023-52819/" source="CVE"/>
		<reference ref_id="CVE-2023-52821" ref_url="https://www.suse.com/security/cve/CVE-2023-52821/" source="CVE"/>
		<reference ref_id="CVE-2023-52825" ref_url="https://www.suse.com/security/cve/CVE-2023-52825/" source="CVE"/>
		<reference ref_id="CVE-2023-52826" ref_url="https://www.suse.com/security/cve/CVE-2023-52826/" source="CVE"/>
		<reference ref_id="CVE-2023-52832" ref_url="https://www.suse.com/security/cve/CVE-2023-52832/" source="CVE"/>
		<reference ref_id="CVE-2023-52833" ref_url="https://www.suse.com/security/cve/CVE-2023-52833/" source="CVE"/>
		<reference ref_id="CVE-2023-52834" ref_url="https://www.suse.com/security/cve/CVE-2023-52834/" source="CVE"/>
		<reference ref_id="CVE-2023-52838" ref_url="https://www.suse.com/security/cve/CVE-2023-52838/" source="CVE"/>
		<reference ref_id="CVE-2023-52840" ref_url="https://www.suse.com/security/cve/CVE-2023-52840/" source="CVE"/>
		<reference ref_id="CVE-2023-52841" ref_url="https://www.suse.com/security/cve/CVE-2023-52841/" source="CVE"/>
		<reference ref_id="CVE-2023-52844" ref_url="https://www.suse.com/security/cve/CVE-2023-52844/" source="CVE"/>
		<reference ref_id="CVE-2023-52847" ref_url="https://www.suse.com/security/cve/CVE-2023-52847/" source="CVE"/>
		<reference ref_id="CVE-2023-52851" ref_url="https://www.suse.com/security/cve/CVE-2023-52851/" source="CVE"/>
		<reference ref_id="CVE-2023-52853" ref_url="https://www.suse.com/security/cve/CVE-2023-52853/" source="CVE"/>
		<reference ref_id="CVE-2023-52854" ref_url="https://www.suse.com/security/cve/CVE-2023-52854/" source="CVE"/>
		<reference ref_id="CVE-2023-52855" ref_url="https://www.suse.com/security/cve/CVE-2023-52855/" source="CVE"/>
		<reference ref_id="CVE-2023-52856" ref_url="https://www.suse.com/security/cve/CVE-2023-52856/" source="CVE"/>
		<reference ref_id="CVE-2023-52858" ref_url="https://www.suse.com/security/cve/CVE-2023-52858/" source="CVE"/>
		<reference ref_id="CVE-2023-52860" ref_url="https://www.suse.com/security/cve/CVE-2023-52860/" source="CVE"/>
		<reference ref_id="CVE-2023-52861" ref_url="https://www.suse.com/security/cve/CVE-2023-52861/" source="CVE"/>
		<reference ref_id="CVE-2023-52864" ref_url="https://www.suse.com/security/cve/CVE-2023-52864/" source="CVE"/>
		<reference ref_id="CVE-2023-52865" ref_url="https://www.suse.com/security/cve/CVE-2023-52865/" source="CVE"/>
		<reference ref_id="CVE-2023-52867" ref_url="https://www.suse.com/security/cve/CVE-2023-52867/" source="CVE"/>
		<reference ref_id="CVE-2023-52868" ref_url="https://www.suse.com/security/cve/CVE-2023-52868/" source="CVE"/>
		<reference ref_id="CVE-2023-52870" ref_url="https://www.suse.com/security/cve/CVE-2023-52870/" source="CVE"/>
		<reference ref_id="CVE-2023-52871" ref_url="https://www.suse.com/security/cve/CVE-2023-52871/" source="CVE"/>
		<reference ref_id="CVE-2023-52872" ref_url="https://www.suse.com/security/cve/CVE-2023-52872/" source="CVE"/>
		<reference ref_id="CVE-2023-52873" ref_url="https://www.suse.com/security/cve/CVE-2023-52873/" source="CVE"/>
		<reference ref_id="CVE-2023-52875" ref_url="https://www.suse.com/security/cve/CVE-2023-52875/" source="CVE"/>
		<reference ref_id="CVE-2023-52876" ref_url="https://www.suse.com/security/cve/CVE-2023-52876/" source="CVE"/>
		<reference ref_id="CVE-2023-52877" ref_url="https://www.suse.com/security/cve/CVE-2023-52877/" source="CVE"/>
		<reference ref_id="CVE-2023-52878" ref_url="https://www.suse.com/security/cve/CVE-2023-52878/" source="CVE"/>
		<reference ref_id="CVE-2023-52880" ref_url="https://www.suse.com/security/cve/CVE-2023-52880/" source="CVE"/>
		<reference ref_id="CVE-2023-6531" ref_url="https://www.suse.com/security/cve/CVE-2023-6531/" source="CVE"/>
		<reference ref_id="CVE-2024-2201" ref_url="https://www.suse.com/security/cve/CVE-2024-2201/" source="CVE"/>
		<reference ref_id="CVE-2024-26597" ref_url="https://www.suse.com/security/cve/CVE-2024-26597/" source="CVE"/>
		<reference ref_id="CVE-2024-26643" ref_url="https://www.suse.com/security/cve/CVE-2024-26643/" source="CVE"/>
		<reference ref_id="CVE-2024-26679" ref_url="https://www.suse.com/security/cve/CVE-2024-26679/" source="CVE"/>
		<reference ref_id="CVE-2024-26692" ref_url="https://www.suse.com/security/cve/CVE-2024-26692/" source="CVE"/>
		<reference ref_id="CVE-2024-26698" ref_url="https://www.suse.com/security/cve/CVE-2024-26698/" source="CVE"/>
		<reference ref_id="CVE-2024-26700" ref_url="https://www.suse.com/security/cve/CVE-2024-26700/" source="CVE"/>
		<reference ref_id="CVE-2024-26715" ref_url="https://www.suse.com/security/cve/CVE-2024-26715/" source="CVE"/>
		<reference ref_id="CVE-2024-26739" ref_url="https://www.suse.com/security/cve/CVE-2024-26739/" source="CVE"/>
		<reference ref_id="CVE-2024-26742" ref_url="https://www.suse.com/security/cve/CVE-2024-26742/" source="CVE"/>
		<reference ref_id="CVE-2024-26748" ref_url="https://www.suse.com/security/cve/CVE-2024-26748/" source="CVE"/>
		<reference ref_id="CVE-2024-26758" ref_url="https://www.suse.com/security/cve/CVE-2024-26758/" source="CVE"/>
		<reference ref_id="CVE-2024-26764" ref_url="https://www.suse.com/security/cve/CVE-2024-26764/" source="CVE"/>
		<reference ref_id="CVE-2024-26775" ref_url="https://www.suse.com/security/cve/CVE-2024-26775/" source="CVE"/>
		<reference ref_id="CVE-2024-26777" ref_url="https://www.suse.com/security/cve/CVE-2024-26777/" source="CVE"/>
		<reference ref_id="CVE-2024-26778" ref_url="https://www.suse.com/security/cve/CVE-2024-26778/" source="CVE"/>
		<reference ref_id="CVE-2024-26788" ref_url="https://www.suse.com/security/cve/CVE-2024-26788/" source="CVE"/>
		<reference ref_id="CVE-2024-26791" ref_url="https://www.suse.com/security/cve/CVE-2024-26791/" source="CVE"/>
		<reference ref_id="CVE-2024-26801" ref_url="https://www.suse.com/security/cve/CVE-2024-26801/" source="CVE"/>
		<reference ref_id="CVE-2024-26822" ref_url="https://www.suse.com/security/cve/CVE-2024-26822/" source="CVE"/>
		<reference ref_id="CVE-2024-26828" ref_url="https://www.suse.com/security/cve/CVE-2024-26828/" source="CVE"/>
		<reference ref_id="CVE-2024-26829" ref_url="https://www.suse.com/security/cve/CVE-2024-26829/" source="CVE"/>
		<reference ref_id="CVE-2024-26838" ref_url="https://www.suse.com/security/cve/CVE-2024-26838/" source="CVE"/>
		<reference ref_id="CVE-2024-26839" ref_url="https://www.suse.com/security/cve/CVE-2024-26839/" source="CVE"/>
		<reference ref_id="CVE-2024-26840" ref_url="https://www.suse.com/security/cve/CVE-2024-26840/" source="CVE"/>
		<reference ref_id="CVE-2024-26846" ref_url="https://www.suse.com/security/cve/CVE-2024-26846/" source="CVE"/>
		<reference ref_id="CVE-2024-26859" ref_url="https://www.suse.com/security/cve/CVE-2024-26859/" source="CVE"/>
		<reference ref_id="CVE-2024-26870" ref_url="https://www.suse.com/security/cve/CVE-2024-26870/" source="CVE"/>
		<reference ref_id="CVE-2024-26874" ref_url="https://www.suse.com/security/cve/CVE-2024-26874/" source="CVE"/>
		<reference ref_id="CVE-2024-26876" ref_url="https://www.suse.com/security/cve/CVE-2024-26876/" source="CVE"/>
		<reference ref_id="CVE-2024-26877" ref_url="https://www.suse.com/security/cve/CVE-2024-26877/" source="CVE"/>
		<reference ref_id="CVE-2024-26880" ref_url="https://www.suse.com/security/cve/CVE-2024-26880/" source="CVE"/>
		<reference ref_id="CVE-2024-26889" ref_url="https://www.suse.com/security/cve/CVE-2024-26889/" source="CVE"/>
		<reference ref_id="CVE-2024-26894" ref_url="https://www.suse.com/security/cve/CVE-2024-26894/" source="CVE"/>
		<reference ref_id="CVE-2024-26900" ref_url="https://www.suse.com/security/cve/CVE-2024-26900/" source="CVE"/>
		<reference ref_id="CVE-2024-26907" ref_url="https://www.suse.com/security/cve/CVE-2024-26907/" source="CVE"/>
		<reference ref_id="CVE-2024-26915" ref_url="https://www.suse.com/security/cve/CVE-2024-26915/" source="CVE"/>
		<reference ref_id="CVE-2024-26916" ref_url="https://www.suse.com/security/cve/CVE-2024-26916/" source="CVE"/>
		<reference ref_id="CVE-2024-26919" ref_url="https://www.suse.com/security/cve/CVE-2024-26919/" source="CVE"/>
		<reference ref_id="CVE-2024-26920" ref_url="https://www.suse.com/security/cve/CVE-2024-26920/" source="CVE"/>
		<reference ref_id="CVE-2024-26921" ref_url="https://www.suse.com/security/cve/CVE-2024-26921/" source="CVE"/>
		<reference ref_id="CVE-2024-26922" ref_url="https://www.suse.com/security/cve/CVE-2024-26922/" source="CVE"/>
		<reference ref_id="CVE-2024-26925" ref_url="https://www.suse.com/security/cve/CVE-2024-26925/" source="CVE"/>
		<reference ref_id="CVE-2024-26928" ref_url="https://www.suse.com/security/cve/CVE-2024-26928/" source="CVE"/>
		<reference ref_id="CVE-2024-26929" ref_url="https://www.suse.com/security/cve/CVE-2024-26929/" source="CVE"/>
		<reference ref_id="CVE-2024-26930" ref_url="https://www.suse.com/security/cve/CVE-2024-26930/" source="CVE"/>
		<reference ref_id="CVE-2024-26931" ref_url="https://www.suse.com/security/cve/CVE-2024-26931/" source="CVE"/>
		<reference ref_id="CVE-2024-26933" ref_url="https://www.suse.com/security/cve/CVE-2024-26933/" source="CVE"/>
		<reference ref_id="CVE-2024-26934" ref_url="https://www.suse.com/security/cve/CVE-2024-26934/" source="CVE"/>
		<reference ref_id="CVE-2024-26935" ref_url="https://www.suse.com/security/cve/CVE-2024-26935/" source="CVE"/>
		<reference ref_id="CVE-2024-26937" ref_url="https://www.suse.com/security/cve/CVE-2024-26937/" source="CVE"/>
		<reference ref_id="CVE-2024-26938" ref_url="https://www.suse.com/security/cve/CVE-2024-26938/" source="CVE"/>
		<reference ref_id="CVE-2024-26939" ref_url="https://www.suse.com/security/cve/CVE-2024-26939/" source="CVE"/>
		<reference ref_id="CVE-2024-26940" ref_url="https://www.suse.com/security/cve/CVE-2024-26940/" source="CVE"/>
		<reference ref_id="CVE-2024-26943" ref_url="https://www.suse.com/security/cve/CVE-2024-26943/" source="CVE"/>
		<reference ref_id="CVE-2024-26957" ref_url="https://www.suse.com/security/cve/CVE-2024-26957/" source="CVE"/>
		<reference ref_id="CVE-2024-26958" ref_url="https://www.suse.com/security/cve/CVE-2024-26958/" source="CVE"/>
		<reference ref_id="CVE-2024-26964" ref_url="https://www.suse.com/security/cve/CVE-2024-26964/" source="CVE"/>
		<reference ref_id="CVE-2024-26974" ref_url="https://www.suse.com/security/cve/CVE-2024-26974/" source="CVE"/>
		<reference ref_id="CVE-2024-26977" ref_url="https://www.suse.com/security/cve/CVE-2024-26977/" source="CVE"/>
		<reference ref_id="CVE-2024-26979" ref_url="https://www.suse.com/security/cve/CVE-2024-26979/" source="CVE"/>
		<reference ref_id="CVE-2024-26984" ref_url="https://www.suse.com/security/cve/CVE-2024-26984/" source="CVE"/>
		<reference ref_id="CVE-2024-26988" ref_url="https://www.suse.com/security/cve/CVE-2024-26988/" source="CVE"/>
		<reference ref_id="CVE-2024-26989" ref_url="https://www.suse.com/security/cve/CVE-2024-26989/" source="CVE"/>
		<reference ref_id="CVE-2024-26994" ref_url="https://www.suse.com/security/cve/CVE-2024-26994/" source="CVE"/>
		<reference ref_id="CVE-2024-26996" ref_url="https://www.suse.com/security/cve/CVE-2024-26996/" source="CVE"/>
		<reference ref_id="CVE-2024-26997" ref_url="https://www.suse.com/security/cve/CVE-2024-26997/" source="CVE"/>
		<reference ref_id="CVE-2024-26999" ref_url="https://www.suse.com/security/cve/CVE-2024-26999/" source="CVE"/>
		<reference ref_id="CVE-2024-27000" ref_url="https://www.suse.com/security/cve/CVE-2024-27000/" source="CVE"/>
		<reference ref_id="CVE-2024-27001" ref_url="https://www.suse.com/security/cve/CVE-2024-27001/" source="CVE"/>
		<reference ref_id="CVE-2024-27004" ref_url="https://www.suse.com/security/cve/CVE-2024-27004/" source="CVE"/>
		<reference ref_id="CVE-2024-27008" ref_url="https://www.suse.com/security/cve/CVE-2024-27008/" source="CVE"/>
		<reference ref_id="CVE-2024-27028" ref_url="https://www.suse.com/security/cve/CVE-2024-27028/" source="CVE"/>
		<reference ref_id="CVE-2024-27037" ref_url="https://www.suse.com/security/cve/CVE-2024-27037/" source="CVE"/>
		<reference ref_id="CVE-2024-27042" ref_url="https://www.suse.com/security/cve/CVE-2024-27042/" source="CVE"/>
		<reference ref_id="CVE-2024-27045" ref_url="https://www.suse.com/security/cve/CVE-2024-27045/" source="CVE"/>
		<reference ref_id="CVE-2024-27047" ref_url="https://www.suse.com/security/cve/CVE-2024-27047/" source="CVE"/>
		<reference ref_id="CVE-2024-27051" ref_url="https://www.suse.com/security/cve/CVE-2024-27051/" source="CVE"/>
		<reference ref_id="CVE-2024-27052" ref_url="https://www.suse.com/security/cve/CVE-2024-27052/" source="CVE"/>
		<reference ref_id="CVE-2024-27053" ref_url="https://www.suse.com/security/cve/CVE-2024-27053/" source="CVE"/>
		<reference ref_id="CVE-2024-27054" ref_url="https://www.suse.com/security/cve/CVE-2024-27054/" source="CVE"/>
		<reference ref_id="CVE-2024-27059" ref_url="https://www.suse.com/security/cve/CVE-2024-27059/" source="CVE"/>
		<reference ref_id="CVE-2024-27072" ref_url="https://www.suse.com/security/cve/CVE-2024-27072/" source="CVE"/>
		<reference ref_id="CVE-2024-27073" ref_url="https://www.suse.com/security/cve/CVE-2024-27073/" source="CVE"/>
		<reference ref_id="CVE-2024-27074" ref_url="https://www.suse.com/security/cve/CVE-2024-27074/" source="CVE"/>
		<reference ref_id="CVE-2024-27075" ref_url="https://www.suse.com/security/cve/CVE-2024-27075/" source="CVE"/>
		<reference ref_id="CVE-2024-27076" ref_url="https://www.suse.com/security/cve/CVE-2024-27076/" source="CVE"/>
		<reference ref_id="CVE-2024-27077" ref_url="https://www.suse.com/security/cve/CVE-2024-27077/" source="CVE"/>
		<reference ref_id="CVE-2024-27078" ref_url="https://www.suse.com/security/cve/CVE-2024-27078/" source="CVE"/>
		<reference ref_id="CVE-2024-27388" ref_url="https://www.suse.com/security/cve/CVE-2024-27388/" source="CVE"/>
		<reference ref_id="CVE-2024-27393" ref_url="https://www.suse.com/security/cve/CVE-2024-27393/" source="CVE"/>
		<reference ref_id="CVE-2024-27395" ref_url="https://www.suse.com/security/cve/CVE-2024-27395/" source="CVE"/>
		<reference ref_id="CVE-2024-27396" ref_url="https://www.suse.com/security/cve/CVE-2024-27396/" source="CVE"/>
		<reference ref_id="CVE-2024-27398" ref_url="https://www.suse.com/security/cve/CVE-2024-27398/" source="CVE"/>
		<reference ref_id="CVE-2024-27399" ref_url="https://www.suse.com/security/cve/CVE-2024-27399/" source="CVE"/>
		<reference ref_id="CVE-2024-27400" ref_url="https://www.suse.com/security/cve/CVE-2024-27400/" source="CVE"/>
		<reference ref_id="CVE-2024-27401" ref_url="https://www.suse.com/security/cve/CVE-2024-27401/" source="CVE"/>
		<reference ref_id="CVE-2024-27405" ref_url="https://www.suse.com/security/cve/CVE-2024-27405/" source="CVE"/>
		<reference ref_id="CVE-2024-27410" ref_url="https://www.suse.com/security/cve/CVE-2024-27410/" source="CVE"/>
		<reference ref_id="CVE-2024-27412" ref_url="https://www.suse.com/security/cve/CVE-2024-27412/" source="CVE"/>
		<reference ref_id="CVE-2024-27413" ref_url="https://www.suse.com/security/cve/CVE-2024-27413/" source="CVE"/>
		<reference ref_id="CVE-2024-27416" ref_url="https://www.suse.com/security/cve/CVE-2024-27416/" source="CVE"/>
		<reference ref_id="CVE-2024-27417" ref_url="https://www.suse.com/security/cve/CVE-2024-27417/" source="CVE"/>
		<reference ref_id="CVE-2024-27419" ref_url="https://www.suse.com/security/cve/CVE-2024-27419/" source="CVE"/>
		<reference ref_id="CVE-2024-27431" ref_url="https://www.suse.com/security/cve/CVE-2024-27431/" source="CVE"/>
		<reference ref_id="CVE-2024-27435" ref_url="https://www.suse.com/security/cve/CVE-2024-27435/" source="CVE"/>
		<reference ref_id="CVE-2024-27436" ref_url="https://www.suse.com/security/cve/CVE-2024-27436/" source="CVE"/>
		<reference ref_id="CVE-2024-35789" ref_url="https://www.suse.com/security/cve/CVE-2024-35789/" source="CVE"/>
		<reference ref_id="CVE-2024-35791" ref_url="https://www.suse.com/security/cve/CVE-2024-35791/" source="CVE"/>
		<reference ref_id="CVE-2024-35796" ref_url="https://www.suse.com/security/cve/CVE-2024-35796/" source="CVE"/>
		<reference ref_id="CVE-2024-35799" ref_url="https://www.suse.com/security/cve/CVE-2024-35799/" source="CVE"/>
		<reference ref_id="CVE-2024-35801" ref_url="https://www.suse.com/security/cve/CVE-2024-35801/" source="CVE"/>
		<reference ref_id="CVE-2024-35804" ref_url="https://www.suse.com/security/cve/CVE-2024-35804/" source="CVE"/>
		<reference ref_id="CVE-2024-35806" ref_url="https://www.suse.com/security/cve/CVE-2024-35806/" source="CVE"/>
		<reference ref_id="CVE-2024-35809" ref_url="https://www.suse.com/security/cve/CVE-2024-35809/" source="CVE"/>
		<reference ref_id="CVE-2024-35811" ref_url="https://www.suse.com/security/cve/CVE-2024-35811/" source="CVE"/>
		<reference ref_id="CVE-2024-35812" ref_url="https://www.suse.com/security/cve/CVE-2024-35812/" source="CVE"/>
		<reference ref_id="CVE-2024-35813" ref_url="https://www.suse.com/security/cve/CVE-2024-35813/" source="CVE"/>
		<reference ref_id="CVE-2024-35815" ref_url="https://www.suse.com/security/cve/CVE-2024-35815/" source="CVE"/>
		<reference ref_id="CVE-2024-35817" ref_url="https://www.suse.com/security/cve/CVE-2024-35817/" source="CVE"/>
		<reference ref_id="CVE-2024-35821" ref_url="https://www.suse.com/security/cve/CVE-2024-35821/" source="CVE"/>
		<reference ref_id="CVE-2024-35822" ref_url="https://www.suse.com/security/cve/CVE-2024-35822/" source="CVE"/>
		<reference ref_id="CVE-2024-35823" ref_url="https://www.suse.com/security/cve/CVE-2024-35823/" source="CVE"/>
		<reference ref_id="CVE-2024-35825" ref_url="https://www.suse.com/security/cve/CVE-2024-35825/" source="CVE"/>
		<reference ref_id="CVE-2024-35828" ref_url="https://www.suse.com/security/cve/CVE-2024-35828/" source="CVE"/>
		<reference ref_id="CVE-2024-35829" ref_url="https://www.suse.com/security/cve/CVE-2024-35829/" source="CVE"/>
		<reference ref_id="CVE-2024-35830" ref_url="https://www.suse.com/security/cve/CVE-2024-35830/" source="CVE"/>
		<reference ref_id="CVE-2024-35833" ref_url="https://www.suse.com/security/cve/CVE-2024-35833/" source="CVE"/>
		<reference ref_id="CVE-2024-35845" ref_url="https://www.suse.com/security/cve/CVE-2024-35845/" source="CVE"/>
		<reference ref_id="CVE-2024-35847" ref_url="https://www.suse.com/security/cve/CVE-2024-35847/" source="CVE"/>
		<reference ref_id="CVE-2024-35849" ref_url="https://www.suse.com/security/cve/CVE-2024-35849/" source="CVE"/>
		<reference ref_id="CVE-2024-35851" ref_url="https://www.suse.com/security/cve/CVE-2024-35851/" source="CVE"/>
		<reference ref_id="CVE-2024-35852" ref_url="https://www.suse.com/security/cve/CVE-2024-35852/" source="CVE"/>
		<reference ref_id="CVE-2024-35854" ref_url="https://www.suse.com/security/cve/CVE-2024-35854/" source="CVE"/>
		<reference ref_id="CVE-2024-35860" ref_url="https://www.suse.com/security/cve/CVE-2024-35860/" source="CVE"/>
		<reference ref_id="CVE-2024-35861" ref_url="https://www.suse.com/security/cve/CVE-2024-35861/" source="CVE"/>
		<reference ref_id="CVE-2024-35862" ref_url="https://www.suse.com/security/cve/CVE-2024-35862/" source="CVE"/>
		<reference ref_id="CVE-2024-35863" ref_url="https://www.suse.com/security/cve/CVE-2024-35863/" source="CVE"/>
		<reference ref_id="CVE-2024-35864" ref_url="https://www.suse.com/security/cve/CVE-2024-35864/" source="CVE"/>
		<reference ref_id="CVE-2024-35865" ref_url="https://www.suse.com/security/cve/CVE-2024-35865/" source="CVE"/>
		<reference ref_id="CVE-2024-35866" ref_url="https://www.suse.com/security/cve/CVE-2024-35866/" source="CVE"/>
		<reference ref_id="CVE-2024-35867" ref_url="https://www.suse.com/security/cve/CVE-2024-35867/" source="CVE"/>
		<reference ref_id="CVE-2024-35868" ref_url="https://www.suse.com/security/cve/CVE-2024-35868/" source="CVE"/>
		<reference ref_id="CVE-2024-35869" ref_url="https://www.suse.com/security/cve/CVE-2024-35869/" source="CVE"/>
		<reference ref_id="CVE-2024-35870" ref_url="https://www.suse.com/security/cve/CVE-2024-35870/" source="CVE"/>
		<reference ref_id="CVE-2024-35872" ref_url="https://www.suse.com/security/cve/CVE-2024-35872/" source="CVE"/>
		<reference ref_id="CVE-2024-35875" ref_url="https://www.suse.com/security/cve/CVE-2024-35875/" source="CVE"/>
		<reference ref_id="CVE-2024-35877" ref_url="https://www.suse.com/security/cve/CVE-2024-35877/" source="CVE"/>
		<reference ref_id="CVE-2024-35878" ref_url="https://www.suse.com/security/cve/CVE-2024-35878/" source="CVE"/>
		<reference ref_id="CVE-2024-35879" ref_url="https://www.suse.com/security/cve/CVE-2024-35879/" source="CVE"/>
		<reference ref_id="CVE-2024-35885" ref_url="https://www.suse.com/security/cve/CVE-2024-35885/" source="CVE"/>
		<reference ref_id="CVE-2024-35887" ref_url="https://www.suse.com/security/cve/CVE-2024-35887/" source="CVE"/>
		<reference ref_id="CVE-2024-35895" ref_url="https://www.suse.com/security/cve/CVE-2024-35895/" source="CVE"/>
		<reference ref_id="CVE-2024-35901" ref_url="https://www.suse.com/security/cve/CVE-2024-35901/" source="CVE"/>
		<reference ref_id="CVE-2024-35904" ref_url="https://www.suse.com/security/cve/CVE-2024-35904/" source="CVE"/>
		<reference ref_id="CVE-2024-35905" ref_url="https://www.suse.com/security/cve/CVE-2024-35905/" source="CVE"/>
		<reference ref_id="CVE-2024-35907" ref_url="https://www.suse.com/security/cve/CVE-2024-35907/" source="CVE"/>
		<reference ref_id="CVE-2024-35912" ref_url="https://www.suse.com/security/cve/CVE-2024-35912/" source="CVE"/>
		<reference ref_id="CVE-2024-35914" ref_url="https://www.suse.com/security/cve/CVE-2024-35914/" source="CVE"/>
		<reference ref_id="CVE-2024-35915" ref_url="https://www.suse.com/security/cve/CVE-2024-35915/" source="CVE"/>
		<reference ref_id="CVE-2024-35922" ref_url="https://www.suse.com/security/cve/CVE-2024-35922/" source="CVE"/>
		<reference ref_id="CVE-2024-35924" ref_url="https://www.suse.com/security/cve/CVE-2024-35924/" source="CVE"/>
		<reference ref_id="CVE-2024-35930" ref_url="https://www.suse.com/security/cve/CVE-2024-35930/" source="CVE"/>
		<reference ref_id="CVE-2024-35932" ref_url="https://www.suse.com/security/cve/CVE-2024-35932/" source="CVE"/>
		<reference ref_id="CVE-2024-35933" ref_url="https://www.suse.com/security/cve/CVE-2024-35933/" source="CVE"/>
		<reference ref_id="CVE-2024-35935" ref_url="https://www.suse.com/security/cve/CVE-2024-35935/" source="CVE"/>
		<reference ref_id="CVE-2024-35936" ref_url="https://www.suse.com/security/cve/CVE-2024-35936/" source="CVE"/>
		<reference ref_id="CVE-2024-35938" ref_url="https://www.suse.com/security/cve/CVE-2024-35938/" source="CVE"/>
		<reference ref_id="CVE-2024-35939" ref_url="https://www.suse.com/security/cve/CVE-2024-35939/" source="CVE"/>
		<reference ref_id="CVE-2024-35940" ref_url="https://www.suse.com/security/cve/CVE-2024-35940/" source="CVE"/>
		<reference ref_id="CVE-2024-35943" ref_url="https://www.suse.com/security/cve/CVE-2024-35943/" source="CVE"/>
		<reference ref_id="CVE-2024-35944" ref_url="https://www.suse.com/security/cve/CVE-2024-35944/" source="CVE"/>
		<reference ref_id="CVE-2024-35947" ref_url="https://www.suse.com/security/cve/CVE-2024-35947/" source="CVE"/>
		<reference ref_id="CVE-2024-35950" ref_url="https://www.suse.com/security/cve/CVE-2024-35950/" source="CVE"/>
		<reference ref_id="CVE-2024-35951" ref_url="https://www.suse.com/security/cve/CVE-2024-35951/" source="CVE"/>
		<reference ref_id="CVE-2024-35952" ref_url="https://www.suse.com/security/cve/CVE-2024-35952/" source="CVE"/>
		<reference ref_id="CVE-2024-35955" ref_url="https://www.suse.com/security/cve/CVE-2024-35955/" source="CVE"/>
		<reference ref_id="CVE-2024-35959" ref_url="https://www.suse.com/security/cve/CVE-2024-35959/" source="CVE"/>
		<reference ref_id="CVE-2024-35963" ref_url="https://www.suse.com/security/cve/CVE-2024-35963/" source="CVE"/>
		<reference ref_id="CVE-2024-35964" ref_url="https://www.suse.com/security/cve/CVE-2024-35964/" source="CVE"/>
		<reference ref_id="CVE-2024-35965" ref_url="https://www.suse.com/security/cve/CVE-2024-35965/" source="CVE"/>
		<reference ref_id="CVE-2024-35966" ref_url="https://www.suse.com/security/cve/CVE-2024-35966/" source="CVE"/>
		<reference ref_id="CVE-2024-35967" ref_url="https://www.suse.com/security/cve/CVE-2024-35967/" source="CVE"/>
		<reference ref_id="CVE-2024-35969" ref_url="https://www.suse.com/security/cve/CVE-2024-35969/" source="CVE"/>
		<reference ref_id="CVE-2024-35973" ref_url="https://www.suse.com/security/cve/CVE-2024-35973/" source="CVE"/>
		<reference ref_id="CVE-2024-35976" ref_url="https://www.suse.com/security/cve/CVE-2024-35976/" source="CVE"/>
		<reference ref_id="CVE-2024-35978" ref_url="https://www.suse.com/security/cve/CVE-2024-35978/" source="CVE"/>
		<reference ref_id="CVE-2024-35982" ref_url="https://www.suse.com/security/cve/CVE-2024-35982/" source="CVE"/>
		<reference ref_id="CVE-2024-35984" ref_url="https://www.suse.com/security/cve/CVE-2024-35984/" source="CVE"/>
		<reference ref_id="CVE-2024-35989" ref_url="https://www.suse.com/security/cve/CVE-2024-35989/" source="CVE"/>
		<reference ref_id="CVE-2024-35990" ref_url="https://www.suse.com/security/cve/CVE-2024-35990/" source="CVE"/>
		<reference ref_id="CVE-2024-35998" ref_url="https://www.suse.com/security/cve/CVE-2024-35998/" source="CVE"/>
		<reference ref_id="CVE-2024-35999" ref_url="https://www.suse.com/security/cve/CVE-2024-35999/" source="CVE"/>
		<reference ref_id="CVE-2024-36006" ref_url="https://www.suse.com/security/cve/CVE-2024-36006/" source="CVE"/>
		<reference ref_id="CVE-2024-36007" ref_url="https://www.suse.com/security/cve/CVE-2024-36007/" source="CVE"/>
		<reference ref_id="CVE-2024-36012" ref_url="https://www.suse.com/security/cve/CVE-2024-36012/" source="CVE"/>
		<reference ref_id="CVE-2024-36014" ref_url="https://www.suse.com/security/cve/CVE-2024-36014/" source="CVE"/>
		<reference ref_id="CVE-2024-36015" ref_url="https://www.suse.com/security/cve/CVE-2024-36015/" source="CVE"/>
		<reference ref_id="CVE-2024-36016" ref_url="https://www.suse.com/security/cve/CVE-2024-36016/" source="CVE"/>
		<reference ref_id="CVE-2024-36026" ref_url="https://www.suse.com/security/cve/CVE-2024-36026/" source="CVE"/>
		<reference ref_id="CVE-2024-36029" ref_url="https://www.suse.com/security/cve/CVE-2024-36029/" source="CVE"/>
		<reference ref_id="CVE-2024-36032" ref_url="https://www.suse.com/security/cve/CVE-2024-36032/" source="CVE"/>
		<reference ref_id="CVE-2024-36880" ref_url="https://www.suse.com/security/cve/CVE-2024-36880/" source="CVE"/>
		<reference ref_id="CVE-2024-36893" ref_url="https://www.suse.com/security/cve/CVE-2024-36893/" source="CVE"/>
		<reference ref_id="CVE-2024-36896" ref_url="https://www.suse.com/security/cve/CVE-2024-36896/" source="CVE"/>
		<reference ref_id="CVE-2024-36897" ref_url="https://www.suse.com/security/cve/CVE-2024-36897/" source="CVE"/>
		<reference ref_id="CVE-2024-36906" ref_url="https://www.suse.com/security/cve/CVE-2024-36906/" source="CVE"/>
		<reference ref_id="CVE-2024-36918" ref_url="https://www.suse.com/security/cve/CVE-2024-36918/" source="CVE"/>
		<reference ref_id="CVE-2024-36924" ref_url="https://www.suse.com/security/cve/CVE-2024-36924/" source="CVE"/>
		<reference ref_id="CVE-2024-36926" ref_url="https://www.suse.com/security/cve/CVE-2024-36926/" source="CVE"/>
		<reference ref_id="CVE-2024-36928" ref_url="https://www.suse.com/security/cve/CVE-2024-36928/" source="CVE"/>
		<reference ref_id="CVE-2024-36931" ref_url="https://www.suse.com/security/cve/CVE-2024-36931/" source="CVE"/>
		<reference ref_id="CVE-2024-36938" ref_url="https://www.suse.com/security/cve/CVE-2024-36938/" source="CVE"/>
		<reference ref_id="CVE-2024-36940" ref_url="https://www.suse.com/security/cve/CVE-2024-36940/" source="CVE"/>
		<reference ref_id="CVE-2024-36941" ref_url="https://www.suse.com/security/cve/CVE-2024-36941/" source="CVE"/>
		<reference ref_id="CVE-2024-36942" ref_url="https://www.suse.com/security/cve/CVE-2024-36942/" source="CVE"/>
		<reference ref_id="CVE-2024-36944" ref_url="https://www.suse.com/security/cve/CVE-2024-36944/" source="CVE"/>
		<reference ref_id="CVE-2024-36947" ref_url="https://www.suse.com/security/cve/CVE-2024-36947/" source="CVE"/>
		<reference ref_id="CVE-2024-36950" ref_url="https://www.suse.com/security/cve/CVE-2024-36950/" source="CVE"/>
		<reference ref_id="CVE-2024-36952" ref_url="https://www.suse.com/security/cve/CVE-2024-36952/" source="CVE"/>
		<reference ref_id="CVE-2024-36955" ref_url="https://www.suse.com/security/cve/CVE-2024-36955/" source="CVE"/>
		<reference ref_id="CVE-2024-36959" ref_url="https://www.suse.com/security/cve/CVE-2024-36959/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2021-47548: Fixed a possible array out-of=bounds (bsc#1225506)
- CVE-2022-48689: Fixed data-race in lru_add_fn (bsc#1223959)
- CVE-2022-48691: Fixed memory leak in netfilter (bsc#1223961)
- CVE-2023-1829: Fixed a use-after-free vulnerability in the control index filter (tcindex) (bsc#1210335).
- CVE-2023-42755: Check user supplied offsets (bsc#1215702).
- CVE-2023-52586: Fixed  mutex lock in control vblank irq (bsc#1221081).
- CVE-2023-52618: Fixed string overflow in block/rnbd-srv (bsc#1221615).
- CVE-2023-52655: Check packet for fixup for true limit (bsc#1217169).
- CVE-2023-52656: Dropped any code related to SCM_RIGHTS (bsc#1224187).
- CVE-2023-52660: Fiedx IRQ handling due to shared interrupts  (bsc#1224443).
- CVE-2023-52664: Eliminate double free in error handling logic  (bsc#1224747).
- CVE-2023-52671: Fixed hang/underflow when transitioning to ODM4:1 (bsc#1224729).
- CVE-2023-52674: Add clamp() in scarlett2_mixer_ctl_put()  (bsc#1224727).
- CVE-2023-52680: Fixed missing error checks to *_ctl_get()  (bsc#1224608).
- CVE-2023-52692: Fixed missing error check to  scarlett2_usb_set_config() (bsc#1224628).
- CVE-2023-52698: Fixed memory leak in netlbl_calipso_add_pass()  (bsc#1224621)
- CVE-2023-52746: Prevent potential spectre v1 gadget in xfrm_xlate32_attr()  (bsc#1225114)
- CVE-2023-52757: Fixed potential deadlock when releasing mids  (bsc#1225548).
- CVE-2023-52795: Fixed use after free in vhost_vdpa_probe()  (bsc#1225085).
- CVE-2023-52796: Add ipvlan_route_v6_outbound() helper (bsc#1224930).
- CVE-2023-52807: Fixed out-of-bounds access may occur when coalesce  info is read via debugfs (bsc#1225097).
- CVE-2023-52860: Fixed null pointer dereference in hisi_hns3 (bsc#1224936).
- CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447).
- CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339).
- CVE-2024-26643: Fixed mark set as dead when unbinding anonymous  set with timeout (bsc#1221829).
- CVE-2024-26679: Fixed read sk-&gt;sk_family once in inet_recv_error() (bsc#1222385).
- CVE-2024-26692: Fixed regression in writes when non-standard maximum write  size negotiated (bsc#1222464).
- CVE-2024-26700: Fixed drm/amd/display: Fix MST Null Ptr for RV (bsc#1222870) 
- CVE-2024-26715: Fixed NULL pointer dereference in  dwc3_gadget_suspend (bsc#1222561).
- CVE-2024-26742: Fixed disable_managed_interrupts (git-fixes  bsc#1222608).
- CVE-2024-26775: Fixed potential deadlock at set_capacity (bsc#1222627).
- CVE-2024-26777: Error out if pixclock equals zero in fbdev/sis (bsc#1222765)
- CVE-2024-26778: Error out if pixclock equals zero in fbdev/savage (bsc#1222770)
- CVE-2024-26791: Fixed properly validate device names in btrfs (bsc#1222793)
- CVE-2024-26822: Set correct id, uid and cruid for multiuser  automounts (bsc#1223011).
- CVE-2024-26828: Fixed underflow in parse_server_interfaces() (bsc#1223084).
- CVE-2024-26839: Fixed a memleak in init_credit_return() (bsc#1222975)
- CVE-2024-26876: Fixed crash on irq during probe (bsc#1223119).
- CVE-2024-26900: Fixed kmemleak of rdev-&gt;serial (bsc#1223046).
- CVE-2024-26907: Fixed a fortify source warning while accessing Eth segment in mlx5 (bsc#1223203).
- CVE-2024-26915: Reset IH OVERFLOW_CLEAR bit (bsc#1223207)
- CVE-2024-26919: Fixed debugfs directory leak (bsc#1223847).
- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).
- CVE-2024-26925: Release mutex after nft_gc_seq_end from abort path (bsc#1223390).
- CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show() (bsc#1223532).
- CVE-2024-26939: Fixed UAF on destroy against retire race (bsc#1223679).
- CVE-2024-26958: Fixed UAF in direct writes (bsc#1223653).
- CVE-2024-27042: Fixed potential out-of-bounds access in 'amdgpu_discovery_reg_base_init()' (bsc#1223823).
- CVE-2024-27395: Fixed Use-After-Free in ovs_ct_exit (bsc#1224098).
- CVE-2024-27396: Fixed Use-After-Free in gtp_dellink (bsc#1224096).
- CVE-2024-27398: Fixed use-after-free bugs caused by sco_sock_timeout (bsc#1224174).
- CVE-2024-27401: Fixed user_length taken into account when  fetching packet contents (bsc#1224181).
- CVE-2024-27413: Fixed incorrect allocation size (bsc#1224438).
- CVE-2024-27417: Fixed potential 'struct net' leak in inet6_rtm_getaddr()  (bsc#1224721)
- CVE-2024-27419: Fixed data-races around sysctl_net_busy_read  (bsc#1224759)
- CVE-2024-27431: Zero-initialise xdp_rxq_info struct before running  XDP program (bsc#1224718).
- CVE-2024-35791: Flush pages under kvm-&gt;lock to fix UAF in  svm_register_enc_region() (bsc#1224725).
- CVE-2024-35799: Prevent crash when disable stream (bsc#1224740).
- CVE-2024-35804: Mark target gfn of emulated atomic instruction as  dirty (bsc#1224638).
- CVE-2024-35817: Set gtt bound flag in amdgpu_ttm_gart_bind (bsc#1224736).
- CVE-2024-35852: Fixed memory leak when canceling rehash  work (bsc#1224502).
- CVE-2024-35854: Fixed possible use-after-free during  rehash (bsc#1224636).
- CVE-2024-35860: Struct bpf_link and bpf_link_ops kABI workaround  (bsc#1224531).
- CVE-2024-35861: Fixed potential UAF in  cifs_signal_cifsd_for_reconnect() (bsc#1224766).
- CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted()  (bsc#1224764).
- CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1224763).
- CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break()  (bsc#1224765,).
- CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break()  (bsc#1224668).
- CVE-2024-35866: Fixed potential UAF in cifs_dump_full_key()  (bsc#1224667).
- CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664).
- CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write() (bsc#1224678).
- CVE-2024-35869: Guarantee refcounted children from parent session  (bsc#1224679).
- CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224020,  bsc#1224672).
- CVE-2024-35872: Fixed GUP-fast succeeding on secretmem folios  (bsc#1224530).
- CVE-2024-35875: Require seeding RNG with RDRAND on CoCo systems (bsc#1224665).
- CVE-2024-35877: Fixed VM_PAT handling in COW mappings (bsc#1224525).
- CVE-2024-35878: Prevent NULL pointer dereference in vsnprintf()  (bsc#1224671).
- CVE-2024-35879: kABI workaround for drivers/of/dynamic.c (bsc#1224524).
- CVE-2024-35885: Stop interface during shutdown (bsc#1224519).
- CVE-2024-35904: Fixed dereference of garbage after mount failure (bsc#1224494).
- CVE-2024-35905: Fixed int overflow for stack access size  (bsc#1224488).
- CVE-2024-35907: Call request_irq() after NAPI initialized  (bsc#1224492).
- CVE-2024-35924: Limit read size on v1.2 (bsc#1224657).
- CVE-2024-35939: Fixed leak pages on dma_set_decrypted() failure (bsc#1224535).
- CVE-2024-35943: Fixed a null pointer dereference in omap_prm_domain_init (bsc#1224649).
- CVE-2024-35944: Fixed memcpy() run-time warning in dg_dispatch_as_host()  (bsc#1224648).
- CVE-2024-35951: Fixed the error path in panfrost_mmu_map_fault_addr() (bsc#1224701).
- CVE-2024-35959: Fixed mlx5e_priv_init() cleanup flow (bsc#1224666).
- CVE-2024-35964: Fixed not validating setsockopt user input  (bsc#1224581).
- CVE-2024-35969: Fixed race condition between ipv6_get_ifaddr and ipv6_del_addr  (bsc#1224580).
- CVE-2024-35973: Fixed header validation in geneve[6]_xmit_skb  (bsc#1224586).
- CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING  (bsc#1224575).
- CVE-2024-35998: Fixed lock ordering potential deadlock in  cifs_sync_mid_result (bsc#1224549).
- CVE-2024-35999: Fixed missing lock when picking channel (bsc#1224550).
- CVE-2024-36006: Fixed incorrect list API usage  (bsc#1224541).
- CVE-2024-36007: Fixed warning during rehash  (bsc#1224543).
- CVE-2024-36938: Fixed NULL pointer dereference in  sk_psock_skb_ingress_enqueue (bsc#1225761).

The following non-security bugs were fixed:

- 9p: explicitly deny setlease attempts (git-fixes).
- ACPI: bus: Indicate support for _TFP thru _OSC (git-fixes).
- ACPI: disable -Wstringop-truncation (git-fixes).
- ACPI: Fix Generic Initiator Affinity _OSC bit (git-fixes).
- ACPI: LPSS: Advertise number of chip selects via property (git-fixes).
- admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET (git-fixes).
- af_unix: annote lockless accesses to unix_tot_inflight &amp; gc_in_progress (bsc#1223384).
- af_unix: Do not use atomic ops for unix_sk(sk)-&gt;inflight (bsc#1223384).
- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).
- ALSA: core: Fix NULL module pointer assignment at card init (git-fixes).
- ALSA: hda/cs_dsp_ctl: Use private_free for control cleanup (git-fixes).
- ALSA: line6: Zero-initialize message buffers (stable-fixes).
- ARM: 9381/1: kasan: clear stale stack poison (git-fixes).
- ASoC: Intel: avs: Fix ASRC module initialization (git-fixes).
- ASoC: Intel: avs: Fix potential integer overflow (git-fixes).
- ASoC: Intel: avs: ssm4567: Do not ignore route checks (git-fixes).
- ASoC: Intel: Disable route checks for Skylake boards (git-fixes).
- ASoC: kirkwood: Fix potential NULL dereference (git-fixes).
- ASoC: mediatek: mt8192: fix register configuration for tdm (git-fixes).
- ASoC: meson: axg-fifo: use FIELD helpers (stable-fixes).
- ASoC: meson: axg-fifo: use threaded irq to check periods (git-fixes).
- ASoC: tas2552: Add TX path for capturing AUDIO-OUT data (git-fixes).
- ASoC: tracing: Export SND_SOC_DAPM_DIR_OUT to its value (git-fixes).
- ata: pata_legacy: make legacy_exit() work again (git-fixes).
- ata: sata_gemini: Check clk_enable() result (stable-fixes).
- autofs: use wake_up() instead of wake_up_interruptible(() (bsc#1224166).
- Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout (git-fixes).
- Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor() (git-fixes).
- Bluetooth: hci_sync: Do not double print name in add/remove adv_monitor (bsc#1216358).
- Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (git-fixes).
- Bluetooth: msft: fix slab-use-after-free in msft_do_close() (git-fixes).
- Bluetooth: qca: add missing firmware sanity checks (git-fixes).
- Bluetooth: qca: Fix error code in qca_read_fw_build_info() (git-fixes).
- Bluetooth: qca: fix firmware check error path (git-fixes).
- Bluetooth: qca: fix info leak when fetching fw build id (git-fixes).
- Bluetooth: qca: fix NVM configuration parsing (git-fixes).
- bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq (git-fixes)
- bpf: decouple prune and jump points (bsc#1225756).
- bpf: fix precision backtracking instruction iteration (bsc#1225756).
- bpf: Fix precision tracking for BPF_ALU | BPF_TO_BE | BPF_END (git-fixes).
- bpf: handle ldimm64 properly in check_cfg() (bsc#1225756).
- bpf: mostly decouple jump history management from is_state_visited() (bsc#1225756).
- bpf: remove unnecessary prune and jump points (bsc#1225756).
- btrfs: add error messages to all unrecognized mount options (git-fixes)
- btrfs: add missing mutex_unlock in btrfs_relocate_sys_chunks() (git-fixes)
- btrfs: export: handle invalid inode or root reference in btrfs_get_parent() (git-fixes)
- btrfs: extend locking to all space_info members accesses (git-fixes)
- btrfs: fix btrfs_submit_compressed_write cgroup attribution (git-fixes)
- btrfs: fix information leak in btrfs_ioctl_logical_to_ino() (git-fixes)
- btrfs: fix missing blkdev_put() call in btrfs_scan_one_device() (git-fixes)
- btrfs: fix off-by-one chunk length calculation at contains_pending_extent() (git-fixes)
- btrfs: fix qgroup reserve overflow the qgroup limit (git-fixes)
- btrfs: fix silent failure when deleting root reference (git-fixes)
- btrfs: fix use-after-free after failure to create a snapshot (git-fixes)
- btrfs: free exchange changeset on failures (git-fixes)
- btrfs: handle chunk tree lookup error in btrfs_relocate_sys_chunks() (git-fixes)
- btrfs: make search_csum_tree return 0 if we get -EFBIG (git-fixes)
- btrfs: prevent copying too big compressed lzo segment (git-fixes)
- btrfs: remove BUG_ON(!eie) in find_parent_nodes (git-fixes)
- btrfs: remove BUG_ON() in find_parent_nodes() (git-fixes)
- btrfs: repair super block num_devices automatically (git-fixes)
- btrfs: replace the BUG_ON in btrfs_del_root_ref with proper error handling (git-fixes)
- btrfs: send: ensure send_fd is writable (git-fixes)
- btrfs: send: handle path ref underflow in header iterate_inode_ref() (git-fixes)
- btrfs: send: in case of IO error log it (git-fixes)
- btrfs: send: return EOPNOTSUPP on unknown flags (git-fixes)
- btrfs: tree-checker: check item_size for dev_item (git-fixes)
- btrfs: tree-checker: check item_size for inode_item (git-fixes)
- cifs: account for primary channel in the interface list (bsc#1224020).
- cifs: cifs_chan_is_iface_active should be called with chan_lock held (bsc#1224020).
- cifs: distribute channels across interfaces based on speed (bsc#1224020).
- cifs: do not pass cifs_sb when trying to add channels (bsc#1224020).
- cifs: failure to add channel on iface should bump up weight (git-fixes, bsc#1224020).
- cifs: fix charset issue in reconnection (bsc#1224020).
- cifs: fix leak of iface for primary channel (git-fixes, bsc#1224020).
- cifs: handle cases where a channel is closed (bsc#1224020).
- cifs: handle cases where multiple sessions share connection (bsc#1224020).
- cifs: reconnect work should have reference on server struct (bsc#1224020).
- clk: Do not hold prepare_lock when calling kref_put() (stable-fixes).
- clk: qcom: mmcc-msm8998: fix venus clock issue (git-fixes).
- counter: stm32-lptimer-cnt: Provide defines for clock polarities (git-fixes).
- counter: stm32-timer-cnt: Provide defines for slave mode selection (git-fixes).
- cppc_cpufreq: Fix possible null pointer dereference (git-fixes).
- cpu/hotplug: Remove the 'cpu' member of cpuhp_cpu_state (git-fixes).
- cpumask: Add for_each_cpu_from() (bsc#1225053).
- crypto: bcm - Fix pointer arithmetic (git-fixes).
- crypto: ccp - drop platform ifdef checks (git-fixes).
- crypto: ecdsa - Fix module auto-load on add-key (git-fixes).
- crypto: x86/nh-avx2 - add missing vzeroupper (git-fixes).
- crypto: x86/sha256-avx2 - add missing vzeroupper (git-fixes).
- crypto: x86/sha512-avx2 - add missing vzeroupper (git-fixes).
- dmaengine: axi-dmac: fix possible race in remove() (git-fixes).
- dmaengine: idma64: Add check for dma_set_max_seg_size (git-fixes).
- dm/amd/pm: Fix problems with reboot/shutdown for some SMU 13.0.4/13.0.11 users (git-fixes).
- dm-multipath: dont't attempt SG_IO on non-SCSI-disks (bsc#1223575).
- docs: kernel_include.py: Cope with docutils 0.21 (stable-fixes).
- drivers/nvme: Add quirks for device 126f:2262 (git-fixes).
- drm/amd/display: Atom Integrated System Info v2_2 for DCN35 (stable-fixes).
- drm/amd/display: Fix division by zero in setup_dsc_config (stable-fixes).
- drm/amd/display: Fix potential index out of bounds in color transformation function (git-fixes).
- drm/amd/display: Handle Y carry-over in VCP X.Y calculation (stable-fixes).
- drm/amd: Flush GFXOFF requests in prepare stage (git-fixes).
- drm/amdgpu: Refine IB schedule error logging (stable-fixes).
- drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (git-fixes).
- drm/arm/malidp: fix a possible null pointer dereference (git-fixes).
- drm/bridge: anx7625: Do not log an error when DSI host can't be found (git-fixes).
- drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference (git-fixes).
- drm/bridge: dpc3433: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: icn6211: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: lt8912b: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: lt9611: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: tc358775: Do not log an error when DSI host can't be found (git-fixes).
- drm/bridge: tc358775: fix support for jeida-18 and jeida-24 (git-fixes).
- drm/connector: Add \n to message about demoting connector force-probes (git-fixes).
- drm/i915/bios: Fix parsing backlight BDB data (git-fixes).
- drm/lcdif: Do not disable clocks on already suspended hardware (git-fixes).
- drm/mediatek: Add 0 size check to mtk_drm_gem_obj (git-fixes).
- drm/meson: dw-hdmi: add bandgap setting for g12 (git-fixes).
- drm/meson: dw-hdmi: power up phy on device init (git-fixes).
- drm/meson: vclk: fix calculation of 59.94 fractional rates (git-fixes).
- drm/msm/dp: allow voltage swing / pre emphasis of 3 (git-fixes).
- drm/msm/dpu: Always flush the slave INTF on the CTL (git-fixes).
- drm/msm/dsi: Print dual-DSI-adjusted pclk instead of original mode pclk (git-fixes).
- drm/nouveau/dp: Do not probe eDP ports twice harder (stable-fixes).
- drm/panel: atna33xc20: Fix unbalanced regulator in the case HPD does not assert (git-fixes).
- drm/panel: novatek-nt35950: Do not log an error when DSI host can't be found (git-fixes).
- drm/panel: simple: Add missing Innolux G121X1-L03 format, flags, connector (git-fixes).
- drm: vc4: Fix possible null pointer dereference (git-fixes).
- dt-bindings: clock: qcom: Add missing UFS QREF clocks (git-fixes)
- dyndbg: fix old BUG_ON in &gt;control parser (stable-fixes).
- efi: libstub: only free priv.runtime_map when allocated (git-fixes).
- extcon: max8997: select IRQ_DOMAIN instead of depending on it (git-fixes).
- fail_function: fix wrong use of fei_attr_remove().
- fbdev: savage: Handle err return when savagefb_check_var failed (git-fixes).
- fbdev: shmobile: fix snprintf truncation (git-fixes).
- fbdev: sisfb: hide unused variables (git-fixes).
- firewire: ohci: mask bus reset interrupts between ISR and bottom half (stable-fixes).
- firmware: dmi-id: add a release callback function (git-fixes).
- firmware: raspberrypi: Use correct device for DMA mappings (git-fixes).
- fs/9p: drop inodes immediately on non-.L too (git-fixes).
- fs/9p: only translate RWX permissions for plain 9P2000 (git-fixes).
- fs/9p: translate O_TRUNC into OTRUNC (git-fixes).
- gpio: crystalcove: Use -ENOTSUPP consistently (stable-fixes).
- gpio: wcove: Use -ENOTSUPP consistently (stable-fixes).
- gpu: host1x: Do not setup DMA for virtual devices (stable-fixes).
- HID: intel-ish-hid: ipc: Add check for pci_alloc_irq_vectors (git-fixes).
- hwmon: (corsair-cpro) Protect ccp-&gt;wait_input_report with a spinlock (git-fixes).
- hwmon: (corsair-cpro) Use a separate buffer for sending commands (git-fixes).
- hwmon: (corsair-cpro) Use complete_all() instead of complete() in ccp_raw_event() (git-fixes).
- hwmon: (lm70) fix links in doc and comments (git-fixes).
- hwmon: (pmbus/ucd9000) Increase delay from 250 to 500us (git-fixes).
- i3c: master: svc: change ENXIO to EAGAIN when IBI occurs during start frame (git-fixes).
- i3c: master: svc: fix invalidate IBI type and miss call client IBI handler (git-fixes).
- IB/mlx5: Use __iowrite64_copy() for write combining stores (git-fixes)
- idpf: extend tx watchdog timeout (bsc#1224137).
- iio: core: Leave private pointer NULL when no private data supplied (git-fixes).
- iio: pressure: dps310: support negative temperature values (git-fixes).
- Input: cyapa - add missing input core locking to suspend/resume functions (git-fixes).
- Input: ims-pcu - fix printf string overflow (git-fixes).
- Input: pm8xxx-vibrator - correct VIB_MAX_LEVELS calculation (git-fixes).
- iomap: Fix inline extent handling in iomap_readpage (git-fixes)
- iomap: iomap: fix memory corruption when recording errors during writeback (git-fixes)
- iomap: Support partial direct I/O on user copy failures (git-fixes)
- iommu/dma: Force swiotlb_max_mapping_size on an untrusted device (bsc#1224331)
- io_uring/unix: drop usage of io_uring socket (git-fixes).
- irqchip/gic-v3-its: Prevent double free on error (git-fixes).
- jffs2: prevent xattr node from overflowing the eraseblock (git-fixes).
- kABI: bpf: struct bpf_insn_aux_data kABI workaround (bsc#1225756).
- kcm: do not sense pfmemalloc status in kcm_sendpage() (git-fixes bsc#1223959)
- KEYS: trusted: Do not use WARN when encode fails (git-fixes).
- KEYS: trusted: Fix memory leak in tpm2_key_encode() (git-fixes).
- KVM: s390: Check kvm pointer when testing KVM_CAP_S390_HPAGE_1M (git-fixes bsc#1224794).
- leds: pwm: Disable PWM when going to suspend (git-fixes).
- libsubcmd: Fix parse-options memory leak (git-fixes).
- locking/atomic: Make test_and_*_bit() ordered on failure (git-fixes).
- media: atomisp: ssh_css: Fix a null-pointer dereference in load_video_binaries (git-fixes).
- media: dt-bindings: ovti,ov2680: Fix the power supply names (git-fixes).
- media: mc: mark the media devnode as registered from the, start (git-fixes).
- media: ngene: Add dvb_ca_en50221_init return value check (git-fixes).
- media: stk1160: fix bounds checking in stk1160_copy_video() (git-fixes).
- mei: me: add lunar lake point M DID (stable-fixes).
- mfd: intel-lpss: Revert 'Add missing check for platform_get_resource' (git-fixes).
- mfd: ti_am335x_tscadc: Support the correctly spelled DT property (git-fixes).
- mfd: tqmx86: Specify IO port register range more precisely (git-fixes).
- mlxbf_gige: Enable the GigE port in mlxbf_gige_open (git-fixes).
- mlxbf_gige: Fix intermittent no ip issue (git-fixes).
- mlxbf_gige: stop PHY during open() error paths (git-fixes).
- mmc: sdhci_am654: Add tuning algorithm for delay chain (git-fixes).
- mmc: sdhci_am654: Write ITAPDLY for DDR52 timing (git-fixes).
- Move upstreamed patches into sorted section
- mtd: core: Report error if first mtd_otp_size() call fails in mtd_otp_nvmem_add() (git-fixes).
- mtd: rawnand: hynix: fixed typo (git-fixes).
- net: do not sense pfmemalloc status in skb_append_pagefrags() (git-fixes bsc#1223959)
- netfilter: nf_tables: bail out early if hardware offload is not supported (git-fixes bsc#1223961)
- net: introduce __skb_fill_page_desc_noacc (git-fixes bsc#1223959)
- net: nfc: remove inappropriate attrs check (stable-fixes).
- net: qualcomm: rmnet: fix global oob in rmnet_policy (git-fixes).
- net: usb: ax88179_178a: fix link status when link is set to down/up (git-fixes).
- net:usb:qmi_wwan: support Rolling modules (stable-fixes).
- net: usb: smsc95xx: stop lying about skb-&gt;truesize (git-fixes).
- net: usb: sr9700: stop lying about skb-&gt;truesize (git-fixes).
- net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete() (bsc#1223360).
- nfc: nci: Fix handling of zero-length payload packets in nci_rx_work() (git-fixes).
- nfc: nci: Fix uninit-value in nci_rx_work (git-fixes).
- nilfs2: fix out-of-range warning (git-fixes).
- nilfs2: fix unexpected freezing of nilfs_segctor_sync() (git-fixes).
- nilfs2: fix use-after-free of timer for log writer thread (git-fixes).
- nilfs2: make superblock data array index computation sparse friendly (git-fixes).
- nvme: ensure disabling pairs with unquiesce (bsc#1224534).
- nvme: fix miss command type check (git-fixes).
- nvme: fix multipath batched completion accounting (git-fixes).
- nvme-multipath: fix io accounting on failover (git-fixes).
- nvmet: fix ns enable/disable possible hang (git-fixes).
- PCI: dwc: Detect iATU settings after getting 'addr_space' resource (git-fixes).
- PCI: dwc: ep: Fix DBI access failure for drivers requiring refclk from host (git-fixes).
- PCI: dwc: Use the bitmap API to allocate bitmaps (git-fixes).
- PCI/EDR: Align EDR_PORT_DPC_ENABLE_DSM with PCI Firmware r3.3 (git-fixes).
- PCI/EDR: Align EDR_PORT_LOCATE_DSM with PCI Firmware r3.3 (git-fixes).
- PCI: rockchip-ep: Remove wrong mask on subsys_vendor_id (git-fixes).
- PCI: tegra194: Fix probe path for Endpoint mode (git-fixes).
- pinctrl: armada-37xx: remove an unused variable (git-fixes).
- pinctrl: core: delete incorrect free in pinctrl_enable() (git-fixes).
- pinctrl: core: handle radix_tree_insert() errors in pinctrl_register_one_pin() (stable-fixes).
- pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (git-fixes).
- pinctrl/meson: fix typo in PDM's pin name (git-fixes).
- pinctrl: pinctrl-aspeed-g6: Fix register offset for pinconf of GPIOR-T (git-fixes).
- platform/x86/intel-uncore-freq: Do not present root domain on error (git-fixes).
- platform/x86: xiaomi-wmi: Fix race condition when reporting key events (git-fixes).
- powerpc/eeh: Permanently disable the removed device (bsc#1223991 ltc#205740).
- powerpc/eeh: Small refactor of eeh_handle_normal_event() (bsc#1223991 ltc#205740).
- powerpc/eeh: Use a goto for recovery failures (bsc#1223991 ltc#205740).
- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).
- powerpc/pseries/lparcfg: drop error message from guest name lookup (bsc#1187716 ltc#193451 git-fixes).
- powerpc/pseries/vio: Do not return ENODEV if node or compatible missing (bsc#1220783).
- powerpc/uaccess: Fix build errors seen with GCC 13/14 (bsc#1194869).
- powerpc/uaccess: Use YZ asm constraint for ld (bsc#1194869).
- power: rt9455: hide unused rt9455_boost_voltage_values (git-fixes).
- ppdev: Add an error check in register_device (git-fixes).
- printk: Update @console_may_schedule in console_trylock_spinning() (bsc#1225616).
- qibfs: fix dentry leak (git-fixes)
- RDMA/hns: Add max_ah and cq moderation capacities in query_device() (git-fixes)
- RDMA/hns: Fix deadlock on SRQ async events. (git-fixes)
- RDMA/hns: Fix GMV table pagesize (git-fixes)
- RDMA/hns: Fix return value in hns_roce_map_mr_sg (git-fixes)
- RDMA/hns: Fix UAF for cq async event (git-fixes)
- RDMA/hns: Modify the print level of CQE error (git-fixes)
- RDMA/hns: Use complete parentheses in macros (git-fixes)
- RDMA/IPoIB: Fix format truncation compilation errors (git-fixes)
- RDMA/mlx5: Adding remote atomic access flag to updatable flags (git-fixes)
- RDMA/mlx5: Fix port number for counter query in multi-port configuration (git-fixes)
- RDMA/rxe: Add ibdev_dbg macros for rxe (git-fixes)
- RDMA/rxe: Fix incorrect rxe_put in error path (git-fixes)
- RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (git-fixes)
- RDMA/rxe: Fix the problem 'mutex_destroy missing' (git-fixes)
- RDMA/rxe: Replace pr_xxx by rxe_dbg_xxx in rxe_net.c (git-fixes)
- RDMA/rxe: Split rxe_run_task() into two subroutines (git-fixes)
- regulator: bd71828: Do not overwrite runtime voltages (git-fixes).
- regulator: core: fix debugfs creation regression (git-fixes).
- regulator: mt6360: De-capitalize devicetree regulator subnodes (git-fixes).
- remoteproc: mediatek: Make sure IPI buffer fits in L2TCM (git-fixes).
- Revert 'cifs: reconnect work should have reference on server struct' (git-fixes, bsc#1224020).
- Revert 'drm/bridge: ti-sn65dsi83: Fix enable error path' (git-fixes).
- ring-buffer: Fix a race between readers and resize checks (git-fixes).
- s390/bpf: Emit a barrier for BPF_FETCH instructions (git-fixes bsc#1224795).
- s390/cio: fix tracepoint subchannel type field (git-fixes bsc#1224796).
- s390/cpum_cf: make crypto counters upward compatible across machine types (bsc#1224346).
- s390/ipl: Fix incorrect initialization of len fields in nvme reipl block (git-fixes bsc#1225139).
- s390/ipl: Fix incorrect initialization of nvme dump block (git-fixes bsc#1225138).
- sched/topology: Optimize topology_span_sane() (bsc#1225053).
- scsi: arcmsr: Support new PCI device IDs 1883 and 1886 (git-fixes).
- scsi: bfa: Fix function pointer type mismatch for hcb_qe-&gt;cbfn (git-fixes).
- scsi: core: Consult supported VPD page list prior to fetching page (git-fixes).
- scsi: core: Fix unremoved procfs host directory regression (git-fixes).
- scsi: csiostor: Avoid function pointer casts (git-fixes).
- scsi: libfc: Do not schedule abort twice (git-fixes).
- scsi: libfc: Fix up timeout error in fc_fcp_rec_error() (git-fixes).
- scsi: lpfc: Add support for 32 byte CDBs (bsc#1225842).
- scsi: lpfc: Change default logging level for unsolicited CT MIB commands (bsc#1225842).
- scsi: lpfc: Change lpfc_hba hba_flag member into a bitmask (bsc#1225842).
- scsi: lpfc: Clear deferred RSCN processing flag when driver is unloading (bsc#1225842).
- scsi: lpfc: Copyright updates for 14.4.0.2 patches (bsc#1225842).
- scsi: lpfc: Introduce rrq_list_lock to protect active_rrq_list (bsc#1225842).
- scsi: lpfc: Update logging of protection type for T10 DIF I/O (bsc#1225842).
- scsi: lpfc: Update lpfc version to 14.4.0.2 (bsc#1225842).
- scsi: mpt3sas: Prevent sending diag_reset when the controller is ready (git-fixes).
- scsi: mylex: Fix sysfs buffer lengths (git-fixes).
- scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes).
- scsi: sd: Unregister device if device_add_disk() failed in sd_probe() (git-fixes).
- selftests/pidfd: Fix config for pidfd_setns_test (git-fixes).
- serial: 8250_bcm7271: use default_mux_rate if possible (git-fixes).
- serial: kgdboc: Fix NMI-safety problems from keyboard reset code (stable-fixes).
- serial: max3100: Fix bitwise types (git-fixes).
- serial: max3100: Lock port-&gt;lock when calling uart_handle_cts_change() (git-fixes).
- serial: sc16is7xx: add proper sched.h include for sched_set_fifo() (git-fixes).
- serial: sc16is7xx: fix bug in sc16is7xx_set_baud() when using prescaler (git-fixes).
- serial: sh-sci: protect invalidating RXDMA on shutdown (git-fixes).
- smb3: show beginning time for per share stats (bsc#1224020).
- smb: client: ensure to try all targets when finding nested links (bsc#1224020).
- smb: client: fix mount when dns_resolver key is not available (git-fixes, bsc#1224020).
- smb: client: get rid of dfs code dep in namespace.c (bsc#1224020).
- smb: client: get rid of dfs naming in automount code (bsc#1224020).
- smb: client: introduce DFS_CACHE_TGT_LIST() (bsc#1224020).
- smb: client: reduce stack usage in cifs_try_adding_channels() (bsc#1224020).
- smb: client: remove extra @chan_count check in __cifs_put_smb_ses() (bsc#1224020).
- smb: client: rename cifs_dfs_ref.c to namespace.c (bsc#1224020).
- soc: mediatek: cmdq: Fix typo of CMDQ_JUMP_RELATIVE (git-fixes).
- soc: qcom: rpmh-rsc: Enhance check for VRM in-flight request (git-fixes).
- Sort recent BHI patches
- speakup: Fix sizeof() vs ARRAY_SIZE() bug (git-fixes).
- spmi: Add a check for remove callback when removing a SPMI driver (git-fixes).
- spmi: hisi-spmi-controller: Do not override device identifier (git-fixes).
- swiotlb: extend buffer pre-padding to alloc_align_mask if necessary (bsc#1224331). 
- swiotlb: Fix alignment checks when both allocation and DMA masks are (bsc#1224331)
- swiotlb: Fix double-allocation of slots due to broken alignment (bsc#1224331)
- swiotlb: Honour dma_alloc_coherent() alignment in swiotlb_alloc() (bsc#1224331)
- sysv: do not call sb_bread() with pointers_lock held (git-fixes).
- thermal/drivers/tsens: Fix null pointer dereference (git-fixes).
- tools/latency-collector: Fix -Wformat-security compile warns (git-fixes).
- tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer (bsc#1225535)
- tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer (git-fixes).
- tracing: Add MODULE_DESCRIPTION() to preemptirq_delay_test (git-fixes).
- tracing: hide unused ftrace_event_id_fops (git-fixes).
- tty: n_gsm: fix missing receive state reset after mode switch (git-fixes).
- tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (git-fixes).
- usb: aqc111: stop lying about skb-&gt;truesize (git-fixes).
- USB: core: Add hub_get() and hub_put() routines (git-fixes).
- USB: core: Fix access violation during port device removal (git-fixes).
- USB: core: Fix deadlock in port 'disable' sysfs attribute (git-fixes).
- usb: dwc3: core: Prevent phy suspend during init (Git-fixes).
- usb: gadget: u_audio: Clear uac pointer when freed (git-fixes).
- usb: typec: tipd: fix event checking for tps6598x (git-fixes).
- usb: typec: ucsi: displayport: Fix potential deadlock (git-fixes).
- VMCI: Fix an error handling path in vmci_guest_probe_device() (git-fixes).
- VMCI: Fix possible memcpy() run-time warning in vmci_datagram_invoke_guest_handler() (stable-fixes).
- vmci: prevent speculation leaks by sanitizing event in event_deliver() (git-fixes).
- watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (git-fixes).
- watchdog: ixp4xx: Make sure restart always works (git-fixes).
- watchdog: rti_wdt: Set min_hw_heartbeat_ms to accommodate a safety margin (git-fixes).
- wifi: ar5523: enable proper endpoint verification (git-fixes).
- wifi: ath10k: Fix an error code problem in ath10k_dbg_sta_write_peer_debug_trigger() (git-fixes).
- wifi: ath10k: poll service ready message before failing (git-fixes).
- wifi: ath10k: populate board data for WCN3990 (git-fixes).
- wifi: ath11k: do not force enable power save on non-running vdevs (git-fixes).
- wifi: carl9170: add a proper sanity check for endpoints (git-fixes).
- wifi: carl9170: re-fix fortified-memset warning (git-fixes).
- wifi: cfg80211: fix rdev_dump_mpp() arguments order (stable-fixes).
- wifi: mac80211: fix ieee80211_bss_*_flags kernel-doc (stable-fixes).
- wifi: mwl8k: initialize cmd-&gt;addr[] properly (git-fixes).
- x86/boot: Ignore NMIs during very early boot (git-fixes).
- x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES (git-fixes).
- x86/bugs: Change commas to semicolons in 'spectre_v2' sysfs file (git-fixes).
- x86/bugs: Fix BHI documentation (git-fixes).
- x86/bugs: Fix BHI handling of RRSBA (git-fixes).
- x86/bugs: Fix BHI retpoline check (git-fixes).
- x86/bugs: Fix return type of spectre_bhi_state() (git-fixes).
- x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git-fixes).
- x86/bugs: Rename various 'ia32_cap' variables to 'x86_arch_cap_msr' (git-fixes).
- x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI (git-fixes).
- x86: Fix CPUIDLE_FLAG_IRQ_ENABLE leaking timer reprogram (git-fixes).
- x86/kvm: Do not try to disable kvmclock if it was not enabled (git-fixes).
- x86/lib: Fix overflow when counting digits (git-fixes).
- x86/mce: Make sure to grab mce_sysfs_mutex in set_bank() (git-fixes).
- x86/nmi: Drop unused declaration of proc_nmi_enabled() (git-fixes).
- x86/retpoline: Do the necessary fixup to the Zen3/4 srso return thunk for !SRSO (git-fixes).
- x86/sev: Check for MWAITX and MONITORX opcodes in the #VC handler (git-fixes).
- x86/sme: Fix memory encryption setting if enabled by default and not overridden (git-fixes).
- x86/tdx: Preserve shared bit on mprotect() (git-fixes).
- xfs: fix exception caused by unexpected illegal bestcount in leaf dir (git-fixes).
- xfs: Fix false ENOSPC when performing direct write on a delalloc extent in cow fork (git-fixes).
- xfs: fix imprecise logic in xchk_btree_check_block_owner (git-fixes).
- xfs: fix inode reservation space for removing transaction (git-fixes).
- xfs: shrink failure needs to hold AGI buffer (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-25"/>
	<updated date="2024-06-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141539">SUSE bug 1141539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174585">SUSE bug 1174585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181674">SUSE bug 1181674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187716">SUSE bug 1187716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190569">SUSE bug 1190569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191949">SUSE bug 1191949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192107">SUSE bug 1192107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193983">SUSE bug 1193983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194288">SUSE bug 1194288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196956">SUSE bug 1196956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197915">SUSE bug 1197915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200465">SUSE bug 1200465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205205">SUSE bug 1205205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207284">SUSE bug 1207284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207361">SUSE bug 1207361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207948">SUSE bug 1207948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208149">SUSE bug 1208149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209657">SUSE bug 1209657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209799">SUSE bug 1209799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209834">SUSE bug 1209834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209980">SUSE bug 1209980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210335">SUSE bug 1210335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213863">SUSE bug 1213863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214852">SUSE bug 1214852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215322">SUSE bug 1215322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215702">SUSE bug 1215702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216358">SUSE bug 1216358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216702">SUSE bug 1216702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217169">SUSE bug 1217169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217339">SUSE bug 1217339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217515">SUSE bug 1217515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218447">SUSE bug 1218447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220021">SUSE bug 1220021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220267">SUSE bug 1220267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220363">SUSE bug 1220363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220783">SUSE bug 1220783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221044">SUSE bug 1221044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221081">SUSE bug 1221081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221615">SUSE bug 1221615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221777">SUSE bug 1221777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221816">SUSE bug 1221816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221829">SUSE bug 1221829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222011">SUSE bug 1222011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222374">SUSE bug 1222374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222385">SUSE bug 1222385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222413">SUSE bug 1222413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222464">SUSE bug 1222464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222513">SUSE bug 1222513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222559">SUSE bug 1222559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222561">SUSE bug 1222561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222608">SUSE bug 1222608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222619">SUSE bug 1222619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222627">SUSE bug 1222627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222721">SUSE bug 1222721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222765">SUSE bug 1222765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222770">SUSE bug 1222770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222783">SUSE bug 1222783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222793">SUSE bug 1222793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222870">SUSE bug 1222870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222893">SUSE bug 1222893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222960">SUSE bug 1222960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222961">SUSE bug 1222961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222974">SUSE bug 1222974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222975">SUSE bug 1222975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222976">SUSE bug 1222976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223011">SUSE bug 1223011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223023">SUSE bug 1223023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223027">SUSE bug 1223027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223031">SUSE bug 1223031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223043">SUSE bug 1223043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223046">SUSE bug 1223046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223048">SUSE bug 1223048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223049">SUSE bug 1223049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223084">SUSE bug 1223084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223113">SUSE bug 1223113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223119">SUSE bug 1223119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223137">SUSE bug 1223137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223138">SUSE bug 1223138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223140">SUSE bug 1223140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223188">SUSE bug 1223188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223203">SUSE bug 1223203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223207">SUSE bug 1223207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223315">SUSE bug 1223315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223360">SUSE bug 1223360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223384">SUSE bug 1223384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223390">SUSE bug 1223390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223432">SUSE bug 1223432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223489">SUSE bug 1223489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223505">SUSE bug 1223505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223532">SUSE bug 1223532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223575">SUSE bug 1223575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223595">SUSE bug 1223595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223626">SUSE bug 1223626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223627">SUSE bug 1223627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223628">SUSE bug 1223628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223631">SUSE bug 1223631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223633">SUSE bug 1223633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223638">SUSE bug 1223638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223650">SUSE bug 1223650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223653">SUSE bug 1223653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223666">SUSE bug 1223666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223670">SUSE bug 1223670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223671">SUSE bug 1223671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223675">SUSE bug 1223675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223677">SUSE bug 1223677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223678">SUSE bug 1223678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223679">SUSE bug 1223679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223698">SUSE bug 1223698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223712">SUSE bug 1223712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223715">SUSE bug 1223715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223717">SUSE bug 1223717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223718">SUSE bug 1223718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223737">SUSE bug 1223737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223738">SUSE bug 1223738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223741">SUSE bug 1223741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223744">SUSE bug 1223744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223747">SUSE bug 1223747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223748">SUSE bug 1223748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223750">SUSE bug 1223750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223752">SUSE bug 1223752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223754">SUSE bug 1223754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223756">SUSE bug 1223756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223757">SUSE bug 1223757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223762">SUSE bug 1223762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223769">SUSE bug 1223769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223770">SUSE bug 1223770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223779">SUSE bug 1223779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223780">SUSE bug 1223780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223781">SUSE bug 1223781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223788">SUSE bug 1223788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223802">SUSE bug 1223802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223819">SUSE bug 1223819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223823">SUSE bug 1223823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223826">SUSE bug 1223826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223828">SUSE bug 1223828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223829">SUSE bug 1223829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223837">SUSE bug 1223837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223842">SUSE bug 1223842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223843">SUSE bug 1223843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223844">SUSE bug 1223844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223847">SUSE bug 1223847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223858">SUSE bug 1223858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223875">SUSE bug 1223875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223879">SUSE bug 1223879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223895">SUSE bug 1223895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223959">SUSE bug 1223959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223961">SUSE bug 1223961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223991">SUSE bug 1223991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223996">SUSE bug 1223996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224020">SUSE bug 1224020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224076">SUSE bug 1224076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224096">SUSE bug 1224096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224098">SUSE bug 1224098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224099">SUSE bug 1224099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224137">SUSE bug 1224137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224166">SUSE bug 1224166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224174">SUSE bug 1224174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224177">SUSE bug 1224177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224180">SUSE bug 1224180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224181">SUSE bug 1224181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224187">SUSE bug 1224187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224331">SUSE bug 1224331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224346">SUSE bug 1224346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224423">SUSE bug 1224423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224432">SUSE bug 1224432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224437">SUSE bug 1224437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224438">SUSE bug 1224438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224442">SUSE bug 1224442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224443">SUSE bug 1224443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224445">SUSE bug 1224445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224449">SUSE bug 1224449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224479">SUSE bug 1224479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224482">SUSE bug 1224482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224487">SUSE bug 1224487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224488">SUSE bug 1224488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224492">SUSE bug 1224492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224494">SUSE bug 1224494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224495">SUSE bug 1224495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224502">SUSE bug 1224502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224508">SUSE bug 1224508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224509">SUSE bug 1224509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224511">SUSE bug 1224511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224519">SUSE bug 1224519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224524">SUSE bug 1224524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224525">SUSE bug 1224525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224530">SUSE bug 1224530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224531">SUSE bug 1224531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224534">SUSE bug 1224534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224535">SUSE bug 1224535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224537">SUSE bug 1224537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224541">SUSE bug 1224541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224543">SUSE bug 1224543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224549">SUSE bug 1224549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224550">SUSE bug 1224550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224558">SUSE bug 1224558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224559">SUSE bug 1224559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224566">SUSE bug 1224566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224567">SUSE bug 1224567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224571">SUSE bug 1224571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224575">SUSE bug 1224575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224576">SUSE bug 1224576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224579">SUSE bug 1224579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224580">SUSE bug 1224580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224581">SUSE bug 1224581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224582">SUSE bug 1224582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224586">SUSE bug 1224586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224587">SUSE bug 1224587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224592">SUSE bug 1224592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224598">SUSE bug 1224598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224601">SUSE bug 1224601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224607">SUSE bug 1224607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224608">SUSE bug 1224608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224611">SUSE bug 1224611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224615">SUSE bug 1224615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224617">SUSE bug 1224617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224618">SUSE bug 1224618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224621">SUSE bug 1224621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224622">SUSE bug 1224622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224624">SUSE bug 1224624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224627">SUSE bug 1224627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224628">SUSE bug 1224628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224629">SUSE bug 1224629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224632">SUSE bug 1224632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224636">SUSE bug 1224636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224637">SUSE bug 1224637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224638">SUSE bug 1224638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224640">SUSE bug 1224640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224643">SUSE bug 1224643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224644">SUSE bug 1224644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224645">SUSE bug 1224645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224647">SUSE bug 1224647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224648">SUSE bug 1224648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224649">SUSE bug 1224649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224650">SUSE bug 1224650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224651">SUSE bug 1224651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224657">SUSE bug 1224657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224659">SUSE bug 1224659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224660">SUSE bug 1224660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224663">SUSE bug 1224663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224664">SUSE bug 1224664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224665">SUSE bug 1224665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224666">SUSE bug 1224666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224667">SUSE bug 1224667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224668">SUSE bug 1224668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224671">SUSE bug 1224671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224672">SUSE bug 1224672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224676">SUSE bug 1224676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224678">SUSE bug 1224678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224679">SUSE bug 1224679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224680">SUSE bug 1224680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224681">SUSE bug 1224681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224682">SUSE bug 1224682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224685">SUSE bug 1224685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224686">SUSE bug 1224686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224692">SUSE bug 1224692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224697">SUSE bug 1224697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224699">SUSE bug 1224699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224701">SUSE bug 1224701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224703">SUSE bug 1224703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224705">SUSE bug 1224705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224707">SUSE bug 1224707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224717">SUSE bug 1224717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224718">SUSE bug 1224718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224721">SUSE bug 1224721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224722">SUSE bug 1224722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224723">SUSE bug 1224723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224725">SUSE bug 1224725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224727">SUSE bug 1224727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224728">SUSE bug 1224728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224729">SUSE bug 1224729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224730">SUSE bug 1224730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224731">SUSE bug 1224731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224732">SUSE bug 1224732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224733">SUSE bug 1224733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224736">SUSE bug 1224736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224738">SUSE bug 1224738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224739">SUSE bug 1224739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224740">SUSE bug 1224740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224747">SUSE bug 1224747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224749">SUSE bug 1224749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224759">SUSE bug 1224759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224763">SUSE bug 1224763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224764">SUSE bug 1224764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224765">SUSE bug 1224765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224766">SUSE bug 1224766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224794">SUSE bug 1224794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224795">SUSE bug 1224795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224796">SUSE bug 1224796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224803">SUSE bug 1224803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224816">SUSE bug 1224816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224895">SUSE bug 1224895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224898">SUSE bug 1224898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224900">SUSE bug 1224900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224901">SUSE bug 1224901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224902">SUSE bug 1224902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224903">SUSE bug 1224903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224904">SUSE bug 1224904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224905">SUSE bug 1224905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224907">SUSE bug 1224907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224909">SUSE bug 1224909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224910">SUSE bug 1224910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224911">SUSE bug 1224911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224912">SUSE bug 1224912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224913">SUSE bug 1224913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224914">SUSE bug 1224914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224915">SUSE bug 1224915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224920">SUSE bug 1224920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224928">SUSE bug 1224928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224929">SUSE bug 1224929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224930">SUSE bug 1224930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224931">SUSE bug 1224931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224932">SUSE bug 1224932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224936">SUSE bug 1224936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224937">SUSE bug 1224937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224941">SUSE bug 1224941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224942">SUSE bug 1224942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224944">SUSE bug 1224944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224945">SUSE bug 1224945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224947">SUSE bug 1224947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224956">SUSE bug 1224956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224988">SUSE bug 1224988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224992">SUSE bug 1224992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225000">SUSE bug 1225000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225003">SUSE bug 1225003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225005">SUSE bug 1225005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225008">SUSE bug 1225008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225009">SUSE bug 1225009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225022">SUSE bug 1225022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225031">SUSE bug 1225031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225032">SUSE bug 1225032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225036">SUSE bug 1225036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225041">SUSE bug 1225041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225044">SUSE bug 1225044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225053">SUSE bug 1225053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225076">SUSE bug 1225076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225077">SUSE bug 1225077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225082">SUSE bug 1225082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225085">SUSE bug 1225085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225086">SUSE bug 1225086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225092">SUSE bug 1225092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225095">SUSE bug 1225095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225096">SUSE bug 1225096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225097">SUSE bug 1225097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225106">SUSE bug 1225106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225108">SUSE bug 1225108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225109">SUSE bug 1225109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225114">SUSE bug 1225114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225118">SUSE bug 1225118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225121">SUSE bug 1225121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225122">SUSE bug 1225122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225123">SUSE bug 1225123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225125">SUSE bug 1225125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225126">SUSE bug 1225126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225127">SUSE bug 1225127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225129">SUSE bug 1225129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225131">SUSE bug 1225131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225132">SUSE bug 1225132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225138">SUSE bug 1225138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225139">SUSE bug 1225139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225145">SUSE bug 1225145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225151">SUSE bug 1225151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225153">SUSE bug 1225153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225156">SUSE bug 1225156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225158">SUSE bug 1225158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225160">SUSE bug 1225160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225161">SUSE bug 1225161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225164">SUSE bug 1225164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225167">SUSE bug 1225167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225180">SUSE bug 1225180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225183">SUSE bug 1225183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225184">SUSE bug 1225184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225186">SUSE bug 1225186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225187">SUSE bug 1225187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225189">SUSE bug 1225189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225190">SUSE bug 1225190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225191">SUSE bug 1225191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225192">SUSE bug 1225192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225193">SUSE bug 1225193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225195">SUSE bug 1225195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225198">SUSE bug 1225198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225201">SUSE bug 1225201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225203">SUSE bug 1225203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225205">SUSE bug 1225205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225206">SUSE bug 1225206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225207">SUSE bug 1225207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225208">SUSE bug 1225208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225209">SUSE bug 1225209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225210">SUSE bug 1225210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225214">SUSE bug 1225214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225222">SUSE bug 1225222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225223">SUSE bug 1225223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225224">SUSE bug 1225224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225225">SUSE bug 1225225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225227">SUSE bug 1225227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225228">SUSE bug 1225228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225229">SUSE bug 1225229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225230">SUSE bug 1225230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225232">SUSE bug 1225232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225233">SUSE bug 1225233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225235">SUSE bug 1225235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225236">SUSE bug 1225236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225237">SUSE bug 1225237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225238">SUSE bug 1225238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225239">SUSE bug 1225239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225240">SUSE bug 1225240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225241">SUSE bug 1225241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225242">SUSE bug 1225242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225243">SUSE bug 1225243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225244">SUSE bug 1225244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225245">SUSE bug 1225245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225246">SUSE bug 1225246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225247">SUSE bug 1225247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225248">SUSE bug 1225248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225249">SUSE bug 1225249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225250">SUSE bug 1225250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225251">SUSE bug 1225251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225252">SUSE bug 1225252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225253">SUSE bug 1225253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225254">SUSE bug 1225254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225255">SUSE bug 1225255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225256">SUSE bug 1225256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225257">SUSE bug 1225257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225258">SUSE bug 1225258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225259">SUSE bug 1225259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225260">SUSE bug 1225260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225261">SUSE bug 1225261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225262">SUSE bug 1225262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225263">SUSE bug 1225263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225268">SUSE bug 1225268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225301">SUSE bug 1225301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225303">SUSE bug 1225303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225304">SUSE bug 1225304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225306">SUSE bug 1225306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225316">SUSE bug 1225316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225318">SUSE bug 1225318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225320">SUSE bug 1225320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225321">SUSE bug 1225321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225322">SUSE bug 1225322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225323">SUSE bug 1225323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225326">SUSE bug 1225326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225327">SUSE bug 1225327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225328">SUSE bug 1225328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225329">SUSE bug 1225329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225330">SUSE bug 1225330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225331">SUSE bug 1225331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225332">SUSE bug 1225332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225333">SUSE bug 1225333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225334">SUSE bug 1225334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225335">SUSE bug 1225335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225336">SUSE bug 1225336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225337">SUSE bug 1225337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225338">SUSE bug 1225338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225339">SUSE bug 1225339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225341">SUSE bug 1225341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225342">SUSE bug 1225342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225344">SUSE bug 1225344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225346">SUSE bug 1225346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225347">SUSE bug 1225347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225351">SUSE bug 1225351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225353">SUSE bug 1225353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225354">SUSE bug 1225354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225355">SUSE bug 1225355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225357">SUSE bug 1225357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225358">SUSE bug 1225358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225360">SUSE bug 1225360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225361">SUSE bug 1225361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225366">SUSE bug 1225366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225367">SUSE bug 1225367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225368">SUSE bug 1225368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225369">SUSE bug 1225369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225370">SUSE bug 1225370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225372">SUSE bug 1225372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225373">SUSE bug 1225373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225374">SUSE bug 1225374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225375">SUSE bug 1225375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225376">SUSE bug 1225376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225377">SUSE bug 1225377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225379">SUSE bug 1225379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225380">SUSE bug 1225380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225382">SUSE bug 1225382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225383">SUSE bug 1225383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225384">SUSE bug 1225384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225386">SUSE bug 1225386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225387">SUSE bug 1225387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225388">SUSE bug 1225388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225390">SUSE bug 1225390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225392">SUSE bug 1225392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225393">SUSE bug 1225393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225396">SUSE bug 1225396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225400">SUSE bug 1225400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225404">SUSE bug 1225404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225405">SUSE bug 1225405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225408">SUSE bug 1225408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225409">SUSE bug 1225409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225410">SUSE bug 1225410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225411">SUSE bug 1225411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225424">SUSE bug 1225424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225425">SUSE bug 1225425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225427">SUSE bug 1225427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225431">SUSE bug 1225431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225435">SUSE bug 1225435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225436">SUSE bug 1225436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225437">SUSE bug 1225437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225438">SUSE bug 1225438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225439">SUSE bug 1225439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225441">SUSE bug 1225441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225442">SUSE bug 1225442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225443">SUSE bug 1225443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225444">SUSE bug 1225444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225445">SUSE bug 1225445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225446">SUSE bug 1225446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225447">SUSE bug 1225447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225450">SUSE bug 1225450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225453">SUSE bug 1225453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225455">SUSE bug 1225455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225461">SUSE bug 1225461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225463">SUSE bug 1225463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225464">SUSE bug 1225464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225466">SUSE bug 1225466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225467">SUSE bug 1225467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225468">SUSE bug 1225468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225471">SUSE bug 1225471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225472">SUSE bug 1225472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225478">SUSE bug 1225478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225479">SUSE bug 1225479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225480">SUSE bug 1225480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225482">SUSE bug 1225482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225483">SUSE bug 1225483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225486">SUSE bug 1225486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225488">SUSE bug 1225488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225490">SUSE bug 1225490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225492">SUSE bug 1225492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225495">SUSE bug 1225495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225499">SUSE bug 1225499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225500">SUSE bug 1225500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225501">SUSE bug 1225501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225502">SUSE bug 1225502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225506">SUSE bug 1225506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225508">SUSE bug 1225508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225510">SUSE bug 1225510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225513">SUSE bug 1225513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225515">SUSE bug 1225515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225529">SUSE bug 1225529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225530">SUSE bug 1225530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225532">SUSE bug 1225532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225534">SUSE bug 1225534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225535">SUSE bug 1225535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225548">SUSE bug 1225548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225549">SUSE bug 1225549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225550">SUSE bug 1225550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225553">SUSE bug 1225553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225554">SUSE bug 1225554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225555">SUSE bug 1225555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225556">SUSE bug 1225556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225557">SUSE bug 1225557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225559">SUSE bug 1225559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225560">SUSE bug 1225560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225565">SUSE bug 1225565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225566">SUSE bug 1225566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225568">SUSE bug 1225568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225569">SUSE bug 1225569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225570">SUSE bug 1225570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225571">SUSE bug 1225571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225572">SUSE bug 1225572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225577">SUSE bug 1225577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225583">SUSE bug 1225583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225584">SUSE bug 1225584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225587">SUSE bug 1225587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225588">SUSE bug 1225588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225589">SUSE bug 1225589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225590">SUSE bug 1225590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225591">SUSE bug 1225591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225592">SUSE bug 1225592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225593">SUSE bug 1225593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225595">SUSE bug 1225595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225599">SUSE bug 1225599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225616">SUSE bug 1225616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225640">SUSE bug 1225640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225642">SUSE bug 1225642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225705">SUSE bug 1225705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225708">SUSE bug 1225708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225715">SUSE bug 1225715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225720">SUSE bug 1225720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225722">SUSE bug 1225722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225734">SUSE bug 1225734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225735">SUSE bug 1225735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225747">SUSE bug 1225747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225748">SUSE bug 1225748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225756">SUSE bug 1225756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225761">SUSE bug 1225761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225766">SUSE bug 1225766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225775">SUSE bug 1225775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225810">SUSE bug 1225810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225820">SUSE bug 1225820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225829">SUSE bug 1225829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225835">SUSE bug 1225835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225842">SUSE bug 1225842</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-36788/">CVE-2020-36788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36788">CVE-2020-36788 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4148/">CVE-2021-4148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4148">CVE-2021-4148 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43527">CVE-2021-43527 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47358/">CVE-2021-47358 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47358">CVE-2021-47358 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47359/">CVE-2021-47359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47359">CVE-2021-47359 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47360/">CVE-2021-47360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47360">CVE-2021-47360 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47361/">CVE-2021-47361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47361">CVE-2021-47361 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47362/">CVE-2021-47362 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47362">CVE-2021-47362 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47363/">CVE-2021-47363 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47363">CVE-2021-47363 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47364/">CVE-2021-47364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47364">CVE-2021-47364 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47365/">CVE-2021-47365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47365">CVE-2021-47365 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-47366/">CVE-2021-47366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47366">CVE-2021-47366 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47367/">CVE-2021-47367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47367">CVE-2021-47367 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47368/">CVE-2021-47368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47368">CVE-2021-47368 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47369/">CVE-2021-47369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47369">CVE-2021-47369 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47370/">CVE-2021-47370 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47370">CVE-2021-47370 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47371/">CVE-2021-47371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47371">CVE-2021-47371 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47372/">CVE-2021-47372 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47372">CVE-2021-47372 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47373/">CVE-2021-47373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47373">CVE-2021-47373 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47374/">CVE-2021-47374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47374">CVE-2021-47374 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47375/">CVE-2021-47375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47375">CVE-2021-47375 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47376/">CVE-2021-47376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47376">CVE-2021-47376 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47378/">CVE-2021-47378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47378">CVE-2021-47378 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47379/">CVE-2021-47379 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47379">CVE-2021-47379 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47380/">CVE-2021-47380 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47380">CVE-2021-47380 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47381/">CVE-2021-47381 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47381">CVE-2021-47381 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47382/">CVE-2021-47382 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47382">CVE-2021-47382 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47383/">CVE-2021-47383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47383">CVE-2021-47383 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47384/">CVE-2021-47384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47384">CVE-2021-47384 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47385/">CVE-2021-47385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47385">CVE-2021-47385 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47386/">CVE-2021-47386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47386">CVE-2021-47386 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47387/">CVE-2021-47387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47387">CVE-2021-47387 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47388/">CVE-2021-47388 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47388">CVE-2021-47388 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47389/">CVE-2021-47389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47389">CVE-2021-47389 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47390/">CVE-2021-47390 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47390">CVE-2021-47390 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47391/">CVE-2021-47391 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47391">CVE-2021-47391 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47392/">CVE-2021-47392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47392">CVE-2021-47392 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47393/">CVE-2021-47393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47393">CVE-2021-47393 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47394/">CVE-2021-47394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47394">CVE-2021-47394 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47395/">CVE-2021-47395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47395">CVE-2021-47395 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47396/">CVE-2021-47396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47396">CVE-2021-47396 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47397/">CVE-2021-47397 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47397">CVE-2021-47397 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47398/">CVE-2021-47398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47398">CVE-2021-47398 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47399/">CVE-2021-47399 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47399">CVE-2021-47399 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47400/">CVE-2021-47400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47400">CVE-2021-47400 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47401/">CVE-2021-47401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47401">CVE-2021-47401 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47402/">CVE-2021-47402 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47402">CVE-2021-47402 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47403/">CVE-2021-47403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47403">CVE-2021-47403 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47404/">CVE-2021-47404 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47404">CVE-2021-47404 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47405/">CVE-2021-47405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47405">CVE-2021-47405 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47406/">CVE-2021-47406 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47406">CVE-2021-47406 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47407/">CVE-2021-47407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47407">CVE-2021-47407 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47408/">CVE-2021-47408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47408">CVE-2021-47408 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47409/">CVE-2021-47409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47409">CVE-2021-47409 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47410/">CVE-2021-47410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47410">CVE-2021-47410 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47412/">CVE-2021-47412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47412">CVE-2021-47412 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47413/">CVE-2021-47413 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47413">CVE-2021-47413 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47414/">CVE-2021-47414 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47414">CVE-2021-47414 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47415/">CVE-2021-47415 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47415">CVE-2021-47415 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47416/">CVE-2021-47416 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47416">CVE-2021-47416 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47417/">CVE-2021-47417 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47417">CVE-2021-47417 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47418/">CVE-2021-47418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47418">CVE-2021-47418 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47419/">CVE-2021-47419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47419">CVE-2021-47419 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47420/">CVE-2021-47420 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47420">CVE-2021-47420 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47421/">CVE-2021-47421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47421">CVE-2021-47421 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47422/">CVE-2021-47422 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47422">CVE-2021-47422 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47423/">CVE-2021-47423 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47423">CVE-2021-47423 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47424/">CVE-2021-47424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47424">CVE-2021-47424 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47425/">CVE-2021-47425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47425">CVE-2021-47425 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47426/">CVE-2021-47426 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47426">CVE-2021-47426 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47427/">CVE-2021-47427 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47427">CVE-2021-47427 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47428/">CVE-2021-47428 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47428">CVE-2021-47428 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47429/">CVE-2021-47429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47429">CVE-2021-47429 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47430/">CVE-2021-47430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47430">CVE-2021-47430 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47431/">CVE-2021-47431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47431">CVE-2021-47431 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-47433/">CVE-2021-47433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47433">CVE-2021-47433 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47434/">CVE-2021-47434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47434">CVE-2021-47434 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47435/">CVE-2021-47435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47435">CVE-2021-47435 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47436/">CVE-2021-47436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47436">CVE-2021-47436 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47437/">CVE-2021-47437 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47437">CVE-2021-47437 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47438/">CVE-2021-47438 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47438">CVE-2021-47438 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47439/">CVE-2021-47439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47439">CVE-2021-47439 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47440/">CVE-2021-47440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47440">CVE-2021-47440 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47441/">CVE-2021-47441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47441">CVE-2021-47441 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47442/">CVE-2021-47442 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47442">CVE-2021-47442 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47443/">CVE-2021-47443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47443">CVE-2021-47443 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47444/">CVE-2021-47444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47444">CVE-2021-47444 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47445/">CVE-2021-47445 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47445">CVE-2021-47445 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47446/">CVE-2021-47446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47446">CVE-2021-47446 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47447/">CVE-2021-47447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47447">CVE-2021-47447 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47448/">CVE-2021-47448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47448">CVE-2021-47448 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47449/">CVE-2021-47449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47449">CVE-2021-47449 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47450/">CVE-2021-47450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47450">CVE-2021-47450 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47451/">CVE-2021-47451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47451">CVE-2021-47451 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47452/">CVE-2021-47452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47452">CVE-2021-47452 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47453/">CVE-2021-47453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47453">CVE-2021-47453 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47454/">CVE-2021-47454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47454">CVE-2021-47454 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47455/">CVE-2021-47455 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47455">CVE-2021-47455 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47456/">CVE-2021-47456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47456">CVE-2021-47456 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47457/">CVE-2021-47457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47457">CVE-2021-47457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47458/">CVE-2021-47458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47458">CVE-2021-47458 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47459/">CVE-2021-47459 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47459">CVE-2021-47459 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47460/">CVE-2021-47460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47460">CVE-2021-47460 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47461/">CVE-2021-47461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47461">CVE-2021-47461 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47462/">CVE-2021-47462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47462">CVE-2021-47462 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47463/">CVE-2021-47463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47463">CVE-2021-47463 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47464/">CVE-2021-47464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47464">CVE-2021-47464 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47465/">CVE-2021-47465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47465">CVE-2021-47465 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47466/">CVE-2021-47466 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47466">CVE-2021-47466 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47467/">CVE-2021-47467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47467">CVE-2021-47467 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47468/">CVE-2021-47468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47468">CVE-2021-47468 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47469/">CVE-2021-47469 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47469">CVE-2021-47469 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47470/">CVE-2021-47470 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47470">CVE-2021-47470 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47471/">CVE-2021-47471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47471">CVE-2021-47471 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47472/">CVE-2021-47472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47472">CVE-2021-47472 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47473/">CVE-2021-47473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47473">CVE-2021-47473 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47474/">CVE-2021-47474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47474">CVE-2021-47474 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47475/">CVE-2021-47475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47475">CVE-2021-47475 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47476/">CVE-2021-47476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47476">CVE-2021-47476 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47477/">CVE-2021-47477 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47477">CVE-2021-47477 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47478/">CVE-2021-47478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47478">CVE-2021-47478 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47479/">CVE-2021-47479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47479">CVE-2021-47479 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47480/">CVE-2021-47480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47480">CVE-2021-47480 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47481/">CVE-2021-47481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47481">CVE-2021-47481 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47482/">CVE-2021-47482 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47482">CVE-2021-47482 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47483/">CVE-2021-47483 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47483">CVE-2021-47483 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47484/">CVE-2021-47484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47484">CVE-2021-47484 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47485/">CVE-2021-47485 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47485">CVE-2021-47485 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47486/">CVE-2021-47486 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47486">CVE-2021-47486 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47488/">CVE-2021-47488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47488">CVE-2021-47488 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47489/">CVE-2021-47489 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47489">CVE-2021-47489 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47490/">CVE-2021-47490 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47490">CVE-2021-47490 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47491/">CVE-2021-47491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47491">CVE-2021-47491 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47492/">CVE-2021-47492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47492">CVE-2021-47492 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47493/">CVE-2021-47493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47493">CVE-2021-47493 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47494/">CVE-2021-47494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47494">CVE-2021-47494 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47495/">CVE-2021-47495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47495">CVE-2021-47495 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47496/">CVE-2021-47496 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47496">CVE-2021-47496 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47497/">CVE-2021-47497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47497">CVE-2021-47497 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47498/">CVE-2021-47498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47498">CVE-2021-47498 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47499/">CVE-2021-47499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47499">CVE-2021-47499 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47500/">CVE-2021-47500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47500">CVE-2021-47500 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47501/">CVE-2021-47501 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47501">CVE-2021-47501 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47502/">CVE-2021-47502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47502">CVE-2021-47502 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47503/">CVE-2021-47503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47503">CVE-2021-47503 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47504/">CVE-2021-47504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47504">CVE-2021-47504 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47505/">CVE-2021-47505 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47505">CVE-2021-47505 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47506/">CVE-2021-47506 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47506">CVE-2021-47506 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47507/">CVE-2021-47507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47507">CVE-2021-47507 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47508/">CVE-2021-47508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47508">CVE-2021-47508 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47509/">CVE-2021-47509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47509">CVE-2021-47509 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47510/">CVE-2021-47510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47510">CVE-2021-47510 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47511/">CVE-2021-47511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47511">CVE-2021-47511 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47512/">CVE-2021-47512 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47512">CVE-2021-47512 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47513/">CVE-2021-47513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47513">CVE-2021-47513 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47514/">CVE-2021-47514 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47514">CVE-2021-47514 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47516/">CVE-2021-47516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47516">CVE-2021-47516 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47518/">CVE-2021-47518 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47518">CVE-2021-47518 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47520/">CVE-2021-47520 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47520">CVE-2021-47520 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47521/">CVE-2021-47521 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47521">CVE-2021-47521 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47522/">CVE-2021-47522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47522">CVE-2021-47522 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47523/">CVE-2021-47523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47523">CVE-2021-47523 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47524/">CVE-2021-47524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47524">CVE-2021-47524 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47525/">CVE-2021-47525 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47525">CVE-2021-47525 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47526/">CVE-2021-47526 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47526">CVE-2021-47526 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47528/">CVE-2021-47528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47528">CVE-2021-47528 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47529/">CVE-2021-47529 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47529">CVE-2021-47529 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47530/">CVE-2021-47530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47530">CVE-2021-47530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47531/">CVE-2021-47531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47531">CVE-2021-47531 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47532/">CVE-2021-47532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47532">CVE-2021-47532 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47533/">CVE-2021-47533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47533">CVE-2021-47533 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47534/">CVE-2021-47534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47534">CVE-2021-47534 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47535/">CVE-2021-47535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47535">CVE-2021-47535 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47536/">CVE-2021-47536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47536">CVE-2021-47536 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47537/">CVE-2021-47537 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47537">CVE-2021-47537 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47540/">CVE-2021-47540 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47540">CVE-2021-47540 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47541/">CVE-2021-47541 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47541">CVE-2021-47541 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47542/">CVE-2021-47542 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47542">CVE-2021-47542 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47544/">CVE-2021-47544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47544">CVE-2021-47544 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47548/">CVE-2021-47548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47548">CVE-2021-47548 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47549/">CVE-2021-47549 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47549">CVE-2021-47549 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47550/">CVE-2021-47550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47550">CVE-2021-47550 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47551/">CVE-2021-47551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47551">CVE-2021-47551 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47552/">CVE-2021-47552 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47552">CVE-2021-47552 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47553/">CVE-2021-47553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47553">CVE-2021-47553 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47554/">CVE-2021-47554 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47554">CVE-2021-47554 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47555/">CVE-2021-47555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47555">CVE-2021-47555 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47556/">CVE-2021-47556 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47556">CVE-2021-47556 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47557/">CVE-2021-47557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47557">CVE-2021-47557 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47558/">CVE-2021-47558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47558">CVE-2021-47558 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47559/">CVE-2021-47559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47559">CVE-2021-47559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47560/">CVE-2021-47560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47560">CVE-2021-47560 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47562/">CVE-2021-47562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47562">CVE-2021-47562 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47563/">CVE-2021-47563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47563">CVE-2021-47563 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47564/">CVE-2021-47564 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47564">CVE-2021-47564 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47565/">CVE-2021-47565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47565">CVE-2021-47565 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47569/">CVE-2021-47569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47569">CVE-2021-47569 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48633/">CVE-2022-48633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48633">CVE-2022-48633 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48662/">CVE-2022-48662 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48662">CVE-2022-48662 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48669/">CVE-2022-48669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48669">CVE-2022-48669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48689/">CVE-2022-48689 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48689">CVE-2022-48689 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48691/">CVE-2022-48691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48691">CVE-2022-48691 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48699/">CVE-2022-48699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48699">CVE-2022-48699 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48705/">CVE-2022-48705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48705">CVE-2022-48705 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48708/">CVE-2022-48708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48708">CVE-2022-48708 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48709/">CVE-2022-48709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48709">CVE-2022-48709 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48710/">CVE-2022-48710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48710">CVE-2022-48710 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0160/">CVE-2023-0160 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0160">CVE-2023-0160 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1829/">CVE-2023-1829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1829">CVE-2023-1829 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42755/">CVE-2023-42755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42755">CVE-2023-42755 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47233/">CVE-2023-47233 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47233">CVE-2023-47233 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52586/">CVE-2023-52586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52586">CVE-2023-52586 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52591/">CVE-2023-52591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52591">CVE-2023-52591 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52618/">CVE-2023-52618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52618">CVE-2023-52618 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52642/">CVE-2023-52642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52642">CVE-2023-52642 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52643/">CVE-2023-52643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52643">CVE-2023-52643 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52644/">CVE-2023-52644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52644">CVE-2023-52644 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52646/">CVE-2023-52646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52646">CVE-2023-52646 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52650/">CVE-2023-52650 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52650">CVE-2023-52650 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52653/">CVE-2023-52653 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52653">CVE-2023-52653 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52654/">CVE-2023-52654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52654">CVE-2023-52654 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52655/">CVE-2023-52655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52655">CVE-2023-52655 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52656/">CVE-2023-52656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52656">CVE-2023-52656 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52657/">CVE-2023-52657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52657">CVE-2023-52657 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52659/">CVE-2023-52659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52659">CVE-2023-52659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52660/">CVE-2023-52660 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52660">CVE-2023-52660 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-52661/">CVE-2023-52661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52661">CVE-2023-52661 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52662/">CVE-2023-52662 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52662">CVE-2023-52662 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52664/">CVE-2023-52664 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52664">CVE-2023-52664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52669/">CVE-2023-52669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52669">CVE-2023-52669 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52671/">CVE-2023-52671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52671">CVE-2023-52671 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52674/">CVE-2023-52674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52674">CVE-2023-52674 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52676/">CVE-2023-52676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52676">CVE-2023-52676 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52678/">CVE-2023-52678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52678">CVE-2023-52678 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52679/">CVE-2023-52679 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52679">CVE-2023-52679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52680/">CVE-2023-52680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52680">CVE-2023-52680 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52683/">CVE-2023-52683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52683">CVE-2023-52683 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52685/">CVE-2023-52685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52685">CVE-2023-52685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52686/">CVE-2023-52686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52686">CVE-2023-52686 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52690/">CVE-2023-52690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52690">CVE-2023-52690 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52691/">CVE-2023-52691 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52691">CVE-2023-52691 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52692/">CVE-2023-52692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52692">CVE-2023-52692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52693/">CVE-2023-52693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52693">CVE-2023-52693 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52694/">CVE-2023-52694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52694">CVE-2023-52694 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52696/">CVE-2023-52696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52696">CVE-2023-52696 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52698/">CVE-2023-52698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52698">CVE-2023-52698 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52699/">CVE-2023-52699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52699">CVE-2023-52699 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52702/">CVE-2023-52702 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52702">CVE-2023-52702 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52703/">CVE-2023-52703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52703">CVE-2023-52703 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52705/">CVE-2023-52705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52705">CVE-2023-52705 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52707/">CVE-2023-52707 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52707">CVE-2023-52707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52708/">CVE-2023-52708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52708">CVE-2023-52708 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52730/">CVE-2023-52730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52730">CVE-2023-52730 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52731/">CVE-2023-52731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52731">CVE-2023-52731 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52732/">CVE-2023-52732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52732">CVE-2023-52732 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52733/">CVE-2023-52733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52733">CVE-2023-52733 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52736/">CVE-2023-52736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52736">CVE-2023-52736 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52738/">CVE-2023-52738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52738">CVE-2023-52738 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52739/">CVE-2023-52739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52739">CVE-2023-52739 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52740/">CVE-2023-52740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52740">CVE-2023-52740 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52741/">CVE-2023-52741 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52741">CVE-2023-52741 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52742/">CVE-2023-52742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52742">CVE-2023-52742 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52743/">CVE-2023-52743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52743">CVE-2023-52743 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52744/">CVE-2023-52744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52744">CVE-2023-52744 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52745/">CVE-2023-52745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52745">CVE-2023-52745 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52746/">CVE-2023-52746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52746">CVE-2023-52746 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52747/">CVE-2023-52747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52747">CVE-2023-52747 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52753/">CVE-2023-52753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52753">CVE-2023-52753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52754/">CVE-2023-52754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52754">CVE-2023-52754 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52756/">CVE-2023-52756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52756">CVE-2023-52756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52757/">CVE-2023-52757 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52757">CVE-2023-52757 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52759/">CVE-2023-52759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52759">CVE-2023-52759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52763/">CVE-2023-52763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52763">CVE-2023-52763 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52764/">CVE-2023-52764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52764">CVE-2023-52764 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52766/">CVE-2023-52766 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52766">CVE-2023-52766 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52773/">CVE-2023-52773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52773">CVE-2023-52773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52774/">CVE-2023-52774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52774">CVE-2023-52774 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52777/">CVE-2023-52777 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52777">CVE-2023-52777 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52781/">CVE-2023-52781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52781">CVE-2023-52781 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52788/">CVE-2023-52788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52788">CVE-2023-52788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52789/">CVE-2023-52789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52789">CVE-2023-52789 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52791/">CVE-2023-52791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52791">CVE-2023-52791 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52795/">CVE-2023-52795 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52795">CVE-2023-52795 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52796/">CVE-2023-52796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52796">CVE-2023-52796 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52798/">CVE-2023-52798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52798">CVE-2023-52798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52799/">CVE-2023-52799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52799">CVE-2023-52799 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52800/">CVE-2023-52800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52800">CVE-2023-52800 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52803/">CVE-2023-52803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52803">CVE-2023-52803 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52804/">CVE-2023-52804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52804">CVE-2023-52804 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52805/">CVE-2023-52805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52805">CVE-2023-52805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52806/">CVE-2023-52806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52806">CVE-2023-52806 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52807/">CVE-2023-52807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52807">CVE-2023-52807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52808/">CVE-2023-52808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52808">CVE-2023-52808 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52809/">CVE-2023-52809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52809">CVE-2023-52809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52810/">CVE-2023-52810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52810">CVE-2023-52810 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52811/">CVE-2023-52811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52811">CVE-2023-52811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52814/">CVE-2023-52814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52814">CVE-2023-52814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52815/">CVE-2023-52815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52815">CVE-2023-52815 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52816/">CVE-2023-52816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52816">CVE-2023-52816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52817/">CVE-2023-52817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52817">CVE-2023-52817 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52818/">CVE-2023-52818 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52818">CVE-2023-52818 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52819/">CVE-2023-52819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52819">CVE-2023-52819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52821/">CVE-2023-52821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52821">CVE-2023-52821 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52825/">CVE-2023-52825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52825">CVE-2023-52825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52826/">CVE-2023-52826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52826">CVE-2023-52826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52832/">CVE-2023-52832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52832">CVE-2023-52832 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52833/">CVE-2023-52833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52833">CVE-2023-52833 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52834/">CVE-2023-52834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52834">CVE-2023-52834 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52838/">CVE-2023-52838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52838">CVE-2023-52838 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52840/">CVE-2023-52840 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52840">CVE-2023-52840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52841/">CVE-2023-52841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52841">CVE-2023-52841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52844/">CVE-2023-52844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52844">CVE-2023-52844 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52847/">CVE-2023-52847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52847">CVE-2023-52847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52851/">CVE-2023-52851 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52851">CVE-2023-52851 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52853/">CVE-2023-52853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52853">CVE-2023-52853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52854/">CVE-2023-52854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52854">CVE-2023-52854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52855/">CVE-2023-52855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52855">CVE-2023-52855 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52856/">CVE-2023-52856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52856">CVE-2023-52856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52858/">CVE-2023-52858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52858">CVE-2023-52858 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52860/">CVE-2023-52860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52860">CVE-2023-52860 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52861/">CVE-2023-52861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52861">CVE-2023-52861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52864/">CVE-2023-52864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52864">CVE-2023-52864 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52865/">CVE-2023-52865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52865">CVE-2023-52865 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52867/">CVE-2023-52867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52867">CVE-2023-52867 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52868/">CVE-2023-52868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52868">CVE-2023-52868 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52870/">CVE-2023-52870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52870">CVE-2023-52870 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52871/">CVE-2023-52871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52871">CVE-2023-52871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52872/">CVE-2023-52872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52872">CVE-2023-52872 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52873/">CVE-2023-52873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52873">CVE-2023-52873 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52875/">CVE-2023-52875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52875">CVE-2023-52875 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52876/">CVE-2023-52876 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52876">CVE-2023-52876 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52877/">CVE-2023-52877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52877">CVE-2023-52877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52878/">CVE-2023-52878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52878">CVE-2023-52878 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52880/">CVE-2023-52880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52880">CVE-2023-52880 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6531/">CVE-2023-6531 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6531">CVE-2023-6531 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2201/">CVE-2024-2201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2201">CVE-2024-2201 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26597/">CVE-2024-26597 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26597">CVE-2024-26597 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26643/">CVE-2024-26643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26643">CVE-2024-26643 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26679/">CVE-2024-26679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26679">CVE-2024-26679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26692/">CVE-2024-26692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26692">CVE-2024-26692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26698/">CVE-2024-26698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26698">CVE-2024-26698 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26700/">CVE-2024-26700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26700">CVE-2024-26700 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26715/">CVE-2024-26715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26715">CVE-2024-26715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26739/">CVE-2024-26739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26739">CVE-2024-26739 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26742/">CVE-2024-26742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26742">CVE-2024-26742 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26748/">CVE-2024-26748 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26748">CVE-2024-26748 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26758/">CVE-2024-26758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26758">CVE-2024-26758 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26764/">CVE-2024-26764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26764">CVE-2024-26764 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26775/">CVE-2024-26775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26775">CVE-2024-26775 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26777/">CVE-2024-26777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26777">CVE-2024-26777 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26778/">CVE-2024-26778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26778">CVE-2024-26778 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26788/">CVE-2024-26788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26788">CVE-2024-26788 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26791/">CVE-2024-26791 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26791">CVE-2024-26791 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26801/">CVE-2024-26801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26801">CVE-2024-26801 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26822/">CVE-2024-26822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26822">CVE-2024-26822 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26828/">CVE-2024-26828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26828">CVE-2024-26828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26829/">CVE-2024-26829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26829">CVE-2024-26829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26838/">CVE-2024-26838 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26838">CVE-2024-26838 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26839/">CVE-2024-26839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26839">CVE-2024-26839 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26840/">CVE-2024-26840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26840">CVE-2024-26840 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26846/">CVE-2024-26846 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26846">CVE-2024-26846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26859/">CVE-2024-26859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26859">CVE-2024-26859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26870/">CVE-2024-26870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26870">CVE-2024-26870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26874/">CVE-2024-26874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26874">CVE-2024-26874 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26876/">CVE-2024-26876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26876">CVE-2024-26876 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26877/">CVE-2024-26877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26877">CVE-2024-26877 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26880/">CVE-2024-26880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26880">CVE-2024-26880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26889/">CVE-2024-26889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26889">CVE-2024-26889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26894/">CVE-2024-26894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26894">CVE-2024-26894 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26900/">CVE-2024-26900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26900">CVE-2024-26900 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26907/">CVE-2024-26907 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26907">CVE-2024-26907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26915/">CVE-2024-26915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26915">CVE-2024-26915 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26916/">CVE-2024-26916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26916">CVE-2024-26916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26919/">CVE-2024-26919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26919">CVE-2024-26919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26920/">CVE-2024-26920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26920">CVE-2024-26920 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26921/">CVE-2024-26921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26921">CVE-2024-26921 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26922/">CVE-2024-26922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26922">CVE-2024-26922 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26925/">CVE-2024-26925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26925">CVE-2024-26925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26928/">CVE-2024-26928 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26928">CVE-2024-26928 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26929/">CVE-2024-26929 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26929">CVE-2024-26929 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26930/">CVE-2024-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26930">CVE-2024-26930 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26931/">CVE-2024-26931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26931">CVE-2024-26931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26933/">CVE-2024-26933 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26933">CVE-2024-26933 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26934/">CVE-2024-26934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26934">CVE-2024-26934 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26935/">CVE-2024-26935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26935">CVE-2024-26935 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26937/">CVE-2024-26937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26937">CVE-2024-26937 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26938/">CVE-2024-26938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26938">CVE-2024-26938 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26939/">CVE-2024-26939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26939">CVE-2024-26939 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26940/">CVE-2024-26940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26940">CVE-2024-26940 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26943/">CVE-2024-26943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26943">CVE-2024-26943 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26957/">CVE-2024-26957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26957">CVE-2024-26957 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26958/">CVE-2024-26958 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26958">CVE-2024-26958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26964/">CVE-2024-26964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26964">CVE-2024-26964 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26974/">CVE-2024-26974 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26974">CVE-2024-26974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26977/">CVE-2024-26977 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26977">CVE-2024-26977 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26979/">CVE-2024-26979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26979">CVE-2024-26979 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26984/">CVE-2024-26984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26984">CVE-2024-26984 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26988/">CVE-2024-26988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26988">CVE-2024-26988 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26989/">CVE-2024-26989 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26989">CVE-2024-26989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26994/">CVE-2024-26994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26994">CVE-2024-26994 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26996/">CVE-2024-26996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26996">CVE-2024-26996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26997/">CVE-2024-26997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26997">CVE-2024-26997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26999/">CVE-2024-26999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26999">CVE-2024-26999 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27000/">CVE-2024-27000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27000">CVE-2024-27000 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27001/">CVE-2024-27001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27001">CVE-2024-27001 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27004/">CVE-2024-27004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27004">CVE-2024-27004 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-27008/">CVE-2024-27008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27008">CVE-2024-27008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27028/">CVE-2024-27028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27028">CVE-2024-27028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27037/">CVE-2024-27037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27037">CVE-2024-27037 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-27042/">CVE-2024-27042 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27042">CVE-2024-27042 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-27045/">CVE-2024-27045 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27045">CVE-2024-27045 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27047/">CVE-2024-27047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27047">CVE-2024-27047 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27051/">CVE-2024-27051 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27051">CVE-2024-27051 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27052/">CVE-2024-27052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27052">CVE-2024-27052 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27053/">CVE-2024-27053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27053">CVE-2024-27053 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27054/">CVE-2024-27054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27054">CVE-2024-27054 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27059/">CVE-2024-27059 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27059">CVE-2024-27059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27072/">CVE-2024-27072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27072">CVE-2024-27072 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27073/">CVE-2024-27073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27073">CVE-2024-27073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27074/">CVE-2024-27074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27074">CVE-2024-27074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27075/">CVE-2024-27075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27075">CVE-2024-27075 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27076/">CVE-2024-27076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27076">CVE-2024-27076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27077/">CVE-2024-27077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27077">CVE-2024-27077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27078/">CVE-2024-27078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27078">CVE-2024-27078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27388/">CVE-2024-27388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27388">CVE-2024-27388 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27393/">CVE-2024-27393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27393">CVE-2024-27393 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27395/">CVE-2024-27395 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27395">CVE-2024-27395 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27396/">CVE-2024-27396 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27396">CVE-2024-27396 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27398/">CVE-2024-27398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27398">CVE-2024-27398 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27399/">CVE-2024-27399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27399">CVE-2024-27399 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27400/">CVE-2024-27400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27400">CVE-2024-27400 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27401/">CVE-2024-27401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27401">CVE-2024-27401 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27405/">CVE-2024-27405 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27405">CVE-2024-27405 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27410/">CVE-2024-27410 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27410">CVE-2024-27410 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27412/">CVE-2024-27412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27412">CVE-2024-27412 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27413/">CVE-2024-27413 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27413">CVE-2024-27413 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27416/">CVE-2024-27416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27416">CVE-2024-27416 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27417/">CVE-2024-27417 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27417">CVE-2024-27417 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-27419/">CVE-2024-27419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27419">CVE-2024-27419 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27431/">CVE-2024-27431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27431">CVE-2024-27431 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27435/">CVE-2024-27435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27435">CVE-2024-27435 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27436/">CVE-2024-27436 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27436">CVE-2024-27436 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35789/">CVE-2024-35789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35789">CVE-2024-35789 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35791/">CVE-2024-35791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35791">CVE-2024-35791 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35796/">CVE-2024-35796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35796">CVE-2024-35796 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35799/">CVE-2024-35799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35799">CVE-2024-35799 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35801/">CVE-2024-35801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35801">CVE-2024-35801 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35804/">CVE-2024-35804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35804">CVE-2024-35804 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35806/">CVE-2024-35806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35806">CVE-2024-35806 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35809/">CVE-2024-35809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35809">CVE-2024-35809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35811/">CVE-2024-35811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35811">CVE-2024-35811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35812/">CVE-2024-35812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35812">CVE-2024-35812 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35813/">CVE-2024-35813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35813">CVE-2024-35813 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35815/">CVE-2024-35815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35815">CVE-2024-35815 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35817/">CVE-2024-35817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35817">CVE-2024-35817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35821/">CVE-2024-35821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35821">CVE-2024-35821 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35822/">CVE-2024-35822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35822">CVE-2024-35822 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35823/">CVE-2024-35823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35823">CVE-2024-35823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35825/">CVE-2024-35825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35825">CVE-2024-35825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35828/">CVE-2024-35828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35828">CVE-2024-35828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35829/">CVE-2024-35829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35829">CVE-2024-35829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35830/">CVE-2024-35830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35830">CVE-2024-35830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35833/">CVE-2024-35833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35833">CVE-2024-35833 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35845/">CVE-2024-35845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35845">CVE-2024-35845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35847/">CVE-2024-35847 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35847">CVE-2024-35847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35849/">CVE-2024-35849 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35849">CVE-2024-35849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35851/">CVE-2024-35851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35851">CVE-2024-35851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35852/">CVE-2024-35852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35852">CVE-2024-35852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35854/">CVE-2024-35854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35854">CVE-2024-35854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35860/">CVE-2024-35860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35860">CVE-2024-35860 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35861/">CVE-2024-35861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35861">CVE-2024-35861 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35862/">CVE-2024-35862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35862">CVE-2024-35862 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35863/">CVE-2024-35863 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35863">CVE-2024-35863 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35864/">CVE-2024-35864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35864">CVE-2024-35864 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35865/">CVE-2024-35865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35865">CVE-2024-35865 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35866/">CVE-2024-35866 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35866">CVE-2024-35866 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35867/">CVE-2024-35867 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35867">CVE-2024-35867 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35868/">CVE-2024-35868 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35868">CVE-2024-35868 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35869/">CVE-2024-35869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35869">CVE-2024-35869 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35870/">CVE-2024-35870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35870">CVE-2024-35870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35872/">CVE-2024-35872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35872">CVE-2024-35872 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35875/">CVE-2024-35875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35875">CVE-2024-35875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35877/">CVE-2024-35877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35877">CVE-2024-35877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35878/">CVE-2024-35878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35878">CVE-2024-35878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35879/">CVE-2024-35879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35879">CVE-2024-35879 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35885/">CVE-2024-35885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35885">CVE-2024-35885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35887/">CVE-2024-35887 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35887">CVE-2024-35887 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35895/">CVE-2024-35895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35895">CVE-2024-35895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35901/">CVE-2024-35901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35901">CVE-2024-35901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35904/">CVE-2024-35904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35904">CVE-2024-35904 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35905/">CVE-2024-35905 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35905">CVE-2024-35905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35907/">CVE-2024-35907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35907">CVE-2024-35907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35912/">CVE-2024-35912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35912">CVE-2024-35912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-35914/">CVE-2024-35914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35914">CVE-2024-35914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35915/">CVE-2024-35915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35915">CVE-2024-35915 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35922/">CVE-2024-35922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35922">CVE-2024-35922 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35924/">CVE-2024-35924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35924">CVE-2024-35924 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35930/">CVE-2024-35930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35930">CVE-2024-35930 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35932/">CVE-2024-35932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35932">CVE-2024-35932 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35933/">CVE-2024-35933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35933">CVE-2024-35933 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35935/">CVE-2024-35935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35935">CVE-2024-35935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35936/">CVE-2024-35936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35936">CVE-2024-35936 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35938/">CVE-2024-35938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35938">CVE-2024-35938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35939/">CVE-2024-35939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35939">CVE-2024-35939 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35940/">CVE-2024-35940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35940">CVE-2024-35940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35943/">CVE-2024-35943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35943">CVE-2024-35943 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-35944/">CVE-2024-35944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35944">CVE-2024-35944 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35947/">CVE-2024-35947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35947">CVE-2024-35947 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35950/">CVE-2024-35950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35950">CVE-2024-35950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35951/">CVE-2024-35951 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35951">CVE-2024-35951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35952/">CVE-2024-35952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35952">CVE-2024-35952 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35955/">CVE-2024-35955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35955">CVE-2024-35955 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35959/">CVE-2024-35959 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35959">CVE-2024-35959 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35963/">CVE-2024-35963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35963">CVE-2024-35963 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35964/">CVE-2024-35964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35964">CVE-2024-35964 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35965/">CVE-2024-35965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35965">CVE-2024-35965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35966/">CVE-2024-35966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35966">CVE-2024-35966 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35967/">CVE-2024-35967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35967">CVE-2024-35967 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35969/">CVE-2024-35969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35969">CVE-2024-35969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35973/">CVE-2024-35973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35973">CVE-2024-35973 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35976/">CVE-2024-35976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35976">CVE-2024-35976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35978/">CVE-2024-35978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35978">CVE-2024-35978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35982/">CVE-2024-35982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35982">CVE-2024-35982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35984/">CVE-2024-35984 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35984">CVE-2024-35984 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35989/">CVE-2024-35989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35989">CVE-2024-35989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35990/">CVE-2024-35990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35990">CVE-2024-35990 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35998/">CVE-2024-35998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35998">CVE-2024-35998 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-35999/">CVE-2024-35999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35999">CVE-2024-35999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36006/">CVE-2024-36006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36006">CVE-2024-36006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36007/">CVE-2024-36007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36007">CVE-2024-36007 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36012/">CVE-2024-36012 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36012">CVE-2024-36012 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36014/">CVE-2024-36014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36014">CVE-2024-36014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36015/">CVE-2024-36015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36015">CVE-2024-36015 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36016/">CVE-2024-36016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36016">CVE-2024-36016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36026/">CVE-2024-36026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36026">CVE-2024-36026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36029/">CVE-2024-36029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36029">CVE-2024-36029 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36032/">CVE-2024-36032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36032">CVE-2024-36032 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36880/">CVE-2024-36880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36880">CVE-2024-36880 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36893/">CVE-2024-36893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36893">CVE-2024-36893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36896/">CVE-2024-36896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36896">CVE-2024-36896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36897/">CVE-2024-36897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36897">CVE-2024-36897 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36906/">CVE-2024-36906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36906">CVE-2024-36906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36918/">CVE-2024-36918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36918">CVE-2024-36918 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36924/">CVE-2024-36924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36924">CVE-2024-36924 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36926/">CVE-2024-36926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36926">CVE-2024-36926 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36928/">CVE-2024-36928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36928">CVE-2024-36928 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36931/">CVE-2024-36931 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36931">CVE-2024-36931 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36938/">CVE-2024-36938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36938">CVE-2024-36938 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36940/">CVE-2024-36940 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36940">CVE-2024-36940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36941/">CVE-2024-36941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36941">CVE-2024-36941 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36942/">CVE-2024-36942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36942">CVE-2024-36942 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36944/">CVE-2024-36944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36944">CVE-2024-36944 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36947/">CVE-2024-36947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36947">CVE-2024-36947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36950/">CVE-2024-36950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36950">CVE-2024-36950 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36952/">CVE-2024-36952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36952">CVE-2024-36952 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36955/">CVE-2024-36955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36955">CVE-2024-36955 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36959/">CVE-2024-36959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36959">CVE-2024-36959 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009868985" comment="cluster-md-kmp-64kb-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868986" comment="cluster-md-kmp-default-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868987" comment="dlm-kmp-64kb-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868988" comment="dlm-kmp-default-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868989" comment="dtb-allwinner-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868990" comment="dtb-altera-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868991" comment="dtb-amazon-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868992" comment="dtb-amd-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868993" comment="dtb-amlogic-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868994" comment="dtb-apm-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868995" comment="dtb-apple-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868996" comment="dtb-arm-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868997" comment="dtb-broadcom-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868998" comment="dtb-cavium-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009868999" comment="dtb-exynos-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869000" comment="dtb-freescale-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869001" comment="dtb-hisilicon-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869002" comment="dtb-lg-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869003" comment="dtb-marvell-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869004" comment="dtb-mediatek-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869005" comment="dtb-nvidia-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869006" comment="dtb-qcom-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869007" comment="dtb-renesas-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869008" comment="dtb-rockchip-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869009" comment="dtb-socionext-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869010" comment="dtb-sprd-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869011" comment="dtb-xilinx-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869012" comment="gfs2-kmp-64kb-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869013" comment="gfs2-kmp-default-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869014" comment="kernel-64kb-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869015" comment="kernel-64kb-devel-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869016" comment="kernel-64kb-extra-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869017" comment="kernel-64kb-livepatch-devel-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869018" comment="kernel-64kb-optional-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869019" comment="kernel-debug-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869020" comment="kernel-debug-devel-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869021" comment="kernel-debug-livepatch-devel-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869022" comment="kernel-debug-vdso-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869023" comment="kernel-default-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869024" comment="kernel-default-base-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869025" comment="kernel-default-base-rebuild-5.14.21-150500.55.68.1.150500.6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869026" comment="kernel-default-devel-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869027" comment="kernel-default-extra-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869028" comment="kernel-default-livepatch-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869029" comment="kernel-default-livepatch-devel-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869030" comment="kernel-default-optional-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869031" comment="kernel-default-vdso-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869032" comment="kernel-devel-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869033" comment="kernel-docs-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869034" comment="kernel-docs-html-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869035" comment="kernel-kvmsmall-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869036" comment="kernel-kvmsmall-devel-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869037" comment="kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869038" comment="kernel-kvmsmall-vdso-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869039" comment="kernel-macros-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869040" comment="kernel-obs-build-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869041" comment="kernel-obs-qa-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869042" comment="kernel-source-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869043" comment="kernel-source-vanilla-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869044" comment="kernel-syms-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869045" comment="kernel-zfcpdump-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869046" comment="kselftests-kmp-64kb-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869047" comment="kselftests-kmp-default-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869048" comment="ocfs2-kmp-64kb-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869049" comment="ocfs2-kmp-default-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869050" comment="reiserfs-kmp-64kb-5.14.21-150500.55.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869051" comment="reiserfs-kmp-default-5.14.21-150500.55.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4816" version="1" class="patch">
	<metadata>
		<title>Security update for hdf5 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224158" ref_url="https://bugzilla.suse.com/1224158" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17507" ref_url="https://www.suse.com/security/cve/CVE-2017-17507/" source="CVE"/>
		<reference ref_id="CVE-2018-11205" ref_url="https://www.suse.com/security/cve/CVE-2018-11205/" source="CVE"/>
		<reference ref_id="CVE-2024-29158" ref_url="https://www.suse.com/security/cve/CVE-2024-29158/" source="CVE"/>
		<reference ref_id="CVE-2024-29161" ref_url="https://www.suse.com/security/cve/CVE-2024-29161/" source="CVE"/>
		<reference ref_id="CVE-2024-29166" ref_url="https://www.suse.com/security/cve/CVE-2024-29166/" source="CVE"/>
		<reference ref_id="CVE-2024-32608" ref_url="https://www.suse.com/security/cve/CVE-2024-32608/" source="CVE"/>
		<reference ref_id="CVE-2024-32610" ref_url="https://www.suse.com/security/cve/CVE-2024-32610/" source="CVE"/>
		<reference ref_id="CVE-2024-32614" ref_url="https://www.suse.com/security/cve/CVE-2024-32614/" source="CVE"/>
		<reference ref_id="CVE-2024-32619" ref_url="https://www.suse.com/security/cve/CVE-2024-32619/" source="CVE"/>
		<reference ref_id="CVE-2024-32620" ref_url="https://www.suse.com/security/cve/CVE-2024-32620/" source="CVE"/>
		<reference ref_id="CVE-2024-33873" ref_url="https://www.suse.com/security/cve/CVE-2024-33873/" source="CVE"/>
		<reference ref_id="CVE-2024-33874" ref_url="https://www.suse.com/security/cve/CVE-2024-33874/" source="CVE"/>
		<reference ref_id="CVE-2024-33875" ref_url="https://www.suse.com/security/cve/CVE-2024-33875/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035729.html" source="SUSE-SU"/>
		<description>
This update for hdf5 fixes the following issues:

- Fix bsc#1224158 - this fixes:
  CVE-2024-29158, CVE-2024-29161, CVE-2024-29166, CVE-2024-32608,
  CVE-2024-32610, CVE-2024-32614, CVE-2024-32619, CVE-2024-32620,
  CVE-2024-33873, CVE-2024-33874, CVE-2024-33875
  Additionally, these fixes resolve crashes triggered by the
  reproducers for CVE-2017-17507, CVE-2018-11205. These crashes
  appear to be unrelated to the original problems.


This update also ships several missing PackageHub packages for 15 SP5 and 15 SP6.

		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-25"/>
	<updated date="2024-06-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1224158">SUSE bug 1224158</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17507/">CVE-2017-17507 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17507">CVE-2017-17507 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11205/">CVE-2018-11205 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11205">CVE-2018-11205 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-29158/">CVE-2024-29158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29158">CVE-2024-29158 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-29161/">CVE-2024-29161 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29161">CVE-2024-29161 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-29166/">CVE-2024-29166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29166">CVE-2024-29166 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-32608/">CVE-2024-32608 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32608">CVE-2024-32608 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-32610/">CVE-2024-32610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32610">CVE-2024-32610 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-32614/">CVE-2024-32614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32614">CVE-2024-32614 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-32619/">CVE-2024-32619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32619">CVE-2024-32619 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-32620/">CVE-2024-32620 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32620">CVE-2024-32620 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-33873/">CVE-2024-33873 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33873">CVE-2024-33873 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-33874/">CVE-2024-33874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33874">CVE-2024-33874 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-33875/">CVE-2024-33875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33875">CVE-2024-33875 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009869052" comment="hdf5-gnu-hpc-1.10.11-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869053" comment="hdf5-gnu-hpc-devel-1.10.11-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869054" comment="hdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869055" comment="hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869056" comment="hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869057" comment="hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869058" comment="hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869059" comment="hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869060" comment="hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869061" comment="hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869062" comment="hdf5-hpc-examples-1.10.11-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869063" comment="hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869064" comment="hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869065" comment="hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869066" comment="hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869067" comment="hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869068" comment="hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869069" comment="hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869070" comment="hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869071" comment="hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869072" comment="hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869073" comment="hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869074" comment="hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869075" comment="hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869076" comment="hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869077" comment="hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869078" comment="hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869079" comment="hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869080" comment="hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869081" comment="hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869082" comment="hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869083" comment="hdf5_1_10_11-hpc-examples-1.10.11-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869084" comment="libhdf5-gnu-hpc-1.10.11-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869085" comment="libhdf5-gnu-mpich-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869086" comment="libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869087" comment="libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869088" comment="libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869089" comment="libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869090" comment="libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869091" comment="libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869092" comment="libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869093" comment="libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869094" comment="libhdf5_cpp-gnu-hpc-1.10.11-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869095" comment="libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869096" comment="libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869097" comment="libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869098" comment="libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869099" comment="libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869100" comment="libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869101" comment="libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869102" comment="libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869103" comment="libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869104" comment="libhdf5_fortran-gnu-hpc-1.10.11-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869105" comment="libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869106" comment="libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869107" comment="libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869108" comment="libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869109" comment="libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869110" comment="libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869111" comment="libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869112" comment="libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869113" comment="libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869114" comment="libhdf5_hl-gnu-hpc-1.10.11-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869115" comment="libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869116" comment="libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869117" comment="libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869118" comment="libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869119" comment="libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869120" comment="libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869121" comment="libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869122" comment="libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869123" comment="libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869124" comment="libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869125" comment="libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869126" comment="libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869127" comment="libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869128" comment="libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869129" comment="libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869130" comment="libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869131" comment="libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869132" comment="libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869133" comment="libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869134" comment="libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869135" comment="libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869136" comment="libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869137" comment="libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869138" comment="libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869139" comment="libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869140" comment="libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869141" comment="libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869142" comment="libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869143" comment="libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869144" comment="libmca_common_dstore1-3.2.3-150300.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869145" comment="libopenmpi4-gnu-hpc-4.1.4-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869146" comment="libopenmpi_4_1_4-gnu-hpc-4.1.4-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869147" comment="libpmix2-3.2.3-150300.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869148" comment="lua51-luaposix-34.1.1-150200.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869149" comment="lua51-luaterm-0.07-150000.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869150" comment="lua53-luaposix-34.1.1-150200.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869151" comment="lua53-luaterm-0.07-150000.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869152" comment="luaposix-doc-34.1.1-150200.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869153" comment="mpich-4.0.2-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869154" comment="mpich-devel-4.0.2-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869155" comment="mpich-gnu-hpc-4.0.2-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869156" comment="mpich-gnu-hpc-devel-4.0.2-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869157" comment="mpich-gnu-hpc-devel-static-4.0.2-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869158" comment="mpich-gnu-hpc-macros-devel-4.0.2-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869159" comment="mpich-ofi-4.0.2-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869160" comment="mpich-ofi-devel-4.0.2-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869161" comment="mpich-ofi-gnu-hpc-4.0.2-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869162" comment="mpich-ofi-gnu-hpc-devel-4.0.2-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869163" comment="mpich-ofi-gnu-hpc-devel-static-4.0.2-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869164" comment="mpich-ofi-gnu-hpc-macros-devel-4.0.2-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869165" comment="mpich-ofi_4_0_2-gnu-hpc-4.0.2-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869166" comment="mpich-ofi_4_0_2-gnu-hpc-devel-4.0.2-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869167" comment="mpich-ofi_4_0_2-gnu-hpc-devel-static-4.0.2-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869168" comment="mpich-ofi_4_0_2-gnu-hpc-macros-devel-4.0.2-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869169" comment="mpich_4_0_2-gnu-hpc-4.0.2-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869170" comment="mpich_4_0_2-gnu-hpc-devel-4.0.2-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869171" comment="mpich_4_0_2-gnu-hpc-devel-static-4.0.2-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869172" comment="mpich_4_0_2-gnu-hpc-macros-devel-4.0.2-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869173" comment="mvapich2-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869174" comment="mvapich2-devel-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869175" comment="mvapich2-devel-static-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869176" comment="mvapich2-doc-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869177" comment="mvapich2-gnu-hpc-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869178" comment="mvapich2-gnu-hpc-devel-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869179" comment="mvapich2-gnu-hpc-doc-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869180" comment="mvapich2-gnu-hpc-macros-devel-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869181" comment="mvapich2-psm-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869182" comment="mvapich2-psm-devel-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869183" comment="mvapich2-psm-devel-static-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869184" comment="mvapich2-psm-doc-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869185" comment="mvapich2-psm-gnu-hpc-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869186" comment="mvapich2-psm-gnu-hpc-devel-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869187" comment="mvapich2-psm-gnu-hpc-doc-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869188" comment="mvapich2-psm-gnu-hpc-macros-devel-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869189" comment="mvapich2-psm2-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869190" comment="mvapich2-psm2-devel-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869191" comment="mvapich2-psm2-devel-static-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869192" comment="mvapich2-psm2-doc-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869193" comment="mvapich2-psm2-gnu-hpc-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869194" comment="mvapich2-psm2-gnu-hpc-devel-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869195" comment="mvapich2-psm2-gnu-hpc-doc-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869196" comment="mvapich2-psm2-gnu-hpc-macros-devel-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869197" comment="mvapich2-psm2_2_3_7-gnu-hpc-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869198" comment="mvapich2-psm2_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869199" comment="mvapich2-psm2_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869200" comment="mvapich2-psm2_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869201" comment="mvapich2-psm2_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869202" comment="mvapich2-psm_2_3_7-gnu-hpc-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869203" comment="mvapich2-psm_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869204" comment="mvapich2-psm_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869205" comment="mvapich2-psm_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869206" comment="mvapich2-psm_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869207" comment="mvapich2_2_3_7-gnu-hpc-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869208" comment="mvapich2_2_3_7-gnu-hpc-devel-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869209" comment="mvapich2_2_3_7-gnu-hpc-devel-static-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869210" comment="mvapich2_2_3_7-gnu-hpc-doc-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869211" comment="mvapich2_2_3_7-gnu-hpc-macros-devel-2.3.7-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869212" comment="openmpi4-4.1.4-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869213" comment="openmpi4-config-4.1.4-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869214" comment="openmpi4-devel-4.1.4-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869215" comment="openmpi4-docs-4.1.4-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869216" comment="openmpi4-gnu-hpc-4.1.4-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869217" comment="openmpi4-gnu-hpc-devel-4.1.4-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869218" comment="openmpi4-gnu-hpc-devel-static-4.1.4-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869219" comment="openmpi4-gnu-hpc-docs-4.1.4-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869220" comment="openmpi4-gnu-hpc-macros-devel-4.1.4-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869221" comment="openmpi4-libs-4.1.4-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869222" comment="openmpi4-libs-32bit-4.1.4-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869223" comment="openmpi4-macros-devel-4.1.4-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869224" comment="openmpi4-testsuite-4.1.4-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869225" comment="openmpi_4_1_4-gnu-hpc-4.1.4-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869226" comment="openmpi_4_1_4-gnu-hpc-devel-4.1.4-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869227" comment="openmpi_4_1_4-gnu-hpc-devel-static-4.1.4-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869228" comment="openmpi_4_1_4-gnu-hpc-docs-4.1.4-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869229" comment="openmpi_4_1_4-gnu-hpc-macros-devel-4.1.4-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869230" comment="openmpi_4_1_4-gnu-hpc-testsuite-4.1.4-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869231" comment="pmix-3.2.3-150300.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869232" comment="pmix-devel-3.2.3-150300.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869233" comment="pmix-headers-3.2.3-150300.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869234" comment="pmix-mca-params-3.2.3-150300.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869235" comment="pmix-plugin-munge-3.2.3-150300.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869236" comment="pmix-plugins-3.2.3-150300.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869237" comment="pmix-test-3.2.3-150300.3.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4817" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1225491" ref_url="https://bugzilla.suse.com/1225491" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-33871" ref_url="https://www.suse.com/security/cve/CVE-2024-33871/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2198-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035726.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2024-33871: Prevent OPVP device arbitrary code execution via custom Driver library. (bsc#1225491)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-25"/>
	<updated date="2024-06-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1225491">SUSE bug 1225491</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-33871/">CVE-2024-33871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33871">CVE-2024-33871 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009869238" comment="ghostscript-9.52-150000.191.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869239" comment="ghostscript-devel-9.52-150000.191.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009869240" comment="ghostscript-x11-9.52-150000.191.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4818" version="1" class="patch">
	<metadata>
		<title>Security update for apache-parent, apache-sshd (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1205463" ref_url="https://bugzilla.suse.com/1205463" source="BUGZILLA"/>
		<reference ref_id="1218189" ref_url="https://bugzilla.suse.com/1218189" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-45047" ref_url="https://www.suse.com/security/cve/CVE-2022-45047/" source="CVE"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017759.html" source="SUSE-SU"/>
		<description>
This update for apache-parent, apache-sshd fixes the following issues:

apache-parent was updated from version 28 to 31:

- Version 31:
  * New Features:
    + Added maven-checkstyle-plugin to pluginManagement
  * Improvements:
    + Set minimalMavenBuildVersion to 3.6.3 - the minimum
      used by plugins
    + Using an SPDX identifier as the license name is
      recommended by Maven
    + Use properties to define the versions of plugins
  * Bugs fixed:
    + Updated documentation for previous changes

apache-sshd was updated from version 2.7.0 to 2.12.0:

- Security issues fixed:
  * CVE-2023-48795: Implemented OpenSSH 'strict key exchange' protocol in apache-sshd version 2.12.0 (bsc#1218189)
  * CVE-2022-45047: Java unsafe deserialization vulnerability fixed in apache-sshd version 2.9.2 (bsc#1205463)

- Other changes in version 2.12.0:
  * Bugs fixed:
    + SCP client fails silently when error signalled due to missing file or lacking permissions
    + Ignore unknown key types from agent or in OpenSSH host keys extension
  * New Features:
    + Support GIT protocol-v2
- Other changes in version 2.11.0:
  * Bugs fixed:
    + Added configurable timeout(s) to DefaultSftpClient
    + Compare file keys in ModifiableFileWatcher.
    + Fixed channel pool in SftpFileSystem.
    + Use correct default OpenOptions in SftpFileSystemProvider.newFileChannel().
    + Use correct lock modes for SFTP FileChannel.lock().
    + ScpClient: support issuing commands to a server that uses a non-UTF-8 locale.
    + SftpInputStreamAsync: fix reporting EOF on zero-length reads.
    + Work-around a bug in WS_FTP &lt;= 12.9 SFTP clients.
    + (Regression in 2.10.0) SFTP performance fix: override FilterOutputStream.write(byte[], int, int).
    + Fixed a race condition to ensure SSH_MSG_CHANNEL_EOF is always sent before SSH_MSG_CHANNEL_CLOSE.
    + Fixed error handling while flushing queued packets at end of KEX.
    + Fixed wrong log level on closing an Nio2Session.
    + Fixed detection of Android O/S from system properties.
    + Consider all applicable host keys from the known_hosts files.
    + SftpFileSystem: do not close user session.
    + ChannelAsyncOutputStream: remove write future when done.
    + SSHD-1332 (Regression in 2.10.0) Resolve ~ in IdentityFile file names in HostConfigEntry.
  * New Features:
    + Use KeepAliveHandler global request instance in client as well
    + Publish snapshot maven artifacts to the Apache Snapshots maven repository.
    + Bundle sshd-contrib has support classes for the HAProxy protocol V2.
-  Other changes in version 2.10.0:
  * Bugs fixed:
    + Connection attempt not canceled when a connection timeout occurs
    + Possible OOM in ChannelPipedInputStream
    + SftpRemotePathChannel.transferFrom(...) ignores position argument
    + Rooted file system can leak informations
    + Failed to establish an SSH connection because the server identifier exceeds the int range
  * Improvements:
    + Password in clear in SSHD server's logs
- Other changes in version 2.9.2:
  * Bugs fixed:
    + SFTP worker threads got stuck while processing PUT methods against one specific SFTP server
    + Use the maximum packet size of the communication partner
    + ExplicitPortForwardingTracker does not unbind auto-allocated one
    + Default SshClient FD leak because Selector not closed
    + Reading again from exhausted ChannelExec#getInvertedOut() throws IOException instead of returning -1
    + Keeping error streams and input streams separate after ChannelExec#setRedirectErrorStream(true) is called
    + Nio2Session.shutdownOutput() should wait for writes in progress
  * Test:
    + Research intermittent failure in unit tests using various I/O
      service factories
- Other changes in version 2.9.1:
  * Bugs fixed:
    + ClientSession.auth().verify() is terminated with timeout
    + 2.9.0 release broken on Java 8
    + Infinite loop in org.apache.sshd.sftp.client.impl.SftpInputStreamAsync#doRead
    + Deadlock during session exit
    + Race condition is logged in ChannelAsyncOutputStream
- Other changes in version 2.9.0:
  * Bugs fixed:
    + Deadlock on disconnection at the end of key-exchange
    + Remote port forwarding mode does not handle EOF properly
    + Public key authentication: wrong signature algorithm used (ed25519 key with ssh-rsa signature)
    + Client fails window adjust above Integer.MAX_VALUE
    + class loader fails to load org.apache.sshd.common.cipher.BaseGCMCipher
    + Shell is not getting closed if the command has already closed the OutputStream it is using.
    + Sometimes async write listener is not called
    + Unhandled SSH_MSG_CHANNEL_WINDOW_ADJUST leeds to SocketTimeoutException
    + different host key algorithm used on rekey than used for the initial connection
    + OpenSSH certificate is not properly encoded when critical options are included
    + TCP/IP remote port forwarding with wildcard IP addresses doesn't work with OpenSSH
    + UserAuthPublicKey: uses ssh-rsa signatures for RSA keys from an agent
  * New Features:
    + Added support for Argon2 encrypted PUTTY key files
    + Added support for merged inverted output and error streams of remote process
  * Improvements:
    + Added support for 'limits@openssh.com' SFTP extension
    + Support host-based pubkey authentication in the client
    + Send environment variable and open subsystem at the same time for SSH session
- Other changes in version 2.8.0:
  * Bugs fixed:
    + Fixed wrong server key algorithm choice
    + Expiration of OpenSshCertificates needs to compare timestamps as unsigned long
    + SFTP Get downloads empty file from servers which supports EOF indication after data
    + skip() doesn't work properly in SftpInputStreamAsync
    + OpenMode and CopyMode is not honored as expected in version &gt; 4 of SFTP api
    + SftpTransferTest sometimes hangs (failure during rekeying)
    + Race condition in KEX
    + Fix the ciphers supported documentation
    + Update tarLongFileMode to use POSIX
    + WinsCP transfer failure to Apache SSHD Server
    + Pubkey auth: keys from ssh-agent are used even if HostConfigEntry.isIdentitiesOnly() is true
    + Support RSA SHA2 signatures via SSH agent
    + NOTICE: wrong copyright year range
    + Wrong creationTime in writeAttrs for SFTP
    + sshd-netty logs all traffic on INFO level
  * New Features:
    + Add support for chacha20-poly1305@openssh.com
    + Parsing of ~/.ssh/config Host patterns fails with extra
      whitespace
    + Support generating OpenSSH client certificates
  * Improvements:
    + Add support for curve25519-sha256@libssh.org key exchange
    + OpenSSH certificates: check certificate type
    + OpenSSHCertificatesTest: certificates expire in 2030
    + Display IdleTimeOut in more user-friendly format
    + sendChunkIfRemoteWindowIsSmallerThanPacketSize flag in ChannelAsyncOutputStream constructor configurable from
      outside using variable/config file
    + Intercepting the server exception message from server in SSHD client
    + Implement RFC 8332 server-sig-algs on the server
    + Slow performance listing huge number of files on Apache SSHD server
    + SFTP: too many LSTAT calls
    + Support key constraints when adding a key to an SSH agent
    + Add SFTP server side file custom attributes hook

		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-25"/>
	<updated date="2024-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205463">SUSE bug 1205463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218189">SUSE bug 1218189</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45047/">CVE-2022-45047 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45047">CVE-2022-45047 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844519" comment="apache-parent-31-150200.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844520" comment="apache-sshd-2.12.0-150200.5.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844521" comment="apache-sshd-javadoc-2.12.0-150200.5.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4819" version="1" class="patch">
	<metadata>
		<title>Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container, virt-pr-helper-container (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223965" ref_url="https://bugzilla.suse.com/1223965" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-33394" ref_url="https://www.suse.com/security/cve/CVE-2024-33394/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018830.html" source="SUSE-SU"/>
		<description>
This update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container, virt-pr-helper-container fixes the following issues:


- Collect component Role rules under operator Role instead of
  ClusterRole (bsc#1223965, CVE-2024-33394)
- Ensure procps is installed (provides ps for tests)

This update also rebuilds it against current go releases.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2024-06-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223965">SUSE bug 1223965</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-33394/">CVE-2024-33394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33394">CVE-2024-33394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009870179" comment="kubevirt-container-disk-1.1.1-150500.8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870180" comment="kubevirt-manifests-1.1.1-150500.8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870181" comment="kubevirt-tests-1.1.1-150500.8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870182" comment="kubevirt-virt-api-1.1.1-150500.8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870183" comment="kubevirt-virt-controller-1.1.1-150500.8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870184" comment="kubevirt-virt-exportproxy-1.1.1-150500.8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870185" comment="kubevirt-virt-exportserver-1.1.1-150500.8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870186" comment="kubevirt-virt-handler-1.1.1-150500.8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870187" comment="kubevirt-virt-launcher-1.1.1-150500.8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870188" comment="kubevirt-virt-operator-1.1.1-150500.8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870189" comment="kubevirt-virtctl-1.1.1-150500.8.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870190" comment="obs-service-kubevirt_containers_meta-1.1.1-150500.8.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4820" version="1" class="patch">
	<metadata>
		<title>Security update for python310 (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226448" ref_url="https://bugzilla.suse.com/1226448" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-4032" ref_url="https://www.suse.com/security/cve/CVE-2024-4032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018836.html" source="SUSE-SU"/>
		<description>
This update for python310 fixes the following issues:

- CVE-2024-4032: Rearranging definition of private v global IP. (bsc#1226448)
  		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-02"/>
	<updated date="2024-07-02"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1226448">SUSE bug 1226448</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4032/">CVE-2024-4032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4032">CVE-2024-4032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009870203" comment="libpython3_10-1_0-3.10.14-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870204" comment="libpython3_10-1_0-32bit-3.10.14-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870205" comment="python310-3.10.14-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870206" comment="python310-32bit-3.10.14-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870207" comment="python310-base-3.10.14-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870208" comment="python310-base-32bit-3.10.14-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870209" comment="python310-curses-3.10.14-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870210" comment="python310-dbm-3.10.14-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870211" comment="python310-devel-3.10.14-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870212" comment="python310-doc-3.10.14-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870213" comment="python310-doc-devhelp-3.10.14-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870214" comment="python310-idle-3.10.14-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870215" comment="python310-testsuite-3.10.14-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870216" comment="python310-tk-3.10.14-150400.4.51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870217" comment="python310-tools-3.10.14-150400.4.51.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4821" version="1" class="patch">
	<metadata>
		<title>Security update for libreoffice (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224279" ref_url="https://bugzilla.suse.com/1224279" source="BUGZILLA"/>
		<reference ref_id="1224309" ref_url="https://bugzilla.suse.com/1224309" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-3044" ref_url="https://www.suse.com/security/cve/CVE-2024-3044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018835.html" source="SUSE-SU"/>
		<description>
This update for libreoffice fixes the following issues:

Libreoffice was updated to version 24.2.4.2:

- Release notes:

  * https://wiki.documentfoundation.org/Releases/24.2.1/RC1
  * https://wiki.documentfoundation.org/Releases/24.2.1/RC2

- Security issues fixed:

  * CVE-2024-3044: Fixed unchecked script execution in graphic on-click binding (bsc#1224279)

- Other issues fixed:

  * Fixed LibreOffice build failures with ICU 75 (bsc#1224309)

- Updated bundled dependencies:

  * curl version update from 8.6.0 to 8.7.1
  * gpgme version update from 1.20.0 to 1.23.2
  * libassuan version update from 2.5.6 to 2.5.7
  * libgpg-error version update from 1.47 to 1.48
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-02"/>
	<updated date="2024-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1224279">SUSE bug 1224279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224309">SUSE bug 1224309</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-3044/">CVE-2024-3044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3044">CVE-2024-3044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009870288" comment="libreoffice-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870289" comment="libreoffice-base-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870290" comment="libreoffice-base-drivers-postgresql-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870291" comment="libreoffice-branding-upstream-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870292" comment="libreoffice-calc-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870293" comment="libreoffice-calc-extensions-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870294" comment="libreoffice-draw-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870295" comment="libreoffice-filters-optional-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870296" comment="libreoffice-gdb-pretty-printers-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870297" comment="libreoffice-glade-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870298" comment="libreoffice-gnome-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870299" comment="libreoffice-gtk3-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870300" comment="libreoffice-icon-themes-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870301" comment="libreoffice-impress-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870302" comment="libreoffice-l10n-af-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870303" comment="libreoffice-l10n-am-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870304" comment="libreoffice-l10n-ar-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870305" comment="libreoffice-l10n-as-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870306" comment="libreoffice-l10n-ast-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870307" comment="libreoffice-l10n-be-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870308" comment="libreoffice-l10n-bg-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870309" comment="libreoffice-l10n-bn-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870310" comment="libreoffice-l10n-bn_IN-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870311" comment="libreoffice-l10n-bo-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870312" comment="libreoffice-l10n-br-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870313" comment="libreoffice-l10n-brx-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870314" comment="libreoffice-l10n-bs-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870315" comment="libreoffice-l10n-ca-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870316" comment="libreoffice-l10n-ca_valencia-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870317" comment="libreoffice-l10n-ckb-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870318" comment="libreoffice-l10n-cs-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870319" comment="libreoffice-l10n-cy-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870320" comment="libreoffice-l10n-da-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870321" comment="libreoffice-l10n-de-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870322" comment="libreoffice-l10n-dgo-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870323" comment="libreoffice-l10n-dsb-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870324" comment="libreoffice-l10n-dz-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870325" comment="libreoffice-l10n-el-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870326" comment="libreoffice-l10n-en-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870327" comment="libreoffice-l10n-en_GB-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870328" comment="libreoffice-l10n-en_ZA-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870329" comment="libreoffice-l10n-eo-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870330" comment="libreoffice-l10n-es-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870331" comment="libreoffice-l10n-et-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870332" comment="libreoffice-l10n-eu-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870333" comment="libreoffice-l10n-fa-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870334" comment="libreoffice-l10n-fi-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870335" comment="libreoffice-l10n-fr-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870336" comment="libreoffice-l10n-fur-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870337" comment="libreoffice-l10n-fy-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870338" comment="libreoffice-l10n-ga-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870339" comment="libreoffice-l10n-gd-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870340" comment="libreoffice-l10n-gl-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870341" comment="libreoffice-l10n-gu-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870342" comment="libreoffice-l10n-gug-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870343" comment="libreoffice-l10n-he-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870344" comment="libreoffice-l10n-hi-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870345" comment="libreoffice-l10n-hr-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870346" comment="libreoffice-l10n-hsb-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870347" comment="libreoffice-l10n-hu-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870348" comment="libreoffice-l10n-id-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870349" comment="libreoffice-l10n-is-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870350" comment="libreoffice-l10n-it-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870351" comment="libreoffice-l10n-ja-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870352" comment="libreoffice-l10n-ka-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870353" comment="libreoffice-l10n-kab-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870354" comment="libreoffice-l10n-kk-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870355" comment="libreoffice-l10n-km-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870356" comment="libreoffice-l10n-kmr_Latn-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870357" comment="libreoffice-l10n-kn-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870358" comment="libreoffice-l10n-ko-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870359" comment="libreoffice-l10n-kok-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870360" comment="libreoffice-l10n-ks-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870361" comment="libreoffice-l10n-lb-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870362" comment="libreoffice-l10n-lo-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870363" comment="libreoffice-l10n-lt-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870364" comment="libreoffice-l10n-lv-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870365" comment="libreoffice-l10n-mai-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870366" comment="libreoffice-l10n-mk-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870367" comment="libreoffice-l10n-ml-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870368" comment="libreoffice-l10n-mn-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870369" comment="libreoffice-l10n-mni-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870370" comment="libreoffice-l10n-mr-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870371" comment="libreoffice-l10n-my-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870372" comment="libreoffice-l10n-nb-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870373" comment="libreoffice-l10n-ne-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870374" comment="libreoffice-l10n-nl-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870375" comment="libreoffice-l10n-nn-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870376" comment="libreoffice-l10n-nr-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870377" comment="libreoffice-l10n-nso-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870378" comment="libreoffice-l10n-oc-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870379" comment="libreoffice-l10n-om-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870380" comment="libreoffice-l10n-or-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870381" comment="libreoffice-l10n-pa-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870382" comment="libreoffice-l10n-pl-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870383" comment="libreoffice-l10n-pt_BR-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870384" comment="libreoffice-l10n-pt_PT-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870385" comment="libreoffice-l10n-ro-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870386" comment="libreoffice-l10n-ru-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870387" comment="libreoffice-l10n-rw-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870388" comment="libreoffice-l10n-sa_IN-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870389" comment="libreoffice-l10n-sat-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870390" comment="libreoffice-l10n-sd-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870391" comment="libreoffice-l10n-si-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870392" comment="libreoffice-l10n-sid-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870393" comment="libreoffice-l10n-sk-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870394" comment="libreoffice-l10n-sl-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870395" comment="libreoffice-l10n-sq-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870396" comment="libreoffice-l10n-sr-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870397" comment="libreoffice-l10n-ss-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870398" comment="libreoffice-l10n-st-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870399" comment="libreoffice-l10n-sv-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870400" comment="libreoffice-l10n-sw_TZ-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870401" comment="libreoffice-l10n-szl-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870402" comment="libreoffice-l10n-ta-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870403" comment="libreoffice-l10n-te-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870404" comment="libreoffice-l10n-tg-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870405" comment="libreoffice-l10n-th-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870406" comment="libreoffice-l10n-tn-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870407" comment="libreoffice-l10n-tr-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870408" comment="libreoffice-l10n-ts-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870409" comment="libreoffice-l10n-tt-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870410" comment="libreoffice-l10n-ug-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870411" comment="libreoffice-l10n-uk-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870412" comment="libreoffice-l10n-uz-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870413" comment="libreoffice-l10n-ve-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870414" comment="libreoffice-l10n-vec-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870415" comment="libreoffice-l10n-vi-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870416" comment="libreoffice-l10n-xh-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870417" comment="libreoffice-l10n-zh_CN-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870418" comment="libreoffice-l10n-zh_TW-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870419" comment="libreoffice-l10n-zu-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870420" comment="libreoffice-librelogo-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870421" comment="libreoffice-mailmerge-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870422" comment="libreoffice-math-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870423" comment="libreoffice-officebean-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870424" comment="libreoffice-pyuno-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870425" comment="libreoffice-qt5-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870426" comment="libreoffice-sdk-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870427" comment="libreoffice-sdk-doc-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870428" comment="libreoffice-writer-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870429" comment="libreoffice-writer-extensions-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870430" comment="libreofficekit-24.2.4.2-150500.20.6.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870431" comment="libreofficekit-devel-24.2.4.2-150500.20.6.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4822" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224282" ref_url="https://bugzilla.suse.com/1224282" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-34459" ref_url="https://www.suse.com/security/cve/CVE-2024-34459/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018843.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:                                                                                                                            
                                                                                               
- CVE-2024-34459: Fixed buffer over-read in xmlHTMLPrintFileContext in xmllint.c (bsc#1224282). 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-02"/>
	<updated date="2024-07-02"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1224282">SUSE bug 1224282</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-34459/">CVE-2024-34459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34459">CVE-2024-34459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870432" comment="python3-libxml2-python-2.9.7-150000.3.70.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4823" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227086" ref_url="https://bugzilla.suse.com/1227086" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-37894" ref_url="https://www.suse.com/security/cve/CVE-2024-37894/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018841.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2024-37894: Fixed a denial of Service issue in ESI processing (bsc#1227086)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-02"/>
	<updated date="2024-07-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1227086">SUSE bug 1227086</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37894/">CVE-2024-37894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37894">CVE-2024-37894 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870433" comment="squid-5.7-150400.3.32.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4824" version="1" class="patch">
	<metadata>
		<title>Security update for python39 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226447" ref_url="https://bugzilla.suse.com/1226447" source="BUGZILLA"/>
		<reference ref_id="1226448" ref_url="https://bugzilla.suse.com/1226448" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0397" ref_url="https://www.suse.com/security/cve/CVE-2024-0397/" source="CVE"/>
		<reference ref_id="CVE-2024-4032" ref_url="https://www.suse.com/security/cve/CVE-2024-4032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018854.html" source="SUSE-SU"/>
		<description>
This update for python39 fixes the following issues:

- CVE-2024-4032: Rearranging definition of private v global IP. (bsc#1226448)
- CVE-2024-0397: Remove a memory race condition in ssl.SSLContext certificate store methods. (bsc#1226447)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-02"/>
	<updated date="2024-07-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1226447">SUSE bug 1226447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226448">SUSE bug 1226448</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-0397/">CVE-2024-0397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0397">CVE-2024-0397 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4032/">CVE-2024-4032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4032">CVE-2024-4032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009870434" comment="libpython3_9-1_0-3.9.19-150300.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870435" comment="libpython3_9-1_0-32bit-3.9.19-150300.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870436" comment="python39-3.9.19-150300.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870437" comment="python39-32bit-3.9.19-150300.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870438" comment="python39-base-3.9.19-150300.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870439" comment="python39-base-32bit-3.9.19-150300.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870440" comment="python39-curses-3.9.19-150300.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870441" comment="python39-dbm-3.9.19-150300.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870442" comment="python39-devel-3.9.19-150300.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870443" comment="python39-doc-3.9.19-150300.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870444" comment="python39-doc-devhelp-3.9.19-150300.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870445" comment="python39-idle-3.9.19-150300.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870446" comment="python39-testsuite-3.9.19-150300.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870447" comment="python39-tk-3.9.19-150300.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870448" comment="python39-tools-3.9.19-150300.4.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4825" version="1" class="patch">
	<metadata>
		<title>Security update for podofo (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213720" ref_url="https://bugzilla.suse.com/1213720" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2024:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018853.html" source="SUSE-SU"/>
		<description>
This update for podofo fixes the following issues:

- PdfEncrypt: Validate more encrypt dictionary parameters (bsc#1213720)
- PdfXRefStreamParserObject: Fixed handling of invalid XRef stream entries (bsc#1213720)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-02"/>
	<updated date="2024-07-02"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1213720">SUSE bug 1213720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009870449" comment="libpodofo-devel-0.9.6-150300.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870450" comment="libpodofo0_9_6-0.9.6-150300.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870451" comment="podofo-0.9.6-150300.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4826" version="1" class="patch">
	<metadata>
		<title>Security update for libndp (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1225771" ref_url="https://bugzilla.suse.com/1225771" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-5564" ref_url="https://www.suse.com/security/cve/CVE-2024-5564/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035808.html" source="SUSE-SU"/>
		<description>
This update for libndp fixes the following issues:

- CVE-2024-5564: Add a check on the route information option length field. (bsc#1225771)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-02"/>
	<updated date="2024-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1225771">SUSE bug 1225771</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-5564/">CVE-2024-5564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5564">CVE-2024-5564 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009870452" comment="libndp-1.6-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870453" comment="libndp-devel-1.6-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009870454" comment="libndp0-1.6-150000.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4827" version="1" class="patch">
	<metadata>
		<title>Security update for podman (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227052" ref_url="https://bugzilla.suse.com/1227052" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018858.html" source="SUSE-SU"/>
		<description>
This update for podman fixes the following issues:

- CVE-2024-6104: Fixed a potential leak of sensitive information on
  HTTP log file (bsc#1227052).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-03"/>
	<updated date="2024-07-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1227052">SUSE bug 1227052</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009871333" comment="podman-4.9.5-150500.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871334" comment="podman-docker-4.9.5-150500.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871335" comment="podman-remote-4.9.5-150500.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871336" comment="podmansh-4.9.5-150500.3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4828" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218955" ref_url="https://bugzilla.suse.com/1218955" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0741" ref_url="https://www.suse.com/security/cve/CVE-2024-0741/" source="CVE"/>
		<reference ref_id="CVE-2024-0742" ref_url="https://www.suse.com/security/cve/CVE-2024-0742/" source="CVE"/>
		<reference ref_id="CVE-2024-0746" ref_url="https://www.suse.com/security/cve/CVE-2024-0746/" source="CVE"/>
		<reference ref_id="CVE-2024-0747" ref_url="https://www.suse.com/security/cve/CVE-2024-0747/" source="CVE"/>
		<reference ref_id="CVE-2024-0749" ref_url="https://www.suse.com/security/cve/CVE-2024-0749/" source="CVE"/>
		<reference ref_id="CVE-2024-0750" ref_url="https://www.suse.com/security/cve/CVE-2024-0750/" source="CVE"/>
		<reference ref_id="CVE-2024-0751" ref_url="https://www.suse.com/security/cve/CVE-2024-0751/" source="CVE"/>
		<reference ref_id="CVE-2024-0753" ref_url="https://www.suse.com/security/cve/CVE-2024-0753/" source="CVE"/>
		<reference ref_id="CVE-2024-0755" ref_url="https://www.suse.com/security/cve/CVE-2024-0755/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017757.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 115.7.0 ESR (MFSA2024-02) (bsc#1218955):
    
- CVE-2024-0741: Out of bounds write in ANGLE
- CVE-2024-0742: Failure to update user input timestamp
- CVE-2024-0746: Crash when listing printers on Linux
- CVE-2024-0747: Bypass of Content Security Policy when directive unsafe-inline was set
- CVE-2024-0749: Phishing site popup could show local origin in address bar
- CVE-2024-0750: Potential permissions request bypass via clickjacking
- CVE-2024-0751: Privilege escalation through devtools
- CVE-2024-0753: HSTS policy on subdomain could bypass policy of upper domain
- CVE-2024-0755: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-25"/>
	<updated date="2024-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218955">SUSE bug 1218955</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0741/">CVE-2024-0741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0741">CVE-2024-0741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0742/">CVE-2024-0742 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0742">CVE-2024-0742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0746/">CVE-2024-0746 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0746">CVE-2024-0746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0747/">CVE-2024-0747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0747">CVE-2024-0747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0749/">CVE-2024-0749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0749">CVE-2024-0749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0750/">CVE-2024-0750 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0750">CVE-2024-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0751/">CVE-2024-0751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0751">CVE-2024-0751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0753/">CVE-2024-0753 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0753">CVE-2024-0753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0755/">CVE-2024-0755 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0755">CVE-2024-0755 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844522" comment="MozillaFirefox-115.7.0-150200.152.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844523" comment="MozillaFirefox-branding-upstream-115.7.0-150200.152.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844524" comment="MozillaFirefox-devel-115.7.0-150200.152.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844525" comment="MozillaFirefox-translations-common-115.7.0-150200.152.123.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844526" comment="MozillaFirefox-translations-other-115.7.0-150200.152.123.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4829" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224282" ref_url="https://bugzilla.suse.com/1224282" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-34459" ref_url="https://www.suse.com/security/cve/CVE-2024-34459/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035812.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2024-34459: Fixed buffer over-read in xmlHTMLPrintFileContext in xmllint.c (bsc#1224282). 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-03"/>
	<updated date="2024-07-03"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1224282">SUSE bug 1224282</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-34459/">CVE-2024-34459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34459">CVE-2024-34459 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009871337" comment="libxml2-2-2.10.3-150500.5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871338" comment="libxml2-2-32bit-2.10.3-150500.5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871339" comment="libxml2-devel-2.10.3-150500.5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871340" comment="libxml2-devel-32bit-2.10.3-150500.5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871341" comment="libxml2-doc-2.10.3-150500.5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871342" comment="libxml2-tools-2.10.3-150500.5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871343" comment="python3-libxml2-2.10.3-150500.5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871344" comment="python311-libxml2-2.10.3-150500.5.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4830" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226944" ref_url="https://bugzilla.suse.com/1226944" source="BUGZILLA"/>
		<reference ref_id="1226945" ref_url="https://bugzilla.suse.com/1226945" source="BUGZILLA"/>
		<reference ref_id="1226946" ref_url="https://bugzilla.suse.com/1226946" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-29510" ref_url="https://www.suse.com/security/cve/CVE-2024-29510/" source="CVE"/>
		<reference ref_id="CVE-2024-33869" ref_url="https://www.suse.com/security/cve/CVE-2024-33869/" source="CVE"/>
		<reference ref_id="CVE-2024-33870" ref_url="https://www.suse.com/security/cve/CVE-2024-33870/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2292-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035810.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2024-29510: Fixed an arbitrary path traversal when running in a
  permitted path (bsc#1226945).
- CVE-2024-33870: Fixed a format string injection that could lead to
  command execution (bsc#1226944).
- CVE-2024-33869: Fixed a path validation bypass that could lead to
  path traversal (bsc#1226946).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-03"/>
	<updated date="2024-07-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1226944">SUSE bug 1226944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226945">SUSE bug 1226945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226946">SUSE bug 1226946</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-29510/">CVE-2024-29510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29510">CVE-2024-29510 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-33869/">CVE-2024-33869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33869">CVE-2024-33869 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-33870/">CVE-2024-33870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33870">CVE-2024-33870 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009871345" comment="ghostscript-9.52-150000.194.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871346" comment="ghostscript-devel-9.52-150000.194.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871347" comment="ghostscript-x11-9.52-150000.194.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4831" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227186" ref_url="https://bugzilla.suse.com/1227186" source="BUGZILLA"/>
		<reference ref_id="1227187" ref_url="https://bugzilla.suse.com/1227187" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-37370" ref_url="https://www.suse.com/security/cve/CVE-2024-37370/" source="CVE"/>
		<reference ref_id="CVE-2024-37371" ref_url="https://www.suse.com/security/cve/CVE-2024-37371/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035824.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following issues:

- CVE-2024-37370: Fixed confidential GSS krb5 wrap tokens with invalid fields were errouneously accepted (bsc#1227186).
- CVE-2024-37371: Fixed invalid memory read when processing message tokens with invalid length fields (bsc#1227187).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-04"/>
	<updated date="2024-07-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1227186">SUSE bug 1227186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227187">SUSE bug 1227187</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-37370/">CVE-2024-37370 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37370">CVE-2024-37370 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37371/">CVE-2024-37371 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37371">CVE-2024-37371 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009871421" comment="krb5-1.20.1-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871422" comment="krb5-32bit-1.20.1-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871423" comment="krb5-client-1.20.1-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871424" comment="krb5-devel-1.20.1-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871425" comment="krb5-devel-32bit-1.20.1-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871426" comment="krb5-plugin-kdb-ldap-1.20.1-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871427" comment="krb5-plugin-preauth-otp-1.20.1-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871428" comment="krb5-plugin-preauth-pkinit-1.20.1-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871429" comment="krb5-plugin-preauth-spake-1.20.1-150500.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871430" comment="krb5-server-1.20.1-150500.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4832" version="1" class="patch">
	<metadata>
		<title>Security update for go1.21 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="1227314" ref_url="https://bugzilla.suse.com/1227314" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-24791" ref_url="https://www.suse.com/security/cve/CVE-2024-24791/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018876.html" source="SUSE-SU"/>
		<description>
This update for go1.21 fixes the following issues:

Updated to version 1.21.12 (bsc#1212475):

- CVE-2024-24791: Fixed a potential denial of service due to
  improper handling of HTTP 100-continue headers (bsc#1227314).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-05"/>
	<updated date="2024-07-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227314">SUSE bug 1227314</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24791/">CVE-2024-24791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24791">CVE-2024-24791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009871593" comment="go1.21-1.21.12-150000.1.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871594" comment="go1.21-doc-1.21.12-150000.1.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871595" comment="go1.21-race-1.21.12-150000.1.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4833" version="1" class="patch">
	<metadata>
		<title>Security update for go1.22 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218424" ref_url="https://bugzilla.suse.com/1218424" source="BUGZILLA"/>
		<reference ref_id="1227314" ref_url="https://bugzilla.suse.com/1227314" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-24791" ref_url="https://www.suse.com/security/cve/CVE-2024-24791/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018875.html" source="SUSE-SU"/>
		<description>
This update for go1.22 fixes the following issues:

Updated to version 1.22.5 (bsc#1218424):

- CVE-2024-24791: Fixed a potential denial of service due to
  improper handling of HTTP 100-continue headers (bsc#1227314).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-05"/>
	<updated date="2024-07-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218424">SUSE bug 1218424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227314">SUSE bug 1227314</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24791/">CVE-2024-24791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24791">CVE-2024-24791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009871596" comment="go1.22-1.22.5-150000.1.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871597" comment="go1.22-doc-1.22.5-150000.1.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871598" comment="go1.22-race-1.22.5-150000.1.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4834" version="1" class="patch">
	<metadata>
		<title>Security update for netty3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222045" ref_url="https://bugzilla.suse.com/1222045" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-29025" ref_url="https://www.suse.com/security/cve/CVE-2024-29025/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2313-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035840.html" source="SUSE-SU"/>
		<description>
This update for netty3 fixes the following issues:

- CVE-2024-29025: Fixed HttpPostRequestDecoder can out of memory due to large number of form fields (bsc#1222045).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-08"/>
	<updated date="2024-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222045">SUSE bug 1222045</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-29025/">CVE-2024-29025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29025">CVE-2024-29025 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009871649" comment="netty3-3.10.6-150200.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871650" comment="netty3-javadoc-3.10.6-150200.3.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4835" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226469" ref_url="https://bugzilla.suse.com/1226469" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-37891" ref_url="https://www.suse.com/security/cve/CVE-2024-37891/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018878.html" source="SUSE-SU"/>
		<description>
This update for python-urllib3 fixes the following issues:

- CVE-2024-37891: Fixed proxy-authorization request header not stripped during cross-origin redirects (bsc#1226469).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-08"/>
	<updated date="2024-07-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1226469">SUSE bug 1226469</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-37891/">CVE-2024-37891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37891">CVE-2024-37891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871651" comment="python311-urllib3-2.0.7-150400.7.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4836" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226916" ref_url="https://bugzilla.suse.com/1226916" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6239" ref_url="https://www.suse.com/security/cve/CVE-2024-6239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035847.html" source="SUSE-SU"/>
		<description>
This update for poppler fixes the following issues:

- CVE-2024-6239: Fixed crash when using pdfinfo with -dests parameter on malformed input files (bsc#1226916).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-08"/>
	<updated date="2024-07-08"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1226916">SUSE bug 1226916</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6239/">CVE-2024-6239 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6239">CVE-2024-6239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009871652" comment="libpoppler-cpp0-23.01.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871653" comment="libpoppler-cpp0-32bit-23.01.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871654" comment="libpoppler-devel-23.01.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871655" comment="libpoppler-glib-devel-23.01.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871656" comment="libpoppler-glib8-23.01.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871657" comment="libpoppler-glib8-32bit-23.01.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871658" comment="libpoppler-qt5-1-23.01.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871659" comment="libpoppler-qt5-1-32bit-23.01.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871660" comment="libpoppler-qt5-devel-23.01.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871661" comment="libpoppler-qt6-3-23.01.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871662" comment="libpoppler-qt6-devel-23.01.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871663" comment="libpoppler126-23.01.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871664" comment="libpoppler126-32bit-23.01.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871665" comment="poppler-tools-23.01.0-150500.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871666" comment="typelib-1_0-Poppler-0_18-23.01.0-150500.3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4837" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223414" ref_url="https://bugzilla.suse.com/1223414" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-3596" ref_url="https://www.suse.com/security/cve/CVE-2024-3596/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2366-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035871.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

- CVE-2024-3596: Fixed chosen-prefix collision attack against MD5 (bsc#1223414).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-09"/>
	<updated date="2024-07-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223414">SUSE bug 1223414</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-3596/">CVE-2024-3596 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3596">CVE-2024-3596 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009871878" comment="freeradius-server-3.0.25-150400.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871879" comment="freeradius-server-devel-3.0.25-150400.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871880" comment="freeradius-server-doc-3.0.25-150400.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871881" comment="freeradius-server-krb5-3.0.25-150400.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871882" comment="freeradius-server-ldap-3.0.25-150400.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871883" comment="freeradius-server-ldap-schemas-3.0.25-150400.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871884" comment="freeradius-server-libs-3.0.25-150400.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871885" comment="freeradius-server-mysql-3.0.25-150400.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871886" comment="freeradius-server-perl-3.0.25-150400.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871887" comment="freeradius-server-postgresql-3.0.25-150400.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871888" comment="freeradius-server-python3-3.0.25-150400.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871889" comment="freeradius-server-sqlite-3.0.25-150400.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871890" comment="freeradius-server-utils-3.0.25-150400.4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4838" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1190336" ref_url="https://bugzilla.suse.com/1190336" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1193883" ref_url="https://bugzilla.suse.com/1193883" source="BUGZILLA"/>
		<reference ref_id="1194826" ref_url="https://bugzilla.suse.com/1194826" source="BUGZILLA"/>
		<reference ref_id="1195065" ref_url="https://bugzilla.suse.com/1195065" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195341" ref_url="https://bugzilla.suse.com/1195341" source="BUGZILLA"/>
		<reference ref_id="1195349" ref_url="https://bugzilla.suse.com/1195349" source="BUGZILLA"/>
		<reference ref_id="1195775" ref_url="https://bugzilla.suse.com/1195775" source="BUGZILLA"/>
		<reference ref_id="1196746" ref_url="https://bugzilla.suse.com/1196746" source="BUGZILLA"/>
		<reference ref_id="1197915" ref_url="https://bugzilla.suse.com/1197915" source="BUGZILLA"/>
		<reference ref_id="1198014" ref_url="https://bugzilla.suse.com/1198014" source="BUGZILLA"/>
		<reference ref_id="1199295" ref_url="https://bugzilla.suse.com/1199295" source="BUGZILLA"/>
		<reference ref_id="1202767" ref_url="https://bugzilla.suse.com/1202767" source="BUGZILLA"/>
		<reference ref_id="1202780" ref_url="https://bugzilla.suse.com/1202780" source="BUGZILLA"/>
		<reference ref_id="1205205" ref_url="https://bugzilla.suse.com/1205205" source="BUGZILLA"/>
		<reference ref_id="1207361" ref_url="https://bugzilla.suse.com/1207361" source="BUGZILLA"/>
		<reference ref_id="1217912" ref_url="https://bugzilla.suse.com/1217912" source="BUGZILLA"/>
		<reference ref_id="1218148" ref_url="https://bugzilla.suse.com/1218148" source="BUGZILLA"/>
		<reference ref_id="1218570" ref_url="https://bugzilla.suse.com/1218570" source="BUGZILLA"/>
		<reference ref_id="1218820" ref_url="https://bugzilla.suse.com/1218820" source="BUGZILLA"/>
		<reference ref_id="1219224" ref_url="https://bugzilla.suse.com/1219224" source="BUGZILLA"/>
		<reference ref_id="1219633" ref_url="https://bugzilla.suse.com/1219633" source="BUGZILLA"/>
		<reference ref_id="1219847" ref_url="https://bugzilla.suse.com/1219847" source="BUGZILLA"/>
		<reference ref_id="1220368" ref_url="https://bugzilla.suse.com/1220368" source="BUGZILLA"/>
		<reference ref_id="1220812" ref_url="https://bugzilla.suse.com/1220812" source="BUGZILLA"/>
		<reference ref_id="1220958" ref_url="https://bugzilla.suse.com/1220958" source="BUGZILLA"/>
		<reference ref_id="1221086" ref_url="https://bugzilla.suse.com/1221086" source="BUGZILLA"/>
		<reference ref_id="1221282" ref_url="https://bugzilla.suse.com/1221282" source="BUGZILLA"/>
		<reference ref_id="1221958" ref_url="https://bugzilla.suse.com/1221958" source="BUGZILLA"/>
		<reference ref_id="1222015" ref_url="https://bugzilla.suse.com/1222015" source="BUGZILLA"/>
		<reference ref_id="1222072" ref_url="https://bugzilla.suse.com/1222072" source="BUGZILLA"/>
		<reference ref_id="1222080" ref_url="https://bugzilla.suse.com/1222080" source="BUGZILLA"/>
		<reference ref_id="1222241" ref_url="https://bugzilla.suse.com/1222241" source="BUGZILLA"/>
		<reference ref_id="1222254" ref_url="https://bugzilla.suse.com/1222254" source="BUGZILLA"/>
		<reference ref_id="1222364" ref_url="https://bugzilla.suse.com/1222364" source="BUGZILLA"/>
		<reference ref_id="1222893" ref_url="https://bugzilla.suse.com/1222893" source="BUGZILLA"/>
		<reference ref_id="1223013" ref_url="https://bugzilla.suse.com/1223013" source="BUGZILLA"/>
		<reference ref_id="1223018" ref_url="https://bugzilla.suse.com/1223018" source="BUGZILLA"/>
		<reference ref_id="1223265" ref_url="https://bugzilla.suse.com/1223265" source="BUGZILLA"/>
		<reference ref_id="1223384" ref_url="https://bugzilla.suse.com/1223384" source="BUGZILLA"/>
		<reference ref_id="1223641" ref_url="https://bugzilla.suse.com/1223641" source="BUGZILLA"/>
		<reference ref_id="1224020" ref_url="https://bugzilla.suse.com/1224020" source="BUGZILLA"/>
		<reference ref_id="1224331" ref_url="https://bugzilla.suse.com/1224331" source="BUGZILLA"/>
		<reference ref_id="1224488" ref_url="https://bugzilla.suse.com/1224488" source="BUGZILLA"/>
		<reference ref_id="1224497" ref_url="https://bugzilla.suse.com/1224497" source="BUGZILLA"/>
		<reference ref_id="1224498" ref_url="https://bugzilla.suse.com/1224498" source="BUGZILLA"/>
		<reference ref_id="1224504" ref_url="https://bugzilla.suse.com/1224504" source="BUGZILLA"/>
		<reference ref_id="1224520" ref_url="https://bugzilla.suse.com/1224520" source="BUGZILLA"/>
		<reference ref_id="1224539" ref_url="https://bugzilla.suse.com/1224539" source="BUGZILLA"/>
		<reference ref_id="1224540" ref_url="https://bugzilla.suse.com/1224540" source="BUGZILLA"/>
		<reference ref_id="1224552" ref_url="https://bugzilla.suse.com/1224552" source="BUGZILLA"/>
		<reference ref_id="1224583" ref_url="https://bugzilla.suse.com/1224583" source="BUGZILLA"/>
		<reference ref_id="1224588" ref_url="https://bugzilla.suse.com/1224588" source="BUGZILLA"/>
		<reference ref_id="1224602" ref_url="https://bugzilla.suse.com/1224602" source="BUGZILLA"/>
		<reference ref_id="1224603" ref_url="https://bugzilla.suse.com/1224603" source="BUGZILLA"/>
		<reference ref_id="1224605" ref_url="https://bugzilla.suse.com/1224605" source="BUGZILLA"/>
		<reference ref_id="1224612" ref_url="https://bugzilla.suse.com/1224612" source="BUGZILLA"/>
		<reference ref_id="1224614" ref_url="https://bugzilla.suse.com/1224614" source="BUGZILLA"/>
		<reference ref_id="1224619" ref_url="https://bugzilla.suse.com/1224619" source="BUGZILLA"/>
		<reference ref_id="1224661" ref_url="https://bugzilla.suse.com/1224661" source="BUGZILLA"/>
		<reference ref_id="1224662" ref_url="https://bugzilla.suse.com/1224662" source="BUGZILLA"/>
		<reference ref_id="1224670" ref_url="https://bugzilla.suse.com/1224670" source="BUGZILLA"/>
		<reference ref_id="1224671" ref_url="https://bugzilla.suse.com/1224671" source="BUGZILLA"/>
		<reference ref_id="1224674" ref_url="https://bugzilla.suse.com/1224674" source="BUGZILLA"/>
		<reference ref_id="1224677" ref_url="https://bugzilla.suse.com/1224677" source="BUGZILLA"/>
		<reference ref_id="1224679" ref_url="https://bugzilla.suse.com/1224679" source="BUGZILLA"/>
		<reference ref_id="1224696" ref_url="https://bugzilla.suse.com/1224696" source="BUGZILLA"/>
		<reference ref_id="1224703" ref_url="https://bugzilla.suse.com/1224703" source="BUGZILLA"/>
		<reference ref_id="1224712" ref_url="https://bugzilla.suse.com/1224712" source="BUGZILLA"/>
		<reference ref_id="1224716" ref_url="https://bugzilla.suse.com/1224716" source="BUGZILLA"/>
		<reference ref_id="1224719" ref_url="https://bugzilla.suse.com/1224719" source="BUGZILLA"/>
		<reference ref_id="1224735" ref_url="https://bugzilla.suse.com/1224735" source="BUGZILLA"/>
		<reference ref_id="1224749" ref_url="https://bugzilla.suse.com/1224749" source="BUGZILLA"/>
		<reference ref_id="1224764" ref_url="https://bugzilla.suse.com/1224764" source="BUGZILLA"/>
		<reference ref_id="1224765" ref_url="https://bugzilla.suse.com/1224765" source="BUGZILLA"/>
		<reference ref_id="1224766" ref_url="https://bugzilla.suse.com/1224766" source="BUGZILLA"/>
		<reference ref_id="1224935" ref_url="https://bugzilla.suse.com/1224935" source="BUGZILLA"/>
		<reference ref_id="1224946" ref_url="https://bugzilla.suse.com/1224946" source="BUGZILLA"/>
		<reference ref_id="1224951" ref_url="https://bugzilla.suse.com/1224951" source="BUGZILLA"/>
		<reference ref_id="1225050" ref_url="https://bugzilla.suse.com/1225050" source="BUGZILLA"/>
		<reference ref_id="1225098" ref_url="https://bugzilla.suse.com/1225098" source="BUGZILLA"/>
		<reference ref_id="1225105" ref_url="https://bugzilla.suse.com/1225105" source="BUGZILLA"/>
		<reference ref_id="1225300" ref_url="https://bugzilla.suse.com/1225300" source="BUGZILLA"/>
		<reference ref_id="1225389" ref_url="https://bugzilla.suse.com/1225389" source="BUGZILLA"/>
		<reference ref_id="1225391" ref_url="https://bugzilla.suse.com/1225391" source="BUGZILLA"/>
		<reference ref_id="1225419" ref_url="https://bugzilla.suse.com/1225419" source="BUGZILLA"/>
		<reference ref_id="1225426" ref_url="https://bugzilla.suse.com/1225426" source="BUGZILLA"/>
		<reference ref_id="1225448" ref_url="https://bugzilla.suse.com/1225448" source="BUGZILLA"/>
		<reference ref_id="1225452" ref_url="https://bugzilla.suse.com/1225452" source="BUGZILLA"/>
		<reference ref_id="1225467" ref_url="https://bugzilla.suse.com/1225467" source="BUGZILLA"/>
		<reference ref_id="1225475" ref_url="https://bugzilla.suse.com/1225475" source="BUGZILLA"/>
		<reference ref_id="1225484" ref_url="https://bugzilla.suse.com/1225484" source="BUGZILLA"/>
		<reference ref_id="1225487" ref_url="https://bugzilla.suse.com/1225487" source="BUGZILLA"/>
		<reference ref_id="1225514" ref_url="https://bugzilla.suse.com/1225514" source="BUGZILLA"/>
		<reference ref_id="1225518" ref_url="https://bugzilla.suse.com/1225518" source="BUGZILLA"/>
		<reference ref_id="1225535" ref_url="https://bugzilla.suse.com/1225535" source="BUGZILLA"/>
		<reference ref_id="1225585" ref_url="https://bugzilla.suse.com/1225585" source="BUGZILLA"/>
		<reference ref_id="1225602" ref_url="https://bugzilla.suse.com/1225602" source="BUGZILLA"/>
		<reference ref_id="1225611" ref_url="https://bugzilla.suse.com/1225611" source="BUGZILLA"/>
		<reference ref_id="1225681" ref_url="https://bugzilla.suse.com/1225681" source="BUGZILLA"/>
		<reference ref_id="1225692" ref_url="https://bugzilla.suse.com/1225692" source="BUGZILLA"/>
		<reference ref_id="1225698" ref_url="https://bugzilla.suse.com/1225698" source="BUGZILLA"/>
		<reference ref_id="1225699" ref_url="https://bugzilla.suse.com/1225699" source="BUGZILLA"/>
		<reference ref_id="1225704" ref_url="https://bugzilla.suse.com/1225704" source="BUGZILLA"/>
		<reference ref_id="1225714" ref_url="https://bugzilla.suse.com/1225714" source="BUGZILLA"/>
		<reference ref_id="1225726" ref_url="https://bugzilla.suse.com/1225726" source="BUGZILLA"/>
		<reference ref_id="1225732" ref_url="https://bugzilla.suse.com/1225732" source="BUGZILLA"/>
		<reference ref_id="1225737" ref_url="https://bugzilla.suse.com/1225737" source="BUGZILLA"/>
		<reference ref_id="1225749" ref_url="https://bugzilla.suse.com/1225749" source="BUGZILLA"/>
		<reference ref_id="1225758" ref_url="https://bugzilla.suse.com/1225758" source="BUGZILLA"/>
		<reference ref_id="1225759" ref_url="https://bugzilla.suse.com/1225759" source="BUGZILLA"/>
		<reference ref_id="1225760" ref_url="https://bugzilla.suse.com/1225760" source="BUGZILLA"/>
		<reference ref_id="1225767" ref_url="https://bugzilla.suse.com/1225767" source="BUGZILLA"/>
		<reference ref_id="1225770" ref_url="https://bugzilla.suse.com/1225770" source="BUGZILLA"/>
		<reference ref_id="1225823" ref_url="https://bugzilla.suse.com/1225823" source="BUGZILLA"/>
		<reference ref_id="1225834" ref_url="https://bugzilla.suse.com/1225834" source="BUGZILLA"/>
		<reference ref_id="1225840" ref_url="https://bugzilla.suse.com/1225840" source="BUGZILLA"/>
		<reference ref_id="1225866" ref_url="https://bugzilla.suse.com/1225866" source="BUGZILLA"/>
		<reference ref_id="1225872" ref_url="https://bugzilla.suse.com/1225872" source="BUGZILLA"/>
		<reference ref_id="1225894" ref_url="https://bugzilla.suse.com/1225894" source="BUGZILLA"/>
		<reference ref_id="1225945" ref_url="https://bugzilla.suse.com/1225945" source="BUGZILLA"/>
		<reference ref_id="1226022" ref_url="https://bugzilla.suse.com/1226022" source="BUGZILLA"/>
		<reference ref_id="1226131" ref_url="https://bugzilla.suse.com/1226131" source="BUGZILLA"/>
		<reference ref_id="1226145" ref_url="https://bugzilla.suse.com/1226145" source="BUGZILLA"/>
		<reference ref_id="1226149" ref_url="https://bugzilla.suse.com/1226149" source="BUGZILLA"/>
		<reference ref_id="1226155" ref_url="https://bugzilla.suse.com/1226155" source="BUGZILLA"/>
		<reference ref_id="1226211" ref_url="https://bugzilla.suse.com/1226211" source="BUGZILLA"/>
		<reference ref_id="1226212" ref_url="https://bugzilla.suse.com/1226212" source="BUGZILLA"/>
		<reference ref_id="1226226" ref_url="https://bugzilla.suse.com/1226226" source="BUGZILLA"/>
		<reference ref_id="1226514" ref_url="https://bugzilla.suse.com/1226514" source="BUGZILLA"/>
		<reference ref_id="1226520" ref_url="https://bugzilla.suse.com/1226520" source="BUGZILLA"/>
		<reference ref_id="1226537" ref_url="https://bugzilla.suse.com/1226537" source="BUGZILLA"/>
		<reference ref_id="1226538" ref_url="https://bugzilla.suse.com/1226538" source="BUGZILLA"/>
		<reference ref_id="1226539" ref_url="https://bugzilla.suse.com/1226539" source="BUGZILLA"/>
		<reference ref_id="1226550" ref_url="https://bugzilla.suse.com/1226550" source="BUGZILLA"/>
		<reference ref_id="1226552" ref_url="https://bugzilla.suse.com/1226552" source="BUGZILLA"/>
		<reference ref_id="1226553" ref_url="https://bugzilla.suse.com/1226553" source="BUGZILLA"/>
		<reference ref_id="1226554" ref_url="https://bugzilla.suse.com/1226554" source="BUGZILLA"/>
		<reference ref_id="1226556" ref_url="https://bugzilla.suse.com/1226556" source="BUGZILLA"/>
		<reference ref_id="1226557" ref_url="https://bugzilla.suse.com/1226557" source="BUGZILLA"/>
		<reference ref_id="1226558" ref_url="https://bugzilla.suse.com/1226558" source="BUGZILLA"/>
		<reference ref_id="1226559" ref_url="https://bugzilla.suse.com/1226559" source="BUGZILLA"/>
		<reference ref_id="1226561" ref_url="https://bugzilla.suse.com/1226561" source="BUGZILLA"/>
		<reference ref_id="1226562" ref_url="https://bugzilla.suse.com/1226562" source="BUGZILLA"/>
		<reference ref_id="1226563" ref_url="https://bugzilla.suse.com/1226563" source="BUGZILLA"/>
		<reference ref_id="1226564" ref_url="https://bugzilla.suse.com/1226564" source="BUGZILLA"/>
		<reference ref_id="1226566" ref_url="https://bugzilla.suse.com/1226566" source="BUGZILLA"/>
		<reference ref_id="1226567" ref_url="https://bugzilla.suse.com/1226567" source="BUGZILLA"/>
		<reference ref_id="1226569" ref_url="https://bugzilla.suse.com/1226569" source="BUGZILLA"/>
		<reference ref_id="1226572" ref_url="https://bugzilla.suse.com/1226572" source="BUGZILLA"/>
		<reference ref_id="1226575" ref_url="https://bugzilla.suse.com/1226575" source="BUGZILLA"/>
		<reference ref_id="1226576" ref_url="https://bugzilla.suse.com/1226576" source="BUGZILLA"/>
		<reference ref_id="1226577" ref_url="https://bugzilla.suse.com/1226577" source="BUGZILLA"/>
		<reference ref_id="1226579" ref_url="https://bugzilla.suse.com/1226579" source="BUGZILLA"/>
		<reference ref_id="1226580" ref_url="https://bugzilla.suse.com/1226580" source="BUGZILLA"/>
		<reference ref_id="1226581" ref_url="https://bugzilla.suse.com/1226581" source="BUGZILLA"/>
		<reference ref_id="1226582" ref_url="https://bugzilla.suse.com/1226582" source="BUGZILLA"/>
		<reference ref_id="1226583" ref_url="https://bugzilla.suse.com/1226583" source="BUGZILLA"/>
		<reference ref_id="1226585" ref_url="https://bugzilla.suse.com/1226585" source="BUGZILLA"/>
		<reference ref_id="1226587" ref_url="https://bugzilla.suse.com/1226587" source="BUGZILLA"/>
		<reference ref_id="1226588" ref_url="https://bugzilla.suse.com/1226588" source="BUGZILLA"/>
		<reference ref_id="1226593" ref_url="https://bugzilla.suse.com/1226593" source="BUGZILLA"/>
		<reference ref_id="1226595" ref_url="https://bugzilla.suse.com/1226595" source="BUGZILLA"/>
		<reference ref_id="1226597" ref_url="https://bugzilla.suse.com/1226597" source="BUGZILLA"/>
		<reference ref_id="1226601" ref_url="https://bugzilla.suse.com/1226601" source="BUGZILLA"/>
		<reference ref_id="1226602" ref_url="https://bugzilla.suse.com/1226602" source="BUGZILLA"/>
		<reference ref_id="1226603" ref_url="https://bugzilla.suse.com/1226603" source="BUGZILLA"/>
		<reference ref_id="1226607" ref_url="https://bugzilla.suse.com/1226607" source="BUGZILLA"/>
		<reference ref_id="1226610" ref_url="https://bugzilla.suse.com/1226610" source="BUGZILLA"/>
		<reference ref_id="1226614" ref_url="https://bugzilla.suse.com/1226614" source="BUGZILLA"/>
		<reference ref_id="1226616" ref_url="https://bugzilla.suse.com/1226616" source="BUGZILLA"/>
		<reference ref_id="1226617" ref_url="https://bugzilla.suse.com/1226617" source="BUGZILLA"/>
		<reference ref_id="1226618" ref_url="https://bugzilla.suse.com/1226618" source="BUGZILLA"/>
		<reference ref_id="1226619" ref_url="https://bugzilla.suse.com/1226619" source="BUGZILLA"/>
		<reference ref_id="1226621" ref_url="https://bugzilla.suse.com/1226621" source="BUGZILLA"/>
		<reference ref_id="1226622" ref_url="https://bugzilla.suse.com/1226622" source="BUGZILLA"/>
		<reference ref_id="1226624" ref_url="https://bugzilla.suse.com/1226624" source="BUGZILLA"/>
		<reference ref_id="1226626" ref_url="https://bugzilla.suse.com/1226626" source="BUGZILLA"/>
		<reference ref_id="1226628" ref_url="https://bugzilla.suse.com/1226628" source="BUGZILLA"/>
		<reference ref_id="1226629" ref_url="https://bugzilla.suse.com/1226629" source="BUGZILLA"/>
		<reference ref_id="1226632" ref_url="https://bugzilla.suse.com/1226632" source="BUGZILLA"/>
		<reference ref_id="1226633" ref_url="https://bugzilla.suse.com/1226633" source="BUGZILLA"/>
		<reference ref_id="1226634" ref_url="https://bugzilla.suse.com/1226634" source="BUGZILLA"/>
		<reference ref_id="1226637" ref_url="https://bugzilla.suse.com/1226637" source="BUGZILLA"/>
		<reference ref_id="1226643" ref_url="https://bugzilla.suse.com/1226643" source="BUGZILLA"/>
		<reference ref_id="1226644" ref_url="https://bugzilla.suse.com/1226644" source="BUGZILLA"/>
		<reference ref_id="1226645" ref_url="https://bugzilla.suse.com/1226645" source="BUGZILLA"/>
		<reference ref_id="1226647" ref_url="https://bugzilla.suse.com/1226647" source="BUGZILLA"/>
		<reference ref_id="1226650" ref_url="https://bugzilla.suse.com/1226650" source="BUGZILLA"/>
		<reference ref_id="1226653" ref_url="https://bugzilla.suse.com/1226653" source="BUGZILLA"/>
		<reference ref_id="1226657" ref_url="https://bugzilla.suse.com/1226657" source="BUGZILLA"/>
		<reference ref_id="1226658" ref_url="https://bugzilla.suse.com/1226658" source="BUGZILLA"/>
		<reference ref_id="1226669" ref_url="https://bugzilla.suse.com/1226669" source="BUGZILLA"/>
		<reference ref_id="1226670" ref_url="https://bugzilla.suse.com/1226670" source="BUGZILLA"/>
		<reference ref_id="1226672" ref_url="https://bugzilla.suse.com/1226672" source="BUGZILLA"/>
		<reference ref_id="1226673" ref_url="https://bugzilla.suse.com/1226673" source="BUGZILLA"/>
		<reference ref_id="1226674" ref_url="https://bugzilla.suse.com/1226674" source="BUGZILLA"/>
		<reference ref_id="1226675" ref_url="https://bugzilla.suse.com/1226675" source="BUGZILLA"/>
		<reference ref_id="1226678" ref_url="https://bugzilla.suse.com/1226678" source="BUGZILLA"/>
		<reference ref_id="1226679" ref_url="https://bugzilla.suse.com/1226679" source="BUGZILLA"/>
		<reference ref_id="1226683" ref_url="https://bugzilla.suse.com/1226683" source="BUGZILLA"/>
		<reference ref_id="1226685" ref_url="https://bugzilla.suse.com/1226685" source="BUGZILLA"/>
		<reference ref_id="1226686" ref_url="https://bugzilla.suse.com/1226686" source="BUGZILLA"/>
		<reference ref_id="1226690" ref_url="https://bugzilla.suse.com/1226690" source="BUGZILLA"/>
		<reference ref_id="1226691" ref_url="https://bugzilla.suse.com/1226691" source="BUGZILLA"/>
		<reference ref_id="1226692" ref_url="https://bugzilla.suse.com/1226692" source="BUGZILLA"/>
		<reference ref_id="1226693" ref_url="https://bugzilla.suse.com/1226693" source="BUGZILLA"/>
		<reference ref_id="1226696" ref_url="https://bugzilla.suse.com/1226696" source="BUGZILLA"/>
		<reference ref_id="1226697" ref_url="https://bugzilla.suse.com/1226697" source="BUGZILLA"/>
		<reference ref_id="1226698" ref_url="https://bugzilla.suse.com/1226698" source="BUGZILLA"/>
		<reference ref_id="1226699" ref_url="https://bugzilla.suse.com/1226699" source="BUGZILLA"/>
		<reference ref_id="1226701" ref_url="https://bugzilla.suse.com/1226701" source="BUGZILLA"/>
		<reference ref_id="1226702" ref_url="https://bugzilla.suse.com/1226702" source="BUGZILLA"/>
		<reference ref_id="1226703" ref_url="https://bugzilla.suse.com/1226703" source="BUGZILLA"/>
		<reference ref_id="1226704" ref_url="https://bugzilla.suse.com/1226704" source="BUGZILLA"/>
		<reference ref_id="1226705" ref_url="https://bugzilla.suse.com/1226705" source="BUGZILLA"/>
		<reference ref_id="1226706" ref_url="https://bugzilla.suse.com/1226706" source="BUGZILLA"/>
		<reference ref_id="1226708" ref_url="https://bugzilla.suse.com/1226708" source="BUGZILLA"/>
		<reference ref_id="1226709" ref_url="https://bugzilla.suse.com/1226709" source="BUGZILLA"/>
		<reference ref_id="1226710" ref_url="https://bugzilla.suse.com/1226710" source="BUGZILLA"/>
		<reference ref_id="1226711" ref_url="https://bugzilla.suse.com/1226711" source="BUGZILLA"/>
		<reference ref_id="1226712" ref_url="https://bugzilla.suse.com/1226712" source="BUGZILLA"/>
		<reference ref_id="1226713" ref_url="https://bugzilla.suse.com/1226713" source="BUGZILLA"/>
		<reference ref_id="1226715" ref_url="https://bugzilla.suse.com/1226715" source="BUGZILLA"/>
		<reference ref_id="1226716" ref_url="https://bugzilla.suse.com/1226716" source="BUGZILLA"/>
		<reference ref_id="1226718" ref_url="https://bugzilla.suse.com/1226718" source="BUGZILLA"/>
		<reference ref_id="1226719" ref_url="https://bugzilla.suse.com/1226719" source="BUGZILLA"/>
		<reference ref_id="1226720" ref_url="https://bugzilla.suse.com/1226720" source="BUGZILLA"/>
		<reference ref_id="1226721" ref_url="https://bugzilla.suse.com/1226721" source="BUGZILLA"/>
		<reference ref_id="1226730" ref_url="https://bugzilla.suse.com/1226730" source="BUGZILLA"/>
		<reference ref_id="1226732" ref_url="https://bugzilla.suse.com/1226732" source="BUGZILLA"/>
		<reference ref_id="1226734" ref_url="https://bugzilla.suse.com/1226734" source="BUGZILLA"/>
		<reference ref_id="1226735" ref_url="https://bugzilla.suse.com/1226735" source="BUGZILLA"/>
		<reference ref_id="1226737" ref_url="https://bugzilla.suse.com/1226737" source="BUGZILLA"/>
		<reference ref_id="1226738" ref_url="https://bugzilla.suse.com/1226738" source="BUGZILLA"/>
		<reference ref_id="1226739" ref_url="https://bugzilla.suse.com/1226739" source="BUGZILLA"/>
		<reference ref_id="1226740" ref_url="https://bugzilla.suse.com/1226740" source="BUGZILLA"/>
		<reference ref_id="1226744" ref_url="https://bugzilla.suse.com/1226744" source="BUGZILLA"/>
		<reference ref_id="1226746" ref_url="https://bugzilla.suse.com/1226746" source="BUGZILLA"/>
		<reference ref_id="1226747" ref_url="https://bugzilla.suse.com/1226747" source="BUGZILLA"/>
		<reference ref_id="1226749" ref_url="https://bugzilla.suse.com/1226749" source="BUGZILLA"/>
		<reference ref_id="1226754" ref_url="https://bugzilla.suse.com/1226754" source="BUGZILLA"/>
		<reference ref_id="1226762" ref_url="https://bugzilla.suse.com/1226762" source="BUGZILLA"/>
		<reference ref_id="1226764" ref_url="https://bugzilla.suse.com/1226764" source="BUGZILLA"/>
		<reference ref_id="1226767" ref_url="https://bugzilla.suse.com/1226767" source="BUGZILLA"/>
		<reference ref_id="1226768" ref_url="https://bugzilla.suse.com/1226768" source="BUGZILLA"/>
		<reference ref_id="1226769" ref_url="https://bugzilla.suse.com/1226769" source="BUGZILLA"/>
		<reference ref_id="1226771" ref_url="https://bugzilla.suse.com/1226771" source="BUGZILLA"/>
		<reference ref_id="1226774" ref_url="https://bugzilla.suse.com/1226774" source="BUGZILLA"/>
		<reference ref_id="1226777" ref_url="https://bugzilla.suse.com/1226777" source="BUGZILLA"/>
		<reference ref_id="1226780" ref_url="https://bugzilla.suse.com/1226780" source="BUGZILLA"/>
		<reference ref_id="1226781" ref_url="https://bugzilla.suse.com/1226781" source="BUGZILLA"/>
		<reference ref_id="1226785" ref_url="https://bugzilla.suse.com/1226785" source="BUGZILLA"/>
		<reference ref_id="1226786" ref_url="https://bugzilla.suse.com/1226786" source="BUGZILLA"/>
		<reference ref_id="1226789" ref_url="https://bugzilla.suse.com/1226789" source="BUGZILLA"/>
		<reference ref_id="1226791" ref_url="https://bugzilla.suse.com/1226791" source="BUGZILLA"/>
		<reference ref_id="1226839" ref_url="https://bugzilla.suse.com/1226839" source="BUGZILLA"/>
		<reference ref_id="1226840" ref_url="https://bugzilla.suse.com/1226840" source="BUGZILLA"/>
		<reference ref_id="1226841" ref_url="https://bugzilla.suse.com/1226841" source="BUGZILLA"/>
		<reference ref_id="1226842" ref_url="https://bugzilla.suse.com/1226842" source="BUGZILLA"/>
		<reference ref_id="1226848" ref_url="https://bugzilla.suse.com/1226848" source="BUGZILLA"/>
		<reference ref_id="1226852" ref_url="https://bugzilla.suse.com/1226852" source="BUGZILLA"/>
		<reference ref_id="1226857" ref_url="https://bugzilla.suse.com/1226857" source="BUGZILLA"/>
		<reference ref_id="1226861" ref_url="https://bugzilla.suse.com/1226861" source="BUGZILLA"/>
		<reference ref_id="1226863" ref_url="https://bugzilla.suse.com/1226863" source="BUGZILLA"/>
		<reference ref_id="1226864" ref_url="https://bugzilla.suse.com/1226864" source="BUGZILLA"/>
		<reference ref_id="1226867" ref_url="https://bugzilla.suse.com/1226867" source="BUGZILLA"/>
		<reference ref_id="1226868" ref_url="https://bugzilla.suse.com/1226868" source="BUGZILLA"/>
		<reference ref_id="1226876" ref_url="https://bugzilla.suse.com/1226876" source="BUGZILLA"/>
		<reference ref_id="1226878" ref_url="https://bugzilla.suse.com/1226878" source="BUGZILLA"/>
		<reference ref_id="1226883" ref_url="https://bugzilla.suse.com/1226883" source="BUGZILLA"/>
		<reference ref_id="1226886" ref_url="https://bugzilla.suse.com/1226886" source="BUGZILLA"/>
		<reference ref_id="1226890" ref_url="https://bugzilla.suse.com/1226890" source="BUGZILLA"/>
		<reference ref_id="1226891" ref_url="https://bugzilla.suse.com/1226891" source="BUGZILLA"/>
		<reference ref_id="1226895" ref_url="https://bugzilla.suse.com/1226895" source="BUGZILLA"/>
		<reference ref_id="1226908" ref_url="https://bugzilla.suse.com/1226908" source="BUGZILLA"/>
		<reference ref_id="1226915" ref_url="https://bugzilla.suse.com/1226915" source="BUGZILLA"/>
		<reference ref_id="1226928" ref_url="https://bugzilla.suse.com/1226928" source="BUGZILLA"/>
		<reference ref_id="1226948" ref_url="https://bugzilla.suse.com/1226948" source="BUGZILLA"/>
		<reference ref_id="1226949" ref_url="https://bugzilla.suse.com/1226949" source="BUGZILLA"/>
		<reference ref_id="1226950" ref_url="https://bugzilla.suse.com/1226950" source="BUGZILLA"/>
		<reference ref_id="1226953" ref_url="https://bugzilla.suse.com/1226953" source="BUGZILLA"/>
		<reference ref_id="1226962" ref_url="https://bugzilla.suse.com/1226962" source="BUGZILLA"/>
		<reference ref_id="1226976" ref_url="https://bugzilla.suse.com/1226976" source="BUGZILLA"/>
		<reference ref_id="1226992" ref_url="https://bugzilla.suse.com/1226992" source="BUGZILLA"/>
		<reference ref_id="1226994" ref_url="https://bugzilla.suse.com/1226994" source="BUGZILLA"/>
		<reference ref_id="1226996" ref_url="https://bugzilla.suse.com/1226996" source="BUGZILLA"/>
		<reference ref_id="1227066" ref_url="https://bugzilla.suse.com/1227066" source="BUGZILLA"/>
		<reference ref_id="1227096" ref_url="https://bugzilla.suse.com/1227096" source="BUGZILLA"/>
		<reference ref_id="1227101" ref_url="https://bugzilla.suse.com/1227101" source="BUGZILLA"/>
		<reference ref_id="1227103" ref_url="https://bugzilla.suse.com/1227103" source="BUGZILLA"/>
		<reference ref_id="1227274" ref_url="https://bugzilla.suse.com/1227274" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4439" ref_url="https://www.suse.com/security/cve/CVE-2021-4439/" source="CVE"/>
		<reference ref_id="CVE-2021-47089" ref_url="https://www.suse.com/security/cve/CVE-2021-47089/" source="CVE"/>
		<reference ref_id="CVE-2021-47432" ref_url="https://www.suse.com/security/cve/CVE-2021-47432/" source="CVE"/>
		<reference ref_id="CVE-2021-47515" ref_url="https://www.suse.com/security/cve/CVE-2021-47515/" source="CVE"/>
		<reference ref_id="CVE-2021-47534" ref_url="https://www.suse.com/security/cve/CVE-2021-47534/" source="CVE"/>
		<reference ref_id="CVE-2021-47538" ref_url="https://www.suse.com/security/cve/CVE-2021-47538/" source="CVE"/>
		<reference ref_id="CVE-2021-47539" ref_url="https://www.suse.com/security/cve/CVE-2021-47539/" source="CVE"/>
		<reference ref_id="CVE-2021-47555" ref_url="https://www.suse.com/security/cve/CVE-2021-47555/" source="CVE"/>
		<reference ref_id="CVE-2021-47566" ref_url="https://www.suse.com/security/cve/CVE-2021-47566/" source="CVE"/>
		<reference ref_id="CVE-2021-47571" ref_url="https://www.suse.com/security/cve/CVE-2021-47571/" source="CVE"/>
		<reference ref_id="CVE-2021-47572" ref_url="https://www.suse.com/security/cve/CVE-2021-47572/" source="CVE"/>
		<reference ref_id="CVE-2021-47576" ref_url="https://www.suse.com/security/cve/CVE-2021-47576/" source="CVE"/>
		<reference ref_id="CVE-2021-47577" ref_url="https://www.suse.com/security/cve/CVE-2021-47577/" source="CVE"/>
		<reference ref_id="CVE-2021-47578" ref_url="https://www.suse.com/security/cve/CVE-2021-47578/" source="CVE"/>
		<reference ref_id="CVE-2021-47580" ref_url="https://www.suse.com/security/cve/CVE-2021-47580/" source="CVE"/>
		<reference ref_id="CVE-2021-47582" ref_url="https://www.suse.com/security/cve/CVE-2021-47582/" source="CVE"/>
		<reference ref_id="CVE-2021-47583" ref_url="https://www.suse.com/security/cve/CVE-2021-47583/" source="CVE"/>
		<reference ref_id="CVE-2021-47584" ref_url="https://www.suse.com/security/cve/CVE-2021-47584/" source="CVE"/>
		<reference ref_id="CVE-2021-47585" ref_url="https://www.suse.com/security/cve/CVE-2021-47585/" source="CVE"/>
		<reference ref_id="CVE-2021-47586" ref_url="https://www.suse.com/security/cve/CVE-2021-47586/" source="CVE"/>
		<reference ref_id="CVE-2021-47587" ref_url="https://www.suse.com/security/cve/CVE-2021-47587/" source="CVE"/>
		<reference ref_id="CVE-2021-47589" ref_url="https://www.suse.com/security/cve/CVE-2021-47589/" source="CVE"/>
		<reference ref_id="CVE-2021-47592" ref_url="https://www.suse.com/security/cve/CVE-2021-47592/" source="CVE"/>
		<reference ref_id="CVE-2021-47595" ref_url="https://www.suse.com/security/cve/CVE-2021-47595/" source="CVE"/>
		<reference ref_id="CVE-2021-47596" ref_url="https://www.suse.com/security/cve/CVE-2021-47596/" source="CVE"/>
		<reference ref_id="CVE-2021-47597" ref_url="https://www.suse.com/security/cve/CVE-2021-47597/" source="CVE"/>
		<reference ref_id="CVE-2021-47600" ref_url="https://www.suse.com/security/cve/CVE-2021-47600/" source="CVE"/>
		<reference ref_id="CVE-2021-47601" ref_url="https://www.suse.com/security/cve/CVE-2021-47601/" source="CVE"/>
		<reference ref_id="CVE-2021-47602" ref_url="https://www.suse.com/security/cve/CVE-2021-47602/" source="CVE"/>
		<reference ref_id="CVE-2021-47603" ref_url="https://www.suse.com/security/cve/CVE-2021-47603/" source="CVE"/>
		<reference ref_id="CVE-2021-47604" ref_url="https://www.suse.com/security/cve/CVE-2021-47604/" source="CVE"/>
		<reference ref_id="CVE-2021-47605" ref_url="https://www.suse.com/security/cve/CVE-2021-47605/" source="CVE"/>
		<reference ref_id="CVE-2021-47607" ref_url="https://www.suse.com/security/cve/CVE-2021-47607/" source="CVE"/>
		<reference ref_id="CVE-2021-47608" ref_url="https://www.suse.com/security/cve/CVE-2021-47608/" source="CVE"/>
		<reference ref_id="CVE-2021-47609" ref_url="https://www.suse.com/security/cve/CVE-2021-47609/" source="CVE"/>
		<reference ref_id="CVE-2021-47610" ref_url="https://www.suse.com/security/cve/CVE-2021-47610/" source="CVE"/>
		<reference ref_id="CVE-2021-47611" ref_url="https://www.suse.com/security/cve/CVE-2021-47611/" source="CVE"/>
		<reference ref_id="CVE-2021-47612" ref_url="https://www.suse.com/security/cve/CVE-2021-47612/" source="CVE"/>
		<reference ref_id="CVE-2021-47614" ref_url="https://www.suse.com/security/cve/CVE-2021-47614/" source="CVE"/>
		<reference ref_id="CVE-2021-47615" ref_url="https://www.suse.com/security/cve/CVE-2021-47615/" source="CVE"/>
		<reference ref_id="CVE-2021-47616" ref_url="https://www.suse.com/security/cve/CVE-2021-47616/" source="CVE"/>
		<reference ref_id="CVE-2021-47617" ref_url="https://www.suse.com/security/cve/CVE-2021-47617/" source="CVE"/>
		<reference ref_id="CVE-2021-47618" ref_url="https://www.suse.com/security/cve/CVE-2021-47618/" source="CVE"/>
		<reference ref_id="CVE-2021-47619" ref_url="https://www.suse.com/security/cve/CVE-2021-47619/" source="CVE"/>
		<reference ref_id="CVE-2021-47620" ref_url="https://www.suse.com/security/cve/CVE-2021-47620/" source="CVE"/>
		<reference ref_id="CVE-2022-48711" ref_url="https://www.suse.com/security/cve/CVE-2022-48711/" source="CVE"/>
		<reference ref_id="CVE-2022-48712" ref_url="https://www.suse.com/security/cve/CVE-2022-48712/" source="CVE"/>
		<reference ref_id="CVE-2022-48713" ref_url="https://www.suse.com/security/cve/CVE-2022-48713/" source="CVE"/>
		<reference ref_id="CVE-2022-48714" ref_url="https://www.suse.com/security/cve/CVE-2022-48714/" source="CVE"/>
		<reference ref_id="CVE-2022-48715" ref_url="https://www.suse.com/security/cve/CVE-2022-48715/" source="CVE"/>
		<reference ref_id="CVE-2022-48716" ref_url="https://www.suse.com/security/cve/CVE-2022-48716/" source="CVE"/>
		<reference ref_id="CVE-2022-48717" ref_url="https://www.suse.com/security/cve/CVE-2022-48717/" source="CVE"/>
		<reference ref_id="CVE-2022-48718" ref_url="https://www.suse.com/security/cve/CVE-2022-48718/" source="CVE"/>
		<reference ref_id="CVE-2022-48720" ref_url="https://www.suse.com/security/cve/CVE-2022-48720/" source="CVE"/>
		<reference ref_id="CVE-2022-48721" ref_url="https://www.suse.com/security/cve/CVE-2022-48721/" source="CVE"/>
		<reference ref_id="CVE-2022-48722" ref_url="https://www.suse.com/security/cve/CVE-2022-48722/" source="CVE"/>
		<reference ref_id="CVE-2022-48723" ref_url="https://www.suse.com/security/cve/CVE-2022-48723/" source="CVE"/>
		<reference ref_id="CVE-2022-48724" ref_url="https://www.suse.com/security/cve/CVE-2022-48724/" source="CVE"/>
		<reference ref_id="CVE-2022-48725" ref_url="https://www.suse.com/security/cve/CVE-2022-48725/" source="CVE"/>
		<reference ref_id="CVE-2022-48726" ref_url="https://www.suse.com/security/cve/CVE-2022-48726/" source="CVE"/>
		<reference ref_id="CVE-2022-48727" ref_url="https://www.suse.com/security/cve/CVE-2022-48727/" source="CVE"/>
		<reference ref_id="CVE-2022-48728" ref_url="https://www.suse.com/security/cve/CVE-2022-48728/" source="CVE"/>
		<reference ref_id="CVE-2022-48729" ref_url="https://www.suse.com/security/cve/CVE-2022-48729/" source="CVE"/>
		<reference ref_id="CVE-2022-48730" ref_url="https://www.suse.com/security/cve/CVE-2022-48730/" source="CVE"/>
		<reference ref_id="CVE-2022-48732" ref_url="https://www.suse.com/security/cve/CVE-2022-48732/" source="CVE"/>
		<reference ref_id="CVE-2022-48733" ref_url="https://www.suse.com/security/cve/CVE-2022-48733/" source="CVE"/>
		<reference ref_id="CVE-2022-48734" ref_url="https://www.suse.com/security/cve/CVE-2022-48734/" source="CVE"/>
		<reference ref_id="CVE-2022-48735" ref_url="https://www.suse.com/security/cve/CVE-2022-48735/" source="CVE"/>
		<reference ref_id="CVE-2022-48736" ref_url="https://www.suse.com/security/cve/CVE-2022-48736/" source="CVE"/>
		<reference ref_id="CVE-2022-48737" ref_url="https://www.suse.com/security/cve/CVE-2022-48737/" source="CVE"/>
		<reference ref_id="CVE-2022-48738" ref_url="https://www.suse.com/security/cve/CVE-2022-48738/" source="CVE"/>
		<reference ref_id="CVE-2022-48739" ref_url="https://www.suse.com/security/cve/CVE-2022-48739/" source="CVE"/>
		<reference ref_id="CVE-2022-48740" ref_url="https://www.suse.com/security/cve/CVE-2022-48740/" source="CVE"/>
		<reference ref_id="CVE-2022-48743" ref_url="https://www.suse.com/security/cve/CVE-2022-48743/" source="CVE"/>
		<reference ref_id="CVE-2022-48744" ref_url="https://www.suse.com/security/cve/CVE-2022-48744/" source="CVE"/>
		<reference ref_id="CVE-2022-48745" ref_url="https://www.suse.com/security/cve/CVE-2022-48745/" source="CVE"/>
		<reference ref_id="CVE-2022-48746" ref_url="https://www.suse.com/security/cve/CVE-2022-48746/" source="CVE"/>
		<reference ref_id="CVE-2022-48747" ref_url="https://www.suse.com/security/cve/CVE-2022-48747/" source="CVE"/>
		<reference ref_id="CVE-2022-48748" ref_url="https://www.suse.com/security/cve/CVE-2022-48748/" source="CVE"/>
		<reference ref_id="CVE-2022-48749" ref_url="https://www.suse.com/security/cve/CVE-2022-48749/" source="CVE"/>
		<reference ref_id="CVE-2022-48751" ref_url="https://www.suse.com/security/cve/CVE-2022-48751/" source="CVE"/>
		<reference ref_id="CVE-2022-48752" ref_url="https://www.suse.com/security/cve/CVE-2022-48752/" source="CVE"/>
		<reference ref_id="CVE-2022-48753" ref_url="https://www.suse.com/security/cve/CVE-2022-48753/" source="CVE"/>
		<reference ref_id="CVE-2022-48754" ref_url="https://www.suse.com/security/cve/CVE-2022-48754/" source="CVE"/>
		<reference ref_id="CVE-2022-48755" ref_url="https://www.suse.com/security/cve/CVE-2022-48755/" source="CVE"/>
		<reference ref_id="CVE-2022-48756" ref_url="https://www.suse.com/security/cve/CVE-2022-48756/" source="CVE"/>
		<reference ref_id="CVE-2022-48758" ref_url="https://www.suse.com/security/cve/CVE-2022-48758/" source="CVE"/>
		<reference ref_id="CVE-2022-48759" ref_url="https://www.suse.com/security/cve/CVE-2022-48759/" source="CVE"/>
		<reference ref_id="CVE-2022-48760" ref_url="https://www.suse.com/security/cve/CVE-2022-48760/" source="CVE"/>
		<reference ref_id="CVE-2022-48761" ref_url="https://www.suse.com/security/cve/CVE-2022-48761/" source="CVE"/>
		<reference ref_id="CVE-2022-48763" ref_url="https://www.suse.com/security/cve/CVE-2022-48763/" source="CVE"/>
		<reference ref_id="CVE-2022-48765" ref_url="https://www.suse.com/security/cve/CVE-2022-48765/" source="CVE"/>
		<reference ref_id="CVE-2022-48766" ref_url="https://www.suse.com/security/cve/CVE-2022-48766/" source="CVE"/>
		<reference ref_id="CVE-2022-48767" ref_url="https://www.suse.com/security/cve/CVE-2022-48767/" source="CVE"/>
		<reference ref_id="CVE-2022-48768" ref_url="https://www.suse.com/security/cve/CVE-2022-48768/" source="CVE"/>
		<reference ref_id="CVE-2022-48769" ref_url="https://www.suse.com/security/cve/CVE-2022-48769/" source="CVE"/>
		<reference ref_id="CVE-2022-48770" ref_url="https://www.suse.com/security/cve/CVE-2022-48770/" source="CVE"/>
		<reference ref_id="CVE-2022-48771" ref_url="https://www.suse.com/security/cve/CVE-2022-48771/" source="CVE"/>
		<reference ref_id="CVE-2022-48772" ref_url="https://www.suse.com/security/cve/CVE-2022-48772/" source="CVE"/>
		<reference ref_id="CVE-2023-24023" ref_url="https://www.suse.com/security/cve/CVE-2023-24023/" source="CVE"/>
		<reference ref_id="CVE-2023-52622" ref_url="https://www.suse.com/security/cve/CVE-2023-52622/" source="CVE"/>
		<reference ref_id="CVE-2023-52658" ref_url="https://www.suse.com/security/cve/CVE-2023-52658/" source="CVE"/>
		<reference ref_id="CVE-2023-52667" ref_url="https://www.suse.com/security/cve/CVE-2023-52667/" source="CVE"/>
		<reference ref_id="CVE-2023-52670" ref_url="https://www.suse.com/security/cve/CVE-2023-52670/" source="CVE"/>
		<reference ref_id="CVE-2023-52672" ref_url="https://www.suse.com/security/cve/CVE-2023-52672/" source="CVE"/>
		<reference ref_id="CVE-2023-52675" ref_url="https://www.suse.com/security/cve/CVE-2023-52675/" source="CVE"/>
		<reference ref_id="CVE-2023-52735" ref_url="https://www.suse.com/security/cve/CVE-2023-52735/" source="CVE"/>
		<reference ref_id="CVE-2023-52737" ref_url="https://www.suse.com/security/cve/CVE-2023-52737/" source="CVE"/>
		<reference ref_id="CVE-2023-52752" ref_url="https://www.suse.com/security/cve/CVE-2023-52752/" source="CVE"/>
		<reference ref_id="CVE-2023-52766" ref_url="https://www.suse.com/security/cve/CVE-2023-52766/" source="CVE"/>
		<reference ref_id="CVE-2023-52784" ref_url="https://www.suse.com/security/cve/CVE-2023-52784/" source="CVE"/>
		<reference ref_id="CVE-2023-52787" ref_url="https://www.suse.com/security/cve/CVE-2023-52787/" source="CVE"/>
		<reference ref_id="CVE-2023-52800" ref_url="https://www.suse.com/security/cve/CVE-2023-52800/" source="CVE"/>
		<reference ref_id="CVE-2023-52835" ref_url="https://www.suse.com/security/cve/CVE-2023-52835/" source="CVE"/>
		<reference ref_id="CVE-2023-52837" ref_url="https://www.suse.com/security/cve/CVE-2023-52837/" source="CVE"/>
		<reference ref_id="CVE-2023-52843" ref_url="https://www.suse.com/security/cve/CVE-2023-52843/" source="CVE"/>
		<reference ref_id="CVE-2023-52845" ref_url="https://www.suse.com/security/cve/CVE-2023-52845/" source="CVE"/>
		<reference ref_id="CVE-2023-52846" ref_url="https://www.suse.com/security/cve/CVE-2023-52846/" source="CVE"/>
		<reference ref_id="CVE-2023-52869" ref_url="https://www.suse.com/security/cve/CVE-2023-52869/" source="CVE"/>
		<reference ref_id="CVE-2023-52881" ref_url="https://www.suse.com/security/cve/CVE-2023-52881/" source="CVE"/>
		<reference ref_id="CVE-2023-52882" ref_url="https://www.suse.com/security/cve/CVE-2023-52882/" source="CVE"/>
		<reference ref_id="CVE-2023-52884" ref_url="https://www.suse.com/security/cve/CVE-2023-52884/" source="CVE"/>
		<reference ref_id="CVE-2024-26625" ref_url="https://www.suse.com/security/cve/CVE-2024-26625/" source="CVE"/>
		<reference ref_id="CVE-2024-26644" ref_url="https://www.suse.com/security/cve/CVE-2024-26644/" source="CVE"/>
		<reference ref_id="CVE-2024-26720" ref_url="https://www.suse.com/security/cve/CVE-2024-26720/" source="CVE"/>
		<reference ref_id="CVE-2024-26842" ref_url="https://www.suse.com/security/cve/CVE-2024-26842/" source="CVE"/>
		<reference ref_id="CVE-2024-26845" ref_url="https://www.suse.com/security/cve/CVE-2024-26845/" source="CVE"/>
		<reference ref_id="CVE-2024-26923" ref_url="https://www.suse.com/security/cve/CVE-2024-26923/" source="CVE"/>
		<reference ref_id="CVE-2024-26973" ref_url="https://www.suse.com/security/cve/CVE-2024-26973/" source="CVE"/>
		<reference ref_id="CVE-2024-27432" ref_url="https://www.suse.com/security/cve/CVE-2024-27432/" source="CVE"/>
		<reference ref_id="CVE-2024-33619" ref_url="https://www.suse.com/security/cve/CVE-2024-33619/" source="CVE"/>
		<reference ref_id="CVE-2024-35247" ref_url="https://www.suse.com/security/cve/CVE-2024-35247/" source="CVE"/>
		<reference ref_id="CVE-2024-35789" ref_url="https://www.suse.com/security/cve/CVE-2024-35789/" source="CVE"/>
		<reference ref_id="CVE-2024-35790" ref_url="https://www.suse.com/security/cve/CVE-2024-35790/" source="CVE"/>
		<reference ref_id="CVE-2024-35807" ref_url="https://www.suse.com/security/cve/CVE-2024-35807/" source="CVE"/>
		<reference ref_id="CVE-2024-35814" ref_url="https://www.suse.com/security/cve/CVE-2024-35814/" source="CVE"/>
		<reference ref_id="CVE-2024-35835" ref_url="https://www.suse.com/security/cve/CVE-2024-35835/" source="CVE"/>
		<reference ref_id="CVE-2024-35848" ref_url="https://www.suse.com/security/cve/CVE-2024-35848/" source="CVE"/>
		<reference ref_id="CVE-2024-35857" ref_url="https://www.suse.com/security/cve/CVE-2024-35857/" source="CVE"/>
		<reference ref_id="CVE-2024-35861" ref_url="https://www.suse.com/security/cve/CVE-2024-35861/" source="CVE"/>
		<reference ref_id="CVE-2024-35862" ref_url="https://www.suse.com/security/cve/CVE-2024-35862/" source="CVE"/>
		<reference ref_id="CVE-2024-35864" ref_url="https://www.suse.com/security/cve/CVE-2024-35864/" source="CVE"/>
		<reference ref_id="CVE-2024-35869" ref_url="https://www.suse.com/security/cve/CVE-2024-35869/" source="CVE"/>
		<reference ref_id="CVE-2024-35878" ref_url="https://www.suse.com/security/cve/CVE-2024-35878/" source="CVE"/>
		<reference ref_id="CVE-2024-35884" ref_url="https://www.suse.com/security/cve/CVE-2024-35884/" source="CVE"/>
		<reference ref_id="CVE-2024-35886" ref_url="https://www.suse.com/security/cve/CVE-2024-35886/" source="CVE"/>
		<reference ref_id="CVE-2024-35896" ref_url="https://www.suse.com/security/cve/CVE-2024-35896/" source="CVE"/>
		<reference ref_id="CVE-2024-35898" ref_url="https://www.suse.com/security/cve/CVE-2024-35898/" source="CVE"/>
		<reference ref_id="CVE-2024-35900" ref_url="https://www.suse.com/security/cve/CVE-2024-35900/" source="CVE"/>
		<reference ref_id="CVE-2024-35905" ref_url="https://www.suse.com/security/cve/CVE-2024-35905/" source="CVE"/>
		<reference ref_id="CVE-2024-35925" ref_url="https://www.suse.com/security/cve/CVE-2024-35925/" source="CVE"/>
		<reference ref_id="CVE-2024-35950" ref_url="https://www.suse.com/security/cve/CVE-2024-35950/" source="CVE"/>
		<reference ref_id="CVE-2024-35956" ref_url="https://www.suse.com/security/cve/CVE-2024-35956/" source="CVE"/>
		<reference ref_id="CVE-2024-35958" ref_url="https://www.suse.com/security/cve/CVE-2024-35958/" source="CVE"/>
		<reference ref_id="CVE-2024-35960" ref_url="https://www.suse.com/security/cve/CVE-2024-35960/" source="CVE"/>
		<reference ref_id="CVE-2024-35962" ref_url="https://www.suse.com/security/cve/CVE-2024-35962/" source="CVE"/>
		<reference ref_id="CVE-2024-35997" ref_url="https://www.suse.com/security/cve/CVE-2024-35997/" source="CVE"/>
		<reference ref_id="CVE-2024-36005" ref_url="https://www.suse.com/security/cve/CVE-2024-36005/" source="CVE"/>
		<reference ref_id="CVE-2024-36008" ref_url="https://www.suse.com/security/cve/CVE-2024-36008/" source="CVE"/>
		<reference ref_id="CVE-2024-36017" ref_url="https://www.suse.com/security/cve/CVE-2024-36017/" source="CVE"/>
		<reference ref_id="CVE-2024-36020" ref_url="https://www.suse.com/security/cve/CVE-2024-36020/" source="CVE"/>
		<reference ref_id="CVE-2024-36021" ref_url="https://www.suse.com/security/cve/CVE-2024-36021/" source="CVE"/>
		<reference ref_id="CVE-2024-36025" ref_url="https://www.suse.com/security/cve/CVE-2024-36025/" source="CVE"/>
		<reference ref_id="CVE-2024-36477" ref_url="https://www.suse.com/security/cve/CVE-2024-36477/" source="CVE"/>
		<reference ref_id="CVE-2024-36478" ref_url="https://www.suse.com/security/cve/CVE-2024-36478/" source="CVE"/>
		<reference ref_id="CVE-2024-36479" ref_url="https://www.suse.com/security/cve/CVE-2024-36479/" source="CVE"/>
		<reference ref_id="CVE-2024-36890" ref_url="https://www.suse.com/security/cve/CVE-2024-36890/" source="CVE"/>
		<reference ref_id="CVE-2024-36894" ref_url="https://www.suse.com/security/cve/CVE-2024-36894/" source="CVE"/>
		<reference ref_id="CVE-2024-36899" ref_url="https://www.suse.com/security/cve/CVE-2024-36899/" source="CVE"/>
		<reference ref_id="CVE-2024-36900" ref_url="https://www.suse.com/security/cve/CVE-2024-36900/" source="CVE"/>
		<reference ref_id="CVE-2024-36904" ref_url="https://www.suse.com/security/cve/CVE-2024-36904/" source="CVE"/>
		<reference ref_id="CVE-2024-36915" ref_url="https://www.suse.com/security/cve/CVE-2024-36915/" source="CVE"/>
		<reference ref_id="CVE-2024-36916" ref_url="https://www.suse.com/security/cve/CVE-2024-36916/" source="CVE"/>
		<reference ref_id="CVE-2024-36917" ref_url="https://www.suse.com/security/cve/CVE-2024-36917/" source="CVE"/>
		<reference ref_id="CVE-2024-36919" ref_url="https://www.suse.com/security/cve/CVE-2024-36919/" source="CVE"/>
		<reference ref_id="CVE-2024-36934" ref_url="https://www.suse.com/security/cve/CVE-2024-36934/" source="CVE"/>
		<reference ref_id="CVE-2024-36937" ref_url="https://www.suse.com/security/cve/CVE-2024-36937/" source="CVE"/>
		<reference ref_id="CVE-2024-36940" ref_url="https://www.suse.com/security/cve/CVE-2024-36940/" source="CVE"/>
		<reference ref_id="CVE-2024-36945" ref_url="https://www.suse.com/security/cve/CVE-2024-36945/" source="CVE"/>
		<reference ref_id="CVE-2024-36949" ref_url="https://www.suse.com/security/cve/CVE-2024-36949/" source="CVE"/>
		<reference ref_id="CVE-2024-36960" ref_url="https://www.suse.com/security/cve/CVE-2024-36960/" source="CVE"/>
		<reference ref_id="CVE-2024-36964" ref_url="https://www.suse.com/security/cve/CVE-2024-36964/" source="CVE"/>
		<reference ref_id="CVE-2024-36965" ref_url="https://www.suse.com/security/cve/CVE-2024-36965/" source="CVE"/>
		<reference ref_id="CVE-2024-36967" ref_url="https://www.suse.com/security/cve/CVE-2024-36967/" source="CVE"/>
		<reference ref_id="CVE-2024-36969" ref_url="https://www.suse.com/security/cve/CVE-2024-36969/" source="CVE"/>
		<reference ref_id="CVE-2024-36971" ref_url="https://www.suse.com/security/cve/CVE-2024-36971/" source="CVE"/>
		<reference ref_id="CVE-2024-36975" ref_url="https://www.suse.com/security/cve/CVE-2024-36975/" source="CVE"/>
		<reference ref_id="CVE-2024-36978" ref_url="https://www.suse.com/security/cve/CVE-2024-36978/" source="CVE"/>
		<reference ref_id="CVE-2024-37021" ref_url="https://www.suse.com/security/cve/CVE-2024-37021/" source="CVE"/>
		<reference ref_id="CVE-2024-37078" ref_url="https://www.suse.com/security/cve/CVE-2024-37078/" source="CVE"/>
		<reference ref_id="CVE-2024-37354" ref_url="https://www.suse.com/security/cve/CVE-2024-37354/" source="CVE"/>
		<reference ref_id="CVE-2024-38381" ref_url="https://www.suse.com/security/cve/CVE-2024-38381/" source="CVE"/>
		<reference ref_id="CVE-2024-38388" ref_url="https://www.suse.com/security/cve/CVE-2024-38388/" source="CVE"/>
		<reference ref_id="CVE-2024-38390" ref_url="https://www.suse.com/security/cve/CVE-2024-38390/" source="CVE"/>
		<reference ref_id="CVE-2024-38540" ref_url="https://www.suse.com/security/cve/CVE-2024-38540/" source="CVE"/>
		<reference ref_id="CVE-2024-38541" ref_url="https://www.suse.com/security/cve/CVE-2024-38541/" source="CVE"/>
		<reference ref_id="CVE-2024-38544" ref_url="https://www.suse.com/security/cve/CVE-2024-38544/" source="CVE"/>
		<reference ref_id="CVE-2024-38545" ref_url="https://www.suse.com/security/cve/CVE-2024-38545/" source="CVE"/>
		<reference ref_id="CVE-2024-38546" ref_url="https://www.suse.com/security/cve/CVE-2024-38546/" source="CVE"/>
		<reference ref_id="CVE-2024-38547" ref_url="https://www.suse.com/security/cve/CVE-2024-38547/" source="CVE"/>
		<reference ref_id="CVE-2024-38548" ref_url="https://www.suse.com/security/cve/CVE-2024-38548/" source="CVE"/>
		<reference ref_id="CVE-2024-38549" ref_url="https://www.suse.com/security/cve/CVE-2024-38549/" source="CVE"/>
		<reference ref_id="CVE-2024-38550" ref_url="https://www.suse.com/security/cve/CVE-2024-38550/" source="CVE"/>
		<reference ref_id="CVE-2024-38552" ref_url="https://www.suse.com/security/cve/CVE-2024-38552/" source="CVE"/>
		<reference ref_id="CVE-2024-38553" ref_url="https://www.suse.com/security/cve/CVE-2024-38553/" source="CVE"/>
		<reference ref_id="CVE-2024-38555" ref_url="https://www.suse.com/security/cve/CVE-2024-38555/" source="CVE"/>
		<reference ref_id="CVE-2024-38556" ref_url="https://www.suse.com/security/cve/CVE-2024-38556/" source="CVE"/>
		<reference ref_id="CVE-2024-38557" ref_url="https://www.suse.com/security/cve/CVE-2024-38557/" source="CVE"/>
		<reference ref_id="CVE-2024-38559" ref_url="https://www.suse.com/security/cve/CVE-2024-38559/" source="CVE"/>
		<reference ref_id="CVE-2024-38560" ref_url="https://www.suse.com/security/cve/CVE-2024-38560/" source="CVE"/>
		<reference ref_id="CVE-2024-38564" ref_url="https://www.suse.com/security/cve/CVE-2024-38564/" source="CVE"/>
		<reference ref_id="CVE-2024-38565" ref_url="https://www.suse.com/security/cve/CVE-2024-38565/" source="CVE"/>
		<reference ref_id="CVE-2024-38567" ref_url="https://www.suse.com/security/cve/CVE-2024-38567/" source="CVE"/>
		<reference ref_id="CVE-2024-38568" ref_url="https://www.suse.com/security/cve/CVE-2024-38568/" source="CVE"/>
		<reference ref_id="CVE-2024-38571" ref_url="https://www.suse.com/security/cve/CVE-2024-38571/" source="CVE"/>
		<reference ref_id="CVE-2024-38573" ref_url="https://www.suse.com/security/cve/CVE-2024-38573/" source="CVE"/>
		<reference ref_id="CVE-2024-38578" ref_url="https://www.suse.com/security/cve/CVE-2024-38578/" source="CVE"/>
		<reference ref_id="CVE-2024-38579" ref_url="https://www.suse.com/security/cve/CVE-2024-38579/" source="CVE"/>
		<reference ref_id="CVE-2024-38580" ref_url="https://www.suse.com/security/cve/CVE-2024-38580/" source="CVE"/>
		<reference ref_id="CVE-2024-38581" ref_url="https://www.suse.com/security/cve/CVE-2024-38581/" source="CVE"/>
		<reference ref_id="CVE-2024-38582" ref_url="https://www.suse.com/security/cve/CVE-2024-38582/" source="CVE"/>
		<reference ref_id="CVE-2024-38583" ref_url="https://www.suse.com/security/cve/CVE-2024-38583/" source="CVE"/>
		<reference ref_id="CVE-2024-38587" ref_url="https://www.suse.com/security/cve/CVE-2024-38587/" source="CVE"/>
		<reference ref_id="CVE-2024-38590" ref_url="https://www.suse.com/security/cve/CVE-2024-38590/" source="CVE"/>
		<reference ref_id="CVE-2024-38591" ref_url="https://www.suse.com/security/cve/CVE-2024-38591/" source="CVE"/>
		<reference ref_id="CVE-2024-38594" ref_url="https://www.suse.com/security/cve/CVE-2024-38594/" source="CVE"/>
		<reference ref_id="CVE-2024-38597" ref_url="https://www.suse.com/security/cve/CVE-2024-38597/" source="CVE"/>
		<reference ref_id="CVE-2024-38599" ref_url="https://www.suse.com/security/cve/CVE-2024-38599/" source="CVE"/>
		<reference ref_id="CVE-2024-38600" ref_url="https://www.suse.com/security/cve/CVE-2024-38600/" source="CVE"/>
		<reference ref_id="CVE-2024-38601" ref_url="https://www.suse.com/security/cve/CVE-2024-38601/" source="CVE"/>
		<reference ref_id="CVE-2024-38603" ref_url="https://www.suse.com/security/cve/CVE-2024-38603/" source="CVE"/>
		<reference ref_id="CVE-2024-38605" ref_url="https://www.suse.com/security/cve/CVE-2024-38605/" source="CVE"/>
		<reference ref_id="CVE-2024-38608" ref_url="https://www.suse.com/security/cve/CVE-2024-38608/" source="CVE"/>
		<reference ref_id="CVE-2024-38616" ref_url="https://www.suse.com/security/cve/CVE-2024-38616/" source="CVE"/>
		<reference ref_id="CVE-2024-38618" ref_url="https://www.suse.com/security/cve/CVE-2024-38618/" source="CVE"/>
		<reference ref_id="CVE-2024-38619" ref_url="https://www.suse.com/security/cve/CVE-2024-38619/" source="CVE"/>
		<reference ref_id="CVE-2024-38621" ref_url="https://www.suse.com/security/cve/CVE-2024-38621/" source="CVE"/>
		<reference ref_id="CVE-2024-38627" ref_url="https://www.suse.com/security/cve/CVE-2024-38627/" source="CVE"/>
		<reference ref_id="CVE-2024-38630" ref_url="https://www.suse.com/security/cve/CVE-2024-38630/" source="CVE"/>
		<reference ref_id="CVE-2024-38633" ref_url="https://www.suse.com/security/cve/CVE-2024-38633/" source="CVE"/>
		<reference ref_id="CVE-2024-38634" ref_url="https://www.suse.com/security/cve/CVE-2024-38634/" source="CVE"/>
		<reference ref_id="CVE-2024-38635" ref_url="https://www.suse.com/security/cve/CVE-2024-38635/" source="CVE"/>
		<reference ref_id="CVE-2024-38659" ref_url="https://www.suse.com/security/cve/CVE-2024-38659/" source="CVE"/>
		<reference ref_id="CVE-2024-38661" ref_url="https://www.suse.com/security/cve/CVE-2024-38661/" source="CVE"/>
		<reference ref_id="CVE-2024-38780" ref_url="https://www.suse.com/security/cve/CVE-2024-38780/" source="CVE"/>
		<reference ref_id="CVE-2024-39301" ref_url="https://www.suse.com/security/cve/CVE-2024-39301/" source="CVE"/>
		<reference ref_id="CVE-2024-39468" ref_url="https://www.suse.com/security/cve/CVE-2024-39468/" source="CVE"/>
		<reference ref_id="CVE-2024-39469" ref_url="https://www.suse.com/security/cve/CVE-2024-39469/" source="CVE"/>
		<reference ref_id="CVE-2024-39471" ref_url="https://www.suse.com/security/cve/CVE-2024-39471/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2021-47089: kfence: fix memory leak when cat kfence objects (bsc#1220958.
- CVE-2021-47432: lib/generic-radix-tree.c: Do not overflow in peek() (bsc#1225391).
- CVE-2021-47515: seg6: fix the iif in the IPv6 socket control block (bsc#1225426).
- CVE-2021-47538: rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() (bsc#1225448).
- CVE-2021-47539: rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle() (bsc#1225452).
- CVE-2021-47555: net: vlan: fix underflow for the real_dev refcnt (bsc#1225467).
- CVE-2021-47566: Fix clearing user buffer by properly using clear_user() (bsc#1225514).
- CVE-2021-47571: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() (bsc#1225518).
- CVE-2021-47572: net: nexthop: fix null pointer dereference when IPv6 is not enabled (bsc#1225389).
- CVE-2022-48716: ASoC: codecs: wcd938x: fix incorrect used of portid (bsc#1226678).
- CVE-2023-24023: Bluetooth: Add more enc key size check (bsc#1218148).
- CVE-2023-52622: ext4: avoid online resizing failures due to oversized flex bg (bsc#1222080).
- CVE-2023-52658: Revert 'net/mlx5: Block entering switchdev mode with ns inconsistency' (bsc#1224719).
- CVE-2023-52667: net/mlx5e: fix a potential double-free in fs_any_create_groups (bsc#1224603).
- CVE-2023-52670: rpmsg: virtio: Free driver_override when rpmsg_remove() (bsc#1224696).
- CVE-2023-52672: pipe: wakeup wr_wait after setting max_usage (bsc#1224614).
- CVE-2023-52675: powerpc/imc-pmu: Add a null pointer check in update_events_in_group() (bsc#1224504).
- CVE-2023-52735: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself (bsc#1225475).
- CVE-2023-52737: btrfs: lock the inode in shared mode before starting fiemap (bsc#1225484).
- CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487).
- CVE-2023-52784: bonding: stop the device in bond_setup_by_slave() (bsc#1224946).
- CVE-2023-52787: blk-mq: make sure active queue usage is held for bio_integrity_prep() (bsc#1225105).
- CVE-2023-52835: perf/core: Bail out early if the request AUX area is out of bound (bsc#1225602).
- CVE-2023-52837: nbd: fix uaf in nbd_open (bsc#1224935).
- CVE-2023-52843: llc: verify mac len before reading mac header (bsc#1224951).
- CVE-2023-52845: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (bsc#1225585).
- CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225098).
- CVE-2023-52869: pstore/platform: Add check for kstrdup (bsc#1225050).
- CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).
- CVE-2023-52882: clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change (bsc#1225692).
- CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)
- CVE-2024-26644: btrfs: do not abort filesystem when attempting to snapshot deleted subvolume (bsc#1221282bsc#1222072).
- CVE-2024-26720: mm: Avoid overflows in dirty throttling logic (bsc#1222364).
- CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384).
- CVE-2024-26973: fat: fix uninitialized field in nostale filehandles (git-fixesbsc#1223641).
- CVE-2024-27432: net: ethernet: mtk_eth_soc: fix PPE hanging issue (bsc#1224716).
- CVE-2024-35247: fpga: region: add owner module and take its refcount (bsc#1226948).
- CVE-2024-35789: Check fast rx for non-4addr sta VLAN changes (bsc#1224749).
- CVE-2024-35790: usb: typec: altmodes/displayport: create sysfs nodes as driver's default device attribute group (bsc#1224712).
- CVE-2024-35807: ext4: fix corruption during on-line resize (bsc#1224735).
- CVE-2024-35835: net/mlx5e: fix a double-free in arfs_create_groups (bsc#1224605).
- CVE-2024-35848: eeprom: at24: fix memory corruption race condition (bsc#1224612).
- CVE-2024-35857: icmp: prevent possible NULL dereferences from icmp_build_probe() (bsc#1224619).
- CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766).
- CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764).
- CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765).
- CVE-2024-35869: smb: client: guarantee refcounted children from parent session (bsc#1224679).
- CVE-2024-35884: udp: do not accept non-tunnel GSO skbs landing in a tunnel (bsc#1224520).
- CVE-2024-35886: ipv6: Fix infinite recursion in fib6_dump_done() (bsc#1224670).
- CVE-2024-35898: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (bsc#1224498).
- CVE-2024-35900: netfilter: nf_tables: reject new basechain after table flag update (bsc#1224497).
- CVE-2024-35925: block: prevent division by zero in blk_rq_stat_sum() (bsc#1224661).
- CVE-2024-35950: drm/client: Fully protect modes with dev-&gt;mode_config.mutex (bsc#1224703).
- CVE-2024-35958: net: ena: Fix incorrect descriptor free behavior (bsc#1224677).
- CVE-2024-35960: net/mlx5: Properly link new fs rules into the tree (bsc#1224588).
- CVE-2024-35997: Remove I2C_HID_READ_PENDING flag to prevent lock-up (bsc#1224552).
- CVE-2024-36005: netfilter: nf_tables: honor table dormant flag from netdev release event path (bsc#1224539).
- CVE-2024-36008: ipv4: check for NULL idev in ip_route_use_hint() (bsc#1224540).
- CVE-2024-36017: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation (bsc#1225681).
- CVE-2024-36020: i40e: fix vf may be used uninitialized in this function warning (bsc#1225698).
- CVE-2024-36021: net: hns3: fix kernel crash when devlink reload during pf initialization (bsc#1225699).
- CVE-2024-36478: null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues' (bsc#1226841).
- CVE-2024-36479: fpga: bridge: add owner module and take its refcount (bsc#1226949).
- CVE-2024-36890: mm/slab: make __free(kfree) accept error pointers (bsc#1225714).
- CVE-2024-36894: usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete (bsc#1225749).
- CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225737).
- CVE-2024-36900: net: hns3: fix kernel crash when devlink reload during initialization (bsc#1225726).
- CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225732).
- CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758).
- CVE-2024-36916: blk-iocost: avoid out of bounds shift (bsc#1225759).
- CVE-2024-36917: block: fix overflow in blk_ioctl_discard() (bsc#1225770).
- CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload (bsc#1225767).
- CVE-2024-36934: bna: ensure the copied buf is NUL terminated (bsc#1225760).
- CVE-2024-36937: xdp: use flags field to disambiguate broadcast redirect (bsc#1225834).
- CVE-2024-36940: pinctrl: core: delete incorrect free in pinctrl_enable() (bsc#1225840).
- CVE-2024-36945: net/smc: fix neighbour and rtable leak in smc_ib_find_route() (bsc#1225823).
- CVE-2024-36949: amd/amdkfd: sync all devices to wait all processes being evicted (bsc#1225872)
- CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1225866).
- CVE-2024-36971: net: fix __dst_negative_advice() race (bsc#1226145).
- CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514).
- CVE-2024-37021: fpga: manager: add owner module and take its refcount (bsc#1226950).
- CVE-2024-37078: nilfs2: fix potential kernel bug due to lack of writeback flag waiting (bsc#1227066).
- CVE-2024-37354: btrfs: fix crash on racing fsync and size-extending write into prealloc (bsc#1227101).
- CVE-2024-38545: RDMA/hns: Fix UAF for cq async event (bsc#1226595).
- CVE-2024-38553: net: fec: remove .ndo_poll_controller to avoid deadlock (bsc#1226744).
- CVE-2024-38555: net/mlx5: Discard command completions in internal error (bsc#1226607).
- CVE-2024-38556: net/mlx5: Add a timeout to acquire the command queue semaphore (bsc#1226774).
- CVE-2024-38557: net/mlx5: Reload only IB representors upon lag disable/enable (bsc#1226781).
- CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785).
- CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786).
- CVE-2024-38564: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (bsc#1226789).
- CVE-2024-38568: drivers/perf: hisi: hns3: Fix out-of-bound access when valid event group (bsc#1226771).
- CVE-2024-38578: ecryptfs: Fix buffer size for tag 66 packet (bsc#1226634,).
- CVE-2024-38580: epoll: be better about file lifetimes (bsc#1226610).
- CVE-2024-38594: net: stmmac: move the EST lock to struct stmmac_priv (bsc#1226734).
- CVE-2024-38597: eth: sungem: remove .ndo_poll_controller to avoid deadlocks (bsc#1226749).
- CVE-2024-38603: drivers/perf: hisi: hns3: Actually use devm_add_action_or_reset() (bsc#1226842).
- CVE-2024-38608: net/mlx5e: Fix netif state handling (bsc#1226746).
- CVE-2024-38627: stm class: Fix a double free in stm_register_device() (bsc#1226857).
- CVE-2024-38659: enic: Validate length of nl attributes in enic_set_vf_port (bsc#1226883).
- CVE-2024-38661: s390/ap: Fix crash in AP internal function modify_bitmap() (bsc#1226996).
- CVE-2024-38780: dma-buf/sw-sync: do not enable IRQ from sync_print_obj() (bsc#1226886).
- CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994).
- CVE-2024-39468: smb: client: fix deadlock in smb2_find_smb_tcon() (bsc#1227103.
- CVE-2024-39469: nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors (bsc#1226992).

The following non-security bugs were fixed:

- ACPI: resource: Do IRQ override on TongFang GXxHRXx and GMxHGxx (stable-fixes).
- ACPICA: Revert 'ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.' (git-fixes).
- ALSA/hda: intel-dsp-config: Document AVS as dsp_driver option (git-fixes).
- ALSA: Fix deadlocks with kctl removals at disconnection (stable-fixes).
- ALSA: hda/realtek: Add quirks for Lenovo 13X (stable-fixes).
- ALSA: hda/realtek: Adjust G814JZR to use SPI init for amp (git-fixes).
- ALSA: hda/realtek: Enable headset mic on IdeaPad 330-17IKB 81DM (git-fixes).
- ALSA: hda/realtek: Fix conflicting quirk for PCI SSID 17aa:3820 (git-fixes).
- ALSA: hda/realtek: Limit mic boost on N14AP7 (stable-fixes).
- ALSA: hda/realtek: Remove Framework Laptop 16 from quirks (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs do not work for ProBook 440/460 G11 (stable-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs do not work for ProBook 445/465 G11 (stable-fixes).
- ALSA: hda: intel-dsp-config: harden I2C/I2S codec detection (stable-fixes).
- ALSA: timer: Set lower bound of start tick time (stable-fixes).
- ASoC: amd: acp: add a null check for chip_pdev structure (git-fixes).
- ASoC: amd: acp: remove i2s configuration check in acp_i2s_probe() (git-fixes).
- ASoC: da7219-aad: fix usage of device_get_named_child_node() (stable-fixes).
- ASoC: fsl-asoc-card: set priv-&gt;pdev before using it (git-fixes).
- ASoC: rt5645: Fix the electric noise due to the CBJ contacts floating (stable-fixes).
- ASoC: rt715-sdca: volume step modification (stable-fixes).
- ASoC: rt715: add vendor clear control register (stable-fixes).
- Add remote for nfs maintainer
- Bluetooth: L2CAP: Fix rejecting L2CAP_CONN_PARAM_UPDATE_REQ (git-fixes).
- Fix new build warnings regarding unused variables: Changed build warnings: ***** 2 warnings ***** * unused-variable (cl) in ../fs/ceph/mds_client.c in ceph_queue_cap_unlink_work ../fs/ceph/mds_client.c: In function 'ceph_queue_cap_unlink_work': ../fs/ceph/mds_client.c:2421:22: warning: unused variable 'cl' [-Wunused-variable] * unused-variable (cl) in ../fs/ceph/mds_client.c in ceph_cap_unlink_work ../fs/ceph/mds_client.c: In function 'ceph_cap_unlink_work': ../fs/ceph/mds_client.c:2436:22: warning: unused variable 'cl' [-Wunused-variable]
- HID: core: remove unnecessary WARN_ON() in implement() (git-fixes).
- HID: logitech-dj: Fix memory leak in logi_dj_recv_switch_to_dj_mode() (git-fixes).
- Input: ili210x - fix ili251x_read_touch_data() return value (git-fixes).
- NFS: abort nfs_atomic_open_v23 if name is too long (bsc#1219847).
- NFS: add atomic_open for NFSv3 to handle O_TRUNC correctly (bsc#1219847).
- NFS: avoid infinite loop in pnfs_update_layout (bsc#1219633 bsc#1226226).
- PCI/ASPM: Update save_state when configuration changes (bsc#1226915)
- PCI: Clear Secondary Status errors after enumeration (bsc#1226928)
- RAS/AMD/ATL: Fix MI300 bank hash (bsc#1225300).
- RAS/AMD/ATL: Use system settings for MI300 DRAM to normalized address translation (bsc#1225300).
- RDMA/hns: Fix incorrect sge nums calculation (git-fixes)
- RDMA/irdma: Drop unused kernel push code (git-fixes)
- RDMA/mlx5: Add check for srq max_sge attribute (git-fixes)
- USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (git-fixes).
- USB: xen-hcd: Traverse host/ when CONFIG_USB_XEN_HCD is selected (git-fixes).
- X.509: Fix the parser of extended key usage for length (bsc#1218820).
- arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY (git-fixes).
- arm64: mm: Batch dsb and isb when populating pgtables (jsc#PED-8690).
- arm64: mm: Do not remap pgtables for allocate vs populate (jsc#PED-8690).
- arm64: mm: Do not remap pgtables per-cont(pte|pmd) block (jsc#PED-8690).
- arm64: mm: do not acquire mutex when rewriting swapper (jsc#PED-8690).
- ata: ahci: Clean up sysfs file on error (git-fixes).
- ata: libata-core: Fix double free on error (git-fixes).
- ata: libata-core: Fix null pointer dereference on error (git-fixes).
- batman-adv: Do not accept TT entries for out-of-spec VIDs (git-fixes).
- bpf, sockmap: Check for any of tcp_bpf_prots when cloning a listener (git-fixes).
- btrfs: avoid copying BTRFS_ROOT_SUBVOL_DEAD flag to snapshot of subvolume being deleted (bsc#1221282).
- cachefiles: remove requests from xarray during flushing requests (bsc#1226588).
- ceph: add ceph_cap_unlink_work to fire check_caps() immediately (bsc#1226022).
- ceph: always check dir caps asynchronously (bsc#1226022).
- ceph: always queue a writeback when revoking the Fb caps (bsc#1226022).
- ceph: break the check delayed cap loop every 5s (bsc#1226022).
- ceph: switch to use cap_delay_lock for the unlink delay list (bsc#1226022).
- cgroup: Add annotation for holding namespace_sem in current_cgns_cgroup_from_root() (bsc#1222254).
- cgroup: Eliminate the need for cgroup_mutex in proc_cgroup_show() (bsc#1222254).
- cgroup: Make operations on the cgroup root_list RCU safe (bsc#1222254).
- cgroup: Remove unnecessary list_empty() (bsc#1222254).
- cgroup: preserve KABI of cgroup_root (bsc#1222254).
- cifs: fix hang in wait_for_response() (bsc#1220812, bsc#1220368).
- cpufreq: amd-pstate: Fix the inconsistency in max frequency units (git-fixes).
- crypto: ecrdsa - Fix module auto-load on add_key (stable-fixes).
- dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (git-fixes).
- dmaengine: ioatdma: Fix missing kmem_cache_destroy() (git-fixes).
- drivers: core: synchronize really_probe() and dev_uevent() (git-fixes).
- drm/amd/display: Add VCO speed parameter for DCN31 FPU (stable-fixes).
- drm/amd/display: Add dtbclk access to dcn315 (stable-fixes).
- drm/amd/display: Exit idle optimizations before HDCP execution (stable-fixes).
- drm/amd/display: Set color_mgmt_changed to true on unsuspend (stable-fixes).
- drm/amd/display: drop unnecessary NULL checks in debugfs (stable-fixes).
- drm/amd/display: revert Exit idle optimizations before HDCP execution (stable-fixes).
- drm/amd: Fix shutdown (again) on some SMU v13.0.4/11 platforms (git-fixes).
- drm/amdgpu/atomfirmware: add intergrated info v2.3 table (stable-fixes).
- drm/amdgpu/mes: fix use-after-free issue (stable-fixes).
- drm/amdgpu: Fix the ring buffer size for queue VM flush (stable-fixes).
- drm/amdgpu: Update BO eviction priorities (stable-fixes).
- drm/amdgpu: add error handle to avoid out-of-bounds (stable-fixes).
- drm/amdgpu: fix UBSAN warning in kv_dpm.c (stable-fixes).
- drm/amdkfd: Flush the process wq before creating a kfd_process (stable-fixes).
- drm/amdkfd: Rework kfd_locked handling (bsc#1225872)
- drm/bridge/panel: Fix runtime warning on panel bridge release (git-fixes).
- drm/exynos/vidi: fix memory leak in .get_modes() (stable-fixes).
- drm/exynos: hdmi: report safe 640x480 mode as a fallback when no EDID found (git-fixes).
- drm/i915/dpt: Make DPT object unshrinkable (git-fixes).
- drm/i915/gt: Disarm breadcrumbs if engines are already idle (git-fixes).
- drm/i915/gt: Fix potential UAF by revoke of fence registers (git-fixes).
- drm/i915/guc: avoid FIELD_PREP warning (git-fixes).
- drm/i915/mso: using joiner is not possible with eDP MSO (git-fixes).
- drm/komeda: check for error-valued pointer (git-fixes).
- drm/lima: add mask irq callback to gp and pp (stable-fixes).
- drm/lima: mask irqs in timeout path before hard reset (stable-fixes).
- drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails (git-fixes).
- drm/msm/dp: Avoid a long timeout for AUX transfer if nothing connected (git-fixes).
- drm/msm/dp: Return IRQ_NONE for unhandled interrupts (stable-fixes).
- drm/msm: Enable clamp_to_idle for 7c3 (stable-fixes).
- drm/panel-samsung-atna33xc20: Use ktime_get_boottime for delays (stable-fixes).
- drm/panel: simple: Add missing display timing flags for KOE TX26D202VM0BWA (git-fixes).
- drm/radeon: fix UBSAN warning in kv_dpm.c (stable-fixes).
- drm/vmwgfx: 3D disabled should not effect STDU memory limits (git-fixes).
- drm/vmwgfx: Filter modes which exceed graphics memory (git-fixes).
- gpio: davinci: Validate the obtained number of IRQs (git-fixes).
- gpio: tqmx86: fix typo in Kconfig label (git-fixes).
- gpio: tqmx86: introduce shadow register for GPIO output value (git-fixes).
- gpiolib: cdev: Disallow reconfiguration without direction (uAPI v1) (git-fixes).
- hwmon: (shtc1) Fix property misspelling (git-fixes).
- i2c: at91: Fix the functionality flags of the slave-only interface (git-fixes).
- i2c: designware: Fix the functionality flags of the slave-only interface (git-fixes).
- i2c: ocores: set IACK bit after core is enabled (git-fixes).
- i2c: testunit: discard write requests while old command is running (git-fixes).
- i2c: testunit: do not erase registers after STOP (git-fixes).
- iio: accel: fxls8962af: select IIO_BUFFER &amp; IIO_KFIFO_BUF (git-fixes).
- iio: adc: ad7266: Fix variable checking bug (git-fixes).
- iio: adc: ad9467: fix scan type sign (git-fixes).
- iio: chemical: bme680: Fix calibration data variable (git-fixes).
- iio: chemical: bme680: Fix overflows in compensate() functions (git-fixes).
- iio: chemical: bme680: Fix pressure value output (git-fixes).
- iio: chemical: bme680: Fix sensor data read operation (git-fixes).
- iio: dac: ad5592r: fix temperature channel scaling value (git-fixes).
- iio: imu: inv_icm42600: delete unneeded update watermark call (git-fixes).
- intel_th: pci: Add Meteor Lake-S CPU support (stable-fixes).
- iommu/amd: Fix sysfs leak in iommu init (git-fixes).
- iommu: Return right value in iommu_sva_bind_device() (git-fixes).
- iommu: mtk: fix module autoloading (git-fixes).
- ipvs: Fix checksumming on GSO of SCTP packets (bsc#1221958)
- kbuild: Install dtb files as 0644 in Makefile.dtbinst (git-fixes).
- kbuild: do not include include/config/auto.conf from shell scripts (bsc#1227274).
- kconfig: doc: fix a typo in the note about 'imply' (git-fixes).
- kconfig: fix comparison to constant symbols, 'm', 'n' (git-fixes).
- kernel-doc: fix struct_group_tagged() parsing (git-fixes).
- lib: memcpy_kunit: Fix an invalid format specifier in an assertion msg (git-fixes).
- media: flexcop-usb: clean up endpoint sanity checks (stable-fixes).
- media: flexcop-usb: fix sanity check of bNumEndpoints (git-fixes).
- media: ipu3-cio2: Use temporary storage for struct device pointer (stable-fixes).
- media: lgdt3306a: Add a check against null-pointer-def (stable-fixes).
- media: mxl5xx: Move xpt structures off stack (stable-fixes).
- media: radio-shark2: Avoid led_names truncations (git-fixes).
- media: v4l2-core: hold videodev_lock until dev reg, finishes (stable-fixes).
- mei: me: release irq in mei_me_pci_resume error path (git-fixes).
- mkspec-dtb: add toplevel symlinks also on arm
- mmc: core: Add mmc_gpiod_set_cd_config() function (stable-fixes).
- mmc: core: Do not force a retune before RPMB switch (stable-fixes).
- mmc: sdhci-acpi: Disable write protect detection on Toshiba WT10-A (stable-fixes).
- mmc: sdhci-acpi: Fix Lenovo Yoga Tablet 2 Pro 1380 sdcard slot not working (stable-fixes).
- mmc: sdhci-acpi: Sort DMI quirks alphabetically (stable-fixes).
- mmc: sdhci-pci: Convert PCIBIOS_* return codes to errnos (git-fixes).
- mmc: sdhci: Do not invert write-protect twice (git-fixes).
- mmc: sdhci: Do not lock spinlock around mmc_gpio_get_ro() (git-fixes).
- mmc: sdhci_am654: Add ITAPDLYSEL in sdhci_j721e_4bit_set_clock (git-fixes).
- mmc: sdhci_am654: Add OTAP/ITAP delay enable (git-fixes).
- mmc: sdhci_am654: Drop lookup for deprecated ti,otap-del-sel (stable-fixes).
- mmc: sdhci_am654: Fix ITAPDLY for HS400 timing (git-fixes).
- mtd: rawnand: Bypass a couple of sanity checks during NAND identification (git-fixes).
- mtd: rawnand: Ensure ECC configuration is propagated to upper layers (git-fixes).
- mtd: rawnand: rockchip: ensure NVDDR timings are rejected (git-fixes).
- net/mlx5e: Fix a race in command alloc flow (git-fixes).
- net: can: j1939: Initialize unused data in j1939_send_one() (git-fixes).
- net: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new (git-fixes).
- net: can: j1939: recover socket queue on CAN bus error during BAM transmission (git-fixes).
- net: ena: Fix redundant device NUMA node override (jsc#PED-8690).
- net: mana: Enable MANA driver on ARM64 with 4K page size (jsc#PED-8491).
- net: phy: Micrel KSZ8061: fix errata solution not taking effect problem (git-fixes).
- net: phy: micrel: add Microchip KSZ 9477 to the device table (git-fixes).
- net: usb: ax88179_178a: improve link status logs (git-fixes).
- net: usb: ax88179_178a: improve reset check (git-fixes).
- net: usb: qmi_wwan: add Telit FN920C04 compositions (stable-fixes).
- net: usb: rtl8150 fix unintiatilzed variables in rtl8150_get_link_ksettings (git-fixes).
- net: usb: smsc95xx: fix changing LED_SEL bit value updated from EEPROM (git-fixes).
- nfsd: optimise recalculate_deny_mode() for a common case (bsc#1217912).
- nilfs2: fix potential hang in nilfs_detach_log_writer() (stable-fixes).
- nvme: find numa distance only if controller has valid numa id (git-fixes).
- nvmet-passthru: propagate status from id override functions (git-fixes).
- ocfs2: adjust enabling place for la window (bsc#1219224).
- ocfs2: fix sparse warnings (bsc#1219224).
- ocfs2: improve write IO performance when fragmentation is high (bsc#1219224).
- ocfs2: speed up chain-list searching (bsc#1219224).
- pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER (git-fixes).
- pinctrl: qcom: spmi-gpio: drop broken pm8008 support (git-fixes).
- pinctrl: rockchip: fix pinmux bits for RK3328 GPIO2-B pins (git-fixes).
- pinctrl: rockchip: fix pinmux bits for RK3328 GPIO3-B pins (git-fixes).
- pinctrl: rockchip: fix pinmux reset in rockchip_pmx_set (git-fixes).
- pinctrl: rockchip: use dedicated pinctrl type for RK3328 (git-fixes).
- random: treat bootloader trust toggle the same way as cpu trust toggle (bsc#1226953).
- regulator: bd71815: fix ramp values (git-fixes).
- regulator: core: Fix modpost error 'regulator_get_regmap' undefined (git-fixes).
- regulator: irq_helpers: duplicate IRQ name (stable-fixes).
- regulator: vqmmc-ipq4019: fix module autoloading (stable-fixes).
- rpm/kernel-obs-build.spec.in: Add iso9660 (bsc#1226212) Some builds do not just create an iso9660 image, but also mount it during build.
- rpm/kernel-obs-build.spec.in: Add networking modules for docker (bsc#1226211) docker needs more networking modules, even legacy iptable_nat and _filter.
- rpm/kernel-obs-build.spec.in: Include algif_hash, aegis128 and xts modules afgif_hash is needed by some packages (e.g. iwd) for tests, xts is used for LUKS2 volumes by default and aegis128 is useful as AEAD cipher for LUKS2. Wrap the long line to make it readable.
- rpm/mkspec-dtb: dtbs have moved to vendor sub-directories in 6.5 By commit 724ba6751532 ('ARM: dts: Move .dts files to vendor sub-directories'). So switch to them.
- sched/core: Fix incorrect initialization of the 'burst' parameter in cpu_max_write() (bsc#1226791).
- scsi: sd: Update DIX config every time sd_revalidate_disk() is called (bsc#1218570).
- smb: client: ensure to try all targets when finding nested links (bsc#1224020).
- smb: client: guarantee refcounted children from parent session (bsc#1224679, CVE-35869).
- soundwire: cadence: fix invalid PDI offset (stable-fixes).
- spi: stm32: Do not warn about spurious interrupts (git-fixes).
- supported.conf: Add APM X-Gene SoC hardware monitoring driver (bsc#1223265 jsc#PED-8570)
- supported.conf: mark orangefs as optional We do not support orangefs at all (and it is already marked as such), but since there are no SLE consumers of it, mark it as optional.
- supported.conf: mark ufs as unsupported UFS is an unsupported filesystem, mark it as such. We still keep it around (not marking as optional), to accommodate any potential migrations from BSD systems.
- tty: mcf: MCF54418 has 10 UARTS (git-fixes).
- usb-storage: alauda: Check whether the media is initialized (git-fixes).
- usb: atm: cxacru: fix endpoint checking in cxacru_bind() (git-fixes).
- usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock (git-fixes).
- usb: fotg210-hcd: delete an incorrect bounds test (git-fixes).
- usb: gadget: printer: fix races against disable (git-fixes).
- usb: musb: da8xx: fix a resource leak in probe() (git-fixes).
- usb: typec: tcpm: Ignore received Hard Reset in TOGGLING state (git-fixes).
- usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps (git-fixes).
- usb: typec: ucsi: Ack also failed Get Error commands (git-fixes).
- usb: typec: ucsi: Never send a lone connector change ack (git-fixes).
- usb: xhci: Implement xhci_handshake_check_state() helper (git-fixes).
- usb: xhci: address off-by-one in xhci_num_trbs_free() (git-fixes).
- usb: xhci: improve debug message in xhci_ring_expansion_needed() (git-fixes).
- watchdog: bd9576: Drop 'always-running' property (git-fixes).
- watchdog: bd9576_wdt: switch to using devm_fwnode_gpiod_get() (stable-fixes).
- wifi: cfg80211: Lock wiphy in cfg80211_get_station (git-fixes).
- wifi: cfg80211: fix the order of arguments for trace events of the tx_rx_evt class (stable-fixes).
- wifi: cfg80211: pmsr: use correct nla_get_uX functions (git-fixes).
- wifi: iwlwifi: dbg_ini: move iwl_dbg_tlv_free outside of debugfs ifdef (git-fixes).
- wifi: iwlwifi: mvm: check n_ssids before accessing the ssids (git-fixes).
- wifi: iwlwifi: mvm: do not read past the mfuart notifcation (git-fixes).
- wifi: iwlwifi: mvm: revert gen2 TX A-MPDU size to 64 (git-fixes).
- wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() (git-fixes).
- wifi: mac80211: correctly parse Spatial Reuse Parameter Set element (git-fixes).
- wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects (git-fixes).
- wifi: rtl8xxxu: Fix the TX power of RTL8192CU, RTL8723AU (stable-fixes).
- wifi: rtlwifi: rtl8192de: Fix endianness issue in RX path (stable-fixes).
- wifi: rtlwifi: rtl8192de: Fix low speed with WPA3-SAE (stable-fixes).
- x86/mce: Dynamically size space for machine check records (bsc#1222241).
- x86/tsc: Trust initial offset in architectural TSC-adjust MSRs (bsc#1222015 bsc#1226962).
- xfs: make sure sb_fdblocks is non-negative (bsc#1225419).
- xhci: Fix failure to detect ring expansion need (git-fixes).
- xhci: Fix transfer ring expansion size calculation (git-fixes).
- xhci: Handle TD clearing for multiple streams case (git-fixes).
- xhci: Simplify event ring dequeue pointer update for port change events (git-fixes).
- xhci: Stop unnecessary tracking of free trbs in a ring (git-fixes).
- xhci: fix matching completion events with TDs (git-fixes).
- xhci: remove unused stream_id parameter from xhci_handle_halted_endpoint() (git-fixes).
- xhci: restre deleted trb fields for tracing (git-fixes).
- xhci: retry Stop Endpoint on buggy NEC controllers (git-fixes).
- xhci: simplify event ring dequeue tracking for transfer events (git-fixes).
- xhci: update event ring dequeue pointer position to controller correctly (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-09"/>
	<updated date="2024-07-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190336">SUSE bug 1190336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193883">SUSE bug 1193883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194826">SUSE bug 1194826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195065">SUSE bug 1195065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195341">SUSE bug 1195341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195349">SUSE bug 1195349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195775">SUSE bug 1195775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196746">SUSE bug 1196746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197915">SUSE bug 1197915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198014">SUSE bug 1198014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199295">SUSE bug 1199295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202767">SUSE bug 1202767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202780">SUSE bug 1202780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205205">SUSE bug 1205205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207361">SUSE bug 1207361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217912">SUSE bug 1217912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218148">SUSE bug 1218148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218570">SUSE bug 1218570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218820">SUSE bug 1218820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219224">SUSE bug 1219224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219633">SUSE bug 1219633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219847">SUSE bug 1219847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220368">SUSE bug 1220368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220812">SUSE bug 1220812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220958">SUSE bug 1220958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221086">SUSE bug 1221086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221282">SUSE bug 1221282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221958">SUSE bug 1221958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222015">SUSE bug 1222015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222072">SUSE bug 1222072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222080">SUSE bug 1222080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222241">SUSE bug 1222241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222254">SUSE bug 1222254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222364">SUSE bug 1222364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222893">SUSE bug 1222893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223013">SUSE bug 1223013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223018">SUSE bug 1223018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223265">SUSE bug 1223265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223384">SUSE bug 1223384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223641">SUSE bug 1223641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224020">SUSE bug 1224020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224331">SUSE bug 1224331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224488">SUSE bug 1224488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224497">SUSE bug 1224497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224498">SUSE bug 1224498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224504">SUSE bug 1224504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224520">SUSE bug 1224520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224539">SUSE bug 1224539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224540">SUSE bug 1224540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224552">SUSE bug 1224552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224583">SUSE bug 1224583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224588">SUSE bug 1224588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224602">SUSE bug 1224602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224603">SUSE bug 1224603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224605">SUSE bug 1224605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224612">SUSE bug 1224612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224614">SUSE bug 1224614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224619">SUSE bug 1224619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224661">SUSE bug 1224661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224662">SUSE bug 1224662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224670">SUSE bug 1224670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224671">SUSE bug 1224671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224674">SUSE bug 1224674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224677">SUSE bug 1224677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224679">SUSE bug 1224679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224696">SUSE bug 1224696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224703">SUSE bug 1224703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224712">SUSE bug 1224712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224716">SUSE bug 1224716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224719">SUSE bug 1224719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224735">SUSE bug 1224735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224749">SUSE bug 1224749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224764">SUSE bug 1224764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224765">SUSE bug 1224765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224766">SUSE bug 1224766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224935">SUSE bug 1224935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224946">SUSE bug 1224946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224951">SUSE bug 1224951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225050">SUSE bug 1225050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225098">SUSE bug 1225098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225105">SUSE bug 1225105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225300">SUSE bug 1225300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225389">SUSE bug 1225389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225391">SUSE bug 1225391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225419">SUSE bug 1225419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225426">SUSE bug 1225426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225448">SUSE bug 1225448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225452">SUSE bug 1225452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225467">SUSE bug 1225467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225475">SUSE bug 1225475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225484">SUSE bug 1225484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225487">SUSE bug 1225487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225514">SUSE bug 1225514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225518">SUSE bug 1225518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225535">SUSE bug 1225535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225585">SUSE bug 1225585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225602">SUSE bug 1225602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225611">SUSE bug 1225611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225681">SUSE bug 1225681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225692">SUSE bug 1225692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225698">SUSE bug 1225698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225699">SUSE bug 1225699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225704">SUSE bug 1225704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225714">SUSE bug 1225714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225726">SUSE bug 1225726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225732">SUSE bug 1225732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225737">SUSE bug 1225737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225749">SUSE bug 1225749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225758">SUSE bug 1225758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225759">SUSE bug 1225759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225760">SUSE bug 1225760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225767">SUSE bug 1225767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225770">SUSE bug 1225770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225823">SUSE bug 1225823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225834">SUSE bug 1225834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225840">SUSE bug 1225840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225866">SUSE bug 1225866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225872">SUSE bug 1225872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225894">SUSE bug 1225894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225945">SUSE bug 1225945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226022">SUSE bug 1226022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226131">SUSE bug 1226131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226145">SUSE bug 1226145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226149">SUSE bug 1226149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226155">SUSE bug 1226155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226211">SUSE bug 1226211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226212">SUSE bug 1226212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226226">SUSE bug 1226226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226514">SUSE bug 1226514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226520">SUSE bug 1226520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226537">SUSE bug 1226537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226538">SUSE bug 1226538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226539">SUSE bug 1226539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226550">SUSE bug 1226550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226552">SUSE bug 1226552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226553">SUSE bug 1226553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226554">SUSE bug 1226554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226556">SUSE bug 1226556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226557">SUSE bug 1226557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226558">SUSE bug 1226558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226559">SUSE bug 1226559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226561">SUSE bug 1226561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226562">SUSE bug 1226562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226563">SUSE bug 1226563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226564">SUSE bug 1226564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226566">SUSE bug 1226566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226567">SUSE bug 1226567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226569">SUSE bug 1226569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226572">SUSE bug 1226572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226575">SUSE bug 1226575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226576">SUSE bug 1226576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226577">SUSE bug 1226577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226579">SUSE bug 1226579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226580">SUSE bug 1226580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226581">SUSE bug 1226581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226582">SUSE bug 1226582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226583">SUSE bug 1226583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226585">SUSE bug 1226585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226587">SUSE bug 1226587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226588">SUSE bug 1226588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226593">SUSE bug 1226593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226595">SUSE bug 1226595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226597">SUSE bug 1226597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226601">SUSE bug 1226601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226602">SUSE bug 1226602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226603">SUSE bug 1226603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226607">SUSE bug 1226607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226610">SUSE bug 1226610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226614">SUSE bug 1226614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226616">SUSE bug 1226616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226617">SUSE bug 1226617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226618">SUSE bug 1226618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226619">SUSE bug 1226619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226621">SUSE bug 1226621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226622">SUSE bug 1226622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226624">SUSE bug 1226624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226626">SUSE bug 1226626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226628">SUSE bug 1226628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226629">SUSE bug 1226629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226632">SUSE bug 1226632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226633">SUSE bug 1226633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226634">SUSE bug 1226634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226637">SUSE bug 1226637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226643">SUSE bug 1226643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226644">SUSE bug 1226644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226645">SUSE bug 1226645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226647">SUSE bug 1226647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226650">SUSE bug 1226650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226653">SUSE bug 1226653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226657">SUSE bug 1226657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226658">SUSE bug 1226658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226669">SUSE bug 1226669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226670">SUSE bug 1226670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226672">SUSE bug 1226672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226673">SUSE bug 1226673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226674">SUSE bug 1226674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226675">SUSE bug 1226675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226678">SUSE bug 1226678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226679">SUSE bug 1226679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226683">SUSE bug 1226683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226685">SUSE bug 1226685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226686">SUSE bug 1226686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226690">SUSE bug 1226690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226691">SUSE bug 1226691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226692">SUSE bug 1226692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226693">SUSE bug 1226693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226696">SUSE bug 1226696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226697">SUSE bug 1226697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226698">SUSE bug 1226698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226699">SUSE bug 1226699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226701">SUSE bug 1226701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226702">SUSE bug 1226702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226703">SUSE bug 1226703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226704">SUSE bug 1226704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226705">SUSE bug 1226705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226706">SUSE bug 1226706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226708">SUSE bug 1226708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226709">SUSE bug 1226709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226710">SUSE bug 1226710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226711">SUSE bug 1226711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226712">SUSE bug 1226712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226713">SUSE bug 1226713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226715">SUSE bug 1226715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226716">SUSE bug 1226716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226718">SUSE bug 1226718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226719">SUSE bug 1226719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226720">SUSE bug 1226720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226721">SUSE bug 1226721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226730">SUSE bug 1226730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226732">SUSE bug 1226732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226734">SUSE bug 1226734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226735">SUSE bug 1226735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226737">SUSE bug 1226737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226738">SUSE bug 1226738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226739">SUSE bug 1226739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226740">SUSE bug 1226740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226744">SUSE bug 1226744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226746">SUSE bug 1226746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226747">SUSE bug 1226747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226749">SUSE bug 1226749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226754">SUSE bug 1226754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226762">SUSE bug 1226762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226764">SUSE bug 1226764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226767">SUSE bug 1226767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226768">SUSE bug 1226768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226769">SUSE bug 1226769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226771">SUSE bug 1226771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226774">SUSE bug 1226774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226777">SUSE bug 1226777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226780">SUSE bug 1226780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226781">SUSE bug 1226781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226785">SUSE bug 1226785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226786">SUSE bug 1226786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226789">SUSE bug 1226789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226791">SUSE bug 1226791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226839">SUSE bug 1226839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226840">SUSE bug 1226840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226841">SUSE bug 1226841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226842">SUSE bug 1226842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226848">SUSE bug 1226848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226852">SUSE bug 1226852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226857">SUSE bug 1226857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226861">SUSE bug 1226861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226863">SUSE bug 1226863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226864">SUSE bug 1226864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226867">SUSE bug 1226867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226868">SUSE bug 1226868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226876">SUSE bug 1226876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226878">SUSE bug 1226878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226883">SUSE bug 1226883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226886">SUSE bug 1226886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226890">SUSE bug 1226890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226891">SUSE bug 1226891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226895">SUSE bug 1226895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226908">SUSE bug 1226908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226915">SUSE bug 1226915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226928">SUSE bug 1226928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226948">SUSE bug 1226948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226949">SUSE bug 1226949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226950">SUSE bug 1226950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226953">SUSE bug 1226953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226962">SUSE bug 1226962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226976">SUSE bug 1226976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226992">SUSE bug 1226992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226994">SUSE bug 1226994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226996">SUSE bug 1226996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227066">SUSE bug 1227066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227096">SUSE bug 1227096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227101">SUSE bug 1227101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227103">SUSE bug 1227103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227274">SUSE bug 1227274</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-4439/">CVE-2021-4439 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4439">CVE-2021-4439 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47089/">CVE-2021-47089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47089">CVE-2021-47089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47432/">CVE-2021-47432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47432">CVE-2021-47432 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47515/">CVE-2021-47515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47515">CVE-2021-47515 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47534/">CVE-2021-47534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47534">CVE-2021-47534 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47538/">CVE-2021-47538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47538">CVE-2021-47538 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47539/">CVE-2021-47539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47539">CVE-2021-47539 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47555/">CVE-2021-47555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47555">CVE-2021-47555 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47566/">CVE-2021-47566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47566">CVE-2021-47566 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47571/">CVE-2021-47571 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47571">CVE-2021-47571 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47572/">CVE-2021-47572 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47572">CVE-2021-47572 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47576/">CVE-2021-47576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47576">CVE-2021-47576 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47577/">CVE-2021-47577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47577">CVE-2021-47577 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47578/">CVE-2021-47578 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47578">CVE-2021-47578 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47580/">CVE-2021-47580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47580">CVE-2021-47580 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47582/">CVE-2021-47582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47582">CVE-2021-47582 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47583/">CVE-2021-47583 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47583">CVE-2021-47583 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47584/">CVE-2021-47584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47584">CVE-2021-47584 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47585/">CVE-2021-47585 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47585">CVE-2021-47585 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47586/">CVE-2021-47586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47586">CVE-2021-47586 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47587/">CVE-2021-47587 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47587">CVE-2021-47587 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47589/">CVE-2021-47589 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47589">CVE-2021-47589 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47592/">CVE-2021-47592 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47592">CVE-2021-47592 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47595/">CVE-2021-47595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47595">CVE-2021-47595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47596/">CVE-2021-47596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47596">CVE-2021-47596 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47597/">CVE-2021-47597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47597">CVE-2021-47597 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47600/">CVE-2021-47600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47600">CVE-2021-47600 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47601/">CVE-2021-47601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47601">CVE-2021-47601 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47602/">CVE-2021-47602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47602">CVE-2021-47602 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47603/">CVE-2021-47603 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47603">CVE-2021-47603 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47604/">CVE-2021-47604 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47604">CVE-2021-47604 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47605/">CVE-2021-47605 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47605">CVE-2021-47605 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47607/">CVE-2021-47607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47607">CVE-2021-47607 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47608/">CVE-2021-47608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47608">CVE-2021-47608 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47609/">CVE-2021-47609 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47609">CVE-2021-47609 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47610/">CVE-2021-47610 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47610">CVE-2021-47610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47611/">CVE-2021-47611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47611">CVE-2021-47611 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47612/">CVE-2021-47612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47612">CVE-2021-47612 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47614/">CVE-2021-47614 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47614">CVE-2021-47614 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47615/">CVE-2021-47615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47615">CVE-2021-47615 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47616/">CVE-2021-47616 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47616">CVE-2021-47616 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47617/">CVE-2021-47617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47617">CVE-2021-47617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47618/">CVE-2021-47618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47618">CVE-2021-47618 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47619/">CVE-2021-47619 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47619">CVE-2021-47619 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47620/">CVE-2021-47620 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47620">CVE-2021-47620 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48711/">CVE-2022-48711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48711">CVE-2022-48711 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48712/">CVE-2022-48712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48712">CVE-2022-48712 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48713/">CVE-2022-48713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48713">CVE-2022-48713 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48714/">CVE-2022-48714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48714">CVE-2022-48714 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48715/">CVE-2022-48715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48715">CVE-2022-48715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48716/">CVE-2022-48716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48716">CVE-2022-48716 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48717/">CVE-2022-48717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48717">CVE-2022-48717 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48718/">CVE-2022-48718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48718">CVE-2022-48718 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48720/">CVE-2022-48720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48720">CVE-2022-48720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48721/">CVE-2022-48721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48721">CVE-2022-48721 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48722/">CVE-2022-48722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48722">CVE-2022-48722 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48723/">CVE-2022-48723 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48723">CVE-2022-48723 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48724/">CVE-2022-48724 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48724">CVE-2022-48724 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48725/">CVE-2022-48725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48725">CVE-2022-48725 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48726/">CVE-2022-48726 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48726">CVE-2022-48726 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48727/">CVE-2022-48727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48727">CVE-2022-48727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48728/">CVE-2022-48728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48728">CVE-2022-48728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48729/">CVE-2022-48729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48729">CVE-2022-48729 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48730/">CVE-2022-48730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48730">CVE-2022-48730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48732/">CVE-2022-48732 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48732">CVE-2022-48732 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48733/">CVE-2022-48733 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48733">CVE-2022-48733 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48734/">CVE-2022-48734 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48734">CVE-2022-48734 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48735/">CVE-2022-48735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48735">CVE-2022-48735 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48736/">CVE-2022-48736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48736">CVE-2022-48736 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48737/">CVE-2022-48737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48737">CVE-2022-48737 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48738/">CVE-2022-48738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48738">CVE-2022-48738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48739/">CVE-2022-48739 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48739">CVE-2022-48739 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48740/">CVE-2022-48740 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48740">CVE-2022-48740 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48743/">CVE-2022-48743 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48743">CVE-2022-48743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48744/">CVE-2022-48744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48744">CVE-2022-48744 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48745/">CVE-2022-48745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48745">CVE-2022-48745 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48746/">CVE-2022-48746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48746">CVE-2022-48746 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48747/">CVE-2022-48747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48747">CVE-2022-48747 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48748/">CVE-2022-48748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48748">CVE-2022-48748 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48749/">CVE-2022-48749 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48749">CVE-2022-48749 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48751/">CVE-2022-48751 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48751">CVE-2022-48751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48752/">CVE-2022-48752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48752">CVE-2022-48752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48753/">CVE-2022-48753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48753">CVE-2022-48753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48754/">CVE-2022-48754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48754">CVE-2022-48754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48755/">CVE-2022-48755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48755">CVE-2022-48755 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48756/">CVE-2022-48756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48756">CVE-2022-48756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48758/">CVE-2022-48758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48758">CVE-2022-48758 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48759/">CVE-2022-48759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48759">CVE-2022-48759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48760/">CVE-2022-48760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48760">CVE-2022-48760 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48761/">CVE-2022-48761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48761">CVE-2022-48761 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48763/">CVE-2022-48763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48763">CVE-2022-48763 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48765/">CVE-2022-48765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48765">CVE-2022-48765 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48766/">CVE-2022-48766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48766">CVE-2022-48766 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48767/">CVE-2022-48767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48767">CVE-2022-48767 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48768/">CVE-2022-48768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48768">CVE-2022-48768 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48769/">CVE-2022-48769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48769">CVE-2022-48769 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48770/">CVE-2022-48770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48770">CVE-2022-48770 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48771/">CVE-2022-48771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48771">CVE-2022-48771 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48772/">CVE-2022-48772 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48772">CVE-2022-48772 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-24023/">CVE-2023-24023 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24023">CVE-2023-24023 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52622/">CVE-2023-52622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52622">CVE-2023-52622 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52658/">CVE-2023-52658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52658">CVE-2023-52658 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52667/">CVE-2023-52667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52667">CVE-2023-52667 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52670/">CVE-2023-52670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52670">CVE-2023-52670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52672/">CVE-2023-52672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52672">CVE-2023-52672 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52675/">CVE-2023-52675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52675">CVE-2023-52675 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52735/">CVE-2023-52735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52735">CVE-2023-52735 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52737/">CVE-2023-52737 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52737">CVE-2023-52737 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52752/">CVE-2023-52752 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52752">CVE-2023-52752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52766/">CVE-2023-52766 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52766">CVE-2023-52766 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52784/">CVE-2023-52784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52784">CVE-2023-52784 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52787/">CVE-2023-52787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52787">CVE-2023-52787 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52800/">CVE-2023-52800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52800">CVE-2023-52800 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52835/">CVE-2023-52835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52835">CVE-2023-52835 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52837/">CVE-2023-52837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52837">CVE-2023-52837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52843/">CVE-2023-52843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52843">CVE-2023-52843 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52845/">CVE-2023-52845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52845">CVE-2023-52845 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52846/">CVE-2023-52846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52846">CVE-2023-52846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52869/">CVE-2023-52869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52869">CVE-2023-52869 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52881/">CVE-2023-52881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52881">CVE-2023-52881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52882/">CVE-2023-52882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52882">CVE-2023-52882 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52884/">CVE-2023-52884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52884">CVE-2023-52884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26625/">CVE-2024-26625 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26625">CVE-2024-26625 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26644/">CVE-2024-26644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26644">CVE-2024-26644 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-26720/">CVE-2024-26720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26720">CVE-2024-26720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26842/">CVE-2024-26842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26842">CVE-2024-26842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26845/">CVE-2024-26845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26845">CVE-2024-26845 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26923/">CVE-2024-26923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26923">CVE-2024-26923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26973/">CVE-2024-26973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26973">CVE-2024-26973 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27432/">CVE-2024-27432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27432">CVE-2024-27432 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33619/">CVE-2024-33619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33619">CVE-2024-33619 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35247/">CVE-2024-35247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35247">CVE-2024-35247 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35789/">CVE-2024-35789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35789">CVE-2024-35789 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35790/">CVE-2024-35790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35790">CVE-2024-35790 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35807/">CVE-2024-35807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35807">CVE-2024-35807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35814/">CVE-2024-35814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35814">CVE-2024-35814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35835/">CVE-2024-35835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35835">CVE-2024-35835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35848/">CVE-2024-35848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35848">CVE-2024-35848 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35857/">CVE-2024-35857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35857">CVE-2024-35857 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35861/">CVE-2024-35861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35861">CVE-2024-35861 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35862/">CVE-2024-35862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35862">CVE-2024-35862 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35864/">CVE-2024-35864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35864">CVE-2024-35864 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35869/">CVE-2024-35869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35869">CVE-2024-35869 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35878/">CVE-2024-35878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35878">CVE-2024-35878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35884/">CVE-2024-35884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35884">CVE-2024-35884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35886/">CVE-2024-35886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35886">CVE-2024-35886 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35896/">CVE-2024-35896 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35896">CVE-2024-35896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35898/">CVE-2024-35898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35898">CVE-2024-35898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35900/">CVE-2024-35900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35900">CVE-2024-35900 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35905/">CVE-2024-35905 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35905">CVE-2024-35905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35925/">CVE-2024-35925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35925">CVE-2024-35925 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35950/">CVE-2024-35950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35950">CVE-2024-35950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35956/">CVE-2024-35956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35956">CVE-2024-35956 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35958/">CVE-2024-35958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35958">CVE-2024-35958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35960/">CVE-2024-35960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35960">CVE-2024-35960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35962/">CVE-2024-35962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35962">CVE-2024-35962 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35997/">CVE-2024-35997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35997">CVE-2024-35997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36005/">CVE-2024-36005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36005">CVE-2024-36005 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36008/">CVE-2024-36008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36008">CVE-2024-36008 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36017/">CVE-2024-36017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36017">CVE-2024-36017 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36020/">CVE-2024-36020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36020">CVE-2024-36020 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36021/">CVE-2024-36021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36021">CVE-2024-36021 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36025/">CVE-2024-36025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36025">CVE-2024-36025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-36477/">CVE-2024-36477 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36477">CVE-2024-36477 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36478/">CVE-2024-36478 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36478">CVE-2024-36478 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36479/">CVE-2024-36479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36479">CVE-2024-36479 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36890/">CVE-2024-36890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36890">CVE-2024-36890 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36894/">CVE-2024-36894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36894">CVE-2024-36894 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36899/">CVE-2024-36899 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36899">CVE-2024-36899 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36900/">CVE-2024-36900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36900">CVE-2024-36900 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36904/">CVE-2024-36904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36904">CVE-2024-36904 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36915/">CVE-2024-36915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36915">CVE-2024-36915 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-36916/">CVE-2024-36916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36916">CVE-2024-36916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36917/">CVE-2024-36917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36917">CVE-2024-36917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36919/">CVE-2024-36919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36919">CVE-2024-36919 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36934/">CVE-2024-36934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36934">CVE-2024-36934 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36937/">CVE-2024-36937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36937">CVE-2024-36937 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36940/">CVE-2024-36940 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36940">CVE-2024-36940 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36945/">CVE-2024-36945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36945">CVE-2024-36945 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36949/">CVE-2024-36949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36949">CVE-2024-36949 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36960/">CVE-2024-36960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36960">CVE-2024-36960 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36964/">CVE-2024-36964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36964">CVE-2024-36964 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-36965/">CVE-2024-36965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36965">CVE-2024-36965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36967/">CVE-2024-36967 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36967">CVE-2024-36967 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36969/">CVE-2024-36969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36969">CVE-2024-36969 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36971/">CVE-2024-36971 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36971">CVE-2024-36971 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36975/">CVE-2024-36975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36975">CVE-2024-36975 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36978/">CVE-2024-36978 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36978">CVE-2024-36978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37021/">CVE-2024-37021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37021">CVE-2024-37021 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-37078/">CVE-2024-37078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37078">CVE-2024-37078 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-37354/">CVE-2024-37354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37354">CVE-2024-37354 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38381/">CVE-2024-38381 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38381">CVE-2024-38381 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38388/">CVE-2024-38388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38388">CVE-2024-38388 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38390/">CVE-2024-38390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38390">CVE-2024-38390 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38540/">CVE-2024-38540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38540">CVE-2024-38540 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38541/">CVE-2024-38541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38541">CVE-2024-38541 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38544/">CVE-2024-38544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38544">CVE-2024-38544 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38545/">CVE-2024-38545 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38545">CVE-2024-38545 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38546/">CVE-2024-38546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38546">CVE-2024-38546 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38547/">CVE-2024-38547 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38547">CVE-2024-38547 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38548/">CVE-2024-38548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38548">CVE-2024-38548 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38549/">CVE-2024-38549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38549">CVE-2024-38549 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38550/">CVE-2024-38550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38550">CVE-2024-38550 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38552/">CVE-2024-38552 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38552">CVE-2024-38552 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38553/">CVE-2024-38553 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38553">CVE-2024-38553 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38555/">CVE-2024-38555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38555">CVE-2024-38555 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38556/">CVE-2024-38556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38556">CVE-2024-38556 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38557/">CVE-2024-38557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38557">CVE-2024-38557 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38559/">CVE-2024-38559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38559">CVE-2024-38559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38560/">CVE-2024-38560 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38560">CVE-2024-38560 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38564/">CVE-2024-38564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38564">CVE-2024-38564 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38565/">CVE-2024-38565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38565">CVE-2024-38565 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38567/">CVE-2024-38567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38567">CVE-2024-38567 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-38568/">CVE-2024-38568 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38568">CVE-2024-38568 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38571/">CVE-2024-38571 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38571">CVE-2024-38571 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38573/">CVE-2024-38573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38573">CVE-2024-38573 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38578/">CVE-2024-38578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38578">CVE-2024-38578 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38579/">CVE-2024-38579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38579">CVE-2024-38579 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38580/">CVE-2024-38580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38580">CVE-2024-38580 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38581/">CVE-2024-38581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38581">CVE-2024-38581 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38582/">CVE-2024-38582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38582">CVE-2024-38582 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38583/">CVE-2024-38583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38583">CVE-2024-38583 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-38587/">CVE-2024-38587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38587">CVE-2024-38587 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38590/">CVE-2024-38590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38590">CVE-2024-38590 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38591/">CVE-2024-38591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38591">CVE-2024-38591 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38594/">CVE-2024-38594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38594">CVE-2024-38594 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38597/">CVE-2024-38597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38597">CVE-2024-38597 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38599/">CVE-2024-38599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38599">CVE-2024-38599 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38600/">CVE-2024-38600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38600">CVE-2024-38600 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38601/">CVE-2024-38601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38601">CVE-2024-38601 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38603/">CVE-2024-38603 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38603">CVE-2024-38603 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38605/">CVE-2024-38605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38605">CVE-2024-38605 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38608/">CVE-2024-38608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38608">CVE-2024-38608 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38616/">CVE-2024-38616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38616">CVE-2024-38616 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38618/">CVE-2024-38618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38618">CVE-2024-38618 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38619/">CVE-2024-38619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38619">CVE-2024-38619 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38621/">CVE-2024-38621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38621">CVE-2024-38621 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38627/">CVE-2024-38627 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38627">CVE-2024-38627 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38630/">CVE-2024-38630 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38630">CVE-2024-38630 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38633/">CVE-2024-38633 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38633">CVE-2024-38633 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38634/">CVE-2024-38634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38634">CVE-2024-38634 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38635/">CVE-2024-38635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38635">CVE-2024-38635 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38659/">CVE-2024-38659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38659">CVE-2024-38659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38661/">CVE-2024-38661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38661">CVE-2024-38661 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38780/">CVE-2024-38780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38780">CVE-2024-38780 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39301/">CVE-2024-39301 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39301">CVE-2024-39301 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39468/">CVE-2024-39468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39468">CVE-2024-39468 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39469/">CVE-2024-39469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39469">CVE-2024-39469 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39471/">CVE-2024-39471 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39471">CVE-2024-39471 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009871891" comment="cluster-md-kmp-azure-5.14.21-150500.33.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871892" comment="dlm-kmp-azure-5.14.21-150500.33.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871893" comment="gfs2-kmp-azure-5.14.21-150500.33.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871894" comment="kernel-azure-5.14.21-150500.33.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871895" comment="kernel-azure-devel-5.14.21-150500.33.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871896" comment="kernel-azure-extra-5.14.21-150500.33.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871897" comment="kernel-azure-livepatch-devel-5.14.21-150500.33.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871898" comment="kernel-azure-optional-5.14.21-150500.33.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871899" comment="kernel-azure-vdso-5.14.21-150500.33.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871900" comment="kernel-devel-azure-5.14.21-150500.33.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871901" comment="kernel-source-azure-5.14.21-150500.33.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871902" comment="kernel-syms-azure-5.14.21-150500.33.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871903" comment="kselftests-kmp-azure-5.14.21-150500.33.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871904" comment="ocfs2-kmp-azure-5.14.21-150500.33.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009871905" comment="reiserfs-kmp-azure-5.14.21-150500.33.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4839" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218571" ref_url="https://bugzilla.suse.com/1218571" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-7207" ref_url="https://www.suse.com/security/cve/CVE-2023-7207/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017765.html" source="SUSE-SU"/>
		<description>
This update for cpio fixes the following issues:

- CVE-2023-7207: Fixed a path traversal issue that could lead to an
  arbitrary file write during archive extraction (bsc#1218571).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-26"/>
	<updated date="2024-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218571">SUSE bug 1218571</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-7207/">CVE-2023-7207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-7207">CVE-2023-7207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009819403" comment="cpio-2.13-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819404" comment="cpio-lang-2.13-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819405" comment="cpio-mt-2.13-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4840" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1190336" ref_url="https://bugzilla.suse.com/1190336" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1193883" ref_url="https://bugzilla.suse.com/1193883" source="BUGZILLA"/>
		<reference ref_id="1194826" ref_url="https://bugzilla.suse.com/1194826" source="BUGZILLA"/>
		<reference ref_id="1195065" ref_url="https://bugzilla.suse.com/1195065" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195341" ref_url="https://bugzilla.suse.com/1195341" source="BUGZILLA"/>
		<reference ref_id="1195349" ref_url="https://bugzilla.suse.com/1195349" source="BUGZILLA"/>
		<reference ref_id="1195775" ref_url="https://bugzilla.suse.com/1195775" source="BUGZILLA"/>
		<reference ref_id="1196746" ref_url="https://bugzilla.suse.com/1196746" source="BUGZILLA"/>
		<reference ref_id="1197915" ref_url="https://bugzilla.suse.com/1197915" source="BUGZILLA"/>
		<reference ref_id="1198014" ref_url="https://bugzilla.suse.com/1198014" source="BUGZILLA"/>
		<reference ref_id="1199295" ref_url="https://bugzilla.suse.com/1199295" source="BUGZILLA"/>
		<reference ref_id="1202767" ref_url="https://bugzilla.suse.com/1202767" source="BUGZILLA"/>
		<reference ref_id="1202780" ref_url="https://bugzilla.suse.com/1202780" source="BUGZILLA"/>
		<reference ref_id="1205205" ref_url="https://bugzilla.suse.com/1205205" source="BUGZILLA"/>
		<reference ref_id="1207361" ref_url="https://bugzilla.suse.com/1207361" source="BUGZILLA"/>
		<reference ref_id="1217912" ref_url="https://bugzilla.suse.com/1217912" source="BUGZILLA"/>
		<reference ref_id="1218148" ref_url="https://bugzilla.suse.com/1218148" source="BUGZILLA"/>
		<reference ref_id="1218570" ref_url="https://bugzilla.suse.com/1218570" source="BUGZILLA"/>
		<reference ref_id="1218820" ref_url="https://bugzilla.suse.com/1218820" source="BUGZILLA"/>
		<reference ref_id="1219224" ref_url="https://bugzilla.suse.com/1219224" source="BUGZILLA"/>
		<reference ref_id="1219633" ref_url="https://bugzilla.suse.com/1219633" source="BUGZILLA"/>
		<reference ref_id="1219847" ref_url="https://bugzilla.suse.com/1219847" source="BUGZILLA"/>
		<reference ref_id="1220368" ref_url="https://bugzilla.suse.com/1220368" source="BUGZILLA"/>
		<reference ref_id="1220812" ref_url="https://bugzilla.suse.com/1220812" source="BUGZILLA"/>
		<reference ref_id="1220958" ref_url="https://bugzilla.suse.com/1220958" source="BUGZILLA"/>
		<reference ref_id="1221086" ref_url="https://bugzilla.suse.com/1221086" source="BUGZILLA"/>
		<reference ref_id="1221282" ref_url="https://bugzilla.suse.com/1221282" source="BUGZILLA"/>
		<reference ref_id="1221958" ref_url="https://bugzilla.suse.com/1221958" source="BUGZILLA"/>
		<reference ref_id="1222015" ref_url="https://bugzilla.suse.com/1222015" source="BUGZILLA"/>
		<reference ref_id="1222072" ref_url="https://bugzilla.suse.com/1222072" source="BUGZILLA"/>
		<reference ref_id="1222080" ref_url="https://bugzilla.suse.com/1222080" source="BUGZILLA"/>
		<reference ref_id="1222241" ref_url="https://bugzilla.suse.com/1222241" source="BUGZILLA"/>
		<reference ref_id="1222254" ref_url="https://bugzilla.suse.com/1222254" source="BUGZILLA"/>
		<reference ref_id="1222364" ref_url="https://bugzilla.suse.com/1222364" source="BUGZILLA"/>
		<reference ref_id="1222893" ref_url="https://bugzilla.suse.com/1222893" source="BUGZILLA"/>
		<reference ref_id="1223013" ref_url="https://bugzilla.suse.com/1223013" source="BUGZILLA"/>
		<reference ref_id="1223018" ref_url="https://bugzilla.suse.com/1223018" source="BUGZILLA"/>
		<reference ref_id="1223265" ref_url="https://bugzilla.suse.com/1223265" source="BUGZILLA"/>
		<reference ref_id="1223384" ref_url="https://bugzilla.suse.com/1223384" source="BUGZILLA"/>
		<reference ref_id="1223641" ref_url="https://bugzilla.suse.com/1223641" source="BUGZILLA"/>
		<reference ref_id="1224020" ref_url="https://bugzilla.suse.com/1224020" source="BUGZILLA"/>
		<reference ref_id="1224331" ref_url="https://bugzilla.suse.com/1224331" source="BUGZILLA"/>
		<reference ref_id="1224488" ref_url="https://bugzilla.suse.com/1224488" source="BUGZILLA"/>
		<reference ref_id="1224497" ref_url="https://bugzilla.suse.com/1224497" source="BUGZILLA"/>
		<reference ref_id="1224498" ref_url="https://bugzilla.suse.com/1224498" source="BUGZILLA"/>
		<reference ref_id="1224504" ref_url="https://bugzilla.suse.com/1224504" source="BUGZILLA"/>
		<reference ref_id="1224520" ref_url="https://bugzilla.suse.com/1224520" source="BUGZILLA"/>
		<reference ref_id="1224539" ref_url="https://bugzilla.suse.com/1224539" source="BUGZILLA"/>
		<reference ref_id="1224540" ref_url="https://bugzilla.suse.com/1224540" source="BUGZILLA"/>
		<reference ref_id="1224552" ref_url="https://bugzilla.suse.com/1224552" source="BUGZILLA"/>
		<reference ref_id="1224583" ref_url="https://bugzilla.suse.com/1224583" source="BUGZILLA"/>
		<reference ref_id="1224588" ref_url="https://bugzilla.suse.com/1224588" source="BUGZILLA"/>
		<reference ref_id="1224602" ref_url="https://bugzilla.suse.com/1224602" source="BUGZILLA"/>
		<reference ref_id="1224603" ref_url="https://bugzilla.suse.com/1224603" source="BUGZILLA"/>
		<reference ref_id="1224605" ref_url="https://bugzilla.suse.com/1224605" source="BUGZILLA"/>
		<reference ref_id="1224612" ref_url="https://bugzilla.suse.com/1224612" source="BUGZILLA"/>
		<reference ref_id="1224614" ref_url="https://bugzilla.suse.com/1224614" source="BUGZILLA"/>
		<reference ref_id="1224619" ref_url="https://bugzilla.suse.com/1224619" source="BUGZILLA"/>
		<reference ref_id="1224661" ref_url="https://bugzilla.suse.com/1224661" source="BUGZILLA"/>
		<reference ref_id="1224662" ref_url="https://bugzilla.suse.com/1224662" source="BUGZILLA"/>
		<reference ref_id="1224670" ref_url="https://bugzilla.suse.com/1224670" source="BUGZILLA"/>
		<reference ref_id="1224671" ref_url="https://bugzilla.suse.com/1224671" source="BUGZILLA"/>
		<reference ref_id="1224674" ref_url="https://bugzilla.suse.com/1224674" source="BUGZILLA"/>
		<reference ref_id="1224677" ref_url="https://bugzilla.suse.com/1224677" source="BUGZILLA"/>
		<reference ref_id="1224679" ref_url="https://bugzilla.suse.com/1224679" source="BUGZILLA"/>
		<reference ref_id="1224696" ref_url="https://bugzilla.suse.com/1224696" source="BUGZILLA"/>
		<reference ref_id="1224703" ref_url="https://bugzilla.suse.com/1224703" source="BUGZILLA"/>
		<reference ref_id="1224712" ref_url="https://bugzilla.suse.com/1224712" source="BUGZILLA"/>
		<reference ref_id="1224716" ref_url="https://bugzilla.suse.com/1224716" source="BUGZILLA"/>
		<reference ref_id="1224719" ref_url="https://bugzilla.suse.com/1224719" source="BUGZILLA"/>
		<reference ref_id="1224735" ref_url="https://bugzilla.suse.com/1224735" source="BUGZILLA"/>
		<reference ref_id="1224749" ref_url="https://bugzilla.suse.com/1224749" source="BUGZILLA"/>
		<reference ref_id="1224764" ref_url="https://bugzilla.suse.com/1224764" source="BUGZILLA"/>
		<reference ref_id="1224765" ref_url="https://bugzilla.suse.com/1224765" source="BUGZILLA"/>
		<reference ref_id="1224766" ref_url="https://bugzilla.suse.com/1224766" source="BUGZILLA"/>
		<reference ref_id="1224935" ref_url="https://bugzilla.suse.com/1224935" source="BUGZILLA"/>
		<reference ref_id="1224946" ref_url="https://bugzilla.suse.com/1224946" source="BUGZILLA"/>
		<reference ref_id="1224951" ref_url="https://bugzilla.suse.com/1224951" source="BUGZILLA"/>
		<reference ref_id="1225050" ref_url="https://bugzilla.suse.com/1225050" source="BUGZILLA"/>
		<reference ref_id="1225098" ref_url="https://bugzilla.suse.com/1225098" source="BUGZILLA"/>
		<reference ref_id="1225105" ref_url="https://bugzilla.suse.com/1225105" source="BUGZILLA"/>
		<reference ref_id="1225300" ref_url="https://bugzilla.suse.com/1225300" source="BUGZILLA"/>
		<reference ref_id="1225389" ref_url="https://bugzilla.suse.com/1225389" source="BUGZILLA"/>
		<reference ref_id="1225391" ref_url="https://bugzilla.suse.com/1225391" source="BUGZILLA"/>
		<reference ref_id="1225419" ref_url="https://bugzilla.suse.com/1225419" source="BUGZILLA"/>
		<reference ref_id="1225426" ref_url="https://bugzilla.suse.com/1225426" source="BUGZILLA"/>
		<reference ref_id="1225448" ref_url="https://bugzilla.suse.com/1225448" source="BUGZILLA"/>
		<reference ref_id="1225452" ref_url="https://bugzilla.suse.com/1225452" source="BUGZILLA"/>
		<reference ref_id="1225467" ref_url="https://bugzilla.suse.com/1225467" source="BUGZILLA"/>
		<reference ref_id="1225475" ref_url="https://bugzilla.suse.com/1225475" source="BUGZILLA"/>
		<reference ref_id="1225484" ref_url="https://bugzilla.suse.com/1225484" source="BUGZILLA"/>
		<reference ref_id="1225487" ref_url="https://bugzilla.suse.com/1225487" source="BUGZILLA"/>
		<reference ref_id="1225514" ref_url="https://bugzilla.suse.com/1225514" source="BUGZILLA"/>
		<reference ref_id="1225518" ref_url="https://bugzilla.suse.com/1225518" source="BUGZILLA"/>
		<reference ref_id="1225535" ref_url="https://bugzilla.suse.com/1225535" source="BUGZILLA"/>
		<reference ref_id="1225585" ref_url="https://bugzilla.suse.com/1225585" source="BUGZILLA"/>
		<reference ref_id="1225602" ref_url="https://bugzilla.suse.com/1225602" source="BUGZILLA"/>
		<reference ref_id="1225611" ref_url="https://bugzilla.suse.com/1225611" source="BUGZILLA"/>
		<reference ref_id="1225681" ref_url="https://bugzilla.suse.com/1225681" source="BUGZILLA"/>
		<reference ref_id="1225692" ref_url="https://bugzilla.suse.com/1225692" source="BUGZILLA"/>
		<reference ref_id="1225698" ref_url="https://bugzilla.suse.com/1225698" source="BUGZILLA"/>
		<reference ref_id="1225699" ref_url="https://bugzilla.suse.com/1225699" source="BUGZILLA"/>
		<reference ref_id="1225704" ref_url="https://bugzilla.suse.com/1225704" source="BUGZILLA"/>
		<reference ref_id="1225714" ref_url="https://bugzilla.suse.com/1225714" source="BUGZILLA"/>
		<reference ref_id="1225726" ref_url="https://bugzilla.suse.com/1225726" source="BUGZILLA"/>
		<reference ref_id="1225732" ref_url="https://bugzilla.suse.com/1225732" source="BUGZILLA"/>
		<reference ref_id="1225737" ref_url="https://bugzilla.suse.com/1225737" source="BUGZILLA"/>
		<reference ref_id="1225749" ref_url="https://bugzilla.suse.com/1225749" source="BUGZILLA"/>
		<reference ref_id="1225758" ref_url="https://bugzilla.suse.com/1225758" source="BUGZILLA"/>
		<reference ref_id="1225759" ref_url="https://bugzilla.suse.com/1225759" source="BUGZILLA"/>
		<reference ref_id="1225760" ref_url="https://bugzilla.suse.com/1225760" source="BUGZILLA"/>
		<reference ref_id="1225767" ref_url="https://bugzilla.suse.com/1225767" source="BUGZILLA"/>
		<reference ref_id="1225770" ref_url="https://bugzilla.suse.com/1225770" source="BUGZILLA"/>
		<reference ref_id="1225823" ref_url="https://bugzilla.suse.com/1225823" source="BUGZILLA"/>
		<reference ref_id="1225834" ref_url="https://bugzilla.suse.com/1225834" source="BUGZILLA"/>
		<reference ref_id="1225840" ref_url="https://bugzilla.suse.com/1225840" source="BUGZILLA"/>
		<reference ref_id="1225866" ref_url="https://bugzilla.suse.com/1225866" source="BUGZILLA"/>
		<reference ref_id="1225872" ref_url="https://bugzilla.suse.com/1225872" source="BUGZILLA"/>
		<reference ref_id="1225894" ref_url="https://bugzilla.suse.com/1225894" source="BUGZILLA"/>
		<reference ref_id="1226022" ref_url="https://bugzilla.suse.com/1226022" source="BUGZILLA"/>
		<reference ref_id="1226131" ref_url="https://bugzilla.suse.com/1226131" source="BUGZILLA"/>
		<reference ref_id="1226145" ref_url="https://bugzilla.suse.com/1226145" source="BUGZILLA"/>
		<reference ref_id="1226149" ref_url="https://bugzilla.suse.com/1226149" source="BUGZILLA"/>
		<reference ref_id="1226155" ref_url="https://bugzilla.suse.com/1226155" source="BUGZILLA"/>
		<reference ref_id="1226211" ref_url="https://bugzilla.suse.com/1226211" source="BUGZILLA"/>
		<reference ref_id="1226212" ref_url="https://bugzilla.suse.com/1226212" source="BUGZILLA"/>
		<reference ref_id="1226226" ref_url="https://bugzilla.suse.com/1226226" source="BUGZILLA"/>
		<reference ref_id="1226514" ref_url="https://bugzilla.suse.com/1226514" source="BUGZILLA"/>
		<reference ref_id="1226520" ref_url="https://bugzilla.suse.com/1226520" source="BUGZILLA"/>
		<reference ref_id="1226537" ref_url="https://bugzilla.suse.com/1226537" source="BUGZILLA"/>
		<reference ref_id="1226538" ref_url="https://bugzilla.suse.com/1226538" source="BUGZILLA"/>
		<reference ref_id="1226539" ref_url="https://bugzilla.suse.com/1226539" source="BUGZILLA"/>
		<reference ref_id="1226550" ref_url="https://bugzilla.suse.com/1226550" source="BUGZILLA"/>
		<reference ref_id="1226552" ref_url="https://bugzilla.suse.com/1226552" source="BUGZILLA"/>
		<reference ref_id="1226553" ref_url="https://bugzilla.suse.com/1226553" source="BUGZILLA"/>
		<reference ref_id="1226554" ref_url="https://bugzilla.suse.com/1226554" source="BUGZILLA"/>
		<reference ref_id="1226556" ref_url="https://bugzilla.suse.com/1226556" source="BUGZILLA"/>
		<reference ref_id="1226557" ref_url="https://bugzilla.suse.com/1226557" source="BUGZILLA"/>
		<reference ref_id="1226558" ref_url="https://bugzilla.suse.com/1226558" source="BUGZILLA"/>
		<reference ref_id="1226559" ref_url="https://bugzilla.suse.com/1226559" source="BUGZILLA"/>
		<reference ref_id="1226561" ref_url="https://bugzilla.suse.com/1226561" source="BUGZILLA"/>
		<reference ref_id="1226562" ref_url="https://bugzilla.suse.com/1226562" source="BUGZILLA"/>
		<reference ref_id="1226563" ref_url="https://bugzilla.suse.com/1226563" source="BUGZILLA"/>
		<reference ref_id="1226564" ref_url="https://bugzilla.suse.com/1226564" source="BUGZILLA"/>
		<reference ref_id="1226566" ref_url="https://bugzilla.suse.com/1226566" source="BUGZILLA"/>
		<reference ref_id="1226567" ref_url="https://bugzilla.suse.com/1226567" source="BUGZILLA"/>
		<reference ref_id="1226569" ref_url="https://bugzilla.suse.com/1226569" source="BUGZILLA"/>
		<reference ref_id="1226572" ref_url="https://bugzilla.suse.com/1226572" source="BUGZILLA"/>
		<reference ref_id="1226575" ref_url="https://bugzilla.suse.com/1226575" source="BUGZILLA"/>
		<reference ref_id="1226576" ref_url="https://bugzilla.suse.com/1226576" source="BUGZILLA"/>
		<reference ref_id="1226577" ref_url="https://bugzilla.suse.com/1226577" source="BUGZILLA"/>
		<reference ref_id="1226579" ref_url="https://bugzilla.suse.com/1226579" source="BUGZILLA"/>
		<reference ref_id="1226580" ref_url="https://bugzilla.suse.com/1226580" source="BUGZILLA"/>
		<reference ref_id="1226581" ref_url="https://bugzilla.suse.com/1226581" source="BUGZILLA"/>
		<reference ref_id="1226582" ref_url="https://bugzilla.suse.com/1226582" source="BUGZILLA"/>
		<reference ref_id="1226583" ref_url="https://bugzilla.suse.com/1226583" source="BUGZILLA"/>
		<reference ref_id="1226585" ref_url="https://bugzilla.suse.com/1226585" source="BUGZILLA"/>
		<reference ref_id="1226587" ref_url="https://bugzilla.suse.com/1226587" source="BUGZILLA"/>
		<reference ref_id="1226588" ref_url="https://bugzilla.suse.com/1226588" source="BUGZILLA"/>
		<reference ref_id="1226593" ref_url="https://bugzilla.suse.com/1226593" source="BUGZILLA"/>
		<reference ref_id="1226595" ref_url="https://bugzilla.suse.com/1226595" source="BUGZILLA"/>
		<reference ref_id="1226597" ref_url="https://bugzilla.suse.com/1226597" source="BUGZILLA"/>
		<reference ref_id="1226601" ref_url="https://bugzilla.suse.com/1226601" source="BUGZILLA"/>
		<reference ref_id="1226602" ref_url="https://bugzilla.suse.com/1226602" source="BUGZILLA"/>
		<reference ref_id="1226603" ref_url="https://bugzilla.suse.com/1226603" source="BUGZILLA"/>
		<reference ref_id="1226607" ref_url="https://bugzilla.suse.com/1226607" source="BUGZILLA"/>
		<reference ref_id="1226610" ref_url="https://bugzilla.suse.com/1226610" source="BUGZILLA"/>
		<reference ref_id="1226614" ref_url="https://bugzilla.suse.com/1226614" source="BUGZILLA"/>
		<reference ref_id="1226616" ref_url="https://bugzilla.suse.com/1226616" source="BUGZILLA"/>
		<reference ref_id="1226617" ref_url="https://bugzilla.suse.com/1226617" source="BUGZILLA"/>
		<reference ref_id="1226618" ref_url="https://bugzilla.suse.com/1226618" source="BUGZILLA"/>
		<reference ref_id="1226619" ref_url="https://bugzilla.suse.com/1226619" source="BUGZILLA"/>
		<reference ref_id="1226621" ref_url="https://bugzilla.suse.com/1226621" source="BUGZILLA"/>
		<reference ref_id="1226622" ref_url="https://bugzilla.suse.com/1226622" source="BUGZILLA"/>
		<reference ref_id="1226624" ref_url="https://bugzilla.suse.com/1226624" source="BUGZILLA"/>
		<reference ref_id="1226626" ref_url="https://bugzilla.suse.com/1226626" source="BUGZILLA"/>
		<reference ref_id="1226628" ref_url="https://bugzilla.suse.com/1226628" source="BUGZILLA"/>
		<reference ref_id="1226629" ref_url="https://bugzilla.suse.com/1226629" source="BUGZILLA"/>
		<reference ref_id="1226632" ref_url="https://bugzilla.suse.com/1226632" source="BUGZILLA"/>
		<reference ref_id="1226633" ref_url="https://bugzilla.suse.com/1226633" source="BUGZILLA"/>
		<reference ref_id="1226634" ref_url="https://bugzilla.suse.com/1226634" source="BUGZILLA"/>
		<reference ref_id="1226637" ref_url="https://bugzilla.suse.com/1226637" source="BUGZILLA"/>
		<reference ref_id="1226643" ref_url="https://bugzilla.suse.com/1226643" source="BUGZILLA"/>
		<reference ref_id="1226644" ref_url="https://bugzilla.suse.com/1226644" source="BUGZILLA"/>
		<reference ref_id="1226645" ref_url="https://bugzilla.suse.com/1226645" source="BUGZILLA"/>
		<reference ref_id="1226647" ref_url="https://bugzilla.suse.com/1226647" source="BUGZILLA"/>
		<reference ref_id="1226650" ref_url="https://bugzilla.suse.com/1226650" source="BUGZILLA"/>
		<reference ref_id="1226653" ref_url="https://bugzilla.suse.com/1226653" source="BUGZILLA"/>
		<reference ref_id="1226657" ref_url="https://bugzilla.suse.com/1226657" source="BUGZILLA"/>
		<reference ref_id="1226658" ref_url="https://bugzilla.suse.com/1226658" source="BUGZILLA"/>
		<reference ref_id="1226669" ref_url="https://bugzilla.suse.com/1226669" source="BUGZILLA"/>
		<reference ref_id="1226670" ref_url="https://bugzilla.suse.com/1226670" source="BUGZILLA"/>
		<reference ref_id="1226672" ref_url="https://bugzilla.suse.com/1226672" source="BUGZILLA"/>
		<reference ref_id="1226673" ref_url="https://bugzilla.suse.com/1226673" source="BUGZILLA"/>
		<reference ref_id="1226674" ref_url="https://bugzilla.suse.com/1226674" source="BUGZILLA"/>
		<reference ref_id="1226675" ref_url="https://bugzilla.suse.com/1226675" source="BUGZILLA"/>
		<reference ref_id="1226678" ref_url="https://bugzilla.suse.com/1226678" source="BUGZILLA"/>
		<reference ref_id="1226679" ref_url="https://bugzilla.suse.com/1226679" source="BUGZILLA"/>
		<reference ref_id="1226683" ref_url="https://bugzilla.suse.com/1226683" source="BUGZILLA"/>
		<reference ref_id="1226685" ref_url="https://bugzilla.suse.com/1226685" source="BUGZILLA"/>
		<reference ref_id="1226686" ref_url="https://bugzilla.suse.com/1226686" source="BUGZILLA"/>
		<reference ref_id="1226690" ref_url="https://bugzilla.suse.com/1226690" source="BUGZILLA"/>
		<reference ref_id="1226691" ref_url="https://bugzilla.suse.com/1226691" source="BUGZILLA"/>
		<reference ref_id="1226692" ref_url="https://bugzilla.suse.com/1226692" source="BUGZILLA"/>
		<reference ref_id="1226693" ref_url="https://bugzilla.suse.com/1226693" source="BUGZILLA"/>
		<reference ref_id="1226696" ref_url="https://bugzilla.suse.com/1226696" source="BUGZILLA"/>
		<reference ref_id="1226697" ref_url="https://bugzilla.suse.com/1226697" source="BUGZILLA"/>
		<reference ref_id="1226698" ref_url="https://bugzilla.suse.com/1226698" source="BUGZILLA"/>
		<reference ref_id="1226699" ref_url="https://bugzilla.suse.com/1226699" source="BUGZILLA"/>
		<reference ref_id="1226701" ref_url="https://bugzilla.suse.com/1226701" source="BUGZILLA"/>
		<reference ref_id="1226702" ref_url="https://bugzilla.suse.com/1226702" source="BUGZILLA"/>
		<reference ref_id="1226703" ref_url="https://bugzilla.suse.com/1226703" source="BUGZILLA"/>
		<reference ref_id="1226704" ref_url="https://bugzilla.suse.com/1226704" source="BUGZILLA"/>
		<reference ref_id="1226705" ref_url="https://bugzilla.suse.com/1226705" source="BUGZILLA"/>
		<reference ref_id="1226706" ref_url="https://bugzilla.suse.com/1226706" source="BUGZILLA"/>
		<reference ref_id="1226708" ref_url="https://bugzilla.suse.com/1226708" source="BUGZILLA"/>
		<reference ref_id="1226709" ref_url="https://bugzilla.suse.com/1226709" source="BUGZILLA"/>
		<reference ref_id="1226710" ref_url="https://bugzilla.suse.com/1226710" source="BUGZILLA"/>
		<reference ref_id="1226711" ref_url="https://bugzilla.suse.com/1226711" source="BUGZILLA"/>
		<reference ref_id="1226712" ref_url="https://bugzilla.suse.com/1226712" source="BUGZILLA"/>
		<reference ref_id="1226713" ref_url="https://bugzilla.suse.com/1226713" source="BUGZILLA"/>
		<reference ref_id="1226715" ref_url="https://bugzilla.suse.com/1226715" source="BUGZILLA"/>
		<reference ref_id="1226716" ref_url="https://bugzilla.suse.com/1226716" source="BUGZILLA"/>
		<reference ref_id="1226718" ref_url="https://bugzilla.suse.com/1226718" source="BUGZILLA"/>
		<reference ref_id="1226719" ref_url="https://bugzilla.suse.com/1226719" source="BUGZILLA"/>
		<reference ref_id="1226720" ref_url="https://bugzilla.suse.com/1226720" source="BUGZILLA"/>
		<reference ref_id="1226721" ref_url="https://bugzilla.suse.com/1226721" source="BUGZILLA"/>
		<reference ref_id="1226730" ref_url="https://bugzilla.suse.com/1226730" source="BUGZILLA"/>
		<reference ref_id="1226732" ref_url="https://bugzilla.suse.com/1226732" source="BUGZILLA"/>
		<reference ref_id="1226734" ref_url="https://bugzilla.suse.com/1226734" source="BUGZILLA"/>
		<reference ref_id="1226735" ref_url="https://bugzilla.suse.com/1226735" source="BUGZILLA"/>
		<reference ref_id="1226737" ref_url="https://bugzilla.suse.com/1226737" source="BUGZILLA"/>
		<reference ref_id="1226738" ref_url="https://bugzilla.suse.com/1226738" source="BUGZILLA"/>
		<reference ref_id="1226739" ref_url="https://bugzilla.suse.com/1226739" source="BUGZILLA"/>
		<reference ref_id="1226740" ref_url="https://bugzilla.suse.com/1226740" source="BUGZILLA"/>
		<reference ref_id="1226744" ref_url="https://bugzilla.suse.com/1226744" source="BUGZILLA"/>
		<reference ref_id="1226746" ref_url="https://bugzilla.suse.com/1226746" source="BUGZILLA"/>
		<reference ref_id="1226747" ref_url="https://bugzilla.suse.com/1226747" source="BUGZILLA"/>
		<reference ref_id="1226749" ref_url="https://bugzilla.suse.com/1226749" source="BUGZILLA"/>
		<reference ref_id="1226754" ref_url="https://bugzilla.suse.com/1226754" source="BUGZILLA"/>
		<reference ref_id="1226762" ref_url="https://bugzilla.suse.com/1226762" source="BUGZILLA"/>
		<reference ref_id="1226764" ref_url="https://bugzilla.suse.com/1226764" source="BUGZILLA"/>
		<reference ref_id="1226767" ref_url="https://bugzilla.suse.com/1226767" source="BUGZILLA"/>
		<reference ref_id="1226768" ref_url="https://bugzilla.suse.com/1226768" source="BUGZILLA"/>
		<reference ref_id="1226769" ref_url="https://bugzilla.suse.com/1226769" source="BUGZILLA"/>
		<reference ref_id="1226771" ref_url="https://bugzilla.suse.com/1226771" source="BUGZILLA"/>
		<reference ref_id="1226774" ref_url="https://bugzilla.suse.com/1226774" source="BUGZILLA"/>
		<reference ref_id="1226777" ref_url="https://bugzilla.suse.com/1226777" source="BUGZILLA"/>
		<reference ref_id="1226780" ref_url="https://bugzilla.suse.com/1226780" source="BUGZILLA"/>
		<reference ref_id="1226781" ref_url="https://bugzilla.suse.com/1226781" source="BUGZILLA"/>
		<reference ref_id="1226785" ref_url="https://bugzilla.suse.com/1226785" source="BUGZILLA"/>
		<reference ref_id="1226786" ref_url="https://bugzilla.suse.com/1226786" source="BUGZILLA"/>
		<reference ref_id="1226789" ref_url="https://bugzilla.suse.com/1226789" source="BUGZILLA"/>
		<reference ref_id="1226791" ref_url="https://bugzilla.suse.com/1226791" source="BUGZILLA"/>
		<reference ref_id="1226839" ref_url="https://bugzilla.suse.com/1226839" source="BUGZILLA"/>
		<reference ref_id="1226840" ref_url="https://bugzilla.suse.com/1226840" source="BUGZILLA"/>
		<reference ref_id="1226841" ref_url="https://bugzilla.suse.com/1226841" source="BUGZILLA"/>
		<reference ref_id="1226842" ref_url="https://bugzilla.suse.com/1226842" source="BUGZILLA"/>
		<reference ref_id="1226848" ref_url="https://bugzilla.suse.com/1226848" source="BUGZILLA"/>
		<reference ref_id="1226852" ref_url="https://bugzilla.suse.com/1226852" source="BUGZILLA"/>
		<reference ref_id="1226857" ref_url="https://bugzilla.suse.com/1226857" source="BUGZILLA"/>
		<reference ref_id="1226861" ref_url="https://bugzilla.suse.com/1226861" source="BUGZILLA"/>
		<reference ref_id="1226863" ref_url="https://bugzilla.suse.com/1226863" source="BUGZILLA"/>
		<reference ref_id="1226864" ref_url="https://bugzilla.suse.com/1226864" source="BUGZILLA"/>
		<reference ref_id="1226867" ref_url="https://bugzilla.suse.com/1226867" source="BUGZILLA"/>
		<reference ref_id="1226868" ref_url="https://bugzilla.suse.com/1226868" source="BUGZILLA"/>
		<reference ref_id="1226876" ref_url="https://bugzilla.suse.com/1226876" source="BUGZILLA"/>
		<reference ref_id="1226878" ref_url="https://bugzilla.suse.com/1226878" source="BUGZILLA"/>
		<reference ref_id="1226883" ref_url="https://bugzilla.suse.com/1226883" source="BUGZILLA"/>
		<reference ref_id="1226886" ref_url="https://bugzilla.suse.com/1226886" source="BUGZILLA"/>
		<reference ref_id="1226890" ref_url="https://bugzilla.suse.com/1226890" source="BUGZILLA"/>
		<reference ref_id="1226891" ref_url="https://bugzilla.suse.com/1226891" source="BUGZILLA"/>
		<reference ref_id="1226895" ref_url="https://bugzilla.suse.com/1226895" source="BUGZILLA"/>
		<reference ref_id="1226908" ref_url="https://bugzilla.suse.com/1226908" source="BUGZILLA"/>
		<reference ref_id="1226915" ref_url="https://bugzilla.suse.com/1226915" source="BUGZILLA"/>
		<reference ref_id="1226928" ref_url="https://bugzilla.suse.com/1226928" source="BUGZILLA"/>
		<reference ref_id="1226948" ref_url="https://bugzilla.suse.com/1226948" source="BUGZILLA"/>
		<reference ref_id="1226949" ref_url="https://bugzilla.suse.com/1226949" source="BUGZILLA"/>
		<reference ref_id="1226950" ref_url="https://bugzilla.suse.com/1226950" source="BUGZILLA"/>
		<reference ref_id="1226953" ref_url="https://bugzilla.suse.com/1226953" source="BUGZILLA"/>
		<reference ref_id="1226962" ref_url="https://bugzilla.suse.com/1226962" source="BUGZILLA"/>
		<reference ref_id="1226976" ref_url="https://bugzilla.suse.com/1226976" source="BUGZILLA"/>
		<reference ref_id="1226992" ref_url="https://bugzilla.suse.com/1226992" source="BUGZILLA"/>
		<reference ref_id="1226994" ref_url="https://bugzilla.suse.com/1226994" source="BUGZILLA"/>
		<reference ref_id="1226996" ref_url="https://bugzilla.suse.com/1226996" source="BUGZILLA"/>
		<reference ref_id="1227066" ref_url="https://bugzilla.suse.com/1227066" source="BUGZILLA"/>
		<reference ref_id="1227096" ref_url="https://bugzilla.suse.com/1227096" source="BUGZILLA"/>
		<reference ref_id="1227101" ref_url="https://bugzilla.suse.com/1227101" source="BUGZILLA"/>
		<reference ref_id="1227103" ref_url="https://bugzilla.suse.com/1227103" source="BUGZILLA"/>
		<reference ref_id="1227274" ref_url="https://bugzilla.suse.com/1227274" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4439" ref_url="https://www.suse.com/security/cve/CVE-2021-4439/" source="CVE"/>
		<reference ref_id="CVE-2021-47089" ref_url="https://www.suse.com/security/cve/CVE-2021-47089/" source="CVE"/>
		<reference ref_id="CVE-2021-47432" ref_url="https://www.suse.com/security/cve/CVE-2021-47432/" source="CVE"/>
		<reference ref_id="CVE-2021-47515" ref_url="https://www.suse.com/security/cve/CVE-2021-47515/" source="CVE"/>
		<reference ref_id="CVE-2021-47534" ref_url="https://www.suse.com/security/cve/CVE-2021-47534/" source="CVE"/>
		<reference ref_id="CVE-2021-47538" ref_url="https://www.suse.com/security/cve/CVE-2021-47538/" source="CVE"/>
		<reference ref_id="CVE-2021-47539" ref_url="https://www.suse.com/security/cve/CVE-2021-47539/" source="CVE"/>
		<reference ref_id="CVE-2021-47555" ref_url="https://www.suse.com/security/cve/CVE-2021-47555/" source="CVE"/>
		<reference ref_id="CVE-2021-47566" ref_url="https://www.suse.com/security/cve/CVE-2021-47566/" source="CVE"/>
		<reference ref_id="CVE-2021-47571" ref_url="https://www.suse.com/security/cve/CVE-2021-47571/" source="CVE"/>
		<reference ref_id="CVE-2021-47572" ref_url="https://www.suse.com/security/cve/CVE-2021-47572/" source="CVE"/>
		<reference ref_id="CVE-2021-47576" ref_url="https://www.suse.com/security/cve/CVE-2021-47576/" source="CVE"/>
		<reference ref_id="CVE-2021-47577" ref_url="https://www.suse.com/security/cve/CVE-2021-47577/" source="CVE"/>
		<reference ref_id="CVE-2021-47578" ref_url="https://www.suse.com/security/cve/CVE-2021-47578/" source="CVE"/>
		<reference ref_id="CVE-2021-47580" ref_url="https://www.suse.com/security/cve/CVE-2021-47580/" source="CVE"/>
		<reference ref_id="CVE-2021-47582" ref_url="https://www.suse.com/security/cve/CVE-2021-47582/" source="CVE"/>
		<reference ref_id="CVE-2021-47583" ref_url="https://www.suse.com/security/cve/CVE-2021-47583/" source="CVE"/>
		<reference ref_id="CVE-2021-47584" ref_url="https://www.suse.com/security/cve/CVE-2021-47584/" source="CVE"/>
		<reference ref_id="CVE-2021-47585" ref_url="https://www.suse.com/security/cve/CVE-2021-47585/" source="CVE"/>
		<reference ref_id="CVE-2021-47586" ref_url="https://www.suse.com/security/cve/CVE-2021-47586/" source="CVE"/>
		<reference ref_id="CVE-2021-47587" ref_url="https://www.suse.com/security/cve/CVE-2021-47587/" source="CVE"/>
		<reference ref_id="CVE-2021-47589" ref_url="https://www.suse.com/security/cve/CVE-2021-47589/" source="CVE"/>
		<reference ref_id="CVE-2021-47592" ref_url="https://www.suse.com/security/cve/CVE-2021-47592/" source="CVE"/>
		<reference ref_id="CVE-2021-47595" ref_url="https://www.suse.com/security/cve/CVE-2021-47595/" source="CVE"/>
		<reference ref_id="CVE-2021-47596" ref_url="https://www.suse.com/security/cve/CVE-2021-47596/" source="CVE"/>
		<reference ref_id="CVE-2021-47597" ref_url="https://www.suse.com/security/cve/CVE-2021-47597/" source="CVE"/>
		<reference ref_id="CVE-2021-47600" ref_url="https://www.suse.com/security/cve/CVE-2021-47600/" source="CVE"/>
		<reference ref_id="CVE-2021-47601" ref_url="https://www.suse.com/security/cve/CVE-2021-47601/" source="CVE"/>
		<reference ref_id="CVE-2021-47602" ref_url="https://www.suse.com/security/cve/CVE-2021-47602/" source="CVE"/>
		<reference ref_id="CVE-2021-47603" ref_url="https://www.suse.com/security/cve/CVE-2021-47603/" source="CVE"/>
		<reference ref_id="CVE-2021-47604" ref_url="https://www.suse.com/security/cve/CVE-2021-47604/" source="CVE"/>
		<reference ref_id="CVE-2021-47605" ref_url="https://www.suse.com/security/cve/CVE-2021-47605/" source="CVE"/>
		<reference ref_id="CVE-2021-47607" ref_url="https://www.suse.com/security/cve/CVE-2021-47607/" source="CVE"/>
		<reference ref_id="CVE-2021-47608" ref_url="https://www.suse.com/security/cve/CVE-2021-47608/" source="CVE"/>
		<reference ref_id="CVE-2021-47609" ref_url="https://www.suse.com/security/cve/CVE-2021-47609/" source="CVE"/>
		<reference ref_id="CVE-2021-47610" ref_url="https://www.suse.com/security/cve/CVE-2021-47610/" source="CVE"/>
		<reference ref_id="CVE-2021-47611" ref_url="https://www.suse.com/security/cve/CVE-2021-47611/" source="CVE"/>
		<reference ref_id="CVE-2021-47612" ref_url="https://www.suse.com/security/cve/CVE-2021-47612/" source="CVE"/>
		<reference ref_id="CVE-2021-47614" ref_url="https://www.suse.com/security/cve/CVE-2021-47614/" source="CVE"/>
		<reference ref_id="CVE-2021-47615" ref_url="https://www.suse.com/security/cve/CVE-2021-47615/" source="CVE"/>
		<reference ref_id="CVE-2021-47616" ref_url="https://www.suse.com/security/cve/CVE-2021-47616/" source="CVE"/>
		<reference ref_id="CVE-2021-47617" ref_url="https://www.suse.com/security/cve/CVE-2021-47617/" source="CVE"/>
		<reference ref_id="CVE-2021-47618" ref_url="https://www.suse.com/security/cve/CVE-2021-47618/" source="CVE"/>
		<reference ref_id="CVE-2021-47619" ref_url="https://www.suse.com/security/cve/CVE-2021-47619/" source="CVE"/>
		<reference ref_id="CVE-2021-47620" ref_url="https://www.suse.com/security/cve/CVE-2021-47620/" source="CVE"/>
		<reference ref_id="CVE-2022-48711" ref_url="https://www.suse.com/security/cve/CVE-2022-48711/" source="CVE"/>
		<reference ref_id="CVE-2022-48712" ref_url="https://www.suse.com/security/cve/CVE-2022-48712/" source="CVE"/>
		<reference ref_id="CVE-2022-48713" ref_url="https://www.suse.com/security/cve/CVE-2022-48713/" source="CVE"/>
		<reference ref_id="CVE-2022-48714" ref_url="https://www.suse.com/security/cve/CVE-2022-48714/" source="CVE"/>
		<reference ref_id="CVE-2022-48715" ref_url="https://www.suse.com/security/cve/CVE-2022-48715/" source="CVE"/>
		<reference ref_id="CVE-2022-48716" ref_url="https://www.suse.com/security/cve/CVE-2022-48716/" source="CVE"/>
		<reference ref_id="CVE-2022-48717" ref_url="https://www.suse.com/security/cve/CVE-2022-48717/" source="CVE"/>
		<reference ref_id="CVE-2022-48718" ref_url="https://www.suse.com/security/cve/CVE-2022-48718/" source="CVE"/>
		<reference ref_id="CVE-2022-48720" ref_url="https://www.suse.com/security/cve/CVE-2022-48720/" source="CVE"/>
		<reference ref_id="CVE-2022-48721" ref_url="https://www.suse.com/security/cve/CVE-2022-48721/" source="CVE"/>
		<reference ref_id="CVE-2022-48722" ref_url="https://www.suse.com/security/cve/CVE-2022-48722/" source="CVE"/>
		<reference ref_id="CVE-2022-48723" ref_url="https://www.suse.com/security/cve/CVE-2022-48723/" source="CVE"/>
		<reference ref_id="CVE-2022-48724" ref_url="https://www.suse.com/security/cve/CVE-2022-48724/" source="CVE"/>
		<reference ref_id="CVE-2022-48725" ref_url="https://www.suse.com/security/cve/CVE-2022-48725/" source="CVE"/>
		<reference ref_id="CVE-2022-48726" ref_url="https://www.suse.com/security/cve/CVE-2022-48726/" source="CVE"/>
		<reference ref_id="CVE-2022-48727" ref_url="https://www.suse.com/security/cve/CVE-2022-48727/" source="CVE"/>
		<reference ref_id="CVE-2022-48728" ref_url="https://www.suse.com/security/cve/CVE-2022-48728/" source="CVE"/>
		<reference ref_id="CVE-2022-48729" ref_url="https://www.suse.com/security/cve/CVE-2022-48729/" source="CVE"/>
		<reference ref_id="CVE-2022-48730" ref_url="https://www.suse.com/security/cve/CVE-2022-48730/" source="CVE"/>
		<reference ref_id="CVE-2022-48732" ref_url="https://www.suse.com/security/cve/CVE-2022-48732/" source="CVE"/>
		<reference ref_id="CVE-2022-48733" ref_url="https://www.suse.com/security/cve/CVE-2022-48733/" source="CVE"/>
		<reference ref_id="CVE-2022-48734" ref_url="https://www.suse.com/security/cve/CVE-2022-48734/" source="CVE"/>
		<reference ref_id="CVE-2022-48735" ref_url="https://www.suse.com/security/cve/CVE-2022-48735/" source="CVE"/>
		<reference ref_id="CVE-2022-48736" ref_url="https://www.suse.com/security/cve/CVE-2022-48736/" source="CVE"/>
		<reference ref_id="CVE-2022-48737" ref_url="https://www.suse.com/security/cve/CVE-2022-48737/" source="CVE"/>
		<reference ref_id="CVE-2022-48738" ref_url="https://www.suse.com/security/cve/CVE-2022-48738/" source="CVE"/>
		<reference ref_id="CVE-2022-48739" ref_url="https://www.suse.com/security/cve/CVE-2022-48739/" source="CVE"/>
		<reference ref_id="CVE-2022-48740" ref_url="https://www.suse.com/security/cve/CVE-2022-48740/" source="CVE"/>
		<reference ref_id="CVE-2022-48743" ref_url="https://www.suse.com/security/cve/CVE-2022-48743/" source="CVE"/>
		<reference ref_id="CVE-2022-48744" ref_url="https://www.suse.com/security/cve/CVE-2022-48744/" source="CVE"/>
		<reference ref_id="CVE-2022-48745" ref_url="https://www.suse.com/security/cve/CVE-2022-48745/" source="CVE"/>
		<reference ref_id="CVE-2022-48746" ref_url="https://www.suse.com/security/cve/CVE-2022-48746/" source="CVE"/>
		<reference ref_id="CVE-2022-48747" ref_url="https://www.suse.com/security/cve/CVE-2022-48747/" source="CVE"/>
		<reference ref_id="CVE-2022-48748" ref_url="https://www.suse.com/security/cve/CVE-2022-48748/" source="CVE"/>
		<reference ref_id="CVE-2022-48749" ref_url="https://www.suse.com/security/cve/CVE-2022-48749/" source="CVE"/>
		<reference ref_id="CVE-2022-48751" ref_url="https://www.suse.com/security/cve/CVE-2022-48751/" source="CVE"/>
		<reference ref_id="CVE-2022-48752" ref_url="https://www.suse.com/security/cve/CVE-2022-48752/" source="CVE"/>
		<reference ref_id="CVE-2022-48753" ref_url="https://www.suse.com/security/cve/CVE-2022-48753/" source="CVE"/>
		<reference ref_id="CVE-2022-48754" ref_url="https://www.suse.com/security/cve/CVE-2022-48754/" source="CVE"/>
		<reference ref_id="CVE-2022-48755" ref_url="https://www.suse.com/security/cve/CVE-2022-48755/" source="CVE"/>
		<reference ref_id="CVE-2022-48756" ref_url="https://www.suse.com/security/cve/CVE-2022-48756/" source="CVE"/>
		<reference ref_id="CVE-2022-48758" ref_url="https://www.suse.com/security/cve/CVE-2022-48758/" source="CVE"/>
		<reference ref_id="CVE-2022-48759" ref_url="https://www.suse.com/security/cve/CVE-2022-48759/" source="CVE"/>
		<reference ref_id="CVE-2022-48760" ref_url="https://www.suse.com/security/cve/CVE-2022-48760/" source="CVE"/>
		<reference ref_id="CVE-2022-48761" ref_url="https://www.suse.com/security/cve/CVE-2022-48761/" source="CVE"/>
		<reference ref_id="CVE-2022-48763" ref_url="https://www.suse.com/security/cve/CVE-2022-48763/" source="CVE"/>
		<reference ref_id="CVE-2022-48765" ref_url="https://www.suse.com/security/cve/CVE-2022-48765/" source="CVE"/>
		<reference ref_id="CVE-2022-48766" ref_url="https://www.suse.com/security/cve/CVE-2022-48766/" source="CVE"/>
		<reference ref_id="CVE-2022-48767" ref_url="https://www.suse.com/security/cve/CVE-2022-48767/" source="CVE"/>
		<reference ref_id="CVE-2022-48768" ref_url="https://www.suse.com/security/cve/CVE-2022-48768/" source="CVE"/>
		<reference ref_id="CVE-2022-48769" ref_url="https://www.suse.com/security/cve/CVE-2022-48769/" source="CVE"/>
		<reference ref_id="CVE-2022-48770" ref_url="https://www.suse.com/security/cve/CVE-2022-48770/" source="CVE"/>
		<reference ref_id="CVE-2022-48771" ref_url="https://www.suse.com/security/cve/CVE-2022-48771/" source="CVE"/>
		<reference ref_id="CVE-2022-48772" ref_url="https://www.suse.com/security/cve/CVE-2022-48772/" source="CVE"/>
		<reference ref_id="CVE-2023-24023" ref_url="https://www.suse.com/security/cve/CVE-2023-24023/" source="CVE"/>
		<reference ref_id="CVE-2023-52622" ref_url="https://www.suse.com/security/cve/CVE-2023-52622/" source="CVE"/>
		<reference ref_id="CVE-2023-52658" ref_url="https://www.suse.com/security/cve/CVE-2023-52658/" source="CVE"/>
		<reference ref_id="CVE-2023-52667" ref_url="https://www.suse.com/security/cve/CVE-2023-52667/" source="CVE"/>
		<reference ref_id="CVE-2023-52670" ref_url="https://www.suse.com/security/cve/CVE-2023-52670/" source="CVE"/>
		<reference ref_id="CVE-2023-52672" ref_url="https://www.suse.com/security/cve/CVE-2023-52672/" source="CVE"/>
		<reference ref_id="CVE-2023-52675" ref_url="https://www.suse.com/security/cve/CVE-2023-52675/" source="CVE"/>
		<reference ref_id="CVE-2023-52735" ref_url="https://www.suse.com/security/cve/CVE-2023-52735/" source="CVE"/>
		<reference ref_id="CVE-2023-52737" ref_url="https://www.suse.com/security/cve/CVE-2023-52737/" source="CVE"/>
		<reference ref_id="CVE-2023-52752" ref_url="https://www.suse.com/security/cve/CVE-2023-52752/" source="CVE"/>
		<reference ref_id="CVE-2023-52766" ref_url="https://www.suse.com/security/cve/CVE-2023-52766/" source="CVE"/>
		<reference ref_id="CVE-2023-52784" ref_url="https://www.suse.com/security/cve/CVE-2023-52784/" source="CVE"/>
		<reference ref_id="CVE-2023-52787" ref_url="https://www.suse.com/security/cve/CVE-2023-52787/" source="CVE"/>
		<reference ref_id="CVE-2023-52800" ref_url="https://www.suse.com/security/cve/CVE-2023-52800/" source="CVE"/>
		<reference ref_id="CVE-2023-52835" ref_url="https://www.suse.com/security/cve/CVE-2023-52835/" source="CVE"/>
		<reference ref_id="CVE-2023-52837" ref_url="https://www.suse.com/security/cve/CVE-2023-52837/" source="CVE"/>
		<reference ref_id="CVE-2023-52843" ref_url="https://www.suse.com/security/cve/CVE-2023-52843/" source="CVE"/>
		<reference ref_id="CVE-2023-52845" ref_url="https://www.suse.com/security/cve/CVE-2023-52845/" source="CVE"/>
		<reference ref_id="CVE-2023-52846" ref_url="https://www.suse.com/security/cve/CVE-2023-52846/" source="CVE"/>
		<reference ref_id="CVE-2023-52869" ref_url="https://www.suse.com/security/cve/CVE-2023-52869/" source="CVE"/>
		<reference ref_id="CVE-2023-52881" ref_url="https://www.suse.com/security/cve/CVE-2023-52881/" source="CVE"/>
		<reference ref_id="CVE-2023-52882" ref_url="https://www.suse.com/security/cve/CVE-2023-52882/" source="CVE"/>
		<reference ref_id="CVE-2023-52884" ref_url="https://www.suse.com/security/cve/CVE-2023-52884/" source="CVE"/>
		<reference ref_id="CVE-2024-26625" ref_url="https://www.suse.com/security/cve/CVE-2024-26625/" source="CVE"/>
		<reference ref_id="CVE-2024-26644" ref_url="https://www.suse.com/security/cve/CVE-2024-26644/" source="CVE"/>
		<reference ref_id="CVE-2024-26720" ref_url="https://www.suse.com/security/cve/CVE-2024-26720/" source="CVE"/>
		<reference ref_id="CVE-2024-26842" ref_url="https://www.suse.com/security/cve/CVE-2024-26842/" source="CVE"/>
		<reference ref_id="CVE-2024-26845" ref_url="https://www.suse.com/security/cve/CVE-2024-26845/" source="CVE"/>
		<reference ref_id="CVE-2024-26923" ref_url="https://www.suse.com/security/cve/CVE-2024-26923/" source="CVE"/>
		<reference ref_id="CVE-2024-26973" ref_url="https://www.suse.com/security/cve/CVE-2024-26973/" source="CVE"/>
		<reference ref_id="CVE-2024-27432" ref_url="https://www.suse.com/security/cve/CVE-2024-27432/" source="CVE"/>
		<reference ref_id="CVE-2024-33619" ref_url="https://www.suse.com/security/cve/CVE-2024-33619/" source="CVE"/>
		<reference ref_id="CVE-2024-35247" ref_url="https://www.suse.com/security/cve/CVE-2024-35247/" source="CVE"/>
		<reference ref_id="CVE-2024-35789" ref_url="https://www.suse.com/security/cve/CVE-2024-35789/" source="CVE"/>
		<reference ref_id="CVE-2024-35790" ref_url="https://www.suse.com/security/cve/CVE-2024-35790/" source="CVE"/>
		<reference ref_id="CVE-2024-35807" ref_url="https://www.suse.com/security/cve/CVE-2024-35807/" source="CVE"/>
		<reference ref_id="CVE-2024-35814" ref_url="https://www.suse.com/security/cve/CVE-2024-35814/" source="CVE"/>
		<reference ref_id="CVE-2024-35835" ref_url="https://www.suse.com/security/cve/CVE-2024-35835/" source="CVE"/>
		<reference ref_id="CVE-2024-35848" ref_url="https://www.suse.com/security/cve/CVE-2024-35848/" source="CVE"/>
		<reference ref_id="CVE-2024-35857" ref_url="https://www.suse.com/security/cve/CVE-2024-35857/" source="CVE"/>
		<reference ref_id="CVE-2024-35861" ref_url="https://www.suse.com/security/cve/CVE-2024-35861/" source="CVE"/>
		<reference ref_id="CVE-2024-35862" ref_url="https://www.suse.com/security/cve/CVE-2024-35862/" source="CVE"/>
		<reference ref_id="CVE-2024-35864" ref_url="https://www.suse.com/security/cve/CVE-2024-35864/" source="CVE"/>
		<reference ref_id="CVE-2024-35869" ref_url="https://www.suse.com/security/cve/CVE-2024-35869/" source="CVE"/>
		<reference ref_id="CVE-2024-35878" ref_url="https://www.suse.com/security/cve/CVE-2024-35878/" source="CVE"/>
		<reference ref_id="CVE-2024-35884" ref_url="https://www.suse.com/security/cve/CVE-2024-35884/" source="CVE"/>
		<reference ref_id="CVE-2024-35886" ref_url="https://www.suse.com/security/cve/CVE-2024-35886/" source="CVE"/>
		<reference ref_id="CVE-2024-35896" ref_url="https://www.suse.com/security/cve/CVE-2024-35896/" source="CVE"/>
		<reference ref_id="CVE-2024-35898" ref_url="https://www.suse.com/security/cve/CVE-2024-35898/" source="CVE"/>
		<reference ref_id="CVE-2024-35900" ref_url="https://www.suse.com/security/cve/CVE-2024-35900/" source="CVE"/>
		<reference ref_id="CVE-2024-35905" ref_url="https://www.suse.com/security/cve/CVE-2024-35905/" source="CVE"/>
		<reference ref_id="CVE-2024-35925" ref_url="https://www.suse.com/security/cve/CVE-2024-35925/" source="CVE"/>
		<reference ref_id="CVE-2024-35950" ref_url="https://www.suse.com/security/cve/CVE-2024-35950/" source="CVE"/>
		<reference ref_id="CVE-2024-35956" ref_url="https://www.suse.com/security/cve/CVE-2024-35956/" source="CVE"/>
		<reference ref_id="CVE-2024-35958" ref_url="https://www.suse.com/security/cve/CVE-2024-35958/" source="CVE"/>
		<reference ref_id="CVE-2024-35960" ref_url="https://www.suse.com/security/cve/CVE-2024-35960/" source="CVE"/>
		<reference ref_id="CVE-2024-35962" ref_url="https://www.suse.com/security/cve/CVE-2024-35962/" source="CVE"/>
		<reference ref_id="CVE-2024-35997" ref_url="https://www.suse.com/security/cve/CVE-2024-35997/" source="CVE"/>
		<reference ref_id="CVE-2024-36005" ref_url="https://www.suse.com/security/cve/CVE-2024-36005/" source="CVE"/>
		<reference ref_id="CVE-2024-36008" ref_url="https://www.suse.com/security/cve/CVE-2024-36008/" source="CVE"/>
		<reference ref_id="CVE-2024-36017" ref_url="https://www.suse.com/security/cve/CVE-2024-36017/" source="CVE"/>
		<reference ref_id="CVE-2024-36020" ref_url="https://www.suse.com/security/cve/CVE-2024-36020/" source="CVE"/>
		<reference ref_id="CVE-2024-36021" ref_url="https://www.suse.com/security/cve/CVE-2024-36021/" source="CVE"/>
		<reference ref_id="CVE-2024-36025" ref_url="https://www.suse.com/security/cve/CVE-2024-36025/" source="CVE"/>
		<reference ref_id="CVE-2024-36477" ref_url="https://www.suse.com/security/cve/CVE-2024-36477/" source="CVE"/>
		<reference ref_id="CVE-2024-36478" ref_url="https://www.suse.com/security/cve/CVE-2024-36478/" source="CVE"/>
		<reference ref_id="CVE-2024-36479" ref_url="https://www.suse.com/security/cve/CVE-2024-36479/" source="CVE"/>
		<reference ref_id="CVE-2024-36890" ref_url="https://www.suse.com/security/cve/CVE-2024-36890/" source="CVE"/>
		<reference ref_id="CVE-2024-36894" ref_url="https://www.suse.com/security/cve/CVE-2024-36894/" source="CVE"/>
		<reference ref_id="CVE-2024-36899" ref_url="https://www.suse.com/security/cve/CVE-2024-36899/" source="CVE"/>
		<reference ref_id="CVE-2024-36900" ref_url="https://www.suse.com/security/cve/CVE-2024-36900/" source="CVE"/>
		<reference ref_id="CVE-2024-36904" ref_url="https://www.suse.com/security/cve/CVE-2024-36904/" source="CVE"/>
		<reference ref_id="CVE-2024-36915" ref_url="https://www.suse.com/security/cve/CVE-2024-36915/" source="CVE"/>
		<reference ref_id="CVE-2024-36916" ref_url="https://www.suse.com/security/cve/CVE-2024-36916/" source="CVE"/>
		<reference ref_id="CVE-2024-36917" ref_url="https://www.suse.com/security/cve/CVE-2024-36917/" source="CVE"/>
		<reference ref_id="CVE-2024-36919" ref_url="https://www.suse.com/security/cve/CVE-2024-36919/" source="CVE"/>
		<reference ref_id="CVE-2024-36934" ref_url="https://www.suse.com/security/cve/CVE-2024-36934/" source="CVE"/>
		<reference ref_id="CVE-2024-36937" ref_url="https://www.suse.com/security/cve/CVE-2024-36937/" source="CVE"/>
		<reference ref_id="CVE-2024-36940" ref_url="https://www.suse.com/security/cve/CVE-2024-36940/" source="CVE"/>
		<reference ref_id="CVE-2024-36945" ref_url="https://www.suse.com/security/cve/CVE-2024-36945/" source="CVE"/>
		<reference ref_id="CVE-2024-36949" ref_url="https://www.suse.com/security/cve/CVE-2024-36949/" source="CVE"/>
		<reference ref_id="CVE-2024-36960" ref_url="https://www.suse.com/security/cve/CVE-2024-36960/" source="CVE"/>
		<reference ref_id="CVE-2024-36964" ref_url="https://www.suse.com/security/cve/CVE-2024-36964/" source="CVE"/>
		<reference ref_id="CVE-2024-36965" ref_url="https://www.suse.com/security/cve/CVE-2024-36965/" source="CVE"/>
		<reference ref_id="CVE-2024-36967" ref_url="https://www.suse.com/security/cve/CVE-2024-36967/" source="CVE"/>
		<reference ref_id="CVE-2024-36969" ref_url="https://www.suse.com/security/cve/CVE-2024-36969/" source="CVE"/>
		<reference ref_id="CVE-2024-36971" ref_url="https://www.suse.com/security/cve/CVE-2024-36971/" source="CVE"/>
		<reference ref_id="CVE-2024-36975" ref_url="https://www.suse.com/security/cve/CVE-2024-36975/" source="CVE"/>
		<reference ref_id="CVE-2024-36978" ref_url="https://www.suse.com/security/cve/CVE-2024-36978/" source="CVE"/>
		<reference ref_id="CVE-2024-37021" ref_url="https://www.suse.com/security/cve/CVE-2024-37021/" source="CVE"/>
		<reference ref_id="CVE-2024-37078" ref_url="https://www.suse.com/security/cve/CVE-2024-37078/" source="CVE"/>
		<reference ref_id="CVE-2024-37354" ref_url="https://www.suse.com/security/cve/CVE-2024-37354/" source="CVE"/>
		<reference ref_id="CVE-2024-38381" ref_url="https://www.suse.com/security/cve/CVE-2024-38381/" source="CVE"/>
		<reference ref_id="CVE-2024-38388" ref_url="https://www.suse.com/security/cve/CVE-2024-38388/" source="CVE"/>
		<reference ref_id="CVE-2024-38390" ref_url="https://www.suse.com/security/cve/CVE-2024-38390/" source="CVE"/>
		<reference ref_id="CVE-2024-38540" ref_url="https://www.suse.com/security/cve/CVE-2024-38540/" source="CVE"/>
		<reference ref_id="CVE-2024-38541" ref_url="https://www.suse.com/security/cve/CVE-2024-38541/" source="CVE"/>
		<reference ref_id="CVE-2024-38544" ref_url="https://www.suse.com/security/cve/CVE-2024-38544/" source="CVE"/>
		<reference ref_id="CVE-2024-38545" ref_url="https://www.suse.com/security/cve/CVE-2024-38545/" source="CVE"/>
		<reference ref_id="CVE-2024-38546" ref_url="https://www.suse.com/security/cve/CVE-2024-38546/" source="CVE"/>
		<reference ref_id="CVE-2024-38547" ref_url="https://www.suse.com/security/cve/CVE-2024-38547/" source="CVE"/>
		<reference ref_id="CVE-2024-38548" ref_url="https://www.suse.com/security/cve/CVE-2024-38548/" source="CVE"/>
		<reference ref_id="CVE-2024-38549" ref_url="https://www.suse.com/security/cve/CVE-2024-38549/" source="CVE"/>
		<reference ref_id="CVE-2024-38550" ref_url="https://www.suse.com/security/cve/CVE-2024-38550/" source="CVE"/>
		<reference ref_id="CVE-2024-38552" ref_url="https://www.suse.com/security/cve/CVE-2024-38552/" source="CVE"/>
		<reference ref_id="CVE-2024-38553" ref_url="https://www.suse.com/security/cve/CVE-2024-38553/" source="CVE"/>
		<reference ref_id="CVE-2024-38555" ref_url="https://www.suse.com/security/cve/CVE-2024-38555/" source="CVE"/>
		<reference ref_id="CVE-2024-38556" ref_url="https://www.suse.com/security/cve/CVE-2024-38556/" source="CVE"/>
		<reference ref_id="CVE-2024-38557" ref_url="https://www.suse.com/security/cve/CVE-2024-38557/" source="CVE"/>
		<reference ref_id="CVE-2024-38559" ref_url="https://www.suse.com/security/cve/CVE-2024-38559/" source="CVE"/>
		<reference ref_id="CVE-2024-38560" ref_url="https://www.suse.com/security/cve/CVE-2024-38560/" source="CVE"/>
		<reference ref_id="CVE-2024-38564" ref_url="https://www.suse.com/security/cve/CVE-2024-38564/" source="CVE"/>
		<reference ref_id="CVE-2024-38565" ref_url="https://www.suse.com/security/cve/CVE-2024-38565/" source="CVE"/>
		<reference ref_id="CVE-2024-38567" ref_url="https://www.suse.com/security/cve/CVE-2024-38567/" source="CVE"/>
		<reference ref_id="CVE-2024-38568" ref_url="https://www.suse.com/security/cve/CVE-2024-38568/" source="CVE"/>
		<reference ref_id="CVE-2024-38571" ref_url="https://www.suse.com/security/cve/CVE-2024-38571/" source="CVE"/>
		<reference ref_id="CVE-2024-38573" ref_url="https://www.suse.com/security/cve/CVE-2024-38573/" source="CVE"/>
		<reference ref_id="CVE-2024-38578" ref_url="https://www.suse.com/security/cve/CVE-2024-38578/" source="CVE"/>
		<reference ref_id="CVE-2024-38579" ref_url="https://www.suse.com/security/cve/CVE-2024-38579/" source="CVE"/>
		<reference ref_id="CVE-2024-38580" ref_url="https://www.suse.com/security/cve/CVE-2024-38580/" source="CVE"/>
		<reference ref_id="CVE-2024-38581" ref_url="https://www.suse.com/security/cve/CVE-2024-38581/" source="CVE"/>
		<reference ref_id="CVE-2024-38582" ref_url="https://www.suse.com/security/cve/CVE-2024-38582/" source="CVE"/>
		<reference ref_id="CVE-2024-38583" ref_url="https://www.suse.com/security/cve/CVE-2024-38583/" source="CVE"/>
		<reference ref_id="CVE-2024-38587" ref_url="https://www.suse.com/security/cve/CVE-2024-38587/" source="CVE"/>
		<reference ref_id="CVE-2024-38590" ref_url="https://www.suse.com/security/cve/CVE-2024-38590/" source="CVE"/>
		<reference ref_id="CVE-2024-38591" ref_url="https://www.suse.com/security/cve/CVE-2024-38591/" source="CVE"/>
		<reference ref_id="CVE-2024-38594" ref_url="https://www.suse.com/security/cve/CVE-2024-38594/" source="CVE"/>
		<reference ref_id="CVE-2024-38597" ref_url="https://www.suse.com/security/cve/CVE-2024-38597/" source="CVE"/>
		<reference ref_id="CVE-2024-38599" ref_url="https://www.suse.com/security/cve/CVE-2024-38599/" source="CVE"/>
		<reference ref_id="CVE-2024-38600" ref_url="https://www.suse.com/security/cve/CVE-2024-38600/" source="CVE"/>
		<reference ref_id="CVE-2024-38601" ref_url="https://www.suse.com/security/cve/CVE-2024-38601/" source="CVE"/>
		<reference ref_id="CVE-2024-38603" ref_url="https://www.suse.com/security/cve/CVE-2024-38603/" source="CVE"/>
		<reference ref_id="CVE-2024-38605" ref_url="https://www.suse.com/security/cve/CVE-2024-38605/" source="CVE"/>
		<reference ref_id="CVE-2024-38608" ref_url="https://www.suse.com/security/cve/CVE-2024-38608/" source="CVE"/>
		<reference ref_id="CVE-2024-38616" ref_url="https://www.suse.com/security/cve/CVE-2024-38616/" source="CVE"/>
		<reference ref_id="CVE-2024-38618" ref_url="https://www.suse.com/security/cve/CVE-2024-38618/" source="CVE"/>
		<reference ref_id="CVE-2024-38619" ref_url="https://www.suse.com/security/cve/CVE-2024-38619/" source="CVE"/>
		<reference ref_id="CVE-2024-38621" ref_url="https://www.suse.com/security/cve/CVE-2024-38621/" source="CVE"/>
		<reference ref_id="CVE-2024-38627" ref_url="https://www.suse.com/security/cve/CVE-2024-38627/" source="CVE"/>
		<reference ref_id="CVE-2024-38630" ref_url="https://www.suse.com/security/cve/CVE-2024-38630/" source="CVE"/>
		<reference ref_id="CVE-2024-38633" ref_url="https://www.suse.com/security/cve/CVE-2024-38633/" source="CVE"/>
		<reference ref_id="CVE-2024-38634" ref_url="https://www.suse.com/security/cve/CVE-2024-38634/" source="CVE"/>
		<reference ref_id="CVE-2024-38635" ref_url="https://www.suse.com/security/cve/CVE-2024-38635/" source="CVE"/>
		<reference ref_id="CVE-2024-38659" ref_url="https://www.suse.com/security/cve/CVE-2024-38659/" source="CVE"/>
		<reference ref_id="CVE-2024-38661" ref_url="https://www.suse.com/security/cve/CVE-2024-38661/" source="CVE"/>
		<reference ref_id="CVE-2024-38780" ref_url="https://www.suse.com/security/cve/CVE-2024-38780/" source="CVE"/>
		<reference ref_id="CVE-2024-39301" ref_url="https://www.suse.com/security/cve/CVE-2024-39301/" source="CVE"/>
		<reference ref_id="CVE-2024-39468" ref_url="https://www.suse.com/security/cve/CVE-2024-39468/" source="CVE"/>
		<reference ref_id="CVE-2024-39469" ref_url="https://www.suse.com/security/cve/CVE-2024-39469/" source="CVE"/>
		<reference ref_id="CVE-2024-39471" ref_url="https://www.suse.com/security/cve/CVE-2024-39471/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2021-47089: kfence: fix memory leak when cat kfence objects (bsc#1220958.
- CVE-2021-47432: lib/generic-radix-tree.c: Do not overflow in peek() (bsc#1225391).
- CVE-2021-47515: seg6: fix the iif in the IPv6 socket control block (bsc#1225426).
- CVE-2021-47538: rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() (bsc#1225448).
- CVE-2021-47539: rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle() (bsc#1225452).
- CVE-2021-47555: net: vlan: fix underflow for the real_dev refcnt (bsc#1225467).
- CVE-2021-47566: Fix clearing user buffer by properly using clear_user() (bsc#1225514).
- CVE-2021-47571: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() (bsc#1225518).
- CVE-2021-47572: net: nexthop: fix null pointer dereference when IPv6 is not enabled (bsc#1225389).
- CVE-2022-48716: ASoC: codecs: wcd938x: fix incorrect used of portid (bsc#1226678).
- CVE-2023-24023: Bluetooth: Add more enc key size check (bsc#1218148).
- CVE-2023-52622: ext4: avoid online resizing failures due to oversized flex bg (bsc#1222080).
- CVE-2023-52658: Revert 'net/mlx5: Block entering switchdev mode with ns inconsistency' (bsc#1224719).
- CVE-2023-52667: net/mlx5e: fix a potential double-free in fs_any_create_groups (bsc#1224603).
- CVE-2023-52670: rpmsg: virtio: Free driver_override when rpmsg_remove() (bsc#1224696).
- CVE-2023-52672: pipe: wakeup wr_wait after setting max_usage (bsc#1224614).
- CVE-2023-52675: powerpc/imc-pmu: Add a null pointer check in update_events_in_group() (bsc#1224504).
- CVE-2023-52735: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself (bsc#1225475).
- CVE-2023-52737: btrfs: lock the inode in shared mode before starting fiemap (bsc#1225484).
- CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487).
- CVE-2023-52784: bonding: stop the device in bond_setup_by_slave() (bsc#1224946).
- CVE-2023-52787: blk-mq: make sure active queue usage is held for bio_integrity_prep() (bsc#1225105).
- CVE-2023-52835: perf/core: Bail out early if the request AUX area is out of bound (bsc#1225602).
- CVE-2023-52837: nbd: fix uaf in nbd_open (bsc#1224935).
- CVE-2023-52843: llc: verify mac len before reading mac header (bsc#1224951).
- CVE-2023-52845: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (bsc#1225585).
- CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225098).
- CVE-2023-52869: pstore/platform: Add check for kstrdup (bsc#1225050).
- CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).
- CVE-2023-52882: clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change (bsc#1225692).
- CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)
- CVE-2024-26644: btrfs: do not abort filesystem when attempting to snapshot deleted subvolume (bsc#1221282, bsc#1222072).
- CVE-2024-26720: mm: Avoid overflows in dirty throttling logic (bsc#1222364).
- CVE-2024-26845: scsi: target: core: Add TMF to tmr_list handling (bsc#1223018).
- CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384).
- CVE-2024-26973: fat: fix uninitialized field in nostale filehandles (bsc#1223641).
- CVE-2024-27432: net: ethernet: mtk_eth_soc: fix PPE hanging issue (bsc#1224716).
- CVE-2024-35247: fpga: region: add owner module and take its refcount (bsc#1226948).
- CVE-2024-35789: Check fast rx for non-4addr sta VLAN changes (bsc#1224749).
- CVE-2024-35790: usb: typec: altmodes/displayport: create sysfs nodes as driver's default device attribute group (bsc#1224712).
- CVE-2024-35807: ext4: fix corruption during on-line resize (bsc#1224735).
- CVE-2024-35835: net/mlx5e: fix a double-free in arfs_create_groups (bsc#1224605).
- CVE-2024-35848: eeprom: at24: fix memory corruption race condition (bsc#1224612).
- CVE-2024-35857: icmp: prevent possible NULL dereferences from icmp_build_probe() (bsc#1224619).
- CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766).
- CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764).
- CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765).
- CVE-2024-35869: smb: client: guarantee refcounted children from parent session (bsc#1224679).
- CVE-2024-35884: udp: do not accept non-tunnel GSO skbs landing in a tunnel (bsc#1224520).
- CVE-2024-35886: ipv6: Fix infinite recursion in fib6_dump_done() (bsc#1224670).
- CVE-2024-35898: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (bsc#1224498).
- CVE-2024-35900: netfilter: nf_tables: reject new basechain after table flag update (bsc#1224497).
- CVE-2024-35925: block: prevent division by zero in blk_rq_stat_sum() (bsc#1224661).
- CVE-2024-35950: drm/client: Fully protect modes with dev-&gt;mode_config.mutex (bsc#1224703).
- CVE-2024-35956: Fixed qgroup prealloc rsv leak in subvolume operations (bsc#1224674)
- CVE-2024-35958: net: ena: Fix incorrect descriptor free behavior (bsc#1224677).
- CVE-2024-35960: net/mlx5: Properly link new fs rules into the tree (bsc#1224588).
- CVE-2024-35997: Remove I2C_HID_READ_PENDING flag to prevent lock-up (bsc#1224552).
- CVE-2024-36005: netfilter: nf_tables: honor table dormant flag from netdev release event path (bsc#1224539).
- CVE-2024-36008: ipv4: check for NULL idev in ip_route_use_hint() (bsc#1224540).
- CVE-2024-36017: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation (bsc#1225681).
- CVE-2024-36020: i40e: fix vf may be used uninitialized in this function warning (bsc#1225698).
- CVE-2024-36021: net: hns3: fix kernel crash when devlink reload during pf initialization (bsc#1225699).
- CVE-2024-36478: null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues' (bsc#1226841).
- CVE-2024-36479: fpga: bridge: add owner module and take its refcount (bsc#1226949).
- CVE-2024-36890: mm/slab: make __free(kfree) accept error pointers (bsc#1225714).
- CVE-2024-36894: usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete (bsc#1225749).
- CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225737).
- CVE-2024-36900: net: hns3: fix kernel crash when devlink reload during initialization (bsc#1225726).
- CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225732).
- CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758).
- CVE-2024-36916: blk-iocost: avoid out of bounds shift (bsc#1225759).
- CVE-2024-36917: block: fix overflow in blk_ioctl_discard() (bsc#1225770).
- CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload (bsc#1225767).
- CVE-2024-36934: bna: ensure the copied buf is NUL terminated (bsc#1225760).
- CVE-2024-36937: xdp: use flags field to disambiguate broadcast redirect (bsc#1225834).
- CVE-2024-36940: pinctrl: core: delete incorrect free in pinctrl_enable() (bsc#1225840).
- CVE-2024-36945: net/smc: fix neighbour and rtable leak in smc_ib_find_route() (bsc#1225823).
- CVE-2024-36949: amd/amdkfd: sync all devices to wait all processes being evicted (bsc#1225872)
- CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1225866).
- CVE-2024-36971: net: fix __dst_negative_advice() race (bsc#1226145).
- CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514).
- CVE-2024-37021: fpga: manager: add owner module and take its refcount (bsc#1226950).
- CVE-2024-37078: nilfs2: fix potential kernel bug due to lack of writeback flag waiting (bsc#1227066).
- CVE-2024-37354: btrfs: fix crash on racing fsync and size-extending write into prealloc (bsc#1227101).
- CVE-2024-38541: of: module: add buffer overflow check in of_modalias() (bsc#1226587).
- CVE-2024-38545: RDMA/hns: Fix UAF for cq async event (bsc#1226595).
- CVE-2024-38553: net: fec: remove .ndo_poll_controller to avoid deadlock (bsc#1226744).
- CVE-2024-38555: net/mlx5: Discard command completions in internal error (bsc#1226607).
- CVE-2024-38556: net/mlx5: Add a timeout to acquire the command queue semaphore (bsc#1226774).
- CVE-2024-38557: net/mlx5: Reload only IB representors upon lag disable/enable (bsc#1226781).
- CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785).
- CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786).
- CVE-2024-38564: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (bsc#1226789).
- CVE-2024-38568: drivers/perf: hisi: hns3: Fix out-of-bound access when valid event group (bsc#1226771).
- CVE-2024-38578: ecryptfs: Fix buffer size for tag 66 packet (bsc#1226634).
- CVE-2024-38580: epoll: be better about file lifetimes (bsc#1226610).
- CVE-2024-38594: net: stmmac: move the EST lock to struct stmmac_priv (bsc#1226734).
- CVE-2024-38597: eth: sungem: remove .ndo_poll_controller to avoid deadlocks (bsc#1226749).
- CVE-2024-38603: drivers/perf: hisi: hns3: Actually use devm_add_action_or_reset() (bsc#1226842).
- CVE-2024-38608: net/mlx5e: Fix netif state handling (bsc#1226746).
- CVE-2024-38627: stm class: Fix a double free in stm_register_device() (bsc#1226857).
- CVE-2024-38659: enic: Validate length of nl attributes in enic_set_vf_port (bsc#1226883).
- CVE-2024-38661: s390/ap: Fix crash in AP internal function modify_bitmap() (bsc#1226996).
- CVE-2024-38780: dma-buf/sw-sync: do not enable IRQ from sync_print_obj() (bsc#1226886).
- CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994).
- CVE-2024-39468: smb: client: fix deadlock in smb2_find_smb_tcon() (bsc#1227103.
- CVE-2024-39469: nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors (bsc#1226992).

The following non-security bugs were fixed:

- ACPI: resource: Do IRQ override on TongFang GXxHRXx and GMxHGxx (stable-fixes).
- ACPICA: Revert 'ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.' (git-fixes).
- ALSA/hda: intel-dsp-config: Document AVS as dsp_driver option (git-fixes).
- ALSA: Fix deadlocks with kctl removals at disconnection (stable-fixes).
- ALSA: hda/realtek: Add quirks for Lenovo 13X (stable-fixes).
- ALSA: hda/realtek: Adjust G814JZR to use SPI init for amp (git-fixes).
- ALSA: hda/realtek: Enable headset mic on IdeaPad 330-17IKB 81DM (git-fixes).
- ALSA: hda/realtek: Fix conflicting quirk for PCI SSID 17aa:3820 (git-fixes).
- ALSA: hda/realtek: Limit mic boost on N14AP7 (stable-fixes).
- ALSA: hda/realtek: Remove Framework Laptop 16 from quirks (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs do not work for ProBook 440/460 G11 (stable-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs do not work for ProBook 445/465 G11 (stable-fixes).
- ALSA: hda: intel-dsp-config: harden I2C/I2S codec detection (stable-fixes).
- ALSA: timer: Set lower bound of start tick time (stable-fixes).
- ASoC: amd: acp: add a null check for chip_pdev structure (git-fixes).
- ASoC: amd: acp: remove i2s configuration check in acp_i2s_probe() (git-fixes).
- ASoC: da7219-aad: fix usage of device_get_named_child_node() (stable-fixes).
- ASoC: fsl-asoc-card: set priv-&gt;pdev before using it (git-fixes).
- ASoC: rt5645: Fix the electric noise due to the CBJ contacts floating (stable-fixes).
- ASoC: rt715-sdca: volume step modification (stable-fixes).
- ASoC: rt715: add vendor clear control register (stable-fixes).
- Add remote for nfs maintainer
- Bluetooth: L2CAP: Fix rejecting L2CAP_CONN_PARAM_UPDATE_REQ (git-fixes).
- Fix new build warnings regarding unused variables: Changed build warnings: ***** 2 warnings ***** * unused-variable (cl) in ../fs/ceph/mds_client.c in ceph_queue_cap_unlink_work ../fs/ceph/mds_client.c: In function 'ceph_queue_cap_unlink_work': ../fs/ceph/mds_client.c:2421:22: warning: unused variable 'cl' [-Wunused-variable] * unused-variable (cl) in ../fs/ceph/mds_client.c in ceph_cap_unlink_work ../fs/ceph/mds_client.c: In function 'ceph_cap_unlink_work': ../fs/ceph/mds_client.c:2436:22: warning: unused variable 'cl' [-Wunused-variable]
- HID: core: remove unnecessary WARN_ON() in implement() (git-fixes).
- HID: logitech-dj: Fix memory leak in logi_dj_recv_switch_to_dj_mode() (git-fixes).
- Input: ili210x - fix ili251x_read_touch_data() return value (git-fixes).
- NFS: abort nfs_atomic_open_v23 if name is too long (bsc#1219847).
- NFS: add atomic_open for NFSv3 to handle O_TRUNC correctly (bsc#1219847).
- NFS: avoid infinite loop in pnfs_update_layout (bsc#1219633 bsc#1226226).
- PCI/ASPM: Update save_state when configuration changes (bsc#1226915)
- PCI: Clear Secondary Status errors after enumeration (bsc#1226928)
- RAS/AMD/ATL: Fix MI300 bank hash (bsc#1225300).
- RAS/AMD/ATL: Use system settings for MI300 DRAM to normalized address translation (bsc#1225300).
- RDMA/hns: Fix incorrect sge nums calculation (git-fixes)
- RDMA/irdma: Drop unused kernel push code (git-fixes)
- RDMA/mlx5: Add check for srq max_sge attribute (git-fixes)
- Revert 'Add remote for nfs maintainer'
- Revert 'build initrd without systemd' (bsc#1195775)'
- USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (git-fixes).
- USB: xen-hcd: Traverse host/ when CONFIG_USB_XEN_HCD is selected (git-fixes).
- X.509: Fix the parser of extended key usage for length (bsc#1218820).
- arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY (git-fixes).
- arm64: mm: Batch dsb and isb when populating pgtables (jsc#PED-8690).
- arm64: mm: Do not remap pgtables for allocate vs populate (jsc#PED-8690).
- arm64: mm: Do not remap pgtables per-cont(pte|pmd) block (jsc#PED-8690).
- arm64: mm: do not acquire mutex when rewriting swapper (jsc#PED-8690).
- ata: ahci: Clean up sysfs file on error (git-fixes).
- ata: libata-core: Fix double free on error (git-fixes).
- ata: libata-core: Fix null pointer dereference on error (git-fixes).
- batman-adv: Do not accept TT entries for out-of-spec VIDs (git-fixes).
- bpf, sockmap: Check for any of tcp_bpf_prots when cloning a listener (git-fixes).
- btrfs: avoid copying BTRFS_ROOT_SUBVOL_DEAD flag to snapshot of subvolume being deleted (bsc#1221282).
- cachefiles: remove requests from xarray during flushing requests (bsc#1226588).
- ceph: add ceph_cap_unlink_work to fire check_caps() immediately (bsc#1226022).
- ceph: always check dir caps asynchronously (bsc#1226022).
- ceph: always queue a writeback when revoking the Fb caps (bsc#1226022).
- ceph: break the check delayed cap loop every 5s (bsc#1226022).
- ceph: switch to use cap_delay_lock for the unlink delay list (bsc#1226022).
- cgroup: Add annotation for holding namespace_sem in current_cgns_cgroup_from_root() (bsc#1222254).
- cgroup: Eliminate the need for cgroup_mutex in proc_cgroup_show() (bsc#1222254).
- cgroup: Make operations on the cgroup root_list RCU safe (bsc#1222254).
- cgroup: Remove unnecessary list_empty() (bsc#1222254).
- cgroup: preserve KABI of cgroup_root (bsc#1222254).
- cifs: fix hang in wait_for_response() (bsc#1220812, bsc#1220368).
- cpufreq: amd-pstate: Fix the inconsistency in max frequency units (git-fixes).
- crypto: ecrdsa - Fix module auto-load on add_key (stable-fixes).
- dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (git-fixes).
- dmaengine: ioatdma: Fix missing kmem_cache_destroy() (git-fixes).
- drivers: core: synchronize really_probe() and dev_uevent() (git-fixes).
- drm/amd/display: Add VCO speed parameter for DCN31 FPU (stable-fixes).
- drm/amd/display: Add dtbclk access to dcn315 (stable-fixes).
- drm/amd/display: Exit idle optimizations before HDCP execution (stable-fixes).
- drm/amd/display: Set color_mgmt_changed to true on unsuspend (stable-fixes).
- drm/amd/display: drop unnecessary NULL checks in debugfs (stable-fixes).
- drm/amd/display: revert Exit idle optimizations before HDCP execution (stable-fixes).
- drm/amd: Fix shutdown (again) on some SMU v13.0.4/11 platforms (git-fixes).
- drm/amdgpu/atomfirmware: add intergrated info v2.3 table (stable-fixes).
- drm/amdgpu/mes: fix use-after-free issue (stable-fixes).
- drm/amdgpu: Fix the ring buffer size for queue VM flush (stable-fixes).
- drm/amdgpu: Update BO eviction priorities (stable-fixes).
- drm/amdgpu: add error handle to avoid out-of-bounds (stable-fixes).
- drm/amdgpu: fix UBSAN warning in kv_dpm.c (stable-fixes).
- drm/amdkfd: Flush the process wq before creating a kfd_process (stable-fixes).
- drm/amdkfd: Rework kfd_locked handling (bsc#1225872)
- drm/bridge/panel: Fix runtime warning on panel bridge release (git-fixes).
- drm/exynos/vidi: fix memory leak in .get_modes() (stable-fixes).
- drm/exynos: hdmi: report safe 640x480 mode as a fallback when no EDID found (git-fixes).
- drm/i915/dpt: Make DPT object unshrinkable (git-fixes).
- drm/i915/gt: Disarm breadcrumbs if engines are already idle (git-fixes).
- drm/i915/gt: Fix potential UAF by revoke of fence registers (git-fixes).
- drm/i915/guc: avoid FIELD_PREP warning (git-fixes).
- drm/i915/mso: using joiner is not possible with eDP MSO (git-fixes).
- drm/komeda: check for error-valued pointer (git-fixes).
- drm/lima: add mask irq callback to gp and pp (stable-fixes).
- drm/lima: mask irqs in timeout path before hard reset (stable-fixes).
- drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails (git-fixes).
- drm/msm/dp: Avoid a long timeout for AUX transfer if nothing connected (git-fixes).
- drm/msm/dp: Return IRQ_NONE for unhandled interrupts (stable-fixes).
- drm/msm: Enable clamp_to_idle for 7c3 (stable-fixes).
- drm/panel-samsung-atna33xc20: Use ktime_get_boottime for delays (stable-fixes).
- drm/panel: simple: Add missing display timing flags for KOE TX26D202VM0BWA (git-fixes).
- drm/radeon: fix UBSAN warning in kv_dpm.c (stable-fixes).
- drm/vmwgfx: 3D disabled should not effect STDU memory limits (git-fixes).
- drm/vmwgfx: Filter modes which exceed graphics memory (git-fixes).
- gpio: davinci: Validate the obtained number of IRQs (git-fixes).
- gpio: tqmx86: fix typo in Kconfig label (git-fixes).
- gpio: tqmx86: introduce shadow register for GPIO output value (git-fixes).
- gpiolib: cdev: Disallow reconfiguration without direction (uAPI v1) (git-fixes).
- hwmon: (shtc1) Fix property misspelling (git-fixes).
- i2c: at91: Fix the functionality flags of the slave-only interface (git-fixes).
- i2c: designware: Fix the functionality flags of the slave-only interface (git-fixes).
- i2c: ocores: set IACK bit after core is enabled (git-fixes).
- i2c: testunit: discard write requests while old command is running (git-fixes).
- i2c: testunit: do not erase registers after STOP (git-fixes).
- iio: accel: fxls8962af: select IIO_BUFFER &amp; IIO_KFIFO_BUF (git-fixes).
- iio: adc: ad7266: Fix variable checking bug (git-fixes).
- iio: adc: ad9467: fix scan type sign (git-fixes).
- iio: chemical: bme680: Fix calibration data variable (git-fixes).
- iio: chemical: bme680: Fix overflows in compensate() functions (git-fixes).
- iio: chemical: bme680: Fix pressure value output (git-fixes).
- iio: chemical: bme680: Fix sensor data read operation (git-fixes).
- iio: dac: ad5592r: fix temperature channel scaling value (git-fixes).
- iio: imu: inv_icm42600: delete unneeded update watermark call (git-fixes).
- intel_th: pci: Add Meteor Lake-S CPU support (stable-fixes).
- iommu/amd: Fix sysfs leak in iommu init (git-fixes).
- iommu: Return right value in iommu_sva_bind_device() (git-fixes).
- iommu: mtk: fix module autoloading (git-fixes).
- ipvs: Fix checksumming on GSO of SCTP packets (bsc#1221958)
- kbuild: Install dtb files as 0644 in Makefile.dtbinst (git-fixes).
- kbuild: do not include include/config/auto.conf from shell scripts (bsc#1227274).
- kconfig: doc: fix a typo in the note about 'imply' (git-fixes).
- kconfig: fix comparison to constant symbols, 'm', 'n' (git-fixes).
- kernel-doc: fix struct_group_tagged() parsing (git-fixes).
- lib: memcpy_kunit: Fix an invalid format specifier in an assertion msg (git-fixes).
- media: flexcop-usb: clean up endpoint sanity checks (stable-fixes).
- media: flexcop-usb: fix sanity check of bNumEndpoints (git-fixes).
- media: ipu3-cio2: Use temporary storage for struct device pointer (stable-fixes).
- media: lgdt3306a: Add a check against null-pointer-def (stable-fixes).
- media: mxl5xx: Move xpt structures off stack (stable-fixes).
- media: radio-shark2: Avoid led_names truncations (git-fixes).
- media: v4l2-core: hold videodev_lock until dev reg, finishes (stable-fixes).
- mei: me: release irq in mei_me_pci_resume error path (git-fixes).
- mkspec-dtb: add toplevel symlinks also on arm
- mmc: core: Add mmc_gpiod_set_cd_config() function (stable-fixes).
- mmc: core: Do not force a retune before RPMB switch (stable-fixes).
- mmc: sdhci-acpi: Disable write protect detection on Toshiba WT10-A (stable-fixes).
- mmc: sdhci-acpi: Fix Lenovo Yoga Tablet 2 Pro 1380 sdcard slot not working (stable-fixes).
- mmc: sdhci-acpi: Sort DMI quirks alphabetically (stable-fixes).
- mmc: sdhci-pci: Convert PCIBIOS_* return codes to errnos (git-fixes).
- mmc: sdhci: Do not invert write-protect twice (git-fixes).
- mmc: sdhci: Do not lock spinlock around mmc_gpio_get_ro() (git-fixes).
- mmc: sdhci_am654: Add ITAPDLYSEL in sdhci_j721e_4bit_set_clock (git-fixes).
- mmc: sdhci_am654: Add OTAP/ITAP delay enable (git-fixes).
- mmc: sdhci_am654: Drop lookup for deprecated ti,otap-del-sel (stable-fixes).
- mmc: sdhci_am654: Fix ITAPDLY for HS400 timing (git-fixes).
- mtd: rawnand: Bypass a couple of sanity checks during NAND identification (git-fixes).
- mtd: rawnand: Ensure ECC configuration is propagated to upper layers (git-fixes).
- mtd: rawnand: rockchip: ensure NVDDR timings are rejected (git-fixes).
- net/mlx5e: Fix a race in command alloc flow (git-fixes).
- net: can: j1939: Initialize unused data in j1939_send_one() (git-fixes).
- net: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new (git-fixes).
- net: can: j1939: recover socket queue on CAN bus error during BAM transmission (git-fixes).
- net: ena: Fix redundant device NUMA node override (jsc#PED-8690).
- net: mana: Enable MANA driver on ARM64 with 4K page size (jsc#PED-8491).
- net: phy: Micrel KSZ8061: fix errata solution not taking effect problem (git-fixes).
- net: phy: micrel: add Microchip KSZ 9477 to the device table (git-fixes).
- net: usb: ax88179_178a: improve link status logs (git-fixes).
- net: usb: ax88179_178a: improve reset check (git-fixes).
- net: usb: qmi_wwan: add Telit FN920C04 compositions (stable-fixes).
- net: usb: rtl8150 fix unintiatilzed variables in rtl8150_get_link_ksettings (git-fixes).
- net: usb: smsc95xx: fix changing LED_SEL bit value updated from EEPROM (git-fixes).
- nfsd: optimise recalculate_deny_mode() for a common case (bsc#1217912).
- nilfs2: fix potential hang in nilfs_detach_log_writer() (stable-fixes).
- nvme: find numa distance only if controller has valid numa id (git-fixes).
- nvmet-passthru: propagate status from id override functions (git-fixes).
- ocfs2: adjust enabling place for la window (bsc#1219224).
- ocfs2: fix sparse warnings (bsc#1219224).
- ocfs2: improve write IO performance when fragmentation is high (bsc#1219224).
- ocfs2: speed up chain-list searching (bsc#1219224).
- pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER (git-fixes).
- pinctrl: qcom: spmi-gpio: drop broken pm8008 support (git-fixes).
- pinctrl: rockchip: fix pinmux bits for RK3328 GPIO2-B pins (git-fixes).
- pinctrl: rockchip: fix pinmux bits for RK3328 GPIO3-B pins (git-fixes).
- pinctrl: rockchip: fix pinmux reset in rockchip_pmx_set (git-fixes).
- pinctrl: rockchip: use dedicated pinctrl type for RK3328 (git-fixes).
- random: treat bootloader trust toggle the same way as cpu trust toggle (bsc#1226953).
- regulator: bd71815: fix ramp values (git-fixes).
- regulator: core: Fix modpost error 'regulator_get_regmap' undefined (git-fixes).
- regulator: irq_helpers: duplicate IRQ name (stable-fixes).
- regulator: vqmmc-ipq4019: fix module autoloading (stable-fixes).
- rpm/kernel-obs-build.spec.in: Add iso9660 (bsc#1226212) Some builds do not just create an iso9660 image, but also mount it during build.
- rpm/kernel-obs-build.spec.in: Add networking modules for docker (bsc#1226211) docker needs more networking modules, even legacy iptable_nat and _filter.
- rpm/kernel-obs-build.spec.in: Include algif_hash, aegis128 and xts modules afgif_hash is needed by some packages (e.g. iwd) for tests, xts is used for LUKS2 volumes by default and aegis128 is useful as AEAD cipher for LUKS2. Wrap the long line to make it readable.
- rpm/mkspec-dtb: dtbs have moved to vendor sub-directories in 6.5 By commit 724ba6751532 ('ARM: dts: Move .dts files to vendor sub-directories'). So switch to them.
- sched/core: Fix incorrect initialization of the 'burst' parameter in cpu_max_write() (bsc#1226791).
- scsi: sd: Update DIX config every time sd_revalidate_disk() is called (bsc#1218570).
- smb: client: ensure to try all targets when finding nested links (bsc#1224020).
- smb: client: guarantee refcounted children from parent session (bsc#1224679).
- soundwire: cadence: fix invalid PDI offset (stable-fixes).
- spi: stm32: Do not warn about spurious interrupts (git-fixes).
- supported.conf: Add APM X-Gene SoC hardware monitoring driver (bsc#1223265 jsc#PED-8570)
- supported.conf: mark orangefs as optional We do not support orangefs at all (and it is already marked as such), but since there are no SLE consumers of it, mark it as optional.
- supported.conf: mark ufs as unsupported UFS is an unsupported filesystem, mark it as such. We still keep it around (not marking as optional), to accommodate any potential migrations from BSD systems.
- tty: mcf: MCF54418 has 10 UARTS (git-fixes).
- usb-storage: alauda: Check whether the media is initialized (git-fixes).
- usb: atm: cxacru: fix endpoint checking in cxacru_bind() (git-fixes).
- usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock (git-fixes).
- usb: fotg210-hcd: delete an incorrect bounds test (git-fixes).
- usb: gadget: printer: fix races against disable (git-fixes).
- usb: musb: da8xx: fix a resource leak in probe() (git-fixes).
- usb: typec: tcpm: Ignore received Hard Reset in TOGGLING state (git-fixes).
- usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps (git-fixes).
- usb: typec: ucsi: Ack also failed Get Error commands (git-fixes).
- usb: typec: ucsi: Never send a lone connector change ack (git-fixes).
- usb: xhci: Implement xhci_handshake_check_state() helper (git-fixes).
- usb: xhci: address off-by-one in xhci_num_trbs_free() (git-fixes).
- usb: xhci: improve debug message in xhci_ring_expansion_needed() (git-fixes).
- watchdog: bd9576: Drop 'always-running' property (git-fixes).
- watchdog: bd9576_wdt: switch to using devm_fwnode_gpiod_get() (stable-fixes).
- wifi: cfg80211: Lock wiphy in cfg80211_get_station (git-fixes).
- wifi: cfg80211: fix the order of arguments for trace events of the tx_rx_evt class (stable-fixes).
- wifi: cfg80211: pmsr: use correct nla_get_uX functions (git-fixes).
- wifi: iwlwifi: dbg_ini: move iwl_dbg_tlv_free outside of debugfs ifdef (git-fixes).
- wifi: iwlwifi: mvm: check n_ssids before accessing the ssids (git-fixes).
- wifi: iwlwifi: mvm: do not read past the mfuart notifcation (git-fixes).
- wifi: iwlwifi: mvm: revert gen2 TX A-MPDU size to 64 (git-fixes).
- wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() (git-fixes).
- wifi: mac80211: correctly parse Spatial Reuse Parameter Set element (git-fixes).
- wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects (git-fixes).
- wifi: rtl8xxxu: Fix the TX power of RTL8192CU, RTL8723AU (stable-fixes).
- wifi: rtlwifi: rtl8192de: Fix endianness issue in RX path (stable-fixes).
- wifi: rtlwifi: rtl8192de: Fix low speed with WPA3-SAE (stable-fixes).
- x86/mce: Dynamically size space for machine check records (bsc#1222241).
- x86/tsc: Trust initial offset in architectural TSC-adjust MSRs (bsc#1222015 bsc#1226962).
- xfs: make sure sb_fdblocks is non-negative (bsc#1225419).
- xhci: Fix failure to detect ring expansion need (git-fixes).
- xhci: Fix transfer ring expansion size calculation (git-fixes).
- xhci: Handle TD clearing for multiple streams case (git-fixes).
- xhci: Simplify event ring dequeue pointer update for port change events (git-fixes).
- xhci: Stop unnecessary tracking of free trbs in a ring (git-fixes).
- xhci: fix matching completion events with TDs (git-fixes).
- xhci: remove unused stream_id parameter from xhci_handle_halted_endpoint() (git-fixes).
- xhci: restre deleted trb fields for tracing (git-fixes).
- xhci: retry Stop Endpoint on buggy NEC controllers (git-fixes).
- xhci: simplify event ring dequeue tracking for transfer events (git-fixes).
- xhci: update event ring dequeue pointer position to controller correctly (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-10"/>
	<updated date="2024-07-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190336">SUSE bug 1190336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193883">SUSE bug 1193883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194826">SUSE bug 1194826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195065">SUSE bug 1195065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195341">SUSE bug 1195341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195349">SUSE bug 1195349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195775">SUSE bug 1195775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196746">SUSE bug 1196746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197915">SUSE bug 1197915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198014">SUSE bug 1198014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199295">SUSE bug 1199295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202767">SUSE bug 1202767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202780">SUSE bug 1202780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205205">SUSE bug 1205205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207361">SUSE bug 1207361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217912">SUSE bug 1217912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218148">SUSE bug 1218148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218570">SUSE bug 1218570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218820">SUSE bug 1218820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219224">SUSE bug 1219224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219633">SUSE bug 1219633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219847">SUSE bug 1219847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220368">SUSE bug 1220368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220812">SUSE bug 1220812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220958">SUSE bug 1220958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221086">SUSE bug 1221086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221282">SUSE bug 1221282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221958">SUSE bug 1221958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222015">SUSE bug 1222015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222072">SUSE bug 1222072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222080">SUSE bug 1222080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222241">SUSE bug 1222241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222254">SUSE bug 1222254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222364">SUSE bug 1222364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222893">SUSE bug 1222893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223013">SUSE bug 1223013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223018">SUSE bug 1223018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223265">SUSE bug 1223265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223384">SUSE bug 1223384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223641">SUSE bug 1223641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224020">SUSE bug 1224020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224331">SUSE bug 1224331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224488">SUSE bug 1224488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224497">SUSE bug 1224497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224498">SUSE bug 1224498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224504">SUSE bug 1224504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224520">SUSE bug 1224520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224539">SUSE bug 1224539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224540">SUSE bug 1224540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224552">SUSE bug 1224552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224583">SUSE bug 1224583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224588">SUSE bug 1224588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224602">SUSE bug 1224602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224603">SUSE bug 1224603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224605">SUSE bug 1224605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224612">SUSE bug 1224612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224614">SUSE bug 1224614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224619">SUSE bug 1224619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224661">SUSE bug 1224661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224662">SUSE bug 1224662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224670">SUSE bug 1224670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224671">SUSE bug 1224671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224674">SUSE bug 1224674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224677">SUSE bug 1224677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224679">SUSE bug 1224679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224696">SUSE bug 1224696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224703">SUSE bug 1224703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224712">SUSE bug 1224712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224716">SUSE bug 1224716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224719">SUSE bug 1224719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224735">SUSE bug 1224735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224749">SUSE bug 1224749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224764">SUSE bug 1224764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224765">SUSE bug 1224765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224766">SUSE bug 1224766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224935">SUSE bug 1224935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224946">SUSE bug 1224946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224951">SUSE bug 1224951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225050">SUSE bug 1225050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225098">SUSE bug 1225098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225105">SUSE bug 1225105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225300">SUSE bug 1225300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225389">SUSE bug 1225389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225391">SUSE bug 1225391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225419">SUSE bug 1225419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225426">SUSE bug 1225426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225448">SUSE bug 1225448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225452">SUSE bug 1225452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225467">SUSE bug 1225467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225475">SUSE bug 1225475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225484">SUSE bug 1225484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225487">SUSE bug 1225487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225514">SUSE bug 1225514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225518">SUSE bug 1225518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225535">SUSE bug 1225535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225585">SUSE bug 1225585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225602">SUSE bug 1225602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225611">SUSE bug 1225611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225681">SUSE bug 1225681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225692">SUSE bug 1225692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225698">SUSE bug 1225698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225699">SUSE bug 1225699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225704">SUSE bug 1225704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225714">SUSE bug 1225714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225726">SUSE bug 1225726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225732">SUSE bug 1225732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225737">SUSE bug 1225737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225749">SUSE bug 1225749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225758">SUSE bug 1225758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225759">SUSE bug 1225759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225760">SUSE bug 1225760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225767">SUSE bug 1225767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225770">SUSE bug 1225770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225823">SUSE bug 1225823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225834">SUSE bug 1225834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225840">SUSE bug 1225840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225866">SUSE bug 1225866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225872">SUSE bug 1225872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225894">SUSE bug 1225894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226022">SUSE bug 1226022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226131">SUSE bug 1226131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226145">SUSE bug 1226145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226149">SUSE bug 1226149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226155">SUSE bug 1226155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226211">SUSE bug 1226211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226212">SUSE bug 1226212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226226">SUSE bug 1226226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226514">SUSE bug 1226514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226520">SUSE bug 1226520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226537">SUSE bug 1226537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226538">SUSE bug 1226538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226539">SUSE bug 1226539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226550">SUSE bug 1226550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226552">SUSE bug 1226552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226553">SUSE bug 1226553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226554">SUSE bug 1226554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226556">SUSE bug 1226556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226557">SUSE bug 1226557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226558">SUSE bug 1226558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226559">SUSE bug 1226559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226561">SUSE bug 1226561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226562">SUSE bug 1226562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226563">SUSE bug 1226563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226564">SUSE bug 1226564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226566">SUSE bug 1226566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226567">SUSE bug 1226567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226569">SUSE bug 1226569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226572">SUSE bug 1226572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226575">SUSE bug 1226575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226576">SUSE bug 1226576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226577">SUSE bug 1226577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226579">SUSE bug 1226579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226580">SUSE bug 1226580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226581">SUSE bug 1226581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226582">SUSE bug 1226582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226583">SUSE bug 1226583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226585">SUSE bug 1226585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226587">SUSE bug 1226587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226588">SUSE bug 1226588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226593">SUSE bug 1226593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226595">SUSE bug 1226595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226597">SUSE bug 1226597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226601">SUSE bug 1226601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226602">SUSE bug 1226602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226603">SUSE bug 1226603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226607">SUSE bug 1226607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226610">SUSE bug 1226610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226614">SUSE bug 1226614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226616">SUSE bug 1226616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226617">SUSE bug 1226617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226618">SUSE bug 1226618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226619">SUSE bug 1226619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226621">SUSE bug 1226621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226622">SUSE bug 1226622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226624">SUSE bug 1226624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226626">SUSE bug 1226626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226628">SUSE bug 1226628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226629">SUSE bug 1226629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226632">SUSE bug 1226632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226633">SUSE bug 1226633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226634">SUSE bug 1226634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226637">SUSE bug 1226637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226643">SUSE bug 1226643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226644">SUSE bug 1226644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226645">SUSE bug 1226645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226647">SUSE bug 1226647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226650">SUSE bug 1226650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226653">SUSE bug 1226653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226657">SUSE bug 1226657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226658">SUSE bug 1226658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226669">SUSE bug 1226669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226670">SUSE bug 1226670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226672">SUSE bug 1226672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226673">SUSE bug 1226673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226674">SUSE bug 1226674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226675">SUSE bug 1226675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226678">SUSE bug 1226678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226679">SUSE bug 1226679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226683">SUSE bug 1226683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226685">SUSE bug 1226685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226686">SUSE bug 1226686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226690">SUSE bug 1226690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226691">SUSE bug 1226691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226692">SUSE bug 1226692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226693">SUSE bug 1226693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226696">SUSE bug 1226696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226697">SUSE bug 1226697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226698">SUSE bug 1226698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226699">SUSE bug 1226699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226701">SUSE bug 1226701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226702">SUSE bug 1226702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226703">SUSE bug 1226703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226704">SUSE bug 1226704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226705">SUSE bug 1226705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226706">SUSE bug 1226706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226708">SUSE bug 1226708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226709">SUSE bug 1226709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226710">SUSE bug 1226710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226711">SUSE bug 1226711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226712">SUSE bug 1226712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226713">SUSE bug 1226713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226715">SUSE bug 1226715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226716">SUSE bug 1226716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226718">SUSE bug 1226718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226719">SUSE bug 1226719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226720">SUSE bug 1226720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226721">SUSE bug 1226721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226730">SUSE bug 1226730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226732">SUSE bug 1226732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226734">SUSE bug 1226734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226735">SUSE bug 1226735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226737">SUSE bug 1226737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226738">SUSE bug 1226738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226739">SUSE bug 1226739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226740">SUSE bug 1226740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226744">SUSE bug 1226744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226746">SUSE bug 1226746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226747">SUSE bug 1226747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226749">SUSE bug 1226749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226754">SUSE bug 1226754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226762">SUSE bug 1226762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226764">SUSE bug 1226764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226767">SUSE bug 1226767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226768">SUSE bug 1226768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226769">SUSE bug 1226769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226771">SUSE bug 1226771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226774">SUSE bug 1226774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226777">SUSE bug 1226777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226780">SUSE bug 1226780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226781">SUSE bug 1226781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226785">SUSE bug 1226785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226786">SUSE bug 1226786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226789">SUSE bug 1226789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226791">SUSE bug 1226791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226839">SUSE bug 1226839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226840">SUSE bug 1226840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226841">SUSE bug 1226841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226842">SUSE bug 1226842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226848">SUSE bug 1226848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226852">SUSE bug 1226852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226857">SUSE bug 1226857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226861">SUSE bug 1226861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226863">SUSE bug 1226863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226864">SUSE bug 1226864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226867">SUSE bug 1226867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226868">SUSE bug 1226868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226876">SUSE bug 1226876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226878">SUSE bug 1226878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226883">SUSE bug 1226883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226886">SUSE bug 1226886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226890">SUSE bug 1226890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226891">SUSE bug 1226891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226895">SUSE bug 1226895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226908">SUSE bug 1226908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226915">SUSE bug 1226915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226928">SUSE bug 1226928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226948">SUSE bug 1226948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226949">SUSE bug 1226949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226950">SUSE bug 1226950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226953">SUSE bug 1226953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226962">SUSE bug 1226962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226976">SUSE bug 1226976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226992">SUSE bug 1226992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226994">SUSE bug 1226994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226996">SUSE bug 1226996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227066">SUSE bug 1227066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227096">SUSE bug 1227096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227101">SUSE bug 1227101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227103">SUSE bug 1227103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227274">SUSE bug 1227274</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-4439/">CVE-2021-4439 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4439">CVE-2021-4439 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47089/">CVE-2021-47089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47089">CVE-2021-47089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47432/">CVE-2021-47432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47432">CVE-2021-47432 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47515/">CVE-2021-47515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47515">CVE-2021-47515 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47534/">CVE-2021-47534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47534">CVE-2021-47534 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47538/">CVE-2021-47538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47538">CVE-2021-47538 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47539/">CVE-2021-47539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47539">CVE-2021-47539 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47555/">CVE-2021-47555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47555">CVE-2021-47555 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47566/">CVE-2021-47566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47566">CVE-2021-47566 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47571/">CVE-2021-47571 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47571">CVE-2021-47571 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47572/">CVE-2021-47572 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47572">CVE-2021-47572 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47576/">CVE-2021-47576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47576">CVE-2021-47576 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47577/">CVE-2021-47577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47577">CVE-2021-47577 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47578/">CVE-2021-47578 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47578">CVE-2021-47578 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47580/">CVE-2021-47580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47580">CVE-2021-47580 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47582/">CVE-2021-47582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47582">CVE-2021-47582 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47583/">CVE-2021-47583 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47583">CVE-2021-47583 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47584/">CVE-2021-47584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47584">CVE-2021-47584 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47585/">CVE-2021-47585 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47585">CVE-2021-47585 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47586/">CVE-2021-47586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47586">CVE-2021-47586 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47587/">CVE-2021-47587 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47587">CVE-2021-47587 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47589/">CVE-2021-47589 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47589">CVE-2021-47589 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47592/">CVE-2021-47592 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47592">CVE-2021-47592 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47595/">CVE-2021-47595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47595">CVE-2021-47595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47596/">CVE-2021-47596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47596">CVE-2021-47596 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47597/">CVE-2021-47597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47597">CVE-2021-47597 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47600/">CVE-2021-47600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47600">CVE-2021-47600 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47601/">CVE-2021-47601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47601">CVE-2021-47601 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47602/">CVE-2021-47602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47602">CVE-2021-47602 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47603/">CVE-2021-47603 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47603">CVE-2021-47603 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47604/">CVE-2021-47604 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47604">CVE-2021-47604 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47605/">CVE-2021-47605 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47605">CVE-2021-47605 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47607/">CVE-2021-47607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47607">CVE-2021-47607 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47608/">CVE-2021-47608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47608">CVE-2021-47608 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47609/">CVE-2021-47609 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47609">CVE-2021-47609 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47610/">CVE-2021-47610 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47610">CVE-2021-47610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47611/">CVE-2021-47611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47611">CVE-2021-47611 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47612/">CVE-2021-47612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47612">CVE-2021-47612 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47614/">CVE-2021-47614 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47614">CVE-2021-47614 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47615/">CVE-2021-47615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47615">CVE-2021-47615 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47616/">CVE-2021-47616 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47616">CVE-2021-47616 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47617/">CVE-2021-47617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47617">CVE-2021-47617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47618/">CVE-2021-47618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47618">CVE-2021-47618 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47619/">CVE-2021-47619 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47619">CVE-2021-47619 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47620/">CVE-2021-47620 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47620">CVE-2021-47620 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48711/">CVE-2022-48711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48711">CVE-2022-48711 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48712/">CVE-2022-48712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48712">CVE-2022-48712 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48713/">CVE-2022-48713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48713">CVE-2022-48713 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48714/">CVE-2022-48714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48714">CVE-2022-48714 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48715/">CVE-2022-48715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48715">CVE-2022-48715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48716/">CVE-2022-48716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48716">CVE-2022-48716 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48717/">CVE-2022-48717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48717">CVE-2022-48717 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48718/">CVE-2022-48718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48718">CVE-2022-48718 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48720/">CVE-2022-48720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48720">CVE-2022-48720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48721/">CVE-2022-48721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48721">CVE-2022-48721 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48722/">CVE-2022-48722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48722">CVE-2022-48722 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48723/">CVE-2022-48723 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48723">CVE-2022-48723 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48724/">CVE-2022-48724 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48724">CVE-2022-48724 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48725/">CVE-2022-48725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48725">CVE-2022-48725 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48726/">CVE-2022-48726 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48726">CVE-2022-48726 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48727/">CVE-2022-48727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48727">CVE-2022-48727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48728/">CVE-2022-48728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48728">CVE-2022-48728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48729/">CVE-2022-48729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48729">CVE-2022-48729 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48730/">CVE-2022-48730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48730">CVE-2022-48730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48732/">CVE-2022-48732 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48732">CVE-2022-48732 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48733/">CVE-2022-48733 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48733">CVE-2022-48733 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48734/">CVE-2022-48734 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48734">CVE-2022-48734 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48735/">CVE-2022-48735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48735">CVE-2022-48735 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48736/">CVE-2022-48736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48736">CVE-2022-48736 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48737/">CVE-2022-48737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48737">CVE-2022-48737 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48738/">CVE-2022-48738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48738">CVE-2022-48738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48739/">CVE-2022-48739 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48739">CVE-2022-48739 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48740/">CVE-2022-48740 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48740">CVE-2022-48740 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48743/">CVE-2022-48743 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48743">CVE-2022-48743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48744/">CVE-2022-48744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48744">CVE-2022-48744 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48745/">CVE-2022-48745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48745">CVE-2022-48745 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48746/">CVE-2022-48746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48746">CVE-2022-48746 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48747/">CVE-2022-48747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48747">CVE-2022-48747 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48748/">CVE-2022-48748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48748">CVE-2022-48748 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48749/">CVE-2022-48749 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48749">CVE-2022-48749 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48751/">CVE-2022-48751 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48751">CVE-2022-48751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48752/">CVE-2022-48752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48752">CVE-2022-48752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48753/">CVE-2022-48753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48753">CVE-2022-48753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48754/">CVE-2022-48754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48754">CVE-2022-48754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48755/">CVE-2022-48755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48755">CVE-2022-48755 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48756/">CVE-2022-48756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48756">CVE-2022-48756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48758/">CVE-2022-48758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48758">CVE-2022-48758 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48759/">CVE-2022-48759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48759">CVE-2022-48759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48760/">CVE-2022-48760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48760">CVE-2022-48760 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48761/">CVE-2022-48761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48761">CVE-2022-48761 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48763/">CVE-2022-48763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48763">CVE-2022-48763 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48765/">CVE-2022-48765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48765">CVE-2022-48765 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48766/">CVE-2022-48766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48766">CVE-2022-48766 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48767/">CVE-2022-48767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48767">CVE-2022-48767 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48768/">CVE-2022-48768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48768">CVE-2022-48768 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48769/">CVE-2022-48769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48769">CVE-2022-48769 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48770/">CVE-2022-48770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48770">CVE-2022-48770 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48771/">CVE-2022-48771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48771">CVE-2022-48771 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48772/">CVE-2022-48772 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48772">CVE-2022-48772 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-24023/">CVE-2023-24023 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24023">CVE-2023-24023 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52622/">CVE-2023-52622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52622">CVE-2023-52622 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52658/">CVE-2023-52658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52658">CVE-2023-52658 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52667/">CVE-2023-52667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52667">CVE-2023-52667 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52670/">CVE-2023-52670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52670">CVE-2023-52670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52672/">CVE-2023-52672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52672">CVE-2023-52672 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52675/">CVE-2023-52675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52675">CVE-2023-52675 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52735/">CVE-2023-52735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52735">CVE-2023-52735 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52737/">CVE-2023-52737 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52737">CVE-2023-52737 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52752/">CVE-2023-52752 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52752">CVE-2023-52752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52766/">CVE-2023-52766 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52766">CVE-2023-52766 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52784/">CVE-2023-52784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52784">CVE-2023-52784 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52787/">CVE-2023-52787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52787">CVE-2023-52787 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52800/">CVE-2023-52800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52800">CVE-2023-52800 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52835/">CVE-2023-52835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52835">CVE-2023-52835 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52837/">CVE-2023-52837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52837">CVE-2023-52837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52843/">CVE-2023-52843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52843">CVE-2023-52843 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52845/">CVE-2023-52845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52845">CVE-2023-52845 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52846/">CVE-2023-52846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52846">CVE-2023-52846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52869/">CVE-2023-52869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52869">CVE-2023-52869 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52881/">CVE-2023-52881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52881">CVE-2023-52881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52882/">CVE-2023-52882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52882">CVE-2023-52882 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52884/">CVE-2023-52884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52884">CVE-2023-52884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26625/">CVE-2024-26625 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26625">CVE-2024-26625 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26644/">CVE-2024-26644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26644">CVE-2024-26644 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-26720/">CVE-2024-26720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26720">CVE-2024-26720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26842/">CVE-2024-26842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26842">CVE-2024-26842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26845/">CVE-2024-26845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26845">CVE-2024-26845 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26923/">CVE-2024-26923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26923">CVE-2024-26923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26973/">CVE-2024-26973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26973">CVE-2024-26973 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27432/">CVE-2024-27432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27432">CVE-2024-27432 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33619/">CVE-2024-33619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33619">CVE-2024-33619 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35247/">CVE-2024-35247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35247">CVE-2024-35247 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35789/">CVE-2024-35789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35789">CVE-2024-35789 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35790/">CVE-2024-35790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35790">CVE-2024-35790 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35807/">CVE-2024-35807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35807">CVE-2024-35807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35814/">CVE-2024-35814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35814">CVE-2024-35814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35835/">CVE-2024-35835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35835">CVE-2024-35835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35848/">CVE-2024-35848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35848">CVE-2024-35848 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35857/">CVE-2024-35857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35857">CVE-2024-35857 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35861/">CVE-2024-35861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35861">CVE-2024-35861 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35862/">CVE-2024-35862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35862">CVE-2024-35862 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35864/">CVE-2024-35864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35864">CVE-2024-35864 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35869/">CVE-2024-35869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35869">CVE-2024-35869 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35878/">CVE-2024-35878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35878">CVE-2024-35878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35884/">CVE-2024-35884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35884">CVE-2024-35884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35886/">CVE-2024-35886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35886">CVE-2024-35886 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35896/">CVE-2024-35896 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35896">CVE-2024-35896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35898/">CVE-2024-35898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35898">CVE-2024-35898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35900/">CVE-2024-35900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35900">CVE-2024-35900 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35905/">CVE-2024-35905 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35905">CVE-2024-35905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35925/">CVE-2024-35925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35925">CVE-2024-35925 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35950/">CVE-2024-35950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35950">CVE-2024-35950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35956/">CVE-2024-35956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35956">CVE-2024-35956 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35958/">CVE-2024-35958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35958">CVE-2024-35958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35960/">CVE-2024-35960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35960">CVE-2024-35960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35962/">CVE-2024-35962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35962">CVE-2024-35962 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35997/">CVE-2024-35997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35997">CVE-2024-35997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36005/">CVE-2024-36005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36005">CVE-2024-36005 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36008/">CVE-2024-36008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36008">CVE-2024-36008 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36017/">CVE-2024-36017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36017">CVE-2024-36017 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36020/">CVE-2024-36020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36020">CVE-2024-36020 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36021/">CVE-2024-36021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36021">CVE-2024-36021 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36025/">CVE-2024-36025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36025">CVE-2024-36025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-36477/">CVE-2024-36477 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36477">CVE-2024-36477 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36478/">CVE-2024-36478 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36478">CVE-2024-36478 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36479/">CVE-2024-36479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36479">CVE-2024-36479 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36890/">CVE-2024-36890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36890">CVE-2024-36890 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36894/">CVE-2024-36894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36894">CVE-2024-36894 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36899/">CVE-2024-36899 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36899">CVE-2024-36899 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36900/">CVE-2024-36900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36900">CVE-2024-36900 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36904/">CVE-2024-36904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36904">CVE-2024-36904 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36915/">CVE-2024-36915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36915">CVE-2024-36915 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-36916/">CVE-2024-36916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36916">CVE-2024-36916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36917/">CVE-2024-36917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36917">CVE-2024-36917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36919/">CVE-2024-36919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36919">CVE-2024-36919 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36934/">CVE-2024-36934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36934">CVE-2024-36934 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36937/">CVE-2024-36937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36937">CVE-2024-36937 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36940/">CVE-2024-36940 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36940">CVE-2024-36940 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36945/">CVE-2024-36945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36945">CVE-2024-36945 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36949/">CVE-2024-36949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36949">CVE-2024-36949 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36960/">CVE-2024-36960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36960">CVE-2024-36960 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36964/">CVE-2024-36964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36964">CVE-2024-36964 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-36965/">CVE-2024-36965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36965">CVE-2024-36965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36967/">CVE-2024-36967 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36967">CVE-2024-36967 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36969/">CVE-2024-36969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36969">CVE-2024-36969 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36971/">CVE-2024-36971 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36971">CVE-2024-36971 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36975/">CVE-2024-36975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36975">CVE-2024-36975 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36978/">CVE-2024-36978 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36978">CVE-2024-36978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37021/">CVE-2024-37021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37021">CVE-2024-37021 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-37078/">CVE-2024-37078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37078">CVE-2024-37078 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-37354/">CVE-2024-37354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37354">CVE-2024-37354 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38381/">CVE-2024-38381 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38381">CVE-2024-38381 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38388/">CVE-2024-38388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38388">CVE-2024-38388 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38390/">CVE-2024-38390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38390">CVE-2024-38390 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38540/">CVE-2024-38540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38540">CVE-2024-38540 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38541/">CVE-2024-38541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38541">CVE-2024-38541 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38544/">CVE-2024-38544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38544">CVE-2024-38544 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38545/">CVE-2024-38545 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38545">CVE-2024-38545 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38546/">CVE-2024-38546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38546">CVE-2024-38546 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38547/">CVE-2024-38547 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38547">CVE-2024-38547 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38548/">CVE-2024-38548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38548">CVE-2024-38548 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38549/">CVE-2024-38549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38549">CVE-2024-38549 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38550/">CVE-2024-38550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38550">CVE-2024-38550 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38552/">CVE-2024-38552 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38552">CVE-2024-38552 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38553/">CVE-2024-38553 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38553">CVE-2024-38553 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38555/">CVE-2024-38555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38555">CVE-2024-38555 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38556/">CVE-2024-38556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38556">CVE-2024-38556 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38557/">CVE-2024-38557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38557">CVE-2024-38557 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38559/">CVE-2024-38559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38559">CVE-2024-38559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38560/">CVE-2024-38560 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38560">CVE-2024-38560 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38564/">CVE-2024-38564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38564">CVE-2024-38564 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38565/">CVE-2024-38565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38565">CVE-2024-38565 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38567/">CVE-2024-38567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38567">CVE-2024-38567 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-38568/">CVE-2024-38568 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38568">CVE-2024-38568 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38571/">CVE-2024-38571 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38571">CVE-2024-38571 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38573/">CVE-2024-38573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38573">CVE-2024-38573 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38578/">CVE-2024-38578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38578">CVE-2024-38578 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38579/">CVE-2024-38579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38579">CVE-2024-38579 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38580/">CVE-2024-38580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38580">CVE-2024-38580 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38581/">CVE-2024-38581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38581">CVE-2024-38581 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38582/">CVE-2024-38582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38582">CVE-2024-38582 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38583/">CVE-2024-38583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38583">CVE-2024-38583 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-38587/">CVE-2024-38587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38587">CVE-2024-38587 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38590/">CVE-2024-38590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38590">CVE-2024-38590 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38591/">CVE-2024-38591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38591">CVE-2024-38591 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38594/">CVE-2024-38594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38594">CVE-2024-38594 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38597/">CVE-2024-38597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38597">CVE-2024-38597 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38599/">CVE-2024-38599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38599">CVE-2024-38599 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38600/">CVE-2024-38600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38600">CVE-2024-38600 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38601/">CVE-2024-38601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38601">CVE-2024-38601 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38603/">CVE-2024-38603 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38603">CVE-2024-38603 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38605/">CVE-2024-38605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38605">CVE-2024-38605 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38608/">CVE-2024-38608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38608">CVE-2024-38608 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38616/">CVE-2024-38616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38616">CVE-2024-38616 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38618/">CVE-2024-38618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38618">CVE-2024-38618 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38619/">CVE-2024-38619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38619">CVE-2024-38619 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38621/">CVE-2024-38621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38621">CVE-2024-38621 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38627/">CVE-2024-38627 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38627">CVE-2024-38627 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38630/">CVE-2024-38630 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38630">CVE-2024-38630 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38633/">CVE-2024-38633 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38633">CVE-2024-38633 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38634/">CVE-2024-38634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38634">CVE-2024-38634 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38635/">CVE-2024-38635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38635">CVE-2024-38635 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38659/">CVE-2024-38659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38659">CVE-2024-38659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38661/">CVE-2024-38661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38661">CVE-2024-38661 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38780/">CVE-2024-38780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38780">CVE-2024-38780 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39301/">CVE-2024-39301 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39301">CVE-2024-39301 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39468/">CVE-2024-39468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39468">CVE-2024-39468 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39469/">CVE-2024-39469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39469">CVE-2024-39469 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39471/">CVE-2024-39471 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39471">CVE-2024-39471 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872345" comment="cluster-md-kmp-rt-5.14.21-150500.13.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872346" comment="dlm-kmp-rt-5.14.21-150500.13.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872347" comment="gfs2-kmp-rt-5.14.21-150500.13.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872348" comment="kernel-devel-rt-5.14.21-150500.13.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872349" comment="kernel-rt-5.14.21-150500.13.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872350" comment="kernel-rt-devel-5.14.21-150500.13.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872351" comment="kernel-rt-extra-5.14.21-150500.13.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872352" comment="kernel-rt-livepatch-5.14.21-150500.13.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872353" comment="kernel-rt-livepatch-devel-5.14.21-150500.13.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872354" comment="kernel-rt-optional-5.14.21-150500.13.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872355" comment="kernel-rt-vdso-5.14.21-150500.13.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872356" comment="kernel-rt_debug-5.14.21-150500.13.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872357" comment="kernel-rt_debug-devel-5.14.21-150500.13.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872358" comment="kernel-rt_debug-livepatch-devel-5.14.21-150500.13.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872359" comment="kernel-rt_debug-vdso-5.14.21-150500.13.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872360" comment="kernel-source-rt-5.14.21-150500.13.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872361" comment="kernel-syms-rt-5.14.21-150500.13.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872362" comment="kselftests-kmp-rt-5.14.21-150500.13.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872363" comment="ocfs2-kmp-rt-5.14.21-150500.13.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872364" comment="reiserfs-kmp-rt-5.14.21-150500.13.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4841" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1225278" ref_url="https://bugzilla.suse.com/1225278" source="BUGZILLA"/>
		<reference ref_id="1226316" ref_url="https://bugzilla.suse.com/1226316" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-5688" ref_url="https://www.suse.com/security/cve/CVE-2024-5688/" source="CVE"/>
		<reference ref_id="CVE-2024-5690" ref_url="https://www.suse.com/security/cve/CVE-2024-5690/" source="CVE"/>
		<reference ref_id="CVE-2024-5691" ref_url="https://www.suse.com/security/cve/CVE-2024-5691/" source="CVE"/>
		<reference ref_id="CVE-2024-5692" ref_url="https://www.suse.com/security/cve/CVE-2024-5692/" source="CVE"/>
		<reference ref_id="CVE-2024-5693" ref_url="https://www.suse.com/security/cve/CVE-2024-5693/" source="CVE"/>
		<reference ref_id="CVE-2024-5696" ref_url="https://www.suse.com/security/cve/CVE-2024-5696/" source="CVE"/>
		<reference ref_id="CVE-2024-5700" ref_url="https://www.suse.com/security/cve/CVE-2024-5700/" source="CVE"/>
		<reference ref_id="CVE-2024-5702" ref_url="https://www.suse.com/security/cve/CVE-2024-5702/" source="CVE"/>
		<reference ref_id="CVE-2024-6600" ref_url="https://www.suse.com/security/cve/CVE-2024-6600/" source="CVE"/>
		<reference ref_id="CVE-2024-6601" ref_url="https://www.suse.com/security/cve/CVE-2024-6601/" source="CVE"/>
		<reference ref_id="CVE-2024-6602" ref_url="https://www.suse.com/security/cve/CVE-2024-6602/" source="CVE"/>
		<reference ref_id="CVE-2024-6603" ref_url="https://www.suse.com/security/cve/CVE-2024-6603/" source="CVE"/>
		<reference ref_id="CVE-2024-6604" ref_url="https://www.suse.com/security/cve/CVE-2024-6604/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2399-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035931.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 115.13.0 ESR (MFSA 2024-30, bsc#1226316):

- CVE-2024-6600: Memory corruption in WebGL API
- CVE-2024-6601: Race condition in permission assignment
- CVE-2024-6602: Memory corruption in NSS
- CVE-2024-6603: Memory corruption in thread creation
- CVE-2024-6604: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13

Other fixes:

- Fix GNOME search provider (bsc#1225278)  
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1225278">SUSE bug 1225278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226316">SUSE bug 1226316</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5688/">CVE-2024-5688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5688">CVE-2024-5688 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5690/">CVE-2024-5690 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5690">CVE-2024-5690 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5691/">CVE-2024-5691 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5691">CVE-2024-5691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5692/">CVE-2024-5692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5692">CVE-2024-5692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5693/">CVE-2024-5693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5693">CVE-2024-5693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5696/">CVE-2024-5696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5696">CVE-2024-5696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5700/">CVE-2024-5700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5700">CVE-2024-5700 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5702/">CVE-2024-5702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5702">CVE-2024-5702 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6600/">CVE-2024-6600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6600">CVE-2024-6600 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-6601/">CVE-2024-6601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6601">CVE-2024-6601 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6602/">CVE-2024-6602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6602">CVE-2024-6602 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6603/">CVE-2024-6603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6603">CVE-2024-6603 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6604/">CVE-2024-6604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6604">CVE-2024-6604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872591" comment="MozillaFirefox-115.13.0-150200.152.143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872592" comment="MozillaFirefox-branding-upstream-115.13.0-150200.152.143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872593" comment="MozillaFirefox-devel-115.13.0-150200.152.143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872594" comment="MozillaFirefox-translations-common-115.13.0-150200.152.143.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872595" comment="MozillaFirefox-translations-other-115.13.0-150200.152.143.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4842" version="1" class="patch">
	<metadata>
		<title>Security update for python-zipp (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227547" ref_url="https://bugzilla.suse.com/1227547" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-5569" ref_url="https://www.suse.com/security/cve/CVE-2024-5569/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2400-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035930.html" source="SUSE-SU"/>
		<description>
This update for python-zipp fixes the following issues:

- CVE-2024-5569: Fixed DoS vulnerability when processing a specially crafted zip file (bsc#1227547).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-07-11"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1227547">SUSE bug 1227547</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-5569/">CVE-2024-5569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5569">CVE-2024-5569 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872596" comment="python311-zipp-3.15.0-150400.10.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4843" version="1" class="patch">
	<metadata>
		<title>Security update for oniguruma (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1141157" ref_url="https://bugzilla.suse.com/1141157" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13225" ref_url="https://www.suse.com/security/cve/CVE-2019-13225/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2401-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035929.html" source="SUSE-SU"/>
		<description>
This update for oniguruma fixes the following issues:

- CVE-2019-13225: Fixed null-pointer dereference in match_at() in regexec.c (bsc#1141157).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-07-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141157">SUSE bug 1141157</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13225/">CVE-2019-13225 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-13225">CVE-2019-13225 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872597" comment="libonig4-6.7.0-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872598" comment="oniguruma-devel-6.7.0-150000.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4844" version="1" class="patch">
	<metadata>
		<title>Security update for libvpx (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216879" ref_url="https://bugzilla.suse.com/1216879" source="BUGZILLA"/>
		<reference ref_id="1225403" ref_url="https://bugzilla.suse.com/1225403" source="BUGZILLA"/>
		<reference ref_id="1225879" ref_url="https://bugzilla.suse.com/1225879" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-44488" ref_url="https://www.suse.com/security/cve/CVE-2023-44488/" source="CVE"/>
		<reference ref_id="CVE-2023-6349" ref_url="https://www.suse.com/security/cve/CVE-2023-6349/" source="CVE"/>
		<reference ref_id="CVE-2024-5197" ref_url="https://www.suse.com/security/cve/CVE-2024-5197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2409-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035913.html" source="SUSE-SU"/>
		<description>
This update for libvpx fixes the following issues:

- CVE-2024-5197: Fixed interger overflow when calling vpx_img_alloc() or vpx_img_wrap() with large parameters (bsc#1225879).
- CVE-2023-6349: Fixed heap overflow when encoding a frame that has larger dimensions than the originally configured size (bsc#1225403).
- CVE-2023-44488: Fixed heap buffer overflow in vp8 encoding (bsc#1216879).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216879">SUSE bug 1216879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225403">SUSE bug 1225403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225879">SUSE bug 1225879</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44488/">CVE-2023-44488 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44488">CVE-2023-44488 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6349/">CVE-2023-6349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6349">CVE-2023-6349 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-5197/">CVE-2024-5197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5197">CVE-2024-5197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872599" comment="libvpx-devel-1.11.0-150400.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872600" comment="libvpx7-1.11.0-150400.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872601" comment="libvpx7-32bit-1.11.0-150400.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872602" comment="vpx-tools-1.11.0-150400.3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4845" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218802" ref_url="https://bugzilla.suse.com/1218802" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-51257" ref_url="https://www.suse.com/security/cve/CVE-2023-51257/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017762.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2023-51257: Fixed an out of bounds write in the JPC encoder (bsc#1218802).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-26"/>
	<updated date="2024-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218802">SUSE bug 1218802</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-51257/">CVE-2023-51257 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51257">CVE-2023-51257 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844621" comment="jasper-2.0.14-150000.3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844622" comment="libjasper-devel-2.0.14-150000.3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844623" comment="libjasper4-2.0.14-150000.3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844624" comment="libjasper4-32bit-2.0.14-150000.3.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4846" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat10 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227399" ref_url="https://bugzilla.suse.com/1227399" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-34750" ref_url="https://www.suse.com/security/cve/CVE-2024-34750/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018931.html" source="SUSE-SU"/>
		<description>
This update for tomcat10 fixes the following issues:

- CVE-2024-34750: Fixed an improper handling of exceptional
  conditions (bsc#1227399).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2024-07-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1227399">SUSE bug 1227399</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34750/">CVE-2024-34750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34750">CVE-2024-34750 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872603" comment="tomcat10-10.1.25-150200.5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872604" comment="tomcat10-admin-webapps-10.1.25-150200.5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872605" comment="tomcat10-docs-webapp-10.1.25-150200.5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872606" comment="tomcat10-el-5_0-api-10.1.25-150200.5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872607" comment="tomcat10-embed-10.1.25-150200.5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872608" comment="tomcat10-jsp-3_1-api-10.1.25-150200.5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872609" comment="tomcat10-jsvc-10.1.25-150200.5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872610" comment="tomcat10-lib-10.1.25-150200.5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872611" comment="tomcat10-servlet-6_0-api-10.1.25-150200.5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872612" comment="tomcat10-webapps-10.1.25-150200.5.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4847" version="1" class="patch">
	<metadata>
		<title>Security update for python310 (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226448" ref_url="https://bugzilla.suse.com/1226448" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-4032" ref_url="https://www.suse.com/security/cve/CVE-2024-4032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2414-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035938.html" source="SUSE-SU"/>
		<description>
This update for python310 fixes the following issues:

- CVE-2024-4032: Rearranging definition of private v global IP. (bsc#1226448)
  		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1226448">SUSE bug 1226448</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4032/">CVE-2024-4032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4032">CVE-2024-4032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009872995" comment="libpython3_11-1_0-3.11.9-150400.9.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872996" comment="libpython3_11-1_0-32bit-3.11.9-150400.9.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872997" comment="python311-3.11.9-150400.9.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872998" comment="python311-32bit-3.11.9-150400.9.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009872999" comment="python311-base-3.11.9-150400.9.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873000" comment="python311-base-32bit-3.11.9-150400.9.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873001" comment="python311-curses-3.11.9-150400.9.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873002" comment="python311-dbm-3.11.9-150400.9.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873003" comment="python311-devel-3.11.9-150400.9.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873004" comment="python311-doc-3.11.9-150400.9.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873005" comment="python311-doc-devhelp-3.11.9-150400.9.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873006" comment="python311-idle-3.11.9-150400.9.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873007" comment="python311-testsuite-3.11.9-150400.9.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873008" comment="python311-tk-3.11.9-150400.9.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873009" comment="python311-tools-3.11.9-150400.9.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4848" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226495" ref_url="https://bugzilla.suse.com/1226495" source="BUGZILLA"/>
		<reference ref_id="1227239" ref_url="https://bugzilla.suse.com/1227239" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-34703" ref_url="https://www.suse.com/security/cve/CVE-2024-34703/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018939.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Security fixes:

- CVE-2024-34703: Fixed denial of service due to overly large elliptic curve parameters in Botan (bsc#1227239)
    
Other fixes:    
    
- Mozilla Thunderbird 115.12.1
  * 115.12.0 got pulled because of upstream automation process errors
    and Windows installer signing changes.
    No code changes, changelog is the same as 115.12.0 (bsc#1226495)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-12"/>
	<updated date="2024-07-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1226495">SUSE bug 1226495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227239">SUSE bug 1227239</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-34703/">CVE-2024-34703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34703">CVE-2024-34703 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009873010" comment="MozillaThunderbird-115.12.2-150200.8.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873011" comment="MozillaThunderbird-translations-common-115.12.2-150200.8.168.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873012" comment="MozillaThunderbird-translations-other-115.12.2-150200.8.168.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4849" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218955" ref_url="https://bugzilla.suse.com/1218955" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0741" ref_url="https://www.suse.com/security/cve/CVE-2024-0741/" source="CVE"/>
		<reference ref_id="CVE-2024-0742" ref_url="https://www.suse.com/security/cve/CVE-2024-0742/" source="CVE"/>
		<reference ref_id="CVE-2024-0746" ref_url="https://www.suse.com/security/cve/CVE-2024-0746/" source="CVE"/>
		<reference ref_id="CVE-2024-0747" ref_url="https://www.suse.com/security/cve/CVE-2024-0747/" source="CVE"/>
		<reference ref_id="CVE-2024-0749" ref_url="https://www.suse.com/security/cve/CVE-2024-0749/" source="CVE"/>
		<reference ref_id="CVE-2024-0750" ref_url="https://www.suse.com/security/cve/CVE-2024-0750/" source="CVE"/>
		<reference ref_id="CVE-2024-0751" ref_url="https://www.suse.com/security/cve/CVE-2024-0751/" source="CVE"/>
		<reference ref_id="CVE-2024-0753" ref_url="https://www.suse.com/security/cve/CVE-2024-0753/" source="CVE"/>
		<reference ref_id="CVE-2024-0755" ref_url="https://www.suse.com/security/cve/CVE-2024-0755/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017761.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Update to Mozilla Thunderbird 115.7 (MFSA 2024-04) (bsc#1218955):

  - CVE-2024-0741: Out of bounds write in ANGLE
  - CVE-2024-0742: Failure to update user input timestamp
  - CVE-2024-0746: Crash when listing printers on Linux
  - CVE-2024-0747: Bypass of Content Security Policy when directive unsafe-inline was set
  - CVE-2024-0749: Phishing site popup could show local origin in address bar
  - CVE-2024-0750: Potential permissions request bypass via clickjacking
  - CVE-2024-0751: Privilege escalation through devtools
  - CVE-2024-0753: HSTS policy on subdomain could bypass policy of upper domain
  - CVE-2024-0755: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7

Other fixes:

  * new: Autocrypt Gossip key distribution added (bmo#1853674)
  * fixed: When starting Thunderbird, unread message count did
    not appear on collapsed accounts (bmo#1862774)
  * fixed: Blank window was sometimes displayed when starting
    Thunderbird (bmo#1870817)
  * fixed: Thunderbird '--chrome' flag incorrectly opened extra
    messenger.xhtml (bmo#1866915)
  * fixed: Add-ons did not start correctly when opening
    Thunderbird from other programs (bmo#1800423)
  * fixed: Drag-and-drop installation of add-ons did not work if
    Add-ons Manager was opened from Unified Toolbar (bmo#1862978)
  * fixed: Double-clicking empty space in message pane
    incorrectly opened the currently selected message
    (bmo#1867407)
  * fixed: Canceling SMTP send before progress reached 100% did
    not stop message from sending (bmo#1816540)
  * fixed: PDF attachments open in a separate tab did not always
    restore correctly after restarting Thunderbird (bmo#1846054)
  * fixed: Some OpenPGP dialogs were too small for their contents
    (bmo#1870809)
  * fixed: Account Manager did not work with hostnames entered as
    punycode (bmo#1870720,bmo#1872632)
  * fixed: Downloading complete message from POP3 headers caused
    message tab/window to close when 'Close message window/tab on
    move or delete' was enabled (bmo#1861886)
  * fixed: Some ECC GPG keys could not be exported (bmo#1867765)
  * fixed: Contacts deleted from mailing list view still visible
    in Details view (bmo#1799362)
  * fixed: After selecting contacts in Address Book and starting
    a new search, the search results list did not update
    (bmo#1812726)
  * fixed: Various UX and visual improvements (bmo#1866061,bmo#18
    67169,bmo#1867728,bmo#1868079,bmo#1869519,bmo#1832149,bmo#185
    6495,bmo#1861210,bmo#1861286,bmo#1863296,bmo#1864979)
  * fixed: Security fixes

- Mozilla Thunderbird 115.6.1
  * new: OAuth2 now supported for comcast.net (bmo#1844810)
  * fixed: High CPU usage sometimes occurred with IMAP CONDSTORE
    (conditional STORE) enabled (bmo#1839256)
  * fixed: Replying to a collapsed thread via keyboard shortcut
    (Ctrl+R/Cmd+R) opened a reply for every message in the thread
    (bmo#1866819)
  * fixed: Enabling Grouped By view after reversing sort order of
    column header caused messages to be grouped incorrectly
    (bmo#1868794)
  * fixed: Opening thread pane context menu via keyboard did not
    always scroll view to selection (bmo#1867532)
  * fixed: New mail indicator for POP3 accounts did not indicate
    new messages ready to be downloaded (bmo#1870619)
  * fixed: Messages could not be moved to folders using Message &gt;
    Move To if text or a link in the message had been clicked on
    first (bmo#1868474)
  * fixed: MIME part boundaries were not properly terminated
    (bmo#1805558)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-26"/>
	<updated date="2024-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218955">SUSE bug 1218955</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0741/">CVE-2024-0741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0741">CVE-2024-0741 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0742/">CVE-2024-0742 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0742">CVE-2024-0742 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0746/">CVE-2024-0746 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0746">CVE-2024-0746 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0747/">CVE-2024-0747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0747">CVE-2024-0747 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0749/">CVE-2024-0749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0749">CVE-2024-0749 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0750/">CVE-2024-0750 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0750">CVE-2024-0750 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0751/">CVE-2024-0751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0751">CVE-2024-0751 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0753/">CVE-2024-0753 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0753">CVE-2024-0753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0755/">CVE-2024-0755 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0755">CVE-2024-0755 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844625" comment="MozillaThunderbird-115.7.0-150200.8.145.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844626" comment="MozillaThunderbird-translations-common-115.7.0-150200.8.145.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844627" comment="MozillaThunderbird-translations-other-115.7.0-150200.8.145.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4850" version="1" class="patch">
	<metadata>
		<title>Security update for rear23a (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218728" ref_url="https://bugzilla.suse.com/1218728" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-23301" ref_url="https://www.suse.com/security/cve/CVE-2024-23301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017772.html" source="SUSE-SU"/>
		<description>
This update for rear23a fixes the following issues:

- CVE-2024-23301: Fixed ReaR creates world-readable initrd with GRUB_RESCUE=Y. (bsc#1218728)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-26"/>
	<updated date="2024-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218728">SUSE bug 1218728</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23301/">CVE-2024-23301 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23301">CVE-2024-23301 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844628" comment="rear23a-2.3.a-150300.21.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4851" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219559" ref_url="https://bugzilla.suse.com/1219559" source="BUGZILLA"/>
		<reference ref_id="1220664" ref_url="https://bugzilla.suse.com/1220664" source="BUGZILLA"/>
		<reference ref_id="1221563" ref_url="https://bugzilla.suse.com/1221563" source="BUGZILLA"/>
		<reference ref_id="1221854" ref_url="https://bugzilla.suse.com/1221854" source="BUGZILLA"/>
		<reference ref_id="1222075" ref_url="https://bugzilla.suse.com/1222075" source="BUGZILLA"/>
		<reference ref_id="1226447" ref_url="https://bugzilla.suse.com/1226447" source="BUGZILLA"/>
		<reference ref_id="1226448" ref_url="https://bugzilla.suse.com/1226448" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425/" source="CVE"/>
		<reference ref_id="CVE-2024-0397" ref_url="https://www.suse.com/security/cve/CVE-2024-0397/" source="CVE"/>
		<reference ref_id="CVE-2024-0450" ref_url="https://www.suse.com/security/cve/CVE-2024-0450/" source="CVE"/>
		<reference ref_id="CVE-2024-4032" ref_url="https://www.suse.com/security/cve/CVE-2024-4032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036005.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2023-52425: Fixed backport so it uses features sniffing, not just comparing version number (bsc#1219559).
- CVE-2024-0450: Fixed detecting the vulnerability of 'quoted-overlap' zipbomb (bsc#1221854).
- CVE-2024-4032: Rearranging definition of private v global IP. (bsc#1226448)
- CVE-2024-0397: Remove a memory race condition in ssl.SSLContext certificate store methods. (bsc#1226447)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-15"/>
	<updated date="2024-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219559">SUSE bug 1219559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220664">SUSE bug 1220664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221563">SUSE bug 1221563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221854">SUSE bug 1221854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222075">SUSE bug 1222075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226447">SUSE bug 1226447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226448">SUSE bug 1226448</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-0397/">CVE-2024-0397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0397">CVE-2024-0397 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0450/">CVE-2024-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4032/">CVE-2024-4032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4032">CVE-2024-4032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009873752" comment="libpython3_6m1_0-3.6.15-150300.10.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873753" comment="libpython3_6m1_0-32bit-3.6.15-150300.10.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873754" comment="python3-3.6.15-150300.10.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873755" comment="python3-base-3.6.15-150300.10.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873756" comment="python3-curses-3.6.15-150300.10.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873757" comment="python3-dbm-3.6.15-150300.10.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873758" comment="python3-devel-3.6.15-150300.10.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873759" comment="python3-doc-3.6.15-150300.10.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873760" comment="python3-doc-devhelp-3.6.15-150300.10.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873761" comment="python3-idle-3.6.15-150300.10.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873762" comment="python3-testsuite-3.6.15-150300.10.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873763" comment="python3-tk-3.6.15-150300.10.65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873764" comment="python3-tools-3.6.15-150300.10.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4852" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227399" ref_url="https://bugzilla.suse.com/1227399" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-34750" ref_url="https://www.suse.com/security/cve/CVE-2024-34750/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018972.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

Updated to version 9.0.91:

- CVE-2024-34750: Fixed an improper handling of exceptional
  conditions (bsc#1227399).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-15"/>
	<updated date="2024-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1227399">SUSE bug 1227399</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34750/">CVE-2024-34750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34750">CVE-2024-34750 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009873765" comment="tomcat-9.0.91-150200.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873766" comment="tomcat-admin-webapps-9.0.91-150200.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873767" comment="tomcat-docs-webapp-9.0.91-150200.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873768" comment="tomcat-el-3_0-api-9.0.91-150200.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873769" comment="tomcat-embed-9.0.91-150200.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873770" comment="tomcat-javadoc-9.0.91-150200.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873771" comment="tomcat-jsp-2_3-api-9.0.91-150200.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873772" comment="tomcat-jsvc-9.0.91-150200.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873773" comment="tomcat-lib-9.0.91-150200.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873774" comment="tomcat-servlet-4_0-api-9.0.91-150200.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009873775" comment="tomcat-webapps-9.0.91-150200.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4853" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218845" ref_url="https://bugzilla.suse.com/1218845" source="BUGZILLA"/>
		<reference ref_id="1218846" ref_url="https://bugzilla.suse.com/1218846" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0408" ref_url="https://www.suse.com/security/cve/CVE-2024-0408/" source="CVE"/>
		<reference ref_id="CVE-2024-0409" ref_url="https://www.suse.com/security/cve/CVE-2024-0409/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017770.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2024-0408: Fixed SELinux unlabeled GLX PBuffer. (bsc#1218845)
- CVE-2024-0409: Fixed SELinux context corruption. (bsc#1218846)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-26"/>
	<updated date="2024-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218845">SUSE bug 1218845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218846">SUSE bug 1218846</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-0408/">CVE-2024-0408 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0408">CVE-2024-0408 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-0409/">CVE-2024-0409 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0409">CVE-2024-0409 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844629" comment="xorg-x11-server-21.1.4-150500.7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844630" comment="xorg-x11-server-Xvfb-21.1.4-150500.7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844631" comment="xorg-x11-server-extra-21.1.4-150500.7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844632" comment="xorg-x11-server-sdk-21.1.4-150500.7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844633" comment="xorg-x11-server-source-21.1.4-150500.7.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4854" version="1" class="patch">
	<metadata>
		<title>Security update for sevctl (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218499" ref_url="https://bugzilla.suse.com/1218499" source="BUGZILLA"/>
		<reference ref_id="1218502" ref_url="https://bugzilla.suse.com/1218502" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-50711" ref_url="https://www.suse.com/security/cve/CVE-2023-50711/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017769.html" source="SUSE-SU"/>
		<description>
This update for sevctl fixes the following issues:

- CVE-2023-50711: Fixed out of bounds memory accesses in vmm-sys-util
  (bsc#1218502, bsc#1218499)

Non-security fixes:

- Updated to version 0.4.3 (jsc#PED-4981)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-26"/>
	<updated date="2024-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218499">SUSE bug 1218499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218502">SUSE bug 1218502</bugzilla>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-50711/">CVE-2023-50711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50711">CVE-2023-50711 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844634" comment="sevctl-0.4.3-150500.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4855" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs18 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222665" ref_url="https://bugzilla.suse.com/1222665" source="BUGZILLA"/>
		<reference ref_id="1227554" ref_url="https://bugzilla.suse.com/1227554" source="BUGZILLA"/>
		<reference ref_id="1227560" ref_url="https://bugzilla.suse.com/1227560" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-22020" ref_url="https://www.suse.com/security/cve/CVE-2024-22020/" source="CVE"/>
		<reference ref_id="CVE-2024-27980" ref_url="https://www.suse.com/security/cve/CVE-2024-27980/" source="CVE"/>
		<reference ref_id="CVE-2024-36138" ref_url="https://www.suse.com/security/cve/CVE-2024-36138/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018991.html" source="SUSE-SU"/>
		<description>
This update for nodejs18 fixes the following issues:

Update to 18.20.4:

- CVE-2024-36138: Fixed CVE-2024-27980 fix bypass (bsc#1227560)
- CVE-2024-22020: Fixed a bypass of network import restriction via data URL (bsc#1227554)

Changes in 18.20.3:

- This release fixes a regression introduced in Node.js 18.19.0 where http.server.close() was incorrectly closing idle connections.
  deps:
  - acorn updated to 8.11.3.
  - acorn-walk updated to 8.3.2.
  - ada updated to 2.7.8.
  - c-ares updated to 1.28.1.
  - corepack updated to 0.28.0.
  - nghttp2 updated to 1.61.0.
  - ngtcp2 updated to 1.3.0.
  - npm updated to 10.7.0. Includes a fix from npm@10.5.1 to limit the number of open connections npm/cli#7324.
  - simdutf updated to 5.2.4.

Changes in 18.20.2:

- CVE-2024-27980: Fixed command injection via args parameter of child_process.spawn without shell option enabled on Windows (bsc#1222665)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1222665">SUSE bug 1222665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227554">SUSE bug 1227554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227560">SUSE bug 1227560</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22020/">CVE-2024-22020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22020">CVE-2024-22020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-27980/">CVE-2024-27980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27980">CVE-2024-27980 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36138/">CVE-2024-36138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36138">CVE-2024-36138 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874178" comment="corepack18-18.20.4-150400.9.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874179" comment="nodejs18-18.20.4-150400.9.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874180" comment="nodejs18-devel-18.20.4-150400.9.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874181" comment="nodejs18-docs-18.20.4-150400.9.24.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874182" comment="npm18-18.20.4-150400.9.24.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4856" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs20 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227554" ref_url="https://bugzilla.suse.com/1227554" source="BUGZILLA"/>
		<reference ref_id="1227560" ref_url="https://bugzilla.suse.com/1227560" source="BUGZILLA"/>
		<reference ref_id="1227561" ref_url="https://bugzilla.suse.com/1227561" source="BUGZILLA"/>
		<reference ref_id="1227562" ref_url="https://bugzilla.suse.com/1227562" source="BUGZILLA"/>
		<reference ref_id="1227563" ref_url="https://bugzilla.suse.com/1227563" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-22018" ref_url="https://www.suse.com/security/cve/CVE-2024-22018/" source="CVE"/>
		<reference ref_id="CVE-2024-22020" ref_url="https://www.suse.com/security/cve/CVE-2024-22020/" source="CVE"/>
		<reference ref_id="CVE-2024-27980" ref_url="https://www.suse.com/security/cve/CVE-2024-27980/" source="CVE"/>
		<reference ref_id="CVE-2024-36137" ref_url="https://www.suse.com/security/cve/CVE-2024-36137/" source="CVE"/>
		<reference ref_id="CVE-2024-36138" ref_url="https://www.suse.com/security/cve/CVE-2024-36138/" source="CVE"/>
		<reference ref_id="CVE-2024-37372" ref_url="https://www.suse.com/security/cve/CVE-2024-37372/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018990.html" source="SUSE-SU"/>
		<description>
This update for nodejs20 fixes the following issues:

Update to 20.15.1:

- CVE-2024-36138: Fixed CVE-2024-27980 fix bypass (bsc#1227560)
- CVE-2024-22020: Fixed a bypass of network import restriction via data URL (bsc#1227554)
- CVE-2024-22018: Fixed fs.lstat bypasses permission model (bsc#1227562)
- CVE-2024-36137: Fixed fs.fchown/fchmod bypasses permission model (bsc#1227561)
- CVE-2024-37372: Fixed Permission model improperly processes UNC paths (bsc#1227563)

Changes in 20.15.0:

- test_runner: support test plans
- inspector: introduce the --inspect-wait flag
- zlib: expose zlib.crc32()
- cli: allow running wasm in limited vmem with --disable-wasm-trap-handler

Changes in 20.14.0

- src,permission: throw async errors on async APIs
- test_runner: support forced exit

Changes in 20.13.1:

- buffer: improve base64 and base64url performance
- crypto: deprecate implicitly shortened GCM tags
- events,doc: mark CustomEvent as stable
- fs: add stacktrace to fs/promises
- report: add --report-exclude-network option
- src: add uv_get_available_memory to report and process
- stream: support typed arrays
- util: support array of formats in util.styleText
- v8: implement v8.queryObjects() for memory leak regression testing
- watch: mark as stable
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-07-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1227554">SUSE bug 1227554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227560">SUSE bug 1227560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227561">SUSE bug 1227561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227562">SUSE bug 1227562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227563">SUSE bug 1227563</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-22018/">CVE-2024-22018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22018">CVE-2024-22018 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22020/">CVE-2024-22020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22020">CVE-2024-22020 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-27980/">CVE-2024-27980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27980">CVE-2024-27980 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-36137/">CVE-2024-36137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36137">CVE-2024-36137 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36138/">CVE-2024-36138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36138">CVE-2024-36138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-37372/">CVE-2024-37372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37372">CVE-2024-37372 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874183" comment="corepack20-20.15.1-150500.11.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874184" comment="nodejs20-20.15.1-150500.11.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874185" comment="nodejs20-devel-20.15.1-150500.11.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874186" comment="nodejs20-docs-20.15.1-150500.11.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874187" comment="npm20-20.15.1-150500.11.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4857" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1207565" ref_url="https://bugzilla.suse.com/1207565" source="BUGZILLA"/>
		<reference ref_id="1227590" ref_url="https://bugzilla.suse.com/1227590" source="BUGZILLA"/>
		<reference ref_id="1227593" ref_url="https://bugzilla.suse.com/1227593" source="BUGZILLA"/>
		<reference ref_id="1227594" ref_url="https://bugzilla.suse.com/1227594" source="BUGZILLA"/>
		<reference ref_id="1227595" ref_url="https://bugzilla.suse.com/1227595" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-23969" ref_url="https://www.suse.com/security/cve/CVE-2023-23969/" source="CVE"/>
		<reference ref_id="CVE-2024-38875" ref_url="https://www.suse.com/security/cve/CVE-2024-38875/" source="CVE"/>
		<reference ref_id="CVE-2024-39329" ref_url="https://www.suse.com/security/cve/CVE-2024-39329/" source="CVE"/>
		<reference ref_id="CVE-2024-39330" ref_url="https://www.suse.com/security/cve/CVE-2024-39330/" source="CVE"/>
		<reference ref_id="CVE-2024-39614" ref_url="https://www.suse.com/security/cve/CVE-2024-39614/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018995.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

- CVE-2024-38875: Fixed potential denial-of-service attack via certain inputs with a very large number of brackets (bsc#1227590)
- CVE-2024-39329: Fixed username enumeration through timing difference for users with unusable passwords (bsc#1227593)
- CVE-2024-39330: Fixed potential directory traversal in django.core.files.storage.Storage.save() (bsc#1227594)
- CVE-2024-39614: Fixed potential denial-of-service through django.utils.translation.get_supported_language_variant() (bsc#1227595)
- CVE-2023-23969: Fixed potential denial-of-service via Accept-Language headers (bsc#1207565)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2024-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1207565">SUSE bug 1207565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227590">SUSE bug 1227590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227593">SUSE bug 1227593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227594">SUSE bug 1227594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227595">SUSE bug 1227595</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23969/">CVE-2023-23969 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23969">CVE-2023-23969 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38875/">CVE-2024-38875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38875">CVE-2024-38875 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39329/">CVE-2024-39329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39329">CVE-2024-39329 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-39330/">CVE-2024-39330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39330">CVE-2024-39330 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39614/">CVE-2024-39614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39614">CVE-2024-39614 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874188" comment="python3-Django-2.0.7-150000.1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4858" version="1" class="patch">
	<metadata>
		<title>Security update for emacs (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226957" ref_url="https://bugzilla.suse.com/1226957" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-39331" ref_url="https://www.suse.com/security/cve/CVE-2024-39331/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019003.html" source="SUSE-SU"/>
		<description>
This update for emacs fixes the following issues:

- CVE-2024-39331: Fixed evaluation of arbitrary unsafe Elisp code in Org mode (bsc#1226957).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-19"/>
	<updated date="2024-07-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1226957">SUSE bug 1226957</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39331/">CVE-2024-39331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39331">CVE-2024-39331 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874754" comment="emacs-27.2-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874755" comment="emacs-el-27.2-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874756" comment="emacs-info-27.2-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874757" comment="emacs-nox-27.2-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874758" comment="emacs-x11-27.2-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874759" comment="etags-27.2-150400.3.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4859" version="1" class="patch">
	<metadata>
		<title>Security update for mockito, snakeyaml, testng (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1205628" ref_url="https://bugzilla.suse.com/1205628" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-4065" ref_url="https://www.suse.com/security/cve/CVE-2022-4065/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019004.html" source="SUSE-SU"/>
		<description>
This update for mockito, snakeyaml, testng fixes the following issues:

mockito was updated to version 5.11.0:

- Added bundle manifest to the mockito-core artifact
- Mockito 5 is making core changes to ensure compatibility with future JDK versions.
- Switch the Default MockMaker to mockito-inline (not applicable to mockito-android)

  * Mockito 2.7.6 introduced the mockito-inline mockmaker based on the 'inline bytecode' principle, offering
    compatibility advantages over the subclass mockmaker
  * This change avoids JDK restrictions, such as violating module boundaries and leaking subclass creation

- Legitimate use cases for the subclass mockmaker:

  * Scenarios where the inline mockmaker does not function, such as on Graal VM's native image
  * If avoiding mocking final classes, the subclass mockmaker remains a viable option, although issues may arise on
    JDK 17+
  * Mockito aims to support both mockmakers, allowing users to choose based on their requirements.

- Update the Minimum Supported Java Version to 11

  * Mockito 5 raised the minimum supported Java version to 11
  * Community member @reta contributed to this change.
  * Users still on JDK 8 can continue using Mockito 4, with minimal API differences between versions

- New type() Method on ArgumentMatcher

  * The ArgumentMatcher interface now includes a new type() method to support varargs methods, addressing previous
    limitations
  * Users can now differentiate between matching calls with any exact number of arguments or match any number of
    arguments
  * Mockito 5 provides a default implementation of the new method, ensuring backward compatibility.
  * No obligation for users to implement the new method; Mockito 5 considers Void.type by default for varargs handling
  * ArgumentCaptor is now fully type-aware, enabling capturing specific subclasses on a generic method.

- byte-buddy does not bundle asm, but uses objectweb-asm as external library

snake-yaml was updated to version 2.2:

- Changes of version 2.2:

  * Define default scalar style as PLAIN (for polyglot Maven)
  * Add missing 'exports org.yaml.snakeyaml.inspector' to module-info.java

- Changes of version 2.1:

  * Heavy Allocation in Emitter.analyzeScalar(String) due to Regex Overhead
  * Use identity in toString() for sequences to avoid OutOfMemoryError
  * NumberFormatException from SnakeYAML due to int overflow for corrupt YAML version
  * Document size limit should be applied to single document notthe whole input stream
  * Detect invalid Unicode code point (thanks to Tatu Saloranta)
  * Remove Trusted*Inspector classes from main sources tree

- Changes of version 2.0:

  * Rollback to Java 7 target
  * Add module-info.java
  * Migrate to Java 8
  * Remove many deprecated constructors
  * Remove long deprecated methods in FlowStyle
  * Do not allow global tags by default
  * Yaml.LoadAs() signature to support Class&lt;? super T&gt; type instead of Class&lt;T&gt;
  * CustomClassLoaderConstructor takes LoaderOptions
  * Check input parameters for non-null values

testng was updated to version 7.10.1:

- Security issues fixed:

  * CVE-2022-4065: Fixed Zip Slip Vulnerability (bsc#1205628)

- Changes of version 7.10.1:

  * Fixed maven build with junit5

- Changes of version 7.10.0:

  * Minor discrepancy fixes
  * Deleting TestNG eclipse plugin specific classes
  * Remove deprecated JUnit related support in TestNG
  * Handle exceptions in emailable Reporter
  * Added wrapperbot and update workflow order
  * Support ITestNGFactory customisation
  * Streamlined data provider listener invocation
  * Streamlined Guice Module creation in concurrency.
  * Copy test result attributes when unexpected failures
  * chore: use explicit dependency versions instead of refreshVersions
  * Removed Ant
  * Support ordering of listeners
  * Added errorprone
  * Allow custom thread pool executors to be wired in.
  * Allow data providers to be non cacheable
  * Use Locks instead of synchronised keyword
  * Document pgp artifact signing keys
  * Added Unique Id for all test class instances
  * Added issue management workflows
  * Map object to configurations
  * Allow listeners to be disabled at runtime
  * Streamlined Data Provider execution
  * Honour inheritance when parsing listener factories
  * Tweaks around accessing SuiteResult
  * Streamlined random generation
  * Streamlined dependencies for configurations

- Changes of version 7.9.0:

  * Fixed maps containing nulls can be incorrectly considered equal
  * Test Results as artifacts for failed runs
  * Fixed data races
  * Dont honour params specified in suite-file tag
  * Decouple SuiteRunner and TestRunner
  * Disable Native DI for BeforeSuite methods
  * Streamlined running Parallel Dataproviders+retries
  * Removed extra whitespace in log for Configuration.createMethods()
  * Added the link for TestNG Documentation's GitHub Repo in README.md
  * FirstTimeOnlyConfig methods + Listener invocations
  * Added overrideGroupsFromCliInParentChildXml test
  * Ensure thread safety for attribute access
  * Added @inherited to the Listeners annotation
  * Restrict Group inheritance to Before|AfterGroups
  * Ensure ITestResult injected to @AfterMethod is apt
  * Support suite level thread pools for data provider
  * Favour CompletableFuture instead of PoolService
  * Favour FutureTask for concurrency support
  * Shared Threadpool for normal/datadriven tests.
  * Abort for invalid combinations

- Changes of version 7.8.0:

  * [Feature] Not exception but warning if some (not all) of the given test names are not found in suite files.
  * [Feature] Generate testng-results.xml per test suite
  * [Feature] Allow test classes to define 'configfailurepolicy' at a per class level
  * XmlTest index is not set for test suites invoked with YAML
  * Listener's onAfterClass is called before @afterclass configuration methods are executed.
  * After upgrading to TestNG 7.5.0, setting ITestResult.status to FAILURE doesn't fail the test anymore
  * JUnitReportReporter should capture the test case output at the test case level
  * TestNG.xml doesn't honour Parallel value of a clone
  * before configuration and before invocation should be 'SKIP' when beforeMethod is 'skip'
  * Test listeners specified in parent testng.xml file are not included in testng-failed.xml file
  * Discrepancies with DataProvider and Retry of failed tests
  * Skipped Tests with DataProvider appear as failed
  * testng-results xml reports config skips from base classes as ignored
  * Feature: Check that specific object present in List
  * Upgraded snakeyaml to 2.0

- Changes of version 7.7.1:

  * Streamline overloaded assertion methods for Groovy

- Changes of version 7.7.0:

  * Replace FindBugs by SpotBugs
  * Gradle: Drop forUseAtConfigurationTime()
  * Added ability to provide custom message to assertThrows\expectThrows methods
  * Only resolve hostname once
  * Prevent overlogging of debug msgs in Graph impl
  * Streamlined dataprovider invoking in abstract classes
  * Streamlined TestResult due to expectedExceptions
  * Unexpected test runs count with retry analyzer
  * Make PackageUtils compliant with JPMS
  * Ability to retry a data provider during failures
  * Fixing bug with DataProvider retry
  * Added config key for callback discrepancy behavior
  * Fixed FileAlreadyExistsException error on copy
  * JarFileUtils.delete(File f) throw actual exception (instead of FileNotFound) when file cannot be deleted #2825
  * Changing assertion message of the osgitest
  * Enhancing the Matrix
  * Avoid Compilation errors on Semeru JDK flavour.
  * Add addition yml extension
  * Support getting dependencies info for a test
  * Honour regex in dependsOnMethods
  * Ensure All tests run all the time
  * Deprecate support for running Spock Tests
  * Streamline dependsOnMethods for configurations
  * Ensure ITestContext available for JUnit4 tests
  * Deprecate support for running JUnit tests
  * Changes of 7.6.1
  * Fix Files.copy() such that parent dirs are created
  * Remove deprecated utility methods

- Changes of version 7.6.0:

  * Remove redundant Parameter implementation
  * Upgraded to JDK11
  * Move SimpleBaseTest to be Kotlin based
  * Restore testnames when using suites in suite.
  * Moving ClassHelperTests into Kotlin
  * IHookable and IConfigurable callback discrepancy
  * Minor refactoring
  * Add additional condition for assertEqualsNoOrder
  * beforeConfiguration() listener method should be invoked for skipped configurations as well
  * Keep the initial order of listeners
  * SuiteRunner could not be initial by default Configuration
  * Enable Dataprovider failures to be considered.
  * BeforeGroups should run before any matched test
  * Fixed possible StringIndexOutOfBoundsException exception in XmlReporter
  * DataProvider: possibility to unload dataprovider class, when done with it
  * Fixed possibilty that AfterGroups method is invoked before all tests
  * Fixed equals implementation for WrappedTestNGMethod
  * Wire-In listeners consistently
  * Streamline AfterClass invocation
  * Show FQMN for tests in console
  * Honour custom attribute values in TestNG default reports

		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2024-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1205628">SUSE bug 1205628</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4065/">CVE-2022-4065 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4065">CVE-2022-4065 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009874760" comment="mockito-5.11.0-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874761" comment="mockito-javadoc-5.11.0-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874762" comment="snakeyaml-2.2-150200.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874763" comment="snakeyaml-javadoc-2.2-150200.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874764" comment="testng-7.10.1-150200.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009874765" comment="testng-javadoc-7.10.1-150200.3.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4860" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="SUSE-SU-2024:2616-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036129.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

- Fixed regression in previous CVE fixes that made the package not work with Python 3.6
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-29"/>
	<updated date="2024-07-29"/>
	<severity>Important</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877148" comment="python3-Django-2.0.7-150000.1.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4861" version="1" class="patch">
	<metadata>
		<title>Security update for gnome-shell (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1225567" ref_url="https://bugzilla.suse.com/1225567" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-36472" ref_url="https://www.suse.com/security/cve/CVE-2024-36472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019053.html" source="SUSE-SU"/>
		<description>
This update for gnome-shell fixes the following issues:

- CVE-2024-36472: Fixed portal helper automatically launched without user confirmation (bsc#1225567)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1225567">SUSE bug 1225567</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36472/">CVE-2024-36472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36472">CVE-2024-36472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877149" comment="gnome-extensions-41.9-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877150" comment="gnome-shell-41.9-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877151" comment="gnome-shell-calendar-41.9-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877152" comment="gnome-shell-devel-41.9-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877153" comment="gnome-shell-lang-41.9-150400.3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4862" version="1" class="patch">
	<metadata>
		<title>Security update for libgit2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219660" ref_url="https://bugzilla.suse.com/1219660" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-24577" ref_url="https://www.suse.com/security/cve/CVE-2024-24577/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019051.html" source="SUSE-SU"/>
		<description>
This update for libgit2 fixes the following issues:

- CVE-2024-24577: Fixed arbitrary code execution due to heap corruption in git_index_add (bsc#1219660)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219660">SUSE bug 1219660</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-24577/">CVE-2024-24577 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24577">CVE-2024-24577 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877154" comment="libgit2-1_3-1.3.0-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877155" comment="libgit2-1_3-32bit-1.3.0-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877156" comment="libgit2-devel-1.3.0-150400.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4863" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227268" ref_url="https://bugzilla.suse.com/1227268" source="BUGZILLA"/>
		<reference ref_id="1227269" ref_url="https://bugzilla.suse.com/1227269" source="BUGZILLA"/>
		<reference ref_id="1227270" ref_url="https://bugzilla.suse.com/1227270" source="BUGZILLA"/>
		<reference ref_id="1227271" ref_url="https://bugzilla.suse.com/1227271" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-38475" ref_url="https://www.suse.com/security/cve/CVE-2024-38475/" source="CVE"/>
		<reference ref_id="CVE-2024-38476" ref_url="https://www.suse.com/security/cve/CVE-2024-38476/" source="CVE"/>
		<reference ref_id="CVE-2024-38477" ref_url="https://www.suse.com/security/cve/CVE-2024-38477/" source="CVE"/>
		<reference ref_id="CVE-2024-39573" ref_url="https://www.suse.com/security/cve/CVE-2024-39573/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019050.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2024-38475: Fixed improper escaping of output in mod_rewrite (bsc#1227268)
- CVE-2024-38476: Fixed server may use exploitable/malicious backend application output to run local handlers via internal redirect (bsc#1227269)
- CVE-2024-38477: Fixed null pointer dereference in mod_proxy (bsc#1227270)
- CVE-2024-39573: Fixed potential SSRF in mod_rewrite (bsc#1227271)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1227268">SUSE bug 1227268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227269">SUSE bug 1227269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227270">SUSE bug 1227270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227271">SUSE bug 1227271</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-38475/">CVE-2024-38475 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38475">CVE-2024-38475 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-38476/">CVE-2024-38476 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38476">CVE-2024-38476 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38477/">CVE-2024-38477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38477">CVE-2024-38477 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-39573/">CVE-2024-39573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39573">CVE-2024-39573 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877201" comment="apache2-2.4.51-150400.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877202" comment="apache2-devel-2.4.51-150400.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877203" comment="apache2-doc-2.4.51-150400.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877204" comment="apache2-event-2.4.51-150400.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877205" comment="apache2-example-pages-2.4.51-150400.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877206" comment="apache2-prefork-2.4.51-150400.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877207" comment="apache2-utils-2.4.51-150400.6.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877208" comment="apache2-worker-2.4.51-150400.6.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4864" version="1" class="patch">
	<metadata>
		<title>Security update for p7zip (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227358" ref_url="https://bugzilla.suse.com/1227358" source="BUGZILLA"/>
		<reference ref_id="1227359" ref_url="https://bugzilla.suse.com/1227359" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-52168" ref_url="https://www.suse.com/security/cve/CVE-2023-52168/" source="CVE"/>
		<reference ref_id="CVE-2023-52169" ref_url="https://www.suse.com/security/cve/CVE-2023-52169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019049.html" source="SUSE-SU"/>
		<description>
This update for p7zip fixes the following issues:

- CVE-2023-52168: Fixed heap-based buffer overflow in the NTFS handler allows two bytes to be overwritten at multiple offsets (bsc#1227358)
- CVE-2023-52169: Fixed out-of-bounds read in NTFS handler (bsc#1227359)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1227358">SUSE bug 1227358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227359">SUSE bug 1227359</bugzilla>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52168/">CVE-2023-52168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52168">CVE-2023-52168 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52169/">CVE-2023-52169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52169">CVE-2023-52169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877209" comment="p7zip-16.02-150200.14.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877210" comment="p7zip-doc-16.02-150200.14.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877211" comment="p7zip-full-16.02-150200.14.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4865" version="1" class="patch">
	<metadata>
		<title>Security update for python-dnspython (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222693" ref_url="https://bugzilla.suse.com/1222693" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-29483" ref_url="https://www.suse.com/security/cve/CVE-2023-29483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019047.html" source="SUSE-SU"/>
		<description>
This update for python-dnspython fixes the following issues:

- CVE-2023-29483: Fixed an issue that allowed remote attackers to
  interfere with DNS name resolution (bsc#1222693).  
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1222693">SUSE bug 1222693</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29483/">CVE-2023-29483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-29483">CVE-2023-29483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877212" comment="python311-dnspython-2.3.0-150400.12.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4866" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227380" ref_url="https://bugzilla.suse.com/1227380" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-29508" ref_url="https://www.suse.com/security/cve/CVE-2024-29508/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019048.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2024-29508: Fixed heap pointer leak in pdf_base_font_alloc (bsc#1227380)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1227380">SUSE bug 1227380</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-29508/">CVE-2024-29508 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-29508">CVE-2024-29508 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877213" comment="ghostscript-9.52-150000.197.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877214" comment="ghostscript-devel-9.52-150000.197.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877215" comment="ghostscript-x11-9.52-150000.197.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4867" version="1" class="patch">
	<metadata>
		<title>Security update for java-17-openjdk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227298" ref_url="https://bugzilla.suse.com/1227298" source="BUGZILLA"/>
		<reference ref_id="1228046" ref_url="https://bugzilla.suse.com/1228046" source="BUGZILLA"/>
		<reference ref_id="1228047" ref_url="https://bugzilla.suse.com/1228047" source="BUGZILLA"/>
		<reference ref_id="1228048" ref_url="https://bugzilla.suse.com/1228048" source="BUGZILLA"/>
		<reference ref_id="1228051" ref_url="https://bugzilla.suse.com/1228051" source="BUGZILLA"/>
		<reference ref_id="1228052" ref_url="https://bugzilla.suse.com/1228052" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131/" source="CVE"/>
		<reference ref_id="CVE-2024-21138" ref_url="https://www.suse.com/security/cve/CVE-2024-21138/" source="CVE"/>
		<reference ref_id="CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140/" source="CVE"/>
		<reference ref_id="CVE-2024-21145" ref_url="https://www.suse.com/security/cve/CVE-2024-21145/" source="CVE"/>
		<reference ref_id="CVE-2024-21147" ref_url="https://www.suse.com/security/cve/CVE-2024-21147/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019046.html" source="SUSE-SU"/>
		<description>
This update for java-17-openjdk fixes the following issues:

Updated to version 17.0.12+7 (July 2024 CPU):

- CVE-2024-21131: Fixed a potential UTF8 size overflow (bsc#1228046).
- CVE-2024-21138: Fixed an infinite loop due to excessive symbol
  length (bsc#1228047).
- CVE-2024-21140: Fixed a pre-loop limit overflow in Range Check
  Elimination (bsc#1228048).
- CVE-2024-21147: Fixed an out-of-bounds access in 2D image handling
  (bsc#1228052).
- CVE-2024-21145: Fixed an index overflow in RangeCheckElimination
  (bsc#1228051).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1227298">SUSE bug 1227298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228046">SUSE bug 1228046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228047">SUSE bug 1228047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228048">SUSE bug 1228048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228051">SUSE bug 1228051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228052">SUSE bug 1228052</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21138/">CVE-2024-21138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21138">CVE-2024-21138 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21145/">CVE-2024-21145 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21145">CVE-2024-21145 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-21147/">CVE-2024-21147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21147">CVE-2024-21147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877216" comment="java-17-openjdk-17.0.12.0-150400.3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877217" comment="java-17-openjdk-demo-17.0.12.0-150400.3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877218" comment="java-17-openjdk-devel-17.0.12.0-150400.3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877219" comment="java-17-openjdk-headless-17.0.12.0-150400.3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877220" comment="java-17-openjdk-javadoc-17.0.12.0-150400.3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877221" comment="java-17-openjdk-jmods-17.0.12.0-150400.3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877222" comment="java-17-openjdk-src-17.0.12.0-150400.3.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4868" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227298" ref_url="https://bugzilla.suse.com/1227298" source="BUGZILLA"/>
		<reference ref_id="1228046" ref_url="https://bugzilla.suse.com/1228046" source="BUGZILLA"/>
		<reference ref_id="1228047" ref_url="https://bugzilla.suse.com/1228047" source="BUGZILLA"/>
		<reference ref_id="1228048" ref_url="https://bugzilla.suse.com/1228048" source="BUGZILLA"/>
		<reference ref_id="1228050" ref_url="https://bugzilla.suse.com/1228050" source="BUGZILLA"/>
		<reference ref_id="1228051" ref_url="https://bugzilla.suse.com/1228051" source="BUGZILLA"/>
		<reference ref_id="1228052" ref_url="https://bugzilla.suse.com/1228052" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131/" source="CVE"/>
		<reference ref_id="CVE-2024-21138" ref_url="https://www.suse.com/security/cve/CVE-2024-21138/" source="CVE"/>
		<reference ref_id="CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140/" source="CVE"/>
		<reference ref_id="CVE-2024-21144" ref_url="https://www.suse.com/security/cve/CVE-2024-21144/" source="CVE"/>
		<reference ref_id="CVE-2024-21145" ref_url="https://www.suse.com/security/cve/CVE-2024-21145/" source="CVE"/>
		<reference ref_id="CVE-2024-21147" ref_url="https://www.suse.com/security/cve/CVE-2024-21147/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019045.html" source="SUSE-SU"/>
		<description>
This update for java-11-openjdk fixes the following issues:

Updated to version 11.0.24+8 (July 2024 CPU):

- CVE-2024-21131: Fixed a potential UTF8 size overflow (bsc#1228046).
- CVE-2024-21138: Fixed an infinite loop due to excessive symbol
  length (bsc#1228047).
- CVE-2024-21140: Fixed a pre-loop limit overflow in Range Check
  Elimination (bsc#1228048).
- CVE-2024-21147: Fixed an out-of-bounds access in 2D image handling
  (bsc#1228052).
- CVE-2024-21145: Fixed an index overflow in RangeCheckElimination
  (bsc#1228051).
- CVE-2024-21144: Fixed an excessive loading time in Pack200 due to
  improper header validation (bsc#1228050).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1227298">SUSE bug 1227298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228046">SUSE bug 1228046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228047">SUSE bug 1228047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228048">SUSE bug 1228048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228050">SUSE bug 1228050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228051">SUSE bug 1228051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228052">SUSE bug 1228052</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21138/">CVE-2024-21138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21138">CVE-2024-21138 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21144/">CVE-2024-21144 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21144">CVE-2024-21144 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21145/">CVE-2024-21145 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21145">CVE-2024-21145 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-21147/">CVE-2024-21147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21147">CVE-2024-21147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877223" comment="java-11-openjdk-11.0.24.0-150000.3.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877224" comment="java-11-openjdk-demo-11.0.24.0-150000.3.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877225" comment="java-11-openjdk-devel-11.0.24.0-150000.3.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877226" comment="java-11-openjdk-headless-11.0.24.0-150000.3.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877227" comment="java-11-openjdk-javadoc-11.0.24.0-150000.3.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877228" comment="java-11-openjdk-jmods-11.0.24.0-150000.3.116.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877229" comment="java-11-openjdk-src-11.0.24.0-150000.3.116.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4869" version="1" class="patch">
	<metadata>
		<title>Security update for espeak-ng (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218006" ref_url="https://bugzilla.suse.com/1218006" source="BUGZILLA"/>
		<reference ref_id="1218007" ref_url="https://bugzilla.suse.com/1218007" source="BUGZILLA"/>
		<reference ref_id="1218008" ref_url="https://bugzilla.suse.com/1218008" source="BUGZILLA"/>
		<reference ref_id="1218009" ref_url="https://bugzilla.suse.com/1218009" source="BUGZILLA"/>
		<reference ref_id="1218010" ref_url="https://bugzilla.suse.com/1218010" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-49990" ref_url="https://www.suse.com/security/cve/CVE-2023-49990/" source="CVE"/>
		<reference ref_id="CVE-2023-49991" ref_url="https://www.suse.com/security/cve/CVE-2023-49991/" source="CVE"/>
		<reference ref_id="CVE-2023-49992" ref_url="https://www.suse.com/security/cve/CVE-2023-49992/" source="CVE"/>
		<reference ref_id="CVE-2023-49993" ref_url="https://www.suse.com/security/cve/CVE-2023-49993/" source="CVE"/>
		<reference ref_id="CVE-2023-49994" ref_url="https://www.suse.com/security/cve/CVE-2023-49994/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019042.html" source="SUSE-SU"/>
		<description>
This update for espeak-ng fixes the following issues:

- CVE-2023-49990: Fixed buffer overflow in SetUpPhonemeTable function at synthdata.c (bsc#1218010)
- CVE-2023-49991: Fixed stack-buffer-underflow exists in the function CountVowelPosition in synthdata.c (bsc#1218006)
- CVE-2023-49992: Fixed stack-buffer-overflow exists in the function RemoveEnding in dictionary.c (bsc#1218007)
- CVE-2023-49993: Fixed buffer overflow in ReadClause function at readclause.c (bsc#1218008)
- CVE-2023-49994: Fixed floating point exception in PeaksToHarmspect at wavegen.c (bsc#1218009)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218006">SUSE bug 1218006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218007">SUSE bug 1218007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218008">SUSE bug 1218008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218009">SUSE bug 1218009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218010">SUSE bug 1218010</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-49990/">CVE-2023-49990 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49990">CVE-2023-49990 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-49991/">CVE-2023-49991 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49991">CVE-2023-49991 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-49992/">CVE-2023-49992 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49992">CVE-2023-49992 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-49993/">CVE-2023-49993 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49993">CVE-2023-49993 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49994/">CVE-2023-49994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49994">CVE-2023-49994 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877230" comment="espeak-ng-1.50-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877231" comment="espeak-ng-compat-1.50-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877232" comment="espeak-ng-compat-devel-1.50-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877233" comment="espeak-ng-devel-1.50-150300.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877234" comment="libespeak-ng1-1.50-150300.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4870" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1214718" ref_url="https://bugzilla.suse.com/1214718" source="BUGZILLA"/>
		<reference ref_id="1221984" ref_url="https://bugzilla.suse.com/1221984" source="BUGZILLA"/>
		<reference ref_id="1227355" ref_url="https://bugzilla.suse.com/1227355" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46842" ref_url="https://www.suse.com/security/cve/CVE-2023-46842/" source="CVE"/>
		<reference ref_id="CVE-2024-31143" ref_url="https://www.suse.com/security/cve/CVE-2024-31143/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2654-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036194.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2023-46842: Fixed x86 HVM hypercalls may trigger Xen bug check (XSA-454, bsc#1221984).
- CVE-2024-31143: Fixed double unlock in x86 guest IRQ handling (XSA-458, bsc#1227355).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214718">SUSE bug 1214718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221984">SUSE bug 1221984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227355">SUSE bug 1227355</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46842/">CVE-2023-46842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46842">CVE-2023-46842 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31143/">CVE-2024-31143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31143">CVE-2024-31143 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877235" comment="xen-4.17.4_04-150500.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877236" comment="xen-devel-4.17.4_04-150500.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877237" comment="xen-doc-html-4.17.4_04-150500.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877238" comment="xen-libs-4.17.4_04-150500.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877239" comment="xen-libs-32bit-4.17.4_04-150500.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877240" comment="xen-tools-4.17.4_04-150500.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877241" comment="xen-tools-domU-4.17.4_04-150500.3.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877242" comment="xen-tools-xendomains-wait-disk-4.17.4_04-150500.3.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4871" version="1" class="patch">
	<metadata>
		<title>Security update for python-dnspython (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222693" ref_url="https://bugzilla.suse.com/1222693" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-29483" ref_url="https://www.suse.com/security/cve/CVE-2023-29483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2655-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036193.html" source="SUSE-SU"/>
		<description>
This update for python-dnspython fixes the following issues:

  - CVE-2023-29483: Fixed an issue that allowed remote attackers to
    interfere with DNS name resolution (bsc#1222693).  
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1222693">SUSE bug 1222693</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29483/">CVE-2023-29483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-29483">CVE-2023-29483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877243" comment="python3-dnspython-1.15.0-150000.3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4872" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219660" ref_url="https://bugzilla.suse.com/1219660" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-24577" ref_url="https://www.suse.com/security/cve/CVE-2024-24577/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036192.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- CVE-2024-24577: Fixed arbitrary code execution due to heap corruption in git_index_add (bsc#1219660)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219660">SUSE bug 1219660</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-24577/">CVE-2024-24577 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24577">CVE-2024-24577 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877244" comment="git-2.35.3-150300.10.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877245" comment="git-arch-2.35.3-150300.10.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877246" comment="git-core-2.35.3-150300.10.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877247" comment="git-credential-gnome-keyring-2.35.3-150300.10.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877248" comment="git-credential-libsecret-2.35.3-150300.10.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877249" comment="git-cvs-2.35.3-150300.10.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877250" comment="git-daemon-2.35.3-150300.10.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877251" comment="git-doc-2.35.3-150300.10.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877252" comment="git-email-2.35.3-150300.10.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877253" comment="git-gui-2.35.3-150300.10.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877254" comment="git-p4-2.35.3-150300.10.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877255" comment="git-svn-2.35.3-150300.10.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877256" comment="git-web-2.35.3-150300.10.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877257" comment="gitk-2.35.3-150300.10.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877258" comment="perl-Git-2.35.3-150300.10.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4873" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="916845" ref_url="https://bugzilla.suse.com/916845" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4235" ref_url="https://www.suse.com/security/cve/CVE-2013-4235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2658-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036190.html" source="SUSE-SU"/>
		<description>
This update for shadow fixes the following issues:

- CVE-2013-4235: Fixed a race condition when copying and removing directory trees (bsc#916845).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/916845">SUSE bug 916845</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-4235/">CVE-2013-4235 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4235">CVE-2013-4235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877259" comment="login_defs-4.8.1-150400.10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877260" comment="shadow-4.8.1-150400.10.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4874" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218851" ref_url="https://bugzilla.suse.com/1218851" source="BUGZILLA"/>
		<reference ref_id="1219080" ref_url="https://bugzilla.suse.com/1219080" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46839" ref_url="https://www.suse.com/security/cve/CVE-2023-46839/" source="CVE"/>
		<reference ref_id="CVE-2023-46840" ref_url="https://www.suse.com/security/cve/CVE-2023-46840/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0266-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-January/034056.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2023-46839: Fixed phantom functions assigned to incorrect contexts (XSA-449) (bsc#1218851)
- CVE-2023-46840: Fixed VT-d: Failure to quarantine devices in !HVM builds (XSA-450) (bsc#1219080)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-30"/>
	<updated date="2024-01-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218851">SUSE bug 1218851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219080">SUSE bug 1219080</bugzilla>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46839/">CVE-2023-46839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46839">CVE-2023-46839 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46840/">CVE-2023-46840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46840">CVE-2023-46840 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844727" comment="xen-4.17.3_04-150500.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844728" comment="xen-devel-4.17.3_04-150500.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844729" comment="xen-doc-html-4.17.3_04-150500.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844730" comment="xen-libs-4.17.3_04-150500.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844731" comment="xen-libs-32bit-4.17.3_04-150500.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844732" comment="xen-tools-4.17.3_04-150500.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844733" comment="xen-tools-domU-4.17.3_04-150500.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844734" comment="xen-tools-xendomains-wait-disk-4.17.3_04-150500.3.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4875" version="1" class="patch">
	<metadata>
		<title>Security update for gtk2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228120" ref_url="https://bugzilla.suse.com/1228120" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6655" ref_url="https://www.suse.com/security/cve/CVE-2024-6655/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036188.html" source="SUSE-SU"/>
		<description>
This update for gtk2 fixes the following issues:

- CVE-2024-6655: Fixed library injection from current working directory (bsc#1228120)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1228120">SUSE bug 1228120</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6655/">CVE-2024-6655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6655">CVE-2024-6655 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877261" comment="gtk2-branding-upstream-2.24.33-150400.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877262" comment="gtk2-data-2.24.33-150400.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877263" comment="gtk2-devel-2.24.33-150400.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877264" comment="gtk2-devel-32bit-2.24.33-150400.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877265" comment="gtk2-immodule-amharic-2.24.33-150400.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877266" comment="gtk2-immodule-amharic-32bit-2.24.33-150400.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877267" comment="gtk2-immodule-inuktitut-2.24.33-150400.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877268" comment="gtk2-immodule-inuktitut-32bit-2.24.33-150400.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877269" comment="gtk2-immodule-multipress-2.24.33-150400.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877270" comment="gtk2-immodule-multipress-32bit-2.24.33-150400.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877271" comment="gtk2-immodule-thai-2.24.33-150400.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877272" comment="gtk2-immodule-thai-32bit-2.24.33-150400.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877273" comment="gtk2-immodule-tigrigna-2.24.33-150400.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877274" comment="gtk2-immodule-tigrigna-32bit-2.24.33-150400.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877275" comment="gtk2-immodule-vietnamese-2.24.33-150400.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877276" comment="gtk2-immodule-vietnamese-32bit-2.24.33-150400.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877277" comment="gtk2-immodule-xim-2.24.33-150400.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877278" comment="gtk2-immodule-xim-32bit-2.24.33-150400.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877279" comment="gtk2-lang-2.24.33-150400.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877280" comment="gtk2-tools-2.24.33-150400.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877281" comment="gtk2-tools-32bit-2.24.33-150400.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877282" comment="libgtk-2_0-0-2.24.33-150400.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877283" comment="libgtk-2_0-0-32bit-2.24.33-150400.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877284" comment="typelib-1_0-Gtk-2_0-2.24.33-150400.4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4876" version="1" class="patch">
	<metadata>
		<title>Security update for gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228120" ref_url="https://bugzilla.suse.com/1228120" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6655" ref_url="https://www.suse.com/security/cve/CVE-2024-6655/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2661-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036187.html" source="SUSE-SU"/>
		<description>
This update for gtk3 fixes the following issues:

- CVE-2024-6655: Fixed library injection from current working directory (bsc#1228120)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1228120">SUSE bug 1228120</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6655/">CVE-2024-6655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6655">CVE-2024-6655 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877285" comment="gettext-its-gtk3-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877286" comment="gtk3-branding-upstream-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877287" comment="gtk3-data-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877288" comment="gtk3-devel-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877289" comment="gtk3-devel-32bit-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877290" comment="gtk3-devel-doc-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877291" comment="gtk3-immodule-amharic-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877292" comment="gtk3-immodule-amharic-32bit-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877293" comment="gtk3-immodule-broadway-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877294" comment="gtk3-immodule-inuktitut-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877295" comment="gtk3-immodule-inuktitut-32bit-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877296" comment="gtk3-immodule-multipress-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877297" comment="gtk3-immodule-multipress-32bit-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877298" comment="gtk3-immodule-thai-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877299" comment="gtk3-immodule-thai-32bit-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877300" comment="gtk3-immodule-tigrigna-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877301" comment="gtk3-immodule-tigrigna-32bit-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877302" comment="gtk3-immodule-vietnamese-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877303" comment="gtk3-immodule-vietnamese-32bit-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877304" comment="gtk3-immodule-wayland-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877305" comment="gtk3-immodule-wayland-32bit-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877306" comment="gtk3-immodule-xim-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877307" comment="gtk3-immodule-xim-32bit-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877308" comment="gtk3-lang-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877309" comment="gtk3-schema-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877310" comment="gtk3-tools-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877311" comment="gtk3-tools-32bit-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877312" comment="libgtk-3-0-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877313" comment="libgtk-3-0-32bit-3.24.34-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877314" comment="typelib-1_0-Gtk-3_0-3.24.34-150400.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4877" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226469" ref_url="https://bugzilla.suse.com/1226469" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-37891" ref_url="https://www.suse.com/security/cve/CVE-2024-37891/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2662-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036186.html" source="SUSE-SU"/>
		<description>
This update for python-urllib3 fixes the following issues:

- CVE-2024-37891: Fixed proxy-authorization request header is not stripped during cross-origin redirects (bsc#1226469)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1226469">SUSE bug 1226469</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-37891/">CVE-2024-37891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37891">CVE-2024-37891 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877315" comment="python3-urllib3-1.25.10-150300.4.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4878" version="1" class="patch">
	<metadata>
		<title>Security update for orc (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228184" ref_url="https://bugzilla.suse.com/1228184" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-40897" ref_url="https://www.suse.com/security/cve/CVE-2024-40897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2663-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036185.html" source="SUSE-SU"/>
		<description>
This update for orc fixes the following issues:

- CVE-2024-40897: Fixed stack-based buffer overflow in the orc compiler when formatting error messages for certain input files (bsc#1228184)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1228184">SUSE bug 1228184</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40897/">CVE-2024-40897 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40897">CVE-2024-40897 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877316" comment="liborc-0_4-0-0.4.28-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877317" comment="liborc-0_4-0-32bit-0.4.28-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877318" comment="orc-0.4.28-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877319" comment="orc-doc-0.4.28-150000.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4879" version="1" class="patch">
	<metadata>
		<title>Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="SUSE-SU-2024:2668-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036180.html" source="SUSE-SU"/>
		<description>
This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer fixes the following issues:

Update to version 1.59.0

* Release notes https://github.com/kubevirt/containerized-data-importer/releases/tag/v1.59.0
* Release notes https://github.com/kubevirt/containerized-data-importer/releases/tag/v1.58.1
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877320" comment="containerized-data-importer-api-1.59.0-150500.6.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877321" comment="containerized-data-importer-cloner-1.59.0-150500.6.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877322" comment="containerized-data-importer-controller-1.59.0-150500.6.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877323" comment="containerized-data-importer-importer-1.59.0-150500.6.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877324" comment="containerized-data-importer-manifests-1.59.0-150500.6.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877325" comment="containerized-data-importer-operator-1.59.0-150500.6.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877326" comment="containerized-data-importer-uploadproxy-1.59.0-150500.6.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877327" comment="containerized-data-importer-uploadserver-1.59.0-150500.6.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877328" comment="obs-service-cdi_containers_meta-1.59.0-150500.6.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4880" version="1" class="patch">
	<metadata>
		<title>Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container, virt-pr-helper-container (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="SUSE-SU-2024:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019056.html" source="SUSE-SU"/>
		<description>
This update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container, virt-pr-helper-container fixes the following issues:

- Update to version 1.2.2

  Release notes https://github.com/kubevirt/kubevirt/releases/tag/v1.2.2
  Release notes https://github.com/kubevirt/kubevirt/releases/tag/v1.2.1
  Release notes https://github.com/kubevirt/kubevirt/releases/tag/v1.2.0
- Use predefined configuration files for libvirt
- Install psmisc (provides killall for tests)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2024-07-30"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877329" comment="kubevirt-container-disk-1.2.2-150500.8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877330" comment="kubevirt-manifests-1.2.2-150500.8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877331" comment="kubevirt-tests-1.2.2-150500.8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877332" comment="kubevirt-virt-api-1.2.2-150500.8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877333" comment="kubevirt-virt-controller-1.2.2-150500.8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877334" comment="kubevirt-virt-exportproxy-1.2.2-150500.8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877335" comment="kubevirt-virt-exportserver-1.2.2-150500.8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877336" comment="kubevirt-virt-handler-1.2.2-150500.8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877337" comment="kubevirt-virt-launcher-1.2.2-150500.8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877338" comment="kubevirt-virt-operator-1.2.2-150500.8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877339" comment="kubevirt-virtctl-1.2.2-150500.8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877340" comment="obs-service-kubevirt_containers_meta-1.2.2-150500.8.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4881" version="1" class="patch">
	<metadata>
		<title>Recommended update for mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214980" ref_url="https://bugzilla.suse.com/1214980" source="BUGZILLA"/>
		<reference ref_id="1222804" ref_url="https://bugzilla.suse.com/1222804" source="BUGZILLA"/>
		<reference ref_id="1222807" ref_url="https://bugzilla.suse.com/1222807" source="BUGZILLA"/>
		<reference ref_id="1222811" ref_url="https://bugzilla.suse.com/1222811" source="BUGZILLA"/>
		<reference ref_id="1222813" ref_url="https://bugzilla.suse.com/1222813" source="BUGZILLA"/>
		<reference ref_id="1222814" ref_url="https://bugzilla.suse.com/1222814" source="BUGZILLA"/>
		<reference ref_id="1222821" ref_url="https://bugzilla.suse.com/1222821" source="BUGZILLA"/>
		<reference ref_id="1222822" ref_url="https://bugzilla.suse.com/1222822" source="BUGZILLA"/>
		<reference ref_id="1222826" ref_url="https://bugzilla.suse.com/1222826" source="BUGZILLA"/>
		<reference ref_id="1222828" ref_url="https://bugzilla.suse.com/1222828" source="BUGZILLA"/>
		<reference ref_id="1222830" ref_url="https://bugzilla.suse.com/1222830" source="BUGZILLA"/>
		<reference ref_id="1222833" ref_url="https://bugzilla.suse.com/1222833" source="BUGZILLA"/>
		<reference ref_id="1222834" ref_url="https://bugzilla.suse.com/1222834" source="BUGZILLA"/>
		<reference ref_id="1223724" ref_url="https://bugzilla.suse.com/1223724" source="BUGZILLA"/>
		<reference ref_id="1224113" ref_url="https://bugzilla.suse.com/1224113" source="BUGZILLA"/>
		<reference ref_id="1224115" ref_url="https://bugzilla.suse.com/1224115" source="BUGZILLA"/>
		<reference ref_id="1224116" ref_url="https://bugzilla.suse.com/1224116" source="BUGZILLA"/>
		<reference ref_id="1224118" ref_url="https://bugzilla.suse.com/1224118" source="BUGZILLA"/>
		<reference ref_id="1227918" ref_url="https://bugzilla.suse.com/1227918" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5388" ref_url="https://www.suse.com/security/cve/CVE-2023-5388/" source="CVE"/>
		<reference ref_id="SUSE-RU-2024:2684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036227.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

- Fixed startup crash of Firefox when using FIPS-mode (bsc#1223724).
- Added 'Provides: nss' so other RPMs that require 'nss' can
  be installed (jira PED-6358).

- FIPS: added safe memsets (bsc#1222811)
- FIPS: restrict AES-GCM (bsc#1222830)
- FIPS: Updated FIPS approved cipher lists (bsc#1222813, bsc#1222814, bsc#1222821, bsc#1222822, bsc#1224118)
- FIPS: Updated FIPS self tests (bsc#1222807, bsc#1222828, bsc#1222834)
- FIPS: Updated FIPS approved cipher lists (bsc#1222804, bsc#1222826, bsc#1222833, bsc#1224113, bsc#1224115, bsc#1224116)

- Require `sed` for mozilla-nss-sysinit, as setup-nsssysinit.sh 
  depends on it and will create a broken, empty config, if sed is
  missing (bsc#1227918)

Update to NSS 3.101.2:

* bmo#1905691 - ChaChaXor to return after the function



update to NSS 3.101.1:

* GLOBALTRUST 2020: Set Distrust After for TLS and S/MIME.

update to NSS 3.101:

* add diagnostic assertions for SFTKObject refcount.
* freeing the slot in DeleteCertAndKey if authentication failed
* fix formatting issues.
* Add Firmaprofesional CA Root-A Web to NSS.
* remove invalid acvp fuzz test vectors.
* pad short P-384 and P-521 signatures gtests.
* remove unused FreeBL ECC code.
* pad short P-384 and P-521 signatures.
* be less strict about ECDSA private key length.
* Integrate HACL* P-521.
* Integrate HACL* P-384.
* memory leak in create_objects_from_handles.
* ensure all input is consumed in a few places in mozilla::pkix
* SMIME/CMS and PKCS #12 do not integrate with modern NSS policy
* clean up escape handling
* Use lib::pkix as default validator instead of the old-one
* Need to add high level support for PQ signing.
* Certificate Compression: changing the allocation/freeing of buffer + Improving the documentation
* SMIME/CMS and PKCS #12 do not integrate with modern NSS policy
* Allow for non-full length ecdsa signature when using softoken
* Modification of .taskcluster.yml due to mozlint indent defects
* Implement support for PBMAC1 in PKCS#12
* disable VLA warnings for fuzz builds.
* remove redundant AllocItem implementation.
* add PK11_ReadDistrustAfterAttribute.
* - Clang-formatting of SEC_GetMgfTypeByOidTag update
* Set SEC_ERROR_LIBRARY_FAILURE on self-test failure
* sftk_getParameters(): Fix fallback to default variable after error with configfile.
* Switch to the mozillareleases/image_builder image

- switch from ec_field_GFp to ec_field_plain

Update to NSS 3.100:

* merge pk11_kyberSlotList into pk11_ecSlotList for faster Xyber operations.
* remove ckcapi.
* avoid a potential PK11GenericObject memory leak.
* Remove incomplete ESDH code.
* Decrypt RSA OAEP encrypted messages.
* Fix certutil CRLDP URI code.
* Don't set CKA_DERIVE for CKK_EC_EDWARDS private keys.
* Add ability to encrypt and decrypt CMS messages using ECDH.
* Correct Templates for key agreement in smime/cmsasn.c.
* Moving the decodedCert allocation to NSS.
* Allow developers to speed up repeated local execution of NSS tests that depend on certificates.

Update to NSS 3.99:

* Removing check for message len in ed25519 (bmo#1325335)
* add ed25519 to SECU_ecName2params. (bmo#1884276)
* add EdDSA wycheproof tests. (bmo#1325335)
* nss/lib layer code for EDDSA. (bmo#1325335)
* Adding EdDSA implementation. (bmo#1325335)
* Exporting Certificate Compression types (bmo#1881027)
* Updating ACVP docker to rust 1.74 (bmo#1880857)
* Updating HACL* to 0f136f28935822579c244f287e1d2a1908a7e552 (bmo#1325335)
* Add NSS_CMSRecipient_IsSupported. (bmo#1877730)

Update to NSS 3.98:

* (CVE-2023-5388) Timing attack against RSA decryption in TLS
* Certificate Compression: enabling the check that the compression was advertised
* Move Windows workers to nss-1/b-win2022-alpha
* Remove Email trust bit from OISTE WISeKey Global Root GC CA
* Replace `distutils.spawn.find_executable` with `shutil.which` within `mach` in `nss`
* Certificate Compression: Updating nss_bogo_shim to support Certificate compression
* TLS Certificate Compression (RFC 8879) Implementation
* Add valgrind annotations to freebl kyber operations for constant-time execution tests
* Set nssckbi version number to 2.66
* Add Telekom Security roots
* Add D-Trust 2022 S/MIME roots
* Remove expired Security Communication RootCA1 root
* move keys to a slot that supports concatenation in PK11_ConcatSymKeys
* remove unmaintained tls-interop tests
* bogo: add support for the -ipv6 and -shim-id shim flags
* bogo: add support for the -curves shim flag and update Kyber expectations
* bogo: adjust expectation for a key usage bit test
* mozpkix: add option to ignore invalid subject alternative names
* Fix selfserv not stripping `publicname:` from -X value
* take ownership of ecckilla shims
* add valgrind annotations to freebl/ec.c
* PR_INADDR_ANY needs PR_htonl before assignment to inet.ip
* Update zlib to 1.3.1

Update to NSS 3.97:

* make Xyber768d00 opt-in by policy
* add libssl support for xyber768d00
* add PK11_ConcatSymKeys
* add Kyber and a PKCS#11 KEM interface to softoken
* add a FreeBL API for Kyber
* part 2: vendor github.com/pq-crystals/kyber/commit/e0d1c6ff
* part 1: add a script for vendoring kyber from pq-crystals repo
* Removing the calls to RSA Blind from loader.*
* fix worker type for level3 mac tasks
* RSA Blind implementation
* Remove DSA selftests
* read KWP testvectors from JSON
* Backed out changeset dcb174139e4f
* Fix CKM_PBE_SHA1_DES2_EDE_CBC derivation
* Wrap CC shell commands in gyp expansions

Update to NSS 3.96.1:

* Use pypi dependencies for MacOS worker in ./build_gyp.sh
* p7sign: add -a hash and -u certusage (also p7verify cleanups)
* add a defensive check for large ssl_DefSend return values
* Add dependency to the taskcluster script for Darwin
* Upgrade version of the MacOS worker for the CI

Update to NSS 3.95:

* Bump builtins version number.
* Remove Email trust bit from Autoridad de Certificacion Firmaprofesional CIF A62634068 root cert.
* Remove 4 DigiCert (Symantec/Verisign) Root Certificates
* Remove 3 TrustCor Root Certificates from NSS.
* Remove Camerfirma root certificates from NSS.
* Remove old Autoridad de Certificacion Firmaprofesional Certificate.
* Add four Commscope root certificates to NSS.
* Add TrustAsia Global Root CA G3 and G4 root certificates.
* Include P-384 and P-521 Scalar Validation from HACL*
* Include P-256 Scalar Validation from HACL*.
* After the HACL 256 ECC patch, NSS incorrectly encodes 256 ECC without DER wrapping at the softoken level
* Add means to provide library parameters to C_Initialize
* add OSXSAVE and XCR0 tests to AVX2 detection.
* Typo in ssl3_AppendHandshakeNumber
* Introducing input check of ssl3_AppendHandshakeNumber
* Fix Invalid casts in instance.c

Update to NSS 3.94:

* Updated code and commit ID for HACL*
* update ACVP fuzzed test vector: refuzzed with current NSS
* Softoken C_ calls should use system FIPS setting to select NSC_ or FC_ variants
* NSS needs a database tool that can dump the low level representation of the database
* declare string literals using char in pkixnames_tests.cpp
* avoid implicit conversion for ByteString
* update rust version for acvp docker
* Moving the init function of the mpi_ints before clean-up in ec.c
* P-256 ECDH and ECDSA from HACL*
* Add ACVP test vectors to the repository
* Stop relying on std::basic_string&lt;uint8_t&gt;
* Transpose the PPC_ABI check from Makefile to gyp

Update to NSS 3.93:

* Update zlib in NSS to 1.3.
* softoken: iterate hashUpdate calls for long inputs.
* regenerate NameConstraints test certificates (bsc#1214980).

Update to NSS 3.92:

* Set nssckbi version number to 2.62
* Add 4 Atos TrustedRoot Root CA certificates to NSS
* Add 4 SSL.com Root CA certificates
* Add Sectigo E46 and R46 Root CA certificates
* Add LAWtrust Root CA2 (4096)
* Remove E-Tugra Certification Authority root
* Remove Camerfirma Chambers of Commerce Root.
* Remove Hongkong Post Root CA 1
* Remove E-Tugra Global Root CA ECC v3 and RSA v3
* Avoid redefining BYTE_ORDER on hppa Linux

Update to NSS 3.91:

* Implementation of the HW support check for ADX instruction
* Removing the support of Curve25519
* Fix comment about the addition of ticketSupportsEarlyData
* Adding args to enable-legacy-db build
* dbtests.sh failure in 'certutil dump keys with explicit default trust flags'
* Initialize flags in slot structures
* Improve the length check of RSA input to avoid heap overflow
* Followup Fixes
* avoid processing unexpected inputs by checking for m_exptmod base sign
* add a limit check on order_k to avoid infinite loop
* Update HACL* to commit 5f6051d2
* add SHA3 to cryptohi and softoken
* HACL SHA3
* Disabling ASM C25519 for A but X86_64

Update to NSS 3.90.3:

* GLOBALTRUST 2020: Set Distrust After for TLS and S/MIME.
* clean up escape handling.
* remove redundant AllocItem implementation.
* Disable ASM support for Curve25519.
* Disable ASM support for Curve25519 for all but X86_64. 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-07-31"/>
	<updated date="2024-07-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214980">SUSE bug 1214980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222804">SUSE bug 1222804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222807">SUSE bug 1222807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222811">SUSE bug 1222811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222813">SUSE bug 1222813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222814">SUSE bug 1222814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222821">SUSE bug 1222821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222822">SUSE bug 1222822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222826">SUSE bug 1222826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222828">SUSE bug 1222828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222830">SUSE bug 1222830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222833">SUSE bug 1222833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222834">SUSE bug 1222834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223724">SUSE bug 1223724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224113">SUSE bug 1224113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224115">SUSE bug 1224115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224116">SUSE bug 1224116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224118">SUSE bug 1224118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227918">SUSE bug 1227918</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5388/">CVE-2023-5388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5388">CVE-2023-5388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009877720" comment="libfreebl3-3.101.2-150400.3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877721" comment="libfreebl3-32bit-3.101.2-150400.3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877722" comment="libsoftokn3-3.101.2-150400.3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877723" comment="libsoftokn3-32bit-3.101.2-150400.3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877724" comment="mozilla-nss-3.101.2-150400.3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877725" comment="mozilla-nss-32bit-3.101.2-150400.3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877726" comment="mozilla-nss-certs-3.101.2-150400.3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877727" comment="mozilla-nss-certs-32bit-3.101.2-150400.3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877728" comment="mozilla-nss-devel-3.101.2-150400.3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877729" comment="mozilla-nss-sysinit-3.101.2-150400.3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877730" comment="mozilla-nss-sysinit-32bit-3.101.2-150400.3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009877731" comment="mozilla-nss-tools-3.101.2-150400.3.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4882" version="1" class="patch">
	<metadata>
		<title>Security update for dri3proto, presentproto, wayland-protocols, xwayland (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219892" ref_url="https://bugzilla.suse.com/1219892" source="BUGZILLA"/>
		<reference ref_id="1222309" ref_url="https://bugzilla.suse.com/1222309" source="BUGZILLA"/>
		<reference ref_id="1222310" ref_url="https://bugzilla.suse.com/1222310" source="BUGZILLA"/>
		<reference ref_id="1222312" ref_url="https://bugzilla.suse.com/1222312" source="BUGZILLA"/>
		<reference ref_id="1222442" ref_url="https://bugzilla.suse.com/1222442" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-31080" ref_url="https://www.suse.com/security/cve/CVE-2024-31080/" source="CVE"/>
		<reference ref_id="CVE-2024-31081" ref_url="https://www.suse.com/security/cve/CVE-2024-31081/" source="CVE"/>
		<reference ref_id="CVE-2024-31083" ref_url="https://www.suse.com/security/cve/CVE-2024-31083/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019222.html" source="SUSE-SU"/>
		<description>
This update for dri3proto, presentproto, wayland-protocols, xwayland fixes the following issues:

Changes in presentproto:

* update to version 1.4 (patch generated from xorgproto-2024.1 sources)

Changes in wayland-protocols:

- Update to version 1.36:

  * xdg-dialog: fix missing namespace in protocol name

- Changes from version 1.35:

  * cursor-shape-v1: Does not advertises the list of supported cursors
  * xdg-shell: add missing enum attribute to set_constraint_adjustment
  * xdg-shell: recommend against drawing decorations when tiled
  * tablet-v2: mark as stable
  * staging: add alpha-modifier protocol

- Update to 1.36

  * Fix to the xdg dialog protocol
  * tablet-v2 protocol is now stable
  * alpha-modifier: new protocol
  * Bug fix to the cursor shape documentation
  * The xdg-shell protocol now also explicitly recommends against
    drawing decorations outside of the window geometry when tiled

- Update to 1.34:

  * xdg-dialog: new protocol
  * xdg-toplevel-drag: new protocol
  * Fix typo in ext-foreign-toplevel-list-v1
  * tablet-v2: clarify that name/id events are optional
  * linux-drm-syncobj-v1: new protocol
  * linux-explicit-synchronization-v1: add linux-drm-syncobj note

- Update to version 1.33:

  * xdg-shell: Clarify what a toplevel by default includes
  * linux-dmabuf: sync changes from unstable to stable
  * linux-dmabuf: require all planes to use the same modifier
  * presentation-time: stop referring to Linux/glibc
  * security-context-v1: Make sandbox engine names use reverse-DNS
  * xdg-decoration: remove ambiguous wording in configure event
  * xdg-decoration: fix configure event summary
  * linux-dmabuf: mark as stable
  * linux-dmabuf: add note about implicit sync
  * security-context-v1: Document what can be done with the open
    sockets
  * security-context-v1: Document out of band metadata for flatpak

Changes in dri3proto:

* update to version 1.4 (patch generated from xorgproto-2024.1 sources)

Changes in xwayland:


- Update to bugfix release 24.1.1 for the current stable 24.1
  branch of Xwayland

  * xwayland: fix segment fault in `xwl_glamor_gbm_init_main_dev`
  * os: Explicitly include X11/Xmd.h for CARD32 definition to fix
    building on i686
  * present: On *BSD, epoll-shim is needed to emulate eventfd()
  * xwayland: Stop on first unmapped child
  * xwayland/window-buffers: Promote xwl_window_buffer
  * xwayland/window-buffers: Add xwl_window_buffer_release()
  * xwayland/glamor/gbm: Copy explicit sync code to GLAMOR/GBM
  * xwayland/window-buffers: Use synchronization from GLAMOR/GBM
  * xwayland/window-buffers: Do not always set syncpnts
  * xwayland/window-buffers: Move code to submit pixmaps
  * xwayland/window-buffers: Set syncpnts for all pixmaps
  * xwayland: Move xwl_window disposal to its own function
  * xwayland: Make sure we do not leak xwl_window on destroy
  * wayland/window-buffers: Move buffer disposal to its own function
  * xwayland/window-buffers: optionally force disposal
  * wayland: Force disposal of windows buffers for root on destroy
  * xwayland: Check for pointer in xwl_seat_leave_ptr()
  * xwayland: remove includedir from pkgconfig

- disable DPMS on sle15 due to missing proto package

- Update to feature release 24.1.0
  * This fixes a couple of regressions introduced in the previous release
    candidate versions along with a fix for XTEST emulation with EI.
    + xwayland: Send ei_device_frame on device_scroll_discrete
    + xwayland: Restore the ResizeWindow handler
    + xwayland: Handle rootful resize in ResizeWindow
    + xwayland: Move XRandR emulation to the ResizeWindow hook
    + xwayland: Use correct xwl_window lookup function in xwl_set_shape
- eglstreams has been dropped

- Update to bug fix relesae 23.2.7
  * m4: drop autoconf leftovers
  * xwayland: Send ei_device_frame on device_scroll_discrete
  * xwayland: Call drmFreeDevice for dma-buf default feedback
  * xwayland: Use drmDevicesEqual in xwl_dmabuf_feedback_tranche_done
  * dri3: Free formats in cache_formats_and_modifiers
  * xwayland/glamor: Handle depth 15 in gbm_format_for_depth
  * Revert 'xwayland/glamor: Avoid implicit redirection with depth 32 parent windows'
  * xwayland: Check for outputs before lease devices
  * xwayland: Do not remove output on withdraw if leased

- Update to 23.2.6
  * This is a quick bug fix release to address a regression
    introduced by the fix for CVE-2024-31083 in xwayland-23.2.5.

- Security update 23.2.5 

  This release contains the 3 security fixes that actually apply to
  Xwayland reported in the security advisory of April 3rd 2024

  * CVE-2024-31080
  * CVE-2024-31081
  * CVE-2024-31083

  Additionally, it also contains a couple of other fixes, a copy/paste
  error in the DeviceStateNotify event and a fix to enable buttons with
  pointer gestures for backward compatibility with legacy X11 clients.

- Don't provide xorg-x11-server-source
  * xwayland sources are not meant for a generic server.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219892">SUSE bug 1219892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222309">SUSE bug 1222309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222310">SUSE bug 1222310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222312">SUSE bug 1222312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222442">SUSE bug 1222442</bugzilla>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31080/">CVE-2024-31080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31080">CVE-2024-31080 at NVD</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31081/">CVE-2024-31081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31081">CVE-2024-31081 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31083/">CVE-2024-31083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31083">CVE-2024-31083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878078" comment="dri3proto-devel-1.2-150100.6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4883" version="1" class="patch">
	<metadata>
		<title>Security update for slurm_20_02 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216869" ref_url="https://bugzilla.suse.com/1216869" source="BUGZILLA"/>
		<reference ref_id="1218046" ref_url="https://bugzilla.suse.com/1218046" source="BUGZILLA"/>
		<reference ref_id="1218050" ref_url="https://bugzilla.suse.com/1218050" source="BUGZILLA"/>
		<reference ref_id="1218051" ref_url="https://bugzilla.suse.com/1218051" source="BUGZILLA"/>
		<reference ref_id="1218053" ref_url="https://bugzilla.suse.com/1218053" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-49933" ref_url="https://www.suse.com/security/cve/CVE-2023-49933/" source="CVE"/>
		<reference ref_id="CVE-2023-49936" ref_url="https://www.suse.com/security/cve/CVE-2023-49936/" source="CVE"/>
		<reference ref_id="CVE-2023-49937" ref_url="https://www.suse.com/security/cve/CVE-2023-49937/" source="CVE"/>
		<reference ref_id="CVE-2023-49938" ref_url="https://www.suse.com/security/cve/CVE-2023-49938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017819.html" source="SUSE-SU"/>
		<description>
This update for slurm_20_02 fixes the following issues:

Security fixes:

- CVE-2023-49933: Prevent message extension attacks that could bypass the message hash. (bsc#1218046)
- CVE-2023-49936: Prevent NULL pointer dereference on `size_valp` overflow. (bsc#1218050)
- CVE-2023-49937: Prevent double-xfree() on error in `_unpack_node_reg_resp()`. (bsc#1218051)
- CVE-2023-49938: Prevent modified `sbcast` RPCs from opening a file with the wrong group permissions. (bsc#1218053)

Other fixes:

- Fix slurm upgrading to incompatible versions (bsc#1216869).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-31"/>
	<updated date="2024-01-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216869">SUSE bug 1216869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218046">SUSE bug 1218046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218050">SUSE bug 1218050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218051">SUSE bug 1218051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218053">SUSE bug 1218053</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-49933/">CVE-2023-49933 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49933">CVE-2023-49933 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-49936/">CVE-2023-49936 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49936">CVE-2023-49936 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-49937/">CVE-2023-49937 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49937">CVE-2023-49937 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-49938/">CVE-2023-49938 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49938">CVE-2023-49938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844819" comment="libnss_slurm2_20_02-20.02.7-150100.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844820" comment="libpmi0_20_02-20.02.7-150100.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844821" comment="perl-slurm_20_02-20.02.7-150100.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844822" comment="slurm_20_02-20.02.7-150100.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844823" comment="slurm_20_02-auth-none-20.02.7-150100.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844824" comment="slurm_20_02-config-20.02.7-150100.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844825" comment="slurm_20_02-config-man-20.02.7-150100.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844826" comment="slurm_20_02-cray-20.02.7-150100.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844827" comment="slurm_20_02-devel-20.02.7-150100.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844828" comment="slurm_20_02-doc-20.02.7-150100.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844829" comment="slurm_20_02-hdf5-20.02.7-150100.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844830" comment="slurm_20_02-lua-20.02.7-150100.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844831" comment="slurm_20_02-munge-20.02.7-150100.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844832" comment="slurm_20_02-node-20.02.7-150100.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844833" comment="slurm_20_02-openlava-20.02.7-150100.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844834" comment="slurm_20_02-pam_slurm-20.02.7-150100.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844835" comment="slurm_20_02-plugins-20.02.7-150100.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844836" comment="slurm_20_02-rest-20.02.7-150100.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844837" comment="slurm_20_02-seff-20.02.7-150100.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844838" comment="slurm_20_02-sjstat-20.02.7-150100.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844839" comment="slurm_20_02-slurmdbd-20.02.7-150100.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844840" comment="slurm_20_02-sql-20.02.7-150100.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844841" comment="slurm_20_02-sview-20.02.7-150100.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844842" comment="slurm_20_02-testsuite-20.02.7-150100.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844843" comment="slurm_20_02-torque-20.02.7-150100.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844844" comment="slurm_20_02-webdoc-20.02.7-150100.3.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4884" version="1" class="patch">
	<metadata>
		<title>Security update for patch (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1167721" ref_url="https://bugzilla.suse.com/1167721" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20633" ref_url="https://www.suse.com/security/cve/CVE-2019-20633/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2780-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036341.html" source="SUSE-SU"/>
		<description>
This update for patch fixes the following issues:

- CVE-2019-20633: Fixed double-free/OOB read in pch.c (bsc#1167721)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1167721">SUSE bug 1167721</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20633/">CVE-2019-20633 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-20633">CVE-2019-20633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878079" comment="patch-2.7.6-150000.5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4885" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228046" ref_url="https://bugzilla.suse.com/1228046" source="BUGZILLA"/>
		<reference ref_id="1228047" ref_url="https://bugzilla.suse.com/1228047" source="BUGZILLA"/>
		<reference ref_id="1228048" ref_url="https://bugzilla.suse.com/1228048" source="BUGZILLA"/>
		<reference ref_id="1228050" ref_url="https://bugzilla.suse.com/1228050" source="BUGZILLA"/>
		<reference ref_id="1228051" ref_url="https://bugzilla.suse.com/1228051" source="BUGZILLA"/>
		<reference ref_id="1228052" ref_url="https://bugzilla.suse.com/1228052" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131/" source="CVE"/>
		<reference ref_id="CVE-2024-21138" ref_url="https://www.suse.com/security/cve/CVE-2024-21138/" source="CVE"/>
		<reference ref_id="CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140/" source="CVE"/>
		<reference ref_id="CVE-2024-21144" ref_url="https://www.suse.com/security/cve/CVE-2024-21144/" source="CVE"/>
		<reference ref_id="CVE-2024-21145" ref_url="https://www.suse.com/security/cve/CVE-2024-21145/" source="CVE"/>
		<reference ref_id="CVE-2024-21147" ref_url="https://www.suse.com/security/cve/CVE-2024-21147/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036650.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version jdk8u422 (icedtea-3.32.0):

* Security fixes
  + JDK-8314794, CVE-2024-21131, bsc#1228046: Improve UTF8 String supports
  + JDK-8319859, CVE-2024-21138, bsc#1228047: Better symbol storage
  + JDK-8320097: Improve Image transformations
  + JDK-8320548, CVE-2024-21140, bsc#1228048: Improved loop handling
  + JDK-8322106, CVE-2024-21144, bsc#1228050: Enhance Pack 200 loading
  + JDK-8323231, CVE-2024-21147, bsc#1228052: Improve array management
  + JDK-8323390: Enhance mask blit functionality
  + JDK-8324559, CVE-2024-21145, bsc#1228051: Improve 2D image handling
  + JDK-8325600: Better symbol storage
* Import of OpenJDK 8 u422 build 05
  + JDK-8025439: [TEST BUG] [macosx]
    PrintServiceLookup.lookupPrintServices doesn't work properly
    since jdk8b105
  + JDK-8069389: CompilerOracle prefix wildcarding is broken for
    long strings
  + JDK-8159454: [TEST_BUG] javax/swing/ToolTipManager/7123767/
    /bug7123767.java: number of checked graphics configurations
    should be limited
  + JDK-8198321: javax/swing/JEditorPane/5076514/bug5076514.java fails
  + JDK-8203691: [TESTBUG] Test
    /runtime/containers/cgroup/PlainRead.java fails
  + JDK-8205407: [windows, vs&lt;2017] C4800 after 8203197
  + JDK-8235834: IBM-943 charset encoder needs updating
  + JDK-8239965: XMLEncoder/Test4625418.java fails due to 'Error:
    Cp943 - can't read properly'
  + JDK-8240756: [macos] SwingSet2:TableDemo:Printed Japanese
    characters were garbled
  + JDK-8256152: tests fail because of ambiguous method resolution
  + JDK-8258855: Two tests sun/security/krb5/auto/
    /ReplayCacheTestProc.java and ReplayCacheTestProcWithMD5.java
    failed on OL8.3
  + JDK-8262017: C2: assert(n != __null) failed: Bad immediate
    dominator info.
  + JDK-8268916: Tests for AffirmTrust roots
  + JDK-8278067: Make HttpURLConnection default keep alive
    timeout configurable
  + JDK-8291226: Create Test Cases to cover scenarios for
    JDK-8278067
  + JDK-8291637: HttpClient default keep alive timeout not
    followed if server sends invalid value
  + JDK-8291638: Keep-Alive timeout of 0 should close connection
    immediately
  + JDK-8293562: KeepAliveCache Blocks Threads while Closing
    Connections
  + JDK-8303466: C2: failed: malformed control flow. Limit type
    made precise with MaxL/MinL
  + JDK-8304074: [JMX] Add an approximation of total bytes
    allocated on the Java heap by the JVM
  + JDK-8313081: MonitoringSupport_lock should be unconditionally
    initialized after 8304074
  + JDK-8315020: The macro definition for LoongArch64 zero build
    is not accurate.
  + JDK-8316138: Add GlobalSign 2 TLS root certificates
  + JDK-8318410: jdk/java/lang/instrument/BootClassPath/
    /BootClassPathTest.sh fails on Japanese Windows
  + JDK-8320005: Allow loading of shared objects with .a
    extension on AIX
  + JDK-8324185: [8u] Accept Xcode 12+ builds on macOS
  + JDK-8325096: Test java/security/cert/CertPathBuilder/akiExt/
    /AKISerialNumber.java is failing
  + JDK-8325927: [8u] Backport of JDK-8170552 missed part of the test
  + JDK-8326686: Bump update version of OpenJDK: 8u422
  + JDK-8327440: Fix 'bad source file' error during beaninfo
    generation
  + JDK-8328809: [8u] Problem list some CA tests
  + JDK-8328825: Google CAInterop test failures
  + JDK-8329544: [8u] sun/security/krb5/auto/
    /ReplayCacheTestProc.java cannot find the testlibrary
  + JDK-8331791: [8u] AIX build break from JDK-8320005 backport
  + JDK-8331980: [8u] Problem list CAInterop.java#certignarootca test
  + JDK-8335552: [8u] JDK-8303466 backport to 8u requires 3
    ::Identity signature fixes
* Bug fixes
  + JDK-8331730: [8u] GHA: update sysroot for cross builds to
    Debian bullseye
  + JDK-8333669: [8u] GHA: Dead VS2010 download link
  + JDK-8318039: GHA: Bump macOS and Xcode versions
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1228046">SUSE bug 1228046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228047">SUSE bug 1228047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228048">SUSE bug 1228048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228050">SUSE bug 1228050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228051">SUSE bug 1228051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228052">SUSE bug 1228052</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21138/">CVE-2024-21138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21138">CVE-2024-21138 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21144/">CVE-2024-21144 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21144">CVE-2024-21144 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21145/">CVE-2024-21145 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21145">CVE-2024-21145 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-21147/">CVE-2024-21147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21147">CVE-2024-21147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009878080" comment="java-1_8_0-openjdk-1.8.0.422-150000.3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878081" comment="java-1_8_0-openjdk-accessibility-1.8.0.422-150000.3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878082" comment="java-1_8_0-openjdk-demo-1.8.0.422-150000.3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878083" comment="java-1_8_0-openjdk-devel-1.8.0.422-150000.3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878084" comment="java-1_8_0-openjdk-headless-1.8.0.422-150000.3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878085" comment="java-1_8_0-openjdk-javadoc-1.8.0.422-150000.3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878086" comment="java-1_8_0-openjdk-src-1.8.0.422-150000.3.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4886" version="1" class="patch">
	<metadata>
		<title>Security update for libnbd (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228872" ref_url="https://bugzilla.suse.com/1228872" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-7383" ref_url="https://www.suse.com/security/cve/CVE-2024-7383/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036332.html" source="SUSE-SU"/>
		<description>
This update for libnbd fixes the following issues:

- CVE-2024-7383: Fixed incorrect verification of a NBD server's certificate when using TLS to connect to the server (bsc#1228872)

Other fixes:
- Update to version 1.18.5.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1228872">SUSE bug 1228872</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7383/">CVE-2024-7383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7383">CVE-2024-7383 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009878087" comment="libnbd-1.18.5-150300.8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878088" comment="libnbd-bash-completion-1.18.5-150300.8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878089" comment="libnbd-devel-1.18.5-150300.8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878090" comment="libnbd0-1.18.5-150300.8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878091" comment="nbdfuse-1.18.5-150300.8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878092" comment="python3-libnbd-1.18.5-150300.8.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4887" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226316" ref_url="https://bugzilla.suse.com/1226316" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6600" ref_url="https://www.suse.com/security/cve/CVE-2024-6600/" source="CVE"/>
		<reference ref_id="CVE-2024-6601" ref_url="https://www.suse.com/security/cve/CVE-2024-6601/" source="CVE"/>
		<reference ref_id="CVE-2024-6602" ref_url="https://www.suse.com/security/cve/CVE-2024-6602/" source="CVE"/>
		<reference ref_id="CVE-2024-6603" ref_url="https://www.suse.com/security/cve/CVE-2024-6603/" source="CVE"/>
		<reference ref_id="CVE-2024-6604" ref_url="https://www.suse.com/security/cve/CVE-2024-6604/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2790-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036331.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Update to Mozilla Thunderbird 115.13 (MFSA 2024-31, bsc#1226316):

Security fixes:

- CVE-2024-6600: Memory corruption in WebGL API (bmo#1888340)
- CVE-2024-6601: Race condition in permission assignment (bmo#1890748)
- CVE-2024-6602: Memory corruption in NSS (bmo#1895032)
- CVE-2024-6603: Memory corruption in thread creation (bmo#1895081)
- CVE-2024-6604: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, Thunderbird 128, and Thunderbird 115.13 (bmo#1748105, bmo#1837550, bmo#1884266)

Other fixes:

- fixed: After starting Thunderbird, the message list position  was sometimes set to an incorrect position (bmo#1896009)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-06"/>
	<updated date="2024-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1226316">SUSE bug 1226316</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6600/">CVE-2024-6600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6600">CVE-2024-6600 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-6601/">CVE-2024-6601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6601">CVE-2024-6601 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6602/">CVE-2024-6602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6602">CVE-2024-6602 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6603/">CVE-2024-6603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6603">CVE-2024-6603 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6604/">CVE-2024-6604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6604">CVE-2024-6604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009878093" comment="MozillaThunderbird-115.13.0-150200.8.171.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878094" comment="MozillaThunderbird-translations-common-115.13.0-150200.8.171.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878095" comment="MozillaThunderbird-translations-other-115.13.0-150200.8.171.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4888" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg-4 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223304" ref_url="https://bugzilla.suse.com/1223304" source="BUGZILLA"/>
		<reference ref_id="1227296" ref_url="https://bugzilla.suse.com/1227296" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-51798" ref_url="https://www.suse.com/security/cve/CVE-2023-51798/" source="CVE"/>
		<reference ref_id="CVE-2024-32230" ref_url="https://www.suse.com/security/cve/CVE-2024-32230/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019132.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg-4 fixes the following issues:

- CVE-2024-32230: Fixed buffer overflow due to negative-size-param bug in load_input_picture() (bsc#1227296).
- CVE-2023-51798: Fixed floating point exception in the via the interpolate function in libavfilter/vf_minterpolate.c (bsc#1223304).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-07"/>
	<updated date="2024-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1223304">SUSE bug 1223304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227296">SUSE bug 1227296</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-51798/">CVE-2023-51798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51798">CVE-2023-51798 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-32230/">CVE-2024-32230 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32230">CVE-2024-32230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009878213" comment="ffmpeg-4-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878214" comment="ffmpeg-4-libavcodec-devel-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878215" comment="ffmpeg-4-libavdevice-devel-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878216" comment="ffmpeg-4-libavfilter-devel-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878217" comment="ffmpeg-4-libavformat-devel-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878218" comment="ffmpeg-4-libavresample-devel-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878219" comment="ffmpeg-4-libavutil-devel-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878220" comment="ffmpeg-4-libpostproc-devel-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878221" comment="ffmpeg-4-libswresample-devel-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878222" comment="ffmpeg-4-libswscale-devel-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878223" comment="ffmpeg-4-private-devel-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878224" comment="libavcodec58_134-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878225" comment="libavcodec58_134-32bit-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878226" comment="libavdevice58_13-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878227" comment="libavdevice58_13-32bit-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878228" comment="libavfilter7_110-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878229" comment="libavfilter7_110-32bit-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878230" comment="libavformat58_76-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878231" comment="libavformat58_76-32bit-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878232" comment="libavresample4_0-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878233" comment="libavresample4_0-32bit-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878234" comment="libavutil56_70-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878235" comment="libavutil56_70-32bit-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878236" comment="libpostproc55_9-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878237" comment="libpostproc55_9-32bit-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878238" comment="libswresample3_9-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878239" comment="libswresample3_9-32bit-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878240" comment="libswscale5_9-4.4-150400.3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878241" comment="libswscale5_9-32bit-4.4-150400.3.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4889" version="1" class="patch">
	<metadata>
		<title>Security update for shadow (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228770" ref_url="https://bugzilla.suse.com/1228770" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-4235" ref_url="https://www.suse.com/security/cve/CVE-2013-4235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019131.html" source="SUSE-SU"/>
		<description>
This update for shadow fixes the following issues:

- Fixed not copying of skel files (bsc#1228770)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-07"/>
	<updated date="2024-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1228770">SUSE bug 1228770</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2013-4235/">CVE-2013-4235 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2013-4235">CVE-2013-4235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009878242" comment="login_defs-4.8.1-150400.10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878243" comment="shadow-4.8.1-150400.10.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4890" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227296" ref_url="https://bugzilla.suse.com/1227296" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-32230" ref_url="https://www.suse.com/security/cve/CVE-2024-32230/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019137.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg fixes the following issues:

- CVE-2024-32230: Fixed buffer overflow due to negative-size-param bug at libavcodec/mpegvideo_enc.c in load_input_picture (bsc#1227296)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-07"/>
	<updated date="2024-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1227296">SUSE bug 1227296</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-32230/">CVE-2024-32230 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32230">CVE-2024-32230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009878244" comment="ffmpeg-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878245" comment="ffmpeg-private-devel-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878246" comment="libavcodec-devel-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878247" comment="libavcodec57-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878248" comment="libavcodec57-32bit-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878249" comment="libavdevice-devel-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878250" comment="libavdevice57-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878251" comment="libavdevice57-32bit-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878252" comment="libavfilter-devel-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878253" comment="libavfilter6-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878254" comment="libavfilter6-32bit-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878255" comment="libavformat-devel-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878256" comment="libavformat57-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878257" comment="libavformat57-32bit-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878258" comment="libavresample-devel-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878259" comment="libavresample3-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878260" comment="libavresample3-32bit-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878261" comment="libavutil-devel-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878262" comment="libavutil55-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878263" comment="libavutil55-32bit-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878264" comment="libpostproc-devel-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878265" comment="libpostproc54-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878266" comment="libpostproc54-32bit-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878267" comment="libswresample-devel-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878268" comment="libswresample2-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878269" comment="libswresample2-32bit-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878270" comment="libswscale-devel-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878271" comment="libswscale4-3.4.2-150200.11.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878272" comment="libswscale4-32bit-3.4.2-150200.11.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4891" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1136468" ref_url="https://bugzilla.suse.com/1136468" source="BUGZILLA"/>
		<reference ref_id="1198398" ref_url="https://bugzilla.suse.com/1198398" source="BUGZILLA"/>
		<reference ref_id="1228629" ref_url="https://bugzilla.suse.com/1228629" source="BUGZILLA"/>
		<reference ref_id="1228630" ref_url="https://bugzilla.suse.com/1228630" source="BUGZILLA"/>
		<reference ref_id="1228631" ref_url="https://bugzilla.suse.com/1228631" source="BUGZILLA"/>
		<reference ref_id="1228632" ref_url="https://bugzilla.suse.com/1228632" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12308" ref_url="https://www.suse.com/security/cve/CVE-2019-12308/" source="CVE"/>
		<reference ref_id="CVE-2022-28346" ref_url="https://www.suse.com/security/cve/CVE-2022-28346/" source="CVE"/>
		<reference ref_id="CVE-2024-41989" ref_url="https://www.suse.com/security/cve/CVE-2024-41989/" source="CVE"/>
		<reference ref_id="CVE-2024-41990" ref_url="https://www.suse.com/security/cve/CVE-2024-41990/" source="CVE"/>
		<reference ref_id="CVE-2024-41991" ref_url="https://www.suse.com/security/cve/CVE-2024-41991/" source="CVE"/>
		<reference ref_id="CVE-2024-42005" ref_url="https://www.suse.com/security/cve/CVE-2024-42005/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019139.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

- CVE-2024-42005: Fixed SQL injection in QuerySet.values() and values_list() (bsc#1228629)
- CVE-2024-41989: Fixed Memory exhaustion in django.utils.numberformat.floatformat() (bsc#1228630)
- CVE-2024-41990: Fixed denial-of-service vulnerability in django.utils.html.urlize() (bsc#1228631)
- CVE-2024-41991: Fixed another denial-of-service vulnerability in django.utils.html.urlize() (bsc#1228632)
- CVE-2022-28346: Fixed SQL injection in QuerySet.annotate(),aggregate() and extra() (bsc#1198398)
- CVE-2019-12308: Fixed XSS in AdminURLFieldWidget (bsc#1136468)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-07"/>
	<updated date="2024-08-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1136468">SUSE bug 1136468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198398">SUSE bug 1198398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228629">SUSE bug 1228629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228630">SUSE bug 1228630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228631">SUSE bug 1228631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228632">SUSE bug 1228632</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-12308/">CVE-2019-12308 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12308">CVE-2019-12308 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28346/">CVE-2022-28346 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28346">CVE-2022-28346 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41989/">CVE-2024-41989 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41989">CVE-2024-41989 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41990/">CVE-2024-41990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41990">CVE-2024-41990 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41991/">CVE-2024-41991 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41991">CVE-2024-41991 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-42005/">CVE-2024-42005 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42005">CVE-2024-42005 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878273" comment="python3-Django-2.0.7-150000.1.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4892" version="1" class="patch">
	<metadata>
		<title>Security update for slurm_22_05 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216869" ref_url="https://bugzilla.suse.com/1216869" source="BUGZILLA"/>
		<reference ref_id="1217711" ref_url="https://bugzilla.suse.com/1217711" source="BUGZILLA"/>
		<reference ref_id="1218046" ref_url="https://bugzilla.suse.com/1218046" source="BUGZILLA"/>
		<reference ref_id="1218050" ref_url="https://bugzilla.suse.com/1218050" source="BUGZILLA"/>
		<reference ref_id="1218051" ref_url="https://bugzilla.suse.com/1218051" source="BUGZILLA"/>
		<reference ref_id="1218053" ref_url="https://bugzilla.suse.com/1218053" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-49933" ref_url="https://www.suse.com/security/cve/CVE-2023-49933/" source="CVE"/>
		<reference ref_id="CVE-2023-49936" ref_url="https://www.suse.com/security/cve/CVE-2023-49936/" source="CVE"/>
		<reference ref_id="CVE-2023-49937" ref_url="https://www.suse.com/security/cve/CVE-2023-49937/" source="CVE"/>
		<reference ref_id="CVE-2023-49938" ref_url="https://www.suse.com/security/cve/CVE-2023-49938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017829.html" source="SUSE-SU"/>
		<description>
This update for slurm_22_05 fixes the following issues:

Update to slurm 22.05.11:

Security fixes:

- CVE-2023-49933: Prevent message extension attacks that could bypass the message hash. (bsc#1218046)
- CVE-2023-49936: Prevent NULL pointer dereference on `size_valp` overflow. (bsc#1218050)
- CVE-2023-49937: Prevent double-xfree() on error in `_unpack_node_reg_resp()`. (bsc#1218051)
- CVE-2023-49938: Prevent modified `sbcast` RPCs from opening a file with the wrong group permissions. (bsc#1218053)

Other fixes:

- Add missing service file for slurmrestd (bsc#1217711).
- Fix slurm upgrading to incompatible versions (bsc#1216869).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-31"/>
	<updated date="2024-01-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216869">SUSE bug 1216869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217711">SUSE bug 1217711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218046">SUSE bug 1218046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218050">SUSE bug 1218050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218051">SUSE bug 1218051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218053">SUSE bug 1218053</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-49933/">CVE-2023-49933 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49933">CVE-2023-49933 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-49936/">CVE-2023-49936 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49936">CVE-2023-49936 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-49937/">CVE-2023-49937 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49937">CVE-2023-49937 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-49938/">CVE-2023-49938 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49938">CVE-2023-49938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844845" comment="libnss_slurm2_22_05-22.05.11-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844846" comment="libpmi0_22_05-22.05.11-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844847" comment="libslurm38-22.05.11-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844848" comment="perl-slurm_22_05-22.05.11-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844849" comment="slurm_22_05-22.05.11-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844850" comment="slurm_22_05-auth-none-22.05.11-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844851" comment="slurm_22_05-config-22.05.11-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844852" comment="slurm_22_05-config-man-22.05.11-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844853" comment="slurm_22_05-cray-22.05.11-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844854" comment="slurm_22_05-devel-22.05.11-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844855" comment="slurm_22_05-doc-22.05.11-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844856" comment="slurm_22_05-hdf5-22.05.11-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844857" comment="slurm_22_05-lua-22.05.11-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844858" comment="slurm_22_05-munge-22.05.11-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844859" comment="slurm_22_05-node-22.05.11-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844860" comment="slurm_22_05-openlava-22.05.11-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844861" comment="slurm_22_05-pam_slurm-22.05.11-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844862" comment="slurm_22_05-plugins-22.05.11-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844863" comment="slurm_22_05-rest-22.05.11-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844864" comment="slurm_22_05-seff-22.05.11-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844865" comment="slurm_22_05-sjstat-22.05.11-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844866" comment="slurm_22_05-slurmdbd-22.05.11-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844867" comment="slurm_22_05-sql-22.05.11-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844868" comment="slurm_22_05-sview-22.05.11-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844869" comment="slurm_22_05-testsuite-22.05.11-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844870" comment="slurm_22_05-torque-22.05.11-150300.7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844871" comment="slurm_22_05-webdoc-22.05.11-150300.7.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4893" version="1" class="patch">
	<metadata>
		<title>Security update for slurm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216869" ref_url="https://bugzilla.suse.com/1216869" source="BUGZILLA"/>
		<reference ref_id="1217711" ref_url="https://bugzilla.suse.com/1217711" source="BUGZILLA"/>
		<reference ref_id="1218046" ref_url="https://bugzilla.suse.com/1218046" source="BUGZILLA"/>
		<reference ref_id="1218049" ref_url="https://bugzilla.suse.com/1218049" source="BUGZILLA"/>
		<reference ref_id="1218050" ref_url="https://bugzilla.suse.com/1218050" source="BUGZILLA"/>
		<reference ref_id="1218051" ref_url="https://bugzilla.suse.com/1218051" source="BUGZILLA"/>
		<reference ref_id="1218053" ref_url="https://bugzilla.suse.com/1218053" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-49933" ref_url="https://www.suse.com/security/cve/CVE-2023-49933/" source="CVE"/>
		<reference ref_id="CVE-2023-49935" ref_url="https://www.suse.com/security/cve/CVE-2023-49935/" source="CVE"/>
		<reference ref_id="CVE-2023-49936" ref_url="https://www.suse.com/security/cve/CVE-2023-49936/" source="CVE"/>
		<reference ref_id="CVE-2023-49937" ref_url="https://www.suse.com/security/cve/CVE-2023-49937/" source="CVE"/>
		<reference ref_id="CVE-2023-49938" ref_url="https://www.suse.com/security/cve/CVE-2023-49938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017828.html" source="SUSE-SU"/>
		<description>
This update for slurm fixes the following issues:

Update to slurm 23.02.6:

Security fixes:

- CVE-2023-49933: Prevent message extension attacks that could bypass the message hash. (bsc#1218046)
- CVE-2023-49935: Prevent message hash bypass in slurmd which can allow an attacker to reuse root-level MUNGE tokens and escalate permissions. (bsc#1218049)
- CVE-2023-49936: Prevent NULL pointer dereference on `size_valp` overflow. (bsc#1218050)
- CVE-2023-49937: Prevent double-xfree() on error in `_unpack_node_reg_resp()`. (bsc#1218051)
- CVE-2023-49938: Prevent modified `sbcast` RPCs from opening a file with the wrong group permissions. (bsc#1218053)

Other fixes:

- Add missing service file for slurmrestd (bsc#1217711).
- Fix slurm upgrading to incompatible versions (bsc#1216869).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-31"/>
	<updated date="2024-01-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216869">SUSE bug 1216869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217711">SUSE bug 1217711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218046">SUSE bug 1218046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218049">SUSE bug 1218049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218050">SUSE bug 1218050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218051">SUSE bug 1218051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218053">SUSE bug 1218053</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-49933/">CVE-2023-49933 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49933">CVE-2023-49933 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-49935/">CVE-2023-49935 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49935">CVE-2023-49935 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-49936/">CVE-2023-49936 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49936">CVE-2023-49936 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-49937/">CVE-2023-49937 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49937">CVE-2023-49937 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-49938/">CVE-2023-49938 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49938">CVE-2023-49938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844872" comment="libnss_slurm2-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844873" comment="libpmi0-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844874" comment="libslurm39-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844875" comment="perl-slurm-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844876" comment="slurm-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844877" comment="slurm-auth-none-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844878" comment="slurm-config-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844879" comment="slurm-config-man-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844880" comment="slurm-cray-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844881" comment="slurm-devel-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844882" comment="slurm-doc-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844883" comment="slurm-hdf5-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844884" comment="slurm-lua-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844885" comment="slurm-munge-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844886" comment="slurm-node-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844887" comment="slurm-openlava-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844888" comment="slurm-pam_slurm-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844889" comment="slurm-plugin-ext-sensors-rrd-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844890" comment="slurm-plugins-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844891" comment="slurm-rest-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844892" comment="slurm-seff-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844893" comment="slurm-sjstat-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844894" comment="slurm-slurmdbd-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844895" comment="slurm-sql-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844896" comment="slurm-sview-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844897" comment="slurm-testsuite-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844898" comment="slurm-torque-23.02.7-150500.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844899" comment="slurm-webdoc-23.02.7-150500.5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4894" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.23 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1194400" ref_url="https://bugzilla.suse.com/1194400" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25743" ref_url="https://www.suse.com/security/cve/CVE-2021-25743/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2858-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036378.html" source="SUSE-SU"/>
		<description>
This update for kubernetes1.23 fixes the following issues:

- CVE-2021-25743: Fixed sanitization of raw data of escape, meta or control sequences before output it to terminal (bsc#1194400)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-08"/>
	<updated date="2024-08-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194400">SUSE bug 1194400</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-25743/">CVE-2021-25743 at SUSE</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25743">CVE-2021-25743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009878571" comment="kubernetes1.23-apiserver-1.23.17-150500.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878572" comment="kubernetes1.23-client-1.23.17-150500.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878573" comment="kubernetes1.23-client-bash-completion-1.23.17-150500.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878574" comment="kubernetes1.23-client-common-1.23.17-150500.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878575" comment="kubernetes1.23-client-fish-completion-1.23.17-150500.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878576" comment="kubernetes1.23-controller-manager-1.23.17-150500.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878577" comment="kubernetes1.23-kubeadm-1.23.17-150500.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878578" comment="kubernetes1.23-kubelet-1.23.17-150500.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878579" comment="kubernetes1.23-kubelet-common-1.23.17-150500.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878580" comment="kubernetes1.23-proxy-1.23.17-150500.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878581" comment="kubernetes1.23-scheduler-1.23.17-150500.3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4895" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.24 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1194400" ref_url="https://bugzilla.suse.com/1194400" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25743" ref_url="https://www.suse.com/security/cve/CVE-2021-25743/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2859-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036377.html" source="SUSE-SU"/>
		<description>
This update for kubernetes1.24 fixes the following issues:
  
- CVE-2021-25743: Fixed sanitization of raw data of escape, meta or control sequences before output it to terminal (bsc#1194400)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-08"/>
	<updated date="2024-08-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194400">SUSE bug 1194400</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-25743/">CVE-2021-25743 at SUSE</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25743">CVE-2021-25743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009878582" comment="kubernetes1.24-apiserver-1.24.17-150500.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878583" comment="kubernetes1.24-client-1.24.17-150500.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878584" comment="kubernetes1.24-client-bash-completion-1.24.17-150500.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878585" comment="kubernetes1.24-client-common-1.24.17-150500.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878586" comment="kubernetes1.24-client-fish-completion-1.24.17-150500.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878587" comment="kubernetes1.24-controller-manager-1.24.17-150500.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878588" comment="kubernetes1.24-kubeadm-1.24.17-150500.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878589" comment="kubernetes1.24-kubelet-1.24.17-150500.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878590" comment="kubernetes1.24-kubelet-common-1.24.17-150500.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878591" comment="kubernetes1.24-proxy-1.24.17-150500.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878592" comment="kubernetes1.24-scheduler-1.24.17-150500.3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4896" version="1" class="patch">
	<metadata>
		<title>Security update for python3-Twisted (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228549" ref_url="https://bugzilla.suse.com/1228549" source="BUGZILLA"/>
		<reference ref_id="1228552" ref_url="https://bugzilla.suse.com/1228552" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-41671" ref_url="https://www.suse.com/security/cve/CVE-2024-41671/" source="CVE"/>
		<reference ref_id="CVE-2024-41810" ref_url="https://www.suse.com/security/cve/CVE-2024-41810/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019163.html" source="SUSE-SU"/>
		<description>
This update for python3-Twisted fixes the following issues:

- CVE-2024-41671: Fixed HTTP pipelined requests processed out of order in twisted.web (bsc#1228549)
- CVE-2024-41810: Fixed reflected XSS via HTML Injection in Redirect Response (bsc#1228552)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-08-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1228549">SUSE bug 1228549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228552">SUSE bug 1228552</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41671/">CVE-2024-41671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41671">CVE-2024-41671 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41810/">CVE-2024-41810 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41810">CVE-2024-41810 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878668" comment="python3-Twisted-22.2.0-150400.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4897" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228630" ref_url="https://bugzilla.suse.com/1228630" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-41990" ref_url="https://www.suse.com/security/cve/CVE-2024-41990/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019162.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:
  
- Fixed code in CVE-2024-41990 patch
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-08-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1228630">SUSE bug 1228630</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41990/">CVE-2024-41990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41990">CVE-2024-41990 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878669" comment="python3-Django-2.0.7-150000.1.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4898" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228256" ref_url="https://bugzilla.suse.com/1228256" source="BUGZILLA"/>
		<reference ref_id="1228257" ref_url="https://bugzilla.suse.com/1228257" source="BUGZILLA"/>
		<reference ref_id="1228258" ref_url="https://bugzilla.suse.com/1228258" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-1737" ref_url="https://www.suse.com/security/cve/CVE-2024-1737/" source="CVE"/>
		<reference ref_id="CVE-2024-1975" ref_url="https://www.suse.com/security/cve/CVE-2024-1975/" source="CVE"/>
		<reference ref_id="CVE-2024-4076" ref_url="https://www.suse.com/security/cve/CVE-2024-4076/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019161.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

Update to 9.16.50:

- Bug Fixes:
  * A regression in cache-cleaning code enabled memory use to grow
    significantly more quickly than before, until the configured
    max-cache-size limit was reached. This has been fixed.
  * Using rndc flush inadvertently caused cache cleaning to become
    less effective. This could ultimately lead to the configured
    max-cache-size limit being exceeded and has now been fixed.
  * The logic for cleaning up expired cached DNS records was
    tweaked to be more aggressive. This change helps with enforcing
    max-cache-ttl and max-ncache-ttl in a timely manner.
  * It was possible to trigger a use-after-free assertion when the
    overmem cache cleaning was initiated. This has been fixed.
  New Features:
  * Added RESOLVER.ARPA to the built in empty zones.
- Security Fixes:
  * It is possible to craft excessively large numbers of resource
    record types for a given owner name, which has the effect of
    slowing down database processing. This has been addressed by
    adding a configurable limit to the number of records that can
    be stored per name and type in a cache or zone database. The
    default is 100, which can be tuned with the new
    max-types-per-name option. (CVE-2024-1737, bsc#1228256)
  * Validating DNS messages signed using the SIG(0) protocol (RFC
    2931) could cause excessive CPU load, leading to a
    denial-of-service condition. Support for SIG(0) message
    validation was removed from this version of named.
    (CVE-2024-1975, bsc#1228257)
  * When looking up the NS records of parent zones as part of
    looking up DS records, it was possible for named to trigger an
    assertion failure if serve-stale was enabled. This has been
    fixed. (CVE-2024-4076, bsc#1228258)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-08-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1228256">SUSE bug 1228256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228257">SUSE bug 1228257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228258">SUSE bug 1228258</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1737/">CVE-2024-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1737">CVE-2024-1737 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1975/">CVE-2024-1975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1975">CVE-2024-1975 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4076/">CVE-2024-4076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4076">CVE-2024-4076 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009878670" comment="bind-9.16.50-150500.8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878671" comment="bind-doc-9.16.50-150500.8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878672" comment="bind-utils-9.16.50-150500.8.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878673" comment="python3-bind-9.16.50-150500.8.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4899" version="1" class="patch">
	<metadata>
		<title>Security update for ca-certificates-mozilla (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220356" ref_url="https://bugzilla.suse.com/1220356" source="BUGZILLA"/>
		<reference ref_id="1227525" ref_url="https://bugzilla.suse.com/1227525" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2024:2869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019164.html" source="SUSE-SU"/>
		<description>
This update for ca-certificates-mozilla fixes the following issues:

- Updated to 2.68 state of Mozilla SSL root CAs (bsc#1227525)
  - Added: FIRMAPROFESIONAL CA ROOT-A WEB
  - Distrust: GLOBALTRUST 2020

- Updated to 2.66 state of Mozilla SSL root CAs (bsc#1220356)
  Added:
  - CommScope Public Trust ECC Root-01
  - CommScope Public Trust ECC Root-02
  - CommScope Public Trust RSA Root-01
  - CommScope Public Trust RSA Root-02
  - D-Trust SBR Root CA 1 2022
  - D-Trust SBR Root CA 2 2022
  - Telekom Security SMIME ECC Root 2021
  - Telekom Security SMIME RSA Root 2023
  - Telekom Security TLS ECC Root 2020
  - Telekom Security TLS RSA Root 2023
  - TrustAsia Global Root CA G3
  - TrustAsia Global Root CA G4
  Removed:
  - Autoridad de Certificacion Firmaprofesional CIF A62634068
  - Chambers of Commerce Root - 2008
  - Global Chambersign Root - 2008
  - Security Communication Root CA
  - Symantec Class 1 Public Primary Certification Authority - G6
  - Symantec Class 2 Public Primary Certification Authority - G6
  - TrustCor ECA-1
  - TrustCor RootCert CA-1
  - TrustCor RootCert CA-2
  - VeriSign Class 1 Public Primary Certification Authority - G3
  - VeriSign Class 2 Public Primary Certification Authority - G3
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-09"/>
	<updated date="2024-08-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220356">SUSE bug 1220356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227525">SUSE bug 1227525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009878674" comment="ca-certificates-mozilla-2.68-150200.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878675" comment="ca-certificates-mozilla-prebuilt-2.68-150200.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4900" version="1" class="patch">
	<metadata>
		<title>Security update for qt6-base (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222120" ref_url="https://bugzilla.suse.com/1222120" source="BUGZILLA"/>
		<reference ref_id="1223917" ref_url="https://bugzilla.suse.com/1223917" source="BUGZILLA"/>
		<reference ref_id="1227426" ref_url="https://bugzilla.suse.com/1227426" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45935" ref_url="https://www.suse.com/security/cve/CVE-2023-45935/" source="CVE"/>
		<reference ref_id="CVE-2024-33861" ref_url="https://www.suse.com/security/cve/CVE-2024-33861/" source="CVE"/>
		<reference ref_id="CVE-2024-39936" ref_url="https://www.suse.com/security/cve/CVE-2024-39936/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2873-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036417.html" source="SUSE-SU"/>
		<description>
This update for qt6-base fixes the following issues:

- CVE-2024-33861: Fixed an invalid pointer being passed as a callback which coud lead to modification of the stack (bsc#1223917)
- CVE-2024-39936: Fixed information leakage due to process HTTP2 communication before encrypted() can be responded to (bsc#1227426)
- CVE-2023-45935: Fixed NULL pointer dereference in QXcbConnection::initializeAllAtoms() due to anomalous behavior from the X server (bsc#1222120)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-12"/>
	<updated date="2024-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222120">SUSE bug 1222120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223917">SUSE bug 1223917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227426">SUSE bug 1227426</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45935/">CVE-2023-45935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45935">CVE-2023-45935 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-33861/">CVE-2024-33861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33861">CVE-2024-33861 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39936/">CVE-2024-39936 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39936">CVE-2024-39936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009878780" comment="libQt6Concurrent6-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878781" comment="libQt6Core6-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878782" comment="libQt6DBus6-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878783" comment="libQt6Gui6-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878784" comment="libQt6Network6-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878785" comment="libQt6OpenGL6-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878786" comment="libQt6OpenGLWidgets6-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878787" comment="libQt6PrintSupport6-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878788" comment="libQt6Sql6-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878789" comment="libQt6Test6-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878790" comment="libQt6Widgets6-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878791" comment="libQt6Xml6-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878792" comment="qt6-base-common-devel-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878793" comment="qt6-base-devel-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878794" comment="qt6-base-docs-html-6.4.2-150500.3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878795" comment="qt6-base-docs-qch-6.4.2-150500.3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878796" comment="qt6-base-examples-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878797" comment="qt6-base-private-devel-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878798" comment="qt6-concurrent-devel-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878799" comment="qt6-core-devel-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878800" comment="qt6-core-private-devel-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878801" comment="qt6-dbus-devel-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878802" comment="qt6-dbus-private-devel-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878803" comment="qt6-docs-common-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878804" comment="qt6-gui-devel-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878805" comment="qt6-gui-private-devel-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878806" comment="qt6-kmssupport-devel-static-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878807" comment="qt6-kmssupport-private-devel-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878808" comment="qt6-network-devel-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878809" comment="qt6-network-private-devel-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878810" comment="qt6-network-tls-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878811" comment="qt6-networkinformation-glib-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878812" comment="qt6-networkinformation-nm-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878813" comment="qt6-opengl-devel-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878814" comment="qt6-opengl-private-devel-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878815" comment="qt6-openglwidgets-devel-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878816" comment="qt6-platformsupport-devel-static-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878817" comment="qt6-platformsupport-private-devel-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878818" comment="qt6-platformtheme-gtk3-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878819" comment="qt6-platformtheme-xdgdesktopportal-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878820" comment="qt6-printsupport-cups-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878821" comment="qt6-printsupport-devel-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878822" comment="qt6-printsupport-private-devel-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878823" comment="qt6-sql-devel-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878824" comment="qt6-sql-mysql-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878825" comment="qt6-sql-postgresql-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878826" comment="qt6-sql-private-devel-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878827" comment="qt6-sql-sqlite-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878828" comment="qt6-sql-unixODBC-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878829" comment="qt6-test-devel-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878830" comment="qt6-test-private-devel-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878831" comment="qt6-widgets-devel-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878832" comment="qt6-widgets-private-devel-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878833" comment="qt6-xml-devel-6.4.2-150500.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878834" comment="qt6-xml-private-devel-6.4.2-150500.3.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4901" version="1" class="patch">
	<metadata>
		<title>Security update for slurm_20_11 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216207" ref_url="https://bugzilla.suse.com/1216207" source="BUGZILLA"/>
		<reference ref_id="1216869" ref_url="https://bugzilla.suse.com/1216869" source="BUGZILLA"/>
		<reference ref_id="1217711" ref_url="https://bugzilla.suse.com/1217711" source="BUGZILLA"/>
		<reference ref_id="1218046" ref_url="https://bugzilla.suse.com/1218046" source="BUGZILLA"/>
		<reference ref_id="1218050" ref_url="https://bugzilla.suse.com/1218050" source="BUGZILLA"/>
		<reference ref_id="1218051" ref_url="https://bugzilla.suse.com/1218051" source="BUGZILLA"/>
		<reference ref_id="1218053" ref_url="https://bugzilla.suse.com/1218053" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-41914" ref_url="https://www.suse.com/security/cve/CVE-2023-41914/" source="CVE"/>
		<reference ref_id="CVE-2023-49933" ref_url="https://www.suse.com/security/cve/CVE-2023-49933/" source="CVE"/>
		<reference ref_id="CVE-2023-49936" ref_url="https://www.suse.com/security/cve/CVE-2023-49936/" source="CVE"/>
		<reference ref_id="CVE-2023-49937" ref_url="https://www.suse.com/security/cve/CVE-2023-49937/" source="CVE"/>
		<reference ref_id="CVE-2023-49938" ref_url="https://www.suse.com/security/cve/CVE-2023-49938/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017825.html" source="SUSE-SU"/>
		<description>
This update for slurm_20_11 fixes the following issues:

Security fixes:

- CVE-2023-41914: Prevent filesystem race conditions that could let an attacker take control of an arbitrary file, or remove entire directories' contents. (bsc#1216207)
- CVE-2023-49933: Prevent message extension attacks that could bypass the message hash. (bsc#1218046)
- CVE-2023-49936: Prevent NULL pointer dereference on `size_valp` overflow. (bsc#1218050)
- CVE-2023-49937: Prevent double-xfree() on error in `_unpack_node_reg_resp()`. (bsc#1218051)
- CVE-2023-49938: Prevent modified `sbcast` RPCs from opening a file with the wrong group permissions. (bsc#1218053)

Other fixes:

- Add missing service file for slurmrestd (bsc#1217711).
- Fix slurm upgrading to incompatible versions (bsc#1216869).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-31"/>
	<updated date="2024-01-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216207">SUSE bug 1216207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216869">SUSE bug 1216869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217711">SUSE bug 1217711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218046">SUSE bug 1218046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218050">SUSE bug 1218050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218051">SUSE bug 1218051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218053">SUSE bug 1218053</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-41914/">CVE-2023-41914 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41914">CVE-2023-41914 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-49933/">CVE-2023-49933 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49933">CVE-2023-49933 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-49936/">CVE-2023-49936 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49936">CVE-2023-49936 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-49937/">CVE-2023-49937 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49937">CVE-2023-49937 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-49938/">CVE-2023-49938 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49938">CVE-2023-49938 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009844900" comment="libnss_slurm2_20_11-20.11.9-150200.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844901" comment="libpmi0_20_11-20.11.9-150200.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844902" comment="perl-slurm_20_11-20.11.9-150200.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844903" comment="slurm_20_11-20.11.9-150200.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844904" comment="slurm_20_11-auth-none-20.11.9-150200.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844905" comment="slurm_20_11-config-20.11.9-150200.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844906" comment="slurm_20_11-config-man-20.11.9-150200.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844907" comment="slurm_20_11-cray-20.11.9-150200.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844908" comment="slurm_20_11-devel-20.11.9-150200.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844909" comment="slurm_20_11-doc-20.11.9-150200.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844910" comment="slurm_20_11-hdf5-20.11.9-150200.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844911" comment="slurm_20_11-lua-20.11.9-150200.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844912" comment="slurm_20_11-munge-20.11.9-150200.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844913" comment="slurm_20_11-node-20.11.9-150200.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844914" comment="slurm_20_11-openlava-20.11.9-150200.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844915" comment="slurm_20_11-pam_slurm-20.11.9-150200.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844916" comment="slurm_20_11-plugins-20.11.9-150200.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844917" comment="slurm_20_11-rest-20.11.9-150200.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844918" comment="slurm_20_11-seff-20.11.9-150200.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844919" comment="slurm_20_11-sjstat-20.11.9-150200.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844920" comment="slurm_20_11-slurmdbd-20.11.9-150200.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844921" comment="slurm_20_11-sql-20.11.9-150200.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844922" comment="slurm_20_11-sview-20.11.9-150200.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844923" comment="slurm_20_11-torque-20.11.9-150200.6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009844924" comment="slurm_20_11-webdoc-20.11.9-150200.6.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4902" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228549" ref_url="https://bugzilla.suse.com/1228549" source="BUGZILLA"/>
		<reference ref_id="1228552" ref_url="https://bugzilla.suse.com/1228552" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-41671" ref_url="https://www.suse.com/security/cve/CVE-2024-41671/" source="CVE"/>
		<reference ref_id="CVE-2024-41810" ref_url="https://www.suse.com/security/cve/CVE-2024-41810/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2880-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036410.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issues:

  - CVE-2024-41671: Fixed an information disclosure due to HTTP requests processed out-of-order (bsc#1228549)
  - CVE-2024-41810: Fixed reflected XSS via HTML injection in redirect response (bsc#1228552)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-12"/>
	<updated date="2024-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1228549">SUSE bug 1228549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228552">SUSE bug 1228552</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41671/">CVE-2024-41671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41671">CVE-2024-41671 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41810/">CVE-2024-41810 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41810">CVE-2024-41810 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009878835" comment="python311-Twisted-22.10.0-150400.5.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878836" comment="python311-Twisted-all_non_platform-22.10.0-150400.5.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878837" comment="python311-Twisted-conch-22.10.0-150400.5.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878838" comment="python311-Twisted-conch_nacl-22.10.0-150400.5.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878839" comment="python311-Twisted-contextvars-22.10.0-150400.5.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878840" comment="python311-Twisted-http2-22.10.0-150400.5.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878841" comment="python311-Twisted-serial-22.10.0-150400.5.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878842" comment="python311-Twisted-tls-22.10.0-150400.5.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4903" version="1" class="patch">
	<metadata>
		<title>Security update for python-gunicorn (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222950" ref_url="https://bugzilla.suse.com/1222950" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-1135" ref_url="https://www.suse.com/security/cve/CVE-2024-1135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2881-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036409.html" source="SUSE-SU"/>
		<description>
This update for python-gunicorn fixes the following issues:

- CVE-2024-1135: Fixed HTTP Request Smuggling due to improperly validate Transfer-Encoding headers (bsc#1222950)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-12"/>
	<updated date="2024-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222950">SUSE bug 1222950</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-1135/">CVE-2024-1135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1135">CVE-2024-1135 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009878843" comment="python-gunicorn-doc-19.7.1-150000.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878844" comment="python3-gunicorn-19.7.1-150000.3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4904" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222120" ref_url="https://bugzilla.suse.com/1222120" source="BUGZILLA"/>
		<reference ref_id="1227426" ref_url="https://bugzilla.suse.com/1227426" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45935" ref_url="https://www.suse.com/security/cve/CVE-2023-45935/" source="CVE"/>
		<reference ref_id="CVE-2024-39936" ref_url="https://www.suse.com/security/cve/CVE-2024-39936/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019166.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- CVE-2023-45935: Fixed NULL pointer dereference in QXcbConnection::initializeAllAtoms() due to anomalous behavior from the X server (bsc#1222120)
- CVE-2024-39936: Fixed information leakage due to process HTTP2 communication before encrypted() can be responded to (bsc#1227426)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-12"/>
	<updated date="2024-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1222120">SUSE bug 1222120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227426">SUSE bug 1227426</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45935/">CVE-2023-45935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45935">CVE-2023-45935 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39936/">CVE-2024-39936 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39936">CVE-2024-39936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009878845" comment="libQt5Bootstrap-devel-static-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878846" comment="libQt5Bootstrap-devel-static-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878847" comment="libQt5Concurrent-devel-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878848" comment="libQt5Concurrent-devel-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878849" comment="libQt5Concurrent5-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878850" comment="libQt5Concurrent5-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878851" comment="libQt5Core-devel-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878852" comment="libQt5Core-devel-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878853" comment="libQt5Core-private-headers-devel-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878854" comment="libQt5Core5-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878855" comment="libQt5Core5-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878856" comment="libQt5DBus-devel-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878857" comment="libQt5DBus-devel-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878858" comment="libQt5DBus-private-headers-devel-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878859" comment="libQt5DBus5-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878860" comment="libQt5DBus5-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878861" comment="libQt5Gui-devel-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878862" comment="libQt5Gui-devel-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878863" comment="libQt5Gui-private-headers-devel-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878864" comment="libQt5Gui5-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878865" comment="libQt5Gui5-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878866" comment="libQt5KmsSupport-devel-static-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878867" comment="libQt5KmsSupport-private-headers-devel-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878868" comment="libQt5Network-devel-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878869" comment="libQt5Network-devel-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878870" comment="libQt5Network-private-headers-devel-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878871" comment="libQt5Network5-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878872" comment="libQt5Network5-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878873" comment="libQt5OpenGL-devel-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878874" comment="libQt5OpenGL-devel-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878875" comment="libQt5OpenGL-private-headers-devel-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878876" comment="libQt5OpenGL5-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878877" comment="libQt5OpenGL5-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878878" comment="libQt5OpenGLExtensions-devel-static-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878879" comment="libQt5OpenGLExtensions-devel-static-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878880" comment="libQt5PlatformHeaders-devel-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878881" comment="libQt5PlatformSupport-devel-static-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878882" comment="libQt5PlatformSupport-devel-static-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878883" comment="libQt5PlatformSupport-private-headers-devel-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878884" comment="libQt5PrintSupport-devel-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878885" comment="libQt5PrintSupport-devel-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878886" comment="libQt5PrintSupport-private-headers-devel-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878887" comment="libQt5PrintSupport5-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878888" comment="libQt5PrintSupport5-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878889" comment="libQt5Sql-devel-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878890" comment="libQt5Sql-devel-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878891" comment="libQt5Sql-private-headers-devel-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878892" comment="libQt5Sql5-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878893" comment="libQt5Sql5-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878894" comment="libQt5Sql5-mysql-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878895" comment="libQt5Sql5-mysql-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878896" comment="libQt5Sql5-postgresql-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878897" comment="libQt5Sql5-postgresql-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878898" comment="libQt5Sql5-sqlite-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878899" comment="libQt5Sql5-sqlite-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878900" comment="libQt5Sql5-unixODBC-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878901" comment="libQt5Sql5-unixODBC-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878902" comment="libQt5Test-devel-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878903" comment="libQt5Test-devel-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878904" comment="libQt5Test-private-headers-devel-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878905" comment="libQt5Test5-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878906" comment="libQt5Test5-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878907" comment="libQt5Widgets-devel-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878908" comment="libQt5Widgets-devel-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878909" comment="libQt5Widgets-private-headers-devel-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878910" comment="libQt5Widgets5-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878911" comment="libQt5Widgets5-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878912" comment="libQt5Xml-devel-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878913" comment="libQt5Xml-devel-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878914" comment="libQt5Xml5-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878915" comment="libQt5Xml5-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878916" comment="libqt5-qtbase-common-devel-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878917" comment="libqt5-qtbase-devel-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878918" comment="libqt5-qtbase-examples-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878919" comment="libqt5-qtbase-examples-32bit-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878920" comment="libqt5-qtbase-platformtheme-gtk3-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878921" comment="libqt5-qtbase-platformtheme-xdgdesktopportal-5.15.8+kde185-150500.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009878922" comment="libqt5-qtbase-private-headers-devel-5.15.8+kde185-150500.4.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4905" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226463" ref_url="https://bugzilla.suse.com/1226463" source="BUGZILLA"/>
		<reference ref_id="1227138" ref_url="https://bugzilla.suse.com/1227138" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-5535" ref_url="https://www.suse.com/security/cve/CVE-2024-5535/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019179.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138)

Other fixes:
- Build with no-afalgeng (bsc#1226463)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-13"/>
	<updated date="2024-08-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1226463">SUSE bug 1226463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227138">SUSE bug 1227138</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-5535/">CVE-2024-5535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5535">CVE-2024-5535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009879132" comment="libopenssl-1_1-devel-1.1.1l-150500.17.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879133" comment="libopenssl-1_1-devel-32bit-1.1.1l-150500.17.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879134" comment="libopenssl1_1-1.1.1l-150500.17.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879135" comment="libopenssl1_1-32bit-1.1.1l-150500.17.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879136" comment="libopenssl1_1-hmac-1.1.1l-150500.17.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879137" comment="libopenssl1_1-hmac-32bit-1.1.1l-150500.17.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879138" comment="openssl-1_1-1.1.1l-150500.17.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879139" comment="openssl-1_1-doc-1.1.1l-150500.17.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4906" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1082555" ref_url="https://bugzilla.suse.com/1082555" source="BUGZILLA"/>
		<reference ref_id="1193454" ref_url="https://bugzilla.suse.com/1193454" source="BUGZILLA"/>
		<reference ref_id="1193554" ref_url="https://bugzilla.suse.com/1193554" source="BUGZILLA"/>
		<reference ref_id="1193787" ref_url="https://bugzilla.suse.com/1193787" source="BUGZILLA"/>
		<reference ref_id="1194324" ref_url="https://bugzilla.suse.com/1194324" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1195357" ref_url="https://bugzilla.suse.com/1195357" source="BUGZILLA"/>
		<reference ref_id="1195668" ref_url="https://bugzilla.suse.com/1195668" source="BUGZILLA"/>
		<reference ref_id="1195927" ref_url="https://bugzilla.suse.com/1195927" source="BUGZILLA"/>
		<reference ref_id="1195957" ref_url="https://bugzilla.suse.com/1195957" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1196823" ref_url="https://bugzilla.suse.com/1196823" source="BUGZILLA"/>
		<reference ref_id="1197146" ref_url="https://bugzilla.suse.com/1197146" source="BUGZILLA"/>
		<reference ref_id="1197246" ref_url="https://bugzilla.suse.com/1197246" source="BUGZILLA"/>
		<reference ref_id="1197762" ref_url="https://bugzilla.suse.com/1197762" source="BUGZILLA"/>
		<reference ref_id="1202346" ref_url="https://bugzilla.suse.com/1202346" source="BUGZILLA"/>
		<reference ref_id="1202686" ref_url="https://bugzilla.suse.com/1202686" source="BUGZILLA"/>
		<reference ref_id="1208783" ref_url="https://bugzilla.suse.com/1208783" source="BUGZILLA"/>
		<reference ref_id="1209636" ref_url="https://bugzilla.suse.com/1209636" source="BUGZILLA"/>
		<reference ref_id="1213123" ref_url="https://bugzilla.suse.com/1213123" source="BUGZILLA"/>
		<reference ref_id="1215492" ref_url="https://bugzilla.suse.com/1215492" source="BUGZILLA"/>
		<reference ref_id="1215587" ref_url="https://bugzilla.suse.com/1215587" source="BUGZILLA"/>
		<reference ref_id="1216834" ref_url="https://bugzilla.suse.com/1216834" source="BUGZILLA"/>
		<reference ref_id="1219832" ref_url="https://bugzilla.suse.com/1219832" source="BUGZILLA"/>
		<reference ref_id="1220138" ref_url="https://bugzilla.suse.com/1220138" source="BUGZILLA"/>
		<reference ref_id="1220185" ref_url="https://bugzilla.suse.com/1220185" source="BUGZILLA"/>
		<reference ref_id="1220186" ref_url="https://bugzilla.suse.com/1220186" source="BUGZILLA"/>
		<reference ref_id="1220187" ref_url="https://bugzilla.suse.com/1220187" source="BUGZILLA"/>
		<reference ref_id="1220869" ref_url="https://bugzilla.suse.com/1220869" source="BUGZILLA"/>
		<reference ref_id="1220876" ref_url="https://bugzilla.suse.com/1220876" source="BUGZILLA"/>
		<reference ref_id="1220942" ref_url="https://bugzilla.suse.com/1220942" source="BUGZILLA"/>
		<reference ref_id="1220952" ref_url="https://bugzilla.suse.com/1220952" source="BUGZILLA"/>
		<reference ref_id="1221010" ref_url="https://bugzilla.suse.com/1221010" source="BUGZILLA"/>
		<reference ref_id="1221044" ref_url="https://bugzilla.suse.com/1221044" source="BUGZILLA"/>
		<reference ref_id="1221647" ref_url="https://bugzilla.suse.com/1221647" source="BUGZILLA"/>
		<reference ref_id="1221654" ref_url="https://bugzilla.suse.com/1221654" source="BUGZILLA"/>
		<reference ref_id="1221656" ref_url="https://bugzilla.suse.com/1221656" source="BUGZILLA"/>
		<reference ref_id="1221659" ref_url="https://bugzilla.suse.com/1221659" source="BUGZILLA"/>
		<reference ref_id="1221777" ref_url="https://bugzilla.suse.com/1221777" source="BUGZILLA"/>
		<reference ref_id="1222011" ref_url="https://bugzilla.suse.com/1222011" source="BUGZILLA"/>
		<reference ref_id="1222323" ref_url="https://bugzilla.suse.com/1222323" source="BUGZILLA"/>
		<reference ref_id="1222326" ref_url="https://bugzilla.suse.com/1222326" source="BUGZILLA"/>
		<reference ref_id="1222328" ref_url="https://bugzilla.suse.com/1222328" source="BUGZILLA"/>
		<reference ref_id="1222625" ref_url="https://bugzilla.suse.com/1222625" source="BUGZILLA"/>
		<reference ref_id="1222702" ref_url="https://bugzilla.suse.com/1222702" source="BUGZILLA"/>
		<reference ref_id="1222728" ref_url="https://bugzilla.suse.com/1222728" source="BUGZILLA"/>
		<reference ref_id="1222799" ref_url="https://bugzilla.suse.com/1222799" source="BUGZILLA"/>
		<reference ref_id="1222809" ref_url="https://bugzilla.suse.com/1222809" source="BUGZILLA"/>
		<reference ref_id="1222810" ref_url="https://bugzilla.suse.com/1222810" source="BUGZILLA"/>
		<reference ref_id="1223021" ref_url="https://bugzilla.suse.com/1223021" source="BUGZILLA"/>
		<reference ref_id="1223180" ref_url="https://bugzilla.suse.com/1223180" source="BUGZILLA"/>
		<reference ref_id="1223635" ref_url="https://bugzilla.suse.com/1223635" source="BUGZILLA"/>
		<reference ref_id="1223652" ref_url="https://bugzilla.suse.com/1223652" source="BUGZILLA"/>
		<reference ref_id="1223675" ref_url="https://bugzilla.suse.com/1223675" source="BUGZILLA"/>
		<reference ref_id="1223778" ref_url="https://bugzilla.suse.com/1223778" source="BUGZILLA"/>
		<reference ref_id="1223806" ref_url="https://bugzilla.suse.com/1223806" source="BUGZILLA"/>
		<reference ref_id="1223813" ref_url="https://bugzilla.suse.com/1223813" source="BUGZILLA"/>
		<reference ref_id="1223815" ref_url="https://bugzilla.suse.com/1223815" source="BUGZILLA"/>
		<reference ref_id="1223836" ref_url="https://bugzilla.suse.com/1223836" source="BUGZILLA"/>
		<reference ref_id="1223863" ref_url="https://bugzilla.suse.com/1223863" source="BUGZILLA"/>
		<reference ref_id="1224414" ref_url="https://bugzilla.suse.com/1224414" source="BUGZILLA"/>
		<reference ref_id="1224499" ref_url="https://bugzilla.suse.com/1224499" source="BUGZILLA"/>
		<reference ref_id="1224500" ref_url="https://bugzilla.suse.com/1224500" source="BUGZILLA"/>
		<reference ref_id="1224512" ref_url="https://bugzilla.suse.com/1224512" source="BUGZILLA"/>
		<reference ref_id="1224516" ref_url="https://bugzilla.suse.com/1224516" source="BUGZILLA"/>
		<reference ref_id="1224517" ref_url="https://bugzilla.suse.com/1224517" source="BUGZILLA"/>
		<reference ref_id="1224545" ref_url="https://bugzilla.suse.com/1224545" source="BUGZILLA"/>
		<reference ref_id="1224548" ref_url="https://bugzilla.suse.com/1224548" source="BUGZILLA"/>
		<reference ref_id="1224557" ref_url="https://bugzilla.suse.com/1224557" source="BUGZILLA"/>
		<reference ref_id="1224572" ref_url="https://bugzilla.suse.com/1224572" source="BUGZILLA"/>
		<reference ref_id="1224573" ref_url="https://bugzilla.suse.com/1224573" source="BUGZILLA"/>
		<reference ref_id="1224585" ref_url="https://bugzilla.suse.com/1224585" source="BUGZILLA"/>
		<reference ref_id="1224604" ref_url="https://bugzilla.suse.com/1224604" source="BUGZILLA"/>
		<reference ref_id="1224636" ref_url="https://bugzilla.suse.com/1224636" source="BUGZILLA"/>
		<reference ref_id="1224641" ref_url="https://bugzilla.suse.com/1224641" source="BUGZILLA"/>
		<reference ref_id="1224683" ref_url="https://bugzilla.suse.com/1224683" source="BUGZILLA"/>
		<reference ref_id="1224694" ref_url="https://bugzilla.suse.com/1224694" source="BUGZILLA"/>
		<reference ref_id="1224700" ref_url="https://bugzilla.suse.com/1224700" source="BUGZILLA"/>
		<reference ref_id="1224743" ref_url="https://bugzilla.suse.com/1224743" source="BUGZILLA"/>
		<reference ref_id="1225088" ref_url="https://bugzilla.suse.com/1225088" source="BUGZILLA"/>
		<reference ref_id="1225272" ref_url="https://bugzilla.suse.com/1225272" source="BUGZILLA"/>
		<reference ref_id="1225301" ref_url="https://bugzilla.suse.com/1225301" source="BUGZILLA"/>
		<reference ref_id="1225475" ref_url="https://bugzilla.suse.com/1225475" source="BUGZILLA"/>
		<reference ref_id="1225489" ref_url="https://bugzilla.suse.com/1225489" source="BUGZILLA"/>
		<reference ref_id="1225504" ref_url="https://bugzilla.suse.com/1225504" source="BUGZILLA"/>
		<reference ref_id="1225505" ref_url="https://bugzilla.suse.com/1225505" source="BUGZILLA"/>
		<reference ref_id="1225564" ref_url="https://bugzilla.suse.com/1225564" source="BUGZILLA"/>
		<reference ref_id="1225573" ref_url="https://bugzilla.suse.com/1225573" source="BUGZILLA"/>
		<reference ref_id="1225581" ref_url="https://bugzilla.suse.com/1225581" source="BUGZILLA"/>
		<reference ref_id="1225586" ref_url="https://bugzilla.suse.com/1225586" source="BUGZILLA"/>
		<reference ref_id="1225711" ref_url="https://bugzilla.suse.com/1225711" source="BUGZILLA"/>
		<reference ref_id="1225717" ref_url="https://bugzilla.suse.com/1225717" source="BUGZILLA"/>
		<reference ref_id="1225719" ref_url="https://bugzilla.suse.com/1225719" source="BUGZILLA"/>
		<reference ref_id="1225744" ref_url="https://bugzilla.suse.com/1225744" source="BUGZILLA"/>
		<reference ref_id="1225745" ref_url="https://bugzilla.suse.com/1225745" source="BUGZILLA"/>
		<reference ref_id="1225746" ref_url="https://bugzilla.suse.com/1225746" source="BUGZILLA"/>
		<reference ref_id="1225752" ref_url="https://bugzilla.suse.com/1225752" source="BUGZILLA"/>
		<reference ref_id="1225753" ref_url="https://bugzilla.suse.com/1225753" source="BUGZILLA"/>
		<reference ref_id="1225757" ref_url="https://bugzilla.suse.com/1225757" source="BUGZILLA"/>
		<reference ref_id="1225767" ref_url="https://bugzilla.suse.com/1225767" source="BUGZILLA"/>
		<reference ref_id="1225810" ref_url="https://bugzilla.suse.com/1225810" source="BUGZILLA"/>
		<reference ref_id="1225815" ref_url="https://bugzilla.suse.com/1225815" source="BUGZILLA"/>
		<reference ref_id="1225820" ref_url="https://bugzilla.suse.com/1225820" source="BUGZILLA"/>
		<reference ref_id="1225829" ref_url="https://bugzilla.suse.com/1225829" source="BUGZILLA"/>
		<reference ref_id="1225835" ref_url="https://bugzilla.suse.com/1225835" source="BUGZILLA"/>
		<reference ref_id="1225838" ref_url="https://bugzilla.suse.com/1225838" source="BUGZILLA"/>
		<reference ref_id="1225839" ref_url="https://bugzilla.suse.com/1225839" source="BUGZILLA"/>
		<reference ref_id="1225843" ref_url="https://bugzilla.suse.com/1225843" source="BUGZILLA"/>
		<reference ref_id="1225847" ref_url="https://bugzilla.suse.com/1225847" source="BUGZILLA"/>
		<reference ref_id="1225851" ref_url="https://bugzilla.suse.com/1225851" source="BUGZILLA"/>
		<reference ref_id="1225856" ref_url="https://bugzilla.suse.com/1225856" source="BUGZILLA"/>
		<reference ref_id="1225895" ref_url="https://bugzilla.suse.com/1225895" source="BUGZILLA"/>
		<reference ref_id="1225898" ref_url="https://bugzilla.suse.com/1225898" source="BUGZILLA"/>
		<reference ref_id="1225903" ref_url="https://bugzilla.suse.com/1225903" source="BUGZILLA"/>
		<reference ref_id="1226202" ref_url="https://bugzilla.suse.com/1226202" source="BUGZILLA"/>
		<reference ref_id="1226502" ref_url="https://bugzilla.suse.com/1226502" source="BUGZILLA"/>
		<reference ref_id="1226519" ref_url="https://bugzilla.suse.com/1226519" source="BUGZILLA"/>
		<reference ref_id="1226551" ref_url="https://bugzilla.suse.com/1226551" source="BUGZILLA"/>
		<reference ref_id="1226555" ref_url="https://bugzilla.suse.com/1226555" source="BUGZILLA"/>
		<reference ref_id="1226565" ref_url="https://bugzilla.suse.com/1226565" source="BUGZILLA"/>
		<reference ref_id="1226568" ref_url="https://bugzilla.suse.com/1226568" source="BUGZILLA"/>
		<reference ref_id="1226570" ref_url="https://bugzilla.suse.com/1226570" source="BUGZILLA"/>
		<reference ref_id="1226571" ref_url="https://bugzilla.suse.com/1226571" source="BUGZILLA"/>
		<reference ref_id="1226574" ref_url="https://bugzilla.suse.com/1226574" source="BUGZILLA"/>
		<reference ref_id="1226588" ref_url="https://bugzilla.suse.com/1226588" source="BUGZILLA"/>
		<reference ref_id="1226607" ref_url="https://bugzilla.suse.com/1226607" source="BUGZILLA"/>
		<reference ref_id="1226650" ref_url="https://bugzilla.suse.com/1226650" source="BUGZILLA"/>
		<reference ref_id="1226698" ref_url="https://bugzilla.suse.com/1226698" source="BUGZILLA"/>
		<reference ref_id="1226713" ref_url="https://bugzilla.suse.com/1226713" source="BUGZILLA"/>
		<reference ref_id="1226716" ref_url="https://bugzilla.suse.com/1226716" source="BUGZILLA"/>
		<reference ref_id="1226750" ref_url="https://bugzilla.suse.com/1226750" source="BUGZILLA"/>
		<reference ref_id="1226757" ref_url="https://bugzilla.suse.com/1226757" source="BUGZILLA"/>
		<reference ref_id="1226758" ref_url="https://bugzilla.suse.com/1226758" source="BUGZILLA"/>
		<reference ref_id="1226775" ref_url="https://bugzilla.suse.com/1226775" source="BUGZILLA"/>
		<reference ref_id="1226783" ref_url="https://bugzilla.suse.com/1226783" source="BUGZILLA"/>
		<reference ref_id="1226785" ref_url="https://bugzilla.suse.com/1226785" source="BUGZILLA"/>
		<reference ref_id="1226834" ref_url="https://bugzilla.suse.com/1226834" source="BUGZILLA"/>
		<reference ref_id="1226837" ref_url="https://bugzilla.suse.com/1226837" source="BUGZILLA"/>
		<reference ref_id="1226911" ref_url="https://bugzilla.suse.com/1226911" source="BUGZILLA"/>
		<reference ref_id="1226990" ref_url="https://bugzilla.suse.com/1226990" source="BUGZILLA"/>
		<reference ref_id="1226993" ref_url="https://bugzilla.suse.com/1226993" source="BUGZILLA"/>
		<reference ref_id="1227090" ref_url="https://bugzilla.suse.com/1227090" source="BUGZILLA"/>
		<reference ref_id="1227121" ref_url="https://bugzilla.suse.com/1227121" source="BUGZILLA"/>
		<reference ref_id="1227157" ref_url="https://bugzilla.suse.com/1227157" source="BUGZILLA"/>
		<reference ref_id="1227162" ref_url="https://bugzilla.suse.com/1227162" source="BUGZILLA"/>
		<reference ref_id="1227362" ref_url="https://bugzilla.suse.com/1227362" source="BUGZILLA"/>
		<reference ref_id="1227383" ref_url="https://bugzilla.suse.com/1227383" source="BUGZILLA"/>
		<reference ref_id="1227432" ref_url="https://bugzilla.suse.com/1227432" source="BUGZILLA"/>
		<reference ref_id="1227435" ref_url="https://bugzilla.suse.com/1227435" source="BUGZILLA"/>
		<reference ref_id="1227447" ref_url="https://bugzilla.suse.com/1227447" source="BUGZILLA"/>
		<reference ref_id="1227487" ref_url="https://bugzilla.suse.com/1227487" source="BUGZILLA"/>
		<reference ref_id="1227549" ref_url="https://bugzilla.suse.com/1227549" source="BUGZILLA"/>
		<reference ref_id="1227573" ref_url="https://bugzilla.suse.com/1227573" source="BUGZILLA"/>
		<reference ref_id="1227618" ref_url="https://bugzilla.suse.com/1227618" source="BUGZILLA"/>
		<reference ref_id="1227620" ref_url="https://bugzilla.suse.com/1227620" source="BUGZILLA"/>
		<reference ref_id="1227626" ref_url="https://bugzilla.suse.com/1227626" source="BUGZILLA"/>
		<reference ref_id="1227635" ref_url="https://bugzilla.suse.com/1227635" source="BUGZILLA"/>
		<reference ref_id="1227661" ref_url="https://bugzilla.suse.com/1227661" source="BUGZILLA"/>
		<reference ref_id="1227716" ref_url="https://bugzilla.suse.com/1227716" source="BUGZILLA"/>
		<reference ref_id="1227722" ref_url="https://bugzilla.suse.com/1227722" source="BUGZILLA"/>
		<reference ref_id="1227724" ref_url="https://bugzilla.suse.com/1227724" source="BUGZILLA"/>
		<reference ref_id="1227725" ref_url="https://bugzilla.suse.com/1227725" source="BUGZILLA"/>
		<reference ref_id="1227728" ref_url="https://bugzilla.suse.com/1227728" source="BUGZILLA"/>
		<reference ref_id="1227729" ref_url="https://bugzilla.suse.com/1227729" source="BUGZILLA"/>
		<reference ref_id="1227730" ref_url="https://bugzilla.suse.com/1227730" source="BUGZILLA"/>
		<reference ref_id="1227732" ref_url="https://bugzilla.suse.com/1227732" source="BUGZILLA"/>
		<reference ref_id="1227733" ref_url="https://bugzilla.suse.com/1227733" source="BUGZILLA"/>
		<reference ref_id="1227750" ref_url="https://bugzilla.suse.com/1227750" source="BUGZILLA"/>
		<reference ref_id="1227754" ref_url="https://bugzilla.suse.com/1227754" source="BUGZILLA"/>
		<reference ref_id="1227755" ref_url="https://bugzilla.suse.com/1227755" source="BUGZILLA"/>
		<reference ref_id="1227760" ref_url="https://bugzilla.suse.com/1227760" source="BUGZILLA"/>
		<reference ref_id="1227762" ref_url="https://bugzilla.suse.com/1227762" source="BUGZILLA"/>
		<reference ref_id="1227763" ref_url="https://bugzilla.suse.com/1227763" source="BUGZILLA"/>
		<reference ref_id="1227764" ref_url="https://bugzilla.suse.com/1227764" source="BUGZILLA"/>
		<reference ref_id="1227766" ref_url="https://bugzilla.suse.com/1227766" source="BUGZILLA"/>
		<reference ref_id="1227770" ref_url="https://bugzilla.suse.com/1227770" source="BUGZILLA"/>
		<reference ref_id="1227771" ref_url="https://bugzilla.suse.com/1227771" source="BUGZILLA"/>
		<reference ref_id="1227772" ref_url="https://bugzilla.suse.com/1227772" source="BUGZILLA"/>
		<reference ref_id="1227774" ref_url="https://bugzilla.suse.com/1227774" source="BUGZILLA"/>
		<reference ref_id="1227779" ref_url="https://bugzilla.suse.com/1227779" source="BUGZILLA"/>
		<reference ref_id="1227780" ref_url="https://bugzilla.suse.com/1227780" source="BUGZILLA"/>
		<reference ref_id="1227783" ref_url="https://bugzilla.suse.com/1227783" source="BUGZILLA"/>
		<reference ref_id="1227786" ref_url="https://bugzilla.suse.com/1227786" source="BUGZILLA"/>
		<reference ref_id="1227787" ref_url="https://bugzilla.suse.com/1227787" source="BUGZILLA"/>
		<reference ref_id="1227790" ref_url="https://bugzilla.suse.com/1227790" source="BUGZILLA"/>
		<reference ref_id="1227792" ref_url="https://bugzilla.suse.com/1227792" source="BUGZILLA"/>
		<reference ref_id="1227796" ref_url="https://bugzilla.suse.com/1227796" source="BUGZILLA"/>
		<reference ref_id="1227797" ref_url="https://bugzilla.suse.com/1227797" source="BUGZILLA"/>
		<reference ref_id="1227798" ref_url="https://bugzilla.suse.com/1227798" source="BUGZILLA"/>
		<reference ref_id="1227800" ref_url="https://bugzilla.suse.com/1227800" source="BUGZILLA"/>
		<reference ref_id="1227802" ref_url="https://bugzilla.suse.com/1227802" source="BUGZILLA"/>
		<reference ref_id="1227806" ref_url="https://bugzilla.suse.com/1227806" source="BUGZILLA"/>
		<reference ref_id="1227808" ref_url="https://bugzilla.suse.com/1227808" source="BUGZILLA"/>
		<reference ref_id="1227810" ref_url="https://bugzilla.suse.com/1227810" source="BUGZILLA"/>
		<reference ref_id="1227812" ref_url="https://bugzilla.suse.com/1227812" source="BUGZILLA"/>
		<reference ref_id="1227813" ref_url="https://bugzilla.suse.com/1227813" source="BUGZILLA"/>
		<reference ref_id="1227814" ref_url="https://bugzilla.suse.com/1227814" source="BUGZILLA"/>
		<reference ref_id="1227816" ref_url="https://bugzilla.suse.com/1227816" source="BUGZILLA"/>
		<reference ref_id="1227820" ref_url="https://bugzilla.suse.com/1227820" source="BUGZILLA"/>
		<reference ref_id="1227823" ref_url="https://bugzilla.suse.com/1227823" source="BUGZILLA"/>
		<reference ref_id="1227824" ref_url="https://bugzilla.suse.com/1227824" source="BUGZILLA"/>
		<reference ref_id="1227828" ref_url="https://bugzilla.suse.com/1227828" source="BUGZILLA"/>
		<reference ref_id="1227829" ref_url="https://bugzilla.suse.com/1227829" source="BUGZILLA"/>
		<reference ref_id="1227836" ref_url="https://bugzilla.suse.com/1227836" source="BUGZILLA"/>
		<reference ref_id="1227846" ref_url="https://bugzilla.suse.com/1227846" source="BUGZILLA"/>
		<reference ref_id="1227849" ref_url="https://bugzilla.suse.com/1227849" source="BUGZILLA"/>
		<reference ref_id="1227851" ref_url="https://bugzilla.suse.com/1227851" source="BUGZILLA"/>
		<reference ref_id="1227862" ref_url="https://bugzilla.suse.com/1227862" source="BUGZILLA"/>
		<reference ref_id="1227864" ref_url="https://bugzilla.suse.com/1227864" source="BUGZILLA"/>
		<reference ref_id="1227865" ref_url="https://bugzilla.suse.com/1227865" source="BUGZILLA"/>
		<reference ref_id="1227866" ref_url="https://bugzilla.suse.com/1227866" source="BUGZILLA"/>
		<reference ref_id="1227870" ref_url="https://bugzilla.suse.com/1227870" source="BUGZILLA"/>
		<reference ref_id="1227884" ref_url="https://bugzilla.suse.com/1227884" source="BUGZILLA"/>
		<reference ref_id="1227886" ref_url="https://bugzilla.suse.com/1227886" source="BUGZILLA"/>
		<reference ref_id="1227891" ref_url="https://bugzilla.suse.com/1227891" source="BUGZILLA"/>
		<reference ref_id="1227893" ref_url="https://bugzilla.suse.com/1227893" source="BUGZILLA"/>
		<reference ref_id="1227899" ref_url="https://bugzilla.suse.com/1227899" source="BUGZILLA"/>
		<reference ref_id="1227900" ref_url="https://bugzilla.suse.com/1227900" source="BUGZILLA"/>
		<reference ref_id="1227910" ref_url="https://bugzilla.suse.com/1227910" source="BUGZILLA"/>
		<reference ref_id="1227913" ref_url="https://bugzilla.suse.com/1227913" source="BUGZILLA"/>
		<reference ref_id="1227917" ref_url="https://bugzilla.suse.com/1227917" source="BUGZILLA"/>
		<reference ref_id="1227919" ref_url="https://bugzilla.suse.com/1227919" source="BUGZILLA"/>
		<reference ref_id="1227920" ref_url="https://bugzilla.suse.com/1227920" source="BUGZILLA"/>
		<reference ref_id="1227921" ref_url="https://bugzilla.suse.com/1227921" source="BUGZILLA"/>
		<reference ref_id="1227922" ref_url="https://bugzilla.suse.com/1227922" source="BUGZILLA"/>
		<reference ref_id="1227923" ref_url="https://bugzilla.suse.com/1227923" source="BUGZILLA"/>
		<reference ref_id="1227924" ref_url="https://bugzilla.suse.com/1227924" source="BUGZILLA"/>
		<reference ref_id="1227925" ref_url="https://bugzilla.suse.com/1227925" source="BUGZILLA"/>
		<reference ref_id="1227927" ref_url="https://bugzilla.suse.com/1227927" source="BUGZILLA"/>
		<reference ref_id="1227928" ref_url="https://bugzilla.suse.com/1227928" source="BUGZILLA"/>
		<reference ref_id="1227931" ref_url="https://bugzilla.suse.com/1227931" source="BUGZILLA"/>
		<reference ref_id="1227932" ref_url="https://bugzilla.suse.com/1227932" source="BUGZILLA"/>
		<reference ref_id="1227933" ref_url="https://bugzilla.suse.com/1227933" source="BUGZILLA"/>
		<reference ref_id="1227935" ref_url="https://bugzilla.suse.com/1227935" source="BUGZILLA"/>
		<reference ref_id="1227936" ref_url="https://bugzilla.suse.com/1227936" source="BUGZILLA"/>
		<reference ref_id="1227938" ref_url="https://bugzilla.suse.com/1227938" source="BUGZILLA"/>
		<reference ref_id="1227941" ref_url="https://bugzilla.suse.com/1227941" source="BUGZILLA"/>
		<reference ref_id="1227942" ref_url="https://bugzilla.suse.com/1227942" source="BUGZILLA"/>
		<reference ref_id="1227944" ref_url="https://bugzilla.suse.com/1227944" source="BUGZILLA"/>
		<reference ref_id="1227945" ref_url="https://bugzilla.suse.com/1227945" source="BUGZILLA"/>
		<reference ref_id="1227947" ref_url="https://bugzilla.suse.com/1227947" source="BUGZILLA"/>
		<reference ref_id="1227948" ref_url="https://bugzilla.suse.com/1227948" source="BUGZILLA"/>
		<reference ref_id="1227949" ref_url="https://bugzilla.suse.com/1227949" source="BUGZILLA"/>
		<reference ref_id="1227950" ref_url="https://bugzilla.suse.com/1227950" source="BUGZILLA"/>
		<reference ref_id="1227952" ref_url="https://bugzilla.suse.com/1227952" source="BUGZILLA"/>
		<reference ref_id="1227953" ref_url="https://bugzilla.suse.com/1227953" source="BUGZILLA"/>
		<reference ref_id="1227954" ref_url="https://bugzilla.suse.com/1227954" source="BUGZILLA"/>
		<reference ref_id="1227956" ref_url="https://bugzilla.suse.com/1227956" source="BUGZILLA"/>
		<reference ref_id="1227957" ref_url="https://bugzilla.suse.com/1227957" source="BUGZILLA"/>
		<reference ref_id="1227963" ref_url="https://bugzilla.suse.com/1227963" source="BUGZILLA"/>
		<reference ref_id="1227964" ref_url="https://bugzilla.suse.com/1227964" source="BUGZILLA"/>
		<reference ref_id="1227965" ref_url="https://bugzilla.suse.com/1227965" source="BUGZILLA"/>
		<reference ref_id="1227968" ref_url="https://bugzilla.suse.com/1227968" source="BUGZILLA"/>
		<reference ref_id="1227969" ref_url="https://bugzilla.suse.com/1227969" source="BUGZILLA"/>
		<reference ref_id="1227970" ref_url="https://bugzilla.suse.com/1227970" source="BUGZILLA"/>
		<reference ref_id="1227971" ref_url="https://bugzilla.suse.com/1227971" source="BUGZILLA"/>
		<reference ref_id="1227972" ref_url="https://bugzilla.suse.com/1227972" source="BUGZILLA"/>
		<reference ref_id="1227975" ref_url="https://bugzilla.suse.com/1227975" source="BUGZILLA"/>
		<reference ref_id="1227976" ref_url="https://bugzilla.suse.com/1227976" source="BUGZILLA"/>
		<reference ref_id="1227981" ref_url="https://bugzilla.suse.com/1227981" source="BUGZILLA"/>
		<reference ref_id="1227982" ref_url="https://bugzilla.suse.com/1227982" source="BUGZILLA"/>
		<reference ref_id="1227985" ref_url="https://bugzilla.suse.com/1227985" source="BUGZILLA"/>
		<reference ref_id="1227986" ref_url="https://bugzilla.suse.com/1227986" source="BUGZILLA"/>
		<reference ref_id="1227987" ref_url="https://bugzilla.suse.com/1227987" source="BUGZILLA"/>
		<reference ref_id="1227988" ref_url="https://bugzilla.suse.com/1227988" source="BUGZILLA"/>
		<reference ref_id="1227989" ref_url="https://bugzilla.suse.com/1227989" source="BUGZILLA"/>
		<reference ref_id="1227990" ref_url="https://bugzilla.suse.com/1227990" source="BUGZILLA"/>
		<reference ref_id="1227991" ref_url="https://bugzilla.suse.com/1227991" source="BUGZILLA"/>
		<reference ref_id="1227992" ref_url="https://bugzilla.suse.com/1227992" source="BUGZILLA"/>
		<reference ref_id="1227993" ref_url="https://bugzilla.suse.com/1227993" source="BUGZILLA"/>
		<reference ref_id="1227995" ref_url="https://bugzilla.suse.com/1227995" source="BUGZILLA"/>
		<reference ref_id="1227996" ref_url="https://bugzilla.suse.com/1227996" source="BUGZILLA"/>
		<reference ref_id="1227997" ref_url="https://bugzilla.suse.com/1227997" source="BUGZILLA"/>
		<reference ref_id="1228000" ref_url="https://bugzilla.suse.com/1228000" source="BUGZILLA"/>
		<reference ref_id="1228002" ref_url="https://bugzilla.suse.com/1228002" source="BUGZILLA"/>
		<reference ref_id="1228003" ref_url="https://bugzilla.suse.com/1228003" source="BUGZILLA"/>
		<reference ref_id="1228004" ref_url="https://bugzilla.suse.com/1228004" source="BUGZILLA"/>
		<reference ref_id="1228005" ref_url="https://bugzilla.suse.com/1228005" source="BUGZILLA"/>
		<reference ref_id="1228006" ref_url="https://bugzilla.suse.com/1228006" source="BUGZILLA"/>
		<reference ref_id="1228007" ref_url="https://bugzilla.suse.com/1228007" source="BUGZILLA"/>
		<reference ref_id="1228008" ref_url="https://bugzilla.suse.com/1228008" source="BUGZILLA"/>
		<reference ref_id="1228009" ref_url="https://bugzilla.suse.com/1228009" source="BUGZILLA"/>
		<reference ref_id="1228010" ref_url="https://bugzilla.suse.com/1228010" source="BUGZILLA"/>
		<reference ref_id="1228011" ref_url="https://bugzilla.suse.com/1228011" source="BUGZILLA"/>
		<reference ref_id="1228013" ref_url="https://bugzilla.suse.com/1228013" source="BUGZILLA"/>
		<reference ref_id="1228014" ref_url="https://bugzilla.suse.com/1228014" source="BUGZILLA"/>
		<reference ref_id="1228015" ref_url="https://bugzilla.suse.com/1228015" source="BUGZILLA"/>
		<reference ref_id="1228019" ref_url="https://bugzilla.suse.com/1228019" source="BUGZILLA"/>
		<reference ref_id="1228020" ref_url="https://bugzilla.suse.com/1228020" source="BUGZILLA"/>
		<reference ref_id="1228025" ref_url="https://bugzilla.suse.com/1228025" source="BUGZILLA"/>
		<reference ref_id="1228028" ref_url="https://bugzilla.suse.com/1228028" source="BUGZILLA"/>
		<reference ref_id="1228035" ref_url="https://bugzilla.suse.com/1228035" source="BUGZILLA"/>
		<reference ref_id="1228037" ref_url="https://bugzilla.suse.com/1228037" source="BUGZILLA"/>
		<reference ref_id="1228038" ref_url="https://bugzilla.suse.com/1228038" source="BUGZILLA"/>
		<reference ref_id="1228039" ref_url="https://bugzilla.suse.com/1228039" source="BUGZILLA"/>
		<reference ref_id="1228040" ref_url="https://bugzilla.suse.com/1228040" source="BUGZILLA"/>
		<reference ref_id="1228045" ref_url="https://bugzilla.suse.com/1228045" source="BUGZILLA"/>
		<reference ref_id="1228054" ref_url="https://bugzilla.suse.com/1228054" source="BUGZILLA"/>
		<reference ref_id="1228055" ref_url="https://bugzilla.suse.com/1228055" source="BUGZILLA"/>
		<reference ref_id="1228056" ref_url="https://bugzilla.suse.com/1228056" source="BUGZILLA"/>
		<reference ref_id="1228060" ref_url="https://bugzilla.suse.com/1228060" source="BUGZILLA"/>
		<reference ref_id="1228061" ref_url="https://bugzilla.suse.com/1228061" source="BUGZILLA"/>
		<reference ref_id="1228062" ref_url="https://bugzilla.suse.com/1228062" source="BUGZILLA"/>
		<reference ref_id="1228063" ref_url="https://bugzilla.suse.com/1228063" source="BUGZILLA"/>
		<reference ref_id="1228064" ref_url="https://bugzilla.suse.com/1228064" source="BUGZILLA"/>
		<reference ref_id="1228066" ref_url="https://bugzilla.suse.com/1228066" source="BUGZILLA"/>
		<reference ref_id="1228067" ref_url="https://bugzilla.suse.com/1228067" source="BUGZILLA"/>
		<reference ref_id="1228068" ref_url="https://bugzilla.suse.com/1228068" source="BUGZILLA"/>
		<reference ref_id="1228071" ref_url="https://bugzilla.suse.com/1228071" source="BUGZILLA"/>
		<reference ref_id="1228079" ref_url="https://bugzilla.suse.com/1228079" source="BUGZILLA"/>
		<reference ref_id="1228090" ref_url="https://bugzilla.suse.com/1228090" source="BUGZILLA"/>
		<reference ref_id="1228114" ref_url="https://bugzilla.suse.com/1228114" source="BUGZILLA"/>
		<reference ref_id="1228140" ref_url="https://bugzilla.suse.com/1228140" source="BUGZILLA"/>
		<reference ref_id="1228190" ref_url="https://bugzilla.suse.com/1228190" source="BUGZILLA"/>
		<reference ref_id="1228191" ref_url="https://bugzilla.suse.com/1228191" source="BUGZILLA"/>
		<reference ref_id="1228195" ref_url="https://bugzilla.suse.com/1228195" source="BUGZILLA"/>
		<reference ref_id="1228202" ref_url="https://bugzilla.suse.com/1228202" source="BUGZILLA"/>
		<reference ref_id="1228226" ref_url="https://bugzilla.suse.com/1228226" source="BUGZILLA"/>
		<reference ref_id="1228235" ref_url="https://bugzilla.suse.com/1228235" source="BUGZILLA"/>
		<reference ref_id="1228237" ref_url="https://bugzilla.suse.com/1228237" source="BUGZILLA"/>
		<reference ref_id="1228247" ref_url="https://bugzilla.suse.com/1228247" source="BUGZILLA"/>
		<reference ref_id="1228327" ref_url="https://bugzilla.suse.com/1228327" source="BUGZILLA"/>
		<reference ref_id="1228328" ref_url="https://bugzilla.suse.com/1228328" source="BUGZILLA"/>
		<reference ref_id="1228330" ref_url="https://bugzilla.suse.com/1228330" source="BUGZILLA"/>
		<reference ref_id="1228403" ref_url="https://bugzilla.suse.com/1228403" source="BUGZILLA"/>
		<reference ref_id="1228405" ref_url="https://bugzilla.suse.com/1228405" source="BUGZILLA"/>
		<reference ref_id="1228408" ref_url="https://bugzilla.suse.com/1228408" source="BUGZILLA"/>
		<reference ref_id="1228409" ref_url="https://bugzilla.suse.com/1228409" source="BUGZILLA"/>
		<reference ref_id="1228410" ref_url="https://bugzilla.suse.com/1228410" source="BUGZILLA"/>
		<reference ref_id="1228418" ref_url="https://bugzilla.suse.com/1228418" source="BUGZILLA"/>
		<reference ref_id="1228440" ref_url="https://bugzilla.suse.com/1228440" source="BUGZILLA"/>
		<reference ref_id="1228459" ref_url="https://bugzilla.suse.com/1228459" source="BUGZILLA"/>
		<reference ref_id="1228462" ref_url="https://bugzilla.suse.com/1228462" source="BUGZILLA"/>
		<reference ref_id="1228470" ref_url="https://bugzilla.suse.com/1228470" source="BUGZILLA"/>
		<reference ref_id="1228518" ref_url="https://bugzilla.suse.com/1228518" source="BUGZILLA"/>
		<reference ref_id="1228520" ref_url="https://bugzilla.suse.com/1228520" source="BUGZILLA"/>
		<reference ref_id="1228530" ref_url="https://bugzilla.suse.com/1228530" source="BUGZILLA"/>
		<reference ref_id="1228561" ref_url="https://bugzilla.suse.com/1228561" source="BUGZILLA"/>
		<reference ref_id="1228565" ref_url="https://bugzilla.suse.com/1228565" source="BUGZILLA"/>
		<reference ref_id="1228580" ref_url="https://bugzilla.suse.com/1228580" source="BUGZILLA"/>
		<reference ref_id="1228581" ref_url="https://bugzilla.suse.com/1228581" source="BUGZILLA"/>
		<reference ref_id="1228591" ref_url="https://bugzilla.suse.com/1228591" source="BUGZILLA"/>
		<reference ref_id="1228599" ref_url="https://bugzilla.suse.com/1228599" source="BUGZILLA"/>
		<reference ref_id="1228617" ref_url="https://bugzilla.suse.com/1228617" source="BUGZILLA"/>
		<reference ref_id="1228625" ref_url="https://bugzilla.suse.com/1228625" source="BUGZILLA"/>
		<reference ref_id="1228626" ref_url="https://bugzilla.suse.com/1228626" source="BUGZILLA"/>
		<reference ref_id="1228633" ref_url="https://bugzilla.suse.com/1228633" source="BUGZILLA"/>
		<reference ref_id="1228640" ref_url="https://bugzilla.suse.com/1228640" source="BUGZILLA"/>
		<reference ref_id="1228644" ref_url="https://bugzilla.suse.com/1228644" source="BUGZILLA"/>
		<reference ref_id="1228649" ref_url="https://bugzilla.suse.com/1228649" source="BUGZILLA"/>
		<reference ref_id="1228655" ref_url="https://bugzilla.suse.com/1228655" source="BUGZILLA"/>
		<reference ref_id="1228665" ref_url="https://bugzilla.suse.com/1228665" source="BUGZILLA"/>
		<reference ref_id="1228672" ref_url="https://bugzilla.suse.com/1228672" source="BUGZILLA"/>
		<reference ref_id="1228680" ref_url="https://bugzilla.suse.com/1228680" source="BUGZILLA"/>
		<reference ref_id="1228705" ref_url="https://bugzilla.suse.com/1228705" source="BUGZILLA"/>
		<reference ref_id="1228723" ref_url="https://bugzilla.suse.com/1228723" source="BUGZILLA"/>
		<reference ref_id="1228743" ref_url="https://bugzilla.suse.com/1228743" source="BUGZILLA"/>
		<reference ref_id="1228756" ref_url="https://bugzilla.suse.com/1228756" source="BUGZILLA"/>
		<reference ref_id="1228801" ref_url="https://bugzilla.suse.com/1228801" source="BUGZILLA"/>
		<reference ref_id="1228850" ref_url="https://bugzilla.suse.com/1228850" source="BUGZILLA"/>
		<reference ref_id="1228857" ref_url="https://bugzilla.suse.com/1228857" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-47086" ref_url="https://www.suse.com/security/cve/CVE-2021-47086/" source="CVE"/>
		<reference ref_id="CVE-2021-47103" ref_url="https://www.suse.com/security/cve/CVE-2021-47103/" source="CVE"/>
		<reference ref_id="CVE-2021-47186" ref_url="https://www.suse.com/security/cve/CVE-2021-47186/" source="CVE"/>
		<reference ref_id="CVE-2021-47402" ref_url="https://www.suse.com/security/cve/CVE-2021-47402/" source="CVE"/>
		<reference ref_id="CVE-2021-47546" ref_url="https://www.suse.com/security/cve/CVE-2021-47546/" source="CVE"/>
		<reference ref_id="CVE-2021-47547" ref_url="https://www.suse.com/security/cve/CVE-2021-47547/" source="CVE"/>
		<reference ref_id="CVE-2021-47588" ref_url="https://www.suse.com/security/cve/CVE-2021-47588/" source="CVE"/>
		<reference ref_id="CVE-2021-47590" ref_url="https://www.suse.com/security/cve/CVE-2021-47590/" source="CVE"/>
		<reference ref_id="CVE-2021-47591" ref_url="https://www.suse.com/security/cve/CVE-2021-47591/" source="CVE"/>
		<reference ref_id="CVE-2021-47593" ref_url="https://www.suse.com/security/cve/CVE-2021-47593/" source="CVE"/>
		<reference ref_id="CVE-2021-47598" ref_url="https://www.suse.com/security/cve/CVE-2021-47598/" source="CVE"/>
		<reference ref_id="CVE-2021-47599" ref_url="https://www.suse.com/security/cve/CVE-2021-47599/" source="CVE"/>
		<reference ref_id="CVE-2021-47606" ref_url="https://www.suse.com/security/cve/CVE-2021-47606/" source="CVE"/>
		<reference ref_id="CVE-2021-47622" ref_url="https://www.suse.com/security/cve/CVE-2021-47622/" source="CVE"/>
		<reference ref_id="CVE-2021-47623" ref_url="https://www.suse.com/security/cve/CVE-2021-47623/" source="CVE"/>
		<reference ref_id="CVE-2021-47624" ref_url="https://www.suse.com/security/cve/CVE-2021-47624/" source="CVE"/>
		<reference ref_id="CVE-2022-48713" ref_url="https://www.suse.com/security/cve/CVE-2022-48713/" source="CVE"/>
		<reference ref_id="CVE-2022-48730" ref_url="https://www.suse.com/security/cve/CVE-2022-48730/" source="CVE"/>
		<reference ref_id="CVE-2022-48732" ref_url="https://www.suse.com/security/cve/CVE-2022-48732/" source="CVE"/>
		<reference ref_id="CVE-2022-48749" ref_url="https://www.suse.com/security/cve/CVE-2022-48749/" source="CVE"/>
		<reference ref_id="CVE-2022-48756" ref_url="https://www.suse.com/security/cve/CVE-2022-48756/" source="CVE"/>
		<reference ref_id="CVE-2022-48773" ref_url="https://www.suse.com/security/cve/CVE-2022-48773/" source="CVE"/>
		<reference ref_id="CVE-2022-48774" ref_url="https://www.suse.com/security/cve/CVE-2022-48774/" source="CVE"/>
		<reference ref_id="CVE-2022-48775" ref_url="https://www.suse.com/security/cve/CVE-2022-48775/" source="CVE"/>
		<reference ref_id="CVE-2022-48776" ref_url="https://www.suse.com/security/cve/CVE-2022-48776/" source="CVE"/>
		<reference ref_id="CVE-2022-48777" ref_url="https://www.suse.com/security/cve/CVE-2022-48777/" source="CVE"/>
		<reference ref_id="CVE-2022-48778" ref_url="https://www.suse.com/security/cve/CVE-2022-48778/" source="CVE"/>
		<reference ref_id="CVE-2022-48780" ref_url="https://www.suse.com/security/cve/CVE-2022-48780/" source="CVE"/>
		<reference ref_id="CVE-2022-48783" ref_url="https://www.suse.com/security/cve/CVE-2022-48783/" source="CVE"/>
		<reference ref_id="CVE-2022-48784" ref_url="https://www.suse.com/security/cve/CVE-2022-48784/" source="CVE"/>
		<reference ref_id="CVE-2022-48785" ref_url="https://www.suse.com/security/cve/CVE-2022-48785/" source="CVE"/>
		<reference ref_id="CVE-2022-48786" ref_url="https://www.suse.com/security/cve/CVE-2022-48786/" source="CVE"/>
		<reference ref_id="CVE-2022-48787" ref_url="https://www.suse.com/security/cve/CVE-2022-48787/" source="CVE"/>
		<reference ref_id="CVE-2022-48788" ref_url="https://www.suse.com/security/cve/CVE-2022-48788/" source="CVE"/>
		<reference ref_id="CVE-2022-48789" ref_url="https://www.suse.com/security/cve/CVE-2022-48789/" source="CVE"/>
		<reference ref_id="CVE-2022-48790" ref_url="https://www.suse.com/security/cve/CVE-2022-48790/" source="CVE"/>
		<reference ref_id="CVE-2022-48791" ref_url="https://www.suse.com/security/cve/CVE-2022-48791/" source="CVE"/>
		<reference ref_id="CVE-2022-48792" ref_url="https://www.suse.com/security/cve/CVE-2022-48792/" source="CVE"/>
		<reference ref_id="CVE-2022-48793" ref_url="https://www.suse.com/security/cve/CVE-2022-48793/" source="CVE"/>
		<reference ref_id="CVE-2022-48794" ref_url="https://www.suse.com/security/cve/CVE-2022-48794/" source="CVE"/>
		<reference ref_id="CVE-2022-48796" ref_url="https://www.suse.com/security/cve/CVE-2022-48796/" source="CVE"/>
		<reference ref_id="CVE-2022-48797" ref_url="https://www.suse.com/security/cve/CVE-2022-48797/" source="CVE"/>
		<reference ref_id="CVE-2022-48798" ref_url="https://www.suse.com/security/cve/CVE-2022-48798/" source="CVE"/>
		<reference ref_id="CVE-2022-48799" ref_url="https://www.suse.com/security/cve/CVE-2022-48799/" source="CVE"/>
		<reference ref_id="CVE-2022-48800" ref_url="https://www.suse.com/security/cve/CVE-2022-48800/" source="CVE"/>
		<reference ref_id="CVE-2022-48801" ref_url="https://www.suse.com/security/cve/CVE-2022-48801/" source="CVE"/>
		<reference ref_id="CVE-2022-48802" ref_url="https://www.suse.com/security/cve/CVE-2022-48802/" source="CVE"/>
		<reference ref_id="CVE-2022-48803" ref_url="https://www.suse.com/security/cve/CVE-2022-48803/" source="CVE"/>
		<reference ref_id="CVE-2022-48804" ref_url="https://www.suse.com/security/cve/CVE-2022-48804/" source="CVE"/>
		<reference ref_id="CVE-2022-48805" ref_url="https://www.suse.com/security/cve/CVE-2022-48805/" source="CVE"/>
		<reference ref_id="CVE-2022-48806" ref_url="https://www.suse.com/security/cve/CVE-2022-48806/" source="CVE"/>
		<reference ref_id="CVE-2022-48807" ref_url="https://www.suse.com/security/cve/CVE-2022-48807/" source="CVE"/>
		<reference ref_id="CVE-2022-48809" ref_url="https://www.suse.com/security/cve/CVE-2022-48809/" source="CVE"/>
		<reference ref_id="CVE-2022-48810" ref_url="https://www.suse.com/security/cve/CVE-2022-48810/" source="CVE"/>
		<reference ref_id="CVE-2022-48811" ref_url="https://www.suse.com/security/cve/CVE-2022-48811/" source="CVE"/>
		<reference ref_id="CVE-2022-48812" ref_url="https://www.suse.com/security/cve/CVE-2022-48812/" source="CVE"/>
		<reference ref_id="CVE-2022-48813" ref_url="https://www.suse.com/security/cve/CVE-2022-48813/" source="CVE"/>
		<reference ref_id="CVE-2022-48814" ref_url="https://www.suse.com/security/cve/CVE-2022-48814/" source="CVE"/>
		<reference ref_id="CVE-2022-48815" ref_url="https://www.suse.com/security/cve/CVE-2022-48815/" source="CVE"/>
		<reference ref_id="CVE-2022-48816" ref_url="https://www.suse.com/security/cve/CVE-2022-48816/" source="CVE"/>
		<reference ref_id="CVE-2022-48817" ref_url="https://www.suse.com/security/cve/CVE-2022-48817/" source="CVE"/>
		<reference ref_id="CVE-2022-48818" ref_url="https://www.suse.com/security/cve/CVE-2022-48818/" source="CVE"/>
		<reference ref_id="CVE-2022-48820" ref_url="https://www.suse.com/security/cve/CVE-2022-48820/" source="CVE"/>
		<reference ref_id="CVE-2022-48821" ref_url="https://www.suse.com/security/cve/CVE-2022-48821/" source="CVE"/>
		<reference ref_id="CVE-2022-48822" ref_url="https://www.suse.com/security/cve/CVE-2022-48822/" source="CVE"/>
		<reference ref_id="CVE-2022-48823" ref_url="https://www.suse.com/security/cve/CVE-2022-48823/" source="CVE"/>
		<reference ref_id="CVE-2022-48824" ref_url="https://www.suse.com/security/cve/CVE-2022-48824/" source="CVE"/>
		<reference ref_id="CVE-2022-48825" ref_url="https://www.suse.com/security/cve/CVE-2022-48825/" source="CVE"/>
		<reference ref_id="CVE-2022-48826" ref_url="https://www.suse.com/security/cve/CVE-2022-48826/" source="CVE"/>
		<reference ref_id="CVE-2022-48827" ref_url="https://www.suse.com/security/cve/CVE-2022-48827/" source="CVE"/>
		<reference ref_id="CVE-2022-48828" ref_url="https://www.suse.com/security/cve/CVE-2022-48828/" source="CVE"/>
		<reference ref_id="CVE-2022-48829" ref_url="https://www.suse.com/security/cve/CVE-2022-48829/" source="CVE"/>
		<reference ref_id="CVE-2022-48830" ref_url="https://www.suse.com/security/cve/CVE-2022-48830/" source="CVE"/>
		<reference ref_id="CVE-2022-48831" ref_url="https://www.suse.com/security/cve/CVE-2022-48831/" source="CVE"/>
		<reference ref_id="CVE-2022-48834" ref_url="https://www.suse.com/security/cve/CVE-2022-48834/" source="CVE"/>
		<reference ref_id="CVE-2022-48835" ref_url="https://www.suse.com/security/cve/CVE-2022-48835/" source="CVE"/>
		<reference ref_id="CVE-2022-48836" ref_url="https://www.suse.com/security/cve/CVE-2022-48836/" source="CVE"/>
		<reference ref_id="CVE-2022-48837" ref_url="https://www.suse.com/security/cve/CVE-2022-48837/" source="CVE"/>
		<reference ref_id="CVE-2022-48838" ref_url="https://www.suse.com/security/cve/CVE-2022-48838/" source="CVE"/>
		<reference ref_id="CVE-2022-48839" ref_url="https://www.suse.com/security/cve/CVE-2022-48839/" source="CVE"/>
		<reference ref_id="CVE-2022-48840" ref_url="https://www.suse.com/security/cve/CVE-2022-48840/" source="CVE"/>
		<reference ref_id="CVE-2022-48841" ref_url="https://www.suse.com/security/cve/CVE-2022-48841/" source="CVE"/>
		<reference ref_id="CVE-2022-48842" ref_url="https://www.suse.com/security/cve/CVE-2022-48842/" source="CVE"/>
		<reference ref_id="CVE-2022-48843" ref_url="https://www.suse.com/security/cve/CVE-2022-48843/" source="CVE"/>
		<reference ref_id="CVE-2022-48844" ref_url="https://www.suse.com/security/cve/CVE-2022-48844/" source="CVE"/>
		<reference ref_id="CVE-2022-48846" ref_url="https://www.suse.com/security/cve/CVE-2022-48846/" source="CVE"/>
		<reference ref_id="CVE-2022-48847" ref_url="https://www.suse.com/security/cve/CVE-2022-48847/" source="CVE"/>
		<reference ref_id="CVE-2022-48849" ref_url="https://www.suse.com/security/cve/CVE-2022-48849/" source="CVE"/>
		<reference ref_id="CVE-2022-48850" ref_url="https://www.suse.com/security/cve/CVE-2022-48850/" source="CVE"/>
		<reference ref_id="CVE-2022-48851" ref_url="https://www.suse.com/security/cve/CVE-2022-48851/" source="CVE"/>
		<reference ref_id="CVE-2022-48852" ref_url="https://www.suse.com/security/cve/CVE-2022-48852/" source="CVE"/>
		<reference ref_id="CVE-2022-48853" ref_url="https://www.suse.com/security/cve/CVE-2022-48853/" source="CVE"/>
		<reference ref_id="CVE-2022-48855" ref_url="https://www.suse.com/security/cve/CVE-2022-48855/" source="CVE"/>
		<reference ref_id="CVE-2022-48856" ref_url="https://www.suse.com/security/cve/CVE-2022-48856/" source="CVE"/>
		<reference ref_id="CVE-2022-48857" ref_url="https://www.suse.com/security/cve/CVE-2022-48857/" source="CVE"/>
		<reference ref_id="CVE-2022-48858" ref_url="https://www.suse.com/security/cve/CVE-2022-48858/" source="CVE"/>
		<reference ref_id="CVE-2022-48859" ref_url="https://www.suse.com/security/cve/CVE-2022-48859/" source="CVE"/>
		<reference ref_id="CVE-2022-48860" ref_url="https://www.suse.com/security/cve/CVE-2022-48860/" source="CVE"/>
		<reference ref_id="CVE-2022-48861" ref_url="https://www.suse.com/security/cve/CVE-2022-48861/" source="CVE"/>
		<reference ref_id="CVE-2022-48862" ref_url="https://www.suse.com/security/cve/CVE-2022-48862/" source="CVE"/>
		<reference ref_id="CVE-2022-48863" ref_url="https://www.suse.com/security/cve/CVE-2022-48863/" source="CVE"/>
		<reference ref_id="CVE-2022-48864" ref_url="https://www.suse.com/security/cve/CVE-2022-48864/" source="CVE"/>
		<reference ref_id="CVE-2022-48866" ref_url="https://www.suse.com/security/cve/CVE-2022-48866/" source="CVE"/>
		<reference ref_id="CVE-2023-1582" ref_url="https://www.suse.com/security/cve/CVE-2023-1582/" source="CVE"/>
		<reference ref_id="CVE-2023-37453" ref_url="https://www.suse.com/security/cve/CVE-2023-37453/" source="CVE"/>
		<reference ref_id="CVE-2023-52435" ref_url="https://www.suse.com/security/cve/CVE-2023-52435/" source="CVE"/>
		<reference ref_id="CVE-2023-52573" ref_url="https://www.suse.com/security/cve/CVE-2023-52573/" source="CVE"/>
		<reference ref_id="CVE-2023-52580" ref_url="https://www.suse.com/security/cve/CVE-2023-52580/" source="CVE"/>
		<reference ref_id="CVE-2023-52591" ref_url="https://www.suse.com/security/cve/CVE-2023-52591/" source="CVE"/>
		<reference ref_id="CVE-2023-52735" ref_url="https://www.suse.com/security/cve/CVE-2023-52735/" source="CVE"/>
		<reference ref_id="CVE-2023-52751" ref_url="https://www.suse.com/security/cve/CVE-2023-52751/" source="CVE"/>
		<reference ref_id="CVE-2023-52762" ref_url="https://www.suse.com/security/cve/CVE-2023-52762/" source="CVE"/>
		<reference ref_id="CVE-2023-52775" ref_url="https://www.suse.com/security/cve/CVE-2023-52775/" source="CVE"/>
		<reference ref_id="CVE-2023-52812" ref_url="https://www.suse.com/security/cve/CVE-2023-52812/" source="CVE"/>
		<reference ref_id="CVE-2023-52857" ref_url="https://www.suse.com/security/cve/CVE-2023-52857/" source="CVE"/>
		<reference ref_id="CVE-2023-52863" ref_url="https://www.suse.com/security/cve/CVE-2023-52863/" source="CVE"/>
		<reference ref_id="CVE-2023-52885" ref_url="https://www.suse.com/security/cve/CVE-2023-52885/" source="CVE"/>
		<reference ref_id="CVE-2023-52886" ref_url="https://www.suse.com/security/cve/CVE-2023-52886/" source="CVE"/>
		<reference ref_id="CVE-2024-25741" ref_url="https://www.suse.com/security/cve/CVE-2024-25741/" source="CVE"/>
		<reference ref_id="CVE-2024-26583" ref_url="https://www.suse.com/security/cve/CVE-2024-26583/" source="CVE"/>
		<reference ref_id="CVE-2024-26584" ref_url="https://www.suse.com/security/cve/CVE-2024-26584/" source="CVE"/>
		<reference ref_id="CVE-2024-26585" ref_url="https://www.suse.com/security/cve/CVE-2024-26585/" source="CVE"/>
		<reference ref_id="CVE-2024-26615" ref_url="https://www.suse.com/security/cve/CVE-2024-26615/" source="CVE"/>
		<reference ref_id="CVE-2024-26633" ref_url="https://www.suse.com/security/cve/CVE-2024-26633/" source="CVE"/>
		<reference ref_id="CVE-2024-26635" ref_url="https://www.suse.com/security/cve/CVE-2024-26635/" source="CVE"/>
		<reference ref_id="CVE-2024-26636" ref_url="https://www.suse.com/security/cve/CVE-2024-26636/" source="CVE"/>
		<reference ref_id="CVE-2024-26641" ref_url="https://www.suse.com/security/cve/CVE-2024-26641/" source="CVE"/>
		<reference ref_id="CVE-2024-26661" ref_url="https://www.suse.com/security/cve/CVE-2024-26661/" source="CVE"/>
		<reference ref_id="CVE-2024-26663" ref_url="https://www.suse.com/security/cve/CVE-2024-26663/" source="CVE"/>
		<reference ref_id="CVE-2024-26665" ref_url="https://www.suse.com/security/cve/CVE-2024-26665/" source="CVE"/>
		<reference ref_id="CVE-2024-26800" ref_url="https://www.suse.com/security/cve/CVE-2024-26800/" source="CVE"/>
		<reference ref_id="CVE-2024-26802" ref_url="https://www.suse.com/security/cve/CVE-2024-26802/" source="CVE"/>
		<reference ref_id="CVE-2024-26813" ref_url="https://www.suse.com/security/cve/CVE-2024-26813/" source="CVE"/>
		<reference ref_id="CVE-2024-26814" ref_url="https://www.suse.com/security/cve/CVE-2024-26814/" source="CVE"/>
		<reference ref_id="CVE-2024-26863" ref_url="https://www.suse.com/security/cve/CVE-2024-26863/" source="CVE"/>
		<reference ref_id="CVE-2024-26889" ref_url="https://www.suse.com/security/cve/CVE-2024-26889/" source="CVE"/>
		<reference ref_id="CVE-2024-26920" ref_url="https://www.suse.com/security/cve/CVE-2024-26920/" source="CVE"/>
		<reference ref_id="CVE-2024-26935" ref_url="https://www.suse.com/security/cve/CVE-2024-26935/" source="CVE"/>
		<reference ref_id="CVE-2024-26961" ref_url="https://www.suse.com/security/cve/CVE-2024-26961/" source="CVE"/>
		<reference ref_id="CVE-2024-26976" ref_url="https://www.suse.com/security/cve/CVE-2024-26976/" source="CVE"/>
		<reference ref_id="CVE-2024-27015" ref_url="https://www.suse.com/security/cve/CVE-2024-27015/" source="CVE"/>
		<reference ref_id="CVE-2024-27019" ref_url="https://www.suse.com/security/cve/CVE-2024-27019/" source="CVE"/>
		<reference ref_id="CVE-2024-27020" ref_url="https://www.suse.com/security/cve/CVE-2024-27020/" source="CVE"/>
		<reference ref_id="CVE-2024-27025" ref_url="https://www.suse.com/security/cve/CVE-2024-27025/" source="CVE"/>
		<reference ref_id="CVE-2024-27065" ref_url="https://www.suse.com/security/cve/CVE-2024-27065/" source="CVE"/>
		<reference ref_id="CVE-2024-27402" ref_url="https://www.suse.com/security/cve/CVE-2024-27402/" source="CVE"/>
		<reference ref_id="CVE-2024-27437" ref_url="https://www.suse.com/security/cve/CVE-2024-27437/" source="CVE"/>
		<reference ref_id="CVE-2024-35805" ref_url="https://www.suse.com/security/cve/CVE-2024-35805/" source="CVE"/>
		<reference ref_id="CVE-2024-35819" ref_url="https://www.suse.com/security/cve/CVE-2024-35819/" source="CVE"/>
		<reference ref_id="CVE-2024-35837" ref_url="https://www.suse.com/security/cve/CVE-2024-35837/" source="CVE"/>
		<reference ref_id="CVE-2024-35853" ref_url="https://www.suse.com/security/cve/CVE-2024-35853/" source="CVE"/>
		<reference ref_id="CVE-2024-35854" ref_url="https://www.suse.com/security/cve/CVE-2024-35854/" source="CVE"/>
		<reference ref_id="CVE-2024-35855" ref_url="https://www.suse.com/security/cve/CVE-2024-35855/" source="CVE"/>
		<reference ref_id="CVE-2024-35889" ref_url="https://www.suse.com/security/cve/CVE-2024-35889/" source="CVE"/>
		<reference ref_id="CVE-2024-35890" ref_url="https://www.suse.com/security/cve/CVE-2024-35890/" source="CVE"/>
		<reference ref_id="CVE-2024-35893" ref_url="https://www.suse.com/security/cve/CVE-2024-35893/" source="CVE"/>
		<reference ref_id="CVE-2024-35899" ref_url="https://www.suse.com/security/cve/CVE-2024-35899/" source="CVE"/>
		<reference ref_id="CVE-2024-35934" ref_url="https://www.suse.com/security/cve/CVE-2024-35934/" source="CVE"/>
		<reference ref_id="CVE-2024-35949" ref_url="https://www.suse.com/security/cve/CVE-2024-35949/" source="CVE"/>
		<reference ref_id="CVE-2024-35961" ref_url="https://www.suse.com/security/cve/CVE-2024-35961/" source="CVE"/>
		<reference ref_id="CVE-2024-35979" ref_url="https://www.suse.com/security/cve/CVE-2024-35979/" source="CVE"/>
		<reference ref_id="CVE-2024-35995" ref_url="https://www.suse.com/security/cve/CVE-2024-35995/" source="CVE"/>
		<reference ref_id="CVE-2024-36000" ref_url="https://www.suse.com/security/cve/CVE-2024-36000/" source="CVE"/>
		<reference ref_id="CVE-2024-36004" ref_url="https://www.suse.com/security/cve/CVE-2024-36004/" source="CVE"/>
		<reference ref_id="CVE-2024-36288" ref_url="https://www.suse.com/security/cve/CVE-2024-36288/" source="CVE"/>
		<reference ref_id="CVE-2024-36889" ref_url="https://www.suse.com/security/cve/CVE-2024-36889/" source="CVE"/>
		<reference ref_id="CVE-2024-36901" ref_url="https://www.suse.com/security/cve/CVE-2024-36901/" source="CVE"/>
		<reference ref_id="CVE-2024-36902" ref_url="https://www.suse.com/security/cve/CVE-2024-36902/" source="CVE"/>
		<reference ref_id="CVE-2024-36909" ref_url="https://www.suse.com/security/cve/CVE-2024-36909/" source="CVE"/>
		<reference ref_id="CVE-2024-36910" ref_url="https://www.suse.com/security/cve/CVE-2024-36910/" source="CVE"/>
		<reference ref_id="CVE-2024-36911" ref_url="https://www.suse.com/security/cve/CVE-2024-36911/" source="CVE"/>
		<reference ref_id="CVE-2024-36912" ref_url="https://www.suse.com/security/cve/CVE-2024-36912/" source="CVE"/>
		<reference ref_id="CVE-2024-36913" ref_url="https://www.suse.com/security/cve/CVE-2024-36913/" source="CVE"/>
		<reference ref_id="CVE-2024-36914" ref_url="https://www.suse.com/security/cve/CVE-2024-36914/" source="CVE"/>
		<reference ref_id="CVE-2024-36919" ref_url="https://www.suse.com/security/cve/CVE-2024-36919/" source="CVE"/>
		<reference ref_id="CVE-2024-36923" ref_url="https://www.suse.com/security/cve/CVE-2024-36923/" source="CVE"/>
		<reference ref_id="CVE-2024-36924" ref_url="https://www.suse.com/security/cve/CVE-2024-36924/" source="CVE"/>
		<reference ref_id="CVE-2024-36926" ref_url="https://www.suse.com/security/cve/CVE-2024-36926/" source="CVE"/>
		<reference ref_id="CVE-2024-36939" ref_url="https://www.suse.com/security/cve/CVE-2024-36939/" source="CVE"/>
		<reference ref_id="CVE-2024-36941" ref_url="https://www.suse.com/security/cve/CVE-2024-36941/" source="CVE"/>
		<reference ref_id="CVE-2024-36942" ref_url="https://www.suse.com/security/cve/CVE-2024-36942/" source="CVE"/>
		<reference ref_id="CVE-2024-36944" ref_url="https://www.suse.com/security/cve/CVE-2024-36944/" source="CVE"/>
		<reference ref_id="CVE-2024-36946" ref_url="https://www.suse.com/security/cve/CVE-2024-36946/" source="CVE"/>
		<reference ref_id="CVE-2024-36947" ref_url="https://www.suse.com/security/cve/CVE-2024-36947/" source="CVE"/>
		<reference ref_id="CVE-2024-36950" ref_url="https://www.suse.com/security/cve/CVE-2024-36950/" source="CVE"/>
		<reference ref_id="CVE-2024-36952" ref_url="https://www.suse.com/security/cve/CVE-2024-36952/" source="CVE"/>
		<reference ref_id="CVE-2024-36955" ref_url="https://www.suse.com/security/cve/CVE-2024-36955/" source="CVE"/>
		<reference ref_id="CVE-2024-36959" ref_url="https://www.suse.com/security/cve/CVE-2024-36959/" source="CVE"/>
		<reference ref_id="CVE-2024-36974" ref_url="https://www.suse.com/security/cve/CVE-2024-36974/" source="CVE"/>
		<reference ref_id="CVE-2024-38548" ref_url="https://www.suse.com/security/cve/CVE-2024-38548/" source="CVE"/>
		<reference ref_id="CVE-2024-38555" ref_url="https://www.suse.com/security/cve/CVE-2024-38555/" source="CVE"/>
		<reference ref_id="CVE-2024-38558" ref_url="https://www.suse.com/security/cve/CVE-2024-38558/" source="CVE"/>
		<reference ref_id="CVE-2024-38559" ref_url="https://www.suse.com/security/cve/CVE-2024-38559/" source="CVE"/>
		<reference ref_id="CVE-2024-38570" ref_url="https://www.suse.com/security/cve/CVE-2024-38570/" source="CVE"/>
		<reference ref_id="CVE-2024-38586" ref_url="https://www.suse.com/security/cve/CVE-2024-38586/" source="CVE"/>
		<reference ref_id="CVE-2024-38588" ref_url="https://www.suse.com/security/cve/CVE-2024-38588/" source="CVE"/>
		<reference ref_id="CVE-2024-38598" ref_url="https://www.suse.com/security/cve/CVE-2024-38598/" source="CVE"/>
		<reference ref_id="CVE-2024-38628" ref_url="https://www.suse.com/security/cve/CVE-2024-38628/" source="CVE"/>
		<reference ref_id="CVE-2024-39276" ref_url="https://www.suse.com/security/cve/CVE-2024-39276/" source="CVE"/>
		<reference ref_id="CVE-2024-39371" ref_url="https://www.suse.com/security/cve/CVE-2024-39371/" source="CVE"/>
		<reference ref_id="CVE-2024-39463" ref_url="https://www.suse.com/security/cve/CVE-2024-39463/" source="CVE"/>
		<reference ref_id="CVE-2024-39472" ref_url="https://www.suse.com/security/cve/CVE-2024-39472/" source="CVE"/>
		<reference ref_id="CVE-2024-39475" ref_url="https://www.suse.com/security/cve/CVE-2024-39475/" source="CVE"/>
		<reference ref_id="CVE-2024-39482" ref_url="https://www.suse.com/security/cve/CVE-2024-39482/" source="CVE"/>
		<reference ref_id="CVE-2024-39487" ref_url="https://www.suse.com/security/cve/CVE-2024-39487/" source="CVE"/>
		<reference ref_id="CVE-2024-39488" ref_url="https://www.suse.com/security/cve/CVE-2024-39488/" source="CVE"/>
		<reference ref_id="CVE-2024-39490" ref_url="https://www.suse.com/security/cve/CVE-2024-39490/" source="CVE"/>
		<reference ref_id="CVE-2024-39493" ref_url="https://www.suse.com/security/cve/CVE-2024-39493/" source="CVE"/>
		<reference ref_id="CVE-2024-39494" ref_url="https://www.suse.com/security/cve/CVE-2024-39494/" source="CVE"/>
		<reference ref_id="CVE-2024-39497" ref_url="https://www.suse.com/security/cve/CVE-2024-39497/" source="CVE"/>
		<reference ref_id="CVE-2024-39499" ref_url="https://www.suse.com/security/cve/CVE-2024-39499/" source="CVE"/>
		<reference ref_id="CVE-2024-39500" ref_url="https://www.suse.com/security/cve/CVE-2024-39500/" source="CVE"/>
		<reference ref_id="CVE-2024-39501" ref_url="https://www.suse.com/security/cve/CVE-2024-39501/" source="CVE"/>
		<reference ref_id="CVE-2024-39502" ref_url="https://www.suse.com/security/cve/CVE-2024-39502/" source="CVE"/>
		<reference ref_id="CVE-2024-39505" ref_url="https://www.suse.com/security/cve/CVE-2024-39505/" source="CVE"/>
		<reference ref_id="CVE-2024-39506" ref_url="https://www.suse.com/security/cve/CVE-2024-39506/" source="CVE"/>
		<reference ref_id="CVE-2024-39507" ref_url="https://www.suse.com/security/cve/CVE-2024-39507/" source="CVE"/>
		<reference ref_id="CVE-2024-39508" ref_url="https://www.suse.com/security/cve/CVE-2024-39508/" source="CVE"/>
		<reference ref_id="CVE-2024-39509" ref_url="https://www.suse.com/security/cve/CVE-2024-39509/" source="CVE"/>
		<reference ref_id="CVE-2024-40900" ref_url="https://www.suse.com/security/cve/CVE-2024-40900/" source="CVE"/>
		<reference ref_id="CVE-2024-40901" ref_url="https://www.suse.com/security/cve/CVE-2024-40901/" source="CVE"/>
		<reference ref_id="CVE-2024-40902" ref_url="https://www.suse.com/security/cve/CVE-2024-40902/" source="CVE"/>
		<reference ref_id="CVE-2024-40903" ref_url="https://www.suse.com/security/cve/CVE-2024-40903/" source="CVE"/>
		<reference ref_id="CVE-2024-40904" ref_url="https://www.suse.com/security/cve/CVE-2024-40904/" source="CVE"/>
		<reference ref_id="CVE-2024-40906" ref_url="https://www.suse.com/security/cve/CVE-2024-40906/" source="CVE"/>
		<reference ref_id="CVE-2024-40908" ref_url="https://www.suse.com/security/cve/CVE-2024-40908/" source="CVE"/>
		<reference ref_id="CVE-2024-40909" ref_url="https://www.suse.com/security/cve/CVE-2024-40909/" source="CVE"/>
		<reference ref_id="CVE-2024-40911" ref_url="https://www.suse.com/security/cve/CVE-2024-40911/" source="CVE"/>
		<reference ref_id="CVE-2024-40912" ref_url="https://www.suse.com/security/cve/CVE-2024-40912/" source="CVE"/>
		<reference ref_id="CVE-2024-40916" ref_url="https://www.suse.com/security/cve/CVE-2024-40916/" source="CVE"/>
		<reference ref_id="CVE-2024-40919" ref_url="https://www.suse.com/security/cve/CVE-2024-40919/" source="CVE"/>
		<reference ref_id="CVE-2024-40923" ref_url="https://www.suse.com/security/cve/CVE-2024-40923/" source="CVE"/>
		<reference ref_id="CVE-2024-40924" ref_url="https://www.suse.com/security/cve/CVE-2024-40924/" source="CVE"/>
		<reference ref_id="CVE-2024-40927" ref_url="https://www.suse.com/security/cve/CVE-2024-40927/" source="CVE"/>
		<reference ref_id="CVE-2024-40929" ref_url="https://www.suse.com/security/cve/CVE-2024-40929/" source="CVE"/>
		<reference ref_id="CVE-2024-40931" ref_url="https://www.suse.com/security/cve/CVE-2024-40931/" source="CVE"/>
		<reference ref_id="CVE-2024-40932" ref_url="https://www.suse.com/security/cve/CVE-2024-40932/" source="CVE"/>
		<reference ref_id="CVE-2024-40934" ref_url="https://www.suse.com/security/cve/CVE-2024-40934/" source="CVE"/>
		<reference ref_id="CVE-2024-40935" ref_url="https://www.suse.com/security/cve/CVE-2024-40935/" source="CVE"/>
		<reference ref_id="CVE-2024-40937" ref_url="https://www.suse.com/security/cve/CVE-2024-40937/" source="CVE"/>
		<reference ref_id="CVE-2024-40940" ref_url="https://www.suse.com/security/cve/CVE-2024-40940/" source="CVE"/>
		<reference ref_id="CVE-2024-40941" ref_url="https://www.suse.com/security/cve/CVE-2024-40941/" source="CVE"/>
		<reference ref_id="CVE-2024-40942" ref_url="https://www.suse.com/security/cve/CVE-2024-40942/" source="CVE"/>
		<reference ref_id="CVE-2024-40943" ref_url="https://www.suse.com/security/cve/CVE-2024-40943/" source="CVE"/>
		<reference ref_id="CVE-2024-40945" ref_url="https://www.suse.com/security/cve/CVE-2024-40945/" source="CVE"/>
		<reference ref_id="CVE-2024-40953" ref_url="https://www.suse.com/security/cve/CVE-2024-40953/" source="CVE"/>
		<reference ref_id="CVE-2024-40954" ref_url="https://www.suse.com/security/cve/CVE-2024-40954/" source="CVE"/>
		<reference ref_id="CVE-2024-40956" ref_url="https://www.suse.com/security/cve/CVE-2024-40956/" source="CVE"/>
		<reference ref_id="CVE-2024-40958" ref_url="https://www.suse.com/security/cve/CVE-2024-40958/" source="CVE"/>
		<reference ref_id="CVE-2024-40959" ref_url="https://www.suse.com/security/cve/CVE-2024-40959/" source="CVE"/>
		<reference ref_id="CVE-2024-40960" ref_url="https://www.suse.com/security/cve/CVE-2024-40960/" source="CVE"/>
		<reference ref_id="CVE-2024-40961" ref_url="https://www.suse.com/security/cve/CVE-2024-40961/" source="CVE"/>
		<reference ref_id="CVE-2024-40966" ref_url="https://www.suse.com/security/cve/CVE-2024-40966/" source="CVE"/>
		<reference ref_id="CVE-2024-40967" ref_url="https://www.suse.com/security/cve/CVE-2024-40967/" source="CVE"/>
		<reference ref_id="CVE-2024-40970" ref_url="https://www.suse.com/security/cve/CVE-2024-40970/" source="CVE"/>
		<reference ref_id="CVE-2024-40972" ref_url="https://www.suse.com/security/cve/CVE-2024-40972/" source="CVE"/>
		<reference ref_id="CVE-2024-40976" ref_url="https://www.suse.com/security/cve/CVE-2024-40976/" source="CVE"/>
		<reference ref_id="CVE-2024-40977" ref_url="https://www.suse.com/security/cve/CVE-2024-40977/" source="CVE"/>
		<reference ref_id="CVE-2024-40981" ref_url="https://www.suse.com/security/cve/CVE-2024-40981/" source="CVE"/>
		<reference ref_id="CVE-2024-40982" ref_url="https://www.suse.com/security/cve/CVE-2024-40982/" source="CVE"/>
		<reference ref_id="CVE-2024-40984" ref_url="https://www.suse.com/security/cve/CVE-2024-40984/" source="CVE"/>
		<reference ref_id="CVE-2024-40987" ref_url="https://www.suse.com/security/cve/CVE-2024-40987/" source="CVE"/>
		<reference ref_id="CVE-2024-40988" ref_url="https://www.suse.com/security/cve/CVE-2024-40988/" source="CVE"/>
		<reference ref_id="CVE-2024-40989" ref_url="https://www.suse.com/security/cve/CVE-2024-40989/" source="CVE"/>
		<reference ref_id="CVE-2024-40990" ref_url="https://www.suse.com/security/cve/CVE-2024-40990/" source="CVE"/>
		<reference ref_id="CVE-2024-40994" ref_url="https://www.suse.com/security/cve/CVE-2024-40994/" source="CVE"/>
		<reference ref_id="CVE-2024-40998" ref_url="https://www.suse.com/security/cve/CVE-2024-40998/" source="CVE"/>
		<reference ref_id="CVE-2024-40999" ref_url="https://www.suse.com/security/cve/CVE-2024-40999/" source="CVE"/>
		<reference ref_id="CVE-2024-41002" ref_url="https://www.suse.com/security/cve/CVE-2024-41002/" source="CVE"/>
		<reference ref_id="CVE-2024-41004" ref_url="https://www.suse.com/security/cve/CVE-2024-41004/" source="CVE"/>
		<reference ref_id="CVE-2024-41006" ref_url="https://www.suse.com/security/cve/CVE-2024-41006/" source="CVE"/>
		<reference ref_id="CVE-2024-41009" ref_url="https://www.suse.com/security/cve/CVE-2024-41009/" source="CVE"/>
		<reference ref_id="CVE-2024-41011" ref_url="https://www.suse.com/security/cve/CVE-2024-41011/" source="CVE"/>
		<reference ref_id="CVE-2024-41012" ref_url="https://www.suse.com/security/cve/CVE-2024-41012/" source="CVE"/>
		<reference ref_id="CVE-2024-41013" ref_url="https://www.suse.com/security/cve/CVE-2024-41013/" source="CVE"/>
		<reference ref_id="CVE-2024-41014" ref_url="https://www.suse.com/security/cve/CVE-2024-41014/" source="CVE"/>
		<reference ref_id="CVE-2024-41015" ref_url="https://www.suse.com/security/cve/CVE-2024-41015/" source="CVE"/>
		<reference ref_id="CVE-2024-41016" ref_url="https://www.suse.com/security/cve/CVE-2024-41016/" source="CVE"/>
		<reference ref_id="CVE-2024-41017" ref_url="https://www.suse.com/security/cve/CVE-2024-41017/" source="CVE"/>
		<reference ref_id="CVE-2024-41040" ref_url="https://www.suse.com/security/cve/CVE-2024-41040/" source="CVE"/>
		<reference ref_id="CVE-2024-41041" ref_url="https://www.suse.com/security/cve/CVE-2024-41041/" source="CVE"/>
		<reference ref_id="CVE-2024-41044" ref_url="https://www.suse.com/security/cve/CVE-2024-41044/" source="CVE"/>
		<reference ref_id="CVE-2024-41048" ref_url="https://www.suse.com/security/cve/CVE-2024-41048/" source="CVE"/>
		<reference ref_id="CVE-2024-41057" ref_url="https://www.suse.com/security/cve/CVE-2024-41057/" source="CVE"/>
		<reference ref_id="CVE-2024-41058" ref_url="https://www.suse.com/security/cve/CVE-2024-41058/" source="CVE"/>
		<reference ref_id="CVE-2024-41059" ref_url="https://www.suse.com/security/cve/CVE-2024-41059/" source="CVE"/>
		<reference ref_id="CVE-2024-41063" ref_url="https://www.suse.com/security/cve/CVE-2024-41063/" source="CVE"/>
		<reference ref_id="CVE-2024-41064" ref_url="https://www.suse.com/security/cve/CVE-2024-41064/" source="CVE"/>
		<reference ref_id="CVE-2024-41066" ref_url="https://www.suse.com/security/cve/CVE-2024-41066/" source="CVE"/>
		<reference ref_id="CVE-2024-41069" ref_url="https://www.suse.com/security/cve/CVE-2024-41069/" source="CVE"/>
		<reference ref_id="CVE-2024-41070" ref_url="https://www.suse.com/security/cve/CVE-2024-41070/" source="CVE"/>
		<reference ref_id="CVE-2024-41071" ref_url="https://www.suse.com/security/cve/CVE-2024-41071/" source="CVE"/>
		<reference ref_id="CVE-2024-41072" ref_url="https://www.suse.com/security/cve/CVE-2024-41072/" source="CVE"/>
		<reference ref_id="CVE-2024-41076" ref_url="https://www.suse.com/security/cve/CVE-2024-41076/" source="CVE"/>
		<reference ref_id="CVE-2024-41078" ref_url="https://www.suse.com/security/cve/CVE-2024-41078/" source="CVE"/>
		<reference ref_id="CVE-2024-41081" ref_url="https://www.suse.com/security/cve/CVE-2024-41081/" source="CVE"/>
		<reference ref_id="CVE-2024-41087" ref_url="https://www.suse.com/security/cve/CVE-2024-41087/" source="CVE"/>
		<reference ref_id="CVE-2024-41090" ref_url="https://www.suse.com/security/cve/CVE-2024-41090/" source="CVE"/>
		<reference ref_id="CVE-2024-41091" ref_url="https://www.suse.com/security/cve/CVE-2024-41091/" source="CVE"/>
		<reference ref_id="CVE-2024-42070" ref_url="https://www.suse.com/security/cve/CVE-2024-42070/" source="CVE"/>
		<reference ref_id="CVE-2024-42079" ref_url="https://www.suse.com/security/cve/CVE-2024-42079/" source="CVE"/>
		<reference ref_id="CVE-2024-42093" ref_url="https://www.suse.com/security/cve/CVE-2024-42093/" source="CVE"/>
		<reference ref_id="CVE-2024-42096" ref_url="https://www.suse.com/security/cve/CVE-2024-42096/" source="CVE"/>
		<reference ref_id="CVE-2024-42105" ref_url="https://www.suse.com/security/cve/CVE-2024-42105/" source="CVE"/>
		<reference ref_id="CVE-2024-42122" ref_url="https://www.suse.com/security/cve/CVE-2024-42122/" source="CVE"/>
		<reference ref_id="CVE-2024-42124" ref_url="https://www.suse.com/security/cve/CVE-2024-42124/" source="CVE"/>
		<reference ref_id="CVE-2024-42145" ref_url="https://www.suse.com/security/cve/CVE-2024-42145/" source="CVE"/>
		<reference ref_id="CVE-2024-42161" ref_url="https://www.suse.com/security/cve/CVE-2024-42161/" source="CVE"/>
		<reference ref_id="CVE-2024-42224" ref_url="https://www.suse.com/security/cve/CVE-2024-42224/" source="CVE"/>
		<reference ref_id="CVE-2024-42230" ref_url="https://www.suse.com/security/cve/CVE-2024-42230/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2021-47086: phonet/pep: refuse to enable an unbound pipe (bsc#1220952).
- CVE-2021-47103: net: sock: preserve kabi for sock (bsc#1221010).
- CVE-2021-47186: tipc: check for null after calling kmemdup (bsc#1222702).
- CVE-2021-47546: Kabi fix for ipv6: fix memory leak in fib6_rule_suppress (bsc#1225504).
- CVE-2021-47547: net: tulip: de4x5: fix the problem that the array 'lp-&gt;phy' may be out of bound (bsc#1225505).
- CVE-2021-47588: sit: do not call ipip6_dev_free() from sit_init_net() (bsc#1226568).
- CVE-2021-47590: mptcp: fix deadlock in __mptcp_push_pending() (bsc#1226565).
- CVE-2021-47591: mptcp: remove tcp ulp setsockopt support (bsc#1226570).
- CVE-2021-47593: mptcp: clear 'kern' flag from fallback sockets (bsc#1226551).
- CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1226574).
- CVE-2021-47599: btrfs: use latest_dev in btrfs_show_devname (bsc#1226571)
- CVE-2021-47606: net: netlink: af_netlink: Prevent empty skb by adding a check on len (bsc#1226555).
- CVE-2021-47623: powerpc/fixmap: Fix VM debug warning on unmap (bsc#1227919).
- CVE-2022-48785: ipv6: mcast: use rcu-safe version of ipv6_get_lladdr() (bsc#1227927)
- CVE-2022-48810: ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path (bsc#1227936).
- CVE-2022-48850: net-sysfs: add check for netdevice being present to speed_show (bsc#1228071)
- CVE-2022-48855: sctp: fix kernel-infoleak for SCTP sockets (bsc#1228003).
- CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138).
- CVE-2023-52573: net: rds: Fix possible NULL-pointer dereference (bsc#1220869)
- CVE-2023-52580: net/core: Fix ETH_P_1588 flow dissector (bsc#1220876).
- CVE-2023-52751: smb: client: fix use-after-free in smb2_query_info_compound() (bsc#1225489).
- CVE-2023-52775: net/smc: avoid data corruption caused by decline (bsc#1225088).
- CVE-2023-52812: drm/amd: check num of link levels when update pcie param (bsc#1225564).
- CVE-2023-52857: drm/mediatek: Fix coverity issue with unintentional integer overflow (bsc#1225581).
- CVE-2023-52863: hwmon: (axi-fan-control) Fix possible NULL pointer dereference (bsc#1225586).
- CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187).
- CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection dump (bsc#1220942).
- CVE-2024-26633: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() (bsc#1221647).
- CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656).
- CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding changes (bsc#1221659).
- CVE-2024-26641: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() (bsc#1221654).
- CVE-2024-26661: drm/amd/display: Add NULL test for 'timing generator' in (bsc#1222323)
- CVE-2024-26663: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (bsc#1222326).
- CVE-2024-26665: tunnels: fix out of bounds access when building IPv6 PMTU error (bsc#1222328).
- CVE-2024-26802: stmmac: Clear variable when destroying workqueue (bsc#1222799).
- CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node() (bsc#1223021).
- CVE-2024-26961: mac802154: fix llsec key resources release in mac802154_llsec_key_del (bsc#1223652).
- CVE-2024-27015: netfilter: flowtable: incorrect pppoe tuple (bsc#1223806).
- CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (bsc#1223813)
- CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (bsc#1223815)
- CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778)
- CVE-2024-27065: netfilter: nf_tables: do not compare internal table flags on updates (bsc#1223836).
- CVE-2024-27402: phonet/pep: fix racy skb_queue_empty() use (bsc#1224414).
- CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ (bsc#1222625).
- CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit (bsc#1224743).
- CVE-2024-35819: soc: fsl: qbman: Use raw spinlock for cgr_lock (bsc#1224683).
- CVE-2024-35837: net: mvpp2: clear BM pool before initialization (bsc#1224500).
- CVE-2024-35853: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash (bsc#1224604).
- CVE-2024-35889: idpf: fix kernel panic on unknown packet types (bsc#1224517).
- CVE-2024-35890: gro: fix ownership transfer (bsc#1224516).
- CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak (bsc#1224512)
- CVE-2024-35899: netfilter: nf_tables: flush pending destroy work before exit_net release (bsc#1224499)
- CVE-2024-35934: net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() (bsc#1224641)
- CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700)
- CVE-2024-35961: net/mlx5: Restore mistakenly dropped parts in register devlink flow (bsc#1224585).
- CVE-2024-35979: raid1: fix use-after-free for original bio in raid1_write_request() (bsc#1224572).
- CVE-2024-35995: ACPI: CPPC: Fix access width used for PCC registers (bsc#1224557).
- CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (bsc#1224548).
- CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1224545)
- CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output() (bsc#1225711)
- CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (bsc#1225719).
- CVE-2024-36909: Drivers: hv: vmbus: Do not free ring buffers that couldn't be re-encrypted (bsc#1225744).
- CVE-2024-36910: uio_hv_generic: Do not free decrypted memory (bsc#1225717).
- CVE-2024-36911: hv_netvsc: Do not free decrypted memory (bsc#1225745).
- CVE-2024-36912: Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl (bsc#1225752).
- CVE-2024-36913: Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails (bsc#1225753).
- CVE-2024-36914: drm/amd/display: Skip on writeback when it's not applicable (bsc#1225757).
- CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload (bsc#1225767).
- CVE-2024-36923: fs/9p: fix uninitialized values during inode evict (bsc#1225815).
- CVE-2024-36939: nfs: Handle error of rpc_proc_register() in nfs_net_init() (bsc#1225838).
- CVE-2024-36946: phonet: fix rtm_phonet_notify() skb allocation (bsc#1225851).
- CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519).
- CVE-2024-38555: net/mlx5: Discard command completions in internal error (bsc#1226607).
- CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for ICMPv6 (bsc#1226783).
- CVE-2024-38570: gfs2: Fix potential glock use-after-free on unmount (bsc#1226775).
- CVE-2024-38586: r8169: Fix possible ring buffer corruption on fragmented Tx packets (bsc#1226750).
- CVE-2024-38598: md: fix resync softlockup when bitmap size is less than array size (bsc#1226757).
- CVE-2024-38628: usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind (bsc#1226911).
- CVE-2024-39276: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() (bsc#1226993).
- CVE-2024-39371: io_uring: check for non-NULL file pointer in io_file_can_poll() (bsc#1226990).
- CVE-2024-39463: 9p: add missing locking around taking dentry fid list (bsc#1227090).
- CVE-2024-39472: xfs: fix log recovery buffer allocation for the legacy h_size fixup (bsc#1227432).
- CVE-2024-39482: bcache: fix variable length array abuse in btree_iter (bsc#1227447).
- CVE-2024-39487: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() (bsc#1227573)
- CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core (bsc#1227626).
- CVE-2024-39493: crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak (bsc#1227620).
- CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716).
- CVE-2024-39497: drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) (bsc#1227722)
- CVE-2024-39502: ionic: fix use after netif_napi_del() (bsc#1227755).
- CVE-2024-39506: liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet (bsc#1227729).
- CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario (bsc#1227730).
- CVE-2024-39508: io_uring/io-wq: Use set_bit() and test_bit() at worker-&gt;flags (bsc#1227732).
- CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory (bsc#1227762).
- CVE-2024-40906: net/mlx5: Always stop health timer during driver removal (bsc#1227763).
- CVE-2024-40908: bpf: Set run context for rawtp test_run callback (bsc#1227783).
- CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free() (bsc#1227798).
- CVE-2024-40919: bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send() (bsc#1227779).
- CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure (bsc#1227786).
- CVE-2024-40931: mptcp: ensure snd_una is properly initialized on connect (bsc#1227780).
- CVE-2024-40935: cachefiles: flush all requests after setting CACHEFILES_DEAD (bsc#1227797).
- CVE-2024-40937: gve: Clear napi-&gt;skb before dev_kfree_skb_any() (bsc#1227836).
- CVE-2024-40940: net/mlx5: Fix tainted pointer delete is case of flow rules creation fail (bsc#1227800).
- CVE-2024-40943: ocfs2: fix races between hole punching and AIO+DIO (bsc#1227849).
- CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() (bsc#1227806).
- CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808)
- CVE-2024-40958: netns: Make get_net_ns() handle zero refcount net (bsc#1227812).
- CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (bsc#1227884).
- CVE-2024-40960: ipv6: prevent possible NULL dereference in rt6_probe() (bsc#1227813).
- CVE-2024-40961: ipv6: prevent possible NULL deref in fib6_nh_init() (bsc#1227814).
- CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc (bsc#1227886).
- CVE-2024-40967: serial: imx: Introduce timeout when waiting on transmitter empty (bsc#1227891).
- CVE-2024-40970: Avoid hw_desc array overrun in dw-axi-dmac (bsc#1227899).
- CVE-2024-40972: ext4: fold quota accounting into ext4_xattr_inode_lookup_create() (bsc#1227910).
- CVE-2024-40977: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery (bsc#1227950).
- CVE-2024-40982: ssb: Fix potential NULL pointer dereference in ssb_device_uevent() (bsc#1227865).
- CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor region on teardown (bsc#1227823).
- CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store (bsc#1227829).
- CVE-2024-40998: ext4: fix uninitialized ratelimit_state-&gt;lock access in __ext4_fill_super() (bsc#1227866).
- CVE-2024-40999: net: ena: Add validation for completion descriptors consistency (bsc#1227913).
- CVE-2024-41006: netrom: Fix a memory leak in nr_heartbeat_expiry() (bsc#1227862).
- CVE-2024-41009: selftests/bpf: Add more ring buffer test coverage (bsc#1228020).
- CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race is detected (bsc#1228247).
- CVE-2024-41013: xfs: do not walk off the end of a directory data block (bsc#1228405).
- CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data (bsc#1228408).
- CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry() (bsc#1228409).
- CVE-2024-41016: ocfs2: add bounds checking to ocfs2_xattr_find_entry() (bsc#1228410).
- CVE-2024-41017: jfs: do not walk off the end of ealist (bsc#1228403).
- CVE-2024-41040: net/sched: Fix UAF when resolving a clash (bsc#1228518)
- CVE-2024-41041: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() (bsc#1228520)
- CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets (bsc#1228530).
- CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565)
- CVE-2024-41057: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() (bsc#1228462).
- CVE-2024-41058: cachefiles: fix slab-use-after-free in fscache_withdraw_volume() (bsc#1228459).
- CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).
- CVE-2024-41063: Bluetooth: hci_core: cancel all works upon hci_unregister_dev() (bsc#1228580)
- CVE-2024-41064: powerpc/eeh: avoid possible crash when edev-&gt;pdev changes (bsc#1228599).
- CVE-2024-41066: ibmvnic: Add tx check to prevent skb leak (bsc#1228640).
- CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).
- CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() (bsc#1228581).
- CVE-2024-41071: wifi: mac80211: Avoid address calculations via out of bounds array indexing (bsc#1228625).
- CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable failure (bsc#1228655).
- CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617)
- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
- CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327).
- CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (bsc#1228470)
- CVE-2024-42079: gfs2: Fix NULL pointer dereference in gfs2_log_flush (bsc#1228672).
- CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680).
- CVE-2024-42096: x86: stop playing stack games in profile_pc() (bsc#1228633).
- CVE-2024-42122: drm/amd/display: Add NULL pointer check for kzalloc (bsc#1228591)
- CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible (bsc#1228705)
- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743)
- CVE-2024-42161: Avoid uninitialized value in BPF_CORE_READ_BITFIELD (bsc#1228756).
- CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list (bsc#1228723)
- CVE-2024-42230: powerpc/pseries: Fix scv instruction crash with kexec (bsc#1194869).

The following non-security bugs were fixed:

- ACPI: EC: Abort address space access upon error (stable-fixes).
- ACPI: EC: Avoid returning AE_OK on errors in address space handler (stable-fixes).
- ACPI: processor_idle: Fix invalid comparison with insertion sort for latency (git-fixes).
- ACPI: video: Add backlight=native quirk for Lenovo Slim 7 16ARH7 (stable-fixes).
- ACPI: x86: Force StorageD3Enable on more products (stable-fixes).
- ACPI: x86: utils: Add Picasso to the list for forcing StorageD3Enable (stable-fixes).
- ALSA: dmaengine_pcm: terminate dmaengine before synchronize (stable-fixes).
- ALSA: dmaengine: Synchronize dma channel after drop() (stable-fixes).
- ALSA: emux: improve patch ioctl data validation (stable-fixes).
- ALSA: hda: conexant: Fix headset auto detect fail in the polling mode (git-fixes).
- ALSA: hda/realtek: Add more codec ID to no shutup pins list (stable-fixes).
- ALSA: hda/realtek: add quirk for Clevo V5[46]0TU (stable-fixes).
- ALSA: hda/realtek: Enable headset mic of JP-IK LEAP W502 with ALC897 (stable-fixes).
- ALSA: hda/realtek: Enable headset mic on Positivo SU C1400 (stable-fixes).
- ALSA: hda/realtek: Enable Mute LED on HP 250 G7 (stable-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs do not work for EliteBook 645/665 G11 (stable-fixes).
- ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book Pro 360 (stable-fixes).
- ALSA: hda/realtek: Limit mic boost on VAIO PRO PX (stable-fixes).
- ALSA: hda/relatek: Enable Mute LED on HP Laptop 15-gw0xxx (stable-fixes).
- ALSA: pcm_dmaengine: Do not synchronize DMA channel when DMA is paused (git-fixes).
- ALSA: usb-audio: Add a quirk for Sonix HD USB Camera (stable-fixes).
- ALSA: usb-audio: Correct surround channels in UAC1 channel map (git-fixes).
- ALSA: usb-audio: Fix microphone sound on HD webcam (stable-fixes).
- ALSA: usb-audio: Move HD Webcam quirk to the right place (git-fixes).
- arm64: dts: allwinner: Pine H64: correctly remove reg_gmac_3v3 (git-fixes)
- arm64: dts: hi3798cv200: fix the size of GICR (git-fixes)
- arm64: dts: imx8qm-mek: fix gpio number for reg_usdhc2_vmmc (git-fixes)
- arm64: dts: microchip: sparx5: fix mdio reg (git-fixes)
- arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK (git-fixes)
- arm64: dts: rockchip: Add sound-dai-cells for RK3368 (git-fixes)
- arm64: dts: rockchip: fix PMIC interrupt pin on ROCK Pi E (git-fixes)
- arm64/io: add constant-argument check (bsc#1226502 git-fixes)
- arm64/io: Provide a WC friendly __iowriteXX_copy() (bsc#1226502)
- arm64: tegra: Correct Tegra132 I2C alias (git-fixes)
- ASoC: amd: Adjust error handling in case of absent codec device (git-fixes).
- ASoC: max98088: Check for clk_prepare_enable() error (git-fixes).
- ASoC: ti: davinci-mcasp: Set min period size using FIFO config (stable-fixes).
- ASoC: ti: omap-hdmi: Fix too long driver name (stable-fixes).
- batman-adv: bypass empty buckets in batadv_purge_orig_ref() (stable-fixes).
- blk-cgroup: dropping parent refcount after pd_free_fn() is done (bsc#1224573).
- block: do not add partitions if GD_SUPPRESS_PART_SCAN is set (bsc#1227162).
- block, loop: support partitions without scanning (bsc#1227162).
- Bluetooth: ath3k: Fix multiple issues reported by checkpatch.pl (stable-fixes).
- Bluetooth: btqca: use le32_to_cpu for ver.soc_id (stable-fixes).
- Bluetooth: hci_core: cancel all works upon hci_unregister_dev() (stable-fixes).
- Bluetooth: hci_qca: mark OF related data as maybe unused (stable-fixes).
- Bluetooth: hci_sync: Fix suspending with wrong filter policy (git-fixes).
- Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot (git-fixes).
- bnxt_re: Fix imm_data endianness (git-fixes)
- bpf: aggressively forget precise markings during state checkpointing (bsc#1225903).
- bpf: allow precision tracking for programs with subprogs (bsc#1225903).
- bpf: check bpf_func_state-&gt;callback_depth when pruning states (bsc#1225903).
- bpf: clean up visit_insn()'s instruction processing (bsc#1225903).
- bpf: correct loop detection for iterators convergence (bsc#1225903).
- bpf: encapsulate precision backtracking bookkeeping (bsc#1225903).
- bpf: ensure state checkpointing at iter_next() call sites (bsc#1225903).
- bpf: exact states comparison for iterator convergence checks (bsc#1225903).
- bpf: extract __check_reg_arg() utility function (bsc#1225903).
- bpf: extract same_callsites() as utility function (bsc#1225903).
- bpf: extract setup_func_entry() utility function (bsc#1225903).
- bpf: fix calculation of subseq_idx during precision backtracking (bsc#1225903).
- bpf: fix mark_all_scalars_precise use in mark_chain_precision (bsc#1225903).
- bpf: Fix memory leaks in __check_func_call (bsc#1225903).
- bpf: fix propagate_precision() logic for inner frames (bsc#1225903).
- bpf: fix regs_exact() logic in regsafe() to remap IDs correctly (bsc#1225903).
- bpf: Fix to preserve reg parent/live fields when copying range info (bsc#1225903).
- bpf: generalize MAYBE_NULL vs non-MAYBE_NULL rule (bsc#1225903).
- bpf: improve precision backtrack logging (bsc#1225903).
- bpf: Improve verifier u32 scalar equality checking (bsc#1225903).
- bpf: keep track of max number of bpf_loop callback iterations (bsc#1225903).
- bpf: maintain bitmasks across all active frames in __mark_chain_precision (bsc#1225903).
- bpf: mark relevant stack slots scratched for register read instructions (bsc#1225903).
- bpf: move explored_state() closer to the beginning of verifier.c (bsc#1225903).
- bpf: perform byte-by-byte comparison only when necessary in regsafe() (bsc#1225903).
- bpf: print full verifier states on infinite loop detection (bsc#1225903).
- bpf: regsafe() must not skip check_ids() (bsc#1225903).
- bpf: reject non-exact register type matches in regsafe() (bsc#1225903).
- bpf: Remove unused insn_cnt argument from visit_[func_call_]insn() (bsc#1225903).
- bpf: reorganize struct bpf_reg_state fields (bsc#1225903).
- bpf: Skip invalid kfunc call in backtrack_insn (bsc#1225903).
- bpf: states_equal() must build idmap for all function frames (bsc#1225903).
- bpf: stop setting precise in current state (bsc#1225903).
- bpf: support precision propagation in the presence of subprogs (bsc#1225903).
- bpf: take into account liveness when propagating precision (bsc#1225903).
- bpf: teach refsafe() to take into account ID remapping (bsc#1225903).
- bpf: unconditionally reset backtrack_state masks on global func exit (bsc#1225903).
- bpf: use check_ids() for active_lock comparison (bsc#1225903).
- bpf: Use scalar ids in mark_chain_precision() (bsc#1225903).
- bpf: verify callbacks as if they are called unknown number of times (bsc#1225903).
- bpf: Verify scalar ids mapping in regsafe() using check_ids() (bsc#1225903).
- bpf: widening for callback iterators (bsc#1225903).
- btrfs: add device major-minor info in the struct btrfs_device (bsc#1227162).
- btrfs: harden identification of a stale device (bsc#1227162).
- btrfs: match stale devices by dev_t (bsc#1227162).
- btrfs: remove the cross file system checks from remap (bsc#1227157).
- btrfs: use dev_t to match device in device_matched (bsc#1227162).
- btrfs: validate device maj:min during open (bsc#1227162).
- bytcr_rt5640 : inverse jack detect for Archos 101 cesium (stable-fixes).
- cachefiles: add output string to cachefiles_obj_[get|put]_ondemand_fd (git-fixes).
- can: kvaser_usb: Explicitly initialize family in leafimx driver_info struct (git-fixes).
- can: kvaser_usb: fix return value for hif_usb_send_regout (stable-fixes).
- ceph: fix incorrect kmalloc size of pagevec mempool (bsc#1228418).
- cgroup/cpuset: Prevent UAF in proc_cpuset_show() (bsc#1228801).
- checkpatch: really skip LONG_LINE_* when LONG_LINE is ignored (git-fixes).
- crypto: aead,cipher - zeroize key buffer after use (stable-fixes).
- crypto: ecdh - explicitly zeroize private_key (stable-fixes).
- crypto: ecdsa - Fix the public key format description (git-fixes).
- crypto: hisilicon/sec - Fix memory leak for sec resource release (stable-fixes).
- csky: ftrace: Drop duplicate implementation of arch_check_ftrace_location() (git-fixes).
- decompress_bunzip2: fix rare decompression failure (git-fixes).
- devres: Fix devm_krealloc() wasting memory (git-fixes).
- devres: Fix memory leakage caused by driver API devm_free_percpu() (git-fixes).
- dma: fix call order in dmam_free_coherent (git-fixes).
- docs: crypto: async-tx-api: fix broken code example (git-fixes).
- docs: Fix formatting of literal sections in fanotify docs (stable-fixes).
- drm/amd/amdgpu: Fix style errors in amdgpu_drv.c &amp; amdgpu_device.c (stable-fixes).
- drm/amd/display: Account for cursor prefetch BW in DML1 mode support (stable-fixes).
- drm/amd/display: Check for NULL pointer (stable-fixes).
- drm/amd/display: Check index msg_id before read or write (stable-fixes).
- drm/amd/display: Check pipe offset before setting vblank (stable-fixes).
- drm/amd/display: Skip finding free audio for unknown engine_id (stable-fixes).
- drm/amdgpu/atomfirmware: fix parsing of vram_info (stable-fixes).
- drm/amdgpu/atomfirmware: silence UBSAN warning (stable-fixes).
- drm/amdgpu: avoid using null object of framebuffer (stable-fixes).
- drm/amdgpu: Check if NBIO funcs are NULL in amdgpu_device_baco_exit (git-fixes).
- drm/amdgpu: Fix pci state save during mode-1 reset (git-fixes).
- drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq() (git-fixes).
- drm/amdgpu: fix uninitialized scalar variable warning (stable-fixes).
- drm/amdgpu: Fix uninitialized variable warnings (stable-fixes).
- drm/amdgpu: Initialize timestamp for some legacy SOCs (stable-fixes).
- drm/amdgpu: Remove GC HW IP 9.3.0 from noretry=1 (git-fixes).
- drm/amd/pm: Fix aldebaran pcie speed reporting (git-fixes).
- drm/amd/pm: remove logically dead code for renoir (git-fixes).
- drm/dp_mst: Fix all mstb marked as not probed after suspend/resume (git-fixes).
- drm/etnaviv: do not block scheduler when GPU is still active (stable-fixes).
- drm/etnaviv: fix DMA direction handling for cached RW buffers (git-fixes).
- drm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes (git-fixes).
- drm/gma500: fix null pointer dereference in psb_intel_lvds_get_modes (git-fixes).
- drm/i915/gt: Do not consider preemption during execlists_dequeue for gen8 (git-fixes).
- drm/lima: fix shared irq handling on driver remove (stable-fixes).
- drm/lima: Mark simple_ondemand governor as softdep (git-fixes).
- drm/mediatek: Add OVL compatible name for MT8195 (git-fixes).
- drm/meson: fix canvas release in bind function (git-fixes).
- drm/mgag200: Bind I2C lifetime to DRM device (git-fixes).
- drm/mgag200: Set DDC timeout in milliseconds (git-fixes).
- drm/mipi-dsi: Fix mipi_dsi_dcs_write_seq() macro definition format (stable-fixes).
- drm/mipi-dsi: Fix theoretical int overflow in mipi_dsi_dcs_write_seq() (git-fixes).
- drm/msm/dpu: drop validity checks for clear_pending_flush() ctl op (git-fixes).
- drm/msm/mdp5: Remove MDP_CAP_SRC_SPLIT from msm8x53_config (git-fixes).
- drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes (stable-fixes).
- drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes (stable-fixes).
- drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes (git-fixes).
- drm/nouveau: prime: fix refcount underflow (git-fixes).
- drm/panel: boe-tv101wum-nl6: Check for errors on the NOP in prepare() (git-fixes).
- drm/panel: boe-tv101wum-nl6: If prepare fails, disable GPIO before regulators (git-fixes).
- drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep (stable-fixes).
- drm: panel-orientation-quirks: Add quirk for Valve Galileo (stable-fixes).
- drm/panfrost: Mark simple_ondemand governor as softdep (git-fixes).
- drm/qxl: Add check for drm_cvt_mode (git-fixes).
- drm/radeon: check bo_va-&gt;bo is non-NULL before using it (stable-fixes).
- drm/radeon/radeon_display: Decrease the size of allocated memory (stable-fixes).
- drm/vmwgfx: Fix a deadlock in dma buf fence polling (git-fixes).
- drm/vmwgfx: Fix missing HYPERVISOR_GUEST dependency (stable-fixes).
- drm/vmwgfx: Fix overlay when using Screen Targets (git-fixes).
- eeprom: digsy_mtc: Fix 93xx46 driver probe failure (git-fixes).
- exfat: check if cluster num is valid (git-fixes).
- exfat: simplify is_valid_cluster() (git-fixes).
- filelock: add a new locks_inode_context accessor function (git-fixes).
- firmware: cs_dsp: Fix overflow checking of wmfw header (git-fixes).
- firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers (git-fixes).
- firmware: cs_dsp: Return error if block header overflows file (git-fixes).
- firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files (git-fixes).
- firmware: cs_dsp: Validate payload length before processing block (git-fixes).
- firmware: dmi: Stop decoding on broken entry (stable-fixes).
- firmware: turris-mox-rwtm: Do not complete if there are no waiters (git-fixes).
- firmware: turris-mox-rwtm: Fix checking return value of wait_for_completion_timeout() (git-fixes).
- firmware: turris-mox-rwtm: Initialize completion before mailbox (git-fixes).
- fix build warning
- fs: allow cross-vfsmount reflink/dedupe (bsc#1227157).
- ftrace: Fix possible use-after-free issue in ftrace_location() (git-fixes).
- fuse: verify {g,u}id mount options correctly (bsc#1228191).
- gpio: mc33880: Convert comma to semicolon (git-fixes).
- hfsplus: fix to avoid false alarm of circular locking (git-fixes).
- hfsplus: fix uninit-value in copy_name (git-fixes).
- HID: Add quirk for Logitech Casa touchpad (stable-fixes).
- HID: wacom: Modify pen IDs (git-fixes).
- hpet: Support 32-bit userspace (git-fixes).
- hwmon: (adt7475) Fix default duty on fan is disabled (git-fixes).
- hwmon: (max6697) Fix swapped temp{1,8} critical alarms (git-fixes).
- hwmon: (max6697) Fix underflow when writing limit attributes (git-fixes).
- i2c: mark HostNotify target address as used (git-fixes).
- i2c: rcar: bring hardware to known state when probing (git-fixes).
- i2c: tegra: Fix failure during probe deferral cleanup (git-fixes)
- i2c: tegra: Share same DMA channel for RX and TX (bsc#1227661)
- i2c: testunit: avoid re-issued work after read message (git-fixes).
- i2c: testunit: correct Kconfig description (git-fixes).
- Input: elan_i2c - do not leave interrupt disabled on suspend failure (git-fixes).
- Input: elantech - fix touchpad state on resume for Lenovo N24 (stable-fixes).
- Input: ff-core - prefer struct_size over open coded arithmetic (stable-fixes).
- Input: qt1050 - handle CHIP_ID reading error (git-fixes).
- Input: silead - Always support 10 fingers (stable-fixes).
- intel_th: pci: Add Granite Rapids SOC support (stable-fixes).
- intel_th: pci: Add Granite Rapids support (stable-fixes).
- intel_th: pci: Add Lunar Lake support (stable-fixes).
- intel_th: pci: Add Meteor Lake-S support (stable-fixes).
- intel_th: pci: Add Sapphire Rapids SOC support (stable-fixes).
- iommu/arm-smmu-v3: Free MSIs in case of ENOMEM (git-fixes).
- ionic: clean interrupt before enabling queue to avoid credit race (git-fixes).
- jffs2: Fix potential illegal address access in jffs2_free_inode (git-fixes).
- jfs: Fix array-index-out-of-bounds in diFree (git-fixes).
- jfs: xattr: fix buffer overflow for invalid xattr (bsc#1227383).
- kABI: bpf: bpf_reg_state reorganization kABI workaround (bsc#1225903).
- kABI: bpf: callback fixes kABI workaround (bsc#1225903).
- kABI: bpf: struct bpf_{idmap,idset} kABI workaround (bsc#1225903).
- kABI: bpf: tmp_str_buf kABI workaround (bsc#1225903).
- kABI: rtas: Workaround false positive due to lost definition (bsc#1227487).
- kabi/severities: ignore kABI for FireWire sound local symbols (bsc#1208783)
- kabi/severities: Ignore tpm_tis_core_init (bsc#1082555).
- kabi/severity: add nvme common code The nvme common code is also allowed to change the data structures, there are only internal users.
- kabi: Use __iowriteXX_copy_inlined for in-kernel modules (bsc#1226502)
- kernel-binary: vdso: Own module_dir
- kernel/sched: Remove dl_boosted flag comment (git fixes (sched)).
- knfsd: LOOKUP can return an illegal error value (git-fixes).
- kobject_uevent: Fix OOB access within zap_modalias_env() (git-fixes).
- kprobes: Make arch_check_ftrace_location static (git-fixes).
- KVM: nVMX: Clear EXIT_QUALIFICATION when injecting an EPT Misconfig (git-fixes).
- KVM: PPC: Book3S HV: Fix 'rm_exit' entry in debugfs timings (bsc#1194869).
- KVM: PPC: Book3S HV: Fix the set_one_reg for MMCR3 (bsc#1194869).
- KVM: PPC: Book3S HV Nested: L2 LPCR should inherit L1 LPES setting (bsc#1194869).
- KVM: PPC: Book3S HV: remove extraneous asterisk from rm_host_ipi_action() comment (bsc#1194869).
- KVM: PPC: Book3S: Suppress failed alloc warning in H_COPY_TOFROM_GUEST (bsc#1194869).
- KVM: PPC: Book3S: Suppress warnings when allocating too big memory slots (bsc#1194869).
- KVM: s390: fix LPSWEY handling (bsc#1227635 git-fixes).
- KVM: SVM: Process ICR on AVIC IPI delivery failure due to invalid target (git-fixes).
- KVM: VMX: Report up-to-date exit qualification to userspace (git-fixes).
- KVM: x86: Add IBPB_BRTYPE support (bsc#1228079).
- KVM: x86: Always sync PIR to IRR prior to scanning I/O APIC routes (git-fixes).
- KVM: x86: Bail from kvm_recalculate_phys_map() if x2APIC ID is out-of-bounds (git-fixes).
- KVM: x86: Disable APIC logical map if logical ID covers multiple MDAs (git-fixes).
- KVM: x86: Disable APIC logical map if vCPUs are aliased in logical mode (git-fixes).
- KVM: x86: Do not advertise guest.MAXPHYADDR as host.MAXPHYADDR in CPUID (git-fixes).
- KVM: x86: Explicitly skip optimized logical map setup if vCPU's LDR==0 (git-fixes).
- KVM: x86: Explicitly track all possibilities for APIC map's logical modes (git-fixes).
- KVM: x86: Fix broken debugregs ABI for 32 bit kernels (git-fixes).
- KVM: x86: Fix KVM_GET_MSRS stack info leak (git-fixes).
- KVM: x86: Honor architectural behavior for aliased 8-bit APIC IDs (git-fixes).
- KVM: x86: Purge 'highest ISR' cache when updating APICv state (git-fixes).
- KVM: x86: Save/restore all NMIs when multiple NMIs are pending (git-fixes).
- KVM: x86: Skip redundant x2APIC logical mode optimized cluster setup (git-fixes).
- leds: ss4200: Convert PCIBIOS_* return codes to errnos (git-fixes).
- leds: triggers: Flush pending brightness before activating trigger (git-fixes).
- leds: trigger: Unregister sysfs attributes before calling deactivate() (git-fixes).
- libceph: fix race between delayed_work() and ceph_monc_stop() (bsc#1228190).
- lib: objagg: Fix general protection fault (git-fixes).
- lib: objagg: Fix spelling (git-fixes).
- lib: test_objagg: Fix spelling (git-fixes).
- lockd: set missing fl_flags field when retrieving args (git-fixes).
- lockd: use locks_inode_context helper (git-fixes).
- Make AMD_HSMP=m and mark it unsupported in supported.conf (jsc#PED-8582)
- media: dvb: as102-fe: Fix as10x_register_addr packing (stable-fixes).
- media: dvbdev: Initialize sbuf (stable-fixes).
- media: dvb-frontends: tda10048: Fix integer overflow (stable-fixes).
- media: dvb-frontends: tda18271c2dd: Remove casting during div (stable-fixes).
- media: dvb-usb: dib0700_devices: Add missing release_firmware() (stable-fixes).
- media: dvb-usb: Fix unexpected infinite loop in dvb_usb_read_remote_control() (git-fixes).
- media: dw2102: Do not translate i2c read into write (stable-fixes).
- media: dw2102: fix a potential buffer overflow (git-fixes).
- media: imon: Fix race getting ictx-&gt;lock (git-fixes).
- media: s2255: Use refcount_t instead of atomic_t for num_channels (stable-fixes).
- media: uvcvideo: Fix integer overflow calculating timestamp (git-fixes).
- media: uvcvideo: Override default flags (git-fixes).
- media: venus: fix use after free in vdec_close (git-fixes).
- media: venus: flush all buffers in output plane streamoff (git-fixes).
- mei: demote client disconnect warning on suspend to debug (stable-fixes).
- mfd: omap-usb-tll: Use struct_size to allocate tll (git-fixes).
- mtd: partitions: redboot: Added conversion of operands to a larger type (stable-fixes).
- net/dcb: check for detached device before executing callbacks (bsc#1215587).
- netfilter: conntrack: ignore overly delayed tcp packets (bsc#1223180).
- netfilter: conntrack: prepare tcp_in_window for ternary return value (bsc#1223180).
- netfilter: conntrack: remove pr_debug callsites from tcp tracker (bsc#1223180).
- netfilter: conntrack: work around exceeded receive window (bsc#1223180).
- netfs, fscache: export fscache_put_volume() and add fscache_try_get_volume() (bsc#1228459 bsc#1228462).
- net: mana: Fix possible double free in error handling path (git-fixes).
- net: mana: Fix the extra HZ in mana_hwc_send_request (git-fixes).
- net: usb: qmi_wwan: add Telit FN912 compositions (git-fixes).
- net: usb: sr9700: fix uninitialized variable use in sr_mdio_read (git-fixes).
- nfc/nci: Add the inconsistency check between the input data length and count (stable-fixes).
- NFSD: Add an nfsd_file_fsync tracepoint (git-fixes).
- NFSD: Add an NFSD_FILE_GC flag to enable nfsd_file garbage collection (git-fixes).
- nfsd: Add errno mapping for EREMOTEIO (git-fixes).
- NFSD: Add nfsd_file_lru_dispose_list() helper (git-fixes).
- nfsd: add some comments to nfsd_file_do_acquire (git-fixes).
- nfsd: allow nfsd_file_get to sanely handle a NULL pointer (git-fixes).
- nfsd: allow reaping files still under writeback (git-fixes).
- NFSD: Avoid calling fh_drop_write() twice in do_nfsd_create() (git-fixes).
- NFSD: Clean up nfsd3_proc_create() (git-fixes).
- nfsd: Clean up nfsd_file_put() (git-fixes).
- NFSD: Clean up nfsd_open_verified() (git-fixes).
- NFSD: Clean up unused code after rhashtable conversion (git-fixes).
- NFSD: Convert filecache to rhltable (git-fixes).
- NFSD: Convert the filecache to use rhashtable (git-fixes).
- NFSD: De-duplicate hash bucket indexing (git-fixes).
- nfsd: do not free files unconditionally in __nfsd_file_cache_purge (git-fixes).
- nfsd: do not fsync nfsd_files on last close (git-fixes).
- nfsd: do not hand out delegation on setuid files being opened for write (git-fixes).
- nfsd: do not kill nfsd_files because of lease break error (git-fixes).
- nfsd: Do not leave work of closing files to a work queue (bsc#1228140).
- nfsd: do not take/put an extra reference when putting a file (git-fixes).
- NFSD enforce filehandle check for source file in COPY (git-fixes).
- NFSD: Ensure nf_inode is never dereferenced (git-fixes).
- nfsd: fix handling of cached open files in nfsd4_open codepath (git-fixes).
- NFSD: Fix licensing header in filecache.c (git-fixes).
- nfsd: fix net-namespace logic in __nfsd_file_cache_purge (git-fixes).
- nfsd: fix nfsd_file_unhash_and_dispose (git-fixes).
- NFSD: Fix potential use-after-free in nfsd_file_put() (git-fixes).
- NFSD: Fix problem of COMMIT and NFS4ERR_DELAY in infinite loop (git-fixes).
- NFSD: Fix the filecache LRU shrinker (git-fixes).
- nfsd: fix up the filecache laundrette scheduling (git-fixes).
- nfsd: fix use-after-free in nfsd_file_do_acquire tracepoint (git-fixes).
- NFSD: Flesh out a documenting comment for filecache.c (git-fixes).
- NFSD: handle errors better in write_ports_addfd() (git-fixes).
- NFSD: Instantiate a struct file when creating a regular NFSv4 file (git-fixes).
- NFSD: Leave open files out of the filecache LRU (git-fixes).
- nfsd: map EBADF (git-fixes).
- NFSD: Move nfsd_file_trace_alloc() tracepoint (git-fixes).
- NFSD: nfsd_file_hash_remove can compute hashval (git-fixes).
- nfsd: NFSD_FILE_KEY_INODE only needs to find GC'ed entries (git-fixes).
- NFSD: nfsd_file_put() can sleep (git-fixes).
- NFSD: nfsd_file_unhash can compute hashval from nf-&gt;nf_inode (git-fixes).
- NFSD: No longer record nf_hashval in the trace log (git-fixes).
- NFSD: Pass the target nfsd_file to nfsd_commit() (git-fixes).
- nfsd: put the export reference in nfsd4_verify_deleg_dentry (git-fixes).
- NFSD: Record number of flush calls (git-fixes).
- NFSD: Refactor nfsd_create_setattr() (git-fixes).
- NFSD: Refactor __nfsd_file_close_inode() (git-fixes).
- NFSD: Refactor nfsd_file_gc() (git-fixes).
- NFSD: Refactor nfsd_file_lru_scan() (git-fixes).
- NFSD: Refactor NFSv3 CREATE (git-fixes).
- NFSD: Refactor NFSv4 OPEN(CREATE) (git-fixes).
- NFSD: Remove do_nfsd_create() (git-fixes).
- NFSD: Remove lockdep assertion from unhash_and_release_locked() (git-fixes).
- NFSD: Remove nfsd_file::nf_hashval (git-fixes).
- nfsd: remove the pages_flushed statistic from filecache (git-fixes).
- nfsd: reorganize filecache.c (git-fixes).
- NFSD: Replace the 'init once' mechanism (git-fixes).
- NFSD: Report average age of filecache items (git-fixes).
- NFSD: Report count of calls to nfsd_file_acquire() (git-fixes).
- NFSD: Report count of freed filecache items (git-fixes).
- NFSD: Report filecache LRU size (git-fixes).
- NFSD: Report the number of items evicted by the LRU walk (git-fixes).
- nfsd: Retry once in nfsd_open on an -EOPENSTALE return (git-fixes).
- nfsd: rework hashtable handling in nfsd_do_file_acquire (git-fixes).
- nfsd: rework refcounting in filecache (git-fixes).
- NFSD: Separate tracepoints for acquire and create (git-fixes).
- NFSD: Set up an rhashtable for the filecache (git-fixes).
- nfsd: silence extraneous printk on nfsd.ko insertion (git-fixes).
- NFSD: simplify per-net file cache management (git-fixes).
- nfsd: simplify test_bit return in NFSD_FILE_KEY_FULL comparator (git-fixes).
- nfsd: simplify the delayed disposal list code (git-fixes).
- NFSD: Trace filecache LRU activity (git-fixes).
- NFSD: Trace filecache opens (git-fixes).
- NFSD: verify the opened dentry after setting a delegation (git-fixes).
- NFSD: WARN when freeing an item still linked via nf_lru (git-fixes).
- NFSD: Write verifier might go backwards (git-fixes).
- NFSD: Zero counters when the filecache is re-initialized (git-fixes).
- NFS: Fix READ_PLUS when server does not support OP_READ_PLUS (git-fixes).
- nfs: fix undefined behavior in nfs_block_bits() (git-fixes).
- nfs: keep server info for remounts (git-fixes).
- nfs: Leave pages in the pagecache if readpage failed (git-fixes).
- NFSv4: Fixup smatch warning for ambiguous return (git-fixes).
- NFSv4.x: by default serialize open/close operations (bsc#1223863 bsc#1227362)
- nilfs2: add missing check for inode numbers on directory entries (git-fixes).
- nilfs2: add missing check for inode numbers on directory entries (stable-fixes).
- nilfs2: avoid undefined behavior in nilfs_cnt32_ge macro (git-fixes).
- nilfs2: convert persistent object allocator to use kmap_local (git-fixes).
- nilfs2: fix incorrect inode allocation from reserved inodes (git-fixes).
- nilfs2: fix inode number range checks (git-fixes).
- nilfs2: fix inode number range checks (stable-fixes).
- nvme: adjust multiples of NVME_CTRL_PAGE_SIZE in offset (git-fixes).
- nvme-auth: alloc nvme_dhchap_key as single buffer (git-fixes).
- nvme-auth: allow mixing of secret and hash lengths (git-fixes).
- nvme-auth: use transformed key size to create resp (git-fixes).
- nvme: avoid double free special payload (git-fixes).
- nvme: fixup comment for nvme RDMA Provider Type (git-fixes).
- nvme-multipath: find NUMA path only for online numa-node (git-fixes).
- nvme-pci: add missing condition check for existence of mapped data (git-fixes).
- nvme-pci: Fix the instructions for disabling power management (git-fixes).
- nvmet: always initialize cqe.result (git-fixes).
- nvmet-auth: fix nvmet_auth hash error handling (git-fixes).
- nvmet: fix a possible leak when destroy a ctrl during qp establishment (git-fixes).
- nvme: use ctrl state accessor (bsc#1215492).
- ocfs2: fix DIO failure due to insufficient transaction credits (bsc#1216834).
- ocfs2: remove redundant assignment to variable free_space (bsc#1228409).
- ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410).
- orangefs: fix out-of-bounds fsid access (git-fixes).
- PCI: Add PCI_ERROR_RESPONSE and related definitions (stable-fixes).
- PCI/DPC: Fix use-after-free on concurrent DPC and hot-removal (git-fixes).
- PCI: Extend ACS configurability (bsc#1228090).
- PCI: Fix resource double counting on remove &amp; rescan (git-fixes).
- PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git-fixes).
- PCI: Introduce cleanup helpers for device reference counts and locks (git-fixes).
- PCI: Introduce cleanup helpers for device reference counts and locks (stable-fixes).
- PCI: keystone: Do not enable BAR 0 for AM654x (git-fixes).
- PCI: keystone: Fix NULL pointer dereference in case of DT error in ks_pcie_setup_rc_app_regs() (git-fixes).
- PCI: keystone: Relocate ks_pcie_set/clear_dbi_mode() (git-fixes).
- PCI/PM: Avoid D3cold for HP Pavilion 17 PC/1972 PCIe Ports (git-fixes).
- PCI/PM: Avoid D3cold for HP Pavilion 17 PC/1972 PCIe Ports (stable-fixes).
- PCI: rockchip: Use GPIOD_OUT_LOW flag while requesting ep_gpio (git-fixes).
- PCI: tegra194: Set EP alignment restriction for inbound ATU (git-fixes).
- pinctrl: core: fix possible memory leak when pinctrl_enable() fails (git-fixes).
- pinctrl: freescale: mxs: Fix refcount of child (git-fixes).
- pinctrl: single: fix possible memory leak when pinctrl_enable() fails (git-fixes).
- pinctrl: ti: ti-iodelay: fix possible memory leak when pinctrl_enable() fails (git-fixes).
- platform/chrome: cros_ec_debugfs: fix wrong EC message version (git-fixes).
- platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git-fixes).
- platform/x86: dell-smbios-base: Use sysfs_emit() (stable-fixes).
- platform/x86: dell-smbios: Fix wrong token data in sysfs (git-fixes).
- platform/x86: lg-laptop: Change ACPI device id (stable-fixes).
- platform/x86: lg-laptop: Remove LGEX0815 hotkey handling (stable-fixes).
- platform/x86: touchscreen_dmi: Add info for GlobalSpace SolT IVW 11.6' tablet (stable-fixes).
- platform/x86: touchscreen_dmi: Add info for the EZpad 6s Pro (stable-fixes).
- platform/x86: wireless-hotkey: Add support for LG Airplane Button (stable-fixes).
- powerpc/cpuidle: Set CPUIDLE_FLAG_POLLING for snooze state (bsc#1227121 ltc#207129).
- powerpc: fix a file leak in kvm_vcpu_ioctl_enable_cap() (bsc#1194869).
- powerpc/kasan: Disable address sanitization in kexec paths (bsc#1194869).
- powerpc/pseries: Fix scv instruction crash with kexec (bsc#1194869).
- powerpc/rtas: clean up includes (bsc#1227487).
- powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() (bsc#1227487).
- power: supply: cros_usbpd: provide ID table for avoiding fallback match (stable-fixes).
- pwm: stm32: Always do lazy disabling (git-fixes).
- RDMA/cache: Release GID table even if leak is detected (git-fixes)
- RDMA/device: Return error earlier if port in not valid (git-fixes)
- RDMA/hns: Check atomic wr length (git-fixes)
- RDMA/hns: Fix insufficient extend DB for VFs. (git-fixes)
- RDMA/hns: Fix mbx timing out before CMD execution is completed (git-fixes)
- RDMA/hns: Fix missing pagesize and alignment check in FRMR (git-fixes)
- RDMA/hns: Fix shift-out-bounds when max_inline_data is 0 (git-fixes)
- RDMA/hns: Fix soft lockup under heavy CEQE load (git-fixes)
- RDMA/hns: Fix undifined behavior caused by invalid max_sge (git-fixes)
- RDMA/hns: Fix unmatch exception handling when init eq table fails (git-fixes)
- RDMA/iwcm: Fix a use-after-free related to destroying CM IDs (git-fixes)
- RDMA/mana_ib: Ignore optional access flags for MRs (git-fixes).
- RDMA/mlx4: Fix truncated output warning in alias_GUID.c (git-fixes)
- RDMA/mlx4: Fix truncated output warning in mad.c (git-fixes)
- RDMA/mlx5: Set mkeys for dmabuf at PAGE_SIZE (git-fixes)
- RDMA/restrack: Fix potential invalid address access (git-fixes)
- RDMA/rxe: Do not set BTH_ACK_MASK for UC or UD QPs (git-fixes)
- regmap-i2c: Subtract reg size from max_write (stable-fixes).
- Revert 'ALSA: firewire-lib: obsolete workqueue for period update' (bsc#1208783).
- Revert 'ALSA: firewire-lib: operate for period elapse event in process context' (bsc#1208783).
- Revert 'leds: led-core: Fix refcount leak in of_led_get()' (git-fixes).
- Revert 'usb: musb: da8xx: Set phy in OTG mode by default' (stable-fixes).
- rpcrdma: fix handling for RDMA_CM_EVENT_DEVICE_REMOVAL (git-fixes).
- rpm/guards: fix precedence issue with control flow operator With perl 5.40 it report the following error on rpm/guards script: Possible precedence issue with control flow operator (exit) at scripts/guards line 208. Fix the issue by adding parenthesis around ternary operator.
- rtc: cmos: Fix return value of nvmem callbacks (git-fixes).
- rtc: interface: Add RTC offset to alarm after fix-up (git-fixes).
- rtc: isl1208: Fix return value of nvmem callbacks (git-fixes).
- rtlwifi: rtl8192de: Style clean-ups (stable-fixes).
- s390: Implement __iowrite32_copy() (bsc#1226502)
- s390: Stop using weak symbols for __iowrite64_copy() (bsc#1226502)
- saa7134: Unchecked i2c_transfer function result fixed (git-fixes).
- sched/fair: Do not balance task to its current running CPU (git fixes (sched)).
- sched: Fix stop_one_cpu_nowait() vs hotplug (git fixes (sched)).
- scsi: lpfc: Allow DEVICE_RECOVERY mode after RSCN receipt if in PRLI_ISSUE state (bsc#1228857).
- scsi: lpfc: Cancel ELS WQE instead of issuing abort when SLI port is inactive (bsc#1228857).
- scsi: lpfc: Fix handling of fully recovered fabric node in dev_loss callbk (bsc#1228857).
- scsi: lpfc: Fix incorrect request len mbox field when setting trunking via sysfs (bsc#1228857).
- scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info (bsc#1228857).
- scsi: lpfc: Relax PRLI issue conditions after GID_FT response (bsc#1228857).
- scsi: lpfc: Revise lpfc_prep_embed_io routine with proper endian macro usages (bsc#1228857).
- scsi: lpfc: Update lpfc version to 14.4.0.3 (bsc#1228857).
- scsi: qla2xxx: Avoid possible run-time warning with long model_num (bsc#1228850).
- scsi: qla2xxx: Complete command early within lock (bsc#1228850).
- scsi: qla2xxx: Convert comma to semicolon (bsc#1228850).
- scsi: qla2xxx: Drop driver owner assignment (bsc#1228850).
- scsi: qla2xxx: During vport delete send async logout explicitly (bsc#1228850).
- scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850).
- scsi: qla2xxx: Fix flash read failure (bsc#1228850).
- scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850).
- scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850).
- scsi: qla2xxx: Indent help text (bsc#1228850).
- scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850).
- scsi: qla2xxx: Remove unused struct 'scsi_dif_tuple' (bsc#1228850).
- scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds (bsc#1228850).
- scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850).
- scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850).
- scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850).
- scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850).
- selftests/bpf: Add a selftest for checking subreg equality (bsc#1225903).
- selftests/bpf: add pre bpf_prog_test_run_opts() callback for test_loader (bsc#1225903).
- selftests/bpf: add precision propagation tests in the presence of subprogs (bsc#1225903).
- selftests/bpf: Add pruning test case for bpf_spin_lock (bsc#1225903).
- selftests/bpf: Check if mark_chain_precision() follows scalar ids (bsc#1225903).
- selftests/bpf: check if max number of bpf_loop iterations is tracked (bsc#1225903).
- selftests/bpf: fix __retval() being always ignored (bsc#1225903).
- selftests/bpf: fix unpriv_disabled check in test_verifier (bsc#1225903).
- selftests/bpf: __imm_insn &amp; __imm_const macro for bpf_misc.h (bsc#1225903).
- selftests/bpf: make test_align selftest more robust (bsc#1225903).
- selftests/bpf: populate map_array_ro map for verifier_array_access test (bsc#1225903).
- selftests/bpf: prog_tests entry point for migrated test_verifier tests (bsc#1225903).
- selftests/bpf: Report program name on parse_test_spec error (bsc#1225903).
- selftests/bpf: Support custom per-test flags and multiple expected messages (bsc#1225903).
- selftests/bpf: test case for callback_depth states pruning logic (bsc#1225903).
- selftests/bpf: test case for relaxed prunning of active_lock.id (bsc#1225903).
- selftests/bpf: test cases for regsafe() bug skipping check_id() (bsc#1225903).
- selftests/bpf: Tests execution support for test_loader.c (bsc#1225903).
- selftests/bpf: tests for iterating callbacks (bsc#1225903).
- selftests/bpf: test widening for iterating callbacks (bsc#1225903).
- selftests/bpf: track string payload offset as scalar in strobemeta (bsc#1225903).
- selftests/bpf: Unprivileged tests for test_loader.c (bsc#1225903).
- selftests/bpf: Verify copy_register_state() preserves parent/live fields (bsc#1225903).
- selftests/bpf: verify states_equal() maintains idmap across all frames (bsc#1225903).
- selftests/bpf: Verify that check_ids() is used for scalars in regsafe() (bsc#1225903).
- selftests/sigaltstack: Fix ppc64 GCC build (git-fixes).
- soc: ti: wkup_m3_ipc: Send NULL dummy message instead of pointer message (stable-fixes).
- spi: imx: Do not expect DMA for i.MX{25,35,50,51,53} cspi devices (stable-fixes).
- spi: mux: set ctlr-&gt;bits_per_word_mask (stable-fixes).
- string.h: Introduce memtostr() and memtostr_pad() (bsc#1228850).
- SUNRPC: avoid soft lockup when transmitting UDP to reachable server (bsc#1225272).
- SUNRPC: Fix gss_free_in_token_pages() (git-fixes).
- SUNRPC: Fix loop termination condition in gss_free_in_token_pages() (git-fixes).
- sunrpc: fix NFSACL RPC retry on soft mount (git-fixes).
- SUNRPC: return proper error from gss_wrap_req_priv (git-fixes).
- supported.conf:
- tpm: Allow system suspend to continue when TPM suspend fails (bsc#1082555).
- tpm: Prevent hwrng from activating during resume (bsc#1082555).
- tpm_tis: Resend command to recover from data transfer errors (bsc#1082555).
- tpm_tis: Use tpm_chip_{start,stop} decoration inside tpm_tis_resume (bsc#1082555).
- tpm, tpm: Implement usage counter for locality (bsc#1082555).
- tpm, tpm_tis: Avoid cache incoherency in test for interrupts (bsc#1082555).
- tpm, tpm_tis: Claim locality before writing interrupt registers (bsc#1082555).
- tpm, tpm_tis: Claim locality in interrupt handler (bsc#1082555).
- tpm, tpm_tis: Claim locality when interrupts are reenabled on resume (bsc#1082555).
- tpm, tpm_tis: correct tpm_tis_flags enumeration values (bsc#1082555).
- tpm, tpm_tis: Do not skip reset of original interrupt vector (bsc#1082555).
- tpm, tpm_tis: Only handle supported interrupts (bsc#1082555).
- tracing: Build event generation tests only as modules (git-fixes).
- tracing/net_sched: NULL pointer dereference in perf_trace_qdisc_reset() (git-fixes).
- tracing/osnoise: Add osnoise/options file (bsc#1228330)
- tracing/osnoise: Add OSNOISE_WORKLOAD option (bsc#1228330)
- tracing/osnoise: Do not follow tracing_cpumask (bsc#1228330)
- tracing/osnoise: Fix notify new tracing_max_latency (bsc#1228330)
- tracing/osnoise: Make osnoise_instances static (bsc#1228330)
- tracing/osnoise: Split workload start from the tracer start (bsc#1228330)
- tracing/osnoise: Support a list of trace_array *tr (bsc#1228330)
- tracing/osnoise: Use built-in RCU list checking (bsc#1228330)
- tracing/timerlat: Notify new max thread latency (bsc#1228330)
- USB: Add USB_QUIRK_NO_SET_INTF quirk for START BP-850k (stable-fixes).
- usb: cdns3: allocate TX FIFO size according to composite EP number (git-fixes).
- usb: cdns3: fix incorrect calculation of ep_buf_size when more than one config (git-fixes).
- usb: cdns3: fix iso transfer error when mult is not zero (git-fixes).
- usb: cdns3: improve handling of unaligned address case (git-fixes).
- usb: cdns3: optimize OUT transfer by copying only actual received data (git-fixes).
- usb: cdns3: skip set TRB_IOC when usb_request: no_interrupt is true (git-fixes).
- USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor (git-fixes).
- usb: dwc3: gadget: Do not delay End Transfer on delayed_status (git-fixes).
- usb: dwc3: gadget: Force sending delayed status during soft disconnect (git-fixes).
- usb: dwc3: gadget: Synchronize IRQ between soft connect/disconnect (git-fixes).
- usb: gadget: call usb_gadget_check_config() to verify UDC capability (git-fixes).
- usb: gadget: configfs: Prevent OOB read/write in usb_string_copy() (stable-fixes).
- usb: gadget: printer: SS+ support (stable-fixes).
- usb: misc: uss720: check for incompatible versions of the Belkin F5U002 (stable-fixes).
- USB: serial: mos7840: fix crash on resume (git-fixes).
- USB: serial: option: add Fibocom FM350-GL (stable-fixes).
- USB: serial: option: add Netprisma LCUK54 series modules (stable-fixes).
- USB: serial: option: add Rolling RW350-GL variants (stable-fixes).
- USB: serial: option: add support for Foxconn T99W651 (stable-fixes).
- USB: serial: option: add Telit FN912 rmnet compositions (stable-fixes).
- USB: serial: option: add Telit generic core-dump composition (stable-fixes).
- usb: typec: tcpm: clear pd_event queue in PORT_RESET (git-fixes).
- usb: xhci-plat: Do not include xhci.h (git-fixes).
- USB: xhci-plat: fix legacy PHY double init (git-fixes).
- wifi: ath11k: fix wrong handling of CCMP256 and GCMP ciphers (git-fixes).
- wifi: brcmsmac: LCN PHY code is used for BCM4313 2G-only device (git-fixes).
- wifi: cfg80211: fix typo in cfg80211_calculate_bitrate_he() (git-fixes).
- wifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he() (git-fixes).
- wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values (git-fixes).
- wifi: cfg80211: wext: add extra SIOCSIWSCAN data check (stable-fixes).
- wifi: iwlwifi: mvm: d3: fix WoWLAN command version lookup (stable-fixes).
- wifi: iwlwifi: mvm: Handle BIGTK cipher in kek_kck cmd (stable-fixes).
- wifi: iwlwifi: mvm: properly set 6 GHz channel direct probe option (stable-fixes).
- wifi: mac80211: disable softirqs for queued frame handling (git-fixes).
- wifi: mac80211: fix UBSAN noise in ieee80211_prep_hw_scan() (stable-fixes).
- wifi: mac80211: handle tasklet frames before stopping (stable-fixes).
- wifi: mac80211: mesh: init nonpeer_pm to active by default in mesh sdata (stable-fixes).
- wifi: mt76: replace skb_put with skb_put_zero (stable-fixes).
- wifi: mwifiex: Fix interface type change (git-fixes).
- wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter() (git-fixes).
- wifi: wilc1000: fix ies_len type in connect path (git-fixes).
- workqueue: Improve scalability of workqueue watchdog touch (bsc#1193454).
- workqueue: wq_watchdog_touch is always called with valid CPU (bsc#1193454).
- x86/amd_nb: Use Family 19h Models 60h-7Fh Function 4 IDs (git-fixes).
- x86/apic: Force native_apic_mem_read() to use the MOV instruction (git-fixes).
- x86/bhi: Avoid warning in #DB handler due to BHI mitigation (git-fixes).
- x86/bugs: Remove default case for fully switched enums (bsc#1227900).
- x86/fpu: Fix AMD X86_BUG_FXSAVE_LEAK fixup (git-fixes).
- x86/ibt,ftrace: Search for __fentry__ location (git-fixes).
- x86/Kconfig: Transmeta Crusoe is CPU family 5, not 6 (git-fixes).
- x86/mm: Allow guest.enc_status_change_prepare() to fail (git-fixes).
- x86/mm: Fix enc_status_change_finish_noop() (git-fixes).
- x86/purgatory: Switch to the position-independent small code model (git-fixes).
- x86/srso: Move retbleed IBPB check into existing 'has_microcode' code block (bsc#1227900).
- x86/srso: Remove 'pred_cmd' label (bsc#1227900).
- x86: Stop using weak symbols for __iowrite32_copy() (bsc#1226502)
- x86/tdx: Fix race between set_memory_encrypted() and load_unaligned_zeropad() (git-fixes).
- xfs: Add cond_resched to block unmap range and reflink remap path (bsc#1228226).
- xhci: Apply broken streams quirk to Etron EJ188 xHCI host (stable-fixes).
- xhci: Apply reset resume quirk to Etron EJ188 xHCI host (stable-fixes).
- xhci: Set correct transferred length for cancelled bulk transfers (stable-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-13"/>
	<updated date="2024-08-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082555">SUSE bug 1082555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193454">SUSE bug 1193454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193554">SUSE bug 1193554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193787">SUSE bug 1193787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194324">SUSE bug 1194324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195357">SUSE bug 1195357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195668">SUSE bug 1195668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195927">SUSE bug 1195927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195957">SUSE bug 1195957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196823">SUSE bug 1196823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197146">SUSE bug 1197146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197246">SUSE bug 1197246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197762">SUSE bug 1197762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202346">SUSE bug 1202346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202686">SUSE bug 1202686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208783">SUSE bug 1208783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209636">SUSE bug 1209636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213123">SUSE bug 1213123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215492">SUSE bug 1215492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215587">SUSE bug 1215587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216834">SUSE bug 1216834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219832">SUSE bug 1219832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220138">SUSE bug 1220138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220185">SUSE bug 1220185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220186">SUSE bug 1220186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220187">SUSE bug 1220187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220869">SUSE bug 1220869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220876">SUSE bug 1220876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220942">SUSE bug 1220942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220952">SUSE bug 1220952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221010">SUSE bug 1221010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221044">SUSE bug 1221044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221647">SUSE bug 1221647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221654">SUSE bug 1221654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221656">SUSE bug 1221656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221659">SUSE bug 1221659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221777">SUSE bug 1221777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222011">SUSE bug 1222011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222323">SUSE bug 1222323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222326">SUSE bug 1222326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222328">SUSE bug 1222328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222625">SUSE bug 1222625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222702">SUSE bug 1222702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222728">SUSE bug 1222728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222799">SUSE bug 1222799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222809">SUSE bug 1222809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222810">SUSE bug 1222810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223021">SUSE bug 1223021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223180">SUSE bug 1223180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223635">SUSE bug 1223635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223652">SUSE bug 1223652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223675">SUSE bug 1223675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223778">SUSE bug 1223778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223806">SUSE bug 1223806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223813">SUSE bug 1223813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223815">SUSE bug 1223815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223836">SUSE bug 1223836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223863">SUSE bug 1223863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224414">SUSE bug 1224414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224499">SUSE bug 1224499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224500">SUSE bug 1224500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224512">SUSE bug 1224512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224516">SUSE bug 1224516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224517">SUSE bug 1224517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224545">SUSE bug 1224545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224548">SUSE bug 1224548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224557">SUSE bug 1224557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224572">SUSE bug 1224572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224573">SUSE bug 1224573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224585">SUSE bug 1224585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224604">SUSE bug 1224604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224636">SUSE bug 1224636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224641">SUSE bug 1224641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224683">SUSE bug 1224683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224694">SUSE bug 1224694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224700">SUSE bug 1224700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224743">SUSE bug 1224743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225088">SUSE bug 1225088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225272">SUSE bug 1225272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225301">SUSE bug 1225301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225475">SUSE bug 1225475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225489">SUSE bug 1225489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225504">SUSE bug 1225504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225505">SUSE bug 1225505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225564">SUSE bug 1225564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225573">SUSE bug 1225573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225581">SUSE bug 1225581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225586">SUSE bug 1225586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225711">SUSE bug 1225711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225717">SUSE bug 1225717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225719">SUSE bug 1225719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225744">SUSE bug 1225744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225745">SUSE bug 1225745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225746">SUSE bug 1225746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225752">SUSE bug 1225752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225753">SUSE bug 1225753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225757">SUSE bug 1225757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225767">SUSE bug 1225767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225810">SUSE bug 1225810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225815">SUSE bug 1225815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225820">SUSE bug 1225820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225829">SUSE bug 1225829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225835">SUSE bug 1225835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225838">SUSE bug 1225838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225839">SUSE bug 1225839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225843">SUSE bug 1225843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225847">SUSE bug 1225847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225851">SUSE bug 1225851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225856">SUSE bug 1225856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225895">SUSE bug 1225895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225898">SUSE bug 1225898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225903">SUSE bug 1225903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226202">SUSE bug 1226202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226502">SUSE bug 1226502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226519">SUSE bug 1226519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226551">SUSE bug 1226551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226555">SUSE bug 1226555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226565">SUSE bug 1226565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226568">SUSE bug 1226568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226570">SUSE bug 1226570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226571">SUSE bug 1226571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226574">SUSE bug 1226574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226588">SUSE bug 1226588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226607">SUSE bug 1226607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226650">SUSE bug 1226650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226698">SUSE bug 1226698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226713">SUSE bug 1226713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226716">SUSE bug 1226716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226750">SUSE bug 1226750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226757">SUSE bug 1226757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226758">SUSE bug 1226758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226775">SUSE bug 1226775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226783">SUSE bug 1226783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226785">SUSE bug 1226785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226834">SUSE bug 1226834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226837">SUSE bug 1226837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226911">SUSE bug 1226911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226990">SUSE bug 1226990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226993">SUSE bug 1226993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227090">SUSE bug 1227090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227121">SUSE bug 1227121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227157">SUSE bug 1227157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227162">SUSE bug 1227162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227362">SUSE bug 1227362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227383">SUSE bug 1227383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227432">SUSE bug 1227432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227435">SUSE bug 1227435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227447">SUSE bug 1227447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227487">SUSE bug 1227487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227549">SUSE bug 1227549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227573">SUSE bug 1227573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227618">SUSE bug 1227618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227620">SUSE bug 1227620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227626">SUSE bug 1227626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227635">SUSE bug 1227635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227661">SUSE bug 1227661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227716">SUSE bug 1227716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227722">SUSE bug 1227722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227724">SUSE bug 1227724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227725">SUSE bug 1227725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227728">SUSE bug 1227728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227729">SUSE bug 1227729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227730">SUSE bug 1227730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227732">SUSE bug 1227732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227733">SUSE bug 1227733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227750">SUSE bug 1227750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227754">SUSE bug 1227754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227755">SUSE bug 1227755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227760">SUSE bug 1227760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227762">SUSE bug 1227762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227763">SUSE bug 1227763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227764">SUSE bug 1227764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227766">SUSE bug 1227766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227770">SUSE bug 1227770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227771">SUSE bug 1227771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227772">SUSE bug 1227772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227774">SUSE bug 1227774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227779">SUSE bug 1227779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227780">SUSE bug 1227780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227783">SUSE bug 1227783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227786">SUSE bug 1227786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227787">SUSE bug 1227787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227790">SUSE bug 1227790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227792">SUSE bug 1227792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227796">SUSE bug 1227796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227797">SUSE bug 1227797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227798">SUSE bug 1227798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227800">SUSE bug 1227800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227802">SUSE bug 1227802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227806">SUSE bug 1227806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227808">SUSE bug 1227808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227810">SUSE bug 1227810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227812">SUSE bug 1227812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227813">SUSE bug 1227813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227814">SUSE bug 1227814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227816">SUSE bug 1227816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227820">SUSE bug 1227820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227823">SUSE bug 1227823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227824">SUSE bug 1227824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227828">SUSE bug 1227828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227829">SUSE bug 1227829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227836">SUSE bug 1227836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227846">SUSE bug 1227846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227849">SUSE bug 1227849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227851">SUSE bug 1227851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227862">SUSE bug 1227862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227864">SUSE bug 1227864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227865">SUSE bug 1227865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227866">SUSE bug 1227866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227870">SUSE bug 1227870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227884">SUSE bug 1227884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227886">SUSE bug 1227886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227891">SUSE bug 1227891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227893">SUSE bug 1227893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227899">SUSE bug 1227899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227900">SUSE bug 1227900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227910">SUSE bug 1227910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227913">SUSE bug 1227913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227917">SUSE bug 1227917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227919">SUSE bug 1227919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227920">SUSE bug 1227920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227921">SUSE bug 1227921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227922">SUSE bug 1227922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227923">SUSE bug 1227923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227924">SUSE bug 1227924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227925">SUSE bug 1227925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227927">SUSE bug 1227927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227928">SUSE bug 1227928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227931">SUSE bug 1227931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227932">SUSE bug 1227932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227933">SUSE bug 1227933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227935">SUSE bug 1227935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227936">SUSE bug 1227936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227938">SUSE bug 1227938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227941">SUSE bug 1227941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227942">SUSE bug 1227942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227944">SUSE bug 1227944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227945">SUSE bug 1227945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227947">SUSE bug 1227947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227948">SUSE bug 1227948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227949">SUSE bug 1227949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227950">SUSE bug 1227950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227952">SUSE bug 1227952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227953">SUSE bug 1227953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227954">SUSE bug 1227954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227956">SUSE bug 1227956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227957">SUSE bug 1227957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227963">SUSE bug 1227963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227964">SUSE bug 1227964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227965">SUSE bug 1227965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227968">SUSE bug 1227968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227969">SUSE bug 1227969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227970">SUSE bug 1227970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227971">SUSE bug 1227971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227972">SUSE bug 1227972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227975">SUSE bug 1227975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227976">SUSE bug 1227976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227981">SUSE bug 1227981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227982">SUSE bug 1227982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227985">SUSE bug 1227985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227986">SUSE bug 1227986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227987">SUSE bug 1227987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227988">SUSE bug 1227988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227989">SUSE bug 1227989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227990">SUSE bug 1227990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227991">SUSE bug 1227991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227992">SUSE bug 1227992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227993">SUSE bug 1227993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227995">SUSE bug 1227995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227996">SUSE bug 1227996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227997">SUSE bug 1227997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228000">SUSE bug 1228000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228002">SUSE bug 1228002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228003">SUSE bug 1228003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228004">SUSE bug 1228004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228005">SUSE bug 1228005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228006">SUSE bug 1228006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228007">SUSE bug 1228007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228008">SUSE bug 1228008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228009">SUSE bug 1228009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228010">SUSE bug 1228010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228011">SUSE bug 1228011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228013">SUSE bug 1228013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228014">SUSE bug 1228014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228015">SUSE bug 1228015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228019">SUSE bug 1228019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228020">SUSE bug 1228020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228025">SUSE bug 1228025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228028">SUSE bug 1228028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228035">SUSE bug 1228035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228037">SUSE bug 1228037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228038">SUSE bug 1228038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228039">SUSE bug 1228039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228040">SUSE bug 1228040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228045">SUSE bug 1228045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228054">SUSE bug 1228054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228055">SUSE bug 1228055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228056">SUSE bug 1228056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228060">SUSE bug 1228060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228061">SUSE bug 1228061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228062">SUSE bug 1228062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228063">SUSE bug 1228063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228064">SUSE bug 1228064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228066">SUSE bug 1228066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228067">SUSE bug 1228067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228068">SUSE bug 1228068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228071">SUSE bug 1228071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228079">SUSE bug 1228079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228090">SUSE bug 1228090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228114">SUSE bug 1228114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228140">SUSE bug 1228140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228190">SUSE bug 1228190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228191">SUSE bug 1228191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228195">SUSE bug 1228195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228202">SUSE bug 1228202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228226">SUSE bug 1228226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228235">SUSE bug 1228235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228237">SUSE bug 1228237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228247">SUSE bug 1228247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228327">SUSE bug 1228327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228328">SUSE bug 1228328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228330">SUSE bug 1228330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228403">SUSE bug 1228403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228405">SUSE bug 1228405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228408">SUSE bug 1228408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228409">SUSE bug 1228409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228410">SUSE bug 1228410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228418">SUSE bug 1228418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228440">SUSE bug 1228440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228459">SUSE bug 1228459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228462">SUSE bug 1228462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228470">SUSE bug 1228470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228518">SUSE bug 1228518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228520">SUSE bug 1228520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228530">SUSE bug 1228530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228561">SUSE bug 1228561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228565">SUSE bug 1228565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228580">SUSE bug 1228580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228581">SUSE bug 1228581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228591">SUSE bug 1228591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228599">SUSE bug 1228599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228617">SUSE bug 1228617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228625">SUSE bug 1228625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228626">SUSE bug 1228626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228633">SUSE bug 1228633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228640">SUSE bug 1228640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228644">SUSE bug 1228644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228649">SUSE bug 1228649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228655">SUSE bug 1228655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228665">SUSE bug 1228665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228672">SUSE bug 1228672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228680">SUSE bug 1228680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228705">SUSE bug 1228705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228723">SUSE bug 1228723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228743">SUSE bug 1228743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228756">SUSE bug 1228756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228801">SUSE bug 1228801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228850">SUSE bug 1228850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228857">SUSE bug 1228857</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47086/">CVE-2021-47086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47086">CVE-2021-47086 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47103/">CVE-2021-47103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47103">CVE-2021-47103 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47186/">CVE-2021-47186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47186">CVE-2021-47186 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47402/">CVE-2021-47402 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47402">CVE-2021-47402 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47546/">CVE-2021-47546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47546">CVE-2021-47546 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47547/">CVE-2021-47547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47547">CVE-2021-47547 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47588/">CVE-2021-47588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47588">CVE-2021-47588 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47590/">CVE-2021-47590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47590">CVE-2021-47590 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47591/">CVE-2021-47591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47591">CVE-2021-47591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47593/">CVE-2021-47593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47593">CVE-2021-47593 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47598/">CVE-2021-47598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47598">CVE-2021-47598 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47599/">CVE-2021-47599 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47599">CVE-2021-47599 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47606/">CVE-2021-47606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47606">CVE-2021-47606 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47622/">CVE-2021-47622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47622">CVE-2021-47622 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47623/">CVE-2021-47623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47623">CVE-2021-47623 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47624/">CVE-2021-47624 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47624">CVE-2021-47624 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48713/">CVE-2022-48713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48713">CVE-2022-48713 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48730/">CVE-2022-48730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48730">CVE-2022-48730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48732/">CVE-2022-48732 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48732">CVE-2022-48732 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48749/">CVE-2022-48749 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48749">CVE-2022-48749 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48756/">CVE-2022-48756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48756">CVE-2022-48756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48773/">CVE-2022-48773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48773">CVE-2022-48773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48774/">CVE-2022-48774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48774">CVE-2022-48774 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48775/">CVE-2022-48775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48775">CVE-2022-48775 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48776/">CVE-2022-48776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48776">CVE-2022-48776 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48777/">CVE-2022-48777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48777">CVE-2022-48777 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48778/">CVE-2022-48778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48778">CVE-2022-48778 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48780/">CVE-2022-48780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48780">CVE-2022-48780 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48783/">CVE-2022-48783 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48783">CVE-2022-48783 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48784/">CVE-2022-48784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48784">CVE-2022-48784 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48785/">CVE-2022-48785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48785">CVE-2022-48785 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-48786/">CVE-2022-48786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48786">CVE-2022-48786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48787/">CVE-2022-48787 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48787">CVE-2022-48787 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48788/">CVE-2022-48788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48788">CVE-2022-48788 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48789/">CVE-2022-48789 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48789">CVE-2022-48789 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48790/">CVE-2022-48790 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48790">CVE-2022-48790 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48791/">CVE-2022-48791 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48791">CVE-2022-48791 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48792/">CVE-2022-48792 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48792">CVE-2022-48792 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48793/">CVE-2022-48793 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48793">CVE-2022-48793 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48794/">CVE-2022-48794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48794">CVE-2022-48794 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48796/">CVE-2022-48796 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48796">CVE-2022-48796 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48797/">CVE-2022-48797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48797">CVE-2022-48797 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48798/">CVE-2022-48798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48798">CVE-2022-48798 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48799/">CVE-2022-48799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48799">CVE-2022-48799 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48800/">CVE-2022-48800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48800">CVE-2022-48800 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48801/">CVE-2022-48801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48801">CVE-2022-48801 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48802/">CVE-2022-48802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48802">CVE-2022-48802 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48803/">CVE-2022-48803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48803">CVE-2022-48803 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48804/">CVE-2022-48804 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48804">CVE-2022-48804 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48805/">CVE-2022-48805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48805">CVE-2022-48805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48806/">CVE-2022-48806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48806">CVE-2022-48806 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48807/">CVE-2022-48807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48807">CVE-2022-48807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48809/">CVE-2022-48809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48809">CVE-2022-48809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48810/">CVE-2022-48810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48810">CVE-2022-48810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48811/">CVE-2022-48811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48811">CVE-2022-48811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48812/">CVE-2022-48812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48812">CVE-2022-48812 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48813/">CVE-2022-48813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48813">CVE-2022-48813 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48814/">CVE-2022-48814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48814">CVE-2022-48814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48815/">CVE-2022-48815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48815">CVE-2022-48815 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48816/">CVE-2022-48816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48816">CVE-2022-48816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48817/">CVE-2022-48817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48817">CVE-2022-48817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48818/">CVE-2022-48818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48818">CVE-2022-48818 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48820/">CVE-2022-48820 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48820">CVE-2022-48820 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48821/">CVE-2022-48821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48821">CVE-2022-48821 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48822/">CVE-2022-48822 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48822">CVE-2022-48822 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48823/">CVE-2022-48823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48823">CVE-2022-48823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48824/">CVE-2022-48824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48824">CVE-2022-48824 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48825/">CVE-2022-48825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48825">CVE-2022-48825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48826/">CVE-2022-48826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48826">CVE-2022-48826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48827/">CVE-2022-48827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48827">CVE-2022-48827 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48828/">CVE-2022-48828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48828">CVE-2022-48828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48829/">CVE-2022-48829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48829">CVE-2022-48829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48830/">CVE-2022-48830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48830">CVE-2022-48830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48831/">CVE-2022-48831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48831">CVE-2022-48831 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48834/">CVE-2022-48834 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48834">CVE-2022-48834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48835/">CVE-2022-48835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48835">CVE-2022-48835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48836/">CVE-2022-48836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48836">CVE-2022-48836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48837/">CVE-2022-48837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48837">CVE-2022-48837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48838/">CVE-2022-48838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48838">CVE-2022-48838 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48839/">CVE-2022-48839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48839">CVE-2022-48839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48840/">CVE-2022-48840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48840">CVE-2022-48840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48841/">CVE-2022-48841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48841">CVE-2022-48841 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48842/">CVE-2022-48842 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48842">CVE-2022-48842 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48843/">CVE-2022-48843 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48843">CVE-2022-48843 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48844/">CVE-2022-48844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48844">CVE-2022-48844 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48846/">CVE-2022-48846 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48846">CVE-2022-48846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48847/">CVE-2022-48847 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48847">CVE-2022-48847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48849/">CVE-2022-48849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48849">CVE-2022-48849 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48850/">CVE-2022-48850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48850">CVE-2022-48850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48851/">CVE-2022-48851 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48851">CVE-2022-48851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48852/">CVE-2022-48852 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48852">CVE-2022-48852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48853/">CVE-2022-48853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48853">CVE-2022-48853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48855/">CVE-2022-48855 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48855">CVE-2022-48855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48856/">CVE-2022-48856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48856">CVE-2022-48856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48857/">CVE-2022-48857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48857">CVE-2022-48857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48858/">CVE-2022-48858 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48858">CVE-2022-48858 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48859/">CVE-2022-48859 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48859">CVE-2022-48859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48860/">CVE-2022-48860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48860">CVE-2022-48860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48861/">CVE-2022-48861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48861">CVE-2022-48861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48862/">CVE-2022-48862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48862">CVE-2022-48862 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48863/">CVE-2022-48863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48863">CVE-2022-48863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48864/">CVE-2022-48864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48864">CVE-2022-48864 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48866/">CVE-2022-48866 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48866">CVE-2022-48866 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1582/">CVE-2023-1582 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1582">CVE-2023-1582 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37453/">CVE-2023-37453 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37453">CVE-2023-37453 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52435/">CVE-2023-52435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52435">CVE-2023-52435 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52573/">CVE-2023-52573 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52573">CVE-2023-52573 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52580/">CVE-2023-52580 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52580">CVE-2023-52580 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52591/">CVE-2023-52591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52591">CVE-2023-52591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52735/">CVE-2023-52735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52735">CVE-2023-52735 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52751/">CVE-2023-52751 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52751">CVE-2023-52751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52762/">CVE-2023-52762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52762">CVE-2023-52762 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52775/">CVE-2023-52775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52775">CVE-2023-52775 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52812/">CVE-2023-52812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52812">CVE-2023-52812 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52857/">CVE-2023-52857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52857">CVE-2023-52857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52863/">CVE-2023-52863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52863">CVE-2023-52863 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52885/">CVE-2023-52885 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52885">CVE-2023-52885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52886/">CVE-2023-52886 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52886">CVE-2023-52886 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-25741/">CVE-2024-25741 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25741">CVE-2024-25741 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26583/">CVE-2024-26583 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26583">CVE-2024-26583 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26584/">CVE-2024-26584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26584">CVE-2024-26584 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26585/">CVE-2024-26585 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26585">CVE-2024-26585 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26615/">CVE-2024-26615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26615">CVE-2024-26615 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26633/">CVE-2024-26633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26633">CVE-2024-26633 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26635/">CVE-2024-26635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26635">CVE-2024-26635 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26636/">CVE-2024-26636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26636">CVE-2024-26636 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26641/">CVE-2024-26641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26641">CVE-2024-26641 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26661/">CVE-2024-26661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26661">CVE-2024-26661 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26663/">CVE-2024-26663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26663">CVE-2024-26663 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26665/">CVE-2024-26665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26665">CVE-2024-26665 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26800/">CVE-2024-26800 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26800">CVE-2024-26800 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26802/">CVE-2024-26802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26802">CVE-2024-26802 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26813/">CVE-2024-26813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26813">CVE-2024-26813 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26814/">CVE-2024-26814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26814">CVE-2024-26814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26863/">CVE-2024-26863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26863">CVE-2024-26863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26889/">CVE-2024-26889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26889">CVE-2024-26889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26920/">CVE-2024-26920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26920">CVE-2024-26920 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26935/">CVE-2024-26935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26935">CVE-2024-26935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26961/">CVE-2024-26961 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26961">CVE-2024-26961 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26976/">CVE-2024-26976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26976">CVE-2024-26976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27015/">CVE-2024-27015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27015">CVE-2024-27015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27019/">CVE-2024-27019 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27019">CVE-2024-27019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27020/">CVE-2024-27020 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27020">CVE-2024-27020 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27025/">CVE-2024-27025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27025">CVE-2024-27025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27065/">CVE-2024-27065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27065">CVE-2024-27065 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27402/">CVE-2024-27402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27402">CVE-2024-27402 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27437/">CVE-2024-27437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27437">CVE-2024-27437 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35805/">CVE-2024-35805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35805">CVE-2024-35805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35819/">CVE-2024-35819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35819">CVE-2024-35819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35837/">CVE-2024-35837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35837">CVE-2024-35837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35853/">CVE-2024-35853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35853">CVE-2024-35853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35854/">CVE-2024-35854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35854">CVE-2024-35854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35855/">CVE-2024-35855 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35855">CVE-2024-35855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35889/">CVE-2024-35889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35889">CVE-2024-35889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35890/">CVE-2024-35890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35890">CVE-2024-35890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35893/">CVE-2024-35893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35893">CVE-2024-35893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35899/">CVE-2024-35899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35899">CVE-2024-35899 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35934/">CVE-2024-35934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35934">CVE-2024-35934 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35949/">CVE-2024-35949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35949">CVE-2024-35949 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35961/">CVE-2024-35961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35961">CVE-2024-35961 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35979/">CVE-2024-35979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35979">CVE-2024-35979 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-35995/">CVE-2024-35995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35995">CVE-2024-35995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36000/">CVE-2024-36000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36000">CVE-2024-36000 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36004/">CVE-2024-36004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36004">CVE-2024-36004 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36288/">CVE-2024-36288 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36288">CVE-2024-36288 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-36889/">CVE-2024-36889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36889">CVE-2024-36889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36901/">CVE-2024-36901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36901">CVE-2024-36901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36902/">CVE-2024-36902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36902">CVE-2024-36902 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36909/">CVE-2024-36909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36909">CVE-2024-36909 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36910/">CVE-2024-36910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36910">CVE-2024-36910 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36911/">CVE-2024-36911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36911">CVE-2024-36911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36912/">CVE-2024-36912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36912">CVE-2024-36912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36913/">CVE-2024-36913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36913">CVE-2024-36913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36914/">CVE-2024-36914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36914">CVE-2024-36914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36919/">CVE-2024-36919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36919">CVE-2024-36919 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-36923/">CVE-2024-36923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36923">CVE-2024-36923 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36924/">CVE-2024-36924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36924">CVE-2024-36924 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36926/">CVE-2024-36926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36926">CVE-2024-36926 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36939/">CVE-2024-36939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36939">CVE-2024-36939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36941/">CVE-2024-36941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36941">CVE-2024-36941 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36942/">CVE-2024-36942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36942">CVE-2024-36942 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36944/">CVE-2024-36944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36944">CVE-2024-36944 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-36946/">CVE-2024-36946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36946">CVE-2024-36946 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36947/">CVE-2024-36947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36947">CVE-2024-36947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36950/">CVE-2024-36950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36950">CVE-2024-36950 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36952/">CVE-2024-36952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36952">CVE-2024-36952 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36955/">CVE-2024-36955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36955">CVE-2024-36955 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36959/">CVE-2024-36959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36959">CVE-2024-36959 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36974/">CVE-2024-36974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36974">CVE-2024-36974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38548/">CVE-2024-38548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38548">CVE-2024-38548 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38555/">CVE-2024-38555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38555">CVE-2024-38555 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38558/">CVE-2024-38558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38558">CVE-2024-38558 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38559/">CVE-2024-38559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38559">CVE-2024-38559 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38570/">CVE-2024-38570 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38570">CVE-2024-38570 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38586/">CVE-2024-38586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38586">CVE-2024-38586 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38588/">CVE-2024-38588 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38588">CVE-2024-38588 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38598/">CVE-2024-38598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38598">CVE-2024-38598 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38628/">CVE-2024-38628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38628">CVE-2024-38628 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39276/">CVE-2024-39276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39276">CVE-2024-39276 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39371/">CVE-2024-39371 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39371">CVE-2024-39371 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39463/">CVE-2024-39463 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39463">CVE-2024-39463 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-39472/">CVE-2024-39472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39472">CVE-2024-39472 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39475/">CVE-2024-39475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39475">CVE-2024-39475 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39482/">CVE-2024-39482 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39482">CVE-2024-39482 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39487/">CVE-2024-39487 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39487">CVE-2024-39487 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39488/">CVE-2024-39488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39488">CVE-2024-39488 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-39490/">CVE-2024-39490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39490">CVE-2024-39490 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39493/">CVE-2024-39493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39493">CVE-2024-39493 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39494/">CVE-2024-39494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39494">CVE-2024-39494 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39497/">CVE-2024-39497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39497">CVE-2024-39497 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39499/">CVE-2024-39499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39499">CVE-2024-39499 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39500/">CVE-2024-39500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39500">CVE-2024-39500 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39501/">CVE-2024-39501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39501">CVE-2024-39501 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39502/">CVE-2024-39502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39502">CVE-2024-39502 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39505/">CVE-2024-39505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39505">CVE-2024-39505 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39506/">CVE-2024-39506 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39506">CVE-2024-39506 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39507/">CVE-2024-39507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39507">CVE-2024-39507 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-39508/">CVE-2024-39508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39508">CVE-2024-39508 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39509/">CVE-2024-39509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39509">CVE-2024-39509 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40900/">CVE-2024-40900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40900">CVE-2024-40900 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-40901/">CVE-2024-40901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40901">CVE-2024-40901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-40902/">CVE-2024-40902 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40902">CVE-2024-40902 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40903/">CVE-2024-40903 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40903">CVE-2024-40903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40904/">CVE-2024-40904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40904">CVE-2024-40904 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40906/">CVE-2024-40906 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40906">CVE-2024-40906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40908/">CVE-2024-40908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40908">CVE-2024-40908 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40909/">CVE-2024-40909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40909">CVE-2024-40909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40911/">CVE-2024-40911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40911">CVE-2024-40911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40912/">CVE-2024-40912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40912">CVE-2024-40912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40916/">CVE-2024-40916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40916">CVE-2024-40916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40919/">CVE-2024-40919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40919">CVE-2024-40919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40923/">CVE-2024-40923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40923">CVE-2024-40923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40924/">CVE-2024-40924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40924">CVE-2024-40924 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40927/">CVE-2024-40927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40927">CVE-2024-40927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40929/">CVE-2024-40929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40929">CVE-2024-40929 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-40931/">CVE-2024-40931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40931">CVE-2024-40931 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40932/">CVE-2024-40932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40932">CVE-2024-40932 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40934/">CVE-2024-40934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40934">CVE-2024-40934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40935/">CVE-2024-40935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40935">CVE-2024-40935 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40937/">CVE-2024-40937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40937">CVE-2024-40937 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40940/">CVE-2024-40940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40940">CVE-2024-40940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40941/">CVE-2024-40941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40941">CVE-2024-40941 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40942/">CVE-2024-40942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40942">CVE-2024-40942 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40943/">CVE-2024-40943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40943">CVE-2024-40943 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40945/">CVE-2024-40945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40945">CVE-2024-40945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40953/">CVE-2024-40953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40953">CVE-2024-40953 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40954/">CVE-2024-40954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40954">CVE-2024-40954 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40956/">CVE-2024-40956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40956">CVE-2024-40956 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40958/">CVE-2024-40958 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40958">CVE-2024-40958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40959/">CVE-2024-40959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40959">CVE-2024-40959 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40960/">CVE-2024-40960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40960">CVE-2024-40960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40961/">CVE-2024-40961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40961">CVE-2024-40961 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40966/">CVE-2024-40966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40966">CVE-2024-40966 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40967/">CVE-2024-40967 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40967">CVE-2024-40967 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40970/">CVE-2024-40970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40970">CVE-2024-40970 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40972/">CVE-2024-40972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40972">CVE-2024-40972 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40976/">CVE-2024-40976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40976">CVE-2024-40976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40977/">CVE-2024-40977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40977">CVE-2024-40977 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40981/">CVE-2024-40981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40981">CVE-2024-40981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40982/">CVE-2024-40982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40982">CVE-2024-40982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40984/">CVE-2024-40984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40984">CVE-2024-40984 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40987/">CVE-2024-40987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40987">CVE-2024-40987 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40988/">CVE-2024-40988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40988">CVE-2024-40988 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40989/">CVE-2024-40989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40989">CVE-2024-40989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40990/">CVE-2024-40990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40990">CVE-2024-40990 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40994/">CVE-2024-40994 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40994">CVE-2024-40994 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40998/">CVE-2024-40998 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40998">CVE-2024-40998 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-40999/">CVE-2024-40999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40999">CVE-2024-40999 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41002/">CVE-2024-41002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41002">CVE-2024-41002 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41004/">CVE-2024-41004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41004">CVE-2024-41004 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41006/">CVE-2024-41006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41006">CVE-2024-41006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41009/">CVE-2024-41009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41009">CVE-2024-41009 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41011/">CVE-2024-41011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41011">CVE-2024-41011 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41012/">CVE-2024-41012 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41012">CVE-2024-41012 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41013/">CVE-2024-41013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41013">CVE-2024-41013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41014/">CVE-2024-41014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41014">CVE-2024-41014 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41015/">CVE-2024-41015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41015">CVE-2024-41015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41016/">CVE-2024-41016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41016">CVE-2024-41016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41017/">CVE-2024-41017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41017">CVE-2024-41017 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41040/">CVE-2024-41040 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41040">CVE-2024-41040 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41041/">CVE-2024-41041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41041">CVE-2024-41041 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-41044/">CVE-2024-41044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41044">CVE-2024-41044 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41048/">CVE-2024-41048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41048">CVE-2024-41048 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41057/">CVE-2024-41057 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41057">CVE-2024-41057 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41058/">CVE-2024-41058 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41058">CVE-2024-41058 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41059/">CVE-2024-41059 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41059">CVE-2024-41059 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41063/">CVE-2024-41063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41063">CVE-2024-41063 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41064/">CVE-2024-41064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41064">CVE-2024-41064 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41066/">CVE-2024-41066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41066">CVE-2024-41066 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41069/">CVE-2024-41069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41069">CVE-2024-41069 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41070/">CVE-2024-41070 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41070">CVE-2024-41070 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41071/">CVE-2024-41071 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41071">CVE-2024-41071 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41072/">CVE-2024-41072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41072">CVE-2024-41072 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41076/">CVE-2024-41076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41076">CVE-2024-41076 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41078/">CVE-2024-41078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41078">CVE-2024-41078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41081/">CVE-2024-41081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41081">CVE-2024-41081 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41087/">CVE-2024-41087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41087">CVE-2024-41087 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41090/">CVE-2024-41090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41090">CVE-2024-41090 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41091/">CVE-2024-41091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41091">CVE-2024-41091 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42070/">CVE-2024-42070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42070">CVE-2024-42070 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42079/">CVE-2024-42079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42079">CVE-2024-42079 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-42093/">CVE-2024-42093 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42093">CVE-2024-42093 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42096/">CVE-2024-42096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42096">CVE-2024-42096 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42105/">CVE-2024-42105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42105">CVE-2024-42105 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42122/">CVE-2024-42122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42122">CVE-2024-42122 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42124/">CVE-2024-42124 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42124">CVE-2024-42124 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42145/">CVE-2024-42145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42145">CVE-2024-42145 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42161/">CVE-2024-42161 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42161">CVE-2024-42161 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42224/">CVE-2024-42224 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42224">CVE-2024-42224 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42230/">CVE-2024-42230 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42230">CVE-2024-42230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009879140" comment="cluster-md-kmp-rt-5.14.21-150500.13.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879141" comment="dlm-kmp-rt-5.14.21-150500.13.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879142" comment="gfs2-kmp-rt-5.14.21-150500.13.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879143" comment="kernel-devel-rt-5.14.21-150500.13.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879144" comment="kernel-rt-5.14.21-150500.13.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879145" comment="kernel-rt-devel-5.14.21-150500.13.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879146" comment="kernel-rt-extra-5.14.21-150500.13.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879147" comment="kernel-rt-livepatch-5.14.21-150500.13.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879148" comment="kernel-rt-livepatch-devel-5.14.21-150500.13.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879149" comment="kernel-rt-optional-5.14.21-150500.13.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879150" comment="kernel-rt-vdso-5.14.21-150500.13.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879151" comment="kernel-rt_debug-5.14.21-150500.13.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879152" comment="kernel-rt_debug-devel-5.14.21-150500.13.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879153" comment="kernel-rt_debug-livepatch-devel-5.14.21-150500.13.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879154" comment="kernel-rt_debug-vdso-5.14.21-150500.13.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879155" comment="kernel-source-rt-5.14.21-150500.13.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879156" comment="kernel-syms-rt-5.14.21-150500.13.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879157" comment="kselftests-kmp-rt-5.14.21-150500.13.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879158" comment="ocfs2-kmp-rt-5.14.21-150500.13.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879159" comment="reiserfs-kmp-rt-5.14.21-150500.13.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4907" version="1" class="patch">
	<metadata>
		<title>Security update for python39-setuptools (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228105" ref_url="https://bugzilla.suse.com/1228105" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6345" ref_url="https://www.suse.com/security/cve/CVE-2024-6345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019190.html" source="SUSE-SU"/>
		<description>
This update for python39-setuptools fixes the following issues:

- CVE-2024-6345: Fixed code execution via download functions in the package_index module (bsc#1228105)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1228105">SUSE bug 1228105</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6345/">CVE-2024-6345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6345">CVE-2024-6345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879480" comment="python39-setuptools-44.1.1-150300.7.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4908" version="1" class="patch">
	<metadata>
		<title>Security update for python310-setuptools (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228105" ref_url="https://bugzilla.suse.com/1228105" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6345" ref_url="https://www.suse.com/security/cve/CVE-2024-6345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019189.html" source="SUSE-SU"/>
		<description>
This update for python310-setuptools fixes the following issues:

- CVE-2024-6345: Fixed code execution via download functions in the package_index module (bsc#1228105)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1228105">SUSE bug 1228105</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6345/">CVE-2024-6345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6345">CVE-2024-6345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879481" comment="python310-setuptools-67.6.1-150400.4.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4909" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pillow (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1205416" ref_url="https://bugzilla.suse.com/1205416" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-45198" ref_url="https://www.suse.com/security/cve/CVE-2022-45198/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019200.html" source="SUSE-SU"/>
		<description>
This update for python-Pillow fixes the following issues:

- CVE-2022-45198: Fixed improper handling of highly compressed GIF data (bsc#1205416)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2024-08-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1205416">SUSE bug 1205416</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-45198/">CVE-2022-45198 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45198">CVE-2022-45198 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009879482" comment="python3-Pillow-7.2.0-150300.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879483" comment="python3-Pillow-tk-7.2.0-150300.3.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4910" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.25 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1194400" ref_url="https://bugzilla.suse.com/1194400" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25743" ref_url="https://www.suse.com/security/cve/CVE-2021-25743/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019202.html" source="SUSE-SU"/>
		<description>
This update for kubernetes1.25 fixes the following issues:

- CVE-2021-25743: Fixed sanitization of raw data of escape, meta or control sequences before output it to terminal (bsc#1194400)

Other fixes:
- Included kubernetes1.25-client package. (jsc#PED-5755)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-15"/>
	<updated date="2024-08-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194400">SUSE bug 1194400</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-25743/">CVE-2021-25743 at SUSE</cve>
	<cve impact="low" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25743">CVE-2021-25743 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009879658" comment="kubernetes1.25-client-1.25.16-150400.9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879659" comment="kubernetes1.25-client-common-1.25.16-150400.9.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4911" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1082555" ref_url="https://bugzilla.suse.com/1082555" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1190336" ref_url="https://bugzilla.suse.com/1190336" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1193454" ref_url="https://bugzilla.suse.com/1193454" source="BUGZILLA"/>
		<reference ref_id="1193554" ref_url="https://bugzilla.suse.com/1193554" source="BUGZILLA"/>
		<reference ref_id="1193787" ref_url="https://bugzilla.suse.com/1193787" source="BUGZILLA"/>
		<reference ref_id="1193883" ref_url="https://bugzilla.suse.com/1193883" source="BUGZILLA"/>
		<reference ref_id="1194324" ref_url="https://bugzilla.suse.com/1194324" source="BUGZILLA"/>
		<reference ref_id="1194826" ref_url="https://bugzilla.suse.com/1194826" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1195065" ref_url="https://bugzilla.suse.com/1195065" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195341" ref_url="https://bugzilla.suse.com/1195341" source="BUGZILLA"/>
		<reference ref_id="1195349" ref_url="https://bugzilla.suse.com/1195349" source="BUGZILLA"/>
		<reference ref_id="1195357" ref_url="https://bugzilla.suse.com/1195357" source="BUGZILLA"/>
		<reference ref_id="1195668" ref_url="https://bugzilla.suse.com/1195668" source="BUGZILLA"/>
		<reference ref_id="1195775" ref_url="https://bugzilla.suse.com/1195775" source="BUGZILLA"/>
		<reference ref_id="1195927" ref_url="https://bugzilla.suse.com/1195927" source="BUGZILLA"/>
		<reference ref_id="1195957" ref_url="https://bugzilla.suse.com/1195957" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1196746" ref_url="https://bugzilla.suse.com/1196746" source="BUGZILLA"/>
		<reference ref_id="1196823" ref_url="https://bugzilla.suse.com/1196823" source="BUGZILLA"/>
		<reference ref_id="1197146" ref_url="https://bugzilla.suse.com/1197146" source="BUGZILLA"/>
		<reference ref_id="1197246" ref_url="https://bugzilla.suse.com/1197246" source="BUGZILLA"/>
		<reference ref_id="1197762" ref_url="https://bugzilla.suse.com/1197762" source="BUGZILLA"/>
		<reference ref_id="1197915" ref_url="https://bugzilla.suse.com/1197915" source="BUGZILLA"/>
		<reference ref_id="1198014" ref_url="https://bugzilla.suse.com/1198014" source="BUGZILLA"/>
		<reference ref_id="1199295" ref_url="https://bugzilla.suse.com/1199295" source="BUGZILLA"/>
		<reference ref_id="1202346" ref_url="https://bugzilla.suse.com/1202346" source="BUGZILLA"/>
		<reference ref_id="1202686" ref_url="https://bugzilla.suse.com/1202686" source="BUGZILLA"/>
		<reference ref_id="1202767" ref_url="https://bugzilla.suse.com/1202767" source="BUGZILLA"/>
		<reference ref_id="1202780" ref_url="https://bugzilla.suse.com/1202780" source="BUGZILLA"/>
		<reference ref_id="1205205" ref_url="https://bugzilla.suse.com/1205205" source="BUGZILLA"/>
		<reference ref_id="1207361" ref_url="https://bugzilla.suse.com/1207361" source="BUGZILLA"/>
		<reference ref_id="1208783" ref_url="https://bugzilla.suse.com/1208783" source="BUGZILLA"/>
		<reference ref_id="1209636" ref_url="https://bugzilla.suse.com/1209636" source="BUGZILLA"/>
		<reference ref_id="1213123" ref_url="https://bugzilla.suse.com/1213123" source="BUGZILLA"/>
		<reference ref_id="1215492" ref_url="https://bugzilla.suse.com/1215492" source="BUGZILLA"/>
		<reference ref_id="1215587" ref_url="https://bugzilla.suse.com/1215587" source="BUGZILLA"/>
		<reference ref_id="1216834" ref_url="https://bugzilla.suse.com/1216834" source="BUGZILLA"/>
		<reference ref_id="1217912" ref_url="https://bugzilla.suse.com/1217912" source="BUGZILLA"/>
		<reference ref_id="1218148" ref_url="https://bugzilla.suse.com/1218148" source="BUGZILLA"/>
		<reference ref_id="1218570" ref_url="https://bugzilla.suse.com/1218570" source="BUGZILLA"/>
		<reference ref_id="1218820" ref_url="https://bugzilla.suse.com/1218820" source="BUGZILLA"/>
		<reference ref_id="1219224" ref_url="https://bugzilla.suse.com/1219224" source="BUGZILLA"/>
		<reference ref_id="1219633" ref_url="https://bugzilla.suse.com/1219633" source="BUGZILLA"/>
		<reference ref_id="1219832" ref_url="https://bugzilla.suse.com/1219832" source="BUGZILLA"/>
		<reference ref_id="1219847" ref_url="https://bugzilla.suse.com/1219847" source="BUGZILLA"/>
		<reference ref_id="1220138" ref_url="https://bugzilla.suse.com/1220138" source="BUGZILLA"/>
		<reference ref_id="1220185" ref_url="https://bugzilla.suse.com/1220185" source="BUGZILLA"/>
		<reference ref_id="1220186" ref_url="https://bugzilla.suse.com/1220186" source="BUGZILLA"/>
		<reference ref_id="1220368" ref_url="https://bugzilla.suse.com/1220368" source="BUGZILLA"/>
		<reference ref_id="1220812" ref_url="https://bugzilla.suse.com/1220812" source="BUGZILLA"/>
		<reference ref_id="1220869" ref_url="https://bugzilla.suse.com/1220869" source="BUGZILLA"/>
		<reference ref_id="1220876" ref_url="https://bugzilla.suse.com/1220876" source="BUGZILLA"/>
		<reference ref_id="1220942" ref_url="https://bugzilla.suse.com/1220942" source="BUGZILLA"/>
		<reference ref_id="1220952" ref_url="https://bugzilla.suse.com/1220952" source="BUGZILLA"/>
		<reference ref_id="1220958" ref_url="https://bugzilla.suse.com/1220958" source="BUGZILLA"/>
		<reference ref_id="1221010" ref_url="https://bugzilla.suse.com/1221010" source="BUGZILLA"/>
		<reference ref_id="1221086" ref_url="https://bugzilla.suse.com/1221086" source="BUGZILLA"/>
		<reference ref_id="1221282" ref_url="https://bugzilla.suse.com/1221282" source="BUGZILLA"/>
		<reference ref_id="1221647" ref_url="https://bugzilla.suse.com/1221647" source="BUGZILLA"/>
		<reference ref_id="1221654" ref_url="https://bugzilla.suse.com/1221654" source="BUGZILLA"/>
		<reference ref_id="1221656" ref_url="https://bugzilla.suse.com/1221656" source="BUGZILLA"/>
		<reference ref_id="1221659" ref_url="https://bugzilla.suse.com/1221659" source="BUGZILLA"/>
		<reference ref_id="1221958" ref_url="https://bugzilla.suse.com/1221958" source="BUGZILLA"/>
		<reference ref_id="1222015" ref_url="https://bugzilla.suse.com/1222015" source="BUGZILLA"/>
		<reference ref_id="1222072" ref_url="https://bugzilla.suse.com/1222072" source="BUGZILLA"/>
		<reference ref_id="1222080" ref_url="https://bugzilla.suse.com/1222080" source="BUGZILLA"/>
		<reference ref_id="1222241" ref_url="https://bugzilla.suse.com/1222241" source="BUGZILLA"/>
		<reference ref_id="1222254" ref_url="https://bugzilla.suse.com/1222254" source="BUGZILLA"/>
		<reference ref_id="1222323" ref_url="https://bugzilla.suse.com/1222323" source="BUGZILLA"/>
		<reference ref_id="1222326" ref_url="https://bugzilla.suse.com/1222326" source="BUGZILLA"/>
		<reference ref_id="1222328" ref_url="https://bugzilla.suse.com/1222328" source="BUGZILLA"/>
		<reference ref_id="1222364" ref_url="https://bugzilla.suse.com/1222364" source="BUGZILLA"/>
		<reference ref_id="1222625" ref_url="https://bugzilla.suse.com/1222625" source="BUGZILLA"/>
		<reference ref_id="1222702" ref_url="https://bugzilla.suse.com/1222702" source="BUGZILLA"/>
		<reference ref_id="1222728" ref_url="https://bugzilla.suse.com/1222728" source="BUGZILLA"/>
		<reference ref_id="1222799" ref_url="https://bugzilla.suse.com/1222799" source="BUGZILLA"/>
		<reference ref_id="1222809" ref_url="https://bugzilla.suse.com/1222809" source="BUGZILLA"/>
		<reference ref_id="1222810" ref_url="https://bugzilla.suse.com/1222810" source="BUGZILLA"/>
		<reference ref_id="1222893" ref_url="https://bugzilla.suse.com/1222893" source="BUGZILLA"/>
		<reference ref_id="1223013" ref_url="https://bugzilla.suse.com/1223013" source="BUGZILLA"/>
		<reference ref_id="1223018" ref_url="https://bugzilla.suse.com/1223018" source="BUGZILLA"/>
		<reference ref_id="1223021" ref_url="https://bugzilla.suse.com/1223021" source="BUGZILLA"/>
		<reference ref_id="1223180" ref_url="https://bugzilla.suse.com/1223180" source="BUGZILLA"/>
		<reference ref_id="1223265" ref_url="https://bugzilla.suse.com/1223265" source="BUGZILLA"/>
		<reference ref_id="1223384" ref_url="https://bugzilla.suse.com/1223384" source="BUGZILLA"/>
		<reference ref_id="1223635" ref_url="https://bugzilla.suse.com/1223635" source="BUGZILLA"/>
		<reference ref_id="1223641" ref_url="https://bugzilla.suse.com/1223641" source="BUGZILLA"/>
		<reference ref_id="1223652" ref_url="https://bugzilla.suse.com/1223652" source="BUGZILLA"/>
		<reference ref_id="1223675" ref_url="https://bugzilla.suse.com/1223675" source="BUGZILLA"/>
		<reference ref_id="1223778" ref_url="https://bugzilla.suse.com/1223778" source="BUGZILLA"/>
		<reference ref_id="1223806" ref_url="https://bugzilla.suse.com/1223806" source="BUGZILLA"/>
		<reference ref_id="1223813" ref_url="https://bugzilla.suse.com/1223813" source="BUGZILLA"/>
		<reference ref_id="1223815" ref_url="https://bugzilla.suse.com/1223815" source="BUGZILLA"/>
		<reference ref_id="1223836" ref_url="https://bugzilla.suse.com/1223836" source="BUGZILLA"/>
		<reference ref_id="1223863" ref_url="https://bugzilla.suse.com/1223863" source="BUGZILLA"/>
		<reference ref_id="1224020" ref_url="https://bugzilla.suse.com/1224020" source="BUGZILLA"/>
		<reference ref_id="1224331" ref_url="https://bugzilla.suse.com/1224331" source="BUGZILLA"/>
		<reference ref_id="1224414" ref_url="https://bugzilla.suse.com/1224414" source="BUGZILLA"/>
		<reference ref_id="1224488" ref_url="https://bugzilla.suse.com/1224488" source="BUGZILLA"/>
		<reference ref_id="1224497" ref_url="https://bugzilla.suse.com/1224497" source="BUGZILLA"/>
		<reference ref_id="1224498" ref_url="https://bugzilla.suse.com/1224498" source="BUGZILLA"/>
		<reference ref_id="1224499" ref_url="https://bugzilla.suse.com/1224499" source="BUGZILLA"/>
		<reference ref_id="1224500" ref_url="https://bugzilla.suse.com/1224500" source="BUGZILLA"/>
		<reference ref_id="1224504" ref_url="https://bugzilla.suse.com/1224504" source="BUGZILLA"/>
		<reference ref_id="1224512" ref_url="https://bugzilla.suse.com/1224512" source="BUGZILLA"/>
		<reference ref_id="1224516" ref_url="https://bugzilla.suse.com/1224516" source="BUGZILLA"/>
		<reference ref_id="1224517" ref_url="https://bugzilla.suse.com/1224517" source="BUGZILLA"/>
		<reference ref_id="1224520" ref_url="https://bugzilla.suse.com/1224520" source="BUGZILLA"/>
		<reference ref_id="1224539" ref_url="https://bugzilla.suse.com/1224539" source="BUGZILLA"/>
		<reference ref_id="1224540" ref_url="https://bugzilla.suse.com/1224540" source="BUGZILLA"/>
		<reference ref_id="1224545" ref_url="https://bugzilla.suse.com/1224545" source="BUGZILLA"/>
		<reference ref_id="1224548" ref_url="https://bugzilla.suse.com/1224548" source="BUGZILLA"/>
		<reference ref_id="1224552" ref_url="https://bugzilla.suse.com/1224552" source="BUGZILLA"/>
		<reference ref_id="1224557" ref_url="https://bugzilla.suse.com/1224557" source="BUGZILLA"/>
		<reference ref_id="1224572" ref_url="https://bugzilla.suse.com/1224572" source="BUGZILLA"/>
		<reference ref_id="1224573" ref_url="https://bugzilla.suse.com/1224573" source="BUGZILLA"/>
		<reference ref_id="1224583" ref_url="https://bugzilla.suse.com/1224583" source="BUGZILLA"/>
		<reference ref_id="1224585" ref_url="https://bugzilla.suse.com/1224585" source="BUGZILLA"/>
		<reference ref_id="1224588" ref_url="https://bugzilla.suse.com/1224588" source="BUGZILLA"/>
		<reference ref_id="1224602" ref_url="https://bugzilla.suse.com/1224602" source="BUGZILLA"/>
		<reference ref_id="1224603" ref_url="https://bugzilla.suse.com/1224603" source="BUGZILLA"/>
		<reference ref_id="1224604" ref_url="https://bugzilla.suse.com/1224604" source="BUGZILLA"/>
		<reference ref_id="1224605" ref_url="https://bugzilla.suse.com/1224605" source="BUGZILLA"/>
		<reference ref_id="1224612" ref_url="https://bugzilla.suse.com/1224612" source="BUGZILLA"/>
		<reference ref_id="1224614" ref_url="https://bugzilla.suse.com/1224614" source="BUGZILLA"/>
		<reference ref_id="1224619" ref_url="https://bugzilla.suse.com/1224619" source="BUGZILLA"/>
		<reference ref_id="1224636" ref_url="https://bugzilla.suse.com/1224636" source="BUGZILLA"/>
		<reference ref_id="1224641" ref_url="https://bugzilla.suse.com/1224641" source="BUGZILLA"/>
		<reference ref_id="1224661" ref_url="https://bugzilla.suse.com/1224661" source="BUGZILLA"/>
		<reference ref_id="1224662" ref_url="https://bugzilla.suse.com/1224662" source="BUGZILLA"/>
		<reference ref_id="1224670" ref_url="https://bugzilla.suse.com/1224670" source="BUGZILLA"/>
		<reference ref_id="1224671" ref_url="https://bugzilla.suse.com/1224671" source="BUGZILLA"/>
		<reference ref_id="1224674" ref_url="https://bugzilla.suse.com/1224674" source="BUGZILLA"/>
		<reference ref_id="1224677" ref_url="https://bugzilla.suse.com/1224677" source="BUGZILLA"/>
		<reference ref_id="1224679" ref_url="https://bugzilla.suse.com/1224679" source="BUGZILLA"/>
		<reference ref_id="1224683" ref_url="https://bugzilla.suse.com/1224683" source="BUGZILLA"/>
		<reference ref_id="1224694" ref_url="https://bugzilla.suse.com/1224694" source="BUGZILLA"/>
		<reference ref_id="1224696" ref_url="https://bugzilla.suse.com/1224696" source="BUGZILLA"/>
		<reference ref_id="1224700" ref_url="https://bugzilla.suse.com/1224700" source="BUGZILLA"/>
		<reference ref_id="1224703" ref_url="https://bugzilla.suse.com/1224703" source="BUGZILLA"/>
		<reference ref_id="1224712" ref_url="https://bugzilla.suse.com/1224712" source="BUGZILLA"/>
		<reference ref_id="1224716" ref_url="https://bugzilla.suse.com/1224716" source="BUGZILLA"/>
		<reference ref_id="1224719" ref_url="https://bugzilla.suse.com/1224719" source="BUGZILLA"/>
		<reference ref_id="1224735" ref_url="https://bugzilla.suse.com/1224735" source="BUGZILLA"/>
		<reference ref_id="1224743" ref_url="https://bugzilla.suse.com/1224743" source="BUGZILLA"/>
		<reference ref_id="1224749" ref_url="https://bugzilla.suse.com/1224749" source="BUGZILLA"/>
		<reference ref_id="1224764" ref_url="https://bugzilla.suse.com/1224764" source="BUGZILLA"/>
		<reference ref_id="1224765" ref_url="https://bugzilla.suse.com/1224765" source="BUGZILLA"/>
		<reference ref_id="1224766" ref_url="https://bugzilla.suse.com/1224766" source="BUGZILLA"/>
		<reference ref_id="1224935" ref_url="https://bugzilla.suse.com/1224935" source="BUGZILLA"/>
		<reference ref_id="1224946" ref_url="https://bugzilla.suse.com/1224946" source="BUGZILLA"/>
		<reference ref_id="1224951" ref_url="https://bugzilla.suse.com/1224951" source="BUGZILLA"/>
		<reference ref_id="1225050" ref_url="https://bugzilla.suse.com/1225050" source="BUGZILLA"/>
		<reference ref_id="1225088" ref_url="https://bugzilla.suse.com/1225088" source="BUGZILLA"/>
		<reference ref_id="1225098" ref_url="https://bugzilla.suse.com/1225098" source="BUGZILLA"/>
		<reference ref_id="1225105" ref_url="https://bugzilla.suse.com/1225105" source="BUGZILLA"/>
		<reference ref_id="1225272" ref_url="https://bugzilla.suse.com/1225272" source="BUGZILLA"/>
		<reference ref_id="1225300" ref_url="https://bugzilla.suse.com/1225300" source="BUGZILLA"/>
		<reference ref_id="1225389" ref_url="https://bugzilla.suse.com/1225389" source="BUGZILLA"/>
		<reference ref_id="1225391" ref_url="https://bugzilla.suse.com/1225391" source="BUGZILLA"/>
		<reference ref_id="1225419" ref_url="https://bugzilla.suse.com/1225419" source="BUGZILLA"/>
		<reference ref_id="1225426" ref_url="https://bugzilla.suse.com/1225426" source="BUGZILLA"/>
		<reference ref_id="1225448" ref_url="https://bugzilla.suse.com/1225448" source="BUGZILLA"/>
		<reference ref_id="1225452" ref_url="https://bugzilla.suse.com/1225452" source="BUGZILLA"/>
		<reference ref_id="1225467" ref_url="https://bugzilla.suse.com/1225467" source="BUGZILLA"/>
		<reference ref_id="1225475" ref_url="https://bugzilla.suse.com/1225475" source="BUGZILLA"/>
		<reference ref_id="1225484" ref_url="https://bugzilla.suse.com/1225484" source="BUGZILLA"/>
		<reference ref_id="1225487" ref_url="https://bugzilla.suse.com/1225487" source="BUGZILLA"/>
		<reference ref_id="1225489" ref_url="https://bugzilla.suse.com/1225489" source="BUGZILLA"/>
		<reference ref_id="1225504" ref_url="https://bugzilla.suse.com/1225504" source="BUGZILLA"/>
		<reference ref_id="1225505" ref_url="https://bugzilla.suse.com/1225505" source="BUGZILLA"/>
		<reference ref_id="1225514" ref_url="https://bugzilla.suse.com/1225514" source="BUGZILLA"/>
		<reference ref_id="1225518" ref_url="https://bugzilla.suse.com/1225518" source="BUGZILLA"/>
		<reference ref_id="1225535" ref_url="https://bugzilla.suse.com/1225535" source="BUGZILLA"/>
		<reference ref_id="1225564" ref_url="https://bugzilla.suse.com/1225564" source="BUGZILLA"/>
		<reference ref_id="1225573" ref_url="https://bugzilla.suse.com/1225573" source="BUGZILLA"/>
		<reference ref_id="1225581" ref_url="https://bugzilla.suse.com/1225581" source="BUGZILLA"/>
		<reference ref_id="1225585" ref_url="https://bugzilla.suse.com/1225585" source="BUGZILLA"/>
		<reference ref_id="1225586" ref_url="https://bugzilla.suse.com/1225586" source="BUGZILLA"/>
		<reference ref_id="1225602" ref_url="https://bugzilla.suse.com/1225602" source="BUGZILLA"/>
		<reference ref_id="1225611" ref_url="https://bugzilla.suse.com/1225611" source="BUGZILLA"/>
		<reference ref_id="1225681" ref_url="https://bugzilla.suse.com/1225681" source="BUGZILLA"/>
		<reference ref_id="1225692" ref_url="https://bugzilla.suse.com/1225692" source="BUGZILLA"/>
		<reference ref_id="1225698" ref_url="https://bugzilla.suse.com/1225698" source="BUGZILLA"/>
		<reference ref_id="1225699" ref_url="https://bugzilla.suse.com/1225699" source="BUGZILLA"/>
		<reference ref_id="1225704" ref_url="https://bugzilla.suse.com/1225704" source="BUGZILLA"/>
		<reference ref_id="1225711" ref_url="https://bugzilla.suse.com/1225711" source="BUGZILLA"/>
		<reference ref_id="1225714" ref_url="https://bugzilla.suse.com/1225714" source="BUGZILLA"/>
		<reference ref_id="1225717" ref_url="https://bugzilla.suse.com/1225717" source="BUGZILLA"/>
		<reference ref_id="1225719" ref_url="https://bugzilla.suse.com/1225719" source="BUGZILLA"/>
		<reference ref_id="1225726" ref_url="https://bugzilla.suse.com/1225726" source="BUGZILLA"/>
		<reference ref_id="1225732" ref_url="https://bugzilla.suse.com/1225732" source="BUGZILLA"/>
		<reference ref_id="1225737" ref_url="https://bugzilla.suse.com/1225737" source="BUGZILLA"/>
		<reference ref_id="1225744" ref_url="https://bugzilla.suse.com/1225744" source="BUGZILLA"/>
		<reference ref_id="1225745" ref_url="https://bugzilla.suse.com/1225745" source="BUGZILLA"/>
		<reference ref_id="1225746" ref_url="https://bugzilla.suse.com/1225746" source="BUGZILLA"/>
		<reference ref_id="1225749" ref_url="https://bugzilla.suse.com/1225749" source="BUGZILLA"/>
		<reference ref_id="1225752" ref_url="https://bugzilla.suse.com/1225752" source="BUGZILLA"/>
		<reference ref_id="1225753" ref_url="https://bugzilla.suse.com/1225753" source="BUGZILLA"/>
		<reference ref_id="1225757" ref_url="https://bugzilla.suse.com/1225757" source="BUGZILLA"/>
		<reference ref_id="1225758" ref_url="https://bugzilla.suse.com/1225758" source="BUGZILLA"/>
		<reference ref_id="1225759" ref_url="https://bugzilla.suse.com/1225759" source="BUGZILLA"/>
		<reference ref_id="1225760" ref_url="https://bugzilla.suse.com/1225760" source="BUGZILLA"/>
		<reference ref_id="1225767" ref_url="https://bugzilla.suse.com/1225767" source="BUGZILLA"/>
		<reference ref_id="1225770" ref_url="https://bugzilla.suse.com/1225770" source="BUGZILLA"/>
		<reference ref_id="1225815" ref_url="https://bugzilla.suse.com/1225815" source="BUGZILLA"/>
		<reference ref_id="1225823" ref_url="https://bugzilla.suse.com/1225823" source="BUGZILLA"/>
		<reference ref_id="1225834" ref_url="https://bugzilla.suse.com/1225834" source="BUGZILLA"/>
		<reference ref_id="1225838" ref_url="https://bugzilla.suse.com/1225838" source="BUGZILLA"/>
		<reference ref_id="1225840" ref_url="https://bugzilla.suse.com/1225840" source="BUGZILLA"/>
		<reference ref_id="1225851" ref_url="https://bugzilla.suse.com/1225851" source="BUGZILLA"/>
		<reference ref_id="1225866" ref_url="https://bugzilla.suse.com/1225866" source="BUGZILLA"/>
		<reference ref_id="1225872" ref_url="https://bugzilla.suse.com/1225872" source="BUGZILLA"/>
		<reference ref_id="1225894" ref_url="https://bugzilla.suse.com/1225894" source="BUGZILLA"/>
		<reference ref_id="1225903" ref_url="https://bugzilla.suse.com/1225903" source="BUGZILLA"/>
		<reference ref_id="1226022" ref_url="https://bugzilla.suse.com/1226022" source="BUGZILLA"/>
		<reference ref_id="1226131" ref_url="https://bugzilla.suse.com/1226131" source="BUGZILLA"/>
		<reference ref_id="1226145" ref_url="https://bugzilla.suse.com/1226145" source="BUGZILLA"/>
		<reference ref_id="1226149" ref_url="https://bugzilla.suse.com/1226149" source="BUGZILLA"/>
		<reference ref_id="1226155" ref_url="https://bugzilla.suse.com/1226155" source="BUGZILLA"/>
		<reference ref_id="1226202" ref_url="https://bugzilla.suse.com/1226202" source="BUGZILLA"/>
		<reference ref_id="1226211" ref_url="https://bugzilla.suse.com/1226211" source="BUGZILLA"/>
		<reference ref_id="1226212" ref_url="https://bugzilla.suse.com/1226212" source="BUGZILLA"/>
		<reference ref_id="1226226" ref_url="https://bugzilla.suse.com/1226226" source="BUGZILLA"/>
		<reference ref_id="1226502" ref_url="https://bugzilla.suse.com/1226502" source="BUGZILLA"/>
		<reference ref_id="1226514" ref_url="https://bugzilla.suse.com/1226514" source="BUGZILLA"/>
		<reference ref_id="1226519" ref_url="https://bugzilla.suse.com/1226519" source="BUGZILLA"/>
		<reference ref_id="1226520" ref_url="https://bugzilla.suse.com/1226520" source="BUGZILLA"/>
		<reference ref_id="1226537" ref_url="https://bugzilla.suse.com/1226537" source="BUGZILLA"/>
		<reference ref_id="1226538" ref_url="https://bugzilla.suse.com/1226538" source="BUGZILLA"/>
		<reference ref_id="1226539" ref_url="https://bugzilla.suse.com/1226539" source="BUGZILLA"/>
		<reference ref_id="1226550" ref_url="https://bugzilla.suse.com/1226550" source="BUGZILLA"/>
		<reference ref_id="1226551" ref_url="https://bugzilla.suse.com/1226551" source="BUGZILLA"/>
		<reference ref_id="1226552" ref_url="https://bugzilla.suse.com/1226552" source="BUGZILLA"/>
		<reference ref_id="1226553" ref_url="https://bugzilla.suse.com/1226553" source="BUGZILLA"/>
		<reference ref_id="1226554" ref_url="https://bugzilla.suse.com/1226554" source="BUGZILLA"/>
		<reference ref_id="1226555" ref_url="https://bugzilla.suse.com/1226555" source="BUGZILLA"/>
		<reference ref_id="1226556" ref_url="https://bugzilla.suse.com/1226556" source="BUGZILLA"/>
		<reference ref_id="1226557" ref_url="https://bugzilla.suse.com/1226557" source="BUGZILLA"/>
		<reference ref_id="1226558" ref_url="https://bugzilla.suse.com/1226558" source="BUGZILLA"/>
		<reference ref_id="1226559" ref_url="https://bugzilla.suse.com/1226559" source="BUGZILLA"/>
		<reference ref_id="1226561" ref_url="https://bugzilla.suse.com/1226561" source="BUGZILLA"/>
		<reference ref_id="1226562" ref_url="https://bugzilla.suse.com/1226562" source="BUGZILLA"/>
		<reference ref_id="1226563" ref_url="https://bugzilla.suse.com/1226563" source="BUGZILLA"/>
		<reference ref_id="1226564" ref_url="https://bugzilla.suse.com/1226564" source="BUGZILLA"/>
		<reference ref_id="1226565" ref_url="https://bugzilla.suse.com/1226565" source="BUGZILLA"/>
		<reference ref_id="1226566" ref_url="https://bugzilla.suse.com/1226566" source="BUGZILLA"/>
		<reference ref_id="1226567" ref_url="https://bugzilla.suse.com/1226567" source="BUGZILLA"/>
		<reference ref_id="1226568" ref_url="https://bugzilla.suse.com/1226568" source="BUGZILLA"/>
		<reference ref_id="1226569" ref_url="https://bugzilla.suse.com/1226569" source="BUGZILLA"/>
		<reference ref_id="1226570" ref_url="https://bugzilla.suse.com/1226570" source="BUGZILLA"/>
		<reference ref_id="1226571" ref_url="https://bugzilla.suse.com/1226571" source="BUGZILLA"/>
		<reference ref_id="1226572" ref_url="https://bugzilla.suse.com/1226572" source="BUGZILLA"/>
		<reference ref_id="1226574" ref_url="https://bugzilla.suse.com/1226574" source="BUGZILLA"/>
		<reference ref_id="1226575" ref_url="https://bugzilla.suse.com/1226575" source="BUGZILLA"/>
		<reference ref_id="1226576" ref_url="https://bugzilla.suse.com/1226576" source="BUGZILLA"/>
		<reference ref_id="1226577" ref_url="https://bugzilla.suse.com/1226577" source="BUGZILLA"/>
		<reference ref_id="1226579" ref_url="https://bugzilla.suse.com/1226579" source="BUGZILLA"/>
		<reference ref_id="1226580" ref_url="https://bugzilla.suse.com/1226580" source="BUGZILLA"/>
		<reference ref_id="1226581" ref_url="https://bugzilla.suse.com/1226581" source="BUGZILLA"/>
		<reference ref_id="1226582" ref_url="https://bugzilla.suse.com/1226582" source="BUGZILLA"/>
		<reference ref_id="1226583" ref_url="https://bugzilla.suse.com/1226583" source="BUGZILLA"/>
		<reference ref_id="1226585" ref_url="https://bugzilla.suse.com/1226585" source="BUGZILLA"/>
		<reference ref_id="1226587" ref_url="https://bugzilla.suse.com/1226587" source="BUGZILLA"/>
		<reference ref_id="1226588" ref_url="https://bugzilla.suse.com/1226588" source="BUGZILLA"/>
		<reference ref_id="1226593" ref_url="https://bugzilla.suse.com/1226593" source="BUGZILLA"/>
		<reference ref_id="1226595" ref_url="https://bugzilla.suse.com/1226595" source="BUGZILLA"/>
		<reference ref_id="1226597" ref_url="https://bugzilla.suse.com/1226597" source="BUGZILLA"/>
		<reference ref_id="1226601" ref_url="https://bugzilla.suse.com/1226601" source="BUGZILLA"/>
		<reference ref_id="1226602" ref_url="https://bugzilla.suse.com/1226602" source="BUGZILLA"/>
		<reference ref_id="1226603" ref_url="https://bugzilla.suse.com/1226603" source="BUGZILLA"/>
		<reference ref_id="1226607" ref_url="https://bugzilla.suse.com/1226607" source="BUGZILLA"/>
		<reference ref_id="1226610" ref_url="https://bugzilla.suse.com/1226610" source="BUGZILLA"/>
		<reference ref_id="1226614" ref_url="https://bugzilla.suse.com/1226614" source="BUGZILLA"/>
		<reference ref_id="1226616" ref_url="https://bugzilla.suse.com/1226616" source="BUGZILLA"/>
		<reference ref_id="1226617" ref_url="https://bugzilla.suse.com/1226617" source="BUGZILLA"/>
		<reference ref_id="1226618" ref_url="https://bugzilla.suse.com/1226618" source="BUGZILLA"/>
		<reference ref_id="1226619" ref_url="https://bugzilla.suse.com/1226619" source="BUGZILLA"/>
		<reference ref_id="1226621" ref_url="https://bugzilla.suse.com/1226621" source="BUGZILLA"/>
		<reference ref_id="1226622" ref_url="https://bugzilla.suse.com/1226622" source="BUGZILLA"/>
		<reference ref_id="1226624" ref_url="https://bugzilla.suse.com/1226624" source="BUGZILLA"/>
		<reference ref_id="1226626" ref_url="https://bugzilla.suse.com/1226626" source="BUGZILLA"/>
		<reference ref_id="1226628" ref_url="https://bugzilla.suse.com/1226628" source="BUGZILLA"/>
		<reference ref_id="1226629" ref_url="https://bugzilla.suse.com/1226629" source="BUGZILLA"/>
		<reference ref_id="1226632" ref_url="https://bugzilla.suse.com/1226632" source="BUGZILLA"/>
		<reference ref_id="1226633" ref_url="https://bugzilla.suse.com/1226633" source="BUGZILLA"/>
		<reference ref_id="1226634" ref_url="https://bugzilla.suse.com/1226634" source="BUGZILLA"/>
		<reference ref_id="1226637" ref_url="https://bugzilla.suse.com/1226637" source="BUGZILLA"/>
		<reference ref_id="1226643" ref_url="https://bugzilla.suse.com/1226643" source="BUGZILLA"/>
		<reference ref_id="1226644" ref_url="https://bugzilla.suse.com/1226644" source="BUGZILLA"/>
		<reference ref_id="1226645" ref_url="https://bugzilla.suse.com/1226645" source="BUGZILLA"/>
		<reference ref_id="1226647" ref_url="https://bugzilla.suse.com/1226647" source="BUGZILLA"/>
		<reference ref_id="1226650" ref_url="https://bugzilla.suse.com/1226650" source="BUGZILLA"/>
		<reference ref_id="1226653" ref_url="https://bugzilla.suse.com/1226653" source="BUGZILLA"/>
		<reference ref_id="1226657" ref_url="https://bugzilla.suse.com/1226657" source="BUGZILLA"/>
		<reference ref_id="1226658" ref_url="https://bugzilla.suse.com/1226658" source="BUGZILLA"/>
		<reference ref_id="1226669" ref_url="https://bugzilla.suse.com/1226669" source="BUGZILLA"/>
		<reference ref_id="1226670" ref_url="https://bugzilla.suse.com/1226670" source="BUGZILLA"/>
		<reference ref_id="1226672" ref_url="https://bugzilla.suse.com/1226672" source="BUGZILLA"/>
		<reference ref_id="1226673" ref_url="https://bugzilla.suse.com/1226673" source="BUGZILLA"/>
		<reference ref_id="1226674" ref_url="https://bugzilla.suse.com/1226674" source="BUGZILLA"/>
		<reference ref_id="1226675" ref_url="https://bugzilla.suse.com/1226675" source="BUGZILLA"/>
		<reference ref_id="1226678" ref_url="https://bugzilla.suse.com/1226678" source="BUGZILLA"/>
		<reference ref_id="1226679" ref_url="https://bugzilla.suse.com/1226679" source="BUGZILLA"/>
		<reference ref_id="1226683" ref_url="https://bugzilla.suse.com/1226683" source="BUGZILLA"/>
		<reference ref_id="1226685" ref_url="https://bugzilla.suse.com/1226685" source="BUGZILLA"/>
		<reference ref_id="1226686" ref_url="https://bugzilla.suse.com/1226686" source="BUGZILLA"/>
		<reference ref_id="1226690" ref_url="https://bugzilla.suse.com/1226690" source="BUGZILLA"/>
		<reference ref_id="1226691" ref_url="https://bugzilla.suse.com/1226691" source="BUGZILLA"/>
		<reference ref_id="1226692" ref_url="https://bugzilla.suse.com/1226692" source="BUGZILLA"/>
		<reference ref_id="1226693" ref_url="https://bugzilla.suse.com/1226693" source="BUGZILLA"/>
		<reference ref_id="1226696" ref_url="https://bugzilla.suse.com/1226696" source="BUGZILLA"/>
		<reference ref_id="1226697" ref_url="https://bugzilla.suse.com/1226697" source="BUGZILLA"/>
		<reference ref_id="1226698" ref_url="https://bugzilla.suse.com/1226698" source="BUGZILLA"/>
		<reference ref_id="1226699" ref_url="https://bugzilla.suse.com/1226699" source="BUGZILLA"/>
		<reference ref_id="1226701" ref_url="https://bugzilla.suse.com/1226701" source="BUGZILLA"/>
		<reference ref_id="1226702" ref_url="https://bugzilla.suse.com/1226702" source="BUGZILLA"/>
		<reference ref_id="1226703" ref_url="https://bugzilla.suse.com/1226703" source="BUGZILLA"/>
		<reference ref_id="1226704" ref_url="https://bugzilla.suse.com/1226704" source="BUGZILLA"/>
		<reference ref_id="1226705" ref_url="https://bugzilla.suse.com/1226705" source="BUGZILLA"/>
		<reference ref_id="1226706" ref_url="https://bugzilla.suse.com/1226706" source="BUGZILLA"/>
		<reference ref_id="1226708" ref_url="https://bugzilla.suse.com/1226708" source="BUGZILLA"/>
		<reference ref_id="1226709" ref_url="https://bugzilla.suse.com/1226709" source="BUGZILLA"/>
		<reference ref_id="1226710" ref_url="https://bugzilla.suse.com/1226710" source="BUGZILLA"/>
		<reference ref_id="1226711" ref_url="https://bugzilla.suse.com/1226711" source="BUGZILLA"/>
		<reference ref_id="1226712" ref_url="https://bugzilla.suse.com/1226712" source="BUGZILLA"/>
		<reference ref_id="1226713" ref_url="https://bugzilla.suse.com/1226713" source="BUGZILLA"/>
		<reference ref_id="1226715" ref_url="https://bugzilla.suse.com/1226715" source="BUGZILLA"/>
		<reference ref_id="1226716" ref_url="https://bugzilla.suse.com/1226716" source="BUGZILLA"/>
		<reference ref_id="1226718" ref_url="https://bugzilla.suse.com/1226718" source="BUGZILLA"/>
		<reference ref_id="1226719" ref_url="https://bugzilla.suse.com/1226719" source="BUGZILLA"/>
		<reference ref_id="1226720" ref_url="https://bugzilla.suse.com/1226720" source="BUGZILLA"/>
		<reference ref_id="1226721" ref_url="https://bugzilla.suse.com/1226721" source="BUGZILLA"/>
		<reference ref_id="1226730" ref_url="https://bugzilla.suse.com/1226730" source="BUGZILLA"/>
		<reference ref_id="1226732" ref_url="https://bugzilla.suse.com/1226732" source="BUGZILLA"/>
		<reference ref_id="1226734" ref_url="https://bugzilla.suse.com/1226734" source="BUGZILLA"/>
		<reference ref_id="1226735" ref_url="https://bugzilla.suse.com/1226735" source="BUGZILLA"/>
		<reference ref_id="1226737" ref_url="https://bugzilla.suse.com/1226737" source="BUGZILLA"/>
		<reference ref_id="1226738" ref_url="https://bugzilla.suse.com/1226738" source="BUGZILLA"/>
		<reference ref_id="1226739" ref_url="https://bugzilla.suse.com/1226739" source="BUGZILLA"/>
		<reference ref_id="1226740" ref_url="https://bugzilla.suse.com/1226740" source="BUGZILLA"/>
		<reference ref_id="1226744" ref_url="https://bugzilla.suse.com/1226744" source="BUGZILLA"/>
		<reference ref_id="1226746" ref_url="https://bugzilla.suse.com/1226746" source="BUGZILLA"/>
		<reference ref_id="1226747" ref_url="https://bugzilla.suse.com/1226747" source="BUGZILLA"/>
		<reference ref_id="1226749" ref_url="https://bugzilla.suse.com/1226749" source="BUGZILLA"/>
		<reference ref_id="1226750" ref_url="https://bugzilla.suse.com/1226750" source="BUGZILLA"/>
		<reference ref_id="1226754" ref_url="https://bugzilla.suse.com/1226754" source="BUGZILLA"/>
		<reference ref_id="1226757" ref_url="https://bugzilla.suse.com/1226757" source="BUGZILLA"/>
		<reference ref_id="1226762" ref_url="https://bugzilla.suse.com/1226762" source="BUGZILLA"/>
		<reference ref_id="1226764" ref_url="https://bugzilla.suse.com/1226764" source="BUGZILLA"/>
		<reference ref_id="1226767" ref_url="https://bugzilla.suse.com/1226767" source="BUGZILLA"/>
		<reference ref_id="1226768" ref_url="https://bugzilla.suse.com/1226768" source="BUGZILLA"/>
		<reference ref_id="1226769" ref_url="https://bugzilla.suse.com/1226769" source="BUGZILLA"/>
		<reference ref_id="1226771" ref_url="https://bugzilla.suse.com/1226771" source="BUGZILLA"/>
		<reference ref_id="1226774" ref_url="https://bugzilla.suse.com/1226774" source="BUGZILLA"/>
		<reference ref_id="1226775" ref_url="https://bugzilla.suse.com/1226775" source="BUGZILLA"/>
		<reference ref_id="1226777" ref_url="https://bugzilla.suse.com/1226777" source="BUGZILLA"/>
		<reference ref_id="1226780" ref_url="https://bugzilla.suse.com/1226780" source="BUGZILLA"/>
		<reference ref_id="1226781" ref_url="https://bugzilla.suse.com/1226781" source="BUGZILLA"/>
		<reference ref_id="1226783" ref_url="https://bugzilla.suse.com/1226783" source="BUGZILLA"/>
		<reference ref_id="1226785" ref_url="https://bugzilla.suse.com/1226785" source="BUGZILLA"/>
		<reference ref_id="1226786" ref_url="https://bugzilla.suse.com/1226786" source="BUGZILLA"/>
		<reference ref_id="1226789" ref_url="https://bugzilla.suse.com/1226789" source="BUGZILLA"/>
		<reference ref_id="1226791" ref_url="https://bugzilla.suse.com/1226791" source="BUGZILLA"/>
		<reference ref_id="1226834" ref_url="https://bugzilla.suse.com/1226834" source="BUGZILLA"/>
		<reference ref_id="1226837" ref_url="https://bugzilla.suse.com/1226837" source="BUGZILLA"/>
		<reference ref_id="1226839" ref_url="https://bugzilla.suse.com/1226839" source="BUGZILLA"/>
		<reference ref_id="1226840" ref_url="https://bugzilla.suse.com/1226840" source="BUGZILLA"/>
		<reference ref_id="1226841" ref_url="https://bugzilla.suse.com/1226841" source="BUGZILLA"/>
		<reference ref_id="1226842" ref_url="https://bugzilla.suse.com/1226842" source="BUGZILLA"/>
		<reference ref_id="1226848" ref_url="https://bugzilla.suse.com/1226848" source="BUGZILLA"/>
		<reference ref_id="1226852" ref_url="https://bugzilla.suse.com/1226852" source="BUGZILLA"/>
		<reference ref_id="1226857" ref_url="https://bugzilla.suse.com/1226857" source="BUGZILLA"/>
		<reference ref_id="1226861" ref_url="https://bugzilla.suse.com/1226861" source="BUGZILLA"/>
		<reference ref_id="1226863" ref_url="https://bugzilla.suse.com/1226863" source="BUGZILLA"/>
		<reference ref_id="1226864" ref_url="https://bugzilla.suse.com/1226864" source="BUGZILLA"/>
		<reference ref_id="1226867" ref_url="https://bugzilla.suse.com/1226867" source="BUGZILLA"/>
		<reference ref_id="1226868" ref_url="https://bugzilla.suse.com/1226868" source="BUGZILLA"/>
		<reference ref_id="1226876" ref_url="https://bugzilla.suse.com/1226876" source="BUGZILLA"/>
		<reference ref_id="1226878" ref_url="https://bugzilla.suse.com/1226878" source="BUGZILLA"/>
		<reference ref_id="1226883" ref_url="https://bugzilla.suse.com/1226883" source="BUGZILLA"/>
		<reference ref_id="1226886" ref_url="https://bugzilla.suse.com/1226886" source="BUGZILLA"/>
		<reference ref_id="1226890" ref_url="https://bugzilla.suse.com/1226890" source="BUGZILLA"/>
		<reference ref_id="1226891" ref_url="https://bugzilla.suse.com/1226891" source="BUGZILLA"/>
		<reference ref_id="1226895" ref_url="https://bugzilla.suse.com/1226895" source="BUGZILLA"/>
		<reference ref_id="1226908" ref_url="https://bugzilla.suse.com/1226908" source="BUGZILLA"/>
		<reference ref_id="1226911" ref_url="https://bugzilla.suse.com/1226911" source="BUGZILLA"/>
		<reference ref_id="1226915" ref_url="https://bugzilla.suse.com/1226915" source="BUGZILLA"/>
		<reference ref_id="1226928" ref_url="https://bugzilla.suse.com/1226928" source="BUGZILLA"/>
		<reference ref_id="1226948" ref_url="https://bugzilla.suse.com/1226948" source="BUGZILLA"/>
		<reference ref_id="1226949" ref_url="https://bugzilla.suse.com/1226949" source="BUGZILLA"/>
		<reference ref_id="1226950" ref_url="https://bugzilla.suse.com/1226950" source="BUGZILLA"/>
		<reference ref_id="1226953" ref_url="https://bugzilla.suse.com/1226953" source="BUGZILLA"/>
		<reference ref_id="1226962" ref_url="https://bugzilla.suse.com/1226962" source="BUGZILLA"/>
		<reference ref_id="1226976" ref_url="https://bugzilla.suse.com/1226976" source="BUGZILLA"/>
		<reference ref_id="1226990" ref_url="https://bugzilla.suse.com/1226990" source="BUGZILLA"/>
		<reference ref_id="1226992" ref_url="https://bugzilla.suse.com/1226992" source="BUGZILLA"/>
		<reference ref_id="1226993" ref_url="https://bugzilla.suse.com/1226993" source="BUGZILLA"/>
		<reference ref_id="1226994" ref_url="https://bugzilla.suse.com/1226994" source="BUGZILLA"/>
		<reference ref_id="1226996" ref_url="https://bugzilla.suse.com/1226996" source="BUGZILLA"/>
		<reference ref_id="1227066" ref_url="https://bugzilla.suse.com/1227066" source="BUGZILLA"/>
		<reference ref_id="1227090" ref_url="https://bugzilla.suse.com/1227090" source="BUGZILLA"/>
		<reference ref_id="1227096" ref_url="https://bugzilla.suse.com/1227096" source="BUGZILLA"/>
		<reference ref_id="1227101" ref_url="https://bugzilla.suse.com/1227101" source="BUGZILLA"/>
		<reference ref_id="1227103" ref_url="https://bugzilla.suse.com/1227103" source="BUGZILLA"/>
		<reference ref_id="1227121" ref_url="https://bugzilla.suse.com/1227121" source="BUGZILLA"/>
		<reference ref_id="1227157" ref_url="https://bugzilla.suse.com/1227157" source="BUGZILLA"/>
		<reference ref_id="1227162" ref_url="https://bugzilla.suse.com/1227162" source="BUGZILLA"/>
		<reference ref_id="1227274" ref_url="https://bugzilla.suse.com/1227274" source="BUGZILLA"/>
		<reference ref_id="1227362" ref_url="https://bugzilla.suse.com/1227362" source="BUGZILLA"/>
		<reference ref_id="1227383" ref_url="https://bugzilla.suse.com/1227383" source="BUGZILLA"/>
		<reference ref_id="1227432" ref_url="https://bugzilla.suse.com/1227432" source="BUGZILLA"/>
		<reference ref_id="1227435" ref_url="https://bugzilla.suse.com/1227435" source="BUGZILLA"/>
		<reference ref_id="1227447" ref_url="https://bugzilla.suse.com/1227447" source="BUGZILLA"/>
		<reference ref_id="1227487" ref_url="https://bugzilla.suse.com/1227487" source="BUGZILLA"/>
		<reference ref_id="1227573" ref_url="https://bugzilla.suse.com/1227573" source="BUGZILLA"/>
		<reference ref_id="1227618" ref_url="https://bugzilla.suse.com/1227618" source="BUGZILLA"/>
		<reference ref_id="1227620" ref_url="https://bugzilla.suse.com/1227620" source="BUGZILLA"/>
		<reference ref_id="1227626" ref_url="https://bugzilla.suse.com/1227626" source="BUGZILLA"/>
		<reference ref_id="1227635" ref_url="https://bugzilla.suse.com/1227635" source="BUGZILLA"/>
		<reference ref_id="1227661" ref_url="https://bugzilla.suse.com/1227661" source="BUGZILLA"/>
		<reference ref_id="1227716" ref_url="https://bugzilla.suse.com/1227716" source="BUGZILLA"/>
		<reference ref_id="1227722" ref_url="https://bugzilla.suse.com/1227722" source="BUGZILLA"/>
		<reference ref_id="1227724" ref_url="https://bugzilla.suse.com/1227724" source="BUGZILLA"/>
		<reference ref_id="1227725" ref_url="https://bugzilla.suse.com/1227725" source="BUGZILLA"/>
		<reference ref_id="1227728" ref_url="https://bugzilla.suse.com/1227728" source="BUGZILLA"/>
		<reference ref_id="1227729" ref_url="https://bugzilla.suse.com/1227729" source="BUGZILLA"/>
		<reference ref_id="1227730" ref_url="https://bugzilla.suse.com/1227730" source="BUGZILLA"/>
		<reference ref_id="1227732" ref_url="https://bugzilla.suse.com/1227732" source="BUGZILLA"/>
		<reference ref_id="1227733" ref_url="https://bugzilla.suse.com/1227733" source="BUGZILLA"/>
		<reference ref_id="1227750" ref_url="https://bugzilla.suse.com/1227750" source="BUGZILLA"/>
		<reference ref_id="1227754" ref_url="https://bugzilla.suse.com/1227754" source="BUGZILLA"/>
		<reference ref_id="1227755" ref_url="https://bugzilla.suse.com/1227755" source="BUGZILLA"/>
		<reference ref_id="1227760" ref_url="https://bugzilla.suse.com/1227760" source="BUGZILLA"/>
		<reference ref_id="1227762" ref_url="https://bugzilla.suse.com/1227762" source="BUGZILLA"/>
		<reference ref_id="1227763" ref_url="https://bugzilla.suse.com/1227763" source="BUGZILLA"/>
		<reference ref_id="1227764" ref_url="https://bugzilla.suse.com/1227764" source="BUGZILLA"/>
		<reference ref_id="1227766" ref_url="https://bugzilla.suse.com/1227766" source="BUGZILLA"/>
		<reference ref_id="1227770" ref_url="https://bugzilla.suse.com/1227770" source="BUGZILLA"/>
		<reference ref_id="1227771" ref_url="https://bugzilla.suse.com/1227771" source="BUGZILLA"/>
		<reference ref_id="1227772" ref_url="https://bugzilla.suse.com/1227772" source="BUGZILLA"/>
		<reference ref_id="1227774" ref_url="https://bugzilla.suse.com/1227774" source="BUGZILLA"/>
		<reference ref_id="1227779" ref_url="https://bugzilla.suse.com/1227779" source="BUGZILLA"/>
		<reference ref_id="1227780" ref_url="https://bugzilla.suse.com/1227780" source="BUGZILLA"/>
		<reference ref_id="1227783" ref_url="https://bugzilla.suse.com/1227783" source="BUGZILLA"/>
		<reference ref_id="1227786" ref_url="https://bugzilla.suse.com/1227786" source="BUGZILLA"/>
		<reference ref_id="1227787" ref_url="https://bugzilla.suse.com/1227787" source="BUGZILLA"/>
		<reference ref_id="1227790" ref_url="https://bugzilla.suse.com/1227790" source="BUGZILLA"/>
		<reference ref_id="1227792" ref_url="https://bugzilla.suse.com/1227792" source="BUGZILLA"/>
		<reference ref_id="1227796" ref_url="https://bugzilla.suse.com/1227796" source="BUGZILLA"/>
		<reference ref_id="1227797" ref_url="https://bugzilla.suse.com/1227797" source="BUGZILLA"/>
		<reference ref_id="1227798" ref_url="https://bugzilla.suse.com/1227798" source="BUGZILLA"/>
		<reference ref_id="1227800" ref_url="https://bugzilla.suse.com/1227800" source="BUGZILLA"/>
		<reference ref_id="1227802" ref_url="https://bugzilla.suse.com/1227802" source="BUGZILLA"/>
		<reference ref_id="1227806" ref_url="https://bugzilla.suse.com/1227806" source="BUGZILLA"/>
		<reference ref_id="1227808" ref_url="https://bugzilla.suse.com/1227808" source="BUGZILLA"/>
		<reference ref_id="1227810" ref_url="https://bugzilla.suse.com/1227810" source="BUGZILLA"/>
		<reference ref_id="1227812" ref_url="https://bugzilla.suse.com/1227812" source="BUGZILLA"/>
		<reference ref_id="1227813" ref_url="https://bugzilla.suse.com/1227813" source="BUGZILLA"/>
		<reference ref_id="1227814" ref_url="https://bugzilla.suse.com/1227814" source="BUGZILLA"/>
		<reference ref_id="1227816" ref_url="https://bugzilla.suse.com/1227816" source="BUGZILLA"/>
		<reference ref_id="1227820" ref_url="https://bugzilla.suse.com/1227820" source="BUGZILLA"/>
		<reference ref_id="1227823" ref_url="https://bugzilla.suse.com/1227823" source="BUGZILLA"/>
		<reference ref_id="1227824" ref_url="https://bugzilla.suse.com/1227824" source="BUGZILLA"/>
		<reference ref_id="1227828" ref_url="https://bugzilla.suse.com/1227828" source="BUGZILLA"/>
		<reference ref_id="1227829" ref_url="https://bugzilla.suse.com/1227829" source="BUGZILLA"/>
		<reference ref_id="1227836" ref_url="https://bugzilla.suse.com/1227836" source="BUGZILLA"/>
		<reference ref_id="1227846" ref_url="https://bugzilla.suse.com/1227846" source="BUGZILLA"/>
		<reference ref_id="1227849" ref_url="https://bugzilla.suse.com/1227849" source="BUGZILLA"/>
		<reference ref_id="1227851" ref_url="https://bugzilla.suse.com/1227851" source="BUGZILLA"/>
		<reference ref_id="1227862" ref_url="https://bugzilla.suse.com/1227862" source="BUGZILLA"/>
		<reference ref_id="1227864" ref_url="https://bugzilla.suse.com/1227864" source="BUGZILLA"/>
		<reference ref_id="1227865" ref_url="https://bugzilla.suse.com/1227865" source="BUGZILLA"/>
		<reference ref_id="1227866" ref_url="https://bugzilla.suse.com/1227866" source="BUGZILLA"/>
		<reference ref_id="1227870" ref_url="https://bugzilla.suse.com/1227870" source="BUGZILLA"/>
		<reference ref_id="1227884" ref_url="https://bugzilla.suse.com/1227884" source="BUGZILLA"/>
		<reference ref_id="1227886" ref_url="https://bugzilla.suse.com/1227886" source="BUGZILLA"/>
		<reference ref_id="1227891" ref_url="https://bugzilla.suse.com/1227891" source="BUGZILLA"/>
		<reference ref_id="1227893" ref_url="https://bugzilla.suse.com/1227893" source="BUGZILLA"/>
		<reference ref_id="1227899" ref_url="https://bugzilla.suse.com/1227899" source="BUGZILLA"/>
		<reference ref_id="1227900" ref_url="https://bugzilla.suse.com/1227900" source="BUGZILLA"/>
		<reference ref_id="1227910" ref_url="https://bugzilla.suse.com/1227910" source="BUGZILLA"/>
		<reference ref_id="1227913" ref_url="https://bugzilla.suse.com/1227913" source="BUGZILLA"/>
		<reference ref_id="1227917" ref_url="https://bugzilla.suse.com/1227917" source="BUGZILLA"/>
		<reference ref_id="1227919" ref_url="https://bugzilla.suse.com/1227919" source="BUGZILLA"/>
		<reference ref_id="1227920" ref_url="https://bugzilla.suse.com/1227920" source="BUGZILLA"/>
		<reference ref_id="1227921" ref_url="https://bugzilla.suse.com/1227921" source="BUGZILLA"/>
		<reference ref_id="1227922" ref_url="https://bugzilla.suse.com/1227922" source="BUGZILLA"/>
		<reference ref_id="1227923" ref_url="https://bugzilla.suse.com/1227923" source="BUGZILLA"/>
		<reference ref_id="1227924" ref_url="https://bugzilla.suse.com/1227924" source="BUGZILLA"/>
		<reference ref_id="1227925" ref_url="https://bugzilla.suse.com/1227925" source="BUGZILLA"/>
		<reference ref_id="1227927" ref_url="https://bugzilla.suse.com/1227927" source="BUGZILLA"/>
		<reference ref_id="1227928" ref_url="https://bugzilla.suse.com/1227928" source="BUGZILLA"/>
		<reference ref_id="1227931" ref_url="https://bugzilla.suse.com/1227931" source="BUGZILLA"/>
		<reference ref_id="1227932" ref_url="https://bugzilla.suse.com/1227932" source="BUGZILLA"/>
		<reference ref_id="1227933" ref_url="https://bugzilla.suse.com/1227933" source="BUGZILLA"/>
		<reference ref_id="1227935" ref_url="https://bugzilla.suse.com/1227935" source="BUGZILLA"/>
		<reference ref_id="1227936" ref_url="https://bugzilla.suse.com/1227936" source="BUGZILLA"/>
		<reference ref_id="1227938" ref_url="https://bugzilla.suse.com/1227938" source="BUGZILLA"/>
		<reference ref_id="1227941" ref_url="https://bugzilla.suse.com/1227941" source="BUGZILLA"/>
		<reference ref_id="1227942" ref_url="https://bugzilla.suse.com/1227942" source="BUGZILLA"/>
		<reference ref_id="1227944" ref_url="https://bugzilla.suse.com/1227944" source="BUGZILLA"/>
		<reference ref_id="1227945" ref_url="https://bugzilla.suse.com/1227945" source="BUGZILLA"/>
		<reference ref_id="1227947" ref_url="https://bugzilla.suse.com/1227947" source="BUGZILLA"/>
		<reference ref_id="1227948" ref_url="https://bugzilla.suse.com/1227948" source="BUGZILLA"/>
		<reference ref_id="1227949" ref_url="https://bugzilla.suse.com/1227949" source="BUGZILLA"/>
		<reference ref_id="1227950" ref_url="https://bugzilla.suse.com/1227950" source="BUGZILLA"/>
		<reference ref_id="1227952" ref_url="https://bugzilla.suse.com/1227952" source="BUGZILLA"/>
		<reference ref_id="1227953" ref_url="https://bugzilla.suse.com/1227953" source="BUGZILLA"/>
		<reference ref_id="1227954" ref_url="https://bugzilla.suse.com/1227954" source="BUGZILLA"/>
		<reference ref_id="1227956" ref_url="https://bugzilla.suse.com/1227956" source="BUGZILLA"/>
		<reference ref_id="1227957" ref_url="https://bugzilla.suse.com/1227957" source="BUGZILLA"/>
		<reference ref_id="1227963" ref_url="https://bugzilla.suse.com/1227963" source="BUGZILLA"/>
		<reference ref_id="1227964" ref_url="https://bugzilla.suse.com/1227964" source="BUGZILLA"/>
		<reference ref_id="1227965" ref_url="https://bugzilla.suse.com/1227965" source="BUGZILLA"/>
		<reference ref_id="1227968" ref_url="https://bugzilla.suse.com/1227968" source="BUGZILLA"/>
		<reference ref_id="1227969" ref_url="https://bugzilla.suse.com/1227969" source="BUGZILLA"/>
		<reference ref_id="1227970" ref_url="https://bugzilla.suse.com/1227970" source="BUGZILLA"/>
		<reference ref_id="1227971" ref_url="https://bugzilla.suse.com/1227971" source="BUGZILLA"/>
		<reference ref_id="1227972" ref_url="https://bugzilla.suse.com/1227972" source="BUGZILLA"/>
		<reference ref_id="1227975" ref_url="https://bugzilla.suse.com/1227975" source="BUGZILLA"/>
		<reference ref_id="1227976" ref_url="https://bugzilla.suse.com/1227976" source="BUGZILLA"/>
		<reference ref_id="1227981" ref_url="https://bugzilla.suse.com/1227981" source="BUGZILLA"/>
		<reference ref_id="1227982" ref_url="https://bugzilla.suse.com/1227982" source="BUGZILLA"/>
		<reference ref_id="1227985" ref_url="https://bugzilla.suse.com/1227985" source="BUGZILLA"/>
		<reference ref_id="1227986" ref_url="https://bugzilla.suse.com/1227986" source="BUGZILLA"/>
		<reference ref_id="1227987" ref_url="https://bugzilla.suse.com/1227987" source="BUGZILLA"/>
		<reference ref_id="1227988" ref_url="https://bugzilla.suse.com/1227988" source="BUGZILLA"/>
		<reference ref_id="1227989" ref_url="https://bugzilla.suse.com/1227989" source="BUGZILLA"/>
		<reference ref_id="1227990" ref_url="https://bugzilla.suse.com/1227990" source="BUGZILLA"/>
		<reference ref_id="1227991" ref_url="https://bugzilla.suse.com/1227991" source="BUGZILLA"/>
		<reference ref_id="1227992" ref_url="https://bugzilla.suse.com/1227992" source="BUGZILLA"/>
		<reference ref_id="1227993" ref_url="https://bugzilla.suse.com/1227993" source="BUGZILLA"/>
		<reference ref_id="1227995" ref_url="https://bugzilla.suse.com/1227995" source="BUGZILLA"/>
		<reference ref_id="1227996" ref_url="https://bugzilla.suse.com/1227996" source="BUGZILLA"/>
		<reference ref_id="1227997" ref_url="https://bugzilla.suse.com/1227997" source="BUGZILLA"/>
		<reference ref_id="1228000" ref_url="https://bugzilla.suse.com/1228000" source="BUGZILLA"/>
		<reference ref_id="1228002" ref_url="https://bugzilla.suse.com/1228002" source="BUGZILLA"/>
		<reference ref_id="1228003" ref_url="https://bugzilla.suse.com/1228003" source="BUGZILLA"/>
		<reference ref_id="1228004" ref_url="https://bugzilla.suse.com/1228004" source="BUGZILLA"/>
		<reference ref_id="1228005" ref_url="https://bugzilla.suse.com/1228005" source="BUGZILLA"/>
		<reference ref_id="1228006" ref_url="https://bugzilla.suse.com/1228006" source="BUGZILLA"/>
		<reference ref_id="1228007" ref_url="https://bugzilla.suse.com/1228007" source="BUGZILLA"/>
		<reference ref_id="1228008" ref_url="https://bugzilla.suse.com/1228008" source="BUGZILLA"/>
		<reference ref_id="1228009" ref_url="https://bugzilla.suse.com/1228009" source="BUGZILLA"/>
		<reference ref_id="1228010" ref_url="https://bugzilla.suse.com/1228010" source="BUGZILLA"/>
		<reference ref_id="1228011" ref_url="https://bugzilla.suse.com/1228011" source="BUGZILLA"/>
		<reference ref_id="1228013" ref_url="https://bugzilla.suse.com/1228013" source="BUGZILLA"/>
		<reference ref_id="1228014" ref_url="https://bugzilla.suse.com/1228014" source="BUGZILLA"/>
		<reference ref_id="1228015" ref_url="https://bugzilla.suse.com/1228015" source="BUGZILLA"/>
		<reference ref_id="1228019" ref_url="https://bugzilla.suse.com/1228019" source="BUGZILLA"/>
		<reference ref_id="1228020" ref_url="https://bugzilla.suse.com/1228020" source="BUGZILLA"/>
		<reference ref_id="1228025" ref_url="https://bugzilla.suse.com/1228025" source="BUGZILLA"/>
		<reference ref_id="1228028" ref_url="https://bugzilla.suse.com/1228028" source="BUGZILLA"/>
		<reference ref_id="1228035" ref_url="https://bugzilla.suse.com/1228035" source="BUGZILLA"/>
		<reference ref_id="1228037" ref_url="https://bugzilla.suse.com/1228037" source="BUGZILLA"/>
		<reference ref_id="1228038" ref_url="https://bugzilla.suse.com/1228038" source="BUGZILLA"/>
		<reference ref_id="1228039" ref_url="https://bugzilla.suse.com/1228039" source="BUGZILLA"/>
		<reference ref_id="1228040" ref_url="https://bugzilla.suse.com/1228040" source="BUGZILLA"/>
		<reference ref_id="1228045" ref_url="https://bugzilla.suse.com/1228045" source="BUGZILLA"/>
		<reference ref_id="1228054" ref_url="https://bugzilla.suse.com/1228054" source="BUGZILLA"/>
		<reference ref_id="1228055" ref_url="https://bugzilla.suse.com/1228055" source="BUGZILLA"/>
		<reference ref_id="1228056" ref_url="https://bugzilla.suse.com/1228056" source="BUGZILLA"/>
		<reference ref_id="1228060" ref_url="https://bugzilla.suse.com/1228060" source="BUGZILLA"/>
		<reference ref_id="1228061" ref_url="https://bugzilla.suse.com/1228061" source="BUGZILLA"/>
		<reference ref_id="1228062" ref_url="https://bugzilla.suse.com/1228062" source="BUGZILLA"/>
		<reference ref_id="1228063" ref_url="https://bugzilla.suse.com/1228063" source="BUGZILLA"/>
		<reference ref_id="1228064" ref_url="https://bugzilla.suse.com/1228064" source="BUGZILLA"/>
		<reference ref_id="1228066" ref_url="https://bugzilla.suse.com/1228066" source="BUGZILLA"/>
		<reference ref_id="1228067" ref_url="https://bugzilla.suse.com/1228067" source="BUGZILLA"/>
		<reference ref_id="1228068" ref_url="https://bugzilla.suse.com/1228068" source="BUGZILLA"/>
		<reference ref_id="1228071" ref_url="https://bugzilla.suse.com/1228071" source="BUGZILLA"/>
		<reference ref_id="1228079" ref_url="https://bugzilla.suse.com/1228079" source="BUGZILLA"/>
		<reference ref_id="1228090" ref_url="https://bugzilla.suse.com/1228090" source="BUGZILLA"/>
		<reference ref_id="1228114" ref_url="https://bugzilla.suse.com/1228114" source="BUGZILLA"/>
		<reference ref_id="1228140" ref_url="https://bugzilla.suse.com/1228140" source="BUGZILLA"/>
		<reference ref_id="1228190" ref_url="https://bugzilla.suse.com/1228190" source="BUGZILLA"/>
		<reference ref_id="1228191" ref_url="https://bugzilla.suse.com/1228191" source="BUGZILLA"/>
		<reference ref_id="1228226" ref_url="https://bugzilla.suse.com/1228226" source="BUGZILLA"/>
		<reference ref_id="1228235" ref_url="https://bugzilla.suse.com/1228235" source="BUGZILLA"/>
		<reference ref_id="1228247" ref_url="https://bugzilla.suse.com/1228247" source="BUGZILLA"/>
		<reference ref_id="1228327" ref_url="https://bugzilla.suse.com/1228327" source="BUGZILLA"/>
		<reference ref_id="1228328" ref_url="https://bugzilla.suse.com/1228328" source="BUGZILLA"/>
		<reference ref_id="1228330" ref_url="https://bugzilla.suse.com/1228330" source="BUGZILLA"/>
		<reference ref_id="1228403" ref_url="https://bugzilla.suse.com/1228403" source="BUGZILLA"/>
		<reference ref_id="1228405" ref_url="https://bugzilla.suse.com/1228405" source="BUGZILLA"/>
		<reference ref_id="1228408" ref_url="https://bugzilla.suse.com/1228408" source="BUGZILLA"/>
		<reference ref_id="1228409" ref_url="https://bugzilla.suse.com/1228409" source="BUGZILLA"/>
		<reference ref_id="1228410" ref_url="https://bugzilla.suse.com/1228410" source="BUGZILLA"/>
		<reference ref_id="1228418" ref_url="https://bugzilla.suse.com/1228418" source="BUGZILLA"/>
		<reference ref_id="1228459" ref_url="https://bugzilla.suse.com/1228459" source="BUGZILLA"/>
		<reference ref_id="1228462" ref_url="https://bugzilla.suse.com/1228462" source="BUGZILLA"/>
		<reference ref_id="1228470" ref_url="https://bugzilla.suse.com/1228470" source="BUGZILLA"/>
		<reference ref_id="1228518" ref_url="https://bugzilla.suse.com/1228518" source="BUGZILLA"/>
		<reference ref_id="1228520" ref_url="https://bugzilla.suse.com/1228520" source="BUGZILLA"/>
		<reference ref_id="1228530" ref_url="https://bugzilla.suse.com/1228530" source="BUGZILLA"/>
		<reference ref_id="1228561" ref_url="https://bugzilla.suse.com/1228561" source="BUGZILLA"/>
		<reference ref_id="1228565" ref_url="https://bugzilla.suse.com/1228565" source="BUGZILLA"/>
		<reference ref_id="1228580" ref_url="https://bugzilla.suse.com/1228580" source="BUGZILLA"/>
		<reference ref_id="1228581" ref_url="https://bugzilla.suse.com/1228581" source="BUGZILLA"/>
		<reference ref_id="1228591" ref_url="https://bugzilla.suse.com/1228591" source="BUGZILLA"/>
		<reference ref_id="1228599" ref_url="https://bugzilla.suse.com/1228599" source="BUGZILLA"/>
		<reference ref_id="1228617" ref_url="https://bugzilla.suse.com/1228617" source="BUGZILLA"/>
		<reference ref_id="1228625" ref_url="https://bugzilla.suse.com/1228625" source="BUGZILLA"/>
		<reference ref_id="1228626" ref_url="https://bugzilla.suse.com/1228626" source="BUGZILLA"/>
		<reference ref_id="1228633" ref_url="https://bugzilla.suse.com/1228633" source="BUGZILLA"/>
		<reference ref_id="1228640" ref_url="https://bugzilla.suse.com/1228640" source="BUGZILLA"/>
		<reference ref_id="1228644" ref_url="https://bugzilla.suse.com/1228644" source="BUGZILLA"/>
		<reference ref_id="1228649" ref_url="https://bugzilla.suse.com/1228649" source="BUGZILLA"/>
		<reference ref_id="1228655" ref_url="https://bugzilla.suse.com/1228655" source="BUGZILLA"/>
		<reference ref_id="1228665" ref_url="https://bugzilla.suse.com/1228665" source="BUGZILLA"/>
		<reference ref_id="1228672" ref_url="https://bugzilla.suse.com/1228672" source="BUGZILLA"/>
		<reference ref_id="1228680" ref_url="https://bugzilla.suse.com/1228680" source="BUGZILLA"/>
		<reference ref_id="1228705" ref_url="https://bugzilla.suse.com/1228705" source="BUGZILLA"/>
		<reference ref_id="1228723" ref_url="https://bugzilla.suse.com/1228723" source="BUGZILLA"/>
		<reference ref_id="1228743" ref_url="https://bugzilla.suse.com/1228743" source="BUGZILLA"/>
		<reference ref_id="1228756" ref_url="https://bugzilla.suse.com/1228756" source="BUGZILLA"/>
		<reference ref_id="1228801" ref_url="https://bugzilla.suse.com/1228801" source="BUGZILLA"/>
		<reference ref_id="1228850" ref_url="https://bugzilla.suse.com/1228850" source="BUGZILLA"/>
		<reference ref_id="1228857" ref_url="https://bugzilla.suse.com/1228857" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4439" ref_url="https://www.suse.com/security/cve/CVE-2021-4439/" source="CVE"/>
		<reference ref_id="CVE-2021-47086" ref_url="https://www.suse.com/security/cve/CVE-2021-47086/" source="CVE"/>
		<reference ref_id="CVE-2021-47089" ref_url="https://www.suse.com/security/cve/CVE-2021-47089/" source="CVE"/>
		<reference ref_id="CVE-2021-47103" ref_url="https://www.suse.com/security/cve/CVE-2021-47103/" source="CVE"/>
		<reference ref_id="CVE-2021-47186" ref_url="https://www.suse.com/security/cve/CVE-2021-47186/" source="CVE"/>
		<reference ref_id="CVE-2021-47432" ref_url="https://www.suse.com/security/cve/CVE-2021-47432/" source="CVE"/>
		<reference ref_id="CVE-2021-47515" ref_url="https://www.suse.com/security/cve/CVE-2021-47515/" source="CVE"/>
		<reference ref_id="CVE-2021-47534" ref_url="https://www.suse.com/security/cve/CVE-2021-47534/" source="CVE"/>
		<reference ref_id="CVE-2021-47538" ref_url="https://www.suse.com/security/cve/CVE-2021-47538/" source="CVE"/>
		<reference ref_id="CVE-2021-47539" ref_url="https://www.suse.com/security/cve/CVE-2021-47539/" source="CVE"/>
		<reference ref_id="CVE-2021-47546" ref_url="https://www.suse.com/security/cve/CVE-2021-47546/" source="CVE"/>
		<reference ref_id="CVE-2021-47547" ref_url="https://www.suse.com/security/cve/CVE-2021-47547/" source="CVE"/>
		<reference ref_id="CVE-2021-47555" ref_url="https://www.suse.com/security/cve/CVE-2021-47555/" source="CVE"/>
		<reference ref_id="CVE-2021-47566" ref_url="https://www.suse.com/security/cve/CVE-2021-47566/" source="CVE"/>
		<reference ref_id="CVE-2021-47571" ref_url="https://www.suse.com/security/cve/CVE-2021-47571/" source="CVE"/>
		<reference ref_id="CVE-2021-47572" ref_url="https://www.suse.com/security/cve/CVE-2021-47572/" source="CVE"/>
		<reference ref_id="CVE-2021-47576" ref_url="https://www.suse.com/security/cve/CVE-2021-47576/" source="CVE"/>
		<reference ref_id="CVE-2021-47577" ref_url="https://www.suse.com/security/cve/CVE-2021-47577/" source="CVE"/>
		<reference ref_id="CVE-2021-47578" ref_url="https://www.suse.com/security/cve/CVE-2021-47578/" source="CVE"/>
		<reference ref_id="CVE-2021-47580" ref_url="https://www.suse.com/security/cve/CVE-2021-47580/" source="CVE"/>
		<reference ref_id="CVE-2021-47582" ref_url="https://www.suse.com/security/cve/CVE-2021-47582/" source="CVE"/>
		<reference ref_id="CVE-2021-47583" ref_url="https://www.suse.com/security/cve/CVE-2021-47583/" source="CVE"/>
		<reference ref_id="CVE-2021-47584" ref_url="https://www.suse.com/security/cve/CVE-2021-47584/" source="CVE"/>
		<reference ref_id="CVE-2021-47585" ref_url="https://www.suse.com/security/cve/CVE-2021-47585/" source="CVE"/>
		<reference ref_id="CVE-2021-47586" ref_url="https://www.suse.com/security/cve/CVE-2021-47586/" source="CVE"/>
		<reference ref_id="CVE-2021-47587" ref_url="https://www.suse.com/security/cve/CVE-2021-47587/" source="CVE"/>
		<reference ref_id="CVE-2021-47588" ref_url="https://www.suse.com/security/cve/CVE-2021-47588/" source="CVE"/>
		<reference ref_id="CVE-2021-47589" ref_url="https://www.suse.com/security/cve/CVE-2021-47589/" source="CVE"/>
		<reference ref_id="CVE-2021-47590" ref_url="https://www.suse.com/security/cve/CVE-2021-47590/" source="CVE"/>
		<reference ref_id="CVE-2021-47591" ref_url="https://www.suse.com/security/cve/CVE-2021-47591/" source="CVE"/>
		<reference ref_id="CVE-2021-47592" ref_url="https://www.suse.com/security/cve/CVE-2021-47592/" source="CVE"/>
		<reference ref_id="CVE-2021-47593" ref_url="https://www.suse.com/security/cve/CVE-2021-47593/" source="CVE"/>
		<reference ref_id="CVE-2021-47595" ref_url="https://www.suse.com/security/cve/CVE-2021-47595/" source="CVE"/>
		<reference ref_id="CVE-2021-47596" ref_url="https://www.suse.com/security/cve/CVE-2021-47596/" source="CVE"/>
		<reference ref_id="CVE-2021-47597" ref_url="https://www.suse.com/security/cve/CVE-2021-47597/" source="CVE"/>
		<reference ref_id="CVE-2021-47598" ref_url="https://www.suse.com/security/cve/CVE-2021-47598/" source="CVE"/>
		<reference ref_id="CVE-2021-47599" ref_url="https://www.suse.com/security/cve/CVE-2021-47599/" source="CVE"/>
		<reference ref_id="CVE-2021-47600" ref_url="https://www.suse.com/security/cve/CVE-2021-47600/" source="CVE"/>
		<reference ref_id="CVE-2021-47601" ref_url="https://www.suse.com/security/cve/CVE-2021-47601/" source="CVE"/>
		<reference ref_id="CVE-2021-47602" ref_url="https://www.suse.com/security/cve/CVE-2021-47602/" source="CVE"/>
		<reference ref_id="CVE-2021-47603" ref_url="https://www.suse.com/security/cve/CVE-2021-47603/" source="CVE"/>
		<reference ref_id="CVE-2021-47604" ref_url="https://www.suse.com/security/cve/CVE-2021-47604/" source="CVE"/>
		<reference ref_id="CVE-2021-47605" ref_url="https://www.suse.com/security/cve/CVE-2021-47605/" source="CVE"/>
		<reference ref_id="CVE-2021-47606" ref_url="https://www.suse.com/security/cve/CVE-2021-47606/" source="CVE"/>
		<reference ref_id="CVE-2021-47607" ref_url="https://www.suse.com/security/cve/CVE-2021-47607/" source="CVE"/>
		<reference ref_id="CVE-2021-47608" ref_url="https://www.suse.com/security/cve/CVE-2021-47608/" source="CVE"/>
		<reference ref_id="CVE-2021-47609" ref_url="https://www.suse.com/security/cve/CVE-2021-47609/" source="CVE"/>
		<reference ref_id="CVE-2021-47610" ref_url="https://www.suse.com/security/cve/CVE-2021-47610/" source="CVE"/>
		<reference ref_id="CVE-2021-47611" ref_url="https://www.suse.com/security/cve/CVE-2021-47611/" source="CVE"/>
		<reference ref_id="CVE-2021-47612" ref_url="https://www.suse.com/security/cve/CVE-2021-47612/" source="CVE"/>
		<reference ref_id="CVE-2021-47614" ref_url="https://www.suse.com/security/cve/CVE-2021-47614/" source="CVE"/>
		<reference ref_id="CVE-2021-47615" ref_url="https://www.suse.com/security/cve/CVE-2021-47615/" source="CVE"/>
		<reference ref_id="CVE-2021-47616" ref_url="https://www.suse.com/security/cve/CVE-2021-47616/" source="CVE"/>
		<reference ref_id="CVE-2021-47617" ref_url="https://www.suse.com/security/cve/CVE-2021-47617/" source="CVE"/>
		<reference ref_id="CVE-2021-47618" ref_url="https://www.suse.com/security/cve/CVE-2021-47618/" source="CVE"/>
		<reference ref_id="CVE-2021-47619" ref_url="https://www.suse.com/security/cve/CVE-2021-47619/" source="CVE"/>
		<reference ref_id="CVE-2021-47620" ref_url="https://www.suse.com/security/cve/CVE-2021-47620/" source="CVE"/>
		<reference ref_id="CVE-2021-47622" ref_url="https://www.suse.com/security/cve/CVE-2021-47622/" source="CVE"/>
		<reference ref_id="CVE-2021-47623" ref_url="https://www.suse.com/security/cve/CVE-2021-47623/" source="CVE"/>
		<reference ref_id="CVE-2021-47624" ref_url="https://www.suse.com/security/cve/CVE-2021-47624/" source="CVE"/>
		<reference ref_id="CVE-2022-48711" ref_url="https://www.suse.com/security/cve/CVE-2022-48711/" source="CVE"/>
		<reference ref_id="CVE-2022-48712" ref_url="https://www.suse.com/security/cve/CVE-2022-48712/" source="CVE"/>
		<reference ref_id="CVE-2022-48713" ref_url="https://www.suse.com/security/cve/CVE-2022-48713/" source="CVE"/>
		<reference ref_id="CVE-2022-48714" ref_url="https://www.suse.com/security/cve/CVE-2022-48714/" source="CVE"/>
		<reference ref_id="CVE-2022-48715" ref_url="https://www.suse.com/security/cve/CVE-2022-48715/" source="CVE"/>
		<reference ref_id="CVE-2022-48716" ref_url="https://www.suse.com/security/cve/CVE-2022-48716/" source="CVE"/>
		<reference ref_id="CVE-2022-48717" ref_url="https://www.suse.com/security/cve/CVE-2022-48717/" source="CVE"/>
		<reference ref_id="CVE-2022-48718" ref_url="https://www.suse.com/security/cve/CVE-2022-48718/" source="CVE"/>
		<reference ref_id="CVE-2022-48720" ref_url="https://www.suse.com/security/cve/CVE-2022-48720/" source="CVE"/>
		<reference ref_id="CVE-2022-48721" ref_url="https://www.suse.com/security/cve/CVE-2022-48721/" source="CVE"/>
		<reference ref_id="CVE-2022-48722" ref_url="https://www.suse.com/security/cve/CVE-2022-48722/" source="CVE"/>
		<reference ref_id="CVE-2022-48723" ref_url="https://www.suse.com/security/cve/CVE-2022-48723/" source="CVE"/>
		<reference ref_id="CVE-2022-48724" ref_url="https://www.suse.com/security/cve/CVE-2022-48724/" source="CVE"/>
		<reference ref_id="CVE-2022-48725" ref_url="https://www.suse.com/security/cve/CVE-2022-48725/" source="CVE"/>
		<reference ref_id="CVE-2022-48726" ref_url="https://www.suse.com/security/cve/CVE-2022-48726/" source="CVE"/>
		<reference ref_id="CVE-2022-48727" ref_url="https://www.suse.com/security/cve/CVE-2022-48727/" source="CVE"/>
		<reference ref_id="CVE-2022-48728" ref_url="https://www.suse.com/security/cve/CVE-2022-48728/" source="CVE"/>
		<reference ref_id="CVE-2022-48729" ref_url="https://www.suse.com/security/cve/CVE-2022-48729/" source="CVE"/>
		<reference ref_id="CVE-2022-48730" ref_url="https://www.suse.com/security/cve/CVE-2022-48730/" source="CVE"/>
		<reference ref_id="CVE-2022-48732" ref_url="https://www.suse.com/security/cve/CVE-2022-48732/" source="CVE"/>
		<reference ref_id="CVE-2022-48733" ref_url="https://www.suse.com/security/cve/CVE-2022-48733/" source="CVE"/>
		<reference ref_id="CVE-2022-48734" ref_url="https://www.suse.com/security/cve/CVE-2022-48734/" source="CVE"/>
		<reference ref_id="CVE-2022-48735" ref_url="https://www.suse.com/security/cve/CVE-2022-48735/" source="CVE"/>
		<reference ref_id="CVE-2022-48736" ref_url="https://www.suse.com/security/cve/CVE-2022-48736/" source="CVE"/>
		<reference ref_id="CVE-2022-48737" ref_url="https://www.suse.com/security/cve/CVE-2022-48737/" source="CVE"/>
		<reference ref_id="CVE-2022-48738" ref_url="https://www.suse.com/security/cve/CVE-2022-48738/" source="CVE"/>
		<reference ref_id="CVE-2022-48739" ref_url="https://www.suse.com/security/cve/CVE-2022-48739/" source="CVE"/>
		<reference ref_id="CVE-2022-48740" ref_url="https://www.suse.com/security/cve/CVE-2022-48740/" source="CVE"/>
		<reference ref_id="CVE-2022-48743" ref_url="https://www.suse.com/security/cve/CVE-2022-48743/" source="CVE"/>
		<reference ref_id="CVE-2022-48744" ref_url="https://www.suse.com/security/cve/CVE-2022-48744/" source="CVE"/>
		<reference ref_id="CVE-2022-48745" ref_url="https://www.suse.com/security/cve/CVE-2022-48745/" source="CVE"/>
		<reference ref_id="CVE-2022-48746" ref_url="https://www.suse.com/security/cve/CVE-2022-48746/" source="CVE"/>
		<reference ref_id="CVE-2022-48747" ref_url="https://www.suse.com/security/cve/CVE-2022-48747/" source="CVE"/>
		<reference ref_id="CVE-2022-48748" ref_url="https://www.suse.com/security/cve/CVE-2022-48748/" source="CVE"/>
		<reference ref_id="CVE-2022-48749" ref_url="https://www.suse.com/security/cve/CVE-2022-48749/" source="CVE"/>
		<reference ref_id="CVE-2022-48751" ref_url="https://www.suse.com/security/cve/CVE-2022-48751/" source="CVE"/>
		<reference ref_id="CVE-2022-48752" ref_url="https://www.suse.com/security/cve/CVE-2022-48752/" source="CVE"/>
		<reference ref_id="CVE-2022-48753" ref_url="https://www.suse.com/security/cve/CVE-2022-48753/" source="CVE"/>
		<reference ref_id="CVE-2022-48754" ref_url="https://www.suse.com/security/cve/CVE-2022-48754/" source="CVE"/>
		<reference ref_id="CVE-2022-48755" ref_url="https://www.suse.com/security/cve/CVE-2022-48755/" source="CVE"/>
		<reference ref_id="CVE-2022-48756" ref_url="https://www.suse.com/security/cve/CVE-2022-48756/" source="CVE"/>
		<reference ref_id="CVE-2022-48758" ref_url="https://www.suse.com/security/cve/CVE-2022-48758/" source="CVE"/>
		<reference ref_id="CVE-2022-48759" ref_url="https://www.suse.com/security/cve/CVE-2022-48759/" source="CVE"/>
		<reference ref_id="CVE-2022-48760" ref_url="https://www.suse.com/security/cve/CVE-2022-48760/" source="CVE"/>
		<reference ref_id="CVE-2022-48761" ref_url="https://www.suse.com/security/cve/CVE-2022-48761/" source="CVE"/>
		<reference ref_id="CVE-2022-48763" ref_url="https://www.suse.com/security/cve/CVE-2022-48763/" source="CVE"/>
		<reference ref_id="CVE-2022-48765" ref_url="https://www.suse.com/security/cve/CVE-2022-48765/" source="CVE"/>
		<reference ref_id="CVE-2022-48766" ref_url="https://www.suse.com/security/cve/CVE-2022-48766/" source="CVE"/>
		<reference ref_id="CVE-2022-48767" ref_url="https://www.suse.com/security/cve/CVE-2022-48767/" source="CVE"/>
		<reference ref_id="CVE-2022-48768" ref_url="https://www.suse.com/security/cve/CVE-2022-48768/" source="CVE"/>
		<reference ref_id="CVE-2022-48769" ref_url="https://www.suse.com/security/cve/CVE-2022-48769/" source="CVE"/>
		<reference ref_id="CVE-2022-48770" ref_url="https://www.suse.com/security/cve/CVE-2022-48770/" source="CVE"/>
		<reference ref_id="CVE-2022-48771" ref_url="https://www.suse.com/security/cve/CVE-2022-48771/" source="CVE"/>
		<reference ref_id="CVE-2022-48772" ref_url="https://www.suse.com/security/cve/CVE-2022-48772/" source="CVE"/>
		<reference ref_id="CVE-2022-48773" ref_url="https://www.suse.com/security/cve/CVE-2022-48773/" source="CVE"/>
		<reference ref_id="CVE-2022-48774" ref_url="https://www.suse.com/security/cve/CVE-2022-48774/" source="CVE"/>
		<reference ref_id="CVE-2022-48775" ref_url="https://www.suse.com/security/cve/CVE-2022-48775/" source="CVE"/>
		<reference ref_id="CVE-2022-48776" ref_url="https://www.suse.com/security/cve/CVE-2022-48776/" source="CVE"/>
		<reference ref_id="CVE-2022-48777" ref_url="https://www.suse.com/security/cve/CVE-2022-48777/" source="CVE"/>
		<reference ref_id="CVE-2022-48778" ref_url="https://www.suse.com/security/cve/CVE-2022-48778/" source="CVE"/>
		<reference ref_id="CVE-2022-48780" ref_url="https://www.suse.com/security/cve/CVE-2022-48780/" source="CVE"/>
		<reference ref_id="CVE-2022-48783" ref_url="https://www.suse.com/security/cve/CVE-2022-48783/" source="CVE"/>
		<reference ref_id="CVE-2022-48784" ref_url="https://www.suse.com/security/cve/CVE-2022-48784/" source="CVE"/>
		<reference ref_id="CVE-2022-48785" ref_url="https://www.suse.com/security/cve/CVE-2022-48785/" source="CVE"/>
		<reference ref_id="CVE-2022-48786" ref_url="https://www.suse.com/security/cve/CVE-2022-48786/" source="CVE"/>
		<reference ref_id="CVE-2022-48787" ref_url="https://www.suse.com/security/cve/CVE-2022-48787/" source="CVE"/>
		<reference ref_id="CVE-2022-48788" ref_url="https://www.suse.com/security/cve/CVE-2022-48788/" source="CVE"/>
		<reference ref_id="CVE-2022-48789" ref_url="https://www.suse.com/security/cve/CVE-2022-48789/" source="CVE"/>
		<reference ref_id="CVE-2022-48790" ref_url="https://www.suse.com/security/cve/CVE-2022-48790/" source="CVE"/>
		<reference ref_id="CVE-2022-48791" ref_url="https://www.suse.com/security/cve/CVE-2022-48791/" source="CVE"/>
		<reference ref_id="CVE-2022-48792" ref_url="https://www.suse.com/security/cve/CVE-2022-48792/" source="CVE"/>
		<reference ref_id="CVE-2022-48793" ref_url="https://www.suse.com/security/cve/CVE-2022-48793/" source="CVE"/>
		<reference ref_id="CVE-2022-48794" ref_url="https://www.suse.com/security/cve/CVE-2022-48794/" source="CVE"/>
		<reference ref_id="CVE-2022-48796" ref_url="https://www.suse.com/security/cve/CVE-2022-48796/" source="CVE"/>
		<reference ref_id="CVE-2022-48797" ref_url="https://www.suse.com/security/cve/CVE-2022-48797/" source="CVE"/>
		<reference ref_id="CVE-2022-48798" ref_url="https://www.suse.com/security/cve/CVE-2022-48798/" source="CVE"/>
		<reference ref_id="CVE-2022-48799" ref_url="https://www.suse.com/security/cve/CVE-2022-48799/" source="CVE"/>
		<reference ref_id="CVE-2022-48800" ref_url="https://www.suse.com/security/cve/CVE-2022-48800/" source="CVE"/>
		<reference ref_id="CVE-2022-48801" ref_url="https://www.suse.com/security/cve/CVE-2022-48801/" source="CVE"/>
		<reference ref_id="CVE-2022-48802" ref_url="https://www.suse.com/security/cve/CVE-2022-48802/" source="CVE"/>
		<reference ref_id="CVE-2022-48803" ref_url="https://www.suse.com/security/cve/CVE-2022-48803/" source="CVE"/>
		<reference ref_id="CVE-2022-48804" ref_url="https://www.suse.com/security/cve/CVE-2022-48804/" source="CVE"/>
		<reference ref_id="CVE-2022-48805" ref_url="https://www.suse.com/security/cve/CVE-2022-48805/" source="CVE"/>
		<reference ref_id="CVE-2022-48806" ref_url="https://www.suse.com/security/cve/CVE-2022-48806/" source="CVE"/>
		<reference ref_id="CVE-2022-48807" ref_url="https://www.suse.com/security/cve/CVE-2022-48807/" source="CVE"/>
		<reference ref_id="CVE-2022-48809" ref_url="https://www.suse.com/security/cve/CVE-2022-48809/" source="CVE"/>
		<reference ref_id="CVE-2022-48810" ref_url="https://www.suse.com/security/cve/CVE-2022-48810/" source="CVE"/>
		<reference ref_id="CVE-2022-48811" ref_url="https://www.suse.com/security/cve/CVE-2022-48811/" source="CVE"/>
		<reference ref_id="CVE-2022-48812" ref_url="https://www.suse.com/security/cve/CVE-2022-48812/" source="CVE"/>
		<reference ref_id="CVE-2022-48813" ref_url="https://www.suse.com/security/cve/CVE-2022-48813/" source="CVE"/>
		<reference ref_id="CVE-2022-48814" ref_url="https://www.suse.com/security/cve/CVE-2022-48814/" source="CVE"/>
		<reference ref_id="CVE-2022-48815" ref_url="https://www.suse.com/security/cve/CVE-2022-48815/" source="CVE"/>
		<reference ref_id="CVE-2022-48816" ref_url="https://www.suse.com/security/cve/CVE-2022-48816/" source="CVE"/>
		<reference ref_id="CVE-2022-48817" ref_url="https://www.suse.com/security/cve/CVE-2022-48817/" source="CVE"/>
		<reference ref_id="CVE-2022-48818" ref_url="https://www.suse.com/security/cve/CVE-2022-48818/" source="CVE"/>
		<reference ref_id="CVE-2022-48820" ref_url="https://www.suse.com/security/cve/CVE-2022-48820/" source="CVE"/>
		<reference ref_id="CVE-2022-48821" ref_url="https://www.suse.com/security/cve/CVE-2022-48821/" source="CVE"/>
		<reference ref_id="CVE-2022-48822" ref_url="https://www.suse.com/security/cve/CVE-2022-48822/" source="CVE"/>
		<reference ref_id="CVE-2022-48823" ref_url="https://www.suse.com/security/cve/CVE-2022-48823/" source="CVE"/>
		<reference ref_id="CVE-2022-48824" ref_url="https://www.suse.com/security/cve/CVE-2022-48824/" source="CVE"/>
		<reference ref_id="CVE-2022-48825" ref_url="https://www.suse.com/security/cve/CVE-2022-48825/" source="CVE"/>
		<reference ref_id="CVE-2022-48826" ref_url="https://www.suse.com/security/cve/CVE-2022-48826/" source="CVE"/>
		<reference ref_id="CVE-2022-48827" ref_url="https://www.suse.com/security/cve/CVE-2022-48827/" source="CVE"/>
		<reference ref_id="CVE-2022-48828" ref_url="https://www.suse.com/security/cve/CVE-2022-48828/" source="CVE"/>
		<reference ref_id="CVE-2022-48829" ref_url="https://www.suse.com/security/cve/CVE-2022-48829/" source="CVE"/>
		<reference ref_id="CVE-2022-48830" ref_url="https://www.suse.com/security/cve/CVE-2022-48830/" source="CVE"/>
		<reference ref_id="CVE-2022-48831" ref_url="https://www.suse.com/security/cve/CVE-2022-48831/" source="CVE"/>
		<reference ref_id="CVE-2022-48834" ref_url="https://www.suse.com/security/cve/CVE-2022-48834/" source="CVE"/>
		<reference ref_id="CVE-2022-48835" ref_url="https://www.suse.com/security/cve/CVE-2022-48835/" source="CVE"/>
		<reference ref_id="CVE-2022-48836" ref_url="https://www.suse.com/security/cve/CVE-2022-48836/" source="CVE"/>
		<reference ref_id="CVE-2022-48837" ref_url="https://www.suse.com/security/cve/CVE-2022-48837/" source="CVE"/>
		<reference ref_id="CVE-2022-48838" ref_url="https://www.suse.com/security/cve/CVE-2022-48838/" source="CVE"/>
		<reference ref_id="CVE-2022-48839" ref_url="https://www.suse.com/security/cve/CVE-2022-48839/" source="CVE"/>
		<reference ref_id="CVE-2022-48840" ref_url="https://www.suse.com/security/cve/CVE-2022-48840/" source="CVE"/>
		<reference ref_id="CVE-2022-48841" ref_url="https://www.suse.com/security/cve/CVE-2022-48841/" source="CVE"/>
		<reference ref_id="CVE-2022-48842" ref_url="https://www.suse.com/security/cve/CVE-2022-48842/" source="CVE"/>
		<reference ref_id="CVE-2022-48843" ref_url="https://www.suse.com/security/cve/CVE-2022-48843/" source="CVE"/>
		<reference ref_id="CVE-2022-48844" ref_url="https://www.suse.com/security/cve/CVE-2022-48844/" source="CVE"/>
		<reference ref_id="CVE-2022-48846" ref_url="https://www.suse.com/security/cve/CVE-2022-48846/" source="CVE"/>
		<reference ref_id="CVE-2022-48847" ref_url="https://www.suse.com/security/cve/CVE-2022-48847/" source="CVE"/>
		<reference ref_id="CVE-2022-48849" ref_url="https://www.suse.com/security/cve/CVE-2022-48849/" source="CVE"/>
		<reference ref_id="CVE-2022-48850" ref_url="https://www.suse.com/security/cve/CVE-2022-48850/" source="CVE"/>
		<reference ref_id="CVE-2022-48851" ref_url="https://www.suse.com/security/cve/CVE-2022-48851/" source="CVE"/>
		<reference ref_id="CVE-2022-48852" ref_url="https://www.suse.com/security/cve/CVE-2022-48852/" source="CVE"/>
		<reference ref_id="CVE-2022-48853" ref_url="https://www.suse.com/security/cve/CVE-2022-48853/" source="CVE"/>
		<reference ref_id="CVE-2022-48855" ref_url="https://www.suse.com/security/cve/CVE-2022-48855/" source="CVE"/>
		<reference ref_id="CVE-2022-48856" ref_url="https://www.suse.com/security/cve/CVE-2022-48856/" source="CVE"/>
		<reference ref_id="CVE-2022-48857" ref_url="https://www.suse.com/security/cve/CVE-2022-48857/" source="CVE"/>
		<reference ref_id="CVE-2022-48858" ref_url="https://www.suse.com/security/cve/CVE-2022-48858/" source="CVE"/>
		<reference ref_id="CVE-2022-48859" ref_url="https://www.suse.com/security/cve/CVE-2022-48859/" source="CVE"/>
		<reference ref_id="CVE-2022-48860" ref_url="https://www.suse.com/security/cve/CVE-2022-48860/" source="CVE"/>
		<reference ref_id="CVE-2022-48861" ref_url="https://www.suse.com/security/cve/CVE-2022-48861/" source="CVE"/>
		<reference ref_id="CVE-2022-48862" ref_url="https://www.suse.com/security/cve/CVE-2022-48862/" source="CVE"/>
		<reference ref_id="CVE-2022-48863" ref_url="https://www.suse.com/security/cve/CVE-2022-48863/" source="CVE"/>
		<reference ref_id="CVE-2022-48864" ref_url="https://www.suse.com/security/cve/CVE-2022-48864/" source="CVE"/>
		<reference ref_id="CVE-2022-48866" ref_url="https://www.suse.com/security/cve/CVE-2022-48866/" source="CVE"/>
		<reference ref_id="CVE-2023-24023" ref_url="https://www.suse.com/security/cve/CVE-2023-24023/" source="CVE"/>
		<reference ref_id="CVE-2023-52435" ref_url="https://www.suse.com/security/cve/CVE-2023-52435/" source="CVE"/>
		<reference ref_id="CVE-2023-52573" ref_url="https://www.suse.com/security/cve/CVE-2023-52573/" source="CVE"/>
		<reference ref_id="CVE-2023-52580" ref_url="https://www.suse.com/security/cve/CVE-2023-52580/" source="CVE"/>
		<reference ref_id="CVE-2023-52622" ref_url="https://www.suse.com/security/cve/CVE-2023-52622/" source="CVE"/>
		<reference ref_id="CVE-2023-52658" ref_url="https://www.suse.com/security/cve/CVE-2023-52658/" source="CVE"/>
		<reference ref_id="CVE-2023-52667" ref_url="https://www.suse.com/security/cve/CVE-2023-52667/" source="CVE"/>
		<reference ref_id="CVE-2023-52670" ref_url="https://www.suse.com/security/cve/CVE-2023-52670/" source="CVE"/>
		<reference ref_id="CVE-2023-52672" ref_url="https://www.suse.com/security/cve/CVE-2023-52672/" source="CVE"/>
		<reference ref_id="CVE-2023-52675" ref_url="https://www.suse.com/security/cve/CVE-2023-52675/" source="CVE"/>
		<reference ref_id="CVE-2023-52735" ref_url="https://www.suse.com/security/cve/CVE-2023-52735/" source="CVE"/>
		<reference ref_id="CVE-2023-52737" ref_url="https://www.suse.com/security/cve/CVE-2023-52737/" source="CVE"/>
		<reference ref_id="CVE-2023-52751" ref_url="https://www.suse.com/security/cve/CVE-2023-52751/" source="CVE"/>
		<reference ref_id="CVE-2023-52752" ref_url="https://www.suse.com/security/cve/CVE-2023-52752/" source="CVE"/>
		<reference ref_id="CVE-2023-52762" ref_url="https://www.suse.com/security/cve/CVE-2023-52762/" source="CVE"/>
		<reference ref_id="CVE-2023-52766" ref_url="https://www.suse.com/security/cve/CVE-2023-52766/" source="CVE"/>
		<reference ref_id="CVE-2023-52775" ref_url="https://www.suse.com/security/cve/CVE-2023-52775/" source="CVE"/>
		<reference ref_id="CVE-2023-52784" ref_url="https://www.suse.com/security/cve/CVE-2023-52784/" source="CVE"/>
		<reference ref_id="CVE-2023-52787" ref_url="https://www.suse.com/security/cve/CVE-2023-52787/" source="CVE"/>
		<reference ref_id="CVE-2023-52800" ref_url="https://www.suse.com/security/cve/CVE-2023-52800/" source="CVE"/>
		<reference ref_id="CVE-2023-52812" ref_url="https://www.suse.com/security/cve/CVE-2023-52812/" source="CVE"/>
		<reference ref_id="CVE-2023-52835" ref_url="https://www.suse.com/security/cve/CVE-2023-52835/" source="CVE"/>
		<reference ref_id="CVE-2023-52837" ref_url="https://www.suse.com/security/cve/CVE-2023-52837/" source="CVE"/>
		<reference ref_id="CVE-2023-52843" ref_url="https://www.suse.com/security/cve/CVE-2023-52843/" source="CVE"/>
		<reference ref_id="CVE-2023-52845" ref_url="https://www.suse.com/security/cve/CVE-2023-52845/" source="CVE"/>
		<reference ref_id="CVE-2023-52846" ref_url="https://www.suse.com/security/cve/CVE-2023-52846/" source="CVE"/>
		<reference ref_id="CVE-2023-52857" ref_url="https://www.suse.com/security/cve/CVE-2023-52857/" source="CVE"/>
		<reference ref_id="CVE-2023-52863" ref_url="https://www.suse.com/security/cve/CVE-2023-52863/" source="CVE"/>
		<reference ref_id="CVE-2023-52869" ref_url="https://www.suse.com/security/cve/CVE-2023-52869/" source="CVE"/>
		<reference ref_id="CVE-2023-52881" ref_url="https://www.suse.com/security/cve/CVE-2023-52881/" source="CVE"/>
		<reference ref_id="CVE-2023-52882" ref_url="https://www.suse.com/security/cve/CVE-2023-52882/" source="CVE"/>
		<reference ref_id="CVE-2023-52884" ref_url="https://www.suse.com/security/cve/CVE-2023-52884/" source="CVE"/>
		<reference ref_id="CVE-2023-52885" ref_url="https://www.suse.com/security/cve/CVE-2023-52885/" source="CVE"/>
		<reference ref_id="CVE-2023-52886" ref_url="https://www.suse.com/security/cve/CVE-2023-52886/" source="CVE"/>
		<reference ref_id="CVE-2024-25741" ref_url="https://www.suse.com/security/cve/CVE-2024-25741/" source="CVE"/>
		<reference ref_id="CVE-2024-26583" ref_url="https://www.suse.com/security/cve/CVE-2024-26583/" source="CVE"/>
		<reference ref_id="CVE-2024-26584" ref_url="https://www.suse.com/security/cve/CVE-2024-26584/" source="CVE"/>
		<reference ref_id="CVE-2024-26615" ref_url="https://www.suse.com/security/cve/CVE-2024-26615/" source="CVE"/>
		<reference ref_id="CVE-2024-26625" ref_url="https://www.suse.com/security/cve/CVE-2024-26625/" source="CVE"/>
		<reference ref_id="CVE-2024-26633" ref_url="https://www.suse.com/security/cve/CVE-2024-26633/" source="CVE"/>
		<reference ref_id="CVE-2024-26635" ref_url="https://www.suse.com/security/cve/CVE-2024-26635/" source="CVE"/>
		<reference ref_id="CVE-2024-26636" ref_url="https://www.suse.com/security/cve/CVE-2024-26636/" source="CVE"/>
		<reference ref_id="CVE-2024-26641" ref_url="https://www.suse.com/security/cve/CVE-2024-26641/" source="CVE"/>
		<reference ref_id="CVE-2024-26644" ref_url="https://www.suse.com/security/cve/CVE-2024-26644/" source="CVE"/>
		<reference ref_id="CVE-2024-26661" ref_url="https://www.suse.com/security/cve/CVE-2024-26661/" source="CVE"/>
		<reference ref_id="CVE-2024-26663" ref_url="https://www.suse.com/security/cve/CVE-2024-26663/" source="CVE"/>
		<reference ref_id="CVE-2024-26665" ref_url="https://www.suse.com/security/cve/CVE-2024-26665/" source="CVE"/>
		<reference ref_id="CVE-2024-26720" ref_url="https://www.suse.com/security/cve/CVE-2024-26720/" source="CVE"/>
		<reference ref_id="CVE-2024-26800" ref_url="https://www.suse.com/security/cve/CVE-2024-26800/" source="CVE"/>
		<reference ref_id="CVE-2024-26802" ref_url="https://www.suse.com/security/cve/CVE-2024-26802/" source="CVE"/>
		<reference ref_id="CVE-2024-26813" ref_url="https://www.suse.com/security/cve/CVE-2024-26813/" source="CVE"/>
		<reference ref_id="CVE-2024-26814" ref_url="https://www.suse.com/security/cve/CVE-2024-26814/" source="CVE"/>
		<reference ref_id="CVE-2024-26842" ref_url="https://www.suse.com/security/cve/CVE-2024-26842/" source="CVE"/>
		<reference ref_id="CVE-2024-26845" ref_url="https://www.suse.com/security/cve/CVE-2024-26845/" source="CVE"/>
		<reference ref_id="CVE-2024-26863" ref_url="https://www.suse.com/security/cve/CVE-2024-26863/" source="CVE"/>
		<reference ref_id="CVE-2024-26923" ref_url="https://www.suse.com/security/cve/CVE-2024-26923/" source="CVE"/>
		<reference ref_id="CVE-2024-26935" ref_url="https://www.suse.com/security/cve/CVE-2024-26935/" source="CVE"/>
		<reference ref_id="CVE-2024-26961" ref_url="https://www.suse.com/security/cve/CVE-2024-26961/" source="CVE"/>
		<reference ref_id="CVE-2024-26973" ref_url="https://www.suse.com/security/cve/CVE-2024-26973/" source="CVE"/>
		<reference ref_id="CVE-2024-26976" ref_url="https://www.suse.com/security/cve/CVE-2024-26976/" source="CVE"/>
		<reference ref_id="CVE-2024-27015" ref_url="https://www.suse.com/security/cve/CVE-2024-27015/" source="CVE"/>
		<reference ref_id="CVE-2024-27019" ref_url="https://www.suse.com/security/cve/CVE-2024-27019/" source="CVE"/>
		<reference ref_id="CVE-2024-27020" ref_url="https://www.suse.com/security/cve/CVE-2024-27020/" source="CVE"/>
		<reference ref_id="CVE-2024-27025" ref_url="https://www.suse.com/security/cve/CVE-2024-27025/" source="CVE"/>
		<reference ref_id="CVE-2024-27065" ref_url="https://www.suse.com/security/cve/CVE-2024-27065/" source="CVE"/>
		<reference ref_id="CVE-2024-27402" ref_url="https://www.suse.com/security/cve/CVE-2024-27402/" source="CVE"/>
		<reference ref_id="CVE-2024-27432" ref_url="https://www.suse.com/security/cve/CVE-2024-27432/" source="CVE"/>
		<reference ref_id="CVE-2024-27437" ref_url="https://www.suse.com/security/cve/CVE-2024-27437/" source="CVE"/>
		<reference ref_id="CVE-2024-33619" ref_url="https://www.suse.com/security/cve/CVE-2024-33619/" source="CVE"/>
		<reference ref_id="CVE-2024-35247" ref_url="https://www.suse.com/security/cve/CVE-2024-35247/" source="CVE"/>
		<reference ref_id="CVE-2024-35789" ref_url="https://www.suse.com/security/cve/CVE-2024-35789/" source="CVE"/>
		<reference ref_id="CVE-2024-35790" ref_url="https://www.suse.com/security/cve/CVE-2024-35790/" source="CVE"/>
		<reference ref_id="CVE-2024-35805" ref_url="https://www.suse.com/security/cve/CVE-2024-35805/" source="CVE"/>
		<reference ref_id="CVE-2024-35807" ref_url="https://www.suse.com/security/cve/CVE-2024-35807/" source="CVE"/>
		<reference ref_id="CVE-2024-35814" ref_url="https://www.suse.com/security/cve/CVE-2024-35814/" source="CVE"/>
		<reference ref_id="CVE-2024-35819" ref_url="https://www.suse.com/security/cve/CVE-2024-35819/" source="CVE"/>
		<reference ref_id="CVE-2024-35835" ref_url="https://www.suse.com/security/cve/CVE-2024-35835/" source="CVE"/>
		<reference ref_id="CVE-2024-35837" ref_url="https://www.suse.com/security/cve/CVE-2024-35837/" source="CVE"/>
		<reference ref_id="CVE-2024-35848" ref_url="https://www.suse.com/security/cve/CVE-2024-35848/" source="CVE"/>
		<reference ref_id="CVE-2024-35853" ref_url="https://www.suse.com/security/cve/CVE-2024-35853/" source="CVE"/>
		<reference ref_id="CVE-2024-35855" ref_url="https://www.suse.com/security/cve/CVE-2024-35855/" source="CVE"/>
		<reference ref_id="CVE-2024-35857" ref_url="https://www.suse.com/security/cve/CVE-2024-35857/" source="CVE"/>
		<reference ref_id="CVE-2024-35861" ref_url="https://www.suse.com/security/cve/CVE-2024-35861/" source="CVE"/>
		<reference ref_id="CVE-2024-35862" ref_url="https://www.suse.com/security/cve/CVE-2024-35862/" source="CVE"/>
		<reference ref_id="CVE-2024-35864" ref_url="https://www.suse.com/security/cve/CVE-2024-35864/" source="CVE"/>
		<reference ref_id="CVE-2024-35869" ref_url="https://www.suse.com/security/cve/CVE-2024-35869/" source="CVE"/>
		<reference ref_id="CVE-2024-35878" ref_url="https://www.suse.com/security/cve/CVE-2024-35878/" source="CVE"/>
		<reference ref_id="CVE-2024-35884" ref_url="https://www.suse.com/security/cve/CVE-2024-35884/" source="CVE"/>
		<reference ref_id="CVE-2024-35886" ref_url="https://www.suse.com/security/cve/CVE-2024-35886/" source="CVE"/>
		<reference ref_id="CVE-2024-35889" ref_url="https://www.suse.com/security/cve/CVE-2024-35889/" source="CVE"/>
		<reference ref_id="CVE-2024-35890" ref_url="https://www.suse.com/security/cve/CVE-2024-35890/" source="CVE"/>
		<reference ref_id="CVE-2024-35893" ref_url="https://www.suse.com/security/cve/CVE-2024-35893/" source="CVE"/>
		<reference ref_id="CVE-2024-35896" ref_url="https://www.suse.com/security/cve/CVE-2024-35896/" source="CVE"/>
		<reference ref_id="CVE-2024-35898" ref_url="https://www.suse.com/security/cve/CVE-2024-35898/" source="CVE"/>
		<reference ref_id="CVE-2024-35899" ref_url="https://www.suse.com/security/cve/CVE-2024-35899/" source="CVE"/>
		<reference ref_id="CVE-2024-35900" ref_url="https://www.suse.com/security/cve/CVE-2024-35900/" source="CVE"/>
		<reference ref_id="CVE-2024-35905" ref_url="https://www.suse.com/security/cve/CVE-2024-35905/" source="CVE"/>
		<reference ref_id="CVE-2024-35925" ref_url="https://www.suse.com/security/cve/CVE-2024-35925/" source="CVE"/>
		<reference ref_id="CVE-2024-35934" ref_url="https://www.suse.com/security/cve/CVE-2024-35934/" source="CVE"/>
		<reference ref_id="CVE-2024-35949" ref_url="https://www.suse.com/security/cve/CVE-2024-35949/" source="CVE"/>
		<reference ref_id="CVE-2024-35950" ref_url="https://www.suse.com/security/cve/CVE-2024-35950/" source="CVE"/>
		<reference ref_id="CVE-2024-35956" ref_url="https://www.suse.com/security/cve/CVE-2024-35956/" source="CVE"/>
		<reference ref_id="CVE-2024-35958" ref_url="https://www.suse.com/security/cve/CVE-2024-35958/" source="CVE"/>
		<reference ref_id="CVE-2024-35960" ref_url="https://www.suse.com/security/cve/CVE-2024-35960/" source="CVE"/>
		<reference ref_id="CVE-2024-35961" ref_url="https://www.suse.com/security/cve/CVE-2024-35961/" source="CVE"/>
		<reference ref_id="CVE-2024-35962" ref_url="https://www.suse.com/security/cve/CVE-2024-35962/" source="CVE"/>
		<reference ref_id="CVE-2024-35979" ref_url="https://www.suse.com/security/cve/CVE-2024-35979/" source="CVE"/>
		<reference ref_id="CVE-2024-35995" ref_url="https://www.suse.com/security/cve/CVE-2024-35995/" source="CVE"/>
		<reference ref_id="CVE-2024-35997" ref_url="https://www.suse.com/security/cve/CVE-2024-35997/" source="CVE"/>
		<reference ref_id="CVE-2024-36000" ref_url="https://www.suse.com/security/cve/CVE-2024-36000/" source="CVE"/>
		<reference ref_id="CVE-2024-36004" ref_url="https://www.suse.com/security/cve/CVE-2024-36004/" source="CVE"/>
		<reference ref_id="CVE-2024-36005" ref_url="https://www.suse.com/security/cve/CVE-2024-36005/" source="CVE"/>
		<reference ref_id="CVE-2024-36008" ref_url="https://www.suse.com/security/cve/CVE-2024-36008/" source="CVE"/>
		<reference ref_id="CVE-2024-36017" ref_url="https://www.suse.com/security/cve/CVE-2024-36017/" source="CVE"/>
		<reference ref_id="CVE-2024-36020" ref_url="https://www.suse.com/security/cve/CVE-2024-36020/" source="CVE"/>
		<reference ref_id="CVE-2024-36021" ref_url="https://www.suse.com/security/cve/CVE-2024-36021/" source="CVE"/>
		<reference ref_id="CVE-2024-36025" ref_url="https://www.suse.com/security/cve/CVE-2024-36025/" source="CVE"/>
		<reference ref_id="CVE-2024-36288" ref_url="https://www.suse.com/security/cve/CVE-2024-36288/" source="CVE"/>
		<reference ref_id="CVE-2024-36477" ref_url="https://www.suse.com/security/cve/CVE-2024-36477/" source="CVE"/>
		<reference ref_id="CVE-2024-36478" ref_url="https://www.suse.com/security/cve/CVE-2024-36478/" source="CVE"/>
		<reference ref_id="CVE-2024-36479" ref_url="https://www.suse.com/security/cve/CVE-2024-36479/" source="CVE"/>
		<reference ref_id="CVE-2024-36889" ref_url="https://www.suse.com/security/cve/CVE-2024-36889/" source="CVE"/>
		<reference ref_id="CVE-2024-36890" ref_url="https://www.suse.com/security/cve/CVE-2024-36890/" source="CVE"/>
		<reference ref_id="CVE-2024-36894" ref_url="https://www.suse.com/security/cve/CVE-2024-36894/" source="CVE"/>
		<reference ref_id="CVE-2024-36899" ref_url="https://www.suse.com/security/cve/CVE-2024-36899/" source="CVE"/>
		<reference ref_id="CVE-2024-36900" ref_url="https://www.suse.com/security/cve/CVE-2024-36900/" source="CVE"/>
		<reference ref_id="CVE-2024-36901" ref_url="https://www.suse.com/security/cve/CVE-2024-36901/" source="CVE"/>
		<reference ref_id="CVE-2024-36902" ref_url="https://www.suse.com/security/cve/CVE-2024-36902/" source="CVE"/>
		<reference ref_id="CVE-2024-36904" ref_url="https://www.suse.com/security/cve/CVE-2024-36904/" source="CVE"/>
		<reference ref_id="CVE-2024-36909" ref_url="https://www.suse.com/security/cve/CVE-2024-36909/" source="CVE"/>
		<reference ref_id="CVE-2024-36910" ref_url="https://www.suse.com/security/cve/CVE-2024-36910/" source="CVE"/>
		<reference ref_id="CVE-2024-36911" ref_url="https://www.suse.com/security/cve/CVE-2024-36911/" source="CVE"/>
		<reference ref_id="CVE-2024-36912" ref_url="https://www.suse.com/security/cve/CVE-2024-36912/" source="CVE"/>
		<reference ref_id="CVE-2024-36913" ref_url="https://www.suse.com/security/cve/CVE-2024-36913/" source="CVE"/>
		<reference ref_id="CVE-2024-36914" ref_url="https://www.suse.com/security/cve/CVE-2024-36914/" source="CVE"/>
		<reference ref_id="CVE-2024-36915" ref_url="https://www.suse.com/security/cve/CVE-2024-36915/" source="CVE"/>
		<reference ref_id="CVE-2024-36916" ref_url="https://www.suse.com/security/cve/CVE-2024-36916/" source="CVE"/>
		<reference ref_id="CVE-2024-36917" ref_url="https://www.suse.com/security/cve/CVE-2024-36917/" source="CVE"/>
		<reference ref_id="CVE-2024-36919" ref_url="https://www.suse.com/security/cve/CVE-2024-36919/" source="CVE"/>
		<reference ref_id="CVE-2024-36923" ref_url="https://www.suse.com/security/cve/CVE-2024-36923/" source="CVE"/>
		<reference ref_id="CVE-2024-36934" ref_url="https://www.suse.com/security/cve/CVE-2024-36934/" source="CVE"/>
		<reference ref_id="CVE-2024-36937" ref_url="https://www.suse.com/security/cve/CVE-2024-36937/" source="CVE"/>
		<reference ref_id="CVE-2024-36939" ref_url="https://www.suse.com/security/cve/CVE-2024-36939/" source="CVE"/>
		<reference ref_id="CVE-2024-36940" ref_url="https://www.suse.com/security/cve/CVE-2024-36940/" source="CVE"/>
		<reference ref_id="CVE-2024-36945" ref_url="https://www.suse.com/security/cve/CVE-2024-36945/" source="CVE"/>
		<reference ref_id="CVE-2024-36946" ref_url="https://www.suse.com/security/cve/CVE-2024-36946/" source="CVE"/>
		<reference ref_id="CVE-2024-36949" ref_url="https://www.suse.com/security/cve/CVE-2024-36949/" source="CVE"/>
		<reference ref_id="CVE-2024-36960" ref_url="https://www.suse.com/security/cve/CVE-2024-36960/" source="CVE"/>
		<reference ref_id="CVE-2024-36964" ref_url="https://www.suse.com/security/cve/CVE-2024-36964/" source="CVE"/>
		<reference ref_id="CVE-2024-36965" ref_url="https://www.suse.com/security/cve/CVE-2024-36965/" source="CVE"/>
		<reference ref_id="CVE-2024-36967" ref_url="https://www.suse.com/security/cve/CVE-2024-36967/" source="CVE"/>
		<reference ref_id="CVE-2024-36969" ref_url="https://www.suse.com/security/cve/CVE-2024-36969/" source="CVE"/>
		<reference ref_id="CVE-2024-36971" ref_url="https://www.suse.com/security/cve/CVE-2024-36971/" source="CVE"/>
		<reference ref_id="CVE-2024-36974" ref_url="https://www.suse.com/security/cve/CVE-2024-36974/" source="CVE"/>
		<reference ref_id="CVE-2024-36975" ref_url="https://www.suse.com/security/cve/CVE-2024-36975/" source="CVE"/>
		<reference ref_id="CVE-2024-36978" ref_url="https://www.suse.com/security/cve/CVE-2024-36978/" source="CVE"/>
		<reference ref_id="CVE-2024-37021" ref_url="https://www.suse.com/security/cve/CVE-2024-37021/" source="CVE"/>
		<reference ref_id="CVE-2024-37078" ref_url="https://www.suse.com/security/cve/CVE-2024-37078/" source="CVE"/>
		<reference ref_id="CVE-2024-37354" ref_url="https://www.suse.com/security/cve/CVE-2024-37354/" source="CVE"/>
		<reference ref_id="CVE-2024-38381" ref_url="https://www.suse.com/security/cve/CVE-2024-38381/" source="CVE"/>
		<reference ref_id="CVE-2024-38388" ref_url="https://www.suse.com/security/cve/CVE-2024-38388/" source="CVE"/>
		<reference ref_id="CVE-2024-38390" ref_url="https://www.suse.com/security/cve/CVE-2024-38390/" source="CVE"/>
		<reference ref_id="CVE-2024-38540" ref_url="https://www.suse.com/security/cve/CVE-2024-38540/" source="CVE"/>
		<reference ref_id="CVE-2024-38541" ref_url="https://www.suse.com/security/cve/CVE-2024-38541/" source="CVE"/>
		<reference ref_id="CVE-2024-38544" ref_url="https://www.suse.com/security/cve/CVE-2024-38544/" source="CVE"/>
		<reference ref_id="CVE-2024-38545" ref_url="https://www.suse.com/security/cve/CVE-2024-38545/" source="CVE"/>
		<reference ref_id="CVE-2024-38546" ref_url="https://www.suse.com/security/cve/CVE-2024-38546/" source="CVE"/>
		<reference ref_id="CVE-2024-38547" ref_url="https://www.suse.com/security/cve/CVE-2024-38547/" source="CVE"/>
		<reference ref_id="CVE-2024-38548" ref_url="https://www.suse.com/security/cve/CVE-2024-38548/" source="CVE"/>
		<reference ref_id="CVE-2024-38549" ref_url="https://www.suse.com/security/cve/CVE-2024-38549/" source="CVE"/>
		<reference ref_id="CVE-2024-38550" ref_url="https://www.suse.com/security/cve/CVE-2024-38550/" source="CVE"/>
		<reference ref_id="CVE-2024-38552" ref_url="https://www.suse.com/security/cve/CVE-2024-38552/" source="CVE"/>
		<reference ref_id="CVE-2024-38553" ref_url="https://www.suse.com/security/cve/CVE-2024-38553/" source="CVE"/>
		<reference ref_id="CVE-2024-38555" ref_url="https://www.suse.com/security/cve/CVE-2024-38555/" source="CVE"/>
		<reference ref_id="CVE-2024-38556" ref_url="https://www.suse.com/security/cve/CVE-2024-38556/" source="CVE"/>
		<reference ref_id="CVE-2024-38557" ref_url="https://www.suse.com/security/cve/CVE-2024-38557/" source="CVE"/>
		<reference ref_id="CVE-2024-38558" ref_url="https://www.suse.com/security/cve/CVE-2024-38558/" source="CVE"/>
		<reference ref_id="CVE-2024-38559" ref_url="https://www.suse.com/security/cve/CVE-2024-38559/" source="CVE"/>
		<reference ref_id="CVE-2024-38560" ref_url="https://www.suse.com/security/cve/CVE-2024-38560/" source="CVE"/>
		<reference ref_id="CVE-2024-38564" ref_url="https://www.suse.com/security/cve/CVE-2024-38564/" source="CVE"/>
		<reference ref_id="CVE-2024-38565" ref_url="https://www.suse.com/security/cve/CVE-2024-38565/" source="CVE"/>
		<reference ref_id="CVE-2024-38567" ref_url="https://www.suse.com/security/cve/CVE-2024-38567/" source="CVE"/>
		<reference ref_id="CVE-2024-38568" ref_url="https://www.suse.com/security/cve/CVE-2024-38568/" source="CVE"/>
		<reference ref_id="CVE-2024-38570" ref_url="https://www.suse.com/security/cve/CVE-2024-38570/" source="CVE"/>
		<reference ref_id="CVE-2024-38571" ref_url="https://www.suse.com/security/cve/CVE-2024-38571/" source="CVE"/>
		<reference ref_id="CVE-2024-38573" ref_url="https://www.suse.com/security/cve/CVE-2024-38573/" source="CVE"/>
		<reference ref_id="CVE-2024-38578" ref_url="https://www.suse.com/security/cve/CVE-2024-38578/" source="CVE"/>
		<reference ref_id="CVE-2024-38579" ref_url="https://www.suse.com/security/cve/CVE-2024-38579/" source="CVE"/>
		<reference ref_id="CVE-2024-38580" ref_url="https://www.suse.com/security/cve/CVE-2024-38580/" source="CVE"/>
		<reference ref_id="CVE-2024-38581" ref_url="https://www.suse.com/security/cve/CVE-2024-38581/" source="CVE"/>
		<reference ref_id="CVE-2024-38582" ref_url="https://www.suse.com/security/cve/CVE-2024-38582/" source="CVE"/>
		<reference ref_id="CVE-2024-38583" ref_url="https://www.suse.com/security/cve/CVE-2024-38583/" source="CVE"/>
		<reference ref_id="CVE-2024-38586" ref_url="https://www.suse.com/security/cve/CVE-2024-38586/" source="CVE"/>
		<reference ref_id="CVE-2024-38587" ref_url="https://www.suse.com/security/cve/CVE-2024-38587/" source="CVE"/>
		<reference ref_id="CVE-2024-38588" ref_url="https://www.suse.com/security/cve/CVE-2024-38588/" source="CVE"/>
		<reference ref_id="CVE-2024-38590" ref_url="https://www.suse.com/security/cve/CVE-2024-38590/" source="CVE"/>
		<reference ref_id="CVE-2024-38591" ref_url="https://www.suse.com/security/cve/CVE-2024-38591/" source="CVE"/>
		<reference ref_id="CVE-2024-38594" ref_url="https://www.suse.com/security/cve/CVE-2024-38594/" source="CVE"/>
		<reference ref_id="CVE-2024-38597" ref_url="https://www.suse.com/security/cve/CVE-2024-38597/" source="CVE"/>
		<reference ref_id="CVE-2024-38598" ref_url="https://www.suse.com/security/cve/CVE-2024-38598/" source="CVE"/>
		<reference ref_id="CVE-2024-38599" ref_url="https://www.suse.com/security/cve/CVE-2024-38599/" source="CVE"/>
		<reference ref_id="CVE-2024-38600" ref_url="https://www.suse.com/security/cve/CVE-2024-38600/" source="CVE"/>
		<reference ref_id="CVE-2024-38601" ref_url="https://www.suse.com/security/cve/CVE-2024-38601/" source="CVE"/>
		<reference ref_id="CVE-2024-38603" ref_url="https://www.suse.com/security/cve/CVE-2024-38603/" source="CVE"/>
		<reference ref_id="CVE-2024-38605" ref_url="https://www.suse.com/security/cve/CVE-2024-38605/" source="CVE"/>
		<reference ref_id="CVE-2024-38608" ref_url="https://www.suse.com/security/cve/CVE-2024-38608/" source="CVE"/>
		<reference ref_id="CVE-2024-38616" ref_url="https://www.suse.com/security/cve/CVE-2024-38616/" source="CVE"/>
		<reference ref_id="CVE-2024-38618" ref_url="https://www.suse.com/security/cve/CVE-2024-38618/" source="CVE"/>
		<reference ref_id="CVE-2024-38619" ref_url="https://www.suse.com/security/cve/CVE-2024-38619/" source="CVE"/>
		<reference ref_id="CVE-2024-38621" ref_url="https://www.suse.com/security/cve/CVE-2024-38621/" source="CVE"/>
		<reference ref_id="CVE-2024-38627" ref_url="https://www.suse.com/security/cve/CVE-2024-38627/" source="CVE"/>
		<reference ref_id="CVE-2024-38628" ref_url="https://www.suse.com/security/cve/CVE-2024-38628/" source="CVE"/>
		<reference ref_id="CVE-2024-38630" ref_url="https://www.suse.com/security/cve/CVE-2024-38630/" source="CVE"/>
		<reference ref_id="CVE-2024-38633" ref_url="https://www.suse.com/security/cve/CVE-2024-38633/" source="CVE"/>
		<reference ref_id="CVE-2024-38634" ref_url="https://www.suse.com/security/cve/CVE-2024-38634/" source="CVE"/>
		<reference ref_id="CVE-2024-38635" ref_url="https://www.suse.com/security/cve/CVE-2024-38635/" source="CVE"/>
		<reference ref_id="CVE-2024-38659" ref_url="https://www.suse.com/security/cve/CVE-2024-38659/" source="CVE"/>
		<reference ref_id="CVE-2024-38661" ref_url="https://www.suse.com/security/cve/CVE-2024-38661/" source="CVE"/>
		<reference ref_id="CVE-2024-38780" ref_url="https://www.suse.com/security/cve/CVE-2024-38780/" source="CVE"/>
		<reference ref_id="CVE-2024-39276" ref_url="https://www.suse.com/security/cve/CVE-2024-39276/" source="CVE"/>
		<reference ref_id="CVE-2024-39301" ref_url="https://www.suse.com/security/cve/CVE-2024-39301/" source="CVE"/>
		<reference ref_id="CVE-2024-39371" ref_url="https://www.suse.com/security/cve/CVE-2024-39371/" source="CVE"/>
		<reference ref_id="CVE-2024-39463" ref_url="https://www.suse.com/security/cve/CVE-2024-39463/" source="CVE"/>
		<reference ref_id="CVE-2024-39468" ref_url="https://www.suse.com/security/cve/CVE-2024-39468/" source="CVE"/>
		<reference ref_id="CVE-2024-39469" ref_url="https://www.suse.com/security/cve/CVE-2024-39469/" source="CVE"/>
		<reference ref_id="CVE-2024-39471" ref_url="https://www.suse.com/security/cve/CVE-2024-39471/" source="CVE"/>
		<reference ref_id="CVE-2024-39472" ref_url="https://www.suse.com/security/cve/CVE-2024-39472/" source="CVE"/>
		<reference ref_id="CVE-2024-39475" ref_url="https://www.suse.com/security/cve/CVE-2024-39475/" source="CVE"/>
		<reference ref_id="CVE-2024-39482" ref_url="https://www.suse.com/security/cve/CVE-2024-39482/" source="CVE"/>
		<reference ref_id="CVE-2024-39487" ref_url="https://www.suse.com/security/cve/CVE-2024-39487/" source="CVE"/>
		<reference ref_id="CVE-2024-39488" ref_url="https://www.suse.com/security/cve/CVE-2024-39488/" source="CVE"/>
		<reference ref_id="CVE-2024-39490" ref_url="https://www.suse.com/security/cve/CVE-2024-39490/" source="CVE"/>
		<reference ref_id="CVE-2024-39493" ref_url="https://www.suse.com/security/cve/CVE-2024-39493/" source="CVE"/>
		<reference ref_id="CVE-2024-39494" ref_url="https://www.suse.com/security/cve/CVE-2024-39494/" source="CVE"/>
		<reference ref_id="CVE-2024-39497" ref_url="https://www.suse.com/security/cve/CVE-2024-39497/" source="CVE"/>
		<reference ref_id="CVE-2024-39499" ref_url="https://www.suse.com/security/cve/CVE-2024-39499/" source="CVE"/>
		<reference ref_id="CVE-2024-39500" ref_url="https://www.suse.com/security/cve/CVE-2024-39500/" source="CVE"/>
		<reference ref_id="CVE-2024-39501" ref_url="https://www.suse.com/security/cve/CVE-2024-39501/" source="CVE"/>
		<reference ref_id="CVE-2024-39502" ref_url="https://www.suse.com/security/cve/CVE-2024-39502/" source="CVE"/>
		<reference ref_id="CVE-2024-39505" ref_url="https://www.suse.com/security/cve/CVE-2024-39505/" source="CVE"/>
		<reference ref_id="CVE-2024-39506" ref_url="https://www.suse.com/security/cve/CVE-2024-39506/" source="CVE"/>
		<reference ref_id="CVE-2024-39507" ref_url="https://www.suse.com/security/cve/CVE-2024-39507/" source="CVE"/>
		<reference ref_id="CVE-2024-39508" ref_url="https://www.suse.com/security/cve/CVE-2024-39508/" source="CVE"/>
		<reference ref_id="CVE-2024-39509" ref_url="https://www.suse.com/security/cve/CVE-2024-39509/" source="CVE"/>
		<reference ref_id="CVE-2024-40900" ref_url="https://www.suse.com/security/cve/CVE-2024-40900/" source="CVE"/>
		<reference ref_id="CVE-2024-40901" ref_url="https://www.suse.com/security/cve/CVE-2024-40901/" source="CVE"/>
		<reference ref_id="CVE-2024-40902" ref_url="https://www.suse.com/security/cve/CVE-2024-40902/" source="CVE"/>
		<reference ref_id="CVE-2024-40903" ref_url="https://www.suse.com/security/cve/CVE-2024-40903/" source="CVE"/>
		<reference ref_id="CVE-2024-40904" ref_url="https://www.suse.com/security/cve/CVE-2024-40904/" source="CVE"/>
		<reference ref_id="CVE-2024-40906" ref_url="https://www.suse.com/security/cve/CVE-2024-40906/" source="CVE"/>
		<reference ref_id="CVE-2024-40908" ref_url="https://www.suse.com/security/cve/CVE-2024-40908/" source="CVE"/>
		<reference ref_id="CVE-2024-40909" ref_url="https://www.suse.com/security/cve/CVE-2024-40909/" source="CVE"/>
		<reference ref_id="CVE-2024-40911" ref_url="https://www.suse.com/security/cve/CVE-2024-40911/" source="CVE"/>
		<reference ref_id="CVE-2024-40912" ref_url="https://www.suse.com/security/cve/CVE-2024-40912/" source="CVE"/>
		<reference ref_id="CVE-2024-40916" ref_url="https://www.suse.com/security/cve/CVE-2024-40916/" source="CVE"/>
		<reference ref_id="CVE-2024-40919" ref_url="https://www.suse.com/security/cve/CVE-2024-40919/" source="CVE"/>
		<reference ref_id="CVE-2024-40923" ref_url="https://www.suse.com/security/cve/CVE-2024-40923/" source="CVE"/>
		<reference ref_id="CVE-2024-40924" ref_url="https://www.suse.com/security/cve/CVE-2024-40924/" source="CVE"/>
		<reference ref_id="CVE-2024-40927" ref_url="https://www.suse.com/security/cve/CVE-2024-40927/" source="CVE"/>
		<reference ref_id="CVE-2024-40929" ref_url="https://www.suse.com/security/cve/CVE-2024-40929/" source="CVE"/>
		<reference ref_id="CVE-2024-40931" ref_url="https://www.suse.com/security/cve/CVE-2024-40931/" source="CVE"/>
		<reference ref_id="CVE-2024-40932" ref_url="https://www.suse.com/security/cve/CVE-2024-40932/" source="CVE"/>
		<reference ref_id="CVE-2024-40934" ref_url="https://www.suse.com/security/cve/CVE-2024-40934/" source="CVE"/>
		<reference ref_id="CVE-2024-40935" ref_url="https://www.suse.com/security/cve/CVE-2024-40935/" source="CVE"/>
		<reference ref_id="CVE-2024-40937" ref_url="https://www.suse.com/security/cve/CVE-2024-40937/" source="CVE"/>
		<reference ref_id="CVE-2024-40940" ref_url="https://www.suse.com/security/cve/CVE-2024-40940/" source="CVE"/>
		<reference ref_id="CVE-2024-40941" ref_url="https://www.suse.com/security/cve/CVE-2024-40941/" source="CVE"/>
		<reference ref_id="CVE-2024-40942" ref_url="https://www.suse.com/security/cve/CVE-2024-40942/" source="CVE"/>
		<reference ref_id="CVE-2024-40943" ref_url="https://www.suse.com/security/cve/CVE-2024-40943/" source="CVE"/>
		<reference ref_id="CVE-2024-40945" ref_url="https://www.suse.com/security/cve/CVE-2024-40945/" source="CVE"/>
		<reference ref_id="CVE-2024-40953" ref_url="https://www.suse.com/security/cve/CVE-2024-40953/" source="CVE"/>
		<reference ref_id="CVE-2024-40954" ref_url="https://www.suse.com/security/cve/CVE-2024-40954/" source="CVE"/>
		<reference ref_id="CVE-2024-40956" ref_url="https://www.suse.com/security/cve/CVE-2024-40956/" source="CVE"/>
		<reference ref_id="CVE-2024-40958" ref_url="https://www.suse.com/security/cve/CVE-2024-40958/" source="CVE"/>
		<reference ref_id="CVE-2024-40959" ref_url="https://www.suse.com/security/cve/CVE-2024-40959/" source="CVE"/>
		<reference ref_id="CVE-2024-40960" ref_url="https://www.suse.com/security/cve/CVE-2024-40960/" source="CVE"/>
		<reference ref_id="CVE-2024-40961" ref_url="https://www.suse.com/security/cve/CVE-2024-40961/" source="CVE"/>
		<reference ref_id="CVE-2024-40966" ref_url="https://www.suse.com/security/cve/CVE-2024-40966/" source="CVE"/>
		<reference ref_id="CVE-2024-40967" ref_url="https://www.suse.com/security/cve/CVE-2024-40967/" source="CVE"/>
		<reference ref_id="CVE-2024-40970" ref_url="https://www.suse.com/security/cve/CVE-2024-40970/" source="CVE"/>
		<reference ref_id="CVE-2024-40972" ref_url="https://www.suse.com/security/cve/CVE-2024-40972/" source="CVE"/>
		<reference ref_id="CVE-2024-40976" ref_url="https://www.suse.com/security/cve/CVE-2024-40976/" source="CVE"/>
		<reference ref_id="CVE-2024-40977" ref_url="https://www.suse.com/security/cve/CVE-2024-40977/" source="CVE"/>
		<reference ref_id="CVE-2024-40981" ref_url="https://www.suse.com/security/cve/CVE-2024-40981/" source="CVE"/>
		<reference ref_id="CVE-2024-40982" ref_url="https://www.suse.com/security/cve/CVE-2024-40982/" source="CVE"/>
		<reference ref_id="CVE-2024-40984" ref_url="https://www.suse.com/security/cve/CVE-2024-40984/" source="CVE"/>
		<reference ref_id="CVE-2024-40987" ref_url="https://www.suse.com/security/cve/CVE-2024-40987/" source="CVE"/>
		<reference ref_id="CVE-2024-40988" ref_url="https://www.suse.com/security/cve/CVE-2024-40988/" source="CVE"/>
		<reference ref_id="CVE-2024-40989" ref_url="https://www.suse.com/security/cve/CVE-2024-40989/" source="CVE"/>
		<reference ref_id="CVE-2024-40990" ref_url="https://www.suse.com/security/cve/CVE-2024-40990/" source="CVE"/>
		<reference ref_id="CVE-2024-40994" ref_url="https://www.suse.com/security/cve/CVE-2024-40994/" source="CVE"/>
		<reference ref_id="CVE-2024-40998" ref_url="https://www.suse.com/security/cve/CVE-2024-40998/" source="CVE"/>
		<reference ref_id="CVE-2024-40999" ref_url="https://www.suse.com/security/cve/CVE-2024-40999/" source="CVE"/>
		<reference ref_id="CVE-2024-41002" ref_url="https://www.suse.com/security/cve/CVE-2024-41002/" source="CVE"/>
		<reference ref_id="CVE-2024-41004" ref_url="https://www.suse.com/security/cve/CVE-2024-41004/" source="CVE"/>
		<reference ref_id="CVE-2024-41006" ref_url="https://www.suse.com/security/cve/CVE-2024-41006/" source="CVE"/>
		<reference ref_id="CVE-2024-41009" ref_url="https://www.suse.com/security/cve/CVE-2024-41009/" source="CVE"/>
		<reference ref_id="CVE-2024-41011" ref_url="https://www.suse.com/security/cve/CVE-2024-41011/" source="CVE"/>
		<reference ref_id="CVE-2024-41012" ref_url="https://www.suse.com/security/cve/CVE-2024-41012/" source="CVE"/>
		<reference ref_id="CVE-2024-41013" ref_url="https://www.suse.com/security/cve/CVE-2024-41013/" source="CVE"/>
		<reference ref_id="CVE-2024-41014" ref_url="https://www.suse.com/security/cve/CVE-2024-41014/" source="CVE"/>
		<reference ref_id="CVE-2024-41015" ref_url="https://www.suse.com/security/cve/CVE-2024-41015/" source="CVE"/>
		<reference ref_id="CVE-2024-41016" ref_url="https://www.suse.com/security/cve/CVE-2024-41016/" source="CVE"/>
		<reference ref_id="CVE-2024-41017" ref_url="https://www.suse.com/security/cve/CVE-2024-41017/" source="CVE"/>
		<reference ref_id="CVE-2024-41040" ref_url="https://www.suse.com/security/cve/CVE-2024-41040/" source="CVE"/>
		<reference ref_id="CVE-2024-41041" ref_url="https://www.suse.com/security/cve/CVE-2024-41041/" source="CVE"/>
		<reference ref_id="CVE-2024-41044" ref_url="https://www.suse.com/security/cve/CVE-2024-41044/" source="CVE"/>
		<reference ref_id="CVE-2024-41048" ref_url="https://www.suse.com/security/cve/CVE-2024-41048/" source="CVE"/>
		<reference ref_id="CVE-2024-41057" ref_url="https://www.suse.com/security/cve/CVE-2024-41057/" source="CVE"/>
		<reference ref_id="CVE-2024-41058" ref_url="https://www.suse.com/security/cve/CVE-2024-41058/" source="CVE"/>
		<reference ref_id="CVE-2024-41059" ref_url="https://www.suse.com/security/cve/CVE-2024-41059/" source="CVE"/>
		<reference ref_id="CVE-2024-41063" ref_url="https://www.suse.com/security/cve/CVE-2024-41063/" source="CVE"/>
		<reference ref_id="CVE-2024-41064" ref_url="https://www.suse.com/security/cve/CVE-2024-41064/" source="CVE"/>
		<reference ref_id="CVE-2024-41066" ref_url="https://www.suse.com/security/cve/CVE-2024-41066/" source="CVE"/>
		<reference ref_id="CVE-2024-41069" ref_url="https://www.suse.com/security/cve/CVE-2024-41069/" source="CVE"/>
		<reference ref_id="CVE-2024-41070" ref_url="https://www.suse.com/security/cve/CVE-2024-41070/" source="CVE"/>
		<reference ref_id="CVE-2024-41071" ref_url="https://www.suse.com/security/cve/CVE-2024-41071/" source="CVE"/>
		<reference ref_id="CVE-2024-41072" ref_url="https://www.suse.com/security/cve/CVE-2024-41072/" source="CVE"/>
		<reference ref_id="CVE-2024-41076" ref_url="https://www.suse.com/security/cve/CVE-2024-41076/" source="CVE"/>
		<reference ref_id="CVE-2024-41078" ref_url="https://www.suse.com/security/cve/CVE-2024-41078/" source="CVE"/>
		<reference ref_id="CVE-2024-41081" ref_url="https://www.suse.com/security/cve/CVE-2024-41081/" source="CVE"/>
		<reference ref_id="CVE-2024-41087" ref_url="https://www.suse.com/security/cve/CVE-2024-41087/" source="CVE"/>
		<reference ref_id="CVE-2024-41090" ref_url="https://www.suse.com/security/cve/CVE-2024-41090/" source="CVE"/>
		<reference ref_id="CVE-2024-41091" ref_url="https://www.suse.com/security/cve/CVE-2024-41091/" source="CVE"/>
		<reference ref_id="CVE-2024-42070" ref_url="https://www.suse.com/security/cve/CVE-2024-42070/" source="CVE"/>
		<reference ref_id="CVE-2024-42079" ref_url="https://www.suse.com/security/cve/CVE-2024-42079/" source="CVE"/>
		<reference ref_id="CVE-2024-42093" ref_url="https://www.suse.com/security/cve/CVE-2024-42093/" source="CVE"/>
		<reference ref_id="CVE-2024-42096" ref_url="https://www.suse.com/security/cve/CVE-2024-42096/" source="CVE"/>
		<reference ref_id="CVE-2024-42105" ref_url="https://www.suse.com/security/cve/CVE-2024-42105/" source="CVE"/>
		<reference ref_id="CVE-2024-42122" ref_url="https://www.suse.com/security/cve/CVE-2024-42122/" source="CVE"/>
		<reference ref_id="CVE-2024-42124" ref_url="https://www.suse.com/security/cve/CVE-2024-42124/" source="CVE"/>
		<reference ref_id="CVE-2024-42145" ref_url="https://www.suse.com/security/cve/CVE-2024-42145/" source="CVE"/>
		<reference ref_id="CVE-2024-42161" ref_url="https://www.suse.com/security/cve/CVE-2024-42161/" source="CVE"/>
		<reference ref_id="CVE-2024-42224" ref_url="https://www.suse.com/security/cve/CVE-2024-42224/" source="CVE"/>
		<reference ref_id="CVE-2024-42230" ref_url="https://www.suse.com/security/cve/CVE-2024-42230/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2021-47086: phonet/pep: refuse to enable an unbound pipe (bsc#1220952).
- CVE-2021-47089: kfence: fix memory leak when cat kfence objects (bsc#1220958).
- CVE-2021-47103: net: sock: preserve kabi for sock (bsc#1221010).
- CVE-2021-47186: tipc: check for null after calling kmemdup (bsc#1222702).
- CVE-2021-47432: lib/generic-radix-tree.c: Do not overflow in peek() (bsc#1225391).
- CVE-2021-47515: seg6: fix the iif in the IPv6 socket control block (bsc#1225426).
- CVE-2021-47538: rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() (bsc#1225448).
- CVE-2021-47539: rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle() (bsc#1225452).
- CVE-2021-47546: ipv6: fix memory leak in fib6_rule_suppress (bsc#1225504).
- CVE-2021-47547: net: tulip: de4x5: fix the problem that the array 'lp-&gt;phy' may be out of bound (bsc#1225505).
- CVE-2021-47555: net: vlan: fix underflow for the real_dev refcnt (bsc#1225467).
- CVE-2021-47566: Fix clearing user buffer by properly using clear_user() (bsc#1225514).
- CVE-2021-47571: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() (bsc#1225518).
- CVE-2021-47572: net: nexthop: fix null pointer dereference when IPv6 is not enabled (bsc#1225389).
- CVE-2021-47588: sit: do not call ipip6_dev_free() from sit_init_net() (bsc#1226568).
- CVE-2021-47590: mptcp: fix deadlock in __mptcp_push_pending() (bsc#1226565).
- CVE-2021-47591: mptcp: remove tcp ulp setsockopt support (bsc#1226570).
- CVE-2021-47593: mptcp: clear 'kern' flag from fallback sockets (bsc#1226551).
- CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1226574).
- CVE-2021-47599: btrfs: use latest_dev in btrfs_show_devname (bsc#1226571).
- CVE-2021-47606: net: netlink: af_netlink: Prevent empty skb by adding a check on len. (bsc#1226555).
- CVE-2021-47623: powerpc/fixmap: Fix VM debug warning on unmap (bsc#1227919).
- CVE-2022-48716: ASoC: codecs: wcd938x: fix incorrect used of portid (bsc#1226678).
- CVE-2022-48785: ipv6: mcast: use rcu-safe version of ipv6_get_lladdr() (bsc#1227927)
- CVE-2022-48810: ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path (bsc#1227936).
- CVE-2022-48850: net-sysfs: add check for netdevice being present to speed_show (bsc#1228071).
- CVE-2022-48855: sctp: fix kernel-infoleak for SCTP sockets (bsc#1228003).
- CVE-2023-24023: Bluetooth: Add more enc key size check (bsc#1218148).
- CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138).
- CVE-2023-52573: net: rds: Fix possible NULL-pointer dereference (bsc#1220869).
- CVE-2023-52580: net/core: Fix ETH_P_1588 flow dissector (bsc#1220876).
- CVE-2023-52622: ext4: avoid online resizing failures due to oversized flex bg (bsc#1222080).
- CVE-2023-52658: Revert 'net/mlx5: Block entering switchdev mode with ns inconsistency' (bsc#1224719).
- CVE-2023-52667: net/mlx5e: fix a potential double-free in fs_any_create_groups (bsc#1224603).
- CVE-2023-52670: rpmsg: virtio: Free driver_override when rpmsg_remove() (bsc#1224696).
- CVE-2023-52672: pipe: wakeup wr_wait after setting max_usage (bsc#1224614).
- CVE-2023-52675: powerpc/imc-pmu: Add a null pointer check in update_events_in_group() (bsc#1224504).
- CVE-2023-52735: bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself (bsc#1225475).
- CVE-2023-52737: btrfs: lock the inode in shared mode before starting fiemap (bsc#1225484).
- CVE-2023-52751: smb: client: fix use-after-free in smb2_query_info_compound() (bsc#1225489).
- CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487).
- CVE-2023-52762: virtio-blk: fix implicit overflow on virtio_max_dma_size (bsc#1225573).
- CVE-2023-52775: net/smc: avoid data corruption caused by decline (bsc#1225088).
- CVE-2023-52784: bonding: stop the device in bond_setup_by_slave() (bsc#1224946).
- CVE-2023-52787: blk-mq: make sure active queue usage is held for bio_integrity_prep() (bsc#1225105).
- CVE-2023-52812: drm/amd: check num of link levels when update pcie param (bsc#1225564).
- CVE-2023-52835: perf/core: Bail out early if the request AUX area is out of bound (bsc#1225602).
- CVE-2023-52837: nbd: fix uaf in nbd_open (bsc#1224935).
- CVE-2023-52843: llc: verify mac len before reading mac header (bsc#1224951).
- CVE-2023-52845: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (bsc#1225585).
- CVE-2023-52846: hsr: Prevent use after free in prp_create_tagged_frame() (bsc#1225098).
- CVE-2023-52857: drm/mediatek: Fix coverity issue with unintentional integer overflow (bsc#1225581).
- CVE-2023-52863: hwmon: (axi-fan-control) Fix possible NULL pointer dereference (bsc#1225586).
- CVE-2023-52869: pstore/platform: Add check for kstrdup (bsc#1225050).
- CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).
- CVE-2023-52882: clk: sunxi-ng: h6: Reparent CPUX during PLL CPUX rate change (bsc#1225692).
- CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection dump (bsc#1220942).
- CVE-2024-26625: Call sock_orphan() at release time (bsc#1221086)
- CVE-2024-26633: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() (bsc#1221647).
- CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656).
- CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding changes (bsc#1221659).
- CVE-2024-26641: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() (bsc#1221654).
- CVE-2024-26644: btrfs: do not abort filesystem when attempting to snapshot deleted subvolume (bsc#1221282, bsc#1222072).
- CVE-2024-26661: drm/amd/display: Add NULL test for 'timing generator' in 'dcn21_set_pipe()' (bsc#1222323).
- CVE-2024-26663: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (bsc#1222326).
- CVE-2024-26665: tunnels: fix out of bounds access when building IPv6 PMTU error (bsc#1222328).
- CVE-2024-26720: mm: Avoid overflows in dirty throttling logic (bsc#1222364).
- CVE-2024-26802: stmmac: Clear variable when destroying workqueue (bsc#1222799).
- CVE-2024-26813: vfio/platform: Create persistent IRQ handlers (bsc#1222809).
- CVE-2024-26814: vfio/fsl-mc: Block calling interrupt handler without trigger (bsc#1222810).
- CVE-2024-26842: scsi: target: core: Add TMF to tmr_list handling (bsc#1223013).
- CVE-2024-26845: scsi: target: core: Add TMF to tmr_list handling (bsc#1223018).
- CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node() (bsc#1223021).
- CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384).
- CVE-2024-26961: mac802154: fix llsec key resources release in mac802154_llsec_key_del (bsc#1223652).
- CVE-2024-26973: fat: fix uninitialized field in nostale filehandles (bsc#1223641).
- CVE-2024-27015: netfilter: flowtable: incorrect pppoe tuple (bsc#1223806).
- CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (bsc#1223813)
- CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (bsc#1223815)
- CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778)
- CVE-2024-27065: netfilter: nf_tables: do not compare internal table flags on updates (bsc#1223836).
- CVE-2024-27402: phonet/pep: fix racy skb_queue_empty() use (bsc#1224414).
- CVE-2024-27432: net: ethernet: mtk_eth_soc: fix PPE hanging issue (bsc#1224716).
- CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ (bsc#1222625).
- CVE-2024-35247: fpga: region: add owner module and take its refcount (bsc#1226948).
- CVE-2024-35789: Check fast rx for non-4addr sta VLAN changes (bsc#1224749).
- CVE-2024-35790: usb: typec: altmodes/displayport: create sysfs nodes as driver's default device attribute group (bsc#1224712).
- CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit (bsc#1224743).
- CVE-2024-35807: ext4: fix corruption during on-line resize (bsc#1224735).
- CVE-2024-35819: soc: fsl: qbman: Use raw spinlock for cgr_lock (bsc#1224683).
- CVE-2024-35835: net/mlx5e: fix a double-free in arfs_create_groups (bsc#1224605).
- CVE-2024-35837: net: mvpp2: clear BM pool before initialization (bsc#1224500).
- CVE-2024-35848: eeprom: at24: fix memory corruption race condition (bsc#1224612).
- CVE-2024-35853: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash (bsc#1224604).
- CVE-2024-35857: icmp: prevent possible NULL dereferences from icmp_build_probe() (bsc#1224619).
- CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766).
- CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764).
- CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765).
- CVE-2024-35869: smb: client: guarantee refcounted children from parent session (bsc#1224679).
- CVE-2024-35884: udp: do not accept non-tunnel GSO skbs landing in a tunnel (bsc#1224520).
- CVE-2024-35886: ipv6: Fix infinite recursion in fib6_dump_done() (bsc#1224670).
- CVE-2024-35889: idpf: fix kernel panic on unknown packet types (bsc#1224517).
- CVE-2024-35890: gro: fix ownership transfer (bsc#1224516).
- CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak (bsc#1224512)
- CVE-2024-35898: netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get() (bsc#1224498).
- CVE-2024-35899: netfilter: nf_tables: flush pending destroy work before exit_net release (bsc#1224499)
- CVE-2024-35900: netfilter: nf_tables: reject new basechain after table flag update (bsc#1224497).
- CVE-2024-35925: block: prevent division by zero in blk_rq_stat_sum() (bsc#1224661).
- CVE-2024-35934: net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() (bsc#1224641)
- CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700).
- CVE-2024-35950: drm/client: Fully protect modes with dev-&gt;mode_config.mutex (bsc#1224703).
- CVE-2024-35956: Fixed qgroup prealloc rsv leak in subvolume operations (bsc#1224674)
- CVE-2024-35958: net: ena: Fix incorrect descriptor free behavior (bsc#1224677).
- CVE-2024-35960: net/mlx5: Properly link new fs rules into the tree (bsc#1224588).
- CVE-2024-35961: net/mlx5: Register devlink first under devlink lock (bsc#1224585).
- CVE-2024-35979: raid1: fix use-after-free for original bio in raid1_write_request() (bsc#1224572).
- CVE-2024-35995: ACPI: CPPC: Use access_width over bit_width for system memory accesses (bsc#1224557).
- CVE-2024-35997: Remove I2C_HID_READ_PENDING flag to prevent lock-up (bsc#1224552).
- CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (bsc#1224548).
- CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1224545)
- CVE-2024-36005: netfilter: nf_tables: honor table dormant flag from netdev release event path (bsc#1224539).
- CVE-2024-36008: ipv4: check for NULL idev in ip_route_use_hint() (bsc#1224540).
- CVE-2024-36017: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation (bsc#1225681).
- CVE-2024-36020: i40e: fix vf may be used uninitialized in this function warning (bsc#1225698).
- CVE-2024-36021: net: hns3: fix kernel crash when devlink reload during pf initialization (bsc#1225699).
- CVE-2024-36478: null_blk: fix null-ptr-dereference while configuring 'power' and 'submit_queues' (bsc#1226841).
- CVE-2024-36479: fpga: bridge: add owner module and take its refcount (bsc#1226949).
- CVE-2024-36890: mm/slab: make __free(kfree) accept error pointers (bsc#1225714).
- CVE-2024-36894: usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete (bsc#1225749).
- CVE-2024-36899: gpiolib: cdev: Fix use after free in lineinfo_changed_notify (bsc#1225737).
- CVE-2024-36900: net: hns3: fix kernel crash when devlink reload during initialization (bsc#1225726).
- CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output() (bsc#1225711)
- CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (bsc#1225719).
- CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225732).
- CVE-2024-36909: Drivers: hv: vmbus: Do not free ring buffers that couldn't be re-encrypted (bsc#1225744).
- CVE-2024-36910: uio_hv_generic: Do not free decrypted memory (bsc#1225717).
- CVE-2024-36911: hv_netvsc: Do not free decrypted memory (bsc#1225745).
- CVE-2024-36912: Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl (bsc#1225752).
- CVE-2024-36913: Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails (bsc#1225753).
- CVE-2024-36914: drm/amd/display: Skip on writeback when it's not applicable (bsc#1225757).
- CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758).
- CVE-2024-36916: blk-iocost: avoid out of bounds shift (bsc#1225759).
- CVE-2024-36917: block: fix overflow in blk_ioctl_discard() (bsc#1225770).
- CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload (bsc#1225767).
- CVE-2024-36923: fs/9p: fix uninitialized values during inode evict (bsc#1225815).
- CVE-2024-36934: bna: ensure the copied buf is NUL terminated (bsc#1225760).
- CVE-2024-36937: xdp: use flags field to disambiguate broadcast redirect (bsc#1225834).
- CVE-2024-36939: nfs: Handle error of rpc_proc_register() in nfs_net_init() (bsc#1225838).
- CVE-2024-36940: pinctrl: core: delete incorrect free in pinctrl_enable() (bsc#1225840).
- CVE-2024-36945: net/smc: fix neighbour and rtable leak in smc_ib_find_route() (bsc#1225823).
- CVE-2024-36946: phonet: fix rtm_phonet_notify() skb allocation (bsc#1225851).
- CVE-2024-36949: amd/amdkfd: sync all devices to wait all processes being evicted (bsc#1225872)
- CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1225866).
- CVE-2024-36971: net: fix __dst_negative_advice() race (bsc#1226145).
- CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519).
- CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514).
- CVE-2024-37021: fpga: manager: add owner module and take its refcount (bsc#1226950).
- CVE-2024-37078: nilfs2: fix potential kernel bug due to lack of writeback flag waiting (bsc#1227066).
- CVE-2024-37354: btrfs: fix crash on racing fsync and size-extending write into prealloc (bsc#1227101).
- CVE-2024-38545: RDMA/hns: Fix UAF for cq async event (bsc#1226595).
- CVE-2024-38553: net: fec: remove .ndo_poll_controller to avoid deadlock (bsc#1226744).
- CVE-2024-38555: net/mlx5: Discard command completions in internal error (bsc#1226607).
- CVE-2024-38556: net/mlx5: Add a timeout to acquire the command queue semaphore (bsc#1226774).
- CVE-2024-38557: net/mlx5: Reload only IB representors upon lag disable/enable (bsc#1226781).
- CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for ICMPv6 (bsc#1226783).
- CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785).
- CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786).
- CVE-2024-38564: bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE (bsc#1226789).
- CVE-2024-38568: drivers/perf: hisi: hns3: Fix out-of-bound access when valid event group (bsc#1226771).
- CVE-2024-38570: gfs2: Fix potential glock use-after-free on unmount (bsc#1226775).
- CVE-2024-38578: ecryptfs: Fix buffer size for tag 66 packet (bsc#1226634).
- CVE-2024-38580: epoll: be better about file lifetimes (bsc#1226610).
- CVE-2024-38586: r8169: Fix possible ring buffer corruption on fragmented Tx packets (bsc#1226750).
- CVE-2024-38594: net: stmmac: move the EST lock to struct stmmac_priv (bsc#1226734).
- CVE-2024-38597: eth: sungem: remove .ndo_poll_controller to avoid deadlocks (bsc#1226749).
- CVE-2024-38598: md: fix resync softlockup when bitmap size is less than array size (bsc#1226757).
- CVE-2024-38603: drivers/perf: hisi: hns3: Actually use devm_add_action_or_reset() (bsc#1226842).
- CVE-2024-38608: net/mlx5e: Fix netif state handling (bsc#1226746).
- CVE-2024-38627: stm class: Fix a double free in stm_register_device() (bsc#1226857).
- CVE-2024-38628: usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind (bsc#1226911).
- CVE-2024-38659: enic: Validate length of nl attributes in enic_set_vf_port (bsc#1226883).
- CVE-2024-38661: s390/ap: Fix crash in AP internal function modify_bitmap() (bsc#1226996).
- CVE-2024-38780: dma-buf/sw-sync: do not enable IRQ from sync_print_obj() (bsc#1226886).
- CVE-2024-39276: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() (bsc#1226993).
- CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994).
- CVE-2024-39371: io_uring: check for non-NULL file pointer in io_file_can_poll() (bsc#1226990).
- CVE-2024-39463: 9p: add missing locking around taking dentry fid list (bsc#1227090).
- CVE-2024-39468: smb: client: fix deadlock in smb2_find_smb_tcon() (bsc#1227103).
- CVE-2024-39469: nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors (bsc#1226992).
- CVE-2024-39472: xfs: fix log recovery buffer allocation for the legacy h_size fixup (bsc#1227432).
- CVE-2024-39475: fbdev: savage: Handle err return when savagefb_check_var failed (bsc#1227435)
- CVE-2024-39482: bcache: fix variable length array abuse in btree_iter (bsc#1227447).
- CVE-2024-39487: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() (bsc#1227573)
- CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core (bsc#1227626).
- CVE-2024-39493: crypto: qat - fix ADF_DEV_RESET_SYNC memory leak (bsc#1227620).
- CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716).
- CVE-2024-39497: drm/shmem-helper: fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) (bsc#1227722).
- CVE-2024-39502: ionic: fix use after netif_napi_del() (bsc#1227755).
- CVE-2024-39506: liquidio: adjust a NULL pointer handling path in lio_vf_rep_copy_packet (bsc#1227729).
- CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario (bsc#1227730).
- CVE-2024-39508: io_uring/io-wq: use set_bit() and test_bit() at worker-&gt;flags (bsc#1227732).
- CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory (bsc#1227762).
- CVE-2024-40906: net/mlx5: Always stop health timer during driver removal (bsc#1227763).
- CVE-2024-40908: bpf: Set run context for rawtp test_run callback (bsc#1227783).
- CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free() (bsc#1227798).
- CVE-2024-40919: bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send() (bsc#1227779).
- CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure (bsc#1227786).
- CVE-2024-40931: mptcp: ensure snd_una is properly initialized on connect (bsc#1227780).
- CVE-2024-40935: cachefiles: flush all requests after setting CACHEFILES_DEAD (bsc#1227797).
- CVE-2024-40937: gve: Clear napi-&gt;skb before dev_kfree_skb_any() (bsc#1227836).
- CVE-2024-40940: net/mlx5: Fix tainted pointer delete is case of flow rules creation fail (bsc#1227800).
- CVE-2024-40943: ocfs2: fix races between hole punching and AIO+DIO (bsc#1227849).
- CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() (bsc#1227806).
- CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808)
- CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (bsc#1227810).
- CVE-2024-40958: netns: Make get_net_ns() handle zero refcount net (bsc#1227812).
- CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (bsc#1227884).
- CVE-2024-40960: ipv6: prevent possible NULL dereference in rt6_probe() (bsc#1227813).
- CVE-2024-40961: ipv6: prevent possible NULL deref in fib6_nh_init() (bsc#1227814).
- CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc (bsc#1227886).
- CVE-2024-40967: serial: imx: Introduce timeout when waiting on transmitter empty (bsc#1227891).
- CVE-2024-40970: Avoid hw_desc array overrun in dw-axi-dmac (bsc#1227899).
- CVE-2024-40972: ext4: fold quota accounting into ext4_xattr_inode_lookup_create() (bsc#1227910).
- CVE-2024-40977: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery (bsc#1227950).
- CVE-2024-40982: ssb: fix potential NULL pointer dereference in ssb_device_uevent() (bsc#1227865).
- CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor region on teardown (bsc#1227823).
- CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store (bsc#1227829).
- CVE-2024-40998: ext4: fix uninitialized ratelimit_state-&gt;lock access in __ext4_fill_super() (bsc#1227866).
- CVE-2024-40999: net: ena: Add validation for completion descriptors consistency (bsc#1227913).
- CVE-2024-41006: netrom: Fix a memory leak in nr_heartbeat_expiry() (bsc#1227862).
- CVE-2024-41009: bpf: Fix overrunning reservations in ringbuf (bsc#1228020).
- CVE-2024-41011: drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (bsc#1228114).
- CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race is detected (bsc#1228247).
- CVE-2024-41013: xfs: do not walk off the end of a directory data block (bsc#1228405).
- CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data (bsc#1228408).
- CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry() (bsc#1228409).
- CVE-2024-41016: ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410).
- CVE-2024-41017: jfs: do not walk off the end of ealist (bsc#1228403).
- CVE-2024-41040: net/sched: Fix UAF when resolving a clash (bsc#1228518).
- CVE-2024-41041: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() (bsc#1228520).
- CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets (bsc#1228530).
- CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565).
- CVE-2024-41057: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() (bsc#1228462).
- CVE-2024-41058: cachefiles: fix slab-use-after-free in fscache_withdraw_volume() (bsc#1228459).
- CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).
- CVE-2024-41063: bluetooth: hci_core: cancel all works upon hci_unregister_dev() (bsc#1228580).
- CVE-2024-41064: powerpc/eeh: avoid possible crash when edev-&gt;pdev changes (bsc#1228599).
- CVE-2024-41066: ibmvnic: add tx check to prevent skb leak (bsc#1228640).
- CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).
- CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() (bsc#1228581).
- CVE-2024-41071: wifi: mac80211: Avoid address calculations via out of bounds array indexing (bsc#1228625).
- CVE-2024-41072: wifi: cfg80211: wext: add extra SIOCSIWSCAN data check (bsc#1228626).
- CVE-2024-41076: NFSv4: Fix memory leak in nfs4_set_security_label (bsc#1228649).
- CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable failure (bsc#1228655).
- CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617).
- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
- CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327).
- CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (bsc#1228470).
- CVE-2024-42079: gfs2: Fix NULL pointer dereference in gfs2_log_flush (bsc#1228672).
- CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680).
- CVE-2024-42096: x86: stop playing stack games in profile_pc() (bsc#1228633).
- CVE-2024-42122: drm/amd/display: Add NULL pointer check for kzalloc (bsc#1228591).
- CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible (bsc#1228705).
- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743)
- CVE-2024-42161: bpf: avoid uninitialized value in BPF_CORE_READ_BITFIELD (bsc#1228756).
- CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list (bsc#1228723).
- CVE-2024-42230: powerpc/pseries: Fix scv instruction crash with kexec (bsc#1194869).

The following non-security bugs were fixed:

- acpi: EC: Abort address space access upon error (stable-fixes).
- acpi: EC: Avoid returning AE_OK on errors in address space handler (stable-fixes).
- acpi: processor_idle: Fix invalid comparison with insertion sort for latency (git-fixes).
- acpi: resource: Do IRQ override on TongFang GXxHRXx and GMxHGxx (stable-fixes).
- acpi: video: Add backlight=native quirk for Lenovo Slim 7 16ARH7 (stable-fixes).
- acpi: x86: Force StorageD3Enable on more products (stable-fixes).
- acpi: x86: utils: Add Picasso to the list for forcing StorageD3Enable (stable-fixes).
- acpica: Revert 'ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine.' (git-fixes).
- alsa: dmaengine_pcm: terminate dmaengine before synchronize (stable-fixes).
- alsa: dmaengine: Synchronize dma channel after drop() (stable-fixes).
- alsa: emux: improve patch ioctl data validation (stable-fixes).
- alsa: Fix deadlocks with kctl removals at disconnection (stable-fixes).
- alsa: hda: conexant: Fix headset auto detect fail in the polling mode (git-fixes).
- alsa: hda: intel-dsp-config: harden I2C/I2S codec detection (stable-fixes).
- alsa: hda/realtek: Add more codec ID to no shutup pins list (stable-fixes).
- alsa: hda/realtek: add quirk for Clevo V5[46]0TU (stable-fixes).
- alsa: hda/realtek: Add quirks for Lenovo 13X (stable-fixes).
- alsa: hda/realtek: Adjust G814JZR to use SPI init for amp (git-fixes).
- alsa: hda/realtek: Enable headset mic of JP-IK LEAP W502 with ALC897 (stable-fixes).
- alsa: hda/realtek: Enable headset mic on IdeaPad 330-17IKB 81DM (git-fixes).
- alsa: hda/realtek: Enable headset mic on Positivo SU C1400 (stable-fixes).
- alsa: hda/realtek: Enable Mute LED on HP 250 G7 (stable-fixes).
- alsa: hda/realtek: Fix conflicting quirk for PCI SSID 17aa:3820 (git-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs do not work for EliteBook 645/665 G11 (stable-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs do not work for ProBook 440/460 G11 (stable-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs do not work for ProBook 445/465 G11 (stable-fixes).
- alsa: hda/realtek: Fix the speaker output on Samsung Galaxy Book Pro 360 (stable-fixes).
- alsa: hda/realtek: Limit mic boost on N14AP7 (stable-fixes).
- alsa: hda/realtek: Limit mic boost on VAIO PRO PX (stable-fixes).
- alsa: hda/realtek: Remove Framework Laptop 16 from quirks (git-fixes).
- alsa: hda/relatek: Enable Mute LED on HP Laptop 15-gw0xxx (stable-fixes).
- alsa: pcm_dmaengine: Do not synchronize DMA channel when DMA is paused (git-fixes).
- alsa: timer: Set lower bound of start tick time (stable-fixes).
- alsa: usb-audio: Add a quirk for Sonix HD USB Camera (stable-fixes).
- alsa: usb-audio: Correct surround channels in UAC1 channel map (git-fixes).
- alsa: usb-audio: Fix microphone sound on HD webcam (stable-fixes).
- alsa: usb-audio: Move HD Webcam quirk to the right place (git-fixes).
- alsa/hda: intel-dsp-config: Document AVS as dsp_driver option (git-fixes).
- arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY (git-fixes).
- arm64: dts: allwinner: Pine H64: correctly remove reg_gmac_3v3 (git-fixes)
- arm64: dts: hi3798cv200: fix the size of GICR (git-fixes)
- arm64: dts: imx8qm-mek: fix gpio number for reg_usdhc2_vmmc (git-fixes)
- arm64: dts: microchip: sparx5: fix mdio reg (git-fixes)
- arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK (git-fixes)
- arm64: dts: rockchip: Add sound-dai-cells for RK3368 (git-fixes)
- arm64: dts: rockchip: fix PMIC interrupt pin on ROCK Pi E (git-fixes)
- arm64: mm: Batch dsb and isb when populating pgtables (jsc#PED-8690).
- arm64: mm: do not acquire mutex when rewriting swapper (jsc#PED-8690).
- arm64: mm: Do not remap pgtables for allocate vs populate (jsc#PED-8690).
- arm64: mm: Do not remap pgtables per-cont(pte|pmd) block (jsc#PED-8690).
- arm64: tegra: Correct Tegra132 I2C alias (git-fixes)
- arm64/io: add constant-argument check (bsc#1226502 git-fixes)
- arm64/io: Provide a WC friendly __iowriteXX_copy() (bsc#1226502)
- asoc: amd: acp: add a null check for chip_pdev structure (git-fixes).
- asoc: amd: acp: remove i2s configuration check in acp_i2s_probe() (git-fixes).
- asoc: amd: Adjust error handling in case of absent codec device (git-fixes).
- asoc: da7219-aad: fix usage of device_get_named_child_node() (stable-fixes).
- asoc: fsl-asoc-card: set priv-&gt;pdev before using it (git-fixes).
- asoc: max98088: Check for clk_prepare_enable() error (git-fixes).
- asoc: rt5645: Fix the electric noise due to the CBJ contacts floating (stable-fixes).
- asoc: rt715-sdca: volume step modification (stable-fixes).
- asoc: rt715: add vendor clear control register (stable-fixes).
- asoc: ti: davinci-mcasp: Set min period size using FIFO config (stable-fixes).
- asoc: ti: omap-hdmi: Fix too long driver name (stable-fixes).
- ata: ahci: Clean up sysfs file on error (git-fixes).
- ata: libata-core: Fix double free on error (git-fixes).
- ata: libata-core: Fix null pointer dereference on error (git-fixes).
- batman-adv: bypass empty buckets in batadv_purge_orig_ref() (stable-fixes).
- batman-adv: Do not accept TT entries for out-of-spec VIDs (git-fixes).
- blk-cgroup: dropping parent refcount after pd_free_fn() is done (bsc#1224573).
- block, loop: support partitions without scanning (bsc#1227162).
- block: do not add partitions if GD_SUPPRESS_PART_SCAN is set (bsc#1227162).
- bluetooth: ath3k: Fix multiple issues reported by checkpatch.pl (stable-fixes).
- bluetooth: btqca: use le32_to_cpu for ver.soc_id (stable-fixes).
- bluetooth: hci_core: cancel all works upon hci_unregister_dev() (stable-fixes).
- bluetooth: hci_qca: mark OF related data as maybe unused (stable-fixes).
- bluetooth: hci_sync: Fix suspending with wrong filter policy (git-fixes).
- Bluetooth: L2CAP: Fix rejecting L2CAP_CONN_PARAM_UPDATE_REQ (git-fixes).
- bluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot (git-fixes).
- bnxt_re: Fix imm_data endianness (git-fixes)
- bpf, sockmap: Check for any of tcp_bpf_prots when cloning a listener (git-fixes).
- bpf: aggressively forget precise markings during state checkpointing (bsc#1225903).
- bpf: allow precision tracking for programs with subprogs (bsc#1225903).
- bpf: check bpf_func_state-&gt;callback_depth when pruning states (bsc#1225903).
- bpf: clean up visit_insn()'s instruction processing (bsc#1225903).
- bpf: correct loop detection for iterators convergence (bsc#1225903).
- bpf: encapsulate precision backtracking bookkeeping (bsc#1225903).
- bpf: ensure state checkpointing at iter_next() call sites (bsc#1225903).
- bpf: exact states comparison for iterator convergence checks (bsc#1225903).
- bpf: extract __check_reg_arg() utility function (bsc#1225903).
- bpf: extract same_callsites() as utility function (bsc#1225903).
- bpf: extract setup_func_entry() utility function (bsc#1225903).
- bpf: fix calculation of subseq_idx during precision backtracking (bsc#1225903).
- bpf: fix mark_all_scalars_precise use in mark_chain_precision (bsc#1225903).
- bpf: Fix memory leaks in __check_func_call (bsc#1225903).
- bpf: fix propagate_precision() logic for inner frames (bsc#1225903).
- bpf: fix regs_exact() logic in regsafe() to remap IDs correctly (bsc#1225903).
- bpf: Fix to preserve reg parent/live fields when copying range info (bsc#1225903).
- bpf: generalize MAYBE_NULL vs non-MAYBE_NULL rule (bsc#1225903).
- bpf: improve precision backtrack logging (bsc#1225903).
- bpf: Improve verifier u32 scalar equality checking (bsc#1225903).
- bpf: keep track of max number of bpf_loop callback iterations (bsc#1225903).
- bpf: maintain bitmasks across all active frames in __mark_chain_precision (bsc#1225903).
- bpf: mark relevant stack slots scratched for register read instructions (bsc#1225903).
- bpf: move explored_state() closer to the beginning of verifier.c (bsc#1225903).
- bpf: perform byte-by-byte comparison only when necessary in regsafe() (bsc#1225903).
- bpf: print full verifier states on infinite loop detection (bsc#1225903).
- bpf: regsafe() must not skip check_ids() (bsc#1225903).
- bpf: reject non-exact register type matches in regsafe() (bsc#1225903).
- bpf: Remove unused insn_cnt argument from visit_[func_call_]insn() (bsc#1225903).
- bpf: reorganize struct bpf_reg_state fields (bsc#1225903).
- bpf: Skip invalid kfunc call in backtrack_insn (bsc#1225903).
- bpf: states_equal() must build idmap for all function frames (bsc#1225903).
- bpf: stop setting precise in current state (bsc#1225903).
- bpf: support precision propagation in the presence of subprogs (bsc#1225903).
- bpf: take into account liveness when propagating precision (bsc#1225903).
- bpf: teach refsafe() to take into account ID remapping (bsc#1225903).
- bpf: unconditionally reset backtrack_state masks on global func exit (bsc#1225903).
- bpf: use check_ids() for active_lock comparison (bsc#1225903).
- bpf: Use scalar ids in mark_chain_precision() (bsc#1225903).
- bpf: verify callbacks as if they are called unknown number of times (bsc#1225903).
- bpf: Verify scalar ids mapping in regsafe() using check_ids() (bsc#1225903).
- bpf: widening for callback iterators (bsc#1225903).
- btrfs: add device major-minor info in the struct btrfs_device (bsc#1227162).
- btrfs: avoid copying BTRFS_ROOT_SUBVOL_DEAD flag to snapshot of subvolume being deleted (bsc#1221282).
- btrfs: harden identification of a stale device (bsc#1227162).
- btrfs: match stale devices by dev_t (bsc#1227162).
- btrfs: remove the cross file system checks from remap (bsc#1227157).
- btrfs: use dev_t to match device in device_matched (bsc#1227162).
- btrfs: validate device maj:min during open (bsc#1227162).
- bytcr_rt5640 : inverse jack detect for Archos 101 cesium (stable-fixes).
- cachefiles: add output string to cachefiles_obj_[get|put]_ondemand_fd (git-fixes).
- cachefiles: remove requests from xarray during flushing requests (bsc#1226588).
- can: kvaser_usb: Explicitly initialize family in leafimx driver_info struct (git-fixes).
- can: kvaser_usb: fix return value for hif_usb_send_regout (stable-fixes).
- ceph: add ceph_cap_unlink_work to fire check_caps() immediately (bsc#1226022).
- ceph: always check dir caps asynchronously (bsc#1226022).
- ceph: always queue a writeback when revoking the Fb caps (bsc#1226022).
- ceph: break the check delayed cap loop every 5s (bsc#1226022).
- ceph: fix incorrect kmalloc size of pagevec mempool (bsc#1228418).
- ceph: switch to use cap_delay_lock for the unlink delay list (bsc#1226022).
- cgroup: Add annotation for holding namespace_sem in current_cgns_cgroup_from_root() (bsc#1222254).
- cgroup: Eliminate the need for cgroup_mutex in proc_cgroup_show() (bsc#1222254).
- cgroup: Make operations on the cgroup root_list RCU safe (bsc#1222254).
- cgroup: preserve KABI of cgroup_root (bsc#1222254).
- cgroup: Remove unnecessary list_empty() (bsc#1222254).
- cgroup/cpuset: Prevent UAF in proc_cpuset_show() (bsc#1228801).
- check-for-config-changes: ignore also GCC_ASM_GOTO_OUTPUT_BROKEN .
- checkpatch: really skip LONG_LINE_* when LONG_LINE is ignored (git-fixes).
- cifs: fix hang in wait_for_response() (bsc#1220812, bsc#1220368).
- cpufreq: amd-pstate: Fix the inconsistency in max frequency units (git-fixes).
- crypto: aead,cipher - zeroize key buffer after use (stable-fixes).
- crypto: ecdh - explicitly zeroize private_key (stable-fixes).
- crypto: ecdsa - Fix the public key format description (git-fixes).
- crypto: ecrdsa - Fix module auto-load on add_key (stable-fixes).
- crypto: hisilicon/sec - Fix memory leak for sec resource release (stable-fixes).
- csky: ftrace: Drop duplicate implementation of arch_check_ftrace_location() (git-fixes).
- decompress_bunzip2: fix rare decompression failure (git-fixes).
- devres: Fix devm_krealloc() wasting memory (git-fixes).
- devres: Fix memory leakage caused by driver API devm_free_percpu() (git-fixes).
- dma: fix call order in dmam_free_coherent (git-fixes).
- dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (git-fixes).
- dmaengine: ioatdma: Fix missing kmem_cache_destroy() (git-fixes).
- docs: crypto: async-tx-api: fix broken code example (git-fixes).
- docs: Fix formatting of literal sections in fanotify docs (stable-fixes).
- drivers: core: synchronize really_probe() and dev_uevent() (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Valve Galileo (stable-fixes).
- drm/amd: Fix shutdown (again) on some SMU v13.0.4/11 platforms (git-fixes).
- drm/amd/amdgpu: Fix style errors in amdgpu_drv.c &amp; amdgpu_device.c (stable-fixes).
- drm/amd/display: Account for cursor prefetch BW in DML1 mode support (stable-fixes).
- drm/amd/display: Add dtbclk access to dcn315 (stable-fixes).
- drm/amd/display: Add VCO speed parameter for DCN31 FPU (stable-fixes).
- drm/amd/display: Check for NULL pointer (stable-fixes).
- drm/amd/display: Check index msg_id before read or write (stable-fixes).
- drm/amd/display: Check pipe offset before setting vblank (stable-fixes).
- drm/amd/display: drop unnecessary NULL checks in debugfs (stable-fixes).
- drm/amd/display: Exit idle optimizations before HDCP execution (stable-fixes).
- drm/amd/display: revert Exit idle optimizations before HDCP execution (stable-fixes).
- drm/amd/display: Set color_mgmt_changed to true on unsuspend (stable-fixes).
- drm/amd/display: Skip finding free audio for unknown engine_id (stable-fixes).
- drm/amd/pm: Fix aldebaran pcie speed reporting (git-fixes).
- drm/amd/pm: remove logically dead code for renoir (git-fixes).
- drm/amdgpu: add error handle to avoid out-of-bounds (stable-fixes).
- drm/amdgpu: avoid using null object of framebuffer (stable-fixes).
- drm/amdgpu: Check if NBIO funcs are NULL in amdgpu_device_baco_exit (git-fixes).
- drm/amdgpu: Fix pci state save during mode-1 reset (git-fixes).
- drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq() (git-fixes).
- drm/amdgpu: Fix the ring buffer size for queue VM flush (stable-fixes).
- drm/amdgpu: fix UBSAN warning in kv_dpm.c (stable-fixes).
- drm/amdgpu: fix uninitialized scalar variable warning (stable-fixes).
- drm/amdgpu: Fix uninitialized variable warnings (stable-fixes).
- drm/amdgpu: Initialize timestamp for some legacy SOCs (stable-fixes).
- drm/amdgpu: Remove GC HW IP 9.3.0 from noretry=1 (git-fixes).
- drm/amdgpu: Update BO eviction priorities (stable-fixes).
- drm/amdgpu/atomfirmware: add intergrated info v2.3 table (stable-fixes).
- drm/amdgpu/atomfirmware: fix parsing of vram_info (stable-fixes).
- drm/amdgpu/atomfirmware: silence UBSAN warning (stable-fixes).
- drm/amdgpu/mes: fix use-after-free issue (stable-fixes).
- drm/amdgpu/sdma5.2: Update wptr registers as well as doorbell (stable-fixes).
- drm/amdkfd: Flush the process wq before creating a kfd_process (stable-fixes).
- drm/amdkfd: Rework kfd_locked handling (bsc#1225872)
- drm/bridge/panel: Fix runtime warning on panel bridge release (git-fixes).
- drm/dp_mst: Fix all mstb marked as not probed after suspend/resume (git-fixes).
- drm/etnaviv: do not block scheduler when GPU is still active (stable-fixes).
- drm/etnaviv: fix DMA direction handling for cached RW buffers (git-fixes).
- drm/exynos: hdmi: report safe 640x480 mode as a fallback when no EDID found (git-fixes).
- drm/exynos/vidi: fix memory leak in .get_modes() (stable-fixes).
- drm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes (git-fixes).
- drm/gma500: fix null pointer dereference in psb_intel_lvds_get_modes (git-fixes).
- drm/i915/dpt: Make DPT object unshrinkable (git-fixes).
- drm/i915/gt: Disarm breadcrumbs if engines are already idle (git-fixes).
- drm/i915/gt: Do not consider preemption during execlists_dequeue for gen8 (git-fixes).
- drm/i915/gt: Fix potential UAF by revoke of fence registers (git-fixes).
- drm/i915/guc: avoid FIELD_PREP warning (git-fixes).
- drm/i915/mso: using joiner is not possible with eDP MSO (git-fixes).
- drm/komeda: check for error-valued pointer (git-fixes).
- drm/lima: add mask irq callback to gp and pp (stable-fixes).
- drm/lima: fix shared irq handling on driver remove (stable-fixes).
- drm/lima: Mark simple_ondemand governor as softdep (git-fixes).
- drm/lima: mask irqs in timeout path before hard reset (stable-fixes).
- drm/mediatek: Add OVL compatible name for MT8195 (git-fixes).
- drm/meson: fix canvas release in bind function (git-fixes).
- drm/mgag200: Bind I2C lifetime to DRM device (git-fixes).
- drm/mgag200: Set DDC timeout in milliseconds (git-fixes).
- drm/mipi-dsi: Fix mipi_dsi_dcs_write_seq() macro definition format (stable-fixes).
- drm/mipi-dsi: Fix theoretical int overflow in mipi_dsi_dcs_write_seq() (git-fixes).
- drm/msm: Enable clamp_to_idle for 7c3 (stable-fixes).
- drm/msm/a6xx: Avoid a nullptr dereference when speedbin setting fails (git-fixes).
- drm/msm/dp: Avoid a long timeout for AUX transfer if nothing connected (git-fixes).
- drm/msm/dp: Return IRQ_NONE for unhandled interrupts (stable-fixes).
- drm/msm/dpu: drop validity checks for clear_pending_flush() ctl op (git-fixes).
- drm/msm/mdp5: Remove MDP_CAP_SRC_SPLIT from msm8x53_config (git-fixes).
- drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes (git-fixes).
- drm/nouveau: prime: fix refcount underflow (git-fixes).
- drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes (stable-fixes).
- drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes (stable-fixes).
- drm/panel-samsung-atna33xc20: Use ktime_get_boottime for delays (stable-fixes).
- drm/panel: boe-tv101wum-nl6: Check for errors on the NOP in prepare() (git-fixes).
- drm/panel: boe-tv101wum-nl6: If prepare fails, disable GPIO before regulators (git-fixes).
- drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep (stable-fixes).
- drm/panel: simple: Add missing display timing flags for KOE TX26D202VM0BWA (git-fixes).
- drm/panfrost: Mark simple_ondemand governor as softdep (git-fixes).
- drm/qxl: Add check for drm_cvt_mode (git-fixes).
- drm/radeon: check bo_va-&gt;bo is non-NULL before using it (stable-fixes).
- drm/radeon: fix UBSAN warning in kv_dpm.c (stable-fixes).
- drm/radeon/radeon_display: Decrease the size of allocated memory (stable-fixes).
- drm/vmwgfx: 3D disabled should not effect STDU memory limits (git-fixes).
- drm/vmwgfx: Filter modes which exceed graphics memory (git-fixes).
- drm/vmwgfx: Fix a deadlock in dma buf fence polling (git-fixes).
- drm/vmwgfx: Fix missing HYPERVISOR_GUEST dependency (stable-fixes).
- drm/vmwgfx: Fix overlay when using Screen Targets (git-fixes).
- eeprom: digsy_mtc: Fix 93xx46 driver probe failure (git-fixes).
- exfat: check if cluster num is valid (git-fixes).
- exfat: simplify is_valid_cluster() (git-fixes).
- filelock: add a new locks_inode_context accessor function (git-fixes).
- firmware: cs_dsp: Fix overflow checking of wmfw header (git-fixes).
- firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers (git-fixes).
- firmware: cs_dsp: Return error if block header overflows file (git-fixes).
- firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files (git-fixes).
- firmware: cs_dsp: Validate payload length before processing block (git-fixes).
- firmware: dmi: Stop decoding on broken entry (stable-fixes).
- firmware: turris-mox-rwtm: Do not complete if there are no waiters (git-fixes).
- firmware: turris-mox-rwtm: Fix checking return value of wait_for_completion_timeout() (git-fixes).
- firmware: turris-mox-rwtm: Initialize completion before mailbox (git-fixes).
- fs: allow cross-vfsmount reflink/dedupe (bsc#1227157).
- ftrace: Fix possible use-after-free issue in ftrace_location() (git-fixes).
- fuse: verify {g,u}id mount options correctly (bsc#1228191).
- gpio: davinci: Validate the obtained number of IRQs (git-fixes).
- gpio: mc33880: Convert comma to semicolon (git-fixes).
- gpio: tqmx86: fix typo in Kconfig label (git-fixes).
- gpio: tqmx86: introduce shadow register for GPIO output value (git-fixes).
- gpiolib: cdev: Disallow reconfiguration without direction (uAPI v1) (git-fixes).
- hfsplus: fix to avoid false alarm of circular locking (git-fixes).
- hfsplus: fix uninit-value in copy_name (git-fixes).
- hid: Add quirk for Logitech Casa touchpad (stable-fixes).
- hid: core: remove unnecessary WARN_ON() in implement() (git-fixes).
- hid: logitech-dj: Fix memory leak in logi_dj_recv_switch_to_dj_mode() (git-fixes).
- hid: wacom: Modify pen IDs (git-fixes).
- hpet: Support 32-bit userspace (git-fixes).
- hwmon: (adt7475) Fix default duty on fan is disabled (git-fixes).
- hwmon: (max6697) Fix swapped temp{1,8} critical alarms (git-fixes).
- hwmon: (max6697) Fix underflow when writing limit attributes (git-fixes).
- hwmon: (shtc1) Fix property misspelling (git-fixes).
- i2c: at91: Fix the functionality flags of the slave-only interface (git-fixes).
- i2c: designware: Fix the functionality flags of the slave-only interface (git-fixes).
- i2c: mark HostNotify target address as used (git-fixes).
- i2c: ocores: set IACK bit after core is enabled (git-fixes).
- i2c: rcar: bring hardware to known state when probing (git-fixes).
- i2c: tegra: Fix failure during probe deferral cleanup (git-fixes)
- i2c: tegra: Share same DMA channel for RX and TX (bsc#1227661)
- i2c: testunit: avoid re-issued work after read message (git-fixes).
- i2c: testunit: correct Kconfig description (git-fixes).
- i2c: testunit: discard write requests while old command is running (git-fixes).
- i2c: testunit: do not erase registers after STOP (git-fixes).
- iio: accel: fxls8962af: select IIO_BUFFER &amp; IIO_KFIFO_BUF (git-fixes).
- iio: adc: ad7266: Fix variable checking bug (git-fixes).
- iio: adc: ad9467: fix scan type sign (git-fixes).
- iio: chemical: bme680: Fix calibration data variable (git-fixes).
- iio: chemical: bme680: Fix overflows in compensate() functions (git-fixes).
- iio: chemical: bme680: Fix pressure value output (git-fixes).
- iio: chemical: bme680: Fix sensor data read operation (git-fixes).
- iio: dac: ad5592r: fix temperature channel scaling value (git-fixes).
- iio: imu: inv_icm42600: delete unneeded update watermark call (git-fixes).
- input: elan_i2c - do not leave interrupt disabled on suspend failure (git-fixes).
- input: elantech - fix touchpad state on resume for Lenovo N24 (stable-fixes).
- input: ff-core - prefer struct_size over open coded arithmetic (stable-fixes).
- Input: ili210x - fix ili251x_read_touch_data() return value (git-fixes).
- input: qt1050 - handle CHIP_ID reading error (git-fixes).
- input: silead - Always support 10 fingers (stable-fixes).
- intel_th: pci: Add Granite Rapids SOC support (stable-fixes).
- intel_th: pci: Add Granite Rapids support (stable-fixes).
- intel_th: pci: Add Lunar Lake support (stable-fixes).
- intel_th: pci: Add Meteor Lake-S CPU support (stable-fixes).
- intel_th: pci: Add Meteor Lake-S support (stable-fixes).
- intel_th: pci: Add Sapphire Rapids SOC support (stable-fixes).
- iommu: mtk: fix module autoloading (git-fixes).
- iommu: Return right value in iommu_sva_bind_device() (git-fixes).
- iommu/amd: Fix sysfs leak in iommu init (git-fixes).
- iommu/arm-smmu-v3: Free MSIs in case of ENOMEM (git-fixes).
- ionic: clean interrupt before enabling queue to avoid credit race (git-fixes).
- ipvs: Fix checksumming on GSO of SCTP packets (bsc#1221958)
- jffs2: Fix potential illegal address access in jffs2_free_inode (git-fixes).
- jfs: Fix array-index-out-of-bounds in diFree (git-fixes).
- jfs: xattr: fix buffer overflow for invalid xattr (bsc#1227383).
- kabi: bpf: bpf_reg_state reorganization kABI workaround (bsc#1225903).
- kabi: bpf: callback fixes kABI workaround (bsc#1225903).
- kabi: bpf: struct bpf_{idmap,idset} kABI workaround (bsc#1225903).
- kabi: bpf: tmp_str_buf kABI workaround (bsc#1225903).
- kabi: rtas: Workaround false positive due to lost definition (bsc#1227487).
- kabi: Use __iowriteXX_copy_inlined for in-kernel modules (bsc#1226502)
- kabi/severities: ignore kABI for FireWire sound local symbols (bsc#1208783)
- kabi/severities: Ignore tpm_tis_core_init (bsc#1082555).
- kabi/severity: add nvme common code The nvme common code is also allowed to change the data structures, there are only internal users.
- kbuild: do not include include/config/auto.conf from shell scripts (bsc#1227274).
- kbuild: Install dtb files as 0644 in Makefile.dtbinst (git-fixes).
- kconfig: doc: fix a typo in the note about 'imply' (git-fixes).
- kconfig: fix comparison to constant symbols, 'm', 'n' (git-fixes).
- kernel-binary: vdso: Own module_dir
- kernel-doc: fix struct_group_tagged() parsing (git-fixes).
- kernel/sched: Remove dl_boosted flag comment (git fixes (sched)).
- knfsd: LOOKUP can return an illegal error value (git-fixes).
- kobject_uevent: Fix OOB access within zap_modalias_env() (git-fixes).
- kprobes: Make arch_check_ftrace_location static (git-fixes).
- kvm: nVMX: Clear EXIT_QUALIFICATION when injecting an EPT Misconfig (git-fixes).
- kvm: PPC: Book3S HV Nested: L2 LPCR should inherit L1 LPES setting (bsc#1194869).
- kvm: PPC: Book3S HV: Fix 'rm_exit' entry in debugfs timings (bsc#1194869).
- kvm: PPC: Book3S HV: Fix the set_one_reg for MMCR3 (bsc#1194869).
- kvm: PPC: Book3S HV: remove extraneous asterisk from rm_host_ipi_action() comment (bsc#1194869).
- kvm: PPC: Book3S: Suppress failed alloc warning in H_COPY_TOFROM_GUEST (bsc#1194869).
- kvm: PPC: Book3S: Suppress warnings when allocating too big memory slots (bsc#1194869).
- kvm: s390: fix LPSWEY handling (bsc#1227635 git-fixes).
- kvm: SVM: Process ICR on AVIC IPI delivery failure due to invalid target (git-fixes).
- kvm: VMX: Report up-to-date exit qualification to userspace (git-fixes).
- kvm: x86: Add IBPB_BRTYPE support (bsc#1228079).
- kvm: x86: Always sync PIR to IRR prior to scanning I/O APIC routes (git-fixes).
- kvm: x86: Bail from kvm_recalculate_phys_map() if x2APIC ID is out-of-bounds (git-fixes).
- kvm: x86: Disable APIC logical map if logical ID covers multiple MDAs (git-fixes).
- kvm: x86: Disable APIC logical map if vCPUs are aliased in logical mode (git-fixes).
- kvm: x86: Do not advertise guest.MAXPHYADDR as host.MAXPHYADDR in CPUID (git-fixes).
- kvm: x86: Explicitly skip optimized logical map setup if vCPU's LDR==0 (git-fixes).
- kvm: x86: Explicitly track all possibilities for APIC map's logical modes (git-fixes).
- kvm: x86: Fix broken debugregs ABI for 32 bit kernels (git-fixes).
- kvm: x86: Fix KVM_GET_MSRS stack info leak (git-fixes).
- kvm: x86: Honor architectural behavior for aliased 8-bit APIC IDs (git-fixes).
- kvm: x86: Purge 'highest ISR' cache when updating APICv state (git-fixes).
- kvm: x86: Save/restore all NMIs when multiple NMIs are pending (git-fixes).
- kvm: x86: Skip redundant x2APIC logical mode optimized cluster setup (git-fixes).
- leds: ss4200: Convert PCIBIOS_* return codes to errnos (git-fixes).
- leds: trigger: Unregister sysfs attributes before calling deactivate() (git-fixes).
- leds: triggers: Flush pending brightness before activating trigger (git-fixes).
- lib: memcpy_kunit: Fix an invalid format specifier in an assertion msg (git-fixes).
- lib: objagg: Fix general protection fault (git-fixes).
- lib: objagg: Fix spelling (git-fixes).
- lib: test_objagg: Fix spelling (git-fixes).
- libceph: fix race between delayed_work() and ceph_monc_stop() (bsc#1228190).
- lockd: set missing fl_flags field when retrieving args (git-fixes).
- lockd: use locks_inode_context helper (git-fixes).
- Make AMD_HSMP=m and mark it unsupported in supported.conf (jsc#PED-8582)
- media: dvb-frontends: tda10048: Fix integer overflow (stable-fixes).
- media: dvb-frontends: tda18271c2dd: Remove casting during div (stable-fixes).
- media: dvb-usb: dib0700_devices: Add missing release_firmware() (stable-fixes).
- media: dvb-usb: Fix unexpected infinite loop in dvb_usb_read_remote_control() (git-fixes).
- media: dvb: as102-fe: Fix as10x_register_addr packing (stable-fixes).
- media: dvbdev: Initialize sbuf (stable-fixes).
- media: dw2102: Do not translate i2c read into write (stable-fixes).
- media: dw2102: fix a potential buffer overflow (git-fixes).
- media: flexcop-usb: clean up endpoint sanity checks (stable-fixes).
- media: flexcop-usb: fix sanity check of bNumEndpoints (git-fixes).
- media: imon: Fix race getting ictx-&gt;lock (git-fixes).
- media: ipu3-cio2: Use temporary storage for struct device pointer (stable-fixes).
- media: lgdt3306a: Add a check against null-pointer-def (stable-fixes).
- media: mxl5xx: Move xpt structures off stack (stable-fixes).
- media: radio-shark2: Avoid led_names truncations (git-fixes).
- media: s2255: Use refcount_t instead of atomic_t for num_channels (stable-fixes).
- media: uvcvideo: Fix integer overflow calculating timestamp (git-fixes).
- media: uvcvideo: Override default flags (git-fixes).
- media: v4l2-core: hold videodev_lock until dev reg, finishes (stable-fixes).
- media: venus: fix use after free in vdec_close (git-fixes).
- media: venus: flush all buffers in output plane streamoff (git-fixes).
- mei: demote client disconnect warning on suspend to debug (stable-fixes).
- mei: me: release irq in mei_me_pci_resume error path (git-fixes).
- mfd: omap-usb-tll: Use struct_size to allocate tll (git-fixes).
- mkspec-dtb: add toplevel symlinks also on arm
- mmc: core: Add mmc_gpiod_set_cd_config() function (stable-fixes).
- mmc: core: Do not force a retune before RPMB switch (stable-fixes).
- mmc: sdhci_am654: Add ITAPDLYSEL in sdhci_j721e_4bit_set_clock (git-fixes).
- mmc: sdhci_am654: Add OTAP/ITAP delay enable (git-fixes).
- mmc: sdhci_am654: Drop lookup for deprecated ti,otap-del-sel (stable-fixes).
- mmc: sdhci_am654: Fix ITAPDLY for HS400 timing (git-fixes).
- mmc: sdhci-acpi: Disable write protect detection on Toshiba WT10-A (stable-fixes).
- mmc: sdhci-acpi: Fix Lenovo Yoga Tablet 2 Pro 1380 sdcard slot not working (stable-fixes).
- mmc: sdhci-acpi: Sort DMI quirks alphabetically (stable-fixes).
- mmc: sdhci-pci: Convert PCIBIOS_* return codes to errnos (git-fixes).
- mmc: sdhci: Do not invert write-protect twice (git-fixes).
- mmc: sdhci: Do not lock spinlock around mmc_gpio_get_ro() (git-fixes).
- mtd: partitions: redboot: Added conversion of operands to a larger type (stable-fixes).
- mtd: rawnand: Bypass a couple of sanity checks during NAND identification (git-fixes).
- mtd: rawnand: Ensure ECC configuration is propagated to upper layers (git-fixes).
- mtd: rawnand: rockchip: ensure NVDDR timings are rejected (git-fixes).
- net: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new (git-fixes).
- net: can: j1939: Initialize unused data in j1939_send_one() (git-fixes).
- net: can: j1939: recover socket queue on CAN bus error during BAM transmission (git-fixes).
- net: ena: Fix redundant device NUMA node override (jsc#PED-8690).
- net: mana: Enable MANA driver on ARM64 with 4K page size (jsc#PED-8491).
- net: mana: Fix possible double free in error handling path (git-fixes).
- net: mana: Fix the extra HZ in mana_hwc_send_request (git-fixes).
- net: phy: Micrel KSZ8061: fix errata solution not taking effect problem (git-fixes).
- net: phy: micrel: add Microchip KSZ 9477 to the device table (git-fixes).
- net: usb: ax88179_178a: improve link status logs (git-fixes).
- net: usb: ax88179_178a: improve reset check (git-fixes).
- net: usb: qmi_wwan: add Telit FN912 compositions (git-fixes).
- net: usb: qmi_wwan: add Telit FN920C04 compositions (stable-fixes).
- net: usb: rtl8150 fix unintiatilzed variables in rtl8150_get_link_ksettings (git-fixes).
- net: usb: smsc95xx: fix changing LED_SEL bit value updated from EEPROM (git-fixes).
- net: usb: sr9700: fix uninitialized variable use in sr_mdio_read (git-fixes).
- net/dcb: check for detached device before executing callbacks (bsc#1215587).
- net/mlx5e: Fix a race in command alloc flow (git-fixes).
- netfilter: conntrack: ignore overly delayed tcp packets (bsc#1223180).
- netfilter: conntrack: prepare tcp_in_window for ternary return value (bsc#1223180).
- netfilter: conntrack: remove pr_debug callsites from tcp tracker (bsc#1223180).
- netfilter: conntrack: work around exceeded receive window (bsc#1223180).
- netfs, fscache: export fscache_put_volume() and add fscache_try_get_volume() (bsc#1228459 bsc#1228462).
- nfc/nci: Add the inconsistency check between the input data length and count (stable-fixes).
- nfs: abort nfs_atomic_open_v23 if name is too long (bsc#1219847).
- nfs: add atomic_open for NFSv3 to handle O_TRUNC correctly (bsc#1219847).
- nfs: avoid infinite loop in pnfs_update_layout (bsc#1219633 bsc#1226226).
- nfs: Fix READ_PLUS when server does not support OP_READ_PLUS (git-fixes).
- nfs: fix undefined behavior in nfs_block_bits() (git-fixes).
- nfs: keep server info for remounts (git-fixes).
- nfs: Leave pages in the pagecache if readpage failed (git-fixes).
- nfsd enforce filehandle check for source file in COPY (git-fixes).
- nfsd: Add an nfsd_file_fsync tracepoint (git-fixes).
- nfsd: Add an NFSD_FILE_GC flag to enable nfsd_file garbage collection (git-fixes).
- nfsd: Add errno mapping for EREMOTEIO (git-fixes).
- nfsd: Add nfsd_file_lru_dispose_list() helper (git-fixes).
- nfsd: add some comments to nfsd_file_do_acquire (git-fixes).
- nfsd: allow nfsd_file_get to sanely handle a NULL pointer (git-fixes).
- nfsd: allow reaping files still under writeback (git-fixes).
- nfsd: Avoid calling fh_drop_write() twice in do_nfsd_create() (git-fixes).
- nfsd: Clean up nfsd_file_put() (git-fixes).
- nfsd: Clean up nfsd_open_verified() (git-fixes).
- nfsd: Clean up nfsd3_proc_create() (git-fixes).
- nfsd: Clean up unused code after rhashtable conversion (git-fixes).
- nfsd: Convert filecache to rhltable (git-fixes).
- nfsd: Convert the filecache to use rhashtable (git-fixes).
- nfsd: De-duplicate hash bucket indexing (git-fixes).
- nfsd: do not free files unconditionally in __nfsd_file_cache_purge (git-fixes).
- nfsd: do not fsync nfsd_files on last close (git-fixes).
- nfsd: do not hand out delegation on setuid files being opened for write (git-fixes).
- nfsd: do not kill nfsd_files because of lease break error (git-fixes).
- nfsd: Do not leave work of closing files to a work queue (bsc#1228140).
- nfsd: do not take/put an extra reference when putting a file (git-fixes).
- nfsd: Ensure nf_inode is never dereferenced (git-fixes).
- nfsd: fix handling of cached open files in nfsd4_open codepath (git-fixes).
- nfsd: Fix licensing header in filecache.c (git-fixes).
- nfsd: fix net-namespace logic in __nfsd_file_cache_purge (git-fixes).
- nfsd: fix nfsd_file_unhash_and_dispose (git-fixes).
- nfsd: Fix potential use-after-free in nfsd_file_put() (git-fixes).
- nfsd: Fix problem of COMMIT and NFS4ERR_DELAY in infinite loop (git-fixes).
- nfsd: Fix the filecache LRU shrinker (git-fixes).
- nfsd: fix up the filecache laundrette scheduling (git-fixes).
- nfsd: fix use-after-free in nfsd_file_do_acquire tracepoint (git-fixes).
- nfsd: Flesh out a documenting comment for filecache.c (git-fixes).
- nfsd: handle errors better in write_ports_addfd() (git-fixes).
- nfsd: Instantiate a struct file when creating a regular NFSv4 file (git-fixes).
- nfsd: Leave open files out of the filecache LRU (git-fixes).
- nfsd: map EBADF (git-fixes).
- nfsd: Move nfsd_file_trace_alloc() tracepoint (git-fixes).
- nfsd: nfsd_file_hash_remove can compute hashval (git-fixes).
- nfsd: NFSD_FILE_KEY_INODE only needs to find GC'ed entries (git-fixes).
- nfsd: nfsd_file_put() can sleep (git-fixes).
- nfsd: nfsd_file_unhash can compute hashval from nf-&gt;nf_inode (git-fixes).
- nfsd: No longer record nf_hashval in the trace log (git-fixes).
- nfsd: optimise recalculate_deny_mode() for a common case (bsc#1217912).
- nfsd: Pass the target nfsd_file to nfsd_commit() (git-fixes).
- nfsd: put the export reference in nfsd4_verify_deleg_dentry (git-fixes).
- nfsd: Record number of flush calls (git-fixes).
- nfsd: Refactor __nfsd_file_close_inode() (git-fixes).
- nfsd: Refactor nfsd_create_setattr() (git-fixes).
- nfsd: Refactor nfsd_file_gc() (git-fixes).
- nfsd: Refactor nfsd_file_lru_scan() (git-fixes).
- nfsd: Refactor NFSv3 CREATE (git-fixes).
- nfsd: Refactor NFSv4 OPEN(CREATE) (git-fixes).
- nfsd: Remove do_nfsd_create() (git-fixes).
- nfsd: Remove lockdep assertion from unhash_and_release_locked() (git-fixes).
- nfsd: Remove nfsd_file::nf_hashval (git-fixes).
- nfsd: remove the pages_flushed statistic from filecache (git-fixes).
- nfsd: reorganize filecache.c (git-fixes).
- nfsd: Replace the 'init once' mechanism (git-fixes).
- nfsd: Report average age of filecache items (git-fixes).
- nfsd: Report count of calls to nfsd_file_acquire() (git-fixes).
- nfsd: Report count of freed filecache items (git-fixes).
- nfsd: Report filecache LRU size (git-fixes).
- nfsd: Report the number of items evicted by the LRU walk (git-fixes).
- nfsd: Retry once in nfsd_open on an -EOPENSTALE return (git-fixes).
- nfsd: rework hashtable handling in nfsd_do_file_acquire (git-fixes).
- nfsd: rework refcounting in filecache (git-fixes).
- nfsd: Separate tracepoints for acquire and create (git-fixes).
- nfsd: Set up an rhashtable for the filecache (git-fixes).
- nfsd: silence extraneous printk on nfsd.ko insertion (git-fixes).
- nfsd: simplify per-net file cache management (git-fixes).
- nfsd: simplify test_bit return in NFSD_FILE_KEY_FULL comparator (git-fixes).
- nfsd: simplify the delayed disposal list code (git-fixes).
- nfsd: Trace filecache LRU activity (git-fixes).
- nfsd: Trace filecache opens (git-fixes).
- nfsd: update comment over __nfsd_file_cache_purge (git-fixes).
- nfsd: verify the opened dentry after setting a delegation (git-fixes).
- nfsd: WARN when freeing an item still linked via nf_lru (git-fixes).
- nfsd: Write verifier might go backwards (git-fixes).
- nfsd: Zero counters when the filecache is re-initialized (git-fixes).
- nfsv4: by default serialize open/close operations (bsc#1223863 bsc#1227362)
- nfsv4: Fixup smatch warning for ambiguous return (git-fixes).
- nilfs2: add missing check for inode numbers on directory entries (git-fixes).
- nilfs2: add missing check for inode numbers on directory entries (stable-fixes).
- nilfs2: avoid undefined behavior in nilfs_cnt32_ge macro (git-fixes).
- nilfs2: convert persistent object allocator to use kmap_local (git-fixes).
- nilfs2: fix incorrect inode allocation from reserved inodes (git-fixes).
- nilfs2: fix inode number range checks (git-fixes).
- nilfs2: fix inode number range checks (stable-fixes).
- nilfs2: fix potential hang in nilfs_detach_log_writer() (stable-fixes).
- nvme-auth: alloc nvme_dhchap_key as single buffer (git-fixes).
- nvme-auth: allow mixing of secret and hash lengths (git-fixes).
- nvme-auth: use transformed key size to create resp (git-fixes).
- nvme-multipath: find NUMA path only for online numa-node (git-fixes).
- nvme-pci: add missing condition check for existence of mapped data (git-fixes).
- nvme-pci: Fix the instructions for disabling power management (git-fixes).
- nvme: adjust multiples of NVME_CTRL_PAGE_SIZE in offset (git-fixes).
- nvme: avoid double free special payload (git-fixes).
- nvme: ensure reset state check ordering (bsc#1215492).
- nvme: find numa distance only if controller has valid numa id (git-fixes).
- nvme: fixup comment for nvme RDMA Provider Type (git-fixes).
- nvme: use ctrl state accessor (bsc#1215492).
- nvmet-auth: fix nvmet_auth hash error handling (git-fixes).
- nvmet-passthru: propagate status from id override functions (git-fixes).
- nvmet: always initialize cqe.result (git-fixes).
- nvmet: fix a possible leak when destroy a ctrl during qp establishment (git-fixes).
- ocfs2: adjust enabling place for la window (bsc#1219224).
- ocfs2: fix DIO failure due to insufficient transaction credits (bsc#1216834).
- ocfs2: fix sparse warnings (bsc#1219224).
- ocfs2: improve write IO performance when fragmentation is high (bsc#1219224).
- ocfs2: remove redundant assignment to variable free_space (bsc#1228409).
- ocfs2: speed up chain-list searching (bsc#1219224).
- ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410).
- orangefs: fix out-of-bounds fsid access (git-fixes).
- pci: Add PCI_ERROR_RESPONSE and related definitions (stable-fixes).
- pci: Clear Secondary Status errors after enumeration (bsc#1226928)
- pci: Extend ACS configurability (bsc#1228090).
- pci: Fix resource double counting on remove &amp; rescan (git-fixes).
- pci: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git-fixes).
- pci: Introduce cleanup helpers for device reference counts and locks (git-fixes).
- pci: Introduce cleanup helpers for device reference counts and locks (stable-fixes).
- pci: keystone: Do not enable BAR 0 for AM654x (git-fixes).
- pci: keystone: Fix NULL pointer dereference in case of DT error in ks_pcie_setup_rc_app_regs() (git-fixes).
- pci: keystone: Relocate ks_pcie_set/clear_dbi_mode() (git-fixes).
- pci: rockchip: Use GPIOD_OUT_LOW flag while requesting ep_gpio (git-fixes).
- pci: tegra194: Set EP alignment restriction for inbound ATU (git-fixes).
- pci/aspm: Update save_state when configuration changes (bsc#1226915)
- pci/dpc: Fix use-after-free on concurrent DPC and hot-removal (git-fixes).
- pci/pm: Avoid D3cold for HP Pavilion 17 PC/1972 PCIe Ports (git-fixes).
- pci/pm: Avoid D3cold for HP Pavilion 17 PC/1972 PCIe Ports (stable-fixes).
- pinctrl: core: fix possible memory leak when pinctrl_enable() fails (git-fixes).
- pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER (git-fixes).
- pinctrl: freescale: mxs: Fix refcount of child (git-fixes).
- pinctrl: qcom: spmi-gpio: drop broken pm8008 support (git-fixes).
- pinctrl: rockchip: fix pinmux bits for RK3328 GPIO2-B pins (git-fixes).
- pinctrl: rockchip: fix pinmux bits for RK3328 GPIO3-B pins (git-fixes).
- pinctrl: rockchip: fix pinmux reset in rockchip_pmx_set (git-fixes).
- pinctrl: rockchip: update rk3308 iomux routes (git-fixes).
- pinctrl: rockchip: use dedicated pinctrl type for RK3328 (git-fixes).
- pinctrl: single: fix possible memory leak when pinctrl_enable() fails (git-fixes).
- pinctrl: ti: ti-iodelay: fix possible memory leak when pinctrl_enable() fails (git-fixes).
- platform/chrome: cros_ec_debugfs: fix wrong EC message version (git-fixes).
- platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git-fixes).
- platform/x86: dell-smbios-base: Use sysfs_emit() (stable-fixes).
- platform/x86: dell-smbios: Fix wrong token data in sysfs (git-fixes).
- platform/x86: lg-laptop: Change ACPI device id (stable-fixes).
- platform/x86: lg-laptop: Remove LGEX0815 hotkey handling (stable-fixes).
- platform/x86: touchscreen_dmi: Add info for GlobalSpace SolT IVW 11.6' tablet (stable-fixes).
- platform/x86: touchscreen_dmi: Add info for the EZpad 6s Pro (stable-fixes).
- platform/x86: wireless-hotkey: Add support for LG Airplane Button (stable-fixes).
- power: supply: cros_usbpd: provide ID table for avoiding fallback match (stable-fixes).
- powerpc: fix a file leak in kvm_vcpu_ioctl_enable_cap() (bsc#1194869).
- powerpc/cpuidle: Set CPUIDLE_FLAG_POLLING for snooze state (bsc#1227121 ltc#207129).
- powerpc/kasan: Disable address sanitization in kexec paths (bsc#1194869).
- powerpc/pseries: Fix scv instruction crash with kexec (bsc#1194869).
- powerpc/rtas: clean up includes (bsc#1227487).
- powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() (bsc#1227487).
- pwm: stm32: Always do lazy disabling (git-fixes).
- random: treat bootloader trust toggle the same way as cpu trust toggle (bsc#1226953).
- ras/amd/atl: Fix MI300 bank hash (bsc#1225300).
- ras/amd/atl: Use system settings for MI300 DRAM to normalized address translation (bsc#1225300).
- rdma/cache: Release GID table even if leak is detected (git-fixes)
- rdma/device: Return error earlier if port in not valid (git-fixes)
- rdma/hns: Check atomic wr length (git-fixes)
- rdma/hns: Fix incorrect sge nums calculation (git-fixes)
- rdma/hns: Fix insufficient extend DB for VFs. (git-fixes)
- rdma/hns: Fix mbx timing out before CMD execution is completed (git-fixes)
- rdma/hns: Fix missing pagesize and alignment check in FRMR (git-fixes)
- rdma/hns: Fix shift-out-bounds when max_inline_data is 0 (git-fixes)
- rdma/hns: Fix soft lockup under heavy CEQE load (git-fixes)
- rdma/hns: Fix undifined behavior caused by invalid max_sge (git-fixes)
- rdma/hns: Fix unmatch exception handling when init eq table fails (git-fixes)
- rdma/irdma: Drop unused kernel push code (git-fixes)
- rdma/iwcm: Fix a use-after-free related to destroying CM IDs (git-fixes)
- rdma/mana_ib: Ignore optional access flags for MRs (git-fixes).
- rdma/mlx4: Fix truncated output warning in alias_GUID.c (git-fixes)
- rdma/mlx4: Fix truncated output warning in mad.c (git-fixes)
- rdma/mlx5: Add check for srq max_sge attribute (git-fixes)
- rdma/mlx5: Set mkeys for dmabuf at PAGE_SIZE (git-fixes)
- rdma/restrack: Fix potential invalid address access (git-fixes)
- rdma/rxe: Do not set BTH_ACK_MASK for UC or UD QPs (git-fixes)
- regmap-i2c: Subtract reg size from max_write (stable-fixes).
- regulator: bd71815: fix ramp values (git-fixes).
- regulator: core: Fix modpost error 'regulator_get_regmap' undefined (git-fixes).
- regulator: irq_helpers: duplicate IRQ name (stable-fixes).
- regulator: vqmmc-ipq4019: fix module autoloading (stable-fixes).
- Revert 'Add remote for nfs maintainer'
- Revert 'ALSA: firewire-lib: obsolete workqueue for period update' (bsc#1208783).
- Revert 'ALSA: firewire-lib: operate for period elapse event in process context' (bsc#1208783).
- Revert 'build initrd without systemd' (bsc#1195775)'.
- Revert 'leds: led-core: Fix refcount leak in of_led_get()' (git-fixes).
- Revert 'usb: musb: da8xx: Set phy in OTG mode by default' (stable-fixes).
- rpcrdma: fix handling for RDMA_CM_EVENT_DEVICE_REMOVAL (git-fixes).
- rpm/guards: fix precedence issue with control flow operator
- rpm/kernel-obs-build.spec.in: Add iso9660 (bsc#1226212)
- rpm/kernel-obs-build.spec.in: Add networking modules for docker (bsc#1226211)
- rpm/kernel-obs-build.spec.in: Include algif_hash, aegis128 and xts modules afgif_hash is needed by some packages (e.g. iwd) for tests, xts is used for LUKS2 volumes by default and aegis128 is useful as AEAD cipher for LUKS2.
- rpm/mkspec-dtb: dtbs have moved to vendor sub-directories in 6.5
- rtc: cmos: Fix return value of nvmem callbacks (git-fixes).
- rtc: interface: Add RTC offset to alarm after fix-up (git-fixes).
- rtc: isl1208: Fix return value of nvmem callbacks (git-fixes).
- rtlwifi: rtl8192de: Style clean-ups (stable-fixes).
- s390: Implement __iowrite32_copy() (bsc#1226502)
- s390: Stop using weak symbols for __iowrite64_copy() (bsc#1226502)
- saa7134: Unchecked i2c_transfer function result fixed (git-fixes).
- sched: Fix stop_one_cpu_nowait() vs hotplug (git fixes (sched)).
- sched/core: Fix incorrect initialization of the 'burst' parameter in cpu_max_write() (bsc#1226791).
- sched/fair: Do not balance task to its current running CPU (git fixes (sched)).
- scsi: lpfc: Allow DEVICE_RECOVERY mode after RSCN receipt if in PRLI_ISSUE state (bsc#1228857).
- scsi: lpfc: Cancel ELS WQE instead of issuing abort when SLI port is inactive (bsc#1228857).
- scsi: lpfc: Fix handling of fully recovered fabric node in dev_loss callbk (bsc#1228857).
- scsi: lpfc: Fix incorrect request len mbox field when setting trunking via sysfs (bsc#1228857).
- scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info (bsc#1228857).
- scsi: lpfc: Relax PRLI issue conditions after GID_FT response (bsc#1228857).
- scsi: lpfc: Revise lpfc_prep_embed_io routine with proper endian macro usages (bsc#1228857).
- scsi: lpfc: Update lpfc version to 14.4.0.3 (bsc#1228857).
- scsi: qla2xxx: Avoid possible run-time warning with long model_num (bsc#1228850).
- scsi: qla2xxx: Complete command early within lock (bsc#1228850).
- scsi: qla2xxx: Convert comma to semicolon (bsc#1228850).
- scsi: qla2xxx: Drop driver owner assignment (bsc#1228850).
- scsi: qla2xxx: During vport delete send async logout explicitly (bsc#1228850).
- scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850).
- scsi: qla2xxx: Fix flash read failure (bsc#1228850).
- scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850).
- scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850).
- scsi: qla2xxx: Indent help text (bsc#1228850).
- scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850).
- scsi: qla2xxx: Remove unused struct 'scsi_dif_tuple' (bsc#1228850).
- scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds (bsc#1228850).
- scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850).
- scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850).
- scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850).
- scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850).
- scsi: sd: Update DIX config every time sd_revalidate_disk() is called (bsc#1218570).
- selftests/bpf: __imm_insn &amp; __imm_const macro for bpf_misc.h (bsc#1225903).
- selftests/bpf: Add a selftest for checking subreg equality (bsc#1225903).
- selftests/bpf: add pre bpf_prog_test_run_opts() callback for test_loader (bsc#1225903).
- selftests/bpf: add precision propagation tests in the presence of subprogs (bsc#1225903).
- selftests/bpf: Add pruning test case for bpf_spin_lock (bsc#1225903).
- selftests/bpf: Check if mark_chain_precision() follows scalar ids (bsc#1225903).
- selftests/bpf: check if max number of bpf_loop iterations is tracked (bsc#1225903).
- selftests/bpf: fix __retval() being always ignored (bsc#1225903).
- selftests/bpf: fix unpriv_disabled check in test_verifier (bsc#1225903).
- selftests/bpf: make test_align selftest more robust (bsc#1225903).
- selftests/bpf: populate map_array_ro map for verifier_array_access test (bsc#1225903).
- selftests/bpf: prog_tests entry point for migrated test_verifier tests (bsc#1225903).
- selftests/bpf: Report program name on parse_test_spec error (bsc#1225903).
- selftests/bpf: Support custom per-test flags and multiple expected messages (bsc#1225903).
- selftests/bpf: test case for callback_depth states pruning logic (bsc#1225903).
- selftests/bpf: test case for relaxed prunning of active_lock.id (bsc#1225903).
- selftests/bpf: test cases for regsafe() bug skipping check_id() (bsc#1225903).
- selftests/bpf: test widening for iterating callbacks (bsc#1225903).
- selftests/bpf: Tests execution support for test_loader.c (bsc#1225903).
- selftests/bpf: tests for iterating callbacks (bsc#1225903).
- selftests/bpf: track string payload offset as scalar in strobemeta (bsc#1225903).
- selftests/bpf: Unprivileged tests for test_loader.c (bsc#1225903).
- selftests/bpf: Verify copy_register_state() preserves parent/live fields (bsc#1225903).
- selftests/bpf: verify states_equal() maintains idmap across all frames (bsc#1225903).
- selftests/bpf: Verify that check_ids() is used for scalars in regsafe() (bsc#1225903).
- selftests/sigaltstack: Fix ppc64 GCC build (git-fixes).
- smb: client: ensure to try all targets when finding nested links (bsc#1224020).
- smb: client: guarantee refcounted children from parent session (bsc#1224679.
- soc: ti: wkup_m3_ipc: Send NULL dummy message instead of pointer message (stable-fixes).
- soundwire: cadence: fix invalid PDI offset (stable-fixes).
- spi: imx: Do not expect DMA for i.MX{25,35,50,51,53} cspi devices (stable-fixes).
- spi: mux: set ctlr-&gt;bits_per_word_mask (stable-fixes).
- spi: stm32: Do not warn about spurious interrupts (git-fixes).
- string.h: Introduce memtostr() and memtostr_pad() (bsc#1228850).
- sunrpc: avoid soft lockup when transmitting UDP to reachable server (bsc#1225272).
- sunrpc: Fix gss_free_in_token_pages() (git-fixes).
- sunrpc: Fix loop termination condition in gss_free_in_token_pages() (git-fixes).
- sunrpc: fix NFSACL RPC retry on soft mount (git-fixes).
- sunrpc: return proper error from gss_wrap_req_priv (git-fixes).
- supported.conf: Add APM X-Gene SoC hardware monitoring driver (bsc#1223265 jsc#PED-8570)
- supported.conf: mark orangefs as optional We do not support orangefs at all (and it is already marked as such), but since there are no SLE consumers of it, mark it as optional.
- supported.conf: mark ufs as unsupported UFS is an unsupported filesystem, mark it as such. We still keep it around (not marking as optional), to accommodate any potential migrations from BSD systems.
- tpm_tis: Resend command to recover from data transfer errors (bsc#1082555).
- tpm_tis: Use tpm_chip_{start,stop} decoration inside tpm_tis_resume (bsc#1082555).
- tpm, tpm_tis: Avoid cache incoherency in test for interrupts (bsc#1082555).
- tpm, tpm_tis: Claim locality before writing interrupt registers (bsc#1082555).
- tpm, tpm_tis: Claim locality in interrupt handler (bsc#1082555).
- tpm, tpm_tis: Claim locality when interrupts are reenabled on resume (bsc#1082555).
- tpm, tpm_tis: correct tpm_tis_flags enumeration values (bsc#1082555).
- tpm, tpm_tis: Do not skip reset of original interrupt vector (bsc#1082555).
- tpm, tpm_tis: Only handle supported interrupts (bsc#1082555).
- tpm, tpm: Implement usage counter for locality (bsc#1082555).
- tpm: Allow system suspend to continue when TPM suspend fails (bsc#1082555).
- tpm: Prevent hwrng from activating during resume (bsc#1082555).
- tracing: Build event generation tests only as modules (git-fixes).
- tracing/net_sched: NULL pointer dereference in perf_trace_qdisc_reset() (git-fixes).
- tracing/osnoise: Add OSNOISE_WORKLOAD option (bsc#1228330)
- tracing/osnoise: Add osnoise/options file (bsc#1228330)
- tracing/osnoise: Do not follow tracing_cpumask (bsc#1228330)
- tracing/osnoise: Fix notify new tracing_max_latency (bsc#1228330)
- tracing/osnoise: Make osnoise_instances static (bsc#1228330)
- tracing/osnoise: Split workload start from the tracer start (bsc#1228330)
- tracing/osnoise: Support a list of trace_array *tr (bsc#1228330)
- tracing/osnoise: Use built-in RCU list checking (bsc#1228330)
- tracing/timerlat: Notify new max thread latency (bsc#1228330)
- tty: mcf: MCF54418 has 10 UARTS (git-fixes).
- usb-storage: alauda: Check whether the media is initialized (git-fixes).
- usb: Add USB_QUIRK_NO_SET_INTF quirk for START BP-850k (stable-fixes).
- usb: atm: cxacru: fix endpoint checking in cxacru_bind() (git-fixes).
- usb: cdns3: allocate TX FIFO size according to composite EP number (git-fixes).
- usb: cdns3: fix incorrect calculation of ep_buf_size when more than one config (git-fixes).
- usb: cdns3: fix iso transfer error when mult is not zero (git-fixes).
- usb: cdns3: improve handling of unaligned address case (git-fixes).
- usb: cdns3: optimize OUT transfer by copying only actual received data (git-fixes).
- usb: cdns3: skip set TRB_IOC when usb_request: no_interrupt is true (git-fixes).
- usb: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (git-fixes).
- usb: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor (git-fixes).
- usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock (git-fixes).
- usb: dwc3: gadget: Do not delay End Transfer on delayed_status (git-fixes).
- usb: dwc3: gadget: Force sending delayed status during soft disconnect (git-fixes).
- usb: dwc3: gadget: Synchronize IRQ between soft connect/disconnect (git-fixes).
- usb: fotg210-hcd: delete an incorrect bounds test (git-fixes).
- usb: gadget: call usb_gadget_check_config() to verify UDC capability (git-fixes).
- usb: gadget: configfs: Prevent OOB read/write in usb_string_copy() (stable-fixes).
- usb: gadget: printer: fix races against disable (git-fixes).
- usb: gadget: printer: SS+ support (stable-fixes).
- usb: misc: uss720: check for incompatible versions of the Belkin F5U002 (stable-fixes).
- usb: musb: da8xx: fix a resource leak in probe() (git-fixes).
- usb: serial: mos7840: fix crash on resume (git-fixes).
- usb: serial: option: add Fibocom FM350-GL (stable-fixes).
- usb: serial: option: add Netprisma LCUK54 series modules (stable-fixes).
- usb: serial: option: add Rolling RW350-GL variants (stable-fixes).
- usb: serial: option: add support for Foxconn T99W651 (stable-fixes).
- usb: serial: option: add Telit FN912 rmnet compositions (stable-fixes).
- usb: serial: option: add Telit generic core-dump composition (stable-fixes).
- usb: typec: tcpm: clear pd_event queue in PORT_RESET (git-fixes).
- usb: typec: tcpm: fix use-after-free case in tcpm_register_source_caps (git-fixes).
- usb: typec: tcpm: Ignore received Hard Reset in TOGGLING state (git-fixes).
- usb: typec: ucsi: Ack also failed Get Error commands (git-fixes).
- usb: typec: ucsi: Never send a lone connector change ack (git-fixes).
- usb: xen-hcd: Traverse host/ when CONFIG_USB_XEN_HCD is selected (git-fixes).
- usb: xhci-plat: Do not include xhci.h (git-fixes).
- usb: xhci-plat: fix legacy PHY double init (git-fixes).
- usb: xhci: address off-by-one in xhci_num_trbs_free() (git-fixes).
- usb: xhci: Implement xhci_handshake_check_state() helper (git-fixes).
- usb: xhci: improve debug message in xhci_ring_expansion_needed() (git-fixes).
- watchdog: bd9576_wdt: switch to using devm_fwnode_gpiod_get() (stable-fixes).
- watchdog: bd9576: Drop 'always-running' property (git-fixes).
- wifi: ath11k: fix wrong handling of CCMP256 and GCMP ciphers (git-fixes).
- wifi: brcmsmac: LCN PHY code is used for BCM4313 2G-only device (git-fixes).
- wifi: cfg80211: fix the order of arguments for trace events of the tx_rx_evt class (stable-fixes).
- wifi: cfg80211: fix typo in cfg80211_calculate_bitrate_he() (git-fixes).
- wifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he() (git-fixes).
- wifi: cfg80211: Lock wiphy in cfg80211_get_station (git-fixes).
- wifi: cfg80211: pmsr: use correct nla_get_uX functions (git-fixes).
- wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values (git-fixes).
- wifi: cfg80211: wext: add extra SIOCSIWSCAN data check (stable-fixes).
- wifi: iwlwifi: dbg_ini: move iwl_dbg_tlv_free outside of debugfs ifdef (git-fixes).
- wifi: iwlwifi: mvm: check n_ssids before accessing the ssids (git-fixes).
- wifi: iwlwifi: mvm: d3: fix WoWLAN command version lookup (stable-fixes).
- wifi: iwlwifi: mvm: do not read past the mfuart notifcation (git-fixes).
- wifi: iwlwifi: mvm: Handle BIGTK cipher in kek_kck cmd (stable-fixes).
- wifi: iwlwifi: mvm: properly set 6 GHz channel direct probe option (stable-fixes).
- wifi: iwlwifi: mvm: revert gen2 TX A-MPDU size to 64 (git-fixes).
- wifi: mac80211: correctly parse Spatial Reuse Parameter Set element (git-fixes).
- wifi: mac80211: disable softirqs for queued frame handling (git-fixes).
- wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() (git-fixes).
- wifi: mac80211: fix UBSAN noise in ieee80211_prep_hw_scan() (stable-fixes).
- wifi: mac80211: handle tasklet frames before stopping (stable-fixes).
- wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects (git-fixes).
- wifi: mac80211: mesh: init nonpeer_pm to active by default in mesh sdata (stable-fixes).
- wifi: mt76: replace skb_put with skb_put_zero (stable-fixes).
- wifi: mwifiex: Fix interface type change (git-fixes).
- wifi: rtl8xxxu: Fix the TX power of RTL8192CU, RTL8723AU (stable-fixes).
- wifi: rtlwifi: rtl8192de: Fix endianness issue in RX path (stable-fixes).
- wifi: rtlwifi: rtl8192de: Fix low speed with WPA3-SAE (stable-fixes).
- wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter() (git-fixes).
- wifi: wilc1000: fix ies_len type in connect path (git-fixes).
- workqueue: Improve scalability of workqueue watchdog touch (bsc#1193454).
- workqueue: wq_watchdog_touch is always called with valid CPU (bsc#1193454).
- x.509: Fix the parser of extended key usage for length (bsc#1218820).
- x86: Stop using weak symbols for __iowrite32_copy() (bsc#1226502)
- x86/amd_nb: Use Family 19h Models 60h-7Fh Function 4 IDs (git-fixes).
- x86/apic: Force native_apic_mem_read() to use the MOV instruction (git-fixes).
- x86/bhi: Avoid warning in #DB handler due to BHI mitigation (git-fixes).
- x86/bugs: Remove default case for fully switched enums (bsc#1227900).
- x86/fpu: Fix AMD X86_BUG_FXSAVE_LEAK fixup (git-fixes).
- x86/ibt,ftrace: Search for __fentry__ location (git-fixes).
- x86/Kconfig: Transmeta Crusoe is CPU family 5, not 6 (git-fixes).
- x86/mce: Dynamically size space for machine check records (bsc#1222241).
- x86/mm: Allow guest.enc_status_change_prepare() to fail (git-fixes).
- x86/mm: Fix enc_status_change_finish_noop() (git-fixes).
- x86/purgatory: Switch to the position-independent small code model (git-fixes).
- x86/srso: Move retbleed IBPB check into existing 'has_microcode' code block (bsc#1227900).
- x86/srso: Remove 'pred_cmd' label (bsc#1227900).
- x86/tdx: Fix race between set_memory_encrypted() and load_unaligned_zeropad() (git-fixes).
- x86/tsc: Trust initial offset in architectural TSC-adjust MSRs (bsc#1222015 bsc#1226962).
- xfs: Add cond_resched to block unmap range and reflink remap path (bsc#1228226).
- xfs: make sure sb_fdblocks is non-negative (bsc#1225419).
- xhci: Apply broken streams quirk to Etron EJ188 xHCI host (stable-fixes).
- xhci: Apply reset resume quirk to Etron EJ188 xHCI host (stable-fixes).
- xhci: Fix failure to detect ring expansion need (git-fixes).
- xhci: fix matching completion events with TDs (git-fixes).
- xhci: Fix transfer ring expansion size calculation (git-fixes).
- xhci: Handle TD clearing for multiple streams case (git-fixes).
- xhci: remove unused stream_id parameter from xhci_handle_halted_endpoint() (git-fixes).
- xhci: restre deleted trb fields for tracing (git-fixes).
- xhci: retry Stop Endpoint on buggy NEC controllers (git-fixes).
- xhci: Set correct transferred length for cancelled bulk transfers (stable-fixes).
- xhci: Simplify event ring dequeue pointer update for port change events (git-fixes).
- xhci: simplify event ring dequeue tracking for transfer events (git-fixes).
- xhci: Stop unnecessary tracking of free trbs in a ring (git-fixes).
- xhci: update event ring dequeue pointer position to controller correctly (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2024-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082555">SUSE bug 1082555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190336">SUSE bug 1190336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193454">SUSE bug 1193454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193554">SUSE bug 1193554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193787">SUSE bug 1193787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193883">SUSE bug 1193883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194324">SUSE bug 1194324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194826">SUSE bug 1194826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195065">SUSE bug 1195065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195341">SUSE bug 1195341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195349">SUSE bug 1195349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195357">SUSE bug 1195357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195668">SUSE bug 1195668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195775">SUSE bug 1195775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195927">SUSE bug 1195927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195957">SUSE bug 1195957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196746">SUSE bug 1196746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196823">SUSE bug 1196823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197146">SUSE bug 1197146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197246">SUSE bug 1197246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197762">SUSE bug 1197762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197915">SUSE bug 1197915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198014">SUSE bug 1198014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199295">SUSE bug 1199295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202346">SUSE bug 1202346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202686">SUSE bug 1202686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202767">SUSE bug 1202767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202780">SUSE bug 1202780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205205">SUSE bug 1205205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207361">SUSE bug 1207361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208783">SUSE bug 1208783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209636">SUSE bug 1209636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213123">SUSE bug 1213123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215492">SUSE bug 1215492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215587">SUSE bug 1215587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216834">SUSE bug 1216834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217912">SUSE bug 1217912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218148">SUSE bug 1218148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218570">SUSE bug 1218570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218820">SUSE bug 1218820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219224">SUSE bug 1219224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219633">SUSE bug 1219633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219832">SUSE bug 1219832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219847">SUSE bug 1219847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220138">SUSE bug 1220138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220185">SUSE bug 1220185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220186">SUSE bug 1220186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220368">SUSE bug 1220368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220812">SUSE bug 1220812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220869">SUSE bug 1220869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220876">SUSE bug 1220876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220942">SUSE bug 1220942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220952">SUSE bug 1220952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220958">SUSE bug 1220958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221010">SUSE bug 1221010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221086">SUSE bug 1221086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221282">SUSE bug 1221282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221647">SUSE bug 1221647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221654">SUSE bug 1221654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221656">SUSE bug 1221656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221659">SUSE bug 1221659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221958">SUSE bug 1221958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222015">SUSE bug 1222015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222072">SUSE bug 1222072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222080">SUSE bug 1222080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222241">SUSE bug 1222241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222254">SUSE bug 1222254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222323">SUSE bug 1222323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222326">SUSE bug 1222326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222328">SUSE bug 1222328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222364">SUSE bug 1222364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222625">SUSE bug 1222625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222702">SUSE bug 1222702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222728">SUSE bug 1222728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222799">SUSE bug 1222799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222809">SUSE bug 1222809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222810">SUSE bug 1222810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222893">SUSE bug 1222893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223013">SUSE bug 1223013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223018">SUSE bug 1223018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223021">SUSE bug 1223021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223180">SUSE bug 1223180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223265">SUSE bug 1223265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223384">SUSE bug 1223384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223635">SUSE bug 1223635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223641">SUSE bug 1223641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223652">SUSE bug 1223652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223675">SUSE bug 1223675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223778">SUSE bug 1223778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223806">SUSE bug 1223806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223813">SUSE bug 1223813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223815">SUSE bug 1223815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223836">SUSE bug 1223836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223863">SUSE bug 1223863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224020">SUSE bug 1224020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224331">SUSE bug 1224331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224414">SUSE bug 1224414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224488">SUSE bug 1224488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224497">SUSE bug 1224497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224498">SUSE bug 1224498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224499">SUSE bug 1224499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224500">SUSE bug 1224500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224504">SUSE bug 1224504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224512">SUSE bug 1224512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224516">SUSE bug 1224516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224517">SUSE bug 1224517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224520">SUSE bug 1224520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224539">SUSE bug 1224539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224540">SUSE bug 1224540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224545">SUSE bug 1224545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224548">SUSE bug 1224548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224552">SUSE bug 1224552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224557">SUSE bug 1224557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224572">SUSE bug 1224572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224573">SUSE bug 1224573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224583">SUSE bug 1224583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224585">SUSE bug 1224585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224588">SUSE bug 1224588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224602">SUSE bug 1224602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224603">SUSE bug 1224603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224604">SUSE bug 1224604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224605">SUSE bug 1224605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224612">SUSE bug 1224612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224614">SUSE bug 1224614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224619">SUSE bug 1224619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224636">SUSE bug 1224636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224641">SUSE bug 1224641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224661">SUSE bug 1224661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224662">SUSE bug 1224662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224670">SUSE bug 1224670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224671">SUSE bug 1224671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224674">SUSE bug 1224674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224677">SUSE bug 1224677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224679">SUSE bug 1224679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224683">SUSE bug 1224683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224694">SUSE bug 1224694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224696">SUSE bug 1224696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224700">SUSE bug 1224700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224703">SUSE bug 1224703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224712">SUSE bug 1224712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224716">SUSE bug 1224716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224719">SUSE bug 1224719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224735">SUSE bug 1224735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224743">SUSE bug 1224743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224749">SUSE bug 1224749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224764">SUSE bug 1224764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224765">SUSE bug 1224765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224766">SUSE bug 1224766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224935">SUSE bug 1224935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224946">SUSE bug 1224946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224951">SUSE bug 1224951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225050">SUSE bug 1225050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225088">SUSE bug 1225088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225098">SUSE bug 1225098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225105">SUSE bug 1225105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225272">SUSE bug 1225272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225300">SUSE bug 1225300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225389">SUSE bug 1225389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225391">SUSE bug 1225391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225419">SUSE bug 1225419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225426">SUSE bug 1225426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225448">SUSE bug 1225448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225452">SUSE bug 1225452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225467">SUSE bug 1225467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225475">SUSE bug 1225475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225484">SUSE bug 1225484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225487">SUSE bug 1225487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225489">SUSE bug 1225489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225504">SUSE bug 1225504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225505">SUSE bug 1225505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225514">SUSE bug 1225514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225518">SUSE bug 1225518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225535">SUSE bug 1225535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225564">SUSE bug 1225564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225573">SUSE bug 1225573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225581">SUSE bug 1225581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225585">SUSE bug 1225585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225586">SUSE bug 1225586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225602">SUSE bug 1225602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225611">SUSE bug 1225611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225681">SUSE bug 1225681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225692">SUSE bug 1225692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225698">SUSE bug 1225698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225699">SUSE bug 1225699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225704">SUSE bug 1225704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225711">SUSE bug 1225711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225714">SUSE bug 1225714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225717">SUSE bug 1225717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225719">SUSE bug 1225719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225726">SUSE bug 1225726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225732">SUSE bug 1225732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225737">SUSE bug 1225737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225744">SUSE bug 1225744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225745">SUSE bug 1225745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225746">SUSE bug 1225746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225749">SUSE bug 1225749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225752">SUSE bug 1225752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225753">SUSE bug 1225753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225757">SUSE bug 1225757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225758">SUSE bug 1225758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225759">SUSE bug 1225759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225760">SUSE bug 1225760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225767">SUSE bug 1225767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225770">SUSE bug 1225770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225815">SUSE bug 1225815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225823">SUSE bug 1225823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225834">SUSE bug 1225834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225838">SUSE bug 1225838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225840">SUSE bug 1225840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225851">SUSE bug 1225851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225866">SUSE bug 1225866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225872">SUSE bug 1225872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225894">SUSE bug 1225894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225903">SUSE bug 1225903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226022">SUSE bug 1226022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226131">SUSE bug 1226131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226145">SUSE bug 1226145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226149">SUSE bug 1226149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226155">SUSE bug 1226155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226202">SUSE bug 1226202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226211">SUSE bug 1226211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226212">SUSE bug 1226212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226226">SUSE bug 1226226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226502">SUSE bug 1226502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226514">SUSE bug 1226514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226519">SUSE bug 1226519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226520">SUSE bug 1226520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226537">SUSE bug 1226537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226538">SUSE bug 1226538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226539">SUSE bug 1226539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226550">SUSE bug 1226550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226551">SUSE bug 1226551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226552">SUSE bug 1226552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226553">SUSE bug 1226553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226554">SUSE bug 1226554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226555">SUSE bug 1226555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226556">SUSE bug 1226556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226557">SUSE bug 1226557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226558">SUSE bug 1226558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226559">SUSE bug 1226559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226561">SUSE bug 1226561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226562">SUSE bug 1226562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226563">SUSE bug 1226563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226564">SUSE bug 1226564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226565">SUSE bug 1226565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226566">SUSE bug 1226566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226567">SUSE bug 1226567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226568">SUSE bug 1226568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226569">SUSE bug 1226569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226570">SUSE bug 1226570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226571">SUSE bug 1226571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226572">SUSE bug 1226572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226574">SUSE bug 1226574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226575">SUSE bug 1226575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226576">SUSE bug 1226576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226577">SUSE bug 1226577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226579">SUSE bug 1226579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226580">SUSE bug 1226580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226581">SUSE bug 1226581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226582">SUSE bug 1226582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226583">SUSE bug 1226583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226585">SUSE bug 1226585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226587">SUSE bug 1226587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226588">SUSE bug 1226588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226593">SUSE bug 1226593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226595">SUSE bug 1226595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226597">SUSE bug 1226597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226601">SUSE bug 1226601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226602">SUSE bug 1226602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226603">SUSE bug 1226603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226607">SUSE bug 1226607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226610">SUSE bug 1226610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226614">SUSE bug 1226614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226616">SUSE bug 1226616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226617">SUSE bug 1226617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226618">SUSE bug 1226618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226619">SUSE bug 1226619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226621">SUSE bug 1226621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226622">SUSE bug 1226622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226624">SUSE bug 1226624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226626">SUSE bug 1226626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226628">SUSE bug 1226628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226629">SUSE bug 1226629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226632">SUSE bug 1226632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226633">SUSE bug 1226633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226634">SUSE bug 1226634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226637">SUSE bug 1226637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226643">SUSE bug 1226643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226644">SUSE bug 1226644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226645">SUSE bug 1226645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226647">SUSE bug 1226647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226650">SUSE bug 1226650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226653">SUSE bug 1226653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226657">SUSE bug 1226657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226658">SUSE bug 1226658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226669">SUSE bug 1226669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226670">SUSE bug 1226670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226672">SUSE bug 1226672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226673">SUSE bug 1226673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226674">SUSE bug 1226674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226675">SUSE bug 1226675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226678">SUSE bug 1226678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226679">SUSE bug 1226679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226683">SUSE bug 1226683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226685">SUSE bug 1226685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226686">SUSE bug 1226686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226690">SUSE bug 1226690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226691">SUSE bug 1226691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226692">SUSE bug 1226692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226693">SUSE bug 1226693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226696">SUSE bug 1226696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226697">SUSE bug 1226697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226698">SUSE bug 1226698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226699">SUSE bug 1226699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226701">SUSE bug 1226701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226702">SUSE bug 1226702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226703">SUSE bug 1226703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226704">SUSE bug 1226704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226705">SUSE bug 1226705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226706">SUSE bug 1226706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226708">SUSE bug 1226708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226709">SUSE bug 1226709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226710">SUSE bug 1226710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226711">SUSE bug 1226711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226712">SUSE bug 1226712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226713">SUSE bug 1226713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226715">SUSE bug 1226715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226716">SUSE bug 1226716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226718">SUSE bug 1226718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226719">SUSE bug 1226719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226720">SUSE bug 1226720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226721">SUSE bug 1226721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226730">SUSE bug 1226730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226732">SUSE bug 1226732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226734">SUSE bug 1226734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226735">SUSE bug 1226735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226737">SUSE bug 1226737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226738">SUSE bug 1226738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226739">SUSE bug 1226739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226740">SUSE bug 1226740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226744">SUSE bug 1226744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226746">SUSE bug 1226746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226747">SUSE bug 1226747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226749">SUSE bug 1226749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226750">SUSE bug 1226750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226754">SUSE bug 1226754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226757">SUSE bug 1226757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226762">SUSE bug 1226762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226764">SUSE bug 1226764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226767">SUSE bug 1226767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226768">SUSE bug 1226768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226769">SUSE bug 1226769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226771">SUSE bug 1226771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226774">SUSE bug 1226774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226775">SUSE bug 1226775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226777">SUSE bug 1226777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226780">SUSE bug 1226780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226781">SUSE bug 1226781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226783">SUSE bug 1226783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226785">SUSE bug 1226785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226786">SUSE bug 1226786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226789">SUSE bug 1226789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226791">SUSE bug 1226791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226834">SUSE bug 1226834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226837">SUSE bug 1226837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226839">SUSE bug 1226839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226840">SUSE bug 1226840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226841">SUSE bug 1226841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226842">SUSE bug 1226842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226848">SUSE bug 1226848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226852">SUSE bug 1226852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226857">SUSE bug 1226857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226861">SUSE bug 1226861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226863">SUSE bug 1226863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226864">SUSE bug 1226864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226867">SUSE bug 1226867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226868">SUSE bug 1226868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226876">SUSE bug 1226876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226878">SUSE bug 1226878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226883">SUSE bug 1226883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226886">SUSE bug 1226886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226890">SUSE bug 1226890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226891">SUSE bug 1226891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226895">SUSE bug 1226895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226908">SUSE bug 1226908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226911">SUSE bug 1226911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226915">SUSE bug 1226915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226928">SUSE bug 1226928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226948">SUSE bug 1226948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226949">SUSE bug 1226949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226950">SUSE bug 1226950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226953">SUSE bug 1226953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226962">SUSE bug 1226962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226976">SUSE bug 1226976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226990">SUSE bug 1226990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226992">SUSE bug 1226992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226993">SUSE bug 1226993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226994">SUSE bug 1226994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226996">SUSE bug 1226996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227066">SUSE bug 1227066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227090">SUSE bug 1227090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227096">SUSE bug 1227096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227101">SUSE bug 1227101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227103">SUSE bug 1227103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227121">SUSE bug 1227121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227157">SUSE bug 1227157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227162">SUSE bug 1227162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227274">SUSE bug 1227274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227362">SUSE bug 1227362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227383">SUSE bug 1227383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227432">SUSE bug 1227432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227435">SUSE bug 1227435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227447">SUSE bug 1227447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227487">SUSE bug 1227487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227573">SUSE bug 1227573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227618">SUSE bug 1227618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227620">SUSE bug 1227620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227626">SUSE bug 1227626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227635">SUSE bug 1227635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227661">SUSE bug 1227661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227716">SUSE bug 1227716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227722">SUSE bug 1227722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227724">SUSE bug 1227724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227725">SUSE bug 1227725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227728">SUSE bug 1227728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227729">SUSE bug 1227729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227730">SUSE bug 1227730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227732">SUSE bug 1227732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227733">SUSE bug 1227733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227750">SUSE bug 1227750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227754">SUSE bug 1227754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227755">SUSE bug 1227755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227760">SUSE bug 1227760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227762">SUSE bug 1227762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227763">SUSE bug 1227763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227764">SUSE bug 1227764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227766">SUSE bug 1227766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227770">SUSE bug 1227770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227771">SUSE bug 1227771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227772">SUSE bug 1227772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227774">SUSE bug 1227774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227779">SUSE bug 1227779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227780">SUSE bug 1227780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227783">SUSE bug 1227783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227786">SUSE bug 1227786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227787">SUSE bug 1227787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227790">SUSE bug 1227790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227792">SUSE bug 1227792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227796">SUSE bug 1227796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227797">SUSE bug 1227797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227798">SUSE bug 1227798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227800">SUSE bug 1227800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227802">SUSE bug 1227802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227806">SUSE bug 1227806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227808">SUSE bug 1227808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227810">SUSE bug 1227810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227812">SUSE bug 1227812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227813">SUSE bug 1227813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227814">SUSE bug 1227814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227816">SUSE bug 1227816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227820">SUSE bug 1227820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227823">SUSE bug 1227823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227824">SUSE bug 1227824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227828">SUSE bug 1227828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227829">SUSE bug 1227829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227836">SUSE bug 1227836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227846">SUSE bug 1227846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227849">SUSE bug 1227849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227851">SUSE bug 1227851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227862">SUSE bug 1227862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227864">SUSE bug 1227864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227865">SUSE bug 1227865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227866">SUSE bug 1227866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227870">SUSE bug 1227870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227884">SUSE bug 1227884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227886">SUSE bug 1227886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227891">SUSE bug 1227891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227893">SUSE bug 1227893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227899">SUSE bug 1227899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227900">SUSE bug 1227900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227910">SUSE bug 1227910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227913">SUSE bug 1227913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227917">SUSE bug 1227917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227919">SUSE bug 1227919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227920">SUSE bug 1227920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227921">SUSE bug 1227921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227922">SUSE bug 1227922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227923">SUSE bug 1227923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227924">SUSE bug 1227924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227925">SUSE bug 1227925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227927">SUSE bug 1227927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227928">SUSE bug 1227928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227931">SUSE bug 1227931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227932">SUSE bug 1227932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227933">SUSE bug 1227933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227935">SUSE bug 1227935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227936">SUSE bug 1227936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227938">SUSE bug 1227938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227941">SUSE bug 1227941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227942">SUSE bug 1227942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227944">SUSE bug 1227944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227945">SUSE bug 1227945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227947">SUSE bug 1227947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227948">SUSE bug 1227948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227949">SUSE bug 1227949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227950">SUSE bug 1227950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227952">SUSE bug 1227952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227953">SUSE bug 1227953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227954">SUSE bug 1227954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227956">SUSE bug 1227956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227957">SUSE bug 1227957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227963">SUSE bug 1227963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227964">SUSE bug 1227964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227965">SUSE bug 1227965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227968">SUSE bug 1227968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227969">SUSE bug 1227969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227970">SUSE bug 1227970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227971">SUSE bug 1227971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227972">SUSE bug 1227972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227975">SUSE bug 1227975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227976">SUSE bug 1227976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227981">SUSE bug 1227981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227982">SUSE bug 1227982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227985">SUSE bug 1227985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227986">SUSE bug 1227986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227987">SUSE bug 1227987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227988">SUSE bug 1227988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227989">SUSE bug 1227989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227990">SUSE bug 1227990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227991">SUSE bug 1227991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227992">SUSE bug 1227992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227993">SUSE bug 1227993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227995">SUSE bug 1227995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227996">SUSE bug 1227996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227997">SUSE bug 1227997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228000">SUSE bug 1228000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228002">SUSE bug 1228002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228003">SUSE bug 1228003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228004">SUSE bug 1228004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228005">SUSE bug 1228005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228006">SUSE bug 1228006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228007">SUSE bug 1228007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228008">SUSE bug 1228008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228009">SUSE bug 1228009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228010">SUSE bug 1228010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228011">SUSE bug 1228011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228013">SUSE bug 1228013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228014">SUSE bug 1228014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228015">SUSE bug 1228015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228019">SUSE bug 1228019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228020">SUSE bug 1228020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228025">SUSE bug 1228025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228028">SUSE bug 1228028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228035">SUSE bug 1228035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228037">SUSE bug 1228037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228038">SUSE bug 1228038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228039">SUSE bug 1228039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228040">SUSE bug 1228040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228045">SUSE bug 1228045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228054">SUSE bug 1228054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228055">SUSE bug 1228055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228056">SUSE bug 1228056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228060">SUSE bug 1228060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228061">SUSE bug 1228061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228062">SUSE bug 1228062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228063">SUSE bug 1228063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228064">SUSE bug 1228064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228066">SUSE bug 1228066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228067">SUSE bug 1228067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228068">SUSE bug 1228068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228071">SUSE bug 1228071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228079">SUSE bug 1228079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228090">SUSE bug 1228090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228114">SUSE bug 1228114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228140">SUSE bug 1228140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228190">SUSE bug 1228190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228191">SUSE bug 1228191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228226">SUSE bug 1228226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228235">SUSE bug 1228235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228247">SUSE bug 1228247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228327">SUSE bug 1228327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228328">SUSE bug 1228328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228330">SUSE bug 1228330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228403">SUSE bug 1228403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228405">SUSE bug 1228405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228408">SUSE bug 1228408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228409">SUSE bug 1228409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228410">SUSE bug 1228410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228418">SUSE bug 1228418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228459">SUSE bug 1228459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228462">SUSE bug 1228462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228470">SUSE bug 1228470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228518">SUSE bug 1228518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228520">SUSE bug 1228520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228530">SUSE bug 1228530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228561">SUSE bug 1228561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228565">SUSE bug 1228565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228580">SUSE bug 1228580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228581">SUSE bug 1228581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228591">SUSE bug 1228591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228599">SUSE bug 1228599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228617">SUSE bug 1228617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228625">SUSE bug 1228625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228626">SUSE bug 1228626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228633">SUSE bug 1228633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228640">SUSE bug 1228640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228644">SUSE bug 1228644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228649">SUSE bug 1228649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228655">SUSE bug 1228655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228665">SUSE bug 1228665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228672">SUSE bug 1228672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228680">SUSE bug 1228680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228705">SUSE bug 1228705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228723">SUSE bug 1228723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228743">SUSE bug 1228743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228756">SUSE bug 1228756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228801">SUSE bug 1228801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228850">SUSE bug 1228850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228857">SUSE bug 1228857</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-4439/">CVE-2021-4439 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4439">CVE-2021-4439 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47086/">CVE-2021-47086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47086">CVE-2021-47086 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47089/">CVE-2021-47089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47089">CVE-2021-47089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47103/">CVE-2021-47103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47103">CVE-2021-47103 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47186/">CVE-2021-47186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47186">CVE-2021-47186 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47432/">CVE-2021-47432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47432">CVE-2021-47432 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47515/">CVE-2021-47515 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47515">CVE-2021-47515 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47534/">CVE-2021-47534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47534">CVE-2021-47534 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47538/">CVE-2021-47538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47538">CVE-2021-47538 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47539/">CVE-2021-47539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47539">CVE-2021-47539 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47546/">CVE-2021-47546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47546">CVE-2021-47546 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47547/">CVE-2021-47547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47547">CVE-2021-47547 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47555/">CVE-2021-47555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47555">CVE-2021-47555 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47566/">CVE-2021-47566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47566">CVE-2021-47566 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47571/">CVE-2021-47571 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47571">CVE-2021-47571 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47572/">CVE-2021-47572 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47572">CVE-2021-47572 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47576/">CVE-2021-47576 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47576">CVE-2021-47576 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47577/">CVE-2021-47577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47577">CVE-2021-47577 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47578/">CVE-2021-47578 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47578">CVE-2021-47578 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47580/">CVE-2021-47580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47580">CVE-2021-47580 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47582/">CVE-2021-47582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47582">CVE-2021-47582 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47583/">CVE-2021-47583 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47583">CVE-2021-47583 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47584/">CVE-2021-47584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47584">CVE-2021-47584 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47585/">CVE-2021-47585 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47585">CVE-2021-47585 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47586/">CVE-2021-47586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47586">CVE-2021-47586 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47587/">CVE-2021-47587 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47587">CVE-2021-47587 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47588/">CVE-2021-47588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47588">CVE-2021-47588 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47589/">CVE-2021-47589 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47589">CVE-2021-47589 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47590/">CVE-2021-47590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47590">CVE-2021-47590 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47591/">CVE-2021-47591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47591">CVE-2021-47591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47592/">CVE-2021-47592 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47592">CVE-2021-47592 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47593/">CVE-2021-47593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47593">CVE-2021-47593 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47595/">CVE-2021-47595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47595">CVE-2021-47595 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47596/">CVE-2021-47596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47596">CVE-2021-47596 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47597/">CVE-2021-47597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47597">CVE-2021-47597 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47598/">CVE-2021-47598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47598">CVE-2021-47598 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47599/">CVE-2021-47599 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47599">CVE-2021-47599 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47600/">CVE-2021-47600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47600">CVE-2021-47600 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47601/">CVE-2021-47601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47601">CVE-2021-47601 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47602/">CVE-2021-47602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47602">CVE-2021-47602 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47603/">CVE-2021-47603 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47603">CVE-2021-47603 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47604/">CVE-2021-47604 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47604">CVE-2021-47604 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47605/">CVE-2021-47605 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47605">CVE-2021-47605 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47606/">CVE-2021-47606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47606">CVE-2021-47606 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47607/">CVE-2021-47607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47607">CVE-2021-47607 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47608/">CVE-2021-47608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47608">CVE-2021-47608 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47609/">CVE-2021-47609 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47609">CVE-2021-47609 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47610/">CVE-2021-47610 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47610">CVE-2021-47610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47611/">CVE-2021-47611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47611">CVE-2021-47611 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47612/">CVE-2021-47612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47612">CVE-2021-47612 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47614/">CVE-2021-47614 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47614">CVE-2021-47614 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47615/">CVE-2021-47615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47615">CVE-2021-47615 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47616/">CVE-2021-47616 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47616">CVE-2021-47616 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47617/">CVE-2021-47617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47617">CVE-2021-47617 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47618/">CVE-2021-47618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47618">CVE-2021-47618 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47619/">CVE-2021-47619 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47619">CVE-2021-47619 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47620/">CVE-2021-47620 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47620">CVE-2021-47620 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47622/">CVE-2021-47622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47622">CVE-2021-47622 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47623/">CVE-2021-47623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47623">CVE-2021-47623 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47624/">CVE-2021-47624 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47624">CVE-2021-47624 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48711/">CVE-2022-48711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48711">CVE-2022-48711 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48712/">CVE-2022-48712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48712">CVE-2022-48712 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48713/">CVE-2022-48713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48713">CVE-2022-48713 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48714/">CVE-2022-48714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48714">CVE-2022-48714 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48715/">CVE-2022-48715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48715">CVE-2022-48715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48716/">CVE-2022-48716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48716">CVE-2022-48716 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48717/">CVE-2022-48717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48717">CVE-2022-48717 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48718/">CVE-2022-48718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48718">CVE-2022-48718 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48720/">CVE-2022-48720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48720">CVE-2022-48720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48721/">CVE-2022-48721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48721">CVE-2022-48721 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48722/">CVE-2022-48722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48722">CVE-2022-48722 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48723/">CVE-2022-48723 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48723">CVE-2022-48723 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48724/">CVE-2022-48724 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48724">CVE-2022-48724 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48725/">CVE-2022-48725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48725">CVE-2022-48725 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48726/">CVE-2022-48726 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48726">CVE-2022-48726 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48727/">CVE-2022-48727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48727">CVE-2022-48727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48728/">CVE-2022-48728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48728">CVE-2022-48728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48729/">CVE-2022-48729 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48729">CVE-2022-48729 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48730/">CVE-2022-48730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48730">CVE-2022-48730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48732/">CVE-2022-48732 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48732">CVE-2022-48732 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48733/">CVE-2022-48733 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48733">CVE-2022-48733 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48734/">CVE-2022-48734 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48734">CVE-2022-48734 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48735/">CVE-2022-48735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48735">CVE-2022-48735 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48736/">CVE-2022-48736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48736">CVE-2022-48736 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48737/">CVE-2022-48737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48737">CVE-2022-48737 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48738/">CVE-2022-48738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48738">CVE-2022-48738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48739/">CVE-2022-48739 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48739">CVE-2022-48739 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48740/">CVE-2022-48740 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48740">CVE-2022-48740 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48743/">CVE-2022-48743 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48743">CVE-2022-48743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48744/">CVE-2022-48744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48744">CVE-2022-48744 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48745/">CVE-2022-48745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48745">CVE-2022-48745 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48746/">CVE-2022-48746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48746">CVE-2022-48746 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48747/">CVE-2022-48747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48747">CVE-2022-48747 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48748/">CVE-2022-48748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48748">CVE-2022-48748 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48749/">CVE-2022-48749 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48749">CVE-2022-48749 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48751/">CVE-2022-48751 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48751">CVE-2022-48751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48752/">CVE-2022-48752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48752">CVE-2022-48752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48753/">CVE-2022-48753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48753">CVE-2022-48753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48754/">CVE-2022-48754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48754">CVE-2022-48754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48755/">CVE-2022-48755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48755">CVE-2022-48755 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48756/">CVE-2022-48756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48756">CVE-2022-48756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48758/">CVE-2022-48758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48758">CVE-2022-48758 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48759/">CVE-2022-48759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48759">CVE-2022-48759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48760/">CVE-2022-48760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48760">CVE-2022-48760 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48761/">CVE-2022-48761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48761">CVE-2022-48761 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48763/">CVE-2022-48763 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48763">CVE-2022-48763 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48765/">CVE-2022-48765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48765">CVE-2022-48765 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48766/">CVE-2022-48766 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48766">CVE-2022-48766 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48767/">CVE-2022-48767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48767">CVE-2022-48767 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48768/">CVE-2022-48768 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48768">CVE-2022-48768 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48769/">CVE-2022-48769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48769">CVE-2022-48769 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48770/">CVE-2022-48770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48770">CVE-2022-48770 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48771/">CVE-2022-48771 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48771">CVE-2022-48771 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48772/">CVE-2022-48772 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48772">CVE-2022-48772 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48773/">CVE-2022-48773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48773">CVE-2022-48773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48774/">CVE-2022-48774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48774">CVE-2022-48774 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48775/">CVE-2022-48775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48775">CVE-2022-48775 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48776/">CVE-2022-48776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48776">CVE-2022-48776 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48777/">CVE-2022-48777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48777">CVE-2022-48777 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48778/">CVE-2022-48778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48778">CVE-2022-48778 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48780/">CVE-2022-48780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48780">CVE-2022-48780 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48783/">CVE-2022-48783 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48783">CVE-2022-48783 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48784/">CVE-2022-48784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48784">CVE-2022-48784 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48785/">CVE-2022-48785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48785">CVE-2022-48785 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-48786/">CVE-2022-48786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48786">CVE-2022-48786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48787/">CVE-2022-48787 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48787">CVE-2022-48787 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48788/">CVE-2022-48788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48788">CVE-2022-48788 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48789/">CVE-2022-48789 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48789">CVE-2022-48789 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48790/">CVE-2022-48790 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48790">CVE-2022-48790 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48791/">CVE-2022-48791 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48791">CVE-2022-48791 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48792/">CVE-2022-48792 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48792">CVE-2022-48792 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48793/">CVE-2022-48793 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48793">CVE-2022-48793 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48794/">CVE-2022-48794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48794">CVE-2022-48794 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48796/">CVE-2022-48796 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48796">CVE-2022-48796 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48797/">CVE-2022-48797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48797">CVE-2022-48797 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48798/">CVE-2022-48798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48798">CVE-2022-48798 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48799/">CVE-2022-48799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48799">CVE-2022-48799 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48800/">CVE-2022-48800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48800">CVE-2022-48800 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48801/">CVE-2022-48801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48801">CVE-2022-48801 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48802/">CVE-2022-48802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48802">CVE-2022-48802 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48803/">CVE-2022-48803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48803">CVE-2022-48803 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48804/">CVE-2022-48804 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48804">CVE-2022-48804 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48805/">CVE-2022-48805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48805">CVE-2022-48805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48806/">CVE-2022-48806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48806">CVE-2022-48806 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48807/">CVE-2022-48807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48807">CVE-2022-48807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48809/">CVE-2022-48809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48809">CVE-2022-48809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48810/">CVE-2022-48810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48810">CVE-2022-48810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48811/">CVE-2022-48811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48811">CVE-2022-48811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48812/">CVE-2022-48812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48812">CVE-2022-48812 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48813/">CVE-2022-48813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48813">CVE-2022-48813 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48814/">CVE-2022-48814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48814">CVE-2022-48814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48815/">CVE-2022-48815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48815">CVE-2022-48815 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48816/">CVE-2022-48816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48816">CVE-2022-48816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48817/">CVE-2022-48817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48817">CVE-2022-48817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48818/">CVE-2022-48818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48818">CVE-2022-48818 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48820/">CVE-2022-48820 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48820">CVE-2022-48820 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48821/">CVE-2022-48821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48821">CVE-2022-48821 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48822/">CVE-2022-48822 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48822">CVE-2022-48822 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48823/">CVE-2022-48823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48823">CVE-2022-48823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48824/">CVE-2022-48824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48824">CVE-2022-48824 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48825/">CVE-2022-48825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48825">CVE-2022-48825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48826/">CVE-2022-48826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48826">CVE-2022-48826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48827/">CVE-2022-48827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48827">CVE-2022-48827 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48828/">CVE-2022-48828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48828">CVE-2022-48828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48829/">CVE-2022-48829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48829">CVE-2022-48829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48830/">CVE-2022-48830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48830">CVE-2022-48830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48831/">CVE-2022-48831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48831">CVE-2022-48831 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48834/">CVE-2022-48834 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48834">CVE-2022-48834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48835/">CVE-2022-48835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48835">CVE-2022-48835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48836/">CVE-2022-48836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48836">CVE-2022-48836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48837/">CVE-2022-48837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48837">CVE-2022-48837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48838/">CVE-2022-48838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48838">CVE-2022-48838 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48839/">CVE-2022-48839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48839">CVE-2022-48839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48840/">CVE-2022-48840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48840">CVE-2022-48840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48841/">CVE-2022-48841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48841">CVE-2022-48841 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48842/">CVE-2022-48842 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48842">CVE-2022-48842 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48843/">CVE-2022-48843 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48843">CVE-2022-48843 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48844/">CVE-2022-48844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48844">CVE-2022-48844 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48846/">CVE-2022-48846 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48846">CVE-2022-48846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48847/">CVE-2022-48847 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48847">CVE-2022-48847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48849/">CVE-2022-48849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48849">CVE-2022-48849 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48850/">CVE-2022-48850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48850">CVE-2022-48850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48851/">CVE-2022-48851 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48851">CVE-2022-48851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48852/">CVE-2022-48852 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48852">CVE-2022-48852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48853/">CVE-2022-48853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48853">CVE-2022-48853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48855/">CVE-2022-48855 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48855">CVE-2022-48855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48856/">CVE-2022-48856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48856">CVE-2022-48856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48857/">CVE-2022-48857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48857">CVE-2022-48857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48858/">CVE-2022-48858 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48858">CVE-2022-48858 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48859/">CVE-2022-48859 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48859">CVE-2022-48859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48860/">CVE-2022-48860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48860">CVE-2022-48860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48861/">CVE-2022-48861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48861">CVE-2022-48861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48862/">CVE-2022-48862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48862">CVE-2022-48862 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48863/">CVE-2022-48863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48863">CVE-2022-48863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48864/">CVE-2022-48864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48864">CVE-2022-48864 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48866/">CVE-2022-48866 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48866">CVE-2022-48866 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-24023/">CVE-2023-24023 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24023">CVE-2023-24023 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52435/">CVE-2023-52435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52435">CVE-2023-52435 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52573/">CVE-2023-52573 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52573">CVE-2023-52573 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52580/">CVE-2023-52580 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52580">CVE-2023-52580 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52622/">CVE-2023-52622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52622">CVE-2023-52622 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52658/">CVE-2023-52658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52658">CVE-2023-52658 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52667/">CVE-2023-52667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52667">CVE-2023-52667 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52670/">CVE-2023-52670 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52670">CVE-2023-52670 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52672/">CVE-2023-52672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52672">CVE-2023-52672 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52675/">CVE-2023-52675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52675">CVE-2023-52675 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52735/">CVE-2023-52735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52735">CVE-2023-52735 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52737/">CVE-2023-52737 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52737">CVE-2023-52737 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52751/">CVE-2023-52751 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52751">CVE-2023-52751 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52752/">CVE-2023-52752 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52752">CVE-2023-52752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52762/">CVE-2023-52762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52762">CVE-2023-52762 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52766/">CVE-2023-52766 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52766">CVE-2023-52766 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52775/">CVE-2023-52775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52775">CVE-2023-52775 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52784/">CVE-2023-52784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52784">CVE-2023-52784 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52787/">CVE-2023-52787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52787">CVE-2023-52787 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52800/">CVE-2023-52800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52800">CVE-2023-52800 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52812/">CVE-2023-52812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52812">CVE-2023-52812 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-52835/">CVE-2023-52835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52835">CVE-2023-52835 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52837/">CVE-2023-52837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52837">CVE-2023-52837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52843/">CVE-2023-52843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52843">CVE-2023-52843 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52845/">CVE-2023-52845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52845">CVE-2023-52845 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52846/">CVE-2023-52846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52846">CVE-2023-52846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52857/">CVE-2023-52857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52857">CVE-2023-52857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52863/">CVE-2023-52863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52863">CVE-2023-52863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52869/">CVE-2023-52869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52869">CVE-2023-52869 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52881/">CVE-2023-52881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52881">CVE-2023-52881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52882/">CVE-2023-52882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52882">CVE-2023-52882 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52884/">CVE-2023-52884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52884">CVE-2023-52884 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52885/">CVE-2023-52885 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52885">CVE-2023-52885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52886/">CVE-2023-52886 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52886">CVE-2023-52886 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-25741/">CVE-2024-25741 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25741">CVE-2024-25741 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26583/">CVE-2024-26583 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26583">CVE-2024-26583 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26584/">CVE-2024-26584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26584">CVE-2024-26584 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26615/">CVE-2024-26615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26615">CVE-2024-26615 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26625/">CVE-2024-26625 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26625">CVE-2024-26625 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26633/">CVE-2024-26633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26633">CVE-2024-26633 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26635/">CVE-2024-26635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26635">CVE-2024-26635 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26636/">CVE-2024-26636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26636">CVE-2024-26636 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26641/">CVE-2024-26641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26641">CVE-2024-26641 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26644/">CVE-2024-26644 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26644">CVE-2024-26644 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26661/">CVE-2024-26661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26661">CVE-2024-26661 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26663/">CVE-2024-26663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26663">CVE-2024-26663 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26665/">CVE-2024-26665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26665">CVE-2024-26665 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-26720/">CVE-2024-26720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26720">CVE-2024-26720 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26800/">CVE-2024-26800 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26800">CVE-2024-26800 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26802/">CVE-2024-26802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26802">CVE-2024-26802 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26813/">CVE-2024-26813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26813">CVE-2024-26813 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26814/">CVE-2024-26814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26814">CVE-2024-26814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26842/">CVE-2024-26842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26842">CVE-2024-26842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26845/">CVE-2024-26845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26845">CVE-2024-26845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26863/">CVE-2024-26863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26863">CVE-2024-26863 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26923/">CVE-2024-26923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26923">CVE-2024-26923 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26935/">CVE-2024-26935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26935">CVE-2024-26935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26961/">CVE-2024-26961 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26961">CVE-2024-26961 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26973/">CVE-2024-26973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26973">CVE-2024-26973 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26976/">CVE-2024-26976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26976">CVE-2024-26976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27015/">CVE-2024-27015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27015">CVE-2024-27015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27019/">CVE-2024-27019 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27019">CVE-2024-27019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27020/">CVE-2024-27020 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27020">CVE-2024-27020 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27025/">CVE-2024-27025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27025">CVE-2024-27025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27065/">CVE-2024-27065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27065">CVE-2024-27065 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27402/">CVE-2024-27402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27402">CVE-2024-27402 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27432/">CVE-2024-27432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27432">CVE-2024-27432 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27437/">CVE-2024-27437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27437">CVE-2024-27437 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33619/">CVE-2024-33619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33619">CVE-2024-33619 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35247/">CVE-2024-35247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35247">CVE-2024-35247 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35789/">CVE-2024-35789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35789">CVE-2024-35789 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35790/">CVE-2024-35790 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35790">CVE-2024-35790 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35805/">CVE-2024-35805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35805">CVE-2024-35805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35807/">CVE-2024-35807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35807">CVE-2024-35807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35814/">CVE-2024-35814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35814">CVE-2024-35814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35819/">CVE-2024-35819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35819">CVE-2024-35819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35835/">CVE-2024-35835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35835">CVE-2024-35835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35837/">CVE-2024-35837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35837">CVE-2024-35837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35848/">CVE-2024-35848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35848">CVE-2024-35848 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35853/">CVE-2024-35853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35853">CVE-2024-35853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35855/">CVE-2024-35855 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35855">CVE-2024-35855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35857/">CVE-2024-35857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35857">CVE-2024-35857 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35861/">CVE-2024-35861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35861">CVE-2024-35861 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35862/">CVE-2024-35862 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35862">CVE-2024-35862 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35864/">CVE-2024-35864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35864">CVE-2024-35864 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35869/">CVE-2024-35869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35869">CVE-2024-35869 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35878/">CVE-2024-35878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35878">CVE-2024-35878 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35884/">CVE-2024-35884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35884">CVE-2024-35884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35886/">CVE-2024-35886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35886">CVE-2024-35886 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35889/">CVE-2024-35889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35889">CVE-2024-35889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35890/">CVE-2024-35890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35890">CVE-2024-35890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35893/">CVE-2024-35893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35893">CVE-2024-35893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35896/">CVE-2024-35896 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35896">CVE-2024-35896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35898/">CVE-2024-35898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35898">CVE-2024-35898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35899/">CVE-2024-35899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35899">CVE-2024-35899 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35900/">CVE-2024-35900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35900">CVE-2024-35900 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35905/">CVE-2024-35905 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35905">CVE-2024-35905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35925/">CVE-2024-35925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35925">CVE-2024-35925 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35934/">CVE-2024-35934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35934">CVE-2024-35934 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35949/">CVE-2024-35949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35949">CVE-2024-35949 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35950/">CVE-2024-35950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35950">CVE-2024-35950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35956/">CVE-2024-35956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35956">CVE-2024-35956 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35958/">CVE-2024-35958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35958">CVE-2024-35958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35960/">CVE-2024-35960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35960">CVE-2024-35960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35961/">CVE-2024-35961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35961">CVE-2024-35961 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35962/">CVE-2024-35962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35962">CVE-2024-35962 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35979/">CVE-2024-35979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35979">CVE-2024-35979 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-35995/">CVE-2024-35995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35995">CVE-2024-35995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35997/">CVE-2024-35997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35997">CVE-2024-35997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36000/">CVE-2024-36000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36000">CVE-2024-36000 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36004/">CVE-2024-36004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36004">CVE-2024-36004 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36005/">CVE-2024-36005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36005">CVE-2024-36005 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36008/">CVE-2024-36008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36008">CVE-2024-36008 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36017/">CVE-2024-36017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36017">CVE-2024-36017 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36020/">CVE-2024-36020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36020">CVE-2024-36020 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36021/">CVE-2024-36021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36021">CVE-2024-36021 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36025/">CVE-2024-36025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36025">CVE-2024-36025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36288/">CVE-2024-36288 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36288">CVE-2024-36288 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-36477/">CVE-2024-36477 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36477">CVE-2024-36477 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36478/">CVE-2024-36478 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36478">CVE-2024-36478 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36479/">CVE-2024-36479 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36479">CVE-2024-36479 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-36889/">CVE-2024-36889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36889">CVE-2024-36889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36890/">CVE-2024-36890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36890">CVE-2024-36890 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36894/">CVE-2024-36894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36894">CVE-2024-36894 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36899/">CVE-2024-36899 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36899">CVE-2024-36899 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36900/">CVE-2024-36900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36900">CVE-2024-36900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36901/">CVE-2024-36901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36901">CVE-2024-36901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36902/">CVE-2024-36902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36902">CVE-2024-36902 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36904/">CVE-2024-36904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36904">CVE-2024-36904 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36909/">CVE-2024-36909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36909">CVE-2024-36909 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36910/">CVE-2024-36910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36910">CVE-2024-36910 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36911/">CVE-2024-36911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36911">CVE-2024-36911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36912/">CVE-2024-36912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36912">CVE-2024-36912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36913/">CVE-2024-36913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36913">CVE-2024-36913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36914/">CVE-2024-36914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36914">CVE-2024-36914 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36915/">CVE-2024-36915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36915">CVE-2024-36915 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-36916/">CVE-2024-36916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36916">CVE-2024-36916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36917/">CVE-2024-36917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36917">CVE-2024-36917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36919/">CVE-2024-36919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36919">CVE-2024-36919 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-36923/">CVE-2024-36923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36923">CVE-2024-36923 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36934/">CVE-2024-36934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36934">CVE-2024-36934 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36937/">CVE-2024-36937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36937">CVE-2024-36937 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36939/">CVE-2024-36939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36939">CVE-2024-36939 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36940/">CVE-2024-36940 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36940">CVE-2024-36940 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36945/">CVE-2024-36945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36945">CVE-2024-36945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-36946/">CVE-2024-36946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36946">CVE-2024-36946 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36949/">CVE-2024-36949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36949">CVE-2024-36949 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36960/">CVE-2024-36960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36960">CVE-2024-36960 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36964/">CVE-2024-36964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36964">CVE-2024-36964 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-36965/">CVE-2024-36965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36965">CVE-2024-36965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36967/">CVE-2024-36967 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36967">CVE-2024-36967 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36969/">CVE-2024-36969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36969">CVE-2024-36969 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36971/">CVE-2024-36971 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36971">CVE-2024-36971 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36974/">CVE-2024-36974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36974">CVE-2024-36974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36975/">CVE-2024-36975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36975">CVE-2024-36975 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36978/">CVE-2024-36978 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36978">CVE-2024-36978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37021/">CVE-2024-37021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37021">CVE-2024-37021 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-37078/">CVE-2024-37078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37078">CVE-2024-37078 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-37354/">CVE-2024-37354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37354">CVE-2024-37354 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38381/">CVE-2024-38381 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38381">CVE-2024-38381 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38388/">CVE-2024-38388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38388">CVE-2024-38388 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38390/">CVE-2024-38390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38390">CVE-2024-38390 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38540/">CVE-2024-38540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38540">CVE-2024-38540 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38541/">CVE-2024-38541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38541">CVE-2024-38541 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38544/">CVE-2024-38544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38544">CVE-2024-38544 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38545/">CVE-2024-38545 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38545">CVE-2024-38545 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38546/">CVE-2024-38546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38546">CVE-2024-38546 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38547/">CVE-2024-38547 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38547">CVE-2024-38547 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38548/">CVE-2024-38548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38548">CVE-2024-38548 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38549/">CVE-2024-38549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38549">CVE-2024-38549 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38550/">CVE-2024-38550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38550">CVE-2024-38550 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38552/">CVE-2024-38552 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38552">CVE-2024-38552 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38553/">CVE-2024-38553 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38553">CVE-2024-38553 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38555/">CVE-2024-38555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38555">CVE-2024-38555 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38556/">CVE-2024-38556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38556">CVE-2024-38556 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38557/">CVE-2024-38557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38557">CVE-2024-38557 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38558/">CVE-2024-38558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38558">CVE-2024-38558 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38559/">CVE-2024-38559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38559">CVE-2024-38559 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38560/">CVE-2024-38560 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38560">CVE-2024-38560 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38564/">CVE-2024-38564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38564">CVE-2024-38564 at NVD</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38565/">CVE-2024-38565 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38565">CVE-2024-38565 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38567/">CVE-2024-38567 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38567">CVE-2024-38567 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-38568/">CVE-2024-38568 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38568">CVE-2024-38568 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38570/">CVE-2024-38570 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38570">CVE-2024-38570 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38571/">CVE-2024-38571 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38571">CVE-2024-38571 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38573/">CVE-2024-38573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38573">CVE-2024-38573 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38578/">CVE-2024-38578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38578">CVE-2024-38578 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38579/">CVE-2024-38579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38579">CVE-2024-38579 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38580/">CVE-2024-38580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38580">CVE-2024-38580 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38581/">CVE-2024-38581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38581">CVE-2024-38581 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38582/">CVE-2024-38582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38582">CVE-2024-38582 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38583/">CVE-2024-38583 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38583">CVE-2024-38583 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38586/">CVE-2024-38586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38586">CVE-2024-38586 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-38587/">CVE-2024-38587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38587">CVE-2024-38587 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38588/">CVE-2024-38588 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38588">CVE-2024-38588 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38590/">CVE-2024-38590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38590">CVE-2024-38590 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38591/">CVE-2024-38591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38591">CVE-2024-38591 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38594/">CVE-2024-38594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38594">CVE-2024-38594 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38597/">CVE-2024-38597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38597">CVE-2024-38597 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38598/">CVE-2024-38598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38598">CVE-2024-38598 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38599/">CVE-2024-38599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38599">CVE-2024-38599 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38600/">CVE-2024-38600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38600">CVE-2024-38600 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38601/">CVE-2024-38601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38601">CVE-2024-38601 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38603/">CVE-2024-38603 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38603">CVE-2024-38603 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38605/">CVE-2024-38605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38605">CVE-2024-38605 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38608/">CVE-2024-38608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38608">CVE-2024-38608 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38616/">CVE-2024-38616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38616">CVE-2024-38616 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38618/">CVE-2024-38618 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38618">CVE-2024-38618 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38619/">CVE-2024-38619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38619">CVE-2024-38619 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38621/">CVE-2024-38621 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38621">CVE-2024-38621 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38627/">CVE-2024-38627 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38627">CVE-2024-38627 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38628/">CVE-2024-38628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38628">CVE-2024-38628 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38630/">CVE-2024-38630 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38630">CVE-2024-38630 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38633/">CVE-2024-38633 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38633">CVE-2024-38633 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38634/">CVE-2024-38634 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38634">CVE-2024-38634 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38635/">CVE-2024-38635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38635">CVE-2024-38635 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-38659/">CVE-2024-38659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38659">CVE-2024-38659 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38661/">CVE-2024-38661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38661">CVE-2024-38661 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38780/">CVE-2024-38780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38780">CVE-2024-38780 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39276/">CVE-2024-39276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39276">CVE-2024-39276 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39301/">CVE-2024-39301 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39301">CVE-2024-39301 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39371/">CVE-2024-39371 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39371">CVE-2024-39371 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39463/">CVE-2024-39463 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39463">CVE-2024-39463 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39468/">CVE-2024-39468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39468">CVE-2024-39468 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39469/">CVE-2024-39469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39469">CVE-2024-39469 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39471/">CVE-2024-39471 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39471">CVE-2024-39471 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-39472/">CVE-2024-39472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39472">CVE-2024-39472 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39475/">CVE-2024-39475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39475">CVE-2024-39475 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39482/">CVE-2024-39482 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39482">CVE-2024-39482 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39487/">CVE-2024-39487 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39487">CVE-2024-39487 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39488/">CVE-2024-39488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39488">CVE-2024-39488 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-39490/">CVE-2024-39490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39490">CVE-2024-39490 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39493/">CVE-2024-39493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39493">CVE-2024-39493 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39494/">CVE-2024-39494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39494">CVE-2024-39494 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39497/">CVE-2024-39497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39497">CVE-2024-39497 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39499/">CVE-2024-39499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39499">CVE-2024-39499 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39500/">CVE-2024-39500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39500">CVE-2024-39500 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39501/">CVE-2024-39501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39501">CVE-2024-39501 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39502/">CVE-2024-39502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39502">CVE-2024-39502 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39505/">CVE-2024-39505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39505">CVE-2024-39505 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39506/">CVE-2024-39506 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39506">CVE-2024-39506 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39507/">CVE-2024-39507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39507">CVE-2024-39507 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-39508/">CVE-2024-39508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39508">CVE-2024-39508 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39509/">CVE-2024-39509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39509">CVE-2024-39509 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40900/">CVE-2024-40900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40900">CVE-2024-40900 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-40901/">CVE-2024-40901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40901">CVE-2024-40901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-40902/">CVE-2024-40902 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40902">CVE-2024-40902 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40903/">CVE-2024-40903 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40903">CVE-2024-40903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40904/">CVE-2024-40904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40904">CVE-2024-40904 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40906/">CVE-2024-40906 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40906">CVE-2024-40906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40908/">CVE-2024-40908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40908">CVE-2024-40908 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40909/">CVE-2024-40909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40909">CVE-2024-40909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40911/">CVE-2024-40911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40911">CVE-2024-40911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40912/">CVE-2024-40912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40912">CVE-2024-40912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40916/">CVE-2024-40916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40916">CVE-2024-40916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40919/">CVE-2024-40919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40919">CVE-2024-40919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40923/">CVE-2024-40923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40923">CVE-2024-40923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40924/">CVE-2024-40924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40924">CVE-2024-40924 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40927/">CVE-2024-40927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40927">CVE-2024-40927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40929/">CVE-2024-40929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40929">CVE-2024-40929 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-40931/">CVE-2024-40931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40931">CVE-2024-40931 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40932/">CVE-2024-40932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40932">CVE-2024-40932 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40934/">CVE-2024-40934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40934">CVE-2024-40934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40935/">CVE-2024-40935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40935">CVE-2024-40935 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40937/">CVE-2024-40937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40937">CVE-2024-40937 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40940/">CVE-2024-40940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40940">CVE-2024-40940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40941/">CVE-2024-40941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40941">CVE-2024-40941 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40942/">CVE-2024-40942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40942">CVE-2024-40942 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40943/">CVE-2024-40943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40943">CVE-2024-40943 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40945/">CVE-2024-40945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40945">CVE-2024-40945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40953/">CVE-2024-40953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40953">CVE-2024-40953 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40954/">CVE-2024-40954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40954">CVE-2024-40954 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40956/">CVE-2024-40956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40956">CVE-2024-40956 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40958/">CVE-2024-40958 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40958">CVE-2024-40958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40959/">CVE-2024-40959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40959">CVE-2024-40959 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40960/">CVE-2024-40960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40960">CVE-2024-40960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40961/">CVE-2024-40961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40961">CVE-2024-40961 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40966/">CVE-2024-40966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40966">CVE-2024-40966 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40967/">CVE-2024-40967 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40967">CVE-2024-40967 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40970/">CVE-2024-40970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40970">CVE-2024-40970 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40972/">CVE-2024-40972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40972">CVE-2024-40972 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40976/">CVE-2024-40976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40976">CVE-2024-40976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40977/">CVE-2024-40977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40977">CVE-2024-40977 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40981/">CVE-2024-40981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40981">CVE-2024-40981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40982/">CVE-2024-40982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40982">CVE-2024-40982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40984/">CVE-2024-40984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40984">CVE-2024-40984 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40987/">CVE-2024-40987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40987">CVE-2024-40987 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40988/">CVE-2024-40988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40988">CVE-2024-40988 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40989/">CVE-2024-40989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40989">CVE-2024-40989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40990/">CVE-2024-40990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40990">CVE-2024-40990 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40994/">CVE-2024-40994 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40994">CVE-2024-40994 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40998/">CVE-2024-40998 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40998">CVE-2024-40998 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-40999/">CVE-2024-40999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40999">CVE-2024-40999 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41002/">CVE-2024-41002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41002">CVE-2024-41002 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41004/">CVE-2024-41004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41004">CVE-2024-41004 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41006/">CVE-2024-41006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41006">CVE-2024-41006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41009/">CVE-2024-41009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41009">CVE-2024-41009 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41011/">CVE-2024-41011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41011">CVE-2024-41011 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41012/">CVE-2024-41012 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41012">CVE-2024-41012 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41013/">CVE-2024-41013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41013">CVE-2024-41013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41014/">CVE-2024-41014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41014">CVE-2024-41014 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41015/">CVE-2024-41015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41015">CVE-2024-41015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41016/">CVE-2024-41016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41016">CVE-2024-41016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41017/">CVE-2024-41017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41017">CVE-2024-41017 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41040/">CVE-2024-41040 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41040">CVE-2024-41040 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41041/">CVE-2024-41041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41041">CVE-2024-41041 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-41044/">CVE-2024-41044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41044">CVE-2024-41044 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41048/">CVE-2024-41048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41048">CVE-2024-41048 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41057/">CVE-2024-41057 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41057">CVE-2024-41057 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41058/">CVE-2024-41058 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41058">CVE-2024-41058 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41059/">CVE-2024-41059 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41059">CVE-2024-41059 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41063/">CVE-2024-41063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41063">CVE-2024-41063 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41064/">CVE-2024-41064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41064">CVE-2024-41064 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41066/">CVE-2024-41066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41066">CVE-2024-41066 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41069/">CVE-2024-41069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41069">CVE-2024-41069 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41070/">CVE-2024-41070 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41070">CVE-2024-41070 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41071/">CVE-2024-41071 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41071">CVE-2024-41071 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41072/">CVE-2024-41072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41072">CVE-2024-41072 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41076/">CVE-2024-41076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41076">CVE-2024-41076 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41078/">CVE-2024-41078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41078">CVE-2024-41078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41081/">CVE-2024-41081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41081">CVE-2024-41081 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41087/">CVE-2024-41087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41087">CVE-2024-41087 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41090/">CVE-2024-41090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41090">CVE-2024-41090 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41091/">CVE-2024-41091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41091">CVE-2024-41091 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42070/">CVE-2024-42070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42070">CVE-2024-42070 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42079/">CVE-2024-42079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42079">CVE-2024-42079 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-42093/">CVE-2024-42093 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42093">CVE-2024-42093 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42096/">CVE-2024-42096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42096">CVE-2024-42096 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42105/">CVE-2024-42105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42105">CVE-2024-42105 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42122/">CVE-2024-42122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42122">CVE-2024-42122 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42124/">CVE-2024-42124 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42124">CVE-2024-42124 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42145/">CVE-2024-42145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42145">CVE-2024-42145 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42161/">CVE-2024-42161 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42161">CVE-2024-42161 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42224/">CVE-2024-42224 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42224">CVE-2024-42224 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42230/">CVE-2024-42230 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42230">CVE-2024-42230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009879841" comment="cluster-md-kmp-64kb-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879842" comment="cluster-md-kmp-default-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879843" comment="dlm-kmp-64kb-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879844" comment="dlm-kmp-default-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879845" comment="dtb-allwinner-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879846" comment="dtb-altera-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879847" comment="dtb-amazon-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879848" comment="dtb-amd-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879849" comment="dtb-amlogic-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879850" comment="dtb-apm-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879851" comment="dtb-apple-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879852" comment="dtb-arm-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879853" comment="dtb-broadcom-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879854" comment="dtb-cavium-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879855" comment="dtb-exynos-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879856" comment="dtb-freescale-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879857" comment="dtb-hisilicon-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879858" comment="dtb-lg-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879859" comment="dtb-marvell-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879860" comment="dtb-mediatek-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879861" comment="dtb-nvidia-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879862" comment="dtb-qcom-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879863" comment="dtb-renesas-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879864" comment="dtb-rockchip-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879865" comment="dtb-socionext-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879866" comment="dtb-sprd-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879867" comment="dtb-xilinx-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879868" comment="gfs2-kmp-64kb-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879869" comment="gfs2-kmp-default-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879870" comment="kernel-64kb-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879871" comment="kernel-64kb-devel-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879872" comment="kernel-64kb-extra-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879873" comment="kernel-64kb-livepatch-devel-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879874" comment="kernel-64kb-optional-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879875" comment="kernel-debug-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879876" comment="kernel-debug-devel-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879877" comment="kernel-debug-livepatch-devel-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879878" comment="kernel-debug-vdso-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879879" comment="kernel-default-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879880" comment="kernel-default-base-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879881" comment="kernel-default-base-rebuild-5.14.21-150500.55.73.1.150500.6.33.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879882" comment="kernel-default-devel-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879883" comment="kernel-default-extra-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879884" comment="kernel-default-livepatch-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879885" comment="kernel-default-livepatch-devel-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879886" comment="kernel-default-optional-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879887" comment="kernel-default-vdso-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879888" comment="kernel-devel-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879889" comment="kernel-docs-5.14.21-150500.55.73.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879890" comment="kernel-docs-html-5.14.21-150500.55.73.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879891" comment="kernel-kvmsmall-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879892" comment="kernel-kvmsmall-devel-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879893" comment="kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879894" comment="kernel-kvmsmall-vdso-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879895" comment="kernel-macros-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879896" comment="kernel-obs-build-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879897" comment="kernel-obs-qa-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879898" comment="kernel-source-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879899" comment="kernel-source-vanilla-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879900" comment="kernel-syms-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879901" comment="kernel-zfcpdump-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879902" comment="kselftests-kmp-64kb-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879903" comment="kselftests-kmp-default-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879904" comment="ocfs2-kmp-64kb-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879905" comment="ocfs2-kmp-default-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879906" comment="reiserfs-kmp-64kb-5.14.21-150500.55.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879907" comment="reiserfs-kmp-default-5.14.21-150500.55.73.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4912" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1082555" ref_url="https://bugzilla.suse.com/1082555" source="BUGZILLA"/>
		<reference ref_id="1193454" ref_url="https://bugzilla.suse.com/1193454" source="BUGZILLA"/>
		<reference ref_id="1193554" ref_url="https://bugzilla.suse.com/1193554" source="BUGZILLA"/>
		<reference ref_id="1193787" ref_url="https://bugzilla.suse.com/1193787" source="BUGZILLA"/>
		<reference ref_id="1194324" ref_url="https://bugzilla.suse.com/1194324" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1195357" ref_url="https://bugzilla.suse.com/1195357" source="BUGZILLA"/>
		<reference ref_id="1195668" ref_url="https://bugzilla.suse.com/1195668" source="BUGZILLA"/>
		<reference ref_id="1195927" ref_url="https://bugzilla.suse.com/1195927" source="BUGZILLA"/>
		<reference ref_id="1195957" ref_url="https://bugzilla.suse.com/1195957" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1196823" ref_url="https://bugzilla.suse.com/1196823" source="BUGZILLA"/>
		<reference ref_id="1197146" ref_url="https://bugzilla.suse.com/1197146" source="BUGZILLA"/>
		<reference ref_id="1197246" ref_url="https://bugzilla.suse.com/1197246" source="BUGZILLA"/>
		<reference ref_id="1197762" ref_url="https://bugzilla.suse.com/1197762" source="BUGZILLA"/>
		<reference ref_id="1202346" ref_url="https://bugzilla.suse.com/1202346" source="BUGZILLA"/>
		<reference ref_id="1202686" ref_url="https://bugzilla.suse.com/1202686" source="BUGZILLA"/>
		<reference ref_id="1208783" ref_url="https://bugzilla.suse.com/1208783" source="BUGZILLA"/>
		<reference ref_id="1209636" ref_url="https://bugzilla.suse.com/1209636" source="BUGZILLA"/>
		<reference ref_id="1213123" ref_url="https://bugzilla.suse.com/1213123" source="BUGZILLA"/>
		<reference ref_id="1215492" ref_url="https://bugzilla.suse.com/1215492" source="BUGZILLA"/>
		<reference ref_id="1215587" ref_url="https://bugzilla.suse.com/1215587" source="BUGZILLA"/>
		<reference ref_id="1216834" ref_url="https://bugzilla.suse.com/1216834" source="BUGZILLA"/>
		<reference ref_id="1219832" ref_url="https://bugzilla.suse.com/1219832" source="BUGZILLA"/>
		<reference ref_id="1220138" ref_url="https://bugzilla.suse.com/1220138" source="BUGZILLA"/>
		<reference ref_id="1220185" ref_url="https://bugzilla.suse.com/1220185" source="BUGZILLA"/>
		<reference ref_id="1220186" ref_url="https://bugzilla.suse.com/1220186" source="BUGZILLA"/>
		<reference ref_id="1220187" ref_url="https://bugzilla.suse.com/1220187" source="BUGZILLA"/>
		<reference ref_id="1220869" ref_url="https://bugzilla.suse.com/1220869" source="BUGZILLA"/>
		<reference ref_id="1220876" ref_url="https://bugzilla.suse.com/1220876" source="BUGZILLA"/>
		<reference ref_id="1220942" ref_url="https://bugzilla.suse.com/1220942" source="BUGZILLA"/>
		<reference ref_id="1220952" ref_url="https://bugzilla.suse.com/1220952" source="BUGZILLA"/>
		<reference ref_id="1221010" ref_url="https://bugzilla.suse.com/1221010" source="BUGZILLA"/>
		<reference ref_id="1221044" ref_url="https://bugzilla.suse.com/1221044" source="BUGZILLA"/>
		<reference ref_id="1221647" ref_url="https://bugzilla.suse.com/1221647" source="BUGZILLA"/>
		<reference ref_id="1221654" ref_url="https://bugzilla.suse.com/1221654" source="BUGZILLA"/>
		<reference ref_id="1221656" ref_url="https://bugzilla.suse.com/1221656" source="BUGZILLA"/>
		<reference ref_id="1221659" ref_url="https://bugzilla.suse.com/1221659" source="BUGZILLA"/>
		<reference ref_id="1221777" ref_url="https://bugzilla.suse.com/1221777" source="BUGZILLA"/>
		<reference ref_id="1222011" ref_url="https://bugzilla.suse.com/1222011" source="BUGZILLA"/>
		<reference ref_id="1222323" ref_url="https://bugzilla.suse.com/1222323" source="BUGZILLA"/>
		<reference ref_id="1222326" ref_url="https://bugzilla.suse.com/1222326" source="BUGZILLA"/>
		<reference ref_id="1222328" ref_url="https://bugzilla.suse.com/1222328" source="BUGZILLA"/>
		<reference ref_id="1222625" ref_url="https://bugzilla.suse.com/1222625" source="BUGZILLA"/>
		<reference ref_id="1222702" ref_url="https://bugzilla.suse.com/1222702" source="BUGZILLA"/>
		<reference ref_id="1222728" ref_url="https://bugzilla.suse.com/1222728" source="BUGZILLA"/>
		<reference ref_id="1222799" ref_url="https://bugzilla.suse.com/1222799" source="BUGZILLA"/>
		<reference ref_id="1222809" ref_url="https://bugzilla.suse.com/1222809" source="BUGZILLA"/>
		<reference ref_id="1222810" ref_url="https://bugzilla.suse.com/1222810" source="BUGZILLA"/>
		<reference ref_id="1223021" ref_url="https://bugzilla.suse.com/1223021" source="BUGZILLA"/>
		<reference ref_id="1223180" ref_url="https://bugzilla.suse.com/1223180" source="BUGZILLA"/>
		<reference ref_id="1223635" ref_url="https://bugzilla.suse.com/1223635" source="BUGZILLA"/>
		<reference ref_id="1223652" ref_url="https://bugzilla.suse.com/1223652" source="BUGZILLA"/>
		<reference ref_id="1223675" ref_url="https://bugzilla.suse.com/1223675" source="BUGZILLA"/>
		<reference ref_id="1223778" ref_url="https://bugzilla.suse.com/1223778" source="BUGZILLA"/>
		<reference ref_id="1223806" ref_url="https://bugzilla.suse.com/1223806" source="BUGZILLA"/>
		<reference ref_id="1223813" ref_url="https://bugzilla.suse.com/1223813" source="BUGZILLA"/>
		<reference ref_id="1223815" ref_url="https://bugzilla.suse.com/1223815" source="BUGZILLA"/>
		<reference ref_id="1223836" ref_url="https://bugzilla.suse.com/1223836" source="BUGZILLA"/>
		<reference ref_id="1223863" ref_url="https://bugzilla.suse.com/1223863" source="BUGZILLA"/>
		<reference ref_id="1224414" ref_url="https://bugzilla.suse.com/1224414" source="BUGZILLA"/>
		<reference ref_id="1224499" ref_url="https://bugzilla.suse.com/1224499" source="BUGZILLA"/>
		<reference ref_id="1224500" ref_url="https://bugzilla.suse.com/1224500" source="BUGZILLA"/>
		<reference ref_id="1224512" ref_url="https://bugzilla.suse.com/1224512" source="BUGZILLA"/>
		<reference ref_id="1224516" ref_url="https://bugzilla.suse.com/1224516" source="BUGZILLA"/>
		<reference ref_id="1224517" ref_url="https://bugzilla.suse.com/1224517" source="BUGZILLA"/>
		<reference ref_id="1224545" ref_url="https://bugzilla.suse.com/1224545" source="BUGZILLA"/>
		<reference ref_id="1224548" ref_url="https://bugzilla.suse.com/1224548" source="BUGZILLA"/>
		<reference ref_id="1224557" ref_url="https://bugzilla.suse.com/1224557" source="BUGZILLA"/>
		<reference ref_id="1224572" ref_url="https://bugzilla.suse.com/1224572" source="BUGZILLA"/>
		<reference ref_id="1224573" ref_url="https://bugzilla.suse.com/1224573" source="BUGZILLA"/>
		<reference ref_id="1224585" ref_url="https://bugzilla.suse.com/1224585" source="BUGZILLA"/>
		<reference ref_id="1224604" ref_url="https://bugzilla.suse.com/1224604" source="BUGZILLA"/>
		<reference ref_id="1224636" ref_url="https://bugzilla.suse.com/1224636" source="BUGZILLA"/>
		<reference ref_id="1224641" ref_url="https://bugzilla.suse.com/1224641" source="BUGZILLA"/>
		<reference ref_id="1224683" ref_url="https://bugzilla.suse.com/1224683" source="BUGZILLA"/>
		<reference ref_id="1224694" ref_url="https://bugzilla.suse.com/1224694" source="BUGZILLA"/>
		<reference ref_id="1224700" ref_url="https://bugzilla.suse.com/1224700" source="BUGZILLA"/>
		<reference ref_id="1224743" ref_url="https://bugzilla.suse.com/1224743" source="BUGZILLA"/>
		<reference ref_id="1225088" ref_url="https://bugzilla.suse.com/1225088" source="BUGZILLA"/>
		<reference ref_id="1225272" ref_url="https://bugzilla.suse.com/1225272" source="BUGZILLA"/>
		<reference ref_id="1225301" ref_url="https://bugzilla.suse.com/1225301" source="BUGZILLA"/>
		<reference ref_id="1225475" ref_url="https://bugzilla.suse.com/1225475" source="BUGZILLA"/>
		<reference ref_id="1225489" ref_url="https://bugzilla.suse.com/1225489" source="BUGZILLA"/>
		<reference ref_id="1225504" ref_url="https://bugzilla.suse.com/1225504" source="BUGZILLA"/>
		<reference ref_id="1225505" ref_url="https://bugzilla.suse.com/1225505" source="BUGZILLA"/>
		<reference ref_id="1225564" ref_url="https://bugzilla.suse.com/1225564" source="BUGZILLA"/>
		<reference ref_id="1225573" ref_url="https://bugzilla.suse.com/1225573" source="BUGZILLA"/>
		<reference ref_id="1225581" ref_url="https://bugzilla.suse.com/1225581" source="BUGZILLA"/>
		<reference ref_id="1225586" ref_url="https://bugzilla.suse.com/1225586" source="BUGZILLA"/>
		<reference ref_id="1225711" ref_url="https://bugzilla.suse.com/1225711" source="BUGZILLA"/>
		<reference ref_id="1225717" ref_url="https://bugzilla.suse.com/1225717" source="BUGZILLA"/>
		<reference ref_id="1225719" ref_url="https://bugzilla.suse.com/1225719" source="BUGZILLA"/>
		<reference ref_id="1225744" ref_url="https://bugzilla.suse.com/1225744" source="BUGZILLA"/>
		<reference ref_id="1225745" ref_url="https://bugzilla.suse.com/1225745" source="BUGZILLA"/>
		<reference ref_id="1225746" ref_url="https://bugzilla.suse.com/1225746" source="BUGZILLA"/>
		<reference ref_id="1225752" ref_url="https://bugzilla.suse.com/1225752" source="BUGZILLA"/>
		<reference ref_id="1225753" ref_url="https://bugzilla.suse.com/1225753" source="BUGZILLA"/>
		<reference ref_id="1225757" ref_url="https://bugzilla.suse.com/1225757" source="BUGZILLA"/>
		<reference ref_id="1225767" ref_url="https://bugzilla.suse.com/1225767" source="BUGZILLA"/>
		<reference ref_id="1225810" ref_url="https://bugzilla.suse.com/1225810" source="BUGZILLA"/>
		<reference ref_id="1225815" ref_url="https://bugzilla.suse.com/1225815" source="BUGZILLA"/>
		<reference ref_id="1225820" ref_url="https://bugzilla.suse.com/1225820" source="BUGZILLA"/>
		<reference ref_id="1225829" ref_url="https://bugzilla.suse.com/1225829" source="BUGZILLA"/>
		<reference ref_id="1225835" ref_url="https://bugzilla.suse.com/1225835" source="BUGZILLA"/>
		<reference ref_id="1225838" ref_url="https://bugzilla.suse.com/1225838" source="BUGZILLA"/>
		<reference ref_id="1225839" ref_url="https://bugzilla.suse.com/1225839" source="BUGZILLA"/>
		<reference ref_id="1225843" ref_url="https://bugzilla.suse.com/1225843" source="BUGZILLA"/>
		<reference ref_id="1225847" ref_url="https://bugzilla.suse.com/1225847" source="BUGZILLA"/>
		<reference ref_id="1225851" ref_url="https://bugzilla.suse.com/1225851" source="BUGZILLA"/>
		<reference ref_id="1225856" ref_url="https://bugzilla.suse.com/1225856" source="BUGZILLA"/>
		<reference ref_id="1225895" ref_url="https://bugzilla.suse.com/1225895" source="BUGZILLA"/>
		<reference ref_id="1225898" ref_url="https://bugzilla.suse.com/1225898" source="BUGZILLA"/>
		<reference ref_id="1225903" ref_url="https://bugzilla.suse.com/1225903" source="BUGZILLA"/>
		<reference ref_id="1226202" ref_url="https://bugzilla.suse.com/1226202" source="BUGZILLA"/>
		<reference ref_id="1226502" ref_url="https://bugzilla.suse.com/1226502" source="BUGZILLA"/>
		<reference ref_id="1226519" ref_url="https://bugzilla.suse.com/1226519" source="BUGZILLA"/>
		<reference ref_id="1226551" ref_url="https://bugzilla.suse.com/1226551" source="BUGZILLA"/>
		<reference ref_id="1226555" ref_url="https://bugzilla.suse.com/1226555" source="BUGZILLA"/>
		<reference ref_id="1226565" ref_url="https://bugzilla.suse.com/1226565" source="BUGZILLA"/>
		<reference ref_id="1226568" ref_url="https://bugzilla.suse.com/1226568" source="BUGZILLA"/>
		<reference ref_id="1226570" ref_url="https://bugzilla.suse.com/1226570" source="BUGZILLA"/>
		<reference ref_id="1226571" ref_url="https://bugzilla.suse.com/1226571" source="BUGZILLA"/>
		<reference ref_id="1226574" ref_url="https://bugzilla.suse.com/1226574" source="BUGZILLA"/>
		<reference ref_id="1226588" ref_url="https://bugzilla.suse.com/1226588" source="BUGZILLA"/>
		<reference ref_id="1226607" ref_url="https://bugzilla.suse.com/1226607" source="BUGZILLA"/>
		<reference ref_id="1226650" ref_url="https://bugzilla.suse.com/1226650" source="BUGZILLA"/>
		<reference ref_id="1226698" ref_url="https://bugzilla.suse.com/1226698" source="BUGZILLA"/>
		<reference ref_id="1226713" ref_url="https://bugzilla.suse.com/1226713" source="BUGZILLA"/>
		<reference ref_id="1226716" ref_url="https://bugzilla.suse.com/1226716" source="BUGZILLA"/>
		<reference ref_id="1226750" ref_url="https://bugzilla.suse.com/1226750" source="BUGZILLA"/>
		<reference ref_id="1226757" ref_url="https://bugzilla.suse.com/1226757" source="BUGZILLA"/>
		<reference ref_id="1226758" ref_url="https://bugzilla.suse.com/1226758" source="BUGZILLA"/>
		<reference ref_id="1226775" ref_url="https://bugzilla.suse.com/1226775" source="BUGZILLA"/>
		<reference ref_id="1226783" ref_url="https://bugzilla.suse.com/1226783" source="BUGZILLA"/>
		<reference ref_id="1226785" ref_url="https://bugzilla.suse.com/1226785" source="BUGZILLA"/>
		<reference ref_id="1226834" ref_url="https://bugzilla.suse.com/1226834" source="BUGZILLA"/>
		<reference ref_id="1226837" ref_url="https://bugzilla.suse.com/1226837" source="BUGZILLA"/>
		<reference ref_id="1226911" ref_url="https://bugzilla.suse.com/1226911" source="BUGZILLA"/>
		<reference ref_id="1226990" ref_url="https://bugzilla.suse.com/1226990" source="BUGZILLA"/>
		<reference ref_id="1226993" ref_url="https://bugzilla.suse.com/1226993" source="BUGZILLA"/>
		<reference ref_id="1227090" ref_url="https://bugzilla.suse.com/1227090" source="BUGZILLA"/>
		<reference ref_id="1227121" ref_url="https://bugzilla.suse.com/1227121" source="BUGZILLA"/>
		<reference ref_id="1227157" ref_url="https://bugzilla.suse.com/1227157" source="BUGZILLA"/>
		<reference ref_id="1227162" ref_url="https://bugzilla.suse.com/1227162" source="BUGZILLA"/>
		<reference ref_id="1227362" ref_url="https://bugzilla.suse.com/1227362" source="BUGZILLA"/>
		<reference ref_id="1227383" ref_url="https://bugzilla.suse.com/1227383" source="BUGZILLA"/>
		<reference ref_id="1227432" ref_url="https://bugzilla.suse.com/1227432" source="BUGZILLA"/>
		<reference ref_id="1227435" ref_url="https://bugzilla.suse.com/1227435" source="BUGZILLA"/>
		<reference ref_id="1227447" ref_url="https://bugzilla.suse.com/1227447" source="BUGZILLA"/>
		<reference ref_id="1227487" ref_url="https://bugzilla.suse.com/1227487" source="BUGZILLA"/>
		<reference ref_id="1227549" ref_url="https://bugzilla.suse.com/1227549" source="BUGZILLA"/>
		<reference ref_id="1227573" ref_url="https://bugzilla.suse.com/1227573" source="BUGZILLA"/>
		<reference ref_id="1227618" ref_url="https://bugzilla.suse.com/1227618" source="BUGZILLA"/>
		<reference ref_id="1227620" ref_url="https://bugzilla.suse.com/1227620" source="BUGZILLA"/>
		<reference ref_id="1227626" ref_url="https://bugzilla.suse.com/1227626" source="BUGZILLA"/>
		<reference ref_id="1227635" ref_url="https://bugzilla.suse.com/1227635" source="BUGZILLA"/>
		<reference ref_id="1227661" ref_url="https://bugzilla.suse.com/1227661" source="BUGZILLA"/>
		<reference ref_id="1227716" ref_url="https://bugzilla.suse.com/1227716" source="BUGZILLA"/>
		<reference ref_id="1227722" ref_url="https://bugzilla.suse.com/1227722" source="BUGZILLA"/>
		<reference ref_id="1227724" ref_url="https://bugzilla.suse.com/1227724" source="BUGZILLA"/>
		<reference ref_id="1227725" ref_url="https://bugzilla.suse.com/1227725" source="BUGZILLA"/>
		<reference ref_id="1227728" ref_url="https://bugzilla.suse.com/1227728" source="BUGZILLA"/>
		<reference ref_id="1227729" ref_url="https://bugzilla.suse.com/1227729" source="BUGZILLA"/>
		<reference ref_id="1227730" ref_url="https://bugzilla.suse.com/1227730" source="BUGZILLA"/>
		<reference ref_id="1227732" ref_url="https://bugzilla.suse.com/1227732" source="BUGZILLA"/>
		<reference ref_id="1227733" ref_url="https://bugzilla.suse.com/1227733" source="BUGZILLA"/>
		<reference ref_id="1227750" ref_url="https://bugzilla.suse.com/1227750" source="BUGZILLA"/>
		<reference ref_id="1227754" ref_url="https://bugzilla.suse.com/1227754" source="BUGZILLA"/>
		<reference ref_id="1227755" ref_url="https://bugzilla.suse.com/1227755" source="BUGZILLA"/>
		<reference ref_id="1227760" ref_url="https://bugzilla.suse.com/1227760" source="BUGZILLA"/>
		<reference ref_id="1227762" ref_url="https://bugzilla.suse.com/1227762" source="BUGZILLA"/>
		<reference ref_id="1227763" ref_url="https://bugzilla.suse.com/1227763" source="BUGZILLA"/>
		<reference ref_id="1227764" ref_url="https://bugzilla.suse.com/1227764" source="BUGZILLA"/>
		<reference ref_id="1227766" ref_url="https://bugzilla.suse.com/1227766" source="BUGZILLA"/>
		<reference ref_id="1227770" ref_url="https://bugzilla.suse.com/1227770" source="BUGZILLA"/>
		<reference ref_id="1227771" ref_url="https://bugzilla.suse.com/1227771" source="BUGZILLA"/>
		<reference ref_id="1227772" ref_url="https://bugzilla.suse.com/1227772" source="BUGZILLA"/>
		<reference ref_id="1227774" ref_url="https://bugzilla.suse.com/1227774" source="BUGZILLA"/>
		<reference ref_id="1227779" ref_url="https://bugzilla.suse.com/1227779" source="BUGZILLA"/>
		<reference ref_id="1227780" ref_url="https://bugzilla.suse.com/1227780" source="BUGZILLA"/>
		<reference ref_id="1227783" ref_url="https://bugzilla.suse.com/1227783" source="BUGZILLA"/>
		<reference ref_id="1227786" ref_url="https://bugzilla.suse.com/1227786" source="BUGZILLA"/>
		<reference ref_id="1227787" ref_url="https://bugzilla.suse.com/1227787" source="BUGZILLA"/>
		<reference ref_id="1227790" ref_url="https://bugzilla.suse.com/1227790" source="BUGZILLA"/>
		<reference ref_id="1227792" ref_url="https://bugzilla.suse.com/1227792" source="BUGZILLA"/>
		<reference ref_id="1227796" ref_url="https://bugzilla.suse.com/1227796" source="BUGZILLA"/>
		<reference ref_id="1227797" ref_url="https://bugzilla.suse.com/1227797" source="BUGZILLA"/>
		<reference ref_id="1227798" ref_url="https://bugzilla.suse.com/1227798" source="BUGZILLA"/>
		<reference ref_id="1227800" ref_url="https://bugzilla.suse.com/1227800" source="BUGZILLA"/>
		<reference ref_id="1227802" ref_url="https://bugzilla.suse.com/1227802" source="BUGZILLA"/>
		<reference ref_id="1227806" ref_url="https://bugzilla.suse.com/1227806" source="BUGZILLA"/>
		<reference ref_id="1227808" ref_url="https://bugzilla.suse.com/1227808" source="BUGZILLA"/>
		<reference ref_id="1227810" ref_url="https://bugzilla.suse.com/1227810" source="BUGZILLA"/>
		<reference ref_id="1227812" ref_url="https://bugzilla.suse.com/1227812" source="BUGZILLA"/>
		<reference ref_id="1227813" ref_url="https://bugzilla.suse.com/1227813" source="BUGZILLA"/>
		<reference ref_id="1227814" ref_url="https://bugzilla.suse.com/1227814" source="BUGZILLA"/>
		<reference ref_id="1227816" ref_url="https://bugzilla.suse.com/1227816" source="BUGZILLA"/>
		<reference ref_id="1227820" ref_url="https://bugzilla.suse.com/1227820" source="BUGZILLA"/>
		<reference ref_id="1227823" ref_url="https://bugzilla.suse.com/1227823" source="BUGZILLA"/>
		<reference ref_id="1227824" ref_url="https://bugzilla.suse.com/1227824" source="BUGZILLA"/>
		<reference ref_id="1227828" ref_url="https://bugzilla.suse.com/1227828" source="BUGZILLA"/>
		<reference ref_id="1227829" ref_url="https://bugzilla.suse.com/1227829" source="BUGZILLA"/>
		<reference ref_id="1227836" ref_url="https://bugzilla.suse.com/1227836" source="BUGZILLA"/>
		<reference ref_id="1227846" ref_url="https://bugzilla.suse.com/1227846" source="BUGZILLA"/>
		<reference ref_id="1227849" ref_url="https://bugzilla.suse.com/1227849" source="BUGZILLA"/>
		<reference ref_id="1227851" ref_url="https://bugzilla.suse.com/1227851" source="BUGZILLA"/>
		<reference ref_id="1227862" ref_url="https://bugzilla.suse.com/1227862" source="BUGZILLA"/>
		<reference ref_id="1227864" ref_url="https://bugzilla.suse.com/1227864" source="BUGZILLA"/>
		<reference ref_id="1227865" ref_url="https://bugzilla.suse.com/1227865" source="BUGZILLA"/>
		<reference ref_id="1227866" ref_url="https://bugzilla.suse.com/1227866" source="BUGZILLA"/>
		<reference ref_id="1227870" ref_url="https://bugzilla.suse.com/1227870" source="BUGZILLA"/>
		<reference ref_id="1227884" ref_url="https://bugzilla.suse.com/1227884" source="BUGZILLA"/>
		<reference ref_id="1227886" ref_url="https://bugzilla.suse.com/1227886" source="BUGZILLA"/>
		<reference ref_id="1227891" ref_url="https://bugzilla.suse.com/1227891" source="BUGZILLA"/>
		<reference ref_id="1227893" ref_url="https://bugzilla.suse.com/1227893" source="BUGZILLA"/>
		<reference ref_id="1227899" ref_url="https://bugzilla.suse.com/1227899" source="BUGZILLA"/>
		<reference ref_id="1227900" ref_url="https://bugzilla.suse.com/1227900" source="BUGZILLA"/>
		<reference ref_id="1227910" ref_url="https://bugzilla.suse.com/1227910" source="BUGZILLA"/>
		<reference ref_id="1227913" ref_url="https://bugzilla.suse.com/1227913" source="BUGZILLA"/>
		<reference ref_id="1227917" ref_url="https://bugzilla.suse.com/1227917" source="BUGZILLA"/>
		<reference ref_id="1227919" ref_url="https://bugzilla.suse.com/1227919" source="BUGZILLA"/>
		<reference ref_id="1227920" ref_url="https://bugzilla.suse.com/1227920" source="BUGZILLA"/>
		<reference ref_id="1227921" ref_url="https://bugzilla.suse.com/1227921" source="BUGZILLA"/>
		<reference ref_id="1227922" ref_url="https://bugzilla.suse.com/1227922" source="BUGZILLA"/>
		<reference ref_id="1227923" ref_url="https://bugzilla.suse.com/1227923" source="BUGZILLA"/>
		<reference ref_id="1227924" ref_url="https://bugzilla.suse.com/1227924" source="BUGZILLA"/>
		<reference ref_id="1227925" ref_url="https://bugzilla.suse.com/1227925" source="BUGZILLA"/>
		<reference ref_id="1227927" ref_url="https://bugzilla.suse.com/1227927" source="BUGZILLA"/>
		<reference ref_id="1227928" ref_url="https://bugzilla.suse.com/1227928" source="BUGZILLA"/>
		<reference ref_id="1227931" ref_url="https://bugzilla.suse.com/1227931" source="BUGZILLA"/>
		<reference ref_id="1227932" ref_url="https://bugzilla.suse.com/1227932" source="BUGZILLA"/>
		<reference ref_id="1227933" ref_url="https://bugzilla.suse.com/1227933" source="BUGZILLA"/>
		<reference ref_id="1227935" ref_url="https://bugzilla.suse.com/1227935" source="BUGZILLA"/>
		<reference ref_id="1227936" ref_url="https://bugzilla.suse.com/1227936" source="BUGZILLA"/>
		<reference ref_id="1227938" ref_url="https://bugzilla.suse.com/1227938" source="BUGZILLA"/>
		<reference ref_id="1227941" ref_url="https://bugzilla.suse.com/1227941" source="BUGZILLA"/>
		<reference ref_id="1227942" ref_url="https://bugzilla.suse.com/1227942" source="BUGZILLA"/>
		<reference ref_id="1227944" ref_url="https://bugzilla.suse.com/1227944" source="BUGZILLA"/>
		<reference ref_id="1227945" ref_url="https://bugzilla.suse.com/1227945" source="BUGZILLA"/>
		<reference ref_id="1227947" ref_url="https://bugzilla.suse.com/1227947" source="BUGZILLA"/>
		<reference ref_id="1227948" ref_url="https://bugzilla.suse.com/1227948" source="BUGZILLA"/>
		<reference ref_id="1227949" ref_url="https://bugzilla.suse.com/1227949" source="BUGZILLA"/>
		<reference ref_id="1227950" ref_url="https://bugzilla.suse.com/1227950" source="BUGZILLA"/>
		<reference ref_id="1227952" ref_url="https://bugzilla.suse.com/1227952" source="BUGZILLA"/>
		<reference ref_id="1227953" ref_url="https://bugzilla.suse.com/1227953" source="BUGZILLA"/>
		<reference ref_id="1227954" ref_url="https://bugzilla.suse.com/1227954" source="BUGZILLA"/>
		<reference ref_id="1227956" ref_url="https://bugzilla.suse.com/1227956" source="BUGZILLA"/>
		<reference ref_id="1227957" ref_url="https://bugzilla.suse.com/1227957" source="BUGZILLA"/>
		<reference ref_id="1227963" ref_url="https://bugzilla.suse.com/1227963" source="BUGZILLA"/>
		<reference ref_id="1227964" ref_url="https://bugzilla.suse.com/1227964" source="BUGZILLA"/>
		<reference ref_id="1227965" ref_url="https://bugzilla.suse.com/1227965" source="BUGZILLA"/>
		<reference ref_id="1227968" ref_url="https://bugzilla.suse.com/1227968" source="BUGZILLA"/>
		<reference ref_id="1227969" ref_url="https://bugzilla.suse.com/1227969" source="BUGZILLA"/>
		<reference ref_id="1227970" ref_url="https://bugzilla.suse.com/1227970" source="BUGZILLA"/>
		<reference ref_id="1227971" ref_url="https://bugzilla.suse.com/1227971" source="BUGZILLA"/>
		<reference ref_id="1227972" ref_url="https://bugzilla.suse.com/1227972" source="BUGZILLA"/>
		<reference ref_id="1227975" ref_url="https://bugzilla.suse.com/1227975" source="BUGZILLA"/>
		<reference ref_id="1227976" ref_url="https://bugzilla.suse.com/1227976" source="BUGZILLA"/>
		<reference ref_id="1227981" ref_url="https://bugzilla.suse.com/1227981" source="BUGZILLA"/>
		<reference ref_id="1227982" ref_url="https://bugzilla.suse.com/1227982" source="BUGZILLA"/>
		<reference ref_id="1227985" ref_url="https://bugzilla.suse.com/1227985" source="BUGZILLA"/>
		<reference ref_id="1227986" ref_url="https://bugzilla.suse.com/1227986" source="BUGZILLA"/>
		<reference ref_id="1227987" ref_url="https://bugzilla.suse.com/1227987" source="BUGZILLA"/>
		<reference ref_id="1227988" ref_url="https://bugzilla.suse.com/1227988" source="BUGZILLA"/>
		<reference ref_id="1227989" ref_url="https://bugzilla.suse.com/1227989" source="BUGZILLA"/>
		<reference ref_id="1227990" ref_url="https://bugzilla.suse.com/1227990" source="BUGZILLA"/>
		<reference ref_id="1227991" ref_url="https://bugzilla.suse.com/1227991" source="BUGZILLA"/>
		<reference ref_id="1227992" ref_url="https://bugzilla.suse.com/1227992" source="BUGZILLA"/>
		<reference ref_id="1227993" ref_url="https://bugzilla.suse.com/1227993" source="BUGZILLA"/>
		<reference ref_id="1227995" ref_url="https://bugzilla.suse.com/1227995" source="BUGZILLA"/>
		<reference ref_id="1227996" ref_url="https://bugzilla.suse.com/1227996" source="BUGZILLA"/>
		<reference ref_id="1227997" ref_url="https://bugzilla.suse.com/1227997" source="BUGZILLA"/>
		<reference ref_id="1228000" ref_url="https://bugzilla.suse.com/1228000" source="BUGZILLA"/>
		<reference ref_id="1228002" ref_url="https://bugzilla.suse.com/1228002" source="BUGZILLA"/>
		<reference ref_id="1228003" ref_url="https://bugzilla.suse.com/1228003" source="BUGZILLA"/>
		<reference ref_id="1228004" ref_url="https://bugzilla.suse.com/1228004" source="BUGZILLA"/>
		<reference ref_id="1228005" ref_url="https://bugzilla.suse.com/1228005" source="BUGZILLA"/>
		<reference ref_id="1228006" ref_url="https://bugzilla.suse.com/1228006" source="BUGZILLA"/>
		<reference ref_id="1228007" ref_url="https://bugzilla.suse.com/1228007" source="BUGZILLA"/>
		<reference ref_id="1228008" ref_url="https://bugzilla.suse.com/1228008" source="BUGZILLA"/>
		<reference ref_id="1228009" ref_url="https://bugzilla.suse.com/1228009" source="BUGZILLA"/>
		<reference ref_id="1228010" ref_url="https://bugzilla.suse.com/1228010" source="BUGZILLA"/>
		<reference ref_id="1228011" ref_url="https://bugzilla.suse.com/1228011" source="BUGZILLA"/>
		<reference ref_id="1228013" ref_url="https://bugzilla.suse.com/1228013" source="BUGZILLA"/>
		<reference ref_id="1228014" ref_url="https://bugzilla.suse.com/1228014" source="BUGZILLA"/>
		<reference ref_id="1228015" ref_url="https://bugzilla.suse.com/1228015" source="BUGZILLA"/>
		<reference ref_id="1228019" ref_url="https://bugzilla.suse.com/1228019" source="BUGZILLA"/>
		<reference ref_id="1228020" ref_url="https://bugzilla.suse.com/1228020" source="BUGZILLA"/>
		<reference ref_id="1228025" ref_url="https://bugzilla.suse.com/1228025" source="BUGZILLA"/>
		<reference ref_id="1228028" ref_url="https://bugzilla.suse.com/1228028" source="BUGZILLA"/>
		<reference ref_id="1228035" ref_url="https://bugzilla.suse.com/1228035" source="BUGZILLA"/>
		<reference ref_id="1228037" ref_url="https://bugzilla.suse.com/1228037" source="BUGZILLA"/>
		<reference ref_id="1228038" ref_url="https://bugzilla.suse.com/1228038" source="BUGZILLA"/>
		<reference ref_id="1228039" ref_url="https://bugzilla.suse.com/1228039" source="BUGZILLA"/>
		<reference ref_id="1228040" ref_url="https://bugzilla.suse.com/1228040" source="BUGZILLA"/>
		<reference ref_id="1228045" ref_url="https://bugzilla.suse.com/1228045" source="BUGZILLA"/>
		<reference ref_id="1228054" ref_url="https://bugzilla.suse.com/1228054" source="BUGZILLA"/>
		<reference ref_id="1228055" ref_url="https://bugzilla.suse.com/1228055" source="BUGZILLA"/>
		<reference ref_id="1228056" ref_url="https://bugzilla.suse.com/1228056" source="BUGZILLA"/>
		<reference ref_id="1228060" ref_url="https://bugzilla.suse.com/1228060" source="BUGZILLA"/>
		<reference ref_id="1228061" ref_url="https://bugzilla.suse.com/1228061" source="BUGZILLA"/>
		<reference ref_id="1228062" ref_url="https://bugzilla.suse.com/1228062" source="BUGZILLA"/>
		<reference ref_id="1228063" ref_url="https://bugzilla.suse.com/1228063" source="BUGZILLA"/>
		<reference ref_id="1228064" ref_url="https://bugzilla.suse.com/1228064" source="BUGZILLA"/>
		<reference ref_id="1228066" ref_url="https://bugzilla.suse.com/1228066" source="BUGZILLA"/>
		<reference ref_id="1228067" ref_url="https://bugzilla.suse.com/1228067" source="BUGZILLA"/>
		<reference ref_id="1228068" ref_url="https://bugzilla.suse.com/1228068" source="BUGZILLA"/>
		<reference ref_id="1228071" ref_url="https://bugzilla.suse.com/1228071" source="BUGZILLA"/>
		<reference ref_id="1228079" ref_url="https://bugzilla.suse.com/1228079" source="BUGZILLA"/>
		<reference ref_id="1228090" ref_url="https://bugzilla.suse.com/1228090" source="BUGZILLA"/>
		<reference ref_id="1228114" ref_url="https://bugzilla.suse.com/1228114" source="BUGZILLA"/>
		<reference ref_id="1228140" ref_url="https://bugzilla.suse.com/1228140" source="BUGZILLA"/>
		<reference ref_id="1228190" ref_url="https://bugzilla.suse.com/1228190" source="BUGZILLA"/>
		<reference ref_id="1228191" ref_url="https://bugzilla.suse.com/1228191" source="BUGZILLA"/>
		<reference ref_id="1228195" ref_url="https://bugzilla.suse.com/1228195" source="BUGZILLA"/>
		<reference ref_id="1228202" ref_url="https://bugzilla.suse.com/1228202" source="BUGZILLA"/>
		<reference ref_id="1228226" ref_url="https://bugzilla.suse.com/1228226" source="BUGZILLA"/>
		<reference ref_id="1228235" ref_url="https://bugzilla.suse.com/1228235" source="BUGZILLA"/>
		<reference ref_id="1228237" ref_url="https://bugzilla.suse.com/1228237" source="BUGZILLA"/>
		<reference ref_id="1228247" ref_url="https://bugzilla.suse.com/1228247" source="BUGZILLA"/>
		<reference ref_id="1228327" ref_url="https://bugzilla.suse.com/1228327" source="BUGZILLA"/>
		<reference ref_id="1228328" ref_url="https://bugzilla.suse.com/1228328" source="BUGZILLA"/>
		<reference ref_id="1228330" ref_url="https://bugzilla.suse.com/1228330" source="BUGZILLA"/>
		<reference ref_id="1228403" ref_url="https://bugzilla.suse.com/1228403" source="BUGZILLA"/>
		<reference ref_id="1228405" ref_url="https://bugzilla.suse.com/1228405" source="BUGZILLA"/>
		<reference ref_id="1228408" ref_url="https://bugzilla.suse.com/1228408" source="BUGZILLA"/>
		<reference ref_id="1228409" ref_url="https://bugzilla.suse.com/1228409" source="BUGZILLA"/>
		<reference ref_id="1228410" ref_url="https://bugzilla.suse.com/1228410" source="BUGZILLA"/>
		<reference ref_id="1228418" ref_url="https://bugzilla.suse.com/1228418" source="BUGZILLA"/>
		<reference ref_id="1228440" ref_url="https://bugzilla.suse.com/1228440" source="BUGZILLA"/>
		<reference ref_id="1228459" ref_url="https://bugzilla.suse.com/1228459" source="BUGZILLA"/>
		<reference ref_id="1228462" ref_url="https://bugzilla.suse.com/1228462" source="BUGZILLA"/>
		<reference ref_id="1228470" ref_url="https://bugzilla.suse.com/1228470" source="BUGZILLA"/>
		<reference ref_id="1228518" ref_url="https://bugzilla.suse.com/1228518" source="BUGZILLA"/>
		<reference ref_id="1228520" ref_url="https://bugzilla.suse.com/1228520" source="BUGZILLA"/>
		<reference ref_id="1228530" ref_url="https://bugzilla.suse.com/1228530" source="BUGZILLA"/>
		<reference ref_id="1228561" ref_url="https://bugzilla.suse.com/1228561" source="BUGZILLA"/>
		<reference ref_id="1228565" ref_url="https://bugzilla.suse.com/1228565" source="BUGZILLA"/>
		<reference ref_id="1228580" ref_url="https://bugzilla.suse.com/1228580" source="BUGZILLA"/>
		<reference ref_id="1228581" ref_url="https://bugzilla.suse.com/1228581" source="BUGZILLA"/>
		<reference ref_id="1228591" ref_url="https://bugzilla.suse.com/1228591" source="BUGZILLA"/>
		<reference ref_id="1228599" ref_url="https://bugzilla.suse.com/1228599" source="BUGZILLA"/>
		<reference ref_id="1228617" ref_url="https://bugzilla.suse.com/1228617" source="BUGZILLA"/>
		<reference ref_id="1228625" ref_url="https://bugzilla.suse.com/1228625" source="BUGZILLA"/>
		<reference ref_id="1228626" ref_url="https://bugzilla.suse.com/1228626" source="BUGZILLA"/>
		<reference ref_id="1228633" ref_url="https://bugzilla.suse.com/1228633" source="BUGZILLA"/>
		<reference ref_id="1228640" ref_url="https://bugzilla.suse.com/1228640" source="BUGZILLA"/>
		<reference ref_id="1228644" ref_url="https://bugzilla.suse.com/1228644" source="BUGZILLA"/>
		<reference ref_id="1228649" ref_url="https://bugzilla.suse.com/1228649" source="BUGZILLA"/>
		<reference ref_id="1228655" ref_url="https://bugzilla.suse.com/1228655" source="BUGZILLA"/>
		<reference ref_id="1228665" ref_url="https://bugzilla.suse.com/1228665" source="BUGZILLA"/>
		<reference ref_id="1228672" ref_url="https://bugzilla.suse.com/1228672" source="BUGZILLA"/>
		<reference ref_id="1228680" ref_url="https://bugzilla.suse.com/1228680" source="BUGZILLA"/>
		<reference ref_id="1228705" ref_url="https://bugzilla.suse.com/1228705" source="BUGZILLA"/>
		<reference ref_id="1228723" ref_url="https://bugzilla.suse.com/1228723" source="BUGZILLA"/>
		<reference ref_id="1228743" ref_url="https://bugzilla.suse.com/1228743" source="BUGZILLA"/>
		<reference ref_id="1228756" ref_url="https://bugzilla.suse.com/1228756" source="BUGZILLA"/>
		<reference ref_id="1228801" ref_url="https://bugzilla.suse.com/1228801" source="BUGZILLA"/>
		<reference ref_id="1228850" ref_url="https://bugzilla.suse.com/1228850" source="BUGZILLA"/>
		<reference ref_id="1228857" ref_url="https://bugzilla.suse.com/1228857" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-47086" ref_url="https://www.suse.com/security/cve/CVE-2021-47086/" source="CVE"/>
		<reference ref_id="CVE-2021-47103" ref_url="https://www.suse.com/security/cve/CVE-2021-47103/" source="CVE"/>
		<reference ref_id="CVE-2021-47186" ref_url="https://www.suse.com/security/cve/CVE-2021-47186/" source="CVE"/>
		<reference ref_id="CVE-2021-47402" ref_url="https://www.suse.com/security/cve/CVE-2021-47402/" source="CVE"/>
		<reference ref_id="CVE-2021-47546" ref_url="https://www.suse.com/security/cve/CVE-2021-47546/" source="CVE"/>
		<reference ref_id="CVE-2021-47547" ref_url="https://www.suse.com/security/cve/CVE-2021-47547/" source="CVE"/>
		<reference ref_id="CVE-2021-47588" ref_url="https://www.suse.com/security/cve/CVE-2021-47588/" source="CVE"/>
		<reference ref_id="CVE-2021-47590" ref_url="https://www.suse.com/security/cve/CVE-2021-47590/" source="CVE"/>
		<reference ref_id="CVE-2021-47591" ref_url="https://www.suse.com/security/cve/CVE-2021-47591/" source="CVE"/>
		<reference ref_id="CVE-2021-47593" ref_url="https://www.suse.com/security/cve/CVE-2021-47593/" source="CVE"/>
		<reference ref_id="CVE-2021-47598" ref_url="https://www.suse.com/security/cve/CVE-2021-47598/" source="CVE"/>
		<reference ref_id="CVE-2021-47599" ref_url="https://www.suse.com/security/cve/CVE-2021-47599/" source="CVE"/>
		<reference ref_id="CVE-2021-47606" ref_url="https://www.suse.com/security/cve/CVE-2021-47606/" source="CVE"/>
		<reference ref_id="CVE-2021-47622" ref_url="https://www.suse.com/security/cve/CVE-2021-47622/" source="CVE"/>
		<reference ref_id="CVE-2021-47623" ref_url="https://www.suse.com/security/cve/CVE-2021-47623/" source="CVE"/>
		<reference ref_id="CVE-2021-47624" ref_url="https://www.suse.com/security/cve/CVE-2021-47624/" source="CVE"/>
		<reference ref_id="CVE-2022-48713" ref_url="https://www.suse.com/security/cve/CVE-2022-48713/" source="CVE"/>
		<reference ref_id="CVE-2022-48730" ref_url="https://www.suse.com/security/cve/CVE-2022-48730/" source="CVE"/>
		<reference ref_id="CVE-2022-48732" ref_url="https://www.suse.com/security/cve/CVE-2022-48732/" source="CVE"/>
		<reference ref_id="CVE-2022-48749" ref_url="https://www.suse.com/security/cve/CVE-2022-48749/" source="CVE"/>
		<reference ref_id="CVE-2022-48756" ref_url="https://www.suse.com/security/cve/CVE-2022-48756/" source="CVE"/>
		<reference ref_id="CVE-2022-48773" ref_url="https://www.suse.com/security/cve/CVE-2022-48773/" source="CVE"/>
		<reference ref_id="CVE-2022-48774" ref_url="https://www.suse.com/security/cve/CVE-2022-48774/" source="CVE"/>
		<reference ref_id="CVE-2022-48775" ref_url="https://www.suse.com/security/cve/CVE-2022-48775/" source="CVE"/>
		<reference ref_id="CVE-2022-48776" ref_url="https://www.suse.com/security/cve/CVE-2022-48776/" source="CVE"/>
		<reference ref_id="CVE-2022-48777" ref_url="https://www.suse.com/security/cve/CVE-2022-48777/" source="CVE"/>
		<reference ref_id="CVE-2022-48778" ref_url="https://www.suse.com/security/cve/CVE-2022-48778/" source="CVE"/>
		<reference ref_id="CVE-2022-48780" ref_url="https://www.suse.com/security/cve/CVE-2022-48780/" source="CVE"/>
		<reference ref_id="CVE-2022-48783" ref_url="https://www.suse.com/security/cve/CVE-2022-48783/" source="CVE"/>
		<reference ref_id="CVE-2022-48784" ref_url="https://www.suse.com/security/cve/CVE-2022-48784/" source="CVE"/>
		<reference ref_id="CVE-2022-48785" ref_url="https://www.suse.com/security/cve/CVE-2022-48785/" source="CVE"/>
		<reference ref_id="CVE-2022-48786" ref_url="https://www.suse.com/security/cve/CVE-2022-48786/" source="CVE"/>
		<reference ref_id="CVE-2022-48787" ref_url="https://www.suse.com/security/cve/CVE-2022-48787/" source="CVE"/>
		<reference ref_id="CVE-2022-48788" ref_url="https://www.suse.com/security/cve/CVE-2022-48788/" source="CVE"/>
		<reference ref_id="CVE-2022-48789" ref_url="https://www.suse.com/security/cve/CVE-2022-48789/" source="CVE"/>
		<reference ref_id="CVE-2022-48790" ref_url="https://www.suse.com/security/cve/CVE-2022-48790/" source="CVE"/>
		<reference ref_id="CVE-2022-48791" ref_url="https://www.suse.com/security/cve/CVE-2022-48791/" source="CVE"/>
		<reference ref_id="CVE-2022-48792" ref_url="https://www.suse.com/security/cve/CVE-2022-48792/" source="CVE"/>
		<reference ref_id="CVE-2022-48793" ref_url="https://www.suse.com/security/cve/CVE-2022-48793/" source="CVE"/>
		<reference ref_id="CVE-2022-48794" ref_url="https://www.suse.com/security/cve/CVE-2022-48794/" source="CVE"/>
		<reference ref_id="CVE-2022-48796" ref_url="https://www.suse.com/security/cve/CVE-2022-48796/" source="CVE"/>
		<reference ref_id="CVE-2022-48797" ref_url="https://www.suse.com/security/cve/CVE-2022-48797/" source="CVE"/>
		<reference ref_id="CVE-2022-48798" ref_url="https://www.suse.com/security/cve/CVE-2022-48798/" source="CVE"/>
		<reference ref_id="CVE-2022-48799" ref_url="https://www.suse.com/security/cve/CVE-2022-48799/" source="CVE"/>
		<reference ref_id="CVE-2022-48800" ref_url="https://www.suse.com/security/cve/CVE-2022-48800/" source="CVE"/>
		<reference ref_id="CVE-2022-48801" ref_url="https://www.suse.com/security/cve/CVE-2022-48801/" source="CVE"/>
		<reference ref_id="CVE-2022-48802" ref_url="https://www.suse.com/security/cve/CVE-2022-48802/" source="CVE"/>
		<reference ref_id="CVE-2022-48803" ref_url="https://www.suse.com/security/cve/CVE-2022-48803/" source="CVE"/>
		<reference ref_id="CVE-2022-48804" ref_url="https://www.suse.com/security/cve/CVE-2022-48804/" source="CVE"/>
		<reference ref_id="CVE-2022-48805" ref_url="https://www.suse.com/security/cve/CVE-2022-48805/" source="CVE"/>
		<reference ref_id="CVE-2022-48806" ref_url="https://www.suse.com/security/cve/CVE-2022-48806/" source="CVE"/>
		<reference ref_id="CVE-2022-48807" ref_url="https://www.suse.com/security/cve/CVE-2022-48807/" source="CVE"/>
		<reference ref_id="CVE-2022-48809" ref_url="https://www.suse.com/security/cve/CVE-2022-48809/" source="CVE"/>
		<reference ref_id="CVE-2022-48810" ref_url="https://www.suse.com/security/cve/CVE-2022-48810/" source="CVE"/>
		<reference ref_id="CVE-2022-48811" ref_url="https://www.suse.com/security/cve/CVE-2022-48811/" source="CVE"/>
		<reference ref_id="CVE-2022-48812" ref_url="https://www.suse.com/security/cve/CVE-2022-48812/" source="CVE"/>
		<reference ref_id="CVE-2022-48813" ref_url="https://www.suse.com/security/cve/CVE-2022-48813/" source="CVE"/>
		<reference ref_id="CVE-2022-48814" ref_url="https://www.suse.com/security/cve/CVE-2022-48814/" source="CVE"/>
		<reference ref_id="CVE-2022-48815" ref_url="https://www.suse.com/security/cve/CVE-2022-48815/" source="CVE"/>
		<reference ref_id="CVE-2022-48816" ref_url="https://www.suse.com/security/cve/CVE-2022-48816/" source="CVE"/>
		<reference ref_id="CVE-2022-48817" ref_url="https://www.suse.com/security/cve/CVE-2022-48817/" source="CVE"/>
		<reference ref_id="CVE-2022-48818" ref_url="https://www.suse.com/security/cve/CVE-2022-48818/" source="CVE"/>
		<reference ref_id="CVE-2022-48820" ref_url="https://www.suse.com/security/cve/CVE-2022-48820/" source="CVE"/>
		<reference ref_id="CVE-2022-48821" ref_url="https://www.suse.com/security/cve/CVE-2022-48821/" source="CVE"/>
		<reference ref_id="CVE-2022-48822" ref_url="https://www.suse.com/security/cve/CVE-2022-48822/" source="CVE"/>
		<reference ref_id="CVE-2022-48823" ref_url="https://www.suse.com/security/cve/CVE-2022-48823/" source="CVE"/>
		<reference ref_id="CVE-2022-48824" ref_url="https://www.suse.com/security/cve/CVE-2022-48824/" source="CVE"/>
		<reference ref_id="CVE-2022-48825" ref_url="https://www.suse.com/security/cve/CVE-2022-48825/" source="CVE"/>
		<reference ref_id="CVE-2022-48826" ref_url="https://www.suse.com/security/cve/CVE-2022-48826/" source="CVE"/>
		<reference ref_id="CVE-2022-48827" ref_url="https://www.suse.com/security/cve/CVE-2022-48827/" source="CVE"/>
		<reference ref_id="CVE-2022-48828" ref_url="https://www.suse.com/security/cve/CVE-2022-48828/" source="CVE"/>
		<reference ref_id="CVE-2022-48829" ref_url="https://www.suse.com/security/cve/CVE-2022-48829/" source="CVE"/>
		<reference ref_id="CVE-2022-48830" ref_url="https://www.suse.com/security/cve/CVE-2022-48830/" source="CVE"/>
		<reference ref_id="CVE-2022-48831" ref_url="https://www.suse.com/security/cve/CVE-2022-48831/" source="CVE"/>
		<reference ref_id="CVE-2022-48834" ref_url="https://www.suse.com/security/cve/CVE-2022-48834/" source="CVE"/>
		<reference ref_id="CVE-2022-48835" ref_url="https://www.suse.com/security/cve/CVE-2022-48835/" source="CVE"/>
		<reference ref_id="CVE-2022-48836" ref_url="https://www.suse.com/security/cve/CVE-2022-48836/" source="CVE"/>
		<reference ref_id="CVE-2022-48837" ref_url="https://www.suse.com/security/cve/CVE-2022-48837/" source="CVE"/>
		<reference ref_id="CVE-2022-48838" ref_url="https://www.suse.com/security/cve/CVE-2022-48838/" source="CVE"/>
		<reference ref_id="CVE-2022-48839" ref_url="https://www.suse.com/security/cve/CVE-2022-48839/" source="CVE"/>
		<reference ref_id="CVE-2022-48840" ref_url="https://www.suse.com/security/cve/CVE-2022-48840/" source="CVE"/>
		<reference ref_id="CVE-2022-48841" ref_url="https://www.suse.com/security/cve/CVE-2022-48841/" source="CVE"/>
		<reference ref_id="CVE-2022-48842" ref_url="https://www.suse.com/security/cve/CVE-2022-48842/" source="CVE"/>
		<reference ref_id="CVE-2022-48843" ref_url="https://www.suse.com/security/cve/CVE-2022-48843/" source="CVE"/>
		<reference ref_id="CVE-2022-48844" ref_url="https://www.suse.com/security/cve/CVE-2022-48844/" source="CVE"/>
		<reference ref_id="CVE-2022-48846" ref_url="https://www.suse.com/security/cve/CVE-2022-48846/" source="CVE"/>
		<reference ref_id="CVE-2022-48847" ref_url="https://www.suse.com/security/cve/CVE-2022-48847/" source="CVE"/>
		<reference ref_id="CVE-2022-48849" ref_url="https://www.suse.com/security/cve/CVE-2022-48849/" source="CVE"/>
		<reference ref_id="CVE-2022-48850" ref_url="https://www.suse.com/security/cve/CVE-2022-48850/" source="CVE"/>
		<reference ref_id="CVE-2022-48851" ref_url="https://www.suse.com/security/cve/CVE-2022-48851/" source="CVE"/>
		<reference ref_id="CVE-2022-48852" ref_url="https://www.suse.com/security/cve/CVE-2022-48852/" source="CVE"/>
		<reference ref_id="CVE-2022-48853" ref_url="https://www.suse.com/security/cve/CVE-2022-48853/" source="CVE"/>
		<reference ref_id="CVE-2022-48855" ref_url="https://www.suse.com/security/cve/CVE-2022-48855/" source="CVE"/>
		<reference ref_id="CVE-2022-48856" ref_url="https://www.suse.com/security/cve/CVE-2022-48856/" source="CVE"/>
		<reference ref_id="CVE-2022-48857" ref_url="https://www.suse.com/security/cve/CVE-2022-48857/" source="CVE"/>
		<reference ref_id="CVE-2022-48858" ref_url="https://www.suse.com/security/cve/CVE-2022-48858/" source="CVE"/>
		<reference ref_id="CVE-2022-48859" ref_url="https://www.suse.com/security/cve/CVE-2022-48859/" source="CVE"/>
		<reference ref_id="CVE-2022-48860" ref_url="https://www.suse.com/security/cve/CVE-2022-48860/" source="CVE"/>
		<reference ref_id="CVE-2022-48861" ref_url="https://www.suse.com/security/cve/CVE-2022-48861/" source="CVE"/>
		<reference ref_id="CVE-2022-48862" ref_url="https://www.suse.com/security/cve/CVE-2022-48862/" source="CVE"/>
		<reference ref_id="CVE-2022-48863" ref_url="https://www.suse.com/security/cve/CVE-2022-48863/" source="CVE"/>
		<reference ref_id="CVE-2022-48864" ref_url="https://www.suse.com/security/cve/CVE-2022-48864/" source="CVE"/>
		<reference ref_id="CVE-2022-48866" ref_url="https://www.suse.com/security/cve/CVE-2022-48866/" source="CVE"/>
		<reference ref_id="CVE-2023-1582" ref_url="https://www.suse.com/security/cve/CVE-2023-1582/" source="CVE"/>
		<reference ref_id="CVE-2023-37453" ref_url="https://www.suse.com/security/cve/CVE-2023-37453/" source="CVE"/>
		<reference ref_id="CVE-2023-52435" ref_url="https://www.suse.com/security/cve/CVE-2023-52435/" source="CVE"/>
		<reference ref_id="CVE-2023-52573" ref_url="https://www.suse.com/security/cve/CVE-2023-52573/" source="CVE"/>
		<reference ref_id="CVE-2023-52580" ref_url="https://www.suse.com/security/cve/CVE-2023-52580/" source="CVE"/>
		<reference ref_id="CVE-2023-52591" ref_url="https://www.suse.com/security/cve/CVE-2023-52591/" source="CVE"/>
		<reference ref_id="CVE-2023-52735" ref_url="https://www.suse.com/security/cve/CVE-2023-52735/" source="CVE"/>
		<reference ref_id="CVE-2023-52751" ref_url="https://www.suse.com/security/cve/CVE-2023-52751/" source="CVE"/>
		<reference ref_id="CVE-2023-52762" ref_url="https://www.suse.com/security/cve/CVE-2023-52762/" source="CVE"/>
		<reference ref_id="CVE-2023-52775" ref_url="https://www.suse.com/security/cve/CVE-2023-52775/" source="CVE"/>
		<reference ref_id="CVE-2023-52812" ref_url="https://www.suse.com/security/cve/CVE-2023-52812/" source="CVE"/>
		<reference ref_id="CVE-2023-52857" ref_url="https://www.suse.com/security/cve/CVE-2023-52857/" source="CVE"/>
		<reference ref_id="CVE-2023-52863" ref_url="https://www.suse.com/security/cve/CVE-2023-52863/" source="CVE"/>
		<reference ref_id="CVE-2023-52885" ref_url="https://www.suse.com/security/cve/CVE-2023-52885/" source="CVE"/>
		<reference ref_id="CVE-2023-52886" ref_url="https://www.suse.com/security/cve/CVE-2023-52886/" source="CVE"/>
		<reference ref_id="CVE-2024-25741" ref_url="https://www.suse.com/security/cve/CVE-2024-25741/" source="CVE"/>
		<reference ref_id="CVE-2024-26583" ref_url="https://www.suse.com/security/cve/CVE-2024-26583/" source="CVE"/>
		<reference ref_id="CVE-2024-26584" ref_url="https://www.suse.com/security/cve/CVE-2024-26584/" source="CVE"/>
		<reference ref_id="CVE-2024-26585" ref_url="https://www.suse.com/security/cve/CVE-2024-26585/" source="CVE"/>
		<reference ref_id="CVE-2024-26615" ref_url="https://www.suse.com/security/cve/CVE-2024-26615/" source="CVE"/>
		<reference ref_id="CVE-2024-26633" ref_url="https://www.suse.com/security/cve/CVE-2024-26633/" source="CVE"/>
		<reference ref_id="CVE-2024-26635" ref_url="https://www.suse.com/security/cve/CVE-2024-26635/" source="CVE"/>
		<reference ref_id="CVE-2024-26636" ref_url="https://www.suse.com/security/cve/CVE-2024-26636/" source="CVE"/>
		<reference ref_id="CVE-2024-26641" ref_url="https://www.suse.com/security/cve/CVE-2024-26641/" source="CVE"/>
		<reference ref_id="CVE-2024-26661" ref_url="https://www.suse.com/security/cve/CVE-2024-26661/" source="CVE"/>
		<reference ref_id="CVE-2024-26663" ref_url="https://www.suse.com/security/cve/CVE-2024-26663/" source="CVE"/>
		<reference ref_id="CVE-2024-26665" ref_url="https://www.suse.com/security/cve/CVE-2024-26665/" source="CVE"/>
		<reference ref_id="CVE-2024-26800" ref_url="https://www.suse.com/security/cve/CVE-2024-26800/" source="CVE"/>
		<reference ref_id="CVE-2024-26802" ref_url="https://www.suse.com/security/cve/CVE-2024-26802/" source="CVE"/>
		<reference ref_id="CVE-2024-26813" ref_url="https://www.suse.com/security/cve/CVE-2024-26813/" source="CVE"/>
		<reference ref_id="CVE-2024-26814" ref_url="https://www.suse.com/security/cve/CVE-2024-26814/" source="CVE"/>
		<reference ref_id="CVE-2024-26863" ref_url="https://www.suse.com/security/cve/CVE-2024-26863/" source="CVE"/>
		<reference ref_id="CVE-2024-26889" ref_url="https://www.suse.com/security/cve/CVE-2024-26889/" source="CVE"/>
		<reference ref_id="CVE-2024-26920" ref_url="https://www.suse.com/security/cve/CVE-2024-26920/" source="CVE"/>
		<reference ref_id="CVE-2024-26935" ref_url="https://www.suse.com/security/cve/CVE-2024-26935/" source="CVE"/>
		<reference ref_id="CVE-2024-26961" ref_url="https://www.suse.com/security/cve/CVE-2024-26961/" source="CVE"/>
		<reference ref_id="CVE-2024-26976" ref_url="https://www.suse.com/security/cve/CVE-2024-26976/" source="CVE"/>
		<reference ref_id="CVE-2024-27015" ref_url="https://www.suse.com/security/cve/CVE-2024-27015/" source="CVE"/>
		<reference ref_id="CVE-2024-27019" ref_url="https://www.suse.com/security/cve/CVE-2024-27019/" source="CVE"/>
		<reference ref_id="CVE-2024-27020" ref_url="https://www.suse.com/security/cve/CVE-2024-27020/" source="CVE"/>
		<reference ref_id="CVE-2024-27025" ref_url="https://www.suse.com/security/cve/CVE-2024-27025/" source="CVE"/>
		<reference ref_id="CVE-2024-27065" ref_url="https://www.suse.com/security/cve/CVE-2024-27065/" source="CVE"/>
		<reference ref_id="CVE-2024-27402" ref_url="https://www.suse.com/security/cve/CVE-2024-27402/" source="CVE"/>
		<reference ref_id="CVE-2024-27437" ref_url="https://www.suse.com/security/cve/CVE-2024-27437/" source="CVE"/>
		<reference ref_id="CVE-2024-35805" ref_url="https://www.suse.com/security/cve/CVE-2024-35805/" source="CVE"/>
		<reference ref_id="CVE-2024-35819" ref_url="https://www.suse.com/security/cve/CVE-2024-35819/" source="CVE"/>
		<reference ref_id="CVE-2024-35837" ref_url="https://www.suse.com/security/cve/CVE-2024-35837/" source="CVE"/>
		<reference ref_id="CVE-2024-35853" ref_url="https://www.suse.com/security/cve/CVE-2024-35853/" source="CVE"/>
		<reference ref_id="CVE-2024-35854" ref_url="https://www.suse.com/security/cve/CVE-2024-35854/" source="CVE"/>
		<reference ref_id="CVE-2024-35855" ref_url="https://www.suse.com/security/cve/CVE-2024-35855/" source="CVE"/>
		<reference ref_id="CVE-2024-35889" ref_url="https://www.suse.com/security/cve/CVE-2024-35889/" source="CVE"/>
		<reference ref_id="CVE-2024-35890" ref_url="https://www.suse.com/security/cve/CVE-2024-35890/" source="CVE"/>
		<reference ref_id="CVE-2024-35893" ref_url="https://www.suse.com/security/cve/CVE-2024-35893/" source="CVE"/>
		<reference ref_id="CVE-2024-35899" ref_url="https://www.suse.com/security/cve/CVE-2024-35899/" source="CVE"/>
		<reference ref_id="CVE-2024-35934" ref_url="https://www.suse.com/security/cve/CVE-2024-35934/" source="CVE"/>
		<reference ref_id="CVE-2024-35949" ref_url="https://www.suse.com/security/cve/CVE-2024-35949/" source="CVE"/>
		<reference ref_id="CVE-2024-35961" ref_url="https://www.suse.com/security/cve/CVE-2024-35961/" source="CVE"/>
		<reference ref_id="CVE-2024-35979" ref_url="https://www.suse.com/security/cve/CVE-2024-35979/" source="CVE"/>
		<reference ref_id="CVE-2024-35995" ref_url="https://www.suse.com/security/cve/CVE-2024-35995/" source="CVE"/>
		<reference ref_id="CVE-2024-36000" ref_url="https://www.suse.com/security/cve/CVE-2024-36000/" source="CVE"/>
		<reference ref_id="CVE-2024-36004" ref_url="https://www.suse.com/security/cve/CVE-2024-36004/" source="CVE"/>
		<reference ref_id="CVE-2024-36288" ref_url="https://www.suse.com/security/cve/CVE-2024-36288/" source="CVE"/>
		<reference ref_id="CVE-2024-36889" ref_url="https://www.suse.com/security/cve/CVE-2024-36889/" source="CVE"/>
		<reference ref_id="CVE-2024-36901" ref_url="https://www.suse.com/security/cve/CVE-2024-36901/" source="CVE"/>
		<reference ref_id="CVE-2024-36902" ref_url="https://www.suse.com/security/cve/CVE-2024-36902/" source="CVE"/>
		<reference ref_id="CVE-2024-36909" ref_url="https://www.suse.com/security/cve/CVE-2024-36909/" source="CVE"/>
		<reference ref_id="CVE-2024-36910" ref_url="https://www.suse.com/security/cve/CVE-2024-36910/" source="CVE"/>
		<reference ref_id="CVE-2024-36911" ref_url="https://www.suse.com/security/cve/CVE-2024-36911/" source="CVE"/>
		<reference ref_id="CVE-2024-36912" ref_url="https://www.suse.com/security/cve/CVE-2024-36912/" source="CVE"/>
		<reference ref_id="CVE-2024-36913" ref_url="https://www.suse.com/security/cve/CVE-2024-36913/" source="CVE"/>
		<reference ref_id="CVE-2024-36914" ref_url="https://www.suse.com/security/cve/CVE-2024-36914/" source="CVE"/>
		<reference ref_id="CVE-2024-36919" ref_url="https://www.suse.com/security/cve/CVE-2024-36919/" source="CVE"/>
		<reference ref_id="CVE-2024-36923" ref_url="https://www.suse.com/security/cve/CVE-2024-36923/" source="CVE"/>
		<reference ref_id="CVE-2024-36924" ref_url="https://www.suse.com/security/cve/CVE-2024-36924/" source="CVE"/>
		<reference ref_id="CVE-2024-36926" ref_url="https://www.suse.com/security/cve/CVE-2024-36926/" source="CVE"/>
		<reference ref_id="CVE-2024-36939" ref_url="https://www.suse.com/security/cve/CVE-2024-36939/" source="CVE"/>
		<reference ref_id="CVE-2024-36941" ref_url="https://www.suse.com/security/cve/CVE-2024-36941/" source="CVE"/>
		<reference ref_id="CVE-2024-36942" ref_url="https://www.suse.com/security/cve/CVE-2024-36942/" source="CVE"/>
		<reference ref_id="CVE-2024-36944" ref_url="https://www.suse.com/security/cve/CVE-2024-36944/" source="CVE"/>
		<reference ref_id="CVE-2024-36946" ref_url="https://www.suse.com/security/cve/CVE-2024-36946/" source="CVE"/>
		<reference ref_id="CVE-2024-36947" ref_url="https://www.suse.com/security/cve/CVE-2024-36947/" source="CVE"/>
		<reference ref_id="CVE-2024-36950" ref_url="https://www.suse.com/security/cve/CVE-2024-36950/" source="CVE"/>
		<reference ref_id="CVE-2024-36952" ref_url="https://www.suse.com/security/cve/CVE-2024-36952/" source="CVE"/>
		<reference ref_id="CVE-2024-36955" ref_url="https://www.suse.com/security/cve/CVE-2024-36955/" source="CVE"/>
		<reference ref_id="CVE-2024-36959" ref_url="https://www.suse.com/security/cve/CVE-2024-36959/" source="CVE"/>
		<reference ref_id="CVE-2024-36974" ref_url="https://www.suse.com/security/cve/CVE-2024-36974/" source="CVE"/>
		<reference ref_id="CVE-2024-38548" ref_url="https://www.suse.com/security/cve/CVE-2024-38548/" source="CVE"/>
		<reference ref_id="CVE-2024-38555" ref_url="https://www.suse.com/security/cve/CVE-2024-38555/" source="CVE"/>
		<reference ref_id="CVE-2024-38558" ref_url="https://www.suse.com/security/cve/CVE-2024-38558/" source="CVE"/>
		<reference ref_id="CVE-2024-38559" ref_url="https://www.suse.com/security/cve/CVE-2024-38559/" source="CVE"/>
		<reference ref_id="CVE-2024-38570" ref_url="https://www.suse.com/security/cve/CVE-2024-38570/" source="CVE"/>
		<reference ref_id="CVE-2024-38586" ref_url="https://www.suse.com/security/cve/CVE-2024-38586/" source="CVE"/>
		<reference ref_id="CVE-2024-38588" ref_url="https://www.suse.com/security/cve/CVE-2024-38588/" source="CVE"/>
		<reference ref_id="CVE-2024-38598" ref_url="https://www.suse.com/security/cve/CVE-2024-38598/" source="CVE"/>
		<reference ref_id="CVE-2024-38628" ref_url="https://www.suse.com/security/cve/CVE-2024-38628/" source="CVE"/>
		<reference ref_id="CVE-2024-39276" ref_url="https://www.suse.com/security/cve/CVE-2024-39276/" source="CVE"/>
		<reference ref_id="CVE-2024-39371" ref_url="https://www.suse.com/security/cve/CVE-2024-39371/" source="CVE"/>
		<reference ref_id="CVE-2024-39463" ref_url="https://www.suse.com/security/cve/CVE-2024-39463/" source="CVE"/>
		<reference ref_id="CVE-2024-39472" ref_url="https://www.suse.com/security/cve/CVE-2024-39472/" source="CVE"/>
		<reference ref_id="CVE-2024-39475" ref_url="https://www.suse.com/security/cve/CVE-2024-39475/" source="CVE"/>
		<reference ref_id="CVE-2024-39482" ref_url="https://www.suse.com/security/cve/CVE-2024-39482/" source="CVE"/>
		<reference ref_id="CVE-2024-39487" ref_url="https://www.suse.com/security/cve/CVE-2024-39487/" source="CVE"/>
		<reference ref_id="CVE-2024-39488" ref_url="https://www.suse.com/security/cve/CVE-2024-39488/" source="CVE"/>
		<reference ref_id="CVE-2024-39490" ref_url="https://www.suse.com/security/cve/CVE-2024-39490/" source="CVE"/>
		<reference ref_id="CVE-2024-39493" ref_url="https://www.suse.com/security/cve/CVE-2024-39493/" source="CVE"/>
		<reference ref_id="CVE-2024-39494" ref_url="https://www.suse.com/security/cve/CVE-2024-39494/" source="CVE"/>
		<reference ref_id="CVE-2024-39497" ref_url="https://www.suse.com/security/cve/CVE-2024-39497/" source="CVE"/>
		<reference ref_id="CVE-2024-39499" ref_url="https://www.suse.com/security/cve/CVE-2024-39499/" source="CVE"/>
		<reference ref_id="CVE-2024-39500" ref_url="https://www.suse.com/security/cve/CVE-2024-39500/" source="CVE"/>
		<reference ref_id="CVE-2024-39501" ref_url="https://www.suse.com/security/cve/CVE-2024-39501/" source="CVE"/>
		<reference ref_id="CVE-2024-39502" ref_url="https://www.suse.com/security/cve/CVE-2024-39502/" source="CVE"/>
		<reference ref_id="CVE-2024-39505" ref_url="https://www.suse.com/security/cve/CVE-2024-39505/" source="CVE"/>
		<reference ref_id="CVE-2024-39506" ref_url="https://www.suse.com/security/cve/CVE-2024-39506/" source="CVE"/>
		<reference ref_id="CVE-2024-39507" ref_url="https://www.suse.com/security/cve/CVE-2024-39507/" source="CVE"/>
		<reference ref_id="CVE-2024-39508" ref_url="https://www.suse.com/security/cve/CVE-2024-39508/" source="CVE"/>
		<reference ref_id="CVE-2024-39509" ref_url="https://www.suse.com/security/cve/CVE-2024-39509/" source="CVE"/>
		<reference ref_id="CVE-2024-40900" ref_url="https://www.suse.com/security/cve/CVE-2024-40900/" source="CVE"/>
		<reference ref_id="CVE-2024-40901" ref_url="https://www.suse.com/security/cve/CVE-2024-40901/" source="CVE"/>
		<reference ref_id="CVE-2024-40902" ref_url="https://www.suse.com/security/cve/CVE-2024-40902/" source="CVE"/>
		<reference ref_id="CVE-2024-40903" ref_url="https://www.suse.com/security/cve/CVE-2024-40903/" source="CVE"/>
		<reference ref_id="CVE-2024-40904" ref_url="https://www.suse.com/security/cve/CVE-2024-40904/" source="CVE"/>
		<reference ref_id="CVE-2024-40906" ref_url="https://www.suse.com/security/cve/CVE-2024-40906/" source="CVE"/>
		<reference ref_id="CVE-2024-40908" ref_url="https://www.suse.com/security/cve/CVE-2024-40908/" source="CVE"/>
		<reference ref_id="CVE-2024-40909" ref_url="https://www.suse.com/security/cve/CVE-2024-40909/" source="CVE"/>
		<reference ref_id="CVE-2024-40911" ref_url="https://www.suse.com/security/cve/CVE-2024-40911/" source="CVE"/>
		<reference ref_id="CVE-2024-40912" ref_url="https://www.suse.com/security/cve/CVE-2024-40912/" source="CVE"/>
		<reference ref_id="CVE-2024-40916" ref_url="https://www.suse.com/security/cve/CVE-2024-40916/" source="CVE"/>
		<reference ref_id="CVE-2024-40919" ref_url="https://www.suse.com/security/cve/CVE-2024-40919/" source="CVE"/>
		<reference ref_id="CVE-2024-40923" ref_url="https://www.suse.com/security/cve/CVE-2024-40923/" source="CVE"/>
		<reference ref_id="CVE-2024-40924" ref_url="https://www.suse.com/security/cve/CVE-2024-40924/" source="CVE"/>
		<reference ref_id="CVE-2024-40927" ref_url="https://www.suse.com/security/cve/CVE-2024-40927/" source="CVE"/>
		<reference ref_id="CVE-2024-40929" ref_url="https://www.suse.com/security/cve/CVE-2024-40929/" source="CVE"/>
		<reference ref_id="CVE-2024-40931" ref_url="https://www.suse.com/security/cve/CVE-2024-40931/" source="CVE"/>
		<reference ref_id="CVE-2024-40932" ref_url="https://www.suse.com/security/cve/CVE-2024-40932/" source="CVE"/>
		<reference ref_id="CVE-2024-40934" ref_url="https://www.suse.com/security/cve/CVE-2024-40934/" source="CVE"/>
		<reference ref_id="CVE-2024-40935" ref_url="https://www.suse.com/security/cve/CVE-2024-40935/" source="CVE"/>
		<reference ref_id="CVE-2024-40937" ref_url="https://www.suse.com/security/cve/CVE-2024-40937/" source="CVE"/>
		<reference ref_id="CVE-2024-40940" ref_url="https://www.suse.com/security/cve/CVE-2024-40940/" source="CVE"/>
		<reference ref_id="CVE-2024-40941" ref_url="https://www.suse.com/security/cve/CVE-2024-40941/" source="CVE"/>
		<reference ref_id="CVE-2024-40942" ref_url="https://www.suse.com/security/cve/CVE-2024-40942/" source="CVE"/>
		<reference ref_id="CVE-2024-40943" ref_url="https://www.suse.com/security/cve/CVE-2024-40943/" source="CVE"/>
		<reference ref_id="CVE-2024-40945" ref_url="https://www.suse.com/security/cve/CVE-2024-40945/" source="CVE"/>
		<reference ref_id="CVE-2024-40953" ref_url="https://www.suse.com/security/cve/CVE-2024-40953/" source="CVE"/>
		<reference ref_id="CVE-2024-40954" ref_url="https://www.suse.com/security/cve/CVE-2024-40954/" source="CVE"/>
		<reference ref_id="CVE-2024-40956" ref_url="https://www.suse.com/security/cve/CVE-2024-40956/" source="CVE"/>
		<reference ref_id="CVE-2024-40958" ref_url="https://www.suse.com/security/cve/CVE-2024-40958/" source="CVE"/>
		<reference ref_id="CVE-2024-40959" ref_url="https://www.suse.com/security/cve/CVE-2024-40959/" source="CVE"/>
		<reference ref_id="CVE-2024-40960" ref_url="https://www.suse.com/security/cve/CVE-2024-40960/" source="CVE"/>
		<reference ref_id="CVE-2024-40961" ref_url="https://www.suse.com/security/cve/CVE-2024-40961/" source="CVE"/>
		<reference ref_id="CVE-2024-40966" ref_url="https://www.suse.com/security/cve/CVE-2024-40966/" source="CVE"/>
		<reference ref_id="CVE-2024-40967" ref_url="https://www.suse.com/security/cve/CVE-2024-40967/" source="CVE"/>
		<reference ref_id="CVE-2024-40970" ref_url="https://www.suse.com/security/cve/CVE-2024-40970/" source="CVE"/>
		<reference ref_id="CVE-2024-40972" ref_url="https://www.suse.com/security/cve/CVE-2024-40972/" source="CVE"/>
		<reference ref_id="CVE-2024-40976" ref_url="https://www.suse.com/security/cve/CVE-2024-40976/" source="CVE"/>
		<reference ref_id="CVE-2024-40977" ref_url="https://www.suse.com/security/cve/CVE-2024-40977/" source="CVE"/>
		<reference ref_id="CVE-2024-40981" ref_url="https://www.suse.com/security/cve/CVE-2024-40981/" source="CVE"/>
		<reference ref_id="CVE-2024-40982" ref_url="https://www.suse.com/security/cve/CVE-2024-40982/" source="CVE"/>
		<reference ref_id="CVE-2024-40984" ref_url="https://www.suse.com/security/cve/CVE-2024-40984/" source="CVE"/>
		<reference ref_id="CVE-2024-40987" ref_url="https://www.suse.com/security/cve/CVE-2024-40987/" source="CVE"/>
		<reference ref_id="CVE-2024-40988" ref_url="https://www.suse.com/security/cve/CVE-2024-40988/" source="CVE"/>
		<reference ref_id="CVE-2024-40989" ref_url="https://www.suse.com/security/cve/CVE-2024-40989/" source="CVE"/>
		<reference ref_id="CVE-2024-40990" ref_url="https://www.suse.com/security/cve/CVE-2024-40990/" source="CVE"/>
		<reference ref_id="CVE-2024-40994" ref_url="https://www.suse.com/security/cve/CVE-2024-40994/" source="CVE"/>
		<reference ref_id="CVE-2024-40998" ref_url="https://www.suse.com/security/cve/CVE-2024-40998/" source="CVE"/>
		<reference ref_id="CVE-2024-40999" ref_url="https://www.suse.com/security/cve/CVE-2024-40999/" source="CVE"/>
		<reference ref_id="CVE-2024-41002" ref_url="https://www.suse.com/security/cve/CVE-2024-41002/" source="CVE"/>
		<reference ref_id="CVE-2024-41004" ref_url="https://www.suse.com/security/cve/CVE-2024-41004/" source="CVE"/>
		<reference ref_id="CVE-2024-41006" ref_url="https://www.suse.com/security/cve/CVE-2024-41006/" source="CVE"/>
		<reference ref_id="CVE-2024-41009" ref_url="https://www.suse.com/security/cve/CVE-2024-41009/" source="CVE"/>
		<reference ref_id="CVE-2024-41011" ref_url="https://www.suse.com/security/cve/CVE-2024-41011/" source="CVE"/>
		<reference ref_id="CVE-2024-41012" ref_url="https://www.suse.com/security/cve/CVE-2024-41012/" source="CVE"/>
		<reference ref_id="CVE-2024-41013" ref_url="https://www.suse.com/security/cve/CVE-2024-41013/" source="CVE"/>
		<reference ref_id="CVE-2024-41014" ref_url="https://www.suse.com/security/cve/CVE-2024-41014/" source="CVE"/>
		<reference ref_id="CVE-2024-41015" ref_url="https://www.suse.com/security/cve/CVE-2024-41015/" source="CVE"/>
		<reference ref_id="CVE-2024-41016" ref_url="https://www.suse.com/security/cve/CVE-2024-41016/" source="CVE"/>
		<reference ref_id="CVE-2024-41017" ref_url="https://www.suse.com/security/cve/CVE-2024-41017/" source="CVE"/>
		<reference ref_id="CVE-2024-41040" ref_url="https://www.suse.com/security/cve/CVE-2024-41040/" source="CVE"/>
		<reference ref_id="CVE-2024-41041" ref_url="https://www.suse.com/security/cve/CVE-2024-41041/" source="CVE"/>
		<reference ref_id="CVE-2024-41044" ref_url="https://www.suse.com/security/cve/CVE-2024-41044/" source="CVE"/>
		<reference ref_id="CVE-2024-41048" ref_url="https://www.suse.com/security/cve/CVE-2024-41048/" source="CVE"/>
		<reference ref_id="CVE-2024-41057" ref_url="https://www.suse.com/security/cve/CVE-2024-41057/" source="CVE"/>
		<reference ref_id="CVE-2024-41058" ref_url="https://www.suse.com/security/cve/CVE-2024-41058/" source="CVE"/>
		<reference ref_id="CVE-2024-41059" ref_url="https://www.suse.com/security/cve/CVE-2024-41059/" source="CVE"/>
		<reference ref_id="CVE-2024-41063" ref_url="https://www.suse.com/security/cve/CVE-2024-41063/" source="CVE"/>
		<reference ref_id="CVE-2024-41064" ref_url="https://www.suse.com/security/cve/CVE-2024-41064/" source="CVE"/>
		<reference ref_id="CVE-2024-41066" ref_url="https://www.suse.com/security/cve/CVE-2024-41066/" source="CVE"/>
		<reference ref_id="CVE-2024-41069" ref_url="https://www.suse.com/security/cve/CVE-2024-41069/" source="CVE"/>
		<reference ref_id="CVE-2024-41070" ref_url="https://www.suse.com/security/cve/CVE-2024-41070/" source="CVE"/>
		<reference ref_id="CVE-2024-41071" ref_url="https://www.suse.com/security/cve/CVE-2024-41071/" source="CVE"/>
		<reference ref_id="CVE-2024-41072" ref_url="https://www.suse.com/security/cve/CVE-2024-41072/" source="CVE"/>
		<reference ref_id="CVE-2024-41076" ref_url="https://www.suse.com/security/cve/CVE-2024-41076/" source="CVE"/>
		<reference ref_id="CVE-2024-41078" ref_url="https://www.suse.com/security/cve/CVE-2024-41078/" source="CVE"/>
		<reference ref_id="CVE-2024-41081" ref_url="https://www.suse.com/security/cve/CVE-2024-41081/" source="CVE"/>
		<reference ref_id="CVE-2024-41087" ref_url="https://www.suse.com/security/cve/CVE-2024-41087/" source="CVE"/>
		<reference ref_id="CVE-2024-41090" ref_url="https://www.suse.com/security/cve/CVE-2024-41090/" source="CVE"/>
		<reference ref_id="CVE-2024-41091" ref_url="https://www.suse.com/security/cve/CVE-2024-41091/" source="CVE"/>
		<reference ref_id="CVE-2024-42070" ref_url="https://www.suse.com/security/cve/CVE-2024-42070/" source="CVE"/>
		<reference ref_id="CVE-2024-42079" ref_url="https://www.suse.com/security/cve/CVE-2024-42079/" source="CVE"/>
		<reference ref_id="CVE-2024-42093" ref_url="https://www.suse.com/security/cve/CVE-2024-42093/" source="CVE"/>
		<reference ref_id="CVE-2024-42096" ref_url="https://www.suse.com/security/cve/CVE-2024-42096/" source="CVE"/>
		<reference ref_id="CVE-2024-42105" ref_url="https://www.suse.com/security/cve/CVE-2024-42105/" source="CVE"/>
		<reference ref_id="CVE-2024-42122" ref_url="https://www.suse.com/security/cve/CVE-2024-42122/" source="CVE"/>
		<reference ref_id="CVE-2024-42124" ref_url="https://www.suse.com/security/cve/CVE-2024-42124/" source="CVE"/>
		<reference ref_id="CVE-2024-42145" ref_url="https://www.suse.com/security/cve/CVE-2024-42145/" source="CVE"/>
		<reference ref_id="CVE-2024-42161" ref_url="https://www.suse.com/security/cve/CVE-2024-42161/" source="CVE"/>
		<reference ref_id="CVE-2024-42224" ref_url="https://www.suse.com/security/cve/CVE-2024-42224/" source="CVE"/>
		<reference ref_id="CVE-2024-42230" ref_url="https://www.suse.com/security/cve/CVE-2024-42230/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2021-47086: phonet/pep: refuse to enable an unbound pipe (bsc#1220952).
- CVE-2021-47103: net: sock: preserve kabi for sock (bsc#1221010).
- CVE-2021-47186: ipc: check for null after calling kmemdup (bsc#1222702).
- CVE-2021-47546: Kabi fix for ipv6: fix memory leak in fib6_rule_suppress (bsc#1225504).
- CVE-2021-47547: net: tulip: de4x5: fix the problem that the array 'lp-&gt;phy' may be out of bound (bsc#1225505).
- CVE-2021-47588: sit: do not call ipip6_dev_free() from sit_init_net() (bsc#1226568).
- CVE-2021-47590: mptcp: fix deadlock in __mptcp_push_pending() (bsc#1226565).
- CVE-2021-47591: mptcp: remove tcp ulp setsockopt support (bsc#1226570).
- CVE-2021-47593: mptcp: clear 'kern' flag from fallback sockets (bsc#1226551).
- CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1226574).
- CVE-2021-47599: btrfs: use latest_dev in btrfs_show_devname (bsc#1226571)
- CVE-2021-47606: net: netlink: af_netlink: Prevent empty skb by adding a check on len (bsc#1226555).
- CVE-2021-47623: powerpc/fixmap: Fix VM debug warning on unmap (bsc#1227919).
- CVE-2022-48785: ipv6: mcast: use rcu-safe version of ipv6_get_lladdr() (bsc#1227927)
- CVE-2022-48810: ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path (bsc#1227936).
- CVE-2022-48850: net-sysfs: add check for netdevice being present to speed_show (bsc#1228071)
- CVE-2022-48855: sctp: fix kernel-infoleak for SCTP sockets (bsc#1228003).
- CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138).
- CVE-2023-52573: net: rds: Fix possible NULL-pointer dereference (bsc#1220869)
- CVE-2023-52580: net/core: Fix ETH_P_1588 flow dissector (bsc#1220876).
- CVE-2023-52751: smb: client: fix use-after-free in smb2_query_info_compound() (bsc#1225489).
- CVE-2023-52775: net/smc: avoid data corruption caused by decline (bsc#1225088).
- CVE-2023-52812: drm/amd: check num of link levels when update pcie param (bsc#1225564).
- CVE-2023-52857: drm/mediatek: Fix coverity issue with unintentional integer overflow (bsc#1225581).
- CVE-2023-52863: hwmon: (axi-fan-control) Fix possible NULL pointer dereference (bsc#1225586).
- CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187).
- CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection dump (bsc#1220942).
- CVE-2024-26633: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() (bsc#1221647).
- CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656).
- CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding changes (bsc#1221659).
- CVE-2024-26641: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() (bsc#1221654).
- CVE-2024-26661: drm/amd/display: Add NULL test for 'timing generator' in (bsc#1222323)
- CVE-2024-26663: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (bsc#1222326).
- CVE-2024-26665: tunnels: fix out of bounds access when building IPv6 PMTU error (bsc#1222328).
- CVE-2024-26802: stmmac: Clear variable when destroying workqueue (bsc#1222799).
- CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node() (bsc#1223021).
- CVE-2024-26961: mac802154: fix llsec key resources release in mac802154_llsec_key_del (bsc#1223652).
- CVE-2024-27015: netfilter: flowtable: incorrect pppoe tuple (bsc#1223806).
- CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (bsc#1223813)
- CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (bsc#1223815)
- CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778)
- CVE-2024-27065: netfilter: nf_tables: do not compare internal table flags on updates (bsc#1223836).
- CVE-2024-27402: phonet/pep: fix racy skb_queue_empty() use (bsc#1224414).
- CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ (bsc#1222625).
- CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit (bsc#1224743).
- CVE-2024-35819: soc: fsl: qbman: Use raw spinlock for cgr_lock (bsc#1224683).
- CVE-2024-35837: net: mvpp2: clear BM pool before initialization (bsc#1224500).
- CVE-2024-35853: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash (bsc#1224604).
- CVE-2024-35889: idpf: fix kernel panic on unknown packet types (bsc#1224517).
- CVE-2024-35890: gro: fix ownership transfer (bsc#1224516).
- CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak (bsc#1224512)
- CVE-2024-35899: netfilter: nf_tables: flush pending destroy work before exit_net release (bsc#1224499)
- CVE-2024-35934: net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() (bsc#1224641)
- CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700)
- CVE-2024-35961: net/mlx5: Restore mistakenly dropped parts in register devlink flow (bsc#1224585).
- CVE-2024-35995: ACPI: CPPC: Fix access width used for PCC registers (bsc#1224557).
- CVE-2024-36000: mm/hugetlb: fix missing hugetlb_lock for resv uncharge (bsc#1224548).
- CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1224545)
- CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output() (bsc#1225711)
- CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (bsc#1225719).
- CVE-2024-36909: Drivers: hv: vmbus: Do not free ring buffers that couldn't be re-encrypted (bsc#1225744).
- CVE-2024-36910: uio_hv_generic: Do not free decrypted memory (bsc#1225717).
- CVE-2024-36911: hv_netvsc: Do not free decrypted memory (bsc#1225745).
- CVE-2024-36912: Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl (bsc#1225752).
- CVE-2024-36913: Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails (bsc#1225753).
- CVE-2024-36914: drm/amd/display: Skip on writeback when it's not applicable (bsc#1225757).
- CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload (bsc#1225767).
- CVE-2024-36923: fs/9p: fix uninitialized values during inode evict (bsc#1225815).
- CVE-2024-36939: nfs: Handle error of rpc_proc_register() in nfs_net_init() (bsc#1225838).
- CVE-2024-36946: phonet: fix rtm_phonet_notify() skb allocation (bsc#1225851).
- CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519).
- CVE-2024-38555: net/mlx5: Discard command completions in internal error (bsc#1226607).
- CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for ICMPv6 (bsc#1226783).
- CVE-2024-38570: gfs2: Fix potential glock use-after-free on unmount (bsc#1226775).
- CVE-2024-38586: r8169: Fix possible ring buffer corruption on fragmented Tx packets (bsc#1226750).
- CVE-2024-38598: md: fix resync softlockup when bitmap size is less than array size (bsc#1226757).
- CVE-2024-38628: usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind (bsc#1226911).
- CVE-2024-39276: ext4: fix mb_cache_entry's e_refcnt leak in ext4_xattr_block_cache_find() (bsc#1226993).
- CVE-2024-39371: io_uring: check for non-NULL file pointer in io_file_can_poll() (bsc#1226990).
- CVE-2024-39463: 9p: add missing locking around taking dentry fid list (bsc#1227090).
- CVE-2024-39472: xfs: fix log recovery buffer allocation for the legacy h_size fixup (bsc#1227432).
- CVE-2024-39482: bcache: fix variable length array abuse in btree_iter (bsc#1227447).
- CVE-2024-39487: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() (bsc#1227573)
- CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core (bsc#1227626).
- CVE-2024-39493: crypto: qat - Fix ADF_DEV_RESET_SYNC memory leak (bsc#1227620).
- CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716).
- CVE-2024-39497: drm/shmem-helper: Fix BUG_ON() on mmap(PROT_WRITE, MAP_PRIVATE) (bsc#1227722)
- CVE-2024-39502: ionic: fix use after netif_napi_del() (bsc#1227755).
- CVE-2024-39506: liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet (bsc#1227729).
- CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario (bsc#1227730).
- CVE-2024-39508: io_uring/io-wq: Use set_bit() and test_bit() at worker-&gt;flags (bsc#1227732).
- CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory (bsc#1227762).
- CVE-2024-40906: net/mlx5: Always stop health timer during driver removal (bsc#1227763).
- CVE-2024-40908: bpf: Set run context for rawtp test_run callback (bsc#1227783).
- CVE-2024-40909: bpf: Fix a potential use-after-free in bpf_link_free() (bsc#1227798).
- CVE-2024-40919: bnxt_en: Adjust logging of firmware messages in case of released token in __hwrm_send() (bsc#1227779).
- CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure (bsc#1227786).
- CVE-2024-40931: mptcp: ensure snd_una is properly initialized on connect (bsc#1227780).
- CVE-2024-40935: cachefiles: flush all requests after setting CACHEFILES_DEAD (bsc#1227797).
- CVE-2024-40937: gve: Clear napi-&gt;skb before dev_kfree_skb_any() (bsc#1227836).
- CVE-2024-40940: net/mlx5: Fix tainted pointer delete is case of flow rules creation fail (bsc#1227800).
- CVE-2024-40943: ocfs2: fix races between hole punching and AIO+DIO (bsc#1227849).
- CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() (bsc#1227806).
- CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808)
- CVE-2024-40958: netns: Make get_net_ns() handle zero refcount net (bsc#1227812).
- CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (bsc#1227884).
- CVE-2024-40960: ipv6: prevent possible NULL dereference in rt6_probe() (bsc#1227813).
- CVE-2024-40961: ipv6: prevent possible NULL deref in fib6_nh_init() (bsc#1227814).
- CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc (bsc#1227886).
- CVE-2024-40967: serial: imx: Introduce timeout when waiting on transmitter empty (bsc#1227891).
- CVE-2024-40970: Avoid hw_desc array overrun in dw-axi-dmac (bsc#1227899).
- CVE-2024-40972: ext4: fold quota accounting into ext4_xattr_inode_lookup_create() (bsc#1227910).
- CVE-2024-40977: wifi: mt76: mt7921s: fix potential hung tasks during chip recovery (bsc#1227950).
- CVE-2024-40982: ssb: Fix potential NULL pointer dereference in ssb_device_uevent() (bsc#1227865).
- CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor region on teardown (bsc#1227823).
- CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store (bsc#1227829).
- CVE-2024-40998: ext4: fix uninitialized ratelimit_state-&gt;lock access in __ext4_fill_super() (bsc#1227866).
- CVE-2024-40999: net: ena: Add validation for completion descriptors consistency (bsc#1227913).
- CVE-2024-41006: netrom: Fix a memory leak in nr_heartbeat_expiry() (bsc#1227862).
- CVE-2024-41009: selftests/bpf: Add more ring buffer test coverage (bsc#1228020).
- CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race is detected (bsc#1228247).
- CVE-2024-41013: xfs: do not walk off the end of a directory data block (bsc#1228405).
- CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data (bsc#1228408).
- CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry() (bsc#1228409).
- CVE-2024-41016: ocfs2: add bounds checking to ocfs2_xattr_find_entry() (bsc#1228410).
- CVE-2024-41017: jfs: do not walk off the end of ealist (bsc#1228403).
- CVE-2024-41040: net/sched: Fix UAF when resolving a clash (bsc#1228518)
- CVE-2024-41041: udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port() (bsc#1228520)
- CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets (bsc#1228530).
- CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565)
- CVE-2024-41057: cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() (bsc#1228462).
- CVE-2024-41058: cachefiles: fix slab-use-after-free in fscache_withdraw_volume() (bsc#1228459).
- CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).
- CVE-2024-41063: Bluetooth: hci_core: cancel all works upon hci_unregister_dev() (bsc#1228580)
- CVE-2024-41064: powerpc/eeh: avoid possible crash when edev-&gt;pdev changes (bsc#1228599).
- CVE-2024-41066: ibmvnic: Add tx check to prevent skb leak (bsc#1228640).
- CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).
- CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() (bsc#1228581).
- CVE-2024-41071: wifi: mac80211: Avoid address calculations via out of bounds array indexing (bsc#1228625).
- CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable failure (bsc#1228655).
- CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617)
- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
- CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327).
- CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (bsc#1228470)
- CVE-2024-42079: gfs2: Fix NULL pointer dereference in gfs2_log_flush (bsc#1228672).
- CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680).
- CVE-2024-42096: x86: stop playing stack games in profile_pc() (bsc#1228633).
- CVE-2024-42122: drm/amd/display: Add NULL pointer check for kzalloc (bsc#1228591)
- CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible (bsc#1228705)
- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743)
- CVE-2024-42161: bpf: Avoid uninitialized value in BPF_CORE_READ_BITFIELD (bsc#1228756).
- CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list (bsc#1228723)
- CVE-2024-42230: powerpc/pseries: Fix scv instruction crash with kexec (bsc#1194869).

The following non-security bugs were fixed:

- ACPI: EC: Abort address space access upon error (stable-fixes).
- ACPI: EC: Avoid returning AE_OK on errors in address space handler (stable-fixes).
- ACPI: processor_idle: Fix invalid comparison with insertion sort for latency (git-fixes).
- ACPI: video: Add backlight=native quirk for Lenovo Slim 7 16ARH7 (stable-fixes).
- ACPI: x86: Force StorageD3Enable on more products (stable-fixes).
- ACPI: x86: utils: Add Picasso to the list for forcing StorageD3Enable (stable-fixes).
- ALSA: dmaengine_pcm: terminate dmaengine before synchronize (stable-fixes).
- ALSA: dmaengine: Synchronize dma channel after drop() (stable-fixes).
- ALSA: emux: improve patch ioctl data validation (stable-fixes).
- ALSA: hda: conexant: Fix headset auto detect fail in the polling mode (git-fixes).
- ALSA: hda/realtek: Add more codec ID to no shutup pins list (stable-fixes).
- ALSA: hda/realtek: add quirk for Clevo V5[46]0TU (stable-fixes).
- ALSA: hda/realtek: Enable headset mic of JP-IK LEAP W502 with ALC897 (stable-fixes).
- ALSA: hda/realtek: Enable headset mic on Positivo SU C1400 (stable-fixes).
- ALSA: hda/realtek: Enable Mute LED on HP 250 G7 (stable-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs do not work for EliteBook 645/665 G11 (stable-fixes).
- ALSA: hda/realtek: Fix the speaker output on Samsung Galaxy Book Pro 360 (stable-fixes).
- ALSA: hda/realtek: Limit mic boost on VAIO PRO PX (stable-fixes).
- ALSA: hda/relatek: Enable Mute LED on HP Laptop 15-gw0xxx (stable-fixes).
- ALSA: pcm_dmaengine: Do not synchronize DMA channel when DMA is paused (git-fixes).
- ALSA: usb-audio: Add a quirk for Sonix HD USB Camera (stable-fixes).
- ALSA: usb-audio: Correct surround channels in UAC1 channel map (git-fixes).
- ALSA: usb-audio: Fix microphone sound on HD webcam (stable-fixes).
- ALSA: usb-audio: Move HD Webcam quirk to the right place (git-fixes).
- arm64: dts: allwinner: Pine H64: correctly remove reg_gmac_3v3 (git-fixes)
- arm64: dts: hi3798cv200: fix the size of GICR (git-fixes)
- arm64: dts: imx8qm-mek: fix gpio number for reg_usdhc2_vmmc (git-fixes)
- arm64: dts: microchip: sparx5: fix mdio reg (git-fixes)
- arm64: dts: rockchip: Add enable-strobe-pulldown to emmc phy on ROCK (git-fixes)
- arm64: dts: rockchip: Add sound-dai-cells for RK3368 (git-fixes)
- arm64: dts: rockchip: fix PMIC interrupt pin on ROCK Pi E (git-fixes)
- arm64/io: add constant-argument check (bsc#1226502 git-fixes)
- arm64/io: Provide a WC friendly __iowriteXX_copy() (bsc#1226502)
- arm64: tegra: Correct Tegra132 I2C alias (git-fixes)
- ASoC: amd: Adjust error handling in case of absent codec device (git-fixes).
- ASoC: max98088: Check for clk_prepare_enable() error (git-fixes).
- ASoC: ti: davinci-mcasp: Set min period size using FIFO config (stable-fixes).
- ASoC: ti: omap-hdmi: Fix too long driver name (stable-fixes).
- batman-adv: bypass empty buckets in batadv_purge_orig_ref() (stable-fixes).
- blk-cgroup: dropping parent refcount after pd_free_fn() is done (bsc#1224573).
- block: do not add partitions if GD_SUPPRESS_PART_SCAN is set (bsc#1227162).
- block, loop: support partitions without scanning (bsc#1227162).
- Bluetooth: ath3k: Fix multiple issues reported by checkpatch.pl (stable-fixes).
- Bluetooth: btqca: use le32_to_cpu for ver.soc_id (stable-fixes).
- Bluetooth: hci_core: cancel all works upon hci_unregister_dev() (stable-fixes).
- Bluetooth: hci_qca: mark OF related data as maybe unused (stable-fixes).
- Bluetooth: hci_sync: Fix suspending with wrong filter policy (git-fixes).
- Bluetooth: qca: Fix BT enable failure again for QCA6390 after warm reboot (git-fixes).
- bnxt_re: Fix imm_data endianness (git-fixes)
- bpf: aggressively forget precise markings during state checkpointing (bsc#1225903).
- bpf: allow precision tracking for programs with subprogs (bsc#1225903).
- bpf: check bpf_func_state-&gt;callback_depth when pruning states (bsc#1225903).
- bpf: clean up visit_insn()'s instruction processing (bsc#1225903).
- bpf: correct loop detection for iterators convergence (bsc#1225903).
- bpf: encapsulate precision backtracking bookkeeping (bsc#1225903).
- bpf: ensure state checkpointing at iter_next() call sites (bsc#1225903).
- bpf: exact states comparison for iterator convergence checks (bsc#1225903).
- bpf: extract __check_reg_arg() utility function (bsc#1225903).
- bpf: extract same_callsites() as utility function (bsc#1225903).
- bpf: extract setup_func_entry() utility function (bsc#1225903).
- bpf: fix calculation of subseq_idx during precision backtracking (bsc#1225903).
- bpf: fix mark_all_scalars_precise use in mark_chain_precision (bsc#1225903).
- bpf: Fix memory leaks in __check_func_call (bsc#1225903).
- bpf: fix propagate_precision() logic for inner frames (bsc#1225903).
- bpf: fix regs_exact() logic in regsafe() to remap IDs correctly (bsc#1225903).
- bpf: Fix to preserve reg parent/live fields when copying range info (bsc#1225903).
- bpf: generalize MAYBE_NULL vs non-MAYBE_NULL rule (bsc#1225903).
- bpf: improve precision backtrack logging (bsc#1225903).
- bpf: Improve verifier u32 scalar equality checking (bsc#1225903).
- bpf: keep track of max number of bpf_loop callback iterations (bsc#1225903).
- bpf: maintain bitmasks across all active frames in __mark_chain_precision (bsc#1225903).
- bpf: mark relevant stack slots scratched for register read instructions (bsc#1225903).
- bpf: move explored_state() closer to the beginning of verifier.c (bsc#1225903).
- bpf: perform byte-by-byte comparison only when necessary in regsafe() (bsc#1225903).
- bpf: print full verifier states on infinite loop detection (bsc#1225903).
- bpf: regsafe() must not skip check_ids() (bsc#1225903).
- bpf: reject non-exact register type matches in regsafe() (bsc#1225903).
- bpf: Remove unused insn_cnt argument from visit_[func_call_]insn() (bsc#1225903).
- bpf: reorganize struct bpf_reg_state fields (bsc#1225903).
- bpf: Skip invalid kfunc call in backtrack_insn (bsc#1225903).
- bpf: states_equal() must build idmap for all function frames (bsc#1225903).
- bpf: stop setting precise in current state (bsc#1225903).
- bpf: support precision propagation in the presence of subprogs (bsc#1225903).
- bpf: take into account liveness when propagating precision (bsc#1225903).
- bpf: teach refsafe() to take into account ID remapping (bsc#1225903).
- bpf: unconditionally reset backtrack_state masks on global func exit (bsc#1225903).
- bpf: use check_ids() for active_lock comparison (bsc#1225903).
- bpf: Use scalar ids in mark_chain_precision() (bsc#1225903).
- bpf: verify callbacks as if they are called unknown number of times (bsc#1225903).
- bpf: Verify scalar ids mapping in regsafe() using check_ids() (bsc#1225903).
- bpf: widening for callback iterators (bsc#1225903).
- btrfs: add device major-minor info in the struct btrfs_device (bsc#1227162).
- btrfs: harden identification of a stale device (bsc#1227162).
- btrfs: match stale devices by dev_t (bsc#1227162).
- btrfs: remove the cross file system checks from remap (bsc#1227157).
- btrfs: use dev_t to match device in device_matched (bsc#1227162).
- btrfs: validate device maj:min during open (bsc#1227162).
- bytcr_rt5640 : inverse jack detect for Archos 101 cesium (stable-fixes).
- cachefiles: add output string to cachefiles_obj_[get|put]_ondemand_fd (git-fixes).
- can: kvaser_usb: Explicitly initialize family in leafimx driver_info struct (git-fixes).
- can: kvaser_usb: fix return value for hif_usb_send_regout (stable-fixes).
- ceph: fix incorrect kmalloc size of pagevec mempool (bsc#1228418).
- cgroup/cpuset: Prevent UAF in proc_cpuset_show() (bsc#1228801).
- crypto: aead,cipher - zeroize key buffer after use (stable-fixes).
- crypto: ecdh - explicitly zeroize private_key (stable-fixes).
- crypto: ecdsa - Fix the public key format description (git-fixes).
- crypto: hisilicon/sec - Fix memory leak for sec resource release (stable-fixes).
- csky: ftrace: Drop duplicate implementation of arch_check_ftrace_location() (git-fixes).
- decompress_bunzip2: fix rare decompression failure (git-fixes).
- devres: Fix devm_krealloc() wasting memory (git-fixes).
- devres: Fix memory leakage caused by driver API devm_free_percpu() (git-fixes).
- dma: fix call order in dmam_free_coherent (git-fixes).
- docs: crypto: async-tx-api: fix broken code example (git-fixes).
- docs: Fix formatting of literal sections in fanotify docs (stable-fixes).
- drm/amd/amdgpu: Fix style errors in amdgpu_drv.c &amp; amdgpu_device.c (stable-fixes).
- drm/amd/display: Account for cursor prefetch BW in DML1 mode support (stable-fixes).
- drm/amd/display: Check for NULL pointer (stable-fixes).
- drm/amd/display: Check index msg_id before read or write (stable-fixes).
- drm/amd/display: Check pipe offset before setting vblank (stable-fixes).
- drm/amd/display: Skip finding free audio for unknown engine_id (stable-fixes).
- drm/amdgpu/atomfirmware: fix parsing of vram_info (stable-fixes).
- drm/amdgpu/atomfirmware: silence UBSAN warning (stable-fixes).
- drm/amdgpu: avoid using null object of framebuffer (stable-fixes).
- drm/amdgpu: Check if NBIO funcs are NULL in amdgpu_device_baco_exit (git-fixes).
- drm/amdgpu: Fix pci state save during mode-1 reset (git-fixes).
- drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq() (git-fixes).
- drm/amdgpu: fix uninitialized scalar variable warning (stable-fixes).
- drm/amdgpu: Fix uninitialized variable warnings (stable-fixes).
- drm/amdgpu: Initialize timestamp for some legacy SOCs (stable-fixes).
- drm/amdgpu: Remove GC HW IP 9.3.0 from noretry=1 (git-fixes).
- drm/amd/pm: Fix aldebaran pcie speed reporting (git-fixes).
- drm/amd/pm: remove logically dead code for renoir (git-fixes).
- drm/dp_mst: Fix all mstb marked as not probed after suspend/resume (git-fixes).
- drm/etnaviv: do not block scheduler when GPU is still active (stable-fixes).
- drm/etnaviv: fix DMA direction handling for cached RW buffers (git-fixes).
- drm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes (git-fixes).
- drm/gma500: fix null pointer dereference in psb_intel_lvds_get_modes (git-fixes).
- drm/i915/gt: Do not consider preemption during execlists_dequeue for gen8 (git-fixes).
- drm/lima: fix shared irq handling on driver remove (stable-fixes).
- drm/lima: Mark simple_ondemand governor as softdep (git-fixes).
- drm/mediatek: Add OVL compatible name for MT8195 (git-fixes).
- drm/meson: fix canvas release in bind function (git-fixes).
- drm/mgag200: Bind I2C lifetime to DRM device (git-fixes).
- drm/mgag200: Set DDC timeout in milliseconds (git-fixes).
- drm/mipi-dsi: Fix mipi_dsi_dcs_write_seq() macro definition format (stable-fixes).
- drm/mipi-dsi: Fix theoretical int overflow in mipi_dsi_dcs_write_seq() (git-fixes).
- drm/msm/dpu: drop validity checks for clear_pending_flush() ctl op (git-fixes).
- drm/msm/mdp5: Remove MDP_CAP_SRC_SPLIT from msm8x53_config (git-fixes).
- drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes (stable-fixes).
- drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes (stable-fixes).
- drm/nouveau: fix null pointer dereference in nouveau_connector_get_modes (git-fixes).
- drm/nouveau: prime: fix refcount underflow (git-fixes).
- drm/panel: boe-tv101wum-nl6: Check for errors on the NOP in prepare() (git-fixes).
- drm/panel: boe-tv101wum-nl6: If prepare fails, disable GPIO before regulators (git-fixes).
- drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep (stable-fixes).
- drm: panel-orientation-quirks: Add quirk for Valve Galileo (stable-fixes).
- drm/panfrost: Mark simple_ondemand governor as softdep (git-fixes).
- drm/qxl: Add check for drm_cvt_mode (git-fixes).
- drm/radeon: check bo_va-&gt;bo is non-NULL before using it (stable-fixes).
- drm/radeon/radeon_display: Decrease the size of allocated memory (stable-fixes).
- drm/vmwgfx: Fix a deadlock in dma buf fence polling (git-fixes).
- drm/vmwgfx: Fix missing HYPERVISOR_GUEST dependency (stable-fixes).
- drm/vmwgfx: Fix overlay when using Screen Targets (git-fixes).
- eeprom: digsy_mtc: Fix 93xx46 driver probe failure (git-fixes).
- exfat: check if cluster num is valid (git-fixes).
- exfat: simplify is_valid_cluster() (git-fixes).
- filelock: add a new locks_inode_context accessor function (git-fixes).
- firmware: cs_dsp: Fix overflow checking of wmfw header (git-fixes).
- firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers (git-fixes).
- firmware: cs_dsp: Return error if block header overflows file (git-fixes).
- firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files (git-fixes).
- firmware: cs_dsp: Validate payload length before processing block (git-fixes).
- firmware: dmi: Stop decoding on broken entry (stable-fixes).
- firmware: turris-mox-rwtm: Do not complete if there are no waiters (git-fixes).
- firmware: turris-mox-rwtm: Fix checking return value of wait_for_completion_timeout() (git-fixes).
- firmware: turris-mox-rwtm: Initialize completion before mailbox (git-fixes).
- fix build warning
- fs: allow cross-vfsmount reflink/dedupe (bsc#1227157).
- ftrace: Fix possible use-after-free issue in ftrace_location() (git-fixes).
- fuse: verify {g,u}id mount options correctly (bsc#1228191).
- gpio: mc33880: Convert comma to semicolon (git-fixes).
- hfsplus: fix to avoid false alarm of circular locking (git-fixes).
- hfsplus: fix uninit-value in copy_name (git-fixes).
- HID: Add quirk for Logitech Casa touchpad (stable-fixes).
- HID: wacom: Modify pen IDs (git-fixes).
- hpet: Support 32-bit userspace (git-fixes).
- hwmon: (adt7475) Fix default duty on fan is disabled (git-fixes).
- hwmon: (max6697) Fix swapped temp{1,8} critical alarms (git-fixes).
- hwmon: (max6697) Fix underflow when writing limit attributes (git-fixes).
- i2c: mark HostNotify target address as used (git-fixes).
- i2c: rcar: bring hardware to known state when probing (git-fixes).
- i2c: tegra: Fix failure during probe deferral cleanup (git-fixes)
- i2c: tegra: Share same DMA channel for RX and TX (bsc#1227661)
- i2c: testunit: avoid re-issued work after read message (git-fixes).
- i2c: testunit: correct Kconfig description (git-fixes).
- Input: elan_i2c - do not leave interrupt disabled on suspend failure (git-fixes).
- Input: elantech - fix touchpad state on resume for Lenovo N24 (stable-fixes).
- Input: ff-core - prefer struct_size over open coded arithmetic (stable-fixes).
- Input: qt1050 - handle CHIP_ID reading error (git-fixes).
- Input: silead - Always support 10 fingers (stable-fixes).
- intel_th: pci: Add Granite Rapids SOC support (stable-fixes).
- intel_th: pci: Add Granite Rapids support (stable-fixes).
- intel_th: pci: Add Lunar Lake support (stable-fixes).
- intel_th: pci: Add Meteor Lake-S support (stable-fixes).
- intel_th: pci: Add Sapphire Rapids SOC support (stable-fixes).
- iommu/arm-smmu-v3: Free MSIs in case of ENOMEM (git-fixes).
- ionic: clean interrupt before enabling queue to avoid credit race (git-fixes).
- jffs2: Fix potential illegal address access in jffs2_free_inode (git-fixes).
- jfs: Fix array-index-out-of-bounds in diFree (git-fixes).
- jfs: xattr: fix buffer overflow for invalid xattr (bsc#1227383).
- kABI: bpf: bpf_reg_state reorganization kABI workaround (bsc#1225903).
- kABI: bpf: callback fixes kABI workaround (bsc#1225903).
- kABI: bpf: struct bpf_{idmap,idset} kABI workaround (bsc#1225903).
- kABI: bpf: tmp_str_buf kABI workaround (bsc#1225903).
- kABI: rtas: Workaround false positive due to lost definition (bsc#1227487).
- kabi/severities: ignore kABI for FireWire sound local symbols (bsc#1208783)
- kabi/severities: Ignore tpm_tis_core_init (bsc#1082555).
- kabi/severity: add nvme common code The nvme common code is also allowed to change the data structures, there are only internal users.
- kabi: Use __iowriteXX_copy_inlined for in-kernel modules (bsc#1226502)
- kernel-binary: vdso: Own module_dir
- kernel/sched: Remove dl_boosted flag comment (git fixes (sched)).
- knfsd: LOOKUP can return an illegal error value (git-fixes).
- kobject_uevent: Fix OOB access within zap_modalias_env() (git-fixes).
- kprobes: Make arch_check_ftrace_location static (git-fixes).
- KVM: nVMX: Clear EXIT_QUALIFICATION when injecting an EPT Misconfig (git-fixes).
- KVM: PPC: Book3S HV: Fix 'rm_exit' entry in debugfs timings (bsc#1194869).
- KVM: PPC: Book3S HV: Fix the set_one_reg for MMCR3 (bsc#1194869).
- KVM: PPC: Book3S HV Nested: L2 LPCR should inherit L1 LPES setting (bsc#1194869).
- KVM: PPC: Book3S HV: remove extraneous asterisk from rm_host_ipi_action() comment (bsc#1194869).
- KVM: PPC: Book3S: Suppress failed alloc warning in H_COPY_TOFROM_GUEST (bsc#1194869).
- KVM: PPC: Book3S: Suppress warnings when allocating too big memory slots (bsc#1194869).
- KVM: s390: fix LPSWEY handling (bsc#1227635 git-fixes).
- KVM: SVM: Process ICR on AVIC IPI delivery failure due to invalid target (git-fixes).
- KVM: VMX: Report up-to-date exit qualification to userspace (git-fixes).
- KVM: x86: Add IBPB_BRTYPE support (bsc#1228079).
- KVM: x86: Always sync PIR to IRR prior to scanning I/O APIC routes (git-fixes).
- KVM: x86: Bail from kvm_recalculate_phys_map() if x2APIC ID is out-of-bounds (git-fixes).
- KVM: x86: Disable APIC logical map if logical ID covers multiple MDAs (git-fixes).
- KVM: x86: Disable APIC logical map if vCPUs are aliased in logical mode (git-fixes).
- KVM: x86: Do not advertise guest.MAXPHYADDR as host.MAXPHYADDR in CPUID (git-fixes).
- KVM: x86: Explicitly skip optimized logical map setup if vCPU's LDR==0 (git-fixes).
- KVM: x86: Explicitly track all possibilities for APIC map's logical modes (git-fixes).
- KVM: x86: Fix broken debugregs ABI for 32 bit kernels (git-fixes).
- KVM: x86: Fix KVM_GET_MSRS stack info leak (git-fixes).
- KVM: x86: Honor architectural behavior for aliased 8-bit APIC IDs (git-fixes).
- KVM: x86: Purge 'highest ISR' cache when updating APICv state (git-fixes).
- KVM: x86: Save/restore all NMIs when multiple NMIs are pending (git-fixes).
- KVM: x86: Skip redundant x2APIC logical mode optimized cluster setup (git-fixes).
- leds: ss4200: Convert PCIBIOS_* return codes to errnos (git-fixes).
- leds: triggers: Flush pending brightness before activating trigger (git-fixes).
- leds: trigger: Unregister sysfs attributes before calling deactivate() (git-fixes).
- libceph: fix race between delayed_work() and ceph_monc_stop() (bsc#1228190).
- lib: objagg: Fix general protection fault (git-fixes).
- lib: objagg: Fix spelling (git-fixes).
- lib: test_objagg: Fix spelling (git-fixes).
- lockd: set missing fl_flags field when retrieving args (git-fixes).
- lockd: use locks_inode_context helper (git-fixes).
- Make AMD_HSMP=m and mark it unsupported in supported.conf (jsc#PED-8582)
- media: dvb: as102-fe: Fix as10x_register_addr packing (stable-fixes).
- media: dvbdev: Initialize sbuf (stable-fixes).
- media: dvb-frontends: tda10048: Fix integer overflow (stable-fixes).
- media: dvb-frontends: tda18271c2dd: Remove casting during div (stable-fixes).
- media: dvb-usb: dib0700_devices: Add missing release_firmware() (stable-fixes).
- media: dvb-usb: Fix unexpected infinite loop in dvb_usb_read_remote_control() (git-fixes).
- media: dw2102: Do not translate i2c read into write (stable-fixes).
- media: dw2102: fix a potential buffer overflow (git-fixes).
- media: imon: Fix race getting ictx-&gt;lock (git-fixes).
- media: s2255: Use refcount_t instead of atomic_t for num_channels (stable-fixes).
- media: uvcvideo: Fix integer overflow calculating timestamp (git-fixes).
- media: uvcvideo: Override default flags (git-fixes).
- media: venus: fix use after free in vdec_close (git-fixes).
- media: venus: flush all buffers in output plane streamoff (git-fixes).
- mei: demote client disconnect warning on suspend to debug (stable-fixes).
- mfd: omap-usb-tll: Use struct_size to allocate tll (git-fixes).
- mtd: partitions: redboot: Added conversion of operands to a larger type (stable-fixes).
- net/dcb: check for detached device before executing callbacks (bsc#1215587).
- netfilter: conntrack: ignore overly delayed tcp packets (bsc#1223180).
- netfilter: conntrack: prepare tcp_in_window for ternary return value (bsc#1223180).
- netfilter: conntrack: remove pr_debug callsites from tcp tracker (bsc#1223180).
- netfilter: conntrack: work around exceeded receive window (bsc#1223180).
- netfs, fscache: export fscache_put_volume() and add fscache_try_get_volume() (bsc#1228459 bsc#1228462).
- net: mana: Fix possible double free in error handling path (git-fixes).
- net: mana: Fix the extra HZ in mana_hwc_send_request (git-fixes).
- net: usb: qmi_wwan: add Telit FN912 compositions (git-fixes).
- net: usb: sr9700: fix uninitialized variable use in sr_mdio_read (git-fixes).
- nfc/nci: Add the inconsistency check between the input data length and count (stable-fixes).
- NFSD: Add an nfsd_file_fsync tracepoint (git-fixes).
- NFSD: Add an NFSD_FILE_GC flag to enable nfsd_file garbage collection (git-fixes).
- nfsd: Add errno mapping for EREMOTEIO (git-fixes).
- NFSD: Add nfsd_file_lru_dispose_list() helper (git-fixes).
- nfsd: add some comments to nfsd_file_do_acquire (git-fixes).
- nfsd: allow nfsd_file_get to sanely handle a NULL pointer (git-fixes).
- nfsd: allow reaping files still under writeback (git-fixes).
- NFSD: Avoid calling fh_drop_write() twice in do_nfsd_create() (git-fixes).
- NFSD: Clean up nfsd3_proc_create() (git-fixes).
- nfsd: Clean up nfsd_file_put() (git-fixes).
- NFSD: Clean up nfsd_open_verified() (git-fixes).
- NFSD: Clean up unused code after rhashtable conversion (git-fixes).
- NFSD: Convert filecache to rhltable (git-fixes).
- NFSD: Convert the filecache to use rhashtable (git-fixes).
- NFSD: De-duplicate hash bucket indexing (git-fixes).
- nfsd: do not free files unconditionally in __nfsd_file_cache_purge (git-fixes).
- nfsd: do not fsync nfsd_files on last close (git-fixes).
- nfsd: do not hand out delegation on setuid files being opened for write (git-fixes).
- nfsd: do not kill nfsd_files because of lease break error (git-fixes).
- nfsd: Do not leave work of closing files to a work queue (bsc#1228140).
- nfsd: do not take/put an extra reference when putting a file (git-fixes).
- NFSD enforce filehandle check for source file in COPY (git-fixes).
- NFSD: Ensure nf_inode is never dereferenced (git-fixes).
- nfsd: fix handling of cached open files in nfsd4_open codepath (git-fixes).
- NFSD: Fix licensing header in filecache.c (git-fixes).
- nfsd: fix net-namespace logic in __nfsd_file_cache_purge (git-fixes).
- nfsd: fix nfsd_file_unhash_and_dispose (git-fixes).
- NFSD: Fix potential use-after-free in nfsd_file_put() (git-fixes).
- NFSD: Fix problem of COMMIT and NFS4ERR_DELAY in infinite loop (git-fixes).
- NFSD: Fix the filecache LRU shrinker (git-fixes).
- nfsd: fix up the filecache laundrette scheduling (git-fixes).
- nfsd: fix use-after-free in nfsd_file_do_acquire tracepoint (git-fixes).
- NFSD: Flesh out a documenting comment for filecache.c (git-fixes).
- NFSD: handle errors better in write_ports_addfd() (git-fixes).
- NFSD: Instantiate a struct file when creating a regular NFSv4 file (git-fixes).
- NFSD: Leave open files out of the filecache LRU (git-fixes).
- nfsd: map EBADF (git-fixes).
- NFSD: Move nfsd_file_trace_alloc() tracepoint (git-fixes).
- NFSD: nfsd_file_hash_remove can compute hashval (git-fixes).
- nfsd: NFSD_FILE_KEY_INODE only needs to find GC'ed entries (git-fixes).
- NFSD: nfsd_file_put() can sleep (git-fixes).
- NFSD: nfsd_file_unhash can compute hashval from nf-&gt;nf_inode (git-fixes).
- NFSD: No longer record nf_hashval in the trace log (git-fixes).
- NFSD: Pass the target nfsd_file to nfsd_commit() (git-fixes).
- nfsd: put the export reference in nfsd4_verify_deleg_dentry (git-fixes).
- NFSD: Record number of flush calls (git-fixes).
- NFSD: Refactor nfsd_create_setattr() (git-fixes).
- NFSD: Refactor __nfsd_file_close_inode() (git-fixes).
- NFSD: Refactor nfsd_file_gc() (git-fixes).
- NFSD: Refactor nfsd_file_lru_scan() (git-fixes).
- NFSD: Refactor NFSv3 CREATE (git-fixes).
- NFSD: Refactor NFSv4 OPEN(CREATE) (git-fixes).
- NFSD: Remove do_nfsd_create() (git-fixes).
- NFSD: Remove lockdep assertion from unhash_and_release_locked() (git-fixes).
- NFSD: Remove nfsd_file::nf_hashval (git-fixes).
- nfsd: remove the pages_flushed statistic from filecache (git-fixes).
- nfsd: reorganize filecache.c (git-fixes).
- NFSD: Replace the 'init once' mechanism (git-fixes).
- NFSD: Report average age of filecache items (git-fixes).
- NFSD: Report count of calls to nfsd_file_acquire() (git-fixes).
- NFSD: Report count of freed filecache items (git-fixes).
- NFSD: Report filecache LRU size (git-fixes).
- NFSD: Report the number of items evicted by the LRU walk (git-fixes).
- nfsd: Retry once in nfsd_open on an -EOPENSTALE return (git-fixes).
- nfsd: rework hashtable handling in nfsd_do_file_acquire (git-fixes).
- nfsd: rework refcounting in filecache (git-fixes).
- NFSD: Separate tracepoints for acquire and create (git-fixes).
- NFSD: Set up an rhashtable for the filecache (git-fixes).
- nfsd: silence extraneous printk on nfsd.ko insertion (git-fixes).
- NFSD: simplify per-net file cache management (git-fixes).
- nfsd: simplify test_bit return in NFSD_FILE_KEY_FULL comparator (git-fixes).
- nfsd: simplify the delayed disposal list code (git-fixes).
- NFSD: Trace filecache LRU activity (git-fixes).
- NFSD: Trace filecache opens (git-fixes).
- NFSD: verify the opened dentry after setting a delegation (git-fixes).
- NFSD: WARN when freeing an item still linked via nf_lru (git-fixes).
- NFSD: Write verifier might go backwards (git-fixes).
- NFSD: Zero counters when the filecache is re-initialized (git-fixes).
- NFS: Fix READ_PLUS when server does not support OP_READ_PLUS (git-fixes).
- nfs: fix undefined behavior in nfs_block_bits() (git-fixes).
- nfs: keep server info for remounts (git-fixes).
- nfs: Leave pages in the pagecache if readpage failed (git-fixes).
- NFSv4: Fixup smatch warning for ambiguous return (git-fixes).
- NFSv4.x: by default serialize open/close operations (bsc#1223863 bsc#1227362)
- nilfs2: add missing check for inode numbers on directory entries (git-fixes).
- nilfs2: add missing check for inode numbers on directory entries (stable-fixes).
- nilfs2: avoid undefined behavior in nilfs_cnt32_ge macro (git-fixes).
- nilfs2: convert persistent object allocator to use kmap_local (git-fixes).
- nilfs2: fix incorrect inode allocation from reserved inodes (git-fixes).
- nilfs2: fix inode number range checks (git-fixes).
- nilfs2: fix inode number range checks (stable-fixes).
- nvme: adjust multiples of NVME_CTRL_PAGE_SIZE in offset (git-fixes).
- nvme-auth: alloc nvme_dhchap_key as single buffer (git-fixes).
- nvme-auth: allow mixing of secret and hash lengths (git-fixes).
- nvme-auth: use transformed key size to create resp (git-fixes).
- nvme: avoid double free special payload (git-fixes).
- nvme: ensure reset state check ordering (bsc#1215492).
- nvme: fixup comment for nvme RDMA Provider Type (git-fixes).
- nvme-multipath: find NUMA path only for online numa-node (git-fixes).
- nvme-pci: add missing condition check for existence of mapped data (git-fixes).
- nvme-pci: Fix the instructions for disabling power management (git-fixes).
- nvmet: always initialize cqe.result (git-fixes).
- nvmet-auth: fix nvmet_auth hash error handling (git-fixes).
- nvmet: fix a possible leak when destroy a ctrl during qp establishment (git-fixes).
- nvme: use ctrl state accessor (bsc#1215492).
- ocfs2: fix DIO failure due to insufficient transaction credits (bsc#1216834).
- ocfs2: remove redundant assignment to variable free_space (bsc#1228409).
- ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410).
- orangefs: fix out-of-bounds fsid access (git-fixes).
- PCI: Add PCI_ERROR_RESPONSE and related definitions (stable-fixes).
- PCI/DPC: Fix use-after-free on concurrent DPC and hot-removal (git-fixes).
- PCI: Extend ACS configurability (bsc#1228090).
- PCI: Fix resource double counting on remove &amp; rescan (git-fixes).
- PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git-fixes).
- PCI: Introduce cleanup helpers for device reference counts and locks (git-fixes).
- PCI: Introduce cleanup helpers for device reference counts and locks (stable-fixes).
- PCI: keystone: Do not enable BAR 0 for AM654x (git-fixes).
- PCI: keystone: Fix NULL pointer dereference in case of DT error in ks_pcie_setup_rc_app_regs() (git-fixes).
- PCI: keystone: Relocate ks_pcie_set/clear_dbi_mode() (git-fixes).
- PCI/PM: Avoid D3cold for HP Pavilion 17 PC/1972 PCIe Ports (git-fixes).
- PCI/PM: Avoid D3cold for HP Pavilion 17 PC/1972 PCIe Ports (stable-fixes).
- PCI: rockchip: Use GPIOD_OUT_LOW flag while requesting ep_gpio (git-fixes).
- PCI: tegra194: Set EP alignment restriction for inbound ATU (git-fixes).
- pinctrl: core: fix possible memory leak when pinctrl_enable() fails (git-fixes).
- pinctrl: freescale: mxs: Fix refcount of child (git-fixes).
- pinctrl: single: fix possible memory leak when pinctrl_enable() fails (git-fixes).
- pinctrl: ti: ti-iodelay: fix possible memory leak when pinctrl_enable() fails (git-fixes).
- platform/chrome: cros_ec_debugfs: fix wrong EC message version (git-fixes).
- platform/chrome: cros_ec_proto: Lock device when updating MKBP version (git-fixes).
- platform/x86: dell-smbios-base: Use sysfs_emit() (stable-fixes).
- platform/x86: dell-smbios: Fix wrong token data in sysfs (git-fixes).
- platform/x86: lg-laptop: Change ACPI device id (stable-fixes).
- platform/x86: lg-laptop: Remove LGEX0815 hotkey handling (stable-fixes).
- platform/x86: touchscreen_dmi: Add info for GlobalSpace SolT IVW 11.6' tablet (stable-fixes).
- platform/x86: touchscreen_dmi: Add info for the EZpad 6s Pro (stable-fixes).
- platform/x86: wireless-hotkey: Add support for LG Airplane Button (stable-fixes).
- powerpc/cpuidle: Set CPUIDLE_FLAG_POLLING for snooze state (bsc#1227121 ltc#207129).
- powerpc: fix a file leak in kvm_vcpu_ioctl_enable_cap() (bsc#1194869).
- powerpc/kasan: Disable address sanitization in kexec paths (bsc#1194869).
- powerpc/pseries: Fix scv instruction crash with kexec (bsc#1194869).
- powerpc/rtas: clean up includes (bsc#1227487).
- powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() (bsc#1227487).
- power: supply: cros_usbpd: provide ID table for avoiding fallback match (stable-fixes).
- pwm: stm32: Always do lazy disabling (git-fixes).
- RDMA/cache: Release GID table even if leak is detected (git-fixes)
- RDMA/device: Return error earlier if port in not valid (git-fixes)
- RDMA/hns: Check atomic wr length (git-fixes)
- RDMA/hns: Fix insufficient extend DB for VFs. (git-fixes)
- RDMA/hns: Fix mbx timing out before CMD execution is completed (git-fixes)
- RDMA/hns: Fix missing pagesize and alignment check in FRMR (git-fixes)
- RDMA/hns: Fix shift-out-bounds when max_inline_data is 0 (git-fixes)
- RDMA/hns: Fix soft lockup under heavy CEQE load (git-fixes)
- RDMA/hns: Fix undifined behavior caused by invalid max_sge (git-fixes)
- RDMA/hns: Fix unmatch exception handling when init eq table fails (git-fixes)
- RDMA/iwcm: Fix a use-after-free related to destroying CM IDs (git-fixes)
- RDMA/mana_ib: Ignore optional access flags for MRs (git-fixes).
- RDMA/mlx4: Fix truncated output warning in alias_GUID.c (git-fixes)
- RDMA/mlx4: Fix truncated output warning in mad.c (git-fixes)
- RDMA/mlx5: Set mkeys for dmabuf at PAGE_SIZE (git-fixes)
- RDMA/restrack: Fix potential invalid address access (git-fixes)
- RDMA/rxe: Do not set BTH_ACK_MASK for UC or UD QPs (git-fixes)
- regmap-i2c: Subtract reg size from max_write (stable-fixes).
- Revert 'ALSA: firewire-lib: obsolete workqueue for period update' (bsc#1208783).
- Revert 'ALSA: firewire-lib: operate for period elapse event in process context' (bsc#1208783).
- Revert 'leds: led-core: Fix refcount leak in of_led_get()' (git-fixes).
- Revert 'usb: musb: da8xx: Set phy in OTG mode by default' (stable-fixes).
- rpcrdma: fix handling for RDMA_CM_EVENT_DEVICE_REMOVAL (git-fixes).
- rtc: cmos: Fix return value of nvmem callbacks (git-fixes).
- rtc: interface: Add RTC offset to alarm after fix-up (git-fixes).
- rtc: isl1208: Fix return value of nvmem callbacks (git-fixes).
- rtlwifi: rtl8192de: Style clean-ups (stable-fixes).
- s390: Implement __iowrite32_copy() (bsc#1226502)
- s390: Stop using weak symbols for __iowrite64_copy() (bsc#1226502)
- saa7134: Unchecked i2c_transfer function result fixed (git-fixes).
- sched/fair: Do not balance task to its current running CPU (git fixes (sched)).
- sched: Fix stop_one_cpu_nowait() vs hotplug (git fixes (sched)).
- scsi: lpfc: Allow DEVICE_RECOVERY mode after RSCN receipt if in PRLI_ISSUE state (bsc#1228857).
- scsi: lpfc: Cancel ELS WQE instead of issuing abort when SLI port is inactive (bsc#1228857).
- scsi: lpfc: Fix handling of fully recovered fabric node in dev_loss callbk (bsc#1228857).
- scsi: lpfc: Fix incorrect request len mbox field when setting trunking via sysfs (bsc#1228857).
- scsi: lpfc: Handle mailbox timeouts in lpfc_get_sfp_info (bsc#1228857).
- scsi: lpfc: Relax PRLI issue conditions after GID_FT response (bsc#1228857).
- scsi: lpfc: Revise lpfc_prep_embed_io routine with proper endian macro usages (bsc#1228857).
- scsi: lpfc: Update lpfc version to 14.4.0.3 (bsc#1228857).
- scsi: qla2xxx: Avoid possible run-time warning with long model_num (bsc#1228850).
- scsi: qla2xxx: Complete command early within lock (bsc#1228850).
- scsi: qla2xxx: Convert comma to semicolon (bsc#1228850).
- scsi: qla2xxx: Drop driver owner assignment (bsc#1228850).
- scsi: qla2xxx: During vport delete send async logout explicitly (bsc#1228850).
- scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850).
- scsi: qla2xxx: Fix flash read failure (bsc#1228850).
- scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850).
- scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850).
- scsi: qla2xxx: Indent help text (bsc#1228850).
- scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850).
- scsi: qla2xxx: Remove unused struct 'scsi_dif_tuple' (bsc#1228850).
- scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds (bsc#1228850).
- scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850).
- scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850).
- scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850).
- scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850).
- selftests/bpf: Add a selftest for checking subreg equality (bsc#1225903).
- selftests/bpf: add pre bpf_prog_test_run_opts() callback for test_loader (bsc#1225903).
- selftests/bpf: add precision propagation tests in the presence of subprogs (bsc#1225903).
- selftests/bpf: Add pruning test case for bpf_spin_lock (bsc#1225903).
- selftests/bpf: Check if mark_chain_precision() follows scalar ids (bsc#1225903).
- selftests/bpf: check if max number of bpf_loop iterations is tracked (bsc#1225903).
- selftests/bpf: fix __retval() being always ignored (bsc#1225903).
- selftests/bpf: fix unpriv_disabled check in test_verifier (bsc#1225903).
- selftests/bpf: __imm_insn &amp; __imm_const macro for bpf_misc.h (bsc#1225903).
- selftests/bpf: make test_align selftest more robust (bsc#1225903).
- selftests/bpf: populate map_array_ro map for verifier_array_access test (bsc#1225903).
- selftests/bpf: prog_tests entry point for migrated test_verifier tests (bsc#1225903).
- selftests/bpf: Report program name on parse_test_spec error (bsc#1225903).
- selftests/bpf: Support custom per-test flags and multiple expected messages (bsc#1225903).
- selftests/bpf: test case for callback_depth states pruning logic (bsc#1225903).
- selftests/bpf: test case for relaxed prunning of active_lock.id (bsc#1225903).
- selftests/bpf: test cases for regsafe() bug skipping check_id() (bsc#1225903).
- selftests/bpf: Tests execution support for test_loader.c (bsc#1225903).
- selftests/bpf: tests for iterating callbacks (bsc#1225903).
- selftests/bpf: test widening for iterating callbacks (bsc#1225903).
- selftests/bpf: track string payload offset as scalar in strobemeta (bsc#1225903).
- selftests/bpf: Unprivileged tests for test_loader.c (bsc#1225903).
- selftests/bpf: Verify copy_register_state() preserves parent/live fields (bsc#1225903).
- selftests/bpf: verify states_equal() maintains idmap across all frames (bsc#1225903).
- selftests/bpf: Verify that check_ids() is used for scalars in regsafe() (bsc#1225903).
- selftests/sigaltstack: Fix ppc64 GCC build (git-fixes).
- soc: ti: wkup_m3_ipc: Send NULL dummy message instead of pointer message (stable-fixes).
- spi: imx: Do not expect DMA for i.MX{25,35,50,51,53} cspi devices (stable-fixes).
- spi: mux: set ctlr-&gt;bits_per_word_mask (stable-fixes).
- string.h: Introduce memtostr() and memtostr_pad() (bsc#1228850).
- SUNRPC: avoid soft lockup when transmitting UDP to reachable server (bsc#1225272).
- SUNRPC: Fix gss_free_in_token_pages() (git-fixes).
- SUNRPC: Fix loop termination condition in gss_free_in_token_pages() (git-fixes).
- sunrpc: fix NFSACL RPC retry on soft mount (git-fixes).
- SUNRPC: return proper error from gss_wrap_req_priv (git-fixes).
- supported.conf:
- tpm: Allow system suspend to continue when TPM suspend fails (bsc#1082555).
- tpm: Prevent hwrng from activating during resume (bsc#1082555).
- tpm_tis: Resend command to recover from data transfer errors (bsc#1082555).
- tpm_tis: Use tpm_chip_{start,stop} decoration inside tpm_tis_resume (bsc#1082555).
- tpm, tpm: Implement usage counter for locality (bsc#1082555).
- tpm, tpm_tis: Avoid cache incoherency in test for interrupts (bsc#1082555).
- tpm, tpm_tis: Claim locality before writing interrupt registers (bsc#1082555).
- tpm, tpm_tis: Claim locality in interrupt handler (bsc#1082555).
- tpm, tpm_tis: Claim locality when interrupts are reenabled on resume (bsc#1082555).
- tpm, tpm_tis: correct tpm_tis_flags enumeration values (bsc#1082555).
- tpm, tpm_tis: Do not skip reset of original interrupt vector (bsc#1082555).
- tpm, tpm_tis: Only handle supported interrupts (bsc#1082555).
- tracing: Build event generation tests only as modules (git-fixes).
- tracing/net_sched: NULL pointer dereference in perf_trace_qdisc_reset() (git-fixes).
- tracing/osnoise: Add osnoise/options file (bsc#1228330)
- tracing/osnoise: Add OSNOISE_WORKLOAD option (bsc#1228330)
- tracing/osnoise: Do not follow tracing_cpumask (bsc#1228330)
- tracing/osnoise: Fix notify new tracing_max_latency (bsc#1228330)
- tracing/osnoise: Make osnoise_instances static (bsc#1228330)
- tracing/osnoise: Split workload start from the tracer start (bsc#1228330)
- tracing/osnoise: Support a list of trace_array *tr (bsc#1228330)
- tracing/osnoise: Use built-in RCU list checking (bsc#1228330)
- tracing/timerlat: Notify new max thread latency (bsc#1228330)
- USB: Add USB_QUIRK_NO_SET_INTF quirk for START BP-850k (stable-fixes).
- usb: cdns3: allocate TX FIFO size according to composite EP number (git-fixes).
- usb: cdns3: fix incorrect calculation of ep_buf_size when more than one config (git-fixes).
- usb: cdns3: fix iso transfer error when mult is not zero (git-fixes).
- usb: cdns3: improve handling of unaligned address case (git-fixes).
- usb: cdns3: optimize OUT transfer by copying only actual received data (git-fixes).
- usb: cdns3: skip set TRB_IOC when usb_request: no_interrupt is true (git-fixes).
- USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor (git-fixes).
- usb: dwc3: gadget: Do not delay End Transfer on delayed_status (git-fixes).
- usb: dwc3: gadget: Force sending delayed status during soft disconnect (git-fixes).
- usb: dwc3: gadget: Synchronize IRQ between soft connect/disconnect (git-fixes).
- usb: gadget: call usb_gadget_check_config() to verify UDC capability (git-fixes).
- usb: gadget: configfs: Prevent OOB read/write in usb_string_copy() (stable-fixes).
- usb: gadget: printer: SS+ support (stable-fixes).
- usb: misc: uss720: check for incompatible versions of the Belkin F5U002 (stable-fixes).
- USB: serial: mos7840: fix crash on resume (git-fixes).
- USB: serial: option: add Fibocom FM350-GL (stable-fixes).
- USB: serial: option: add Netprisma LCUK54 series modules (stable-fixes).
- USB: serial: option: add Rolling RW350-GL variants (stable-fixes).
- USB: serial: option: add support for Foxconn T99W651 (stable-fixes).
- USB: serial: option: add Telit FN912 rmnet compositions (stable-fixes).
- USB: serial: option: add Telit generic core-dump composition (stable-fixes).
- usb: typec: tcpm: clear pd_event queue in PORT_RESET (git-fixes).
- usb: xhci-plat: Do not include xhci.h (git-fixes).
- USB: xhci-plat: fix legacy PHY double init (git-fixes).
- wifi: ath11k: fix wrong handling of CCMP256 and GCMP ciphers (git-fixes).
- wifi: brcmsmac: LCN PHY code is used for BCM4313 2G-only device (git-fixes).
- wifi: cfg80211: fix typo in cfg80211_calculate_bitrate_he() (git-fixes).
- wifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he() (git-fixes).
- wifi: cfg80211: restrict NL80211_ATTR_TXQ_QUANTUM values (git-fixes).
- wifi: cfg80211: wext: add extra SIOCSIWSCAN data check (stable-fixes).
- wifi: iwlwifi: mvm: d3: fix WoWLAN command version lookup (stable-fixes).
- wifi: iwlwifi: mvm: Handle BIGTK cipher in kek_kck cmd (stable-fixes).
- wifi: iwlwifi: mvm: properly set 6 GHz channel direct probe option (stable-fixes).
- wifi: mac80211: disable softirqs for queued frame handling (git-fixes).
- wifi: mac80211: fix UBSAN noise in ieee80211_prep_hw_scan() (stable-fixes).
- wifi: mac80211: handle tasklet frames before stopping (stable-fixes).
- wifi: mac80211: mesh: init nonpeer_pm to active by default in mesh sdata (stable-fixes).
- wifi: mt76: replace skb_put with skb_put_zero (stable-fixes).
- wifi: mwifiex: Fix interface type change (git-fixes).
- wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter() (git-fixes).
- wifi: wilc1000: fix ies_len type in connect path (git-fixes).
- workqueue: Improve scalability of workqueue watchdog touch (bsc#1193454).
- workqueue: wq_watchdog_touch is always called with valid CPU (bsc#1193454).
- x86/amd_nb: Use Family 19h Models 60h-7Fh Function 4 IDs (git-fixes).
- x86/apic: Force native_apic_mem_read() to use the MOV instruction (git-fixes).
- x86/bhi: Avoid warning in #DB handler due to BHI mitigation (git-fixes).
- x86/bugs: Remove default case for fully switched enums (bsc#1227900).
- x86/fpu: Fix AMD X86_BUG_FXSAVE_LEAK fixup (git-fixes).
- x86/ibt,ftrace: Search for __fentry__ location (git-fixes).
- x86/Kconfig: Transmeta Crusoe is CPU family 5, not 6 (git-fixes).
- x86/mm: Allow guest.enc_status_change_prepare() to fail (git-fixes).
- x86/mm: Fix enc_status_change_finish_noop() (git-fixes).
- x86/purgatory: Switch to the position-independent small code model (git-fixes).
- x86/srso: Move retbleed IBPB check into existing 'has_microcode' code block (bsc#1227900).
- x86/srso: Remove 'pred_cmd' label (bsc#1227900).
- x86: Stop using weak symbols for __iowrite32_copy() (bsc#1226502)
- x86/tdx: Fix race between set_memory_encrypted() and load_unaligned_zeropad() (git-fixes).
- xfs: Add cond_resched to block unmap range and reflink remap path (bsc#1228226).
- xhci: Apply broken streams quirk to Etron EJ188 xHCI host (stable-fixes).
- xhci: Apply reset resume quirk to Etron EJ188 xHCI host (stable-fixes).
- xhci: Set correct transferred length for cancelled bulk transfers (stable-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2024-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082555">SUSE bug 1082555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193454">SUSE bug 1193454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193554">SUSE bug 1193554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193787">SUSE bug 1193787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194324">SUSE bug 1194324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195357">SUSE bug 1195357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195668">SUSE bug 1195668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195927">SUSE bug 1195927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195957">SUSE bug 1195957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196823">SUSE bug 1196823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197146">SUSE bug 1197146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197246">SUSE bug 1197246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197762">SUSE bug 1197762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202346">SUSE bug 1202346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202686">SUSE bug 1202686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208783">SUSE bug 1208783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209636">SUSE bug 1209636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213123">SUSE bug 1213123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215492">SUSE bug 1215492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215587">SUSE bug 1215587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216834">SUSE bug 1216834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219832">SUSE bug 1219832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220138">SUSE bug 1220138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220185">SUSE bug 1220185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220186">SUSE bug 1220186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220187">SUSE bug 1220187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220869">SUSE bug 1220869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220876">SUSE bug 1220876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220942">SUSE bug 1220942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220952">SUSE bug 1220952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221010">SUSE bug 1221010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221044">SUSE bug 1221044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221647">SUSE bug 1221647</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221654">SUSE bug 1221654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221656">SUSE bug 1221656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221659">SUSE bug 1221659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221777">SUSE bug 1221777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222011">SUSE bug 1222011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222323">SUSE bug 1222323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222326">SUSE bug 1222326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222328">SUSE bug 1222328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222625">SUSE bug 1222625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222702">SUSE bug 1222702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222728">SUSE bug 1222728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222799">SUSE bug 1222799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222809">SUSE bug 1222809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222810">SUSE bug 1222810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223021">SUSE bug 1223021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223180">SUSE bug 1223180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223635">SUSE bug 1223635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223652">SUSE bug 1223652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223675">SUSE bug 1223675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223778">SUSE bug 1223778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223806">SUSE bug 1223806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223813">SUSE bug 1223813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223815">SUSE bug 1223815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223836">SUSE bug 1223836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223863">SUSE bug 1223863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224414">SUSE bug 1224414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224499">SUSE bug 1224499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224500">SUSE bug 1224500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224512">SUSE bug 1224512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224516">SUSE bug 1224516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224517">SUSE bug 1224517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224545">SUSE bug 1224545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224548">SUSE bug 1224548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224557">SUSE bug 1224557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224572">SUSE bug 1224572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224573">SUSE bug 1224573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224585">SUSE bug 1224585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224604">SUSE bug 1224604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224636">SUSE bug 1224636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224641">SUSE bug 1224641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224683">SUSE bug 1224683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224694">SUSE bug 1224694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224700">SUSE bug 1224700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224743">SUSE bug 1224743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225088">SUSE bug 1225088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225272">SUSE bug 1225272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225301">SUSE bug 1225301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225475">SUSE bug 1225475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225489">SUSE bug 1225489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225504">SUSE bug 1225504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225505">SUSE bug 1225505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225564">SUSE bug 1225564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225573">SUSE bug 1225573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225581">SUSE bug 1225581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225586">SUSE bug 1225586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225711">SUSE bug 1225711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225717">SUSE bug 1225717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225719">SUSE bug 1225719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225744">SUSE bug 1225744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225745">SUSE bug 1225745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225746">SUSE bug 1225746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225752">SUSE bug 1225752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225753">SUSE bug 1225753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225757">SUSE bug 1225757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225767">SUSE bug 1225767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225810">SUSE bug 1225810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225815">SUSE bug 1225815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225820">SUSE bug 1225820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225829">SUSE bug 1225829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225835">SUSE bug 1225835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225838">SUSE bug 1225838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225839">SUSE bug 1225839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225843">SUSE bug 1225843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225847">SUSE bug 1225847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225851">SUSE bug 1225851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225856">SUSE bug 1225856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225895">SUSE bug 1225895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225898">SUSE bug 1225898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225903">SUSE bug 1225903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226202">SUSE bug 1226202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226502">SUSE bug 1226502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226519">SUSE bug 1226519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226551">SUSE bug 1226551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226555">SUSE bug 1226555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226565">SUSE bug 1226565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226568">SUSE bug 1226568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226570">SUSE bug 1226570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226571">SUSE bug 1226571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226574">SUSE bug 1226574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226588">SUSE bug 1226588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226607">SUSE bug 1226607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226650">SUSE bug 1226650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226698">SUSE bug 1226698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226713">SUSE bug 1226713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226716">SUSE bug 1226716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226750">SUSE bug 1226750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226757">SUSE bug 1226757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226758">SUSE bug 1226758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226775">SUSE bug 1226775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226783">SUSE bug 1226783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226785">SUSE bug 1226785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226834">SUSE bug 1226834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226837">SUSE bug 1226837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226911">SUSE bug 1226911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226990">SUSE bug 1226990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226993">SUSE bug 1226993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227090">SUSE bug 1227090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227121">SUSE bug 1227121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227157">SUSE bug 1227157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227162">SUSE bug 1227162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227362">SUSE bug 1227362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227383">SUSE bug 1227383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227432">SUSE bug 1227432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227435">SUSE bug 1227435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227447">SUSE bug 1227447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227487">SUSE bug 1227487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227549">SUSE bug 1227549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227573">SUSE bug 1227573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227618">SUSE bug 1227618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227620">SUSE bug 1227620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227626">SUSE bug 1227626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227635">SUSE bug 1227635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227661">SUSE bug 1227661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227716">SUSE bug 1227716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227722">SUSE bug 1227722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227724">SUSE bug 1227724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227725">SUSE bug 1227725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227728">SUSE bug 1227728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227729">SUSE bug 1227729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227730">SUSE bug 1227730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227732">SUSE bug 1227732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227733">SUSE bug 1227733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227750">SUSE bug 1227750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227754">SUSE bug 1227754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227755">SUSE bug 1227755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227760">SUSE bug 1227760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227762">SUSE bug 1227762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227763">SUSE bug 1227763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227764">SUSE bug 1227764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227766">SUSE bug 1227766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227770">SUSE bug 1227770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227771">SUSE bug 1227771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227772">SUSE bug 1227772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227774">SUSE bug 1227774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227779">SUSE bug 1227779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227780">SUSE bug 1227780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227783">SUSE bug 1227783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227786">SUSE bug 1227786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227787">SUSE bug 1227787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227790">SUSE bug 1227790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227792">SUSE bug 1227792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227796">SUSE bug 1227796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227797">SUSE bug 1227797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227798">SUSE bug 1227798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227800">SUSE bug 1227800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227802">SUSE bug 1227802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227806">SUSE bug 1227806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227808">SUSE bug 1227808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227810">SUSE bug 1227810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227812">SUSE bug 1227812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227813">SUSE bug 1227813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227814">SUSE bug 1227814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227816">SUSE bug 1227816</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227820">SUSE bug 1227820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227823">SUSE bug 1227823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227824">SUSE bug 1227824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227828">SUSE bug 1227828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227829">SUSE bug 1227829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227836">SUSE bug 1227836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227846">SUSE bug 1227846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227849">SUSE bug 1227849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227851">SUSE bug 1227851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227862">SUSE bug 1227862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227864">SUSE bug 1227864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227865">SUSE bug 1227865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227866">SUSE bug 1227866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227870">SUSE bug 1227870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227884">SUSE bug 1227884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227886">SUSE bug 1227886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227891">SUSE bug 1227891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227893">SUSE bug 1227893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227899">SUSE bug 1227899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227900">SUSE bug 1227900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227910">SUSE bug 1227910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227913">SUSE bug 1227913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227917">SUSE bug 1227917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227919">SUSE bug 1227919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227920">SUSE bug 1227920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227921">SUSE bug 1227921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227922">SUSE bug 1227922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227923">SUSE bug 1227923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227924">SUSE bug 1227924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227925">SUSE bug 1227925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227927">SUSE bug 1227927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227928">SUSE bug 1227928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227931">SUSE bug 1227931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227932">SUSE bug 1227932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227933">SUSE bug 1227933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227935">SUSE bug 1227935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227936">SUSE bug 1227936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227938">SUSE bug 1227938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227941">SUSE bug 1227941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227942">SUSE bug 1227942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227944">SUSE bug 1227944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227945">SUSE bug 1227945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227947">SUSE bug 1227947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227948">SUSE bug 1227948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227949">SUSE bug 1227949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227950">SUSE bug 1227950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227952">SUSE bug 1227952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227953">SUSE bug 1227953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227954">SUSE bug 1227954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227956">SUSE bug 1227956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227957">SUSE bug 1227957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227963">SUSE bug 1227963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227964">SUSE bug 1227964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227965">SUSE bug 1227965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227968">SUSE bug 1227968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227969">SUSE bug 1227969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227970">SUSE bug 1227970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227971">SUSE bug 1227971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227972">SUSE bug 1227972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227975">SUSE bug 1227975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227976">SUSE bug 1227976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227981">SUSE bug 1227981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227982">SUSE bug 1227982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227985">SUSE bug 1227985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227986">SUSE bug 1227986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227987">SUSE bug 1227987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227988">SUSE bug 1227988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227989">SUSE bug 1227989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227990">SUSE bug 1227990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227991">SUSE bug 1227991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227992">SUSE bug 1227992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227993">SUSE bug 1227993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227995">SUSE bug 1227995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227996">SUSE bug 1227996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227997">SUSE bug 1227997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228000">SUSE bug 1228000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228002">SUSE bug 1228002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228003">SUSE bug 1228003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228004">SUSE bug 1228004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228005">SUSE bug 1228005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228006">SUSE bug 1228006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228007">SUSE bug 1228007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228008">SUSE bug 1228008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228009">SUSE bug 1228009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228010">SUSE bug 1228010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228011">SUSE bug 1228011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228013">SUSE bug 1228013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228014">SUSE bug 1228014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228015">SUSE bug 1228015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228019">SUSE bug 1228019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228020">SUSE bug 1228020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228025">SUSE bug 1228025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228028">SUSE bug 1228028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228035">SUSE bug 1228035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228037">SUSE bug 1228037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228038">SUSE bug 1228038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228039">SUSE bug 1228039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228040">SUSE bug 1228040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228045">SUSE bug 1228045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228054">SUSE bug 1228054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228055">SUSE bug 1228055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228056">SUSE bug 1228056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228060">SUSE bug 1228060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228061">SUSE bug 1228061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228062">SUSE bug 1228062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228063">SUSE bug 1228063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228064">SUSE bug 1228064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228066">SUSE bug 1228066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228067">SUSE bug 1228067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228068">SUSE bug 1228068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228071">SUSE bug 1228071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228079">SUSE bug 1228079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228090">SUSE bug 1228090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228114">SUSE bug 1228114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228140">SUSE bug 1228140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228190">SUSE bug 1228190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228191">SUSE bug 1228191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228195">SUSE bug 1228195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228202">SUSE bug 1228202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228226">SUSE bug 1228226</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228235">SUSE bug 1228235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228237">SUSE bug 1228237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228247">SUSE bug 1228247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228327">SUSE bug 1228327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228328">SUSE bug 1228328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228330">SUSE bug 1228330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228403">SUSE bug 1228403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228405">SUSE bug 1228405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228408">SUSE bug 1228408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228409">SUSE bug 1228409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228410">SUSE bug 1228410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228418">SUSE bug 1228418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228440">SUSE bug 1228440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228459">SUSE bug 1228459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228462">SUSE bug 1228462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228470">SUSE bug 1228470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228518">SUSE bug 1228518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228520">SUSE bug 1228520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228530">SUSE bug 1228530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228561">SUSE bug 1228561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228565">SUSE bug 1228565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228580">SUSE bug 1228580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228581">SUSE bug 1228581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228591">SUSE bug 1228591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228599">SUSE bug 1228599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228617">SUSE bug 1228617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228625">SUSE bug 1228625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228626">SUSE bug 1228626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228633">SUSE bug 1228633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228640">SUSE bug 1228640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228644">SUSE bug 1228644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228649">SUSE bug 1228649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228655">SUSE bug 1228655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228665">SUSE bug 1228665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228672">SUSE bug 1228672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228680">SUSE bug 1228680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228705">SUSE bug 1228705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228723">SUSE bug 1228723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228743">SUSE bug 1228743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228756">SUSE bug 1228756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228801">SUSE bug 1228801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228850">SUSE bug 1228850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228857">SUSE bug 1228857</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47086/">CVE-2021-47086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47086">CVE-2021-47086 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47103/">CVE-2021-47103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47103">CVE-2021-47103 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47186/">CVE-2021-47186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47186">CVE-2021-47186 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47402/">CVE-2021-47402 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47402">CVE-2021-47402 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47546/">CVE-2021-47546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47546">CVE-2021-47546 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-47547/">CVE-2021-47547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47547">CVE-2021-47547 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47588/">CVE-2021-47588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47588">CVE-2021-47588 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47590/">CVE-2021-47590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47590">CVE-2021-47590 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47591/">CVE-2021-47591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47591">CVE-2021-47591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47593/">CVE-2021-47593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47593">CVE-2021-47593 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47598/">CVE-2021-47598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47598">CVE-2021-47598 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47599/">CVE-2021-47599 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47599">CVE-2021-47599 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47606/">CVE-2021-47606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47606">CVE-2021-47606 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47622/">CVE-2021-47622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47622">CVE-2021-47622 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-47623/">CVE-2021-47623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47623">CVE-2021-47623 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47624/">CVE-2021-47624 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47624">CVE-2021-47624 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48713/">CVE-2022-48713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48713">CVE-2022-48713 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48730/">CVE-2022-48730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48730">CVE-2022-48730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48732/">CVE-2022-48732 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48732">CVE-2022-48732 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48749/">CVE-2022-48749 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48749">CVE-2022-48749 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48756/">CVE-2022-48756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48756">CVE-2022-48756 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48773/">CVE-2022-48773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48773">CVE-2022-48773 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48774/">CVE-2022-48774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48774">CVE-2022-48774 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48775/">CVE-2022-48775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48775">CVE-2022-48775 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48776/">CVE-2022-48776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48776">CVE-2022-48776 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48777/">CVE-2022-48777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48777">CVE-2022-48777 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48778/">CVE-2022-48778 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48778">CVE-2022-48778 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48780/">CVE-2022-48780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48780">CVE-2022-48780 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48783/">CVE-2022-48783 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48783">CVE-2022-48783 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48784/">CVE-2022-48784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48784">CVE-2022-48784 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48785/">CVE-2022-48785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48785">CVE-2022-48785 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-48786/">CVE-2022-48786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48786">CVE-2022-48786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48787/">CVE-2022-48787 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48787">CVE-2022-48787 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48788/">CVE-2022-48788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48788">CVE-2022-48788 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48789/">CVE-2022-48789 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48789">CVE-2022-48789 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48790/">CVE-2022-48790 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48790">CVE-2022-48790 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48791/">CVE-2022-48791 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48791">CVE-2022-48791 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48792/">CVE-2022-48792 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48792">CVE-2022-48792 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48793/">CVE-2022-48793 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48793">CVE-2022-48793 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48794/">CVE-2022-48794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48794">CVE-2022-48794 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48796/">CVE-2022-48796 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48796">CVE-2022-48796 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48797/">CVE-2022-48797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48797">CVE-2022-48797 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48798/">CVE-2022-48798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48798">CVE-2022-48798 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48799/">CVE-2022-48799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48799">CVE-2022-48799 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48800/">CVE-2022-48800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48800">CVE-2022-48800 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48801/">CVE-2022-48801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48801">CVE-2022-48801 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48802/">CVE-2022-48802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48802">CVE-2022-48802 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48803/">CVE-2022-48803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48803">CVE-2022-48803 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48804/">CVE-2022-48804 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48804">CVE-2022-48804 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48805/">CVE-2022-48805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48805">CVE-2022-48805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48806/">CVE-2022-48806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48806">CVE-2022-48806 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48807/">CVE-2022-48807 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48807">CVE-2022-48807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48809/">CVE-2022-48809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48809">CVE-2022-48809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48810/">CVE-2022-48810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48810">CVE-2022-48810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48811/">CVE-2022-48811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48811">CVE-2022-48811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48812/">CVE-2022-48812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48812">CVE-2022-48812 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48813/">CVE-2022-48813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48813">CVE-2022-48813 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48814/">CVE-2022-48814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48814">CVE-2022-48814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48815/">CVE-2022-48815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48815">CVE-2022-48815 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48816/">CVE-2022-48816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48816">CVE-2022-48816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48817/">CVE-2022-48817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48817">CVE-2022-48817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48818/">CVE-2022-48818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48818">CVE-2022-48818 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48820/">CVE-2022-48820 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48820">CVE-2022-48820 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48821/">CVE-2022-48821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48821">CVE-2022-48821 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48822/">CVE-2022-48822 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48822">CVE-2022-48822 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48823/">CVE-2022-48823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48823">CVE-2022-48823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48824/">CVE-2022-48824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48824">CVE-2022-48824 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48825/">CVE-2022-48825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48825">CVE-2022-48825 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48826/">CVE-2022-48826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48826">CVE-2022-48826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48827/">CVE-2022-48827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48827">CVE-2022-48827 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48828/">CVE-2022-48828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48828">CVE-2022-48828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48829/">CVE-2022-48829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48829">CVE-2022-48829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48830/">CVE-2022-48830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48830">CVE-2022-48830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48831/">CVE-2022-48831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48831">CVE-2022-48831 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48834/">CVE-2022-48834 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48834">CVE-2022-48834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48835/">CVE-2022-48835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48835">CVE-2022-48835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48836/">CVE-2022-48836 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48836">CVE-2022-48836 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48837/">CVE-2022-48837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48837">CVE-2022-48837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48838/">CVE-2022-48838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48838">CVE-2022-48838 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48839/">CVE-2022-48839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48839">CVE-2022-48839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48840/">CVE-2022-48840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48840">CVE-2022-48840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48841/">CVE-2022-48841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48841">CVE-2022-48841 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48842/">CVE-2022-48842 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48842">CVE-2022-48842 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48843/">CVE-2022-48843 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48843">CVE-2022-48843 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48844/">CVE-2022-48844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48844">CVE-2022-48844 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48846/">CVE-2022-48846 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48846">CVE-2022-48846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48847/">CVE-2022-48847 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48847">CVE-2022-48847 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48849/">CVE-2022-48849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48849">CVE-2022-48849 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48850/">CVE-2022-48850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48850">CVE-2022-48850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48851/">CVE-2022-48851 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48851">CVE-2022-48851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48852/">CVE-2022-48852 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48852">CVE-2022-48852 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48853/">CVE-2022-48853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48853">CVE-2022-48853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48855/">CVE-2022-48855 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48855">CVE-2022-48855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48856/">CVE-2022-48856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48856">CVE-2022-48856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48857/">CVE-2022-48857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48857">CVE-2022-48857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48858/">CVE-2022-48858 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48858">CVE-2022-48858 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48859/">CVE-2022-48859 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48859">CVE-2022-48859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48860/">CVE-2022-48860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48860">CVE-2022-48860 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48861/">CVE-2022-48861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48861">CVE-2022-48861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48862/">CVE-2022-48862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48862">CVE-2022-48862 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48863/">CVE-2022-48863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48863">CVE-2022-48863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48864/">CVE-2022-48864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48864">CVE-2022-48864 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48866/">CVE-2022-48866 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48866">CVE-2022-48866 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1582/">CVE-2023-1582 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1582">CVE-2023-1582 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37453/">CVE-2023-37453 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37453">CVE-2023-37453 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52435/">CVE-2023-52435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52435">CVE-2023-52435 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52573/">CVE-2023-52573 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52573">CVE-2023-52573 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52580/">CVE-2023-52580 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52580">CVE-2023-52580 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52591/">CVE-2023-52591 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52591">CVE-2023-52591 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52735/">CVE-2023-52735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52735">CVE-2023-52735 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52751/">CVE-2023-52751 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52751">CVE-2023-52751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52762/">CVE-2023-52762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52762">CVE-2023-52762 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52775/">CVE-2023-52775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52775">CVE-2023-52775 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52812/">CVE-2023-52812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52812">CVE-2023-52812 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52857/">CVE-2023-52857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52857">CVE-2023-52857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52863/">CVE-2023-52863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52863">CVE-2023-52863 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52885/">CVE-2023-52885 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52885">CVE-2023-52885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52886/">CVE-2023-52886 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52886">CVE-2023-52886 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-25741/">CVE-2024-25741 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25741">CVE-2024-25741 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26583/">CVE-2024-26583 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26583">CVE-2024-26583 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26584/">CVE-2024-26584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26584">CVE-2024-26584 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26585/">CVE-2024-26585 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26585">CVE-2024-26585 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26615/">CVE-2024-26615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26615">CVE-2024-26615 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26633/">CVE-2024-26633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26633">CVE-2024-26633 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26635/">CVE-2024-26635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26635">CVE-2024-26635 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26636/">CVE-2024-26636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26636">CVE-2024-26636 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26641/">CVE-2024-26641 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26641">CVE-2024-26641 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26661/">CVE-2024-26661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26661">CVE-2024-26661 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26663/">CVE-2024-26663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26663">CVE-2024-26663 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26665/">CVE-2024-26665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26665">CVE-2024-26665 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26800/">CVE-2024-26800 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26800">CVE-2024-26800 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26802/">CVE-2024-26802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26802">CVE-2024-26802 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26813/">CVE-2024-26813 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26813">CVE-2024-26813 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26814/">CVE-2024-26814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26814">CVE-2024-26814 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26863/">CVE-2024-26863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26863">CVE-2024-26863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26889/">CVE-2024-26889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26889">CVE-2024-26889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26920/">CVE-2024-26920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26920">CVE-2024-26920 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26935/">CVE-2024-26935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26935">CVE-2024-26935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26961/">CVE-2024-26961 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26961">CVE-2024-26961 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26976/">CVE-2024-26976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26976">CVE-2024-26976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27015/">CVE-2024-27015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27015">CVE-2024-27015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27019/">CVE-2024-27019 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27019">CVE-2024-27019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27020/">CVE-2024-27020 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27020">CVE-2024-27020 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27025/">CVE-2024-27025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27025">CVE-2024-27025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27065/">CVE-2024-27065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27065">CVE-2024-27065 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-27402/">CVE-2024-27402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27402">CVE-2024-27402 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27437/">CVE-2024-27437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27437">CVE-2024-27437 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35805/">CVE-2024-35805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35805">CVE-2024-35805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35819/">CVE-2024-35819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35819">CVE-2024-35819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35837/">CVE-2024-35837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35837">CVE-2024-35837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35853/">CVE-2024-35853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35853">CVE-2024-35853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35854/">CVE-2024-35854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35854">CVE-2024-35854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35855/">CVE-2024-35855 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35855">CVE-2024-35855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35889/">CVE-2024-35889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35889">CVE-2024-35889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35890/">CVE-2024-35890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35890">CVE-2024-35890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35893/">CVE-2024-35893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35893">CVE-2024-35893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35899/">CVE-2024-35899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35899">CVE-2024-35899 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35934/">CVE-2024-35934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35934">CVE-2024-35934 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35949/">CVE-2024-35949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35949">CVE-2024-35949 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35961/">CVE-2024-35961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35961">CVE-2024-35961 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35979/">CVE-2024-35979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35979">CVE-2024-35979 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-35995/">CVE-2024-35995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35995">CVE-2024-35995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36000/">CVE-2024-36000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36000">CVE-2024-36000 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36004/">CVE-2024-36004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36004">CVE-2024-36004 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36288/">CVE-2024-36288 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36288">CVE-2024-36288 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-36889/">CVE-2024-36889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36889">CVE-2024-36889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36901/">CVE-2024-36901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36901">CVE-2024-36901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36902/">CVE-2024-36902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36902">CVE-2024-36902 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36909/">CVE-2024-36909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36909">CVE-2024-36909 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36910/">CVE-2024-36910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36910">CVE-2024-36910 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36911/">CVE-2024-36911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36911">CVE-2024-36911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36912/">CVE-2024-36912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36912">CVE-2024-36912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36913/">CVE-2024-36913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36913">CVE-2024-36913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36914/">CVE-2024-36914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36914">CVE-2024-36914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36919/">CVE-2024-36919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36919">CVE-2024-36919 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-36923/">CVE-2024-36923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36923">CVE-2024-36923 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36924/">CVE-2024-36924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36924">CVE-2024-36924 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36926/">CVE-2024-36926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36926">CVE-2024-36926 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36939/">CVE-2024-36939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36939">CVE-2024-36939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36941/">CVE-2024-36941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36941">CVE-2024-36941 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36942/">CVE-2024-36942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36942">CVE-2024-36942 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36944/">CVE-2024-36944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36944">CVE-2024-36944 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-36946/">CVE-2024-36946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36946">CVE-2024-36946 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36947/">CVE-2024-36947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36947">CVE-2024-36947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36950/">CVE-2024-36950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36950">CVE-2024-36950 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36952/">CVE-2024-36952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36952">CVE-2024-36952 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36955/">CVE-2024-36955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36955">CVE-2024-36955 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36959/">CVE-2024-36959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36959">CVE-2024-36959 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36974/">CVE-2024-36974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36974">CVE-2024-36974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38548/">CVE-2024-38548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38548">CVE-2024-38548 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38555/">CVE-2024-38555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38555">CVE-2024-38555 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38558/">CVE-2024-38558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38558">CVE-2024-38558 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38559/">CVE-2024-38559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38559">CVE-2024-38559 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38570/">CVE-2024-38570 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38570">CVE-2024-38570 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38586/">CVE-2024-38586 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38586">CVE-2024-38586 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38588/">CVE-2024-38588 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38588">CVE-2024-38588 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38598/">CVE-2024-38598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38598">CVE-2024-38598 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38628/">CVE-2024-38628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38628">CVE-2024-38628 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39276/">CVE-2024-39276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39276">CVE-2024-39276 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39371/">CVE-2024-39371 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39371">CVE-2024-39371 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39463/">CVE-2024-39463 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39463">CVE-2024-39463 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-39472/">CVE-2024-39472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39472">CVE-2024-39472 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39475/">CVE-2024-39475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39475">CVE-2024-39475 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39482/">CVE-2024-39482 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39482">CVE-2024-39482 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39487/">CVE-2024-39487 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39487">CVE-2024-39487 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39488/">CVE-2024-39488 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39488">CVE-2024-39488 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-39490/">CVE-2024-39490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39490">CVE-2024-39490 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39493/">CVE-2024-39493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39493">CVE-2024-39493 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39494/">CVE-2024-39494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39494">CVE-2024-39494 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39497/">CVE-2024-39497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39497">CVE-2024-39497 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39499/">CVE-2024-39499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39499">CVE-2024-39499 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39500/">CVE-2024-39500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39500">CVE-2024-39500 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39501/">CVE-2024-39501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39501">CVE-2024-39501 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39502/">CVE-2024-39502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39502">CVE-2024-39502 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39505/">CVE-2024-39505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39505">CVE-2024-39505 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39506/">CVE-2024-39506 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39506">CVE-2024-39506 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39507/">CVE-2024-39507 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39507">CVE-2024-39507 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-39508/">CVE-2024-39508 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39508">CVE-2024-39508 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39509/">CVE-2024-39509 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39509">CVE-2024-39509 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40900/">CVE-2024-40900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40900">CVE-2024-40900 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-40901/">CVE-2024-40901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40901">CVE-2024-40901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-40902/">CVE-2024-40902 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40902">CVE-2024-40902 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40903/">CVE-2024-40903 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40903">CVE-2024-40903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40904/">CVE-2024-40904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40904">CVE-2024-40904 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40906/">CVE-2024-40906 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40906">CVE-2024-40906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40908/">CVE-2024-40908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40908">CVE-2024-40908 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40909/">CVE-2024-40909 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40909">CVE-2024-40909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40911/">CVE-2024-40911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40911">CVE-2024-40911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40912/">CVE-2024-40912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40912">CVE-2024-40912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40916/">CVE-2024-40916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40916">CVE-2024-40916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40919/">CVE-2024-40919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40919">CVE-2024-40919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40923/">CVE-2024-40923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40923">CVE-2024-40923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40924/">CVE-2024-40924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40924">CVE-2024-40924 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40927/">CVE-2024-40927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40927">CVE-2024-40927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40929/">CVE-2024-40929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40929">CVE-2024-40929 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-40931/">CVE-2024-40931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40931">CVE-2024-40931 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40932/">CVE-2024-40932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40932">CVE-2024-40932 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40934/">CVE-2024-40934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40934">CVE-2024-40934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40935/">CVE-2024-40935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40935">CVE-2024-40935 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40937/">CVE-2024-40937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40937">CVE-2024-40937 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40940/">CVE-2024-40940 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40940">CVE-2024-40940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40941/">CVE-2024-40941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40941">CVE-2024-40941 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40942/">CVE-2024-40942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40942">CVE-2024-40942 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40943/">CVE-2024-40943 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40943">CVE-2024-40943 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40945/">CVE-2024-40945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40945">CVE-2024-40945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40953/">CVE-2024-40953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40953">CVE-2024-40953 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40954/">CVE-2024-40954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40954">CVE-2024-40954 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40956/">CVE-2024-40956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40956">CVE-2024-40956 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40958/">CVE-2024-40958 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40958">CVE-2024-40958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40959/">CVE-2024-40959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40959">CVE-2024-40959 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40960/">CVE-2024-40960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40960">CVE-2024-40960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40961/">CVE-2024-40961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40961">CVE-2024-40961 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40966/">CVE-2024-40966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40966">CVE-2024-40966 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40967/">CVE-2024-40967 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40967">CVE-2024-40967 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40970/">CVE-2024-40970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40970">CVE-2024-40970 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40972/">CVE-2024-40972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40972">CVE-2024-40972 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40976/">CVE-2024-40976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40976">CVE-2024-40976 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40977/">CVE-2024-40977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40977">CVE-2024-40977 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40981/">CVE-2024-40981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40981">CVE-2024-40981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40982/">CVE-2024-40982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40982">CVE-2024-40982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40984/">CVE-2024-40984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40984">CVE-2024-40984 at NVD</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40987/">CVE-2024-40987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40987">CVE-2024-40987 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40988/">CVE-2024-40988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40988">CVE-2024-40988 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40989/">CVE-2024-40989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40989">CVE-2024-40989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40990/">CVE-2024-40990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40990">CVE-2024-40990 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40994/">CVE-2024-40994 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40994">CVE-2024-40994 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40998/">CVE-2024-40998 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40998">CVE-2024-40998 at NVD</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-40999/">CVE-2024-40999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40999">CVE-2024-40999 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41002/">CVE-2024-41002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41002">CVE-2024-41002 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41004/">CVE-2024-41004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41004">CVE-2024-41004 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41006/">CVE-2024-41006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41006">CVE-2024-41006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41009/">CVE-2024-41009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41009">CVE-2024-41009 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41011/">CVE-2024-41011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41011">CVE-2024-41011 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41012/">CVE-2024-41012 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41012">CVE-2024-41012 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41013/">CVE-2024-41013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41013">CVE-2024-41013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41014/">CVE-2024-41014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41014">CVE-2024-41014 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41015/">CVE-2024-41015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41015">CVE-2024-41015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41016/">CVE-2024-41016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41016">CVE-2024-41016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41017/">CVE-2024-41017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41017">CVE-2024-41017 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41040/">CVE-2024-41040 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41040">CVE-2024-41040 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41041/">CVE-2024-41041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41041">CVE-2024-41041 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-41044/">CVE-2024-41044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41044">CVE-2024-41044 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41048/">CVE-2024-41048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41048">CVE-2024-41048 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41057/">CVE-2024-41057 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41057">CVE-2024-41057 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41058/">CVE-2024-41058 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41058">CVE-2024-41058 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41059/">CVE-2024-41059 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41059">CVE-2024-41059 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41063/">CVE-2024-41063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41063">CVE-2024-41063 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41064/">CVE-2024-41064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41064">CVE-2024-41064 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41066/">CVE-2024-41066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41066">CVE-2024-41066 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41069/">CVE-2024-41069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41069">CVE-2024-41069 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41070/">CVE-2024-41070 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41070">CVE-2024-41070 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41071/">CVE-2024-41071 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41071">CVE-2024-41071 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41072/">CVE-2024-41072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41072">CVE-2024-41072 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41076/">CVE-2024-41076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41076">CVE-2024-41076 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41078/">CVE-2024-41078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41078">CVE-2024-41078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41081/">CVE-2024-41081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41081">CVE-2024-41081 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41087/">CVE-2024-41087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41087">CVE-2024-41087 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41090/">CVE-2024-41090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41090">CVE-2024-41090 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41091/">CVE-2024-41091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41091">CVE-2024-41091 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42070/">CVE-2024-42070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42070">CVE-2024-42070 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42079/">CVE-2024-42079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42079">CVE-2024-42079 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-42093/">CVE-2024-42093 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42093">CVE-2024-42093 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42096/">CVE-2024-42096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42096">CVE-2024-42096 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42105/">CVE-2024-42105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42105">CVE-2024-42105 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42122/">CVE-2024-42122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42122">CVE-2024-42122 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42124/">CVE-2024-42124 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42124">CVE-2024-42124 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42145/">CVE-2024-42145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42145">CVE-2024-42145 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42161/">CVE-2024-42161 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42161">CVE-2024-42161 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42224/">CVE-2024-42224 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42224">CVE-2024-42224 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42230/">CVE-2024-42230 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42230">CVE-2024-42230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009879908" comment="cluster-md-kmp-azure-5.14.21-150500.33.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879909" comment="dlm-kmp-azure-5.14.21-150500.33.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879910" comment="gfs2-kmp-azure-5.14.21-150500.33.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879911" comment="kernel-azure-5.14.21-150500.33.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879912" comment="kernel-azure-devel-5.14.21-150500.33.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879913" comment="kernel-azure-extra-5.14.21-150500.33.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879914" comment="kernel-azure-livepatch-devel-5.14.21-150500.33.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879915" comment="kernel-azure-optional-5.14.21-150500.33.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879916" comment="kernel-azure-vdso-5.14.21-150500.33.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879917" comment="kernel-devel-azure-5.14.21-150500.33.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879918" comment="kernel-source-azure-5.14.21-150500.33.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879919" comment="kernel-syms-azure-5.14.21-150500.33.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879920" comment="kselftests-kmp-azure-5.14.21-150500.33.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879921" comment="ocfs2-kmp-azure-5.14.21-150500.33.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009879922" comment="reiserfs-kmp-azure-5.14.21-150500.33.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4913" version="1" class="patch">
	<metadata>
		<title>Security update for runc (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218894" ref_url="https://bugzilla.suse.com/1218894" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21626" ref_url="https://www.suse.com/security/cve/CVE-2024-21626/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017833.html" source="SUSE-SU"/>
		<description>
This update for runc fixes the following issues:

Update to runc v1.1.11:

- CVE-2024-21626: Fixed container breakout. (bsc#1218894)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-01"/>
	<updated date="2024-02-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218894">SUSE bug 1218894</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21626/">CVE-2024-21626 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21626">CVE-2024-21626 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845170" comment="runc-1.1.11-150000.58.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4914" version="1" class="patch">
	<metadata>
		<title>Security update for osc (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1122683" ref_url="https://bugzilla.suse.com/1122683" source="BUGZILLA"/>
		<reference ref_id="1212476" ref_url="https://bugzilla.suse.com/1212476" source="BUGZILLA"/>
		<reference ref_id="1218170" ref_url="https://bugzilla.suse.com/1218170" source="BUGZILLA"/>
		<reference ref_id="1221340" ref_url="https://bugzilla.suse.com/1221340" source="BUGZILLA"/>
		<reference ref_id="1225911" ref_url="https://bugzilla.suse.com/1225911" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-22034" ref_url="https://www.suse.com/security/cve/CVE-2024-22034/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2961-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036632.html" source="SUSE-SU"/>
		<description>
This update for osc fixes the following issues:

- 1.9.0
  - Security:
    - Fix possibility to overwrite special files in .osc (CVE-2024-22034 bsc#1225911)
      Source files are now stored in the 'sources' subdirectory which prevents
      name collisons. This requires changing version of '.osc' store to 2.0.
  - Command-line:
    - Introduce build --checks parameter
  - Library:
    - OscConfigParser: Remove automatic __name__ option

- 1.8.3
  - Command-line:
    - Change 'repairwc' command to always run all repair steps
  - Library:
    - Make most of the fields in KeyinfoPubkey and KeyinfoSslcert models optional
    - Fix colorize() to avoid wrapping empty string into color escape sequences
    - Provide default values for kwargs.get/pop in get_results() function

- 1.8.2
  - Library:
    - Change 'repairwc' command to fix missing .osc/_osclib_version
    - Make error message in check_store_version() more generic to work for both projects and packages
    - Fix check_store_version in project store

- 1.8.1
  - Command-line:
    - Fix 'linkpac' command crash when used with '--disable-build' or '--disable-publish' option

- 1.8.0
  - Command-line:
    - Improve 'submitrequest' command to inherit description from superseded request
    - Fix 'mv' command when renaming a file multiple times
    - Improve 'info' command to support projects
    - Improve 'getbinaries' command by accepting '-M' / '--multibuild-package' option outside checkouts
    - Add architecture filtering to 'release' command
    - Change 'results' command so the normal and multibuild packages have the same output
    - Change 'results' command to use csv writer instead of formatting csv as string
    - Add couple mutually exclusive options errors to 'results' command
    - Set a default value for 'results --format' only for the csv output
    - Add support for 'results --format' for the default text mode
    - Update help text for '--format' option in 'results' command
    - Add 'results --fail-on-error/-F' flag
    - Redirect venv warnings from stderr to debug output
  - Configuration:
    - Fix config parser to throw an exception on duplicate sections or options
    - Modify conf.get_config() to print permissions warning to stderr rather than stdout
  - Library:
    - Run check_store_version() in obs_scm.Store and fix related code in Project and Package
    - Forbid extracting files with absolute path from 'cpio' archives (bsc#1122683)
    - Forbid extracting files with absolute path from 'ar' archives (bsc#1122683)
    - Remove no longer valid warning from core.unpack_srcrpm()
    - Make obs_api.KeyinfoSslcert keyid and fingerprint fields optional
    - Fix return value in build build.create_build_descr_data()
    - Fix core.get_package_results() to obey 'multibuild_packages' argument
  - Tests:
    - Fix tests so they don't modify fixtures

- 1.7.0
  - Command-line:
    - Add 'person search' command
    - Add 'person register' command
    - Add '-M/--multibuild-package' option to '[what]dependson' commands
    - Update '-U/--user' option in 'maintainer' command to accept also an email address
    - Fix 'branch' command to allow using '--new-package' option on packages that do not exist
    - Fix 'buildinfo' command to include obs:cli_debug_packages by default
    - Fix 'buildinfo' command to send complete local build environment as the 'build' command does
    - Fix 'maintainer --devel-project' to raise an error if running outside a working copy without any arguments
    - Fix handling arguments in 'service remoterun prj/pac'
    - Fix 'rebuild' command so the '--all' option conflicts with the 'package' argument
    - Fix crash when removing 'scmsync' element from dst package meta in 'linkpac' command
    - Fix crash when reading dst package meta in 'linkpac' command
    - Allow `osc rpmlint` to infer prj/pkg from CWD
    - Propagate exit code from the run() and do_() commandline methods
    - Give a hint where a scmsync git is hosted
    - Fix crash in 'updatepacmetafromspec' command when working with an incomplete spec
    - Improve 'updatepacmetafromspec' command to expand rpm spec macros by calling rpmspec to query the data
    - Improve 'build' and 'buildinfo' commands by uploading *.inc files to OBS for parsing BuildRequires (bsc#1221340)
    - Improve 'service' command by printing names of running services
    - Improve 'getbinaries' command by ignoring source and debuginfo filters when a binary name is specified
    - Change 'build' command to pass '--jobs' option to 'build' tool only if 'build_jobs' &gt; 0
    - Clarify 'list' command's help that that listing binaries doesn't contain md5 checksums
    - Improve 'log' command: produce proper CSV and XML outputs, add -p/--patch option for the text output
    - Allow setlinkrev to set a specific vrev
    - Document '--buildtool-opt=--noclean' example in 'build' command's help
    - Fix handling the default package argument on the command-line
  - Configuration:
    - Document loading configuration from env variables
  - Connection:
    - Don't retry on error 400
    - Remove now unused 'retry_on_400' http_request() option from XmlModel
    - Revert 'Don't retry on 400 HTTP status code in core.server_diff()'
    - Revert 'connection: Allow disabling retry on 400 HTTP status code'
  - Authentication:
    - Update SignatureAuthHandler to support specifying ssh key by its fingerprint
    - Use ssh key from ssh agent that contains comment 'obs=&lt;apiurl-hostname&gt;'
    - Use strings instead of bytes in SignatureAuthHandler
    - Cache password from SecretService to avoid spamming user with an accept dialog
    - Never ask for credentials when displaying help
    - Remove unused SignatureAuthHandler.get_fingerprint()
  - Library:
    - Add rootless build support for 'qemu' VM type
    - Support package linking of packages from scmsync projects
    - Fix do_createrequest() function to return None instead of request id
    - Replace invalid 'if' with 'elif' in BaseModel.dict()
    - Fix crash when no prefered packages are defined
    - Add XmlModel class that encapsulates manipulation with XML
    - Add obs_api.Person.cmd_register() for registering new users
    - Fix conf.get_config() to ignore file type bits when comparing oscrc perms
    - Fix conf.get_config() to correctly handle overrides when env variables are set
    - Fix output.tty.IS_INTERACTIVE when os.isatty() throws OSError
    - Improve cmdln.HelpFormatter to obey newline characters
    - Update list of color codes in 'output.tty' module
    - Remove core.setDevelProject() in favor of core.set_devel_project()
    - Move removing control characters to output.sanitize_text()
    - Improve sanitize_text() to keep selected CSI escape sequences
    - Add output.pipe_to_pager() that pipes lines to a pager without creating an intermediate temporary file
    - Fix output.safe_write() in connection with NamedTemporaryFile
    - Modernize output.run_pager()
    - Extend output.print_msg() to accept 'error' and 'warning' values of 'to_print' argument
    - Add XPathQuery class for translating keyword arguments to an xpath query
    - Add obs_api.Keyinfo class
    - Add obs_api.Package class
    - Add Package.get_revision_list() for listing commit log
    - Add obs_api.PackageSources class for handling OBS SCM sources
    - Add obs_api.Person class
    - Add obs_api.Project class
    - Add obs_api.Request class
    - Add obs_api.Token class
    - Allow storing apiurl in the XmlModel instances
    - Allow retrieving default field value from top-level model
    - Fix BaseModel to convert dictionaries to objects on retrieving a model list
    - Fix BaseModel to always deepcopy mutable defaults on first use
    - Implement do_snapshot() and has_changed() methods to determine changes in BaseModel
    - Implement total ordering on BaseModel
    - Add comments with available attributes/elements to edited XML
  - Refactoring:
    - Migrate repo {list,add,remove} commands to obs_api.Project
    - Migrate core.show_package_disabled_repos() to obs_api.Package
    - Migrate core.Package.update_package_meta() to obs_api.Package
    - Migrate core.get_repos_of_project() to obs_api.Project
    - Migrate core.get_repositories_of_project() to obs_api.Project
    - Migrate core.show_scmsync() to obs_api.{Package,Project}
    - Migrate core.set_devel_project() to obs_api.Package
    - Migrate core.show_devel_project() to obs_api.Package
    - Migrate Fetcher.run() to obs_api.Keyinfo
    - Migrate core.create_submit_request() to obs_api.Request
    - Migrate 'token' command to obs_api.Token
    - Migrate 'whois/user' command to obs_api.Person
    - Migrate 'signkey' command to obs_api.Keyinfo
    - Move print_msg() to the 'osc.output' module
    - Move run_pager() and get_default_pager() from 'core' to 'output' module
    - Move core.Package to obs_scm.Package
    - Move core.Project to obs_scm.Project
    - Move functions manipulating store from core to obs_scm.store
    - Move store.Store to obs_scm.Store
    - Move core.Linkinfo to obs_scm.Linkinfo
    - Move core.Serviceinfo to obs_scm.Serviceinfo
    - Move core.File to obs_scm.File
    - Merge _private.project.ProjectMeta into obs_api.Project
  - Spec:
    - Remove dependency on /usr/bin/python3 using %python3_fix_shebang macro (bsc#1212476)

- 1.6.2
  - Command-line:
    - Fix 'branch' command to allow using '--new-package' option on packages that do not exist
    - Fix 'buildinfo' command to include obs:cli_debug_packages by default
    - Fix 'buildinfo' command to send complete local build environment as the 'build' command does
    - Allow `osc rpmlint` to infer prj/pkg from CWD
    - Propagate exit code from the run() and do_() commandline methods
    - Give a hint where a scmsync git is hosted
    - Fix crash in 'updatepacmetafromspec' command when working with an incomplete spec
  - Authentication:
    - Cache password from SecretService to avoid spamming user with an accept dialog
    - Never ask for credentials when displaying help
  - Library:
    - Support package linking of packages from scmsync projects
    - Fix do_createrequest() function to return None instead of request id
    - Replace invalid 'if' with 'elif' in BaseModel.dict()
    - Fix crash when no prefered packages are defined

- 1.6.1
  - Command-line:
    - Use busybox compatible commands for completion
    - Change 'wipe' command to use the new get_user_input() function
    - Fix error 500 in running 'meta attribute &lt;prj&gt;'
  - Configuration:
    - Fix resolving config symlink to the actual config file
    - Honor XDG_CONFIG_HOME and XDG_CACHE_HOME env vars
    - Warn about ignoring XDG_CONFIG_HOME and ~/.config/osc/oscrc if ~/.oscrc exists
  - Library:
    - Error out when branching a scmsync package
    - New get_user_input() function for consistent handling of user input
    - Move xml_indent, xml_quote and xml_unquote to osc.util.xml module
    - Refactor makeurl(), deprecate query taking string or list arguments, drop osc_urlencode()
    - Remove all path quoting, rely on makeurl()
    - Always use dict query in makeurl()
    - Fix core.slash_split() to strip both leading and trailing slashes

- 1.6.0
  - Command-line:
    - The 'token --trigger' command no longer sets '--operation=runservice' by default.
    - Change 'token --create' command to require '--operation'
    - Fix 'linkdiff' command error 400: prj/pac/md5 not in repository
    - Update 'build' command to support building 'productcompose' build type with updateinfo.xml data
    - Don't show meter in terminals that are not interactive
    - Fix traceback when running osc from an arbitrary git repo that fails to map branch to a project (bsc#1218170)
  - Configuration:
    - Implement reading credentials from environmental variables
    - Allow starting with an empty config if --configfile is either empty or points to /dev/null
    - Implement 'quiet' conf option
    - Password can be an empty string (commonly used with ssh auth)
  - Connection:
    - Allow -X HEAD on osc api requests as well
  - Library:
    - Fix credentials managers to consistently return Password
    - Fix Password.encode() on python &lt; 3.8
    - Refactor 'meter' module, use config settings to pick the right class
    - Convert to using f-strings
    - Use Field.get_callback to handle quiet/verbose and http_debug/http_full_debug options
    - Implement get_callback that allows modifying returned value to the Field class
    - Add support for List[BaseModel] type to Field class
    - Report class name when reporting an error during instantiating BaseModel object
    - Fix exporting an empty model field in  BaseModel.dict()
    - Fix initializing a sub-model instance from a dictionary
    - Implement 'Enum' support in models
    - Fix Field.origin_type for Optional types
    - Drop unused 'exclude_unset' argument from BaseModel.dict() method
    - Store cached model defaults in self._defaults, avoid sharing references to mutable defaults
    - Limit model attributes to predefined fields by forbidding creating new attributes on fly
    - Store model values in self._values dict instead of private attributes
  - Spec:
    - Recommend openssh-clients for ssh-add that is required during ssh auth
    - Add 0%{?amzn} macro that wasn't usptreamed
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-19"/>
	<updated date="2024-08-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1122683">SUSE bug 1122683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212476">SUSE bug 1212476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218170">SUSE bug 1218170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221340">SUSE bug 1221340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225911">SUSE bug 1225911</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-22034/">CVE-2024-22034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22034">CVE-2024-22034 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880243" comment="osc-1.9.0-150400.10.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4915" version="1" class="patch">
	<metadata>
		<title>Security update for python310 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1225660" ref_url="https://bugzilla.suse.com/1225660" source="BUGZILLA"/>
		<reference ref_id="1227378" ref_url="https://bugzilla.suse.com/1227378" source="BUGZILLA"/>
		<reference ref_id="1227999" ref_url="https://bugzilla.suse.com/1227999" source="BUGZILLA"/>
		<reference ref_id="1228780" ref_url="https://bugzilla.suse.com/1228780" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6923" ref_url="https://www.suse.com/security/cve/CVE-2024-6923/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:2974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019283.html" source="SUSE-SU"/>
		<description>
This update for python310 fixes the following issues:

Security issue fixed:

- CVE-2024-6923: Fixed email header injection due to unquoted newlines (bsc#1228780)

Non-security issues fixed:

- Improve python reproducible builds (bsc#1227999)
- Make pip and modern tools install directly in /usr/local when used by the user (bsc#1225660)
- Fixed executable bits for /usr/bin/idle* (bsc#1227378).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2024-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1225660">SUSE bug 1225660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227378">SUSE bug 1227378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227999">SUSE bug 1227999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228780">SUSE bug 1228780</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-6923/">CVE-2024-6923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6923">CVE-2024-6923 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009880267" comment="libpython3_10-1_0-3.10.14-150400.4.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880268" comment="libpython3_10-1_0-32bit-3.10.14-150400.4.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880269" comment="python310-3.10.14-150400.4.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880270" comment="python310-32bit-3.10.14-150400.4.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880271" comment="python310-base-3.10.14-150400.4.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880272" comment="python310-base-32bit-3.10.14-150400.4.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880273" comment="python310-curses-3.10.14-150400.4.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880274" comment="python310-dbm-3.10.14-150400.4.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880275" comment="python310-devel-3.10.14-150400.4.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880276" comment="python310-doc-3.10.14-150400.4.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880277" comment="python310-doc-devhelp-3.10.14-150400.4.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880278" comment="python310-idle-3.10.14-150400.4.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880279" comment="python310-testsuite-3.10.14-150400.4.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880280" comment="python310-tk-3.10.14-150400.4.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880281" comment="python310-tools-3.10.14-150400.4.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4916" version="1" class="patch">
	<metadata>
		<title>Security update for libcryptopp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218219" ref_url="https://bugzilla.suse.com/1218219" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-50980" ref_url="https://www.suse.com/security/cve/CVE-2023-50980/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017587.html" source="SUSE-SU"/>
		<description>
This update for libcryptopp fixes the following issues:

- CVE-2023-50980: Fixed DoS via malformed DER public key file (bsc#1218219).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-04"/>
	<updated date="2024-01-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218219">SUSE bug 1218219</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-50980/">CVE-2023-50980 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50980">CVE-2023-50980 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009817824" comment="libcryptopp-devel-8.6.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817825" comment="libcryptopp8_6_0-8.6.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817826" comment="libcryptopp8_6_0-32bit-8.6.0-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4917" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226316" ref_url="https://bugzilla.suse.com/1226316" source="BUGZILLA"/>
		<reference ref_id="1228648" ref_url="https://bugzilla.suse.com/1228648" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6600" ref_url="https://www.suse.com/security/cve/CVE-2024-6600/" source="CVE"/>
		<reference ref_id="CVE-2024-6601" ref_url="https://www.suse.com/security/cve/CVE-2024-6601/" source="CVE"/>
		<reference ref_id="CVE-2024-6602" ref_url="https://www.suse.com/security/cve/CVE-2024-6602/" source="CVE"/>
		<reference ref_id="CVE-2024-6603" ref_url="https://www.suse.com/security/cve/CVE-2024-6603/" source="CVE"/>
		<reference ref_id="CVE-2024-6604" ref_url="https://www.suse.com/security/cve/CVE-2024-6604/" source="CVE"/>
		<reference ref_id="CVE-2024-6605" ref_url="https://www.suse.com/security/cve/CVE-2024-6605/" source="CVE"/>
		<reference ref_id="CVE-2024-6606" ref_url="https://www.suse.com/security/cve/CVE-2024-6606/" source="CVE"/>
		<reference ref_id="CVE-2024-6607" ref_url="https://www.suse.com/security/cve/CVE-2024-6607/" source="CVE"/>
		<reference ref_id="CVE-2024-6608" ref_url="https://www.suse.com/security/cve/CVE-2024-6608/" source="CVE"/>
		<reference ref_id="CVE-2024-6609" ref_url="https://www.suse.com/security/cve/CVE-2024-6609/" source="CVE"/>
		<reference ref_id="CVE-2024-6610" ref_url="https://www.suse.com/security/cve/CVE-2024-6610/" source="CVE"/>
		<reference ref_id="CVE-2024-6611" ref_url="https://www.suse.com/security/cve/CVE-2024-6611/" source="CVE"/>
		<reference ref_id="CVE-2024-6612" ref_url="https://www.suse.com/security/cve/CVE-2024-6612/" source="CVE"/>
		<reference ref_id="CVE-2024-6613" ref_url="https://www.suse.com/security/cve/CVE-2024-6613/" source="CVE"/>
		<reference ref_id="CVE-2024-6614" ref_url="https://www.suse.com/security/cve/CVE-2024-6614/" source="CVE"/>
		<reference ref_id="CVE-2024-6615" ref_url="https://www.suse.com/security/cve/CVE-2024-6615/" source="CVE"/>
		<reference ref_id="CVE-2024-7518" ref_url="https://www.suse.com/security/cve/CVE-2024-7518/" source="CVE"/>
		<reference ref_id="CVE-2024-7519" ref_url="https://www.suse.com/security/cve/CVE-2024-7519/" source="CVE"/>
		<reference ref_id="CVE-2024-7520" ref_url="https://www.suse.com/security/cve/CVE-2024-7520/" source="CVE"/>
		<reference ref_id="CVE-2024-7521" ref_url="https://www.suse.com/security/cve/CVE-2024-7521/" source="CVE"/>
		<reference ref_id="CVE-2024-7522" ref_url="https://www.suse.com/security/cve/CVE-2024-7522/" source="CVE"/>
		<reference ref_id="CVE-2024-7524" ref_url="https://www.suse.com/security/cve/CVE-2024-7524/" source="CVE"/>
		<reference ref_id="CVE-2024-7525" ref_url="https://www.suse.com/security/cve/CVE-2024-7525/" source="CVE"/>
		<reference ref_id="CVE-2024-7526" ref_url="https://www.suse.com/security/cve/CVE-2024-7526/" source="CVE"/>
		<reference ref_id="CVE-2024-7527" ref_url="https://www.suse.com/security/cve/CVE-2024-7527/" source="CVE"/>
		<reference ref_id="CVE-2024-7528" ref_url="https://www.suse.com/security/cve/CVE-2024-7528/" source="CVE"/>
		<reference ref_id="CVE-2024-7529" ref_url="https://www.suse.com/security/cve/CVE-2024-7529/" source="CVE"/>
		<reference ref_id="CVE-2024-7531" ref_url="https://www.suse.com/security/cve/CVE-2024-7531/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036668.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:
  
 Update to Firefox Extended Support Release 128.1.0 ESR (MFSA 2024-35, bsc#1228648)
  - CVE-2024-7518: Fullscreen notification dialog can be obscured by document 
  - CVE-2024-7519: Out of bounds memory access in graphics shared memory handling
  - CVE-2024-7520: Type confusion in WebAssembly
  - CVE-2024-7521: Incomplete WebAssembly exception handing
  - CVE-2024-7522: Out of bounds read in editor component
  - CVE-2024-7524: CSP strict-dynamic bypass using web-compatibility shims
  - CVE-2024-7525: Missing permission check when creating a StreamFilter
  - CVE-2024-7526: Uninitialized memory used by WebGL
  - CVE-2024-7527: Use-after-free in JavaScript garbage collection
  - CVE-2024-7528: Use-after-free in IndexedDB
  - CVE-2024-7529: Document content could partially obscure security prompts
  - CVE-2024-7531: PK11_Encrypt using CKM_CHACHA20 can reveal plaintext on Intel
  		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2024-08-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1226316">SUSE bug 1226316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228648">SUSE bug 1228648</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6600/">CVE-2024-6600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6600">CVE-2024-6600 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-6601/">CVE-2024-6601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6601">CVE-2024-6601 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6602/">CVE-2024-6602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6602">CVE-2024-6602 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6603/">CVE-2024-6603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6603">CVE-2024-6603 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6604/">CVE-2024-6604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6604">CVE-2024-6604 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-6605/">CVE-2024-6605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6605">CVE-2024-6605 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6606/">CVE-2024-6606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6606">CVE-2024-6606 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-6607/">CVE-2024-6607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6607">CVE-2024-6607 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6608/">CVE-2024-6608 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6608">CVE-2024-6608 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6609/">CVE-2024-6609 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6609">CVE-2024-6609 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6610/">CVE-2024-6610 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6610">CVE-2024-6610 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6611/">CVE-2024-6611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6611">CVE-2024-6611 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6612/">CVE-2024-6612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6612">CVE-2024-6612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6613/">CVE-2024-6613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6613">CVE-2024-6613 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-6614/">CVE-2024-6614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6614">CVE-2024-6614 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6615/">CVE-2024-6615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6615">CVE-2024-6615 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-7518/">CVE-2024-7518 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7518">CVE-2024-7518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7519/">CVE-2024-7519 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7519">CVE-2024-7519 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7520/">CVE-2024-7520 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7520">CVE-2024-7520 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7521/">CVE-2024-7521 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7521">CVE-2024-7521 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7522/">CVE-2024-7522 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7522">CVE-2024-7522 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7524/">CVE-2024-7524 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7524">CVE-2024-7524 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7525/">CVE-2024-7525 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7525">CVE-2024-7525 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7526/">CVE-2024-7526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7526">CVE-2024-7526 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7527/">CVE-2024-7527 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7527">CVE-2024-7527 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7528/">CVE-2024-7528 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7528">CVE-2024-7528 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-7529/">CVE-2024-7529 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7529">CVE-2024-7529 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7531/">CVE-2024-7531 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7531">CVE-2024-7531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009880961" comment="MozillaFirefox-128.1.0-150200.152.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880962" comment="MozillaFirefox-branding-SLE-128-150200.9.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880963" comment="MozillaFirefox-branding-upstream-128.1.0-150200.152.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880964" comment="MozillaFirefox-devel-128.1.0-150200.152.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880965" comment="MozillaFirefox-translations-common-128.1.0-150200.152.146.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009880966" comment="MozillaFirefox-translations-other-128.1.0-150200.152.146.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4918" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226463" ref_url="https://bugzilla.suse.com/1226463" source="BUGZILLA"/>
		<reference ref_id="1227138" ref_url="https://bugzilla.suse.com/1227138" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-5535" ref_url="https://www.suse.com/security/cve/CVE-2024-5535/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036687.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138)

Other fixes:
- Build with no-afalgeng (bsc#1226463)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2024-08-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1226463">SUSE bug 1226463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227138">SUSE bug 1227138</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-5535/">CVE-2024-5535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5535">CVE-2024-5535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009881243" comment="libopenssl-3-devel-3.0.8-150500.5.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881244" comment="libopenssl-3-devel-32bit-3.0.8-150500.5.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881245" comment="libopenssl3-3.0.8-150500.5.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881246" comment="libopenssl3-32bit-3.0.8-150500.5.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881247" comment="openssl-3-3.0.8-150500.5.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881248" comment="openssl-3-doc-3.0.8-150500.5.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4919" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218571" ref_url="https://bugzilla.suse.com/1218571" source="BUGZILLA"/>
		<reference ref_id="1219238" ref_url="https://bugzilla.suse.com/1219238" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-7207" ref_url="https://www.suse.com/security/cve/CVE-2023-7207/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017842.html" source="SUSE-SU"/>
		<description>
This update for cpio fixes the following issues:

- Fixed cpio not extracting correctly when using --no-absolute-filenames option the security fix for CVE-2023-7207 (bsc#1218571, bsc#1219238)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-11"/>
	<updated date="2024-03-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218571">SUSE bug 1218571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219238">SUSE bug 1219238</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-7207/">CVE-2023-7207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-7207">CVE-2023-7207 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009845171" comment="cpio-2.13-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845172" comment="cpio-lang-2.13-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845173" comment="cpio-mt-2.13-150400.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4920" version="1" class="patch">
	<metadata>
		<title>Security update for python3-setuptools (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228105" ref_url="https://bugzilla.suse.com/1228105" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6345" ref_url="https://www.suse.com/security/cve/CVE-2024-6345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036709.html" source="SUSE-SU"/>
		<description>
This update for python3-setuptools fixes the following issues:

- CVE-2024-6345: Fixed code execution via download functions in the package_index module (bsc#1228105)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-28"/>
	<updated date="2024-08-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1228105">SUSE bug 1228105</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6345/">CVE-2024-6345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6345">CVE-2024-6345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009881385" comment="python3-setuptools-44.1.1-150400.9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881386" comment="python3-setuptools-test-44.1.1-150400.9.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881387" comment="python3-setuptools-wheel-44.1.1-150400.9.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4921" version="1" class="patch">
	<metadata>
		<title>Security update for python-setuptools (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228105" ref_url="https://bugzilla.suse.com/1228105" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6345" ref_url="https://www.suse.com/security/cve/CVE-2024-6345/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036708.html" source="SUSE-SU"/>
		<description>
This update for python-setuptools fixes the following issues:

- CVE-2024-6345: Fixed code execution via download functions in the package_index module (bsc#1228105)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-08-28"/>
	<updated date="2024-08-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1228105">SUSE bug 1228105</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6345/">CVE-2024-6345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6345">CVE-2024-6345 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009881388" comment="python311-setuptools-67.7.2-150400.3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4922" version="1" class="patch">
	<metadata>
		<title>Security update for unbound (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229068" ref_url="https://bugzilla.suse.com/1229068" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-43167" ref_url="https://www.suse.com/security/cve/CVE-2024-43167/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036728.html" source="SUSE-SU"/>
		<description>
This update for unbound fixes the following issues:

- CVE-2024-43167: Fix null pointer dereference issue in function ub_ctx_set_fwd (bsc#1229068)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-02"/>
	<updated date="2024-09-02"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1229068">SUSE bug 1229068</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43167/">CVE-2024-43167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43167">CVE-2024-43167 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940222" comment="libunbound8-1.20.0-150100.10.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940223" comment="unbound-1.20.0-150100.10.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940224" comment="unbound-anchor-1.20.0-150100.10.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940225" comment="unbound-devel-1.20.0-150100.10.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940226" comment="unbound-munin-1.20.0-150100.10.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940227" comment="unbound-python-1.20.0-150100.10.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4923" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1228574" ref_url="https://bugzilla.suse.com/1228574" source="BUGZILLA"/>
		<reference ref_id="1228575" ref_url="https://bugzilla.suse.com/1228575" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-31145" ref_url="https://www.suse.com/security/cve/CVE-2024-31145/" source="CVE"/>
		<reference ref_id="CVE-2024-31146" ref_url="https://www.suse.com/security/cve/CVE-2024-31146/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036727.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2024-31145: Fixed error handling in x86 IOMMU identity mapping (XSA-460, bsc#1228574)
- CVE-2024-31146: Fixed PCI device pass-through with shared resources (XSA-461, bsc#1228575)

Other fixes:
- Update to Xen 4.17.5 security bug fix release (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-02"/>
	<updated date="2024-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228574">SUSE bug 1228574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228575">SUSE bug 1228575</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31145/">CVE-2024-31145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31145">CVE-2024-31145 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-31146/">CVE-2024-31146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31146">CVE-2024-31146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940228" comment="xen-4.17.5_02-150500.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940229" comment="xen-devel-4.17.5_02-150500.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940230" comment="xen-doc-html-4.17.5_02-150500.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940231" comment="xen-libs-4.17.5_02-150500.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940232" comment="xen-libs-32bit-4.17.5_02-150500.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940233" comment="xen-tools-4.17.5_02-150500.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940234" comment="xen-tools-domU-4.17.5_02-150500.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940235" comment="xen-tools-xendomains-wait-disk-4.17.5_02-150500.3.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4924" version="1" class="patch">
	<metadata>
		<title>Security update for python39 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227233" ref_url="https://bugzilla.suse.com/1227233" source="BUGZILLA"/>
		<reference ref_id="1227378" ref_url="https://bugzilla.suse.com/1227378" source="BUGZILLA"/>
		<reference ref_id="1227999" ref_url="https://bugzilla.suse.com/1227999" source="BUGZILLA"/>
		<reference ref_id="1228780" ref_url="https://bugzilla.suse.com/1228780" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-5642" ref_url="https://www.suse.com/security/cve/CVE-2024-5642/" source="CVE"/>
		<reference ref_id="CVE-2024-6923" ref_url="https://www.suse.com/security/cve/CVE-2024-6923/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036726.html" source="SUSE-SU"/>
		<description>
This update for python39 fixes the following issues:

Security issues fixed:

- CVE-2024-6923: Fixed email header injection due to unquoted newlines (bsc#1228780)
- CVE-2024-5642: Removed support for anything but OpenSSL 1.1.1 or newer (bsc#1227233)

Non-security issues fixed:

- Fixed executable bits for /usr/bin/idle* (bsc#1227378).
- Improve python reproducible builds (bsc#1227999)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-02"/>
	<updated date="2024-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1227233">SUSE bug 1227233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227378">SUSE bug 1227378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227999">SUSE bug 1227999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228780">SUSE bug 1228780</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-5642/">CVE-2024-5642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5642">CVE-2024-5642 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-6923/">CVE-2024-6923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6923">CVE-2024-6923 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940236" comment="libpython3_9-1_0-3.9.19-150300.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940237" comment="libpython3_9-1_0-32bit-3.9.19-150300.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940238" comment="python39-3.9.19-150300.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940239" comment="python39-32bit-3.9.19-150300.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940240" comment="python39-base-3.9.19-150300.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940241" comment="python39-base-32bit-3.9.19-150300.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940242" comment="python39-curses-3.9.19-150300.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940243" comment="python39-dbm-3.9.19-150300.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940244" comment="python39-devel-3.9.19-150300.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940245" comment="python39-doc-3.9.19-150300.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940246" comment="python39-doc-devhelp-3.9.19-150300.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940247" comment="python39-idle-3.9.19-150300.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940248" comment="python39-testsuite-3.9.19-150300.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940249" comment="python39-tk-3.9.19-150300.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940250" comment="python39-tools-3.9.19-150300.4.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4925" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227322" ref_url="https://bugzilla.suse.com/1227322" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-4467" ref_url="https://www.suse.com/security/cve/CVE-2024-4467/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036725.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:
  
- CVE-2024-4467: Fixed denial of service and file read/write via qemu-img info command (bsc#1227322)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-02"/>
	<updated date="2024-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1227322">SUSE bug 1227322</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4467/">CVE-2024-4467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4467">CVE-2024-4467 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940251" comment="qemu-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940252" comment="qemu-SLOF-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940253" comment="qemu-accel-qtest-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940254" comment="qemu-accel-tcg-x86-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940255" comment="qemu-arm-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940256" comment="qemu-audio-alsa-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940257" comment="qemu-audio-dbus-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940258" comment="qemu-audio-jack-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940259" comment="qemu-audio-pa-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940260" comment="qemu-audio-spice-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940261" comment="qemu-block-curl-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940262" comment="qemu-block-dmg-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940263" comment="qemu-block-gluster-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940264" comment="qemu-block-iscsi-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940265" comment="qemu-block-nfs-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940266" comment="qemu-block-rbd-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940267" comment="qemu-block-ssh-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940268" comment="qemu-chardev-baum-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940269" comment="qemu-chardev-spice-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940270" comment="qemu-extra-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940271" comment="qemu-guest-agent-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940272" comment="qemu-hw-display-qxl-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940273" comment="qemu-hw-display-virtio-gpu-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940274" comment="qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940275" comment="qemu-hw-display-virtio-vga-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940276" comment="qemu-hw-s390x-virtio-gpu-ccw-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940277" comment="qemu-hw-usb-host-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940278" comment="qemu-hw-usb-redirect-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940279" comment="qemu-hw-usb-smartcard-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940280" comment="qemu-ipxe-1.0.0+-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940281" comment="qemu-ivshmem-tools-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940282" comment="qemu-ksm-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940283" comment="qemu-kvm-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940284" comment="qemu-lang-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940285" comment="qemu-microvm-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940286" comment="qemu-ppc-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940287" comment="qemu-s390x-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940288" comment="qemu-seabios-1.16.0_0_gd239552-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940289" comment="qemu-sgabios-8-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940290" comment="qemu-skiboot-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940291" comment="qemu-tools-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940292" comment="qemu-ui-curses-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940293" comment="qemu-ui-dbus-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940294" comment="qemu-ui-gtk-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940295" comment="qemu-ui-opengl-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940296" comment="qemu-ui-spice-app-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940297" comment="qemu-ui-spice-core-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940298" comment="qemu-vgabios-1.16.0_0_gd239552-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940299" comment="qemu-vhost-user-gpu-7.1.0-150500.49.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940300" comment="qemu-x86-7.1.0-150500.49.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4926" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtquick3d (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228199" ref_url="https://bugzilla.suse.com/1228199" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-40724" ref_url="https://www.suse.com/security/cve/CVE-2024-40724/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3078-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036724.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtquick3d fixes the following issues:

- CVE-2024-40724: Fixed heap-based buffer overflow in the PLY importer class in assimp (bsc#1228199)

Other fixes:
- Fix progressive anti-aliasing, which doesn't work if any object in the scene used a PrincipledMaterial
- Skip processing unknown uniforms, such as those that are vendor specific:
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-02"/>
	<updated date="2024-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1228199">SUSE bug 1228199</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40724/">CVE-2024-40724 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40724">CVE-2024-40724 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940301" comment="libQt5Quick3D5-5.15.8+kde1-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940302" comment="libQt5Quick3DAssetImport5-5.15.8+kde1-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940303" comment="libqt5-qtquick3d-devel-5.15.8+kde1-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940304" comment="libqt5-qtquick3d-examples-5.15.8+kde1-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940305" comment="libqt5-qtquick3d-imports-5.15.8+kde1-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940306" comment="libqt5-qtquick3d-private-headers-devel-5.15.8+kde1-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940307" comment="libqt5-qtquick3d-tools-5.15.8+kde1-150500.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4927" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qt3d (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228204" ref_url="https://bugzilla.suse.com/1228204" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-40724" ref_url="https://www.suse.com/security/cve/CVE-2024-40724/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3079-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036723.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qt3d fixes the following issues:

- CVE-2024-40724: Fixed heap-based buffer overflow in the PLY importer class in assimp (bsc#1228204)

Other fixes:
- Check for a nullptr returned from the shader manager
- Fill image with transparency by default to avoid having junk if it's not filled properly before the first paint call
- Fix QTextureAtlas parenting that could lead to crashes due to being used after free'd.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-02"/>
	<updated date="2024-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1228204">SUSE bug 1228204</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40724/">CVE-2024-40724 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40724">CVE-2024-40724 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940308" comment="libQt53DAnimation-devel-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940309" comment="libQt53DAnimation5-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940310" comment="libQt53DCore-devel-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940311" comment="libQt53DCore5-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940312" comment="libQt53DExtras-devel-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940313" comment="libQt53DExtras5-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940314" comment="libQt53DInput-devel-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940315" comment="libQt53DInput5-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940316" comment="libQt53DLogic-devel-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940317" comment="libQt53DLogic5-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940318" comment="libQt53DQuick-devel-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940319" comment="libQt53DQuick5-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940320" comment="libQt53DQuickAnimation-devel-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940321" comment="libQt53DQuickAnimation5-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940322" comment="libQt53DQuickExtras-devel-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940323" comment="libQt53DQuickExtras5-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940324" comment="libQt53DQuickInput-devel-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940325" comment="libQt53DQuickInput5-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940326" comment="libQt53DQuickRender-devel-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940327" comment="libQt53DQuickRender5-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940328" comment="libQt53DQuickScene2D-devel-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940329" comment="libQt53DQuickScene2D5-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940330" comment="libQt53DRender-devel-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940331" comment="libQt53DRender5-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940332" comment="libqt5-qt3d-devel-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940333" comment="libqt5-qt3d-examples-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940334" comment="libqt5-qt3d-imports-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940335" comment="libqt5-qt3d-private-headers-devel-5.15.8+kde0-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940336" comment="libqt5-qt3d-tools-5.15.8+kde0-150500.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4928" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228535" ref_url="https://bugzilla.suse.com/1228535" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-7264" ref_url="https://www.suse.com/security/cve/CVE-2024-7264/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3080-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036722.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

  - CVE-2024-7264: Fixed out-of-bounds read in ASN.1 date parser GTime2str() (bsc#1228535)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-02"/>
	<updated date="2024-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1228535">SUSE bug 1228535</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7264/">CVE-2024-7264 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7264">CVE-2024-7264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940337" comment="curl-8.0.1-150400.5.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940338" comment="libcurl-devel-8.0.1-150400.5.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940339" comment="libcurl-devel-32bit-8.0.1-150400.5.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940340" comment="libcurl4-8.0.1-150400.5.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940341" comment="libcurl4-32bit-8.0.1-150400.5.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4929" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229069" ref_url="https://bugzilla.suse.com/1229069" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-31315" ref_url="https://www.suse.com/security/cve/CVE-2023-31315/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3081-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036721.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

- CVE-2023-31315: Fixed validation in a model specific register (MSR) that lead to modification of SMM configuration by malicious program with ring0 access (bsc#1229069)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-02"/>
	<updated date="2024-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229069">SUSE bug 1229069</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31315/">CVE-2023-31315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-31315">CVE-2023-31315 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940342" comment="kernel-firmware-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940343" comment="kernel-firmware-all-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940344" comment="kernel-firmware-amdgpu-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940345" comment="kernel-firmware-ath10k-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940346" comment="kernel-firmware-ath11k-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940347" comment="kernel-firmware-atheros-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940348" comment="kernel-firmware-bluetooth-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940349" comment="kernel-firmware-bnx2-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940350" comment="kernel-firmware-brcm-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940351" comment="kernel-firmware-chelsio-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940352" comment="kernel-firmware-dpaa2-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940353" comment="kernel-firmware-i915-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940354" comment="kernel-firmware-intel-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940355" comment="kernel-firmware-iwlwifi-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940356" comment="kernel-firmware-liquidio-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940357" comment="kernel-firmware-marvell-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940358" comment="kernel-firmware-media-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940359" comment="kernel-firmware-mediatek-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940360" comment="kernel-firmware-mellanox-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940361" comment="kernel-firmware-mwifiex-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940362" comment="kernel-firmware-network-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940363" comment="kernel-firmware-nfp-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940364" comment="kernel-firmware-nvidia-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940365" comment="kernel-firmware-platform-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940366" comment="kernel-firmware-prestera-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940367" comment="kernel-firmware-qcom-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940368" comment="kernel-firmware-qlogic-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940369" comment="kernel-firmware-radeon-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940370" comment="kernel-firmware-realtek-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940371" comment="kernel-firmware-serial-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940372" comment="kernel-firmware-sound-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940373" comment="kernel-firmware-ti-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940374" comment="kernel-firmware-ueagle-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940375" comment="kernel-firmware-usb-network-20230724-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940376" comment="ucode-amd-20230724-150500.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4930" version="1" class="patch">
	<metadata>
		<title>Security update for 389-ds (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1225507" ref_url="https://bugzilla.suse.com/1225507" source="BUGZILLA"/>
		<reference ref_id="1225512" ref_url="https://bugzilla.suse.com/1225512" source="BUGZILLA"/>
		<reference ref_id="1226277" ref_url="https://bugzilla.suse.com/1226277" source="BUGZILLA"/>
		<reference ref_id="1228912" ref_url="https://bugzilla.suse.com/1228912" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2199" ref_url="https://www.suse.com/security/cve/CVE-2024-2199/" source="CVE"/>
		<reference ref_id="CVE-2024-3657" ref_url="https://www.suse.com/security/cve/CVE-2024-3657/" source="CVE"/>
		<reference ref_id="CVE-2024-5953" ref_url="https://www.suse.com/security/cve/CVE-2024-5953/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036720.html" source="SUSE-SU"/>
		<description>
This update for 389-ds fixes the following issues:

Security issues fixed:

- CVE-2024-3657: Fixed potential denial of service via specially crafted kerberos AS-REQ request (bsc#1225512)
- CVE-2024-5953: Fixed a denial of service caused by malformed userPassword hashes (bsc#1226277)
- CVE-2024-2199: Fixed a crash caused by malformed userPassword in do_modify() (bsc#1225507)

Non-security issues fixed:

- crash when user does change password using iso-8859-1 encoding (bsc#1228912)

- Update to version 2.2.10~git2.345056d3:
  * Issue 2324 - Add a CI test (#6289)
  * Issue 6284 - BUG - freelist ordering causes high wtime

- Update to version 2.2.10~git0.4d7218b7:
  * Bump version to 2.2.10
  * Issue 5327 - Fix test metadata
  * Issue 5853 - Update Cargo.lock
  * Issue 5962 - Rearrange includes for 32-bit support logic
  * Issue 5973 - Fix fedora cop RawHide builds (#5974)
  * Bump braces from 3.0.2 to 3.0.3 in /src/cockpit/389-console
  * Issue 6254 - Enabling replication for a sub suffix crashes browser (#6255)
  * Issue 6224 - d2entry - Could not open id2entry err 0 - at startup when having sub-suffixes (#6225)
  * Issue 6183 - Slow ldif2db import on a newly created BDB backend (#6208)
  * Issue 6170 - audit log buffering doesn't handle large updates
  * Issue 6193 - Test failure: test_tls_command_returns_error_text
  * Issue 6189 - CI tests fail with `[Errno 2] No such file or directory: '/var/cache/dnf/metadata_lock.pid'`
  * Issue 6172 - RFE: improve the performance of evaluation of filter component when tested against a large valueset (like group members) (#6173)
  * Issue 6092 - passwordHistory is not updated with a pre-hashed password (#6093)
  * Issue 6080 - ns-slapd crash in referint_get_config (#6081)
  * Issue 6117 - Fix the UTC offset print (#6118)
  * Issue 5305 - OpenLDAP version autodetection doesn't work
  * Issue 6112 - RFE - add new operation note for MFA authentications
  * Issue 5842 - Add log buffering to audit log
  * Issue 6103 - New connection timeout error breaks errormap (#6104)
  * Issue 6067 - Improve dsidm CLI No Such Entry handling (#6079)
  * Issue 6096 - Improve connection timeout error logging (#6097)
  * Issue 6067 - Add hidden -v and -j options to each CLI subcommand (#6088)
  * Issue 5487 - Fix various isses with logconv.pl (#6085)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-02"/>
	<updated date="2024-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1225507">SUSE bug 1225507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225512">SUSE bug 1225512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226277">SUSE bug 1226277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228912">SUSE bug 1228912</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2199/">CVE-2024-2199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2199">CVE-2024-2199 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3657/">CVE-2024-3657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3657">CVE-2024-3657 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-5953/">CVE-2024-5953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5953">CVE-2024-5953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940377" comment="389-ds-2.2.10~git2.345056d3-150500.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940378" comment="389-ds-devel-2.2.10~git2.345056d3-150500.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940379" comment="389-ds-snmp-2.2.10~git2.345056d3-150500.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940380" comment="lib389-2.2.10~git2.345056d3-150500.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940381" comment="libsvrcore0-2.2.10~git2.345056d3-150500.3.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4931" version="1" class="patch">
	<metadata>
		<title>Security update for zziplib (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227178" ref_url="https://bugzilla.suse.com/1227178" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-39134" ref_url="https://www.suse.com/security/cve/CVE-2024-39134/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019333.html" source="SUSE-SU"/>
		<description>
This update for zziplib fixes the following issues:

- CVE-2024-39134: Fixed a stack buffer overflow via the __zzip_fetch_disk_trailer() (bsc#1227178)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-02"/>
	<updated date="2024-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1227178">SUSE bug 1227178</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39134/">CVE-2024-39134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39134">CVE-2024-39134 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940382" comment="libzzip-0-13-0.13.69-150000.3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940383" comment="libzzip-0-13-32bit-0.13.69-150000.3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940384" comment="zziplib-devel-0.13.69-150000.3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940385" comment="zziplib-devel-32bit-0.13.69-150000.3.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4932" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224044" ref_url="https://bugzilla.suse.com/1224044" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-34397" ref_url="https://www.suse.com/security/cve/CVE-2024-34397/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019344.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

- Fixed a possible use after free regression introduced by CVE-2024-34397 patch (bsc#1224044).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-09-03"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1224044">SUSE bug 1224044</bugzilla>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-34397/">CVE-2024-34397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34397">CVE-2024-34397 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940522" comment="gio-branding-upstream-2.70.5-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940523" comment="glib2-devel-2.70.5-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940524" comment="glib2-devel-32bit-2.70.5-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940525" comment="glib2-devel-static-2.70.5-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940526" comment="glib2-doc-2.70.5-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940527" comment="glib2-lang-2.70.5-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940528" comment="glib2-tests-devel-2.70.5-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940529" comment="glib2-tools-2.70.5-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940530" comment="glib2-tools-32bit-2.70.5-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940531" comment="libgio-2_0-0-2.70.5-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940532" comment="libgio-2_0-0-32bit-2.70.5-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940533" comment="libglib-2_0-0-2.70.5-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940534" comment="libglib-2_0-0-32bit-2.70.5-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940535" comment="libgmodule-2_0-0-2.70.5-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940536" comment="libgmodule-2_0-0-32bit-2.70.5-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940537" comment="libgobject-2_0-0-2.70.5-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940538" comment="libgobject-2_0-0-32bit-2.70.5-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940539" comment="libgthread-2_0-0-2.70.5-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940540" comment="libgthread-2_0-0-32bit-2.70.5-150400.3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4933" version="1" class="patch">
	<metadata>
		<title>Security update for go1.21-openssl (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="1219988" ref_url="https://bugzilla.suse.com/1219988" source="BUGZILLA"/>
		<reference ref_id="1220999" ref_url="https://bugzilla.suse.com/1220999" source="BUGZILLA"/>
		<reference ref_id="1221000" ref_url="https://bugzilla.suse.com/1221000" source="BUGZILLA"/>
		<reference ref_id="1221001" ref_url="https://bugzilla.suse.com/1221001" source="BUGZILLA"/>
		<reference ref_id="1221002" ref_url="https://bugzilla.suse.com/1221002" source="BUGZILLA"/>
		<reference ref_id="1221003" ref_url="https://bugzilla.suse.com/1221003" source="BUGZILLA"/>
		<reference ref_id="1221400" ref_url="https://bugzilla.suse.com/1221400" source="BUGZILLA"/>
		<reference ref_id="1224017" ref_url="https://bugzilla.suse.com/1224017" source="BUGZILLA"/>
		<reference ref_id="1225973" ref_url="https://bugzilla.suse.com/1225973" source="BUGZILLA"/>
		<reference ref_id="1225974" ref_url="https://bugzilla.suse.com/1225974" source="BUGZILLA"/>
		<reference ref_id="1227314" ref_url="https://bugzilla.suse.com/1227314" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="CVE-2023-45289" ref_url="https://www.suse.com/security/cve/CVE-2023-45289/" source="CVE"/>
		<reference ref_id="CVE-2023-45290" ref_url="https://www.suse.com/security/cve/CVE-2023-45290/" source="CVE"/>
		<reference ref_id="CVE-2024-24783" ref_url="https://www.suse.com/security/cve/CVE-2024-24783/" source="CVE"/>
		<reference ref_id="CVE-2024-24784" ref_url="https://www.suse.com/security/cve/CVE-2024-24784/" source="CVE"/>
		<reference ref_id="CVE-2024-24785" ref_url="https://www.suse.com/security/cve/CVE-2024-24785/" source="CVE"/>
		<reference ref_id="CVE-2024-24787" ref_url="https://www.suse.com/security/cve/CVE-2024-24787/" source="CVE"/>
		<reference ref_id="CVE-2024-24789" ref_url="https://www.suse.com/security/cve/CVE-2024-24789/" source="CVE"/>
		<reference ref_id="CVE-2024-24790" ref_url="https://www.suse.com/security/cve/CVE-2024-24790/" source="CVE"/>
		<reference ref_id="CVE-2024-24791" ref_url="https://www.suse.com/security/cve/CVE-2024-24791/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036783.html" source="SUSE-SU"/>
		<description>
This update for go1.21-openssl fixes the following issues:
  
- CVE-2024-24791: Fixed denial of service due to improper 100-continue handling (bsc#1227314)
- CVE-2024-24789: Fixed mishandling of corrupt central directory record in archive/zip (bsc#1225973)
- CVE-2024-24790: Fixed unexpected behavior from Is methods for IPv4-mapped IPv6 addresses in net/netip (bsc#1225974)
- CVE-2024-24787: Fixed arbitrary code execution during build on darwin in cmd/go (bsc#1224017)
- CVE-2023-45288: Fixed denial of service due to close connections when receiving too many headers in net/http and x/net/http2 (bsc#1221400)
- CVE-2023-45289: Fixed incorrect forwarding of sensitive headers and cookies on HTTP redirect in net/http and net/http/cookiejar (bsc#1221000) 
- CVE-2023-45290: Fixed memory exhaustion in Request.ParseMultipartForm in net/http (bsc#1221001)
- CVE-2024-24783: Fixed denial of service on certificates with an unknown public key algorithm in crypto/x509 (bsc#1220999)
- CVE-2024-24784: Fixed comments in display names are incorrectly handled in net/mail (bsc#1221002)
- CVE-2024-24785: Fixed errors returned from MarshalJSON methods may break template escaping in html/template (bsc#1221003)

Other fixes:
- Update to version 1.21.13.1 cut from the go1.21-fips-release (jsc#SLE-18320)
- Update to version 1.21.13 (bsc#1212475)
- Remove subpackage go1.x-openssl-libstd for compiled shared object libstd.so. (jsc#PED-1962)
- Ensure VERSION file is present in GOROOT as required by go tool dist and go tool distpack (bsc#1219988)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219988">SUSE bug 1219988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220999">SUSE bug 1220999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221000">SUSE bug 1221000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221001">SUSE bug 1221001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221002">SUSE bug 1221002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221003">SUSE bug 1221003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221400">SUSE bug 1221400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224017">SUSE bug 1224017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225973">SUSE bug 1225973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225974">SUSE bug 1225974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227314">SUSE bug 1227314</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45289/">CVE-2023-45289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45289">CVE-2023-45289 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45290/">CVE-2023-45290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45290">CVE-2023-45290 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24783/">CVE-2024-24783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24783">CVE-2024-24783 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24784/">CVE-2024-24784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24784">CVE-2024-24784 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24785/">CVE-2024-24785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24785">CVE-2024-24785 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-24787/">CVE-2024-24787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24787">CVE-2024-24787 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24789/">CVE-2024-24789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24789">CVE-2024-24789 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-24790/">CVE-2024-24790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24791/">CVE-2024-24791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24791">CVE-2024-24791 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940541" comment="go1.21-openssl-1.21.13.1-150000.1.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940542" comment="go1.21-openssl-doc-1.21.13.1-150000.1.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940543" comment="go1.21-openssl-race-1.21.13.1-150000.1.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4934" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228613" ref_url="https://bugzilla.suse.com/1228613" source="BUGZILLA"/>
		<reference ref_id="1228693" ref_url="https://bugzilla.suse.com/1228693" source="BUGZILLA"/>
		<reference ref_id="1228694" ref_url="https://bugzilla.suse.com/1228694" source="BUGZILLA"/>
		<reference ref_id="1228695" ref_url="https://bugzilla.suse.com/1228695" source="BUGZILLA"/>
		<reference ref_id="1228696" ref_url="https://bugzilla.suse.com/1228696" source="BUGZILLA"/>
		<reference ref_id="1228697" ref_url="https://bugzilla.suse.com/1228697" source="BUGZILLA"/>
		<reference ref_id="1228698" ref_url="https://bugzilla.suse.com/1228698" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-40776" ref_url="https://www.suse.com/security/cve/CVE-2024-40776/" source="CVE"/>
		<reference ref_id="CVE-2024-40779" ref_url="https://www.suse.com/security/cve/CVE-2024-40779/" source="CVE"/>
		<reference ref_id="CVE-2024-40780" ref_url="https://www.suse.com/security/cve/CVE-2024-40780/" source="CVE"/>
		<reference ref_id="CVE-2024-40782" ref_url="https://www.suse.com/security/cve/CVE-2024-40782/" source="CVE"/>
		<reference ref_id="CVE-2024-40785" ref_url="https://www.suse.com/security/cve/CVE-2024-40785/" source="CVE"/>
		<reference ref_id="CVE-2024-40789" ref_url="https://www.suse.com/security/cve/CVE-2024-40789/" source="CVE"/>
		<reference ref_id="CVE-2024-40794" ref_url="https://www.suse.com/security/cve/CVE-2024-40794/" source="CVE"/>
		<reference ref_id="CVE-2024-4558" ref_url="https://www.suse.com/security/cve/CVE-2024-4558/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036781.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.44.3 (bsc#1228696 bsc#1228697 bsc#1228698):

- Fix web process cache suspend/resume when sandbox is enabled.
- Fix accelerated images dissapearing after scrolling.
- Fix video flickering with DMA-BUF sink.
- Fix pointer lock on X11.
- Fix movement delta on mouse events in GTK3.
- Undeprecate console message API and make it available in 2022 API.
- Fix several crashes and rendering issues.
- Security fixes: CVE-2024-40776, CVE-2024-40779, CVE-2024-40780,
  CVE-2024-40782, CVE-2024-40785, CVE-2024-40789, CVE-2024-40794,
  CVE-2024-4558.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1228613">SUSE bug 1228613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228693">SUSE bug 1228693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228694">SUSE bug 1228694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228695">SUSE bug 1228695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228696">SUSE bug 1228696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228697">SUSE bug 1228697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228698">SUSE bug 1228698</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-40776/">CVE-2024-40776 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40776">CVE-2024-40776 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40779/">CVE-2024-40779 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40779">CVE-2024-40779 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40780/">CVE-2024-40780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40780">CVE-2024-40780 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40782/">CVE-2024-40782 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40782">CVE-2024-40782 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40785/">CVE-2024-40785 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40785">CVE-2024-40785 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40789/">CVE-2024-40789 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40789">CVE-2024-40789 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40794/">CVE-2024-40794 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40794">CVE-2024-40794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4558/">CVE-2024-4558 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4558">CVE-2024-4558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940544" comment="WebKitGTK-4.0-lang-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940545" comment="WebKitGTK-4.1-lang-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940546" comment="WebKitGTK-6.0-lang-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940547" comment="libjavascriptcoregtk-4_0-18-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940548" comment="libjavascriptcoregtk-4_0-18-32bit-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940549" comment="libjavascriptcoregtk-4_1-0-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940550" comment="libjavascriptcoregtk-4_1-0-32bit-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940551" comment="libjavascriptcoregtk-6_0-1-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940552" comment="libwebkit2gtk-4_0-37-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940553" comment="libwebkit2gtk-4_0-37-32bit-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940554" comment="libwebkit2gtk-4_1-0-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940555" comment="libwebkit2gtk-4_1-0-32bit-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940556" comment="libwebkitgtk-6_0-4-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940557" comment="typelib-1_0-JavaScriptCore-4_0-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940558" comment="typelib-1_0-JavaScriptCore-4_1-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940559" comment="typelib-1_0-JavaScriptCore-6_0-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940560" comment="typelib-1_0-WebKit-6_0-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940561" comment="typelib-1_0-WebKit2-4_0-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940562" comment="typelib-1_0-WebKit2-4_1-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940563" comment="typelib-1_0-WebKit2WebExtension-4_0-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940564" comment="typelib-1_0-WebKit2WebExtension-4_1-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940565" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940566" comment="webkit-jsc-4-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940567" comment="webkit-jsc-4.1-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940568" comment="webkit-jsc-6.0-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940569" comment="webkit2gtk-4_0-injected-bundles-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940570" comment="webkit2gtk-4_1-injected-bundles-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940571" comment="webkit2gtk3-devel-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940572" comment="webkit2gtk3-minibrowser-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940573" comment="webkit2gtk3-soup2-devel-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940574" comment="webkit2gtk3-soup2-minibrowser-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940575" comment="webkit2gtk4-devel-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940576" comment="webkit2gtk4-minibrowser-2.44.3-150400.4.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940577" comment="webkitgtk-6_0-injected-bundles-2.44.3-150400.4.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4935" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.26 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1062303" ref_url="https://bugzilla.suse.com/1062303" source="BUGZILLA"/>
		<reference ref_id="1229008" ref_url="https://bugzilla.suse.com/1229008" source="BUGZILLA"/>
		<reference ref_id="1229858" ref_url="https://bugzilla.suse.com/1229858" source="BUGZILLA"/>
		<reference ref_id="1229867" ref_url="https://bugzilla.suse.com/1229867" source="BUGZILLA"/>
		<reference ref_id="1229869" ref_url="https://bugzilla.suse.com/1229869" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39325" ref_url="https://www.suse.com/security/cve/CVE-2023-39325/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3094-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036778.html" source="SUSE-SU"/>
		<description>
This update for kubernetes1.26 fixes the following issues:

Update kubernetes to version 1.26.15:
- CVE-2024-24786: Fixed infinite loop in protojson.Unmarshal in golang-protobuf (bsc#1229867)
- CVE-2023-39325: Fixed a flaw that can lead to a DoS due to a rapid stream resets causing excessive work. This is also known as CVE-2023-44487. (bsc#1229869)
- CVE-2023-44487: Fixed HTTP/2 Rapid Reset attack in net/http (bsc#1229869)
    
Other fixes:    
- Fixed packages required by kubernetes1.26-client installation (bsc#1229008)
- Update go to version v1.22.5 (bsc#1229858)
- Add upstream patch for reproducible builds (bsc#1062303)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1062303">SUSE bug 1062303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229008">SUSE bug 1229008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229858">SUSE bug 1229858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229867">SUSE bug 1229867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229869">SUSE bug 1229869</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39325/">CVE-2023-39325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940578" comment="kubernetes1.26-client-1.26.15-150400.9.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940579" comment="kubernetes1.26-client-common-1.26.15-150400.9.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4936" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229129" ref_url="https://bugzilla.suse.com/1229129" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-42667" ref_url="https://www.suse.com/security/cve/CVE-2023-42667/" source="CVE"/>
		<reference ref_id="CVE-2023-49141" ref_url="https://www.suse.com/security/cve/CVE-2023-49141/" source="CVE"/>
		<reference ref_id="CVE-2024-24853" ref_url="https://www.suse.com/security/cve/CVE-2024-24853/" source="CVE"/>
		<reference ref_id="CVE-2024-24980" ref_url="https://www.suse.com/security/cve/CVE-2024-24980/" source="CVE"/>
		<reference ref_id="CVE-2024-25939" ref_url="https://www.suse.com/security/cve/CVE-2024-25939/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036777.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Intel CPU Microcode was updated to the 20240813 release (bsc#1229129)
  - CVE-2024-24853: Security updates for [INTEL-SA-01083](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01083.html)
  - CVE-2024-25939: Security updates for [INTEL-SA-01118](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01118.html)
  - CVE-2024-24980: Security updates for [INTEL-SA-01100](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01100.html)
  - CVE-2023-42667: Security updates for [INTEL-SA-01038](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01038.html)
  - CVE-2023-49141: Security updates for [INTEL-SA-01046](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01046.html)
  Other issues fixed:
  - Update for functional issues. Refer to [Intel Core Ultra Processor](https://cdrdv2.intel.com/v1/dl/getContent/792254) for details.
  - Update for functional issues. Refer to [3rd Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780) for details.
  - Update for functional issues. Refer to [3rd Generation Intel Xeon Scalable Processors Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/634897) for details.
  - Update for functional issues. Refer to [2nd Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details
  - Update for functional issues. Refer to [Intel Xeon D-2700 Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/714071) for details.
  - Update for functional issues. Refer to [Intel Xeon E-2300 Processor Specification Update ](https://cdrdv2.intel.com/v1/dl/getContent/709192) for details.
  - Update for functional issues. Refer to [13th Generation Intel Core Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/740518) for details.
  - Update for functional issues. Refer to [12th Generation Intel Core Processor Family](https://cdrdv2.intel.com/v1/dl/getContent/682436) for details.
  - Update for functional issues. Refer to [11th Gen Intel Core Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/631123) for details.
  - Update for functional issues. Refer to [10th Gen Intel Core Processor Families Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/341079) for details.
  - Update for functional issues. Refer to [10th Generation Intel Core Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/615213) for details.
  - Update for functional issues. Refer to [8th and 9th Generation Intel Core Processor Family Spec Update](https://cdrdv2.intel.com/v1/dl/getContent/337346) for details.
  - Update for functional issues. Refer to [8th Generation Intel Core Processor Families Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338025) for details.
  - Update for functional issues. Refer to [7th and 8th Generation Intel Core Processor Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/334663) for details.
  - Update for functional issues. Refer to [Intel Processors and Intel Core i3 N-Series](https://cdrdv2.intel.com/v1/dl/getContent/764616) for details.
  - Update for functional issues. Refer to [Intel Atom x6000E Series, and Intel Pentium and Celeron N and J Series Processors for Internet of Things (IoT) Applications](https://cdrdv2.intel.com/v1/dl/getContent/636674) for details.
 Updated Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | AML-Y22        | H0       | 06-8e-09/10 | 000000f4 | 000000f6 | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000fa | 000000fc | Core Gen10 Mobile
  | CFL-H          | R0       | 06-9e-0d/22 | 000000fc | 00000100 | Core Gen9 Mobile
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000f6 | 000000f8 | Core Gen9
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000f6 | 000000f8 | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000f4 | 000000f6 | Core Gen8
  | CFL-S          | P0       | 06-9e-0c/22 | 000000f6 | 000000f8 | Core Gen9 Desktop
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000f4 | 000000f6 | Core Gen8 Mobile
  | CLX-SP         | B1       | 06-55-07/bf | 05003605 | 05003707 | Xeon Scalable Gen2
  | CML-H          | R1       | 06-a5-02/20 | 000000fa | 000000fc | Core Gen10 Mobile
  | CML-S102       | Q0       | 06-a5-05/22 | 000000fa | 000000fc | Core Gen10
  | CML-S62        | G1       | 06-a5-03/22 | 000000fa | 000000fc | Core Gen10
  | CML-U42        | V0       | 06-8e-0c/94 | 000000fa | 000000fc | Core Gen10 Mobile
  | CML-U62 V1     | A0       | 06-a6-00/80 | 000000fa | 000000fe | Core Gen10 Mobile
  | CML-U62 V2     | K1       | 06-a6-01/80 | 000000fa | 000000fc | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000fa | 000000fc | Core Gen10 Mobile
  | CPX-SP         | A1       | 06-55-0b/bf | 07002802 | 07002904 | Xeon Scalable Gen3
  | EHL            | B1       | 06-96-01/01 | 00000019 | 0000001a | Pentium J6426/N6415, Celeron J6412/J6413/N6210/N6211, Atom x6000E
  | ICL-D          | B0       | 06-6c-01/10 | 01000290 | 010002b0 | Xeon D-17xx, D-27xx
  | ICL-U/Y        | D1       | 06-7e-05/80 | 000000c4 | 000000c6 | Core Gen10 Mobile
  | ICX-SP         | Dx/M1    | 06-6a-06/87 | 0d0003d1 | 0d0003e7 | Xeon Scalable Gen3
  | KBL-R U        | Y0       | 06-8e-0a/c0 | 000000f4 | 000000f6 | Core Gen8 Mobile
  | KBL-U23e       | J1       | 06-8e-09/c0 | 000000f4 | 000000f6 | Core Gen7 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000f4 | 000000f6 | Core Gen7 Mobile
  | MTL            | C-0      | 06-aa-04/e6 | 0000001c | 0000001e | Core Ultra Processor
  | RKL-S          | B0       | 06-a7-01/02 | 0000005e | 00000062 | Core Gen11
  | TGL            | B0/B1    | 06-8c-01/80 | 000000b6 | 000000b8 | Core Gen11 Mobile
  | TGL-H          | R0       | 06-8d-01/c2 | 00000050 | 00000052 | Core Gen11 Mobile
  | TGL-R          | C0       | 06-8c-02/c2 | 00000036 | 00000038 | Core Gen11 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000fa | 000000fc | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000f4 | 000000f6 | Core Gen8 Mobile

- update to 20240531:
  * Update for functional issues. Refer to Intel Pentium Silver
    and Intel Celeron Processor Specification Update
  - Updated Platforms:
    | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
    |:---------------|:---------|:------------|:---------|:---------|:---------
    | GLK            | B0       | 06-7a-01/01 | 00000040 | 00000042 | Pentium Silver N/J5xxx, Celeron N/J4xxx
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229129">SUSE bug 1229129</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-42667/">CVE-2023-42667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42667">CVE-2023-42667 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-49141/">CVE-2023-49141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-49141">CVE-2023-49141 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-24853/">CVE-2024-24853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24853">CVE-2024-24853 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:H/VA:N/SC:L/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2024-24980/">CVE-2024-24980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24980">CVE-2024-24980 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-25939/">CVE-2024-25939 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25939">CVE-2024-25939 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940580" comment="ucode-intel-20240813-150200.44.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4937" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.28 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229858" ref_url="https://bugzilla.suse.com/1229858" source="BUGZILLA"/>
		<reference ref_id="1229867" ref_url="https://bugzilla.suse.com/1229867" source="BUGZILLA"/>
		<reference ref_id="1229869" ref_url="https://bugzilla.suse.com/1229869" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39325" ref_url="https://www.suse.com/security/cve/CVE-2023-39325/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036775.html" source="SUSE-SU"/>
		<description>
This update for kubernetes1.28 fixes the following issues:
  
Update kubernetes to version 1.28.13:
- CVE-2024-24786: Fixed infinite loop in protojson.Unmarshal in golang-protobuf (bsc#1229867)
- CVE-2023-39325: Fixed a flaw that can lead to a DoS due to a rapid stream resets causing excessive work. This is also known as CVE-2023-44487. (bsc#1229869)
- CVE-2023-45288: Fixed denial of service due to close connections when receiving too many headers in net/http and x/net/http2 (bsc#1229869)
- CVE-2023-44487: Fixed HTTP/2 Rapid Reset attack in net/http (bsc#1229869)
  
Other fixes:
- Update go to version v1.22.5 (bsc#1229858)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229858">SUSE bug 1229858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229867">SUSE bug 1229867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229869">SUSE bug 1229869</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39325/">CVE-2023-39325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940581" comment="kubernetes1.28-client-1.28.13-150400.9.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940582" comment="kubernetes1.28-client-common-1.28.13-150400.9.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4938" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.27 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229858" ref_url="https://bugzilla.suse.com/1229858" source="BUGZILLA"/>
		<reference ref_id="1229867" ref_url="https://bugzilla.suse.com/1229867" source="BUGZILLA"/>
		<reference ref_id="1229869" ref_url="https://bugzilla.suse.com/1229869" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39325" ref_url="https://www.suse.com/security/cve/CVE-2023-39325/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3098-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036774.html" source="SUSE-SU"/>
		<description>
This update for kubernetes1.27 fixes the following issues:

Update kubernetes to version 1.27.16
- CVE-2024-24786: Fixed infinite loop in protojson.Unmarshal in golang-protobuf (bsc#1229867)
- CVE-2023-39325: Fixed a flaw that can lead to a DoS due to a rapid stream resets causing excessive work. This is also known as CVE-2023-44487. (bsc#1229869)
- CVE-2023-45288: Fixed denial of service due to close connections when receiving too many headers in net/http and x/net/http2 (bsc#1229869)
- CVE-2023-44487: Fixed HTTP/2 Rapid Reset attack in net/http (bsc#1229869)
    
Other fixes:
- Update go to version v1.22.5 (bsc#1229858)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229858">SUSE bug 1229858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229867">SUSE bug 1229867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229869">SUSE bug 1229869</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39325/">CVE-2023-39325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940583" comment="kubernetes1.27-client-1.27.16-150400.9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940584" comment="kubernetes1.27-client-common-1.27.16-150400.9.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4939" version="1" class="patch">
	<metadata>
		<title>Security update for bubblewrap and flatpak (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229157" ref_url="https://bugzilla.suse.com/1229157" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-42472" ref_url="https://www.suse.com/security/cve/CVE-2024-42472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3104-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036768.html" source="SUSE-SU"/>
		<description>
This update for bubblewrap and flatpak fixes the following issues:

- CVE-2024-42472: Fixed access to files outside sandbox for apps using persistent (bsc#1229157)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229157">SUSE bug 1229157</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42472/">CVE-2024-42472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42472">CVE-2024-42472 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940585" comment="bubblewrap-0.8.0-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940586" comment="bubblewrap-zsh-completion-0.8.0-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940587" comment="flatpak-1.14.5-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940588" comment="flatpak-devel-1.14.5-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940589" comment="flatpak-remote-flathub-1.14.5-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940590" comment="flatpak-zsh-completion-1.14.5-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940591" comment="libflatpak0-1.14.5-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940592" comment="system-user-flatpak-1.14.5-150500.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940593" comment="typelib-1_0-Flatpak-1_0-1.14.5-150500.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4940" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229465" ref_url="https://bugzilla.suse.com/1229465" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6119" ref_url="https://www.suse.com/security/cve/CVE-2024-6119/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3105-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036767.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2024-6119: Fixed denial of service in X.509 name checks (bsc#1229465)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1229465">SUSE bug 1229465</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6119/">CVE-2024-6119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6119">CVE-2024-6119 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940594" comment="libopenssl-3-devel-3.0.8-150500.5.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940595" comment="libopenssl-3-devel-32bit-3.0.8-150500.5.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940596" comment="libopenssl3-3.0.8-150500.5.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940597" comment="libopenssl3-32bit-3.0.8-150500.5.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940598" comment="openssl-3-3.0.8-150500.5.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940599" comment="openssl-3-doc-3.0.8-150500.5.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4941" version="1" class="patch">
	<metadata>
		<title>Security update for frr (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229438" ref_url="https://bugzilla.suse.com/1229438" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-44070" ref_url="https://www.suse.com/security/cve/CVE-2024-44070/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3108-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036764.html" source="SUSE-SU"/>
		<description>
This update for frr fixes the following issues:

- CVE-2024-44070: Fixed missing stream length check before TLV value is taken in bgp_attr_encap (bsc#1229438)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229438">SUSE bug 1229438</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44070/">CVE-2024-44070 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44070">CVE-2024-44070 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940600" comment="frr-8.4-150500.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940601" comment="frr-devel-8.4-150500.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940602" comment="libfrr0-8.4-150500.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940603" comment="libfrr_pb0-8.4-150500.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940604" comment="libfrrcares0-8.4-150500.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940605" comment="libfrrfpm_pb0-8.4-150500.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940606" comment="libfrrospfapiclient0-8.4-150500.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940607" comment="libfrrsnmp0-8.4-150500.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940608" comment="libfrrzmq0-8.4-150500.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940609" comment="libmlag_pb0-8.4-150500.4.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4942" version="1" class="patch">
	<metadata>
		<title>Security update for python-aiohttp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229226" ref_url="https://bugzilla.suse.com/1229226" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-42367" ref_url="https://www.suse.com/security/cve/CVE-2024-42367/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3110-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036762.html" source="SUSE-SU"/>
		<description>
This update for python-aiohttp fixes the following issues:

- CVE-2024-42367: Fixed path traversal outside the root directory when requests involve compressed files as symbolic links (bsc#1229226)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1229226">SUSE bug 1229226</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42367/">CVE-2024-42367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42367">CVE-2024-42367 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940610" comment="python311-aiohttp-3.9.3-150400.10.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4943" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228648" ref_url="https://bugzilla.suse.com/1228648" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-7519" ref_url="https://www.suse.com/security/cve/CVE-2024-7519/" source="CVE"/>
		<reference ref_id="CVE-2024-7521" ref_url="https://www.suse.com/security/cve/CVE-2024-7521/" source="CVE"/>
		<reference ref_id="CVE-2024-7522" ref_url="https://www.suse.com/security/cve/CVE-2024-7522/" source="CVE"/>
		<reference ref_id="CVE-2024-7525" ref_url="https://www.suse.com/security/cve/CVE-2024-7525/" source="CVE"/>
		<reference ref_id="CVE-2024-7526" ref_url="https://www.suse.com/security/cve/CVE-2024-7526/" source="CVE"/>
		<reference ref_id="CVE-2024-7527" ref_url="https://www.suse.com/security/cve/CVE-2024-7527/" source="CVE"/>
		<reference ref_id="CVE-2024-7529" ref_url="https://www.suse.com/security/cve/CVE-2024-7529/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3112-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036761.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Mozilla Thunderbird 115.14
  * fixed: When using an external installation of GnuPG,
    Thunderbird occassionally sent/received corrupted messages
  * fixed: Users of external GnuPG were unable to decrypt
    incorrectly encoded messages (bmo#1906903)
  * fixed: Flatpak install of 128.0esr was incorrectly downgraded
    to 115.13.0esr (bmo#1908299)
  * fixed: Security fixes
  MFSA 2024-38 (bsc#1228648)
  * CVE-2024-7519: Out of bounds memory access in graphics shared memory handling
  * CVE-2024-7521: Incomplete WebAssembly exception handing
  * CVE-2024-7522: Out of bounds read in editor component
  * CVE-2024-7525: Missing permission check when creating a StreamFilter
  * CVE-2024-7526: Uninitialized memory used by WebGL
  * CVE-2024-7527: Use-after-free in JavaScript garbage collection
  * CVE-2024-7529: Document content could partially obscure security prompts
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1228648">SUSE bug 1228648</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7519/">CVE-2024-7519 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7519">CVE-2024-7519 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7521/">CVE-2024-7521 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7521">CVE-2024-7521 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7522/">CVE-2024-7522 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7522">CVE-2024-7522 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7525/">CVE-2024-7525 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7525">CVE-2024-7525 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7526/">CVE-2024-7526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7526">CVE-2024-7526 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7527/">CVE-2024-7527 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7527">CVE-2024-7527 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-7529/">CVE-2024-7529 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7529">CVE-2024-7529 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940611" comment="MozillaThunderbird-115.14.0-150200.8.174.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940612" comment="MozillaThunderbird-translations-common-115.14.0-150200.8.174.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940613" comment="MozillaThunderbird-translations-other-115.14.0-150200.8.174.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4944" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1186607" ref_url="https://bugzilla.suse.com/1186607" source="BUGZILLA"/>
		<reference ref_id="1189428" ref_url="https://bugzilla.suse.com/1189428" source="BUGZILLA"/>
		<reference ref_id="1223304" ref_url="https://bugzilla.suse.com/1223304" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-22027" ref_url="https://www.suse.com/security/cve/CVE-2020-22027/" source="CVE"/>
		<reference ref_id="CVE-2021-38291" ref_url="https://www.suse.com/security/cve/CVE-2021-38291/" source="CVE"/>
		<reference ref_id="CVE-2023-51798" ref_url="https://www.suse.com/security/cve/CVE-2023-51798/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3114-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036758.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg fixes the following issues:
  
- CVE-2020-22027: Fixed heap-based Buffer Overflow vulnerability exits in deflate16 at libavfilter/vf_neighbor.c (bsc#1186607)
- CVE-2021-38291: Fixed an assertion failure at src/libavutil/mathematics.c (bsc#1189428)
- CVE-2023-51798: Fixed floating point exception(FPE) via the interpolate function (bsc#1223304)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186607">SUSE bug 1186607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189428">SUSE bug 1189428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223304">SUSE bug 1223304</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22027/">CVE-2020-22027 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-22027">CVE-2020-22027 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38291/">CVE-2021-38291 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38291">CVE-2021-38291 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-51798/">CVE-2023-51798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51798">CVE-2023-51798 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940614" comment="ffmpeg-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940615" comment="ffmpeg-private-devel-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940616" comment="libavcodec-devel-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940617" comment="libavcodec57-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940618" comment="libavcodec57-32bit-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940619" comment="libavdevice-devel-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940620" comment="libavdevice57-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940621" comment="libavdevice57-32bit-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940622" comment="libavfilter-devel-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940623" comment="libavfilter6-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940624" comment="libavfilter6-32bit-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940625" comment="libavformat-devel-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940626" comment="libavformat57-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940627" comment="libavformat57-32bit-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940628" comment="libavresample-devel-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940629" comment="libavresample3-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940630" comment="libavresample3-32bit-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940631" comment="libavutil-devel-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940632" comment="libavutil55-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940633" comment="libavutil55-32bit-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940634" comment="libpostproc-devel-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940635" comment="libpostproc54-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940636" comment="libpostproc54-32bit-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940637" comment="libswresample-devel-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940638" comment="libswresample2-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940639" comment="libswresample2-32bit-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940640" comment="libswscale-devel-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940641" comment="libswscale4-3.4.2-150200.11.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940642" comment="libswscale4-32bit-3.4.2-150200.11.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4945" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228924" ref_url="https://bugzilla.suse.com/1228924" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-7006" ref_url="https://www.suse.com/security/cve/CVE-2024-7006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3115-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036756.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2024-7006: Fixed null pointer dereference in tif_dirinfo.c (bsc#1228924)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1228924">SUSE bug 1228924</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7006/">CVE-2024-7006 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7006">CVE-2024-7006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940643" comment="libtiff-devel-4.0.9-150000.45.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940644" comment="libtiff-devel-32bit-4.0.9-150000.45.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940645" comment="libtiff5-4.0.9-150000.45.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940646" comment="libtiff5-32bit-4.0.9-150000.45.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940647" comment="tiff-4.0.9-150000.45.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4946" version="1" class="patch">
	<metadata>
		<title>Security update for python-WebOb (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229221" ref_url="https://bugzilla.suse.com/1229221" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-42353" ref_url="https://www.suse.com/security/cve/CVE-2024-42353/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3116-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036755.html" source="SUSE-SU"/>
		<description>
This update for python-WebOb fixes the following issues:

- CVE-2024-42353: Fixed open redirect via WebOb's Response object in Location header (bsc#1229221)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1229221">SUSE bug 1229221</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-42353/">CVE-2024-42353 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42353">CVE-2024-42353 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940648" comment="python-WebOb-doc-1.7.4-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940649" comment="python3-WebOb-1.7.4-150000.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4947" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot23 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229183" ref_url="https://bugzilla.suse.com/1229183" source="BUGZILLA"/>
		<reference ref_id="1229184" ref_url="https://bugzilla.suse.com/1229184" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-23184" ref_url="https://www.suse.com/security/cve/CVE-2024-23184/" source="CVE"/>
		<reference ref_id="CVE-2024-23185" ref_url="https://www.suse.com/security/cve/CVE-2024-23185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3118-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036753.html" source="SUSE-SU"/>
		<description>
This update for dovecot23 fixes the following issues:

- CVE-2024-23185: Fixed a denial of service with large headers (bsc#1229183)
- CVE-2024-23184: Fixed a denial of service parsing messages containing many address headers (bsc#1229184)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229183">SUSE bug 1229183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229184">SUSE bug 1229184</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-23184/">CVE-2024-23184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23184">CVE-2024-23184 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="8.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-23185/">CVE-2024-23185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23185">CVE-2024-23185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940650" comment="dovecot23-2.3.15-150200.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940651" comment="dovecot23-backend-mysql-2.3.15-150200.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940652" comment="dovecot23-backend-pgsql-2.3.15-150200.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940653" comment="dovecot23-backend-sqlite-2.3.15-150200.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940654" comment="dovecot23-devel-2.3.15-150200.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940655" comment="dovecot23-fts-2.3.15-150200.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940656" comment="dovecot23-fts-lucene-2.3.15-150200.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940657" comment="dovecot23-fts-solr-2.3.15-150200.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940658" comment="dovecot23-fts-squat-2.3.15-150200.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4948" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_0_0 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227138" ref_url="https://bugzilla.suse.com/1227138" source="BUGZILLA"/>
		<reference ref_id="1227227" ref_url="https://bugzilla.suse.com/1227227" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-5535" ref_url="https://www.suse.com/security/cve/CVE-2024-5535/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3119-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036752.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_0_0 fixes the following issues:

- CVE-2024-5535: Fixed a buffer overread in function SSL_select_next_proto() with an empty supported client protocols buffer (bsc#1227138, bsc#1227227)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1227138">SUSE bug 1227138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227227">SUSE bug 1227227</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-5535/">CVE-2024-5535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5535">CVE-2024-5535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940659" comment="libopenssl-1_0_0-devel-1.0.2p-150000.3.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940660" comment="libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940661" comment="libopenssl10-1.0.2p-150000.3.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940662" comment="libopenssl1_0_0-1.0.2p-150000.3.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940663" comment="libopenssl1_0_0-32bit-1.0.2p-150000.3.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940664" comment="libopenssl1_0_0-hmac-1.0.2p-150000.3.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940665" comment="libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940666" comment="libopenssl1_0_0-steam-1.0.2p-150000.3.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940667" comment="libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940668" comment="openssl-1_0_0-1.0.2p-150000.3.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940669" comment="openssl-1_0_0-cavs-1.0.2p-150000.3.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940670" comment="openssl-1_0_0-doc-1.0.2p-150000.3.94.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4949" version="1" class="patch">
	<metadata>
		<title>Security update for buildah, docker (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214855" ref_url="https://bugzilla.suse.com/1214855" source="BUGZILLA"/>
		<reference ref_id="1219267" ref_url="https://bugzilla.suse.com/1219267" source="BUGZILLA"/>
		<reference ref_id="1219268" ref_url="https://bugzilla.suse.com/1219268" source="BUGZILLA"/>
		<reference ref_id="1219438" ref_url="https://bugzilla.suse.com/1219438" source="BUGZILLA"/>
		<reference ref_id="1221243" ref_url="https://bugzilla.suse.com/1221243" source="BUGZILLA"/>
		<reference ref_id="1221677" ref_url="https://bugzilla.suse.com/1221677" source="BUGZILLA"/>
		<reference ref_id="1221916" ref_url="https://bugzilla.suse.com/1221916" source="BUGZILLA"/>
		<reference ref_id="1223409" ref_url="https://bugzilla.suse.com/1223409" source="BUGZILLA"/>
		<reference ref_id="1224117" ref_url="https://bugzilla.suse.com/1224117" source="BUGZILLA"/>
		<reference ref_id="1228324" ref_url="https://bugzilla.suse.com/1228324" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-1753" ref_url="https://www.suse.com/security/cve/CVE-2024-1753/" source="CVE"/>
		<reference ref_id="CVE-2024-23651" ref_url="https://www.suse.com/security/cve/CVE-2024-23651/" source="CVE"/>
		<reference ref_id="CVE-2024-23652" ref_url="https://www.suse.com/security/cve/CVE-2024-23652/" source="CVE"/>
		<reference ref_id="CVE-2024-23653" ref_url="https://www.suse.com/security/cve/CVE-2024-23653/" source="CVE"/>
		<reference ref_id="CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786/" source="CVE"/>
		<reference ref_id="CVE-2024-28180" ref_url="https://www.suse.com/security/cve/CVE-2024-28180/" source="CVE"/>
		<reference ref_id="CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727/" source="CVE"/>
		<reference ref_id="CVE-2024-41110" ref_url="https://www.suse.com/security/cve/CVE-2024-41110/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036751.html" source="SUSE-SU"/>
		<description>
This update for buildah, docker fixes the following issues:

Changes in docker:
- CVE-2024-23651: Fixed arbitrary files write due to race condition on mounts (bsc#1219267)
- CVE-2024-23652: Fixed insufficient validation of parent directory on mount (bsc#1219268)
- CVE-2024-23653: Fixed insufficient validation on entitlement on container creation via buildkit (bsc#1219438)
- CVE-2024-41110: A Authz zero length regression that could lead to authentication bypass was fixed (bsc#1228324)

Other fixes:

- Update to Docker 25.0.6-ce. See upstream changelog online at
  &lt;https://docs.docker.com/engine/release-notes/25.0/#2506&gt;
- Update to Docker 25.0.5-ce (bsc#1223409)

- Fix BuildKit's symlink resolution logic to correctly handle non-lexical
  symlinks. (bsc#1221916)
- Write volume options atomically so sudden system crashes won't result in
  future Docker starts failing due to empty files. (bsc#1214855)

Changes in buildah:
- Update to version 1.35.4:
  * [release-1.35] Bump to Buildah v1.35.4
  * [release-1.35] CVE-2024-3727 updates (bsc#1224117)
  * integration test: handle new labels in 'bud and test --unsetlabel'
  * [release-1.35] Bump go-jose CVE-2024-28180
  * [release-1.35] Bump ocicrypt and go-jose CVE-2024-28180

- Update to version 1.35.3:
  * [release-1.35] Bump to Buildah v1.35.3
  * [release-1.35] correctly configure /etc/hosts and resolv.conf
  * [release-1.35] buildah: refactor resolv/hosts setup.
  * [release-1.35] rename the hostFile var to reflect
  * [release-1.35] Bump c/common to v0.58.1
  * [release-1.35] Bump Buildah to v1.35.2
  * [release-1.35] CVE-2024-24786 protobuf to 1.33
  * [release-1.35] Bump to v1.35.2-dev

- Update to version 1.35.1:
  * [release-1.35] Bump to v1.35.1
  * [release-1.35] CVE-2024-1753 container escape fix (bsc#1221677)

- Buildah dropped cni support, require netavark instead (bsc#1221243)

- Remove obsolete requires libcontainers-image &amp; libcontainers-storage

- Require passt for rootless networking (poo#156955)
  Buildah moved to passt/pasta for rootless networking from slirp4netns
  (https://github.com/containers/common/pull/1846)

- Update to version 1.35.0:
  * Bump v1.35.0
  * Bump c/common v0.58.0, c/image v5.30.0, c/storage v1.53.0
  * conformance tests: don't break on trailing zeroes in layer blobs
  * Add a conformance test for copying to a mounted prior stage
  * fix(deps): update module github.com/stretchr/testify to v1.9.0
  * cgroups: reuse version check from c/common
  * Update vendor of containers/(common,image)
  * fix(deps): update github.com/containers/storage digest to eadc620
  * fix(deps): update github.com/containers/luksy digest to ceb12d4
  * fix(deps): update github.com/containers/image/v5 digest to cdc6802
  * manifest add: complain if we get artifact flags without --artifact
  * Use retry logic from containers/common
  * Vendor in containers/(storage,image,common)
  * Update module golang.org/x/crypto to v0.20.0
  * Add comment re: Total Success task name
  * tests: skip_if_no_unshare(): check for --setuid
  * Properly handle build --pull=false
  * [skip-ci] Update tim-actions/get-pr-commits action to v1.3.1
  * Update module go.etcd.io/bbolt to v1.3.9
  * Revert 'Reduce official image size'
  * Update module github.com/opencontainers/image-spec to v1.1.0
  * Reduce official image size
  * Build with CNI support on FreeBSD
  * build --all-platforms: skip some base 'image' platforms
  * Bump main to v1.35.0-dev
  * Vendor in latest containers/(storage,image,common)
  * Split up error messages for missing --sbom related flags
  * `buildah manifest`: add artifact-related options
  * cmd/buildah/manifest.go: lock lists before adding/annotating/pushing
  * cmd/buildah/manifest.go: don't make struct declarations aliases
  * Use golang.org/x/exp/slices.Contains
  * Disable loong64 again
  * Fix a couple of typos in one-line comments
  * egrep is obsolescent; use grep -E
  * Try Cirrus with a newer VM version
  * Set CONTAINERS_CONF in the chroot-mount-flags integration test
  * Update to match dependency API update
  * Update github.com/openshift/imagebuilder and containers/common
  * docs: correct default authfile path
  * fix(deps): update module github.com/containerd/containerd to v1.7.13
  * tests: retrofit test for heredoc summary
  * build, heredoc: show heredoc summary in build output
  * manifest, push: add support for --retry and --retry-delay
  * fix(deps): update github.com/openshift/imagebuilder digest to b767bc3
  * imagebuildah: fix crash with empty RUN
  * fix(deps): update github.com/containers/luksy digest to b62d551
  * fix(deps): update module github.com/opencontainers/runc to v1.1.12 [security]
  * fix(deps): update module github.com/moby/buildkit to v0.12.5 [security]
  * Make buildah match podman for handling of ulimits
  * docs: move footnotes to where they're applicable
  * Allow users to specify no-dereference
  * Run codespell on code
  * Fix FreeBSD version parsing
  * Fix a build break on FreeBSD
  * Remove a bad FROM line
  * fix(deps): update module github.com/onsi/gomega to v1.31.1
  * fix(deps): update module github.com/opencontainers/image-spec to v1.1.0-rc6
  * docs: use reversed logo for dark theme in README
  * build,commit: add --sbom to scan and produce SBOMs when committing
  * commit: force omitHistory if the parent has layers but no history
  * docs: fix a couple of typos
  * internal/mkcw.Archive(): handle extra image content
  * stage_executor,heredoc: honor interpreter in heredoc
  * stage_executor,layers: burst cache if heredoc content is changed
  * fix(deps): update module golang.org/x/crypto to v0.18.0
  * Replace map[K]bool with map[K]struct{} where it makes sense
  * fix(deps): update module golang.org/x/sync to v0.6.0
  * fix(deps): update module golang.org/x/term to v0.16.0
  * Bump CI VMs
  * Replace strings.SplitN with strings.Cut
  * fix(deps): update github.com/containers/storage digest to ef81e9b
  * fix(deps): update github.com/containers/image/v5 digest to 1b221d4
  * fix(deps): update module github.com/fsouza/go-dockerclient to v1.10.1
  * Document use of containers-transports values in buildah
  * fix(deps): update module golang.org/x/crypto to v0.17.0 [security]
  * chore(deps): update dependency containers/automation_images to v20231208
  * manifest: addCompression use default from containers.conf
  * commit: add a --add-file flag
  * mkcw: populate the rootfs using an overlay
  * chore(deps): update dependency containers/automation_images to v20230517
  * [skip-ci] Update actions/stale action to v9
  * fix(deps): update module github.com/containernetworking/plugins to v1.4.0
  * fix(deps): update github.com/containers/image/v5 digest to 7a40fee
  * Bump to v1.34.1-dev
  * Ignore errors if label.Relabel returns ENOSUP
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-03"/>
	<updated date="2024-09-03"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1214855">SUSE bug 1214855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219267">SUSE bug 1219267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219268">SUSE bug 1219268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219438">SUSE bug 1219438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221243">SUSE bug 1221243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221677">SUSE bug 1221677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221916">SUSE bug 1221916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223409">SUSE bug 1223409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224117">SUSE bug 1224117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228324">SUSE bug 1228324</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1753/">CVE-2024-1753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1753">CVE-2024-1753 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23651/">CVE-2024-23651 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23651">CVE-2024-23651 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23652/">CVE-2024-23652 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23652">CVE-2024-23652 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23653/">CVE-2024-23653 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23653">CVE-2024-23653 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28180/">CVE-2024-28180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28180">CVE-2024-28180 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41110/">CVE-2024-41110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41110">CVE-2024-41110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009940671" comment="docker-25.0.6_ce-150000.207.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940672" comment="docker-bash-completion-25.0.6_ce-150000.207.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940673" comment="docker-fish-completion-25.0.6_ce-150000.207.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940674" comment="docker-rootless-extras-25.0.6_ce-150000.207.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009940675" comment="docker-zsh-completion-25.0.6_ce-150000.207.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4950" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229823" ref_url="https://bugzilla.suse.com/1229823" source="BUGZILLA"/>
		<reference ref_id="1229824" ref_url="https://bugzilla.suse.com/1229824" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-45230" ref_url="https://www.suse.com/security/cve/CVE-2024-45230/" source="CVE"/>
		<reference ref_id="CVE-2024-45231" ref_url="https://www.suse.com/security/cve/CVE-2024-45231/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019372.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

- CVE-2024-45230: Fixed potential denial-of-service vulnerability in django.utils.html.urlize(). (bsc#1229823)
- CVE-2024-45231: Fixed potential user email enumeration via response status on password reset. (bsc#1229824) 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-04"/>
	<updated date="2024-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229823">SUSE bug 1229823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229824">SUSE bug 1229824</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45230/">CVE-2024-45230 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45230">CVE-2024-45230 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-45231/">CVE-2024-45231 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45231">CVE-2024-45231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941071" comment="python3-Django-2.0.7-150000.1.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4951" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openj9 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228046" ref_url="https://bugzilla.suse.com/1228046" source="BUGZILLA"/>
		<reference ref_id="1228047" ref_url="https://bugzilla.suse.com/1228047" source="BUGZILLA"/>
		<reference ref_id="1228048" ref_url="https://bugzilla.suse.com/1228048" source="BUGZILLA"/>
		<reference ref_id="1228050" ref_url="https://bugzilla.suse.com/1228050" source="BUGZILLA"/>
		<reference ref_id="1228051" ref_url="https://bugzilla.suse.com/1228051" source="BUGZILLA"/>
		<reference ref_id="1228052" ref_url="https://bugzilla.suse.com/1228052" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131/" source="CVE"/>
		<reference ref_id="CVE-2024-21138" ref_url="https://www.suse.com/security/cve/CVE-2024-21138/" source="CVE"/>
		<reference ref_id="CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140/" source="CVE"/>
		<reference ref_id="CVE-2024-21144" ref_url="https://www.suse.com/security/cve/CVE-2024-21144/" source="CVE"/>
		<reference ref_id="CVE-2024-21145" ref_url="https://www.suse.com/security/cve/CVE-2024-21145/" source="CVE"/>
		<reference ref_id="CVE-2024-21147" ref_url="https://www.suse.com/security/cve/CVE-2024-21147/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019371.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openj9 fixes the following issues:

- Update to OpenJDK 8u422 build 05 with OpenJ9 0.46.0 virtual machine
- CVE-2024-21147: Fixed an array index overflow in RangeCheckElimination. (bsc#1228052)
- CVE-2024-21145: Fixed an out-of-bounds access in 2D image handling. (bsc#1228051)
- CVE-2024-21140: Fixed a range check elimination pre-loop limit overflow. (bsc#1228048)
- CVE-2024-21144: Pack200 increase loading time due to improper header validation. (bsc#1228050)
- CVE-2024-21138: Fixed an issue where excessive symbol length can lead to infinite loop. (bsc#1228047)
- CVE-2024-21131: Fixed a potential UTF8 size overflow. (bsc#1228046)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-04"/>
	<updated date="2024-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1228046">SUSE bug 1228046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228047">SUSE bug 1228047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228048">SUSE bug 1228048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228050">SUSE bug 1228050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228051">SUSE bug 1228051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228052">SUSE bug 1228052</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21138/">CVE-2024-21138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21138">CVE-2024-21138 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21144/">CVE-2024-21144 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21144">CVE-2024-21144 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21145/">CVE-2024-21145 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21145">CVE-2024-21145 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-21147/">CVE-2024-21147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21147">CVE-2024-21147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941072" comment="java-1_8_0-openj9-1.8.0.422-150200.3.48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941073" comment="java-1_8_0-openj9-accessibility-1.8.0.422-150200.3.48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941074" comment="java-1_8_0-openj9-demo-1.8.0.422-150200.3.48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941075" comment="java-1_8_0-openj9-devel-1.8.0.422-150200.3.48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941076" comment="java-1_8_0-openj9-headless-1.8.0.422-150200.3.48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941077" comment="java-1_8_0-openj9-javadoc-1.8.0.422-150200.3.48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941078" comment="java-1_8_0-openj9-src-1.8.0.422-150200.3.48.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4952" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218297" ref_url="https://bugzilla.suse.com/1218297" source="BUGZILLA"/>
		<reference ref_id="1221479" ref_url="https://bugzilla.suse.com/1221479" source="BUGZILLA"/>
		<reference ref_id="1226414" ref_url="https://bugzilla.suse.com/1226414" source="BUGZILLA"/>
		<reference ref_id="1228091" ref_url="https://bugzilla.suse.com/1228091" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-7008" ref_url="https://www.suse.com/security/cve/CVE-2023-7008/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019374.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

- CVE-2023-7008: Fixed man-in-the-middle due to unsigned name response in signed zone not refused when DNSSEC=yes (bsc#1218297)

Other fixes:
- Unit: drop ProtectClock=yes from systemd-udevd.service (bsc#1226414)
- Don't mention any rpm macros inside comments, even if escaped (bsc#1228091)
- Skip redundant dependencies specified the LSB description that references the file name of the service itself for early boot scripts (bsc#1221479).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-05"/>
	<updated date="2024-09-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218297">SUSE bug 1218297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221479">SUSE bug 1221479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226414">SUSE bug 1226414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228091">SUSE bug 1228091</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-7008/">CVE-2023-7008 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7008">CVE-2023-7008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941119" comment="libsystemd0-249.17-150400.8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941120" comment="libsystemd0-32bit-249.17-150400.8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941121" comment="libudev1-249.17-150400.8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941122" comment="libudev1-32bit-249.17-150400.8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941123" comment="nss-myhostname-249.17-150400.8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941124" comment="nss-myhostname-32bit-249.17-150400.8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941125" comment="nss-systemd-249.17-150400.8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941126" comment="systemd-249.17-150400.8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941127" comment="systemd-32bit-249.17-150400.8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941128" comment="systemd-container-249.17-150400.8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941129" comment="systemd-coredump-249.17-150400.8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941130" comment="systemd-devel-249.17-150400.8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941131" comment="systemd-doc-249.17-150400.8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941132" comment="systemd-experimental-249.17-150400.8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941133" comment="systemd-journal-remote-249.17-150400.8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941134" comment="systemd-lang-249.17-150400.8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941135" comment="systemd-network-249.17-150400.8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941136" comment="systemd-portable-249.17-150400.8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941137" comment="systemd-sysvinit-249.17-150400.8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941138" comment="systemd-testsuite-249.17-150400.8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941139" comment="udev-249.17-150400.8.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4953" version="1" class="patch">
	<metadata>
		<title>Security update for buildah (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1221243" ref_url="https://bugzilla.suse.com/1221243" source="BUGZILLA"/>
		<reference ref_id="1221677" ref_url="https://bugzilla.suse.com/1221677" source="BUGZILLA"/>
		<reference ref_id="1224117" ref_url="https://bugzilla.suse.com/1224117" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-1753" ref_url="https://www.suse.com/security/cve/CVE-2024-1753/" source="CVE"/>
		<reference ref_id="CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786/" source="CVE"/>
		<reference ref_id="CVE-2024-28180" ref_url="https://www.suse.com/security/cve/CVE-2024-28180/" source="CVE"/>
		<reference ref_id="CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036812.html" source="SUSE-SU"/>
		<description>
This update for buildah fixes the following issues:

Update to version 1.35.4:

* Bump to Buildah v1.35.4
* CVE-2024-3727 updates (bsc#1224117)
* integration test: handle new labels in 'bud and test --unsetlabel'
* Bump go-jose CVE-2024-28180
* Bump ocicrypt and go-jose CVE-2024-28180

Update to version 1.35.3:

* correctly configure /etc/hosts and resolv.conf
* buildah: refactor resolv/hosts setup.
* CVE-2024-24786 protobuf to 1.33


Update to version 1.35.1:

* CVE-2024-1753 container escape fix (bsc#1221677)

- Buildah dropped cni support, require netavark instead (bsc#1221243)

- Remove obsolete requires libcontainers-image &amp; libcontainers-storage

- Require passt for rootless networking (poo#156955)
  Buildah moved to passt/pasta for rootless networking from slirp4netns
  (https://github.com/containers/common/pull/1846)

Update to version 1.35.0:

* Bump c/common v0.58.0, c/image v5.30.0, c/storage v1.53.0
* conformance tests: don't break on trailing zeroes in layer blobs
* Add a conformance test for copying to a mounted prior stage
* cgroups: reuse version check from c/common
* Update vendor of containers/(common,image)
* manifest add: complain if we get artifact flags without --artifact
* Use retry logic from containers/common
* Vendor in containers/(storage,image,common)
* Update module golang.org/x/crypto to v0.20.0
* Add comment re: Total Success task name
* tests: skip_if_no_unshare(): check for --setuid
* Properly handle build --pull=false
* [skip-ci] Update tim-actions/get-pr-commits action to v1.3.1
* Update module go.etcd.io/bbolt to v1.3.9
* Revert 'Reduce official image size'
* Update module github.com/opencontainers/image-spec to v1.1.0
* Reduce official image size
* Build with CNI support on FreeBSD
* build --all-platforms: skip some base 'image' platforms
* Bump main to v1.35.0-dev
* Vendor in latest containers/(storage,image,common)
* Split up error messages for missing --sbom related flags
* `buildah manifest`: add artifact-related options
* cmd/buildah/manifest.go: lock lists before adding/annotating/pushing
* cmd/buildah/manifest.go: don't make struct declarations aliases
* Use golang.org/x/exp/slices.Contains
* Disable loong64 again
* Fix a couple of typos in one-line comments
* egrep is obsolescent; use grep -E
* Try Cirrus with a newer VM version
* Set CONTAINERS_CONF in the chroot-mount-flags integration test
* Update to match dependency API update
* Update github.com/openshift/imagebuilder and containers/common
* docs: correct default authfile path
* tests: retrofit test for heredoc summary
* build, heredoc: show heredoc summary in build output
* manifest, push: add support for --retry and --retry-delay
* imagebuildah: fix crash with empty RUN
* Make buildah match podman for handling of ulimits
* docs: move footnotes to where they're applicable
* Allow users to specify no-dereference
* docs: use reversed logo for dark theme in README
* build,commit: add --sbom to scan and produce SBOMs when committing
* commit: force omitHistory if the parent has layers but no history
* docs: fix a couple of typos
* internal/mkcw.Archive(): handle extra image content
* stage_executor,heredoc: honor interpreter in heredoc
* stage_executor,layers: burst cache if heredoc content is changed
* Replace map[K]bool with map[K]struct{} where it makes sense
* Replace strings.SplitN with strings.Cut
* Document use of containers-transports values in buildah
* manifest: addCompression use default from containers.conf
* commit: add a --add-file flag
* mkcw: populate the rootfs using an overlay
* Ignore errors if label.Relabel returns ENOSUP		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221243">SUSE bug 1221243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221677">SUSE bug 1221677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224117">SUSE bug 1224117</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1753/">CVE-2024-1753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1753">CVE-2024-1753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28180/">CVE-2024-28180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28180">CVE-2024-28180 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941424" comment="buildah-1.35.4-150500.3.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4954" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql16 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229013" ref_url="https://bugzilla.suse.com/1229013" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-7348" ref_url="https://www.suse.com/security/cve/CVE-2024-7348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3153-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036810.html" source="SUSE-SU"/>
		<description>
This update for postgresql16 fixes the following issues:

- Upgrade to 12.20 (bsc#1229013)
- CVE-2024-7348: PostgreSQL relation replacement during pg_dump executes arbitrary SQL. (bsc#1229013)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229013">SUSE bug 1229013</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7348/">CVE-2024-7348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7348">CVE-2024-7348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941425" comment="postgresql12-12.20-150200.8.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941426" comment="postgresql12-contrib-12.20-150200.8.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941427" comment="postgresql12-devel-12.20-150200.8.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941428" comment="postgresql12-docs-12.20-150200.8.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941429" comment="postgresql12-llvmjit-12.20-150200.8.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941430" comment="postgresql12-llvmjit-devel-12.20-150200.8.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941431" comment="postgresql12-plperl-12.20-150200.8.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941432" comment="postgresql12-plpython-12.20-150200.8.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941433" comment="postgresql12-pltcl-12.20-150200.8.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941434" comment="postgresql12-server-12.20-150200.8.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941435" comment="postgresql12-server-devel-12.20-150200.8.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941436" comment="postgresql12-test-12.20-150200.8.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4955" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.26 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229869" ref_url="https://bugzilla.suse.com/1229869" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3155-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036808.html" source="SUSE-SU"/>
		<description>
This update for kubernetes1.26 fixes the following issues:

- CVE-2023-45288: Close connections when receiving too many headers. (bsc#1229869)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229869">SUSE bug 1229869</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941437" comment="kubernetes1.26-client-1.26.15-150400.9.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941438" comment="kubernetes1.26-client-common-1.26.15-150400.9.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4956" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229821" ref_url="https://bugzilla.suse.com/1229821" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-8381" ref_url="https://www.suse.com/security/cve/CVE-2024-8381/" source="CVE"/>
		<reference ref_id="CVE-2024-8382" ref_url="https://www.suse.com/security/cve/CVE-2024-8382/" source="CVE"/>
		<reference ref_id="CVE-2024-8383" ref_url="https://www.suse.com/security/cve/CVE-2024-8383/" source="CVE"/>
		<reference ref_id="CVE-2024-8384" ref_url="https://www.suse.com/security/cve/CVE-2024-8384/" source="CVE"/>
		<reference ref_id="CVE-2024-8385" ref_url="https://www.suse.com/security/cve/CVE-2024-8385/" source="CVE"/>
		<reference ref_id="CVE-2024-8386" ref_url="https://www.suse.com/security/cve/CVE-2024-8386/" source="CVE"/>
		<reference ref_id="CVE-2024-8387" ref_url="https://www.suse.com/security/cve/CVE-2024-8387/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3157-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036806.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Update to Firefox Extended Support Release 128.2.0 ESR (bsc#1229821)
- CVE-2024-8381: Type confusion when looking up a property name in a 'with' block
- CVE-2024-8382: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks ran
- CVE-2024-8383: Firefox did not ask before openings news: links in an external application
- CVE-2024-8384: Garbage collection could mis-color cross-compartment objects in OOM conditions
- CVE-2024-8385: WASM type confusion involving ArrayTypes
- CVE-2024-8386: SelectElements could be shown over another site if popups are allowed
- CVE-2024-8387: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2
   		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229821">SUSE bug 1229821</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-8381/">CVE-2024-8381 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8381">CVE-2024-8381 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8382/">CVE-2024-8382 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8382">CVE-2024-8382 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-8383/">CVE-2024-8383 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8383">CVE-2024-8383 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-8384/">CVE-2024-8384 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8384">CVE-2024-8384 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8385/">CVE-2024-8385 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8385">CVE-2024-8385 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-8386/">CVE-2024-8386 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8386">CVE-2024-8386 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8387/">CVE-2024-8387 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8387">CVE-2024-8387 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941439" comment="MozillaFirefox-128.2.0-150200.152.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941440" comment="MozillaFirefox-branding-upstream-128.2.0-150200.152.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941441" comment="MozillaFirefox-devel-128.2.0-150200.152.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941442" comment="MozillaFirefox-translations-common-128.2.0-150200.152.149.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941443" comment="MozillaFirefox-translations-other-128.2.0-150200.152.149.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4957" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228046" ref_url="https://bugzilla.suse.com/1228046" source="BUGZILLA"/>
		<reference ref_id="1228047" ref_url="https://bugzilla.suse.com/1228047" source="BUGZILLA"/>
		<reference ref_id="1228048" ref_url="https://bugzilla.suse.com/1228048" source="BUGZILLA"/>
		<reference ref_id="1228050" ref_url="https://bugzilla.suse.com/1228050" source="BUGZILLA"/>
		<reference ref_id="1228051" ref_url="https://bugzilla.suse.com/1228051" source="BUGZILLA"/>
		<reference ref_id="1228052" ref_url="https://bugzilla.suse.com/1228052" source="BUGZILLA"/>
		<reference ref_id="1228346" ref_url="https://bugzilla.suse.com/1228346" source="BUGZILLA"/>
		<reference ref_id="1229224" ref_url="https://bugzilla.suse.com/1229224" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131/" source="CVE"/>
		<reference ref_id="CVE-2024-21138" ref_url="https://www.suse.com/security/cve/CVE-2024-21138/" source="CVE"/>
		<reference ref_id="CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140/" source="CVE"/>
		<reference ref_id="CVE-2024-21144" ref_url="https://www.suse.com/security/cve/CVE-2024-21144/" source="CVE"/>
		<reference ref_id="CVE-2024-21145" ref_url="https://www.suse.com/security/cve/CVE-2024-21145/" source="CVE"/>
		<reference ref_id="CVE-2024-21147" ref_url="https://www.suse.com/security/cve/CVE-2024-21147/" source="CVE"/>
		<reference ref_id="CVE-2024-27267" ref_url="https://www.suse.com/security/cve/CVE-2024-27267/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019376.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 8 Fix Pack 30 (bsc#1228346)
- CVE-2024-21147: Fixed an array index overflow in RangeCheckElimination. (bsc#1228052)
- CVE-2024-21145: Fixed an out-of-bounds access in 2D image handling. (bsc#1228051)
- CVE-2024-21140: Fixed a range check elimination pre-loop limit overflow. (bsc#1228048)
- CVE-2024-21144: Pack200 increase loading time due to improper header validation. (bsc#1228050)
- CVE-2024-21138: Fixed an issue where excessive symbol length can lead to infinite loop. (bsc#1228047)
- CVE-2024-21131: Fixed a potential UTF8 size overflow. (bsc#1228046)
- CVE-2024-27267: Fixed an Object Request Broker (ORB) remote denial of service. (bsc#1229224)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1228046">SUSE bug 1228046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228047">SUSE bug 1228047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228048">SUSE bug 1228048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228050">SUSE bug 1228050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228051">SUSE bug 1228051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228052">SUSE bug 1228052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228346">SUSE bug 1228346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229224">SUSE bug 1229224</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21138/">CVE-2024-21138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21138">CVE-2024-21138 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21144/">CVE-2024-21144 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21144">CVE-2024-21144 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21145/">CVE-2024-21145 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21145">CVE-2024-21145 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-21147/">CVE-2024-21147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21147">CVE-2024-21147 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27267/">CVE-2024-27267 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27267">CVE-2024-27267 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941444" comment="java-1_8_0-ibm-1.8.0_sr8.30-150000.3.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941445" comment="java-1_8_0-ibm-32bit-1.8.0_sr8.30-150000.3.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941446" comment="java-1_8_0-ibm-alsa-1.8.0_sr8.30-150000.3.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941447" comment="java-1_8_0-ibm-demo-1.8.0_sr8.30-150000.3.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941448" comment="java-1_8_0-ibm-devel-1.8.0_sr8.30-150000.3.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941449" comment="java-1_8_0-ibm-devel-32bit-1.8.0_sr8.30-150000.3.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941450" comment="java-1_8_0-ibm-plugin-1.8.0_sr8.30-150000.3.92.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941451" comment="java-1_8_0-ibm-src-1.8.0_sr8.30-150000.3.92.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4958" version="1" class="patch">
	<metadata>
		<title>Security update for gradle (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212930" ref_url="https://bugzilla.suse.com/1212930" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-35946" ref_url="https://www.suse.com/security/cve/CVE-2023-35946/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019375.html" source="SUSE-SU"/>
		<description>
This update for gradle fixes the following issues:

- CVE-2023-35946: Fixed a dependency issue leading the cache to write files into an unintended location. (bsc#1212930) 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-06"/>
	<updated date="2024-09-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1212930">SUSE bug 1212930</bugzilla>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-35946/">CVE-2023-35946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35946">CVE-2023-35946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941452" comment="gradle-4.4.1-150200.3.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4959" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql16 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229013" ref_url="https://bugzilla.suse.com/1229013" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-7348" ref_url="https://www.suse.com/security/cve/CVE-2024-7348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3168-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036821.html" source="SUSE-SU"/>
		<description>
This update for postgresql16 fixes the following issues:

- Upgrade to 15.8 (bsc#1229013)
- CVE-2024-7348: PostgreSQL relation replacement during pg_dump executes arbitrary SQL. (bsc#1229013)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-09"/>
	<updated date="2024-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229013">SUSE bug 1229013</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7348/">CVE-2024-7348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7348">CVE-2024-7348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941602" comment="postgresql15-15.8-150200.5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941603" comment="postgresql15-contrib-15.8-150200.5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941604" comment="postgresql15-devel-15.8-150200.5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941605" comment="postgresql15-docs-15.8-150200.5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941606" comment="postgresql15-llvmjit-15.8-150200.5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941607" comment="postgresql15-llvmjit-devel-15.8-150200.5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941608" comment="postgresql15-plperl-15.8-150200.5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941609" comment="postgresql15-plpython-15.8-150200.5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941610" comment="postgresql15-pltcl-15.8-150200.5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941611" comment="postgresql15-server-15.8-150200.5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941612" comment="postgresql15-server-devel-15.8-150200.5.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941613" comment="postgresql15-test-15.8-150200.5.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4960" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql16 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229013" ref_url="https://bugzilla.suse.com/1229013" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-7348" ref_url="https://www.suse.com/security/cve/CVE-2024-7348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3169-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036820.html" source="SUSE-SU"/>
		<description>
This update for postgresql16 fixes the following issues:

- Upgrade to 14.13 (bsc#1229013)
- CVE-2024-7348: PostgreSQL relation replacement during pg_dump executes arbitrary SQL. (bsc#1229013)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-09"/>
	<updated date="2024-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229013">SUSE bug 1229013</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7348/">CVE-2024-7348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7348">CVE-2024-7348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941614" comment="postgresql14-14.13-150200.5.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941615" comment="postgresql14-contrib-14.13-150200.5.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941616" comment="postgresql14-devel-14.13-150200.5.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941617" comment="postgresql14-docs-14.13-150200.5.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941618" comment="postgresql14-llvmjit-14.13-150200.5.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941619" comment="postgresql14-llvmjit-devel-14.13-150200.5.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941620" comment="postgresql14-plperl-14.13-150200.5.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941621" comment="postgresql14-plpython-14.13-150200.5.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941622" comment="postgresql14-pltcl-14.13-150200.5.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941623" comment="postgresql14-server-14.13-150200.5.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941624" comment="postgresql14-server-devel-14.13-150200.5.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941625" comment="postgresql14-test-14.13-150200.5.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4961" version="1" class="patch">
	<metadata>
		<title>Security update for openconnect (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1140772" ref_url="https://bugzilla.suse.com/1140772" source="BUGZILLA"/>
		<reference ref_id="1157446" ref_url="https://bugzilla.suse.com/1157446" source="BUGZILLA"/>
		<reference ref_id="1170452" ref_url="https://bugzilla.suse.com/1170452" source="BUGZILLA"/>
		<reference ref_id="1171862" ref_url="https://bugzilla.suse.com/1171862" source="BUGZILLA"/>
		<reference ref_id="1215669" ref_url="https://bugzilla.suse.com/1215669" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20319" ref_url="https://www.suse.com/security/cve/CVE-2018-20319/" source="CVE"/>
		<reference ref_id="CVE-2020-12105" ref_url="https://www.suse.com/security/cve/CVE-2020-12105/" source="CVE"/>
		<reference ref_id="CVE-2020-12823" ref_url="https://www.suse.com/security/cve/CVE-2020-12823/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017849.html" source="SUSE-SU"/>
		<description>
This update for openconnect fixes the following issues:

- Update to release 9.12:

  * Explicitly reject overly long tun device names.
  * Increase maximum input size from stdin (#579).
  * Ignore 0.0.0.0 as NBNS address (!446, vpnc-scripts#58).
  * Fix stray (null) in URL path after Pulse authentication (4023bd95).
  * Fix config XML parsing mistake that left GlobalProtect ESP non-working in v9.10 (!475).
  * Fix case sensitivity in GPST header matching (!474).

- Update to release 9.10:

  * Fix external browser authentication with KDE plasma-nm &lt; 5.26.
  * Always redirect stdout to stderr when spawning external browser.
  * Increase default queue length to 32 packets.
  * Fix receiving multiple packets in one TLS frame, and single packets split across multiple TLS frames, for Array.
  * Handle idiosyncratic variation in search domain separators for all protocols
  * Support region selection field for Pulse authentication 
  * Support modified configuration packet from Pulse 9.1R16 servers 
  * Allow hidden form fields to be populated or converted to text fields on the command line
  * Support yet another strange way of encoding challenge-based 2FA for GlobalProtect
  * Add --sni option (and corresponding C and Java API functions) to allow domain-fronting connections in censored/filtered network environments
  * Parrot a GlobalProtect server's software version, if present, as the client version (!333)
  * Fix NULL pointer dereference that has left Android builds broken since v8.20 (!389).
  * Fix Fortinet authentication bug where repeated SVPNCOOKIE causes segfaults (#514, !418).
  * Support F5 VPNs which encode authentication forms only in JSON, not in HTML.
  * Support simultaneous IPv6 and Legacy IP ('dual-stack') for Fortinet .
  * Support 'FTM-push' token mode for Fortinet VPNs .
  * Send IPv6-compatible version string in Pulse IF/T session establishment
  * Add --no-external-auth option to not advertise external-browser authentication
  * Many small improvements in server response parsing, and better logging messages and documentation.

- Update to release 9.01:

  * Add support for AnyConnect 'Session Token Re-use Anchor Protocol' (STRAP) 
  * Add support for AnyConnect 'external browser' SSO mode
  * Bugfix RSA SecurID token decryption and PIN entry forms, broken in v8.20
  * Support Cisco's multiple-certificate authentication
  * Revert GlobalProtect default route handling change from v8.20
  * Suppo split-exclude routes for Fortinet
  * Add webview callback and SAML/SSO support for AnyConnect, GlobalProtect

- Update to release 8.20:

  * Support non-AEAD ciphersuites in DTLSv1.2 with AnyConnect.
  * Emulated a newer version of GlobalProtect official clients,
    5.1.5-8; was 4.0.2-19
  * Support Juniper login forms containing both password and 2FA
    token
  * Explicitly disable 3DES and RC4, unless enabled with
    --allow-insecure-crypto
  * Allow protocols to delay tunnel setup and shutdown (!117)
  * Support for GlobalProtect IPv6
  * SIGUSR1now causes OpenConnect to log detailed connection
    information and statistics
  * Allow --servercert to be specified multiple times in order to
    accept server certificates matching more than one possible
    fingerprint
  * Demangle default routes sent as split routes by GlobalProtect
  * Support more Juniper login forms, including some SSO forms
  * Restore compatibility with newer Cisco servers, by no longer
    sending them the X-AnyConnect-Platform header
  * Add support for PPP-based protocols, currently over TLS only.
  * Add support for two PPP-based protocols, F5 with
    --protocol=f5 and Fortinet with --protocol=fortinet.
  * Add support for Array Networks SSL VPN.
  * Support TLSv1.3 with TPMv2 EC and RSA keys, add test cases
    for swtpm and hardware TPM.

- Import the latest version of the vpnc-script (bsc#1140772)

  * This brings a lot of improvements for non-trivial network setups, IPv6 etc

- Build with --without-gnutls-version-check

- Update to version 8.10:

  * Install bash completion script to
    ${datadir}/bash-completion/completions/openconnect.
  * Improve compatibility of csd-post.sh trojan.
  * Fix potential buffer overflow with GnuTLS describing local
    certs (CVE-2020-12823, bsc#1171862,
    gl#openconnect/openconnect!108).

- Introduce subpackage for bash-completion

- Update to 8.09:

  * Add bash completion support.
  * Give more helpful error in case of Pulse servers asking for
    TNCC.
  * Sanitize non-canonical Legacy IP network addresses.
  * Fix OpenSSL validation for trusted but invalid certificates
    (CVE-2020-12105 bsc#1170452).
  * Convert tncc-wrapper.py to Python 3, and include modernized
    tncc-emulate.py as well. (!91)
  * Disable Nagle's algorithm for TLS sockets, to improve
    interactivity when tunnel runs over TCP rather than UDP.
  * GlobalProtect: more resilient handling of periodic HIP check
    and login arguments, and predictable naming of challenge forms.
  * Work around PKCS#11 tokens which forget to set
    CKF_LOGIN_REQUIRED.

- Update to 8.0.8:

  * Fix check of pin-sha256: public key hashes to be case sensitive
  * Don't give non-functioning stderr to CSD trojan scripts.
  * Fix crash with uninitialised OIDC token.

- Update to 8.0.7:

  * Don't abort Pulse connection when server-provided certificate
    MD5 doesn't match.
  * Fix off-by-one in check for bad GnuTLS versions, and add build
    and run time checks.
  * Don't abort connection if CSD wrapper script returns non-zero
    (for now).
  * Make --passtos work for protocols that use ESP, in addition
    to DTLS.
  * Convert tncc-wrapper.py to Python 3, and include modernized
    tncc-emulate.py as well.

- Remove tncc-wrapper.py script as it is python2 only bsc#1157446

- No need to ship hipreport-android.sh as it is intented for
  android systems only

- Update to 8.0.5:

  * Minor fixes to build on specific platforms
  * Includes fix for a buffer overflow with chunked HTTP handling
    (CVE-2019-16239, bsc#1151178) 

- Use python3 to generate the web data as now it is supported
  by upstream

- Update to 8.0.3:

  * Fix Cisco DTLSv1.2 support for AES256-GCM-SHA384.
  * Fix recognition of OTP password fields.

- Update to 8.02:

  * Fix GNU/Hurd build.
  * Discover vpnc-script in default packaged location on FreeBSD/OpenBSD.
  * Support split-exclude routes for GlobalProtect.
  * Fix GnuTLS builds without libtasn1.
  * Fix DTLS support with OpenSSL 1.1.1+.
  * Add Cisco-compatible DTLSv1.2 support.
  * Invoke script with reason=attempt-reconnect before doing so.
 

- Update to 8.01:

  * Clear form submissions (which may include passwords) before
    freeing (CVE-2018-20319, bsc#1215669).
  * Allow form responses to be provided on command line.
  * Add support for SSL keys stored in TPM2.
  * Fix ESP rekey when replay protection is disabled.
  * Drop support for GnuTLS older than 3.2.10.
  * Fix --passwd-on-stdin for Windows to not forcibly open console.
  * Fix portability of shell scripts in test suite.
  * Add Google Authenticator TOTP support for Juniper.
  * Add RFC7469 key PIN support for cert hashes.
  * Add protocol method to securely log out the Juniper session.
  * Relax requirements for Juniper hostname packet response to support old gateways.
  * Add API functions to query the supported protocols.
  * Verify ESP sequence numbers and warn even if replay protection is disabled.
  * Add support for PAN GlobalProtect VPN protocol (--protocol=gp).
  * Reorganize listing of command-line options, and include information on supported protocols.
  * SIGTERM cleans up the session similarly to SIGINT.
  * Fix memset_s() arguments.
  * Fix OpenBSD build.

- Explicitely enable all the features as needed to stop build if
  something is missing
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2024-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140772">SUSE bug 1140772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157446">SUSE bug 1157446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170452">SUSE bug 1170452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171862">SUSE bug 1171862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215669">SUSE bug 1215669</bugzilla>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20319/">CVE-2018-20319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2018-20319">CVE-2018-20319 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12105/">CVE-2020-12105 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12105">CVE-2020-12105 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12823/">CVE-2020-12823 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12823">CVE-2020-12823 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009809832" comment="liboath-devel-2.6.2-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809833" comment="liboath0-2.6.2-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809834" comment="libopenconnect5-9.12-150400.15.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809835" comment="libpskc-devel-2.6.2-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809836" comment="libpskc0-2.6.2-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809837" comment="libstoken1-0.81-150400.13.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809838" comment="oath-toolkit-2.6.2-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809839" comment="oath-toolkit-xml-2.6.2-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809840" comment="openconnect-9.12-150400.15.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809841" comment="openconnect-devel-9.12-150400.15.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809842" comment="openconnect-doc-9.12-150400.15.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809843" comment="openconnect-lang-9.12-150400.15.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809844" comment="pam_oath-2.6.2-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809845" comment="stoken-0.81-150400.13.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809846" comment="stoken-devel-0.81-150400.13.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009809847" comment="stoken-gui-0.81-150400.13.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4962" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql16 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229013" ref_url="https://bugzilla.suse.com/1229013" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-7348" ref_url="https://www.suse.com/security/cve/CVE-2024-7348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3170-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036819.html" source="SUSE-SU"/>
		<description>
This update for postgresql16 fixes the following issues:

- Upgrade to 16.4 (bsc#1229013)
- CVE-2024-7348: PostgreSQL relation replacement during pg_dump executes arbitrary SQL. (bsc#1229013)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-09"/>
	<updated date="2024-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229013">SUSE bug 1229013</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7348/">CVE-2024-7348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7348">CVE-2024-7348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941626" comment="libecpg6-16.4-150200.5.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941627" comment="libecpg6-32bit-16.4-150200.5.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941628" comment="libpq5-16.4-150200.5.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941629" comment="libpq5-32bit-16.4-150200.5.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941630" comment="postgresql16-16.4-150200.5.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941631" comment="postgresql16-contrib-16.4-150200.5.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941632" comment="postgresql16-devel-16.4-150200.5.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941633" comment="postgresql16-devel-mini-16.4-150200.5.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941634" comment="postgresql16-docs-16.4-150200.5.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941635" comment="postgresql16-llvmjit-16.4-150200.5.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941636" comment="postgresql16-llvmjit-devel-16.4-150200.5.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941637" comment="postgresql16-plperl-16.4-150200.5.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941638" comment="postgresql16-plpython-16.4-150200.5.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941639" comment="postgresql16-pltcl-16.4-150200.5.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941640" comment="postgresql16-server-16.4-150200.5.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941641" comment="postgresql16-server-devel-16.4-150200.5.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941642" comment="postgresql16-test-16.4-150200.5.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4963" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql16 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229013" ref_url="https://bugzilla.suse.com/1229013" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-7348" ref_url="https://www.suse.com/security/cve/CVE-2024-7348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3171-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036818.html" source="SUSE-SU"/>
		<description>
This update for postgresql16 fixes the following issues:

- Upgrade to 13.16 (bsc#1229013)
- CVE-2024-7348: PostgreSQL relation replacement during pg_dump executes arbitrary SQL. (bsc#1229013)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-09"/>
	<updated date="2024-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229013">SUSE bug 1229013</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7348/">CVE-2024-7348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7348">CVE-2024-7348 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941643" comment="postgresql13-13.16-150200.5.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941644" comment="postgresql13-contrib-13.16-150200.5.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941645" comment="postgresql13-devel-13.16-150200.5.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941646" comment="postgresql13-docs-13.16-150200.5.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941647" comment="postgresql13-llvmjit-13.16-150200.5.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941648" comment="postgresql13-llvmjit-devel-13.16-150200.5.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941649" comment="postgresql13-plperl-13.16-150200.5.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941650" comment="postgresql13-plpython-13.16-150200.5.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941651" comment="postgresql13-pltcl-13.16-150200.5.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941652" comment="postgresql13-server-13.16-150200.5.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941653" comment="postgresql13-server-devel-13.16-150200.5.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941654" comment="postgresql13-test-13.16-150200.5.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4964" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227276" ref_url="https://bugzilla.suse.com/1227276" source="BUGZILLA"/>
		<reference ref_id="1227278" ref_url="https://bugzilla.suse.com/1227278" source="BUGZILLA"/>
		<reference ref_id="1227353" ref_url="https://bugzilla.suse.com/1227353" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-38473" ref_url="https://www.suse.com/security/cve/CVE-2024-38473/" source="CVE"/>
		<reference ref_id="CVE-2024-38474" ref_url="https://www.suse.com/security/cve/CVE-2024-38474/" source="CVE"/>
		<reference ref_id="CVE-2024-39884" ref_url="https://www.suse.com/security/cve/CVE-2024-39884/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036816.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2024-38474: Fixed substitution encoding issue in mod_rewrite (bsc#1227278)
- CVE-2024-38473: Fixed encoding problem in mod_proxy (bsc#1227276)
- CVE-2024-39884: Fixed source code disclosure with handlers configured via AddType (bsc#1227353)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-09"/>
	<updated date="2024-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1227276">SUSE bug 1227276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227278">SUSE bug 1227278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227353">SUSE bug 1227353</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-38473/">CVE-2024-38473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38473">CVE-2024-38473 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-38474/">CVE-2024-38474 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38474">CVE-2024-38474 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39884/">CVE-2024-39884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39884">CVE-2024-39884 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941655" comment="apache2-2.4.51-150400.6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941656" comment="apache2-devel-2.4.51-150400.6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941657" comment="apache2-doc-2.4.51-150400.6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941658" comment="apache2-event-2.4.51-150400.6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941659" comment="apache2-example-pages-2.4.51-150400.6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941660" comment="apache2-prefork-2.4.51-150400.6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941661" comment="apache2-utils-2.4.51-150400.6.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941662" comment="apache2-worker-2.4.51-150400.6.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4965" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229823" ref_url="https://bugzilla.suse.com/1229823" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-45230" ref_url="https://www.suse.com/security/cve/CVE-2024-45230/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019406.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

There is an issue with the previous fix for CVE-2024-45230. Please consider the following vulnerability fixed only after the installation of this update.
  - CVE-2024-45230: Fixed potential denial-of-service vulnerability in django.utils.html.urlize(). (bsc#1229823)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-10"/>
	<updated date="2024-09-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229823">SUSE bug 1229823</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45230/">CVE-2024-45230 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45230">CVE-2024-45230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941977" comment="python3-Django-2.0.7-150000.1.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4966" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194111" ref_url="https://bugzilla.suse.com/1194111" source="BUGZILLA"/>
		<reference ref_id="1194765" ref_url="https://bugzilla.suse.com/1194765" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1196261" ref_url="https://bugzilla.suse.com/1196261" source="BUGZILLA"/>
		<reference ref_id="1196516" ref_url="https://bugzilla.suse.com/1196516" source="BUGZILLA"/>
		<reference ref_id="1196894" ref_url="https://bugzilla.suse.com/1196894" source="BUGZILLA"/>
		<reference ref_id="1198017" ref_url="https://bugzilla.suse.com/1198017" source="BUGZILLA"/>
		<reference ref_id="1203329" ref_url="https://bugzilla.suse.com/1203329" source="BUGZILLA"/>
		<reference ref_id="1203330" ref_url="https://bugzilla.suse.com/1203330" source="BUGZILLA"/>
		<reference ref_id="1203360" ref_url="https://bugzilla.suse.com/1203360" source="BUGZILLA"/>
		<reference ref_id="1205462" ref_url="https://bugzilla.suse.com/1205462" source="BUGZILLA"/>
		<reference ref_id="1206006" ref_url="https://bugzilla.suse.com/1206006" source="BUGZILLA"/>
		<reference ref_id="1206258" ref_url="https://bugzilla.suse.com/1206258" source="BUGZILLA"/>
		<reference ref_id="1206843" ref_url="https://bugzilla.suse.com/1206843" source="BUGZILLA"/>
		<reference ref_id="1207158" ref_url="https://bugzilla.suse.com/1207158" source="BUGZILLA"/>
		<reference ref_id="1208783" ref_url="https://bugzilla.suse.com/1208783" source="BUGZILLA"/>
		<reference ref_id="1210644" ref_url="https://bugzilla.suse.com/1210644" source="BUGZILLA"/>
		<reference ref_id="1213580" ref_url="https://bugzilla.suse.com/1213580" source="BUGZILLA"/>
		<reference ref_id="1213632" ref_url="https://bugzilla.suse.com/1213632" source="BUGZILLA"/>
		<reference ref_id="1214285" ref_url="https://bugzilla.suse.com/1214285" source="BUGZILLA"/>
		<reference ref_id="1216834" ref_url="https://bugzilla.suse.com/1216834" source="BUGZILLA"/>
		<reference ref_id="1220428" ref_url="https://bugzilla.suse.com/1220428" source="BUGZILLA"/>
		<reference ref_id="1220877" ref_url="https://bugzilla.suse.com/1220877" source="BUGZILLA"/>
		<reference ref_id="1220962" ref_url="https://bugzilla.suse.com/1220962" source="BUGZILLA"/>
		<reference ref_id="1221269" ref_url="https://bugzilla.suse.com/1221269" source="BUGZILLA"/>
		<reference ref_id="1221326" ref_url="https://bugzilla.suse.com/1221326" source="BUGZILLA"/>
		<reference ref_id="1221630" ref_url="https://bugzilla.suse.com/1221630" source="BUGZILLA"/>
		<reference ref_id="1221645" ref_url="https://bugzilla.suse.com/1221645" source="BUGZILLA"/>
		<reference ref_id="1222335" ref_url="https://bugzilla.suse.com/1222335" source="BUGZILLA"/>
		<reference ref_id="1222350" ref_url="https://bugzilla.suse.com/1222350" source="BUGZILLA"/>
		<reference ref_id="1222372" ref_url="https://bugzilla.suse.com/1222372" source="BUGZILLA"/>
		<reference ref_id="1222387" ref_url="https://bugzilla.suse.com/1222387" source="BUGZILLA"/>
		<reference ref_id="1222634" ref_url="https://bugzilla.suse.com/1222634" source="BUGZILLA"/>
		<reference ref_id="1222808" ref_url="https://bugzilla.suse.com/1222808" source="BUGZILLA"/>
		<reference ref_id="1222967" ref_url="https://bugzilla.suse.com/1222967" source="BUGZILLA"/>
		<reference ref_id="1223074" ref_url="https://bugzilla.suse.com/1223074" source="BUGZILLA"/>
		<reference ref_id="1223191" ref_url="https://bugzilla.suse.com/1223191" source="BUGZILLA"/>
		<reference ref_id="1223508" ref_url="https://bugzilla.suse.com/1223508" source="BUGZILLA"/>
		<reference ref_id="1223720" ref_url="https://bugzilla.suse.com/1223720" source="BUGZILLA"/>
		<reference ref_id="1223742" ref_url="https://bugzilla.suse.com/1223742" source="BUGZILLA"/>
		<reference ref_id="1223777" ref_url="https://bugzilla.suse.com/1223777" source="BUGZILLA"/>
		<reference ref_id="1223803" ref_url="https://bugzilla.suse.com/1223803" source="BUGZILLA"/>
		<reference ref_id="1223807" ref_url="https://bugzilla.suse.com/1223807" source="BUGZILLA"/>
		<reference ref_id="1224105" ref_url="https://bugzilla.suse.com/1224105" source="BUGZILLA"/>
		<reference ref_id="1224415" ref_url="https://bugzilla.suse.com/1224415" source="BUGZILLA"/>
		<reference ref_id="1224496" ref_url="https://bugzilla.suse.com/1224496" source="BUGZILLA"/>
		<reference ref_id="1224510" ref_url="https://bugzilla.suse.com/1224510" source="BUGZILLA"/>
		<reference ref_id="1224542" ref_url="https://bugzilla.suse.com/1224542" source="BUGZILLA"/>
		<reference ref_id="1224578" ref_url="https://bugzilla.suse.com/1224578" source="BUGZILLA"/>
		<reference ref_id="1224639" ref_url="https://bugzilla.suse.com/1224639" source="BUGZILLA"/>
		<reference ref_id="1225162" ref_url="https://bugzilla.suse.com/1225162" source="BUGZILLA"/>
		<reference ref_id="1225352" ref_url="https://bugzilla.suse.com/1225352" source="BUGZILLA"/>
		<reference ref_id="1225428" ref_url="https://bugzilla.suse.com/1225428" source="BUGZILLA"/>
		<reference ref_id="1225524" ref_url="https://bugzilla.suse.com/1225524" source="BUGZILLA"/>
		<reference ref_id="1225578" ref_url="https://bugzilla.suse.com/1225578" source="BUGZILLA"/>
		<reference ref_id="1225582" ref_url="https://bugzilla.suse.com/1225582" source="BUGZILLA"/>
		<reference ref_id="1225773" ref_url="https://bugzilla.suse.com/1225773" source="BUGZILLA"/>
		<reference ref_id="1225814" ref_url="https://bugzilla.suse.com/1225814" source="BUGZILLA"/>
		<reference ref_id="1225827" ref_url="https://bugzilla.suse.com/1225827" source="BUGZILLA"/>
		<reference ref_id="1225832" ref_url="https://bugzilla.suse.com/1225832" source="BUGZILLA"/>
		<reference ref_id="1225903" ref_url="https://bugzilla.suse.com/1225903" source="BUGZILLA"/>
		<reference ref_id="1226168" ref_url="https://bugzilla.suse.com/1226168" source="BUGZILLA"/>
		<reference ref_id="1226530" ref_url="https://bugzilla.suse.com/1226530" source="BUGZILLA"/>
		<reference ref_id="1226613" ref_url="https://bugzilla.suse.com/1226613" source="BUGZILLA"/>
		<reference ref_id="1226742" ref_url="https://bugzilla.suse.com/1226742" source="BUGZILLA"/>
		<reference ref_id="1226765" ref_url="https://bugzilla.suse.com/1226765" source="BUGZILLA"/>
		<reference ref_id="1226798" ref_url="https://bugzilla.suse.com/1226798" source="BUGZILLA"/>
		<reference ref_id="1226801" ref_url="https://bugzilla.suse.com/1226801" source="BUGZILLA"/>
		<reference ref_id="1226874" ref_url="https://bugzilla.suse.com/1226874" source="BUGZILLA"/>
		<reference ref_id="1226885" ref_url="https://bugzilla.suse.com/1226885" source="BUGZILLA"/>
		<reference ref_id="1227079" ref_url="https://bugzilla.suse.com/1227079" source="BUGZILLA"/>
		<reference ref_id="1227623" ref_url="https://bugzilla.suse.com/1227623" source="BUGZILLA"/>
		<reference ref_id="1227761" ref_url="https://bugzilla.suse.com/1227761" source="BUGZILLA"/>
		<reference ref_id="1227830" ref_url="https://bugzilla.suse.com/1227830" source="BUGZILLA"/>
		<reference ref_id="1227863" ref_url="https://bugzilla.suse.com/1227863" source="BUGZILLA"/>
		<reference ref_id="1227867" ref_url="https://bugzilla.suse.com/1227867" source="BUGZILLA"/>
		<reference ref_id="1227929" ref_url="https://bugzilla.suse.com/1227929" source="BUGZILLA"/>
		<reference ref_id="1227937" ref_url="https://bugzilla.suse.com/1227937" source="BUGZILLA"/>
		<reference ref_id="1227958" ref_url="https://bugzilla.suse.com/1227958" source="BUGZILLA"/>
		<reference ref_id="1228020" ref_url="https://bugzilla.suse.com/1228020" source="BUGZILLA"/>
		<reference ref_id="1228065" ref_url="https://bugzilla.suse.com/1228065" source="BUGZILLA"/>
		<reference ref_id="1228114" ref_url="https://bugzilla.suse.com/1228114" source="BUGZILLA"/>
		<reference ref_id="1228410" ref_url="https://bugzilla.suse.com/1228410" source="BUGZILLA"/>
		<reference ref_id="1228426" ref_url="https://bugzilla.suse.com/1228426" source="BUGZILLA"/>
		<reference ref_id="1228427" ref_url="https://bugzilla.suse.com/1228427" source="BUGZILLA"/>
		<reference ref_id="1228429" ref_url="https://bugzilla.suse.com/1228429" source="BUGZILLA"/>
		<reference ref_id="1228446" ref_url="https://bugzilla.suse.com/1228446" source="BUGZILLA"/>
		<reference ref_id="1228447" ref_url="https://bugzilla.suse.com/1228447" source="BUGZILLA"/>
		<reference ref_id="1228449" ref_url="https://bugzilla.suse.com/1228449" source="BUGZILLA"/>
		<reference ref_id="1228450" ref_url="https://bugzilla.suse.com/1228450" source="BUGZILLA"/>
		<reference ref_id="1228452" ref_url="https://bugzilla.suse.com/1228452" source="BUGZILLA"/>
		<reference ref_id="1228456" ref_url="https://bugzilla.suse.com/1228456" source="BUGZILLA"/>
		<reference ref_id="1228463" ref_url="https://bugzilla.suse.com/1228463" source="BUGZILLA"/>
		<reference ref_id="1228466" ref_url="https://bugzilla.suse.com/1228466" source="BUGZILLA"/>
		<reference ref_id="1228467" ref_url="https://bugzilla.suse.com/1228467" source="BUGZILLA"/>
		<reference ref_id="1228469" ref_url="https://bugzilla.suse.com/1228469" source="BUGZILLA"/>
		<reference ref_id="1228480" ref_url="https://bugzilla.suse.com/1228480" source="BUGZILLA"/>
		<reference ref_id="1228481" ref_url="https://bugzilla.suse.com/1228481" source="BUGZILLA"/>
		<reference ref_id="1228482" ref_url="https://bugzilla.suse.com/1228482" source="BUGZILLA"/>
		<reference ref_id="1228483" ref_url="https://bugzilla.suse.com/1228483" source="BUGZILLA"/>
		<reference ref_id="1228484" ref_url="https://bugzilla.suse.com/1228484" source="BUGZILLA"/>
		<reference ref_id="1228485" ref_url="https://bugzilla.suse.com/1228485" source="BUGZILLA"/>
		<reference ref_id="1228487" ref_url="https://bugzilla.suse.com/1228487" source="BUGZILLA"/>
		<reference ref_id="1228489" ref_url="https://bugzilla.suse.com/1228489" source="BUGZILLA"/>
		<reference ref_id="1228491" ref_url="https://bugzilla.suse.com/1228491" source="BUGZILLA"/>
		<reference ref_id="1228493" ref_url="https://bugzilla.suse.com/1228493" source="BUGZILLA"/>
		<reference ref_id="1228494" ref_url="https://bugzilla.suse.com/1228494" source="BUGZILLA"/>
		<reference ref_id="1228495" ref_url="https://bugzilla.suse.com/1228495" source="BUGZILLA"/>
		<reference ref_id="1228496" ref_url="https://bugzilla.suse.com/1228496" source="BUGZILLA"/>
		<reference ref_id="1228501" ref_url="https://bugzilla.suse.com/1228501" source="BUGZILLA"/>
		<reference ref_id="1228503" ref_url="https://bugzilla.suse.com/1228503" source="BUGZILLA"/>
		<reference ref_id="1228509" ref_url="https://bugzilla.suse.com/1228509" source="BUGZILLA"/>
		<reference ref_id="1228513" ref_url="https://bugzilla.suse.com/1228513" source="BUGZILLA"/>
		<reference ref_id="1228515" ref_url="https://bugzilla.suse.com/1228515" source="BUGZILLA"/>
		<reference ref_id="1228516" ref_url="https://bugzilla.suse.com/1228516" source="BUGZILLA"/>
		<reference ref_id="1228526" ref_url="https://bugzilla.suse.com/1228526" source="BUGZILLA"/>
		<reference ref_id="1228531" ref_url="https://bugzilla.suse.com/1228531" source="BUGZILLA"/>
		<reference ref_id="1228563" ref_url="https://bugzilla.suse.com/1228563" source="BUGZILLA"/>
		<reference ref_id="1228564" ref_url="https://bugzilla.suse.com/1228564" source="BUGZILLA"/>
		<reference ref_id="1228567" ref_url="https://bugzilla.suse.com/1228567" source="BUGZILLA"/>
		<reference ref_id="1228576" ref_url="https://bugzilla.suse.com/1228576" source="BUGZILLA"/>
		<reference ref_id="1228579" ref_url="https://bugzilla.suse.com/1228579" source="BUGZILLA"/>
		<reference ref_id="1228584" ref_url="https://bugzilla.suse.com/1228584" source="BUGZILLA"/>
		<reference ref_id="1228588" ref_url="https://bugzilla.suse.com/1228588" source="BUGZILLA"/>
		<reference ref_id="1228590" ref_url="https://bugzilla.suse.com/1228590" source="BUGZILLA"/>
		<reference ref_id="1228615" ref_url="https://bugzilla.suse.com/1228615" source="BUGZILLA"/>
		<reference ref_id="1228616" ref_url="https://bugzilla.suse.com/1228616" source="BUGZILLA"/>
		<reference ref_id="1228635" ref_url="https://bugzilla.suse.com/1228635" source="BUGZILLA"/>
		<reference ref_id="1228636" ref_url="https://bugzilla.suse.com/1228636" source="BUGZILLA"/>
		<reference ref_id="1228654" ref_url="https://bugzilla.suse.com/1228654" source="BUGZILLA"/>
		<reference ref_id="1228656" ref_url="https://bugzilla.suse.com/1228656" source="BUGZILLA"/>
		<reference ref_id="1228658" ref_url="https://bugzilla.suse.com/1228658" source="BUGZILLA"/>
		<reference ref_id="1228660" ref_url="https://bugzilla.suse.com/1228660" source="BUGZILLA"/>
		<reference ref_id="1228662" ref_url="https://bugzilla.suse.com/1228662" source="BUGZILLA"/>
		<reference ref_id="1228667" ref_url="https://bugzilla.suse.com/1228667" source="BUGZILLA"/>
		<reference ref_id="1228673" ref_url="https://bugzilla.suse.com/1228673" source="BUGZILLA"/>
		<reference ref_id="1228677" ref_url="https://bugzilla.suse.com/1228677" source="BUGZILLA"/>
		<reference ref_id="1228687" ref_url="https://bugzilla.suse.com/1228687" source="BUGZILLA"/>
		<reference ref_id="1228706" ref_url="https://bugzilla.suse.com/1228706" source="BUGZILLA"/>
		<reference ref_id="1228708" ref_url="https://bugzilla.suse.com/1228708" source="BUGZILLA"/>
		<reference ref_id="1228710" ref_url="https://bugzilla.suse.com/1228710" source="BUGZILLA"/>
		<reference ref_id="1228718" ref_url="https://bugzilla.suse.com/1228718" source="BUGZILLA"/>
		<reference ref_id="1228720" ref_url="https://bugzilla.suse.com/1228720" source="BUGZILLA"/>
		<reference ref_id="1228721" ref_url="https://bugzilla.suse.com/1228721" source="BUGZILLA"/>
		<reference ref_id="1228722" ref_url="https://bugzilla.suse.com/1228722" source="BUGZILLA"/>
		<reference ref_id="1228724" ref_url="https://bugzilla.suse.com/1228724" source="BUGZILLA"/>
		<reference ref_id="1228726" ref_url="https://bugzilla.suse.com/1228726" source="BUGZILLA"/>
		<reference ref_id="1228727" ref_url="https://bugzilla.suse.com/1228727" source="BUGZILLA"/>
		<reference ref_id="1228733" ref_url="https://bugzilla.suse.com/1228733" source="BUGZILLA"/>
		<reference ref_id="1228748" ref_url="https://bugzilla.suse.com/1228748" source="BUGZILLA"/>
		<reference ref_id="1228766" ref_url="https://bugzilla.suse.com/1228766" source="BUGZILLA"/>
		<reference ref_id="1228779" ref_url="https://bugzilla.suse.com/1228779" source="BUGZILLA"/>
		<reference ref_id="1228801" ref_url="https://bugzilla.suse.com/1228801" source="BUGZILLA"/>
		<reference ref_id="1228850" ref_url="https://bugzilla.suse.com/1228850" source="BUGZILLA"/>
		<reference ref_id="1228857" ref_url="https://bugzilla.suse.com/1228857" source="BUGZILLA"/>
		<reference ref_id="1228959" ref_url="https://bugzilla.suse.com/1228959" source="BUGZILLA"/>
		<reference ref_id="1228964" ref_url="https://bugzilla.suse.com/1228964" source="BUGZILLA"/>
		<reference ref_id="1228966" ref_url="https://bugzilla.suse.com/1228966" source="BUGZILLA"/>
		<reference ref_id="1228967" ref_url="https://bugzilla.suse.com/1228967" source="BUGZILLA"/>
		<reference ref_id="1228979" ref_url="https://bugzilla.suse.com/1228979" source="BUGZILLA"/>
		<reference ref_id="1228988" ref_url="https://bugzilla.suse.com/1228988" source="BUGZILLA"/>
		<reference ref_id="1228989" ref_url="https://bugzilla.suse.com/1228989" source="BUGZILLA"/>
		<reference ref_id="1228991" ref_url="https://bugzilla.suse.com/1228991" source="BUGZILLA"/>
		<reference ref_id="1228992" ref_url="https://bugzilla.suse.com/1228992" source="BUGZILLA"/>
		<reference ref_id="1229042" ref_url="https://bugzilla.suse.com/1229042" source="BUGZILLA"/>
		<reference ref_id="1229054" ref_url="https://bugzilla.suse.com/1229054" source="BUGZILLA"/>
		<reference ref_id="1229086" ref_url="https://bugzilla.suse.com/1229086" source="BUGZILLA"/>
		<reference ref_id="1229136" ref_url="https://bugzilla.suse.com/1229136" source="BUGZILLA"/>
		<reference ref_id="1229154" ref_url="https://bugzilla.suse.com/1229154" source="BUGZILLA"/>
		<reference ref_id="1229187" ref_url="https://bugzilla.suse.com/1229187" source="BUGZILLA"/>
		<reference ref_id="1229188" ref_url="https://bugzilla.suse.com/1229188" source="BUGZILLA"/>
		<reference ref_id="1229190" ref_url="https://bugzilla.suse.com/1229190" source="BUGZILLA"/>
		<reference ref_id="1229287" ref_url="https://bugzilla.suse.com/1229287" source="BUGZILLA"/>
		<reference ref_id="1229290" ref_url="https://bugzilla.suse.com/1229290" source="BUGZILLA"/>
		<reference ref_id="1229292" ref_url="https://bugzilla.suse.com/1229292" source="BUGZILLA"/>
		<reference ref_id="1229296" ref_url="https://bugzilla.suse.com/1229296" source="BUGZILLA"/>
		<reference ref_id="1229297" ref_url="https://bugzilla.suse.com/1229297" source="BUGZILLA"/>
		<reference ref_id="1229301" ref_url="https://bugzilla.suse.com/1229301" source="BUGZILLA"/>
		<reference ref_id="1229303" ref_url="https://bugzilla.suse.com/1229303" source="BUGZILLA"/>
		<reference ref_id="1229304" ref_url="https://bugzilla.suse.com/1229304" source="BUGZILLA"/>
		<reference ref_id="1229305" ref_url="https://bugzilla.suse.com/1229305" source="BUGZILLA"/>
		<reference ref_id="1229307" ref_url="https://bugzilla.suse.com/1229307" source="BUGZILLA"/>
		<reference ref_id="1229309" ref_url="https://bugzilla.suse.com/1229309" source="BUGZILLA"/>
		<reference ref_id="1229312" ref_url="https://bugzilla.suse.com/1229312" source="BUGZILLA"/>
		<reference ref_id="1229314" ref_url="https://bugzilla.suse.com/1229314" source="BUGZILLA"/>
		<reference ref_id="1229315" ref_url="https://bugzilla.suse.com/1229315" source="BUGZILLA"/>
		<reference ref_id="1229317" ref_url="https://bugzilla.suse.com/1229317" source="BUGZILLA"/>
		<reference ref_id="1229318" ref_url="https://bugzilla.suse.com/1229318" source="BUGZILLA"/>
		<reference ref_id="1229319" ref_url="https://bugzilla.suse.com/1229319" source="BUGZILLA"/>
		<reference ref_id="1229327" ref_url="https://bugzilla.suse.com/1229327" source="BUGZILLA"/>
		<reference ref_id="1229341" ref_url="https://bugzilla.suse.com/1229341" source="BUGZILLA"/>
		<reference ref_id="1229345" ref_url="https://bugzilla.suse.com/1229345" source="BUGZILLA"/>
		<reference ref_id="1229346" ref_url="https://bugzilla.suse.com/1229346" source="BUGZILLA"/>
		<reference ref_id="1229347" ref_url="https://bugzilla.suse.com/1229347" source="BUGZILLA"/>
		<reference ref_id="1229349" ref_url="https://bugzilla.suse.com/1229349" source="BUGZILLA"/>
		<reference ref_id="1229350" ref_url="https://bugzilla.suse.com/1229350" source="BUGZILLA"/>
		<reference ref_id="1229351" ref_url="https://bugzilla.suse.com/1229351" source="BUGZILLA"/>
		<reference ref_id="1229354" ref_url="https://bugzilla.suse.com/1229354" source="BUGZILLA"/>
		<reference ref_id="1229356" ref_url="https://bugzilla.suse.com/1229356" source="BUGZILLA"/>
		<reference ref_id="1229357" ref_url="https://bugzilla.suse.com/1229357" source="BUGZILLA"/>
		<reference ref_id="1229358" ref_url="https://bugzilla.suse.com/1229358" source="BUGZILLA"/>
		<reference ref_id="1229359" ref_url="https://bugzilla.suse.com/1229359" source="BUGZILLA"/>
		<reference ref_id="1229360" ref_url="https://bugzilla.suse.com/1229360" source="BUGZILLA"/>
		<reference ref_id="1229366" ref_url="https://bugzilla.suse.com/1229366" source="BUGZILLA"/>
		<reference ref_id="1229370" ref_url="https://bugzilla.suse.com/1229370" source="BUGZILLA"/>
		<reference ref_id="1229373" ref_url="https://bugzilla.suse.com/1229373" source="BUGZILLA"/>
		<reference ref_id="1229374" ref_url="https://bugzilla.suse.com/1229374" source="BUGZILLA"/>
		<reference ref_id="1229381" ref_url="https://bugzilla.suse.com/1229381" source="BUGZILLA"/>
		<reference ref_id="1229382" ref_url="https://bugzilla.suse.com/1229382" source="BUGZILLA"/>
		<reference ref_id="1229383" ref_url="https://bugzilla.suse.com/1229383" source="BUGZILLA"/>
		<reference ref_id="1229386" ref_url="https://bugzilla.suse.com/1229386" source="BUGZILLA"/>
		<reference ref_id="1229388" ref_url="https://bugzilla.suse.com/1229388" source="BUGZILLA"/>
		<reference ref_id="1229391" ref_url="https://bugzilla.suse.com/1229391" source="BUGZILLA"/>
		<reference ref_id="1229392" ref_url="https://bugzilla.suse.com/1229392" source="BUGZILLA"/>
		<reference ref_id="1229395" ref_url="https://bugzilla.suse.com/1229395" source="BUGZILLA"/>
		<reference ref_id="1229398" ref_url="https://bugzilla.suse.com/1229398" source="BUGZILLA"/>
		<reference ref_id="1229399" ref_url="https://bugzilla.suse.com/1229399" source="BUGZILLA"/>
		<reference ref_id="1229400" ref_url="https://bugzilla.suse.com/1229400" source="BUGZILLA"/>
		<reference ref_id="1229407" ref_url="https://bugzilla.suse.com/1229407" source="BUGZILLA"/>
		<reference ref_id="1229409" ref_url="https://bugzilla.suse.com/1229409" source="BUGZILLA"/>
		<reference ref_id="1229410" ref_url="https://bugzilla.suse.com/1229410" source="BUGZILLA"/>
		<reference ref_id="1229411" ref_url="https://bugzilla.suse.com/1229411" source="BUGZILLA"/>
		<reference ref_id="1229413" ref_url="https://bugzilla.suse.com/1229413" source="BUGZILLA"/>
		<reference ref_id="1229414" ref_url="https://bugzilla.suse.com/1229414" source="BUGZILLA"/>
		<reference ref_id="1229417" ref_url="https://bugzilla.suse.com/1229417" source="BUGZILLA"/>
		<reference ref_id="1229418" ref_url="https://bugzilla.suse.com/1229418" source="BUGZILLA"/>
		<reference ref_id="1229444" ref_url="https://bugzilla.suse.com/1229444" source="BUGZILLA"/>
		<reference ref_id="1229453" ref_url="https://bugzilla.suse.com/1229453" source="BUGZILLA"/>
		<reference ref_id="1229454" ref_url="https://bugzilla.suse.com/1229454" source="BUGZILLA"/>
		<reference ref_id="1229481" ref_url="https://bugzilla.suse.com/1229481" source="BUGZILLA"/>
		<reference ref_id="1229482" ref_url="https://bugzilla.suse.com/1229482" source="BUGZILLA"/>
		<reference ref_id="1229488" ref_url="https://bugzilla.suse.com/1229488" source="BUGZILLA"/>
		<reference ref_id="1229489" ref_url="https://bugzilla.suse.com/1229489" source="BUGZILLA"/>
		<reference ref_id="1229490" ref_url="https://bugzilla.suse.com/1229490" source="BUGZILLA"/>
		<reference ref_id="1229493" ref_url="https://bugzilla.suse.com/1229493" source="BUGZILLA"/>
		<reference ref_id="1229495" ref_url="https://bugzilla.suse.com/1229495" source="BUGZILLA"/>
		<reference ref_id="1229497" ref_url="https://bugzilla.suse.com/1229497" source="BUGZILLA"/>
		<reference ref_id="1229500" ref_url="https://bugzilla.suse.com/1229500" source="BUGZILLA"/>
		<reference ref_id="1229503" ref_url="https://bugzilla.suse.com/1229503" source="BUGZILLA"/>
		<reference ref_id="1229506" ref_url="https://bugzilla.suse.com/1229506" source="BUGZILLA"/>
		<reference ref_id="1229507" ref_url="https://bugzilla.suse.com/1229507" source="BUGZILLA"/>
		<reference ref_id="1229508" ref_url="https://bugzilla.suse.com/1229508" source="BUGZILLA"/>
		<reference ref_id="1229509" ref_url="https://bugzilla.suse.com/1229509" source="BUGZILLA"/>
		<reference ref_id="1229510" ref_url="https://bugzilla.suse.com/1229510" source="BUGZILLA"/>
		<reference ref_id="1229512" ref_url="https://bugzilla.suse.com/1229512" source="BUGZILLA"/>
		<reference ref_id="1229516" ref_url="https://bugzilla.suse.com/1229516" source="BUGZILLA"/>
		<reference ref_id="1229521" ref_url="https://bugzilla.suse.com/1229521" source="BUGZILLA"/>
		<reference ref_id="1229522" ref_url="https://bugzilla.suse.com/1229522" source="BUGZILLA"/>
		<reference ref_id="1229523" ref_url="https://bugzilla.suse.com/1229523" source="BUGZILLA"/>
		<reference ref_id="1229524" ref_url="https://bugzilla.suse.com/1229524" source="BUGZILLA"/>
		<reference ref_id="1229525" ref_url="https://bugzilla.suse.com/1229525" source="BUGZILLA"/>
		<reference ref_id="1229526" ref_url="https://bugzilla.suse.com/1229526" source="BUGZILLA"/>
		<reference ref_id="1229527" ref_url="https://bugzilla.suse.com/1229527" source="BUGZILLA"/>
		<reference ref_id="1229528" ref_url="https://bugzilla.suse.com/1229528" source="BUGZILLA"/>
		<reference ref_id="1229529" ref_url="https://bugzilla.suse.com/1229529" source="BUGZILLA"/>
		<reference ref_id="1229531" ref_url="https://bugzilla.suse.com/1229531" source="BUGZILLA"/>
		<reference ref_id="1229533" ref_url="https://bugzilla.suse.com/1229533" source="BUGZILLA"/>
		<reference ref_id="1229535" ref_url="https://bugzilla.suse.com/1229535" source="BUGZILLA"/>
		<reference ref_id="1229536" ref_url="https://bugzilla.suse.com/1229536" source="BUGZILLA"/>
		<reference ref_id="1229537" ref_url="https://bugzilla.suse.com/1229537" source="BUGZILLA"/>
		<reference ref_id="1229540" ref_url="https://bugzilla.suse.com/1229540" source="BUGZILLA"/>
		<reference ref_id="1229544" ref_url="https://bugzilla.suse.com/1229544" source="BUGZILLA"/>
		<reference ref_id="1229545" ref_url="https://bugzilla.suse.com/1229545" source="BUGZILLA"/>
		<reference ref_id="1229546" ref_url="https://bugzilla.suse.com/1229546" source="BUGZILLA"/>
		<reference ref_id="1229547" ref_url="https://bugzilla.suse.com/1229547" source="BUGZILLA"/>
		<reference ref_id="1229548" ref_url="https://bugzilla.suse.com/1229548" source="BUGZILLA"/>
		<reference ref_id="1229554" ref_url="https://bugzilla.suse.com/1229554" source="BUGZILLA"/>
		<reference ref_id="1229557" ref_url="https://bugzilla.suse.com/1229557" source="BUGZILLA"/>
		<reference ref_id="1229558" ref_url="https://bugzilla.suse.com/1229558" source="BUGZILLA"/>
		<reference ref_id="1229559" ref_url="https://bugzilla.suse.com/1229559" source="BUGZILLA"/>
		<reference ref_id="1229560" ref_url="https://bugzilla.suse.com/1229560" source="BUGZILLA"/>
		<reference ref_id="1229562" ref_url="https://bugzilla.suse.com/1229562" source="BUGZILLA"/>
		<reference ref_id="1229564" ref_url="https://bugzilla.suse.com/1229564" source="BUGZILLA"/>
		<reference ref_id="1229565" ref_url="https://bugzilla.suse.com/1229565" source="BUGZILLA"/>
		<reference ref_id="1229566" ref_url="https://bugzilla.suse.com/1229566" source="BUGZILLA"/>
		<reference ref_id="1229568" ref_url="https://bugzilla.suse.com/1229568" source="BUGZILLA"/>
		<reference ref_id="1229569" ref_url="https://bugzilla.suse.com/1229569" source="BUGZILLA"/>
		<reference ref_id="1229572" ref_url="https://bugzilla.suse.com/1229572" source="BUGZILLA"/>
		<reference ref_id="1229573" ref_url="https://bugzilla.suse.com/1229573" source="BUGZILLA"/>
		<reference ref_id="1229576" ref_url="https://bugzilla.suse.com/1229576" source="BUGZILLA"/>
		<reference ref_id="1229581" ref_url="https://bugzilla.suse.com/1229581" source="BUGZILLA"/>
		<reference ref_id="1229588" ref_url="https://bugzilla.suse.com/1229588" source="BUGZILLA"/>
		<reference ref_id="1229598" ref_url="https://bugzilla.suse.com/1229598" source="BUGZILLA"/>
		<reference ref_id="1229603" ref_url="https://bugzilla.suse.com/1229603" source="BUGZILLA"/>
		<reference ref_id="1229604" ref_url="https://bugzilla.suse.com/1229604" source="BUGZILLA"/>
		<reference ref_id="1229605" ref_url="https://bugzilla.suse.com/1229605" source="BUGZILLA"/>
		<reference ref_id="1229608" ref_url="https://bugzilla.suse.com/1229608" source="BUGZILLA"/>
		<reference ref_id="1229611" ref_url="https://bugzilla.suse.com/1229611" source="BUGZILLA"/>
		<reference ref_id="1229612" ref_url="https://bugzilla.suse.com/1229612" source="BUGZILLA"/>
		<reference ref_id="1229613" ref_url="https://bugzilla.suse.com/1229613" source="BUGZILLA"/>
		<reference ref_id="1229614" ref_url="https://bugzilla.suse.com/1229614" source="BUGZILLA"/>
		<reference ref_id="1229615" ref_url="https://bugzilla.suse.com/1229615" source="BUGZILLA"/>
		<reference ref_id="1229616" ref_url="https://bugzilla.suse.com/1229616" source="BUGZILLA"/>
		<reference ref_id="1229617" ref_url="https://bugzilla.suse.com/1229617" source="BUGZILLA"/>
		<reference ref_id="1229620" ref_url="https://bugzilla.suse.com/1229620" source="BUGZILLA"/>
		<reference ref_id="1229622" ref_url="https://bugzilla.suse.com/1229622" source="BUGZILLA"/>
		<reference ref_id="1229623" ref_url="https://bugzilla.suse.com/1229623" source="BUGZILLA"/>
		<reference ref_id="1229624" ref_url="https://bugzilla.suse.com/1229624" source="BUGZILLA"/>
		<reference ref_id="1229625" ref_url="https://bugzilla.suse.com/1229625" source="BUGZILLA"/>
		<reference ref_id="1229626" ref_url="https://bugzilla.suse.com/1229626" source="BUGZILLA"/>
		<reference ref_id="1229628" ref_url="https://bugzilla.suse.com/1229628" source="BUGZILLA"/>
		<reference ref_id="1229629" ref_url="https://bugzilla.suse.com/1229629" source="BUGZILLA"/>
		<reference ref_id="1229630" ref_url="https://bugzilla.suse.com/1229630" source="BUGZILLA"/>
		<reference ref_id="1229631" ref_url="https://bugzilla.suse.com/1229631" source="BUGZILLA"/>
		<reference ref_id="1229632" ref_url="https://bugzilla.suse.com/1229632" source="BUGZILLA"/>
		<reference ref_id="1229635" ref_url="https://bugzilla.suse.com/1229635" source="BUGZILLA"/>
		<reference ref_id="1229636" ref_url="https://bugzilla.suse.com/1229636" source="BUGZILLA"/>
		<reference ref_id="1229637" ref_url="https://bugzilla.suse.com/1229637" source="BUGZILLA"/>
		<reference ref_id="1229638" ref_url="https://bugzilla.suse.com/1229638" source="BUGZILLA"/>
		<reference ref_id="1229639" ref_url="https://bugzilla.suse.com/1229639" source="BUGZILLA"/>
		<reference ref_id="1229641" ref_url="https://bugzilla.suse.com/1229641" source="BUGZILLA"/>
		<reference ref_id="1229642" ref_url="https://bugzilla.suse.com/1229642" source="BUGZILLA"/>
		<reference ref_id="1229643" ref_url="https://bugzilla.suse.com/1229643" source="BUGZILLA"/>
		<reference ref_id="1229645" ref_url="https://bugzilla.suse.com/1229645" source="BUGZILLA"/>
		<reference ref_id="1229657" ref_url="https://bugzilla.suse.com/1229657" source="BUGZILLA"/>
		<reference ref_id="1229658" ref_url="https://bugzilla.suse.com/1229658" source="BUGZILLA"/>
		<reference ref_id="1229662" ref_url="https://bugzilla.suse.com/1229662" source="BUGZILLA"/>
		<reference ref_id="1229664" ref_url="https://bugzilla.suse.com/1229664" source="BUGZILLA"/>
		<reference ref_id="1229707" ref_url="https://bugzilla.suse.com/1229707" source="BUGZILLA"/>
		<reference ref_id="1229739" ref_url="https://bugzilla.suse.com/1229739" source="BUGZILLA"/>
		<reference ref_id="1229743" ref_url="https://bugzilla.suse.com/1229743" source="BUGZILLA"/>
		<reference ref_id="1229746" ref_url="https://bugzilla.suse.com/1229746" source="BUGZILLA"/>
		<reference ref_id="1229754" ref_url="https://bugzilla.suse.com/1229754" source="BUGZILLA"/>
		<reference ref_id="1229755" ref_url="https://bugzilla.suse.com/1229755" source="BUGZILLA"/>
		<reference ref_id="1229756" ref_url="https://bugzilla.suse.com/1229756" source="BUGZILLA"/>
		<reference ref_id="1229759" ref_url="https://bugzilla.suse.com/1229759" source="BUGZILLA"/>
		<reference ref_id="1229761" ref_url="https://bugzilla.suse.com/1229761" source="BUGZILLA"/>
		<reference ref_id="1229767" ref_url="https://bugzilla.suse.com/1229767" source="BUGZILLA"/>
		<reference ref_id="1229768" ref_url="https://bugzilla.suse.com/1229768" source="BUGZILLA"/>
		<reference ref_id="1229781" ref_url="https://bugzilla.suse.com/1229781" source="BUGZILLA"/>
		<reference ref_id="1229784" ref_url="https://bugzilla.suse.com/1229784" source="BUGZILLA"/>
		<reference ref_id="1229787" ref_url="https://bugzilla.suse.com/1229787" source="BUGZILLA"/>
		<reference ref_id="1229788" ref_url="https://bugzilla.suse.com/1229788" source="BUGZILLA"/>
		<reference ref_id="1229789" ref_url="https://bugzilla.suse.com/1229789" source="BUGZILLA"/>
		<reference ref_id="1229792" ref_url="https://bugzilla.suse.com/1229792" source="BUGZILLA"/>
		<reference ref_id="1229820" ref_url="https://bugzilla.suse.com/1229820" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4441" ref_url="https://www.suse.com/security/cve/CVE-2021-4441/" source="CVE"/>
		<reference ref_id="CVE-2021-47106" ref_url="https://www.suse.com/security/cve/CVE-2021-47106/" source="CVE"/>
		<reference ref_id="CVE-2021-47517" ref_url="https://www.suse.com/security/cve/CVE-2021-47517/" source="CVE"/>
		<reference ref_id="CVE-2021-47546" ref_url="https://www.suse.com/security/cve/CVE-2021-47546/" source="CVE"/>
		<reference ref_id="CVE-2022-38457" ref_url="https://www.suse.com/security/cve/CVE-2022-38457/" source="CVE"/>
		<reference ref_id="CVE-2022-40133" ref_url="https://www.suse.com/security/cve/CVE-2022-40133/" source="CVE"/>
		<reference ref_id="CVE-2022-48645" ref_url="https://www.suse.com/security/cve/CVE-2022-48645/" source="CVE"/>
		<reference ref_id="CVE-2022-48706" ref_url="https://www.suse.com/security/cve/CVE-2022-48706/" source="CVE"/>
		<reference ref_id="CVE-2022-48808" ref_url="https://www.suse.com/security/cve/CVE-2022-48808/" source="CVE"/>
		<reference ref_id="CVE-2022-48865" ref_url="https://www.suse.com/security/cve/CVE-2022-48865/" source="CVE"/>
		<reference ref_id="CVE-2022-48868" ref_url="https://www.suse.com/security/cve/CVE-2022-48868/" source="CVE"/>
		<reference ref_id="CVE-2022-48869" ref_url="https://www.suse.com/security/cve/CVE-2022-48869/" source="CVE"/>
		<reference ref_id="CVE-2022-48870" ref_url="https://www.suse.com/security/cve/CVE-2022-48870/" source="CVE"/>
		<reference ref_id="CVE-2022-48871" ref_url="https://www.suse.com/security/cve/CVE-2022-48871/" source="CVE"/>
		<reference ref_id="CVE-2022-48872" ref_url="https://www.suse.com/security/cve/CVE-2022-48872/" source="CVE"/>
		<reference ref_id="CVE-2022-48873" ref_url="https://www.suse.com/security/cve/CVE-2022-48873/" source="CVE"/>
		<reference ref_id="CVE-2022-48875" ref_url="https://www.suse.com/security/cve/CVE-2022-48875/" source="CVE"/>
		<reference ref_id="CVE-2022-48878" ref_url="https://www.suse.com/security/cve/CVE-2022-48878/" source="CVE"/>
		<reference ref_id="CVE-2022-48880" ref_url="https://www.suse.com/security/cve/CVE-2022-48880/" source="CVE"/>
		<reference ref_id="CVE-2022-48881" ref_url="https://www.suse.com/security/cve/CVE-2022-48881/" source="CVE"/>
		<reference ref_id="CVE-2022-48882" ref_url="https://www.suse.com/security/cve/CVE-2022-48882/" source="CVE"/>
		<reference ref_id="CVE-2022-48883" ref_url="https://www.suse.com/security/cve/CVE-2022-48883/" source="CVE"/>
		<reference ref_id="CVE-2022-48884" ref_url="https://www.suse.com/security/cve/CVE-2022-48884/" source="CVE"/>
		<reference ref_id="CVE-2022-48885" ref_url="https://www.suse.com/security/cve/CVE-2022-48885/" source="CVE"/>
		<reference ref_id="CVE-2022-48886" ref_url="https://www.suse.com/security/cve/CVE-2022-48886/" source="CVE"/>
		<reference ref_id="CVE-2022-48887" ref_url="https://www.suse.com/security/cve/CVE-2022-48887/" source="CVE"/>
		<reference ref_id="CVE-2022-48888" ref_url="https://www.suse.com/security/cve/CVE-2022-48888/" source="CVE"/>
		<reference ref_id="CVE-2022-48889" ref_url="https://www.suse.com/security/cve/CVE-2022-48889/" source="CVE"/>
		<reference ref_id="CVE-2022-48890" ref_url="https://www.suse.com/security/cve/CVE-2022-48890/" source="CVE"/>
		<reference ref_id="CVE-2022-48891" ref_url="https://www.suse.com/security/cve/CVE-2022-48891/" source="CVE"/>
		<reference ref_id="CVE-2022-48893" ref_url="https://www.suse.com/security/cve/CVE-2022-48893/" source="CVE"/>
		<reference ref_id="CVE-2022-48896" ref_url="https://www.suse.com/security/cve/CVE-2022-48896/" source="CVE"/>
		<reference ref_id="CVE-2022-48898" ref_url="https://www.suse.com/security/cve/CVE-2022-48898/" source="CVE"/>
		<reference ref_id="CVE-2022-48899" ref_url="https://www.suse.com/security/cve/CVE-2022-48899/" source="CVE"/>
		<reference ref_id="CVE-2022-48903" ref_url="https://www.suse.com/security/cve/CVE-2022-48903/" source="CVE"/>
		<reference ref_id="CVE-2022-48904" ref_url="https://www.suse.com/security/cve/CVE-2022-48904/" source="CVE"/>
		<reference ref_id="CVE-2022-48905" ref_url="https://www.suse.com/security/cve/CVE-2022-48905/" source="CVE"/>
		<reference ref_id="CVE-2022-48906" ref_url="https://www.suse.com/security/cve/CVE-2022-48906/" source="CVE"/>
		<reference ref_id="CVE-2022-48907" ref_url="https://www.suse.com/security/cve/CVE-2022-48907/" source="CVE"/>
		<reference ref_id="CVE-2022-48909" ref_url="https://www.suse.com/security/cve/CVE-2022-48909/" source="CVE"/>
		<reference ref_id="CVE-2022-48910" ref_url="https://www.suse.com/security/cve/CVE-2022-48910/" source="CVE"/>
		<reference ref_id="CVE-2022-48912" ref_url="https://www.suse.com/security/cve/CVE-2022-48912/" source="CVE"/>
		<reference ref_id="CVE-2022-48913" ref_url="https://www.suse.com/security/cve/CVE-2022-48913/" source="CVE"/>
		<reference ref_id="CVE-2022-48914" ref_url="https://www.suse.com/security/cve/CVE-2022-48914/" source="CVE"/>
		<reference ref_id="CVE-2022-48915" ref_url="https://www.suse.com/security/cve/CVE-2022-48915/" source="CVE"/>
		<reference ref_id="CVE-2022-48916" ref_url="https://www.suse.com/security/cve/CVE-2022-48916/" source="CVE"/>
		<reference ref_id="CVE-2022-48917" ref_url="https://www.suse.com/security/cve/CVE-2022-48917/" source="CVE"/>
		<reference ref_id="CVE-2022-48918" ref_url="https://www.suse.com/security/cve/CVE-2022-48918/" source="CVE"/>
		<reference ref_id="CVE-2022-48919" ref_url="https://www.suse.com/security/cve/CVE-2022-48919/" source="CVE"/>
		<reference ref_id="CVE-2022-48920" ref_url="https://www.suse.com/security/cve/CVE-2022-48920/" source="CVE"/>
		<reference ref_id="CVE-2022-48921" ref_url="https://www.suse.com/security/cve/CVE-2022-48921/" source="CVE"/>
		<reference ref_id="CVE-2022-48923" ref_url="https://www.suse.com/security/cve/CVE-2022-48923/" source="CVE"/>
		<reference ref_id="CVE-2022-48924" ref_url="https://www.suse.com/security/cve/CVE-2022-48924/" source="CVE"/>
		<reference ref_id="CVE-2022-48925" ref_url="https://www.suse.com/security/cve/CVE-2022-48925/" source="CVE"/>
		<reference ref_id="CVE-2022-48926" ref_url="https://www.suse.com/security/cve/CVE-2022-48926/" source="CVE"/>
		<reference ref_id="CVE-2022-48927" ref_url="https://www.suse.com/security/cve/CVE-2022-48927/" source="CVE"/>
		<reference ref_id="CVE-2022-48928" ref_url="https://www.suse.com/security/cve/CVE-2022-48928/" source="CVE"/>
		<reference ref_id="CVE-2022-48929" ref_url="https://www.suse.com/security/cve/CVE-2022-48929/" source="CVE"/>
		<reference ref_id="CVE-2022-48930" ref_url="https://www.suse.com/security/cve/CVE-2022-48930/" source="CVE"/>
		<reference ref_id="CVE-2022-48931" ref_url="https://www.suse.com/security/cve/CVE-2022-48931/" source="CVE"/>
		<reference ref_id="CVE-2022-48932" ref_url="https://www.suse.com/security/cve/CVE-2022-48932/" source="CVE"/>
		<reference ref_id="CVE-2022-48934" ref_url="https://www.suse.com/security/cve/CVE-2022-48934/" source="CVE"/>
		<reference ref_id="CVE-2022-48937" ref_url="https://www.suse.com/security/cve/CVE-2022-48937/" source="CVE"/>
		<reference ref_id="CVE-2022-48938" ref_url="https://www.suse.com/security/cve/CVE-2022-48938/" source="CVE"/>
		<reference ref_id="CVE-2022-48939" ref_url="https://www.suse.com/security/cve/CVE-2022-48939/" source="CVE"/>
		<reference ref_id="CVE-2022-48940" ref_url="https://www.suse.com/security/cve/CVE-2022-48940/" source="CVE"/>
		<reference ref_id="CVE-2022-48941" ref_url="https://www.suse.com/security/cve/CVE-2022-48941/" source="CVE"/>
		<reference ref_id="CVE-2022-48942" ref_url="https://www.suse.com/security/cve/CVE-2022-48942/" source="CVE"/>
		<reference ref_id="CVE-2022-48943" ref_url="https://www.suse.com/security/cve/CVE-2022-48943/" source="CVE"/>
		<reference ref_id="CVE-2023-3610" ref_url="https://www.suse.com/security/cve/CVE-2023-3610/" source="CVE"/>
		<reference ref_id="CVE-2023-52458" ref_url="https://www.suse.com/security/cve/CVE-2023-52458/" source="CVE"/>
		<reference ref_id="CVE-2023-52489" ref_url="https://www.suse.com/security/cve/CVE-2023-52489/" source="CVE"/>
		<reference ref_id="CVE-2023-52498" ref_url="https://www.suse.com/security/cve/CVE-2023-52498/" source="CVE"/>
		<reference ref_id="CVE-2023-52581" ref_url="https://www.suse.com/security/cve/CVE-2023-52581/" source="CVE"/>
		<reference ref_id="CVE-2023-52859" ref_url="https://www.suse.com/security/cve/CVE-2023-52859/" source="CVE"/>
		<reference ref_id="CVE-2023-52887" ref_url="https://www.suse.com/security/cve/CVE-2023-52887/" source="CVE"/>
		<reference ref_id="CVE-2023-52889" ref_url="https://www.suse.com/security/cve/CVE-2023-52889/" source="CVE"/>
		<reference ref_id="CVE-2023-52893" ref_url="https://www.suse.com/security/cve/CVE-2023-52893/" source="CVE"/>
		<reference ref_id="CVE-2023-52894" ref_url="https://www.suse.com/security/cve/CVE-2023-52894/" source="CVE"/>
		<reference ref_id="CVE-2023-52896" ref_url="https://www.suse.com/security/cve/CVE-2023-52896/" source="CVE"/>
		<reference ref_id="CVE-2023-52898" ref_url="https://www.suse.com/security/cve/CVE-2023-52898/" source="CVE"/>
		<reference ref_id="CVE-2023-52899" ref_url="https://www.suse.com/security/cve/CVE-2023-52899/" source="CVE"/>
		<reference ref_id="CVE-2023-52900" ref_url="https://www.suse.com/security/cve/CVE-2023-52900/" source="CVE"/>
		<reference ref_id="CVE-2023-52901" ref_url="https://www.suse.com/security/cve/CVE-2023-52901/" source="CVE"/>
		<reference ref_id="CVE-2023-52904" ref_url="https://www.suse.com/security/cve/CVE-2023-52904/" source="CVE"/>
		<reference ref_id="CVE-2023-52905" ref_url="https://www.suse.com/security/cve/CVE-2023-52905/" source="CVE"/>
		<reference ref_id="CVE-2023-52906" ref_url="https://www.suse.com/security/cve/CVE-2023-52906/" source="CVE"/>
		<reference ref_id="CVE-2023-52907" ref_url="https://www.suse.com/security/cve/CVE-2023-52907/" source="CVE"/>
		<reference ref_id="CVE-2023-52908" ref_url="https://www.suse.com/security/cve/CVE-2023-52908/" source="CVE"/>
		<reference ref_id="CVE-2023-52909" ref_url="https://www.suse.com/security/cve/CVE-2023-52909/" source="CVE"/>
		<reference ref_id="CVE-2023-52910" ref_url="https://www.suse.com/security/cve/CVE-2023-52910/" source="CVE"/>
		<reference ref_id="CVE-2023-52911" ref_url="https://www.suse.com/security/cve/CVE-2023-52911/" source="CVE"/>
		<reference ref_id="CVE-2023-52912" ref_url="https://www.suse.com/security/cve/CVE-2023-52912/" source="CVE"/>
		<reference ref_id="CVE-2023-52913" ref_url="https://www.suse.com/security/cve/CVE-2023-52913/" source="CVE"/>
		<reference ref_id="CVE-2024-26631" ref_url="https://www.suse.com/security/cve/CVE-2024-26631/" source="CVE"/>
		<reference ref_id="CVE-2024-26668" ref_url="https://www.suse.com/security/cve/CVE-2024-26668/" source="CVE"/>
		<reference ref_id="CVE-2024-26669" ref_url="https://www.suse.com/security/cve/CVE-2024-26669/" source="CVE"/>
		<reference ref_id="CVE-2024-26677" ref_url="https://www.suse.com/security/cve/CVE-2024-26677/" source="CVE"/>
		<reference ref_id="CVE-2024-26735" ref_url="https://www.suse.com/security/cve/CVE-2024-26735/" source="CVE"/>
		<reference ref_id="CVE-2024-26808" ref_url="https://www.suse.com/security/cve/CVE-2024-26808/" source="CVE"/>
		<reference ref_id="CVE-2024-26812" ref_url="https://www.suse.com/security/cve/CVE-2024-26812/" source="CVE"/>
		<reference ref_id="CVE-2024-26835" ref_url="https://www.suse.com/security/cve/CVE-2024-26835/" source="CVE"/>
		<reference ref_id="CVE-2024-26851" ref_url="https://www.suse.com/security/cve/CVE-2024-26851/" source="CVE"/>
		<reference ref_id="CVE-2024-27010" ref_url="https://www.suse.com/security/cve/CVE-2024-27010/" source="CVE"/>
		<reference ref_id="CVE-2024-27011" ref_url="https://www.suse.com/security/cve/CVE-2024-27011/" source="CVE"/>
		<reference ref_id="CVE-2024-27016" ref_url="https://www.suse.com/security/cve/CVE-2024-27016/" source="CVE"/>
		<reference ref_id="CVE-2024-27024" ref_url="https://www.suse.com/security/cve/CVE-2024-27024/" source="CVE"/>
		<reference ref_id="CVE-2024-27079" ref_url="https://www.suse.com/security/cve/CVE-2024-27079/" source="CVE"/>
		<reference ref_id="CVE-2024-27403" ref_url="https://www.suse.com/security/cve/CVE-2024-27403/" source="CVE"/>
		<reference ref_id="CVE-2024-31076" ref_url="https://www.suse.com/security/cve/CVE-2024-31076/" source="CVE"/>
		<reference ref_id="CVE-2024-35897" ref_url="https://www.suse.com/security/cve/CVE-2024-35897/" source="CVE"/>
		<reference ref_id="CVE-2024-35902" ref_url="https://www.suse.com/security/cve/CVE-2024-35902/" source="CVE"/>
		<reference ref_id="CVE-2024-35945" ref_url="https://www.suse.com/security/cve/CVE-2024-35945/" source="CVE"/>
		<reference ref_id="CVE-2024-35971" ref_url="https://www.suse.com/security/cve/CVE-2024-35971/" source="CVE"/>
		<reference ref_id="CVE-2024-36009" ref_url="https://www.suse.com/security/cve/CVE-2024-36009/" source="CVE"/>
		<reference ref_id="CVE-2024-36013" ref_url="https://www.suse.com/security/cve/CVE-2024-36013/" source="CVE"/>
		<reference ref_id="CVE-2024-36270" ref_url="https://www.suse.com/security/cve/CVE-2024-36270/" source="CVE"/>
		<reference ref_id="CVE-2024-36286" ref_url="https://www.suse.com/security/cve/CVE-2024-36286/" source="CVE"/>
		<reference ref_id="CVE-2024-36489" ref_url="https://www.suse.com/security/cve/CVE-2024-36489/" source="CVE"/>
		<reference ref_id="CVE-2024-36929" ref_url="https://www.suse.com/security/cve/CVE-2024-36929/" source="CVE"/>
		<reference ref_id="CVE-2024-36933" ref_url="https://www.suse.com/security/cve/CVE-2024-36933/" source="CVE"/>
		<reference ref_id="CVE-2024-36936" ref_url="https://www.suse.com/security/cve/CVE-2024-36936/" source="CVE"/>
		<reference ref_id="CVE-2024-36962" ref_url="https://www.suse.com/security/cve/CVE-2024-36962/" source="CVE"/>
		<reference ref_id="CVE-2024-38554" ref_url="https://www.suse.com/security/cve/CVE-2024-38554/" source="CVE"/>
		<reference ref_id="CVE-2024-38602" ref_url="https://www.suse.com/security/cve/CVE-2024-38602/" source="CVE"/>
		<reference ref_id="CVE-2024-38662" ref_url="https://www.suse.com/security/cve/CVE-2024-38662/" source="CVE"/>
		<reference ref_id="CVE-2024-39489" ref_url="https://www.suse.com/security/cve/CVE-2024-39489/" source="CVE"/>
		<reference ref_id="CVE-2024-40905" ref_url="https://www.suse.com/security/cve/CVE-2024-40905/" source="CVE"/>
		<reference ref_id="CVE-2024-40978" ref_url="https://www.suse.com/security/cve/CVE-2024-40978/" source="CVE"/>
		<reference ref_id="CVE-2024-40980" ref_url="https://www.suse.com/security/cve/CVE-2024-40980/" source="CVE"/>
		<reference ref_id="CVE-2024-40995" ref_url="https://www.suse.com/security/cve/CVE-2024-40995/" source="CVE"/>
		<reference ref_id="CVE-2024-41000" ref_url="https://www.suse.com/security/cve/CVE-2024-41000/" source="CVE"/>
		<reference ref_id="CVE-2024-41007" ref_url="https://www.suse.com/security/cve/CVE-2024-41007/" source="CVE"/>
		<reference ref_id="CVE-2024-41009" ref_url="https://www.suse.com/security/cve/CVE-2024-41009/" source="CVE"/>
		<reference ref_id="CVE-2024-41011" ref_url="https://www.suse.com/security/cve/CVE-2024-41011/" source="CVE"/>
		<reference ref_id="CVE-2024-41016" ref_url="https://www.suse.com/security/cve/CVE-2024-41016/" source="CVE"/>
		<reference ref_id="CVE-2024-41020" ref_url="https://www.suse.com/security/cve/CVE-2024-41020/" source="CVE"/>
		<reference ref_id="CVE-2024-41022" ref_url="https://www.suse.com/security/cve/CVE-2024-41022/" source="CVE"/>
		<reference ref_id="CVE-2024-41035" ref_url="https://www.suse.com/security/cve/CVE-2024-41035/" source="CVE"/>
		<reference ref_id="CVE-2024-41036" ref_url="https://www.suse.com/security/cve/CVE-2024-41036/" source="CVE"/>
		<reference ref_id="CVE-2024-41038" ref_url="https://www.suse.com/security/cve/CVE-2024-41038/" source="CVE"/>
		<reference ref_id="CVE-2024-41039" ref_url="https://www.suse.com/security/cve/CVE-2024-41039/" source="CVE"/>
		<reference ref_id="CVE-2024-41042" ref_url="https://www.suse.com/security/cve/CVE-2024-41042/" source="CVE"/>
		<reference ref_id="CVE-2024-41045" ref_url="https://www.suse.com/security/cve/CVE-2024-41045/" source="CVE"/>
		<reference ref_id="CVE-2024-41056" ref_url="https://www.suse.com/security/cve/CVE-2024-41056/" source="CVE"/>
		<reference ref_id="CVE-2024-41060" ref_url="https://www.suse.com/security/cve/CVE-2024-41060/" source="CVE"/>
		<reference ref_id="CVE-2024-41062" ref_url="https://www.suse.com/security/cve/CVE-2024-41062/" source="CVE"/>
		<reference ref_id="CVE-2024-41065" ref_url="https://www.suse.com/security/cve/CVE-2024-41065/" source="CVE"/>
		<reference ref_id="CVE-2024-41068" ref_url="https://www.suse.com/security/cve/CVE-2024-41068/" source="CVE"/>
		<reference ref_id="CVE-2024-41073" ref_url="https://www.suse.com/security/cve/CVE-2024-41073/" source="CVE"/>
		<reference ref_id="CVE-2024-41079" ref_url="https://www.suse.com/security/cve/CVE-2024-41079/" source="CVE"/>
		<reference ref_id="CVE-2024-41080" ref_url="https://www.suse.com/security/cve/CVE-2024-41080/" source="CVE"/>
		<reference ref_id="CVE-2024-41087" ref_url="https://www.suse.com/security/cve/CVE-2024-41087/" source="CVE"/>
		<reference ref_id="CVE-2024-41088" ref_url="https://www.suse.com/security/cve/CVE-2024-41088/" source="CVE"/>
		<reference ref_id="CVE-2024-41089" ref_url="https://www.suse.com/security/cve/CVE-2024-41089/" source="CVE"/>
		<reference ref_id="CVE-2024-41092" ref_url="https://www.suse.com/security/cve/CVE-2024-41092/" source="CVE"/>
		<reference ref_id="CVE-2024-41093" ref_url="https://www.suse.com/security/cve/CVE-2024-41093/" source="CVE"/>
		<reference ref_id="CVE-2024-41095" ref_url="https://www.suse.com/security/cve/CVE-2024-41095/" source="CVE"/>
		<reference ref_id="CVE-2024-41097" ref_url="https://www.suse.com/security/cve/CVE-2024-41097/" source="CVE"/>
		<reference ref_id="CVE-2024-41098" ref_url="https://www.suse.com/security/cve/CVE-2024-41098/" source="CVE"/>
		<reference ref_id="CVE-2024-42069" ref_url="https://www.suse.com/security/cve/CVE-2024-42069/" source="CVE"/>
		<reference ref_id="CVE-2024-42074" ref_url="https://www.suse.com/security/cve/CVE-2024-42074/" source="CVE"/>
		<reference ref_id="CVE-2024-42076" ref_url="https://www.suse.com/security/cve/CVE-2024-42076/" source="CVE"/>
		<reference ref_id="CVE-2024-42077" ref_url="https://www.suse.com/security/cve/CVE-2024-42077/" source="CVE"/>
		<reference ref_id="CVE-2024-42080" ref_url="https://www.suse.com/security/cve/CVE-2024-42080/" source="CVE"/>
		<reference ref_id="CVE-2024-42082" ref_url="https://www.suse.com/security/cve/CVE-2024-42082/" source="CVE"/>
		<reference ref_id="CVE-2024-42085" ref_url="https://www.suse.com/security/cve/CVE-2024-42085/" source="CVE"/>
		<reference ref_id="CVE-2024-42086" ref_url="https://www.suse.com/security/cve/CVE-2024-42086/" source="CVE"/>
		<reference ref_id="CVE-2024-42087" ref_url="https://www.suse.com/security/cve/CVE-2024-42087/" source="CVE"/>
		<reference ref_id="CVE-2024-42089" ref_url="https://www.suse.com/security/cve/CVE-2024-42089/" source="CVE"/>
		<reference ref_id="CVE-2024-42090" ref_url="https://www.suse.com/security/cve/CVE-2024-42090/" source="CVE"/>
		<reference ref_id="CVE-2024-42092" ref_url="https://www.suse.com/security/cve/CVE-2024-42092/" source="CVE"/>
		<reference ref_id="CVE-2024-42095" ref_url="https://www.suse.com/security/cve/CVE-2024-42095/" source="CVE"/>
		<reference ref_id="CVE-2024-42097" ref_url="https://www.suse.com/security/cve/CVE-2024-42097/" source="CVE"/>
		<reference ref_id="CVE-2024-42098" ref_url="https://www.suse.com/security/cve/CVE-2024-42098/" source="CVE"/>
		<reference ref_id="CVE-2024-42101" ref_url="https://www.suse.com/security/cve/CVE-2024-42101/" source="CVE"/>
		<reference ref_id="CVE-2024-42104" ref_url="https://www.suse.com/security/cve/CVE-2024-42104/" source="CVE"/>
		<reference ref_id="CVE-2024-42106" ref_url="https://www.suse.com/security/cve/CVE-2024-42106/" source="CVE"/>
		<reference ref_id="CVE-2024-42107" ref_url="https://www.suse.com/security/cve/CVE-2024-42107/" source="CVE"/>
		<reference ref_id="CVE-2024-42110" ref_url="https://www.suse.com/security/cve/CVE-2024-42110/" source="CVE"/>
		<reference ref_id="CVE-2024-42114" ref_url="https://www.suse.com/security/cve/CVE-2024-42114/" source="CVE"/>
		<reference ref_id="CVE-2024-42115" ref_url="https://www.suse.com/security/cve/CVE-2024-42115/" source="CVE"/>
		<reference ref_id="CVE-2024-42119" ref_url="https://www.suse.com/security/cve/CVE-2024-42119/" source="CVE"/>
		<reference ref_id="CVE-2024-42120" ref_url="https://www.suse.com/security/cve/CVE-2024-42120/" source="CVE"/>
		<reference ref_id="CVE-2024-42121" ref_url="https://www.suse.com/security/cve/CVE-2024-42121/" source="CVE"/>
		<reference ref_id="CVE-2024-42126" ref_url="https://www.suse.com/security/cve/CVE-2024-42126/" source="CVE"/>
		<reference ref_id="CVE-2024-42127" ref_url="https://www.suse.com/security/cve/CVE-2024-42127/" source="CVE"/>
		<reference ref_id="CVE-2024-42130" ref_url="https://www.suse.com/security/cve/CVE-2024-42130/" source="CVE"/>
		<reference ref_id="CVE-2024-42137" ref_url="https://www.suse.com/security/cve/CVE-2024-42137/" source="CVE"/>
		<reference ref_id="CVE-2024-42139" ref_url="https://www.suse.com/security/cve/CVE-2024-42139/" source="CVE"/>
		<reference ref_id="CVE-2024-42142" ref_url="https://www.suse.com/security/cve/CVE-2024-42142/" source="CVE"/>
		<reference ref_id="CVE-2024-42143" ref_url="https://www.suse.com/security/cve/CVE-2024-42143/" source="CVE"/>
		<reference ref_id="CVE-2024-42148" ref_url="https://www.suse.com/security/cve/CVE-2024-42148/" source="CVE"/>
		<reference ref_id="CVE-2024-42152" ref_url="https://www.suse.com/security/cve/CVE-2024-42152/" source="CVE"/>
		<reference ref_id="CVE-2024-42155" ref_url="https://www.suse.com/security/cve/CVE-2024-42155/" source="CVE"/>
		<reference ref_id="CVE-2024-42156" ref_url="https://www.suse.com/security/cve/CVE-2024-42156/" source="CVE"/>
		<reference ref_id="CVE-2024-42157" ref_url="https://www.suse.com/security/cve/CVE-2024-42157/" source="CVE"/>
		<reference ref_id="CVE-2024-42158" ref_url="https://www.suse.com/security/cve/CVE-2024-42158/" source="CVE"/>
		<reference ref_id="CVE-2024-42162" ref_url="https://www.suse.com/security/cve/CVE-2024-42162/" source="CVE"/>
		<reference ref_id="CVE-2024-42223" ref_url="https://www.suse.com/security/cve/CVE-2024-42223/" source="CVE"/>
		<reference ref_id="CVE-2024-42225" ref_url="https://www.suse.com/security/cve/CVE-2024-42225/" source="CVE"/>
		<reference ref_id="CVE-2024-42228" ref_url="https://www.suse.com/security/cve/CVE-2024-42228/" source="CVE"/>
		<reference ref_id="CVE-2024-42229" ref_url="https://www.suse.com/security/cve/CVE-2024-42229/" source="CVE"/>
		<reference ref_id="CVE-2024-42230" ref_url="https://www.suse.com/security/cve/CVE-2024-42230/" source="CVE"/>
		<reference ref_id="CVE-2024-42232" ref_url="https://www.suse.com/security/cve/CVE-2024-42232/" source="CVE"/>
		<reference ref_id="CVE-2024-42236" ref_url="https://www.suse.com/security/cve/CVE-2024-42236/" source="CVE"/>
		<reference ref_id="CVE-2024-42237" ref_url="https://www.suse.com/security/cve/CVE-2024-42237/" source="CVE"/>
		<reference ref_id="CVE-2024-42238" ref_url="https://www.suse.com/security/cve/CVE-2024-42238/" source="CVE"/>
		<reference ref_id="CVE-2024-42239" ref_url="https://www.suse.com/security/cve/CVE-2024-42239/" source="CVE"/>
		<reference ref_id="CVE-2024-42240" ref_url="https://www.suse.com/security/cve/CVE-2024-42240/" source="CVE"/>
		<reference ref_id="CVE-2024-42244" ref_url="https://www.suse.com/security/cve/CVE-2024-42244/" source="CVE"/>
		<reference ref_id="CVE-2024-42246" ref_url="https://www.suse.com/security/cve/CVE-2024-42246/" source="CVE"/>
		<reference ref_id="CVE-2024-42247" ref_url="https://www.suse.com/security/cve/CVE-2024-42247/" source="CVE"/>
		<reference ref_id="CVE-2024-42268" ref_url="https://www.suse.com/security/cve/CVE-2024-42268/" source="CVE"/>
		<reference ref_id="CVE-2024-42271" ref_url="https://www.suse.com/security/cve/CVE-2024-42271/" source="CVE"/>
		<reference ref_id="CVE-2024-42274" ref_url="https://www.suse.com/security/cve/CVE-2024-42274/" source="CVE"/>
		<reference ref_id="CVE-2024-42276" ref_url="https://www.suse.com/security/cve/CVE-2024-42276/" source="CVE"/>
		<reference ref_id="CVE-2024-42277" ref_url="https://www.suse.com/security/cve/CVE-2024-42277/" source="CVE"/>
		<reference ref_id="CVE-2024-42280" ref_url="https://www.suse.com/security/cve/CVE-2024-42280/" source="CVE"/>
		<reference ref_id="CVE-2024-42281" ref_url="https://www.suse.com/security/cve/CVE-2024-42281/" source="CVE"/>
		<reference ref_id="CVE-2024-42283" ref_url="https://www.suse.com/security/cve/CVE-2024-42283/" source="CVE"/>
		<reference ref_id="CVE-2024-42284" ref_url="https://www.suse.com/security/cve/CVE-2024-42284/" source="CVE"/>
		<reference ref_id="CVE-2024-42285" ref_url="https://www.suse.com/security/cve/CVE-2024-42285/" source="CVE"/>
		<reference ref_id="CVE-2024-42286" ref_url="https://www.suse.com/security/cve/CVE-2024-42286/" source="CVE"/>
		<reference ref_id="CVE-2024-42287" ref_url="https://www.suse.com/security/cve/CVE-2024-42287/" source="CVE"/>
		<reference ref_id="CVE-2024-42288" ref_url="https://www.suse.com/security/cve/CVE-2024-42288/" source="CVE"/>
		<reference ref_id="CVE-2024-42289" ref_url="https://www.suse.com/security/cve/CVE-2024-42289/" source="CVE"/>
		<reference ref_id="CVE-2024-42291" ref_url="https://www.suse.com/security/cve/CVE-2024-42291/" source="CVE"/>
		<reference ref_id="CVE-2024-42292" ref_url="https://www.suse.com/security/cve/CVE-2024-42292/" source="CVE"/>
		<reference ref_id="CVE-2024-42295" ref_url="https://www.suse.com/security/cve/CVE-2024-42295/" source="CVE"/>
		<reference ref_id="CVE-2024-42301" ref_url="https://www.suse.com/security/cve/CVE-2024-42301/" source="CVE"/>
		<reference ref_id="CVE-2024-42302" ref_url="https://www.suse.com/security/cve/CVE-2024-42302/" source="CVE"/>
		<reference ref_id="CVE-2024-42308" ref_url="https://www.suse.com/security/cve/CVE-2024-42308/" source="CVE"/>
		<reference ref_id="CVE-2024-42309" ref_url="https://www.suse.com/security/cve/CVE-2024-42309/" source="CVE"/>
		<reference ref_id="CVE-2024-42310" ref_url="https://www.suse.com/security/cve/CVE-2024-42310/" source="CVE"/>
		<reference ref_id="CVE-2024-42311" ref_url="https://www.suse.com/security/cve/CVE-2024-42311/" source="CVE"/>
		<reference ref_id="CVE-2024-42312" ref_url="https://www.suse.com/security/cve/CVE-2024-42312/" source="CVE"/>
		<reference ref_id="CVE-2024-42313" ref_url="https://www.suse.com/security/cve/CVE-2024-42313/" source="CVE"/>
		<reference ref_id="CVE-2024-42315" ref_url="https://www.suse.com/security/cve/CVE-2024-42315/" source="CVE"/>
		<reference ref_id="CVE-2024-42318" ref_url="https://www.suse.com/security/cve/CVE-2024-42318/" source="CVE"/>
		<reference ref_id="CVE-2024-42319" ref_url="https://www.suse.com/security/cve/CVE-2024-42319/" source="CVE"/>
		<reference ref_id="CVE-2024-42320" ref_url="https://www.suse.com/security/cve/CVE-2024-42320/" source="CVE"/>
		<reference ref_id="CVE-2024-42322" ref_url="https://www.suse.com/security/cve/CVE-2024-42322/" source="CVE"/>
		<reference ref_id="CVE-2024-43816" ref_url="https://www.suse.com/security/cve/CVE-2024-43816/" source="CVE"/>
		<reference ref_id="CVE-2024-43818" ref_url="https://www.suse.com/security/cve/CVE-2024-43818/" source="CVE"/>
		<reference ref_id="CVE-2024-43819" ref_url="https://www.suse.com/security/cve/CVE-2024-43819/" source="CVE"/>
		<reference ref_id="CVE-2024-43821" ref_url="https://www.suse.com/security/cve/CVE-2024-43821/" source="CVE"/>
		<reference ref_id="CVE-2024-43823" ref_url="https://www.suse.com/security/cve/CVE-2024-43823/" source="CVE"/>
		<reference ref_id="CVE-2024-43829" ref_url="https://www.suse.com/security/cve/CVE-2024-43829/" source="CVE"/>
		<reference ref_id="CVE-2024-43830" ref_url="https://www.suse.com/security/cve/CVE-2024-43830/" source="CVE"/>
		<reference ref_id="CVE-2024-43831" ref_url="https://www.suse.com/security/cve/CVE-2024-43831/" source="CVE"/>
		<reference ref_id="CVE-2024-43834" ref_url="https://www.suse.com/security/cve/CVE-2024-43834/" source="CVE"/>
		<reference ref_id="CVE-2024-43837" ref_url="https://www.suse.com/security/cve/CVE-2024-43837/" source="CVE"/>
		<reference ref_id="CVE-2024-43839" ref_url="https://www.suse.com/security/cve/CVE-2024-43839/" source="CVE"/>
		<reference ref_id="CVE-2024-43841" ref_url="https://www.suse.com/security/cve/CVE-2024-43841/" source="CVE"/>
		<reference ref_id="CVE-2024-43842" ref_url="https://www.suse.com/security/cve/CVE-2024-43842/" source="CVE"/>
		<reference ref_id="CVE-2024-43846" ref_url="https://www.suse.com/security/cve/CVE-2024-43846/" source="CVE"/>
		<reference ref_id="CVE-2024-43849" ref_url="https://www.suse.com/security/cve/CVE-2024-43849/" source="CVE"/>
		<reference ref_id="CVE-2024-43853" ref_url="https://www.suse.com/security/cve/CVE-2024-43853/" source="CVE"/>
		<reference ref_id="CVE-2024-43854" ref_url="https://www.suse.com/security/cve/CVE-2024-43854/" source="CVE"/>
		<reference ref_id="CVE-2024-43856" ref_url="https://www.suse.com/security/cve/CVE-2024-43856/" source="CVE"/>
		<reference ref_id="CVE-2024-43858" ref_url="https://www.suse.com/security/cve/CVE-2024-43858/" source="CVE"/>
		<reference ref_id="CVE-2024-43860" ref_url="https://www.suse.com/security/cve/CVE-2024-43860/" source="CVE"/>
		<reference ref_id="CVE-2024-43861" ref_url="https://www.suse.com/security/cve/CVE-2024-43861/" source="CVE"/>
		<reference ref_id="CVE-2024-43863" ref_url="https://www.suse.com/security/cve/CVE-2024-43863/" source="CVE"/>
		<reference ref_id="CVE-2024-43866" ref_url="https://www.suse.com/security/cve/CVE-2024-43866/" source="CVE"/>
		<reference ref_id="CVE-2024-43867" ref_url="https://www.suse.com/security/cve/CVE-2024-43867/" source="CVE"/>
		<reference ref_id="CVE-2024-43871" ref_url="https://www.suse.com/security/cve/CVE-2024-43871/" source="CVE"/>
		<reference ref_id="CVE-2024-43872" ref_url="https://www.suse.com/security/cve/CVE-2024-43872/" source="CVE"/>
		<reference ref_id="CVE-2024-43873" ref_url="https://www.suse.com/security/cve/CVE-2024-43873/" source="CVE"/>
		<reference ref_id="CVE-2024-43879" ref_url="https://www.suse.com/security/cve/CVE-2024-43879/" source="CVE"/>
		<reference ref_id="CVE-2024-43880" ref_url="https://www.suse.com/security/cve/CVE-2024-43880/" source="CVE"/>
		<reference ref_id="CVE-2024-43882" ref_url="https://www.suse.com/security/cve/CVE-2024-43882/" source="CVE"/>
		<reference ref_id="CVE-2024-43883" ref_url="https://www.suse.com/security/cve/CVE-2024-43883/" source="CVE"/>
		<reference ref_id="CVE-2024-43884" ref_url="https://www.suse.com/security/cve/CVE-2024-43884/" source="CVE"/>
		<reference ref_id="CVE-2024-43889" ref_url="https://www.suse.com/security/cve/CVE-2024-43889/" source="CVE"/>
		<reference ref_id="CVE-2024-43892" ref_url="https://www.suse.com/security/cve/CVE-2024-43892/" source="CVE"/>
		<reference ref_id="CVE-2024-43893" ref_url="https://www.suse.com/security/cve/CVE-2024-43893/" source="CVE"/>
		<reference ref_id="CVE-2024-43894" ref_url="https://www.suse.com/security/cve/CVE-2024-43894/" source="CVE"/>
		<reference ref_id="CVE-2024-43895" ref_url="https://www.suse.com/security/cve/CVE-2024-43895/" source="CVE"/>
		<reference ref_id="CVE-2024-43899" ref_url="https://www.suse.com/security/cve/CVE-2024-43899/" source="CVE"/>
		<reference ref_id="CVE-2024-43900" ref_url="https://www.suse.com/security/cve/CVE-2024-43900/" source="CVE"/>
		<reference ref_id="CVE-2024-43902" ref_url="https://www.suse.com/security/cve/CVE-2024-43902/" source="CVE"/>
		<reference ref_id="CVE-2024-43903" ref_url="https://www.suse.com/security/cve/CVE-2024-43903/" source="CVE"/>
		<reference ref_id="CVE-2024-43904" ref_url="https://www.suse.com/security/cve/CVE-2024-43904/" source="CVE"/>
		<reference ref_id="CVE-2024-43905" ref_url="https://www.suse.com/security/cve/CVE-2024-43905/" source="CVE"/>
		<reference ref_id="CVE-2024-43907" ref_url="https://www.suse.com/security/cve/CVE-2024-43907/" source="CVE"/>
		<reference ref_id="CVE-2024-43908" ref_url="https://www.suse.com/security/cve/CVE-2024-43908/" source="CVE"/>
		<reference ref_id="CVE-2024-43909" ref_url="https://www.suse.com/security/cve/CVE-2024-43909/" source="CVE"/>
		<reference ref_id="CVE-2024-44938" ref_url="https://www.suse.com/security/cve/CVE-2024-44938/" source="CVE"/>
		<reference ref_id="CVE-2024-44939" ref_url="https://www.suse.com/security/cve/CVE-2024-44939/" source="CVE"/>
		<reference ref_id="CVE-2024-44947" ref_url="https://www.suse.com/security/cve/CVE-2024-44947/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2024-44947: Initialize beyond-EOF page contents before setting uptodate (bsc#1229454).
- CVE-2024-36936: Touch soft lockup during memory accept (bsc#1225773).
- CVE-2022-48706: Do proper cleanup if IFCVF init fails (bsc#1225524).
- CVE-2024-43883: Do not drop references before new references are gained (bsc#1229707).
- CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).
- CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229500).
- CVE-2023-52489: Fix race in accessing memory_section-&gt;usage (bsc#1221326).
- CVE-2024-43893: Check uartclk for zero to avoid divide by zero (bsc#1229759).
- CVE-2024-43821: Fix a possible null pointer dereference (bsc#1229315).
- CVE-2024-43900: Avoid use-after-free in load_firmware_cb() (bsc#1229756).
- CVE-2024-44938: Fix shift-out-of-bounds in dbDiscardAG (bsc#1229792).
- CVE-2024-44939: fix null ptr deref in dtInsertEntry (bsc#1229820).
- CVE-2024-41087: Fix double free on error (CVE-2024-41087,bsc#1228466).
- CVE-2024-42277: Avoid NULL deref in sprd_iommu_hw_en (bsc#1229409).
- CVE-2024-43902: Add null checker before passing variables (bsc#1229767).
- CVE-2024-43904: Add null checks for 'stream' and 'plane' before dereferencing (bsc#1229768)
- CVE-2024-43880: Put back removed metod in struct objagg_ops (bsc#1229481).
- CVE-2024-43884: Add error handling to pair_device() (bsc#1229739)
- CVE-2024-43899: Fix null pointer deref in dcn20_resource.c (bsc#1229754).
- CVE-2022-48920: Get rid of warning on transaction commit when using flushoncommit (bsc#1229658).
- CVE-2023-52906: Fix warning during failed attribute validation (bsc#1229527).
- CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503)
- CVE-2024-43866: Always drain health in shutdown callback (bsc#1229495).
- CVE-2024-26812: Struct virqfd kABI workaround (bsc#1222808).
- CVE-2022-48912: Fix use-after-free in __nf_register_net_hook() (bsc#1229641)
- CVE-2024-27010: Fix mirred deadlock on device recursion (bsc#1223720).
- CVE-2022-48906: Correctly set DATA_FIN timeout when number of retransmits is large (bsc#1229605)
- CVE-2024-42155: Wipe copies of protected- and secure-keys (bsc#1228733).
- CVE-2024-42156: Wipe copies of clear-key structures on failure (bsc#1228722).
- CVE-2023-52899: Add exception protection processing for vd in axi_chan_handle_err function (bsc#1229569).
- CVE-2024-42158: Use kfree_sensitive() to fix Coccinelle warnings (bsc#1228720).
- CVE-2024-26631: Fix data-race in ipv6_mc_down / mld_ifc_work (bsc#1221630).
- CVE-2024-43873: Always initialize seqpacket_allow (bsc#1229488)
- CVE-2024-40905: Fix possible race in __fib6_drop_pcpu_from() (bsc#1227761)
- CVE-2024-39489: Fix memleak in seg6_hmac_init_algo (bsc#1227623)
- CVE-2021-47106: Fix use-after-free in nft_set_catchall_destroy() (bsc#1220962)
- CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225428).
- CVE-2024-36489: Fix missing memory barrier in tls_init (bsc#1226874)
- CVE-2024-41020: Fix fcntl/close race recovery compat path (bsc#1228427).
- CVE-2024-27079: Fix NULL domain on device release (bsc#1223742).
- CVE-2024-35897: Discard table flag update with pending basechain deletion (bsc#1224510).
- CVE-2024-27403: Restore const specifier in flow_offload_route_init() (bsc#1224415).
- CVE-2024-27011: Fix memleak in map from abort path (bsc#1223803).
- CVE-2024-43819: Reject memory region operations for ucontrol VMs (bsc#1229290 git-fixes).
- CVE-2024-26668: Reject configurations that cause integer overflow (bsc#1222335).
- CVE-2024-26835: Set dormant flag on hook register failure (bsc#1222967).
- CVE-2024-26808: Handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634).
- CVE-2024-27016: Validate pppoe header (bsc#1223807).
- CVE-2024-35945: Prevent nullptr exceptions on ISR (bsc#1224639).
- CVE-2023-52581: Fix memleak when more than 255 elements expired (bsc#1220877).
- CVE-2024-36013: Fix slab-use-after-free in l2cap_connect() (bsc#1225578).
- CVE-2024-43837: Fix updating attached freplace prog in prog_array map (bsc#1229297).
- CVE-2024-42291: Add a per-VF limit on number of FDIR filters (bsc#1229374).
- CVE-2024-42268: Fix missing lock on sync reset reload (bsc#1229391).
- CVE-2024-43834: Fix invalid wait context of page_pool_destroy() (bsc#1229314)
- CVE-2024-36286: Acquire rcu_read_lock() in instance_destroy_rcu() (bsc#1226801)
- CVE-2024-26851: Add protection for bmp length out of range (bsc#1223074)
- CVE-2024-42157: Wipe sensitive data on failure (bsc#1228727 CVE-2024-42157 git-fixes).
- CVE-2024-26677: Blacklist e7870cf13d20 ('rxrpc: Fix delayed ACKs to not set the reference serial number') (bsc#1222387)
- CVE-2024-36009: Blacklist 467324bcfe1a ('ax25: Fix netdev refcount issue') (bsc#1224542)
- CVE-2023-52859: Fix use-after-free when register pmu fails (bsc#1225582).
- CVE-2024-42280: Fix a use after free in hfcmulti_tx() (bsc#1229388)
- CVE-2024-42284: Return non-zero value from tipc_udp_addr2str() on error (bsc#1229382)
- CVE-2024-42283: Initialize all fields in dumped nexthops (bsc#1229383)
- CVE-2024-42312: Always initialize i_uid/i_gid (bsc#1229357)
- CVE-2024-43854: Initialize integrity buffer to zero before writing it to media (bsc#1229345)
- CVE-2024-42322: Properly dereference pe in ip_vs_add_service (bsc#1229347)
- CVE-2024-42301: Fix the array out-of-bounds risk (bsc#1229407).
- CVE-2024-42318: Do not lose track of restrictions on cred_transfer (bsc#1229351).
- CVE-2024-26669: Fix chain template offload (bsc#1222350).
- CVE-2023-52889: Fix null pointer deref when receiving skb during sock creation (bsc#1229287,).
- CVE-2022-48645: Move enetc_set_psfp() out of the common enetc_set_features() (bsc#1223508).
- CVE-2024-41007: Use signed arithmetic in tcp_rtx_probe0_timed_out() (bsc#1227863).
- CVE-2024-36933: Use correct mac_offset to unwind gso skb in nsh_gso_segment() (bsc#1225832).
- CVE-2024-42295: Handle inconsistent state in nilfs_btnode_create_block() (bsc#1229370).
- CVE-2024-42319: Move devm_mbox_controller_register() after devm_pm_runtime_enable() (bsc#1229350).
- CVE-2024-43860: Skip over memory region when node value is NULL (bsc#1229319).
- CVE-2024-43831: Handle invalid decoder vsi (bsc#1229309).
- CVE-2024-43849: Protect locator_addr with the main mutex (bsc#1229307).
- CVE-2024-43841: Do not use strlen() in const context (bsc#1229304).
- CVE-2024-43839: Adjust 'name' buf size of bna_tcb and bna_ccb structures (bsc#1229301).
- CVE-2024-41088: Fix infinite loop when xmit fails (bsc#1228469).
- CVE-2024-42281: Fix a segment issue when downgrading gso_size (bsc#1229386).
- CVE-2024-42271: Fixed a use after free in iucv_sock_close(). (bsc#1229400)
- CVE-2024-41080: Fix possible deadlock in io_register_iowq_max_workers() (bsc#1228616).
- CVE-2024-42246: Remap EPERM in case of connection failure in xs_tcp_setup_socket (bsc#1228989).
- CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop(). (bsc#1228959)
- CVE-2024-26735: Fix possible use-after-free and null-ptr-deref (bsc#1222372).
- CVE-2024-42106: Initialize pad field in struct inet_diag_req_v2 (bsc#1228493).
- CVE-2024-38662: Cover verifier checks for mutating sockmap/sockhash (bsc#1226885).
- CVE-2024-42110: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx() (bsc#1228501).
- CVE-2024-42247: Avoid unaligned 64-bit memory accesses (bsc#1228988).
- CVE-2022-48865: Fix kernel panic when enabling bearer (bsc#1228065).
- CVE-2023-52498: Fix possible deadlocks in core system-wide PM code (bsc#1221269).
- CVE-2024-41068: Fix sclp_init() cleanup on failure (bsc#1228579).
- CVE-2022-48808: Fix panic when DSA master device unbinds on shutdown (bsc#1227958).
- CVE-2024-42095: Fix Errata i2310 with RX FIFO level check (bsc#1228446).
- CVE-2024-40978: Fix crash while reading debugfs attribute (bsc#1227929).
- CVE-2024-42107: Do not process extts if PTP is disabled (bsc#1228494).
- CVE-2024-42139: Fix improper extts handling (bsc#1228503).
- CVE-2024-42148: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487).
- CVE-2024-42142: E-switch, Create ingress ACL when needed (bsc#1228491).
- CVE-2024-42162: Account for stopped queues when reading NIC stats (bsc#1228706).
- CVE-2024-42082: Remove WARN() from __xdp_reg_mem_model() (bsc#1228482).
- CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526).
- CVE-2023-3610: Fixed use-after-free vulnerability in nf_tables can be exploited to achieve local privilege escalation (bsc#1213580).
- CVE-2024-42228: Using uninitialized value *size when calling amdgpu_vce_cs_reloc (bsc#1228667).
- CVE-2024-40995: Fix possible infinite loop in tcf_idr_check_alloc() (bsc#1227830).
- CVE-2024-38602: Merge repeat codes in ax25_dev_device_down() (git-fixes CVE-2024-38602 bsc#1226613).
- CVE-2024-38554: Fix reference count leak issue of net_device (bsc#1226742).
- CVE-2024-36929: Reject skb_copy(_expand) for fraglist GSO skbs (bsc#1225814).
- CVE-2024-41009: Fix overrunning reservations in ringbuf (bsc#1228020).
- CVE-2024-27024: Fix WARNING in rds_conn_connect_if_down (bsc#1223777).

The following non-security bugs were fixed:

- ACPI: bus: Indicate support for IRQ ResourceSource thru _OSC (git-fixes).
- ACPI: bus: Indicate support for the Generic Event Device thru _OSC (git-fixes).
- ACPI: bus: Rework system-level device notification handling (git-fixes).
- ACPI: thermal: Drop nocrt parameter (git-fixes).
- ACPI: x86: s2idle: Post-increment variables when getting constraints (git-fixes).
- afs: Do not cross .backup mountpoint from backup volume (git-fixes).
- ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable-fixes).
- ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).
- ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes).
- ALSA: hda/realtek: Fix noise from speakers on Lenovo IdeaPad 3 15IAU7 (git-fixes).
- ALSA: line6: Fix racy access to midibuf (stable-fixes).
- ALSA: timer: Relax start tick time check for slave timer elements (git-fixes).
- ALSA: usb-audio: Add delay quirk for VIVO USB-C-XE710 HEADSET (stable-fixes).
- ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes).
- ALSA: usb-audio: Support Yamaha P-125 quirk entry (stable-fixes).
- ALSA: usb: Fix UBSAN warning in parse_audio_unit() (stable-fixes).
- arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git-fixes)
- arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git-fixes)
- arm64: Add Neoverse-V2 part (git-fixes)
- arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git-fixes)
- arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git-fixes)
- arm64: barrier: Restore spec_bar() macro (git-fixes)
- arm64: cpufeature: Add missing .field_width for GIC system registers (git-fixes)
- arm64: cpufeature: Fix the visibility of compat hwcaps (git-fixes)
- arm64: cpufeature: Force HWCAP to be based on the sysreg visible to (git-fixes)
- arm64: cputype: Add Cortex-A720 definitions (git-fixes)
- arm64: cputype: Add Cortex-A725 definitions (git-fixes)
- arm64: cputype: Add Cortex-X1C definitions (git-fixes)
- arm64: cputype: Add Cortex-X3 definitions (git-fixes)
- arm64: cputype: Add Cortex-X4 definitions (git-fixes)
- arm64: cputype: Add Cortex-X925 definitions (git-fixes)
- arm64: cputype: Add Neoverse-V3 definitions (git-fixes)
- arm64: dts: rockchip: Increase VOP clk rate on RK3328 (git-fixes)
- arm64: dts: rockchip: Increase VOP clk rate on RK3328 (git-fixes)
- arm64: errata: Add workaround for Arm errata 3194386 and 3312417 (git-fixes)
- arm64: errata: Expand speculative SSBS workaround (again) (git-fixes)
- arm64: errata: Expand speculative SSBS workaround (git-fixes)
- arm64: errata: Unify speculative SSBS errata logic (git-fixes) Also update default configuration.
- arm64: Fix KASAN random tag seed initialization (git-fixes)
- arm64: Fix KASAN random tag seed initialization (git-fixes)
- ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes).
- ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes).
- ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes).
- async: Introduce async_schedule_dev_nocall() (bsc#1221269).
- async: Split async_schedule_node_domain() (bsc#1221269).
- Bluetooth: Fix usage of __hci_cmd_sync_status (git-fixes).
- Bluetooth: hci_core: Fix not handling hibernation actions (git-fixes).
- Bluetooth: l2cap: always unlock channel in l2cap_conless_channel() (git-fixes).
- Bluetooth: L2CAP: Fix deadlock (git-fixes).
- bpf: Fix a kernel verifier crash in stacksafe() (bsc#1225903).
- bpf: kprobe: remove unused declaring of bpf_kprobe_override (git-fixes).
- btrfs: fix leak of qgroup extent records after transaction abort (git-fixes).
- btrfs: make btrfs_destroy_delayed_refs() return void (git-fixes).
- btrfs: remove unnecessary prototype declarations at disk-io.c (git-fixes).
- btrfs: sysfs: update fs features directory asynchronously (bsc#1226168).
- cachefiles: propagate errors from vfs_getxattr() to avoid infinite loop (bsc#1229418).
- ceph: issue a cap release immediately if no cap exists (bsc#1225162).
- ceph: periodically flush the cap releases (bsc#1225162).
- cpu/SMT: Enable SMT only if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes).
- cpuidle, ACPI: Evaluate LPI arch_flags for broadcast timer (git-fixes).
- docs: KVM: Fix register ID of SPSR_FIQ (git-fixes).
- drm: add missing MODULE_DESCRIPTION() macros (stable-fixes).
- drm: panel-orientation-quirks: Add labels for both Valve Steam Deck revisions (stable-fixes).
- drm: panel-orientation-quirks: Add quirk for Aya Neo KUN (stable-fixes).
- drm: panel-orientation-quirks: Add quirk for Lenovo Yoga Tab 3 X90F (stable-fixes).
- drm: panel-orientation-quirks: Add quirk for Nanote UMPC-01 (stable-fixes).
- drm: panel-orientation-quirks: Add quirk for OrangePi Neo (stable-fixes).
- drm/amd/amdgpu/imu_v11_0: Increase buffer size to ensure all possible values can be stored (stable-fixes).
- drm/amd/display: Add NULL check for 'afb' before dereferencing in amdgpu_dm_plane_handle_cursor_update (stable-fixes).
- drm/amd/display: avoid using null object of framebuffer (git-fixes).
- drm/amd/display: Fix &amp;&amp; vs || typos (git-fixes).
- drm/amd/display: Skip Recompute DSC Params if no Stream on Link (stable-fixes).
- drm/amd/display: Validate hw_points_num before using it (stable-fixes).
- drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr (stable-fixes).
- drm/amdgpu: Actually check flags for all context ops (stable-fixes).
- drm/amdgpu: Add lock around VF RLCG interface (stable-fixes).
- drm/amdgpu: fix dereference null return value for the function amdgpu_vm_pt_parent (stable-fixes).
- drm/amdgpu: Fix the null pointer dereference to ras_manager (stable-fixes).
- drm/amdgpu: Validate TA binary size (stable-fixes).
- drm/amdgpu/jpeg2: properly set atomics vmid field (stable-fixes).
- drm/amdgpu/pm: Fix the null pointer dereference for smu7 (stable-fixes).
- drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules (stable-fixes).
- drm/amdgpu/pm: Fix the param type of set_power_profile_mode (stable-fixes).
- drm/bridge: analogix_dp: properly handle zero sized AUX transactions (stable-fixes).
- drm/bridge: tc358768: Attempt to fix DSI horizontal timings (stable-fixes).
- drm/client: fix null pointer dereference in drm_client_modeset_probe (git-fixes).
- drm/dp_mst: Skip CSN if topology probing is not done yet (stable-fixes).
- drm/lima: set gp bus_stop bit before hard reset (stable-fixes).
- drm/msm/dp: reset the link phy params before link training (git-fixes).
- drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails (git-fixes).
- drm/msm/dpu: do not play tricks with debug macros (git-fixes).
- drm/tegra: Zero-initialize iosys_map (stable-fixes).
- exfat: fix inode-&gt;i_blocks for non-512 byte sector size device (git-fixes).
- exfat: fix potential deadlock on __exfat_get_dentry_set (git-fixes).
- exfat: redefine DIR_DELETED as the bad cluster number (git-fixes).
- exfat: support dynamic allocate bh for exfat_entry_set_cache (git-fixes).
- fs/netfs/fscache_cookie: add missing 'n_accesses' check (bsc#1229453).
- fuse: Initialize beyond-EOF page contents before setting uptodate (bsc#1229454).
- genirq: Add might_sleep() to disable_irq() (git-fixes).
- genirq: Always limit the affinity to online CPUs (git-fixes).
- genirq: Do not return error on missing optional irq_request_resources() (git-fixes).
- genirq: Take the proposed affinity at face value if force==true (git-fixes).
- genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline (git-fixes).
- genirq/generic_chip: Make irq_remove_generic_chip() irqdomain aware (git-fixes).
- genirq/ipi: Fix NULL pointer deref in irq_data_get_affinity_mask() (git-fixes).
- genirq/irqdesc: Do not try to remove non-existing sysfs files (git-fixes).
- genirq/matrix: Exclude managed interrupts in irq_matrix_allocated() (git-fixes).
- genirq/msi: Shutdown managed interrupts with unsatifiable affinities (git-fixes).
- gss_krb5: Fix the error handling path for crypto_sync_skcipher_setkey (git-fixes).
- hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode() (git-fixes).
- i2c: smbus: Improve handling of stuck alerts (git-fixes).
- i2c: smbus: Send alert notifications to all devices if source not found (git-fixes).
- iommu/amd: Convert comma to semicolon (git-fixes).
- ip6_tunnel: Fix broken GRO (bsc#1229444).
- ipv6: sr: fix incorrect unregister order (git-fixes).
- irqdomain: Drop bogus fwspec-mapping error handling (git-fixes).
- irqdomain: Fix association race (git-fixes).
- irqdomain: Fix disassociation race (git-fixes).
- irqdomain: Fix domain registration race (git-fixes).
- irqdomain: Fix mapping-creation race (git-fixes).
- irqdomain: Fixed unbalanced fwnode get and put (git-fixes).
- irqdomain: Look for existing mapping only once (git-fixes).
- irqdomain: Refactor __irq_domain_alloc_irqs() (git-fixes).
- irqdomain: Report irq number for NOMAP domains (git-fixes).
- kprobes: Fix to check symbol prefixes correctly (git-fixes).
- lockd: move from strlcpy with unused retval to strscpy (git-fixes).
- memcg: protect concurrent access to mem_cgroup_idr (git-fixes).
- mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes).
- mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes).
- mmc: dw_mmc: allow biu and ciu clocks to defer (git-fixes).
- mmc: mmc_test: Fix NULL dereference on allocation failure (git-fixes).
- net: ks8851: Fix another TX stall caused by wrong ISR flag handling (git-fixes).
- net: ks8851: Fix deadlock with the SPI chip variant (git-fixes).
- net: ks8851: Fix potential TX stall after interface reopen (git-fixes).
- net: ks8851: Fix TX stall caused by TX buffer overrun (gix-fixes).
- net: mana: Add support for page sizes other than 4KB on ARM64 (jsc#PED-8491 bsc#1226530).
- net: mana: Fix doorbell out of order violation and avoid unnecessary doorbell rings (bsc#1229154).
- net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response (git-fixes).
- net: mana: Fix RX buf alloc_size alignment and atomic op panic (bsc#1229086).
- net: remove two BUG() from skb_checksum_help() (bsc#1229312).
- net: usb: qmi_wwan: fix memory leak for not ip packets (git-fixes).
- net/rds: fix possible cp null dereference (git-fixes).
- net/sched: initialize noop_qdisc owner (git-fixes).
- nfc: pn533: Add poll mod list filling check (git-fixes).
- nfs: expose /proc/net/sunrpc/nfs in net namespaces (git-fixes).
- nfs: make the rpc_stat per net namespace (git-fixes).
- NFSD: add posix ACLs to struct nfsd_attrs (git-fixes).
- NFSD: add security label to struct nfsd_attrs (git-fixes).
- NFSD: fix regression with setting ACLs (git-fixes).
- NFSD: Fix strncpy() fortify warning (git-fixes).
- NFSD: Increase NFSD_MAX_OPS_PER_COMPOUND (git-fixes).
- NFSD: introduce struct nfsd_attrs (git-fixes).
- NFSD: move from strlcpy with unused retval to strscpy (git-fixes).
- NFSD: Optimize DRC bucket pruning (git-fixes).
- nfsd: return error if nfs4_setacl fails (git-fixes).
- NFSD: set attributes when creating symlinks (git-fixes).
- nfsd: use locks_inode_context helper (git-fixes).
- nilfs2: Remove check for PageError (git-fixes).
- nvme_core: scan namespaces asynchronously (bsc#1224105).
- ocfs2: use coarse time for new created files (git-fixes).
- padata: Fix possible divide-by-0 panic in padata_mt_helper() (git-fixes).
- perf/smmuv3: Enable HiSilicon Erratum 162001900 quirk for HIP08/09 (git-fixes).
- platform/x86/amd/hsmp: Add support for ACPI based probing (jsc#PED-8779).
- platform/x86/amd/hsmp: Cache pci_dev in struct hsmp_socket (jsc#PED-8779).
- platform/x86/amd/hsmp: Change devm_kzalloc() to devm_kcalloc() (jsc#PED-8779).
- platform/x86/amd/hsmp: Check HSMP support on AMD family of processors (jsc#PED-8779).
- platform/x86/amd/hsmp: Check num_sockets against MAX_AMD_SOCKETS (jsc#PED-8779).
- platform/x86/amd/hsmp: Create static func to handle platdev (jsc#PED-8779).
- platform/x86/amd/hsmp: Define a struct to hold mailbox regs (jsc#PED-8779).
- platform/x86/amd/hsmp: Move dev from platdev to hsmp_socket (jsc#PED-8779).
- platform/x86/amd/hsmp: Move hsmp_test to probe (jsc#PED-8779).
- platform/x86/amd/hsmp: Non-ACPI support for AMD F1A_M00~0Fh (jsc#PED-8779).
- platform/x86/amd/hsmp: Remove extra parenthesis and add a space (jsc#PED-8779).
- platform/x86/amd/hsmp: Restructure sysfs group creation (jsc#PED-8779).
- platform/x86/amd/hsmp: switch to use device_add_groups() (jsc#PED-8779).
- power: supply: axp288_charger: Fix constant_charge_voltage writes (git-fixes).
- power: supply: axp288_charger: Round constant_charge_voltage writes down (git-fixes).
- powerpc: Fail build if using recordmcount with binutils v2.37 (bsc#1194869).
- powerpc: Mark .opd section read-only (bsc#1194869).
- powerpc: use generic version of arch_is_kernel_initmem_freed() (bsc#1194869).
- powerpc: xor_vmx: Add '-mhard-float' to CFLAGS (bsc#1194869).
- powerpc/64: Set _IO_BASE to POISON_POINTER_DELTA not 0 for CONFIG_PCI=n (bsc#1194869).
- powerpc/io: Avoid clang null pointer arithmetic warnings (bsc#1194869).
- powerpc/kexec_file: fix cpus node update to FDT (bsc#1194869).
- powerpc/kexec: make the update_cpus_node() function public (bsc#1194869).
- powerpc/kexec: split CONFIG_KEXEC_FILE and CONFIG_CRASH_DUMP (bsc#1194869).
- powerpc/pseries: Add failure related checks for h_get_mpp and h_get_ppp (bsc#1194869).
- powerpc/pseries: Whitelist dtl slub object for copying to userspace (bsc#1194869).
- powerpc/radix: Move some functions into #ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE (bsc#1194869).
- powerpc/topology: Check if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes).
- powerpc/xmon: Check cpu id in commands 'c#', 'dp#' and 'dx#' (bsc#1194869).
- RDMA/mana_ib: Use virtual address in dma regions for MRs (git-fixes).
- RDMA/rxe: Fix incomplete state save in rxe_requester (git-fixes)
- RDMA/rxe: Fix rxe_modify_srq (git-fixes)
- RDMA/rxe: Move work queue code to subroutines (git-fixes)
- s390/cpacf: get rid of register asm (git-fixes bsc#1227079 bsc#1229187).
- s390/cpacf: Make use of invalid opcode produce a link error (git-fixes bsc#1227079).
- s390/cpacf: Split and rework cpacf query functions (git-fixes bsc#1229187).
- s390/dasd: fix error checks in dasd_copy_pair_store() (git-fixes bsc#1229190).
- s390/dasd: fix error recovery leading to data corruption on ESE devices (git-fixes bsc#1229573).
- s390/sclp: Prevent release of buffer in I/O (git-fixes bsc#1229572).
- s390/uv: Panic for set and remove shared access UVC errors (git-fixes bsc#1229188).
- spi: spi-fsl-lpspi: Fix scldiv calculation (git-fixes).
- RDMA/rxe: Handle zero length rdma (git-fixes)
- sunrpc: add a struct rpc_stats arg to rpc_create_args (git-fixes).
- SUNRPC: Fix a race to wake a sync task (git-fixes).
- swiotlb: fix swiotlb_bounce() to do partial sync's correctly (git-fixes).
- syscalls: fix compat_sys_io_pgetevents_time64 usage (git-fixes).
- tracing: Return from tracing_buffers_read() if the file has been closed (bsc#1229136 git-fixes).
- ubifs: add check for crypto_shash_tfm_digest (git-fixes).
- ubifs: dbg_orphan_check: Fix missed key type checking (git-fixes).
- ubifs: Fix adding orphan entry twice for the same inode (git-fixes).
- ubifs: Fix unattached xattr inode if powercut happens after deleting (git-fixes).
- vfio/pci: fix potential memory leak in vfio_intx_enable() (git-fixes).
- wifi: iwlwifi: fw: fix wgds rev 3 exact size (git-fixes).
- wifi: mwifiex: duplicate static structs used in driver instances (git-fixes).
- x86/APM: drop the duplicate APM_MINOR_DEV macro (git-fixes).
- x86/insn: Fix PUSH instruction in x86 instruction decoder opcode map (git-fixes).
- x86/mm: Fix pti_clone_entry_text() for i386 (git-fixes).
- x86/mtrr: Check if fixed MTRRs exist before saving them (git-fixes).
- x86/pm: Work around false positive kmemleak report in msr_build_context() (git-fixes).
- xfs: Fix missing interval for missing_owner in xfs fsmap (git-fixes).
- xfs: Fix the owner setting issue for rmap query in xfs fsmap (git-fixes).
- xfs: use XFS_BUF_DADDR_NULL for daddrs in getfsmap code (git-fixes).
- xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration (git-fixes).
- xprtrdma: Fix rpcrdma_reqs_reset() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-10"/>
	<updated date="2024-09-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194111">SUSE bug 1194111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194765">SUSE bug 1194765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196261">SUSE bug 1196261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196516">SUSE bug 1196516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196894">SUSE bug 1196894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198017">SUSE bug 1198017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203329">SUSE bug 1203329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203330">SUSE bug 1203330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203360">SUSE bug 1203360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205462">SUSE bug 1205462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206006">SUSE bug 1206006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206258">SUSE bug 1206258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206843">SUSE bug 1206843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207158">SUSE bug 1207158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208783">SUSE bug 1208783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210644">SUSE bug 1210644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213580">SUSE bug 1213580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213632">SUSE bug 1213632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214285">SUSE bug 1214285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216834">SUSE bug 1216834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220428">SUSE bug 1220428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220877">SUSE bug 1220877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220962">SUSE bug 1220962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221269">SUSE bug 1221269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221326">SUSE bug 1221326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221630">SUSE bug 1221630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221645">SUSE bug 1221645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222335">SUSE bug 1222335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222350">SUSE bug 1222350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222372">SUSE bug 1222372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222387">SUSE bug 1222387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222634">SUSE bug 1222634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222808">SUSE bug 1222808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222967">SUSE bug 1222967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223074">SUSE bug 1223074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223191">SUSE bug 1223191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223508">SUSE bug 1223508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223720">SUSE bug 1223720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223742">SUSE bug 1223742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223777">SUSE bug 1223777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223803">SUSE bug 1223803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223807">SUSE bug 1223807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224105">SUSE bug 1224105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224415">SUSE bug 1224415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224496">SUSE bug 1224496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224510">SUSE bug 1224510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224542">SUSE bug 1224542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224578">SUSE bug 1224578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224639">SUSE bug 1224639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225162">SUSE bug 1225162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225352">SUSE bug 1225352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225428">SUSE bug 1225428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225524">SUSE bug 1225524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225578">SUSE bug 1225578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225582">SUSE bug 1225582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225773">SUSE bug 1225773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225814">SUSE bug 1225814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225827">SUSE bug 1225827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225832">SUSE bug 1225832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225903">SUSE bug 1225903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226168">SUSE bug 1226168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226530">SUSE bug 1226530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226613">SUSE bug 1226613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226742">SUSE bug 1226742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226765">SUSE bug 1226765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226798">SUSE bug 1226798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226801">SUSE bug 1226801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226874">SUSE bug 1226874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226885">SUSE bug 1226885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227079">SUSE bug 1227079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227623">SUSE bug 1227623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227761">SUSE bug 1227761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227830">SUSE bug 1227830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227863">SUSE bug 1227863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227867">SUSE bug 1227867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227929">SUSE bug 1227929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227937">SUSE bug 1227937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227958">SUSE bug 1227958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228020">SUSE bug 1228020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228065">SUSE bug 1228065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228114">SUSE bug 1228114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228410">SUSE bug 1228410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228426">SUSE bug 1228426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228427">SUSE bug 1228427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228429">SUSE bug 1228429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228446">SUSE bug 1228446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228447">SUSE bug 1228447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228449">SUSE bug 1228449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228450">SUSE bug 1228450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228452">SUSE bug 1228452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228456">SUSE bug 1228456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228463">SUSE bug 1228463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228466">SUSE bug 1228466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228467">SUSE bug 1228467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228469">SUSE bug 1228469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228480">SUSE bug 1228480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228481">SUSE bug 1228481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228482">SUSE bug 1228482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228483">SUSE bug 1228483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228484">SUSE bug 1228484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228485">SUSE bug 1228485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228487">SUSE bug 1228487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228489">SUSE bug 1228489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228491">SUSE bug 1228491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228493">SUSE bug 1228493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228494">SUSE bug 1228494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228495">SUSE bug 1228495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228496">SUSE bug 1228496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228501">SUSE bug 1228501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228503">SUSE bug 1228503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228509">SUSE bug 1228509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228513">SUSE bug 1228513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228515">SUSE bug 1228515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228516">SUSE bug 1228516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228526">SUSE bug 1228526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228531">SUSE bug 1228531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228563">SUSE bug 1228563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228564">SUSE bug 1228564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228567">SUSE bug 1228567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228576">SUSE bug 1228576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228579">SUSE bug 1228579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228584">SUSE bug 1228584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228588">SUSE bug 1228588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228590">SUSE bug 1228590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228615">SUSE bug 1228615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228616">SUSE bug 1228616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228635">SUSE bug 1228635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228636">SUSE bug 1228636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228654">SUSE bug 1228654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228656">SUSE bug 1228656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228658">SUSE bug 1228658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228660">SUSE bug 1228660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228662">SUSE bug 1228662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228667">SUSE bug 1228667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228673">SUSE bug 1228673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228677">SUSE bug 1228677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228687">SUSE bug 1228687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228706">SUSE bug 1228706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228708">SUSE bug 1228708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228710">SUSE bug 1228710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228718">SUSE bug 1228718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228720">SUSE bug 1228720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228721">SUSE bug 1228721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228722">SUSE bug 1228722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228724">SUSE bug 1228724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228726">SUSE bug 1228726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228727">SUSE bug 1228727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228733">SUSE bug 1228733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228748">SUSE bug 1228748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228766">SUSE bug 1228766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228779">SUSE bug 1228779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228801">SUSE bug 1228801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228850">SUSE bug 1228850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228857">SUSE bug 1228857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228959">SUSE bug 1228959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228964">SUSE bug 1228964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228966">SUSE bug 1228966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228967">SUSE bug 1228967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228979">SUSE bug 1228979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228988">SUSE bug 1228988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228989">SUSE bug 1228989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228991">SUSE bug 1228991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228992">SUSE bug 1228992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229042">SUSE bug 1229042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229054">SUSE bug 1229054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229086">SUSE bug 1229086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229136">SUSE bug 1229136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229154">SUSE bug 1229154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229187">SUSE bug 1229187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229188">SUSE bug 1229188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229190">SUSE bug 1229190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229287">SUSE bug 1229287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229290">SUSE bug 1229290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229292">SUSE bug 1229292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229296">SUSE bug 1229296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229297">SUSE bug 1229297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229301">SUSE bug 1229301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229303">SUSE bug 1229303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229304">SUSE bug 1229304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229305">SUSE bug 1229305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229307">SUSE bug 1229307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229309">SUSE bug 1229309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229312">SUSE bug 1229312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229314">SUSE bug 1229314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229315">SUSE bug 1229315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229317">SUSE bug 1229317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229318">SUSE bug 1229318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229319">SUSE bug 1229319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229327">SUSE bug 1229327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229341">SUSE bug 1229341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229345">SUSE bug 1229345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229346">SUSE bug 1229346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229347">SUSE bug 1229347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229349">SUSE bug 1229349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229350">SUSE bug 1229350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229351">SUSE bug 1229351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229354">SUSE bug 1229354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229356">SUSE bug 1229356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229357">SUSE bug 1229357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229358">SUSE bug 1229358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229359">SUSE bug 1229359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229360">SUSE bug 1229360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229366">SUSE bug 1229366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229370">SUSE bug 1229370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229373">SUSE bug 1229373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229374">SUSE bug 1229374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229381">SUSE bug 1229381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229382">SUSE bug 1229382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229383">SUSE bug 1229383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229386">SUSE bug 1229386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229388">SUSE bug 1229388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229391">SUSE bug 1229391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229392">SUSE bug 1229392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229395">SUSE bug 1229395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229398">SUSE bug 1229398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229399">SUSE bug 1229399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229400">SUSE bug 1229400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229407">SUSE bug 1229407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229409">SUSE bug 1229409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229410">SUSE bug 1229410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229411">SUSE bug 1229411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229413">SUSE bug 1229413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229414">SUSE bug 1229414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229417">SUSE bug 1229417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229418">SUSE bug 1229418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229444">SUSE bug 1229444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229453">SUSE bug 1229453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229454">SUSE bug 1229454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229481">SUSE bug 1229481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229482">SUSE bug 1229482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229488">SUSE bug 1229488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229489">SUSE bug 1229489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229490">SUSE bug 1229490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229493">SUSE bug 1229493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229495">SUSE bug 1229495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229497">SUSE bug 1229497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229500">SUSE bug 1229500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229503">SUSE bug 1229503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229506">SUSE bug 1229506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229507">SUSE bug 1229507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229508">SUSE bug 1229508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229509">SUSE bug 1229509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229510">SUSE bug 1229510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229512">SUSE bug 1229512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229516">SUSE bug 1229516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229521">SUSE bug 1229521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229522">SUSE bug 1229522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229523">SUSE bug 1229523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229524">SUSE bug 1229524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229525">SUSE bug 1229525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229526">SUSE bug 1229526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229527">SUSE bug 1229527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229528">SUSE bug 1229528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229529">SUSE bug 1229529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229531">SUSE bug 1229531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229533">SUSE bug 1229533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229535">SUSE bug 1229535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229536">SUSE bug 1229536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229537">SUSE bug 1229537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229540">SUSE bug 1229540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229544">SUSE bug 1229544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229545">SUSE bug 1229545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229546">SUSE bug 1229546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229547">SUSE bug 1229547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229548">SUSE bug 1229548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229554">SUSE bug 1229554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229557">SUSE bug 1229557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229558">SUSE bug 1229558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229559">SUSE bug 1229559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229560">SUSE bug 1229560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229562">SUSE bug 1229562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229564">SUSE bug 1229564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229565">SUSE bug 1229565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229566">SUSE bug 1229566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229568">SUSE bug 1229568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229569">SUSE bug 1229569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229572">SUSE bug 1229572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229573">SUSE bug 1229573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229576">SUSE bug 1229576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229581">SUSE bug 1229581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229588">SUSE bug 1229588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229598">SUSE bug 1229598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229603">SUSE bug 1229603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229604">SUSE bug 1229604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229605">SUSE bug 1229605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229608">SUSE bug 1229608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229611">SUSE bug 1229611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229612">SUSE bug 1229612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229613">SUSE bug 1229613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229614">SUSE bug 1229614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229615">SUSE bug 1229615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229616">SUSE bug 1229616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229617">SUSE bug 1229617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229620">SUSE bug 1229620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229622">SUSE bug 1229622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229623">SUSE bug 1229623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229624">SUSE bug 1229624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229625">SUSE bug 1229625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229626">SUSE bug 1229626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229628">SUSE bug 1229628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229629">SUSE bug 1229629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229630">SUSE bug 1229630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229631">SUSE bug 1229631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229632">SUSE bug 1229632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229635">SUSE bug 1229635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229636">SUSE bug 1229636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229637">SUSE bug 1229637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229638">SUSE bug 1229638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229639">SUSE bug 1229639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229641">SUSE bug 1229641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229642">SUSE bug 1229642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229643">SUSE bug 1229643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229645">SUSE bug 1229645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229657">SUSE bug 1229657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229658">SUSE bug 1229658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229662">SUSE bug 1229662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229664">SUSE bug 1229664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229707">SUSE bug 1229707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229739">SUSE bug 1229739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229743">SUSE bug 1229743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229746">SUSE bug 1229746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229754">SUSE bug 1229754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229755">SUSE bug 1229755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229756">SUSE bug 1229756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229759">SUSE bug 1229759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229761">SUSE bug 1229761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229767">SUSE bug 1229767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229768">SUSE bug 1229768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229781">SUSE bug 1229781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229784">SUSE bug 1229784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229787">SUSE bug 1229787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229788">SUSE bug 1229788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229789">SUSE bug 1229789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229792">SUSE bug 1229792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229820">SUSE bug 1229820</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4441/">CVE-2021-4441 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4441">CVE-2021-4441 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47106/">CVE-2021-47106 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47106">CVE-2021-47106 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47517/">CVE-2021-47517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47517">CVE-2021-47517 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47546/">CVE-2021-47546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47546">CVE-2021-47546 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38457/">CVE-2022-38457 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38457">CVE-2022-38457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40133/">CVE-2022-40133 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40133">CVE-2022-40133 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48645/">CVE-2022-48645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48645">CVE-2022-48645 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48706/">CVE-2022-48706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48706">CVE-2022-48706 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48808/">CVE-2022-48808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48808">CVE-2022-48808 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48865/">CVE-2022-48865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48865">CVE-2022-48865 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48868/">CVE-2022-48868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48868">CVE-2022-48868 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48869/">CVE-2022-48869 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48869">CVE-2022-48869 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48870/">CVE-2022-48870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48870">CVE-2022-48870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48871/">CVE-2022-48871 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48871">CVE-2022-48871 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48872/">CVE-2022-48872 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48872">CVE-2022-48872 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48873/">CVE-2022-48873 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48873">CVE-2022-48873 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48875/">CVE-2022-48875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48875">CVE-2022-48875 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48878/">CVE-2022-48878 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48878">CVE-2022-48878 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48880/">CVE-2022-48880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48880">CVE-2022-48880 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48881/">CVE-2022-48881 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48881">CVE-2022-48881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48882/">CVE-2022-48882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48882">CVE-2022-48882 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48883/">CVE-2022-48883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48883">CVE-2022-48883 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48884/">CVE-2022-48884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48884">CVE-2022-48884 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48885/">CVE-2022-48885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48885">CVE-2022-48885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48886/">CVE-2022-48886 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48886">CVE-2022-48886 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48887/">CVE-2022-48887 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48887">CVE-2022-48887 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48888/">CVE-2022-48888 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48888">CVE-2022-48888 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48889/">CVE-2022-48889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48889">CVE-2022-48889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48890/">CVE-2022-48890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48890">CVE-2022-48890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48891/">CVE-2022-48891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48891">CVE-2022-48891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48893/">CVE-2022-48893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48893">CVE-2022-48893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48896/">CVE-2022-48896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48896">CVE-2022-48896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48898/">CVE-2022-48898 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48898">CVE-2022-48898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48899/">CVE-2022-48899 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48899">CVE-2022-48899 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48903/">CVE-2022-48903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48903">CVE-2022-48903 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48904/">CVE-2022-48904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48904">CVE-2022-48904 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48905/">CVE-2022-48905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48905">CVE-2022-48905 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48906/">CVE-2022-48906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48906">CVE-2022-48906 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48907/">CVE-2022-48907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48907">CVE-2022-48907 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48909/">CVE-2022-48909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48909">CVE-2022-48909 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48910/">CVE-2022-48910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48910">CVE-2022-48910 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48912/">CVE-2022-48912 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48912">CVE-2022-48912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48913/">CVE-2022-48913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48913">CVE-2022-48913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48914/">CVE-2022-48914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48914">CVE-2022-48914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48915/">CVE-2022-48915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48915">CVE-2022-48915 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48916/">CVE-2022-48916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48916">CVE-2022-48916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48917/">CVE-2022-48917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48917">CVE-2022-48917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48918/">CVE-2022-48918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48918">CVE-2022-48918 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48919/">CVE-2022-48919 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48919">CVE-2022-48919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48920/">CVE-2022-48920 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48920">CVE-2022-48920 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48921/">CVE-2022-48921 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48921">CVE-2022-48921 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48923/">CVE-2022-48923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48923">CVE-2022-48923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48924/">CVE-2022-48924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48924">CVE-2022-48924 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48925/">CVE-2022-48925 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48925">CVE-2022-48925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48926/">CVE-2022-48926 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48926">CVE-2022-48926 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48927/">CVE-2022-48927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48927">CVE-2022-48927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48928/">CVE-2022-48928 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48928">CVE-2022-48928 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48929/">CVE-2022-48929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48929">CVE-2022-48929 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48930/">CVE-2022-48930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48930">CVE-2022-48930 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48931/">CVE-2022-48931 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48931">CVE-2022-48931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48932/">CVE-2022-48932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48932">CVE-2022-48932 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48934/">CVE-2022-48934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48934">CVE-2022-48934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48937/">CVE-2022-48937 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48937">CVE-2022-48937 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48938/">CVE-2022-48938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48938">CVE-2022-48938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48939/">CVE-2022-48939 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48939">CVE-2022-48939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48940/">CVE-2022-48940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48940">CVE-2022-48940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48941/">CVE-2022-48941 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48941">CVE-2022-48941 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48942/">CVE-2022-48942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48942">CVE-2022-48942 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48943/">CVE-2022-48943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48943">CVE-2022-48943 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3610/">CVE-2023-3610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3610">CVE-2023-3610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52458/">CVE-2023-52458 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52458">CVE-2023-52458 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52489/">CVE-2023-52489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52489">CVE-2023-52489 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52498/">CVE-2023-52498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52498">CVE-2023-52498 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52581/">CVE-2023-52581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52581">CVE-2023-52581 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52859/">CVE-2023-52859 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52859">CVE-2023-52859 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52887/">CVE-2023-52887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52887">CVE-2023-52887 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52889/">CVE-2023-52889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52889">CVE-2023-52889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52893/">CVE-2023-52893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52893">CVE-2023-52893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52894/">CVE-2023-52894 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52894">CVE-2023-52894 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52896/">CVE-2023-52896 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52896">CVE-2023-52896 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52898/">CVE-2023-52898 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52898">CVE-2023-52898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52899/">CVE-2023-52899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52899">CVE-2023-52899 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52900/">CVE-2023-52900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52900">CVE-2023-52900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52901/">CVE-2023-52901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52901">CVE-2023-52901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52904/">CVE-2023-52904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52904">CVE-2023-52904 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52905/">CVE-2023-52905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52905">CVE-2023-52905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52906/">CVE-2023-52906 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52906">CVE-2023-52906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52907/">CVE-2023-52907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52907">CVE-2023-52907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52908/">CVE-2023-52908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52908">CVE-2023-52908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52909/">CVE-2023-52909 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52909">CVE-2023-52909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52910/">CVE-2023-52910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52910">CVE-2023-52910 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52911/">CVE-2023-52911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52911">CVE-2023-52911 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52912/">CVE-2023-52912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52912">CVE-2023-52912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52913/">CVE-2023-52913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52913">CVE-2023-52913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26631/">CVE-2024-26631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26631">CVE-2024-26631 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26668/">CVE-2024-26668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26668">CVE-2024-26668 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26669/">CVE-2024-26669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26669">CVE-2024-26669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26677/">CVE-2024-26677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26677">CVE-2024-26677 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26735/">CVE-2024-26735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26735">CVE-2024-26735 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26808/">CVE-2024-26808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26808">CVE-2024-26808 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26812/">CVE-2024-26812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26812">CVE-2024-26812 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26835/">CVE-2024-26835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26835">CVE-2024-26835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26851/">CVE-2024-26851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26851">CVE-2024-26851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27010/">CVE-2024-27010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27010">CVE-2024-27010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27011/">CVE-2024-27011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27011">CVE-2024-27011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27016/">CVE-2024-27016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27016">CVE-2024-27016 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27024/">CVE-2024-27024 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27024">CVE-2024-27024 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27079/">CVE-2024-27079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27079">CVE-2024-27079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27403/">CVE-2024-27403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27403">CVE-2024-27403 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31076/">CVE-2024-31076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31076">CVE-2024-31076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35897/">CVE-2024-35897 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35897">CVE-2024-35897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35902/">CVE-2024-35902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35902">CVE-2024-35902 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35945/">CVE-2024-35945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35945">CVE-2024-35945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35971/">CVE-2024-35971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35971">CVE-2024-35971 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36009/">CVE-2024-36009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36009">CVE-2024-36009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36013/">CVE-2024-36013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36013">CVE-2024-36013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36270/">CVE-2024-36270 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36270">CVE-2024-36270 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-36286/">CVE-2024-36286 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36286">CVE-2024-36286 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36489/">CVE-2024-36489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36489">CVE-2024-36489 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36929/">CVE-2024-36929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36929">CVE-2024-36929 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-36933/">CVE-2024-36933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36933">CVE-2024-36933 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36936/">CVE-2024-36936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36936">CVE-2024-36936 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36962/">CVE-2024-36962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36962">CVE-2024-36962 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38554/">CVE-2024-38554 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38554">CVE-2024-38554 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38602/">CVE-2024-38602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38602">CVE-2024-38602 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38662/">CVE-2024-38662 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38662">CVE-2024-38662 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-39489/">CVE-2024-39489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39489">CVE-2024-39489 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40905/">CVE-2024-40905 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40905">CVE-2024-40905 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40978/">CVE-2024-40978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40978">CVE-2024-40978 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40980/">CVE-2024-40980 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40980">CVE-2024-40980 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40995/">CVE-2024-40995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40995">CVE-2024-40995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41000/">CVE-2024-41000 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41000">CVE-2024-41000 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41007/">CVE-2024-41007 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41007">CVE-2024-41007 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41009/">CVE-2024-41009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41009">CVE-2024-41009 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41011/">CVE-2024-41011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41011">CVE-2024-41011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41016/">CVE-2024-41016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41016">CVE-2024-41016 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41020/">CVE-2024-41020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41020">CVE-2024-41020 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41022/">CVE-2024-41022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41022">CVE-2024-41022 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41035/">CVE-2024-41035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41035">CVE-2024-41035 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41036/">CVE-2024-41036 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41036">CVE-2024-41036 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41038/">CVE-2024-41038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41038">CVE-2024-41038 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41039/">CVE-2024-41039 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41039">CVE-2024-41039 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41042/">CVE-2024-41042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41042">CVE-2024-41042 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41045/">CVE-2024-41045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41045">CVE-2024-41045 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41056/">CVE-2024-41056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41056">CVE-2024-41056 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41060/">CVE-2024-41060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41060">CVE-2024-41060 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41062/">CVE-2024-41062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41062">CVE-2024-41062 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41065/">CVE-2024-41065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41065">CVE-2024-41065 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41068/">CVE-2024-41068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41068">CVE-2024-41068 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41073/">CVE-2024-41073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41073">CVE-2024-41073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41079/">CVE-2024-41079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41079">CVE-2024-41079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41080/">CVE-2024-41080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41080">CVE-2024-41080 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41087/">CVE-2024-41087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41087">CVE-2024-41087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41088/">CVE-2024-41088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41088">CVE-2024-41088 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41089/">CVE-2024-41089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41089">CVE-2024-41089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41092/">CVE-2024-41092 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41092">CVE-2024-41092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41093/">CVE-2024-41093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41093">CVE-2024-41093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41095/">CVE-2024-41095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41095">CVE-2024-41095 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41097/">CVE-2024-41097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41097">CVE-2024-41097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41098/">CVE-2024-41098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41098">CVE-2024-41098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42069/">CVE-2024-42069 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42069">CVE-2024-42069 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42074/">CVE-2024-42074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42074">CVE-2024-42074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42076/">CVE-2024-42076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42076">CVE-2024-42076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42077/">CVE-2024-42077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42077">CVE-2024-42077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42080/">CVE-2024-42080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42080">CVE-2024-42080 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42082/">CVE-2024-42082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42082">CVE-2024-42082 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42085/">CVE-2024-42085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42085">CVE-2024-42085 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42086/">CVE-2024-42086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42086">CVE-2024-42086 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-42087/">CVE-2024-42087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42087">CVE-2024-42087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42089/">CVE-2024-42089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42089">CVE-2024-42089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42090/">CVE-2024-42090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42090">CVE-2024-42090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42092/">CVE-2024-42092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42092">CVE-2024-42092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42095/">CVE-2024-42095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42095">CVE-2024-42095 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42097/">CVE-2024-42097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42097">CVE-2024-42097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42098/">CVE-2024-42098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42098">CVE-2024-42098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42101/">CVE-2024-42101 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42101">CVE-2024-42101 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42104/">CVE-2024-42104 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42104">CVE-2024-42104 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42106/">CVE-2024-42106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42106">CVE-2024-42106 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42107/">CVE-2024-42107 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42107">CVE-2024-42107 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42110/">CVE-2024-42110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42110">CVE-2024-42110 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42114/">CVE-2024-42114 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42114">CVE-2024-42114 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42115/">CVE-2024-42115 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42115">CVE-2024-42115 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42119/">CVE-2024-42119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42119">CVE-2024-42119 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42120/">CVE-2024-42120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42120">CVE-2024-42120 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42121/">CVE-2024-42121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42121">CVE-2024-42121 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42126/">CVE-2024-42126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42126">CVE-2024-42126 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42127/">CVE-2024-42127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42127">CVE-2024-42127 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42130/">CVE-2024-42130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42130">CVE-2024-42130 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42137/">CVE-2024-42137 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42137">CVE-2024-42137 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42139/">CVE-2024-42139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42139">CVE-2024-42139 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42142/">CVE-2024-42142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42142">CVE-2024-42142 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42143/">CVE-2024-42143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42143">CVE-2024-42143 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42148/">CVE-2024-42148 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42148">CVE-2024-42148 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42152/">CVE-2024-42152 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42152">CVE-2024-42152 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42155/">CVE-2024-42155 at SUSE</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42155">CVE-2024-42155 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42156/">CVE-2024-42156 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42156">CVE-2024-42156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42157/">CVE-2024-42157 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42157">CVE-2024-42157 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42158/">CVE-2024-42158 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42158">CVE-2024-42158 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42162/">CVE-2024-42162 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42162">CVE-2024-42162 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42223/">CVE-2024-42223 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42223">CVE-2024-42223 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42225/">CVE-2024-42225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42225">CVE-2024-42225 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42228/">CVE-2024-42228 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42228">CVE-2024-42228 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42229/">CVE-2024-42229 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42229">CVE-2024-42229 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42230/">CVE-2024-42230 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42230">CVE-2024-42230 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42232/">CVE-2024-42232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42232">CVE-2024-42232 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42236/">CVE-2024-42236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42236">CVE-2024-42236 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42237/">CVE-2024-42237 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42237">CVE-2024-42237 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42238/">CVE-2024-42238 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42238">CVE-2024-42238 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42239/">CVE-2024-42239 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42239">CVE-2024-42239 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42240/">CVE-2024-42240 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42240">CVE-2024-42240 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42244/">CVE-2024-42244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42244">CVE-2024-42244 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42246/">CVE-2024-42246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42246">CVE-2024-42246 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42247/">CVE-2024-42247 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42247">CVE-2024-42247 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-42268/">CVE-2024-42268 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42268">CVE-2024-42268 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42271/">CVE-2024-42271 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42271">CVE-2024-42271 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42274/">CVE-2024-42274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42274">CVE-2024-42274 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42276/">CVE-2024-42276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42276">CVE-2024-42276 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42277/">CVE-2024-42277 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42277">CVE-2024-42277 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42280/">CVE-2024-42280 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42280">CVE-2024-42280 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42281/">CVE-2024-42281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42281">CVE-2024-42281 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42283/">CVE-2024-42283 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42283">CVE-2024-42283 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42284/">CVE-2024-42284 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42284">CVE-2024-42284 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42285/">CVE-2024-42285 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42285">CVE-2024-42285 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42286/">CVE-2024-42286 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42286">CVE-2024-42286 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42287/">CVE-2024-42287 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42287">CVE-2024-42287 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42288/">CVE-2024-42288 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42288">CVE-2024-42288 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42289/">CVE-2024-42289 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42289">CVE-2024-42289 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42291/">CVE-2024-42291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42291">CVE-2024-42291 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42292/">CVE-2024-42292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42292">CVE-2024-42292 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42295/">CVE-2024-42295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42295">CVE-2024-42295 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-42301/">CVE-2024-42301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42301">CVE-2024-42301 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42302/">CVE-2024-42302 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42302">CVE-2024-42302 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42308/">CVE-2024-42308 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42308">CVE-2024-42308 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42309/">CVE-2024-42309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42309">CVE-2024-42309 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42310/">CVE-2024-42310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42310">CVE-2024-42310 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42311/">CVE-2024-42311 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42311">CVE-2024-42311 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42312/">CVE-2024-42312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42312">CVE-2024-42312 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42313/">CVE-2024-42313 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42313">CVE-2024-42313 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42315/">CVE-2024-42315 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42315">CVE-2024-42315 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42318/">CVE-2024-42318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42318">CVE-2024-42318 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42319/">CVE-2024-42319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42319">CVE-2024-42319 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42320/">CVE-2024-42320 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42320">CVE-2024-42320 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42322/">CVE-2024-42322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42322">CVE-2024-42322 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43816/">CVE-2024-43816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43816">CVE-2024-43816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43818/">CVE-2024-43818 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43818">CVE-2024-43818 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43819/">CVE-2024-43819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43819">CVE-2024-43819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43821/">CVE-2024-43821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43821">CVE-2024-43821 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43823/">CVE-2024-43823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43823">CVE-2024-43823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43829/">CVE-2024-43829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43829">CVE-2024-43829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43830/">CVE-2024-43830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43830">CVE-2024-43830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43831/">CVE-2024-43831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43831">CVE-2024-43831 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43834/">CVE-2024-43834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43834">CVE-2024-43834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43837/">CVE-2024-43837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43837">CVE-2024-43837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43839/">CVE-2024-43839 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43839">CVE-2024-43839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43841/">CVE-2024-43841 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43841">CVE-2024-43841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43842/">CVE-2024-43842 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43842">CVE-2024-43842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43846/">CVE-2024-43846 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43846">CVE-2024-43846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43849/">CVE-2024-43849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43849">CVE-2024-43849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43853/">CVE-2024-43853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43853">CVE-2024-43853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43854/">CVE-2024-43854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43854">CVE-2024-43854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43856/">CVE-2024-43856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43856">CVE-2024-43856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43858/">CVE-2024-43858 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43858">CVE-2024-43858 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43860/">CVE-2024-43860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43860">CVE-2024-43860 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43861/">CVE-2024-43861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43861">CVE-2024-43861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43863/">CVE-2024-43863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43863">CVE-2024-43863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43866/">CVE-2024-43866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43866">CVE-2024-43866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43867/">CVE-2024-43867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43867">CVE-2024-43867 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43871/">CVE-2024-43871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43871">CVE-2024-43871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43872/">CVE-2024-43872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43872">CVE-2024-43872 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43873/">CVE-2024-43873 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43873">CVE-2024-43873 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43879/">CVE-2024-43879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43879">CVE-2024-43879 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43880/">CVE-2024-43880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43880">CVE-2024-43880 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-43882/">CVE-2024-43882 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43882">CVE-2024-43882 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43883/">CVE-2024-43883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43883">CVE-2024-43883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43884/">CVE-2024-43884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43884">CVE-2024-43884 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43889/">CVE-2024-43889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43889">CVE-2024-43889 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43892/">CVE-2024-43892 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43892">CVE-2024-43892 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43893/">CVE-2024-43893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43893">CVE-2024-43893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43894/">CVE-2024-43894 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43894">CVE-2024-43894 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43895/">CVE-2024-43895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43895">CVE-2024-43895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43899/">CVE-2024-43899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43899">CVE-2024-43899 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-43900/">CVE-2024-43900 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43900">CVE-2024-43900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43902/">CVE-2024-43902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43902">CVE-2024-43902 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43903/">CVE-2024-43903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43903">CVE-2024-43903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43904/">CVE-2024-43904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43904">CVE-2024-43904 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43905/">CVE-2024-43905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43905">CVE-2024-43905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43907/">CVE-2024-43907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43907">CVE-2024-43907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43908/">CVE-2024-43908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43908">CVE-2024-43908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43909/">CVE-2024-43909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43909">CVE-2024-43909 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44938/">CVE-2024-44938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44938">CVE-2024-44938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44939/">CVE-2024-44939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44939">CVE-2024-44939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44947/">CVE-2024-44947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44947">CVE-2024-44947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009941978" comment="cluster-md-kmp-azure-5.14.21-150500.33.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941979" comment="dlm-kmp-azure-5.14.21-150500.33.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941980" comment="gfs2-kmp-azure-5.14.21-150500.33.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941981" comment="kernel-azure-5.14.21-150500.33.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941982" comment="kernel-azure-devel-5.14.21-150500.33.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941983" comment="kernel-azure-extra-5.14.21-150500.33.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941984" comment="kernel-azure-livepatch-devel-5.14.21-150500.33.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941985" comment="kernel-azure-optional-5.14.21-150500.33.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941986" comment="kernel-azure-vdso-5.14.21-150500.33.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941987" comment="kernel-devel-azure-5.14.21-150500.33.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941988" comment="kernel-source-azure-5.14.21-150500.33.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941989" comment="kernel-syms-azure-5.14.21-150500.33.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941990" comment="kselftests-kmp-azure-5.14.21-150500.33.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941991" comment="ocfs2-kmp-azure-5.14.21-150500.33.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009941992" comment="reiserfs-kmp-azure-5.14.21-150500.33.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4967" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-c (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1159552" ref_url="https://bugzilla.suse.com/1159552" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1311" ref_url="https://www.suse.com/security/cve/CVE-2018-1311/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017852.html" source="SUSE-SU"/>
		<description>
This update for xerces-c fixes the following issues:

- CVE-2018-1311: fixed use-after-free triggered during the scanning of external DTDs potentially leading to DOS. (bsc#1159552)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2024-02-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159552">SUSE bug 1159552</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1311/">CVE-2018-1311 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-1311">CVE-2018-1311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009845294" comment="libxerces-c-3_2-3.2.3-150300.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845295" comment="libxerces-c-3_2-32bit-3.2.3-150300.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845296" comment="libxerces-c-devel-3.2.3-150300.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845297" comment="xerces-c-3.2.3-150300.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845298" comment="xerces-c-doc-3.2.3-150300.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4968" version="1" class="patch">
	<metadata>
		<title>Security update for python311 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1225660" ref_url="https://bugzilla.suse.com/1225660" source="BUGZILLA"/>
		<reference ref_id="1227378" ref_url="https://bugzilla.suse.com/1227378" source="BUGZILLA"/>
		<reference ref_id="1227999" ref_url="https://bugzilla.suse.com/1227999" source="BUGZILLA"/>
		<reference ref_id="1228780" ref_url="https://bugzilla.suse.com/1228780" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6923" ref_url="https://www.suse.com/security/cve/CVE-2024-6923/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019411.html" source="SUSE-SU"/>
		<description>
This update for python311 fixes the following issues:

- CVE-2024-6923: Fixed email header injection due to unquoted newlines (bsc#1228780)

Other fixes:
- %{profileopt} variable is set according to the variable %{do_profiling} (bsc#1227999)
- Stop using %%defattr, it seems to be breaking proper executable attributes on /usr/bin/ scripts (bsc#1227378) 
- Make pip and modern tools install directly in /usr/local when used by the user (bsc#1225660)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-11"/>
	<updated date="2024-09-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1225660">SUSE bug 1225660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227378">SUSE bug 1227378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227999">SUSE bug 1227999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228780">SUSE bug 1228780</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-6923/">CVE-2024-6923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6923">CVE-2024-6923 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942286" comment="libpython3_11-1_0-3.11.9-150400.9.32.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942287" comment="libpython3_11-1_0-32bit-3.11.9-150400.9.32.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942288" comment="python311-3.11.9-150400.9.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942289" comment="python311-32bit-3.11.9-150400.9.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942290" comment="python311-base-3.11.9-150400.9.32.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942291" comment="python311-base-32bit-3.11.9-150400.9.32.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942292" comment="python311-curses-3.11.9-150400.9.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942293" comment="python311-dbm-3.11.9-150400.9.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942294" comment="python311-devel-3.11.9-150400.9.32.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942295" comment="python311-doc-3.11.9-150400.9.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942296" comment="python311-doc-devhelp-3.11.9-150400.9.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942297" comment="python311-idle-3.11.9-150400.9.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942298" comment="python311-testsuite-3.11.9-150400.9.32.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942299" comment="python311-tk-3.11.9-150400.9.32.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942300" comment="python311-tools-3.11.9-150400.9.32.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4969" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194111" ref_url="https://bugzilla.suse.com/1194111" source="BUGZILLA"/>
		<reference ref_id="1194765" ref_url="https://bugzilla.suse.com/1194765" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1196261" ref_url="https://bugzilla.suse.com/1196261" source="BUGZILLA"/>
		<reference ref_id="1196516" ref_url="https://bugzilla.suse.com/1196516" source="BUGZILLA"/>
		<reference ref_id="1196894" ref_url="https://bugzilla.suse.com/1196894" source="BUGZILLA"/>
		<reference ref_id="1198017" ref_url="https://bugzilla.suse.com/1198017" source="BUGZILLA"/>
		<reference ref_id="1203329" ref_url="https://bugzilla.suse.com/1203329" source="BUGZILLA"/>
		<reference ref_id="1203330" ref_url="https://bugzilla.suse.com/1203330" source="BUGZILLA"/>
		<reference ref_id="1203360" ref_url="https://bugzilla.suse.com/1203360" source="BUGZILLA"/>
		<reference ref_id="1205462" ref_url="https://bugzilla.suse.com/1205462" source="BUGZILLA"/>
		<reference ref_id="1206006" ref_url="https://bugzilla.suse.com/1206006" source="BUGZILLA"/>
		<reference ref_id="1206258" ref_url="https://bugzilla.suse.com/1206258" source="BUGZILLA"/>
		<reference ref_id="1206843" ref_url="https://bugzilla.suse.com/1206843" source="BUGZILLA"/>
		<reference ref_id="1207158" ref_url="https://bugzilla.suse.com/1207158" source="BUGZILLA"/>
		<reference ref_id="1208783" ref_url="https://bugzilla.suse.com/1208783" source="BUGZILLA"/>
		<reference ref_id="1210644" ref_url="https://bugzilla.suse.com/1210644" source="BUGZILLA"/>
		<reference ref_id="1213580" ref_url="https://bugzilla.suse.com/1213580" source="BUGZILLA"/>
		<reference ref_id="1213632" ref_url="https://bugzilla.suse.com/1213632" source="BUGZILLA"/>
		<reference ref_id="1214285" ref_url="https://bugzilla.suse.com/1214285" source="BUGZILLA"/>
		<reference ref_id="1216834" ref_url="https://bugzilla.suse.com/1216834" source="BUGZILLA"/>
		<reference ref_id="1220428" ref_url="https://bugzilla.suse.com/1220428" source="BUGZILLA"/>
		<reference ref_id="1220877" ref_url="https://bugzilla.suse.com/1220877" source="BUGZILLA"/>
		<reference ref_id="1220962" ref_url="https://bugzilla.suse.com/1220962" source="BUGZILLA"/>
		<reference ref_id="1221269" ref_url="https://bugzilla.suse.com/1221269" source="BUGZILLA"/>
		<reference ref_id="1221326" ref_url="https://bugzilla.suse.com/1221326" source="BUGZILLA"/>
		<reference ref_id="1221630" ref_url="https://bugzilla.suse.com/1221630" source="BUGZILLA"/>
		<reference ref_id="1221645" ref_url="https://bugzilla.suse.com/1221645" source="BUGZILLA"/>
		<reference ref_id="1222335" ref_url="https://bugzilla.suse.com/1222335" source="BUGZILLA"/>
		<reference ref_id="1222350" ref_url="https://bugzilla.suse.com/1222350" source="BUGZILLA"/>
		<reference ref_id="1222372" ref_url="https://bugzilla.suse.com/1222372" source="BUGZILLA"/>
		<reference ref_id="1222387" ref_url="https://bugzilla.suse.com/1222387" source="BUGZILLA"/>
		<reference ref_id="1222634" ref_url="https://bugzilla.suse.com/1222634" source="BUGZILLA"/>
		<reference ref_id="1222808" ref_url="https://bugzilla.suse.com/1222808" source="BUGZILLA"/>
		<reference ref_id="1222967" ref_url="https://bugzilla.suse.com/1222967" source="BUGZILLA"/>
		<reference ref_id="1223074" ref_url="https://bugzilla.suse.com/1223074" source="BUGZILLA"/>
		<reference ref_id="1223191" ref_url="https://bugzilla.suse.com/1223191" source="BUGZILLA"/>
		<reference ref_id="1223508" ref_url="https://bugzilla.suse.com/1223508" source="BUGZILLA"/>
		<reference ref_id="1223720" ref_url="https://bugzilla.suse.com/1223720" source="BUGZILLA"/>
		<reference ref_id="1223742" ref_url="https://bugzilla.suse.com/1223742" source="BUGZILLA"/>
		<reference ref_id="1223777" ref_url="https://bugzilla.suse.com/1223777" source="BUGZILLA"/>
		<reference ref_id="1223803" ref_url="https://bugzilla.suse.com/1223803" source="BUGZILLA"/>
		<reference ref_id="1223807" ref_url="https://bugzilla.suse.com/1223807" source="BUGZILLA"/>
		<reference ref_id="1224105" ref_url="https://bugzilla.suse.com/1224105" source="BUGZILLA"/>
		<reference ref_id="1224415" ref_url="https://bugzilla.suse.com/1224415" source="BUGZILLA"/>
		<reference ref_id="1224496" ref_url="https://bugzilla.suse.com/1224496" source="BUGZILLA"/>
		<reference ref_id="1224510" ref_url="https://bugzilla.suse.com/1224510" source="BUGZILLA"/>
		<reference ref_id="1224542" ref_url="https://bugzilla.suse.com/1224542" source="BUGZILLA"/>
		<reference ref_id="1224578" ref_url="https://bugzilla.suse.com/1224578" source="BUGZILLA"/>
		<reference ref_id="1224639" ref_url="https://bugzilla.suse.com/1224639" source="BUGZILLA"/>
		<reference ref_id="1225162" ref_url="https://bugzilla.suse.com/1225162" source="BUGZILLA"/>
		<reference ref_id="1225352" ref_url="https://bugzilla.suse.com/1225352" source="BUGZILLA"/>
		<reference ref_id="1225428" ref_url="https://bugzilla.suse.com/1225428" source="BUGZILLA"/>
		<reference ref_id="1225524" ref_url="https://bugzilla.suse.com/1225524" source="BUGZILLA"/>
		<reference ref_id="1225578" ref_url="https://bugzilla.suse.com/1225578" source="BUGZILLA"/>
		<reference ref_id="1225582" ref_url="https://bugzilla.suse.com/1225582" source="BUGZILLA"/>
		<reference ref_id="1225773" ref_url="https://bugzilla.suse.com/1225773" source="BUGZILLA"/>
		<reference ref_id="1225814" ref_url="https://bugzilla.suse.com/1225814" source="BUGZILLA"/>
		<reference ref_id="1225827" ref_url="https://bugzilla.suse.com/1225827" source="BUGZILLA"/>
		<reference ref_id="1225832" ref_url="https://bugzilla.suse.com/1225832" source="BUGZILLA"/>
		<reference ref_id="1225903" ref_url="https://bugzilla.suse.com/1225903" source="BUGZILLA"/>
		<reference ref_id="1226168" ref_url="https://bugzilla.suse.com/1226168" source="BUGZILLA"/>
		<reference ref_id="1226530" ref_url="https://bugzilla.suse.com/1226530" source="BUGZILLA"/>
		<reference ref_id="1226613" ref_url="https://bugzilla.suse.com/1226613" source="BUGZILLA"/>
		<reference ref_id="1226742" ref_url="https://bugzilla.suse.com/1226742" source="BUGZILLA"/>
		<reference ref_id="1226765" ref_url="https://bugzilla.suse.com/1226765" source="BUGZILLA"/>
		<reference ref_id="1226798" ref_url="https://bugzilla.suse.com/1226798" source="BUGZILLA"/>
		<reference ref_id="1226801" ref_url="https://bugzilla.suse.com/1226801" source="BUGZILLA"/>
		<reference ref_id="1226874" ref_url="https://bugzilla.suse.com/1226874" source="BUGZILLA"/>
		<reference ref_id="1226885" ref_url="https://bugzilla.suse.com/1226885" source="BUGZILLA"/>
		<reference ref_id="1227079" ref_url="https://bugzilla.suse.com/1227079" source="BUGZILLA"/>
		<reference ref_id="1227623" ref_url="https://bugzilla.suse.com/1227623" source="BUGZILLA"/>
		<reference ref_id="1227761" ref_url="https://bugzilla.suse.com/1227761" source="BUGZILLA"/>
		<reference ref_id="1227830" ref_url="https://bugzilla.suse.com/1227830" source="BUGZILLA"/>
		<reference ref_id="1227863" ref_url="https://bugzilla.suse.com/1227863" source="BUGZILLA"/>
		<reference ref_id="1227867" ref_url="https://bugzilla.suse.com/1227867" source="BUGZILLA"/>
		<reference ref_id="1227929" ref_url="https://bugzilla.suse.com/1227929" source="BUGZILLA"/>
		<reference ref_id="1227937" ref_url="https://bugzilla.suse.com/1227937" source="BUGZILLA"/>
		<reference ref_id="1227958" ref_url="https://bugzilla.suse.com/1227958" source="BUGZILLA"/>
		<reference ref_id="1228020" ref_url="https://bugzilla.suse.com/1228020" source="BUGZILLA"/>
		<reference ref_id="1228065" ref_url="https://bugzilla.suse.com/1228065" source="BUGZILLA"/>
		<reference ref_id="1228114" ref_url="https://bugzilla.suse.com/1228114" source="BUGZILLA"/>
		<reference ref_id="1228410" ref_url="https://bugzilla.suse.com/1228410" source="BUGZILLA"/>
		<reference ref_id="1228426" ref_url="https://bugzilla.suse.com/1228426" source="BUGZILLA"/>
		<reference ref_id="1228427" ref_url="https://bugzilla.suse.com/1228427" source="BUGZILLA"/>
		<reference ref_id="1228429" ref_url="https://bugzilla.suse.com/1228429" source="BUGZILLA"/>
		<reference ref_id="1228446" ref_url="https://bugzilla.suse.com/1228446" source="BUGZILLA"/>
		<reference ref_id="1228447" ref_url="https://bugzilla.suse.com/1228447" source="BUGZILLA"/>
		<reference ref_id="1228449" ref_url="https://bugzilla.suse.com/1228449" source="BUGZILLA"/>
		<reference ref_id="1228450" ref_url="https://bugzilla.suse.com/1228450" source="BUGZILLA"/>
		<reference ref_id="1228452" ref_url="https://bugzilla.suse.com/1228452" source="BUGZILLA"/>
		<reference ref_id="1228456" ref_url="https://bugzilla.suse.com/1228456" source="BUGZILLA"/>
		<reference ref_id="1228463" ref_url="https://bugzilla.suse.com/1228463" source="BUGZILLA"/>
		<reference ref_id="1228466" ref_url="https://bugzilla.suse.com/1228466" source="BUGZILLA"/>
		<reference ref_id="1228467" ref_url="https://bugzilla.suse.com/1228467" source="BUGZILLA"/>
		<reference ref_id="1228469" ref_url="https://bugzilla.suse.com/1228469" source="BUGZILLA"/>
		<reference ref_id="1228480" ref_url="https://bugzilla.suse.com/1228480" source="BUGZILLA"/>
		<reference ref_id="1228481" ref_url="https://bugzilla.suse.com/1228481" source="BUGZILLA"/>
		<reference ref_id="1228482" ref_url="https://bugzilla.suse.com/1228482" source="BUGZILLA"/>
		<reference ref_id="1228483" ref_url="https://bugzilla.suse.com/1228483" source="BUGZILLA"/>
		<reference ref_id="1228484" ref_url="https://bugzilla.suse.com/1228484" source="BUGZILLA"/>
		<reference ref_id="1228485" ref_url="https://bugzilla.suse.com/1228485" source="BUGZILLA"/>
		<reference ref_id="1228487" ref_url="https://bugzilla.suse.com/1228487" source="BUGZILLA"/>
		<reference ref_id="1228489" ref_url="https://bugzilla.suse.com/1228489" source="BUGZILLA"/>
		<reference ref_id="1228491" ref_url="https://bugzilla.suse.com/1228491" source="BUGZILLA"/>
		<reference ref_id="1228493" ref_url="https://bugzilla.suse.com/1228493" source="BUGZILLA"/>
		<reference ref_id="1228494" ref_url="https://bugzilla.suse.com/1228494" source="BUGZILLA"/>
		<reference ref_id="1228495" ref_url="https://bugzilla.suse.com/1228495" source="BUGZILLA"/>
		<reference ref_id="1228496" ref_url="https://bugzilla.suse.com/1228496" source="BUGZILLA"/>
		<reference ref_id="1228501" ref_url="https://bugzilla.suse.com/1228501" source="BUGZILLA"/>
		<reference ref_id="1228503" ref_url="https://bugzilla.suse.com/1228503" source="BUGZILLA"/>
		<reference ref_id="1228509" ref_url="https://bugzilla.suse.com/1228509" source="BUGZILLA"/>
		<reference ref_id="1228513" ref_url="https://bugzilla.suse.com/1228513" source="BUGZILLA"/>
		<reference ref_id="1228515" ref_url="https://bugzilla.suse.com/1228515" source="BUGZILLA"/>
		<reference ref_id="1228516" ref_url="https://bugzilla.suse.com/1228516" source="BUGZILLA"/>
		<reference ref_id="1228526" ref_url="https://bugzilla.suse.com/1228526" source="BUGZILLA"/>
		<reference ref_id="1228531" ref_url="https://bugzilla.suse.com/1228531" source="BUGZILLA"/>
		<reference ref_id="1228563" ref_url="https://bugzilla.suse.com/1228563" source="BUGZILLA"/>
		<reference ref_id="1228564" ref_url="https://bugzilla.suse.com/1228564" source="BUGZILLA"/>
		<reference ref_id="1228567" ref_url="https://bugzilla.suse.com/1228567" source="BUGZILLA"/>
		<reference ref_id="1228576" ref_url="https://bugzilla.suse.com/1228576" source="BUGZILLA"/>
		<reference ref_id="1228579" ref_url="https://bugzilla.suse.com/1228579" source="BUGZILLA"/>
		<reference ref_id="1228584" ref_url="https://bugzilla.suse.com/1228584" source="BUGZILLA"/>
		<reference ref_id="1228588" ref_url="https://bugzilla.suse.com/1228588" source="BUGZILLA"/>
		<reference ref_id="1228590" ref_url="https://bugzilla.suse.com/1228590" source="BUGZILLA"/>
		<reference ref_id="1228615" ref_url="https://bugzilla.suse.com/1228615" source="BUGZILLA"/>
		<reference ref_id="1228616" ref_url="https://bugzilla.suse.com/1228616" source="BUGZILLA"/>
		<reference ref_id="1228635" ref_url="https://bugzilla.suse.com/1228635" source="BUGZILLA"/>
		<reference ref_id="1228636" ref_url="https://bugzilla.suse.com/1228636" source="BUGZILLA"/>
		<reference ref_id="1228654" ref_url="https://bugzilla.suse.com/1228654" source="BUGZILLA"/>
		<reference ref_id="1228656" ref_url="https://bugzilla.suse.com/1228656" source="BUGZILLA"/>
		<reference ref_id="1228658" ref_url="https://bugzilla.suse.com/1228658" source="BUGZILLA"/>
		<reference ref_id="1228660" ref_url="https://bugzilla.suse.com/1228660" source="BUGZILLA"/>
		<reference ref_id="1228662" ref_url="https://bugzilla.suse.com/1228662" source="BUGZILLA"/>
		<reference ref_id="1228667" ref_url="https://bugzilla.suse.com/1228667" source="BUGZILLA"/>
		<reference ref_id="1228673" ref_url="https://bugzilla.suse.com/1228673" source="BUGZILLA"/>
		<reference ref_id="1228677" ref_url="https://bugzilla.suse.com/1228677" source="BUGZILLA"/>
		<reference ref_id="1228687" ref_url="https://bugzilla.suse.com/1228687" source="BUGZILLA"/>
		<reference ref_id="1228706" ref_url="https://bugzilla.suse.com/1228706" source="BUGZILLA"/>
		<reference ref_id="1228708" ref_url="https://bugzilla.suse.com/1228708" source="BUGZILLA"/>
		<reference ref_id="1228710" ref_url="https://bugzilla.suse.com/1228710" source="BUGZILLA"/>
		<reference ref_id="1228718" ref_url="https://bugzilla.suse.com/1228718" source="BUGZILLA"/>
		<reference ref_id="1228720" ref_url="https://bugzilla.suse.com/1228720" source="BUGZILLA"/>
		<reference ref_id="1228721" ref_url="https://bugzilla.suse.com/1228721" source="BUGZILLA"/>
		<reference ref_id="1228722" ref_url="https://bugzilla.suse.com/1228722" source="BUGZILLA"/>
		<reference ref_id="1228724" ref_url="https://bugzilla.suse.com/1228724" source="BUGZILLA"/>
		<reference ref_id="1228726" ref_url="https://bugzilla.suse.com/1228726" source="BUGZILLA"/>
		<reference ref_id="1228727" ref_url="https://bugzilla.suse.com/1228727" source="BUGZILLA"/>
		<reference ref_id="1228733" ref_url="https://bugzilla.suse.com/1228733" source="BUGZILLA"/>
		<reference ref_id="1228748" ref_url="https://bugzilla.suse.com/1228748" source="BUGZILLA"/>
		<reference ref_id="1228766" ref_url="https://bugzilla.suse.com/1228766" source="BUGZILLA"/>
		<reference ref_id="1228779" ref_url="https://bugzilla.suse.com/1228779" source="BUGZILLA"/>
		<reference ref_id="1228801" ref_url="https://bugzilla.suse.com/1228801" source="BUGZILLA"/>
		<reference ref_id="1228850" ref_url="https://bugzilla.suse.com/1228850" source="BUGZILLA"/>
		<reference ref_id="1228857" ref_url="https://bugzilla.suse.com/1228857" source="BUGZILLA"/>
		<reference ref_id="1228959" ref_url="https://bugzilla.suse.com/1228959" source="BUGZILLA"/>
		<reference ref_id="1228964" ref_url="https://bugzilla.suse.com/1228964" source="BUGZILLA"/>
		<reference ref_id="1228966" ref_url="https://bugzilla.suse.com/1228966" source="BUGZILLA"/>
		<reference ref_id="1228967" ref_url="https://bugzilla.suse.com/1228967" source="BUGZILLA"/>
		<reference ref_id="1228979" ref_url="https://bugzilla.suse.com/1228979" source="BUGZILLA"/>
		<reference ref_id="1228988" ref_url="https://bugzilla.suse.com/1228988" source="BUGZILLA"/>
		<reference ref_id="1228989" ref_url="https://bugzilla.suse.com/1228989" source="BUGZILLA"/>
		<reference ref_id="1228991" ref_url="https://bugzilla.suse.com/1228991" source="BUGZILLA"/>
		<reference ref_id="1228992" ref_url="https://bugzilla.suse.com/1228992" source="BUGZILLA"/>
		<reference ref_id="1229042" ref_url="https://bugzilla.suse.com/1229042" source="BUGZILLA"/>
		<reference ref_id="1229054" ref_url="https://bugzilla.suse.com/1229054" source="BUGZILLA"/>
		<reference ref_id="1229086" ref_url="https://bugzilla.suse.com/1229086" source="BUGZILLA"/>
		<reference ref_id="1229136" ref_url="https://bugzilla.suse.com/1229136" source="BUGZILLA"/>
		<reference ref_id="1229154" ref_url="https://bugzilla.suse.com/1229154" source="BUGZILLA"/>
		<reference ref_id="1229187" ref_url="https://bugzilla.suse.com/1229187" source="BUGZILLA"/>
		<reference ref_id="1229188" ref_url="https://bugzilla.suse.com/1229188" source="BUGZILLA"/>
		<reference ref_id="1229190" ref_url="https://bugzilla.suse.com/1229190" source="BUGZILLA"/>
		<reference ref_id="1229287" ref_url="https://bugzilla.suse.com/1229287" source="BUGZILLA"/>
		<reference ref_id="1229290" ref_url="https://bugzilla.suse.com/1229290" source="BUGZILLA"/>
		<reference ref_id="1229292" ref_url="https://bugzilla.suse.com/1229292" source="BUGZILLA"/>
		<reference ref_id="1229296" ref_url="https://bugzilla.suse.com/1229296" source="BUGZILLA"/>
		<reference ref_id="1229297" ref_url="https://bugzilla.suse.com/1229297" source="BUGZILLA"/>
		<reference ref_id="1229301" ref_url="https://bugzilla.suse.com/1229301" source="BUGZILLA"/>
		<reference ref_id="1229303" ref_url="https://bugzilla.suse.com/1229303" source="BUGZILLA"/>
		<reference ref_id="1229304" ref_url="https://bugzilla.suse.com/1229304" source="BUGZILLA"/>
		<reference ref_id="1229305" ref_url="https://bugzilla.suse.com/1229305" source="BUGZILLA"/>
		<reference ref_id="1229307" ref_url="https://bugzilla.suse.com/1229307" source="BUGZILLA"/>
		<reference ref_id="1229309" ref_url="https://bugzilla.suse.com/1229309" source="BUGZILLA"/>
		<reference ref_id="1229312" ref_url="https://bugzilla.suse.com/1229312" source="BUGZILLA"/>
		<reference ref_id="1229314" ref_url="https://bugzilla.suse.com/1229314" source="BUGZILLA"/>
		<reference ref_id="1229315" ref_url="https://bugzilla.suse.com/1229315" source="BUGZILLA"/>
		<reference ref_id="1229317" ref_url="https://bugzilla.suse.com/1229317" source="BUGZILLA"/>
		<reference ref_id="1229318" ref_url="https://bugzilla.suse.com/1229318" source="BUGZILLA"/>
		<reference ref_id="1229319" ref_url="https://bugzilla.suse.com/1229319" source="BUGZILLA"/>
		<reference ref_id="1229327" ref_url="https://bugzilla.suse.com/1229327" source="BUGZILLA"/>
		<reference ref_id="1229341" ref_url="https://bugzilla.suse.com/1229341" source="BUGZILLA"/>
		<reference ref_id="1229345" ref_url="https://bugzilla.suse.com/1229345" source="BUGZILLA"/>
		<reference ref_id="1229346" ref_url="https://bugzilla.suse.com/1229346" source="BUGZILLA"/>
		<reference ref_id="1229347" ref_url="https://bugzilla.suse.com/1229347" source="BUGZILLA"/>
		<reference ref_id="1229349" ref_url="https://bugzilla.suse.com/1229349" source="BUGZILLA"/>
		<reference ref_id="1229350" ref_url="https://bugzilla.suse.com/1229350" source="BUGZILLA"/>
		<reference ref_id="1229351" ref_url="https://bugzilla.suse.com/1229351" source="BUGZILLA"/>
		<reference ref_id="1229354" ref_url="https://bugzilla.suse.com/1229354" source="BUGZILLA"/>
		<reference ref_id="1229356" ref_url="https://bugzilla.suse.com/1229356" source="BUGZILLA"/>
		<reference ref_id="1229357" ref_url="https://bugzilla.suse.com/1229357" source="BUGZILLA"/>
		<reference ref_id="1229358" ref_url="https://bugzilla.suse.com/1229358" source="BUGZILLA"/>
		<reference ref_id="1229359" ref_url="https://bugzilla.suse.com/1229359" source="BUGZILLA"/>
		<reference ref_id="1229360" ref_url="https://bugzilla.suse.com/1229360" source="BUGZILLA"/>
		<reference ref_id="1229366" ref_url="https://bugzilla.suse.com/1229366" source="BUGZILLA"/>
		<reference ref_id="1229370" ref_url="https://bugzilla.suse.com/1229370" source="BUGZILLA"/>
		<reference ref_id="1229373" ref_url="https://bugzilla.suse.com/1229373" source="BUGZILLA"/>
		<reference ref_id="1229374" ref_url="https://bugzilla.suse.com/1229374" source="BUGZILLA"/>
		<reference ref_id="1229381" ref_url="https://bugzilla.suse.com/1229381" source="BUGZILLA"/>
		<reference ref_id="1229382" ref_url="https://bugzilla.suse.com/1229382" source="BUGZILLA"/>
		<reference ref_id="1229383" ref_url="https://bugzilla.suse.com/1229383" source="BUGZILLA"/>
		<reference ref_id="1229386" ref_url="https://bugzilla.suse.com/1229386" source="BUGZILLA"/>
		<reference ref_id="1229388" ref_url="https://bugzilla.suse.com/1229388" source="BUGZILLA"/>
		<reference ref_id="1229391" ref_url="https://bugzilla.suse.com/1229391" source="BUGZILLA"/>
		<reference ref_id="1229392" ref_url="https://bugzilla.suse.com/1229392" source="BUGZILLA"/>
		<reference ref_id="1229395" ref_url="https://bugzilla.suse.com/1229395" source="BUGZILLA"/>
		<reference ref_id="1229398" ref_url="https://bugzilla.suse.com/1229398" source="BUGZILLA"/>
		<reference ref_id="1229399" ref_url="https://bugzilla.suse.com/1229399" source="BUGZILLA"/>
		<reference ref_id="1229400" ref_url="https://bugzilla.suse.com/1229400" source="BUGZILLA"/>
		<reference ref_id="1229407" ref_url="https://bugzilla.suse.com/1229407" source="BUGZILLA"/>
		<reference ref_id="1229409" ref_url="https://bugzilla.suse.com/1229409" source="BUGZILLA"/>
		<reference ref_id="1229410" ref_url="https://bugzilla.suse.com/1229410" source="BUGZILLA"/>
		<reference ref_id="1229411" ref_url="https://bugzilla.suse.com/1229411" source="BUGZILLA"/>
		<reference ref_id="1229413" ref_url="https://bugzilla.suse.com/1229413" source="BUGZILLA"/>
		<reference ref_id="1229414" ref_url="https://bugzilla.suse.com/1229414" source="BUGZILLA"/>
		<reference ref_id="1229417" ref_url="https://bugzilla.suse.com/1229417" source="BUGZILLA"/>
		<reference ref_id="1229418" ref_url="https://bugzilla.suse.com/1229418" source="BUGZILLA"/>
		<reference ref_id="1229444" ref_url="https://bugzilla.suse.com/1229444" source="BUGZILLA"/>
		<reference ref_id="1229453" ref_url="https://bugzilla.suse.com/1229453" source="BUGZILLA"/>
		<reference ref_id="1229454" ref_url="https://bugzilla.suse.com/1229454" source="BUGZILLA"/>
		<reference ref_id="1229481" ref_url="https://bugzilla.suse.com/1229481" source="BUGZILLA"/>
		<reference ref_id="1229482" ref_url="https://bugzilla.suse.com/1229482" source="BUGZILLA"/>
		<reference ref_id="1229488" ref_url="https://bugzilla.suse.com/1229488" source="BUGZILLA"/>
		<reference ref_id="1229489" ref_url="https://bugzilla.suse.com/1229489" source="BUGZILLA"/>
		<reference ref_id="1229490" ref_url="https://bugzilla.suse.com/1229490" source="BUGZILLA"/>
		<reference ref_id="1229493" ref_url="https://bugzilla.suse.com/1229493" source="BUGZILLA"/>
		<reference ref_id="1229495" ref_url="https://bugzilla.suse.com/1229495" source="BUGZILLA"/>
		<reference ref_id="1229497" ref_url="https://bugzilla.suse.com/1229497" source="BUGZILLA"/>
		<reference ref_id="1229500" ref_url="https://bugzilla.suse.com/1229500" source="BUGZILLA"/>
		<reference ref_id="1229503" ref_url="https://bugzilla.suse.com/1229503" source="BUGZILLA"/>
		<reference ref_id="1229506" ref_url="https://bugzilla.suse.com/1229506" source="BUGZILLA"/>
		<reference ref_id="1229507" ref_url="https://bugzilla.suse.com/1229507" source="BUGZILLA"/>
		<reference ref_id="1229508" ref_url="https://bugzilla.suse.com/1229508" source="BUGZILLA"/>
		<reference ref_id="1229509" ref_url="https://bugzilla.suse.com/1229509" source="BUGZILLA"/>
		<reference ref_id="1229510" ref_url="https://bugzilla.suse.com/1229510" source="BUGZILLA"/>
		<reference ref_id="1229512" ref_url="https://bugzilla.suse.com/1229512" source="BUGZILLA"/>
		<reference ref_id="1229516" ref_url="https://bugzilla.suse.com/1229516" source="BUGZILLA"/>
		<reference ref_id="1229521" ref_url="https://bugzilla.suse.com/1229521" source="BUGZILLA"/>
		<reference ref_id="1229522" ref_url="https://bugzilla.suse.com/1229522" source="BUGZILLA"/>
		<reference ref_id="1229523" ref_url="https://bugzilla.suse.com/1229523" source="BUGZILLA"/>
		<reference ref_id="1229524" ref_url="https://bugzilla.suse.com/1229524" source="BUGZILLA"/>
		<reference ref_id="1229525" ref_url="https://bugzilla.suse.com/1229525" source="BUGZILLA"/>
		<reference ref_id="1229526" ref_url="https://bugzilla.suse.com/1229526" source="BUGZILLA"/>
		<reference ref_id="1229527" ref_url="https://bugzilla.suse.com/1229527" source="BUGZILLA"/>
		<reference ref_id="1229528" ref_url="https://bugzilla.suse.com/1229528" source="BUGZILLA"/>
		<reference ref_id="1229529" ref_url="https://bugzilla.suse.com/1229529" source="BUGZILLA"/>
		<reference ref_id="1229531" ref_url="https://bugzilla.suse.com/1229531" source="BUGZILLA"/>
		<reference ref_id="1229533" ref_url="https://bugzilla.suse.com/1229533" source="BUGZILLA"/>
		<reference ref_id="1229535" ref_url="https://bugzilla.suse.com/1229535" source="BUGZILLA"/>
		<reference ref_id="1229536" ref_url="https://bugzilla.suse.com/1229536" source="BUGZILLA"/>
		<reference ref_id="1229537" ref_url="https://bugzilla.suse.com/1229537" source="BUGZILLA"/>
		<reference ref_id="1229540" ref_url="https://bugzilla.suse.com/1229540" source="BUGZILLA"/>
		<reference ref_id="1229544" ref_url="https://bugzilla.suse.com/1229544" source="BUGZILLA"/>
		<reference ref_id="1229545" ref_url="https://bugzilla.suse.com/1229545" source="BUGZILLA"/>
		<reference ref_id="1229546" ref_url="https://bugzilla.suse.com/1229546" source="BUGZILLA"/>
		<reference ref_id="1229547" ref_url="https://bugzilla.suse.com/1229547" source="BUGZILLA"/>
		<reference ref_id="1229548" ref_url="https://bugzilla.suse.com/1229548" source="BUGZILLA"/>
		<reference ref_id="1229554" ref_url="https://bugzilla.suse.com/1229554" source="BUGZILLA"/>
		<reference ref_id="1229557" ref_url="https://bugzilla.suse.com/1229557" source="BUGZILLA"/>
		<reference ref_id="1229558" ref_url="https://bugzilla.suse.com/1229558" source="BUGZILLA"/>
		<reference ref_id="1229559" ref_url="https://bugzilla.suse.com/1229559" source="BUGZILLA"/>
		<reference ref_id="1229560" ref_url="https://bugzilla.suse.com/1229560" source="BUGZILLA"/>
		<reference ref_id="1229562" ref_url="https://bugzilla.suse.com/1229562" source="BUGZILLA"/>
		<reference ref_id="1229564" ref_url="https://bugzilla.suse.com/1229564" source="BUGZILLA"/>
		<reference ref_id="1229565" ref_url="https://bugzilla.suse.com/1229565" source="BUGZILLA"/>
		<reference ref_id="1229566" ref_url="https://bugzilla.suse.com/1229566" source="BUGZILLA"/>
		<reference ref_id="1229568" ref_url="https://bugzilla.suse.com/1229568" source="BUGZILLA"/>
		<reference ref_id="1229569" ref_url="https://bugzilla.suse.com/1229569" source="BUGZILLA"/>
		<reference ref_id="1229572" ref_url="https://bugzilla.suse.com/1229572" source="BUGZILLA"/>
		<reference ref_id="1229573" ref_url="https://bugzilla.suse.com/1229573" source="BUGZILLA"/>
		<reference ref_id="1229576" ref_url="https://bugzilla.suse.com/1229576" source="BUGZILLA"/>
		<reference ref_id="1229581" ref_url="https://bugzilla.suse.com/1229581" source="BUGZILLA"/>
		<reference ref_id="1229588" ref_url="https://bugzilla.suse.com/1229588" source="BUGZILLA"/>
		<reference ref_id="1229598" ref_url="https://bugzilla.suse.com/1229598" source="BUGZILLA"/>
		<reference ref_id="1229603" ref_url="https://bugzilla.suse.com/1229603" source="BUGZILLA"/>
		<reference ref_id="1229604" ref_url="https://bugzilla.suse.com/1229604" source="BUGZILLA"/>
		<reference ref_id="1229605" ref_url="https://bugzilla.suse.com/1229605" source="BUGZILLA"/>
		<reference ref_id="1229608" ref_url="https://bugzilla.suse.com/1229608" source="BUGZILLA"/>
		<reference ref_id="1229611" ref_url="https://bugzilla.suse.com/1229611" source="BUGZILLA"/>
		<reference ref_id="1229612" ref_url="https://bugzilla.suse.com/1229612" source="BUGZILLA"/>
		<reference ref_id="1229613" ref_url="https://bugzilla.suse.com/1229613" source="BUGZILLA"/>
		<reference ref_id="1229614" ref_url="https://bugzilla.suse.com/1229614" source="BUGZILLA"/>
		<reference ref_id="1229615" ref_url="https://bugzilla.suse.com/1229615" source="BUGZILLA"/>
		<reference ref_id="1229616" ref_url="https://bugzilla.suse.com/1229616" source="BUGZILLA"/>
		<reference ref_id="1229617" ref_url="https://bugzilla.suse.com/1229617" source="BUGZILLA"/>
		<reference ref_id="1229620" ref_url="https://bugzilla.suse.com/1229620" source="BUGZILLA"/>
		<reference ref_id="1229622" ref_url="https://bugzilla.suse.com/1229622" source="BUGZILLA"/>
		<reference ref_id="1229623" ref_url="https://bugzilla.suse.com/1229623" source="BUGZILLA"/>
		<reference ref_id="1229624" ref_url="https://bugzilla.suse.com/1229624" source="BUGZILLA"/>
		<reference ref_id="1229625" ref_url="https://bugzilla.suse.com/1229625" source="BUGZILLA"/>
		<reference ref_id="1229626" ref_url="https://bugzilla.suse.com/1229626" source="BUGZILLA"/>
		<reference ref_id="1229628" ref_url="https://bugzilla.suse.com/1229628" source="BUGZILLA"/>
		<reference ref_id="1229629" ref_url="https://bugzilla.suse.com/1229629" source="BUGZILLA"/>
		<reference ref_id="1229630" ref_url="https://bugzilla.suse.com/1229630" source="BUGZILLA"/>
		<reference ref_id="1229631" ref_url="https://bugzilla.suse.com/1229631" source="BUGZILLA"/>
		<reference ref_id="1229632" ref_url="https://bugzilla.suse.com/1229632" source="BUGZILLA"/>
		<reference ref_id="1229635" ref_url="https://bugzilla.suse.com/1229635" source="BUGZILLA"/>
		<reference ref_id="1229636" ref_url="https://bugzilla.suse.com/1229636" source="BUGZILLA"/>
		<reference ref_id="1229637" ref_url="https://bugzilla.suse.com/1229637" source="BUGZILLA"/>
		<reference ref_id="1229638" ref_url="https://bugzilla.suse.com/1229638" source="BUGZILLA"/>
		<reference ref_id="1229639" ref_url="https://bugzilla.suse.com/1229639" source="BUGZILLA"/>
		<reference ref_id="1229641" ref_url="https://bugzilla.suse.com/1229641" source="BUGZILLA"/>
		<reference ref_id="1229642" ref_url="https://bugzilla.suse.com/1229642" source="BUGZILLA"/>
		<reference ref_id="1229643" ref_url="https://bugzilla.suse.com/1229643" source="BUGZILLA"/>
		<reference ref_id="1229645" ref_url="https://bugzilla.suse.com/1229645" source="BUGZILLA"/>
		<reference ref_id="1229657" ref_url="https://bugzilla.suse.com/1229657" source="BUGZILLA"/>
		<reference ref_id="1229658" ref_url="https://bugzilla.suse.com/1229658" source="BUGZILLA"/>
		<reference ref_id="1229662" ref_url="https://bugzilla.suse.com/1229662" source="BUGZILLA"/>
		<reference ref_id="1229664" ref_url="https://bugzilla.suse.com/1229664" source="BUGZILLA"/>
		<reference ref_id="1229707" ref_url="https://bugzilla.suse.com/1229707" source="BUGZILLA"/>
		<reference ref_id="1229739" ref_url="https://bugzilla.suse.com/1229739" source="BUGZILLA"/>
		<reference ref_id="1229743" ref_url="https://bugzilla.suse.com/1229743" source="BUGZILLA"/>
		<reference ref_id="1229746" ref_url="https://bugzilla.suse.com/1229746" source="BUGZILLA"/>
		<reference ref_id="1229754" ref_url="https://bugzilla.suse.com/1229754" source="BUGZILLA"/>
		<reference ref_id="1229755" ref_url="https://bugzilla.suse.com/1229755" source="BUGZILLA"/>
		<reference ref_id="1229756" ref_url="https://bugzilla.suse.com/1229756" source="BUGZILLA"/>
		<reference ref_id="1229759" ref_url="https://bugzilla.suse.com/1229759" source="BUGZILLA"/>
		<reference ref_id="1229761" ref_url="https://bugzilla.suse.com/1229761" source="BUGZILLA"/>
		<reference ref_id="1229767" ref_url="https://bugzilla.suse.com/1229767" source="BUGZILLA"/>
		<reference ref_id="1229768" ref_url="https://bugzilla.suse.com/1229768" source="BUGZILLA"/>
		<reference ref_id="1229781" ref_url="https://bugzilla.suse.com/1229781" source="BUGZILLA"/>
		<reference ref_id="1229784" ref_url="https://bugzilla.suse.com/1229784" source="BUGZILLA"/>
		<reference ref_id="1229787" ref_url="https://bugzilla.suse.com/1229787" source="BUGZILLA"/>
		<reference ref_id="1229788" ref_url="https://bugzilla.suse.com/1229788" source="BUGZILLA"/>
		<reference ref_id="1229789" ref_url="https://bugzilla.suse.com/1229789" source="BUGZILLA"/>
		<reference ref_id="1229792" ref_url="https://bugzilla.suse.com/1229792" source="BUGZILLA"/>
		<reference ref_id="1229820" ref_url="https://bugzilla.suse.com/1229820" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4441" ref_url="https://www.suse.com/security/cve/CVE-2021-4441/" source="CVE"/>
		<reference ref_id="CVE-2021-47106" ref_url="https://www.suse.com/security/cve/CVE-2021-47106/" source="CVE"/>
		<reference ref_id="CVE-2021-47517" ref_url="https://www.suse.com/security/cve/CVE-2021-47517/" source="CVE"/>
		<reference ref_id="CVE-2021-47546" ref_url="https://www.suse.com/security/cve/CVE-2021-47546/" source="CVE"/>
		<reference ref_id="CVE-2022-38457" ref_url="https://www.suse.com/security/cve/CVE-2022-38457/" source="CVE"/>
		<reference ref_id="CVE-2022-40133" ref_url="https://www.suse.com/security/cve/CVE-2022-40133/" source="CVE"/>
		<reference ref_id="CVE-2022-48645" ref_url="https://www.suse.com/security/cve/CVE-2022-48645/" source="CVE"/>
		<reference ref_id="CVE-2022-48706" ref_url="https://www.suse.com/security/cve/CVE-2022-48706/" source="CVE"/>
		<reference ref_id="CVE-2022-48808" ref_url="https://www.suse.com/security/cve/CVE-2022-48808/" source="CVE"/>
		<reference ref_id="CVE-2022-48865" ref_url="https://www.suse.com/security/cve/CVE-2022-48865/" source="CVE"/>
		<reference ref_id="CVE-2022-48868" ref_url="https://www.suse.com/security/cve/CVE-2022-48868/" source="CVE"/>
		<reference ref_id="CVE-2022-48869" ref_url="https://www.suse.com/security/cve/CVE-2022-48869/" source="CVE"/>
		<reference ref_id="CVE-2022-48870" ref_url="https://www.suse.com/security/cve/CVE-2022-48870/" source="CVE"/>
		<reference ref_id="CVE-2022-48871" ref_url="https://www.suse.com/security/cve/CVE-2022-48871/" source="CVE"/>
		<reference ref_id="CVE-2022-48872" ref_url="https://www.suse.com/security/cve/CVE-2022-48872/" source="CVE"/>
		<reference ref_id="CVE-2022-48873" ref_url="https://www.suse.com/security/cve/CVE-2022-48873/" source="CVE"/>
		<reference ref_id="CVE-2022-48875" ref_url="https://www.suse.com/security/cve/CVE-2022-48875/" source="CVE"/>
		<reference ref_id="CVE-2022-48878" ref_url="https://www.suse.com/security/cve/CVE-2022-48878/" source="CVE"/>
		<reference ref_id="CVE-2022-48880" ref_url="https://www.suse.com/security/cve/CVE-2022-48880/" source="CVE"/>
		<reference ref_id="CVE-2022-48881" ref_url="https://www.suse.com/security/cve/CVE-2022-48881/" source="CVE"/>
		<reference ref_id="CVE-2022-48882" ref_url="https://www.suse.com/security/cve/CVE-2022-48882/" source="CVE"/>
		<reference ref_id="CVE-2022-48883" ref_url="https://www.suse.com/security/cve/CVE-2022-48883/" source="CVE"/>
		<reference ref_id="CVE-2022-48884" ref_url="https://www.suse.com/security/cve/CVE-2022-48884/" source="CVE"/>
		<reference ref_id="CVE-2022-48885" ref_url="https://www.suse.com/security/cve/CVE-2022-48885/" source="CVE"/>
		<reference ref_id="CVE-2022-48886" ref_url="https://www.suse.com/security/cve/CVE-2022-48886/" source="CVE"/>
		<reference ref_id="CVE-2022-48887" ref_url="https://www.suse.com/security/cve/CVE-2022-48887/" source="CVE"/>
		<reference ref_id="CVE-2022-48888" ref_url="https://www.suse.com/security/cve/CVE-2022-48888/" source="CVE"/>
		<reference ref_id="CVE-2022-48889" ref_url="https://www.suse.com/security/cve/CVE-2022-48889/" source="CVE"/>
		<reference ref_id="CVE-2022-48890" ref_url="https://www.suse.com/security/cve/CVE-2022-48890/" source="CVE"/>
		<reference ref_id="CVE-2022-48891" ref_url="https://www.suse.com/security/cve/CVE-2022-48891/" source="CVE"/>
		<reference ref_id="CVE-2022-48893" ref_url="https://www.suse.com/security/cve/CVE-2022-48893/" source="CVE"/>
		<reference ref_id="CVE-2022-48896" ref_url="https://www.suse.com/security/cve/CVE-2022-48896/" source="CVE"/>
		<reference ref_id="CVE-2022-48898" ref_url="https://www.suse.com/security/cve/CVE-2022-48898/" source="CVE"/>
		<reference ref_id="CVE-2022-48899" ref_url="https://www.suse.com/security/cve/CVE-2022-48899/" source="CVE"/>
		<reference ref_id="CVE-2022-48903" ref_url="https://www.suse.com/security/cve/CVE-2022-48903/" source="CVE"/>
		<reference ref_id="CVE-2022-48904" ref_url="https://www.suse.com/security/cve/CVE-2022-48904/" source="CVE"/>
		<reference ref_id="CVE-2022-48905" ref_url="https://www.suse.com/security/cve/CVE-2022-48905/" source="CVE"/>
		<reference ref_id="CVE-2022-48906" ref_url="https://www.suse.com/security/cve/CVE-2022-48906/" source="CVE"/>
		<reference ref_id="CVE-2022-48907" ref_url="https://www.suse.com/security/cve/CVE-2022-48907/" source="CVE"/>
		<reference ref_id="CVE-2022-48909" ref_url="https://www.suse.com/security/cve/CVE-2022-48909/" source="CVE"/>
		<reference ref_id="CVE-2022-48910" ref_url="https://www.suse.com/security/cve/CVE-2022-48910/" source="CVE"/>
		<reference ref_id="CVE-2022-48912" ref_url="https://www.suse.com/security/cve/CVE-2022-48912/" source="CVE"/>
		<reference ref_id="CVE-2022-48913" ref_url="https://www.suse.com/security/cve/CVE-2022-48913/" source="CVE"/>
		<reference ref_id="CVE-2022-48914" ref_url="https://www.suse.com/security/cve/CVE-2022-48914/" source="CVE"/>
		<reference ref_id="CVE-2022-48915" ref_url="https://www.suse.com/security/cve/CVE-2022-48915/" source="CVE"/>
		<reference ref_id="CVE-2022-48916" ref_url="https://www.suse.com/security/cve/CVE-2022-48916/" source="CVE"/>
		<reference ref_id="CVE-2022-48917" ref_url="https://www.suse.com/security/cve/CVE-2022-48917/" source="CVE"/>
		<reference ref_id="CVE-2022-48918" ref_url="https://www.suse.com/security/cve/CVE-2022-48918/" source="CVE"/>
		<reference ref_id="CVE-2022-48919" ref_url="https://www.suse.com/security/cve/CVE-2022-48919/" source="CVE"/>
		<reference ref_id="CVE-2022-48920" ref_url="https://www.suse.com/security/cve/CVE-2022-48920/" source="CVE"/>
		<reference ref_id="CVE-2022-48921" ref_url="https://www.suse.com/security/cve/CVE-2022-48921/" source="CVE"/>
		<reference ref_id="CVE-2022-48923" ref_url="https://www.suse.com/security/cve/CVE-2022-48923/" source="CVE"/>
		<reference ref_id="CVE-2022-48924" ref_url="https://www.suse.com/security/cve/CVE-2022-48924/" source="CVE"/>
		<reference ref_id="CVE-2022-48925" ref_url="https://www.suse.com/security/cve/CVE-2022-48925/" source="CVE"/>
		<reference ref_id="CVE-2022-48926" ref_url="https://www.suse.com/security/cve/CVE-2022-48926/" source="CVE"/>
		<reference ref_id="CVE-2022-48927" ref_url="https://www.suse.com/security/cve/CVE-2022-48927/" source="CVE"/>
		<reference ref_id="CVE-2022-48928" ref_url="https://www.suse.com/security/cve/CVE-2022-48928/" source="CVE"/>
		<reference ref_id="CVE-2022-48929" ref_url="https://www.suse.com/security/cve/CVE-2022-48929/" source="CVE"/>
		<reference ref_id="CVE-2022-48930" ref_url="https://www.suse.com/security/cve/CVE-2022-48930/" source="CVE"/>
		<reference ref_id="CVE-2022-48931" ref_url="https://www.suse.com/security/cve/CVE-2022-48931/" source="CVE"/>
		<reference ref_id="CVE-2022-48932" ref_url="https://www.suse.com/security/cve/CVE-2022-48932/" source="CVE"/>
		<reference ref_id="CVE-2022-48934" ref_url="https://www.suse.com/security/cve/CVE-2022-48934/" source="CVE"/>
		<reference ref_id="CVE-2022-48937" ref_url="https://www.suse.com/security/cve/CVE-2022-48937/" source="CVE"/>
		<reference ref_id="CVE-2022-48938" ref_url="https://www.suse.com/security/cve/CVE-2022-48938/" source="CVE"/>
		<reference ref_id="CVE-2022-48939" ref_url="https://www.suse.com/security/cve/CVE-2022-48939/" source="CVE"/>
		<reference ref_id="CVE-2022-48940" ref_url="https://www.suse.com/security/cve/CVE-2022-48940/" source="CVE"/>
		<reference ref_id="CVE-2022-48941" ref_url="https://www.suse.com/security/cve/CVE-2022-48941/" source="CVE"/>
		<reference ref_id="CVE-2022-48942" ref_url="https://www.suse.com/security/cve/CVE-2022-48942/" source="CVE"/>
		<reference ref_id="CVE-2022-48943" ref_url="https://www.suse.com/security/cve/CVE-2022-48943/" source="CVE"/>
		<reference ref_id="CVE-2023-3610" ref_url="https://www.suse.com/security/cve/CVE-2023-3610/" source="CVE"/>
		<reference ref_id="CVE-2023-52458" ref_url="https://www.suse.com/security/cve/CVE-2023-52458/" source="CVE"/>
		<reference ref_id="CVE-2023-52489" ref_url="https://www.suse.com/security/cve/CVE-2023-52489/" source="CVE"/>
		<reference ref_id="CVE-2023-52498" ref_url="https://www.suse.com/security/cve/CVE-2023-52498/" source="CVE"/>
		<reference ref_id="CVE-2023-52581" ref_url="https://www.suse.com/security/cve/CVE-2023-52581/" source="CVE"/>
		<reference ref_id="CVE-2023-52859" ref_url="https://www.suse.com/security/cve/CVE-2023-52859/" source="CVE"/>
		<reference ref_id="CVE-2023-52887" ref_url="https://www.suse.com/security/cve/CVE-2023-52887/" source="CVE"/>
		<reference ref_id="CVE-2023-52889" ref_url="https://www.suse.com/security/cve/CVE-2023-52889/" source="CVE"/>
		<reference ref_id="CVE-2023-52893" ref_url="https://www.suse.com/security/cve/CVE-2023-52893/" source="CVE"/>
		<reference ref_id="CVE-2023-52894" ref_url="https://www.suse.com/security/cve/CVE-2023-52894/" source="CVE"/>
		<reference ref_id="CVE-2023-52896" ref_url="https://www.suse.com/security/cve/CVE-2023-52896/" source="CVE"/>
		<reference ref_id="CVE-2023-52898" ref_url="https://www.suse.com/security/cve/CVE-2023-52898/" source="CVE"/>
		<reference ref_id="CVE-2023-52899" ref_url="https://www.suse.com/security/cve/CVE-2023-52899/" source="CVE"/>
		<reference ref_id="CVE-2023-52900" ref_url="https://www.suse.com/security/cve/CVE-2023-52900/" source="CVE"/>
		<reference ref_id="CVE-2023-52901" ref_url="https://www.suse.com/security/cve/CVE-2023-52901/" source="CVE"/>
		<reference ref_id="CVE-2023-52904" ref_url="https://www.suse.com/security/cve/CVE-2023-52904/" source="CVE"/>
		<reference ref_id="CVE-2023-52905" ref_url="https://www.suse.com/security/cve/CVE-2023-52905/" source="CVE"/>
		<reference ref_id="CVE-2023-52906" ref_url="https://www.suse.com/security/cve/CVE-2023-52906/" source="CVE"/>
		<reference ref_id="CVE-2023-52907" ref_url="https://www.suse.com/security/cve/CVE-2023-52907/" source="CVE"/>
		<reference ref_id="CVE-2023-52908" ref_url="https://www.suse.com/security/cve/CVE-2023-52908/" source="CVE"/>
		<reference ref_id="CVE-2023-52909" ref_url="https://www.suse.com/security/cve/CVE-2023-52909/" source="CVE"/>
		<reference ref_id="CVE-2023-52910" ref_url="https://www.suse.com/security/cve/CVE-2023-52910/" source="CVE"/>
		<reference ref_id="CVE-2023-52911" ref_url="https://www.suse.com/security/cve/CVE-2023-52911/" source="CVE"/>
		<reference ref_id="CVE-2023-52912" ref_url="https://www.suse.com/security/cve/CVE-2023-52912/" source="CVE"/>
		<reference ref_id="CVE-2023-52913" ref_url="https://www.suse.com/security/cve/CVE-2023-52913/" source="CVE"/>
		<reference ref_id="CVE-2024-26631" ref_url="https://www.suse.com/security/cve/CVE-2024-26631/" source="CVE"/>
		<reference ref_id="CVE-2024-26668" ref_url="https://www.suse.com/security/cve/CVE-2024-26668/" source="CVE"/>
		<reference ref_id="CVE-2024-26669" ref_url="https://www.suse.com/security/cve/CVE-2024-26669/" source="CVE"/>
		<reference ref_id="CVE-2024-26677" ref_url="https://www.suse.com/security/cve/CVE-2024-26677/" source="CVE"/>
		<reference ref_id="CVE-2024-26735" ref_url="https://www.suse.com/security/cve/CVE-2024-26735/" source="CVE"/>
		<reference ref_id="CVE-2024-26808" ref_url="https://www.suse.com/security/cve/CVE-2024-26808/" source="CVE"/>
		<reference ref_id="CVE-2024-26812" ref_url="https://www.suse.com/security/cve/CVE-2024-26812/" source="CVE"/>
		<reference ref_id="CVE-2024-26835" ref_url="https://www.suse.com/security/cve/CVE-2024-26835/" source="CVE"/>
		<reference ref_id="CVE-2024-26851" ref_url="https://www.suse.com/security/cve/CVE-2024-26851/" source="CVE"/>
		<reference ref_id="CVE-2024-27010" ref_url="https://www.suse.com/security/cve/CVE-2024-27010/" source="CVE"/>
		<reference ref_id="CVE-2024-27011" ref_url="https://www.suse.com/security/cve/CVE-2024-27011/" source="CVE"/>
		<reference ref_id="CVE-2024-27016" ref_url="https://www.suse.com/security/cve/CVE-2024-27016/" source="CVE"/>
		<reference ref_id="CVE-2024-27024" ref_url="https://www.suse.com/security/cve/CVE-2024-27024/" source="CVE"/>
		<reference ref_id="CVE-2024-27079" ref_url="https://www.suse.com/security/cve/CVE-2024-27079/" source="CVE"/>
		<reference ref_id="CVE-2024-27403" ref_url="https://www.suse.com/security/cve/CVE-2024-27403/" source="CVE"/>
		<reference ref_id="CVE-2024-31076" ref_url="https://www.suse.com/security/cve/CVE-2024-31076/" source="CVE"/>
		<reference ref_id="CVE-2024-35897" ref_url="https://www.suse.com/security/cve/CVE-2024-35897/" source="CVE"/>
		<reference ref_id="CVE-2024-35902" ref_url="https://www.suse.com/security/cve/CVE-2024-35902/" source="CVE"/>
		<reference ref_id="CVE-2024-35945" ref_url="https://www.suse.com/security/cve/CVE-2024-35945/" source="CVE"/>
		<reference ref_id="CVE-2024-35971" ref_url="https://www.suse.com/security/cve/CVE-2024-35971/" source="CVE"/>
		<reference ref_id="CVE-2024-36009" ref_url="https://www.suse.com/security/cve/CVE-2024-36009/" source="CVE"/>
		<reference ref_id="CVE-2024-36013" ref_url="https://www.suse.com/security/cve/CVE-2024-36013/" source="CVE"/>
		<reference ref_id="CVE-2024-36270" ref_url="https://www.suse.com/security/cve/CVE-2024-36270/" source="CVE"/>
		<reference ref_id="CVE-2024-36286" ref_url="https://www.suse.com/security/cve/CVE-2024-36286/" source="CVE"/>
		<reference ref_id="CVE-2024-36489" ref_url="https://www.suse.com/security/cve/CVE-2024-36489/" source="CVE"/>
		<reference ref_id="CVE-2024-36929" ref_url="https://www.suse.com/security/cve/CVE-2024-36929/" source="CVE"/>
		<reference ref_id="CVE-2024-36933" ref_url="https://www.suse.com/security/cve/CVE-2024-36933/" source="CVE"/>
		<reference ref_id="CVE-2024-36936" ref_url="https://www.suse.com/security/cve/CVE-2024-36936/" source="CVE"/>
		<reference ref_id="CVE-2024-36962" ref_url="https://www.suse.com/security/cve/CVE-2024-36962/" source="CVE"/>
		<reference ref_id="CVE-2024-38554" ref_url="https://www.suse.com/security/cve/CVE-2024-38554/" source="CVE"/>
		<reference ref_id="CVE-2024-38602" ref_url="https://www.suse.com/security/cve/CVE-2024-38602/" source="CVE"/>
		<reference ref_id="CVE-2024-38662" ref_url="https://www.suse.com/security/cve/CVE-2024-38662/" source="CVE"/>
		<reference ref_id="CVE-2024-39489" ref_url="https://www.suse.com/security/cve/CVE-2024-39489/" source="CVE"/>
		<reference ref_id="CVE-2024-40905" ref_url="https://www.suse.com/security/cve/CVE-2024-40905/" source="CVE"/>
		<reference ref_id="CVE-2024-40978" ref_url="https://www.suse.com/security/cve/CVE-2024-40978/" source="CVE"/>
		<reference ref_id="CVE-2024-40980" ref_url="https://www.suse.com/security/cve/CVE-2024-40980/" source="CVE"/>
		<reference ref_id="CVE-2024-40995" ref_url="https://www.suse.com/security/cve/CVE-2024-40995/" source="CVE"/>
		<reference ref_id="CVE-2024-41000" ref_url="https://www.suse.com/security/cve/CVE-2024-41000/" source="CVE"/>
		<reference ref_id="CVE-2024-41007" ref_url="https://www.suse.com/security/cve/CVE-2024-41007/" source="CVE"/>
		<reference ref_id="CVE-2024-41009" ref_url="https://www.suse.com/security/cve/CVE-2024-41009/" source="CVE"/>
		<reference ref_id="CVE-2024-41011" ref_url="https://www.suse.com/security/cve/CVE-2024-41011/" source="CVE"/>
		<reference ref_id="CVE-2024-41016" ref_url="https://www.suse.com/security/cve/CVE-2024-41016/" source="CVE"/>
		<reference ref_id="CVE-2024-41020" ref_url="https://www.suse.com/security/cve/CVE-2024-41020/" source="CVE"/>
		<reference ref_id="CVE-2024-41022" ref_url="https://www.suse.com/security/cve/CVE-2024-41022/" source="CVE"/>
		<reference ref_id="CVE-2024-41035" ref_url="https://www.suse.com/security/cve/CVE-2024-41035/" source="CVE"/>
		<reference ref_id="CVE-2024-41036" ref_url="https://www.suse.com/security/cve/CVE-2024-41036/" source="CVE"/>
		<reference ref_id="CVE-2024-41038" ref_url="https://www.suse.com/security/cve/CVE-2024-41038/" source="CVE"/>
		<reference ref_id="CVE-2024-41039" ref_url="https://www.suse.com/security/cve/CVE-2024-41039/" source="CVE"/>
		<reference ref_id="CVE-2024-41042" ref_url="https://www.suse.com/security/cve/CVE-2024-41042/" source="CVE"/>
		<reference ref_id="CVE-2024-41045" ref_url="https://www.suse.com/security/cve/CVE-2024-41045/" source="CVE"/>
		<reference ref_id="CVE-2024-41056" ref_url="https://www.suse.com/security/cve/CVE-2024-41056/" source="CVE"/>
		<reference ref_id="CVE-2024-41060" ref_url="https://www.suse.com/security/cve/CVE-2024-41060/" source="CVE"/>
		<reference ref_id="CVE-2024-41062" ref_url="https://www.suse.com/security/cve/CVE-2024-41062/" source="CVE"/>
		<reference ref_id="CVE-2024-41065" ref_url="https://www.suse.com/security/cve/CVE-2024-41065/" source="CVE"/>
		<reference ref_id="CVE-2024-41068" ref_url="https://www.suse.com/security/cve/CVE-2024-41068/" source="CVE"/>
		<reference ref_id="CVE-2024-41073" ref_url="https://www.suse.com/security/cve/CVE-2024-41073/" source="CVE"/>
		<reference ref_id="CVE-2024-41079" ref_url="https://www.suse.com/security/cve/CVE-2024-41079/" source="CVE"/>
		<reference ref_id="CVE-2024-41080" ref_url="https://www.suse.com/security/cve/CVE-2024-41080/" source="CVE"/>
		<reference ref_id="CVE-2024-41087" ref_url="https://www.suse.com/security/cve/CVE-2024-41087/" source="CVE"/>
		<reference ref_id="CVE-2024-41088" ref_url="https://www.suse.com/security/cve/CVE-2024-41088/" source="CVE"/>
		<reference ref_id="CVE-2024-41089" ref_url="https://www.suse.com/security/cve/CVE-2024-41089/" source="CVE"/>
		<reference ref_id="CVE-2024-41092" ref_url="https://www.suse.com/security/cve/CVE-2024-41092/" source="CVE"/>
		<reference ref_id="CVE-2024-41093" ref_url="https://www.suse.com/security/cve/CVE-2024-41093/" source="CVE"/>
		<reference ref_id="CVE-2024-41095" ref_url="https://www.suse.com/security/cve/CVE-2024-41095/" source="CVE"/>
		<reference ref_id="CVE-2024-41097" ref_url="https://www.suse.com/security/cve/CVE-2024-41097/" source="CVE"/>
		<reference ref_id="CVE-2024-41098" ref_url="https://www.suse.com/security/cve/CVE-2024-41098/" source="CVE"/>
		<reference ref_id="CVE-2024-42069" ref_url="https://www.suse.com/security/cve/CVE-2024-42069/" source="CVE"/>
		<reference ref_id="CVE-2024-42074" ref_url="https://www.suse.com/security/cve/CVE-2024-42074/" source="CVE"/>
		<reference ref_id="CVE-2024-42076" ref_url="https://www.suse.com/security/cve/CVE-2024-42076/" source="CVE"/>
		<reference ref_id="CVE-2024-42077" ref_url="https://www.suse.com/security/cve/CVE-2024-42077/" source="CVE"/>
		<reference ref_id="CVE-2024-42080" ref_url="https://www.suse.com/security/cve/CVE-2024-42080/" source="CVE"/>
		<reference ref_id="CVE-2024-42082" ref_url="https://www.suse.com/security/cve/CVE-2024-42082/" source="CVE"/>
		<reference ref_id="CVE-2024-42085" ref_url="https://www.suse.com/security/cve/CVE-2024-42085/" source="CVE"/>
		<reference ref_id="CVE-2024-42086" ref_url="https://www.suse.com/security/cve/CVE-2024-42086/" source="CVE"/>
		<reference ref_id="CVE-2024-42087" ref_url="https://www.suse.com/security/cve/CVE-2024-42087/" source="CVE"/>
		<reference ref_id="CVE-2024-42089" ref_url="https://www.suse.com/security/cve/CVE-2024-42089/" source="CVE"/>
		<reference ref_id="CVE-2024-42090" ref_url="https://www.suse.com/security/cve/CVE-2024-42090/" source="CVE"/>
		<reference ref_id="CVE-2024-42092" ref_url="https://www.suse.com/security/cve/CVE-2024-42092/" source="CVE"/>
		<reference ref_id="CVE-2024-42095" ref_url="https://www.suse.com/security/cve/CVE-2024-42095/" source="CVE"/>
		<reference ref_id="CVE-2024-42097" ref_url="https://www.suse.com/security/cve/CVE-2024-42097/" source="CVE"/>
		<reference ref_id="CVE-2024-42098" ref_url="https://www.suse.com/security/cve/CVE-2024-42098/" source="CVE"/>
		<reference ref_id="CVE-2024-42101" ref_url="https://www.suse.com/security/cve/CVE-2024-42101/" source="CVE"/>
		<reference ref_id="CVE-2024-42104" ref_url="https://www.suse.com/security/cve/CVE-2024-42104/" source="CVE"/>
		<reference ref_id="CVE-2024-42106" ref_url="https://www.suse.com/security/cve/CVE-2024-42106/" source="CVE"/>
		<reference ref_id="CVE-2024-42107" ref_url="https://www.suse.com/security/cve/CVE-2024-42107/" source="CVE"/>
		<reference ref_id="CVE-2024-42110" ref_url="https://www.suse.com/security/cve/CVE-2024-42110/" source="CVE"/>
		<reference ref_id="CVE-2024-42114" ref_url="https://www.suse.com/security/cve/CVE-2024-42114/" source="CVE"/>
		<reference ref_id="CVE-2024-42115" ref_url="https://www.suse.com/security/cve/CVE-2024-42115/" source="CVE"/>
		<reference ref_id="CVE-2024-42119" ref_url="https://www.suse.com/security/cve/CVE-2024-42119/" source="CVE"/>
		<reference ref_id="CVE-2024-42120" ref_url="https://www.suse.com/security/cve/CVE-2024-42120/" source="CVE"/>
		<reference ref_id="CVE-2024-42121" ref_url="https://www.suse.com/security/cve/CVE-2024-42121/" source="CVE"/>
		<reference ref_id="CVE-2024-42126" ref_url="https://www.suse.com/security/cve/CVE-2024-42126/" source="CVE"/>
		<reference ref_id="CVE-2024-42127" ref_url="https://www.suse.com/security/cve/CVE-2024-42127/" source="CVE"/>
		<reference ref_id="CVE-2024-42130" ref_url="https://www.suse.com/security/cve/CVE-2024-42130/" source="CVE"/>
		<reference ref_id="CVE-2024-42137" ref_url="https://www.suse.com/security/cve/CVE-2024-42137/" source="CVE"/>
		<reference ref_id="CVE-2024-42139" ref_url="https://www.suse.com/security/cve/CVE-2024-42139/" source="CVE"/>
		<reference ref_id="CVE-2024-42142" ref_url="https://www.suse.com/security/cve/CVE-2024-42142/" source="CVE"/>
		<reference ref_id="CVE-2024-42143" ref_url="https://www.suse.com/security/cve/CVE-2024-42143/" source="CVE"/>
		<reference ref_id="CVE-2024-42148" ref_url="https://www.suse.com/security/cve/CVE-2024-42148/" source="CVE"/>
		<reference ref_id="CVE-2024-42152" ref_url="https://www.suse.com/security/cve/CVE-2024-42152/" source="CVE"/>
		<reference ref_id="CVE-2024-42155" ref_url="https://www.suse.com/security/cve/CVE-2024-42155/" source="CVE"/>
		<reference ref_id="CVE-2024-42156" ref_url="https://www.suse.com/security/cve/CVE-2024-42156/" source="CVE"/>
		<reference ref_id="CVE-2024-42157" ref_url="https://www.suse.com/security/cve/CVE-2024-42157/" source="CVE"/>
		<reference ref_id="CVE-2024-42158" ref_url="https://www.suse.com/security/cve/CVE-2024-42158/" source="CVE"/>
		<reference ref_id="CVE-2024-42162" ref_url="https://www.suse.com/security/cve/CVE-2024-42162/" source="CVE"/>
		<reference ref_id="CVE-2024-42223" ref_url="https://www.suse.com/security/cve/CVE-2024-42223/" source="CVE"/>
		<reference ref_id="CVE-2024-42225" ref_url="https://www.suse.com/security/cve/CVE-2024-42225/" source="CVE"/>
		<reference ref_id="CVE-2024-42228" ref_url="https://www.suse.com/security/cve/CVE-2024-42228/" source="CVE"/>
		<reference ref_id="CVE-2024-42229" ref_url="https://www.suse.com/security/cve/CVE-2024-42229/" source="CVE"/>
		<reference ref_id="CVE-2024-42230" ref_url="https://www.suse.com/security/cve/CVE-2024-42230/" source="CVE"/>
		<reference ref_id="CVE-2024-42232" ref_url="https://www.suse.com/security/cve/CVE-2024-42232/" source="CVE"/>
		<reference ref_id="CVE-2024-42236" ref_url="https://www.suse.com/security/cve/CVE-2024-42236/" source="CVE"/>
		<reference ref_id="CVE-2024-42237" ref_url="https://www.suse.com/security/cve/CVE-2024-42237/" source="CVE"/>
		<reference ref_id="CVE-2024-42238" ref_url="https://www.suse.com/security/cve/CVE-2024-42238/" source="CVE"/>
		<reference ref_id="CVE-2024-42239" ref_url="https://www.suse.com/security/cve/CVE-2024-42239/" source="CVE"/>
		<reference ref_id="CVE-2024-42240" ref_url="https://www.suse.com/security/cve/CVE-2024-42240/" source="CVE"/>
		<reference ref_id="CVE-2024-42244" ref_url="https://www.suse.com/security/cve/CVE-2024-42244/" source="CVE"/>
		<reference ref_id="CVE-2024-42246" ref_url="https://www.suse.com/security/cve/CVE-2024-42246/" source="CVE"/>
		<reference ref_id="CVE-2024-42247" ref_url="https://www.suse.com/security/cve/CVE-2024-42247/" source="CVE"/>
		<reference ref_id="CVE-2024-42268" ref_url="https://www.suse.com/security/cve/CVE-2024-42268/" source="CVE"/>
		<reference ref_id="CVE-2024-42271" ref_url="https://www.suse.com/security/cve/CVE-2024-42271/" source="CVE"/>
		<reference ref_id="CVE-2024-42274" ref_url="https://www.suse.com/security/cve/CVE-2024-42274/" source="CVE"/>
		<reference ref_id="CVE-2024-42276" ref_url="https://www.suse.com/security/cve/CVE-2024-42276/" source="CVE"/>
		<reference ref_id="CVE-2024-42277" ref_url="https://www.suse.com/security/cve/CVE-2024-42277/" source="CVE"/>
		<reference ref_id="CVE-2024-42280" ref_url="https://www.suse.com/security/cve/CVE-2024-42280/" source="CVE"/>
		<reference ref_id="CVE-2024-42281" ref_url="https://www.suse.com/security/cve/CVE-2024-42281/" source="CVE"/>
		<reference ref_id="CVE-2024-42283" ref_url="https://www.suse.com/security/cve/CVE-2024-42283/" source="CVE"/>
		<reference ref_id="CVE-2024-42284" ref_url="https://www.suse.com/security/cve/CVE-2024-42284/" source="CVE"/>
		<reference ref_id="CVE-2024-42285" ref_url="https://www.suse.com/security/cve/CVE-2024-42285/" source="CVE"/>
		<reference ref_id="CVE-2024-42286" ref_url="https://www.suse.com/security/cve/CVE-2024-42286/" source="CVE"/>
		<reference ref_id="CVE-2024-42287" ref_url="https://www.suse.com/security/cve/CVE-2024-42287/" source="CVE"/>
		<reference ref_id="CVE-2024-42288" ref_url="https://www.suse.com/security/cve/CVE-2024-42288/" source="CVE"/>
		<reference ref_id="CVE-2024-42289" ref_url="https://www.suse.com/security/cve/CVE-2024-42289/" source="CVE"/>
		<reference ref_id="CVE-2024-42291" ref_url="https://www.suse.com/security/cve/CVE-2024-42291/" source="CVE"/>
		<reference ref_id="CVE-2024-42292" ref_url="https://www.suse.com/security/cve/CVE-2024-42292/" source="CVE"/>
		<reference ref_id="CVE-2024-42295" ref_url="https://www.suse.com/security/cve/CVE-2024-42295/" source="CVE"/>
		<reference ref_id="CVE-2024-42301" ref_url="https://www.suse.com/security/cve/CVE-2024-42301/" source="CVE"/>
		<reference ref_id="CVE-2024-42302" ref_url="https://www.suse.com/security/cve/CVE-2024-42302/" source="CVE"/>
		<reference ref_id="CVE-2024-42308" ref_url="https://www.suse.com/security/cve/CVE-2024-42308/" source="CVE"/>
		<reference ref_id="CVE-2024-42309" ref_url="https://www.suse.com/security/cve/CVE-2024-42309/" source="CVE"/>
		<reference ref_id="CVE-2024-42310" ref_url="https://www.suse.com/security/cve/CVE-2024-42310/" source="CVE"/>
		<reference ref_id="CVE-2024-42311" ref_url="https://www.suse.com/security/cve/CVE-2024-42311/" source="CVE"/>
		<reference ref_id="CVE-2024-42312" ref_url="https://www.suse.com/security/cve/CVE-2024-42312/" source="CVE"/>
		<reference ref_id="CVE-2024-42313" ref_url="https://www.suse.com/security/cve/CVE-2024-42313/" source="CVE"/>
		<reference ref_id="CVE-2024-42315" ref_url="https://www.suse.com/security/cve/CVE-2024-42315/" source="CVE"/>
		<reference ref_id="CVE-2024-42318" ref_url="https://www.suse.com/security/cve/CVE-2024-42318/" source="CVE"/>
		<reference ref_id="CVE-2024-42319" ref_url="https://www.suse.com/security/cve/CVE-2024-42319/" source="CVE"/>
		<reference ref_id="CVE-2024-42320" ref_url="https://www.suse.com/security/cve/CVE-2024-42320/" source="CVE"/>
		<reference ref_id="CVE-2024-42322" ref_url="https://www.suse.com/security/cve/CVE-2024-42322/" source="CVE"/>
		<reference ref_id="CVE-2024-43816" ref_url="https://www.suse.com/security/cve/CVE-2024-43816/" source="CVE"/>
		<reference ref_id="CVE-2024-43818" ref_url="https://www.suse.com/security/cve/CVE-2024-43818/" source="CVE"/>
		<reference ref_id="CVE-2024-43819" ref_url="https://www.suse.com/security/cve/CVE-2024-43819/" source="CVE"/>
		<reference ref_id="CVE-2024-43821" ref_url="https://www.suse.com/security/cve/CVE-2024-43821/" source="CVE"/>
		<reference ref_id="CVE-2024-43823" ref_url="https://www.suse.com/security/cve/CVE-2024-43823/" source="CVE"/>
		<reference ref_id="CVE-2024-43829" ref_url="https://www.suse.com/security/cve/CVE-2024-43829/" source="CVE"/>
		<reference ref_id="CVE-2024-43830" ref_url="https://www.suse.com/security/cve/CVE-2024-43830/" source="CVE"/>
		<reference ref_id="CVE-2024-43831" ref_url="https://www.suse.com/security/cve/CVE-2024-43831/" source="CVE"/>
		<reference ref_id="CVE-2024-43834" ref_url="https://www.suse.com/security/cve/CVE-2024-43834/" source="CVE"/>
		<reference ref_id="CVE-2024-43837" ref_url="https://www.suse.com/security/cve/CVE-2024-43837/" source="CVE"/>
		<reference ref_id="CVE-2024-43839" ref_url="https://www.suse.com/security/cve/CVE-2024-43839/" source="CVE"/>
		<reference ref_id="CVE-2024-43841" ref_url="https://www.suse.com/security/cve/CVE-2024-43841/" source="CVE"/>
		<reference ref_id="CVE-2024-43842" ref_url="https://www.suse.com/security/cve/CVE-2024-43842/" source="CVE"/>
		<reference ref_id="CVE-2024-43846" ref_url="https://www.suse.com/security/cve/CVE-2024-43846/" source="CVE"/>
		<reference ref_id="CVE-2024-43849" ref_url="https://www.suse.com/security/cve/CVE-2024-43849/" source="CVE"/>
		<reference ref_id="CVE-2024-43853" ref_url="https://www.suse.com/security/cve/CVE-2024-43853/" source="CVE"/>
		<reference ref_id="CVE-2024-43854" ref_url="https://www.suse.com/security/cve/CVE-2024-43854/" source="CVE"/>
		<reference ref_id="CVE-2024-43856" ref_url="https://www.suse.com/security/cve/CVE-2024-43856/" source="CVE"/>
		<reference ref_id="CVE-2024-43858" ref_url="https://www.suse.com/security/cve/CVE-2024-43858/" source="CVE"/>
		<reference ref_id="CVE-2024-43860" ref_url="https://www.suse.com/security/cve/CVE-2024-43860/" source="CVE"/>
		<reference ref_id="CVE-2024-43861" ref_url="https://www.suse.com/security/cve/CVE-2024-43861/" source="CVE"/>
		<reference ref_id="CVE-2024-43863" ref_url="https://www.suse.com/security/cve/CVE-2024-43863/" source="CVE"/>
		<reference ref_id="CVE-2024-43866" ref_url="https://www.suse.com/security/cve/CVE-2024-43866/" source="CVE"/>
		<reference ref_id="CVE-2024-43867" ref_url="https://www.suse.com/security/cve/CVE-2024-43867/" source="CVE"/>
		<reference ref_id="CVE-2024-43871" ref_url="https://www.suse.com/security/cve/CVE-2024-43871/" source="CVE"/>
		<reference ref_id="CVE-2024-43872" ref_url="https://www.suse.com/security/cve/CVE-2024-43872/" source="CVE"/>
		<reference ref_id="CVE-2024-43873" ref_url="https://www.suse.com/security/cve/CVE-2024-43873/" source="CVE"/>
		<reference ref_id="CVE-2024-43879" ref_url="https://www.suse.com/security/cve/CVE-2024-43879/" source="CVE"/>
		<reference ref_id="CVE-2024-43880" ref_url="https://www.suse.com/security/cve/CVE-2024-43880/" source="CVE"/>
		<reference ref_id="CVE-2024-43882" ref_url="https://www.suse.com/security/cve/CVE-2024-43882/" source="CVE"/>
		<reference ref_id="CVE-2024-43883" ref_url="https://www.suse.com/security/cve/CVE-2024-43883/" source="CVE"/>
		<reference ref_id="CVE-2024-43884" ref_url="https://www.suse.com/security/cve/CVE-2024-43884/" source="CVE"/>
		<reference ref_id="CVE-2024-43889" ref_url="https://www.suse.com/security/cve/CVE-2024-43889/" source="CVE"/>
		<reference ref_id="CVE-2024-43892" ref_url="https://www.suse.com/security/cve/CVE-2024-43892/" source="CVE"/>
		<reference ref_id="CVE-2024-43893" ref_url="https://www.suse.com/security/cve/CVE-2024-43893/" source="CVE"/>
		<reference ref_id="CVE-2024-43894" ref_url="https://www.suse.com/security/cve/CVE-2024-43894/" source="CVE"/>
		<reference ref_id="CVE-2024-43895" ref_url="https://www.suse.com/security/cve/CVE-2024-43895/" source="CVE"/>
		<reference ref_id="CVE-2024-43899" ref_url="https://www.suse.com/security/cve/CVE-2024-43899/" source="CVE"/>
		<reference ref_id="CVE-2024-43900" ref_url="https://www.suse.com/security/cve/CVE-2024-43900/" source="CVE"/>
		<reference ref_id="CVE-2024-43902" ref_url="https://www.suse.com/security/cve/CVE-2024-43902/" source="CVE"/>
		<reference ref_id="CVE-2024-43903" ref_url="https://www.suse.com/security/cve/CVE-2024-43903/" source="CVE"/>
		<reference ref_id="CVE-2024-43904" ref_url="https://www.suse.com/security/cve/CVE-2024-43904/" source="CVE"/>
		<reference ref_id="CVE-2024-43905" ref_url="https://www.suse.com/security/cve/CVE-2024-43905/" source="CVE"/>
		<reference ref_id="CVE-2024-43907" ref_url="https://www.suse.com/security/cve/CVE-2024-43907/" source="CVE"/>
		<reference ref_id="CVE-2024-43908" ref_url="https://www.suse.com/security/cve/CVE-2024-43908/" source="CVE"/>
		<reference ref_id="CVE-2024-43909" ref_url="https://www.suse.com/security/cve/CVE-2024-43909/" source="CVE"/>
		<reference ref_id="CVE-2024-44938" ref_url="https://www.suse.com/security/cve/CVE-2024-44938/" source="CVE"/>
		<reference ref_id="CVE-2024-44939" ref_url="https://www.suse.com/security/cve/CVE-2024-44939/" source="CVE"/>
		<reference ref_id="CVE-2024-44947" ref_url="https://www.suse.com/security/cve/CVE-2024-44947/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2024-44947: Initialize beyond-EOF page contents before setting uptodate (bsc#1229454).
- CVE-2024-36936: Touch soft lockup during memory accept (bsc#1225773).
- CVE-2022-48706: Do proper cleanup if IFCVF init fails (bsc#1225524).
- CVE-2024-43883: Do not drop references before new references are gained (bsc#1229707).
- CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).
- CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229500).
- CVE-2023-52489: Fix race in accessing memory_section-&gt;usage (bsc#1221326).
- CVE-2024-43893: Check uartclk for zero to avoid divide by zero (bsc#1229759).
- CVE-2024-43821: Fix a possible null pointer dereference (bsc#1229315).
- CVE-2024-43900: Avoid use-after-free in load_firmware_cb() (bsc#1229756).
- CVE-2024-44938: Fix shift-out-of-bounds in dbDiscardAG (bsc#1229792).
- CVE-2024-44939: Fix null ptr deref in dtInsertEntry (bsc#1229820).
- CVE-2024-41087: Fix double free on error (bsc#1228466).
- CVE-2024-42277: Avoid NULL deref in sprd_iommu_hw_en (bsc#1229409).
- CVE-2024-43902: Add null checker before passing variables (bsc#1229767).
- CVE-2024-43904: Add null checks for 'stream' and 'plane' before dereferencing (bsc#1229768)
- CVE-2024-43880: Put back removed metod in struct objagg_ops (bsc#1229481).
- CVE-2024-43884: Add error handling to pair_device() (bsc#1229739)
- CVE-2024-43899: Fix null pointer deref in dcn20_resource.c (bsc#1229754).
- CVE-2022-48920: Get rid of warning on transaction commit when using flushoncommit (bsc#1229658).
- CVE-2023-52906: Fix warning during failed attribute validation (bsc#1229527).
- CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503)
- CVE-2024-43866: Always drain health in shutdown callback (bsc#1229495).
- CVE-2024-26812: struct virqfd kABI workaround (bsc#1222808).
- CVE-2022-48912: Fix use-after-free in __nf_register_net_hook() (bsc#1229641)
- CVE-2024-27010: Fix mirred deadlock on device recursion (bsc#1223720).
- CVE-2022-48906: Correctly set DATA_FIN timeout when number of retransmits is large (bsc#1229605)
- CVE-2024-42155: Wipe copies of protected- and secure-keys (bsc#1228733).
- CVE-2024-42156: Wipe copies of clear-key structures on failure (bsc#1228722).
- CVE-2023-52899: Add exception protection processing for vd in axi_chan_handle_err function (bsc#1229569).
- CVE-2024-42158: Use kfree_sensitive() to fix Coccinelle warnings (bsc#1228720).
- CVE-2024-26631: Fix data-race in ipv6_mc_down / mld_ifc_work (bsc#1221630).
- CVE-2024-43873: Always initialize seqpacket_allow (bsc#1229488)
- CVE-2024-40905: Fix possible race in __fib6_drop_pcpu_from() (bsc#1227761)
- CVE-2024-39489: Fix memleak in seg6_hmac_init_algo (bsc#1227623)
- CVE-2021-47106: Fix use-after-free in nft_set_catchall_destroy() (bsc#1220962)
- CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225428).
- CVE-2024-36489: Fix missing memory barrier in tls_init (bsc#1226874)
- CVE-2024-41020: Fix fcntl/close race recovery compat path (bsc#1228427).
- CVE-2024-27079: Fix NULL domain on device release (bsc#1223742).
- CVE-2024-35897: Discard table flag update with pending basechain deletion (bsc#1224510).
- CVE-2024-27403: Restore const specifier in flow_offload_route_init() (bsc#1224415).
- CVE-2024-27011: Fix memleak in map from abort path (bsc#1223803).
- CVE-2024-43819: Reject memory region operations for ucontrol VMs (bsc#1229290).
- CVE-2024-26668: Reject configurations that cause integer overflow (bsc#1222335).
- CVE-2024-26835: Set dormant flag on hook register failure (bsc#1222967).
- CVE-2024-26808: Handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634).
- CVE-2024-27016: Validate pppoe header (bsc#1223807).
- CVE-2024-35945: Prevent nullptr exceptions on ISR (bsc#1224639).
- CVE-2023-52581: Fix memleak when more than 255 elements expired (bsc#1220877).
- CVE-2024-36013: Fix slab-use-after-free in l2cap_connect() (bsc#1225578).
- CVE-2024-43837: Fix updating attached freplace prog in prog_array map (bsc#1229297).
- CVE-2024-42291: Add a per-VF limit on number of FDIR filters (bsc#1229374).
- CVE-2024-42268: Fix missing lock on sync reset reload (bsc#1229391).
- CVE-2024-43834: Fix invalid wait context of page_pool_destroy() (bsc#1229314)
- CVE-2024-36286: Acquire rcu_read_lock() in instance_destroy_rcu() (bsc#1226801)
- CVE-2024-26851: Add protection for bmp length out of range (bsc#1223074)
- CVE-2024-42157: Wipe sensitive data on failure (bsc#1228727).
- CVE-2024-26677: Blacklist e7870cf13d20 (' Fix delayed ACKs to not set the reference serial number') (bsc#1222387)
- CVE-2024-36009: Blacklist 467324bcfe1a ('ax25: Fix netdev refcount issue') (bsc#1224542)
- CVE-2023-52859: Fix use-after-free when register pmu fails (bsc#1225582).
- CVE-2024-42280: Fix a use after free in hfcmulti_tx() (bsc#1229388)
- CVE-2024-42284: Return non-zero value from tipc_udp_addr2str() on error (bsc#1229382)
- CVE-2024-42283: Initialize all fields in dumped nexthops (bsc#1229383)
- CVE-2024-42312: Always initialize i_uid/i_gid (bsc#1229357)
- CVE-2024-43854: Initialize integrity buffer to zero before writing it to media (bsc#1229345)
- CVE-2024-42322: Properly dereference pe in ip_vs_add_service (bsc#1229347)
- CVE-2024-42301: Fix the array out-of-bounds risk (bsc#1229407).
- CVE-2024-42318: Do not lose track of restrictions on cred_transfer (bsc#1229351).
- CVE-2024-26669: Fix chain template offload (bsc#1222350).
- CVE-2023-52889: Fix null pointer deref when receiving skb during sock creation (bsc#1229287).
- CVE-2022-48645: Move enetc_set_psfp() out of the common enetc_set_features() (bsc#1223508).
- CVE-2024-41007: Use signed arithmetic in tcp_rtx_probe0_timed_out() (bsc#1227863).
- CVE-2024-36933: Use correct mac_offset to unwind gso skb in nsh_gso_segment() (bsc#1225832).
- CVE-2024-42295: Handle inconsistent state in nilfs_btnode_create_block() (bsc#1229370).
- CVE-2024-42319: Move devm_mbox_controller_register() after devm_pm_runtime_enable() (bsc#1229350).
- CVE-2024-43860: Skip over memory region when node value is NULL (bsc#1229319).
- CVE-2024-43831: Handle invalid decoder vsi (bsc#1229309).
- CVE-2024-43849: Protect locator_addr with the main mutex (bsc#1229307).
- CVE-2024-43841: Do not use strlen() in const context (bsc#1229304).
- CVE-2024-43839: Adjust 'name' buf size of bna_tcb and bna_ccb structures (bsc#1229301).
- CVE-2024-41088: Fix infinite loop when xmit fails (bsc#1228469).
- CVE-2024-42281: Fix a segment issue when downgrading gso_size (bsc#1229386).
- CVE-2024-42271: Fixed a use after free in iucv_sock_close(). (bsc#1229400)
- CVE-2024-41080: Fix possible deadlock in io_register_iowq_max_workers() (bsc#1228616).
- CVE-2024-42246: Remap EPERM in case of connection failure in xs_tcp_setup_socket (bsc#1228989).
- CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop(). (bsc#1228959)
- CVE-2024-26735: Fix possible use-after-free and null-ptr-deref (bsc#1222372).
- CVE-2024-42106: Initialize pad field in struct inet_diag_req_v2 (bsc#1228493).
- CVE-2024-38662: Cover verifier checks for mutating sockmap/sockhash (bsc#1226885).
- CVE-2024-42110: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx() (bsc#1228501).
- CVE-2024-42247: Avoid unaligned 64-bit memory accesses (bsc#1228988).
- CVE-2022-48865: Fix kernel panic when enabling bearer (bsc#1228065).
- CVE-2023-52498: Fix possible deadlocks in core system-wide PM code (bsc#1221269).
- CVE-2024-41068: Fix sclp_init() cleanup on failure (bsc#1228579).
- CVE-2022-48808: Fix panic when DSA master device unbinds on shutdown (bsc#1227958).
- CVE-2024-42095: Fix Errata i2310 with RX FIFO level check (bsc#1228446).
- CVE-2024-40978: Fix crash while reading debugfs attribute (bsc#1227929).
- CVE-2024-42107: Do not process extts if PTP is disabled (bsc#1228494).
- CVE-2024-42139: Fix improper extts handling (bsc#1228503).
- CVE-2024-42148: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487).
- CVE-2024-42142: E-switch, Create ingress ACL when needed (bsc#1228491).
- CVE-2024-42162: Account for stopped queues when reading NIC stats (bsc#1228706).
- CVE-2024-42082: Remove WARN() from __xdp_reg_mem_model() (bsc#1228482).
- CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526).
- CVE-2023-3610: Fixed use-after-free vulnerability in nf_tables can be exploited to achieve local privilege escalation (bsc#1213580).
- CVE-2024-42228: Using uninitialized value *size when calling amdgpu_vce_cs_reloc (bsc#1228667).
- CVE-2024-40995: Fix possible infinite loop in tcf_idr_check_alloc() (bsc#1227830).
- CVE-2024-38602: Merge repeat codes in ax25_dev_device_down() (bsc#1226613).
- CVE-2024-38554: Fix reference count leak issue of net_device (bsc#1226742).
- CVE-2024-36929: Reject skb_copy(_expand) for fraglist GSO skbs (bsc#1225814).
- CVE-2024-41009: Fix overrunning reservations in ringbuf (bsc#1228020).
- CVE-2024-27024: Fix WARNING in rds_conn_connect_if_down (bsc#1223777).

The following non-security bugs were fixed:

- ACPI: bus: Indicate support for IRQ ResourceSource thru _OSC (git-fixes).
- ACPI: bus: Indicate support for the Generic Event Device thru _OSC (git-fixes).
- ACPI: bus: Rework system-level device notification handling (git-fixes).
- ACPI: thermal: Drop nocrt parameter (git-fixes).
- ACPI: x86: s2idle: Post-increment variables when getting constraints (git-fixes).
- afs: Do not cross .backup mountpoint from backup volume (git-fixes).
- ALSA: hda: Add HP MP9 G4 Retail System AMS to force connect list (stable-fixes).
- ALSA: hda/hdmi: Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).
- ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes).
- ALSA: hda/realtek: Fix noise from speakers on Lenovo IdeaPad 3 15IAU7 (git-fixes).
- ALSA: line6: Fix racy access to midibuf (stable-fixes).
- ALSA: timer: Relax start tick time check for slave timer elements (git-fixes).
- ALSA: usb-audio: Add delay quirk for VIVO USB-C-XE710 HEADSET (stable-fixes).
- ALSA: usb-audio: Re-add ScratchAmp quirk entries (git-fixes).
- ALSA: usb-audio: Support Yamaha P-125 quirk entry (stable-fixes).
- ALSA: usb: Fix UBSAN warning in parse_audio_unit() (stable-fixes).
- arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git-fixes)
- arm64: ACPI: NUMA: initialize all values of acpi_early_node_map to (git-fixes)
- arm64: Add Neoverse-V2 part (git-fixes)
- arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git-fixes)
- arm64: armv8_deprecated: Fix warning in isndep cpuhp starting process (git-fixes)
- arm64: barrier: Restore spec_bar() macro (git-fixes)
- arm64: cpufeature: Add missing .field_width for GIC system registers (git-fixes)
- arm64: cpufeature: Fix the visibility of compat hwcaps (git-fixes)
- arm64: cpufeature: Force HWCAP to be based on the sysreg visible to (git-fixes)
- arm64: cputype: Add Cortex-A720 definitions (git-fixes)
- arm64: cputype: Add Cortex-A725 definitions (git-fixes)
- arm64: cputype: Add Cortex-X1C definitions (git-fixes)
- arm64: cputype: Add Cortex-X3 definitions (git-fixes)
- arm64: cputype: Add Cortex-X4 definitions (git-fixes)
- arm64: cputype: Add Cortex-X925 definitions (git-fixes)
- arm64: cputype: Add Neoverse-V3 definitions (git-fixes)
- arm64: dts: rockchip: Increase VOP clk rate on RK3328 (git-fixes)
- arm64: dts: rockchip: Increase VOP clk rate on RK3328 (git-fixes)
- arm64: errata: Expand speculative SSBS workaround (again) (git-fixes)
- arm64: errata: Expand speculative SSBS workaround (git-fixes)
- arm64: errata: Unify speculative SSBS errata logic (git-fixes) Also update default configuration.
- arm64: Fix KASAN random tag seed initialization (git-fixes)
- arm64: Fix KASAN random tag seed initialization (git-fixes)
- ASoC: codecs: wcd938x-sdw: Correct Soundwire ports mask (git-fixes).
- ASoC: codecs: wsa881x: Correct Soundwire ports mask (git-fixes).
- ASoC: meson: axg-fifo: fix irq scheduling issue with PREEMPT_RT (git-fixes).
- async: Introduce async_schedule_dev_nocall() (bsc#1221269).
- async: Split async_schedule_node_domain() (bsc#1221269).
- Bluetooth: Fix usage of __hci_cmd_sync_status (git-fixes).
- Bluetooth: hci_core: Fix not handling hibernation actions (git-fixes).
- Bluetooth: l2cap: always unlock channel in l2cap_conless_channel() (git-fixes).
- Bluetooth: L2CAP: Fix deadlock (git-fixes).
- bpf: Fix a kernel verifier crash in stacksafe() (bsc#1225903).
- bpf: kprobe: remove unused declaring of bpf_kprobe_override (git-fixes).
- btrfs: fix leak of qgroup extent records after transaction abort (git-fixes).
- btrfs: make btrfs_destroy_delayed_refs() return void (git-fixes).
- btrfs: remove unnecessary prototype declarations at disk-io.c (git-fixes).
- btrfs: sysfs: update fs features directory asynchronously (bsc#1226168).
- cachefiles: propagate errors from vfs_getxattr() to avoid infinite loop (bsc#1229418).
- ceph: issue a cap release immediately if no cap exists (bsc#1225162).
- ceph: periodically flush the cap releases (bsc#1225162).
- cpu/SMT: Enable SMT only if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes).
- cpuidle, ACPI: Evaluate LPI arch_flags for broadcast timer (git-fixes).
- docs: KVM: Fix register ID of SPSR_FIQ (git-fixes).
- drm: add missing MODULE_DESCRIPTION() macros (stable-fixes).
- drm: panel-orientation-quirks: Add labels for both Valve Steam Deck revisions (stable-fixes).
- drm: panel-orientation-quirks: Add quirk for Aya Neo KUN (stable-fixes).
- drm: panel-orientation-quirks: Add quirk for Lenovo Yoga Tab 3 X90F (stable-fixes).
- drm: panel-orientation-quirks: Add quirk for Nanote UMPC-01 (stable-fixes).
- drm: panel-orientation-quirks: Add quirk for OrangePi Neo (stable-fixes).
- drm/amd/amdgpu/imu_v11_0: Increase buffer size to ensure all possible values can be stored (stable-fixes).
- drm/amd/display: Add NULL check for 'afb' before dereferencing in amdgpu_dm_plane_handle_cursor_update (stable-fixes).
- drm/amd/display: avoid using null object of framebuffer (git-fixes).
- drm/amd/display: Fix &amp;&amp; vs || typos (git-fixes).
- drm/amd/display: Skip Recompute DSC Params if no Stream on Link (stable-fixes).
- drm/amd/display: Validate hw_points_num before using it (stable-fixes).
- drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr (stable-fixes).
- drm/amdgpu: Actually check flags for all context ops (stable-fixes).
- drm/amdgpu: Add lock around VF RLCG interface (stable-fixes).
- drm/amdgpu: fix dereference null return value for the function amdgpu_vm_pt_parent (stable-fixes).
- drm/amdgpu: Fix the null pointer dereference to ras_manager (stable-fixes).
- drm/amdgpu: Validate TA binary size (stable-fixes).
- drm/amdgpu/jpeg2: properly set atomics vmid field (stable-fixes).
- drm/amdgpu/pm: Fix the null pointer dereference for smu7 (stable-fixes).
- drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules (stable-fixes).
- drm/amdgpu/pm: Fix the param type of set_power_profile_mode (stable-fixes).
- drm/bridge: analogix_dp: properly handle zero sized AUX transactions (stable-fixes).
- drm/bridge: tc358768: Attempt to fix DSI horizontal timings (stable-fixes).
- drm/client: fix null pointer dereference in drm_client_modeset_probe (git-fixes).
- drm/dp_mst: Skip CSN if topology probing is not done yet (stable-fixes).
- drm/lima: set gp bus_stop bit before hard reset (stable-fixes).
- drm/msm/dp: reset the link phy params before link training (git-fixes).
- drm/msm/dpu: cleanup FB if dpu_format_populate_layout fails (git-fixes).
- drm/msm/dpu: do not play tricks with debug macros (git-fixes).
- drm/tegra: Zero-initialize iosys_map (stable-fixes).
- exfat: fix inode-&gt;i_blocks for non-512 byte sector size device (git-fixes).
- exfat: fix potential deadlock on __exfat_get_dentry_set (git-fixes).
- exfat: redefine DIR_DELETED as the bad cluster number (git-fixes).
- exfat: support dynamic allocate bh for exfat_entry_set_cache (git-fixes).
- fs/netfs/fscache_cookie: add missing 'n_accesses' check (bsc#1229453).
- fuse: Initialize beyond-EOF page contents before setting uptodate (bsc#1229454).
- genirq: Add might_sleep() to disable_irq() (git-fixes).
- genirq: Always limit the affinity to online CPUs (git-fixes).
- genirq: Do not return error on missing optional irq_request_resources() (git-fixes).
- genirq: Take the proposed affinity at face value if force==true (git-fixes).
- genirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline (git-fixes).
- genirq/generic_chip: Make irq_remove_generic_chip() irqdomain aware (git-fixes).
- genirq/ipi: Fix NULL pointer deref in irq_data_get_affinity_mask() (git-fixes).
- genirq/irqdesc: Do not try to remove non-existing sysfs files (git-fixes).
- genirq/matrix: Exclude managed interrupts in irq_matrix_allocated() (git-fixes).
- genirq/msi: Shutdown managed interrupts with unsatifiable affinities (git-fixes).
- gss_krb5: Fix the error handling path for crypto_sync_skcipher_setkey (git-fixes).
- hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode() (git-fixes).
- i2c: smbus: Improve handling of stuck alerts (git-fixes).
- i2c: smbus: Send alert notifications to all devices if source not found (git-fixes).
- iommu/amd: Convert comma to semicolon (git-fixes).
- ip6_tunnel: Fix broken GRO (bsc#1229444).
- ipv6: sr: fix incorrect unregister order (git-fixes).
- irqdomain: Drop bogus fwspec-mapping error handling (git-fixes).
- irqdomain: Fix association race (git-fixes).
- irqdomain: Fix disassociation race (git-fixes).
- irqdomain: Fix domain registration race (git-fixes).
- irqdomain: Fix mapping-creation race (git-fixes).
- irqdomain: Fixed unbalanced fwnode get and put (git-fixes).
- irqdomain: Look for existing mapping only once (git-fixes).
- irqdomain: Refactor __irq_domain_alloc_irqs() (git-fixes).
- irqdomain: Report irq number for NOMAP domains (git-fixes).
- kprobes: Fix to check symbol prefixes correctly (git-fixes).
- lockd: move from strlcpy with unused retval to strscpy (git-fixes).
- memcg: protect concurrent access to mem_cgroup_idr (git-fixes).
- mm, kmsan: fix infinite recursion due to RCU critical section (git-fixes).
- mm: prevent derefencing NULL ptr in pfn_section_valid() (git-fixes).
- mmc: dw_mmc: allow biu and ciu clocks to defer (git-fixes).
- mmc: mmc_test: Fix NULL dereference on allocation failure (git-fixes).
- net: ks8851: Fix another TX stall caused by wrong ISR flag handling (git-fixes).
- net: ks8851: Fix deadlock with the SPI chip variant (git-fixes).
- net: ks8851: Fix potential TX stall after interface reopen (git-fixes).
- net: ks8851: Fix TX stall caused by TX buffer overrun (gix-fixes).
- net: mana: Add support for page sizes other than 4KB on ARM64 (jsc#PED-8491 bsc#1226530).
- net: mana: Fix doorbell out of order violation and avoid unnecessary doorbell rings (bsc#1229154).
- net: mana: Fix race of mana_hwc_post_rx_wqe and new hwc response (git-fixes).
- net: mana: Fix RX buf alloc_size alignment and atomic op panic (bsc#1229086).
- net: remove two BUG() from skb_checksum_help() (bsc#1229312).
- net: usb: qmi_wwan: fix memory leak for not ip packets (git-fixes).
- net/rds: fix possible cp null dereference (git-fixes).
- net/sched: initialize noop_qdisc owner (git-fixes).
- nfc: pn533: Add poll mod list filling check (git-fixes).
- nfs: expose /proc/net/sunrpc/nfs in net namespaces (git-fixes).
- nfs: make the rpc_stat per net namespace (git-fixes).
- NFSD: add posix ACLs to struct nfsd_attrs (git-fixes).
- NFSD: add security label to struct nfsd_attrs (git-fixes).
- NFSD: fix regression with setting ACLs (git-fixes).
- NFSD: Fix strncpy() fortify warning (git-fixes).
- NFSD: Increase NFSD_MAX_OPS_PER_COMPOUND (git-fixes).
- NFSD: introduce struct nfsd_attrs (git-fixes).
- NFSD: move from strlcpy with unused retval to strscpy (git-fixes).
- NFSD: Optimize DRC bucket pruning (git-fixes).
- nfsd: return error if nfs4_setacl fails (git-fixes).
- NFSD: set attributes when creating symlinks (git-fixes).
- nfsd: use locks_inode_context helper (git-fixes).
- nilfs2: Remove check for PageError (git-fixes).
- nvme_core: scan namespaces asynchronously (bsc#1224105).
- ocfs2: use coarse time for new created files (git-fixes).
- padata: Fix possible divide-by-0 panic in padata_mt_helper() (git-fixes).
- perf/smmuv3: Enable HiSilicon Erratum 162001900 quirk for HIP08/09 (git-fixes).
- platform/x86/amd/hsmp: Add support for ACPI based probing (jsc#PED-8779).
- platform/x86/amd/hsmp: Cache pci_dev in struct hsmp_socket (jsc#PED-8779).
- platform/x86/amd/hsmp: Change devm_kzalloc() to devm_kcalloc() (jsc#PED-8779).
- platform/x86/amd/hsmp: Check HSMP support on AMD family of processors (jsc#PED-8779).
- platform/x86/amd/hsmp: Check num_sockets against MAX_AMD_SOCKETS (jsc#PED-8779).
- platform/x86/amd/hsmp: Create static func to handle platdev (jsc#PED-8779).
- platform/x86/amd/hsmp: Define a struct to hold mailbox regs (jsc#PED-8779).
- platform/x86/amd/hsmp: Move dev from platdev to hsmp_socket (jsc#PED-8779).
- platform/x86/amd/hsmp: Move hsmp_test to probe (jsc#PED-8779).
- platform/x86/amd/hsmp: Non-ACPI support for AMD F1A_M00~0Fh (jsc#PED-8779).
- platform/x86/amd/hsmp: Remove extra parenthesis and add a space (jsc#PED-8779).
- platform/x86/amd/hsmp: Restructure sysfs group creation (jsc#PED-8779).
- platform/x86/amd/hsmp: switch to use device_add_groups() (jsc#PED-8779).
- power: supply: axp288_charger: Fix constant_charge_voltage writes (git-fixes).
- power: supply: axp288_charger: Round constant_charge_voltage writes down (git-fixes).
- powerpc: Fail build if using recordmcount with binutils v2.37 (bsc#1194869).
- powerpc: Mark .opd section read-only (bsc#1194869).
- powerpc: use generic version of arch_is_kernel_initmem_freed() (bsc#1194869).
- powerpc: xor_vmx: Add '-mhard-float' to CFLAGS (bsc#1194869).
- powerpc/64: Set _IO_BASE to POISON_POINTER_DELTA not 0 for CONFIG_PCI=n (bsc#1194869).
- powerpc/io: Avoid clang null pointer arithmetic warnings (bsc#1194869).
- powerpc/kexec_file: fix cpus node update to FDT (bsc#1194869).
- powerpc/kexec: make the update_cpus_node() function public (bsc#1194869).
- powerpc/kexec: split CONFIG_KEXEC_FILE and CONFIG_CRASH_DUMP (bsc#1194869).
- powerpc/pseries: Add failure related checks for h_get_mpp and h_get_ppp (bsc#1194869).
- powerpc/pseries: Whitelist dtl slub object for copying to userspace (bsc#1194869).
- powerpc/radix: Move some functions into #ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE (bsc#1194869).
- powerpc/topology: Check if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes).
- powerpc/xmon: Check cpu id in commands 'c#', 'dp#' and 'dx#' (bsc#1194869).
- RDMA/mana_ib: Use virtual address in dma regions for MRs (git-fixes).
- RDMA/rxe: Fix incomplete state save in rxe_requester (git-fixes)
- RDMA/rxe: Fix rxe_modify_srq (git-fixes)
- RDMA/rxe: Handle zero length rdma (git-fixes)
- RDMA/rxe: Move work queue code to subroutines (git-fixes)
- s390/cpacf: get rid of register asm (git-fixes bsc#1227079 bsc#1229187).
- s390/cpacf: Make use of invalid opcode produce a link error (git-fixes bsc#1227079).
- s390/cpacf: Split and rework cpacf query functions (git-fixes bsc#1229187).
- s390/dasd: fix error checks in dasd_copy_pair_store() (git-fixes bsc#1229190).
- s390/dasd: fix error recovery leading to data corruption on ESE devices (git-fixes bsc#1229573).
- s390/sclp: Prevent release of buffer in I/O (git-fixes bsc#1229572).
- s390/uv: Panic for set and remove shared access UVC errors (git-fixes bsc#1229188).
- spi: spi-fsl-lpspi: Fix scldiv calculation (git-fixes).
- sunrpc: add a struct rpc_stats arg to rpc_create_args (git-fixes).
- SUNRPC: Fix a race to wake a sync task (git-fixes).
- swiotlb: fix swiotlb_bounce() to do partial sync's correctly (git-fixes).
- syscalls: fix compat_sys_io_pgetevents_time64 usage (git-fixes).
- tracing: Return from tracing_buffers_read() if the file has been closed (bsc#1229136 git-fixes).
- ubifs: add check for crypto_shash_tfm_digest (git-fixes).
- ubifs: dbg_orphan_check: Fix missed key type checking (git-fixes).
- ubifs: Fix adding orphan entry twice for the same inode (git-fixes).
- ubifs: Fix unattached xattr inode if powercut happens after deleting (git-fixes).
- vfio/pci: fix potential memory leak in vfio_intx_enable() (git-fixes).
- wifi: iwlwifi: fw: fix wgds rev 3 exact size (git-fixes).
- wifi: mwifiex: duplicate static structs used in driver instances (git-fixes).
- x86/APM: drop the duplicate APM_MINOR_DEV macro (git-fixes).
- x86/insn: Fix PUSH instruction in x86 instruction decoder opcode map (git-fixes).
- x86/mm: Fix pti_clone_entry_text() for i386 (git-fixes).
- x86/mtrr: Check if fixed MTRRs exist before saving them (git-fixes).
- x86/pm: Work around false positive kmemleak report in msr_build_context() (git-fixes).
- xfs: Fix missing interval for missing_owner in xfs fsmap (git-fixes).
- xfs: Fix the owner setting issue for rmap query in xfs fsmap (git-fixes).
- xfs: use XFS_BUF_DADDR_NULL for daddrs in getfsmap code (git-fixes).
- xhci: Fix Panther point NULL pointer deref at full-speed re-enumeration (git-fixes).
- xprtrdma: Fix rpcrdma_reqs_reset() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-11"/>
	<updated date="2024-09-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194111">SUSE bug 1194111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194765">SUSE bug 1194765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196261">SUSE bug 1196261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196516">SUSE bug 1196516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196894">SUSE bug 1196894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198017">SUSE bug 1198017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203329">SUSE bug 1203329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203330">SUSE bug 1203330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203360">SUSE bug 1203360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205462">SUSE bug 1205462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206006">SUSE bug 1206006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206258">SUSE bug 1206258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206843">SUSE bug 1206843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207158">SUSE bug 1207158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208783">SUSE bug 1208783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210644">SUSE bug 1210644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213580">SUSE bug 1213580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213632">SUSE bug 1213632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214285">SUSE bug 1214285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216834">SUSE bug 1216834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220428">SUSE bug 1220428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220877">SUSE bug 1220877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220962">SUSE bug 1220962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221269">SUSE bug 1221269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221326">SUSE bug 1221326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221630">SUSE bug 1221630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221645">SUSE bug 1221645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222335">SUSE bug 1222335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222350">SUSE bug 1222350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222372">SUSE bug 1222372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222387">SUSE bug 1222387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222634">SUSE bug 1222634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222808">SUSE bug 1222808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222967">SUSE bug 1222967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223074">SUSE bug 1223074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223191">SUSE bug 1223191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223508">SUSE bug 1223508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223720">SUSE bug 1223720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223742">SUSE bug 1223742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223777">SUSE bug 1223777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223803">SUSE bug 1223803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223807">SUSE bug 1223807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224105">SUSE bug 1224105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224415">SUSE bug 1224415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224496">SUSE bug 1224496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224510">SUSE bug 1224510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224542">SUSE bug 1224542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224578">SUSE bug 1224578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224639">SUSE bug 1224639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225162">SUSE bug 1225162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225352">SUSE bug 1225352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225428">SUSE bug 1225428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225524">SUSE bug 1225524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225578">SUSE bug 1225578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225582">SUSE bug 1225582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225773">SUSE bug 1225773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225814">SUSE bug 1225814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225827">SUSE bug 1225827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225832">SUSE bug 1225832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225903">SUSE bug 1225903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226168">SUSE bug 1226168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226530">SUSE bug 1226530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226613">SUSE bug 1226613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226742">SUSE bug 1226742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226765">SUSE bug 1226765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226798">SUSE bug 1226798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226801">SUSE bug 1226801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226874">SUSE bug 1226874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226885">SUSE bug 1226885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227079">SUSE bug 1227079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227623">SUSE bug 1227623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227761">SUSE bug 1227761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227830">SUSE bug 1227830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227863">SUSE bug 1227863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227867">SUSE bug 1227867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227929">SUSE bug 1227929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227937">SUSE bug 1227937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227958">SUSE bug 1227958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228020">SUSE bug 1228020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228065">SUSE bug 1228065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228114">SUSE bug 1228114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228410">SUSE bug 1228410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228426">SUSE bug 1228426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228427">SUSE bug 1228427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228429">SUSE bug 1228429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228446">SUSE bug 1228446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228447">SUSE bug 1228447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228449">SUSE bug 1228449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228450">SUSE bug 1228450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228452">SUSE bug 1228452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228456">SUSE bug 1228456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228463">SUSE bug 1228463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228466">SUSE bug 1228466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228467">SUSE bug 1228467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228469">SUSE bug 1228469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228480">SUSE bug 1228480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228481">SUSE bug 1228481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228482">SUSE bug 1228482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228483">SUSE bug 1228483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228484">SUSE bug 1228484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228485">SUSE bug 1228485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228487">SUSE bug 1228487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228489">SUSE bug 1228489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228491">SUSE bug 1228491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228493">SUSE bug 1228493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228494">SUSE bug 1228494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228495">SUSE bug 1228495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228496">SUSE bug 1228496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228501">SUSE bug 1228501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228503">SUSE bug 1228503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228509">SUSE bug 1228509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228513">SUSE bug 1228513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228515">SUSE bug 1228515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228516">SUSE bug 1228516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228526">SUSE bug 1228526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228531">SUSE bug 1228531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228563">SUSE bug 1228563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228564">SUSE bug 1228564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228567">SUSE bug 1228567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228576">SUSE bug 1228576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228579">SUSE bug 1228579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228584">SUSE bug 1228584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228588">SUSE bug 1228588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228590">SUSE bug 1228590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228615">SUSE bug 1228615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228616">SUSE bug 1228616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228635">SUSE bug 1228635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228636">SUSE bug 1228636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228654">SUSE bug 1228654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228656">SUSE bug 1228656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228658">SUSE bug 1228658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228660">SUSE bug 1228660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228662">SUSE bug 1228662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228667">SUSE bug 1228667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228673">SUSE bug 1228673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228677">SUSE bug 1228677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228687">SUSE bug 1228687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228706">SUSE bug 1228706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228708">SUSE bug 1228708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228710">SUSE bug 1228710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228718">SUSE bug 1228718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228720">SUSE bug 1228720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228721">SUSE bug 1228721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228722">SUSE bug 1228722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228724">SUSE bug 1228724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228726">SUSE bug 1228726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228727">SUSE bug 1228727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228733">SUSE bug 1228733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228748">SUSE bug 1228748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228766">SUSE bug 1228766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228779">SUSE bug 1228779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228801">SUSE bug 1228801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228850">SUSE bug 1228850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228857">SUSE bug 1228857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228959">SUSE bug 1228959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228964">SUSE bug 1228964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228966">SUSE bug 1228966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228967">SUSE bug 1228967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228979">SUSE bug 1228979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228988">SUSE bug 1228988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228989">SUSE bug 1228989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228991">SUSE bug 1228991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228992">SUSE bug 1228992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229042">SUSE bug 1229042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229054">SUSE bug 1229054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229086">SUSE bug 1229086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229136">SUSE bug 1229136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229154">SUSE bug 1229154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229187">SUSE bug 1229187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229188">SUSE bug 1229188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229190">SUSE bug 1229190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229287">SUSE bug 1229287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229290">SUSE bug 1229290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229292">SUSE bug 1229292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229296">SUSE bug 1229296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229297">SUSE bug 1229297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229301">SUSE bug 1229301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229303">SUSE bug 1229303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229304">SUSE bug 1229304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229305">SUSE bug 1229305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229307">SUSE bug 1229307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229309">SUSE bug 1229309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229312">SUSE bug 1229312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229314">SUSE bug 1229314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229315">SUSE bug 1229315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229317">SUSE bug 1229317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229318">SUSE bug 1229318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229319">SUSE bug 1229319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229327">SUSE bug 1229327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229341">SUSE bug 1229341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229345">SUSE bug 1229345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229346">SUSE bug 1229346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229347">SUSE bug 1229347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229349">SUSE bug 1229349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229350">SUSE bug 1229350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229351">SUSE bug 1229351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229354">SUSE bug 1229354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229356">SUSE bug 1229356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229357">SUSE bug 1229357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229358">SUSE bug 1229358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229359">SUSE bug 1229359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229360">SUSE bug 1229360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229366">SUSE bug 1229366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229370">SUSE bug 1229370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229373">SUSE bug 1229373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229374">SUSE bug 1229374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229381">SUSE bug 1229381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229382">SUSE bug 1229382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229383">SUSE bug 1229383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229386">SUSE bug 1229386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229388">SUSE bug 1229388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229391">SUSE bug 1229391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229392">SUSE bug 1229392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229395">SUSE bug 1229395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229398">SUSE bug 1229398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229399">SUSE bug 1229399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229400">SUSE bug 1229400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229407">SUSE bug 1229407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229409">SUSE bug 1229409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229410">SUSE bug 1229410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229411">SUSE bug 1229411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229413">SUSE bug 1229413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229414">SUSE bug 1229414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229417">SUSE bug 1229417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229418">SUSE bug 1229418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229444">SUSE bug 1229444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229453">SUSE bug 1229453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229454">SUSE bug 1229454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229481">SUSE bug 1229481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229482">SUSE bug 1229482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229488">SUSE bug 1229488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229489">SUSE bug 1229489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229490">SUSE bug 1229490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229493">SUSE bug 1229493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229495">SUSE bug 1229495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229497">SUSE bug 1229497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229500">SUSE bug 1229500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229503">SUSE bug 1229503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229506">SUSE bug 1229506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229507">SUSE bug 1229507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229508">SUSE bug 1229508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229509">SUSE bug 1229509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229510">SUSE bug 1229510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229512">SUSE bug 1229512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229516">SUSE bug 1229516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229521">SUSE bug 1229521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229522">SUSE bug 1229522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229523">SUSE bug 1229523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229524">SUSE bug 1229524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229525">SUSE bug 1229525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229526">SUSE bug 1229526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229527">SUSE bug 1229527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229528">SUSE bug 1229528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229529">SUSE bug 1229529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229531">SUSE bug 1229531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229533">SUSE bug 1229533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229535">SUSE bug 1229535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229536">SUSE bug 1229536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229537">SUSE bug 1229537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229540">SUSE bug 1229540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229544">SUSE bug 1229544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229545">SUSE bug 1229545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229546">SUSE bug 1229546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229547">SUSE bug 1229547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229548">SUSE bug 1229548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229554">SUSE bug 1229554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229557">SUSE bug 1229557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229558">SUSE bug 1229558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229559">SUSE bug 1229559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229560">SUSE bug 1229560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229562">SUSE bug 1229562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229564">SUSE bug 1229564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229565">SUSE bug 1229565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229566">SUSE bug 1229566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229568">SUSE bug 1229568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229569">SUSE bug 1229569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229572">SUSE bug 1229572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229573">SUSE bug 1229573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229576">SUSE bug 1229576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229581">SUSE bug 1229581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229588">SUSE bug 1229588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229598">SUSE bug 1229598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229603">SUSE bug 1229603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229604">SUSE bug 1229604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229605">SUSE bug 1229605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229608">SUSE bug 1229608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229611">SUSE bug 1229611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229612">SUSE bug 1229612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229613">SUSE bug 1229613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229614">SUSE bug 1229614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229615">SUSE bug 1229615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229616">SUSE bug 1229616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229617">SUSE bug 1229617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229620">SUSE bug 1229620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229622">SUSE bug 1229622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229623">SUSE bug 1229623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229624">SUSE bug 1229624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229625">SUSE bug 1229625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229626">SUSE bug 1229626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229628">SUSE bug 1229628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229629">SUSE bug 1229629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229630">SUSE bug 1229630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229631">SUSE bug 1229631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229632">SUSE bug 1229632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229635">SUSE bug 1229635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229636">SUSE bug 1229636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229637">SUSE bug 1229637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229638">SUSE bug 1229638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229639">SUSE bug 1229639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229641">SUSE bug 1229641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229642">SUSE bug 1229642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229643">SUSE bug 1229643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229645">SUSE bug 1229645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229657">SUSE bug 1229657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229658">SUSE bug 1229658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229662">SUSE bug 1229662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229664">SUSE bug 1229664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229707">SUSE bug 1229707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229739">SUSE bug 1229739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229743">SUSE bug 1229743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229746">SUSE bug 1229746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229754">SUSE bug 1229754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229755">SUSE bug 1229755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229756">SUSE bug 1229756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229759">SUSE bug 1229759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229761">SUSE bug 1229761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229767">SUSE bug 1229767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229768">SUSE bug 1229768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229781">SUSE bug 1229781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229784">SUSE bug 1229784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229787">SUSE bug 1229787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229788">SUSE bug 1229788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229789">SUSE bug 1229789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229792">SUSE bug 1229792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229820">SUSE bug 1229820</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4441/">CVE-2021-4441 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4441">CVE-2021-4441 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47106/">CVE-2021-47106 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47106">CVE-2021-47106 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47517/">CVE-2021-47517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47517">CVE-2021-47517 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47546/">CVE-2021-47546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47546">CVE-2021-47546 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38457/">CVE-2022-38457 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38457">CVE-2022-38457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40133/">CVE-2022-40133 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40133">CVE-2022-40133 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48645/">CVE-2022-48645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48645">CVE-2022-48645 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48706/">CVE-2022-48706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48706">CVE-2022-48706 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48808/">CVE-2022-48808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48808">CVE-2022-48808 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48865/">CVE-2022-48865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48865">CVE-2022-48865 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48868/">CVE-2022-48868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48868">CVE-2022-48868 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48869/">CVE-2022-48869 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48869">CVE-2022-48869 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48870/">CVE-2022-48870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48870">CVE-2022-48870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48871/">CVE-2022-48871 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48871">CVE-2022-48871 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48872/">CVE-2022-48872 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48872">CVE-2022-48872 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48873/">CVE-2022-48873 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48873">CVE-2022-48873 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48875/">CVE-2022-48875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48875">CVE-2022-48875 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48878/">CVE-2022-48878 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48878">CVE-2022-48878 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48880/">CVE-2022-48880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48880">CVE-2022-48880 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48881/">CVE-2022-48881 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48881">CVE-2022-48881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48882/">CVE-2022-48882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48882">CVE-2022-48882 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48883/">CVE-2022-48883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48883">CVE-2022-48883 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48884/">CVE-2022-48884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48884">CVE-2022-48884 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48885/">CVE-2022-48885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48885">CVE-2022-48885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48886/">CVE-2022-48886 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48886">CVE-2022-48886 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48887/">CVE-2022-48887 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48887">CVE-2022-48887 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48888/">CVE-2022-48888 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48888">CVE-2022-48888 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48889/">CVE-2022-48889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48889">CVE-2022-48889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48890/">CVE-2022-48890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48890">CVE-2022-48890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48891/">CVE-2022-48891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48891">CVE-2022-48891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48893/">CVE-2022-48893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48893">CVE-2022-48893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48896/">CVE-2022-48896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48896">CVE-2022-48896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48898/">CVE-2022-48898 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48898">CVE-2022-48898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48899/">CVE-2022-48899 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48899">CVE-2022-48899 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48903/">CVE-2022-48903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48903">CVE-2022-48903 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48904/">CVE-2022-48904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48904">CVE-2022-48904 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48905/">CVE-2022-48905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48905">CVE-2022-48905 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48906/">CVE-2022-48906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48906">CVE-2022-48906 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48907/">CVE-2022-48907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48907">CVE-2022-48907 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48909/">CVE-2022-48909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48909">CVE-2022-48909 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48910/">CVE-2022-48910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48910">CVE-2022-48910 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48912/">CVE-2022-48912 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48912">CVE-2022-48912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48913/">CVE-2022-48913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48913">CVE-2022-48913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48914/">CVE-2022-48914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48914">CVE-2022-48914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48915/">CVE-2022-48915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48915">CVE-2022-48915 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48916/">CVE-2022-48916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48916">CVE-2022-48916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48917/">CVE-2022-48917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48917">CVE-2022-48917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48918/">CVE-2022-48918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48918">CVE-2022-48918 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48919/">CVE-2022-48919 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48919">CVE-2022-48919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48920/">CVE-2022-48920 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48920">CVE-2022-48920 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48921/">CVE-2022-48921 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48921">CVE-2022-48921 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48923/">CVE-2022-48923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48923">CVE-2022-48923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48924/">CVE-2022-48924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48924">CVE-2022-48924 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48925/">CVE-2022-48925 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48925">CVE-2022-48925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48926/">CVE-2022-48926 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48926">CVE-2022-48926 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48927/">CVE-2022-48927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48927">CVE-2022-48927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48928/">CVE-2022-48928 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48928">CVE-2022-48928 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48929/">CVE-2022-48929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48929">CVE-2022-48929 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48930/">CVE-2022-48930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48930">CVE-2022-48930 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48931/">CVE-2022-48931 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48931">CVE-2022-48931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48932/">CVE-2022-48932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48932">CVE-2022-48932 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48934/">CVE-2022-48934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48934">CVE-2022-48934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48937/">CVE-2022-48937 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48937">CVE-2022-48937 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48938/">CVE-2022-48938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48938">CVE-2022-48938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48939/">CVE-2022-48939 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48939">CVE-2022-48939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48940/">CVE-2022-48940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48940">CVE-2022-48940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48941/">CVE-2022-48941 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48941">CVE-2022-48941 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48942/">CVE-2022-48942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48942">CVE-2022-48942 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48943/">CVE-2022-48943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48943">CVE-2022-48943 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3610/">CVE-2023-3610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3610">CVE-2023-3610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52458/">CVE-2023-52458 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52458">CVE-2023-52458 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52489/">CVE-2023-52489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52489">CVE-2023-52489 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52498/">CVE-2023-52498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52498">CVE-2023-52498 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52581/">CVE-2023-52581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52581">CVE-2023-52581 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52859/">CVE-2023-52859 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52859">CVE-2023-52859 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52887/">CVE-2023-52887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52887">CVE-2023-52887 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52889/">CVE-2023-52889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52889">CVE-2023-52889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52893/">CVE-2023-52893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52893">CVE-2023-52893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52894/">CVE-2023-52894 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52894">CVE-2023-52894 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52896/">CVE-2023-52896 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52896">CVE-2023-52896 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52898/">CVE-2023-52898 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52898">CVE-2023-52898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52899/">CVE-2023-52899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52899">CVE-2023-52899 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52900/">CVE-2023-52900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52900">CVE-2023-52900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52901/">CVE-2023-52901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52901">CVE-2023-52901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52904/">CVE-2023-52904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52904">CVE-2023-52904 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52905/">CVE-2023-52905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52905">CVE-2023-52905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52906/">CVE-2023-52906 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52906">CVE-2023-52906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52907/">CVE-2023-52907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52907">CVE-2023-52907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52908/">CVE-2023-52908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52908">CVE-2023-52908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52909/">CVE-2023-52909 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52909">CVE-2023-52909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52910/">CVE-2023-52910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52910">CVE-2023-52910 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52911/">CVE-2023-52911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52911">CVE-2023-52911 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52912/">CVE-2023-52912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52912">CVE-2023-52912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52913/">CVE-2023-52913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52913">CVE-2023-52913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26631/">CVE-2024-26631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26631">CVE-2024-26631 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26668/">CVE-2024-26668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26668">CVE-2024-26668 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26669/">CVE-2024-26669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26669">CVE-2024-26669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26677/">CVE-2024-26677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26677">CVE-2024-26677 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26735/">CVE-2024-26735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26735">CVE-2024-26735 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26808/">CVE-2024-26808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26808">CVE-2024-26808 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26812/">CVE-2024-26812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26812">CVE-2024-26812 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26835/">CVE-2024-26835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26835">CVE-2024-26835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26851/">CVE-2024-26851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26851">CVE-2024-26851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27010/">CVE-2024-27010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27010">CVE-2024-27010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27011/">CVE-2024-27011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27011">CVE-2024-27011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27016/">CVE-2024-27016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27016">CVE-2024-27016 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27024/">CVE-2024-27024 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27024">CVE-2024-27024 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27079/">CVE-2024-27079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27079">CVE-2024-27079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27403/">CVE-2024-27403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27403">CVE-2024-27403 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31076/">CVE-2024-31076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31076">CVE-2024-31076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35897/">CVE-2024-35897 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35897">CVE-2024-35897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35902/">CVE-2024-35902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35902">CVE-2024-35902 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35945/">CVE-2024-35945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35945">CVE-2024-35945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35971/">CVE-2024-35971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35971">CVE-2024-35971 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36009/">CVE-2024-36009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36009">CVE-2024-36009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36013/">CVE-2024-36013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36013">CVE-2024-36013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36270/">CVE-2024-36270 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36270">CVE-2024-36270 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-36286/">CVE-2024-36286 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36286">CVE-2024-36286 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36489/">CVE-2024-36489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36489">CVE-2024-36489 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36929/">CVE-2024-36929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36929">CVE-2024-36929 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-36933/">CVE-2024-36933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36933">CVE-2024-36933 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36936/">CVE-2024-36936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36936">CVE-2024-36936 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36962/">CVE-2024-36962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36962">CVE-2024-36962 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38554/">CVE-2024-38554 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38554">CVE-2024-38554 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38602/">CVE-2024-38602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38602">CVE-2024-38602 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38662/">CVE-2024-38662 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38662">CVE-2024-38662 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-39489/">CVE-2024-39489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39489">CVE-2024-39489 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40905/">CVE-2024-40905 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40905">CVE-2024-40905 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40978/">CVE-2024-40978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40978">CVE-2024-40978 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40980/">CVE-2024-40980 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40980">CVE-2024-40980 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40995/">CVE-2024-40995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40995">CVE-2024-40995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41000/">CVE-2024-41000 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41000">CVE-2024-41000 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41007/">CVE-2024-41007 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41007">CVE-2024-41007 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41009/">CVE-2024-41009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41009">CVE-2024-41009 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41011/">CVE-2024-41011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41011">CVE-2024-41011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41016/">CVE-2024-41016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41016">CVE-2024-41016 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41020/">CVE-2024-41020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41020">CVE-2024-41020 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41022/">CVE-2024-41022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41022">CVE-2024-41022 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41035/">CVE-2024-41035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41035">CVE-2024-41035 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41036/">CVE-2024-41036 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41036">CVE-2024-41036 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41038/">CVE-2024-41038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41038">CVE-2024-41038 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41039/">CVE-2024-41039 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41039">CVE-2024-41039 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41042/">CVE-2024-41042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41042">CVE-2024-41042 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41045/">CVE-2024-41045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41045">CVE-2024-41045 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41056/">CVE-2024-41056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41056">CVE-2024-41056 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41060/">CVE-2024-41060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41060">CVE-2024-41060 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41062/">CVE-2024-41062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41062">CVE-2024-41062 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41065/">CVE-2024-41065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41065">CVE-2024-41065 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41068/">CVE-2024-41068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41068">CVE-2024-41068 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41073/">CVE-2024-41073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41073">CVE-2024-41073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41079/">CVE-2024-41079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41079">CVE-2024-41079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41080/">CVE-2024-41080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41080">CVE-2024-41080 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41087/">CVE-2024-41087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41087">CVE-2024-41087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41088/">CVE-2024-41088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41088">CVE-2024-41088 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41089/">CVE-2024-41089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41089">CVE-2024-41089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41092/">CVE-2024-41092 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41092">CVE-2024-41092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41093/">CVE-2024-41093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41093">CVE-2024-41093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41095/">CVE-2024-41095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41095">CVE-2024-41095 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41097/">CVE-2024-41097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41097">CVE-2024-41097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41098/">CVE-2024-41098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41098">CVE-2024-41098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42069/">CVE-2024-42069 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42069">CVE-2024-42069 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42074/">CVE-2024-42074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42074">CVE-2024-42074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42076/">CVE-2024-42076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42076">CVE-2024-42076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42077/">CVE-2024-42077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42077">CVE-2024-42077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42080/">CVE-2024-42080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42080">CVE-2024-42080 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42082/">CVE-2024-42082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42082">CVE-2024-42082 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42085/">CVE-2024-42085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42085">CVE-2024-42085 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42086/">CVE-2024-42086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42086">CVE-2024-42086 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-42087/">CVE-2024-42087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42087">CVE-2024-42087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42089/">CVE-2024-42089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42089">CVE-2024-42089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42090/">CVE-2024-42090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42090">CVE-2024-42090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42092/">CVE-2024-42092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42092">CVE-2024-42092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42095/">CVE-2024-42095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42095">CVE-2024-42095 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42097/">CVE-2024-42097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42097">CVE-2024-42097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42098/">CVE-2024-42098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42098">CVE-2024-42098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42101/">CVE-2024-42101 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42101">CVE-2024-42101 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42104/">CVE-2024-42104 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42104">CVE-2024-42104 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42106/">CVE-2024-42106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42106">CVE-2024-42106 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42107/">CVE-2024-42107 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42107">CVE-2024-42107 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42110/">CVE-2024-42110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42110">CVE-2024-42110 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42114/">CVE-2024-42114 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42114">CVE-2024-42114 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42115/">CVE-2024-42115 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42115">CVE-2024-42115 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42119/">CVE-2024-42119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42119">CVE-2024-42119 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42120/">CVE-2024-42120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42120">CVE-2024-42120 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42121/">CVE-2024-42121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42121">CVE-2024-42121 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42126/">CVE-2024-42126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42126">CVE-2024-42126 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42127/">CVE-2024-42127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42127">CVE-2024-42127 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42130/">CVE-2024-42130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42130">CVE-2024-42130 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42137/">CVE-2024-42137 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42137">CVE-2024-42137 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42139/">CVE-2024-42139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42139">CVE-2024-42139 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42142/">CVE-2024-42142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42142">CVE-2024-42142 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42143/">CVE-2024-42143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42143">CVE-2024-42143 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42148/">CVE-2024-42148 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42148">CVE-2024-42148 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42152/">CVE-2024-42152 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42152">CVE-2024-42152 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42155/">CVE-2024-42155 at SUSE</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42155">CVE-2024-42155 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42156/">CVE-2024-42156 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42156">CVE-2024-42156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42157/">CVE-2024-42157 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42157">CVE-2024-42157 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42158/">CVE-2024-42158 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42158">CVE-2024-42158 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42162/">CVE-2024-42162 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42162">CVE-2024-42162 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42223/">CVE-2024-42223 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42223">CVE-2024-42223 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42225/">CVE-2024-42225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42225">CVE-2024-42225 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42228/">CVE-2024-42228 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42228">CVE-2024-42228 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42229/">CVE-2024-42229 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42229">CVE-2024-42229 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42230/">CVE-2024-42230 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42230">CVE-2024-42230 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42232/">CVE-2024-42232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42232">CVE-2024-42232 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42236/">CVE-2024-42236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42236">CVE-2024-42236 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42237/">CVE-2024-42237 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42237">CVE-2024-42237 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42238/">CVE-2024-42238 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42238">CVE-2024-42238 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42239/">CVE-2024-42239 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42239">CVE-2024-42239 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42240/">CVE-2024-42240 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42240">CVE-2024-42240 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42244/">CVE-2024-42244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42244">CVE-2024-42244 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42246/">CVE-2024-42246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42246">CVE-2024-42246 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42247/">CVE-2024-42247 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42247">CVE-2024-42247 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-42268/">CVE-2024-42268 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42268">CVE-2024-42268 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42271/">CVE-2024-42271 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42271">CVE-2024-42271 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42274/">CVE-2024-42274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42274">CVE-2024-42274 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42276/">CVE-2024-42276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42276">CVE-2024-42276 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42277/">CVE-2024-42277 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42277">CVE-2024-42277 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42280/">CVE-2024-42280 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42280">CVE-2024-42280 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42281/">CVE-2024-42281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42281">CVE-2024-42281 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42283/">CVE-2024-42283 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42283">CVE-2024-42283 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42284/">CVE-2024-42284 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42284">CVE-2024-42284 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42285/">CVE-2024-42285 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42285">CVE-2024-42285 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42286/">CVE-2024-42286 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42286">CVE-2024-42286 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42287/">CVE-2024-42287 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42287">CVE-2024-42287 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42288/">CVE-2024-42288 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42288">CVE-2024-42288 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42289/">CVE-2024-42289 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42289">CVE-2024-42289 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42291/">CVE-2024-42291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42291">CVE-2024-42291 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42292/">CVE-2024-42292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42292">CVE-2024-42292 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42295/">CVE-2024-42295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42295">CVE-2024-42295 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-42301/">CVE-2024-42301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42301">CVE-2024-42301 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42302/">CVE-2024-42302 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42302">CVE-2024-42302 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42308/">CVE-2024-42308 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42308">CVE-2024-42308 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42309/">CVE-2024-42309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42309">CVE-2024-42309 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42310/">CVE-2024-42310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42310">CVE-2024-42310 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42311/">CVE-2024-42311 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42311">CVE-2024-42311 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42312/">CVE-2024-42312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42312">CVE-2024-42312 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42313/">CVE-2024-42313 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42313">CVE-2024-42313 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42315/">CVE-2024-42315 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42315">CVE-2024-42315 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42318/">CVE-2024-42318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42318">CVE-2024-42318 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42319/">CVE-2024-42319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42319">CVE-2024-42319 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42320/">CVE-2024-42320 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42320">CVE-2024-42320 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42322/">CVE-2024-42322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42322">CVE-2024-42322 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43816/">CVE-2024-43816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43816">CVE-2024-43816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43818/">CVE-2024-43818 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43818">CVE-2024-43818 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43819/">CVE-2024-43819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43819">CVE-2024-43819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43821/">CVE-2024-43821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43821">CVE-2024-43821 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43823/">CVE-2024-43823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43823">CVE-2024-43823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43829/">CVE-2024-43829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43829">CVE-2024-43829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43830/">CVE-2024-43830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43830">CVE-2024-43830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43831/">CVE-2024-43831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43831">CVE-2024-43831 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43834/">CVE-2024-43834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43834">CVE-2024-43834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43837/">CVE-2024-43837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43837">CVE-2024-43837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43839/">CVE-2024-43839 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43839">CVE-2024-43839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43841/">CVE-2024-43841 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43841">CVE-2024-43841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43842/">CVE-2024-43842 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43842">CVE-2024-43842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43846/">CVE-2024-43846 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43846">CVE-2024-43846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43849/">CVE-2024-43849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43849">CVE-2024-43849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43853/">CVE-2024-43853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43853">CVE-2024-43853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43854/">CVE-2024-43854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43854">CVE-2024-43854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43856/">CVE-2024-43856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43856">CVE-2024-43856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43858/">CVE-2024-43858 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43858">CVE-2024-43858 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43860/">CVE-2024-43860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43860">CVE-2024-43860 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43861/">CVE-2024-43861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43861">CVE-2024-43861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43863/">CVE-2024-43863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43863">CVE-2024-43863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43866/">CVE-2024-43866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43866">CVE-2024-43866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43867/">CVE-2024-43867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43867">CVE-2024-43867 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43871/">CVE-2024-43871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43871">CVE-2024-43871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43872/">CVE-2024-43872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43872">CVE-2024-43872 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43873/">CVE-2024-43873 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43873">CVE-2024-43873 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43879/">CVE-2024-43879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43879">CVE-2024-43879 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43880/">CVE-2024-43880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43880">CVE-2024-43880 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-43882/">CVE-2024-43882 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43882">CVE-2024-43882 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43883/">CVE-2024-43883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43883">CVE-2024-43883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43884/">CVE-2024-43884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43884">CVE-2024-43884 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43889/">CVE-2024-43889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43889">CVE-2024-43889 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43892/">CVE-2024-43892 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43892">CVE-2024-43892 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43893/">CVE-2024-43893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43893">CVE-2024-43893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43894/">CVE-2024-43894 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43894">CVE-2024-43894 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43895/">CVE-2024-43895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43895">CVE-2024-43895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43899/">CVE-2024-43899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43899">CVE-2024-43899 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-43900/">CVE-2024-43900 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43900">CVE-2024-43900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43902/">CVE-2024-43902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43902">CVE-2024-43902 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43903/">CVE-2024-43903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43903">CVE-2024-43903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43904/">CVE-2024-43904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43904">CVE-2024-43904 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43905/">CVE-2024-43905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43905">CVE-2024-43905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43907/">CVE-2024-43907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43907">CVE-2024-43907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43908/">CVE-2024-43908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43908">CVE-2024-43908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43909/">CVE-2024-43909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43909">CVE-2024-43909 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44938/">CVE-2024-44938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44938">CVE-2024-44938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44939/">CVE-2024-44939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44939">CVE-2024-44939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44947/">CVE-2024-44947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44947">CVE-2024-44947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942301" comment="cluster-md-kmp-rt-5.14.21-150500.13.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942302" comment="dlm-kmp-rt-5.14.21-150500.13.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942303" comment="gfs2-kmp-rt-5.14.21-150500.13.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942304" comment="kernel-devel-rt-5.14.21-150500.13.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942305" comment="kernel-rt-5.14.21-150500.13.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942306" comment="kernel-rt-devel-5.14.21-150500.13.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942307" comment="kernel-rt-extra-5.14.21-150500.13.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942308" comment="kernel-rt-livepatch-5.14.21-150500.13.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942309" comment="kernel-rt-livepatch-devel-5.14.21-150500.13.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942310" comment="kernel-rt-optional-5.14.21-150500.13.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942311" comment="kernel-rt-vdso-5.14.21-150500.13.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942312" comment="kernel-rt_debug-5.14.21-150500.13.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942313" comment="kernel-rt_debug-devel-5.14.21-150500.13.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942314" comment="kernel-rt_debug-livepatch-devel-5.14.21-150500.13.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942315" comment="kernel-rt_debug-vdso-5.14.21-150500.13.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942316" comment="kernel-source-rt-5.14.21-150500.13.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942317" comment="kernel-syms-rt-5.14.21-150500.13.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942318" comment="kselftests-kmp-rt-5.14.21-150500.13.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942319" comment="ocfs2-kmp-rt-5.14.21-150500.13.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942320" comment="reiserfs-kmp-rt-5.14.21-150500.13.67.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4970" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218903" ref_url="https://bugzilla.suse.com/1218903" source="BUGZILLA"/>
		<reference ref_id="1218905" ref_url="https://bugzilla.suse.com/1218905" source="BUGZILLA"/>
		<reference ref_id="1218906" ref_url="https://bugzilla.suse.com/1218906" source="BUGZILLA"/>
		<reference ref_id="1218907" ref_url="https://bugzilla.suse.com/1218907" source="BUGZILLA"/>
		<reference ref_id="1218909" ref_url="https://bugzilla.suse.com/1218909" source="BUGZILLA"/>
		<reference ref_id="1218911" ref_url="https://bugzilla.suse.com/1218911" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918/" source="CVE"/>
		<reference ref_id="CVE-2024-20919" ref_url="https://www.suse.com/security/cve/CVE-2024-20919/" source="CVE"/>
		<reference ref_id="CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921/" source="CVE"/>
		<reference ref_id="CVE-2024-20926" ref_url="https://www.suse.com/security/cve/CVE-2024-20926/" source="CVE"/>
		<reference ref_id="CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945/" source="CVE"/>
		<reference ref_id="CVE-2024-20952" ref_url="https://www.suse.com/security/cve/CVE-2024-20952/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017851.html" source="SUSE-SU"/>
		<description>
This update for java-11-openjdk fixes the following issues:

Updated to version 11.0.22 (January 2024 CPU):

  - CVE-2024-20918: Fixed an out of bounds access in the Hotspot JVM
    due to a missing bounds check (bsc#1218907).
  - CVE-2024-20919: Fixed a sandbox bypass in the Hotspot JVM class
    file verifier (bsc#1218903).
  - CVE-2024-20921: Fixed an incorrect optimization in the Hotspot JVM
    that could lead to corruption of JVM memory (bsc#1218905).
  - CVE-2024-20926: Fixed arbitrary Java code execution in Nashorn (bsc#1218906).
  - CVE-2024-20945: Fixed a potential private key leak through debug
    logs (bsc#1218909).
  - CVE-2024-20952: Fixed an RSA padding issue and timing side-channel
    attack against TLS (bsc#1218911).

Find the full release notes at:

https://mail.openjdk.org/pipermail/jdk-updates-dev/2024-January/029215.html
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2024-02-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218903">SUSE bug 1218903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218905">SUSE bug 1218905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218906">SUSE bug 1218906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218907">SUSE bug 1218907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218909">SUSE bug 1218909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218911">SUSE bug 1218911</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20919/">CVE-2024-20919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20919">CVE-2024-20919 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20926/">CVE-2024-20926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20926">CVE-2024-20926 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20952/">CVE-2024-20952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009845299" comment="java-11-openjdk-11.0.22.0-150000.3.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845300" comment="java-11-openjdk-demo-11.0.22.0-150000.3.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845301" comment="java-11-openjdk-devel-11.0.22.0-150000.3.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845302" comment="java-11-openjdk-headless-11.0.22.0-150000.3.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845303" comment="java-11-openjdk-javadoc-11.0.22.0-150000.3.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845304" comment="java-11-openjdk-jmods-11.0.22.0-150000.3.110.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845305" comment="java-11-openjdk-src-11.0.22.0-150000.3.110.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4971" version="1" class="patch">
	<metadata>
		<title>Security update for libpcap (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230020" ref_url="https://bugzilla.suse.com/1230020" source="BUGZILLA"/>
		<reference ref_id="1230034" ref_url="https://bugzilla.suse.com/1230034" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-7256" ref_url="https://www.suse.com/security/cve/CVE-2023-7256/" source="CVE"/>
		<reference ref_id="CVE-2024-8006" ref_url="https://www.suse.com/security/cve/CVE-2024-8006/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036856.html" source="SUSE-SU"/>
		<description>
This update for libpcap fixes the following issues:

- CVE-2024-8006: NULL pointer dereference in function pcap_findalldevs_ex(). (bsc#1230034)
- CVE-2023-7256: double free via struct addrinfo in function sock_initaddress(). (bsc#1230020) 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-11"/>
	<updated date="2024-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1230020">SUSE bug 1230020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230034">SUSE bug 1230034</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-7256/">CVE-2023-7256 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7256">CVE-2023-7256 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-8006/">CVE-2024-8006 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8006">CVE-2024-8006 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942321" comment="libpcap-devel-1.10.1-150400.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942322" comment="libpcap-devel-32bit-1.10.1-150400.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942323" comment="libpcap-devel-static-1.10.1-150400.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942324" comment="libpcap1-1.10.1-150400.3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942325" comment="libpcap1-32bit-1.10.1-150400.3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4972" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230093" ref_url="https://bugzilla.suse.com/1230093" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-8096" ref_url="https://www.suse.com/security/cve/CVE-2024-8096/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036855.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2024-8096: OCSP stapling bypass with GnuTLS. (bsc#1230093)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-11"/>
	<updated date="2024-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1230093">SUSE bug 1230093</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8096/">CVE-2024-8096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8096">CVE-2024-8096 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942326" comment="curl-8.0.1-150400.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942327" comment="libcurl-devel-8.0.1-150400.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942328" comment="libcurl-devel-32bit-8.0.1-150400.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942329" comment="libcurl4-8.0.1-150400.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942330" comment="libcurl4-32bit-8.0.1-150400.5.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4973" version="1" class="patch">
	<metadata>
		<title>Security update for go1.22 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218424" ref_url="https://bugzilla.suse.com/1218424" source="BUGZILLA"/>
		<reference ref_id="1230252" ref_url="https://bugzilla.suse.com/1230252" source="BUGZILLA"/>
		<reference ref_id="1230253" ref_url="https://bugzilla.suse.com/1230253" source="BUGZILLA"/>
		<reference ref_id="1230254" ref_url="https://bugzilla.suse.com/1230254" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-34155" ref_url="https://www.suse.com/security/cve/CVE-2024-34155/" source="CVE"/>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<reference ref_id="CVE-2024-34158" ref_url="https://www.suse.com/security/cve/CVE-2024-34158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019426.html" source="SUSE-SU"/>
		<description>
This update for go1.22 fixes the following issues:

- Update go v1.22.7
- CVE-2024-34155: Fixed stack exhaustion in all Parse* functions. (bsc#1230252)
- CVE-2024-34156: Fixed stack exhaustion in Decoder.Decode. (bsc#1230253)
- CVE-2024-34158: Fixed stack exhaustion in Parse. (bsc#1230254)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218424">SUSE bug 1218424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230252">SUSE bug 1230252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230253">SUSE bug 1230253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230254">SUSE bug 1230254</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34155/">CVE-2024-34155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34155">CVE-2024-34155 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34158/">CVE-2024-34158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34158">CVE-2024-34158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942416" comment="go1.22-1.22.7-150000.1.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942417" comment="go1.22-doc-1.22.7-150000.1.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942418" comment="go1.22-race-1.22.7-150000.1.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4974" version="1" class="patch">
	<metadata>
		<title>Security update for go1.23 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229122" ref_url="https://bugzilla.suse.com/1229122" source="BUGZILLA"/>
		<reference ref_id="1230252" ref_url="https://bugzilla.suse.com/1230252" source="BUGZILLA"/>
		<reference ref_id="1230253" ref_url="https://bugzilla.suse.com/1230253" source="BUGZILLA"/>
		<reference ref_id="1230254" ref_url="https://bugzilla.suse.com/1230254" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-34155" ref_url="https://www.suse.com/security/cve/CVE-2024-34155/" source="CVE"/>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<reference ref_id="CVE-2024-34158" ref_url="https://www.suse.com/security/cve/CVE-2024-34158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019425.html" source="SUSE-SU"/>
		<description>
This update for go1.23 fixes the following issues:

- Update go v1.23.1
- CVE-2024-34155: Fixed stack exhaustion in all Parse* functions. (bsc#1230252)
- CVE-2024-34156: Fixed stack exhaustion in Decoder.Decode. (bsc#1230253)
- CVE-2024-34158: Fixed stack exhaustion in Parse. (bsc#1230254)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1229122">SUSE bug 1229122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230252">SUSE bug 1230252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230253">SUSE bug 1230253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230254">SUSE bug 1230254</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34155/">CVE-2024-34155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34155">CVE-2024-34155 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34158/">CVE-2024-34158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34158">CVE-2024-34158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942419" comment="go1.23-1.23.1-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942420" comment="go1.23-doc-1.23.1-150000.1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942421" comment="go1.23-race-1.23.1-150000.1.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4975" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229930" ref_url="https://bugzilla.suse.com/1229930" source="BUGZILLA"/>
		<reference ref_id="1229931" ref_url="https://bugzilla.suse.com/1229931" source="BUGZILLA"/>
		<reference ref_id="1229932" ref_url="https://bugzilla.suse.com/1229932" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-45490" ref_url="https://www.suse.com/security/cve/CVE-2024-45490/" source="CVE"/>
		<reference ref_id="CVE-2024-45491" ref_url="https://www.suse.com/security/cve/CVE-2024-45491/" source="CVE"/>
		<reference ref_id="CVE-2024-45492" ref_url="https://www.suse.com/security/cve/CVE-2024-45492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019424.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2024-45492: integer overflow in function nextScaffoldPart. (bsc#1229932)
- CVE-2024-45491: integer overflow in dtdCopy. (bsc#1229931)
- CVE-2024-45490: negative length for XML_ParseBuffer not rejected. (bsc#1229930)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1229930">SUSE bug 1229930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229931">SUSE bug 1229931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229932">SUSE bug 1229932</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45490/">CVE-2024-45490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45490">CVE-2024-45490 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45491/">CVE-2024-45491 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45491">CVE-2024-45491 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45492/">CVE-2024-45492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45492">CVE-2024-45492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942422" comment="expat-2.4.4-150400.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942423" comment="libexpat-devel-2.4.4-150400.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942424" comment="libexpat-devel-32bit-2.4.4-150400.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942425" comment="libexpat1-2.4.4-150400.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942426" comment="libexpat1-32bit-2.4.4-150400.3.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4976" version="1" class="patch">
	<metadata>
		<title>Security update for containerd (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1200528" ref_url="https://bugzilla.suse.com/1200528" source="BUGZILLA"/>
		<reference ref_id="1217070" ref_url="https://bugzilla.suse.com/1217070" source="BUGZILLA"/>
		<reference ref_id="1228553" ref_url="https://bugzilla.suse.com/1228553" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1996" ref_url="https://www.suse.com/security/cve/CVE-2022-1996/" source="CVE"/>
		<reference ref_id="CVE-2023-45142" ref_url="https://www.suse.com/security/cve/CVE-2023-45142/" source="CVE"/>
		<reference ref_id="CVE-2023-47108" ref_url="https://www.suse.com/security/cve/CVE-2023-47108/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019420.html" source="SUSE-SU"/>
		<description>
This update for containerd fixes the following issues:

- Update to containerd v1.7.21
- CVE-2023-47108: Fixed DoS vulnerability in otelgrpc (uncontrolled resource consumption) due to unbound cardinality metrics. (bsc#1217070)
- CVE-2023-45142: Fixed DoS vulnerability in otelhttp. (bsc#1228553)
  		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1200528">SUSE bug 1200528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217070">SUSE bug 1217070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228553">SUSE bug 1228553</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1996/">CVE-2022-1996 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1996">CVE-2022-1996 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45142/">CVE-2023-45142 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45142">CVE-2023-45142 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47108/">CVE-2023-47108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47108">CVE-2023-47108 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942427" comment="containerd-1.7.21-150000.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942428" comment="containerd-ctr-1.7.21-150000.117.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942429" comment="containerd-devel-1.7.21-150000.117.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4977" version="1" class="patch">
	<metadata>
		<title>Security update for runc (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230092" ref_url="https://bugzilla.suse.com/1230092" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-45310" ref_url="https://www.suse.com/security/cve/CVE-2024-45310/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019419.html" source="SUSE-SU"/>
		<description>
This update for runc fixes the following issues:

- Update to runc v1.1.14
- CVE-2024-45310: Fixed an issue where runc can be tricked into creating empty files/directories on host. (bsc#1230092)
  		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2024-09-12"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1230092">SUSE bug 1230092</bugzilla>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-45310/">CVE-2024-45310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45310">CVE-2024-45310 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942430" comment="runc-1.1.14-150000.70.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4978" version="1" class="patch">
	<metadata>
		<title>Security update for python-uamqp (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219409" ref_url="https://bugzilla.suse.com/1219409" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21646" ref_url="https://www.suse.com/security/cve/CVE-2024-21646/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017859.html" source="SUSE-SU"/>
		<description>
This update for python-uamqp fixes the following issues:

- CVE-2024-21646: Fix integer overflow which may cause remote code execution (bsc#1219409).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-05"/>
	<updated date="2024-02-05"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1219409">SUSE bug 1219409</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21646/">CVE-2024-21646 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21646">CVE-2024-21646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845595" comment="python3-uamqp-1.5.3-150100.4.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4979" version="1" class="patch">
	<metadata>
		<title>Security update for java-17-openjdk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218903" ref_url="https://bugzilla.suse.com/1218903" source="BUGZILLA"/>
		<reference ref_id="1218905" ref_url="https://bugzilla.suse.com/1218905" source="BUGZILLA"/>
		<reference ref_id="1218907" ref_url="https://bugzilla.suse.com/1218907" source="BUGZILLA"/>
		<reference ref_id="1218908" ref_url="https://bugzilla.suse.com/1218908" source="BUGZILLA"/>
		<reference ref_id="1218909" ref_url="https://bugzilla.suse.com/1218909" source="BUGZILLA"/>
		<reference ref_id="1218911" ref_url="https://bugzilla.suse.com/1218911" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918/" source="CVE"/>
		<reference ref_id="CVE-2024-20919" ref_url="https://www.suse.com/security/cve/CVE-2024-20919/" source="CVE"/>
		<reference ref_id="CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921/" source="CVE"/>
		<reference ref_id="CVE-2024-20932" ref_url="https://www.suse.com/security/cve/CVE-2024-20932/" source="CVE"/>
		<reference ref_id="CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945/" source="CVE"/>
		<reference ref_id="CVE-2024-20952" ref_url="https://www.suse.com/security/cve/CVE-2024-20952/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017858.html" source="SUSE-SU"/>
		<description>
This update for java-17-openjdk fixes the following issues:

Updated to version 17.0.10 (January 2024 CPU):

  - CVE-2024-20918: Fixed an out of bounds access in the Hotspot JVM
    due to a missing bounds check (bsc#1218907).
  - CVE-2024-20919: Fixed a sandbox bypass in the Hotspot JVM class
    file verifier (bsc#1218903).
  - CVE-2024-20921: Fixed an incorrect optimization in the Hotspot JVM
    that could lead to corruption of JVM memory (bsc#1218905).
  - CVE-2024-20932: Fixed an incorrect handling of ZIP files with
    duplicate entries (bsc#1218908).
  - CVE-2024-20945: Fixed a potential private key leak through debug
    logs (bsc#1218909).
  - CVE-2024-20952: Fixed an RSA padding issue and timing side-channel
    attack against TLS (bsc#1218911).

Find the full release notes at:

https://mail.openjdk.org/pipermail/jdk-updates-dev/2024-January/029089.html
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-05"/>
	<updated date="2024-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218903">SUSE bug 1218903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218905">SUSE bug 1218905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218907">SUSE bug 1218907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218908">SUSE bug 1218908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218909">SUSE bug 1218909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218911">SUSE bug 1218911</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20919/">CVE-2024-20919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20919">CVE-2024-20919 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20932/">CVE-2024-20932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20932">CVE-2024-20932 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20952/">CVE-2024-20952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009845596" comment="java-17-openjdk-17.0.10.0-150400.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845597" comment="java-17-openjdk-demo-17.0.10.0-150400.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845598" comment="java-17-openjdk-devel-17.0.10.0-150400.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845599" comment="java-17-openjdk-headless-17.0.10.0-150400.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845600" comment="java-17-openjdk-javadoc-17.0.10.0-150400.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845601" comment="java-17-openjdk-jmods-17.0.10.0-150400.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845602" comment="java-17-openjdk-src-17.0.10.0-150400.3.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4980" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220136" ref_url="https://bugzilla.suse.com/1220136" source="BUGZILLA"/>
		<reference ref_id="1224349" ref_url="https://bugzilla.suse.com/1224349" source="BUGZILLA"/>
		<reference ref_id="1225349" ref_url="https://bugzilla.suse.com/1225349" source="BUGZILLA"/>
		<reference ref_id="1226191" ref_url="https://bugzilla.suse.com/1226191" source="BUGZILLA"/>
		<reference ref_id="1226284" ref_url="https://bugzilla.suse.com/1226284" source="BUGZILLA"/>
		<reference ref_id="1226437" ref_url="https://bugzilla.suse.com/1226437" source="BUGZILLA"/>
		<reference ref_id="1226759" ref_url="https://bugzilla.suse.com/1226759" source="BUGZILLA"/>
		<reference ref_id="1226793" ref_url="https://bugzilla.suse.com/1226793" source="BUGZILLA"/>
		<reference ref_id="1226847" ref_url="https://bugzilla.suse.com/1226847" source="BUGZILLA"/>
		<reference ref_id="1226914" ref_url="https://bugzilla.suse.com/1226914" source="BUGZILLA"/>
		<reference ref_id="1227038" ref_url="https://bugzilla.suse.com/1227038" source="BUGZILLA"/>
		<reference ref_id="1227195" ref_url="https://bugzilla.suse.com/1227195" source="BUGZILLA"/>
		<reference ref_id="1227244" ref_url="https://bugzilla.suse.com/1227244" source="BUGZILLA"/>
		<reference ref_id="1227245" ref_url="https://bugzilla.suse.com/1227245" source="BUGZILLA"/>
		<reference ref_id="1227505" ref_url="https://bugzilla.suse.com/1227505" source="BUGZILLA"/>
		<reference ref_id="1227584" ref_url="https://bugzilla.suse.com/1227584" source="BUGZILLA"/>
		<reference ref_id="1227586" ref_url="https://bugzilla.suse.com/1227586" source="BUGZILLA"/>
		<reference ref_id="1227588" ref_url="https://bugzilla.suse.com/1227588" source="BUGZILLA"/>
		<reference ref_id="1227718" ref_url="https://bugzilla.suse.com/1227718" source="BUGZILLA"/>
		<reference ref_id="1227951" ref_url="https://bugzilla.suse.com/1227951" source="BUGZILLA"/>
		<reference ref_id="1228026" ref_url="https://bugzilla.suse.com/1228026" source="BUGZILLA"/>
		<reference ref_id="1228183" ref_url="https://bugzilla.suse.com/1228183" source="BUGZILLA"/>
		<reference ref_id="1228198" ref_url="https://bugzilla.suse.com/1228198" source="BUGZILLA"/>
		<reference ref_id="1228556" ref_url="https://bugzilla.suse.com/1228556" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45142" ref_url="https://www.suse.com/security/cve/CVE-2023-45142/" source="CVE"/>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3267-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036925.html" source="SUSE-SU"/>
		<description>
This update fixes the following issues:

golang-github-prometheus-prometheus:

- Security issues fixed:

  * CVE-2024-6104: Update go-retryablehttp to version 0.7.7 (bsc#1227038)
  * CVE-2023-45142: Updated otelhttp to version 0.46.1 (bsc#1228556)

- Require Go &gt; 1.20 for building
- Migrate from `disabled` to `manual` service mode
- Update to 2.45.6 (jsc#PED-3577):
  * Security fixes in dependencies
- Update to 2.45.5:
  * [BUGFIX] tsdb/agent: ensure that new series get written to WAL
    on rollback.
  * [BUGFIX] Remote write: Avoid a race condition when applying
    configuration.
- Update to 2.45.4:
  * [BUGFIX] Remote read: Release querier resources before encoding
    the results.
- Update to 2.45.3:
  * [BUGFIX] TSDB: Remove double memory snapshot on shutdown.
- Update to 2.45.2:
  * [BUGFIX] TSDB: Fix PostingsForMatchers race with creating new
    series.
- Update to 2.45.1:
  * [ENHANCEMENT] Hetzner SD: Support larger ID's that will be used
    by Hetzner in September.
  * [BUGFIX] Linode SD: Cast InstanceSpec values to int64 to avoid
    overflows on 386 architecture.
  * [BUGFIX] TSDB: Handle TOC parsing failures.

rhnlib:
    
- Version 5.0.4-0
  * Add the old TLS code for very old traditional clients still on
    python 2.7 (bsc#1228198)

spacecmd:

- Version 5.0.9-0
  * Update translation strings

uyuni-tools:

- Version 0.1.21-0
  * mgrpxy: Fix typo on Systemd template
- Version 0.1.20-0
  * Update the push tag to 5.0.1
  * mgrpxy: expose port on IPv6 network (bsc#1227951)
- Version 0.1.19-0
  * Skip updating Tomcat remote debug if conf file is not present
- Version 0.1.18-0
  * Setup Confidential Computing container during migration
    (bsc#1227588)
  * Add the /etc/uyuni/uyuni-tools.yaml path to the config help
  * Split systemd config files to not loose configuration at upgrade
    (bsc#1227718)
  * Use the same logic for image computation in mgradm and mgrpxy
    (bsc#1228026)
  * Allow building with different Helm and container default
    registry paths (bsc#1226191)
  * Fix recursion in mgradm upgrade podman list --help
  * Setup hub xmlrpc API service in migration to Podman (bsc#1227588)
  * Setup disabled hub xmlrpc API service in all cases (bsc#1227584)
  * Clean the inspection code to make it faster
  * Properly detect IPv6 enabled on Podman network (bsc#1224349)
  * Fix the log file path generation
  * Write scripts output to uyuni-tools.log file
  * Add uyuni-hubxml-rpc to the list of values in
    mgradm scale --help
  * Use path in mgradm support sql file input (bsc#1227505)
  * On Ubuntu build with go1.21 instead of go1.20
  * Enforce Cobbler setup (bsc#1226847)
  * Expose port on IPv6 network (bsc#1227951)
  * show output of podman image search --list-tags command
  * Implement mgrpxy support config command
  * During migration, ignore /etc/sysconfig/tomcat and
    /etc/tomcat/tomcat.conf (bsc#1228183)
  * During migration, remove java.annotation,com.sun.xml.bind and
    UseConcMarkSweepGC settings
  * Disable node exporter port for Kubernetes
  * Fix start, stop and restart in Kubernetes
  * Increase start timeout in Kubernetes
  * Fix traefik query
  * Fix password entry usability (bsc#1226437)
  * Add --prepare option to migrate command
  * Fix random error during installation of CA certificate
    (bsc#1227245)
  * Clarify and fix distro name guessing when not provided
    (bsc#1226284)
  * Replace not working Fatal error by plain error return
    (bsc#1220136)
  * Allow server installation with preexisting storage volumes
  * Do not report error when purging mounted volume (bsc#1225349)
  * Preserve PAGER settings from the host for interactive sql
    usage (bsc#1226914)
  * Add mgrpxy command to clear the Squid cache
  * Use local images for Confidential Computing and
    Hub containers (bsc#1227586)
- Version 0.1.17-0
  * Allow GPG files to be loaded from the local file (bsc#1227195)
- Version 0.1.16-0
  * Prefer local images in all migration steps (bsc#1227244)
- Version 0.1.15-0
  * Define --registry flag behaviour (bsc#1226793)
- Version 0.1.14-0
  * Do not rely on hardcoded registry, remove any FQDN
- Version 0.1.13-0
  * Fix mgradm support config tarball creation (bsc#1226759)
- Version 0.1.12-0
  * Detection of k8s on Proxy was wrongly influenced by Server
    setting

		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-17"/>
	<updated date="2024-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220136">SUSE bug 1220136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224349">SUSE bug 1224349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225349">SUSE bug 1225349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226191">SUSE bug 1226191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226284">SUSE bug 1226284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226437">SUSE bug 1226437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226759">SUSE bug 1226759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226793">SUSE bug 1226793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226847">SUSE bug 1226847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226914">SUSE bug 1226914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227038">SUSE bug 1227038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227195">SUSE bug 1227195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227244">SUSE bug 1227244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227245">SUSE bug 1227245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227505">SUSE bug 1227505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227584">SUSE bug 1227584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227586">SUSE bug 1227586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227588">SUSE bug 1227588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227718">SUSE bug 1227718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227951">SUSE bug 1227951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228026">SUSE bug 1228026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228183">SUSE bug 1228183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228198">SUSE bug 1228198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228556">SUSE bug 1228556</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45142/">CVE-2023-45142 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45142">CVE-2023-45142 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942837" comment="spacecmd-5.0.9-150000.3.124.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4981" version="1" class="patch">
	<metadata>
		<title>Security update for bouncycastle, jsch (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218134" ref_url="https://bugzilla.suse.com/1218134" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017866.html" source="SUSE-SU"/>
		<description>
This update for bouncycastle, jsch fixes the following issues:

- Updated jsch to version 0.2.15:

  - CVE-2023-48795: Fixed a prefix truncation issue that could lead to
    disclosure of sensitive information (bsc#1218134).

- Updated bouncycastle to version 1.77.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-05"/>
	<updated date="2024-02-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218134">SUSE bug 1218134</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009819305" comment="bouncycastle-1.77-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819306" comment="bouncycastle-javadoc-1.77-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819307" comment="bouncycastle-jmail-1.77-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819308" comment="bouncycastle-mail-1.77-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819309" comment="bouncycastle-pg-1.77-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819310" comment="bouncycastle-pkix-1.77-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819311" comment="bouncycastle-tls-1.77-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819312" comment="bouncycastle-util-1.77-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819313" comment="jsch-0.2.15-150200.11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819314" comment="jsch-demo-0.2.15-150200.11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009819315" comment="jsch-javadoc-0.2.15-150200.11.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4982" version="1" class="patch">
	<metadata>
		<title>Security update for golang-github-prometheus-prometheus (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1204023" ref_url="https://bugzilla.suse.com/1204023" source="BUGZILLA"/>
		<reference ref_id="1208298" ref_url="https://bugzilla.suse.com/1208298" source="BUGZILLA"/>
		<reference ref_id="1227038" ref_url="https://bugzilla.suse.com/1227038" source="BUGZILLA"/>
		<reference ref_id="1228556" ref_url="https://bugzilla.suse.com/1228556" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41715" ref_url="https://www.suse.com/security/cve/CVE-2022-41715/" source="CVE"/>
		<reference ref_id="CVE-2022-41723" ref_url="https://www.suse.com/security/cve/CVE-2022-41723/" source="CVE"/>
		<reference ref_id="CVE-2023-45142" ref_url="https://www.suse.com/security/cve/CVE-2023-45142/" source="CVE"/>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019440.html" source="SUSE-SU"/>
		<description>
This update for golang-github-prometheus-prometheus fixes the following issues:

- Require Go &gt; 1.20 for building

- Bump go-retryablehttp to version 0.7.7
  (CVE-2024-6104, bsc#1227038)
- Migrate from `disabled` to `manual` service mode
- Add0003-Bump-go-retryablehttp.patch
- Update to 2.45.6 (jsc#PED-3577):
  * Security fixes in dependencies
- Update to 2.45.5:
  * [BUGFIX] tsdb/agent: ensure that new series get written to WAL
    on rollback.
  * [BUGFIX] Remote write: Avoid a race condition when applying
    configuration.
- Update to 2.45.4:
  * [BUGFIX] Remote read: Release querier resources before encoding
    the results.
- Update to 2.45.3:
  * Security fixes in dependencies
  * [BUGFIX] TSDB: Remove double memory snapshot on shutdown.
- Update to 2.45.2:
  * Security fixes in dependencies
  * [SECURITY] Updated otelhttp to version 0.46.1
    (CVE-2023-45142, bsc#1228556)
  * [BUGFIX] TSDB: Fix PostingsForMatchers race with creating new
    series.
- Update to 2.45.1:
  * [ENHANCEMENT] Hetzner SD: Support larger ID's that will be used
    by Hetzner in September.
  * [BUGFIX] Linode SD: Cast InstanceSpec values to int64 to avoid
    overflows on 386 architecture.
  * [BUGFIX] TSDB: Handle TOC parsing failures.

- update to 2.45.0 (jsc#PED-5406):
  * [FEATURE] API: New limit parameter to limit the number of items
    returned by `/api/v1/status/tsdb` endpoint. 
  * [FEATURE] Config: Add limits to global config. 
  * [FEATURE] Consul SD: Added support for `path_prefix`. 
  * [FEATURE] Native histograms: Add option to scrape both classic
    and native histograms. 
  * [FEATURE] Native histograms: Added support for two more
    arithmetic operators `avg_over_time` and `sum_over_time`.
  * [FEATURE] Promtool: When providing the block id, only one block
    will be loaded and analyzed. 
  * [FEATURE] Remote-write: New Azure ad configuration to support
    remote writing directly to Azure Monitor workspace. 
  * [FEATURE] TSDB: Samples per chunk are now configurable with
    flag `storage.tsdb.samples-per-chunk`. By default set to its
    former value 120. 
  * [ENHANCEMENT] Native histograms: bucket size can now be limited
    to avoid scrape fails. 
  * [ENHANCEMENT] TSDB: Dropped series are now deleted from the WAL
    sooner. 
  * [BUGFIX] Native histograms: ChunkSeries iterator now checks if
    a new sample can be appended to the open chunk. 
  * [BUGFIX] Native histograms: Fix Histogram Appender
    `Appendable()` segfault. 
  * [BUGFIX] Native histograms: Fix setting reset header to gauge
    histograms in seriesToChunkEncoder. 
  * [BUGFIX] TSDB: Tombstone intervals are not modified after Get()
    call. 
  * [BUGFIX] TSDB: Use path/filepath to set the WAL directory.
- update to 2.44.0:
  * [FEATURE] Remote-read: Handle native histograms. 
  * [FEATURE] Promtool: Health and readiness check of prometheus
    server in CLI. 
  * [FEATURE] PromQL: Add `query_samples_total` metric, the total
    number of samples loaded by all queries.
  * [ENHANCEMENT] Storage: Optimise buffer used to iterate through
    samples.
  * [ENHANCEMENT] Scrape: Reduce memory allocations on target
    labels.
  * [ENHANCEMENT] PromQL: Use faster heap method for `topk()` /
    `bottomk()`.
  * [ENHANCEMENT] Rules API: Allow filtering by rule name.
  * [ENHANCEMENT] Native Histograms: Various fixes and
    improvements.
  * [ENHANCEMENT] UI: Search of scraping pools is now
    case-insensitive.
  * [ENHANCEMENT] TSDB: Add an affirmative log message for
    successful WAL repair.
  * [BUGFIX] TSDB: Block compaction failed when shutting down.
  * [BUGFIX] TSDB: Out-of-order chunks could be ignored if the
    write-behind log was deleted.
- rebase patch 0001-Do-not-force-the-pure-Go-name-resolver.patch
  onto v2.44.0
- update to 2.43.1
  * [BUGFIX] Labels: Set() after Del() would be ignored, which
    broke some relabeling rules.
- update to 2.43.0:
  * [FEATURE] Promtool: Add HTTP client configuration to query
    commands.
  * [FEATURE] Scrape: Add `include_scrape_configs` to include
    scrape configs from different files.
  * [FEATURE] HTTP client: Add `no_proxy` to exclude URLs from
    proxied requests.
  * [FEATURE] HTTP client: Add `proxy_from_enviroment` to read
    proxies from env variables.
  * [ENHANCEMENT] API: Add support for setting lookback delta per
    query via the API.
  * [ENHANCEMENT] API: Change HTTP status code from 503/422 to 499
    if a request is canceled.
  * [ENHANCEMENT] Scrape: Allow exemplars for all metric types.
  * [ENHANCEMENT] TSDB: Add metrics for head chunks and WAL folders
    size.
  * [ENHANCEMENT] TSDB: Automatically remove incorrect snapshot
    with index that is ahead of WAL.
  * [ENHANCEMENT] TSDB: Improve Prometheus parser error outputs to
    be more comprehensible.
  * [ENHANCEMENT] UI: Scope `group by` labels to metric in
    autocompletion.
  * [BUGFIX] Scrape: Fix
    `prometheus_target_scrape_pool_target_limit` metric not set
    before reloading.
  * [BUGFIX] TSDB: Correctly update
    `prometheus_tsdb_head_chunks_removed_total` and
    `prometheus_tsdb_head_chunks` metrics when reading WAL.
  * [BUGFIX] TSDB: Use the correct unit (seconds) when recording
    out-of-order append deltas in the
    `prometheus_tsdb_sample_ooo_delta` metric.
- update to 2.42.0:
  This release comes with a bunch of feature coverage for native
  histograms and breaking changes.
  If you are trying native histograms already, we recommend you
  remove the `wal` directory when upgrading.
  Because the old WAL record for native histograms is not
  backward compatible in v2.42.0, this will lead to some data
  loss for the latest data.
  Additionally, if you scrape 'float histograms' or use recording
  rules on native histograms in v2.42.0 (which writes float
  histograms), it is a one-way street since older versions do not
  support float histograms.
  * [CHANGE] **breaking** TSDB: Changed WAL record format for the
    experimental native histograms.
  * [FEATURE] Add 'keep_firing_for' field to alerting rules.
  * [FEATURE] Promtool: Add support of selecting timeseries for
    TSDB dump.
  * [ENHANCEMENT] Agent: Native histogram support.
  * [ENHANCEMENT] Rules: Support native histograms in recording
    rules.
  * [ENHANCEMENT] SD: Add container ID as a meta label for pod
    targets for Kubernetes.
  * [ENHANCEMENT] SD: Add VM size label to azure service
    discovery.
  * [ENHANCEMENT] Support native histograms in federation.
  * [ENHANCEMENT] TSDB: Add gauge histogram support.
  * [ENHANCEMENT] TSDB/Scrape: Support FloatHistogram that
    represents buckets as float64 values.
  * [ENHANCEMENT] UI: Show individual scrape pools on /targets
    page.
- update to 2.41.0:
  * [FEATURE] Relabeling: Add keepequal and dropequal relabel
    actions.
  * [FEATURE] Add support for HTTP proxy headers. 
  * [ENHANCEMENT] Reload private certificates when changed on disk.
  * [ENHANCEMENT] Add max_version to specify maximum TLS version in
    tls_config.
  * [ENHANCEMENT] Add goos and goarch labels to
    prometheus_build_info.
  * [ENHANCEMENT] SD: Add proxy support for EC2 and LightSail SDs.
  * [ENHANCEMENT] SD: Add new metric
    prometheus_sd_file_watcher_errors_total.
  * [ENHANCEMENT] Remote Read: Use a pool to speed up marshalling.
  * [ENHANCEMENT] TSDB: Improve handling of tombstoned chunks in
    iterators.
  * [ENHANCEMENT] TSDB: Optimize postings offset table reading.
  * [BUGFIX] Scrape: Validate the metric name, label names, and
    label values after relabeling.
  * [BUGFIX] Remote Write receiver and rule manager: Fix error
    handling.
- update to 2.40.7:
  * [BUGFIX] TSDB: Fix queries involving negative buckets of native
    histograms.
- update to 2.40.5:
  * [BUGFIX] TSDB: Fix queries involving native histograms due to
    improper reset of iterators.
- update to 2.40.3:
  * [BUGFIX] TSDB: Fix compaction after a deletion is called.
- update to 2.40.2:
  * [BUGFIX] UI: Fix black-on-black metric name color in dark mode.
- update to 2.40.1:
  * [BUGFIX] TSDB: Fix alignment for atomic int64 for 32 bit
    architecture.
  * [BUGFIX] Scrape: Fix accept headers.
- update to 2.40.0:
  * [FEATURE] Add experimental support for native histograms.
    Enable with the flag --enable-feature=native-histograms.
  * [FEATURE] SD: Add service discovery for OVHcloud.
  * [ENHANCEMENT] Kubernetes SD: Use protobuf encoding.
  * [ENHANCEMENT] TSDB: Use golang.org/x/exp/slices for improved
    sorting speed.
  * [ENHANCEMENT] Consul SD: Add enterprise admin partitions. Adds
    __meta_consul_partition label. Adds partition config in
    consul_sd_config.
  * [BUGFIX] API: Fix API error codes for /api/v1/labels and
    /api/v1/series.
- update to 2.39.1:
  * [BUGFIX] Rules: Fix notifier relabel changing the labels on
    active alerts.
- update to 2.39.0:
  * [FEATURE] experimental TSDB: Add support for ingesting
    out-of-order samples. This is configured via
    out_of_order_time_window field in the config file; check config
    file docs for more info.
  * [ENHANCEMENT] API: /-/healthy and /-/ready API calls now also
    respond to a HEAD request on top of existing GET support.
  * [ENHANCEMENT] PuppetDB SD: Add __meta_puppetdb_query label.
  * [ENHANCEMENT] AWS EC2 SD: Add __meta_ec2_region label.
  * [ENHANCEMENT] AWS Lightsail SD: Add __meta_lightsail_region
    label.
  * [ENHANCEMENT] Scrape: Optimise relabeling by re-using memory.
  * [ENHANCEMENT] TSDB: Improve WAL replay timings.
  * [ENHANCEMENT] TSDB: Optimise memory by not storing unnecessary
    data in the memory.
  * [ENHANCEMENT] TSDB: Allow overlapping blocks by default.
    --storage.tsdb.allow-overlapping-blocks now has no effect.
  * [ENHANCEMENT] UI: Click to copy label-value pair from query
    result to clipboard.
  * [BUGFIX] TSDB: Turn off isolation for Head compaction to fix a
    memory leak.
  * [BUGFIX] TSDB: Fix 'invalid magic number 0' error on Prometheus
    startup.
  * [BUGFIX] PromQL: Properly close file descriptor when logging
    unfinished queries.
  * [BUGFIX] Agent: Fix validation of flag options and prevent WAL
    from growing more than desired.
- update to 2.38.0:
  * [FEATURE]: Web: Add a /api/v1/format_query HTTP API endpoint
    that allows pretty-formatting PromQL expressions.
  * [FEATURE]: UI: Add support for formatting PromQL expressions in
    the UI.
  * [FEATURE]: DNS SD: Support MX records for discovering targets.
  * [FEATURE]: Templates: Add toTime() template function that
    allows converting sample timestamps to Go time.Time values.
  * [ENHANCEMENT]: Kubernetes SD: Add
    __meta_kubernetes_service_port_number meta label indicating the
    service port number.
  * [ENHANCEMENT]: Kubernetes SD: Add
    __meta_kubernetes_pod_container_image meta label indicating the
    container image.
  * [ENHANCEMENT]: PromQL: When a query panics, also log the query
    itself alongside the panic message.
  * [ENHANCEMENT]: UI: Tweak colors in the dark theme to improve
    the contrast ratio.
  * [ENHANCEMENT]: Web: Speed up calls to /api/v1/rules by avoiding
    locks and using atomic types instead.
  * [ENHANCEMENT]: Scrape: Add a no-default-scrape-port feature
    flag, which omits or removes any default HTTP (:80) or HTTPS
    (:443) ports in the target's scrape address.
  * [BUGFIX]: TSDB: In the WAL watcher metrics, expose the
    type='exemplar' label instead of type='unknown' for exemplar
    records.
  * [BUGFIX]: TSDB: Fix race condition around allocating series IDs
    during chunk snapshot loading.

- Remove npm_licenses.tar.bz2 during 'make clean'

- Remove web-ui archives during 'make clean'.

  * [SECURITY] CVE-2022-41715: Limit memory used by parsing regexps
    (bsc#1204023).
- Fix uncontrolled resource consumption by updating Go to version
  1.20.1 (CVE-2022-41723, bsc#1208298)		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-17"/>
	<updated date="2024-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204023">SUSE bug 1204023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208298">SUSE bug 1208298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227038">SUSE bug 1227038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228556">SUSE bug 1228556</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41715/">CVE-2022-41715 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41715">CVE-2022-41715 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41723/">CVE-2022-41723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45142/">CVE-2023-45142 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45142">CVE-2023-45142 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942838" comment="firewalld-prometheus-config-0.1-150100.4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942839" comment="golang-github-prometheus-prometheus-2.45.6-150100.4.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4983" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-bad, libvpl (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218534" ref_url="https://bugzilla.suse.com/1218534" source="BUGZILLA"/>
		<reference ref_id="1219494" ref_url="https://bugzilla.suse.com/1219494" source="BUGZILLA"/>
		<reference ref_id="1223263" ref_url="https://bugzilla.suse.com/1223263" source="BUGZILLA"/>
		<reference ref_id="1226892" ref_url="https://bugzilla.suse.com/1226892" source="BUGZILLA"/>
		<reference ref_id="1226897" ref_url="https://bugzilla.suse.com/1226897" source="BUGZILLA"/>
		<reference ref_id="1226898" ref_url="https://bugzilla.suse.com/1226898" source="BUGZILLA"/>
		<reference ref_id="1226899" ref_url="https://bugzilla.suse.com/1226899" source="BUGZILLA"/>
		<reference ref_id="1226900" ref_url="https://bugzilla.suse.com/1226900" source="BUGZILLA"/>
		<reference ref_id="1226901" ref_url="https://bugzilla.suse.com/1226901" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-22656" ref_url="https://www.suse.com/security/cve/CVE-2023-22656/" source="CVE"/>
		<reference ref_id="CVE-2023-45221" ref_url="https://www.suse.com/security/cve/CVE-2023-45221/" source="CVE"/>
		<reference ref_id="CVE-2023-47169" ref_url="https://www.suse.com/security/cve/CVE-2023-47169/" source="CVE"/>
		<reference ref_id="CVE-2023-47282" ref_url="https://www.suse.com/security/cve/CVE-2023-47282/" source="CVE"/>
		<reference ref_id="CVE-2023-48368" ref_url="https://www.suse.com/security/cve/CVE-2023-48368/" source="CVE"/>
		<reference ref_id="CVE-2023-50186" ref_url="https://www.suse.com/security/cve/CVE-2023-50186/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019443.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-bad, libvpl fixes the following issues:

- Dropped support for libmfx to fix the following CVEs:
  * libmfx: improper input validation (CVE-2023-48368, bsc#1226897)
  * libmfx: improper buffer restrictions (CVE-2023-45221, bsc#1226898)
  * libmfx: out-of-bounds read (CVE-2023-22656, bsc#1226899)
  * libmfx: out-of-bounds write (CVE-2023-47282, bsc#1226900)
  * libmfx: improper buffer restrictions (CVE-2023-47169, bsc#1226901)

The libmfx dependency is replaced by libvpl.
  		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-17"/>
	<updated date="2024-09-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218534">SUSE bug 1218534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219494">SUSE bug 1219494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223263">SUSE bug 1223263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226892">SUSE bug 1226892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226897">SUSE bug 1226897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226898">SUSE bug 1226898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226899">SUSE bug 1226899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226900">SUSE bug 1226900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226901">SUSE bug 1226901</bugzilla>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22656/">CVE-2023-22656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-22656">CVE-2023-22656 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45221/">CVE-2023-45221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45221">CVE-2023-45221 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-47169/">CVE-2023-47169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-47169">CVE-2023-47169 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-47282/">CVE-2023-47282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-47282">CVE-2023-47282 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-48368/">CVE-2023-48368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-48368">CVE-2023-48368 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50186/">CVE-2023-50186 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50186">CVE-2023-50186 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009942840" comment="libvpl-2023.0.0-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942841" comment="libvpl-devel-2023.0.0-150500.3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009942842" comment="libvpl2-2023.0.0-150500.3.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4984" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210638" ref_url="https://bugzilla.suse.com/1210638" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017864.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2023-27043: Fixed incorrectly parses e-mail addresses which contain a special character (bsc#1210638).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-05"/>
	<updated date="2024-02-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210638">SUSE bug 1210638</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009845603" comment="libpython2_7-1_0-2.7.18-150000.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845604" comment="libpython2_7-1_0-32bit-2.7.18-150000.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845605" comment="python-2.7.18-150000.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845606" comment="python-32bit-2.7.18-150000.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845607" comment="python-base-2.7.18-150000.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845608" comment="python-base-32bit-2.7.18-150000.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845609" comment="python-curses-2.7.18-150000.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845610" comment="python-demo-2.7.18-150000.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845611" comment="python-devel-2.7.18-150000.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845612" comment="python-doc-2.7.18-150000.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845613" comment="python-doc-pdf-2.7.18-150000.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845614" comment="python-gdbm-2.7.18-150000.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845615" comment="python-idle-2.7.18-150000.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845616" comment="python-tk-2.7.18-150000.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009845617" comment="python-xml-2.7.18-150000.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4985" version="1" class="patch">
	<metadata>
		<title>Security update for python-dnspython (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230353" ref_url="https://bugzilla.suse.com/1230353" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-29483" ref_url="https://www.suse.com/security/cve/CVE-2023-29483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019447.html" source="SUSE-SU"/>
		<description>
This update for python-dnspython fixes the following issue:

- Fix CVE-2023-29483 (bsc#1230353).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-18"/>
	<updated date="2024-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1230353">SUSE bug 1230353</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29483/">CVE-2023-29483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-29483">CVE-2023-29483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943081" comment="python3-dnspython-1.15.0-150000.3.10.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4986" version="1" class="patch">
	<metadata>
		<title>Security update for python-aiohttp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217684" ref_url="https://bugzilla.suse.com/1217684" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-49081" ref_url="https://www.suse.com/security/cve/CVE-2023-49081/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017590.html" source="SUSE-SU"/>
		<description>
This update for python-aiohttp fixes the following issues:

- CVE-2023-49081: fixed an HTTP header injection via a crafted
  version (bsc#1217684).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-05"/>
	<updated date="2024-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1217684">SUSE bug 1217684</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-49081/">CVE-2023-49081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49081">CVE-2023-49081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818424" comment="python311-aiohttp-3.8.5-150400.10.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4987" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230161" ref_url="https://bugzilla.suse.com/1230161" source="BUGZILLA"/>
		<reference ref_id="1230162" ref_url="https://bugzilla.suse.com/1230162" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-20505" ref_url="https://www.suse.com/security/cve/CVE-2024-20505/" source="CVE"/>
		<reference ref_id="CVE-2024-20506" ref_url="https://www.suse.com/security/cve/CVE-2024-20506/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3305-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036950.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- Update to version 0.103.12
- CVE-2024-20506: Disable symlinks following to prevent an attacker to corrupt system files. (bsc#1230162)
- CVE-2024-20505: Fixed possible out-of-bounds read bug in the PDF file parser. (bsc#1230161)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-18"/>
	<updated date="2024-09-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1230161">SUSE bug 1230161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230162">SUSE bug 1230162</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-20505/">CVE-2024-20505 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-20505">CVE-2024-20505 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-20506/">CVE-2024-20506 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-20506">CVE-2024-20506 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943082" comment="clamav-0.103.12-150000.3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943083" comment="clamav-devel-0.103.12-150000.3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943084" comment="libclamav9-0.103.12-150000.3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943085" comment="libfreshclam2-0.103.12-150000.3.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4988" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230400" ref_url="https://bugzilla.suse.com/1230400" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-23984" ref_url="https://www.suse.com/security/cve/CVE-2024-23984/" source="CVE"/>
		<reference ref_id="CVE-2024-24968" ref_url="https://www.suse.com/security/cve/CVE-2024-24968/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019465.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Intel CPU Microcode was updated to the 20240910 release (bsc#1230400)
- CVE-2024-23984: Observable discrepancy in RAPL interface for some Intel Processors may allow a privileged user to potentially enable information disclosure via local access.
- CVE-2024-24968: Improper finite state machines (FSMs) in hardware logic in some Intel Processors may allow an privileged user to potentially enable a denial of service via local access.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-09-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1230400">SUSE bug 1230400</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-23984/">CVE-2024-23984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23984">CVE-2024-23984 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-24968/">CVE-2024-24968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24968">CVE-2024-24968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943528" comment="ucode-intel-20240910-150200.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4989" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229907" ref_url="https://bugzilla.suse.com/1229907" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-8250" ref_url="https://www.suse.com/security/cve/CVE-2024-8250/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019464.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

- Upgraded Wireshark to version 3.6.24.
- CVE-2024-8250: Fixed NTLMSSP dissector crash (bsc#1229907). 
  		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-09-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1229907">SUSE bug 1229907</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-8250/">CVE-2024-8250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8250">CVE-2024-8250 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943529" comment="libwireshark15-3.6.24-150000.3.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943530" comment="libwiretap12-3.6.24-150000.3.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943531" comment="libwsutil13-3.6.24-150000.3.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943532" comment="wireshark-3.6.24-150000.3.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943533" comment="wireshark-devel-3.6.24-150000.3.118.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943534" comment="wireshark-ui-qt-3.6.24-150000.3.118.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4990" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230413" ref_url="https://bugzilla.suse.com/1230413" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2024:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019467.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.

The following non-security bugs were fixed:

- Revert 'mm, kmsan: fix infinite recursion due to RCU critical section' (bsc#1230413)
- Revert 'mm/sparsemem: fix race in accessing memory_section-&gt;usage' (bsc#1230413)
- Revert 'mm: prevent derefencing NULL ptr in pfn_section_valid()' (bsc#1230413)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-09-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1230413">SUSE bug 1230413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943535" comment="cluster-md-kmp-rt-5.14.21-150500.13.70.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943536" comment="dlm-kmp-rt-5.14.21-150500.13.70.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943537" comment="gfs2-kmp-rt-5.14.21-150500.13.70.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943538" comment="kernel-devel-rt-5.14.21-150500.13.70.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943539" comment="kernel-rt-5.14.21-150500.13.70.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943540" comment="kernel-rt-devel-5.14.21-150500.13.70.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943541" comment="kernel-rt-extra-5.14.21-150500.13.70.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943542" comment="kernel-rt-livepatch-5.14.21-150500.13.70.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943543" comment="kernel-rt-livepatch-devel-5.14.21-150500.13.70.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943544" comment="kernel-rt-optional-5.14.21-150500.13.70.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943545" comment="kernel-rt-vdso-5.14.21-150500.13.70.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943546" comment="kernel-rt_debug-5.14.21-150500.13.70.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943547" comment="kernel-rt_debug-devel-5.14.21-150500.13.70.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943548" comment="kernel-rt_debug-livepatch-devel-5.14.21-150500.13.70.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943549" comment="kernel-rt_debug-vdso-5.14.21-150500.13.70.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943550" comment="kernel-source-rt-5.14.21-150500.13.70.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943551" comment="kernel-syms-rt-5.14.21-150500.13.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943552" comment="kselftests-kmp-rt-5.14.21-150500.13.70.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943553" comment="ocfs2-kmp-rt-5.14.21-150500.13.70.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943554" comment="reiserfs-kmp-rt-5.14.21-150500.13.70.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4991" version="1" class="patch">
	<metadata>
		<title>Security update for libmfx (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219494" ref_url="https://bugzilla.suse.com/1219494" source="BUGZILLA"/>
		<reference ref_id="1226892" ref_url="https://bugzilla.suse.com/1226892" source="BUGZILLA"/>
		<reference ref_id="1226897" ref_url="https://bugzilla.suse.com/1226897" source="BUGZILLA"/>
		<reference ref_id="1226898" ref_url="https://bugzilla.suse.com/1226898" source="BUGZILLA"/>
		<reference ref_id="1226899" ref_url="https://bugzilla.suse.com/1226899" source="BUGZILLA"/>
		<reference ref_id="1226900" ref_url="https://bugzilla.suse.com/1226900" source="BUGZILLA"/>
		<reference ref_id="1226901" ref_url="https://bugzilla.suse.com/1226901" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-22656" ref_url="https://www.suse.com/security/cve/CVE-2023-22656/" source="CVE"/>
		<reference ref_id="CVE-2023-45221" ref_url="https://www.suse.com/security/cve/CVE-2023-45221/" source="CVE"/>
		<reference ref_id="CVE-2023-47169" ref_url="https://www.suse.com/security/cve/CVE-2023-47169/" source="CVE"/>
		<reference ref_id="CVE-2023-47282" ref_url="https://www.suse.com/security/cve/CVE-2023-47282/" source="CVE"/>
		<reference ref_id="CVE-2023-48368" ref_url="https://www.suse.com/security/cve/CVE-2023-48368/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3339-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036983.html" source="SUSE-SU"/>
		<description>
This update for libmfx fixes the following issues:

- CVE-2023-48368: Fixed an improper input validation. (bsc#1226897)
- CVE-2023-45221: Fixed an improper buffer restrictions. (bsc#1226898)
- CVE-2023-22656: Fixed an out-of-bounds read. (bsc#1226899)
- CVE-2023-47282: Fixed an out-of-bounds write. (bsc#1226900)
- CVE-2023-47169: Fixed an improper buffer restrictions. (bsc#1226901)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-09-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219494">SUSE bug 1219494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226892">SUSE bug 1226892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226897">SUSE bug 1226897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226898">SUSE bug 1226898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226899">SUSE bug 1226899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226900">SUSE bug 1226900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226901">SUSE bug 1226901</bugzilla>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22656/">CVE-2023-22656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-22656">CVE-2023-22656 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45221/">CVE-2023-45221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45221">CVE-2023-45221 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-47169/">CVE-2023-47169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-47169">CVE-2023-47169 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-47282/">CVE-2023-47282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-47282">CVE-2023-47282 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-48368/">CVE-2023-48368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-48368">CVE-2023-48368 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943555" comment="libmfx-22.6.1-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943556" comment="libmfx1-22.6.1-150500.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4992" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.24 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216109" ref_url="https://bugzilla.suse.com/1216109" source="BUGZILLA"/>
		<reference ref_id="1216123" ref_url="https://bugzilla.suse.com/1216123" source="BUGZILLA"/>
		<reference ref_id="1221400" ref_url="https://bugzilla.suse.com/1221400" source="BUGZILLA"/>
		<reference ref_id="1226136" ref_url="https://bugzilla.suse.com/1226136" source="BUGZILLA"/>
		<reference ref_id="1229858" ref_url="https://bugzilla.suse.com/1229858" source="BUGZILLA"/>
		<reference ref_id="1229867" ref_url="https://bugzilla.suse.com/1229867" source="BUGZILLA"/>
		<reference ref_id="1229869" ref_url="https://bugzilla.suse.com/1229869" source="BUGZILLA"/>
		<reference ref_id="1230323" ref_url="https://bugzilla.suse.com/1230323" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39325" ref_url="https://www.suse.com/security/cve/CVE-2023-39325/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036981.html" source="SUSE-SU"/>
		<description>
This update for kubernetes1.24 fixes the following issues:

- CVE-2023-39325: go1.20: excessive resource consumption when dealing with rapid stream resets. (bsc#1229869)  
- CVE-2023-44487: google.golang.org/grpc, kube-apiserver: HTTP/2 rapid reset vulnerability. (bsc#1229869)
- CVE-2023-45288: golang.org/x/net: excessive CPU consumption when processing unlimited sets of headers. (bsc#1229869)
- CVE-2024-24786: github.com/golang/protobuf: infinite loop when unmarshaling invalid JSON. (bsc#1229867)

Bug fixes:

- Update go to version 1.22.5 in build requirements. (bsc#1229858)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-09-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216109">SUSE bug 1216109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216123">SUSE bug 1216123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221400">SUSE bug 1221400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226136">SUSE bug 1226136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229858">SUSE bug 1229858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229867">SUSE bug 1229867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229869">SUSE bug 1229869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230323">SUSE bug 1230323</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39325/">CVE-2023-39325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943557" comment="kubernetes1.24-apiserver-1.24.17-150500.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943558" comment="kubernetes1.24-client-1.24.17-150500.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943559" comment="kubernetes1.24-client-bash-completion-1.24.17-150500.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943560" comment="kubernetes1.24-client-common-1.24.17-150500.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943561" comment="kubernetes1.24-client-fish-completion-1.24.17-150500.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943562" comment="kubernetes1.24-controller-manager-1.24.17-150500.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943563" comment="kubernetes1.24-kubeadm-1.24.17-150500.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943564" comment="kubernetes1.24-kubelet-1.24.17-150500.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943565" comment="kubernetes1.24-kubelet-common-1.24.17-150500.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943566" comment="kubernetes1.24-proxy-1.24.17-150500.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943567" comment="kubernetes1.24-scheduler-1.24.17-150500.3.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4993" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.25 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216109" ref_url="https://bugzilla.suse.com/1216109" source="BUGZILLA"/>
		<reference ref_id="1216123" ref_url="https://bugzilla.suse.com/1216123" source="BUGZILLA"/>
		<reference ref_id="1221400" ref_url="https://bugzilla.suse.com/1221400" source="BUGZILLA"/>
		<reference ref_id="1226136" ref_url="https://bugzilla.suse.com/1226136" source="BUGZILLA"/>
		<reference ref_id="1229858" ref_url="https://bugzilla.suse.com/1229858" source="BUGZILLA"/>
		<reference ref_id="1229867" ref_url="https://bugzilla.suse.com/1229867" source="BUGZILLA"/>
		<reference ref_id="1229869" ref_url="https://bugzilla.suse.com/1229869" source="BUGZILLA"/>
		<reference ref_id="1230323" ref_url="https://bugzilla.suse.com/1230323" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39325" ref_url="https://www.suse.com/security/cve/CVE-2023-39325/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036979.html" source="SUSE-SU"/>
		<description>
This update for kubernetes1.25 fixes the following issues:

- CVE-2023-45288: golang.org/x/net: excessive CPU consumption when processing unlimited sets of headers. (bsc#1229869)
- CVE-2023-44487: google.golang.org/grpc, kube-apiserver: HTTP/2 rapid reset vulnerability. (bsc#1229869)
- CVE-2024-24786: github.com/golang/protobuf: infinite loop when unmarshaling invalid JSON. (bsc#1229867)

Bug fixes:

- Update go to version 1.22.5 in build requirements. (bsc#1229858)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-09-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216109">SUSE bug 1216109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216123">SUSE bug 1216123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221400">SUSE bug 1221400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226136">SUSE bug 1226136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229858">SUSE bug 1229858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229867">SUSE bug 1229867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229869">SUSE bug 1229869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230323">SUSE bug 1230323</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39325/">CVE-2023-39325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943568" comment="kubernetes1.25-client-1.25.16-150400.9.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943569" comment="kubernetes1.25-client-common-1.25.16-150400.9.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4994" version="1" class="patch">
	<metadata>
		<title>Security update for python-azure-identity (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230100" ref_url="https://bugzilla.suse.com/1230100" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-35255" ref_url="https://www.suse.com/security/cve/CVE-2024-35255/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036978.html" source="SUSE-SU"/>
		<description>
This update for python-azure-identity fixes the following issues:

- CVE-2024-35255: Fixed an Azure identity libraries elevation of privilege vulnerability. (bsc#1230100)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-19"/>
	<updated date="2024-09-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1230100">SUSE bug 1230100</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-35255/">CVE-2024-35255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35255">CVE-2024-35255 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943570" comment="python311-azure-identity-1.15.0-150400.11.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4995" version="1" class="patch">
	<metadata>
		<title>Security update for python310 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229596" ref_url="https://bugzilla.suse.com/1229596" source="BUGZILLA"/>
		<reference ref_id="1229704" ref_url="https://bugzilla.suse.com/1229704" source="BUGZILLA"/>
		<reference ref_id="1230227" ref_url="https://bugzilla.suse.com/1230227" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6232" ref_url="https://www.suse.com/security/cve/CVE-2024-6232/" source="CVE"/>
		<reference ref_id="CVE-2024-7592" ref_url="https://www.suse.com/security/cve/CVE-2024-7592/" source="CVE"/>
		<reference ref_id="CVE-2024-8088" ref_url="https://www.suse.com/security/cve/CVE-2024-8088/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019483.html" source="SUSE-SU"/>
		<description>
This update for python310 fixes the following issues:

- Update to version 3.10.15
- CVE-2024-8088: Fixed denial of service in zipfile. (bsc#1229704) 
- CVE-2024-7592: Fixed uncontrolled CPU resource consumption when in http.cookies module. (bsc#1229596)
- CVE-2024-6232: Fixed ReDos via excessive backtracking while parsing header values. (bsc#1230227)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229596">SUSE bug 1229596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229704">SUSE bug 1229704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230227">SUSE bug 1230227</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6232/">CVE-2024-6232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6232">CVE-2024-6232 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7592/">CVE-2024-7592 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7592">CVE-2024-7592 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8088/">CVE-2024-8088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8088">CVE-2024-8088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943945" comment="libpython3_10-1_0-3.10.15-150400.4.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943946" comment="libpython3_10-1_0-32bit-3.10.15-150400.4.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943947" comment="python310-3.10.15-150400.4.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943948" comment="python310-32bit-3.10.15-150400.4.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943949" comment="python310-base-3.10.15-150400.4.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943950" comment="python310-base-32bit-3.10.15-150400.4.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943951" comment="python310-curses-3.10.15-150400.4.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943952" comment="python310-dbm-3.10.15-150400.4.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943953" comment="python310-devel-3.10.15-150400.4.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943954" comment="python310-doc-3.10.15-150400.4.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943955" comment="python310-doc-devhelp-3.10.15-150400.4.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943956" comment="python310-idle-3.10.15-150400.4.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943957" comment="python310-testsuite-3.10.15-150400.4.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943958" comment="python310-tk-3.10.15-150400.4.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943959" comment="python310-tools-3.10.15-150400.4.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4996" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg-4 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226892" ref_url="https://bugzilla.suse.com/1226892" source="BUGZILLA"/>
		<reference ref_id="1226897" ref_url="https://bugzilla.suse.com/1226897" source="BUGZILLA"/>
		<reference ref_id="1226898" ref_url="https://bugzilla.suse.com/1226898" source="BUGZILLA"/>
		<reference ref_id="1226899" ref_url="https://bugzilla.suse.com/1226899" source="BUGZILLA"/>
		<reference ref_id="1226900" ref_url="https://bugzilla.suse.com/1226900" source="BUGZILLA"/>
		<reference ref_id="1226901" ref_url="https://bugzilla.suse.com/1226901" source="BUGZILLA"/>
		<reference ref_id="1229026" ref_url="https://bugzilla.suse.com/1229026" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-22656" ref_url="https://www.suse.com/security/cve/CVE-2023-22656/" source="CVE"/>
		<reference ref_id="CVE-2023-45221" ref_url="https://www.suse.com/security/cve/CVE-2023-45221/" source="CVE"/>
		<reference ref_id="CVE-2023-47169" ref_url="https://www.suse.com/security/cve/CVE-2023-47169/" source="CVE"/>
		<reference ref_id="CVE-2023-47282" ref_url="https://www.suse.com/security/cve/CVE-2023-47282/" source="CVE"/>
		<reference ref_id="CVE-2023-48368" ref_url="https://www.suse.com/security/cve/CVE-2023-48368/" source="CVE"/>
		<reference ref_id="CVE-2024-7055" ref_url="https://www.suse.com/security/cve/CVE-2024-7055/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019482.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg-4 fixes the following issues:

- Dropped support for libmfx to fix the following CVEs:
  * libmfx: improper input validation (CVE-2023-48368, bsc#1226897)
  * libmfx: improper buffer restrictions (CVE-2023-45221, bsc#1226898)
  * libmfx: out-of-bounds read (CVE-2023-22656, bsc#1226899)
  * libmfx: out-of-bounds write (CVE-2023-47282, bsc#1226900)
  * libmfx: improper buffer restrictions (CVE-2023-47169, bsc#1226901)
- CVE-2024-7055: heap-based buffer overflow in pnmdec.c from the libavcodec library. (bsc#1229026)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2024-09-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1226892">SUSE bug 1226892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226897">SUSE bug 1226897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226898">SUSE bug 1226898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226899">SUSE bug 1226899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226900">SUSE bug 1226900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226901">SUSE bug 1226901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229026">SUSE bug 1229026</bugzilla>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22656/">CVE-2023-22656 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-22656">CVE-2023-22656 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45221/">CVE-2023-45221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45221">CVE-2023-45221 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-47169/">CVE-2023-47169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-47169">CVE-2023-47169 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-47282/">CVE-2023-47282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-47282">CVE-2023-47282 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-48368/">CVE-2023-48368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-48368">CVE-2023-48368 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7055/">CVE-2024-7055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7055">CVE-2024-7055 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009943960" comment="ffmpeg-4-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943961" comment="ffmpeg-4-libavcodec-devel-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943962" comment="ffmpeg-4-libavdevice-devel-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943963" comment="ffmpeg-4-libavfilter-devel-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943964" comment="ffmpeg-4-libavformat-devel-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943965" comment="ffmpeg-4-libavresample-devel-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943966" comment="ffmpeg-4-libavutil-devel-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943967" comment="ffmpeg-4-libpostproc-devel-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943968" comment="ffmpeg-4-libswresample-devel-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943969" comment="ffmpeg-4-libswscale-devel-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943970" comment="ffmpeg-4-private-devel-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943971" comment="libavcodec58_134-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943972" comment="libavcodec58_134-32bit-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943973" comment="libavdevice58_13-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943974" comment="libavdevice58_13-32bit-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943975" comment="libavfilter7_110-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943976" comment="libavfilter7_110-32bit-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943977" comment="libavformat58_76-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943978" comment="libavformat58_76-32bit-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943979" comment="libavresample4_0-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943980" comment="libavresample4_0-32bit-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943981" comment="libavutil56_70-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943982" comment="libavutil56_70-32bit-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943983" comment="libpostproc55_9-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943984" comment="libpostproc55_9-32bit-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943985" comment="libswresample3_9-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943986" comment="libswresample3_9-32bit-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943987" comment="libswscale5_9-4.4-150400.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009943988" comment="libswscale5_9-32bit-4.4-150400.3.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4997" version="1" class="patch">
	<metadata>
		<title>Security update for python-aiohttp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217684" ref_url="https://bugzilla.suse.com/1217684" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-49081" ref_url="https://www.suse.com/security/cve/CVE-2023-49081/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017589.html" source="SUSE-SU"/>
		<description>
This update for python-aiohttp fixes the following issues:

- CVE-2023-49081: fixed an HTTP header injection via a crafted
  version (bsc#1217684).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-05"/>
	<updated date="2024-01-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1217684">SUSE bug 1217684</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-49081/">CVE-2023-49081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49081">CVE-2023-49081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009818388" comment="python-aiohttp-doc-3.6.0-150100.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818389" comment="python3-aiohttp-3.6.0-150100.3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4998" version="1" class="patch">
	<metadata>
		<title>Security update for rage-encryption (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229959" ref_url="https://bugzilla.suse.com/1229959" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-43806" ref_url="https://www.suse.com/security/cve/CVE-2024-43806/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019502.html" source="SUSE-SU"/>
		<description>
This update for rage-encryption fixes the following issues:

- Update to version 0.10.0
- CVE-2024-43806: Fixed rustix::fs::Dir iterator with the linux_raw backend that can cause memory exhaustion. (bsc#1229959) 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-23"/>
	<updated date="2024-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1229959">SUSE bug 1229959</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43806/">CVE-2024-43806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43806">CVE-2024-43806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944127" comment="rage-encryption-0.10.0+0-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944128" comment="rage-encryption-bash-completion-0.10.0+0-150500.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:4999" version="1" class="patch">
	<metadata>
		<title>Security update for python39 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229596" ref_url="https://bugzilla.suse.com/1229596" source="BUGZILLA"/>
		<reference ref_id="1229704" ref_url="https://bugzilla.suse.com/1229704" source="BUGZILLA"/>
		<reference ref_id="1230227" ref_url="https://bugzilla.suse.com/1230227" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6232" ref_url="https://www.suse.com/security/cve/CVE-2024-6232/" source="CVE"/>
		<reference ref_id="CVE-2024-7592" ref_url="https://www.suse.com/security/cve/CVE-2024-7592/" source="CVE"/>
		<reference ref_id="CVE-2024-8088" ref_url="https://www.suse.com/security/cve/CVE-2024-8088/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019505.html" source="SUSE-SU"/>
		<description>
This update for python39 fixes the following issues:

- Update to 3.9.20:
- CVE-2024-6232: excessive backtracking when parsing tarfile headers leads to ReDoS. (bsc#1230227)
- CVE-2024-7592: quadratic algorithm used when parsing cookies leads to excessive resource consumption. (bsc#1229596)
- CVE-2024-8088: lack of name validation when extracting a zip archive leads to infinite loops. (bsc#1229704)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-24"/>
	<updated date="2024-09-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229596">SUSE bug 1229596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229704">SUSE bug 1229704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230227">SUSE bug 1230227</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6232/">CVE-2024-6232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6232">CVE-2024-6232 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7592/">CVE-2024-7592 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7592">CVE-2024-7592 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8088/">CVE-2024-8088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8088">CVE-2024-8088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944464" comment="libpython3_9-1_0-3.9.20-150300.4.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944465" comment="libpython3_9-1_0-32bit-3.9.20-150300.4.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944466" comment="python39-3.9.20-150300.4.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944467" comment="python39-32bit-3.9.20-150300.4.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944468" comment="python39-base-3.9.20-150300.4.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944469" comment="python39-base-32bit-3.9.20-150300.4.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944470" comment="python39-curses-3.9.20-150300.4.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944471" comment="python39-dbm-3.9.20-150300.4.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944472" comment="python39-devel-3.9.20-150300.4.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944473" comment="python39-doc-3.9.20-150300.4.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944474" comment="python39-doc-devhelp-3.9.20-150300.4.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944475" comment="python39-idle-3.9.20-150300.4.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944476" comment="python39-testsuite-3.9.20-150300.4.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944477" comment="python39-tk-3.9.20-150300.4.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944478" comment="python39-tools-3.9.20-150300.4.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5000" version="1" class="patch">
	<metadata>
		<title>Security update for python311 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229596" ref_url="https://bugzilla.suse.com/1229596" source="BUGZILLA"/>
		<reference ref_id="1229704" ref_url="https://bugzilla.suse.com/1229704" source="BUGZILLA"/>
		<reference ref_id="1230227" ref_url="https://bugzilla.suse.com/1230227" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6232" ref_url="https://www.suse.com/security/cve/CVE-2024-6232/" source="CVE"/>
		<reference ref_id="CVE-2024-7592" ref_url="https://www.suse.com/security/cve/CVE-2024-7592/" source="CVE"/>
		<reference ref_id="CVE-2024-8088" ref_url="https://www.suse.com/security/cve/CVE-2024-8088/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019511.html" source="SUSE-SU"/>
		<description>
This update for python311 fixes the following issues:

- Update python311 to version 3.11.10.
- CVE-2024-6232: excessive backtracking when parsing tarfile headers leads to ReDoS. (bsc#1230227)
- CVE-2024-7592: quadratic algorithm used when parsing cookies leads to excessive resource consumption. (bsc#1229596)
- CVE-2024-8088: lack of name validation when extracting a zip archive leads to infinite loops. (bsc#1229704)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-24"/>
	<updated date="2024-09-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229596">SUSE bug 1229596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229704">SUSE bug 1229704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230227">SUSE bug 1230227</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6232/">CVE-2024-6232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6232">CVE-2024-6232 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7592/">CVE-2024-7592 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7592">CVE-2024-7592 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8088/">CVE-2024-8088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8088">CVE-2024-8088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944479" comment="libpython3_11-1_0-3.11.10-150400.9.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944480" comment="libpython3_11-1_0-32bit-3.11.10-150400.9.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944481" comment="python311-3.11.10-150400.9.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944482" comment="python311-32bit-3.11.10-150400.9.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944483" comment="python311-base-3.11.10-150400.9.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944484" comment="python311-base-32bit-3.11.10-150400.9.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944485" comment="python311-curses-3.11.10-150400.9.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944486" comment="python311-dbm-3.11.10-150400.9.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944487" comment="python311-devel-3.11.10-150400.9.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944488" comment="python311-doc-3.11.10-150400.9.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944489" comment="python311-doc-devhelp-3.11.10-150400.9.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944490" comment="python311-idle-3.11.10-150400.9.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944491" comment="python311-testsuite-3.11.10-150400.9.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944492" comment="python311-tk-3.11.10-150400.9.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944493" comment="python311-tools-3.11.10-150400.9.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5001" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230366" ref_url="https://bugzilla.suse.com/1230366" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-45817" ref_url="https://www.suse.com/security/cve/CVE-2024-45817/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019510.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2024-45817: Fixed a deadlock in vlapic_error (XSA-462, bsc#1230366)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-24"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1230366">SUSE bug 1230366</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45817/">CVE-2024-45817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45817">CVE-2024-45817 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944494" comment="xen-4.17.5_04-150500.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944495" comment="xen-devel-4.17.5_04-150500.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944496" comment="xen-doc-html-4.17.5_04-150500.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944497" comment="xen-libs-4.17.5_04-150500.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944498" comment="xen-libs-32bit-4.17.5_04-150500.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944499" comment="xen-tools-4.17.5_04-150500.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944500" comment="xen-tools-domU-4.17.5_04-150500.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944501" comment="xen-tools-xendomains-wait-disk-4.17.5_04-150500.3.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5002" version="1" class="patch">
	<metadata>
		<title>Security update for apr (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229783" ref_url="https://bugzilla.suse.com/1229783" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-49582" ref_url="https://www.suse.com/security/cve/CVE-2023-49582/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019515.html" source="SUSE-SU"/>
		<description>
This update for apr fixes the following issues:

- CVE-2023-49582: Fixed an unexpected lax shared memory permissions. (bsc#1229783)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-24"/>
	<updated date="2024-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1229783">SUSE bug 1229783</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-49582/">CVE-2023-49582 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49582">CVE-2023-49582 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944502" comment="apr-devel-1.6.3-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944503" comment="libapr1-1.6.3-150000.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5003" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217722" ref_url="https://bugzilla.suse.com/1217722" source="BUGZILLA"/>
		<reference ref_id="1230071" ref_url="https://bugzilla.suse.com/1230071" source="BUGZILLA"/>
		<reference ref_id="1230072" ref_url="https://bugzilla.suse.com/1230072" source="BUGZILLA"/>
		<reference ref_id="1230073" ref_url="https://bugzilla.suse.com/1230073" source="BUGZILLA"/>
		<reference ref_id="1230074" ref_url="https://bugzilla.suse.com/1230074" source="BUGZILLA"/>
		<reference ref_id="1230075" ref_url="https://bugzilla.suse.com/1230075" source="BUGZILLA"/>
		<reference ref_id="1230076" ref_url="https://bugzilla.suse.com/1230076" source="BUGZILLA"/>
		<reference ref_id="1230364" ref_url="https://bugzilla.suse.com/1230364" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-45615" ref_url="https://www.suse.com/security/cve/CVE-2024-45615/" source="CVE"/>
		<reference ref_id="CVE-2024-45616" ref_url="https://www.suse.com/security/cve/CVE-2024-45616/" source="CVE"/>
		<reference ref_id="CVE-2024-45617" ref_url="https://www.suse.com/security/cve/CVE-2024-45617/" source="CVE"/>
		<reference ref_id="CVE-2024-45618" ref_url="https://www.suse.com/security/cve/CVE-2024-45618/" source="CVE"/>
		<reference ref_id="CVE-2024-45619" ref_url="https://www.suse.com/security/cve/CVE-2024-45619/" source="CVE"/>
		<reference ref_id="CVE-2024-45620" ref_url="https://www.suse.com/security/cve/CVE-2024-45620/" source="CVE"/>
		<reference ref_id="CVE-2024-8443" ref_url="https://www.suse.com/security/cve/CVE-2024-8443/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019520.html" source="SUSE-SU"/>
		<description>
This update for opensc fixes the following issues:

- CVE-2024-45620: Incorrect handling of the length of buffers or files in pkcs15init. (bsc#1230076)
- CVE-2024-45619: Incorrect handling length of buffers or files in libopensc. (bsc#1230075)
- CVE-2024-45618: Uninitialized values after incorrect or missing checking return values of functions in pkcs15init. (bsc#1230074)
- CVE-2024-45617: Uninitialized values after incorrect or missing checking return values of functions in libopensc. (bsc#1230073)
- CVE-2024-45616: Uninitialized values after incorrect check or usage of APDU response values in libopensc. (bsc#1230072)
- CVE-2024-45615: Usage of uninitialized values in libopensc and pkcs15init. (bsc#1230071)
- CVE-2024-8443: Heap buffer overflow in OpenPGP driver when generating key. (bsc#1230364)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-25"/>
	<updated date="2024-09-25"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1217722">SUSE bug 1217722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230071">SUSE bug 1230071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230072">SUSE bug 1230072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230073">SUSE bug 1230073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230074">SUSE bug 1230074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230075">SUSE bug 1230075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230076">SUSE bug 1230076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230364">SUSE bug 1230364</bugzilla>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45615/">CVE-2024-45615 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45615">CVE-2024-45615 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45616/">CVE-2024-45616 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45616">CVE-2024-45616 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45617/">CVE-2024-45617 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45617">CVE-2024-45617 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45618/">CVE-2024-45618 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45618">CVE-2024-45618 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45619/">CVE-2024-45619 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45619">CVE-2024-45619 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45620/">CVE-2024-45620 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45620">CVE-2024-45620 at NVD</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="1/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8443/">CVE-2024-8443 at SUSE</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8443">CVE-2024-8443 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944713" comment="opensc-0.22.0-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944714" comment="opensc-32bit-0.22.0-150400.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5004" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.24 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229122" ref_url="https://bugzilla.suse.com/1229122" source="BUGZILLA"/>
		<reference ref_id="1230252" ref_url="https://bugzilla.suse.com/1230252" source="BUGZILLA"/>
		<reference ref_id="1230253" ref_url="https://bugzilla.suse.com/1230253" source="BUGZILLA"/>
		<reference ref_id="1230254" ref_url="https://bugzilla.suse.com/1230254" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-34155" ref_url="https://www.suse.com/security/cve/CVE-2024-34155/" source="CVE"/>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<reference ref_id="CVE-2024-34158" ref_url="https://www.suse.com/security/cve/CVE-2024-34158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019529.html" source="SUSE-SU"/>
		<description>

This update of kubernetes1.24 fixes the following issues:

- rebuild the package with the current go 1.23 security release (bsc#1229122).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-04"/>
	<updated date="2024-10-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229122">SUSE bug 1229122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230252">SUSE bug 1230252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230253">SUSE bug 1230253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230254">SUSE bug 1230254</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34155/">CVE-2024-34155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34155">CVE-2024-34155 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34158/">CVE-2024-34158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34158">CVE-2024-34158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944794" comment="kubernetes1.24-apiserver-1.24.17-150500.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944795" comment="kubernetes1.24-client-1.24.17-150500.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944796" comment="kubernetes1.24-client-bash-completion-1.24.17-150500.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944797" comment="kubernetes1.24-client-common-1.24.17-150500.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944798" comment="kubernetes1.24-client-fish-completion-1.24.17-150500.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944799" comment="kubernetes1.24-controller-manager-1.24.17-150500.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944800" comment="kubernetes1.24-kubeadm-1.24.17-150500.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944801" comment="kubernetes1.24-kubelet-1.24.17-150500.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944802" comment="kubernetes1.24-kubelet-common-1.24.17-150500.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944803" comment="kubernetes1.24-proxy-1.24.17-150500.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944804" comment="kubernetes1.24-scheduler-1.24.17-150500.3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5005" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.28 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229122" ref_url="https://bugzilla.suse.com/1229122" source="BUGZILLA"/>
		<reference ref_id="1230252" ref_url="https://bugzilla.suse.com/1230252" source="BUGZILLA"/>
		<reference ref_id="1230253" ref_url="https://bugzilla.suse.com/1230253" source="BUGZILLA"/>
		<reference ref_id="1230254" ref_url="https://bugzilla.suse.com/1230254" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-34155" ref_url="https://www.suse.com/security/cve/CVE-2024-34155/" source="CVE"/>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<reference ref_id="CVE-2024-34158" ref_url="https://www.suse.com/security/cve/CVE-2024-34158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019528.html" source="SUSE-SU"/>
		<description>

This update of kubernetes1.28 fixes the following issues:

- rebuild the package with the current go 1.23 security release (bsc#1229122).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2024-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229122">SUSE bug 1229122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230252">SUSE bug 1230252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230253">SUSE bug 1230253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230254">SUSE bug 1230254</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34155/">CVE-2024-34155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34155">CVE-2024-34155 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34158/">CVE-2024-34158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34158">CVE-2024-34158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944805" comment="kubernetes1.28-client-1.28.13-150400.9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944806" comment="kubernetes1.28-client-common-1.28.13-150400.9.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5006" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.27 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229122" ref_url="https://bugzilla.suse.com/1229122" source="BUGZILLA"/>
		<reference ref_id="1230252" ref_url="https://bugzilla.suse.com/1230252" source="BUGZILLA"/>
		<reference ref_id="1230253" ref_url="https://bugzilla.suse.com/1230253" source="BUGZILLA"/>
		<reference ref_id="1230254" ref_url="https://bugzilla.suse.com/1230254" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-34155" ref_url="https://www.suse.com/security/cve/CVE-2024-34155/" source="CVE"/>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<reference ref_id="CVE-2024-34158" ref_url="https://www.suse.com/security/cve/CVE-2024-34158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019527.html" source="SUSE-SU"/>
		<description>

This update of kubernetes1.27 fixes the following issues:

- rebuild the package with the current go 1.23 security release (bsc#1229122).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2024-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229122">SUSE bug 1229122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230252">SUSE bug 1230252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230253">SUSE bug 1230253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230254">SUSE bug 1230254</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34155/">CVE-2024-34155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34155">CVE-2024-34155 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34158/">CVE-2024-34158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34158">CVE-2024-34158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944807" comment="kubernetes1.27-client-1.27.16-150400.9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944808" comment="kubernetes1.27-client-common-1.27.16-150400.9.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5007" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.26 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229122" ref_url="https://bugzilla.suse.com/1229122" source="BUGZILLA"/>
		<reference ref_id="1230252" ref_url="https://bugzilla.suse.com/1230252" source="BUGZILLA"/>
		<reference ref_id="1230253" ref_url="https://bugzilla.suse.com/1230253" source="BUGZILLA"/>
		<reference ref_id="1230254" ref_url="https://bugzilla.suse.com/1230254" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-34155" ref_url="https://www.suse.com/security/cve/CVE-2024-34155/" source="CVE"/>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<reference ref_id="CVE-2024-34158" ref_url="https://www.suse.com/security/cve/CVE-2024-34158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019526.html" source="SUSE-SU"/>
		<description>

This update of kubernetes1.26 fixes the following issues:

- rebuild the package with the current go 1.23 security release (bsc#1229122).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2024-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229122">SUSE bug 1229122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230252">SUSE bug 1230252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230253">SUSE bug 1230253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230254">SUSE bug 1230254</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34155/">CVE-2024-34155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34155">CVE-2024-34155 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34158/">CVE-2024-34158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34158">CVE-2024-34158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944809" comment="kubernetes1.26-client-1.26.15-150400.9.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944810" comment="kubernetes1.26-client-common-1.26.15-150400.9.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5008" version="1" class="patch">
	<metadata>
		<title>Security update for kubernetes1.25 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229122" ref_url="https://bugzilla.suse.com/1229122" source="BUGZILLA"/>
		<reference ref_id="1230252" ref_url="https://bugzilla.suse.com/1230252" source="BUGZILLA"/>
		<reference ref_id="1230253" ref_url="https://bugzilla.suse.com/1230253" source="BUGZILLA"/>
		<reference ref_id="1230254" ref_url="https://bugzilla.suse.com/1230254" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-34155" ref_url="https://www.suse.com/security/cve/CVE-2024-34155/" source="CVE"/>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<reference ref_id="CVE-2024-34158" ref_url="https://www.suse.com/security/cve/CVE-2024-34158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019525.html" source="SUSE-SU"/>
		<description>

This update of kubernetes1.25 fixes the following issues:

- rebuild the package with the current go 1.23 security release (bsc#1229122).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-02"/>
	<updated date="2024-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229122">SUSE bug 1229122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230252">SUSE bug 1230252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230253">SUSE bug 1230253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230254">SUSE bug 1230254</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34155/">CVE-2024-34155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34155">CVE-2024-34155 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34158/">CVE-2024-34158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34158">CVE-2024-34158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009944811" comment="kubernetes1.25-client-1.25.16-150400.9.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009944812" comment="kubernetes1.25-client-common-1.25.16-150400.9.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5009" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227233" ref_url="https://bugzilla.suse.com/1227233" source="BUGZILLA"/>
		<reference ref_id="1227378" ref_url="https://bugzilla.suse.com/1227378" source="BUGZILLA"/>
		<reference ref_id="1227999" ref_url="https://bugzilla.suse.com/1227999" source="BUGZILLA"/>
		<reference ref_id="1228780" ref_url="https://bugzilla.suse.com/1228780" source="BUGZILLA"/>
		<reference ref_id="1229596" ref_url="https://bugzilla.suse.com/1229596" source="BUGZILLA"/>
		<reference ref_id="1230227" ref_url="https://bugzilla.suse.com/1230227" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-5642" ref_url="https://www.suse.com/security/cve/CVE-2024-5642/" source="CVE"/>
		<reference ref_id="CVE-2024-6232" ref_url="https://www.suse.com/security/cve/CVE-2024-6232/" source="CVE"/>
		<reference ref_id="CVE-2024-6923" ref_url="https://www.suse.com/security/cve/CVE-2024-6923/" source="CVE"/>
		<reference ref_id="CVE-2024-7592" ref_url="https://www.suse.com/security/cve/CVE-2024-7592/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037102.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2024-6923: Fixed uncontrolled CPU resource consumption when in http.cookies module (bsc#1228780).
- CVE-2024-5642: Fixed buffer overread when NPN is used and invalid values are sent to the OpenSSL API (bsc#1227233).
- CVE-2024-7592: Fixed Email header injection due to unquoted newlines (bsc#1229596).
- CVE-2024-6232: excessive backtracking when parsing tarfile headers leads to ReDoS. (bsc#1230227)

Bug fixes:

- %{profileopt} variable is set according to the variable %{do_profiling} (bsc#1227999).
- Stop using %%defattr, it seems to be breaking proper executable attributes on /usr/bin/ scripts (bsc#1227378).
- Remove %suse_update_desktop_file macro as it is not useful any more.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-27"/>
	<updated date="2024-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1227233">SUSE bug 1227233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227378">SUSE bug 1227378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227999">SUSE bug 1227999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228780">SUSE bug 1228780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229596">SUSE bug 1229596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230227">SUSE bug 1230227</bugzilla>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-5642/">CVE-2024-5642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5642">CVE-2024-5642 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6232/">CVE-2024-6232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6232">CVE-2024-6232 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-6923/">CVE-2024-6923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6923">CVE-2024-6923 at NVD</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7592/">CVE-2024-7592 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7592">CVE-2024-7592 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945010" comment="libpython3_6m1_0-3.6.15-150300.10.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945011" comment="libpython3_6m1_0-32bit-3.6.15-150300.10.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945012" comment="python3-3.6.15-150300.10.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945013" comment="python3-base-3.6.15-150300.10.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945014" comment="python3-curses-3.6.15-150300.10.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945015" comment="python3-dbm-3.6.15-150300.10.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945016" comment="python3-devel-3.6.15-150300.10.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945017" comment="python3-doc-3.6.15-150300.10.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945018" comment="python3-doc-devhelp-3.6.15-150300.10.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945019" comment="python3-idle-3.6.15-150300.10.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945020" comment="python3-testsuite-3.6.15-150300.10.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945021" comment="python3-tk-3.6.15-150300.10.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945022" comment="python3-tools-3.6.15-150300.10.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5010" version="1" class="patch">
	<metadata>
		<title>Security update for quagga (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1202023" ref_url="https://bugzilla.suse.com/1202023" source="BUGZILLA"/>
		<reference ref_id="1229438" ref_url="https://bugzilla.suse.com/1229438" source="BUGZILLA"/>
		<reference ref_id="1230866" ref_url="https://bugzilla.suse.com/1230866" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-15865" ref_url="https://www.suse.com/security/cve/CVE-2017-15865/" source="CVE"/>
		<reference ref_id="CVE-2022-37032" ref_url="https://www.suse.com/security/cve/CVE-2022-37032/" source="CVE"/>
		<reference ref_id="CVE-2024-44070" ref_url="https://www.suse.com/security/cve/CVE-2024-44070/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3478-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037094.html" source="SUSE-SU"/>
		<description>
This update for quagga fixes the following issues:

- CVE-2017-15865: sensitive information disclosed when malformed BGP UPDATE packets are processed. (bsc#1230866)
- CVE-2024-44070: crash when parsing Tunnel Encap attribute due to no length check. (bsc#1229438)
- CVE-2022-37032: out-of-bounds read when parsing a BGP capability message due to incorrect size check. (bsc#1202023)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-27"/>
	<updated date="2024-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202023">SUSE bug 1202023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229438">SUSE bug 1229438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230866">SUSE bug 1230866</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2017-15865/">CVE-2017-15865 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2017-15865">CVE-2017-15865 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-37032/">CVE-2022-37032 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37032">CVE-2022-37032 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44070/">CVE-2024-44070 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44070">CVE-2024-44070 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945023" comment="libfpm_pb0-1.1.1-150400.12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945024" comment="libospf0-1.1.1-150400.12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945025" comment="libospfapiclient0-1.1.1-150400.12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945026" comment="libquagga_pb0-1.1.1-150400.12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945027" comment="libzebra1-1.1.1-150400.12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945028" comment="quagga-1.1.1-150400.12.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945029" comment="quagga-devel-1.1.1-150400.12.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5011" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1193629" ref_url="https://bugzilla.suse.com/1193629" source="BUGZILLA"/>
		<reference ref_id="1194111" ref_url="https://bugzilla.suse.com/1194111" source="BUGZILLA"/>
		<reference ref_id="1194765" ref_url="https://bugzilla.suse.com/1194765" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1196261" ref_url="https://bugzilla.suse.com/1196261" source="BUGZILLA"/>
		<reference ref_id="1196516" ref_url="https://bugzilla.suse.com/1196516" source="BUGZILLA"/>
		<reference ref_id="1196894" ref_url="https://bugzilla.suse.com/1196894" source="BUGZILLA"/>
		<reference ref_id="1198017" ref_url="https://bugzilla.suse.com/1198017" source="BUGZILLA"/>
		<reference ref_id="1203329" ref_url="https://bugzilla.suse.com/1203329" source="BUGZILLA"/>
		<reference ref_id="1203330" ref_url="https://bugzilla.suse.com/1203330" source="BUGZILLA"/>
		<reference ref_id="1203360" ref_url="https://bugzilla.suse.com/1203360" source="BUGZILLA"/>
		<reference ref_id="1205462" ref_url="https://bugzilla.suse.com/1205462" source="BUGZILLA"/>
		<reference ref_id="1206006" ref_url="https://bugzilla.suse.com/1206006" source="BUGZILLA"/>
		<reference ref_id="1206258" ref_url="https://bugzilla.suse.com/1206258" source="BUGZILLA"/>
		<reference ref_id="1206843" ref_url="https://bugzilla.suse.com/1206843" source="BUGZILLA"/>
		<reference ref_id="1207158" ref_url="https://bugzilla.suse.com/1207158" source="BUGZILLA"/>
		<reference ref_id="1208783" ref_url="https://bugzilla.suse.com/1208783" source="BUGZILLA"/>
		<reference ref_id="1210644" ref_url="https://bugzilla.suse.com/1210644" source="BUGZILLA"/>
		<reference ref_id="1213580" ref_url="https://bugzilla.suse.com/1213580" source="BUGZILLA"/>
		<reference ref_id="1213632" ref_url="https://bugzilla.suse.com/1213632" source="BUGZILLA"/>
		<reference ref_id="1214285" ref_url="https://bugzilla.suse.com/1214285" source="BUGZILLA"/>
		<reference ref_id="1216834" ref_url="https://bugzilla.suse.com/1216834" source="BUGZILLA"/>
		<reference ref_id="1220428" ref_url="https://bugzilla.suse.com/1220428" source="BUGZILLA"/>
		<reference ref_id="1220877" ref_url="https://bugzilla.suse.com/1220877" source="BUGZILLA"/>
		<reference ref_id="1220962" ref_url="https://bugzilla.suse.com/1220962" source="BUGZILLA"/>
		<reference ref_id="1221269" ref_url="https://bugzilla.suse.com/1221269" source="BUGZILLA"/>
		<reference ref_id="1221326" ref_url="https://bugzilla.suse.com/1221326" source="BUGZILLA"/>
		<reference ref_id="1221630" ref_url="https://bugzilla.suse.com/1221630" source="BUGZILLA"/>
		<reference ref_id="1221645" ref_url="https://bugzilla.suse.com/1221645" source="BUGZILLA"/>
		<reference ref_id="1222335" ref_url="https://bugzilla.suse.com/1222335" source="BUGZILLA"/>
		<reference ref_id="1222350" ref_url="https://bugzilla.suse.com/1222350" source="BUGZILLA"/>
		<reference ref_id="1222372" ref_url="https://bugzilla.suse.com/1222372" source="BUGZILLA"/>
		<reference ref_id="1222387" ref_url="https://bugzilla.suse.com/1222387" source="BUGZILLA"/>
		<reference ref_id="1222634" ref_url="https://bugzilla.suse.com/1222634" source="BUGZILLA"/>
		<reference ref_id="1222808" ref_url="https://bugzilla.suse.com/1222808" source="BUGZILLA"/>
		<reference ref_id="1222967" ref_url="https://bugzilla.suse.com/1222967" source="BUGZILLA"/>
		<reference ref_id="1223074" ref_url="https://bugzilla.suse.com/1223074" source="BUGZILLA"/>
		<reference ref_id="1223191" ref_url="https://bugzilla.suse.com/1223191" source="BUGZILLA"/>
		<reference ref_id="1223508" ref_url="https://bugzilla.suse.com/1223508" source="BUGZILLA"/>
		<reference ref_id="1223720" ref_url="https://bugzilla.suse.com/1223720" source="BUGZILLA"/>
		<reference ref_id="1223742" ref_url="https://bugzilla.suse.com/1223742" source="BUGZILLA"/>
		<reference ref_id="1223777" ref_url="https://bugzilla.suse.com/1223777" source="BUGZILLA"/>
		<reference ref_id="1223803" ref_url="https://bugzilla.suse.com/1223803" source="BUGZILLA"/>
		<reference ref_id="1223807" ref_url="https://bugzilla.suse.com/1223807" source="BUGZILLA"/>
		<reference ref_id="1224105" ref_url="https://bugzilla.suse.com/1224105" source="BUGZILLA"/>
		<reference ref_id="1224415" ref_url="https://bugzilla.suse.com/1224415" source="BUGZILLA"/>
		<reference ref_id="1224496" ref_url="https://bugzilla.suse.com/1224496" source="BUGZILLA"/>
		<reference ref_id="1224510" ref_url="https://bugzilla.suse.com/1224510" source="BUGZILLA"/>
		<reference ref_id="1224542" ref_url="https://bugzilla.suse.com/1224542" source="BUGZILLA"/>
		<reference ref_id="1224578" ref_url="https://bugzilla.suse.com/1224578" source="BUGZILLA"/>
		<reference ref_id="1224639" ref_url="https://bugzilla.suse.com/1224639" source="BUGZILLA"/>
		<reference ref_id="1225162" ref_url="https://bugzilla.suse.com/1225162" source="BUGZILLA"/>
		<reference ref_id="1225352" ref_url="https://bugzilla.suse.com/1225352" source="BUGZILLA"/>
		<reference ref_id="1225428" ref_url="https://bugzilla.suse.com/1225428" source="BUGZILLA"/>
		<reference ref_id="1225524" ref_url="https://bugzilla.suse.com/1225524" source="BUGZILLA"/>
		<reference ref_id="1225578" ref_url="https://bugzilla.suse.com/1225578" source="BUGZILLA"/>
		<reference ref_id="1225582" ref_url="https://bugzilla.suse.com/1225582" source="BUGZILLA"/>
		<reference ref_id="1225773" ref_url="https://bugzilla.suse.com/1225773" source="BUGZILLA"/>
		<reference ref_id="1225814" ref_url="https://bugzilla.suse.com/1225814" source="BUGZILLA"/>
		<reference ref_id="1225827" ref_url="https://bugzilla.suse.com/1225827" source="BUGZILLA"/>
		<reference ref_id="1225832" ref_url="https://bugzilla.suse.com/1225832" source="BUGZILLA"/>
		<reference ref_id="1225903" ref_url="https://bugzilla.suse.com/1225903" source="BUGZILLA"/>
		<reference ref_id="1226168" ref_url="https://bugzilla.suse.com/1226168" source="BUGZILLA"/>
		<reference ref_id="1226530" ref_url="https://bugzilla.suse.com/1226530" source="BUGZILLA"/>
		<reference ref_id="1226613" ref_url="https://bugzilla.suse.com/1226613" source="BUGZILLA"/>
		<reference ref_id="1226742" ref_url="https://bugzilla.suse.com/1226742" source="BUGZILLA"/>
		<reference ref_id="1226765" ref_url="https://bugzilla.suse.com/1226765" source="BUGZILLA"/>
		<reference ref_id="1226798" ref_url="https://bugzilla.suse.com/1226798" source="BUGZILLA"/>
		<reference ref_id="1226801" ref_url="https://bugzilla.suse.com/1226801" source="BUGZILLA"/>
		<reference ref_id="1226874" ref_url="https://bugzilla.suse.com/1226874" source="BUGZILLA"/>
		<reference ref_id="1226885" ref_url="https://bugzilla.suse.com/1226885" source="BUGZILLA"/>
		<reference ref_id="1227079" ref_url="https://bugzilla.suse.com/1227079" source="BUGZILLA"/>
		<reference ref_id="1227623" ref_url="https://bugzilla.suse.com/1227623" source="BUGZILLA"/>
		<reference ref_id="1227761" ref_url="https://bugzilla.suse.com/1227761" source="BUGZILLA"/>
		<reference ref_id="1227830" ref_url="https://bugzilla.suse.com/1227830" source="BUGZILLA"/>
		<reference ref_id="1227863" ref_url="https://bugzilla.suse.com/1227863" source="BUGZILLA"/>
		<reference ref_id="1227867" ref_url="https://bugzilla.suse.com/1227867" source="BUGZILLA"/>
		<reference ref_id="1227929" ref_url="https://bugzilla.suse.com/1227929" source="BUGZILLA"/>
		<reference ref_id="1227937" ref_url="https://bugzilla.suse.com/1227937" source="BUGZILLA"/>
		<reference ref_id="1227958" ref_url="https://bugzilla.suse.com/1227958" source="BUGZILLA"/>
		<reference ref_id="1228020" ref_url="https://bugzilla.suse.com/1228020" source="BUGZILLA"/>
		<reference ref_id="1228065" ref_url="https://bugzilla.suse.com/1228065" source="BUGZILLA"/>
		<reference ref_id="1228114" ref_url="https://bugzilla.suse.com/1228114" source="BUGZILLA"/>
		<reference ref_id="1228410" ref_url="https://bugzilla.suse.com/1228410" source="BUGZILLA"/>
		<reference ref_id="1228426" ref_url="https://bugzilla.suse.com/1228426" source="BUGZILLA"/>
		<reference ref_id="1228427" ref_url="https://bugzilla.suse.com/1228427" source="BUGZILLA"/>
		<reference ref_id="1228429" ref_url="https://bugzilla.suse.com/1228429" source="BUGZILLA"/>
		<reference ref_id="1228446" ref_url="https://bugzilla.suse.com/1228446" source="BUGZILLA"/>
		<reference ref_id="1228447" ref_url="https://bugzilla.suse.com/1228447" source="BUGZILLA"/>
		<reference ref_id="1228449" ref_url="https://bugzilla.suse.com/1228449" source="BUGZILLA"/>
		<reference ref_id="1228450" ref_url="https://bugzilla.suse.com/1228450" source="BUGZILLA"/>
		<reference ref_id="1228452" ref_url="https://bugzilla.suse.com/1228452" source="BUGZILLA"/>
		<reference ref_id="1228456" ref_url="https://bugzilla.suse.com/1228456" source="BUGZILLA"/>
		<reference ref_id="1228463" ref_url="https://bugzilla.suse.com/1228463" source="BUGZILLA"/>
		<reference ref_id="1228466" ref_url="https://bugzilla.suse.com/1228466" source="BUGZILLA"/>
		<reference ref_id="1228467" ref_url="https://bugzilla.suse.com/1228467" source="BUGZILLA"/>
		<reference ref_id="1228469" ref_url="https://bugzilla.suse.com/1228469" source="BUGZILLA"/>
		<reference ref_id="1228480" ref_url="https://bugzilla.suse.com/1228480" source="BUGZILLA"/>
		<reference ref_id="1228481" ref_url="https://bugzilla.suse.com/1228481" source="BUGZILLA"/>
		<reference ref_id="1228482" ref_url="https://bugzilla.suse.com/1228482" source="BUGZILLA"/>
		<reference ref_id="1228483" ref_url="https://bugzilla.suse.com/1228483" source="BUGZILLA"/>
		<reference ref_id="1228484" ref_url="https://bugzilla.suse.com/1228484" source="BUGZILLA"/>
		<reference ref_id="1228485" ref_url="https://bugzilla.suse.com/1228485" source="BUGZILLA"/>
		<reference ref_id="1228487" ref_url="https://bugzilla.suse.com/1228487" source="BUGZILLA"/>
		<reference ref_id="1228489" ref_url="https://bugzilla.suse.com/1228489" source="BUGZILLA"/>
		<reference ref_id="1228491" ref_url="https://bugzilla.suse.com/1228491" source="BUGZILLA"/>
		<reference ref_id="1228493" ref_url="https://bugzilla.suse.com/1228493" source="BUGZILLA"/>
		<reference ref_id="1228494" ref_url="https://bugzilla.suse.com/1228494" source="BUGZILLA"/>
		<reference ref_id="1228495" ref_url="https://bugzilla.suse.com/1228495" source="BUGZILLA"/>
		<reference ref_id="1228496" ref_url="https://bugzilla.suse.com/1228496" source="BUGZILLA"/>
		<reference ref_id="1228501" ref_url="https://bugzilla.suse.com/1228501" source="BUGZILLA"/>
		<reference ref_id="1228503" ref_url="https://bugzilla.suse.com/1228503" source="BUGZILLA"/>
		<reference ref_id="1228509" ref_url="https://bugzilla.suse.com/1228509" source="BUGZILLA"/>
		<reference ref_id="1228513" ref_url="https://bugzilla.suse.com/1228513" source="BUGZILLA"/>
		<reference ref_id="1228515" ref_url="https://bugzilla.suse.com/1228515" source="BUGZILLA"/>
		<reference ref_id="1228516" ref_url="https://bugzilla.suse.com/1228516" source="BUGZILLA"/>
		<reference ref_id="1228526" ref_url="https://bugzilla.suse.com/1228526" source="BUGZILLA"/>
		<reference ref_id="1228531" ref_url="https://bugzilla.suse.com/1228531" source="BUGZILLA"/>
		<reference ref_id="1228563" ref_url="https://bugzilla.suse.com/1228563" source="BUGZILLA"/>
		<reference ref_id="1228564" ref_url="https://bugzilla.suse.com/1228564" source="BUGZILLA"/>
		<reference ref_id="1228567" ref_url="https://bugzilla.suse.com/1228567" source="BUGZILLA"/>
		<reference ref_id="1228576" ref_url="https://bugzilla.suse.com/1228576" source="BUGZILLA"/>
		<reference ref_id="1228579" ref_url="https://bugzilla.suse.com/1228579" source="BUGZILLA"/>
		<reference ref_id="1228584" ref_url="https://bugzilla.suse.com/1228584" source="BUGZILLA"/>
		<reference ref_id="1228588" ref_url="https://bugzilla.suse.com/1228588" source="BUGZILLA"/>
		<reference ref_id="1228590" ref_url="https://bugzilla.suse.com/1228590" source="BUGZILLA"/>
		<reference ref_id="1228615" ref_url="https://bugzilla.suse.com/1228615" source="BUGZILLA"/>
		<reference ref_id="1228616" ref_url="https://bugzilla.suse.com/1228616" source="BUGZILLA"/>
		<reference ref_id="1228635" ref_url="https://bugzilla.suse.com/1228635" source="BUGZILLA"/>
		<reference ref_id="1228636" ref_url="https://bugzilla.suse.com/1228636" source="BUGZILLA"/>
		<reference ref_id="1228654" ref_url="https://bugzilla.suse.com/1228654" source="BUGZILLA"/>
		<reference ref_id="1228656" ref_url="https://bugzilla.suse.com/1228656" source="BUGZILLA"/>
		<reference ref_id="1228658" ref_url="https://bugzilla.suse.com/1228658" source="BUGZILLA"/>
		<reference ref_id="1228660" ref_url="https://bugzilla.suse.com/1228660" source="BUGZILLA"/>
		<reference ref_id="1228662" ref_url="https://bugzilla.suse.com/1228662" source="BUGZILLA"/>
		<reference ref_id="1228667" ref_url="https://bugzilla.suse.com/1228667" source="BUGZILLA"/>
		<reference ref_id="1228673" ref_url="https://bugzilla.suse.com/1228673" source="BUGZILLA"/>
		<reference ref_id="1228677" ref_url="https://bugzilla.suse.com/1228677" source="BUGZILLA"/>
		<reference ref_id="1228687" ref_url="https://bugzilla.suse.com/1228687" source="BUGZILLA"/>
		<reference ref_id="1228706" ref_url="https://bugzilla.suse.com/1228706" source="BUGZILLA"/>
		<reference ref_id="1228708" ref_url="https://bugzilla.suse.com/1228708" source="BUGZILLA"/>
		<reference ref_id="1228710" ref_url="https://bugzilla.suse.com/1228710" source="BUGZILLA"/>
		<reference ref_id="1228718" ref_url="https://bugzilla.suse.com/1228718" source="BUGZILLA"/>
		<reference ref_id="1228720" ref_url="https://bugzilla.suse.com/1228720" source="BUGZILLA"/>
		<reference ref_id="1228721" ref_url="https://bugzilla.suse.com/1228721" source="BUGZILLA"/>
		<reference ref_id="1228722" ref_url="https://bugzilla.suse.com/1228722" source="BUGZILLA"/>
		<reference ref_id="1228724" ref_url="https://bugzilla.suse.com/1228724" source="BUGZILLA"/>
		<reference ref_id="1228726" ref_url="https://bugzilla.suse.com/1228726" source="BUGZILLA"/>
		<reference ref_id="1228727" ref_url="https://bugzilla.suse.com/1228727" source="BUGZILLA"/>
		<reference ref_id="1228733" ref_url="https://bugzilla.suse.com/1228733" source="BUGZILLA"/>
		<reference ref_id="1228748" ref_url="https://bugzilla.suse.com/1228748" source="BUGZILLA"/>
		<reference ref_id="1228766" ref_url="https://bugzilla.suse.com/1228766" source="BUGZILLA"/>
		<reference ref_id="1228779" ref_url="https://bugzilla.suse.com/1228779" source="BUGZILLA"/>
		<reference ref_id="1228801" ref_url="https://bugzilla.suse.com/1228801" source="BUGZILLA"/>
		<reference ref_id="1228850" ref_url="https://bugzilla.suse.com/1228850" source="BUGZILLA"/>
		<reference ref_id="1228857" ref_url="https://bugzilla.suse.com/1228857" source="BUGZILLA"/>
		<reference ref_id="1228959" ref_url="https://bugzilla.suse.com/1228959" source="BUGZILLA"/>
		<reference ref_id="1228964" ref_url="https://bugzilla.suse.com/1228964" source="BUGZILLA"/>
		<reference ref_id="1228966" ref_url="https://bugzilla.suse.com/1228966" source="BUGZILLA"/>
		<reference ref_id="1228967" ref_url="https://bugzilla.suse.com/1228967" source="BUGZILLA"/>
		<reference ref_id="1228979" ref_url="https://bugzilla.suse.com/1228979" source="BUGZILLA"/>
		<reference ref_id="1228988" ref_url="https://bugzilla.suse.com/1228988" source="BUGZILLA"/>
		<reference ref_id="1228989" ref_url="https://bugzilla.suse.com/1228989" source="BUGZILLA"/>
		<reference ref_id="1228991" ref_url="https://bugzilla.suse.com/1228991" source="BUGZILLA"/>
		<reference ref_id="1228992" ref_url="https://bugzilla.suse.com/1228992" source="BUGZILLA"/>
		<reference ref_id="1229042" ref_url="https://bugzilla.suse.com/1229042" source="BUGZILLA"/>
		<reference ref_id="1229054" ref_url="https://bugzilla.suse.com/1229054" source="BUGZILLA"/>
		<reference ref_id="1229086" ref_url="https://bugzilla.suse.com/1229086" source="BUGZILLA"/>
		<reference ref_id="1229136" ref_url="https://bugzilla.suse.com/1229136" source="BUGZILLA"/>
		<reference ref_id="1229154" ref_url="https://bugzilla.suse.com/1229154" source="BUGZILLA"/>
		<reference ref_id="1229187" ref_url="https://bugzilla.suse.com/1229187" source="BUGZILLA"/>
		<reference ref_id="1229188" ref_url="https://bugzilla.suse.com/1229188" source="BUGZILLA"/>
		<reference ref_id="1229190" ref_url="https://bugzilla.suse.com/1229190" source="BUGZILLA"/>
		<reference ref_id="1229287" ref_url="https://bugzilla.suse.com/1229287" source="BUGZILLA"/>
		<reference ref_id="1229290" ref_url="https://bugzilla.suse.com/1229290" source="BUGZILLA"/>
		<reference ref_id="1229292" ref_url="https://bugzilla.suse.com/1229292" source="BUGZILLA"/>
		<reference ref_id="1229296" ref_url="https://bugzilla.suse.com/1229296" source="BUGZILLA"/>
		<reference ref_id="1229297" ref_url="https://bugzilla.suse.com/1229297" source="BUGZILLA"/>
		<reference ref_id="1229301" ref_url="https://bugzilla.suse.com/1229301" source="BUGZILLA"/>
		<reference ref_id="1229303" ref_url="https://bugzilla.suse.com/1229303" source="BUGZILLA"/>
		<reference ref_id="1229304" ref_url="https://bugzilla.suse.com/1229304" source="BUGZILLA"/>
		<reference ref_id="1229305" ref_url="https://bugzilla.suse.com/1229305" source="BUGZILLA"/>
		<reference ref_id="1229307" ref_url="https://bugzilla.suse.com/1229307" source="BUGZILLA"/>
		<reference ref_id="1229309" ref_url="https://bugzilla.suse.com/1229309" source="BUGZILLA"/>
		<reference ref_id="1229312" ref_url="https://bugzilla.suse.com/1229312" source="BUGZILLA"/>
		<reference ref_id="1229314" ref_url="https://bugzilla.suse.com/1229314" source="BUGZILLA"/>
		<reference ref_id="1229315" ref_url="https://bugzilla.suse.com/1229315" source="BUGZILLA"/>
		<reference ref_id="1229317" ref_url="https://bugzilla.suse.com/1229317" source="BUGZILLA"/>
		<reference ref_id="1229318" ref_url="https://bugzilla.suse.com/1229318" source="BUGZILLA"/>
		<reference ref_id="1229319" ref_url="https://bugzilla.suse.com/1229319" source="BUGZILLA"/>
		<reference ref_id="1229327" ref_url="https://bugzilla.suse.com/1229327" source="BUGZILLA"/>
		<reference ref_id="1229341" ref_url="https://bugzilla.suse.com/1229341" source="BUGZILLA"/>
		<reference ref_id="1229345" ref_url="https://bugzilla.suse.com/1229345" source="BUGZILLA"/>
		<reference ref_id="1229346" ref_url="https://bugzilla.suse.com/1229346" source="BUGZILLA"/>
		<reference ref_id="1229347" ref_url="https://bugzilla.suse.com/1229347" source="BUGZILLA"/>
		<reference ref_id="1229349" ref_url="https://bugzilla.suse.com/1229349" source="BUGZILLA"/>
		<reference ref_id="1229350" ref_url="https://bugzilla.suse.com/1229350" source="BUGZILLA"/>
		<reference ref_id="1229351" ref_url="https://bugzilla.suse.com/1229351" source="BUGZILLA"/>
		<reference ref_id="1229354" ref_url="https://bugzilla.suse.com/1229354" source="BUGZILLA"/>
		<reference ref_id="1229356" ref_url="https://bugzilla.suse.com/1229356" source="BUGZILLA"/>
		<reference ref_id="1229357" ref_url="https://bugzilla.suse.com/1229357" source="BUGZILLA"/>
		<reference ref_id="1229358" ref_url="https://bugzilla.suse.com/1229358" source="BUGZILLA"/>
		<reference ref_id="1229359" ref_url="https://bugzilla.suse.com/1229359" source="BUGZILLA"/>
		<reference ref_id="1229360" ref_url="https://bugzilla.suse.com/1229360" source="BUGZILLA"/>
		<reference ref_id="1229366" ref_url="https://bugzilla.suse.com/1229366" source="BUGZILLA"/>
		<reference ref_id="1229370" ref_url="https://bugzilla.suse.com/1229370" source="BUGZILLA"/>
		<reference ref_id="1229373" ref_url="https://bugzilla.suse.com/1229373" source="BUGZILLA"/>
		<reference ref_id="1229374" ref_url="https://bugzilla.suse.com/1229374" source="BUGZILLA"/>
		<reference ref_id="1229381" ref_url="https://bugzilla.suse.com/1229381" source="BUGZILLA"/>
		<reference ref_id="1229382" ref_url="https://bugzilla.suse.com/1229382" source="BUGZILLA"/>
		<reference ref_id="1229383" ref_url="https://bugzilla.suse.com/1229383" source="BUGZILLA"/>
		<reference ref_id="1229386" ref_url="https://bugzilla.suse.com/1229386" source="BUGZILLA"/>
		<reference ref_id="1229388" ref_url="https://bugzilla.suse.com/1229388" source="BUGZILLA"/>
		<reference ref_id="1229391" ref_url="https://bugzilla.suse.com/1229391" source="BUGZILLA"/>
		<reference ref_id="1229392" ref_url="https://bugzilla.suse.com/1229392" source="BUGZILLA"/>
		<reference ref_id="1229395" ref_url="https://bugzilla.suse.com/1229395" source="BUGZILLA"/>
		<reference ref_id="1229398" ref_url="https://bugzilla.suse.com/1229398" source="BUGZILLA"/>
		<reference ref_id="1229399" ref_url="https://bugzilla.suse.com/1229399" source="BUGZILLA"/>
		<reference ref_id="1229400" ref_url="https://bugzilla.suse.com/1229400" source="BUGZILLA"/>
		<reference ref_id="1229407" ref_url="https://bugzilla.suse.com/1229407" source="BUGZILLA"/>
		<reference ref_id="1229409" ref_url="https://bugzilla.suse.com/1229409" source="BUGZILLA"/>
		<reference ref_id="1229410" ref_url="https://bugzilla.suse.com/1229410" source="BUGZILLA"/>
		<reference ref_id="1229411" ref_url="https://bugzilla.suse.com/1229411" source="BUGZILLA"/>
		<reference ref_id="1229413" ref_url="https://bugzilla.suse.com/1229413" source="BUGZILLA"/>
		<reference ref_id="1229414" ref_url="https://bugzilla.suse.com/1229414" source="BUGZILLA"/>
		<reference ref_id="1229417" ref_url="https://bugzilla.suse.com/1229417" source="BUGZILLA"/>
		<reference ref_id="1229418" ref_url="https://bugzilla.suse.com/1229418" source="BUGZILLA"/>
		<reference ref_id="1229444" ref_url="https://bugzilla.suse.com/1229444" source="BUGZILLA"/>
		<reference ref_id="1229453" ref_url="https://bugzilla.suse.com/1229453" source="BUGZILLA"/>
		<reference ref_id="1229454" ref_url="https://bugzilla.suse.com/1229454" source="BUGZILLA"/>
		<reference ref_id="1229481" ref_url="https://bugzilla.suse.com/1229481" source="BUGZILLA"/>
		<reference ref_id="1229482" ref_url="https://bugzilla.suse.com/1229482" source="BUGZILLA"/>
		<reference ref_id="1229488" ref_url="https://bugzilla.suse.com/1229488" source="BUGZILLA"/>
		<reference ref_id="1229489" ref_url="https://bugzilla.suse.com/1229489" source="BUGZILLA"/>
		<reference ref_id="1229490" ref_url="https://bugzilla.suse.com/1229490" source="BUGZILLA"/>
		<reference ref_id="1229493" ref_url="https://bugzilla.suse.com/1229493" source="BUGZILLA"/>
		<reference ref_id="1229495" ref_url="https://bugzilla.suse.com/1229495" source="BUGZILLA"/>
		<reference ref_id="1229497" ref_url="https://bugzilla.suse.com/1229497" source="BUGZILLA"/>
		<reference ref_id="1229500" ref_url="https://bugzilla.suse.com/1229500" source="BUGZILLA"/>
		<reference ref_id="1229503" ref_url="https://bugzilla.suse.com/1229503" source="BUGZILLA"/>
		<reference ref_id="1229506" ref_url="https://bugzilla.suse.com/1229506" source="BUGZILLA"/>
		<reference ref_id="1229507" ref_url="https://bugzilla.suse.com/1229507" source="BUGZILLA"/>
		<reference ref_id="1229508" ref_url="https://bugzilla.suse.com/1229508" source="BUGZILLA"/>
		<reference ref_id="1229509" ref_url="https://bugzilla.suse.com/1229509" source="BUGZILLA"/>
		<reference ref_id="1229510" ref_url="https://bugzilla.suse.com/1229510" source="BUGZILLA"/>
		<reference ref_id="1229512" ref_url="https://bugzilla.suse.com/1229512" source="BUGZILLA"/>
		<reference ref_id="1229516" ref_url="https://bugzilla.suse.com/1229516" source="BUGZILLA"/>
		<reference ref_id="1229521" ref_url="https://bugzilla.suse.com/1229521" source="BUGZILLA"/>
		<reference ref_id="1229522" ref_url="https://bugzilla.suse.com/1229522" source="BUGZILLA"/>
		<reference ref_id="1229523" ref_url="https://bugzilla.suse.com/1229523" source="BUGZILLA"/>
		<reference ref_id="1229524" ref_url="https://bugzilla.suse.com/1229524" source="BUGZILLA"/>
		<reference ref_id="1229525" ref_url="https://bugzilla.suse.com/1229525" source="BUGZILLA"/>
		<reference ref_id="1229526" ref_url="https://bugzilla.suse.com/1229526" source="BUGZILLA"/>
		<reference ref_id="1229527" ref_url="https://bugzilla.suse.com/1229527" source="BUGZILLA"/>
		<reference ref_id="1229528" ref_url="https://bugzilla.suse.com/1229528" source="BUGZILLA"/>
		<reference ref_id="1229529" ref_url="https://bugzilla.suse.com/1229529" source="BUGZILLA"/>
		<reference ref_id="1229531" ref_url="https://bugzilla.suse.com/1229531" source="BUGZILLA"/>
		<reference ref_id="1229533" ref_url="https://bugzilla.suse.com/1229533" source="BUGZILLA"/>
		<reference ref_id="1229535" ref_url="https://bugzilla.suse.com/1229535" source="BUGZILLA"/>
		<reference ref_id="1229536" ref_url="https://bugzilla.suse.com/1229536" source="BUGZILLA"/>
		<reference ref_id="1229537" ref_url="https://bugzilla.suse.com/1229537" source="BUGZILLA"/>
		<reference ref_id="1229540" ref_url="https://bugzilla.suse.com/1229540" source="BUGZILLA"/>
		<reference ref_id="1229544" ref_url="https://bugzilla.suse.com/1229544" source="BUGZILLA"/>
		<reference ref_id="1229545" ref_url="https://bugzilla.suse.com/1229545" source="BUGZILLA"/>
		<reference ref_id="1229546" ref_url="https://bugzilla.suse.com/1229546" source="BUGZILLA"/>
		<reference ref_id="1229547" ref_url="https://bugzilla.suse.com/1229547" source="BUGZILLA"/>
		<reference ref_id="1229548" ref_url="https://bugzilla.suse.com/1229548" source="BUGZILLA"/>
		<reference ref_id="1229554" ref_url="https://bugzilla.suse.com/1229554" source="BUGZILLA"/>
		<reference ref_id="1229557" ref_url="https://bugzilla.suse.com/1229557" source="BUGZILLA"/>
		<reference ref_id="1229558" ref_url="https://bugzilla.suse.com/1229558" source="BUGZILLA"/>
		<reference ref_id="1229559" ref_url="https://bugzilla.suse.com/1229559" source="BUGZILLA"/>
		<reference ref_id="1229560" ref_url="https://bugzilla.suse.com/1229560" source="BUGZILLA"/>
		<reference ref_id="1229562" ref_url="https://bugzilla.suse.com/1229562" source="BUGZILLA"/>
		<reference ref_id="1229564" ref_url="https://bugzilla.suse.com/1229564" source="BUGZILLA"/>
		<reference ref_id="1229565" ref_url="https://bugzilla.suse.com/1229565" source="BUGZILLA"/>
		<reference ref_id="1229566" ref_url="https://bugzilla.suse.com/1229566" source="BUGZILLA"/>
		<reference ref_id="1229568" ref_url="https://bugzilla.suse.com/1229568" source="BUGZILLA"/>
		<reference ref_id="1229569" ref_url="https://bugzilla.suse.com/1229569" source="BUGZILLA"/>
		<reference ref_id="1229572" ref_url="https://bugzilla.suse.com/1229572" source="BUGZILLA"/>
		<reference ref_id="1229573" ref_url="https://bugzilla.suse.com/1229573" source="BUGZILLA"/>
		<reference ref_id="1229576" ref_url="https://bugzilla.suse.com/1229576" source="BUGZILLA"/>
		<reference ref_id="1229581" ref_url="https://bugzilla.suse.com/1229581" source="BUGZILLA"/>
		<reference ref_id="1229588" ref_url="https://bugzilla.suse.com/1229588" source="BUGZILLA"/>
		<reference ref_id="1229598" ref_url="https://bugzilla.suse.com/1229598" source="BUGZILLA"/>
		<reference ref_id="1229603" ref_url="https://bugzilla.suse.com/1229603" source="BUGZILLA"/>
		<reference ref_id="1229604" ref_url="https://bugzilla.suse.com/1229604" source="BUGZILLA"/>
		<reference ref_id="1229605" ref_url="https://bugzilla.suse.com/1229605" source="BUGZILLA"/>
		<reference ref_id="1229608" ref_url="https://bugzilla.suse.com/1229608" source="BUGZILLA"/>
		<reference ref_id="1229611" ref_url="https://bugzilla.suse.com/1229611" source="BUGZILLA"/>
		<reference ref_id="1229612" ref_url="https://bugzilla.suse.com/1229612" source="BUGZILLA"/>
		<reference ref_id="1229613" ref_url="https://bugzilla.suse.com/1229613" source="BUGZILLA"/>
		<reference ref_id="1229614" ref_url="https://bugzilla.suse.com/1229614" source="BUGZILLA"/>
		<reference ref_id="1229615" ref_url="https://bugzilla.suse.com/1229615" source="BUGZILLA"/>
		<reference ref_id="1229616" ref_url="https://bugzilla.suse.com/1229616" source="BUGZILLA"/>
		<reference ref_id="1229617" ref_url="https://bugzilla.suse.com/1229617" source="BUGZILLA"/>
		<reference ref_id="1229620" ref_url="https://bugzilla.suse.com/1229620" source="BUGZILLA"/>
		<reference ref_id="1229622" ref_url="https://bugzilla.suse.com/1229622" source="BUGZILLA"/>
		<reference ref_id="1229623" ref_url="https://bugzilla.suse.com/1229623" source="BUGZILLA"/>
		<reference ref_id="1229624" ref_url="https://bugzilla.suse.com/1229624" source="BUGZILLA"/>
		<reference ref_id="1229625" ref_url="https://bugzilla.suse.com/1229625" source="BUGZILLA"/>
		<reference ref_id="1229626" ref_url="https://bugzilla.suse.com/1229626" source="BUGZILLA"/>
		<reference ref_id="1229628" ref_url="https://bugzilla.suse.com/1229628" source="BUGZILLA"/>
		<reference ref_id="1229629" ref_url="https://bugzilla.suse.com/1229629" source="BUGZILLA"/>
		<reference ref_id="1229630" ref_url="https://bugzilla.suse.com/1229630" source="BUGZILLA"/>
		<reference ref_id="1229631" ref_url="https://bugzilla.suse.com/1229631" source="BUGZILLA"/>
		<reference ref_id="1229632" ref_url="https://bugzilla.suse.com/1229632" source="BUGZILLA"/>
		<reference ref_id="1229635" ref_url="https://bugzilla.suse.com/1229635" source="BUGZILLA"/>
		<reference ref_id="1229636" ref_url="https://bugzilla.suse.com/1229636" source="BUGZILLA"/>
		<reference ref_id="1229637" ref_url="https://bugzilla.suse.com/1229637" source="BUGZILLA"/>
		<reference ref_id="1229638" ref_url="https://bugzilla.suse.com/1229638" source="BUGZILLA"/>
		<reference ref_id="1229639" ref_url="https://bugzilla.suse.com/1229639" source="BUGZILLA"/>
		<reference ref_id="1229641" ref_url="https://bugzilla.suse.com/1229641" source="BUGZILLA"/>
		<reference ref_id="1229642" ref_url="https://bugzilla.suse.com/1229642" source="BUGZILLA"/>
		<reference ref_id="1229643" ref_url="https://bugzilla.suse.com/1229643" source="BUGZILLA"/>
		<reference ref_id="1229645" ref_url="https://bugzilla.suse.com/1229645" source="BUGZILLA"/>
		<reference ref_id="1229657" ref_url="https://bugzilla.suse.com/1229657" source="BUGZILLA"/>
		<reference ref_id="1229658" ref_url="https://bugzilla.suse.com/1229658" source="BUGZILLA"/>
		<reference ref_id="1229662" ref_url="https://bugzilla.suse.com/1229662" source="BUGZILLA"/>
		<reference ref_id="1229664" ref_url="https://bugzilla.suse.com/1229664" source="BUGZILLA"/>
		<reference ref_id="1229707" ref_url="https://bugzilla.suse.com/1229707" source="BUGZILLA"/>
		<reference ref_id="1229739" ref_url="https://bugzilla.suse.com/1229739" source="BUGZILLA"/>
		<reference ref_id="1229743" ref_url="https://bugzilla.suse.com/1229743" source="BUGZILLA"/>
		<reference ref_id="1229746" ref_url="https://bugzilla.suse.com/1229746" source="BUGZILLA"/>
		<reference ref_id="1229754" ref_url="https://bugzilla.suse.com/1229754" source="BUGZILLA"/>
		<reference ref_id="1229755" ref_url="https://bugzilla.suse.com/1229755" source="BUGZILLA"/>
		<reference ref_id="1229756" ref_url="https://bugzilla.suse.com/1229756" source="BUGZILLA"/>
		<reference ref_id="1229759" ref_url="https://bugzilla.suse.com/1229759" source="BUGZILLA"/>
		<reference ref_id="1229761" ref_url="https://bugzilla.suse.com/1229761" source="BUGZILLA"/>
		<reference ref_id="1229767" ref_url="https://bugzilla.suse.com/1229767" source="BUGZILLA"/>
		<reference ref_id="1229768" ref_url="https://bugzilla.suse.com/1229768" source="BUGZILLA"/>
		<reference ref_id="1229781" ref_url="https://bugzilla.suse.com/1229781" source="BUGZILLA"/>
		<reference ref_id="1229784" ref_url="https://bugzilla.suse.com/1229784" source="BUGZILLA"/>
		<reference ref_id="1229787" ref_url="https://bugzilla.suse.com/1229787" source="BUGZILLA"/>
		<reference ref_id="1229788" ref_url="https://bugzilla.suse.com/1229788" source="BUGZILLA"/>
		<reference ref_id="1229789" ref_url="https://bugzilla.suse.com/1229789" source="BUGZILLA"/>
		<reference ref_id="1229792" ref_url="https://bugzilla.suse.com/1229792" source="BUGZILLA"/>
		<reference ref_id="1229820" ref_url="https://bugzilla.suse.com/1229820" source="BUGZILLA"/>
		<reference ref_id="1230413" ref_url="https://bugzilla.suse.com/1230413" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4204" ref_url="https://www.suse.com/security/cve/CVE-2021-4204/" source="CVE"/>
		<reference ref_id="CVE-2021-4441" ref_url="https://www.suse.com/security/cve/CVE-2021-4441/" source="CVE"/>
		<reference ref_id="CVE-2021-47106" ref_url="https://www.suse.com/security/cve/CVE-2021-47106/" source="CVE"/>
		<reference ref_id="CVE-2021-47517" ref_url="https://www.suse.com/security/cve/CVE-2021-47517/" source="CVE"/>
		<reference ref_id="CVE-2021-47546" ref_url="https://www.suse.com/security/cve/CVE-2021-47546/" source="CVE"/>
		<reference ref_id="CVE-2022-0500" ref_url="https://www.suse.com/security/cve/CVE-2022-0500/" source="CVE"/>
		<reference ref_id="CVE-2022-23222" ref_url="https://www.suse.com/security/cve/CVE-2022-23222/" source="CVE"/>
		<reference ref_id="CVE-2022-38457" ref_url="https://www.suse.com/security/cve/CVE-2022-38457/" source="CVE"/>
		<reference ref_id="CVE-2022-40133" ref_url="https://www.suse.com/security/cve/CVE-2022-40133/" source="CVE"/>
		<reference ref_id="CVE-2022-4382" ref_url="https://www.suse.com/security/cve/CVE-2022-4382/" source="CVE"/>
		<reference ref_id="CVE-2022-48645" ref_url="https://www.suse.com/security/cve/CVE-2022-48645/" source="CVE"/>
		<reference ref_id="CVE-2022-48706" ref_url="https://www.suse.com/security/cve/CVE-2022-48706/" source="CVE"/>
		<reference ref_id="CVE-2022-48808" ref_url="https://www.suse.com/security/cve/CVE-2022-48808/" source="CVE"/>
		<reference ref_id="CVE-2022-48865" ref_url="https://www.suse.com/security/cve/CVE-2022-48865/" source="CVE"/>
		<reference ref_id="CVE-2022-48868" ref_url="https://www.suse.com/security/cve/CVE-2022-48868/" source="CVE"/>
		<reference ref_id="CVE-2022-48869" ref_url="https://www.suse.com/security/cve/CVE-2022-48869/" source="CVE"/>
		<reference ref_id="CVE-2022-48870" ref_url="https://www.suse.com/security/cve/CVE-2022-48870/" source="CVE"/>
		<reference ref_id="CVE-2022-48871" ref_url="https://www.suse.com/security/cve/CVE-2022-48871/" source="CVE"/>
		<reference ref_id="CVE-2022-48872" ref_url="https://www.suse.com/security/cve/CVE-2022-48872/" source="CVE"/>
		<reference ref_id="CVE-2022-48873" ref_url="https://www.suse.com/security/cve/CVE-2022-48873/" source="CVE"/>
		<reference ref_id="CVE-2022-48875" ref_url="https://www.suse.com/security/cve/CVE-2022-48875/" source="CVE"/>
		<reference ref_id="CVE-2022-48878" ref_url="https://www.suse.com/security/cve/CVE-2022-48878/" source="CVE"/>
		<reference ref_id="CVE-2022-48880" ref_url="https://www.suse.com/security/cve/CVE-2022-48880/" source="CVE"/>
		<reference ref_id="CVE-2022-48881" ref_url="https://www.suse.com/security/cve/CVE-2022-48881/" source="CVE"/>
		<reference ref_id="CVE-2022-48882" ref_url="https://www.suse.com/security/cve/CVE-2022-48882/" source="CVE"/>
		<reference ref_id="CVE-2022-48883" ref_url="https://www.suse.com/security/cve/CVE-2022-48883/" source="CVE"/>
		<reference ref_id="CVE-2022-48884" ref_url="https://www.suse.com/security/cve/CVE-2022-48884/" source="CVE"/>
		<reference ref_id="CVE-2022-48885" ref_url="https://www.suse.com/security/cve/CVE-2022-48885/" source="CVE"/>
		<reference ref_id="CVE-2022-48886" ref_url="https://www.suse.com/security/cve/CVE-2022-48886/" source="CVE"/>
		<reference ref_id="CVE-2022-48887" ref_url="https://www.suse.com/security/cve/CVE-2022-48887/" source="CVE"/>
		<reference ref_id="CVE-2022-48888" ref_url="https://www.suse.com/security/cve/CVE-2022-48888/" source="CVE"/>
		<reference ref_id="CVE-2022-48889" ref_url="https://www.suse.com/security/cve/CVE-2022-48889/" source="CVE"/>
		<reference ref_id="CVE-2022-48890" ref_url="https://www.suse.com/security/cve/CVE-2022-48890/" source="CVE"/>
		<reference ref_id="CVE-2022-48891" ref_url="https://www.suse.com/security/cve/CVE-2022-48891/" source="CVE"/>
		<reference ref_id="CVE-2022-48893" ref_url="https://www.suse.com/security/cve/CVE-2022-48893/" source="CVE"/>
		<reference ref_id="CVE-2022-48896" ref_url="https://www.suse.com/security/cve/CVE-2022-48896/" source="CVE"/>
		<reference ref_id="CVE-2022-48898" ref_url="https://www.suse.com/security/cve/CVE-2022-48898/" source="CVE"/>
		<reference ref_id="CVE-2022-48899" ref_url="https://www.suse.com/security/cve/CVE-2022-48899/" source="CVE"/>
		<reference ref_id="CVE-2022-48903" ref_url="https://www.suse.com/security/cve/CVE-2022-48903/" source="CVE"/>
		<reference ref_id="CVE-2022-48904" ref_url="https://www.suse.com/security/cve/CVE-2022-48904/" source="CVE"/>
		<reference ref_id="CVE-2022-48905" ref_url="https://www.suse.com/security/cve/CVE-2022-48905/" source="CVE"/>
		<reference ref_id="CVE-2022-48906" ref_url="https://www.suse.com/security/cve/CVE-2022-48906/" source="CVE"/>
		<reference ref_id="CVE-2022-48907" ref_url="https://www.suse.com/security/cve/CVE-2022-48907/" source="CVE"/>
		<reference ref_id="CVE-2022-48909" ref_url="https://www.suse.com/security/cve/CVE-2022-48909/" source="CVE"/>
		<reference ref_id="CVE-2022-48910" ref_url="https://www.suse.com/security/cve/CVE-2022-48910/" source="CVE"/>
		<reference ref_id="CVE-2022-48912" ref_url="https://www.suse.com/security/cve/CVE-2022-48912/" source="CVE"/>
		<reference ref_id="CVE-2022-48913" ref_url="https://www.suse.com/security/cve/CVE-2022-48913/" source="CVE"/>
		<reference ref_id="CVE-2022-48914" ref_url="https://www.suse.com/security/cve/CVE-2022-48914/" source="CVE"/>
		<reference ref_id="CVE-2022-48915" ref_url="https://www.suse.com/security/cve/CVE-2022-48915/" source="CVE"/>
		<reference ref_id="CVE-2022-48916" ref_url="https://www.suse.com/security/cve/CVE-2022-48916/" source="CVE"/>
		<reference ref_id="CVE-2022-48917" ref_url="https://www.suse.com/security/cve/CVE-2022-48917/" source="CVE"/>
		<reference ref_id="CVE-2022-48918" ref_url="https://www.suse.com/security/cve/CVE-2022-48918/" source="CVE"/>
		<reference ref_id="CVE-2022-48919" ref_url="https://www.suse.com/security/cve/CVE-2022-48919/" source="CVE"/>
		<reference ref_id="CVE-2022-48920" ref_url="https://www.suse.com/security/cve/CVE-2022-48920/" source="CVE"/>
		<reference ref_id="CVE-2022-48921" ref_url="https://www.suse.com/security/cve/CVE-2022-48921/" source="CVE"/>
		<reference ref_id="CVE-2022-48923" ref_url="https://www.suse.com/security/cve/CVE-2022-48923/" source="CVE"/>
		<reference ref_id="CVE-2022-48924" ref_url="https://www.suse.com/security/cve/CVE-2022-48924/" source="CVE"/>
		<reference ref_id="CVE-2022-48925" ref_url="https://www.suse.com/security/cve/CVE-2022-48925/" source="CVE"/>
		<reference ref_id="CVE-2022-48926" ref_url="https://www.suse.com/security/cve/CVE-2022-48926/" source="CVE"/>
		<reference ref_id="CVE-2022-48927" ref_url="https://www.suse.com/security/cve/CVE-2022-48927/" source="CVE"/>
		<reference ref_id="CVE-2022-48928" ref_url="https://www.suse.com/security/cve/CVE-2022-48928/" source="CVE"/>
		<reference ref_id="CVE-2022-48929" ref_url="https://www.suse.com/security/cve/CVE-2022-48929/" source="CVE"/>
		<reference ref_id="CVE-2022-48930" ref_url="https://www.suse.com/security/cve/CVE-2022-48930/" source="CVE"/>
		<reference ref_id="CVE-2022-48931" ref_url="https://www.suse.com/security/cve/CVE-2022-48931/" source="CVE"/>
		<reference ref_id="CVE-2022-48932" ref_url="https://www.suse.com/security/cve/CVE-2022-48932/" source="CVE"/>
		<reference ref_id="CVE-2022-48934" ref_url="https://www.suse.com/security/cve/CVE-2022-48934/" source="CVE"/>
		<reference ref_id="CVE-2022-48937" ref_url="https://www.suse.com/security/cve/CVE-2022-48937/" source="CVE"/>
		<reference ref_id="CVE-2022-48938" ref_url="https://www.suse.com/security/cve/CVE-2022-48938/" source="CVE"/>
		<reference ref_id="CVE-2022-48939" ref_url="https://www.suse.com/security/cve/CVE-2022-48939/" source="CVE"/>
		<reference ref_id="CVE-2022-48940" ref_url="https://www.suse.com/security/cve/CVE-2022-48940/" source="CVE"/>
		<reference ref_id="CVE-2022-48941" ref_url="https://www.suse.com/security/cve/CVE-2022-48941/" source="CVE"/>
		<reference ref_id="CVE-2022-48942" ref_url="https://www.suse.com/security/cve/CVE-2022-48942/" source="CVE"/>
		<reference ref_id="CVE-2022-48943" ref_url="https://www.suse.com/security/cve/CVE-2022-48943/" source="CVE"/>
		<reference ref_id="CVE-2023-3610" ref_url="https://www.suse.com/security/cve/CVE-2023-3610/" source="CVE"/>
		<reference ref_id="CVE-2023-52458" ref_url="https://www.suse.com/security/cve/CVE-2023-52458/" source="CVE"/>
		<reference ref_id="CVE-2023-52489" ref_url="https://www.suse.com/security/cve/CVE-2023-52489/" source="CVE"/>
		<reference ref_id="CVE-2023-52498" ref_url="https://www.suse.com/security/cve/CVE-2023-52498/" source="CVE"/>
		<reference ref_id="CVE-2023-52581" ref_url="https://www.suse.com/security/cve/CVE-2023-52581/" source="CVE"/>
		<reference ref_id="CVE-2023-52859" ref_url="https://www.suse.com/security/cve/CVE-2023-52859/" source="CVE"/>
		<reference ref_id="CVE-2023-52887" ref_url="https://www.suse.com/security/cve/CVE-2023-52887/" source="CVE"/>
		<reference ref_id="CVE-2023-52889" ref_url="https://www.suse.com/security/cve/CVE-2023-52889/" source="CVE"/>
		<reference ref_id="CVE-2023-52893" ref_url="https://www.suse.com/security/cve/CVE-2023-52893/" source="CVE"/>
		<reference ref_id="CVE-2023-52894" ref_url="https://www.suse.com/security/cve/CVE-2023-52894/" source="CVE"/>
		<reference ref_id="CVE-2023-52896" ref_url="https://www.suse.com/security/cve/CVE-2023-52896/" source="CVE"/>
		<reference ref_id="CVE-2023-52898" ref_url="https://www.suse.com/security/cve/CVE-2023-52898/" source="CVE"/>
		<reference ref_id="CVE-2023-52899" ref_url="https://www.suse.com/security/cve/CVE-2023-52899/" source="CVE"/>
		<reference ref_id="CVE-2023-52900" ref_url="https://www.suse.com/security/cve/CVE-2023-52900/" source="CVE"/>
		<reference ref_id="CVE-2023-52901" ref_url="https://www.suse.com/security/cve/CVE-2023-52901/" source="CVE"/>
		<reference ref_id="CVE-2023-52904" ref_url="https://www.suse.com/security/cve/CVE-2023-52904/" source="CVE"/>
		<reference ref_id="CVE-2023-52905" ref_url="https://www.suse.com/security/cve/CVE-2023-52905/" source="CVE"/>
		<reference ref_id="CVE-2023-52906" ref_url="https://www.suse.com/security/cve/CVE-2023-52906/" source="CVE"/>
		<reference ref_id="CVE-2023-52907" ref_url="https://www.suse.com/security/cve/CVE-2023-52907/" source="CVE"/>
		<reference ref_id="CVE-2023-52908" ref_url="https://www.suse.com/security/cve/CVE-2023-52908/" source="CVE"/>
		<reference ref_id="CVE-2023-52909" ref_url="https://www.suse.com/security/cve/CVE-2023-52909/" source="CVE"/>
		<reference ref_id="CVE-2023-52910" ref_url="https://www.suse.com/security/cve/CVE-2023-52910/" source="CVE"/>
		<reference ref_id="CVE-2023-52911" ref_url="https://www.suse.com/security/cve/CVE-2023-52911/" source="CVE"/>
		<reference ref_id="CVE-2023-52912" ref_url="https://www.suse.com/security/cve/CVE-2023-52912/" source="CVE"/>
		<reference ref_id="CVE-2023-52913" ref_url="https://www.suse.com/security/cve/CVE-2023-52913/" source="CVE"/>
		<reference ref_id="CVE-2024-26631" ref_url="https://www.suse.com/security/cve/CVE-2024-26631/" source="CVE"/>
		<reference ref_id="CVE-2024-26668" ref_url="https://www.suse.com/security/cve/CVE-2024-26668/" source="CVE"/>
		<reference ref_id="CVE-2024-26669" ref_url="https://www.suse.com/security/cve/CVE-2024-26669/" source="CVE"/>
		<reference ref_id="CVE-2024-26677" ref_url="https://www.suse.com/security/cve/CVE-2024-26677/" source="CVE"/>
		<reference ref_id="CVE-2024-26735" ref_url="https://www.suse.com/security/cve/CVE-2024-26735/" source="CVE"/>
		<reference ref_id="CVE-2024-26808" ref_url="https://www.suse.com/security/cve/CVE-2024-26808/" source="CVE"/>
		<reference ref_id="CVE-2024-26812" ref_url="https://www.suse.com/security/cve/CVE-2024-26812/" source="CVE"/>
		<reference ref_id="CVE-2024-26835" ref_url="https://www.suse.com/security/cve/CVE-2024-26835/" source="CVE"/>
		<reference ref_id="CVE-2024-26851" ref_url="https://www.suse.com/security/cve/CVE-2024-26851/" source="CVE"/>
		<reference ref_id="CVE-2024-27010" ref_url="https://www.suse.com/security/cve/CVE-2024-27010/" source="CVE"/>
		<reference ref_id="CVE-2024-27011" ref_url="https://www.suse.com/security/cve/CVE-2024-27011/" source="CVE"/>
		<reference ref_id="CVE-2024-27016" ref_url="https://www.suse.com/security/cve/CVE-2024-27016/" source="CVE"/>
		<reference ref_id="CVE-2024-27024" ref_url="https://www.suse.com/security/cve/CVE-2024-27024/" source="CVE"/>
		<reference ref_id="CVE-2024-27079" ref_url="https://www.suse.com/security/cve/CVE-2024-27079/" source="CVE"/>
		<reference ref_id="CVE-2024-27403" ref_url="https://www.suse.com/security/cve/CVE-2024-27403/" source="CVE"/>
		<reference ref_id="CVE-2024-31076" ref_url="https://www.suse.com/security/cve/CVE-2024-31076/" source="CVE"/>
		<reference ref_id="CVE-2024-35897" ref_url="https://www.suse.com/security/cve/CVE-2024-35897/" source="CVE"/>
		<reference ref_id="CVE-2024-35902" ref_url="https://www.suse.com/security/cve/CVE-2024-35902/" source="CVE"/>
		<reference ref_id="CVE-2024-35945" ref_url="https://www.suse.com/security/cve/CVE-2024-35945/" source="CVE"/>
		<reference ref_id="CVE-2024-35971" ref_url="https://www.suse.com/security/cve/CVE-2024-35971/" source="CVE"/>
		<reference ref_id="CVE-2024-36009" ref_url="https://www.suse.com/security/cve/CVE-2024-36009/" source="CVE"/>
		<reference ref_id="CVE-2024-36013" ref_url="https://www.suse.com/security/cve/CVE-2024-36013/" source="CVE"/>
		<reference ref_id="CVE-2024-36270" ref_url="https://www.suse.com/security/cve/CVE-2024-36270/" source="CVE"/>
		<reference ref_id="CVE-2024-36286" ref_url="https://www.suse.com/security/cve/CVE-2024-36286/" source="CVE"/>
		<reference ref_id="CVE-2024-36489" ref_url="https://www.suse.com/security/cve/CVE-2024-36489/" source="CVE"/>
		<reference ref_id="CVE-2024-36929" ref_url="https://www.suse.com/security/cve/CVE-2024-36929/" source="CVE"/>
		<reference ref_id="CVE-2024-36933" ref_url="https://www.suse.com/security/cve/CVE-2024-36933/" source="CVE"/>
		<reference ref_id="CVE-2024-36936" ref_url="https://www.suse.com/security/cve/CVE-2024-36936/" source="CVE"/>
		<reference ref_id="CVE-2024-36962" ref_url="https://www.suse.com/security/cve/CVE-2024-36962/" source="CVE"/>
		<reference ref_id="CVE-2024-38554" ref_url="https://www.suse.com/security/cve/CVE-2024-38554/" source="CVE"/>
		<reference ref_id="CVE-2024-38602" ref_url="https://www.suse.com/security/cve/CVE-2024-38602/" source="CVE"/>
		<reference ref_id="CVE-2024-38662" ref_url="https://www.suse.com/security/cve/CVE-2024-38662/" source="CVE"/>
		<reference ref_id="CVE-2024-39489" ref_url="https://www.suse.com/security/cve/CVE-2024-39489/" source="CVE"/>
		<reference ref_id="CVE-2024-40905" ref_url="https://www.suse.com/security/cve/CVE-2024-40905/" source="CVE"/>
		<reference ref_id="CVE-2024-40978" ref_url="https://www.suse.com/security/cve/CVE-2024-40978/" source="CVE"/>
		<reference ref_id="CVE-2024-40980" ref_url="https://www.suse.com/security/cve/CVE-2024-40980/" source="CVE"/>
		<reference ref_id="CVE-2024-40995" ref_url="https://www.suse.com/security/cve/CVE-2024-40995/" source="CVE"/>
		<reference ref_id="CVE-2024-41000" ref_url="https://www.suse.com/security/cve/CVE-2024-41000/" source="CVE"/>
		<reference ref_id="CVE-2024-41007" ref_url="https://www.suse.com/security/cve/CVE-2024-41007/" source="CVE"/>
		<reference ref_id="CVE-2024-41009" ref_url="https://www.suse.com/security/cve/CVE-2024-41009/" source="CVE"/>
		<reference ref_id="CVE-2024-41011" ref_url="https://www.suse.com/security/cve/CVE-2024-41011/" source="CVE"/>
		<reference ref_id="CVE-2024-41016" ref_url="https://www.suse.com/security/cve/CVE-2024-41016/" source="CVE"/>
		<reference ref_id="CVE-2024-41020" ref_url="https://www.suse.com/security/cve/CVE-2024-41020/" source="CVE"/>
		<reference ref_id="CVE-2024-41022" ref_url="https://www.suse.com/security/cve/CVE-2024-41022/" source="CVE"/>
		<reference ref_id="CVE-2024-41035" ref_url="https://www.suse.com/security/cve/CVE-2024-41035/" source="CVE"/>
		<reference ref_id="CVE-2024-41036" ref_url="https://www.suse.com/security/cve/CVE-2024-41036/" source="CVE"/>
		<reference ref_id="CVE-2024-41038" ref_url="https://www.suse.com/security/cve/CVE-2024-41038/" source="CVE"/>
		<reference ref_id="CVE-2024-41039" ref_url="https://www.suse.com/security/cve/CVE-2024-41039/" source="CVE"/>
		<reference ref_id="CVE-2024-41042" ref_url="https://www.suse.com/security/cve/CVE-2024-41042/" source="CVE"/>
		<reference ref_id="CVE-2024-41045" ref_url="https://www.suse.com/security/cve/CVE-2024-41045/" source="CVE"/>
		<reference ref_id="CVE-2024-41056" ref_url="https://www.suse.com/security/cve/CVE-2024-41056/" source="CVE"/>
		<reference ref_id="CVE-2024-41060" ref_url="https://www.suse.com/security/cve/CVE-2024-41060/" source="CVE"/>
		<reference ref_id="CVE-2024-41062" ref_url="https://www.suse.com/security/cve/CVE-2024-41062/" source="CVE"/>
		<reference ref_id="CVE-2024-41065" ref_url="https://www.suse.com/security/cve/CVE-2024-41065/" source="CVE"/>
		<reference ref_id="CVE-2024-41068" ref_url="https://www.suse.com/security/cve/CVE-2024-41068/" source="CVE"/>
		<reference ref_id="CVE-2024-41073" ref_url="https://www.suse.com/security/cve/CVE-2024-41073/" source="CVE"/>
		<reference ref_id="CVE-2024-41079" ref_url="https://www.suse.com/security/cve/CVE-2024-41079/" source="CVE"/>
		<reference ref_id="CVE-2024-41080" ref_url="https://www.suse.com/security/cve/CVE-2024-41080/" source="CVE"/>
		<reference ref_id="CVE-2024-41087" ref_url="https://www.suse.com/security/cve/CVE-2024-41087/" source="CVE"/>
		<reference ref_id="CVE-2024-41088" ref_url="https://www.suse.com/security/cve/CVE-2024-41088/" source="CVE"/>
		<reference ref_id="CVE-2024-41089" ref_url="https://www.suse.com/security/cve/CVE-2024-41089/" source="CVE"/>
		<reference ref_id="CVE-2024-41092" ref_url="https://www.suse.com/security/cve/CVE-2024-41092/" source="CVE"/>
		<reference ref_id="CVE-2024-41093" ref_url="https://www.suse.com/security/cve/CVE-2024-41093/" source="CVE"/>
		<reference ref_id="CVE-2024-41095" ref_url="https://www.suse.com/security/cve/CVE-2024-41095/" source="CVE"/>
		<reference ref_id="CVE-2024-41097" ref_url="https://www.suse.com/security/cve/CVE-2024-41097/" source="CVE"/>
		<reference ref_id="CVE-2024-41098" ref_url="https://www.suse.com/security/cve/CVE-2024-41098/" source="CVE"/>
		<reference ref_id="CVE-2024-42069" ref_url="https://www.suse.com/security/cve/CVE-2024-42069/" source="CVE"/>
		<reference ref_id="CVE-2024-42074" ref_url="https://www.suse.com/security/cve/CVE-2024-42074/" source="CVE"/>
		<reference ref_id="CVE-2024-42076" ref_url="https://www.suse.com/security/cve/CVE-2024-42076/" source="CVE"/>
		<reference ref_id="CVE-2024-42077" ref_url="https://www.suse.com/security/cve/CVE-2024-42077/" source="CVE"/>
		<reference ref_id="CVE-2024-42080" ref_url="https://www.suse.com/security/cve/CVE-2024-42080/" source="CVE"/>
		<reference ref_id="CVE-2024-42082" ref_url="https://www.suse.com/security/cve/CVE-2024-42082/" source="CVE"/>
		<reference ref_id="CVE-2024-42085" ref_url="https://www.suse.com/security/cve/CVE-2024-42085/" source="CVE"/>
		<reference ref_id="CVE-2024-42086" ref_url="https://www.suse.com/security/cve/CVE-2024-42086/" source="CVE"/>
		<reference ref_id="CVE-2024-42087" ref_url="https://www.suse.com/security/cve/CVE-2024-42087/" source="CVE"/>
		<reference ref_id="CVE-2024-42089" ref_url="https://www.suse.com/security/cve/CVE-2024-42089/" source="CVE"/>
		<reference ref_id="CVE-2024-42090" ref_url="https://www.suse.com/security/cve/CVE-2024-42090/" source="CVE"/>
		<reference ref_id="CVE-2024-42092" ref_url="https://www.suse.com/security/cve/CVE-2024-42092/" source="CVE"/>
		<reference ref_id="CVE-2024-42095" ref_url="https://www.suse.com/security/cve/CVE-2024-42095/" source="CVE"/>
		<reference ref_id="CVE-2024-42097" ref_url="https://www.suse.com/security/cve/CVE-2024-42097/" source="CVE"/>
		<reference ref_id="CVE-2024-42098" ref_url="https://www.suse.com/security/cve/CVE-2024-42098/" source="CVE"/>
		<reference ref_id="CVE-2024-42101" ref_url="https://www.suse.com/security/cve/CVE-2024-42101/" source="CVE"/>
		<reference ref_id="CVE-2024-42104" ref_url="https://www.suse.com/security/cve/CVE-2024-42104/" source="CVE"/>
		<reference ref_id="CVE-2024-42106" ref_url="https://www.suse.com/security/cve/CVE-2024-42106/" source="CVE"/>
		<reference ref_id="CVE-2024-42107" ref_url="https://www.suse.com/security/cve/CVE-2024-42107/" source="CVE"/>
		<reference ref_id="CVE-2024-42110" ref_url="https://www.suse.com/security/cve/CVE-2024-42110/" source="CVE"/>
		<reference ref_id="CVE-2024-42114" ref_url="https://www.suse.com/security/cve/CVE-2024-42114/" source="CVE"/>
		<reference ref_id="CVE-2024-42115" ref_url="https://www.suse.com/security/cve/CVE-2024-42115/" source="CVE"/>
		<reference ref_id="CVE-2024-42119" ref_url="https://www.suse.com/security/cve/CVE-2024-42119/" source="CVE"/>
		<reference ref_id="CVE-2024-42120" ref_url="https://www.suse.com/security/cve/CVE-2024-42120/" source="CVE"/>
		<reference ref_id="CVE-2024-42121" ref_url="https://www.suse.com/security/cve/CVE-2024-42121/" source="CVE"/>
		<reference ref_id="CVE-2024-42126" ref_url="https://www.suse.com/security/cve/CVE-2024-42126/" source="CVE"/>
		<reference ref_id="CVE-2024-42127" ref_url="https://www.suse.com/security/cve/CVE-2024-42127/" source="CVE"/>
		<reference ref_id="CVE-2024-42130" ref_url="https://www.suse.com/security/cve/CVE-2024-42130/" source="CVE"/>
		<reference ref_id="CVE-2024-42137" ref_url="https://www.suse.com/security/cve/CVE-2024-42137/" source="CVE"/>
		<reference ref_id="CVE-2024-42139" ref_url="https://www.suse.com/security/cve/CVE-2024-42139/" source="CVE"/>
		<reference ref_id="CVE-2024-42142" ref_url="https://www.suse.com/security/cve/CVE-2024-42142/" source="CVE"/>
		<reference ref_id="CVE-2024-42143" ref_url="https://www.suse.com/security/cve/CVE-2024-42143/" source="CVE"/>
		<reference ref_id="CVE-2024-42148" ref_url="https://www.suse.com/security/cve/CVE-2024-42148/" source="CVE"/>
		<reference ref_id="CVE-2024-42152" ref_url="https://www.suse.com/security/cve/CVE-2024-42152/" source="CVE"/>
		<reference ref_id="CVE-2024-42155" ref_url="https://www.suse.com/security/cve/CVE-2024-42155/" source="CVE"/>
		<reference ref_id="CVE-2024-42156" ref_url="https://www.suse.com/security/cve/CVE-2024-42156/" source="CVE"/>
		<reference ref_id="CVE-2024-42157" ref_url="https://www.suse.com/security/cve/CVE-2024-42157/" source="CVE"/>
		<reference ref_id="CVE-2024-42158" ref_url="https://www.suse.com/security/cve/CVE-2024-42158/" source="CVE"/>
		<reference ref_id="CVE-2024-42162" ref_url="https://www.suse.com/security/cve/CVE-2024-42162/" source="CVE"/>
		<reference ref_id="CVE-2024-42223" ref_url="https://www.suse.com/security/cve/CVE-2024-42223/" source="CVE"/>
		<reference ref_id="CVE-2024-42225" ref_url="https://www.suse.com/security/cve/CVE-2024-42225/" source="CVE"/>
		<reference ref_id="CVE-2024-42228" ref_url="https://www.suse.com/security/cve/CVE-2024-42228/" source="CVE"/>
		<reference ref_id="CVE-2024-42229" ref_url="https://www.suse.com/security/cve/CVE-2024-42229/" source="CVE"/>
		<reference ref_id="CVE-2024-42230" ref_url="https://www.suse.com/security/cve/CVE-2024-42230/" source="CVE"/>
		<reference ref_id="CVE-2024-42232" ref_url="https://www.suse.com/security/cve/CVE-2024-42232/" source="CVE"/>
		<reference ref_id="CVE-2024-42236" ref_url="https://www.suse.com/security/cve/CVE-2024-42236/" source="CVE"/>
		<reference ref_id="CVE-2024-42237" ref_url="https://www.suse.com/security/cve/CVE-2024-42237/" source="CVE"/>
		<reference ref_id="CVE-2024-42238" ref_url="https://www.suse.com/security/cve/CVE-2024-42238/" source="CVE"/>
		<reference ref_id="CVE-2024-42239" ref_url="https://www.suse.com/security/cve/CVE-2024-42239/" source="CVE"/>
		<reference ref_id="CVE-2024-42240" ref_url="https://www.suse.com/security/cve/CVE-2024-42240/" source="CVE"/>
		<reference ref_id="CVE-2024-42244" ref_url="https://www.suse.com/security/cve/CVE-2024-42244/" source="CVE"/>
		<reference ref_id="CVE-2024-42246" ref_url="https://www.suse.com/security/cve/CVE-2024-42246/" source="CVE"/>
		<reference ref_id="CVE-2024-42247" ref_url="https://www.suse.com/security/cve/CVE-2024-42247/" source="CVE"/>
		<reference ref_id="CVE-2024-42268" ref_url="https://www.suse.com/security/cve/CVE-2024-42268/" source="CVE"/>
		<reference ref_id="CVE-2024-42271" ref_url="https://www.suse.com/security/cve/CVE-2024-42271/" source="CVE"/>
		<reference ref_id="CVE-2024-42274" ref_url="https://www.suse.com/security/cve/CVE-2024-42274/" source="CVE"/>
		<reference ref_id="CVE-2024-42276" ref_url="https://www.suse.com/security/cve/CVE-2024-42276/" source="CVE"/>
		<reference ref_id="CVE-2024-42277" ref_url="https://www.suse.com/security/cve/CVE-2024-42277/" source="CVE"/>
		<reference ref_id="CVE-2024-42280" ref_url="https://www.suse.com/security/cve/CVE-2024-42280/" source="CVE"/>
		<reference ref_id="CVE-2024-42281" ref_url="https://www.suse.com/security/cve/CVE-2024-42281/" source="CVE"/>
		<reference ref_id="CVE-2024-42283" ref_url="https://www.suse.com/security/cve/CVE-2024-42283/" source="CVE"/>
		<reference ref_id="CVE-2024-42284" ref_url="https://www.suse.com/security/cve/CVE-2024-42284/" source="CVE"/>
		<reference ref_id="CVE-2024-42285" ref_url="https://www.suse.com/security/cve/CVE-2024-42285/" source="CVE"/>
		<reference ref_id="CVE-2024-42286" ref_url="https://www.suse.com/security/cve/CVE-2024-42286/" source="CVE"/>
		<reference ref_id="CVE-2024-42287" ref_url="https://www.suse.com/security/cve/CVE-2024-42287/" source="CVE"/>
		<reference ref_id="CVE-2024-42288" ref_url="https://www.suse.com/security/cve/CVE-2024-42288/" source="CVE"/>
		<reference ref_id="CVE-2024-42289" ref_url="https://www.suse.com/security/cve/CVE-2024-42289/" source="CVE"/>
		<reference ref_id="CVE-2024-42291" ref_url="https://www.suse.com/security/cve/CVE-2024-42291/" source="CVE"/>
		<reference ref_id="CVE-2024-42292" ref_url="https://www.suse.com/security/cve/CVE-2024-42292/" source="CVE"/>
		<reference ref_id="CVE-2024-42295" ref_url="https://www.suse.com/security/cve/CVE-2024-42295/" source="CVE"/>
		<reference ref_id="CVE-2024-42301" ref_url="https://www.suse.com/security/cve/CVE-2024-42301/" source="CVE"/>
		<reference ref_id="CVE-2024-42302" ref_url="https://www.suse.com/security/cve/CVE-2024-42302/" source="CVE"/>
		<reference ref_id="CVE-2024-42308" ref_url="https://www.suse.com/security/cve/CVE-2024-42308/" source="CVE"/>
		<reference ref_id="CVE-2024-42309" ref_url="https://www.suse.com/security/cve/CVE-2024-42309/" source="CVE"/>
		<reference ref_id="CVE-2024-42310" ref_url="https://www.suse.com/security/cve/CVE-2024-42310/" source="CVE"/>
		<reference ref_id="CVE-2024-42311" ref_url="https://www.suse.com/security/cve/CVE-2024-42311/" source="CVE"/>
		<reference ref_id="CVE-2024-42312" ref_url="https://www.suse.com/security/cve/CVE-2024-42312/" source="CVE"/>
		<reference ref_id="CVE-2024-42313" ref_url="https://www.suse.com/security/cve/CVE-2024-42313/" source="CVE"/>
		<reference ref_id="CVE-2024-42315" ref_url="https://www.suse.com/security/cve/CVE-2024-42315/" source="CVE"/>
		<reference ref_id="CVE-2024-42318" ref_url="https://www.suse.com/security/cve/CVE-2024-42318/" source="CVE"/>
		<reference ref_id="CVE-2024-42319" ref_url="https://www.suse.com/security/cve/CVE-2024-42319/" source="CVE"/>
		<reference ref_id="CVE-2024-42320" ref_url="https://www.suse.com/security/cve/CVE-2024-42320/" source="CVE"/>
		<reference ref_id="CVE-2024-42322" ref_url="https://www.suse.com/security/cve/CVE-2024-42322/" source="CVE"/>
		<reference ref_id="CVE-2024-43816" ref_url="https://www.suse.com/security/cve/CVE-2024-43816/" source="CVE"/>
		<reference ref_id="CVE-2024-43818" ref_url="https://www.suse.com/security/cve/CVE-2024-43818/" source="CVE"/>
		<reference ref_id="CVE-2024-43819" ref_url="https://www.suse.com/security/cve/CVE-2024-43819/" source="CVE"/>
		<reference ref_id="CVE-2024-43821" ref_url="https://www.suse.com/security/cve/CVE-2024-43821/" source="CVE"/>
		<reference ref_id="CVE-2024-43823" ref_url="https://www.suse.com/security/cve/CVE-2024-43823/" source="CVE"/>
		<reference ref_id="CVE-2024-43829" ref_url="https://www.suse.com/security/cve/CVE-2024-43829/" source="CVE"/>
		<reference ref_id="CVE-2024-43830" ref_url="https://www.suse.com/security/cve/CVE-2024-43830/" source="CVE"/>
		<reference ref_id="CVE-2024-43831" ref_url="https://www.suse.com/security/cve/CVE-2024-43831/" source="CVE"/>
		<reference ref_id="CVE-2024-43834" ref_url="https://www.suse.com/security/cve/CVE-2024-43834/" source="CVE"/>
		<reference ref_id="CVE-2024-43837" ref_url="https://www.suse.com/security/cve/CVE-2024-43837/" source="CVE"/>
		<reference ref_id="CVE-2024-43839" ref_url="https://www.suse.com/security/cve/CVE-2024-43839/" source="CVE"/>
		<reference ref_id="CVE-2024-43841" ref_url="https://www.suse.com/security/cve/CVE-2024-43841/" source="CVE"/>
		<reference ref_id="CVE-2024-43842" ref_url="https://www.suse.com/security/cve/CVE-2024-43842/" source="CVE"/>
		<reference ref_id="CVE-2024-43846" ref_url="https://www.suse.com/security/cve/CVE-2024-43846/" source="CVE"/>
		<reference ref_id="CVE-2024-43849" ref_url="https://www.suse.com/security/cve/CVE-2024-43849/" source="CVE"/>
		<reference ref_id="CVE-2024-43853" ref_url="https://www.suse.com/security/cve/CVE-2024-43853/" source="CVE"/>
		<reference ref_id="CVE-2024-43854" ref_url="https://www.suse.com/security/cve/CVE-2024-43854/" source="CVE"/>
		<reference ref_id="CVE-2024-43856" ref_url="https://www.suse.com/security/cve/CVE-2024-43856/" source="CVE"/>
		<reference ref_id="CVE-2024-43858" ref_url="https://www.suse.com/security/cve/CVE-2024-43858/" source="CVE"/>
		<reference ref_id="CVE-2024-43860" ref_url="https://www.suse.com/security/cve/CVE-2024-43860/" source="CVE"/>
		<reference ref_id="CVE-2024-43861" ref_url="https://www.suse.com/security/cve/CVE-2024-43861/" source="CVE"/>
		<reference ref_id="CVE-2024-43863" ref_url="https://www.suse.com/security/cve/CVE-2024-43863/" source="CVE"/>
		<reference ref_id="CVE-2024-43866" ref_url="https://www.suse.com/security/cve/CVE-2024-43866/" source="CVE"/>
		<reference ref_id="CVE-2024-43867" ref_url="https://www.suse.com/security/cve/CVE-2024-43867/" source="CVE"/>
		<reference ref_id="CVE-2024-43871" ref_url="https://www.suse.com/security/cve/CVE-2024-43871/" source="CVE"/>
		<reference ref_id="CVE-2024-43872" ref_url="https://www.suse.com/security/cve/CVE-2024-43872/" source="CVE"/>
		<reference ref_id="CVE-2024-43873" ref_url="https://www.suse.com/security/cve/CVE-2024-43873/" source="CVE"/>
		<reference ref_id="CVE-2024-43879" ref_url="https://www.suse.com/security/cve/CVE-2024-43879/" source="CVE"/>
		<reference ref_id="CVE-2024-43880" ref_url="https://www.suse.com/security/cve/CVE-2024-43880/" source="CVE"/>
		<reference ref_id="CVE-2024-43882" ref_url="https://www.suse.com/security/cve/CVE-2024-43882/" source="CVE"/>
		<reference ref_id="CVE-2024-43883" ref_url="https://www.suse.com/security/cve/CVE-2024-43883/" source="CVE"/>
		<reference ref_id="CVE-2024-43884" ref_url="https://www.suse.com/security/cve/CVE-2024-43884/" source="CVE"/>
		<reference ref_id="CVE-2024-43889" ref_url="https://www.suse.com/security/cve/CVE-2024-43889/" source="CVE"/>
		<reference ref_id="CVE-2024-43892" ref_url="https://www.suse.com/security/cve/CVE-2024-43892/" source="CVE"/>
		<reference ref_id="CVE-2024-43893" ref_url="https://www.suse.com/security/cve/CVE-2024-43893/" source="CVE"/>
		<reference ref_id="CVE-2024-43894" ref_url="https://www.suse.com/security/cve/CVE-2024-43894/" source="CVE"/>
		<reference ref_id="CVE-2024-43895" ref_url="https://www.suse.com/security/cve/CVE-2024-43895/" source="CVE"/>
		<reference ref_id="CVE-2024-43899" ref_url="https://www.suse.com/security/cve/CVE-2024-43899/" source="CVE"/>
		<reference ref_id="CVE-2024-43900" ref_url="https://www.suse.com/security/cve/CVE-2024-43900/" source="CVE"/>
		<reference ref_id="CVE-2024-43902" ref_url="https://www.suse.com/security/cve/CVE-2024-43902/" source="CVE"/>
		<reference ref_id="CVE-2024-43903" ref_url="https://www.suse.com/security/cve/CVE-2024-43903/" source="CVE"/>
		<reference ref_id="CVE-2024-43904" ref_url="https://www.suse.com/security/cve/CVE-2024-43904/" source="CVE"/>
		<reference ref_id="CVE-2024-43905" ref_url="https://www.suse.com/security/cve/CVE-2024-43905/" source="CVE"/>
		<reference ref_id="CVE-2024-43907" ref_url="https://www.suse.com/security/cve/CVE-2024-43907/" source="CVE"/>
		<reference ref_id="CVE-2024-43908" ref_url="https://www.suse.com/security/cve/CVE-2024-43908/" source="CVE"/>
		<reference ref_id="CVE-2024-43909" ref_url="https://www.suse.com/security/cve/CVE-2024-43909/" source="CVE"/>
		<reference ref_id="CVE-2024-44938" ref_url="https://www.suse.com/security/cve/CVE-2024-44938/" source="CVE"/>
		<reference ref_id="CVE-2024-44939" ref_url="https://www.suse.com/security/cve/CVE-2024-44939/" source="CVE"/>
		<reference ref_id="CVE-2024-44947" ref_url="https://www.suse.com/security/cve/CVE-2024-44947/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2024-44947: Initialize beyond-EOF page contents before setting uptodate (bsc#1229454).
- CVE-2024-36936: Touch soft lockup during memory accept (bsc#1225773).
- CVE-2022-48706: Do proper cleanup if IFCVF init fails (bsc#1225524).
- CVE-2024-43883: Do not drop references before new references are gained (bsc#1229707).
- CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).
- CVE-2024-43861: Fix memory leak for not ip packets (bsc#1229500).
- CVE-2024-36270: Fix reference in patches.suse/netfilter-tproxy-bail-out-if-IP-has-been-disabled-on.patch (bsc#1226798)
- CVE-2023-52489: Fix race in accessing memory_section-&gt;usage (bsc#1221326).
- CVE-2024-43893: Check uartclk for zero to avoid divide by zero (bsc#1229759).
- CVE-2024-43821: Fix a possible null pointer dereference (bsc#1229315).
- CVE-2024-43900: Avoid use-after-free in load_firmware_cb() (bsc#1229756).
- CVE-2024-44938: Fix shift-out-of-bounds in dbDiscardAG (bsc#1229792).
- CVE-2024-44939: Fix null ptr deref in dtInsertEntry (bsc#1229820).
- CVE-2024-41087: Fix double free on error (CVE-2024-41087,bsc#1228466).
- CVE-2024-42277: Avoid NULL deref in sprd_iommu_hw_en (bsc#1229409).
- CVE-2024-43902: Add null checker before passing variables (bsc#1229767).
- CVE-2024-43904: Add null checks for 'stream' and 'plane' before dereferencing (bsc#1229768)
- CVE-2024-43880: Put back removed metod in struct objagg_ops (bsc#1229481).
- CVE-2024-43884: Add error handling to pair_device() (bsc#1229739)
- CVE-2024-43899: Fix null pointer deref in dcn20_resource.c (bsc#1229754).
- CVE-2022-48920: Get rid of warning on transaction commit when using flushoncommit (bsc#1229658).
- CVE-2023-52906: Fix warning during failed attribute validation (bsc#1229527).
- CVE-2024-43882: Fixed ToCToU between perm check and set-uid/gid usage. (bsc#1229503)
- CVE-2024-43866: Always drain health in shutdown callback (bsc#1229495).
- CVE-2024-26812: Struct virqfd kABI workaround (bsc#1222808).
- CVE-2022-48912: Fix use-after-free in __nf_register_net_hook() (bsc#1229641)
- CVE-2024-27010: Fix mirred deadlock on device recursion (bsc#1223720).
- CVE-2022-48906: Correctly set DATA_FIN timeout when number of retransmits is large (bsc#1229605)
- CVE-2024-42155: Wipe copies of protected- and secure-keys (bsc#1228733).
- CVE-2024-42156: Wipe copies of clear-key structures on failure (bsc#1228722).
- CVE-2023-52899: Add exception protection processing for vd in axi_chan_handle_err function (bsc#1229569).
- CVE-2024-42158: Use kfree_sensitive() to fix Coccinelle warnings (bsc#1228720).
- CVE-2024-26631: Fix data-race in ipv6_mc_down / mld_ifc_work (bsc#1221630).
- CVE-2024-43873: Always initialize seqpacket_allow (bsc#1229488)
- CVE-2024-40905: Fix possible race in __fib6_drop_pcpu_from() (bsc#1227761)
- CVE-2024-39489: Fix memleak in seg6_hmac_init_algo (bsc#1227623)
- CVE-2021-47106: Fix use-after-free in nft_set_catchall_destroy() (bsc#1220962)
- CVE-2021-47517: Fix panic when interrupt coaleceing is set via ethtool (bsc#1225428).
- CVE-2024-36489: Fix missing memory barrier in tls_init (bsc#1226874)
- CVE-2024-41020: Fix fcntl/close race recovery compat path (bsc#1228427).
- CVE-2024-27079: Fix NULL domain on device release (bsc#1223742).
- CVE-2024-35897: Discard table flag update with pending basechain deletion (bsc#1224510).
- CVE-2024-27403: Restore const specifier in flow_offload_route_init() (bsc#1224415).
- CVE-2024-27011: Fix memleak in map from abort path (bsc#1223803).
- CVE-2024-43819: Reject memory region operations for ucontrol VMs (bsc#1229290 git-fixes).
- CVE-2024-26668: Reject configurations that cause integer overflow (bsc#1222335).
- CVE-2024-26835: Set dormant flag on hook register failure (bsc#1222967).
- CVE-2024-26808: Handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634).
- CVE-2024-27016: Validate pppoe header (bsc#1223807).
- CVE-2024-35945: Prevent nullptr exceptions on ISR (bsc#1224639).
- CVE-2023-52581: Fix memleak when more than 255 elements expired (bsc#1220877).
- CVE-2024-36013: Fix slab-use-after-free in l2cap_connect() (bsc#1225578).
- CVE-2024-43837: Fix updating attached freplace prog in prog_array map (bsc#1229297).
- CVE-2024-42291: Add a per-VF limit on number of FDIR filters (bsc#1229374).
- CVE-2024-42268: Fix missing lock on sync reset reload (bsc#1229391).
- CVE-2024-43834: Fix invalid wait context of page_pool_destroy() (bsc#1229314)
- CVE-2024-36286: Acquire rcu_read_lock() in instance_destroy_rcu() (bsc#1226801)
- CVE-2024-26851: Add protection for bmp length out of range (bsc#1223074)
- CVE-2024-42157: Wipe sensitive data on failure (bsc#1228727 CVE-2024-42157 git-fixes).
- CVE-2024-26677: Blacklist e7870cf13d20 (' Fix delayed ACKs to not set the reference serial number') (bsc#1222387)
- CVE-2024-36009: Blacklist 467324bcfe1a ('ax25: Fix netdev refcount issue') (bsc#1224542)
- CVE-2023-52859: Fix use-after-free when register pmu fails (bsc#1225582).
- CVE-2024-42280: Fix a use after free in hfcmulti_tx() (bsc#1229388)
- CVE-2024-42284: Return non-zero value from tipc_udp_addr2str() on error (bsc#1229382)
- CVE-2024-42283: Initialize all fields in dumped nexthops (bsc#1229383)
- CVE-2024-42312: Always initialize i_uid/i_gid (bsc#1229357)
- CVE-2024-43854: Initialize integrity buffer to zero before writing it to media (bsc#1229345)
- CVE-2024-42322: Properly dereference pe in ip_vs_add_service (bsc#1229347)
- CVE-2024-42308: Update DRM patch reference (bsc#1229411)
- CVE-2024-42301: Fix the array out-of-bounds risk (bsc#1229407).
- CVE-2024-42318: Do not lose track of restrictions on cred_transfer (bsc#1229351).
- CVE-2024-26669: Fix chain template offload (bsc#1222350).
- CVE-2023-52889: Fix null pointer deref when receiving skb during sock creation (bsc#1229287,).
- CVE-2022-48645: Move enetc_set_psfp() out of the common enetc_set_features() (bsc#1223508).
- CVE-2024-41007: Use signed arithmetic in tcp_rtx_probe0_timed_out() (bsc#1227863).
- CVE-2024-36933: Use correct mac_offset to unwind gso skb in nsh_gso_segment() (bsc#1225832).
- CVE-2024-42295: Handle inconsistent state in nilfs_btnode_create_block() (bsc#1229370).
- CVE-2024-42319: Move devm_mbox_controller_register() after devm_pm_runtime_enable() (bsc#1229350).
- CVE-2024-43860: Skip over memory region when node value is NULL (bsc#1229319).
- CVE-2024-43831: Handle invalid decoder vsi (bsc#1229309).
- CVE-2024-43849: Protect locator_addr with the main mutex (bsc#1229307).
- CVE-2024-43841: Do not use strlen() in const context (bsc#1229304).
- CVE-2024-43839: Adjust 'name' buf size of bna_tcb and bna_ccb structures (bsc#1229301).
- CVE-2024-41088: Fix infinite loop when xmit fails (bsc#1228469).
- CVE-2024-42281: Fix a segment issue when downgrading gso_size (bsc#1229386).
- CVE-2024-42271: Fixed a use after free in iucv_sock_close(). (bsc#1229400)
- CVE-2024-41080: Fix possible deadlock in io_register_iowq_max_workers() (bsc#1228616).
- CVE-2024-42246: Remap EPERM in case of connection failure in xs_tcp_setup_socket (bsc#1228989).
- CVE-2024-42232: Fixed a race between delayed_work() and ceph_monc_stop(). (bsc#1228959)
- CVE-2024-26735: Fix possible use-after-free and null-ptr-deref (bsc#1222372).
- CVE-2024-42106: Initialize pad field in struct inet_diag_req_v2 (bsc#1228493).
- CVE-2024-38662: Cover verifier checks for mutating sockmap/sockhash (bsc#1226885).
- CVE-2024-42110: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx() (bsc#1228501).
- CVE-2024-42247: Avoid unaligned 64-bit memory accesses (bsc#1228988).
- CVE-2022-48865: Fix kernel panic when enabling bearer (bsc#1228065).
- CVE-2023-52498: Fix possible deadlocks in core system-wide PM code (bsc#1221269).
- CVE-2024-41068: Fix sclp_init() cleanup on failure (bsc#1228579).
- CVE-2022-48808: Fix panic when DSA master device unbinds on shutdown (bsc#1227958).
- CVE-2024-42095: Fix Errata i2310 with RX FIFO level check (bsc#1228446).
- CVE-2024-40978: Fix crash while reading debugfs attribute (bsc#1227929).
- CVE-2024-42107: Do not process extts if PTP is disabled (bsc#1228494).
- CVE-2024-42139: Fix improper extts handling (bsc#1228503).
- CVE-2024-42148: Fix multiple UBSAN array-index-out-of-bounds (bsc#1228487).
- CVE-2024-42142: E-switch, Create ingress ACL when needed (bsc#1228491).
- CVE-2024-42162: Account for stopped queues when reading NIC stats (bsc#1228706).
- CVE-2024-42082: Remove WARN() from __xdp_reg_mem_model() (bsc#1228482).
- CVE-2024-41042: Prefer nft_chain_validate (bsc#1228526).
- CVE-2023-3610: Fixed use-after-free vulnerability in nf_tables can be exploited to achieve local privilege escalation (bsc#1213580).
- CVE-2024-42228: Using uninitialized value *size when calling amdgpu_vce_cs_reloc (bsc#1228667).
- CVE-2024-40995: Fix possible infinite loop in tcf_idr_check_alloc() (bsc#1227830).
- CVE-2024-38602: Merge repeat codes in ax25_dev_device_down() (git-fixes CVE-2024-38602 bsc#1226613).
- CVE-2024-38554: Fix reference count leak issue of net_device (bsc#1226742).
- CVE-2024-36929: Reject skb_copy(_expand) for fraglist GSO skbs (bsc#1225814).
- CVE-2024-41009: Fix overrunning reservations in ringbuf (bsc#1228020).
- CVE-2024-27024: Fix WARNING in rds_conn_connect_if_down (bsc#1223777).

The following non-security bugs were fixed:

- Indicate support for IRQ ResourceSource thru _OSC (git-fixes).
- Indicate support for the Generic Event Device thru _OSC (git-fixes).
- Rework system-level device notification handling (git-fixes).
- Drop nocrt parameter (git-fixes).
- x86: s2 Post-increment variables when getting constraints (git-fixes).
- Do not cross .backup mountpoint from backup volume (git-fixes).
- Add HP MP9 G4 Retail System AMS to force connect list (stable-fixes).
- Yet more pin fix for HP EliteDesk 800 G4 (stable-fixes).
- Add Framework Laptop 13 (Intel Core Ultra) to quirks (stable-fixes).
- Fix noise from speakers on Lenovo IdeaPad 3 15IAU7 (git-fixes).
- line6: Fix racy access to midibuf (stable-fixes).
- Relax start tick time check for slave timer elements (git-fixes).
- Add delay quirk for VIVO USB-C-XE710 HEADSET (stable-fixes).
- Re-add ScratchAmp quirk entries (git-fixes).
- Support Yamaha P-125 quirk entry (stable-fixes).
- Fix UBSAN warning in parse_audio_unit() (stable-fixes).
- arm64: initialize all values of acpi_early_node_map to (git-fixes)
- arm64: initialize all values of acpi_early_node_map to (git-fixes)
- arm64: Add Neoverse-V2 part (git-fixes)
- arm64: armv8_ Fix warning in isndep cpuhp starting process (git-fixes)
- arm64: armv8_ Fix warning in isndep cpuhp starting process (git-fixes)
- arm64: Restore spec_bar() macro (git-fixes)
- arm64: Add missing .field_width for GIC system registers (git-fixes)
- arm64: Fix the visibility of compat hwcaps (git-fixes)
- arm64: Force HWCAP to be based on the sysreg visible to (git-fixes)
- arm64: Add Cortex-A720 definitions (git-fixes)
- arm64: Add Cortex-A725 definitions (git-fixes)
- arm64: Add Cortex-X1C definitions (git-fixes)
- arm64: Add Cortex-X3 definitions (git-fixes)
- arm64: Add Cortex-X4 definitions (git-fixes)
- arm64: Add Cortex-X925 definitions (git-fixes)
- arm64: Add Neoverse-V3 definitions (git-fixes)
- arm64: Increase VOP clk rate on RK3328 (git-fixes)
- arm64: Increase VOP clk rate on RK3328 (git-fixes)
- arm64: Expand speculative SSBS workaround (again) (git-fixes)
- arm64: Expand speculative SSBS workaround (git-fixes)
- arm64: Unify speculative SSBS errata logic (git-fixes) Also update default configuration.
- arm64: Fix KASAN random tag seed initialization (git-fixes)
- arm64: Fix KASAN random tag seed initialization (git-fixes)
- wcd938 Correct Soundwire ports mask (git-fixes).
- wsa881 Correct Soundwire ports mask (git-fixes).
- fix irq scheduling issue with PREEMPT_RT (git-fixes).
- Introduce async_schedule_dev_nocall() (bsc#1221269).
- Split async_schedule_node_domain() (bsc#1221269).
- Fix usage of __hci_cmd_sync_status (git-fixes).
- hci_ Fix not handling hibernation actions (git-fixes).
- l2 always unlock channel in l2cap_conless_channel() (git-fixes).
- L2 Fix deadlock (git-fixes).
- Fix a kernel verifier crash in stacksafe() (bsc#1225903).
- remove unused declaring of bpf_kprobe_override (git-fixes).
- fix leak of qgroup extent records after transaction abort (git-fixes).
- make btrfs_destroy_delayed_refs() return void (git-fixes).
- remove unnecessary prototype declarations at disk-io.c (git-fixes).
- update fs features directory asynchronously (bsc#1226168).
- propagate errors from vfs_getxattr() to avoid infinite loop (bsc#1229418).
- issue a cap release immediately if no cap exists (bsc#1225162).
- periodically flush the cap releases (bsc#1225162).
- Enable SMT only if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes).
- cpuidle, Evaluate LPI arch_flags for broadcast timer (git-fixes).
- Fix register ID of SPSR_FIQ (git-fixes).
- add missing MODULE_DESCRIPTION() macros (stable-fixes).
- Add labels for both Valve Steam Deck revisions (stable-fixes).
- Add quirk for Aya Neo KUN (stable-fixes).
- Add quirk for Lenovo Yoga Tab 3 X90F (stable-fixes).
- Add quirk for Nanote UMPC-01 (stable-fixes).
- Add quirk for OrangePi Neo (stable-fixes).
- drm/amd/amdgpu/imu_v11_0: Increase buffer size to ensure all possible values can be stored (stable-fixes).
- Add NULL check for 'afb' before dereferencing in amdgpu_dm_plane_handle_cursor_update (stable-fixes).
- avoid using null object of framebuffer (git-fixes).
- Fix &amp;&amp; vs || typos (git-fixes).
- Skip Recompute DSC Params if no Stream on Link (stable-fixes).
- Validate hw_points_num before using it (stable-fixes).
- Fix the null pointer dereference for vega10_hwmgr (stable-fixes).
- Actually check flags for all context ops (stable-fixes).
- Add lock around VF RLCG interface (stable-fixes).
- fix dereference null return value for the function amdgpu_vm_pt_parent (stable-fixes).
- Fix the null pointer dereference to ras_manager (stable-fixes).
- Validate TA binary size (stable-fixes).
- drm/amdgpu/jpeg2: properly set atomics vmid field (stable-fixes).
- Fix the null pointer dereference for smu7 (stable-fixes).
- Fix the null pointer dereference in apply_state_adjust_rules (stable-fixes).
- Fix the param type of set_power_profile_mode (stable-fixes).
- analogix_ properly handle zero sized AUX transactions (stable-fixes).
- tc358768: Attempt to fix DSI horizontal timings (stable-fixes).
- fix null pointer dereference in drm_client_modeset_probe (git-fixes).
- drm/dp_ Skip CSN if topology probing is not done yet (stable-fixes).
- set gp bus_stop bit before hard reset (stable-fixes).
- reset the link phy params before link training (git-fixes).
- cleanup FB if dpu_format_populate_layout fails (git-fixes).
- do not play tricks with debug macros (git-fixes).
- Zero-initialize iosys_map (stable-fixes).
- fix inode-&gt;i_blocks for non-512 byte sector size device (git-fixes).
- fix potential deadlock on __exfat_get_dentry_set (git-fixes).
- redefine DIR_DELETED as the bad cluster number (git-fixes).
- support dynamic allocate bh for exfat_entry_set_cache (git-fixes).
- fs/netfs/fscache_ add missing 'n_accesses' check (bsc#1229453).
- Initialize beyond-EOF page contents before setting uptodate (bsc#1229454).
- Add might_sleep() to disable_irq() (git-fixes).
- Always limit the affinity to online CPUs (git-fixes).
- Do not return error on missing optional irq_request_resources() (git-fixes).
- Take the proposed affinity at face value if force==true (git-fixes).
- genirq/cpuhotplug, x86 Prevent vector leak during CPU offline (git-fixes).
- genirq/generic_ Make irq_remove_generic_chip() irqdomain aware (git-fixes).
- Fix NULL pointer deref in irq_data_get_affinity_mask() (git-fixes).
- Do not try to remove non-existing sysfs files (git-fixes).
- Exclude managed interrupts in irq_matrix_allocated() (git-fixes).
- Shutdown managed interrupts with unsatifiable affinities (git-fixes).
- gss_krb5: Fix the error handling path for crypto_sync_skcipher_setkey (git-fixes).
- fix to initialize fields of hfs_inode_info after hfs_alloc_inode() (git-fixes).
- i2 Improve handling of stuck alerts (git-fixes).
- i2 Send alert notifications to all devices if source not found (git-fixes).
- Convert comma to semicolon (git-fixes).
- ip6_ Fix broken GRO (bsc#1229444).
- ipv6: fix incorrect unregister order (git-fixes).
- Drop bogus fwspec-mapping error handling (git-fixes).
- Fix association race (git-fixes).
- Fix disassociation race (git-fixes).
- Fix domain registration race (git-fixes).
- Fix mapping-creation race (git-fixes).
- Fixed unbalanced fwnode get and put (git-fixes).
- Look for existing mapping only once (git-fixes).
- Refactor __irq_domain_alloc_irqs() (git-fixes).
- Report irq number for NOMAP domains (git-fixes).
- Revert 'mm: prevent derefencing NULL ptr in pfn_section_valid()' (bsc#1230413).
- Revert 'mm, kmsan: fix infinite recursion due to RCU critical section' (bsc#1230413).
- Revert 'mm/sparsemem: fix race in accessing memory_section-&gt;usage' (bsc#1230413).
- kernel/irq/irqdomain. fix memory leak with using debugfs_lookup() (git-fixes).
- Fix to check symbol prefixes correctly (git-fixes).
- move from strlcpy with unused retval to strscpy (git-fixes).
- protect concurrent access to mem_cgroup_idr (git-fixes).
- mm, fix infinite recursion due to RCU critical section (git-fixes).
- prevent derefencing NULL ptr in pfn_section_valid() (git-fixes).
- dw_ allow biu and ciu clocks to defer (git-fixes).
- mmc_ Fix NULL dereference on allocation failure (git-fixes).
- ks8851: Fix another TX stall caused by wrong ISR flag handling (git-fixes).
- ks8851: Fix deadlock with the SPI chip variant (git-fixes).
- ks8851: Fix potential TX stall after interface reopen (git-fixes).
- ks8851: Fix TX stall caused by TX buffer overrun (gix-fixes).
- Add support for page sizes other than 4KB on ARM64 (jsc#PED-8491 bsc#1226530).
- Fix doorbell out of order violation and avoid unnecessary doorbell rings (bsc#1229154).
- Fix race of mana_hwc_post_rx_wqe and new hwc response (git-fixes).
- Fix RX buf alloc_size alignment and atomic op panic (bsc#1229086).
- remove two BUG() from skb_checksum_help() (bsc#1229312).
- qmi_ fix memory leak for not ip packets (git-fixes).
- fix possible cp null dereference (git-fixes).
- initialize noop_qdisc owner (git-fixes).
- pn533: Add poll mod list filling check (git-fixes).
- expose /proc/net/sunrpc/nfs in net namespaces (git-fixes).
- make the rpc_stat per net namespace (git-fixes).
- add posix ACLs to struct nfsd_attrs (git-fixes).
- add security label to struct nfsd_attrs (git-fixes).
- fix regression with setting ACLs (git-fixes).
- Fix strncpy() fortify warning (git-fixes).
- Increase NFSD_MAX_OPS_PER_COMPOUND (git-fixes).
- introduce struct nfsd_attrs (git-fixes).
- move from strlcpy with unused retval to strscpy (git-fixes).
- Optimize DRC bucket pruning (git-fixes).
- return error if nfs4_setacl fails (git-fixes).
- set attributes when creating symlinks (git-fixes).
- use locks_inode_context helper (git-fixes).
- nilfs2: Remove check for PageError (git-fixes).
- nvme_ scan namespaces asynchronously (bsc#1224105).
- ocfs2: use coarse time for new created files (git-fixes).
- Fix possible divide-by-0 panic in padata_mt_helper() (git-fixes).
- perf/smmuv3: Enable HiSilicon Erratum 162001900 quirk for HIP08/09 (git-fixes).
- platform/x86 Add support for ACPI based probing (jsc#PED-8779).
- platform/x86 Cache pci_dev in struct hsmp_socket (jsc#PED-8779).
- platform/x86 Change devm_kzalloc() to devm_kcalloc() (jsc#PED-8779).
- platform/x86 Check HSMP support on AMD family of processors (jsc#PED-8779).
- platform/x86 Check num_sockets against MAX_AMD_SOCKETS (jsc#PED-8779).
- platform/x86 Create static func to handle platdev (jsc#PED-8779).
- platform/x86 Define a struct to hold mailbox regs (jsc#PED-8779).
- platform/x86 Move dev from platdev to hsmp_socket (jsc#PED-8779).
- platform/x86 Move hsmp_test to probe (jsc#PED-8779).
- platform/x86 Non-ACPI support for AMD F1A_M00~0Fh (jsc#PED-8779).
- platform/x86 Remove extra parenthesis and add a space (jsc#PED-8779).
- platform/x86 Restructure sysfs group creation (jsc#PED-8779).
- platform/x86 switch to use device_add_groups() (jsc#PED-8779).
- axp288_ Fix constant_charge_voltage writes (git-fixes).
- axp288_ Round constant_charge_voltage writes down (git-fixes).
- Fail build if using recordmcount with binutils v2.37 (bsc#1194869).
- Mark .opd section read-only (bsc#1194869).
- use generic version of arch_is_kernel_initmem_freed() (bsc#1194869).
- xor_ Add '-mhard-float' to CFLAGS (bsc#1194869).
- powerpc/64: Set _IO_BASE to POISON_POINTER_DELTA not 0 for CONFIG_PCI=n (bsc#1194869).
- Avoid clang null pointer arithmetic warnings (bsc#1194869).
- powerpc/kexec_ fix cpus node update to FDT (bsc#1194869).
- make the update_cpus_node() function public (bsc#1194869).
- split CONFIG_KEXEC_FILE and CONFIG_CRASH_DUMP (bsc#1194869).
- Add failure related checks for h_get_mpp and h_get_ppp (bsc#1194869).
- Whitelist dtl slub object for copying to userspace (bsc#1194869).
- Move some functions into #ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE (bsc#1194869).
- Check if a core is online (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes).
- Check cpu id in commands 'c#', 'dp#' and 'dx#' (bsc#1194869).
- RDMA/mana_ Use virtual address in dma regions for MRs (git-fixes).
- Fix incomplete state save in rxe_requester (git-fixes)
- Fix rxe_modify_srq (git-fixes)
- Handle zero length rdma (git-fixes)
- Move work queue code to subroutines (git-fixes)
- s390 get rid of register asm (git-fixes bsc#1227079 bsc#1229187).
- s390 Make use of invalid opcode produce a link error (git-fixes bsc#1227079).
- s390 Split and rework cpacf query functions (git-fixes bsc#1229187).
- s390 fix error checks in dasd_copy_pair_store() (git-fixes bsc#1229190).
- s390 fix error recovery leading to data corruption on ESE devices (git-fixes bsc#1229573).
- s390 Prevent release of buffer in I/O (git-fixes bsc#1229572).
- s390 Panic for set and remove shared access UVC errors (git-fixes bsc#1229188).
- Fix scldiv calculation (git-fixes).
- add a struct rpc_stats arg to rpc_create_args (git-fixes).
- Fix a race to wake a sync task (git-fixes).
- fix swiotlb_bounce() to do partial sync's correctly (git-fixes).
- fix compat_sys_io_pgetevents_time64 usage (git-fixes).
- Return from tracing_buffers_read() if the file has been closed (bsc#1229136 git-fixes).
- add check for crypto_shash_tfm_digest (git-fixes).
- dbg_orphan_ Fix missed key type checking (git-fixes).
- Fix adding orphan entry twice for the same inode (git-fixes).
- Fix unattached xattr inode if powercut happens after deleting (git-fixes).
- fix potential memory leak in vfio_intx_enable() (git-fixes).
- fix wgds rev 3 exact size (git-fixes).
- duplicate static structs used in driver instances (git-fixes).
- x86 drop the duplicate APM_MINOR_DEV macro (git-fixes).
- x86 Fix PUSH instruction in x86 instruction decoder opcode map (git-fixes).
- x86 Fix pti_clone_entry_text() for i386 (git-fixes).
- x86 Check if fixed MTRRs exist before saving them (git-fixes).
- x86 Work around false positive kmemleak report in msr_build_context() (git-fixes).
- Fix missing interval for missing_owner in xfs fsmap (git-fixes).
- Fix the owner setting issue for rmap query in xfs fsmap (git-fixes).
- use XFS_BUF_DADDR_NULL for daddrs in getfsmap code (git-fixes).
- Fix Panther point NULL pointer deref at full-speed re-enumeration (git-fixes).
- Fix rpcrdma_reqs_reset() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-27"/>
	<updated date="2024-09-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193629">SUSE bug 1193629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194111">SUSE bug 1194111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194765">SUSE bug 1194765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196261">SUSE bug 1196261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196516">SUSE bug 1196516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196894">SUSE bug 1196894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198017">SUSE bug 1198017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203329">SUSE bug 1203329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203330">SUSE bug 1203330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203360">SUSE bug 1203360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205462">SUSE bug 1205462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206006">SUSE bug 1206006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206258">SUSE bug 1206258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206843">SUSE bug 1206843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207158">SUSE bug 1207158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208783">SUSE bug 1208783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210644">SUSE bug 1210644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213580">SUSE bug 1213580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213632">SUSE bug 1213632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214285">SUSE bug 1214285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216834">SUSE bug 1216834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220428">SUSE bug 1220428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220877">SUSE bug 1220877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220962">SUSE bug 1220962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221269">SUSE bug 1221269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221326">SUSE bug 1221326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221630">SUSE bug 1221630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221645">SUSE bug 1221645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222335">SUSE bug 1222335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222350">SUSE bug 1222350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222372">SUSE bug 1222372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222387">SUSE bug 1222387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222634">SUSE bug 1222634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222808">SUSE bug 1222808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222967">SUSE bug 1222967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223074">SUSE bug 1223074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223191">SUSE bug 1223191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223508">SUSE bug 1223508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223720">SUSE bug 1223720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223742">SUSE bug 1223742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223777">SUSE bug 1223777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223803">SUSE bug 1223803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223807">SUSE bug 1223807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224105">SUSE bug 1224105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224415">SUSE bug 1224415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224496">SUSE bug 1224496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224510">SUSE bug 1224510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224542">SUSE bug 1224542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224578">SUSE bug 1224578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224639">SUSE bug 1224639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225162">SUSE bug 1225162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225352">SUSE bug 1225352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225428">SUSE bug 1225428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225524">SUSE bug 1225524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225578">SUSE bug 1225578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225582">SUSE bug 1225582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225773">SUSE bug 1225773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225814">SUSE bug 1225814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225827">SUSE bug 1225827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225832">SUSE bug 1225832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225903">SUSE bug 1225903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226168">SUSE bug 1226168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226530">SUSE bug 1226530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226613">SUSE bug 1226613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226742">SUSE bug 1226742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226765">SUSE bug 1226765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226798">SUSE bug 1226798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226801">SUSE bug 1226801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226874">SUSE bug 1226874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226885">SUSE bug 1226885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227079">SUSE bug 1227079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227623">SUSE bug 1227623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227761">SUSE bug 1227761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227830">SUSE bug 1227830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227863">SUSE bug 1227863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227867">SUSE bug 1227867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227929">SUSE bug 1227929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227937">SUSE bug 1227937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227958">SUSE bug 1227958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228020">SUSE bug 1228020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228065">SUSE bug 1228065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228114">SUSE bug 1228114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228410">SUSE bug 1228410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228426">SUSE bug 1228426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228427">SUSE bug 1228427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228429">SUSE bug 1228429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228446">SUSE bug 1228446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228447">SUSE bug 1228447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228449">SUSE bug 1228449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228450">SUSE bug 1228450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228452">SUSE bug 1228452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228456">SUSE bug 1228456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228463">SUSE bug 1228463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228466">SUSE bug 1228466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228467">SUSE bug 1228467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228469">SUSE bug 1228469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228480">SUSE bug 1228480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228481">SUSE bug 1228481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228482">SUSE bug 1228482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228483">SUSE bug 1228483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228484">SUSE bug 1228484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228485">SUSE bug 1228485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228487">SUSE bug 1228487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228489">SUSE bug 1228489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228491">SUSE bug 1228491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228493">SUSE bug 1228493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228494">SUSE bug 1228494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228495">SUSE bug 1228495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228496">SUSE bug 1228496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228501">SUSE bug 1228501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228503">SUSE bug 1228503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228509">SUSE bug 1228509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228513">SUSE bug 1228513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228515">SUSE bug 1228515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228516">SUSE bug 1228516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228526">SUSE bug 1228526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228531">SUSE bug 1228531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228563">SUSE bug 1228563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228564">SUSE bug 1228564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228567">SUSE bug 1228567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228576">SUSE bug 1228576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228579">SUSE bug 1228579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228584">SUSE bug 1228584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228588">SUSE bug 1228588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228590">SUSE bug 1228590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228615">SUSE bug 1228615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228616">SUSE bug 1228616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228635">SUSE bug 1228635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228636">SUSE bug 1228636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228654">SUSE bug 1228654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228656">SUSE bug 1228656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228658">SUSE bug 1228658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228660">SUSE bug 1228660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228662">SUSE bug 1228662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228667">SUSE bug 1228667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228673">SUSE bug 1228673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228677">SUSE bug 1228677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228687">SUSE bug 1228687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228706">SUSE bug 1228706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228708">SUSE bug 1228708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228710">SUSE bug 1228710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228718">SUSE bug 1228718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228720">SUSE bug 1228720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228721">SUSE bug 1228721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228722">SUSE bug 1228722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228724">SUSE bug 1228724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228726">SUSE bug 1228726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228727">SUSE bug 1228727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228733">SUSE bug 1228733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228748">SUSE bug 1228748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228766">SUSE bug 1228766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228779">SUSE bug 1228779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228801">SUSE bug 1228801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228850">SUSE bug 1228850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228857">SUSE bug 1228857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228959">SUSE bug 1228959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228964">SUSE bug 1228964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228966">SUSE bug 1228966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228967">SUSE bug 1228967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228979">SUSE bug 1228979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228988">SUSE bug 1228988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228989">SUSE bug 1228989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228991">SUSE bug 1228991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228992">SUSE bug 1228992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229042">SUSE bug 1229042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229054">SUSE bug 1229054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229086">SUSE bug 1229086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229136">SUSE bug 1229136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229154">SUSE bug 1229154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229187">SUSE bug 1229187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229188">SUSE bug 1229188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229190">SUSE bug 1229190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229287">SUSE bug 1229287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229290">SUSE bug 1229290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229292">SUSE bug 1229292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229296">SUSE bug 1229296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229297">SUSE bug 1229297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229301">SUSE bug 1229301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229303">SUSE bug 1229303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229304">SUSE bug 1229304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229305">SUSE bug 1229305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229307">SUSE bug 1229307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229309">SUSE bug 1229309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229312">SUSE bug 1229312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229314">SUSE bug 1229314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229315">SUSE bug 1229315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229317">SUSE bug 1229317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229318">SUSE bug 1229318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229319">SUSE bug 1229319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229327">SUSE bug 1229327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229341">SUSE bug 1229341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229345">SUSE bug 1229345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229346">SUSE bug 1229346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229347">SUSE bug 1229347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229349">SUSE bug 1229349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229350">SUSE bug 1229350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229351">SUSE bug 1229351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229354">SUSE bug 1229354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229356">SUSE bug 1229356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229357">SUSE bug 1229357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229358">SUSE bug 1229358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229359">SUSE bug 1229359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229360">SUSE bug 1229360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229366">SUSE bug 1229366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229370">SUSE bug 1229370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229373">SUSE bug 1229373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229374">SUSE bug 1229374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229381">SUSE bug 1229381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229382">SUSE bug 1229382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229383">SUSE bug 1229383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229386">SUSE bug 1229386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229388">SUSE bug 1229388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229391">SUSE bug 1229391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229392">SUSE bug 1229392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229395">SUSE bug 1229395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229398">SUSE bug 1229398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229399">SUSE bug 1229399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229400">SUSE bug 1229400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229407">SUSE bug 1229407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229409">SUSE bug 1229409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229410">SUSE bug 1229410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229411">SUSE bug 1229411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229413">SUSE bug 1229413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229414">SUSE bug 1229414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229417">SUSE bug 1229417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229418">SUSE bug 1229418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229444">SUSE bug 1229444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229453">SUSE bug 1229453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229454">SUSE bug 1229454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229481">SUSE bug 1229481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229482">SUSE bug 1229482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229488">SUSE bug 1229488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229489">SUSE bug 1229489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229490">SUSE bug 1229490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229493">SUSE bug 1229493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229495">SUSE bug 1229495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229497">SUSE bug 1229497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229500">SUSE bug 1229500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229503">SUSE bug 1229503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229506">SUSE bug 1229506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229507">SUSE bug 1229507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229508">SUSE bug 1229508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229509">SUSE bug 1229509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229510">SUSE bug 1229510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229512">SUSE bug 1229512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229516">SUSE bug 1229516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229521">SUSE bug 1229521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229522">SUSE bug 1229522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229523">SUSE bug 1229523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229524">SUSE bug 1229524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229525">SUSE bug 1229525</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229526">SUSE bug 1229526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229527">SUSE bug 1229527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229528">SUSE bug 1229528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229529">SUSE bug 1229529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229531">SUSE bug 1229531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229533">SUSE bug 1229533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229535">SUSE bug 1229535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229536">SUSE bug 1229536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229537">SUSE bug 1229537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229540">SUSE bug 1229540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229544">SUSE bug 1229544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229545">SUSE bug 1229545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229546">SUSE bug 1229546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229547">SUSE bug 1229547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229548">SUSE bug 1229548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229554">SUSE bug 1229554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229557">SUSE bug 1229557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229558">SUSE bug 1229558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229559">SUSE bug 1229559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229560">SUSE bug 1229560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229562">SUSE bug 1229562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229564">SUSE bug 1229564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229565">SUSE bug 1229565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229566">SUSE bug 1229566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229568">SUSE bug 1229568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229569">SUSE bug 1229569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229572">SUSE bug 1229572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229573">SUSE bug 1229573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229576">SUSE bug 1229576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229581">SUSE bug 1229581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229588">SUSE bug 1229588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229598">SUSE bug 1229598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229603">SUSE bug 1229603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229604">SUSE bug 1229604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229605">SUSE bug 1229605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229608">SUSE bug 1229608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229611">SUSE bug 1229611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229612">SUSE bug 1229612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229613">SUSE bug 1229613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229614">SUSE bug 1229614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229615">SUSE bug 1229615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229616">SUSE bug 1229616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229617">SUSE bug 1229617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229620">SUSE bug 1229620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229622">SUSE bug 1229622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229623">SUSE bug 1229623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229624">SUSE bug 1229624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229625">SUSE bug 1229625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229626">SUSE bug 1229626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229628">SUSE bug 1229628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229629">SUSE bug 1229629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229630">SUSE bug 1229630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229631">SUSE bug 1229631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229632">SUSE bug 1229632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229635">SUSE bug 1229635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229636">SUSE bug 1229636</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229637">SUSE bug 1229637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229638">SUSE bug 1229638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229639">SUSE bug 1229639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229641">SUSE bug 1229641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229642">SUSE bug 1229642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229643">SUSE bug 1229643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229645">SUSE bug 1229645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229657">SUSE bug 1229657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229658">SUSE bug 1229658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229662">SUSE bug 1229662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229664">SUSE bug 1229664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229707">SUSE bug 1229707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229739">SUSE bug 1229739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229743">SUSE bug 1229743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229746">SUSE bug 1229746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229754">SUSE bug 1229754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229755">SUSE bug 1229755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229756">SUSE bug 1229756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229759">SUSE bug 1229759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229761">SUSE bug 1229761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229767">SUSE bug 1229767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229768">SUSE bug 1229768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229781">SUSE bug 1229781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229784">SUSE bug 1229784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229787">SUSE bug 1229787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229788">SUSE bug 1229788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229789">SUSE bug 1229789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229792">SUSE bug 1229792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229820">SUSE bug 1229820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230413">SUSE bug 1230413</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4204/">CVE-2021-4204 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4204">CVE-2021-4204 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4441/">CVE-2021-4441 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4441">CVE-2021-4441 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-47106/">CVE-2021-47106 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47106">CVE-2021-47106 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47517/">CVE-2021-47517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47517">CVE-2021-47517 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47546/">CVE-2021-47546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47546">CVE-2021-47546 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0500/">CVE-2022-0500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0500">CVE-2022-0500 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23222/">CVE-2022-23222 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23222">CVE-2022-23222 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38457/">CVE-2022-38457 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38457">CVE-2022-38457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40133/">CVE-2022-40133 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40133">CVE-2022-40133 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4382/">CVE-2022-4382 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4382">CVE-2022-4382 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48645/">CVE-2022-48645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48645">CVE-2022-48645 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48706/">CVE-2022-48706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48706">CVE-2022-48706 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48808/">CVE-2022-48808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48808">CVE-2022-48808 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48865/">CVE-2022-48865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48865">CVE-2022-48865 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48868/">CVE-2022-48868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48868">CVE-2022-48868 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48869/">CVE-2022-48869 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48869">CVE-2022-48869 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48870/">CVE-2022-48870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48870">CVE-2022-48870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-48871/">CVE-2022-48871 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48871">CVE-2022-48871 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48872/">CVE-2022-48872 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48872">CVE-2022-48872 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48873/">CVE-2022-48873 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48873">CVE-2022-48873 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48875/">CVE-2022-48875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48875">CVE-2022-48875 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48878/">CVE-2022-48878 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48878">CVE-2022-48878 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48880/">CVE-2022-48880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48880">CVE-2022-48880 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48881/">CVE-2022-48881 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48881">CVE-2022-48881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48882/">CVE-2022-48882 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48882">CVE-2022-48882 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48883/">CVE-2022-48883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48883">CVE-2022-48883 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48884/">CVE-2022-48884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48884">CVE-2022-48884 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48885/">CVE-2022-48885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48885">CVE-2022-48885 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48886/">CVE-2022-48886 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48886">CVE-2022-48886 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48887/">CVE-2022-48887 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48887">CVE-2022-48887 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48888/">CVE-2022-48888 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48888">CVE-2022-48888 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48889/">CVE-2022-48889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48889">CVE-2022-48889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48890/">CVE-2022-48890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48890">CVE-2022-48890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48891/">CVE-2022-48891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48891">CVE-2022-48891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48893/">CVE-2022-48893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48893">CVE-2022-48893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48896/">CVE-2022-48896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48896">CVE-2022-48896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48898/">CVE-2022-48898 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48898">CVE-2022-48898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48899/">CVE-2022-48899 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48899">CVE-2022-48899 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48903/">CVE-2022-48903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48903">CVE-2022-48903 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48904/">CVE-2022-48904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48904">CVE-2022-48904 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48905/">CVE-2022-48905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48905">CVE-2022-48905 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48906/">CVE-2022-48906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48906">CVE-2022-48906 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48907/">CVE-2022-48907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48907">CVE-2022-48907 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48909/">CVE-2022-48909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48909">CVE-2022-48909 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48910/">CVE-2022-48910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48910">CVE-2022-48910 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48912/">CVE-2022-48912 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48912">CVE-2022-48912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48913/">CVE-2022-48913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48913">CVE-2022-48913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48914/">CVE-2022-48914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48914">CVE-2022-48914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48915/">CVE-2022-48915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48915">CVE-2022-48915 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48916/">CVE-2022-48916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48916">CVE-2022-48916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48917/">CVE-2022-48917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48917">CVE-2022-48917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48918/">CVE-2022-48918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48918">CVE-2022-48918 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48919/">CVE-2022-48919 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48919">CVE-2022-48919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48920/">CVE-2022-48920 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48920">CVE-2022-48920 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48921/">CVE-2022-48921 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48921">CVE-2022-48921 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48923/">CVE-2022-48923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48923">CVE-2022-48923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48924/">CVE-2022-48924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48924">CVE-2022-48924 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48925/">CVE-2022-48925 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48925">CVE-2022-48925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48926/">CVE-2022-48926 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48926">CVE-2022-48926 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48927/">CVE-2022-48927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48927">CVE-2022-48927 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48928/">CVE-2022-48928 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48928">CVE-2022-48928 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48929/">CVE-2022-48929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48929">CVE-2022-48929 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48930/">CVE-2022-48930 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48930">CVE-2022-48930 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48931/">CVE-2022-48931 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48931">CVE-2022-48931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48932/">CVE-2022-48932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48932">CVE-2022-48932 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48934/">CVE-2022-48934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48934">CVE-2022-48934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48937/">CVE-2022-48937 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48937">CVE-2022-48937 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48938/">CVE-2022-48938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48938">CVE-2022-48938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48939/">CVE-2022-48939 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48939">CVE-2022-48939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48940/">CVE-2022-48940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48940">CVE-2022-48940 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48941/">CVE-2022-48941 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48941">CVE-2022-48941 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48942/">CVE-2022-48942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48942">CVE-2022-48942 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48943/">CVE-2022-48943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48943">CVE-2022-48943 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3610/">CVE-2023-3610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3610">CVE-2023-3610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52458/">CVE-2023-52458 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52458">CVE-2023-52458 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52489/">CVE-2023-52489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52489">CVE-2023-52489 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52498/">CVE-2023-52498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52498">CVE-2023-52498 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52581/">CVE-2023-52581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52581">CVE-2023-52581 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52859/">CVE-2023-52859 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52859">CVE-2023-52859 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52887/">CVE-2023-52887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52887">CVE-2023-52887 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52889/">CVE-2023-52889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52889">CVE-2023-52889 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52893/">CVE-2023-52893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52893">CVE-2023-52893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52894/">CVE-2023-52894 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52894">CVE-2023-52894 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52896/">CVE-2023-52896 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52896">CVE-2023-52896 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52898/">CVE-2023-52898 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52898">CVE-2023-52898 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52899/">CVE-2023-52899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52899">CVE-2023-52899 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52900/">CVE-2023-52900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52900">CVE-2023-52900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52901/">CVE-2023-52901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52901">CVE-2023-52901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52904/">CVE-2023-52904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52904">CVE-2023-52904 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52905/">CVE-2023-52905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52905">CVE-2023-52905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52906/">CVE-2023-52906 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52906">CVE-2023-52906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52907/">CVE-2023-52907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52907">CVE-2023-52907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52908/">CVE-2023-52908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52908">CVE-2023-52908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52909/">CVE-2023-52909 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52909">CVE-2023-52909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52910/">CVE-2023-52910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52910">CVE-2023-52910 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52911/">CVE-2023-52911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52911">CVE-2023-52911 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52912/">CVE-2023-52912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52912">CVE-2023-52912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52913/">CVE-2023-52913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52913">CVE-2023-52913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26631/">CVE-2024-26631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26631">CVE-2024-26631 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26668/">CVE-2024-26668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26668">CVE-2024-26668 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26669/">CVE-2024-26669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26669">CVE-2024-26669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26677/">CVE-2024-26677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26677">CVE-2024-26677 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26735/">CVE-2024-26735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26735">CVE-2024-26735 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26808/">CVE-2024-26808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26808">CVE-2024-26808 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26812/">CVE-2024-26812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26812">CVE-2024-26812 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26835/">CVE-2024-26835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26835">CVE-2024-26835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26851/">CVE-2024-26851 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26851">CVE-2024-26851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27010/">CVE-2024-27010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27010">CVE-2024-27010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27011/">CVE-2024-27011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27011">CVE-2024-27011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27016/">CVE-2024-27016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27016">CVE-2024-27016 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-27024/">CVE-2024-27024 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27024">CVE-2024-27024 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27079/">CVE-2024-27079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27079">CVE-2024-27079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27403/">CVE-2024-27403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27403">CVE-2024-27403 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31076/">CVE-2024-31076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31076">CVE-2024-31076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35897/">CVE-2024-35897 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35897">CVE-2024-35897 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35902/">CVE-2024-35902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35902">CVE-2024-35902 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35945/">CVE-2024-35945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35945">CVE-2024-35945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35971/">CVE-2024-35971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35971">CVE-2024-35971 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36009/">CVE-2024-36009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36009">CVE-2024-36009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36013/">CVE-2024-36013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36013">CVE-2024-36013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36270/">CVE-2024-36270 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36270">CVE-2024-36270 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-36286/">CVE-2024-36286 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36286">CVE-2024-36286 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36489/">CVE-2024-36489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36489">CVE-2024-36489 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36929/">CVE-2024-36929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36929">CVE-2024-36929 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-36933/">CVE-2024-36933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36933">CVE-2024-36933 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36936/">CVE-2024-36936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36936">CVE-2024-36936 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36962/">CVE-2024-36962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36962">CVE-2024-36962 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38554/">CVE-2024-38554 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38554">CVE-2024-38554 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38602/">CVE-2024-38602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38602">CVE-2024-38602 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38662/">CVE-2024-38662 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38662">CVE-2024-38662 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-39489/">CVE-2024-39489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39489">CVE-2024-39489 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40905/">CVE-2024-40905 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40905">CVE-2024-40905 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40978/">CVE-2024-40978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40978">CVE-2024-40978 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40980/">CVE-2024-40980 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40980">CVE-2024-40980 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40995/">CVE-2024-40995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40995">CVE-2024-40995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41000/">CVE-2024-41000 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41000">CVE-2024-41000 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41007/">CVE-2024-41007 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41007">CVE-2024-41007 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41009/">CVE-2024-41009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41009">CVE-2024-41009 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41011/">CVE-2024-41011 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41011">CVE-2024-41011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41016/">CVE-2024-41016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41016">CVE-2024-41016 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41020/">CVE-2024-41020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41020">CVE-2024-41020 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41022/">CVE-2024-41022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41022">CVE-2024-41022 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41035/">CVE-2024-41035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41035">CVE-2024-41035 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41036/">CVE-2024-41036 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41036">CVE-2024-41036 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41038/">CVE-2024-41038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41038">CVE-2024-41038 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41039/">CVE-2024-41039 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41039">CVE-2024-41039 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41042/">CVE-2024-41042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41042">CVE-2024-41042 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41045/">CVE-2024-41045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41045">CVE-2024-41045 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41056/">CVE-2024-41056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41056">CVE-2024-41056 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41060/">CVE-2024-41060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41060">CVE-2024-41060 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41062/">CVE-2024-41062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41062">CVE-2024-41062 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41065/">CVE-2024-41065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41065">CVE-2024-41065 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41068/">CVE-2024-41068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41068">CVE-2024-41068 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41073/">CVE-2024-41073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41073">CVE-2024-41073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41079/">CVE-2024-41079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41079">CVE-2024-41079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41080/">CVE-2024-41080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41080">CVE-2024-41080 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41087/">CVE-2024-41087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41087">CVE-2024-41087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41088/">CVE-2024-41088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41088">CVE-2024-41088 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41089/">CVE-2024-41089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41089">CVE-2024-41089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41092/">CVE-2024-41092 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41092">CVE-2024-41092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41093/">CVE-2024-41093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41093">CVE-2024-41093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41095/">CVE-2024-41095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41095">CVE-2024-41095 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41097/">CVE-2024-41097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41097">CVE-2024-41097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41098/">CVE-2024-41098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41098">CVE-2024-41098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42069/">CVE-2024-42069 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42069">CVE-2024-42069 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42074/">CVE-2024-42074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42074">CVE-2024-42074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42076/">CVE-2024-42076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42076">CVE-2024-42076 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42077/">CVE-2024-42077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42077">CVE-2024-42077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42080/">CVE-2024-42080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42080">CVE-2024-42080 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42082/">CVE-2024-42082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42082">CVE-2024-42082 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42085/">CVE-2024-42085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42085">CVE-2024-42085 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42086/">CVE-2024-42086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42086">CVE-2024-42086 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-42087/">CVE-2024-42087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42087">CVE-2024-42087 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42089/">CVE-2024-42089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42089">CVE-2024-42089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42090/">CVE-2024-42090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42090">CVE-2024-42090 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42092/">CVE-2024-42092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42092">CVE-2024-42092 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42095/">CVE-2024-42095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42095">CVE-2024-42095 at NVD</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42097/">CVE-2024-42097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42097">CVE-2024-42097 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42098/">CVE-2024-42098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42098">CVE-2024-42098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42101/">CVE-2024-42101 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42101">CVE-2024-42101 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42104/">CVE-2024-42104 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42104">CVE-2024-42104 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42106/">CVE-2024-42106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42106">CVE-2024-42106 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42107/">CVE-2024-42107 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42107">CVE-2024-42107 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42110/">CVE-2024-42110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42110">CVE-2024-42110 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42114/">CVE-2024-42114 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42114">CVE-2024-42114 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42115/">CVE-2024-42115 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42115">CVE-2024-42115 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42119/">CVE-2024-42119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42119">CVE-2024-42119 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42120/">CVE-2024-42120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42120">CVE-2024-42120 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42121/">CVE-2024-42121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42121">CVE-2024-42121 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42126/">CVE-2024-42126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42126">CVE-2024-42126 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42127/">CVE-2024-42127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42127">CVE-2024-42127 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42130/">CVE-2024-42130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42130">CVE-2024-42130 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42137/">CVE-2024-42137 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42137">CVE-2024-42137 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42139/">CVE-2024-42139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42139">CVE-2024-42139 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42142/">CVE-2024-42142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42142">CVE-2024-42142 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42143/">CVE-2024-42143 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42143">CVE-2024-42143 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42148/">CVE-2024-42148 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42148">CVE-2024-42148 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42152/">CVE-2024-42152 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42152">CVE-2024-42152 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42155/">CVE-2024-42155 at SUSE</cve>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42155">CVE-2024-42155 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42156/">CVE-2024-42156 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42156">CVE-2024-42156 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42157/">CVE-2024-42157 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42157">CVE-2024-42157 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42158/">CVE-2024-42158 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42158">CVE-2024-42158 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42162/">CVE-2024-42162 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42162">CVE-2024-42162 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42223/">CVE-2024-42223 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42223">CVE-2024-42223 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42225/">CVE-2024-42225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42225">CVE-2024-42225 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42228/">CVE-2024-42228 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42228">CVE-2024-42228 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42229/">CVE-2024-42229 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42229">CVE-2024-42229 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42230/">CVE-2024-42230 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42230">CVE-2024-42230 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42232/">CVE-2024-42232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42232">CVE-2024-42232 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42236/">CVE-2024-42236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42236">CVE-2024-42236 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42237/">CVE-2024-42237 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42237">CVE-2024-42237 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42238/">CVE-2024-42238 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42238">CVE-2024-42238 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42239/">CVE-2024-42239 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42239">CVE-2024-42239 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42240/">CVE-2024-42240 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42240">CVE-2024-42240 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42244/">CVE-2024-42244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42244">CVE-2024-42244 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42246/">CVE-2024-42246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42246">CVE-2024-42246 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42247/">CVE-2024-42247 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42247">CVE-2024-42247 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-42268/">CVE-2024-42268 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42268">CVE-2024-42268 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42271/">CVE-2024-42271 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42271">CVE-2024-42271 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42274/">CVE-2024-42274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42274">CVE-2024-42274 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42276/">CVE-2024-42276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42276">CVE-2024-42276 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42277/">CVE-2024-42277 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42277">CVE-2024-42277 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42280/">CVE-2024-42280 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42280">CVE-2024-42280 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42281/">CVE-2024-42281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42281">CVE-2024-42281 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42283/">CVE-2024-42283 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42283">CVE-2024-42283 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42284/">CVE-2024-42284 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42284">CVE-2024-42284 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42285/">CVE-2024-42285 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42285">CVE-2024-42285 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42286/">CVE-2024-42286 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42286">CVE-2024-42286 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42287/">CVE-2024-42287 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42287">CVE-2024-42287 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42288/">CVE-2024-42288 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42288">CVE-2024-42288 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42289/">CVE-2024-42289 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42289">CVE-2024-42289 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42291/">CVE-2024-42291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42291">CVE-2024-42291 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42292/">CVE-2024-42292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42292">CVE-2024-42292 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42295/">CVE-2024-42295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42295">CVE-2024-42295 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-42301/">CVE-2024-42301 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42301">CVE-2024-42301 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42302/">CVE-2024-42302 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42302">CVE-2024-42302 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42308/">CVE-2024-42308 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42308">CVE-2024-42308 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42309/">CVE-2024-42309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42309">CVE-2024-42309 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42310/">CVE-2024-42310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42310">CVE-2024-42310 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-42311/">CVE-2024-42311 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42311">CVE-2024-42311 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42312/">CVE-2024-42312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42312">CVE-2024-42312 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42313/">CVE-2024-42313 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42313">CVE-2024-42313 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42315/">CVE-2024-42315 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42315">CVE-2024-42315 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42318/">CVE-2024-42318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42318">CVE-2024-42318 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42319/">CVE-2024-42319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42319">CVE-2024-42319 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42320/">CVE-2024-42320 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42320">CVE-2024-42320 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42322/">CVE-2024-42322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42322">CVE-2024-42322 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43816/">CVE-2024-43816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43816">CVE-2024-43816 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43818/">CVE-2024-43818 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43818">CVE-2024-43818 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43819/">CVE-2024-43819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43819">CVE-2024-43819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43821/">CVE-2024-43821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43821">CVE-2024-43821 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43823/">CVE-2024-43823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43823">CVE-2024-43823 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43829/">CVE-2024-43829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43829">CVE-2024-43829 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43830/">CVE-2024-43830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43830">CVE-2024-43830 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43831/">CVE-2024-43831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43831">CVE-2024-43831 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43834/">CVE-2024-43834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43834">CVE-2024-43834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43837/">CVE-2024-43837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43837">CVE-2024-43837 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43839/">CVE-2024-43839 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43839">CVE-2024-43839 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43841/">CVE-2024-43841 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43841">CVE-2024-43841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43842/">CVE-2024-43842 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43842">CVE-2024-43842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43846/">CVE-2024-43846 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43846">CVE-2024-43846 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43849/">CVE-2024-43849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43849">CVE-2024-43849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43853/">CVE-2024-43853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43853">CVE-2024-43853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43854/">CVE-2024-43854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43854">CVE-2024-43854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43856/">CVE-2024-43856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43856">CVE-2024-43856 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43858/">CVE-2024-43858 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43858">CVE-2024-43858 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43860/">CVE-2024-43860 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43860">CVE-2024-43860 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43861/">CVE-2024-43861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43861">CVE-2024-43861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43863/">CVE-2024-43863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43863">CVE-2024-43863 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43866/">CVE-2024-43866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43866">CVE-2024-43866 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43867/">CVE-2024-43867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43867">CVE-2024-43867 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43871/">CVE-2024-43871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43871">CVE-2024-43871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43872/">CVE-2024-43872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43872">CVE-2024-43872 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43873/">CVE-2024-43873 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43873">CVE-2024-43873 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43879/">CVE-2024-43879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43879">CVE-2024-43879 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43880/">CVE-2024-43880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43880">CVE-2024-43880 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-43882/">CVE-2024-43882 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43882">CVE-2024-43882 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43883/">CVE-2024-43883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43883">CVE-2024-43883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43884/">CVE-2024-43884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43884">CVE-2024-43884 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43889/">CVE-2024-43889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43889">CVE-2024-43889 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43892/">CVE-2024-43892 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43892">CVE-2024-43892 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43893/">CVE-2024-43893 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43893">CVE-2024-43893 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43894/">CVE-2024-43894 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43894">CVE-2024-43894 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43895/">CVE-2024-43895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43895">CVE-2024-43895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43899/">CVE-2024-43899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43899">CVE-2024-43899 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-43900/">CVE-2024-43900 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43900">CVE-2024-43900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43902/">CVE-2024-43902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43902">CVE-2024-43902 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43903/">CVE-2024-43903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43903">CVE-2024-43903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43904/">CVE-2024-43904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43904">CVE-2024-43904 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43905/">CVE-2024-43905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43905">CVE-2024-43905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43907/">CVE-2024-43907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43907">CVE-2024-43907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43908/">CVE-2024-43908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43908">CVE-2024-43908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43909/">CVE-2024-43909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43909">CVE-2024-43909 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44938/">CVE-2024-44938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44938">CVE-2024-44938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44939/">CVE-2024-44939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44939">CVE-2024-44939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44947/">CVE-2024-44947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44947">CVE-2024-44947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945030" comment="cluster-md-kmp-64kb-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945031" comment="cluster-md-kmp-default-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945032" comment="dlm-kmp-64kb-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945033" comment="dlm-kmp-default-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945034" comment="dtb-allwinner-5.14.21-150500.55.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945035" comment="dtb-altera-5.14.21-150500.55.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945036" comment="dtb-amazon-5.14.21-150500.55.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945037" comment="dtb-amd-5.14.21-150500.55.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945038" comment="dtb-amlogic-5.14.21-150500.55.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945039" comment="dtb-apm-5.14.21-150500.55.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945040" comment="dtb-apple-5.14.21-150500.55.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945041" comment="dtb-arm-5.14.21-150500.55.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945042" comment="dtb-broadcom-5.14.21-150500.55.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945043" comment="dtb-cavium-5.14.21-150500.55.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945044" comment="dtb-exynos-5.14.21-150500.55.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945045" comment="dtb-freescale-5.14.21-150500.55.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945046" comment="dtb-hisilicon-5.14.21-150500.55.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945047" comment="dtb-lg-5.14.21-150500.55.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945048" comment="dtb-marvell-5.14.21-150500.55.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945049" comment="dtb-mediatek-5.14.21-150500.55.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945050" comment="dtb-nvidia-5.14.21-150500.55.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945051" comment="dtb-qcom-5.14.21-150500.55.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945052" comment="dtb-renesas-5.14.21-150500.55.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945053" comment="dtb-rockchip-5.14.21-150500.55.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945054" comment="dtb-socionext-5.14.21-150500.55.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945055" comment="dtb-sprd-5.14.21-150500.55.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945056" comment="dtb-xilinx-5.14.21-150500.55.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945057" comment="gfs2-kmp-64kb-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945058" comment="gfs2-kmp-default-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945059" comment="kernel-64kb-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945060" comment="kernel-64kb-devel-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945061" comment="kernel-64kb-extra-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945062" comment="kernel-64kb-livepatch-devel-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945063" comment="kernel-64kb-optional-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945064" comment="kernel-debug-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945065" comment="kernel-debug-devel-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945066" comment="kernel-debug-livepatch-devel-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945067" comment="kernel-debug-vdso-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945068" comment="kernel-default-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945069" comment="kernel-default-base-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945070" comment="kernel-default-base-rebuild-5.14.21-150500.55.80.2.150500.6.35.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945071" comment="kernel-default-devel-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945072" comment="kernel-default-extra-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945073" comment="kernel-default-livepatch-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945074" comment="kernel-default-livepatch-devel-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945075" comment="kernel-default-optional-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945076" comment="kernel-default-vdso-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945077" comment="kernel-devel-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945078" comment="kernel-docs-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945079" comment="kernel-docs-html-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945080" comment="kernel-kvmsmall-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945081" comment="kernel-kvmsmall-devel-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945082" comment="kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945083" comment="kernel-kvmsmall-vdso-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945084" comment="kernel-macros-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945085" comment="kernel-obs-build-5.14.21-150500.55.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945086" comment="kernel-obs-qa-5.14.21-150500.55.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945087" comment="kernel-source-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945088" comment="kernel-source-vanilla-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945089" comment="kernel-syms-5.14.21-150500.55.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945090" comment="kernel-zfcpdump-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945091" comment="kselftests-kmp-64kb-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945092" comment="kselftests-kmp-default-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945093" comment="ocfs2-kmp-64kb-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945094" comment="ocfs2-kmp-default-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945095" comment="reiserfs-kmp-64kb-5.14.21-150500.55.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945096" comment="reiserfs-kmp-default-5.14.21-150500.55.80.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5012" version="1" class="patch">
	<metadata>
		<title>Security update for python-paramiko (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218168" ref_url="https://bugzilla.suse.com/1218168" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017588.html" source="SUSE-SU"/>
		<description>
This update for python-paramiko fixes the following issues:

- CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity aka Terrapin Attack (bsc#bsc#1218168).

- Update to 3.4.0.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-05"/>
	<updated date="2024-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218168">SUSE bug 1218168</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009818089" comment="python-paramiko-doc-3.4.0-150400.13.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818090" comment="python311-paramiko-3.4.0-150400.13.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5013" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230698" ref_url="https://bugzilla.suse.com/1230698" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-41996" ref_url="https://www.suse.com/security/cve/CVE-2024-41996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019537.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2024-41996: Validating the order of the public keys in the Diffie-Hellman Key Agreement Protocol, when an approved safe prime is used, allows remote attackers to trigger expensive server-side DHE (bsc#1230698)
  		</description>
<advisory from="security@suse.de">
	<issued date="2024-09-30"/>
	<updated date="2024-09-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1230698">SUSE bug 1230698</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41996/">CVE-2024-41996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41996">CVE-2024-41996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945288" comment="libopenssl-3-devel-3.0.8-150500.5.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945289" comment="libopenssl-3-devel-32bit-3.0.8-150500.5.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945290" comment="libopenssl3-3.0.8-150500.5.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945291" comment="libopenssl3-32bit-3.0.8-150500.5.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945292" comment="openssl-3-3.0.8-150500.5.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945293" comment="openssl-3-doc-3.0.8-150500.5.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5014" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1184272" ref_url="https://bugzilla.suse.com/1184272" source="BUGZILLA"/>
		<reference ref_id="1226316" ref_url="https://bugzilla.suse.com/1226316" source="BUGZILLA"/>
		<reference ref_id="1228648" ref_url="https://bugzilla.suse.com/1228648" source="BUGZILLA"/>
		<reference ref_id="1229821" ref_url="https://bugzilla.suse.com/1229821" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6600" ref_url="https://www.suse.com/security/cve/CVE-2024-6600/" source="CVE"/>
		<reference ref_id="CVE-2024-6601" ref_url="https://www.suse.com/security/cve/CVE-2024-6601/" source="CVE"/>
		<reference ref_id="CVE-2024-6602" ref_url="https://www.suse.com/security/cve/CVE-2024-6602/" source="CVE"/>
		<reference ref_id="CVE-2024-6603" ref_url="https://www.suse.com/security/cve/CVE-2024-6603/" source="CVE"/>
		<reference ref_id="CVE-2024-6604" ref_url="https://www.suse.com/security/cve/CVE-2024-6604/" source="CVE"/>
		<reference ref_id="CVE-2024-6606" ref_url="https://www.suse.com/security/cve/CVE-2024-6606/" source="CVE"/>
		<reference ref_id="CVE-2024-6607" ref_url="https://www.suse.com/security/cve/CVE-2024-6607/" source="CVE"/>
		<reference ref_id="CVE-2024-6608" ref_url="https://www.suse.com/security/cve/CVE-2024-6608/" source="CVE"/>
		<reference ref_id="CVE-2024-6609" ref_url="https://www.suse.com/security/cve/CVE-2024-6609/" source="CVE"/>
		<reference ref_id="CVE-2024-6610" ref_url="https://www.suse.com/security/cve/CVE-2024-6610/" source="CVE"/>
		<reference ref_id="CVE-2024-6611" ref_url="https://www.suse.com/security/cve/CVE-2024-6611/" source="CVE"/>
		<reference ref_id="CVE-2024-6612" ref_url="https://www.suse.com/security/cve/CVE-2024-6612/" source="CVE"/>
		<reference ref_id="CVE-2024-6613" ref_url="https://www.suse.com/security/cve/CVE-2024-6613/" source="CVE"/>
		<reference ref_id="CVE-2024-6614" ref_url="https://www.suse.com/security/cve/CVE-2024-6614/" source="CVE"/>
		<reference ref_id="CVE-2024-6615" ref_url="https://www.suse.com/security/cve/CVE-2024-6615/" source="CVE"/>
		<reference ref_id="CVE-2024-7518" ref_url="https://www.suse.com/security/cve/CVE-2024-7518/" source="CVE"/>
		<reference ref_id="CVE-2024-7519" ref_url="https://www.suse.com/security/cve/CVE-2024-7519/" source="CVE"/>
		<reference ref_id="CVE-2024-7520" ref_url="https://www.suse.com/security/cve/CVE-2024-7520/" source="CVE"/>
		<reference ref_id="CVE-2024-7521" ref_url="https://www.suse.com/security/cve/CVE-2024-7521/" source="CVE"/>
		<reference ref_id="CVE-2024-7522" ref_url="https://www.suse.com/security/cve/CVE-2024-7522/" source="CVE"/>
		<reference ref_id="CVE-2024-7525" ref_url="https://www.suse.com/security/cve/CVE-2024-7525/" source="CVE"/>
		<reference ref_id="CVE-2024-7526" ref_url="https://www.suse.com/security/cve/CVE-2024-7526/" source="CVE"/>
		<reference ref_id="CVE-2024-7527" ref_url="https://www.suse.com/security/cve/CVE-2024-7527/" source="CVE"/>
		<reference ref_id="CVE-2024-7528" ref_url="https://www.suse.com/security/cve/CVE-2024-7528/" source="CVE"/>
		<reference ref_id="CVE-2024-7529" ref_url="https://www.suse.com/security/cve/CVE-2024-7529/" source="CVE"/>
		<reference ref_id="CVE-2024-8381" ref_url="https://www.suse.com/security/cve/CVE-2024-8381/" source="CVE"/>
		<reference ref_id="CVE-2024-8382" ref_url="https://www.suse.com/security/cve/CVE-2024-8382/" source="CVE"/>
		<reference ref_id="CVE-2024-8384" ref_url="https://www.suse.com/security/cve/CVE-2024-8384/" source="CVE"/>
		<reference ref_id="CVE-2024-8385" ref_url="https://www.suse.com/security/cve/CVE-2024-8385/" source="CVE"/>
		<reference ref_id="CVE-2024-8386" ref_url="https://www.suse.com/security/cve/CVE-2024-8386/" source="CVE"/>
		<reference ref_id="CVE-2024-8387" ref_url="https://www.suse.com/security/cve/CVE-2024-8387/" source="CVE"/>
		<reference ref_id="CVE-2024-8394" ref_url="https://www.suse.com/security/cve/CVE-2024-8394/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019538.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Mozilla Thunderbird 128.2.3
  MFSA 2024-43 (bsc#1229821)
  * CVE-2024-8394: Crash when aborting verification of OTR chat.
  * CVE-2024-8385: WASM type confusion involving ArrayTypes.
  * CVE-2024-8381: Type confusion when looking up a property name in a 'with' block.
  * CVE-2024-8382: Internal event interfaces were exposed to web content when browser EventHandler listener callbacks
    ran.
  * CVE-2024-8384: Garbage collection could mis-color cross-compartment objects in OOM conditions.
  * CVE-2024-8386: SelectElements could be shown over another site if popups are allowed.
  * CVE-2024-8387: Memory safety bugs fixed in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2.
  MFSA 2024-37 (bsc#1228648)
  * CVE-2024-7518: Fullscreen notification dialog can be obscured by document content.
  * CVE-2024-7519: Out of bounds memory access in graphics shared memory handling.
  * CVE-2024-7520: Type confusion in WebAssembly.
  * CVE-2024-7521: Incomplete WebAssembly exception handing.
  * CVE-2024-7522: Out of bounds read in editor component.
  * CVE-2024-7525: Missing permission check when creating a StreamFilter.
  * CVE-2024-7526: Uninitialized memory used by WebGL.
  * CVE-2024-7527: Use-after-free in JavaScript garbage collection.
  * CVE-2024-7528: Use-after-free in IndexedDB.
  * CVE-2024-7529: Document content could partially obscure security prompts.
  MFSA 2024-32 (bsc#1226316)
  * CVE-2024-6606: Out-of-bounds read in clipboard component.
  * CVE-2024-6607: Leaving pointerlock by pressing the escape key could be prevented.
  * CVE-2024-6608: Cursor could be moved out of the viewport using pointerlock.
  * CVE-2024-6609: Memory corruption in NSS.
  * CVE-2024-6610: Form validation popups could block exiting full-screen mode.
  * CVE-2024-6600: Memory corruption in WebGL API.
  * CVE-2024-6601: Race condition in permission assignment.
  * CVE-2024-6602: Memory corruption in NSS.
  * CVE-2024-6603: Memory corruption in thread creation.
  * CVE-2024-6611: Incorrect handling of SameSite cookies.
  * CVE-2024-6612: CSP violation leakage when using devtools.
  * CVE-2024-6613: Incorrect listing of stack frames.
  * CVE-2024-6614: Incorrect listing of stack frames.
  * CVE-2024-6604: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, Thunderbird 128, and Thunderbird
    115.13.
  * CVE-2024-6615: Memory safety bugs fixed in Firefox 128 and Thunderbird 128.
  
Bug fixes:
- Recommend libfido2-udev in order to try to get security keys (e.g. Yubikeys) working out of the box. (bsc#1184272)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2024-10-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184272">SUSE bug 1184272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226316">SUSE bug 1226316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228648">SUSE bug 1228648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229821">SUSE bug 1229821</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6600/">CVE-2024-6600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6600">CVE-2024-6600 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-6601/">CVE-2024-6601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6601">CVE-2024-6601 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6602/">CVE-2024-6602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6602">CVE-2024-6602 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6603/">CVE-2024-6603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6603">CVE-2024-6603 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6604/">CVE-2024-6604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6604">CVE-2024-6604 at NVD</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6606/">CVE-2024-6606 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6606">CVE-2024-6606 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-6607/">CVE-2024-6607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6607">CVE-2024-6607 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6608/">CVE-2024-6608 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6608">CVE-2024-6608 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6609/">CVE-2024-6609 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6609">CVE-2024-6609 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6610/">CVE-2024-6610 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6610">CVE-2024-6610 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6611/">CVE-2024-6611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6611">CVE-2024-6611 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6612/">CVE-2024-6612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6612">CVE-2024-6612 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-6613/">CVE-2024-6613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6613">CVE-2024-6613 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-6614/">CVE-2024-6614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6614">CVE-2024-6614 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6615/">CVE-2024-6615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6615">CVE-2024-6615 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-7518/">CVE-2024-7518 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7518">CVE-2024-7518 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7519/">CVE-2024-7519 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7519">CVE-2024-7519 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7520/">CVE-2024-7520 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7520">CVE-2024-7520 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7521/">CVE-2024-7521 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7521">CVE-2024-7521 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7522/">CVE-2024-7522 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7522">CVE-2024-7522 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7525/">CVE-2024-7525 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7525">CVE-2024-7525 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7526/">CVE-2024-7526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7526">CVE-2024-7526 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7527/">CVE-2024-7527 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7527">CVE-2024-7527 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7528/">CVE-2024-7528 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7528">CVE-2024-7528 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-7529/">CVE-2024-7529 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7529">CVE-2024-7529 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-8381/">CVE-2024-8381 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8381">CVE-2024-8381 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8382/">CVE-2024-8382 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8382">CVE-2024-8382 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-8384/">CVE-2024-8384 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8384">CVE-2024-8384 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8385/">CVE-2024-8385 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8385">CVE-2024-8385 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-8386/">CVE-2024-8386 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8386">CVE-2024-8386 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8387/">CVE-2024-8387 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8387">CVE-2024-8387 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8394/">CVE-2024-8394 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8394">CVE-2024-8394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945353" comment="MozillaThunderbird-128.2.3-150200.8.177.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945354" comment="MozillaThunderbird-translations-common-128.2.3-150200.8.177.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945355" comment="MozillaThunderbird-translations-other-128.2.3-150200.8.177.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5015" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230979" ref_url="https://bugzilla.suse.com/1230979" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-8900" ref_url="https://www.suse.com/security/cve/CVE-2024-8900/" source="CVE"/>
		<reference ref_id="CVE-2024-9392" ref_url="https://www.suse.com/security/cve/CVE-2024-9392/" source="CVE"/>
		<reference ref_id="CVE-2024-9393" ref_url="https://www.suse.com/security/cve/CVE-2024-9393/" source="CVE"/>
		<reference ref_id="CVE-2024-9394" ref_url="https://www.suse.com/security/cve/CVE-2024-9394/" source="CVE"/>
		<reference ref_id="CVE-2024-9396" ref_url="https://www.suse.com/security/cve/CVE-2024-9396/" source="CVE"/>
		<reference ref_id="CVE-2024-9397" ref_url="https://www.suse.com/security/cve/CVE-2024-9397/" source="CVE"/>
		<reference ref_id="CVE-2024-9398" ref_url="https://www.suse.com/security/cve/CVE-2024-9398/" source="CVE"/>
		<reference ref_id="CVE-2024-9399" ref_url="https://www.suse.com/security/cve/CVE-2024-9399/" source="CVE"/>
		<reference ref_id="CVE-2024-9400" ref_url="https://www.suse.com/security/cve/CVE-2024-9400/" source="CVE"/>
		<reference ref_id="CVE-2024-9401" ref_url="https://www.suse.com/security/cve/CVE-2024-9401/" source="CVE"/>
		<reference ref_id="CVE-2024-9402" ref_url="https://www.suse.com/security/cve/CVE-2024-9402/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019546.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 128.3.0 ESR (MFSA-2024-47, bsc#1230979):

 - CVE-2024-8900: Clipboard write permission bypass
 - CVE-2024-9392: Compromised content process can bypass site isolation
 - CVE-2024-9393: Cross-origin access to PDF contents through multipart responses
 - CVE-2024-9394: Cross-origin access to JSON contents through multipart responses
 - CVE-2024-9396: Potential memory corruption may occur when cloning certain objects
 - CVE-2024-9397: Potential directory upload bypass via clickjacking
 - CVE-2024-9398: External protocol handlers could be enumerated via popups
 - CVE-2024-9399: Specially crafted WebTransport requests could lead to denial of service
 - CVE-2024-9400: Potential memory corruption during JIT compilation
 - CVE-2024-9401: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3
 - CVE-2024-9402: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-03"/>
	<updated date="2024-10-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1230979">SUSE bug 1230979</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8900/">CVE-2024-8900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8900">CVE-2024-8900 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9392/">CVE-2024-9392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9392">CVE-2024-9392 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9393/">CVE-2024-9393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9393">CVE-2024-9393 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9394/">CVE-2024-9394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9394">CVE-2024-9394 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9396/">CVE-2024-9396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9396">CVE-2024-9396 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9397/">CVE-2024-9397 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9397">CVE-2024-9397 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9398/">CVE-2024-9398 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9398">CVE-2024-9398 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9399/">CVE-2024-9399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9399">CVE-2024-9399 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9400/">CVE-2024-9400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9400">CVE-2024-9400 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9401/">CVE-2024-9401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9401">CVE-2024-9401 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9402/">CVE-2024-9402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9402">CVE-2024-9402 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945485" comment="MozillaFirefox-128.3.0-150200.152.152.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945486" comment="MozillaFirefox-branding-upstream-128.3.0-150200.152.152.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945487" comment="MozillaFirefox-devel-128.3.0-150200.152.152.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945488" comment="MozillaFirefox-translations-common-128.3.0-150200.152.152.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945489" comment="MozillaFirefox-translations-other-128.3.0-150200.152.152.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5016" version="1" class="patch">
	<metadata>
		<title>Security update for cups-filters (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230939" ref_url="https://bugzilla.suse.com/1230939" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-47176" ref_url="https://www.suse.com/security/cve/CVE-2024-47176/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3523-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037151.html" source="SUSE-SU"/>
		<description>
This update for cups-filters fixes the following issues:

- cups-browsed would bind on UDP INADDR_ANY:631 and trust any packet
  from any source to trigger a Get-Printer-Attributes IPP request 
  to an attacker controlled URL. This patch removes support for the
  legacy CUPS and LDAP protocols(bsc#1230939, CVE-2024-47176)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-04"/>
	<updated date="2024-10-04"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1230939">SUSE bug 1230939</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47176/">CVE-2024-47176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47176">CVE-2024-47176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945532" comment="cups-filters-1.25.0-150200.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945533" comment="cups-filters-devel-1.25.0-150200.3.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5017" version="1" class="patch">
	<metadata>
		<title>Security update for json-lib (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231295" ref_url="https://bugzilla.suse.com/1231295" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-47855" ref_url="https://www.suse.com/security/cve/CVE-2024-47855/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3543-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037171.html" source="SUSE-SU"/>
		<description>
This update for json-lib fixes the following issues:

- CVE-2024-47855: Fixed mishandled unbalanced comment string (bsc#1231295)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-08"/>
	<updated date="2024-10-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1231295">SUSE bug 1231295</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47855/">CVE-2024-47855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47855">CVE-2024-47855 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945835" comment="jenkins-json-lib-2.4-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945836" comment="json-lib-2.4-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945837" comment="json-lib-javadoc-2.4-150200.3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5018" version="1" class="patch">
	<metadata>
		<title>Security update for buildah (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231208" ref_url="https://bugzilla.suse.com/1231208" source="BUGZILLA"/>
		<reference ref_id="1231230" ref_url="https://bugzilla.suse.com/1231230" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-9341" ref_url="https://www.suse.com/security/cve/CVE-2024-9341/" source="CVE"/>
		<reference ref_id="CVE-2024-9407" ref_url="https://www.suse.com/security/cve/CVE-2024-9407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3545-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037169.html" source="SUSE-SU"/>
		<description>
This update for buildah fixes the following issues:

- CVE-2024-9407: Fixed Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction (bsc#1231208).
- CVE-2024-9341: Fixed FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library in cri-o (nsc#1231230).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-08"/>
	<updated date="2024-10-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1231208">SUSE bug 1231208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231230">SUSE bug 1231230</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N" cvss4="5.8/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9341/">CVE-2024-9341 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9341">CVE-2024-9341 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9407/">CVE-2024-9407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9407">CVE-2024-9407 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945838" comment="buildah-1.35.4-150500.3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5019" version="1" class="patch">
	<metadata>
		<title>Security update for podman (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231230" ref_url="https://bugzilla.suse.com/1231230" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104/" source="CVE"/>
		<reference ref_id="CVE-2024-9341" ref_url="https://www.suse.com/security/cve/CVE-2024-9341/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037168.html" source="SUSE-SU"/>
		<description>
This update for podman fixes the following issues:

- CVE-2024-9341: Fixed FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library (bsc#1231230)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-08"/>
	<updated date="2024-10-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1231230">SUSE bug 1231230</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N" cvss4="5.8/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9341/">CVE-2024-9341 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9341">CVE-2024-9341 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945839" comment="podman-4.9.5-150500.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945840" comment="podman-docker-4.9.5-150500.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945841" comment="podman-remote-4.9.5-150500.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945842" comment="podmansh-4.9.5-150500.3.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5020" version="1" class="patch">
	<metadata>
		<title>Security update for Mesa (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222040" ref_url="https://bugzilla.suse.com/1222040" source="BUGZILLA"/>
		<reference ref_id="1222041" ref_url="https://bugzilla.suse.com/1222041" source="BUGZILLA"/>
		<reference ref_id="1222042" ref_url="https://bugzilla.suse.com/1222042" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45913" ref_url="https://www.suse.com/security/cve/CVE-2023-45913/" source="CVE"/>
		<reference ref_id="CVE-2023-45919" ref_url="https://www.suse.com/security/cve/CVE-2023-45919/" source="CVE"/>
		<reference ref_id="CVE-2023-45922" ref_url="https://www.suse.com/security/cve/CVE-2023-45922/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3548-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037166.html" source="SUSE-SU"/>
		<description>
This update for Mesa fixes the following issues:

- CVE-2023-45913: Fixed NULL pointer dereference via dri2GetGlxDrawableFromXDrawableId() (bsc#1222040)
- CVE-2023-45919: Fixed buffer over-read in glXQueryServerString() (bsc#1222041)
- CVE-2023-45922: Fixed segmentation violation in __glXGetDrawableAttribute() (bsc#1222042)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-08"/>
	<updated date="2024-10-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1222040">SUSE bug 1222040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222041">SUSE bug 1222041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222042">SUSE bug 1222042</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45913/">CVE-2023-45913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45913">CVE-2023-45913 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45919/">CVE-2023-45919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45919">CVE-2023-45919 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45922/">CVE-2023-45922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45922">CVE-2023-45922 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945843" comment="Mesa-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945844" comment="Mesa-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945845" comment="Mesa-KHR-devel-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945846" comment="Mesa-devel-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945847" comment="Mesa-dri-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945848" comment="Mesa-dri-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945849" comment="Mesa-dri-devel-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945850" comment="Mesa-dri-nouveau-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945851" comment="Mesa-dri-nouveau-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945852" comment="Mesa-dri-vc4-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945853" comment="Mesa-gallium-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945854" comment="Mesa-gallium-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945855" comment="Mesa-libEGL-devel-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945856" comment="Mesa-libEGL-devel-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945857" comment="Mesa-libEGL1-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945858" comment="Mesa-libEGL1-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945859" comment="Mesa-libGL-devel-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945860" comment="Mesa-libGL-devel-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945861" comment="Mesa-libGL1-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945862" comment="Mesa-libGL1-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945863" comment="Mesa-libGLESv1_CM-devel-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945864" comment="Mesa-libGLESv1_CM-devel-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945865" comment="Mesa-libGLESv2-devel-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945866" comment="Mesa-libGLESv2-devel-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945867" comment="Mesa-libGLESv3-devel-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945868" comment="Mesa-libOpenCL-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945869" comment="Mesa-libd3d-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945870" comment="Mesa-libd3d-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945871" comment="Mesa-libd3d-devel-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945872" comment="Mesa-libd3d-devel-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945873" comment="Mesa-libglapi-devel-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945874" comment="Mesa-libglapi-devel-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945875" comment="Mesa-libglapi0-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945876" comment="Mesa-libglapi0-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945877" comment="Mesa-libva-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945878" comment="Mesa-vulkan-device-select-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945879" comment="Mesa-vulkan-device-select-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945880" comment="Mesa-vulkan-overlay-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945881" comment="Mesa-vulkan-overlay-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945882" comment="libOSMesa-devel-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945883" comment="libOSMesa-devel-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945884" comment="libOSMesa8-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945885" comment="libOSMesa8-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945886" comment="libgbm-devel-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945887" comment="libgbm-devel-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945888" comment="libgbm1-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945889" comment="libgbm1-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945890" comment="libvdpau_nouveau-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945891" comment="libvdpau_nouveau-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945892" comment="libvdpau_r300-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945893" comment="libvdpau_r300-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945894" comment="libvdpau_r600-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945895" comment="libvdpau_r600-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945896" comment="libvdpau_radeonsi-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945897" comment="libvdpau_radeonsi-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945898" comment="libvdpau_virtio_gpu-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945899" comment="libvdpau_virtio_gpu-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945900" comment="libvulkan_broadcom-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945901" comment="libvulkan_freedreno-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945902" comment="libvulkan_intel-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945903" comment="libvulkan_intel-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945904" comment="libvulkan_lvp-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945905" comment="libvulkan_radeon-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945906" comment="libvulkan_radeon-32bit-22.3.5-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945907" comment="libxatracker-devel-1.0.0-150500.77.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945908" comment="libxatracker2-1.0.0-150500.77.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5021" version="1" class="patch">
	<metadata>
		<title>Security update for redis7 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231264" ref_url="https://bugzilla.suse.com/1231264" source="BUGZILLA"/>
		<reference ref_id="1231265" ref_url="https://bugzilla.suse.com/1231265" source="BUGZILLA"/>
		<reference ref_id="1231266" ref_url="https://bugzilla.suse.com/1231266" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-31227" ref_url="https://www.suse.com/security/cve/CVE-2024-31227/" source="CVE"/>
		<reference ref_id="CVE-2024-31228" ref_url="https://www.suse.com/security/cve/CVE-2024-31228/" source="CVE"/>
		<reference ref_id="CVE-2024-31449" ref_url="https://www.suse.com/security/cve/CVE-2024-31449/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3549-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037165.html" source="SUSE-SU"/>
		<description>
This update for redis7 fixes the following issues:

- CVE-2024-31227: Fixed parsing issue leading to denail of service (bsc#1231266)
- CVE-2024-31228: Fixed unbounded recursive pattern matching (bsc#1231265)
- CVE-2024-31449: Fixed integer overflow bug in Lua bit_tohex (bsc#1231264)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-08"/>
	<updated date="2024-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1231264">SUSE bug 1231264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231265">SUSE bug 1231265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231266">SUSE bug 1231266</bugzilla>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31227/">CVE-2024-31227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31227">CVE-2024-31227 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31228/">CVE-2024-31228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31228">CVE-2024-31228 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31449/">CVE-2024-31449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31449">CVE-2024-31449 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945909" comment="redis7-7.0.8-150500.3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5022" version="1" class="patch">
	<metadata>
		<title>Security update for podofo (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1023072" ref_url="https://bugzilla.suse.com/1023072" source="BUGZILLA"/>
		<reference ref_id="1023190" ref_url="https://bugzilla.suse.com/1023190" source="BUGZILLA"/>
		<reference ref_id="1027776" ref_url="https://bugzilla.suse.com/1027776" source="BUGZILLA"/>
		<reference ref_id="1027779" ref_url="https://bugzilla.suse.com/1027779" source="BUGZILLA"/>
		<reference ref_id="1027785" ref_url="https://bugzilla.suse.com/1027785" source="BUGZILLA"/>
		<reference ref_id="1027786" ref_url="https://bugzilla.suse.com/1027786" source="BUGZILLA"/>
		<reference ref_id="1027787" ref_url="https://bugzilla.suse.com/1027787" source="BUGZILLA"/>
		<reference ref_id="1037000" ref_url="https://bugzilla.suse.com/1037000" source="BUGZILLA"/>
		<reference ref_id="1075322" ref_url="https://bugzilla.suse.com/1075322" source="BUGZILLA"/>
		<reference ref_id="1084894" ref_url="https://bugzilla.suse.com/1084894" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8981" ref_url="https://www.suse.com/security/cve/CVE-2015-8981/" source="CVE"/>
		<reference ref_id="CVE-2017-6840" ref_url="https://www.suse.com/security/cve/CVE-2017-6840/" source="CVE"/>
		<reference ref_id="CVE-2017-6841" ref_url="https://www.suse.com/security/cve/CVE-2017-6841/" source="CVE"/>
		<reference ref_id="CVE-2017-6842" ref_url="https://www.suse.com/security/cve/CVE-2017-6842/" source="CVE"/>
		<reference ref_id="CVE-2017-6845" ref_url="https://www.suse.com/security/cve/CVE-2017-6845/" source="CVE"/>
		<reference ref_id="CVE-2017-6849" ref_url="https://www.suse.com/security/cve/CVE-2017-6849/" source="CVE"/>
		<reference ref_id="CVE-2017-8378" ref_url="https://www.suse.com/security/cve/CVE-2017-8378/" source="CVE"/>
		<reference ref_id="CVE-2018-5309" ref_url="https://www.suse.com/security/cve/CVE-2018-5309/" source="CVE"/>
		<reference ref_id="CVE-2018-8001" ref_url="https://www.suse.com/security/cve/CVE-2018-8001/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3550-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037164.html" source="SUSE-SU"/>
		<description>
This update for podofo fixes the following issues:

 - CVE-2015-8981: Fixed heap overflow in the function ReadXRefSubsection (bsc#1023190)
 - CVE-2017-6840: Fixed invalid memory read in ColorChanger::GetColorFromStack (colorchanger.cpp) (bsc#1027787)
 - CVE-2017-6841: Fixed NULL pointer dereference in GraphicsStack::TGraphicsStackElement::~TGraphicsStackElement (graphicsstack.h) (bsc#1027786)
 - CVE-2017-6842: Fixed NULL pointer dereference in ColorChanger::GetColorFromStack (colorchanger.cpp) (bsc#1027785)
 - CVE-2017-6845: Fixed NULL pointer dereference in GraphicsStack::TGraphicsStackElement::SetNonStrokingColorSpace (graphicsstack.h) (bsc#1027779)
 - CVE-2017-6849: Fixed NULL pointer dereference in PoDoFo::PdfColorGray::~PdfColorGray (PdfColor.cpp) (bsc#1027776)
 - CVE-2017-8378: Fixed denial of service (application crash) vectors related to m_offsets.size (PdfParser::ReadObjects func in base/PdfParser.cpp) (bsc#1037000)  

 - Fixed NULL pointer dereference in PdfInfo::GuessFormat (pdfinfo.cpp) (bsc#1023072)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-08"/>
	<updated date="2024-10-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1023072">SUSE bug 1023072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1023190">SUSE bug 1023190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027776">SUSE bug 1027776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027779">SUSE bug 1027779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027785">SUSE bug 1027785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027786">SUSE bug 1027786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1027787">SUSE bug 1027787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1037000">SUSE bug 1037000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1075322">SUSE bug 1075322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084894">SUSE bug 1084894</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2015-8981/">CVE-2015-8981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2015-8981">CVE-2015-8981 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6840/">CVE-2017-6840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6840">CVE-2017-6840 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6841/">CVE-2017-6841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6841">CVE-2017-6841 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6842/">CVE-2017-6842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6842">CVE-2017-6842 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2017-6845/">CVE-2017-6845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6845">CVE-2017-6845 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6849/">CVE-2017-6849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-6849">CVE-2017-6849 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8378/">CVE-2017-8378 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-8378">CVE-2017-8378 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5309/">CVE-2018-5309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-5309">CVE-2018-5309 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-8001/">CVE-2018-8001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-8001">CVE-2018-8001 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945910" comment="libpodofo-devel-0.9.6-150300.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945911" comment="libpodofo0_9_6-0.9.6-150300.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945912" comment="podofo-0.9.6-150300.3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5023" version="1" class="patch">
	<metadata>
		<title>Security update for pgadmin4 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223868" ref_url="https://bugzilla.suse.com/1223868" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-4216" ref_url="https://www.suse.com/security/cve/CVE-2024-4216/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3552-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037162.html" source="SUSE-SU"/>
		<description>
This update for pgadmin4 fixes the following issues:

- CVE-2024-4216: Fixed XSS in /settings/store endpoint (bsc#1223868)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-08"/>
	<updated date="2024-10-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1223868">SUSE bug 1223868</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-4216/">CVE-2024-4216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4216">CVE-2024-4216 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009945913" comment="pgadmin4-4.30-150300.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945914" comment="pgadmin4-doc-4.30-150300.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945915" comment="pgadmin4-web-4.30-150300.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009945916" comment="pgadmin4-web-uwsgi-4.30-150300.3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5024" version="1" class="patch">
	<metadata>
		<title>Security update for mozjs78 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230036" ref_url="https://bugzilla.suse.com/1230036" source="BUGZILLA"/>
		<reference ref_id="1230037" ref_url="https://bugzilla.suse.com/1230037" source="BUGZILLA"/>
		<reference ref_id="1230038" ref_url="https://bugzilla.suse.com/1230038" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-45490" ref_url="https://www.suse.com/security/cve/CVE-2024-45490/" source="CVE"/>
		<reference ref_id="CVE-2024-45491" ref_url="https://www.suse.com/security/cve/CVE-2024-45491/" source="CVE"/>
		<reference ref_id="CVE-2024-45492" ref_url="https://www.suse.com/security/cve/CVE-2024-45492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019572.html" source="SUSE-SU"/>
		<description>
This update for mozjs78 fixes the following issues:

- CVE-2024-45490: Fixed negative len for XML_ParseBuffer in embedded expat (bnc#1230036)
- CVE-2024-45491: Fixed integer overflow in dtdCopy in embedded expat (bnc#1230037)
- CVE-2024-45492: Fixed integer overflow in function nextScaffoldPart in embedded expat (bnc#1230038)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-09"/>
	<updated date="2024-10-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1230036">SUSE bug 1230036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230037">SUSE bug 1230037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230038">SUSE bug 1230038</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45490/">CVE-2024-45490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45490">CVE-2024-45490 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45491/">CVE-2024-45491 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45491">CVE-2024-45491 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45492/">CVE-2024-45492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45492">CVE-2024-45492 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009946150" comment="libmozjs-78-0-78.15.0-150400.3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946151" comment="mozjs78-78.15.0-150400.3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946152" comment="mozjs78-devel-78.15.0-150400.3.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5025" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1199769" ref_url="https://bugzilla.suse.com/1199769" source="BUGZILLA"/>
		<reference ref_id="1216223" ref_url="https://bugzilla.suse.com/1216223" source="BUGZILLA"/>
		<reference ref_id="1220382" ref_url="https://bugzilla.suse.com/1220382" source="BUGZILLA"/>
		<reference ref_id="1221610" ref_url="https://bugzilla.suse.com/1221610" source="BUGZILLA"/>
		<reference ref_id="1221650" ref_url="https://bugzilla.suse.com/1221650" source="BUGZILLA"/>
		<reference ref_id="1222629" ref_url="https://bugzilla.suse.com/1222629" source="BUGZILLA"/>
		<reference ref_id="1222973" ref_url="https://bugzilla.suse.com/1222973" source="BUGZILLA"/>
		<reference ref_id="1223600" ref_url="https://bugzilla.suse.com/1223600" source="BUGZILLA"/>
		<reference ref_id="1223848" ref_url="https://bugzilla.suse.com/1223848" source="BUGZILLA"/>
		<reference ref_id="1224085" ref_url="https://bugzilla.suse.com/1224085" source="BUGZILLA"/>
		<reference ref_id="1225903" ref_url="https://bugzilla.suse.com/1225903" source="BUGZILLA"/>
		<reference ref_id="1226003" ref_url="https://bugzilla.suse.com/1226003" source="BUGZILLA"/>
		<reference ref_id="1226606" ref_url="https://bugzilla.suse.com/1226606" source="BUGZILLA"/>
		<reference ref_id="1226662" ref_url="https://bugzilla.suse.com/1226662" source="BUGZILLA"/>
		<reference ref_id="1226666" ref_url="https://bugzilla.suse.com/1226666" source="BUGZILLA"/>
		<reference ref_id="1226846" ref_url="https://bugzilla.suse.com/1226846" source="BUGZILLA"/>
		<reference ref_id="1226860" ref_url="https://bugzilla.suse.com/1226860" source="BUGZILLA"/>
		<reference ref_id="1226875" ref_url="https://bugzilla.suse.com/1226875" source="BUGZILLA"/>
		<reference ref_id="1226915" ref_url="https://bugzilla.suse.com/1226915" source="BUGZILLA"/>
		<reference ref_id="1227487" ref_url="https://bugzilla.suse.com/1227487" source="BUGZILLA"/>
		<reference ref_id="1227726" ref_url="https://bugzilla.suse.com/1227726" source="BUGZILLA"/>
		<reference ref_id="1227819" ref_url="https://bugzilla.suse.com/1227819" source="BUGZILLA"/>
		<reference ref_id="1227832" ref_url="https://bugzilla.suse.com/1227832" source="BUGZILLA"/>
		<reference ref_id="1227890" ref_url="https://bugzilla.suse.com/1227890" source="BUGZILLA"/>
		<reference ref_id="1228507" ref_url="https://bugzilla.suse.com/1228507" source="BUGZILLA"/>
		<reference ref_id="1228576" ref_url="https://bugzilla.suse.com/1228576" source="BUGZILLA"/>
		<reference ref_id="1228620" ref_url="https://bugzilla.suse.com/1228620" source="BUGZILLA"/>
		<reference ref_id="1228771" ref_url="https://bugzilla.suse.com/1228771" source="BUGZILLA"/>
		<reference ref_id="1229031" ref_url="https://bugzilla.suse.com/1229031" source="BUGZILLA"/>
		<reference ref_id="1229034" ref_url="https://bugzilla.suse.com/1229034" source="BUGZILLA"/>
		<reference ref_id="1229086" ref_url="https://bugzilla.suse.com/1229086" source="BUGZILLA"/>
		<reference ref_id="1229156" ref_url="https://bugzilla.suse.com/1229156" source="BUGZILLA"/>
		<reference ref_id="1229289" ref_url="https://bugzilla.suse.com/1229289" source="BUGZILLA"/>
		<reference ref_id="1229334" ref_url="https://bugzilla.suse.com/1229334" source="BUGZILLA"/>
		<reference ref_id="1229362" ref_url="https://bugzilla.suse.com/1229362" source="BUGZILLA"/>
		<reference ref_id="1229363" ref_url="https://bugzilla.suse.com/1229363" source="BUGZILLA"/>
		<reference ref_id="1229364" ref_url="https://bugzilla.suse.com/1229364" source="BUGZILLA"/>
		<reference ref_id="1229394" ref_url="https://bugzilla.suse.com/1229394" source="BUGZILLA"/>
		<reference ref_id="1229429" ref_url="https://bugzilla.suse.com/1229429" source="BUGZILLA"/>
		<reference ref_id="1229453" ref_url="https://bugzilla.suse.com/1229453" source="BUGZILLA"/>
		<reference ref_id="1229572" ref_url="https://bugzilla.suse.com/1229572" source="BUGZILLA"/>
		<reference ref_id="1229573" ref_url="https://bugzilla.suse.com/1229573" source="BUGZILLA"/>
		<reference ref_id="1229585" ref_url="https://bugzilla.suse.com/1229585" source="BUGZILLA"/>
		<reference ref_id="1229607" ref_url="https://bugzilla.suse.com/1229607" source="BUGZILLA"/>
		<reference ref_id="1229619" ref_url="https://bugzilla.suse.com/1229619" source="BUGZILLA"/>
		<reference ref_id="1229633" ref_url="https://bugzilla.suse.com/1229633" source="BUGZILLA"/>
		<reference ref_id="1229662" ref_url="https://bugzilla.suse.com/1229662" source="BUGZILLA"/>
		<reference ref_id="1229753" ref_url="https://bugzilla.suse.com/1229753" source="BUGZILLA"/>
		<reference ref_id="1229764" ref_url="https://bugzilla.suse.com/1229764" source="BUGZILLA"/>
		<reference ref_id="1229790" ref_url="https://bugzilla.suse.com/1229790" source="BUGZILLA"/>
		<reference ref_id="1229810" ref_url="https://bugzilla.suse.com/1229810" source="BUGZILLA"/>
		<reference ref_id="1229830" ref_url="https://bugzilla.suse.com/1229830" source="BUGZILLA"/>
		<reference ref_id="1229899" ref_url="https://bugzilla.suse.com/1229899" source="BUGZILLA"/>
		<reference ref_id="1229928" ref_url="https://bugzilla.suse.com/1229928" source="BUGZILLA"/>
		<reference ref_id="1229947" ref_url="https://bugzilla.suse.com/1229947" source="BUGZILLA"/>
		<reference ref_id="1230015" ref_url="https://bugzilla.suse.com/1230015" source="BUGZILLA"/>
		<reference ref_id="1230129" ref_url="https://bugzilla.suse.com/1230129" source="BUGZILLA"/>
		<reference ref_id="1230130" ref_url="https://bugzilla.suse.com/1230130" source="BUGZILLA"/>
		<reference ref_id="1230170" ref_url="https://bugzilla.suse.com/1230170" source="BUGZILLA"/>
		<reference ref_id="1230171" ref_url="https://bugzilla.suse.com/1230171" source="BUGZILLA"/>
		<reference ref_id="1230174" ref_url="https://bugzilla.suse.com/1230174" source="BUGZILLA"/>
		<reference ref_id="1230175" ref_url="https://bugzilla.suse.com/1230175" source="BUGZILLA"/>
		<reference ref_id="1230176" ref_url="https://bugzilla.suse.com/1230176" source="BUGZILLA"/>
		<reference ref_id="1230178" ref_url="https://bugzilla.suse.com/1230178" source="BUGZILLA"/>
		<reference ref_id="1230180" ref_url="https://bugzilla.suse.com/1230180" source="BUGZILLA"/>
		<reference ref_id="1230185" ref_url="https://bugzilla.suse.com/1230185" source="BUGZILLA"/>
		<reference ref_id="1230192" ref_url="https://bugzilla.suse.com/1230192" source="BUGZILLA"/>
		<reference ref_id="1230193" ref_url="https://bugzilla.suse.com/1230193" source="BUGZILLA"/>
		<reference ref_id="1230194" ref_url="https://bugzilla.suse.com/1230194" source="BUGZILLA"/>
		<reference ref_id="1230200" ref_url="https://bugzilla.suse.com/1230200" source="BUGZILLA"/>
		<reference ref_id="1230204" ref_url="https://bugzilla.suse.com/1230204" source="BUGZILLA"/>
		<reference ref_id="1230209" ref_url="https://bugzilla.suse.com/1230209" source="BUGZILLA"/>
		<reference ref_id="1230211" ref_url="https://bugzilla.suse.com/1230211" source="BUGZILLA"/>
		<reference ref_id="1230212" ref_url="https://bugzilla.suse.com/1230212" source="BUGZILLA"/>
		<reference ref_id="1230217" ref_url="https://bugzilla.suse.com/1230217" source="BUGZILLA"/>
		<reference ref_id="1230224" ref_url="https://bugzilla.suse.com/1230224" source="BUGZILLA"/>
		<reference ref_id="1230230" ref_url="https://bugzilla.suse.com/1230230" source="BUGZILLA"/>
		<reference ref_id="1230233" ref_url="https://bugzilla.suse.com/1230233" source="BUGZILLA"/>
		<reference ref_id="1230244" ref_url="https://bugzilla.suse.com/1230244" source="BUGZILLA"/>
		<reference ref_id="1230245" ref_url="https://bugzilla.suse.com/1230245" source="BUGZILLA"/>
		<reference ref_id="1230247" ref_url="https://bugzilla.suse.com/1230247" source="BUGZILLA"/>
		<reference ref_id="1230248" ref_url="https://bugzilla.suse.com/1230248" source="BUGZILLA"/>
		<reference ref_id="1230269" ref_url="https://bugzilla.suse.com/1230269" source="BUGZILLA"/>
		<reference ref_id="1230339" ref_url="https://bugzilla.suse.com/1230339" source="BUGZILLA"/>
		<reference ref_id="1230340" ref_url="https://bugzilla.suse.com/1230340" source="BUGZILLA"/>
		<reference ref_id="1230392" ref_url="https://bugzilla.suse.com/1230392" source="BUGZILLA"/>
		<reference ref_id="1230398" ref_url="https://bugzilla.suse.com/1230398" source="BUGZILLA"/>
		<reference ref_id="1230431" ref_url="https://bugzilla.suse.com/1230431" source="BUGZILLA"/>
		<reference ref_id="1230433" ref_url="https://bugzilla.suse.com/1230433" source="BUGZILLA"/>
		<reference ref_id="1230434" ref_url="https://bugzilla.suse.com/1230434" source="BUGZILLA"/>
		<reference ref_id="1230440" ref_url="https://bugzilla.suse.com/1230440" source="BUGZILLA"/>
		<reference ref_id="1230442" ref_url="https://bugzilla.suse.com/1230442" source="BUGZILLA"/>
		<reference ref_id="1230444" ref_url="https://bugzilla.suse.com/1230444" source="BUGZILLA"/>
		<reference ref_id="1230450" ref_url="https://bugzilla.suse.com/1230450" source="BUGZILLA"/>
		<reference ref_id="1230451" ref_url="https://bugzilla.suse.com/1230451" source="BUGZILLA"/>
		<reference ref_id="1230454" ref_url="https://bugzilla.suse.com/1230454" source="BUGZILLA"/>
		<reference ref_id="1230506" ref_url="https://bugzilla.suse.com/1230506" source="BUGZILLA"/>
		<reference ref_id="1230507" ref_url="https://bugzilla.suse.com/1230507" source="BUGZILLA"/>
		<reference ref_id="1230511" ref_url="https://bugzilla.suse.com/1230511" source="BUGZILLA"/>
		<reference ref_id="1230515" ref_url="https://bugzilla.suse.com/1230515" source="BUGZILLA"/>
		<reference ref_id="1230517" ref_url="https://bugzilla.suse.com/1230517" source="BUGZILLA"/>
		<reference ref_id="1230524" ref_url="https://bugzilla.suse.com/1230524" source="BUGZILLA"/>
		<reference ref_id="1230533" ref_url="https://bugzilla.suse.com/1230533" source="BUGZILLA"/>
		<reference ref_id="1230535" ref_url="https://bugzilla.suse.com/1230535" source="BUGZILLA"/>
		<reference ref_id="1230549" ref_url="https://bugzilla.suse.com/1230549" source="BUGZILLA"/>
		<reference ref_id="1230556" ref_url="https://bugzilla.suse.com/1230556" source="BUGZILLA"/>
		<reference ref_id="1230582" ref_url="https://bugzilla.suse.com/1230582" source="BUGZILLA"/>
		<reference ref_id="1230589" ref_url="https://bugzilla.suse.com/1230589" source="BUGZILLA"/>
		<reference ref_id="1230591" ref_url="https://bugzilla.suse.com/1230591" source="BUGZILLA"/>
		<reference ref_id="1230592" ref_url="https://bugzilla.suse.com/1230592" source="BUGZILLA"/>
		<reference ref_id="1230699" ref_url="https://bugzilla.suse.com/1230699" source="BUGZILLA"/>
		<reference ref_id="1230700" ref_url="https://bugzilla.suse.com/1230700" source="BUGZILLA"/>
		<reference ref_id="1230701" ref_url="https://bugzilla.suse.com/1230701" source="BUGZILLA"/>
		<reference ref_id="1230702" ref_url="https://bugzilla.suse.com/1230702" source="BUGZILLA"/>
		<reference ref_id="1230703" ref_url="https://bugzilla.suse.com/1230703" source="BUGZILLA"/>
		<reference ref_id="1230705" ref_url="https://bugzilla.suse.com/1230705" source="BUGZILLA"/>
		<reference ref_id="1230706" ref_url="https://bugzilla.suse.com/1230706" source="BUGZILLA"/>
		<reference ref_id="1230707" ref_url="https://bugzilla.suse.com/1230707" source="BUGZILLA"/>
		<reference ref_id="1230709" ref_url="https://bugzilla.suse.com/1230709" source="BUGZILLA"/>
		<reference ref_id="1230710" ref_url="https://bugzilla.suse.com/1230710" source="BUGZILLA"/>
		<reference ref_id="1230711" ref_url="https://bugzilla.suse.com/1230711" source="BUGZILLA"/>
		<reference ref_id="1230712" ref_url="https://bugzilla.suse.com/1230712" source="BUGZILLA"/>
		<reference ref_id="1230719" ref_url="https://bugzilla.suse.com/1230719" source="BUGZILLA"/>
		<reference ref_id="1230724" ref_url="https://bugzilla.suse.com/1230724" source="BUGZILLA"/>
		<reference ref_id="1230725" ref_url="https://bugzilla.suse.com/1230725" source="BUGZILLA"/>
		<reference ref_id="1230730" ref_url="https://bugzilla.suse.com/1230730" source="BUGZILLA"/>
		<reference ref_id="1230731" ref_url="https://bugzilla.suse.com/1230731" source="BUGZILLA"/>
		<reference ref_id="1230732" ref_url="https://bugzilla.suse.com/1230732" source="BUGZILLA"/>
		<reference ref_id="1230733" ref_url="https://bugzilla.suse.com/1230733" source="BUGZILLA"/>
		<reference ref_id="1230747" ref_url="https://bugzilla.suse.com/1230747" source="BUGZILLA"/>
		<reference ref_id="1230748" ref_url="https://bugzilla.suse.com/1230748" source="BUGZILLA"/>
		<reference ref_id="1230751" ref_url="https://bugzilla.suse.com/1230751" source="BUGZILLA"/>
		<reference ref_id="1230752" ref_url="https://bugzilla.suse.com/1230752" source="BUGZILLA"/>
		<reference ref_id="1230756" ref_url="https://bugzilla.suse.com/1230756" source="BUGZILLA"/>
		<reference ref_id="1230761" ref_url="https://bugzilla.suse.com/1230761" source="BUGZILLA"/>
		<reference ref_id="1230766" ref_url="https://bugzilla.suse.com/1230766" source="BUGZILLA"/>
		<reference ref_id="1230767" ref_url="https://bugzilla.suse.com/1230767" source="BUGZILLA"/>
		<reference ref_id="1230768" ref_url="https://bugzilla.suse.com/1230768" source="BUGZILLA"/>
		<reference ref_id="1230771" ref_url="https://bugzilla.suse.com/1230771" source="BUGZILLA"/>
		<reference ref_id="1230772" ref_url="https://bugzilla.suse.com/1230772" source="BUGZILLA"/>
		<reference ref_id="1230776" ref_url="https://bugzilla.suse.com/1230776" source="BUGZILLA"/>
		<reference ref_id="1230783" ref_url="https://bugzilla.suse.com/1230783" source="BUGZILLA"/>
		<reference ref_id="1230786" ref_url="https://bugzilla.suse.com/1230786" source="BUGZILLA"/>
		<reference ref_id="1230791" ref_url="https://bugzilla.suse.com/1230791" source="BUGZILLA"/>
		<reference ref_id="1230794" ref_url="https://bugzilla.suse.com/1230794" source="BUGZILLA"/>
		<reference ref_id="1230796" ref_url="https://bugzilla.suse.com/1230796" source="BUGZILLA"/>
		<reference ref_id="1230802" ref_url="https://bugzilla.suse.com/1230802" source="BUGZILLA"/>
		<reference ref_id="1230806" ref_url="https://bugzilla.suse.com/1230806" source="BUGZILLA"/>
		<reference ref_id="1230808" ref_url="https://bugzilla.suse.com/1230808" source="BUGZILLA"/>
		<reference ref_id="1230810" ref_url="https://bugzilla.suse.com/1230810" source="BUGZILLA"/>
		<reference ref_id="1230812" ref_url="https://bugzilla.suse.com/1230812" source="BUGZILLA"/>
		<reference ref_id="1230813" ref_url="https://bugzilla.suse.com/1230813" source="BUGZILLA"/>
		<reference ref_id="1230814" ref_url="https://bugzilla.suse.com/1230814" source="BUGZILLA"/>
		<reference ref_id="1230815" ref_url="https://bugzilla.suse.com/1230815" source="BUGZILLA"/>
		<reference ref_id="1230821" ref_url="https://bugzilla.suse.com/1230821" source="BUGZILLA"/>
		<reference ref_id="1230825" ref_url="https://bugzilla.suse.com/1230825" source="BUGZILLA"/>
		<reference ref_id="1230830" ref_url="https://bugzilla.suse.com/1230830" source="BUGZILLA"/>
		<reference ref_id="1231013" ref_url="https://bugzilla.suse.com/1231013" source="BUGZILLA"/>
		<reference ref_id="1231017" ref_url="https://bugzilla.suse.com/1231017" source="BUGZILLA"/>
		<reference ref_id="1231116" ref_url="https://bugzilla.suse.com/1231116" source="BUGZILLA"/>
		<reference ref_id="1231120" ref_url="https://bugzilla.suse.com/1231120" source="BUGZILLA"/>
		<reference ref_id="1231146" ref_url="https://bugzilla.suse.com/1231146" source="BUGZILLA"/>
		<reference ref_id="1231180" ref_url="https://bugzilla.suse.com/1231180" source="BUGZILLA"/>
		<reference ref_id="1231181" ref_url="https://bugzilla.suse.com/1231181" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48901" ref_url="https://www.suse.com/security/cve/CVE-2022-48901/" source="CVE"/>
		<reference ref_id="CVE-2022-48911" ref_url="https://www.suse.com/security/cve/CVE-2022-48911/" source="CVE"/>
		<reference ref_id="CVE-2022-48923" ref_url="https://www.suse.com/security/cve/CVE-2022-48923/" source="CVE"/>
		<reference ref_id="CVE-2022-48935" ref_url="https://www.suse.com/security/cve/CVE-2022-48935/" source="CVE"/>
		<reference ref_id="CVE-2022-48944" ref_url="https://www.suse.com/security/cve/CVE-2022-48944/" source="CVE"/>
		<reference ref_id="CVE-2022-48945" ref_url="https://www.suse.com/security/cve/CVE-2022-48945/" source="CVE"/>
		<reference ref_id="CVE-2023-52610" ref_url="https://www.suse.com/security/cve/CVE-2023-52610/" source="CVE"/>
		<reference ref_id="CVE-2023-52916" ref_url="https://www.suse.com/security/cve/CVE-2023-52916/" source="CVE"/>
		<reference ref_id="CVE-2024-26640" ref_url="https://www.suse.com/security/cve/CVE-2024-26640/" source="CVE"/>
		<reference ref_id="CVE-2024-26759" ref_url="https://www.suse.com/security/cve/CVE-2024-26759/" source="CVE"/>
		<reference ref_id="CVE-2024-26767" ref_url="https://www.suse.com/security/cve/CVE-2024-26767/" source="CVE"/>
		<reference ref_id="CVE-2024-26804" ref_url="https://www.suse.com/security/cve/CVE-2024-26804/" source="CVE"/>
		<reference ref_id="CVE-2024-26837" ref_url="https://www.suse.com/security/cve/CVE-2024-26837/" source="CVE"/>
		<reference ref_id="CVE-2024-37353" ref_url="https://www.suse.com/security/cve/CVE-2024-37353/" source="CVE"/>
		<reference ref_id="CVE-2024-38538" ref_url="https://www.suse.com/security/cve/CVE-2024-38538/" source="CVE"/>
		<reference ref_id="CVE-2024-38596" ref_url="https://www.suse.com/security/cve/CVE-2024-38596/" source="CVE"/>
		<reference ref_id="CVE-2024-38632" ref_url="https://www.suse.com/security/cve/CVE-2024-38632/" source="CVE"/>
		<reference ref_id="CVE-2024-40910" ref_url="https://www.suse.com/security/cve/CVE-2024-40910/" source="CVE"/>
		<reference ref_id="CVE-2024-40973" ref_url="https://www.suse.com/security/cve/CVE-2024-40973/" source="CVE"/>
		<reference ref_id="CVE-2024-40983" ref_url="https://www.suse.com/security/cve/CVE-2024-40983/" source="CVE"/>
		<reference ref_id="CVE-2024-41062" ref_url="https://www.suse.com/security/cve/CVE-2024-41062/" source="CVE"/>
		<reference ref_id="CVE-2024-41082" ref_url="https://www.suse.com/security/cve/CVE-2024-41082/" source="CVE"/>
		<reference ref_id="CVE-2024-42154" ref_url="https://www.suse.com/security/cve/CVE-2024-42154/" source="CVE"/>
		<reference ref_id="CVE-2024-42259" ref_url="https://www.suse.com/security/cve/CVE-2024-42259/" source="CVE"/>
		<reference ref_id="CVE-2024-42265" ref_url="https://www.suse.com/security/cve/CVE-2024-42265/" source="CVE"/>
		<reference ref_id="CVE-2024-42304" ref_url="https://www.suse.com/security/cve/CVE-2024-42304/" source="CVE"/>
		<reference ref_id="CVE-2024-42305" ref_url="https://www.suse.com/security/cve/CVE-2024-42305/" source="CVE"/>
		<reference ref_id="CVE-2024-42306" ref_url="https://www.suse.com/security/cve/CVE-2024-42306/" source="CVE"/>
		<reference ref_id="CVE-2024-43828" ref_url="https://www.suse.com/security/cve/CVE-2024-43828/" source="CVE"/>
		<reference ref_id="CVE-2024-43835" ref_url="https://www.suse.com/security/cve/CVE-2024-43835/" source="CVE"/>
		<reference ref_id="CVE-2024-43890" ref_url="https://www.suse.com/security/cve/CVE-2024-43890/" source="CVE"/>
		<reference ref_id="CVE-2024-43898" ref_url="https://www.suse.com/security/cve/CVE-2024-43898/" source="CVE"/>
		<reference ref_id="CVE-2024-43912" ref_url="https://www.suse.com/security/cve/CVE-2024-43912/" source="CVE"/>
		<reference ref_id="CVE-2024-43914" ref_url="https://www.suse.com/security/cve/CVE-2024-43914/" source="CVE"/>
		<reference ref_id="CVE-2024-44935" ref_url="https://www.suse.com/security/cve/CVE-2024-44935/" source="CVE"/>
		<reference ref_id="CVE-2024-44944" ref_url="https://www.suse.com/security/cve/CVE-2024-44944/" source="CVE"/>
		<reference ref_id="CVE-2024-44946" ref_url="https://www.suse.com/security/cve/CVE-2024-44946/" source="CVE"/>
		<reference ref_id="CVE-2024-44948" ref_url="https://www.suse.com/security/cve/CVE-2024-44948/" source="CVE"/>
		<reference ref_id="CVE-2024-44950" ref_url="https://www.suse.com/security/cve/CVE-2024-44950/" source="CVE"/>
		<reference ref_id="CVE-2024-44952" ref_url="https://www.suse.com/security/cve/CVE-2024-44952/" source="CVE"/>
		<reference ref_id="CVE-2024-44954" ref_url="https://www.suse.com/security/cve/CVE-2024-44954/" source="CVE"/>
		<reference ref_id="CVE-2024-44967" ref_url="https://www.suse.com/security/cve/CVE-2024-44967/" source="CVE"/>
		<reference ref_id="CVE-2024-44969" ref_url="https://www.suse.com/security/cve/CVE-2024-44969/" source="CVE"/>
		<reference ref_id="CVE-2024-44970" ref_url="https://www.suse.com/security/cve/CVE-2024-44970/" source="CVE"/>
		<reference ref_id="CVE-2024-44971" ref_url="https://www.suse.com/security/cve/CVE-2024-44971/" source="CVE"/>
		<reference ref_id="CVE-2024-44972" ref_url="https://www.suse.com/security/cve/CVE-2024-44972/" source="CVE"/>
		<reference ref_id="CVE-2024-44977" ref_url="https://www.suse.com/security/cve/CVE-2024-44977/" source="CVE"/>
		<reference ref_id="CVE-2024-44982" ref_url="https://www.suse.com/security/cve/CVE-2024-44982/" source="CVE"/>
		<reference ref_id="CVE-2024-44986" ref_url="https://www.suse.com/security/cve/CVE-2024-44986/" source="CVE"/>
		<reference ref_id="CVE-2024-44987" ref_url="https://www.suse.com/security/cve/CVE-2024-44987/" source="CVE"/>
		<reference ref_id="CVE-2024-44988" ref_url="https://www.suse.com/security/cve/CVE-2024-44988/" source="CVE"/>
		<reference ref_id="CVE-2024-44989" ref_url="https://www.suse.com/security/cve/CVE-2024-44989/" source="CVE"/>
		<reference ref_id="CVE-2024-44990" ref_url="https://www.suse.com/security/cve/CVE-2024-44990/" source="CVE"/>
		<reference ref_id="CVE-2024-44998" ref_url="https://www.suse.com/security/cve/CVE-2024-44998/" source="CVE"/>
		<reference ref_id="CVE-2024-44999" ref_url="https://www.suse.com/security/cve/CVE-2024-44999/" source="CVE"/>
		<reference ref_id="CVE-2024-45000" ref_url="https://www.suse.com/security/cve/CVE-2024-45000/" source="CVE"/>
		<reference ref_id="CVE-2024-45001" ref_url="https://www.suse.com/security/cve/CVE-2024-45001/" source="CVE"/>
		<reference ref_id="CVE-2024-45003" ref_url="https://www.suse.com/security/cve/CVE-2024-45003/" source="CVE"/>
		<reference ref_id="CVE-2024-45006" ref_url="https://www.suse.com/security/cve/CVE-2024-45006/" source="CVE"/>
		<reference ref_id="CVE-2024-45007" ref_url="https://www.suse.com/security/cve/CVE-2024-45007/" source="CVE"/>
		<reference ref_id="CVE-2024-45008" ref_url="https://www.suse.com/security/cve/CVE-2024-45008/" source="CVE"/>
		<reference ref_id="CVE-2024-45011" ref_url="https://www.suse.com/security/cve/CVE-2024-45011/" source="CVE"/>
		<reference ref_id="CVE-2024-45013" ref_url="https://www.suse.com/security/cve/CVE-2024-45013/" source="CVE"/>
		<reference ref_id="CVE-2024-45015" ref_url="https://www.suse.com/security/cve/CVE-2024-45015/" source="CVE"/>
		<reference ref_id="CVE-2024-45018" ref_url="https://www.suse.com/security/cve/CVE-2024-45018/" source="CVE"/>
		<reference ref_id="CVE-2024-45020" ref_url="https://www.suse.com/security/cve/CVE-2024-45020/" source="CVE"/>
		<reference ref_id="CVE-2024-45021" ref_url="https://www.suse.com/security/cve/CVE-2024-45021/" source="CVE"/>
		<reference ref_id="CVE-2024-45026" ref_url="https://www.suse.com/security/cve/CVE-2024-45026/" source="CVE"/>
		<reference ref_id="CVE-2024-45028" ref_url="https://www.suse.com/security/cve/CVE-2024-45028/" source="CVE"/>
		<reference ref_id="CVE-2024-45029" ref_url="https://www.suse.com/security/cve/CVE-2024-45029/" source="CVE"/>
		<reference ref_id="CVE-2024-46673" ref_url="https://www.suse.com/security/cve/CVE-2024-46673/" source="CVE"/>
		<reference ref_id="CVE-2024-46674" ref_url="https://www.suse.com/security/cve/CVE-2024-46674/" source="CVE"/>
		<reference ref_id="CVE-2024-46675" ref_url="https://www.suse.com/security/cve/CVE-2024-46675/" source="CVE"/>
		<reference ref_id="CVE-2024-46676" ref_url="https://www.suse.com/security/cve/CVE-2024-46676/" source="CVE"/>
		<reference ref_id="CVE-2024-46677" ref_url="https://www.suse.com/security/cve/CVE-2024-46677/" source="CVE"/>
		<reference ref_id="CVE-2024-46679" ref_url="https://www.suse.com/security/cve/CVE-2024-46679/" source="CVE"/>
		<reference ref_id="CVE-2024-46685" ref_url="https://www.suse.com/security/cve/CVE-2024-46685/" source="CVE"/>
		<reference ref_id="CVE-2024-46686" ref_url="https://www.suse.com/security/cve/CVE-2024-46686/" source="CVE"/>
		<reference ref_id="CVE-2024-46689" ref_url="https://www.suse.com/security/cve/CVE-2024-46689/" source="CVE"/>
		<reference ref_id="CVE-2024-46694" ref_url="https://www.suse.com/security/cve/CVE-2024-46694/" source="CVE"/>
		<reference ref_id="CVE-2024-46702" ref_url="https://www.suse.com/security/cve/CVE-2024-46702/" source="CVE"/>
		<reference ref_id="CVE-2024-46707" ref_url="https://www.suse.com/security/cve/CVE-2024-46707/" source="CVE"/>
		<reference ref_id="CVE-2024-46714" ref_url="https://www.suse.com/security/cve/CVE-2024-46714/" source="CVE"/>
		<reference ref_id="CVE-2024-46715" ref_url="https://www.suse.com/security/cve/CVE-2024-46715/" source="CVE"/>
		<reference ref_id="CVE-2024-46717" ref_url="https://www.suse.com/security/cve/CVE-2024-46717/" source="CVE"/>
		<reference ref_id="CVE-2024-46720" ref_url="https://www.suse.com/security/cve/CVE-2024-46720/" source="CVE"/>
		<reference ref_id="CVE-2024-46721" ref_url="https://www.suse.com/security/cve/CVE-2024-46721/" source="CVE"/>
		<reference ref_id="CVE-2024-46722" ref_url="https://www.suse.com/security/cve/CVE-2024-46722/" source="CVE"/>
		<reference ref_id="CVE-2024-46723" ref_url="https://www.suse.com/security/cve/CVE-2024-46723/" source="CVE"/>
		<reference ref_id="CVE-2024-46724" ref_url="https://www.suse.com/security/cve/CVE-2024-46724/" source="CVE"/>
		<reference ref_id="CVE-2024-46725" ref_url="https://www.suse.com/security/cve/CVE-2024-46725/" source="CVE"/>
		<reference ref_id="CVE-2024-46726" ref_url="https://www.suse.com/security/cve/CVE-2024-46726/" source="CVE"/>
		<reference ref_id="CVE-2024-46727" ref_url="https://www.suse.com/security/cve/CVE-2024-46727/" source="CVE"/>
		<reference ref_id="CVE-2024-46728" ref_url="https://www.suse.com/security/cve/CVE-2024-46728/" source="CVE"/>
		<reference ref_id="CVE-2024-46730" ref_url="https://www.suse.com/security/cve/CVE-2024-46730/" source="CVE"/>
		<reference ref_id="CVE-2024-46731" ref_url="https://www.suse.com/security/cve/CVE-2024-46731/" source="CVE"/>
		<reference ref_id="CVE-2024-46732" ref_url="https://www.suse.com/security/cve/CVE-2024-46732/" source="CVE"/>
		<reference ref_id="CVE-2024-46737" ref_url="https://www.suse.com/security/cve/CVE-2024-46737/" source="CVE"/>
		<reference ref_id="CVE-2024-46738" ref_url="https://www.suse.com/security/cve/CVE-2024-46738/" source="CVE"/>
		<reference ref_id="CVE-2024-46739" ref_url="https://www.suse.com/security/cve/CVE-2024-46739/" source="CVE"/>
		<reference ref_id="CVE-2024-46743" ref_url="https://www.suse.com/security/cve/CVE-2024-46743/" source="CVE"/>
		<reference ref_id="CVE-2024-46744" ref_url="https://www.suse.com/security/cve/CVE-2024-46744/" source="CVE"/>
		<reference ref_id="CVE-2024-46745" ref_url="https://www.suse.com/security/cve/CVE-2024-46745/" source="CVE"/>
		<reference ref_id="CVE-2024-46746" ref_url="https://www.suse.com/security/cve/CVE-2024-46746/" source="CVE"/>
		<reference ref_id="CVE-2024-46747" ref_url="https://www.suse.com/security/cve/CVE-2024-46747/" source="CVE"/>
		<reference ref_id="CVE-2024-46750" ref_url="https://www.suse.com/security/cve/CVE-2024-46750/" source="CVE"/>
		<reference ref_id="CVE-2024-46751" ref_url="https://www.suse.com/security/cve/CVE-2024-46751/" source="CVE"/>
		<reference ref_id="CVE-2024-46752" ref_url="https://www.suse.com/security/cve/CVE-2024-46752/" source="CVE"/>
		<reference ref_id="CVE-2024-46753" ref_url="https://www.suse.com/security/cve/CVE-2024-46753/" source="CVE"/>
		<reference ref_id="CVE-2024-46755" ref_url="https://www.suse.com/security/cve/CVE-2024-46755/" source="CVE"/>
		<reference ref_id="CVE-2024-46756" ref_url="https://www.suse.com/security/cve/CVE-2024-46756/" source="CVE"/>
		<reference ref_id="CVE-2024-46758" ref_url="https://www.suse.com/security/cve/CVE-2024-46758/" source="CVE"/>
		<reference ref_id="CVE-2024-46759" ref_url="https://www.suse.com/security/cve/CVE-2024-46759/" source="CVE"/>
		<reference ref_id="CVE-2024-46761" ref_url="https://www.suse.com/security/cve/CVE-2024-46761/" source="CVE"/>
		<reference ref_id="CVE-2024-46771" ref_url="https://www.suse.com/security/cve/CVE-2024-46771/" source="CVE"/>
		<reference ref_id="CVE-2024-46772" ref_url="https://www.suse.com/security/cve/CVE-2024-46772/" source="CVE"/>
		<reference ref_id="CVE-2024-46773" ref_url="https://www.suse.com/security/cve/CVE-2024-46773/" source="CVE"/>
		<reference ref_id="CVE-2024-46774" ref_url="https://www.suse.com/security/cve/CVE-2024-46774/" source="CVE"/>
		<reference ref_id="CVE-2024-46778" ref_url="https://www.suse.com/security/cve/CVE-2024-46778/" source="CVE"/>
		<reference ref_id="CVE-2024-46780" ref_url="https://www.suse.com/security/cve/CVE-2024-46780/" source="CVE"/>
		<reference ref_id="CVE-2024-46781" ref_url="https://www.suse.com/security/cve/CVE-2024-46781/" source="CVE"/>
		<reference ref_id="CVE-2024-46783" ref_url="https://www.suse.com/security/cve/CVE-2024-46783/" source="CVE"/>
		<reference ref_id="CVE-2024-46784" ref_url="https://www.suse.com/security/cve/CVE-2024-46784/" source="CVE"/>
		<reference ref_id="CVE-2024-46786" ref_url="https://www.suse.com/security/cve/CVE-2024-46786/" source="CVE"/>
		<reference ref_id="CVE-2024-46787" ref_url="https://www.suse.com/security/cve/CVE-2024-46787/" source="CVE"/>
		<reference ref_id="CVE-2024-46791" ref_url="https://www.suse.com/security/cve/CVE-2024-46791/" source="CVE"/>
		<reference ref_id="CVE-2024-46794" ref_url="https://www.suse.com/security/cve/CVE-2024-46794/" source="CVE"/>
		<reference ref_id="CVE-2024-46798" ref_url="https://www.suse.com/security/cve/CVE-2024-46798/" source="CVE"/>
		<reference ref_id="CVE-2024-46822" ref_url="https://www.suse.com/security/cve/CVE-2024-46822/" source="CVE"/>
		<reference ref_id="CVE-2024-46830" ref_url="https://www.suse.com/security/cve/CVE-2024-46830/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-48901: btrfs: do not start relocation until in progress drops are done  (bsc#1229607).
- CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance.  (bsc#1229633).
- CVE-2022-48923: btrfs: prevent copying too big compressed lzo segment (bsc#1229662)
- CVE-2022-48935: Fixed an unregister flowtable hooks on netns exit (bsc#1229619)
- CVE-2023-52610: net/sched: act_ct: fix skb leak and crash on ooo frags (bsc#1221610).
- CVE-2023-52916: media: aspeed: Fix memory overwrite if timing is 1600x900 (bsc#1230269).
- CVE-2024-26640: tcp: add sanity checks to rx zerocopy (bsc#1221650).
- CVE-2024-26759: mm/swap: fix race when skipping swapcache (bsc#1230340).
- CVE-2024-26767: drm/amd/display: fixed integer types and null check locations  (bsc#1230339).
- CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth (bsc#1222629).
- CVE-2024-26837: net: bridge: switchdev: race between creation of new group memberships and generation of the list of MDB events to replay (bsc#1222973).
- CVE-2024-37353: virtio: fixed a double free in vp_del_vqs() (bsc#1226875).
- CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len bytes (bsc#1226606).
- CVE-2024-38596: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg (bsc#1226846).
- CVE-2024-40910: Fix refcount imbalance on inbound connections (bsc#1227832).
- CVE-2024-40973: media: mtk-vcodec: potential null pointer deference in SCP (bsc#1227890).
- CVE-2024-40983: tipc: force a dst refcount before doing decryption (bsc#1227819).
- CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).
- CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command  (bsc#1228620 CVE-2024-41082).
- CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507).
- CVE-2024-42259: Fix Virtual Memory mapping boundaries calculation (bsc#1229156)
- CVE-2024-42265: protect the fetch of -&gt;fd[fd] in do_dup2() from mispredictions (bsc#1229334).
- CVE-2024-42304: ext4: make sure the first directory block is not a hole (bsc#1229364).
- CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir indexed (bsc#1229363).
- CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer (bsc#1229362).
- CVE-2024-43828: ext4: fix infinite loop when replaying fast_commit (bsc#1229394).
- CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764).
- CVE-2024-43898: ext4: sanity check for NULL pointer after ext4_force_shutdown (bsc#1229753).
- CVE-2024-43912: wifi: nl80211: disallow setting special AP channel widths (bsc#1229830)
- CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after reassembling (bsc#1229790).
- CVE-2024-44935: sctp: Fix null-ptr-deref in reuseport_add_sock() (bsc#1229810).
- CVE-2024-44944: netfilter: ctnetlink: use helper function to calculate expect ID (bsc#1229899).
- CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015).
- CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special register set (bsc#1230180).
- CVE-2024-44952: driver core: Fix uevent_show() vs driver detach race  (bsc#1230178).
- CVE-2024-44970: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (bsc#1230209).
- CVE-2024-44971: net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register() (bsc#1230211).
- CVE-2024-44986: ipv6: fix possible UAF in ip6_finish_output2() (bsc#1230230)
- CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185).
- CVE-2024-44988: net: dsa: mv88e6xxx: Fix out-of-bound access (bsc#1230192).
- CVE-2024-44989: bonding: fix xfrm real_dev null pointer dereference (bsc#1230193).
- CVE-2024-44990: bonding: fix null pointer deref in bond_ipsec_offload_ok (bsc#1230194).
- CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx() (bsc#1230171).
- CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233).
- CVE-2024-45003: Don't evict inode under the inode lru traversing context (bsc#1230245).
- CVE-2024-45007: char: xillybus: Refine workqueue handling (bsc#1230175).
- CVE-2024-45008: Input: MT - limit max slots (bsc#1230248).
- CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl() (bsc#1230442).
- CVE-2024-45015: drm/msm/dpu: move dpu_encoder's connector assignment to (bsc#1230444)
- CVE-2024-45018: netfilter: flowtable: initialise extack before use (bsc#1230431).
- CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434).
- CVE-2024-45029: i2c: tegra: Do not mark ACPI devices as irq safe (bsc#1230451).
- CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure (bsc#1230506).
- CVE-2024-46674: usb: dwc3: st: fix probed platform device ref count on probe  error path (bsc#1230507).
- CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549).
- CVE-2024-46679: ethtool: check device is present when getting link settings (bsc#1230556).
- CVE-2024-46685: pinctrl: single: fix potential NULL dereference in pcs_get_function() (bsc#1230515)
- CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() (bsc#1230517).
- CVE-2024-46689: soc: qcom: cmd-db: Map shared memory as WC, not WB (bsc#1230524)
- CVE-2024-46702: thunderbolt: Mark XDomain as unplugged when router is removed (bsc#1230589)
- CVE-2024-46707: KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3  (bsc#1230582).
- CVE-2024-46715: driver: iio: add missing checks on iio_info's callback access  (bsc#1230700).
- CVE-2024-46717: net/mlx5e: SHAMPO, Fix incorrect page release (bsc#1230719).
- CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710)
- CVE-2024-46728: drm/amd/display: Check index for aux_rd_interval before using (bsc#1230703)
- CVE-2024-46730: drm/amd/display: Ensure array index tg_inst won't be -1 (bsc#1230701)
- CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in interrupt map walk (bsc#1230756).
- CVE-2024-46751: btrfs: do not BUG_ON() when 0 reference count at btrfs_lookup_extent_info() (bsc#1230786).
- CVE-2024-46752: btrfs: reduce nesting for extent processing at btrfs_lookup_extent_info() (bsc#1230794).
- CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly (bsc#1230796).
- CVE-2024-46772: drm/amd/display: Check denominator crb_pipes before used (bsc#1230772).
- CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg() (bsc#1230810).
- CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815).
- CVE-2024-46794: x86/tdx: Fix data leak in mmio_read() (bsc#1230825).
- CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry (bsc#1231120).
- CVE-2024-46830: KVM: x86: Acquire kvm-&gt;srcu when handling KVM_SET_VCPU_EVENTS  (bsc#1231116).

The following non-security bugs were fixed:

- ACPI: battery: create alarm sysfs attribute atomically (git-fixes).
- ACPI: CPPC: Fix MASK_VAL() usage (git-fixes).
- ACPI: PMIC: Remove unneeded check in tps68470_pmic_opregion_probe() (git-fixes).
- ACPI: processor: Fix memory leaks in error paths of processor_add() (stable-fixes).
- ACPI: processor: Return an error if acpi_processor_get_info() fails in processor_add() (stable-fixes).
- ACPI: SBS: manage alarm sysfs attribute through psy core (git-fixes).
- ACPI: sysfs: validate return type of _STR method (git-fixes).
- af_unix: annotate lockless accesses to sk-&gt;sk_err (bsc#1226846).
- af_unix: Fix data races around sk-&gt;sk_shutdown (bsc#1226846).
- af_unix: Fix data-races around sk-&gt;sk_shutdown (git-fixes).
- ALSA: hda: Add input value sanity checks to HDMI channel map controls (stable-fixes).
- ALSA: hda/conexant: Add pincfg quirk to enable top speakers on Sirius devices (stable-fixes).
- ALSA: hda/conexant: Mute speakers at suspend / shutdown (stable-fixes).
- ALSA: hda/generic: Add a helper to mute speakers at suspend/shutdown (stable-fixes).
- ALSA: hda/realtek: Support mute LED on HP Laptop 14-dq2xxx (stable-fixes).
- apparmor: fix possible NULL pointer dereference (stable-fixes).
- arm64: acpi: Move get_cpu_for_acpi_id() to a header (git-fixes).
- arm64: dts: rockchip: Correct the Pinebook Pro battery design capacity (git-fixes).
- arm64: dts: rockchip: fix PMIC interrupt pin in pinctrl for ROCK Pi E (git-fixes).
- arm64: dts: rockchip: Raise Pinebook Pro's panel backlight PWM frequency (git-fixes).
- arm64/mm: Modify range-based tlbi to decrement scale (bsc#1229585)
- arm64/mm: Update tlb invalidation routines for FEAT_LPA2 (bsc#1229585)
- arm64: tlb: Allow range operation for MAX_TLBI_RANGE_PAGES (bsc#1229585)
- arm64: tlb: Fix TLBI RANGE operand (bsc#1229585)
- arm64: tlb: Improve __TLBI_VADDR_RANGE() (bsc#1229585)
- ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object (git-fixes).
- ASoC: meson: axg-card: fix 'use-after-free' (git-fixes).
- ASoc: SOF: topology: Clear SOF link platform name upon unload (git-fixes).
- ASoC: sunxi: sun4i-i2s: fix LRCLK polarity in i2s mode (git-fixes).
- ASoC: tegra: Fix CBB error during probe() (git-fixes).
- ASoC: topology: Properly initialize soc_enum values (stable-fixes).
- ata: libata: Fix memory leak for error path in ata_host_alloc() (git-fixes).
- ata: pata_macio: Use WARN instead of BUG (stable-fixes).
- blk-mq: add helper for checking if one CPU is mapped to specified hctx (bsc#1223600).
- blk-mq: add number of queue calc helper (bsc#1229034).
- blk-mq: Build default queue map via group_cpus_evenly() (bsc#1229031).
- blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600).
- blk-mq: introduce blk_mq_dev_map_queues (bsc#1229034).
- blk-mq: issue warning when offlining hctx with online isolcpus (bsc#1229034).
- blk-mq: use hk cpus only when isolcpus=io_queue is enabled (bsc#1229034).
- Bluetooth: btusb: Fix not handling ZPL/short-transfer (git-fixes).
- Bluetooth: hci_core: Fix sending MGMT_EV_CONNECT_FAILED (git-fixes).
- Bluetooth: hci_sync: Ignore errors from HCI_OP_REMOTE_NAME_REQ_CANCEL (git-fixes).
- Bluetooth: L2CAP: Fix deadlock (git-fixes).
- Bluetooth: MGMT: Ignore keys being loaded with invalid type (git-fixes).
- cachefiles: fix dentry leak in cachefiles_open_file() (bsc#1231181).
- cachefiles: Fix non-taking of sb_writers around set/removexattr (bsc#1231013).
- can: bcm: Clear bo-&gt;bcm_proc_read after remove_proc_entry() (git-fixes).
- can: bcm: Remove proc entry when dev is unregistered (git-fixes).
- can: j1939: use correct function name in comment (git-fixes).
- can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open (git-fixes).
- cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (git-fixes).
- ceph: remove the incorrect Fw reference check when dirtying pages (bsc#1231180).
- char: xillybus: Check USB endpoints when probing device (git-fixes).
- clk: qcom: clk-alpha-pll: Fix the pll post div mask (git-fixes).
- clk: qcom: clk-alpha-pll: Fix the trion pll postdiv set rate API (git-fixes).
- clk: qcom: clk-alpha-pll: Fix zonda set_rate failure when PLL is disabled (git-fixes).
- cpufreq: ti-cpufreq: Introduce quirks to handle syscon fails appropriately (git-fixes).
- crypto: ccp - Properly unregister /dev/sev on sev PLATFORM_STATUS failure (git-fixes).
- crypto: virtio - Handle dataq logic with tasklet (git-fixes).
- crypto: virtio - Wait for tasklet to complete on device remove (git-fixes).
- crypto: xor - fix template benchmarking (git-fixes).
- devres: Initialize an uninitialized struct member (stable-fixes).
- driver core: Add debug logs when fwnode links are added/deleted (git-fixes).
- driver core: Add missing parameter description to __fwnode_link_add() (git-fixes).
- driver core: Create __fwnode_link_del() helper function (git-fixes).
- driver core: fw_devlink: Allow marking a fwnode link as being part of a cycle (git-fixes).
- driver core: fw_devlink: Consolidate device link flag computation (git-fixes).
- driver core: Set deferred probe reason when deferred by driver core (git-fixes).
- drivers:drm:exynos_drm_gsc:Fix wrong assignment in gsc_bind() (git-fixes).
- Drivers: hv: vmbus: Fix rescind handling in uio_hv_generic (git-fixes).
- Drivers: hv: vmbus: Fix the misplaced function description (git-fixes).
- drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error (git-fixes).
- drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error (git-fixes).
- drm/amd/amdgpu: Check tbo resource pointer (stable-fixes).
- drm/amd/amdgpu: Properly tune the size of struct (git-fixes).
- drm/amd/display: Add array index check for hdcp ddc access (stable-fixes).
- drm/amd/display: added NULL check at start of dc_validate_stream (stable-fixes).
- drm/amd/display: Assign linear_pitch_alignment even for VM (stable-fixes).
- drm/amd/display: Check denominator pbn_div before used (stable-fixes).
- drm/amd/display: Check gpio_id before used as array index (stable-fixes).
- drm/amd/display: Check HDCP returned status (stable-fixes).
- drm/amd/display: Check msg_id before processing transcation (stable-fixes).
- drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] (stable-fixes).
- drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX (stable-fixes).
- drm/amd/display: Ensure index calculation will not overflow (stable-fixes).
- drm/amd/display: Fix Coverity INTEGER_OVERFLOW within dal_gpio_service_create (stable-fixes).
- drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration (stable-fixes).
- drm/amd/display: Skip wbscl_set_scaler_filter if filter is null (stable-fixes).
- drm/amd/display: Spinlock before reading event (stable-fixes).
- drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (stable-fixes).
- drm/amdgpu/atomfirmware: Silence UBSAN warning (stable-fixes).
- drm/amdgpu: avoid reading vf2pf info size from FB (stable-fixes).
- drm/amdgpu: check for LINEAR_ALIGNED correctly in check_tiling_flags_gfx6 (stable-fixes).
- drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts (stable-fixes).
- drm/amdgpu: fix a possible null pointer dereference (git-fixes).
- drm/amdgpu: fix dereference after null check (stable-fixes).
- drm/amdgpu: fix mc_data out-of-bounds read warning (stable-fixes).
- drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number (stable-fixes).
- drm/amdgpu: Fix out-of-bounds write warning (stable-fixes).
- drm/amdgpu: fix overflowed array index read warning (stable-fixes).
- drm/amdgpu: Fix smatch static checker warning (stable-fixes).
- drm/amdgpu: fix the waring dereferencing hive (stable-fixes).
- drm/amdgpu: fix ucode out-of-bounds read warning (stable-fixes).
- drm/amdgpu: Fix uninitialized variable warning in amdgpu_afmt_acr (stable-fixes).
- drm/amdgpu/pm: Check input value for CUSTOM profile mode setting on legacy SOCs (stable-fixes).
- drm/amdgpu/pm: Check the return value of smum_send_msg_to_smc (stable-fixes).
- drm/amdgpu/pm: Fix uninitialized variable agc_btc_response (stable-fixes).
- drm/amdgpu/pm: Fix uninitialized variable warning for smu10 (stable-fixes).
- drm/amdgpu: Set no_hw_access when VF request full GPU fails (stable-fixes).
- drm/amdgpu: the warning dereferencing obj for nbio_v7_4 (stable-fixes).
- drm/amdgpu: update type of buf size to u32 for eeprom functions (stable-fixes).
- drm/amdkfd: Reconcile the definition and use of oem_id in struct kfd_topology_device (stable-fixes).
- drm/amd/pm: check negtive return for table entries (stable-fixes).
- drm/amd/pm: check specific index for aldebaran (stable-fixes).
- drm/amd/pm: Fix negative array index read (stable-fixes).
- drm/amd/pm: fix the Out-of-bounds read warning (stable-fixes).
- drm/amd/pm: fix uninitialized variable warning for smu8_hwmgr (stable-fixes).
- drm/amd/pm: fix uninitialized variable warnings for vangogh_ppt (stable-fixes).
- drm/amd/pm: fix uninitialized variable warnings for vega10_hwmgr (stable-fixes).
- drm/amd/pm: fix uninitialized variable warning (stable-fixes).
- drm/amd/pm: fix warning using uninitialized value of max_vid_step (stable-fixes).
- drm/bridge: lontium-lt8912b: Validate mode in drm_bridge_funcs::mode_valid() (git-fixes).
- drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ (stable-fixes).
- drm/i915/fence: Mark debug_fence_free() with __maybe_unused (git-fixes).
- drm/i915/fence: Mark debug_fence_init_onstack() with __maybe_unused (git-fixes).
- drm/i915/guc: prevent a possible int overflow in wq offsets (git-fixes).
- drm/meson: plane: Add error handling (stable-fixes).
- drm/msm/a5xx: disable preemption in submits by default (git-fixes).
- drm/msm/a5xx: fix races in preemption evaluation stage (git-fixes).
- drm/msm/a5xx: properly clear preemption records on resume (git-fixes).
- drm/msm/a5xx: workaround early ring-buffer emptiness check (git-fixes).
- drm/msm/adreno: Fix error return if missing firmware-name (stable-fixes).
- drm/msm/disp/dpu: use atomic enable/disable callbacks for encoder (bsc#1230444)
- drm/msm: Fix incorrect file name output in adreno_request_fw() (git-fixes).
- drm/msm: fix %s null argument error (git-fixes).
- drm: omapdrm: Add missing check for alloc_ordered_workqueue (git-fixes).
- drm/radeon/evergreen_cs: fix int overflow errors in cs track offsets (git-fixes).
- drm/radeon: fix null pointer dereference in radeon_add_common_modes (git-fixes).
- drm/rockchip: dw_hdmi: Fix reading EDID when using a forced mode (git-fixes).
- drm/rockchip: vop: Allow 4096px width scaling (git-fixes).
- drm/stm: ltdc: check memory returned by devm_kzalloc() (git-fixes).
- exfat: fix memory leak in exfat_load_bitmap() (git-fixes).
- fbdev: hpfb: Fix an error handling path in hpfb_dio_probe() (git-fixes).
- filemap: remove use of wait bookmarks (bsc#1224085).
- firmware_loader: Block path traversal (git-fixes).
- fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF (bsc#1230592).
- fuse: update stats for pages in dropped aux writeback list (bsc#1230130).
- fuse: use unsigned type for getxattr/listxattr size truncation (bsc#1230129).
- genirq/affinity: Do not pass irq_affinity_desc array to irq_build_affinity_masks (bsc#1229031).
- genirq/affinity: Move group_cpus_evenly() into lib/ (bsc#1229031).
- genirq/affinity: Only build SMP-only helper functions on SMP kernels (bsc#1229031).
- genirq/affinity: Pass affinity managed mask array to irq_build_affinity_masks (bsc#1229031).
- genirq/affinity: Remove the 'firstvec' parameter from irq_build_affinity_masks (bsc#1229031).
- genirq/affinity: Rename irq_build_affinity_masks as group_cpus_evenly (bsc#1229031).
- genirq/affinity: Replace cpumask_weight() with cpumask_empty() where appropriate (bsc#1229031).
- gfs2: setattr_chown: Add missing initialization (git-fixes).
- HID: amd_sfh: free driver_data after destroying hid device (stable-fixes).
- HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup (stable-fixes).
- hwmon: (adc128d818) Fix underflows seen when writing limit attributes (stable-fixes).
- hwmon: (lm95234) Fix underflows seen when writing limit attributes (stable-fixes).
- hwmon: (max16065) Fix overflows seen when writing limits (git-fixes).
- hwmon: (ntc_thermistor) fix module autoloading (git-fixes).
- hwmon: (w83627ehf) Fix underflows seen when writing limit attributes (stable-fixes).
- hwrng: bcm2835 - Add missing clk_disable_unprepare in bcm2835_rng_init (git-fixes).
- hwrng: cctrng - Add missing clk_disable_unprepare in cctrng_resume (git-fixes).
- hwrng: mtk - Use devm_pm_runtime_enable (git-fixes).
- i2c: aspeed: Update the stop sw state when the bus recovery occurs (git-fixes).
- i2c: Fix conditional for substituting empty ACPI functions (stable-fixes).
- i2c: isch: Add missed 'else' (git-fixes).
- i2c: qcom-geni: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- i2c: Use IS_REACHABLE() for substituting empty ACPI functions (git-fixes).
- i2c: xiic: Wait for TX empty to avoid missed TX NAKs (git-fixes).
- i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup (stable-fixes).
- IB/core: Fix ib_cache_setup_one error flow cleanup (git-fixes)
- IB/hfi1: Fix potential deadlock on &amp;irq_src_lock and &amp;dd-&gt;uctxt_lock (git-fixes)
- iio: adc: ad7124: fix chip ID mismatch (git-fixes).
- iio: adc: ad7124: fix config comparison (git-fixes).
- iio: adc: ad7606: fix oversampling gpio array (git-fixes).
- iio: adc: ad7606: fix standby gpio state to match the documentation (git-fixes).
- iio: buffer-dmaengine: fix releasing dma channel on error (git-fixes).
- iio: chemical: bme680: Fix read/write ops to device by adding mutexes (git-fixes).
- iio: fix scale application in iio_convert_raw_to_processed_unlocked (git-fixes).
- iio: magnetometer: ak8975: Fix reading for ak099xx sensors (git-fixes).
- Input: ilitek_ts_i2c - add report id message validation (git-fixes).
- Input: ilitek_ts_i2c - avoid wrong input subsystem sync (git-fixes).
- Input: ps2-gpio - use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- Input: uinput - reject requests with unreasonable number of slots (stable-fixes).
- ipmi: docs: do not advertise deprecated sysfs entries (git-fixes).
- ipmi:ssif: Improve detecting during probing (bsc#1228771)
- ipmi:ssif: Improve detecting during probing (bsc#1228771) 
- jfs: fix out-of-bounds in dbNextAG() and diAlloc() (git-fixes).
- kabi: add __nf_queue_get_refs() for kabi compliance.
- kABI, crypto: virtio - Handle dataq logic with tasklet (git-fixes).
- kthread: Fix task state in kthread worker if being frozen (bsc#1231146).
- lib/group_cpus.c: avoid acquiring cpu hotplug lock in group_cpus_evenly (bsc#1229031).
- lib/group_cpus.c: honor housekeeping config when grouping CPUs (bsc#1229034).
- lib/group_cpus: Export group_cpus_evenly() (bsc#1229031).
- lirc: rc_dev_get_from_fd(): fix file leak (git-fixes).
- mailbox: bcm2835: Fix timeout during suspend mode (git-fixes).
- mailbox: rockchip: fix a typo in module autoloading (git-fixes).
- media: aspeed: Fix no complete irq for non-64-aligned width (bsc#1230269)
- media: qcom: camss: Add check for v4l2_fwnode_endpoint_parse (stable-fixes).
- media: qcom: camss: Fix ordering of pm_runtime_enable (git-fixes).
- media: Revert 'media: dvb-usb: Fix unexpected infinite loop in dvb_usb_read_remote_control()' (git-fixes).
- media: sun4i_csi: Implement link validate for sun4i_csi subdev (git-fixes).
- media: uapi/linux/cec.h: cec_msg_set_reply_to: zero flags (git-fixes).
- media: uvcvideo: Enforce alignment of frame and interval (stable-fixes).
- media: venus: fix use after free bug in venus_remove due to race condition (git-fixes).
- media: vicodec: allow en/decoder cmd w/o CAPTURE (git-fixes).
- media: vivid: do not set HDMI TX controls if there are no HDMI outputs (stable-fixes).
- media: vivid: fix wrong sizeimage value for mplane (stable-fixes).
- mmc: cqhci: Fix checking of CQHCI_HALT state (git-fixes).
- mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K (git-fixes).
- mmc: sdhci-of-aspeed: fix module autoloading (git-fixes).
- mtd: powernv: Add check devm_kasprintf() returned value (git-fixes).
- mtd: slram: insert break after errors in parsing the map (git-fixes).
- net: drop bad gso csum_start and offset in virtio_net_hdr (git-fixes).
- net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (git-fixes).
- net: missing check virtio (git-fixes).
- net: tighten bad gso csum offset check in virtio_net_hdr (git-fixes).
- nf_conntrack_proto_udp: do not accept packets with IPS_NAT_CLASH (bsc#1199769).
- NFSD: Fix frame size warning in svc_export_parse() (git-fixes).
- NFS: Do not re-read the entire page cache to find the next cookie (bsc#1226662).
- NFSD: Rewrite synopsis of nfsd_percpu_counters_init() (git-fixes).
- NFS: never reuse a NFSv4.0 lock-owner (bsc#1227726).
- NFS: Reduce use of uncached readdir (bsc#1226662).
- NFSv4: Add missing rescheduling points in nfs_client_return_marked_delegations (git-fixes).
- nilfs2: Constify struct kobj_type (git-fixes).
- nilfs2: determine empty node blocks as corrupted (git-fixes).
- nilfs2: fix missing cleanup on rollforward recovery error (git-fixes).
- nilfs2: fix potential null-ptr-deref in nilfs_btree_insert() (git-fixes).
- nilfs2: fix potential oob read in nilfs_btree_check_delete() (git-fixes).
- nilfs2: fix state management in error path of log writing function (git-fixes).
- nilfs2: protect references to superblock parameters exposed in sysfs (git-fixes).
- nilfs2: replace snprintf in show functions with sysfs_emit (git-fixes).
- nilfs2: use default_groups in kobj_type (git-fixes).
- nvme: move stopping keep-alive into nvme_uninit_ctrl() (git-fixes).
- nvme/pci: Add APST quirk for Lenovo N60z laptop (git-fixes).
- nvme-pci: Add sleep quirk for Samsung 990 Evo (git-fixes).
- nvme-pci: use block layer helpers to calculate num of queues (bsc#1229034).
- nvme: replace blk_mq_pci_map_queues with blk_mq_dev_map_queues (bsc#1229034).
- nvmet: Identify-Active Namespace ID List command should reject invalid nsid (git-fixes).
- nvmet-rdma: fix possible bad dereference when freeing rsps (git-fixes).
- nvmet-tcp: do not continue for invalid icreq (git-fixes).
- nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes).
- nvmet-trace: avoid dereferencing pointer too early (git-fixes).
- ocfs2: cancel dqi_sync_work before freeing oinfo (git-fixes).
- ocfs2: fix null-ptr-deref when journal load failed (git-fixes).
- ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes).
- ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes).
- PCI: Add missing bridge lock to pci_bus_lock() (stable-fixes).
- PCI: al: Check IORESOURCE_BUS existence during probe (git-fixes).
- PCI/ASPM: Move pci_function_0() upward (bsc#1226915)
- PCI/ASPM: Remove struct aspm_latency (bsc#1226915)
- PCI/ASPM: Stop caching device L0s, L1 acceptable exit latencies (bsc#1226915)
- PCI/ASPM: Stop caching link L0s, L1 exit latencies (bsc#1226915)
- PCI: dra7xx: Fix error handling when IRQ request fails in probe (git-fixes).
- PCI: dwc: Expose dw_pcie_ep_exit() to module (git-fixes).
- PCI: dwc: Restore MSI Receiver mask during resume (git-fixes).
- pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv (stable-fixes).
- PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) (stable-fixes).
- PCI: keystone: Fix if-statement expression in ks_pcie_quirk() (git-fixes).
- PCI: Support BAR sizes up to 8TB (bsc#1231017)
- PCI: Wait for Link before restoring Downstream Buses (git-fixes).
- PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes).
- PCI: xilinx-nwl: Fix off-by-one in INTx IRQ handler (git-fixes).
- PCI: xilinx-nwl: Fix register misspelling (git-fixes).
- pcmcia: Use resource_size function on resource object (stable-fixes).
- pinctrl: single: fix missing error code in pcs_probe() (git-fixes).
- pinctrl: single: fix potential NULL dereference in pcs_get_function() (git-fixes).
- PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666).
- platform/x86: dell-smbios: Fix error path in dell_smbios_init() (git-fixes).
- platform/x86: panasonic-laptop: Allocate 1 entry extra in the sinf array (git-fixes).
- platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses (git-fixes).
- power: supply: axp20x_battery: Remove design from min and max voltage (git-fixes).
- power: supply: Drop use_cnt check from power_supply_property_is_writeable() (git-fixes).
- power: supply: hwmon: Fix missing temp1_max_alarm attribute (git-fixes).
- power: supply: max17042_battery: Fix SOC threshold calc w/ no current sense (git-fixes).
- RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes)
- RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes)
- RDMA/efa: Properly handle unexpected AQ completions (git-fixes)
- RDMA/hns: Do not modify rq next block addr in HIP09 QPC (git-fixes)
- RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled (git-fixes)
- RDMA/hns: Fix the overflow risk of hem_list_calc_ba_range() (git-fixes)
- RDMA/hns: Fix VF triggering PF reset in abnormal interrupt handler (git-fixes)
- RDMA/hns: Optimize hem allocation performance (git-fixes)
- RDMA/irdma: fix error message in irdma_modify_qp_roce() (git-fixes)
- RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git-fixes)
- RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds (git-fixes)
- RDMA/rtrs: Fix the problem of variable not initialized fully (git-fixes)
- RDMA/rtrs: Reset hb_missed_cnt after receiving other traffic from peer (git-fixes)
- Restore dropped fields for bluetooth MGMT/SMP structs (git-fixes).
- Revert 'Bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE' (git-fixes).
- Revert 'media: tuners: fix error return code of hybrid_tuner_request_state()' (git-fixes).
- Revert 'media: tuners: fix error return code of hybrid_tuner_request_state()' (stable-fixes).
- rtc: at91sam9: fix OF node leak in probe() error path (git-fixes).
- scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223).
- scsi: lpfc: Change diagnostic log flag during receipt of unknown ELS cmds (bsc#1229429).
- scsi: lpfc: Copyright updates for 14.4.0.4 patches (bsc#1229429).
- scsi: lpfc: Fix overflow build issue (bsc#1229429).
- scsi: lpfc: Fix unintentional double clearing of vmid_flag (bsc#1229429).
- scsi: lpfc: Fix unsolicited FLOGI kref imbalance when in direct attached topology (bsc#1229429).
- scsi: lpfc: Remove redundant vport assignment when building an abort request (bsc#1229429).
- scsi: lpfc: Update lpfc version to 14.4.0.4 (bsc#1229429).
- scsi: lpfc: Update PRLO handling in direct attached topology (bsc#1229429).
- scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths (bsc#1229429).
- scsi: pm8001: do not overwrite PCI queue mapping (bsc#1229034).
- scsi: replace blk_mq_pci_map_queues with blk_mq_dev_map_queues (bsc#1229034).
- scsi: sd: Fix off-by-one error in sd_read_block_characteristics() (bsc#1223848).
- scsi: use block layer helpers to calculate num of queues (bsc#1229034).
- spi: nxp-fspi: fix the KASAN report out-of-bounds bug (git-fixes).
- Squashfs: sanity check symbolic link size (git-fixes).
- staging: iio: frequency: ad9834: Validate frequency parameter value (git-fixes).
- thunderbolt: Mark XDomain as unplugged when router is removed (stable-fixes).
- tomoyo: fallback to realpath if symlink's pathname does not exist (git-fixes).
- tools/virtio: fix build (git-fixes).
- tpm: Clean up TPM space after command failure (git-fixes).
- tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes).
- tty: rp2: Fix reset with non forgiving PCIe host bridges (git-fixes).
- udp: fix receiving fraglist GSO packets (git-fixes).
- uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (git-fixes).
- usb: cdnsp: Fix incorrect usb_request status (git-fixes).
- USB: class: CDC-ACM: fix race between get_serial and set_serial (git-fixes).
- usb: dwc2: drd: fix clock gating on USB role switch (git-fixes).
- usb: dwc2: Skip clock gating on Broadcom SoCs (git-fixes).
- usb: dwc3: core: Prevent USB core invalid event buffer address access (git-fixes).
- usb: dwc3: core: Skip setting event buffers for host only controllers (git-fixes).
- usb: dwc3: core: update LC timer as per USB Spec V3.2 (git-fixes).
- usb: dwc3: core: update LC timer as per USB Spec V3.2 (stable-fixes).
- usb: dwc3: omap: add missing depopulate in probe error path (git-fixes).
- usb: dwc3: st: add missing depopulate in probe error path (git-fixes).
- usb: dwc3: st: fix probed platform device ref count on probe error path (git-fixes).
- usbip: Do not submit special requests twice (stable-fixes).
- usbnet: fix cyclical race on disconnect with work queue (git-fixes).
- usbnet: ipheth: race between ipheth_close and error handling (git-fixes).
- usbnet: modern method to get random MAC (git-fixes).
- USB: serial: kobil_sct: restore initial terminal settings (git-fixes).
- USB: serial: option: add MeiG Smart SRM825L (git-fixes).
- usb: typec: ucsi: Fix null pointer dereference in trace (stable-fixes).
- usb: uas: set host status byte on data completion error (git-fixes).
- usb: uas: set host status byte on data completion error (stable-fixes).
- USB: usbtmc: prevent kernel-usb-infoleak (git-fixes).
- usb: xhci: fix loss of data on Cadence xHC (git-fixes).
- vhost: Add smp_rmb() in vhost_vq_avail_empty() (git-fixes).
- vhost-vdpa: switch to use vmf_insert_pfn() in the fault handler (git-fixes).
- virito: add APIs for retrieving vq affinity (bsc#1229034).
- virtio-blk: Ensure no requests in virtqueues before deleting vqs (git-fixes).
- virtio: blk/scsi: use block layer helpers to calculate num of queues (bsc#1229034).
- virtio: blk/scs: replace blk_mq_virtio_map_queues with blk_mq_dev_map_queues (bsc#1229034).
- virtiofs: forbid newlines in tags (bsc#1230591).
- virtio_net: checksum offloading handling fix (git-fixes).
- virtio_net: Fix ''%d' directive writing between 1 and 11 bytes into a region of size 10' warnings (git-fixes).
- virtio_net: use u64_stats_t infra to avoid data-races (git-fixes).
- virtio: reenable config if freezing device failed (git-fixes).
- virtio/vsock: fix logic which reduces credit update messages (git-fixes).
- VMCI: Fix use-after-free when removing resource in vmci_resource_remove() (git-fixes).
- vsock/virtio: add support for device suspend/resume (git-fixes).
- vsock/virtio: factor our the code to initialize and delete VQs (git-fixes).
- vsock/virtio: initialize the_virtio_vsock before using VQs (git-fixes).
- vsock/virtio: remove socket from connected/bound list on shutdown (git-fixes).
- watchdog: imx_sc_wdt: Do not disable WDT in suspend (git-fixes).
- wifi: brcmsmac: advertise MFP_CAPABLE to enable WPA3 (stable-fixes).
- wifi: cfg80211: fix two more possible UBSAN-detected off-by-one errors (git-fixes).
- wifi: cfg80211: fix UBSAN noise in cfg80211_wext_siwscan() (git-fixes).
- wifi: iwlwifi: mvm: increase the time between ranging measurements (git-fixes).
- wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() (git-fixes).
- wifi: mt76: mt7615: check devm_kasprintf() returned value (git-fixes).
- wifi: mt76: mt7915: fix rx filter setting for bfee functionality (git-fixes).
- wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id() (stable-fixes).
- wifi: rtw88: 8822c: Fix reported RX band width (git-fixes).
- wifi: rtw88: always wait for both firmware loading attempts (git-fixes).
- wifi: rtw88: remove CPT execution branch never used (git-fixes).
- wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param (git-fixes).
- x86/hyperv: fix kexec crash due to VP assist page corruption (git-fixes).
- x86/kexec: Add EFI config table identity mapping for kexec kernel (bsc#1220382).
- x86/mm/ident_map: Use gbpages only where full GB page should be mapped (bsc#1220382).
- x86/xen: Convert comma to semicolon (git-fixes).
- xen: add capability to remap non-RAM pages to different PFNs (bsc#1226003).
- xen: allow mapping ACPI data using a different physical address (bsc#1226003).
- xen: introduce generic helper checking for memory map conflicts (bsc#1226003).
- xen: move checks for e820 conflicts further up (bsc#1226003).
- xen: move max_pfn in xen_memory_setup() out of function scope (bsc#1226003).
- xen/swiotlb: add alignment check for dma buffers (bsc#1229928).
- xen/swiotlb: fix allocated size (git-fixes).
- xen: tolerate ACPI NVS memory overlapping with Xen allocated memory (bsc#1226003).
- xen: use correct end address of kernel for conflict checking (bsc#1226003).
- xfs: do not include bnobt blocks when reserving free block pool (git-fixes).
- xhci: Set quirky xHC PCI hosts to D3 _after_ stopping and freeing them (git-fixes).
- xz: cleanup CRC32 edits from 2018 (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-09"/>
	<updated date="2024-10-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199769">SUSE bug 1199769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216223">SUSE bug 1216223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220382">SUSE bug 1220382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221610">SUSE bug 1221610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221650">SUSE bug 1221650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222629">SUSE bug 1222629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222973">SUSE bug 1222973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223600">SUSE bug 1223600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223848">SUSE bug 1223848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224085">SUSE bug 1224085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225903">SUSE bug 1225903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226003">SUSE bug 1226003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226606">SUSE bug 1226606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226662">SUSE bug 1226662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226666">SUSE bug 1226666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226846">SUSE bug 1226846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226860">SUSE bug 1226860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226875">SUSE bug 1226875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226915">SUSE bug 1226915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227487">SUSE bug 1227487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227726">SUSE bug 1227726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227819">SUSE bug 1227819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227832">SUSE bug 1227832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227890">SUSE bug 1227890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228507">SUSE bug 1228507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228576">SUSE bug 1228576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228620">SUSE bug 1228620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228771">SUSE bug 1228771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229031">SUSE bug 1229031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229034">SUSE bug 1229034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229086">SUSE bug 1229086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229156">SUSE bug 1229156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229289">SUSE bug 1229289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229334">SUSE bug 1229334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229362">SUSE bug 1229362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229363">SUSE bug 1229363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229364">SUSE bug 1229364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229394">SUSE bug 1229394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229429">SUSE bug 1229429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229453">SUSE bug 1229453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229572">SUSE bug 1229572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229573">SUSE bug 1229573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229585">SUSE bug 1229585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229607">SUSE bug 1229607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229619">SUSE bug 1229619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229633">SUSE bug 1229633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229662">SUSE bug 1229662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229753">SUSE bug 1229753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229764">SUSE bug 1229764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229790">SUSE bug 1229790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229810">SUSE bug 1229810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229830">SUSE bug 1229830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229899">SUSE bug 1229899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229928">SUSE bug 1229928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229947">SUSE bug 1229947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230015">SUSE bug 1230015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230129">SUSE bug 1230129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230130">SUSE bug 1230130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230170">SUSE bug 1230170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230171">SUSE bug 1230171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230174">SUSE bug 1230174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230175">SUSE bug 1230175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230176">SUSE bug 1230176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230178">SUSE bug 1230178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230180">SUSE bug 1230180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230185">SUSE bug 1230185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230192">SUSE bug 1230192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230193">SUSE bug 1230193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230194">SUSE bug 1230194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230200">SUSE bug 1230200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230204">SUSE bug 1230204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230209">SUSE bug 1230209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230211">SUSE bug 1230211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230212">SUSE bug 1230212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230217">SUSE bug 1230217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230224">SUSE bug 1230224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230230">SUSE bug 1230230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230233">SUSE bug 1230233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230244">SUSE bug 1230244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230245">SUSE bug 1230245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230247">SUSE bug 1230247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230248">SUSE bug 1230248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230269">SUSE bug 1230269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230339">SUSE bug 1230339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230340">SUSE bug 1230340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230392">SUSE bug 1230392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230398">SUSE bug 1230398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230431">SUSE bug 1230431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230433">SUSE bug 1230433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230434">SUSE bug 1230434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230440">SUSE bug 1230440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230442">SUSE bug 1230442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230444">SUSE bug 1230444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230450">SUSE bug 1230450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230451">SUSE bug 1230451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230454">SUSE bug 1230454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230506">SUSE bug 1230506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230507">SUSE bug 1230507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230511">SUSE bug 1230511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230515">SUSE bug 1230515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230517">SUSE bug 1230517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230524">SUSE bug 1230524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230533">SUSE bug 1230533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230535">SUSE bug 1230535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230549">SUSE bug 1230549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230556">SUSE bug 1230556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230582">SUSE bug 1230582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230589">SUSE bug 1230589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230591">SUSE bug 1230591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230592">SUSE bug 1230592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230699">SUSE bug 1230699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230700">SUSE bug 1230700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230701">SUSE bug 1230701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230702">SUSE bug 1230702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230703">SUSE bug 1230703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230705">SUSE bug 1230705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230706">SUSE bug 1230706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230707">SUSE bug 1230707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230709">SUSE bug 1230709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230710">SUSE bug 1230710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230711">SUSE bug 1230711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230712">SUSE bug 1230712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230719">SUSE bug 1230719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230724">SUSE bug 1230724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230725">SUSE bug 1230725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230730">SUSE bug 1230730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230731">SUSE bug 1230731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230732">SUSE bug 1230732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230733">SUSE bug 1230733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230747">SUSE bug 1230747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230748">SUSE bug 1230748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230751">SUSE bug 1230751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230752">SUSE bug 1230752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230756">SUSE bug 1230756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230761">SUSE bug 1230761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230766">SUSE bug 1230766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230767">SUSE bug 1230767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230768">SUSE bug 1230768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230771">SUSE bug 1230771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230772">SUSE bug 1230772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230776">SUSE bug 1230776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230783">SUSE bug 1230783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230786">SUSE bug 1230786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230791">SUSE bug 1230791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230794">SUSE bug 1230794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230796">SUSE bug 1230796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230802">SUSE bug 1230802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230806">SUSE bug 1230806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230808">SUSE bug 1230808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230810">SUSE bug 1230810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230812">SUSE bug 1230812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230813">SUSE bug 1230813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230814">SUSE bug 1230814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230815">SUSE bug 1230815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230821">SUSE bug 1230821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230825">SUSE bug 1230825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230830">SUSE bug 1230830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231013">SUSE bug 1231013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231017">SUSE bug 1231017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231116">SUSE bug 1231116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231120">SUSE bug 1231120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231146">SUSE bug 1231146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231180">SUSE bug 1231180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231181">SUSE bug 1231181</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48901/">CVE-2022-48901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48901">CVE-2022-48901 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48911/">CVE-2022-48911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48911">CVE-2022-48911 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48923/">CVE-2022-48923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48923">CVE-2022-48923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48935/">CVE-2022-48935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48935">CVE-2022-48935 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48944/">CVE-2022-48944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48944">CVE-2022-48944 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48945/">CVE-2022-48945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48945">CVE-2022-48945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52610/">CVE-2023-52610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52610">CVE-2023-52610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52916/">CVE-2023-52916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52916">CVE-2023-52916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26640/">CVE-2024-26640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26640">CVE-2024-26640 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26759/">CVE-2024-26759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26759">CVE-2024-26759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-26767/">CVE-2024-26767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26767">CVE-2024-26767 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26804/">CVE-2024-26804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26804">CVE-2024-26804 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-26837/">CVE-2024-26837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26837">CVE-2024-26837 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-37353/">CVE-2024-37353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37353">CVE-2024-37353 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38538/">CVE-2024-38538 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38538">CVE-2024-38538 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-38596/">CVE-2024-38596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38596">CVE-2024-38596 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38632/">CVE-2024-38632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38632">CVE-2024-38632 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40910/">CVE-2024-40910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40910">CVE-2024-40910 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-40973/">CVE-2024-40973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40973">CVE-2024-40973 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40983/">CVE-2024-40983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40983">CVE-2024-40983 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41062/">CVE-2024-41062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41062">CVE-2024-41062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41082/">CVE-2024-41082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41082">CVE-2024-41082 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42154/">CVE-2024-42154 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42154">CVE-2024-42154 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42259/">CVE-2024-42259 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42259">CVE-2024-42259 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-42265/">CVE-2024-42265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42265">CVE-2024-42265 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42304/">CVE-2024-42304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42304">CVE-2024-42304 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42305/">CVE-2024-42305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42305">CVE-2024-42305 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42306/">CVE-2024-42306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42306">CVE-2024-42306 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43828/">CVE-2024-43828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43828">CVE-2024-43828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43835/">CVE-2024-43835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43835">CVE-2024-43835 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43890/">CVE-2024-43890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43890">CVE-2024-43890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43898/">CVE-2024-43898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43898">CVE-2024-43898 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43912/">CVE-2024-43912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43912">CVE-2024-43912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43914/">CVE-2024-43914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43914">CVE-2024-43914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44935/">CVE-2024-44935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44935">CVE-2024-44935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44944/">CVE-2024-44944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44944">CVE-2024-44944 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-44946/">CVE-2024-44946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44946">CVE-2024-44946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44948/">CVE-2024-44948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-44948">CVE-2024-44948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44950/">CVE-2024-44950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44950">CVE-2024-44950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44952/">CVE-2024-44952 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44952">CVE-2024-44952 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44954/">CVE-2024-44954 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44954">CVE-2024-44954 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-44967/">CVE-2024-44967 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44967">CVE-2024-44967 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44969/">CVE-2024-44969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44969">CVE-2024-44969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44970/">CVE-2024-44970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44970">CVE-2024-44970 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44971/">CVE-2024-44971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44971">CVE-2024-44971 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44972/">CVE-2024-44972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44972">CVE-2024-44972 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44977/">CVE-2024-44977 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44977">CVE-2024-44977 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44982/">CVE-2024-44982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44982">CVE-2024-44982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44986/">CVE-2024-44986 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44986">CVE-2024-44986 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-44987/">CVE-2024-44987 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44987">CVE-2024-44987 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44988/">CVE-2024-44988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44988">CVE-2024-44988 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44989/">CVE-2024-44989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44989">CVE-2024-44989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44990/">CVE-2024-44990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44990">CVE-2024-44990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44998/">CVE-2024-44998 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44998">CVE-2024-44998 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44999/">CVE-2024-44999 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44999">CVE-2024-44999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45000/">CVE-2024-45000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45000">CVE-2024-45000 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45001/">CVE-2024-45001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45001">CVE-2024-45001 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45003/">CVE-2024-45003 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45003">CVE-2024-45003 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45006/">CVE-2024-45006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45006">CVE-2024-45006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45007/">CVE-2024-45007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45007">CVE-2024-45007 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45008/">CVE-2024-45008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45008">CVE-2024-45008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45011/">CVE-2024-45011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45011">CVE-2024-45011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45013/">CVE-2024-45013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45013">CVE-2024-45013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45015/">CVE-2024-45015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45015">CVE-2024-45015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-45018/">CVE-2024-45018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45018">CVE-2024-45018 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45020/">CVE-2024-45020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45020">CVE-2024-45020 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45021/">CVE-2024-45021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45021">CVE-2024-45021 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45026/">CVE-2024-45026 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45026">CVE-2024-45026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45028/">CVE-2024-45028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45028">CVE-2024-45028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45029/">CVE-2024-45029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45029">CVE-2024-45029 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46673/">CVE-2024-46673 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46673">CVE-2024-46673 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46674/">CVE-2024-46674 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46674">CVE-2024-46674 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46675/">CVE-2024-46675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46675">CVE-2024-46675 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.4/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46676/">CVE-2024-46676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46676">CVE-2024-46676 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46677/">CVE-2024-46677 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46677">CVE-2024-46677 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46679/">CVE-2024-46679 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46679">CVE-2024-46679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46685/">CVE-2024-46685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46685">CVE-2024-46685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46686/">CVE-2024-46686 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46686">CVE-2024-46686 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46689/">CVE-2024-46689 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46689">CVE-2024-46689 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46694/">CVE-2024-46694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46694">CVE-2024-46694 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46702/">CVE-2024-46702 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46702">CVE-2024-46702 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46707/">CVE-2024-46707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46707">CVE-2024-46707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46714/">CVE-2024-46714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46714">CVE-2024-46714 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46715/">CVE-2024-46715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46715">CVE-2024-46715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46717/">CVE-2024-46717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46717">CVE-2024-46717 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46720/">CVE-2024-46720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46720">CVE-2024-46720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46721/">CVE-2024-46721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46721">CVE-2024-46721 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46722/">CVE-2024-46722 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46722">CVE-2024-46722 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46723/">CVE-2024-46723 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46723">CVE-2024-46723 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46724/">CVE-2024-46724 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46724">CVE-2024-46724 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46725/">CVE-2024-46725 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46725">CVE-2024-46725 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46726/">CVE-2024-46726 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46726">CVE-2024-46726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46727/">CVE-2024-46727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46727">CVE-2024-46727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46728/">CVE-2024-46728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46728">CVE-2024-46728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46730/">CVE-2024-46730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46730">CVE-2024-46730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46731/">CVE-2024-46731 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46731">CVE-2024-46731 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46732/">CVE-2024-46732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46732">CVE-2024-46732 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46737/">CVE-2024-46737 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46737">CVE-2024-46737 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46738/">CVE-2024-46738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46738">CVE-2024-46738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46739/">CVE-2024-46739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46739">CVE-2024-46739 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46743/">CVE-2024-46743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46743">CVE-2024-46743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46744/">CVE-2024-46744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46744">CVE-2024-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46745/">CVE-2024-46745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46745">CVE-2024-46745 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46746/">CVE-2024-46746 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46746">CVE-2024-46746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46747/">CVE-2024-46747 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46747">CVE-2024-46747 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46750/">CVE-2024-46750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46750">CVE-2024-46750 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46751/">CVE-2024-46751 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46751">CVE-2024-46751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46752/">CVE-2024-46752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46752">CVE-2024-46752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46753/">CVE-2024-46753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46753">CVE-2024-46753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46755/">CVE-2024-46755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46755">CVE-2024-46755 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46756/">CVE-2024-46756 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46756">CVE-2024-46756 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46758/">CVE-2024-46758 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46758">CVE-2024-46758 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46759/">CVE-2024-46759 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46759">CVE-2024-46759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46761/">CVE-2024-46761 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46761">CVE-2024-46761 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46771/">CVE-2024-46771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46771">CVE-2024-46771 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46772/">CVE-2024-46772 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46772">CVE-2024-46772 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46773/">CVE-2024-46773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46773">CVE-2024-46773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46774/">CVE-2024-46774 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46774">CVE-2024-46774 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46778/">CVE-2024-46778 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46778">CVE-2024-46778 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46780/">CVE-2024-46780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46780">CVE-2024-46780 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46781/">CVE-2024-46781 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46781">CVE-2024-46781 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46783/">CVE-2024-46783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46783">CVE-2024-46783 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46784/">CVE-2024-46784 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46784">CVE-2024-46784 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46786/">CVE-2024-46786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46786">CVE-2024-46786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46787/">CVE-2024-46787 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46787">CVE-2024-46787 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46791/">CVE-2024-46791 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46791">CVE-2024-46791 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46794/">CVE-2024-46794 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46794">CVE-2024-46794 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46798/">CVE-2024-46798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46798">CVE-2024-46798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46822/">CVE-2024-46822 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46822">CVE-2024-46822 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46830/">CVE-2024-46830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46830">CVE-2024-46830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009946153" comment="cluster-md-kmp-64kb-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946154" comment="cluster-md-kmp-default-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946155" comment="dlm-kmp-64kb-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946156" comment="dlm-kmp-default-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946157" comment="dtb-allwinner-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946158" comment="dtb-altera-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946159" comment="dtb-amazon-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946160" comment="dtb-amd-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946161" comment="dtb-amlogic-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946162" comment="dtb-apm-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946163" comment="dtb-apple-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946164" comment="dtb-arm-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946165" comment="dtb-broadcom-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946166" comment="dtb-cavium-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946167" comment="dtb-exynos-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946168" comment="dtb-freescale-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946169" comment="dtb-hisilicon-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946170" comment="dtb-lg-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946171" comment="dtb-marvell-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946172" comment="dtb-mediatek-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946173" comment="dtb-nvidia-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946174" comment="dtb-qcom-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946175" comment="dtb-renesas-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946176" comment="dtb-rockchip-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946177" comment="dtb-socionext-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946178" comment="dtb-sprd-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946179" comment="dtb-xilinx-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946180" comment="gfs2-kmp-64kb-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946181" comment="gfs2-kmp-default-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946182" comment="kernel-64kb-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946183" comment="kernel-64kb-devel-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946184" comment="kernel-64kb-extra-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946185" comment="kernel-64kb-livepatch-devel-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946186" comment="kernel-64kb-optional-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946187" comment="kernel-debug-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946188" comment="kernel-debug-devel-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946189" comment="kernel-debug-livepatch-devel-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946190" comment="kernel-debug-vdso-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946191" comment="kernel-default-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946192" comment="kernel-default-base-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946193" comment="kernel-default-base-rebuild-5.14.21-150500.55.83.1.150500.6.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946194" comment="kernel-default-devel-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946195" comment="kernel-default-extra-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946196" comment="kernel-default-livepatch-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946197" comment="kernel-default-livepatch-devel-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946198" comment="kernel-default-optional-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946199" comment="kernel-default-vdso-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946200" comment="kernel-devel-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946201" comment="kernel-docs-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946202" comment="kernel-docs-html-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946203" comment="kernel-kvmsmall-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946204" comment="kernel-kvmsmall-devel-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946205" comment="kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946206" comment="kernel-kvmsmall-vdso-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946207" comment="kernel-macros-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946208" comment="kernel-obs-build-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946209" comment="kernel-obs-qa-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946210" comment="kernel-source-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946211" comment="kernel-source-vanilla-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946212" comment="kernel-syms-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946213" comment="kernel-zfcpdump-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946214" comment="kselftests-kmp-64kb-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946215" comment="kselftests-kmp-default-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946216" comment="ocfs2-kmp-64kb-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946217" comment="ocfs2-kmp-default-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946218" comment="reiserfs-kmp-64kb-5.14.21-150500.55.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946219" comment="reiserfs-kmp-default-5.14.21-150500.55.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5026" version="1" class="patch">
	<metadata>
		<title>Security update for redis (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231264" ref_url="https://bugzilla.suse.com/1231264" source="BUGZILLA"/>
		<reference ref_id="1231265" ref_url="https://bugzilla.suse.com/1231265" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-31228" ref_url="https://www.suse.com/security/cve/CVE-2024-31228/" source="CVE"/>
		<reference ref_id="CVE-2024-31449" ref_url="https://www.suse.com/security/cve/CVE-2024-31449/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019582.html" source="SUSE-SU"/>
		<description>
This update for redis fixes the following issues:

- CVE-2024-31228: Fixed unbounded recursive pattern matching (bsc#1231265)
- CVE-2024-31449: Fixed integer overflow bug in Lua bit_tohex (bsc#1231264)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-09"/>
	<updated date="2024-10-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1231264">SUSE bug 1231264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231265">SUSE bug 1231265</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31228/">CVE-2024-31228 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31228">CVE-2024-31228 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31449/">CVE-2024-31449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31449">CVE-2024-31449 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946220" comment="redis-6.2.6-150400.3.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5027" version="1" class="patch">
	<metadata>
		<title>Security update for libreoffice (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1047218" ref_url="https://bugzilla.suse.com/1047218" source="BUGZILLA"/>
		<reference ref_id="1225597" ref_url="https://bugzilla.suse.com/1225597" source="BUGZILLA"/>
		<reference ref_id="1226975" ref_url="https://bugzilla.suse.com/1226975" source="BUGZILLA"/>
		<reference ref_id="1229589" ref_url="https://bugzilla.suse.com/1229589" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-5261" ref_url="https://www.suse.com/security/cve/CVE-2024-5261/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3577-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037199.html" source="SUSE-SU"/>
		<description>
This update for libreofficefixes the following issues:

libreoffice was updated to version 24.8.1.2 (jsc#PED-10362):

- Release notes:
  
  * https://wiki.documentfoundation.org/Releases/24.8.0/RC1 and
  * https://wiki.documentfoundation.org/Releases/24.8.0/RC2 and
  * https://wiki.documentfoundation.org/Releases/24.8.0/RC3

- Security issues fixed:

  * CVE-2024-526: Fixed TLS certificates are not properly verified when utilizing LibreOfficeKit (bsc#1226975)

- Other bugs fixed:

  * Use system curl instead of the bundled one on systems greater than or equal to SLE15 (bsc#1229589)
  * Use the new clucene function, which makes index files reproducible (bsc#1047218)
  * Support firebird database with new package `libreoffice-base-drivers-firebird` in Package Hub and
    openSUSE Leap (bsc#1225597)
  
- Update bundled dependencies:

  * Java-Websocket updated from 1.5.4 to 1.5.6
  * boost updated from 1.82.0 to 1.85.0
  * curl updated from 8.7.1 to 8.9.1
  * fontconfig updated from 2.14.2 to 2.15.0
  * freetype updated from 2.13.0 to 2.13.2
  * harfbuzz updated from 8.2.2 to 8.5.0
  * icu4c-data updated from 73.2 to 74.2
  * icu4c-src updated from 73.2 to 74.2
  * libassuan updated from 2.5.7 to 3.0.1
  * libcmis updated from 0.6.1 to 0.6.2
  * libgpg-error updated from 1.48 to 1.50
  * pdfium updated from 6179 to 6425
  * poppler updated from 23.09.0 to 24.08.0
  * tiff updated from 4.6.0 to 4.6.0t
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1047218">SUSE bug 1047218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225597">SUSE bug 1225597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226975">SUSE bug 1226975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229589">SUSE bug 1229589</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-5261/">CVE-2024-5261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5261">CVE-2024-5261 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009946472" comment="libreoffice-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946473" comment="libreoffice-base-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946474" comment="libreoffice-base-drivers-firebird-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946475" comment="libreoffice-base-drivers-postgresql-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946476" comment="libreoffice-branding-upstream-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946477" comment="libreoffice-calc-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946478" comment="libreoffice-calc-extensions-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946479" comment="libreoffice-draw-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946480" comment="libreoffice-filters-optional-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946481" comment="libreoffice-gdb-pretty-printers-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946482" comment="libreoffice-glade-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946483" comment="libreoffice-gnome-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946484" comment="libreoffice-gtk3-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946485" comment="libreoffice-icon-themes-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946486" comment="libreoffice-impress-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946487" comment="libreoffice-l10n-af-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946488" comment="libreoffice-l10n-am-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946489" comment="libreoffice-l10n-ar-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946490" comment="libreoffice-l10n-as-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946491" comment="libreoffice-l10n-ast-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946492" comment="libreoffice-l10n-be-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946493" comment="libreoffice-l10n-bg-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946494" comment="libreoffice-l10n-bn-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946495" comment="libreoffice-l10n-bn_IN-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946496" comment="libreoffice-l10n-bo-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946497" comment="libreoffice-l10n-br-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946498" comment="libreoffice-l10n-brx-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946499" comment="libreoffice-l10n-bs-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946500" comment="libreoffice-l10n-ca-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946501" comment="libreoffice-l10n-ca_valencia-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946502" comment="libreoffice-l10n-ckb-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946503" comment="libreoffice-l10n-cs-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946504" comment="libreoffice-l10n-cy-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946505" comment="libreoffice-l10n-da-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946506" comment="libreoffice-l10n-de-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946507" comment="libreoffice-l10n-dgo-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946508" comment="libreoffice-l10n-dsb-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946509" comment="libreoffice-l10n-dz-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946510" comment="libreoffice-l10n-el-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946511" comment="libreoffice-l10n-en-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946512" comment="libreoffice-l10n-en_GB-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946513" comment="libreoffice-l10n-en_ZA-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946514" comment="libreoffice-l10n-eo-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946515" comment="libreoffice-l10n-es-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946516" comment="libreoffice-l10n-et-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946517" comment="libreoffice-l10n-eu-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946518" comment="libreoffice-l10n-fa-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946519" comment="libreoffice-l10n-fi-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946520" comment="libreoffice-l10n-fr-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946521" comment="libreoffice-l10n-fur-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946522" comment="libreoffice-l10n-fy-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946523" comment="libreoffice-l10n-ga-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946524" comment="libreoffice-l10n-gd-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946525" comment="libreoffice-l10n-gl-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946526" comment="libreoffice-l10n-gu-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946527" comment="libreoffice-l10n-gug-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946528" comment="libreoffice-l10n-he-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946529" comment="libreoffice-l10n-hi-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946530" comment="libreoffice-l10n-hr-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946531" comment="libreoffice-l10n-hsb-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946532" comment="libreoffice-l10n-hu-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946533" comment="libreoffice-l10n-id-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946534" comment="libreoffice-l10n-is-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946535" comment="libreoffice-l10n-it-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946536" comment="libreoffice-l10n-ja-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946537" comment="libreoffice-l10n-ka-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946538" comment="libreoffice-l10n-kab-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946539" comment="libreoffice-l10n-kk-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946540" comment="libreoffice-l10n-km-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946541" comment="libreoffice-l10n-kmr_Latn-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946542" comment="libreoffice-l10n-kn-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946543" comment="libreoffice-l10n-ko-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946544" comment="libreoffice-l10n-kok-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946545" comment="libreoffice-l10n-ks-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946546" comment="libreoffice-l10n-lb-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946547" comment="libreoffice-l10n-lo-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946548" comment="libreoffice-l10n-lt-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946549" comment="libreoffice-l10n-lv-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946550" comment="libreoffice-l10n-mai-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946551" comment="libreoffice-l10n-mk-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946552" comment="libreoffice-l10n-ml-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946553" comment="libreoffice-l10n-mn-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946554" comment="libreoffice-l10n-mni-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946555" comment="libreoffice-l10n-mr-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946556" comment="libreoffice-l10n-my-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946557" comment="libreoffice-l10n-nb-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946558" comment="libreoffice-l10n-ne-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946559" comment="libreoffice-l10n-nl-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946560" comment="libreoffice-l10n-nn-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946561" comment="libreoffice-l10n-nr-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946562" comment="libreoffice-l10n-nso-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946563" comment="libreoffice-l10n-oc-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946564" comment="libreoffice-l10n-om-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946565" comment="libreoffice-l10n-or-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946566" comment="libreoffice-l10n-pa-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946567" comment="libreoffice-l10n-pl-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946568" comment="libreoffice-l10n-pt_BR-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946569" comment="libreoffice-l10n-pt_PT-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946570" comment="libreoffice-l10n-ro-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946571" comment="libreoffice-l10n-ru-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946572" comment="libreoffice-l10n-rw-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946573" comment="libreoffice-l10n-sa_IN-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946574" comment="libreoffice-l10n-sat-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946575" comment="libreoffice-l10n-sd-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946576" comment="libreoffice-l10n-si-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946577" comment="libreoffice-l10n-sid-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946578" comment="libreoffice-l10n-sk-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946579" comment="libreoffice-l10n-sl-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946580" comment="libreoffice-l10n-sq-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946581" comment="libreoffice-l10n-sr-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946582" comment="libreoffice-l10n-ss-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946583" comment="libreoffice-l10n-st-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946584" comment="libreoffice-l10n-sv-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946585" comment="libreoffice-l10n-sw_TZ-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946586" comment="libreoffice-l10n-szl-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946587" comment="libreoffice-l10n-ta-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946588" comment="libreoffice-l10n-te-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946589" comment="libreoffice-l10n-tg-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946590" comment="libreoffice-l10n-th-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946591" comment="libreoffice-l10n-tn-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946592" comment="libreoffice-l10n-tr-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946593" comment="libreoffice-l10n-ts-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946594" comment="libreoffice-l10n-tt-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946595" comment="libreoffice-l10n-ug-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946596" comment="libreoffice-l10n-uk-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946597" comment="libreoffice-l10n-uz-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946598" comment="libreoffice-l10n-ve-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946599" comment="libreoffice-l10n-vec-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946600" comment="libreoffice-l10n-vi-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946601" comment="libreoffice-l10n-xh-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946602" comment="libreoffice-l10n-zh_CN-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946603" comment="libreoffice-l10n-zh_TW-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946604" comment="libreoffice-l10n-zu-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946605" comment="libreoffice-librelogo-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946606" comment="libreoffice-mailmerge-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946607" comment="libreoffice-math-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946608" comment="libreoffice-officebean-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946609" comment="libreoffice-pyuno-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946610" comment="libreoffice-qt5-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946611" comment="libreoffice-sdk-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946612" comment="libreoffice-sdk-doc-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946613" comment="libreoffice-writer-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946614" comment="libreoffice-writer-extensions-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946615" comment="libreofficekit-24.8.1.2-150500.20.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946616" comment="libreofficekit-devel-24.8.1.2-150500.20.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5028" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1054914" ref_url="https://bugzilla.suse.com/1054914" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1199769" ref_url="https://bugzilla.suse.com/1199769" source="BUGZILLA"/>
		<reference ref_id="1216223" ref_url="https://bugzilla.suse.com/1216223" source="BUGZILLA"/>
		<reference ref_id="1220382" ref_url="https://bugzilla.suse.com/1220382" source="BUGZILLA"/>
		<reference ref_id="1221610" ref_url="https://bugzilla.suse.com/1221610" source="BUGZILLA"/>
		<reference ref_id="1221650" ref_url="https://bugzilla.suse.com/1221650" source="BUGZILLA"/>
		<reference ref_id="1222629" ref_url="https://bugzilla.suse.com/1222629" source="BUGZILLA"/>
		<reference ref_id="1222973" ref_url="https://bugzilla.suse.com/1222973" source="BUGZILLA"/>
		<reference ref_id="1223600" ref_url="https://bugzilla.suse.com/1223600" source="BUGZILLA"/>
		<reference ref_id="1223848" ref_url="https://bugzilla.suse.com/1223848" source="BUGZILLA"/>
		<reference ref_id="1224085" ref_url="https://bugzilla.suse.com/1224085" source="BUGZILLA"/>
		<reference ref_id="1225903" ref_url="https://bugzilla.suse.com/1225903" source="BUGZILLA"/>
		<reference ref_id="1226003" ref_url="https://bugzilla.suse.com/1226003" source="BUGZILLA"/>
		<reference ref_id="1226606" ref_url="https://bugzilla.suse.com/1226606" source="BUGZILLA"/>
		<reference ref_id="1226631" ref_url="https://bugzilla.suse.com/1226631" source="BUGZILLA"/>
		<reference ref_id="1226662" ref_url="https://bugzilla.suse.com/1226662" source="BUGZILLA"/>
		<reference ref_id="1226666" ref_url="https://bugzilla.suse.com/1226666" source="BUGZILLA"/>
		<reference ref_id="1226846" ref_url="https://bugzilla.suse.com/1226846" source="BUGZILLA"/>
		<reference ref_id="1226860" ref_url="https://bugzilla.suse.com/1226860" source="BUGZILLA"/>
		<reference ref_id="1226875" ref_url="https://bugzilla.suse.com/1226875" source="BUGZILLA"/>
		<reference ref_id="1226915" ref_url="https://bugzilla.suse.com/1226915" source="BUGZILLA"/>
		<reference ref_id="1227487" ref_url="https://bugzilla.suse.com/1227487" source="BUGZILLA"/>
		<reference ref_id="1227726" ref_url="https://bugzilla.suse.com/1227726" source="BUGZILLA"/>
		<reference ref_id="1227819" ref_url="https://bugzilla.suse.com/1227819" source="BUGZILLA"/>
		<reference ref_id="1227832" ref_url="https://bugzilla.suse.com/1227832" source="BUGZILLA"/>
		<reference ref_id="1227890" ref_url="https://bugzilla.suse.com/1227890" source="BUGZILLA"/>
		<reference ref_id="1228507" ref_url="https://bugzilla.suse.com/1228507" source="BUGZILLA"/>
		<reference ref_id="1228576" ref_url="https://bugzilla.suse.com/1228576" source="BUGZILLA"/>
		<reference ref_id="1228620" ref_url="https://bugzilla.suse.com/1228620" source="BUGZILLA"/>
		<reference ref_id="1228747" ref_url="https://bugzilla.suse.com/1228747" source="BUGZILLA"/>
		<reference ref_id="1228771" ref_url="https://bugzilla.suse.com/1228771" source="BUGZILLA"/>
		<reference ref_id="1229031" ref_url="https://bugzilla.suse.com/1229031" source="BUGZILLA"/>
		<reference ref_id="1229034" ref_url="https://bugzilla.suse.com/1229034" source="BUGZILLA"/>
		<reference ref_id="1229086" ref_url="https://bugzilla.suse.com/1229086" source="BUGZILLA"/>
		<reference ref_id="1229156" ref_url="https://bugzilla.suse.com/1229156" source="BUGZILLA"/>
		<reference ref_id="1229334" ref_url="https://bugzilla.suse.com/1229334" source="BUGZILLA"/>
		<reference ref_id="1229362" ref_url="https://bugzilla.suse.com/1229362" source="BUGZILLA"/>
		<reference ref_id="1229363" ref_url="https://bugzilla.suse.com/1229363" source="BUGZILLA"/>
		<reference ref_id="1229364" ref_url="https://bugzilla.suse.com/1229364" source="BUGZILLA"/>
		<reference ref_id="1229394" ref_url="https://bugzilla.suse.com/1229394" source="BUGZILLA"/>
		<reference ref_id="1229429" ref_url="https://bugzilla.suse.com/1229429" source="BUGZILLA"/>
		<reference ref_id="1229453" ref_url="https://bugzilla.suse.com/1229453" source="BUGZILLA"/>
		<reference ref_id="1229572" ref_url="https://bugzilla.suse.com/1229572" source="BUGZILLA"/>
		<reference ref_id="1229573" ref_url="https://bugzilla.suse.com/1229573" source="BUGZILLA"/>
		<reference ref_id="1229585" ref_url="https://bugzilla.suse.com/1229585" source="BUGZILLA"/>
		<reference ref_id="1229607" ref_url="https://bugzilla.suse.com/1229607" source="BUGZILLA"/>
		<reference ref_id="1229619" ref_url="https://bugzilla.suse.com/1229619" source="BUGZILLA"/>
		<reference ref_id="1229633" ref_url="https://bugzilla.suse.com/1229633" source="BUGZILLA"/>
		<reference ref_id="1229662" ref_url="https://bugzilla.suse.com/1229662" source="BUGZILLA"/>
		<reference ref_id="1229753" ref_url="https://bugzilla.suse.com/1229753" source="BUGZILLA"/>
		<reference ref_id="1229764" ref_url="https://bugzilla.suse.com/1229764" source="BUGZILLA"/>
		<reference ref_id="1229790" ref_url="https://bugzilla.suse.com/1229790" source="BUGZILLA"/>
		<reference ref_id="1229810" ref_url="https://bugzilla.suse.com/1229810" source="BUGZILLA"/>
		<reference ref_id="1229830" ref_url="https://bugzilla.suse.com/1229830" source="BUGZILLA"/>
		<reference ref_id="1229891" ref_url="https://bugzilla.suse.com/1229891" source="BUGZILLA"/>
		<reference ref_id="1229899" ref_url="https://bugzilla.suse.com/1229899" source="BUGZILLA"/>
		<reference ref_id="1229928" ref_url="https://bugzilla.suse.com/1229928" source="BUGZILLA"/>
		<reference ref_id="1229947" ref_url="https://bugzilla.suse.com/1229947" source="BUGZILLA"/>
		<reference ref_id="1230015" ref_url="https://bugzilla.suse.com/1230015" source="BUGZILLA"/>
		<reference ref_id="1230055" ref_url="https://bugzilla.suse.com/1230055" source="BUGZILLA"/>
		<reference ref_id="1230129" ref_url="https://bugzilla.suse.com/1230129" source="BUGZILLA"/>
		<reference ref_id="1230130" ref_url="https://bugzilla.suse.com/1230130" source="BUGZILLA"/>
		<reference ref_id="1230170" ref_url="https://bugzilla.suse.com/1230170" source="BUGZILLA"/>
		<reference ref_id="1230171" ref_url="https://bugzilla.suse.com/1230171" source="BUGZILLA"/>
		<reference ref_id="1230174" ref_url="https://bugzilla.suse.com/1230174" source="BUGZILLA"/>
		<reference ref_id="1230175" ref_url="https://bugzilla.suse.com/1230175" source="BUGZILLA"/>
		<reference ref_id="1230176" ref_url="https://bugzilla.suse.com/1230176" source="BUGZILLA"/>
		<reference ref_id="1230178" ref_url="https://bugzilla.suse.com/1230178" source="BUGZILLA"/>
		<reference ref_id="1230180" ref_url="https://bugzilla.suse.com/1230180" source="BUGZILLA"/>
		<reference ref_id="1230185" ref_url="https://bugzilla.suse.com/1230185" source="BUGZILLA"/>
		<reference ref_id="1230192" ref_url="https://bugzilla.suse.com/1230192" source="BUGZILLA"/>
		<reference ref_id="1230193" ref_url="https://bugzilla.suse.com/1230193" source="BUGZILLA"/>
		<reference ref_id="1230194" ref_url="https://bugzilla.suse.com/1230194" source="BUGZILLA"/>
		<reference ref_id="1230200" ref_url="https://bugzilla.suse.com/1230200" source="BUGZILLA"/>
		<reference ref_id="1230204" ref_url="https://bugzilla.suse.com/1230204" source="BUGZILLA"/>
		<reference ref_id="1230209" ref_url="https://bugzilla.suse.com/1230209" source="BUGZILLA"/>
		<reference ref_id="1230211" ref_url="https://bugzilla.suse.com/1230211" source="BUGZILLA"/>
		<reference ref_id="1230217" ref_url="https://bugzilla.suse.com/1230217" source="BUGZILLA"/>
		<reference ref_id="1230224" ref_url="https://bugzilla.suse.com/1230224" source="BUGZILLA"/>
		<reference ref_id="1230230" ref_url="https://bugzilla.suse.com/1230230" source="BUGZILLA"/>
		<reference ref_id="1230233" ref_url="https://bugzilla.suse.com/1230233" source="BUGZILLA"/>
		<reference ref_id="1230244" ref_url="https://bugzilla.suse.com/1230244" source="BUGZILLA"/>
		<reference ref_id="1230245" ref_url="https://bugzilla.suse.com/1230245" source="BUGZILLA"/>
		<reference ref_id="1230247" ref_url="https://bugzilla.suse.com/1230247" source="BUGZILLA"/>
		<reference ref_id="1230248" ref_url="https://bugzilla.suse.com/1230248" source="BUGZILLA"/>
		<reference ref_id="1230269" ref_url="https://bugzilla.suse.com/1230269" source="BUGZILLA"/>
		<reference ref_id="1230289" ref_url="https://bugzilla.suse.com/1230289" source="BUGZILLA"/>
		<reference ref_id="1230339" ref_url="https://bugzilla.suse.com/1230339" source="BUGZILLA"/>
		<reference ref_id="1230340" ref_url="https://bugzilla.suse.com/1230340" source="BUGZILLA"/>
		<reference ref_id="1230392" ref_url="https://bugzilla.suse.com/1230392" source="BUGZILLA"/>
		<reference ref_id="1230398" ref_url="https://bugzilla.suse.com/1230398" source="BUGZILLA"/>
		<reference ref_id="1230431" ref_url="https://bugzilla.suse.com/1230431" source="BUGZILLA"/>
		<reference ref_id="1230433" ref_url="https://bugzilla.suse.com/1230433" source="BUGZILLA"/>
		<reference ref_id="1230434" ref_url="https://bugzilla.suse.com/1230434" source="BUGZILLA"/>
		<reference ref_id="1230440" ref_url="https://bugzilla.suse.com/1230440" source="BUGZILLA"/>
		<reference ref_id="1230442" ref_url="https://bugzilla.suse.com/1230442" source="BUGZILLA"/>
		<reference ref_id="1230444" ref_url="https://bugzilla.suse.com/1230444" source="BUGZILLA"/>
		<reference ref_id="1230450" ref_url="https://bugzilla.suse.com/1230450" source="BUGZILLA"/>
		<reference ref_id="1230451" ref_url="https://bugzilla.suse.com/1230451" source="BUGZILLA"/>
		<reference ref_id="1230454" ref_url="https://bugzilla.suse.com/1230454" source="BUGZILLA"/>
		<reference ref_id="1230506" ref_url="https://bugzilla.suse.com/1230506" source="BUGZILLA"/>
		<reference ref_id="1230507" ref_url="https://bugzilla.suse.com/1230507" source="BUGZILLA"/>
		<reference ref_id="1230511" ref_url="https://bugzilla.suse.com/1230511" source="BUGZILLA"/>
		<reference ref_id="1230515" ref_url="https://bugzilla.suse.com/1230515" source="BUGZILLA"/>
		<reference ref_id="1230517" ref_url="https://bugzilla.suse.com/1230517" source="BUGZILLA"/>
		<reference ref_id="1230524" ref_url="https://bugzilla.suse.com/1230524" source="BUGZILLA"/>
		<reference ref_id="1230533" ref_url="https://bugzilla.suse.com/1230533" source="BUGZILLA"/>
		<reference ref_id="1230535" ref_url="https://bugzilla.suse.com/1230535" source="BUGZILLA"/>
		<reference ref_id="1230549" ref_url="https://bugzilla.suse.com/1230549" source="BUGZILLA"/>
		<reference ref_id="1230550" ref_url="https://bugzilla.suse.com/1230550" source="BUGZILLA"/>
		<reference ref_id="1230556" ref_url="https://bugzilla.suse.com/1230556" source="BUGZILLA"/>
		<reference ref_id="1230582" ref_url="https://bugzilla.suse.com/1230582" source="BUGZILLA"/>
		<reference ref_id="1230589" ref_url="https://bugzilla.suse.com/1230589" source="BUGZILLA"/>
		<reference ref_id="1230591" ref_url="https://bugzilla.suse.com/1230591" source="BUGZILLA"/>
		<reference ref_id="1230592" ref_url="https://bugzilla.suse.com/1230592" source="BUGZILLA"/>
		<reference ref_id="1230699" ref_url="https://bugzilla.suse.com/1230699" source="BUGZILLA"/>
		<reference ref_id="1230700" ref_url="https://bugzilla.suse.com/1230700" source="BUGZILLA"/>
		<reference ref_id="1230701" ref_url="https://bugzilla.suse.com/1230701" source="BUGZILLA"/>
		<reference ref_id="1230702" ref_url="https://bugzilla.suse.com/1230702" source="BUGZILLA"/>
		<reference ref_id="1230703" ref_url="https://bugzilla.suse.com/1230703" source="BUGZILLA"/>
		<reference ref_id="1230705" ref_url="https://bugzilla.suse.com/1230705" source="BUGZILLA"/>
		<reference ref_id="1230706" ref_url="https://bugzilla.suse.com/1230706" source="BUGZILLA"/>
		<reference ref_id="1230709" ref_url="https://bugzilla.suse.com/1230709" source="BUGZILLA"/>
		<reference ref_id="1230710" ref_url="https://bugzilla.suse.com/1230710" source="BUGZILLA"/>
		<reference ref_id="1230711" ref_url="https://bugzilla.suse.com/1230711" source="BUGZILLA"/>
		<reference ref_id="1230712" ref_url="https://bugzilla.suse.com/1230712" source="BUGZILLA"/>
		<reference ref_id="1230719" ref_url="https://bugzilla.suse.com/1230719" source="BUGZILLA"/>
		<reference ref_id="1230724" ref_url="https://bugzilla.suse.com/1230724" source="BUGZILLA"/>
		<reference ref_id="1230725" ref_url="https://bugzilla.suse.com/1230725" source="BUGZILLA"/>
		<reference ref_id="1230730" ref_url="https://bugzilla.suse.com/1230730" source="BUGZILLA"/>
		<reference ref_id="1230731" ref_url="https://bugzilla.suse.com/1230731" source="BUGZILLA"/>
		<reference ref_id="1230732" ref_url="https://bugzilla.suse.com/1230732" source="BUGZILLA"/>
		<reference ref_id="1230733" ref_url="https://bugzilla.suse.com/1230733" source="BUGZILLA"/>
		<reference ref_id="1230747" ref_url="https://bugzilla.suse.com/1230747" source="BUGZILLA"/>
		<reference ref_id="1230748" ref_url="https://bugzilla.suse.com/1230748" source="BUGZILLA"/>
		<reference ref_id="1230751" ref_url="https://bugzilla.suse.com/1230751" source="BUGZILLA"/>
		<reference ref_id="1230752" ref_url="https://bugzilla.suse.com/1230752" source="BUGZILLA"/>
		<reference ref_id="1230756" ref_url="https://bugzilla.suse.com/1230756" source="BUGZILLA"/>
		<reference ref_id="1230761" ref_url="https://bugzilla.suse.com/1230761" source="BUGZILLA"/>
		<reference ref_id="1230763" ref_url="https://bugzilla.suse.com/1230763" source="BUGZILLA"/>
		<reference ref_id="1230766" ref_url="https://bugzilla.suse.com/1230766" source="BUGZILLA"/>
		<reference ref_id="1230767" ref_url="https://bugzilla.suse.com/1230767" source="BUGZILLA"/>
		<reference ref_id="1230768" ref_url="https://bugzilla.suse.com/1230768" source="BUGZILLA"/>
		<reference ref_id="1230771" ref_url="https://bugzilla.suse.com/1230771" source="BUGZILLA"/>
		<reference ref_id="1230774" ref_url="https://bugzilla.suse.com/1230774" source="BUGZILLA"/>
		<reference ref_id="1230783" ref_url="https://bugzilla.suse.com/1230783" source="BUGZILLA"/>
		<reference ref_id="1230786" ref_url="https://bugzilla.suse.com/1230786" source="BUGZILLA"/>
		<reference ref_id="1230791" ref_url="https://bugzilla.suse.com/1230791" source="BUGZILLA"/>
		<reference ref_id="1230794" ref_url="https://bugzilla.suse.com/1230794" source="BUGZILLA"/>
		<reference ref_id="1230796" ref_url="https://bugzilla.suse.com/1230796" source="BUGZILLA"/>
		<reference ref_id="1230802" ref_url="https://bugzilla.suse.com/1230802" source="BUGZILLA"/>
		<reference ref_id="1230806" ref_url="https://bugzilla.suse.com/1230806" source="BUGZILLA"/>
		<reference ref_id="1230808" ref_url="https://bugzilla.suse.com/1230808" source="BUGZILLA"/>
		<reference ref_id="1230810" ref_url="https://bugzilla.suse.com/1230810" source="BUGZILLA"/>
		<reference ref_id="1230812" ref_url="https://bugzilla.suse.com/1230812" source="BUGZILLA"/>
		<reference ref_id="1230813" ref_url="https://bugzilla.suse.com/1230813" source="BUGZILLA"/>
		<reference ref_id="1230814" ref_url="https://bugzilla.suse.com/1230814" source="BUGZILLA"/>
		<reference ref_id="1230815" ref_url="https://bugzilla.suse.com/1230815" source="BUGZILLA"/>
		<reference ref_id="1230821" ref_url="https://bugzilla.suse.com/1230821" source="BUGZILLA"/>
		<reference ref_id="1230825" ref_url="https://bugzilla.suse.com/1230825" source="BUGZILLA"/>
		<reference ref_id="1230830" ref_url="https://bugzilla.suse.com/1230830" source="BUGZILLA"/>
		<reference ref_id="1231013" ref_url="https://bugzilla.suse.com/1231013" source="BUGZILLA"/>
		<reference ref_id="1231017" ref_url="https://bugzilla.suse.com/1231017" source="BUGZILLA"/>
		<reference ref_id="1231084" ref_url="https://bugzilla.suse.com/1231084" source="BUGZILLA"/>
		<reference ref_id="1231085" ref_url="https://bugzilla.suse.com/1231085" source="BUGZILLA"/>
		<reference ref_id="1231087" ref_url="https://bugzilla.suse.com/1231087" source="BUGZILLA"/>
		<reference ref_id="1231115" ref_url="https://bugzilla.suse.com/1231115" source="BUGZILLA"/>
		<reference ref_id="1231116" ref_url="https://bugzilla.suse.com/1231116" source="BUGZILLA"/>
		<reference ref_id="1231120" ref_url="https://bugzilla.suse.com/1231120" source="BUGZILLA"/>
		<reference ref_id="1231146" ref_url="https://bugzilla.suse.com/1231146" source="BUGZILLA"/>
		<reference ref_id="1231180" ref_url="https://bugzilla.suse.com/1231180" source="BUGZILLA"/>
		<reference ref_id="1231181" ref_url="https://bugzilla.suse.com/1231181" source="BUGZILLA"/>
		<reference ref_id="1231277" ref_url="https://bugzilla.suse.com/1231277" source="BUGZILLA"/>
		<reference ref_id="1231327" ref_url="https://bugzilla.suse.com/1231327" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48901" ref_url="https://www.suse.com/security/cve/CVE-2022-48901/" source="CVE"/>
		<reference ref_id="CVE-2022-48911" ref_url="https://www.suse.com/security/cve/CVE-2022-48911/" source="CVE"/>
		<reference ref_id="CVE-2022-48923" ref_url="https://www.suse.com/security/cve/CVE-2022-48923/" source="CVE"/>
		<reference ref_id="CVE-2022-48935" ref_url="https://www.suse.com/security/cve/CVE-2022-48935/" source="CVE"/>
		<reference ref_id="CVE-2022-48944" ref_url="https://www.suse.com/security/cve/CVE-2022-48944/" source="CVE"/>
		<reference ref_id="CVE-2022-48945" ref_url="https://www.suse.com/security/cve/CVE-2022-48945/" source="CVE"/>
		<reference ref_id="CVE-2023-52610" ref_url="https://www.suse.com/security/cve/CVE-2023-52610/" source="CVE"/>
		<reference ref_id="CVE-2023-52916" ref_url="https://www.suse.com/security/cve/CVE-2023-52916/" source="CVE"/>
		<reference ref_id="CVE-2024-26640" ref_url="https://www.suse.com/security/cve/CVE-2024-26640/" source="CVE"/>
		<reference ref_id="CVE-2024-26759" ref_url="https://www.suse.com/security/cve/CVE-2024-26759/" source="CVE"/>
		<reference ref_id="CVE-2024-26767" ref_url="https://www.suse.com/security/cve/CVE-2024-26767/" source="CVE"/>
		<reference ref_id="CVE-2024-26804" ref_url="https://www.suse.com/security/cve/CVE-2024-26804/" source="CVE"/>
		<reference ref_id="CVE-2024-26837" ref_url="https://www.suse.com/security/cve/CVE-2024-26837/" source="CVE"/>
		<reference ref_id="CVE-2024-37353" ref_url="https://www.suse.com/security/cve/CVE-2024-37353/" source="CVE"/>
		<reference ref_id="CVE-2024-38538" ref_url="https://www.suse.com/security/cve/CVE-2024-38538/" source="CVE"/>
		<reference ref_id="CVE-2024-38596" ref_url="https://www.suse.com/security/cve/CVE-2024-38596/" source="CVE"/>
		<reference ref_id="CVE-2024-38632" ref_url="https://www.suse.com/security/cve/CVE-2024-38632/" source="CVE"/>
		<reference ref_id="CVE-2024-40910" ref_url="https://www.suse.com/security/cve/CVE-2024-40910/" source="CVE"/>
		<reference ref_id="CVE-2024-40973" ref_url="https://www.suse.com/security/cve/CVE-2024-40973/" source="CVE"/>
		<reference ref_id="CVE-2024-40983" ref_url="https://www.suse.com/security/cve/CVE-2024-40983/" source="CVE"/>
		<reference ref_id="CVE-2024-41062" ref_url="https://www.suse.com/security/cve/CVE-2024-41062/" source="CVE"/>
		<reference ref_id="CVE-2024-41082" ref_url="https://www.suse.com/security/cve/CVE-2024-41082/" source="CVE"/>
		<reference ref_id="CVE-2024-42154" ref_url="https://www.suse.com/security/cve/CVE-2024-42154/" source="CVE"/>
		<reference ref_id="CVE-2024-42259" ref_url="https://www.suse.com/security/cve/CVE-2024-42259/" source="CVE"/>
		<reference ref_id="CVE-2024-42265" ref_url="https://www.suse.com/security/cve/CVE-2024-42265/" source="CVE"/>
		<reference ref_id="CVE-2024-42304" ref_url="https://www.suse.com/security/cve/CVE-2024-42304/" source="CVE"/>
		<reference ref_id="CVE-2024-42305" ref_url="https://www.suse.com/security/cve/CVE-2024-42305/" source="CVE"/>
		<reference ref_id="CVE-2024-42306" ref_url="https://www.suse.com/security/cve/CVE-2024-42306/" source="CVE"/>
		<reference ref_id="CVE-2024-43828" ref_url="https://www.suse.com/security/cve/CVE-2024-43828/" source="CVE"/>
		<reference ref_id="CVE-2024-43890" ref_url="https://www.suse.com/security/cve/CVE-2024-43890/" source="CVE"/>
		<reference ref_id="CVE-2024-43898" ref_url="https://www.suse.com/security/cve/CVE-2024-43898/" source="CVE"/>
		<reference ref_id="CVE-2024-43912" ref_url="https://www.suse.com/security/cve/CVE-2024-43912/" source="CVE"/>
		<reference ref_id="CVE-2024-43914" ref_url="https://www.suse.com/security/cve/CVE-2024-43914/" source="CVE"/>
		<reference ref_id="CVE-2024-44935" ref_url="https://www.suse.com/security/cve/CVE-2024-44935/" source="CVE"/>
		<reference ref_id="CVE-2024-44944" ref_url="https://www.suse.com/security/cve/CVE-2024-44944/" source="CVE"/>
		<reference ref_id="CVE-2024-44946" ref_url="https://www.suse.com/security/cve/CVE-2024-44946/" source="CVE"/>
		<reference ref_id="CVE-2024-44948" ref_url="https://www.suse.com/security/cve/CVE-2024-44948/" source="CVE"/>
		<reference ref_id="CVE-2024-44950" ref_url="https://www.suse.com/security/cve/CVE-2024-44950/" source="CVE"/>
		<reference ref_id="CVE-2024-44952" ref_url="https://www.suse.com/security/cve/CVE-2024-44952/" source="CVE"/>
		<reference ref_id="CVE-2024-44954" ref_url="https://www.suse.com/security/cve/CVE-2024-44954/" source="CVE"/>
		<reference ref_id="CVE-2024-44967" ref_url="https://www.suse.com/security/cve/CVE-2024-44967/" source="CVE"/>
		<reference ref_id="CVE-2024-44969" ref_url="https://www.suse.com/security/cve/CVE-2024-44969/" source="CVE"/>
		<reference ref_id="CVE-2024-44970" ref_url="https://www.suse.com/security/cve/CVE-2024-44970/" source="CVE"/>
		<reference ref_id="CVE-2024-44971" ref_url="https://www.suse.com/security/cve/CVE-2024-44971/" source="CVE"/>
		<reference ref_id="CVE-2024-44977" ref_url="https://www.suse.com/security/cve/CVE-2024-44977/" source="CVE"/>
		<reference ref_id="CVE-2024-44982" ref_url="https://www.suse.com/security/cve/CVE-2024-44982/" source="CVE"/>
		<reference ref_id="CVE-2024-44986" ref_url="https://www.suse.com/security/cve/CVE-2024-44986/" source="CVE"/>
		<reference ref_id="CVE-2024-44987" ref_url="https://www.suse.com/security/cve/CVE-2024-44987/" source="CVE"/>
		<reference ref_id="CVE-2024-44988" ref_url="https://www.suse.com/security/cve/CVE-2024-44988/" source="CVE"/>
		<reference ref_id="CVE-2024-44989" ref_url="https://www.suse.com/security/cve/CVE-2024-44989/" source="CVE"/>
		<reference ref_id="CVE-2024-44990" ref_url="https://www.suse.com/security/cve/CVE-2024-44990/" source="CVE"/>
		<reference ref_id="CVE-2024-44998" ref_url="https://www.suse.com/security/cve/CVE-2024-44998/" source="CVE"/>
		<reference ref_id="CVE-2024-44999" ref_url="https://www.suse.com/security/cve/CVE-2024-44999/" source="CVE"/>
		<reference ref_id="CVE-2024-45000" ref_url="https://www.suse.com/security/cve/CVE-2024-45000/" source="CVE"/>
		<reference ref_id="CVE-2024-45001" ref_url="https://www.suse.com/security/cve/CVE-2024-45001/" source="CVE"/>
		<reference ref_id="CVE-2024-45003" ref_url="https://www.suse.com/security/cve/CVE-2024-45003/" source="CVE"/>
		<reference ref_id="CVE-2024-45006" ref_url="https://www.suse.com/security/cve/CVE-2024-45006/" source="CVE"/>
		<reference ref_id="CVE-2024-45007" ref_url="https://www.suse.com/security/cve/CVE-2024-45007/" source="CVE"/>
		<reference ref_id="CVE-2024-45008" ref_url="https://www.suse.com/security/cve/CVE-2024-45008/" source="CVE"/>
		<reference ref_id="CVE-2024-45011" ref_url="https://www.suse.com/security/cve/CVE-2024-45011/" source="CVE"/>
		<reference ref_id="CVE-2024-45013" ref_url="https://www.suse.com/security/cve/CVE-2024-45013/" source="CVE"/>
		<reference ref_id="CVE-2024-45015" ref_url="https://www.suse.com/security/cve/CVE-2024-45015/" source="CVE"/>
		<reference ref_id="CVE-2024-45018" ref_url="https://www.suse.com/security/cve/CVE-2024-45018/" source="CVE"/>
		<reference ref_id="CVE-2024-45020" ref_url="https://www.suse.com/security/cve/CVE-2024-45020/" source="CVE"/>
		<reference ref_id="CVE-2024-45021" ref_url="https://www.suse.com/security/cve/CVE-2024-45021/" source="CVE"/>
		<reference ref_id="CVE-2024-45026" ref_url="https://www.suse.com/security/cve/CVE-2024-45026/" source="CVE"/>
		<reference ref_id="CVE-2024-45028" ref_url="https://www.suse.com/security/cve/CVE-2024-45028/" source="CVE"/>
		<reference ref_id="CVE-2024-45029" ref_url="https://www.suse.com/security/cve/CVE-2024-45029/" source="CVE"/>
		<reference ref_id="CVE-2024-46673" ref_url="https://www.suse.com/security/cve/CVE-2024-46673/" source="CVE"/>
		<reference ref_id="CVE-2024-46674" ref_url="https://www.suse.com/security/cve/CVE-2024-46674/" source="CVE"/>
		<reference ref_id="CVE-2024-46675" ref_url="https://www.suse.com/security/cve/CVE-2024-46675/" source="CVE"/>
		<reference ref_id="CVE-2024-46676" ref_url="https://www.suse.com/security/cve/CVE-2024-46676/" source="CVE"/>
		<reference ref_id="CVE-2024-46677" ref_url="https://www.suse.com/security/cve/CVE-2024-46677/" source="CVE"/>
		<reference ref_id="CVE-2024-46678" ref_url="https://www.suse.com/security/cve/CVE-2024-46678/" source="CVE"/>
		<reference ref_id="CVE-2024-46679" ref_url="https://www.suse.com/security/cve/CVE-2024-46679/" source="CVE"/>
		<reference ref_id="CVE-2024-46685" ref_url="https://www.suse.com/security/cve/CVE-2024-46685/" source="CVE"/>
		<reference ref_id="CVE-2024-46686" ref_url="https://www.suse.com/security/cve/CVE-2024-46686/" source="CVE"/>
		<reference ref_id="CVE-2024-46689" ref_url="https://www.suse.com/security/cve/CVE-2024-46689/" source="CVE"/>
		<reference ref_id="CVE-2024-46694" ref_url="https://www.suse.com/security/cve/CVE-2024-46694/" source="CVE"/>
		<reference ref_id="CVE-2024-46702" ref_url="https://www.suse.com/security/cve/CVE-2024-46702/" source="CVE"/>
		<reference ref_id="CVE-2024-46707" ref_url="https://www.suse.com/security/cve/CVE-2024-46707/" source="CVE"/>
		<reference ref_id="CVE-2024-46714" ref_url="https://www.suse.com/security/cve/CVE-2024-46714/" source="CVE"/>
		<reference ref_id="CVE-2024-46715" ref_url="https://www.suse.com/security/cve/CVE-2024-46715/" source="CVE"/>
		<reference ref_id="CVE-2024-46717" ref_url="https://www.suse.com/security/cve/CVE-2024-46717/" source="CVE"/>
		<reference ref_id="CVE-2024-46720" ref_url="https://www.suse.com/security/cve/CVE-2024-46720/" source="CVE"/>
		<reference ref_id="CVE-2024-46721" ref_url="https://www.suse.com/security/cve/CVE-2024-46721/" source="CVE"/>
		<reference ref_id="CVE-2024-46722" ref_url="https://www.suse.com/security/cve/CVE-2024-46722/" source="CVE"/>
		<reference ref_id="CVE-2024-46723" ref_url="https://www.suse.com/security/cve/CVE-2024-46723/" source="CVE"/>
		<reference ref_id="CVE-2024-46724" ref_url="https://www.suse.com/security/cve/CVE-2024-46724/" source="CVE"/>
		<reference ref_id="CVE-2024-46725" ref_url="https://www.suse.com/security/cve/CVE-2024-46725/" source="CVE"/>
		<reference ref_id="CVE-2024-46726" ref_url="https://www.suse.com/security/cve/CVE-2024-46726/" source="CVE"/>
		<reference ref_id="CVE-2024-46728" ref_url="https://www.suse.com/security/cve/CVE-2024-46728/" source="CVE"/>
		<reference ref_id="CVE-2024-46730" ref_url="https://www.suse.com/security/cve/CVE-2024-46730/" source="CVE"/>
		<reference ref_id="CVE-2024-46731" ref_url="https://www.suse.com/security/cve/CVE-2024-46731/" source="CVE"/>
		<reference ref_id="CVE-2024-46732" ref_url="https://www.suse.com/security/cve/CVE-2024-46732/" source="CVE"/>
		<reference ref_id="CVE-2024-46737" ref_url="https://www.suse.com/security/cve/CVE-2024-46737/" source="CVE"/>
		<reference ref_id="CVE-2024-46738" ref_url="https://www.suse.com/security/cve/CVE-2024-46738/" source="CVE"/>
		<reference ref_id="CVE-2024-46739" ref_url="https://www.suse.com/security/cve/CVE-2024-46739/" source="CVE"/>
		<reference ref_id="CVE-2024-46743" ref_url="https://www.suse.com/security/cve/CVE-2024-46743/" source="CVE"/>
		<reference ref_id="CVE-2024-46744" ref_url="https://www.suse.com/security/cve/CVE-2024-46744/" source="CVE"/>
		<reference ref_id="CVE-2024-46745" ref_url="https://www.suse.com/security/cve/CVE-2024-46745/" source="CVE"/>
		<reference ref_id="CVE-2024-46746" ref_url="https://www.suse.com/security/cve/CVE-2024-46746/" source="CVE"/>
		<reference ref_id="CVE-2024-46747" ref_url="https://www.suse.com/security/cve/CVE-2024-46747/" source="CVE"/>
		<reference ref_id="CVE-2024-46750" ref_url="https://www.suse.com/security/cve/CVE-2024-46750/" source="CVE"/>
		<reference ref_id="CVE-2024-46751" ref_url="https://www.suse.com/security/cve/CVE-2024-46751/" source="CVE"/>
		<reference ref_id="CVE-2024-46752" ref_url="https://www.suse.com/security/cve/CVE-2024-46752/" source="CVE"/>
		<reference ref_id="CVE-2024-46753" ref_url="https://www.suse.com/security/cve/CVE-2024-46753/" source="CVE"/>
		<reference ref_id="CVE-2024-46755" ref_url="https://www.suse.com/security/cve/CVE-2024-46755/" source="CVE"/>
		<reference ref_id="CVE-2024-46756" ref_url="https://www.suse.com/security/cve/CVE-2024-46756/" source="CVE"/>
		<reference ref_id="CVE-2024-46758" ref_url="https://www.suse.com/security/cve/CVE-2024-46758/" source="CVE"/>
		<reference ref_id="CVE-2024-46759" ref_url="https://www.suse.com/security/cve/CVE-2024-46759/" source="CVE"/>
		<reference ref_id="CVE-2024-46761" ref_url="https://www.suse.com/security/cve/CVE-2024-46761/" source="CVE"/>
		<reference ref_id="CVE-2024-46770" ref_url="https://www.suse.com/security/cve/CVE-2024-46770/" source="CVE"/>
		<reference ref_id="CVE-2024-46771" ref_url="https://www.suse.com/security/cve/CVE-2024-46771/" source="CVE"/>
		<reference ref_id="CVE-2024-46773" ref_url="https://www.suse.com/security/cve/CVE-2024-46773/" source="CVE"/>
		<reference ref_id="CVE-2024-46774" ref_url="https://www.suse.com/security/cve/CVE-2024-46774/" source="CVE"/>
		<reference ref_id="CVE-2024-46775" ref_url="https://www.suse.com/security/cve/CVE-2024-46775/" source="CVE"/>
		<reference ref_id="CVE-2024-46780" ref_url="https://www.suse.com/security/cve/CVE-2024-46780/" source="CVE"/>
		<reference ref_id="CVE-2024-46781" ref_url="https://www.suse.com/security/cve/CVE-2024-46781/" source="CVE"/>
		<reference ref_id="CVE-2024-46783" ref_url="https://www.suse.com/security/cve/CVE-2024-46783/" source="CVE"/>
		<reference ref_id="CVE-2024-46784" ref_url="https://www.suse.com/security/cve/CVE-2024-46784/" source="CVE"/>
		<reference ref_id="CVE-2024-46786" ref_url="https://www.suse.com/security/cve/CVE-2024-46786/" source="CVE"/>
		<reference ref_id="CVE-2024-46787" ref_url="https://www.suse.com/security/cve/CVE-2024-46787/" source="CVE"/>
		<reference ref_id="CVE-2024-46791" ref_url="https://www.suse.com/security/cve/CVE-2024-46791/" source="CVE"/>
		<reference ref_id="CVE-2024-46794" ref_url="https://www.suse.com/security/cve/CVE-2024-46794/" source="CVE"/>
		<reference ref_id="CVE-2024-46798" ref_url="https://www.suse.com/security/cve/CVE-2024-46798/" source="CVE"/>
		<reference ref_id="CVE-2024-46822" ref_url="https://www.suse.com/security/cve/CVE-2024-46822/" source="CVE"/>
		<reference ref_id="CVE-2024-46826" ref_url="https://www.suse.com/security/cve/CVE-2024-46826/" source="CVE"/>
		<reference ref_id="CVE-2024-46830" ref_url="https://www.suse.com/security/cve/CVE-2024-46830/" source="CVE"/>
		<reference ref_id="CVE-2024-46854" ref_url="https://www.suse.com/security/cve/CVE-2024-46854/" source="CVE"/>
		<reference ref_id="CVE-2024-46855" ref_url="https://www.suse.com/security/cve/CVE-2024-46855/" source="CVE"/>
		<reference ref_id="CVE-2024-46857" ref_url="https://www.suse.com/security/cve/CVE-2024-46857/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-48901: btrfs: do not start relocation until in progress drops are done  (bsc#1229607).
- CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance.  (bsc#1229633).
- CVE-2022-48923: btrfs: prevent copying too big compressed lzo segment (bsc#1229662)
- CVE-2022-48935: Fixed an unregister flowtable hooks on netns exit (bsc#1229619)
- CVE-2023-52610: net/sched: act_ct: fix skb leak and crash on ooo frags (bsc#1221610).
- CVE-2023-52916: media: aspeed: Fix memory overwrite if timing is 1600x900 (bsc#1230269).
- CVE-2024-26640: tcp: add sanity checks to rx zerocopy (bsc#1221650).
- CVE-2024-26759: mm/swap: fix race when skipping swapcache (bsc#1230340).
- CVE-2024-26767: drm/amd/display: fixed integer types and null check locations  (bsc#1230339).
- CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth (bsc#1222629).
- CVE-2024-26837: net: bridge: switchdev: race between creation of new group memberships and generation of the list of MDB events to replay (bsc#1222973).
- CVE-2024-37353: virtio: fixed a double free in vp_del_vqs() (bsc#1226875).
- CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len bytes (bsc#1226606).
- CVE-2024-38596: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg (bsc#1226846).
- CVE-2024-40910: Fix refcount imbalance on inbound connections (bsc#1227832).
- CVE-2024-40973: media: mtk-vcodec: potential null pointer deference in SCP (bsc#1227890).
- CVE-2024-40983: tipc: force a dst refcount before doing decryption (bsc#1227819).
- CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).
- CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command  (bsc#1228620 CVE-2024-41082).
- CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507).
- CVE-2024-42259: Fix Virtual Memory mapping boundaries calculation (bsc#1229156)
- CVE-2024-42265: protect the fetch of -&gt;fd[fd] in do_dup2() from mispredictions (bsc#1229334).
- CVE-2024-42304: ext4: make sure the first directory block is not a hole (bsc#1229364).
- CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir indexed (bsc#1229363).
- CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer (bsc#1229362).
- CVE-2024-43828: ext4: fix infinite loop when replaying fast_commit (bsc#1229394).
- CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764).
- CVE-2024-43898: ext4: sanity check for NULL pointer after ext4_force_shutdown (bsc#1229753).
- CVE-2024-43912: wifi: nl80211: disallow setting special AP channel widths (bsc#1229830)
- CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after reassembling (bsc#1229790).
- CVE-2024-44935: sctp: Fix null-ptr-deref in reuseport_add_sock() (bsc#1229810).
- CVE-2024-44944: netfilter: ctnetlink: use helper function to calculate expect ID (bsc#1229899).
- CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015).
- CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special register set (bsc#1230180).
- CVE-2024-44952: driver core: Fix uevent_show() vs driver detach race  (bsc#1230178).
- CVE-2024-44970: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (bsc#1230209).
- CVE-2024-44971: net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register() (bsc#1230211).
- CVE-2024-44986: ipv6: fix possible UAF in ip6_finish_output2() (bsc#1230230)
- CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185).
- CVE-2024-44988: net: dsa: mv88e6xxx: Fix out-of-bound access (bsc#1230192).
- CVE-2024-44989: bonding: fix xfrm real_dev null pointer dereference (bsc#1230193).
- CVE-2024-44990: bonding: fix null pointer deref in bond_ipsec_offload_ok (bsc#1230194).
- CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx() (bsc#1230171).
- CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233).
- CVE-2024-45003: Don't evict inode under the inode lru traversing context (bsc#1230245).
- CVE-2024-45007: char: xillybus: Refine workqueue handling (bsc#1230175).
- CVE-2024-45008: Input: MT - limit max slots (bsc#1230248).
- CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl() (bsc#1230442).
- CVE-2024-45015: drm/msm/dpu: move dpu_encoder's connector assignment to (bsc#1230444)
- CVE-2024-45018: netfilter: flowtable: initialise extack before use (bsc#1230431).
- CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434).
- CVE-2024-45029: i2c: tegra: Do not mark ACPI devices as irq safe (bsc#1230451).
- CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure (bsc#1230506).
- CVE-2024-46674: usb: dwc3: st: fix probed platform device ref count on probe  error path (bsc#1230507).
- CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549).
- CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex (bsc#1230550).
- CVE-2024-46679: ethtool: check device is present when getting link settings (bsc#1230556).
- CVE-2024-46685: pinctrl: single: fix potential NULL dereference in pcs_get_function() (bsc#1230515)
- CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() (bsc#1230517).
- CVE-2024-46689: soc: qcom: cmd-db: Map shared memory as WC, not WB (bsc#1230524)
- CVE-2024-46702: thunderbolt: Mark XDomain as unplugged when router is removed (bsc#1230589)
- CVE-2024-46707: KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3  (bsc#1230582).
- CVE-2024-46715: driver: iio: add missing checks on iio_info's callback access  (bsc#1230700).
- CVE-2024-46717: net/mlx5e: SHAMPO, Fix incorrect page release (bsc#1230719).
- CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710)
- CVE-2024-46728: drm/amd/display: Check index for aux_rd_interval before using (bsc#1230703)
- CVE-2024-46730: drm/amd/display: Ensure array index tg_inst won't be -1 (bsc#1230701)
- CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in interrupt map walk (bsc#1230756).
- CVE-2024-46751: btrfs: do not BUG_ON() when 0 reference count at btrfs_lookup_extent_info() (bsc#1230786).
- CVE-2024-46752: btrfs: reduce nesting for extent processing at btrfs_lookup_extent_info() (bsc#1230794).
- CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly (bsc#1230796).
- CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow (bsc#1230763).
- CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774).
- CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg() (bsc#1230810).
- CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815).
- CVE-2024-46794: x86/tdx: Fix data leak in mmio_read() (bsc#1230825).
- CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry (bsc#1231120).
- CVE-2024-46826: ELF: fix kernel.randomize_va_space double read (bsc#1231115).
- CVE-2024-46830: KVM: x86: Acquire kvm-&gt;srcu when handling KVM_SET_VCPU_EVENTS  (bsc#1231116).
- CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084).
- CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085).
- CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs (bsc#1231087).

The following non-security bugs were fixed:

- ACPI: CPPC: Fix MASK_VAL() usage (git-fixes).
- ACPI: PMIC: Remove unneeded check in tps68470_pmic_opregion_probe() (git-fixes).
- ACPI: SBS: manage alarm sysfs attribute through psy core (git-fixes).
- ACPI: battery: create alarm sysfs attribute atomically (git-fixes).
- ACPI: processor: Fix memory leaks in error paths of processor_add() (stable-fixes).
- ACPI: processor: Return an error if acpi_processor_get_info() fails in processor_add() (stable-fixes).
- ACPI: sysfs: validate return type of _STR method (git-fixes).
- ALSA: hda/conexant: Add pincfg quirk to enable top speakers on Sirius devices (stable-fixes).
- ALSA: hda/conexant: Mute speakers at suspend / shutdown (stable-fixes).
- ALSA: hda/generic: Add a helper to mute speakers at suspend/shutdown (stable-fixes).
- ALSA: hda/realtek: Support mute LED on HP Laptop 14-dq2xxx (stable-fixes).
- ALSA: hda/realtek: add patch for internal mic in Lenovo V145 (stable-fixes).
- ALSA: hda: Add input value sanity checks to HDMI channel map controls (stable-fixes).
- ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object (git-fixes).
- ASoC: meson: axg-card: fix 'use-after-free' (git-fixes).
- ASoC: sunxi: sun4i-i2s: fix LRCLK polarity in i2s mode (git-fixes).
- ASoC: tegra: Fix CBB error during probe() (git-fixes).
- ASoC: topology: Properly initialize soc_enum values (stable-fixes).
- ASoc: SOF: topology: Clear SOF link platform name upon unload (git-fixes).
- Bluetooth: L2CAP: Fix deadlock (git-fixes).
- Bluetooth: MGMT: Ignore keys being loaded with invalid type (git-fixes).
- Bluetooth: btusb: Fix not handling ZPL/short-transfer (git-fixes).
- Bluetooth: hci_core: Fix sending MGMT_EV_CONNECT_FAILED (git-fixes).
- Bluetooth: hci_sync: Ignore errors from HCI_OP_REMOTE_NAME_REQ_CANCEL (git-fixes).
- Drivers: hv: vmbus: Fix rescind handling in uio_hv_generic (git-fixes).
- Drivers: hv: vmbus: Fix the misplaced function description (git-fixes).
- HID: amd_sfh: free driver_data after destroying hid device (stable-fixes).
- HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup (stable-fixes).
- IB/core: Fix ib_cache_setup_one error flow cleanup (git-fixes)
- IB/hfi1: Fix potential deadlock on &amp;irq_src_lock and &amp;dd-&gt;uctxt_lock (git-fixes)
- Input: ilitek_ts_i2c - add report id message validation (git-fixes).
- Input: ilitek_ts_i2c - avoid wrong input subsystem sync (git-fixes).
- Input: ps2-gpio - use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- Input: uinput - reject requests with unreasonable number of slots (stable-fixes).
- KVM: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query (git-fixes bsc#1231277).
- NFS: Do not re-read the entire page cache to find the next cookie (bsc#1226662).
- NFS: Reduce use of uncached readdir (bsc#1226662).
- NFS: never reuse a NFSv4.0 lock-owner (bsc#1227726).
- NFSD: Fix frame size warning in svc_export_parse() (git-fixes).
- NFSD: Rewrite synopsis of nfsd_percpu_counters_init() (git-fixes).
- NFSv4: Add missing rescheduling points in nfs_client_return_marked_delegations (git-fixes).
- PCI/ASPM: Move pci_function_0() upward (bsc#1226915)
- PCI/ASPM: Remove struct aspm_latency (bsc#1226915)
- PCI/ASPM: Stop caching device L0s, L1 acceptable exit latencies (bsc#1226915)
- PCI/ASPM: Stop caching link L0s, L1 exit latencies (bsc#1226915)
- PCI: Add missing bridge lock to pci_bus_lock() (stable-fixes).
- PCI: Support BAR sizes up to 8TB (bsc#1231017)
- PCI: Wait for Link before restoring Downstream Buses (git-fixes).
- PCI: al: Check IORESOURCE_BUS existence during probe (git-fixes).
- PCI: dra7xx: Fix error handling when IRQ request fails in probe (git-fixes).
- PCI: dwc: Expose dw_pcie_ep_exit() to module (git-fixes).
- PCI: dwc: Restore MSI Receiver mask during resume (git-fixes).
- PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) (stable-fixes).
- PCI: keystone: Fix if-statement expression in ks_pcie_quirk() (git-fixes).
- PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes).
- PCI: xilinx-nwl: Fix off-by-one in INTx IRQ handler (git-fixes).
- PCI: xilinx-nwl: Fix register misspelling (git-fixes).
- PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666).
- RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes)
- RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes)
- RDMA/efa: Properly handle unexpected AQ completions (git-fixes)
- RDMA/hns: Do not modify rq next block addr in HIP09 QPC (git-fixes)
- RDMA/hns: Fix VF triggering PF reset in abnormal interrupt handler (git-fixes)
- RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled (git-fixes)
- RDMA/hns: Fix the overflow risk of hem_list_calc_ba_range() (git-fixes)
- RDMA/hns: Optimize hem allocation performance (git-fixes)
- RDMA/irdma: fix error message in irdma_modify_qp_roce() (git-fixes)
- RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git-fixes)
- RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds (git-fixes)
- RDMA/rtrs: Fix the problem of variable not initialized fully (git-fixes)
- RDMA/rtrs: Reset hb_missed_cnt after receiving other traffic from peer (git-fixes)
- Restore dropped fields for bluetooth MGMT/SMP structs (git-fixes).
- Revert 'Bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE' (git-fixes).
- Revert 'media: tuners: fix error return code of hybrid_tuner_request_state()' (git-fixes).
- Revert 'media: tuners: fix error return code of hybrid_tuner_request_state()' (stable-fixes).
- Revert 'mm, kmsan: fix infinite recursion due to RCU critical section'.
- Revert 'mm/sparsemem: fix race in accessing memory_section-&gt;usage'.
- Revert 'mm: prevent derefencing NULL ptr in pfn_section_valid()'.
- Squashfs: sanity check symbolic link size (git-fixes).
- USB: class: CDC-ACM: fix race between get_serial and set_serial (git-fixes).
- USB: serial: kobil_sct: restore initial terminal settings (git-fixes).
- USB: serial: option: add MeiG Smart SRM825L (git-fixes).
- USB: usbtmc: prevent kernel-usb-infoleak (git-fixes).
- VMCI: Fix use-after-free when removing resource in vmci_resource_remove() (git-fixes).
- af_unix: Fix data races around sk-&gt;sk_shutdown (bsc#1226846).
- af_unix: Fix data-races around sk-&gt;sk_shutdown (git-fixes).
- af_unix: annotate lockless accesses to sk-&gt;sk_err (bsc#1226846).
- apparmor: fix possible NULL pointer dereference (stable-fixes).
- arm64/mm: Modify range-based tlbi to decrement scale (bsc#1229585)
- arm64/mm: Update tlb invalidation routines for FEAT_LPA2 (bsc#1229585)
- arm64: acpi: Move get_cpu_for_acpi_id() to a header (git-fixes).
- arm64: dts: rockchip: Correct the Pinebook Pro battery design capacity (git-fixes).
- arm64: dts: rockchip: Raise Pinebook Pro's panel backlight PWM frequency (git-fixes).
- arm64: dts: rockchip: fix PMIC interrupt pin in pinctrl for ROCK Pi E (git-fixes).
- arm64: tlb: Allow range operation for MAX_TLBI_RANGE_PAGES (bsc#1229585)
- arm64: tlb: Fix TLBI RANGE operand (bsc#1229585)
- arm64: tlb: Improve __TLBI_VADDR_RANGE() (bsc#1229585)
- ata: libata: Fix memory leak for error path in ata_host_alloc() (git-fixes).
- ata: pata_macio: Use WARN instead of BUG (stable-fixes).
- blk-mq: Build default queue map via group_cpus_evenly() (bsc#1229031).
- blk-mq: add helper for checking if one CPU is mapped to specified hctx (bsc#1223600).
- blk-mq: add number of queue calc helper (bsc#1229034).
- blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600).
- blk-mq: introduce blk_mq_dev_map_queues (bsc#1229034).
- blk-mq: issue warning when offlining hctx with online isolcpus (bsc#1229034).
- blk-mq: use hk cpus only when isolcpus=io_queue is enabled (bsc#1229034).
- cachefiles: Fix non-taking of sb_writers around set/removexattr (bsc#1231013).
- cachefiles: fix dentry leak in cachefiles_open_file() (bsc#1231181).
- can: bcm: Clear bo-&gt;bcm_proc_read after remove_proc_entry() (git-fixes).
- can: bcm: Remove proc entry when dev is unregistered (git-fixes).
- can: j1939: use correct function name in comment (git-fixes).
- can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open (git-fixes).
- cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (git-fixes).
- ceph: remove the incorrect Fw reference check when dirtying pages (bsc#1231180).
- char: tpm: Fix possible memory leak in tpm_bios_measurements_open() (git-fixes).
- char: xillybus: Check USB endpoints when probing device (git-fixes).
- clk: qcom: clk-alpha-pll: Fix the pll post div mask (git-fixes).
- clk: qcom: clk-alpha-pll: Fix the trion pll postdiv set rate API (git-fixes).
- clk: qcom: clk-alpha-pll: Fix zonda set_rate failure when PLL is disabled (git-fixes).
- cpufreq: ti-cpufreq: Introduce quirks to handle syscon fails appropriately (git-fixes).
- crypto: ccp - Properly unregister /dev/sev on sev PLATFORM_STATUS failure (git-fixes).
- crypto: virtio - Handle dataq logic with tasklet (git-fixes).
- crypto: virtio - Wait for tasklet to complete on device remove (git-fixes).
- crypto: xor - fix template benchmarking (git-fixes).
- devres: Initialize an uninitialized struct member (stable-fixes).
- driver core: Add debug logs when fwnode links are added/deleted (git-fixes).
- driver core: Add missing parameter description to __fwnode_link_add() (git-fixes).
- driver core: Create __fwnode_link_del() helper function (git-fixes).
- driver core: Set deferred probe reason when deferred by driver core (git-fixes).
- driver core: fw_devlink: Allow marking a fwnode link as being part of a cycle (git-fixes).
- driver core: fw_devlink: Consolidate device link flag computation (git-fixes).
- drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error (git-fixes).
- drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error (git-fixes).
- drivers:drm:exynos_drm_gsc:Fix wrong assignment in gsc_bind() (git-fixes).
- drm/amd/amdgpu: Check tbo resource pointer (stable-fixes).
- drm/amd/amdgpu: Properly tune the size of struct (git-fixes).
- drm/amd/display: Add array index check for hdcp ddc access (stable-fixes).
- drm/amd/display: Assign linear_pitch_alignment even for VM (stable-fixes).
- drm/amd/display: Check HDCP returned status (stable-fixes).
- drm/amd/display: Check denominator pbn_div before used (stable-fixes).
- drm/amd/display: Check gpio_id before used as array index (stable-fixes).
- drm/amd/display: Check msg_id before processing transcation (stable-fixes).
- drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] (stable-fixes).
- drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX (stable-fixes).
- drm/amd/display: Ensure index calculation will not overflow (stable-fixes).
- drm/amd/display: Fix Coverity INTEGER_OVERFLOW within dal_gpio_service_create (stable-fixes).
- drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration (stable-fixes).
- drm/amd/display: Skip wbscl_set_scaler_filter if filter is null (stable-fixes).
- drm/amd/display: Spinlock before reading event (stable-fixes).
- drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (stable-fixes).
- drm/amd/display: added NULL check at start of dc_validate_stream (stable-fixes).
- drm/amd/pm: Fix negative array index read (stable-fixes).
- drm/amd/pm: check negtive return for table entries (stable-fixes).
- drm/amd/pm: check specific index for aldebaran (stable-fixes).
- drm/amd/pm: fix the Out-of-bounds read warning (stable-fixes).
- drm/amd/pm: fix uninitialized variable warning (stable-fixes).
- drm/amd/pm: fix uninitialized variable warning for smu8_hwmgr (stable-fixes).
- drm/amd/pm: fix uninitialized variable warnings for vangogh_ppt (stable-fixes).
- drm/amd/pm: fix uninitialized variable warnings for vega10_hwmgr (stable-fixes).
- drm/amd/pm: fix warning using uninitialized value of max_vid_step (stable-fixes).
- drm/amdgpu/atomfirmware: Silence UBSAN warning (stable-fixes).
- drm/amdgpu/pm: Check input value for CUSTOM profile mode setting on legacy SOCs (stable-fixes).
- drm/amdgpu/pm: Check the return value of smum_send_msg_to_smc (stable-fixes).
- drm/amdgpu/pm: Fix uninitialized variable agc_btc_response (stable-fixes).
- drm/amdgpu/pm: Fix uninitialized variable warning for smu10 (stable-fixes).
- drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number (stable-fixes).
- drm/amdgpu: Fix out-of-bounds write warning (stable-fixes).
- drm/amdgpu: Fix smatch static checker warning (stable-fixes).
- drm/amdgpu: Fix uninitialized variable warning in amdgpu_afmt_acr (stable-fixes).
- drm/amdgpu: Set no_hw_access when VF request full GPU fails (stable-fixes).
- drm/amdgpu: avoid reading vf2pf info size from FB (stable-fixes).
- drm/amdgpu: check for LINEAR_ALIGNED correctly in check_tiling_flags_gfx6 (stable-fixes).
- drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts (stable-fixes).
- drm/amdgpu: fix a possible null pointer dereference (git-fixes).
- drm/amdgpu: fix dereference after null check (stable-fixes).
- drm/amdgpu: fix mc_data out-of-bounds read warning (stable-fixes).
- drm/amdgpu: fix overflowed array index read warning (stable-fixes).
- drm/amdgpu: fix the waring dereferencing hive (stable-fixes).
- drm/amdgpu: fix ucode out-of-bounds read warning (stable-fixes).
- drm/amdgpu: the warning dereferencing obj for nbio_v7_4 (stable-fixes).
- drm/amdgpu: update type of buf size to u32 for eeprom functions (stable-fixes).
- drm/amdkfd: Reconcile the definition and use of oem_id in struct kfd_topology_device (stable-fixes).
- drm/bridge: lontium-lt8912b: Validate mode in drm_bridge_funcs::mode_valid() (git-fixes).
- drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ (stable-fixes).
- drm/i915/fence: Mark debug_fence_free() with __maybe_unused (git-fixes).
- drm/i915/fence: Mark debug_fence_init_onstack() with __maybe_unused (git-fixes).
- drm/i915/guc: prevent a possible int overflow in wq offsets (git-fixes).
- drm/meson: plane: Add error handling (stable-fixes).
- drm/msm/a5xx: disable preemption in submits by default (git-fixes).
- drm/msm/a5xx: fix races in preemption evaluation stage (git-fixes).
- drm/msm/a5xx: properly clear preemption records on resume (git-fixes).
- drm/msm/a5xx: workaround early ring-buffer emptiness check (git-fixes).
- drm/msm/adreno: Fix error return if missing firmware-name (stable-fixes).
- drm/msm/disp/dpu: use atomic enable/disable callbacks for encoder (bsc#1230444)
- drm/msm: Fix incorrect file name output in adreno_request_fw() (git-fixes).
- drm/msm: fix %s null argument error (git-fixes).
- drm/radeon/evergreen_cs: fix int overflow errors in cs track offsets (git-fixes).
- drm/radeon: fix null pointer dereference in radeon_add_common_modes (git-fixes).
- drm/rockchip: dw_hdmi: Fix reading EDID when using a forced mode (git-fixes).
- drm/rockchip: vop: Allow 4096px width scaling (git-fixes).
- drm/stm: ltdc: check memory returned by devm_kzalloc() (git-fixes).
- drm: omapdrm: Add missing check for alloc_ordered_workqueue (git-fixes).
- exfat: fix memory leak in exfat_load_bitmap() (git-fixes).
- fbdev: hpfb: Fix an error handling path in hpfb_dio_probe() (git-fixes).
- filemap: remove use of wait bookmarks (bsc#1224085).
- firmware_loader: Block path traversal (git-fixes).
- fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF (bsc#1230592).
- fuse: update stats for pages in dropped aux writeback list (bsc#1230130).
- fuse: use unsigned type for getxattr/listxattr size truncation (bsc#1230129).
- genirq/affinity: Do not pass irq_affinity_desc array to irq_build_affinity_masks (bsc#1229031).
- genirq/affinity: Move group_cpus_evenly() into lib/ (bsc#1229031).
- genirq/affinity: Only build SMP-only helper functions on SMP kernels (bsc#1229031).
- genirq/affinity: Pass affinity managed mask array to irq_build_affinity_masks (bsc#1229031).
- genirq/affinity: Remove the 'firstvec' parameter from irq_build_affinity_masks (bsc#1229031).
- genirq/affinity: Rename irq_build_affinity_masks as group_cpus_evenly (bsc#1229031).
- genirq/affinity: Replace cpumask_weight() with cpumask_empty() where appropriate (bsc#1229031).
- gfs2: setattr_chown: Add missing initialization (git-fixes).
- hwmon: (adc128d818) Fix underflows seen when writing limit attributes (stable-fixes).
- hwmon: (lm95234) Fix underflows seen when writing limit attributes (stable-fixes).
- hwmon: (max16065) Fix overflows seen when writing limits (git-fixes).
- hwmon: (ntc_thermistor) fix module autoloading (git-fixes).
- hwmon: (w83627ehf) Fix underflows seen when writing limit attributes (stable-fixes).
- hwrng: bcm2835 - Add missing clk_disable_unprepare in bcm2835_rng_init (git-fixes).
- hwrng: cctrng - Add missing clk_disable_unprepare in cctrng_resume (git-fixes).
- hwrng: mtk - Use devm_pm_runtime_enable (git-fixes).
- i2c: Fix conditional for substituting empty ACPI functions (stable-fixes).
- i2c: Use IS_REACHABLE() for substituting empty ACPI functions (git-fixes).
- i2c: aspeed: Update the stop sw state when the bus recovery occurs (git-fixes).
- i2c: isch: Add missed 'else' (git-fixes).
- i2c: qcom-geni: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- i2c: xiic: Wait for TX empty to avoid missed TX NAKs (git-fixes).
- i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup (stable-fixes).
- iio: adc: ad7124: fix chip ID mismatch (git-fixes).
- iio: adc: ad7124: fix config comparison (git-fixes).
- iio: adc: ad7606: fix oversampling gpio array (git-fixes).
- iio: adc: ad7606: fix standby gpio state to match the documentation (git-fixes).
- iio: buffer-dmaengine: fix releasing dma channel on error (git-fixes).
- iio: chemical: bme680: Fix read/write ops to device by adding mutexes (git-fixes).
- iio: fix scale application in iio_convert_raw_to_processed_unlocked (git-fixes).
- iio: magnetometer: ak8975: Fix reading for ak099xx sensors (git-fixes).
- ipmi: docs: do not advertise deprecated sysfs entries (git-fixes).
- ipmi:ssif: Improve detecting during probing (bsc#1228771)
- ipmi:ssif: Improve detecting during probing (bsc#1228771)
- jfs: fix out-of-bounds in dbNextAG() and diAlloc() (git-fixes).
- kABI, crypto: virtio - Handle dataq logic with tasklet (git-fixes).
- kabi: add __nf_queue_get_refs() for kabi compliance.
- kthread: Fix task state in kthread worker if being frozen (bsc#1231146).
- lib/group_cpus.c: avoid acquiring cpu hotplug lock in group_cpus_evenly (bsc#1229031).
- lib/group_cpus.c: honor housekeeping config when grouping CPUs (bsc#1229034).
- lib/group_cpus: Export group_cpus_evenly() (bsc#1229031).
- lirc: rc_dev_get_from_fd(): fix file leak (git-fixes).
- mailbox: bcm2835: Fix timeout during suspend mode (git-fixes).
- mailbox: rockchip: fix a typo in module autoloading (git-fixes).
- media: Revert 'media: dvb-usb: Fix unexpected infinite loop in dvb_usb_read_remote_control()' (git-fixes).
- media: aspeed: Fix no complete irq for non-64-aligned width (bsc#1230269)
- media: qcom: camss: Add check for v4l2_fwnode_endpoint_parse (stable-fixes).
- media: qcom: camss: Fix ordering of pm_runtime_enable (git-fixes).
- media: sun4i_csi: Implement link validate for sun4i_csi subdev (git-fixes).
- media: uapi/linux/cec.h: cec_msg_set_reply_to: zero flags (git-fixes).
- media: uvcvideo: Enforce alignment of frame and interval (stable-fixes).
- media: venus: fix use after free bug in venus_remove due to race condition (git-fixes).
- media: vicodec: allow en/decoder cmd w/o CAPTURE (git-fixes).
- media: vivid: do not set HDMI TX controls if there are no HDMI outputs (stable-fixes).
- media: vivid: fix wrong sizeimage value for mplane (stable-fixes).
- mmc: cqhci: Fix checking of CQHCI_HALT state (git-fixes).
- mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K (git-fixes).
- mmc: sdhci-of-aspeed: fix module autoloading (git-fixes).
- mtd: powernv: Add check devm_kasprintf() returned value (git-fixes).
- mtd: slram: insert break after errors in parsing the map (git-fixes).
- net: drop bad gso csum_start and offset in virtio_net_hdr (git-fixes).
- net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (git-fixes).
- net: mana: Implement get_ringparam/set_ringparam for mana (bsc#1229891).
- net: mana: Improve mana_set_channels() in low mem conditions (bsc#1230289).
- net: missing check virtio (git-fixes).
- net: tighten bad gso csum offset check in virtio_net_hdr (git-fixes).
- nf_conntrack_proto_udp: do not accept packets with IPS_NAT_CLASH (bsc#1199769).
- nilfs2: Constify struct kobj_type (git-fixes).
- nilfs2: determine empty node blocks as corrupted (git-fixes).
- nilfs2: fix missing cleanup on rollforward recovery error (git-fixes).
- nilfs2: fix potential null-ptr-deref in nilfs_btree_insert() (git-fixes).
- nilfs2: fix potential oob read in nilfs_btree_check_delete() (git-fixes).
- nilfs2: fix state management in error path of log writing function (git-fixes).
- nilfs2: protect references to superblock parameters exposed in sysfs (git-fixes).
- nilfs2: replace snprintf in show functions with sysfs_emit (git-fixes).
- nilfs2: use default_groups in kobj_type (git-fixes).
- nvme-pci: Add sleep quirk for Samsung 990 Evo (git-fixes).
- nvme-pci: use block layer helpers to calculate num of queues (bsc#1229034).
- nvme/pci: Add APST quirk for Lenovo N60z laptop (git-fixes).
- nvme: move stopping keep-alive into nvme_uninit_ctrl() (git-fixes).
- nvme: replace blk_mq_pci_map_queues with blk_mq_dev_map_queues (bsc#1229034).
- nvmet-rdma: fix possible bad dereference when freeing rsps (git-fixes).
- nvmet-tcp: do not continue for invalid icreq (git-fixes).
- nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes).
- nvmet-trace: avoid dereferencing pointer too early (git-fixes).
- nvmet: Identify-Active Namespace ID List command should reject invalid nsid (git-fixes).
- ocfs2: cancel dqi_sync_work before freeing oinfo (git-fixes).
- ocfs2: fix null-ptr-deref when journal load failed (git-fixes).
- ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes).
- ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes).
- pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv (stable-fixes).
- pcmcia: Use resource_size function on resource object (stable-fixes).
- pinctrl: single: fix missing error code in pcs_probe() (git-fixes).
- pinctrl: single: fix potential NULL dereference in pcs_get_function() (git-fixes).
- platform/x86: dell-smbios: Fix error path in dell_smbios_init() (git-fixes).
- platform/x86: panasonic-laptop: Allocate 1 entry extra in the sinf array (git-fixes).
- platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses (git-fixes).
- power: supply: Drop use_cnt check from power_supply_property_is_writeable() (git-fixes).
- power: supply: axp20x_battery: Remove design from min and max voltage (git-fixes).
- power: supply: hwmon: Fix missing temp1_max_alarm attribute (git-fixes).
- power: supply: max17042_battery: Fix SOC threshold calc w/ no current sense (git-fixes).
- powerpc/64: Convert patch_instruction() to patch_u32() (bsc#1194869).
- powerpc/boot: Handle allocation failure in simple_realloc() (bsc#1194869).
- powerpc/boot: Only free if realloc() succeeds (bsc#1194869).
- powerpc/code-patching: Add generic memory patching (bsc#1194869).
- powerpc/code-patching: Consolidate and cache per-cpu patching context (bsc#1194869).
- powerpc/code-patching: Do not call is_vmalloc_or_module_addr() without CONFIG_MODULES (bsc#1194869).
- powerpc/code-patching: Fix error handling in do_patch_instruction() (bsc#1194869).
- powerpc/code-patching: Fix oops with DEBUG_VM enabled (bsc#1194869).
- powerpc/code-patching: Fix unmap_patch_area() error handling (bsc#1194869).
- powerpc/code-patching: Perform hwsync in __patch_instruction() in case of failure (bsc#1194869).
- powerpc/code-patching: Pre-map patch area (bsc#1194869).
- powerpc/code-patching: Remove #ifdef CONFIG_STRICT_KERNEL_RWX (bsc#1194869).
- powerpc/code-patching: Remove pr_debug()/pr_devel() messages and fix check() (bsc#1194869).
- powerpc/code-patching: Reorganise do_patch_instruction() to ease error handling (bsc#1194869).
- powerpc/code-patching: Speed up page mapping/unmapping (bsc#1194869).
- powerpc/code-patching: Use WARN_ON and fix check in poking_init (bsc#1194869).
- powerpc/code-patching: Use jump_label to check if poking_init() is done (bsc#1194869).
- powerpc/code-patching: Use temporary mm for Radix MMU (bsc#1194869).
- powerpc/code-patching: introduce patch_instructions() (bsc#1194869).
- powerpc/ftrace: Use patch_instruction() return directly (bsc#1194869).
- powerpc/imc-pmu: Fix use of mutex in IRQs disabled section (bsc#1054914 git-fixes).
- powerpc/imc-pmu: Use the correct spinlock initializer (bsc#1054914 git-fixes).
- powerpc/inst: Refactor ___get_user_instr() (bsc#1194869).
- powerpc/lib: Add __init attribute to eligible functions (bsc#1194869).
- powerpc/tlb: Add local flush for page given mm_struct and psize (bsc#1194869).
- powerpc/vdso: Fix VDSO data access when running in a non-root time namespace (bsc#1194869).
- powerpc/vdso: Merge vdso64 and vdso32 into a single directory (bsc#1194869).
- powerpc/vdso: Rework VDSO32 makefile to add a prefix to object files (bsc#1194869).
- powerpc/vdso: augment VDSO32 functions to support 64 bits build (bsc#1194869).
- powerpc/xics: Check return value of kasprintf in icp_native_map_one_cpu (bsc#1194869).
- powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729).
- powerpc: Allow clearing and restoring registers independent of saved breakpoint state (bsc#1194869).
- rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow (bsc#1226631).
- rcu: Add rcutree.nohz_full_patience_delay to reduce nohz_full (bsc#1231327)
- rtc: at91sam9: fix OF node leak in probe() error path (git-fixes).
- s390/mm: Add cond_resched() to cmm_alloc/free_pages() (bsc#1228747).
- sched/isolation: Prevent boot crash when the boot CPU is (bsc#1231327)
- scsi: fnic: Move flush_work initialization out of if block (bsc#1230055).
- scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223).
- scsi: lpfc: Change diagnostic log flag during receipt of unknown ELS cmds (bsc#1229429).
- scsi: lpfc: Fix overflow build issue (bsc#1229429).
- scsi: lpfc: Fix unintentional double clearing of vmid_flag (bsc#1229429).
- scsi: lpfc: Fix unsolicited FLOGI kref imbalance when in direct attached topology (bsc#1229429).
- scsi: lpfc: Remove redundant vport assignment when building an abort request (bsc#1229429).
- scsi: lpfc: Update PRLO handling in direct attached topology (bsc#1229429).
- scsi: lpfc: Update lpfc version to 14.4.0.4 (bsc#1229429).
- scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths (bsc#1229429).
- scsi: pm8001: do not overwrite PCI queue mapping (bsc#1229034).
- scsi: replace blk_mq_pci_map_queues with blk_mq_dev_map_queues (bsc#1229034).
- scsi: sd: Fix off-by-one error in sd_read_block_characteristics() (bsc#1223848).
- scsi: use block layer helpers to calculate num of queues (bsc#1229034).
- spi: nxp-fspi: fix the KASAN report out-of-bounds bug (git-fixes).
- staging: iio: frequency: ad9834: Validate frequency parameter value (git-fixes).
- thunderbolt: Mark XDomain as unplugged when router is removed (stable-fixes).
- tomoyo: fallback to realpath if symlink's pathname does not exist (git-fixes).
- tools/virtio: fix build (git-fixes).
- tpm: Clean up TPM space after command failure (git-fixes).
- tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes).
- tty: rp2: Fix reset with non forgiving PCIe host bridges (git-fixes).
- udp: fix receiving fraglist GSO packets (git-fixes).
- uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (git-fixes).
- usb: cdnsp: Fix incorrect usb_request status (git-fixes).
- usb: dwc2: Skip clock gating on Broadcom SoCs (git-fixes).
- usb: dwc2: drd: fix clock gating on USB role switch (git-fixes).
- usb: dwc3: core: Prevent USB core invalid event buffer address access (git-fixes).
- usb: dwc3: core: Skip setting event buffers for host only controllers (git-fixes).
- usb: dwc3: core: update LC timer as per USB Spec V3.2 (git-fixes).
- usb: dwc3: core: update LC timer as per USB Spec V3.2 (stable-fixes).
- usb: dwc3: omap: add missing depopulate in probe error path (git-fixes).
- usb: dwc3: st: add missing depopulate in probe error path (git-fixes).
- usb: dwc3: st: fix probed platform device ref count on probe error path (git-fixes).
- usb: typec: ucsi: Fix null pointer dereference in trace (stable-fixes).
- usb: uas: set host status byte on data completion error (git-fixes).
- usb: uas: set host status byte on data completion error (stable-fixes).
- usb: xhci: fix loss of data on Cadence xHC (git-fixes).
- usbip: Do not submit special requests twice (stable-fixes).
- usbnet: fix cyclical race on disconnect with work queue (git-fixes).
- usbnet: ipheth: race between ipheth_close and error handling (git-fixes).
- usbnet: modern method to get random MAC (git-fixes).
- vhost-vdpa: switch to use vmf_insert_pfn() in the fault handler (git-fixes).
- vhost: Add smp_rmb() in vhost_vq_avail_empty() (git-fixes).
- virito: add APIs for retrieving vq affinity (bsc#1229034).
- virtio-blk: Ensure no requests in virtqueues before deleting vqs (git-fixes).
- virtio/vsock: fix logic which reduces credit update messages (git-fixes).
- virtio: blk/scs: replace blk_mq_virtio_map_queues with blk_mq_dev_map_queues (bsc#1229034).
- virtio: blk/scsi: use block layer helpers to calculate num of queues (bsc#1229034).
- virtio: reenable config if freezing device failed (git-fixes).
- virtio_net: Fix ''%d' directive writing between 1 and 11 bytes into a region of size 10' warnings (git-fixes).
- virtio_net: checksum offloading handling fix (git-fixes).
- virtio_net: use u64_stats_t infra to avoid data-races (git-fixes).
- virtiofs: forbid newlines in tags (bsc#1230591).
- vsock/virtio: add support for device suspend/resume (git-fixes).
- vsock/virtio: factor our the code to initialize and delete VQs (git-fixes).
- vsock/virtio: initialize the_virtio_vsock before using VQs (git-fixes).
- vsock/virtio: remove socket from connected/bound list on shutdown (git-fixes).
- watchdog: imx_sc_wdt: Do not disable WDT in suspend (git-fixes).
- wifi: brcmsmac: advertise MFP_CAPABLE to enable WPA3 (stable-fixes).
- wifi: cfg80211: fix UBSAN noise in cfg80211_wext_siwscan() (git-fixes).
- wifi: cfg80211: fix two more possible UBSAN-detected off-by-one errors (git-fixes).
- wifi: iwlwifi: mvm: increase the time between ranging measurements (git-fixes).
- wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() (git-fixes).
- wifi: mt76: mt7615: check devm_kasprintf() returned value (git-fixes).
- wifi: mt76: mt7915: fix rx filter setting for bfee functionality (git-fixes).
- wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id() (stable-fixes).
- wifi: rtw88: 8822c: Fix reported RX band width (git-fixes).
- wifi: rtw88: always wait for both firmware loading attempts (git-fixes).
- wifi: rtw88: remove CPT execution branch never used (git-fixes).
- wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param (git-fixes).
- workqueue: Avoid using isolated cpus' timers on (bsc#1231327)
- workqueue: mark power efficient workqueue as unbounded if (bsc#1231327)
- x86/hyperv: fix kexec crash due to VP assist page corruption (git-fixes).
- x86/kexec: Add EFI config table identity mapping for kexec kernel (bsc#1220382).
- x86/mm/ident_map: Use gbpages only where full GB page should be mapped (bsc#1220382).
- x86/xen: Convert comma to semicolon (git-fixes).
- xen/swiotlb: add alignment check for dma buffers (bsc#1229928).
- xen/swiotlb: fix allocated size (git-fixes).
- xen: add capability to remap non-RAM pages to different PFNs (bsc#1226003).
- xen: allow mapping ACPI data using a different physical address (bsc#1226003).
- xen: introduce generic helper checking for memory map conflicts (bsc#1226003).
- xen: move checks for e820 conflicts further up (bsc#1226003).
- xen: move max_pfn in xen_memory_setup() out of function scope (bsc#1226003).
- xen: tolerate ACPI NVS memory overlapping with Xen allocated memory (bsc#1226003).
- xen: use correct end address of kernel for conflict checking (bsc#1226003).
- xfs: do not include bnobt blocks when reserving free block pool (git-fixes).
- xhci: Set quirky xHC PCI hosts to D3 _after_ stopping and freeing them (git-fixes).
- xz: cleanup CRC32 edits from 2018 (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1054914">SUSE bug 1054914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199769">SUSE bug 1199769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216223">SUSE bug 1216223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220382">SUSE bug 1220382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221610">SUSE bug 1221610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221650">SUSE bug 1221650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222629">SUSE bug 1222629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222973">SUSE bug 1222973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223600">SUSE bug 1223600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223848">SUSE bug 1223848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224085">SUSE bug 1224085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225903">SUSE bug 1225903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226003">SUSE bug 1226003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226606">SUSE bug 1226606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226631">SUSE bug 1226631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226662">SUSE bug 1226662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226666">SUSE bug 1226666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226846">SUSE bug 1226846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226860">SUSE bug 1226860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226875">SUSE bug 1226875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226915">SUSE bug 1226915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227487">SUSE bug 1227487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227726">SUSE bug 1227726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227819">SUSE bug 1227819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227832">SUSE bug 1227832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227890">SUSE bug 1227890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228507">SUSE bug 1228507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228576">SUSE bug 1228576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228620">SUSE bug 1228620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228747">SUSE bug 1228747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228771">SUSE bug 1228771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229031">SUSE bug 1229031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229034">SUSE bug 1229034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229086">SUSE bug 1229086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229156">SUSE bug 1229156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229334">SUSE bug 1229334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229362">SUSE bug 1229362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229363">SUSE bug 1229363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229364">SUSE bug 1229364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229394">SUSE bug 1229394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229429">SUSE bug 1229429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229453">SUSE bug 1229453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229572">SUSE bug 1229572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229573">SUSE bug 1229573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229585">SUSE bug 1229585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229607">SUSE bug 1229607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229619">SUSE bug 1229619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229633">SUSE bug 1229633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229662">SUSE bug 1229662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229753">SUSE bug 1229753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229764">SUSE bug 1229764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229790">SUSE bug 1229790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229810">SUSE bug 1229810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229830">SUSE bug 1229830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229891">SUSE bug 1229891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229899">SUSE bug 1229899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229928">SUSE bug 1229928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229947">SUSE bug 1229947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230015">SUSE bug 1230015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230055">SUSE bug 1230055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230129">SUSE bug 1230129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230130">SUSE bug 1230130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230170">SUSE bug 1230170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230171">SUSE bug 1230171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230174">SUSE bug 1230174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230175">SUSE bug 1230175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230176">SUSE bug 1230176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230178">SUSE bug 1230178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230180">SUSE bug 1230180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230185">SUSE bug 1230185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230192">SUSE bug 1230192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230193">SUSE bug 1230193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230194">SUSE bug 1230194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230200">SUSE bug 1230200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230204">SUSE bug 1230204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230209">SUSE bug 1230209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230211">SUSE bug 1230211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230217">SUSE bug 1230217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230224">SUSE bug 1230224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230230">SUSE bug 1230230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230233">SUSE bug 1230233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230244">SUSE bug 1230244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230245">SUSE bug 1230245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230247">SUSE bug 1230247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230248">SUSE bug 1230248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230269">SUSE bug 1230269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230289">SUSE bug 1230289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230339">SUSE bug 1230339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230340">SUSE bug 1230340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230392">SUSE bug 1230392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230398">SUSE bug 1230398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230431">SUSE bug 1230431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230433">SUSE bug 1230433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230434">SUSE bug 1230434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230440">SUSE bug 1230440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230442">SUSE bug 1230442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230444">SUSE bug 1230444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230450">SUSE bug 1230450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230451">SUSE bug 1230451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230454">SUSE bug 1230454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230506">SUSE bug 1230506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230507">SUSE bug 1230507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230511">SUSE bug 1230511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230515">SUSE bug 1230515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230517">SUSE bug 1230517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230524">SUSE bug 1230524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230533">SUSE bug 1230533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230535">SUSE bug 1230535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230549">SUSE bug 1230549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230550">SUSE bug 1230550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230556">SUSE bug 1230556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230582">SUSE bug 1230582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230589">SUSE bug 1230589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230591">SUSE bug 1230591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230592">SUSE bug 1230592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230699">SUSE bug 1230699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230700">SUSE bug 1230700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230701">SUSE bug 1230701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230702">SUSE bug 1230702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230703">SUSE bug 1230703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230705">SUSE bug 1230705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230706">SUSE bug 1230706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230709">SUSE bug 1230709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230710">SUSE bug 1230710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230711">SUSE bug 1230711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230712">SUSE bug 1230712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230719">SUSE bug 1230719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230724">SUSE bug 1230724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230725">SUSE bug 1230725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230730">SUSE bug 1230730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230731">SUSE bug 1230731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230732">SUSE bug 1230732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230733">SUSE bug 1230733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230747">SUSE bug 1230747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230748">SUSE bug 1230748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230751">SUSE bug 1230751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230752">SUSE bug 1230752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230756">SUSE bug 1230756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230761">SUSE bug 1230761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230763">SUSE bug 1230763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230766">SUSE bug 1230766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230767">SUSE bug 1230767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230768">SUSE bug 1230768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230771">SUSE bug 1230771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230774">SUSE bug 1230774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230783">SUSE bug 1230783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230786">SUSE bug 1230786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230791">SUSE bug 1230791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230794">SUSE bug 1230794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230796">SUSE bug 1230796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230802">SUSE bug 1230802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230806">SUSE bug 1230806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230808">SUSE bug 1230808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230810">SUSE bug 1230810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230812">SUSE bug 1230812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230813">SUSE bug 1230813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230814">SUSE bug 1230814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230815">SUSE bug 1230815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230821">SUSE bug 1230821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230825">SUSE bug 1230825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230830">SUSE bug 1230830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231013">SUSE bug 1231013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231017">SUSE bug 1231017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231084">SUSE bug 1231084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231085">SUSE bug 1231085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231087">SUSE bug 1231087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231115">SUSE bug 1231115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231116">SUSE bug 1231116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231120">SUSE bug 1231120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231146">SUSE bug 1231146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231180">SUSE bug 1231180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231181">SUSE bug 1231181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231277">SUSE bug 1231277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231327">SUSE bug 1231327</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48901/">CVE-2022-48901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48901">CVE-2022-48901 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48911/">CVE-2022-48911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48911">CVE-2022-48911 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48923/">CVE-2022-48923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48923">CVE-2022-48923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48935/">CVE-2022-48935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48935">CVE-2022-48935 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48944/">CVE-2022-48944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48944">CVE-2022-48944 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48945/">CVE-2022-48945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48945">CVE-2022-48945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52610/">CVE-2023-52610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52610">CVE-2023-52610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52916/">CVE-2023-52916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52916">CVE-2023-52916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26640/">CVE-2024-26640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26640">CVE-2024-26640 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26759/">CVE-2024-26759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26759">CVE-2024-26759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-26767/">CVE-2024-26767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26767">CVE-2024-26767 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26804/">CVE-2024-26804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26804">CVE-2024-26804 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-26837/">CVE-2024-26837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26837">CVE-2024-26837 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-37353/">CVE-2024-37353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37353">CVE-2024-37353 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38538/">CVE-2024-38538 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38538">CVE-2024-38538 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-38596/">CVE-2024-38596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38596">CVE-2024-38596 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38632/">CVE-2024-38632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38632">CVE-2024-38632 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40910/">CVE-2024-40910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40910">CVE-2024-40910 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-40973/">CVE-2024-40973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40973">CVE-2024-40973 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40983/">CVE-2024-40983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40983">CVE-2024-40983 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41062/">CVE-2024-41062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41062">CVE-2024-41062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41082/">CVE-2024-41082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41082">CVE-2024-41082 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42154/">CVE-2024-42154 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42154">CVE-2024-42154 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42259/">CVE-2024-42259 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42259">CVE-2024-42259 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-42265/">CVE-2024-42265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42265">CVE-2024-42265 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42304/">CVE-2024-42304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42304">CVE-2024-42304 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42305/">CVE-2024-42305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42305">CVE-2024-42305 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42306/">CVE-2024-42306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42306">CVE-2024-42306 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43828/">CVE-2024-43828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43828">CVE-2024-43828 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43890/">CVE-2024-43890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43890">CVE-2024-43890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43898/">CVE-2024-43898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43898">CVE-2024-43898 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43912/">CVE-2024-43912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43912">CVE-2024-43912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43914/">CVE-2024-43914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43914">CVE-2024-43914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44935/">CVE-2024-44935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44935">CVE-2024-44935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44944/">CVE-2024-44944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44944">CVE-2024-44944 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-44946/">CVE-2024-44946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44946">CVE-2024-44946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44948/">CVE-2024-44948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-44948">CVE-2024-44948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44950/">CVE-2024-44950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44950">CVE-2024-44950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44952/">CVE-2024-44952 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44952">CVE-2024-44952 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44954/">CVE-2024-44954 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44954">CVE-2024-44954 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-44967/">CVE-2024-44967 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44967">CVE-2024-44967 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44969/">CVE-2024-44969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44969">CVE-2024-44969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44970/">CVE-2024-44970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44970">CVE-2024-44970 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44971/">CVE-2024-44971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44971">CVE-2024-44971 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44977/">CVE-2024-44977 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44977">CVE-2024-44977 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44982/">CVE-2024-44982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44982">CVE-2024-44982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44986/">CVE-2024-44986 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44986">CVE-2024-44986 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-44987/">CVE-2024-44987 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44987">CVE-2024-44987 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44988/">CVE-2024-44988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44988">CVE-2024-44988 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44989/">CVE-2024-44989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44989">CVE-2024-44989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44990/">CVE-2024-44990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44990">CVE-2024-44990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44998/">CVE-2024-44998 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44998">CVE-2024-44998 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44999/">CVE-2024-44999 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44999">CVE-2024-44999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45000/">CVE-2024-45000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45000">CVE-2024-45000 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45001/">CVE-2024-45001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45001">CVE-2024-45001 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45003/">CVE-2024-45003 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45003">CVE-2024-45003 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45006/">CVE-2024-45006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45006">CVE-2024-45006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45007/">CVE-2024-45007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45007">CVE-2024-45007 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45008/">CVE-2024-45008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45008">CVE-2024-45008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45011/">CVE-2024-45011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45011">CVE-2024-45011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45013/">CVE-2024-45013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45013">CVE-2024-45013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45015/">CVE-2024-45015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45015">CVE-2024-45015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-45018/">CVE-2024-45018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45018">CVE-2024-45018 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45020/">CVE-2024-45020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45020">CVE-2024-45020 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45021/">CVE-2024-45021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45021">CVE-2024-45021 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45026/">CVE-2024-45026 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45026">CVE-2024-45026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45028/">CVE-2024-45028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45028">CVE-2024-45028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45029/">CVE-2024-45029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45029">CVE-2024-45029 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46673/">CVE-2024-46673 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46673">CVE-2024-46673 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46674/">CVE-2024-46674 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46674">CVE-2024-46674 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46675/">CVE-2024-46675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46675">CVE-2024-46675 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.4/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46676/">CVE-2024-46676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46676">CVE-2024-46676 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46677/">CVE-2024-46677 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46677">CVE-2024-46677 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46678/">CVE-2024-46678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46678">CVE-2024-46678 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46679/">CVE-2024-46679 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46679">CVE-2024-46679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46685/">CVE-2024-46685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46685">CVE-2024-46685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46686/">CVE-2024-46686 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46686">CVE-2024-46686 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46689/">CVE-2024-46689 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46689">CVE-2024-46689 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46694/">CVE-2024-46694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46694">CVE-2024-46694 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46702/">CVE-2024-46702 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46702">CVE-2024-46702 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46707/">CVE-2024-46707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46707">CVE-2024-46707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46714/">CVE-2024-46714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46714">CVE-2024-46714 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46715/">CVE-2024-46715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46715">CVE-2024-46715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46717/">CVE-2024-46717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46717">CVE-2024-46717 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46720/">CVE-2024-46720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46720">CVE-2024-46720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46721/">CVE-2024-46721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46721">CVE-2024-46721 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46722/">CVE-2024-46722 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46722">CVE-2024-46722 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46723/">CVE-2024-46723 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46723">CVE-2024-46723 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46724/">CVE-2024-46724 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46724">CVE-2024-46724 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46725/">CVE-2024-46725 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46725">CVE-2024-46725 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46726/">CVE-2024-46726 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46726">CVE-2024-46726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46728/">CVE-2024-46728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46728">CVE-2024-46728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46730/">CVE-2024-46730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46730">CVE-2024-46730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46731/">CVE-2024-46731 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46731">CVE-2024-46731 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46732/">CVE-2024-46732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46732">CVE-2024-46732 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46737/">CVE-2024-46737 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46737">CVE-2024-46737 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46738/">CVE-2024-46738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46738">CVE-2024-46738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46739/">CVE-2024-46739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46739">CVE-2024-46739 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46743/">CVE-2024-46743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46743">CVE-2024-46743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46744/">CVE-2024-46744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46744">CVE-2024-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46745/">CVE-2024-46745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46745">CVE-2024-46745 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46746/">CVE-2024-46746 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46746">CVE-2024-46746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46747/">CVE-2024-46747 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46747">CVE-2024-46747 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46750/">CVE-2024-46750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46750">CVE-2024-46750 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46751/">CVE-2024-46751 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46751">CVE-2024-46751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46752/">CVE-2024-46752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46752">CVE-2024-46752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46753/">CVE-2024-46753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46753">CVE-2024-46753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46755/">CVE-2024-46755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46755">CVE-2024-46755 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46756/">CVE-2024-46756 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46756">CVE-2024-46756 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46758/">CVE-2024-46758 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46758">CVE-2024-46758 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46759/">CVE-2024-46759 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46759">CVE-2024-46759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46761/">CVE-2024-46761 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46761">CVE-2024-46761 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46770/">CVE-2024-46770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46770">CVE-2024-46770 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46771/">CVE-2024-46771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46771">CVE-2024-46771 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46773/">CVE-2024-46773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46773">CVE-2024-46773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46774/">CVE-2024-46774 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46774">CVE-2024-46774 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46775/">CVE-2024-46775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46775">CVE-2024-46775 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46780/">CVE-2024-46780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46780">CVE-2024-46780 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46781/">CVE-2024-46781 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46781">CVE-2024-46781 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46783/">CVE-2024-46783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46783">CVE-2024-46783 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46784/">CVE-2024-46784 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46784">CVE-2024-46784 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46786/">CVE-2024-46786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46786">CVE-2024-46786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46787/">CVE-2024-46787 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46787">CVE-2024-46787 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46791/">CVE-2024-46791 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46791">CVE-2024-46791 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46794/">CVE-2024-46794 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46794">CVE-2024-46794 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46798/">CVE-2024-46798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46798">CVE-2024-46798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46822/">CVE-2024-46822 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46822">CVE-2024-46822 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46826/">CVE-2024-46826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46826">CVE-2024-46826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46830/">CVE-2024-46830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46830">CVE-2024-46830 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-46854/">CVE-2024-46854 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46854">CVE-2024-46854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46855/">CVE-2024-46855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46855">CVE-2024-46855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46857/">CVE-2024-46857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46857">CVE-2024-46857 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009946617" comment="cluster-md-kmp-azure-5.14.21-150500.33.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946618" comment="dlm-kmp-azure-5.14.21-150500.33.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946619" comment="gfs2-kmp-azure-5.14.21-150500.33.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946620" comment="kernel-azure-5.14.21-150500.33.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946621" comment="kernel-azure-devel-5.14.21-150500.33.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946622" comment="kernel-azure-extra-5.14.21-150500.33.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946623" comment="kernel-azure-livepatch-devel-5.14.21-150500.33.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946624" comment="kernel-azure-optional-5.14.21-150500.33.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946625" comment="kernel-azure-vdso-5.14.21-150500.33.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946626" comment="kernel-devel-azure-5.14.21-150500.33.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946627" comment="kernel-source-azure-5.14.21-150500.33.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946628" comment="kernel-syms-azure-5.14.21-150500.33.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946629" comment="kselftests-kmp-azure-5.14.21-150500.33.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946630" comment="ocfs2-kmp-azure-5.14.21-150500.33.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946631" comment="reiserfs-kmp-azure-5.14.21-150500.33.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5029" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1199769" ref_url="https://bugzilla.suse.com/1199769" source="BUGZILLA"/>
		<reference ref_id="1216223" ref_url="https://bugzilla.suse.com/1216223" source="BUGZILLA"/>
		<reference ref_id="1220382" ref_url="https://bugzilla.suse.com/1220382" source="BUGZILLA"/>
		<reference ref_id="1221610" ref_url="https://bugzilla.suse.com/1221610" source="BUGZILLA"/>
		<reference ref_id="1221650" ref_url="https://bugzilla.suse.com/1221650" source="BUGZILLA"/>
		<reference ref_id="1222629" ref_url="https://bugzilla.suse.com/1222629" source="BUGZILLA"/>
		<reference ref_id="1222973" ref_url="https://bugzilla.suse.com/1222973" source="BUGZILLA"/>
		<reference ref_id="1223600" ref_url="https://bugzilla.suse.com/1223600" source="BUGZILLA"/>
		<reference ref_id="1223848" ref_url="https://bugzilla.suse.com/1223848" source="BUGZILLA"/>
		<reference ref_id="1224085" ref_url="https://bugzilla.suse.com/1224085" source="BUGZILLA"/>
		<reference ref_id="1225903" ref_url="https://bugzilla.suse.com/1225903" source="BUGZILLA"/>
		<reference ref_id="1226003" ref_url="https://bugzilla.suse.com/1226003" source="BUGZILLA"/>
		<reference ref_id="1226606" ref_url="https://bugzilla.suse.com/1226606" source="BUGZILLA"/>
		<reference ref_id="1226662" ref_url="https://bugzilla.suse.com/1226662" source="BUGZILLA"/>
		<reference ref_id="1226666" ref_url="https://bugzilla.suse.com/1226666" source="BUGZILLA"/>
		<reference ref_id="1226846" ref_url="https://bugzilla.suse.com/1226846" source="BUGZILLA"/>
		<reference ref_id="1226860" ref_url="https://bugzilla.suse.com/1226860" source="BUGZILLA"/>
		<reference ref_id="1226875" ref_url="https://bugzilla.suse.com/1226875" source="BUGZILLA"/>
		<reference ref_id="1226915" ref_url="https://bugzilla.suse.com/1226915" source="BUGZILLA"/>
		<reference ref_id="1227487" ref_url="https://bugzilla.suse.com/1227487" source="BUGZILLA"/>
		<reference ref_id="1227726" ref_url="https://bugzilla.suse.com/1227726" source="BUGZILLA"/>
		<reference ref_id="1227819" ref_url="https://bugzilla.suse.com/1227819" source="BUGZILLA"/>
		<reference ref_id="1227832" ref_url="https://bugzilla.suse.com/1227832" source="BUGZILLA"/>
		<reference ref_id="1227890" ref_url="https://bugzilla.suse.com/1227890" source="BUGZILLA"/>
		<reference ref_id="1228507" ref_url="https://bugzilla.suse.com/1228507" source="BUGZILLA"/>
		<reference ref_id="1228576" ref_url="https://bugzilla.suse.com/1228576" source="BUGZILLA"/>
		<reference ref_id="1228620" ref_url="https://bugzilla.suse.com/1228620" source="BUGZILLA"/>
		<reference ref_id="1228771" ref_url="https://bugzilla.suse.com/1228771" source="BUGZILLA"/>
		<reference ref_id="1229031" ref_url="https://bugzilla.suse.com/1229031" source="BUGZILLA"/>
		<reference ref_id="1229034" ref_url="https://bugzilla.suse.com/1229034" source="BUGZILLA"/>
		<reference ref_id="1229086" ref_url="https://bugzilla.suse.com/1229086" source="BUGZILLA"/>
		<reference ref_id="1229156" ref_url="https://bugzilla.suse.com/1229156" source="BUGZILLA"/>
		<reference ref_id="1229289" ref_url="https://bugzilla.suse.com/1229289" source="BUGZILLA"/>
		<reference ref_id="1229334" ref_url="https://bugzilla.suse.com/1229334" source="BUGZILLA"/>
		<reference ref_id="1229362" ref_url="https://bugzilla.suse.com/1229362" source="BUGZILLA"/>
		<reference ref_id="1229363" ref_url="https://bugzilla.suse.com/1229363" source="BUGZILLA"/>
		<reference ref_id="1229364" ref_url="https://bugzilla.suse.com/1229364" source="BUGZILLA"/>
		<reference ref_id="1229394" ref_url="https://bugzilla.suse.com/1229394" source="BUGZILLA"/>
		<reference ref_id="1229429" ref_url="https://bugzilla.suse.com/1229429" source="BUGZILLA"/>
		<reference ref_id="1229453" ref_url="https://bugzilla.suse.com/1229453" source="BUGZILLA"/>
		<reference ref_id="1229572" ref_url="https://bugzilla.suse.com/1229572" source="BUGZILLA"/>
		<reference ref_id="1229573" ref_url="https://bugzilla.suse.com/1229573" source="BUGZILLA"/>
		<reference ref_id="1229585" ref_url="https://bugzilla.suse.com/1229585" source="BUGZILLA"/>
		<reference ref_id="1229607" ref_url="https://bugzilla.suse.com/1229607" source="BUGZILLA"/>
		<reference ref_id="1229619" ref_url="https://bugzilla.suse.com/1229619" source="BUGZILLA"/>
		<reference ref_id="1229633" ref_url="https://bugzilla.suse.com/1229633" source="BUGZILLA"/>
		<reference ref_id="1229662" ref_url="https://bugzilla.suse.com/1229662" source="BUGZILLA"/>
		<reference ref_id="1229753" ref_url="https://bugzilla.suse.com/1229753" source="BUGZILLA"/>
		<reference ref_id="1229764" ref_url="https://bugzilla.suse.com/1229764" source="BUGZILLA"/>
		<reference ref_id="1229790" ref_url="https://bugzilla.suse.com/1229790" source="BUGZILLA"/>
		<reference ref_id="1229810" ref_url="https://bugzilla.suse.com/1229810" source="BUGZILLA"/>
		<reference ref_id="1229830" ref_url="https://bugzilla.suse.com/1229830" source="BUGZILLA"/>
		<reference ref_id="1229899" ref_url="https://bugzilla.suse.com/1229899" source="BUGZILLA"/>
		<reference ref_id="1229928" ref_url="https://bugzilla.suse.com/1229928" source="BUGZILLA"/>
		<reference ref_id="1229947" ref_url="https://bugzilla.suse.com/1229947" source="BUGZILLA"/>
		<reference ref_id="1230015" ref_url="https://bugzilla.suse.com/1230015" source="BUGZILLA"/>
		<reference ref_id="1230129" ref_url="https://bugzilla.suse.com/1230129" source="BUGZILLA"/>
		<reference ref_id="1230130" ref_url="https://bugzilla.suse.com/1230130" source="BUGZILLA"/>
		<reference ref_id="1230170" ref_url="https://bugzilla.suse.com/1230170" source="BUGZILLA"/>
		<reference ref_id="1230171" ref_url="https://bugzilla.suse.com/1230171" source="BUGZILLA"/>
		<reference ref_id="1230174" ref_url="https://bugzilla.suse.com/1230174" source="BUGZILLA"/>
		<reference ref_id="1230175" ref_url="https://bugzilla.suse.com/1230175" source="BUGZILLA"/>
		<reference ref_id="1230176" ref_url="https://bugzilla.suse.com/1230176" source="BUGZILLA"/>
		<reference ref_id="1230178" ref_url="https://bugzilla.suse.com/1230178" source="BUGZILLA"/>
		<reference ref_id="1230180" ref_url="https://bugzilla.suse.com/1230180" source="BUGZILLA"/>
		<reference ref_id="1230185" ref_url="https://bugzilla.suse.com/1230185" source="BUGZILLA"/>
		<reference ref_id="1230192" ref_url="https://bugzilla.suse.com/1230192" source="BUGZILLA"/>
		<reference ref_id="1230193" ref_url="https://bugzilla.suse.com/1230193" source="BUGZILLA"/>
		<reference ref_id="1230194" ref_url="https://bugzilla.suse.com/1230194" source="BUGZILLA"/>
		<reference ref_id="1230200" ref_url="https://bugzilla.suse.com/1230200" source="BUGZILLA"/>
		<reference ref_id="1230204" ref_url="https://bugzilla.suse.com/1230204" source="BUGZILLA"/>
		<reference ref_id="1230209" ref_url="https://bugzilla.suse.com/1230209" source="BUGZILLA"/>
		<reference ref_id="1230211" ref_url="https://bugzilla.suse.com/1230211" source="BUGZILLA"/>
		<reference ref_id="1230212" ref_url="https://bugzilla.suse.com/1230212" source="BUGZILLA"/>
		<reference ref_id="1230217" ref_url="https://bugzilla.suse.com/1230217" source="BUGZILLA"/>
		<reference ref_id="1230224" ref_url="https://bugzilla.suse.com/1230224" source="BUGZILLA"/>
		<reference ref_id="1230230" ref_url="https://bugzilla.suse.com/1230230" source="BUGZILLA"/>
		<reference ref_id="1230233" ref_url="https://bugzilla.suse.com/1230233" source="BUGZILLA"/>
		<reference ref_id="1230244" ref_url="https://bugzilla.suse.com/1230244" source="BUGZILLA"/>
		<reference ref_id="1230245" ref_url="https://bugzilla.suse.com/1230245" source="BUGZILLA"/>
		<reference ref_id="1230247" ref_url="https://bugzilla.suse.com/1230247" source="BUGZILLA"/>
		<reference ref_id="1230248" ref_url="https://bugzilla.suse.com/1230248" source="BUGZILLA"/>
		<reference ref_id="1230269" ref_url="https://bugzilla.suse.com/1230269" source="BUGZILLA"/>
		<reference ref_id="1230339" ref_url="https://bugzilla.suse.com/1230339" source="BUGZILLA"/>
		<reference ref_id="1230340" ref_url="https://bugzilla.suse.com/1230340" source="BUGZILLA"/>
		<reference ref_id="1230392" ref_url="https://bugzilla.suse.com/1230392" source="BUGZILLA"/>
		<reference ref_id="1230398" ref_url="https://bugzilla.suse.com/1230398" source="BUGZILLA"/>
		<reference ref_id="1230431" ref_url="https://bugzilla.suse.com/1230431" source="BUGZILLA"/>
		<reference ref_id="1230433" ref_url="https://bugzilla.suse.com/1230433" source="BUGZILLA"/>
		<reference ref_id="1230434" ref_url="https://bugzilla.suse.com/1230434" source="BUGZILLA"/>
		<reference ref_id="1230440" ref_url="https://bugzilla.suse.com/1230440" source="BUGZILLA"/>
		<reference ref_id="1230442" ref_url="https://bugzilla.suse.com/1230442" source="BUGZILLA"/>
		<reference ref_id="1230444" ref_url="https://bugzilla.suse.com/1230444" source="BUGZILLA"/>
		<reference ref_id="1230450" ref_url="https://bugzilla.suse.com/1230450" source="BUGZILLA"/>
		<reference ref_id="1230451" ref_url="https://bugzilla.suse.com/1230451" source="BUGZILLA"/>
		<reference ref_id="1230454" ref_url="https://bugzilla.suse.com/1230454" source="BUGZILLA"/>
		<reference ref_id="1230506" ref_url="https://bugzilla.suse.com/1230506" source="BUGZILLA"/>
		<reference ref_id="1230507" ref_url="https://bugzilla.suse.com/1230507" source="BUGZILLA"/>
		<reference ref_id="1230511" ref_url="https://bugzilla.suse.com/1230511" source="BUGZILLA"/>
		<reference ref_id="1230515" ref_url="https://bugzilla.suse.com/1230515" source="BUGZILLA"/>
		<reference ref_id="1230517" ref_url="https://bugzilla.suse.com/1230517" source="BUGZILLA"/>
		<reference ref_id="1230524" ref_url="https://bugzilla.suse.com/1230524" source="BUGZILLA"/>
		<reference ref_id="1230533" ref_url="https://bugzilla.suse.com/1230533" source="BUGZILLA"/>
		<reference ref_id="1230535" ref_url="https://bugzilla.suse.com/1230535" source="BUGZILLA"/>
		<reference ref_id="1230549" ref_url="https://bugzilla.suse.com/1230549" source="BUGZILLA"/>
		<reference ref_id="1230556" ref_url="https://bugzilla.suse.com/1230556" source="BUGZILLA"/>
		<reference ref_id="1230582" ref_url="https://bugzilla.suse.com/1230582" source="BUGZILLA"/>
		<reference ref_id="1230589" ref_url="https://bugzilla.suse.com/1230589" source="BUGZILLA"/>
		<reference ref_id="1230591" ref_url="https://bugzilla.suse.com/1230591" source="BUGZILLA"/>
		<reference ref_id="1230592" ref_url="https://bugzilla.suse.com/1230592" source="BUGZILLA"/>
		<reference ref_id="1230699" ref_url="https://bugzilla.suse.com/1230699" source="BUGZILLA"/>
		<reference ref_id="1230700" ref_url="https://bugzilla.suse.com/1230700" source="BUGZILLA"/>
		<reference ref_id="1230701" ref_url="https://bugzilla.suse.com/1230701" source="BUGZILLA"/>
		<reference ref_id="1230702" ref_url="https://bugzilla.suse.com/1230702" source="BUGZILLA"/>
		<reference ref_id="1230703" ref_url="https://bugzilla.suse.com/1230703" source="BUGZILLA"/>
		<reference ref_id="1230705" ref_url="https://bugzilla.suse.com/1230705" source="BUGZILLA"/>
		<reference ref_id="1230706" ref_url="https://bugzilla.suse.com/1230706" source="BUGZILLA"/>
		<reference ref_id="1230707" ref_url="https://bugzilla.suse.com/1230707" source="BUGZILLA"/>
		<reference ref_id="1230709" ref_url="https://bugzilla.suse.com/1230709" source="BUGZILLA"/>
		<reference ref_id="1230710" ref_url="https://bugzilla.suse.com/1230710" source="BUGZILLA"/>
		<reference ref_id="1230711" ref_url="https://bugzilla.suse.com/1230711" source="BUGZILLA"/>
		<reference ref_id="1230712" ref_url="https://bugzilla.suse.com/1230712" source="BUGZILLA"/>
		<reference ref_id="1230719" ref_url="https://bugzilla.suse.com/1230719" source="BUGZILLA"/>
		<reference ref_id="1230724" ref_url="https://bugzilla.suse.com/1230724" source="BUGZILLA"/>
		<reference ref_id="1230725" ref_url="https://bugzilla.suse.com/1230725" source="BUGZILLA"/>
		<reference ref_id="1230730" ref_url="https://bugzilla.suse.com/1230730" source="BUGZILLA"/>
		<reference ref_id="1230731" ref_url="https://bugzilla.suse.com/1230731" source="BUGZILLA"/>
		<reference ref_id="1230732" ref_url="https://bugzilla.suse.com/1230732" source="BUGZILLA"/>
		<reference ref_id="1230733" ref_url="https://bugzilla.suse.com/1230733" source="BUGZILLA"/>
		<reference ref_id="1230747" ref_url="https://bugzilla.suse.com/1230747" source="BUGZILLA"/>
		<reference ref_id="1230748" ref_url="https://bugzilla.suse.com/1230748" source="BUGZILLA"/>
		<reference ref_id="1230751" ref_url="https://bugzilla.suse.com/1230751" source="BUGZILLA"/>
		<reference ref_id="1230752" ref_url="https://bugzilla.suse.com/1230752" source="BUGZILLA"/>
		<reference ref_id="1230756" ref_url="https://bugzilla.suse.com/1230756" source="BUGZILLA"/>
		<reference ref_id="1230761" ref_url="https://bugzilla.suse.com/1230761" source="BUGZILLA"/>
		<reference ref_id="1230766" ref_url="https://bugzilla.suse.com/1230766" source="BUGZILLA"/>
		<reference ref_id="1230767" ref_url="https://bugzilla.suse.com/1230767" source="BUGZILLA"/>
		<reference ref_id="1230768" ref_url="https://bugzilla.suse.com/1230768" source="BUGZILLA"/>
		<reference ref_id="1230771" ref_url="https://bugzilla.suse.com/1230771" source="BUGZILLA"/>
		<reference ref_id="1230772" ref_url="https://bugzilla.suse.com/1230772" source="BUGZILLA"/>
		<reference ref_id="1230776" ref_url="https://bugzilla.suse.com/1230776" source="BUGZILLA"/>
		<reference ref_id="1230783" ref_url="https://bugzilla.suse.com/1230783" source="BUGZILLA"/>
		<reference ref_id="1230786" ref_url="https://bugzilla.suse.com/1230786" source="BUGZILLA"/>
		<reference ref_id="1230791" ref_url="https://bugzilla.suse.com/1230791" source="BUGZILLA"/>
		<reference ref_id="1230794" ref_url="https://bugzilla.suse.com/1230794" source="BUGZILLA"/>
		<reference ref_id="1230796" ref_url="https://bugzilla.suse.com/1230796" source="BUGZILLA"/>
		<reference ref_id="1230802" ref_url="https://bugzilla.suse.com/1230802" source="BUGZILLA"/>
		<reference ref_id="1230806" ref_url="https://bugzilla.suse.com/1230806" source="BUGZILLA"/>
		<reference ref_id="1230808" ref_url="https://bugzilla.suse.com/1230808" source="BUGZILLA"/>
		<reference ref_id="1230810" ref_url="https://bugzilla.suse.com/1230810" source="BUGZILLA"/>
		<reference ref_id="1230812" ref_url="https://bugzilla.suse.com/1230812" source="BUGZILLA"/>
		<reference ref_id="1230813" ref_url="https://bugzilla.suse.com/1230813" source="BUGZILLA"/>
		<reference ref_id="1230814" ref_url="https://bugzilla.suse.com/1230814" source="BUGZILLA"/>
		<reference ref_id="1230815" ref_url="https://bugzilla.suse.com/1230815" source="BUGZILLA"/>
		<reference ref_id="1230821" ref_url="https://bugzilla.suse.com/1230821" source="BUGZILLA"/>
		<reference ref_id="1230825" ref_url="https://bugzilla.suse.com/1230825" source="BUGZILLA"/>
		<reference ref_id="1230830" ref_url="https://bugzilla.suse.com/1230830" source="BUGZILLA"/>
		<reference ref_id="1231013" ref_url="https://bugzilla.suse.com/1231013" source="BUGZILLA"/>
		<reference ref_id="1231017" ref_url="https://bugzilla.suse.com/1231017" source="BUGZILLA"/>
		<reference ref_id="1231116" ref_url="https://bugzilla.suse.com/1231116" source="BUGZILLA"/>
		<reference ref_id="1231120" ref_url="https://bugzilla.suse.com/1231120" source="BUGZILLA"/>
		<reference ref_id="1231146" ref_url="https://bugzilla.suse.com/1231146" source="BUGZILLA"/>
		<reference ref_id="1231180" ref_url="https://bugzilla.suse.com/1231180" source="BUGZILLA"/>
		<reference ref_id="1231181" ref_url="https://bugzilla.suse.com/1231181" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48901" ref_url="https://www.suse.com/security/cve/CVE-2022-48901/" source="CVE"/>
		<reference ref_id="CVE-2022-48911" ref_url="https://www.suse.com/security/cve/CVE-2022-48911/" source="CVE"/>
		<reference ref_id="CVE-2022-48923" ref_url="https://www.suse.com/security/cve/CVE-2022-48923/" source="CVE"/>
		<reference ref_id="CVE-2022-48935" ref_url="https://www.suse.com/security/cve/CVE-2022-48935/" source="CVE"/>
		<reference ref_id="CVE-2022-48944" ref_url="https://www.suse.com/security/cve/CVE-2022-48944/" source="CVE"/>
		<reference ref_id="CVE-2022-48945" ref_url="https://www.suse.com/security/cve/CVE-2022-48945/" source="CVE"/>
		<reference ref_id="CVE-2023-52610" ref_url="https://www.suse.com/security/cve/CVE-2023-52610/" source="CVE"/>
		<reference ref_id="CVE-2023-52916" ref_url="https://www.suse.com/security/cve/CVE-2023-52916/" source="CVE"/>
		<reference ref_id="CVE-2024-26640" ref_url="https://www.suse.com/security/cve/CVE-2024-26640/" source="CVE"/>
		<reference ref_id="CVE-2024-26759" ref_url="https://www.suse.com/security/cve/CVE-2024-26759/" source="CVE"/>
		<reference ref_id="CVE-2024-26767" ref_url="https://www.suse.com/security/cve/CVE-2024-26767/" source="CVE"/>
		<reference ref_id="CVE-2024-26804" ref_url="https://www.suse.com/security/cve/CVE-2024-26804/" source="CVE"/>
		<reference ref_id="CVE-2024-26837" ref_url="https://www.suse.com/security/cve/CVE-2024-26837/" source="CVE"/>
		<reference ref_id="CVE-2024-37353" ref_url="https://www.suse.com/security/cve/CVE-2024-37353/" source="CVE"/>
		<reference ref_id="CVE-2024-38538" ref_url="https://www.suse.com/security/cve/CVE-2024-38538/" source="CVE"/>
		<reference ref_id="CVE-2024-38596" ref_url="https://www.suse.com/security/cve/CVE-2024-38596/" source="CVE"/>
		<reference ref_id="CVE-2024-38632" ref_url="https://www.suse.com/security/cve/CVE-2024-38632/" source="CVE"/>
		<reference ref_id="CVE-2024-40910" ref_url="https://www.suse.com/security/cve/CVE-2024-40910/" source="CVE"/>
		<reference ref_id="CVE-2024-40973" ref_url="https://www.suse.com/security/cve/CVE-2024-40973/" source="CVE"/>
		<reference ref_id="CVE-2024-40983" ref_url="https://www.suse.com/security/cve/CVE-2024-40983/" source="CVE"/>
		<reference ref_id="CVE-2024-41062" ref_url="https://www.suse.com/security/cve/CVE-2024-41062/" source="CVE"/>
		<reference ref_id="CVE-2024-41082" ref_url="https://www.suse.com/security/cve/CVE-2024-41082/" source="CVE"/>
		<reference ref_id="CVE-2024-42154" ref_url="https://www.suse.com/security/cve/CVE-2024-42154/" source="CVE"/>
		<reference ref_id="CVE-2024-42259" ref_url="https://www.suse.com/security/cve/CVE-2024-42259/" source="CVE"/>
		<reference ref_id="CVE-2024-42265" ref_url="https://www.suse.com/security/cve/CVE-2024-42265/" source="CVE"/>
		<reference ref_id="CVE-2024-42304" ref_url="https://www.suse.com/security/cve/CVE-2024-42304/" source="CVE"/>
		<reference ref_id="CVE-2024-42305" ref_url="https://www.suse.com/security/cve/CVE-2024-42305/" source="CVE"/>
		<reference ref_id="CVE-2024-42306" ref_url="https://www.suse.com/security/cve/CVE-2024-42306/" source="CVE"/>
		<reference ref_id="CVE-2024-43828" ref_url="https://www.suse.com/security/cve/CVE-2024-43828/" source="CVE"/>
		<reference ref_id="CVE-2024-43835" ref_url="https://www.suse.com/security/cve/CVE-2024-43835/" source="CVE"/>
		<reference ref_id="CVE-2024-43890" ref_url="https://www.suse.com/security/cve/CVE-2024-43890/" source="CVE"/>
		<reference ref_id="CVE-2024-43898" ref_url="https://www.suse.com/security/cve/CVE-2024-43898/" source="CVE"/>
		<reference ref_id="CVE-2024-43912" ref_url="https://www.suse.com/security/cve/CVE-2024-43912/" source="CVE"/>
		<reference ref_id="CVE-2024-43914" ref_url="https://www.suse.com/security/cve/CVE-2024-43914/" source="CVE"/>
		<reference ref_id="CVE-2024-44935" ref_url="https://www.suse.com/security/cve/CVE-2024-44935/" source="CVE"/>
		<reference ref_id="CVE-2024-44944" ref_url="https://www.suse.com/security/cve/CVE-2024-44944/" source="CVE"/>
		<reference ref_id="CVE-2024-44946" ref_url="https://www.suse.com/security/cve/CVE-2024-44946/" source="CVE"/>
		<reference ref_id="CVE-2024-44948" ref_url="https://www.suse.com/security/cve/CVE-2024-44948/" source="CVE"/>
		<reference ref_id="CVE-2024-44950" ref_url="https://www.suse.com/security/cve/CVE-2024-44950/" source="CVE"/>
		<reference ref_id="CVE-2024-44952" ref_url="https://www.suse.com/security/cve/CVE-2024-44952/" source="CVE"/>
		<reference ref_id="CVE-2024-44954" ref_url="https://www.suse.com/security/cve/CVE-2024-44954/" source="CVE"/>
		<reference ref_id="CVE-2024-44967" ref_url="https://www.suse.com/security/cve/CVE-2024-44967/" source="CVE"/>
		<reference ref_id="CVE-2024-44969" ref_url="https://www.suse.com/security/cve/CVE-2024-44969/" source="CVE"/>
		<reference ref_id="CVE-2024-44970" ref_url="https://www.suse.com/security/cve/CVE-2024-44970/" source="CVE"/>
		<reference ref_id="CVE-2024-44971" ref_url="https://www.suse.com/security/cve/CVE-2024-44971/" source="CVE"/>
		<reference ref_id="CVE-2024-44972" ref_url="https://www.suse.com/security/cve/CVE-2024-44972/" source="CVE"/>
		<reference ref_id="CVE-2024-44977" ref_url="https://www.suse.com/security/cve/CVE-2024-44977/" source="CVE"/>
		<reference ref_id="CVE-2024-44982" ref_url="https://www.suse.com/security/cve/CVE-2024-44982/" source="CVE"/>
		<reference ref_id="CVE-2024-44986" ref_url="https://www.suse.com/security/cve/CVE-2024-44986/" source="CVE"/>
		<reference ref_id="CVE-2024-44987" ref_url="https://www.suse.com/security/cve/CVE-2024-44987/" source="CVE"/>
		<reference ref_id="CVE-2024-44988" ref_url="https://www.suse.com/security/cve/CVE-2024-44988/" source="CVE"/>
		<reference ref_id="CVE-2024-44989" ref_url="https://www.suse.com/security/cve/CVE-2024-44989/" source="CVE"/>
		<reference ref_id="CVE-2024-44990" ref_url="https://www.suse.com/security/cve/CVE-2024-44990/" source="CVE"/>
		<reference ref_id="CVE-2024-44998" ref_url="https://www.suse.com/security/cve/CVE-2024-44998/" source="CVE"/>
		<reference ref_id="CVE-2024-44999" ref_url="https://www.suse.com/security/cve/CVE-2024-44999/" source="CVE"/>
		<reference ref_id="CVE-2024-45000" ref_url="https://www.suse.com/security/cve/CVE-2024-45000/" source="CVE"/>
		<reference ref_id="CVE-2024-45001" ref_url="https://www.suse.com/security/cve/CVE-2024-45001/" source="CVE"/>
		<reference ref_id="CVE-2024-45003" ref_url="https://www.suse.com/security/cve/CVE-2024-45003/" source="CVE"/>
		<reference ref_id="CVE-2024-45006" ref_url="https://www.suse.com/security/cve/CVE-2024-45006/" source="CVE"/>
		<reference ref_id="CVE-2024-45007" ref_url="https://www.suse.com/security/cve/CVE-2024-45007/" source="CVE"/>
		<reference ref_id="CVE-2024-45008" ref_url="https://www.suse.com/security/cve/CVE-2024-45008/" source="CVE"/>
		<reference ref_id="CVE-2024-45011" ref_url="https://www.suse.com/security/cve/CVE-2024-45011/" source="CVE"/>
		<reference ref_id="CVE-2024-45013" ref_url="https://www.suse.com/security/cve/CVE-2024-45013/" source="CVE"/>
		<reference ref_id="CVE-2024-45015" ref_url="https://www.suse.com/security/cve/CVE-2024-45015/" source="CVE"/>
		<reference ref_id="CVE-2024-45018" ref_url="https://www.suse.com/security/cve/CVE-2024-45018/" source="CVE"/>
		<reference ref_id="CVE-2024-45020" ref_url="https://www.suse.com/security/cve/CVE-2024-45020/" source="CVE"/>
		<reference ref_id="CVE-2024-45021" ref_url="https://www.suse.com/security/cve/CVE-2024-45021/" source="CVE"/>
		<reference ref_id="CVE-2024-45026" ref_url="https://www.suse.com/security/cve/CVE-2024-45026/" source="CVE"/>
		<reference ref_id="CVE-2024-45028" ref_url="https://www.suse.com/security/cve/CVE-2024-45028/" source="CVE"/>
		<reference ref_id="CVE-2024-45029" ref_url="https://www.suse.com/security/cve/CVE-2024-45029/" source="CVE"/>
		<reference ref_id="CVE-2024-46673" ref_url="https://www.suse.com/security/cve/CVE-2024-46673/" source="CVE"/>
		<reference ref_id="CVE-2024-46674" ref_url="https://www.suse.com/security/cve/CVE-2024-46674/" source="CVE"/>
		<reference ref_id="CVE-2024-46675" ref_url="https://www.suse.com/security/cve/CVE-2024-46675/" source="CVE"/>
		<reference ref_id="CVE-2024-46676" ref_url="https://www.suse.com/security/cve/CVE-2024-46676/" source="CVE"/>
		<reference ref_id="CVE-2024-46677" ref_url="https://www.suse.com/security/cve/CVE-2024-46677/" source="CVE"/>
		<reference ref_id="CVE-2024-46679" ref_url="https://www.suse.com/security/cve/CVE-2024-46679/" source="CVE"/>
		<reference ref_id="CVE-2024-46685" ref_url="https://www.suse.com/security/cve/CVE-2024-46685/" source="CVE"/>
		<reference ref_id="CVE-2024-46686" ref_url="https://www.suse.com/security/cve/CVE-2024-46686/" source="CVE"/>
		<reference ref_id="CVE-2024-46689" ref_url="https://www.suse.com/security/cve/CVE-2024-46689/" source="CVE"/>
		<reference ref_id="CVE-2024-46694" ref_url="https://www.suse.com/security/cve/CVE-2024-46694/" source="CVE"/>
		<reference ref_id="CVE-2024-46702" ref_url="https://www.suse.com/security/cve/CVE-2024-46702/" source="CVE"/>
		<reference ref_id="CVE-2024-46707" ref_url="https://www.suse.com/security/cve/CVE-2024-46707/" source="CVE"/>
		<reference ref_id="CVE-2024-46714" ref_url="https://www.suse.com/security/cve/CVE-2024-46714/" source="CVE"/>
		<reference ref_id="CVE-2024-46715" ref_url="https://www.suse.com/security/cve/CVE-2024-46715/" source="CVE"/>
		<reference ref_id="CVE-2024-46717" ref_url="https://www.suse.com/security/cve/CVE-2024-46717/" source="CVE"/>
		<reference ref_id="CVE-2024-46720" ref_url="https://www.suse.com/security/cve/CVE-2024-46720/" source="CVE"/>
		<reference ref_id="CVE-2024-46721" ref_url="https://www.suse.com/security/cve/CVE-2024-46721/" source="CVE"/>
		<reference ref_id="CVE-2024-46722" ref_url="https://www.suse.com/security/cve/CVE-2024-46722/" source="CVE"/>
		<reference ref_id="CVE-2024-46723" ref_url="https://www.suse.com/security/cve/CVE-2024-46723/" source="CVE"/>
		<reference ref_id="CVE-2024-46724" ref_url="https://www.suse.com/security/cve/CVE-2024-46724/" source="CVE"/>
		<reference ref_id="CVE-2024-46725" ref_url="https://www.suse.com/security/cve/CVE-2024-46725/" source="CVE"/>
		<reference ref_id="CVE-2024-46726" ref_url="https://www.suse.com/security/cve/CVE-2024-46726/" source="CVE"/>
		<reference ref_id="CVE-2024-46727" ref_url="https://www.suse.com/security/cve/CVE-2024-46727/" source="CVE"/>
		<reference ref_id="CVE-2024-46728" ref_url="https://www.suse.com/security/cve/CVE-2024-46728/" source="CVE"/>
		<reference ref_id="CVE-2024-46730" ref_url="https://www.suse.com/security/cve/CVE-2024-46730/" source="CVE"/>
		<reference ref_id="CVE-2024-46731" ref_url="https://www.suse.com/security/cve/CVE-2024-46731/" source="CVE"/>
		<reference ref_id="CVE-2024-46732" ref_url="https://www.suse.com/security/cve/CVE-2024-46732/" source="CVE"/>
		<reference ref_id="CVE-2024-46737" ref_url="https://www.suse.com/security/cve/CVE-2024-46737/" source="CVE"/>
		<reference ref_id="CVE-2024-46738" ref_url="https://www.suse.com/security/cve/CVE-2024-46738/" source="CVE"/>
		<reference ref_id="CVE-2024-46739" ref_url="https://www.suse.com/security/cve/CVE-2024-46739/" source="CVE"/>
		<reference ref_id="CVE-2024-46743" ref_url="https://www.suse.com/security/cve/CVE-2024-46743/" source="CVE"/>
		<reference ref_id="CVE-2024-46744" ref_url="https://www.suse.com/security/cve/CVE-2024-46744/" source="CVE"/>
		<reference ref_id="CVE-2024-46745" ref_url="https://www.suse.com/security/cve/CVE-2024-46745/" source="CVE"/>
		<reference ref_id="CVE-2024-46746" ref_url="https://www.suse.com/security/cve/CVE-2024-46746/" source="CVE"/>
		<reference ref_id="CVE-2024-46747" ref_url="https://www.suse.com/security/cve/CVE-2024-46747/" source="CVE"/>
		<reference ref_id="CVE-2024-46750" ref_url="https://www.suse.com/security/cve/CVE-2024-46750/" source="CVE"/>
		<reference ref_id="CVE-2024-46751" ref_url="https://www.suse.com/security/cve/CVE-2024-46751/" source="CVE"/>
		<reference ref_id="CVE-2024-46752" ref_url="https://www.suse.com/security/cve/CVE-2024-46752/" source="CVE"/>
		<reference ref_id="CVE-2024-46753" ref_url="https://www.suse.com/security/cve/CVE-2024-46753/" source="CVE"/>
		<reference ref_id="CVE-2024-46755" ref_url="https://www.suse.com/security/cve/CVE-2024-46755/" source="CVE"/>
		<reference ref_id="CVE-2024-46756" ref_url="https://www.suse.com/security/cve/CVE-2024-46756/" source="CVE"/>
		<reference ref_id="CVE-2024-46758" ref_url="https://www.suse.com/security/cve/CVE-2024-46758/" source="CVE"/>
		<reference ref_id="CVE-2024-46759" ref_url="https://www.suse.com/security/cve/CVE-2024-46759/" source="CVE"/>
		<reference ref_id="CVE-2024-46761" ref_url="https://www.suse.com/security/cve/CVE-2024-46761/" source="CVE"/>
		<reference ref_id="CVE-2024-46771" ref_url="https://www.suse.com/security/cve/CVE-2024-46771/" source="CVE"/>
		<reference ref_id="CVE-2024-46772" ref_url="https://www.suse.com/security/cve/CVE-2024-46772/" source="CVE"/>
		<reference ref_id="CVE-2024-46773" ref_url="https://www.suse.com/security/cve/CVE-2024-46773/" source="CVE"/>
		<reference ref_id="CVE-2024-46774" ref_url="https://www.suse.com/security/cve/CVE-2024-46774/" source="CVE"/>
		<reference ref_id="CVE-2024-46778" ref_url="https://www.suse.com/security/cve/CVE-2024-46778/" source="CVE"/>
		<reference ref_id="CVE-2024-46780" ref_url="https://www.suse.com/security/cve/CVE-2024-46780/" source="CVE"/>
		<reference ref_id="CVE-2024-46781" ref_url="https://www.suse.com/security/cve/CVE-2024-46781/" source="CVE"/>
		<reference ref_id="CVE-2024-46783" ref_url="https://www.suse.com/security/cve/CVE-2024-46783/" source="CVE"/>
		<reference ref_id="CVE-2024-46784" ref_url="https://www.suse.com/security/cve/CVE-2024-46784/" source="CVE"/>
		<reference ref_id="CVE-2024-46786" ref_url="https://www.suse.com/security/cve/CVE-2024-46786/" source="CVE"/>
		<reference ref_id="CVE-2024-46787" ref_url="https://www.suse.com/security/cve/CVE-2024-46787/" source="CVE"/>
		<reference ref_id="CVE-2024-46791" ref_url="https://www.suse.com/security/cve/CVE-2024-46791/" source="CVE"/>
		<reference ref_id="CVE-2024-46794" ref_url="https://www.suse.com/security/cve/CVE-2024-46794/" source="CVE"/>
		<reference ref_id="CVE-2024-46798" ref_url="https://www.suse.com/security/cve/CVE-2024-46798/" source="CVE"/>
		<reference ref_id="CVE-2024-46822" ref_url="https://www.suse.com/security/cve/CVE-2024-46822/" source="CVE"/>
		<reference ref_id="CVE-2024-46830" ref_url="https://www.suse.com/security/cve/CVE-2024-46830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-48901: btrfs: do not start relocation until in progress drops are done  (bsc#1229607).
- CVE-2022-48911: kabi: add __nf_queue_get_refs() for kabi compliance.  (bsc#1229633).
- CVE-2022-48923: btrfs: prevent copying too big compressed lzo segment (bsc#1229662)
- CVE-2022-48935: Fixed an unregister flowtable hooks on netns exit (bsc#1229619)
- CVE-2023-52610: net/sched: act_ct: fix skb leak and crash on ooo frags (bsc#1221610).
- CVE-2023-52916: media: aspeed: Fix memory overwrite if timing is 1600x900 (bsc#1230269).
- CVE-2024-26640: tcp: add sanity checks to rx zerocopy (bsc#1221650).
- CVE-2024-26759: mm/swap: fix race when skipping swapcache (bsc#1230340).
- CVE-2024-26767: drm/amd/display: fixed integer types and null check locations  (bsc#1230339).
- CVE-2024-26804: net: ip_tunnel: prevent perpetual headroom growth (bsc#1222629).
- CVE-2024-26837: net: bridge: switchdev: race between creation of new group memberships and generation of the list of MDB events to replay (bsc#1222973).
- CVE-2024-37353: virtio: fixed a double free in vp_del_vqs() (bsc#1226875).
- CVE-2024-38538: net: bridge: xmit: make sure we have at least eth header len bytes (bsc#1226606).
- CVE-2024-38596: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg (bsc#1226846).
- CVE-2024-40910: Fix refcount imbalance on inbound connections (bsc#1227832).
- CVE-2024-40973: media: mtk-vcodec: potential null pointer deference in SCP (bsc#1227890).
- CVE-2024-40983: tipc: force a dst refcount before doing decryption (bsc#1227819).
- CVE-2024-41062: Sync sock recv cb and release (bsc#1228576).
- CVE-2024-41082: nvme-fabrics: use reserved tag for reg read/write command  (bsc#1228620 CVE-2024-41082).
- CVE-2024-42154: tcp_metrics: validate source addr length (bsc#1228507).
- CVE-2024-42259: Fix Virtual Memory mapping boundaries calculation (bsc#1229156)
- CVE-2024-42265: protect the fetch of -&gt;fd[fd] in do_dup2() from mispredictions (bsc#1229334).
- CVE-2024-42304: ext4: make sure the first directory block is not a hole (bsc#1229364).
- CVE-2024-42305: ext4: check dot and dotdot of dx_root before making dir indexed (bsc#1229363).
- CVE-2024-42306: udf: Avoid using corrupted block bitmap buffer (bsc#1229362).
- CVE-2024-43828: ext4: fix infinite loop when replaying fast_commit (bsc#1229394).
- CVE-2024-43890: tracing: Fix overflow in get_free_elt() (bsc#1229764).
- CVE-2024-43898: ext4: sanity check for NULL pointer after ext4_force_shutdown (bsc#1229753).
- CVE-2024-43912: wifi: nl80211: disallow setting special AP channel widths (bsc#1229830)
- CVE-2024-43914: md/raid5: avoid BUG_ON() while continue reshape after reassembling (bsc#1229790).
- CVE-2024-44935: sctp: Fix null-ptr-deref in reuseport_add_sock() (bsc#1229810).
- CVE-2024-44944: netfilter: ctnetlink: use helper function to calculate expect ID (bsc#1229899).
- CVE-2024-44946: kcm: Serialise kcm_sendmsg() for the same socket (bsc#1230015).
- CVE-2024-44950: serial: sc16is7xx: fix invalid FIFO access with special register set (bsc#1230180).
- CVE-2024-44952: driver core: Fix uevent_show() vs driver detach race  (bsc#1230178).
- CVE-2024-44954: ALSA: line6: Fix racy access to midibuf (bsc#1230176).
- CVE-2024-44970: net/mlx5e: SHAMPO, Fix invalid WQ linked list unlink (bsc#1230209).
- CVE-2024-44971: net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register() (bsc#1230211).
- CVE-2024-44986: ipv6: fix possible UAF in ip6_finish_output2() (bsc#1230230)
- CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185).
- CVE-2024-44988: net: dsa: mv88e6xxx: Fix out-of-bound access (bsc#1230192).
- CVE-2024-44989: bonding: fix xfrm real_dev null pointer dereference (bsc#1230193).
- CVE-2024-44990: bonding: fix null pointer deref in bond_ipsec_offload_ok (bsc#1230194).
- CVE-2024-44998: atm: idt77252: prevent use after free in dequeue_rx() (bsc#1230171).
- CVE-2024-44999: gtp: pull network headers in gtp_dev_xmit() (bsc#1230233).
- CVE-2024-45003: Don't evict inode under the inode lru traversing context (bsc#1230245).
- CVE-2024-45007: char: xillybus: Refine workqueue handling (bsc#1230175).
- CVE-2024-45008: Input: MT - limit max slots (bsc#1230248).
- CVE-2024-45013: nvme: move stopping keep-alive into nvme_uninit_ctrl() (bsc#1230442).
- CVE-2024-45015: drm/msm/dpu: move dpu_encoder's connector assignment to (bsc#1230444)
- CVE-2024-45018: netfilter: flowtable: initialise extack before use (bsc#1230431).
- CVE-2024-45021: memcg_write_event_control(): fix a user-triggerable oops (bsc#1230434).
- CVE-2024-45029: i2c: tegra: Do not mark ACPI devices as irq safe (bsc#1230451).
- CVE-2024-46673: scsi: aacraid: Fix double-free on probe failure (bsc#1230506).
- CVE-2024-46674: usb: dwc3: st: fix probed platform device ref count on probe  error path (bsc#1230507).
- CVE-2024-46677: gtp: fix a potential NULL pointer dereference (bsc#1230549).
- CVE-2024-46679: ethtool: check device is present when getting link settings (bsc#1230556).
- CVE-2024-46685: pinctrl: single: fix potential NULL dereference in pcs_get_function() (bsc#1230515)
- CVE-2024-46686: smb/client: avoid dereferencing rdata=NULL in smb2_new_read_req() (bsc#1230517).
- CVE-2024-46689: soc: qcom: cmd-db: Map shared memory as WC, not WB (bsc#1230524)
- CVE-2024-46702: thunderbolt: Mark XDomain as unplugged when router is removed (bsc#1230589)
- CVE-2024-46707: KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3  (bsc#1230582).
- CVE-2024-46715: driver: iio: add missing checks on iio_info's callback access  (bsc#1230700).
- CVE-2024-46717: net/mlx5e: SHAMPO, Fix incorrect page release (bsc#1230719).
- CVE-2024-46721: pparmor: fix possible NULL pointer dereference (bsc#1230710)
- CVE-2024-46728: drm/amd/display: Check index for aux_rd_interval before using (bsc#1230703)
- CVE-2024-46730: drm/amd/display: Ensure array index tg_inst won't be -1 (bsc#1230701)
- CVE-2024-46743: of/irq: Prevent device address out-of-bounds read in interrupt map walk (bsc#1230756).
- CVE-2024-46750: PCI: Add missing bridge lock to pci_bus_lock() (bsc#1230783).
- CVE-2024-46751: btrfs: do not BUG_ON() when 0 reference count at btrfs_lookup_extent_info() (bsc#1230786).
- CVE-2024-46752: btrfs: reduce nesting for extent processing at btrfs_lookup_extent_info() (bsc#1230794).
- CVE-2024-46753: btrfs: handle errors from btrfs_dec_ref() properly (bsc#1230796).
- CVE-2024-46772: drm/amd/display: Check denominator crb_pipes before used (bsc#1230772).
- CVE-2024-46783: tcp_bpf: fix return value of tcp_bpf_sendmsg() (bsc#1230810).
- CVE-2024-46787: userfaultfd: fix checks for huge PMDs (bsc#1230815).
- CVE-2024-46794: x86/tdx: Fix data leak in mmio_read() (bsc#1230825).
- CVE-2024-46822: arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry (bsc#1231120).
- CVE-2024-46830: KVM: x86: Acquire kvm-&gt;srcu when handling KVM_SET_VCPU_EVENTS  (bsc#1231116).

The following non-security bugs were fixed:

- ACPI: battery: create alarm sysfs attribute atomically (git-fixes).
- ACPI: CPPC: Fix MASK_VAL() usage (git-fixes).
- ACPI: PMIC: Remove unneeded check in tps68470_pmic_opregion_probe() (git-fixes).
- ACPI: processor: Fix memory leaks in error paths of processor_add() (stable-fixes).
- ACPI: processor: Return an error if acpi_processor_get_info() fails in processor_add() (stable-fixes).
- ACPI: SBS: manage alarm sysfs attribute through psy core (git-fixes).
- ACPI: sysfs: validate return type of _STR method (git-fixes).
- af_unix: annotate lockless accesses to sk-&gt;sk_err (bsc#1226846).
- af_unix: Fix data races around sk-&gt;sk_shutdown (bsc#1226846).
- af_unix: Fix data-races around sk-&gt;sk_shutdown (git-fixes).
- ALSA: hda: Add input value sanity checks to HDMI channel map controls (stable-fixes).
- ALSA: hda/conexant: Add pincfg quirk to enable top speakers on Sirius devices (stable-fixes).
- ALSA: hda/conexant: Mute speakers at suspend / shutdown (stable-fixes).
- ALSA: hda/generic: Add a helper to mute speakers at suspend/shutdown (stable-fixes).
- ALSA: hda/realtek: Support mute LED on HP Laptop 14-dq2xxx (stable-fixes).
- apparmor: fix possible NULL pointer dereference (stable-fixes).
- arm64: acpi: Move get_cpu_for_acpi_id() to a header (git-fixes).
- arm64: dts: rockchip: Correct the Pinebook Pro battery design capacity (git-fixes).
- arm64: dts: rockchip: fix PMIC interrupt pin in pinctrl for ROCK Pi E (git-fixes).
- arm64: dts: rockchip: Raise Pinebook Pro's panel backlight PWM frequency (git-fixes).
- arm64/mm: Modify range-based tlbi to decrement scale (bsc#1229585)
- arm64/mm: Update tlb invalidation routines for FEAT_LPA2 (bsc#1229585)
- arm64: tlb: Allow range operation for MAX_TLBI_RANGE_PAGES (bsc#1229585)
- arm64: tlb: Fix TLBI RANGE operand (bsc#1229585)
- arm64: tlb: Improve __TLBI_VADDR_RANGE() (bsc#1229585)
- ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object (git-fixes).
- ASoC: meson: axg-card: fix 'use-after-free' (git-fixes).
- ASoc: SOF: topology: Clear SOF link platform name upon unload (git-fixes).
- ASoC: sunxi: sun4i-i2s: fix LRCLK polarity in i2s mode (git-fixes).
- ASoC: tegra: Fix CBB error during probe() (git-fixes).
- ASoC: topology: Properly initialize soc_enum values (stable-fixes).
- ata: libata: Fix memory leak for error path in ata_host_alloc() (git-fixes).
- ata: pata_macio: Use WARN instead of BUG (stable-fixes).
- blk-mq: add helper for checking if one CPU is mapped to specified hctx (bsc#1223600).
- blk-mq: add number of queue calc helper (bsc#1229034).
- blk-mq: Build default queue map via group_cpus_evenly() (bsc#1229031).
- blk-mq: do not schedule block kworker on isolated CPUs (bsc#1223600).
- blk-mq: introduce blk_mq_dev_map_queues (bsc#1229034).
- blk-mq: issue warning when offlining hctx with online isolcpus (bsc#1229034).
- blk-mq: use hk cpus only when isolcpus=io_queue is enabled (bsc#1229034).
- Bluetooth: btusb: Fix not handling ZPL/short-transfer (git-fixes).
- Bluetooth: hci_core: Fix sending MGMT_EV_CONNECT_FAILED (git-fixes).
- Bluetooth: hci_sync: Ignore errors from HCI_OP_REMOTE_NAME_REQ_CANCEL (git-fixes).
- Bluetooth: L2CAP: Fix deadlock (git-fixes).
- Bluetooth: MGMT: Ignore keys being loaded with invalid type (git-fixes).
- cachefiles: fix dentry leak in cachefiles_open_file() (bsc#1231181).
- cachefiles: Fix non-taking of sb_writers around set/removexattr (bsc#1231013).
- can: bcm: Clear bo-&gt;bcm_proc_read after remove_proc_entry() (git-fixes).
- can: bcm: Remove proc entry when dev is unregistered (git-fixes).
- can: j1939: use correct function name in comment (git-fixes).
- can: mcp251x: fix deadlock if an interrupt occurs during mcp251x_open (git-fixes).
- cdc-acm: Add DISABLE_ECHO quirk for GE HealthCare UI Controller (git-fixes).
- ceph: remove the incorrect Fw reference check when dirtying pages (bsc#1231180).
- char: xillybus: Check USB endpoints when probing device (git-fixes).
- clk: qcom: clk-alpha-pll: Fix the pll post div mask (git-fixes).
- clk: qcom: clk-alpha-pll: Fix the trion pll postdiv set rate API (git-fixes).
- clk: qcom: clk-alpha-pll: Fix zonda set_rate failure when PLL is disabled (git-fixes).
- cpufreq: ti-cpufreq: Introduce quirks to handle syscon fails appropriately (git-fixes).
- crypto: ccp - Properly unregister /dev/sev on sev PLATFORM_STATUS failure (git-fixes).
- crypto: virtio - Handle dataq logic with tasklet (git-fixes).
- crypto: virtio - Wait for tasklet to complete on device remove (git-fixes).
- crypto: xor - fix template benchmarking (git-fixes).
- devres: Initialize an uninitialized struct member (stable-fixes).
- driver core: Add debug logs when fwnode links are added/deleted (git-fixes).
- driver core: Add missing parameter description to __fwnode_link_add() (git-fixes).
- driver core: Create __fwnode_link_del() helper function (git-fixes).
- driver core: fw_devlink: Allow marking a fwnode link as being part of a cycle (git-fixes).
- driver core: fw_devlink: Consolidate device link flag computation (git-fixes).
- driver core: Set deferred probe reason when deferred by driver core (git-fixes).
- drivers:drm:exynos_drm_gsc:Fix wrong assignment in gsc_bind() (git-fixes).
- Drivers: hv: vmbus: Fix rescind handling in uio_hv_generic (git-fixes).
- Drivers: hv: vmbus: Fix the misplaced function description (git-fixes).
- drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error (git-fixes).
- drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error (git-fixes).
- drm/amd/amdgpu: Check tbo resource pointer (stable-fixes).
- drm/amd/amdgpu: Properly tune the size of struct (git-fixes).
- drm/amd/display: Add array index check for hdcp ddc access (stable-fixes).
- drm/amd/display: added NULL check at start of dc_validate_stream (stable-fixes).
- drm/amd/display: Assign linear_pitch_alignment even for VM (stable-fixes).
- drm/amd/display: Check denominator pbn_div before used (stable-fixes).
- drm/amd/display: Check gpio_id before used as array index (stable-fixes).
- drm/amd/display: Check HDCP returned status (stable-fixes).
- drm/amd/display: Check msg_id before processing transcation (stable-fixes).
- drm/amd/display: Check num_valid_sets before accessing reader_wm_sets[] (stable-fixes).
- drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX (stable-fixes).
- drm/amd/display: Ensure index calculation will not overflow (stable-fixes).
- drm/amd/display: Fix Coverity INTEGER_OVERFLOW within dal_gpio_service_create (stable-fixes).
- drm/amd/display: Skip inactive planes within ModeSupportAndSystemConfiguration (stable-fixes).
- drm/amd/display: Skip wbscl_set_scaler_filter if filter is null (stable-fixes).
- drm/amd/display: Spinlock before reading event (stable-fixes).
- drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (stable-fixes).
- drm/amdgpu/atomfirmware: Silence UBSAN warning (stable-fixes).
- drm/amdgpu: avoid reading vf2pf info size from FB (stable-fixes).
- drm/amdgpu: check for LINEAR_ALIGNED correctly in check_tiling_flags_gfx6 (stable-fixes).
- drm/amdgpu: clear RB_OVERFLOW bit when enabling interrupts (stable-fixes).
- drm/amdgpu: fix a possible null pointer dereference (git-fixes).
- drm/amdgpu: fix dereference after null check (stable-fixes).
- drm/amdgpu: fix mc_data out-of-bounds read warning (stable-fixes).
- drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number (stable-fixes).
- drm/amdgpu: Fix out-of-bounds write warning (stable-fixes).
- drm/amdgpu: fix overflowed array index read warning (stable-fixes).
- drm/amdgpu: Fix smatch static checker warning (stable-fixes).
- drm/amdgpu: fix the waring dereferencing hive (stable-fixes).
- drm/amdgpu: fix ucode out-of-bounds read warning (stable-fixes).
- drm/amdgpu: Fix uninitialized variable warning in amdgpu_afmt_acr (stable-fixes).
- drm/amdgpu/pm: Check input value for CUSTOM profile mode setting on legacy SOCs (stable-fixes).
- drm/amdgpu/pm: Check the return value of smum_send_msg_to_smc (stable-fixes).
- drm/amdgpu/pm: Fix uninitialized variable agc_btc_response (stable-fixes).
- drm/amdgpu/pm: Fix uninitialized variable warning for smu10 (stable-fixes).
- drm/amdgpu: Set no_hw_access when VF request full GPU fails (stable-fixes).
- drm/amdgpu: the warning dereferencing obj for nbio_v7_4 (stable-fixes).
- drm/amdgpu: update type of buf size to u32 for eeprom functions (stable-fixes).
- drm/amdkfd: Reconcile the definition and use of oem_id in struct kfd_topology_device (stable-fixes).
- drm/amd/pm: check negtive return for table entries (stable-fixes).
- drm/amd/pm: check specific index for aldebaran (stable-fixes).
- drm/amd/pm: Fix negative array index read (stable-fixes).
- drm/amd/pm: fix the Out-of-bounds read warning (stable-fixes).
- drm/amd/pm: fix uninitialized variable warning for smu8_hwmgr (stable-fixes).
- drm/amd/pm: fix uninitialized variable warnings for vangogh_ppt (stable-fixes).
- drm/amd/pm: fix uninitialized variable warnings for vega10_hwmgr (stable-fixes).
- drm/amd/pm: fix uninitialized variable warning (stable-fixes).
- drm/amd/pm: fix warning using uninitialized value of max_vid_step (stable-fixes).
- drm/bridge: lontium-lt8912b: Validate mode in drm_bridge_funcs::mode_valid() (git-fixes).
- drm/bridge: tc358767: Check if fully initialized before signalling HPD event via IRQ (stable-fixes).
- drm/i915/fence: Mark debug_fence_free() with __maybe_unused (git-fixes).
- drm/i915/fence: Mark debug_fence_init_onstack() with __maybe_unused (git-fixes).
- drm/i915/guc: prevent a possible int overflow in wq offsets (git-fixes).
- drm/meson: plane: Add error handling (stable-fixes).
- drm/msm/a5xx: disable preemption in submits by default (git-fixes).
- drm/msm/a5xx: fix races in preemption evaluation stage (git-fixes).
- drm/msm/a5xx: properly clear preemption records on resume (git-fixes).
- drm/msm/a5xx: workaround early ring-buffer emptiness check (git-fixes).
- drm/msm/adreno: Fix error return if missing firmware-name (stable-fixes).
- drm/msm/disp/dpu: use atomic enable/disable callbacks for encoder (bsc#1230444)
- drm/msm: Fix incorrect file name output in adreno_request_fw() (git-fixes).
- drm/msm: fix %s null argument error (git-fixes).
- drm: omapdrm: Add missing check for alloc_ordered_workqueue (git-fixes).
- drm/radeon/evergreen_cs: fix int overflow errors in cs track offsets (git-fixes).
- drm/radeon: fix null pointer dereference in radeon_add_common_modes (git-fixes).
- drm/rockchip: dw_hdmi: Fix reading EDID when using a forced mode (git-fixes).
- drm/rockchip: vop: Allow 4096px width scaling (git-fixes).
- drm/stm: ltdc: check memory returned by devm_kzalloc() (git-fixes).
- exfat: fix memory leak in exfat_load_bitmap() (git-fixes).
- fbdev: hpfb: Fix an error handling path in hpfb_dio_probe() (git-fixes).
- filemap: remove use of wait bookmarks (bsc#1224085).
- firmware_loader: Block path traversal (git-fixes).
- fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF (bsc#1230592).
- fuse: update stats for pages in dropped aux writeback list (bsc#1230130).
- fuse: use unsigned type for getxattr/listxattr size truncation (bsc#1230129).
- genirq/affinity: Do not pass irq_affinity_desc array to irq_build_affinity_masks (bsc#1229031).
- genirq/affinity: Move group_cpus_evenly() into lib/ (bsc#1229031).
- genirq/affinity: Only build SMP-only helper functions on SMP kernels (bsc#1229031).
- genirq/affinity: Pass affinity managed mask array to irq_build_affinity_masks (bsc#1229031).
- genirq/affinity: Remove the 'firstvec' parameter from irq_build_affinity_masks (bsc#1229031).
- genirq/affinity: Rename irq_build_affinity_masks as group_cpus_evenly (bsc#1229031).
- genirq/affinity: Replace cpumask_weight() with cpumask_empty() where appropriate (bsc#1229031).
- gfs2: setattr_chown: Add missing initialization (git-fixes).
- HID: amd_sfh: free driver_data after destroying hid device (stable-fixes).
- HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup (stable-fixes).
- hwmon: (adc128d818) Fix underflows seen when writing limit attributes (stable-fixes).
- hwmon: (lm95234) Fix underflows seen when writing limit attributes (stable-fixes).
- hwmon: (max16065) Fix overflows seen when writing limits (git-fixes).
- hwmon: (ntc_thermistor) fix module autoloading (git-fixes).
- hwmon: (w83627ehf) Fix underflows seen when writing limit attributes (stable-fixes).
- hwrng: bcm2835 - Add missing clk_disable_unprepare in bcm2835_rng_init (git-fixes).
- hwrng: cctrng - Add missing clk_disable_unprepare in cctrng_resume (git-fixes).
- hwrng: mtk - Use devm_pm_runtime_enable (git-fixes).
- i2c: aspeed: Update the stop sw state when the bus recovery occurs (git-fixes).
- i2c: Fix conditional for substituting empty ACPI functions (stable-fixes).
- i2c: isch: Add missed 'else' (git-fixes).
- i2c: qcom-geni: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- i2c: Use IS_REACHABLE() for substituting empty ACPI functions (git-fixes).
- i2c: xiic: Wait for TX empty to avoid missed TX NAKs (git-fixes).
- i3c: mipi-i3c-hci: Error out instead on BUG_ON() in IBI DMA setup (stable-fixes).
- IB/core: Fix ib_cache_setup_one error flow cleanup (git-fixes)
- IB/hfi1: Fix potential deadlock on &amp;irq_src_lock and &amp;dd-&gt;uctxt_lock (git-fixes)
- iio: adc: ad7124: fix chip ID mismatch (git-fixes).
- iio: adc: ad7124: fix config comparison (git-fixes).
- iio: adc: ad7606: fix oversampling gpio array (git-fixes).
- iio: adc: ad7606: fix standby gpio state to match the documentation (git-fixes).
- iio: buffer-dmaengine: fix releasing dma channel on error (git-fixes).
- iio: chemical: bme680: Fix read/write ops to device by adding mutexes (git-fixes).
- iio: fix scale application in iio_convert_raw_to_processed_unlocked (git-fixes).
- iio: magnetometer: ak8975: Fix reading for ak099xx sensors (git-fixes).
- Input: ilitek_ts_i2c - add report id message validation (git-fixes).
- Input: ilitek_ts_i2c - avoid wrong input subsystem sync (git-fixes).
- Input: ps2-gpio - use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- Input: uinput - reject requests with unreasonable number of slots (stable-fixes).
- ipmi: docs: do not advertise deprecated sysfs entries (git-fixes).
- ipmi:ssif: Improve detecting during probing (bsc#1228771)
- ipmi:ssif: Improve detecting during probing (bsc#1228771) 
- jfs: fix out-of-bounds in dbNextAG() and diAlloc() (git-fixes).
- kabi: add __nf_queue_get_refs() for kabi compliance.
- kABI, crypto: virtio - Handle dataq logic with tasklet (git-fixes).
- kthread: Fix task state in kthread worker if being frozen (bsc#1231146).
- lib/group_cpus.c: avoid acquiring cpu hotplug lock in group_cpus_evenly (bsc#1229031).
- lib/group_cpus.c: honor housekeeping config when grouping CPUs (bsc#1229034).
- lib/group_cpus: Export group_cpus_evenly() (bsc#1229031).
- lirc: rc_dev_get_from_fd(): fix file leak (git-fixes).
- mailbox: bcm2835: Fix timeout during suspend mode (git-fixes).
- mailbox: rockchip: fix a typo in module autoloading (git-fixes).
- media: aspeed: Fix no complete irq for non-64-aligned width (bsc#1230269)
- media: qcom: camss: Add check for v4l2_fwnode_endpoint_parse (stable-fixes).
- media: qcom: camss: Fix ordering of pm_runtime_enable (git-fixes).
- media: Revert 'media: dvb-usb: Fix unexpected infinite loop in dvb_usb_read_remote_control()' (git-fixes).
- media: sun4i_csi: Implement link validate for sun4i_csi subdev (git-fixes).
- media: uapi/linux/cec.h: cec_msg_set_reply_to: zero flags (git-fixes).
- media: uvcvideo: Enforce alignment of frame and interval (stable-fixes).
- media: venus: fix use after free bug in venus_remove due to race condition (git-fixes).
- media: vicodec: allow en/decoder cmd w/o CAPTURE (git-fixes).
- media: vivid: do not set HDMI TX controls if there are no HDMI outputs (stable-fixes).
- media: vivid: fix wrong sizeimage value for mplane (stable-fixes).
- mmc: cqhci: Fix checking of CQHCI_HALT state (git-fixes).
- mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K (git-fixes).
- mmc: sdhci-of-aspeed: fix module autoloading (git-fixes).
- mtd: powernv: Add check devm_kasprintf() returned value (git-fixes).
- mtd: slram: insert break after errors in parsing the map (git-fixes).
- net: drop bad gso csum_start and offset in virtio_net_hdr (git-fixes).
- net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (git-fixes).
- net: missing check virtio (git-fixes).
- net: tighten bad gso csum offset check in virtio_net_hdr (git-fixes).
- nf_conntrack_proto_udp: do not accept packets with IPS_NAT_CLASH (bsc#1199769).
- NFSD: Fix frame size warning in svc_export_parse() (git-fixes).
- NFS: Do not re-read the entire page cache to find the next cookie (bsc#1226662).
- NFSD: Rewrite synopsis of nfsd_percpu_counters_init() (git-fixes).
- NFS: never reuse a NFSv4.0 lock-owner (bsc#1227726).
- NFS: Reduce use of uncached readdir (bsc#1226662).
- NFSv4: Add missing rescheduling points in nfs_client_return_marked_delegations (git-fixes).
- nilfs2: Constify struct kobj_type (git-fixes).
- nilfs2: determine empty node blocks as corrupted (git-fixes).
- nilfs2: fix missing cleanup on rollforward recovery error (git-fixes).
- nilfs2: fix potential null-ptr-deref in nilfs_btree_insert() (git-fixes).
- nilfs2: fix potential oob read in nilfs_btree_check_delete() (git-fixes).
- nilfs2: fix state management in error path of log writing function (git-fixes).
- nilfs2: protect references to superblock parameters exposed in sysfs (git-fixes).
- nilfs2: replace snprintf in show functions with sysfs_emit (git-fixes).
- nilfs2: use default_groups in kobj_type (git-fixes).
- nvme: move stopping keep-alive into nvme_uninit_ctrl() (git-fixes).
- nvme/pci: Add APST quirk for Lenovo N60z laptop (git-fixes).
- nvme-pci: Add sleep quirk for Samsung 990 Evo (git-fixes).
- nvme-pci: use block layer helpers to calculate num of queues (bsc#1229034).
- nvme: replace blk_mq_pci_map_queues with blk_mq_dev_map_queues (bsc#1229034).
- nvmet: Identify-Active Namespace ID List command should reject invalid nsid (git-fixes).
- nvmet-rdma: fix possible bad dereference when freeing rsps (git-fixes).
- nvmet-tcp: do not continue for invalid icreq (git-fixes).
- nvmet-tcp: fix kernel crash if commands allocation fails (git-fixes).
- nvmet-trace: avoid dereferencing pointer too early (git-fixes).
- ocfs2: cancel dqi_sync_work before freeing oinfo (git-fixes).
- ocfs2: fix null-ptr-deref when journal load failed (git-fixes).
- ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate (git-fixes).
- ocfs2: remove unreasonable unlock in ocfs2_read_blocks (git-fixes).
- PCI: Add missing bridge lock to pci_bus_lock() (stable-fixes).
- PCI: al: Check IORESOURCE_BUS existence during probe (git-fixes).
- PCI/ASPM: Move pci_function_0() upward (bsc#1226915)
- PCI/ASPM: Remove struct aspm_latency (bsc#1226915)
- PCI/ASPM: Stop caching device L0s, L1 acceptable exit latencies (bsc#1226915)
- PCI/ASPM: Stop caching link L0s, L1 exit latencies (bsc#1226915)
- PCI: dra7xx: Fix error handling when IRQ request fails in probe (git-fixes).
- PCI: dwc: Expose dw_pcie_ep_exit() to module (git-fixes).
- PCI: dwc: Restore MSI Receiver mask during resume (git-fixes).
- pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv (stable-fixes).
- PCI: keystone: Add workaround for Errata #i2037 (AM65x SR 1.0) (stable-fixes).
- PCI: keystone: Fix if-statement expression in ks_pcie_quirk() (git-fixes).
- PCI: Support BAR sizes up to 8TB (bsc#1231017)
- PCI: Wait for Link before restoring Downstream Buses (git-fixes).
- PCI: xilinx-nwl: Clean up clock on probe failure/removal (git-fixes).
- PCI: xilinx-nwl: Fix off-by-one in INTx IRQ handler (git-fixes).
- PCI: xilinx-nwl: Fix register misspelling (git-fixes).
- pcmcia: Use resource_size function on resource object (stable-fixes).
- pinctrl: single: fix missing error code in pcs_probe() (git-fixes).
- pinctrl: single: fix potential NULL dereference in pcs_get_function() (git-fixes).
- PKCS#7: Check codeSigning EKU of certificates in PKCS#7 (bsc#1226666).
- platform/x86: dell-smbios: Fix error path in dell_smbios_init() (git-fixes).
- platform/x86: panasonic-laptop: Allocate 1 entry extra in the sinf array (git-fixes).
- platform/x86: panasonic-laptop: Fix SINF array out of bounds accesses (git-fixes).
- power: supply: axp20x_battery: Remove design from min and max voltage (git-fixes).
- power: supply: Drop use_cnt check from power_supply_property_is_writeable() (git-fixes).
- power: supply: hwmon: Fix missing temp1_max_alarm attribute (git-fixes).
- power: supply: max17042_battery: Fix SOC threshold calc w/ no current sense (git-fixes).
- RDMA/core: Remove unused declaration rdma_resolve_ip_route() (git-fixes)
- RDMA/cxgb4: Added NULL check for lookup_atid (git-fixes)
- RDMA/efa: Properly handle unexpected AQ completions (git-fixes)
- RDMA/hns: Do not modify rq next block addr in HIP09 QPC (git-fixes)
- RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled (git-fixes)
- RDMA/hns: Fix the overflow risk of hem_list_calc_ba_range() (git-fixes)
- RDMA/hns: Fix VF triggering PF reset in abnormal interrupt handler (git-fixes)
- RDMA/hns: Optimize hem allocation performance (git-fixes)
- RDMA/irdma: fix error message in irdma_modify_qp_roce() (git-fixes)
- RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency (git-fixes)
- RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds (git-fixes)
- RDMA/rtrs: Fix the problem of variable not initialized fully (git-fixes)
- RDMA/rtrs: Reset hb_missed_cnt after receiving other traffic from peer (git-fixes)
- Restore dropped fields for bluetooth MGMT/SMP structs (git-fixes).
- Revert 'Bluetooth: MGMT/SMP: Fix address type when using SMP over BREDR/LE' (git-fixes).
- Revert 'media: tuners: fix error return code of hybrid_tuner_request_state()' (git-fixes).
- Revert 'media: tuners: fix error return code of hybrid_tuner_request_state()' (stable-fixes).
- rtc: at91sam9: fix OF node leak in probe() error path (git-fixes).
- scsi: ibmvfc: Add max_sectors module parameter (bsc#1216223).
- scsi: lpfc: Change diagnostic log flag during receipt of unknown ELS cmds (bsc#1229429).
- scsi: lpfc: Copyright updates for 14.4.0.4 patches (bsc#1229429).
- scsi: lpfc: Fix overflow build issue (bsc#1229429).
- scsi: lpfc: Fix unintentional double clearing of vmid_flag (bsc#1229429).
- scsi: lpfc: Fix unsolicited FLOGI kref imbalance when in direct attached topology (bsc#1229429).
- scsi: lpfc: Remove redundant vport assignment when building an abort request (bsc#1229429).
- scsi: lpfc: Update lpfc version to 14.4.0.4 (bsc#1229429).
- scsi: lpfc: Update PRLO handling in direct attached topology (bsc#1229429).
- scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths (bsc#1229429).
- scsi: pm8001: do not overwrite PCI queue mapping (bsc#1229034).
- scsi: replace blk_mq_pci_map_queues with blk_mq_dev_map_queues (bsc#1229034).
- scsi: sd: Fix off-by-one error in sd_read_block_characteristics() (bsc#1223848).
- scsi: use block layer helpers to calculate num of queues (bsc#1229034).
- spi: nxp-fspi: fix the KASAN report out-of-bounds bug (git-fixes).
- Squashfs: sanity check symbolic link size (git-fixes).
- staging: iio: frequency: ad9834: Validate frequency parameter value (git-fixes).
- thunderbolt: Mark XDomain as unplugged when router is removed (stable-fixes).
- tomoyo: fallback to realpath if symlink's pathname does not exist (git-fixes).
- tools/virtio: fix build (git-fixes).
- tpm: Clean up TPM space after command failure (git-fixes).
- tracing: Avoid possible softlockup in tracing_iter_reset() (git-fixes).
- tty: rp2: Fix reset with non forgiving PCIe host bridges (git-fixes).
- udp: fix receiving fraglist GSO packets (git-fixes).
- uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (git-fixes).
- usb: cdnsp: Fix incorrect usb_request status (git-fixes).
- USB: class: CDC-ACM: fix race between get_serial and set_serial (git-fixes).
- usb: dwc2: drd: fix clock gating on USB role switch (git-fixes).
- usb: dwc2: Skip clock gating on Broadcom SoCs (git-fixes).
- usb: dwc3: core: Prevent USB core invalid event buffer address access (git-fixes).
- usb: dwc3: core: Skip setting event buffers for host only controllers (git-fixes).
- usb: dwc3: core: update LC timer as per USB Spec V3.2 (git-fixes).
- usb: dwc3: omap: add missing depopulate in probe error path (git-fixes).
- usb: dwc3: st: add missing depopulate in probe error path (git-fixes).
- usb: dwc3: st: fix probed platform device ref count on probe error path (git-fixes).
- usbip: Do not submit special requests twice (stable-fixes).
- usbnet: fix cyclical race on disconnect with work queue (git-fixes).
- usbnet: ipheth: race between ipheth_close and error handling (git-fixes).
- usbnet: modern method to get random MAC (git-fixes).
- USB: serial: kobil_sct: restore initial terminal settings (git-fixes).
- USB: serial: option: add MeiG Smart SRM825L (git-fixes).
- usb: typec: ucsi: Fix null pointer dereference in trace (stable-fixes).
- usb: uas: set host status byte on data completion error (git-fixes).
- usb: uas: set host status byte on data completion error (stable-fixes).
- USB: usbtmc: prevent kernel-usb-infoleak (git-fixes).
- usb: xhci: fix loss of data on Cadence xHC (git-fixes).
- vhost: Add smp_rmb() in vhost_vq_avail_empty() (git-fixes).
- vhost-vdpa: switch to use vmf_insert_pfn() in the fault handler (git-fixes).
- virito: add APIs for retrieving vq affinity (bsc#1229034).
- virtio-blk: Ensure no requests in virtqueues before deleting vqs (git-fixes).
- virtio: blk/scsi: use block layer helpers to calculate num of queues (bsc#1229034).
- virtio: blk/scs: replace blk_mq_virtio_map_queues with blk_mq_dev_map_queues (bsc#1229034).
- virtiofs: forbid newlines in tags (bsc#1230591).
- virtio_net: checksum offloading handling fix (git-fixes).
- virtio_net: Fix ''%d' directive writing between 1 and 11 bytes into a region of size 10' warnings (git-fixes).
- virtio_net: use u64_stats_t infra to avoid data-races (git-fixes).
- virtio: reenable config if freezing device failed (git-fixes).
- virtio/vsock: fix logic which reduces credit update messages (git-fixes).
- VMCI: Fix use-after-free when removing resource in vmci_resource_remove() (git-fixes).
- vsock/virtio: add support for device suspend/resume (git-fixes).
- vsock/virtio: factor our the code to initialize and delete VQs (git-fixes).
- vsock/virtio: initialize the_virtio_vsock before using VQs (git-fixes).
- vsock/virtio: remove socket from connected/bound list on shutdown (git-fixes).
- watchdog: imx_sc_wdt: Do not disable WDT in suspend (git-fixes).
- wifi: brcmsmac: advertise MFP_CAPABLE to enable WPA3 (stable-fixes).
- wifi: cfg80211: fix two more possible UBSAN-detected off-by-one errors (git-fixes).
- wifi: cfg80211: fix UBSAN noise in cfg80211_wext_siwscan() (git-fixes).
- wifi: iwlwifi: mvm: increase the time between ranging measurements (git-fixes).
- wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop() (git-fixes).
- wifi: mt76: mt7615: check devm_kasprintf() returned value (git-fixes).
- wifi: mt76: mt7915: fix rx filter setting for bfee functionality (git-fixes).
- wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id() (stable-fixes).
- wifi: rtw88: 8822c: Fix reported RX band width (git-fixes).
- wifi: rtw88: always wait for both firmware loading attempts (git-fixes).
- wifi: rtw88: remove CPT execution branch never used (git-fixes).
- wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param (git-fixes).
- x86/hyperv: fix kexec crash due to VP assist page corruption (git-fixes).
- x86/kexec: Add EFI config table identity mapping for kexec kernel (bsc#1220382).
- x86/mm/ident_map: Use gbpages only where full GB page should be mapped (bsc#1220382).
- x86/xen: Convert comma to semicolon (git-fixes).
- xen: add capability to remap non-RAM pages to different PFNs (bsc#1226003).
- xen: allow mapping ACPI data using a different physical address (bsc#1226003).
- xen: introduce generic helper checking for memory map conflicts (bsc#1226003).
- xen: move checks for e820 conflicts further up (bsc#1226003).
- xen: move max_pfn in xen_memory_setup() out of function scope (bsc#1226003).
- xen/swiotlb: add alignment check for dma buffers (bsc#1229928).
- xen/swiotlb: fix allocated size (git-fixes).
- xen: tolerate ACPI NVS memory overlapping with Xen allocated memory (bsc#1226003).
- xen: use correct end address of kernel for conflict checking (bsc#1226003).
- xfs: do not include bnobt blocks when reserving free block pool (git-fixes).
- xhci: Set quirky xHC PCI hosts to D3 _after_ stopping and freeing them (git-fixes).
- xz: cleanup CRC32 edits from 2018 (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-10"/>
	<updated date="2024-10-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199769">SUSE bug 1199769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216223">SUSE bug 1216223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220382">SUSE bug 1220382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221610">SUSE bug 1221610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221650">SUSE bug 1221650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222629">SUSE bug 1222629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222973">SUSE bug 1222973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223600">SUSE bug 1223600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223848">SUSE bug 1223848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224085">SUSE bug 1224085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225903">SUSE bug 1225903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226003">SUSE bug 1226003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226606">SUSE bug 1226606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226662">SUSE bug 1226662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226666">SUSE bug 1226666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226846">SUSE bug 1226846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226860">SUSE bug 1226860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226875">SUSE bug 1226875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226915">SUSE bug 1226915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227487">SUSE bug 1227487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227726">SUSE bug 1227726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227819">SUSE bug 1227819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227832">SUSE bug 1227832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227890">SUSE bug 1227890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228507">SUSE bug 1228507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228576">SUSE bug 1228576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228620">SUSE bug 1228620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228771">SUSE bug 1228771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229031">SUSE bug 1229031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229034">SUSE bug 1229034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229086">SUSE bug 1229086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229156">SUSE bug 1229156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229289">SUSE bug 1229289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229334">SUSE bug 1229334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229362">SUSE bug 1229362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229363">SUSE bug 1229363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229364">SUSE bug 1229364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229394">SUSE bug 1229394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229429">SUSE bug 1229429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229453">SUSE bug 1229453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229572">SUSE bug 1229572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229573">SUSE bug 1229573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229585">SUSE bug 1229585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229607">SUSE bug 1229607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229619">SUSE bug 1229619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229633">SUSE bug 1229633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229662">SUSE bug 1229662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229753">SUSE bug 1229753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229764">SUSE bug 1229764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229790">SUSE bug 1229790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229810">SUSE bug 1229810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229830">SUSE bug 1229830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229899">SUSE bug 1229899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229928">SUSE bug 1229928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229947">SUSE bug 1229947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230015">SUSE bug 1230015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230129">SUSE bug 1230129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230130">SUSE bug 1230130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230170">SUSE bug 1230170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230171">SUSE bug 1230171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230174">SUSE bug 1230174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230175">SUSE bug 1230175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230176">SUSE bug 1230176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230178">SUSE bug 1230178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230180">SUSE bug 1230180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230185">SUSE bug 1230185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230192">SUSE bug 1230192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230193">SUSE bug 1230193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230194">SUSE bug 1230194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230200">SUSE bug 1230200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230204">SUSE bug 1230204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230209">SUSE bug 1230209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230211">SUSE bug 1230211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230212">SUSE bug 1230212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230217">SUSE bug 1230217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230224">SUSE bug 1230224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230230">SUSE bug 1230230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230233">SUSE bug 1230233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230244">SUSE bug 1230244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230245">SUSE bug 1230245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230247">SUSE bug 1230247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230248">SUSE bug 1230248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230269">SUSE bug 1230269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230339">SUSE bug 1230339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230340">SUSE bug 1230340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230392">SUSE bug 1230392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230398">SUSE bug 1230398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230431">SUSE bug 1230431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230433">SUSE bug 1230433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230434">SUSE bug 1230434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230440">SUSE bug 1230440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230442">SUSE bug 1230442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230444">SUSE bug 1230444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230450">SUSE bug 1230450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230451">SUSE bug 1230451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230454">SUSE bug 1230454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230506">SUSE bug 1230506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230507">SUSE bug 1230507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230511">SUSE bug 1230511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230515">SUSE bug 1230515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230517">SUSE bug 1230517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230524">SUSE bug 1230524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230533">SUSE bug 1230533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230535">SUSE bug 1230535</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230549">SUSE bug 1230549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230556">SUSE bug 1230556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230582">SUSE bug 1230582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230589">SUSE bug 1230589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230591">SUSE bug 1230591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230592">SUSE bug 1230592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230699">SUSE bug 1230699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230700">SUSE bug 1230700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230701">SUSE bug 1230701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230702">SUSE bug 1230702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230703">SUSE bug 1230703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230705">SUSE bug 1230705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230706">SUSE bug 1230706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230707">SUSE bug 1230707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230709">SUSE bug 1230709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230710">SUSE bug 1230710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230711">SUSE bug 1230711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230712">SUSE bug 1230712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230719">SUSE bug 1230719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230724">SUSE bug 1230724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230725">SUSE bug 1230725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230730">SUSE bug 1230730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230731">SUSE bug 1230731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230732">SUSE bug 1230732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230733">SUSE bug 1230733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230747">SUSE bug 1230747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230748">SUSE bug 1230748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230751">SUSE bug 1230751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230752">SUSE bug 1230752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230756">SUSE bug 1230756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230761">SUSE bug 1230761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230766">SUSE bug 1230766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230767">SUSE bug 1230767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230768">SUSE bug 1230768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230771">SUSE bug 1230771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230772">SUSE bug 1230772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230776">SUSE bug 1230776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230783">SUSE bug 1230783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230786">SUSE bug 1230786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230791">SUSE bug 1230791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230794">SUSE bug 1230794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230796">SUSE bug 1230796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230802">SUSE bug 1230802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230806">SUSE bug 1230806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230808">SUSE bug 1230808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230810">SUSE bug 1230810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230812">SUSE bug 1230812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230813">SUSE bug 1230813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230814">SUSE bug 1230814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230815">SUSE bug 1230815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230821">SUSE bug 1230821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230825">SUSE bug 1230825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230830">SUSE bug 1230830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231013">SUSE bug 1231013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231017">SUSE bug 1231017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231116">SUSE bug 1231116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231120">SUSE bug 1231120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231146">SUSE bug 1231146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231180">SUSE bug 1231180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231181">SUSE bug 1231181</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48901/">CVE-2022-48901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48901">CVE-2022-48901 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48911/">CVE-2022-48911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48911">CVE-2022-48911 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48923/">CVE-2022-48923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48923">CVE-2022-48923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48935/">CVE-2022-48935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48935">CVE-2022-48935 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48944/">CVE-2022-48944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48944">CVE-2022-48944 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48945/">CVE-2022-48945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48945">CVE-2022-48945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52610/">CVE-2023-52610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52610">CVE-2023-52610 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52916/">CVE-2023-52916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52916">CVE-2023-52916 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26640/">CVE-2024-26640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26640">CVE-2024-26640 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26759/">CVE-2024-26759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26759">CVE-2024-26759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-26767/">CVE-2024-26767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26767">CVE-2024-26767 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26804/">CVE-2024-26804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26804">CVE-2024-26804 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-26837/">CVE-2024-26837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26837">CVE-2024-26837 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-37353/">CVE-2024-37353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37353">CVE-2024-37353 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38538/">CVE-2024-38538 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38538">CVE-2024-38538 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-38596/">CVE-2024-38596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38596">CVE-2024-38596 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38632/">CVE-2024-38632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38632">CVE-2024-38632 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40910/">CVE-2024-40910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40910">CVE-2024-40910 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-40973/">CVE-2024-40973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40973">CVE-2024-40973 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40983/">CVE-2024-40983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-40983">CVE-2024-40983 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41062/">CVE-2024-41062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41062">CVE-2024-41062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41082/">CVE-2024-41082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41082">CVE-2024-41082 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42154/">CVE-2024-42154 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42154">CVE-2024-42154 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42259/">CVE-2024-42259 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42259">CVE-2024-42259 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-42265/">CVE-2024-42265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42265">CVE-2024-42265 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42304/">CVE-2024-42304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42304">CVE-2024-42304 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42305/">CVE-2024-42305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42305">CVE-2024-42305 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42306/">CVE-2024-42306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42306">CVE-2024-42306 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43828/">CVE-2024-43828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43828">CVE-2024-43828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43835/">CVE-2024-43835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43835">CVE-2024-43835 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43890/">CVE-2024-43890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43890">CVE-2024-43890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43898/">CVE-2024-43898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43898">CVE-2024-43898 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43912/">CVE-2024-43912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43912">CVE-2024-43912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43914/">CVE-2024-43914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43914">CVE-2024-43914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44935/">CVE-2024-44935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44935">CVE-2024-44935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44944/">CVE-2024-44944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44944">CVE-2024-44944 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-44946/">CVE-2024-44946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44946">CVE-2024-44946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44948/">CVE-2024-44948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-44948">CVE-2024-44948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44950/">CVE-2024-44950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44950">CVE-2024-44950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44952/">CVE-2024-44952 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44952">CVE-2024-44952 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44954/">CVE-2024-44954 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44954">CVE-2024-44954 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-44967/">CVE-2024-44967 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44967">CVE-2024-44967 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44969/">CVE-2024-44969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44969">CVE-2024-44969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44970/">CVE-2024-44970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44970">CVE-2024-44970 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44971/">CVE-2024-44971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44971">CVE-2024-44971 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44972/">CVE-2024-44972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44972">CVE-2024-44972 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44977/">CVE-2024-44977 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44977">CVE-2024-44977 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44982/">CVE-2024-44982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44982">CVE-2024-44982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44986/">CVE-2024-44986 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44986">CVE-2024-44986 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-44987/">CVE-2024-44987 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44987">CVE-2024-44987 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44988/">CVE-2024-44988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44988">CVE-2024-44988 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44989/">CVE-2024-44989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44989">CVE-2024-44989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44990/">CVE-2024-44990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44990">CVE-2024-44990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44998/">CVE-2024-44998 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44998">CVE-2024-44998 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44999/">CVE-2024-44999 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44999">CVE-2024-44999 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45000/">CVE-2024-45000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45000">CVE-2024-45000 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45001/">CVE-2024-45001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45001">CVE-2024-45001 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45003/">CVE-2024-45003 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45003">CVE-2024-45003 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45006/">CVE-2024-45006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45006">CVE-2024-45006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45007/">CVE-2024-45007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45007">CVE-2024-45007 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45008/">CVE-2024-45008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45008">CVE-2024-45008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45011/">CVE-2024-45011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45011">CVE-2024-45011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45013/">CVE-2024-45013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45013">CVE-2024-45013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45015/">CVE-2024-45015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45015">CVE-2024-45015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-45018/">CVE-2024-45018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45018">CVE-2024-45018 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45020/">CVE-2024-45020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45020">CVE-2024-45020 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45021/">CVE-2024-45021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45021">CVE-2024-45021 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45026/">CVE-2024-45026 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45026">CVE-2024-45026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45028/">CVE-2024-45028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45028">CVE-2024-45028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45029/">CVE-2024-45029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45029">CVE-2024-45029 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46673/">CVE-2024-46673 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46673">CVE-2024-46673 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46674/">CVE-2024-46674 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46674">CVE-2024-46674 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46675/">CVE-2024-46675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46675">CVE-2024-46675 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.4/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46676/">CVE-2024-46676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46676">CVE-2024-46676 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46677/">CVE-2024-46677 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46677">CVE-2024-46677 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46679/">CVE-2024-46679 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46679">CVE-2024-46679 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46685/">CVE-2024-46685 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46685">CVE-2024-46685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46686/">CVE-2024-46686 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46686">CVE-2024-46686 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46689/">CVE-2024-46689 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46689">CVE-2024-46689 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46694/">CVE-2024-46694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46694">CVE-2024-46694 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46702/">CVE-2024-46702 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46702">CVE-2024-46702 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46707/">CVE-2024-46707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46707">CVE-2024-46707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46714/">CVE-2024-46714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46714">CVE-2024-46714 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46715/">CVE-2024-46715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46715">CVE-2024-46715 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46717/">CVE-2024-46717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46717">CVE-2024-46717 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46720/">CVE-2024-46720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46720">CVE-2024-46720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46721/">CVE-2024-46721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46721">CVE-2024-46721 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46722/">CVE-2024-46722 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46722">CVE-2024-46722 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46723/">CVE-2024-46723 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46723">CVE-2024-46723 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46724/">CVE-2024-46724 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46724">CVE-2024-46724 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46725/">CVE-2024-46725 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46725">CVE-2024-46725 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46726/">CVE-2024-46726 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46726">CVE-2024-46726 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46727/">CVE-2024-46727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46727">CVE-2024-46727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46728/">CVE-2024-46728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46728">CVE-2024-46728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46730/">CVE-2024-46730 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46730">CVE-2024-46730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46731/">CVE-2024-46731 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46731">CVE-2024-46731 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46732/">CVE-2024-46732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46732">CVE-2024-46732 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46737/">CVE-2024-46737 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46737">CVE-2024-46737 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46738/">CVE-2024-46738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46738">CVE-2024-46738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-46739/">CVE-2024-46739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46739">CVE-2024-46739 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46743/">CVE-2024-46743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46743">CVE-2024-46743 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46744/">CVE-2024-46744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46744">CVE-2024-46744 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46745/">CVE-2024-46745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46745">CVE-2024-46745 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46746/">CVE-2024-46746 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46746">CVE-2024-46746 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46747/">CVE-2024-46747 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46747">CVE-2024-46747 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46750/">CVE-2024-46750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46750">CVE-2024-46750 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46751/">CVE-2024-46751 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46751">CVE-2024-46751 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46752/">CVE-2024-46752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46752">CVE-2024-46752 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46753/">CVE-2024-46753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46753">CVE-2024-46753 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46755/">CVE-2024-46755 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46755">CVE-2024-46755 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46756/">CVE-2024-46756 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46756">CVE-2024-46756 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46758/">CVE-2024-46758 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46758">CVE-2024-46758 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46759/">CVE-2024-46759 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46759">CVE-2024-46759 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46761/">CVE-2024-46761 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46761">CVE-2024-46761 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46771/">CVE-2024-46771 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46771">CVE-2024-46771 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46772/">CVE-2024-46772 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46772">CVE-2024-46772 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46773/">CVE-2024-46773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46773">CVE-2024-46773 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46774/">CVE-2024-46774 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46774">CVE-2024-46774 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46778/">CVE-2024-46778 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46778">CVE-2024-46778 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46780/">CVE-2024-46780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46780">CVE-2024-46780 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46781/">CVE-2024-46781 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46781">CVE-2024-46781 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46783/">CVE-2024-46783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46783">CVE-2024-46783 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46784/">CVE-2024-46784 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46784">CVE-2024-46784 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46786/">CVE-2024-46786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46786">CVE-2024-46786 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46787/">CVE-2024-46787 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46787">CVE-2024-46787 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46791/">CVE-2024-46791 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46791">CVE-2024-46791 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46794/">CVE-2024-46794 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46794">CVE-2024-46794 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46798/">CVE-2024-46798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46798">CVE-2024-46798 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46822/">CVE-2024-46822 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46822">CVE-2024-46822 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46830/">CVE-2024-46830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46830">CVE-2024-46830 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009946632" comment="cluster-md-kmp-rt-5.14.21-150500.13.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946633" comment="dlm-kmp-rt-5.14.21-150500.13.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946634" comment="gfs2-kmp-rt-5.14.21-150500.13.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946635" comment="kernel-devel-rt-5.14.21-150500.13.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946636" comment="kernel-rt-5.14.21-150500.13.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946637" comment="kernel-rt-devel-5.14.21-150500.13.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946638" comment="kernel-rt-extra-5.14.21-150500.13.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946639" comment="kernel-rt-livepatch-5.14.21-150500.13.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946640" comment="kernel-rt-livepatch-devel-5.14.21-150500.13.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946641" comment="kernel-rt-optional-5.14.21-150500.13.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946642" comment="kernel-rt-vdso-5.14.21-150500.13.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946643" comment="kernel-rt_debug-5.14.21-150500.13.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946644" comment="kernel-rt_debug-devel-5.14.21-150500.13.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946645" comment="kernel-rt_debug-livepatch-devel-5.14.21-150500.13.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946646" comment="kernel-rt_debug-vdso-5.14.21-150500.13.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946647" comment="kernel-source-rt-5.14.21-150500.13.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946648" comment="kernel-syms-rt-5.14.21-150500.13.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946649" comment="kselftests-kmp-rt-5.14.21-150500.13.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946650" comment="ocfs2-kmp-rt-5.14.21-150500.13.73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009946651" comment="reiserfs-kmp-rt-5.14.21-150500.13.73.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5030" version="1" class="patch">
	<metadata>
		<title>Recommended update for python-requests (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1225912" ref_url="https://bugzilla.suse.com/1225912" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-35195" ref_url="https://www.suse.com/security/cve/CVE-2024-35195/" source="CVE"/>
		<reference ref_id="SUSE-RU-2024:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037214.html" source="SUSE-SU"/>
		<description>
This update for python-requests fixes the following issue:

- Update CVE-2024-35195.patch to allow the usage of 'verify' parameter
  as a directory (bsc#1225912)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-11"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1225912">SUSE bug 1225912</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-35195/">CVE-2024-35195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35195">CVE-2024-35195 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947253" comment="python311-requests-2.31.0-150400.6.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5031" version="1" class="patch">
	<metadata>
		<title>Security update for OpenIPMI (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229910" ref_url="https://bugzilla.suse.com/1229910" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-42934" ref_url="https://www.suse.com/security/cve/CVE-2024-42934/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019591.html" source="SUSE-SU"/>
		<description>
This update for OpenIPMI fixes the following issues:

- CVE-2024-42934: Fixed missing check on the authorization type on incoming LAN messages in IPMI simulator (bsc#1229910)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-11"/>
	<updated date="2024-10-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1229910">SUSE bug 1229910</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42934/">CVE-2024-42934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42934">CVE-2024-42934 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947254" comment="OpenIPMI-2.0.31-150400.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947255" comment="OpenIPMI-devel-2.0.31-150400.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947256" comment="OpenIPMI-python3-2.0.31-150400.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947257" comment="libOpenIPMI0-2.0.31-150400.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5032" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230979" ref_url="https://bugzilla.suse.com/1230979" source="BUGZILLA"/>
		<reference ref_id="1231413" ref_url="https://bugzilla.suse.com/1231413" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-8900" ref_url="https://www.suse.com/security/cve/CVE-2024-8900/" source="CVE"/>
		<reference ref_id="CVE-2024-9392" ref_url="https://www.suse.com/security/cve/CVE-2024-9392/" source="CVE"/>
		<reference ref_id="CVE-2024-9393" ref_url="https://www.suse.com/security/cve/CVE-2024-9393/" source="CVE"/>
		<reference ref_id="CVE-2024-9394" ref_url="https://www.suse.com/security/cve/CVE-2024-9394/" source="CVE"/>
		<reference ref_id="CVE-2024-9396" ref_url="https://www.suse.com/security/cve/CVE-2024-9396/" source="CVE"/>
		<reference ref_id="CVE-2024-9397" ref_url="https://www.suse.com/security/cve/CVE-2024-9397/" source="CVE"/>
		<reference ref_id="CVE-2024-9398" ref_url="https://www.suse.com/security/cve/CVE-2024-9398/" source="CVE"/>
		<reference ref_id="CVE-2024-9399" ref_url="https://www.suse.com/security/cve/CVE-2024-9399/" source="CVE"/>
		<reference ref_id="CVE-2024-9400" ref_url="https://www.suse.com/security/cve/CVE-2024-9400/" source="CVE"/>
		<reference ref_id="CVE-2024-9401" ref_url="https://www.suse.com/security/cve/CVE-2024-9401/" source="CVE"/>
		<reference ref_id="CVE-2024-9402" ref_url="https://www.suse.com/security/cve/CVE-2024-9402/" source="CVE"/>
		<reference ref_id="CVE-2024-9680" ref_url="https://www.suse.com/security/cve/CVE-2024-9680/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019594.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 128.3.1 ESR MFSA 2024-51 (bsc#1231413)

- CVE-2024-9680: Use-after-free in Animation timeline (bmo#1923344)
   
Also includes the following CVEs from MFSA 2024-47 (bsc#1230979)

- CVE-2024-9392: Compromised content process can bypass site isolation (bmo#1899154, bmo#1905843)
- CVE-2024-9393: Cross-origin access to PDF contents through multipart responses (bmo#1918301)
- CVE-2024-9394: Cross-origin access to JSON contents through multipart responses (bmo#1918874)
- CVE-2024-8900: Clipboard write permission bypass (bmo#1872841)
- CVE-2024-9396: Potential memory corruption may occur when cloning certain objects (bmo#1912471)
- CVE-2024-9397: Potential directory upload bypass via clickjacking (bmo#1916659)
- CVE-2024-9398: External protocol handlers could be enumerated via popups (bmo#1881037)
- CVE-2024-9399: Specially crafted WebTransport requests could lead to denial of service (bmo#1907726)
- CVE-2024-9400: Potential memory corruption during JIT compilation (bmo#1915249)
- CVE-2024-9401: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 (bmo#1872744, bmo#1897792, bmo#1911317, bmo#1916476)
- CVE-2024-9402: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3i  (bmo#1872744, bmo#1897792, bmo#1911317, bmo#1913445, bmo#1914106, bmo#1914475, bmo#1914963, bmo#1915008, bmo#1916476)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-14"/>
	<updated date="2024-10-14"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1230979">SUSE bug 1230979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231413">SUSE bug 1231413</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8900/">CVE-2024-8900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8900">CVE-2024-8900 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9392/">CVE-2024-9392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9392">CVE-2024-9392 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9393/">CVE-2024-9393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9393">CVE-2024-9393 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9394/">CVE-2024-9394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9394">CVE-2024-9394 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9396/">CVE-2024-9396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9396">CVE-2024-9396 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9397/">CVE-2024-9397 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9397">CVE-2024-9397 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9398/">CVE-2024-9398 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9398">CVE-2024-9398 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9399/">CVE-2024-9399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9399">CVE-2024-9399 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9400/">CVE-2024-9400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9400">CVE-2024-9400 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9401/">CVE-2024-9401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9401">CVE-2024-9401 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9402/">CVE-2024-9402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9402">CVE-2024-9402 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9680/">CVE-2024-9680 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9680">CVE-2024-9680 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947347" comment="MozillaFirefox-128.3.1-150200.152.155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947348" comment="MozillaFirefox-branding-upstream-128.3.1-150200.152.155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947349" comment="MozillaFirefox-devel-128.3.1-150200.152.155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947350" comment="MozillaFirefox-translations-common-128.3.1-150200.152.155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947351" comment="MozillaFirefox-translations-other-128.3.1-150200.152.155.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5033" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230979" ref_url="https://bugzilla.suse.com/1230979" source="BUGZILLA"/>
		<reference ref_id="1231413" ref_url="https://bugzilla.suse.com/1231413" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-8900" ref_url="https://www.suse.com/security/cve/CVE-2024-8900/" source="CVE"/>
		<reference ref_id="CVE-2024-9392" ref_url="https://www.suse.com/security/cve/CVE-2024-9392/" source="CVE"/>
		<reference ref_id="CVE-2024-9393" ref_url="https://www.suse.com/security/cve/CVE-2024-9393/" source="CVE"/>
		<reference ref_id="CVE-2024-9394" ref_url="https://www.suse.com/security/cve/CVE-2024-9394/" source="CVE"/>
		<reference ref_id="CVE-2024-9396" ref_url="https://www.suse.com/security/cve/CVE-2024-9396/" source="CVE"/>
		<reference ref_id="CVE-2024-9397" ref_url="https://www.suse.com/security/cve/CVE-2024-9397/" source="CVE"/>
		<reference ref_id="CVE-2024-9398" ref_url="https://www.suse.com/security/cve/CVE-2024-9398/" source="CVE"/>
		<reference ref_id="CVE-2024-9399" ref_url="https://www.suse.com/security/cve/CVE-2024-9399/" source="CVE"/>
		<reference ref_id="CVE-2024-9400" ref_url="https://www.suse.com/security/cve/CVE-2024-9400/" source="CVE"/>
		<reference ref_id="CVE-2024-9401" ref_url="https://www.suse.com/security/cve/CVE-2024-9401/" source="CVE"/>
		<reference ref_id="CVE-2024-9402" ref_url="https://www.suse.com/security/cve/CVE-2024-9402/" source="CVE"/>
		<reference ref_id="CVE-2024-9680" ref_url="https://www.suse.com/security/cve/CVE-2024-9680/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019602.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Update to Mozilla Thunderbird 128.3.1 (MFSA 2024-51, bsc#1231413):

- CVE-2024-9680: Use-after-free in Animation timeline   
    
Update to Mozilla Thunderbird 128.3 (MFSA 2024-49, bsc#1230979):

- CVE-2024-9392: Compromised content process can bypass site isolation
- CVE-2024-9393: Cross-origin access to PDF contents through multipart responses
- CVE-2024-9394: Cross-origin access to JSON contents through multipart responses
- CVE-2024-8900: Clipboard write permission bypass
- CVE-2024-9396: Potential memory corruption may occur when cloning certain objects
- CVE-2024-9397: Potential directory upload bypass via clickjacking
- CVE-2024-9398: External protocol handlers could be enumerated via popups
- CVE-2024-9399: Specially crafted WebTransport requests could lead to denial of service
- CVE-2024-9400: Potential memory corruption during JIT compilation
- CVE-2024-9401: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3
- CVE-2024-9402: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3
    
Other fixes:

- fixed: Opening an EML file with a 'mailto:' link did not work
- fixed: Collapsed POP3 account folder was expanded after emptying trash on exit
- fixed: 'Mark Folder Read' on a cross-folder search marked all underlying folders read
- fixed: Unable to open/view attached OpenPGP encrypted messages
- fixed: Unable to 'Decrypt and Open' an attached OpenPGP key file
- fixed: Subject could disappear when replying to a message saved in an EML file
- fixed: OAuth2 authentication method was not available when adding SMTP server
- fixed: Unable to subscribe to .ics calendars in some situations
- fixed: Visual and UX improvements
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-15"/>
	<updated date="2024-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1230979">SUSE bug 1230979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231413">SUSE bug 1231413</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8900/">CVE-2024-8900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8900">CVE-2024-8900 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9392/">CVE-2024-9392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9392">CVE-2024-9392 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9393/">CVE-2024-9393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9393">CVE-2024-9393 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9394/">CVE-2024-9394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9394">CVE-2024-9394 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9396/">CVE-2024-9396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9396">CVE-2024-9396 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9397/">CVE-2024-9397 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9397">CVE-2024-9397 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9398/">CVE-2024-9398 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9398">CVE-2024-9398 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9399/">CVE-2024-9399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9399">CVE-2024-9399 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9400/">CVE-2024-9400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9400">CVE-2024-9400 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9401/">CVE-2024-9401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9401">CVE-2024-9401 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9402/">CVE-2024-9402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9402">CVE-2024-9402 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9680/">CVE-2024-9680 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9680">CVE-2024-9680 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947413" comment="MozillaThunderbird-128.3.0-150200.8.182.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947414" comment="MozillaThunderbird-translations-common-128.3.0-150200.8.182.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947415" comment="MozillaThunderbird-translations-other-128.3.0-150200.8.182.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5034" version="1" class="patch">
	<metadata>
		<title>Security update for keepalived (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228123" ref_url="https://bugzilla.suse.com/1228123" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-41184" ref_url="https://www.suse.com/security/cve/CVE-2024-41184/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037250.html" source="SUSE-SU"/>
		<description>
This update for keepalived fixes the following issues:

- CVE-2024-41184: Fixed integer overflow in vrrp_ipsets_handler (bsc#1228123)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-15"/>
	<updated date="2024-10-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1228123">SUSE bug 1228123</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-41184/">CVE-2024-41184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41184">CVE-2024-41184 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947416" comment="keepalived-2.2.2-150500.8.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5035" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-puma (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218638" ref_url="https://bugzilla.suse.com/1218638" source="BUGZILLA"/>
		<reference ref_id="1230848" ref_url="https://bugzilla.suse.com/1230848" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21647" ref_url="https://www.suse.com/security/cve/CVE-2024-21647/" source="CVE"/>
		<reference ref_id="CVE-2024-45614" ref_url="https://www.suse.com/security/cve/CVE-2024-45614/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019615.html" source="SUSE-SU"/>
		<description>
This update for rubygem-puma fixes the following issues:

- CVE-2024-45614: Prevent underscores from clobbering hyphen headers (bsc#1230848).
- CVE-2024-21647: Fixed DoS when parsing chunked Transfer-Encoding bodies (bsc#1218638).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-16"/>
	<updated date="2024-10-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218638">SUSE bug 1218638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230848">SUSE bug 1230848</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21647/">CVE-2024-21647 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21647">CVE-2024-21647 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45614/">CVE-2024-45614 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45614">CVE-2024-45614 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947543" comment="ruby2.5-rubygem-puma-4.3.12-150000.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947544" comment="ruby2.5-rubygem-puma-doc-4.3.12-150000.3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5036" version="1" class="patch">
	<metadata>
		<title>Security update for unbound (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231284" ref_url="https://bugzilla.suse.com/1231284" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-8508" ref_url="https://www.suse.com/security/cve/CVE-2024-8508/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037269.html" source="SUSE-SU"/>
		<description>
This update for unbound fixes the following issues:

- CVE-2024-8508: Fixed unbounded name compression that could lead to denial of service (bsc#1231284) 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-16"/>
	<updated date="2024-10-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1231284">SUSE bug 1231284</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-8508/">CVE-2024-8508 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8508">CVE-2024-8508 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947545" comment="libunbound8-1.20.0-150100.10.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947546" comment="unbound-1.20.0-150100.10.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947547" comment="unbound-anchor-1.20.0-150100.10.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947548" comment="unbound-devel-1.20.0-150100.10.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947549" comment="unbound-munin-1.20.0-150100.10.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947550" comment="unbound-python-1.20.0-150100.10.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5037" version="1" class="patch">
	<metadata>
		<title>Security update for etcd (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1095184" ref_url="https://bugzilla.suse.com/1095184" source="BUGZILLA"/>
		<reference ref_id="1118897" ref_url="https://bugzilla.suse.com/1118897" source="BUGZILLA"/>
		<reference ref_id="1118898" ref_url="https://bugzilla.suse.com/1118898" source="BUGZILLA"/>
		<reference ref_id="1118899" ref_url="https://bugzilla.suse.com/1118899" source="BUGZILLA"/>
		<reference ref_id="1121850" ref_url="https://bugzilla.suse.com/1121850" source="BUGZILLA"/>
		<reference ref_id="1174951" ref_url="https://bugzilla.suse.com/1174951" source="BUGZILLA"/>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1183703" ref_url="https://bugzilla.suse.com/1183703" source="BUGZILLA"/>
		<reference ref_id="1199031" ref_url="https://bugzilla.suse.com/1199031" source="BUGZILLA"/>
		<reference ref_id="1208270" ref_url="https://bugzilla.suse.com/1208270" source="BUGZILLA"/>
		<reference ref_id="1208297" ref_url="https://bugzilla.suse.com/1208297" source="BUGZILLA"/>
		<reference ref_id="1210138" ref_url="https://bugzilla.suse.com/1210138" source="BUGZILLA"/>
		<reference ref_id="1213229" ref_url="https://bugzilla.suse.com/1213229" source="BUGZILLA"/>
		<reference ref_id="1217070" ref_url="https://bugzilla.suse.com/1217070" source="BUGZILLA"/>
		<reference ref_id="1217950" ref_url="https://bugzilla.suse.com/1217950" source="BUGZILLA"/>
		<reference ref_id="1218150" ref_url="https://bugzilla.suse.com/1218150" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<reference ref_id="CVE-2018-16886" ref_url="https://www.suse.com/security/cve/CVE-2018-16886/" source="CVE"/>
		<reference ref_id="CVE-2020-15106" ref_url="https://www.suse.com/security/cve/CVE-2020-15106/" source="CVE"/>
		<reference ref_id="CVE-2020-15112" ref_url="https://www.suse.com/security/cve/CVE-2020-15112/" source="CVE"/>
		<reference ref_id="CVE-2021-28235" ref_url="https://www.suse.com/security/cve/CVE-2021-28235/" source="CVE"/>
		<reference ref_id="CVE-2022-41723" ref_url="https://www.suse.com/security/cve/CVE-2022-41723/" source="CVE"/>
		<reference ref_id="CVE-2023-29406" ref_url="https://www.suse.com/security/cve/CVE-2023-29406/" source="CVE"/>
		<reference ref_id="CVE-2023-47108" ref_url="https://www.suse.com/security/cve/CVE-2023-47108/" source="CVE"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037265.html" source="SUSE-SU"/>
		<description>
This update for etcd fixes the following issues:

Update to version 3.5.12:

Security fixes:

- CVE-2018-16873: Fixed remote command execution in cmd/go (bsc#1118897)
- CVE-2018-16874: Fixed directory traversal in cmd/go (bsc#1118898)
- CVE-2018-16875: Fixed CPU denial of service in crypto/x509 (bsc#1118899)
- CVE-2018-16886: Fixed improper authentication issue when RBAC and client-cert-auth is enabled (bsc#1121850)
- CVE-2020-15106: Fixed panic in decodeRecord method (bsc#1174951)
- CVE-2020-15112: Fixed improper checks in entry index (bsc#1174951)
- CVE-2021-28235: Fixed information discosure via debug function (bsc#1210138)
- CVE-2022-41723: Fixed quadratic complexity in HPACK decoding in net/http (bsc#1208270, bsc#1208297)
- CVE-2023-29406: Fixed insufficient sanitization of Host header in go net/http (bsc#1213229)
- CVE-2023-47108: Fixed DoS vulnerability in otelgrpc (bsc#1217070)
- CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity (aka Terrapin Attack) in crypto/ssh (bsc#1217950, bsc#1218150)

Other changes:

- Added hardening to systemd service(s) (bsc#1181400)
- Fixed static /tmp file issue (bsc#1199031)
- Fixed systemd service not starting (bsc#1183703)

Full changelog:

https://github.com/etcd-io/etcd/compare/v3.3.1...v3.5.12
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-16"/>
	<updated date="2024-10-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1095184">SUSE bug 1095184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118897">SUSE bug 1118897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118898">SUSE bug 1118898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118899">SUSE bug 1118899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121850">SUSE bug 1121850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174951">SUSE bug 1174951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183703">SUSE bug 1183703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199031">SUSE bug 1199031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208270">SUSE bug 1208270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208297">SUSE bug 1208297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210138">SUSE bug 1210138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213229">SUSE bug 1213229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217070">SUSE bug 1217070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217950">SUSE bug 1217950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218150">SUSE bug 1218150</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16873">CVE-2018-16873 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16874">CVE-2018-16874 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16875">CVE-2018-16875 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16886/">CVE-2018-16886 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-16886">CVE-2018-16886 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15106/">CVE-2020-15106 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15106">CVE-2020-15106 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15112/">CVE-2020-15112 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-15112">CVE-2020-15112 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28235/">CVE-2021-28235 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28235">CVE-2021-28235 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41723/">CVE-2022-41723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-29406/">CVE-2023-29406 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29406">CVE-2023-29406 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47108/">CVE-2023-47108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47108">CVE-2023-47108 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947551" comment="etcd-3.5.12-150000.7.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947552" comment="etcdctl-3.5.12-150000.7.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5038" version="1" class="patch">
	<metadata>
		<title>Security update for php8 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231358" ref_url="https://bugzilla.suse.com/1231358" source="BUGZILLA"/>
		<reference ref_id="1231360" ref_url="https://bugzilla.suse.com/1231360" source="BUGZILLA"/>
		<reference ref_id="1231382" ref_url="https://bugzilla.suse.com/1231382" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-8925" ref_url="https://www.suse.com/security/cve/CVE-2024-8925/" source="CVE"/>
		<reference ref_id="CVE-2024-8927" ref_url="https://www.suse.com/security/cve/CVE-2024-8927/" source="CVE"/>
		<reference ref_id="CVE-2024-9026" ref_url="https://www.suse.com/security/cve/CVE-2024-9026/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3664-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037274.html" source="SUSE-SU"/>
		<description>
This update for php8 fixes the following issues:

- CVE-2024-8925: Fixed erroneous parsing of multipart form data in HTTP POST requests leads to legitimate data not being processed (bsc#1231360) 
- CVE-2024-8927: Fixed cgi.force_redirect configuration is bypassable due to an environment variable collision (bsc#1231358) 
- CVE-2024-9026: Fixed pollution of worker output logs in PHP-FPM (bsc#1231382) 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-16"/>
	<updated date="2024-10-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1231358">SUSE bug 1231358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231360">SUSE bug 1231360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231382">SUSE bug 1231382</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8925/">CVE-2024-8925 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8925">CVE-2024-8925 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8927/">CVE-2024-8927 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8927">CVE-2024-8927 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9026/">CVE-2024-9026 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9026">CVE-2024-9026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947553" comment="apache2-mod_php8-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947554" comment="php8-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947555" comment="php8-bcmath-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947556" comment="php8-bz2-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947557" comment="php8-calendar-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947558" comment="php8-cli-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947559" comment="php8-ctype-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947560" comment="php8-curl-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947561" comment="php8-dba-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947562" comment="php8-devel-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947563" comment="php8-dom-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947564" comment="php8-embed-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947565" comment="php8-enchant-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947566" comment="php8-exif-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947567" comment="php8-fastcgi-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947568" comment="php8-fileinfo-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947569" comment="php8-fpm-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947570" comment="php8-ftp-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947571" comment="php8-gd-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947572" comment="php8-gettext-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947573" comment="php8-gmp-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947574" comment="php8-iconv-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947575" comment="php8-intl-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947576" comment="php8-ldap-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947577" comment="php8-mbstring-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947578" comment="php8-mysql-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947579" comment="php8-odbc-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947580" comment="php8-opcache-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947581" comment="php8-openssl-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947582" comment="php8-pcntl-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947583" comment="php8-pdo-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947584" comment="php8-pgsql-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947585" comment="php8-phar-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947586" comment="php8-posix-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947587" comment="php8-readline-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947588" comment="php8-shmop-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947589" comment="php8-snmp-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947590" comment="php8-soap-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947591" comment="php8-sockets-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947592" comment="php8-sodium-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947593" comment="php8-sqlite-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947594" comment="php8-sysvmsg-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947595" comment="php8-sysvsem-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947596" comment="php8-sysvshm-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947597" comment="php8-test-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947598" comment="php8-tidy-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947599" comment="php8-tokenizer-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947600" comment="php8-xmlreader-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947601" comment="php8-xmlwriter-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947602" comment="php8-xsl-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947603" comment="php8-zip-8.0.30-150400.4.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947604" comment="php8-zlib-8.0.30-150400.4.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5039" version="1" class="patch">
	<metadata>
		<title>Security update for jetty-minimal (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231651" ref_url="https://bugzilla.suse.com/1231651" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-8184" ref_url="https://www.suse.com/security/cve/CVE-2024-8184/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019655.html" source="SUSE-SU"/>
		<description>
This update for jetty-minimal fixes the following issues:

- CVE-2024-8184: Fixed remote denial-of-service in ThreadLimitHandler.getRemote() (bsc#1231651).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2024-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1231651">SUSE bug 1231651</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8184/">CVE-2024-8184 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8184">CVE-2024-8184 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947914" comment="jetty-annotations-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947915" comment="jetty-ant-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947916" comment="jetty-cdi-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947917" comment="jetty-client-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947918" comment="jetty-continuation-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947919" comment="jetty-deploy-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947920" comment="jetty-fcgi-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947921" comment="jetty-http-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947922" comment="jetty-http-spi-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947923" comment="jetty-io-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947924" comment="jetty-jaas-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947925" comment="jetty-jmx-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947926" comment="jetty-jndi-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947927" comment="jetty-jsp-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947928" comment="jetty-minimal-javadoc-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947929" comment="jetty-openid-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947930" comment="jetty-plus-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947931" comment="jetty-proxy-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947932" comment="jetty-quickstart-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947933" comment="jetty-rewrite-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947934" comment="jetty-security-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947935" comment="jetty-server-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947936" comment="jetty-servlet-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947937" comment="jetty-servlets-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947938" comment="jetty-start-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947939" comment="jetty-util-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947940" comment="jetty-util-ajax-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947941" comment="jetty-webapp-9.4.56-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947942" comment="jetty-xml-9.4.56-150200.3.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5040" version="1" class="patch">
	<metadata>
		<title>Security update for buildah (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231499" ref_url="https://bugzilla.suse.com/1231499" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-9675" ref_url="https://www.suse.com/security/cve/CVE-2024-9675/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019662.html" source="SUSE-SU"/>
		<description>
This update for buildah fixes the following issues:

- CVE-2024-9675: Fixed arbitrary cache directory mount (bsc#1231499)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2024-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1231499">SUSE bug 1231499</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9675/">CVE-2024-9675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9675">CVE-2024-9675 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947943" comment="buildah-1.35.4-150500.3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5041" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231413" ref_url="https://bugzilla.suse.com/1231413" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-9680" ref_url="https://www.suse.com/security/cve/CVE-2024-9680/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019660.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Update to Mozilla Thunderbird 128.3.1 (MFSA 2024-52, bsc#1231413):

  - CVE-2024-9680: Fixed use-after-free in Animation timeline (bmo#1923344)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2024-10-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1231413">SUSE bug 1231413</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9680/">CVE-2024-9680 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9680">CVE-2024-9680 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947944" comment="MozillaThunderbird-128.3.1-150200.8.185.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947945" comment="MozillaThunderbird-translations-common-128.3.1-150200.8.185.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947946" comment="MozillaThunderbird-translations-other-128.3.1-150200.8.185.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5042" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231358" ref_url="https://bugzilla.suse.com/1231358" source="BUGZILLA"/>
		<reference ref_id="1231360" ref_url="https://bugzilla.suse.com/1231360" source="BUGZILLA"/>
		<reference ref_id="1231382" ref_url="https://bugzilla.suse.com/1231382" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-8925" ref_url="https://www.suse.com/security/cve/CVE-2024-8925/" source="CVE"/>
		<reference ref_id="CVE-2024-8927" ref_url="https://www.suse.com/security/cve/CVE-2024-8927/" source="CVE"/>
		<reference ref_id="CVE-2024-9026" ref_url="https://www.suse.com/security/cve/CVE-2024-9026/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019658.html" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2024-8925: Fixed erroneous parsing of multipart form data in HTTP POST requests leads to legitimate data not being processed (bsc#1231360) 
- CVE-2024-8927: Fixed cgi.force_redirect configuration is bypassable due to an environment variable collision (bsc#1231358) 
- CVE-2024-9026: Fixed pollution of worker output logs in PHP-FPM (bsc#1231382) 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2024-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1231358">SUSE bug 1231358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231360">SUSE bug 1231360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231382">SUSE bug 1231382</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8925/">CVE-2024-8925 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8925">CVE-2024-8925 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8927/">CVE-2024-8927 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8927">CVE-2024-8927 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9026/">CVE-2024-9026 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9026">CVE-2024-9026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009947947" comment="apache2-mod_php7-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947948" comment="php7-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947949" comment="php7-bcmath-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947950" comment="php7-bz2-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947951" comment="php7-calendar-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947952" comment="php7-cli-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947953" comment="php7-ctype-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947954" comment="php7-curl-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947955" comment="php7-dba-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947956" comment="php7-devel-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947957" comment="php7-dom-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947958" comment="php7-embed-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947959" comment="php7-enchant-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947960" comment="php7-exif-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947961" comment="php7-fastcgi-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947962" comment="php7-fileinfo-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947963" comment="php7-fpm-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947964" comment="php7-ftp-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947965" comment="php7-gd-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947966" comment="php7-gettext-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947967" comment="php7-gmp-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947968" comment="php7-iconv-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947969" comment="php7-intl-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947970" comment="php7-json-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947971" comment="php7-ldap-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947972" comment="php7-mbstring-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947973" comment="php7-mysql-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947974" comment="php7-odbc-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947975" comment="php7-opcache-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947976" comment="php7-openssl-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947977" comment="php7-pcntl-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947978" comment="php7-pdo-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947979" comment="php7-pgsql-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947980" comment="php7-phar-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947981" comment="php7-posix-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947982" comment="php7-readline-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947983" comment="php7-shmop-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947984" comment="php7-snmp-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947985" comment="php7-soap-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947986" comment="php7-sockets-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947987" comment="php7-sodium-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947988" comment="php7-sqlite-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947989" comment="php7-sysvmsg-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947990" comment="php7-sysvsem-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947991" comment="php7-sysvshm-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947992" comment="php7-test-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947993" comment="php7-tidy-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947994" comment="php7-tokenizer-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947995" comment="php7-xmlreader-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947996" comment="php7-xmlrpc-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947997" comment="php7-xmlwriter-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947998" comment="php7-xsl-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009947999" comment="php7-zip-7.4.33-150400.4.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948000" comment="php7-zlib-7.4.33-150400.4.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5043" version="1" class="patch">
	<metadata>
		<title>Security update for podman (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214612" ref_url="https://bugzilla.suse.com/1214612" source="BUGZILLA"/>
		<reference ref_id="1231208" ref_url="https://bugzilla.suse.com/1231208" source="BUGZILLA"/>
		<reference ref_id="1231499" ref_url="https://bugzilla.suse.com/1231499" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-9407" ref_url="https://www.suse.com/security/cve/CVE-2024-9407/" source="CVE"/>
		<reference ref_id="CVE-2024-9675" ref_url="https://www.suse.com/security/cve/CVE-2024-9675/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019664.html" source="SUSE-SU"/>
		<description>
This update for podman fixes the following issues:

- CVE-2024-9675: Fixed cache arbitrary directory mount (bsc#1231499).
- CVE-2024-9407: Fixed improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction (bsc#1231208).

The following non-security bug was fixed:

- rootless ipv6 containers can't be started (bsc#1214612).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-21"/>
	<updated date="2024-10-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1214612">SUSE bug 1214612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231208">SUSE bug 1231208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231499">SUSE bug 1231499</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9407/">CVE-2024-9407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9407">CVE-2024-9407 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9675/">CVE-2024-9675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9675">CVE-2024-9675 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948306" comment="podman-4.9.5-150500.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948307" comment="podman-docker-4.9.5-150500.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948308" comment="podman-remote-4.9.5-150500.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948309" comment="podmansh-4.9.5-150500.3.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5044" version="1" class="patch">
	<metadata>
		<title>Security update for protobuf (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230778" ref_url="https://bugzilla.suse.com/1230778" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-7254" ref_url="https://www.suse.com/security/cve/CVE-2024-7254/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019665.html" source="SUSE-SU"/>
		<description>
This update for protobuf fixes the following issues:

- CVE-2024-7254: Fixed stack overflow vulnerability in Protocol Buffer (bsc#1230778)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-22"/>
	<updated date="2024-10-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1230778">SUSE bug 1230778</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-7254/">CVE-2024-7254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7254">CVE-2024-7254 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948329" comment="libprotobuf-lite25_1_0-25.1-150500.12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948330" comment="libprotobuf-lite25_1_0-32bit-25.1-150500.12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948331" comment="libprotobuf25_1_0-25.1-150500.12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948332" comment="libprotobuf25_1_0-32bit-25.1-150500.12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948333" comment="libprotoc25_1_0-25.1-150500.12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948334" comment="libprotoc25_1_0-32bit-25.1-150500.12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948335" comment="protobuf-devel-25.1-150500.12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948336" comment="protobuf-java-25.1-150500.12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948337" comment="python311-protobuf-4.25.1-150500.12.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5045" version="1" class="patch">
	<metadata>
		<title>Security update for podman (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231698" ref_url="https://bugzilla.suse.com/1231698" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-9676" ref_url="https://www.suse.com/security/cve/CVE-2024-9676/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019674.html" source="SUSE-SU"/>
		<description>
This update for podman fixes the following issues:

- CVE-2024-9676: Fixed symlink traversal vulnerability in the containers/storage library that could cause Denial of Service (DoS) (bsc#1231698)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-24"/>
	<updated date="2024-10-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1231698">SUSE bug 1231698</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9676/">CVE-2024-9676 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9676">CVE-2024-9676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948454" comment="podman-4.9.5-150500.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948455" comment="podman-docker-4.9.5-150500.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948456" comment="podman-remote-4.9.5-150500.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948457" comment="podmansh-4.9.5-150500.3.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5046" version="1" class="patch">
	<metadata>
		<title>Security update for buildah (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231698" ref_url="https://bugzilla.suse.com/1231698" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-9676" ref_url="https://www.suse.com/security/cve/CVE-2024-9676/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019673.html" source="SUSE-SU"/>
		<description>
This update for buildah fixes the following issues:

- CVE-2024-9676: Fixed symlink traversal vulnerability in the containers/storage library that could cause Denial of Service (DoS) (bsc#1231698)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-24"/>
	<updated date="2024-10-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1231698">SUSE bug 1231698</bugzilla>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9676/">CVE-2024-9676 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9676">CVE-2024-9676 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948458" comment="buildah-1.35.4-150500.3.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5047" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220262" ref_url="https://bugzilla.suse.com/1220262" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-50782" ref_url="https://www.suse.com/security/cve/CVE-2023-50782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019685.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2023-50782: Implicit rejection in PKCS#1 v1.5 (bsc#1220262)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-29"/>
	<updated date="2024-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1220262">SUSE bug 1220262</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-50782/">CVE-2023-50782 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50782">CVE-2023-50782 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948600" comment="libopenssl-1_1-devel-1.1.1l-150500.17.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948601" comment="libopenssl-1_1-devel-32bit-1.1.1l-150500.17.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948602" comment="libopenssl1_1-1.1.1l-150500.17.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948603" comment="libopenssl1_1-32bit-1.1.1l-150500.17.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948604" comment="libopenssl1_1-hmac-1.1.1l-150500.17.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948605" comment="libopenssl1_1-hmac-32bit-1.1.1l-150500.17.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948606" comment="openssl-1_1-1.1.1l-150500.17.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948607" comment="openssl-1_1-doc-1.1.1l-150500.17.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5048" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220262" ref_url="https://bugzilla.suse.com/1220262" source="BUGZILLA"/>
		<reference ref_id="1230698" ref_url="https://bugzilla.suse.com/1230698" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-50782" ref_url="https://www.suse.com/security/cve/CVE-2023-50782/" source="CVE"/>
		<reference ref_id="CVE-2024-41996" ref_url="https://www.suse.com/security/cve/CVE-2024-41996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019684.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2023-50782: Implicit rejection in PKCS#1 v1.5 (bsc#1220262)
- CVE-2024-41996: Avoid expensive public key validation for known safe-prime groups (DHEATATTACK) (bsc#1230698)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-29"/>
	<updated date="2024-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220262">SUSE bug 1220262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230698">SUSE bug 1230698</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-50782/">CVE-2023-50782 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50782">CVE-2023-50782 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41996/">CVE-2024-41996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41996">CVE-2024-41996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948608" comment="libopenssl-3-devel-3.0.8-150500.5.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948609" comment="libopenssl-3-devel-32bit-3.0.8-150500.5.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948610" comment="libopenssl3-3.0.8-150500.5.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948611" comment="libopenssl3-32bit-3.0.8-150500.5.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948612" comment="openssl-3-3.0.8-150500.5.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948613" comment="openssl-3-doc-3.0.8-150500.5.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5049" version="1" class="patch">
	<metadata>
		<title>Security update for go1.22-openssl (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218424" ref_url="https://bugzilla.suse.com/1218424" source="BUGZILLA"/>
		<reference ref_id="1219988" ref_url="https://bugzilla.suse.com/1219988" source="BUGZILLA"/>
		<reference ref_id="1220999" ref_url="https://bugzilla.suse.com/1220999" source="BUGZILLA"/>
		<reference ref_id="1221000" ref_url="https://bugzilla.suse.com/1221000" source="BUGZILLA"/>
		<reference ref_id="1221001" ref_url="https://bugzilla.suse.com/1221001" source="BUGZILLA"/>
		<reference ref_id="1221002" ref_url="https://bugzilla.suse.com/1221002" source="BUGZILLA"/>
		<reference ref_id="1221003" ref_url="https://bugzilla.suse.com/1221003" source="BUGZILLA"/>
		<reference ref_id="1221400" ref_url="https://bugzilla.suse.com/1221400" source="BUGZILLA"/>
		<reference ref_id="1224017" ref_url="https://bugzilla.suse.com/1224017" source="BUGZILLA"/>
		<reference ref_id="1224018" ref_url="https://bugzilla.suse.com/1224018" source="BUGZILLA"/>
		<reference ref_id="1225973" ref_url="https://bugzilla.suse.com/1225973" source="BUGZILLA"/>
		<reference ref_id="1225974" ref_url="https://bugzilla.suse.com/1225974" source="BUGZILLA"/>
		<reference ref_id="1227314" ref_url="https://bugzilla.suse.com/1227314" source="BUGZILLA"/>
		<reference ref_id="1230252" ref_url="https://bugzilla.suse.com/1230252" source="BUGZILLA"/>
		<reference ref_id="1230253" ref_url="https://bugzilla.suse.com/1230253" source="BUGZILLA"/>
		<reference ref_id="1230254" ref_url="https://bugzilla.suse.com/1230254" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288/" source="CVE"/>
		<reference ref_id="CVE-2023-45289" ref_url="https://www.suse.com/security/cve/CVE-2023-45289/" source="CVE"/>
		<reference ref_id="CVE-2023-45290" ref_url="https://www.suse.com/security/cve/CVE-2023-45290/" source="CVE"/>
		<reference ref_id="CVE-2024-24783" ref_url="https://www.suse.com/security/cve/CVE-2024-24783/" source="CVE"/>
		<reference ref_id="CVE-2024-24784" ref_url="https://www.suse.com/security/cve/CVE-2024-24784/" source="CVE"/>
		<reference ref_id="CVE-2024-24785" ref_url="https://www.suse.com/security/cve/CVE-2024-24785/" source="CVE"/>
		<reference ref_id="CVE-2024-24787" ref_url="https://www.suse.com/security/cve/CVE-2024-24787/" source="CVE"/>
		<reference ref_id="CVE-2024-24788" ref_url="https://www.suse.com/security/cve/CVE-2024-24788/" source="CVE"/>
		<reference ref_id="CVE-2024-24789" ref_url="https://www.suse.com/security/cve/CVE-2024-24789/" source="CVE"/>
		<reference ref_id="CVE-2024-24790" ref_url="https://www.suse.com/security/cve/CVE-2024-24790/" source="CVE"/>
		<reference ref_id="CVE-2024-24791" ref_url="https://www.suse.com/security/cve/CVE-2024-24791/" source="CVE"/>
		<reference ref_id="CVE-2024-34155" ref_url="https://www.suse.com/security/cve/CVE-2024-34155/" source="CVE"/>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<reference ref_id="CVE-2024-34158" ref_url="https://www.suse.com/security/cve/CVE-2024-34158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019688.html" source="SUSE-SU"/>
		<description>
This update for go1.22-openssl fixes the following issues:

This update ships go1.22-openssl 1.22.7.1 (jsc#SLE-18320)

- Update to version 1.22.7.1 cut from the go1.22-fips-release
  branch at the revision tagged go1.22.7-1-openssl-fips.

  * Update to Go 1.22.7 (#229)

- go1.22.7 (released 2024-09-05) includes security fixes to the
  encoding/gob, go/build/constraint, and go/parser packages, as
  well as bug fixes to the fix command and the runtime.

  CVE-2024-34155 CVE-2024-34156 CVE-2024-34158:
  - go#69142 go#69138 bsc#1230252 security: fix CVE-2024-34155 go/parser: stack exhaustion in all Parse* functions (CVE-2024-34155)
  - go#69144 go#69139 bsc#1230253 security: fix CVE-2024-34156 encoding/gob: stack exhaustion in Decoder.Decode (CVE-2024-34156)
  - go#69148 go#69141 bsc#1230254 security: fix CVE-2024-34158 go/build/constraint: stack exhaustion in Parse (CVE-2024-34158)
  - go#68811 os: TestChtimes failures
  - go#68825 cmd/fix: fails to run on modules whose go directive value is in '1.n.m' format introduced in Go 1.21.0
  - go#68972 cmd/cgo: aix c-archive corrupting stack

- go1.22.6 (released 2024-08-06) includes fixes to the go command,
  the compiler, the linker, the trace command, the covdata command,
  and the bytes, go/types, and os/exec packages.

  * go#68594 cmd/compile: internal compiler error with zero-size types
  * go#68546 cmd/trace/v2: pprof profiles always empty
  * go#68492 cmd/covdata: too many open files due to defer f.Close() in for loop
  * go#68475 bytes: IndexByte can return -4294967295 when memory usage is above 2^31 on js/wasm
  * go#68370 go/types: assertion failure in recent range statement checking logic
  * go#68331 os/exec: modifications to Path ignored when *Cmd is created using Command with an absolute path on Windows
  * go#68230 cmd/compile: inconsistent integer arithmetic result on Go 1.22+arm64 with/without -race
  * go#68222 cmd/go: list with -export and -covermode=atomic fails to build
  * go#68198 cmd/link: issues with Xcode 16 beta

- Update to version 1.22.5.3 cut from the go1.22-fips-release
  branch at the revision tagged go1.22.5-3-openssl-fips.

  * Only load openssl if fips == '1'
    Avoid loading openssl whenever GOLANG_FIPS is not 1.
    Previously only an unset variable would cause the library load
    to be skipped, but users may also expect to be able to set eg.
    GOLANG_FIPS=0 in environments without openssl.

- Update to version 1.22.5.2 cut from the go1.22-fips-release
  branch at the revision tagged go1.22.5-2-openssl-fips.

  * Only load OpenSSL when in FIPS mode

- Update to version 1.22.5.1 cut from the go1.22-fips-release
  branch at the revision tagged go1.22.5-1-openssl-fips.

  * Update to go1.22.5

- go1.22.5 (released 2024-07-02) includes security fixes to the
  net/http package, as well as bug fixes to the compiler, cgo, the
  go command, the linker, the runtime, and the crypto/tls,
  go/types, net, net/http, and os/exec packages.

  CVE-2024-24791:
  * go#68200 go#67555 bsc#1227314 security: fix CVE CVE-2024-24791 net/http: expect: 100-continue handling is broken in various ways
  * go#65983 cmd/compile: hash of unhashable type
  * go#65994 crypto/tls: segfault when calling tlsrsakex.IncNonDefault()
  * go#66598 os/exec: calling Cmd.Start after setting Cmd.Path manually to absolute path without '.exe' no longer implicitly adds '.exe' in Go 1.22
  * go#67298 runtime: 'fatal: morestack on g0' on amd64 after upgrade to Go 1.21, stale bounds
  * go#67715 cmd/cgo/internal/swig,cmd/go,x/build: swig cgo tests incompatible with C++ toolchain on builders
  * go#67798 cmd/compile: internal compiler error: unexpected type: &lt;nil&gt; (&lt;nil&gt;) in for-range
  * go#67820 cmd/compile: package-level variable initialization with constant dependencies doesn't match order specified in Go spec
  * go#67850 go/internal/gccgoimporter: go building failing with gcc 14.1.0
  * go#67934 net: go DNS resolver fails to connect to local DNS server
  * go#67945 cmd/link: using -fuzz with test that links with cgo on darwin causes linker failure
  * go#68052 cmd/go: go list -u -m all fails loading module retractions: module requires go &gt;= 1.N+1 (running go 1.N)
  * go#68122 cmd/link: runtime.mach_vm_region_trampoline: unsupported dynamic relocation for symbol libc_mach_task_self_ (type=29 (R_GOTPCREL) stype=46 (SDYNIMPORT))

- Update to version 1.22.4.1 cut from the go1.22-fips-release
  branch at the revision tagged go1.22.4-1-openssl-fips.

  * Update to go1.22.4

- go1.22.4 (released 2024-06-04) includes security fixes to the
  archive/zip and net/netip packages, as well as bug fixes to the
  compiler, the go command, the linker, the runtime, and the os
  package.

  CVE-2024-24789 CVE-2024-24790:
  * go#67554 go#66869 bsc#1225973 security: fix CVE-2024-24789 archive/zip: EOCDR comment length handling is inconsistent with other ZIP implementations
  * go#67682 go#67680 bsc#1225974 security: fix CVE-2024-24790 net/netip: unexpected behavior from Is methods for IPv4-mapped IPv6 addresses
  * go#67188 runtime/metrics: /memory/classes/heap/unused:bytes spikes
  * go#67212 cmd/compile: SIGBUS unaligned access on mips64 via qemu-mips64
  * go#67236 cmd/go: mod tidy reports toolchain not available with 'go 1.21'
  * go#67258 runtime: unexpected fault address 0
  * go#67311 cmd/go: TestScript/gotoolchain_issue66175 fails on tip locally
  * go#67314 cmd/go,cmd/link: TestScript/build_issue48319 and TestScript/build_plugin_reproducible failing on LUCI gotip-darwin-amd64-longtest builder due to non-reproducible LC_UUID
  * go#67352 crypto/x509: TestPlatformVerifier failures on Windows due to broken connections
  * go#67460 cmd/compile: internal compiler error: panic with range over integer value
  * go#67527 cmd/link: panic: machorelocsect: size mismatch
  * go#67650 runtime: SIGSEGV after performing clone(CLONE_PARENT) via C constructor prior to runtime start
  * go#67696 os: RemoveAll susceptible to symlink race

- Update to version 1.22.3.3 cut from the go1.22-fips-release
  branch at the revision tagged go1.22.3-3-openssl-fips.

  * config: update openssl backend (#201)

- Update to version 1.22.3.2 cut from the go1.22-fips-release
  branch at the revision tagged go1.22.3-2-openssl-fips.

  * patches: restore signature of HashSign/HashVerify (#199)

- Update to version 1.22.3.1 cut from the go1.22-fips-release
  branch at the revision tagged go1.22.3-1-openssl-fips.

  * Update to go1.22.3
  * fix: rename patch file
  * Backport change https://go-review.googlesource.com/c/go/+/554615 to Go1.22 (#193)
    runtime: crash asap and extend total sleep time for slow machine in test
    Running with few threads usually does not need 500ms to crash, so let it
    crash as soon as possible. While the test may caused more time on slow
    machine, try to expand the sleep time in test.
  * cmd/go: re-enable CGO for Go toolchain commands (#190)
  * crypto/ecdsa: Restore HashSign and HashVerify (#189)

- go1.22.3 (released 2024-05-07) includes security fixes to the go
  command and the net package, as well as bug fixes to the
  compiler, the runtime, and the net/http package.

  CVE-2024-24787 CVE-2024-24788:
  * go#67122 go#67119 bsc#1224017 security: fix CVE-2024-24787 cmd/go: arbitrary code execution during build on darwin
  * go#67040 go#66754 bsc#1224018 security: fix CVE-2024-24788 net: high cpu usage in extractExtendedRCode
  * go#67018 cmd/compile: Go 1.22.x failed to be bootstrapped from 386 to ppc64le
  * go#67017 cmd/compile: changing a hot concrete method to interface method triggers a PGO ICE
  * go#66886 runtime: deterministic fallback hashes across process boundary
  * go#66698 net/http: TestRequestLimit/h2 becomes significantly more expensive and slower after x/net@v0.23.0

- Update to version 1.22.2.1 cut from the go1.22-fips-release
  branch at the revision tagged go1.22.2-1-openssl-fips.

  * Update to go1.22.2

- go1.22.2 (released 2024-04-03) includes a security fix to the
  net/http package, as well as bug fixes to the compiler, the go
  command, the linker, and the encoding/gob, go/types, net/http,
  and runtime/trace packages.

  CVE-2023-45288:
  * go#66298 go#65051 bsc#1221400 security: fix CVE-2023-45288 net/http, x/net/http2: close connections when receiving too many headers
  * go#65858 cmd/compile: unreachable panic with GODEBUG=gotypesalias=1
  * go#66060 cmd/link: RISC-V external link, failed to find text symbol for HI20 relocation
  * go#66076 cmd/compile: out-of-bounds panic with uint32 conversion and modulus operation in Go 1.22.0 on arm64
  * go#66134 cmd/compile: go test . results in CLOSURE ... &lt;unknown line number&gt;: internal compiler error: assertion failed
  * go#66137 cmd/go: go 1.22.0: go test throws errors when processing folders not listed in coverpkg argument
  * go#66178 cmd/compile: ICE: panic: interface conversion: ir.Node is *ir.ConvExpr, not *ir.IndexExpr
  * go#66201 runtime/trace: v2 traces contain an incorrect timestamp scaling factor on Windows
  * go#66255 net/http: http2 round tripper nil pointer dereference causes panic causing deadlock
  * go#66256 cmd/go: git shallow fetches broken at CL 556358
  * go#66273 crypto/x509: Certificate no longer encodable using encoding/gob in Go1.22
  * go#66412 cmd/link: bad carrier sym for symbol runtime.elf_savegpr0.args_stackmap on ppc64le

- Update to version 1.22.1.2 cut from the go1.22-fips-release
  branch at the revision tagged go1.22.1-2-openssl-fips.

  * config: Update openssl v2 module (#178)

- Remove subpackage go1.x-openssl-libstd for compiled shared object
  libstd.so.

  * Continue to build experimental libstd only on go1.x Tumbleweed.
  * Removal fixes build errors on go1.x-openssl Factory and ALP.
  * Use of libstd.so is experimental and not recommended for
    general use, Go currently has no ABI.
  * Feature go build -buildmode=shared is deprecated by upstream,
    but not yet removed.

- Initial package go1.22-openssl version 1.22.1.1 cut from the
  go1.22-fips-release branch at the revision tagged
  go1.22.1-1-openssl-fips.

  * Go upstream merged branch dev.boringcrypto in go1.19+.
  * In go1.x enable BoringCrypto via GOEXPERIMENT=boringcrypto.
  * In go1.x-openssl enable FIPS mode (or boring mode as the
    package is named) either via an environment variable
    GOLANG_FIPS=1 or by virtue of booting the host in FIPS mode.
  * When the operating system is operating in FIPS mode, Go
    applications which import crypto/tls/fipsonly limit operations
    to the FIPS ciphersuite.
  * go1.x-openssl is delivered as two large patches to go1.x
    applying necessary modifications from the golang-fips/go GitHub
    project for the Go crypto library to use OpenSSL as the
    external cryptographic library in a FIPS compliant way.
  * go1.x-openssl modifies the crypto/* packages to use OpenSSL for
    cryptographic operations.
  * go1.x-openssl uses dlopen() to call into OpenSSL.
  * SUSE RPM packaging introduces a fourth version digit go1.x.y.z
    corresponding to the golang-fips/go patchset tagged revision.
  * Patchset improvements can be updated independently of upstream
    Go maintenance releases.

- go1.22.1 (released 2024-03-05) includes security fixes to the
  crypto/x509, html/template, net/http, net/http/cookiejar, and
  net/mail packages, as well as bug fixes to the compiler, the go
  command, the runtime, the trace command, and the go/types and
  net/http packages.

  CVE-2023-45289 CVE-2023-45290 CVE-2024-24783 CVE-2024-24784 CVE-2024-24785:
  * go#65831 go#65390 bsc#1220999 security: fix CVE-2024-24783 crypto/x509: Verify panics on certificates with an unknown public key algorithm
  * go#65849 go#65083 bsc#1221002 security: fix CVE-2024-24784 net/mail: comments in display names are incorrectly handled
  * go#65850 go#65383 bsc#1221001 security: fix CVE-2023-45290 net/http: memory exhaustion in Request.ParseMultipartForm
  * go#65859 go#65065 bsc#1221000 security: fix CVE-2023-45289 net/http, net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect
  * go#65969 go#65697 bsc#1221003 security: fix CVE-2024-24785 html/template: errors returned from MarshalJSON methods may break template escaping
  * go#65352 cmd/go: go generate fails silently when run on a package in a nested workspace module
  * go#65471 internal/testenv: TestHasGoBuild failures on the LUCI noopt builders
  * go#65474 internal/testenv: support LUCI mobile builders in testenv tests
  * go#65577 cmd/trace/v2: goroutine analysis page doesn't identify goroutines consistently
  * go#65618 cmd/compile: Go 1.22 build fails with 1.21 PGO profile on internal/saferio change
  * go#65619 cmd/compile: Go 1.22 changes support for modules that declare go 1.0
  * go#65641 cmd/cgo/internal/testsanitizers,x/build: LUCI clang15 builders failing
  * go#65644 runtime: crash in race detector when execution tracer reads from CPU profile buffer
  * go#65728 go/types: nil pointer dereference in Alias.Underlying()
  * go#65759 net/http: context cancellation can leave HTTP client with deadlocked HTTP/1.1 connections in Go1.22
  * go#65760 runtime: Go 1.22.0 fails to build from source on armv7 Alpine Linux
  * go#65818 runtime: go1.22.0 test with -race will SIGSEGV or SIGBUS or Bad Pointer
  * go#65852 cmd/go: 'missing ziphash' error with go.work
  * go#65883 runtime: scheduler sometimes starves a runnable goroutine on wasm platforms

  * bsc#1219988 ensure VERSION file is present in GOROOT
    as required by go tool dist and go tool distpack

- go1.22 (released 2024-02-06) is a major release of Go.
  go1.22.x minor releases will be provided through February 2024.
  https://github.com/golang/go/wiki/Go-Release-Cycle
  go1.22 arrives six months after go1.21. Most of its changes are
  in the implementation of the toolchain, runtime, and libraries.
  As always, the release maintains the Go 1 promise of
  compatibility. We expect almost all Go programs to continue to
  compile and run as before.

  * Language change: go1.22 makes two changes to for loops.
    Previously, the variables declared by a for loop were created
    once and updated by each iteration. In go1.22, each iteration
    of the loop creates new variables, to avoid accidental sharing
    bugs. The transition support tooling described in the proposal
    continues to work in the same way it did in Go 1.21.
  * Language change: For loops may now range over integers
  * Language change: go1.22 includes a preview of a language change
    we are considering for a future version of Go:
    range-over-function iterators. Building with
    GOEXPERIMENT=rangefunc enables this feature.
  * go command: Commands in workspaces can now use a vendor
    directory containing the dependencies of the workspace. The
    directory is created by go work vendor, and used by build
    commands when the -mod flag is set to vendor, which is the
    default when a workspace vendor directory is present.  Note
    that the vendor directory's contents for a workspace are
    different from those of a single module: if the directory at
    the root of a workspace also contains one of the modules in the
    workspace, its vendor directory can contain the dependencies of
    either the workspace or of the module, but not both.
  * go get is no longer supported outside of a module in the legacy
    GOPATH mode (that is, with GO111MODULE=off). Other build
    commands, such as go build and go test, will continue to work
    indefinitely for legacy GOPATH programs.
  * go mod init no longer attempts to import module requirements
    from configuration files for other vendoring tools (such as
    Gopkg.lock).
  * go test -cover now prints coverage summaries for covered
    packages that do not have their own test files. Prior to Go
    1.22 a go test -cover run for such a package would report: ?
    mymod/mypack [no test files] and now with go1.22, functions in
    the package are treated as uncovered: mymod/mypack coverage:
    0.0% of statements Note that if a package contains no
    executable code at all, we can't report a meaningful coverage
    percentage; for such packages the go tool will continue to
    report that there are no test files.
  * trace: The trace tool's web UI has been gently refreshed as
    part of the work to support the new tracer, resolving several
    issues and improving the readability of various sub-pages. The
    web UI now supports exploring traces in a thread-oriented
    view. The trace viewer also now displays the full duration of
    all system calls.  These improvements only apply for viewing
    traces produced by programs built with go1.22 or newer. A
    future release will bring some of these improvements to traces
    produced by older version of Go.
  * vet: References to loop variables The behavior of the vet tool
    has changed to match the new semantics (see above) of loop
    variables in go1.22. When analyzing a file that requires go1.22
    or newer (due to its go.mod file or a per-file build
    constraint), vetcode&gt; no longer reports references to loop
    variables from within a function literal that might outlive the
    iteration of the loop. In Go 1.22, loop variables are created
    anew for each iteration, so such references are no longer at
    risk of using a variable after it has been updated by the loop.
  * vet: New warnings for missing values after append The vet tool
    now reports calls to append that pass no values to be appended
    to the slice, such as slice = append(slice). Such a statement
    has no effect, and experience has shown that is nearly always a
    mistake.
  * vet: New warnings for deferring time.Since The vet tool now
    reports a non-deferred call to time.Since(t) within a defer
    statement. This is equivalent to calling time.Now().Sub(t)
    before the defer statement, not when the deferred function is
    called. In nearly all cases, the correct code requires
    deferring the time.Since call.
  * vet: New warnings for mismatched key-value pairs in log/slog
    calls The vet tool now reports invalid arguments in calls to
    functions and methods in the structured logging package,
    log/slog, that accept alternating key/value pairs. It reports
    calls where an argument in a key position is neither a string
    nor a slog.Attr, and where a final key is missing its value.
  * runtime: The runtime now keeps type-based garbage collection
    metadata nearer to each heap object, improving the CPU
    performance (latency or throughput) of Go programs by
    1-3%. This change also reduces the memory overhead of the
    majority Go programs by approximately 1% by deduplicating
    redundant metadata. Some programs may see a smaller improvement
    because this change adjusts the size class boundaries of the
    memory allocator, so some objects may be moved up a size class.
    A consequence of this change is that some objects' addresses
    that were previously always aligned to a 16 byte (or higher)
    boundary will now only be aligned to an 8 byte boundary. Some
    programs that use assembly instructions that require memory
    addresses to be more than 8-byte aligned and rely on the memory
    allocator's previous alignment behavior may break, but we
    expect such programs to be rare. Such programs may be built
    with GOEXPERIMENT=noallocheaders to revert to the old metadata
    layout and restore the previous alignment behavior, but package
    owners should update their assembly code to avoid the alignment
    assumption, as this workaround will be removed in a future
    release.
  * runtime: On the windows/amd64 port, programs linking or loading
    Go libraries built with -buildmode=c-archive or
    -buildmode=c-shared can now use the SetUnhandledExceptionFilter
    Win32 function to catch exceptions not handled by the Go
    runtime. Note that this was already supported on the
    windows/386 port.
  * compiler: Profile-guided Optimization (PGO) builds can now
    devirtualize a higher proportion of calls than previously
    possible. Most programs from a representative set of Go
    programs now see between 2 and 14% improvement from enabling
    PGO.
  * compiler: The compiler now interleaves devirtualization and
    inlining, so interface method calls are better optimized.
  * compiler: go1.22 also includes a preview of an enhanced
    implementation of the compiler's inlining phase that uses
    heuristics to boost inlinability at call sites deemed
    'important' (for example, in loops) and discourage inlining at
    call sites deemed 'unimportant' (for example, on panic
    paths). Building with GOEXPERIMENT=newinliner enables the new
    call-site heuristics; see issue #61502 for more info and to
    provide feedback.
  * linker: The linker's -s and -w flags are now behave more
    consistently across all platforms. The -w flag suppresses DWARF
    debug information generation. The -s flag suppresses symbol
    table generation. The -s flag also implies the -w flag, which
    can be negated with -w=0. That is, -s -w=0 will generate a
    binary with DWARF debug information generation but without the
    symbol table.
  * linker: On ELF platforms, the -B linker flag now accepts a
    special form: with -B gobuildid, the linker will generate a GNU
    build ID (the ELF NT_GNU_BUILD_ID note) derived from the Go
    build ID.
  * linker: On Windows, when building with -linkmode=internal, the
    linker now preserves SEH information from C object files by
    copying the .pdata and .xdata sections into the final
    binary. This helps with debugging and profiling binaries using
    native tools, such as WinDbg. Note that until now, C functions'
    SEH exception handlers were not being honored, so this change
    may cause some programs to behave differently.
    -linkmode=external is not affected by this change, as external
    linkers already preserve SEH information.
  * bootstrap: As mentioned in the Go 1.20 release notes, go1.22
    now requires the final point release of Go 1.20 or later for
    bootstrap. We expect that Go 1.24 will require the final point
    release of go1.22 or later for bootstrap.
  * core library: New math/rand/v2 package: go1.22 includes the
    first “v2” package in the standard library, math/rand/v2. The
    changes compared to math/rand are detailed in proposal
    go#61716. The most important changes are:
    - The Read method, deprecated in math/rand, was not carried
      forward for math/rand/v2. (It remains available in
      math/rand.) The vast majority of calls to Read should use
      crypto/rand’s Read instead. Otherwise a custom Read can be
      constructed using the Uint64 method.
    - The global generator accessed by top-level functions is
      unconditionally randomly seeded. Because the API guarantees
      no fixed sequence of results, optimizations like per-thread
      random generator states are now possible.
    - The Source interface now has a single Uint64 method; there is
      no Source64 interface.
    - Many methods now use faster algorithms that were not possible
      to adopt in math/rand because they changed the output
      streams.
    - The Intn, Int31, Int31n, Int63, and Int64n top-level
      functions and methods from math/rand are spelled more
      idiomatically in math/rand/v2: IntN, Int32, Int32N, Int64,
      and Int64N. There are also new top-level functions and
      methods Uint32, Uint32N, Uint64, Uint64N, Uint, and UintN.
    - The new generic function N is like Int64N or Uint64N but
      works for any integer type. For example a random duration
      from 0 up to 5 minutes is rand.N(5*time.Minute).
    - The Mitchell &amp; Reeds LFSR generator provided by math/rand’s
      Source has been replaced by two more modern pseudo-random
      generator sources: ChaCha8 PCG. ChaCha8 is a new,
      cryptographically strong random number generator roughly
      similar to PCG in efficiency. ChaCha8 is the algorithm used
      for the top-level functions in math/rand/v2. As of go1.22,
      math/rand's top-level functions (when not explicitly seeded)
      and the Go runtime also use ChaCha8 for randomness.
    - We plan to include an API migration tool in a future release,
      likely Go 1.23.
  * core library: New go/version package: The new go/version
    package implements functions for validating and comparing Go
    version strings.
  * core library: Enhanced routing patterns: HTTP routing in the
    standard library is now more expressive. The patterns used by
    net/http.ServeMux have been enhanced to accept methods and
    wildcards. This change breaks backwards compatibility in small
    ways, some obvious—patterns with '{' and '}' behave
    differently— and some less so—treatment of escaped paths has
    been improved. The change is controlled by a GODEBUG field
    named httpmuxgo121. Set httpmuxgo121=1 to restore the old
    behavior.
  * Minor changes to the library As always, there are various minor
    changes and updates to the library, made with the Go 1 promise
    of compatibility in mind. There are also various performance
    improvements, not enumerated here.
  * archive/tar: The new method Writer.AddFS adds all of the files
    from an fs.FS to the archive.
  * archive/zip: The new method Writer.AddFS adds all of the files
    from an fs.FS to the archive.
  * bufio: When a SplitFunc returns ErrFinalToken with a nil token,
    Scanner will now stop immediately. Previously, it would report
    a final empty token before stopping, which was usually not
    desired. Callers that do want to report a final empty token can
    do so by returning []byte{} rather than nil.
  * cmp: The new function Or returns the first in a sequence of
    values that is not the zero value.
  * crypto/tls: ConnectionState.ExportKeyingMaterial will now
    return an error unless TLS 1.3 is in use, or the
    extended_master_secret extension is supported by both the
    server and client. crypto/tls has supported this extension
    since Go 1.20. This can be disabled with the tlsunsafeekm=1
    GODEBUG setting.
  * crypto/tls: By default, the minimum version offered by
    crypto/tls servers is now TLS 1.2 if not specified with
    config.MinimumVersion, matching the behavior of crypto/tls
    clients. This change can be reverted with the tls10server=1
    GODEBUG setting.
  * crypto/tls: By default, cipher suites without ECDHE support are
    no longer offered by either clients or servers during pre-TLS
    1.3 handshakes. This change can be reverted with the
    tlsrsakex=1 GODEBUG setting.
  * crypto/x509: The new CertPool.AddCertWithConstraint method can
    be used to add customized constraints to root certificates to
    be applied during chain building.
  * crypto/x509: On Android, root certificates will now be loaded
    from /data/misc/keychain/certs-added as well as
    /system/etc/security/cacerts.
  * crypto/x509: A new type, OID, supports ASN.1 Object Identifiers
    with individual components larger than 31 bits. A new field
    which uses this type, Policies, is added to the Certificate
    struct, and is now populated during parsing. Any OIDs which
    cannot be represented using a asn1.ObjectIdentifier will appear
    in Policies, but not in the old PolicyIdentifiers field. When
    calling CreateCertificate, the Policies field is ignored, and
    policies are taken from the PolicyIdentifiers field. Using the
    x509usepolicies=1 GODEBUG setting inverts this, populating
    certificate policies from the Policies field, and ignoring the
    PolicyIdentifiers field. We may change the default value of
    x509usepolicies in Go 1.23, making Policies the default field
    for marshaling.
  * database/sql: The new Null[T] type provide a way to scan
    nullable columns for any column types.
  * debug/elf: Constant R_MIPS_PC32 is defined for use with MIPS64
    systems. Additional R_LARCH_* constants are defined for use
    with LoongArch systems.
  * encoding: The new methods AppendEncode and AppendDecode added
    to each of the Encoding types in the packages encoding/base32,
    encoding/base64, and encoding/hex simplify encoding and
    decoding from and to byte slices by taking care of byte slice
    buffer management.
  * encoding: The methods base32.Encoding.WithPadding and
    base64.Encoding.WithPadding now panic if the padding argument
    is a negative value other than NoPadding.
  * encoding/json: Marshaling and encoding functionality now
    escapes '\b' and '\f' characters as \b and \f instead of \u0008
    and \u000c.
  * go/ast: The following declarations related to syntactic
    identifier resolution are now deprecated: Ident.Obj, Object,
    Scope, File.Scope, File.Unresolved, Importer, Package,
    NewPackage. In general, identifiers cannot be accurately
    resolved without type information. Consider, for example, the
    identifier K in T{K: ''}: it could be the name of a local
    variable if T is a map type, or the name of a field if T is a
    struct type. New programs should use the go/types package to
    resolve identifiers; see Object, Info.Uses, and Info.Defs for
    details.
  * go/ast: The new ast.Unparen function removes any enclosing
    parentheses from an expression.
  * go/types: The new Alias type represents type
    aliases. Previously, type aliases were not represented
    explicitly, so a reference to a type alias was equivalent to
    spelling out the aliased type, and the name of the alias was
    lost. The new representation retains the intermediate
    Alias. This enables improved error reporting (the name of a
    type alias can be reported), and allows for better handling of
    cyclic type declarations involving type aliases. In a future
    release, Alias types will also carry type parameter
    information. The new function Unalias returns the actual type
    denoted by an Alias type (or any other Type for that matter).
  * go/types: Because Alias types may break existing type switches
    that do not know to check for them, this functionality is
    controlled by a GODEBUG field named gotypesalias. With
    gotypesalias=0, everything behaves as before, and Alias types
    are never created. With gotypesalias=1, Alias types are created
    and clients must expect them. The default is gotypesalias=0. In
    a future release, the default will be changed to
    gotypesalias=1. Clients of go/types are urged to adjust their
    code as soon as possible to work with gotypesalias=1 to
    eliminate problems early.
  * go/types: The Info struct now exports the FileVersions map
    which provides per-file Go version information.
  * go/types: The new helper method PkgNameOf returns the local
    package name for the given import declaration.
  * go/types: The implementation of SizesFor has been adjusted to
    compute the same type sizes as the compiler when the compiler
    argument for SizesFor is 'gc'. The default Sizes implementation
    used by the type checker is now types.SizesFor('gc', 'amd64').
  * go/types: The start position (Pos) of the lexical environment
    block (Scope) that represents a function body has changed: it
    used to start at the opening curly brace of the function body,
    but now starts at the function's func token.
  * html/template: Javascript template literals may now contain Go
    template actions, and parsing a template containing one will no
    longer return ErrJSTemplate. Similarly the GODEBUG setting
    jstmpllitinterp no longer has any effect.
  * io: The new SectionReader.Outer method returns the ReaderAt,
    offset, and size passed to NewSectionReader.
  * log/slog: The new SetLogLoggerLevel function controls the level
    for the bridge between the `slog` and `log` packages. It sets
    the minimum level for calls to the top-level `slog` logging
    functions, and it sets the level for calls to `log.Logger` that
    go through `slog`.
  * math/big: The new method Rat.FloatPrec computes the number of
    fractional decimal digits required to represent a rational
    number accurately as a floating-point number, and whether
    accurate decimal representation is possible in the first place.
  * net: When io.Copy copies from a TCPConn to a UnixConn, it will
    now use Linux's splice(2) system call if possible, using the
    new method TCPConn.WriteTo.
  * net: The Go DNS Resolver, used when building with
    '-tags=netgo', now searches for a matching name in the Windows
    hosts file, located at %SystemRoot%\System32\drivers\etc\hosts,
    before making a DNS query.
  * net/http: The new functions ServeFileFS, FileServerFS, and
    NewFileTransportFS are versions of the existing ServeFile,
    FileServer, and NewFileTransport, operating on an fs.FS.
  * net/http: The HTTP server and client now reject requests and
    responses containing an invalid empty Content-Length
    header. The previous behavior may be restored by setting
    GODEBUG field httplaxcontentlength=1.
  * net/http: The new method Request.PathValue returns path
    wildcard values from a request and the new method
    Request.SetPathValue sets path wildcard values on a request.
  * net/http/cgi: When executing a CGI process, the PATH_INFO
    variable is now always set to the empty string or a value
    starting with a / character, as required by RFC 3875. It was
    previously possible for some combinations of Handler.Root and
    request URL to violate this requirement.
  * net/netip: The new AddrPort.Compare method compares two
    AddrPorts.
  * os: On Windows, the Stat function now follows all reparse
    points that link to another named entity in the system. It was
    previously only following IO_REPARSE_TAG_SYMLINK and
    IO_REPARSE_TAG_MOUNT_POINT reparse points.
  * os: On Windows, passing O_SYNC to OpenFile now causes write
    operations to go directly to disk, equivalent to O_SYNC on Unix
    platforms.
  * os: On Windows, the ReadDir, File.ReadDir, File.Readdir, and
    File.Readdirnames functions now read directory entries in
    batches to reduce the number of system calls, improving
    performance up to 30%.
  * os: When io.Copy copies from a File to a net.UnixConn, it will
    now use Linux's sendfile(2) system call if possible, using the
    new method File.WriteTo.
  * os/exec: On Windows, LookPath now ignores empty entries
    in %PATH%, and returns ErrNotFound (instead of ErrNotExist)
    if no executable file extension is found to resolve an
    otherwise-unambiguous name.
  * os/exec: On Windows, Command and Cmd.Start no longer call
    LookPath if the path to the executable is already absolute and
    has an executable file extension. In addition, Cmd.Start no
    longer writes the resolved extension back to the Path field, so
    it is now safe to call the String method concurrently with a
    call to Start.
  * reflect: The Value.IsZero method will now return true for a
    floating-point or complex negative zero, and will return true
    for a struct value if a blank field (a field named _) somehow
    has a non-zero value. These changes make IsZero consistent with
    comparing a value to zero using the language == operator.
  * reflect: The PtrTo function is deprecated, in favor of
    PointerTo.
  * reflect: The new function TypeFor returns the Type that
    represents the type argument T. Previously, to get the
    reflect.Type value for a type, one had to use
    reflect.TypeOf((*T)(nil)).Elem(). This may now be written as
    reflect.TypeFor[T]().
  * runtime/metrics: Four new histogram metrics
    /sched/pauses/stopping/gc:seconds,
    /sched/pauses/stopping/other:seconds,
    /sched/pauses/total/gc:seconds, and
    /sched/pauses/total/other:seconds provide additional details
    about stop-the-world pauses. The 'stopping' metrics report the
    time taken from deciding to stop the world until all goroutines
    are stopped. The 'total' metrics report the time taken from
    deciding to stop the world until it is started again.
  * runtime/metrics: The /gc/pauses:seconds metric is deprecated,
    as it is equivalent to the new /sched/pauses/total/gc:seconds
    metric.
  * runtime/metrics: /sync/mutex/wait/total:seconds now includes
    contention on runtime-internal locks in addition to sync.Mutex
    and sync.RWMutex.
  * runtime/pprof: Mutex profiles now scale contention by the
    number of goroutines blocked on the mutex. This provides a more
    accurate representation of the degree to which a mutex is a
    bottleneck in a Go program. For instance, if 100 goroutines are
    blocked on a mutex for 10 milliseconds, a mutex profile will
    now record 1 second of delay instead of 10 milliseconds of
    delay.
  * runtime/pprof: Mutex profiles also now include contention on
    runtime-internal locks in addition to sync.Mutex and
    sync.RWMutex. Contention on runtime-internal locks is always
    reported at runtime._LostContendedRuntimeLock. A future release
    will add complete stack traces in these cases.
  * runtime/pprof: CPU profiles on Darwin platforms now contain the
    process's memory map, enabling the disassembly view in the
    pprof tool.
  * runtime/trace: The execution tracer has been completely
    overhauled in this release, resolving several long-standing
    issues and paving the way for new use-cases for execution
    traces.
  * runtime/trace: Execution traces now use the operating system's
    clock on most platforms (Windows excluded) so it is possible to
    correlate them with traces produced by lower-level
    components. Execution traces no longer depend on the
    reliability of the platform's clock to produce a correct
    trace. Execution traces are now partitioned regularly
    on-the-fly and as a result may be processed in a streamable
    way. Execution traces now contain complete durations for all
    system calls. Execution traces now contain information about
    the operating system threads that goroutines executed on. The
    latency impact of starting and stopping execution traces has
    been dramatically reduced. Execution traces may now begin or
    end during the garbage collection mark phase.
  * runtime/trace: To allow Go developers to take advantage of
    these improvements, an experimental trace reading package is
    available at golang.org/x/exp/trace. Note that this package
    only works on traces produced by programs built with go1.22 at
    the moment. Please try out the package and provide feedback on
    the corresponding proposal issue.
  * runtime/trace: If you experience any issues with the new
    execution tracer implementation, you may switch back to the old
    implementation by building your Go program with
    GOEXPERIMENT=noexectracer2. If you do, please file an issue,
    otherwise this option will be removed in a future release.
  * slices: The new function Concat concatenates multiple slices.
  * slices: Functions that shrink the size of a slice (Delete,
    DeleteFunc, Compact, CompactFunc, and Replace) now zero the
    elements between the new length and the old length.
  * slices: Insert now always panics if the argument i is out of
    range. Previously it did not panic in this situation if there
    were no elements to be inserted.
  * syscall: The syscall package has been frozen since Go 1.4 and
    was marked as deprecated in Go 1.11, causing many editors to
    warn about any use of the package. However, some non-deprecated
    functionality requires use of the syscall package, such as the
    os/exec.Cmd.SysProcAttr field. To avoid unnecessary complaints
    on such code, the syscall package is no longer marked as
    deprecated. The package remains frozen to most new
    functionality, and new code remains encouraged to use
    golang.org/x/sys/unix or golang.org/x/sys/windows where
    possible.
  * syscall: On Linux, the new SysProcAttr.PidFD field allows
    obtaining a PID FD when starting a child process via
    StartProcess or os/exec.
  * syscall: On Windows, passing O_SYNC to Open now causes write
    operations to go directly to disk, equivalent to O_SYNC on Unix
    platforms.
  * testing/slogtest: The new Run function uses sub-tests to run
    test cases, providing finer-grained control.
  * Ports: Darwin: On macOS on 64-bit x86 architecture (the
    darwin/amd64 port), the Go toolchain now generates
    position-independent executables (PIE) by default. Non-PIE
    binaries can be generated by specifying the -buildmode=exe
    build flag. On 64-bit ARM-based macOS (the darwin/arm64 port),
    the Go toolchain already generates PIE by default. go1.22 is
    the last release that will run on macOS 10.15 Catalina. Go 1.23
    will require macOS 11 Big Sur or later.
  * Ports: Arm: The GOARM environment variable now allows you to
    select whether to use software or hardware floating
    point. Previously, valid GOARM values were 5, 6, or 7. Now
    those same values can be optionally followed by ,softfloat or
    ,hardfloat to select the floating-point implementation. This
    new option defaults to softfloat for version 5 and hardfloat
    for versions 6 and 7.
  * Ports: Loong64: The loong64 port now supports passing function
    arguments and results using registers. The linux/loong64 port
    now supports the address sanitizer, memory sanitizer, new-style
    linker relocations, and the plugin build mode.
  * OpenBSD go1.22 adds an experimental port to OpenBSD on
    big-endian 64-bit PowerPC (openbsd/ppc64).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-29"/>
	<updated date="2024-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218424">SUSE bug 1218424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219988">SUSE bug 1219988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220999">SUSE bug 1220999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221000">SUSE bug 1221000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221001">SUSE bug 1221001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221002">SUSE bug 1221002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221003">SUSE bug 1221003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221400">SUSE bug 1221400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224017">SUSE bug 1224017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224018">SUSE bug 1224018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225973">SUSE bug 1225973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225974">SUSE bug 1225974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227314">SUSE bug 1227314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230252">SUSE bug 1230252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230253">SUSE bug 1230253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230254">SUSE bug 1230254</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45289/">CVE-2023-45289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45289">CVE-2023-45289 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45290/">CVE-2023-45290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45290">CVE-2023-45290 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24783/">CVE-2024-24783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24783">CVE-2024-24783 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24784/">CVE-2024-24784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24784">CVE-2024-24784 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24785/">CVE-2024-24785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24785">CVE-2024-24785 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-24787/">CVE-2024-24787 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24787">CVE-2024-24787 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24788/">CVE-2024-24788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24788">CVE-2024-24788 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24789/">CVE-2024-24789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24789">CVE-2024-24789 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-24790/">CVE-2024-24790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24791/">CVE-2024-24791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24791">CVE-2024-24791 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34155/">CVE-2024-34155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34155">CVE-2024-34155 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34158/">CVE-2024-34158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34158">CVE-2024-34158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948627" comment="go1.22-openssl-1.22.7.1-150000.1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948628" comment="go1.22-openssl-doc-1.22.7.1-150000.1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948629" comment="go1.22-openssl-race-1.22.7.1-150000.1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5050" version="1" class="patch">
	<metadata>
		<title>Security update for go1.23-openssl (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229122" ref_url="https://bugzilla.suse.com/1229122" source="BUGZILLA"/>
		<reference ref_id="1230252" ref_url="https://bugzilla.suse.com/1230252" source="BUGZILLA"/>
		<reference ref_id="1230253" ref_url="https://bugzilla.suse.com/1230253" source="BUGZILLA"/>
		<reference ref_id="1230254" ref_url="https://bugzilla.suse.com/1230254" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-34155" ref_url="https://www.suse.com/security/cve/CVE-2024-34155/" source="CVE"/>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<reference ref_id="CVE-2024-34158" ref_url="https://www.suse.com/security/cve/CVE-2024-34158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019687.html" source="SUSE-SU"/>
		<description>
This update for go1.23-openssl fixes the following issues:

This update ships go1.23-openssl version 1.23.2.2. (jsc#SLE-18320)

- go1.23.2 (released 2024-10-01) includes fixes to the compiler,
  cgo, the runtime, and the maps, os, os/exec, time, and unique
  packages.

  * go#69119 os: double close pidfd if caller uses pidfd updated by os.StartProcess
  * go#69156 maps: segmentation violation in maps.Clone
  * go#69219 cmd/cgo: alignment issue with int128 inside of a struct
  * go#69240 unique: fatal error: found pointer to free object
  * go#69333 runtime,time: timer.Stop returns false even when no value is read from the channel
  * go#69383 unique: large string still referenced, after interning only a small substring
  * go#69402 os/exec: resource leak on exec failure
  * go#69511 cmd/compile: mysterious crashes and non-determinism with range over func

- Update to version 1.23.1.1 cut from the go1.23-fips-release
  branch at the revision tagged go1.23.1-1-openssl-fips.

  * Update to Go 1.23.1 (#238)

- go1.23.1 (released 2024-09-05) includes security fixes to the
  encoding/gob, go/build/constraint, and go/parser packages, as
  well as bug fixes to the compiler, the go command, the runtime,
  and the database/sql, go/types, os, runtime/trace, and unique
  packages.

  CVE-2024-34155 CVE-2024-34156 CVE-2024-34158:

  - go#69143 go#69138 bsc#1230252 security: fix CVE-2024-34155 go/parser: stack exhaustion in all Parse* functions
  - go#69145 go#69139 bsc#1230253 security: fix CVE-2024-34156 encoding/gob: stack exhaustion in Decoder.Decode
  - go#69149 go#69141 bsc#1230254 security: fix CVE-2024-34158 go/build/constraint: stack exhaustion in Parse
  - go#68812 os: TestChtimes failures
  - go#68894 go/types: 'under' panics on Alias type
  - go#68905 cmd/compile: error in Go 1.23.0 with generics, type aliases and indexing
  - go#68907 os: CopyFS overwrites existing file in destination.
  - go#68973 cmd/cgo: aix c-archive corrupting stack
  - go#68992 unique: panic when calling unique.Make with string casted as any
  - go#68994 cmd/go: any invocation creates read-only telemetry configuration file under GOMODCACHE
  - go#68995 cmd/go: multi-arch build via qemu fails to exec go binary
  - go#69041 database/sql: panic in database/sql.(*connRequestSet).deleteIndex
  - go#69087 runtime/trace: crash during traceAdvance when collecting call stack for cgo-calling goroutine
  - go#69094 cmd/go: breaking change in 1.23rc2 with version constraints in GOPATH mode

- go1.23 (released 2024-08-13) is a major release of Go.
  go1.23.x minor releases will be provided through August 2025.
  https://github.com/golang/go/wiki/Go-Release-Cycle
  go1.23 arrives six months after go1.22. Most of its changes are
  in the implementation of the toolchain, runtime, and libraries.
  As always, the release maintains the Go 1 promise of
  compatibility. We expect almost all Go programs to continue to
  compile and run as before.

  * Language change: Go 1.23 makes the (Go 1.22) 'range-over-func'
    experiment a part of the language. The 'range' clause in a
    'for-range' loop now accepts iterator functions of the
    following types:
    func(func() bool)
    func(func(K) bool)
    func(func(K, V) bool)
    as range expressions. Calls of the iterator argument function
    produce the iteration values for the 'for-range' loop. For
    details see the iter package documentation and the language
    spec. For motivation see the 2022 'range-over-func' discussion.
  * Language change: Go 1.23 includes preview support for generic
    type aliases. Building the toolchain with
    GOEXPERIMENT=aliastypeparams enables this feature within a
    package. (Using generic alias types across package boundaries
    is not yet supported.)
  * Opt-in Telemetry: Starting in Go 1.23, the Go toolchain can
    collect usage and breakage statistics that help the Go team
    understand how the Go toolchain is used and how well it is
    working. We refer to these statistics as Go telemetry.
    Go telemetry is an opt-in system, controlled by the go
    telemetry command. By default, the toolchain programs collect
    statistics in counter files that can be inspected locally but
    are otherwise unused (go telemetry local).
    To help us keep Go working well and understand Go usage, please
    consider opting in to Go telemetry by running go telemetry
    on. In that mode, anonymous counter reports are uploaded to
    telemetry.go.dev weekly, where they are aggregated into graphs
    and also made available for download by any Go contributors or
    users wanting to analyze the data. See 'Go Telemetry' for more
    details about the Go Telemetry system.
  * go command: Setting the GOROOT_FINAL environment variable no
    longer has an effect (#62047). Distributions that install the
    go command to a location other than $GOROOT/bin/go should
    install a symlink instead of relocating or copying the go
    binary.
  * go command: The new go env -changed flag causes the command to
    print only those settings whose effective value differs from
    the default value that would be obtained in an empty
    environment with no prior uses of the -w flag.
  * go command: The new go mod tidy -diff flag causes the command
    not to modify the files but instead print the necessary changes
    as a unified diff. It exits with a non-zero code if updates are
    needed.
  * go command: The go list -m -json command now includes new Sum
    and GoModSum fields. This is similar to the existing behavior
    of the go mod download -json command.
  * go command: The new godebug directive in go.mod and go.work
    declares a GODEBUG setting to apply for the work module or
    workspace in use.
  * go vet: The go vet subcommand now includes the stdversion
    analyzer, which flags references to symbols that are too new
    for the version of Go in effect in the referring file. (The
    effective version is determined by the go directive in the
    file's enclosing go.mod file, and by any //go:build constraints
    in the file.)
    For example, it will report a diagnostic for a reference to the
    reflect.TypeFor function (introduced in go1.22) from a file in
    a module whose go.mod file specifies go 1.21.
  * cgo: cmd/cgo supports the new -ldflags flag for passing flags
    to the C linker. The go command uses it automatically, avoiding
    'argument list too long' errors with a very large CGO_LDFLAGS.
  * go trace: The trace tool now better tolerates partially broken
    traces by attempting to recover what trace data it can. This
    functionality is particularly helpful when viewing a trace that
    was collected during a program crash, since the trace data
    leading up to the crash will now be recoverable under most
    circumstances.
  * Runtime: The traceback printed by the runtime after an
    unhandled panic or other fatal error now indents the second and
    subsequent lines of the error message (for example, the
    argument to panic) by a single tab, so that it can be
    unambiguously distinguished from the stack trace of the first
    goroutine. See go#64590 for discussion.
  * Compiler: The build time overhead to building with Profile
    Guided Optimization has been reduced significantly. Previously,
    large builds could see 100%+ build time increase from enabling
    PGO. In Go 1.23, overhead should be in the single digit
    percentages.
  * Compiler: The compiler in Go 1.23 can now overlap the stack
    frame slots of local variables accessed in disjoint regions of
    a function, which reduces stack usage for Go applications.
  * Compiler: For 386 and amd64, the compiler will use information
    from PGO to align certain hot blocks in loops. This improves
    performance an additional 1-1.5% at a cost of an additional
    0.1% text and binary size. This is currently only implemented
    on 386 and amd64 because it has not shown an improvement on
    other platforms. Hot block alignment can be disabled with
    -gcflags=[&lt;packages&gt;=]-d=alignhot=0.
  * Linker: The linker now disallows using a //go:linkname
    directive to refer to internal symbols in the standard library
    (including the runtime) that are not marked with //go:linkname
    on their definitions. Similarly, the linker disallows
    references to such symbols from assembly code. For backward
    compatibility, existing usages of //go:linkname found in a
    large open-source code corpus remain supported. Any new
    references to standard library internal symbols will be
    disallowed.
  * Linker: A linker command line flag -checklinkname=0 can be used
    to disable this check, for debugging and experimenting
    purposes.
  * Linker: When building a dynamically linked ELF binary
    (including PIE binary), the new -bindnow flag enables immediate
    function binding.
  * Standard library changes:
  * timer: 1.23 makes two significant changes to the implementation
    of time.Timer and time.Ticker.
    First, Timers and Tickers that are no longer referred to by the
    program become eligible for garbage collection immediately,
    even if their Stop methods have not been called. Earlier
    versions of Go did not collect unstopped Timers until after
    they had fired and never collected unstopped Tickers.
    Second, the timer channel associated with a Timer or Ticker is
    now unbuffered, with capacity 0. The main effect of this change
    is that Go now guarantees that for any call to a Reset or Stop
    method, no stale values prepared before that call will be sent
    or received after the call. Earlier versions of Go used
    channels with a one-element buffer, making it difficult to use
    Reset and Stop correctly. A visible effect of this change is
    that len and cap of timer channels now returns 0 instead of 1,
    which may affect programs that poll the length to decide
    whether a receive on the timer channel will succeed. Such code
    should use a non-blocking receive instead.
    These new behaviors are only enabled when the main Go program
    is in a module with a go.mod go line using Go 1.23.0 or
    later. When Go 1.23 builds older programs, the old behaviors
    remain in effect. The new GODEBUG setting asynctimerchan=1 can
    be used to revert back to asynchronous channel behaviors even
    when a program names Go 1.23.0 or later in its go.mod file.
  * unique: The new unique package provides facilities for
    canonicalizing values (like 'interning' or 'hash-consing').
    Any value of comparable type may be canonicalized with the new
    Make[T] function, which produces a reference to a canonical
    copy of the value in the form of a Handle[T]. Two Handle[T] are
    equal if and only if the values used to produce the handles are
    equal, allowing programs to deduplicate values and reduce their
    memory footprint. Comparing two Handle[T] values is efficient,
    reducing down to a simple pointer comparison.
  * iter: The new iter package provides the basic definitions for
    working with user-defined iterators.
  * slices: The slices package adds several functions that work
    with iterators:
    - All returns an iterator over slice indexes and values.
    - Values returns an iterator over slice elements.
    - Backward returns an iterator that loops over a slice backward.
    - Collect collects values from an iterator into a new slice.
    - AppendSeq appends values from an iterator to an existing slice.
    - Sorted collects values from an iterator into a new slice, and then sorts the slice.
    - SortedFunc is like Sorted but with a comparison function.
    - SortedStableFunc is like SortFunc but uses a stable sort algorithm.
    - Chunk returns an iterator over consecutive sub-slices of up to n elements of a slice.
  * maps: The maps package adds several functions that work with
    iterators:
    - All returns an iterator over key-value pairs from a map.
    - Keys returns an iterator over keys in a map.
    - Values returns an iterator over values in a map.
    - Insert adds the key-value pairs from an iterator to an existing map.
    - Collect collects key-value pairs from an iterator into a new map and returns it.
  * structs: The new structs package provides types for struct
    fields that modify properties of the containing struct type
    such as memory layout.
    In this release, the only such type is HostLayout which
    indicates that a structure with a field of that type has a
    layout that conforms to host platform expectations.
  * Minor changes to the standard library: As always, there are
    various minor changes and updates to the library, made with the
    Go 1 promise of compatibility in mind.
  * archive/tar: If the argument to FileInfoHeader implements the
    new FileInfoNames interface, then the interface methods will be
    used to set the Uname/Gname of the file header. This allows
    applications to override the system-dependent Uname/Gname
    lookup.
  * crypto/tls: The TLS client now supports the Encrypted Client
    Hello draft specification. This feature can be enabled by
    setting the Config.EncryptedClientHelloConfigList field to an
    encoded ECHConfigList for the host that is being connected to.
  * crypto/tls: The QUICConn type used by QUIC implementations
    includes new events reporting on the state of session
    resumption, and provides a way for the QUIC layer to add data
    to session tickets and session cache entries.
  * crypto/tls: 3DES cipher suites were removed from the default
    list used when Config.CipherSuites is nil. The default can be
    reverted by adding tls3des=1 to the GODEBUG environment
    variable.
  * crypto/tls: The experimental post-quantum key exchange
    mechanism X25519Kyber768Draft00 is now enabled by default when
    Config.CurvePreferences is nil. The default can be reverted by
    adding tlskyber=0 to the GODEBUG environment variable.
  * crypto/tls: Go 1.23 changed the behavior of X509KeyPair and
    LoadX509KeyPair to populate the Certificate.Leaf field of the
    returned Certificate. The new x509keypairleaf GODEBUG setting
    is added for this behavior.
  * crypto/x509: CreateCertificateRequest now correctly supports
    RSA-PSS signature algorithms.
  * crypto/x509: CreateCertificateRequest and CreateRevocationList
    now verify the generated signature using the signer's public
    key. If the signature is invalid, an error is returned. This
    has been the behavior of CreateCertificate since Go 1.16.
  * crypto/x509: The x509sha1 GODEBUG setting will be removed in
    the next Go major release (Go 1.24). This will mean that
    crypto/x509 will no longer support verifying signatures on
    certificates that use SHA-1 based signature algorithms.
  * crypto/x509: The new ParseOID function parses a dot-encoded
    ASN.1 Object Identifier string. The OID type now implements the
    encoding.BinaryMarshaler, encoding.BinaryUnmarshaler,
    encoding.TextMarshaler, encoding.TextUnmarshaler interfaces.
    database/sql
  * crypto/x509: Errors returned by driver.Valuer implementations
    are now wrapped for improved error handling during operations
    like DB.Query, DB.Exec, and DB.QueryRow.
  * debug/elf: The debug/elf package now defines
    PT_OPENBSD_NOBTCFI. This ProgType is used to disable Branch
    Tracking Control Flow Integrity (BTCFI) enforcement on OpenBSD
    binaries.
  * debug/elf: Now defines the symbol type constants STT_RELC,
    STT_SRELC, and STT_GNU_IFUNC.
  * encoding/binary The new Encode and Decode functions are byte
    slice equivalents to Read and Write. Append allows marshaling
    multiple data into the same byte slice.
  * go/ast: The new Preorder function returns a convenient iterator
    over all the nodes of a syntax tree.
  * go/types: The Func type, which represents a function or method
    symbol, now has a Func.Signature method that returns the
    function's type, which is always a Signature.
  * go/types: The Alias type now has an Rhs method that returns the
    type on the right-hand side of its declaration: given type A =
    B, the Rhs of A is B. (go#66559)
  * go/types: The methods Alias.Origin, Alias.SetTypeParams,
    Alias.TypeParams, and Alias.TypeArgs have been added. They are
    needed for generic alias types.
  * go/types: By default, go/types now produces Alias type nodes
    for type aliases. This behavior can be controlled by the
    GODEBUG gotypesalias flag. Its default has changed from 0 in Go
    1.22 to 1 in Go 1.23.
  * math/rand/v2: The Uint function and Rand.Uint method have been
    added. They were inadvertently left out of Go 1.22.
  * math/rand/v2: The new ChaCha8.Read method implements the
    io.Reader interface.
  * net: The new type KeepAliveConfig permits fine-tuning the
    keep-alive options for TCP connections, via a new
    TCPConn.SetKeepAliveConfig method and new KeepAliveConfig
    fields for Dialer and ListenConfig.
  * net: The DNSError type now wraps errors caused by timeouts or
    cancellation. For example, errors.Is(someDNSErr,
    context.DeadlineExceedeed) will now report whether a DNS error
    was caused by a timeout.
  * net: The new GODEBUG setting netedns0=0 disables sending EDNS0
    additional headers on DNS requests, as they reportedly break
    the DNS server on some modems.
  * net/http: Cookie now preserves double quotes surrounding a
    cookie value. The new Cookie.Quoted field indicates whether the
    Cookie.Value was originally quoted.
  * net/http: The new Request.CookiesNamed method retrieves all
    cookies that match the given name.
  * net/http: The new Cookie.Partitioned field identifies cookies
    with the Partitioned attribute.
  * net/http: The patterns used by ServeMux now allow one or more
    spaces or tabs after the method name. Previously, only a single
    space was permitted.
  * net/http: The new ParseCookie function parses a Cookie header
    value and returns all the cookies which were set in it. Since
    the same cookie name can appear multiple times the returned
    Values can contain more than one value for a given key.
  * net/http: The new ParseSetCookie function parses a Set-Cookie
    header value and returns a cookie. It returns an error on
    syntax error.
  * net/http: ServeContent, ServeFile, and ServeFileFS now remove
    the Cache-Control, Content-Encoding, Etag, and Last-Modified
    headers when serving an error. These headers usually apply to
    the non-error content, but not to the text of errors.
  * net/http: Middleware which wraps a ResponseWriter and applies
    on-the-fly encoding, such as Content-Encoding: gzip, will not
    function after this change. The previous behavior of
    ServeContent, ServeFile, and ServeFileFS may be restored by
    setting GODEBUG=httpservecontentkeepheaders=1.
    Note that middleware which changes the size of the served
    content (such as by compressing it) already does not function
    properly when ServeContent handles a Range request. On-the-fly
    compression should use the Transfer-Encoding header instead of
    Content-Encoding.
  * net/http: For inbound requests, the new Request.Pattern field
    contains the ServeMux pattern (if any) that matched the
    request. This field is not set when GODEBUG=httpmuxgo121=1 is
    set.
  * net/http/httptest: The new NewRequestWithContext method creates
    an incoming request with a context.Context.
  * net/netip: In Go 1.22 and earlier, using reflect.DeepEqual to
    compare an Addr holding an IPv4 address to one holding the
    IPv4-mapped IPv6 form of that address incorrectly returned
    true, even though the Addr values were different when comparing
    with == or Addr.Compare. This bug is now fixed and all three
    approaches now report the same result.
  * os: The Stat function now sets the ModeSocket bit for files
    that are Unix sockets on Windows. These files are identified by
    having a reparse tag set to IO_REPARSE_TAG_AF_UNIX.
  * os: On Windows, the mode bits reported by Lstat and Stat for
    reparse points changed. Mount points no longer have ModeSymlink
    set, and reparse points that are not symlinks, Unix sockets, or
    dedup files now always have ModeIrregular set. This behavior is
    controlled by the winsymlink setting. For Go 1.23, it defaults
    to winsymlink=1. Previous versions default to winsymlink=0.
  * os: The CopyFS function copies an io/fs.FS into the local
    filesystem.
  * os: On Windows, Readlink no longer tries to normalize volumes
    to drive letters, which was not always even possible. This
    behavior is controlled by the winreadlinkvolume setting. For Go
    1.23, it defaults to winreadlinkvolume=1. Previous versions
    default to winreadlinkvolume=0.
  * os: On Linux with pidfd support (generally Linux v5.4+),
    Process-related functions and methods use pidfd (rather than
    PID) internally, eliminating potential mistargeting when a PID
    is reused by the OS. Pidfd support is fully transparent to a
    user, except for additional process file descriptors that a
    process may have.
  * path/filepath: The new Localize function safely converts a
    slash-separated path into an operating system path.
  * path/filepath: On Windows, EvalSymlinks no longer evaluates
    mount points, which was a source of many inconsistencies and
    bugs. This behavior is controlled by the winsymlink
    setting. For Go 1.23, it defaults to winsymlink=1. Previous
    versions default to winsymlink=0.
  * path/filepath: On Windows, EvalSymlinks no longer tries to
    normalize volumes to drive letters, which was not always even
    possible. This behavior is controlled by the winreadlinkvolume
    setting. For Go 1.23, it defaults to
    winreadlinkvolume=1. Previous versions default to
    winreadlinkvolume=0.
  * reflect: The new methods synonymous with the methods of the
    same name in Value are added to Type:
    - Type.OverflowComplex
    - Type.OverflowFloat
    - Type.OverflowInt
    - Type.OverflowUint
  * reflect: The new SliceAt function is analogous to NewAt, but
    for slices.
  * reflect: The Value.Pointer and Value.UnsafePointer methods now
    support values of kind String.
  * reflect: The new methods Value.Seq and Value.Seq2 return
    sequences that iterate over the value as though it were used in
    a for/range loop. The new methods Type.CanSeq and Type.CanSeq2
    report whether calling Value.Seq and Value.Seq2, respectively,
    will succeed without panicking.
  * runtime/debug: The SetCrashOutput function allows the user to
    specify an alternate file to which the runtime should write its
    fatal crash report. It may be used to construct an automated
    reporting mechanism for all unexpected crashes, not just those
    in goroutines that explicitly use recover.
  * runtime/pprof: The maximum stack depth for alloc, mutex, block,
    threadcreate and goroutine profiles has been raised from 32 to
    128 frames.
  * runtime/trace: The runtime now explicitly flushes trace data
    when a program crashes due to an uncaught panic. This means
    that more complete trace data will be available in a trace if
    the program crashes while tracing is active.
  * slices: The Repeat function returns a new slice that repeats
    the provided slice the given number of times.
  * sync: The Map.Clear method deletes all the entries, resulting
    in an empty Map. It is analogous to clear.
  * sync/atomic: The new And and Or operators apply a bitwise AND
    or OR to the given input, returning the old value.
  * syscall: The syscall package now defines WSAENOPROTOOPT on
    Windows.
  * syscall: The GetsockoptInt function is now supported on
    Windows.
  * testing/fstest: TestFS now returns a structured error that can
    be unwrapped (via method Unwrap() []error). This allows
    inspecting errors using errors.Is or errors.As.
  * text/template: Templates now support the new 'else with'
    action, which reduces template complexity in some use cases.
  * time: Parse and ParseInLocation now return an error if the time
    zone offset is out of range.
  * unicode/utf16: The RuneLen function returns the number of
    16-bit words in the UTF-16 encoding of the rune. It returns -1
    if the rune is not a valid value to encode in UTF-16.
  * Port: Darwin: As announced in the Go 1.22 release notes, Go
    1.23 requires macOS 11 Big Sur or later; support for previous
    versions has been discontinued.
  * Port: Linux: Go 1.23 is the last release that requires Linux
    kernel version 2.6.32 or later. Go 1.24 will require Linux
    kernel version 3.17 or later, with an exception that systems
    running 3.10 or later will continue to be supported if the
    kernel has been patched to support the getrandom system call.
  * Port: OpenBSD: Go 1.23 adds experimental support for OpenBSD on
    64-bit RISC-V (GOOS=openbsd, GOARCH=riscv64).
  * Port: ARM64: Go 1.23 introduces a new GOARM64 environment
    variable, which specifies the minimum target version of the
    ARM64 architecture at compile time. Allowed values are v8.{0-9}
    and v9.{0-5}. This may be followed by an option specifying
    extensions implemented by target hardware. Valid options are
    ,lse and ,crypto.
    The GOARM64 environment variable defaults to v8.0.
  * Port: RISC-V: Go 1.23 introduces a new GORISCV64 environment
    variable, which selects the RISC-V user-mode application
    profile for which to compile. Allowed values are rva20u64 and
    rva22u64.
    The GORISCV64 environment variable defaults to rva20u64.
  * Port: Wasm: The go_wasip1_wasm_exec script in GOROOT/misc/wasm
    has dropped support for versions of wasmtime &lt; 14.0.0.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-29"/>
	<updated date="2024-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229122">SUSE bug 1229122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230252">SUSE bug 1230252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230253">SUSE bug 1230253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230254">SUSE bug 1230254</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34155/">CVE-2024-34155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34155">CVE-2024-34155 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34158/">CVE-2024-34158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34158">CVE-2024-34158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948630" comment="go1.23-openssl-1.23.2.2-150000.1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948631" comment="go1.23-openssl-doc-1.23.2.2-150000.1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948632" comment="go1.23-openssl-race-1.23.2.2-150000.1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5051" version="1" class="patch">
	<metadata>
		<title>Security update for pcp (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217826" ref_url="https://bugzilla.suse.com/1217826" source="BUGZILLA"/>
		<reference ref_id="1222815" ref_url="https://bugzilla.suse.com/1222815" source="BUGZILLA"/>
		<reference ref_id="1230551" ref_url="https://bugzilla.suse.com/1230551" source="BUGZILLA"/>
		<reference ref_id="1230552" ref_url="https://bugzilla.suse.com/1230552" source="BUGZILLA"/>
		<reference ref_id="1231345" ref_url="https://bugzilla.suse.com/1231345" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-6917" ref_url="https://www.suse.com/security/cve/CVE-2023-6917/" source="CVE"/>
		<reference ref_id="CVE-2024-45769" ref_url="https://www.suse.com/security/cve/CVE-2024-45769/" source="CVE"/>
		<reference ref_id="CVE-2024-45770" ref_url="https://www.suse.com/security/cve/CVE-2024-45770/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019697.html" source="SUSE-SU"/>
		<description>
This update for pcp fixes the following issues:

pcp was updated from version 5.2.5 to version 6.2.0 (jsc#PED-8192, jsc#PED-8389):

- Security issues fixed:

  * CVE-2024-45770: Fixed a symlink attack that allows escalating from the pcp to the root user (bsc#1230552)
  * CVE-2024-45769: Fixed a heap corruption through metric pmstore operations (bsc#1230551)
  * CVE-2023-6917: Fixed local privilege escalation from pcp user to root in /usr/libexec/pcp/lib/pmproxy (bsc#1217826)

- Major changes:

  * Add version 3 PCP archive support: instance domain change-deltas,
    Y2038-safe timestamps, nanosecond-precision timestamps, arbitrary timezones support, 64-bit file offsets used
    throughout for larger (beyond 2GB) individual volumes
    + Opt-in using the /etc/pcp.conf PCP_ARCHIVE_VERSION setting
    + Version 2 archives remain the default (for next few years)
  * Switch to using OpenSSL only throughout PCP (dropped NSS/NSPR);
    this impacts on libpcp, PMAPI clients and PMCD use of encryption;
    these are now configured and used consistently with pmproxy HTTPS support and redis-server, which were both already
    using OpenSSL.
  * New nanosecond precision timestamp PMAPI calls for PCP library interfaces that make use of timestamps
    These are all optional, and full backward compatibility is preserved for existing tools.
  * For the full list of changes please consult the packaged CHANGELOG file

- Other packaging changes:

  * Moved pmlogger_daily into the main package (bsc#1222815)
  * Change dependency from openssl-devel &gt;= 1.1.1 to openssl-devel &gt;= 1.0.2p.
    Required for SLE-12
  * Introduce 'pmda-resctrl' package, disabled for architectures other than x86_64
  * Change the architecture for various subpackages to 'noarch' as they contain no binaries
  * Disable 'pmda-mssql', as it fails to build
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-30"/>
	<updated date="2024-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217826">SUSE bug 1217826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222815">SUSE bug 1222815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230551">SUSE bug 1230551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230552">SUSE bug 1230552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231345">SUSE bug 1231345</bugzilla>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6917/">CVE-2023-6917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6917">CVE-2023-6917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45769/">CVE-2024-45769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45769">CVE-2024-45769 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45770/">CVE-2024-45770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45770">CVE-2024-45770 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948683" comment="libpcp-devel-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948684" comment="libpcp3-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948685" comment="libpcp_gui2-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948686" comment="libpcp_import1-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948687" comment="libpcp_mmv1-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948688" comment="libpcp_trace2-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948689" comment="libpcp_web1-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948690" comment="pcp-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948691" comment="pcp-conf-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948692" comment="pcp-devel-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948693" comment="pcp-doc-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948694" comment="pcp-export-pcp2elasticsearch-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948695" comment="pcp-export-pcp2graphite-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948696" comment="pcp-export-pcp2influxdb-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948697" comment="pcp-export-pcp2json-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948698" comment="pcp-export-pcp2spark-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948699" comment="pcp-export-pcp2xml-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948700" comment="pcp-export-pcp2zabbix-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948701" comment="pcp-gui-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948702" comment="pcp-import-collectl2pcp-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948703" comment="pcp-import-ganglia2pcp-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948704" comment="pcp-import-iostat2pcp-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948705" comment="pcp-import-mrtg2pcp-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948706" comment="pcp-import-sar2pcp-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948707" comment="pcp-pmda-activemq-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948708" comment="pcp-pmda-apache-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948709" comment="pcp-pmda-bash-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948710" comment="pcp-pmda-bonding-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948711" comment="pcp-pmda-cifs-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948712" comment="pcp-pmda-cisco-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948713" comment="pcp-pmda-dbping-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948714" comment="pcp-pmda-dm-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948715" comment="pcp-pmda-docker-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948716" comment="pcp-pmda-ds389-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948717" comment="pcp-pmda-ds389log-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948718" comment="pcp-pmda-elasticsearch-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948719" comment="pcp-pmda-gfs2-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948720" comment="pcp-pmda-gluster-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948721" comment="pcp-pmda-gpfs-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948722" comment="pcp-pmda-gpsd-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948723" comment="pcp-pmda-hacluster-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948724" comment="pcp-pmda-haproxy-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948725" comment="pcp-pmda-infiniband-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948726" comment="pcp-pmda-json-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948727" comment="pcp-pmda-lmsensors-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948728" comment="pcp-pmda-logger-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948729" comment="pcp-pmda-lustre-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948730" comment="pcp-pmda-lustrecomm-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948731" comment="pcp-pmda-mailq-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948732" comment="pcp-pmda-memcache-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948733" comment="pcp-pmda-mic-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948734" comment="pcp-pmda-mounts-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948735" comment="pcp-pmda-mysql-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948736" comment="pcp-pmda-named-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948737" comment="pcp-pmda-netcheck-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948738" comment="pcp-pmda-netfilter-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948739" comment="pcp-pmda-news-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948740" comment="pcp-pmda-nfsclient-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948741" comment="pcp-pmda-nginx-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948742" comment="pcp-pmda-nutcracker-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948743" comment="pcp-pmda-nvidia-gpu-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948744" comment="pcp-pmda-openmetrics-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948745" comment="pcp-pmda-openvswitch-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948746" comment="pcp-pmda-oracle-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948747" comment="pcp-pmda-pdns-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948748" comment="pcp-pmda-perfevent-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948749" comment="pcp-pmda-postfix-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948750" comment="pcp-pmda-rabbitmq-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948751" comment="pcp-pmda-redis-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948752" comment="pcp-pmda-roomtemp-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948753" comment="pcp-pmda-rsyslog-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948754" comment="pcp-pmda-samba-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948755" comment="pcp-pmda-sendmail-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948756" comment="pcp-pmda-shping-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948757" comment="pcp-pmda-slurm-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948758" comment="pcp-pmda-smart-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948759" comment="pcp-pmda-snmp-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948760" comment="pcp-pmda-sockets-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948761" comment="pcp-pmda-summary-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948762" comment="pcp-pmda-systemd-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948763" comment="pcp-pmda-trace-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948764" comment="pcp-pmda-unbound-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948765" comment="pcp-pmda-weblog-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948766" comment="pcp-pmda-zimbra-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948767" comment="pcp-pmda-zswap-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948768" comment="pcp-system-tools-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948769" comment="pcp-testsuite-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948770" comment="pcp-zeroconf-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948771" comment="perl-PCP-LogImport-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948772" comment="perl-PCP-LogSummary-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948773" comment="perl-PCP-MMV-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948774" comment="perl-PCP-PMDA-6.2.0-150500.8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948775" comment="python3-pcp-6.2.0-150500.8.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5052" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231565" ref_url="https://bugzilla.suse.com/1231565" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-9632" ref_url="https://www.suse.com/security/cve/CVE-2024-9632/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019707.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2024-9632: Fixed heap-based buffer overflow privilege escalation in _XkbSetCompatMap (bsc#1231565).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-30"/>
	<updated date="2024-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1231565">SUSE bug 1231565</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9632/">CVE-2024-9632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9632">CVE-2024-9632 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948776" comment="xorg-x11-server-21.1.4-150500.7.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948777" comment="xorg-x11-server-Xvfb-21.1.4-150500.7.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948778" comment="xorg-x11-server-extra-21.1.4-150500.7.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948779" comment="xorg-x11-server-sdk-21.1.4-150500.7.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948780" comment="xorg-x11-server-source-21.1.4-150500.7.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5053" version="1" class="patch">
	<metadata>
		<title>Security update for xwayland (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231565" ref_url="https://bugzilla.suse.com/1231565" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-9632" ref_url="https://www.suse.com/security/cve/CVE-2024-9632/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019705.html" source="SUSE-SU"/>
		<description>
This update for xwayland fixes the following issues:

- CVE-2024-9632: Fixed heap-based buffer overflow privilege escalation in _XkbSetCompatMap (bsc#1231565).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-30"/>
	<updated date="2024-10-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1231565">SUSE bug 1231565</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9632/">CVE-2024-9632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9632">CVE-2024-9632 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948781" comment="xwayland-22.1.5-150500.7.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948782" comment="xwayland-devel-22.1.5-150500.7.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5054" version="1" class="patch">
	<metadata>
		<title>Security update for go1.21-openssl (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230252" ref_url="https://bugzilla.suse.com/1230252" source="BUGZILLA"/>
		<reference ref_id="1230253" ref_url="https://bugzilla.suse.com/1230253" source="BUGZILLA"/>
		<reference ref_id="1230254" ref_url="https://bugzilla.suse.com/1230254" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-34155" ref_url="https://www.suse.com/security/cve/CVE-2024-34155/" source="CVE"/>
		<reference ref_id="CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156/" source="CVE"/>
		<reference ref_id="CVE-2024-34158" ref_url="https://www.suse.com/security/cve/CVE-2024-34158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019717.html" source="SUSE-SU"/>
		<description>
This update for go1.21-openssl fixes the following issues:

- CVE-2024-34158: Fixed stack exhaustion in Parse in go/build/constraint (bsc#1230254).
- CVE-2024-34156: Fixed stack exhaustion in Decoder.Decode in encoding/gob (bsc#1230253).
- CVE-2024-34155: Fixed stack exhaustion in all Parse* functions (bsc#1230252).

- Update to version 1.21.13.3 cut from the go1.21-fips-release (jsc#SLE-18320).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-30"/>
	<updated date="2024-10-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1230252">SUSE bug 1230252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230253">SUSE bug 1230253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230254">SUSE bug 1230254</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34155/">CVE-2024-34155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34155">CVE-2024-34155 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34158/">CVE-2024-34158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34158">CVE-2024-34158 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009948783" comment="go1.21-openssl-1.21.13.4-150000.1.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948784" comment="go1.21-openssl-doc-1.21.13.4-150000.1.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948785" comment="go1.21-openssl-race-1.21.13.4-150000.1.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5055" version="1" class="patch">
	<metadata>
		<title>Security update for python-Werkzeug (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1232449" ref_url="https://bugzilla.suse.com/1232449" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-49767" ref_url="https://www.suse.com/security/cve/CVE-2024-49767/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019716.html" source="SUSE-SU"/>
		<description>
This update for python-Werkzeug fixes the following issues:

- CVE-2024-49767: Fixed possible resource exhaustion when parsing file data in forms (bsc#1232449).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-30"/>
	<updated date="2024-10-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1232449">SUSE bug 1232449</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-49767/">CVE-2024-49767 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49767">CVE-2024-49767 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948786" comment="python311-Werkzeug-2.3.6-150400.6.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5056" version="1" class="patch">
	<metadata>
		<title>Security update for govulncheck-vulndb (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="SUSE-SU-2024:3811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019715.html" source="SUSE-SU"/>
		<description>
This update for govulncheck-vulndb fixes the following issues:

- Update to version 0.0.20241028T152002 2024-10-28T15:20:02Z.
  Refs jsc#PED-11136
  Go CVE Numbering Authority IDs added or updated:
  * GO-2024-3207
  * GO-2024-3208
  * GO-2024-3210
  * GO-2024-3211
  * GO-2024-3212
  * GO-2024-3213
  * GO-2024-3214
  * GO-2024-3215
  * GO-2024-3216
  * GO-2024-3217
  * GO-2024-3219
  * GO-2024-3220
  * GO-2024-3221
  * GO-2024-3222
  * GO-2024-3223
  * GO-2024-3224

- Update to version 0.0.20241017T153730 date 2024-10-17T15:37:30Z.
  Go CVE Numbering Authority IDs added or updated:
  * GO-2024-3189
  * GO-2024-3203
  * GO-2024-3204
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-30"/>
	<updated date="2024-10-30"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009948787" comment="govulncheck-vulndb-0.0.20241028T152002-150000.1.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5057" version="1" class="patch">
	<metadata>
		<title>Security update for 389-ds (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230852" ref_url="https://bugzilla.suse.com/1230852" source="BUGZILLA"/>
		<reference ref_id="1231462" ref_url="https://bugzilla.suse.com/1231462" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-2199" ref_url="https://www.suse.com/security/cve/CVE-2024-2199/" source="CVE"/>
		<reference ref_id="CVE-2024-3657" ref_url="https://www.suse.com/security/cve/CVE-2024-3657/" source="CVE"/>
		<reference ref_id="CVE-2024-5953" ref_url="https://www.suse.com/security/cve/CVE-2024-5953/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019746.html" source="SUSE-SU"/>
		<description>
This update for 389-ds fixes the following issues:

- Persist extracted key path for ldap_ssl_client_init over repeat invocations (bsc#1230852)
- Re-enable use of .dsrc basedn for dsidm commands (bsc#1231462)
- Update to version 2.2.10~git18.20ce9289:
  * RFE: Use previously extracted key path
  * Update dsidm to prioritize basedn from .dsrc over interactive input
  * UI: Instance fails to load when DB backup directory doesn't exist
  * Improve online import robustness when the server is under load
  * Ensure all slapi_log_err calls end format strings with newline character \n
  * RFE: when memberof is enabled, defer updates of members from the update of the group
  * Provide more information in the error message during setup_ol_tls_conn()
  * Wrong set of entries returned for some search filters
  * Schema lib389 object is not keeping custom schema data upon editing
  * UI: Fix audit issue with npm - micromatch
  * Fix long delay when setting replication agreement with dsconf
  * Changelog trims updates from a given RID even if a consumer has not received any of them
  * test_password_modify_non_utf8 should set default password storage scheme
  * Update Cargo.lock
  * Rearrange includes for 32-bit support logic
  * Fix fedora cop RawHide builds
  * Bump braces from 3.0.2 to 3.0.3 in /src/cockpit/389-console
  * Enabling replication for a sub suffix crashes browser
  * d2entry - Could not open id2entry err 0 - at startup when having sub-suffixes
  * Slow ldif2db import on a newly created BDB backend
  * Audit log buffering doesn't handle large updates
  * RFE: improve the performance of evaluation of filter component when tested against a large valueset (like group members)
  * passwordHistory is not updated with a pre-hashed password
  * ns-slapd crash in referint_get_config
  * Fix the UTC offset print
  * Fix OpenLDAP version autodetection
  * RFE: add new operation note for MFA authentications
  * Add log buffering to audit log
  * Fix connection timeout error breaking errormap
  * Improve dsidm CLI No Such Entry handling
  * Improve connection timeout error logging
  * Add hidden -v and -j options to each CLI subcommand
  * Fix various issues with logconv.pl
  * Fix certificate lifetime displayed as NaN
  * Enhance Rust and JS bundling and add SPDX licenses for both
  * Remove audit-ci from dependencies
  * Fix unused variable warning from previous commit
  * covscan: fix memory leak in audit log when adding entries
  * Add a check for tagged commits
  * dscreate ds-root - accepts relative path
  * Change replica_id from str to int
  * Attribute Names changed to lowercase after adding the Attributes
  * ns-slapd crashes at startup if a backend has no suffix
  * During an update, if the target entry is reverted in the entry cache, the server should not retry to lock it
  * Reversion of the entry cache should be limited to BETXN plugin failures
  * Disable Transparent Huge Pages
  * Freelist ordering causes high wtime
  * Security fix for CVE-2024-2199
- VUL-0: CVE-2024-3657: 389-ds: potential denial of service via specially crafted kerberos AS-REQ request (bsc#1225512)
- VUL-0: CVE-2024-5953: 389-ds: malformed userPassword hashes may cause a denial of service (bsc#1226277)
- 389ds crash when user does change password using iso-8859-1 encoding (bsc#1228912)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2024-10-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1230852">SUSE bug 1230852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231462">SUSE bug 1231462</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2199/">CVE-2024-2199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2199">CVE-2024-2199 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3657/">CVE-2024-3657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3657">CVE-2024-3657 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-5953/">CVE-2024-5953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5953">CVE-2024-5953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950294" comment="389-ds-2.2.10~git18.20ce9289-150500.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950295" comment="389-ds-devel-2.2.10~git18.20ce9289-150500.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950296" comment="389-ds-snmp-2.2.10~git18.20ce9289-150500.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950297" comment="lib389-2.2.10~git18.20ce9289-150500.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950298" comment="libsvrcore0-2.2.10~git18.20ce9289-150500.3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5058" version="1" class="patch">
	<metadata>
		<title>Security update for uwsgi (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1222332" ref_url="https://bugzilla.suse.com/1222332" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-24795" ref_url="https://www.suse.com/security/cve/CVE-2024-24795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZWV2MVSBRL4AIHT5O6LIOEUFMOC3TUBS/" source="SUSE-SU"/>
		<description>
This update for uwsgi fixes the following issues:

- CVE-2024-24795: Fixed HTTP Response Splitting in multiple modules (bsc#1222332)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-01"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1222332">SUSE bug 1222332</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-24795/">CVE-2024-24795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24795">CVE-2024-24795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950388" comment="apache2-mod_uwsgi-2.0.19.1-150400.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950389" comment="uwsgi-2.0.19.1-150400.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950390" comment="uwsgi-emperor_pg-2.0.19.1-150400.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950391" comment="uwsgi-emperor_zeromq-2.0.19.1-150400.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950392" comment="uwsgi-gevent-2.0.19.1-150400.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950393" comment="uwsgi-glusterfs-2.0.19.1-150400.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950394" comment="uwsgi-greenlet-2.0.19.1-150400.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950395" comment="uwsgi-jvm-2.0.19.1-150400.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950396" comment="uwsgi-ldap-2.0.19.1-150400.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950397" comment="uwsgi-libffi-2.0.19.1-150400.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950398" comment="uwsgi-logzmq-2.0.19.1-150400.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950399" comment="uwsgi-lua-2.0.19.1-150400.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950400" comment="uwsgi-pam-2.0.19.1-150400.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950401" comment="uwsgi-php7-2.0.19.1-150400.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950402" comment="uwsgi-psgi-2.0.19.1-150400.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950403" comment="uwsgi-pypy-2.0.19.1-150400.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950404" comment="uwsgi-python3-2.0.19.1-150400.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950405" comment="uwsgi-sqlite3-2.0.19.1-150400.8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950406" comment="uwsgi-xslt-2.0.19.1-150400.8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5059" version="1" class="patch">
	<metadata>
		<title>Security update for cups-filters (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230937" ref_url="https://bugzilla.suse.com/1230937" source="BUGZILLA"/>
		<reference ref_id="1231294" ref_url="https://bugzilla.suse.com/1231294" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-47076" ref_url="https://www.suse.com/security/cve/CVE-2024-47076/" source="CVE"/>
		<reference ref_id="CVE-2024-47850" ref_url="https://www.suse.com/security/cve/CVE-2024-47850/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019765.html" source="SUSE-SU"/>
		<description>
This update for cups-filters fixes the following issues:

- CVE-2024-47850: cups-browsed can be abused to initiate remote DDoS against third-party targets (bsc#1231294)
- CVE-2024-47076: Fixed lack of input sanitization in cfGetPrinterAttributes5 (bsc#1230937).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-01"/>
	<updated date="2024-11-01"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1230937">SUSE bug 1230937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231294">SUSE bug 1231294</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47076/">CVE-2024-47076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47076">CVE-2024-47076 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47850/">CVE-2024-47850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47850">CVE-2024-47850 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950407" comment="cups-filters-1.25.0-150200.3.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950408" comment="cups-filters-devel-1.25.0-150200.3.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5060" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228097" ref_url="https://bugzilla.suse.com/1228097" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-40725" ref_url="https://www.suse.com/security/cve/CVE-2024-40725/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019764.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2024-40725: Fixed source code disclosure of local content (bsc#1228097)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-01"/>
	<updated date="2024-11-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1228097">SUSE bug 1228097</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-40725/">CVE-2024-40725 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40725">CVE-2024-40725 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950409" comment="apache2-2.4.51-150400.6.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950410" comment="apache2-devel-2.4.51-150400.6.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950411" comment="apache2-doc-2.4.51-150400.6.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950412" comment="apache2-event-2.4.51-150400.6.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950413" comment="apache2-example-pages-2.4.51-150400.6.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950414" comment="apache2-prefork-2.4.51-150400.6.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950415" comment="apache2-utils-2.4.51-150400.6.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950416" comment="apache2-worker-2.4.51-150400.6.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5061" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231039" ref_url="https://bugzilla.suse.com/1231039" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-23206" ref_url="https://www.suse.com/security/cve/CVE-2024-23206/" source="CVE"/>
		<reference ref_id="CVE-2024-23213" ref_url="https://www.suse.com/security/cve/CVE-2024-23213/" source="CVE"/>
		<reference ref_id="CVE-2024-23222" ref_url="https://www.suse.com/security/cve/CVE-2024-23222/" source="CVE"/>
		<reference ref_id="CVE-2024-23271" ref_url="https://www.suse.com/security/cve/CVE-2024-23271/" source="CVE"/>
		<reference ref_id="CVE-2024-27808" ref_url="https://www.suse.com/security/cve/CVE-2024-27808/" source="CVE"/>
		<reference ref_id="CVE-2024-27820" ref_url="https://www.suse.com/security/cve/CVE-2024-27820/" source="CVE"/>
		<reference ref_id="CVE-2024-27833" ref_url="https://www.suse.com/security/cve/CVE-2024-27833/" source="CVE"/>
		<reference ref_id="CVE-2024-27834" ref_url="https://www.suse.com/security/cve/CVE-2024-27834/" source="CVE"/>
		<reference ref_id="CVE-2024-27838" ref_url="https://www.suse.com/security/cve/CVE-2024-27838/" source="CVE"/>
		<reference ref_id="CVE-2024-27851" ref_url="https://www.suse.com/security/cve/CVE-2024-27851/" source="CVE"/>
		<reference ref_id="CVE-2024-40866" ref_url="https://www.suse.com/security/cve/CVE-2024-40866/" source="CVE"/>
		<reference ref_id="CVE-2024-44187" ref_url="https://www.suse.com/security/cve/CVE-2024-44187/" source="CVE"/>
		<reference ref_id="CVE-2024-4558" ref_url="https://www.suse.com/security/cve/CVE-2024-4558/" source="CVE"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.46.0 (bsc#1231039).

- CVE-2024-40866
- CVE-2024-44187

Already fixed in version 2.44.3:

- CVE-2024-4558
- CVE-2024-27838
- CVE-2024-27851
    
Already fixed in version 2.44.2:

- CVE-2024-27834
- CVE-2024-27808
- CVE-2024-27820
- CVE-2024-27833

Already fixed in version 2.44.1:

- CVE-2024-23222
- CVE-2024-23206
- CVE-2024-23213
- CVE-2024-23271
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-01"/>
	<updated date="2024-11-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1231039">SUSE bug 1231039</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23206/">CVE-2024-23206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23206">CVE-2024-23206 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23213/">CVE-2024-23213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23213">CVE-2024-23213 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23222/">CVE-2024-23222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23222">CVE-2024-23222 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-23271/">CVE-2024-23271 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23271">CVE-2024-23271 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27808/">CVE-2024-27808 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27808">CVE-2024-27808 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27820/">CVE-2024-27820 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27820">CVE-2024-27820 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27833/">CVE-2024-27833 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27833">CVE-2024-27833 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27834/">CVE-2024-27834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27834">CVE-2024-27834 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-27838/">CVE-2024-27838 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27838">CVE-2024-27838 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27851/">CVE-2024-27851 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27851">CVE-2024-27851 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-40866/">CVE-2024-40866 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40866">CVE-2024-40866 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-44187/">CVE-2024-44187 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44187">CVE-2024-44187 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4558/">CVE-2024-4558 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4558">CVE-2024-4558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950417" comment="WebKitGTK-4.0-lang-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950418" comment="WebKitGTK-4.1-lang-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950419" comment="WebKitGTK-6.0-lang-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950420" comment="libjavascriptcoregtk-4_0-18-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950421" comment="libjavascriptcoregtk-4_0-18-32bit-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950422" comment="libjavascriptcoregtk-4_1-0-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950423" comment="libjavascriptcoregtk-4_1-0-32bit-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950424" comment="libjavascriptcoregtk-6_0-1-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950425" comment="libwebkit2gtk-4_0-37-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950426" comment="libwebkit2gtk-4_0-37-32bit-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950427" comment="libwebkit2gtk-4_1-0-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950428" comment="libwebkit2gtk-4_1-0-32bit-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950429" comment="libwebkitgtk-6_0-4-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950430" comment="typelib-1_0-JavaScriptCore-4_0-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950431" comment="typelib-1_0-JavaScriptCore-4_1-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950432" comment="typelib-1_0-JavaScriptCore-6_0-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950433" comment="typelib-1_0-WebKit-6_0-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950434" comment="typelib-1_0-WebKit2-4_0-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950435" comment="typelib-1_0-WebKit2-4_1-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950436" comment="typelib-1_0-WebKit2WebExtension-4_0-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950437" comment="typelib-1_0-WebKit2WebExtension-4_1-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950438" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950439" comment="webkit-jsc-4-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950440" comment="webkit-jsc-4.1-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950441" comment="webkit-jsc-6.0-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950442" comment="webkit2gtk-4_0-injected-bundles-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950443" comment="webkit2gtk-4_1-injected-bundles-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950444" comment="webkit2gtk3-devel-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950445" comment="webkit2gtk3-minibrowser-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950446" comment="webkit2gtk3-soup2-devel-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950447" comment="webkit2gtk3-soup2-minibrowser-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950448" comment="webkit2gtk4-devel-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950449" comment="webkit2gtk4-minibrowser-2.46.0-150400.4.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950450" comment="webkitgtk-6_0-injected-bundles-2.46.0-150400.4.91.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5062" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-bundler (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1193578" ref_url="https://bugzilla.suse.com/1193578" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43809" ref_url="https://www.suse.com/security/cve/CVE-2021-43809/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019757.html" source="SUSE-SU"/>
		<description>
This update for rubygem-bundler fixes the following issues:

- CVE-2021-43809: Fixed remote execution via Gemfile argument injection (bsc#1193578)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-01"/>
	<updated date="2024-11-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193578">SUSE bug 1193578</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43809/">CVE-2021-43809 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43809">CVE-2021-43809 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950451" comment="ruby2.5-rubygem-bundler-1.16.1-150000.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950452" comment="ruby2.5-rubygem-bundler-doc-1.16.1-150000.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5063" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.5 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1224390" ref_url="https://bugzilla.suse.com/1224390" source="BUGZILLA"/>
		<reference ref_id="1228072" ref_url="https://bugzilla.suse.com/1228072" source="BUGZILLA"/>
		<reference ref_id="1228794" ref_url="https://bugzilla.suse.com/1228794" source="BUGZILLA"/>
		<reference ref_id="1228799" ref_url="https://bugzilla.suse.com/1228799" source="BUGZILLA"/>
		<reference ref_id="1229673" ref_url="https://bugzilla.suse.com/1229673" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-35176" ref_url="https://www.suse.com/security/cve/CVE-2024-35176/" source="CVE"/>
		<reference ref_id="CVE-2024-39908" ref_url="https://www.suse.com/security/cve/CVE-2024-39908/" source="CVE"/>
		<reference ref_id="CVE-2024-41123" ref_url="https://www.suse.com/security/cve/CVE-2024-41123/" source="CVE"/>
		<reference ref_id="CVE-2024-41946" ref_url="https://www.suse.com/security/cve/CVE-2024-41946/" source="CVE"/>
		<reference ref_id="CVE-2024-43398" ref_url="https://www.suse.com/security/cve/CVE-2024-43398/" source="CVE"/>
		<description>
This update for ruby2.5 fixes the following issues:

- CVE-2024-43398: Fixed DoS when parsing a XML that has many deep elements with the same local name attributes (bsc#1229673)
- CVE-2024-41123: Fixed DoS when parsing an XML that contains many specific characters such as whitespaces, &gt;] and ]&gt; (bsc#1228794)
- CVE-2024-41946: Fixed DoS when parsing an XML that has many entity expansions with SAX2 or pull parser API (bsc#1228799)
- CVE-2024-35176: Fixed DoS when parsing an XML that has many left angled brackets in an attribute value (bsc#1224390)
- CVE-2024-39908: Fixed ReDos when parsing an XML that has many specific characters (bsc#1228072)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-01"/>
	<updated date="2024-11-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1224390">SUSE bug 1224390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228072">SUSE bug 1228072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228794">SUSE bug 1228794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228799">SUSE bug 1228799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229673">SUSE bug 1229673</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35176/">CVE-2024-35176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35176">CVE-2024-35176 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-39908/">CVE-2024-39908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39908">CVE-2024-39908 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41123/">CVE-2024-41123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41123">CVE-2024-41123 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41946/">CVE-2024-41946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41946">CVE-2024-41946 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43398/">CVE-2024-43398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43398">CVE-2024-43398 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950453" comment="libruby2_5-2_5-2.5.9-150000.4.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950454" comment="ruby2.5-2.5.9-150000.4.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950455" comment="ruby2.5-devel-2.5.9-150000.4.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950456" comment="ruby2.5-devel-extra-2.5.9-150000.4.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950457" comment="ruby2.5-doc-2.5.9-150000.4.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950458" comment="ruby2.5-doc-ri-2.5.9-150000.4.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950459" comment="ruby2.5-stdlib-2.5.9-150000.4.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5064" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231702" ref_url="https://bugzilla.suse.com/1231702" source="BUGZILLA"/>
		<reference ref_id="1231711" ref_url="https://bugzilla.suse.com/1231711" source="BUGZILLA"/>
		<reference ref_id="1231716" ref_url="https://bugzilla.suse.com/1231716" source="BUGZILLA"/>
		<reference ref_id="1231719" ref_url="https://bugzilla.suse.com/1231719" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21208" ref_url="https://www.suse.com/security/cve/CVE-2024-21208/" source="CVE"/>
		<reference ref_id="CVE-2024-21210" ref_url="https://www.suse.com/security/cve/CVE-2024-21210/" source="CVE"/>
		<reference ref_id="CVE-2024-21217" ref_url="https://www.suse.com/security/cve/CVE-2024-21217/" source="CVE"/>
		<reference ref_id="CVE-2024-21235" ref_url="https://www.suse.com/security/cve/CVE-2024-21235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019755.html" source="SUSE-SU"/>
		<description>
This update for java-11-openjdk fixes the following issues:

Updated to version 11.0.25+9 (October 2024 CPU):

- CVE-2024-21208: Fixed partial DoS in component Networking (bsc#1231702)
- CVE-2024-21210: Fixed unauthorized read/write access to data in component Hotspot (bsc#1231711) 
- CVE-2024-21217: Fixed partial DoS in component Serialization (bsc#1231716)
- CVE-2024-21235: Fixed unauthorized read/write access to data in component Hotspot (bsc#1231719)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-01"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1231702">SUSE bug 1231702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231711">SUSE bug 1231711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231716">SUSE bug 1231716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231719">SUSE bug 1231719</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21208/">CVE-2024-21208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21208">CVE-2024-21208 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21210/">CVE-2024-21210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21210">CVE-2024-21210 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21217/">CVE-2024-21217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21217">CVE-2024-21217 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21235/">CVE-2024-21235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21235">CVE-2024-21235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950460" comment="java-11-openjdk-11.0.25.0-150000.3.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950461" comment="java-11-openjdk-demo-11.0.25.0-150000.3.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950462" comment="java-11-openjdk-devel-11.0.25.0-150000.3.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950463" comment="java-11-openjdk-headless-11.0.25.0-150000.3.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950464" comment="java-11-openjdk-javadoc-11.0.25.0-150000.3.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950465" comment="java-11-openjdk-jmods-11.0.25.0-150000.3.119.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950466" comment="java-11-openjdk-src-11.0.25.0-150000.3.119.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5065" version="1" class="patch">
	<metadata>
		<title>Security update for python-waitress (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1232554" ref_url="https://bugzilla.suse.com/1232554" source="BUGZILLA"/>
		<reference ref_id="1232556" ref_url="https://bugzilla.suse.com/1232556" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-49768" ref_url="https://www.suse.com/security/cve/CVE-2024-49768/" source="CVE"/>
		<reference ref_id="CVE-2024-49769" ref_url="https://www.suse.com/security/cve/CVE-2024-49769/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019754.html" source="SUSE-SU"/>
		<description>
This update for python-waitress fixes the following issues:

- CVE-2024-49768: Fixed request processing race condition in HTTP pipelining with invalid first request when lookahead is enabled (bsc#1232556)
- CVE-2024-49769: Fixed incorrect connection clean up leads to a busy-loop and resource exhaustion (bsc#1232554)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-01"/>
	<updated date="2024-11-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1232554">SUSE bug 1232554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232556">SUSE bug 1232556</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49768/">CVE-2024-49768 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49768">CVE-2024-49768 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49769/">CVE-2024-49769 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49769">CVE-2024-49769 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950467" comment="python311-waitress-2.1.2-150400.12.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950468" comment="python311-waitress-doc-2.1.2-150400.12.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5066" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionpack-5_1 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228667" ref_url="https://bugzilla.suse.com/1228667" source="BUGZILLA"/>
		<reference ref_id="1231729" ref_url="https://bugzilla.suse.com/1231729" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-42228" ref_url="https://www.suse.com/security/cve/CVE-2024-42228/" source="CVE"/>
		<reference ref_id="CVE-2024-47887" ref_url="https://www.suse.com/security/cve/CVE-2024-47887/" source="CVE"/>
		<description>
This update for rubygem-actionpack-5_1 fixes the following issues:

- CVE-2024-47887: Fixed Possible ReDoS vulnerability in HTTP Token authentication in Action Controller (bsc#1231729).
- CVE-2024-42228: Fixed uninitialized value *size when calling amdgpu_vce_cs_reloc (bsc#1228667).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-01"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1228667">SUSE bug 1228667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231729">SUSE bug 1231729</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42228/">CVE-2024-42228 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42228">CVE-2024-42228 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47887/">CVE-2024-47887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47887">CVE-2024-47887 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950469" comment="ruby2.5-rubygem-actionpack-5_1-5.1.4-150000.3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950470" comment="ruby2.5-rubygem-actionpack-doc-5_1-5.1.4-150000.3.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5067" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionmailer-5_1 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231723" ref_url="https://bugzilla.suse.com/1231723" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-47889" ref_url="https://www.suse.com/security/cve/CVE-2024-47889/" source="CVE"/>
		<description>
This update for rubygem-actionmailer-5_1 fixes the following issues:

- CVE-2024-47889: Fixed Possible ReDoS vulnerability in block_format in Action Mailer (bsc#1231723).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-01"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1231723">SUSE bug 1231723</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47889/">CVE-2024-47889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47889">CVE-2024-47889 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950471" comment="ruby2.5-rubygem-actionmailer-5_1-5.1.4-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950472" comment="ruby2.5-rubygem-actionmailer-doc-5_1-5.1.4-150000.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5068" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230906" ref_url="https://bugzilla.suse.com/1230906" source="BUGZILLA"/>
		<reference ref_id="1232241" ref_url="https://bugzilla.suse.com/1232241" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-9287" ref_url="https://www.suse.com/security/cve/CVE-2024-9287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019766.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Security fixes:

- CVE-2024-9287: properly quote path names provided when creating a virtual environment (bsc#1232241)

Other fixes:

- Drop .pyc files from docdir for reproducible builds (bsc#1230906)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-01"/>
	<updated date="2024-11-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1230906">SUSE bug 1230906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232241">SUSE bug 1232241</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green" href="https://www.suse.com/security/cve/CVE-2024-9287/">CVE-2024-9287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9287">CVE-2024-9287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950473" comment="libpython3_6m1_0-3.6.15-150300.10.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950474" comment="libpython3_6m1_0-32bit-3.6.15-150300.10.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950475" comment="python3-3.6.15-150300.10.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950476" comment="python3-base-3.6.15-150300.10.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950477" comment="python3-curses-3.6.15-150300.10.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950478" comment="python3-dbm-3.6.15-150300.10.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950479" comment="python3-devel-3.6.15-150300.10.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950480" comment="python3-doc-3.6.15-150300.10.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950481" comment="python3-doc-devhelp-3.6.15-150300.10.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950482" comment="python3-idle-3.6.15-150300.10.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950483" comment="python3-testsuite-3.6.15-150300.10.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950484" comment="python3-tk-3.6.15-150300.10.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950485" comment="python3-tools-3.6.15-150300.10.75.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5069" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231879" ref_url="https://bugzilla.suse.com/1231879" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-10458" ref_url="https://www.suse.com/security/cve/CVE-2024-10458/" source="CVE"/>
		<reference ref_id="CVE-2024-10459" ref_url="https://www.suse.com/security/cve/CVE-2024-10459/" source="CVE"/>
		<reference ref_id="CVE-2024-10460" ref_url="https://www.suse.com/security/cve/CVE-2024-10460/" source="CVE"/>
		<reference ref_id="CVE-2024-10461" ref_url="https://www.suse.com/security/cve/CVE-2024-10461/" source="CVE"/>
		<reference ref_id="CVE-2024-10462" ref_url="https://www.suse.com/security/cve/CVE-2024-10462/" source="CVE"/>
		<reference ref_id="CVE-2024-10463" ref_url="https://www.suse.com/security/cve/CVE-2024-10463/" source="CVE"/>
		<reference ref_id="CVE-2024-10464" ref_url="https://www.suse.com/security/cve/CVE-2024-10464/" source="CVE"/>
		<reference ref_id="CVE-2024-10465" ref_url="https://www.suse.com/security/cve/CVE-2024-10465/" source="CVE"/>
		<reference ref_id="CVE-2024-10466" ref_url="https://www.suse.com/security/cve/CVE-2024-10466/" source="CVE"/>
		<reference ref_id="CVE-2024-10467" ref_url="https://www.suse.com/security/cve/CVE-2024-10467/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019773.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 128.4.0 ESR (bsc#1231879):
    
- CVE-2024-10458: Permission leak via embed or object elements
- CVE-2024-10459: Use-after-free in layout with accessibility
- CVE-2024-10460: Confusing display of origin for external protocol handler prompt
- CVE-2024-10461: XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response
- CVE-2024-10462: Origin of permission prompt could be spoofed by long URL
- CVE-2024-10463: Cross origin video frame leak
- CVE-2024-10464: History interface could have been used to cause a Denial of Service condition in the browser
- CVE-2024-10465: Clipboard 'paste' button persisted across tabs
- CVE-2024-10466: DOM push subscription message could hang Firefox
- CVE-2024-10467: Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-04"/>
	<updated date="2024-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1231879">SUSE bug 1231879</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10458/">CVE-2024-10458 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10458">CVE-2024-10458 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10459/">CVE-2024-10459 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10459">CVE-2024-10459 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10460/">CVE-2024-10460 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10460">CVE-2024-10460 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10461/">CVE-2024-10461 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10461">CVE-2024-10461 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10462/">CVE-2024-10462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10462">CVE-2024-10462 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10463/">CVE-2024-10463 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10463">CVE-2024-10463 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10464/">CVE-2024-10464 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10464">CVE-2024-10464 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10465/">CVE-2024-10465 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10465">CVE-2024-10465 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10466/">CVE-2024-10466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10466">CVE-2024-10466 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10467/">CVE-2024-10467 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10467">CVE-2024-10467 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009950854" comment="MozillaFirefox-128.4.0-150200.152.158.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950855" comment="MozillaFirefox-branding-upstream-128.4.0-150200.152.158.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950856" comment="MozillaFirefox-devel-128.4.0-150200.152.158.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950857" comment="MozillaFirefox-translations-common-128.4.0-150200.152.158.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950858" comment="MozillaFirefox-translations-other-128.4.0-150200.152.158.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5070" version="1" class="patch">
	<metadata>
		<title>Security update for govulncheck-vulndb (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="CVE-2022-45157" ref_url="https://www.suse.com/security/cve/CVE-2022-45157/" source="CVE"/>
		<reference ref_id="CVE-2023-22644" ref_url="https://www.suse.com/security/cve/CVE-2023-22644/" source="CVE"/>
		<reference ref_id="CVE-2023-32197" ref_url="https://www.suse.com/security/cve/CVE-2023-32197/" source="CVE"/>
		<reference ref_id="CVE-2024-10214" ref_url="https://www.suse.com/security/cve/CVE-2024-10214/" source="CVE"/>
		<reference ref_id="CVE-2024-10241" ref_url="https://www.suse.com/security/cve/CVE-2024-10241/" source="CVE"/>
		<reference ref_id="CVE-2024-22030" ref_url="https://www.suse.com/security/cve/CVE-2024-22030/" source="CVE"/>
		<reference ref_id="CVE-2024-22036" ref_url="https://www.suse.com/security/cve/CVE-2024-22036/" source="CVE"/>
		<reference ref_id="CVE-2024-33662" ref_url="https://www.suse.com/security/cve/CVE-2024-33662/" source="CVE"/>
		<reference ref_id="CVE-2024-36814" ref_url="https://www.suse.com/security/cve/CVE-2024-36814/" source="CVE"/>
		<reference ref_id="CVE-2024-38365" ref_url="https://www.suse.com/security/cve/CVE-2024-38365/" source="CVE"/>
		<reference ref_id="CVE-2024-39223" ref_url="https://www.suse.com/security/cve/CVE-2024-39223/" source="CVE"/>
		<reference ref_id="CVE-2024-47003" ref_url="https://www.suse.com/security/cve/CVE-2024-47003/" source="CVE"/>
		<reference ref_id="CVE-2024-47067" ref_url="https://www.suse.com/security/cve/CVE-2024-47067/" source="CVE"/>
		<reference ref_id="CVE-2024-47182" ref_url="https://www.suse.com/security/cve/CVE-2024-47182/" source="CVE"/>
		<reference ref_id="CVE-2024-47534" ref_url="https://www.suse.com/security/cve/CVE-2024-47534/" source="CVE"/>
		<reference ref_id="CVE-2024-47616" ref_url="https://www.suse.com/security/cve/CVE-2024-47616/" source="CVE"/>
		<reference ref_id="CVE-2024-47825" ref_url="https://www.suse.com/security/cve/CVE-2024-47825/" source="CVE"/>
		<reference ref_id="CVE-2024-47827" ref_url="https://www.suse.com/security/cve/CVE-2024-47827/" source="CVE"/>
		<reference ref_id="CVE-2024-47832" ref_url="https://www.suse.com/security/cve/CVE-2024-47832/" source="CVE"/>
		<reference ref_id="CVE-2024-47877" ref_url="https://www.suse.com/security/cve/CVE-2024-47877/" source="CVE"/>
		<reference ref_id="CVE-2024-48909" ref_url="https://www.suse.com/security/cve/CVE-2024-48909/" source="CVE"/>
		<reference ref_id="CVE-2024-48921" ref_url="https://www.suse.com/security/cve/CVE-2024-48921/" source="CVE"/>
		<reference ref_id="CVE-2024-49380" ref_url="https://www.suse.com/security/cve/CVE-2024-49380/" source="CVE"/>
		<reference ref_id="CVE-2024-49381" ref_url="https://www.suse.com/security/cve/CVE-2024-49381/" source="CVE"/>
		<reference ref_id="CVE-2024-49753" ref_url="https://www.suse.com/security/cve/CVE-2024-49753/" source="CVE"/>
		<reference ref_id="CVE-2024-49757" ref_url="https://www.suse.com/security/cve/CVE-2024-49757/" source="CVE"/>
		<reference ref_id="CVE-2024-50312" ref_url="https://www.suse.com/security/cve/CVE-2024-50312/" source="CVE"/>
		<reference ref_id="CVE-2024-7558" ref_url="https://www.suse.com/security/cve/CVE-2024-7558/" source="CVE"/>
		<reference ref_id="CVE-2024-7594" ref_url="https://www.suse.com/security/cve/CVE-2024-7594/" source="CVE"/>
		<reference ref_id="CVE-2024-8037" ref_url="https://www.suse.com/security/cve/CVE-2024-8037/" source="CVE"/>
		<reference ref_id="CVE-2024-8038" ref_url="https://www.suse.com/security/cve/CVE-2024-8038/" source="CVE"/>
		<reference ref_id="CVE-2024-8901" ref_url="https://www.suse.com/security/cve/CVE-2024-8901/" source="CVE"/>
		<reference ref_id="CVE-2024-8975" ref_url="https://www.suse.com/security/cve/CVE-2024-8975/" source="CVE"/>
		<reference ref_id="CVE-2024-8996" ref_url="https://www.suse.com/security/cve/CVE-2024-8996/" source="CVE"/>
		<reference ref_id="CVE-2024-9180" ref_url="https://www.suse.com/security/cve/CVE-2024-9180/" source="CVE"/>
		<reference ref_id="CVE-2024-9264" ref_url="https://www.suse.com/security/cve/CVE-2024-9264/" source="CVE"/>
		<reference ref_id="CVE-2024-9312" ref_url="https://www.suse.com/security/cve/CVE-2024-9312/" source="CVE"/>
		<reference ref_id="CVE-2024-9313" ref_url="https://www.suse.com/security/cve/CVE-2024-9313/" source="CVE"/>
		<reference ref_id="CVE-2024-9341" ref_url="https://www.suse.com/security/cve/CVE-2024-9341/" source="CVE"/>
		<reference ref_id="CVE-2024-9355" ref_url="https://www.suse.com/security/cve/CVE-2024-9355/" source="CVE"/>
		<reference ref_id="CVE-2024-9407" ref_url="https://www.suse.com/security/cve/CVE-2024-9407/" source="CVE"/>
		<reference ref_id="CVE-2024-9486" ref_url="https://www.suse.com/security/cve/CVE-2024-9486/" source="CVE"/>
		<reference ref_id="CVE-2024-9594" ref_url="https://www.suse.com/security/cve/CVE-2024-9594/" source="CVE"/>
		<reference ref_id="CVE-2024-9675" ref_url="https://www.suse.com/security/cve/CVE-2024-9675/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019776.html" source="SUSE-SU"/>
		<description>
This update for govulncheck-vulndb fixes the following issues:

Update to version 0.0.20241030T212825 2024-10-30T21:28:25Z ( jsc#PED-11136 )

- Go CVE Numbering Authority IDs added or updated with aliases:

  * GO-2024-3230 CVE-2024-48921 GHSA-qjvc-p88j-j9rm
  * GO-2024-3232 CVE-2024-10241 GHSA-6mvp-gh77-7vwh

- Go CVE Numbering Authority IDs added or updated with aliases:

  * GO-2024-3226 CVE-2024-47827 GHSA-ghjw-32xw-ffwr
  * GO-2024-3227 CVE-2024-10214 GHSA-hm57-h27x-599c
  * GO-2024-3228 GHSA-wcx9-ccpj-hx3c

- Go CVE Numbering Authority IDs added or updated with aliases:

  * GO-2024-3207 GHSA-p5wf-cmr4-xrwr
  * GO-2024-3208 CVE-2024-47825 GHSA-3wwx-63fv-pfq6
  * GO-2024-3210 CVE-2024-8901
  * GO-2024-3211 CVE-2024-50312
  * GO-2024-3212 GHSA-rjfv-pjvx-mjgv
  * GO-2024-3213 CVE-2024-49380
  * GO-2024-3214 CVE-2024-49381
  * GO-2024-3215 CVE-2024-9264 GHSA-q99m-qcv4-fpm7
  * GO-2024-3216 CVE-2024-49753 GHSA-6cf5-w9h3-4rqv
  * GO-2024-3217 CVE-2024-49757 GHSA-3rmw-76m6-4gjc
  * GO-2024-3219 GHSA-7h65-4p22-39j6
  * GO-2024-3220 CVE-2023-32197 GHSA-7h8m-pvw3-5gh4
  * GO-2024-3221 CVE-2024-22036 GHSA-h99m-6755-rgwc
  * GO-2024-3222 GHSA-x7xj-jvwp-97rv
  * GO-2024-3223 CVE-2022-45157 GHSA-xj7w-r753-vj8v
  * GO-2024-3224 CVE-2024-39223 GHSA-8wxx-35qc-vp6r

- Go CVE Numbering Authority IDs added or updated with aliases:

  * GO-2024-3189 CVE-2024-38365 GHSA-27vh-h6mc-q6g8
  * GO-2024-3203 CVE-2024-9486
  * GO-2024-3204 CVE-2024-9594

- Go CVE Numbering Authority IDs added or updated with aliases:

  * GO-2024-3189 CVE-2024-38365 GHSA-27vh-h6mc-q6g8
  * GO-2024-3196 CVE-2024-47877 GHSA-8rm2-93mq-jqhc
  * GO-2024-3199 GHSA-vv6c-69r6-chg9
  * GO-2024-3200 CVE-2024-48909 GHSA-3c32-4hq9-6wgj
  * GO-2024-3201 CVE-2023-22644
- Go CVE Numbering Authority IDs added or updated with aliases:

  * GO-2024-3166 CVE-2024-47534 GHSA-4f8r-qqr9-fq8j
  * GO-2024-3171 CVE-2024-9341 GHSA-mc76-5925-c5p6

- Go CVE Numbering Authority IDs added or updated with aliases:

  * GO-2024-3161 CVE-2024-22030 GHSA-h4h5-9833-v2p4
  * GO-2024-3162 CVE-2024-7594 GHSA-jg74-mwgw-v6x3
  * GO-2024-3163 CVE-2024-47182
  * GO-2024-3164 CVE-2024-47003 GHSA-59hf-mpf8-pqjh
  * GO-2024-3166 CVE-2024-47534 GHSA-4f8r-qqr9-fq8j
  * GO-2024-3167 CVE-2024-9355 GHSA-3h3x-2hwv-hr52
  * GO-2024-3168 CVE-2024-8975 GHSA-chqx-36rm-rf8h
  * GO-2024-3169 CVE-2024-9407 GHSA-fhqq-8f65-5xfc
  * GO-2024-3170 CVE-2024-8996 GHSA-m5gv-m5f9-wgv4
  * GO-2024-3172 CVE-2024-33662 GHSA-9mjw-79r6-c9m8
  * GO-2024-3173 CVE-2024-7558 GHSA-mh98-763h-m9v4
  * GO-2024-3174 CVE-2024-8037 GHSA-8v4w-f4r9-7h6x
  * GO-2024-3175 CVE-2024-8038 GHSA-xwgj-vpm9-q2rq
  * GO-2024-3179 CVE-2024-47616 GHSA-r7rh-jww5-5fjr
  * GO-2024-3181 CVE-2024-9313 GHSA-x5q3-c8rm-w787
  * GO-2024-3182 GHSA-wpr2-j6gr-pjw9
  * GO-2024-3184 CVE-2024-36814 GHSA-9cp9-8gw2-8v7m
  * GO-2024-3185 CVE-2024-47832
  * GO-2024-3186 CVE-2024-9675 GHSA-586p-749j-fhwp
  * GO-2024-3188 CVE-2024-9312 GHSA-4gfw-wf7c-w6g2
  * GO-2024-3190 CVE-2024-47067 GHSA-8pph-gfhp-w226
  * GO-2024-3191 CVE-2024-9180 GHSA-rr8j-7w34-xp5j		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-05"/>
	<updated date="2024-11-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45157/">CVE-2022-45157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-45157">CVE-2022-45157 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22644/">CVE-2023-22644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22644">CVE-2023-22644 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32197/">CVE-2023-32197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-32197">CVE-2023-32197 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10214/">CVE-2024-10214 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10214">CVE-2024-10214 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10241/">CVE-2024-10241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10241">CVE-2024-10241 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22030/">CVE-2024-22030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22030">CVE-2024-22030 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22036/">CVE-2024-22036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22036">CVE-2024-22036 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-33662/">CVE-2024-33662 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33662">CVE-2024-33662 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36814/">CVE-2024-36814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36814">CVE-2024-36814 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-38365/">CVE-2024-38365 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38365">CVE-2024-38365 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-39223/">CVE-2024-39223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39223">CVE-2024-39223 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47003/">CVE-2024-47003 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47003">CVE-2024-47003 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47067/">CVE-2024-47067 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47067">CVE-2024-47067 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47182/">CVE-2024-47182 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47182">CVE-2024-47182 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47534/">CVE-2024-47534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47534">CVE-2024-47534 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47616/">CVE-2024-47616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47616">CVE-2024-47616 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47825/">CVE-2024-47825 at SUSE</cve>
	<cve impact="high" cvss3="8.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47825">CVE-2024-47825 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47827/">CVE-2024-47827 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47827">CVE-2024-47827 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47832/">CVE-2024-47832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47832">CVE-2024-47832 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47877/">CVE-2024-47877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47877">CVE-2024-47877 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-48909/">CVE-2024-48909 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-48909">CVE-2024-48909 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-48921/">CVE-2024-48921 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-48921">CVE-2024-48921 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-49380/">CVE-2024-49380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-49380">CVE-2024-49380 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-49381/">CVE-2024-49381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49381">CVE-2024-49381 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-49753/">CVE-2024-49753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-49753">CVE-2024-49753 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-49757/">CVE-2024-49757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-49757">CVE-2024-49757 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-50312/">CVE-2024-50312 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50312">CVE-2024-50312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7558/">CVE-2024-7558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7558">CVE-2024-7558 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-7594/">CVE-2024-7594 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7594">CVE-2024-7594 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8037/">CVE-2024-8037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8037">CVE-2024-8037 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8038/">CVE-2024-8038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8038">CVE-2024-8038 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8901/">CVE-2024-8901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8901">CVE-2024-8901 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8975/">CVE-2024-8975 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8975">CVE-2024-8975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8996/">CVE-2024-8996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8996">CVE-2024-8996 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9180/">CVE-2024-9180 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9180">CVE-2024-9180 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-9264/">CVE-2024-9264 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9264">CVE-2024-9264 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9312/">CVE-2024-9312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9312">CVE-2024-9312 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9313/">CVE-2024-9313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9313">CVE-2024-9313 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N" cvss4="5.8/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9341/">CVE-2024-9341 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9341">CVE-2024-9341 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9355/">CVE-2024-9355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9355">CVE-2024-9355 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9407/">CVE-2024-9407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9407">CVE-2024-9407 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9486/">CVE-2024-9486 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9486">CVE-2024-9486 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9594/">CVE-2024-9594 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9594">CVE-2024-9594 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9675/">CVE-2024-9675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9675">CVE-2024-9675 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009950989" comment="govulncheck-vulndb-0.0.20241030T212825-150000.1.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5071" version="1" class="patch">
	<metadata>
		<title>Security update for libgsf (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231282" ref_url="https://bugzilla.suse.com/1231282" source="BUGZILLA"/>
		<reference ref_id="1231283" ref_url="https://bugzilla.suse.com/1231283" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-36474" ref_url="https://www.suse.com/security/cve/CVE-2024-36474/" source="CVE"/>
		<reference ref_id="CVE-2024-42415" ref_url="https://www.suse.com/security/cve/CVE-2024-42415/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019785.html" source="SUSE-SU"/>
		<description>
This update for libgsf fixes the following issues:

- CVE-2024-42415, CVE-2024-36474: Fixed integer overflows affecting memory allocation (bsc#1231282, bsc#1231283).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-06"/>
	<updated date="2024-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1231282">SUSE bug 1231282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231283">SUSE bug 1231283</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-36474/">CVE-2024-36474 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36474">CVE-2024-36474 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42415/">CVE-2024-42415 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42415">CVE-2024-42415 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951073" comment="gsf-office-thumbnailer-1.14.50-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951074" comment="libgsf-1-114-1.14.50-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951075" comment="libgsf-1-114-32bit-1.14.50-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951076" comment="libgsf-devel-1.14.50-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951077" comment="libgsf-lang-1.14.50-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951078" comment="libgsf-tools-1.14.50-150400.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951079" comment="typelib-1_0-Gsf-1-1.14.50-150400.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5072" version="1" class="patch">
	<metadata>
		<title>Security update for gradle (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212931" ref_url="https://bugzilla.suse.com/1212931" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-35947" ref_url="https://www.suse.com/security/cve/CVE-2023-35947/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019781.html" source="SUSE-SU"/>
		<description>
This update for gradle fixes the following issues:

- CVE-2023-35947: Fixed an issue while unpacking tar archives, where files could be created outside of the unpack location (bsc#1212931).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-06"/>
	<updated date="2024-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212931">SUSE bug 1212931</bugzilla>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-35947/">CVE-2023-35947 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35947">CVE-2023-35947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951080" comment="gradle-4.4.1-150200.3.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5073" version="1" class="patch">
	<metadata>
		<title>Security update for python310 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230906" ref_url="https://bugzilla.suse.com/1230906" source="BUGZILLA"/>
		<reference ref_id="1232241" ref_url="https://bugzilla.suse.com/1232241" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-9287" ref_url="https://www.suse.com/security/cve/CVE-2024-9287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019780.html" source="SUSE-SU"/>
		<description>
This update for python310 fixes the following issues:

- CVE-2024-9287: Fixed quoted path names provided when creating a virtual environment (bsc#1232241).

Bug fixes:

- Drop .pyc files from docdir for reproducible builds (bsc#1230906).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-06"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1230906">SUSE bug 1230906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232241">SUSE bug 1232241</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green" href="https://www.suse.com/security/cve/CVE-2024-9287/">CVE-2024-9287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9287">CVE-2024-9287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951081" comment="libpython3_10-1_0-3.10.15-150400.4.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951082" comment="libpython3_10-1_0-32bit-3.10.15-150400.4.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951083" comment="python310-3.10.15-150400.4.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951084" comment="python310-32bit-3.10.15-150400.4.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951085" comment="python310-base-3.10.15-150400.4.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951086" comment="python310-base-32bit-3.10.15-150400.4.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951087" comment="python310-curses-3.10.15-150400.4.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951088" comment="python310-dbm-3.10.15-150400.4.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951089" comment="python310-devel-3.10.15-150400.4.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951090" comment="python310-doc-3.10.15-150400.4.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951091" comment="python310-doc-devhelp-3.10.15-150400.4.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951092" comment="python310-idle-3.10.15-150400.4.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951093" comment="python310-testsuite-3.10.15-150400.4.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951094" comment="python310-tk-3.10.15-150400.4.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951095" comment="python310-tools-3.10.15-150400.4.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5074" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1232528" ref_url="https://bugzilla.suse.com/1232528" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-9681" ref_url="https://www.suse.com/security/cve/CVE-2024-9681/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019778.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2024-9681: Fixed HSTS subdomain overwrites parent cache entry (bsc#1232528)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-06"/>
	<updated date="2024-11-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1232528">SUSE bug 1232528</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9681/">CVE-2024-9681 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9681">CVE-2024-9681 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951096" comment="curl-8.0.1-150400.5.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951097" comment="libcurl-devel-8.0.1-150400.5.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951098" comment="libcurl-devel-32bit-8.0.1-150400.5.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951099" comment="libcurl4-8.0.1-150400.5.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951100" comment="libcurl4-32bit-8.0.1-150400.5.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5075" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1232265" ref_url="https://bugzilla.suse.com/1232265" source="BUGZILLA"/>
		<reference ref_id="1232267" ref_url="https://bugzilla.suse.com/1232267" source="BUGZILLA"/>
		<reference ref_id="1232269" ref_url="https://bugzilla.suse.com/1232269" source="BUGZILLA"/>
		<reference ref_id="1232270" ref_url="https://bugzilla.suse.com/1232270" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-46951" ref_url="https://www.suse.com/security/cve/CVE-2024-46951/" source="CVE"/>
		<reference ref_id="CVE-2024-46953" ref_url="https://www.suse.com/security/cve/CVE-2024-46953/" source="CVE"/>
		<reference ref_id="CVE-2024-46955" ref_url="https://www.suse.com/security/cve/CVE-2024-46955/" source="CVE"/>
		<reference ref_id="CVE-2024-46956" ref_url="https://www.suse.com/security/cve/CVE-2024-46956/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019788.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2024-46951: Fixed arbitrary code execution via unchecked 'Implementation' pointer in 'Pattern' color space (bsc#1232265).
- CVE-2024-46953: Fixed integer overflow when parsing the page format results in path truncation, path traversal, code execution (bsc#1232267).
- CVE-2024-46956: Fixed arbitrary code execution via out of bounds data access in filenameforall (bsc#1232270).
- CVE-2024-46955: Fixed out of bounds read when reading color in 'Indexed' color space (bsc#1232269).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1232265">SUSE bug 1232265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232267">SUSE bug 1232267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232269">SUSE bug 1232269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232270">SUSE bug 1232270</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46951/">CVE-2024-46951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46951">CVE-2024-46951 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46953/">CVE-2024-46953 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46953">CVE-2024-46953 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46955/">CVE-2024-46955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46955">CVE-2024-46955 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46956/">CVE-2024-46956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46956">CVE-2024-46956 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951347" comment="ghostscript-9.52-150000.200.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951348" comment="ghostscript-devel-9.52-150000.200.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951349" comment="ghostscript-x11-9.52-150000.200.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5076" version="1" class="patch">
	<metadata>
		<title>Security update for python39 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230906" ref_url="https://bugzilla.suse.com/1230906" source="BUGZILLA"/>
		<reference ref_id="1232241" ref_url="https://bugzilla.suse.com/1232241" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-9287" ref_url="https://www.suse.com/security/cve/CVE-2024-9287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019794.html" source="SUSE-SU"/>
		<description>
This update for python39 fixes the following issues:

- CVE-2024-9287: Fixed quoted path names provided when creating a virtual environment (bsc#1232241).

Bug fixes:

- Drop .pyc files from docdir for reproducible builds (bsc#1230906).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-07"/>
	<updated date="2024-11-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1230906">SUSE bug 1230906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232241">SUSE bug 1232241</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green" href="https://www.suse.com/security/cve/CVE-2024-9287/">CVE-2024-9287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9287">CVE-2024-9287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951350" comment="libpython3_9-1_0-3.9.20-150300.4.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951351" comment="libpython3_9-1_0-32bit-3.9.20-150300.4.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951352" comment="python39-3.9.20-150300.4.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951353" comment="python39-32bit-3.9.20-150300.4.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951354" comment="python39-base-3.9.20-150300.4.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951355" comment="python39-base-32bit-3.9.20-150300.4.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951356" comment="python39-curses-3.9.20-150300.4.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951357" comment="python39-dbm-3.9.20-150300.4.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951358" comment="python39-devel-3.9.20-150300.4.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951359" comment="python39-doc-3.9.20-150300.4.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951360" comment="python39-doc-devhelp-3.9.20-150300.4.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951361" comment="python39-idle-3.9.20-150300.4.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951362" comment="python39-testsuite-3.9.20-150300.4.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951363" comment="python39-tk-3.9.20-150300.4.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951364" comment="python39-tools-3.9.20-150300.4.55.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5077" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229007" ref_url="https://bugzilla.suse.com/1229007" source="BUGZILLA"/>
		<reference ref_id="1230834" ref_url="https://bugzilla.suse.com/1230834" source="BUGZILLA"/>
		<reference ref_id="1230915" ref_url="https://bugzilla.suse.com/1230915" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-7409" ref_url="https://www.suse.com/security/cve/CVE-2024-7409/" source="CVE"/>
		<reference ref_id="CVE-2024-8354" ref_url="https://www.suse.com/security/cve/CVE-2024-8354/" source="CVE"/>
		<reference ref_id="CVE-2024-8612" ref_url="https://www.suse.com/security/cve/CVE-2024-8612/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019797.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2024-8354: Fixed assertion failure in usb_ep_get() (bsc#1230834).
- CVE-2024-8612: Fixed nformation leak in virtio devices (bsc#1230915).
- CVE-2024-7409: Fixed denial of service via improper synchronization in QEMU NBD Server during socket closure (bsc#1229007).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-11-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1229007">SUSE bug 1229007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230834">SUSE bug 1230834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230915">SUSE bug 1230915</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7409/">CVE-2024-7409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7409">CVE-2024-7409 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8354/">CVE-2024-8354 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8354">CVE-2024-8354 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8612/">CVE-2024-8612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8612">CVE-2024-8612 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951428" comment="qemu-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951429" comment="qemu-SLOF-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951430" comment="qemu-accel-qtest-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951431" comment="qemu-accel-tcg-x86-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951432" comment="qemu-arm-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951433" comment="qemu-audio-alsa-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951434" comment="qemu-audio-dbus-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951435" comment="qemu-audio-jack-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951436" comment="qemu-audio-pa-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951437" comment="qemu-audio-spice-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951438" comment="qemu-block-curl-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951439" comment="qemu-block-dmg-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951440" comment="qemu-block-gluster-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951441" comment="qemu-block-iscsi-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951442" comment="qemu-block-nfs-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951443" comment="qemu-block-rbd-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951444" comment="qemu-block-ssh-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951445" comment="qemu-chardev-baum-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951446" comment="qemu-chardev-spice-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951447" comment="qemu-extra-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951448" comment="qemu-guest-agent-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951449" comment="qemu-hw-display-qxl-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951450" comment="qemu-hw-display-virtio-gpu-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951451" comment="qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951452" comment="qemu-hw-display-virtio-vga-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951453" comment="qemu-hw-s390x-virtio-gpu-ccw-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951454" comment="qemu-hw-usb-host-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951455" comment="qemu-hw-usb-redirect-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951456" comment="qemu-hw-usb-smartcard-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951457" comment="qemu-ipxe-1.0.0+-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951458" comment="qemu-ivshmem-tools-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951459" comment="qemu-ksm-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951460" comment="qemu-kvm-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951461" comment="qemu-lang-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951462" comment="qemu-microvm-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951463" comment="qemu-ppc-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951464" comment="qemu-s390x-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951465" comment="qemu-seabios-1.16.0_0_gd239552-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951466" comment="qemu-sgabios-8-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951467" comment="qemu-skiboot-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951468" comment="qemu-tools-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951469" comment="qemu-ui-curses-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951470" comment="qemu-ui-dbus-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951471" comment="qemu-ui-gtk-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951472" comment="qemu-ui-opengl-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951473" comment="qemu-ui-spice-app-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951474" comment="qemu-ui-spice-core-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951475" comment="qemu-vgabios-1.16.0_0_gd239552-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951476" comment="qemu-vhost-user-gpu-7.1.0-150500.49.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951477" comment="qemu-x86-7.1.0-150500.49.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5078" version="1" class="patch">
	<metadata>
		<title>Security update for govulncheck-vulndb (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="CVE-2024-0132" ref_url="https://www.suse.com/security/cve/CVE-2024-0132/" source="CVE"/>
		<reference ref_id="CVE-2024-0133" ref_url="https://www.suse.com/security/cve/CVE-2024-0133/" source="CVE"/>
		<reference ref_id="CVE-2024-10005" ref_url="https://www.suse.com/security/cve/CVE-2024-10005/" source="CVE"/>
		<reference ref_id="CVE-2024-10006" ref_url="https://www.suse.com/security/cve/CVE-2024-10006/" source="CVE"/>
		<reference ref_id="CVE-2024-10086" ref_url="https://www.suse.com/security/cve/CVE-2024-10086/" source="CVE"/>
		<reference ref_id="CVE-2024-10452" ref_url="https://www.suse.com/security/cve/CVE-2024-10452/" source="CVE"/>
		<reference ref_id="CVE-2024-39720" ref_url="https://www.suse.com/security/cve/CVE-2024-39720/" source="CVE"/>
		<reference ref_id="CVE-2024-46872" ref_url="https://www.suse.com/security/cve/CVE-2024-46872/" source="CVE"/>
		<reference ref_id="CVE-2024-47401" ref_url="https://www.suse.com/security/cve/CVE-2024-47401/" source="CVE"/>
		<reference ref_id="CVE-2024-50052" ref_url="https://www.suse.com/security/cve/CVE-2024-50052/" source="CVE"/>
		<reference ref_id="CVE-2024-50354" ref_url="https://www.suse.com/security/cve/CVE-2024-50354/" source="CVE"/>
		<reference ref_id="CVE-2024-8185" ref_url="https://www.suse.com/security/cve/CVE-2024-8185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019795.html" source="SUSE-SU"/>
		<description>
This update for govulncheck-vulndb fixes the following issues:

- Update to version 0.0.20241104T154416 2024-11-04T15:44:16Z.
  Refs jsc#PED-11136
  Go CVE Numbering Authority IDs added or updated with aliases:
  * GO-2024-3233 CVE-2024-46872 GHSA-762g-9p7f-mrww
  * GO-2024-3234 CVE-2024-47401 GHSA-762v-rq7q-ff97
  * GO-2024-3235 CVE-2024-50052 GHSA-g376-m3h3-mj4r
  * GO-2024-3237 CVE-2024-0133 GHSA-f748-7hpg-88ch
  * GO-2024-3239 CVE-2024-0132 GHSA-mjjw-553x-87pq
  * GO-2024-3240 CVE-2024-10452 GHSA-66c4-2g2v-54qw
  * GO-2024-3241 CVE-2024-10006 GHSA-5c4w-8hhh-3c3h
  * GO-2024-3242 CVE-2024-10086 GHSA-99wr-c2px-grmh
  * GO-2024-3243 CVE-2024-10005 GHSA-chgm-7r52-whjj

- Update to version 0.0.20241101T215616 2024-11-01T21:56:16Z.
  Refs jsc#PED-11136
  Go CVE Numbering Authority IDs added or updated with aliases:
  * GO-2024-3244 CVE-2024-50354 GHSA-cph5-3pgr-c82g
  * GO-2024-3245 CVE-2024-39720
  * GO-2024-3246 CVE-2024-8185 GHSA-g233-2p4r-3q7v
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-11-08"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-0132/">CVE-2024-0132 at SUSE</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0132">CVE-2024-0132 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-0133/">CVE-2024-0133 at SUSE</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0133">CVE-2024-0133 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10005/">CVE-2024-10005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10005">CVE-2024-10005 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10006/">CVE-2024-10006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10006">CVE-2024-10006 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10086/">CVE-2024-10086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10086">CVE-2024-10086 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10452/">CVE-2024-10452 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10452">CVE-2024-10452 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-39720/">CVE-2024-39720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39720">CVE-2024-39720 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-46872/">CVE-2024-46872 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46872">CVE-2024-46872 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-47401/">CVE-2024-47401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47401">CVE-2024-47401 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-50052/">CVE-2024-50052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50052">CVE-2024-50052 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-50354/">CVE-2024-50354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50354">CVE-2024-50354 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8185/">CVE-2024-8185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8185">CVE-2024-8185 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951478" comment="govulncheck-vulndb-0.0.20241104T154416-150000.1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5079" version="1" class="patch">
	<metadata>
		<title>Security update for python311 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230906" ref_url="https://bugzilla.suse.com/1230906" source="BUGZILLA"/>
		<reference ref_id="1232241" ref_url="https://bugzilla.suse.com/1232241" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-9287" ref_url="https://www.suse.com/security/cve/CVE-2024-9287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019801.html" source="SUSE-SU"/>
		<description>
This update for python311 fixes the following issues:

- CVE-2024-9287: Fixed quoted path names provided when creating a virtual environment (bsc#1232241).

Bug fixes:

- Drop .pyc files from docdir for reproducible builds (bsc#1230906).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-11-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1230906">SUSE bug 1230906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232241">SUSE bug 1232241</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green" href="https://www.suse.com/security/cve/CVE-2024-9287/">CVE-2024-9287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9287">CVE-2024-9287 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951479" comment="libpython3_11-1_0-3.11.10-150400.9.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951480" comment="libpython3_11-1_0-32bit-3.11.10-150400.9.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951481" comment="python311-3.11.10-150400.9.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951482" comment="python311-32bit-3.11.10-150400.9.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951483" comment="python311-base-3.11.10-150400.9.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951484" comment="python311-base-32bit-3.11.10-150400.9.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951485" comment="python311-curses-3.11.10-150400.9.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951486" comment="python311-dbm-3.11.10-150400.9.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951487" comment="python311-devel-3.11.10-150400.9.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951488" comment="python311-doc-3.11.10-150400.9.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951489" comment="python311-doc-devhelp-3.11.10-150400.9.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951490" comment="python311-idle-3.11.10-150400.9.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951491" comment="python311-testsuite-3.11.10-150400.9.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951492" comment="python311-tk-3.11.10-150400.9.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951493" comment="python311-tools-3.11.10-150400.9.38.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5080" version="1" class="patch">
	<metadata>
		<title>Security update for libheif (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231714" ref_url="https://bugzilla.suse.com/1231714" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-41311" ref_url="https://www.suse.com/security/cve/CVE-2024-41311/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019798.html" source="SUSE-SU"/>
		<description>
This update for libheif fixes the following issues:

- CVE-2024-41311: Fixed out-of-bounds read and write in ImageOverlay:parse() due to decoding a heif file containing an overlay image with forged offsets (bsc#1231714).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2024-11-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1231714">SUSE bug 1231714</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41311/">CVE-2024-41311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41311">CVE-2024-41311 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951494" comment="gdk-pixbuf-loader-libheif-1.12.0-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951495" comment="libheif-devel-1.12.0-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951496" comment="libheif1-1.12.0-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951497" comment="libheif1-32bit-1.12.0-150400.3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5081" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216423" ref_url="https://bugzilla.suse.com/1216423" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45802" ref_url="https://www.suse.com/security/cve/CVE-2023-45802/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019806.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2023-45802: HTTP/2 stream memory not reclaimed right away on RST (bsc#1216423).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-11-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216423">SUSE bug 1216423</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45802/">CVE-2023-45802 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45802">CVE-2023-45802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951752" comment="apache2-2.4.51-150400.6.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951753" comment="apache2-devel-2.4.51-150400.6.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951754" comment="apache2-doc-2.4.51-150400.6.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951755" comment="apache2-event-2.4.51-150400.6.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951756" comment="apache2-example-pages-2.4.51-150400.6.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951757" comment="apache2-prefork-2.4.51-150400.6.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951758" comment="apache2-utils-2.4.51-150400.6.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951759" comment="apache2-worker-2.4.51-150400.6.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5082" version="1" class="patch">
	<metadata>
		<title>Security update for java-17-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231702" ref_url="https://bugzilla.suse.com/1231702" source="BUGZILLA"/>
		<reference ref_id="1231711" ref_url="https://bugzilla.suse.com/1231711" source="BUGZILLA"/>
		<reference ref_id="1231716" ref_url="https://bugzilla.suse.com/1231716" source="BUGZILLA"/>
		<reference ref_id="1231719" ref_url="https://bugzilla.suse.com/1231719" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21208" ref_url="https://www.suse.com/security/cve/CVE-2024-21208/" source="CVE"/>
		<reference ref_id="CVE-2024-21210" ref_url="https://www.suse.com/security/cve/CVE-2024-21210/" source="CVE"/>
		<reference ref_id="CVE-2024-21217" ref_url="https://www.suse.com/security/cve/CVE-2024-21217/" source="CVE"/>
		<reference ref_id="CVE-2024-21235" ref_url="https://www.suse.com/security/cve/CVE-2024-21235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019804.html" source="SUSE-SU"/>
		<description>
This update for java-17-openjdk fixes the following issues:

- Update to upstream tag jdk-17.0.13+11 (October 2024 CPU)
  * Security fixes
    + JDK-8307383: Enhance DTLS connections
    + JDK-8290367, JDK-8332643: Update default value and extend the
      scope of com.sun.jndi.ldap.object.trustSerialData system property
    + JDK-8328286, CVE-2024-21208, bsc#1231702: Enhance HTTP client
    + JDK-8328544, CVE-2024-21210, bsc#1231711: Improve handling of vectorization
    + JDK-8328726: Better Kerberos support
    + JDK-8331446, CVE-2024-21217, bsc#1231716: Improve deserialization support
    + JDK-8332644, CVE-2024-21235, bsc#1231719: Improve graph optimizations
    + JDK-8335713: Enhance vectorization analysis
  * Other changes
    + JDK-7022325: TEST_BUG: test/java/util/zip/ZipFile/
      /ReadLongZipFileName.java leaks files if it fails
    + JDK-7026262: HttpServer: improve handling of finished HTTP exchanges
    + JDK-7124313: [macosx] Swing Popups should overlap taskbar
    + JDK-8005885: enhance PrintCodeCache to print more data
    + JDK-8051959: Add thread and timestamp options to
      java.security.debug system property
    + JDK-8170817: G1: Returning MinTLABSize from
      unsafe_max_tlab_alloc causes TLAB flapping
    + JDK-8183227: read/write APIs in class os shall return ssize_t
    + JDK-8193547: Regression automated test '/open/test/jdk/java/
      /awt/Toolkit/DesktopProperties/rfe4758438.java' fails
    + JDK-8222884: ConcurrentClassDescLookup.java times out intermittently
    + JDK-8233725: ProcessTools.startProcess() has output issues
      when using an OutputAnalyzer at the same time
    + JDK-8238169: BasicDirectoryModel getDirectories and
      DoChangeContents.run can deadlock
    + JDK-8241550: [macOS] SSLSocketImpl/ReuseAddr.java failed due
      to 'BindException: Address already in use'
    + JDK-8255898: Test java/awt/FileDialog/FilenameFilterTest/
      /FilenameFilterTest.java fails on Mac OS
    + JDK-8256291: RunThese30M fails 'assert(_class_unload ? true :
      ((((JfrTraceIdBits::load(class_loader_klass)) &amp;
      ((1 &lt;&lt; 4) &lt;&lt; 8)) != 0))) failed: invariant'
    + JDK-8257540: javax/swing/JFileChooser/8041694/bug8041694.java
      failed with 'RuntimeException: The selected directory name is
      not the expected 'd ' but 'D '.'
    + JDK-8259866: two java.util tests failed with 'IOException:
      There is not enough space on the disk'
    + JDK-8260633: [macos] java/awt/dnd/MouseEventAfterStartDragTest/
      /MouseEventAfterStartDragTest.html test failed
    + JDK-8261433: Better pkcs11 performance for
      libpkcs11:C_EncryptInit/libpkcs11:C_DecryptInit
    + JDK-8263031: HttpClient throws Exception if it receives a
      Push Promise that is too large
    + JDK-8265919: RunThese30M fails
      'assert((!(((((JfrTraceIdBits::load(value)) &amp; ((1 &lt;&lt; 4) &lt;&lt; 8))
      != 0))))) failed: invariant'
    + JDK-8269428: java/util/concurrent/ConcurrentHashMap/
      /ToArray.java timed out
    + JDK-8269657: Test java/nio/channels/DatagramChannel/
      /Loopback.java failed: Unexpected message
    + JDK-8272232: javax/swing/JTable/4275046/bug4275046.java
      failed with 'Expected value in the cell: 'rededited' but found
      'redEDITED'.'
    + JDK-8272558: IR Test Framework README misses some flags
    + JDK-8272777: Clean up remaining AccessController warnings in test library
    + JDK-8273216: JCMD does not work across container boundaries with Podman
    + JDK-8273430: Suspicious duplicate condition in
      java.util.regex.Grapheme#isExcludedSpacingMark
    + JDK-8273541: Cleaner Thread creates with normal priority
      instead of MAX_PRIORITY - 2
    + JDK-8275851: Deproblemlist open/test/jdk/javax/swing/
      /JComponent/6683775/bug6683775.java
    + JDK-8276660: Scalability bottleneck in
      java.security.Provider.getService()
    + JDK-8277042: add test for 8276036 to compiler/codecache
    + JDK-8279068: IGV: Update to work with JDK 16 and 17
    + JDK-8279164: Disable TLS_ECDH_* cipher suites
    + JDK-8279222: Incorrect legacyMap.get in
      java.security.Provider after JDK-8276660
    + JDK-8279337: The MToolkit is still referenced in a few places
    + JDK-8279641: Create manual JTReg tests for Swing accessibility
    + JDK-8279878: java/awt/font/JNICheck/JNICheck.sh test fails on Ubuntu 21.10
    + JDK-8280034: ProblemList jdk/jfr/api/consumer/recordingstream/
      /TestOnEvent.java on linux-x64
    + JDK-8280392: java/awt/Focus/NonFocusableWindowTest/
      /NonfocusableOwnerTest.java failed with 'RuntimeException: Test failed.'
    + JDK-8280970: Cleanup dead code in java.security.Provider
    + JDK-8280982: [Wayland] [XWayland] java.awt.Robot taking screenshots
    + JDK-8280988: [XWayland] Click on title to request focus test failures
    + JDK-8280990: [XWayland] XTest emulated mouse click does not
      bring window to front
    + JDK-8280993: [XWayland] Popup is not closed on click outside
      of area controlled by XWayland
    + JDK-8280994: [XWayland] Drag and Drop does not work in java
      -&gt; wayland app direction
    + JDK-8281944: JavaDoc throws java.lang.IllegalStateException: ERRONEOUS
    + JDK-8282354: Remove dependancy of TestHttpServer,
      HttpTransaction, HttpCallback from open/test/jdk/ tests
    + JDK-8282526: Default icon is not painted properly
    + JDK-8283728: jdk.hotspot.agent: Wrong location for
      RISCV64ThreadContext.java
    + JDK-8284316: Support accessibility ManualTestFrame.java for
      non SwingSet tests
    + JDK-8284585: PushPromiseContinuation test fails
      intermittently in timeout
    + JDK-8285497: Add system property for Java SE specification
      maintenance version
    + JDK-8288568: Reduce runtime of java.security microbenchmarks
    + JDK-8289182: NMT: MemTracker::baseline should return void
    + JDK-8290966: G1: Record number of PLAB filled and number of
      direct allocations
    + JDK-8291760: PipelineLeaksFD.java still fails: More or fewer
      pipes than expected
    + JDK-8292044: HttpClient doesn't handle 102 or 103 properly
    + JDK-8292739: Invalid legacy entries may be returned by
      Provider.getServices() call
    + JDK-8292948: JEditorPane ignores font-size styles in external
      linked css-file
    + JDK-8293862: javax/swing/JFileChooser/8046391/bug8046391.java
      failed with 'Cannot invoke
      'java.awt.Image.getWidth(java.awt.image.ImageObserver)'
      because 'retVal' is null'
    + JDK-8293872: Make runtime/Thread/ThreadCountLimit.java more robust
    + JDK-8294148: Support JSplitPane for instructions and test UI
    + JDK-8294691: dynamicArchive/RelativePath.java is running
      other test case
    + JDK-8294994: Update Jarsigner and Keytool i18n tests to
      validate i18n compliance
    + JDK-8295111: dpkg appears to have problems resolving
      symbolically linked native libraries
    + JDK-8296410: HttpClient throws java.io.IOException: no
      statuscode in response for HTTP2
    + JDK-8296812: sprintf is deprecated in Xcode 14
    + JDK-8297878: KEM: Implementation
    + JDK-8298381: Improve handling of session tickets for multiple SSLContexts
    + JDK-8298596: vmTestbase/nsk/sysdict/vm/stress/chain/chain008/
      /chain008.java fails with 'NoClassDefFoundError: Could not
      initialize class java.util.concurrent.ThreadLocalRandom'
    + JDK-8298809: Clean up vm/compiler/InterfaceCalls JMH
    + JDK-8299058: AssertionError in sun.net.httpserver.ServerImpl
      when connection is idle
    + JDK-8299254: Support dealing with standard assert macro
    + JDK-8299378: sprintf is deprecated in Xcode 14
    + JDK-8299395: Remove metaprogramming/removeCV.hpp
    + JDK-8299396: Remove metaprogramming/removeExtent.hpp
    + JDK-8299397: Remove metaprogramming/isFloatingPoint.hpp
    + JDK-8299398: Remove metaprogramming/isConst.hpp
    + JDK-8299399: Remove metaprogramming/isArray.hpp
    + JDK-8299402: Remove metaprogramming/isVolatile.hpp
    + JDK-8299479: Remove metaprogramming/decay.hpp
    + JDK-8299481: Remove metaprogramming/removePointer.hpp
    + JDK-8299482: Remove metaprogramming/isIntegral.hpp
    + JDK-8299487: Test java/net/httpclient/whitebox/
      /SSLTubeTestDriver.java timed out
    + JDK-8299635: Hotspot update for deprecated sprintf in Xcode 14
    + JDK-8299779: Test tools/jpackage/share/jdk/jpackage/tests/
      /MainClassTest.java timed out
    + JDK-8299813: java/nio/channels/DatagramChannel/Disconnect.java
      fails with jtreg test timeout due to lost datagram
    + JDK-8299971: Remove metaprogramming/conditional.hpp
    + JDK-8299972: Remove metaprogramming/removeReference.hpp
    + JDK-8300169: Build failure with clang-15
    + JDK-8300260: Remove metaprogramming/isSame.hpp
    + JDK-8300264: Remove metaprogramming/isPointer.hpp
    + JDK-8300265: Remove metaprogramming/isSigned.hpp
    + JDK-8300806: Update googletest to v1.13.0
    + JDK-8300910: Remove metaprogramming/integralConstant.hpp
    + JDK-8301132: Test update for deprecated sprintf in Xcode 14
    + JDK-8301200: Don't scale timeout stress with timeout factor
    + JDK-8301274: update for deprecated sprintf for security components
    + JDK-8301279: update for deprecated sprintf for management components
    + JDK-8301686: TLS 1.3 handshake fails if server_name doesn't
      match resuming session
    + JDK-8301704: Shorten the number of GCs in UnloadingTest.java
      to verify a class loader not being unloaded
    + JDK-8302495: update for deprecated sprintf for java.desktop
    + JDK-8302800: Augment NaN handling tests of FDLIBM methods
    + JDK-8303216: Prefer ArrayList to LinkedList in
      sun.net.httpserver.ServerImpl
    + JDK-8303466: C2: failed: malformed control flow. Limit type
      made precise with MaxL/MinL
    + JDK-8303527: update for deprecated sprintf for
      jdk.hotspot.agent
    + JDK-8303617: update for deprecated sprintf for jdk.jdwp.agent
    + JDK-8303830: update for deprecated sprintf for
      jdk.accessibility
    + JDK-8303891: Speed up Zip64SizeTest using a small ZIP64 file
    + JDK-8303920: Avoid calling out to python in
      DataDescriptorSignatureMissing test
    + JDK-8303942: os::write should write completely
    + JDK-8303965: java.net.http.HttpClient should reset the stream
      if response headers contain malformed header fields
    + JDK-8304375: jdk/jfr/api/consumer/filestream/TestOrdered.java
      failed with 'Expected at least some events to be out of order!
      Reuse = false'
    + JDK-8304962: sun/net/www/http/KeepAliveCache/B5045306.java:
      java.lang.RuntimeException: Failed: Initial Keep Alive
      Connection is not being reused
    + JDK-8304963: HttpServer closes connection after processing
      HEAD after JDK-7026262
    + JDK-8305072: Win32ShellFolder2.compareTo is inconsistent
    + JDK-8305079: Remove finalize() from compiler/c2/Test719030
    + JDK-8305081: Remove finalize() from
      test/hotspot/jtreg/compiler/runtime/Test8168712
    + JDK-8305825: getBounds API returns wrong value resulting in
      multiple Regression Test Failures on Ubuntu 23.04
    + JDK-8305959: x86: Improve itable_stub
    + JDK-8306583: Add JVM crash check in CDSTestUtils.executeAndLog
    + JDK-8306929: Avoid CleanClassLoaderDataMetaspaces safepoints
      when previous versions are shared
    + JDK-8306946: jdk/test/lib/process/
      /ProcessToolsStartProcessTest.java fails with 'wrong number of
      lines in OutputAnalyzer output'
    + JDK-8307091: A few client tests intermittently throw
      ConcurrentModificationException
    + JDK-8307193: Several Swing jtreg tests use class.forName on
      L&amp;F classes
    + JDK-8307352: AARCH64: Improve itable_stub
    + JDK-8307448: Test RedefineSharedClassJFR fail due to wrong assumption
    + JDK-8307779: Relax the java.awt.Robot specification
    + JDK-8307848: update for deprecated sprintf for jdk.attach
    + JDK-8307850: update for deprecated sprintf for jdk.jdi
    + JDK-8308022: update for deprecated sprintf for java.base
    + JDK-8308144: Uncontrolled memory consumption in
      SSLFlowDelegate.Reader
    + JDK-8308184: Launching java with large number of jars in
      classpath with java.protocol.handler.pkgs system property set
      can lead to StackOverflowError
    + JDK-8308801: update for deprecated sprintf for libnet in java.base
    + JDK-8308891: TestCDSVMCrash.java needs @requires vm.cds
    + JDK-8309241: ClassForNameLeak fails intermittently as the
      class loader hasn't been unloaded
    + JDK-8309621: [XWayland][Screencast] screen capture failure
      with sun.java2d.uiScale other than 1
    + JDK-8309703: AIX build fails after JDK-8280982
    + JDK-8309756: Occasional crashes with pipewire screen capture on Wayland
    + JDK-8309934: Update GitHub Actions to use JDK 17 for building jtreg
    + JDK-8310070: Test:
      javax/net/ssl/DTLS/DTLSWontNegotiateV10.java timed out
    + JDK-8310108: Skip ReplaceCriticalClassesForSubgraphs when
      EnableJVMCI is specified
    + JDK-8310201: Reduce verbose locale output in -XshowSettings
      launcher option
    + JDK-8310334: [XWayland][Screencast] screen capture error
      message in debug
    + JDK-8310628: GcInfoBuilder.c missing JNI Exception checks
    + JDK-8310683: Refactor StandardCharset/standard.java to use JUnit
    + JDK-8311208: Improve CDS Support
    + JDK-8311666: Disabled tests in test/jdk/sun/java2d/marlin
    + JDK-8312049: runtime/logging/ClassLoadUnloadTest can be improved
    + JDK-8312140: jdk/jshell tests failed with JDI socket timeouts
    + JDK-8312229: Crash involving yield, switch and anonymous classes
    + JDK-8313256: Exclude failing multicast tests on AIX
    + JDK-8313394: Array Elements in OldObjectSample event has the
      incorrect description
    + JDK-8313674: (fc) java/nio/channels/FileChannel/
      /BlockDeviceSize.java should test for more block devices
    + JDK-8313697: [XWayland][Screencast] consequent getPixelColor
      calls are slow
    + JDK-8313873: java/nio/channels/DatagramChannel/
      /SendReceiveMaxSize.java fails on AIX due to small default
      RCVBUF size and different IPv6 Header interpretation
    + JDK-8313901: [TESTBUG] test/hotspot/jtreg/compiler/codecache/
      /CodeCacheFullCountTest.java fails with
      java.lang.VirtualMachineError
    + JDK-8314476: TestJstatdPortAndServer.java failed with
      'java.rmi.NoSuchObjectException: no such object in table'
    + JDK-8314614: jdk/jshell/ImportTest.java failed with
      'InternalError: Failed remote listen'
    + JDK-8314837: 5 compiled/codecache tests ignore VM flags
    + JDK-8315024: Vector API FP reduction tests should not test
      for exact equality
    + JDK-8315362: NMT: summary diff reports threads count incorrectly
    + JDK-8315422: getSoTimeout() would be in try block in SSLSocketImpl
    + JDK-8315437: Enable parallelism in
      vmTestbase/nsk/monitoring/stress/classload tests
    + JDK-8315442: Enable parallelism in
      vmTestbase/nsk/monitoring/stress/thread tests
    + JDK-8315559: Delay TempSymbol cleanup to avoid symbol table churn
    + JDK-8315576: compiler/codecache/CodeCacheFullCountTest.java
      fails after JDK-8314837
    + JDK-8315651: Stop hiding AIX specific multicast socket errors
      via NetworkConfiguration (aix)
    + JDK-8315684: Parallelize
      sun/security/util/math/TestIntegerModuloP.java
    + JDK-8315774: Enable parallelism in vmTestbase/gc/g1/unloading tests
    + JDK-8315804: Open source several Swing JTabbedPane JTextArea
      JTextField tests
    + JDK-8315936: Parallelize gc/stress/TestStressG1Humongous.java test
    + JDK-8315965: Open source various AWT applet tests
    + JDK-8316104: Open source several Swing SplitPane and
      RadioButton related tests
    + JDK-8316193: jdk/jfr/event/oldobject/TestListenerLeak.java
      java.lang.Exception: Could not find leak
    + JDK-8316211: Open source several manual applet tests
    + JDK-8316240: Open source several add/remove MenuBar manual tests
    + JDK-8316285: Opensource JButton manual tests
    + JDK-8316306: Open source and convert manual Swing test
    + JDK-8316328: Test jdk/jfr/event/oldobject/
      /TestSanityDefault.java times out for some heap sizes
    + JDK-8316387: Exclude more failing multicast tests on AIX
      after JDK-8315651
    + JDK-8316389: Open source few AWT applet tests
    + JDK-8316468: os::write incorrectly handles partial write
    + JDK-8316973: GC: Make TestDisableDefaultGC use createTestJvm
    + JDK-8317112: Add screenshot for Frame/DefaultSizeTest.java
    + JDK-8317228: GC: Make TestXXXHeapSizeFlags use createTestJvm
    + JDK-8317288: [macos] java/awt/Window/Grab/GrabTest.java:
      Press on the outside area didn't cause ungrab
    + JDK-8317316: G1: Make TestG1PercentageOptions use
      createTestJvm
    + JDK-8317343: GC: Make TestHeapFreeRatio use createTestJvm
    + JDK-8317358: G1: Make TestMaxNewSize use createTestJvm
    + JDK-8317360: Missing null checks in JfrCheckpointManager and
      JfrStringPool initialization routines
    + JDK-8317372: Refactor some NumberFormat tests to use JUnit
    + JDK-8317635: Improve GetClassFields test to verify
      correctness of field order
    + JDK-8317831: compiler/codecache/CheckLargePages.java fails on
      OL 8.8 with unexpected memory string
    + JDK-8318039: GHA: Bump macOS and Xcode versions
    + JDK-8318089: Class space not marked as such with NMT when CDS is off
    + JDK-8318474: Fix memory reporter for thread_count
    + JDK-8318479: [jmh] the test security.CacheBench  failed for
      multiple threads run
    + JDK-8318605: Enable parallelism in
      vmTestbase/nsk/stress/stack tests
    + JDK-8318696: Do not use LFS64 symbols on Linux
    + JDK-8318986: Improve GenericWaitBarrier performance
    + JDK-8319103: Popups that request focus are not shown on Linux with Wayland
    + JDK-8319197: Exclude hb-subset and hb-style from compilation
    + JDK-8319406: x86: Shorter movptr(reg, imm) for 32-bit immediates
    + JDK-8319713: Parallel: Remove
      PSAdaptiveSizePolicy::should_full_GC
    + JDK-8320079: The ArabicBox.java test has no control buttons
    + JDK-8320379: C2: Sort spilling/unspilling sequence for better
      ld/st merging into ldp/stp on AArch64
    + JDK-8320602: Lock contention in SchemaDVFactory.getInstance()
    + JDK-8320608: Many jtreg printing tests are missing the
      @printer keyword
    + JDK-8320655: awt screencast robot spin and sync issues with
      native libpipewire api
    + JDK-8320692: Null icon returned for .exe without custom icon
    + JDK-8320945: problemlist tests failing on latest Windows 11 update
    + JDK-8321025: Enable Neoverse N1 optimizations for Neoverse V2
    + JDK-8321176: [Screencast] make a second attempt on screencast failure
    + JDK-8321220: JFR: RecordedClass reports incorrect modifiers
    + JDK-8322008: Exclude some CDS tests from running with -Xshare:off
    + JDK-8322330: JavadocHelperTest.java OOMEs with Parallel GC and ZGC
    + JDK-8322726: C2: Unloaded signature class kills argument value
    + JDK-8322971: KEM.getInstance() should check if a 3rd-party
      security provider is signed
    + JDK-8323122: AArch64: Increase itable stub size estimate
    + JDK-8323584: AArch64: Unnecessary ResourceMark in
      NativeCall::set_destination_mt_safe
    + JDK-8323670: A few client tests intermittently throw
      ConcurrentModificationException
    + JDK-8323801: &lt;s&gt; tag doesn't strikethrough the text
    + JDK-8324577: [REDO] - [IMPROVE] OPEN_MAX is no longer the max
      limit on macOS &gt;= 10.6 for RLIMIT_NOFILE
    + JDK-8324646: Avoid Class.forName in SecureRandom constructor
    + JDK-8324648: Avoid NoSuchMethodError when instantiating NativePRNG
    + JDK-8324668: JDWP process management needs more efficient
      file descriptor handling
    + JDK-8324753: [AIX] adjust os_posix after JDK-8318696
    + JDK-8324755: Enable parallelism in
      vmTestbase/gc/gctests/LargeObjects tests
    + JDK-8324933: ConcurrentHashTable::statistics_calculate
      synchronization is expensive
    + JDK-8325022: Incorrect error message on client authentication
    + JDK-8325179: Race in BasicDirectoryModel.validateFileCache
    + JDK-8325194: GHA: Add macOS M1 testing
    + JDK-8325384: sun/security/ssl/SSLSessionImpl/
      /ResumptionUpdateBoundValues.java failing intermittently when
      main thread is a virtual thread
    + JDK-8325444: GHA: JDK-8325194 causes a regression
    + JDK-8325567: jspawnhelper without args fails with segfault
    + JDK-8325620: HTMLReader uses ConvertAction instead of
      specified CharacterAction for &lt;b&gt;, &lt;i&gt;, &lt;u&gt;
    + JDK-8325621: Improve jspawnhelper version checks
    + JDK-8325754: Dead AbstractQueuedSynchronizer$ConditionNodes
      survive minor garbage collections
    + JDK-8326106: Write and clear stack trace table outside of safepoint
    + JDK-8326332: Unclosed inline tags cause misalignment in
      summary tables
    + JDK-8326446: The User and System of jdk.CPULoad on Apple M1 are inaccurate
    + JDK-8326734: text-decoration applied to &lt;span&gt; lost when
      mixed with &lt;u&gt; or &lt;s&gt;
    + JDK-8327007: javax/swing/JSpinner/8008657/bug8008657.java fails
    + JDK-8327137: Add test for ConcurrentModificationException in
      BasicDirectoryModel
    + JDK-8327312: [17u] Problem list
      ReflectionCallerCacheTest.java due to 8324978
    + JDK-8327424: ProblemList serviceability/sa/TestJmapCore.java
      on all platforms with ZGC
    + JDK-8327650: Test java/nio/channels/DatagramChannel/
      /StressNativeSignal.java timed out
    + JDK-8327787: Convert javax/swing/border/Test4129681.java
      applet test to main
    + JDK-8327840: Automate javax/swing/border/Test4129681.java
    + JDK-8328011: Convert java/awt/Frame/GetBoundsResizeTest/
      /GetBoundsResizeTest.java applet test to main
    + JDK-8328075: Shenandoah: Avoid forwarding when objects don't
      move in full-GC
    + JDK-8328110: Allow simultaneous use of PassFailJFrame with
      split UI and additional windows
    + JDK-8328115: Convert java/awt/font/TextLayout/
      /TestJustification.html applet test to main
    + JDK-8328158: Convert java/awt/Choice/NonFocusablePopupMenuTest
      to automatic main test
    + JDK-8328218: Delete test
      java/awt/Window/FindOwner/FindOwner.html
    + JDK-8328234: Remove unused nativeUtils files
    + JDK-8328238: Convert few closed manual applet tests to main
    + JDK-8328269: NonFocusablePopupMenuTest.java should be marked as headful
    + JDK-8328273: sun/management/jmxremote/bootstrap/
      /RmiRegistrySslTest.java failed with
      java.rmi.server.ExportException: Port already in use
    + JDK-8328560: java/awt/event/MouseEvent/ClickDuringKeypress/
      /ClickDuringKeypress.java imports Applet
    + JDK-8328561: test java/awt/Robot/ManualInstructions/
      /ManualInstructions.java isn't used
    + JDK-8328642: Convert applet test
      MouseDraggedOutCauseScrollingTest.html to main
    + JDK-8328647: TestGarbageCollectorMXBean.java fails with
      C1-only and -Xcomp
    + JDK-8328896: Fontmetrics for large Fonts has zero width
    + JDK-8328953: JEditorPane.read throws ChangedCharSetException
    + JDK-8328999: Update GIFlib to 5.2.2
    + JDK-8329004: Update Libpng to 1.6.43
    + JDK-8329103: assert(!thread-&gt;in_asgct()) failed during
      multi-mode profiling
    + JDK-8329109: Threads::print_on() tries to print CPU time for
      terminated GC threads
    + JDK-8329126: No native wrappers generated anymore with
      -XX:-TieredCompilation after JDK-8251462
    + JDK-8329134: Reconsider TLAB zapping
    + JDK-8329510: Update ProblemList for
      JFileChooser/8194044/FileSystemRootTest.java
    + JDK-8329559: Test javax/swing/JFrame/bug4419914.java failed
      because The End and Start buttons are not placed correctly and
      Tab focus does not move as expected
    + JDK-8329605: hs errfile generic events - move memory
      protections and nmethod flushes to separate sections
    + JDK-8329663: hs_err file event log entry for thread
      adding/removing should print current thread
    + JDK-8329667: [macos] Issue with JTree related fix for JDK-8317771
    + JDK-8329995: Restricted access to `/proc` can cause JFR
      initialization to crash
    + JDK-8330063: Upgrade jQuery to 3.7.1
    + JDK-8330524: Linux ppc64le compile warning with clang in os_linux_ppc.cpp
    + JDK-8330611: AES-CTR vector intrinsic may read out of bounds (x86_64, AVX-512)
    + JDK-8330615: avoid signed integer overflows in zip_util.c
      readCen / hashN
    + JDK-8331011: [XWayland] TokenStorage fails under Security Manager
    + JDK-8331063: Some HttpClient tests don't report leaks
    + JDK-8331077: nroff man page update for jar tool
    + JDK-8331164: createJMHBundle.sh download jars fail when url
      needed to be redirected
    + JDK-8331265: Bump update version for OpenJDK: jdk-17.0.13
    + JDK-8331331: :tier1 target explanation in doc/testing.md is incorrect
    + JDK-8331466: Problemlist serviceability/dcmd/gc/
      /RunFinalizationTest.java on generic-all
    + JDK-8331605:
      jdk/test/lib/TestMutuallyExclusivePlatformPredicates.java test failure
    + JDK-8331746: Create a test to verify that the cmm id is not ignored
    + JDK-8331798: Remove unused arg of checkErgonomics() in
      TestMaxHeapSizeTools.java
    + JDK-8331885: C2: meet between unloaded and speculative types
      is not symmetric
    + JDK-8332008: Enable issuestitle check
    + JDK-8332113: Update nsk.share.Log to be always verbose
    + JDK-8332174: Remove 2 (unpaired) RLO Unicode characters in
      ff_Adlm.xml
    + JDK-8332248: (fc) java/nio/channels/FileChannel/
      /BlockDeviceSize.java failed with RuntimeException
    + JDK-8332424: Update IANA Language Subtag Registry to Version 2024-05-16
    + JDK-8332524: Instead of printing 'TLSv1.3,' it is showing 'TLS13'
    + JDK-8332898: failure_handler: log directory of commands
    + JDK-8332936: Test vmTestbase/metaspace/gc/watermark_70_80/
      /TestDescription.java fails with no GC's recorded
    + JDK-8333270: HandlersOnComplexResetUpdate and
      HandlersOnComplexUpdate tests fail with 'Unexpected reference'
      if timeoutFactor is less than 1/3
    + JDK-8333353: Delete extra empty line in CodeBlob.java
    + JDK-8333398: Uncomment the commented test in test/jdk/java/
      /util/jar/JarFile/mrjar/MultiReleaseJarAPI.java
    + JDK-8333477: Delete extra empty spaces in Makefiles
    + JDK-8333698: [17u] TestJstatdRmiPort fails after JDK-8333667
    + JDK-8333716: Shenandoah: Check for disarmed method before
      taking the nmethod lock
    + JDK-8333724: Problem list security/infra/java/security/cert/
      /CertPathValidator/certification/CAInterop.java
      #teliasonerarootcav1
    + JDK-8333804: java/net/httpclient/ForbiddenHeadTest.java threw
      an exception with 0 failures
    + JDK-8334166: Enable binary check
    + JDK-8334297: (so) java/nio/channels/SocketChannel/OpenLeak.java
      should not depend on SecurityManager
    + JDK-8334332: TestIOException.java fails if run by root
    + JDK-8334333: MissingResourceCauseTestRun.java fails if run by root
    + JDK-8334335: [TESTBUG] Backport of 8279164 to 11u &amp; 17u
      includes elements of JDK-8163327
    + JDK-8334339: Test java/nio/file/attribute/
      /BasicFileAttributeView/CreationTime.java fails on alinux3
    + JDK-8334418: Update IANA Language Subtag Registry to Version 2024-06-14
    + JDK-8334482: Shenandoah: Deadlock when safepoint is pending
      during nmethods iteration
    + JDK-8334600: TEST java/net/MulticastSocket/IPMulticastIF.java
      fails on linux-aarch64
    + JDK-8334653: ISO 4217 Amendment 177 Update
    + JDK-8334769: Shenandoah: Move CodeCache_lock close to its use
      in ShenandoahConcurrentNMethodIterator
    + JDK-8335536: Fix assertion failure in IdealGraphPrinter when
      append is true
    + JDK-8335775: Remove extraneous 's' in comment of
      rawmonitor.cpp test file
    + JDK-8335808: update for deprecated sprintf for jfrTypeSetUtils
    + JDK-8335918: update for deprecated sprintf for jvmti
    + JDK-8335967: 'text-decoration: none' does not work with 'A' HTML tags
    + JDK-8336301: test/jdk/java/nio/channels/
      /AsyncCloseAndInterrupt.java leaves around a FIFO file upon
      test completion
    + JDK-8336928: GHA: Bundle artifacts removal broken
    + JDK-8337038: Test java/nio/file/attribute/
      /BasicFileAttributeView/CreationTime.java shoud set as /native
    + JDK-8337283: configure.log is truncated when build dir is on
      different filesystem
    + JDK-8337664: Distrust TLS server certificates issued after
      Oct 2024 and anchored by Entrust Root CAs
    + JDK-8337669: [17u] Backport of JDK-8284047 missed to delete a file
    + JDK-8338139: {ClassLoading,Memory}MXBean::isVerbose methods
      are inconsistent with their setVerbose methods
    + JDK-8338696: (fs) BasicFileAttributes.creationTime() falls
      back to epoch if birth time is unavailable (Linux)
    + JDK-8339869: [21u] Test CreationTime.java fails with
      UnsatisfiedLinkError after 8334339
    + JDK-8341057: Add 2 SSL.com TLS roots
    + JDK-8341059: Change Entrust TLS distrust date to November 12, 2024
    + JDK-8341673: [17u] Remove designator
      DEFAULT_PROMOTED_VERSION_PRE=ea for release 17.0.13
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-09"/>
	<updated date="2024-11-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1231702">SUSE bug 1231702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231711">SUSE bug 1231711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231716">SUSE bug 1231716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231719">SUSE bug 1231719</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21208/">CVE-2024-21208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21208">CVE-2024-21208 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21210/">CVE-2024-21210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21210">CVE-2024-21210 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21217/">CVE-2024-21217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21217">CVE-2024-21217 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21235/">CVE-2024-21235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21235">CVE-2024-21235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951760" comment="java-17-openjdk-17.0.13.0-150400.3.48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951761" comment="java-17-openjdk-demo-17.0.13.0-150400.3.48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951762" comment="java-17-openjdk-devel-17.0.13.0-150400.3.48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951763" comment="java-17-openjdk-headless-17.0.13.0-150400.3.48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951764" comment="java-17-openjdk-javadoc-17.0.13.0-150400.3.48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951765" comment="java-17-openjdk-jmods-17.0.13.0-150400.3.48.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951766" comment="java-17-openjdk-src-17.0.13.0-150400.3.48.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5083" version="1" class="patch">
	<metadata>
		<title>Recommended update for mojo-parent (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169/" source="CVE"/>
		<reference ref_id="SUSE-RU-2024:3971-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-November/037527.html" source="SUSE-SU"/>
		<description>
This update for mojo-parent fixes the following issues:

xalan-j2 was updated from version 2.7.2 to 2.7.3:

- Security issues fixed:

  * CVE-2022-34169: Fixed integer truncation issue when processing malicious XSLT stylesheets (bsc#1201684)

- Changes and Bugs fixed:

  * Java 8 is now the minimum requirement
  * Upgraded to Apache Commons BCEL 6.7.0
  * Upgraded to Xerces-J 2.12.2

mojo-parent was updated from version 70 to 82:

- Main changes:

  * Potentially Breaking Changes:

    + mojo.java.target should be set as '8', without '1.'
    + spotless plugin must be executed by JDK 11 at least
    + ossrh-snapshots repository was removed from parent

  * New features and improvements:

    + Removed SHA-512 checksum for source release artifact
    + Use only project version as tag for release
    + Added space before close empty elements in poms by spotless
    + Using Checkstyle together with Spotless
    + Introduce spotless for automatic code formatting
    + Introduce enforcer rule for minimal version of Java and Maven
    + Use new Plugin Tools report - maven-plugin-report-plugin
    + Added sisu-maven-plugin
    + Introduced maven.version property
    + Execute spotless by JDK 11 at least
    + Use release options for m-compiler-p with newer JDKs
    + Allow override of invoker.streamLogsOnFailures
    + Require Maven 3.9.x at least for releases
    + Added maven-wrapper-plugin to pluginManagement
    + Removed ossrh-snapshots repository from MojoHaus parent
    + Added build-helper-maven-plugin to pluginManagement
    + Require Maven 3.6.3+
    + Updated palantirJavaFormat for spotless - JDK 21 compatible
    + Added dependencyManagement for maven-shade-plugin
    + Dropped recommendedJavaBuildVersion property
    + Format Markdown files with Spotless Plugin

  * Bugs fixed:

    + Restore source release distribution in child projects
    + Rename property maven.version to mavenVersion
    + minimalMavenBuildVersion should not be overriding by
      mavenVersion
    + Use simple checkstyle rules since spotless is executed by
      default
    + Use old spotless version only for JDK &lt; 11
    + Fixed spotless configuration for markdown

- Other changes:

  * Removed Google search box due to privacy
  * Put version for mrm-maven-plugin in property
  * Added streamLogsOnFailures to m-invoker-p
  * Added property for maven-fluido-skin version
  * Setup Apache Matomo analytics
  * Require Maven 3.2.5
  * Added SHA-512 hashes
  * Extract plugin version as variable so child pom can override if needed
  * Removed issue-tracking as no longer exists
  * Removed cim report as no longer exists

bcel was updated from version 5.2 to 6.10:
    
- Many APIs have been extended
- Added riscv64 support
- Various bugs were fixed

apache-commons-lang3 was updated to version 3.12.0 to 3.16.0:

- Included new APIs that are needed by bcel 6.x
- Various minor bugs were fixed

xerces-j2:

- Improved RPM packaging build instructions

netty3:

- Generate sources with protobuf instead of using pre-generated ones
    
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-11"/>
	<updated date="2024-11-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951843" comment="apache-commons-lang3-3.16.0-150200.3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951844" comment="apache-commons-lang3-javadoc-3.16.0-150200.3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951845" comment="bcel-6.10.0-150200.11.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951846" comment="mojo-parent-82-150200.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951847" comment="netty3-3.10.6-150200.3.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951848" comment="netty3-javadoc-3.10.6-150200.3.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951849" comment="xalan-j2-2.7.3-150200.11.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951850" comment="xalan-j2-demo-2.7.3-150200.11.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951851" comment="xalan-j2-manual-2.7.3-150200.11.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951852" comment="xalan-j2-xsltc-2.7.3-150200.11.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951853" comment="xerces-j2-2.12.2-150200.3.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951854" comment="xerces-j2-demo-2.12.2-150200.3.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951855" comment="xerces-j2-javadoc-2.12.2-150200.3.10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5084" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1230366" ref_url="https://bugzilla.suse.com/1230366" source="BUGZILLA"/>
		<reference ref_id="1232542" ref_url="https://bugzilla.suse.com/1232542" source="BUGZILLA"/>
		<reference ref_id="1232622" ref_url="https://bugzilla.suse.com/1232622" source="BUGZILLA"/>
		<reference ref_id="1232624" ref_url="https://bugzilla.suse.com/1232624" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-45817" ref_url="https://www.suse.com/security/cve/CVE-2024-45817/" source="CVE"/>
		<reference ref_id="CVE-2024-45818" ref_url="https://www.suse.com/security/cve/CVE-2024-45818/" source="CVE"/>
		<reference ref_id="CVE-2024-45819" ref_url="https://www.suse.com/security/cve/CVE-2024-45819/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019811.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security issues fixed:

- CVE-2024-45818: xen: Deadlock in x86 HVM standard VGA handling (bsc#1232622)
- CVE-2024-45819: xen: libxl leaks data to PVH guests via ACPI tables (bsc#1232624)
- CVE-2024-45817: xen: x86: Deadlock in vlapic_error() (bsc#1230366)

Non-security issues fixed:

- Removed usage of net-tools-deprecated from supportconfig plugin (bsc#1232542)
- Upstream bug fixes (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2024-11-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230366">SUSE bug 1230366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232542">SUSE bug 1232542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232622">SUSE bug 1232622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232624">SUSE bug 1232624</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45817/">CVE-2024-45817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45817">CVE-2024-45817 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-45818/">CVE-2024-45818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45818">CVE-2024-45818 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45819/">CVE-2024-45819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45819">CVE-2024-45819 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009951977" comment="xen-4.17.5_06-150500.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951978" comment="xen-devel-4.17.5_06-150500.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951979" comment="xen-doc-html-4.17.5_06-150500.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951980" comment="xen-libs-4.17.5_06-150500.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951981" comment="xen-libs-32bit-4.17.5_06-150500.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951982" comment="xen-tools-4.17.5_06-150500.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951983" comment="xen-tools-domU-4.17.5_06-150500.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009951984" comment="xen-tools-xendomains-wait-disk-4.17.5_06-150500.3.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5085" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1204171" ref_url="https://bugzilla.suse.com/1204171" source="BUGZILLA"/>
		<reference ref_id="1205796" ref_url="https://bugzilla.suse.com/1205796" source="BUGZILLA"/>
		<reference ref_id="1206188" ref_url="https://bugzilla.suse.com/1206188" source="BUGZILLA"/>
		<reference ref_id="1206344" ref_url="https://bugzilla.suse.com/1206344" source="BUGZILLA"/>
		<reference ref_id="1209290" ref_url="https://bugzilla.suse.com/1209290" source="BUGZILLA"/>
		<reference ref_id="1210449" ref_url="https://bugzilla.suse.com/1210449" source="BUGZILLA"/>
		<reference ref_id="1210627" ref_url="https://bugzilla.suse.com/1210627" source="BUGZILLA"/>
		<reference ref_id="1213034" ref_url="https://bugzilla.suse.com/1213034" source="BUGZILLA"/>
		<reference ref_id="1216813" ref_url="https://bugzilla.suse.com/1216813" source="BUGZILLA"/>
		<reference ref_id="1218562" ref_url="https://bugzilla.suse.com/1218562" source="BUGZILLA"/>
		<reference ref_id="1223384" ref_url="https://bugzilla.suse.com/1223384" source="BUGZILLA"/>
		<reference ref_id="1223524" ref_url="https://bugzilla.suse.com/1223524" source="BUGZILLA"/>
		<reference ref_id="1223824" ref_url="https://bugzilla.suse.com/1223824" source="BUGZILLA"/>
		<reference ref_id="1225189" ref_url="https://bugzilla.suse.com/1225189" source="BUGZILLA"/>
		<reference ref_id="1225336" ref_url="https://bugzilla.suse.com/1225336" source="BUGZILLA"/>
		<reference ref_id="1225611" ref_url="https://bugzilla.suse.com/1225611" source="BUGZILLA"/>
		<reference ref_id="1225762" ref_url="https://bugzilla.suse.com/1225762" source="BUGZILLA"/>
		<reference ref_id="1226498" ref_url="https://bugzilla.suse.com/1226498" source="BUGZILLA"/>
		<reference ref_id="1226797" ref_url="https://bugzilla.suse.com/1226797" source="BUGZILLA"/>
		<reference ref_id="1227437" ref_url="https://bugzilla.suse.com/1227437" source="BUGZILLA"/>
		<reference ref_id="1227885" ref_url="https://bugzilla.suse.com/1227885" source="BUGZILLA"/>
		<reference ref_id="1228119" ref_url="https://bugzilla.suse.com/1228119" source="BUGZILLA"/>
		<reference ref_id="1228269" ref_url="https://bugzilla.suse.com/1228269" source="BUGZILLA"/>
		<reference ref_id="1228709" ref_url="https://bugzilla.suse.com/1228709" source="BUGZILLA"/>
		<reference ref_id="1228743" ref_url="https://bugzilla.suse.com/1228743" source="BUGZILLA"/>
		<reference ref_id="1229005" ref_url="https://bugzilla.suse.com/1229005" source="BUGZILLA"/>
		<reference ref_id="1229019" ref_url="https://bugzilla.suse.com/1229019" source="BUGZILLA"/>
		<reference ref_id="1229450" ref_url="https://bugzilla.suse.com/1229450" source="BUGZILLA"/>
		<reference ref_id="1229454" ref_url="https://bugzilla.suse.com/1229454" source="BUGZILLA"/>
		<reference ref_id="1229456" ref_url="https://bugzilla.suse.com/1229456" source="BUGZILLA"/>
		<reference ref_id="1229556" ref_url="https://bugzilla.suse.com/1229556" source="BUGZILLA"/>
		<reference ref_id="1229769" ref_url="https://bugzilla.suse.com/1229769" source="BUGZILLA"/>
		<reference ref_id="1229837" ref_url="https://bugzilla.suse.com/1229837" source="BUGZILLA"/>
		<reference ref_id="1230179" ref_url="https://bugzilla.suse.com/1230179" source="BUGZILLA"/>
		<reference ref_id="1230405" ref_url="https://bugzilla.suse.com/1230405" source="BUGZILLA"/>
		<reference ref_id="1230414" ref_url="https://bugzilla.suse.com/1230414" source="BUGZILLA"/>
		<reference ref_id="1230429" ref_url="https://bugzilla.suse.com/1230429" source="BUGZILLA"/>
		<reference ref_id="1230456" ref_url="https://bugzilla.suse.com/1230456" source="BUGZILLA"/>
		<reference ref_id="1230600" ref_url="https://bugzilla.suse.com/1230600" source="BUGZILLA"/>
		<reference ref_id="1230620" ref_url="https://bugzilla.suse.com/1230620" source="BUGZILLA"/>
		<reference ref_id="1230715" ref_url="https://bugzilla.suse.com/1230715" source="BUGZILLA"/>
		<reference ref_id="1230722" ref_url="https://bugzilla.suse.com/1230722" source="BUGZILLA"/>
		<reference ref_id="1230773" ref_url="https://bugzilla.suse.com/1230773" source="BUGZILLA"/>
		<reference ref_id="1230801" ref_url="https://bugzilla.suse.com/1230801" source="BUGZILLA"/>
		<reference ref_id="1230903" ref_url="https://bugzilla.suse.com/1230903" source="BUGZILLA"/>
		<reference ref_id="1230918" ref_url="https://bugzilla.suse.com/1230918" source="BUGZILLA"/>
		<reference ref_id="1231016" ref_url="https://bugzilla.suse.com/1231016" source="BUGZILLA"/>
		<reference ref_id="1231072" ref_url="https://bugzilla.suse.com/1231072" source="BUGZILLA"/>
		<reference ref_id="1231073" ref_url="https://bugzilla.suse.com/1231073" source="BUGZILLA"/>
		<reference ref_id="1231094" ref_url="https://bugzilla.suse.com/1231094" source="BUGZILLA"/>
		<reference ref_id="1231096" ref_url="https://bugzilla.suse.com/1231096" source="BUGZILLA"/>
		<reference ref_id="1231105" ref_url="https://bugzilla.suse.com/1231105" source="BUGZILLA"/>
		<reference ref_id="1231114" ref_url="https://bugzilla.suse.com/1231114" source="BUGZILLA"/>
		<reference ref_id="1231148" ref_url="https://bugzilla.suse.com/1231148" source="BUGZILLA"/>
		<reference ref_id="1231179" ref_url="https://bugzilla.suse.com/1231179" source="BUGZILLA"/>
		<reference ref_id="1231191" ref_url="https://bugzilla.suse.com/1231191" source="BUGZILLA"/>
		<reference ref_id="1231193" ref_url="https://bugzilla.suse.com/1231193" source="BUGZILLA"/>
		<reference ref_id="1231195" ref_url="https://bugzilla.suse.com/1231195" source="BUGZILLA"/>
		<reference ref_id="1231197" ref_url="https://bugzilla.suse.com/1231197" source="BUGZILLA"/>
		<reference ref_id="1231200" ref_url="https://bugzilla.suse.com/1231200" source="BUGZILLA"/>
		<reference ref_id="1231203" ref_url="https://bugzilla.suse.com/1231203" source="BUGZILLA"/>
		<reference ref_id="1231293" ref_url="https://bugzilla.suse.com/1231293" source="BUGZILLA"/>
		<reference ref_id="1231344" ref_url="https://bugzilla.suse.com/1231344" source="BUGZILLA"/>
		<reference ref_id="1231375" ref_url="https://bugzilla.suse.com/1231375" source="BUGZILLA"/>
		<reference ref_id="1231383" ref_url="https://bugzilla.suse.com/1231383" source="BUGZILLA"/>
		<reference ref_id="1231439" ref_url="https://bugzilla.suse.com/1231439" source="BUGZILLA"/>
		<reference ref_id="1231442" ref_url="https://bugzilla.suse.com/1231442" source="BUGZILLA"/>
		<reference ref_id="1231496" ref_url="https://bugzilla.suse.com/1231496" source="BUGZILLA"/>
		<reference ref_id="1231502" ref_url="https://bugzilla.suse.com/1231502" source="BUGZILLA"/>
		<reference ref_id="1231539" ref_url="https://bugzilla.suse.com/1231539" source="BUGZILLA"/>
		<reference ref_id="1231540" ref_url="https://bugzilla.suse.com/1231540" source="BUGZILLA"/>
		<reference ref_id="1231578" ref_url="https://bugzilla.suse.com/1231578" source="BUGZILLA"/>
		<reference ref_id="1231673" ref_url="https://bugzilla.suse.com/1231673" source="BUGZILLA"/>
		<reference ref_id="1231857" ref_url="https://bugzilla.suse.com/1231857" source="BUGZILLA"/>
		<reference ref_id="1231861" ref_url="https://bugzilla.suse.com/1231861" source="BUGZILLA"/>
		<reference ref_id="1231872" ref_url="https://bugzilla.suse.com/1231872" source="BUGZILLA"/>
		<reference ref_id="1231883" ref_url="https://bugzilla.suse.com/1231883" source="BUGZILLA"/>
		<reference ref_id="1231885" ref_url="https://bugzilla.suse.com/1231885" source="BUGZILLA"/>
		<reference ref_id="1231887" ref_url="https://bugzilla.suse.com/1231887" source="BUGZILLA"/>
		<reference ref_id="1231888" ref_url="https://bugzilla.suse.com/1231888" source="BUGZILLA"/>
		<reference ref_id="1231889" ref_url="https://bugzilla.suse.com/1231889" source="BUGZILLA"/>
		<reference ref_id="1231890" ref_url="https://bugzilla.suse.com/1231890" source="BUGZILLA"/>
		<reference ref_id="1231892" ref_url="https://bugzilla.suse.com/1231892" source="BUGZILLA"/>
		<reference ref_id="1231893" ref_url="https://bugzilla.suse.com/1231893" source="BUGZILLA"/>
		<reference ref_id="1231895" ref_url="https://bugzilla.suse.com/1231895" source="BUGZILLA"/>
		<reference ref_id="1231896" ref_url="https://bugzilla.suse.com/1231896" source="BUGZILLA"/>
		<reference ref_id="1231897" ref_url="https://bugzilla.suse.com/1231897" source="BUGZILLA"/>
		<reference ref_id="1231902" ref_url="https://bugzilla.suse.com/1231902" source="BUGZILLA"/>
		<reference ref_id="1231903" ref_url="https://bugzilla.suse.com/1231903" source="BUGZILLA"/>
		<reference ref_id="1231907" ref_url="https://bugzilla.suse.com/1231907" source="BUGZILLA"/>
		<reference ref_id="1231914" ref_url="https://bugzilla.suse.com/1231914" source="BUGZILLA"/>
		<reference ref_id="1231929" ref_url="https://bugzilla.suse.com/1231929" source="BUGZILLA"/>
		<reference ref_id="1231935" ref_url="https://bugzilla.suse.com/1231935" source="BUGZILLA"/>
		<reference ref_id="1231936" ref_url="https://bugzilla.suse.com/1231936" source="BUGZILLA"/>
		<reference ref_id="1231937" ref_url="https://bugzilla.suse.com/1231937" source="BUGZILLA"/>
		<reference ref_id="1231938" ref_url="https://bugzilla.suse.com/1231938" source="BUGZILLA"/>
		<reference ref_id="1231939" ref_url="https://bugzilla.suse.com/1231939" source="BUGZILLA"/>
		<reference ref_id="1231940" ref_url="https://bugzilla.suse.com/1231940" source="BUGZILLA"/>
		<reference ref_id="1231941" ref_url="https://bugzilla.suse.com/1231941" source="BUGZILLA"/>
		<reference ref_id="1231942" ref_url="https://bugzilla.suse.com/1231942" source="BUGZILLA"/>
		<reference ref_id="1231944" ref_url="https://bugzilla.suse.com/1231944" source="BUGZILLA"/>
		<reference ref_id="1231950" ref_url="https://bugzilla.suse.com/1231950" source="BUGZILLA"/>
		<reference ref_id="1231954" ref_url="https://bugzilla.suse.com/1231954" source="BUGZILLA"/>
		<reference ref_id="1231958" ref_url="https://bugzilla.suse.com/1231958" source="BUGZILLA"/>
		<reference ref_id="1231960" ref_url="https://bugzilla.suse.com/1231960" source="BUGZILLA"/>
		<reference ref_id="1231961" ref_url="https://bugzilla.suse.com/1231961" source="BUGZILLA"/>
		<reference ref_id="1231962" ref_url="https://bugzilla.suse.com/1231962" source="BUGZILLA"/>
		<reference ref_id="1231965" ref_url="https://bugzilla.suse.com/1231965" source="BUGZILLA"/>
		<reference ref_id="1231967" ref_url="https://bugzilla.suse.com/1231967" source="BUGZILLA"/>
		<reference ref_id="1231968" ref_url="https://bugzilla.suse.com/1231968" source="BUGZILLA"/>
		<reference ref_id="1231972" ref_url="https://bugzilla.suse.com/1231972" source="BUGZILLA"/>
		<reference ref_id="1231973" ref_url="https://bugzilla.suse.com/1231973" source="BUGZILLA"/>
		<reference ref_id="1231976" ref_url="https://bugzilla.suse.com/1231976" source="BUGZILLA"/>
		<reference ref_id="1231979" ref_url="https://bugzilla.suse.com/1231979" source="BUGZILLA"/>
		<reference ref_id="1231987" ref_url="https://bugzilla.suse.com/1231987" source="BUGZILLA"/>
		<reference ref_id="1231988" ref_url="https://bugzilla.suse.com/1231988" source="BUGZILLA"/>
		<reference ref_id="1231990" ref_url="https://bugzilla.suse.com/1231990" source="BUGZILLA"/>
		<reference ref_id="1231992" ref_url="https://bugzilla.suse.com/1231992" source="BUGZILLA"/>
		<reference ref_id="1231995" ref_url="https://bugzilla.suse.com/1231995" source="BUGZILLA"/>
		<reference ref_id="1231996" ref_url="https://bugzilla.suse.com/1231996" source="BUGZILLA"/>
		<reference ref_id="1231997" ref_url="https://bugzilla.suse.com/1231997" source="BUGZILLA"/>
		<reference ref_id="1231998" ref_url="https://bugzilla.suse.com/1231998" source="BUGZILLA"/>
		<reference ref_id="1232001" ref_url="https://bugzilla.suse.com/1232001" source="BUGZILLA"/>
		<reference ref_id="1232004" ref_url="https://bugzilla.suse.com/1232004" source="BUGZILLA"/>
		<reference ref_id="1232005" ref_url="https://bugzilla.suse.com/1232005" source="BUGZILLA"/>
		<reference ref_id="1232006" ref_url="https://bugzilla.suse.com/1232006" source="BUGZILLA"/>
		<reference ref_id="1232007" ref_url="https://bugzilla.suse.com/1232007" source="BUGZILLA"/>
		<reference ref_id="1232025" ref_url="https://bugzilla.suse.com/1232025" source="BUGZILLA"/>
		<reference ref_id="1232026" ref_url="https://bugzilla.suse.com/1232026" source="BUGZILLA"/>
		<reference ref_id="1232033" ref_url="https://bugzilla.suse.com/1232033" source="BUGZILLA"/>
		<reference ref_id="1232034" ref_url="https://bugzilla.suse.com/1232034" source="BUGZILLA"/>
		<reference ref_id="1232035" ref_url="https://bugzilla.suse.com/1232035" source="BUGZILLA"/>
		<reference ref_id="1232036" ref_url="https://bugzilla.suse.com/1232036" source="BUGZILLA"/>
		<reference ref_id="1232037" ref_url="https://bugzilla.suse.com/1232037" source="BUGZILLA"/>
		<reference ref_id="1232038" ref_url="https://bugzilla.suse.com/1232038" source="BUGZILLA"/>
		<reference ref_id="1232039" ref_url="https://bugzilla.suse.com/1232039" source="BUGZILLA"/>
		<reference ref_id="1232043" ref_url="https://bugzilla.suse.com/1232043" source="BUGZILLA"/>
		<reference ref_id="1232049" ref_url="https://bugzilla.suse.com/1232049" source="BUGZILLA"/>
		<reference ref_id="1232067" ref_url="https://bugzilla.suse.com/1232067" source="BUGZILLA"/>
		<reference ref_id="1232069" ref_url="https://bugzilla.suse.com/1232069" source="BUGZILLA"/>
		<reference ref_id="1232070" ref_url="https://bugzilla.suse.com/1232070" source="BUGZILLA"/>
		<reference ref_id="1232071" ref_url="https://bugzilla.suse.com/1232071" source="BUGZILLA"/>
		<reference ref_id="1232075" ref_url="https://bugzilla.suse.com/1232075" source="BUGZILLA"/>
		<reference ref_id="1232083" ref_url="https://bugzilla.suse.com/1232083" source="BUGZILLA"/>
		<reference ref_id="1232084" ref_url="https://bugzilla.suse.com/1232084" source="BUGZILLA"/>
		<reference ref_id="1232085" ref_url="https://bugzilla.suse.com/1232085" source="BUGZILLA"/>
		<reference ref_id="1232089" ref_url="https://bugzilla.suse.com/1232089" source="BUGZILLA"/>
		<reference ref_id="1232097" ref_url="https://bugzilla.suse.com/1232097" source="BUGZILLA"/>
		<reference ref_id="1232104" ref_url="https://bugzilla.suse.com/1232104" source="BUGZILLA"/>
		<reference ref_id="1232105" ref_url="https://bugzilla.suse.com/1232105" source="BUGZILLA"/>
		<reference ref_id="1232108" ref_url="https://bugzilla.suse.com/1232108" source="BUGZILLA"/>
		<reference ref_id="1232114" ref_url="https://bugzilla.suse.com/1232114" source="BUGZILLA"/>
		<reference ref_id="1232116" ref_url="https://bugzilla.suse.com/1232116" source="BUGZILLA"/>
		<reference ref_id="1232119" ref_url="https://bugzilla.suse.com/1232119" source="BUGZILLA"/>
		<reference ref_id="1232120" ref_url="https://bugzilla.suse.com/1232120" source="BUGZILLA"/>
		<reference ref_id="1232123" ref_url="https://bugzilla.suse.com/1232123" source="BUGZILLA"/>
		<reference ref_id="1232124" ref_url="https://bugzilla.suse.com/1232124" source="BUGZILLA"/>
		<reference ref_id="1232133" ref_url="https://bugzilla.suse.com/1232133" source="BUGZILLA"/>
		<reference ref_id="1232135" ref_url="https://bugzilla.suse.com/1232135" source="BUGZILLA"/>
		<reference ref_id="1232136" ref_url="https://bugzilla.suse.com/1232136" source="BUGZILLA"/>
		<reference ref_id="1232140" ref_url="https://bugzilla.suse.com/1232140" source="BUGZILLA"/>
		<reference ref_id="1232145" ref_url="https://bugzilla.suse.com/1232145" source="BUGZILLA"/>
		<reference ref_id="1232149" ref_url="https://bugzilla.suse.com/1232149" source="BUGZILLA"/>
		<reference ref_id="1232150" ref_url="https://bugzilla.suse.com/1232150" source="BUGZILLA"/>
		<reference ref_id="1232151" ref_url="https://bugzilla.suse.com/1232151" source="BUGZILLA"/>
		<reference ref_id="1232154" ref_url="https://bugzilla.suse.com/1232154" source="BUGZILLA"/>
		<reference ref_id="1232155" ref_url="https://bugzilla.suse.com/1232155" source="BUGZILLA"/>
		<reference ref_id="1232160" ref_url="https://bugzilla.suse.com/1232160" source="BUGZILLA"/>
		<reference ref_id="1232163" ref_url="https://bugzilla.suse.com/1232163" source="BUGZILLA"/>
		<reference ref_id="1232164" ref_url="https://bugzilla.suse.com/1232164" source="BUGZILLA"/>
		<reference ref_id="1232170" ref_url="https://bugzilla.suse.com/1232170" source="BUGZILLA"/>
		<reference ref_id="1232172" ref_url="https://bugzilla.suse.com/1232172" source="BUGZILLA"/>
		<reference ref_id="1232174" ref_url="https://bugzilla.suse.com/1232174" source="BUGZILLA"/>
		<reference ref_id="1232175" ref_url="https://bugzilla.suse.com/1232175" source="BUGZILLA"/>
		<reference ref_id="1232191" ref_url="https://bugzilla.suse.com/1232191" source="BUGZILLA"/>
		<reference ref_id="1232196" ref_url="https://bugzilla.suse.com/1232196" source="BUGZILLA"/>
		<reference ref_id="1232199" ref_url="https://bugzilla.suse.com/1232199" source="BUGZILLA"/>
		<reference ref_id="1232200" ref_url="https://bugzilla.suse.com/1232200" source="BUGZILLA"/>
		<reference ref_id="1232201" ref_url="https://bugzilla.suse.com/1232201" source="BUGZILLA"/>
		<reference ref_id="1232217" ref_url="https://bugzilla.suse.com/1232217" source="BUGZILLA"/>
		<reference ref_id="1232220" ref_url="https://bugzilla.suse.com/1232220" source="BUGZILLA"/>
		<reference ref_id="1232221" ref_url="https://bugzilla.suse.com/1232221" source="BUGZILLA"/>
		<reference ref_id="1232229" ref_url="https://bugzilla.suse.com/1232229" source="BUGZILLA"/>
		<reference ref_id="1232233" ref_url="https://bugzilla.suse.com/1232233" source="BUGZILLA"/>
		<reference ref_id="1232237" ref_url="https://bugzilla.suse.com/1232237" source="BUGZILLA"/>
		<reference ref_id="1232251" ref_url="https://bugzilla.suse.com/1232251" source="BUGZILLA"/>
		<reference ref_id="1232253" ref_url="https://bugzilla.suse.com/1232253" source="BUGZILLA"/>
		<reference ref_id="1232259" ref_url="https://bugzilla.suse.com/1232259" source="BUGZILLA"/>
		<reference ref_id="1232260" ref_url="https://bugzilla.suse.com/1232260" source="BUGZILLA"/>
		<reference ref_id="1232262" ref_url="https://bugzilla.suse.com/1232262" source="BUGZILLA"/>
		<reference ref_id="1232263" ref_url="https://bugzilla.suse.com/1232263" source="BUGZILLA"/>
		<reference ref_id="1232282" ref_url="https://bugzilla.suse.com/1232282" source="BUGZILLA"/>
		<reference ref_id="1232285" ref_url="https://bugzilla.suse.com/1232285" source="BUGZILLA"/>
		<reference ref_id="1232286" ref_url="https://bugzilla.suse.com/1232286" source="BUGZILLA"/>
		<reference ref_id="1232304" ref_url="https://bugzilla.suse.com/1232304" source="BUGZILLA"/>
		<reference ref_id="1232305" ref_url="https://bugzilla.suse.com/1232305" source="BUGZILLA"/>
		<reference ref_id="1232307" ref_url="https://bugzilla.suse.com/1232307" source="BUGZILLA"/>
		<reference ref_id="1232309" ref_url="https://bugzilla.suse.com/1232309" source="BUGZILLA"/>
		<reference ref_id="1232310" ref_url="https://bugzilla.suse.com/1232310" source="BUGZILLA"/>
		<reference ref_id="1232313" ref_url="https://bugzilla.suse.com/1232313" source="BUGZILLA"/>
		<reference ref_id="1232314" ref_url="https://bugzilla.suse.com/1232314" source="BUGZILLA"/>
		<reference ref_id="1232316" ref_url="https://bugzilla.suse.com/1232316" source="BUGZILLA"/>
		<reference ref_id="1232329" ref_url="https://bugzilla.suse.com/1232329" source="BUGZILLA"/>
		<reference ref_id="1232332" ref_url="https://bugzilla.suse.com/1232332" source="BUGZILLA"/>
		<reference ref_id="1232335" ref_url="https://bugzilla.suse.com/1232335" source="BUGZILLA"/>
		<reference ref_id="1232337" ref_url="https://bugzilla.suse.com/1232337" source="BUGZILLA"/>
		<reference ref_id="1232342" ref_url="https://bugzilla.suse.com/1232342" source="BUGZILLA"/>
		<reference ref_id="1232345" ref_url="https://bugzilla.suse.com/1232345" source="BUGZILLA"/>
		<reference ref_id="1232352" ref_url="https://bugzilla.suse.com/1232352" source="BUGZILLA"/>
		<reference ref_id="1232354" ref_url="https://bugzilla.suse.com/1232354" source="BUGZILLA"/>
		<reference ref_id="1232355" ref_url="https://bugzilla.suse.com/1232355" source="BUGZILLA"/>
		<reference ref_id="1232358" ref_url="https://bugzilla.suse.com/1232358" source="BUGZILLA"/>
		<reference ref_id="1232361" ref_url="https://bugzilla.suse.com/1232361" source="BUGZILLA"/>
		<reference ref_id="1232366" ref_url="https://bugzilla.suse.com/1232366" source="BUGZILLA"/>
		<reference ref_id="1232367" ref_url="https://bugzilla.suse.com/1232367" source="BUGZILLA"/>
		<reference ref_id="1232368" ref_url="https://bugzilla.suse.com/1232368" source="BUGZILLA"/>
		<reference ref_id="1232369" ref_url="https://bugzilla.suse.com/1232369" source="BUGZILLA"/>
		<reference ref_id="1232374" ref_url="https://bugzilla.suse.com/1232374" source="BUGZILLA"/>
		<reference ref_id="1232381" ref_url="https://bugzilla.suse.com/1232381" source="BUGZILLA"/>
		<reference ref_id="1232383" ref_url="https://bugzilla.suse.com/1232383" source="BUGZILLA"/>
		<reference ref_id="1232392" ref_url="https://bugzilla.suse.com/1232392" source="BUGZILLA"/>
		<reference ref_id="1232395" ref_url="https://bugzilla.suse.com/1232395" source="BUGZILLA"/>
		<reference ref_id="1232418" ref_url="https://bugzilla.suse.com/1232418" source="BUGZILLA"/>
		<reference ref_id="1232424" ref_url="https://bugzilla.suse.com/1232424" source="BUGZILLA"/>
		<reference ref_id="1232432" ref_url="https://bugzilla.suse.com/1232432" source="BUGZILLA"/>
		<reference ref_id="1232435" ref_url="https://bugzilla.suse.com/1232435" source="BUGZILLA"/>
		<reference ref_id="1232442" ref_url="https://bugzilla.suse.com/1232442" source="BUGZILLA"/>
		<reference ref_id="1232446" ref_url="https://bugzilla.suse.com/1232446" source="BUGZILLA"/>
		<reference ref_id="1232501" ref_url="https://bugzilla.suse.com/1232501" source="BUGZILLA"/>
		<reference ref_id="1232519" ref_url="https://bugzilla.suse.com/1232519" source="BUGZILLA"/>
		<reference ref_id="1232630" ref_url="https://bugzilla.suse.com/1232630" source="BUGZILLA"/>
		<reference ref_id="1232631" ref_url="https://bugzilla.suse.com/1232631" source="BUGZILLA"/>
		<reference ref_id="1232632" ref_url="https://bugzilla.suse.com/1232632" source="BUGZILLA"/>
		<reference ref_id="1232757" ref_url="https://bugzilla.suse.com/1232757" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-47416" ref_url="https://www.suse.com/security/cve/CVE-2021-47416/" source="CVE"/>
		<reference ref_id="CVE-2021-47534" ref_url="https://www.suse.com/security/cve/CVE-2021-47534/" source="CVE"/>
		<reference ref_id="CVE-2022-3435" ref_url="https://www.suse.com/security/cve/CVE-2022-3435/" source="CVE"/>
		<reference ref_id="CVE-2022-45934" ref_url="https://www.suse.com/security/cve/CVE-2022-45934/" source="CVE"/>
		<reference ref_id="CVE-2022-48664" ref_url="https://www.suse.com/security/cve/CVE-2022-48664/" source="CVE"/>
		<reference ref_id="CVE-2022-48879" ref_url="https://www.suse.com/security/cve/CVE-2022-48879/" source="CVE"/>
		<reference ref_id="CVE-2022-48946" ref_url="https://www.suse.com/security/cve/CVE-2022-48946/" source="CVE"/>
		<reference ref_id="CVE-2022-48947" ref_url="https://www.suse.com/security/cve/CVE-2022-48947/" source="CVE"/>
		<reference ref_id="CVE-2022-48948" ref_url="https://www.suse.com/security/cve/CVE-2022-48948/" source="CVE"/>
		<reference ref_id="CVE-2022-48949" ref_url="https://www.suse.com/security/cve/CVE-2022-48949/" source="CVE"/>
		<reference ref_id="CVE-2022-48951" ref_url="https://www.suse.com/security/cve/CVE-2022-48951/" source="CVE"/>
		<reference ref_id="CVE-2022-48953" ref_url="https://www.suse.com/security/cve/CVE-2022-48953/" source="CVE"/>
		<reference ref_id="CVE-2022-48954" ref_url="https://www.suse.com/security/cve/CVE-2022-48954/" source="CVE"/>
		<reference ref_id="CVE-2022-48955" ref_url="https://www.suse.com/security/cve/CVE-2022-48955/" source="CVE"/>
		<reference ref_id="CVE-2022-48956" ref_url="https://www.suse.com/security/cve/CVE-2022-48956/" source="CVE"/>
		<reference ref_id="CVE-2022-48957" ref_url="https://www.suse.com/security/cve/CVE-2022-48957/" source="CVE"/>
		<reference ref_id="CVE-2022-48958" ref_url="https://www.suse.com/security/cve/CVE-2022-48958/" source="CVE"/>
		<reference ref_id="CVE-2022-48959" ref_url="https://www.suse.com/security/cve/CVE-2022-48959/" source="CVE"/>
		<reference ref_id="CVE-2022-48960" ref_url="https://www.suse.com/security/cve/CVE-2022-48960/" source="CVE"/>
		<reference ref_id="CVE-2022-48961" ref_url="https://www.suse.com/security/cve/CVE-2022-48961/" source="CVE"/>
		<reference ref_id="CVE-2022-48962" ref_url="https://www.suse.com/security/cve/CVE-2022-48962/" source="CVE"/>
		<reference ref_id="CVE-2022-48966" ref_url="https://www.suse.com/security/cve/CVE-2022-48966/" source="CVE"/>
		<reference ref_id="CVE-2022-48967" ref_url="https://www.suse.com/security/cve/CVE-2022-48967/" source="CVE"/>
		<reference ref_id="CVE-2022-48968" ref_url="https://www.suse.com/security/cve/CVE-2022-48968/" source="CVE"/>
		<reference ref_id="CVE-2022-48969" ref_url="https://www.suse.com/security/cve/CVE-2022-48969/" source="CVE"/>
		<reference ref_id="CVE-2022-48970" ref_url="https://www.suse.com/security/cve/CVE-2022-48970/" source="CVE"/>
		<reference ref_id="CVE-2022-48971" ref_url="https://www.suse.com/security/cve/CVE-2022-48971/" source="CVE"/>
		<reference ref_id="CVE-2022-48972" ref_url="https://www.suse.com/security/cve/CVE-2022-48972/" source="CVE"/>
		<reference ref_id="CVE-2022-48973" ref_url="https://www.suse.com/security/cve/CVE-2022-48973/" source="CVE"/>
		<reference ref_id="CVE-2022-48975" ref_url="https://www.suse.com/security/cve/CVE-2022-48975/" source="CVE"/>
		<reference ref_id="CVE-2022-48977" ref_url="https://www.suse.com/security/cve/CVE-2022-48977/" source="CVE"/>
		<reference ref_id="CVE-2022-48978" ref_url="https://www.suse.com/security/cve/CVE-2022-48978/" source="CVE"/>
		<reference ref_id="CVE-2022-48980" ref_url="https://www.suse.com/security/cve/CVE-2022-48980/" source="CVE"/>
		<reference ref_id="CVE-2022-48981" ref_url="https://www.suse.com/security/cve/CVE-2022-48981/" source="CVE"/>
		<reference ref_id="CVE-2022-48985" ref_url="https://www.suse.com/security/cve/CVE-2022-48985/" source="CVE"/>
		<reference ref_id="CVE-2022-48987" ref_url="https://www.suse.com/security/cve/CVE-2022-48987/" source="CVE"/>
		<reference ref_id="CVE-2022-48988" ref_url="https://www.suse.com/security/cve/CVE-2022-48988/" source="CVE"/>
		<reference ref_id="CVE-2022-48991" ref_url="https://www.suse.com/security/cve/CVE-2022-48991/" source="CVE"/>
		<reference ref_id="CVE-2022-48992" ref_url="https://www.suse.com/security/cve/CVE-2022-48992/" source="CVE"/>
		<reference ref_id="CVE-2022-48994" ref_url="https://www.suse.com/security/cve/CVE-2022-48994/" source="CVE"/>
		<reference ref_id="CVE-2022-48995" ref_url="https://www.suse.com/security/cve/CVE-2022-48995/" source="CVE"/>
		<reference ref_id="CVE-2022-48997" ref_url="https://www.suse.com/security/cve/CVE-2022-48997/" source="CVE"/>
		<reference ref_id="CVE-2022-48999" ref_url="https://www.suse.com/security/cve/CVE-2022-48999/" source="CVE"/>
		<reference ref_id="CVE-2022-49000" ref_url="https://www.suse.com/security/cve/CVE-2022-49000/" source="CVE"/>
		<reference ref_id="CVE-2022-49002" ref_url="https://www.suse.com/security/cve/CVE-2022-49002/" source="CVE"/>
		<reference ref_id="CVE-2022-49003" ref_url="https://www.suse.com/security/cve/CVE-2022-49003/" source="CVE"/>
		<reference ref_id="CVE-2022-49005" ref_url="https://www.suse.com/security/cve/CVE-2022-49005/" source="CVE"/>
		<reference ref_id="CVE-2022-49006" ref_url="https://www.suse.com/security/cve/CVE-2022-49006/" source="CVE"/>
		<reference ref_id="CVE-2022-49007" ref_url="https://www.suse.com/security/cve/CVE-2022-49007/" source="CVE"/>
		<reference ref_id="CVE-2022-49010" ref_url="https://www.suse.com/security/cve/CVE-2022-49010/" source="CVE"/>
		<reference ref_id="CVE-2022-49011" ref_url="https://www.suse.com/security/cve/CVE-2022-49011/" source="CVE"/>
		<reference ref_id="CVE-2022-49012" ref_url="https://www.suse.com/security/cve/CVE-2022-49012/" source="CVE"/>
		<reference ref_id="CVE-2022-49014" ref_url="https://www.suse.com/security/cve/CVE-2022-49014/" source="CVE"/>
		<reference ref_id="CVE-2022-49015" ref_url="https://www.suse.com/security/cve/CVE-2022-49015/" source="CVE"/>
		<reference ref_id="CVE-2022-49016" ref_url="https://www.suse.com/security/cve/CVE-2022-49016/" source="CVE"/>
		<reference ref_id="CVE-2022-49017" ref_url="https://www.suse.com/security/cve/CVE-2022-49017/" source="CVE"/>
		<reference ref_id="CVE-2022-49019" ref_url="https://www.suse.com/security/cve/CVE-2022-49019/" source="CVE"/>
		<reference ref_id="CVE-2022-49020" ref_url="https://www.suse.com/security/cve/CVE-2022-49020/" source="CVE"/>
		<reference ref_id="CVE-2022-49021" ref_url="https://www.suse.com/security/cve/CVE-2022-49021/" source="CVE"/>
		<reference ref_id="CVE-2022-49022" ref_url="https://www.suse.com/security/cve/CVE-2022-49022/" source="CVE"/>
		<reference ref_id="CVE-2022-49023" ref_url="https://www.suse.com/security/cve/CVE-2022-49023/" source="CVE"/>
		<reference ref_id="CVE-2022-49024" ref_url="https://www.suse.com/security/cve/CVE-2022-49024/" source="CVE"/>
		<reference ref_id="CVE-2022-49025" ref_url="https://www.suse.com/security/cve/CVE-2022-49025/" source="CVE"/>
		<reference ref_id="CVE-2022-49026" ref_url="https://www.suse.com/security/cve/CVE-2022-49026/" source="CVE"/>
		<reference ref_id="CVE-2022-49027" ref_url="https://www.suse.com/security/cve/CVE-2022-49027/" source="CVE"/>
		<reference ref_id="CVE-2022-49028" ref_url="https://www.suse.com/security/cve/CVE-2022-49028/" source="CVE"/>
		<reference ref_id="CVE-2022-49029" ref_url="https://www.suse.com/security/cve/CVE-2022-49029/" source="CVE"/>
		<reference ref_id="CVE-2022-49031" ref_url="https://www.suse.com/security/cve/CVE-2022-49031/" source="CVE"/>
		<reference ref_id="CVE-2022-49032" ref_url="https://www.suse.com/security/cve/CVE-2022-49032/" source="CVE"/>
		<reference ref_id="CVE-2023-2166" ref_url="https://www.suse.com/security/cve/CVE-2023-2166/" source="CVE"/>
		<reference ref_id="CVE-2023-28327" ref_url="https://www.suse.com/security/cve/CVE-2023-28327/" source="CVE"/>
		<reference ref_id="CVE-2023-52766" ref_url="https://www.suse.com/security/cve/CVE-2023-52766/" source="CVE"/>
		<reference ref_id="CVE-2023-52800" ref_url="https://www.suse.com/security/cve/CVE-2023-52800/" source="CVE"/>
		<reference ref_id="CVE-2023-52881" ref_url="https://www.suse.com/security/cve/CVE-2023-52881/" source="CVE"/>
		<reference ref_id="CVE-2023-52919" ref_url="https://www.suse.com/security/cve/CVE-2023-52919/" source="CVE"/>
		<reference ref_id="CVE-2023-6270" ref_url="https://www.suse.com/security/cve/CVE-2023-6270/" source="CVE"/>
		<reference ref_id="CVE-2024-27043" ref_url="https://www.suse.com/security/cve/CVE-2024-27043/" source="CVE"/>
		<reference ref_id="CVE-2024-36244" ref_url="https://www.suse.com/security/cve/CVE-2024-36244/" source="CVE"/>
		<reference ref_id="CVE-2024-36957" ref_url="https://www.suse.com/security/cve/CVE-2024-36957/" source="CVE"/>
		<reference ref_id="CVE-2024-39476" ref_url="https://www.suse.com/security/cve/CVE-2024-39476/" source="CVE"/>
		<reference ref_id="CVE-2024-40965" ref_url="https://www.suse.com/security/cve/CVE-2024-40965/" source="CVE"/>
		<reference ref_id="CVE-2024-42145" ref_url="https://www.suse.com/security/cve/CVE-2024-42145/" source="CVE"/>
		<reference ref_id="CVE-2024-42226" ref_url="https://www.suse.com/security/cve/CVE-2024-42226/" source="CVE"/>
		<reference ref_id="CVE-2024-42253" ref_url="https://www.suse.com/security/cve/CVE-2024-42253/" source="CVE"/>
		<reference ref_id="CVE-2024-44931" ref_url="https://www.suse.com/security/cve/CVE-2024-44931/" source="CVE"/>
		<reference ref_id="CVE-2024-44947" ref_url="https://www.suse.com/security/cve/CVE-2024-44947/" source="CVE"/>
		<reference ref_id="CVE-2024-44958" ref_url="https://www.suse.com/security/cve/CVE-2024-44958/" source="CVE"/>
		<reference ref_id="CVE-2024-45016" ref_url="https://www.suse.com/security/cve/CVE-2024-45016/" source="CVE"/>
		<reference ref_id="CVE-2024-45025" ref_url="https://www.suse.com/security/cve/CVE-2024-45025/" source="CVE"/>
		<reference ref_id="CVE-2024-46716" ref_url="https://www.suse.com/security/cve/CVE-2024-46716/" source="CVE"/>
		<reference ref_id="CVE-2024-46719" ref_url="https://www.suse.com/security/cve/CVE-2024-46719/" source="CVE"/>
		<reference ref_id="CVE-2024-46754" ref_url="https://www.suse.com/security/cve/CVE-2024-46754/" source="CVE"/>
		<reference ref_id="CVE-2024-46777" ref_url="https://www.suse.com/security/cve/CVE-2024-46777/" source="CVE"/>
		<reference ref_id="CVE-2024-46809" ref_url="https://www.suse.com/security/cve/CVE-2024-46809/" source="CVE"/>
		<reference ref_id="CVE-2024-46811" ref_url="https://www.suse.com/security/cve/CVE-2024-46811/" source="CVE"/>
		<reference ref_id="CVE-2024-46813" ref_url="https://www.suse.com/security/cve/CVE-2024-46813/" source="CVE"/>
		<reference ref_id="CVE-2024-46814" ref_url="https://www.suse.com/security/cve/CVE-2024-46814/" source="CVE"/>
		<reference ref_id="CVE-2024-46815" ref_url="https://www.suse.com/security/cve/CVE-2024-46815/" source="CVE"/>
		<reference ref_id="CVE-2024-46816" ref_url="https://www.suse.com/security/cve/CVE-2024-46816/" source="CVE"/>
		<reference ref_id="CVE-2024-46817" ref_url="https://www.suse.com/security/cve/CVE-2024-46817/" source="CVE"/>
		<reference ref_id="CVE-2024-46818" ref_url="https://www.suse.com/security/cve/CVE-2024-46818/" source="CVE"/>
		<reference ref_id="CVE-2024-46828" ref_url="https://www.suse.com/security/cve/CVE-2024-46828/" source="CVE"/>
		<reference ref_id="CVE-2024-46834" ref_url="https://www.suse.com/security/cve/CVE-2024-46834/" source="CVE"/>
		<reference ref_id="CVE-2024-46840" ref_url="https://www.suse.com/security/cve/CVE-2024-46840/" source="CVE"/>
		<reference ref_id="CVE-2024-46841" ref_url="https://www.suse.com/security/cve/CVE-2024-46841/" source="CVE"/>
		<reference ref_id="CVE-2024-46848" ref_url="https://www.suse.com/security/cve/CVE-2024-46848/" source="CVE"/>
		<reference ref_id="CVE-2024-46849" ref_url="https://www.suse.com/security/cve/CVE-2024-46849/" source="CVE"/>
		<reference ref_id="CVE-2024-47660" ref_url="https://www.suse.com/security/cve/CVE-2024-47660/" source="CVE"/>
		<reference ref_id="CVE-2024-47661" ref_url="https://www.suse.com/security/cve/CVE-2024-47661/" source="CVE"/>
		<reference ref_id="CVE-2024-47664" ref_url="https://www.suse.com/security/cve/CVE-2024-47664/" source="CVE"/>
		<reference ref_id="CVE-2024-47668" ref_url="https://www.suse.com/security/cve/CVE-2024-47668/" source="CVE"/>
		<reference ref_id="CVE-2024-47672" ref_url="https://www.suse.com/security/cve/CVE-2024-47672/" source="CVE"/>
		<reference ref_id="CVE-2024-47673" ref_url="https://www.suse.com/security/cve/CVE-2024-47673/" source="CVE"/>
		<reference ref_id="CVE-2024-47674" ref_url="https://www.suse.com/security/cve/CVE-2024-47674/" source="CVE"/>
		<reference ref_id="CVE-2024-47684" ref_url="https://www.suse.com/security/cve/CVE-2024-47684/" source="CVE"/>
		<reference ref_id="CVE-2024-47685" ref_url="https://www.suse.com/security/cve/CVE-2024-47685/" source="CVE"/>
		<reference ref_id="CVE-2024-47692" ref_url="https://www.suse.com/security/cve/CVE-2024-47692/" source="CVE"/>
		<reference ref_id="CVE-2024-47704" ref_url="https://www.suse.com/security/cve/CVE-2024-47704/" source="CVE"/>
		<reference ref_id="CVE-2024-47705" ref_url="https://www.suse.com/security/cve/CVE-2024-47705/" source="CVE"/>
		<reference ref_id="CVE-2024-47706" ref_url="https://www.suse.com/security/cve/CVE-2024-47706/" source="CVE"/>
		<reference ref_id="CVE-2024-47707" ref_url="https://www.suse.com/security/cve/CVE-2024-47707/" source="CVE"/>
		<reference ref_id="CVE-2024-47710" ref_url="https://www.suse.com/security/cve/CVE-2024-47710/" source="CVE"/>
		<reference ref_id="CVE-2024-47720" ref_url="https://www.suse.com/security/cve/CVE-2024-47720/" source="CVE"/>
		<reference ref_id="CVE-2024-47727" ref_url="https://www.suse.com/security/cve/CVE-2024-47727/" source="CVE"/>
		<reference ref_id="CVE-2024-47730" ref_url="https://www.suse.com/security/cve/CVE-2024-47730/" source="CVE"/>
		<reference ref_id="CVE-2024-47738" ref_url="https://www.suse.com/security/cve/CVE-2024-47738/" source="CVE"/>
		<reference ref_id="CVE-2024-47739" ref_url="https://www.suse.com/security/cve/CVE-2024-47739/" source="CVE"/>
		<reference ref_id="CVE-2024-47745" ref_url="https://www.suse.com/security/cve/CVE-2024-47745/" source="CVE"/>
		<reference ref_id="CVE-2024-47747" ref_url="https://www.suse.com/security/cve/CVE-2024-47747/" source="CVE"/>
		<reference ref_id="CVE-2024-47748" ref_url="https://www.suse.com/security/cve/CVE-2024-47748/" source="CVE"/>
		<reference ref_id="CVE-2024-49858" ref_url="https://www.suse.com/security/cve/CVE-2024-49858/" source="CVE"/>
		<reference ref_id="CVE-2024-49860" ref_url="https://www.suse.com/security/cve/CVE-2024-49860/" source="CVE"/>
		<reference ref_id="CVE-2024-49866" ref_url="https://www.suse.com/security/cve/CVE-2024-49866/" source="CVE"/>
		<reference ref_id="CVE-2024-49867" ref_url="https://www.suse.com/security/cve/CVE-2024-49867/" source="CVE"/>
		<reference ref_id="CVE-2024-49881" ref_url="https://www.suse.com/security/cve/CVE-2024-49881/" source="CVE"/>
		<reference ref_id="CVE-2024-49882" ref_url="https://www.suse.com/security/cve/CVE-2024-49882/" source="CVE"/>
		<reference ref_id="CVE-2024-49883" ref_url="https://www.suse.com/security/cve/CVE-2024-49883/" source="CVE"/>
		<reference ref_id="CVE-2024-49886" ref_url="https://www.suse.com/security/cve/CVE-2024-49886/" source="CVE"/>
		<reference ref_id="CVE-2024-49890" ref_url="https://www.suse.com/security/cve/CVE-2024-49890/" source="CVE"/>
		<reference ref_id="CVE-2024-49892" ref_url="https://www.suse.com/security/cve/CVE-2024-49892/" source="CVE"/>
		<reference ref_id="CVE-2024-49894" ref_url="https://www.suse.com/security/cve/CVE-2024-49894/" source="CVE"/>
		<reference ref_id="CVE-2024-49895" ref_url="https://www.suse.com/security/cve/CVE-2024-49895/" source="CVE"/>
		<reference ref_id="CVE-2024-49896" ref_url="https://www.suse.com/security/cve/CVE-2024-49896/" source="CVE"/>
		<reference ref_id="CVE-2024-49897" ref_url="https://www.suse.com/security/cve/CVE-2024-49897/" source="CVE"/>
		<reference ref_id="CVE-2024-49899" ref_url="https://www.suse.com/security/cve/CVE-2024-49899/" source="CVE"/>
		<reference ref_id="CVE-2024-49901" ref_url="https://www.suse.com/security/cve/CVE-2024-49901/" source="CVE"/>
		<reference ref_id="CVE-2024-49906" ref_url="https://www.suse.com/security/cve/CVE-2024-49906/" source="CVE"/>
		<reference ref_id="CVE-2024-49908" ref_url="https://www.suse.com/security/cve/CVE-2024-49908/" source="CVE"/>
		<reference ref_id="CVE-2024-49909" ref_url="https://www.suse.com/security/cve/CVE-2024-49909/" source="CVE"/>
		<reference ref_id="CVE-2024-49911" ref_url="https://www.suse.com/security/cve/CVE-2024-49911/" source="CVE"/>
		<reference ref_id="CVE-2024-49912" ref_url="https://www.suse.com/security/cve/CVE-2024-49912/" source="CVE"/>
		<reference ref_id="CVE-2024-49913" ref_url="https://www.suse.com/security/cve/CVE-2024-49913/" source="CVE"/>
		<reference ref_id="CVE-2024-49914" ref_url="https://www.suse.com/security/cve/CVE-2024-49914/" source="CVE"/>
		<reference ref_id="CVE-2024-49917" ref_url="https://www.suse.com/security/cve/CVE-2024-49917/" source="CVE"/>
		<reference ref_id="CVE-2024-49918" ref_url="https://www.suse.com/security/cve/CVE-2024-49918/" source="CVE"/>
		<reference ref_id="CVE-2024-49919" ref_url="https://www.suse.com/security/cve/CVE-2024-49919/" source="CVE"/>
		<reference ref_id="CVE-2024-49920" ref_url="https://www.suse.com/security/cve/CVE-2024-49920/" source="CVE"/>
		<reference ref_id="CVE-2024-49922" ref_url="https://www.suse.com/security/cve/CVE-2024-49922/" source="CVE"/>
		<reference ref_id="CVE-2024-49923" ref_url="https://www.suse.com/security/cve/CVE-2024-49923/" source="CVE"/>
		<reference ref_id="CVE-2024-49929" ref_url="https://www.suse.com/security/cve/CVE-2024-49929/" source="CVE"/>
		<reference ref_id="CVE-2024-49930" ref_url="https://www.suse.com/security/cve/CVE-2024-49930/" source="CVE"/>
		<reference ref_id="CVE-2024-49933" ref_url="https://www.suse.com/security/cve/CVE-2024-49933/" source="CVE"/>
		<reference ref_id="CVE-2024-49936" ref_url="https://www.suse.com/security/cve/CVE-2024-49936/" source="CVE"/>
		<reference ref_id="CVE-2024-49939" ref_url="https://www.suse.com/security/cve/CVE-2024-49939/" source="CVE"/>
		<reference ref_id="CVE-2024-49946" ref_url="https://www.suse.com/security/cve/CVE-2024-49946/" source="CVE"/>
		<reference ref_id="CVE-2024-49949" ref_url="https://www.suse.com/security/cve/CVE-2024-49949/" source="CVE"/>
		<reference ref_id="CVE-2024-49954" ref_url="https://www.suse.com/security/cve/CVE-2024-49954/" source="CVE"/>
		<reference ref_id="CVE-2024-49955" ref_url="https://www.suse.com/security/cve/CVE-2024-49955/" source="CVE"/>
		<reference ref_id="CVE-2024-49958" ref_url="https://www.suse.com/security/cve/CVE-2024-49958/" source="CVE"/>
		<reference ref_id="CVE-2024-49959" ref_url="https://www.suse.com/security/cve/CVE-2024-49959/" source="CVE"/>
		<reference ref_id="CVE-2024-49960" ref_url="https://www.suse.com/security/cve/CVE-2024-49960/" source="CVE"/>
		<reference ref_id="CVE-2024-49962" ref_url="https://www.suse.com/security/cve/CVE-2024-49962/" source="CVE"/>
		<reference ref_id="CVE-2024-49967" ref_url="https://www.suse.com/security/cve/CVE-2024-49967/" source="CVE"/>
		<reference ref_id="CVE-2024-49969" ref_url="https://www.suse.com/security/cve/CVE-2024-49969/" source="CVE"/>
		<reference ref_id="CVE-2024-49973" ref_url="https://www.suse.com/security/cve/CVE-2024-49973/" source="CVE"/>
		<reference ref_id="CVE-2024-49974" ref_url="https://www.suse.com/security/cve/CVE-2024-49974/" source="CVE"/>
		<reference ref_id="CVE-2024-49975" ref_url="https://www.suse.com/security/cve/CVE-2024-49975/" source="CVE"/>
		<reference ref_id="CVE-2024-49982" ref_url="https://www.suse.com/security/cve/CVE-2024-49982/" source="CVE"/>
		<reference ref_id="CVE-2024-49991" ref_url="https://www.suse.com/security/cve/CVE-2024-49991/" source="CVE"/>
		<reference ref_id="CVE-2024-49993" ref_url="https://www.suse.com/security/cve/CVE-2024-49993/" source="CVE"/>
		<reference ref_id="CVE-2024-49995" ref_url="https://www.suse.com/security/cve/CVE-2024-49995/" source="CVE"/>
		<reference ref_id="CVE-2024-49996" ref_url="https://www.suse.com/security/cve/CVE-2024-49996/" source="CVE"/>
		<reference ref_id="CVE-2024-50000" ref_url="https://www.suse.com/security/cve/CVE-2024-50000/" source="CVE"/>
		<reference ref_id="CVE-2024-50001" ref_url="https://www.suse.com/security/cve/CVE-2024-50001/" source="CVE"/>
		<reference ref_id="CVE-2024-50002" ref_url="https://www.suse.com/security/cve/CVE-2024-50002/" source="CVE"/>
		<reference ref_id="CVE-2024-50006" ref_url="https://www.suse.com/security/cve/CVE-2024-50006/" source="CVE"/>
		<reference ref_id="CVE-2024-50014" ref_url="https://www.suse.com/security/cve/CVE-2024-50014/" source="CVE"/>
		<reference ref_id="CVE-2024-50019" ref_url="https://www.suse.com/security/cve/CVE-2024-50019/" source="CVE"/>
		<reference ref_id="CVE-2024-50024" ref_url="https://www.suse.com/security/cve/CVE-2024-50024/" source="CVE"/>
		<reference ref_id="CVE-2024-50028" ref_url="https://www.suse.com/security/cve/CVE-2024-50028/" source="CVE"/>
		<reference ref_id="CVE-2024-50033" ref_url="https://www.suse.com/security/cve/CVE-2024-50033/" source="CVE"/>
		<reference ref_id="CVE-2024-50035" ref_url="https://www.suse.com/security/cve/CVE-2024-50035/" source="CVE"/>
		<reference ref_id="CVE-2024-50041" ref_url="https://www.suse.com/security/cve/CVE-2024-50041/" source="CVE"/>
		<reference ref_id="CVE-2024-50045" ref_url="https://www.suse.com/security/cve/CVE-2024-50045/" source="CVE"/>
		<reference ref_id="CVE-2024-50046" ref_url="https://www.suse.com/security/cve/CVE-2024-50046/" source="CVE"/>
		<reference ref_id="CVE-2024-50047" ref_url="https://www.suse.com/security/cve/CVE-2024-50047/" source="CVE"/>
		<reference ref_id="CVE-2024-50048" ref_url="https://www.suse.com/security/cve/CVE-2024-50048/" source="CVE"/>
		<reference ref_id="CVE-2024-50049" ref_url="https://www.suse.com/security/cve/CVE-2024-50049/" source="CVE"/>
		<reference ref_id="CVE-2024-50055" ref_url="https://www.suse.com/security/cve/CVE-2024-50055/" source="CVE"/>
		<reference ref_id="CVE-2024-50058" ref_url="https://www.suse.com/security/cve/CVE-2024-50058/" source="CVE"/>
		<reference ref_id="CVE-2024-50059" ref_url="https://www.suse.com/security/cve/CVE-2024-50059/" source="CVE"/>
		<reference ref_id="CVE-2024-50061" ref_url="https://www.suse.com/security/cve/CVE-2024-50061/" source="CVE"/>
		<reference ref_id="CVE-2024-50063" ref_url="https://www.suse.com/security/cve/CVE-2024-50063/" source="CVE"/>
		<reference ref_id="CVE-2024-50081" ref_url="https://www.suse.com/security/cve/CVE-2024-50081/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-48879: efi: fix NULL-deref in init error path (bsc#1229556).
- CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1231893).
- CVE-2022-48957: dpaa2-switch: Fix memory leak in dpaa2_switch_acl_entry_add() and dpaa2_switch_acl_entry_remove() (bsc#1231973).
- CVE-2022-48958: ethernet: aeroflex: fix potential skb leak in greth_init_rings() (bsc#1231889).
- CVE-2022-48959: net: dsa: sja1105: fix memory leak in sja1105_setup_devlink_regions() (bsc#1231976).
- CVE-2022-48960: net: hisilicon: Fix potential use-after-free in hix5hd2_rx() (bsc#1231979).
- CVE-2022-48962: net: hisilicon: Fix potential use-after-free in hisi_femac_rx() (bsc#1232286).
- CVE-2022-48966: net: mvneta: Fix an out of bounds check (bsc#1232191).
- CVE-2022-48980: net: dsa: sja1105: avoid out of bounds access in sja1105_init_l2_policing() (bsc#1232233).
- CVE-2022-48991: mm/khugepaged: fix collapse_pte_mapped_thp() to allow anon_vma (bsc#1232070 git-fix prerequisity).
- CVE-2022-49015: net: hsr: Fix potential use-after-free (bsc#1231938).
- CVE-2022-49017: tipc: re-fetch skb cb after tipc_msg_validate (bsc#1232004).
- CVE-2022-49020: net/9p: Fix a potential socket leak in p9_socket_open (bsc#1232175).
- CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to entire cycle too (bsc#1226797).
- CVE-2024-36957: octeontx2-af: avoid off-by-one read from userspace (bsc#1225762).
- CVE-2024-39476: md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING (bsc#1227437).
- CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer (bsc#1227885).
- CVE-2024-42226: Prevent potential failure in handle_tx_event() for Transfer events without TRB (bsc#1228709).
- CVE-2024-42253: gpio: pca953x: fix pca953x_irq_bus_sync_unlock race (bsc#1229005 stable-fixes).
- CVE-2024-44931: gpio: prevent potential speculation leaks in gpio_device_get_desc() (bsc#1229837 stable-fixes).
- CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc (bsc#1230179).
- CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429).
- CVE-2024-45025: fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE (bsc#1230456).
- CVE-2024-46716: dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor (bsc#1230715).
- CVE-2024-46754: bpf: Remove tst_run from lwt_seg6local_prog_ops (bsc#1230801).
- CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773).
- CVE-2024-46809: drm/amd/display: Check BIOS images before it is used (bsc#1231148).
- CVE-2024-46811: drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box (bsc#1231179).
- CVE-2024-46813: drm/amd/display: Check link_index before accessing dc-&gt;links (bsc#1231191).
- CVE-2024-46814: drm/amd/display: Check msg_id before processing transcation (bsc#1231193).
- CVE-2024-46815: drm/amd/display: Check num_valid_sets before accessing reader_wm_sets (bsc#1231195).
- CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197).
- CVE-2024-46817: drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (bsc#1231200).
- CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index (bsc#1231203).
- CVE-2024-46828: uprobes: fix kernel info leak via '[uprobes]' vma (bsc#1231114).
- CVE-2024-46834: ethtool: fail closed if we can't get max channel used in indirection tables (bsc#1231096).
- CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete (bsc#1231105).
- CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094).
- CVE-2024-46848: perf/x86/intel: Limit the period on Haswell (bsc#1231072).
- CVE-2024-46849: ASoC: meson: axg-card: fix 'use-after-free' (bsc#1231073).
- CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439).
- CVE-2024-47661: drm/amd/display: Avoid overflow from uint32_t to uint8_t (bsc#1231496).
- CVE-2024-47664: spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware (bsc#1231442).
- CVE-2024-47668: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (bsc#1231502).
- CVE-2024-47672: wifi: iwlwifi: mvm: do not wait for tx queues if firmware is dead (bsc#1231540).
- CVE-2024-47673: wifi: iwlwifi: mvm: pause TCM when the firmware is stopped (bsc#1231539).
- CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673).
- CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987).
- CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() (bsc#1231998).
- CVE-2024-47692: nfsd: return -EINVAL when namelen is 0 (bsc#1231857).
- CVE-2024-47704: drm/amd/display: Check link_res-&gt;hpo_dp_link_enc before using it (bsc#1231944).
- CVE-2024-47705: block: fix potential invalid pointer dereference in blk_add_partition (bsc#1231872).
- CVE-2024-47706: block, bfq: fix possible UAF for bfqq-&gt;bic with merge chain (bsc#1231942).
- CVE-2024-47707: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() (bsc#1231935).
- CVE-2024-47710: sock_map: Add a cond_resched() in sock_hash_free() (bsc#1232049).
- CVE-2024-47720: drm/amd/display: Add null check for set_output_gamma in dcn30_set_output_transfer_func (bsc#1232043).
- CVE-2024-47727: x86/tdx: Fix 'in-kernel MMIO' check (bsc#1232116).
- CVE-2024-47730: crypto: hisilicon/qm - inject error before stopping queue (bsc#1232075).
- CVE-2024-47738: wifi: mac80211: do not use rate mask for offchannel TX either (bsc#1232114).
- CVE-2024-47739: padata: use integer wrap around to prevent deadlock on seq_nr overflow (bsc#1232124).
- CVE-2024-47745: mm: split critical region in remap_file_pages() and invoke LSMs in between (bsc#1232135).
- CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition (bsc#1232145).
- CVE-2024-47748: vhost_vdpa: assign irq bypass producer token correctly (bsc#1232174).
- CVE-2024-49860: ACPI: sysfs: validate return type of _STR method (bsc#1231861).
- CVE-2024-49866: tracing/timerlat: Fix a race during cpuhp processing (bsc#1232259).
- CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201).
- CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path (bsc#1232200).
- CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent() (bsc#1232199).
- CVE-2024-49886: platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug (bsc#1232196).
- CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it (bsc#1232217).
- CVE-2024-49892: drm/amd/display: Initialize get_bytes_per_element's default to 1 (bsc#1232220).
- CVE-2024-49896: drm/amd/display: Check stream before comparing them (bsc#1232221).
- CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used (bsc#1232355).
- CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1 (bsc#1232358).
- CVE-2024-49901: drm/msm/adreno: Assign msm_gpu-&gt;pdev earlier to avoid nullptrs (bsc#1232305).
- CVE-2024-49906: drm/amd/display: Check null pointer before try to access it (bsc#1232332).
- CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func (bsc#1232337).
- CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func (bsc#1232366).
- CVE-2024-49914: drm/amd/display: Add null check for pipe_ctx-&gt;plane_state in (bsc#1232369).
- CVE-2024-49917: drm/amd/display: Add NULL check for clk_mgr and clk_mgr-&gt;funcs in dcn30_init_hw (bsc#1231965).
- CVE-2024-49918: drm/amd/display: Add null check for head_pipe in dcn32_acquire_idle_pipe_for_head_pipe_in_layer (bsc#1231967).
- CVE-2024-49919: drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layer (bsc#1231968).
- CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses (bsc#1232313).
- CVE-2024-49922: drm/amd/display: Check null pointers before using them (bsc#1232374).
- CVE-2024-49923: drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags (bsc#1232361).
- CVE-2024-49929: wifi: iwlwifi: mvm: avoid NULL pointer dereference (bsc#1232253).
- CVE-2024-49930: wifi: ath11k: fix array out-of-bound access in SoC stats (bsc#1232260).
- CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368).
- CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424).
- CVE-2024-49939: wifi: rtw89: avoid to add interface to list twice when SER (bsc#1232381).
- CVE-2024-49946: ppp: do not assume bh is held in ppp_channel_bridge_input() (bsc#1232164).
- CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (bsc#1232160).
- CVE-2024-49954: static_call: Replace pointless WARN_ON() in static_call_module_notify() (bsc#1232155).
- CVE-2024-49955: ACPI: battery: Fix possible crash when unregistering a battery hook (bsc#1232154).
- CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching reflink tree (bsc#1232151).
- CVE-2024-49959: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error (bsc#1232149).
- CVE-2024-49960: ext4: fix timer use-after-free on failed mount (bsc#1232395).
- CVE-2024-49967: ext4: no need to continue when the number of entries is 1 (bsc#1232140).
- CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color transformation (bsc#1232519).
- CVE-2024-49973: r8169: add tally counter fields added with RTL8125 (bsc#1232105).
- CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous (bsc#1232383).
- CVE-2024-49975: uprobes: fix kernel info leak via '[uprobes]' vma (bsc#1232104).
- CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282).
- CVE-2024-49993: iommu/vt-d: Fix potential lockup if qi_submit_sync called with 0 count (bsc#1232316).
- CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432).
- CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points (bsc#1232089).
- CVE-2024-50000: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc() (bsc#1232085).
- CVE-2024-50001: net/mlx5: Fix error path in multi-packet WQE transmit (bsc#1232084).
- CVE-2024-50002: static_call: Handle module init failure correctly in static_call_del_module() (bsc#1232083).
- CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate() (bsc#1232442).
- CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path (bsc#1232446).
- CVE-2024-50019: kthread: unpark only parked kthread (bsc#1231990).
- CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954).
- CVE-2024-50028: thermal: core: Reference count the zone in thermal_zone_get_by_id() (bsc#1231950).
- CVE-2024-50033: slip: make slhc_remember() more robust against malicious packets (bsc#1231914).
- CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392).
- CVE-2024-50041: i40e: Fix macvlan leak by synchronizing access to mac_filter_hash (bsc#1231907).
- CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb (bsc#1231903).
- CVE-2024-50046: kabi fix for NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies() (bsc#1231902).
- CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418).
- CVE-2024-50048: fbcon: Fix a NULL pointer dereference issue in fbcon_putcs (bsc#1232310).
- CVE-2024-50055: driver core: bus: Fix double free in driver API bus_register() (bsc#1232329).
- CVE-2024-50058: serial: protect uart_port_dtr_rts() in uart_shutdown() too (bsc#1232285).
- CVE-2024-50059: ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition (bsc#1232345).
- CVE-2024-50061: i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition (bsc#1232263).
- CVE-2024-50063: kABI: bpf: struct bpf_map kABI workaround (bsc#1232435).
- CVE-2024-50081: blk-mq: setup queue -&gt;tag_set before initializing hctx (bsc#1232501).

The following non-security bugs were fixed:

- ACPI: EC: Do not release locks during operation region accesses (stable-fixes).
- ACPI: PAD: fix crash in exit_round_robin() (stable-fixes).
- ACPI: PRM: Clean up guid type in struct prm_handler_info (git-fixes).
- ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context (git-fixes).
- ACPI: battery: Call power_supply_changed() when adding hooks (bsc#1232154)
- ACPI: battery: Simplify battery hook locking (bsc#1232154)
- ACPI: resource: Add Asus ExpertBook B2502CVA to irq1_level_low_skip_override[] (stable-fixes).
- ACPI: resource: Add Asus Vivobook X1704VAP to irq1_level_low_skip_override[] (stable-fixes).
- ACPI: resource: Add another DMI match for the TongFang GMxXGxx (stable-fixes).
- ACPICA: Fix memory leak if acpi_ps_get_next_field() fails (stable-fixes).
- ACPICA: Fix memory leak if acpi_ps_get_next_namepath() fails (stable-fixes).
- ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package() (stable-fixes).
- ACPICA: iasl: handle empty connection_node (stable-fixes).
- ALSA: asihpi: Fix potential OOB array access (stable-fixes).
- ALSA: core: add isascii() check to card ID generator (stable-fixes).
- ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (git-fixes).
- ALSA: hda/conexant - Fix audio routing for HP EliteOne 1000 G2 (stable-fixes).
- ALSA: hda/conexant - Use cached pin control for Node 0x1d on HP EliteOne 1000 G2 (git-fixes).
- ALSA: hda/conexant: Fix conflicting quirk for System76 Pangolin (git-fixes).
- ALSA: hda/cs8409: Fix possible NULL dereference (git-fixes).
- ALSA: hda/generic: Unconditionally prefer preferred_dacs pairs (git-fixes).
- ALSA: hda/realtek - FIxed ALC285 headphone no sound (stable-fixes).
- ALSA: hda/realtek - Fixed ALC256 headphone no sound (stable-fixes).
- ALSA: hda/realtek: Add a quirk for HP Pavilion 15z-ec200 (stable-fixes).
- ALSA: hda/realtek: Add quirk for Huawei MateBook 13 KLV-WX9 (stable-fixes).
- ALSA: hda/realtek: Fix the push button function for the ALC257 (git-fixes).
- ALSA: hda/realtek: Update default depop procedure (git-fixes).
- ALSA: hda: Fix kctl-&gt;id initialization (git-fixes).
- ALSA: hda: cs35l41: fix module autoloading (git-fixes).
- ALSA: hdsp: Break infinite MIDI input flush loop (stable-fixes).
- ALSA: line6: add hw monitor volume control to POD HD500X (stable-fixes).
- ALSA: mixer_oss: Remove some incorrect kfree_const() usages (git-fixes).
- ALSA: usb-audio: Add delay quirk for VIVO USB-C HEADSET (stable-fixes).
- ALSA: usb-audio: Add input value sanity checks for standard types (stable-fixes).
- ALSA: usb-audio: Add logitech Audio profile quirk (stable-fixes).
- ALSA: usb-audio: Add native DSD support for Luxman D-08u (stable-fixes).
- ALSA: usb-audio: Define macros for quirk table entries (stable-fixes).
- ALSA: usb-audio: Replace complex quirk lines with macros (stable-fixes).
- ASoC: allow module autoloading for table db1200_pids (stable-fixes).
- ASoC: imx-card: Set card.owner to avoid a warning calltrace if SND=m (git-fixes).
- ASoC: intel: fix module autoloading (stable-fixes).
- ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe() (git-fixes).
- ASoC: rt5682: Return devm_of_clk_add_hw_provider to transfer the error (git-fixes).
- ASoC: soc-pcm: Do not zero TDM masks in __soc_pcm_open() (git-fixes).
- ASoC: tda7419: fix module autoloading (stable-fixes).
- Bluetooth: Call iso_exit() on module unload (git-fixes).
- Bluetooth: ISO: Fix multiple init when debugfs is disabled (git-fixes).
- Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (git-fixes).
- Bluetooth: Remove debugfs directory on module init failure (git-fixes).
- Bluetooth: bnep: fix wild-memory-access in proto_unregister (git-fixes).
- Bluetooth: btmrvl: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- Bluetooth: btusb: Fix regression with fake CSR controllers 0a12:0001 (git-fixes).
- Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (git-fixes).
- HID: amd_sfh: Switch to device-managed dmam_alloc_coherent() (git-fixes).
- HID: multitouch: Add support for GT7868Q (stable-fixes).
- HID: multitouch: Add support for Thinkpad X12 Gen 2 Kbd Portfolio (stable-fixes).
- HID: plantronics: Workaround for an unexcepted opposite volume key (stable-fixes).
- Input: adp5589-keys - fix NULL pointer dereference (git-fixes).
- Input: adp5589-keys - fix adp5589_gpio_get_value() (git-fixes).
- Input: ads7846 - ratelimit the spi_sync error message (stable-fixes).
- Input: goodix - use the new soc_intel_is_byt() helper (stable-fixes).
- Input: synaptics - enable SMBus for HP Elitebook 840 G2 (stable-fixes).
- KVM: Fix coalesced_mmio_has_room() to avoid premature userspace exit (git-fixes).
- KVM: Fix lockdep false negative during host resume (git-fixes).
- KVM: Grab a reference to KVM for VM and vCPU stats file descriptors (git-fixes).
- KVM: Optimize kvm_make_vcpus_request_mask() a bit (git-fixes).
- KVM: Pre-allocate cpumasks for kvm_make_all_cpus_request_except() (git-fixes).
- KVM: Reject overly excessive IDs in KVM_CREATE_VCPU (git-fixes).
- KVM: SVM: Disallow guest from changing userspace's MSR_AMD64_DE_CFG value (git-fixes).
- KVM: SVM: Do not advertise Bus Lock Detect to guest if SVM support is missing (git-fixes).
- KVM: SVM: fix emulation of msr reads/writes of MSR_FS_BASE and MSR_GS_BASE (git-fixes).
- KVM: Unconditionally get a ref to /dev/kvm module when creating a VM (git-fixes).
- KVM: Write the per-page 'segment' when clearing (part of) a guest page (git-fixes).
- KVM: arm64: Add missing memory barriers when switching to pKVM's hyp pgd (git-fixes).
- KVM: arm64: Allow AArch32 PSTATE.M to be restored as System mode (git-fixes).
- KVM: arm64: Fix AArch32 register narrowing on userspace write (git-fixes).
- KVM: arm64: GICv4: Do not perform a map to a mapped vLPI (git-fixes).
- KVM: arm64: Invalidate EL1&amp;0 TLB entries for all VMIDs in nvhe hyp init (git-fixes).
- KVM: arm64: Preserve PSTATE.SS for the guest while single-step is enabled (git-fixes).
- KVM: arm64: Release pfn, i.e. put page, if copying MTE tags hits ZONE_DEVICE (git-fixes).
- KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs (git-fixes).
- KVM: arm64: vgic-its: Test for valid IRQ in MOVALL handler (git-fixes).
- KVM: arm64: vgic-its: Test for valid IRQ in its_sync_lpi_pending_table() (git-fixes).
- KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() (git-fixes).
- KVM: arm64: vgic-v2: Use cpuid from userspace as vcpu_id (git-fixes).
- KVM: arm64: vgic-v4: Restore pending state on host userspace write (git-fixes).
- KVM: eventfd: Fix false positive RCU usage warning (git-fixes).
- KVM: fix memoryleak in kvm_init() (git-fixes).
- KVM: s390: Change virtual to physical address access in diag 0x258 handler (git-fixes bsc#1232631).
- KVM: s390: gaccess: Check if guest address is in memslot (git-fixes bsc#1232630).
- KVM: x86/mmu: Fold rmap_recycle into rmap_add (git-fixes).
- KVM: x86/mmu: Rename slot_handle_leaf to slot_handle_level_4k (git-fixes).
- KVM: x86: Use a stable condition around all VT-d PI paths (git-fixes).
- Makefile.compiler: replace cc-ifversion with compiler-specific macros (bsc#1230414 bsc#1229450).
- NFS: Avoid unnecessary rescanning of the per-server delegation list (git-fixes).
- NFSD: Fix NFSv4's PUTPUBFH operation (git-fixes).
- NFSD: Mark filecache 'down' if init fails (git-fixes).
- NFSv3: only use NFS timeout for MOUNT when protocols are compatible (bsc#1231016).
- NFSv4: Fix clearing of layout segments in layoutreturn (git-fixes).
- PCI: Add ACS quirk for Qualcomm SA8775P (stable-fixes).
- PCI: Add function 0 DMA alias quirk for Glenfly Arise chip (stable-fixes).
- PCI: Fix pci_enable_acs() support for the ACS quirks (bsc#1229019).
- PCI: Mark Creative Labs EMU20k2 INTx masking as broken (stable-fixes).
- RDMA/bnxt_re: Add a check for memory allocation (git-fixes)
- RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (git-fixes)
- RDMA/bnxt_re: Fix incorrect AVID type in WQE structure (git-fixes)
- RDMA/bnxt_re: Fix the GID table length (git-fixes)
- RDMA/bnxt_re: Fix the max CQ WQEs for older adapters (git-fixes)
- RDMA/bnxt_re: Fix the usage of control path spin locks (git-fixes)
- RDMA/bnxt_re: Return more meaningful error (git-fixes)
- RDMA/bnxt_re: synchronize the qp-handle table array (git-fixes)
- RDMA/cxgb4: Dump vendor specific QP details (git-fixes)
- RDMA/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP (git-fixes)
- RDMA/hns: Remove unused abnormal interrupt of type RAS (git-fixes)
- RDMA/irdma: Fix misspelling of 'accept*' (git-fixes)
- RDMA/mad: Improve handling of timed out WRs of mad agent (git-fixes)
- RDMA/mana_ib: use the correct page size for mapping user-mode doorbell page (git-fixes).
- RDMA/mana_ib: use the correct page table index based on hardware page size (git-fixes).
- RDMA/mlx5: Round max_rd_atomic/max_dest_rd_atomic up instead of down (git-fixes)
- RDMA/rtrs-srv: Avoid null pointer deref during path establishment (git-fixes)
- RDMA/srpt: Make slab cache names unique (git-fixes)
- SUNRPC: Fix integer overflow in decode_rc_list() (git-fixes).
- SUNRPC: Fixup gss_status tracepoint error output (git-fixes).
- SUNRPC: clnt.c: Remove misleading comment (git-fixes).
- USB: appledisplay: close race between probe and completion handler (stable-fixes).
- USB: misc: cypress_cy7c63: check for short transfer (stable-fixes).
- USB: misc: yurex: fix race between read and write (stable-fixes).
- USB: serial: option: add Telit FN920C04 MBIM compositions (stable-fixes).
- USB: serial: option: add support for Quectel EG916Q-GL (stable-fixes).
- USB: serial: pl2303: add device id for Macrosilicon MS3020 (stable-fixes).
- Use pahole -j1 option for reproducible builds (bsc#1230414 bsc#1229450).
- add bug reference for a mana change (bsc#1229769).
- add bug references to existing mana changes (bsc#1232033, bsc#1232034, bsc#1232036).
- afs: Revert 'afs: Hide silly-rename files from userspace' (git-fixes).
- arm64: cputype: Add Neoverse-N3 definitions (git-fixes)
- arm64: dts: rockchip: override BIOS_DISABLE signal via GPIO hog on RK3399 Puma (git-fixes).
- arm64: errata: Expand speculative SSBS workaround once more (git-fixes)
- arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes)
- arm64: probes: Fix simulate_ldr*_literal() (git-fixes)
- arm64: probes: Fix uprobes for big-endian kernels (git-fixes)
- arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes)
- block: print symbolic error name instead of error code (bsc#1231872).
- bpf, lsm: Add disabled BPF LSM hook list (git-fixes).
- bpf, net: Fix a potential race in do_sock_getsockopt() (git-fixes).
- bpf, verifier: Correct tail_call_reachable for bpf prog (git-fixes).
- bpf, x64: Remove tail call detection (git-fixes).
- bpf,perf: Fix perf_event_detach_bpf_prog error handling (git-fixes).
- bpf: Add --skip_encoding_btf_inconsistent_proto, --btf_gen_optimized to pahole flags for v1.25 (bsc#1230414 bsc#1229450).
- bpf: Allow helpers to accept pointers with a fixed size (git-fixes).
- bpf: Check for helper calls in check_subprogs() (git-fixes).
- bpf: Fix bpf_strtol and bpf_strtoul helpers for 32bit (git-fixes).
- bpf: Fix helper writes to read-only maps (git-fixes).
- bpf: Fix pointer-leak due to insufficient speculative store bypass mitigation (bsc#1231375).
- bpf: Fix tailcall cases in test_bpf (git-fixes).
- bpf: Improve check_raw_mode_ok test for MEM_UNINIT-tagged types (git-fixes).
- bpf: Remove truncation test in bpf_strtol and bpf_strtoul helpers (git-fixes).
- bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error (git-fixes).
- bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos (git-fixes).
- btf, scripts: Exclude Rust CUs with pahole (bsc#1230414 bsc#1229450).
- bus: integrator-lm: fix OF node leak in probe() (git-fixes).
- ceph: fix cap ref leak via netfs init_request (bsc#1231383).
- clk: Add a devm variant of clk_rate_exclusive_get() (bsc#1227885).
- clk: Provide !COMMON_CLK dummy for devm_clk_rate_exclusive_get() (bsc#1227885).
- comedi: ni_routing: tools: Check when the file could not be opened (stable-fixes).
- cpufreq/amd-pstate: Fix amd_pstate mode switch on shared memory systems (git-fixes).
- crypto: hisilicon - Remove pci_aer_clear_nonfatal_status() call (bsc#1232075)
- crypto: hisilicon/qm - re-enable communicate interrupt before notifying PF (bsc#1232075)
- debugfs: fix automount d_fsdata usage (git-fixes).
- dn_route: set rt neigh to blackhole_netdev instead of loopback_dev in ifdown (bsc#1216813).
- drbd: Add NULL check for net_conf to prevent dereference in state validation (git-fixes).
- drbd: Fix atomicity violation in drbd_uuid_set_bm() (git-fixes).
- driver core: bus: Return -EIO instead of 0 when show/store invalid bus attribute (stable-fixes).
- drm/amd/amdgpu: Fix double unlock in amdgpu_mes_add_ring (git-fixes).
- drm/amd/display: Add null check for 'afb' in amdgpu_dm_plane_handle_cursor_update (v2) (stable-fixes).
- drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream (stable-fixes).
- drm/amd/display: Allow backlight to go below `AMDGPU_DM_DEFAULT_MIN_BACKLIGHT` (stable-fixes).
- drm/amd/display: Check link_res-&gt;hpo_dp_link_enc before using it (bsc#1231944)
- drm/amd/display: Check null pointer before dereferencing se (stable-fixes).
- drm/amd/display: Check null pointers before using dc-&gt;clk_mgr (stable-fixes).
- drm/amd/display: Check stream before comparing them (stable-fixes).
- drm/amd/display: Fix Synaptics Cascaded Panamera DSC Determination (stable-fixes).
- drm/amd/display: Fix index out of bounds in DCN30 color transformation (stable-fixes).
- drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation (stable-fixes).
- drm/amd/display: Fix index out of bounds in degamma hardware format translation (stable-fixes).
- drm/amd/display: Fix system hang while resume with TBT monitor (stable-fixes).
- drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream' (stable-fixes).
- drm/amd/display: Initialize get_bytes_per_element's default to 1 (stable-fixes).
- drm/amd/display: Round calculated vtotal (stable-fixes).
- drm/amd/display: Validate backlight caps are sane (stable-fixes).
- drm/amd/pm: ensure the fw_info is not null before using it (stable-fixes).
- drm/amd: Guard against bad data for ATIF ACPI method (git-fixes).
- drm/amdgpu: Replace one-element array with flexible-array member (stable-fixes).
- drm/amdgpu: add raven1 gfxoff quirk (stable-fixes).
- drm/amdgpu: disallow multiple BO_HANDLES chunks in one submit (stable-fixes).
- drm/amdgpu: enable gfxoff quirk on HP 705G4 (stable-fixes).
- drm/amdgpu: fix unchecked return value warning for amdgpu_gfx (stable-fixes).
- drm/amdgpu: prevent BO_HANDLES error from being overwritten (git-fixes).
- drm/amdgpu: properly handle vbios fake edid sizing (git-fixes).
- drm/amdkfd: Fix resource leak in criu restore queue (stable-fixes).
- drm/msm/dpu: do not always program merge_3d block (git-fixes).
- drm/msm/dpu: make sure phys resources are properly initialized (git-fixes).
- drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation (git-fixes).
- drm/msm: Allocate memory for disp snapshot with kvzalloc() (git-fixes).
- drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() (git-fixes).
- drm/printer: Allow NULL data in devcoredump printer (stable-fixes).
- drm/radeon/r100: Handle unknown family in r100_cp_init_microcode() (stable-fixes).
- drm/radeon: Fix encoder-&gt;possible_clones (git-fixes).
- drm/radeon: Replace one-element array with flexible-array member (stable-fixes).
- drm/radeon: properly handle vbios fake edid sizing (git-fixes).
- drm/rockchip: define gamma registers for RK3399 (stable-fixes).
- drm/rockchip: support gamma control on RK3399 (stable-fixes).
- drm/sched: Add locking to drm_sched_entity_modify_sched (git-fixes).
- drm/v3d: Stop the active perfmon before being destroyed (git-fixes).
- drm/vc4: Stop the active perfmon before being destroyed (git-fixes).
- drm/vmwgfx: Handle surface check failure correctly (git-fixes).
- drm: Consistently use struct drm_mode_rect for FB_DAMAGE_CLIPS (git-fixes).
- drm: komeda: Fix an issue related to normalized zpos (stable-fixes).
- efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (stable-fixes).
- erofs: avoid consecutive detection for Highmem memory (git-fixes).
- erofs: avoid infinite loop in z_erofs_do_read_page() when reading beyond EOF (git-fixes).
- erofs: fix pcluster use-after-free on UP platforms (git-fixes).
- erofs: fix potential overflow calculating xattr_isize (git-fixes).
- erofs: stop parsing non-compact HEAD index if clusterofs is invalid (git-fixes).
- exportfs: use pr_debug for unreachable debug statements (git-fixes).
- ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201)
- fat: fix uninitialized variable (git-fixes).
- fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes).
- fbdev: sisfb: Fix strbuf array overflow (stable-fixes).
- fgraph: Change the name of cpuhp state to 'fgraph:online' (git-fixes).
- fgraph: Fix missing unlock in register_ftrace_graph() (git-fixes).
- fgraph: Use CPU hotplug mechanism to initialize idle shadow stacks (git-fixes).
- filelock: fix potential use-after-free in posix_lock_inode (git-fixes).
- firmware: tegra: bpmp: Drop unused mbox_client_to_bpmp() (git-fixes).
- fs/namespace: fnic: Switch to use %ptTd (git-fixes).
- fs/pipe: Fix lockdep false-positive in watchqueue pipe_write() (git-fixes).
- fs: Fix file_set_fowner LSM hook inconsistencies (git-fixes).
- gpio: aspeed: Add the flush write to ensure the write complete (git-fixes).
- gpio: aspeed: Use devm_clk api to manage clock source (git-fixes).
- gpio: davinci: fix lazy disable (git-fixes).
- hid: intel-ish-hid: Fix uninitialized variable 'rv' in ish_fw_xfer_direct_dma (git-fixes).
- hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event (git-fixes).
- hwmon: (adm9240) Add missing dependency on REGMAP_I2C (git-fixes).
- hwmon: (tmp513) Add missing dependency on REGMAP_I2C (git-fixes).
- i2c: i801: Use a different adapter-name for IDF adapters (stable-fixes).
- i2c: imx-lpi2c: return -EINVAL when i2c peripheral clk does not work (bsc#1227885).
- i2c: imx-lpi2c: use bulk clk API (bsc#1227885).
- i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume (git-fixes).
- i2c: xiic: Fix RX IRQ busy check (stable-fixes).
- i2c: xiic: Fix broken locking on tx_msg (stable-fixes).
- i2c: xiic: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes).
- i2c: xiic: Switch from waitqueue to completion (stable-fixes).
- i2c: xiic: Try re-initialization on bus busy timeout (git-fixes).
- i2c: xiic: Use devm_clk_get_enabled() (stable-fixes).
- i2c: xiic: improve error message when transfer fails to start (stable-fixes).
- i2c: xiic: xiic_xfer(): Fix runtime PM leak on error path (git-fixes).
- ice: Unbind the workqueue (bsc#1231344).
- iio: dac: ad5770r: add missing select REGMAP_SPI in Kconfig (git-fixes).
- iio: dac: ltc1660: add missing select REGMAP_SPI in Kconfig (git-fixes).
- iio: dac: stm32-dac-core: add missing select REGMAP_MMIO in Kconfig (git-fixes).
- iio: hid-sensors: Fix an error handling path in _hid_sensor_set_report_latency() (git-fixes).
- iio: light: opt3001: add missing full-scale range value (git-fixes).
- iio: light: veml6030: fix ALS sensor resolution (git-fixes).
- iio: light: veml6030: fix IIO device retrieval from embedded device (git-fixes).
- iio: proximity: mb1232: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes).
- iommu/vt-d: Always reserve a domain ID for identity setup (git-fixes).
- ipv6: blackhole_netdev needs snmp6 counters (bsc#1216813).
- ipv6: give an IPv6 dev to blackhole_netdev (bsc#1216813).
- jfs: Fix sanity check in dbMount (git-fixes).
- jfs: Fix uaf in dbFreeBits (git-fixes).
- jfs: Fix uninit-value access of new_ea in ea_buffer (git-fixes).
- jfs: UBSAN: shift-out-of-bounds in dbFindBits (git-fixes).
- jfs: check if leafidx greater than num leaves per dmap tree (git-fixes).
- kABI: bpf: enum bpf_{type_flag,arg_type} kABI workaround (git-fixes).
- kABI: bpf: struct bpf_func_proto kABI workaround (git-fixes).
- kab: fix after net: add more sanity check in virtio_net_hdr_to_skb() (git-fixes).
- kabi fix of KVM: arm64: Preserve PSTATE.SS for the guest while single-step is enabled (git-fixes).
- kabi: fix after KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs (git-fixes).
- kabi: fix after kvm: add guest_state_{enter,exit}_irqoff() (git-fixes).
- kbuild, bpf: Use test-ge check for v1.25-only pahole (bsc#1230414 bsc#1229450).
- kbuild,bpf: Add module-specific pahole flags for distilled base BTF (bsc#1230414 bsc#1229450).
- kbuild,bpf: Switch to using --btf_features for pahole v1.26 and later (bsc#1230414 bsc#1229450).
- kbuild: add test-{ge,gt,le,lt} macros (bsc#1230414 bsc#1229450).
- kbuild: avoid too many execution of scripts/pahole-flags.sh (bsc#1230414 bsc#1229450).
- kbuild: bpf: Tell pahole to DECL_TAG kfuncs (bsc#1230414 bsc#1229450).
- kvm/arm64: rework guest entry logic (git-fixes).
- kvm: Add support for arch compat vm ioctls (git-fixes).
- kvm: add guest_state_{enter,exit}_irqoff() (git-fixes).
- media: videobuf2-core: clear memory related fields in __vb2_plane_dmabuf_put() (stable-fixes).
- module: abort module loading when sysfs setup suffer errors (git-fixes).
- nbd: fix race between timeout and normal completion (bsc#1230918).
- net/sched: taprio: Limit TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME to INT_MAX (bsc#1226797)
- net: add more sanity check in virtio_net_hdr_to_skb() (git-fixes).
- net: socket: suppress unused warning (git-fixes).
- net: test for not too small csum_start in virtio_net_hdr_to_skb() (git-fixes).
- net: usb: usbnet: fix name regression (git-fixes).
- netdevsim: use cond_resched() in nsim_dev_trap_report_work() (git-fixes).
- nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes).
- nfsd: call cache_put if xdr_reserve_space returns NULL (git-fixes).
- nfsd: fix delegation_blocked() to block correctly for at least 30 seconds (git-fixes).
- nfsd: fix refcount leak when file is unhashed after being found (git-fixes).
- nfsd: map the EBADMSG to nfserr_io to avoid warning (git-fixes).
- nfsd: remove unneeded EEXIST error check in nfsd_do_file_acquire (git-fixes).
- nfsd: return -EINVAL when namelen is 0 (git-fixes).
- nilfs2: fix kernel bug due to missing clearing of buffer delay flag (git-fixes).
- nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error (git-fixes).
- ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() (git-fixes).
- ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition (stable-fixes).
- nvme-multipath: system fails to create generic nvme device (git-fixes).
- nvme-pci: qdepth 1 quirk (git-fixes).
- nvmet-auth: assign dh_key to NULL after kfree_sensitive (git-fixes).
- ocfs2: fix the la space leak when unmounting an ocfs2 volume (git-fixes).
- ocfs2: fix uninit-value in ocfs2_get_block() (git-fixes).
- ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (git-fixes).
- parport: Proper fix for array out-of-bounds access (git-fixes).
- platform/surface: aggregator_registry: Add support for Surface Laptop Go 3 (stable-fixes).
- platform/x86: touchscreen_dmi: add nanote-next quirk (stable-fixes).
- power: reset: brcmstb: Do not go into infinite loop if reset fails (stable-fixes).
- s390/sclp_vt220: Convert newlines to CRLF instead of LFCR (git-fixes bsc#1232632).
- scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes).
- scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes).
- scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes).
- scsi: core: Handle devices which return an unusually large VPD page count (git-fixes).
- scsi: core: alua: I/O errors for ALUA state transitions (git-fixes).
- scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() (git-fixes).
- scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes).
- scsi: libsas: Fix exp-attached device scan after probe failure scanned in again after probe failed (git-fixes).
- scsi: libsas: Fix the failure of adding phy with zero-address to port (git-fixes).
- scsi: lpfc: Add ELS_RSP cmd to the list of WQEs to flush in lpfc_els_flush_cmd() (bsc#1232757).
- scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance (bsc#1232757).
- scsi: lpfc: Fix kref imbalance on fabric ndlps from dev_loss_tmo handler (bsc#1232757).
- scsi: lpfc: Remove trailing space after \n newline (bsc#1232757).
- scsi: lpfc: Restrict support for 32 byte CDBs to specific HBAs (git-fixes).
- scsi: lpfc: Revise TRACE_EVENT log flag severities from KERN_ERR to KERN_WARNING (bsc#1232757).
- scsi: lpfc: Support loopback tests with VMID enabled (bsc#1232757).
- scsi: lpfc: Update lpfc version to 14.4.0.5 (bsc#1232757).
- scsi: lpfc: Update phba link state conditional before sending CMF_SYNC_WQE (bsc#1232757).
- scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes).
- scsi: mac_scsi: Refactor polling loop (git-fixes).
- scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes).
- scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
- scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes).
- scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
- scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes).
- scsi: smartpqi: correct stream detection (git-fixes).
- scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git-fixes).
- scsi: spi: Fix sshdr use (git-fixes).
- scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes).
- selftests/bpf: Add a test case to write mtu result into .rodata (git-fixes).
- selftests/bpf: Add a test case to write strtol result into .rodata (git-fixes).
- selftests/bpf: Fix ARG_PTR_TO_LONG {half-,}uninitialized test (git-fixes).
- selftests/bpf: Rename ARG_PTR_TO_LONG test description (git-fixes).
- selftests/bpf: test for malformed BPF_CORE_TYPE_ID_LOCAL relocation (git-fixes).
- spi: bcm63xx: Enable module autoloading (stable-fixes).
- spi: bcm63xx: Fix module autoloading (git-fixes).
- spi: lpspi: Silence error message upon deferred probe (stable-fixes).
- spi: lpspi: Simplify some error message (git-fixes).
- spi: lpspi: release requested DMA channels (stable-fixes).
- spi: ppc4xx: Avoid returning 0 when failed to parse and map IRQ (git-fixes).
- spi: ppc4xx: handle irq_of_parse_and_map() errors (git-fixes).
- spi: s3c64xx: fix timeout counters in flush_fifo (git-fixes).
- spi: spi-fsl-lpspi: Undo runtime PM changes at driver exit time (git-fixes).
- spi: spi-imx: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes).
- spi: spidev: Add missing spi_device_id for jg10309-01 (git-fixes).
- static_call: Do not make __static_call_return0 static (git-fixes).
- tracing/hwlat: Fix a race during cpuhp processing (git-fixes).
- tracing/uprobes: Use trace_event_buffer_reserve() helper (git-fixes).
- tracing: Consider the NULL character when validating the event length (git-fixes).
- uprobe: avoid out-of-bounds memory access of fetching args (git-fixes).
- uprobes: encapsulate preparation of uprobe args buffer (git-fixes).
- usb: chipidea: udc: enable suspend interrupt after usb reset (stable-fixes).
- usb: dwc2: Adjust the timing of USB Driver Interrupt Registration in the Crashkernel Scenario (stable-fixes).
- usb: dwc3: core: Stop processing of pending events if controller is halted (git-fixes).
- usb: gadget: core: force synchronous registration (git-fixes).
- usb: storage: ignore bogus device raised by JieLi BR21 USB sound chip (stable-fixes).
- usb: typec: altmode should keep reference to parent (git-fixes).
- usb: xhci: Fix problem with xhci resume from suspend (stable-fixes).
- usb: yurex: Fix inconsistent locking bug in yurex_read() (git-fixes).
- usb: yurex: Replace snprintf() with the safer scnprintf() variant (stable-fixes).
- usbnet: ipheth: fix carrier detection in modes 1 and 4 (stable-fixes).
- vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() (git-fixes).
- vhost_vdpa: assign irq bypass producer token correctly (git-fixes).
- virtio-net: synchronize probe with ndo_set_features (git-fixes).
- virtio_console: fix misc probe bugs (git-fixes).
- virtio_net: fixing XDP for fully checksummed packets handling (git-fixes).
- vmxnet3: add command to allow disabling of offloads (bsc#1226498).
- vmxnet3: add latency measurement support in vmxnet3 (bsc#1226498).
- vmxnet3: prepare for version 9 changes (bsc#1226498).
- vmxnet3: update to version 9 (bsc#1226498).
- vsock/virtio: fix packet delivery to tap device (git-fixes).
- wifi: ath11k: fix array out-of-bound access in SoC stats (stable-fixes).
- wifi: ath9k: Remove error checks when creating debugfs entries (git-fixes).
- wifi: ath9k: fix parameter check in ath9k_init_debug() (stable-fixes).
- wifi: ath9k: fix possible integer overflow in ath9k_get_et_stats() (stable-fixes).
- wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit (stable-fixes).
- wifi: iwlwifi: clear trans-&gt;state earlier upon error (stable-fixes).
- wifi: iwlwifi: lower message level for FW buffer destination (stable-fixes).
- wifi: iwlwifi: mvm: fix iwl_mvm_scan_fits() calculation (stable-fixes).
- wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() (stable-fixes).
- wifi: rtw88: select WANT_DEV_COREDUMP (stable-fixes).
- x86/bugs: Do not use UNTRAIN_RET with IBPB on entry (git-fixes).
- x86/bugs: Skip RSB fill at VMEXIT (git-fixes).
- x86/cpufeatures: Add a IBPB_NO_RET BUG flag (git-fixes).
- x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET (git-fixes).
- x86/entry: Have entry_ibpb() invalidate return predictions (git-fixes).
- x86/hyperv: Set X86_FEATURE_TSC_KNOWN_FREQ when Hyper-V provides frequency (git-fixes).
- x86/kaslr: Expose and use the end of the physical memory address space (bsc#1230405).
- xfrm: set dst dev to blackhole_netdev instead of loopback_dev in ifdown (bsc#1216813).
- xhci: Fix incorrect stream context type macro (git-fixes).
- xhci: Mitigate failed set dequeue pointer commands (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-13"/>
	<updated date="2024-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204171">SUSE bug 1204171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205796">SUSE bug 1205796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206188">SUSE bug 1206188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206344">SUSE bug 1206344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209290">SUSE bug 1209290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210449">SUSE bug 1210449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210627">SUSE bug 1210627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213034">SUSE bug 1213034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216813">SUSE bug 1216813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218562">SUSE bug 1218562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223384">SUSE bug 1223384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223524">SUSE bug 1223524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223824">SUSE bug 1223824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225189">SUSE bug 1225189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225336">SUSE bug 1225336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225611">SUSE bug 1225611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225762">SUSE bug 1225762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226498">SUSE bug 1226498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226797">SUSE bug 1226797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227437">SUSE bug 1227437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227885">SUSE bug 1227885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228119">SUSE bug 1228119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228269">SUSE bug 1228269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228709">SUSE bug 1228709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228743">SUSE bug 1228743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229005">SUSE bug 1229005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229019">SUSE bug 1229019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229450">SUSE bug 1229450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229454">SUSE bug 1229454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229456">SUSE bug 1229456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229556">SUSE bug 1229556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229769">SUSE bug 1229769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229837">SUSE bug 1229837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230179">SUSE bug 1230179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230405">SUSE bug 1230405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230414">SUSE bug 1230414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230429">SUSE bug 1230429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230456">SUSE bug 1230456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230600">SUSE bug 1230600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230620">SUSE bug 1230620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230715">SUSE bug 1230715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230722">SUSE bug 1230722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230773">SUSE bug 1230773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230801">SUSE bug 1230801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230903">SUSE bug 1230903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230918">SUSE bug 1230918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231016">SUSE bug 1231016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231072">SUSE bug 1231072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231073">SUSE bug 1231073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231094">SUSE bug 1231094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231096">SUSE bug 1231096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231105">SUSE bug 1231105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231114">SUSE bug 1231114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231148">SUSE bug 1231148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231179">SUSE bug 1231179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231191">SUSE bug 1231191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231193">SUSE bug 1231193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231195">SUSE bug 1231195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231197">SUSE bug 1231197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231200">SUSE bug 1231200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231203">SUSE bug 1231203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231293">SUSE bug 1231293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231344">SUSE bug 1231344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231375">SUSE bug 1231375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231383">SUSE bug 1231383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231439">SUSE bug 1231439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231442">SUSE bug 1231442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231496">SUSE bug 1231496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231502">SUSE bug 1231502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231539">SUSE bug 1231539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231540">SUSE bug 1231540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231578">SUSE bug 1231578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231673">SUSE bug 1231673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231857">SUSE bug 1231857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231861">SUSE bug 1231861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231872">SUSE bug 1231872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231883">SUSE bug 1231883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231885">SUSE bug 1231885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231887">SUSE bug 1231887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231888">SUSE bug 1231888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231889">SUSE bug 1231889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231890">SUSE bug 1231890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231892">SUSE bug 1231892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231893">SUSE bug 1231893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231895">SUSE bug 1231895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231896">SUSE bug 1231896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231897">SUSE bug 1231897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231902">SUSE bug 1231902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231903">SUSE bug 1231903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231907">SUSE bug 1231907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231914">SUSE bug 1231914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231929">SUSE bug 1231929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231935">SUSE bug 1231935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231936">SUSE bug 1231936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231937">SUSE bug 1231937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231938">SUSE bug 1231938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231939">SUSE bug 1231939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231940">SUSE bug 1231940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231941">SUSE bug 1231941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231942">SUSE bug 1231942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231944">SUSE bug 1231944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231950">SUSE bug 1231950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231954">SUSE bug 1231954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231958">SUSE bug 1231958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231960">SUSE bug 1231960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231961">SUSE bug 1231961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231962">SUSE bug 1231962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231965">SUSE bug 1231965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231967">SUSE bug 1231967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231968">SUSE bug 1231968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231972">SUSE bug 1231972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231973">SUSE bug 1231973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231976">SUSE bug 1231976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231979">SUSE bug 1231979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231987">SUSE bug 1231987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231988">SUSE bug 1231988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231990">SUSE bug 1231990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231992">SUSE bug 1231992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231995">SUSE bug 1231995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231996">SUSE bug 1231996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231997">SUSE bug 1231997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231998">SUSE bug 1231998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232001">SUSE bug 1232001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232004">SUSE bug 1232004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232005">SUSE bug 1232005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232006">SUSE bug 1232006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232007">SUSE bug 1232007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232025">SUSE bug 1232025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232026">SUSE bug 1232026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232033">SUSE bug 1232033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232034">SUSE bug 1232034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232035">SUSE bug 1232035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232036">SUSE bug 1232036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232037">SUSE bug 1232037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232038">SUSE bug 1232038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232039">SUSE bug 1232039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232043">SUSE bug 1232043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232049">SUSE bug 1232049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232067">SUSE bug 1232067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232069">SUSE bug 1232069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232070">SUSE bug 1232070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232071">SUSE bug 1232071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232075">SUSE bug 1232075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232083">SUSE bug 1232083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232084">SUSE bug 1232084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232085">SUSE bug 1232085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232089">SUSE bug 1232089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232097">SUSE bug 1232097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232104">SUSE bug 1232104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232105">SUSE bug 1232105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232108">SUSE bug 1232108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232114">SUSE bug 1232114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232116">SUSE bug 1232116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232119">SUSE bug 1232119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232120">SUSE bug 1232120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232123">SUSE bug 1232123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232124">SUSE bug 1232124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232133">SUSE bug 1232133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232135">SUSE bug 1232135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232136">SUSE bug 1232136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232140">SUSE bug 1232140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232145">SUSE bug 1232145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232149">SUSE bug 1232149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232150">SUSE bug 1232150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232151">SUSE bug 1232151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232154">SUSE bug 1232154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232155">SUSE bug 1232155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232160">SUSE bug 1232160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232163">SUSE bug 1232163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232164">SUSE bug 1232164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232170">SUSE bug 1232170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232172">SUSE bug 1232172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232174">SUSE bug 1232174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232175">SUSE bug 1232175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232191">SUSE bug 1232191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232196">SUSE bug 1232196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232199">SUSE bug 1232199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232200">SUSE bug 1232200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232201">SUSE bug 1232201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232217">SUSE bug 1232217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232220">SUSE bug 1232220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232221">SUSE bug 1232221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232229">SUSE bug 1232229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232233">SUSE bug 1232233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232237">SUSE bug 1232237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232251">SUSE bug 1232251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232253">SUSE bug 1232253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232259">SUSE bug 1232259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232260">SUSE bug 1232260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232262">SUSE bug 1232262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232263">SUSE bug 1232263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232282">SUSE bug 1232282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232285">SUSE bug 1232285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232286">SUSE bug 1232286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232304">SUSE bug 1232304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232305">SUSE bug 1232305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232307">SUSE bug 1232307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232309">SUSE bug 1232309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232310">SUSE bug 1232310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232313">SUSE bug 1232313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232314">SUSE bug 1232314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232316">SUSE bug 1232316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232329">SUSE bug 1232329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232332">SUSE bug 1232332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232335">SUSE bug 1232335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232337">SUSE bug 1232337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232342">SUSE bug 1232342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232345">SUSE bug 1232345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232352">SUSE bug 1232352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232354">SUSE bug 1232354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232355">SUSE bug 1232355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232358">SUSE bug 1232358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232361">SUSE bug 1232361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232366">SUSE bug 1232366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232367">SUSE bug 1232367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232368">SUSE bug 1232368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232369">SUSE bug 1232369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232374">SUSE bug 1232374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232381">SUSE bug 1232381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232383">SUSE bug 1232383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232392">SUSE bug 1232392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232395">SUSE bug 1232395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232418">SUSE bug 1232418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232424">SUSE bug 1232424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232432">SUSE bug 1232432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232435">SUSE bug 1232435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232442">SUSE bug 1232442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232446">SUSE bug 1232446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232501">SUSE bug 1232501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232519">SUSE bug 1232519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232630">SUSE bug 1232630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232631">SUSE bug 1232631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232632">SUSE bug 1232632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232757">SUSE bug 1232757</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47416/">CVE-2021-47416 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47416">CVE-2021-47416 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47534/">CVE-2021-47534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47534">CVE-2021-47534 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3435/">CVE-2022-3435 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3435">CVE-2022-3435 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-45934/">CVE-2022-45934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45934">CVE-2022-45934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48664/">CVE-2022-48664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48664">CVE-2022-48664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48879/">CVE-2022-48879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48879">CVE-2022-48879 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48946/">CVE-2022-48946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48946">CVE-2022-48946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48947/">CVE-2022-48947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48947">CVE-2022-48947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48948/">CVE-2022-48948 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48948">CVE-2022-48948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48949/">CVE-2022-48949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48949">CVE-2022-48949 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48951/">CVE-2022-48951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48951">CVE-2022-48951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48953/">CVE-2022-48953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48953">CVE-2022-48953 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48954/">CVE-2022-48954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48954">CVE-2022-48954 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48955/">CVE-2022-48955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48955">CVE-2022-48955 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48956/">CVE-2022-48956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48956">CVE-2022-48956 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48957/">CVE-2022-48957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48957">CVE-2022-48957 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48958/">CVE-2022-48958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48958">CVE-2022-48958 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48959/">CVE-2022-48959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48959">CVE-2022-48959 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48960/">CVE-2022-48960 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48960">CVE-2022-48960 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48961/">CVE-2022-48961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48961">CVE-2022-48961 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48962/">CVE-2022-48962 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48962">CVE-2022-48962 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48966/">CVE-2022-48966 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48966">CVE-2022-48966 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48967/">CVE-2022-48967 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48967">CVE-2022-48967 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48968/">CVE-2022-48968 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48968">CVE-2022-48968 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48969/">CVE-2022-48969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48969">CVE-2022-48969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48970/">CVE-2022-48970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48970">CVE-2022-48970 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48971/">CVE-2022-48971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48971">CVE-2022-48971 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48972/">CVE-2022-48972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48972">CVE-2022-48972 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48973/">CVE-2022-48973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48973">CVE-2022-48973 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48975/">CVE-2022-48975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48975">CVE-2022-48975 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48977/">CVE-2022-48977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48977">CVE-2022-48977 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48978/">CVE-2022-48978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48978">CVE-2022-48978 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48980/">CVE-2022-48980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48980">CVE-2022-48980 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48981/">CVE-2022-48981 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48981">CVE-2022-48981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48985/">CVE-2022-48985 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48985">CVE-2022-48985 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48987/">CVE-2022-48987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48987">CVE-2022-48987 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48988/">CVE-2022-48988 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48988">CVE-2022-48988 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48991/">CVE-2022-48991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48991">CVE-2022-48991 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48992/">CVE-2022-48992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48992">CVE-2022-48992 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48994/">CVE-2022-48994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48994">CVE-2022-48994 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48995/">CVE-2022-48995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48995">CVE-2022-48995 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" cvss4="1/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48997/">CVE-2022-48997 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48997">CVE-2022-48997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48999/">CVE-2022-48999 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48999">CVE-2022-48999 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49000/">CVE-2022-49000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49000">CVE-2022-49000 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49002/">CVE-2022-49002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49002">CVE-2022-49002 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49003/">CVE-2022-49003 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49003">CVE-2022-49003 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49005/">CVE-2022-49005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49005">CVE-2022-49005 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49006/">CVE-2022-49006 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49006">CVE-2022-49006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49007/">CVE-2022-49007 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49007">CVE-2022-49007 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49010/">CVE-2022-49010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49010">CVE-2022-49010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49011/">CVE-2022-49011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49011">CVE-2022-49011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49012/">CVE-2022-49012 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49012">CVE-2022-49012 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49014/">CVE-2022-49014 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49014">CVE-2022-49014 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49015/">CVE-2022-49015 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49015">CVE-2022-49015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49016/">CVE-2022-49016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49016">CVE-2022-49016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49017/">CVE-2022-49017 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49017">CVE-2022-49017 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49019/">CVE-2022-49019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49019">CVE-2022-49019 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49020/">CVE-2022-49020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49020">CVE-2022-49020 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49021/">CVE-2022-49021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49021">CVE-2022-49021 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49022/">CVE-2022-49022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49022">CVE-2022-49022 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49023/">CVE-2022-49023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49023">CVE-2022-49023 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49024/">CVE-2022-49024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49024">CVE-2022-49024 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49025/">CVE-2022-49025 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49025">CVE-2022-49025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49026/">CVE-2022-49026 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49026">CVE-2022-49026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49027/">CVE-2022-49027 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49027">CVE-2022-49027 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49028/">CVE-2022-49028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49028">CVE-2022-49028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49029/">CVE-2022-49029 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49029">CVE-2022-49029 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49031/">CVE-2022-49031 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49031">CVE-2022-49031 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49032/">CVE-2022-49032 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49032">CVE-2022-49032 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2166/">CVE-2023-2166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2166">CVE-2023-2166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28327/">CVE-2023-28327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28327">CVE-2023-28327 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52766/">CVE-2023-52766 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52766">CVE-2023-52766 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52800/">CVE-2023-52800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52800">CVE-2023-52800 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52881/">CVE-2023-52881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52881">CVE-2023-52881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52919/">CVE-2023-52919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52919">CVE-2023-52919 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6270/">CVE-2023-6270 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27043/">CVE-2024-27043 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27043">CVE-2024-27043 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36244/">CVE-2024-36244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36244">CVE-2024-36244 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36957/">CVE-2024-36957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36957">CVE-2024-36957 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39476/">CVE-2024-39476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39476">CVE-2024-39476 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40965/">CVE-2024-40965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40965">CVE-2024-40965 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42145/">CVE-2024-42145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42145">CVE-2024-42145 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42226/">CVE-2024-42226 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42226">CVE-2024-42226 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42253/">CVE-2024-42253 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42253">CVE-2024-42253 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44931/">CVE-2024-44931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44931">CVE-2024-44931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44947/">CVE-2024-44947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44947">CVE-2024-44947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44958/">CVE-2024-44958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44958">CVE-2024-44958 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45016/">CVE-2024-45016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45016">CVE-2024-45016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45025/">CVE-2024-45025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45025">CVE-2024-45025 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-46716/">CVE-2024-46716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46716">CVE-2024-46716 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46719/">CVE-2024-46719 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46719">CVE-2024-46719 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46754/">CVE-2024-46754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46754">CVE-2024-46754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46777/">CVE-2024-46777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46777">CVE-2024-46777 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46809/">CVE-2024-46809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46809">CVE-2024-46809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46811/">CVE-2024-46811 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46811">CVE-2024-46811 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46813/">CVE-2024-46813 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46813">CVE-2024-46813 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46814/">CVE-2024-46814 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46814">CVE-2024-46814 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46815/">CVE-2024-46815 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46815">CVE-2024-46815 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46816/">CVE-2024-46816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46816">CVE-2024-46816 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46817/">CVE-2024-46817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46817">CVE-2024-46817 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46818/">CVE-2024-46818 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46818">CVE-2024-46818 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46828/">CVE-2024-46828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46828">CVE-2024-46828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46834/">CVE-2024-46834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46834">CVE-2024-46834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46840/">CVE-2024-46840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46840">CVE-2024-46840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46841/">CVE-2024-46841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46841">CVE-2024-46841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46848/">CVE-2024-46848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46848">CVE-2024-46848 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46849/">CVE-2024-46849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46849">CVE-2024-46849 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47660/">CVE-2024-47660 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47660">CVE-2024-47660 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47661/">CVE-2024-47661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47661">CVE-2024-47661 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47664/">CVE-2024-47664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47664">CVE-2024-47664 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47668/">CVE-2024-47668 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47668">CVE-2024-47668 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-47672/">CVE-2024-47672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47672">CVE-2024-47672 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-47673/">CVE-2024-47673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47673">CVE-2024-47673 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47674/">CVE-2024-47674 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47674">CVE-2024-47674 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47684/">CVE-2024-47684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47684">CVE-2024-47684 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47685/">CVE-2024-47685 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47685">CVE-2024-47685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47692/">CVE-2024-47692 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47692">CVE-2024-47692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47704/">CVE-2024-47704 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47704">CVE-2024-47704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47705/">CVE-2024-47705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47705">CVE-2024-47705 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47706/">CVE-2024-47706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47706">CVE-2024-47706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47707/">CVE-2024-47707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47707">CVE-2024-47707 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47710/">CVE-2024-47710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47710">CVE-2024-47710 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47720/">CVE-2024-47720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47720">CVE-2024-47720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47727/">CVE-2024-47727 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47727">CVE-2024-47727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47730/">CVE-2024-47730 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47730">CVE-2024-47730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47738/">CVE-2024-47738 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47738">CVE-2024-47738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47739/">CVE-2024-47739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47739">CVE-2024-47739 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47745/">CVE-2024-47745 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47745">CVE-2024-47745 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47747/">CVE-2024-47747 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47747">CVE-2024-47747 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47748/">CVE-2024-47748 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47748">CVE-2024-47748 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49858/">CVE-2024-49858 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49858">CVE-2024-49858 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49860/">CVE-2024-49860 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49860">CVE-2024-49860 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49866/">CVE-2024-49866 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49866">CVE-2024-49866 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49867/">CVE-2024-49867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49867">CVE-2024-49867 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49881/">CVE-2024-49881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49881">CVE-2024-49881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49882/">CVE-2024-49882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49882">CVE-2024-49882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49883/">CVE-2024-49883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49883">CVE-2024-49883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49886/">CVE-2024-49886 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49886">CVE-2024-49886 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49890/">CVE-2024-49890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49890">CVE-2024-49890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49892/">CVE-2024-49892 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49892">CVE-2024-49892 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49894/">CVE-2024-49894 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49894">CVE-2024-49894 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49895/">CVE-2024-49895 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49895">CVE-2024-49895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49896/">CVE-2024-49896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49896">CVE-2024-49896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49897/">CVE-2024-49897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49897">CVE-2024-49897 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49899/">CVE-2024-49899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49899">CVE-2024-49899 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49901/">CVE-2024-49901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49901">CVE-2024-49901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49906/">CVE-2024-49906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49906">CVE-2024-49906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49908/">CVE-2024-49908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49908">CVE-2024-49908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49909/">CVE-2024-49909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49909">CVE-2024-49909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49911/">CVE-2024-49911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49911">CVE-2024-49911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49912/">CVE-2024-49912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49912">CVE-2024-49912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49913/">CVE-2024-49913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49913">CVE-2024-49913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49914/">CVE-2024-49914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49914">CVE-2024-49914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49917/">CVE-2024-49917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49917">CVE-2024-49917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49918/">CVE-2024-49918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49918">CVE-2024-49918 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49919/">CVE-2024-49919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49919">CVE-2024-49919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49920/">CVE-2024-49920 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49920">CVE-2024-49920 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49922/">CVE-2024-49922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49922">CVE-2024-49922 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49923/">CVE-2024-49923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49923">CVE-2024-49923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49929/">CVE-2024-49929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49929">CVE-2024-49929 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49930/">CVE-2024-49930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49930">CVE-2024-49930 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49933/">CVE-2024-49933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49933">CVE-2024-49933 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49936/">CVE-2024-49936 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49936">CVE-2024-49936 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49939/">CVE-2024-49939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49939">CVE-2024-49939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49946/">CVE-2024-49946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49946">CVE-2024-49946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49949/">CVE-2024-49949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49949">CVE-2024-49949 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49954/">CVE-2024-49954 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49954">CVE-2024-49954 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49955/">CVE-2024-49955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49955">CVE-2024-49955 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49958/">CVE-2024-49958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49958">CVE-2024-49958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49959/">CVE-2024-49959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49959">CVE-2024-49959 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49960/">CVE-2024-49960 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49960">CVE-2024-49960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49962/">CVE-2024-49962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49962">CVE-2024-49962 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49967/">CVE-2024-49967 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49967">CVE-2024-49967 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49969/">CVE-2024-49969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49969">CVE-2024-49969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49973/">CVE-2024-49973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49973">CVE-2024-49973 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49974/">CVE-2024-49974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49974">CVE-2024-49974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49975/">CVE-2024-49975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49975">CVE-2024-49975 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49982/">CVE-2024-49982 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49982">CVE-2024-49982 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49991/">CVE-2024-49991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49991">CVE-2024-49991 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49993/">CVE-2024-49993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49993">CVE-2024-49993 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49995/">CVE-2024-49995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49995">CVE-2024-49995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49996/">CVE-2024-49996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49996">CVE-2024-49996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50000/">CVE-2024-50000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50000">CVE-2024-50000 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50001/">CVE-2024-50001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50001">CVE-2024-50001 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50002/">CVE-2024-50002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50002">CVE-2024-50002 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50006/">CVE-2024-50006 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50006">CVE-2024-50006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50014/">CVE-2024-50014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50014">CVE-2024-50014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50019/">CVE-2024-50019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50019">CVE-2024-50019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50024/">CVE-2024-50024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50024">CVE-2024-50024 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50028/">CVE-2024-50028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50028">CVE-2024-50028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50033/">CVE-2024-50033 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50033">CVE-2024-50033 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50035/">CVE-2024-50035 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50035">CVE-2024-50035 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50041/">CVE-2024-50041 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50041">CVE-2024-50041 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50045/">CVE-2024-50045 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50045">CVE-2024-50045 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50046/">CVE-2024-50046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50046">CVE-2024-50046 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50047/">CVE-2024-50047 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50047">CVE-2024-50047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50048/">CVE-2024-50048 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50048">CVE-2024-50048 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50049/">CVE-2024-50049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50049">CVE-2024-50049 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50055/">CVE-2024-50055 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50055">CVE-2024-50055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50058/">CVE-2024-50058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50058">CVE-2024-50058 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50059/">CVE-2024-50059 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50059">CVE-2024-50059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50061/">CVE-2024-50061 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50061">CVE-2024-50061 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50063/">CVE-2024-50063 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50063">CVE-2024-50063 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50081/">CVE-2024-50081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50081">CVE-2024-50081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952003" comment="cluster-md-kmp-azure-5.14.21-150500.33.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952004" comment="dlm-kmp-azure-5.14.21-150500.33.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952005" comment="gfs2-kmp-azure-5.14.21-150500.33.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952006" comment="kernel-azure-5.14.21-150500.33.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952007" comment="kernel-azure-devel-5.14.21-150500.33.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952008" comment="kernel-azure-extra-5.14.21-150500.33.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952009" comment="kernel-azure-livepatch-devel-5.14.21-150500.33.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952010" comment="kernel-azure-optional-5.14.21-150500.33.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952011" comment="kernel-azure-vdso-5.14.21-150500.33.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952012" comment="kernel-devel-azure-5.14.21-150500.33.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952013" comment="kernel-source-azure-5.14.21-150500.33.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952014" comment="kernel-syms-azure-5.14.21-150500.33.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952015" comment="kselftests-kmp-azure-5.14.21-150500.33.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952016" comment="ocfs2-kmp-azure-5.14.21-150500.33.72.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952017" comment="reiserfs-kmp-azure-5.14.21-150500.33.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5086" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1054914" ref_url="https://bugzilla.suse.com/1054914" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1204171" ref_url="https://bugzilla.suse.com/1204171" source="BUGZILLA"/>
		<reference ref_id="1205796" ref_url="https://bugzilla.suse.com/1205796" source="BUGZILLA"/>
		<reference ref_id="1206188" ref_url="https://bugzilla.suse.com/1206188" source="BUGZILLA"/>
		<reference ref_id="1206344" ref_url="https://bugzilla.suse.com/1206344" source="BUGZILLA"/>
		<reference ref_id="1209290" ref_url="https://bugzilla.suse.com/1209290" source="BUGZILLA"/>
		<reference ref_id="1210449" ref_url="https://bugzilla.suse.com/1210449" source="BUGZILLA"/>
		<reference ref_id="1210627" ref_url="https://bugzilla.suse.com/1210627" source="BUGZILLA"/>
		<reference ref_id="1213034" ref_url="https://bugzilla.suse.com/1213034" source="BUGZILLA"/>
		<reference ref_id="1216813" ref_url="https://bugzilla.suse.com/1216813" source="BUGZILLA"/>
		<reference ref_id="1218562" ref_url="https://bugzilla.suse.com/1218562" source="BUGZILLA"/>
		<reference ref_id="1223384" ref_url="https://bugzilla.suse.com/1223384" source="BUGZILLA"/>
		<reference ref_id="1223524" ref_url="https://bugzilla.suse.com/1223524" source="BUGZILLA"/>
		<reference ref_id="1223824" ref_url="https://bugzilla.suse.com/1223824" source="BUGZILLA"/>
		<reference ref_id="1225189" ref_url="https://bugzilla.suse.com/1225189" source="BUGZILLA"/>
		<reference ref_id="1225336" ref_url="https://bugzilla.suse.com/1225336" source="BUGZILLA"/>
		<reference ref_id="1225611" ref_url="https://bugzilla.suse.com/1225611" source="BUGZILLA"/>
		<reference ref_id="1225762" ref_url="https://bugzilla.suse.com/1225762" source="BUGZILLA"/>
		<reference ref_id="1226498" ref_url="https://bugzilla.suse.com/1226498" source="BUGZILLA"/>
		<reference ref_id="1226631" ref_url="https://bugzilla.suse.com/1226631" source="BUGZILLA"/>
		<reference ref_id="1226797" ref_url="https://bugzilla.suse.com/1226797" source="BUGZILLA"/>
		<reference ref_id="1227437" ref_url="https://bugzilla.suse.com/1227437" source="BUGZILLA"/>
		<reference ref_id="1227885" ref_url="https://bugzilla.suse.com/1227885" source="BUGZILLA"/>
		<reference ref_id="1228119" ref_url="https://bugzilla.suse.com/1228119" source="BUGZILLA"/>
		<reference ref_id="1228269" ref_url="https://bugzilla.suse.com/1228269" source="BUGZILLA"/>
		<reference ref_id="1228709" ref_url="https://bugzilla.suse.com/1228709" source="BUGZILLA"/>
		<reference ref_id="1228743" ref_url="https://bugzilla.suse.com/1228743" source="BUGZILLA"/>
		<reference ref_id="1228747" ref_url="https://bugzilla.suse.com/1228747" source="BUGZILLA"/>
		<reference ref_id="1229005" ref_url="https://bugzilla.suse.com/1229005" source="BUGZILLA"/>
		<reference ref_id="1229019" ref_url="https://bugzilla.suse.com/1229019" source="BUGZILLA"/>
		<reference ref_id="1229450" ref_url="https://bugzilla.suse.com/1229450" source="BUGZILLA"/>
		<reference ref_id="1229454" ref_url="https://bugzilla.suse.com/1229454" source="BUGZILLA"/>
		<reference ref_id="1229456" ref_url="https://bugzilla.suse.com/1229456" source="BUGZILLA"/>
		<reference ref_id="1229556" ref_url="https://bugzilla.suse.com/1229556" source="BUGZILLA"/>
		<reference ref_id="1229769" ref_url="https://bugzilla.suse.com/1229769" source="BUGZILLA"/>
		<reference ref_id="1229837" ref_url="https://bugzilla.suse.com/1229837" source="BUGZILLA"/>
		<reference ref_id="1229891" ref_url="https://bugzilla.suse.com/1229891" source="BUGZILLA"/>
		<reference ref_id="1230055" ref_url="https://bugzilla.suse.com/1230055" source="BUGZILLA"/>
		<reference ref_id="1230179" ref_url="https://bugzilla.suse.com/1230179" source="BUGZILLA"/>
		<reference ref_id="1230289" ref_url="https://bugzilla.suse.com/1230289" source="BUGZILLA"/>
		<reference ref_id="1230405" ref_url="https://bugzilla.suse.com/1230405" source="BUGZILLA"/>
		<reference ref_id="1230414" ref_url="https://bugzilla.suse.com/1230414" source="BUGZILLA"/>
		<reference ref_id="1230429" ref_url="https://bugzilla.suse.com/1230429" source="BUGZILLA"/>
		<reference ref_id="1230456" ref_url="https://bugzilla.suse.com/1230456" source="BUGZILLA"/>
		<reference ref_id="1230550" ref_url="https://bugzilla.suse.com/1230550" source="BUGZILLA"/>
		<reference ref_id="1230600" ref_url="https://bugzilla.suse.com/1230600" source="BUGZILLA"/>
		<reference ref_id="1230620" ref_url="https://bugzilla.suse.com/1230620" source="BUGZILLA"/>
		<reference ref_id="1230715" ref_url="https://bugzilla.suse.com/1230715" source="BUGZILLA"/>
		<reference ref_id="1230722" ref_url="https://bugzilla.suse.com/1230722" source="BUGZILLA"/>
		<reference ref_id="1230763" ref_url="https://bugzilla.suse.com/1230763" source="BUGZILLA"/>
		<reference ref_id="1230773" ref_url="https://bugzilla.suse.com/1230773" source="BUGZILLA"/>
		<reference ref_id="1230774" ref_url="https://bugzilla.suse.com/1230774" source="BUGZILLA"/>
		<reference ref_id="1230801" ref_url="https://bugzilla.suse.com/1230801" source="BUGZILLA"/>
		<reference ref_id="1230903" ref_url="https://bugzilla.suse.com/1230903" source="BUGZILLA"/>
		<reference ref_id="1230918" ref_url="https://bugzilla.suse.com/1230918" source="BUGZILLA"/>
		<reference ref_id="1231016" ref_url="https://bugzilla.suse.com/1231016" source="BUGZILLA"/>
		<reference ref_id="1231072" ref_url="https://bugzilla.suse.com/1231072" source="BUGZILLA"/>
		<reference ref_id="1231073" ref_url="https://bugzilla.suse.com/1231073" source="BUGZILLA"/>
		<reference ref_id="1231084" ref_url="https://bugzilla.suse.com/1231084" source="BUGZILLA"/>
		<reference ref_id="1231085" ref_url="https://bugzilla.suse.com/1231085" source="BUGZILLA"/>
		<reference ref_id="1231087" ref_url="https://bugzilla.suse.com/1231087" source="BUGZILLA"/>
		<reference ref_id="1231094" ref_url="https://bugzilla.suse.com/1231094" source="BUGZILLA"/>
		<reference ref_id="1231096" ref_url="https://bugzilla.suse.com/1231096" source="BUGZILLA"/>
		<reference ref_id="1231105" ref_url="https://bugzilla.suse.com/1231105" source="BUGZILLA"/>
		<reference ref_id="1231114" ref_url="https://bugzilla.suse.com/1231114" source="BUGZILLA"/>
		<reference ref_id="1231115" ref_url="https://bugzilla.suse.com/1231115" source="BUGZILLA"/>
		<reference ref_id="1231148" ref_url="https://bugzilla.suse.com/1231148" source="BUGZILLA"/>
		<reference ref_id="1231179" ref_url="https://bugzilla.suse.com/1231179" source="BUGZILLA"/>
		<reference ref_id="1231191" ref_url="https://bugzilla.suse.com/1231191" source="BUGZILLA"/>
		<reference ref_id="1231193" ref_url="https://bugzilla.suse.com/1231193" source="BUGZILLA"/>
		<reference ref_id="1231195" ref_url="https://bugzilla.suse.com/1231195" source="BUGZILLA"/>
		<reference ref_id="1231197" ref_url="https://bugzilla.suse.com/1231197" source="BUGZILLA"/>
		<reference ref_id="1231200" ref_url="https://bugzilla.suse.com/1231200" source="BUGZILLA"/>
		<reference ref_id="1231203" ref_url="https://bugzilla.suse.com/1231203" source="BUGZILLA"/>
		<reference ref_id="1231277" ref_url="https://bugzilla.suse.com/1231277" source="BUGZILLA"/>
		<reference ref_id="1231293" ref_url="https://bugzilla.suse.com/1231293" source="BUGZILLA"/>
		<reference ref_id="1231327" ref_url="https://bugzilla.suse.com/1231327" source="BUGZILLA"/>
		<reference ref_id="1231344" ref_url="https://bugzilla.suse.com/1231344" source="BUGZILLA"/>
		<reference ref_id="1231375" ref_url="https://bugzilla.suse.com/1231375" source="BUGZILLA"/>
		<reference ref_id="1231383" ref_url="https://bugzilla.suse.com/1231383" source="BUGZILLA"/>
		<reference ref_id="1231439" ref_url="https://bugzilla.suse.com/1231439" source="BUGZILLA"/>
		<reference ref_id="1231442" ref_url="https://bugzilla.suse.com/1231442" source="BUGZILLA"/>
		<reference ref_id="1231496" ref_url="https://bugzilla.suse.com/1231496" source="BUGZILLA"/>
		<reference ref_id="1231502" ref_url="https://bugzilla.suse.com/1231502" source="BUGZILLA"/>
		<reference ref_id="1231539" ref_url="https://bugzilla.suse.com/1231539" source="BUGZILLA"/>
		<reference ref_id="1231540" ref_url="https://bugzilla.suse.com/1231540" source="BUGZILLA"/>
		<reference ref_id="1231578" ref_url="https://bugzilla.suse.com/1231578" source="BUGZILLA"/>
		<reference ref_id="1231673" ref_url="https://bugzilla.suse.com/1231673" source="BUGZILLA"/>
		<reference ref_id="1231857" ref_url="https://bugzilla.suse.com/1231857" source="BUGZILLA"/>
		<reference ref_id="1231861" ref_url="https://bugzilla.suse.com/1231861" source="BUGZILLA"/>
		<reference ref_id="1231872" ref_url="https://bugzilla.suse.com/1231872" source="BUGZILLA"/>
		<reference ref_id="1231883" ref_url="https://bugzilla.suse.com/1231883" source="BUGZILLA"/>
		<reference ref_id="1231885" ref_url="https://bugzilla.suse.com/1231885" source="BUGZILLA"/>
		<reference ref_id="1231887" ref_url="https://bugzilla.suse.com/1231887" source="BUGZILLA"/>
		<reference ref_id="1231888" ref_url="https://bugzilla.suse.com/1231888" source="BUGZILLA"/>
		<reference ref_id="1231889" ref_url="https://bugzilla.suse.com/1231889" source="BUGZILLA"/>
		<reference ref_id="1231890" ref_url="https://bugzilla.suse.com/1231890" source="BUGZILLA"/>
		<reference ref_id="1231892" ref_url="https://bugzilla.suse.com/1231892" source="BUGZILLA"/>
		<reference ref_id="1231893" ref_url="https://bugzilla.suse.com/1231893" source="BUGZILLA"/>
		<reference ref_id="1231895" ref_url="https://bugzilla.suse.com/1231895" source="BUGZILLA"/>
		<reference ref_id="1231896" ref_url="https://bugzilla.suse.com/1231896" source="BUGZILLA"/>
		<reference ref_id="1231897" ref_url="https://bugzilla.suse.com/1231897" source="BUGZILLA"/>
		<reference ref_id="1231902" ref_url="https://bugzilla.suse.com/1231902" source="BUGZILLA"/>
		<reference ref_id="1231903" ref_url="https://bugzilla.suse.com/1231903" source="BUGZILLA"/>
		<reference ref_id="1231907" ref_url="https://bugzilla.suse.com/1231907" source="BUGZILLA"/>
		<reference ref_id="1231914" ref_url="https://bugzilla.suse.com/1231914" source="BUGZILLA"/>
		<reference ref_id="1231929" ref_url="https://bugzilla.suse.com/1231929" source="BUGZILLA"/>
		<reference ref_id="1231935" ref_url="https://bugzilla.suse.com/1231935" source="BUGZILLA"/>
		<reference ref_id="1231936" ref_url="https://bugzilla.suse.com/1231936" source="BUGZILLA"/>
		<reference ref_id="1231937" ref_url="https://bugzilla.suse.com/1231937" source="BUGZILLA"/>
		<reference ref_id="1231938" ref_url="https://bugzilla.suse.com/1231938" source="BUGZILLA"/>
		<reference ref_id="1231939" ref_url="https://bugzilla.suse.com/1231939" source="BUGZILLA"/>
		<reference ref_id="1231940" ref_url="https://bugzilla.suse.com/1231940" source="BUGZILLA"/>
		<reference ref_id="1231941" ref_url="https://bugzilla.suse.com/1231941" source="BUGZILLA"/>
		<reference ref_id="1231942" ref_url="https://bugzilla.suse.com/1231942" source="BUGZILLA"/>
		<reference ref_id="1231944" ref_url="https://bugzilla.suse.com/1231944" source="BUGZILLA"/>
		<reference ref_id="1231950" ref_url="https://bugzilla.suse.com/1231950" source="BUGZILLA"/>
		<reference ref_id="1231954" ref_url="https://bugzilla.suse.com/1231954" source="BUGZILLA"/>
		<reference ref_id="1231958" ref_url="https://bugzilla.suse.com/1231958" source="BUGZILLA"/>
		<reference ref_id="1231960" ref_url="https://bugzilla.suse.com/1231960" source="BUGZILLA"/>
		<reference ref_id="1231961" ref_url="https://bugzilla.suse.com/1231961" source="BUGZILLA"/>
		<reference ref_id="1231962" ref_url="https://bugzilla.suse.com/1231962" source="BUGZILLA"/>
		<reference ref_id="1231965" ref_url="https://bugzilla.suse.com/1231965" source="BUGZILLA"/>
		<reference ref_id="1231967" ref_url="https://bugzilla.suse.com/1231967" source="BUGZILLA"/>
		<reference ref_id="1231968" ref_url="https://bugzilla.suse.com/1231968" source="BUGZILLA"/>
		<reference ref_id="1231972" ref_url="https://bugzilla.suse.com/1231972" source="BUGZILLA"/>
		<reference ref_id="1231973" ref_url="https://bugzilla.suse.com/1231973" source="BUGZILLA"/>
		<reference ref_id="1231976" ref_url="https://bugzilla.suse.com/1231976" source="BUGZILLA"/>
		<reference ref_id="1231979" ref_url="https://bugzilla.suse.com/1231979" source="BUGZILLA"/>
		<reference ref_id="1231987" ref_url="https://bugzilla.suse.com/1231987" source="BUGZILLA"/>
		<reference ref_id="1231988" ref_url="https://bugzilla.suse.com/1231988" source="BUGZILLA"/>
		<reference ref_id="1231990" ref_url="https://bugzilla.suse.com/1231990" source="BUGZILLA"/>
		<reference ref_id="1231991" ref_url="https://bugzilla.suse.com/1231991" source="BUGZILLA"/>
		<reference ref_id="1231992" ref_url="https://bugzilla.suse.com/1231992" source="BUGZILLA"/>
		<reference ref_id="1231995" ref_url="https://bugzilla.suse.com/1231995" source="BUGZILLA"/>
		<reference ref_id="1231996" ref_url="https://bugzilla.suse.com/1231996" source="BUGZILLA"/>
		<reference ref_id="1231997" ref_url="https://bugzilla.suse.com/1231997" source="BUGZILLA"/>
		<reference ref_id="1231998" ref_url="https://bugzilla.suse.com/1231998" source="BUGZILLA"/>
		<reference ref_id="1232001" ref_url="https://bugzilla.suse.com/1232001" source="BUGZILLA"/>
		<reference ref_id="1232004" ref_url="https://bugzilla.suse.com/1232004" source="BUGZILLA"/>
		<reference ref_id="1232005" ref_url="https://bugzilla.suse.com/1232005" source="BUGZILLA"/>
		<reference ref_id="1232006" ref_url="https://bugzilla.suse.com/1232006" source="BUGZILLA"/>
		<reference ref_id="1232007" ref_url="https://bugzilla.suse.com/1232007" source="BUGZILLA"/>
		<reference ref_id="1232025" ref_url="https://bugzilla.suse.com/1232025" source="BUGZILLA"/>
		<reference ref_id="1232026" ref_url="https://bugzilla.suse.com/1232026" source="BUGZILLA"/>
		<reference ref_id="1232033" ref_url="https://bugzilla.suse.com/1232033" source="BUGZILLA"/>
		<reference ref_id="1232034" ref_url="https://bugzilla.suse.com/1232034" source="BUGZILLA"/>
		<reference ref_id="1232035" ref_url="https://bugzilla.suse.com/1232035" source="BUGZILLA"/>
		<reference ref_id="1232036" ref_url="https://bugzilla.suse.com/1232036" source="BUGZILLA"/>
		<reference ref_id="1232037" ref_url="https://bugzilla.suse.com/1232037" source="BUGZILLA"/>
		<reference ref_id="1232038" ref_url="https://bugzilla.suse.com/1232038" source="BUGZILLA"/>
		<reference ref_id="1232039" ref_url="https://bugzilla.suse.com/1232039" source="BUGZILLA"/>
		<reference ref_id="1232043" ref_url="https://bugzilla.suse.com/1232043" source="BUGZILLA"/>
		<reference ref_id="1232049" ref_url="https://bugzilla.suse.com/1232049" source="BUGZILLA"/>
		<reference ref_id="1232067" ref_url="https://bugzilla.suse.com/1232067" source="BUGZILLA"/>
		<reference ref_id="1232069" ref_url="https://bugzilla.suse.com/1232069" source="BUGZILLA"/>
		<reference ref_id="1232070" ref_url="https://bugzilla.suse.com/1232070" source="BUGZILLA"/>
		<reference ref_id="1232071" ref_url="https://bugzilla.suse.com/1232071" source="BUGZILLA"/>
		<reference ref_id="1232075" ref_url="https://bugzilla.suse.com/1232075" source="BUGZILLA"/>
		<reference ref_id="1232083" ref_url="https://bugzilla.suse.com/1232083" source="BUGZILLA"/>
		<reference ref_id="1232084" ref_url="https://bugzilla.suse.com/1232084" source="BUGZILLA"/>
		<reference ref_id="1232085" ref_url="https://bugzilla.suse.com/1232085" source="BUGZILLA"/>
		<reference ref_id="1232089" ref_url="https://bugzilla.suse.com/1232089" source="BUGZILLA"/>
		<reference ref_id="1232097" ref_url="https://bugzilla.suse.com/1232097" source="BUGZILLA"/>
		<reference ref_id="1232104" ref_url="https://bugzilla.suse.com/1232104" source="BUGZILLA"/>
		<reference ref_id="1232105" ref_url="https://bugzilla.suse.com/1232105" source="BUGZILLA"/>
		<reference ref_id="1232108" ref_url="https://bugzilla.suse.com/1232108" source="BUGZILLA"/>
		<reference ref_id="1232114" ref_url="https://bugzilla.suse.com/1232114" source="BUGZILLA"/>
		<reference ref_id="1232116" ref_url="https://bugzilla.suse.com/1232116" source="BUGZILLA"/>
		<reference ref_id="1232119" ref_url="https://bugzilla.suse.com/1232119" source="BUGZILLA"/>
		<reference ref_id="1232120" ref_url="https://bugzilla.suse.com/1232120" source="BUGZILLA"/>
		<reference ref_id="1232123" ref_url="https://bugzilla.suse.com/1232123" source="BUGZILLA"/>
		<reference ref_id="1232124" ref_url="https://bugzilla.suse.com/1232124" source="BUGZILLA"/>
		<reference ref_id="1232133" ref_url="https://bugzilla.suse.com/1232133" source="BUGZILLA"/>
		<reference ref_id="1232135" ref_url="https://bugzilla.suse.com/1232135" source="BUGZILLA"/>
		<reference ref_id="1232136" ref_url="https://bugzilla.suse.com/1232136" source="BUGZILLA"/>
		<reference ref_id="1232140" ref_url="https://bugzilla.suse.com/1232140" source="BUGZILLA"/>
		<reference ref_id="1232145" ref_url="https://bugzilla.suse.com/1232145" source="BUGZILLA"/>
		<reference ref_id="1232149" ref_url="https://bugzilla.suse.com/1232149" source="BUGZILLA"/>
		<reference ref_id="1232150" ref_url="https://bugzilla.suse.com/1232150" source="BUGZILLA"/>
		<reference ref_id="1232151" ref_url="https://bugzilla.suse.com/1232151" source="BUGZILLA"/>
		<reference ref_id="1232154" ref_url="https://bugzilla.suse.com/1232154" source="BUGZILLA"/>
		<reference ref_id="1232155" ref_url="https://bugzilla.suse.com/1232155" source="BUGZILLA"/>
		<reference ref_id="1232160" ref_url="https://bugzilla.suse.com/1232160" source="BUGZILLA"/>
		<reference ref_id="1232163" ref_url="https://bugzilla.suse.com/1232163" source="BUGZILLA"/>
		<reference ref_id="1232164" ref_url="https://bugzilla.suse.com/1232164" source="BUGZILLA"/>
		<reference ref_id="1232170" ref_url="https://bugzilla.suse.com/1232170" source="BUGZILLA"/>
		<reference ref_id="1232172" ref_url="https://bugzilla.suse.com/1232172" source="BUGZILLA"/>
		<reference ref_id="1232174" ref_url="https://bugzilla.suse.com/1232174" source="BUGZILLA"/>
		<reference ref_id="1232175" ref_url="https://bugzilla.suse.com/1232175" source="BUGZILLA"/>
		<reference ref_id="1232191" ref_url="https://bugzilla.suse.com/1232191" source="BUGZILLA"/>
		<reference ref_id="1232196" ref_url="https://bugzilla.suse.com/1232196" source="BUGZILLA"/>
		<reference ref_id="1232199" ref_url="https://bugzilla.suse.com/1232199" source="BUGZILLA"/>
		<reference ref_id="1232200" ref_url="https://bugzilla.suse.com/1232200" source="BUGZILLA"/>
		<reference ref_id="1232201" ref_url="https://bugzilla.suse.com/1232201" source="BUGZILLA"/>
		<reference ref_id="1232217" ref_url="https://bugzilla.suse.com/1232217" source="BUGZILLA"/>
		<reference ref_id="1232220" ref_url="https://bugzilla.suse.com/1232220" source="BUGZILLA"/>
		<reference ref_id="1232221" ref_url="https://bugzilla.suse.com/1232221" source="BUGZILLA"/>
		<reference ref_id="1232229" ref_url="https://bugzilla.suse.com/1232229" source="BUGZILLA"/>
		<reference ref_id="1232233" ref_url="https://bugzilla.suse.com/1232233" source="BUGZILLA"/>
		<reference ref_id="1232237" ref_url="https://bugzilla.suse.com/1232237" source="BUGZILLA"/>
		<reference ref_id="1232251" ref_url="https://bugzilla.suse.com/1232251" source="BUGZILLA"/>
		<reference ref_id="1232253" ref_url="https://bugzilla.suse.com/1232253" source="BUGZILLA"/>
		<reference ref_id="1232259" ref_url="https://bugzilla.suse.com/1232259" source="BUGZILLA"/>
		<reference ref_id="1232260" ref_url="https://bugzilla.suse.com/1232260" source="BUGZILLA"/>
		<reference ref_id="1232262" ref_url="https://bugzilla.suse.com/1232262" source="BUGZILLA"/>
		<reference ref_id="1232263" ref_url="https://bugzilla.suse.com/1232263" source="BUGZILLA"/>
		<reference ref_id="1232282" ref_url="https://bugzilla.suse.com/1232282" source="BUGZILLA"/>
		<reference ref_id="1232285" ref_url="https://bugzilla.suse.com/1232285" source="BUGZILLA"/>
		<reference ref_id="1232286" ref_url="https://bugzilla.suse.com/1232286" source="BUGZILLA"/>
		<reference ref_id="1232304" ref_url="https://bugzilla.suse.com/1232304" source="BUGZILLA"/>
		<reference ref_id="1232305" ref_url="https://bugzilla.suse.com/1232305" source="BUGZILLA"/>
		<reference ref_id="1232307" ref_url="https://bugzilla.suse.com/1232307" source="BUGZILLA"/>
		<reference ref_id="1232309" ref_url="https://bugzilla.suse.com/1232309" source="BUGZILLA"/>
		<reference ref_id="1232310" ref_url="https://bugzilla.suse.com/1232310" source="BUGZILLA"/>
		<reference ref_id="1232313" ref_url="https://bugzilla.suse.com/1232313" source="BUGZILLA"/>
		<reference ref_id="1232314" ref_url="https://bugzilla.suse.com/1232314" source="BUGZILLA"/>
		<reference ref_id="1232316" ref_url="https://bugzilla.suse.com/1232316" source="BUGZILLA"/>
		<reference ref_id="1232329" ref_url="https://bugzilla.suse.com/1232329" source="BUGZILLA"/>
		<reference ref_id="1232332" ref_url="https://bugzilla.suse.com/1232332" source="BUGZILLA"/>
		<reference ref_id="1232335" ref_url="https://bugzilla.suse.com/1232335" source="BUGZILLA"/>
		<reference ref_id="1232337" ref_url="https://bugzilla.suse.com/1232337" source="BUGZILLA"/>
		<reference ref_id="1232342" ref_url="https://bugzilla.suse.com/1232342" source="BUGZILLA"/>
		<reference ref_id="1232345" ref_url="https://bugzilla.suse.com/1232345" source="BUGZILLA"/>
		<reference ref_id="1232352" ref_url="https://bugzilla.suse.com/1232352" source="BUGZILLA"/>
		<reference ref_id="1232354" ref_url="https://bugzilla.suse.com/1232354" source="BUGZILLA"/>
		<reference ref_id="1232355" ref_url="https://bugzilla.suse.com/1232355" source="BUGZILLA"/>
		<reference ref_id="1232358" ref_url="https://bugzilla.suse.com/1232358" source="BUGZILLA"/>
		<reference ref_id="1232361" ref_url="https://bugzilla.suse.com/1232361" source="BUGZILLA"/>
		<reference ref_id="1232366" ref_url="https://bugzilla.suse.com/1232366" source="BUGZILLA"/>
		<reference ref_id="1232367" ref_url="https://bugzilla.suse.com/1232367" source="BUGZILLA"/>
		<reference ref_id="1232368" ref_url="https://bugzilla.suse.com/1232368" source="BUGZILLA"/>
		<reference ref_id="1232369" ref_url="https://bugzilla.suse.com/1232369" source="BUGZILLA"/>
		<reference ref_id="1232374" ref_url="https://bugzilla.suse.com/1232374" source="BUGZILLA"/>
		<reference ref_id="1232381" ref_url="https://bugzilla.suse.com/1232381" source="BUGZILLA"/>
		<reference ref_id="1232383" ref_url="https://bugzilla.suse.com/1232383" source="BUGZILLA"/>
		<reference ref_id="1232392" ref_url="https://bugzilla.suse.com/1232392" source="BUGZILLA"/>
		<reference ref_id="1232395" ref_url="https://bugzilla.suse.com/1232395" source="BUGZILLA"/>
		<reference ref_id="1232418" ref_url="https://bugzilla.suse.com/1232418" source="BUGZILLA"/>
		<reference ref_id="1232424" ref_url="https://bugzilla.suse.com/1232424" source="BUGZILLA"/>
		<reference ref_id="1232432" ref_url="https://bugzilla.suse.com/1232432" source="BUGZILLA"/>
		<reference ref_id="1232435" ref_url="https://bugzilla.suse.com/1232435" source="BUGZILLA"/>
		<reference ref_id="1232442" ref_url="https://bugzilla.suse.com/1232442" source="BUGZILLA"/>
		<reference ref_id="1232446" ref_url="https://bugzilla.suse.com/1232446" source="BUGZILLA"/>
		<reference ref_id="1232501" ref_url="https://bugzilla.suse.com/1232501" source="BUGZILLA"/>
		<reference ref_id="1232519" ref_url="https://bugzilla.suse.com/1232519" source="BUGZILLA"/>
		<reference ref_id="1232630" ref_url="https://bugzilla.suse.com/1232630" source="BUGZILLA"/>
		<reference ref_id="1232631" ref_url="https://bugzilla.suse.com/1232631" source="BUGZILLA"/>
		<reference ref_id="1232632" ref_url="https://bugzilla.suse.com/1232632" source="BUGZILLA"/>
		<reference ref_id="1232757" ref_url="https://bugzilla.suse.com/1232757" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-47416" ref_url="https://www.suse.com/security/cve/CVE-2021-47416/" source="CVE"/>
		<reference ref_id="CVE-2021-47534" ref_url="https://www.suse.com/security/cve/CVE-2021-47534/" source="CVE"/>
		<reference ref_id="CVE-2022-3435" ref_url="https://www.suse.com/security/cve/CVE-2022-3435/" source="CVE"/>
		<reference ref_id="CVE-2022-45934" ref_url="https://www.suse.com/security/cve/CVE-2022-45934/" source="CVE"/>
		<reference ref_id="CVE-2022-48664" ref_url="https://www.suse.com/security/cve/CVE-2022-48664/" source="CVE"/>
		<reference ref_id="CVE-2022-48879" ref_url="https://www.suse.com/security/cve/CVE-2022-48879/" source="CVE"/>
		<reference ref_id="CVE-2022-48946" ref_url="https://www.suse.com/security/cve/CVE-2022-48946/" source="CVE"/>
		<reference ref_id="CVE-2022-48947" ref_url="https://www.suse.com/security/cve/CVE-2022-48947/" source="CVE"/>
		<reference ref_id="CVE-2022-48948" ref_url="https://www.suse.com/security/cve/CVE-2022-48948/" source="CVE"/>
		<reference ref_id="CVE-2022-48949" ref_url="https://www.suse.com/security/cve/CVE-2022-48949/" source="CVE"/>
		<reference ref_id="CVE-2022-48951" ref_url="https://www.suse.com/security/cve/CVE-2022-48951/" source="CVE"/>
		<reference ref_id="CVE-2022-48953" ref_url="https://www.suse.com/security/cve/CVE-2022-48953/" source="CVE"/>
		<reference ref_id="CVE-2022-48954" ref_url="https://www.suse.com/security/cve/CVE-2022-48954/" source="CVE"/>
		<reference ref_id="CVE-2022-48955" ref_url="https://www.suse.com/security/cve/CVE-2022-48955/" source="CVE"/>
		<reference ref_id="CVE-2022-48956" ref_url="https://www.suse.com/security/cve/CVE-2022-48956/" source="CVE"/>
		<reference ref_id="CVE-2022-48957" ref_url="https://www.suse.com/security/cve/CVE-2022-48957/" source="CVE"/>
		<reference ref_id="CVE-2022-48958" ref_url="https://www.suse.com/security/cve/CVE-2022-48958/" source="CVE"/>
		<reference ref_id="CVE-2022-48959" ref_url="https://www.suse.com/security/cve/CVE-2022-48959/" source="CVE"/>
		<reference ref_id="CVE-2022-48960" ref_url="https://www.suse.com/security/cve/CVE-2022-48960/" source="CVE"/>
		<reference ref_id="CVE-2022-48961" ref_url="https://www.suse.com/security/cve/CVE-2022-48961/" source="CVE"/>
		<reference ref_id="CVE-2022-48962" ref_url="https://www.suse.com/security/cve/CVE-2022-48962/" source="CVE"/>
		<reference ref_id="CVE-2022-48966" ref_url="https://www.suse.com/security/cve/CVE-2022-48966/" source="CVE"/>
		<reference ref_id="CVE-2022-48967" ref_url="https://www.suse.com/security/cve/CVE-2022-48967/" source="CVE"/>
		<reference ref_id="CVE-2022-48968" ref_url="https://www.suse.com/security/cve/CVE-2022-48968/" source="CVE"/>
		<reference ref_id="CVE-2022-48969" ref_url="https://www.suse.com/security/cve/CVE-2022-48969/" source="CVE"/>
		<reference ref_id="CVE-2022-48970" ref_url="https://www.suse.com/security/cve/CVE-2022-48970/" source="CVE"/>
		<reference ref_id="CVE-2022-48971" ref_url="https://www.suse.com/security/cve/CVE-2022-48971/" source="CVE"/>
		<reference ref_id="CVE-2022-48972" ref_url="https://www.suse.com/security/cve/CVE-2022-48972/" source="CVE"/>
		<reference ref_id="CVE-2022-48973" ref_url="https://www.suse.com/security/cve/CVE-2022-48973/" source="CVE"/>
		<reference ref_id="CVE-2022-48975" ref_url="https://www.suse.com/security/cve/CVE-2022-48975/" source="CVE"/>
		<reference ref_id="CVE-2022-48977" ref_url="https://www.suse.com/security/cve/CVE-2022-48977/" source="CVE"/>
		<reference ref_id="CVE-2022-48978" ref_url="https://www.suse.com/security/cve/CVE-2022-48978/" source="CVE"/>
		<reference ref_id="CVE-2022-48980" ref_url="https://www.suse.com/security/cve/CVE-2022-48980/" source="CVE"/>
		<reference ref_id="CVE-2022-48981" ref_url="https://www.suse.com/security/cve/CVE-2022-48981/" source="CVE"/>
		<reference ref_id="CVE-2022-48985" ref_url="https://www.suse.com/security/cve/CVE-2022-48985/" source="CVE"/>
		<reference ref_id="CVE-2022-48987" ref_url="https://www.suse.com/security/cve/CVE-2022-48987/" source="CVE"/>
		<reference ref_id="CVE-2022-48988" ref_url="https://www.suse.com/security/cve/CVE-2022-48988/" source="CVE"/>
		<reference ref_id="CVE-2022-48991" ref_url="https://www.suse.com/security/cve/CVE-2022-48991/" source="CVE"/>
		<reference ref_id="CVE-2022-48992" ref_url="https://www.suse.com/security/cve/CVE-2022-48992/" source="CVE"/>
		<reference ref_id="CVE-2022-48994" ref_url="https://www.suse.com/security/cve/CVE-2022-48994/" source="CVE"/>
		<reference ref_id="CVE-2022-48995" ref_url="https://www.suse.com/security/cve/CVE-2022-48995/" source="CVE"/>
		<reference ref_id="CVE-2022-48997" ref_url="https://www.suse.com/security/cve/CVE-2022-48997/" source="CVE"/>
		<reference ref_id="CVE-2022-48999" ref_url="https://www.suse.com/security/cve/CVE-2022-48999/" source="CVE"/>
		<reference ref_id="CVE-2022-49000" ref_url="https://www.suse.com/security/cve/CVE-2022-49000/" source="CVE"/>
		<reference ref_id="CVE-2022-49002" ref_url="https://www.suse.com/security/cve/CVE-2022-49002/" source="CVE"/>
		<reference ref_id="CVE-2022-49003" ref_url="https://www.suse.com/security/cve/CVE-2022-49003/" source="CVE"/>
		<reference ref_id="CVE-2022-49005" ref_url="https://www.suse.com/security/cve/CVE-2022-49005/" source="CVE"/>
		<reference ref_id="CVE-2022-49006" ref_url="https://www.suse.com/security/cve/CVE-2022-49006/" source="CVE"/>
		<reference ref_id="CVE-2022-49007" ref_url="https://www.suse.com/security/cve/CVE-2022-49007/" source="CVE"/>
		<reference ref_id="CVE-2022-49010" ref_url="https://www.suse.com/security/cve/CVE-2022-49010/" source="CVE"/>
		<reference ref_id="CVE-2022-49011" ref_url="https://www.suse.com/security/cve/CVE-2022-49011/" source="CVE"/>
		<reference ref_id="CVE-2022-49012" ref_url="https://www.suse.com/security/cve/CVE-2022-49012/" source="CVE"/>
		<reference ref_id="CVE-2022-49014" ref_url="https://www.suse.com/security/cve/CVE-2022-49014/" source="CVE"/>
		<reference ref_id="CVE-2022-49015" ref_url="https://www.suse.com/security/cve/CVE-2022-49015/" source="CVE"/>
		<reference ref_id="CVE-2022-49016" ref_url="https://www.suse.com/security/cve/CVE-2022-49016/" source="CVE"/>
		<reference ref_id="CVE-2022-49017" ref_url="https://www.suse.com/security/cve/CVE-2022-49017/" source="CVE"/>
		<reference ref_id="CVE-2022-49019" ref_url="https://www.suse.com/security/cve/CVE-2022-49019/" source="CVE"/>
		<reference ref_id="CVE-2022-49020" ref_url="https://www.suse.com/security/cve/CVE-2022-49020/" source="CVE"/>
		<reference ref_id="CVE-2022-49021" ref_url="https://www.suse.com/security/cve/CVE-2022-49021/" source="CVE"/>
		<reference ref_id="CVE-2022-49022" ref_url="https://www.suse.com/security/cve/CVE-2022-49022/" source="CVE"/>
		<reference ref_id="CVE-2022-49023" ref_url="https://www.suse.com/security/cve/CVE-2022-49023/" source="CVE"/>
		<reference ref_id="CVE-2022-49024" ref_url="https://www.suse.com/security/cve/CVE-2022-49024/" source="CVE"/>
		<reference ref_id="CVE-2022-49025" ref_url="https://www.suse.com/security/cve/CVE-2022-49025/" source="CVE"/>
		<reference ref_id="CVE-2022-49026" ref_url="https://www.suse.com/security/cve/CVE-2022-49026/" source="CVE"/>
		<reference ref_id="CVE-2022-49027" ref_url="https://www.suse.com/security/cve/CVE-2022-49027/" source="CVE"/>
		<reference ref_id="CVE-2022-49028" ref_url="https://www.suse.com/security/cve/CVE-2022-49028/" source="CVE"/>
		<reference ref_id="CVE-2022-49029" ref_url="https://www.suse.com/security/cve/CVE-2022-49029/" source="CVE"/>
		<reference ref_id="CVE-2022-49031" ref_url="https://www.suse.com/security/cve/CVE-2022-49031/" source="CVE"/>
		<reference ref_id="CVE-2022-49032" ref_url="https://www.suse.com/security/cve/CVE-2022-49032/" source="CVE"/>
		<reference ref_id="CVE-2023-2166" ref_url="https://www.suse.com/security/cve/CVE-2023-2166/" source="CVE"/>
		<reference ref_id="CVE-2023-28327" ref_url="https://www.suse.com/security/cve/CVE-2023-28327/" source="CVE"/>
		<reference ref_id="CVE-2023-52766" ref_url="https://www.suse.com/security/cve/CVE-2023-52766/" source="CVE"/>
		<reference ref_id="CVE-2023-52800" ref_url="https://www.suse.com/security/cve/CVE-2023-52800/" source="CVE"/>
		<reference ref_id="CVE-2023-52881" ref_url="https://www.suse.com/security/cve/CVE-2023-52881/" source="CVE"/>
		<reference ref_id="CVE-2023-52919" ref_url="https://www.suse.com/security/cve/CVE-2023-52919/" source="CVE"/>
		<reference ref_id="CVE-2023-6270" ref_url="https://www.suse.com/security/cve/CVE-2023-6270/" source="CVE"/>
		<reference ref_id="CVE-2024-27043" ref_url="https://www.suse.com/security/cve/CVE-2024-27043/" source="CVE"/>
		<reference ref_id="CVE-2024-36244" ref_url="https://www.suse.com/security/cve/CVE-2024-36244/" source="CVE"/>
		<reference ref_id="CVE-2024-36957" ref_url="https://www.suse.com/security/cve/CVE-2024-36957/" source="CVE"/>
		<reference ref_id="CVE-2024-39476" ref_url="https://www.suse.com/security/cve/CVE-2024-39476/" source="CVE"/>
		<reference ref_id="CVE-2024-40965" ref_url="https://www.suse.com/security/cve/CVE-2024-40965/" source="CVE"/>
		<reference ref_id="CVE-2024-42145" ref_url="https://www.suse.com/security/cve/CVE-2024-42145/" source="CVE"/>
		<reference ref_id="CVE-2024-42226" ref_url="https://www.suse.com/security/cve/CVE-2024-42226/" source="CVE"/>
		<reference ref_id="CVE-2024-42253" ref_url="https://www.suse.com/security/cve/CVE-2024-42253/" source="CVE"/>
		<reference ref_id="CVE-2024-44931" ref_url="https://www.suse.com/security/cve/CVE-2024-44931/" source="CVE"/>
		<reference ref_id="CVE-2024-44947" ref_url="https://www.suse.com/security/cve/CVE-2024-44947/" source="CVE"/>
		<reference ref_id="CVE-2024-44958" ref_url="https://www.suse.com/security/cve/CVE-2024-44958/" source="CVE"/>
		<reference ref_id="CVE-2024-45016" ref_url="https://www.suse.com/security/cve/CVE-2024-45016/" source="CVE"/>
		<reference ref_id="CVE-2024-45025" ref_url="https://www.suse.com/security/cve/CVE-2024-45025/" source="CVE"/>
		<reference ref_id="CVE-2024-46678" ref_url="https://www.suse.com/security/cve/CVE-2024-46678/" source="CVE"/>
		<reference ref_id="CVE-2024-46716" ref_url="https://www.suse.com/security/cve/CVE-2024-46716/" source="CVE"/>
		<reference ref_id="CVE-2024-46719" ref_url="https://www.suse.com/security/cve/CVE-2024-46719/" source="CVE"/>
		<reference ref_id="CVE-2024-46754" ref_url="https://www.suse.com/security/cve/CVE-2024-46754/" source="CVE"/>
		<reference ref_id="CVE-2024-46770" ref_url="https://www.suse.com/security/cve/CVE-2024-46770/" source="CVE"/>
		<reference ref_id="CVE-2024-46775" ref_url="https://www.suse.com/security/cve/CVE-2024-46775/" source="CVE"/>
		<reference ref_id="CVE-2024-46777" ref_url="https://www.suse.com/security/cve/CVE-2024-46777/" source="CVE"/>
		<reference ref_id="CVE-2024-46809" ref_url="https://www.suse.com/security/cve/CVE-2024-46809/" source="CVE"/>
		<reference ref_id="CVE-2024-46811" ref_url="https://www.suse.com/security/cve/CVE-2024-46811/" source="CVE"/>
		<reference ref_id="CVE-2024-46813" ref_url="https://www.suse.com/security/cve/CVE-2024-46813/" source="CVE"/>
		<reference ref_id="CVE-2024-46814" ref_url="https://www.suse.com/security/cve/CVE-2024-46814/" source="CVE"/>
		<reference ref_id="CVE-2024-46815" ref_url="https://www.suse.com/security/cve/CVE-2024-46815/" source="CVE"/>
		<reference ref_id="CVE-2024-46816" ref_url="https://www.suse.com/security/cve/CVE-2024-46816/" source="CVE"/>
		<reference ref_id="CVE-2024-46817" ref_url="https://www.suse.com/security/cve/CVE-2024-46817/" source="CVE"/>
		<reference ref_id="CVE-2024-46818" ref_url="https://www.suse.com/security/cve/CVE-2024-46818/" source="CVE"/>
		<reference ref_id="CVE-2024-46826" ref_url="https://www.suse.com/security/cve/CVE-2024-46826/" source="CVE"/>
		<reference ref_id="CVE-2024-46828" ref_url="https://www.suse.com/security/cve/CVE-2024-46828/" source="CVE"/>
		<reference ref_id="CVE-2024-46834" ref_url="https://www.suse.com/security/cve/CVE-2024-46834/" source="CVE"/>
		<reference ref_id="CVE-2024-46840" ref_url="https://www.suse.com/security/cve/CVE-2024-46840/" source="CVE"/>
		<reference ref_id="CVE-2024-46841" ref_url="https://www.suse.com/security/cve/CVE-2024-46841/" source="CVE"/>
		<reference ref_id="CVE-2024-46848" ref_url="https://www.suse.com/security/cve/CVE-2024-46848/" source="CVE"/>
		<reference ref_id="CVE-2024-46849" ref_url="https://www.suse.com/security/cve/CVE-2024-46849/" source="CVE"/>
		<reference ref_id="CVE-2024-46854" ref_url="https://www.suse.com/security/cve/CVE-2024-46854/" source="CVE"/>
		<reference ref_id="CVE-2024-46855" ref_url="https://www.suse.com/security/cve/CVE-2024-46855/" source="CVE"/>
		<reference ref_id="CVE-2024-46857" ref_url="https://www.suse.com/security/cve/CVE-2024-46857/" source="CVE"/>
		<reference ref_id="CVE-2024-47660" ref_url="https://www.suse.com/security/cve/CVE-2024-47660/" source="CVE"/>
		<reference ref_id="CVE-2024-47661" ref_url="https://www.suse.com/security/cve/CVE-2024-47661/" source="CVE"/>
		<reference ref_id="CVE-2024-47664" ref_url="https://www.suse.com/security/cve/CVE-2024-47664/" source="CVE"/>
		<reference ref_id="CVE-2024-47668" ref_url="https://www.suse.com/security/cve/CVE-2024-47668/" source="CVE"/>
		<reference ref_id="CVE-2024-47672" ref_url="https://www.suse.com/security/cve/CVE-2024-47672/" source="CVE"/>
		<reference ref_id="CVE-2024-47673" ref_url="https://www.suse.com/security/cve/CVE-2024-47673/" source="CVE"/>
		<reference ref_id="CVE-2024-47674" ref_url="https://www.suse.com/security/cve/CVE-2024-47674/" source="CVE"/>
		<reference ref_id="CVE-2024-47684" ref_url="https://www.suse.com/security/cve/CVE-2024-47684/" source="CVE"/>
		<reference ref_id="CVE-2024-47685" ref_url="https://www.suse.com/security/cve/CVE-2024-47685/" source="CVE"/>
		<reference ref_id="CVE-2024-47692" ref_url="https://www.suse.com/security/cve/CVE-2024-47692/" source="CVE"/>
		<reference ref_id="CVE-2024-47704" ref_url="https://www.suse.com/security/cve/CVE-2024-47704/" source="CVE"/>
		<reference ref_id="CVE-2024-47705" ref_url="https://www.suse.com/security/cve/CVE-2024-47705/" source="CVE"/>
		<reference ref_id="CVE-2024-47706" ref_url="https://www.suse.com/security/cve/CVE-2024-47706/" source="CVE"/>
		<reference ref_id="CVE-2024-47707" ref_url="https://www.suse.com/security/cve/CVE-2024-47707/" source="CVE"/>
		<reference ref_id="CVE-2024-47710" ref_url="https://www.suse.com/security/cve/CVE-2024-47710/" source="CVE"/>
		<reference ref_id="CVE-2024-47720" ref_url="https://www.suse.com/security/cve/CVE-2024-47720/" source="CVE"/>
		<reference ref_id="CVE-2024-47727" ref_url="https://www.suse.com/security/cve/CVE-2024-47727/" source="CVE"/>
		<reference ref_id="CVE-2024-47730" ref_url="https://www.suse.com/security/cve/CVE-2024-47730/" source="CVE"/>
		<reference ref_id="CVE-2024-47738" ref_url="https://www.suse.com/security/cve/CVE-2024-47738/" source="CVE"/>
		<reference ref_id="CVE-2024-47739" ref_url="https://www.suse.com/security/cve/CVE-2024-47739/" source="CVE"/>
		<reference ref_id="CVE-2024-47745" ref_url="https://www.suse.com/security/cve/CVE-2024-47745/" source="CVE"/>
		<reference ref_id="CVE-2024-47747" ref_url="https://www.suse.com/security/cve/CVE-2024-47747/" source="CVE"/>
		<reference ref_id="CVE-2024-47748" ref_url="https://www.suse.com/security/cve/CVE-2024-47748/" source="CVE"/>
		<reference ref_id="CVE-2024-49858" ref_url="https://www.suse.com/security/cve/CVE-2024-49858/" source="CVE"/>
		<reference ref_id="CVE-2024-49860" ref_url="https://www.suse.com/security/cve/CVE-2024-49860/" source="CVE"/>
		<reference ref_id="CVE-2024-49866" ref_url="https://www.suse.com/security/cve/CVE-2024-49866/" source="CVE"/>
		<reference ref_id="CVE-2024-49867" ref_url="https://www.suse.com/security/cve/CVE-2024-49867/" source="CVE"/>
		<reference ref_id="CVE-2024-49881" ref_url="https://www.suse.com/security/cve/CVE-2024-49881/" source="CVE"/>
		<reference ref_id="CVE-2024-49882" ref_url="https://www.suse.com/security/cve/CVE-2024-49882/" source="CVE"/>
		<reference ref_id="CVE-2024-49883" ref_url="https://www.suse.com/security/cve/CVE-2024-49883/" source="CVE"/>
		<reference ref_id="CVE-2024-49886" ref_url="https://www.suse.com/security/cve/CVE-2024-49886/" source="CVE"/>
		<reference ref_id="CVE-2024-49890" ref_url="https://www.suse.com/security/cve/CVE-2024-49890/" source="CVE"/>
		<reference ref_id="CVE-2024-49892" ref_url="https://www.suse.com/security/cve/CVE-2024-49892/" source="CVE"/>
		<reference ref_id="CVE-2024-49894" ref_url="https://www.suse.com/security/cve/CVE-2024-49894/" source="CVE"/>
		<reference ref_id="CVE-2024-49895" ref_url="https://www.suse.com/security/cve/CVE-2024-49895/" source="CVE"/>
		<reference ref_id="CVE-2024-49896" ref_url="https://www.suse.com/security/cve/CVE-2024-49896/" source="CVE"/>
		<reference ref_id="CVE-2024-49897" ref_url="https://www.suse.com/security/cve/CVE-2024-49897/" source="CVE"/>
		<reference ref_id="CVE-2024-49899" ref_url="https://www.suse.com/security/cve/CVE-2024-49899/" source="CVE"/>
		<reference ref_id="CVE-2024-49901" ref_url="https://www.suse.com/security/cve/CVE-2024-49901/" source="CVE"/>
		<reference ref_id="CVE-2024-49906" ref_url="https://www.suse.com/security/cve/CVE-2024-49906/" source="CVE"/>
		<reference ref_id="CVE-2024-49908" ref_url="https://www.suse.com/security/cve/CVE-2024-49908/" source="CVE"/>
		<reference ref_id="CVE-2024-49909" ref_url="https://www.suse.com/security/cve/CVE-2024-49909/" source="CVE"/>
		<reference ref_id="CVE-2024-49911" ref_url="https://www.suse.com/security/cve/CVE-2024-49911/" source="CVE"/>
		<reference ref_id="CVE-2024-49912" ref_url="https://www.suse.com/security/cve/CVE-2024-49912/" source="CVE"/>
		<reference ref_id="CVE-2024-49913" ref_url="https://www.suse.com/security/cve/CVE-2024-49913/" source="CVE"/>
		<reference ref_id="CVE-2024-49914" ref_url="https://www.suse.com/security/cve/CVE-2024-49914/" source="CVE"/>
		<reference ref_id="CVE-2024-49917" ref_url="https://www.suse.com/security/cve/CVE-2024-49917/" source="CVE"/>
		<reference ref_id="CVE-2024-49918" ref_url="https://www.suse.com/security/cve/CVE-2024-49918/" source="CVE"/>
		<reference ref_id="CVE-2024-49919" ref_url="https://www.suse.com/security/cve/CVE-2024-49919/" source="CVE"/>
		<reference ref_id="CVE-2024-49920" ref_url="https://www.suse.com/security/cve/CVE-2024-49920/" source="CVE"/>
		<reference ref_id="CVE-2024-49922" ref_url="https://www.suse.com/security/cve/CVE-2024-49922/" source="CVE"/>
		<reference ref_id="CVE-2024-49923" ref_url="https://www.suse.com/security/cve/CVE-2024-49923/" source="CVE"/>
		<reference ref_id="CVE-2024-49929" ref_url="https://www.suse.com/security/cve/CVE-2024-49929/" source="CVE"/>
		<reference ref_id="CVE-2024-49930" ref_url="https://www.suse.com/security/cve/CVE-2024-49930/" source="CVE"/>
		<reference ref_id="CVE-2024-49933" ref_url="https://www.suse.com/security/cve/CVE-2024-49933/" source="CVE"/>
		<reference ref_id="CVE-2024-49936" ref_url="https://www.suse.com/security/cve/CVE-2024-49936/" source="CVE"/>
		<reference ref_id="CVE-2024-49939" ref_url="https://www.suse.com/security/cve/CVE-2024-49939/" source="CVE"/>
		<reference ref_id="CVE-2024-49946" ref_url="https://www.suse.com/security/cve/CVE-2024-49946/" source="CVE"/>
		<reference ref_id="CVE-2024-49949" ref_url="https://www.suse.com/security/cve/CVE-2024-49949/" source="CVE"/>
		<reference ref_id="CVE-2024-49954" ref_url="https://www.suse.com/security/cve/CVE-2024-49954/" source="CVE"/>
		<reference ref_id="CVE-2024-49955" ref_url="https://www.suse.com/security/cve/CVE-2024-49955/" source="CVE"/>
		<reference ref_id="CVE-2024-49958" ref_url="https://www.suse.com/security/cve/CVE-2024-49958/" source="CVE"/>
		<reference ref_id="CVE-2024-49959" ref_url="https://www.suse.com/security/cve/CVE-2024-49959/" source="CVE"/>
		<reference ref_id="CVE-2024-49960" ref_url="https://www.suse.com/security/cve/CVE-2024-49960/" source="CVE"/>
		<reference ref_id="CVE-2024-49962" ref_url="https://www.suse.com/security/cve/CVE-2024-49962/" source="CVE"/>
		<reference ref_id="CVE-2024-49967" ref_url="https://www.suse.com/security/cve/CVE-2024-49967/" source="CVE"/>
		<reference ref_id="CVE-2024-49969" ref_url="https://www.suse.com/security/cve/CVE-2024-49969/" source="CVE"/>
		<reference ref_id="CVE-2024-49973" ref_url="https://www.suse.com/security/cve/CVE-2024-49973/" source="CVE"/>
		<reference ref_id="CVE-2024-49974" ref_url="https://www.suse.com/security/cve/CVE-2024-49974/" source="CVE"/>
		<reference ref_id="CVE-2024-49975" ref_url="https://www.suse.com/security/cve/CVE-2024-49975/" source="CVE"/>
		<reference ref_id="CVE-2024-49982" ref_url="https://www.suse.com/security/cve/CVE-2024-49982/" source="CVE"/>
		<reference ref_id="CVE-2024-49991" ref_url="https://www.suse.com/security/cve/CVE-2024-49991/" source="CVE"/>
		<reference ref_id="CVE-2024-49993" ref_url="https://www.suse.com/security/cve/CVE-2024-49993/" source="CVE"/>
		<reference ref_id="CVE-2024-49995" ref_url="https://www.suse.com/security/cve/CVE-2024-49995/" source="CVE"/>
		<reference ref_id="CVE-2024-49996" ref_url="https://www.suse.com/security/cve/CVE-2024-49996/" source="CVE"/>
		<reference ref_id="CVE-2024-50000" ref_url="https://www.suse.com/security/cve/CVE-2024-50000/" source="CVE"/>
		<reference ref_id="CVE-2024-50001" ref_url="https://www.suse.com/security/cve/CVE-2024-50001/" source="CVE"/>
		<reference ref_id="CVE-2024-50002" ref_url="https://www.suse.com/security/cve/CVE-2024-50002/" source="CVE"/>
		<reference ref_id="CVE-2024-50006" ref_url="https://www.suse.com/security/cve/CVE-2024-50006/" source="CVE"/>
		<reference ref_id="CVE-2024-50014" ref_url="https://www.suse.com/security/cve/CVE-2024-50014/" source="CVE"/>
		<reference ref_id="CVE-2024-50019" ref_url="https://www.suse.com/security/cve/CVE-2024-50019/" source="CVE"/>
		<reference ref_id="CVE-2024-50024" ref_url="https://www.suse.com/security/cve/CVE-2024-50024/" source="CVE"/>
		<reference ref_id="CVE-2024-50028" ref_url="https://www.suse.com/security/cve/CVE-2024-50028/" source="CVE"/>
		<reference ref_id="CVE-2024-50033" ref_url="https://www.suse.com/security/cve/CVE-2024-50033/" source="CVE"/>
		<reference ref_id="CVE-2024-50035" ref_url="https://www.suse.com/security/cve/CVE-2024-50035/" source="CVE"/>
		<reference ref_id="CVE-2024-50041" ref_url="https://www.suse.com/security/cve/CVE-2024-50041/" source="CVE"/>
		<reference ref_id="CVE-2024-50045" ref_url="https://www.suse.com/security/cve/CVE-2024-50045/" source="CVE"/>
		<reference ref_id="CVE-2024-50046" ref_url="https://www.suse.com/security/cve/CVE-2024-50046/" source="CVE"/>
		<reference ref_id="CVE-2024-50047" ref_url="https://www.suse.com/security/cve/CVE-2024-50047/" source="CVE"/>
		<reference ref_id="CVE-2024-50048" ref_url="https://www.suse.com/security/cve/CVE-2024-50048/" source="CVE"/>
		<reference ref_id="CVE-2024-50049" ref_url="https://www.suse.com/security/cve/CVE-2024-50049/" source="CVE"/>
		<reference ref_id="CVE-2024-50055" ref_url="https://www.suse.com/security/cve/CVE-2024-50055/" source="CVE"/>
		<reference ref_id="CVE-2024-50058" ref_url="https://www.suse.com/security/cve/CVE-2024-50058/" source="CVE"/>
		<reference ref_id="CVE-2024-50059" ref_url="https://www.suse.com/security/cve/CVE-2024-50059/" source="CVE"/>
		<reference ref_id="CVE-2024-50061" ref_url="https://www.suse.com/security/cve/CVE-2024-50061/" source="CVE"/>
		<reference ref_id="CVE-2024-50063" ref_url="https://www.suse.com/security/cve/CVE-2024-50063/" source="CVE"/>
		<reference ref_id="CVE-2024-50081" ref_url="https://www.suse.com/security/cve/CVE-2024-50081/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-48879: efi: fix NULL-deref in init error path (bsc#1229556).
- CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1231893).
- CVE-2022-48957: dpaa2-switch: Fix memory leak in dpaa2_switch_acl_entry_add() and dpaa2_switch_acl_entry_remove() (bsc#1231973).
- CVE-2022-48958: ethernet: aeroflex: fix potential skb leak in greth_init_rings() (bsc#1231889).
- CVE-2022-48959: net: dsa: sja1105: fix memory leak in sja1105_setup_devlink_regions() (bsc#1231976).
- CVE-2022-48960: net: hisilicon: Fix potential use-after-free in hix5hd2_rx() (bsc#1231979).
- CVE-2022-48962: net: hisilicon: Fix potential use-after-free in hisi_femac_rx() (bsc#1232286).
- CVE-2022-48966: net: mvneta: Fix an out of bounds check (bsc#1232191).
- CVE-2022-48980: net: dsa: sja1105: avoid out of bounds access in sja1105_init_l2_policing() (bsc#1232233).
- CVE-2022-48991: mm/khugepaged: fix collapse_pte_mapped_thp() to allow anon_vma (bsc#1232070).
- CVE-2022-49015: net: hsr: Fix potential use-after-free (bsc#1231938).
- CVE-2022-49017: tipc: re-fetch skb cb after tipc_msg_validate (bsc#1232004).
- CVE-2022-49020: net/9p: Fix a potential socket leak in p9_socket_open (bsc#1232175).
- CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to entire cycle too (bsc#1226797).
- CVE-2024-36957: octeontx2-af: avoid off-by-one read from userspace (bsc#1225762).
- CVE-2024-39476: md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING (bsc#1227437).
- CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer (bsc#1227885).
- CVE-2024-42226: Prevent potential failure in handle_tx_event() for Transfer events without TRB (bsc#1228709).
- CVE-2024-42253: gpio: pca953x: fix pca953x_irq_bus_sync_unlock race (bsc#1229005).
- CVE-2024-44931: gpio: prevent potential speculation leaks in gpio_device_get_desc() (bsc#1229837).
- CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc (bsc#1230179).
- CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429).
- CVE-2024-45025: fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE (bsc#1230456).
- CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex (bsc#1230550).
- CVE-2024-46716: dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor (bsc#1230715).
- CVE-2024-46754: bpf: Remove tst_run from lwt_seg6local_prog_ops (bsc#1230801).
- CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow (bsc#1230763).
- CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774).
- CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773).
- CVE-2024-46809: drm/amd/display: Check BIOS images before it is used (bsc#1231148).
- CVE-2024-46811: drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box (bsc#1231179).
- CVE-2024-46813: drm/amd/display: Check link_index before accessing dc-&gt;links (bsc#1231191).
- CVE-2024-46814: drm/amd/display: Check msg_id before processing transcation (bsc#1231193).
- CVE-2024-46815: drm/amd/display: Check num_valid_sets before accessing reader_wm_sets (bsc#1231195).
- CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197).
- CVE-2024-46817: drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (bsc#1231200).
- CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index (bsc#1231203).
- CVE-2024-46826: ELF: fix kernel.randomize_va_space double read (bsc#1231115).
- CVE-2024-46828: uprobes: fix kernel info leak via '[uprobes]' vma (bsc#1231114).
- CVE-2024-46834: ethtool: fail closed if we can't get max channel used in indirection tables (bsc#1231096).
- CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete (bsc#1231105).
- CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094).
- CVE-2024-46848: perf/x86/intel: Limit the period on Haswell (bsc#1231072).
- CVE-2024-46849: ASoC: meson: axg-card: fix 'use-after-free' (bsc#1231073).
- CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084).
- CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085).
- CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs (bsc#1231087).
- CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439).
- CVE-2024-47661: drm/amd/display: Avoid overflow from uint32_t to uint8_t (bsc#1231496).
- CVE-2024-47664: spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware (bsc#1231442).
- CVE-2024-47668: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (bsc#1231502).
- CVE-2024-47672: wifi: iwlwifi: mvm: do not wait for tx queues if firmware is dead (bsc#1231540).
- CVE-2024-47673: wifi: iwlwifi: mvm: pause TCM when the firmware is stopped (bsc#1231539).
- CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673).
- CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987).
- CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() (bsc#1231998).
- CVE-2024-47692: nfsd: return -EINVAL when namelen is 0 (bsc#1231857).
- CVE-2024-47704: drm/amd/display: Check link_res-&gt;hpo_dp_link_enc before using it (bsc#1231944).
- CVE-2024-47705: block: fix potential invalid pointer dereference in blk_add_partition (bsc#1231872).
- CVE-2024-47706: block, bfq: fix possible UAF for bfqq-&gt;bic with merge chain (bsc#1231942).
- CVE-2024-47707: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() (bsc#1231935).
- CVE-2024-47710: sock_map: Add a cond_resched() in sock_hash_free() (bsc#1232049).
- CVE-2024-47720: drm/amd/display: Add null check for set_output_gamma in dcn30_set_output_transfer_func (bsc#1232043).
- CVE-2024-47727: x86/tdx: Fix 'in-kernel MMIO' check (bsc#1232116).
- CVE-2024-47730: crypto: hisilicon/qm - inject error before stopping queue (bsc#1232075).
- CVE-2024-47738: wifi: mac80211: do not use rate mask for offchannel TX either (bsc#1232114).
- CVE-2024-47739: padata: use integer wrap around to prevent deadlock on seq_nr overflow (bsc#1232124).
- CVE-2024-47745: mm: split critical region in remap_file_pages() and invoke LSMs in between (bsc#1232135).
- CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition (bsc#1232145).
- CVE-2024-47748: vhost_vdpa: assign irq bypass producer token correctly (bsc#1232174).
- CVE-2024-49860: ACPI: sysfs: validate return type of _STR method (bsc#1231861).
- CVE-2024-49866: tracing/timerlat: Fix a race during cpuhp processing (bsc#1232259).
- CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201).
- CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path (bsc#1232200).
- CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent() (bsc#1232199).
- CVE-2024-49886: platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug (bsc#1232196).
- CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it (bsc#1232217).
- CVE-2024-49892: drm/amd/display: Initialize get_bytes_per_element's default to 1 (bsc#1232220).
- CVE-2024-49894: drm/amd/display: Fix index out of bounds in degamma hardware format translation (bsc#1232354).
- CVE-2024-49896: drm/amd/display: Check stream before comparing them (bsc#1232221).
- CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used (bsc#1232355).
- CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1 (bsc#1232358).
- CVE-2024-49901: drm/msm/adreno: Assign msm_gpu-&gt;pdev earlier to avoid nullptrs (bsc#1232305).
- CVE-2024-49906: drm/amd/display: Check null pointer before try to access it (bsc#1232332).
- CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func (bsc#1232337).
- CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func (bsc#1232366).
- CVE-2024-49914: drm/amd/display: Add null check for pipe_ctx-&gt;plane_state in (bsc#1232369).
- CVE-2024-49917: drm/amd/display: Add NULL check for clk_mgr and clk_mgr-&gt;funcs in dcn30_init_hw (bsc#1231965).
- CVE-2024-49918: drm/amd/display: Add null check for head_pipe in dcn32_acquire_idle_pipe_for_head_pipe_in_layer (bsc#1231967).
- CVE-2024-49919: drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layer (bsc#1231968).
- CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses (bsc#1232313).
- CVE-2024-49922: drm/amd/display: Check null pointers before using them (bsc#1232374).
- CVE-2024-49923: drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags (bsc#1232361).
- CVE-2024-49929: wifi: iwlwifi: mvm: avoid NULL pointer dereference (bsc#1232253).
- CVE-2024-49930: wifi: ath11k: fix array out-of-bound access in SoC stats (bsc#1232260).
- CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368).
- CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424).
- CVE-2024-49939: wifi: rtw89: avoid to add interface to list twice when SER (bsc#1232381).
- CVE-2024-49946: ppp: do not assume bh is held in ppp_channel_bridge_input() (bsc#1232164).
- CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (bsc#1232160).
- CVE-2024-49954: static_call: Replace pointless WARN_ON() in static_call_module_notify() (bsc#1232155).
- CVE-2024-49955: ACPI: battery: Fix possible crash when unregistering a battery hook (bsc#1232154).
- CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching reflink tree (bsc#1232151).
- CVE-2024-49959: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error (bsc#1232149).
- CVE-2024-49960: ext4: fix timer use-after-free on failed mount (bsc#1232395).
- CVE-2024-49962: ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package() (bsc#1232314).
- CVE-2024-49967: ext4: no need to continue when the number of entries is 1 (bsc#1232140).
- CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color transformation (bsc#1232519).
- CVE-2024-49973: r8169: add tally counter fields added with RTL8125 (bsc#1232105).
- CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous (bsc#1232383).
- CVE-2024-49975: uprobes: fix kernel info leak via '[uprobes]' vma (bsc#1232104).
- CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282).
- CVE-2024-49993: iommu/vt-d: Fix potential lockup if qi_submit_sync called with 0 count (bsc#1232316).
- CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432).
- CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points (bsc#1232089).
- CVE-2024-50000: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc() (bsc#1232085).
- CVE-2024-50001: net/mlx5: Fix error path in multi-packet WQE transmit (bsc#1232084).
- CVE-2024-50002: static_call: Handle module init failure correctly in static_call_del_module() (bsc#1232083).
- CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate() (bsc#1232442).
- CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path (bsc#1232446).
- CVE-2024-50019: kthread: unpark only parked kthread (bsc#1231990).
- CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954).
- CVE-2024-50028: thermal: core: Reference count the zone in thermal_zone_get_by_id() (bsc#1231950).
- CVE-2024-50033: slip: make slhc_remember() more robust against malicious packets (bsc#1231914).
- CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392).
- CVE-2024-50041: i40e: Fix macvlan leak by synchronizing access to mac_filter_hash (bsc#1231907).
- CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb (bsc#1231903).
- CVE-2024-50046: kabi fix for NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies() (bsc#1231902).
- CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418).
- CVE-2024-50048: fbcon: Fix a NULL pointer dereference issue in fbcon_putcs (bsc#1232310).
- CVE-2024-50055: driver core: bus: Fix double free in driver API bus_register() (bsc#1232329).
- CVE-2024-50058: serial: protect uart_port_dtr_rts() in uart_shutdown() too (bsc#1232285).
- CVE-2024-50059: ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition (bsc#1232345).
- CVE-2024-50061: i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition (bsc#1232263).
- CVE-2024-50063: kABI: bpf: struct bpf_map kABI workaround (bsc#1232435).
- CVE-2024-50081: blk-mq: setup queue -&gt;tag_set before initializing hctx (bsc#1232501).

The following non-security bugs were fixed:

- ACPI: EC: Do not release locks during operation region accesses (stable-fixes).
- ACPI: PAD: fix crash in exit_round_robin() (stable-fixes).
- ACPI: PRM: Clean up guid type in struct prm_handler_info (git-fixes).
- ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context (git-fixes).
- ACPI: battery: Call power_supply_changed() when adding hooks (bsc#1232154)
- ACPI: battery: Simplify battery hook locking (bsc#1232154)
- ACPI: resource: Add Asus ExpertBook B2502CVA to irq1_level_low_skip_override[] (stable-fixes).
- ACPI: resource: Add Asus Vivobook X1704VAP to irq1_level_low_skip_override[] (stable-fixes).
- ACPI: resource: Add another DMI match for the TongFang GMxXGxx (stable-fixes).
- ACPICA: Fix memory leak if acpi_ps_get_next_field() fails (stable-fixes).
- ACPICA: Fix memory leak if acpi_ps_get_next_namepath() fails (stable-fixes).
- ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package() (stable-fixes).
- ACPICA: iasl: handle empty connection_node (stable-fixes).
- ALSA: asihpi: Fix potential OOB array access (stable-fixes).
- ALSA: core: add isascii() check to card ID generator (stable-fixes).
- ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (git-fixes).
- ALSA: hda/conexant - Fix audio routing for HP EliteOne 1000 G2 (stable-fixes).
- ALSA: hda/conexant - Use cached pin control for Node 0x1d on HP EliteOne 1000 G2 (git-fixes).
- ALSA: hda/conexant: Fix conflicting quirk for System76 Pangolin (git-fixes).
- ALSA: hda/cs8409: Fix possible NULL dereference (git-fixes).
- ALSA: hda/generic: Unconditionally prefer preferred_dacs pairs (git-fixes).
- ALSA: hda/realtek - FIxed ALC285 headphone no sound (stable-fixes).
- ALSA: hda/realtek - Fixed ALC256 headphone no sound (stable-fixes).
- ALSA: hda/realtek: Add a quirk for HP Pavilion 15z-ec200 (stable-fixes).
- ALSA: hda/realtek: Add quirk for Huawei MateBook 13 KLV-WX9 (stable-fixes).
- ALSA: hda/realtek: Fix the push button function for the ALC257 (git-fixes).
- ALSA: hda/realtek: Update default depop procedure (git-fixes).
- ALSA: hda: Fix kctl-&gt;id initialization (git-fixes).
- ALSA: hda: cs35l41: fix module autoloading (git-fixes).
- ALSA: hdsp: Break infinite MIDI input flush loop (stable-fixes).
- ALSA: line6: add hw monitor volume control to POD HD500X (stable-fixes).
- ALSA: mixer_oss: Remove some incorrect kfree_const() usages (git-fixes).
- ALSA: usb-audio: Add delay quirk for VIVO USB-C HEADSET (stable-fixes).
- ALSA: usb-audio: Add input value sanity checks for standard types (stable-fixes).
- ALSA: usb-audio: Add logitech Audio profile quirk (stable-fixes).
- ALSA: usb-audio: Add native DSD support for Luxman D-08u (stable-fixes).
- ALSA: usb-audio: Define macros for quirk table entries (stable-fixes).
- ALSA: usb-audio: Replace complex quirk lines with macros (stable-fixes).
- ASoC: allow module autoloading for table db1200_pids (stable-fixes).
- ASoC: imx-card: Set card.owner to avoid a warning calltrace if SND=m (git-fixes).
- ASoC: intel: fix module autoloading (stable-fixes).
- ASoC: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe() (git-fixes).
- ASoC: rt5682: Return devm_of_clk_add_hw_provider to transfer the error (git-fixes).
- ASoC: soc-pcm: Do not zero TDM masks in __soc_pcm_open() (git-fixes).
- ASoC: tda7419: fix module autoloading (stable-fixes).
- Bluetooth: Call iso_exit() on module unload (git-fixes).
- Bluetooth: ISO: Fix multiple init when debugfs is disabled (git-fixes).
- Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (git-fixes).
- Bluetooth: Remove debugfs directory on module init failure (git-fixes).
- Bluetooth: bnep: fix wild-memory-access in proto_unregister (git-fixes).
- Bluetooth: btmrvl: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- Bluetooth: btusb: Fix regression with fake CSR controllers 0a12:0001 (git-fixes).
- Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (git-fixes).
- Drop HD-audio conexant patch that caused a regression on Thinkpad (bsc#1228269)
- Drop USB dwc2 patch that caused a regression on RPi3 (bsc#1232342)
- HID: amd_sfh: Switch to device-managed dmam_alloc_coherent() (git-fixes).
- HID: multitouch: Add support for GT7868Q (stable-fixes).
- HID: multitouch: Add support for Thinkpad X12 Gen 2 Kbd Portfolio (stable-fixes).
- HID: plantronics: Workaround for an unexcepted opposite volume key (stable-fixes).
- Input: adp5589-keys - fix NULL pointer dereference (git-fixes).
- Input: adp5589-keys - fix adp5589_gpio_get_value() (git-fixes).
- Input: ads7846 - ratelimit the spi_sync error message (stable-fixes).
- Input: goodix - use the new soc_intel_is_byt() helper (stable-fixes).
- Input: synaptics - enable SMBus for HP Elitebook 840 G2 (stable-fixes).
- KVM: Fix coalesced_mmio_has_room() to avoid premature userspace exit (git-fixes).
- KVM: Fix lockdep false negative during host resume (git-fixes).
- KVM: Grab a reference to KVM for VM and vCPU stats file descriptors (git-fixes).
- KVM: Optimize kvm_make_vcpus_request_mask() a bit (git-fixes).
- KVM: Pre-allocate cpumasks for kvm_make_all_cpus_request_except() (git-fixes).
- KVM: Reject overly excessive IDs in KVM_CREATE_VCPU (git-fixes).
- KVM: SVM: Disallow guest from changing userspace's MSR_AMD64_DE_CFG value (git-fixes).
- KVM: SVM: Do not advertise Bus Lock Detect to guest if SVM support is missing (git-fixes).
- KVM: SVM: fix emulation of msr reads/writes of MSR_FS_BASE and MSR_GS_BASE (git-fixes).
- KVM: Unconditionally get a ref to /dev/kvm module when creating a VM (git-fixes).
- KVM: Write the per-page 'segment' when clearing (part of) a guest page (git-fixes).
- KVM: arm64: Add missing memory barriers when switching to pKVM's hyp pgd (git-fixes).
- KVM: arm64: Allow AArch32 PSTATE.M to be restored as System mode (git-fixes).
- KVM: arm64: Fix AArch32 register narrowing on userspace write (git-fixes).
- KVM: arm64: GICv4: Do not perform a map to a mapped vLPI (git-fixes).
- KVM: arm64: Invalidate EL1&amp;0 TLB entries for all VMIDs in nvhe hyp init (git-fixes).
- KVM: arm64: Preserve PSTATE.SS for the guest while single-step is enabled (git-fixes).
- KVM: arm64: Release pfn, i.e. put page, if copying MTE tags hits ZONE_DEVICE (git-fixes).
- KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs (git-fixes).
- KVM: arm64: vgic-its: Test for valid IRQ in MOVALL handler (git-fixes).
- KVM: arm64: vgic-its: Test for valid IRQ in its_sync_lpi_pending_table() (git-fixes).
- KVM: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() (git-fixes).
- KVM: arm64: vgic-v2: Use cpuid from userspace as vcpu_id (git-fixes).
- KVM: arm64: vgic-v4: Restore pending state on host userspace write (git-fixes).
- KVM: eventfd: Fix false positive RCU usage warning (git-fixes).
- KVM: fix memoryleak in kvm_init() (git-fixes).
- KVM: s390: Change virtual to physical address access in diag 0x258 handler (git-fixes bsc#1232631).
- KVM: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query (git-fixes bsc#1231277).
- KVM: s390: gaccess: Check if guest address is in memslot (git-fixes bsc#1232630).
- KVM: x86/mmu: Fold rmap_recycle into rmap_add (git-fixes).
- KVM: x86/mmu: Rename slot_handle_leaf to slot_handle_level_4k (git-fixes).
- KVM: x86: Use a stable condition around all VT-d PI paths (git-fixes).
- Makefile.compiler: replace cc-ifversion with compiler-specific macros (bsc#1230414 bsc#1229450).
- NFS: Avoid unnecessary rescanning of the per-server delegation list (git-fixes).
- NFSD: Fix NFSv4's PUTPUBFH operation (git-fixes).
- NFSD: Mark filecache 'down' if init fails (git-fixes).
- NFSv3: only use NFS timeout for MOUNT when protocols are compatible (bsc#1231016).
- NFSv4: Fix clearing of layout segments in layoutreturn (git-fixes).
- PCI: Add ACS quirk for Qualcomm SA8775P (stable-fixes).
- PCI: Add function 0 DMA alias quirk for Glenfly Arise chip (stable-fixes).
- PCI: Fix pci_enable_acs() support for the ACS quirks (bsc#1229019).
- PCI: Mark Creative Labs EMU20k2 INTx masking as broken (stable-fixes).
- RDMA/bnxt_re: Add a check for memory allocation (git-fixes)
- RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (git-fixes)
- RDMA/bnxt_re: Fix incorrect AVID type in WQE structure (git-fixes)
- RDMA/bnxt_re: Fix the GID table length (git-fixes)
- RDMA/bnxt_re: Fix the max CQ WQEs for older adapters (git-fixes)
- RDMA/bnxt_re: Fix the usage of control path spin locks (git-fixes)
- RDMA/bnxt_re: Return more meaningful error (git-fixes)
- RDMA/bnxt_re: synchronize the qp-handle table array (git-fixes)
- RDMA/cxgb4: Dump vendor specific QP details (git-fixes)
- RDMA/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP (git-fixes)
- RDMA/hns: Remove unused abnormal interrupt of type RAS (git-fixes)
- RDMA/irdma: Fix misspelling of 'accept*' (git-fixes)
- RDMA/mad: Improve handling of timed out WRs of mad agent (git-fixes)
- RDMA/mana_ib: use the correct page size for mapping user-mode doorbell page (git-fixes).
- RDMA/mana_ib: use the correct page table index based on hardware page size (git-fixes).
- RDMA/mlx5: Round max_rd_atomic/max_dest_rd_atomic up instead of down (git-fixes)
- RDMA/rtrs-srv: Avoid null pointer deref during path establishment (git-fixes)
- RDMA/srpt: Make slab cache names unique (git-fixes)
- SUNRPC: Fix integer overflow in decode_rc_list() (git-fixes).
- SUNRPC: Fixup gss_status tracepoint error output (git-fixes).
- SUNRPC: clnt.c: Remove misleading comment (git-fixes).
- USB: appledisplay: close race between probe and completion handler (stable-fixes).
- USB: misc: cypress_cy7c63: check for short transfer (stable-fixes).
- USB: misc: yurex: fix race between read and write (stable-fixes).
- USB: serial: option: add Telit FN920C04 MBIM compositions (stable-fixes).
- USB: serial: option: add support for Quectel EG916Q-GL (stable-fixes).
- USB: serial: pl2303: add device id for Macrosilicon MS3020 (stable-fixes).
- Use pahole -j1 option for reproducible builds (bsc#1230414 bsc#1229450).
- add bug reference for a mana change (bsc#1229769).
- add bug references to existing mana changes (bsc#1232033, bsc#1232034, bsc#1232036).
- afs: Revert 'afs: Hide silly-rename files from userspace' (git-fixes).
- arm64: cputype: Add Neoverse-N3 definitions (git-fixes)
- arm64: dts: rockchip: override BIOS_DISABLE signal via GPIO hog on RK3399 Puma (git-fixes).
- arm64: errata: Expand speculative SSBS workaround once more (git-fixes)
- arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes)
- arm64: probes: Fix simulate_ldr*_literal() (git-fixes)
- arm64: probes: Fix uprobes for big-endian kernels (git-fixes)
- arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes)
- block: print symbolic error name instead of error code (bsc#1231872).
- bpf, lsm: Add disabled BPF LSM hook list (git-fixes).
- bpf, net: Fix a potential race in do_sock_getsockopt() (git-fixes).
- bpf, verifier: Correct tail_call_reachable for bpf prog (git-fixes).
- bpf, x64: Remove tail call detection (git-fixes).
- bpf,perf: Fix perf_event_detach_bpf_prog error handling (git-fixes).
- bpf: Add --skip_encoding_btf_inconsistent_proto, --btf_gen_optimized to pahole flags for v1.25 (bsc#1230414 bsc#1229450).
- bpf: Allow helpers to accept pointers with a fixed size (git-fixes).
- bpf: Check for helper calls in check_subprogs() (git-fixes).
- bpf: Fix bpf_strtol and bpf_strtoul helpers for 32bit (git-fixes).
- bpf: Fix helper writes to read-only maps (git-fixes).
- bpf: Fix pointer-leak due to insufficient speculative store bypass mitigation (bsc#1231375).
- bpf: Fix tailcall cases in test_bpf (git-fixes).
- bpf: Improve check_raw_mode_ok test for MEM_UNINIT-tagged types (git-fixes).
- bpf: Remove truncation test in bpf_strtol and bpf_strtoul helpers (git-fixes).
- bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error (git-fixes).
- bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos (git-fixes).
- btf, scripts: Exclude Rust CUs with pahole (bsc#1230414 bsc#1229450).
- bus: integrator-lm: fix OF node leak in probe() (git-fixes).
- ceph: fix cap ref leak via netfs init_request (bsc#1231383).
- char: tpm: Fix possible memory leak in tpm_bios_measurements_open() (git-fixes).
- clk: Add a devm variant of clk_rate_exclusive_get() (bsc#1227885).
- clk: Provide !COMMON_CLK dummy for devm_clk_rate_exclusive_get() (bsc#1227885).
- comedi: ni_routing: tools: Check when the file could not be opened (stable-fixes).
- cpufreq/amd-pstate: Fix amd_pstate mode switch on shared memory systems (git-fixes).
- crypto: hisilicon - Remove pci_aer_clear_nonfatal_status() call (bsc#1232075)
- crypto: hisilicon/qm - re-enable communicate interrupt before notifying PF (bsc#1232075)
- debugfs: fix automount d_fsdata usage (git-fixes).
- dn_route: set rt neigh to blackhole_netdev instead of loopback_dev in ifdown (bsc#1216813).
- drbd: Add NULL check for net_conf to prevent dereference in state validation (git-fixes).
- drbd: Fix atomicity violation in drbd_uuid_set_bm() (git-fixes).
- driver core: bus: Return -EIO instead of 0 when show/store invalid bus attribute (stable-fixes).
- drm/amd/amdgpu: Fix double unlock in amdgpu_mes_add_ring (git-fixes).
- drm/amd/display: Add null check for 'afb' in amdgpu_dm_plane_handle_cursor_update (v2) (stable-fixes).
- drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream (stable-fixes).
- drm/amd/display: Allow backlight to go below `AMDGPU_DM_DEFAULT_MIN_BACKLIGHT` (stable-fixes).
- drm/amd/display: Check link_res-&gt;hpo_dp_link_enc before using it (bsc#1231944)
- drm/amd/display: Check null pointer before dereferencing se (stable-fixes).
- drm/amd/display: Check null pointers before using dc-&gt;clk_mgr (stable-fixes).
- drm/amd/display: Check stream before comparing them (stable-fixes).
- drm/amd/display: Fix Synaptics Cascaded Panamera DSC Determination (stable-fixes).
- drm/amd/display: Fix index out of bounds in DCN30 color transformation (stable-fixes).
- drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation (stable-fixes).
- drm/amd/display: Fix index out of bounds in degamma hardware format translation (stable-fixes).
- drm/amd/display: Fix system hang while resume with TBT monitor (stable-fixes).
- drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream' (stable-fixes).
- drm/amd/display: Initialize get_bytes_per_element's default to 1 (stable-fixes).
- drm/amd/display: Round calculated vtotal (stable-fixes).
- drm/amd/display: Validate backlight caps are sane (stable-fixes).
- drm/amd/pm: ensure the fw_info is not null before using it (stable-fixes).
- drm/amd: Guard against bad data for ATIF ACPI method (git-fixes).
- drm/amdgpu: Replace one-element array with flexible-array member (stable-fixes).
- drm/amdgpu: add raven1 gfxoff quirk (stable-fixes).
- drm/amdgpu: disallow multiple BO_HANDLES chunks in one submit (stable-fixes).
- drm/amdgpu: enable gfxoff quirk on HP 705G4 (stable-fixes).
- drm/amdgpu: fix unchecked return value warning for amdgpu_gfx (stable-fixes).
- drm/amdgpu: prevent BO_HANDLES error from being overwritten (git-fixes).
- drm/amdgpu: properly handle vbios fake edid sizing (git-fixes).
- drm/amdkfd: Fix resource leak in criu restore queue (stable-fixes).
- drm/msm/dpu: do not always program merge_3d block (git-fixes).
- drm/msm/dpu: make sure phys resources are properly initialized (git-fixes).
- drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation (git-fixes).
- drm/msm: Allocate memory for disp snapshot with kvzalloc() (git-fixes).
- drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() (git-fixes).
- drm/printer: Allow NULL data in devcoredump printer (stable-fixes).
- drm/radeon/r100: Handle unknown family in r100_cp_init_microcode() (stable-fixes).
- drm/radeon: Fix encoder-&gt;possible_clones (git-fixes).
- drm/radeon: Replace one-element array with flexible-array member (stable-fixes).
- drm/radeon: properly handle vbios fake edid sizing (git-fixes).
- drm/rockchip: define gamma registers for RK3399 (stable-fixes).
- drm/rockchip: support gamma control on RK3399 (stable-fixes).
- drm/sched: Add locking to drm_sched_entity_modify_sched (git-fixes).
- drm/v3d: Stop the active perfmon before being destroyed (git-fixes).
- drm/vc4: Stop the active perfmon before being destroyed (git-fixes).
- drm/vmwgfx: Handle surface check failure correctly (git-fixes).
- drm: Consistently use struct drm_mode_rect for FB_DAMAGE_CLIPS (git-fixes).
- drm: komeda: Fix an issue related to normalized zpos (stable-fixes).
- efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (stable-fixes).
- erofs: avoid consecutive detection for Highmem memory (git-fixes).
- erofs: avoid infinite loop in z_erofs_do_read_page() when reading beyond EOF (git-fixes).
- erofs: fix pcluster use-after-free on UP platforms (git-fixes).
- erofs: fix potential overflow calculating xattr_isize (git-fixes).
- erofs: stop parsing non-compact HEAD index if clusterofs is invalid (git-fixes).
- exportfs: use pr_debug for unreachable debug statements (git-fixes).
- ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201)
- fat: fix uninitialized variable (git-fixes).
- fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes).
- fbdev: sisfb: Fix strbuf array overflow (stable-fixes).
- fgraph: Change the name of cpuhp state to 'fgraph:online' (git-fixes).
- fgraph: Fix missing unlock in register_ftrace_graph() (git-fixes).
- fgraph: Use CPU hotplug mechanism to initialize idle shadow stacks (git-fixes).
- filelock: fix potential use-after-free in posix_lock_inode (git-fixes).
- firmware: tegra: bpmp: Drop unused mbox_client_to_bpmp() (git-fixes).
- fs/namespace: fnic: Switch to use %ptTd (git-fixes).
- fs/pipe: Fix lockdep false-positive in watchqueue pipe_write() (git-fixes).
- fs: Fix file_set_fowner LSM hook inconsistencies (git-fixes).
- gpio: aspeed: Add the flush write to ensure the write complete (git-fixes).
- gpio: aspeed: Use devm_clk api to manage clock source (git-fixes).
- gpio: davinci: fix lazy disable (git-fixes).
- hid: intel-ish-hid: Fix uninitialized variable 'rv' in ish_fw_xfer_direct_dma (git-fixes).
- hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event (git-fixes).
- hwmon: (adm9240) Add missing dependency on REGMAP_I2C (git-fixes).
- hwmon: (tmp513) Add missing dependency on REGMAP_I2C (git-fixes).
- i2c: i801: Use a different adapter-name for IDF adapters (stable-fixes).
- i2c: imx-lpi2c: return -EINVAL when i2c peripheral clk does not work (bsc#1227885).
- i2c: imx-lpi2c: use bulk clk API (bsc#1227885).
- i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume (git-fixes).
- i2c: xiic: Fix RX IRQ busy check (stable-fixes).
- i2c: xiic: Fix broken locking on tx_msg (stable-fixes).
- i2c: xiic: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes).
- i2c: xiic: Switch from waitqueue to completion (stable-fixes).
- i2c: xiic: Try re-initialization on bus busy timeout (git-fixes).
- i2c: xiic: Use devm_clk_get_enabled() (stable-fixes).
- i2c: xiic: improve error message when transfer fails to start (stable-fixes).
- i2c: xiic: xiic_xfer(): Fix runtime PM leak on error path (git-fixes).
- ice: Unbind the workqueue (bsc#1231344).
- iio: dac: ad5770r: add missing select REGMAP_SPI in Kconfig (git-fixes).
- iio: dac: ltc1660: add missing select REGMAP_SPI in Kconfig (git-fixes).
- iio: dac: stm32-dac-core: add missing select REGMAP_MMIO in Kconfig (git-fixes).
- iio: hid-sensors: Fix an error handling path in _hid_sensor_set_report_latency() (git-fixes).
- iio: light: opt3001: add missing full-scale range value (git-fixes).
- iio: light: veml6030: fix ALS sensor resolution (git-fixes).
- iio: light: veml6030: fix IIO device retrieval from embedded device (git-fixes).
- iio: proximity: mb1232: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes).
- iommu/vt-d: Always reserve a domain ID for identity setup (git-fixes).
- ipv6: blackhole_netdev needs snmp6 counters (bsc#1216813).
- ipv6: give an IPv6 dev to blackhole_netdev (bsc#1216813).
- jfs: Fix sanity check in dbMount (git-fixes).
- jfs: Fix uaf in dbFreeBits (git-fixes).
- jfs: Fix uninit-value access of new_ea in ea_buffer (git-fixes).
- jfs: UBSAN: shift-out-of-bounds in dbFindBits (git-fixes).
- jfs: check if leafidx greater than num leaves per dmap tree (git-fixes).
- kABI: bpf: enum bpf_{type_flag,arg_type} kABI workaround (git-fixes).
- kABI: bpf: struct bpf_func_proto kABI workaround (git-fixes).
- kab: fix after net: add more sanity check in virtio_net_hdr_to_skb() (git-fixes).
- kabi fix of KVM: arm64: Preserve PSTATE.SS for the guest while single-step is enabled (git-fixes).
- kabi: fix after KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs (git-fixes).
- kabi: fix after kvm: add guest_state_{enter,exit}_irqoff() (git-fixes).
- kbuild, bpf: Use test-ge check for v1.25-only pahole (bsc#1230414 bsc#1229450).
- kbuild,bpf: Add module-specific pahole flags for distilled base BTF (bsc#1230414 bsc#1229450).
- kbuild,bpf: Switch to using --btf_features for pahole v1.26 and later (bsc#1230414 bsc#1229450).
- kbuild: add test-{ge,gt,le,lt} macros (bsc#1230414 bsc#1229450).
- kbuild: avoid too many execution of scripts/pahole-flags.sh (bsc#1230414 bsc#1229450).
- kbuild: bpf: Tell pahole to DECL_TAG kfuncs (bsc#1230414 bsc#1229450).
- kvm/arm64: rework guest entry logic (git-fixes).
- kvm: Add support for arch compat vm ioctls (git-fixes).
- kvm: add guest_state_{enter,exit}_irqoff() (git-fixes).
- media: videobuf2-core: clear memory related fields in __vb2_plane_dmabuf_put() (stable-fixes).
- module: abort module loading when sysfs setup suffer errors (git-fixes).
- nbd: fix race between timeout and normal completion (bsc#1230918).
- net/sched: taprio: Limit TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME to INT_MAX (bsc#1226797)
- net: add more sanity check in virtio_net_hdr_to_skb() (git-fixes).
- net: mana: Implement get_ringparam/set_ringparam for mana (bsc#1229891).
- net: mana: Improve mana_set_channels() in low mem conditions (bsc#1230289).
- net: socket: suppress unused warning (git-fixes).
- net: test for not too small csum_start in virtio_net_hdr_to_skb() (git-fixes).
- net: usb: usbnet: fix name regression (git-fixes).
- netdevsim: use cond_resched() in nsim_dev_trap_report_work() (git-fixes).
- nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes).
- nfsd: call cache_put if xdr_reserve_space returns NULL (git-fixes).
- nfsd: fix delegation_blocked() to block correctly for at least 30 seconds (git-fixes).
- nfsd: fix refcount leak when file is unhashed after being found (git-fixes).
- nfsd: map the EBADMSG to nfserr_io to avoid warning (git-fixes).
- nfsd: remove unneeded EEXIST error check in nfsd_do_file_acquire (git-fixes).
- nfsd: return -EINVAL when namelen is 0 (git-fixes).
- nilfs2: fix kernel bug due to missing clearing of buffer delay flag (git-fixes).
- nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error (git-fixes).
- ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() (git-fixes).
- ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition (stable-fixes).
- nvme-multipath: system fails to create generic nvme device (git-fixes).
- nvme-pci: qdepth 1 quirk (git-fixes).
- nvmet-auth: assign dh_key to NULL after kfree_sensitive (git-fixes).
- ocfs2: fix the la space leak when unmounting an ocfs2 volume (git-fixes).
- ocfs2: fix uninit-value in ocfs2_get_block() (git-fixes).
- ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (git-fixes).
- parport: Proper fix for array out-of-bounds access (git-fixes).
- platform/surface: aggregator_registry: Add support for Surface Laptop Go 3 (stable-fixes).
- platform/x86: touchscreen_dmi: add nanote-next quirk (stable-fixes).
- power: reset: brcmstb: Do not go into infinite loop if reset fails (stable-fixes).
- powerpc/64: Convert patch_instruction() to patch_u32() (bsc#1194869).
- powerpc/boot: Handle allocation failure in simple_realloc() (bsc#1194869).
- powerpc/boot: Only free if realloc() succeeds (bsc#1194869).
- powerpc/code-patching: Add generic memory patching (bsc#1194869).
- powerpc/code-patching: Consolidate and cache per-cpu patching context (bsc#1194869).
- powerpc/code-patching: Do not call is_vmalloc_or_module_addr() without CONFIG_MODULES (bsc#1194869).
- powerpc/code-patching: Fix error handling in do_patch_instruction() (bsc#1194869).
- powerpc/code-patching: Fix oops with DEBUG_VM enabled (bsc#1194869).
- powerpc/code-patching: Fix unmap_patch_area() error handling (bsc#1194869).
- powerpc/code-patching: Perform hwsync in __patch_instruction() in case of failure (bsc#1194869).
- powerpc/code-patching: Pre-map patch area (bsc#1194869).
- powerpc/code-patching: Remove #ifdef CONFIG_STRICT_KERNEL_RWX (bsc#1194869).
- powerpc/code-patching: Remove pr_debug()/pr_devel() messages and fix check() (bsc#1194869).
- powerpc/code-patching: Reorganise do_patch_instruction() to ease error handling (bsc#1194869).
- powerpc/code-patching: Speed up page mapping/unmapping (bsc#1194869).
- powerpc/code-patching: Use WARN_ON and fix check in poking_init (bsc#1194869).
- powerpc/code-patching: Use jump_label to check if poking_init() is done (bsc#1194869).
- powerpc/code-patching: Use temporary mm for Radix MMU (bsc#1194869).
- powerpc/code-patching: introduce patch_instructions() (bsc#1194869).
- powerpc/ftrace: Use patch_instruction() return directly (bsc#1194869).
- powerpc/imc-pmu: Fix use of mutex in IRQs disabled section (bsc#1054914 git-fixes).
- powerpc/imc-pmu: Use the correct spinlock initializer (bsc#1054914 git-fixes).
- powerpc/inst: Refactor ___get_user_instr() (bsc#1194869).
- powerpc/lib: Add __init attribute to eligible functions (bsc#1194869).
- powerpc/tlb: Add local flush for page given mm_struct and psize (bsc#1194869).
- powerpc/vdso: Fix VDSO data access when running in a non-root time namespace (bsc#1194869).
- powerpc/vdso: Merge vdso64 and vdso32 into a single directory (bsc#1194869).
- powerpc/vdso: Rework VDSO32 makefile to add a prefix to object files (bsc#1194869).
- powerpc/vdso: augment VDSO32 functions to support 64 bits build (bsc#1194869).
- powerpc/xics: Check return value of kasprintf in icp_native_map_one_cpu (bsc#1194869).
- powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729).
- powerpc: Allow clearing and restoring registers independent of saved breakpoint state (bsc#1194869).
- rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow (bsc#1226631).
- rcu: Add rcutree.nohz_full_patience_delay to reduce nohz_full (bsc#1231327)
- s390/mm: Add cond_resched() to cmm_alloc/free_pages() (bsc#1228747).
- s390/sclp_vt220: Convert newlines to CRLF instead of LFCR (git-fixes bsc#1232632).
- sched/isolation: Prevent boot crash when the boot CPU is (bsc#1231327)
- scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes).
- scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes).
- scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes).
- scsi: core: Handle devices which return an unusually large VPD page count (git-fixes).
- scsi: core: alua: I/O errors for ALUA state transitions (git-fixes).
- scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() (git-fixes).
- scsi: fnic: Move flush_work initialization out of if block (bsc#1230055).
- scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes).
- scsi: libsas: Fix exp-attached device scan after probe failure scanned in again after probe failed (git-fixes).
- scsi: libsas: Fix the failure of adding phy with zero-address to port (git-fixes).
- scsi: lpfc: Add ELS_RSP cmd to the list of WQEs to flush in lpfc_els_flush_cmd() (bsc#1232757).
- scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance (bsc#1232757).
- scsi: lpfc: Fix kref imbalance on fabric ndlps from dev_loss_tmo handler (bsc#1232757).
- scsi: lpfc: Remove trailing space after \n newline (bsc#1232757).
- scsi: lpfc: Restrict support for 32 byte CDBs to specific HBAs (git-fixes).
- scsi: lpfc: Revise TRACE_EVENT log flag severities from KERN_ERR to KERN_WARNING (bsc#1232757).
- scsi: lpfc: Support loopback tests with VMID enabled (bsc#1232757).
- scsi: lpfc: Update lpfc version to 14.4.0.5 (bsc#1232757).
- scsi: lpfc: Update phba link state conditional before sending CMF_SYNC_WQE (bsc#1232757).
- scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes).
- scsi: mac_scsi: Refactor polling loop (git-fixes).
- scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes).
- scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
- scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes).
- scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
- scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes).
- scsi: smartpqi: correct stream detection (git-fixes).
- scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git-fixes).
- scsi: spi: Fix sshdr use (git-fixes).
- scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes).
- selftests/bpf: Add a test case to write mtu result into .rodata (git-fixes).
- selftests/bpf: Add a test case to write strtol result into .rodata (git-fixes).
- selftests/bpf: Fix ARG_PTR_TO_LONG {half-,}uninitialized test (git-fixes).
- selftests/bpf: Rename ARG_PTR_TO_LONG test description (git-fixes).
- selftests/bpf: test for malformed BPF_CORE_TYPE_ID_LOCAL relocation (git-fixes).
- spi: bcm63xx: Enable module autoloading (stable-fixes).
- spi: bcm63xx: Fix module autoloading (git-fixes).
- spi: lpspi: Silence error message upon deferred probe (stable-fixes).
- spi: lpspi: Simplify some error message (git-fixes).
- spi: lpspi: release requested DMA channels (stable-fixes).
- spi: ppc4xx: Avoid returning 0 when failed to parse and map IRQ (git-fixes).
- spi: ppc4xx: handle irq_of_parse_and_map() errors (git-fixes).
- spi: s3c64xx: fix timeout counters in flush_fifo (git-fixes).
- spi: spi-fsl-lpspi: Undo runtime PM changes at driver exit time (git-fixes).
- spi: spi-imx: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes).
- spi: spidev: Add missing spi_device_id for jg10309-01 (git-fixes).
- static_call: Do not make __static_call_return0 static (git-fixes).
- tracing/hwlat: Fix a race during cpuhp processing (git-fixes).
- tracing/uprobes: Use trace_event_buffer_reserve() helper (git-fixes).
- tracing: Consider the NULL character when validating the event length (git-fixes).
- uprobe: avoid out-of-bounds memory access of fetching args (git-fixes).
- uprobes: encapsulate preparation of uprobe args buffer (git-fixes).
- usb: chipidea: udc: enable suspend interrupt after usb reset (stable-fixes).
- usb: dwc2: Adjust the timing of USB Driver Interrupt Registration in the Crashkernel Scenario (stable-fixes).
- usb: dwc3: core: Stop processing of pending events if controller is halted (git-fixes).
- usb: gadget: core: force synchronous registration (git-fixes).
- usb: storage: ignore bogus device raised by JieLi BR21 USB sound chip (stable-fixes).
- usb: typec: altmode should keep reference to parent (git-fixes).
- usb: xhci: Fix problem with xhci resume from suspend (stable-fixes).
- usb: yurex: Fix inconsistent locking bug in yurex_read() (git-fixes).
- usb: yurex: Replace snprintf() with the safer scnprintf() variant (stable-fixes).
- usbnet: ipheth: fix carrier detection in modes 1 and 4 (stable-fixes).
- vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() (git-fixes).
- vhost_vdpa: assign irq bypass producer token correctly (git-fixes).
- virtio-net: synchronize probe with ndo_set_features (git-fixes).
- virtio_console: fix misc probe bugs (git-fixes).
- virtio_net: fixing XDP for fully checksummed packets handling (git-fixes).
- vmxnet3: add command to allow disabling of offloads (bsc#1226498).
- vmxnet3: add latency measurement support in vmxnet3 (bsc#1226498).
- vmxnet3: prepare for version 9 changes (bsc#1226498).
- vmxnet3: update to version 9 (bsc#1226498).
- vsock/virtio: fix packet delivery to tap device (git-fixes).
- wifi: ath11k: fix array out-of-bound access in SoC stats (stable-fixes).
- wifi: ath9k: Remove error checks when creating debugfs entries (git-fixes).
- wifi: ath9k: fix parameter check in ath9k_init_debug() (stable-fixes).
- wifi: ath9k: fix possible integer overflow in ath9k_get_et_stats() (stable-fixes).
- wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit (stable-fixes).
- wifi: iwlwifi: clear trans-&gt;state earlier upon error (stable-fixes).
- wifi: iwlwifi: lower message level for FW buffer destination (stable-fixes).
- wifi: iwlwifi: mvm: fix iwl_mvm_scan_fits() calculation (stable-fixes).
- wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() (stable-fixes).
- wifi: rtw88: select WANT_DEV_COREDUMP (stable-fixes).
- workqueue: Avoid using isolated cpus' timers on (bsc#1231327)
- workqueue: mark power efficient workqueue as unbounded if (bsc#1231327)
- x86/bugs: Do not use UNTRAIN_RET with IBPB on entry (git-fixes).
- x86/bugs: Skip RSB fill at VMEXIT (git-fixes).
- x86/cpufeatures: Add a IBPB_NO_RET BUG flag (git-fixes).
- x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET (git-fixes).
- x86/entry: Have entry_ibpb() invalidate return predictions (git-fixes).
- x86/hyperv: Set X86_FEATURE_TSC_KNOWN_FREQ when Hyper-V provides frequency (git-fixes).
- x86/kaslr: Expose and use the end of the physical memory address space (bsc#1230405).
- xfrm: set dst dev to blackhole_netdev instead of loopback_dev in ifdown (bsc#1216813).
- xhci: Fix incorrect stream context type macro (git-fixes).
- xhci: Mitigate failed set dequeue pointer commands (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-13"/>
	<updated date="2024-11-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1054914">SUSE bug 1054914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204171">SUSE bug 1204171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205796">SUSE bug 1205796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206188">SUSE bug 1206188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206344">SUSE bug 1206344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209290">SUSE bug 1209290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210449">SUSE bug 1210449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210627">SUSE bug 1210627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213034">SUSE bug 1213034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216813">SUSE bug 1216813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218562">SUSE bug 1218562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223384">SUSE bug 1223384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223524">SUSE bug 1223524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223824">SUSE bug 1223824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225189">SUSE bug 1225189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225336">SUSE bug 1225336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225611">SUSE bug 1225611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225762">SUSE bug 1225762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226498">SUSE bug 1226498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226631">SUSE bug 1226631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226797">SUSE bug 1226797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227437">SUSE bug 1227437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227885">SUSE bug 1227885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228119">SUSE bug 1228119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228269">SUSE bug 1228269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228709">SUSE bug 1228709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228743">SUSE bug 1228743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228747">SUSE bug 1228747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229005">SUSE bug 1229005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229019">SUSE bug 1229019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229450">SUSE bug 1229450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229454">SUSE bug 1229454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229456">SUSE bug 1229456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229556">SUSE bug 1229556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229769">SUSE bug 1229769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229837">SUSE bug 1229837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229891">SUSE bug 1229891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230055">SUSE bug 1230055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230179">SUSE bug 1230179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230289">SUSE bug 1230289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230405">SUSE bug 1230405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230414">SUSE bug 1230414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230429">SUSE bug 1230429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230456">SUSE bug 1230456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230550">SUSE bug 1230550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230600">SUSE bug 1230600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230620">SUSE bug 1230620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230715">SUSE bug 1230715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230722">SUSE bug 1230722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230763">SUSE bug 1230763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230773">SUSE bug 1230773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230774">SUSE bug 1230774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230801">SUSE bug 1230801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230903">SUSE bug 1230903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230918">SUSE bug 1230918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231016">SUSE bug 1231016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231072">SUSE bug 1231072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231073">SUSE bug 1231073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231084">SUSE bug 1231084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231085">SUSE bug 1231085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231087">SUSE bug 1231087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231094">SUSE bug 1231094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231096">SUSE bug 1231096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231105">SUSE bug 1231105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231114">SUSE bug 1231114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231115">SUSE bug 1231115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231148">SUSE bug 1231148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231179">SUSE bug 1231179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231191">SUSE bug 1231191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231193">SUSE bug 1231193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231195">SUSE bug 1231195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231197">SUSE bug 1231197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231200">SUSE bug 1231200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231203">SUSE bug 1231203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231277">SUSE bug 1231277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231293">SUSE bug 1231293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231327">SUSE bug 1231327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231344">SUSE bug 1231344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231375">SUSE bug 1231375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231383">SUSE bug 1231383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231439">SUSE bug 1231439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231442">SUSE bug 1231442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231496">SUSE bug 1231496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231502">SUSE bug 1231502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231539">SUSE bug 1231539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231540">SUSE bug 1231540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231578">SUSE bug 1231578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231673">SUSE bug 1231673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231857">SUSE bug 1231857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231861">SUSE bug 1231861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231872">SUSE bug 1231872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231883">SUSE bug 1231883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231885">SUSE bug 1231885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231887">SUSE bug 1231887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231888">SUSE bug 1231888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231889">SUSE bug 1231889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231890">SUSE bug 1231890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231892">SUSE bug 1231892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231893">SUSE bug 1231893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231895">SUSE bug 1231895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231896">SUSE bug 1231896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231897">SUSE bug 1231897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231902">SUSE bug 1231902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231903">SUSE bug 1231903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231907">SUSE bug 1231907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231914">SUSE bug 1231914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231929">SUSE bug 1231929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231935">SUSE bug 1231935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231936">SUSE bug 1231936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231937">SUSE bug 1231937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231938">SUSE bug 1231938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231939">SUSE bug 1231939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231940">SUSE bug 1231940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231941">SUSE bug 1231941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231942">SUSE bug 1231942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231944">SUSE bug 1231944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231950">SUSE bug 1231950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231954">SUSE bug 1231954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231958">SUSE bug 1231958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231960">SUSE bug 1231960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231961">SUSE bug 1231961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231962">SUSE bug 1231962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231965">SUSE bug 1231965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231967">SUSE bug 1231967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231968">SUSE bug 1231968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231972">SUSE bug 1231972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231973">SUSE bug 1231973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231976">SUSE bug 1231976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231979">SUSE bug 1231979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231987">SUSE bug 1231987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231988">SUSE bug 1231988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231990">SUSE bug 1231990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231991">SUSE bug 1231991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231992">SUSE bug 1231992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231995">SUSE bug 1231995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231996">SUSE bug 1231996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231997">SUSE bug 1231997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231998">SUSE bug 1231998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232001">SUSE bug 1232001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232004">SUSE bug 1232004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232005">SUSE bug 1232005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232006">SUSE bug 1232006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232007">SUSE bug 1232007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232025">SUSE bug 1232025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232026">SUSE bug 1232026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232033">SUSE bug 1232033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232034">SUSE bug 1232034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232035">SUSE bug 1232035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232036">SUSE bug 1232036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232037">SUSE bug 1232037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232038">SUSE bug 1232038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232039">SUSE bug 1232039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232043">SUSE bug 1232043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232049">SUSE bug 1232049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232067">SUSE bug 1232067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232069">SUSE bug 1232069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232070">SUSE bug 1232070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232071">SUSE bug 1232071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232075">SUSE bug 1232075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232083">SUSE bug 1232083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232084">SUSE bug 1232084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232085">SUSE bug 1232085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232089">SUSE bug 1232089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232097">SUSE bug 1232097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232104">SUSE bug 1232104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232105">SUSE bug 1232105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232108">SUSE bug 1232108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232114">SUSE bug 1232114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232116">SUSE bug 1232116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232119">SUSE bug 1232119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232120">SUSE bug 1232120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232123">SUSE bug 1232123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232124">SUSE bug 1232124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232133">SUSE bug 1232133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232135">SUSE bug 1232135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232136">SUSE bug 1232136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232140">SUSE bug 1232140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232145">SUSE bug 1232145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232149">SUSE bug 1232149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232150">SUSE bug 1232150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232151">SUSE bug 1232151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232154">SUSE bug 1232154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232155">SUSE bug 1232155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232160">SUSE bug 1232160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232163">SUSE bug 1232163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232164">SUSE bug 1232164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232170">SUSE bug 1232170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232172">SUSE bug 1232172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232174">SUSE bug 1232174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232175">SUSE bug 1232175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232191">SUSE bug 1232191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232196">SUSE bug 1232196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232199">SUSE bug 1232199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232200">SUSE bug 1232200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232201">SUSE bug 1232201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232217">SUSE bug 1232217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232220">SUSE bug 1232220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232221">SUSE bug 1232221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232229">SUSE bug 1232229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232233">SUSE bug 1232233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232237">SUSE bug 1232237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232251">SUSE bug 1232251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232253">SUSE bug 1232253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232259">SUSE bug 1232259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232260">SUSE bug 1232260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232262">SUSE bug 1232262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232263">SUSE bug 1232263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232282">SUSE bug 1232282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232285">SUSE bug 1232285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232286">SUSE bug 1232286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232304">SUSE bug 1232304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232305">SUSE bug 1232305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232307">SUSE bug 1232307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232309">SUSE bug 1232309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232310">SUSE bug 1232310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232313">SUSE bug 1232313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232314">SUSE bug 1232314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232316">SUSE bug 1232316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232329">SUSE bug 1232329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232332">SUSE bug 1232332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232335">SUSE bug 1232335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232337">SUSE bug 1232337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232342">SUSE bug 1232342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232345">SUSE bug 1232345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232352">SUSE bug 1232352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232354">SUSE bug 1232354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232355">SUSE bug 1232355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232358">SUSE bug 1232358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232361">SUSE bug 1232361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232366">SUSE bug 1232366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232367">SUSE bug 1232367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232368">SUSE bug 1232368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232369">SUSE bug 1232369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232374">SUSE bug 1232374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232381">SUSE bug 1232381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232383">SUSE bug 1232383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232392">SUSE bug 1232392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232395">SUSE bug 1232395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232418">SUSE bug 1232418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232424">SUSE bug 1232424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232432">SUSE bug 1232432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232435">SUSE bug 1232435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232442">SUSE bug 1232442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232446">SUSE bug 1232446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232501">SUSE bug 1232501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232519">SUSE bug 1232519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232630">SUSE bug 1232630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232631">SUSE bug 1232631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232632">SUSE bug 1232632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232757">SUSE bug 1232757</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47416/">CVE-2021-47416 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47416">CVE-2021-47416 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47534/">CVE-2021-47534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47534">CVE-2021-47534 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3435/">CVE-2022-3435 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3435">CVE-2022-3435 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-45934/">CVE-2022-45934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45934">CVE-2022-45934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48664/">CVE-2022-48664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48664">CVE-2022-48664 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48879/">CVE-2022-48879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48879">CVE-2022-48879 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48946/">CVE-2022-48946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48946">CVE-2022-48946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48947/">CVE-2022-48947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48947">CVE-2022-48947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48948/">CVE-2022-48948 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48948">CVE-2022-48948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48949/">CVE-2022-48949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48949">CVE-2022-48949 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48951/">CVE-2022-48951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48951">CVE-2022-48951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48953/">CVE-2022-48953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48953">CVE-2022-48953 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48954/">CVE-2022-48954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48954">CVE-2022-48954 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48955/">CVE-2022-48955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48955">CVE-2022-48955 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48956/">CVE-2022-48956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48956">CVE-2022-48956 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48957/">CVE-2022-48957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48957">CVE-2022-48957 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48958/">CVE-2022-48958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48958">CVE-2022-48958 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48959/">CVE-2022-48959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48959">CVE-2022-48959 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48960/">CVE-2022-48960 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48960">CVE-2022-48960 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48961/">CVE-2022-48961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48961">CVE-2022-48961 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48962/">CVE-2022-48962 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48962">CVE-2022-48962 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48966/">CVE-2022-48966 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48966">CVE-2022-48966 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48967/">CVE-2022-48967 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48967">CVE-2022-48967 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48968/">CVE-2022-48968 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48968">CVE-2022-48968 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48969/">CVE-2022-48969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48969">CVE-2022-48969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48970/">CVE-2022-48970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48970">CVE-2022-48970 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48971/">CVE-2022-48971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48971">CVE-2022-48971 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48972/">CVE-2022-48972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48972">CVE-2022-48972 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48973/">CVE-2022-48973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48973">CVE-2022-48973 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48975/">CVE-2022-48975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48975">CVE-2022-48975 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48977/">CVE-2022-48977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48977">CVE-2022-48977 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48978/">CVE-2022-48978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48978">CVE-2022-48978 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48980/">CVE-2022-48980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48980">CVE-2022-48980 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48981/">CVE-2022-48981 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48981">CVE-2022-48981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48985/">CVE-2022-48985 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48985">CVE-2022-48985 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48987/">CVE-2022-48987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48987">CVE-2022-48987 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48988/">CVE-2022-48988 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48988">CVE-2022-48988 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48991/">CVE-2022-48991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48991">CVE-2022-48991 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48992/">CVE-2022-48992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48992">CVE-2022-48992 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48994/">CVE-2022-48994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48994">CVE-2022-48994 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48995/">CVE-2022-48995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48995">CVE-2022-48995 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" cvss4="1/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48997/">CVE-2022-48997 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48997">CVE-2022-48997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48999/">CVE-2022-48999 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48999">CVE-2022-48999 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49000/">CVE-2022-49000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49000">CVE-2022-49000 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49002/">CVE-2022-49002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49002">CVE-2022-49002 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49003/">CVE-2022-49003 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49003">CVE-2022-49003 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49005/">CVE-2022-49005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49005">CVE-2022-49005 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49006/">CVE-2022-49006 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49006">CVE-2022-49006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49007/">CVE-2022-49007 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49007">CVE-2022-49007 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49010/">CVE-2022-49010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49010">CVE-2022-49010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49011/">CVE-2022-49011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49011">CVE-2022-49011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49012/">CVE-2022-49012 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49012">CVE-2022-49012 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49014/">CVE-2022-49014 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49014">CVE-2022-49014 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49015/">CVE-2022-49015 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49015">CVE-2022-49015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49016/">CVE-2022-49016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49016">CVE-2022-49016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49017/">CVE-2022-49017 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49017">CVE-2022-49017 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49019/">CVE-2022-49019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49019">CVE-2022-49019 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49020/">CVE-2022-49020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49020">CVE-2022-49020 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49021/">CVE-2022-49021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49021">CVE-2022-49021 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49022/">CVE-2022-49022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49022">CVE-2022-49022 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49023/">CVE-2022-49023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49023">CVE-2022-49023 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49024/">CVE-2022-49024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49024">CVE-2022-49024 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49025/">CVE-2022-49025 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49025">CVE-2022-49025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49026/">CVE-2022-49026 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49026">CVE-2022-49026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49027/">CVE-2022-49027 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49027">CVE-2022-49027 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49028/">CVE-2022-49028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49028">CVE-2022-49028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49029/">CVE-2022-49029 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49029">CVE-2022-49029 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49031/">CVE-2022-49031 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49031">CVE-2022-49031 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49032/">CVE-2022-49032 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49032">CVE-2022-49032 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2166/">CVE-2023-2166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2166">CVE-2023-2166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28327/">CVE-2023-28327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28327">CVE-2023-28327 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52766/">CVE-2023-52766 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52766">CVE-2023-52766 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52800/">CVE-2023-52800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52800">CVE-2023-52800 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52881/">CVE-2023-52881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52881">CVE-2023-52881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52919/">CVE-2023-52919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52919">CVE-2023-52919 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6270/">CVE-2023-6270 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27043/">CVE-2024-27043 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27043">CVE-2024-27043 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36244/">CVE-2024-36244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36244">CVE-2024-36244 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36957/">CVE-2024-36957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36957">CVE-2024-36957 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39476/">CVE-2024-39476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39476">CVE-2024-39476 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40965/">CVE-2024-40965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40965">CVE-2024-40965 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42145/">CVE-2024-42145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42145">CVE-2024-42145 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42226/">CVE-2024-42226 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42226">CVE-2024-42226 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42253/">CVE-2024-42253 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42253">CVE-2024-42253 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44931/">CVE-2024-44931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44931">CVE-2024-44931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44947/">CVE-2024-44947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44947">CVE-2024-44947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44958/">CVE-2024-44958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44958">CVE-2024-44958 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45016/">CVE-2024-45016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45016">CVE-2024-45016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45025/">CVE-2024-45025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45025">CVE-2024-45025 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46678/">CVE-2024-46678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46678">CVE-2024-46678 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-46716/">CVE-2024-46716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46716">CVE-2024-46716 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46719/">CVE-2024-46719 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46719">CVE-2024-46719 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46754/">CVE-2024-46754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46754">CVE-2024-46754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46770/">CVE-2024-46770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46770">CVE-2024-46770 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46775/">CVE-2024-46775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46775">CVE-2024-46775 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46777/">CVE-2024-46777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46777">CVE-2024-46777 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46809/">CVE-2024-46809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46809">CVE-2024-46809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46811/">CVE-2024-46811 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46811">CVE-2024-46811 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46813/">CVE-2024-46813 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46813">CVE-2024-46813 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46814/">CVE-2024-46814 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46814">CVE-2024-46814 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46815/">CVE-2024-46815 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46815">CVE-2024-46815 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46816/">CVE-2024-46816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46816">CVE-2024-46816 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46817/">CVE-2024-46817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46817">CVE-2024-46817 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46818/">CVE-2024-46818 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46818">CVE-2024-46818 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46826/">CVE-2024-46826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46826">CVE-2024-46826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46828/">CVE-2024-46828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46828">CVE-2024-46828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46834/">CVE-2024-46834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46834">CVE-2024-46834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46840/">CVE-2024-46840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46840">CVE-2024-46840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46841/">CVE-2024-46841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46841">CVE-2024-46841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46848/">CVE-2024-46848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46848">CVE-2024-46848 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46849/">CVE-2024-46849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46849">CVE-2024-46849 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-46854/">CVE-2024-46854 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46854">CVE-2024-46854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46855/">CVE-2024-46855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46855">CVE-2024-46855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46857/">CVE-2024-46857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46857">CVE-2024-46857 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47660/">CVE-2024-47660 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47660">CVE-2024-47660 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47661/">CVE-2024-47661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47661">CVE-2024-47661 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47664/">CVE-2024-47664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47664">CVE-2024-47664 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47668/">CVE-2024-47668 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47668">CVE-2024-47668 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-47672/">CVE-2024-47672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47672">CVE-2024-47672 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-47673/">CVE-2024-47673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47673">CVE-2024-47673 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47674/">CVE-2024-47674 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47674">CVE-2024-47674 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47684/">CVE-2024-47684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47684">CVE-2024-47684 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47685/">CVE-2024-47685 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47685">CVE-2024-47685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47692/">CVE-2024-47692 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47692">CVE-2024-47692 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47704/">CVE-2024-47704 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47704">CVE-2024-47704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47705/">CVE-2024-47705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47705">CVE-2024-47705 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47706/">CVE-2024-47706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47706">CVE-2024-47706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47707/">CVE-2024-47707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47707">CVE-2024-47707 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47710/">CVE-2024-47710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47710">CVE-2024-47710 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47720/">CVE-2024-47720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47720">CVE-2024-47720 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47727/">CVE-2024-47727 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47727">CVE-2024-47727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47730/">CVE-2024-47730 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47730">CVE-2024-47730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47738/">CVE-2024-47738 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47738">CVE-2024-47738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47739/">CVE-2024-47739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47739">CVE-2024-47739 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47745/">CVE-2024-47745 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47745">CVE-2024-47745 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47747/">CVE-2024-47747 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47747">CVE-2024-47747 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47748/">CVE-2024-47748 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47748">CVE-2024-47748 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49858/">CVE-2024-49858 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49858">CVE-2024-49858 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49860/">CVE-2024-49860 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49860">CVE-2024-49860 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49866/">CVE-2024-49866 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49866">CVE-2024-49866 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49867/">CVE-2024-49867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49867">CVE-2024-49867 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49881/">CVE-2024-49881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49881">CVE-2024-49881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49882/">CVE-2024-49882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49882">CVE-2024-49882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49883/">CVE-2024-49883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49883">CVE-2024-49883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49886/">CVE-2024-49886 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49886">CVE-2024-49886 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49890/">CVE-2024-49890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49890">CVE-2024-49890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49892/">CVE-2024-49892 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49892">CVE-2024-49892 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49894/">CVE-2024-49894 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49894">CVE-2024-49894 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49895/">CVE-2024-49895 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49895">CVE-2024-49895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49896/">CVE-2024-49896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49896">CVE-2024-49896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49897/">CVE-2024-49897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49897">CVE-2024-49897 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49899/">CVE-2024-49899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49899">CVE-2024-49899 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49901/">CVE-2024-49901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49901">CVE-2024-49901 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49906/">CVE-2024-49906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49906">CVE-2024-49906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49908/">CVE-2024-49908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49908">CVE-2024-49908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49909/">CVE-2024-49909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49909">CVE-2024-49909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49911/">CVE-2024-49911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49911">CVE-2024-49911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49912/">CVE-2024-49912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49912">CVE-2024-49912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49913/">CVE-2024-49913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49913">CVE-2024-49913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49914/">CVE-2024-49914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49914">CVE-2024-49914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49917/">CVE-2024-49917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49917">CVE-2024-49917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49918/">CVE-2024-49918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49918">CVE-2024-49918 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49919/">CVE-2024-49919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49919">CVE-2024-49919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49920/">CVE-2024-49920 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49920">CVE-2024-49920 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49922/">CVE-2024-49922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49922">CVE-2024-49922 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49923/">CVE-2024-49923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49923">CVE-2024-49923 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49929/">CVE-2024-49929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49929">CVE-2024-49929 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49930/">CVE-2024-49930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49930">CVE-2024-49930 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49933/">CVE-2024-49933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49933">CVE-2024-49933 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49936/">CVE-2024-49936 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49936">CVE-2024-49936 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49939/">CVE-2024-49939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49939">CVE-2024-49939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49946/">CVE-2024-49946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49946">CVE-2024-49946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49949/">CVE-2024-49949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49949">CVE-2024-49949 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49954/">CVE-2024-49954 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49954">CVE-2024-49954 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49955/">CVE-2024-49955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49955">CVE-2024-49955 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49958/">CVE-2024-49958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49958">CVE-2024-49958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49959/">CVE-2024-49959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49959">CVE-2024-49959 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49960/">CVE-2024-49960 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49960">CVE-2024-49960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49962/">CVE-2024-49962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49962">CVE-2024-49962 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49967/">CVE-2024-49967 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49967">CVE-2024-49967 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49969/">CVE-2024-49969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49969">CVE-2024-49969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49973/">CVE-2024-49973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49973">CVE-2024-49973 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49974/">CVE-2024-49974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49974">CVE-2024-49974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49975/">CVE-2024-49975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49975">CVE-2024-49975 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49982/">CVE-2024-49982 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49982">CVE-2024-49982 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49991/">CVE-2024-49991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49991">CVE-2024-49991 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49993/">CVE-2024-49993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49993">CVE-2024-49993 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49995/">CVE-2024-49995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49995">CVE-2024-49995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49996/">CVE-2024-49996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49996">CVE-2024-49996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50000/">CVE-2024-50000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50000">CVE-2024-50000 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50001/">CVE-2024-50001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50001">CVE-2024-50001 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50002/">CVE-2024-50002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50002">CVE-2024-50002 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50006/">CVE-2024-50006 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50006">CVE-2024-50006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50014/">CVE-2024-50014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50014">CVE-2024-50014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50019/">CVE-2024-50019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50019">CVE-2024-50019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50024/">CVE-2024-50024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50024">CVE-2024-50024 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50028/">CVE-2024-50028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50028">CVE-2024-50028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50033/">CVE-2024-50033 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50033">CVE-2024-50033 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50035/">CVE-2024-50035 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50035">CVE-2024-50035 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50041/">CVE-2024-50041 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50041">CVE-2024-50041 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50045/">CVE-2024-50045 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50045">CVE-2024-50045 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50046/">CVE-2024-50046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50046">CVE-2024-50046 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50047/">CVE-2024-50047 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50047">CVE-2024-50047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50048/">CVE-2024-50048 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50048">CVE-2024-50048 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50049/">CVE-2024-50049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50049">CVE-2024-50049 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50055/">CVE-2024-50055 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50055">CVE-2024-50055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50058/">CVE-2024-50058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50058">CVE-2024-50058 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50059/">CVE-2024-50059 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50059">CVE-2024-50059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50061/">CVE-2024-50061 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50061">CVE-2024-50061 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50063/">CVE-2024-50063 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50063">CVE-2024-50063 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50081/">CVE-2024-50081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50081">CVE-2024-50081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952018" comment="cluster-md-kmp-rt-5.14.21-150500.13.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952019" comment="dlm-kmp-rt-5.14.21-150500.13.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952020" comment="gfs2-kmp-rt-5.14.21-150500.13.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952021" comment="kernel-devel-rt-5.14.21-150500.13.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952022" comment="kernel-rt-5.14.21-150500.13.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952023" comment="kernel-rt-devel-5.14.21-150500.13.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952024" comment="kernel-rt-extra-5.14.21-150500.13.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952025" comment="kernel-rt-livepatch-5.14.21-150500.13.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952026" comment="kernel-rt-livepatch-devel-5.14.21-150500.13.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952027" comment="kernel-rt-optional-5.14.21-150500.13.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952028" comment="kernel-rt-vdso-5.14.21-150500.13.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952029" comment="kernel-rt_debug-5.14.21-150500.13.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952030" comment="kernel-rt_debug-devel-5.14.21-150500.13.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952031" comment="kernel-rt_debug-livepatch-devel-5.14.21-150500.13.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952032" comment="kernel-rt_debug-vdso-5.14.21-150500.13.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952033" comment="kernel-source-rt-5.14.21-150500.13.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952034" comment="kernel-syms-rt-5.14.21-150500.13.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952035" comment="kselftests-kmp-rt-5.14.21-150500.13.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952036" comment="ocfs2-kmp-rt-5.14.21-150500.13.76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952037" comment="reiserfs-kmp-rt-5.14.21-150500.13.76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5087" version="1" class="patch">
	<metadata>
		<title>Security update for python3-wxPython (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1232590" ref_url="https://bugzilla.suse.com/1232590" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-50602" ref_url="https://www.suse.com/security/cve/CVE-2024-50602/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019820.html" source="SUSE-SU"/>
		<description>
This update for python3-wxPython fixes the following issues:

- CVE-2024-50602: Fixed a denial of service in the vendored libexpat's XML_ResumeParser function (bsc#1232590).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-11-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1232590">SUSE bug 1232590</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50602/">CVE-2024-50602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50602">CVE-2024-50602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952325" comment="python3-wxPython-4.1.1-150400.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952326" comment="python3-wxPython-lang-4.1.1-150400.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5088" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233165" ref_url="https://bugzilla.suse.com/1233165" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45802" ref_url="https://www.suse.com/security/cve/CVE-2023-45802/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:3999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019822.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2023-45802: Fixed regression with previous fix (bsc#1233165).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-15"/>
	<updated date="2024-11-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1233165">SUSE bug 1233165</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45802/">CVE-2023-45802 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45802">CVE-2023-45802 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009952327" comment="apache2-2.4.51-150400.6.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952328" comment="apache2-devel-2.4.51-150400.6.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952329" comment="apache2-doc-2.4.51-150400.6.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952330" comment="apache2-event-2.4.51-150400.6.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952331" comment="apache2-example-pages-2.4.51-150400.6.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952332" comment="apache2-prefork-2.4.51-150400.6.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952333" comment="apache2-utils-2.4.51-150400.6.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009952334" comment="apache2-worker-2.4.51-150400.6.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5089" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215868" ref_url="https://bugzilla.suse.com/1215868" source="BUGZILLA"/>
		<reference ref_id="1215869" ref_url="https://bugzilla.suse.com/1215869" source="BUGZILLA"/>
		<reference ref_id="1215870" ref_url="https://bugzilla.suse.com/1215870" source="BUGZILLA"/>
		<reference ref_id="1218032" ref_url="https://bugzilla.suse.com/1218032" source="BUGZILLA"/>
		<reference ref_id="1218033" ref_url="https://bugzilla.suse.com/1218033" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32359" ref_url="https://www.suse.com/security/cve/CVE-2023-32359/" source="CVE"/>
		<reference ref_id="CVE-2023-39928" ref_url="https://www.suse.com/security/cve/CVE-2023-39928/" source="CVE"/>
		<reference ref_id="CVE-2023-40451" ref_url="https://www.suse.com/security/cve/CVE-2023-40451/" source="CVE"/>
		<reference ref_id="CVE-2023-41074" ref_url="https://www.suse.com/security/cve/CVE-2023-41074/" source="CVE"/>
		<reference ref_id="CVE-2023-42883" ref_url="https://www.suse.com/security/cve/CVE-2023-42883/" source="CVE"/>
		<reference ref_id="CVE-2023-42890" ref_url="https://www.suse.com/security/cve/CVE-2023-42890/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017581.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- CVE-2023-42890: Fixed processing malicious web content may lead to arbitrary code execution (bsc#1218033).
- CVE-2023-42883: Fixed processing a malicious image may lead to a denial-of-service (bsc#1218032).
- CVE-2023-41074: Fixed use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (bsc#1215870).
- CVE-2023-40451, CVE-2023-41074: Update to version 2.42.4 (bsc#1218032, bsc#1215868).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-02"/>
	<updated date="2024-01-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1215868">SUSE bug 1215868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215869">SUSE bug 1215869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215870">SUSE bug 1215870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218032">SUSE bug 1218032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218033">SUSE bug 1218033</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32359/">CVE-2023-32359 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32359">CVE-2023-32359 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39928/">CVE-2023-39928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39928">CVE-2023-39928 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40451/">CVE-2023-40451 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40451">CVE-2023-40451 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-41074/">CVE-2023-41074 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41074">CVE-2023-41074 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42883/">CVE-2023-42883 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42883">CVE-2023-42883 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42890/">CVE-2023-42890 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42890">CVE-2023-42890 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009818055" comment="WebKitGTK-4.0-lang-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818056" comment="WebKitGTK-4.1-lang-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818057" comment="WebKitGTK-6.0-lang-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818058" comment="libjavascriptcoregtk-4_0-18-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818059" comment="libjavascriptcoregtk-4_0-18-32bit-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818060" comment="libjavascriptcoregtk-4_1-0-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818061" comment="libjavascriptcoregtk-4_1-0-32bit-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818062" comment="libjavascriptcoregtk-6_0-1-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818063" comment="libwebkit2gtk-4_0-37-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818064" comment="libwebkit2gtk-4_0-37-32bit-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818065" comment="libwebkit2gtk-4_1-0-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818066" comment="libwebkit2gtk-4_1-0-32bit-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818067" comment="libwebkitgtk-6_0-4-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818068" comment="typelib-1_0-JavaScriptCore-4_0-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818069" comment="typelib-1_0-JavaScriptCore-4_1-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818070" comment="typelib-1_0-JavaScriptCore-6_0-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818071" comment="typelib-1_0-WebKit-6_0-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818072" comment="typelib-1_0-WebKit2-4_0-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818073" comment="typelib-1_0-WebKit2-4_1-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818074" comment="typelib-1_0-WebKit2WebExtension-4_0-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818075" comment="typelib-1_0-WebKit2WebExtension-4_1-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818076" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818077" comment="webkit-jsc-4-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818078" comment="webkit-jsc-4.1-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818079" comment="webkit-jsc-6.0-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818080" comment="webkit2gtk-4_0-injected-bundles-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818081" comment="webkit2gtk-4_1-injected-bundles-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818082" comment="webkit2gtk3-devel-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818083" comment="webkit2gtk3-minibrowser-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818084" comment="webkit2gtk3-soup2-devel-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818085" comment="webkit2gtk3-soup2-minibrowser-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818086" comment="webkit2gtk4-devel-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818087" comment="webkit2gtk4-minibrowser-2.42.4-150400.4.70.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818088" comment="webkitgtk-6_0-injected-bundles-2.42.4-150400.4.70.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5090" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213933" ref_url="https://bugzilla.suse.com/1213933" source="BUGZILLA"/>
		<reference ref_id="1223142" ref_url="https://bugzilla.suse.com/1223142" source="BUGZILLA"/>
		<reference ref_id="1226759" ref_url="https://bugzilla.suse.com/1226759" source="BUGZILLA"/>
		<reference ref_id="1227341" ref_url="https://bugzilla.suse.com/1227341" source="BUGZILLA"/>
		<reference ref_id="1227578" ref_url="https://bugzilla.suse.com/1227578" source="BUGZILLA"/>
		<reference ref_id="1227606" ref_url="https://bugzilla.suse.com/1227606" source="BUGZILLA"/>
		<reference ref_id="1228424" ref_url="https://bugzilla.suse.com/1228424" source="BUGZILLA"/>
		<reference ref_id="1228685" ref_url="https://bugzilla.suse.com/1228685" source="BUGZILLA"/>
		<reference ref_id="1229108" ref_url="https://bugzilla.suse.com/1229108" source="BUGZILLA"/>
		<reference ref_id="1229260" ref_url="https://bugzilla.suse.com/1229260" source="BUGZILLA"/>
		<reference ref_id="1229432" ref_url="https://bugzilla.suse.com/1229432" source="BUGZILLA"/>
		<reference ref_id="1229437" ref_url="https://bugzilla.suse.com/1229437" source="BUGZILLA"/>
		<reference ref_id="1229501" ref_url="https://bugzilla.suse.com/1229501" source="BUGZILLA"/>
		<reference ref_id="1230136" ref_url="https://bugzilla.suse.com/1230136" source="BUGZILLA"/>
		<reference ref_id="1230139" ref_url="https://bugzilla.suse.com/1230139" source="BUGZILLA"/>
		<reference ref_id="1230285" ref_url="https://bugzilla.suse.com/1230285" source="BUGZILLA"/>
		<reference ref_id="1230288" ref_url="https://bugzilla.suse.com/1230288" source="BUGZILLA"/>
		<reference ref_id="1230745" ref_url="https://bugzilla.suse.com/1230745" source="BUGZILLA"/>
		<reference ref_id="1231157" ref_url="https://bugzilla.suse.com/1231157" source="BUGZILLA"/>
		<reference ref_id="1231206" ref_url="https://bugzilla.suse.com/1231206" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3978" ref_url="https://www.suse.com/security/cve/CVE-2023-3978/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019833.html" source="SUSE-SU"/>
		<description>
This update fixes the following issues:

golang-github-lusitaniae-apache_exporter:

- Security issues fixed:

  * CVE-2023-3978: Fixed security bug in x/net dependency (bsc#1213933)

- Other changes and issues fixed:

  * Delete unpackaged debug files for RHEL
  * Do not include source files in the package for RHEL 9
  * Require Go 1.20 when building for RedHat derivatives
  * Drop EnvironmentFile from the service definition
  * Explicitly unset $ARGS environment variable. Setting environment
    variables should be done in drop-in systemd configuration files.
  * Drop go_nostrip macro. It is not needed with current binutils and
    Go.
  * Migrate from `disabled` to `manual` source service type
  * Drop BuildRequires: golang-packaging
  * Upgrade to version 1.0.8 (bsc#1227341)
    + Update prometheus/client_golang to version 1.19.1
    + Update x/net to version 0.23.0
  * Upgrade to version 1.0.7
    + Update protobuf to version 1.33.0
    + Update prometheus/client_golang to version 1.19.0
    + Update prometheus/common to version 0.46.0
    + Standardize landing page
  * Upgrade to version 1.0.6
    + Update prometheus/exporter-toolkit to version 0.11.0
    + Update prometheus/client_golang to version 1.18.0
    + Add User-Agent header
  * Upgrade to version 1.0.4
    + Update x/crypto to version 0.17.0
    + Update alecthomas/kingpin/v2 to version 2.4.0
    + Update prometheus/common to version 0.45.0
  * Upgrade to version 1.0.3
    + Update prometheus/client_golang to version 1.17.0
    + Update x/net 0.17.0
  * Upgrade to version 1.0.1
    + Update prometheus/exporter-toolkit to version 0.10.0
    + Update prometheus/common to version 0.44.0
    + Update prometheus/client_golang to version 1.16.0

golang-github-prometheus-promu:

- Require Go &gt;= 1.21 for building
- Packaging improvements:
  * Drop export CGO_ENABLED='0'. Use the default unless there is a
    defined requirement or benefit (bsc#1230623).
- Update to version 0.16.0:
  * Do not discover user/host for reproducible builds
  * Fix example/prometheus build error
- Update to version 0.15.0:
  * Add linux/riscv64 to default platforms
  * Use yaml.Unmarshalstrict to validate configuration files

spacecmd:

- Version 5.0.10-0
  * Speed up softwarechannel_removepackages (bsc#1227606)
  * Fix error in 'kickstart_delete' when using wildcards
    (bsc#1227578)
  * Spacecmd bootstrap now works with specified port (bsc#1229437)
  * Fix sls backup creation as directory with spacecmd (bsc#1230745)

uyuni-common-libs:

- Version 5.0.5-0
  * Enforce directory permissions at repo-sync when creating
    directories (bsc#1229260)

uyuni-tools:

- version 0.1.23-0
  * Ensure namespace is defined in all kubernetes commands
  * Use SCC credentials to authenticate against registry.suse.com
    for kubernetes (bsc#1231157)
  * Fix namespace usage on mgrctl cp command
- version 0.1.22-0
  * Set projectId also for test packages/images
  * mgradm migration should not pull Confidential Computing and Hub
    image is replicas == 0 (bsc#1229432, bsc#1230136)
  * Do not allow SUSE Manager downgrade
  * Prevent completion issue when /var/log/uyuni-tools.log is missing
  * Fix proxy shared volume flag
  * During migration, exclude mgr-sync configuration file (bsc#1228685)
  * Migrate from PostgreSQL 14 to PostgreSQL 16 pg_hba.conf and
    postgresql.conf files (bsc#1231206)
  * During migration, handle empty autoinstallation path (bsc#1230285)
  * During migration, handle symlinks (bsc#1230288)
  * During migration, trust the remote sender's file list (bsc#1228424)
  * Use SCC flags during podman pull
  * Restore SELinux permission after migration (bsc#1229501)
  * Share volumes between containers (bsc#1223142)
  * Save supportconfig in current directory (bsc#1226759)
  * Fix error code handling on reinstallation (bsc#1230139)
  * Fix creating first user and organization
  * Add missing variable quotes for install vars (bsc#1229108)
  * Add API login and logout calls to allow persistent login

Changes that only impact SUSE Manager 4.3:

mgr-daemon:

- Version 4.3.11-0
  * Update translation strings

spacewalk-client-tools:

- Version 4.3.21-0
  * Update translation strings

		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-18"/>
	<updated date="2024-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213933">SUSE bug 1213933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223142">SUSE bug 1223142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226759">SUSE bug 1226759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227341">SUSE bug 1227341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227578">SUSE bug 1227578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227606">SUSE bug 1227606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228424">SUSE bug 1228424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228685">SUSE bug 1228685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229108">SUSE bug 1229108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229260">SUSE bug 1229260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229432">SUSE bug 1229432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229437">SUSE bug 1229437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229501">SUSE bug 1229501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230136">SUSE bug 1230136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230139">SUSE bug 1230139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230285">SUSE bug 1230285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230288">SUSE bug 1230288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230745">SUSE bug 1230745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231157">SUSE bug 1231157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231206">SUSE bug 1231206</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-3978/">CVE-2023-3978 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3978">CVE-2023-3978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953317" comment="golang-github-lusitaniae-apache_exporter-1.0.8-150000.1.23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953318" comment="golang-github-prometheus-promu-0.16.0-150000.3.21.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953319" comment="spacecmd-5.0.10-150000.3.127.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953320" comment="wire-0.6.0-150000.1.17.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5091" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1232579" ref_url="https://bugzilla.suse.com/1232579" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-50602" ref_url="https://www.suse.com/security/cve/CVE-2024-50602/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019824.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2024-50602: Fixed a denial of service via XML_ResumeParser (bsc#1232579).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-18"/>
	<updated date="2024-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1232579">SUSE bug 1232579</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50602/">CVE-2024-50602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50602">CVE-2024-50602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953321" comment="expat-2.4.4-150400.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953322" comment="libexpat-devel-2.4.4-150400.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953323" comment="libexpat-devel-32bit-2.4.4-150400.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953324" comment="libexpat1-2.4.4-150400.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953325" comment="libexpat1-32bit-2.4.4-150400.3.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5092" version="1" class="patch">
	<metadata>
		<title>Security update for httpcomponents-client, httpcomponents-core (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1177488" ref_url="https://bugzilla.suse.com/1177488" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13956" ref_url="https://www.suse.com/security/cve/CVE-2020-13956/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019823.html" source="SUSE-SU"/>
		<description>
This update for httpcomponents-client, httpcomponents-core fixes the following issues:

httpcomponents-client:
  - Update to version 4.5.14
    * HTTPCLIENT-2206: Corrected resource de-allocation by fluent
      response objects.
    * HTTPCLIENT-2174: URIBuilder to return a new empty list instead
      of unmodifiable Collections#emptyList.
    * Don't retry requests in case of NoRouteToHostException.
    * HTTPCLIENT-2144: RequestBuilder fails to correctly copy charset
      of requests with form url-encoded body.
    * PR #269: 4.5.x use array fill and more.
      + Use Arrays.fill().
      + Remove redundant modifiers.
      + Use Collections.addAll() and Collection.addAll() APIs instead of loops.
      + Remove redundant returns.
      + No need to explicitly declare an array when calling a vararg method.
      + Remote extra semicolons (;).
      + Use a 'L' instead of 'l' to make long literals more readable.
    * PublicSuffixListParser.parseByType(Reader) allocates but does
      not use a 256 char StringBuilder.
    * Incorrect handling of malformed authority component by
      URIUtils#extractHost (bsc#1177488, CVE-2020-13956).
    * Avoid updating Content-Length header in a 304 response.
    * Bug fix: BasicExpiresHandler is annotated as immutable but is
      not (#239)
    * HTTPCLIENT-2076: Fixed NPE in LaxExpiresHandler.

httpcomponents-core:
  - Upgraded to version 4.4.14
    * PR #231: 4.4.x Use better map apis and more.
      + Remove redundant modifiers.
      + Use Collections.addAll() API instead of loops.
      + Remove redundant returns.
      + No need to explicitly declare an array when calling a vararg method.
      + Remote extra semicolons (;).
    * Bug fix: Non-blocking TLSv1.3 connections can end up in an
      infinite event spin when closed concurrently by the local and
      the remote endpoints.
    * HTTPCORE-647: Non-blocking connection terminated due to
      'java.io.IOException: Broken pipe' can enter an infinite loop
      flushing buffered output data.
    * PR #201, HTTPCORE-634: Fix race condition in AbstractConnPool
      that can cause internal state corruption when persistent
      connections are manually removed from the pool.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-18"/>
	<updated date="2024-11-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177488">SUSE bug 1177488</bugzilla>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13956/">CVE-2020-13956 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-13956">CVE-2020-13956 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953326" comment="httpcomponents-client-4.5.14-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953327" comment="httpcomponents-client-cache-4.5.14-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953328" comment="httpcomponents-client-javadoc-4.5.14-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953329" comment="httpcomponents-core-4.4.14-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953330" comment="httpcomponents-core-javadoc-4.4.14-150200.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5093" version="1" class="patch">
	<metadata>
		<title>Security update for bea-stax, xstream (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233085" ref_url="https://bugzilla.suse.com/1233085" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-47072" ref_url="https://www.suse.com/security/cve/CVE-2024-47072/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019839.html" source="SUSE-SU"/>
		<description>
This update for bea-stax, xstream fixes the following issues:

- CVE-2024-47072: Fixed possible remote denial-of-service via a stack overflow (bsc#1233085).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-19"/>
	<updated date="2024-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1233085">SUSE bug 1233085</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47072/">CVE-2024-47072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47072">CVE-2024-47072 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009953452" comment="bea-stax-1.2.0-150200.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953453" comment="bea-stax-api-1.2.0-150200.11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953454" comment="xstream-1.4.21-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953455" comment="xstream-benchmark-1.4.21-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953456" comment="xstream-javadoc-1.4.21-150200.3.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009953457" comment="xstream-parent-1.4.21-150200.3.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5094" version="1" class="patch">
	<metadata>
		<title>Security update for govulncheck-vulndb (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="CVE-2024-10389" ref_url="https://www.suse.com/security/cve/CVE-2024-10389/" source="CVE"/>
		<reference ref_id="CVE-2024-10975" ref_url="https://www.suse.com/security/cve/CVE-2024-10975/" source="CVE"/>
		<reference ref_id="CVE-2024-45794" ref_url="https://www.suse.com/security/cve/CVE-2024-45794/" source="CVE"/>
		<reference ref_id="CVE-2024-48057" ref_url="https://www.suse.com/security/cve/CVE-2024-48057/" source="CVE"/>
		<reference ref_id="CVE-2024-51735" ref_url="https://www.suse.com/security/cve/CVE-2024-51735/" source="CVE"/>
		<reference ref_id="CVE-2024-51744" ref_url="https://www.suse.com/security/cve/CVE-2024-51744/" source="CVE"/>
		<reference ref_id="CVE-2024-51746" ref_url="https://www.suse.com/security/cve/CVE-2024-51746/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019840.html" source="SUSE-SU"/>
		<description>
This update for govulncheck-vulndb fixes the following issues:

- Update to version 0.0.20241112T145010 2024-11-12T14:50:10Z.
  Refs jsc#PED-11136
  Go CVE Numbering Authority IDs added or updated with aliases:
  * GO-2024-3250 CVE-2024-51744 GHSA-29wx-vh33-7x7r

- Update to version 0.0.20241108T172500 2024-11-08T17:25:00Z.
  Refs jsc#PED-11136
  Go CVE Numbering Authority IDs added or updated with aliases:
  * GO-2024-3260 CVE-2024-45794 GHSA-q78v-cv36-8fxj
  * GO-2024-3262 CVE-2024-10975 GHSA-2w5v-x29g-jw7j

- Update to version 0.0.20241106T172143 2024-11-06T17:21:43Z.
  Refs jsc#PED-11136
  Go CVE Numbering Authority IDs added or updated with aliases:
  * GO-2024-3251 CVE-2024-10389 GHSA-q3rp-vvm7-j8jg
  * GO-2024-3252 CVE-2024-51746 GHSA-8pmp-678w-c8xx
  * GO-2024-3253 CVE-2024-48057 GHSA-ghx4-cgxw-7h9p
  * GO-2024-3254 CVE-2024-51735 GHSA-wvv7-wm5v-w2gv
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2024-11-22"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10389/">CVE-2024-10389 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10389">CVE-2024-10389 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10975/">CVE-2024-10975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10975">CVE-2024-10975 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45794/">CVE-2024-45794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45794">CVE-2024-45794 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-48057/">CVE-2024-48057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-48057">CVE-2024-48057 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-51735/">CVE-2024-51735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51735">CVE-2024-51735 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-51744/">CVE-2024-51744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51744">CVE-2024-51744 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-51746/">CVE-2024-51746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51746">CVE-2024-51746 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954022" comment="govulncheck-vulndb-0.0.20241112T145010-150000.1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5095" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231879" ref_url="https://bugzilla.suse.com/1231879" source="BUGZILLA"/>
		<reference ref_id="1233355" ref_url="https://bugzilla.suse.com/1233355" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-10458" ref_url="https://www.suse.com/security/cve/CVE-2024-10458/" source="CVE"/>
		<reference ref_id="CVE-2024-10459" ref_url="https://www.suse.com/security/cve/CVE-2024-10459/" source="CVE"/>
		<reference ref_id="CVE-2024-10460" ref_url="https://www.suse.com/security/cve/CVE-2024-10460/" source="CVE"/>
		<reference ref_id="CVE-2024-10461" ref_url="https://www.suse.com/security/cve/CVE-2024-10461/" source="CVE"/>
		<reference ref_id="CVE-2024-10462" ref_url="https://www.suse.com/security/cve/CVE-2024-10462/" source="CVE"/>
		<reference ref_id="CVE-2024-10463" ref_url="https://www.suse.com/security/cve/CVE-2024-10463/" source="CVE"/>
		<reference ref_id="CVE-2024-10464" ref_url="https://www.suse.com/security/cve/CVE-2024-10464/" source="CVE"/>
		<reference ref_id="CVE-2024-10465" ref_url="https://www.suse.com/security/cve/CVE-2024-10465/" source="CVE"/>
		<reference ref_id="CVE-2024-10466" ref_url="https://www.suse.com/security/cve/CVE-2024-10466/" source="CVE"/>
		<reference ref_id="CVE-2024-10467" ref_url="https://www.suse.com/security/cve/CVE-2024-10467/" source="CVE"/>
		<reference ref_id="CVE-2024-11159" ref_url="https://www.suse.com/security/cve/CVE-2024-11159/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019842.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Mozilla Thunderbird 128.4.3
  * fixed: Folder corruption could cause Thunderbird to freeze
    and become unusable
  * fixed: Message corruption could be propagated when reading mbox
  * fixed: Folder compaction was not abandoned on shutdown
  * fixed: Folder compaction did not clean up on failure
  * fixed: Collapsed NNTP thread incorrectly indicated there were
    unread messages
  * fixed: Navigating to next unread message did not wait for all
    messages to be loaded
  * fixed: Applying column view to folder and children could
    break if folder error occurred
  * fixed: Remote content notifications were broken with
    encrypted messages
  * fixed: Updating criteria of a saved search resulted in poor
    search performance
  * fixed: Drop-downs may not work in some places
  * fixed: Security fixes
  MFSA 2024-61 (bsc#1233355)
  * CVE-2024-11159 Potential disclosure of plaintext in OpenPGP encrypted message

- Mozilla Thunderbird 128.4.2
  * changed: Increased the auto-compaction threshold to reduce
    frequency of compaction
  * fixed: New profile creation caused console errors
  * fixed: Repair folder could result in older messages showing
    wrong date and time
  * fixed: Recently deleted messages could become undeleted if
    message compaction failed
  * fixed: Visual and UX improvements
  * fixed: Clicking on an HTML button could cause Thunderbird to freeze
  * fixed: Messages could not be selected for dragging
  * fixed: Could not open attached file in a MIME encrypted message
  * fixed: Account creation 'Setup Documentation' link was broken
  * fixed: Unable to generate QR codes when exporting to mobile
    in some cases
  * fixed: Operating system reauthentication was missing when
    exporting QR codes for mobile
  * fixed: Could not drag all-day events from one day to another
    in week view

- Mozilla Thunderbird 128.4.1
  * new: Add the 20 year donation appeal

- Mozilla Thunderbird 128.4
  * new: Export Thunderbird account settings to Thunderbird
    Mobile via QRCode
  * fixed: Unable to send an unencrypted response to an OpenPGP
    encrypted message
  * fixed: Thunderbird update did not update language pack
    version until another restart
  * fixed: Security fixes
  MFSA 2024-58 (bsc#1231879)
  * CVE-2024-10458 Permission leak via embed or object elements
  * CVE-2024-10459 Use-after-free in layout with accessibility
  * CVE-2024-10460 Confusing display of origin for external protocol handler prompt
  * CVE-2024-10461 XSS due to Content-Disposition being ignored in multipart/x-mixed-replace response
  * CVE-2024-10462 Origin of permission prompt could be spoofed by long URL
  * CVE-2024-10463 Cross origin video frame leak
  * CVE-2024-10464 History interface could have been used to cause a Denial of Service condition in the browser
  * CVE-2024-10465 Clipboard 'paste' button persisted across tabs
  * CVE-2024-10466 DOM push subscription message could hang Firefox
  * CVE-2024-10467 Memory safety bugs fixed in Firefox 132, Thunderbird 132, Firefox ESR 128.4, and Thunderbird 128.4
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-25"/>
	<updated date="2024-11-25"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1231879">SUSE bug 1231879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233355">SUSE bug 1233355</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10458/">CVE-2024-10458 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10458">CVE-2024-10458 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10459/">CVE-2024-10459 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10459">CVE-2024-10459 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10460/">CVE-2024-10460 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10460">CVE-2024-10460 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10461/">CVE-2024-10461 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10461">CVE-2024-10461 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10462/">CVE-2024-10462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10462">CVE-2024-10462 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10463/">CVE-2024-10463 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10463">CVE-2024-10463 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10464/">CVE-2024-10464 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10464">CVE-2024-10464 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10465/">CVE-2024-10465 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10465">CVE-2024-10465 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10466/">CVE-2024-10466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10466">CVE-2024-10466 at NVD</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10467/">CVE-2024-10467 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10467">CVE-2024-10467 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11159/">CVE-2024-11159 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11159">CVE-2024-11159 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009954749" comment="MozillaThunderbird-128.4.3-150200.8.188.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954750" comment="MozillaThunderbird-translations-common-128.4.3-150200.8.188.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954751" comment="MozillaThunderbird-translations-other-128.4.3-150200.8.188.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5096" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233313" ref_url="https://bugzilla.suse.com/1233313" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21820" ref_url="https://www.suse.com/security/cve/CVE-2024-21820/" source="CVE"/>
		<reference ref_id="CVE-2024-21853" ref_url="https://www.suse.com/security/cve/CVE-2024-21853/" source="CVE"/>
		<reference ref_id="CVE-2024-23918" ref_url="https://www.suse.com/security/cve/CVE-2024-23918/" source="CVE"/>
		<reference ref_id="CVE-2024-23984" ref_url="https://www.suse.com/security/cve/CVE-2024-23984/" source="CVE"/>
		<reference ref_id="CVE-2024-24968" ref_url="https://www.suse.com/security/cve/CVE-2024-24968/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019845.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Intel CPU Microcode was updated to the 20241112 release (bsc#1233313)
  - CVE-2024-21853: Faulty finite state machines (FSMs) in the hardware logic in some 4th and 5th Generation Intel Xeon Processors may allow an authorized user to potentially enable denial of service via local access.
  - CVE-2024-23918: Improper conditions check in some Intel Xeon processor memory controller configurations when using Intel SGX may allow a privileged user to potentially enable escalation of privilege via local access.
  - CVE-2024-21820: Incorrect default permissions in some Intel Xeon processor memory controller configurations when using Intel SGX may allow a privileged user to potentially enable escalation of privilege via local access.
  - CVE-2024-24968: Improper finite state machines (FSMs) in hardware logic in some Intel Processors may allow an privileged user to potentially enable a denial of service via local access.
  - CVE-2024-23984: Observable discrepancy in RAPL interface for some Intel Processors may allow a privileged user to potentially enable information disclosure via local access.
  - Update for functional issues. 
  New Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  Updated Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | ADL            | C0       | 06-97-02/07 | 00000036 | 00000037 | Core Gen12
  | ADL            | H0       | 06-97-05/07 | 00000036 | 00000037 | Core Gen12
  | ADL            | L0       | 06-9a-03/80 | 00000434 | 00000435 | Core Gen12
  | ADL            | R0       | 06-9a-04/80 | 00000434 | 00000435 | Core Gen12
  | EMR-SP         | A0       | 06-cf-01/87 | 21000230 | 21000283 | Xeon Scalable Gen5
  | EMR-SP         | A1       | 06-cf-02/87 | 21000230 | 21000283 | Xeon Scalable Gen5
  | MTL            | C0       | 06-aa-04/e6 | 0000001f | 00000020 | Core™ Ultra Processor
  | RPL-H/P/PX 6+8 | J0       | 06-ba-02/e0 | 00004122 | 00004123 | Core Gen13
  | RPL-HX/S       | C0       | 06-bf-02/07 | 00000036 | 00000037 | Core Gen13/Gen14
  | RPL-S          | H0       | 06-bf-05/07 | 00000036 | 00000037 | Core Gen13/Gen14
  | RPL-U 2+8      | Q0       | 06-ba-03/e0 | 00004122 | 00004123 | Core Gen13
  | SPR-SP         | E3       | 06-8f-06/87 | 2b0005c0 | 2b000603 | Xeon Scalable Gen4
  | SPR-SP         | E4/S2    | 06-8f-07/87 | 2b0005c0 | 2b000603 | Xeon Scalable Gen4
  | SPR-SP         | E5/S3    | 06-8f-08/87 | 2b0005c0 | 2b000603 | Xeon Scalable Gen4
  New Disclosures Updated in Prior Releases:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | ICL-D          | B0       | 06-6c-01/10 | 010002b0 | N/A      | Xeon D-17xx/D-18xx, D-27xx/D-28xx
  | ICX-SP         | Dx/M1    | 06-6a-06/87 | 0d0003e7 | N/A      | Xeon Scalable Gen3

- Intel CPU Microcode was updated to the 20241029 release
  Update for functional issues. 
  Updated Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | RPL-E/HX/S     | B0       | 06-b7-01/32 | 00000129 | 0000012b | Core Gen13/Gen14
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-26"/>
	<updated date="2024-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1233313">SUSE bug 1233313</bugzilla>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21820/">CVE-2024-21820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21820">CVE-2024-21820 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21853/">CVE-2024-21853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21853">CVE-2024-21853 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="8.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-23918/">CVE-2024-23918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23918">CVE-2024-23918 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-23984/">CVE-2024-23984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23984">CVE-2024-23984 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-24968/">CVE-2024-24968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24968">CVE-2024-24968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954845" comment="ucode-intel-20241112-150200.50.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5097" version="1" class="patch">
	<metadata>
		<title>Security update for javapackages-tools, xmlgraphics-batik, xmlgraphics-commons, xmlgraphics-fop (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231347" ref_url="https://bugzilla.suse.com/1231347" source="BUGZILLA"/>
		<reference ref_id="1231428" ref_url="https://bugzilla.suse.com/1231428" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-28168" ref_url="https://www.suse.com/security/cve/CVE-2024-28168/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019844.html" source="SUSE-SU"/>
		<description>
This update for javapackages-tools, xmlgraphics-batik, xmlgraphics-commons, xmlgraphics-fop fixes the following issues:

xmlgraphics-fop was updated from version 2.8 to 2.10:
 
- Security issues fixed:

  * CVE-2024-28168: Fixed improper restriction of XML External Entity (XXE) reference (bsc#1231428)
    
- Upstream changes and bugs fixed:

  * Version 2.10:

    + footnote-body ignores rl-tb writing mode
    + SVG tspan content is displayed out of place
    + Added new schema to handle pdf/a and pdfa/ua
    + Correct fop version at runtime
    + NoSuchElementException when using font with no family name
    + Resolve classpath for binary distribution
    + Switch to spotbugs
    + Set an automatic module name
    + Rename packages to avoid conflicts with modules
    + Resize table only for multicolumn page
    + Missing jars in servlet
    + Optimise performance of PNG with alpha using raw loader
    + basic-link not navigating to corresponding footnote
    + Added option to sign PDF
    + Added secure processing for XSL input
    + Allow sections which need security permissions to be run when AllPermission denied in caller code
    + Remove unused PDFStructElem
    + Remove space generated by fo:wrapper
    + Reset content length for table changing ipd
    + Added alt text to PDF signature
    + Allow change of resource level for SVG in AFP
    + Exclude shape not in clipping path for AFP
    + Only support 1 column for redo of layout without page pos only
    + Switch to Jakarta servlet API
    + NPE when list item is split alongside an ipd change
    + Added mandatory MODCA triplet to AFP
    + Redo layout for multipage columns
    + Added image mask option for AFP
    + Skip written block ipds inside float
    + Allow curly braces for src url
    + Missing content for last page with change ipd
    + Added warning when different pdf languages are used
    + Only restart line manager when there is a linebreak for blocklayout

  * Version 2.9:

    + Values in PDF Number Trees must be indirect references
    + Do not delete files on syntax errors using command line
    + Surrogate pair edge-case causes Exception
    + Reset character spacing
    + SVG text containing certain glyphs isn't rendered
    + Remove duplicate classes from maven classpath
    + Allow use of page position only on redo of layout
    + Failure to render multi-block itemBody alongside float
    + Update to PDFBox 2.0.27
    + NPE if link destination is missing with accessibility
    + Make property cache thread safe
    + Font size was rounded to 0 for AFP TTF
    + Cannot process a SVG using mvn jars
    + Remove serializer jar
    + Allow creating a PDF 2.0 document
    + Text missing after page break inside table inline
    + IllegalArgumentException for list in a table
    + Table width may be too wide when layout width changes
    + NPE when using broken link and PDF 1.5
    + Allow XMP at PDF page level
    + Symbol font was not being mapped to unicode
    + Correct font differences table for Chrome
    + Link against Java 8 API
    + Added support for font-selection-strategy=character-by-character
    + Merge form fields in external PDFs
    + Fixed test for Java 11

xmlgraphics-batik was updated from version 1.17 to 1.18:

- PNG transcoder references nonexistent class
- Set offset to 0 if missing in stop tag
- Validate throws NPE
- Fixed missing arabic characters
- Animated rotate tranform ignores y-origin at exactly 270 degrees
- Set an automatic module name
- Ignore inkscape properties
- Switch to spotbugs
- Allow source and target resolution configuration

xmlgraphics-commons was updated from version 2.8 to 2.10:

- Fixed test for Java 11
- Allow XMP at PDF page level
- Allow source resolution configuration
- Added new schema to handle pdf/a and pdfa/ua
- Set an automatic module name
- Switch to spotbugs
- Do not use a singleton for ImageImplRegistry

javapackages-tools was updated from version 6.3.0 to 6.3.4:

- Version 6.3.4:

  * A corner case when which is not present
  * Remove dependency on which
  * Simplify after the which -&gt; type -p change
  * jpackage_script: Remove pointless assignment when %java_home is unset
  * Don't export JAVA_HOME (bsc#1231347)

- Version 6.3.2:

  * Search for JAVACMD under JAVA_HOME only if it's set
  * Obsolete set_jvm and set_jvm_dirs functions
  * Drop unneeded _set_java_home function
  * Remove JAVA_HOME check from check_java_env function
  * Bump codecov/codecov-action from 2.0.2 to 4.6.0
  * Bump actions/setup-python from 4 to 5
  * Bump actions/checkout from 2 to 4
  * Added custom dependabot config
  * Remove the test for JAVA_HOME and error if it is not set
  * java-functions: Remove unneeded local variables
  * Fixed build status shield

- Version 6.3.1:

  * Allow missing components with abs2rel
  * Fixed tests with python 3.4
  * Sync spec file from Fedora
  * Drop default JRE/JDK
  * Fixed the use of java-functions in scripts
  * Test that we don't bomb on &lt;relativePath/&gt;
  * Test variable expansion in artifactId
  * Interpolate properties also in the current artifact
  * Rewrite abs2rel in shell
  * Use asciidoctor instead of asciidoc
  * Fixed incompatibility with RPM 4.20
  * Reproducible exclusions order in maven metadata
  * Do not bomb on &lt;relativePath/&gt; construct
  * Make maven_depmap order of aliases reproducible
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-26"/>
	<updated date="2024-11-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1231347">SUSE bug 1231347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231428">SUSE bug 1231428</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28168/">CVE-2024-28168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28168">CVE-2024-28168 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009954846" comment="javapackages-filesystem-6.3.4-150200.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954847" comment="javapackages-gradle-6.3.4-150200.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954848" comment="javapackages-ivy-6.3.4-150200.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954849" comment="javapackages-local-6.3.4-150200.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954850" comment="javapackages-tools-6.3.4-150200.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954851" comment="python3-javapackages-6.3.4-150200.3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954852" comment="xmlgraphics-batik-1.18-150200.4.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954853" comment="xmlgraphics-batik-css-1.18-150200.4.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954854" comment="xmlgraphics-batik-demo-1.18-150200.4.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954855" comment="xmlgraphics-batik-javadoc-1.18-150200.4.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954856" comment="xmlgraphics-batik-rasterizer-1.18-150200.4.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954857" comment="xmlgraphics-batik-slideshow-1.18-150200.4.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954858" comment="xmlgraphics-batik-squiggle-1.18-150200.4.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954859" comment="xmlgraphics-batik-svgpp-1.18-150200.4.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954860" comment="xmlgraphics-batik-ttf2svg-1.18-150200.4.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954861" comment="xmlgraphics-commons-2.10-150200.3.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954862" comment="xmlgraphics-commons-javadoc-2.10-150200.3.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009954863" comment="xmlgraphics-fop-2.10-150200.13.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5098" version="1" class="patch">
	<metadata>
		<title>Security update for hplip (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1209401" ref_url="https://bugzilla.suse.com/1209401" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2024:4076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019856.html" source="SUSE-SU"/>
		<description>
This update for hplip fixes the following issues:

- hpmud: sanitize printer serial number (bsc#1209401)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-27"/>
	<updated date="2024-11-27"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1209401">SUSE bug 1209401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955049" comment="hplip-3.21.10-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955050" comment="hplip-devel-3.21.10-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955051" comment="hplip-hpijs-3.21.10-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955052" comment="hplip-sane-3.21.10-150400.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955053" comment="hplip-scan-utils-3.21.10-150400.3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5099" version="1" class="patch">
	<metadata>
		<title>Security update for python-aiohttp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233447" ref_url="https://bugzilla.suse.com/1233447" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-52304" ref_url="https://www.suse.com/security/cve/CVE-2024-52304/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019855.html" source="SUSE-SU"/>
		<description>
This update for python-aiohttp fixes the following issues:

- CVE-2024-52304: Fixed request smuggling due to incorrect parsing of chunk extensions (bsc#1233447)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-27"/>
	<updated date="2024-11-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1233447">SUSE bug 1233447</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-52304/">CVE-2024-52304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52304">CVE-2024-52304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955054" comment="python311-aiohttp-3.9.3-150400.10.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5100" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233282" ref_url="https://bugzilla.suse.com/1233282" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-52533" ref_url="https://www.suse.com/security/cve/CVE-2024-52533/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019854.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2024-52533: Fixed a single byte buffer overflow (bsc#1233282).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-27"/>
	<updated date="2024-11-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1233282">SUSE bug 1233282</bugzilla>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52533/">CVE-2024-52533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52533">CVE-2024-52533 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955055" comment="gio-branding-upstream-2.70.5-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955056" comment="glib2-devel-2.70.5-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955057" comment="glib2-devel-32bit-2.70.5-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955058" comment="glib2-devel-static-2.70.5-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955059" comment="glib2-doc-2.70.5-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955060" comment="glib2-lang-2.70.5-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955061" comment="glib2-tests-devel-2.70.5-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955062" comment="glib2-tools-2.70.5-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955063" comment="glib2-tools-32bit-2.70.5-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955064" comment="libgio-2_0-0-2.70.5-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955065" comment="libgio-2_0-0-32bit-2.70.5-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955066" comment="libglib-2_0-0-2.70.5-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955067" comment="libglib-2_0-0-32bit-2.70.5-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955068" comment="libgmodule-2_0-0-2.70.5-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955069" comment="libgmodule-2_0-0-32bit-2.70.5-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955070" comment="libgobject-2_0-0-2.70.5-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955071" comment="libgobject-2_0-0-32bit-2.70.5-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955072" comment="libgthread-2_0-0-2.70.5-150400.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955073" comment="libgthread-2_0-0-32bit-2.70.5-150400.3.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5101" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233695" ref_url="https://bugzilla.suse.com/1233695" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-11691" ref_url="https://www.suse.com/security/cve/CVE-2024-11691/" source="CVE"/>
		<reference ref_id="CVE-2024-11692" ref_url="https://www.suse.com/security/cve/CVE-2024-11692/" source="CVE"/>
		<reference ref_id="CVE-2024-11693" ref_url="https://www.suse.com/security/cve/CVE-2024-11693/" source="CVE"/>
		<reference ref_id="CVE-2024-11694" ref_url="https://www.suse.com/security/cve/CVE-2024-11694/" source="CVE"/>
		<reference ref_id="CVE-2024-11695" ref_url="https://www.suse.com/security/cve/CVE-2024-11695/" source="CVE"/>
		<reference ref_id="CVE-2024-11696" ref_url="https://www.suse.com/security/cve/CVE-2024-11696/" source="CVE"/>
		<reference ref_id="CVE-2024-11697" ref_url="https://www.suse.com/security/cve/CVE-2024-11697/" source="CVE"/>
		<reference ref_id="CVE-2024-11698" ref_url="https://www.suse.com/security/cve/CVE-2024-11698/" source="CVE"/>
		<reference ref_id="CVE-2024-11699" ref_url="https://www.suse.com/security/cve/CVE-2024-11699/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019860.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 128.5.0 ESR, fixed various security fixes 
and other quality improvements, MFSA 2024-64 (bsc#1233695):

* CVE-2024-11691: Memory corruption in Apple GPU drivers
* CVE-2024-11692: Select list elements could be shown over another site
* CVE-2024-11693: Download Protections were bypassed by .library-ms files on Windows
* CVE-2024-11694: CSP Bypass and XSS Exposure via Web Compatibility Shims
* CVE-2024-11695: URL Bar Spoofing via Manipulated Punycode and Whitespace Characters
* CVE-2024-11696: Unhandled Exception in Add-on Signature Verification
* CVE-2024-11697: Inproper Keypress Handling in Executable File Confirmation Dialog
* CVE-2024-11698: Fullscreen Lock-Up When Modal Dialog Interrupts Transition on macOS
* CVE-2024-11699: Memory safety bugs fixed in Firefox 133, Firefox ESR 128.5, and Thunderbird 128.5
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-28"/>
	<updated date="2024-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1233695">SUSE bug 1233695</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11691/">CVE-2024-11691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11691">CVE-2024-11691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11692/">CVE-2024-11692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11692">CVE-2024-11692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11693/">CVE-2024-11693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11693">CVE-2024-11693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11694/">CVE-2024-11694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11694">CVE-2024-11694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11695/">CVE-2024-11695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11695">CVE-2024-11695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11696/">CVE-2024-11696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11696">CVE-2024-11696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11697/">CVE-2024-11697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11697">CVE-2024-11697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11698/">CVE-2024-11698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11698">CVE-2024-11698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11699/">CVE-2024-11699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11699">CVE-2024-11699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955250" comment="MozillaFirefox-128.5.0-150200.152.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955251" comment="MozillaFirefox-branding-upstream-128.5.0-150200.152.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955252" comment="MozillaFirefox-devel-128.5.0-150200.152.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955253" comment="MozillaFirefox-translations-common-128.5.0-150200.152.161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955254" comment="MozillaFirefox-translations-other-128.5.0-150200.152.161.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5102" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1225889" ref_url="https://bugzilla.suse.com/1225889" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-1298" ref_url="https://www.suse.com/security/cve/CVE-2024-1298/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019859.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

- CVE-2024-1298: Fixed potential UINT32 overflow in S3 ResumeCount (bsc#1225889).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-28"/>
	<updated date="2024-11-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1225889">SUSE bug 1225889</bugzilla>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1298/">CVE-2024-1298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1298">CVE-2024-1298 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955255" comment="ovmf-202208-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955256" comment="ovmf-tools-202208-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955257" comment="qemu-ovmf-ia32-202208-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955258" comment="qemu-ovmf-x86_64-202208-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955259" comment="qemu-ovmf-x86_64-debug-202208-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955260" comment="qemu-uefi-aarch32-202208-150500.6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955261" comment="qemu-uefi-aarch64-202208-150500.6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5103" version="1" class="patch">
	<metadata>
		<title>Security update for frr (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="CVE-2023-31489" ref_url="https://www.suse.com/security/cve/CVE-2023-31489/" source="CVE"/>
		<reference ref_id="CVE-2023-31490" ref_url="https://www.suse.com/security/cve/CVE-2023-31490/" source="CVE"/>
		<reference ref_id="CVE-2023-3748" ref_url="https://www.suse.com/security/cve/CVE-2023-3748/" source="CVE"/>
		<reference ref_id="CVE-2023-38406" ref_url="https://www.suse.com/security/cve/CVE-2023-38406/" source="CVE"/>
		<reference ref_id="CVE-2023-38407" ref_url="https://www.suse.com/security/cve/CVE-2023-38407/" source="CVE"/>
		<reference ref_id="CVE-2023-38802" ref_url="https://www.suse.com/security/cve/CVE-2023-38802/" source="CVE"/>
		<reference ref_id="CVE-2023-41358" ref_url="https://www.suse.com/security/cve/CVE-2023-41358/" source="CVE"/>
		<reference ref_id="CVE-2023-41360" ref_url="https://www.suse.com/security/cve/CVE-2023-41360/" source="CVE"/>
		<reference ref_id="CVE-2023-41909" ref_url="https://www.suse.com/security/cve/CVE-2023-41909/" source="CVE"/>
		<reference ref_id="CVE-2023-46752" ref_url="https://www.suse.com/security/cve/CVE-2023-46752/" source="CVE"/>
		<reference ref_id="CVE-2023-46753" ref_url="https://www.suse.com/security/cve/CVE-2023-46753/" source="CVE"/>
		<reference ref_id="CVE-2023-47234" ref_url="https://www.suse.com/security/cve/CVE-2023-47234/" source="CVE"/>
		<reference ref_id="CVE-2023-47235" ref_url="https://www.suse.com/security/cve/CVE-2023-47235/" source="CVE"/>
		<reference ref_id="CVE-2024-27913" ref_url="https://www.suse.com/security/cve/CVE-2024-27913/" source="CVE"/>
		<reference ref_id="CVE-2024-31948" ref_url="https://www.suse.com/security/cve/CVE-2024-31948/" source="CVE"/>
		<reference ref_id="CVE-2024-31950" ref_url="https://www.suse.com/security/cve/CVE-2024-31950/" source="CVE"/>
		<reference ref_id="CVE-2024-31951" ref_url="https://www.suse.com/security/cve/CVE-2024-31951/" source="CVE"/>
		<reference ref_id="CVE-2024-34088" ref_url="https://www.suse.com/security/cve/CVE-2024-34088/" source="CVE"/>
		<reference ref_id="CVE-2024-44070" ref_url="https://www.suse.com/security/cve/CVE-2024-44070/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019857.html" source="SUSE-SU"/>
		<description>
This update for frr fixes the following issues:

Update to frr 8.5.6 (jsc#PED-PED-11092) including fixes for:

- CVE-2024-44070,CVE-2024-34088,CVE-2024-31951,CVE-2024-31950,
  CVE-2024-31948,CVE-2024-27913,CVE-2023-47235,CVE-2023-47234,
  CVE-2023-46753,CVE-2023-46752,CVE-2023-41909,CVE-2023-41360,
  CVE-2023-41358,CVE-2023-38802,CVE-2023-38407,CVE-2023-38406,
  CVE-2023-3748,CVE-2023-31490,CVE-2023-31489 and other bugfixes.
  See https://frrouting.org/release/8.5.6/ for details.

The most recent frr 8.x series provides several new features,
improvements and bug fixes for various protocols and daemons,
especially for PIM/PIMv6/BGP and VRF support.

See https://frrouting.org/release/8.5/ for details and links.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-28"/>
	<updated date="2024-11-28"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31489/">CVE-2023-31489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31489">CVE-2023-31489 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31490/">CVE-2023-31490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31490">CVE-2023-31490 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3748/">CVE-2023-3748 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3748">CVE-2023-3748 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38406/">CVE-2023-38406 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38406">CVE-2023-38406 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38407/">CVE-2023-38407 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38407">CVE-2023-38407 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38802/">CVE-2023-38802 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38802">CVE-2023-38802 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-41358/">CVE-2023-41358 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41358">CVE-2023-41358 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-41360/">CVE-2023-41360 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41360">CVE-2023-41360 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-41909/">CVE-2023-41909 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41909">CVE-2023-41909 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46752/">CVE-2023-46752 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46752">CVE-2023-46752 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46753/">CVE-2023-46753 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46753">CVE-2023-46753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47234/">CVE-2023-47234 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47234">CVE-2023-47234 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47235/">CVE-2023-47235 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47235">CVE-2023-47235 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27913/">CVE-2024-27913 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27913">CVE-2024-27913 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31948/">CVE-2024-31948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31948">CVE-2024-31948 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31950/">CVE-2024-31950 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31950">CVE-2024-31950 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31951/">CVE-2024-31951 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31951">CVE-2024-31951 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34088/">CVE-2024-34088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34088">CVE-2024-34088 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44070/">CVE-2024-44070 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44070">CVE-2024-44070 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955262" comment="frr-8.5.6-150500.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955263" comment="frr-devel-8.5.6-150500.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955264" comment="libfrr0-8.5.6-150500.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955265" comment="libfrr_pb0-8.5.6-150500.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955266" comment="libfrrcares0-8.5.6-150500.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955267" comment="libfrrfpm_pb0-8.5.6-150500.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955268" comment="libfrrospfapiclient0-8.5.6-150500.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955269" comment="libfrrsnmp0-8.5.6-150500.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955270" comment="libfrrzmq0-8.5.6-150500.4.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955271" comment="libmlag_pb0-8.5.6-150500.4.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5104" version="1" class="patch">
	<metadata>
		<title>Security update for python-virtualenv (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233706" ref_url="https://bugzilla.suse.com/1233706" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-53899" ref_url="https://www.suse.com/security/cve/CVE-2024-53899/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019862.html" source="SUSE-SU"/>
		<description>
This update for python-virtualenv fixes the following issues:

- CVE-2024-53899: Fixed a command injection through activation scripts (bsc#1233706)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-28"/>
	<updated date="2024-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1233706">SUSE bug 1233706</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53899/">CVE-2024-53899 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53899">CVE-2024-53899 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955272" comment="python311-virtualenv-20.22.0-150400.9.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5105" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233323" ref_url="https://bugzilla.suse.com/1233323" source="BUGZILLA"/>
		<reference ref_id="1233325" ref_url="https://bugzilla.suse.com/1233325" source="BUGZILLA"/>
		<reference ref_id="1233326" ref_url="https://bugzilla.suse.com/1233326" source="BUGZILLA"/>
		<reference ref_id="1233327" ref_url="https://bugzilla.suse.com/1233327" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-10976" ref_url="https://www.suse.com/security/cve/CVE-2024-10976/" source="CVE"/>
		<reference ref_id="CVE-2024-10977" ref_url="https://www.suse.com/security/cve/CVE-2024-10977/" source="CVE"/>
		<reference ref_id="CVE-2024-10978" ref_url="https://www.suse.com/security/cve/CVE-2024-10978/" source="CVE"/>
		<reference ref_id="CVE-2024-10979" ref_url="https://www.suse.com/security/cve/CVE-2024-10979/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019868.html" source="SUSE-SU"/>
		<description>
This update for postgresql12 fixes the following issues:

- CVE-2024-10976: Ensure cached plans are marked as dependent on the calling role when RLS applies to a non-top-level table reference (bsc#1233323).
- CVE-2024-10977: Make libpq discard error messages received during SSL or GSS protocol negotiation (bsc#1233325).
- CVE-2024-10978: Fix unintended interactions between SET SESSION AUTHORIZATION and SET ROLE (bsc#1233326).
- CVE-2024-10979: Prevent trusted PL/Perl code from changing environment variables (bsc#1233327).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-28"/>
	<updated date="2024-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1233323">SUSE bug 1233323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233325">SUSE bug 1233325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233326">SUSE bug 1233326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233327">SUSE bug 1233327</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10976/">CVE-2024-10976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10976">CVE-2024-10976 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10977/">CVE-2024-10977 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10977">CVE-2024-10977 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10978/">CVE-2024-10978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10978">CVE-2024-10978 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-10979/">CVE-2024-10979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10979">CVE-2024-10979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955273" comment="postgresql12-12.22-150200.8.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955274" comment="postgresql12-contrib-12.22-150200.8.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955275" comment="postgresql12-devel-12.22-150200.8.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955276" comment="postgresql12-docs-12.22-150200.8.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955277" comment="postgresql12-llvmjit-12.22-150200.8.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955278" comment="postgresql12-llvmjit-devel-12.22-150200.8.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955279" comment="postgresql12-plperl-12.22-150200.8.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955280" comment="postgresql12-plpython-12.22-150200.8.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955281" comment="postgresql12-pltcl-12.22-150200.8.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955282" comment="postgresql12-server-12.22-150200.8.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955283" comment="postgresql12-server-devel-12.22-150200.8.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955284" comment="postgresql12-test-12.22-150200.8.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5106" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat10 (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233434" ref_url="https://bugzilla.suse.com/1233434" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-52316" ref_url="https://www.suse.com/security/cve/CVE-2024-52316/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019867.html" source="SUSE-SU"/>
		<description>
This update for tomcat10 fixes the following issues:

- Update to Tomcat 10.1.33
  * Fixed CVEs:
    + CVE-2024-52316: If the Jakarta Authentication fails with an exception,
      set a 500 status (bsc#1233434)
  * Catalina
    + Add: Add support for the new Servlet API method HttpServletResponse.sendEarlyHints(). (markt)
    + Add: 55470: Add debug logging that reports the class path when a 
      ClassNotFoundException occurs in the digester or the web application class loader. 
      Based on a patch by Ralf Hauser. (markt)
    + Update: 69374: Properly separate between table header and body in 
      DefaultServlet's listing. (michaelo)
    + Update: 69373: Make DefaultServlet's HTML listing file last modified 
      rendering better (flexible). (michaelo)
    + Update: Improve HTML output of DefaultServlet. (michaelo)
    + Code: Refactor RateLimitFilter to use FilterBase as the base class. 
      The primary advantage is less code to process init-param values. (markt)
    + Update: 69370: DefaultServlet's HTML listing uses incorrect labels. 
      (michaelo)
    + Fix: Avoid NPE in CrawlerSessionManagerValve for partially mapped requests. (remm)
    + Fix: Add missing WebDAV Lock-Token header in the response when locking 
      a folder. (remm)
    + Fix: Invalid WebDAV lock requests should be rejected with 400. (remm)
    + Fix: Fix regression in WebDAV when attempting to unlock a collection. (remm)
    + Fix: Verify that destination is not locked for a WebDAV copy operation. (remm)
    + Fix: Send 415 response to WebDAV MKCOL operations that include a request 
      body since this is optional and unsupported. (remm)
    + Fix: Enforce DAV: namespace on WebDAV XML elements. (remm)
    + Fix: Do not allow a new WebDAV lock on a child resource if a parent 
      collection is locked (RFC 4918 section 6.1). (remm)
    + Fix: WebDAV DELETE should remove any existing lock on successfully 
      deleted resources. (remm)
    + Update: Remove WebDAV lock null support in accordance with RFC 4918 
      section 7.3 and annex D. Instead, a lock on a non-existing resource will 
      create an empty file locked with a regular lock. (remm)
    + Update: Rewrite implementation of WebDAV shared locks to comply with 
      RFC 4918. (remm)
    + Update: Implement WebDAV If header using code from the Apache Jackrabbit 
      project. (remm)
    + Add: Add PropertyStore interface in the WebDAV Servlet, to allow 
      implementation of dead properties storage. The store used can be configured 
      using the propertyStore init parameter of the WebDAV servlet by specifying 
      the class name of the store. A simple non-persistent implementation is 
      used if no custom store is configured. (remm)
    + Update: Implement WebDAV PROPPATCH method using the newly added 
      PropertyStore, and update PROPFIND to support it. (remm)
    + Fix: Cache not found results when searching for web application class 
      loader resources. This addresses performance problems caused by components 
      such as java.sql.DriverManager, which in some circumstances will search 
      for the same class repeatedly. The size of the cache can be controlled 
      via the new notFoundClassResourceCacheSize on the StandardContext. (markt)
    + Fix: Stop after INITIALIZED state should be a noop since it is possible 
      for subcomponents to be in FAILED after init. (remm)
    + Fix: Fix incorrect web resource cache size calculations when there are 
      concurrent PUT and DELETE requests for the same resource. (markt)
    + Add: Add debug logging for the web resource cache so the current size 
      can be tracked as resources are added and removed. (markt)
    + Update: Replace legacy WebDAV opaquelocktoken: scheme for lock tokens 
      with urn:uuid: as recommended by RFC 4918, and remove secret init 
      parameter. (remm)
    + Fix: Concurrent reads and writes (e.g. GET and PUT / DELETE) for the 
      same path caused corruption of the FileResource where some of the fields 
      were set as if the file exists and some as set as if it does not. This 
      resulted in inconsistent metadata. (markt)
    + Fix: 69415: Ensure that the ExpiresFilter only sets cache headers on 
      GET and HEAD requests. Also, skip requests where the application has 
      set Cache-Control: no-store. (markt)
    + Fix: 69419: Improve the performance of ServletRequest.getAttribute() 
      when there are multiple levels of nested includes. Based on a patch 
      provided by John Engebretson. (markt)
    + Add: All applications to send an early hints informational response 
      by calling HttpServletResponse.sendError() with a status code of 103. 
      (schultz)
    + Fix: Ensure that ServerAuthModule.initialize() is called when a 
      Jakarta Authentication module is configured via registerServerAuthModule(). 
      (markt)
    + Fix: Ensure that the Jakarta Authentication CallbackHandler only creates 
      one GenericPrincipal in the Subject. (markt)
    + Fix: If the Jakarta Authentication process fails with an Exception, 
      explicitly set the HTTP response status to 500 as the ServerAuthContext 
      may not have set it. (markt)
    + Fix: When persisting the Jakarta Authentication provider configuration, 
      create any necessary parent directories that don't already exist. (markt)
    + Fix: Correct the logic used to detect errors when deleting temporary files 
      associated with persisting the Jakarta Authentication provider 
      configuration. (markt)
    + Fix: When processing Jakarta Authentication callbacks, don't overwrite 
      a Principal obtained from the PasswordValidationCallback with null if the 
      CallerPrincipalCallback does not provide a Principal. (markt)
    + Fix: Avoid store config backup loss when storing one configuration more 
      than once per second. (remm)
    + Fix: 69359: WebdavServlet duplicates getRelativePath() method from 
      super class with incorrect Javadoc. (michaelo)
    + Fix: 69360: Inconsistent DELETE behavior between WebdavServlet and 
      DefaultServlet. (michaelo)
    + Fix: Make WebdavServlet properly return the Allow header when deletion 
      of a resource is not allowed. (michaelo)
    + Fix: Add log warning if non-wildcard mappings are used with the WebdavServlet. 
      (remm)
    + Fix: 69361: Ensure that the order of entries in a multi-status response 
      to a WebDAV is consistent with the order in which resources were processed. 
      (markt)
    + Fix: 69362: Provide a better multi-status response when deleting a 
      collection via WebDAV fails. Empty directories that cannot be deleted 
      will now be included in the response. (markt)
    + Fix: 69363: Use getPathPrefix() consistently in the WebDAV servlet to 
      ensure that the correct path is used when the WebDAV servlet is mounted 
      at a sub-path within the web application. (markt)
    + Fix 69320, a regression in the fix for 69302 that meant the HTTP/2 processing
      was likely to be broken for all clients once any client sent an HTTP/2
      reset frame. (markt)
    + Fix: Improve performance of ApplicationHttpRequest.parseParameters(). 
      Based on sample code and test cases provided by John Engebretson. (markt)
    + Fix:  Correct regressions in the refactoring that added recycling of the coyote
      request and response to the HTTP/2 processing. (markt)
    + Add: Add support for RFC 8297 (Early Hints). Applications can use this 
      feature by casting the HttpServletResponse to org.apache.catalina.connector. 
      Response and then calling the method void sendEarlyHints(). This method 
      will be added to the Servlet API (removing the need for the cast) in Servlet 
      6.2 onwards. (markt)
    + Fix: 69214: Do not reject a CORS request that uses POST but does not include 
      a content-type header. Tomcat now correctly processes this as a simple CORS 
      request. Based on a patch suggested by thebluemountain. (markt)
    + Fix: Refactor SpnegoAuthenticator so it uses Subject.callAs() rather than 
      Subject.doAs() when available. (markt)
    + Fix: Allow JAASRealm to use the configuration source to load a configured 
      configFile, for easier use with testing. (remm)
    + Fix: Add missing algorithm callback to the JAASCallbackHandler. (remm)
    + Fix: Add the OpenSSL version number on the APR and OpenSSL status classes. 
      (remm)
    + Fix: 69131: Expand the implementation of the filter value of the Authenticator 
      attribute allowCorsPreflight, so that it applies to all requests that match 
      the configured URL patterns for the CORS filter, rather than only applying 
      if the CORS filter is mapped to /*. (markt)
    + Fix: Using the OpenSSLListener will now cause the connector to use OpenSSL 
      if available. (remm)
  * Coyote
    + Fix: Return null SSL session id on zero-length byte array returned 
      from the SSL implementation. (remm)
    + Fix: Skip OpenSSLConf with BoringSSL since it is unsupported. (remm)
    + Fix: Create the HttpParser in Http11Processor if it is not present on 
      the AbstractHttp11Protocol to provide better lifecycle robustness for 
      regular HTTP/1.1. The new behavior was introduced in a previous refactoring 
      to improve HTTP/2 performance. (remm)
    + Fix: OpenSSLContext will now throw a KeyManagementException if something 
      is known to have gone wrong in the init method, which is the behavior 
      documented by javax.net.ssl.SSLContext.init. This makes error handling 
      more consistent. (remm)
    + Fix: 69379: The default HEAD response no longer includes the payload 
      HTTP header fields as per section 9.3.2 of RFC 9110. (markt)
    + Fix: 69316: Ensure that FastHttpDateFormat#getCurrentDate() (used to 
      generate Date headers for HTTP responses) generates the correct string 
      for the given input. Prior to this change, the output may have been 
      wrong by one second in some cases. Pull request #751 provided by Chenjp. 
      (markt)
    + Fix: Request start time may not have been accurately recorded for HTTP/1.1 
      requests preceded by a large number of blank lines. (markt)
    + Add: Add server and serverRemoveAppProvidedValues to the list of attributes 
      the HTTP/2 protocol will inherit from the HTTP/1.1 connector it is nested 
      within. (markt)
    + Fix: Avoid possible crashes when using Apache Tomcat Native, caused by 
      destroying SSLContext objects through GC after APR has been terminated. 
      (remm)
    + Fix: Improve HTTP/2 handling of trailer fields for requests. Trailer fields 
      no longer need to be received before the headers of the subsequent stream, 
      nor are trailer fields for an in-progress stream swallowed if the Connector 
      is paused before the trailer fields are received. (markt)
    + Fix: Ensure the request and response are not recycled too soon for an 
      HTTP/2 stream when a stream-level error is detected during the processing 
      of incoming HTTP/2 frames. This could lead to incorrect processing times 
      appearing in the access log. (markt)
    + Fix: Correct a regression in the fix for non-blocking reads of chunked 
      request bodies that caused InputStream.available() to return a non-zero 
      value when there was no data to read. In some circumstances this could 
      cause a blocking read to block waiting for more data rather than return 
      the data it had already received. (markt)
    + Add: Add a new attribute cookiesWithoutEquals to the Rfc6265CookieProcessor. 
      The default behaviour is unchanged. (markt)
    + Fix: Ensure that Tomcat sends a TLS close_notify message after receiving 
      one from the client when using the OpenSSLImplementation. (markt)
    + Fix: 69301: Fix trailer headers replacing non-trailer headers when writing 
      response headers to the access log. Based on a patch and test case 
      provided by hypnoce. (markt)
    + Fix: 69302: If an HTTP/2 client resets a stream before the request body 
      is fully written, ensure that any ReadListener is notified via a call 
      to ReadListener.onError(). (markt)
    + Fix: Ensure that HTTP/2 stream input buffers are only created when there is 
      a request body to be read. (markt)
    + Code: Refactor creation of HttpParser instances from the Processor level to 
      the Protocol level since the parser configuration depends on the protocol 
      and the parser is, otherwise, stateless. (markt)
    + Add: Align HTTP/2 with HTTP/1.1 and recycle the container internal request 
      and response processing objects by default. This behaviour can be controlled 
      via the new discardRequestsAndResponses attribute on the HTTP/2 upgrade protocol. 
      (markt)
    + Fix: Clean and log OpenSSL errors before processing of OpenSSL conf commands 
      in the FFM code. (remm)
    + Fix: 69121: Ensure that the onComplete() event is triggered if AsyncListener.
      onError() dispatches to a target that throws an exception. (markt)
    + Fix: Following the trailer header field refactoring, -1 is no longer an allowed 
      value for maxTrailerSize. Adjust documentation accordingly. (remm)
    + Update: Move OpenSSL support using FFM to a separate JAR named tomcat-coyote-ffm.
      jar that advertises Java 22 in its manifest. (remm)
    + Fix: Fix search for OpenSSL library for FFM on Mac OS so that java.library.path 
      is searched. (markt)
    + Update: Add FFM compatibility methods for LibreSSL support. Renegotiation is 
      not supported at the moment. (remm)
    + Update: Add org.apache.tomcat.util.openssl.LIBRARY_NAME (specifies the name 
      of the library to load) and org.apache.tomcat.util.openssl.USE_SYSTEM_LOAD_LIBRARY 
      (set to true to use System.loadLibrary rather than the FFM library loading code) 
      to configure the OpenSSL library loading using FFM. (remm)
    + Update: Add FFM compatibility methods for BoringSSL support. Renegotiation is 
      not supported in many cases. (remm)
  * Jasper
    + Fix: Add back tag release method as deprecated in the runtime for 
      compatibility with old generated code. (remm)
    + Fix: 69399: Fix regression caused by improvement 69333, which caused 
      the tag release to be called when using tag pooling, and to be skipped 
      when not using it. Patch submitted by Michal Sobkiewicz. (remm)
    + Fix: 69381: Improve method lookup performance in expression language. 
      When the required method has no arguments, there is no need to consider 
      casting or coercion, and the method lookup process can be simplified. 
      Based on a pull request by John Engebretson. (markt)
    + Fix: 69382: Improve the performance of the JSP include action by re-using 
      results of relatively expensive method calls in the generated code rather 
      than repeating them. Patch provided by John Engebretson. (markt)
    + Fix: 69398: Avoid unnecessary object allocation in PageContextImpl. 
      Based on a suggestion by John Engebretson. (markt)
    + Fix: 69406: When using StringInterpreterEnum, do not throw an 
      IllegalArgumentException when an invalid Enum is encountered. Instead, 
      resolve the value at runtime. Patch provided by John Engebretson. (markt)
    + Fix: 69429: Optimize EL evaluation of method parameters for methods 
      that do not accept any parameters. Patch provided by John Engebretson. (markt)
    + Fix: Further optimize EL evaluation of method parameters. Patch provided 
      by Paolo B. (markt)
    + Fix: 69333: Remove unnecessary code from generated JSPs. (markt)
    + Fix: 69338: Improve the performance of processing expressions that include 
      AND or OR operations with more than two operands and expressions that use 
      not empty. (markt)
    + Fix: 69348: Reduce memory consumption in ELContext by using lazy 
      initialization for the data structure used to track lambda arguments. (markt)
    + Fix: Switch the TldScanner back to logging detailed scan results at debug 
      level rather than trace level. (markt)
    + Fix: Update the optimisation in jakarta.el.ImportHandler so it is aware of 
      new classes added to the java.lang package in Java 23. (markt)
    + Fix: Ensure that an exception in toString() still results in an ELException 
      when an object is coerced to a String using ExpressionFactory.coerceToType(). 
      (markt)
    + Add: Add support for specifying Java 24 (with the value 24) as the compiler 
      source and/or compiler target for JSP compilation. If used with an Eclipse JDT 
      compiler version that does not support these values, a warning will be logged 
      and the default will be used. (markt)
    + Fix: 69135: When using include directives in a tag file packaged in a JAR file, 
      ensure that context relative includes are processed correctly. (markt)
    + Fix: 69135: When using include directives in a tag file packaged in a JAR file, 
      ensure that file relative includes are processed correctly. (markt)
    + Fix: 69135: When using include directives in a tag file packaged in a JAR file, 
      ensure that file relative includes are not permitted to access files outside 
      of the /META_INF/tags/ directory nor outside of the JAR file. (markt)
  * WebSocket
    + Fix: If a blocking message write exceeds the timeout, don't attempt the 
      write again before throwing the exception. (markt)
    + Fix: An EncodeException being thrown during a message write should not 
      automatically cause the connection to close. The application should handle 
      the exception and make the decision whether or not to close the connection. 
      (markt)
  * Web applications
    + Fix: The manager webapp will now be able to access certificates again 
      when OpenSSL is used. (remm)
    + Fix: Documentation. Align the logging configuration documentation with 
      the current defaults. (markt)
    + Fix: Fix status servlet detailed view of the connectors when using automatic 
      port. (remm)
  * jdbc-pool
    + Fix: 69255: Correct a regression in the fix for 69206 that meant exceptions 
      executing statements were wrapped in a java.lang.reflect.UndeclaredThrowableException 
      rather than the application seeing the original SQLException. Fixed by pull 
      request #744 provided by Michael Clarke. (markt)
    + Fix: 69279: Correct a regression in the fix for 69206 that meant that methods 
      that previously returned a null ResultSet were returning a proxy with a 
      null delegate. Fixed by pull request #745 provided by Huub de Beer. (markt)
    + Fix: 69206: Ensure statements returned from Statement methods executeQuery(), 
      getResultSet() and getGeneratedKeys() are correctly wrapped before being returned 
      to the caller. Based on pull request #742 provided by Michael Clarke. (markt)
  * Other
    + Update: Switch from DigiCert ONE to ssl.com eSigner for code signing. (markt)
    + Update: Update Byte Buddy to 1.15.10. (markt)
    + Update: Update CheckStyle to 10.20.0. (markt)
    + Add: Improvements to German translations. (remm)
    + Update: Update Byte Buddy to 1.15.3. (markt)
    + Update: Update CheckStyle to 10.18.2. (markt)
    + Add: Improvements to French translations. (remm)
    + Add: Improvements to Japanese translations by tak7iji. (markt)
    + Add: Improvements to Chinese translations by Ch_jp. (markt)
    + Add: Exclude the tomcat-coyote-ffm.jar from JAR scanning by default. (markt)
    + Fix: Change the default log handler level to ALL so log messages are not 
      dropped by default if a logger is configured to use trace (FINEST) level 
      logging. (markt)
    + Update: Update Hamcrest to 3.0. (markt)
    + Update: Update EasyMock to 5.4.0. (markt)
    + Update: Update Byte Buddy to 1.15.0. (markt)
    + Update: Update CheckStyle to 10.18.0. (markt)
    + Update: Update the internal fork of Apache Commons BCEL to 6.10.0. (markt)
    + Add: Improvements to Spanish translations by Fernando. (markt)
    + Add: Improvements to French translations. (remm)
    + Add: Improvements to Japanese translations by tak7iji. (markt)
    + Fix: Fix packaging regression with missing osgi information following addition 
      of the test-only build target. (remm)
    + Update: Update Tomcat Native to 2.0.8. (markt)
    + Update: Update Byte Buddy to 1.14.18. (markt)
    + Add: Improvements to French translations. (remm)
    + Add: Improvements to Japanese translations by tak7iji. (markt)
    + Update: Add test-only build target to allow running only the testsuite, 
      supporting Java versions down to the minimum supported to run Tomcat. (rjung)
    + Update: Update UnboundID to 7.0.1. (markt)
    + Update: Update to SpotBugs 4.8.6. (markt)
    + Update: Remove cglib dependency as it is not required by the version of EasyMock 
      used by the unit tests. (markt)
    + Update: Update EasyMock to 5.3.0. This adds a test dependency on Byte-Buddy 
      1.14.17. (markt)
    + Add: Improvements to Czech translations by Vladim?r Chlup. (markt)
    + Add: Improvements to French translations. (remm)
    + Add: Improvements to Japanese translations by tak7iji. (markt)
    + Add: Improvements to Chinese translations by fangzheng. (markt)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-28"/>
	<updated date="2024-11-28"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1233434">SUSE bug 1233434</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="10/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-52316/">CVE-2024-52316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52316">CVE-2024-52316 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955285" comment="tomcat10-10.1.33-150200.5.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955286" comment="tomcat10-admin-webapps-10.1.33-150200.5.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955287" comment="tomcat10-docs-webapp-10.1.33-150200.5.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955288" comment="tomcat10-el-5_0-api-10.1.33-150200.5.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955289" comment="tomcat10-embed-10.1.33-150200.5.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955290" comment="tomcat10-jsp-3_1-api-10.1.33-150200.5.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955291" comment="tomcat10-jsvc-10.1.33-150200.5.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955292" comment="tomcat10-lib-10.1.33-150200.5.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955293" comment="tomcat10-servlet-6_0-api-10.1.33-150200.5.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955294" comment="tomcat10-webapps-10.1.33-150200.5.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5107" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233434" ref_url="https://bugzilla.suse.com/1233434" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-52316" ref_url="https://www.suse.com/security/cve/CVE-2024-52316/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019866.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- Update to Tomcat 9.0.97
  * Fixed CVEs:
    + CVE-2024-52316: If the Jakarta Authentication fails with an exception,
      set a 500 status (bsc#1233434)
  * Catalina
    + Add: Add support for the new Servlet API method 
      HttpServletResponse.sendEarlyHints(). (markt)
    + Add: 55470: Add debug logging that reports the class path when a 
      ClassNotFoundException occurs in the digester or the web application 
      class loader. Based on a patch by Ralf Hauser. (markt)
    + Update: 69374: Properly separate between table header and body in 
      DefaultServlet's listing. (michaelo)
    + Update: 69373: Make DefaultServlet's HTML listing file last modified 
      rendering better (flexible). (michaelo)
    + Update: Improve HTML output of DefaultServlet. (michaelo)
    + Code: Refactor RateLimitFilter to use FilterBase as the base class. The 
      primary advantage for doing this is less code to process init-param 
      values. (markt)
    + Update: 69370: DefaultServlet's HTML listing uses incorrect labels. 
      (michaelo)
    + Fix: Avoid NPE in CrawlerSessionManagerValve for partially mapped 
      requests. (remm)
    + Fix: Add missing WebDAV Lock-Token header in the response when locking 
      a folder. (remm)
    + Fix: Invalid WebDAV lock requests should be rejected with 400. (remm)
    + Fix: Fix regression in WebDAV when attempting to unlock a collection. 
      (remm)
    + Fix: Verify that destination is not locked for a WebDAV copy operation. 
      (remm)
    + Fix: Send 415 response to WebDAV MKCOL operations that include a 
      request body since this is optional and unsupported. (remm)
    + Fix: Enforce DAV: namespace on WebDAV XML elements. (remm)
    + Fix: Do not allow a new WebDAV lock on a child resource if a parent 
      collection is locked (RFC 4918 section 6.1). (remm)
    + Fix: WebDAV Delete should remove any existing lock on successfully 
      deleted resources. (remm)
    + Update: Remove WebDAV lock null support in accordance with RFC 4918 
      section 7.3 and annex D. Instead, a lock on a non-existing resource 
      will create an empty file locked with a regular lock. (remm)
    + Update: Rewrite implementation of WebDAV shared locks to comply with 
      RFC 4918. (remm)
    + Update: Implement WebDAV If header using code from the Apache Jackrabbit 
      project. (remm)
    + Add: Add PropertyStore interface in the WebDAV Servlet, to allow 
      implementation of dead properties storage. The store used can be 
      configured using the 'propertyStore' init parameter of the WebDAV 
      servlet. A simple non-persistent implementation is used if no custom 
      store is configured. (remm)
    + Update: Implement WebDAV PROPPATCH method using the newly added 
      PropertyStore. (remm)
    + Fix: Cache not found results when searching for web application class 
      loader resources. This addresses performance problems caused by 
      components such as java.sql.DriverManager which, in some circumstances, 
      will search for the same class repeatedly. In a large web application 
      this can cause performance problems. The size of the cache can be 
      controlled via the new notFoundClassResourceCacheSize on the 
      StandardContext. (markt)
    + Fix: Stop after INITIALIZED state should be a noop since it is possible 
      for subcomponents to be in FAILED after init. (remm)
    + Fix: Fix incorrect web resource cache size calculations when there are 
      concurrent PUT and DELETE requests for the same resource. (markt)
    + Add: Add debug logging for the web resource cache so the current size 
      can be tracked as resources are added and removed. (markt)
    + Update: Replace legacy WebDAV opaquelocktoken: scheme for lock tokens 
      with urn:uuid: as recommended by RFC 4918, and remove secret init 
      parameter. (remm)
    + Fix: Concurrent reads and writes (e.g. GET and PUT / DELETE) for the 
      same path caused corruption of the FileResource where some of the 
      fields were set as if the file exists and some as set as if it does 
      not. This resulted in inconsistent metadata. (markt)
    + Fix: 69415: Ensure that the ExpiresFilter only sets cache headers on 
      GET and HEAD requests. Also skip requests where the application has set 
      Cache-Control: no-store. (markt)
    + Fix: 69419: Improve the performance of ServletRequest.getAttribute() 
      when there are multiple levels of nested includes. Based on a patch 
      provided by John Engebretson. (markt)
    + Add: All applications to send an early hints informational response by 
      calling HttpServletResponse.sendError() with a status code of 103. 
      (schultz)
    + Fix: Ensure that the Jakarta Authentication CallbackHandler only 
      creates one GenericPrincipal in the Subject. (markt)
    + Fix: If the Jakarta Authentication process fails with an Exception, 
      explicitly set the HTTP response status to 500 as the ServerAuthContext 
      may not have set it. (markt)
    + Fix: When persisting the Jakarta Authentication provider configuration, 
      create any necessary parent directories that don't already exist. 
      (markt)
    + Fix: Correct the logic used to detect errors when deleting temporary 
      files associated with persisting the Jakarta Authentication provider 
      configuration. (markt)
    + Fix: When processing Jakarta Authentication callbacks, don't overwrite 
      a Principal obtained from the PasswordValidationCallback with null if 
      the CallerPrincipalCallback does not provide a Principal. (markt)
    + Fix: Avoid store config backup loss when storing one configuration more 
      than once per second. (remm)
    + Fix: 69359: WebdavServlet duplicates getRelativePath() method from 
      super class with incorrect Javadoc. (michaelo)
    + Fix: 69360: Inconsistent DELETE behavior between WebdavServlet and 
      DefaultServlet. (michaelo)
    + Fix: Make WebdavServlet properly return the Allow header when deletion 
      of a resource is not allowed. (michaelo)
    + Fix: Add log warning if non wildcard mappings are used with the 
      WebdavServlet. (remm)
    + Fix: 69361: Ensure that the order of entries in a multi-status response 
      to a WebDAV is consistent with the order in which resources were 
      processed. (markt)
    + Fix: 69362: Provide a better multi-status response when deleting a 
      collection via WebDAV fails. Empty directories that cannot be deleted 
      will now be included in the response. (markt)
    + Fix: 69363: Use getPathPrefix() consistently in the WebDAV servlet to 
      ensure that the correct path is used when the WebDAV servlet is mounted 
      at a sub-path within the web application. (markt)
    + Fix: Improve performance of ApplicationHttpRequest.parseParameters(). 
      Based on sample code and test cases provided by John Engebretson. 
      (markt)
    + Add: Add support for RFC 8297 (Early Hints). Applications can use 
      this feature by casting the HttpServletResponse to 
      org.apache.catalina.connector.Reponse and then calling the method 
      void sendEarlyHints(). This method will be added to the Servlet API 
      (removing the need for the cast) in Servlet 6.2 onwards. (markt)
    + Fix: 69214: Do not reject a CORS request that uses POST but does not 
      include a content-type header. Tomcat now correctly processes this as 
      a simple CORS request. Based on a patch suggested by thebluemountain. 
      (markt)
    + Fix: Refactor SpnegoAuthenticator so it uses Subject.callAs() rather 
      than Subject.doAs() when available. (markt)
  * Coyote
    + Fix: Return null SSL session id on zero length byte array returned from 
      the SSL implementation. (remm)
    + Fix: Skip OpenSSLConf with BoringSSL since it is unsupported. (remm)
    + Fix: Create the HttpParser in Http11Processor if it is not present on 
      the AbstractHttp11Protocol to provide better lifecycle robustness for 
      regular HTTP/1.1. The new behavior was introduced on a previous 
      refactoring to improve HTTP/2 performance. (remm)
    + Fix: OpenSSLContext will now throw a KeyManagementException if something 
      is known to have gone wrong in the init method, which is the behavior 
      documented by javax.net.ssl.SSLContext.init. This makes error handling 
      more consistent. (remm)
    + Fix: 69316: Ensure that FastHttpDateFormat#getCurrentDate() (used to 
      generate Date headers for HTTP responses) generates the correct string 
      for the given input. Prior to this change, the output may have been 
      wrong by one second in some cases. Pull request #751 provided by Chenjp. 
      (markt)
    + Add: Add server and serverRemoveAppProvidedValues to the list of 
      attributes the HTTP/2 protocol will inherit from the HTTP/1.1 connector 
      it is nested within. (markt)
    + Fix: Avoid possible crashes when using Apache Tomcat Native, caused by 
      destroying SSLContext objects through GC after APR has been terminated. 
      (remm)
    + Fix: Improve HTTP/2 handling of trailer fields for requests. Trailer 
      fields no longer need to be received before the headers of the 
      subsequent stream nor are trailer fields for an in-progress stream 
      swallowed if the Connector is paused before the trailer fields are 
      received. (markt)
    + Fix: Ensure the request and response are not recycled too soon for an 
      HTTP/2 stream when a stream level error is detected during the processing 
      of incoming HTTP/2 frames. This could lead to incorrect processing times 
      appearing in the access log. (markt)
    + Fix: Fix 69320, a regression in the fix for 69302 that meant the 
      HTTP/2 processing was likely to be broken for all clients once any 
      client sent an HTTP/2 reset frame. (markt)
    + Fix: Correct a regression in the fix for non-blocking reads of chunked 
      request bodies that caused InputStream.available() to return a non-zero 
      value when there was no data to read. In some circumstances this could 
      cause a blocking read to block waiting for more data rather than return 
      the data it had already received. (markt)
    + Add: Add a new attribute cookiesWithoutEquals to the Rfc6265CookieProcessor. 
      The default behaviour is unchanged. (markt)
    + Fix: Ensure that Tomcat sends a TLS close_notify message after receiving 
      one from the client when using the OpenSSLImplementation. (markt)
    + Fix: 69301: Fix trailer headers replacing non-trailer headers when writing 
      response headers to the access log. Based on a patch and test case 
      provided by hypnoce. (markt)
    + Fix: 69302: If an HTTP/2 client resets a stream before the request body is 
      fully written, ensure that any ReadListener is notified via a call to 
      ReadListener.onErrror(). (markt)
    + Fix: Correct regressions in the refactoring that added recycling of the 
      coyote request and response to the HTTP/2 processing. (markt)
    + Add: Add OpenSSL integration using the FFM API rather than Tomcat Native. 
      OpenSSL support may be enabled by adding the 
      org.apache.catalina.core.OpenSSLLifecycleListener listener on the 
      Server element when using Java 22 or later. (remm)
    + Fix: Ensure that HTTP/2 stream input buffers are only created when there 
      is a request body to be read. (markt)
    + Code: Refactor creation of HttpParser instances from the Processor level 
      to the Protocol level since the parser configuration depends on the 
      protocol and the parser is, otherwise, stateless. (markt)
    + Add: Align HTTP/2 with HTTP/1.1 and recycle the container internal 
      request and response processing objects by default. This behaviour can 
      be controlled via the new discardRequestsAndResponses attribute on the 
      HTTP/2 upgrade protocol. (markt)
  * Jasper
    + Fix: Add back tag release method as deprecated in the runtime for 
      compatibility with old generated code. (remm)
    + Fix: 69399: Fix regression caused by the improvement 69333 which caused 
      the tag release to be called when using tag pooling, and to be skipped 
      when not using it. Patch submitted by Michal Sobkiewicz. (remm)
    + Fix: 69381: Improve method lookup performance in expression language. 
      When the required method has no arguments there is no need to consider 
      casting or coercion and the method lookup process can be simplified. 
      Based on pull request #770 by John Engebretson.
    + Fix: 69382: Improve the performance of the JSP include action by 
      re-using results of relatively expensive method calls in the generated 
      code rather than repeating them. Patch provided by John Engebretson. 
      (markt)
    + Fix: 69398: Avoid unnecessary object allocation in PageContextImpl. 
      Based on a suggestion by John Engebretson. (markt)
    + Fix: 69406: When using StringInterpreterEnum, do not throw an 
      IllegalArgumentException when an invalid Enum is encountered. Instead, 
      resolve the value at runtime. Patch provided by John Engebretson. 
      (markt)
    + Fix: 69429: Optimise EL evaluation of method parameters for methods 
      that do not accept any parameters. Patch provided by John Engebretson. 
      (markt)
    + Fix: 69333: Remove unnecessary code from generated JSPs. (markt)
    + Fix: 69338: Improve the performance of processing expressions that 
      include AND or OR operations with more than two operands and expressions 
      that use not empty. (markt)
    + Fix: 69348: Reduce memory consumption in ELContext by using lazy 
      initialization for the data structure used to track lambda arguments. 
      (markt)
    + Fix: Switch the TldScanner back to logging detailed scan results at debug 
      level rather than trace level. (markt)
  * Web applications
    + Fix: The manager webapp will now be able to access certificates again 
      when OpenSSL is used. (remm)
    + Fix: Documentation. Align the logging configuration documentation with 
      the current defaults. (markt)
  * WebSocket
    + Fix: If a blocking message write exceeds the timeout, don't attempt the 
      write again before throwing the exception. (markt)
    + Fix: An EncodeException being thrown during a message write should not 
      automatically cause the connection to close. The application should 
      handle the exception and make the decision whether or not to close the 
      connection. (markt)
  * jdbc-pool
    + Fix: 69255: Correct a regression in the fix for 69206 that meant exceptions 
      executing statements were wrapped in a java.lang.reflect.UndeclaredThrowableException 
      rather than the application seeing the original SQLException. Fixed by 
      pull request #744 provided by Michael Clarke. (markt)
    + Fix: 69279: Correct a regression in the fix for 69206 that meant that 
      methods that previously returned a null ResultSet were returning a proxy 
      with a null delegate. Fixed by pull request #745 provided by Huub de Beer. 
      (markt)
    + Fix: 69206: Ensure statements returned from Statement methods 
      executeQuery(), getResultSet() and getGeneratedKeys() are correctly 
      wrapped before being returned to the caller. Based on pull request 
      #742 provided by Michael Clarke.
  * Other
    + Update: Switch from DigiCert ONE to ssl.com eSigner for code signing. 
      (markt)
    + Update: Update Byte Buddy to 1.15.10. (markt)
    + Update: Update CheckStyle to 10.20.0. (markt)
    + Add: Improvements to German translations. (remm)
    + Add: Improvements to French translations. (remm)
    + Add: Improvements to Japanese translations by tak7iji. (markt)
    + Add: Improvements to Chinese translations by Ch_jp. (markt)
    + Add: Exclude the tomcat-coyote-ffm.jar from JAR scanning by default. 
      (markt)
    + Fix: Change the default log handler level to ALL so log messages are 
      not dropped by default if a logger is configured to use trace (FINEST) 
      level logging. (markt)
    + Update: Update Hamcrest to 3.0. (markt)
    + Update: Update EasyMock to 5.4.0. (markt)
    + Update: Update Byte Buddy to 1.15.0. (markt)
    + Update: Update CheckStyle to 10.18.0. (markt)
    + Update: Update the internal fork of Apache Commons BCEL to 6.10.0. 
      (markt)
    + Add: Improvements to Spanish translations by Fernando. (markt)
    + Add: Improvements to French translations. (remm)
    + Add: Improvements to Japanese translations by tak7iji. (markt)
    + Fix: Fix packaging regression with missing osgi information following 
      addition of the test-only build target. (remm)
    + Update: Update Tomcat Native to 1.3.1. (markt)
    + Update: Update Byte Buddy to 1.14.18. (markt)
    + Add: Improvements to French translations. (remm)
    + Add: Improvements to Japanese translations by tak7iji. (markt)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-28"/>
	<updated date="2024-11-28"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1233434">SUSE bug 1233434</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="10/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-52316/">CVE-2024-52316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52316">CVE-2024-52316 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955295" comment="tomcat-9.0.97-150200.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955296" comment="tomcat-admin-webapps-9.0.97-150200.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955297" comment="tomcat-docs-webapp-9.0.97-150200.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955298" comment="tomcat-el-3_0-api-9.0.97-150200.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955299" comment="tomcat-embed-9.0.97-150200.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955300" comment="tomcat-javadoc-9.0.97-150200.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955301" comment="tomcat-jsp-2_3-api-9.0.97-150200.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955302" comment="tomcat-jsvc-9.0.97-150200.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955303" comment="tomcat-lib-9.0.97-150200.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955304" comment="tomcat-servlet-4_0-api-9.0.97-150200.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955305" comment="tomcat-webapps-9.0.97-150200.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5108" version="1" class="patch">
	<metadata>
		<title>Security update for python-waitress (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1232554" ref_url="https://bugzilla.suse.com/1232554" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-49769" ref_url="https://www.suse.com/security/cve/CVE-2024-49769/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019865.html" source="SUSE-SU"/>
		<description>
This update for python-waitress fixes the following issues:

- CVE-2024-49769: Fixed a denial of service caused by incorrect connection clean up (bsc#1232554)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-28"/>
	<updated date="2024-11-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1232554">SUSE bug 1232554</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49769/">CVE-2024-49769 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49769">CVE-2024-49769 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955306" comment="python3-waitress-1.4.3-150000.3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5109" version="1" class="patch">
	<metadata>
		<title>Security update for libuv (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219724" ref_url="https://bugzilla.suse.com/1219724" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-24806" ref_url="https://www.suse.com/security/cve/CVE-2024-24806/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019873.html" source="SUSE-SU"/>
		<description>
This update for libuv fixes the following issues:

- CVE-2024-24806: Fixed improper Domain Lookup that potentially leads to SSRF attacks (bsc#1219724)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-28"/>
	<updated date="2024-11-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219724">SUSE bug 1219724</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-24806/">CVE-2024-24806 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24806">CVE-2024-24806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955307" comment="libuv-devel-1.44.2-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955308" comment="libuv1-1.44.2-150500.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955309" comment="libuv1-32bit-1.44.2-150500.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5110" version="1" class="patch">
	<metadata>
		<title>Security update for python-aiohttp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233447" ref_url="https://bugzilla.suse.com/1233447" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-52304" ref_url="https://www.suse.com/security/cve/CVE-2024-52304/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019875.html" source="SUSE-SU"/>
		<description>
This update for python-aiohttp fixes the following issues:

- CVE-2024-52304: Fixed request smuggling due to incorrect parsing of chunk extensions (bsc#1233447)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-11-29"/>
	<updated date="2024-11-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1233447">SUSE bug 1233447</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-52304/">CVE-2024-52304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52304">CVE-2024-52304 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955527" comment="python-aiohttp-doc-3.6.0-150100.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955528" comment="python3-aiohttp-3.6.0-150100.3.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5111" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1232747" ref_url="https://bugzilla.suse.com/1232747" source="BUGZILLA"/>
		<reference ref_id="1233631" ref_url="https://bugzilla.suse.com/1233631" source="BUGZILLA"/>
		<reference ref_id="1233632" ref_url="https://bugzilla.suse.com/1233632" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-44185" ref_url="https://www.suse.com/security/cve/CVE-2024-44185/" source="CVE"/>
		<reference ref_id="CVE-2024-44244" ref_url="https://www.suse.com/security/cve/CVE-2024-44244/" source="CVE"/>
		<reference ref_id="CVE-2024-44296" ref_url="https://www.suse.com/security/cve/CVE-2024-44296/" source="CVE"/>
		<reference ref_id="CVE-2024-44308" ref_url="https://www.suse.com/security/cve/CVE-2024-44308/" source="CVE"/>
		<reference ref_id="CVE-2024-44309" ref_url="https://www.suse.com/security/cve/CVE-2024-44309/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019877.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.46.3 (bsc#1232747), including fixes for:

- CVE-2024-44308: Fixed arbitrary code execution by not allocating DFG register after a slow path (bsc#1233631).
- CVE-2024-44309: Fixed a data isolation bypass vulnerability (bsc#1233632).
- CVE-2024-44244: Processing maliciously crafted web content may lead to an unexpected process crash.
- CVE-2024-44296: Processing maliciously crafted web content may prevent Content Security Policy from being enforced.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2024-12-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1232747">SUSE bug 1232747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233631">SUSE bug 1233631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233632">SUSE bug 1233632</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44185/">CVE-2024-44185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44185">CVE-2024-44185 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44244/">CVE-2024-44244 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44244">CVE-2024-44244 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44296/">CVE-2024-44296 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44296">CVE-2024-44296 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-44308/">CVE-2024-44308 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44308">CVE-2024-44308 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-44309/">CVE-2024-44309 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44309">CVE-2024-44309 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955529" comment="WebKitGTK-4.0-lang-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955530" comment="WebKitGTK-4.1-lang-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955531" comment="WebKitGTK-6.0-lang-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955532" comment="libjavascriptcoregtk-4_0-18-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955533" comment="libjavascriptcoregtk-4_0-18-32bit-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955534" comment="libjavascriptcoregtk-4_1-0-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955535" comment="libjavascriptcoregtk-4_1-0-32bit-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955536" comment="libjavascriptcoregtk-6_0-1-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955537" comment="libwebkit2gtk-4_0-37-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955538" comment="libwebkit2gtk-4_0-37-32bit-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955539" comment="libwebkit2gtk-4_1-0-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955540" comment="libwebkit2gtk-4_1-0-32bit-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955541" comment="libwebkitgtk-6_0-4-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955542" comment="typelib-1_0-JavaScriptCore-4_0-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955543" comment="typelib-1_0-JavaScriptCore-4_1-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955544" comment="typelib-1_0-JavaScriptCore-6_0-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955545" comment="typelib-1_0-WebKit-6_0-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955546" comment="typelib-1_0-WebKit2-4_0-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955547" comment="typelib-1_0-WebKit2-4_1-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955548" comment="typelib-1_0-WebKit2WebExtension-4_0-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955549" comment="typelib-1_0-WebKit2WebExtension-4_1-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955550" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955551" comment="webkit-jsc-4-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955552" comment="webkit-jsc-4.1-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955553" comment="webkit-jsc-6.0-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955554" comment="webkit2gtk-4_0-injected-bundles-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955555" comment="webkit2gtk-4_1-injected-bundles-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955556" comment="webkit2gtk3-devel-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955557" comment="webkit2gtk3-minibrowser-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955558" comment="webkit2gtk3-soup2-devel-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955559" comment="webkit2gtk3-soup2-minibrowser-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955560" comment="webkit2gtk4-devel-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955561" comment="webkit2gtk4-minibrowser-2.46.3-150400.4.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955562" comment="webkitgtk-6_0-injected-bundles-2.46.3-150400.4.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5112" version="1" class="patch">
	<metadata>
		<title>Security update for python39 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231795" ref_url="https://bugzilla.suse.com/1231795" source="BUGZILLA"/>
		<reference ref_id="1233307" ref_url="https://bugzilla.suse.com/1233307" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-11168" ref_url="https://www.suse.com/security/cve/CVE-2024-11168/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019894.html" source="SUSE-SU"/>
		<description>
This update for python39 fixes the following issues:

- CVE-2024-11168: Improper validation of IPv6 and IPvFuture addresses (bsc#1233307).

Bug fixes:

- Remove -IVendor/ from python-config (bsc#1231795).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-02"/>
	<updated date="2024-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1231795">SUSE bug 1231795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233307">SUSE bug 1233307</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-11168/">CVE-2024-11168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11168">CVE-2024-11168 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955692" comment="libpython3_9-1_0-3.9.20-150300.4.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955693" comment="libpython3_9-1_0-32bit-3.9.20-150300.4.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955694" comment="python39-3.9.20-150300.4.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955695" comment="python39-32bit-3.9.20-150300.4.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955696" comment="python39-base-3.9.20-150300.4.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955697" comment="python39-base-32bit-3.9.20-150300.4.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955698" comment="python39-curses-3.9.20-150300.4.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955699" comment="python39-dbm-3.9.20-150300.4.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955700" comment="python39-devel-3.9.20-150300.4.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955701" comment="python39-doc-3.9.20-150300.4.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955702" comment="python39-doc-devhelp-3.9.20-150300.4.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955703" comment="python39-idle-3.9.20-150300.4.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955704" comment="python39-testsuite-3.9.20-150300.4.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955705" comment="python39-tk-3.9.20-150300.4.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955706" comment="python39-tools-3.9.20-150300.4.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5113" version="1" class="patch">
	<metadata>
		<title>Security update for python-tornado6 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233668" ref_url="https://bugzilla.suse.com/1233668" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-52804" ref_url="https://www.suse.com/security/cve/CVE-2024-52804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019892.html" source="SUSE-SU"/>
		<description>
This update for python-tornado6 fixes the following issues:

- CVE-2024-52804: Fixed a denial of service caused by quadratic performance of cookie parsing (bsc#1233668)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-02"/>
	<updated date="2024-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1233668">SUSE bug 1233668</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52804/">CVE-2024-52804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52804">CVE-2024-52804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955707" comment="python311-tornado6-6.3.2-150400.9.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5114" version="1" class="patch">
	<metadata>
		<title>Security update for wget (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233773" ref_url="https://bugzilla.suse.com/1233773" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-10524" ref_url="https://www.suse.com/security/cve/CVE-2024-10524/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019891.html" source="SUSE-SU"/>
		<description>
This update for wget fixes the following issues:

- CVE-2024-10524: Fixed SSRF via shorthand HTTP URL (bsc#1233773)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-02"/>
	<updated date="2024-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1233773">SUSE bug 1233773</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10524/">CVE-2024-10524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10524">CVE-2024-10524 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955708" comment="wget-1.20.3-150000.3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955709" comment="wget-lang-1.20.3-150000.3.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5115" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233651" ref_url="https://bugzilla.suse.com/1233651" source="BUGZILLA"/>
		<reference ref_id="1233702" ref_url="https://bugzilla.suse.com/1233702" source="BUGZILLA"/>
		<reference ref_id="1233703" ref_url="https://bugzilla.suse.com/1233703" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-11233" ref_url="https://www.suse.com/security/cve/CVE-2024-11233/" source="CVE"/>
		<reference ref_id="CVE-2024-11234" ref_url="https://www.suse.com/security/cve/CVE-2024-11234/" source="CVE"/>
		<reference ref_id="CVE-2024-8929" ref_url="https://www.suse.com/security/cve/CVE-2024-8929/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019901.html" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2024-11233: Single byte overread with convert.quoted-printable-decode filter (bsc#1233702).
- CVE-2024-11234: Configuring a proxy in a stream context might allow for CRLF injection in URIs (bsc#1233703).
- CVE-2024-8929: Leak partial content of the heap through heap buffer over-read (bsc#1233651).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-03"/>
	<updated date="2024-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1233651">SUSE bug 1233651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233702">SUSE bug 1233702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233703">SUSE bug 1233703</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11233/">CVE-2024-11233 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11233">CVE-2024-11233 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11234/">CVE-2024-11234 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11234">CVE-2024-11234 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8929/">CVE-2024-8929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8929">CVE-2024-8929 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955895" comment="apache2-mod_php7-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955896" comment="php7-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955897" comment="php7-bcmath-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955898" comment="php7-bz2-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955899" comment="php7-calendar-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955900" comment="php7-cli-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955901" comment="php7-ctype-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955902" comment="php7-curl-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955903" comment="php7-dba-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955904" comment="php7-devel-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955905" comment="php7-dom-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955906" comment="php7-embed-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955907" comment="php7-enchant-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955908" comment="php7-exif-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955909" comment="php7-fastcgi-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955910" comment="php7-fileinfo-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955911" comment="php7-fpm-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955912" comment="php7-ftp-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955913" comment="php7-gd-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955914" comment="php7-gettext-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955915" comment="php7-gmp-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955916" comment="php7-iconv-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955917" comment="php7-intl-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955918" comment="php7-json-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955919" comment="php7-ldap-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955920" comment="php7-mbstring-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955921" comment="php7-mysql-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955922" comment="php7-odbc-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955923" comment="php7-opcache-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955924" comment="php7-openssl-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955925" comment="php7-pcntl-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955926" comment="php7-pdo-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955927" comment="php7-pgsql-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955928" comment="php7-phar-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955929" comment="php7-posix-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955930" comment="php7-readline-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955931" comment="php7-shmop-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955932" comment="php7-snmp-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955933" comment="php7-soap-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955934" comment="php7-sockets-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955935" comment="php7-sodium-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955936" comment="php7-sqlite-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955937" comment="php7-sysvmsg-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955938" comment="php7-sysvsem-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955939" comment="php7-sysvshm-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955940" comment="php7-test-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955941" comment="php7-tidy-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955942" comment="php7-tokenizer-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955943" comment="php7-xmlreader-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955944" comment="php7-xmlrpc-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955945" comment="php7-xmlwriter-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955946" comment="php7-xsl-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955947" comment="php7-zip-7.4.33-150400.4.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955948" comment="php7-zlib-7.4.33-150400.4.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5116" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233650" ref_url="https://bugzilla.suse.com/1233650" source="BUGZILLA"/>
		<reference ref_id="1233695" ref_url="https://bugzilla.suse.com/1233695" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-11691" ref_url="https://www.suse.com/security/cve/CVE-2024-11691/" source="CVE"/>
		<reference ref_id="CVE-2024-11692" ref_url="https://www.suse.com/security/cve/CVE-2024-11692/" source="CVE"/>
		<reference ref_id="CVE-2024-11693" ref_url="https://www.suse.com/security/cve/CVE-2024-11693/" source="CVE"/>
		<reference ref_id="CVE-2024-11694" ref_url="https://www.suse.com/security/cve/CVE-2024-11694/" source="CVE"/>
		<reference ref_id="CVE-2024-11695" ref_url="https://www.suse.com/security/cve/CVE-2024-11695/" source="CVE"/>
		<reference ref_id="CVE-2024-11696" ref_url="https://www.suse.com/security/cve/CVE-2024-11696/" source="CVE"/>
		<reference ref_id="CVE-2024-11697" ref_url="https://www.suse.com/security/cve/CVE-2024-11697/" source="CVE"/>
		<reference ref_id="CVE-2024-11698" ref_url="https://www.suse.com/security/cve/CVE-2024-11698/" source="CVE"/>
		<reference ref_id="CVE-2024-11699" ref_url="https://www.suse.com/security/cve/CVE-2024-11699/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019900.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Mozilla Thunderbird 128.5
  * fixed: IMAP could crash when reading cached messages
  * fixed: Enabling 'Show Folder Size' on Maildir profile could
    render Thunderbird unusable
  * fixed: Messages corrupted by folder compaction were only
    fixed by user intervention
  * fixed: Reading a message from past the end of an mbox file
    did not cause an error
  * fixed: View -&gt; Folders had duplicate F access keys
  * fixed: Add-ons adding columns to the message list could fail
    and cause display issue
  * fixed: 'Empty trash on exit' and 'Expunge inbox on exit' did
    not always work
  * fixed: Selecting a display option in View -&gt; Tasks did not
    apply in the Task interface
  * fixed: Security fixes
  MFSA 2024-68 (bsc#1233695)
  * CVE-2024-11691 Out-of-bounds write in Apple GPU drivers via WebGL
  * CVE-2024-11692 Select list elements could be shown over another site
  * CVE-2024-11693 Download Protections were bypassed by .library-ms files on Windows
  * CVE-2024-11694 CSP Bypass and XSS Exposure via Web Compatibility Shims
  * CVE-2024-11695 URL Bar Spoofing via Manipulated Punycode and Whitespace Characters
  * CVE-2024-11696 Unhandled Exception in Add-on Signature Verification
  * CVE-2024-11697 Improper Keypress Handling in Executable File Confirmation Dialog
  * CVE-2024-11698 Fullscreen Lock-Up When Modal Dialog Interrupts Transition on macOS
  * CVE-2024-11699 Memory safety bugs fixed in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5

- Handle upstream changes with esr-prefix of desktop-file (bsc#1233650)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-03"/>
	<updated date="2024-12-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1233650">SUSE bug 1233650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233695">SUSE bug 1233695</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11691/">CVE-2024-11691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11691">CVE-2024-11691 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11692/">CVE-2024-11692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11692">CVE-2024-11692 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11693/">CVE-2024-11693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11693">CVE-2024-11693 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11694/">CVE-2024-11694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11694">CVE-2024-11694 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11695/">CVE-2024-11695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11695">CVE-2024-11695 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11696/">CVE-2024-11696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11696">CVE-2024-11696 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11697/">CVE-2024-11697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11697">CVE-2024-11697 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11698/">CVE-2024-11698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11698">CVE-2024-11698 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11699/">CVE-2024-11699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11699">CVE-2024-11699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955949" comment="MozillaThunderbird-128.5.0-150200.8.191.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955950" comment="MozillaThunderbird-translations-common-128.5.0-150200.8.191.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955951" comment="MozillaThunderbird-translations-other-128.5.0-150200.8.191.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5117" version="1" class="patch">
	<metadata>
		<title>Security update for python (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1227378" ref_url="https://bugzilla.suse.com/1227378" source="BUGZILLA"/>
		<reference ref_id="1231795" ref_url="https://bugzilla.suse.com/1231795" source="BUGZILLA"/>
		<reference ref_id="1233307" ref_url="https://bugzilla.suse.com/1233307" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-11168" ref_url="https://www.suse.com/security/cve/CVE-2024-11168/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019899.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:
  
- CVE-2024-11168: Fixed improper validation of IPv6 and IPvFuture addresses (bsc#1233307)                                                                                                                                                                                     
                                                                                                                                                                                                                                                                              
Other fixes:                                                                                                                                                                                                                                                                  
- Add ipaddress module from https://github.com/phihag/ipaddress                                                                                                                                                                                                               
- Remove -IVendor/ from python-config (bsc#1231795)                                                                                                                                                                                                                           
- Stop using %%defattr, it seems to be breaking proper executable                                                                                                                                                                                                             
  attributes on /usr/bin/ scripts (bsc#1227378).  
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-03"/>
	<updated date="2024-12-03"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1227378">SUSE bug 1227378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231795">SUSE bug 1231795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233307">SUSE bug 1233307</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-11168/">CVE-2024-11168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11168">CVE-2024-11168 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955952" comment="libpython2_7-1_0-2.7.18-150000.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955953" comment="libpython2_7-1_0-32bit-2.7.18-150000.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955954" comment="python-2.7.18-150000.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955955" comment="python-32bit-2.7.18-150000.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955956" comment="python-base-2.7.18-150000.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955957" comment="python-base-32bit-2.7.18-150000.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955958" comment="python-curses-2.7.18-150000.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955959" comment="python-demo-2.7.18-150000.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955960" comment="python-devel-2.7.18-150000.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955961" comment="python-doc-2.7.18-150000.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955962" comment="python-doc-pdf-2.7.18-150000.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955963" comment="python-gdbm-2.7.18-150000.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955964" comment="python-idle-2.7.18-150000.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955965" comment="python-tk-2.7.18-150000.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955966" comment="python-xml-2.7.18-150000.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5118" version="1" class="patch">
	<metadata>
		<title>Security update for python310 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231795" ref_url="https://bugzilla.suse.com/1231795" source="BUGZILLA"/>
		<reference ref_id="1232750" ref_url="https://bugzilla.suse.com/1232750" source="BUGZILLA"/>
		<reference ref_id="1233307" ref_url="https://bugzilla.suse.com/1233307" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-11168" ref_url="https://www.suse.com/security/cve/CVE-2024-11168/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019897.html" source="SUSE-SU"/>
		<description>
This update for python310 fixes the following issues:
  
- CVE-2024-11168: improper validation of IPv6 and IPvFuture addresses. (bsc#1233307)

Bug fixes:

- Remove -IVendor/ from python-config. (bsc#1231795)
- Include renaming :noindex: option to :no-index: in Sphinx 7.2. (bsc#1232750)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-03"/>
	<updated date="2024-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1231795">SUSE bug 1231795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232750">SUSE bug 1232750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233307">SUSE bug 1233307</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-11168/">CVE-2024-11168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11168">CVE-2024-11168 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009955967" comment="libpython3_10-1_0-3.10.15-150400.4.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955968" comment="libpython3_10-1_0-32bit-3.10.15-150400.4.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955969" comment="python310-3.10.15-150400.4.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955970" comment="python310-32bit-3.10.15-150400.4.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955971" comment="python310-base-3.10.15-150400.4.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955972" comment="python310-base-32bit-3.10.15-150400.4.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955973" comment="python310-curses-3.10.15-150400.4.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955974" comment="python310-dbm-3.10.15-150400.4.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955975" comment="python310-devel-3.10.15-150400.4.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955976" comment="python310-doc-3.10.15-150400.4.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955977" comment="python310-doc-devhelp-3.10.15-150400.4.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955978" comment="python310-idle-3.10.15-150400.4.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955979" comment="python310-testsuite-3.10.15-150400.4.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955980" comment="python310-tk-3.10.15-150400.4.63.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009955981" comment="python310-tools-3.10.15-150400.4.63.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5119" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql16, postgresql17 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219340" ref_url="https://bugzilla.suse.com/1219340" source="BUGZILLA"/>
		<reference ref_id="1230423" ref_url="https://bugzilla.suse.com/1230423" source="BUGZILLA"/>
		<reference ref_id="1233323" ref_url="https://bugzilla.suse.com/1233323" source="BUGZILLA"/>
		<reference ref_id="1233325" ref_url="https://bugzilla.suse.com/1233325" source="BUGZILLA"/>
		<reference ref_id="1233326" ref_url="https://bugzilla.suse.com/1233326" source="BUGZILLA"/>
		<reference ref_id="1233327" ref_url="https://bugzilla.suse.com/1233327" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-10976" ref_url="https://www.suse.com/security/cve/CVE-2024-10976/" source="CVE"/>
		<reference ref_id="CVE-2024-10977" ref_url="https://www.suse.com/security/cve/CVE-2024-10977/" source="CVE"/>
		<reference ref_id="CVE-2024-10978" ref_url="https://www.suse.com/security/cve/CVE-2024-10978/" source="CVE"/>
		<reference ref_id="CVE-2024-10979" ref_url="https://www.suse.com/security/cve/CVE-2024-10979/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019917.html" source="SUSE-SU"/>
		<description>
This update for postgresql, postgresql16, postgresql17 fixes the following issues:

This update ships postgresql17 , and fixes security issues with postgresql16:

- bsc#1230423: Relax the dependency of extensions on the server
  version from exact major.minor to greater or equal, after Tom
  Lane confirmed on the PostgreSQL packagers list that ABI
  stability is being taken care of between minor releases.

- bsc#1219340: The last fix was not correct. Improve it by removing
  the dependency again and call fillup only if it is installed.

postgresql16 was updated to 16.6:
* Repair ABI break for extensions that work with struct
  ResultRelInfo.
* Restore functionality of ALTER {ROLE|DATABASE} SET role.
* Fix cases where a logical replication slot's restart_lsn could
  go backwards.
* Avoid deleting still-needed WAL files during pg_rewind.
* Fix race conditions associated with dropping shared statistics
  entries.
* Count index scans in contrib/bloom indexes in the statistics
  views, such as the pg_stat_user_indexes.idx_scan counter.
* Fix crash when checking to see if an index's opclass options
  have changed.
* Avoid assertion failure caused by disconnected NFA sub-graphs
  in regular expression parsing.
* https://www.postgresql.org/docs/release/16.6/

postgresql16 was updated to 16.5:

* CVE-2024-10976, bsc#1233323: Ensure cached plans are marked as
  dependent on the calling role when RLS applies to a
  non-top-level table reference.
* CVE-2024-10977, bsc#1233325: Make libpq discard error messages
  received during SSL or GSS protocol negotiation.
* CVE-2024-10978, bsc#1233326: Fix unintended interactions
  between SET SESSION AUTHORIZATION and SET ROLE
* CVE-2024-10979, bsc#1233327: Prevent trusted PL/Perl code from
  changing environment variables.
* https://www.postgresql.org/about/news/p-2955/
* https://www.postgresql.org/docs/release/16.5/

- Don't build the libs and mini flavor anymore to hand over to
  PostgreSQL 17.

  * https://www.postgresql.org/about/news/p-2910/

postgresql17 is shipped in version 17.2:

* CVE-2024-10976, bsc#1233323: Ensure cached plans are marked as
  dependent on the calling role when RLS applies to a
  non-top-level table reference.
* CVE-2024-10977, bsc#1233325: Make libpq discard error messages
  received during SSL or GSS protocol negotiation.
* CVE-2024-10978, bsc#1233326: Fix unintended interactions
  between SET SESSION AUTHORIZATION and SET ROLE
* CVE-2024-10979, bsc#1233327: Prevent trusted PL/Perl code from
  changing environment variables.
* https://www.postgresql.org/about/news/p-2955/
* https://www.postgresql.org/docs/release/17.1/
* https://www.postgresql.org/docs/release/17.2/

Upgrade to 17.2:

* Repair ABI break for extensions that work with struct
  ResultRelInfo.
* Restore functionality of ALTER {ROLE|DATABASE} SET role.
* Fix cases where a logical replication slot's restart_lsn could
  go backwards.
* Avoid deleting still-needed WAL files during pg_rewind.
* Fix race conditions associated with dropping shared statistics
  entries.
* Count index scans in contrib/bloom indexes in the statistics
  views, such as the pg_stat_user_indexes.idx_scan counter.
* Fix crash when checking to see if an index's opclass options
  have changed.
* Avoid assertion failure caused by disconnected NFA sub-graphs
  in regular expression parsing.

Upgrade to 17.0:

* New memory management system for VACUUM, which reduces memory
  consumption and can improve overall vacuuming performance.
* New SQL/JSON capabilities, including constructors, identity
  functions, and the JSON_TABLE() function, which converts JSON
  data into a table representation.
* Various query performance improvements, including for
  sequential reads using streaming I/O, write throughput under
  high concurrency, and searches over multiple values in a btree
  index.
* Logical replication enhancements, including:
  + Failover control
  + pg_createsubscriber, a utility that creates logical replicas
    from physical standbys
  + pg_upgrade now preserves replication slots on both publishers
    and subscribers
* New client-side connection option, sslnegotiation=direct, that
  performs a direct TLS handshake to avoid a round-trip
  negotiation.
* pg_basebackup now supports incremental backup.
* COPY adds a new option, ON_ERROR ignore, that allows a copy
  operation to continue in the event of an error.
* https://www.postgresql.org/about/news/p-2936/
* https://www.postgresql.org/docs/17/release-17.html
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2024-12-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219340">SUSE bug 1219340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230423">SUSE bug 1230423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233323">SUSE bug 1233323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233325">SUSE bug 1233325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233326">SUSE bug 1233326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233327">SUSE bug 1233327</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10976/">CVE-2024-10976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10976">CVE-2024-10976 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10977/">CVE-2024-10977 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10977">CVE-2024-10977 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10978/">CVE-2024-10978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10978">CVE-2024-10978 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-10979/">CVE-2024-10979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10979">CVE-2024-10979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956225" comment="libecpg6-17.2-150200.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956226" comment="libecpg6-32bit-17.2-150200.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956227" comment="libpq5-17.2-150200.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956228" comment="libpq5-32bit-17.2-150200.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956229" comment="postgresql-17-150500.10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956230" comment="postgresql-contrib-17-150500.10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956231" comment="postgresql-devel-17-150500.10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956232" comment="postgresql-docs-17-150500.10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956233" comment="postgresql-llvmjit-17-150500.10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956234" comment="postgresql-llvmjit-devel-17-150500.10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956235" comment="postgresql-plperl-17-150500.10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956236" comment="postgresql-plpython-17-150500.10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956237" comment="postgresql-pltcl-17-150500.10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956238" comment="postgresql-server-17-150500.10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956239" comment="postgresql-server-devel-17-150500.10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956240" comment="postgresql-test-17-150500.10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956241" comment="postgresql16-16.6-150200.5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956242" comment="postgresql16-contrib-16.6-150200.5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956243" comment="postgresql16-devel-16.6-150200.5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956244" comment="postgresql16-docs-16.6-150200.5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956245" comment="postgresql16-llvmjit-16.6-150200.5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956246" comment="postgresql16-llvmjit-devel-16.6-150200.5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956247" comment="postgresql16-plperl-16.6-150200.5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956248" comment="postgresql16-plpython-16.6-150200.5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956249" comment="postgresql16-pltcl-16.6-150200.5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956250" comment="postgresql16-server-16.6-150200.5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956251" comment="postgresql16-server-devel-16.6-150200.5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956252" comment="postgresql16-test-16.6-150200.5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956253" comment="postgresql17-17.2-150200.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956254" comment="postgresql17-contrib-17.2-150200.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956255" comment="postgresql17-devel-17.2-150200.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956256" comment="postgresql17-docs-17.2-150200.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956257" comment="postgresql17-llvmjit-17.2-150200.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956258" comment="postgresql17-llvmjit-devel-17.2-150200.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956259" comment="postgresql17-plperl-17.2-150200.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956260" comment="postgresql17-plpython-17.2-150200.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956261" comment="postgresql17-pltcl-17.2-150200.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956262" comment="postgresql17-server-17.2-150200.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956263" comment="postgresql17-server-devel-17.2-150200.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956264" comment="postgresql17-test-17.2-150200.5.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5120" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql15 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233323" ref_url="https://bugzilla.suse.com/1233323" source="BUGZILLA"/>
		<reference ref_id="1233325" ref_url="https://bugzilla.suse.com/1233325" source="BUGZILLA"/>
		<reference ref_id="1233326" ref_url="https://bugzilla.suse.com/1233326" source="BUGZILLA"/>
		<reference ref_id="1233327" ref_url="https://bugzilla.suse.com/1233327" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-10976" ref_url="https://www.suse.com/security/cve/CVE-2024-10976/" source="CVE"/>
		<reference ref_id="CVE-2024-10977" ref_url="https://www.suse.com/security/cve/CVE-2024-10977/" source="CVE"/>
		<reference ref_id="CVE-2024-10978" ref_url="https://www.suse.com/security/cve/CVE-2024-10978/" source="CVE"/>
		<reference ref_id="CVE-2024-10979" ref_url="https://www.suse.com/security/cve/CVE-2024-10979/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019916.html" source="SUSE-SU"/>
		<description>
This update for postgresql15 fixes the following issues:

- CVE-2024-10976: Ensure cached plans are marked as dependent on the calling role when RLS applies to a non-top-level table reference (bsc#1233323).
- CVE-2024-10977: Make libpq discard error messages received during SSL or GSS protocol negotiation (bsc#1233325).
- CVE-2024-10978: Fix unintended interactions between SET SESSION AUTHORIZATION and SET ROLE (bsc#1233326).
- CVE-2024-10979: Prevent trusted PL/Perl code from changing environment variables (bsc#1233327).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2024-12-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1233323">SUSE bug 1233323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233325">SUSE bug 1233325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233326">SUSE bug 1233326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233327">SUSE bug 1233327</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10976/">CVE-2024-10976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10976">CVE-2024-10976 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10977/">CVE-2024-10977 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10977">CVE-2024-10977 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10978/">CVE-2024-10978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10978">CVE-2024-10978 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-10979/">CVE-2024-10979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10979">CVE-2024-10979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956265" comment="postgresql15-15.10-150200.5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956266" comment="postgresql15-contrib-15.10-150200.5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956267" comment="postgresql15-devel-15.10-150200.5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956268" comment="postgresql15-docs-15.10-150200.5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956269" comment="postgresql15-llvmjit-15.10-150200.5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956270" comment="postgresql15-llvmjit-devel-15.10-150200.5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956271" comment="postgresql15-plperl-15.10-150200.5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956272" comment="postgresql15-plpython-15.10-150200.5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956273" comment="postgresql15-pltcl-15.10-150200.5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956274" comment="postgresql15-server-15.10-150200.5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956275" comment="postgresql15-server-devel-15.10-150200.5.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956276" comment="postgresql15-test-15.10-150200.5.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5121" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233323" ref_url="https://bugzilla.suse.com/1233323" source="BUGZILLA"/>
		<reference ref_id="1233325" ref_url="https://bugzilla.suse.com/1233325" source="BUGZILLA"/>
		<reference ref_id="1233326" ref_url="https://bugzilla.suse.com/1233326" source="BUGZILLA"/>
		<reference ref_id="1233327" ref_url="https://bugzilla.suse.com/1233327" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-10976" ref_url="https://www.suse.com/security/cve/CVE-2024-10976/" source="CVE"/>
		<reference ref_id="CVE-2024-10977" ref_url="https://www.suse.com/security/cve/CVE-2024-10977/" source="CVE"/>
		<reference ref_id="CVE-2024-10978" ref_url="https://www.suse.com/security/cve/CVE-2024-10978/" source="CVE"/>
		<reference ref_id="CVE-2024-10979" ref_url="https://www.suse.com/security/cve/CVE-2024-10979/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019915.html" source="SUSE-SU"/>
		<description>
This update for postgresql13 fixes the following issues:

- CVE-2024-10976: Ensure cached plans are marked as dependent on the calling role when RLS applies to a non-top-level table reference (bsc#1233323).
- CVE-2024-10977: Make libpq discard error messages received during SSL or GSS protocol negotiation (bsc#1233325).
- CVE-2024-10978: Fix unintended interactions between SET SESSION AUTHORIZATION and SET ROLE (bsc#1233326).
- CVE-2024-10979: Prevent trusted PL/Perl code from changing environment variables (bsc#1233327).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2024-12-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1233323">SUSE bug 1233323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233325">SUSE bug 1233325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233326">SUSE bug 1233326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233327">SUSE bug 1233327</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10976/">CVE-2024-10976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10976">CVE-2024-10976 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10977/">CVE-2024-10977 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10977">CVE-2024-10977 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10978/">CVE-2024-10978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10978">CVE-2024-10978 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-10979/">CVE-2024-10979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10979">CVE-2024-10979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956277" comment="postgresql13-13.18-150200.5.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956278" comment="postgresql13-contrib-13.18-150200.5.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956279" comment="postgresql13-devel-13.18-150200.5.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956280" comment="postgresql13-docs-13.18-150200.5.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956281" comment="postgresql13-llvmjit-13.18-150200.5.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956282" comment="postgresql13-llvmjit-devel-13.18-150200.5.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956283" comment="postgresql13-plperl-13.18-150200.5.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956284" comment="postgresql13-plpython-13.18-150200.5.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956285" comment="postgresql13-pltcl-13.18-150200.5.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956286" comment="postgresql13-server-13.18-150200.5.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956287" comment="postgresql13-server-devel-13.18-150200.5.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956288" comment="postgresql13-test-13.18-150200.5.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5122" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql14 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233323" ref_url="https://bugzilla.suse.com/1233323" source="BUGZILLA"/>
		<reference ref_id="1233325" ref_url="https://bugzilla.suse.com/1233325" source="BUGZILLA"/>
		<reference ref_id="1233326" ref_url="https://bugzilla.suse.com/1233326" source="BUGZILLA"/>
		<reference ref_id="1233327" ref_url="https://bugzilla.suse.com/1233327" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-10976" ref_url="https://www.suse.com/security/cve/CVE-2024-10976/" source="CVE"/>
		<reference ref_id="CVE-2024-10977" ref_url="https://www.suse.com/security/cve/CVE-2024-10977/" source="CVE"/>
		<reference ref_id="CVE-2024-10978" ref_url="https://www.suse.com/security/cve/CVE-2024-10978/" source="CVE"/>
		<reference ref_id="CVE-2024-10979" ref_url="https://www.suse.com/security/cve/CVE-2024-10979/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019914.html" source="SUSE-SU"/>
		<description>
This update for postgresql14 fixes the following issues:

- CVE-2024-10976: Ensure cached plans are marked as dependent on the calling role when RLS applies to a non-top-level table reference (bsc#1233323).
- CVE-2024-10977: Make libpq discard error messages received during SSL or GSS protocol negotiation (bsc#1233325).
- CVE-2024-10978: Fix unintended interactions between SET SESSION AUTHORIZATION and SET ROLE (bsc#1233326).
- CVE-2024-10979: Prevent trusted PL/Perl code from changing environment variables (bsc#1233327).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-04"/>
	<updated date="2024-12-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1233323">SUSE bug 1233323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233325">SUSE bug 1233325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233326">SUSE bug 1233326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233327">SUSE bug 1233327</bugzilla>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10976/">CVE-2024-10976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10976">CVE-2024-10976 at NVD</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10977/">CVE-2024-10977 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10977">CVE-2024-10977 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10978/">CVE-2024-10978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10978">CVE-2024-10978 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-10979/">CVE-2024-10979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10979">CVE-2024-10979 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956289" comment="postgresql14-14.15-150200.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956290" comment="postgresql14-contrib-14.15-150200.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956291" comment="postgresql14-devel-14.15-150200.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956292" comment="postgresql14-docs-14.15-150200.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956293" comment="postgresql14-llvmjit-14.15-150200.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956294" comment="postgresql14-llvmjit-devel-14.15-150200.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956295" comment="postgresql14-plperl-14.15-150200.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956296" comment="postgresql14-plpython-14.15-150200.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956297" comment="postgresql14-pltcl-14.15-150200.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956298" comment="postgresql14-server-14.15-150200.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956299" comment="postgresql14-server-devel-14.15-150200.5.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956300" comment="postgresql14-test-14.15-150200.5.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5123" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231795" ref_url="https://bugzilla.suse.com/1231795" source="BUGZILLA"/>
		<reference ref_id="1233307" ref_url="https://bugzilla.suse.com/1233307" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-11168" ref_url="https://www.suse.com/security/cve/CVE-2024-11168/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019921.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2024-11168: Fixed improper validation of IPv6 and IPvFuture addresses (bsc#1233307)

Other fixes:
- Remove -IVendor/ from python-config (bsc#1231795)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-05"/>
	<updated date="2024-12-05"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1231795">SUSE bug 1231795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233307">SUSE bug 1233307</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-11168/">CVE-2024-11168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11168">CVE-2024-11168 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956569" comment="libpython3_6m1_0-3.6.15-150300.10.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956570" comment="libpython3_6m1_0-32bit-3.6.15-150300.10.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956571" comment="python3-3.6.15-150300.10.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956572" comment="python3-base-3.6.15-150300.10.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956573" comment="python3-curses-3.6.15-150300.10.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956574" comment="python3-dbm-3.6.15-150300.10.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956575" comment="python3-devel-3.6.15-150300.10.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956576" comment="python3-doc-3.6.15-150300.10.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956577" comment="python3-doc-devhelp-3.6.15-150300.10.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956578" comment="python3-idle-3.6.15-150300.10.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956579" comment="python3-testsuite-3.6.15-150300.10.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956580" comment="python3-tk-3.6.15-150300.10.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956581" comment="python3-tools-3.6.15-150300.10.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5124" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231702" ref_url="https://bugzilla.suse.com/1231702" source="BUGZILLA"/>
		<reference ref_id="1231711" ref_url="https://bugzilla.suse.com/1231711" source="BUGZILLA"/>
		<reference ref_id="1231716" ref_url="https://bugzilla.suse.com/1231716" source="BUGZILLA"/>
		<reference ref_id="1231719" ref_url="https://bugzilla.suse.com/1231719" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21208" ref_url="https://www.suse.com/security/cve/CVE-2024-21208/" source="CVE"/>
		<reference ref_id="CVE-2024-21210" ref_url="https://www.suse.com/security/cve/CVE-2024-21210/" source="CVE"/>
		<reference ref_id="CVE-2024-21217" ref_url="https://www.suse.com/security/cve/CVE-2024-21217/" source="CVE"/>
		<reference ref_id="CVE-2024-21235" ref_url="https://www.suse.com/security/cve/CVE-2024-21235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019931.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version jdk8u432 (icedtea-3.33.0):
- CVE-2024-21208: Fixed partial DoS in component Networking (bsc#1231702,JDK-8328286)
- CVE-2024-21210: Fixed unauthorized update, insert or delete access to some of Oracle Java SE accessible data in component Hotspot (bsc#1231711,JDK-8328544)
- CVE-2024-21217: Fixed partial DoS in component Serialization (bsc#1231716,JDK-8331446)
- CVE-2024-21235: Fixed unauthorized read/write access to data in component Hotspot (bsc#1231719,JDK-8332644)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-05"/>
	<updated date="2024-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1231702">SUSE bug 1231702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231711">SUSE bug 1231711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231716">SUSE bug 1231716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231719">SUSE bug 1231719</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21208/">CVE-2024-21208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21208">CVE-2024-21208 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21210/">CVE-2024-21210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21210">CVE-2024-21210 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21217/">CVE-2024-21217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21217">CVE-2024-21217 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21235/">CVE-2024-21235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21235">CVE-2024-21235 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956582" comment="java-1_8_0-openjdk-1.8.0.432-150000.3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956583" comment="java-1_8_0-openjdk-accessibility-1.8.0.432-150000.3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956584" comment="java-1_8_0-openjdk-demo-1.8.0.432-150000.3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956585" comment="java-1_8_0-openjdk-devel-1.8.0.432-150000.3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956586" comment="java-1_8_0-openjdk-headless-1.8.0.432-150000.3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956587" comment="java-1_8_0-openjdk-javadoc-1.8.0.432-150000.3.100.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956588" comment="java-1_8_0-openjdk-src-1.8.0.432-150000.3.100.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5125" version="1" class="patch">
	<metadata>
		<title>Security update for docker-stable (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214855" ref_url="https://bugzilla.suse.com/1214855" source="BUGZILLA"/>
		<reference ref_id="1221916" ref_url="https://bugzilla.suse.com/1221916" source="BUGZILLA"/>
		<reference ref_id="1228324" ref_url="https://bugzilla.suse.com/1228324" source="BUGZILLA"/>
		<reference ref_id="1230331" ref_url="https://bugzilla.suse.com/1230331" source="BUGZILLA"/>
		<reference ref_id="1230333" ref_url="https://bugzilla.suse.com/1230333" source="BUGZILLA"/>
		<reference ref_id="1231348" ref_url="https://bugzilla.suse.com/1231348" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-41110" ref_url="https://www.suse.com/security/cve/CVE-2024-41110/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019930.html" source="SUSE-SU"/>
		<description>
This update for docker-stable fixes the following issues:

- CVE-2024-41110: Fixed Authz zero length regression (bsc#1228324).

Bug fixes:

- Allow users to disable SUSE secrets support by setting DOCKER_SUSE_SECRETS_ENABLE=0 in /etc/sysconfig/docker (bsc#1231348).
- Import specfile changes for docker-buildx as well as the changes to help reduce specfile differences between docker-stable and docker (bsc#1230331, bsc#1230333).
- Fix BuildKit's symlink resolution logic to correctly handle non-lexical symlinks (bsc#1221916).
- Write volume options atomically so sudden system crashes won't result in future Docker starts failing due to empty files (bsc#1214855).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-05"/>
	<updated date="2024-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214855">SUSE bug 1214855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221916">SUSE bug 1221916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228324">SUSE bug 1228324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230331">SUSE bug 1230331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230333">SUSE bug 1230333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231348">SUSE bug 1231348</bugzilla>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41110/">CVE-2024-41110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41110">CVE-2024-41110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956589" comment="docker-stable-24.0.9_ce-150000.1.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956590" comment="docker-stable-bash-completion-24.0.9_ce-150000.1.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956591" comment="docker-stable-fish-completion-24.0.9_ce-150000.1.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956592" comment="docker-stable-rootless-extras-24.0.9_ce-150000.1.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956593" comment="docker-stable-zsh-completion-24.0.9_ce-150000.1.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5126" version="1" class="patch">
	<metadata>
		<title>Security update for obs-scm-bridge (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1230469" ref_url="https://bugzilla.suse.com/1230469" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-22038" ref_url="https://www.suse.com/security/cve/CVE-2024-22038/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019937.html" source="SUSE-SU"/>
		<description>
This update for obs-scm-bridge fixes the following issues:

  Updated to version 0.5.4:
  - CVE-2024-22038: Fixed DoS attacks, information leaks with crafted Git repositories (bnc#1230469)

		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-05"/>
	<updated date="2024-12-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1230469">SUSE bug 1230469</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-22038/">CVE-2024-22038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22038">CVE-2024-22038 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956594" comment="obs-scm-bridge-0.5.4-150100.3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5127" version="1" class="patch">
	<metadata>
		<title>Recommended update for helm (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219969" ref_url="https://bugzilla.suse.com/1219969" source="BUGZILLA"/>
		<reference ref_id="1220207" ref_url="https://bugzilla.suse.com/1220207" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-25620" ref_url="https://www.suse.com/security/cve/CVE-2024-25620/" source="CVE"/>
		<reference ref_id="CVE-2024-26147" ref_url="https://www.suse.com/security/cve/CVE-2024-26147/" source="CVE"/>
		<reference ref_id="SUSE-RU-2024:4213-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-December/037756.html" source="SUSE-SU"/>
		<description>

helm was updated to fix the following issues:

Update to version 3.16.3:

  * fix: fix label name
  * Fix typo in pkg/lint/rules/chartfile_test.go
  * Increasing the size of the runner used for releases.
  * fix(hooks): correct hooks delete order
  * Bump github.com/containerd/containerd from 1.7.12 to 1.7.23

Update to version 3.16.2:

  * Revering change unrelated to issue #13176
  * adds tests for handling of Helm index with broken chart
    versions #13176
  * improves handling of Helm index with broken helm chart versions
    #13176
  * Bump the k8s-io group with 7 updates
  * adding check-latest:true
  * Grammar fixes
  * Fix typos

Update to version 3.16.1:

  * bumping version to 1.22.7
  * Merge pull request #13327 from mattfarina/revert-11726

Update to version 3.16.0:

  Helm v3.16.0 is a feature release. Users are encouraged to
  upgrade for the best experience.
  * Notable Changes
    - added sha512sum template function
    - added ActiveHelp for cmds that don't take any more args
    - drops very old Kubernetes versions support in helm create
    - add --skip-schema-validation flag to helm 'install',
      'upgrade' and 'lint'
    - fixed bug to now use burst limit setting for discovery
    - Added windows arm64 support
  * Full changelog see
    https://github.com/helm/helm/releases/tag/v3.16.0

Update to version 3.15.4:

  * Bump the k8s-io group across 1 directory with 7 updates
  * Bump github.com/docker/docker

-------------------------------------------------------------------
Thu Jul 11 05:39:32 UTC 2024 - opensuse_buildservice@ojkastl.de

- Update to version 3.15.3:
  * fix(helm): Use burst limit setting for discovery
  * fixed dependency_update_test.go
  * fix(dependencyBuild): prevent race condition in concurrent helm
    dependency
  * fix: respect proxy envvars on helm install/upgrade
  * Merge pull request #13085 from
    alex-kattathra-johnson/issue-12961

Update to version 3.15.2:

  * fix: wrong cli description
  * fix typo in load_plugins.go
  * fix docs of DeployedAll
  * Bump github.com/docker/docker
  * bump oras minor version
  * feat(load.go): add warning on requirements.lock

Update to version 3.15.1:

  * Fixing build issue where wrong version is used

Update to version 3.15.0:

  Helm v3.15.0 is a feature release. Users are encouraged to
  upgrade for the best experience.

  * Updating to k8s 1.30 c4e37b3 (Matt Farina)
  * bump version to v3.15.0 d7afa3b (Matt Farina)
  * bump version to 7743467 (Matt Farina)
  * Fix namespace on kubeconfig error 214fb6e (Calvin Krist)
  * Update testdata PKI with keys that have validity until 3393
    (Fixes #12880) 1b75d48 (Dirk M?ller)
  * Modified how created annotation is populated based on package
    creation time 0a69a0d (Andrew Block)
  * Enabling hide secrets on install and upgrade dry run 25c4738
    (Matt Farina)
  * Fixing all the linting errors d58d7b3 (Robert Sirchia)
  * Add a note about --dry-run displaying secrets a23dd9e (Matt
    Farina)
  * Updating .gitignore 8b424ba (Robert Sirchia)
  * add error messages 8d19bcb (George Jenkins)
  * Fix: Ignore alias validation error for index load 68294fd
    (George Jenkins)
  * validation fix 8e6a514 (Matt Farina)
  * bug: add proxy support for oci getter 94c1dea (Ricardo
    Maraschini)
  * Update architecture detection method 57a1bb8 (weidongkl)
  * Improve release action 4790bb9 (George Jenkins)
  * Fix grammatical error c25736c (Matt Carr)
  * Updated for review comments d2cf8c6 (MichaelMorris)
  * Add robustness to wait status checks fc74964 (MichaelMorris)
  * refactor: create a helper for checking if a release is
    uninstalled f908379 (Alex Petrov)
  * fix: reinstall previously uninstalled chart with --keep-history
    9e198fa (Alex Petrov)

Update to version 3.14.4:

  Helm v3.14.4 is a patch release. Users are encouraged to upgrade
  for the best experience. Users are encouraged to upgrade for the
  best experience.

  * refactor: create a helper for checking if a release is
    uninstalled 81c902a (Alex Petrov)
  * fix: reinstall previously uninstalled chart with --keep-history
    5a11c76 (Alex Petrov)
  * bug: add proxy support for oci getter aa7d953 (Ricardo
    Maraschini)

Update to version 3.14.3:

  * Add a note about --dry-run displaying secrets
  * add error messages
  * Fix: Ignore alias validation error for index load
  * Update architecture detection method

Update to version 3.14.2 (bsc#1220207, CVE-2024-26147):

   * Fix for uninitialized variable in yaml parsing
 
Update to version 3.14.1 (bsc#1219969, CVE-2024-25620):

  * validation fix

Update to version 3.14.0:

  * Notable Changes
    - New helm search flag of --fail-on-no-result
    - Allow a nested tpl invocation access to defines
    - Speed up the tpl function
    - Added qps/HELM_QPS parameter that tells Kubernetes packages
      how to operate
    - Added --kube-version to lint command
    - The ignore pkg is now public
  * Changelog
    - Improve release action
    - Fix issues when verify generation readiness was merged
    - fix test to use the default code's k8sVersionMinor
    - lint: Add --kube-version flag to set capabilities and
      deprecation rules
    - Removing Asset Transparency
    - tests(pkg/engine): test RenderWithClientProvider
    - Make the `ignore` pkg public again
    - feature(pkg/engine): introduce RenderWithClientProvider
    - Updating Helm libraries for k8s 1.28.4
    - Remove excessive logging
    - Update CONTRIBUTING.md
    - Fixing release labelling in rollback
    - feat: move livenessProbe and readinessProbe values to default
      values file
    - Revert 'fix(main): fix basic auth for helm pull or push'
    - Revert 'fix(registry): address anonymous pull issue'
    - Update get-helm-3
    - Drop filterSystemLabels usage from Query method
    - Apply review suggestions
    - Update get-helm-3 to get version through get.helm.sh
    - feat: print failed hook name
    - Fixing precedence issue with the import of values.
    - chore(create): indent to spaces
    - Allow using label selectors for system labels for sql
      backend.
    - Allow using label selectors for system labels for secrets and
      configmap backends.
    - remove useless print during prepareUpgrade
    - Add missing with clause to release gh action
    - FIX Default ServiceAccount yaml
    - fix(registry): address anonymous pull issue
    - fix(registry): unswallow error
    - Fix missing run statement on release action
    - Add qps/HELM_QPS parameter
    - Write latest version to get.helm.sh bucket
    - Increased release information key name max length.
    - Pin gox to specific commit
    - Remove `GoFish` from package managers for installing  the
      binary
    - Test update for 'Allow a nested `tpl` invocation access to
      `defines` in a containing one'
    - Test update for 'Speed up `tpl`'
    - Add support for RISC-V
    - lint and validate dependency metadata to reference
      dependencies with a unique key (name or alias)
    - Work around template.Clone omitting options
    - fix: pass 'passCredentialsAll' as env-var to getter
    - feat: pass basic auth to env-vars when running download
      plugins
    - helm search: New CLI Flag --fail-on-no-result
    - Update pkg/kube/ready.go
    - fix post install hook deletion due to before-hook-creation
      policy
    - Allow a nested `tpl` invocation access to `defines` in a
      containing one
    - Remove the 'reference templates' concept
    - Speed up `tpl`
    - ready checker- comment update
    - ready checker- remove duplicate statefulset generational
      check
    - Verify generation in readiness checks
    - feat(helm): add --reset-then-reuse-values flag to 'helm
      upgrade'
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-05"/>
	<updated date="2024-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219969">SUSE bug 1219969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220207">SUSE bug 1220207</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-25620/">CVE-2024-25620 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25620">CVE-2024-25620 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26147/">CVE-2024-26147 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26147">CVE-2024-26147 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956595" comment="helm-3.16.3-150000.1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956596" comment="helm-bash-completion-3.16.3-150000.1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956597" comment="helm-fish-completion-3.16.3-150000.1.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956598" comment="helm-zsh-completion-3.16.3-150000.1.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5128" version="1" class="patch">
	<metadata>
		<title>Security update for php8 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233651" ref_url="https://bugzilla.suse.com/1233651" source="BUGZILLA"/>
		<reference ref_id="1233702" ref_url="https://bugzilla.suse.com/1233702" source="BUGZILLA"/>
		<reference ref_id="1233703" ref_url="https://bugzilla.suse.com/1233703" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-11233" ref_url="https://www.suse.com/security/cve/CVE-2024-11233/" source="CVE"/>
		<reference ref_id="CVE-2024-11234" ref_url="https://www.suse.com/security/cve/CVE-2024-11234/" source="CVE"/>
		<reference ref_id="CVE-2024-8929" ref_url="https://www.suse.com/security/cve/CVE-2024-8929/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019936.html" source="SUSE-SU"/>
		<description>
This update for php8 fixes the following issues:

- CVE-2024-11233: buffer overread when processing input with the convert.quoted-printable-decode filter. (bsc#1233702) 
- CVE-2024-11234: possible CRLF injection in URIs when a proxy is configured in a stream context. (bsc#1233703)
- CVE-2024-8929: data exposure on MySQL clients due to heap buffer overread in mysqlnd. (bsc#1233651)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-05"/>
	<updated date="2024-12-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1233651">SUSE bug 1233651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233702">SUSE bug 1233702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233703">SUSE bug 1233703</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11233/">CVE-2024-11233 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11233">CVE-2024-11233 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11234/">CVE-2024-11234 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11234">CVE-2024-11234 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8929/">CVE-2024-8929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8929">CVE-2024-8929 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009956599" comment="apache2-mod_php8-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956600" comment="php8-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956601" comment="php8-bcmath-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956602" comment="php8-bz2-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956603" comment="php8-calendar-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956604" comment="php8-cli-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956605" comment="php8-ctype-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956606" comment="php8-curl-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956607" comment="php8-dba-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956608" comment="php8-devel-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956609" comment="php8-dom-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956610" comment="php8-embed-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956611" comment="php8-enchant-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956612" comment="php8-exif-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956613" comment="php8-fastcgi-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956614" comment="php8-fileinfo-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956615" comment="php8-fpm-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956616" comment="php8-ftp-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956617" comment="php8-gd-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956618" comment="php8-gettext-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956619" comment="php8-gmp-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956620" comment="php8-iconv-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956621" comment="php8-intl-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956622" comment="php8-ldap-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956623" comment="php8-mbstring-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956624" comment="php8-mysql-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956625" comment="php8-odbc-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956626" comment="php8-opcache-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956627" comment="php8-openssl-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956628" comment="php8-pcntl-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956629" comment="php8-pdo-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956630" comment="php8-pgsql-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956631" comment="php8-phar-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956632" comment="php8-posix-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956633" comment="php8-readline-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956634" comment="php8-shmop-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956635" comment="php8-snmp-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956636" comment="php8-soap-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956637" comment="php8-sockets-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956638" comment="php8-sodium-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956639" comment="php8-sqlite-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956640" comment="php8-sysvmsg-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956641" comment="php8-sysvsem-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956642" comment="php8-sysvshm-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956643" comment="php8-test-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956644" comment="php8-tidy-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956645" comment="php8-tokenizer-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956646" comment="php8-xmlreader-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956647" comment="php8-xmlwriter-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956648" comment="php8-xsl-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956649" comment="php8-zip-8.0.30-150400.4.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009956650" comment="php8-zlib-8.0.30-150400.4.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5129" version="1" class="patch">
	<metadata>
		<title>Security update for libavif (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218303" ref_url="https://bugzilla.suse.com/1218303" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-6704" ref_url="https://www.suse.com/security/cve/CVE-2023-6704/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017888.html" source="SUSE-SU"/>
		<description>
This update for libavif fixes the following issues:

- CVE-2023-6704: Fixed use after free by not storing colorproperties until alpha item is found (bsc#1218303).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-08"/>
	<updated date="2024-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218303">SUSE bug 1218303</bugzilla>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6704/">CVE-2023-6704 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6704">CVE-2023-6704 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846013" comment="avif-tools-0.9.3-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846014" comment="gdk-pixbuf-loader-libavif-0.9.3-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846015" comment="libavif-devel-0.9.3-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846016" comment="libavif13-0.9.3-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846017" comment="libavif13-32bit-0.9.3-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5130" version="1" class="patch">
	<metadata>
		<title>Security update for govulncheck-vulndb (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="SUSE-SU-2024:4299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019993.html" source="SUSE-SU"/>
		<description>
This update for govulncheck-vulndb fixes the following issues:

- Update to version 0.0.20241209T183251 2024-12-09T18:32:51Z (jsc#PED-11136)
  Go CVE Numbering Authority IDs added or updated with aliases:
  * GO-2024-3284 
  * GO-2024-3286 
  * GO-2024-3287 
  * GO-2024-3288 
  * GO-2024-3289 
  * GO-2024-3290 
  * GO-2024-3291 
  * GO-2024-3292 
  * GO-2024-3294 
  * GO-2024-3296 
  * GO-2024-3299 
  * GO-2024-3300 
  * GO-2024-3302 
  * GO-2024-3303 
  * GO-2024-3304 
  * GO-2024-3305 
  * GO-2024-3307 
  * GO-2024-3308 
  * GO-2024-3310 
  * GO-2024-3311 
  * GO-2024-3312 
  * GO-2024-3313 

- Update to version 0.0.20241121T195252 2024-11-21T19:52:52Z (jsc#PED-11136)
  Go CVE Numbering Authority IDs added or updated with aliases:
  * GO-2024-3279
  * GO-2024-3280
  * GO-2024-3281
  * GO-2024-3282
  * GO-2024-3283

- Update to version 0.0.20241120T172248 2024-11-20T17:22:48Z (jsc#PED-11136)
  Go CVE Numbering Authority IDs added or updated with aliases:
  * GO-2024-3140 
  * GO-2024-3259 
  * GO-2024-3265 

- Update to version 0.0.20241119T173509 2024-11-19T17:35:09Z (jsc#PED-11136)
  Go CVE Numbering Authority IDs added or updated with aliases:
  * GO-2022-0646 
  * GO-2024-3267 
  * GO-2024-3269 
  * GO-2024-3271 
  * GO-2024-3272 
  * GO-2024-3273 
  * GO-2024-3274 
  * GO-2024-3275 
  * GO-2024-3277 
  * GO-2024-3278 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-12"/>
	<updated date="2024-12-12"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957540" comment="govulncheck-vulndb-0.0.20241209T183251-150000.1.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5131" version="1" class="patch">
	<metadata>
		<title>Security update for cosign (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218207" ref_url="https://bugzilla.suse.com/1218207" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017891.html" source="SUSE-SU"/>
		<description>
This update for cosign fixes the following issues:

Updated to 2.2.3 (jsc#SLE-23879):

Bug Fixes:

* Fix race condition on verification with multiple signatures attached to image (#3486)
* fix(clean): Fix clean cmd for private registries (#3446)
* Fixed BYO PKI verification (#3427)

Features:

* Allow for option in cosign attest and attest-blob to upload attestation as supported in Rekor (#3466)
* Add support for OpenVEX predicate type (#3405)

Documentation:

* Resolves #3088: `version` sub-command expected behaviour documentation and testing (#3447)
* add examples for cosign attach signature cmd (#3468)

Misc:

* Remove CertSubject function (#3467)
* Use local rekor and fulcio instances in e2e tests (#3478)

- bumped embedded golang.org/x/crypto/ssh to fix the Terrapin attack CVE-2023-48795 (bsc#1218207)

Updated to 2.2.2 (jsc#SLE-23879):

v2.2.2 adds a new container with a shell,
gcr.io/projectsigstore/cosign:vx.y.z-dev, in addition to the existing
container gcr.io/projectsigstore/cosign:vx.y.z without a shell.

For private deployments, we have also added an alias for
--insecure-skip-log, --private-infrastructure.

Bug Fixes:

* chore(deps): bump github.com/sigstore/sigstore from 1.7.5 to 1.7.6 (#3411) which fixes a bug with using Azure KMS
* Don't require CT log keys if using a key/sk (#3415)
* Fix copy without any flag set (#3409)
* Update cosign generate cmd to not include newline (#3393)
* Fix idempotency error with signing (#3371)

Features:

* Add --yes flag cosign import-key-pair to skip the overwrite confirmation. (#3383)
* Use the timeout flag value in verify* commands. (#3391)
* add --private-infrastructure flag (#3369)

Container Updates:

* Bump builder image to use go1.21.4 and add new cosign image tags with shell (#3373)

Documentation:

* Update SBOM_SPEC.md (#3358)

- CVE-2023-48795: Fixed the Terrapin attack in embedded golang.org/x/crypto/ssh (bsc#1218207).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-08"/>
	<updated date="2024-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218207">SUSE bug 1218207</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846018" comment="cosign-2.2.3-150400.3.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5132" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs20 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233856" ref_url="https://bugzilla.suse.com/1233856" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21538" ref_url="https://www.suse.com/security/cve/CVE-2024-21538/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019992.html" source="SUSE-SU"/>
		<description>
This update for nodejs20 fixes the following issues:
  
- CVE-2024-21538: Fixed regular expression denial of service in cross-spawn dependency (bsc#1233856)

Other fixes:
- Updated to 20.18.1:
  * Experimental Network Inspection Support in Node.js
  * Exposes X509_V_FLAG_PARTIAL_CHAIN to tls.createSecureContext
  * New option for vm.createContext() to create a context with a
    freezable globalThis
  * buffer: optimize createFromString
- Changes in 20.17.0:
  * module: support require()ing synchronous ESM graphs
  * path: add matchesGlob method
  * stream: expose DuplexPair API
- Changes in 20.16.0:
  * process: add process.getBuiltinModule(id)
  * inspector: fix disable async hooks on Debugger.setAsyncCallStackDepth
  * buffer: add .bytes() method to Blob
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-12"/>
	<updated date="2024-12-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1233856">SUSE bug 1233856</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21538/">CVE-2024-21538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21538">CVE-2024-21538 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957541" comment="corepack20-20.18.1-150500.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957542" comment="nodejs20-20.18.1-150500.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957543" comment="nodejs20-devel-20.18.1-150500.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957544" comment="nodejs20-docs-20.18.1-150500.11.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957545" comment="npm20-20.18.1-150500.11.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5133" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs18 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233856" ref_url="https://bugzilla.suse.com/1233856" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21538" ref_url="https://www.suse.com/security/cve/CVE-2024-21538/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019991.html" source="SUSE-SU"/>
		<description>
This update for nodejs18 fixes the following issues:

- CVE-2024-21538: Fixed regular expression denial of service in cross-spawn dependency (bsc#1233856)

Other fixes:
- Update to 18.20.5
  * esm: mark import attributes and JSON module as stable
  * deps:
    + upgrade npm to 10.8.2
    + update simdutf to 5.6.0
    + update brotli to 1.1.0
    + update ada to 2.8.0
    + update acorn to 8.13.0
    + update acorn-walk to 8.3.4
    + update c-ares to 1.29.0
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-12"/>
	<updated date="2024-12-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1233856">SUSE bug 1233856</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21538/">CVE-2024-21538 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21538">CVE-2024-21538 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957546" comment="corepack18-18.20.5-150400.9.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957547" comment="nodejs18-18.20.5-150400.9.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957548" comment="nodejs18-devel-18.20.5-150400.9.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957549" comment="nodejs18-docs-18.20.5-150400.9.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957550" comment="npm18-18.20.5-150400.9.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5134" version="1" class="patch">
	<metadata>
		<title>Security update for socat (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1225462" ref_url="https://bugzilla.suse.com/1225462" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-54661" ref_url="https://www.suse.com/security/cve/CVE-2024-54661/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019990.html" source="SUSE-SU"/>
		<description>
This update for socat fixes the following issues:

 - CVE-2024-54661: Fixed arbitrary file overwrite via predictable /tmp directory (bsc#1225462)

		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-12"/>
	<updated date="2024-12-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1225462">SUSE bug 1225462</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-54661/">CVE-2024-54661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54661">CVE-2024-54661 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957551" comment="socat-1.8.0.0-150400.14.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5135" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1225470" ref_url="https://bugzilla.suse.com/1225470" source="BUGZILLA"/>
		<reference ref_id="1231702" ref_url="https://bugzilla.suse.com/1231702" source="BUGZILLA"/>
		<reference ref_id="1231711" ref_url="https://bugzilla.suse.com/1231711" source="BUGZILLA"/>
		<reference ref_id="1231716" ref_url="https://bugzilla.suse.com/1231716" source="BUGZILLA"/>
		<reference ref_id="1231719" ref_url="https://bugzilla.suse.com/1231719" source="BUGZILLA"/>
		<reference ref_id="1232064" ref_url="https://bugzilla.suse.com/1232064" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21208" ref_url="https://www.suse.com/security/cve/CVE-2024-21208/" source="CVE"/>
		<reference ref_id="CVE-2024-21210" ref_url="https://www.suse.com/security/cve/CVE-2024-21210/" source="CVE"/>
		<reference ref_id="CVE-2024-21217" ref_url="https://www.suse.com/security/cve/CVE-2024-21217/" source="CVE"/>
		<reference ref_id="CVE-2024-21235" ref_url="https://www.suse.com/security/cve/CVE-2024-21235/" source="CVE"/>
		<reference ref_id="CVE-2024-3933" ref_url="https://www.suse.com/security/cve/CVE-2024-3933/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019994.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Updated to Java 8.0 Service Refresh 8 Fix Pack 35 with Oracle October 15 2024 CPU (bsc#1232064):
- CVE-2024-21208: Fixed partial DoS in component Networking (bsc#1231702,JDK-8328286)
- CVE-2024-21210: Fixed unauthorized update, insert or delete access to some of Oracle Java SE accessible data in component Hotspot (bsc#1231711,JDK-8328544)
- CVE-2024-21217: Fixed partial DoS in component Serialization (bsc#1231716,JDK-8331446)
- CVE-2024-21235: Fixed unauthorized read/write access to data in component Hotspot (bsc#1231719,JDK-8332644)

Other issues fixed in past releases:
  - CVE-2024-3933: Fixed evaluate constant byteLenNode of arrayCopyChild (bsc#1225470)		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-12"/>
	<updated date="2024-12-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1225470">SUSE bug 1225470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231702">SUSE bug 1231702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231711">SUSE bug 1231711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231716">SUSE bug 1231716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231719">SUSE bug 1231719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232064">SUSE bug 1232064</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21208/">CVE-2024-21208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21208">CVE-2024-21208 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21210/">CVE-2024-21210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21210">CVE-2024-21210 at NVD</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21217/">CVE-2024-21217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21217">CVE-2024-21217 at NVD</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21235/">CVE-2024-21235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21235">CVE-2024-21235 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-3933/">CVE-2024-3933 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3933">CVE-2024-3933 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957552" comment="java-1_8_0-ibm-1.8.0_sr8.35-150000.3.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957553" comment="java-1_8_0-ibm-32bit-1.8.0_sr8.35-150000.3.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957554" comment="java-1_8_0-ibm-alsa-1.8.0_sr8.35-150000.3.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957555" comment="java-1_8_0-ibm-demo-1.8.0_sr8.35-150000.3.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957556" comment="java-1_8_0-ibm-devel-1.8.0_sr8.35-150000.3.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957557" comment="java-1_8_0-ibm-devel-32bit-1.8.0_sr8.35-150000.3.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957558" comment="java-1_8_0-ibm-plugin-1.8.0_sr8.35-150000.3.95.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957559" comment="java-1_8_0-ibm-src-1.8.0_sr8.35-150000.3.95.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5136" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1082555" ref_url="https://bugzilla.suse.com/1082555" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1218644" ref_url="https://bugzilla.suse.com/1218644" source="BUGZILLA"/>
		<reference ref_id="1220382" ref_url="https://bugzilla.suse.com/1220382" source="BUGZILLA"/>
		<reference ref_id="1221309" ref_url="https://bugzilla.suse.com/1221309" source="BUGZILLA"/>
		<reference ref_id="1221333" ref_url="https://bugzilla.suse.com/1221333" source="BUGZILLA"/>
		<reference ref_id="1222364" ref_url="https://bugzilla.suse.com/1222364" source="BUGZILLA"/>
		<reference ref_id="1222590" ref_url="https://bugzilla.suse.com/1222590" source="BUGZILLA"/>
		<reference ref_id="1223202" ref_url="https://bugzilla.suse.com/1223202" source="BUGZILLA"/>
		<reference ref_id="1223656" ref_url="https://bugzilla.suse.com/1223656" source="BUGZILLA"/>
		<reference ref_id="1223848" ref_url="https://bugzilla.suse.com/1223848" source="BUGZILLA"/>
		<reference ref_id="1223919" ref_url="https://bugzilla.suse.com/1223919" source="BUGZILLA"/>
		<reference ref_id="1223942" ref_url="https://bugzilla.suse.com/1223942" source="BUGZILLA"/>
		<reference ref_id="1224518" ref_url="https://bugzilla.suse.com/1224518" source="BUGZILLA"/>
		<reference ref_id="1224526" ref_url="https://bugzilla.suse.com/1224526" source="BUGZILLA"/>
		<reference ref_id="1224574" ref_url="https://bugzilla.suse.com/1224574" source="BUGZILLA"/>
		<reference ref_id="1225725" ref_url="https://bugzilla.suse.com/1225725" source="BUGZILLA"/>
		<reference ref_id="1225730" ref_url="https://bugzilla.suse.com/1225730" source="BUGZILLA"/>
		<reference ref_id="1225742" ref_url="https://bugzilla.suse.com/1225742" source="BUGZILLA"/>
		<reference ref_id="1225764" ref_url="https://bugzilla.suse.com/1225764" source="BUGZILLA"/>
		<reference ref_id="1225812" ref_url="https://bugzilla.suse.com/1225812" source="BUGZILLA"/>
		<reference ref_id="1226560" ref_url="https://bugzilla.suse.com/1226560" source="BUGZILLA"/>
		<reference ref_id="1226592" ref_url="https://bugzilla.suse.com/1226592" source="BUGZILLA"/>
		<reference ref_id="1226631" ref_url="https://bugzilla.suse.com/1226631" source="BUGZILLA"/>
		<reference ref_id="1226748" ref_url="https://bugzilla.suse.com/1226748" source="BUGZILLA"/>
		<reference ref_id="1226872" ref_url="https://bugzilla.suse.com/1226872" source="BUGZILLA"/>
		<reference ref_id="1227853" ref_url="https://bugzilla.suse.com/1227853" source="BUGZILLA"/>
		<reference ref_id="1228410" ref_url="https://bugzilla.suse.com/1228410" source="BUGZILLA"/>
		<reference ref_id="1228430" ref_url="https://bugzilla.suse.com/1228430" source="BUGZILLA"/>
		<reference ref_id="1228486" ref_url="https://bugzilla.suse.com/1228486" source="BUGZILLA"/>
		<reference ref_id="1228650" ref_url="https://bugzilla.suse.com/1228650" source="BUGZILLA"/>
		<reference ref_id="1228857" ref_url="https://bugzilla.suse.com/1228857" source="BUGZILLA"/>
		<reference ref_id="1229312" ref_url="https://bugzilla.suse.com/1229312" source="BUGZILLA"/>
		<reference ref_id="1229429" ref_url="https://bugzilla.suse.com/1229429" source="BUGZILLA"/>
		<reference ref_id="1229585" ref_url="https://bugzilla.suse.com/1229585" source="BUGZILLA"/>
		<reference ref_id="1229752" ref_url="https://bugzilla.suse.com/1229752" source="BUGZILLA"/>
		<reference ref_id="1229808" ref_url="https://bugzilla.suse.com/1229808" source="BUGZILLA"/>
		<reference ref_id="1230055" ref_url="https://bugzilla.suse.com/1230055" source="BUGZILLA"/>
		<reference ref_id="1230220" ref_url="https://bugzilla.suse.com/1230220" source="BUGZILLA"/>
		<reference ref_id="1230231" ref_url="https://bugzilla.suse.com/1230231" source="BUGZILLA"/>
		<reference ref_id="1230270" ref_url="https://bugzilla.suse.com/1230270" source="BUGZILLA"/>
		<reference ref_id="1230558" ref_url="https://bugzilla.suse.com/1230558" source="BUGZILLA"/>
		<reference ref_id="1230827" ref_url="https://bugzilla.suse.com/1230827" source="BUGZILLA"/>
		<reference ref_id="1230918" ref_url="https://bugzilla.suse.com/1230918" source="BUGZILLA"/>
		<reference ref_id="1231083" ref_url="https://bugzilla.suse.com/1231083" source="BUGZILLA"/>
		<reference ref_id="1231089" ref_url="https://bugzilla.suse.com/1231089" source="BUGZILLA"/>
		<reference ref_id="1231098" ref_url="https://bugzilla.suse.com/1231098" source="BUGZILLA"/>
		<reference ref_id="1231101" ref_url="https://bugzilla.suse.com/1231101" source="BUGZILLA"/>
		<reference ref_id="1231108" ref_url="https://bugzilla.suse.com/1231108" source="BUGZILLA"/>
		<reference ref_id="1231111" ref_url="https://bugzilla.suse.com/1231111" source="BUGZILLA"/>
		<reference ref_id="1231132" ref_url="https://bugzilla.suse.com/1231132" source="BUGZILLA"/>
		<reference ref_id="1231135" ref_url="https://bugzilla.suse.com/1231135" source="BUGZILLA"/>
		<reference ref_id="1231138" ref_url="https://bugzilla.suse.com/1231138" source="BUGZILLA"/>
		<reference ref_id="1231169" ref_url="https://bugzilla.suse.com/1231169" source="BUGZILLA"/>
		<reference ref_id="1231178" ref_url="https://bugzilla.suse.com/1231178" source="BUGZILLA"/>
		<reference ref_id="1231180" ref_url="https://bugzilla.suse.com/1231180" source="BUGZILLA"/>
		<reference ref_id="1231181" ref_url="https://bugzilla.suse.com/1231181" source="BUGZILLA"/>
		<reference ref_id="1231187" ref_url="https://bugzilla.suse.com/1231187" source="BUGZILLA"/>
		<reference ref_id="1231202" ref_url="https://bugzilla.suse.com/1231202" source="BUGZILLA"/>
		<reference ref_id="1231434" ref_url="https://bugzilla.suse.com/1231434" source="BUGZILLA"/>
		<reference ref_id="1231441" ref_url="https://bugzilla.suse.com/1231441" source="BUGZILLA"/>
		<reference ref_id="1231452" ref_url="https://bugzilla.suse.com/1231452" source="BUGZILLA"/>
		<reference ref_id="1231465" ref_url="https://bugzilla.suse.com/1231465" source="BUGZILLA"/>
		<reference ref_id="1231474" ref_url="https://bugzilla.suse.com/1231474" source="BUGZILLA"/>
		<reference ref_id="1231481" ref_url="https://bugzilla.suse.com/1231481" source="BUGZILLA"/>
		<reference ref_id="1231537" ref_url="https://bugzilla.suse.com/1231537" source="BUGZILLA"/>
		<reference ref_id="1231541" ref_url="https://bugzilla.suse.com/1231541" source="BUGZILLA"/>
		<reference ref_id="1231646" ref_url="https://bugzilla.suse.com/1231646" source="BUGZILLA"/>
		<reference ref_id="1231849" ref_url="https://bugzilla.suse.com/1231849" source="BUGZILLA"/>
		<reference ref_id="1231856" ref_url="https://bugzilla.suse.com/1231856" source="BUGZILLA"/>
		<reference ref_id="1231858" ref_url="https://bugzilla.suse.com/1231858" source="BUGZILLA"/>
		<reference ref_id="1231859" ref_url="https://bugzilla.suse.com/1231859" source="BUGZILLA"/>
		<reference ref_id="1231864" ref_url="https://bugzilla.suse.com/1231864" source="BUGZILLA"/>
		<reference ref_id="1231904" ref_url="https://bugzilla.suse.com/1231904" source="BUGZILLA"/>
		<reference ref_id="1231916" ref_url="https://bugzilla.suse.com/1231916" source="BUGZILLA"/>
		<reference ref_id="1231920" ref_url="https://bugzilla.suse.com/1231920" source="BUGZILLA"/>
		<reference ref_id="1231923" ref_url="https://bugzilla.suse.com/1231923" source="BUGZILLA"/>
		<reference ref_id="1231930" ref_url="https://bugzilla.suse.com/1231930" source="BUGZILLA"/>
		<reference ref_id="1231931" ref_url="https://bugzilla.suse.com/1231931" source="BUGZILLA"/>
		<reference ref_id="1231947" ref_url="https://bugzilla.suse.com/1231947" source="BUGZILLA"/>
		<reference ref_id="1231952" ref_url="https://bugzilla.suse.com/1231952" source="BUGZILLA"/>
		<reference ref_id="1231953" ref_url="https://bugzilla.suse.com/1231953" source="BUGZILLA"/>
		<reference ref_id="1231959" ref_url="https://bugzilla.suse.com/1231959" source="BUGZILLA"/>
		<reference ref_id="1231978" ref_url="https://bugzilla.suse.com/1231978" source="BUGZILLA"/>
		<reference ref_id="1232013" ref_url="https://bugzilla.suse.com/1232013" source="BUGZILLA"/>
		<reference ref_id="1232015" ref_url="https://bugzilla.suse.com/1232015" source="BUGZILLA"/>
		<reference ref_id="1232016" ref_url="https://bugzilla.suse.com/1232016" source="BUGZILLA"/>
		<reference ref_id="1232017" ref_url="https://bugzilla.suse.com/1232017" source="BUGZILLA"/>
		<reference ref_id="1232027" ref_url="https://bugzilla.suse.com/1232027" source="BUGZILLA"/>
		<reference ref_id="1232028" ref_url="https://bugzilla.suse.com/1232028" source="BUGZILLA"/>
		<reference ref_id="1232047" ref_url="https://bugzilla.suse.com/1232047" source="BUGZILLA"/>
		<reference ref_id="1232048" ref_url="https://bugzilla.suse.com/1232048" source="BUGZILLA"/>
		<reference ref_id="1232050" ref_url="https://bugzilla.suse.com/1232050" source="BUGZILLA"/>
		<reference ref_id="1232056" ref_url="https://bugzilla.suse.com/1232056" source="BUGZILLA"/>
		<reference ref_id="1232076" ref_url="https://bugzilla.suse.com/1232076" source="BUGZILLA"/>
		<reference ref_id="1232080" ref_url="https://bugzilla.suse.com/1232080" source="BUGZILLA"/>
		<reference ref_id="1232094" ref_url="https://bugzilla.suse.com/1232094" source="BUGZILLA"/>
		<reference ref_id="1232096" ref_url="https://bugzilla.suse.com/1232096" source="BUGZILLA"/>
		<reference ref_id="1232098" ref_url="https://bugzilla.suse.com/1232098" source="BUGZILLA"/>
		<reference ref_id="1232111" ref_url="https://bugzilla.suse.com/1232111" source="BUGZILLA"/>
		<reference ref_id="1232126" ref_url="https://bugzilla.suse.com/1232126" source="BUGZILLA"/>
		<reference ref_id="1232134" ref_url="https://bugzilla.suse.com/1232134" source="BUGZILLA"/>
		<reference ref_id="1232135" ref_url="https://bugzilla.suse.com/1232135" source="BUGZILLA"/>
		<reference ref_id="1232141" ref_url="https://bugzilla.suse.com/1232141" source="BUGZILLA"/>
		<reference ref_id="1232142" ref_url="https://bugzilla.suse.com/1232142" source="BUGZILLA"/>
		<reference ref_id="1232147" ref_url="https://bugzilla.suse.com/1232147" source="BUGZILLA"/>
		<reference ref_id="1232152" ref_url="https://bugzilla.suse.com/1232152" source="BUGZILLA"/>
		<reference ref_id="1232159" ref_url="https://bugzilla.suse.com/1232159" source="BUGZILLA"/>
		<reference ref_id="1232162" ref_url="https://bugzilla.suse.com/1232162" source="BUGZILLA"/>
		<reference ref_id="1232165" ref_url="https://bugzilla.suse.com/1232165" source="BUGZILLA"/>
		<reference ref_id="1232180" ref_url="https://bugzilla.suse.com/1232180" source="BUGZILLA"/>
		<reference ref_id="1232185" ref_url="https://bugzilla.suse.com/1232185" source="BUGZILLA"/>
		<reference ref_id="1232187" ref_url="https://bugzilla.suse.com/1232187" source="BUGZILLA"/>
		<reference ref_id="1232189" ref_url="https://bugzilla.suse.com/1232189" source="BUGZILLA"/>
		<reference ref_id="1232195" ref_url="https://bugzilla.suse.com/1232195" source="BUGZILLA"/>
		<reference ref_id="1232198" ref_url="https://bugzilla.suse.com/1232198" source="BUGZILLA"/>
		<reference ref_id="1232201" ref_url="https://bugzilla.suse.com/1232201" source="BUGZILLA"/>
		<reference ref_id="1232218" ref_url="https://bugzilla.suse.com/1232218" source="BUGZILLA"/>
		<reference ref_id="1232224" ref_url="https://bugzilla.suse.com/1232224" source="BUGZILLA"/>
		<reference ref_id="1232232" ref_url="https://bugzilla.suse.com/1232232" source="BUGZILLA"/>
		<reference ref_id="1232254" ref_url="https://bugzilla.suse.com/1232254" source="BUGZILLA"/>
		<reference ref_id="1232255" ref_url="https://bugzilla.suse.com/1232255" source="BUGZILLA"/>
		<reference ref_id="1232264" ref_url="https://bugzilla.suse.com/1232264" source="BUGZILLA"/>
		<reference ref_id="1232272" ref_url="https://bugzilla.suse.com/1232272" source="BUGZILLA"/>
		<reference ref_id="1232279" ref_url="https://bugzilla.suse.com/1232279" source="BUGZILLA"/>
		<reference ref_id="1232287" ref_url="https://bugzilla.suse.com/1232287" source="BUGZILLA"/>
		<reference ref_id="1232293" ref_url="https://bugzilla.suse.com/1232293" source="BUGZILLA"/>
		<reference ref_id="1232312" ref_url="https://bugzilla.suse.com/1232312" source="BUGZILLA"/>
		<reference ref_id="1232317" ref_url="https://bugzilla.suse.com/1232317" source="BUGZILLA"/>
		<reference ref_id="1232318" ref_url="https://bugzilla.suse.com/1232318" source="BUGZILLA"/>
		<reference ref_id="1232333" ref_url="https://bugzilla.suse.com/1232333" source="BUGZILLA"/>
		<reference ref_id="1232334" ref_url="https://bugzilla.suse.com/1232334" source="BUGZILLA"/>
		<reference ref_id="1232335" ref_url="https://bugzilla.suse.com/1232335" source="BUGZILLA"/>
		<reference ref_id="1232339" ref_url="https://bugzilla.suse.com/1232339" source="BUGZILLA"/>
		<reference ref_id="1232349" ref_url="https://bugzilla.suse.com/1232349" source="BUGZILLA"/>
		<reference ref_id="1232357" ref_url="https://bugzilla.suse.com/1232357" source="BUGZILLA"/>
		<reference ref_id="1232359" ref_url="https://bugzilla.suse.com/1232359" source="BUGZILLA"/>
		<reference ref_id="1232362" ref_url="https://bugzilla.suse.com/1232362" source="BUGZILLA"/>
		<reference ref_id="1232364" ref_url="https://bugzilla.suse.com/1232364" source="BUGZILLA"/>
		<reference ref_id="1232370" ref_url="https://bugzilla.suse.com/1232370" source="BUGZILLA"/>
		<reference ref_id="1232371" ref_url="https://bugzilla.suse.com/1232371" source="BUGZILLA"/>
		<reference ref_id="1232378" ref_url="https://bugzilla.suse.com/1232378" source="BUGZILLA"/>
		<reference ref_id="1232385" ref_url="https://bugzilla.suse.com/1232385" source="BUGZILLA"/>
		<reference ref_id="1232387" ref_url="https://bugzilla.suse.com/1232387" source="BUGZILLA"/>
		<reference ref_id="1232394" ref_url="https://bugzilla.suse.com/1232394" source="BUGZILLA"/>
		<reference ref_id="1232413" ref_url="https://bugzilla.suse.com/1232413" source="BUGZILLA"/>
		<reference ref_id="1232416" ref_url="https://bugzilla.suse.com/1232416" source="BUGZILLA"/>
		<reference ref_id="1232436" ref_url="https://bugzilla.suse.com/1232436" source="BUGZILLA"/>
		<reference ref_id="1232483" ref_url="https://bugzilla.suse.com/1232483" source="BUGZILLA"/>
		<reference ref_id="1232500" ref_url="https://bugzilla.suse.com/1232500" source="BUGZILLA"/>
		<reference ref_id="1232503" ref_url="https://bugzilla.suse.com/1232503" source="BUGZILLA"/>
		<reference ref_id="1232504" ref_url="https://bugzilla.suse.com/1232504" source="BUGZILLA"/>
		<reference ref_id="1232507" ref_url="https://bugzilla.suse.com/1232507" source="BUGZILLA"/>
		<reference ref_id="1232520" ref_url="https://bugzilla.suse.com/1232520" source="BUGZILLA"/>
		<reference ref_id="1232552" ref_url="https://bugzilla.suse.com/1232552" source="BUGZILLA"/>
		<reference ref_id="1232757" ref_url="https://bugzilla.suse.com/1232757" source="BUGZILLA"/>
		<reference ref_id="1232819" ref_url="https://bugzilla.suse.com/1232819" source="BUGZILLA"/>
		<reference ref_id="1232860" ref_url="https://bugzilla.suse.com/1232860" source="BUGZILLA"/>
		<reference ref_id="1232870" ref_url="https://bugzilla.suse.com/1232870" source="BUGZILLA"/>
		<reference ref_id="1232873" ref_url="https://bugzilla.suse.com/1232873" source="BUGZILLA"/>
		<reference ref_id="1232877" ref_url="https://bugzilla.suse.com/1232877" source="BUGZILLA"/>
		<reference ref_id="1232878" ref_url="https://bugzilla.suse.com/1232878" source="BUGZILLA"/>
		<reference ref_id="1232881" ref_url="https://bugzilla.suse.com/1232881" source="BUGZILLA"/>
		<reference ref_id="1232884" ref_url="https://bugzilla.suse.com/1232884" source="BUGZILLA"/>
		<reference ref_id="1232885" ref_url="https://bugzilla.suse.com/1232885" source="BUGZILLA"/>
		<reference ref_id="1232887" ref_url="https://bugzilla.suse.com/1232887" source="BUGZILLA"/>
		<reference ref_id="1232888" ref_url="https://bugzilla.suse.com/1232888" source="BUGZILLA"/>
		<reference ref_id="1232890" ref_url="https://bugzilla.suse.com/1232890" source="BUGZILLA"/>
		<reference ref_id="1232892" ref_url="https://bugzilla.suse.com/1232892" source="BUGZILLA"/>
		<reference ref_id="1232896" ref_url="https://bugzilla.suse.com/1232896" source="BUGZILLA"/>
		<reference ref_id="1232897" ref_url="https://bugzilla.suse.com/1232897" source="BUGZILLA"/>
		<reference ref_id="1232905" ref_url="https://bugzilla.suse.com/1232905" source="BUGZILLA"/>
		<reference ref_id="1232907" ref_url="https://bugzilla.suse.com/1232907" source="BUGZILLA"/>
		<reference ref_id="1232919" ref_url="https://bugzilla.suse.com/1232919" source="BUGZILLA"/>
		<reference ref_id="1232926" ref_url="https://bugzilla.suse.com/1232926" source="BUGZILLA"/>
		<reference ref_id="1232928" ref_url="https://bugzilla.suse.com/1232928" source="BUGZILLA"/>
		<reference ref_id="1232935" ref_url="https://bugzilla.suse.com/1232935" source="BUGZILLA"/>
		<reference ref_id="1233035" ref_url="https://bugzilla.suse.com/1233035" source="BUGZILLA"/>
		<reference ref_id="1233049" ref_url="https://bugzilla.suse.com/1233049" source="BUGZILLA"/>
		<reference ref_id="1233051" ref_url="https://bugzilla.suse.com/1233051" source="BUGZILLA"/>
		<reference ref_id="1233056" ref_url="https://bugzilla.suse.com/1233056" source="BUGZILLA"/>
		<reference ref_id="1233057" ref_url="https://bugzilla.suse.com/1233057" source="BUGZILLA"/>
		<reference ref_id="1233061" ref_url="https://bugzilla.suse.com/1233061" source="BUGZILLA"/>
		<reference ref_id="1233063" ref_url="https://bugzilla.suse.com/1233063" source="BUGZILLA"/>
		<reference ref_id="1233065" ref_url="https://bugzilla.suse.com/1233065" source="BUGZILLA"/>
		<reference ref_id="1233067" ref_url="https://bugzilla.suse.com/1233067" source="BUGZILLA"/>
		<reference ref_id="1233070" ref_url="https://bugzilla.suse.com/1233070" source="BUGZILLA"/>
		<reference ref_id="1233073" ref_url="https://bugzilla.suse.com/1233073" source="BUGZILLA"/>
		<reference ref_id="1233074" ref_url="https://bugzilla.suse.com/1233074" source="BUGZILLA"/>
		<reference ref_id="1233100" ref_url="https://bugzilla.suse.com/1233100" source="BUGZILLA"/>
		<reference ref_id="1233103" ref_url="https://bugzilla.suse.com/1233103" source="BUGZILLA"/>
		<reference ref_id="1233104" ref_url="https://bugzilla.suse.com/1233104" source="BUGZILLA"/>
		<reference ref_id="1233105" ref_url="https://bugzilla.suse.com/1233105" source="BUGZILLA"/>
		<reference ref_id="1233106" ref_url="https://bugzilla.suse.com/1233106" source="BUGZILLA"/>
		<reference ref_id="1233107" ref_url="https://bugzilla.suse.com/1233107" source="BUGZILLA"/>
		<reference ref_id="1233108" ref_url="https://bugzilla.suse.com/1233108" source="BUGZILLA"/>
		<reference ref_id="1233110" ref_url="https://bugzilla.suse.com/1233110" source="BUGZILLA"/>
		<reference ref_id="1233111" ref_url="https://bugzilla.suse.com/1233111" source="BUGZILLA"/>
		<reference ref_id="1233113" ref_url="https://bugzilla.suse.com/1233113" source="BUGZILLA"/>
		<reference ref_id="1233114" ref_url="https://bugzilla.suse.com/1233114" source="BUGZILLA"/>
		<reference ref_id="1233117" ref_url="https://bugzilla.suse.com/1233117" source="BUGZILLA"/>
		<reference ref_id="1233123" ref_url="https://bugzilla.suse.com/1233123" source="BUGZILLA"/>
		<reference ref_id="1233125" ref_url="https://bugzilla.suse.com/1233125" source="BUGZILLA"/>
		<reference ref_id="1233129" ref_url="https://bugzilla.suse.com/1233129" source="BUGZILLA"/>
		<reference ref_id="1233130" ref_url="https://bugzilla.suse.com/1233130" source="BUGZILLA"/>
		<reference ref_id="1233134" ref_url="https://bugzilla.suse.com/1233134" source="BUGZILLA"/>
		<reference ref_id="1233135" ref_url="https://bugzilla.suse.com/1233135" source="BUGZILLA"/>
		<reference ref_id="1233150" ref_url="https://bugzilla.suse.com/1233150" source="BUGZILLA"/>
		<reference ref_id="1233189" ref_url="https://bugzilla.suse.com/1233189" source="BUGZILLA"/>
		<reference ref_id="1233191" ref_url="https://bugzilla.suse.com/1233191" source="BUGZILLA"/>
		<reference ref_id="1233197" ref_url="https://bugzilla.suse.com/1233197" source="BUGZILLA"/>
		<reference ref_id="1233205" ref_url="https://bugzilla.suse.com/1233205" source="BUGZILLA"/>
		<reference ref_id="1233206" ref_url="https://bugzilla.suse.com/1233206" source="BUGZILLA"/>
		<reference ref_id="1233209" ref_url="https://bugzilla.suse.com/1233209" source="BUGZILLA"/>
		<reference ref_id="1233210" ref_url="https://bugzilla.suse.com/1233210" source="BUGZILLA"/>
		<reference ref_id="1233211" ref_url="https://bugzilla.suse.com/1233211" source="BUGZILLA"/>
		<reference ref_id="1233212" ref_url="https://bugzilla.suse.com/1233212" source="BUGZILLA"/>
		<reference ref_id="1233214" ref_url="https://bugzilla.suse.com/1233214" source="BUGZILLA"/>
		<reference ref_id="1233216" ref_url="https://bugzilla.suse.com/1233216" source="BUGZILLA"/>
		<reference ref_id="1233238" ref_url="https://bugzilla.suse.com/1233238" source="BUGZILLA"/>
		<reference ref_id="1233241" ref_url="https://bugzilla.suse.com/1233241" source="BUGZILLA"/>
		<reference ref_id="1233253" ref_url="https://bugzilla.suse.com/1233253" source="BUGZILLA"/>
		<reference ref_id="1233255" ref_url="https://bugzilla.suse.com/1233255" source="BUGZILLA"/>
		<reference ref_id="1233293" ref_url="https://bugzilla.suse.com/1233293" source="BUGZILLA"/>
		<reference ref_id="1233350" ref_url="https://bugzilla.suse.com/1233350" source="BUGZILLA"/>
		<reference ref_id="1233452" ref_url="https://bugzilla.suse.com/1233452" source="BUGZILLA"/>
		<reference ref_id="1233453" ref_url="https://bugzilla.suse.com/1233453" source="BUGZILLA"/>
		<reference ref_id="1233454" ref_url="https://bugzilla.suse.com/1233454" source="BUGZILLA"/>
		<reference ref_id="1233456" ref_url="https://bugzilla.suse.com/1233456" source="BUGZILLA"/>
		<reference ref_id="1233457" ref_url="https://bugzilla.suse.com/1233457" source="BUGZILLA"/>
		<reference ref_id="1233458" ref_url="https://bugzilla.suse.com/1233458" source="BUGZILLA"/>
		<reference ref_id="1233460" ref_url="https://bugzilla.suse.com/1233460" source="BUGZILLA"/>
		<reference ref_id="1233462" ref_url="https://bugzilla.suse.com/1233462" source="BUGZILLA"/>
		<reference ref_id="1233463" ref_url="https://bugzilla.suse.com/1233463" source="BUGZILLA"/>
		<reference ref_id="1233468" ref_url="https://bugzilla.suse.com/1233468" source="BUGZILLA"/>
		<reference ref_id="1233471" ref_url="https://bugzilla.suse.com/1233471" source="BUGZILLA"/>
		<reference ref_id="1233476" ref_url="https://bugzilla.suse.com/1233476" source="BUGZILLA"/>
		<reference ref_id="1233478" ref_url="https://bugzilla.suse.com/1233478" source="BUGZILLA"/>
		<reference ref_id="1233479" ref_url="https://bugzilla.suse.com/1233479" source="BUGZILLA"/>
		<reference ref_id="1233481" ref_url="https://bugzilla.suse.com/1233481" source="BUGZILLA"/>
		<reference ref_id="1233484" ref_url="https://bugzilla.suse.com/1233484" source="BUGZILLA"/>
		<reference ref_id="1233487" ref_url="https://bugzilla.suse.com/1233487" source="BUGZILLA"/>
		<reference ref_id="1233490" ref_url="https://bugzilla.suse.com/1233490" source="BUGZILLA"/>
		<reference ref_id="1233491" ref_url="https://bugzilla.suse.com/1233491" source="BUGZILLA"/>
		<reference ref_id="1233528" ref_url="https://bugzilla.suse.com/1233528" source="BUGZILLA"/>
		<reference ref_id="1233548" ref_url="https://bugzilla.suse.com/1233548" source="BUGZILLA"/>
		<reference ref_id="1233552" ref_url="https://bugzilla.suse.com/1233552" source="BUGZILLA"/>
		<reference ref_id="1233553" ref_url="https://bugzilla.suse.com/1233553" source="BUGZILLA"/>
		<reference ref_id="1233554" ref_url="https://bugzilla.suse.com/1233554" source="BUGZILLA"/>
		<reference ref_id="1233555" ref_url="https://bugzilla.suse.com/1233555" source="BUGZILLA"/>
		<reference ref_id="1233557" ref_url="https://bugzilla.suse.com/1233557" source="BUGZILLA"/>
		<reference ref_id="1233560" ref_url="https://bugzilla.suse.com/1233560" source="BUGZILLA"/>
		<reference ref_id="1233561" ref_url="https://bugzilla.suse.com/1233561" source="BUGZILLA"/>
		<reference ref_id="1233570" ref_url="https://bugzilla.suse.com/1233570" source="BUGZILLA"/>
		<reference ref_id="1233577" ref_url="https://bugzilla.suse.com/1233577" source="BUGZILLA"/>
		<reference ref_id="1233580" ref_url="https://bugzilla.suse.com/1233580" source="BUGZILLA"/>
		<reference ref_id="1233977" ref_url="https://bugzilla.suse.com/1233977" source="BUGZILLA"/>
		<reference ref_id="1234012" ref_url="https://bugzilla.suse.com/1234012" source="BUGZILLA"/>
		<reference ref_id="1234025" ref_url="https://bugzilla.suse.com/1234025" source="BUGZILLA"/>
		<reference ref_id="1234085" ref_url="https://bugzilla.suse.com/1234085" source="BUGZILLA"/>
		<reference ref_id="1234093" ref_url="https://bugzilla.suse.com/1234093" source="BUGZILLA"/>
		<reference ref_id="1234098" ref_url="https://bugzilla.suse.com/1234098" source="BUGZILLA"/>
		<reference ref_id="1234108" ref_url="https://bugzilla.suse.com/1234108" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-47594" ref_url="https://www.suse.com/security/cve/CVE-2021-47594/" source="CVE"/>
		<reference ref_id="CVE-2022-48674" ref_url="https://www.suse.com/security/cve/CVE-2022-48674/" source="CVE"/>
		<reference ref_id="CVE-2022-48979" ref_url="https://www.suse.com/security/cve/CVE-2022-48979/" source="CVE"/>
		<reference ref_id="CVE-2022-48982" ref_url="https://www.suse.com/security/cve/CVE-2022-48982/" source="CVE"/>
		<reference ref_id="CVE-2022-48983" ref_url="https://www.suse.com/security/cve/CVE-2022-48983/" source="CVE"/>
		<reference ref_id="CVE-2022-48989" ref_url="https://www.suse.com/security/cve/CVE-2022-48989/" source="CVE"/>
		<reference ref_id="CVE-2022-48990" ref_url="https://www.suse.com/security/cve/CVE-2022-48990/" source="CVE"/>
		<reference ref_id="CVE-2023-52915" ref_url="https://www.suse.com/security/cve/CVE-2023-52915/" source="CVE"/>
		<reference ref_id="CVE-2023-52917" ref_url="https://www.suse.com/security/cve/CVE-2023-52917/" source="CVE"/>
		<reference ref_id="CVE-2023-52918" ref_url="https://www.suse.com/security/cve/CVE-2023-52918/" source="CVE"/>
		<reference ref_id="CVE-2023-52921" ref_url="https://www.suse.com/security/cve/CVE-2023-52921/" source="CVE"/>
		<reference ref_id="CVE-2023-52922" ref_url="https://www.suse.com/security/cve/CVE-2023-52922/" source="CVE"/>
		<reference ref_id="CVE-2024-26782" ref_url="https://www.suse.com/security/cve/CVE-2024-26782/" source="CVE"/>
		<reference ref_id="CVE-2024-26906" ref_url="https://www.suse.com/security/cve/CVE-2024-26906/" source="CVE"/>
		<reference ref_id="CVE-2024-26953" ref_url="https://www.suse.com/security/cve/CVE-2024-26953/" source="CVE"/>
		<reference ref_id="CVE-2024-35888" ref_url="https://www.suse.com/security/cve/CVE-2024-35888/" source="CVE"/>
		<reference ref_id="CVE-2024-35937" ref_url="https://www.suse.com/security/cve/CVE-2024-35937/" source="CVE"/>
		<reference ref_id="CVE-2024-35980" ref_url="https://www.suse.com/security/cve/CVE-2024-35980/" source="CVE"/>
		<reference ref_id="CVE-2024-36484" ref_url="https://www.suse.com/security/cve/CVE-2024-36484/" source="CVE"/>
		<reference ref_id="CVE-2024-36883" ref_url="https://www.suse.com/security/cve/CVE-2024-36883/" source="CVE"/>
		<reference ref_id="CVE-2024-36886" ref_url="https://www.suse.com/security/cve/CVE-2024-36886/" source="CVE"/>
		<reference ref_id="CVE-2024-36905" ref_url="https://www.suse.com/security/cve/CVE-2024-36905/" source="CVE"/>
		<reference ref_id="CVE-2024-36953" ref_url="https://www.suse.com/security/cve/CVE-2024-36953/" source="CVE"/>
		<reference ref_id="CVE-2024-36954" ref_url="https://www.suse.com/security/cve/CVE-2024-36954/" source="CVE"/>
		<reference ref_id="CVE-2024-38577" ref_url="https://www.suse.com/security/cve/CVE-2024-38577/" source="CVE"/>
		<reference ref_id="CVE-2024-38589" ref_url="https://www.suse.com/security/cve/CVE-2024-38589/" source="CVE"/>
		<reference ref_id="CVE-2024-38615" ref_url="https://www.suse.com/security/cve/CVE-2024-38615/" source="CVE"/>
		<reference ref_id="CVE-2024-40997" ref_url="https://www.suse.com/security/cve/CVE-2024-40997/" source="CVE"/>
		<reference ref_id="CVE-2024-41016" ref_url="https://www.suse.com/security/cve/CVE-2024-41016/" source="CVE"/>
		<reference ref_id="CVE-2024-41023" ref_url="https://www.suse.com/security/cve/CVE-2024-41023/" source="CVE"/>
		<reference ref_id="CVE-2024-41049" ref_url="https://www.suse.com/security/cve/CVE-2024-41049/" source="CVE"/>
		<reference ref_id="CVE-2024-42131" ref_url="https://www.suse.com/security/cve/CVE-2024-42131/" source="CVE"/>
		<reference ref_id="CVE-2024-43817" ref_url="https://www.suse.com/security/cve/CVE-2024-43817/" source="CVE"/>
		<reference ref_id="CVE-2024-43897" ref_url="https://www.suse.com/security/cve/CVE-2024-43897/" source="CVE"/>
		<reference ref_id="CVE-2024-44932" ref_url="https://www.suse.com/security/cve/CVE-2024-44932/" source="CVE"/>
		<reference ref_id="CVE-2024-44964" ref_url="https://www.suse.com/security/cve/CVE-2024-44964/" source="CVE"/>
		<reference ref_id="CVE-2024-44995" ref_url="https://www.suse.com/security/cve/CVE-2024-44995/" source="CVE"/>
		<reference ref_id="CVE-2024-46681" ref_url="https://www.suse.com/security/cve/CVE-2024-46681/" source="CVE"/>
		<reference ref_id="CVE-2024-46800" ref_url="https://www.suse.com/security/cve/CVE-2024-46800/" source="CVE"/>
		<reference ref_id="CVE-2024-46802" ref_url="https://www.suse.com/security/cve/CVE-2024-46802/" source="CVE"/>
		<reference ref_id="CVE-2024-46804" ref_url="https://www.suse.com/security/cve/CVE-2024-46804/" source="CVE"/>
		<reference ref_id="CVE-2024-46805" ref_url="https://www.suse.com/security/cve/CVE-2024-46805/" source="CVE"/>
		<reference ref_id="CVE-2024-46807" ref_url="https://www.suse.com/security/cve/CVE-2024-46807/" source="CVE"/>
		<reference ref_id="CVE-2024-46810" ref_url="https://www.suse.com/security/cve/CVE-2024-46810/" source="CVE"/>
		<reference ref_id="CVE-2024-46812" ref_url="https://www.suse.com/security/cve/CVE-2024-46812/" source="CVE"/>
		<reference ref_id="CVE-2024-46819" ref_url="https://www.suse.com/security/cve/CVE-2024-46819/" source="CVE"/>
		<reference ref_id="CVE-2024-46821" ref_url="https://www.suse.com/security/cve/CVE-2024-46821/" source="CVE"/>
		<reference ref_id="CVE-2024-46835" ref_url="https://www.suse.com/security/cve/CVE-2024-46835/" source="CVE"/>
		<reference ref_id="CVE-2024-46842" ref_url="https://www.suse.com/security/cve/CVE-2024-46842/" source="CVE"/>
		<reference ref_id="CVE-2024-46853" ref_url="https://www.suse.com/security/cve/CVE-2024-46853/" source="CVE"/>
		<reference ref_id="CVE-2024-46859" ref_url="https://www.suse.com/security/cve/CVE-2024-46859/" source="CVE"/>
		<reference ref_id="CVE-2024-46864" ref_url="https://www.suse.com/security/cve/CVE-2024-46864/" source="CVE"/>
		<reference ref_id="CVE-2024-46871" ref_url="https://www.suse.com/security/cve/CVE-2024-46871/" source="CVE"/>
		<reference ref_id="CVE-2024-47663" ref_url="https://www.suse.com/security/cve/CVE-2024-47663/" source="CVE"/>
		<reference ref_id="CVE-2024-47665" ref_url="https://www.suse.com/security/cve/CVE-2024-47665/" source="CVE"/>
		<reference ref_id="CVE-2024-47667" ref_url="https://www.suse.com/security/cve/CVE-2024-47667/" source="CVE"/>
		<reference ref_id="CVE-2024-47669" ref_url="https://www.suse.com/security/cve/CVE-2024-47669/" source="CVE"/>
		<reference ref_id="CVE-2024-47670" ref_url="https://www.suse.com/security/cve/CVE-2024-47670/" source="CVE"/>
		<reference ref_id="CVE-2024-47671" ref_url="https://www.suse.com/security/cve/CVE-2024-47671/" source="CVE"/>
		<reference ref_id="CVE-2024-47679" ref_url="https://www.suse.com/security/cve/CVE-2024-47679/" source="CVE"/>
		<reference ref_id="CVE-2024-47682" ref_url="https://www.suse.com/security/cve/CVE-2024-47682/" source="CVE"/>
		<reference ref_id="CVE-2024-47693" ref_url="https://www.suse.com/security/cve/CVE-2024-47693/" source="CVE"/>
		<reference ref_id="CVE-2024-47695" ref_url="https://www.suse.com/security/cve/CVE-2024-47695/" source="CVE"/>
		<reference ref_id="CVE-2024-47696" ref_url="https://www.suse.com/security/cve/CVE-2024-47696/" source="CVE"/>
		<reference ref_id="CVE-2024-47697" ref_url="https://www.suse.com/security/cve/CVE-2024-47697/" source="CVE"/>
		<reference ref_id="CVE-2024-47698" ref_url="https://www.suse.com/security/cve/CVE-2024-47698/" source="CVE"/>
		<reference ref_id="CVE-2024-47699" ref_url="https://www.suse.com/security/cve/CVE-2024-47699/" source="CVE"/>
		<reference ref_id="CVE-2024-47701" ref_url="https://www.suse.com/security/cve/CVE-2024-47701/" source="CVE"/>
		<reference ref_id="CVE-2024-47709" ref_url="https://www.suse.com/security/cve/CVE-2024-47709/" source="CVE"/>
		<reference ref_id="CVE-2024-47712" ref_url="https://www.suse.com/security/cve/CVE-2024-47712/" source="CVE"/>
		<reference ref_id="CVE-2024-47713" ref_url="https://www.suse.com/security/cve/CVE-2024-47713/" source="CVE"/>
		<reference ref_id="CVE-2024-47718" ref_url="https://www.suse.com/security/cve/CVE-2024-47718/" source="CVE"/>
		<reference ref_id="CVE-2024-47723" ref_url="https://www.suse.com/security/cve/CVE-2024-47723/" source="CVE"/>
		<reference ref_id="CVE-2024-47728" ref_url="https://www.suse.com/security/cve/CVE-2024-47728/" source="CVE"/>
		<reference ref_id="CVE-2024-47735" ref_url="https://www.suse.com/security/cve/CVE-2024-47735/" source="CVE"/>
		<reference ref_id="CVE-2024-47737" ref_url="https://www.suse.com/security/cve/CVE-2024-47737/" source="CVE"/>
		<reference ref_id="CVE-2024-47742" ref_url="https://www.suse.com/security/cve/CVE-2024-47742/" source="CVE"/>
		<reference ref_id="CVE-2024-47745" ref_url="https://www.suse.com/security/cve/CVE-2024-47745/" source="CVE"/>
		<reference ref_id="CVE-2024-47749" ref_url="https://www.suse.com/security/cve/CVE-2024-47749/" source="CVE"/>
		<reference ref_id="CVE-2024-47756" ref_url="https://www.suse.com/security/cve/CVE-2024-47756/" source="CVE"/>
		<reference ref_id="CVE-2024-47757" ref_url="https://www.suse.com/security/cve/CVE-2024-47757/" source="CVE"/>
		<reference ref_id="CVE-2024-49850" ref_url="https://www.suse.com/security/cve/CVE-2024-49850/" source="CVE"/>
		<reference ref_id="CVE-2024-49851" ref_url="https://www.suse.com/security/cve/CVE-2024-49851/" source="CVE"/>
		<reference ref_id="CVE-2024-49852" ref_url="https://www.suse.com/security/cve/CVE-2024-49852/" source="CVE"/>
		<reference ref_id="CVE-2024-49855" ref_url="https://www.suse.com/security/cve/CVE-2024-49855/" source="CVE"/>
		<reference ref_id="CVE-2024-49861" ref_url="https://www.suse.com/security/cve/CVE-2024-49861/" source="CVE"/>
		<reference ref_id="CVE-2024-49863" ref_url="https://www.suse.com/security/cve/CVE-2024-49863/" source="CVE"/>
		<reference ref_id="CVE-2024-49868" ref_url="https://www.suse.com/security/cve/CVE-2024-49868/" source="CVE"/>
		<reference ref_id="CVE-2024-49870" ref_url="https://www.suse.com/security/cve/CVE-2024-49870/" source="CVE"/>
		<reference ref_id="CVE-2024-49871" ref_url="https://www.suse.com/security/cve/CVE-2024-49871/" source="CVE"/>
		<reference ref_id="CVE-2024-49875" ref_url="https://www.suse.com/security/cve/CVE-2024-49875/" source="CVE"/>
		<reference ref_id="CVE-2024-49877" ref_url="https://www.suse.com/security/cve/CVE-2024-49877/" source="CVE"/>
		<reference ref_id="CVE-2024-49879" ref_url="https://www.suse.com/security/cve/CVE-2024-49879/" source="CVE"/>
		<reference ref_id="CVE-2024-49884" ref_url="https://www.suse.com/security/cve/CVE-2024-49884/" source="CVE"/>
		<reference ref_id="CVE-2024-49891" ref_url="https://www.suse.com/security/cve/CVE-2024-49891/" source="CVE"/>
		<reference ref_id="CVE-2024-49900" ref_url="https://www.suse.com/security/cve/CVE-2024-49900/" source="CVE"/>
		<reference ref_id="CVE-2024-49902" ref_url="https://www.suse.com/security/cve/CVE-2024-49902/" source="CVE"/>
		<reference ref_id="CVE-2024-49903" ref_url="https://www.suse.com/security/cve/CVE-2024-49903/" source="CVE"/>
		<reference ref_id="CVE-2024-49905" ref_url="https://www.suse.com/security/cve/CVE-2024-49905/" source="CVE"/>
		<reference ref_id="CVE-2024-49907" ref_url="https://www.suse.com/security/cve/CVE-2024-49907/" source="CVE"/>
		<reference ref_id="CVE-2024-49908" ref_url="https://www.suse.com/security/cve/CVE-2024-49908/" source="CVE"/>
		<reference ref_id="CVE-2024-49921" ref_url="https://www.suse.com/security/cve/CVE-2024-49921/" source="CVE"/>
		<reference ref_id="CVE-2024-49924" ref_url="https://www.suse.com/security/cve/CVE-2024-49924/" source="CVE"/>
		<reference ref_id="CVE-2024-49925" ref_url="https://www.suse.com/security/cve/CVE-2024-49925/" source="CVE"/>
		<reference ref_id="CVE-2024-49934" ref_url="https://www.suse.com/security/cve/CVE-2024-49934/" source="CVE"/>
		<reference ref_id="CVE-2024-49935" ref_url="https://www.suse.com/security/cve/CVE-2024-49935/" source="CVE"/>
		<reference ref_id="CVE-2024-49938" ref_url="https://www.suse.com/security/cve/CVE-2024-49938/" source="CVE"/>
		<reference ref_id="CVE-2024-49945" ref_url="https://www.suse.com/security/cve/CVE-2024-49945/" source="CVE"/>
		<reference ref_id="CVE-2024-49947" ref_url="https://www.suse.com/security/cve/CVE-2024-49947/" source="CVE"/>
		<reference ref_id="CVE-2024-49950" ref_url="https://www.suse.com/security/cve/CVE-2024-49950/" source="CVE"/>
		<reference ref_id="CVE-2024-49957" ref_url="https://www.suse.com/security/cve/CVE-2024-49957/" source="CVE"/>
		<reference ref_id="CVE-2024-49963" ref_url="https://www.suse.com/security/cve/CVE-2024-49963/" source="CVE"/>
		<reference ref_id="CVE-2024-49965" ref_url="https://www.suse.com/security/cve/CVE-2024-49965/" source="CVE"/>
		<reference ref_id="CVE-2024-49966" ref_url="https://www.suse.com/security/cve/CVE-2024-49966/" source="CVE"/>
		<reference ref_id="CVE-2024-49968" ref_url="https://www.suse.com/security/cve/CVE-2024-49968/" source="CVE"/>
		<reference ref_id="CVE-2024-49981" ref_url="https://www.suse.com/security/cve/CVE-2024-49981/" source="CVE"/>
		<reference ref_id="CVE-2024-49983" ref_url="https://www.suse.com/security/cve/CVE-2024-49983/" source="CVE"/>
		<reference ref_id="CVE-2024-49985" ref_url="https://www.suse.com/security/cve/CVE-2024-49985/" source="CVE"/>
		<reference ref_id="CVE-2024-49989" ref_url="https://www.suse.com/security/cve/CVE-2024-49989/" source="CVE"/>
		<reference ref_id="CVE-2024-50003" ref_url="https://www.suse.com/security/cve/CVE-2024-50003/" source="CVE"/>
		<reference ref_id="CVE-2024-50007" ref_url="https://www.suse.com/security/cve/CVE-2024-50007/" source="CVE"/>
		<reference ref_id="CVE-2024-50008" ref_url="https://www.suse.com/security/cve/CVE-2024-50008/" source="CVE"/>
		<reference ref_id="CVE-2024-50009" ref_url="https://www.suse.com/security/cve/CVE-2024-50009/" source="CVE"/>
		<reference ref_id="CVE-2024-50013" ref_url="https://www.suse.com/security/cve/CVE-2024-50013/" source="CVE"/>
		<reference ref_id="CVE-2024-50017" ref_url="https://www.suse.com/security/cve/CVE-2024-50017/" source="CVE"/>
		<reference ref_id="CVE-2024-50025" ref_url="https://www.suse.com/security/cve/CVE-2024-50025/" source="CVE"/>
		<reference ref_id="CVE-2024-50026" ref_url="https://www.suse.com/security/cve/CVE-2024-50026/" source="CVE"/>
		<reference ref_id="CVE-2024-50031" ref_url="https://www.suse.com/security/cve/CVE-2024-50031/" source="CVE"/>
		<reference ref_id="CVE-2024-50044" ref_url="https://www.suse.com/security/cve/CVE-2024-50044/" source="CVE"/>
		<reference ref_id="CVE-2024-50062" ref_url="https://www.suse.com/security/cve/CVE-2024-50062/" source="CVE"/>
		<reference ref_id="CVE-2024-50067" ref_url="https://www.suse.com/security/cve/CVE-2024-50067/" source="CVE"/>
		<reference ref_id="CVE-2024-50073" ref_url="https://www.suse.com/security/cve/CVE-2024-50073/" source="CVE"/>
		<reference ref_id="CVE-2024-50074" ref_url="https://www.suse.com/security/cve/CVE-2024-50074/" source="CVE"/>
		<reference ref_id="CVE-2024-50077" ref_url="https://www.suse.com/security/cve/CVE-2024-50077/" source="CVE"/>
		<reference ref_id="CVE-2024-50078" ref_url="https://www.suse.com/security/cve/CVE-2024-50078/" source="CVE"/>
		<reference ref_id="CVE-2024-50082" ref_url="https://www.suse.com/security/cve/CVE-2024-50082/" source="CVE"/>
		<reference ref_id="CVE-2024-50089" ref_url="https://www.suse.com/security/cve/CVE-2024-50089/" source="CVE"/>
		<reference ref_id="CVE-2024-50093" ref_url="https://www.suse.com/security/cve/CVE-2024-50093/" source="CVE"/>
		<reference ref_id="CVE-2024-50095" ref_url="https://www.suse.com/security/cve/CVE-2024-50095/" source="CVE"/>
		<reference ref_id="CVE-2024-50096" ref_url="https://www.suse.com/security/cve/CVE-2024-50096/" source="CVE"/>
		<reference ref_id="CVE-2024-50098" ref_url="https://www.suse.com/security/cve/CVE-2024-50098/" source="CVE"/>
		<reference ref_id="CVE-2024-50099" ref_url="https://www.suse.com/security/cve/CVE-2024-50099/" source="CVE"/>
		<reference ref_id="CVE-2024-50103" ref_url="https://www.suse.com/security/cve/CVE-2024-50103/" source="CVE"/>
		<reference ref_id="CVE-2024-50108" ref_url="https://www.suse.com/security/cve/CVE-2024-50108/" source="CVE"/>
		<reference ref_id="CVE-2024-50110" ref_url="https://www.suse.com/security/cve/CVE-2024-50110/" source="CVE"/>
		<reference ref_id="CVE-2024-50115" ref_url="https://www.suse.com/security/cve/CVE-2024-50115/" source="CVE"/>
		<reference ref_id="CVE-2024-50116" ref_url="https://www.suse.com/security/cve/CVE-2024-50116/" source="CVE"/>
		<reference ref_id="CVE-2024-50117" ref_url="https://www.suse.com/security/cve/CVE-2024-50117/" source="CVE"/>
		<reference ref_id="CVE-2024-50124" ref_url="https://www.suse.com/security/cve/CVE-2024-50124/" source="CVE"/>
		<reference ref_id="CVE-2024-50125" ref_url="https://www.suse.com/security/cve/CVE-2024-50125/" source="CVE"/>
		<reference ref_id="CVE-2024-50127" ref_url="https://www.suse.com/security/cve/CVE-2024-50127/" source="CVE"/>
		<reference ref_id="CVE-2024-50128" ref_url="https://www.suse.com/security/cve/CVE-2024-50128/" source="CVE"/>
		<reference ref_id="CVE-2024-50131" ref_url="https://www.suse.com/security/cve/CVE-2024-50131/" source="CVE"/>
		<reference ref_id="CVE-2024-50134" ref_url="https://www.suse.com/security/cve/CVE-2024-50134/" source="CVE"/>
		<reference ref_id="CVE-2024-50135" ref_url="https://www.suse.com/security/cve/CVE-2024-50135/" source="CVE"/>
		<reference ref_id="CVE-2024-50138" ref_url="https://www.suse.com/security/cve/CVE-2024-50138/" source="CVE"/>
		<reference ref_id="CVE-2024-50141" ref_url="https://www.suse.com/security/cve/CVE-2024-50141/" source="CVE"/>
		<reference ref_id="CVE-2024-50146" ref_url="https://www.suse.com/security/cve/CVE-2024-50146/" source="CVE"/>
		<reference ref_id="CVE-2024-50147" ref_url="https://www.suse.com/security/cve/CVE-2024-50147/" source="CVE"/>
		<reference ref_id="CVE-2024-50148" ref_url="https://www.suse.com/security/cve/CVE-2024-50148/" source="CVE"/>
		<reference ref_id="CVE-2024-50150" ref_url="https://www.suse.com/security/cve/CVE-2024-50150/" source="CVE"/>
		<reference ref_id="CVE-2024-50153" ref_url="https://www.suse.com/security/cve/CVE-2024-50153/" source="CVE"/>
		<reference ref_id="CVE-2024-50154" ref_url="https://www.suse.com/security/cve/CVE-2024-50154/" source="CVE"/>
		<reference ref_id="CVE-2024-50155" ref_url="https://www.suse.com/security/cve/CVE-2024-50155/" source="CVE"/>
		<reference ref_id="CVE-2024-50156" ref_url="https://www.suse.com/security/cve/CVE-2024-50156/" source="CVE"/>
		<reference ref_id="CVE-2024-50160" ref_url="https://www.suse.com/security/cve/CVE-2024-50160/" source="CVE"/>
		<reference ref_id="CVE-2024-50167" ref_url="https://www.suse.com/security/cve/CVE-2024-50167/" source="CVE"/>
		<reference ref_id="CVE-2024-50171" ref_url="https://www.suse.com/security/cve/CVE-2024-50171/" source="CVE"/>
		<reference ref_id="CVE-2024-50179" ref_url="https://www.suse.com/security/cve/CVE-2024-50179/" source="CVE"/>
		<reference ref_id="CVE-2024-50180" ref_url="https://www.suse.com/security/cve/CVE-2024-50180/" source="CVE"/>
		<reference ref_id="CVE-2024-50182" ref_url="https://www.suse.com/security/cve/CVE-2024-50182/" source="CVE"/>
		<reference ref_id="CVE-2024-50183" ref_url="https://www.suse.com/security/cve/CVE-2024-50183/" source="CVE"/>
		<reference ref_id="CVE-2024-50184" ref_url="https://www.suse.com/security/cve/CVE-2024-50184/" source="CVE"/>
		<reference ref_id="CVE-2024-50186" ref_url="https://www.suse.com/security/cve/CVE-2024-50186/" source="CVE"/>
		<reference ref_id="CVE-2024-50187" ref_url="https://www.suse.com/security/cve/CVE-2024-50187/" source="CVE"/>
		<reference ref_id="CVE-2024-50188" ref_url="https://www.suse.com/security/cve/CVE-2024-50188/" source="CVE"/>
		<reference ref_id="CVE-2024-50189" ref_url="https://www.suse.com/security/cve/CVE-2024-50189/" source="CVE"/>
		<reference ref_id="CVE-2024-50192" ref_url="https://www.suse.com/security/cve/CVE-2024-50192/" source="CVE"/>
		<reference ref_id="CVE-2024-50194" ref_url="https://www.suse.com/security/cve/CVE-2024-50194/" source="CVE"/>
		<reference ref_id="CVE-2024-50195" ref_url="https://www.suse.com/security/cve/CVE-2024-50195/" source="CVE"/>
		<reference ref_id="CVE-2024-50196" ref_url="https://www.suse.com/security/cve/CVE-2024-50196/" source="CVE"/>
		<reference ref_id="CVE-2024-50198" ref_url="https://www.suse.com/security/cve/CVE-2024-50198/" source="CVE"/>
		<reference ref_id="CVE-2024-50201" ref_url="https://www.suse.com/security/cve/CVE-2024-50201/" source="CVE"/>
		<reference ref_id="CVE-2024-50205" ref_url="https://www.suse.com/security/cve/CVE-2024-50205/" source="CVE"/>
		<reference ref_id="CVE-2024-50208" ref_url="https://www.suse.com/security/cve/CVE-2024-50208/" source="CVE"/>
		<reference ref_id="CVE-2024-50209" ref_url="https://www.suse.com/security/cve/CVE-2024-50209/" source="CVE"/>
		<reference ref_id="CVE-2024-50215" ref_url="https://www.suse.com/security/cve/CVE-2024-50215/" source="CVE"/>
		<reference ref_id="CVE-2024-50218" ref_url="https://www.suse.com/security/cve/CVE-2024-50218/" source="CVE"/>
		<reference ref_id="CVE-2024-50229" ref_url="https://www.suse.com/security/cve/CVE-2024-50229/" source="CVE"/>
		<reference ref_id="CVE-2024-50230" ref_url="https://www.suse.com/security/cve/CVE-2024-50230/" source="CVE"/>
		<reference ref_id="CVE-2024-50232" ref_url="https://www.suse.com/security/cve/CVE-2024-50232/" source="CVE"/>
		<reference ref_id="CVE-2024-50233" ref_url="https://www.suse.com/security/cve/CVE-2024-50233/" source="CVE"/>
		<reference ref_id="CVE-2024-50234" ref_url="https://www.suse.com/security/cve/CVE-2024-50234/" source="CVE"/>
		<reference ref_id="CVE-2024-50236" ref_url="https://www.suse.com/security/cve/CVE-2024-50236/" source="CVE"/>
		<reference ref_id="CVE-2024-50237" ref_url="https://www.suse.com/security/cve/CVE-2024-50237/" source="CVE"/>
		<reference ref_id="CVE-2024-50249" ref_url="https://www.suse.com/security/cve/CVE-2024-50249/" source="CVE"/>
		<reference ref_id="CVE-2024-50255" ref_url="https://www.suse.com/security/cve/CVE-2024-50255/" source="CVE"/>
		<reference ref_id="CVE-2024-50259" ref_url="https://www.suse.com/security/cve/CVE-2024-50259/" source="CVE"/>
		<reference ref_id="CVE-2024-50261" ref_url="https://www.suse.com/security/cve/CVE-2024-50261/" source="CVE"/>
		<reference ref_id="CVE-2024-50264" ref_url="https://www.suse.com/security/cve/CVE-2024-50264/" source="CVE"/>
		<reference ref_id="CVE-2024-50265" ref_url="https://www.suse.com/security/cve/CVE-2024-50265/" source="CVE"/>
		<reference ref_id="CVE-2024-50267" ref_url="https://www.suse.com/security/cve/CVE-2024-50267/" source="CVE"/>
		<reference ref_id="CVE-2024-50268" ref_url="https://www.suse.com/security/cve/CVE-2024-50268/" source="CVE"/>
		<reference ref_id="CVE-2024-50269" ref_url="https://www.suse.com/security/cve/CVE-2024-50269/" source="CVE"/>
		<reference ref_id="CVE-2024-50271" ref_url="https://www.suse.com/security/cve/CVE-2024-50271/" source="CVE"/>
		<reference ref_id="CVE-2024-50273" ref_url="https://www.suse.com/security/cve/CVE-2024-50273/" source="CVE"/>
		<reference ref_id="CVE-2024-50274" ref_url="https://www.suse.com/security/cve/CVE-2024-50274/" source="CVE"/>
		<reference ref_id="CVE-2024-50279" ref_url="https://www.suse.com/security/cve/CVE-2024-50279/" source="CVE"/>
		<reference ref_id="CVE-2024-50282" ref_url="https://www.suse.com/security/cve/CVE-2024-50282/" source="CVE"/>
		<reference ref_id="CVE-2024-50287" ref_url="https://www.suse.com/security/cve/CVE-2024-50287/" source="CVE"/>
		<reference ref_id="CVE-2024-50289" ref_url="https://www.suse.com/security/cve/CVE-2024-50289/" source="CVE"/>
		<reference ref_id="CVE-2024-50290" ref_url="https://www.suse.com/security/cve/CVE-2024-50290/" source="CVE"/>
		<reference ref_id="CVE-2024-50292" ref_url="https://www.suse.com/security/cve/CVE-2024-50292/" source="CVE"/>
		<reference ref_id="CVE-2024-50295" ref_url="https://www.suse.com/security/cve/CVE-2024-50295/" source="CVE"/>
		<reference ref_id="CVE-2024-50298" ref_url="https://www.suse.com/security/cve/CVE-2024-50298/" source="CVE"/>
		<reference ref_id="CVE-2024-50301" ref_url="https://www.suse.com/security/cve/CVE-2024-50301/" source="CVE"/>
		<reference ref_id="CVE-2024-50302" ref_url="https://www.suse.com/security/cve/CVE-2024-50302/" source="CVE"/>
		<reference ref_id="CVE-2024-53052" ref_url="https://www.suse.com/security/cve/CVE-2024-53052/" source="CVE"/>
		<reference ref_id="CVE-2024-53058" ref_url="https://www.suse.com/security/cve/CVE-2024-53058/" source="CVE"/>
		<reference ref_id="CVE-2024-53059" ref_url="https://www.suse.com/security/cve/CVE-2024-53059/" source="CVE"/>
		<reference ref_id="CVE-2024-53060" ref_url="https://www.suse.com/security/cve/CVE-2024-53060/" source="CVE"/>
		<reference ref_id="CVE-2024-53061" ref_url="https://www.suse.com/security/cve/CVE-2024-53061/" source="CVE"/>
		<reference ref_id="CVE-2024-53063" ref_url="https://www.suse.com/security/cve/CVE-2024-53063/" source="CVE"/>
		<reference ref_id="CVE-2024-53066" ref_url="https://www.suse.com/security/cve/CVE-2024-53066/" source="CVE"/>
		<reference ref_id="CVE-2024-53068" ref_url="https://www.suse.com/security/cve/CVE-2024-53068/" source="CVE"/>
		<reference ref_id="CVE-2024-53079" ref_url="https://www.suse.com/security/cve/CVE-2024-53079/" source="CVE"/>
		<reference ref_id="CVE-2024-53085" ref_url="https://www.suse.com/security/cve/CVE-2024-53085/" source="CVE"/>
		<reference ref_id="CVE-2024-53088" ref_url="https://www.suse.com/security/cve/CVE-2024-53088/" source="CVE"/>
		<reference ref_id="CVE-2024-53104" ref_url="https://www.suse.com/security/cve/CVE-2024-53104/" source="CVE"/>
		<reference ref_id="CVE-2024-53110" ref_url="https://www.suse.com/security/cve/CVE-2024-53110/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2021-47594: mptcp: never allow the PM to close a listener subflow (bsc#1226560).
- CVE-2022-48983: io_uring: Fix a null-ptr-deref in io_tctx_exit_cb() (bsc#1231959).
- CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
- CVE-2024-26906: Fixed invalid vsyscall page read for copy_from_kernel_nofault() (bsc#1223202).
- CVE-2024-26953: net: esp: fix bad handling of pages from page_pool (bsc#1223656).
- CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb-&gt;head (bsc#1224518).
- CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully (bsc#1224526).
- CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).
- CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).
- CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742).
- CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append (bsc#1225764).
- CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748).
- CVE-2024-38615: cpufreq: exit() callback is optional (bsc#1226592).
- CVE-2024-40997: cpufreq: amd-pstate: fix memory leak on CPU EPP exit (bsc#1227853).
- CVE-2024-41023: sched/deadline: Fix task_struct reference leak (bsc#1228430).
- CVE-2024-44932: idpf: fix UAFs when destroying the queues (bsc#1229808).
- CVE-2024-44964: idpf: fix memory leaks and crashes while performing a soft reset (bsc#1230220).
- CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231).
- CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558).
- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).
- CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&amp;iput() (bsc#1231930).
- CVE-2024-47701: ext4: avoid OOB when system.data xattr changes underneath the filesystem (bsc#1231920).
- CVE-2024-47745: mm: call the security_mmap_file() LSM hook in remap_file_pages() (bsc#1232135).
- CVE-2024-47757: nilfs2: fix potential oob read in nilfs_btree_check_delete() (bsc#1232187).
- CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272).
- CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371).
- CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224)
- CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name (bsc#1232387).
- CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165).
- CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).
- CVE-2024-49968: ext4: filesystems without casefold feature cannot be mounted with siphash (bsc#1232264).
- CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free (bsc#1232096).
- CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module unload (bsc#1232483).
- CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value (bsc#1232318).
- CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (bsc#1232520).
- CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (bsc#1232500).
- CVE-2024-50089: unicode: Do not special case ignorable code points (bsc#1232860).
- CVE-2024-50093: thermal: intel: int340x: processor: Fix warning during module unload (bsc#1232877).
- CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down (bsc#1232881).
- CVE-2024-50108: drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too (bsc#1232884).
- CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping (bsc#1232885).
- CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919).
- CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
- CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907).
- CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905).
- CVE-2024-50134: drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape (bsc#1232890).
- CVE-2024-50135: nvme-pci: fix race condition between reset and nvme_dev_disable() (bsc#1232888).
- CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935).
- CVE-2024-50146: net/mlx5e: Do not call cleanup on profile rollback failure (bsc#1233056).
- CVE-2024-50147: net/mlx5: Fix command bitmask initialization (bsc#1233067).
- CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in target_alloc_device() (bsc#1233061).
- CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233070).
- CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049).
- CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057).
- CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct map (bsc#1233129).
- CVE-2024-50184: virtio_pmem: Check device status before requesting flush (bsc#1233135).
- CVE-2024-50186: net: explicitly clear the sk pointer, when pf-&gt;create fails (bsc#1233110).
- CVE-2024-50188: net: phy: dp83869: fix memory corruption when enabling fiber (bsc#1233107).
- CVE-2024-50192: irqchip/gic-v4: Do not allow a VMOVP on a dying VPE (bsc#1233106).
- CVE-2024-50195: posix-clock: Fix missing timespec64 check in pc_clock_settime() (bsc#1233103).
- CVE-2024-50196: pinctrl: ocelot: fix system hang on level based interrupts (bsc#1233113).
- CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (bsc#1233293).
- CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233117).
- CVE-2024-50229: nilfs2: fix potential deadlock with newly created symlinks (bsc#1233205).
- CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked flag (bsc#1233206).
- CVE-2024-50259: netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() (bsc#1233214).
- CVE-2024-50261: macsec: Fix use-after-free while sending the offloading packet (bsc#1233253).
- CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk-&gt;trans (bsc#1233453).
- CVE-2024-50267: usb: serial: io_edgeport: fix use after free in debug printk (bsc#1233456).
- CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460).
- CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462).
- CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463).
- CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468).
- CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
- CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single (bsc#1233484).
- CVE-2024-50298: net: enetc: allocate vf_state during PF probes (bsc#1233487).
- CVE-2024-53052: io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (bsc#1233548).
- CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552).
- CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
- CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557).
- CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (bsc#1233561).
- CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking (bsc#1233570).
- CVE-2024-53088: i40e: fix race condition by adding filter's intermediate sync state (bsc#1233580).
- CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
- CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error (bsc#1234085).

The following non-security bugs were fixed:

- Drop OCFS2 patch causing a regression (bsc#1233255)
- Fix regression on AMDGPU driver (bsc#1233134)
- Removed the duplicated check of static_assert(sizeof(struct work_struct) &gt;= sizeof(struct rcu_head)).
- Removed unnecessary white-space change in kernel/bpf/syscall.c
- Revert 'cgroup: Fix memory leak caused by missing cgroup_bpf_offline' (bsc#1234108).
- Revert 'ixgbe: Manual AN-37 for troublesome link partners for X550 SFI' (git-fixes).
- Revert 'mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K' (git-fixes).
- Revert 'usb: gadget: composite: fix OS descriptors w_value logic' (git-fixes).
- Update config files (bsc#1218644).
- Update config files. Enabled IDPF for ARM64 (bsc#1221309)
- acpi: CPPC: Fix _CPC register setting issue (git-fixes).
- acpi: CPPC: Make rmw_lock a raw_spin_lock (git-fixes).
- acpi: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid detection issue (stable-fixes).
- acpi: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable-fixes).
- ad7780: fix division by zero in ad7780_write_raw() (git-fixes).
- adapt same struct naming as similar kABI workaround in SLE15-SP6 (prefixed with 'suse_' to make it more obvious its a downstream thing.
- add bugreference to a hv_netvsc patch (bsc#1232413).
- add commit message for the kABI patch
- alsa: 6fire: Release resources at card release (git-fixes).
- alsa: ac97: bus: Fix the mistake in the comment (git-fixes).
- alsa: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes).
- alsa: firewire-lib: fix return value on fail in amdtp_tscm_init() (git-fixes).
- alsa: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes).
- alsa: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable-fixes).
- alsa: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes).
- alsa: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable-fixes).
- alsa: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes).
- alsa: hda/realtek: Update ALC225 depop procedure (git-fixes).
- alsa: hda/realtek: Update ALC256 depop procedure (git-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable-fixes).
- alsa: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes).
- alsa: usb-audio: Add quirk for HP 320 FHD Webcam (stable-fixes).
- alsa: usb-audio: Add quirks for Dell WD19 dock (stable-fixes).
- alsa: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes).
- amd-pstate: Set min_perf to nominal_perf for active mode performance gov (git-fixes).
- arm64/sve: Discard stale CPU state when handling SVE traps (git-fixes)
- arm64: Force position-independent veneers (git-fixes).
- arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes).
- arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes)
- arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git-fixes)
- arm64: smccc: replace custom COUNT_ARGS() &amp; CONCATENATE() (git-fixes)
- arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git-fixes)
- arm64:uprobe fix the uprobe SWBP_INSN in big-endian (git-fixes)
- asoc: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes).
- asoc: codecs: Fix atomicity violation in snd_soc_component_get_drvdata() (git-fixes).
- asoc: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to default regs values (stable-fixes).
- asoc: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes).
- asoc: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes).
- asoc: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable-fixes).
- asoc: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git-fixes).
- blk-throttle: Fix io statistics for cgroup v1 (bsc#1233528).
- block: Avoid leaking hctx-&gt;nr_active counter on batched completion (bsc#1231923).
- bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git-fixes).
- bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes).
- bnxt_en: Fix the PCI-AER routines (git-fixes).
- bnxt_en: Remove mis-applied code from bnxt_cfg_ntp_filters() (git-fixes).
- bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down (git-fixes).
- bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes).
- bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes).
- bnxt_en: Wait for FLR to complete during probe (git-fixes).
- bnxt_en: refactor reset close code (git-fixes).
- can: c_can: c_can_handle_bus_err(): update statistics if skb allocation fails (git-fixes).
- can: c_can: fix {rx,tx}_errors statistics (git-fixes).
- can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes).
- can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes).
- can: j1939: j1939_session_new(): fix skb reference counting (git-fixes).
- can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes).
- can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL (git-fixes).
- can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes).
- cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108).
- chtls: fix tp-&gt;rcv_tstamp initialization (git-fixes).
- comedi: Flush partial mappings in error case (git-fixes).
- crypto: bcm - add error check in the ahash_hmac_init function (git-fixes).
- crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes).
- crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes).
- crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git-fixes).
- crypto: cavium - Fix the if condition to exit loop after timeout (git-fixes).
- crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init() (git-fixes).
- crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes).
- cxgb4: Properly lock TX queue for the selftest (git-fixes).
- cxgb4: add forgotten u64 ivlan cast before shift (git-fixes).
- cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git-fixes).
- drivers: net: prevent tun_build_skb() to exceed the packet size limit (git-fixes).
- drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes).
- drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable-fixes).
- drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable-fixes).
- drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git-fixes).
- drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes).
- drm/bridge: tc358767: Fix link properties discovery (git-fixes).
- drm/bridge: tc358768: Fix DSI command tx (git-fixes).
- drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git-fixes).
- drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git-fixes).
- drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk() (git-fixes).
- drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes).
- drm/omap: Fix possible NULL dereference (git-fixes).
- drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes).
- drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes).
- drm/sti: avoid potential dereference of error pointers (git-fixes).
- drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check (git-fixes).
- drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check (git-fixes).
- drm/v3d: Address race-condition in MMU flush (git-fixes).
- drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA (stable-fixes).
- drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).
- drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git-fixes).
- drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git-fixes).
- drm/vmwgfx: Limit display layout ioctl array size to VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).
- e1000e: Fix S0ix residency on corporate systems (git-fixes).
- efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465).
- eth: bnxt: fix counting packets discarded due to OOM and netpoll (git-fixes).
- firmware: google: Unregister driver_info on failure (git-fixes).
- genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes).
- goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes).
- gve: Fix XDP TX completion handling when counters overflow (git-fixes).
- gve: Fix an edge case for TSO skb validity check (git-fixes).
- gve: Fix skb truesize underestimation (git-fixes).
- gve: ignore nonrelevant GSO type bits when processing TSO headers (git-fixes).
- hid: core: zero-initialize the report buffer (git-fixes).
- hid: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable-fixes).
- hid: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable-fixes).
- hid: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad (stable-fixes).
- hid: multitouch: Add support for B2402FVA track point (stable-fixes).
- hid: wacom: Defer calculation of resolution until resolution_code is known (git-fixes).
- hid: wacom: Interpret tilt data from Intuos Pro BT as signed values (git-fixes).
- hid: wacom: fix when get product name maybe null pointer (git-fixes).
- hv_sock: Initializing vsk-&gt;trans to NULL to prevent a dangling pointer (git-fixes).
- hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes).
- i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git-fixes).
- i40e: Fix XDP program unloading while removing the driver (git-fixes).
- i40e: Fix filter input checks to prevent config with invalid values (git-fixes).
- i40e: Fix waiting for queues of all VSIs to be disabled (git-fixes).
- i40e: Report MFS in decimal base instead of hex (git-fixes).
- i40e: Restore VF MSI-X state during PCI reset (git-fixes).
- i40e: avoid double calling i40e_pf_rxq_wait() (git-fixes).
- i40e: disable NAPI right after disabling irqs when handling xsk_pool (git-fixes).
- i40e: fix use-after-free in i40e_aqc_add_filters() (git-fixes).
- i40e: take into account XDP Tx queues when stopping rings (git-fixes).
- iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes).
- iavf: Fix TC config comparison with existing adapter TC config (git-fixes).
- iavf: Fix promiscuous mode configuration flow messages (git-fixes).
- iavf: Introduce new state machines for flow director (git-fixes).
- iavf: do not process adminq tasks when __IAVF_IN_REMOVE_TASK is set (git-fixes).
- iavf: fix FDIR rule fields masks validation (git-fixes).
- iavf: in iavf_down, disable queues when removing the driver (git-fixes).
- iavf: initialize waitqueues before starting watchdog_task (git-fixes).
- iavf: send VLAN offloading caps once after VFR (git-fixes).
- iavf: validate tx_coalesce_usecs even if rx_coalesce_usecs is zero (git-fixes).
- ibmvnic: Do partial reset on login failure (bsc#1233150).
- ibmvnic: Enforce stronger sanity checks on login response (bsc#1233150).
- ibmvnic: Ensure login failure recovery is safe from other resets (bsc#1233150).
- ibmvnic: Handle DMA unmapping of login buffs in release functions (bsc#1233150).
- ibmvnic: Unmap DMA login rsp buffer on send login fail (bsc#1233150).
- ice: Block switchdev mode when ADQ is active and vice versa (git-fixes).
- ice: Fix NULL pointer deref during VF reset (git-fixes).
- ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes).
- ice: Fix link_down_on_close message (git-fixes).
- ice: Fix netif_is_ice() in Safe Mode (git-fixes).
- ice: Interpret .set_channels() input differently (git-fixes).
- ice: Shut down VSI with 'link-down-on-close' enabled (git-fixes).
- ice: avoid executing commands on other ports when driving sync (git-fixes).
- ice: change q_index variable type to s16 to store -1 value (git-fixes).
- ice: fix ICE_LAST_OFFSET formula (git-fixes).
- ice: fix VLAN replay after reset (git-fixes).
- ice: fix accounting for filters shared by multiple VSIs (git-fixes).
- ice: fix accounting if a VLAN already exists (git-fixes).
- ice: fix over-shifted variable (git-fixes).
- ice: fix receive buffer size miscalculation (git-fixes).
- ice: ice_aq_check_events: fix off-by-one check when filling buffer (git-fixes).
- ice: reset first in crash dump kernels (git-fixes).
- ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes).
- ice: tc: allow zero flags in parsing tc flower (git-fixes).
- ice: virtchnl: stop pretending to support RSS over AQ or registers (git-fixes).
- idpf: Interpret .set_channels() input differently (git-fixes).
- idpf: avoid compiler introduced padding in virtchnl2_rss_key struct (git-fixes).
- idpf: avoid compiler padding in virtchnl2_ptype struct (git-fixes).
- idpf: disable local BH when scheduling napi for marker packets (git-fixes).
- idpf: distinguish vports by the dev_port attribute (git-fixes).
- idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git-fixes).
- idpf: fix UAFs when destroying the queues (git-fixes).
- idpf: fix corrupted frames and skb leaks in singleq mode (git-fixes).
- idpf: fix memleak in vport interrupt configuration (git-fixes).
- idpf: fix memory leaks and crashes while performing a soft reset (git-fixes).
- igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes).
- igb: Fix missing time sync events (git-fixes).
- igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes).
- igb: extend PTP timestamp adjustments to i211 (git-fixes).
- igc: Check VLAN EtherType mask (git-fixes).
- igc: Check VLAN TCI mask (git-fixes).
- igc: Fix hicredit calculation (git-fixes).
- igc: Fix missing time sync events (git-fixes).
- igc: Remove temporary workaround (git-fixes).
- igc: Report VLAN EtherType matching back to user (git-fixes).
- igc: Unlock on error in igc_io_resume() (git-fixes).
- iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git-fixes).
- iio: adc: ad7606: Fix typo in the driver name (git-fixes).
- iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes).
- iio: light: al3010: Fix an error handling path in al3010_probe() (git-fixes).
- iio: light: veml6030: fix microlux value calculation (git-fixes).
- initramfs: avoid filename buffer overrun (bsc#1232436).
- input: i8042 - add Ayaneo Kun to i8042 quirk table (git-fixes).
- input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table (git-fixes).
- input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table (git-fixes).
- input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (git-fixes).
- input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line (git-fixes).
- irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes).
- irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git-fixes).
- ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() (git-fixes).
- ixgbe: fix crash with empty VF macvlan list (git-fixes).
- ixgbe: fix timestamp configuration code (git-fixes).
- ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able (git-fixes).
- kABI: Restore exported __arm_smccc_sve_check (git-fixes)
- kernel-binary: Enable livepatch package only when livepatch is enabled Otherwise the filelist may be empty failing the build (bsc#1218644).
- kernel.h: split out COUNT_ARGS() and CONCATENATE() to args.h (git-fixes)
- kexec: fix a memory leak in crash_shrink_memory() (git-fixes).
- kvm: PPC: Book3S HV: remove unused varible (bsc#1194869).
- mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes).
- media: adv7604: prevent underflow condition when reporting colorspace (git-fixes).
- media: cx24116: prevent overflows on SNR calculus (git-fixes).
- media: dvb-usb-v2: af9035: Fix null-ptr-deref in af9035_i2c_master_xfer (stable-fixes).
- media: dvb-usb-v2: af9035: fix missing unlock (git-fixes).
- media: dvb_frontend: do not play tricks with underflow values (git-fixes).
- media: dvbdev: prevent the risk of out of memory access (git-fixes).
- media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes).
- media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes).
- media: stb0899_algo: initialize cfr before using it (git-fixes).
- media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes).
- media: v4l2-tpg: prevent the risk of a division by zero (git-fixes).
- mei: use kvmalloc for read buffer (git-fixes).
- misc: apds990x: Fix missing pm_runtime_disable() (git-fixes).
- mm/hugetlb: fix nodes huge page allocation when there are surplus pages (bsc#1234012).
- mm/memory: add non-anonymous page check in the copy_present_page() (bsc#1231646).
- modpost: remove incorrect code in do_eisa_entry() (git-fixes).
- net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git-fixes).
- net/mlx5: Added cond_resched() to crdump collection (git-fixes).
- net/mlx5: Allow 0 for total host VFs (git-fixes).
- net/mlx5: Correctly compare pkt reformat ids (git-fixes).
- net/mlx5: DR, Can't go to uplink vport on RX rule (git-fixes).
- net/mlx5: DR, Use the right GVMI number for drop action (git-fixes).
- net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx (git-fixes).
- net/mlx5: Drain health before unregistering devlink (git-fixes).
- net/mlx5: E-switch, register event handler before arming the event (git-fixes).
- net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes).
- net/mlx5: Fix fw tracer first block check (git-fixes).
- net/mlx5: Handle fw tracer change ownership event based on MTRC (git-fixes).
- net/mlx5: LAG, Check correct bucket when modifying LAG (git-fixes).
- net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes).
- net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes).
- net/mlx5: Lag, restore buckets number to default after hash LAG deactivation (git-fixes).
- net/mlx5: Skip clock update work when device is in error state (git-fixes).
- net/mlx5: Unregister notifier on eswitch init failure (git-fixes).
- net/mlx5: Update the list of the PCI supported devices (git-fixes).
- net/mlx5: Use RMW accessors for changing LNKCTL (git-fixes).
- net/mlx5: Use mlx5 device constant for selecting CQ period mode for ASO (git-fixes).
- net/mlx5: Use recovery timeout on sync reset flow (git-fixes).
- net/mlx5: fix potential memory leak in mlx5e_init_rep_rx (git-fixes).
- net/mlx5: fs, lock FTE when checking if active (git-fixes).
- net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys (git-fixes).
- net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes).
- net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git-fixes).
- net/mlx5e: Again mutually exclude RX-FCS and RX-port-timestamp (git-fixes).
- net/mlx5e: Allow software parsing when IPsec crypto is enabled (git-fixes).
- net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes).
- net/mlx5e: Change the warning when ignore_flow_level is not supported (git-fixes).
- net/mlx5e: Check return value of snprintf writing to fw_version buffer (git-fixes).
- net/mlx5e: Check return value of snprintf writing to fw_version buffer for representors (git-fixes).
- net/mlx5e: Correct snprintf truncation handling for fw_version buffer (git-fixes).
- net/mlx5e: Correct snprintf truncation handling for fw_version buffer used by representors (git-fixes).
- net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes).
- net/mlx5e: Do not offload internal port if filter device is out device (git-fixes).
- net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes).
- net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes).
- net/mlx5e: Fix crash moving to switchdev mode when ntuple offload is set (git-fixes).
- net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN) packets (git-fixes).
- net/mlx5e: Fix pedit endianness (git-fixes).
- net/mlx5e: Fix possible deadlock on mlx5e_tx_timeout_work (git-fixes).
- net/mlx5e: Fix slab-out-of-bounds in mlx5_query_nic_vport_mac_list() (git-fixes).
- net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes).
- net/mlx5e: Move representor neigh cleanup to profile cleanup_tx (git-fixes).
- net/mlx5e: Reduce the size of icosq_str (git-fixes).
- net/mlx5e: Take state lock during tx timeout reporter (git-fixes).
- net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer exhaustion (git-fixes).
- net/mlx5e: fix a potential double-free in fs_udp_create_groups (git-fixes).
- net/mlx5e: fix double free in macsec_fs_tx_create_crypto_table_groups (git-fixes).
- net/mlx5e: fix double free of encap_header (git-fixes).
- net/mlx5e: fix return value check in mlx5e_ipsec_remove_trailer() (git-fixes).
- net/mlx5e: kTLS, Fix incorrect page refcounting (git-fixes).
- net: ena: Fix potential sign extension issue (git-fixes).
- net: ena: Remove ena_select_queue (git-fixes).
- net: ena: Wrong missing IO completions check order (git-fixes).
- net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes).
- net: relax socket state check at accept time (git-fixes).
- net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device (git-fixes).
- net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL configuration (git-fixes).
- net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes).
- net: usb: usbnet: fix race in probe failure (git-fixes).
- nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes).
- nvme-fabrics: fix kernel crash while shutting down controller (git-fixes).
- nvme-pci: fix freeing of the HMB descriptor table (git-fixes).
- nvme-pci: reverse request order in nvme_queue_rqs (git-fixes).
- ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (git-fixes).
- pci: Add T_PVPERL macro (git-fixes).
- pci: Fix reset_method_store() memory leak (git-fixes).
- pci: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf() (git-fixes).
- pci: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds (git-fixes).
- pci: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes).
- pci: keystone: Set mode as Root Complex for 'ti,keystone-pcie' compatible (git-fixes).
- pci: rockchip-ep: Fix address translation unit programming (git-fixes).
- phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes).
- platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git-fixes).
- platform/surface: aggregator: Fix warning when controller is destroyed in probe (git-fixes).
- platform/x86: dell-sysman: add support for alienware products (stable-fixes).
- platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes).
- posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098). 
- power: supply: bq27xxx: Fix registers of bq27426 (git-fixes).
- power: supply: core: Remove might_sleep() from power_supply_put() (git-fixes).
- powerpc/asm: Remove UPD_CONSTR after GCC 4.9 removal (bsc#1194869).
- powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869).
- powerpc/kexec: Fix return of uninitialized variable (bsc#1194869).
- powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869).
- powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).
- powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL (bsc#1194869).
- powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869).
- powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector (bsc#1194869).
- powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869).
- powerpc: remove GCC version check for UPD_CONSTR (bsc#1194869).
- qed: avoid truncating work queue length (git-fixes).
- rdma/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes)
- rdma/hns: Add clear_hem return value to log (git-fixes)
- rdma/hns: Add mutex_destroy() (git-fixes)
- rdma/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes)
- rdma/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci (git-fixes)
- rdma/hns: Fix cpu stuck caused by printings during reset (git-fixes)
- rdma/hns: Fix different dgids mapping to the same dip_idx (git-fixes)
- rdma/hns: Fix flush cqe error when racing with destroy qp (git-fixes)
- rdma/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes)
- rdma/hns: Remove unnecessary QP type checks (git-fixes)
- rdma/hns: Use dev_* printings in hem code instead of ibdev_* (git-fixes)
- rdma/hns: Use macro instead of magic number (git-fixes)
- rdma/mlx5: Move events notifier registration to be after device registration (git-fixes)
- rdma/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git-fixes).
- rdma/rxe: Fix the qp flush warnings in req (git-fixes)
- rdma/rxe: Set queue pair cur_qp_state when being queried (git-fixes)
- rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644)
- rtc: ab-eoz9: do not fail temperature reads on undervoltage notification (git-fixes).
- rtc: abx80x: Fix WDT bit position of the status register (git-fixes).
- rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git-fixes).
- rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241).
- scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths (bsc#1233241).
- scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241).
- scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up FDMI (bsc#1233241).
- scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs (bsc#1233241).
- scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241).
- scsi: lpfc: Modify CGN warning signal calculation based on EDC response (bsc#1233241).
- scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback (bsc#1233241).
- scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241).
- scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241).
- scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG flag (bsc#1233241).
- scsi: scsi_transport_fc: Allow setting rport state to current state (git-fixes).
- scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes).
- security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes).
- serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).
- sfc: Check firmware supports Ethernet PTP filter (git-fixes).
- sfc: do not unregister flow_indr if it was never registered (git-fixes).
- sfc: fix a double-free bug in efx_probe_filters (git-fixes).
- signal: Replace BUG_ON()s (bsc#1234093).
- spi: Fix acpi deferred irq probe (git-fixes).
- spi: atmel-quadspi: Fix register name in verbose logging function (git-fixes).
- staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg() (git-fixes).
- thermal: core: Initialize thermal zones before registering them (git-fixes).
- thermal: intel: int340x: processor: Fix warning during module unload (git-fixes).
- tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes).
- tun: Fix xdp_rxq_info's queue_index when detaching (git-fixes).
- tun: prevent negative ifindex (git-fixes).
- ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460).
- usb: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes).
- usb: chaoskey: fail open after removal (git-fixes).
- usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing logic (git-fixes).
- usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes).
- usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes).
- usb: ehci-spear: fix call balance of sehci clk handling routines (git-fixes).
- usb: musb: sunxi: Fix accessing an released usb phy (git-fixes).
- usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes).
- usb: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git-fixes).
- usb: serial: io_edgeport: fix use after free in debug printk (git-fixes).
- usb: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes).
- usb: serial: option: add Quectel RG650V (stable-fixes).
- usb: serial: qcserial: add support for Sierra Wireless EM86xx (stable-fixes).
- usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() (git-fixes).
- usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes() (git-fixes).
- usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read() (git-fixes).
- usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes).
- usb: yurex: make waiting on yurex_write interruptible (git-fixes).
- usbip: tools: Fix detach_port() invalid port error path (git-fixes).
- vdpa/mlx5: preserve CVQ vringh index (git-fixes).
- watchdog: mediatek: Make sure system reset gets asserted in mtk_wdt_restart() (git-fixes).
- watchdog: rti: of: honor timeout-sec property (git-fixes).
- wifi: ath10k: Fix memory leak in management tx (git-fixes).
- wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1 (git-fixes).
- wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2 (git-fixes).
- wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes).
- wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (git-fixes).
- wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes).
- wifi: iwlegacy: Clear stale interrupts before resuming device (stable-fixes).
- wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() (git-fixes).
- wifi: iwlwifi: mvm: disconnect station vifs if recovery failed (stable-fixes).
- wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower (git-fixes).
- wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes).
- wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (git-fixes).
- wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- x86/kvm: fix is_stale_page_fault() (bsc#1221333).
- xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes).
- xhci: Separate PORT and CAPs macros into dedicated file (stable-fixes).
- xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-13"/>
	<updated date="2024-12-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082555">SUSE bug 1082555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218644">SUSE bug 1218644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220382">SUSE bug 1220382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221309">SUSE bug 1221309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221333">SUSE bug 1221333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222364">SUSE bug 1222364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222590">SUSE bug 1222590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223202">SUSE bug 1223202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223656">SUSE bug 1223656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223848">SUSE bug 1223848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223919">SUSE bug 1223919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223942">SUSE bug 1223942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224518">SUSE bug 1224518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224526">SUSE bug 1224526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224574">SUSE bug 1224574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225725">SUSE bug 1225725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225730">SUSE bug 1225730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225742">SUSE bug 1225742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225764">SUSE bug 1225764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225812">SUSE bug 1225812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226560">SUSE bug 1226560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226592">SUSE bug 1226592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226631">SUSE bug 1226631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226748">SUSE bug 1226748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226872">SUSE bug 1226872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227853">SUSE bug 1227853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228410">SUSE bug 1228410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228430">SUSE bug 1228430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228486">SUSE bug 1228486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228650">SUSE bug 1228650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228857">SUSE bug 1228857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229312">SUSE bug 1229312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229429">SUSE bug 1229429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229585">SUSE bug 1229585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229752">SUSE bug 1229752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229808">SUSE bug 1229808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230055">SUSE bug 1230055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230220">SUSE bug 1230220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230231">SUSE bug 1230231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230270">SUSE bug 1230270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230558">SUSE bug 1230558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230827">SUSE bug 1230827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230918">SUSE bug 1230918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231083">SUSE bug 1231083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231089">SUSE bug 1231089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231098">SUSE bug 1231098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231101">SUSE bug 1231101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231108">SUSE bug 1231108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231111">SUSE bug 1231111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231132">SUSE bug 1231132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231135">SUSE bug 1231135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231138">SUSE bug 1231138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231169">SUSE bug 1231169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231178">SUSE bug 1231178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231180">SUSE bug 1231180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231181">SUSE bug 1231181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231187">SUSE bug 1231187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231202">SUSE bug 1231202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231434">SUSE bug 1231434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231441">SUSE bug 1231441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231452">SUSE bug 1231452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231465">SUSE bug 1231465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231474">SUSE bug 1231474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231481">SUSE bug 1231481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231537">SUSE bug 1231537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231541">SUSE bug 1231541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231646">SUSE bug 1231646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231849">SUSE bug 1231849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231856">SUSE bug 1231856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231858">SUSE bug 1231858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231859">SUSE bug 1231859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231864">SUSE bug 1231864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231904">SUSE bug 1231904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231916">SUSE bug 1231916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231920">SUSE bug 1231920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231923">SUSE bug 1231923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231930">SUSE bug 1231930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231931">SUSE bug 1231931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231947">SUSE bug 1231947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231952">SUSE bug 1231952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231953">SUSE bug 1231953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231959">SUSE bug 1231959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231978">SUSE bug 1231978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232013">SUSE bug 1232013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232015">SUSE bug 1232015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232016">SUSE bug 1232016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232017">SUSE bug 1232017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232027">SUSE bug 1232027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232028">SUSE bug 1232028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232047">SUSE bug 1232047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232048">SUSE bug 1232048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232050">SUSE bug 1232050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232056">SUSE bug 1232056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232076">SUSE bug 1232076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232080">SUSE bug 1232080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232094">SUSE bug 1232094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232096">SUSE bug 1232096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232098">SUSE bug 1232098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232111">SUSE bug 1232111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232126">SUSE bug 1232126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232134">SUSE bug 1232134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232135">SUSE bug 1232135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232141">SUSE bug 1232141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232142">SUSE bug 1232142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232147">SUSE bug 1232147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232152">SUSE bug 1232152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232159">SUSE bug 1232159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232162">SUSE bug 1232162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232165">SUSE bug 1232165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232180">SUSE bug 1232180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232185">SUSE bug 1232185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232187">SUSE bug 1232187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232189">SUSE bug 1232189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232195">SUSE bug 1232195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232198">SUSE bug 1232198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232201">SUSE bug 1232201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232218">SUSE bug 1232218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232224">SUSE bug 1232224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232232">SUSE bug 1232232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232254">SUSE bug 1232254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232255">SUSE bug 1232255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232264">SUSE bug 1232264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232272">SUSE bug 1232272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232279">SUSE bug 1232279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232287">SUSE bug 1232287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232293">SUSE bug 1232293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232312">SUSE bug 1232312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232317">SUSE bug 1232317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232318">SUSE bug 1232318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232333">SUSE bug 1232333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232334">SUSE bug 1232334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232335">SUSE bug 1232335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232339">SUSE bug 1232339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232349">SUSE bug 1232349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232357">SUSE bug 1232357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232359">SUSE bug 1232359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232362">SUSE bug 1232362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232364">SUSE bug 1232364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232370">SUSE bug 1232370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232371">SUSE bug 1232371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232378">SUSE bug 1232378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232385">SUSE bug 1232385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232387">SUSE bug 1232387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232394">SUSE bug 1232394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232413">SUSE bug 1232413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232416">SUSE bug 1232416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232436">SUSE bug 1232436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232483">SUSE bug 1232483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232500">SUSE bug 1232500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232503">SUSE bug 1232503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232504">SUSE bug 1232504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232507">SUSE bug 1232507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232520">SUSE bug 1232520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232552">SUSE bug 1232552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232757">SUSE bug 1232757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232819">SUSE bug 1232819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232860">SUSE bug 1232860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232870">SUSE bug 1232870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232873">SUSE bug 1232873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232877">SUSE bug 1232877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232878">SUSE bug 1232878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232881">SUSE bug 1232881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232884">SUSE bug 1232884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232885">SUSE bug 1232885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232887">SUSE bug 1232887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232888">SUSE bug 1232888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232890">SUSE bug 1232890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232892">SUSE bug 1232892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232896">SUSE bug 1232896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232897">SUSE bug 1232897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232905">SUSE bug 1232905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232907">SUSE bug 1232907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232919">SUSE bug 1232919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232926">SUSE bug 1232926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232928">SUSE bug 1232928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232935">SUSE bug 1232935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233035">SUSE bug 1233035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233049">SUSE bug 1233049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233051">SUSE bug 1233051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233056">SUSE bug 1233056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233057">SUSE bug 1233057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233061">SUSE bug 1233061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233063">SUSE bug 1233063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233065">SUSE bug 1233065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233067">SUSE bug 1233067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233070">SUSE bug 1233070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233073">SUSE bug 1233073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233074">SUSE bug 1233074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233100">SUSE bug 1233100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233103">SUSE bug 1233103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233104">SUSE bug 1233104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233105">SUSE bug 1233105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233106">SUSE bug 1233106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233107">SUSE bug 1233107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233108">SUSE bug 1233108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233110">SUSE bug 1233110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233111">SUSE bug 1233111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233113">SUSE bug 1233113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233114">SUSE bug 1233114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233117">SUSE bug 1233117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233123">SUSE bug 1233123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233125">SUSE bug 1233125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233129">SUSE bug 1233129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233130">SUSE bug 1233130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233134">SUSE bug 1233134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233135">SUSE bug 1233135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233150">SUSE bug 1233150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233189">SUSE bug 1233189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233191">SUSE bug 1233191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233197">SUSE bug 1233197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233205">SUSE bug 1233205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233206">SUSE bug 1233206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233209">SUSE bug 1233209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233210">SUSE bug 1233210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233211">SUSE bug 1233211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233212">SUSE bug 1233212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233214">SUSE bug 1233214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233216">SUSE bug 1233216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233238">SUSE bug 1233238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233241">SUSE bug 1233241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233253">SUSE bug 1233253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233255">SUSE bug 1233255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233293">SUSE bug 1233293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233350">SUSE bug 1233350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233452">SUSE bug 1233452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233453">SUSE bug 1233453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233454">SUSE bug 1233454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233456">SUSE bug 1233456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233457">SUSE bug 1233457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233458">SUSE bug 1233458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233460">SUSE bug 1233460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233462">SUSE bug 1233462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233463">SUSE bug 1233463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233468">SUSE bug 1233468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233471">SUSE bug 1233471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233476">SUSE bug 1233476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233478">SUSE bug 1233478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233479">SUSE bug 1233479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233481">SUSE bug 1233481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233484">SUSE bug 1233484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233487">SUSE bug 1233487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233490">SUSE bug 1233490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233491">SUSE bug 1233491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233528">SUSE bug 1233528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233548">SUSE bug 1233548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233552">SUSE bug 1233552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233553">SUSE bug 1233553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233554">SUSE bug 1233554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233555">SUSE bug 1233555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233557">SUSE bug 1233557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233560">SUSE bug 1233560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233561">SUSE bug 1233561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233570">SUSE bug 1233570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233577">SUSE bug 1233577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233580">SUSE bug 1233580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233977">SUSE bug 1233977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234012">SUSE bug 1234012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234025">SUSE bug 1234025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234085">SUSE bug 1234085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234093">SUSE bug 1234093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234098">SUSE bug 1234098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234108">SUSE bug 1234108</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47594/">CVE-2021-47594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47594">CVE-2021-47594 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48674/">CVE-2022-48674 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48674">CVE-2022-48674 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48979/">CVE-2022-48979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48979">CVE-2022-48979 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48982/">CVE-2022-48982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48982">CVE-2022-48982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48983/">CVE-2022-48983 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48983">CVE-2022-48983 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48989/">CVE-2022-48989 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48989">CVE-2022-48989 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48990/">CVE-2022-48990 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48990">CVE-2022-48990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52915/">CVE-2023-52915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52915">CVE-2023-52915 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52917/">CVE-2023-52917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52917">CVE-2023-52917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52918/">CVE-2023-52918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52918">CVE-2023-52918 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52921/">CVE-2023-52921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52921">CVE-2023-52921 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52922/">CVE-2023-52922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52922">CVE-2023-52922 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26782/">CVE-2024-26782 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26782">CVE-2024-26782 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26906/">CVE-2024-26906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26906">CVE-2024-26906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26953/">CVE-2024-26953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26953">CVE-2024-26953 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35888/">CVE-2024-35888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35888">CVE-2024-35888 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35937/">CVE-2024-35937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35937">CVE-2024-35937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35980/">CVE-2024-35980 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35980">CVE-2024-35980 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36484/">CVE-2024-36484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36484">CVE-2024-36484 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36883/">CVE-2024-36883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36883">CVE-2024-36883 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36886/">CVE-2024-36886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36886">CVE-2024-36886 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36905/">CVE-2024-36905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36905">CVE-2024-36905 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36953/">CVE-2024-36953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36953">CVE-2024-36953 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36954/">CVE-2024-36954 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36954">CVE-2024-36954 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38577/">CVE-2024-38577 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38577">CVE-2024-38577 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38589/">CVE-2024-38589 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38589">CVE-2024-38589 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38615/">CVE-2024-38615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38615">CVE-2024-38615 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40997/">CVE-2024-40997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40997">CVE-2024-40997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41016/">CVE-2024-41016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41016">CVE-2024-41016 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41023/">CVE-2024-41023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41023">CVE-2024-41023 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41049/">CVE-2024-41049 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41049">CVE-2024-41049 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42131/">CVE-2024-42131 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42131">CVE-2024-42131 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43817/">CVE-2024-43817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43817">CVE-2024-43817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43897/">CVE-2024-43897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43897">CVE-2024-43897 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44932/">CVE-2024-44932 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44932">CVE-2024-44932 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-44964/">CVE-2024-44964 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44964">CVE-2024-44964 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44995/">CVE-2024-44995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44995">CVE-2024-44995 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46681/">CVE-2024-46681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46681">CVE-2024-46681 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46800/">CVE-2024-46800 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46800">CVE-2024-46800 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46802/">CVE-2024-46802 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46802">CVE-2024-46802 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46804/">CVE-2024-46804 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46804">CVE-2024-46804 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46805/">CVE-2024-46805 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46805">CVE-2024-46805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46807/">CVE-2024-46807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46807">CVE-2024-46807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46810/">CVE-2024-46810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46810">CVE-2024-46810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46812/">CVE-2024-46812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46812">CVE-2024-46812 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46819/">CVE-2024-46819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46819">CVE-2024-46819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46821/">CVE-2024-46821 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46821">CVE-2024-46821 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46835/">CVE-2024-46835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46835">CVE-2024-46835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46842/">CVE-2024-46842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46842">CVE-2024-46842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46853/">CVE-2024-46853 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46853">CVE-2024-46853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46859/">CVE-2024-46859 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46859">CVE-2024-46859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46864/">CVE-2024-46864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46864">CVE-2024-46864 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46871/">CVE-2024-46871 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46871">CVE-2024-46871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47663/">CVE-2024-47663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47663">CVE-2024-47663 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47665/">CVE-2024-47665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47665">CVE-2024-47665 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47667/">CVE-2024-47667 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47667">CVE-2024-47667 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47669/">CVE-2024-47669 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47669">CVE-2024-47669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47670/">CVE-2024-47670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47670">CVE-2024-47670 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-47671/">CVE-2024-47671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47671">CVE-2024-47671 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47679/">CVE-2024-47679 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47679">CVE-2024-47679 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47682/">CVE-2024-47682 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47682">CVE-2024-47682 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47693/">CVE-2024-47693 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47693">CVE-2024-47693 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47695/">CVE-2024-47695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47695">CVE-2024-47695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47696/">CVE-2024-47696 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47696">CVE-2024-47696 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47697/">CVE-2024-47697 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47697">CVE-2024-47697 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47698/">CVE-2024-47698 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47698">CVE-2024-47698 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47699/">CVE-2024-47699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47699">CVE-2024-47699 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47701/">CVE-2024-47701 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47701">CVE-2024-47701 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47709/">CVE-2024-47709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47709">CVE-2024-47709 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47712/">CVE-2024-47712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47712">CVE-2024-47712 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47713/">CVE-2024-47713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47713">CVE-2024-47713 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47718/">CVE-2024-47718 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47718">CVE-2024-47718 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47723/">CVE-2024-47723 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47723">CVE-2024-47723 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47728/">CVE-2024-47728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47728">CVE-2024-47728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47735/">CVE-2024-47735 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47735">CVE-2024-47735 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47737/">CVE-2024-47737 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47737">CVE-2024-47737 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47742/">CVE-2024-47742 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47742">CVE-2024-47742 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47745/">CVE-2024-47745 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47745">CVE-2024-47745 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47749/">CVE-2024-47749 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47749">CVE-2024-47749 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47756/">CVE-2024-47756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47756">CVE-2024-47756 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47757/">CVE-2024-47757 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47757">CVE-2024-47757 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49850/">CVE-2024-49850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49850">CVE-2024-49850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49851/">CVE-2024-49851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49851">CVE-2024-49851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49852/">CVE-2024-49852 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49852">CVE-2024-49852 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49855/">CVE-2024-49855 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49855">CVE-2024-49855 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49861/">CVE-2024-49861 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49861">CVE-2024-49861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49863/">CVE-2024-49863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49863">CVE-2024-49863 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49868/">CVE-2024-49868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49868">CVE-2024-49868 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49870/">CVE-2024-49870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49870">CVE-2024-49870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49871/">CVE-2024-49871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49871">CVE-2024-49871 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49875/">CVE-2024-49875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49875">CVE-2024-49875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49877/">CVE-2024-49877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49877">CVE-2024-49877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49879/">CVE-2024-49879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49879">CVE-2024-49879 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49884/">CVE-2024-49884 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49884">CVE-2024-49884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49891/">CVE-2024-49891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49891">CVE-2024-49891 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49900/">CVE-2024-49900 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49900">CVE-2024-49900 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49902/">CVE-2024-49902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49902">CVE-2024-49902 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49903/">CVE-2024-49903 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49903">CVE-2024-49903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49905/">CVE-2024-49905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49905">CVE-2024-49905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49907/">CVE-2024-49907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49907">CVE-2024-49907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49908/">CVE-2024-49908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49908">CVE-2024-49908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49921/">CVE-2024-49921 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49921">CVE-2024-49921 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49924/">CVE-2024-49924 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49924">CVE-2024-49924 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49925/">CVE-2024-49925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49925">CVE-2024-49925 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49934/">CVE-2024-49934 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49934">CVE-2024-49934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49935/">CVE-2024-49935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49935">CVE-2024-49935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49938/">CVE-2024-49938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49938">CVE-2024-49938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49945/">CVE-2024-49945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49945">CVE-2024-49945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49947/">CVE-2024-49947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49947">CVE-2024-49947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49950/">CVE-2024-49950 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49950">CVE-2024-49950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49957/">CVE-2024-49957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49957">CVE-2024-49957 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49963/">CVE-2024-49963 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49963">CVE-2024-49963 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49965/">CVE-2024-49965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49965">CVE-2024-49965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49966/">CVE-2024-49966 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49966">CVE-2024-49966 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49968/">CVE-2024-49968 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49968">CVE-2024-49968 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49981/">CVE-2024-49981 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49981">CVE-2024-49981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49983/">CVE-2024-49983 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49983">CVE-2024-49983 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49985/">CVE-2024-49985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49985">CVE-2024-49985 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49989/">CVE-2024-49989 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49989">CVE-2024-49989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50003/">CVE-2024-50003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50003">CVE-2024-50003 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50007/">CVE-2024-50007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50007">CVE-2024-50007 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50008/">CVE-2024-50008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50008">CVE-2024-50008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50009/">CVE-2024-50009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50009">CVE-2024-50009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50013/">CVE-2024-50013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50013">CVE-2024-50013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50017/">CVE-2024-50017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50017">CVE-2024-50017 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50025/">CVE-2024-50025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50025">CVE-2024-50025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50026/">CVE-2024-50026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50026">CVE-2024-50026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50031/">CVE-2024-50031 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50031">CVE-2024-50031 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50044/">CVE-2024-50044 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50044">CVE-2024-50044 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50062/">CVE-2024-50062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50062">CVE-2024-50062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50067/">CVE-2024-50067 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50067">CVE-2024-50067 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50073/">CVE-2024-50073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50073">CVE-2024-50073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50074/">CVE-2024-50074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50074">CVE-2024-50074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50077/">CVE-2024-50077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50077">CVE-2024-50077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50078/">CVE-2024-50078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50078">CVE-2024-50078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50082/">CVE-2024-50082 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50082">CVE-2024-50082 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50089/">CVE-2024-50089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50089">CVE-2024-50089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50093/">CVE-2024-50093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50093">CVE-2024-50093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50095/">CVE-2024-50095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50095">CVE-2024-50095 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50096/">CVE-2024-50096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50096">CVE-2024-50096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50098/">CVE-2024-50098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50098">CVE-2024-50098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50099/">CVE-2024-50099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50099">CVE-2024-50099 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50103/">CVE-2024-50103 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50103">CVE-2024-50103 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50108/">CVE-2024-50108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50108">CVE-2024-50108 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50110/">CVE-2024-50110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50110">CVE-2024-50110 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H" cvss4="4.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-50115/">CVE-2024-50115 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50115">CVE-2024-50115 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50116/">CVE-2024-50116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50116">CVE-2024-50116 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50117/">CVE-2024-50117 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50117">CVE-2024-50117 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50124/">CVE-2024-50124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50124">CVE-2024-50124 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50125/">CVE-2024-50125 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50125">CVE-2024-50125 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50127/">CVE-2024-50127 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50127">CVE-2024-50127 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50128/">CVE-2024-50128 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50128">CVE-2024-50128 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50131/">CVE-2024-50131 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50131">CVE-2024-50131 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50134/">CVE-2024-50134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50134">CVE-2024-50134 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50135/">CVE-2024-50135 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50135">CVE-2024-50135 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50138/">CVE-2024-50138 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50138">CVE-2024-50138 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50141/">CVE-2024-50141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50141">CVE-2024-50141 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50146/">CVE-2024-50146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50146">CVE-2024-50146 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50147/">CVE-2024-50147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50147">CVE-2024-50147 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50148/">CVE-2024-50148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50148">CVE-2024-50148 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50150/">CVE-2024-50150 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50150">CVE-2024-50150 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50153/">CVE-2024-50153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50153">CVE-2024-50153 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50154/">CVE-2024-50154 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50154">CVE-2024-50154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50155/">CVE-2024-50155 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50155">CVE-2024-50155 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50156/">CVE-2024-50156 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50156">CVE-2024-50156 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50160/">CVE-2024-50160 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50160">CVE-2024-50160 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50167/">CVE-2024-50167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50167">CVE-2024-50167 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50171/">CVE-2024-50171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50171">CVE-2024-50171 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50179/">CVE-2024-50179 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50179">CVE-2024-50179 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50180/">CVE-2024-50180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50180">CVE-2024-50180 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50182/">CVE-2024-50182 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50182">CVE-2024-50182 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50183/">CVE-2024-50183 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50183">CVE-2024-50183 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50184/">CVE-2024-50184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50184">CVE-2024-50184 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50186/">CVE-2024-50186 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50186">CVE-2024-50186 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50187/">CVE-2024-50187 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50187">CVE-2024-50187 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50188/">CVE-2024-50188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50188">CVE-2024-50188 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50189/">CVE-2024-50189 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50189">CVE-2024-50189 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50192/">CVE-2024-50192 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50192">CVE-2024-50192 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50194/">CVE-2024-50194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50194">CVE-2024-50194 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50195/">CVE-2024-50195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50195">CVE-2024-50195 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50196/">CVE-2024-50196 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50196">CVE-2024-50196 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50198/">CVE-2024-50198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50198">CVE-2024-50198 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50201/">CVE-2024-50201 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50201">CVE-2024-50201 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50205/">CVE-2024-50205 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50205">CVE-2024-50205 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50208/">CVE-2024-50208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50208">CVE-2024-50208 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50209/">CVE-2024-50209 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50209">CVE-2024-50209 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50215/">CVE-2024-50215 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50215">CVE-2024-50215 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50218/">CVE-2024-50218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50218">CVE-2024-50218 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50229/">CVE-2024-50229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50229">CVE-2024-50229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50230/">CVE-2024-50230 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50230">CVE-2024-50230 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50232/">CVE-2024-50232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50232">CVE-2024-50232 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50233/">CVE-2024-50233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50233">CVE-2024-50233 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50234/">CVE-2024-50234 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50234">CVE-2024-50234 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50236/">CVE-2024-50236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50236">CVE-2024-50236 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50237/">CVE-2024-50237 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50237">CVE-2024-50237 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50249/">CVE-2024-50249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50249">CVE-2024-50249 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50255/">CVE-2024-50255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50255">CVE-2024-50255 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50259/">CVE-2024-50259 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50259">CVE-2024-50259 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50261/">CVE-2024-50261 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50261">CVE-2024-50261 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50264/">CVE-2024-50264 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50264">CVE-2024-50264 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-50265/">CVE-2024-50265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50265">CVE-2024-50265 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50267/">CVE-2024-50267 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50267">CVE-2024-50267 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50268/">CVE-2024-50268 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50268">CVE-2024-50268 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50269/">CVE-2024-50269 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50269">CVE-2024-50269 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50271/">CVE-2024-50271 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50271">CVE-2024-50271 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50273/">CVE-2024-50273 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50273">CVE-2024-50273 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50274/">CVE-2024-50274 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50274">CVE-2024-50274 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50279/">CVE-2024-50279 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50279">CVE-2024-50279 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50282/">CVE-2024-50282 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50282">CVE-2024-50282 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50287/">CVE-2024-50287 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50287">CVE-2024-50287 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-50289/">CVE-2024-50289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50289">CVE-2024-50289 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50290/">CVE-2024-50290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50290">CVE-2024-50290 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50292/">CVE-2024-50292 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50292">CVE-2024-50292 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50295/">CVE-2024-50295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50295">CVE-2024-50295 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50298/">CVE-2024-50298 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50298">CVE-2024-50298 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50301/">CVE-2024-50301 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50301">CVE-2024-50301 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50302/">CVE-2024-50302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50302">CVE-2024-50302 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-53052/">CVE-2024-53052 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53052">CVE-2024-53052 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53058/">CVE-2024-53058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53058">CVE-2024-53058 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53059/">CVE-2024-53059 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53059">CVE-2024-53059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53060/">CVE-2024-53060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53060">CVE-2024-53060 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53061/">CVE-2024-53061 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53061">CVE-2024-53061 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53063/">CVE-2024-53063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53063">CVE-2024-53063 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53066/">CVE-2024-53066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53066">CVE-2024-53066 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53068/">CVE-2024-53068 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53068">CVE-2024-53068 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-53079/">CVE-2024-53079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53079">CVE-2024-53079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53085/">CVE-2024-53085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53085">CVE-2024-53085 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53088/">CVE-2024-53088 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53088">CVE-2024-53088 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53104/">CVE-2024-53104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53104">CVE-2024-53104 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53110/">CVE-2024-53110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53110">CVE-2024-53110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009957796" comment="cluster-md-kmp-rt-5.14.21-150500.13.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957797" comment="dlm-kmp-rt-5.14.21-150500.13.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957798" comment="gfs2-kmp-rt-5.14.21-150500.13.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957799" comment="kernel-devel-rt-5.14.21-150500.13.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957800" comment="kernel-rt-5.14.21-150500.13.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957801" comment="kernel-rt-devel-5.14.21-150500.13.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957802" comment="kernel-rt-extra-5.14.21-150500.13.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957803" comment="kernel-rt-livepatch-5.14.21-150500.13.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957804" comment="kernel-rt-livepatch-devel-5.14.21-150500.13.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957805" comment="kernel-rt-optional-5.14.21-150500.13.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957806" comment="kernel-rt-vdso-5.14.21-150500.13.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957807" comment="kernel-rt_debug-5.14.21-150500.13.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957808" comment="kernel-rt_debug-devel-5.14.21-150500.13.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957809" comment="kernel-rt_debug-vdso-5.14.21-150500.13.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957810" comment="kernel-source-rt-5.14.21-150500.13.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957811" comment="kernel-syms-rt-5.14.21-150500.13.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957812" comment="kselftests-kmp-rt-5.14.21-150500.13.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957813" comment="ocfs2-kmp-rt-5.14.21-150500.13.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009957814" comment="reiserfs-kmp-rt-5.14.21-150500.13.79.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5137" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1234326" ref_url="https://bugzilla.suse.com/1234326" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2024:4324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020009.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 128.5.1 ESR (bsc#1234326):
- Fixed an issue that prevented some websites from
  loading when using SSL Inspection. (bmo#1933747)
  		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-16"/>
	<updated date="2024-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1234326">SUSE bug 1234326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958161" comment="MozillaFirefox-128.5.1-150200.152.164.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958162" comment="MozillaFirefox-branding-upstream-128.5.1-150200.152.164.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958163" comment="MozillaFirefox-devel-128.5.1-150200.152.164.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958164" comment="MozillaFirefox-translations-common-128.5.1-150200.152.164.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958165" comment="MozillaFirefox-translations-other-128.5.1-150200.152.164.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5138" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1234413" ref_url="https://bugzilla.suse.com/1234413" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-50336" ref_url="https://www.suse.com/security/cve/CVE-2024-50336/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020008.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- CVE-2024-50336: Fixed insufficient MXC URI validation which could allow client-side path traversal (bsc#1234413)

Other fixes:
- Updated to Mozilla Thunderbird 128.5.2i (bsc#1234413): 
  * fixed: Large virtual folders could be very slow 
  * fixed: Message could disappear after moving from IMAP folder
    followed by Undo and Redo 
  * fixed: XMPP chat did not display messages sent inside a CDATA
    element 
  * fixed: Selected calendar day did not move forward at midnight 
  * fixed: Today pane agenda sometimes scrolled for no apparent
    reason
  * fixed: CalDAV calendars without offline support could degrade
    start-up performance 
  * fixed: Visual and UX improvements 
  * fixed: Security fixes

- Updated to Mozilla Thunderbird 128.5.1:
  * new: Add end of year donation appeal 
  * fixed: Total message count for favorite folders did not work
    consistently 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-16"/>
	<updated date="2024-12-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1234413">SUSE bug 1234413</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-50336/">CVE-2024-50336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50336">CVE-2024-50336 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958166" comment="MozillaThunderbird-128.5.2-150200.8.194.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958167" comment="MozillaThunderbird-translations-common-128.5.2-150200.8.194.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958168" comment="MozillaThunderbird-translations-other-128.5.2-150200.8.194.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5139" version="1" class="patch">
	<metadata>
		<title>Security update for python-aiohttp (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223726" ref_url="https://bugzilla.suse.com/1223726" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-30251" ref_url="https://www.suse.com/security/cve/CVE-2024-30251/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020007.html" source="SUSE-SU"/>
		<description>
This update for python-aiohttp fixes the following issues:

  - CVE-2024-30251: Fixed infinite loop on specially crafted POST request (bsc#1223726).

		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-16"/>
	<updated date="2024-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223726">SUSE bug 1223726</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-30251/">CVE-2024-30251 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30251">CVE-2024-30251 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958169" comment="python311-aiohttp-3.9.3-150400.10.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5140" version="1" class="patch">
	<metadata>
		<title>Security update for python-aiohttp (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223726" ref_url="https://bugzilla.suse.com/1223726" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-30251" ref_url="https://www.suse.com/security/cve/CVE-2024-30251/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020006.html" source="SUSE-SU"/>
		<description>
This update for python-aiohttp fixes the following issues:

  - CVE-2024-30251: Fixed infinite loop on specially crafted POST request (bsc#1223726).

		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-16"/>
	<updated date="2024-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1223726">SUSE bug 1223726</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-30251/">CVE-2024-30251 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30251">CVE-2024-30251 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958170" comment="python-aiohttp-doc-3.6.0-150100.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958171" comment="python3-aiohttp-3.6.0-150100.3.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5141" version="1" class="patch">
	<metadata>
		<title>Security update for aws-iam-authenticator (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1200528" ref_url="https://bugzilla.suse.com/1200528" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1996" ref_url="https://www.suse.com/security/cve/CVE-2022-1996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020005.html" source="SUSE-SU"/>
		<description>
This update for aws-iam-authenticator fixes the following issues:

  - CVE-2022-1996: Fixed CORS bypass (bsc#1200528).

		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-16"/>
	<updated date="2024-12-16"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1200528">SUSE bug 1200528</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1996/">CVE-2022-1996 at SUSE</cve>
	<cve impact="critical" cvss3="9.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1996">CVE-2022-1996 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958172" comment="aws-iam-authenticator-0.5.3-150000.1.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5142" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1229238" ref_url="https://bugzilla.suse.com/1229238" source="BUGZILLA"/>
		<reference ref_id="1231373" ref_url="https://bugzilla.suse.com/1231373" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-43374" ref_url="https://www.suse.com/security/cve/CVE-2024-43374/" source="CVE"/>
		<reference ref_id="CVE-2024-47814" ref_url="https://www.suse.com/security/cve/CVE-2024-47814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020004.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

  - CVE-2024-47814: Fixed use-after-free when closing buffers in Vim (bsc#1231373)
  - CVE-2024-43374: Fixed use-after-free in alist_add() (bsc#1229238)

Other fixes:

- Updated to version 9.1.0836
  		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-16"/>
	<updated date="2024-12-16"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1229238">SUSE bug 1229238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231373">SUSE bug 1231373</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43374/">CVE-2024-43374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43374">CVE-2024-43374 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-47814/">CVE-2024-47814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47814">CVE-2024-47814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958173" comment="gvim-9.1.0836-150500.20.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958174" comment="vim-9.1.0836-150500.20.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958175" comment="vim-data-9.1.0836-150500.20.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958176" comment="vim-data-common-9.1.0836-150500.20.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958177" comment="vim-small-9.1.0836-150500.20.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5143" version="1" class="patch">
	<metadata>
		<title>Security update for libaom, libyuv (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="CVE-2023-6879" ref_url="https://www.suse.com/security/cve/CVE-2023-6879/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020010.html" source="SUSE-SU"/>
		<description>
This update for libaom, libyuv fixes the following issues:

libaom was updated to version 3.7.1:

  * Bug Fixes:

    - aomedia:3349: heap overflow when increasing resolution
    - aomedia:3478: GCC 12.2.0 emits a -Wstringop-overflow warning
      on aom/av1/encoder/motion_search_facade.c
    - aomedia:3489: Detect encoder and image high bit depth
      mismatch
    - aomedia:3491: heap-buffer-overflow on frame size change
    - b/303023614:  Segfault at encoding time for high bit depth
      images

- New upstream release 3.7.0

  - New Features

    * New codec controls:

      * AV1E_SET_QUANTIZER_ONE_PASS: Set quantizer for each frame.
      * AV1E_ENABLE_RATE_GUIDE_DELTAQ: enable the rate distribution guided delta
        quantization in all intra mode. The 'enable-rate-guide-deltaq' option is
        added for this control.
      * AV1E_SET_RATE_DISTRIBUTION_INFO: set the input file for rate
        distribution used in all intra mode. The 'rate-distribution-info' option
        is added for this control.
      * AV1E_GET_LUMA_CDEF_STRENGTH
      * AV1E_SET_BITRATE_ONE_PASS_CBR

    * AOM_SCALING_MODE is extended to include 2/3 and 1/3 scaling.
    * aom_tune_metric is extended to include AOM_TUNE_VMAF_SALIENCY_MAP.
      The 'tune' option is extended to include 'vmaf_saliency_map'.
    * SVC example encoder svc_encoder_rtc is able to use the rate control
      library.
    * Loopfilter level and CDEF filter level is supported by RTC rate control
      library.
    * New speed (--cpu-used) 11, intended for RTC screen sharing, added for
      faster encoding with ~3% bdrate loss with 16% IC (instruction count)
      speedup compared to speed 10.

  - Compression Efficiency Improvements

    * Improved VoD encoding performance

      * 0.1-0.6% BDrate gains for encoding speeds 2 to 6
      * Rate control accuracy improvement in VBR mode

    * RTC encoding improvements

      * Screen content mode: 10-19% BDrate gains for speeds 6 - 10
      * Temporal layers video mode, for speed 10:

        * 2 temporal layers on low resolutions: 13-15% BDrate gain
        * 3 temporal layers on VGA/HD: 3-4% BDrate gain

  - Perceptual Quality Improvements

    * Fixed multiple block and color artifacts for RTC screen content by

      * Incorporating color into RD cost for IDTX
      * Reducing thresholds for palette mode in non RD mode
      * Allowing more palette mode testing

    * Improved color sensitivity for altref in non-RD mode.
    * Reduced video flickering for temporal layer encoding.

  - Speedup and Memory Optimizations

    * Speed up the VoD encoder

      * 2-5% for encoding speed 2 to 4
      * 9-15% for encoding speed 5 to 6
      * ARM

        * Standard bitdepth

          * speed 5: +31%
          * speed 4: +2%
          * speed 3: +9%
          * speed 2: +157%

        * High bitdepth

          * speed 5: +85%

    * RTC speedups

      * Screen content mode

        * 15% IC speedup for speeds 6-8
        * ARM: 7% for speed 9, 3% for speed 10

      * Temporal layers video mode

        * 7% speedup for 3 temporal layers on VGA/HD, for speed 10

      * Single layer video

        * x86: 2% IC speedup for speeds 7-10
        * ARM: 2-4% speedup across speeds 5-10

  - Bug Fixes

    * aomedia:3261 Assertion failed when encoding av1 with film grain and
      '--monochrome' flag
    * aomedia:3276 ensure all allocations are checked (partial fix)
    * aomedia:3451 The libaom library calls exit()
    * aomedia:3450 enable -Wshadow for C++ sources
    * aomedia:3449 Test Seg Faults After
      b459af3e345be402db052a143fcc5383d4b74cbd
    * aomedia:3416 prune unused symbols / restrict symbol visibility
    * aomedia:3443 Jenkins failure:
      UninstantiatedParameterizedTestSuite&lt;EstimateNoiseTest&gt;
    * aomedia:3434 realtime failures with CONFIG_BITSTREAM_DEBUG=1
    * aomedia:3433 DeltaqModeTest crash w/row_mt=0
    * aomedia:3429 Encoder crash when turn on both ExternalResize and
      g_threads &gt; 2
    * aomedia:3438 Build failure with
      `-DSANITIZE=address -DBUILD_SHARED_LIBS=ON` when using clang.
    * aomedia:3435 Block artifacts when scrolling with AV1 in screen sharing
      scenarios
    * aomedia:3170 vmaf tune presets produce extreme glitches in one scene
    * aomedia:3401 Building shared libaom with MSVC results in a race condition
      with the export library
    * aomedia:3420 Floating point exception in av1_tpl_get_frame_importance()
    * aomedia:3424 heap-buffer-overflow in ScaleFilterCols_16_C() (SIGABRT)
    * aomedia:3417 examples/svc_encoder_rtc.c is using internal macros and
      functions
    * aomedia:3372 SEGV in assign_frame_buffer_p av1_common_int.h
    * aomedia:3130 'cpu-features.h' file not found on Android NDK 22
    * aomedia:3415 Encoder/decoder mismatch for svc_encoder_rtc running
      1 SL 3 TL
    * aomedia:3412 Lossless Mode Fails Loopback Bit Test
    * aomedia:3409 The use of AV1_VAR_OFFS in av1/encoder/var_based_part.c is
      incorrect for high bit depths
    * aomedia:3403 test_libaom fails with error message
      'feenableexcept() failed' on Linux arm
    * aomedia:3370 Random color block at fast motion area
    * aomedia:3393 Assertion failure in av1_convolve_2d_sr_c()
    * aomedia:3392 Strong artifacting for high bit-depth real-time
    * aomedia:3376 aomenc --threads=10 --deltaq-mode=3 crashes after
      'Allintra: multi-threading of calculating differential contrast'
    * aomedia:3380 Crashes and ASan and TSan errors in deltaq-mode=3
      multithreading code
    * chromium:1410766 heap-buffer-overflow in aom_yv12_copy_v_c
    * Cannot set level via AV1E_SET_TARGET_SEQ_LEVEL_IDX
    * Encoding failure due to the use of loop restoration with unintended use of
      lossless mode.
    * Signed integer overflow in scan_past_frames
    * Signed integer overflow in update_a_sep_sym
    * Flickering in AV1 1440p/2160p HDR transcodes
    * Fixed artifacts with screen share at encoder speed 10
    * Fixed prediction setup for IDTX

- Update to version 3.6.1:

  * aomedia:2871: Guard the support of the 7.x and 8.x levels for
    AV1 under the CONFIG_CWG_C013 config flag, and only output the
    7.x and 8.x levels when explicitly requested.
  * aomedia:3382: Choose sb_size by ppi instead of svc.
  * aomedia:3384: Fix fullpel search limits.
  * aomedia:3388: Replace left shift of xq_active by
    multiplication.
  * aomedia:3389: Fix MV clamping in av1_mv_pred.
  * aomedia:3390: set_ld_layer_depth: cap max_layer_depth to
    MAX_ARF_LAYERS.
  * aomedia:3418: Fix MV clamping in av1_int_pro_motion_estimation.
  * aomedia:3429: Move lpf thread data init to
    lpf_pipeline_mt_init().
  * b:266719111: Fix undefined behavior in Arm Neon code.
  * b:269840681: nonrd_opt: align scan tables.
  * rtc: Fix is_key_frame setting in variance partition.
  * Build: Fix build with clang-cl and Visual Studio.

- Update to version 3.6.0:

  * This release includes compression efficiency and perceptual
    quality improvements, speedup and memory optimizations, and
    some new features. This release is ABI compatible with the last
    release.

  * New Features:

    - New values 20-27 (corresponding to levels 7.0-7.3 and
      8.0-8.3) for the encoder control
      AV1E_SET_TARGET_SEQ_LEVEL_IDX (note that the proposal to add
      the new levels are still in draft status). The original
      special value 24 (keep level stats only for level monitoring)
      is renumbered as 32.
    - New encoder control AV1E_SET_SKIP_POSTPROC_FILTERING to skip
      the application of post-processing filters on reconstructed
      frame in all intra mode.
    - New encoder option 'kf-max-pyr-height': Maximum height of
      pyramid structure used for the GOP starting with a key frame
      (-1 to 5).
    - Make SVC work for screen content.
    - Rate control improvements to reduce frame-size spikes for
      screen content coding.
    - RISC-V architecture support with gcc toolchain.

  * Compression Efficiency Improvements:

    - Peak compression efficiency in VOD setting is improved by 1%.
    - 0.7% - 2.2% RTC encoding BDrate gains for real time speed 8
      to 10.
    - 15% RTC encoding BDrate gains for screen content speed 10.

  * Perceptual Quality Improvements:

    - Resolved a visual quality issue that was reported for high
      resolution clips (2K) for speed 4 and above in VOD use case.
    - Visual quality improvements to screen content coding.
    - Quality improvements to temporal layer RTC coding.

  * Speedup and Memory Optimizations:

    - RTC single-thread encoder speedup:

      . ~6% instruction count reduction for speed 5 and 6.
      . ~15% instruction count reduction for speed 7.
      . ~10% instruction count reduction for speed 8 to 10 (&gt;=360p
        resolutions).

    - RTC multi-thread encoder speedup (beyond single-thread
      speedup):

      . 5-8% encode time reduction for speed 7 to 10.

    - RTC screen-content encoder speedup:

      . 11% instruction count reduction for speed 9 and 10 (&gt;=720p
        resolutions).

    - ~5% reduction in heap memory requirements for RTC, speed 6 to
      10.

    * AVIF:

      . 4-5% speedup for speed 9 in still-picture encoding mode.
      . 3-4% heap memory reduction in still-picture encoding mode
        for 360p-720p resolutions with multiple threads.

  * Bug Fixes:

    - Added a workaround for an AV1 specification bug which makes
      TRANSLATION type global motion models unusable.
    - Fixed AddressSanitizer global-buffer-overflow errors in
      av1/encoder/arm/neon/av1_fwd_txfm2d_neon.c.
    - Fixed AddressSanitizer heap-buffer-overflow error in
      av1_wiener_convolve_add_src_neon().
    - chromium:1393384 Avoid scene detection on spatial resize.
    - aomedia:3308 Remove color artifacts under high motion.
    - aomedia:3310 Avoid out of memory failures with Visual Studio
      2017, 2019, and 2022 for Win32 x86 builds.
    - aomedia:3346 Make SVC work properly for screen content.
    - aomedia:3348 Fix a bug where an uninitialized search_site is
      used.
    - aomedia:3365 Work around what seems like a Visual Studio 2022
      compiler optimization bug.
    - aomedia:3369 Incorrect PSNR values reported by libaom for
      12-bit encode.

- Update to version 3.5.0:

  * This release is ABI compatible with the last one, including
    speedup and memory optimizations, and new APIs and features.
  * New Features

    - Support for frame parallel encode for larger number of
      threads. --fp-mt flag is available for all build
      configurations.
    - New codec control AV1E_GET_NUM_OPERATING_POINTS

  * Speedup and Memory Optimizations

    - Speed-up multithreaded encoding for good quality mode for
      larger number of threads through frame parallel encoding:

      . 30-34% encode time reduction for 1080p, 16 threads, 1x1
        tile configuration (tile_rows x tile_columns)
      . 18-28% encode time reduction for 1080p, 16 threads, 2x4
        tile configuration
      . 18-20% encode time reduction for 2160p, 32 threads, 2x4
        tile configuration
    - 16-20% speed-up for speed=6 to 8 in still-picture encoding
      mode
    - 5-6% heap memory reduction for speed=6 to 10 in real-time
      encoding mode
    - Improvements to the speed for speed=7, 8 in real-time
      encoding mode
    - Improvements to the speed for speed=9, 10 in real-time screen
      encoding mode
    - Optimizations to improve multi-thread efficiency in real-time
      encoding mode
    - 10-15% speed up for SVC with temporal layers
    - SIMD optimizations:

      . Improve av1_quantize_fp_32x32_neon() 1.05x to 1.24x faster
      . Add aom_highbd_quantize_b{,_32x32,_64x64}_adaptive_neon()
        3.15x to 5.6x faster than 'C'
      . Improve av1_quantize_fp_64x64_neon() 1.17x to 1.66x faster
      . Add aom_quantize_b_avx2() 1.4x to 1.7x faster than
        aom_quantize_b_avx()
      . Add aom_quantize_b_32x32_avx2() 1.4x to 2.3x faster than
        aom_quantize_b_32x32_avx()
      . Add aom_quantize_b_64x64_avx2() 2.0x to 2.4x faster than
        aom_quantize_b_64x64_ssse3()
      . Add aom_highbd_quantize_b_32x32_avx2() 9.0x to 10.5x faster
        than aom_highbd_quantize_b_32x32_c()
      . Add aom_highbd_quantize_b_64x64_avx2() 7.3x to 9.7x faster
        than aom_highbd_quantize_b_64x64_c()
      . Improve aom_highbd_quantize_b_avx2() 1.07x to 1.20x faster
      . Improve av1_quantize_fp_avx2() 1.13x to 1.49x faster
      . Improve av1_quantize_fp_32x32_avx2() 1.07x to 1.54x faster
      . Improve av1_quantize_fp_64x64_avx2()  1.03x to 1.25x faster
      . Improve av1_quantize_lp_avx2() 1.07x to 1.16x faster

  * Bug fixes including but not limited to

    - aomedia:3206 Assert that skip_width &gt; 0 for deconvolve
      function
    - aomedia:3278 row_mt enc: Delay top-right sync when intraBC is
      enabled
    - aomedia:3282 blend_a64_*_neon: fix bus error in armv7
    - aomedia:3283 FRAME_PARALLEL: Propagate border size to all
      cpis
    - aomedia:3283 RESIZE_MODE: Fix incorrect strides being used
      for motion search
    - aomedia:3286 rtc-svc: Fix to dynamic_enable spatial layers
    - aomedia:3289 rtc-screen: Fix to skipping inter-mode test in
      nonrd
    - aomedia:3289 rtc-screen: Fix for skip newmv on flat blocks
    - aomedia:3299 Fix build failure with CONFIG_TUNE_VMAF=1
    - aomedia:3296 Fix the conflict --enable-tx-size-search=0 with
      nonrd mode --enable-tx-size-search will be ignored in non-rd
      pick mode
    - aomedia:3304 Fix off-by-one error of max w/h in
      validate_config
    - aomedia:3306 Do not use pthread_setname_np on GNU/Hurd
    - aomedia:3325 row-multithreading produces invalid bitstream in
      some cases
    - chromium:1346938, chromium:1338114
    - compiler_flags.cmake: fix flag detection w/cmake 3.17-3.18.2
    - tools/*.py: update to python3
    - aom_configure.cmake: detect PIE and set CONFIG_PIC
    - test/simd_cmp_impl: use explicit types w/CompareSimd*
    - rtc: Fix to disable segm for aq-mode=3
    - rtc: Fix to color_sensitivity in variance partition
    - rtc-screen: Fix bsize in model rd computation for intra
      chroma
    - Fixes to ensure the correct behavior of the encoder
      algorithms (like segmentation, computation of statistics,
      etc.)

- Update to version 3.4.0:

  * This release includes compression efficiency and perceptual
    quality improvements, speedup and memory optimizations, and
    some new features. There are no ABI or API breaking changes in
    this release.

  * New Features:

    - New --dist-metric flag with 'qm-psnr' value to use
      quantization matrices in the distortion computation for RD
      search. The default value is 'psnr'.
    - New command line option '--auto-intra-tools-off=1' to make
      all-intra encoding faster for high bit rate under
      '--deltaq-mode=3' mode.
    - New rate control library aom_av1_rc for real-time hardware
      encoders. Supports CBR for both one spatial layer and SVC.
    - New image format AOM_IMG_FMT_NV12 can be used as input to the
      encoder. The presence of AOM_IMG_FMT_NV12 can be detected at
      compile time by checking if the macro AOM_HAVE_IMG_FMT_NV12
      is defined.
    - New codec controls for the encoder:

      o AV1E_SET_AUTO_INTRA_TOOLS_OFF. Only in effect if
        --deltaq-mode=3.
      o AV1E_SET_RTC_EXTERNAL_RC
      o AV1E_SET_FP_MT. Only supported if libaom is built with
        -DCONFIG_FRAME_PARALLEL_ENCODE=1.
      o AV1E_GET_TARGET_SEQ_LEVEL_IDX

    - New key-value pairs for the key-value API:

      o --auto-intra-tools-off=0 (default) or 1. Only in effect if
        --deltaq-mode=3.
      o --strict-level-conformance=0 (default) or 1
      o --fp-mt=0 (default) or 1. Only supported if libaom is built
        with -DCONFIG_FRAME_PARALLEL_ENCODE=1.
    - New aomenc options (not supported by the key-value API):

      o --nv12

  * Compression Efficiency Improvements:

    - Correctly calculate SSE for high bitdepth in skip mode, 0.2%
      to 0.6% coding gain.
    - RTC at speed 9/10: BD-rate gain of ~4/5%
    - RTC screen content coding: many improvements for real-time
      screen at speed 10 (quality, speedup, and rate control), up
      to high resolutions (1080p).
    - RTC-SVC: fixes to make intra-only frames work for spatial
      layers.
    - RTC-SVC: quality improvements for temporal layers.
    - AV1 RT: A new passive rate control strategy for screen
      content, an average of 7.5% coding gain, with some clips of
      20+%. The feature is turned off by default due to higher bit
      rate variation.

  * Perceptual Quality Improvements:

    - RTC: Visual quality improvements for high speeds (9/10)
    - Improvements in coding quality for all intra mode

  * Speedup and Memory Optimizations:

    - ~10% speedup in good quality mode encoding.
    - ~7% heap memory reduction in good quality encoding mode for
      speed 5 and 6.
    - Ongoing improvements to intra-frame encoding performance on
      Arm
    - Faster encoding speed for '--deltaq-mode=3' mode.
    - ~10% speedup for speed 5/6, ~15% speedup for speed 7/8, and
      ~10% speedup for speed 9/10 in real time encoding mode
    - ~20% heap memory reduction in still-picture encoding mode for
      360p-720p resolutions with multiple threads
    - ~13% speedup for speed 6 and ~12% speedup for speed 9 in
      still-picture encoding mode.
    - Optimizations to improve multi-thread efficiency for
      still-picture encoding mode.

  * Bug Fixes:

    - b/204460717: README.md: replace master with main
    - b/210677928: libaom disable_order is surprising for
      max_reference_frames=3
    - b/222461449: -DCONFIG_TUNE_BUTTERAUGLI=1 broken
    - b/227207606: write_greyscale writes incorrect chroma in
      highbd mode
    - b/229955363: Integer-overflow in linsolve_wiener

Update to version 3.3.0:

  * This release includes compression efficiency and perceptual
    quality improvements, speedup and memory optimizations, some
    new features, and several bug fixes.
  * New Features

    - AV1 RT: Introducing CDEF search level 5
    - Changed real time speed 4 to behave the same as real time
      speed 5
    - Add --deltaq-strength
    - rtc: Allow scene-change and overshoot detection for svc
    - rtc: Intra-only frame for svc
    - AV1 RT: Option 2 for codec control AV1E_SET_ENABLE_CDEF to
      disable CDEF on non-ref frames
    - New codec controls AV1E_SET_LOOPFILTER_CONTROL and
      AOME_GET_LOOPFILTER_LEVEL
    - Improvements to three pass encoding

  * Compression Efficiency Improvements: Overall compression gains:
    0.6%
  * Perceptual Quality Improvements

    - Improves the perceptual quality of high QP encoding for
      delta-q mode 4
    - Auto select noise synthesis level for all intra

  * Speedup and Memory Optimizations

    - Added many SSE2 optimizations.
    - Good quality 2-pass encoder speedups:

      o Speed 2: 9%
      o Speed 3: 12.5%
      o Speed 4: 8%
      o Speed 5: 3%
      o Speed 6: 4%

    - Real time mode encoder speedups:

      o Speed 5: 2.6% BDRate gain, 4% speedup
      o Speed 6: 3.5% BDRate gain, 4% speedup
      o Speed 9: 1% BDRate gain, 3% speedup
      o Speed 10: 3% BDRate gain, neutral speedup

    - All intra encoding speedups (AVIF):

      o Single thread - speed 6: 8%
      o Single thread - speed 9: 15%
      o Multi thread(8) - speed 6: 14%
      o Multi thread(8) - speed 9: 34%

  * Bug Fixes

    - Issue 3163: Segmentation fault when using
      --enable-keyframe-filtering=2
    - Issue 2436: Integer overflow in av1_warp_affine_c()
    - Issue 3226: armv7 build failure due to gcc-11
    - Issue 3195: Bug report on libaom (AddressSanitizer:
      heap-buffer-overflow)
    - Issue 3191: Bug report on libaom (AddressSanitizer: SEGV on
      unknown address)
- Drop libaom-devel Requires from libaom-devel-doc sub-package: We
  do not need the devel package to be able to read the devel
  documentation.

libyuv was added new in version 20230517+a377993.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-16"/>
	<updated date="2024-12-16"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6879/">CVE-2023-6879 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6879">CVE-2023-6879 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958178" comment="aom-tools-3.7.1-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958179" comment="libaom-devel-3.7.1-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958180" comment="libaom-devel-doc-3.7.1-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958181" comment="libaom3-3.7.1-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958182" comment="libaom3-32bit-3.7.1-150400.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958183" comment="libyuv-devel-20230517+a377993-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958184" comment="libyuv-tools-20230517+a377993-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958185" comment="libyuv0-20230517+a377993-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958186" comment="libyuv0-32bit-20230517+a377993-150400.9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5144" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233285" ref_url="https://bugzilla.suse.com/1233285" source="BUGZILLA"/>
		<reference ref_id="1233287" ref_url="https://bugzilla.suse.com/1233287" source="BUGZILLA"/>
		<reference ref_id="1233292" ref_url="https://bugzilla.suse.com/1233292" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-52530" ref_url="https://www.suse.com/security/cve/CVE-2024-52530/" source="CVE"/>
		<reference ref_id="CVE-2024-52531" ref_url="https://www.suse.com/security/cve/CVE-2024-52531/" source="CVE"/>
		<reference ref_id="CVE-2024-52532" ref_url="https://www.suse.com/security/cve/CVE-2024-52532/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020014.html" source="SUSE-SU"/>
		<description>
This update for libsoup2 fixes the following issues:

 - CVE-2024-52530: Fixed HTTP request smuggling via stripping null bytes from the ends of header names (bsc#1233285)
 - CVE-2024-52531: Fixed buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict (bsc#1233292)
 - CVE-2024-52532: Fixed infinite loop while reading websocket data (bsc#1233287)

		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-17"/>
	<updated date="2024-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1233285">SUSE bug 1233285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233287">SUSE bug 1233287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233292">SUSE bug 1233292</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52530/">CVE-2024-52530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52530">CVE-2024-52530 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52531/">CVE-2024-52531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52531">CVE-2024-52531 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52532/">CVE-2024-52532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52532">CVE-2024-52532 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958280" comment="libsoup-2_4-1-2.74.2-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958281" comment="libsoup-2_4-1-32bit-2.74.2-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958282" comment="libsoup2-devel-2.74.2-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958283" comment="libsoup2-devel-32bit-2.74.2-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958284" comment="libsoup2-lang-2.74.2-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958285" comment="typelib-1_0-Soup-2_4-2.74.2-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5145" version="1" class="patch">
	<metadata>
		<title>Security update for netpbm (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1022790" ref_url="https://bugzilla.suse.com/1022790" source="BUGZILLA"/>
		<reference ref_id="1022791" ref_url="https://bugzilla.suse.com/1022791" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5849" ref_url="https://www.suse.com/security/cve/CVE-2017-5849/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017894.html" source="SUSE-SU"/>
		<description>
This update for netpbm fixes the following issues:

- CVE-2017-5849: Fixed out-of-bound read and write issue that can occur in function putgreytile() and put1bitbwtile() (bsc#1022790, bsc#1022791).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-08"/>
	<updated date="2024-02-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022790">SUSE bug 1022790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1022791">SUSE bug 1022791</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5849/">CVE-2017-5849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-5849">CVE-2017-5849 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846019" comment="libnetpbm-devel-10.80.1-150000.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846020" comment="libnetpbm11-10.80.1-150000.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846021" comment="libnetpbm11-32bit-10.80.1-150000.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846022" comment="netpbm-10.80.1-150000.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846023" comment="netpbm-vulnerable-10.80.1-150000.3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5146" version="1" class="patch">
	<metadata>
		<title>Security update for libsoup (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233285" ref_url="https://bugzilla.suse.com/1233285" source="BUGZILLA"/>
		<reference ref_id="1233287" ref_url="https://bugzilla.suse.com/1233287" source="BUGZILLA"/>
		<reference ref_id="1233292" ref_url="https://bugzilla.suse.com/1233292" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-52530" ref_url="https://www.suse.com/security/cve/CVE-2024-52530/" source="CVE"/>
		<reference ref_id="CVE-2024-52531" ref_url="https://www.suse.com/security/cve/CVE-2024-52531/" source="CVE"/>
		<reference ref_id="CVE-2024-52532" ref_url="https://www.suse.com/security/cve/CVE-2024-52532/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020011.html" source="SUSE-SU"/>
		<description>
This update for libsoup fixes the following issues:

- CVE-2024-52530: Fixed HTTP request smuggling via stripping null bytes from the ends of header names (bsc#1233285)
- CVE-2024-52531: Fixed buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict (bsc#1233292)
- CVE-2024-52532: Fixed infinite loop while reading websocket data (bsc#1233287)

Other fixes:

- websocket-test: disconnect error copy after
  the test ends (glgo#GNOME/libsoup#391).
- fix an intermittent test failure
  (glgo#GNOME/soup#399).
- Increase test timeout on s390x. The http2-body-stream test can be
  slow and sometimes times out in our builds.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-17"/>
	<updated date="2024-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1233285">SUSE bug 1233285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233287">SUSE bug 1233287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233292">SUSE bug 1233292</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52530/">CVE-2024-52530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52530">CVE-2024-52530 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52531/">CVE-2024-52531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52531">CVE-2024-52531 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52532/">CVE-2024-52532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52532">CVE-2024-52532 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958286" comment="libsoup-3_0-0-3.0.4-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958287" comment="libsoup-3_0-0-32bit-3.0.4-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958288" comment="libsoup-devel-3.0.4-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958289" comment="libsoup-devel-32bit-3.0.4-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958290" comment="libsoup-lang-3.0.4-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958291" comment="typelib-1_0-Soup-3_0-3.0.4-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5147" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1234068" ref_url="https://bugzilla.suse.com/1234068" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-11053" ref_url="https://www.suse.com/security/cve/CVE-2024-11053/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020021.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

 - CVE-2024-11053: Fixed password leak in curl used for the first host to the followed-to host under certain circumstances (bsc#1234068)

		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-17"/>
	<updated date="2024-12-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1234068">SUSE bug 1234068</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-11053/">CVE-2024-11053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11053">CVE-2024-11053 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958292" comment="curl-8.0.1-150400.5.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958293" comment="libcurl-devel-8.0.1-150400.5.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958294" comment="libcurl-devel-32bit-8.0.1-150400.5.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958295" comment="libcurl4-8.0.1-150400.5.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958296" comment="libcurl4-32bit-8.0.1-150400.5.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5148" version="1" class="patch">
	<metadata>
		<title>Security update for docker (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217070" ref_url="https://bugzilla.suse.com/1217070" source="BUGZILLA"/>
		<reference ref_id="1228324" ref_url="https://bugzilla.suse.com/1228324" source="BUGZILLA"/>
		<reference ref_id="1228553" ref_url="https://bugzilla.suse.com/1228553" source="BUGZILLA"/>
		<reference ref_id="1229806" ref_url="https://bugzilla.suse.com/1229806" source="BUGZILLA"/>
		<reference ref_id="1230294" ref_url="https://bugzilla.suse.com/1230294" source="BUGZILLA"/>
		<reference ref_id="1230331" ref_url="https://bugzilla.suse.com/1230331" source="BUGZILLA"/>
		<reference ref_id="1230333" ref_url="https://bugzilla.suse.com/1230333" source="BUGZILLA"/>
		<reference ref_id="1231348" ref_url="https://bugzilla.suse.com/1231348" source="BUGZILLA"/>
		<reference ref_id="1232999" ref_url="https://bugzilla.suse.com/1232999" source="BUGZILLA"/>
		<reference ref_id="1233819" ref_url="https://bugzilla.suse.com/1233819" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45142" ref_url="https://www.suse.com/security/cve/CVE-2023-45142/" source="CVE"/>
		<reference ref_id="CVE-2023-47108" ref_url="https://www.suse.com/security/cve/CVE-2023-47108/" source="CVE"/>
		<reference ref_id="CVE-2024-41110" ref_url="https://www.suse.com/security/cve/CVE-2024-41110/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020020.html" source="SUSE-SU"/>
		<description>
This update for docker fixes the following issues:

- Update docker-buildx to v0.19.2. See upstream changelog online at
  &lt;https://github.com/docker/buildx/releases/tag/v0.19.2&gt;.

  Some notable changelogs from the last update:
    * &lt;https://github.com/docker/buildx/releases/tag/v0.19.0&gt;
    * &lt;https://github.com/docker/buildx/releases/tag/v0.18.0&gt;

- Add a new toggle file /etc/docker/suse-secrets-enable which allows users to
  disable the SUSEConnect integration with Docker (which creates special mounts
  in /run/secrets to allow container-suseconnect to authenticate containers
  with registries on registered hosts). bsc#1231348 bsc#1232999

  In order to disable these mounts, just do

    echo 0 &gt; /etc/docker/suse-secrets-enable

  and restart Docker. In order to re-enable them, just do

    echo 1 &gt; /etc/docker/suse-secrets-enable

  and restart Docker. Docker will output information on startup to tell you
  whether the SUSE secrets feature is enabled or not.

- Disable docker-buildx builds for SLES. It turns out that build containers
  with docker-buildx don't currently get the SUSE secrets mounts applied,
  meaning that container-suseconnect doesn't work when building images.
  bsc#1233819

- Remove DOCKER_NETWORK_OPTS from docker.service. This was removed from
  sysconfig a long time ago, and apparently this causes issues with systemd in
  some cases.

- Allow a parallel docker-stable RPM to exists in repositories.

- Update to docker-buildx v0.17.1 to match standalone docker-buildx package we
  are replacing. See upstream changelog online at
  &lt;https://github.com/docker/buildx/releases/tag/v0.17.1&gt;

- Allow users to disable SUSE secrets support by setting
  DOCKER_SUSE_SECRETS_ENABLE=0 in /etc/sysconfig/docker. (bsc#1231348)

- Mark docker-buildx as required since classic 'docker build' has been
  deprecated since Docker 23.0. (bsc#1230331)

- Import docker-buildx v0.16.2 as a subpackage. Previously this was a separate
  package, but with docker-stable it will be necessary to maintain the packages
  together and it makes more sense to have them live in the same OBS package.
  (bsc#1230333)

- Update to Docker 26.1.5-ce. See upstream changelog online at
  &lt;https://docs.docker.com/engine/release-notes/26.1/#2615&gt;
  bsc#1230294

- This update includes fixes for:
  * CVE-2024-41110. bsc#1228324
  * CVE-2023-47108. bsc#1217070 bsc#1229806
  * CVE-2023-45142. bsc#1228553 bsc#1229806

- Update to Docker 26.1.4-ce. See upstream changelog online at
  &lt;https://docs.docker.com/engine/release-notes/26.1/#2614&gt;

- Update to Docker 26.1.0-ce. See upstream changelog online at
  &lt;https://docs.docker.com/engine/release-notes/26.1/#2610&gt;

- Update --add-runtime to point to correct binary path.		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-17"/>
	<updated date="2024-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217070">SUSE bug 1217070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228324">SUSE bug 1228324</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228553">SUSE bug 1228553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229806">SUSE bug 1229806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230294">SUSE bug 1230294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230331">SUSE bug 1230331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230333">SUSE bug 1230333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231348">SUSE bug 1231348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232999">SUSE bug 1232999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233819">SUSE bug 1233819</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45142/">CVE-2023-45142 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45142">CVE-2023-45142 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47108/">CVE-2023-47108 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47108">CVE-2023-47108 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41110/">CVE-2024-41110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41110">CVE-2024-41110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958297" comment="docker-26.1.5_ce-150000.212.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958298" comment="docker-bash-completion-26.1.5_ce-150000.212.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958299" comment="docker-fish-completion-26.1.5_ce-150000.212.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958300" comment="docker-rootless-extras-26.1.5_ce-150000.212.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958301" comment="docker-zsh-completion-26.1.5_ce-150000.212.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5149" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1054914" ref_url="https://bugzilla.suse.com/1054914" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1082555" ref_url="https://bugzilla.suse.com/1082555" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1204171" ref_url="https://bugzilla.suse.com/1204171" source="BUGZILLA"/>
		<reference ref_id="1205796" ref_url="https://bugzilla.suse.com/1205796" source="BUGZILLA"/>
		<reference ref_id="1206188" ref_url="https://bugzilla.suse.com/1206188" source="BUGZILLA"/>
		<reference ref_id="1206344" ref_url="https://bugzilla.suse.com/1206344" source="BUGZILLA"/>
		<reference ref_id="1209290" ref_url="https://bugzilla.suse.com/1209290" source="BUGZILLA"/>
		<reference ref_id="1210449" ref_url="https://bugzilla.suse.com/1210449" source="BUGZILLA"/>
		<reference ref_id="1210627" ref_url="https://bugzilla.suse.com/1210627" source="BUGZILLA"/>
		<reference ref_id="1213034" ref_url="https://bugzilla.suse.com/1213034" source="BUGZILLA"/>
		<reference ref_id="1216813" ref_url="https://bugzilla.suse.com/1216813" source="BUGZILLA"/>
		<reference ref_id="1218562" ref_url="https://bugzilla.suse.com/1218562" source="BUGZILLA"/>
		<reference ref_id="1218644" ref_url="https://bugzilla.suse.com/1218644" source="BUGZILLA"/>
		<reference ref_id="1220382" ref_url="https://bugzilla.suse.com/1220382" source="BUGZILLA"/>
		<reference ref_id="1221309" ref_url="https://bugzilla.suse.com/1221309" source="BUGZILLA"/>
		<reference ref_id="1221333" ref_url="https://bugzilla.suse.com/1221333" source="BUGZILLA"/>
		<reference ref_id="1222364" ref_url="https://bugzilla.suse.com/1222364" source="BUGZILLA"/>
		<reference ref_id="1222590" ref_url="https://bugzilla.suse.com/1222590" source="BUGZILLA"/>
		<reference ref_id="1223202" ref_url="https://bugzilla.suse.com/1223202" source="BUGZILLA"/>
		<reference ref_id="1223384" ref_url="https://bugzilla.suse.com/1223384" source="BUGZILLA"/>
		<reference ref_id="1223524" ref_url="https://bugzilla.suse.com/1223524" source="BUGZILLA"/>
		<reference ref_id="1223656" ref_url="https://bugzilla.suse.com/1223656" source="BUGZILLA"/>
		<reference ref_id="1223824" ref_url="https://bugzilla.suse.com/1223824" source="BUGZILLA"/>
		<reference ref_id="1223848" ref_url="https://bugzilla.suse.com/1223848" source="BUGZILLA"/>
		<reference ref_id="1223919" ref_url="https://bugzilla.suse.com/1223919" source="BUGZILLA"/>
		<reference ref_id="1223942" ref_url="https://bugzilla.suse.com/1223942" source="BUGZILLA"/>
		<reference ref_id="1224518" ref_url="https://bugzilla.suse.com/1224518" source="BUGZILLA"/>
		<reference ref_id="1224526" ref_url="https://bugzilla.suse.com/1224526" source="BUGZILLA"/>
		<reference ref_id="1224574" ref_url="https://bugzilla.suse.com/1224574" source="BUGZILLA"/>
		<reference ref_id="1225189" ref_url="https://bugzilla.suse.com/1225189" source="BUGZILLA"/>
		<reference ref_id="1225336" ref_url="https://bugzilla.suse.com/1225336" source="BUGZILLA"/>
		<reference ref_id="1225611" ref_url="https://bugzilla.suse.com/1225611" source="BUGZILLA"/>
		<reference ref_id="1225725" ref_url="https://bugzilla.suse.com/1225725" source="BUGZILLA"/>
		<reference ref_id="1225730" ref_url="https://bugzilla.suse.com/1225730" source="BUGZILLA"/>
		<reference ref_id="1225742" ref_url="https://bugzilla.suse.com/1225742" source="BUGZILLA"/>
		<reference ref_id="1225762" ref_url="https://bugzilla.suse.com/1225762" source="BUGZILLA"/>
		<reference ref_id="1225764" ref_url="https://bugzilla.suse.com/1225764" source="BUGZILLA"/>
		<reference ref_id="1225812" ref_url="https://bugzilla.suse.com/1225812" source="BUGZILLA"/>
		<reference ref_id="1226498" ref_url="https://bugzilla.suse.com/1226498" source="BUGZILLA"/>
		<reference ref_id="1226560" ref_url="https://bugzilla.suse.com/1226560" source="BUGZILLA"/>
		<reference ref_id="1226592" ref_url="https://bugzilla.suse.com/1226592" source="BUGZILLA"/>
		<reference ref_id="1226631" ref_url="https://bugzilla.suse.com/1226631" source="BUGZILLA"/>
		<reference ref_id="1226748" ref_url="https://bugzilla.suse.com/1226748" source="BUGZILLA"/>
		<reference ref_id="1226797" ref_url="https://bugzilla.suse.com/1226797" source="BUGZILLA"/>
		<reference ref_id="1226872" ref_url="https://bugzilla.suse.com/1226872" source="BUGZILLA"/>
		<reference ref_id="1227437" ref_url="https://bugzilla.suse.com/1227437" source="BUGZILLA"/>
		<reference ref_id="1227853" ref_url="https://bugzilla.suse.com/1227853" source="BUGZILLA"/>
		<reference ref_id="1227885" ref_url="https://bugzilla.suse.com/1227885" source="BUGZILLA"/>
		<reference ref_id="1228119" ref_url="https://bugzilla.suse.com/1228119" source="BUGZILLA"/>
		<reference ref_id="1228269" ref_url="https://bugzilla.suse.com/1228269" source="BUGZILLA"/>
		<reference ref_id="1228410" ref_url="https://bugzilla.suse.com/1228410" source="BUGZILLA"/>
		<reference ref_id="1228430" ref_url="https://bugzilla.suse.com/1228430" source="BUGZILLA"/>
		<reference ref_id="1228486" ref_url="https://bugzilla.suse.com/1228486" source="BUGZILLA"/>
		<reference ref_id="1228650" ref_url="https://bugzilla.suse.com/1228650" source="BUGZILLA"/>
		<reference ref_id="1228709" ref_url="https://bugzilla.suse.com/1228709" source="BUGZILLA"/>
		<reference ref_id="1228743" ref_url="https://bugzilla.suse.com/1228743" source="BUGZILLA"/>
		<reference ref_id="1228747" ref_url="https://bugzilla.suse.com/1228747" source="BUGZILLA"/>
		<reference ref_id="1228857" ref_url="https://bugzilla.suse.com/1228857" source="BUGZILLA"/>
		<reference ref_id="1229005" ref_url="https://bugzilla.suse.com/1229005" source="BUGZILLA"/>
		<reference ref_id="1229019" ref_url="https://bugzilla.suse.com/1229019" source="BUGZILLA"/>
		<reference ref_id="1229312" ref_url="https://bugzilla.suse.com/1229312" source="BUGZILLA"/>
		<reference ref_id="1229429" ref_url="https://bugzilla.suse.com/1229429" source="BUGZILLA"/>
		<reference ref_id="1229450" ref_url="https://bugzilla.suse.com/1229450" source="BUGZILLA"/>
		<reference ref_id="1229454" ref_url="https://bugzilla.suse.com/1229454" source="BUGZILLA"/>
		<reference ref_id="1229456" ref_url="https://bugzilla.suse.com/1229456" source="BUGZILLA"/>
		<reference ref_id="1229556" ref_url="https://bugzilla.suse.com/1229556" source="BUGZILLA"/>
		<reference ref_id="1229585" ref_url="https://bugzilla.suse.com/1229585" source="BUGZILLA"/>
		<reference ref_id="1229752" ref_url="https://bugzilla.suse.com/1229752" source="BUGZILLA"/>
		<reference ref_id="1229769" ref_url="https://bugzilla.suse.com/1229769" source="BUGZILLA"/>
		<reference ref_id="1229808" ref_url="https://bugzilla.suse.com/1229808" source="BUGZILLA"/>
		<reference ref_id="1229837" ref_url="https://bugzilla.suse.com/1229837" source="BUGZILLA"/>
		<reference ref_id="1229891" ref_url="https://bugzilla.suse.com/1229891" source="BUGZILLA"/>
		<reference ref_id="1230055" ref_url="https://bugzilla.suse.com/1230055" source="BUGZILLA"/>
		<reference ref_id="1230179" ref_url="https://bugzilla.suse.com/1230179" source="BUGZILLA"/>
		<reference ref_id="1230220" ref_url="https://bugzilla.suse.com/1230220" source="BUGZILLA"/>
		<reference ref_id="1230231" ref_url="https://bugzilla.suse.com/1230231" source="BUGZILLA"/>
		<reference ref_id="1230270" ref_url="https://bugzilla.suse.com/1230270" source="BUGZILLA"/>
		<reference ref_id="1230289" ref_url="https://bugzilla.suse.com/1230289" source="BUGZILLA"/>
		<reference ref_id="1230405" ref_url="https://bugzilla.suse.com/1230405" source="BUGZILLA"/>
		<reference ref_id="1230414" ref_url="https://bugzilla.suse.com/1230414" source="BUGZILLA"/>
		<reference ref_id="1230429" ref_url="https://bugzilla.suse.com/1230429" source="BUGZILLA"/>
		<reference ref_id="1230456" ref_url="https://bugzilla.suse.com/1230456" source="BUGZILLA"/>
		<reference ref_id="1230550" ref_url="https://bugzilla.suse.com/1230550" source="BUGZILLA"/>
		<reference ref_id="1230558" ref_url="https://bugzilla.suse.com/1230558" source="BUGZILLA"/>
		<reference ref_id="1230600" ref_url="https://bugzilla.suse.com/1230600" source="BUGZILLA"/>
		<reference ref_id="1230620" ref_url="https://bugzilla.suse.com/1230620" source="BUGZILLA"/>
		<reference ref_id="1230715" ref_url="https://bugzilla.suse.com/1230715" source="BUGZILLA"/>
		<reference ref_id="1230722" ref_url="https://bugzilla.suse.com/1230722" source="BUGZILLA"/>
		<reference ref_id="1230763" ref_url="https://bugzilla.suse.com/1230763" source="BUGZILLA"/>
		<reference ref_id="1230773" ref_url="https://bugzilla.suse.com/1230773" source="BUGZILLA"/>
		<reference ref_id="1230774" ref_url="https://bugzilla.suse.com/1230774" source="BUGZILLA"/>
		<reference ref_id="1230801" ref_url="https://bugzilla.suse.com/1230801" source="BUGZILLA"/>
		<reference ref_id="1230827" ref_url="https://bugzilla.suse.com/1230827" source="BUGZILLA"/>
		<reference ref_id="1230903" ref_url="https://bugzilla.suse.com/1230903" source="BUGZILLA"/>
		<reference ref_id="1230918" ref_url="https://bugzilla.suse.com/1230918" source="BUGZILLA"/>
		<reference ref_id="1231016" ref_url="https://bugzilla.suse.com/1231016" source="BUGZILLA"/>
		<reference ref_id="1231072" ref_url="https://bugzilla.suse.com/1231072" source="BUGZILLA"/>
		<reference ref_id="1231073" ref_url="https://bugzilla.suse.com/1231073" source="BUGZILLA"/>
		<reference ref_id="1231083" ref_url="https://bugzilla.suse.com/1231083" source="BUGZILLA"/>
		<reference ref_id="1231084" ref_url="https://bugzilla.suse.com/1231084" source="BUGZILLA"/>
		<reference ref_id="1231085" ref_url="https://bugzilla.suse.com/1231085" source="BUGZILLA"/>
		<reference ref_id="1231087" ref_url="https://bugzilla.suse.com/1231087" source="BUGZILLA"/>
		<reference ref_id="1231089" ref_url="https://bugzilla.suse.com/1231089" source="BUGZILLA"/>
		<reference ref_id="1231094" ref_url="https://bugzilla.suse.com/1231094" source="BUGZILLA"/>
		<reference ref_id="1231096" ref_url="https://bugzilla.suse.com/1231096" source="BUGZILLA"/>
		<reference ref_id="1231098" ref_url="https://bugzilla.suse.com/1231098" source="BUGZILLA"/>
		<reference ref_id="1231101" ref_url="https://bugzilla.suse.com/1231101" source="BUGZILLA"/>
		<reference ref_id="1231105" ref_url="https://bugzilla.suse.com/1231105" source="BUGZILLA"/>
		<reference ref_id="1231108" ref_url="https://bugzilla.suse.com/1231108" source="BUGZILLA"/>
		<reference ref_id="1231111" ref_url="https://bugzilla.suse.com/1231111" source="BUGZILLA"/>
		<reference ref_id="1231114" ref_url="https://bugzilla.suse.com/1231114" source="BUGZILLA"/>
		<reference ref_id="1231115" ref_url="https://bugzilla.suse.com/1231115" source="BUGZILLA"/>
		<reference ref_id="1231132" ref_url="https://bugzilla.suse.com/1231132" source="BUGZILLA"/>
		<reference ref_id="1231135" ref_url="https://bugzilla.suse.com/1231135" source="BUGZILLA"/>
		<reference ref_id="1231138" ref_url="https://bugzilla.suse.com/1231138" source="BUGZILLA"/>
		<reference ref_id="1231148" ref_url="https://bugzilla.suse.com/1231148" source="BUGZILLA"/>
		<reference ref_id="1231169" ref_url="https://bugzilla.suse.com/1231169" source="BUGZILLA"/>
		<reference ref_id="1231178" ref_url="https://bugzilla.suse.com/1231178" source="BUGZILLA"/>
		<reference ref_id="1231179" ref_url="https://bugzilla.suse.com/1231179" source="BUGZILLA"/>
		<reference ref_id="1231180" ref_url="https://bugzilla.suse.com/1231180" source="BUGZILLA"/>
		<reference ref_id="1231181" ref_url="https://bugzilla.suse.com/1231181" source="BUGZILLA"/>
		<reference ref_id="1231187" ref_url="https://bugzilla.suse.com/1231187" source="BUGZILLA"/>
		<reference ref_id="1231191" ref_url="https://bugzilla.suse.com/1231191" source="BUGZILLA"/>
		<reference ref_id="1231193" ref_url="https://bugzilla.suse.com/1231193" source="BUGZILLA"/>
		<reference ref_id="1231195" ref_url="https://bugzilla.suse.com/1231195" source="BUGZILLA"/>
		<reference ref_id="1231197" ref_url="https://bugzilla.suse.com/1231197" source="BUGZILLA"/>
		<reference ref_id="1231200" ref_url="https://bugzilla.suse.com/1231200" source="BUGZILLA"/>
		<reference ref_id="1231202" ref_url="https://bugzilla.suse.com/1231202" source="BUGZILLA"/>
		<reference ref_id="1231203" ref_url="https://bugzilla.suse.com/1231203" source="BUGZILLA"/>
		<reference ref_id="1231277" ref_url="https://bugzilla.suse.com/1231277" source="BUGZILLA"/>
		<reference ref_id="1231293" ref_url="https://bugzilla.suse.com/1231293" source="BUGZILLA"/>
		<reference ref_id="1231327" ref_url="https://bugzilla.suse.com/1231327" source="BUGZILLA"/>
		<reference ref_id="1231344" ref_url="https://bugzilla.suse.com/1231344" source="BUGZILLA"/>
		<reference ref_id="1231375" ref_url="https://bugzilla.suse.com/1231375" source="BUGZILLA"/>
		<reference ref_id="1231383" ref_url="https://bugzilla.suse.com/1231383" source="BUGZILLA"/>
		<reference ref_id="1231434" ref_url="https://bugzilla.suse.com/1231434" source="BUGZILLA"/>
		<reference ref_id="1231439" ref_url="https://bugzilla.suse.com/1231439" source="BUGZILLA"/>
		<reference ref_id="1231441" ref_url="https://bugzilla.suse.com/1231441" source="BUGZILLA"/>
		<reference ref_id="1231442" ref_url="https://bugzilla.suse.com/1231442" source="BUGZILLA"/>
		<reference ref_id="1231452" ref_url="https://bugzilla.suse.com/1231452" source="BUGZILLA"/>
		<reference ref_id="1231465" ref_url="https://bugzilla.suse.com/1231465" source="BUGZILLA"/>
		<reference ref_id="1231474" ref_url="https://bugzilla.suse.com/1231474" source="BUGZILLA"/>
		<reference ref_id="1231481" ref_url="https://bugzilla.suse.com/1231481" source="BUGZILLA"/>
		<reference ref_id="1231496" ref_url="https://bugzilla.suse.com/1231496" source="BUGZILLA"/>
		<reference ref_id="1231502" ref_url="https://bugzilla.suse.com/1231502" source="BUGZILLA"/>
		<reference ref_id="1231537" ref_url="https://bugzilla.suse.com/1231537" source="BUGZILLA"/>
		<reference ref_id="1231539" ref_url="https://bugzilla.suse.com/1231539" source="BUGZILLA"/>
		<reference ref_id="1231540" ref_url="https://bugzilla.suse.com/1231540" source="BUGZILLA"/>
		<reference ref_id="1231541" ref_url="https://bugzilla.suse.com/1231541" source="BUGZILLA"/>
		<reference ref_id="1231578" ref_url="https://bugzilla.suse.com/1231578" source="BUGZILLA"/>
		<reference ref_id="1231646" ref_url="https://bugzilla.suse.com/1231646" source="BUGZILLA"/>
		<reference ref_id="1231673" ref_url="https://bugzilla.suse.com/1231673" source="BUGZILLA"/>
		<reference ref_id="1231849" ref_url="https://bugzilla.suse.com/1231849" source="BUGZILLA"/>
		<reference ref_id="1231856" ref_url="https://bugzilla.suse.com/1231856" source="BUGZILLA"/>
		<reference ref_id="1231857" ref_url="https://bugzilla.suse.com/1231857" source="BUGZILLA"/>
		<reference ref_id="1231858" ref_url="https://bugzilla.suse.com/1231858" source="BUGZILLA"/>
		<reference ref_id="1231859" ref_url="https://bugzilla.suse.com/1231859" source="BUGZILLA"/>
		<reference ref_id="1231861" ref_url="https://bugzilla.suse.com/1231861" source="BUGZILLA"/>
		<reference ref_id="1231864" ref_url="https://bugzilla.suse.com/1231864" source="BUGZILLA"/>
		<reference ref_id="1231872" ref_url="https://bugzilla.suse.com/1231872" source="BUGZILLA"/>
		<reference ref_id="1231883" ref_url="https://bugzilla.suse.com/1231883" source="BUGZILLA"/>
		<reference ref_id="1231885" ref_url="https://bugzilla.suse.com/1231885" source="BUGZILLA"/>
		<reference ref_id="1231887" ref_url="https://bugzilla.suse.com/1231887" source="BUGZILLA"/>
		<reference ref_id="1231888" ref_url="https://bugzilla.suse.com/1231888" source="BUGZILLA"/>
		<reference ref_id="1231889" ref_url="https://bugzilla.suse.com/1231889" source="BUGZILLA"/>
		<reference ref_id="1231890" ref_url="https://bugzilla.suse.com/1231890" source="BUGZILLA"/>
		<reference ref_id="1231892" ref_url="https://bugzilla.suse.com/1231892" source="BUGZILLA"/>
		<reference ref_id="1231893" ref_url="https://bugzilla.suse.com/1231893" source="BUGZILLA"/>
		<reference ref_id="1231895" ref_url="https://bugzilla.suse.com/1231895" source="BUGZILLA"/>
		<reference ref_id="1231896" ref_url="https://bugzilla.suse.com/1231896" source="BUGZILLA"/>
		<reference ref_id="1231897" ref_url="https://bugzilla.suse.com/1231897" source="BUGZILLA"/>
		<reference ref_id="1231902" ref_url="https://bugzilla.suse.com/1231902" source="BUGZILLA"/>
		<reference ref_id="1231903" ref_url="https://bugzilla.suse.com/1231903" source="BUGZILLA"/>
		<reference ref_id="1231904" ref_url="https://bugzilla.suse.com/1231904" source="BUGZILLA"/>
		<reference ref_id="1231907" ref_url="https://bugzilla.suse.com/1231907" source="BUGZILLA"/>
		<reference ref_id="1231914" ref_url="https://bugzilla.suse.com/1231914" source="BUGZILLA"/>
		<reference ref_id="1231916" ref_url="https://bugzilla.suse.com/1231916" source="BUGZILLA"/>
		<reference ref_id="1231920" ref_url="https://bugzilla.suse.com/1231920" source="BUGZILLA"/>
		<reference ref_id="1231923" ref_url="https://bugzilla.suse.com/1231923" source="BUGZILLA"/>
		<reference ref_id="1231929" ref_url="https://bugzilla.suse.com/1231929" source="BUGZILLA"/>
		<reference ref_id="1231930" ref_url="https://bugzilla.suse.com/1231930" source="BUGZILLA"/>
		<reference ref_id="1231931" ref_url="https://bugzilla.suse.com/1231931" source="BUGZILLA"/>
		<reference ref_id="1231935" ref_url="https://bugzilla.suse.com/1231935" source="BUGZILLA"/>
		<reference ref_id="1231936" ref_url="https://bugzilla.suse.com/1231936" source="BUGZILLA"/>
		<reference ref_id="1231937" ref_url="https://bugzilla.suse.com/1231937" source="BUGZILLA"/>
		<reference ref_id="1231938" ref_url="https://bugzilla.suse.com/1231938" source="BUGZILLA"/>
		<reference ref_id="1231939" ref_url="https://bugzilla.suse.com/1231939" source="BUGZILLA"/>
		<reference ref_id="1231940" ref_url="https://bugzilla.suse.com/1231940" source="BUGZILLA"/>
		<reference ref_id="1231941" ref_url="https://bugzilla.suse.com/1231941" source="BUGZILLA"/>
		<reference ref_id="1231942" ref_url="https://bugzilla.suse.com/1231942" source="BUGZILLA"/>
		<reference ref_id="1231944" ref_url="https://bugzilla.suse.com/1231944" source="BUGZILLA"/>
		<reference ref_id="1231947" ref_url="https://bugzilla.suse.com/1231947" source="BUGZILLA"/>
		<reference ref_id="1231950" ref_url="https://bugzilla.suse.com/1231950" source="BUGZILLA"/>
		<reference ref_id="1231952" ref_url="https://bugzilla.suse.com/1231952" source="BUGZILLA"/>
		<reference ref_id="1231953" ref_url="https://bugzilla.suse.com/1231953" source="BUGZILLA"/>
		<reference ref_id="1231954" ref_url="https://bugzilla.suse.com/1231954" source="BUGZILLA"/>
		<reference ref_id="1231958" ref_url="https://bugzilla.suse.com/1231958" source="BUGZILLA"/>
		<reference ref_id="1231959" ref_url="https://bugzilla.suse.com/1231959" source="BUGZILLA"/>
		<reference ref_id="1231960" ref_url="https://bugzilla.suse.com/1231960" source="BUGZILLA"/>
		<reference ref_id="1231961" ref_url="https://bugzilla.suse.com/1231961" source="BUGZILLA"/>
		<reference ref_id="1231962" ref_url="https://bugzilla.suse.com/1231962" source="BUGZILLA"/>
		<reference ref_id="1231965" ref_url="https://bugzilla.suse.com/1231965" source="BUGZILLA"/>
		<reference ref_id="1231967" ref_url="https://bugzilla.suse.com/1231967" source="BUGZILLA"/>
		<reference ref_id="1231968" ref_url="https://bugzilla.suse.com/1231968" source="BUGZILLA"/>
		<reference ref_id="1231972" ref_url="https://bugzilla.suse.com/1231972" source="BUGZILLA"/>
		<reference ref_id="1231973" ref_url="https://bugzilla.suse.com/1231973" source="BUGZILLA"/>
		<reference ref_id="1231976" ref_url="https://bugzilla.suse.com/1231976" source="BUGZILLA"/>
		<reference ref_id="1231978" ref_url="https://bugzilla.suse.com/1231978" source="BUGZILLA"/>
		<reference ref_id="1231979" ref_url="https://bugzilla.suse.com/1231979" source="BUGZILLA"/>
		<reference ref_id="1231987" ref_url="https://bugzilla.suse.com/1231987" source="BUGZILLA"/>
		<reference ref_id="1231988" ref_url="https://bugzilla.suse.com/1231988" source="BUGZILLA"/>
		<reference ref_id="1231990" ref_url="https://bugzilla.suse.com/1231990" source="BUGZILLA"/>
		<reference ref_id="1231991" ref_url="https://bugzilla.suse.com/1231991" source="BUGZILLA"/>
		<reference ref_id="1231992" ref_url="https://bugzilla.suse.com/1231992" source="BUGZILLA"/>
		<reference ref_id="1231995" ref_url="https://bugzilla.suse.com/1231995" source="BUGZILLA"/>
		<reference ref_id="1231996" ref_url="https://bugzilla.suse.com/1231996" source="BUGZILLA"/>
		<reference ref_id="1231997" ref_url="https://bugzilla.suse.com/1231997" source="BUGZILLA"/>
		<reference ref_id="1231998" ref_url="https://bugzilla.suse.com/1231998" source="BUGZILLA"/>
		<reference ref_id="1232001" ref_url="https://bugzilla.suse.com/1232001" source="BUGZILLA"/>
		<reference ref_id="1232004" ref_url="https://bugzilla.suse.com/1232004" source="BUGZILLA"/>
		<reference ref_id="1232005" ref_url="https://bugzilla.suse.com/1232005" source="BUGZILLA"/>
		<reference ref_id="1232006" ref_url="https://bugzilla.suse.com/1232006" source="BUGZILLA"/>
		<reference ref_id="1232007" ref_url="https://bugzilla.suse.com/1232007" source="BUGZILLA"/>
		<reference ref_id="1232013" ref_url="https://bugzilla.suse.com/1232013" source="BUGZILLA"/>
		<reference ref_id="1232015" ref_url="https://bugzilla.suse.com/1232015" source="BUGZILLA"/>
		<reference ref_id="1232016" ref_url="https://bugzilla.suse.com/1232016" source="BUGZILLA"/>
		<reference ref_id="1232017" ref_url="https://bugzilla.suse.com/1232017" source="BUGZILLA"/>
		<reference ref_id="1232025" ref_url="https://bugzilla.suse.com/1232025" source="BUGZILLA"/>
		<reference ref_id="1232026" ref_url="https://bugzilla.suse.com/1232026" source="BUGZILLA"/>
		<reference ref_id="1232027" ref_url="https://bugzilla.suse.com/1232027" source="BUGZILLA"/>
		<reference ref_id="1232028" ref_url="https://bugzilla.suse.com/1232028" source="BUGZILLA"/>
		<reference ref_id="1232033" ref_url="https://bugzilla.suse.com/1232033" source="BUGZILLA"/>
		<reference ref_id="1232034" ref_url="https://bugzilla.suse.com/1232034" source="BUGZILLA"/>
		<reference ref_id="1232035" ref_url="https://bugzilla.suse.com/1232035" source="BUGZILLA"/>
		<reference ref_id="1232036" ref_url="https://bugzilla.suse.com/1232036" source="BUGZILLA"/>
		<reference ref_id="1232037" ref_url="https://bugzilla.suse.com/1232037" source="BUGZILLA"/>
		<reference ref_id="1232038" ref_url="https://bugzilla.suse.com/1232038" source="BUGZILLA"/>
		<reference ref_id="1232039" ref_url="https://bugzilla.suse.com/1232039" source="BUGZILLA"/>
		<reference ref_id="1232043" ref_url="https://bugzilla.suse.com/1232043" source="BUGZILLA"/>
		<reference ref_id="1232047" ref_url="https://bugzilla.suse.com/1232047" source="BUGZILLA"/>
		<reference ref_id="1232048" ref_url="https://bugzilla.suse.com/1232048" source="BUGZILLA"/>
		<reference ref_id="1232049" ref_url="https://bugzilla.suse.com/1232049" source="BUGZILLA"/>
		<reference ref_id="1232050" ref_url="https://bugzilla.suse.com/1232050" source="BUGZILLA"/>
		<reference ref_id="1232056" ref_url="https://bugzilla.suse.com/1232056" source="BUGZILLA"/>
		<reference ref_id="1232067" ref_url="https://bugzilla.suse.com/1232067" source="BUGZILLA"/>
		<reference ref_id="1232069" ref_url="https://bugzilla.suse.com/1232069" source="BUGZILLA"/>
		<reference ref_id="1232070" ref_url="https://bugzilla.suse.com/1232070" source="BUGZILLA"/>
		<reference ref_id="1232071" ref_url="https://bugzilla.suse.com/1232071" source="BUGZILLA"/>
		<reference ref_id="1232075" ref_url="https://bugzilla.suse.com/1232075" source="BUGZILLA"/>
		<reference ref_id="1232076" ref_url="https://bugzilla.suse.com/1232076" source="BUGZILLA"/>
		<reference ref_id="1232080" ref_url="https://bugzilla.suse.com/1232080" source="BUGZILLA"/>
		<reference ref_id="1232083" ref_url="https://bugzilla.suse.com/1232083" source="BUGZILLA"/>
		<reference ref_id="1232084" ref_url="https://bugzilla.suse.com/1232084" source="BUGZILLA"/>
		<reference ref_id="1232085" ref_url="https://bugzilla.suse.com/1232085" source="BUGZILLA"/>
		<reference ref_id="1232089" ref_url="https://bugzilla.suse.com/1232089" source="BUGZILLA"/>
		<reference ref_id="1232094" ref_url="https://bugzilla.suse.com/1232094" source="BUGZILLA"/>
		<reference ref_id="1232096" ref_url="https://bugzilla.suse.com/1232096" source="BUGZILLA"/>
		<reference ref_id="1232097" ref_url="https://bugzilla.suse.com/1232097" source="BUGZILLA"/>
		<reference ref_id="1232098" ref_url="https://bugzilla.suse.com/1232098" source="BUGZILLA"/>
		<reference ref_id="1232104" ref_url="https://bugzilla.suse.com/1232104" source="BUGZILLA"/>
		<reference ref_id="1232105" ref_url="https://bugzilla.suse.com/1232105" source="BUGZILLA"/>
		<reference ref_id="1232108" ref_url="https://bugzilla.suse.com/1232108" source="BUGZILLA"/>
		<reference ref_id="1232111" ref_url="https://bugzilla.suse.com/1232111" source="BUGZILLA"/>
		<reference ref_id="1232114" ref_url="https://bugzilla.suse.com/1232114" source="BUGZILLA"/>
		<reference ref_id="1232116" ref_url="https://bugzilla.suse.com/1232116" source="BUGZILLA"/>
		<reference ref_id="1232119" ref_url="https://bugzilla.suse.com/1232119" source="BUGZILLA"/>
		<reference ref_id="1232120" ref_url="https://bugzilla.suse.com/1232120" source="BUGZILLA"/>
		<reference ref_id="1232123" ref_url="https://bugzilla.suse.com/1232123" source="BUGZILLA"/>
		<reference ref_id="1232124" ref_url="https://bugzilla.suse.com/1232124" source="BUGZILLA"/>
		<reference ref_id="1232126" ref_url="https://bugzilla.suse.com/1232126" source="BUGZILLA"/>
		<reference ref_id="1232133" ref_url="https://bugzilla.suse.com/1232133" source="BUGZILLA"/>
		<reference ref_id="1232134" ref_url="https://bugzilla.suse.com/1232134" source="BUGZILLA"/>
		<reference ref_id="1232135" ref_url="https://bugzilla.suse.com/1232135" source="BUGZILLA"/>
		<reference ref_id="1232136" ref_url="https://bugzilla.suse.com/1232136" source="BUGZILLA"/>
		<reference ref_id="1232140" ref_url="https://bugzilla.suse.com/1232140" source="BUGZILLA"/>
		<reference ref_id="1232141" ref_url="https://bugzilla.suse.com/1232141" source="BUGZILLA"/>
		<reference ref_id="1232142" ref_url="https://bugzilla.suse.com/1232142" source="BUGZILLA"/>
		<reference ref_id="1232145" ref_url="https://bugzilla.suse.com/1232145" source="BUGZILLA"/>
		<reference ref_id="1232147" ref_url="https://bugzilla.suse.com/1232147" source="BUGZILLA"/>
		<reference ref_id="1232149" ref_url="https://bugzilla.suse.com/1232149" source="BUGZILLA"/>
		<reference ref_id="1232150" ref_url="https://bugzilla.suse.com/1232150" source="BUGZILLA"/>
		<reference ref_id="1232151" ref_url="https://bugzilla.suse.com/1232151" source="BUGZILLA"/>
		<reference ref_id="1232152" ref_url="https://bugzilla.suse.com/1232152" source="BUGZILLA"/>
		<reference ref_id="1232154" ref_url="https://bugzilla.suse.com/1232154" source="BUGZILLA"/>
		<reference ref_id="1232155" ref_url="https://bugzilla.suse.com/1232155" source="BUGZILLA"/>
		<reference ref_id="1232159" ref_url="https://bugzilla.suse.com/1232159" source="BUGZILLA"/>
		<reference ref_id="1232160" ref_url="https://bugzilla.suse.com/1232160" source="BUGZILLA"/>
		<reference ref_id="1232162" ref_url="https://bugzilla.suse.com/1232162" source="BUGZILLA"/>
		<reference ref_id="1232163" ref_url="https://bugzilla.suse.com/1232163" source="BUGZILLA"/>
		<reference ref_id="1232164" ref_url="https://bugzilla.suse.com/1232164" source="BUGZILLA"/>
		<reference ref_id="1232165" ref_url="https://bugzilla.suse.com/1232165" source="BUGZILLA"/>
		<reference ref_id="1232170" ref_url="https://bugzilla.suse.com/1232170" source="BUGZILLA"/>
		<reference ref_id="1232172" ref_url="https://bugzilla.suse.com/1232172" source="BUGZILLA"/>
		<reference ref_id="1232174" ref_url="https://bugzilla.suse.com/1232174" source="BUGZILLA"/>
		<reference ref_id="1232175" ref_url="https://bugzilla.suse.com/1232175" source="BUGZILLA"/>
		<reference ref_id="1232180" ref_url="https://bugzilla.suse.com/1232180" source="BUGZILLA"/>
		<reference ref_id="1232185" ref_url="https://bugzilla.suse.com/1232185" source="BUGZILLA"/>
		<reference ref_id="1232187" ref_url="https://bugzilla.suse.com/1232187" source="BUGZILLA"/>
		<reference ref_id="1232189" ref_url="https://bugzilla.suse.com/1232189" source="BUGZILLA"/>
		<reference ref_id="1232191" ref_url="https://bugzilla.suse.com/1232191" source="BUGZILLA"/>
		<reference ref_id="1232195" ref_url="https://bugzilla.suse.com/1232195" source="BUGZILLA"/>
		<reference ref_id="1232196" ref_url="https://bugzilla.suse.com/1232196" source="BUGZILLA"/>
		<reference ref_id="1232198" ref_url="https://bugzilla.suse.com/1232198" source="BUGZILLA"/>
		<reference ref_id="1232199" ref_url="https://bugzilla.suse.com/1232199" source="BUGZILLA"/>
		<reference ref_id="1232200" ref_url="https://bugzilla.suse.com/1232200" source="BUGZILLA"/>
		<reference ref_id="1232201" ref_url="https://bugzilla.suse.com/1232201" source="BUGZILLA"/>
		<reference ref_id="1232217" ref_url="https://bugzilla.suse.com/1232217" source="BUGZILLA"/>
		<reference ref_id="1232218" ref_url="https://bugzilla.suse.com/1232218" source="BUGZILLA"/>
		<reference ref_id="1232220" ref_url="https://bugzilla.suse.com/1232220" source="BUGZILLA"/>
		<reference ref_id="1232221" ref_url="https://bugzilla.suse.com/1232221" source="BUGZILLA"/>
		<reference ref_id="1232224" ref_url="https://bugzilla.suse.com/1232224" source="BUGZILLA"/>
		<reference ref_id="1232229" ref_url="https://bugzilla.suse.com/1232229" source="BUGZILLA"/>
		<reference ref_id="1232232" ref_url="https://bugzilla.suse.com/1232232" source="BUGZILLA"/>
		<reference ref_id="1232233" ref_url="https://bugzilla.suse.com/1232233" source="BUGZILLA"/>
		<reference ref_id="1232237" ref_url="https://bugzilla.suse.com/1232237" source="BUGZILLA"/>
		<reference ref_id="1232251" ref_url="https://bugzilla.suse.com/1232251" source="BUGZILLA"/>
		<reference ref_id="1232253" ref_url="https://bugzilla.suse.com/1232253" source="BUGZILLA"/>
		<reference ref_id="1232254" ref_url="https://bugzilla.suse.com/1232254" source="BUGZILLA"/>
		<reference ref_id="1232255" ref_url="https://bugzilla.suse.com/1232255" source="BUGZILLA"/>
		<reference ref_id="1232259" ref_url="https://bugzilla.suse.com/1232259" source="BUGZILLA"/>
		<reference ref_id="1232260" ref_url="https://bugzilla.suse.com/1232260" source="BUGZILLA"/>
		<reference ref_id="1232262" ref_url="https://bugzilla.suse.com/1232262" source="BUGZILLA"/>
		<reference ref_id="1232263" ref_url="https://bugzilla.suse.com/1232263" source="BUGZILLA"/>
		<reference ref_id="1232264" ref_url="https://bugzilla.suse.com/1232264" source="BUGZILLA"/>
		<reference ref_id="1232272" ref_url="https://bugzilla.suse.com/1232272" source="BUGZILLA"/>
		<reference ref_id="1232279" ref_url="https://bugzilla.suse.com/1232279" source="BUGZILLA"/>
		<reference ref_id="1232282" ref_url="https://bugzilla.suse.com/1232282" source="BUGZILLA"/>
		<reference ref_id="1232285" ref_url="https://bugzilla.suse.com/1232285" source="BUGZILLA"/>
		<reference ref_id="1232286" ref_url="https://bugzilla.suse.com/1232286" source="BUGZILLA"/>
		<reference ref_id="1232287" ref_url="https://bugzilla.suse.com/1232287" source="BUGZILLA"/>
		<reference ref_id="1232293" ref_url="https://bugzilla.suse.com/1232293" source="BUGZILLA"/>
		<reference ref_id="1232304" ref_url="https://bugzilla.suse.com/1232304" source="BUGZILLA"/>
		<reference ref_id="1232305" ref_url="https://bugzilla.suse.com/1232305" source="BUGZILLA"/>
		<reference ref_id="1232307" ref_url="https://bugzilla.suse.com/1232307" source="BUGZILLA"/>
		<reference ref_id="1232309" ref_url="https://bugzilla.suse.com/1232309" source="BUGZILLA"/>
		<reference ref_id="1232310" ref_url="https://bugzilla.suse.com/1232310" source="BUGZILLA"/>
		<reference ref_id="1232312" ref_url="https://bugzilla.suse.com/1232312" source="BUGZILLA"/>
		<reference ref_id="1232313" ref_url="https://bugzilla.suse.com/1232313" source="BUGZILLA"/>
		<reference ref_id="1232314" ref_url="https://bugzilla.suse.com/1232314" source="BUGZILLA"/>
		<reference ref_id="1232316" ref_url="https://bugzilla.suse.com/1232316" source="BUGZILLA"/>
		<reference ref_id="1232317" ref_url="https://bugzilla.suse.com/1232317" source="BUGZILLA"/>
		<reference ref_id="1232318" ref_url="https://bugzilla.suse.com/1232318" source="BUGZILLA"/>
		<reference ref_id="1232329" ref_url="https://bugzilla.suse.com/1232329" source="BUGZILLA"/>
		<reference ref_id="1232332" ref_url="https://bugzilla.suse.com/1232332" source="BUGZILLA"/>
		<reference ref_id="1232333" ref_url="https://bugzilla.suse.com/1232333" source="BUGZILLA"/>
		<reference ref_id="1232334" ref_url="https://bugzilla.suse.com/1232334" source="BUGZILLA"/>
		<reference ref_id="1232335" ref_url="https://bugzilla.suse.com/1232335" source="BUGZILLA"/>
		<reference ref_id="1232337" ref_url="https://bugzilla.suse.com/1232337" source="BUGZILLA"/>
		<reference ref_id="1232339" ref_url="https://bugzilla.suse.com/1232339" source="BUGZILLA"/>
		<reference ref_id="1232342" ref_url="https://bugzilla.suse.com/1232342" source="BUGZILLA"/>
		<reference ref_id="1232345" ref_url="https://bugzilla.suse.com/1232345" source="BUGZILLA"/>
		<reference ref_id="1232349" ref_url="https://bugzilla.suse.com/1232349" source="BUGZILLA"/>
		<reference ref_id="1232352" ref_url="https://bugzilla.suse.com/1232352" source="BUGZILLA"/>
		<reference ref_id="1232354" ref_url="https://bugzilla.suse.com/1232354" source="BUGZILLA"/>
		<reference ref_id="1232355" ref_url="https://bugzilla.suse.com/1232355" source="BUGZILLA"/>
		<reference ref_id="1232357" ref_url="https://bugzilla.suse.com/1232357" source="BUGZILLA"/>
		<reference ref_id="1232358" ref_url="https://bugzilla.suse.com/1232358" source="BUGZILLA"/>
		<reference ref_id="1232359" ref_url="https://bugzilla.suse.com/1232359" source="BUGZILLA"/>
		<reference ref_id="1232361" ref_url="https://bugzilla.suse.com/1232361" source="BUGZILLA"/>
		<reference ref_id="1232362" ref_url="https://bugzilla.suse.com/1232362" source="BUGZILLA"/>
		<reference ref_id="1232364" ref_url="https://bugzilla.suse.com/1232364" source="BUGZILLA"/>
		<reference ref_id="1232366" ref_url="https://bugzilla.suse.com/1232366" source="BUGZILLA"/>
		<reference ref_id="1232367" ref_url="https://bugzilla.suse.com/1232367" source="BUGZILLA"/>
		<reference ref_id="1232368" ref_url="https://bugzilla.suse.com/1232368" source="BUGZILLA"/>
		<reference ref_id="1232369" ref_url="https://bugzilla.suse.com/1232369" source="BUGZILLA"/>
		<reference ref_id="1232370" ref_url="https://bugzilla.suse.com/1232370" source="BUGZILLA"/>
		<reference ref_id="1232371" ref_url="https://bugzilla.suse.com/1232371" source="BUGZILLA"/>
		<reference ref_id="1232374" ref_url="https://bugzilla.suse.com/1232374" source="BUGZILLA"/>
		<reference ref_id="1232378" ref_url="https://bugzilla.suse.com/1232378" source="BUGZILLA"/>
		<reference ref_id="1232381" ref_url="https://bugzilla.suse.com/1232381" source="BUGZILLA"/>
		<reference ref_id="1232383" ref_url="https://bugzilla.suse.com/1232383" source="BUGZILLA"/>
		<reference ref_id="1232385" ref_url="https://bugzilla.suse.com/1232385" source="BUGZILLA"/>
		<reference ref_id="1232387" ref_url="https://bugzilla.suse.com/1232387" source="BUGZILLA"/>
		<reference ref_id="1232392" ref_url="https://bugzilla.suse.com/1232392" source="BUGZILLA"/>
		<reference ref_id="1232394" ref_url="https://bugzilla.suse.com/1232394" source="BUGZILLA"/>
		<reference ref_id="1232395" ref_url="https://bugzilla.suse.com/1232395" source="BUGZILLA"/>
		<reference ref_id="1232413" ref_url="https://bugzilla.suse.com/1232413" source="BUGZILLA"/>
		<reference ref_id="1232416" ref_url="https://bugzilla.suse.com/1232416" source="BUGZILLA"/>
		<reference ref_id="1232418" ref_url="https://bugzilla.suse.com/1232418" source="BUGZILLA"/>
		<reference ref_id="1232424" ref_url="https://bugzilla.suse.com/1232424" source="BUGZILLA"/>
		<reference ref_id="1232432" ref_url="https://bugzilla.suse.com/1232432" source="BUGZILLA"/>
		<reference ref_id="1232435" ref_url="https://bugzilla.suse.com/1232435" source="BUGZILLA"/>
		<reference ref_id="1232436" ref_url="https://bugzilla.suse.com/1232436" source="BUGZILLA"/>
		<reference ref_id="1232442" ref_url="https://bugzilla.suse.com/1232442" source="BUGZILLA"/>
		<reference ref_id="1232446" ref_url="https://bugzilla.suse.com/1232446" source="BUGZILLA"/>
		<reference ref_id="1232483" ref_url="https://bugzilla.suse.com/1232483" source="BUGZILLA"/>
		<reference ref_id="1232500" ref_url="https://bugzilla.suse.com/1232500" source="BUGZILLA"/>
		<reference ref_id="1232501" ref_url="https://bugzilla.suse.com/1232501" source="BUGZILLA"/>
		<reference ref_id="1232503" ref_url="https://bugzilla.suse.com/1232503" source="BUGZILLA"/>
		<reference ref_id="1232504" ref_url="https://bugzilla.suse.com/1232504" source="BUGZILLA"/>
		<reference ref_id="1232507" ref_url="https://bugzilla.suse.com/1232507" source="BUGZILLA"/>
		<reference ref_id="1232519" ref_url="https://bugzilla.suse.com/1232519" source="BUGZILLA"/>
		<reference ref_id="1232520" ref_url="https://bugzilla.suse.com/1232520" source="BUGZILLA"/>
		<reference ref_id="1232552" ref_url="https://bugzilla.suse.com/1232552" source="BUGZILLA"/>
		<reference ref_id="1232630" ref_url="https://bugzilla.suse.com/1232630" source="BUGZILLA"/>
		<reference ref_id="1232631" ref_url="https://bugzilla.suse.com/1232631" source="BUGZILLA"/>
		<reference ref_id="1232632" ref_url="https://bugzilla.suse.com/1232632" source="BUGZILLA"/>
		<reference ref_id="1232757" ref_url="https://bugzilla.suse.com/1232757" source="BUGZILLA"/>
		<reference ref_id="1232819" ref_url="https://bugzilla.suse.com/1232819" source="BUGZILLA"/>
		<reference ref_id="1232860" ref_url="https://bugzilla.suse.com/1232860" source="BUGZILLA"/>
		<reference ref_id="1232870" ref_url="https://bugzilla.suse.com/1232870" source="BUGZILLA"/>
		<reference ref_id="1232873" ref_url="https://bugzilla.suse.com/1232873" source="BUGZILLA"/>
		<reference ref_id="1232877" ref_url="https://bugzilla.suse.com/1232877" source="BUGZILLA"/>
		<reference ref_id="1232878" ref_url="https://bugzilla.suse.com/1232878" source="BUGZILLA"/>
		<reference ref_id="1232881" ref_url="https://bugzilla.suse.com/1232881" source="BUGZILLA"/>
		<reference ref_id="1232884" ref_url="https://bugzilla.suse.com/1232884" source="BUGZILLA"/>
		<reference ref_id="1232885" ref_url="https://bugzilla.suse.com/1232885" source="BUGZILLA"/>
		<reference ref_id="1232887" ref_url="https://bugzilla.suse.com/1232887" source="BUGZILLA"/>
		<reference ref_id="1232888" ref_url="https://bugzilla.suse.com/1232888" source="BUGZILLA"/>
		<reference ref_id="1232890" ref_url="https://bugzilla.suse.com/1232890" source="BUGZILLA"/>
		<reference ref_id="1232892" ref_url="https://bugzilla.suse.com/1232892" source="BUGZILLA"/>
		<reference ref_id="1232896" ref_url="https://bugzilla.suse.com/1232896" source="BUGZILLA"/>
		<reference ref_id="1232897" ref_url="https://bugzilla.suse.com/1232897" source="BUGZILLA"/>
		<reference ref_id="1232905" ref_url="https://bugzilla.suse.com/1232905" source="BUGZILLA"/>
		<reference ref_id="1232907" ref_url="https://bugzilla.suse.com/1232907" source="BUGZILLA"/>
		<reference ref_id="1232919" ref_url="https://bugzilla.suse.com/1232919" source="BUGZILLA"/>
		<reference ref_id="1232926" ref_url="https://bugzilla.suse.com/1232926" source="BUGZILLA"/>
		<reference ref_id="1232928" ref_url="https://bugzilla.suse.com/1232928" source="BUGZILLA"/>
		<reference ref_id="1232935" ref_url="https://bugzilla.suse.com/1232935" source="BUGZILLA"/>
		<reference ref_id="1233035" ref_url="https://bugzilla.suse.com/1233035" source="BUGZILLA"/>
		<reference ref_id="1233049" ref_url="https://bugzilla.suse.com/1233049" source="BUGZILLA"/>
		<reference ref_id="1233051" ref_url="https://bugzilla.suse.com/1233051" source="BUGZILLA"/>
		<reference ref_id="1233056" ref_url="https://bugzilla.suse.com/1233056" source="BUGZILLA"/>
		<reference ref_id="1233057" ref_url="https://bugzilla.suse.com/1233057" source="BUGZILLA"/>
		<reference ref_id="1233061" ref_url="https://bugzilla.suse.com/1233061" source="BUGZILLA"/>
		<reference ref_id="1233063" ref_url="https://bugzilla.suse.com/1233063" source="BUGZILLA"/>
		<reference ref_id="1233065" ref_url="https://bugzilla.suse.com/1233065" source="BUGZILLA"/>
		<reference ref_id="1233067" ref_url="https://bugzilla.suse.com/1233067" source="BUGZILLA"/>
		<reference ref_id="1233070" ref_url="https://bugzilla.suse.com/1233070" source="BUGZILLA"/>
		<reference ref_id="1233073" ref_url="https://bugzilla.suse.com/1233073" source="BUGZILLA"/>
		<reference ref_id="1233074" ref_url="https://bugzilla.suse.com/1233074" source="BUGZILLA"/>
		<reference ref_id="1233100" ref_url="https://bugzilla.suse.com/1233100" source="BUGZILLA"/>
		<reference ref_id="1233103" ref_url="https://bugzilla.suse.com/1233103" source="BUGZILLA"/>
		<reference ref_id="1233104" ref_url="https://bugzilla.suse.com/1233104" source="BUGZILLA"/>
		<reference ref_id="1233105" ref_url="https://bugzilla.suse.com/1233105" source="BUGZILLA"/>
		<reference ref_id="1233106" ref_url="https://bugzilla.suse.com/1233106" source="BUGZILLA"/>
		<reference ref_id="1233107" ref_url="https://bugzilla.suse.com/1233107" source="BUGZILLA"/>
		<reference ref_id="1233108" ref_url="https://bugzilla.suse.com/1233108" source="BUGZILLA"/>
		<reference ref_id="1233110" ref_url="https://bugzilla.suse.com/1233110" source="BUGZILLA"/>
		<reference ref_id="1233111" ref_url="https://bugzilla.suse.com/1233111" source="BUGZILLA"/>
		<reference ref_id="1233113" ref_url="https://bugzilla.suse.com/1233113" source="BUGZILLA"/>
		<reference ref_id="1233114" ref_url="https://bugzilla.suse.com/1233114" source="BUGZILLA"/>
		<reference ref_id="1233117" ref_url="https://bugzilla.suse.com/1233117" source="BUGZILLA"/>
		<reference ref_id="1233123" ref_url="https://bugzilla.suse.com/1233123" source="BUGZILLA"/>
		<reference ref_id="1233125" ref_url="https://bugzilla.suse.com/1233125" source="BUGZILLA"/>
		<reference ref_id="1233129" ref_url="https://bugzilla.suse.com/1233129" source="BUGZILLA"/>
		<reference ref_id="1233130" ref_url="https://bugzilla.suse.com/1233130" source="BUGZILLA"/>
		<reference ref_id="1233134" ref_url="https://bugzilla.suse.com/1233134" source="BUGZILLA"/>
		<reference ref_id="1233135" ref_url="https://bugzilla.suse.com/1233135" source="BUGZILLA"/>
		<reference ref_id="1233150" ref_url="https://bugzilla.suse.com/1233150" source="BUGZILLA"/>
		<reference ref_id="1233189" ref_url="https://bugzilla.suse.com/1233189" source="BUGZILLA"/>
		<reference ref_id="1233191" ref_url="https://bugzilla.suse.com/1233191" source="BUGZILLA"/>
		<reference ref_id="1233197" ref_url="https://bugzilla.suse.com/1233197" source="BUGZILLA"/>
		<reference ref_id="1233205" ref_url="https://bugzilla.suse.com/1233205" source="BUGZILLA"/>
		<reference ref_id="1233206" ref_url="https://bugzilla.suse.com/1233206" source="BUGZILLA"/>
		<reference ref_id="1233209" ref_url="https://bugzilla.suse.com/1233209" source="BUGZILLA"/>
		<reference ref_id="1233210" ref_url="https://bugzilla.suse.com/1233210" source="BUGZILLA"/>
		<reference ref_id="1233211" ref_url="https://bugzilla.suse.com/1233211" source="BUGZILLA"/>
		<reference ref_id="1233212" ref_url="https://bugzilla.suse.com/1233212" source="BUGZILLA"/>
		<reference ref_id="1233214" ref_url="https://bugzilla.suse.com/1233214" source="BUGZILLA"/>
		<reference ref_id="1233216" ref_url="https://bugzilla.suse.com/1233216" source="BUGZILLA"/>
		<reference ref_id="1233238" ref_url="https://bugzilla.suse.com/1233238" source="BUGZILLA"/>
		<reference ref_id="1233241" ref_url="https://bugzilla.suse.com/1233241" source="BUGZILLA"/>
		<reference ref_id="1233253" ref_url="https://bugzilla.suse.com/1233253" source="BUGZILLA"/>
		<reference ref_id="1233255" ref_url="https://bugzilla.suse.com/1233255" source="BUGZILLA"/>
		<reference ref_id="1233293" ref_url="https://bugzilla.suse.com/1233293" source="BUGZILLA"/>
		<reference ref_id="1233350" ref_url="https://bugzilla.suse.com/1233350" source="BUGZILLA"/>
		<reference ref_id="1233452" ref_url="https://bugzilla.suse.com/1233452" source="BUGZILLA"/>
		<reference ref_id="1233453" ref_url="https://bugzilla.suse.com/1233453" source="BUGZILLA"/>
		<reference ref_id="1233454" ref_url="https://bugzilla.suse.com/1233454" source="BUGZILLA"/>
		<reference ref_id="1233456" ref_url="https://bugzilla.suse.com/1233456" source="BUGZILLA"/>
		<reference ref_id="1233457" ref_url="https://bugzilla.suse.com/1233457" source="BUGZILLA"/>
		<reference ref_id="1233458" ref_url="https://bugzilla.suse.com/1233458" source="BUGZILLA"/>
		<reference ref_id="1233460" ref_url="https://bugzilla.suse.com/1233460" source="BUGZILLA"/>
		<reference ref_id="1233462" ref_url="https://bugzilla.suse.com/1233462" source="BUGZILLA"/>
		<reference ref_id="1233463" ref_url="https://bugzilla.suse.com/1233463" source="BUGZILLA"/>
		<reference ref_id="1233468" ref_url="https://bugzilla.suse.com/1233468" source="BUGZILLA"/>
		<reference ref_id="1233471" ref_url="https://bugzilla.suse.com/1233471" source="BUGZILLA"/>
		<reference ref_id="1233476" ref_url="https://bugzilla.suse.com/1233476" source="BUGZILLA"/>
		<reference ref_id="1233478" ref_url="https://bugzilla.suse.com/1233478" source="BUGZILLA"/>
		<reference ref_id="1233479" ref_url="https://bugzilla.suse.com/1233479" source="BUGZILLA"/>
		<reference ref_id="1233481" ref_url="https://bugzilla.suse.com/1233481" source="BUGZILLA"/>
		<reference ref_id="1233484" ref_url="https://bugzilla.suse.com/1233484" source="BUGZILLA"/>
		<reference ref_id="1233487" ref_url="https://bugzilla.suse.com/1233487" source="BUGZILLA"/>
		<reference ref_id="1233490" ref_url="https://bugzilla.suse.com/1233490" source="BUGZILLA"/>
		<reference ref_id="1233491" ref_url="https://bugzilla.suse.com/1233491" source="BUGZILLA"/>
		<reference ref_id="1233528" ref_url="https://bugzilla.suse.com/1233528" source="BUGZILLA"/>
		<reference ref_id="1233548" ref_url="https://bugzilla.suse.com/1233548" source="BUGZILLA"/>
		<reference ref_id="1233552" ref_url="https://bugzilla.suse.com/1233552" source="BUGZILLA"/>
		<reference ref_id="1233553" ref_url="https://bugzilla.suse.com/1233553" source="BUGZILLA"/>
		<reference ref_id="1233554" ref_url="https://bugzilla.suse.com/1233554" source="BUGZILLA"/>
		<reference ref_id="1233555" ref_url="https://bugzilla.suse.com/1233555" source="BUGZILLA"/>
		<reference ref_id="1233557" ref_url="https://bugzilla.suse.com/1233557" source="BUGZILLA"/>
		<reference ref_id="1233560" ref_url="https://bugzilla.suse.com/1233560" source="BUGZILLA"/>
		<reference ref_id="1233561" ref_url="https://bugzilla.suse.com/1233561" source="BUGZILLA"/>
		<reference ref_id="1233570" ref_url="https://bugzilla.suse.com/1233570" source="BUGZILLA"/>
		<reference ref_id="1233577" ref_url="https://bugzilla.suse.com/1233577" source="BUGZILLA"/>
		<reference ref_id="1233580" ref_url="https://bugzilla.suse.com/1233580" source="BUGZILLA"/>
		<reference ref_id="1233977" ref_url="https://bugzilla.suse.com/1233977" source="BUGZILLA"/>
		<reference ref_id="1234012" ref_url="https://bugzilla.suse.com/1234012" source="BUGZILLA"/>
		<reference ref_id="1234025" ref_url="https://bugzilla.suse.com/1234025" source="BUGZILLA"/>
		<reference ref_id="1234085" ref_url="https://bugzilla.suse.com/1234085" source="BUGZILLA"/>
		<reference ref_id="1234093" ref_url="https://bugzilla.suse.com/1234093" source="BUGZILLA"/>
		<reference ref_id="1234098" ref_url="https://bugzilla.suse.com/1234098" source="BUGZILLA"/>
		<reference ref_id="1234108" ref_url="https://bugzilla.suse.com/1234108" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-47416" ref_url="https://www.suse.com/security/cve/CVE-2021-47416/" source="CVE"/>
		<reference ref_id="CVE-2021-47534" ref_url="https://www.suse.com/security/cve/CVE-2021-47534/" source="CVE"/>
		<reference ref_id="CVE-2021-47594" ref_url="https://www.suse.com/security/cve/CVE-2021-47594/" source="CVE"/>
		<reference ref_id="CVE-2022-3435" ref_url="https://www.suse.com/security/cve/CVE-2022-3435/" source="CVE"/>
		<reference ref_id="CVE-2022-45934" ref_url="https://www.suse.com/security/cve/CVE-2022-45934/" source="CVE"/>
		<reference ref_id="CVE-2022-48664" ref_url="https://www.suse.com/security/cve/CVE-2022-48664/" source="CVE"/>
		<reference ref_id="CVE-2022-48674" ref_url="https://www.suse.com/security/cve/CVE-2022-48674/" source="CVE"/>
		<reference ref_id="CVE-2022-48879" ref_url="https://www.suse.com/security/cve/CVE-2022-48879/" source="CVE"/>
		<reference ref_id="CVE-2022-48946" ref_url="https://www.suse.com/security/cve/CVE-2022-48946/" source="CVE"/>
		<reference ref_id="CVE-2022-48947" ref_url="https://www.suse.com/security/cve/CVE-2022-48947/" source="CVE"/>
		<reference ref_id="CVE-2022-48948" ref_url="https://www.suse.com/security/cve/CVE-2022-48948/" source="CVE"/>
		<reference ref_id="CVE-2022-48949" ref_url="https://www.suse.com/security/cve/CVE-2022-48949/" source="CVE"/>
		<reference ref_id="CVE-2022-48951" ref_url="https://www.suse.com/security/cve/CVE-2022-48951/" source="CVE"/>
		<reference ref_id="CVE-2022-48953" ref_url="https://www.suse.com/security/cve/CVE-2022-48953/" source="CVE"/>
		<reference ref_id="CVE-2022-48954" ref_url="https://www.suse.com/security/cve/CVE-2022-48954/" source="CVE"/>
		<reference ref_id="CVE-2022-48955" ref_url="https://www.suse.com/security/cve/CVE-2022-48955/" source="CVE"/>
		<reference ref_id="CVE-2022-48956" ref_url="https://www.suse.com/security/cve/CVE-2022-48956/" source="CVE"/>
		<reference ref_id="CVE-2022-48957" ref_url="https://www.suse.com/security/cve/CVE-2022-48957/" source="CVE"/>
		<reference ref_id="CVE-2022-48958" ref_url="https://www.suse.com/security/cve/CVE-2022-48958/" source="CVE"/>
		<reference ref_id="CVE-2022-48959" ref_url="https://www.suse.com/security/cve/CVE-2022-48959/" source="CVE"/>
		<reference ref_id="CVE-2022-48960" ref_url="https://www.suse.com/security/cve/CVE-2022-48960/" source="CVE"/>
		<reference ref_id="CVE-2022-48961" ref_url="https://www.suse.com/security/cve/CVE-2022-48961/" source="CVE"/>
		<reference ref_id="CVE-2022-48962" ref_url="https://www.suse.com/security/cve/CVE-2022-48962/" source="CVE"/>
		<reference ref_id="CVE-2022-48966" ref_url="https://www.suse.com/security/cve/CVE-2022-48966/" source="CVE"/>
		<reference ref_id="CVE-2022-48967" ref_url="https://www.suse.com/security/cve/CVE-2022-48967/" source="CVE"/>
		<reference ref_id="CVE-2022-48968" ref_url="https://www.suse.com/security/cve/CVE-2022-48968/" source="CVE"/>
		<reference ref_id="CVE-2022-48969" ref_url="https://www.suse.com/security/cve/CVE-2022-48969/" source="CVE"/>
		<reference ref_id="CVE-2022-48970" ref_url="https://www.suse.com/security/cve/CVE-2022-48970/" source="CVE"/>
		<reference ref_id="CVE-2022-48971" ref_url="https://www.suse.com/security/cve/CVE-2022-48971/" source="CVE"/>
		<reference ref_id="CVE-2022-48972" ref_url="https://www.suse.com/security/cve/CVE-2022-48972/" source="CVE"/>
		<reference ref_id="CVE-2022-48973" ref_url="https://www.suse.com/security/cve/CVE-2022-48973/" source="CVE"/>
		<reference ref_id="CVE-2022-48975" ref_url="https://www.suse.com/security/cve/CVE-2022-48975/" source="CVE"/>
		<reference ref_id="CVE-2022-48977" ref_url="https://www.suse.com/security/cve/CVE-2022-48977/" source="CVE"/>
		<reference ref_id="CVE-2022-48978" ref_url="https://www.suse.com/security/cve/CVE-2022-48978/" source="CVE"/>
		<reference ref_id="CVE-2022-48979" ref_url="https://www.suse.com/security/cve/CVE-2022-48979/" source="CVE"/>
		<reference ref_id="CVE-2022-48980" ref_url="https://www.suse.com/security/cve/CVE-2022-48980/" source="CVE"/>
		<reference ref_id="CVE-2022-48981" ref_url="https://www.suse.com/security/cve/CVE-2022-48981/" source="CVE"/>
		<reference ref_id="CVE-2022-48982" ref_url="https://www.suse.com/security/cve/CVE-2022-48982/" source="CVE"/>
		<reference ref_id="CVE-2022-48983" ref_url="https://www.suse.com/security/cve/CVE-2022-48983/" source="CVE"/>
		<reference ref_id="CVE-2022-48985" ref_url="https://www.suse.com/security/cve/CVE-2022-48985/" source="CVE"/>
		<reference ref_id="CVE-2022-48987" ref_url="https://www.suse.com/security/cve/CVE-2022-48987/" source="CVE"/>
		<reference ref_id="CVE-2022-48988" ref_url="https://www.suse.com/security/cve/CVE-2022-48988/" source="CVE"/>
		<reference ref_id="CVE-2022-48989" ref_url="https://www.suse.com/security/cve/CVE-2022-48989/" source="CVE"/>
		<reference ref_id="CVE-2022-48990" ref_url="https://www.suse.com/security/cve/CVE-2022-48990/" source="CVE"/>
		<reference ref_id="CVE-2022-48991" ref_url="https://www.suse.com/security/cve/CVE-2022-48991/" source="CVE"/>
		<reference ref_id="CVE-2022-48992" ref_url="https://www.suse.com/security/cve/CVE-2022-48992/" source="CVE"/>
		<reference ref_id="CVE-2022-48994" ref_url="https://www.suse.com/security/cve/CVE-2022-48994/" source="CVE"/>
		<reference ref_id="CVE-2022-48995" ref_url="https://www.suse.com/security/cve/CVE-2022-48995/" source="CVE"/>
		<reference ref_id="CVE-2022-48997" ref_url="https://www.suse.com/security/cve/CVE-2022-48997/" source="CVE"/>
		<reference ref_id="CVE-2022-48999" ref_url="https://www.suse.com/security/cve/CVE-2022-48999/" source="CVE"/>
		<reference ref_id="CVE-2022-49000" ref_url="https://www.suse.com/security/cve/CVE-2022-49000/" source="CVE"/>
		<reference ref_id="CVE-2022-49002" ref_url="https://www.suse.com/security/cve/CVE-2022-49002/" source="CVE"/>
		<reference ref_id="CVE-2022-49003" ref_url="https://www.suse.com/security/cve/CVE-2022-49003/" source="CVE"/>
		<reference ref_id="CVE-2022-49005" ref_url="https://www.suse.com/security/cve/CVE-2022-49005/" source="CVE"/>
		<reference ref_id="CVE-2022-49006" ref_url="https://www.suse.com/security/cve/CVE-2022-49006/" source="CVE"/>
		<reference ref_id="CVE-2022-49007" ref_url="https://www.suse.com/security/cve/CVE-2022-49007/" source="CVE"/>
		<reference ref_id="CVE-2022-49010" ref_url="https://www.suse.com/security/cve/CVE-2022-49010/" source="CVE"/>
		<reference ref_id="CVE-2022-49011" ref_url="https://www.suse.com/security/cve/CVE-2022-49011/" source="CVE"/>
		<reference ref_id="CVE-2022-49012" ref_url="https://www.suse.com/security/cve/CVE-2022-49012/" source="CVE"/>
		<reference ref_id="CVE-2022-49014" ref_url="https://www.suse.com/security/cve/CVE-2022-49014/" source="CVE"/>
		<reference ref_id="CVE-2022-49015" ref_url="https://www.suse.com/security/cve/CVE-2022-49015/" source="CVE"/>
		<reference ref_id="CVE-2022-49016" ref_url="https://www.suse.com/security/cve/CVE-2022-49016/" source="CVE"/>
		<reference ref_id="CVE-2022-49017" ref_url="https://www.suse.com/security/cve/CVE-2022-49017/" source="CVE"/>
		<reference ref_id="CVE-2022-49019" ref_url="https://www.suse.com/security/cve/CVE-2022-49019/" source="CVE"/>
		<reference ref_id="CVE-2022-49020" ref_url="https://www.suse.com/security/cve/CVE-2022-49020/" source="CVE"/>
		<reference ref_id="CVE-2022-49021" ref_url="https://www.suse.com/security/cve/CVE-2022-49021/" source="CVE"/>
		<reference ref_id="CVE-2022-49022" ref_url="https://www.suse.com/security/cve/CVE-2022-49022/" source="CVE"/>
		<reference ref_id="CVE-2022-49023" ref_url="https://www.suse.com/security/cve/CVE-2022-49023/" source="CVE"/>
		<reference ref_id="CVE-2022-49024" ref_url="https://www.suse.com/security/cve/CVE-2022-49024/" source="CVE"/>
		<reference ref_id="CVE-2022-49025" ref_url="https://www.suse.com/security/cve/CVE-2022-49025/" source="CVE"/>
		<reference ref_id="CVE-2022-49026" ref_url="https://www.suse.com/security/cve/CVE-2022-49026/" source="CVE"/>
		<reference ref_id="CVE-2022-49027" ref_url="https://www.suse.com/security/cve/CVE-2022-49027/" source="CVE"/>
		<reference ref_id="CVE-2022-49028" ref_url="https://www.suse.com/security/cve/CVE-2022-49028/" source="CVE"/>
		<reference ref_id="CVE-2022-49029" ref_url="https://www.suse.com/security/cve/CVE-2022-49029/" source="CVE"/>
		<reference ref_id="CVE-2022-49031" ref_url="https://www.suse.com/security/cve/CVE-2022-49031/" source="CVE"/>
		<reference ref_id="CVE-2022-49032" ref_url="https://www.suse.com/security/cve/CVE-2022-49032/" source="CVE"/>
		<reference ref_id="CVE-2023-2166" ref_url="https://www.suse.com/security/cve/CVE-2023-2166/" source="CVE"/>
		<reference ref_id="CVE-2023-28327" ref_url="https://www.suse.com/security/cve/CVE-2023-28327/" source="CVE"/>
		<reference ref_id="CVE-2023-52766" ref_url="https://www.suse.com/security/cve/CVE-2023-52766/" source="CVE"/>
		<reference ref_id="CVE-2023-52800" ref_url="https://www.suse.com/security/cve/CVE-2023-52800/" source="CVE"/>
		<reference ref_id="CVE-2023-52881" ref_url="https://www.suse.com/security/cve/CVE-2023-52881/" source="CVE"/>
		<reference ref_id="CVE-2023-52915" ref_url="https://www.suse.com/security/cve/CVE-2023-52915/" source="CVE"/>
		<reference ref_id="CVE-2023-52917" ref_url="https://www.suse.com/security/cve/CVE-2023-52917/" source="CVE"/>
		<reference ref_id="CVE-2023-52918" ref_url="https://www.suse.com/security/cve/CVE-2023-52918/" source="CVE"/>
		<reference ref_id="CVE-2023-52919" ref_url="https://www.suse.com/security/cve/CVE-2023-52919/" source="CVE"/>
		<reference ref_id="CVE-2023-52921" ref_url="https://www.suse.com/security/cve/CVE-2023-52921/" source="CVE"/>
		<reference ref_id="CVE-2023-52922" ref_url="https://www.suse.com/security/cve/CVE-2023-52922/" source="CVE"/>
		<reference ref_id="CVE-2023-6270" ref_url="https://www.suse.com/security/cve/CVE-2023-6270/" source="CVE"/>
		<reference ref_id="CVE-2024-26782" ref_url="https://www.suse.com/security/cve/CVE-2024-26782/" source="CVE"/>
		<reference ref_id="CVE-2024-26906" ref_url="https://www.suse.com/security/cve/CVE-2024-26906/" source="CVE"/>
		<reference ref_id="CVE-2024-26953" ref_url="https://www.suse.com/security/cve/CVE-2024-26953/" source="CVE"/>
		<reference ref_id="CVE-2024-27043" ref_url="https://www.suse.com/security/cve/CVE-2024-27043/" source="CVE"/>
		<reference ref_id="CVE-2024-35888" ref_url="https://www.suse.com/security/cve/CVE-2024-35888/" source="CVE"/>
		<reference ref_id="CVE-2024-35937" ref_url="https://www.suse.com/security/cve/CVE-2024-35937/" source="CVE"/>
		<reference ref_id="CVE-2024-35980" ref_url="https://www.suse.com/security/cve/CVE-2024-35980/" source="CVE"/>
		<reference ref_id="CVE-2024-36244" ref_url="https://www.suse.com/security/cve/CVE-2024-36244/" source="CVE"/>
		<reference ref_id="CVE-2024-36484" ref_url="https://www.suse.com/security/cve/CVE-2024-36484/" source="CVE"/>
		<reference ref_id="CVE-2024-36883" ref_url="https://www.suse.com/security/cve/CVE-2024-36883/" source="CVE"/>
		<reference ref_id="CVE-2024-36886" ref_url="https://www.suse.com/security/cve/CVE-2024-36886/" source="CVE"/>
		<reference ref_id="CVE-2024-36905" ref_url="https://www.suse.com/security/cve/CVE-2024-36905/" source="CVE"/>
		<reference ref_id="CVE-2024-36953" ref_url="https://www.suse.com/security/cve/CVE-2024-36953/" source="CVE"/>
		<reference ref_id="CVE-2024-36954" ref_url="https://www.suse.com/security/cve/CVE-2024-36954/" source="CVE"/>
		<reference ref_id="CVE-2024-36957" ref_url="https://www.suse.com/security/cve/CVE-2024-36957/" source="CVE"/>
		<reference ref_id="CVE-2024-38577" ref_url="https://www.suse.com/security/cve/CVE-2024-38577/" source="CVE"/>
		<reference ref_id="CVE-2024-38589" ref_url="https://www.suse.com/security/cve/CVE-2024-38589/" source="CVE"/>
		<reference ref_id="CVE-2024-38615" ref_url="https://www.suse.com/security/cve/CVE-2024-38615/" source="CVE"/>
		<reference ref_id="CVE-2024-39476" ref_url="https://www.suse.com/security/cve/CVE-2024-39476/" source="CVE"/>
		<reference ref_id="CVE-2024-40965" ref_url="https://www.suse.com/security/cve/CVE-2024-40965/" source="CVE"/>
		<reference ref_id="CVE-2024-40997" ref_url="https://www.suse.com/security/cve/CVE-2024-40997/" source="CVE"/>
		<reference ref_id="CVE-2024-41016" ref_url="https://www.suse.com/security/cve/CVE-2024-41016/" source="CVE"/>
		<reference ref_id="CVE-2024-41023" ref_url="https://www.suse.com/security/cve/CVE-2024-41023/" source="CVE"/>
		<reference ref_id="CVE-2024-41049" ref_url="https://www.suse.com/security/cve/CVE-2024-41049/" source="CVE"/>
		<reference ref_id="CVE-2024-42131" ref_url="https://www.suse.com/security/cve/CVE-2024-42131/" source="CVE"/>
		<reference ref_id="CVE-2024-42145" ref_url="https://www.suse.com/security/cve/CVE-2024-42145/" source="CVE"/>
		<reference ref_id="CVE-2024-42226" ref_url="https://www.suse.com/security/cve/CVE-2024-42226/" source="CVE"/>
		<reference ref_id="CVE-2024-42253" ref_url="https://www.suse.com/security/cve/CVE-2024-42253/" source="CVE"/>
		<reference ref_id="CVE-2024-43817" ref_url="https://www.suse.com/security/cve/CVE-2024-43817/" source="CVE"/>
		<reference ref_id="CVE-2024-43897" ref_url="https://www.suse.com/security/cve/CVE-2024-43897/" source="CVE"/>
		<reference ref_id="CVE-2024-44931" ref_url="https://www.suse.com/security/cve/CVE-2024-44931/" source="CVE"/>
		<reference ref_id="CVE-2024-44932" ref_url="https://www.suse.com/security/cve/CVE-2024-44932/" source="CVE"/>
		<reference ref_id="CVE-2024-44947" ref_url="https://www.suse.com/security/cve/CVE-2024-44947/" source="CVE"/>
		<reference ref_id="CVE-2024-44958" ref_url="https://www.suse.com/security/cve/CVE-2024-44958/" source="CVE"/>
		<reference ref_id="CVE-2024-44964" ref_url="https://www.suse.com/security/cve/CVE-2024-44964/" source="CVE"/>
		<reference ref_id="CVE-2024-44995" ref_url="https://www.suse.com/security/cve/CVE-2024-44995/" source="CVE"/>
		<reference ref_id="CVE-2024-45016" ref_url="https://www.suse.com/security/cve/CVE-2024-45016/" source="CVE"/>
		<reference ref_id="CVE-2024-45025" ref_url="https://www.suse.com/security/cve/CVE-2024-45025/" source="CVE"/>
		<reference ref_id="CVE-2024-46678" ref_url="https://www.suse.com/security/cve/CVE-2024-46678/" source="CVE"/>
		<reference ref_id="CVE-2024-46681" ref_url="https://www.suse.com/security/cve/CVE-2024-46681/" source="CVE"/>
		<reference ref_id="CVE-2024-46716" ref_url="https://www.suse.com/security/cve/CVE-2024-46716/" source="CVE"/>
		<reference ref_id="CVE-2024-46719" ref_url="https://www.suse.com/security/cve/CVE-2024-46719/" source="CVE"/>
		<reference ref_id="CVE-2024-46754" ref_url="https://www.suse.com/security/cve/CVE-2024-46754/" source="CVE"/>
		<reference ref_id="CVE-2024-46770" ref_url="https://www.suse.com/security/cve/CVE-2024-46770/" source="CVE"/>
		<reference ref_id="CVE-2024-46775" ref_url="https://www.suse.com/security/cve/CVE-2024-46775/" source="CVE"/>
		<reference ref_id="CVE-2024-46777" ref_url="https://www.suse.com/security/cve/CVE-2024-46777/" source="CVE"/>
		<reference ref_id="CVE-2024-46800" ref_url="https://www.suse.com/security/cve/CVE-2024-46800/" source="CVE"/>
		<reference ref_id="CVE-2024-46802" ref_url="https://www.suse.com/security/cve/CVE-2024-46802/" source="CVE"/>
		<reference ref_id="CVE-2024-46804" ref_url="https://www.suse.com/security/cve/CVE-2024-46804/" source="CVE"/>
		<reference ref_id="CVE-2024-46805" ref_url="https://www.suse.com/security/cve/CVE-2024-46805/" source="CVE"/>
		<reference ref_id="CVE-2024-46807" ref_url="https://www.suse.com/security/cve/CVE-2024-46807/" source="CVE"/>
		<reference ref_id="CVE-2024-46809" ref_url="https://www.suse.com/security/cve/CVE-2024-46809/" source="CVE"/>
		<reference ref_id="CVE-2024-46810" ref_url="https://www.suse.com/security/cve/CVE-2024-46810/" source="CVE"/>
		<reference ref_id="CVE-2024-46811" ref_url="https://www.suse.com/security/cve/CVE-2024-46811/" source="CVE"/>
		<reference ref_id="CVE-2024-46812" ref_url="https://www.suse.com/security/cve/CVE-2024-46812/" source="CVE"/>
		<reference ref_id="CVE-2024-46813" ref_url="https://www.suse.com/security/cve/CVE-2024-46813/" source="CVE"/>
		<reference ref_id="CVE-2024-46814" ref_url="https://www.suse.com/security/cve/CVE-2024-46814/" source="CVE"/>
		<reference ref_id="CVE-2024-46815" ref_url="https://www.suse.com/security/cve/CVE-2024-46815/" source="CVE"/>
		<reference ref_id="CVE-2024-46816" ref_url="https://www.suse.com/security/cve/CVE-2024-46816/" source="CVE"/>
		<reference ref_id="CVE-2024-46817" ref_url="https://www.suse.com/security/cve/CVE-2024-46817/" source="CVE"/>
		<reference ref_id="CVE-2024-46818" ref_url="https://www.suse.com/security/cve/CVE-2024-46818/" source="CVE"/>
		<reference ref_id="CVE-2024-46819" ref_url="https://www.suse.com/security/cve/CVE-2024-46819/" source="CVE"/>
		<reference ref_id="CVE-2024-46821" ref_url="https://www.suse.com/security/cve/CVE-2024-46821/" source="CVE"/>
		<reference ref_id="CVE-2024-46826" ref_url="https://www.suse.com/security/cve/CVE-2024-46826/" source="CVE"/>
		<reference ref_id="CVE-2024-46828" ref_url="https://www.suse.com/security/cve/CVE-2024-46828/" source="CVE"/>
		<reference ref_id="CVE-2024-46834" ref_url="https://www.suse.com/security/cve/CVE-2024-46834/" source="CVE"/>
		<reference ref_id="CVE-2024-46835" ref_url="https://www.suse.com/security/cve/CVE-2024-46835/" source="CVE"/>
		<reference ref_id="CVE-2024-46840" ref_url="https://www.suse.com/security/cve/CVE-2024-46840/" source="CVE"/>
		<reference ref_id="CVE-2024-46841" ref_url="https://www.suse.com/security/cve/CVE-2024-46841/" source="CVE"/>
		<reference ref_id="CVE-2024-46842" ref_url="https://www.suse.com/security/cve/CVE-2024-46842/" source="CVE"/>
		<reference ref_id="CVE-2024-46848" ref_url="https://www.suse.com/security/cve/CVE-2024-46848/" source="CVE"/>
		<reference ref_id="CVE-2024-46849" ref_url="https://www.suse.com/security/cve/CVE-2024-46849/" source="CVE"/>
		<reference ref_id="CVE-2024-46853" ref_url="https://www.suse.com/security/cve/CVE-2024-46853/" source="CVE"/>
		<reference ref_id="CVE-2024-46854" ref_url="https://www.suse.com/security/cve/CVE-2024-46854/" source="CVE"/>
		<reference ref_id="CVE-2024-46855" ref_url="https://www.suse.com/security/cve/CVE-2024-46855/" source="CVE"/>
		<reference ref_id="CVE-2024-46857" ref_url="https://www.suse.com/security/cve/CVE-2024-46857/" source="CVE"/>
		<reference ref_id="CVE-2024-46859" ref_url="https://www.suse.com/security/cve/CVE-2024-46859/" source="CVE"/>
		<reference ref_id="CVE-2024-46864" ref_url="https://www.suse.com/security/cve/CVE-2024-46864/" source="CVE"/>
		<reference ref_id="CVE-2024-46871" ref_url="https://www.suse.com/security/cve/CVE-2024-46871/" source="CVE"/>
		<reference ref_id="CVE-2024-47660" ref_url="https://www.suse.com/security/cve/CVE-2024-47660/" source="CVE"/>
		<reference ref_id="CVE-2024-47661" ref_url="https://www.suse.com/security/cve/CVE-2024-47661/" source="CVE"/>
		<reference ref_id="CVE-2024-47663" ref_url="https://www.suse.com/security/cve/CVE-2024-47663/" source="CVE"/>
		<reference ref_id="CVE-2024-47664" ref_url="https://www.suse.com/security/cve/CVE-2024-47664/" source="CVE"/>
		<reference ref_id="CVE-2024-47665" ref_url="https://www.suse.com/security/cve/CVE-2024-47665/" source="CVE"/>
		<reference ref_id="CVE-2024-47667" ref_url="https://www.suse.com/security/cve/CVE-2024-47667/" source="CVE"/>
		<reference ref_id="CVE-2024-47668" ref_url="https://www.suse.com/security/cve/CVE-2024-47668/" source="CVE"/>
		<reference ref_id="CVE-2024-47669" ref_url="https://www.suse.com/security/cve/CVE-2024-47669/" source="CVE"/>
		<reference ref_id="CVE-2024-47670" ref_url="https://www.suse.com/security/cve/CVE-2024-47670/" source="CVE"/>
		<reference ref_id="CVE-2024-47671" ref_url="https://www.suse.com/security/cve/CVE-2024-47671/" source="CVE"/>
		<reference ref_id="CVE-2024-47672" ref_url="https://www.suse.com/security/cve/CVE-2024-47672/" source="CVE"/>
		<reference ref_id="CVE-2024-47673" ref_url="https://www.suse.com/security/cve/CVE-2024-47673/" source="CVE"/>
		<reference ref_id="CVE-2024-47674" ref_url="https://www.suse.com/security/cve/CVE-2024-47674/" source="CVE"/>
		<reference ref_id="CVE-2024-47679" ref_url="https://www.suse.com/security/cve/CVE-2024-47679/" source="CVE"/>
		<reference ref_id="CVE-2024-47682" ref_url="https://www.suse.com/security/cve/CVE-2024-47682/" source="CVE"/>
		<reference ref_id="CVE-2024-47684" ref_url="https://www.suse.com/security/cve/CVE-2024-47684/" source="CVE"/>
		<reference ref_id="CVE-2024-47685" ref_url="https://www.suse.com/security/cve/CVE-2024-47685/" source="CVE"/>
		<reference ref_id="CVE-2024-47692" ref_url="https://www.suse.com/security/cve/CVE-2024-47692/" source="CVE"/>
		<reference ref_id="CVE-2024-47693" ref_url="https://www.suse.com/security/cve/CVE-2024-47693/" source="CVE"/>
		<reference ref_id="CVE-2024-47695" ref_url="https://www.suse.com/security/cve/CVE-2024-47695/" source="CVE"/>
		<reference ref_id="CVE-2024-47696" ref_url="https://www.suse.com/security/cve/CVE-2024-47696/" source="CVE"/>
		<reference ref_id="CVE-2024-47697" ref_url="https://www.suse.com/security/cve/CVE-2024-47697/" source="CVE"/>
		<reference ref_id="CVE-2024-47698" ref_url="https://www.suse.com/security/cve/CVE-2024-47698/" source="CVE"/>
		<reference ref_id="CVE-2024-47699" ref_url="https://www.suse.com/security/cve/CVE-2024-47699/" source="CVE"/>
		<reference ref_id="CVE-2024-47701" ref_url="https://www.suse.com/security/cve/CVE-2024-47701/" source="CVE"/>
		<reference ref_id="CVE-2024-47704" ref_url="https://www.suse.com/security/cve/CVE-2024-47704/" source="CVE"/>
		<reference ref_id="CVE-2024-47705" ref_url="https://www.suse.com/security/cve/CVE-2024-47705/" source="CVE"/>
		<reference ref_id="CVE-2024-47706" ref_url="https://www.suse.com/security/cve/CVE-2024-47706/" source="CVE"/>
		<reference ref_id="CVE-2024-47707" ref_url="https://www.suse.com/security/cve/CVE-2024-47707/" source="CVE"/>
		<reference ref_id="CVE-2024-47709" ref_url="https://www.suse.com/security/cve/CVE-2024-47709/" source="CVE"/>
		<reference ref_id="CVE-2024-47710" ref_url="https://www.suse.com/security/cve/CVE-2024-47710/" source="CVE"/>
		<reference ref_id="CVE-2024-47712" ref_url="https://www.suse.com/security/cve/CVE-2024-47712/" source="CVE"/>
		<reference ref_id="CVE-2024-47713" ref_url="https://www.suse.com/security/cve/CVE-2024-47713/" source="CVE"/>
		<reference ref_id="CVE-2024-47718" ref_url="https://www.suse.com/security/cve/CVE-2024-47718/" source="CVE"/>
		<reference ref_id="CVE-2024-47720" ref_url="https://www.suse.com/security/cve/CVE-2024-47720/" source="CVE"/>
		<reference ref_id="CVE-2024-47723" ref_url="https://www.suse.com/security/cve/CVE-2024-47723/" source="CVE"/>
		<reference ref_id="CVE-2024-47727" ref_url="https://www.suse.com/security/cve/CVE-2024-47727/" source="CVE"/>
		<reference ref_id="CVE-2024-47728" ref_url="https://www.suse.com/security/cve/CVE-2024-47728/" source="CVE"/>
		<reference ref_id="CVE-2024-47730" ref_url="https://www.suse.com/security/cve/CVE-2024-47730/" source="CVE"/>
		<reference ref_id="CVE-2024-47735" ref_url="https://www.suse.com/security/cve/CVE-2024-47735/" source="CVE"/>
		<reference ref_id="CVE-2024-47737" ref_url="https://www.suse.com/security/cve/CVE-2024-47737/" source="CVE"/>
		<reference ref_id="CVE-2024-47738" ref_url="https://www.suse.com/security/cve/CVE-2024-47738/" source="CVE"/>
		<reference ref_id="CVE-2024-47739" ref_url="https://www.suse.com/security/cve/CVE-2024-47739/" source="CVE"/>
		<reference ref_id="CVE-2024-47742" ref_url="https://www.suse.com/security/cve/CVE-2024-47742/" source="CVE"/>
		<reference ref_id="CVE-2024-47745" ref_url="https://www.suse.com/security/cve/CVE-2024-47745/" source="CVE"/>
		<reference ref_id="CVE-2024-47747" ref_url="https://www.suse.com/security/cve/CVE-2024-47747/" source="CVE"/>
		<reference ref_id="CVE-2024-47748" ref_url="https://www.suse.com/security/cve/CVE-2024-47748/" source="CVE"/>
		<reference ref_id="CVE-2024-47749" ref_url="https://www.suse.com/security/cve/CVE-2024-47749/" source="CVE"/>
		<reference ref_id="CVE-2024-47756" ref_url="https://www.suse.com/security/cve/CVE-2024-47756/" source="CVE"/>
		<reference ref_id="CVE-2024-47757" ref_url="https://www.suse.com/security/cve/CVE-2024-47757/" source="CVE"/>
		<reference ref_id="CVE-2024-49850" ref_url="https://www.suse.com/security/cve/CVE-2024-49850/" source="CVE"/>
		<reference ref_id="CVE-2024-49851" ref_url="https://www.suse.com/security/cve/CVE-2024-49851/" source="CVE"/>
		<reference ref_id="CVE-2024-49852" ref_url="https://www.suse.com/security/cve/CVE-2024-49852/" source="CVE"/>
		<reference ref_id="CVE-2024-49855" ref_url="https://www.suse.com/security/cve/CVE-2024-49855/" source="CVE"/>
		<reference ref_id="CVE-2024-49858" ref_url="https://www.suse.com/security/cve/CVE-2024-49858/" source="CVE"/>
		<reference ref_id="CVE-2024-49860" ref_url="https://www.suse.com/security/cve/CVE-2024-49860/" source="CVE"/>
		<reference ref_id="CVE-2024-49861" ref_url="https://www.suse.com/security/cve/CVE-2024-49861/" source="CVE"/>
		<reference ref_id="CVE-2024-49863" ref_url="https://www.suse.com/security/cve/CVE-2024-49863/" source="CVE"/>
		<reference ref_id="CVE-2024-49866" ref_url="https://www.suse.com/security/cve/CVE-2024-49866/" source="CVE"/>
		<reference ref_id="CVE-2024-49867" ref_url="https://www.suse.com/security/cve/CVE-2024-49867/" source="CVE"/>
		<reference ref_id="CVE-2024-49868" ref_url="https://www.suse.com/security/cve/CVE-2024-49868/" source="CVE"/>
		<reference ref_id="CVE-2024-49870" ref_url="https://www.suse.com/security/cve/CVE-2024-49870/" source="CVE"/>
		<reference ref_id="CVE-2024-49871" ref_url="https://www.suse.com/security/cve/CVE-2024-49871/" source="CVE"/>
		<reference ref_id="CVE-2024-49875" ref_url="https://www.suse.com/security/cve/CVE-2024-49875/" source="CVE"/>
		<reference ref_id="CVE-2024-49877" ref_url="https://www.suse.com/security/cve/CVE-2024-49877/" source="CVE"/>
		<reference ref_id="CVE-2024-49879" ref_url="https://www.suse.com/security/cve/CVE-2024-49879/" source="CVE"/>
		<reference ref_id="CVE-2024-49881" ref_url="https://www.suse.com/security/cve/CVE-2024-49881/" source="CVE"/>
		<reference ref_id="CVE-2024-49882" ref_url="https://www.suse.com/security/cve/CVE-2024-49882/" source="CVE"/>
		<reference ref_id="CVE-2024-49883" ref_url="https://www.suse.com/security/cve/CVE-2024-49883/" source="CVE"/>
		<reference ref_id="CVE-2024-49884" ref_url="https://www.suse.com/security/cve/CVE-2024-49884/" source="CVE"/>
		<reference ref_id="CVE-2024-49886" ref_url="https://www.suse.com/security/cve/CVE-2024-49886/" source="CVE"/>
		<reference ref_id="CVE-2024-49890" ref_url="https://www.suse.com/security/cve/CVE-2024-49890/" source="CVE"/>
		<reference ref_id="CVE-2024-49891" ref_url="https://www.suse.com/security/cve/CVE-2024-49891/" source="CVE"/>
		<reference ref_id="CVE-2024-49892" ref_url="https://www.suse.com/security/cve/CVE-2024-49892/" source="CVE"/>
		<reference ref_id="CVE-2024-49894" ref_url="https://www.suse.com/security/cve/CVE-2024-49894/" source="CVE"/>
		<reference ref_id="CVE-2024-49895" ref_url="https://www.suse.com/security/cve/CVE-2024-49895/" source="CVE"/>
		<reference ref_id="CVE-2024-49896" ref_url="https://www.suse.com/security/cve/CVE-2024-49896/" source="CVE"/>
		<reference ref_id="CVE-2024-49897" ref_url="https://www.suse.com/security/cve/CVE-2024-49897/" source="CVE"/>
		<reference ref_id="CVE-2024-49899" ref_url="https://www.suse.com/security/cve/CVE-2024-49899/" source="CVE"/>
		<reference ref_id="CVE-2024-49900" ref_url="https://www.suse.com/security/cve/CVE-2024-49900/" source="CVE"/>
		<reference ref_id="CVE-2024-49901" ref_url="https://www.suse.com/security/cve/CVE-2024-49901/" source="CVE"/>
		<reference ref_id="CVE-2024-49902" ref_url="https://www.suse.com/security/cve/CVE-2024-49902/" source="CVE"/>
		<reference ref_id="CVE-2024-49903" ref_url="https://www.suse.com/security/cve/CVE-2024-49903/" source="CVE"/>
		<reference ref_id="CVE-2024-49905" ref_url="https://www.suse.com/security/cve/CVE-2024-49905/" source="CVE"/>
		<reference ref_id="CVE-2024-49906" ref_url="https://www.suse.com/security/cve/CVE-2024-49906/" source="CVE"/>
		<reference ref_id="CVE-2024-49907" ref_url="https://www.suse.com/security/cve/CVE-2024-49907/" source="CVE"/>
		<reference ref_id="CVE-2024-49908" ref_url="https://www.suse.com/security/cve/CVE-2024-49908/" source="CVE"/>
		<reference ref_id="CVE-2024-49909" ref_url="https://www.suse.com/security/cve/CVE-2024-49909/" source="CVE"/>
		<reference ref_id="CVE-2024-49911" ref_url="https://www.suse.com/security/cve/CVE-2024-49911/" source="CVE"/>
		<reference ref_id="CVE-2024-49912" ref_url="https://www.suse.com/security/cve/CVE-2024-49912/" source="CVE"/>
		<reference ref_id="CVE-2024-49913" ref_url="https://www.suse.com/security/cve/CVE-2024-49913/" source="CVE"/>
		<reference ref_id="CVE-2024-49914" ref_url="https://www.suse.com/security/cve/CVE-2024-49914/" source="CVE"/>
		<reference ref_id="CVE-2024-49917" ref_url="https://www.suse.com/security/cve/CVE-2024-49917/" source="CVE"/>
		<reference ref_id="CVE-2024-49918" ref_url="https://www.suse.com/security/cve/CVE-2024-49918/" source="CVE"/>
		<reference ref_id="CVE-2024-49919" ref_url="https://www.suse.com/security/cve/CVE-2024-49919/" source="CVE"/>
		<reference ref_id="CVE-2024-49920" ref_url="https://www.suse.com/security/cve/CVE-2024-49920/" source="CVE"/>
		<reference ref_id="CVE-2024-49921" ref_url="https://www.suse.com/security/cve/CVE-2024-49921/" source="CVE"/>
		<reference ref_id="CVE-2024-49922" ref_url="https://www.suse.com/security/cve/CVE-2024-49922/" source="CVE"/>
		<reference ref_id="CVE-2024-49923" ref_url="https://www.suse.com/security/cve/CVE-2024-49923/" source="CVE"/>
		<reference ref_id="CVE-2024-49924" ref_url="https://www.suse.com/security/cve/CVE-2024-49924/" source="CVE"/>
		<reference ref_id="CVE-2024-49925" ref_url="https://www.suse.com/security/cve/CVE-2024-49925/" source="CVE"/>
		<reference ref_id="CVE-2024-49929" ref_url="https://www.suse.com/security/cve/CVE-2024-49929/" source="CVE"/>
		<reference ref_id="CVE-2024-49930" ref_url="https://www.suse.com/security/cve/CVE-2024-49930/" source="CVE"/>
		<reference ref_id="CVE-2024-49933" ref_url="https://www.suse.com/security/cve/CVE-2024-49933/" source="CVE"/>
		<reference ref_id="CVE-2024-49934" ref_url="https://www.suse.com/security/cve/CVE-2024-49934/" source="CVE"/>
		<reference ref_id="CVE-2024-49935" ref_url="https://www.suse.com/security/cve/CVE-2024-49935/" source="CVE"/>
		<reference ref_id="CVE-2024-49936" ref_url="https://www.suse.com/security/cve/CVE-2024-49936/" source="CVE"/>
		<reference ref_id="CVE-2024-49938" ref_url="https://www.suse.com/security/cve/CVE-2024-49938/" source="CVE"/>
		<reference ref_id="CVE-2024-49939" ref_url="https://www.suse.com/security/cve/CVE-2024-49939/" source="CVE"/>
		<reference ref_id="CVE-2024-49945" ref_url="https://www.suse.com/security/cve/CVE-2024-49945/" source="CVE"/>
		<reference ref_id="CVE-2024-49946" ref_url="https://www.suse.com/security/cve/CVE-2024-49946/" source="CVE"/>
		<reference ref_id="CVE-2024-49947" ref_url="https://www.suse.com/security/cve/CVE-2024-49947/" source="CVE"/>
		<reference ref_id="CVE-2024-49949" ref_url="https://www.suse.com/security/cve/CVE-2024-49949/" source="CVE"/>
		<reference ref_id="CVE-2024-49950" ref_url="https://www.suse.com/security/cve/CVE-2024-49950/" source="CVE"/>
		<reference ref_id="CVE-2024-49954" ref_url="https://www.suse.com/security/cve/CVE-2024-49954/" source="CVE"/>
		<reference ref_id="CVE-2024-49955" ref_url="https://www.suse.com/security/cve/CVE-2024-49955/" source="CVE"/>
		<reference ref_id="CVE-2024-49957" ref_url="https://www.suse.com/security/cve/CVE-2024-49957/" source="CVE"/>
		<reference ref_id="CVE-2024-49958" ref_url="https://www.suse.com/security/cve/CVE-2024-49958/" source="CVE"/>
		<reference ref_id="CVE-2024-49959" ref_url="https://www.suse.com/security/cve/CVE-2024-49959/" source="CVE"/>
		<reference ref_id="CVE-2024-49960" ref_url="https://www.suse.com/security/cve/CVE-2024-49960/" source="CVE"/>
		<reference ref_id="CVE-2024-49962" ref_url="https://www.suse.com/security/cve/CVE-2024-49962/" source="CVE"/>
		<reference ref_id="CVE-2024-49963" ref_url="https://www.suse.com/security/cve/CVE-2024-49963/" source="CVE"/>
		<reference ref_id="CVE-2024-49965" ref_url="https://www.suse.com/security/cve/CVE-2024-49965/" source="CVE"/>
		<reference ref_id="CVE-2024-49966" ref_url="https://www.suse.com/security/cve/CVE-2024-49966/" source="CVE"/>
		<reference ref_id="CVE-2024-49967" ref_url="https://www.suse.com/security/cve/CVE-2024-49967/" source="CVE"/>
		<reference ref_id="CVE-2024-49968" ref_url="https://www.suse.com/security/cve/CVE-2024-49968/" source="CVE"/>
		<reference ref_id="CVE-2024-49969" ref_url="https://www.suse.com/security/cve/CVE-2024-49969/" source="CVE"/>
		<reference ref_id="CVE-2024-49973" ref_url="https://www.suse.com/security/cve/CVE-2024-49973/" source="CVE"/>
		<reference ref_id="CVE-2024-49974" ref_url="https://www.suse.com/security/cve/CVE-2024-49974/" source="CVE"/>
		<reference ref_id="CVE-2024-49975" ref_url="https://www.suse.com/security/cve/CVE-2024-49975/" source="CVE"/>
		<reference ref_id="CVE-2024-49981" ref_url="https://www.suse.com/security/cve/CVE-2024-49981/" source="CVE"/>
		<reference ref_id="CVE-2024-49982" ref_url="https://www.suse.com/security/cve/CVE-2024-49982/" source="CVE"/>
		<reference ref_id="CVE-2024-49983" ref_url="https://www.suse.com/security/cve/CVE-2024-49983/" source="CVE"/>
		<reference ref_id="CVE-2024-49985" ref_url="https://www.suse.com/security/cve/CVE-2024-49985/" source="CVE"/>
		<reference ref_id="CVE-2024-49989" ref_url="https://www.suse.com/security/cve/CVE-2024-49989/" source="CVE"/>
		<reference ref_id="CVE-2024-49991" ref_url="https://www.suse.com/security/cve/CVE-2024-49991/" source="CVE"/>
		<reference ref_id="CVE-2024-49993" ref_url="https://www.suse.com/security/cve/CVE-2024-49993/" source="CVE"/>
		<reference ref_id="CVE-2024-49995" ref_url="https://www.suse.com/security/cve/CVE-2024-49995/" source="CVE"/>
		<reference ref_id="CVE-2024-49996" ref_url="https://www.suse.com/security/cve/CVE-2024-49996/" source="CVE"/>
		<reference ref_id="CVE-2024-50000" ref_url="https://www.suse.com/security/cve/CVE-2024-50000/" source="CVE"/>
		<reference ref_id="CVE-2024-50001" ref_url="https://www.suse.com/security/cve/CVE-2024-50001/" source="CVE"/>
		<reference ref_id="CVE-2024-50002" ref_url="https://www.suse.com/security/cve/CVE-2024-50002/" source="CVE"/>
		<reference ref_id="CVE-2024-50003" ref_url="https://www.suse.com/security/cve/CVE-2024-50003/" source="CVE"/>
		<reference ref_id="CVE-2024-50006" ref_url="https://www.suse.com/security/cve/CVE-2024-50006/" source="CVE"/>
		<reference ref_id="CVE-2024-50007" ref_url="https://www.suse.com/security/cve/CVE-2024-50007/" source="CVE"/>
		<reference ref_id="CVE-2024-50008" ref_url="https://www.suse.com/security/cve/CVE-2024-50008/" source="CVE"/>
		<reference ref_id="CVE-2024-50009" ref_url="https://www.suse.com/security/cve/CVE-2024-50009/" source="CVE"/>
		<reference ref_id="CVE-2024-50013" ref_url="https://www.suse.com/security/cve/CVE-2024-50013/" source="CVE"/>
		<reference ref_id="CVE-2024-50014" ref_url="https://www.suse.com/security/cve/CVE-2024-50014/" source="CVE"/>
		<reference ref_id="CVE-2024-50017" ref_url="https://www.suse.com/security/cve/CVE-2024-50017/" source="CVE"/>
		<reference ref_id="CVE-2024-50019" ref_url="https://www.suse.com/security/cve/CVE-2024-50019/" source="CVE"/>
		<reference ref_id="CVE-2024-50024" ref_url="https://www.suse.com/security/cve/CVE-2024-50024/" source="CVE"/>
		<reference ref_id="CVE-2024-50025" ref_url="https://www.suse.com/security/cve/CVE-2024-50025/" source="CVE"/>
		<reference ref_id="CVE-2024-50026" ref_url="https://www.suse.com/security/cve/CVE-2024-50026/" source="CVE"/>
		<reference ref_id="CVE-2024-50028" ref_url="https://www.suse.com/security/cve/CVE-2024-50028/" source="CVE"/>
		<reference ref_id="CVE-2024-50031" ref_url="https://www.suse.com/security/cve/CVE-2024-50031/" source="CVE"/>
		<reference ref_id="CVE-2024-50033" ref_url="https://www.suse.com/security/cve/CVE-2024-50033/" source="CVE"/>
		<reference ref_id="CVE-2024-50035" ref_url="https://www.suse.com/security/cve/CVE-2024-50035/" source="CVE"/>
		<reference ref_id="CVE-2024-50041" ref_url="https://www.suse.com/security/cve/CVE-2024-50041/" source="CVE"/>
		<reference ref_id="CVE-2024-50044" ref_url="https://www.suse.com/security/cve/CVE-2024-50044/" source="CVE"/>
		<reference ref_id="CVE-2024-50045" ref_url="https://www.suse.com/security/cve/CVE-2024-50045/" source="CVE"/>
		<reference ref_id="CVE-2024-50046" ref_url="https://www.suse.com/security/cve/CVE-2024-50046/" source="CVE"/>
		<reference ref_id="CVE-2024-50047" ref_url="https://www.suse.com/security/cve/CVE-2024-50047/" source="CVE"/>
		<reference ref_id="CVE-2024-50048" ref_url="https://www.suse.com/security/cve/CVE-2024-50048/" source="CVE"/>
		<reference ref_id="CVE-2024-50049" ref_url="https://www.suse.com/security/cve/CVE-2024-50049/" source="CVE"/>
		<reference ref_id="CVE-2024-50055" ref_url="https://www.suse.com/security/cve/CVE-2024-50055/" source="CVE"/>
		<reference ref_id="CVE-2024-50058" ref_url="https://www.suse.com/security/cve/CVE-2024-50058/" source="CVE"/>
		<reference ref_id="CVE-2024-50059" ref_url="https://www.suse.com/security/cve/CVE-2024-50059/" source="CVE"/>
		<reference ref_id="CVE-2024-50061" ref_url="https://www.suse.com/security/cve/CVE-2024-50061/" source="CVE"/>
		<reference ref_id="CVE-2024-50062" ref_url="https://www.suse.com/security/cve/CVE-2024-50062/" source="CVE"/>
		<reference ref_id="CVE-2024-50063" ref_url="https://www.suse.com/security/cve/CVE-2024-50063/" source="CVE"/>
		<reference ref_id="CVE-2024-50067" ref_url="https://www.suse.com/security/cve/CVE-2024-50067/" source="CVE"/>
		<reference ref_id="CVE-2024-50073" ref_url="https://www.suse.com/security/cve/CVE-2024-50073/" source="CVE"/>
		<reference ref_id="CVE-2024-50074" ref_url="https://www.suse.com/security/cve/CVE-2024-50074/" source="CVE"/>
		<reference ref_id="CVE-2024-50077" ref_url="https://www.suse.com/security/cve/CVE-2024-50077/" source="CVE"/>
		<reference ref_id="CVE-2024-50078" ref_url="https://www.suse.com/security/cve/CVE-2024-50078/" source="CVE"/>
		<reference ref_id="CVE-2024-50081" ref_url="https://www.suse.com/security/cve/CVE-2024-50081/" source="CVE"/>
		<reference ref_id="CVE-2024-50082" ref_url="https://www.suse.com/security/cve/CVE-2024-50082/" source="CVE"/>
		<reference ref_id="CVE-2024-50089" ref_url="https://www.suse.com/security/cve/CVE-2024-50089/" source="CVE"/>
		<reference ref_id="CVE-2024-50093" ref_url="https://www.suse.com/security/cve/CVE-2024-50093/" source="CVE"/>
		<reference ref_id="CVE-2024-50095" ref_url="https://www.suse.com/security/cve/CVE-2024-50095/" source="CVE"/>
		<reference ref_id="CVE-2024-50096" ref_url="https://www.suse.com/security/cve/CVE-2024-50096/" source="CVE"/>
		<reference ref_id="CVE-2024-50098" ref_url="https://www.suse.com/security/cve/CVE-2024-50098/" source="CVE"/>
		<reference ref_id="CVE-2024-50099" ref_url="https://www.suse.com/security/cve/CVE-2024-50099/" source="CVE"/>
		<reference ref_id="CVE-2024-50103" ref_url="https://www.suse.com/security/cve/CVE-2024-50103/" source="CVE"/>
		<reference ref_id="CVE-2024-50108" ref_url="https://www.suse.com/security/cve/CVE-2024-50108/" source="CVE"/>
		<reference ref_id="CVE-2024-50110" ref_url="https://www.suse.com/security/cve/CVE-2024-50110/" source="CVE"/>
		<reference ref_id="CVE-2024-50115" ref_url="https://www.suse.com/security/cve/CVE-2024-50115/" source="CVE"/>
		<reference ref_id="CVE-2024-50116" ref_url="https://www.suse.com/security/cve/CVE-2024-50116/" source="CVE"/>
		<reference ref_id="CVE-2024-50117" ref_url="https://www.suse.com/security/cve/CVE-2024-50117/" source="CVE"/>
		<reference ref_id="CVE-2024-50124" ref_url="https://www.suse.com/security/cve/CVE-2024-50124/" source="CVE"/>
		<reference ref_id="CVE-2024-50125" ref_url="https://www.suse.com/security/cve/CVE-2024-50125/" source="CVE"/>
		<reference ref_id="CVE-2024-50127" ref_url="https://www.suse.com/security/cve/CVE-2024-50127/" source="CVE"/>
		<reference ref_id="CVE-2024-50128" ref_url="https://www.suse.com/security/cve/CVE-2024-50128/" source="CVE"/>
		<reference ref_id="CVE-2024-50131" ref_url="https://www.suse.com/security/cve/CVE-2024-50131/" source="CVE"/>
		<reference ref_id="CVE-2024-50134" ref_url="https://www.suse.com/security/cve/CVE-2024-50134/" source="CVE"/>
		<reference ref_id="CVE-2024-50135" ref_url="https://www.suse.com/security/cve/CVE-2024-50135/" source="CVE"/>
		<reference ref_id="CVE-2024-50138" ref_url="https://www.suse.com/security/cve/CVE-2024-50138/" source="CVE"/>
		<reference ref_id="CVE-2024-50141" ref_url="https://www.suse.com/security/cve/CVE-2024-50141/" source="CVE"/>
		<reference ref_id="CVE-2024-50146" ref_url="https://www.suse.com/security/cve/CVE-2024-50146/" source="CVE"/>
		<reference ref_id="CVE-2024-50147" ref_url="https://www.suse.com/security/cve/CVE-2024-50147/" source="CVE"/>
		<reference ref_id="CVE-2024-50148" ref_url="https://www.suse.com/security/cve/CVE-2024-50148/" source="CVE"/>
		<reference ref_id="CVE-2024-50150" ref_url="https://www.suse.com/security/cve/CVE-2024-50150/" source="CVE"/>
		<reference ref_id="CVE-2024-50153" ref_url="https://www.suse.com/security/cve/CVE-2024-50153/" source="CVE"/>
		<reference ref_id="CVE-2024-50154" ref_url="https://www.suse.com/security/cve/CVE-2024-50154/" source="CVE"/>
		<reference ref_id="CVE-2024-50155" ref_url="https://www.suse.com/security/cve/CVE-2024-50155/" source="CVE"/>
		<reference ref_id="CVE-2024-50156" ref_url="https://www.suse.com/security/cve/CVE-2024-50156/" source="CVE"/>
		<reference ref_id="CVE-2024-50160" ref_url="https://www.suse.com/security/cve/CVE-2024-50160/" source="CVE"/>
		<reference ref_id="CVE-2024-50167" ref_url="https://www.suse.com/security/cve/CVE-2024-50167/" source="CVE"/>
		<reference ref_id="CVE-2024-50171" ref_url="https://www.suse.com/security/cve/CVE-2024-50171/" source="CVE"/>
		<reference ref_id="CVE-2024-50179" ref_url="https://www.suse.com/security/cve/CVE-2024-50179/" source="CVE"/>
		<reference ref_id="CVE-2024-50180" ref_url="https://www.suse.com/security/cve/CVE-2024-50180/" source="CVE"/>
		<reference ref_id="CVE-2024-50182" ref_url="https://www.suse.com/security/cve/CVE-2024-50182/" source="CVE"/>
		<reference ref_id="CVE-2024-50183" ref_url="https://www.suse.com/security/cve/CVE-2024-50183/" source="CVE"/>
		<reference ref_id="CVE-2024-50184" ref_url="https://www.suse.com/security/cve/CVE-2024-50184/" source="CVE"/>
		<reference ref_id="CVE-2024-50186" ref_url="https://www.suse.com/security/cve/CVE-2024-50186/" source="CVE"/>
		<reference ref_id="CVE-2024-50187" ref_url="https://www.suse.com/security/cve/CVE-2024-50187/" source="CVE"/>
		<reference ref_id="CVE-2024-50188" ref_url="https://www.suse.com/security/cve/CVE-2024-50188/" source="CVE"/>
		<reference ref_id="CVE-2024-50189" ref_url="https://www.suse.com/security/cve/CVE-2024-50189/" source="CVE"/>
		<reference ref_id="CVE-2024-50192" ref_url="https://www.suse.com/security/cve/CVE-2024-50192/" source="CVE"/>
		<reference ref_id="CVE-2024-50194" ref_url="https://www.suse.com/security/cve/CVE-2024-50194/" source="CVE"/>
		<reference ref_id="CVE-2024-50195" ref_url="https://www.suse.com/security/cve/CVE-2024-50195/" source="CVE"/>
		<reference ref_id="CVE-2024-50196" ref_url="https://www.suse.com/security/cve/CVE-2024-50196/" source="CVE"/>
		<reference ref_id="CVE-2024-50198" ref_url="https://www.suse.com/security/cve/CVE-2024-50198/" source="CVE"/>
		<reference ref_id="CVE-2024-50201" ref_url="https://www.suse.com/security/cve/CVE-2024-50201/" source="CVE"/>
		<reference ref_id="CVE-2024-50205" ref_url="https://www.suse.com/security/cve/CVE-2024-50205/" source="CVE"/>
		<reference ref_id="CVE-2024-50208" ref_url="https://www.suse.com/security/cve/CVE-2024-50208/" source="CVE"/>
		<reference ref_id="CVE-2024-50209" ref_url="https://www.suse.com/security/cve/CVE-2024-50209/" source="CVE"/>
		<reference ref_id="CVE-2024-50215" ref_url="https://www.suse.com/security/cve/CVE-2024-50215/" source="CVE"/>
		<reference ref_id="CVE-2024-50218" ref_url="https://www.suse.com/security/cve/CVE-2024-50218/" source="CVE"/>
		<reference ref_id="CVE-2024-50229" ref_url="https://www.suse.com/security/cve/CVE-2024-50229/" source="CVE"/>
		<reference ref_id="CVE-2024-50230" ref_url="https://www.suse.com/security/cve/CVE-2024-50230/" source="CVE"/>
		<reference ref_id="CVE-2024-50232" ref_url="https://www.suse.com/security/cve/CVE-2024-50232/" source="CVE"/>
		<reference ref_id="CVE-2024-50233" ref_url="https://www.suse.com/security/cve/CVE-2024-50233/" source="CVE"/>
		<reference ref_id="CVE-2024-50234" ref_url="https://www.suse.com/security/cve/CVE-2024-50234/" source="CVE"/>
		<reference ref_id="CVE-2024-50236" ref_url="https://www.suse.com/security/cve/CVE-2024-50236/" source="CVE"/>
		<reference ref_id="CVE-2024-50237" ref_url="https://www.suse.com/security/cve/CVE-2024-50237/" source="CVE"/>
		<reference ref_id="CVE-2024-50249" ref_url="https://www.suse.com/security/cve/CVE-2024-50249/" source="CVE"/>
		<reference ref_id="CVE-2024-50255" ref_url="https://www.suse.com/security/cve/CVE-2024-50255/" source="CVE"/>
		<reference ref_id="CVE-2024-50259" ref_url="https://www.suse.com/security/cve/CVE-2024-50259/" source="CVE"/>
		<reference ref_id="CVE-2024-50261" ref_url="https://www.suse.com/security/cve/CVE-2024-50261/" source="CVE"/>
		<reference ref_id="CVE-2024-50264" ref_url="https://www.suse.com/security/cve/CVE-2024-50264/" source="CVE"/>
		<reference ref_id="CVE-2024-50265" ref_url="https://www.suse.com/security/cve/CVE-2024-50265/" source="CVE"/>
		<reference ref_id="CVE-2024-50267" ref_url="https://www.suse.com/security/cve/CVE-2024-50267/" source="CVE"/>
		<reference ref_id="CVE-2024-50268" ref_url="https://www.suse.com/security/cve/CVE-2024-50268/" source="CVE"/>
		<reference ref_id="CVE-2024-50269" ref_url="https://www.suse.com/security/cve/CVE-2024-50269/" source="CVE"/>
		<reference ref_id="CVE-2024-50271" ref_url="https://www.suse.com/security/cve/CVE-2024-50271/" source="CVE"/>
		<reference ref_id="CVE-2024-50273" ref_url="https://www.suse.com/security/cve/CVE-2024-50273/" source="CVE"/>
		<reference ref_id="CVE-2024-50274" ref_url="https://www.suse.com/security/cve/CVE-2024-50274/" source="CVE"/>
		<reference ref_id="CVE-2024-50279" ref_url="https://www.suse.com/security/cve/CVE-2024-50279/" source="CVE"/>
		<reference ref_id="CVE-2024-50282" ref_url="https://www.suse.com/security/cve/CVE-2024-50282/" source="CVE"/>
		<reference ref_id="CVE-2024-50287" ref_url="https://www.suse.com/security/cve/CVE-2024-50287/" source="CVE"/>
		<reference ref_id="CVE-2024-50289" ref_url="https://www.suse.com/security/cve/CVE-2024-50289/" source="CVE"/>
		<reference ref_id="CVE-2024-50290" ref_url="https://www.suse.com/security/cve/CVE-2024-50290/" source="CVE"/>
		<reference ref_id="CVE-2024-50292" ref_url="https://www.suse.com/security/cve/CVE-2024-50292/" source="CVE"/>
		<reference ref_id="CVE-2024-50295" ref_url="https://www.suse.com/security/cve/CVE-2024-50295/" source="CVE"/>
		<reference ref_id="CVE-2024-50298" ref_url="https://www.suse.com/security/cve/CVE-2024-50298/" source="CVE"/>
		<reference ref_id="CVE-2024-50301" ref_url="https://www.suse.com/security/cve/CVE-2024-50301/" source="CVE"/>
		<reference ref_id="CVE-2024-50302" ref_url="https://www.suse.com/security/cve/CVE-2024-50302/" source="CVE"/>
		<reference ref_id="CVE-2024-53052" ref_url="https://www.suse.com/security/cve/CVE-2024-53052/" source="CVE"/>
		<reference ref_id="CVE-2024-53058" ref_url="https://www.suse.com/security/cve/CVE-2024-53058/" source="CVE"/>
		<reference ref_id="CVE-2024-53059" ref_url="https://www.suse.com/security/cve/CVE-2024-53059/" source="CVE"/>
		<reference ref_id="CVE-2024-53060" ref_url="https://www.suse.com/security/cve/CVE-2024-53060/" source="CVE"/>
		<reference ref_id="CVE-2024-53061" ref_url="https://www.suse.com/security/cve/CVE-2024-53061/" source="CVE"/>
		<reference ref_id="CVE-2024-53063" ref_url="https://www.suse.com/security/cve/CVE-2024-53063/" source="CVE"/>
		<reference ref_id="CVE-2024-53066" ref_url="https://www.suse.com/security/cve/CVE-2024-53066/" source="CVE"/>
		<reference ref_id="CVE-2024-53068" ref_url="https://www.suse.com/security/cve/CVE-2024-53068/" source="CVE"/>
		<reference ref_id="CVE-2024-53079" ref_url="https://www.suse.com/security/cve/CVE-2024-53079/" source="CVE"/>
		<reference ref_id="CVE-2024-53085" ref_url="https://www.suse.com/security/cve/CVE-2024-53085/" source="CVE"/>
		<reference ref_id="CVE-2024-53088" ref_url="https://www.suse.com/security/cve/CVE-2024-53088/" source="CVE"/>
		<reference ref_id="CVE-2024-53104" ref_url="https://www.suse.com/security/cve/CVE-2024-53104/" source="CVE"/>
		<reference ref_id="CVE-2024-53110" ref_url="https://www.suse.com/security/cve/CVE-2024-53110/" source="CVE"/>
		<description>

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2021-47594: mptcp: never allow the PM to close a listener subflow (bsc#1226560).
- CVE-2022-48879: efi: fix NULL-deref in init error path (bsc#1229556).
- CVE-2022-48956: ipv6: avoid use-after-free in ip6_fragment() (bsc#1231893).
- CVE-2022-48957: dpaa2-switch: Fix memory leak in dpaa2_switch_acl_entry_add() and dpaa2_switch_acl_entry_remove() (bsc#1231973).
- CVE-2022-48958: ethernet: aeroflex: fix potential skb leak in greth_init_rings() (bsc#1231889).
- CVE-2022-48959: net: dsa: sja1105: fix memory leak in sja1105_setup_devlink_regions() (bsc#1231976).
- CVE-2022-48960: net: hisilicon: Fix potential use-after-free in hix5hd2_rx() (bsc#1231979).
- CVE-2022-48962: net: hisilicon: Fix potential use-after-free in hisi_femac_rx() (bsc#1232286).
- CVE-2022-48966: net: mvneta: Fix an out of bounds check (bsc#1232191).
- CVE-2022-48980: net: dsa: sja1105: avoid out of bounds access in sja1105_init_l2_policing() (bsc#1232233).
- CVE-2022-48983: io_uring: Fix a null-ptr-deref in io_tctx_exit_cb() (bsc#1231959).
- CVE-2022-48991: mm/khugepaged: fix collapse_pte_mapped_thp() to allow anon_vma (bsc#1232070).
- CVE-2022-49015: net: hsr: Fix potential use-after-free (bsc#1231938).
- CVE-2022-49017: tipc: re-fetch skb cb after tipc_msg_validate (bsc#1232004).
- CVE-2022-49020: net/9p: Fix a potential socket leak in p9_socket_open (bsc#1232175).
- CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
- CVE-2024-26906: Fixed invalid vsyscall page read for copy_from_kernel_nofault() (bsc#1223202).
- CVE-2024-26953: net: esp: fix bad handling of pages from page_pool (bsc#1223656).
- CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb-&gt;head (bsc#1224518).
- CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully (bsc#1224526).
- CVE-2024-36244: net/sched: taprio: extend minimum interval restriction to entire cycle too (bsc#1226797).
- CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).
- CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).
- CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742).
- CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append (bsc#1225764).
- CVE-2024-36957: octeontx2-af: avoid off-by-one read from userspace (bsc#1225762).
- CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748).
- CVE-2024-38615: cpufreq: exit() callback is optional (bsc#1226592).
- CVE-2024-39476: md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING (bsc#1227437).
- CVE-2024-40965: i2c: lpi2c: Avoid calling clk_get_rate during transfer (bsc#1227885).
- CVE-2024-40997: cpufreq: amd-pstate: fix memory leak on CPU EPP exit (bsc#1227853).
- CVE-2024-41023: sched/deadline: Fix task_struct reference leak (bsc#1228430).
- CVE-2024-42226: Prevent potential failure in handle_tx_event() for Transfer events without TRB (bsc#1228709).
- CVE-2024-42253: gpio: pca953x: fix pca953x_irq_bus_sync_unlock race (bsc#1229005).
- CVE-2024-44931: gpio: prevent potential speculation leaks in gpio_device_get_desc() (bsc#1229837).
- CVE-2024-44932: idpf: fix UAFs when destroying the queues (bsc#1229808).
- CVE-2024-44958: sched/smt: Fix unbalance sched_smt_present dec/inc (bsc#1230179).
- CVE-2024-44964: idpf: fix memory leaks and crashes while performing a soft reset (bsc#1230220).
- CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231).
- CVE-2024-45016: netem: fix return value if duplicate enqueue fails (bsc#1230429).
- CVE-2024-45025: fix bitmap corruption on close_range() with CLOSE_RANGE_UNSHARE (bsc#1230456).
- CVE-2024-46678: bonding: change ipsec_lock from spin lock to mutex (bsc#1230550).
- CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558).
- CVE-2024-46716: dmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor (bsc#1230715).
- CVE-2024-46754: bpf: Remove tst_run from lwt_seg6local_prog_ops (bsc#1230801).
- CVE-2024-46770: ice: Add netif_device_attach/detach into PF reset flow (bsc#1230763).
- CVE-2024-46775: drm/amd/display: Validate function returns (bsc#1230774).
- CVE-2024-46777: udf: Avoid excessive partition lengths (bsc#1230773).
- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).
- CVE-2024-46809: drm/amd/display: Check BIOS images before it is used (bsc#1231148).
- CVE-2024-46811: drm/amd/display: Fix index may exceed array range within fpu_update_bw_bounding_box (bsc#1231179).
- CVE-2024-46813: drm/amd/display: Check link_index before accessing dc-&gt;links (bsc#1231191).
- CVE-2024-46814: drm/amd/display: Check msg_id before processing transcation (bsc#1231193).
- CVE-2024-46815: drm/amd/display: Check num_valid_sets before accessing reader_wm_sets (bsc#1231195).
- CVE-2024-46816: drm/amd/display: Stop amdgpu_dm initialize when link nums greater than max_links (bsc#1231197).
- CVE-2024-46817: drm/amd/display: Stop amdgpu_dm initialize when stream nums greater than 6 (bsc#1231200).
- CVE-2024-46818: drm/amd/display: Check gpio_id before used as array index (bsc#1231203).
- CVE-2024-46826: ELF: fix kernel.randomize_va_space double read (bsc#1231115).
- CVE-2024-46828: uprobes: fix kernel info leak via '[uprobes]' vma (bsc#1231114).
- CVE-2024-46834: ethtool: fail closed if we can't get max channel used in indirection tables (bsc#1231096).
- CVE-2024-46840: btrfs: clean up our handling of refs == 0 in snapshot delete (bsc#1231105).
- CVE-2024-46841: btrfs: do not BUG_ON on ENOMEM from btrfs_lookup_extent_info() in walk_down_proc() (bsc#1231094).
- CVE-2024-46848: perf/x86/intel: Limit the period on Haswell (bsc#1231072).
- CVE-2024-46849: ASoC: meson: axg-card: fix 'use-after-free' (bsc#1231073).
- CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084).
- CVE-2024-46855: netfilter: nft_socket: fix sk refcount leaks (bsc#1231085).
- CVE-2024-46857: net/mlx5: Fix bridge mode operations when there are no VFs (bsc#1231087).
- CVE-2024-47660: fsnotify: clear PARENT_WATCHED flags lazily (bsc#1231439).
- CVE-2024-47661: drm/amd/display: Avoid overflow from uint32_t to uint8_t (bsc#1231496).
- CVE-2024-47664: spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware (bsc#1231442).
- CVE-2024-47668: lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc() (bsc#1231502).
- CVE-2024-47672: wifi: iwlwifi: mvm: do not wait for tx queues if firmware is dead (bsc#1231540).
- CVE-2024-47673: wifi: iwlwifi: mvm: pause TCM when the firmware is stopped (bsc#1231539).
- CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case (bsc#1231673).
- CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&amp;iput() (bsc#1231930).
- CVE-2024-47684: tcp: check skb is non-NULL in tcp_rto_delta_us() (bsc#1231987).
- CVE-2024-47685: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() (bsc#1231998).
- CVE-2024-47692: nfsd: return -EINVAL when namelen is 0 (bsc#1231857).
- CVE-2024-47701: ext4: explicitly exit when ext4_find_inline_entry returns an error (bsc#1231920).
- CVE-2024-47704: drm/amd/display: Check link_res-&gt;hpo_dp_link_enc before using it (bsc#1231944).
- CVE-2024-47705: block: fix potential invalid pointer dereference in blk_add_partition (bsc#1231872).
- CVE-2024-47706: block, bfq: fix possible UAF for bfqq-&gt;bic with merge chain (bsc#1231942).
- CVE-2024-47707: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() (bsc#1231935).
- CVE-2024-47710: sock_map: Add a cond_resched() in sock_hash_free() (bsc#1232049).
- CVE-2024-47720: drm/amd/display: Add null check for set_output_gamma in dcn30_set_output_transfer_func (bsc#1232043).
- CVE-2024-47727: x86/tdx: Fix 'in-kernel MMIO' check (bsc#1232116).
- CVE-2024-47730: crypto: hisilicon/qm - inject error before stopping queue (bsc#1232075).
- CVE-2024-47738: wifi: mac80211: do not use rate mask for offchannel TX either (bsc#1232114).
- CVE-2024-47739: padata: use integer wrap around to prevent deadlock on seq_nr overflow (bsc#1232124).
- CVE-2024-47745: mm: split critical region in remap_file_pages() and invoke LSMs in between (bsc#1232135).
- CVE-2024-47747: net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition (bsc#1232145).
- CVE-2024-47748: vhost_vdpa: assign irq bypass producer token correctly (bsc#1232174).
- CVE-2024-47757: nilfs2: fix potential oob read in nilfs_btree_check_delete() (bsc#1232187).
- CVE-2024-49858: efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (bsc#1232251).
- CVE-2024-49860: ACPI: sysfs: validate return type of _STR method (bsc#1231861).
- CVE-2024-49866: tracing/timerlat: Fix a race during cpuhp processing (bsc#1232259).
- CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272).
- CVE-2024-49881: ext4: update orig_path in ext4_find_extent() (bsc#1232201).
- CVE-2024-49882: ext4: fix double brelse() the buffer of the extents path (bsc#1232200).
- CVE-2024-49883: ext4: aovid use-after-free in ext4_ext_insert_extent() (bsc#1232199).
- CVE-2024-49886: platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug (bsc#1232196).
- CVE-2024-49890: drm/amd/pm: ensure the fw_info is not null before using it (bsc#1232217).
- CVE-2024-49892: drm/amd/display: Initialize get_bytes_per_element's default to 1 (bsc#1232220).
- CVE-2024-49896: drm/amd/display: Check stream before comparing them (bsc#1232221).
- CVE-2024-49897: drm/amd/display: Check phantom_stream before it is used (bsc#1232355).
- CVE-2024-49899: drm/amd/display: Initialize denominators' default to 1 (bsc#1232358).
- CVE-2024-49901: drm/msm/adreno: Assign msm_gpu-&gt;pdev earlier to avoid nullptrs (bsc#1232305).
- CVE-2024-49906: drm/amd/display: Check null pointer before try to access it (bsc#1232332).
- CVE-2024-49909: drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func (bsc#1232337).
- CVE-2024-49911: drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func (bsc#1232366).
- CVE-2024-49914: drm/amd/display: Add null check for pipe_ctx-&gt;plane_state in (bsc#1232369).
- CVE-2024-49917: drm/amd/display: Add NULL check for clk_mgr and clk_mgr-&gt;funcs in dcn30_init_hw (bsc#1231965).
- CVE-2024-49918: drm/amd/display: Add null check for head_pipe in dcn32_acquire_idle_pipe_for_head_pipe_in_layer (bsc#1231967).
- CVE-2024-49919: drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layer (bsc#1231968).
- CVE-2024-49920: drm/amd/display: Check null pointers before multiple uses (bsc#1232313).
- CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371).
- CVE-2024-49922: drm/amd/display: Check null pointers before using them (bsc#1232374).
- CVE-2024-49923: drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags (bsc#1232361).
- CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224)
- CVE-2024-49929: wifi: iwlwifi: mvm: avoid NULL pointer dereference (bsc#1232253).
- CVE-2024-49930: wifi: ath11k: fix array out-of-bound access in SoC stats (bsc#1232260).
- CVE-2024-49933: blk_iocost: fix more out of bound shifts (bsc#1232368).
- CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name (bsc#1232387).
- CVE-2024-49936: net/xen-netback: prevent UAF in xenvif_flush_hash() (bsc#1232424).
- CVE-2024-49939: wifi: rtw89: avoid to add interface to list twice when SER (bsc#1232381).
- CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165).
- CVE-2024-49946: ppp: do not assume bh is held in ppp_channel_bridge_input() (bsc#1232164).
- CVE-2024-49949: net: avoid potential underflow in qdisc_pkt_len_init() with UFO (bsc#1232160).
- CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).
- CVE-2024-49954: static_call: Replace pointless WARN_ON() in static_call_module_notify() (bsc#1232155).
- CVE-2024-49955: ACPI: battery: Fix possible crash when unregistering a battery hook (bsc#1232154).
- CVE-2024-49958: ocfs2: reserve space for inline xattr before attaching reflink tree (bsc#1232151).
- CVE-2024-49959: jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error (bsc#1232149).
- CVE-2024-49960: ext4: fix timer use-after-free on failed mount (bsc#1232395).
- CVE-2024-49967: ext4: no need to continue when the number of entries is 1 (bsc#1232140).
- CVE-2024-49968: ext4: fix error message when rejecting the default hash (bsc#1232264).
- CVE-2024-49969: drm/amd/display: Fix index out of bounds in DCN30 color transformation (bsc#1232519).
- CVE-2024-49973: r8169: add tally counter fields added with RTL8125 (bsc#1232105).
- CVE-2024-49974: NFSD: Force all NFSv4.2 COPY requests to be synchronous (bsc#1232383).
- CVE-2024-49975: uprobes: fix kernel info leak via '[uprobes]' vma (bsc#1232104).
- CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free (bsc#1232096).
- CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module unload (bsc#1232483).
- CVE-2024-49991: drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer (bsc#1232282).
- CVE-2024-49993: iommu/vt-d: Fix potential lockup if qi_submit_sync called with 0 count (bsc#1232316).
- CVE-2024-49995: tipc: guard against string buffer overrun (bsc#1232432).
- CVE-2024-49996: cifs: Fix buffer overflow when parsing NFS reparse points (bsc#1232089).
- CVE-2024-50000: net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc() (bsc#1232085).
- CVE-2024-50001: net/mlx5: Fix error path in multi-packet WQE transmit (bsc#1232084).
- CVE-2024-50002: static_call: Handle module init failure correctly in static_call_del_module() (bsc#1232083).
- CVE-2024-50006: ext4: fix i_data_sem unlock order in ext4_ind_migrate() (bsc#1232442).
- CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value (bsc#1232318).
- CVE-2024-50014: ext4: fix access to uninitialised lock in fc replay path (bsc#1232446).
- CVE-2024-50019: kthread: unpark only parked kthread (bsc#1231990).
- CVE-2024-50024: net: Fix an unsafe loop on the list (bsc#1231954).
- CVE-2024-50028: thermal: core: Reference count the zone in thermal_zone_get_by_id() (bsc#1231950).
- CVE-2024-50033: slip: make slhc_remember() more robust against malicious packets (bsc#1231914).
- CVE-2024-50035: ppp: fix ppp_async_encode() illegal access (bsc#1232392).
- CVE-2024-50041: i40e: Fix macvlan leak by synchronizing access to mac_filter_hash (bsc#1231907).
- CVE-2024-50045: netfilter: br_netfilter: fix panic with metadata_dst skb (bsc#1231903).
- CVE-2024-50046: kabi fix for NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies() (bsc#1231902).
- CVE-2024-50047: smb: client: fix UAF in async decryption (bsc#1232418).
- CVE-2024-50048: fbcon: Fix a NULL pointer dereference issue in fbcon_putcs (bsc#1232310).
- CVE-2024-50055: driver core: bus: Fix double free in driver API bus_register() (bsc#1232329).
- CVE-2024-50058: serial: protect uart_port_dtr_rts() in uart_shutdown() too (bsc#1232285).
- CVE-2024-50059: ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition (bsc#1232345).
- CVE-2024-50061: i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition (bsc#1232263).
- CVE-2024-50063: kABI: bpf: struct bpf_map kABI workaround (bsc#1232435).
- CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (bsc#1232520).
- CVE-2024-50081: blk-mq: setup queue -&gt;tag_set before initializing hctx (bsc#1232501).
- CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (bsc#1232500).
- CVE-2024-50089: unicode: Do not special case ignorable code points (bsc#1232860).
- CVE-2024-50093: thermal: intel: int340x: processor: Fix warning during module unload (bsc#1232877).
- CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down (bsc#1232881).
- CVE-2024-50108: drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too (bsc#1232884).
- CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping (bsc#1232885).
- CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919).
- CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
- CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907).
- CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905).
- CVE-2024-50134: drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape (bsc#1232890).
- CVE-2024-50135: nvme-pci: fix race condition between reset and nvme_dev_disable() (bsc#1232888).
- CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935).
- CVE-2024-50146: net/mlx5e: Do not call cleanup on profile rollback failure (bsc#1233056).
- CVE-2024-50147: net/mlx5: Fix command bitmask initialization (bsc#1233067).
- CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in target_alloc_device() (bsc#1233061).
- CVE-2024-50154: tcp: Fix use-after-free of nreq in reqsk_timer_handler() (bsc#1233070).
- CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049).
- CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057).
- CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct map (bsc#1233129).
- CVE-2024-50184: virtio_pmem: Check device status before requesting flush (bsc#1233135).
- CVE-2024-50186: net: explicitly clear the sk pointer, when pf-&gt;create fails (bsc#1233110).
- CVE-2024-50188: net: phy: dp83869: fix memory corruption when enabling fiber (bsc#1233107).
- CVE-2024-50192: irqchip/gic-v4: Correctly deal with set_affinity on lazily-mapped VPEs (bsc#1233106).
- CVE-2024-50195: posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime() (bsc#1233103).
- CVE-2024-50196: pinctrl: ocelot: fix system hang on level based interrupts (bsc#1233113).
- CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (bsc#1233293).
- CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233117).
- CVE-2024-50229: nilfs2: fix potential deadlock with newly created symlinks (bsc#1233205).
- CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked flag (bsc#1233206).
- CVE-2024-50259: netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() (bsc#1233214).
- CVE-2024-50261: macsec: Fix use-after-free while sending the offloading packet (bsc#1233253).
- CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk-&gt;trans (bsc#1233453).
- CVE-2024-50267: usb: serial: io_edgeport: fix use after free in debug printk (bsc#1233456).
- CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460).
- CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462).
- CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463).
- CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468).
- CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
- CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single (bsc#1233484).
- CVE-2024-50298: net: enetc: allocate vf_state during PF probes (bsc#1233487).
- CVE-2024-53052: io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (bsc#1233548).
- CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552).
- CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
- CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557).
- CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (bsc#1233561).
- CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking (bsc#1233570).
- CVE-2024-53088: i40e: fix race condition by adding filter's intermediate sync state (bsc#1233580).
- CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
- CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error (bsc#1234085).

The following non-security bugs were fixed:

- acpi: battery: Call power_supply_changed() when adding hooks (bsc#1232154)
- acpi: battery: Simplify battery hook locking (bsc#1232154)
- acpi: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid detection issue (stable-fixes).
- acpi: CPPC: Fix _CPC register setting issue (git-fixes).
- acpi: CPPC: Make rmw_lock a raw_spin_lock (git-fixes).
- acpi: EC: Do not release locks during operation region accesses (stable-fixes).
- acpi: PAD: fix crash in exit_round_robin() (stable-fixes).
- acpi: PRM: Clean up guid type in struct prm_handler_info (git-fixes).
- acpi: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context (git-fixes).
- acpi: resource: Add another DMI match for the TongFang GMxXGxx (stable-fixes).
- acpi: resource: Add Asus ExpertBook B2502CVA to irq1_level_low_skip_override[] (stable-fixes).
- acpi: resource: Add Asus Vivobook X1704VAP to irq1_level_low_skip_override[] (stable-fixes).
- acpi: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable-fixes).
- acpica: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package() (stable-fixes).
- acpica: Fix memory leak if acpi_ps_get_next_field() fails (stable-fixes).
- acpica: Fix memory leak if acpi_ps_get_next_namepath() fails (stable-fixes).
- acpica: iasl: handle empty connection_node (stable-fixes).
- ad7780: fix division by zero in ad7780_write_raw() (git-fixes).
- adapt same struct naming as similar kABI workaround in SLE15-SP6 (prefixed with 'suse_' to make it more obvious its a downstream thing.
- add bug reference for a mana change (bsc#1229769).
- add bug references to existing mana changes (bsc#1232033, bsc#1232034, bsc#1232036).
- add bugreference to a hv_netvsc patch (bsc#1232413).
- afs: Revert 'afs: Hide silly-rename files from userspace' (git-fixes).
- alsa: 6fire: Release resources at card release (git-fixes).
- alsa: ac97: bus: Fix the mistake in the comment (git-fixes).
- alsa: asihpi: Fix potential OOB array access (stable-fixes).
- alsa: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes).
- alsa: core: add isascii() check to card ID generator (stable-fixes).
- alsa: firewire-lib: Avoid division by zero in apply_constraint_to_size() (git-fixes).
- alsa: firewire-lib: fix return value on fail in amdtp_tscm_init() (git-fixes).
- alsa: hda: cs35l41: fix module autoloading (git-fixes).
- alsa: hda: Fix kctl-&gt;id initialization (git-fixes).
- alsa: hda/conexant - Fix audio routing for HP EliteOne 1000 G2 (stable-fixes).
- alsa: hda/conexant - Use cached pin control for Node 0x1d on HP EliteOne 1000 G2 (git-fixes).
- alsa: hda/conexant: Fix conflicting quirk for System76 Pangolin (git-fixes).
- alsa: hda/cs8409: Fix possible NULL dereference (git-fixes).
- alsa: hda/generic: Unconditionally prefer preferred_dacs pairs (git-fixes).
- alsa: hda/realtek - Fixed ALC256 headphone no sound (stable-fixes).
- alsa: hda/realtek - FIxed ALC285 headphone no sound (stable-fixes).
- alsa: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes).
- alsa: hda/realtek: Add a quirk for HP Pavilion 15z-ec200 (stable-fixes).
- alsa: hda/realtek: Add quirk for Huawei MateBook 13 KLV-WX9 (stable-fixes).
- alsa: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable-fixes).
- alsa: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes).
- alsa: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable-fixes).
- alsa: hda/realtek: Fix the push button function for the ALC257 (git-fixes).
- alsa: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes).
- alsa: hda/realtek: Update ALC225 depop procedure (git-fixes).
- alsa: hda/realtek: Update ALC256 depop procedure (git-fixes).
- alsa: hda/realtek: Update default depop procedure (git-fixes).
- alsa: hdsp: Break infinite MIDI input flush loop (stable-fixes).
- alsa: line6: add hw monitor volume control to POD HD500X (stable-fixes).
- alsa: mixer_oss: Remove some incorrect kfree_const() usages (git-fixes).
- alsa: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes).
- alsa: usb-audio: Add delay quirk for VIVO USB-C HEADSET (stable-fixes).
- alsa: usb-audio: Add input value sanity checks for standard types (stable-fixes).
- alsa: usb-audio: Add logitech Audio profile quirk (stable-fixes).
- alsa: usb-audio: Add native DSD support for Luxman D-08u (stable-fixes).
- alsa: usb-audio: Add quirk for HP 320 FHD Webcam (stable-fixes).
- alsa: usb-audio: Add quirks for Dell WD19 dock (stable-fixes).
- alsa: usb-audio: Define macros for quirk table entries (stable-fixes).
- alsa: usb-audio: Replace complex quirk lines with macros (stable-fixes).
- alsa: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes).
- amd-pstate: Set min_perf to nominal_perf for active mode performance gov (git-fixes).
- arm64: cputype: Add Neoverse-N3 definitions (git-fixes)
- arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes).
- arm64: dts: rockchip: override BIOS_DISABLE signal via GPIO hog on RK3399 Puma (git-fixes).
- arm64: errata: Expand speculative SSBS workaround once more (git-fixes)
- arm64: esr: Define ESR_ELx_EC_* constants as UL (git-fixes)
- arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes)
- arm64: Force position-independent veneers (git-fixes).
- arm64: probes: Fix simulate_ldr*_literal() (git-fixes)
- arm64: probes: Fix uprobes for big-endian kernels (git-fixes)
- arm64: probes: Remove broken LDR (literal) uprobe support (git-fixes)
- arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git-fixes)
- arm64: smccc: replace custom COUNT_ARGS() &amp; CONCATENATE() (git-fixes)
- arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git-fixes)
- arm64:uprobe fix the uprobe SWBP_INSN in big-endian (git-fixes)
- arm64/sve: Discard stale CPU state when handling SVE traps (git-fixes)
- asoc: allow module autoloading for table db1200_pids (stable-fixes).
- asoc: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes).
- asoc: codecs: Fix atomicity violation in snd_soc_component_get_drvdata() (git-fixes).
- asoc: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to default regs values (stable-fixes).
- asoc: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes).
- asoc: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes).
- asoc: imx-card: Set card.owner to avoid a warning calltrace if SND=m (git-fixes).
- asoc: intel: fix module autoloading (stable-fixes).
- asoc: qcom: Fix NULL Dereference in asoc_qcom_lpass_cpu_platform_probe() (git-fixes).
- asoc: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable-fixes).
- asoc: rt5682: Return devm_of_clk_add_hw_provider to transfer the error (git-fixes).
- asoc: soc-pcm: Do not zero TDM masks in __soc_pcm_open() (git-fixes).
- asoc: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git-fixes).
- asoc: tda7419: fix module autoloading (stable-fixes).
- blk-throttle: Fix io statistics for cgroup v1 (bsc#1233528).
- block: Avoid leaking hctx-&gt;nr_active counter on batched completion (bsc#1231923).
- block: print symbolic error name instead of error code (bsc#1231872).
- bluetooth: bnep: fix wild-memory-access in proto_unregister (git-fixes).
- bluetooth: btmrvl: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- bluetooth: btusb: Fix regression with fake CSR controllers 0a12:0001 (git-fixes).
- bluetooth: Call iso_exit() on module unload (git-fixes).
- bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (git-fixes).
- bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes).
- bluetooth: ISO: Fix multiple init when debugfs is disabled (git-fixes).
- bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git-fixes).
- bluetooth: Remove debugfs directory on module init failure (git-fixes).
- bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change (git-fixes).
- bnxt_en: Fix the PCI-AER routines (git-fixes).
- bnxt_en: refactor reset close code (git-fixes).
- bnxt_en: Remove mis-applied code from bnxt_cfg_ntp_filters() (git-fixes).
- bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down (git-fixes).
- bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes).
- bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes).
- bnxt_en: Wait for FLR to complete during probe (git-fixes).
- bpf, lsm: Add disabled BPF LSM hook list (git-fixes).
- bpf, net: Fix a potential race in do_sock_getsockopt() (git-fixes).
- bpf, verifier: Correct tail_call_reachable for bpf prog (git-fixes).
- bpf, x64: Remove tail call detection (git-fixes).
- bpf,perf: Fix perf_event_detach_bpf_prog error handling (git-fixes).
- bpf: Add --skip_encoding_btf_inconsistent_proto, --btf_gen_optimized to pahole flags for v1.25 (bsc#1230414 bsc#1229450).
- bpf: Allow helpers to accept pointers with a fixed size (git-fixes).
- bpf: Check for helper calls in check_subprogs() (git-fixes).
- bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos (git-fixes).
- bpf: Fix bpf_strtol and bpf_strtoul helpers for 32bit (git-fixes).
- bpf: Fix helper writes to read-only maps (git-fixes).
- bpf: Fix pointer-leak due to insufficient speculative store bypass mitigation (bsc#1231375).
- bpf: Fix tailcall cases in test_bpf (git-fixes).
- bpf: Improve check_raw_mode_ok test for MEM_UNINIT-tagged types (git-fixes).
- bpf: Remove truncation test in bpf_strtol and bpf_strtoul helpers (git-fixes).
- bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error (git-fixes).
- btf, scripts: Exclude Rust CUs with pahole (bsc#1230414 bsc#1229450).
- bus: integrator-lm: fix OF node leak in probe() (git-fixes).
- can: c_can: c_can_handle_bus_err(): update statistics if skb allocation fails (git-fixes).
- can: c_can: fix {rx,tx}_errors statistics (git-fixes).
- can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes).
- can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes).
- can: j1939: j1939_session_new(): fix skb reference counting (git-fixes).
- can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes).
- can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL (git-fixes).
- can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes).
- ceph: fix cap ref leak via netfs init_request (bsc#1231383).
- cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108).
- char: tpm: Fix possible memory leak in tpm_bios_measurements_open() (git-fixes).
- chtls: fix tp-&gt;rcv_tstamp initialization (git-fixes).
- clk: Add a devm variant of clk_rate_exclusive_get() (bsc#1227885).
- clk: Provide !COMMON_CLK dummy for devm_clk_rate_exclusive_get() (bsc#1227885).
- comedi: Flush partial mappings in error case (git-fixes).
- comedi: ni_routing: tools: Check when the file could not be opened (stable-fixes).
- cpufreq/amd-pstate: Fix amd_pstate mode switch on shared memory systems (git-fixes).
- crypto: bcm - add error check in the ahash_hmac_init function (git-fixes).
- crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes).
- crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes).
- crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git-fixes).
- crypto: cavium - Fix the if condition to exit loop after timeout (git-fixes).
- crypto: hisilicon - Remove pci_aer_clear_nonfatal_status() call (bsc#1232075)
- crypto: hisilicon/qm - re-enable communicate interrupt before notifying PF (bsc#1232075)
- crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init() (git-fixes).
- crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes).
- cxgb4: add forgotten u64 ivlan cast before shift (git-fixes).
- cxgb4: Properly lock TX queue for the selftest (git-fixes).
- cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git-fixes).
- debugfs: fix automount d_fsdata usage (git-fixes).
- dn_route: set rt neigh to blackhole_netdev instead of loopback_dev in ifdown (bsc#1216813).
- drbd: Add NULL check for net_conf to prevent dereference in state validation (git-fixes).
- drbd: Fix atomicity violation in drbd_uuid_set_bm() (git-fixes).
- driver core: bus: Return -EIO instead of 0 when show/store invalid bus attribute (stable-fixes).
- drivers: net: prevent tun_build_skb() to exceed the packet size limit (git-fixes).
- drm: Consistently use struct drm_mode_rect for FB_DAMAGE_CLIPS (git-fixes).
- drm: komeda: Fix an issue related to normalized zpos (stable-fixes).
- drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes).
- drm/amd: Guard against bad data for ATIF ACPI method (git-fixes).
- drm/amd/amdgpu: Fix double unlock in amdgpu_mes_add_ring (git-fixes).
- drm/amd/display: Add null check for 'afb' in amdgpu_dm_plane_handle_cursor_update (v2) (stable-fixes).
- drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream (stable-fixes).
- drm/amd/display: Allow backlight to go below `AMDGPU_DM_DEFAULT_MIN_BACKLIGHT` (stable-fixes).
- drm/amd/display: Check link_res-&gt;hpo_dp_link_enc before using it (bsc#1231944)
- drm/amd/display: Check null pointer before dereferencing se (stable-fixes).
- drm/amd/display: Check null pointers before using dc-&gt;clk_mgr (stable-fixes).
- drm/amd/display: Check stream before comparing them (stable-fixes).
- drm/amd/display: Fix index out of bounds in DCN30 color transformation (stable-fixes).
- drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation (stable-fixes).
- drm/amd/display: Fix index out of bounds in degamma hardware format translation (stable-fixes).
- drm/amd/display: Fix Synaptics Cascaded Panamera DSC Determination (stable-fixes).
- drm/amd/display: Fix system hang while resume with TBT monitor (stable-fixes).
- drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream' (stable-fixes).
- drm/amd/display: Initialize get_bytes_per_element's default to 1 (stable-fixes).
- drm/amd/display: Round calculated vtotal (stable-fixes).
- drm/amd/display: Validate backlight caps are sane (stable-fixes).
- drm/amd/pm: ensure the fw_info is not null before using it (stable-fixes).
- drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable-fixes).
- drm/amdgpu: add raven1 gfxoff quirk (stable-fixes).
- drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable-fixes).
- drm/amdgpu: disallow multiple BO_HANDLES chunks in one submit (stable-fixes).
- drm/amdgpu: enable gfxoff quirk on HP 705G4 (stable-fixes).
- drm/amdgpu: fix unchecked return value warning for amdgpu_gfx (stable-fixes).
- drm/amdgpu: prevent BO_HANDLES error from being overwritten (git-fixes).
- drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git-fixes).
- drm/amdgpu: properly handle vbios fake edid sizing (git-fixes).
- drm/amdgpu: Replace one-element array with flexible-array member (stable-fixes).
- drm/amdkfd: Fix resource leak in criu restore queue (stable-fixes).
- drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes).
- drm/bridge: tc358767: Fix link properties discovery (git-fixes).
- drm/bridge: tc358768: Fix DSI command tx (git-fixes).
- drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git-fixes).
- drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git-fixes).
- drm/msm: Allocate memory for disp snapshot with kvzalloc() (git-fixes).
- drm/msm: Avoid NULL dereference in msm_disp_state_print_regs() (git-fixes).
- drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk() (git-fixes).
- drm/msm/dpu: do not always program merge_3d block (git-fixes).
- drm/msm/dpu: make sure phys resources are properly initialized (git-fixes).
- drm/msm/dsi: fix 32-bit signed integer extension in pclk_rate calculation (git-fixes).
- drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes).
- drm/omap: Fix possible NULL dereference (git-fixes).
- drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes).
- drm/printer: Allow NULL data in devcoredump printer (stable-fixes).
- drm/radeon: Fix encoder-&gt;possible_clones (git-fixes).
- drm/radeon: properly handle vbios fake edid sizing (git-fixes).
- drm/radeon: Replace one-element array with flexible-array member (stable-fixes).
- drm/radeon/r100: Handle unknown family in r100_cp_init_microcode() (stable-fixes).
- drm/rockchip: define gamma registers for RK3399 (stable-fixes).
- drm/rockchip: support gamma control on RK3399 (stable-fixes).
- drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes).
- drm/sched: Add locking to drm_sched_entity_modify_sched (git-fixes).
- drm/sti: avoid potential dereference of error pointers (git-fixes).
- drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check (git-fixes).
- drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check (git-fixes).
- drm/v3d: Address race-condition in MMU flush (git-fixes).
- drm/v3d: Stop the active perfmon before being destroyed (git-fixes).
- drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA (stable-fixes).
- drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).
- drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git-fixes).
- drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git-fixes).
- drm/vc4: Stop the active perfmon before being destroyed (git-fixes).
- drm/vmwgfx: Handle surface check failure correctly (git-fixes).
- drm/vmwgfx: Limit display layout ioctl array size to VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).
- drop HD-audio conexant patch that caused a regression on Thinkpad (bsc#1228269)
- Drop OCFS2 patch causing a regression (bsc#1233255) 
- drop USB dwc2 patch that caused a regression on RPi3 (bsc#1232342)
- e1000e: Fix S0ix residency on corporate systems (git-fixes).
- efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465).
- efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption (stable-fixes).
- erofs: avoid consecutive detection for Highmem memory (git-fixes).
- erofs: avoid infinite loop in z_erofs_do_read_page() when reading beyond EOF (git-fixes).
- erofs: fix pcluster use-after-free on UP platforms (git-fixes).
- erofs: fix potential overflow calculating xattr_isize (git-fixes).
- erofs: stop parsing non-compact HEAD index if clusterofs is invalid (git-fixes).
- eth: bnxt: fix counting packets discarded due to OOM and netpoll (git-fixes).
- exportfs: use pr_debug for unreachable debug statements (git-fixes).
- ext4: fix slab-use-after-free in ext4_split_extent_at() (bsc#1232201)
- fat: fix uninitialized variable (git-fixes).
- fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes).
- fbdev: sisfb: Fix strbuf array overflow (stable-fixes).
- fgraph: Change the name of cpuhp state to 'fgraph:online' (git-fixes).
- fgraph: Fix missing unlock in register_ftrace_graph() (git-fixes).
- fgraph: Use CPU hotplug mechanism to initialize idle shadow stacks (git-fixes).
- filelock: fix potential use-after-free in posix_lock_inode (git-fixes).
- firmware: google: Unregister driver_info on failure (git-fixes).
- firmware: tegra: bpmp: Drop unused mbox_client_to_bpmp() (git-fixes).
- Fix regression on AMDGPU driver (bsc#1233134) 
- fs: Fix file_set_fowner LSM hook inconsistencies (git-fixes).
- fs/namespace: fnic: Switch to use %ptTd (git-fixes).
- fs/pipe: Fix lockdep false-positive in watchqueue pipe_write() (git-fixes).
- genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes).
- goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes).
- gpio: aspeed: Add the flush write to ensure the write complete (git-fixes).
- gpio: aspeed: Use devm_clk api to manage clock source (git-fixes).
- gpio: davinci: fix lazy disable (git-fixes).
- gve: Fix an edge case for TSO skb validity check (git-fixes).
- gve: Fix skb truesize underestimation (git-fixes).
- gve: Fix XDP TX completion handling when counters overflow (git-fixes).
- gve: ignore nonrelevant GSO type bits when processing TSO headers (git-fixes).
- hid: amd_sfh: Switch to device-managed dmam_alloc_coherent() (git-fixes).
- hid: core: zero-initialize the report buffer (git-fixes).
- hid: intel-ish-hid: Fix uninitialized variable 'rv' in ish_fw_xfer_direct_dma (git-fixes).
- hid: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable-fixes).
- hid: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable-fixes).
- hid: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad (stable-fixes).
- hid: multitouch: Add support for B2402FVA track point (stable-fixes).
- hid: multitouch: Add support for GT7868Q (stable-fixes).
- hid: multitouch: Add support for Thinkpad X12 Gen 2 Kbd Portfolio (stable-fixes).
- hid: plantronics: Workaround for an unexcepted opposite volume key (stable-fixes).
- hid: wacom: Defer calculation of resolution until resolution_code is known (git-fixes).
- hid: wacom: fix when get product name maybe null pointer (git-fixes).
- hid: wacom: Interpret tilt data from Intuos Pro BT as signed values (git-fixes).
- hv_netvsc: Fix VF namespace also in synthetic NIC NETDEV_REGISTER event (git-fixes).
- hv_sock: Initializing vsk-&gt;trans to NULL to prevent a dangling pointer (git-fixes).
- hwmon: (adm9240) Add missing dependency on REGMAP_I2C (git-fixes).
- hwmon: (tmp513) Add missing dependency on REGMAP_I2C (git-fixes).
- hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes).
- i2c: i801: Use a different adapter-name for IDF adapters (stable-fixes).
- i2c: imx-lpi2c: return -EINVAL when i2c peripheral clk does not work (bsc#1227885).
- i2c: imx-lpi2c: use bulk clk API (bsc#1227885).
- i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume (git-fixes).
- i2c: xiic: Fix broken locking on tx_msg (stable-fixes).
- i2c: xiic: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes).
- i2c: xiic: Fix RX IRQ busy check (stable-fixes).
- i2c: xiic: improve error message when transfer fails to start (stable-fixes).
- i2c: xiic: Switch from waitqueue to completion (stable-fixes).
- i2c: xiic: Try re-initialization on bus busy timeout (git-fixes).
- i2c: xiic: Use devm_clk_get_enabled() (stable-fixes).
- i2c: xiic: xiic_xfer(): Fix runtime PM leak on error path (git-fixes).
- i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git-fixes).
- i40e: avoid double calling i40e_pf_rxq_wait() (git-fixes).
- i40e: disable NAPI right after disabling irqs when handling xsk_pool (git-fixes).
- i40e: Fix filter input checks to prevent config with invalid values (git-fixes).
- i40e: fix use-after-free in i40e_aqc_add_filters() (git-fixes).
- i40e: Fix waiting for queues of all VSIs to be disabled (git-fixes).
- i40e: Fix XDP program unloading while removing the driver (git-fixes).
- i40e: Report MFS in decimal base instead of hex (git-fixes).
- i40e: Restore VF MSI-X state during PCI reset (git-fixes).
- i40e: take into account XDP Tx queues when stopping rings (git-fixes).
- iavf: do not process adminq tasks when __IAVF_IN_REMOVE_TASK is set (git-fixes).
- iavf: fix FDIR rule fields masks validation (git-fixes).
- iavf: Fix promiscuous mode configuration flow messages (git-fixes).
- iavf: Fix TC config comparison with existing adapter TC config (git-fixes).
- iavf: in iavf_down, disable queues when removing the driver (git-fixes).
- iavf: initialize waitqueues before starting watchdog_task (git-fixes).
- iavf: Introduce new state machines for flow director (git-fixes).
- iavf: send VLAN offloading caps once after VFR (git-fixes).
- iavf: validate tx_coalesce_usecs even if rx_coalesce_usecs is zero (git-fixes).
- ibmvnic: Do partial reset on login failure (bsc#1233150).
- ibmvnic: Enforce stronger sanity checks on login response (bsc#1233150).
- ibmvnic: Ensure login failure recovery is safe from other resets (bsc#1233150).
- ibmvnic: Handle DMA unmapping of login buffs in release functions (bsc#1233150).
- ibmvnic: Unmap DMA login rsp buffer on send login fail (bsc#1233150).
- ice: avoid executing commands on other ports when driving sync (git-fixes).
- ice: Block switchdev mode when ADQ is active and vice versa (git-fixes).
- ice: change q_index variable type to s16 to store -1 value (git-fixes).
- ice: fix accounting for filters shared by multiple VSIs (git-fixes).
- ice: fix accounting if a VLAN already exists (git-fixes).
- ice: fix ICE_LAST_OFFSET formula (git-fixes).
- ice: Fix link_down_on_close message (git-fixes).
- ice: Fix netif_is_ice() in Safe Mode (git-fixes).
- ice: Fix NULL pointer deref during VF reset (git-fixes).
- ice: fix over-shifted variable (git-fixes).
- ice: fix receive buffer size miscalculation (git-fixes).
- ice: fix VLAN replay after reset (git-fixes).
- ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes).
- ice: ice_aq_check_events: fix off-by-one check when filling buffer (git-fixes).
- ice: Interpret .set_channels() input differently (git-fixes).
- ice: reset first in crash dump kernels (git-fixes).
- ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes).
- ice: Shut down VSI with 'link-down-on-close' enabled (git-fixes).
- ice: tc: allow zero flags in parsing tc flower (git-fixes).
- ice: Unbind the workqueue (bsc#1231344).
- ice: virtchnl: stop pretending to support RSS over AQ or registers (git-fixes).
- idpf: avoid compiler introduced padding in virtchnl2_rss_key struct (git-fixes).
- idpf: avoid compiler padding in virtchnl2_ptype struct (git-fixes).
- idpf: disable local BH when scheduling napi for marker packets (git-fixes).
- idpf: distinguish vports by the dev_port attribute (git-fixes).
- idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git-fixes).
- idpf: fix corrupted frames and skb leaks in singleq mode (git-fixes).
- idpf: fix memleak in vport interrupt configuration (git-fixes).
- idpf: fix memory leaks and crashes while performing a soft reset (git-fixes).
- idpf: fix UAFs when destroying the queues (git-fixes).
- idpf: Interpret .set_channels() input differently (git-fixes).
- igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes).
- igb: extend PTP timestamp adjustments to i211 (git-fixes).
- igb: Fix missing time sync events (git-fixes).
- igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes).
- igc: Check VLAN EtherType mask (git-fixes).
- igc: Check VLAN TCI mask (git-fixes).
- igc: Fix hicredit calculation (git-fixes).
- igc: Fix missing time sync events (git-fixes).
- igc: Remove temporary workaround (git-fixes).
- igc: Report VLAN EtherType matching back to user (git-fixes).
- igc: Unlock on error in igc_io_resume() (git-fixes).
- iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git-fixes).
- iio: adc: ad7606: Fix typo in the driver name (git-fixes).
- iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes).
- iio: dac: ad5770r: add missing select REGMAP_SPI in Kconfig (git-fixes).
- iio: dac: ltc1660: add missing select REGMAP_SPI in Kconfig (git-fixes).
- iio: dac: stm32-dac-core: add missing select REGMAP_MMIO in Kconfig (git-fixes).
- iio: hid-sensors: Fix an error handling path in _hid_sensor_set_report_latency() (git-fixes).
- iio: light: al3010: Fix an error handling path in al3010_probe() (git-fixes).
- iio: light: opt3001: add missing full-scale range value (git-fixes).
- iio: light: veml6030: fix ALS sensor resolution (git-fixes).
- iio: light: veml6030: fix IIO device retrieval from embedded device (git-fixes).
- iio: light: veml6030: fix microlux value calculation (git-fixes).
- iio: proximity: mb1232: add missing select IIO_(TRIGGERED_)BUFFER in Kconfig (git-fixes).
- initramfs: avoid filename buffer overrun (bsc#1232436).
- input: adp5589-keys - fix adp5589_gpio_get_value() (git-fixes).
- input: adp5589-keys - fix NULL pointer dereference (git-fixes).
- input: ads7846 - ratelimit the spi_sync error message (stable-fixes).
- input: goodix - use the new soc_intel_is_byt() helper (stable-fixes).
- input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line (git-fixes).
- input: i8042 - add Ayaneo Kun to i8042 quirk table (git-fixes).
- input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table (git-fixes).
- input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table (git-fixes).
- input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (git-fixes).
- input: synaptics - enable SMBus for HP Elitebook 840 G2 (stable-fixes).
- iommu/vt-d: Always reserve a domain ID for identity setup (git-fixes).
- ipv6: blackhole_netdev needs snmp6 counters (bsc#1216813).
- ipv6: give an IPv6 dev to blackhole_netdev (bsc#1216813).
- irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes).
- irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git-fixes).
- itco_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes).
- ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able (git-fixes).
- ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() (git-fixes).
- ixgbe: fix crash with empty VF macvlan list (git-fixes).
- ixgbe: fix timestamp configuration code (git-fixes).
- jfs: check if leafidx greater than num leaves per dmap tree (git-fixes).
- jfs: Fix sanity check in dbMount (git-fixes).
- jfs: Fix uaf in dbFreeBits (git-fixes).
- jfs: Fix uninit-value access of new_ea in ea_buffer (git-fixes).
- jfs: UBSAN: shift-out-of-bounds in dbFindBits (git-fixes).
- kab: fix after net: add more sanity check in virtio_net_hdr_to_skb() (git-fixes).
- kabi fix of KVM: arm64: Preserve PSTATE.SS for the guest while single-step is enabled (git-fixes).
- kABI: bpf: enum bpf_{type_flag,arg_type} kABI workaround (git-fixes).
- kABI: bpf: struct bpf_func_proto kABI workaround (git-fixes).
- kabi: fix after kvm: add guest_state_{enter,exit}_irqoff() (git-fixes).
- kabi: fix after KVM: arm64: mixed-width check should be skipped for uninitialized vCPUs (git-fixes).
- kabi: Restore exported __arm_smccc_sve_check (git-fixes)
- kbuild, bpf: Use test-ge check for v1.25-only pahole (bsc#1230414 bsc#1229450).
- kbuild,bpf: Add module-specific pahole flags for distilled base BTF (bsc#1230414 bsc#1229450).
- kbuild,bpf: Switch to using --btf_features for pahole v1.26 and later (bsc#1230414 bsc#1229450).
- kbuild: add test-{ge,gt,le,lt} macros (bsc#1230414 bsc#1229450).
- kbuild: avoid too many execution of scripts/pahole-flags.sh (bsc#1230414 bsc#1229450).
- kbuild: bpf: Tell pahole to DECL_TAG kfuncs (bsc#1230414 bsc#1229450).
- kernel-binary: Enable livepatch package only when livepatch is enabled Otherwise the filelist may be empty failing the build (bsc#1218644).
- kernel.h: split out COUNT_ARGS() and CONCATENATE() to args.h (git-fixes)
- kexec: fix a memory leak in crash_shrink_memory() (git-fixes).
- kvm: add guest_state_{enter,exit}_irqoff() (git-fixes).
- kvm: Add support for arch compat vm ioctls (git-fixes).
- kvm: arm64: Add missing memory barriers when switching to pKVM's hyp pgd (git-fixes).
- kvm: arm64: Allow AArch32 PSTATE.M to be restored as System mode (git-fixes).
- kvm: arm64: Fix AArch32 register narrowing on userspace write (git-fixes).
- kvm: arm64: GICv4: Do not perform a map to a mapped vLPI (git-fixes).
- kvm: arm64: Invalidate EL1&amp;0 TLB entries for all VMIDs in nvhe hyp init (git-fixes).
- kvm: arm64: mixed-width check should be skipped for uninitialized vCPUs (git-fixes).
- kvm: arm64: Preserve PSTATE.SS for the guest while single-step is enabled (git-fixes).
- kvm: arm64: Release pfn, i.e. put page, if copying MTE tags hits ZONE_DEVICE (git-fixes).
- kvm: arm64: vgic-its: Test for valid IRQ in its_sync_lpi_pending_table() (git-fixes).
- kvm: arm64: vgic-its: Test for valid IRQ in MOVALL handler (git-fixes).
- kvm: arm64: vgic-v2: Check for non-NULL vCPU in vgic_v2_parse_attr() (git-fixes).
- kvm: arm64: vgic-v2: Use cpuid from userspace as vcpu_id (git-fixes).
- kvm: arm64: vgic-v4: Restore pending state on host userspace write (git-fixes).
- kvm: eventfd: Fix false positive RCU usage warning (git-fixes).
- kvm: Fix coalesced_mmio_has_room() to avoid premature userspace exit (git-fixes).
- kvm: Fix lockdep false negative during host resume (git-fixes).
- kvm: fix memoryleak in kvm_init() (git-fixes).
- kvm: Grab a reference to KVM for VM and vCPU stats file descriptors (git-fixes).
- kvm: Optimize kvm_make_vcpus_request_mask() a bit (git-fixes).
- kvm: PPC: Book3S HV: remove unused varible (bsc#1194869).
- kvm: Pre-allocate cpumasks for kvm_make_all_cpus_request_except() (git-fixes).
- kvm: Reject overly excessive IDs in KVM_CREATE_VCPU (git-fixes).
- kvm: s390: Change virtual to physical address access in diag 0x258 handler (git-fixes bsc#1232631).
- kvm: s390: Fix SORTL and DFLTCC instruction format error in __insn32_query (git-fixes bsc#1231277).
- kvm: s390: gaccess: Check if guest address is in memslot (git-fixes bsc#1232630).
- kvm: SVM: Disallow guest from changing userspace's MSR_AMD64_DE_CFG value (git-fixes).
- kvm: SVM: Do not advertise Bus Lock Detect to guest if SVM support is missing (git-fixes).
- kvm: SVM: fix emulation of msr reads/writes of MSR_FS_BASE and MSR_GS_BASE (git-fixes).
- kvm: Unconditionally get a ref to /dev/kvm module when creating a VM (git-fixes).
- kvm: Write the per-page 'segment' when clearing (part of) a guest page (git-fixes).
- kvm: x86: Use a stable condition around all VT-d PI paths (git-fixes).
- kvm: x86/mmu: Fold rmap_recycle into rmap_add (git-fixes).
- kvm: x86/mmu: Rename slot_handle_leaf to slot_handle_level_4k (git-fixes).
- kvm/arm64: rework guest entry logic (git-fixes).
- mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes).
- Makefile.compiler: replace cc-ifversion with compiler-specific macros (bsc#1230414 bsc#1229450).
- media: adv7604: prevent underflow condition when reporting colorspace (git-fixes).
- media: cx24116: prevent overflows on SNR calculus (git-fixes).
- media: dvb_frontend: do not play tricks with underflow values (git-fixes).
- media: dvb-usb-v2: af9035: fix missing unlock (git-fixes).
- media: dvb-usb-v2: af9035: Fix null-ptr-deref in af9035_i2c_master_xfer (stable-fixes).
- media: dvbdev: prevent the risk of out of memory access (git-fixes).
- media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes).
- media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes).
- media: stb0899_algo: initialize cfr before using it (git-fixes).
- media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes).
- media: v4l2-tpg: prevent the risk of a division by zero (git-fixes).
- media: videobuf2-core: clear memory related fields in __vb2_plane_dmabuf_put() (stable-fixes).
- mei: use kvmalloc for read buffer (git-fixes).
- misc: apds990x: Fix missing pm_runtime_disable() (git-fixes).
- mm/hugetlb: fix nodes huge page allocation when there are surplus pages (bsc#1234012).
- mm/memory: add non-anonymous page check in the copy_present_page() (bsc#1231646).
- modpost: remove incorrect code in do_eisa_entry() (git-fixes).
- module: abort module loading when sysfs setup suffer errors (git-fixes).
- nbd: fix race between timeout and normal completion (bsc#1230918).
- net: add more sanity check in virtio_net_hdr_to_skb() (git-fixes).
- net: ena: Fix potential sign extension issue (git-fixes).
- net: ena: Remove ena_select_queue (git-fixes).
- net: ena: Wrong missing IO completions check order (git-fixes).
- net: mana: Implement get_ringparam/set_ringparam for mana (bsc#1229891).
- net: mana: Improve mana_set_channels() in low mem conditions (bsc#1230289).
- net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes).
- net: relax socket state check at accept time (git-fixes).
- net: socket: suppress unused warning (git-fixes).
- net: test for not too small csum_start in virtio_net_hdr_to_skb() (git-fixes).
- net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device (git-fixes).
- net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL configuration (git-fixes).
- net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes).
- net: usb: usbnet: fix name regression (git-fixes).
- net: usb: usbnet: fix race in probe failure (git-fixes).
- net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git-fixes).
- net/mlx5: Added cond_resched() to crdump collection (git-fixes).
- net/mlx5: Allow 0 for total host VFs (git-fixes).
- net/mlx5: Correctly compare pkt reformat ids (git-fixes).
- net/mlx5: DR, Can't go to uplink vport on RX rule (git-fixes).
- net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx (git-fixes).
- net/mlx5: DR, Use the right GVMI number for drop action (git-fixes).
- net/mlx5: Drain health before unregistering devlink (git-fixes).
- net/mlx5: E-switch, register event handler before arming the event (git-fixes).
- net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes).
- net/mlx5: Fix fw tracer first block check (git-fixes).
- net/mlx5: fix potential memory leak in mlx5e_init_rep_rx (git-fixes).
- net/mlx5: fs, lock FTE when checking if active (git-fixes).
- net/mlx5: Handle fw tracer change ownership event based on MTRC (git-fixes).
- net/mlx5: LAG, Check correct bucket when modifying LAG (git-fixes).
- net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes).
- net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes).
- net/mlx5: Lag, restore buckets number to default after hash LAG deactivation (git-fixes).
- net/mlx5: Skip clock update work when device is in error state (git-fixes).
- net/mlx5: Unregister notifier on eswitch init failure (git-fixes).
- net/mlx5: Update the list of the PCI supported devices (git-fixes).
- net/mlx5: Use mlx5 device constant for selecting CQ period mode for ASO (git-fixes).
- net/mlx5: Use recovery timeout on sync reset flow (git-fixes).
- net/mlx5: Use RMW accessors for changing LNKCTL (git-fixes).
- net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys (git-fixes).
- net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes).
- net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git-fixes).
- net/mlx5e: Again mutually exclude RX-FCS and RX-port-timestamp (git-fixes).
- net/mlx5e: Allow software parsing when IPsec crypto is enabled (git-fixes).
- net/mlx5e: Change the warning when ignore_flow_level is not supported (git-fixes).
- net/mlx5e: Check return value of snprintf writing to fw_version buffer (git-fixes).
- net/mlx5e: Check return value of snprintf writing to fw_version buffer for representors (git-fixes).
- net/mlx5e: Correct snprintf truncation handling for fw_version buffer (git-fixes).
- net/mlx5e: Correct snprintf truncation handling for fw_version buffer used by representors (git-fixes).
- net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes).
- net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes).
- net/mlx5e: Do not offload internal port if filter device is out device (git-fixes).
- net/mlx5e: fix a potential double-free in fs_udp_create_groups (git-fixes).
- net/mlx5e: Fix crash moving to switchdev mode when ntuple offload is set (git-fixes).
- net/mlx5e: fix double free in macsec_fs_tx_create_crypto_table_groups (git-fixes).
- net/mlx5e: fix double free of encap_header (git-fixes).
- net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN) packets (git-fixes).
- net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes).
- net/mlx5e: Fix pedit endianness (git-fixes).
- net/mlx5e: Fix possible deadlock on mlx5e_tx_timeout_work (git-fixes).
- net/mlx5e: fix return value check in mlx5e_ipsec_remove_trailer() (git-fixes).
- net/mlx5e: Fix slab-out-of-bounds in mlx5_query_nic_vport_mac_list() (git-fixes).
- net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes).
- net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes).
- net/mlx5e: kTLS, Fix incorrect page refcounting (git-fixes).
- net/mlx5e: Move representor neigh cleanup to profile cleanup_tx (git-fixes).
- net/mlx5e: Reduce the size of icosq_str (git-fixes).
- net/mlx5e: Take state lock during tx timeout reporter (git-fixes).
- net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer exhaustion (git-fixes).
- net/sched: taprio: Limit TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME to INT_MAX (bsc#1226797)
- netdevsim: use cond_resched() in nsim_dev_trap_report_work() (git-fixes).
- nfs: Avoid unnecessary rescanning of the per-server delegation list (git-fixes).
- nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes).
- nfs: fix memory leak in error path of nfs4_do_reclaim (git-fixes).
- nfsd: call cache_put if xdr_reserve_space returns NULL (git-fixes).
- nfsd: fix delegation_blocked() to block correctly for at least 30 seconds (git-fixes).
- nfsd: Fix NFSv4's PUTPUBFH operation (git-fixes).
- nfsd: fix refcount leak when file is unhashed after being found (git-fixes).
- nfsd: map the EBADMSG to nfserr_io to avoid warning (git-fixes).
- nfsd: Mark filecache 'down' if init fails (git-fixes).
- nfsd: remove unneeded EEXIST error check in nfsd_do_file_acquire (git-fixes).
- nfsd: return -EINVAL when namelen is 0 (git-fixes).
- nfsv3: only use NFS timeout for MOUNT when protocols are compatible (bsc#1231016).
- nfsv4: Fix clearing of layout segments in layoutreturn (git-fixes).
- nilfs2: fix kernel bug due to missing clearing of buffer delay flag (git-fixes).
- nouveau/dmem: Fix vulnerability in migrate_to_ram upon copy error (git-fixes).
- ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir() (git-fixes).
- ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition (stable-fixes).
- nvme-fabrics: fix kernel crash while shutting down controller (git-fixes).
- nvme-multipath: system fails to create generic nvme device (git-fixes).
- nvme-pci: fix freeing of the HMB descriptor table (git-fixes).
- nvme-pci: qdepth 1 quirk (git-fixes).
- nvme-pci: reverse request order in nvme_queue_rqs (git-fixes).
- nvmet-auth: assign dh_key to NULL after kfree_sensitive (git-fixes).
- ocfs2: fix the la space leak when unmounting an ocfs2 volume (git-fixes).
- ocfs2: fix uninit-value in ocfs2_get_block() (git-fixes).
- ocfs2: pass u64 to ocfs2_truncate_inline maybe overflow (git-fixes).
- ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (git-fixes).
- parport: Proper fix for array out-of-bounds access (git-fixes).
- pci: Add ACS quirk for Qualcomm SA8775P (stable-fixes).
- pci: Add function 0 DMA alias quirk for Glenfly Arise chip (stable-fixes).
- pci: Add T_PVPERL macro (git-fixes).
- pci: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf() (git-fixes).
- pci: Fix pci_enable_acs() support for the ACS quirks (bsc#1229019).
- pci: Fix reset_method_store() memory leak (git-fixes).
- pci: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds (git-fixes).
- pci: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes).
- pci: keystone: Set mode as Root Complex for 'ti,keystone-pcie' compatible (git-fixes).
- pci: Mark Creative Labs EMU20k2 INTx masking as broken (stable-fixes).
- pci: rockchip-ep: Fix address translation unit programming (git-fixes).
- phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes).
- platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git-fixes).
- platform/surface: aggregator_registry: Add support for Surface Laptop Go 3 (stable-fixes).
- platform/surface: aggregator: Fix warning when controller is destroyed in probe (git-fixes).
- platform/x86: dell-sysman: add support for alienware products (stable-fixes).
- platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes).
- platform/x86: touchscreen_dmi: add nanote-next quirk (stable-fixes).
- posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098).
- power: reset: brcmstb: Do not go into infinite loop if reset fails (stable-fixes).
- power: supply: bq27xxx: Fix registers of bq27426 (git-fixes).
- power: supply: core: Remove might_sleep() from power_supply_put() (git-fixes).
- powerpc: Allow clearing and restoring registers independent of saved breakpoint state (bsc#1194869).
- powerpc: remove GCC version check for UPD_CONSTR (bsc#1194869).
- powerpc/64: Convert patch_instruction() to patch_u32() (bsc#1194869).
- powerpc/asm: Remove UPD_CONSTR after GCC 4.9 removal (bsc#1194869).
- powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869).
- powerpc/boot: Handle allocation failure in simple_realloc() (bsc#1194869).
- powerpc/boot: Only free if realloc() succeeds (bsc#1194869).
- powerpc/code-patching: Add generic memory patching (bsc#1194869).
- powerpc/code-patching: Consolidate and cache per-cpu patching context (bsc#1194869).
- powerpc/code-patching: Do not call is_vmalloc_or_module_addr() without CONFIG_MODULES (bsc#1194869).
- powerpc/code-patching: Fix error handling in do_patch_instruction() (bsc#1194869).
- powerpc/code-patching: Fix oops with DEBUG_VM enabled (bsc#1194869).
- powerpc/code-patching: Fix unmap_patch_area() error handling (bsc#1194869).
- powerpc/code-patching: introduce patch_instructions() (bsc#1194869).
- powerpc/code-patching: Perform hwsync in __patch_instruction() in case of failure (bsc#1194869).
- powerpc/code-patching: Pre-map patch area (bsc#1194869).
- powerpc/code-patching: Remove #ifdef CONFIG_STRICT_KERNEL_RWX (bsc#1194869).
- powerpc/code-patching: Remove pr_debug()/pr_devel() messages and fix check() (bsc#1194869).
- powerpc/code-patching: Reorganise do_patch_instruction() to ease error handling (bsc#1194869).
- powerpc/code-patching: Speed up page mapping/unmapping (bsc#1194869).
- powerpc/code-patching: Use jump_label to check if poking_init() is done (bsc#1194869).
- powerpc/code-patching: Use temporary mm for Radix MMU (bsc#1194869).
- powerpc/code-patching: Use WARN_ON and fix check in poking_init (bsc#1194869).
- powerpc/ftrace: Use patch_instruction() return directly (bsc#1194869).
- powerpc/imc-pmu: Fix use of mutex in IRQs disabled section (bsc#1054914 git-fixes).
- powerpc/imc-pmu: Use the correct spinlock initializer (bsc#1054914 git-fixes).
- powerpc/inst: Refactor ___get_user_instr() (bsc#1194869).
- powerpc/kexec: Fix return of uninitialized variable (bsc#1194869).
- powerpc/lib: Add __init attribute to eligible functions (bsc#1194869).
- powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).
- powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL (bsc#1194869).
- powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869).
- powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869).
- powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869).
- powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector (bsc#1194869).
- powerpc/tlb: Add local flush for page given mm_struct and psize (bsc#1194869).
- powerpc/vdso: augment VDSO32 functions to support 64 bits build (bsc#1194869).
- powerpc/vdso: Fix VDSO data access when running in a non-root time namespace (bsc#1194869).
- powerpc/vdso: Merge vdso64 and vdso32 into a single directory (bsc#1194869).
- powerpc/vdso: Rework VDSO32 makefile to add a prefix to object files (bsc#1194869).
- powerpc/xics: Check return value of kasprintf in icp_native_map_one_cpu (bsc#1194869).
- powerpc/xmon: Fix disassembly CPU feature checks (bsc#1065729).
- qed: avoid truncating work queue length (git-fixes).
- rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow (bsc#1226631).
- rcu: Add rcutree.nohz_full_patience_delay to reduce nohz_full (bsc#1231327)
- rdma/bnxt_re: Add a check for memory allocation (git-fixes)
- rdma/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes)
- rdma/bnxt_re: Fix a bug while setting up Level-2 PBL pages (git-fixes)
- rdma/bnxt_re: Fix incorrect AVID type in WQE structure (git-fixes)
- rdma/bnxt_re: Fix the GID table length (git-fixes)
- rdma/bnxt_re: Fix the max CQ WQEs for older adapters (git-fixes)
- rdma/bnxt_re: Fix the usage of control path spin locks (git-fixes)
- rdma/bnxt_re: Return more meaningful error (git-fixes)
- rdma/bnxt_re: synchronize the qp-handle table array (git-fixes)
- rdma/cxgb4: Dump vendor specific QP details (git-fixes)
- rdma/cxgb4: Fix RDMA_CM_EVENT_UNREACHABLE error for iWARP (git-fixes)
- rdma/hns: Add clear_hem return value to log (git-fixes)
- rdma/hns: Add mutex_destroy() (git-fixes)
- rdma/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci (git-fixes)
- rdma/hns: Fix cpu stuck caused by printings during reset (git-fixes)
- rdma/hns: Fix different dgids mapping to the same dip_idx (git-fixes)
- rdma/hns: Fix flush cqe error when racing with destroy qp (git-fixes)
- rdma/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes)
- rdma/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes)
- rdma/hns: Remove unnecessary QP type checks (git-fixes)
- rdma/hns: Remove unused abnormal interrupt of type RAS (git-fixes)
- rdma/hns: Use dev_* printings in hem code instead of ibdev_* (git-fixes)
- rdma/hns: Use macro instead of magic number (git-fixes)
- rdma/irdma: Fix misspelling of 'accept*' (git-fixes)
- rdma/mad: Improve handling of timed out WRs of mad agent (git-fixes)
- rdma/mana_ib: use the correct page size for mapping user-mode doorbell page (git-fixes).
- rdma/mana_ib: use the correct page table index based on hardware page size (git-fixes).
- rdma/mlx5: Move events notifier registration to be after device registration (git-fixes)
- rdma/mlx5: Round max_rd_atomic/max_dest_rd_atomic up instead of down (git-fixes)
- rdma/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git-fixes).
- rdma/rtrs-srv: Avoid null pointer deref during path establishment (git-fixes)
- rdma/rxe: Fix the qp flush warnings in req (git-fixes)
- rdma/rxe: Set queue pair cur_qp_state when being queried (git-fixes)
- rdma/srpt: Make slab cache names unique (git-fixes)
- Removed the duplicated check of static_assert(sizeof(struct work_struct) &gt;= sizeof(struct rcu_head)).
- Removed unnecessary white-space change in kernel/bpf/syscall.c
- Revert 'cgroup: Fix memory leak caused by missing cgroup_bpf_offline' (bsc#1234108).
- Revert 'ixgbe: Manual AN-37 for troublesome link partners for X550 SFI' (git-fixes).
- Revert 'KVM: Prevent module exit until all VMs are freed' (git-fixes).
- Revert 'mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K' (git-fixes).
- Revert 'usb: gadget: composite: fix OS descriptors w_value logic' (git-fixes).
- Revert 'usb: yurex: Replace snprintf() with the safer scnprintf() variant' (stable-fixes).
- Revert PM changes that caused a regression on S4 resume (bsc#1231578).
- rpm/check-for-config-changes: add HAVE_RUST and RUSTC_SUPPORTS_ to IGNORED_CONFIGS_RE They depend on SHADOW_CALL_STACK.
- rpm/check-for-config-changes: Exclude ARCH_USING_PATCHABLE_FUNCTION_ENTRY gcc version dependent, at least on ppc
- rpm/release-projects: Add SLFO projects (bsc#1231293).
- rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644)
- rtc: ab-eoz9: do not fail temperature reads on undervoltage notification (git-fixes).
- rtc: abx80x: Fix WDT bit position of the status register (git-fixes).
- rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git-fixes).
- rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- s390/mm: Add cond_resched() to cmm_alloc/free_pages() (bsc#1228747).
- s390/sclp_vt220: Convert newlines to CRLF instead of LFCR (git-fixes bsc#1232632).
- sched/isolation: Prevent boot crash when the boot CPU is (bsc#1231327)
- scsi: aacraid: Rearrange order of struct aac_srb_unit (git-fixes).
- scsi: core: alua: I/O errors for ALUA state transitions (git-fixes).
- scsi: core: Fix the return value of scsi_logical_block_count() (git-fixes).
- scsi: core: Handle devices which return an unusually large VPD page count (git-fixes).
- scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del() (git-fixes).
- scsi: fnic: Move flush_work initialization out of if block (bsc#1230055).
- scsi: hpsa: Fix allocation size for Scsi_Host private data (git-fixes).
- scsi: libsas: Fix exp-attached device scan after probe failure scanned in again after probe failed (git-fixes).
- scsi: libsas: Fix the failure of adding phy with zero-address to port (git-fixes).
- scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241).
- scsi: lpfc: Add ELS_RSP cmd to the list of WQEs to flush in lpfc_els_flush_cmd() (bsc#1232757).
- scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths (bsc#1233241).
- scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241).
- scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs (bsc#1233241).
- scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up FDMI (bsc#1233241).
- scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241).
- scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance (bsc#1232757).
- scsi: lpfc: Fix kref imbalance on fabric ndlps from dev_loss_tmo handler (bsc#1232757).
- scsi: lpfc: Modify CGN warning signal calculation based on EDC response (bsc#1233241).
- scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback (bsc#1233241).
- scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241).
- scsi: lpfc: Remove trailing space after \n newline (bsc#1232757).
- scsi: lpfc: Restrict support for 32 byte CDBs to specific HBAs (git-fixes).
- scsi: lpfc: Revise TRACE_EVENT log flag severities from KERN_ERR to KERN_WARNING (bsc#1232757).
- scsi: lpfc: Support loopback tests with VMID enabled (bsc#1232757).
- scsi: lpfc: Update lpfc version to 14.4.0.5 (bsc#1232757).
- scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241).
- scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG flag (bsc#1233241).
- scsi: lpfc: Update phba link state conditional before sending CMF_SYNC_WQE (bsc#1232757).
- scsi: mac_scsi: Disallow bus errors during PDMA send (git-fixes).
- scsi: mac_scsi: Refactor polling loop (git-fixes).
- scsi: mac_scsi: Revise printk(KERN_DEBUG ...) messages (git-fixes).
- scsi: mpi3mr: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
- scsi: mpi3mr: Fix ATA NCQ priority support (git-fixes).
- scsi: mpt3sas: Avoid IOMMU page faults on REPORT ZONES (git-fixes).
- scsi: NCR5380: Check for phase match during PDMA fixup (git-fixes).
- scsi: qedf: Set qed_slowpath_params to zero before use (git-fixes).
- scsi: scsi_transport_fc: Allow setting rport state to current state (git-fixes).
- scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes).
- scsi: smartpqi: correct stream detection (git-fixes).
- scsi: smartpqi: revert propagate-the-multipath-failure-to-SML-quickly (git-fixes).
- scsi: spi: Fix sshdr use (git-fixes).
- scsi: wd33c93: Do not use stale scsi_pointer value (git-fixes).
- security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes).
- selftests/bpf: Add a test case to write mtu result into .rodata (git-fixes).
- selftests/bpf: Add a test case to write strtol result into .rodata (git-fixes).
- selftests/bpf: Fix ARG_PTR_TO_LONG {half-,}uninitialized test (git-fixes).
- selftests/bpf: Rename ARG_PTR_TO_LONG test description (git-fixes).
- selftests/bpf: test for malformed BPF_CORE_TYPE_ID_LOCAL relocation (git-fixes).
- serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).
- sfc: Check firmware supports Ethernet PTP filter (git-fixes).
- sfc: do not unregister flow_indr if it was never registered (git-fixes).
- sfc: fix a double-free bug in efx_probe_filters (git-fixes).
- signal: Replace BUG_ON()s (bsc#1234093).
- spi: atmel-quadspi: Fix register name in verbose logging function (git-fixes).
- spi: bcm63xx: Enable module autoloading (stable-fixes).
- spi: bcm63xx: Fix module autoloading (git-fixes).
- spi: Fix acpi deferred irq probe (git-fixes).
- spi: lpspi: release requested DMA channels (stable-fixes).
- spi: lpspi: Silence error message upon deferred probe (stable-fixes).
- spi: lpspi: Simplify some error message (git-fixes).
- spi: ppc4xx: Avoid returning 0 when failed to parse and map IRQ (git-fixes).
- spi: ppc4xx: handle irq_of_parse_and_map() errors (git-fixes).
- spi: s3c64xx: fix timeout counters in flush_fifo (git-fixes).
- spi: spi-fsl-lpspi: Undo runtime PM changes at driver exit time (git-fixes).
- spi: spi-imx: Fix pm_runtime_set_suspended() with runtime pm enabled (git-fixes).
- spi: spidev: Add missing spi_device_id for jg10309-01 (git-fixes).
- staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg() (git-fixes).
- static_call: Do not make __static_call_return0 static (git-fixes).
- sunrpc: clnt.c: Remove misleading comment (git-fixes).
- sunrpc: Fix integer overflow in decode_rc_list() (git-fixes).
- sunrpc: Fixup gss_status tracepoint error output (git-fixes).
- thermal: core: Initialize thermal zones before registering them (git-fixes).
- thermal: intel: int340x: processor: Fix warning during module unload (git-fixes).
- tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes).
- tracing: Consider the NULL character when validating the event length (git-fixes).
- tracing/hwlat: Fix a race during cpuhp processing (git-fixes).
- tracing/uprobes: Use trace_event_buffer_reserve() helper (git-fixes).
- tun: Fix xdp_rxq_info's queue_index when detaching (git-fixes).
- tun: prevent negative ifindex (git-fixes).
- ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460).
- Update config files (bsc#1218644). LIVEPATCH_IPA_CLONES=n =&gt; LIVEPATCH=n
- Update config files. Enabled IDPF for ARM64 (bsc#1221309)
- uprobe: avoid out-of-bounds memory access of fetching args (git-fixes).
- uprobes: encapsulate preparation of uprobe args buffer (git-fixes).
- usb: appledisplay: close race between probe and completion handler (stable-fixes).
- usb: chaoskey: fail open after removal (git-fixes).
- usb: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes).
- usb: chipidea: udc: enable suspend interrupt after usb reset (stable-fixes).
- usb: dwc2: Adjust the timing of USB Driver Interrupt Registration in the Crashkernel Scenario (stable-fixes).
- usb: dwc3: core: Stop processing of pending events if controller is halted (git-fixes).
- usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing logic (git-fixes).
- usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes).
- usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes).
- usb: ehci-spear: fix call balance of sehci clk handling routines (git-fixes).
- usb: gadget: core: force synchronous registration (git-fixes).
- usb: misc: cypress_cy7c63: check for short transfer (stable-fixes).
- usb: misc: yurex: fix race between read and write (stable-fixes).
- usb: musb: sunxi: Fix accessing an released usb phy (git-fixes).
- usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes).
- usb: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git-fixes).
- usb: serial: io_edgeport: fix use after free in debug printk (git-fixes).
- usb: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes).
- usb: serial: option: add Quectel RG650V (stable-fixes).
- usb: serial: option: add support for Quectel EG916Q-GL (stable-fixes).
- usb: serial: option: add Telit FN920C04 MBIM compositions (stable-fixes).
- usb: serial: pl2303: add device id for Macrosilicon MS3020 (stable-fixes).
- usb: serial: qcserial: add support for Sierra Wireless EM86xx (stable-fixes).
- usb: storage: ignore bogus device raised by JieLi BR21 USB sound chip (stable-fixes).
- usb: typec: altmode should keep reference to parent (git-fixes).
- usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() (git-fixes).
- usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes() (git-fixes).
- usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read() (git-fixes).
- usb: xhci: Fix problem with xhci resume from suspend (stable-fixes).
- usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes).
- usb: yurex: Fix inconsistent locking bug in yurex_read() (git-fixes).
- usb: yurex: make waiting on yurex_write interruptible (git-fixes).
- usb: yurex: Replace snprintf() with the safer scnprintf() variant (stable-fixes).
- usbip: tools: Fix detach_port() invalid port error path (git-fixes).
- usbnet: ipheth: fix carrier detection in modes 1 and 4 (stable-fixes).
- Use pahole -j1 option for reproducible builds (bsc#1230414 bsc#1229450).
- vdpa/mlx5: preserve CVQ vringh index (git-fixes).
- vhost_vdpa: assign irq bypass producer token correctly (git-fixes).
- vhost/scsi: null-ptr-dereference in vhost_scsi_get_req() (git-fixes).
- virtio_console: fix misc probe bugs (git-fixes).
- virtio_net: fixing XDP for fully checksummed packets handling (git-fixes).
- virtio-net: synchronize probe with ndo_set_features (git-fixes).
- vmxnet3: add command to allow disabling of offloads (bsc#1226498).
- vmxnet3: add latency measurement support in vmxnet3 (bsc#1226498).
- vmxnet3: prepare for version 9 changes (bsc#1226498).
- vmxnet3: update to version 9 (bsc#1226498).
- vsock/virtio: fix packet delivery to tap device (git-fixes).
- watchdog: mediatek: Make sure system reset gets asserted in mtk_wdt_restart() (git-fixes).
- watchdog: rti: of: honor timeout-sec property (git-fixes).
- wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1 (git-fixes).
- wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2 (git-fixes).
- wifi: ath10k: Fix memory leak in management tx (git-fixes).
- wifi: ath11k: fix array out-of-bound access in SoC stats (stable-fixes).
- wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes).
- wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit (stable-fixes).
- wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (git-fixes).
- wifi: ath9k: fix parameter check in ath9k_init_debug() (stable-fixes).
- wifi: ath9k: fix possible integer overflow in ath9k_get_et_stats() (stable-fixes).
- wifi: ath9k: Remove error checks when creating debugfs entries (git-fixes).
- wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes).
- wifi: iwlegacy: Clear stale interrupts before resuming device (stable-fixes).
- wifi: iwlwifi: clear trans-&gt;state earlier upon error (stable-fixes).
- wifi: iwlwifi: lower message level for FW buffer destination (stable-fixes).
- wifi: iwlwifi: mvm: disconnect station vifs if recovery failed (stable-fixes).
- wifi: iwlwifi: mvm: fix iwl_mvm_scan_fits() calculation (stable-fixes).
- wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() (git-fixes).
- wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower (git-fixes).
- wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes).
- wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() (stable-fixes).
- wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (git-fixes).
- wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- wifi: rtw88: select WANT_DEV_COREDUMP (stable-fixes).
- workqueue: Avoid using isolated cpus' timers on (bsc#1231327)
- workqueue: mark power efficient workqueue as unbounded if (bsc#1231327)
- x86/bugs: Do not use UNTRAIN_RET with IBPB on entry (git-fixes).
- x86/bugs: Skip RSB fill at VMEXIT (git-fixes).
- x86/cpufeatures: Add a IBPB_NO_RET BUG flag (git-fixes).
- x86/cpufeatures: Define X86_FEATURE_AMD_IBPB_RET (git-fixes).
- x86/entry: Have entry_ibpb() invalidate return predictions (git-fixes).
- x86/hyperv: Set X86_FEATURE_TSC_KNOWN_FREQ when Hyper-V provides frequency (git-fixes).
- x86/kaslr: Expose and use the end of the physical memory address space (bsc#1230405).
- x86/kvm: fix is_stale_page_fault() (bsc#1221333).
- xfrm: set dst dev to blackhole_netdev instead of loopback_dev in ifdown (bsc#1216813).
- xhci: Fix incorrect stream context type macro (git-fixes).
- xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes).
- xhci: Mitigate failed set dequeue pointer commands (git-fixes).
- xhci: Separate PORT and CAPs macros into dedicated file (stable-fixes).
- xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-17"/>
	<updated date="2024-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1054914">SUSE bug 1054914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1082555">SUSE bug 1082555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204171">SUSE bug 1204171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205796">SUSE bug 1205796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206188">SUSE bug 1206188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206344">SUSE bug 1206344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209290">SUSE bug 1209290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210449">SUSE bug 1210449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210627">SUSE bug 1210627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213034">SUSE bug 1213034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216813">SUSE bug 1216813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218562">SUSE bug 1218562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218644">SUSE bug 1218644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220382">SUSE bug 1220382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221309">SUSE bug 1221309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221333">SUSE bug 1221333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222364">SUSE bug 1222364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222590">SUSE bug 1222590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223202">SUSE bug 1223202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223384">SUSE bug 1223384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223524">SUSE bug 1223524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223656">SUSE bug 1223656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223824">SUSE bug 1223824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223848">SUSE bug 1223848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223919">SUSE bug 1223919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223942">SUSE bug 1223942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224518">SUSE bug 1224518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224526">SUSE bug 1224526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224574">SUSE bug 1224574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225189">SUSE bug 1225189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225336">SUSE bug 1225336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225611">SUSE bug 1225611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225725">SUSE bug 1225725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225730">SUSE bug 1225730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225742">SUSE bug 1225742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225762">SUSE bug 1225762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225764">SUSE bug 1225764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225812">SUSE bug 1225812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226498">SUSE bug 1226498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226560">SUSE bug 1226560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226592">SUSE bug 1226592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226631">SUSE bug 1226631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226748">SUSE bug 1226748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226797">SUSE bug 1226797</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226872">SUSE bug 1226872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227437">SUSE bug 1227437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227853">SUSE bug 1227853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227885">SUSE bug 1227885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228119">SUSE bug 1228119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228269">SUSE bug 1228269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228410">SUSE bug 1228410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228430">SUSE bug 1228430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228486">SUSE bug 1228486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228650">SUSE bug 1228650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228709">SUSE bug 1228709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228743">SUSE bug 1228743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228747">SUSE bug 1228747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228857">SUSE bug 1228857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229005">SUSE bug 1229005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229019">SUSE bug 1229019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229312">SUSE bug 1229312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229429">SUSE bug 1229429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229450">SUSE bug 1229450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229454">SUSE bug 1229454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229456">SUSE bug 1229456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229556">SUSE bug 1229556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229585">SUSE bug 1229585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229752">SUSE bug 1229752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229769">SUSE bug 1229769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229808">SUSE bug 1229808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229837">SUSE bug 1229837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229891">SUSE bug 1229891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230055">SUSE bug 1230055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230179">SUSE bug 1230179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230220">SUSE bug 1230220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230231">SUSE bug 1230231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230270">SUSE bug 1230270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230289">SUSE bug 1230289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230405">SUSE bug 1230405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230414">SUSE bug 1230414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230429">SUSE bug 1230429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230456">SUSE bug 1230456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230550">SUSE bug 1230550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230558">SUSE bug 1230558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230600">SUSE bug 1230600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230620">SUSE bug 1230620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230715">SUSE bug 1230715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230722">SUSE bug 1230722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230763">SUSE bug 1230763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230773">SUSE bug 1230773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230774">SUSE bug 1230774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230801">SUSE bug 1230801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230827">SUSE bug 1230827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230903">SUSE bug 1230903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230918">SUSE bug 1230918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231016">SUSE bug 1231016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231072">SUSE bug 1231072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231073">SUSE bug 1231073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231083">SUSE bug 1231083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231084">SUSE bug 1231084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231085">SUSE bug 1231085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231087">SUSE bug 1231087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231089">SUSE bug 1231089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231094">SUSE bug 1231094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231096">SUSE bug 1231096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231098">SUSE bug 1231098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231101">SUSE bug 1231101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231105">SUSE bug 1231105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231108">SUSE bug 1231108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231111">SUSE bug 1231111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231114">SUSE bug 1231114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231115">SUSE bug 1231115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231132">SUSE bug 1231132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231135">SUSE bug 1231135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231138">SUSE bug 1231138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231148">SUSE bug 1231148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231169">SUSE bug 1231169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231178">SUSE bug 1231178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231179">SUSE bug 1231179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231180">SUSE bug 1231180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231181">SUSE bug 1231181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231187">SUSE bug 1231187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231191">SUSE bug 1231191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231193">SUSE bug 1231193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231195">SUSE bug 1231195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231197">SUSE bug 1231197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231200">SUSE bug 1231200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231202">SUSE bug 1231202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231203">SUSE bug 1231203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231277">SUSE bug 1231277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231293">SUSE bug 1231293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231327">SUSE bug 1231327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231344">SUSE bug 1231344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231375">SUSE bug 1231375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231383">SUSE bug 1231383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231434">SUSE bug 1231434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231439">SUSE bug 1231439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231441">SUSE bug 1231441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231442">SUSE bug 1231442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231452">SUSE bug 1231452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231465">SUSE bug 1231465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231474">SUSE bug 1231474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231481">SUSE bug 1231481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231496">SUSE bug 1231496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231502">SUSE bug 1231502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231537">SUSE bug 1231537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231539">SUSE bug 1231539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231540">SUSE bug 1231540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231541">SUSE bug 1231541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231578">SUSE bug 1231578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231646">SUSE bug 1231646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231673">SUSE bug 1231673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231849">SUSE bug 1231849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231856">SUSE bug 1231856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231857">SUSE bug 1231857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231858">SUSE bug 1231858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231859">SUSE bug 1231859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231861">SUSE bug 1231861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231864">SUSE bug 1231864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231872">SUSE bug 1231872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231883">SUSE bug 1231883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231885">SUSE bug 1231885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231887">SUSE bug 1231887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231888">SUSE bug 1231888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231889">SUSE bug 1231889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231890">SUSE bug 1231890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231892">SUSE bug 1231892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231893">SUSE bug 1231893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231895">SUSE bug 1231895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231896">SUSE bug 1231896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231897">SUSE bug 1231897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231902">SUSE bug 1231902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231903">SUSE bug 1231903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231904">SUSE bug 1231904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231907">SUSE bug 1231907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231914">SUSE bug 1231914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231916">SUSE bug 1231916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231920">SUSE bug 1231920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231923">SUSE bug 1231923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231929">SUSE bug 1231929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231930">SUSE bug 1231930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231931">SUSE bug 1231931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231935">SUSE bug 1231935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231936">SUSE bug 1231936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231937">SUSE bug 1231937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231938">SUSE bug 1231938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231939">SUSE bug 1231939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231940">SUSE bug 1231940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231941">SUSE bug 1231941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231942">SUSE bug 1231942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231944">SUSE bug 1231944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231947">SUSE bug 1231947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231950">SUSE bug 1231950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231952">SUSE bug 1231952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231953">SUSE bug 1231953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231954">SUSE bug 1231954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231958">SUSE bug 1231958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231959">SUSE bug 1231959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231960">SUSE bug 1231960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231961">SUSE bug 1231961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231962">SUSE bug 1231962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231965">SUSE bug 1231965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231967">SUSE bug 1231967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231968">SUSE bug 1231968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231972">SUSE bug 1231972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231973">SUSE bug 1231973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231976">SUSE bug 1231976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231978">SUSE bug 1231978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231979">SUSE bug 1231979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231987">SUSE bug 1231987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231988">SUSE bug 1231988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231990">SUSE bug 1231990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231991">SUSE bug 1231991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231992">SUSE bug 1231992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231995">SUSE bug 1231995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231996">SUSE bug 1231996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231997">SUSE bug 1231997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231998">SUSE bug 1231998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232001">SUSE bug 1232001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232004">SUSE bug 1232004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232005">SUSE bug 1232005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232006">SUSE bug 1232006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232007">SUSE bug 1232007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232013">SUSE bug 1232013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232015">SUSE bug 1232015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232016">SUSE bug 1232016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232017">SUSE bug 1232017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232025">SUSE bug 1232025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232026">SUSE bug 1232026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232027">SUSE bug 1232027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232028">SUSE bug 1232028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232033">SUSE bug 1232033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232034">SUSE bug 1232034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232035">SUSE bug 1232035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232036">SUSE bug 1232036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232037">SUSE bug 1232037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232038">SUSE bug 1232038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232039">SUSE bug 1232039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232043">SUSE bug 1232043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232047">SUSE bug 1232047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232048">SUSE bug 1232048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232049">SUSE bug 1232049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232050">SUSE bug 1232050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232056">SUSE bug 1232056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232067">SUSE bug 1232067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232069">SUSE bug 1232069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232070">SUSE bug 1232070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232071">SUSE bug 1232071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232075">SUSE bug 1232075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232076">SUSE bug 1232076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232080">SUSE bug 1232080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232083">SUSE bug 1232083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232084">SUSE bug 1232084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232085">SUSE bug 1232085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232089">SUSE bug 1232089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232094">SUSE bug 1232094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232096">SUSE bug 1232096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232097">SUSE bug 1232097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232098">SUSE bug 1232098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232104">SUSE bug 1232104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232105">SUSE bug 1232105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232108">SUSE bug 1232108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232111">SUSE bug 1232111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232114">SUSE bug 1232114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232116">SUSE bug 1232116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232119">SUSE bug 1232119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232120">SUSE bug 1232120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232123">SUSE bug 1232123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232124">SUSE bug 1232124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232126">SUSE bug 1232126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232133">SUSE bug 1232133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232134">SUSE bug 1232134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232135">SUSE bug 1232135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232136">SUSE bug 1232136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232140">SUSE bug 1232140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232141">SUSE bug 1232141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232142">SUSE bug 1232142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232145">SUSE bug 1232145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232147">SUSE bug 1232147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232149">SUSE bug 1232149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232150">SUSE bug 1232150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232151">SUSE bug 1232151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232152">SUSE bug 1232152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232154">SUSE bug 1232154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232155">SUSE bug 1232155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232159">SUSE bug 1232159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232160">SUSE bug 1232160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232162">SUSE bug 1232162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232163">SUSE bug 1232163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232164">SUSE bug 1232164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232165">SUSE bug 1232165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232170">SUSE bug 1232170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232172">SUSE bug 1232172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232174">SUSE bug 1232174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232175">SUSE bug 1232175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232180">SUSE bug 1232180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232185">SUSE bug 1232185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232187">SUSE bug 1232187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232189">SUSE bug 1232189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232191">SUSE bug 1232191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232195">SUSE bug 1232195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232196">SUSE bug 1232196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232198">SUSE bug 1232198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232199">SUSE bug 1232199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232200">SUSE bug 1232200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232201">SUSE bug 1232201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232217">SUSE bug 1232217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232218">SUSE bug 1232218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232220">SUSE bug 1232220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232221">SUSE bug 1232221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232224">SUSE bug 1232224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232229">SUSE bug 1232229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232232">SUSE bug 1232232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232233">SUSE bug 1232233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232237">SUSE bug 1232237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232251">SUSE bug 1232251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232253">SUSE bug 1232253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232254">SUSE bug 1232254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232255">SUSE bug 1232255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232259">SUSE bug 1232259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232260">SUSE bug 1232260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232262">SUSE bug 1232262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232263">SUSE bug 1232263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232264">SUSE bug 1232264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232272">SUSE bug 1232272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232279">SUSE bug 1232279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232282">SUSE bug 1232282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232285">SUSE bug 1232285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232286">SUSE bug 1232286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232287">SUSE bug 1232287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232293">SUSE bug 1232293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232304">SUSE bug 1232304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232305">SUSE bug 1232305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232307">SUSE bug 1232307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232309">SUSE bug 1232309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232310">SUSE bug 1232310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232312">SUSE bug 1232312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232313">SUSE bug 1232313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232314">SUSE bug 1232314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232316">SUSE bug 1232316</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232317">SUSE bug 1232317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232318">SUSE bug 1232318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232329">SUSE bug 1232329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232332">SUSE bug 1232332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232333">SUSE bug 1232333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232334">SUSE bug 1232334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232335">SUSE bug 1232335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232337">SUSE bug 1232337</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232339">SUSE bug 1232339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232342">SUSE bug 1232342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232345">SUSE bug 1232345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232349">SUSE bug 1232349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232352">SUSE bug 1232352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232354">SUSE bug 1232354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232355">SUSE bug 1232355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232357">SUSE bug 1232357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232358">SUSE bug 1232358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232359">SUSE bug 1232359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232361">SUSE bug 1232361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232362">SUSE bug 1232362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232364">SUSE bug 1232364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232366">SUSE bug 1232366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232367">SUSE bug 1232367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232368">SUSE bug 1232368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232369">SUSE bug 1232369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232370">SUSE bug 1232370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232371">SUSE bug 1232371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232374">SUSE bug 1232374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232378">SUSE bug 1232378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232381">SUSE bug 1232381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232383">SUSE bug 1232383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232385">SUSE bug 1232385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232387">SUSE bug 1232387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232392">SUSE bug 1232392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232394">SUSE bug 1232394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232395">SUSE bug 1232395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232413">SUSE bug 1232413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232416">SUSE bug 1232416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232418">SUSE bug 1232418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232424">SUSE bug 1232424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232432">SUSE bug 1232432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232435">SUSE bug 1232435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232436">SUSE bug 1232436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232442">SUSE bug 1232442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232446">SUSE bug 1232446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232483">SUSE bug 1232483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232500">SUSE bug 1232500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232501">SUSE bug 1232501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232503">SUSE bug 1232503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232504">SUSE bug 1232504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232507">SUSE bug 1232507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232519">SUSE bug 1232519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232520">SUSE bug 1232520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232552">SUSE bug 1232552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232630">SUSE bug 1232630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232631">SUSE bug 1232631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232632">SUSE bug 1232632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232757">SUSE bug 1232757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232819">SUSE bug 1232819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232860">SUSE bug 1232860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232870">SUSE bug 1232870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232873">SUSE bug 1232873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232877">SUSE bug 1232877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232878">SUSE bug 1232878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232881">SUSE bug 1232881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232884">SUSE bug 1232884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232885">SUSE bug 1232885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232887">SUSE bug 1232887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232888">SUSE bug 1232888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232890">SUSE bug 1232890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232892">SUSE bug 1232892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232896">SUSE bug 1232896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232897">SUSE bug 1232897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232905">SUSE bug 1232905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232907">SUSE bug 1232907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232919">SUSE bug 1232919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232926">SUSE bug 1232926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232928">SUSE bug 1232928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232935">SUSE bug 1232935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233035">SUSE bug 1233035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233049">SUSE bug 1233049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233051">SUSE bug 1233051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233056">SUSE bug 1233056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233057">SUSE bug 1233057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233061">SUSE bug 1233061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233063">SUSE bug 1233063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233065">SUSE bug 1233065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233067">SUSE bug 1233067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233070">SUSE bug 1233070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233073">SUSE bug 1233073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233074">SUSE bug 1233074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233100">SUSE bug 1233100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233103">SUSE bug 1233103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233104">SUSE bug 1233104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233105">SUSE bug 1233105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233106">SUSE bug 1233106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233107">SUSE bug 1233107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233108">SUSE bug 1233108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233110">SUSE bug 1233110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233111">SUSE bug 1233111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233113">SUSE bug 1233113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233114">SUSE bug 1233114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233117">SUSE bug 1233117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233123">SUSE bug 1233123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233125">SUSE bug 1233125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233129">SUSE bug 1233129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233130">SUSE bug 1233130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233134">SUSE bug 1233134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233135">SUSE bug 1233135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233150">SUSE bug 1233150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233189">SUSE bug 1233189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233191">SUSE bug 1233191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233197">SUSE bug 1233197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233205">SUSE bug 1233205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233206">SUSE bug 1233206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233209">SUSE bug 1233209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233210">SUSE bug 1233210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233211">SUSE bug 1233211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233212">SUSE bug 1233212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233214">SUSE bug 1233214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233216">SUSE bug 1233216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233238">SUSE bug 1233238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233241">SUSE bug 1233241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233253">SUSE bug 1233253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233255">SUSE bug 1233255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233293">SUSE bug 1233293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233350">SUSE bug 1233350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233452">SUSE bug 1233452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233453">SUSE bug 1233453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233454">SUSE bug 1233454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233456">SUSE bug 1233456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233457">SUSE bug 1233457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233458">SUSE bug 1233458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233460">SUSE bug 1233460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233462">SUSE bug 1233462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233463">SUSE bug 1233463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233468">SUSE bug 1233468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233471">SUSE bug 1233471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233476">SUSE bug 1233476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233478">SUSE bug 1233478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233479">SUSE bug 1233479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233481">SUSE bug 1233481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233484">SUSE bug 1233484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233487">SUSE bug 1233487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233490">SUSE bug 1233490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233491">SUSE bug 1233491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233528">SUSE bug 1233528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233548">SUSE bug 1233548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233552">SUSE bug 1233552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233553">SUSE bug 1233553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233554">SUSE bug 1233554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233555">SUSE bug 1233555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233557">SUSE bug 1233557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233560">SUSE bug 1233560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233561">SUSE bug 1233561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233570">SUSE bug 1233570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233577">SUSE bug 1233577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233580">SUSE bug 1233580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233977">SUSE bug 1233977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234012">SUSE bug 1234012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234025">SUSE bug 1234025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234085">SUSE bug 1234085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234093">SUSE bug 1234093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234098">SUSE bug 1234098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234108">SUSE bug 1234108</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47416/">CVE-2021-47416 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47416">CVE-2021-47416 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47534/">CVE-2021-47534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47534">CVE-2021-47534 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47594/">CVE-2021-47594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47594">CVE-2021-47594 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3435/">CVE-2022-3435 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3435">CVE-2022-3435 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-45934/">CVE-2022-45934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45934">CVE-2022-45934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48664/">CVE-2022-48664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48664">CVE-2022-48664 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48674/">CVE-2022-48674 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48674">CVE-2022-48674 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48879/">CVE-2022-48879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48879">CVE-2022-48879 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48946/">CVE-2022-48946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48946">CVE-2022-48946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48947/">CVE-2022-48947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48947">CVE-2022-48947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48948/">CVE-2022-48948 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48948">CVE-2022-48948 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48949/">CVE-2022-48949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48949">CVE-2022-48949 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48951/">CVE-2022-48951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48951">CVE-2022-48951 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48953/">CVE-2022-48953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48953">CVE-2022-48953 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48954/">CVE-2022-48954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48954">CVE-2022-48954 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48955/">CVE-2022-48955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48955">CVE-2022-48955 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48956/">CVE-2022-48956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48956">CVE-2022-48956 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48957/">CVE-2022-48957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48957">CVE-2022-48957 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48958/">CVE-2022-48958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48958">CVE-2022-48958 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48959/">CVE-2022-48959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48959">CVE-2022-48959 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48960/">CVE-2022-48960 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48960">CVE-2022-48960 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48961/">CVE-2022-48961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48961">CVE-2022-48961 at NVD</cve>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48962/">CVE-2022-48962 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48962">CVE-2022-48962 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48966/">CVE-2022-48966 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48966">CVE-2022-48966 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48967/">CVE-2022-48967 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48967">CVE-2022-48967 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48968/">CVE-2022-48968 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48968">CVE-2022-48968 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48969/">CVE-2022-48969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48969">CVE-2022-48969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48970/">CVE-2022-48970 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48970">CVE-2022-48970 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48971/">CVE-2022-48971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48971">CVE-2022-48971 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48972/">CVE-2022-48972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48972">CVE-2022-48972 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48973/">CVE-2022-48973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48973">CVE-2022-48973 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48975/">CVE-2022-48975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48975">CVE-2022-48975 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48977/">CVE-2022-48977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48977">CVE-2022-48977 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48978/">CVE-2022-48978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48978">CVE-2022-48978 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48979/">CVE-2022-48979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48979">CVE-2022-48979 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48980/">CVE-2022-48980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48980">CVE-2022-48980 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48981/">CVE-2022-48981 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48981">CVE-2022-48981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48982/">CVE-2022-48982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48982">CVE-2022-48982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48983/">CVE-2022-48983 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48983">CVE-2022-48983 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48985/">CVE-2022-48985 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48985">CVE-2022-48985 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48987/">CVE-2022-48987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48987">CVE-2022-48987 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48988/">CVE-2022-48988 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48988">CVE-2022-48988 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48989/">CVE-2022-48989 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48989">CVE-2022-48989 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48990/">CVE-2022-48990 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48990">CVE-2022-48990 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48991/">CVE-2022-48991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48991">CVE-2022-48991 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48992/">CVE-2022-48992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48992">CVE-2022-48992 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48994/">CVE-2022-48994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48994">CVE-2022-48994 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48995/">CVE-2022-48995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48995">CVE-2022-48995 at NVD</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" cvss4="1/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48997/">CVE-2022-48997 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48997">CVE-2022-48997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48999/">CVE-2022-48999 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48999">CVE-2022-48999 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49000/">CVE-2022-49000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49000">CVE-2022-49000 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49002/">CVE-2022-49002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49002">CVE-2022-49002 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49003/">CVE-2022-49003 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49003">CVE-2022-49003 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49005/">CVE-2022-49005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49005">CVE-2022-49005 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49006/">CVE-2022-49006 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49006">CVE-2022-49006 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49007/">CVE-2022-49007 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49007">CVE-2022-49007 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49010/">CVE-2022-49010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49010">CVE-2022-49010 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49011/">CVE-2022-49011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49011">CVE-2022-49011 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49012/">CVE-2022-49012 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49012">CVE-2022-49012 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49014/">CVE-2022-49014 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49014">CVE-2022-49014 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49015/">CVE-2022-49015 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49015">CVE-2022-49015 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49016/">CVE-2022-49016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49016">CVE-2022-49016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49017/">CVE-2022-49017 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49017">CVE-2022-49017 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49019/">CVE-2022-49019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49019">CVE-2022-49019 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49020/">CVE-2022-49020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49020">CVE-2022-49020 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49021/">CVE-2022-49021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49021">CVE-2022-49021 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49022/">CVE-2022-49022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49022">CVE-2022-49022 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49023/">CVE-2022-49023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49023">CVE-2022-49023 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49024/">CVE-2022-49024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49024">CVE-2022-49024 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49025/">CVE-2022-49025 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49025">CVE-2022-49025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49026/">CVE-2022-49026 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49026">CVE-2022-49026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49027/">CVE-2022-49027 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49027">CVE-2022-49027 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49028/">CVE-2022-49028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49028">CVE-2022-49028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49029/">CVE-2022-49029 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49029">CVE-2022-49029 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49031/">CVE-2022-49031 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49031">CVE-2022-49031 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49032/">CVE-2022-49032 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49032">CVE-2022-49032 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2166/">CVE-2023-2166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2166">CVE-2023-2166 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28327/">CVE-2023-28327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28327">CVE-2023-28327 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52766/">CVE-2023-52766 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52766">CVE-2023-52766 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52800/">CVE-2023-52800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52800">CVE-2023-52800 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52881/">CVE-2023-52881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52881">CVE-2023-52881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52915/">CVE-2023-52915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52915">CVE-2023-52915 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52917/">CVE-2023-52917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52917">CVE-2023-52917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52918/">CVE-2023-52918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52918">CVE-2023-52918 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52919/">CVE-2023-52919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52919">CVE-2023-52919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52921/">CVE-2023-52921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52921">CVE-2023-52921 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52922/">CVE-2023-52922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52922">CVE-2023-52922 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6270/">CVE-2023-6270 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26782/">CVE-2024-26782 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26782">CVE-2024-26782 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26906/">CVE-2024-26906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26906">CVE-2024-26906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26953/">CVE-2024-26953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26953">CVE-2024-26953 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27043/">CVE-2024-27043 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27043">CVE-2024-27043 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35888/">CVE-2024-35888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35888">CVE-2024-35888 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35937/">CVE-2024-35937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35937">CVE-2024-35937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35980/">CVE-2024-35980 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35980">CVE-2024-35980 at NVD</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36244/">CVE-2024-36244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36244">CVE-2024-36244 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36484/">CVE-2024-36484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36484">CVE-2024-36484 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36883/">CVE-2024-36883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36883">CVE-2024-36883 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36886/">CVE-2024-36886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36886">CVE-2024-36886 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36905/">CVE-2024-36905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36905">CVE-2024-36905 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36953/">CVE-2024-36953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36953">CVE-2024-36953 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36954/">CVE-2024-36954 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36954">CVE-2024-36954 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36957/">CVE-2024-36957 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36957">CVE-2024-36957 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38577/">CVE-2024-38577 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38577">CVE-2024-38577 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38589/">CVE-2024-38589 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38589">CVE-2024-38589 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38615/">CVE-2024-38615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38615">CVE-2024-38615 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39476/">CVE-2024-39476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39476">CVE-2024-39476 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40965/">CVE-2024-40965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40965">CVE-2024-40965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40997/">CVE-2024-40997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40997">CVE-2024-40997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41016/">CVE-2024-41016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41016">CVE-2024-41016 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41023/">CVE-2024-41023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41023">CVE-2024-41023 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41049/">CVE-2024-41049 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41049">CVE-2024-41049 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42131/">CVE-2024-42131 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42131">CVE-2024-42131 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42145/">CVE-2024-42145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42145">CVE-2024-42145 at NVD</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42226/">CVE-2024-42226 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42226">CVE-2024-42226 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42253/">CVE-2024-42253 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42253">CVE-2024-42253 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43817/">CVE-2024-43817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43817">CVE-2024-43817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43897/">CVE-2024-43897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43897">CVE-2024-43897 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44931/">CVE-2024-44931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44931">CVE-2024-44931 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44932/">CVE-2024-44932 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44932">CVE-2024-44932 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44947/">CVE-2024-44947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44947">CVE-2024-44947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44958/">CVE-2024-44958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44958">CVE-2024-44958 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-44964/">CVE-2024-44964 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44964">CVE-2024-44964 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44995/">CVE-2024-44995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44995">CVE-2024-44995 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45016/">CVE-2024-45016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45016">CVE-2024-45016 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45025/">CVE-2024-45025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45025">CVE-2024-45025 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46678/">CVE-2024-46678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46678">CVE-2024-46678 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46681/">CVE-2024-46681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46681">CVE-2024-46681 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-46716/">CVE-2024-46716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46716">CVE-2024-46716 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46719/">CVE-2024-46719 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46719">CVE-2024-46719 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46754/">CVE-2024-46754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46754">CVE-2024-46754 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46770/">CVE-2024-46770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46770">CVE-2024-46770 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46775/">CVE-2024-46775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46775">CVE-2024-46775 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46777/">CVE-2024-46777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46777">CVE-2024-46777 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46800/">CVE-2024-46800 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46800">CVE-2024-46800 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46802/">CVE-2024-46802 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46802">CVE-2024-46802 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46804/">CVE-2024-46804 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46804">CVE-2024-46804 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46805/">CVE-2024-46805 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46805">CVE-2024-46805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46807/">CVE-2024-46807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46807">CVE-2024-46807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46809/">CVE-2024-46809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46809">CVE-2024-46809 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46810/">CVE-2024-46810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46810">CVE-2024-46810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46811/">CVE-2024-46811 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46811">CVE-2024-46811 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46812/">CVE-2024-46812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46812">CVE-2024-46812 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46813/">CVE-2024-46813 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46813">CVE-2024-46813 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46814/">CVE-2024-46814 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46814">CVE-2024-46814 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46815/">CVE-2024-46815 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46815">CVE-2024-46815 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46816/">CVE-2024-46816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46816">CVE-2024-46816 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46817/">CVE-2024-46817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46817">CVE-2024-46817 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46818/">CVE-2024-46818 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46818">CVE-2024-46818 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46819/">CVE-2024-46819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46819">CVE-2024-46819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46821/">CVE-2024-46821 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46821">CVE-2024-46821 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46826/">CVE-2024-46826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46826">CVE-2024-46826 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46828/">CVE-2024-46828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46828">CVE-2024-46828 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46834/">CVE-2024-46834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46834">CVE-2024-46834 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46835/">CVE-2024-46835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46835">CVE-2024-46835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46840/">CVE-2024-46840 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46840">CVE-2024-46840 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46841/">CVE-2024-46841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46841">CVE-2024-46841 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46842/">CVE-2024-46842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46842">CVE-2024-46842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46848/">CVE-2024-46848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46848">CVE-2024-46848 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46849/">CVE-2024-46849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46849">CVE-2024-46849 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46853/">CVE-2024-46853 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46853">CVE-2024-46853 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-46854/">CVE-2024-46854 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46854">CVE-2024-46854 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46855/">CVE-2024-46855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46855">CVE-2024-46855 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46857/">CVE-2024-46857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46857">CVE-2024-46857 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46859/">CVE-2024-46859 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46859">CVE-2024-46859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46864/">CVE-2024-46864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46864">CVE-2024-46864 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46871/">CVE-2024-46871 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46871">CVE-2024-46871 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47660/">CVE-2024-47660 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47660">CVE-2024-47660 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47661/">CVE-2024-47661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47661">CVE-2024-47661 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47663/">CVE-2024-47663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47663">CVE-2024-47663 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47664/">CVE-2024-47664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47664">CVE-2024-47664 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47665/">CVE-2024-47665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47665">CVE-2024-47665 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47667/">CVE-2024-47667 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47667">CVE-2024-47667 at NVD</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47668/">CVE-2024-47668 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47668">CVE-2024-47668 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47669/">CVE-2024-47669 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47669">CVE-2024-47669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47670/">CVE-2024-47670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47670">CVE-2024-47670 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-47671/">CVE-2024-47671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47671">CVE-2024-47671 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-47672/">CVE-2024-47672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47672">CVE-2024-47672 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-47673/">CVE-2024-47673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47673">CVE-2024-47673 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47674/">CVE-2024-47674 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47674">CVE-2024-47674 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47679/">CVE-2024-47679 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47679">CVE-2024-47679 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47682/">CVE-2024-47682 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47682">CVE-2024-47682 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47684/">CVE-2024-47684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47684">CVE-2024-47684 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47685/">CVE-2024-47685 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47685">CVE-2024-47685 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47692/">CVE-2024-47692 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47692">CVE-2024-47692 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47693/">CVE-2024-47693 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47693">CVE-2024-47693 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47695/">CVE-2024-47695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47695">CVE-2024-47695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47696/">CVE-2024-47696 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47696">CVE-2024-47696 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47697/">CVE-2024-47697 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47697">CVE-2024-47697 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47698/">CVE-2024-47698 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47698">CVE-2024-47698 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47699/">CVE-2024-47699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47699">CVE-2024-47699 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47701/">CVE-2024-47701 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47701">CVE-2024-47701 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47704/">CVE-2024-47704 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47704">CVE-2024-47704 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47705/">CVE-2024-47705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47705">CVE-2024-47705 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47706/">CVE-2024-47706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47706">CVE-2024-47706 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47707/">CVE-2024-47707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47707">CVE-2024-47707 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47709/">CVE-2024-47709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47709">CVE-2024-47709 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47710/">CVE-2024-47710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47710">CVE-2024-47710 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47712/">CVE-2024-47712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47712">CVE-2024-47712 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47713/">CVE-2024-47713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47713">CVE-2024-47713 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47718/">CVE-2024-47718 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47718">CVE-2024-47718 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47720/">CVE-2024-47720 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47720">CVE-2024-47720 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47723/">CVE-2024-47723 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47723">CVE-2024-47723 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47727/">CVE-2024-47727 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47727">CVE-2024-47727 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47728/">CVE-2024-47728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47728">CVE-2024-47728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47730/">CVE-2024-47730 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47730">CVE-2024-47730 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47735/">CVE-2024-47735 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47735">CVE-2024-47735 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47737/">CVE-2024-47737 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47737">CVE-2024-47737 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47738/">CVE-2024-47738 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47738">CVE-2024-47738 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47739/">CVE-2024-47739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47739">CVE-2024-47739 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47742/">CVE-2024-47742 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47742">CVE-2024-47742 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47745/">CVE-2024-47745 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47745">CVE-2024-47745 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47747/">CVE-2024-47747 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47747">CVE-2024-47747 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47748/">CVE-2024-47748 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47748">CVE-2024-47748 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47749/">CVE-2024-47749 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47749">CVE-2024-47749 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47756/">CVE-2024-47756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47756">CVE-2024-47756 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47757/">CVE-2024-47757 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47757">CVE-2024-47757 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49850/">CVE-2024-49850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49850">CVE-2024-49850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49851/">CVE-2024-49851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49851">CVE-2024-49851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49852/">CVE-2024-49852 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49852">CVE-2024-49852 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49855/">CVE-2024-49855 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49855">CVE-2024-49855 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49858/">CVE-2024-49858 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49858">CVE-2024-49858 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49860/">CVE-2024-49860 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49860">CVE-2024-49860 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49861/">CVE-2024-49861 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49861">CVE-2024-49861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49863/">CVE-2024-49863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49863">CVE-2024-49863 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49866/">CVE-2024-49866 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49866">CVE-2024-49866 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49867/">CVE-2024-49867 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49867">CVE-2024-49867 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49868/">CVE-2024-49868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49868">CVE-2024-49868 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49870/">CVE-2024-49870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49870">CVE-2024-49870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49871/">CVE-2024-49871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49871">CVE-2024-49871 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49875/">CVE-2024-49875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49875">CVE-2024-49875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49877/">CVE-2024-49877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49877">CVE-2024-49877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49879/">CVE-2024-49879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49879">CVE-2024-49879 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49881/">CVE-2024-49881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49881">CVE-2024-49881 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49882/">CVE-2024-49882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49882">CVE-2024-49882 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49883/">CVE-2024-49883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49883">CVE-2024-49883 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49884/">CVE-2024-49884 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49884">CVE-2024-49884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49886/">CVE-2024-49886 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49886">CVE-2024-49886 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49890/">CVE-2024-49890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49890">CVE-2024-49890 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49891/">CVE-2024-49891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49891">CVE-2024-49891 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49892/">CVE-2024-49892 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49892">CVE-2024-49892 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49894/">CVE-2024-49894 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49894">CVE-2024-49894 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49895/">CVE-2024-49895 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49895">CVE-2024-49895 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49896/">CVE-2024-49896 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49896">CVE-2024-49896 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49897/">CVE-2024-49897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49897">CVE-2024-49897 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49899/">CVE-2024-49899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49899">CVE-2024-49899 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49900/">CVE-2024-49900 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49900">CVE-2024-49900 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49901/">CVE-2024-49901 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49901">CVE-2024-49901 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49902/">CVE-2024-49902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49902">CVE-2024-49902 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49903/">CVE-2024-49903 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49903">CVE-2024-49903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49905/">CVE-2024-49905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49905">CVE-2024-49905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49906/">CVE-2024-49906 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49906">CVE-2024-49906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49907/">CVE-2024-49907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49907">CVE-2024-49907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49908/">CVE-2024-49908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49908">CVE-2024-49908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49909/">CVE-2024-49909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49909">CVE-2024-49909 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49911/">CVE-2024-49911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49911">CVE-2024-49911 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49912/">CVE-2024-49912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49912">CVE-2024-49912 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49913/">CVE-2024-49913 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49913">CVE-2024-49913 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49914/">CVE-2024-49914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49914">CVE-2024-49914 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49917/">CVE-2024-49917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49917">CVE-2024-49917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49918/">CVE-2024-49918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49918">CVE-2024-49918 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49919/">CVE-2024-49919 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49919">CVE-2024-49919 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49920/">CVE-2024-49920 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49920">CVE-2024-49920 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49921/">CVE-2024-49921 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49921">CVE-2024-49921 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49922/">CVE-2024-49922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49922">CVE-2024-49922 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49923/">CVE-2024-49923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49923">CVE-2024-49923 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49924/">CVE-2024-49924 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49924">CVE-2024-49924 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49925/">CVE-2024-49925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49925">CVE-2024-49925 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49929/">CVE-2024-49929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49929">CVE-2024-49929 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49930/">CVE-2024-49930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49930">CVE-2024-49930 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49933/">CVE-2024-49933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49933">CVE-2024-49933 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49934/">CVE-2024-49934 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49934">CVE-2024-49934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49935/">CVE-2024-49935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49935">CVE-2024-49935 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49936/">CVE-2024-49936 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49936">CVE-2024-49936 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49938/">CVE-2024-49938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49938">CVE-2024-49938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49939/">CVE-2024-49939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49939">CVE-2024-49939 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49945/">CVE-2024-49945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49945">CVE-2024-49945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49946/">CVE-2024-49946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49946">CVE-2024-49946 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49947/">CVE-2024-49947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49947">CVE-2024-49947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49949/">CVE-2024-49949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49949">CVE-2024-49949 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49950/">CVE-2024-49950 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49950">CVE-2024-49950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49954/">CVE-2024-49954 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49954">CVE-2024-49954 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49955/">CVE-2024-49955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49955">CVE-2024-49955 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49957/">CVE-2024-49957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49957">CVE-2024-49957 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49958/">CVE-2024-49958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49958">CVE-2024-49958 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49959/">CVE-2024-49959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49959">CVE-2024-49959 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49960/">CVE-2024-49960 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49960">CVE-2024-49960 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49962/">CVE-2024-49962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49962">CVE-2024-49962 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49963/">CVE-2024-49963 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49963">CVE-2024-49963 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49965/">CVE-2024-49965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49965">CVE-2024-49965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49966/">CVE-2024-49966 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49966">CVE-2024-49966 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49967/">CVE-2024-49967 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49967">CVE-2024-49967 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49968/">CVE-2024-49968 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49968">CVE-2024-49968 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49969/">CVE-2024-49969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49969">CVE-2024-49969 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49973/">CVE-2024-49973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49973">CVE-2024-49973 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49974/">CVE-2024-49974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49974">CVE-2024-49974 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49975/">CVE-2024-49975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49975">CVE-2024-49975 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49981/">CVE-2024-49981 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49981">CVE-2024-49981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49982/">CVE-2024-49982 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49982">CVE-2024-49982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49983/">CVE-2024-49983 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49983">CVE-2024-49983 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49985/">CVE-2024-49985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49985">CVE-2024-49985 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49989/">CVE-2024-49989 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49989">CVE-2024-49989 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49991/">CVE-2024-49991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49991">CVE-2024-49991 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49993/">CVE-2024-49993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49993">CVE-2024-49993 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49995/">CVE-2024-49995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49995">CVE-2024-49995 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49996/">CVE-2024-49996 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49996">CVE-2024-49996 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50000/">CVE-2024-50000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50000">CVE-2024-50000 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50001/">CVE-2024-50001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50001">CVE-2024-50001 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50002/">CVE-2024-50002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50002">CVE-2024-50002 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50003/">CVE-2024-50003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50003">CVE-2024-50003 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50006/">CVE-2024-50006 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50006">CVE-2024-50006 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50007/">CVE-2024-50007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50007">CVE-2024-50007 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50008/">CVE-2024-50008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50008">CVE-2024-50008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50009/">CVE-2024-50009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50009">CVE-2024-50009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50013/">CVE-2024-50013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50013">CVE-2024-50013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50014/">CVE-2024-50014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50014">CVE-2024-50014 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50017/">CVE-2024-50017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50017">CVE-2024-50017 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50019/">CVE-2024-50019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50019">CVE-2024-50019 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50024/">CVE-2024-50024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50024">CVE-2024-50024 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50025/">CVE-2024-50025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50025">CVE-2024-50025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50026/">CVE-2024-50026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50026">CVE-2024-50026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50028/">CVE-2024-50028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50028">CVE-2024-50028 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50031/">CVE-2024-50031 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50031">CVE-2024-50031 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50033/">CVE-2024-50033 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50033">CVE-2024-50033 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50035/">CVE-2024-50035 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50035">CVE-2024-50035 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50041/">CVE-2024-50041 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50041">CVE-2024-50041 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50044/">CVE-2024-50044 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50044">CVE-2024-50044 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50045/">CVE-2024-50045 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50045">CVE-2024-50045 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50046/">CVE-2024-50046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50046">CVE-2024-50046 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50047/">CVE-2024-50047 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50047">CVE-2024-50047 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50048/">CVE-2024-50048 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50048">CVE-2024-50048 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50049/">CVE-2024-50049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50049">CVE-2024-50049 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50055/">CVE-2024-50055 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50055">CVE-2024-50055 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50058/">CVE-2024-50058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50058">CVE-2024-50058 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50059/">CVE-2024-50059 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50059">CVE-2024-50059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50061/">CVE-2024-50061 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50061">CVE-2024-50061 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50062/">CVE-2024-50062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50062">CVE-2024-50062 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50063/">CVE-2024-50063 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50063">CVE-2024-50063 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50067/">CVE-2024-50067 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50067">CVE-2024-50067 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50073/">CVE-2024-50073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50073">CVE-2024-50073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50074/">CVE-2024-50074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50074">CVE-2024-50074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50077/">CVE-2024-50077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50077">CVE-2024-50077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50078/">CVE-2024-50078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50078">CVE-2024-50078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50081/">CVE-2024-50081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50081">CVE-2024-50081 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50082/">CVE-2024-50082 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50082">CVE-2024-50082 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50089/">CVE-2024-50089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50089">CVE-2024-50089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50093/">CVE-2024-50093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50093">CVE-2024-50093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50095/">CVE-2024-50095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50095">CVE-2024-50095 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50096/">CVE-2024-50096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50096">CVE-2024-50096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50098/">CVE-2024-50098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50098">CVE-2024-50098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50099/">CVE-2024-50099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50099">CVE-2024-50099 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50103/">CVE-2024-50103 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50103">CVE-2024-50103 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50108/">CVE-2024-50108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50108">CVE-2024-50108 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50110/">CVE-2024-50110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50110">CVE-2024-50110 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H" cvss4="4.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-50115/">CVE-2024-50115 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50115">CVE-2024-50115 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50116/">CVE-2024-50116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50116">CVE-2024-50116 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50117/">CVE-2024-50117 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50117">CVE-2024-50117 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50124/">CVE-2024-50124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50124">CVE-2024-50124 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50125/">CVE-2024-50125 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50125">CVE-2024-50125 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50127/">CVE-2024-50127 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50127">CVE-2024-50127 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50128/">CVE-2024-50128 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50128">CVE-2024-50128 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50131/">CVE-2024-50131 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50131">CVE-2024-50131 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50134/">CVE-2024-50134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50134">CVE-2024-50134 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50135/">CVE-2024-50135 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50135">CVE-2024-50135 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50138/">CVE-2024-50138 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50138">CVE-2024-50138 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50141/">CVE-2024-50141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50141">CVE-2024-50141 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50146/">CVE-2024-50146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50146">CVE-2024-50146 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50147/">CVE-2024-50147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50147">CVE-2024-50147 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50148/">CVE-2024-50148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50148">CVE-2024-50148 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50150/">CVE-2024-50150 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50150">CVE-2024-50150 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50153/">CVE-2024-50153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50153">CVE-2024-50153 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50154/">CVE-2024-50154 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50154">CVE-2024-50154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50155/">CVE-2024-50155 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50155">CVE-2024-50155 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50156/">CVE-2024-50156 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50156">CVE-2024-50156 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50160/">CVE-2024-50160 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50160">CVE-2024-50160 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50167/">CVE-2024-50167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50167">CVE-2024-50167 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50171/">CVE-2024-50171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50171">CVE-2024-50171 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50179/">CVE-2024-50179 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50179">CVE-2024-50179 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50180/">CVE-2024-50180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50180">CVE-2024-50180 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50182/">CVE-2024-50182 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50182">CVE-2024-50182 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50183/">CVE-2024-50183 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50183">CVE-2024-50183 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50184/">CVE-2024-50184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50184">CVE-2024-50184 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50186/">CVE-2024-50186 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50186">CVE-2024-50186 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50187/">CVE-2024-50187 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50187">CVE-2024-50187 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50188/">CVE-2024-50188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50188">CVE-2024-50188 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50189/">CVE-2024-50189 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50189">CVE-2024-50189 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50192/">CVE-2024-50192 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50192">CVE-2024-50192 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50194/">CVE-2024-50194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50194">CVE-2024-50194 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50195/">CVE-2024-50195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50195">CVE-2024-50195 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50196/">CVE-2024-50196 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50196">CVE-2024-50196 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50198/">CVE-2024-50198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50198">CVE-2024-50198 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50201/">CVE-2024-50201 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50201">CVE-2024-50201 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50205/">CVE-2024-50205 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50205">CVE-2024-50205 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50208/">CVE-2024-50208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50208">CVE-2024-50208 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50209/">CVE-2024-50209 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50209">CVE-2024-50209 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50215/">CVE-2024-50215 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50215">CVE-2024-50215 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50218/">CVE-2024-50218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50218">CVE-2024-50218 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50229/">CVE-2024-50229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50229">CVE-2024-50229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50230/">CVE-2024-50230 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50230">CVE-2024-50230 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50232/">CVE-2024-50232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50232">CVE-2024-50232 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50233/">CVE-2024-50233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50233">CVE-2024-50233 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50234/">CVE-2024-50234 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50234">CVE-2024-50234 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50236/">CVE-2024-50236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50236">CVE-2024-50236 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50237/">CVE-2024-50237 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50237">CVE-2024-50237 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50249/">CVE-2024-50249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50249">CVE-2024-50249 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50255/">CVE-2024-50255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50255">CVE-2024-50255 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50259/">CVE-2024-50259 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50259">CVE-2024-50259 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50261/">CVE-2024-50261 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50261">CVE-2024-50261 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50264/">CVE-2024-50264 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50264">CVE-2024-50264 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-50265/">CVE-2024-50265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50265">CVE-2024-50265 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50267/">CVE-2024-50267 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50267">CVE-2024-50267 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50268/">CVE-2024-50268 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50268">CVE-2024-50268 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50269/">CVE-2024-50269 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50269">CVE-2024-50269 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50271/">CVE-2024-50271 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50271">CVE-2024-50271 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50273/">CVE-2024-50273 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50273">CVE-2024-50273 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50274/">CVE-2024-50274 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50274">CVE-2024-50274 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50279/">CVE-2024-50279 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50279">CVE-2024-50279 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50282/">CVE-2024-50282 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50282">CVE-2024-50282 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50287/">CVE-2024-50287 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50287">CVE-2024-50287 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-50289/">CVE-2024-50289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50289">CVE-2024-50289 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50290/">CVE-2024-50290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50290">CVE-2024-50290 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50292/">CVE-2024-50292 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50292">CVE-2024-50292 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50295/">CVE-2024-50295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50295">CVE-2024-50295 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50298/">CVE-2024-50298 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50298">CVE-2024-50298 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50301/">CVE-2024-50301 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50301">CVE-2024-50301 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50302/">CVE-2024-50302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50302">CVE-2024-50302 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-53052/">CVE-2024-53052 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53052">CVE-2024-53052 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53058/">CVE-2024-53058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53058">CVE-2024-53058 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53059/">CVE-2024-53059 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53059">CVE-2024-53059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53060/">CVE-2024-53060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53060">CVE-2024-53060 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53061/">CVE-2024-53061 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53061">CVE-2024-53061 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53063/">CVE-2024-53063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53063">CVE-2024-53063 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53066/">CVE-2024-53066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53066">CVE-2024-53066 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53068/">CVE-2024-53068 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53068">CVE-2024-53068 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-53079/">CVE-2024-53079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53079">CVE-2024-53079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53085/">CVE-2024-53085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53085">CVE-2024-53085 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53088/">CVE-2024-53088 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53088">CVE-2024-53088 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53104/">CVE-2024-53104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53104">CVE-2024-53104 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53110/">CVE-2024-53110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53110">CVE-2024-53110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958302" comment="cluster-md-kmp-64kb-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958303" comment="cluster-md-kmp-default-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958304" comment="dlm-kmp-64kb-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958305" comment="dlm-kmp-default-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958306" comment="dtb-allwinner-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958307" comment="dtb-altera-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958308" comment="dtb-amazon-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958309" comment="dtb-amd-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958310" comment="dtb-amlogic-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958311" comment="dtb-apm-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958312" comment="dtb-apple-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958313" comment="dtb-arm-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958314" comment="dtb-broadcom-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958315" comment="dtb-cavium-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958316" comment="dtb-exynos-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958317" comment="dtb-freescale-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958318" comment="dtb-hisilicon-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958319" comment="dtb-lg-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958320" comment="dtb-marvell-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958321" comment="dtb-mediatek-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958322" comment="dtb-nvidia-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958323" comment="dtb-qcom-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958324" comment="dtb-renesas-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958325" comment="dtb-rockchip-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958326" comment="dtb-socionext-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958327" comment="dtb-sprd-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958328" comment="dtb-xilinx-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958329" comment="gfs2-kmp-64kb-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958330" comment="gfs2-kmp-default-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958331" comment="kernel-64kb-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958332" comment="kernel-64kb-devel-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958333" comment="kernel-64kb-extra-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958334" comment="kernel-64kb-optional-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958335" comment="kernel-debug-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958336" comment="kernel-debug-devel-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958337" comment="kernel-debug-vdso-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958338" comment="kernel-default-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958339" comment="kernel-default-base-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958340" comment="kernel-default-base-rebuild-5.14.21-150500.55.88.1.150500.6.39.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958341" comment="kernel-default-devel-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958342" comment="kernel-default-extra-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958343" comment="kernel-default-livepatch-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958344" comment="kernel-default-livepatch-devel-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958345" comment="kernel-default-optional-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958346" comment="kernel-default-vdso-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958347" comment="kernel-devel-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958348" comment="kernel-docs-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958349" comment="kernel-docs-html-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958350" comment="kernel-kvmsmall-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958351" comment="kernel-kvmsmall-devel-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958352" comment="kernel-kvmsmall-vdso-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958353" comment="kernel-macros-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958354" comment="kernel-obs-build-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958355" comment="kernel-obs-qa-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958356" comment="kernel-source-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958357" comment="kernel-source-vanilla-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958358" comment="kernel-syms-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958359" comment="kernel-zfcpdump-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958360" comment="kselftests-kmp-64kb-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958361" comment="kselftests-kmp-default-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958362" comment="ocfs2-kmp-64kb-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958363" comment="ocfs2-kmp-default-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958364" comment="reiserfs-kmp-64kb-5.14.21-150500.55.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958365" comment="reiserfs-kmp-default-5.14.21-150500.55.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5150" version="1" class="patch">
	<metadata>
		<title>Security update for subversion (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1234317" ref_url="https://bugzilla.suse.com/1234317" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-46901" ref_url="https://www.suse.com/security/cve/CVE-2024-46901/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020026.html" source="SUSE-SU"/>
		<description>
This update for subversion fixes the following issues:

- CVE-2024-46901: Fixed denial-of-service via control characters in paths in mod_dav_svn (bsc#1234317)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-17"/>
	<updated date="2024-12-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1234317">SUSE bug 1234317</bugzilla>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-46901/">CVE-2024-46901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46901">CVE-2024-46901 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958366" comment="libsvn_auth_gnome_keyring-1-0-1.14.1-150400.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958367" comment="libsvn_auth_kwallet-1-0-1.14.1-150400.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958368" comment="subversion-1.14.1-150400.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958369" comment="subversion-bash-completion-1.14.1-150400.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958370" comment="subversion-devel-1.14.1-150400.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958371" comment="subversion-perl-1.14.1-150400.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958372" comment="subversion-python-1.14.1-150400.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958373" comment="subversion-ruby-1.14.1-150400.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958374" comment="subversion-server-1.14.1-150400.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958375" comment="subversion-tools-1.14.1-150400.5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5151" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1082555" ref_url="https://bugzilla.suse.com/1082555" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1218644" ref_url="https://bugzilla.suse.com/1218644" source="BUGZILLA"/>
		<reference ref_id="1220382" ref_url="https://bugzilla.suse.com/1220382" source="BUGZILLA"/>
		<reference ref_id="1221309" ref_url="https://bugzilla.suse.com/1221309" source="BUGZILLA"/>
		<reference ref_id="1221333" ref_url="https://bugzilla.suse.com/1221333" source="BUGZILLA"/>
		<reference ref_id="1222364" ref_url="https://bugzilla.suse.com/1222364" source="BUGZILLA"/>
		<reference ref_id="1222590" ref_url="https://bugzilla.suse.com/1222590" source="BUGZILLA"/>
		<reference ref_id="1223202" ref_url="https://bugzilla.suse.com/1223202" source="BUGZILLA"/>
		<reference ref_id="1223656" ref_url="https://bugzilla.suse.com/1223656" source="BUGZILLA"/>
		<reference ref_id="1223848" ref_url="https://bugzilla.suse.com/1223848" source="BUGZILLA"/>
		<reference ref_id="1223919" ref_url="https://bugzilla.suse.com/1223919" source="BUGZILLA"/>
		<reference ref_id="1223942" ref_url="https://bugzilla.suse.com/1223942" source="BUGZILLA"/>
		<reference ref_id="1224518" ref_url="https://bugzilla.suse.com/1224518" source="BUGZILLA"/>
		<reference ref_id="1224526" ref_url="https://bugzilla.suse.com/1224526" source="BUGZILLA"/>
		<reference ref_id="1224574" ref_url="https://bugzilla.suse.com/1224574" source="BUGZILLA"/>
		<reference ref_id="1225725" ref_url="https://bugzilla.suse.com/1225725" source="BUGZILLA"/>
		<reference ref_id="1225730" ref_url="https://bugzilla.suse.com/1225730" source="BUGZILLA"/>
		<reference ref_id="1225742" ref_url="https://bugzilla.suse.com/1225742" source="BUGZILLA"/>
		<reference ref_id="1225764" ref_url="https://bugzilla.suse.com/1225764" source="BUGZILLA"/>
		<reference ref_id="1225812" ref_url="https://bugzilla.suse.com/1225812" source="BUGZILLA"/>
		<reference ref_id="1226560" ref_url="https://bugzilla.suse.com/1226560" source="BUGZILLA"/>
		<reference ref_id="1226592" ref_url="https://bugzilla.suse.com/1226592" source="BUGZILLA"/>
		<reference ref_id="1226631" ref_url="https://bugzilla.suse.com/1226631" source="BUGZILLA"/>
		<reference ref_id="1226748" ref_url="https://bugzilla.suse.com/1226748" source="BUGZILLA"/>
		<reference ref_id="1226872" ref_url="https://bugzilla.suse.com/1226872" source="BUGZILLA"/>
		<reference ref_id="1227853" ref_url="https://bugzilla.suse.com/1227853" source="BUGZILLA"/>
		<reference ref_id="1228410" ref_url="https://bugzilla.suse.com/1228410" source="BUGZILLA"/>
		<reference ref_id="1228430" ref_url="https://bugzilla.suse.com/1228430" source="BUGZILLA"/>
		<reference ref_id="1228486" ref_url="https://bugzilla.suse.com/1228486" source="BUGZILLA"/>
		<reference ref_id="1228650" ref_url="https://bugzilla.suse.com/1228650" source="BUGZILLA"/>
		<reference ref_id="1228857" ref_url="https://bugzilla.suse.com/1228857" source="BUGZILLA"/>
		<reference ref_id="1229312" ref_url="https://bugzilla.suse.com/1229312" source="BUGZILLA"/>
		<reference ref_id="1229429" ref_url="https://bugzilla.suse.com/1229429" source="BUGZILLA"/>
		<reference ref_id="1229585" ref_url="https://bugzilla.suse.com/1229585" source="BUGZILLA"/>
		<reference ref_id="1229752" ref_url="https://bugzilla.suse.com/1229752" source="BUGZILLA"/>
		<reference ref_id="1229808" ref_url="https://bugzilla.suse.com/1229808" source="BUGZILLA"/>
		<reference ref_id="1230055" ref_url="https://bugzilla.suse.com/1230055" source="BUGZILLA"/>
		<reference ref_id="1230220" ref_url="https://bugzilla.suse.com/1230220" source="BUGZILLA"/>
		<reference ref_id="1230231" ref_url="https://bugzilla.suse.com/1230231" source="BUGZILLA"/>
		<reference ref_id="1230270" ref_url="https://bugzilla.suse.com/1230270" source="BUGZILLA"/>
		<reference ref_id="1230558" ref_url="https://bugzilla.suse.com/1230558" source="BUGZILLA"/>
		<reference ref_id="1230827" ref_url="https://bugzilla.suse.com/1230827" source="BUGZILLA"/>
		<reference ref_id="1230918" ref_url="https://bugzilla.suse.com/1230918" source="BUGZILLA"/>
		<reference ref_id="1231083" ref_url="https://bugzilla.suse.com/1231083" source="BUGZILLA"/>
		<reference ref_id="1231089" ref_url="https://bugzilla.suse.com/1231089" source="BUGZILLA"/>
		<reference ref_id="1231098" ref_url="https://bugzilla.suse.com/1231098" source="BUGZILLA"/>
		<reference ref_id="1231101" ref_url="https://bugzilla.suse.com/1231101" source="BUGZILLA"/>
		<reference ref_id="1231108" ref_url="https://bugzilla.suse.com/1231108" source="BUGZILLA"/>
		<reference ref_id="1231111" ref_url="https://bugzilla.suse.com/1231111" source="BUGZILLA"/>
		<reference ref_id="1231132" ref_url="https://bugzilla.suse.com/1231132" source="BUGZILLA"/>
		<reference ref_id="1231135" ref_url="https://bugzilla.suse.com/1231135" source="BUGZILLA"/>
		<reference ref_id="1231138" ref_url="https://bugzilla.suse.com/1231138" source="BUGZILLA"/>
		<reference ref_id="1231169" ref_url="https://bugzilla.suse.com/1231169" source="BUGZILLA"/>
		<reference ref_id="1231178" ref_url="https://bugzilla.suse.com/1231178" source="BUGZILLA"/>
		<reference ref_id="1231180" ref_url="https://bugzilla.suse.com/1231180" source="BUGZILLA"/>
		<reference ref_id="1231181" ref_url="https://bugzilla.suse.com/1231181" source="BUGZILLA"/>
		<reference ref_id="1231187" ref_url="https://bugzilla.suse.com/1231187" source="BUGZILLA"/>
		<reference ref_id="1231202" ref_url="https://bugzilla.suse.com/1231202" source="BUGZILLA"/>
		<reference ref_id="1231434" ref_url="https://bugzilla.suse.com/1231434" source="BUGZILLA"/>
		<reference ref_id="1231441" ref_url="https://bugzilla.suse.com/1231441" source="BUGZILLA"/>
		<reference ref_id="1231452" ref_url="https://bugzilla.suse.com/1231452" source="BUGZILLA"/>
		<reference ref_id="1231465" ref_url="https://bugzilla.suse.com/1231465" source="BUGZILLA"/>
		<reference ref_id="1231474" ref_url="https://bugzilla.suse.com/1231474" source="BUGZILLA"/>
		<reference ref_id="1231481" ref_url="https://bugzilla.suse.com/1231481" source="BUGZILLA"/>
		<reference ref_id="1231537" ref_url="https://bugzilla.suse.com/1231537" source="BUGZILLA"/>
		<reference ref_id="1231541" ref_url="https://bugzilla.suse.com/1231541" source="BUGZILLA"/>
		<reference ref_id="1231646" ref_url="https://bugzilla.suse.com/1231646" source="BUGZILLA"/>
		<reference ref_id="1231849" ref_url="https://bugzilla.suse.com/1231849" source="BUGZILLA"/>
		<reference ref_id="1231856" ref_url="https://bugzilla.suse.com/1231856" source="BUGZILLA"/>
		<reference ref_id="1231858" ref_url="https://bugzilla.suse.com/1231858" source="BUGZILLA"/>
		<reference ref_id="1231859" ref_url="https://bugzilla.suse.com/1231859" source="BUGZILLA"/>
		<reference ref_id="1231864" ref_url="https://bugzilla.suse.com/1231864" source="BUGZILLA"/>
		<reference ref_id="1231904" ref_url="https://bugzilla.suse.com/1231904" source="BUGZILLA"/>
		<reference ref_id="1231916" ref_url="https://bugzilla.suse.com/1231916" source="BUGZILLA"/>
		<reference ref_id="1231920" ref_url="https://bugzilla.suse.com/1231920" source="BUGZILLA"/>
		<reference ref_id="1231923" ref_url="https://bugzilla.suse.com/1231923" source="BUGZILLA"/>
		<reference ref_id="1231930" ref_url="https://bugzilla.suse.com/1231930" source="BUGZILLA"/>
		<reference ref_id="1231931" ref_url="https://bugzilla.suse.com/1231931" source="BUGZILLA"/>
		<reference ref_id="1231947" ref_url="https://bugzilla.suse.com/1231947" source="BUGZILLA"/>
		<reference ref_id="1231952" ref_url="https://bugzilla.suse.com/1231952" source="BUGZILLA"/>
		<reference ref_id="1231953" ref_url="https://bugzilla.suse.com/1231953" source="BUGZILLA"/>
		<reference ref_id="1231959" ref_url="https://bugzilla.suse.com/1231959" source="BUGZILLA"/>
		<reference ref_id="1231978" ref_url="https://bugzilla.suse.com/1231978" source="BUGZILLA"/>
		<reference ref_id="1232013" ref_url="https://bugzilla.suse.com/1232013" source="BUGZILLA"/>
		<reference ref_id="1232015" ref_url="https://bugzilla.suse.com/1232015" source="BUGZILLA"/>
		<reference ref_id="1232016" ref_url="https://bugzilla.suse.com/1232016" source="BUGZILLA"/>
		<reference ref_id="1232017" ref_url="https://bugzilla.suse.com/1232017" source="BUGZILLA"/>
		<reference ref_id="1232027" ref_url="https://bugzilla.suse.com/1232027" source="BUGZILLA"/>
		<reference ref_id="1232028" ref_url="https://bugzilla.suse.com/1232028" source="BUGZILLA"/>
		<reference ref_id="1232047" ref_url="https://bugzilla.suse.com/1232047" source="BUGZILLA"/>
		<reference ref_id="1232048" ref_url="https://bugzilla.suse.com/1232048" source="BUGZILLA"/>
		<reference ref_id="1232050" ref_url="https://bugzilla.suse.com/1232050" source="BUGZILLA"/>
		<reference ref_id="1232056" ref_url="https://bugzilla.suse.com/1232056" source="BUGZILLA"/>
		<reference ref_id="1232076" ref_url="https://bugzilla.suse.com/1232076" source="BUGZILLA"/>
		<reference ref_id="1232080" ref_url="https://bugzilla.suse.com/1232080" source="BUGZILLA"/>
		<reference ref_id="1232094" ref_url="https://bugzilla.suse.com/1232094" source="BUGZILLA"/>
		<reference ref_id="1232096" ref_url="https://bugzilla.suse.com/1232096" source="BUGZILLA"/>
		<reference ref_id="1232098" ref_url="https://bugzilla.suse.com/1232098" source="BUGZILLA"/>
		<reference ref_id="1232111" ref_url="https://bugzilla.suse.com/1232111" source="BUGZILLA"/>
		<reference ref_id="1232126" ref_url="https://bugzilla.suse.com/1232126" source="BUGZILLA"/>
		<reference ref_id="1232134" ref_url="https://bugzilla.suse.com/1232134" source="BUGZILLA"/>
		<reference ref_id="1232135" ref_url="https://bugzilla.suse.com/1232135" source="BUGZILLA"/>
		<reference ref_id="1232141" ref_url="https://bugzilla.suse.com/1232141" source="BUGZILLA"/>
		<reference ref_id="1232142" ref_url="https://bugzilla.suse.com/1232142" source="BUGZILLA"/>
		<reference ref_id="1232147" ref_url="https://bugzilla.suse.com/1232147" source="BUGZILLA"/>
		<reference ref_id="1232152" ref_url="https://bugzilla.suse.com/1232152" source="BUGZILLA"/>
		<reference ref_id="1232159" ref_url="https://bugzilla.suse.com/1232159" source="BUGZILLA"/>
		<reference ref_id="1232162" ref_url="https://bugzilla.suse.com/1232162" source="BUGZILLA"/>
		<reference ref_id="1232165" ref_url="https://bugzilla.suse.com/1232165" source="BUGZILLA"/>
		<reference ref_id="1232180" ref_url="https://bugzilla.suse.com/1232180" source="BUGZILLA"/>
		<reference ref_id="1232185" ref_url="https://bugzilla.suse.com/1232185" source="BUGZILLA"/>
		<reference ref_id="1232187" ref_url="https://bugzilla.suse.com/1232187" source="BUGZILLA"/>
		<reference ref_id="1232189" ref_url="https://bugzilla.suse.com/1232189" source="BUGZILLA"/>
		<reference ref_id="1232195" ref_url="https://bugzilla.suse.com/1232195" source="BUGZILLA"/>
		<reference ref_id="1232198" ref_url="https://bugzilla.suse.com/1232198" source="BUGZILLA"/>
		<reference ref_id="1232201" ref_url="https://bugzilla.suse.com/1232201" source="BUGZILLA"/>
		<reference ref_id="1232218" ref_url="https://bugzilla.suse.com/1232218" source="BUGZILLA"/>
		<reference ref_id="1232224" ref_url="https://bugzilla.suse.com/1232224" source="BUGZILLA"/>
		<reference ref_id="1232232" ref_url="https://bugzilla.suse.com/1232232" source="BUGZILLA"/>
		<reference ref_id="1232254" ref_url="https://bugzilla.suse.com/1232254" source="BUGZILLA"/>
		<reference ref_id="1232255" ref_url="https://bugzilla.suse.com/1232255" source="BUGZILLA"/>
		<reference ref_id="1232264" ref_url="https://bugzilla.suse.com/1232264" source="BUGZILLA"/>
		<reference ref_id="1232272" ref_url="https://bugzilla.suse.com/1232272" source="BUGZILLA"/>
		<reference ref_id="1232279" ref_url="https://bugzilla.suse.com/1232279" source="BUGZILLA"/>
		<reference ref_id="1232287" ref_url="https://bugzilla.suse.com/1232287" source="BUGZILLA"/>
		<reference ref_id="1232293" ref_url="https://bugzilla.suse.com/1232293" source="BUGZILLA"/>
		<reference ref_id="1232312" ref_url="https://bugzilla.suse.com/1232312" source="BUGZILLA"/>
		<reference ref_id="1232317" ref_url="https://bugzilla.suse.com/1232317" source="BUGZILLA"/>
		<reference ref_id="1232318" ref_url="https://bugzilla.suse.com/1232318" source="BUGZILLA"/>
		<reference ref_id="1232333" ref_url="https://bugzilla.suse.com/1232333" source="BUGZILLA"/>
		<reference ref_id="1232334" ref_url="https://bugzilla.suse.com/1232334" source="BUGZILLA"/>
		<reference ref_id="1232335" ref_url="https://bugzilla.suse.com/1232335" source="BUGZILLA"/>
		<reference ref_id="1232339" ref_url="https://bugzilla.suse.com/1232339" source="BUGZILLA"/>
		<reference ref_id="1232349" ref_url="https://bugzilla.suse.com/1232349" source="BUGZILLA"/>
		<reference ref_id="1232357" ref_url="https://bugzilla.suse.com/1232357" source="BUGZILLA"/>
		<reference ref_id="1232359" ref_url="https://bugzilla.suse.com/1232359" source="BUGZILLA"/>
		<reference ref_id="1232362" ref_url="https://bugzilla.suse.com/1232362" source="BUGZILLA"/>
		<reference ref_id="1232364" ref_url="https://bugzilla.suse.com/1232364" source="BUGZILLA"/>
		<reference ref_id="1232370" ref_url="https://bugzilla.suse.com/1232370" source="BUGZILLA"/>
		<reference ref_id="1232371" ref_url="https://bugzilla.suse.com/1232371" source="BUGZILLA"/>
		<reference ref_id="1232378" ref_url="https://bugzilla.suse.com/1232378" source="BUGZILLA"/>
		<reference ref_id="1232385" ref_url="https://bugzilla.suse.com/1232385" source="BUGZILLA"/>
		<reference ref_id="1232387" ref_url="https://bugzilla.suse.com/1232387" source="BUGZILLA"/>
		<reference ref_id="1232394" ref_url="https://bugzilla.suse.com/1232394" source="BUGZILLA"/>
		<reference ref_id="1232413" ref_url="https://bugzilla.suse.com/1232413" source="BUGZILLA"/>
		<reference ref_id="1232416" ref_url="https://bugzilla.suse.com/1232416" source="BUGZILLA"/>
		<reference ref_id="1232436" ref_url="https://bugzilla.suse.com/1232436" source="BUGZILLA"/>
		<reference ref_id="1232483" ref_url="https://bugzilla.suse.com/1232483" source="BUGZILLA"/>
		<reference ref_id="1232500" ref_url="https://bugzilla.suse.com/1232500" source="BUGZILLA"/>
		<reference ref_id="1232503" ref_url="https://bugzilla.suse.com/1232503" source="BUGZILLA"/>
		<reference ref_id="1232504" ref_url="https://bugzilla.suse.com/1232504" source="BUGZILLA"/>
		<reference ref_id="1232507" ref_url="https://bugzilla.suse.com/1232507" source="BUGZILLA"/>
		<reference ref_id="1232520" ref_url="https://bugzilla.suse.com/1232520" source="BUGZILLA"/>
		<reference ref_id="1232552" ref_url="https://bugzilla.suse.com/1232552" source="BUGZILLA"/>
		<reference ref_id="1232757" ref_url="https://bugzilla.suse.com/1232757" source="BUGZILLA"/>
		<reference ref_id="1232819" ref_url="https://bugzilla.suse.com/1232819" source="BUGZILLA"/>
		<reference ref_id="1232860" ref_url="https://bugzilla.suse.com/1232860" source="BUGZILLA"/>
		<reference ref_id="1232870" ref_url="https://bugzilla.suse.com/1232870" source="BUGZILLA"/>
		<reference ref_id="1232873" ref_url="https://bugzilla.suse.com/1232873" source="BUGZILLA"/>
		<reference ref_id="1232877" ref_url="https://bugzilla.suse.com/1232877" source="BUGZILLA"/>
		<reference ref_id="1232878" ref_url="https://bugzilla.suse.com/1232878" source="BUGZILLA"/>
		<reference ref_id="1232881" ref_url="https://bugzilla.suse.com/1232881" source="BUGZILLA"/>
		<reference ref_id="1232884" ref_url="https://bugzilla.suse.com/1232884" source="BUGZILLA"/>
		<reference ref_id="1232885" ref_url="https://bugzilla.suse.com/1232885" source="BUGZILLA"/>
		<reference ref_id="1232887" ref_url="https://bugzilla.suse.com/1232887" source="BUGZILLA"/>
		<reference ref_id="1232888" ref_url="https://bugzilla.suse.com/1232888" source="BUGZILLA"/>
		<reference ref_id="1232890" ref_url="https://bugzilla.suse.com/1232890" source="BUGZILLA"/>
		<reference ref_id="1232892" ref_url="https://bugzilla.suse.com/1232892" source="BUGZILLA"/>
		<reference ref_id="1232896" ref_url="https://bugzilla.suse.com/1232896" source="BUGZILLA"/>
		<reference ref_id="1232897" ref_url="https://bugzilla.suse.com/1232897" source="BUGZILLA"/>
		<reference ref_id="1232905" ref_url="https://bugzilla.suse.com/1232905" source="BUGZILLA"/>
		<reference ref_id="1232907" ref_url="https://bugzilla.suse.com/1232907" source="BUGZILLA"/>
		<reference ref_id="1232919" ref_url="https://bugzilla.suse.com/1232919" source="BUGZILLA"/>
		<reference ref_id="1232926" ref_url="https://bugzilla.suse.com/1232926" source="BUGZILLA"/>
		<reference ref_id="1232928" ref_url="https://bugzilla.suse.com/1232928" source="BUGZILLA"/>
		<reference ref_id="1232935" ref_url="https://bugzilla.suse.com/1232935" source="BUGZILLA"/>
		<reference ref_id="1233035" ref_url="https://bugzilla.suse.com/1233035" source="BUGZILLA"/>
		<reference ref_id="1233049" ref_url="https://bugzilla.suse.com/1233049" source="BUGZILLA"/>
		<reference ref_id="1233051" ref_url="https://bugzilla.suse.com/1233051" source="BUGZILLA"/>
		<reference ref_id="1233056" ref_url="https://bugzilla.suse.com/1233056" source="BUGZILLA"/>
		<reference ref_id="1233057" ref_url="https://bugzilla.suse.com/1233057" source="BUGZILLA"/>
		<reference ref_id="1233061" ref_url="https://bugzilla.suse.com/1233061" source="BUGZILLA"/>
		<reference ref_id="1233063" ref_url="https://bugzilla.suse.com/1233063" source="BUGZILLA"/>
		<reference ref_id="1233065" ref_url="https://bugzilla.suse.com/1233065" source="BUGZILLA"/>
		<reference ref_id="1233067" ref_url="https://bugzilla.suse.com/1233067" source="BUGZILLA"/>
		<reference ref_id="1233070" ref_url="https://bugzilla.suse.com/1233070" source="BUGZILLA"/>
		<reference ref_id="1233073" ref_url="https://bugzilla.suse.com/1233073" source="BUGZILLA"/>
		<reference ref_id="1233074" ref_url="https://bugzilla.suse.com/1233074" source="BUGZILLA"/>
		<reference ref_id="1233100" ref_url="https://bugzilla.suse.com/1233100" source="BUGZILLA"/>
		<reference ref_id="1233103" ref_url="https://bugzilla.suse.com/1233103" source="BUGZILLA"/>
		<reference ref_id="1233104" ref_url="https://bugzilla.suse.com/1233104" source="BUGZILLA"/>
		<reference ref_id="1233105" ref_url="https://bugzilla.suse.com/1233105" source="BUGZILLA"/>
		<reference ref_id="1233106" ref_url="https://bugzilla.suse.com/1233106" source="BUGZILLA"/>
		<reference ref_id="1233107" ref_url="https://bugzilla.suse.com/1233107" source="BUGZILLA"/>
		<reference ref_id="1233108" ref_url="https://bugzilla.suse.com/1233108" source="BUGZILLA"/>
		<reference ref_id="1233110" ref_url="https://bugzilla.suse.com/1233110" source="BUGZILLA"/>
		<reference ref_id="1233111" ref_url="https://bugzilla.suse.com/1233111" source="BUGZILLA"/>
		<reference ref_id="1233113" ref_url="https://bugzilla.suse.com/1233113" source="BUGZILLA"/>
		<reference ref_id="1233114" ref_url="https://bugzilla.suse.com/1233114" source="BUGZILLA"/>
		<reference ref_id="1233117" ref_url="https://bugzilla.suse.com/1233117" source="BUGZILLA"/>
		<reference ref_id="1233123" ref_url="https://bugzilla.suse.com/1233123" source="BUGZILLA"/>
		<reference ref_id="1233125" ref_url="https://bugzilla.suse.com/1233125" source="BUGZILLA"/>
		<reference ref_id="1233129" ref_url="https://bugzilla.suse.com/1233129" source="BUGZILLA"/>
		<reference ref_id="1233130" ref_url="https://bugzilla.suse.com/1233130" source="BUGZILLA"/>
		<reference ref_id="1233134" ref_url="https://bugzilla.suse.com/1233134" source="BUGZILLA"/>
		<reference ref_id="1233135" ref_url="https://bugzilla.suse.com/1233135" source="BUGZILLA"/>
		<reference ref_id="1233150" ref_url="https://bugzilla.suse.com/1233150" source="BUGZILLA"/>
		<reference ref_id="1233189" ref_url="https://bugzilla.suse.com/1233189" source="BUGZILLA"/>
		<reference ref_id="1233191" ref_url="https://bugzilla.suse.com/1233191" source="BUGZILLA"/>
		<reference ref_id="1233197" ref_url="https://bugzilla.suse.com/1233197" source="BUGZILLA"/>
		<reference ref_id="1233205" ref_url="https://bugzilla.suse.com/1233205" source="BUGZILLA"/>
		<reference ref_id="1233206" ref_url="https://bugzilla.suse.com/1233206" source="BUGZILLA"/>
		<reference ref_id="1233209" ref_url="https://bugzilla.suse.com/1233209" source="BUGZILLA"/>
		<reference ref_id="1233210" ref_url="https://bugzilla.suse.com/1233210" source="BUGZILLA"/>
		<reference ref_id="1233211" ref_url="https://bugzilla.suse.com/1233211" source="BUGZILLA"/>
		<reference ref_id="1233212" ref_url="https://bugzilla.suse.com/1233212" source="BUGZILLA"/>
		<reference ref_id="1233214" ref_url="https://bugzilla.suse.com/1233214" source="BUGZILLA"/>
		<reference ref_id="1233216" ref_url="https://bugzilla.suse.com/1233216" source="BUGZILLA"/>
		<reference ref_id="1233238" ref_url="https://bugzilla.suse.com/1233238" source="BUGZILLA"/>
		<reference ref_id="1233241" ref_url="https://bugzilla.suse.com/1233241" source="BUGZILLA"/>
		<reference ref_id="1233253" ref_url="https://bugzilla.suse.com/1233253" source="BUGZILLA"/>
		<reference ref_id="1233255" ref_url="https://bugzilla.suse.com/1233255" source="BUGZILLA"/>
		<reference ref_id="1233293" ref_url="https://bugzilla.suse.com/1233293" source="BUGZILLA"/>
		<reference ref_id="1233350" ref_url="https://bugzilla.suse.com/1233350" source="BUGZILLA"/>
		<reference ref_id="1233452" ref_url="https://bugzilla.suse.com/1233452" source="BUGZILLA"/>
		<reference ref_id="1233453" ref_url="https://bugzilla.suse.com/1233453" source="BUGZILLA"/>
		<reference ref_id="1233454" ref_url="https://bugzilla.suse.com/1233454" source="BUGZILLA"/>
		<reference ref_id="1233456" ref_url="https://bugzilla.suse.com/1233456" source="BUGZILLA"/>
		<reference ref_id="1233457" ref_url="https://bugzilla.suse.com/1233457" source="BUGZILLA"/>
		<reference ref_id="1233458" ref_url="https://bugzilla.suse.com/1233458" source="BUGZILLA"/>
		<reference ref_id="1233460" ref_url="https://bugzilla.suse.com/1233460" source="BUGZILLA"/>
		<reference ref_id="1233462" ref_url="https://bugzilla.suse.com/1233462" source="BUGZILLA"/>
		<reference ref_id="1233463" ref_url="https://bugzilla.suse.com/1233463" source="BUGZILLA"/>
		<reference ref_id="1233468" ref_url="https://bugzilla.suse.com/1233468" source="BUGZILLA"/>
		<reference ref_id="1233471" ref_url="https://bugzilla.suse.com/1233471" source="BUGZILLA"/>
		<reference ref_id="1233476" ref_url="https://bugzilla.suse.com/1233476" source="BUGZILLA"/>
		<reference ref_id="1233478" ref_url="https://bugzilla.suse.com/1233478" source="BUGZILLA"/>
		<reference ref_id="1233479" ref_url="https://bugzilla.suse.com/1233479" source="BUGZILLA"/>
		<reference ref_id="1233481" ref_url="https://bugzilla.suse.com/1233481" source="BUGZILLA"/>
		<reference ref_id="1233484" ref_url="https://bugzilla.suse.com/1233484" source="BUGZILLA"/>
		<reference ref_id="1233487" ref_url="https://bugzilla.suse.com/1233487" source="BUGZILLA"/>
		<reference ref_id="1233490" ref_url="https://bugzilla.suse.com/1233490" source="BUGZILLA"/>
		<reference ref_id="1233491" ref_url="https://bugzilla.suse.com/1233491" source="BUGZILLA"/>
		<reference ref_id="1233528" ref_url="https://bugzilla.suse.com/1233528" source="BUGZILLA"/>
		<reference ref_id="1233548" ref_url="https://bugzilla.suse.com/1233548" source="BUGZILLA"/>
		<reference ref_id="1233552" ref_url="https://bugzilla.suse.com/1233552" source="BUGZILLA"/>
		<reference ref_id="1233553" ref_url="https://bugzilla.suse.com/1233553" source="BUGZILLA"/>
		<reference ref_id="1233554" ref_url="https://bugzilla.suse.com/1233554" source="BUGZILLA"/>
		<reference ref_id="1233555" ref_url="https://bugzilla.suse.com/1233555" source="BUGZILLA"/>
		<reference ref_id="1233557" ref_url="https://bugzilla.suse.com/1233557" source="BUGZILLA"/>
		<reference ref_id="1233560" ref_url="https://bugzilla.suse.com/1233560" source="BUGZILLA"/>
		<reference ref_id="1233561" ref_url="https://bugzilla.suse.com/1233561" source="BUGZILLA"/>
		<reference ref_id="1233570" ref_url="https://bugzilla.suse.com/1233570" source="BUGZILLA"/>
		<reference ref_id="1233577" ref_url="https://bugzilla.suse.com/1233577" source="BUGZILLA"/>
		<reference ref_id="1233580" ref_url="https://bugzilla.suse.com/1233580" source="BUGZILLA"/>
		<reference ref_id="1233977" ref_url="https://bugzilla.suse.com/1233977" source="BUGZILLA"/>
		<reference ref_id="1234012" ref_url="https://bugzilla.suse.com/1234012" source="BUGZILLA"/>
		<reference ref_id="1234025" ref_url="https://bugzilla.suse.com/1234025" source="BUGZILLA"/>
		<reference ref_id="1234085" ref_url="https://bugzilla.suse.com/1234085" source="BUGZILLA"/>
		<reference ref_id="1234093" ref_url="https://bugzilla.suse.com/1234093" source="BUGZILLA"/>
		<reference ref_id="1234098" ref_url="https://bugzilla.suse.com/1234098" source="BUGZILLA"/>
		<reference ref_id="1234108" ref_url="https://bugzilla.suse.com/1234108" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-47594" ref_url="https://www.suse.com/security/cve/CVE-2021-47594/" source="CVE"/>
		<reference ref_id="CVE-2022-48674" ref_url="https://www.suse.com/security/cve/CVE-2022-48674/" source="CVE"/>
		<reference ref_id="CVE-2022-48979" ref_url="https://www.suse.com/security/cve/CVE-2022-48979/" source="CVE"/>
		<reference ref_id="CVE-2022-48982" ref_url="https://www.suse.com/security/cve/CVE-2022-48982/" source="CVE"/>
		<reference ref_id="CVE-2022-48983" ref_url="https://www.suse.com/security/cve/CVE-2022-48983/" source="CVE"/>
		<reference ref_id="CVE-2022-48989" ref_url="https://www.suse.com/security/cve/CVE-2022-48989/" source="CVE"/>
		<reference ref_id="CVE-2022-48990" ref_url="https://www.suse.com/security/cve/CVE-2022-48990/" source="CVE"/>
		<reference ref_id="CVE-2023-52915" ref_url="https://www.suse.com/security/cve/CVE-2023-52915/" source="CVE"/>
		<reference ref_id="CVE-2023-52917" ref_url="https://www.suse.com/security/cve/CVE-2023-52917/" source="CVE"/>
		<reference ref_id="CVE-2023-52918" ref_url="https://www.suse.com/security/cve/CVE-2023-52918/" source="CVE"/>
		<reference ref_id="CVE-2023-52921" ref_url="https://www.suse.com/security/cve/CVE-2023-52921/" source="CVE"/>
		<reference ref_id="CVE-2023-52922" ref_url="https://www.suse.com/security/cve/CVE-2023-52922/" source="CVE"/>
		<reference ref_id="CVE-2024-26782" ref_url="https://www.suse.com/security/cve/CVE-2024-26782/" source="CVE"/>
		<reference ref_id="CVE-2024-26906" ref_url="https://www.suse.com/security/cve/CVE-2024-26906/" source="CVE"/>
		<reference ref_id="CVE-2024-26953" ref_url="https://www.suse.com/security/cve/CVE-2024-26953/" source="CVE"/>
		<reference ref_id="CVE-2024-35888" ref_url="https://www.suse.com/security/cve/CVE-2024-35888/" source="CVE"/>
		<reference ref_id="CVE-2024-35937" ref_url="https://www.suse.com/security/cve/CVE-2024-35937/" source="CVE"/>
		<reference ref_id="CVE-2024-35980" ref_url="https://www.suse.com/security/cve/CVE-2024-35980/" source="CVE"/>
		<reference ref_id="CVE-2024-36484" ref_url="https://www.suse.com/security/cve/CVE-2024-36484/" source="CVE"/>
		<reference ref_id="CVE-2024-36883" ref_url="https://www.suse.com/security/cve/CVE-2024-36883/" source="CVE"/>
		<reference ref_id="CVE-2024-36886" ref_url="https://www.suse.com/security/cve/CVE-2024-36886/" source="CVE"/>
		<reference ref_id="CVE-2024-36905" ref_url="https://www.suse.com/security/cve/CVE-2024-36905/" source="CVE"/>
		<reference ref_id="CVE-2024-36953" ref_url="https://www.suse.com/security/cve/CVE-2024-36953/" source="CVE"/>
		<reference ref_id="CVE-2024-36954" ref_url="https://www.suse.com/security/cve/CVE-2024-36954/" source="CVE"/>
		<reference ref_id="CVE-2024-38577" ref_url="https://www.suse.com/security/cve/CVE-2024-38577/" source="CVE"/>
		<reference ref_id="CVE-2024-38589" ref_url="https://www.suse.com/security/cve/CVE-2024-38589/" source="CVE"/>
		<reference ref_id="CVE-2024-38615" ref_url="https://www.suse.com/security/cve/CVE-2024-38615/" source="CVE"/>
		<reference ref_id="CVE-2024-40997" ref_url="https://www.suse.com/security/cve/CVE-2024-40997/" source="CVE"/>
		<reference ref_id="CVE-2024-41016" ref_url="https://www.suse.com/security/cve/CVE-2024-41016/" source="CVE"/>
		<reference ref_id="CVE-2024-41023" ref_url="https://www.suse.com/security/cve/CVE-2024-41023/" source="CVE"/>
		<reference ref_id="CVE-2024-41049" ref_url="https://www.suse.com/security/cve/CVE-2024-41049/" source="CVE"/>
		<reference ref_id="CVE-2024-42131" ref_url="https://www.suse.com/security/cve/CVE-2024-42131/" source="CVE"/>
		<reference ref_id="CVE-2024-43817" ref_url="https://www.suse.com/security/cve/CVE-2024-43817/" source="CVE"/>
		<reference ref_id="CVE-2024-43897" ref_url="https://www.suse.com/security/cve/CVE-2024-43897/" source="CVE"/>
		<reference ref_id="CVE-2024-44932" ref_url="https://www.suse.com/security/cve/CVE-2024-44932/" source="CVE"/>
		<reference ref_id="CVE-2024-44964" ref_url="https://www.suse.com/security/cve/CVE-2024-44964/" source="CVE"/>
		<reference ref_id="CVE-2024-44995" ref_url="https://www.suse.com/security/cve/CVE-2024-44995/" source="CVE"/>
		<reference ref_id="CVE-2024-46681" ref_url="https://www.suse.com/security/cve/CVE-2024-46681/" source="CVE"/>
		<reference ref_id="CVE-2024-46800" ref_url="https://www.suse.com/security/cve/CVE-2024-46800/" source="CVE"/>
		<reference ref_id="CVE-2024-46802" ref_url="https://www.suse.com/security/cve/CVE-2024-46802/" source="CVE"/>
		<reference ref_id="CVE-2024-46804" ref_url="https://www.suse.com/security/cve/CVE-2024-46804/" source="CVE"/>
		<reference ref_id="CVE-2024-46805" ref_url="https://www.suse.com/security/cve/CVE-2024-46805/" source="CVE"/>
		<reference ref_id="CVE-2024-46807" ref_url="https://www.suse.com/security/cve/CVE-2024-46807/" source="CVE"/>
		<reference ref_id="CVE-2024-46810" ref_url="https://www.suse.com/security/cve/CVE-2024-46810/" source="CVE"/>
		<reference ref_id="CVE-2024-46812" ref_url="https://www.suse.com/security/cve/CVE-2024-46812/" source="CVE"/>
		<reference ref_id="CVE-2024-46819" ref_url="https://www.suse.com/security/cve/CVE-2024-46819/" source="CVE"/>
		<reference ref_id="CVE-2024-46821" ref_url="https://www.suse.com/security/cve/CVE-2024-46821/" source="CVE"/>
		<reference ref_id="CVE-2024-46835" ref_url="https://www.suse.com/security/cve/CVE-2024-46835/" source="CVE"/>
		<reference ref_id="CVE-2024-46842" ref_url="https://www.suse.com/security/cve/CVE-2024-46842/" source="CVE"/>
		<reference ref_id="CVE-2024-46853" ref_url="https://www.suse.com/security/cve/CVE-2024-46853/" source="CVE"/>
		<reference ref_id="CVE-2024-46859" ref_url="https://www.suse.com/security/cve/CVE-2024-46859/" source="CVE"/>
		<reference ref_id="CVE-2024-46864" ref_url="https://www.suse.com/security/cve/CVE-2024-46864/" source="CVE"/>
		<reference ref_id="CVE-2024-46871" ref_url="https://www.suse.com/security/cve/CVE-2024-46871/" source="CVE"/>
		<reference ref_id="CVE-2024-47663" ref_url="https://www.suse.com/security/cve/CVE-2024-47663/" source="CVE"/>
		<reference ref_id="CVE-2024-47665" ref_url="https://www.suse.com/security/cve/CVE-2024-47665/" source="CVE"/>
		<reference ref_id="CVE-2024-47667" ref_url="https://www.suse.com/security/cve/CVE-2024-47667/" source="CVE"/>
		<reference ref_id="CVE-2024-47669" ref_url="https://www.suse.com/security/cve/CVE-2024-47669/" source="CVE"/>
		<reference ref_id="CVE-2024-47670" ref_url="https://www.suse.com/security/cve/CVE-2024-47670/" source="CVE"/>
		<reference ref_id="CVE-2024-47671" ref_url="https://www.suse.com/security/cve/CVE-2024-47671/" source="CVE"/>
		<reference ref_id="CVE-2024-47679" ref_url="https://www.suse.com/security/cve/CVE-2024-47679/" source="CVE"/>
		<reference ref_id="CVE-2024-47682" ref_url="https://www.suse.com/security/cve/CVE-2024-47682/" source="CVE"/>
		<reference ref_id="CVE-2024-47693" ref_url="https://www.suse.com/security/cve/CVE-2024-47693/" source="CVE"/>
		<reference ref_id="CVE-2024-47695" ref_url="https://www.suse.com/security/cve/CVE-2024-47695/" source="CVE"/>
		<reference ref_id="CVE-2024-47696" ref_url="https://www.suse.com/security/cve/CVE-2024-47696/" source="CVE"/>
		<reference ref_id="CVE-2024-47697" ref_url="https://www.suse.com/security/cve/CVE-2024-47697/" source="CVE"/>
		<reference ref_id="CVE-2024-47698" ref_url="https://www.suse.com/security/cve/CVE-2024-47698/" source="CVE"/>
		<reference ref_id="CVE-2024-47699" ref_url="https://www.suse.com/security/cve/CVE-2024-47699/" source="CVE"/>
		<reference ref_id="CVE-2024-47701" ref_url="https://www.suse.com/security/cve/CVE-2024-47701/" source="CVE"/>
		<reference ref_id="CVE-2024-47709" ref_url="https://www.suse.com/security/cve/CVE-2024-47709/" source="CVE"/>
		<reference ref_id="CVE-2024-47712" ref_url="https://www.suse.com/security/cve/CVE-2024-47712/" source="CVE"/>
		<reference ref_id="CVE-2024-47713" ref_url="https://www.suse.com/security/cve/CVE-2024-47713/" source="CVE"/>
		<reference ref_id="CVE-2024-47718" ref_url="https://www.suse.com/security/cve/CVE-2024-47718/" source="CVE"/>
		<reference ref_id="CVE-2024-47723" ref_url="https://www.suse.com/security/cve/CVE-2024-47723/" source="CVE"/>
		<reference ref_id="CVE-2024-47728" ref_url="https://www.suse.com/security/cve/CVE-2024-47728/" source="CVE"/>
		<reference ref_id="CVE-2024-47735" ref_url="https://www.suse.com/security/cve/CVE-2024-47735/" source="CVE"/>
		<reference ref_id="CVE-2024-47737" ref_url="https://www.suse.com/security/cve/CVE-2024-47737/" source="CVE"/>
		<reference ref_id="CVE-2024-47742" ref_url="https://www.suse.com/security/cve/CVE-2024-47742/" source="CVE"/>
		<reference ref_id="CVE-2024-47745" ref_url="https://www.suse.com/security/cve/CVE-2024-47745/" source="CVE"/>
		<reference ref_id="CVE-2024-47749" ref_url="https://www.suse.com/security/cve/CVE-2024-47749/" source="CVE"/>
		<reference ref_id="CVE-2024-47756" ref_url="https://www.suse.com/security/cve/CVE-2024-47756/" source="CVE"/>
		<reference ref_id="CVE-2024-47757" ref_url="https://www.suse.com/security/cve/CVE-2024-47757/" source="CVE"/>
		<reference ref_id="CVE-2024-49850" ref_url="https://www.suse.com/security/cve/CVE-2024-49850/" source="CVE"/>
		<reference ref_id="CVE-2024-49851" ref_url="https://www.suse.com/security/cve/CVE-2024-49851/" source="CVE"/>
		<reference ref_id="CVE-2024-49852" ref_url="https://www.suse.com/security/cve/CVE-2024-49852/" source="CVE"/>
		<reference ref_id="CVE-2024-49855" ref_url="https://www.suse.com/security/cve/CVE-2024-49855/" source="CVE"/>
		<reference ref_id="CVE-2024-49861" ref_url="https://www.suse.com/security/cve/CVE-2024-49861/" source="CVE"/>
		<reference ref_id="CVE-2024-49863" ref_url="https://www.suse.com/security/cve/CVE-2024-49863/" source="CVE"/>
		<reference ref_id="CVE-2024-49868" ref_url="https://www.suse.com/security/cve/CVE-2024-49868/" source="CVE"/>
		<reference ref_id="CVE-2024-49870" ref_url="https://www.suse.com/security/cve/CVE-2024-49870/" source="CVE"/>
		<reference ref_id="CVE-2024-49871" ref_url="https://www.suse.com/security/cve/CVE-2024-49871/" source="CVE"/>
		<reference ref_id="CVE-2024-49875" ref_url="https://www.suse.com/security/cve/CVE-2024-49875/" source="CVE"/>
		<reference ref_id="CVE-2024-49877" ref_url="https://www.suse.com/security/cve/CVE-2024-49877/" source="CVE"/>
		<reference ref_id="CVE-2024-49879" ref_url="https://www.suse.com/security/cve/CVE-2024-49879/" source="CVE"/>
		<reference ref_id="CVE-2024-49884" ref_url="https://www.suse.com/security/cve/CVE-2024-49884/" source="CVE"/>
		<reference ref_id="CVE-2024-49891" ref_url="https://www.suse.com/security/cve/CVE-2024-49891/" source="CVE"/>
		<reference ref_id="CVE-2024-49900" ref_url="https://www.suse.com/security/cve/CVE-2024-49900/" source="CVE"/>
		<reference ref_id="CVE-2024-49902" ref_url="https://www.suse.com/security/cve/CVE-2024-49902/" source="CVE"/>
		<reference ref_id="CVE-2024-49903" ref_url="https://www.suse.com/security/cve/CVE-2024-49903/" source="CVE"/>
		<reference ref_id="CVE-2024-49905" ref_url="https://www.suse.com/security/cve/CVE-2024-49905/" source="CVE"/>
		<reference ref_id="CVE-2024-49907" ref_url="https://www.suse.com/security/cve/CVE-2024-49907/" source="CVE"/>
		<reference ref_id="CVE-2024-49908" ref_url="https://www.suse.com/security/cve/CVE-2024-49908/" source="CVE"/>
		<reference ref_id="CVE-2024-49921" ref_url="https://www.suse.com/security/cve/CVE-2024-49921/" source="CVE"/>
		<reference ref_id="CVE-2024-49924" ref_url="https://www.suse.com/security/cve/CVE-2024-49924/" source="CVE"/>
		<reference ref_id="CVE-2024-49925" ref_url="https://www.suse.com/security/cve/CVE-2024-49925/" source="CVE"/>
		<reference ref_id="CVE-2024-49934" ref_url="https://www.suse.com/security/cve/CVE-2024-49934/" source="CVE"/>
		<reference ref_id="CVE-2024-49935" ref_url="https://www.suse.com/security/cve/CVE-2024-49935/" source="CVE"/>
		<reference ref_id="CVE-2024-49938" ref_url="https://www.suse.com/security/cve/CVE-2024-49938/" source="CVE"/>
		<reference ref_id="CVE-2024-49945" ref_url="https://www.suse.com/security/cve/CVE-2024-49945/" source="CVE"/>
		<reference ref_id="CVE-2024-49947" ref_url="https://www.suse.com/security/cve/CVE-2024-49947/" source="CVE"/>
		<reference ref_id="CVE-2024-49950" ref_url="https://www.suse.com/security/cve/CVE-2024-49950/" source="CVE"/>
		<reference ref_id="CVE-2024-49957" ref_url="https://www.suse.com/security/cve/CVE-2024-49957/" source="CVE"/>
		<reference ref_id="CVE-2024-49963" ref_url="https://www.suse.com/security/cve/CVE-2024-49963/" source="CVE"/>
		<reference ref_id="CVE-2024-49965" ref_url="https://www.suse.com/security/cve/CVE-2024-49965/" source="CVE"/>
		<reference ref_id="CVE-2024-49966" ref_url="https://www.suse.com/security/cve/CVE-2024-49966/" source="CVE"/>
		<reference ref_id="CVE-2024-49968" ref_url="https://www.suse.com/security/cve/CVE-2024-49968/" source="CVE"/>
		<reference ref_id="CVE-2024-49981" ref_url="https://www.suse.com/security/cve/CVE-2024-49981/" source="CVE"/>
		<reference ref_id="CVE-2024-49983" ref_url="https://www.suse.com/security/cve/CVE-2024-49983/" source="CVE"/>
		<reference ref_id="CVE-2024-49985" ref_url="https://www.suse.com/security/cve/CVE-2024-49985/" source="CVE"/>
		<reference ref_id="CVE-2024-49989" ref_url="https://www.suse.com/security/cve/CVE-2024-49989/" source="CVE"/>
		<reference ref_id="CVE-2024-50003" ref_url="https://www.suse.com/security/cve/CVE-2024-50003/" source="CVE"/>
		<reference ref_id="CVE-2024-50007" ref_url="https://www.suse.com/security/cve/CVE-2024-50007/" source="CVE"/>
		<reference ref_id="CVE-2024-50008" ref_url="https://www.suse.com/security/cve/CVE-2024-50008/" source="CVE"/>
		<reference ref_id="CVE-2024-50009" ref_url="https://www.suse.com/security/cve/CVE-2024-50009/" source="CVE"/>
		<reference ref_id="CVE-2024-50013" ref_url="https://www.suse.com/security/cve/CVE-2024-50013/" source="CVE"/>
		<reference ref_id="CVE-2024-50017" ref_url="https://www.suse.com/security/cve/CVE-2024-50017/" source="CVE"/>
		<reference ref_id="CVE-2024-50025" ref_url="https://www.suse.com/security/cve/CVE-2024-50025/" source="CVE"/>
		<reference ref_id="CVE-2024-50026" ref_url="https://www.suse.com/security/cve/CVE-2024-50026/" source="CVE"/>
		<reference ref_id="CVE-2024-50031" ref_url="https://www.suse.com/security/cve/CVE-2024-50031/" source="CVE"/>
		<reference ref_id="CVE-2024-50044" ref_url="https://www.suse.com/security/cve/CVE-2024-50044/" source="CVE"/>
		<reference ref_id="CVE-2024-50062" ref_url="https://www.suse.com/security/cve/CVE-2024-50062/" source="CVE"/>
		<reference ref_id="CVE-2024-50067" ref_url="https://www.suse.com/security/cve/CVE-2024-50067/" source="CVE"/>
		<reference ref_id="CVE-2024-50073" ref_url="https://www.suse.com/security/cve/CVE-2024-50073/" source="CVE"/>
		<reference ref_id="CVE-2024-50074" ref_url="https://www.suse.com/security/cve/CVE-2024-50074/" source="CVE"/>
		<reference ref_id="CVE-2024-50077" ref_url="https://www.suse.com/security/cve/CVE-2024-50077/" source="CVE"/>
		<reference ref_id="CVE-2024-50078" ref_url="https://www.suse.com/security/cve/CVE-2024-50078/" source="CVE"/>
		<reference ref_id="CVE-2024-50082" ref_url="https://www.suse.com/security/cve/CVE-2024-50082/" source="CVE"/>
		<reference ref_id="CVE-2024-50089" ref_url="https://www.suse.com/security/cve/CVE-2024-50089/" source="CVE"/>
		<reference ref_id="CVE-2024-50093" ref_url="https://www.suse.com/security/cve/CVE-2024-50093/" source="CVE"/>
		<reference ref_id="CVE-2024-50095" ref_url="https://www.suse.com/security/cve/CVE-2024-50095/" source="CVE"/>
		<reference ref_id="CVE-2024-50096" ref_url="https://www.suse.com/security/cve/CVE-2024-50096/" source="CVE"/>
		<reference ref_id="CVE-2024-50098" ref_url="https://www.suse.com/security/cve/CVE-2024-50098/" source="CVE"/>
		<reference ref_id="CVE-2024-50099" ref_url="https://www.suse.com/security/cve/CVE-2024-50099/" source="CVE"/>
		<reference ref_id="CVE-2024-50103" ref_url="https://www.suse.com/security/cve/CVE-2024-50103/" source="CVE"/>
		<reference ref_id="CVE-2024-50108" ref_url="https://www.suse.com/security/cve/CVE-2024-50108/" source="CVE"/>
		<reference ref_id="CVE-2024-50110" ref_url="https://www.suse.com/security/cve/CVE-2024-50110/" source="CVE"/>
		<reference ref_id="CVE-2024-50115" ref_url="https://www.suse.com/security/cve/CVE-2024-50115/" source="CVE"/>
		<reference ref_id="CVE-2024-50116" ref_url="https://www.suse.com/security/cve/CVE-2024-50116/" source="CVE"/>
		<reference ref_id="CVE-2024-50117" ref_url="https://www.suse.com/security/cve/CVE-2024-50117/" source="CVE"/>
		<reference ref_id="CVE-2024-50124" ref_url="https://www.suse.com/security/cve/CVE-2024-50124/" source="CVE"/>
		<reference ref_id="CVE-2024-50125" ref_url="https://www.suse.com/security/cve/CVE-2024-50125/" source="CVE"/>
		<reference ref_id="CVE-2024-50127" ref_url="https://www.suse.com/security/cve/CVE-2024-50127/" source="CVE"/>
		<reference ref_id="CVE-2024-50128" ref_url="https://www.suse.com/security/cve/CVE-2024-50128/" source="CVE"/>
		<reference ref_id="CVE-2024-50131" ref_url="https://www.suse.com/security/cve/CVE-2024-50131/" source="CVE"/>
		<reference ref_id="CVE-2024-50134" ref_url="https://www.suse.com/security/cve/CVE-2024-50134/" source="CVE"/>
		<reference ref_id="CVE-2024-50135" ref_url="https://www.suse.com/security/cve/CVE-2024-50135/" source="CVE"/>
		<reference ref_id="CVE-2024-50138" ref_url="https://www.suse.com/security/cve/CVE-2024-50138/" source="CVE"/>
		<reference ref_id="CVE-2024-50141" ref_url="https://www.suse.com/security/cve/CVE-2024-50141/" source="CVE"/>
		<reference ref_id="CVE-2024-50146" ref_url="https://www.suse.com/security/cve/CVE-2024-50146/" source="CVE"/>
		<reference ref_id="CVE-2024-50147" ref_url="https://www.suse.com/security/cve/CVE-2024-50147/" source="CVE"/>
		<reference ref_id="CVE-2024-50148" ref_url="https://www.suse.com/security/cve/CVE-2024-50148/" source="CVE"/>
		<reference ref_id="CVE-2024-50150" ref_url="https://www.suse.com/security/cve/CVE-2024-50150/" source="CVE"/>
		<reference ref_id="CVE-2024-50153" ref_url="https://www.suse.com/security/cve/CVE-2024-50153/" source="CVE"/>
		<reference ref_id="CVE-2024-50154" ref_url="https://www.suse.com/security/cve/CVE-2024-50154/" source="CVE"/>
		<reference ref_id="CVE-2024-50155" ref_url="https://www.suse.com/security/cve/CVE-2024-50155/" source="CVE"/>
		<reference ref_id="CVE-2024-50156" ref_url="https://www.suse.com/security/cve/CVE-2024-50156/" source="CVE"/>
		<reference ref_id="CVE-2024-50160" ref_url="https://www.suse.com/security/cve/CVE-2024-50160/" source="CVE"/>
		<reference ref_id="CVE-2024-50167" ref_url="https://www.suse.com/security/cve/CVE-2024-50167/" source="CVE"/>
		<reference ref_id="CVE-2024-50171" ref_url="https://www.suse.com/security/cve/CVE-2024-50171/" source="CVE"/>
		<reference ref_id="CVE-2024-50179" ref_url="https://www.suse.com/security/cve/CVE-2024-50179/" source="CVE"/>
		<reference ref_id="CVE-2024-50180" ref_url="https://www.suse.com/security/cve/CVE-2024-50180/" source="CVE"/>
		<reference ref_id="CVE-2024-50182" ref_url="https://www.suse.com/security/cve/CVE-2024-50182/" source="CVE"/>
		<reference ref_id="CVE-2024-50183" ref_url="https://www.suse.com/security/cve/CVE-2024-50183/" source="CVE"/>
		<reference ref_id="CVE-2024-50184" ref_url="https://www.suse.com/security/cve/CVE-2024-50184/" source="CVE"/>
		<reference ref_id="CVE-2024-50186" ref_url="https://www.suse.com/security/cve/CVE-2024-50186/" source="CVE"/>
		<reference ref_id="CVE-2024-50187" ref_url="https://www.suse.com/security/cve/CVE-2024-50187/" source="CVE"/>
		<reference ref_id="CVE-2024-50188" ref_url="https://www.suse.com/security/cve/CVE-2024-50188/" source="CVE"/>
		<reference ref_id="CVE-2024-50189" ref_url="https://www.suse.com/security/cve/CVE-2024-50189/" source="CVE"/>
		<reference ref_id="CVE-2024-50192" ref_url="https://www.suse.com/security/cve/CVE-2024-50192/" source="CVE"/>
		<reference ref_id="CVE-2024-50194" ref_url="https://www.suse.com/security/cve/CVE-2024-50194/" source="CVE"/>
		<reference ref_id="CVE-2024-50195" ref_url="https://www.suse.com/security/cve/CVE-2024-50195/" source="CVE"/>
		<reference ref_id="CVE-2024-50196" ref_url="https://www.suse.com/security/cve/CVE-2024-50196/" source="CVE"/>
		<reference ref_id="CVE-2024-50198" ref_url="https://www.suse.com/security/cve/CVE-2024-50198/" source="CVE"/>
		<reference ref_id="CVE-2024-50201" ref_url="https://www.suse.com/security/cve/CVE-2024-50201/" source="CVE"/>
		<reference ref_id="CVE-2024-50205" ref_url="https://www.suse.com/security/cve/CVE-2024-50205/" source="CVE"/>
		<reference ref_id="CVE-2024-50208" ref_url="https://www.suse.com/security/cve/CVE-2024-50208/" source="CVE"/>
		<reference ref_id="CVE-2024-50209" ref_url="https://www.suse.com/security/cve/CVE-2024-50209/" source="CVE"/>
		<reference ref_id="CVE-2024-50215" ref_url="https://www.suse.com/security/cve/CVE-2024-50215/" source="CVE"/>
		<reference ref_id="CVE-2024-50218" ref_url="https://www.suse.com/security/cve/CVE-2024-50218/" source="CVE"/>
		<reference ref_id="CVE-2024-50229" ref_url="https://www.suse.com/security/cve/CVE-2024-50229/" source="CVE"/>
		<reference ref_id="CVE-2024-50230" ref_url="https://www.suse.com/security/cve/CVE-2024-50230/" source="CVE"/>
		<reference ref_id="CVE-2024-50232" ref_url="https://www.suse.com/security/cve/CVE-2024-50232/" source="CVE"/>
		<reference ref_id="CVE-2024-50233" ref_url="https://www.suse.com/security/cve/CVE-2024-50233/" source="CVE"/>
		<reference ref_id="CVE-2024-50234" ref_url="https://www.suse.com/security/cve/CVE-2024-50234/" source="CVE"/>
		<reference ref_id="CVE-2024-50236" ref_url="https://www.suse.com/security/cve/CVE-2024-50236/" source="CVE"/>
		<reference ref_id="CVE-2024-50237" ref_url="https://www.suse.com/security/cve/CVE-2024-50237/" source="CVE"/>
		<reference ref_id="CVE-2024-50249" ref_url="https://www.suse.com/security/cve/CVE-2024-50249/" source="CVE"/>
		<reference ref_id="CVE-2024-50255" ref_url="https://www.suse.com/security/cve/CVE-2024-50255/" source="CVE"/>
		<reference ref_id="CVE-2024-50259" ref_url="https://www.suse.com/security/cve/CVE-2024-50259/" source="CVE"/>
		<reference ref_id="CVE-2024-50261" ref_url="https://www.suse.com/security/cve/CVE-2024-50261/" source="CVE"/>
		<reference ref_id="CVE-2024-50264" ref_url="https://www.suse.com/security/cve/CVE-2024-50264/" source="CVE"/>
		<reference ref_id="CVE-2024-50265" ref_url="https://www.suse.com/security/cve/CVE-2024-50265/" source="CVE"/>
		<reference ref_id="CVE-2024-50267" ref_url="https://www.suse.com/security/cve/CVE-2024-50267/" source="CVE"/>
		<reference ref_id="CVE-2024-50268" ref_url="https://www.suse.com/security/cve/CVE-2024-50268/" source="CVE"/>
		<reference ref_id="CVE-2024-50269" ref_url="https://www.suse.com/security/cve/CVE-2024-50269/" source="CVE"/>
		<reference ref_id="CVE-2024-50271" ref_url="https://www.suse.com/security/cve/CVE-2024-50271/" source="CVE"/>
		<reference ref_id="CVE-2024-50273" ref_url="https://www.suse.com/security/cve/CVE-2024-50273/" source="CVE"/>
		<reference ref_id="CVE-2024-50274" ref_url="https://www.suse.com/security/cve/CVE-2024-50274/" source="CVE"/>
		<reference ref_id="CVE-2024-50279" ref_url="https://www.suse.com/security/cve/CVE-2024-50279/" source="CVE"/>
		<reference ref_id="CVE-2024-50282" ref_url="https://www.suse.com/security/cve/CVE-2024-50282/" source="CVE"/>
		<reference ref_id="CVE-2024-50287" ref_url="https://www.suse.com/security/cve/CVE-2024-50287/" source="CVE"/>
		<reference ref_id="CVE-2024-50289" ref_url="https://www.suse.com/security/cve/CVE-2024-50289/" source="CVE"/>
		<reference ref_id="CVE-2024-50290" ref_url="https://www.suse.com/security/cve/CVE-2024-50290/" source="CVE"/>
		<reference ref_id="CVE-2024-50292" ref_url="https://www.suse.com/security/cve/CVE-2024-50292/" source="CVE"/>
		<reference ref_id="CVE-2024-50295" ref_url="https://www.suse.com/security/cve/CVE-2024-50295/" source="CVE"/>
		<reference ref_id="CVE-2024-50298" ref_url="https://www.suse.com/security/cve/CVE-2024-50298/" source="CVE"/>
		<reference ref_id="CVE-2024-50301" ref_url="https://www.suse.com/security/cve/CVE-2024-50301/" source="CVE"/>
		<reference ref_id="CVE-2024-50302" ref_url="https://www.suse.com/security/cve/CVE-2024-50302/" source="CVE"/>
		<reference ref_id="CVE-2024-53052" ref_url="https://www.suse.com/security/cve/CVE-2024-53052/" source="CVE"/>
		<reference ref_id="CVE-2024-53058" ref_url="https://www.suse.com/security/cve/CVE-2024-53058/" source="CVE"/>
		<reference ref_id="CVE-2024-53059" ref_url="https://www.suse.com/security/cve/CVE-2024-53059/" source="CVE"/>
		<reference ref_id="CVE-2024-53060" ref_url="https://www.suse.com/security/cve/CVE-2024-53060/" source="CVE"/>
		<reference ref_id="CVE-2024-53061" ref_url="https://www.suse.com/security/cve/CVE-2024-53061/" source="CVE"/>
		<reference ref_id="CVE-2024-53063" ref_url="https://www.suse.com/security/cve/CVE-2024-53063/" source="CVE"/>
		<reference ref_id="CVE-2024-53066" ref_url="https://www.suse.com/security/cve/CVE-2024-53066/" source="CVE"/>
		<reference ref_id="CVE-2024-53068" ref_url="https://www.suse.com/security/cve/CVE-2024-53068/" source="CVE"/>
		<reference ref_id="CVE-2024-53079" ref_url="https://www.suse.com/security/cve/CVE-2024-53079/" source="CVE"/>
		<reference ref_id="CVE-2024-53085" ref_url="https://www.suse.com/security/cve/CVE-2024-53085/" source="CVE"/>
		<reference ref_id="CVE-2024-53088" ref_url="https://www.suse.com/security/cve/CVE-2024-53088/" source="CVE"/>
		<reference ref_id="CVE-2024-53104" ref_url="https://www.suse.com/security/cve/CVE-2024-53104/" source="CVE"/>
		<reference ref_id="CVE-2024-53110" ref_url="https://www.suse.com/security/cve/CVE-2024-53110/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2021-47594: mptcp: never allow the PM to close a listener subflow (bsc#1226560).
- CVE-2022-48983: io_uring: Fix a null-ptr-deref in io_tctx_exit_cb() (bsc#1231959).
- CVE-2024-26782: mptcp: fix double-free on socket dismantle (bsc#1222590).
- CVE-2024-26906: Fixed invalid vsyscall page read for copy_from_kernel_nofault() (bsc#1223202).
- CVE-2024-26953: net: esp: fix bad handling of pages from page_pool (bsc#1223656).
- CVE-2024-35888: erspan: make sure erspan_base_hdr is present in skb-&gt;head (bsc#1224518).
- CVE-2024-35937: wifi: cfg80211: check A-MSDU format more carefully (bsc#1224526).
- CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).
- CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).
- CVE-2024-36905: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (bsc#1225742).
- CVE-2024-36954: tipc: fix a possible memleak in tipc_buf_append (bsc#1225764).
- CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl() (bsc#1226748).
- CVE-2024-38615: cpufreq: exit() callback is optional (bsc#1226592).
- CVE-2024-40997: cpufreq: amd-pstate: fix memory leak on CPU EPP exit (bsc#1227853).
- CVE-2024-41023: sched/deadline: Fix task_struct reference leak (bsc#1228430).
- CVE-2024-44932: idpf: fix UAFs when destroying the queues (bsc#1229808).
- CVE-2024-44964: idpf: fix memory leaks and crashes while performing a soft reset (bsc#1230220).
- CVE-2024-44995: net: hns3: fix a deadlock problem when config TC during resetting (bsc#1230231).
- CVE-2024-46681: pktgen: use cpus_read_lock() in pg_net_init() (bsc#1230558).
- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).
- CVE-2024-47679: vfs: fix race between evice_inodes() and find_inode()&amp;iput() (bsc#1231930).
- CVE-2024-47701: ext4: explicitly exit when ext4_find_inline_entry returns an error (bsc#1231920).
- CVE-2024-47745: mm: split critical region in remap_file_pages() and invoke LSMs in between (bsc#1232135).
- CVE-2024-47757: nilfs2: fix potential oob read in nilfs_btree_check_delete() (bsc#1232187).
- CVE-2024-49868: btrfs: fix a NULL pointer dereference when failed to start a new trasacntion (bsc#1232272).
- CVE-2024-49921: drm/amd/display: Check null pointers before used (bsc#1232371).
- CVE-2024-49925: fbdev: efifb: Register sysfs groups through driver core (bsc#1232224)
- CVE-2024-49934: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name (bsc#1232387).
- CVE-2024-49945: net/ncsi: Disable the ncsi work before freeing the associated structure (bsc#1232165).
- CVE-2024-49950: Bluetooth: L2CAP: Fix uaf in l2cap_connect (bsc#1232159).
- CVE-2024-49968: ext4: fix error message when rejecting the default hash (bsc#1232264).
- CVE-2024-49983: ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free (bsc#1232096).
- CVE-2024-49989: drm/amd/display: fix double free issue during amdgpu module unload (bsc#1232483).
- CVE-2024-50009: cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value (bsc#1232318).
- CVE-2024-50073: tty: n_gsm: Fix use-after-free in gsm_cleanup_mux (bsc#1232520).
- CVE-2024-50082: blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race (bsc#1232500).
- CVE-2024-50089: unicode: Do not special case ignorable code points (bsc#1232860).
- CVE-2024-50093: thermal: intel: int340x: processor: Fix warning during module unload (bsc#1232877).
- CVE-2024-50098: scsi: ufs: core: Set SDEV_OFFLINE when UFS is shut down (bsc#1232881).
- CVE-2024-50108: drm/amd/display: Disable PSR-SU on Parade 08-01 TCON too (bsc#1232884).
- CVE-2024-50110: xfrm: fix one more kernel-infoleak in algo dumping (bsc#1232885).
- CVE-2024-50115: KVM: nSVM: Ignore nCR3[4:0] when loading PDPTEs from memory (bsc#1232919).
- CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232928).
- CVE-2024-50127: net: sched: fix use-after-free in taprio_change() (bsc#1232907).
- CVE-2024-50128: net: wwan: fix global oob in wwan_rtnl_policy (bsc#1232905).
- CVE-2024-50134: drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape (bsc#1232890).
- CVE-2024-50135: nvme-pci: fix race condition between reset and nvme_dev_disable() (bsc#1232888).
- CVE-2024-50138: bpf: Use raw_spinlock_t in ringbuf (bsc#1232935).
- CVE-2024-50146: net/mlx5e: Do not call cleanup on profile rollback failure (bsc#1233056).
- CVE-2024-50147: net/mlx5: Fix command bitmask initialization (bsc#1233067).
- CVE-2024-50153: scsi: target: core: Fix null-ptr-deref in target_alloc_device() (bsc#1233061).
- CVE-2024-50154: tcp: Fix use-after-free of nreq in reqsk_timer_handler() (bsc#1233070).
- CVE-2024-50167: be2net: fix potential memory leak in be_xmit() (bsc#1233049).
- CVE-2024-50171: net: systemport: fix potential memory leak in bcm_sysport_xmit() (bsc#1233057).
- CVE-2024-50182: secretmem: disable memfd_secret() if arch cannot set direct map (bsc#1233129).
- CVE-2024-50184: virtio_pmem: Check device status before requesting flush (bsc#1233135).
- CVE-2024-50186: net: explicitly clear the sk pointer, when pf-&gt;create fails (bsc#1233110).
- CVE-2024-50188: net: phy: dp83869: fix memory corruption when enabling fiber (bsc#1233107).
- CVE-2024-50192: irqchip/gic-v4: Correctly deal with set_affinity on lazily-mapped VPEs (bsc#1233106).
- CVE-2024-50195: posix-clock: posix-clock: Fix unbalanced locking in pc_clock_settime() (bsc#1233103).
- CVE-2024-50196: pinctrl: ocelot: fix system hang on level based interrupts (bsc#1233113).
- CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (bsc#1233293).
- CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233117).
- CVE-2024-50229: nilfs2: fix potential deadlock with newly created symlinks (bsc#1233205).
- CVE-2024-50230: nilfs2: fix kernel bug due to missing clearing of checked flag (bsc#1233206).
- CVE-2024-50259: netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() (bsc#1233214).
- CVE-2024-50261: macsec: Fix use-after-free while sending the offloading packet (bsc#1233253).
- CVE-2024-50264: vsock/virtio: Initialization of the dangling pointer occurring in vsk-&gt;trans (bsc#1233453).
- CVE-2024-50267: USB: serial: io_edgeport: fix use after free in debug printk (bsc#1233456).
- CVE-2024-50271: signal: restore the override_rlimit logic (bsc#1233460).
- CVE-2024-50273: btrfs: reinitialize delayed ref list after deleting it from the list (bsc#1233462).
- CVE-2024-50274: idpf: avoid vport access in idpf_get_link_ksettings (bsc#1233463).
- CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233468).
- CVE-2024-50289: media: av7110: fix a spectre vulnerability (bsc#1233478).
- CVE-2024-50295: net: arc: fix the device for dma_map_single/dma_unmap_single (bsc#1233484).
- CVE-2024-50298: net: enetc: allocate vf_state during PF probes (bsc#1233487).
- CVE-2024-53052: io_uring/rw: fix missing NOWAIT check for O_DIRECT start write (bsc#1233548).
- CVE-2024-53058: net: stmmac: TSO: Fix unbalanced DMA map/unmap for non-paged SKB data (bsc#1233552).
- CVE-2024-53061: media: s5p-jpeg: prevent buffer overflows (bsc#1233555).
- CVE-2024-53063: media: dvbdev: prevent the risk of out of memory access (bsc#1233557).
- CVE-2024-53068: firmware: arm_scmi: Fix slab-use-after-free in scmi_bus_notifier() (bsc#1233561).
- CVE-2024-53079: mm/thp: fix deferred split unqueue naming and locking (bsc#1233570).
- CVE-2024-53088: i40e: fix race condition by adding filter's intermediate sync state (bsc#1233580).
- CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
- CVE-2024-53110: vp_vdpa: fix id_table array not null terminated error (bsc#1234085).

The following non-security bugs were fixed:

- Drop OCFS2 patch causing a regression (bsc#1233255).
- Fix regression on AMDGPU driver (bsc#1233134).
- Removed the duplicated check of static_assert(sizeof(struct work_struct) &gt;= sizeof(struct rcu_head)).
- Revert 'cgroup: Fix memory leak caused by missing cgroup_bpf_offline' (bsc#1234108).
- Revert 'ixgbe: Manual AN-37 for troublesome link partners for X550 SFI' (git-fixes).
- Revert 'mmc: dw_mmc: Fix IDMAC operation with pages bigger than 4K' (git-fixes).
- Revert 'usb: gadget: composite: fix OS descriptors w_value logic' (git-fixes).
- Update config files (bsc#1218644). 
- Update config files. Enabled IDPF for ARM64 (bsc#1221309)
- acpi: CPPC: Fix _CPC register setting issue (git-fixes).
- acpi: CPPC: Make rmw_lock a raw_spin_lock (git-fixes).
- acpi: button: Add DMI quirk for Samsung Galaxy Book2 to fix initial lid detection issue (stable-fixes).
- acpi: resource: Add LG 16T90SP to irq1_level_low_skip_override[] (stable-fixes).
- ad7780: fix division by zero in ad7780_write_raw() (git-fixes).
- add bugreference to a hv_netvsc patch (bsc#1232413).
- alsa: 6fire: Release resources at card release (git-fixes).
- alsa: ac97: bus: Fix the mistake in the comment (git-fixes).
- alsa: caiaq: Use snd_card_free_when_closed() at disconnection (git-fixes).
- alsa: firewire-lib: fix return value on fail in amdtp_tscm_init() (git-fixes).
- alsa: hda/realtek - Fixed Clevo platform headset Mic issue (stable-fixes).
- alsa: hda/realtek: Add subwoofer quirk for Acer Predator G9-593 (stable-fixes).
- alsa: hda/realtek: Fix headset mic on TUXEDO Gemini 17 Gen3 (stable-fixes).
- alsa: hda/realtek: Fix headset mic on TUXEDO Stellaris 16 Gen6 mb1 (stable-fixes).
- alsa: hda/realtek: Limit internal Mic boost on Dell platform (stable-fixes).
- alsa: hda/realtek: Update ALC225 depop procedure (git-fixes).
- alsa: hda/realtek: Update ALC256 depop procedure (git-fixes).
- alsa: hda/realtek: fix mute/micmute LEDs for a HP EliteBook 645 G10 (stable-fixes).
- alsa: us122l: Use snd_card_free_when_closed() at disconnection (git-fixes).
- alsa: usb-audio: Add quirk for HP 320 FHD Webcam (stable-fixes).
- alsa: usb-audio: Add quirks for Dell WD19 dock (stable-fixes).
- alsa: usx2y: Use snd_card_free_when_closed() at disconnection (git-fixes).
- amd-pstate: Set min_perf to nominal_perf for active mode performance gov (git-fixes).
- arm64/sve: Discard stale CPU state when handling SVE traps (git-fixes)
- arm64: Force position-independent veneers (git-fixes).
- arm64: dts: imx8mp: correct sdhc ipg clk (git-fixes).
- arm64: fix .data.rel.ro size assertion when CONFIG_LTO_CLANG (git-fixes)
- arm64: smccc: Remove broken support for SMCCCv1.3 SVE discard hint (git-fixes)
- arm64: smccc: replace custom COUNT_ARGS() &amp; CONCATENATE() (git-fixes)
- arm64: tls: Fix context-switching of tpidrro_el0 when kpti is enabled (git-fixes)
- arm64:uprobe fix the uprobe SWBP_INSN in big-endian (git-fixes)
- asoc: amd: yc: Fix for enabling DMIC on acp6x via _DSD entry (git-fixes).
- asoc: codecs: Fix atomicity violation in snd_soc_component_get_drvdata() (git-fixes).
- asoc: codecs: lpass-rx-macro: add missing CDC_RX_BCL_VBAT_RF_PROC2 to default regs values (stable-fixes).
- asoc: cs42l51: Fix some error handling paths in cs42l51_probe() (git-fixes).
- asoc: fsl_sai: Enable 'FIFO continue on error' FCONT bit (stable-fixes).
- asoc: qcom: sm8250: add qrb4210-rb2-sndcard compatible string (stable-fixes).
- asoc: stm32: spdifrx: fix dma channel release in stm32_spdifrx_remove (git-fixes).
- blk-throttle: Fix io statistics for cgroup v1 (bsc#1233528).
- block: Avoid leaking hctx-&gt;nr_active counter on batched completion (bsc#1231923).
- bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync (git-fixes).
- bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs (git-fixes).
- bnxt_en: Fix the PCI-AER routines (git-fixes).
- bnxt_en: Remove mis-applied code from bnxt_cfg_ntp_filters() (git-fixes).
- bnxt_en: Reserve rings after PCIe AER recovery if NIC interface is down (git-fixes).
- bnxt_en: Reset PTP tx_avail after possible firmware reset (git-fixes).
- bnxt_en: Restore PTP tx_avail count in case of skb_pad() error (git-fixes).
- bnxt_en: Wait for FLR to complete during probe (git-fixes).
- bnxt_en: refactor reset close code (git-fixes).
- can: c_can: c_can_handle_bus_err(): update statistics if skb allocation fails (git-fixes).
- can: c_can: fix {rx,tx}_errors statistics (git-fixes).
- can: ems_usb: ems_usb_rx_err(): fix {rx,tx}_errors statistics (git-fixes).
- can: ifi_canfd: ifi_canfd_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes).
- can: j1939: j1939_session_new(): fix skb reference counting (git-fixes).
- can: m_can: m_can_handle_lec_err(): fix {rx,tx}_errors statistics (git-fixes).
- can: sun4i_can: sun4i_can_err(): call can_change_state() even if cf is NULL (git-fixes).
- can: sun4i_can: sun4i_can_err(): fix {rx,tx}_errors statistics (git-fixes).
- cgroup/bpf: only cgroup v2 can be attached by bpf programs (bsc#1234108).
- chtls: fix tp-&gt;rcv_tstamp initialization (git-fixes).
- comedi: Flush partial mappings in error case (git-fixes).
- crypto: bcm - add error check in the ahash_hmac_init function (git-fixes).
- crypto: caam - Fix the pointer passed to caam_qi_shutdown() (git-fixes).
- crypto: caam - add error check to caam_rsa_set_priv_key_form (git-fixes).
- crypto: cavium - Fix an error handling path in cpt_ucode_load_fw() (git-fixes).
- crypto: cavium - Fix the if condition to exit loop after timeout (git-fixes).
- crypto: inside-secure - Fix the return value of safexcel_xcbcmac_cra_init() (git-fixes).
- crypto: x86/aegis128 - access 32-bit arguments as 32-bit (git-fixes).
- cxgb4: Properly lock TX queue for the selftest (git-fixes).
- cxgb4: add forgotten u64 ivlan cast before shift (git-fixes).
- cxgb4: unnecessary check for 0 in the free_sge_txq_uld() function (git-fixes).
- drivers: net: prevent tun_build_skb() to exceed the packet size limit (git-fixes).
- drm/amd: Fix initialization mistake for NBIO 7.7.0 (stable-fixes).
- drm/amdgpu: Adjust debugfs eviction and IB access permissions (stable-fixes).
- drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read() (stable-fixes).
- drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported (git-fixes).
- drm/bridge: anx7625: Drop EDID cache on bridge power off (git-fixes).
- drm/bridge: tc358767: Fix link properties discovery (git-fixes).
- drm/bridge: tc358768: Fix DSI command tx (git-fixes).
- drm/etnaviv: Request pages from DMA32 zone on addressing_limited (git-fixes).
- drm/imx/dcss: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- drm/mm: Mark drm_mm_interval_tree*() functions with __maybe_unused (git-fixes).
- drm/msm/adreno: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- drm/msm/dpu: cast crtc_clk calculation to u64 in _dpu_core_perf_calc_clk() (git-fixes).
- drm/omap: Fix locking in omap_gem_new_dmabuf() (git-fixes).
- drm/omap: Fix possible NULL dereference (git-fixes).
- drm/panfrost: Remove unused id_mask from struct panfrost_model (git-fixes).
- drm/rockchip: vop: Fix a dereferenced before check warning (git-fixes).
- drm/sti: avoid potential dereference of error pointers (git-fixes).
- drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check (git-fixes).
- drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check (git-fixes).
- drm/v3d: Address race-condition in MMU flush (git-fixes).
- drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real VLA (stable-fixes).
- drm/vc4: hvs: Do not write gamma luts on 2711 (git-fixes).
- drm/vc4: hvs: Fix dlist debug not resetting the next entry pointer (git-fixes).
- drm/vc4: hvs: Remove incorrect limit from hvs_dlist debugfs function (git-fixes).
- drm/vmwgfx: Limit display layout ioctl array size to VMWGFX_NUM_DISPLAY_UNITS (stable-fixes).
- e1000e: Fix S0ix residency on corporate systems (git-fixes).
- efi/memattr: Ignore table if the size is clearly bogus (bsc#1231465).
- eth: bnxt: fix counting packets discarded due to OOM and netpoll (git-fixes).
- firmware: google: Unregister driver_info on failure (git-fixes).
- genirq/msi: Fix off-by-one error in msi_domain_alloc() (git-fixes).
- goldfish: Fix unused const variable 'goldfish_pipe_acpi_match' (git-fixes).
- gve: Fix XDP TX completion handling when counters overflow (git-fixes).
- gve: Fix an edge case for TSO skb validity check (git-fixes).
- gve: Fix skb truesize underestimation (git-fixes).
- gve: ignore nonrelevant GSO type bits when processing TSO headers (git-fixes).
- hid: core: zero-initialize the report buffer (git-fixes).
- hid: lenovo: Add support for Thinkpad X1 Tablet Gen 3 keyboard (stable-fixes).
- hid: multitouch: Add quirk for HONOR MagicBook Art 14 touchpad (stable-fixes).
- hid: multitouch: Add quirk for Logitech Bolt receiver w/ Casa touchpad (stable-fixes).
- hid: multitouch: Add support for B2402FVA track point (stable-fixes).
- hid: wacom: Defer calculation of resolution until resolution_code is known (git-fixes).
- hid: wacom: Interpret tilt data from Intuos Pro BT as signed values (git-fixes).
- hid: wacom: fix when get product name maybe null pointer (git-fixes).
- hv_sock: Initializing vsk-&gt;trans to NULL to prevent a dangling pointer (git-fixes).
- hwmon: (tps23861) Fix reporting of negative temperatures (git-fixes).
- i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (git-fixes).
- i40e: Fix XDP program unloading while removing the driver (git-fixes).
- i40e: Fix filter input checks to prevent config with invalid values (git-fixes).
- i40e: Fix waiting for queues of all VSIs to be disabled (git-fixes).
- i40e: Report MFS in decimal base instead of hex (git-fixes).
- i40e: Restore VF MSI-X state during PCI reset (git-fixes).
- i40e: avoid double calling i40e_pf_rxq_wait() (git-fixes).
- i40e: disable NAPI right after disabling irqs when handling xsk_pool (git-fixes).
- i40e: fix use-after-free in i40e_aqc_add_filters() (git-fixes).
- i40e: take into account XDP Tx queues when stopping rings (git-fixes).
- iTCO_wdt: mask NMI_NOW bit for update_no_reboot_bit() call (git-fixes).
- iavf: Fix TC config comparison with existing adapter TC config (git-fixes).
- iavf: Fix promiscuous mode configuration flow messages (git-fixes).
- iavf: Introduce new state machines for flow director (git-fixes).
- iavf: do not process adminq tasks when __IAVF_IN_REMOVE_TASK is set (git-fixes).
- iavf: fix FDIR rule fields masks validation (git-fixes).
- iavf: in iavf_down, disable queues when removing the driver (git-fixes).
- iavf: initialize waitqueues before starting watchdog_task (git-fixes).
- iavf: send VLAN offloading caps once after VFR (git-fixes).
- iavf: validate tx_coalesce_usecs even if rx_coalesce_usecs is zero (git-fixes).
- ibmvnic: Do partial reset on login failure (bsc#1233150).
- ibmvnic: Enforce stronger sanity checks on login response (bsc#1233150).
- ibmvnic: Ensure login failure recovery is safe from other resets (bsc#1233150).
- ibmvnic: Handle DMA unmapping of login buffs in release functions (bsc#1233150).
- ibmvnic: Unmap DMA login rsp buffer on send login fail (bsc#1233150).
- ice: Block switchdev mode when ADQ is active and vice versa (git-fixes).
- ice: Fix NULL pointer deref during VF reset (git-fixes).
- ice: Fix VSI list rule with ICE_SW_LKUP_LAST type (git-fixes).
- ice: Fix link_down_on_close message (git-fixes).
- ice: Fix netif_is_ice() in Safe Mode (git-fixes).
- ice: Interpret .set_channels() input differently (git-fixes).
- ice: Shut down VSI with 'link-down-on-close' enabled (git-fixes).
- ice: avoid executing commands on other ports when driving sync (git-fixes).
- ice: change q_index variable type to s16 to store -1 value (git-fixes).
- ice: fix ICE_LAST_OFFSET formula (git-fixes).
- ice: fix VLAN replay after reset (git-fixes).
- ice: fix accounting for filters shared by multiple VSIs (git-fixes).
- ice: fix accounting if a VLAN already exists (git-fixes).
- ice: fix over-shifted variable (git-fixes).
- ice: fix receive buffer size miscalculation (git-fixes).
- ice: ice_aq_check_events: fix off-by-one check when filling buffer (git-fixes).
- ice: reset first in crash dump kernels (git-fixes).
- ice: respect netif readiness in AF_XDP ZC related ndo's (git-fixes).
- ice: tc: allow zero flags in parsing tc flower (git-fixes).
- ice: virtchnl: stop pretending to support RSS over AQ or registers (git-fixes).
- idpf: Interpret .set_channels() input differently (git-fixes).
- idpf: avoid compiler introduced padding in virtchnl2_rss_key struct (git-fixes).
- idpf: avoid compiler padding in virtchnl2_ptype struct (git-fixes).
- idpf: disable local BH when scheduling napi for marker packets (git-fixes).
- idpf: distinguish vports by the dev_port attribute (git-fixes).
- idpf: do not enable NAPI and interrupts prior to allocating Rx buffers (git-fixes).
- idpf: fix UAFs when destroying the queues (git-fixes).
- idpf: fix corrupted frames and skb leaks in singleq mode (git-fixes).
- idpf: fix memleak in vport interrupt configuration (git-fixes).
- idpf: fix memory leaks and crashes while performing a soft reset (git-fixes).
- igb: Always call igb_xdp_ring_update_tail() under Tx lock (git-fixes).
- igb: Fix missing time sync events (git-fixes).
- igb: Fix not clearing TimeSync interrupts for 82580 (git-fixes).
- igb: extend PTP timestamp adjustments to i211 (git-fixes).
- igc: Check VLAN EtherType mask (git-fixes).
- igc: Check VLAN TCI mask (git-fixes).
- igc: Fix hicredit calculation (git-fixes).
- igc: Fix missing time sync events (git-fixes).
- igc: Remove temporary workaround (git-fixes).
- igc: Report VLAN EtherType matching back to user (git-fixes).
- igc: Unlock on error in igc_io_resume() (git-fixes).
- iio: adc: ad7124: fix division by zero in ad7124_set_channel_odr() (git-fixes).
- iio: adc: ad7606: Fix typo in the driver name (git-fixes).
- iio: adc: ad7923: Fix buffer overflow for tx_buf and ring_xfer (git-fixes).
- iio: light: al3010: Fix an error handling path in al3010_probe() (git-fixes).
- iio: light: veml6030: fix microlux value calculation (git-fixes).
- initramfs: avoid filename buffer overrun (bsc#1232436).
- input: i8042 - add Ayaneo Kun to i8042 quirk table (git-fixes).
- input: i8042 - add Fujitsu Lifebook E756 to i8042 quirk table (git-fixes).
- input: i8042 - add TUXEDO Stellaris 15 Slim Gen6 AMD to i8042 quirk table (git-fixes).
- input: i8042 - add TUXEDO Stellaris 16 Gen5 AMD to i8042 quirk table (git-fixes).
- input: i8042 - add another board name for TUXEDO Stellaris Gen5 AMD line (git-fixes).
- irqchip/gic-v3-its: Avoid explicit cpumask allocation on stack (git-fixes).
- irqchip/gic-v3-its: Fix VSYNC referencing an unmapped VPE on GIC v4.1 (git-fixes).
- ixgbe: avoid sleeping allocation in ixgbe_ipsec_vf_add_sa() (git-fixes).
- ixgbe: fix crash with empty VF macvlan list (git-fixes).
- ixgbe: fix timestamp configuration code (git-fixes).
- ixgbe: {dis, en}able irqs in ixgbe_txrx_ring_{dis, en}able (git-fixes).
- kABI: Restore exported __arm_smccc_sve_check (git-fixes)
- kernel-binary: Enable livepatch package only when livepatch is enabled Otherwise the filelist may be empty failing the build (bsc#1218644).
- kernel.h: split out COUNT_ARGS() and CONCATENATE() to args.h (git-fixes)
- kexec: fix a memory leak in crash_shrink_memory() (git-fixes).
- kvm: PPC: Book3S HV: remove unused varible (bsc#1194869).
- mac80211: MAC80211_MESSAGE_TRACING should depend on TRACING (git-fixes).
- media: adv7604: prevent underflow condition when reporting colorspace (git-fixes).
- media: cx24116: prevent overflows on SNR calculus (git-fixes).
- media: dvb-usb-v2: af9035: Fix null-ptr-deref in af9035_i2c_master_xfer (stable-fixes).
- media: dvb-usb-v2: af9035: fix missing unlock (git-fixes).
- media: dvb_frontend: do not play tricks with underflow values (git-fixes).
- media: dvbdev: prevent the risk of out of memory access (git-fixes).
- media: pci: cx23885: check cx23885_vdev_init() return (stable-fixes).
- media: pulse8-cec: fix data timestamp at pulse8_setup() (git-fixes).
- media: stb0899_algo: initialize cfr before using it (git-fixes).
- media: v4l2-ctrls-api: fix error handling for v4l2_g_ctrl() (git-fixes).
- media: v4l2-tpg: prevent the risk of a division by zero (git-fixes).
- mei: use kvmalloc for read buffer (git-fixes).
- misc: apds990x: Fix missing pm_runtime_disable() (git-fixes).
- mm/hugetlb: fix nodes huge page allocation when there are surplus pages (bsc#1234012).
- mm/memory: add non-anonymous page check in the copy_present_page() (bsc#1231646).
- modpost: remove incorrect code in do_eisa_entry() (git-fixes).
- net/mlx5: Add missing masks and QoS bit masks for scheduling elements (git-fixes).
- net/mlx5: Added cond_resched() to crdump collection (git-fixes).
- net/mlx5: Allow 0 for total host VFs (git-fixes).
- net/mlx5: Correctly compare pkt reformat ids (git-fixes).
- net/mlx5: DR, Can't go to uplink vport on RX rule (git-fixes).
- net/mlx5: DR, Use the right GVMI number for drop action (git-fixes).
- net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx (git-fixes).
- net/mlx5: Drain health before unregistering devlink (git-fixes).
- net/mlx5: E-switch, register event handler before arming the event (git-fixes).
- net/mlx5: Explicitly set scheduling element and TSAR type (git-fixes).
- net/mlx5: Fix fw tracer first block check (git-fixes).
- net/mlx5: Handle fw tracer change ownership event based on MTRC (git-fixes).
- net/mlx5: LAG, Check correct bucket when modifying LAG (git-fixes).
- net/mlx5: Lag, do bond only if slaves agree on roce state (git-fixes).
- net/mlx5: Lag, do not use the hardcoded value of the first port (git-fixes).
- net/mlx5: Lag, restore buckets number to default after hash LAG deactivation (git-fixes).
- net/mlx5: Skip clock update work when device is in error state (git-fixes).
- net/mlx5: Unregister notifier on eswitch init failure (git-fixes).
- net/mlx5: Update the list of the PCI supported devices (git-fixes).
- net/mlx5: Use RMW accessors for changing LNKCTL (git-fixes).
- net/mlx5: Use mlx5 device constant for selecting CQ period mode for ASO (git-fixes).
- net/mlx5: Use recovery timeout on sync reset flow (git-fixes).
- net/mlx5: fix potential memory leak in mlx5e_init_rep_rx (git-fixes).
- net/mlx5: fs, lock FTE when checking if active (git-fixes).
- net/mlx5e: Add a check for the return value from mlx5_port_set_eth_ptys (git-fixes).
- net/mlx5e: Add missing link modes to ptys2ethtool_map (git-fixes).
- net/mlx5e: Add mqprio_rl cleanup and free in mlx5e_priv_cleanup() (git-fixes).
- net/mlx5e: Again mutually exclude RX-FCS and RX-port-timestamp (git-fixes).
- net/mlx5e: Allow software parsing when IPsec crypto is enabled (git-fixes).
- net/mlx5e: CT: Fix null-ptr-deref in add rule err flow (git-fixes).
- net/mlx5e: Change the warning when ignore_flow_level is not supported (git-fixes).
- net/mlx5e: Check return value of snprintf writing to fw_version buffer (git-fixes).
- net/mlx5e: Check return value of snprintf writing to fw_version buffer for representors (git-fixes).
- net/mlx5e: Correct snprintf truncation handling for fw_version buffer (git-fixes).
- net/mlx5e: Correct snprintf truncation handling for fw_version buffer used by representors (git-fixes).
- net/mlx5e: Correctly report errors for ethtool rx flows (git-fixes).
- net/mlx5e: Do not offload internal port if filter device is out device (git-fixes).
- net/mlx5e: Fix IPsec tunnel mode offload feature check (git-fixes).
- net/mlx5e: Fix UDP GSO for encapsulated packets (git-fixes).
- net/mlx5e: Fix crash moving to switchdev mode when ntuple offload is set (git-fixes).
- net/mlx5e: Fix features validation check for tunneled UDP (non-VXLAN) packets (git-fixes).
- net/mlx5e: Fix pedit endianness (git-fixes).
- net/mlx5e: Fix possible deadlock on mlx5e_tx_timeout_work (git-fixes).
- net/mlx5e: Fix slab-out-of-bounds in mlx5_query_nic_vport_mac_list() (git-fixes).
- net/mlx5e: HTB, Fix inconsistencies with QoS SQs number (git-fixes).
- net/mlx5e: Move representor neigh cleanup to profile cleanup_tx (git-fixes).
- net/mlx5e: Reduce the size of icosq_str (git-fixes).
- net/mlx5e: Take state lock during tx timeout reporter (git-fixes).
- net/mlx5e: Use rx_missed_errors instead of rx_dropped for reporting buffer exhaustion (git-fixes).
- net/mlx5e: fix a potential double-free in fs_udp_create_groups (git-fixes).
- net/mlx5e: fix double free in macsec_fs_tx_create_crypto_table_groups (git-fixes).
- net/mlx5e: fix double free of encap_header (git-fixes).
- net/mlx5e: fix return value check in mlx5e_ipsec_remove_trailer() (git-fixes).
- net/mlx5e: kTLS, Fix incorrect page refcounting (git-fixes).
- net: ena: Fix potential sign extension issue (git-fixes).
- net: ena: Remove ena_select_queue (git-fixes).
- net: ena: Wrong missing IO completions check order (git-fixes).
- net: qede: use return from qede_parse_flow_attr() for flow_spec (git-fixes).
- net: relax socket state check at accept time (git-fixes).
- net: usb: lan78xx: Fix memory leak on device unplug by freeing PHY device (git-fixes).
- net: usb: lan78xx: Fix refcounting and autosuspend on invalid WoL configuration (git-fixes).
- net: usb: qmi_wwan: add Fibocom FG132 0x0112 composition (stable-fixes).
- net: usb: usbnet: fix race in probe failure (git-fixes).
- nfs: Fix KMSAN warning in decode_getfattr_attrs() (git-fixes).
- nvme-fabrics: fix kernel crash while shutting down controller (git-fixes).
- nvme-pci: fix freeing of the HMB descriptor table (git-fixes).
- nvme-pci: reverse request order in nvme_queue_rqs (git-fixes).
- ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() (git-fixes).
- pci: Add T_PVPERL macro (git-fixes).
- pci: Fix reset_method_store() memory leak (git-fixes).
- pci: endpoint: Clear secondary (not primary) EPC in pci_epc_remove_epf() (git-fixes).
- pci: j721e: Deassert PERST# after a delay of PCIE_T_PVPERL_MS milliseconds (git-fixes).
- pci: keystone: Add link up check to ks_pcie_other_map_bus() (git-fixes).
- pci: keystone: Set mode as Root Complex for 'ti,keystone-pcie' compatible (git-fixes).
- pci: rockchip-ep: Fix address translation unit programming (git-fixes).
- phy: tegra: xusb: Add error pointer check in xusb.c (git-fixes).
- platform/chrome: cros_ec_typec: fix missing fwnode reference decrement (git-fixes).
- platform/surface: aggregator: Fix warning when controller is destroyed in probe (git-fixes).
- platform/x86: dell-sysman: add support for alienware products (stable-fixes).
- platform/x86: dell-wmi: Ignore suspend notifications (stable-fixes).
- posix-cpu-timers: Clear TICK_DEP_BIT_POSIX_TIMER on clone (bsc#1234098).
- power: supply: bq27xxx: Fix registers of bq27426 (git-fixes).
- power: supply: core: Remove might_sleep() from power_supply_put() (git-fixes).
- powerpc/asm: Remove UPD_CONSTR after GCC 4.9 removal (bsc#1194869).
- powerpc/atomic: Use YZ constraints for DS-form instructions (bsc#1194869).
- powerpc/kexec: Fix return of uninitialized variable (bsc#1194869).
- powerpc/mm/fault: Fix kfence page fault reporting (bsc#1194869).
- powerpc/mm: Fix boot crash with FLATMEM (bsc#1194869).
- powerpc/mm: Fix boot warning with hugepages and CONFIG_DEBUG_VIRTUAL (bsc#1194869).
- powerpc/powernv: Free name on error in opal_event_init() (bsc#1194869).
- powerpc/pseries: Fix KVM guest detection for disabling hardlockup detector (bsc#1194869).
- powerpc/pseries: Fix dtl_access_lock to be a rw_semaphore (bsc#1194869).
- powerpc: remove GCC version check for UPD_CONSTR (bsc#1194869).
- qed: avoid truncating work queue length (git-fixes).
- rdma/bnxt_re: Check cqe flags to know imm_data vs inv_irkey (git-fixes)
- rdma/hns: Add clear_hem return value to log (git-fixes)
- rdma/hns: Add mutex_destroy() (git-fixes)
- rdma/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (git-fixes)
- rdma/hns: Fix an AEQE overflow error caused by untimely update of eq_db_ci (git-fixes)
- rdma/hns: Fix cpu stuck caused by printings during reset (git-fixes)
- rdma/hns: Fix different dgids mapping to the same dip_idx (git-fixes)
- rdma/hns: Fix flush cqe error when racing with destroy qp (git-fixes)
- rdma/hns: Fix out-of-order issue of requester when setting FENCE (git-fixes)
- rdma/hns: Remove unnecessary QP type checks (git-fixes)
- rdma/hns: Use dev_* printings in hem code instead of ibdev_* (git-fixes)
- rdma/hns: Use macro instead of magic number (git-fixes)
- rdma/mlx5: Move events notifier registration to be after device registration (git-fixes)
- rdma/mlx5: Use sq timestamp as QP timestamp when RoCE is disabled (git-fixes).
- rdma/rxe: Fix the qp flush warnings in req (git-fixes)
- rdma/rxe: Set queue pair cur_qp_state when being queried (git-fixes)
- rpm/scripts: Remove obsolete Symbols.list Symbols.list is not longer needed by the new klp-convert implementation. (bsc#1218644)
- rtc: ab-eoz9: do not fail temperature reads on undervoltage notification (git-fixes).
- rtc: abx80x: Fix WDT bit position of the status register (git-fixes).
- rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (git-fixes).
- rtc: st-lpc: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- scsi: lpfc: Add cleanup of nvmels_wq after HBA reset (bsc#1233241).
- scsi: lpfc: Call lpfc_sli4_queue_unset() in restart and rmmod paths (bsc#1233241).
- scsi: lpfc: Change lpfc_nodelist nlp_flag member into a bitmask (bsc#1233241).
- scsi: lpfc: Check SLI_ACTIVE flag in FDMI cmpl before submitting follow up FDMI (bsc#1233241).
- scsi: lpfc: Check devloss callbk done flag for potential stale NDLP ptrs (bsc#1233241).
- scsi: lpfc: Copyright updates for 14.4.0.6 patches (bsc#1233241).
- scsi: lpfc: Modify CGN warning signal calculation based on EDC response (bsc#1233241).
- scsi: lpfc: Prevent NDLP reference count underflow in dev_loss_tmo callback (bsc#1233241).
- scsi: lpfc: Remove NLP_RELEASE_RPI flag from nodelist structure (bsc#1233241).
- scsi: lpfc: Update lpfc version to 14.4.0.6 (bsc#1233241).
- scsi: lpfc: Update lpfc_els_flush_cmd() to check for SLI_ACTIVE before BSG flag (bsc#1233241).
- scsi: scsi_transport_fc: Allow setting rport state to current state (git-fixes).
- scsi: sd_zbc: Use kvzalloc() to allocate REPORT ZONES buffer (git-fixes).
- security/keys: fix slab-out-of-bounds in key_task_permission (git-fixes).
- serial: 8250: omap: Move pm_runtime_get_sync (git-fixes).
- sfc: Check firmware supports Ethernet PTP filter (git-fixes).
- sfc: do not unregister flow_indr if it was never registered (git-fixes).
- sfc: fix a double-free bug in efx_probe_filters (git-fixes).
- signal: Replace BUG_ON()s (bsc#1234093).
- spi: Fix acpi deferred irq probe (git-fixes).
- spi: atmel-quadspi: Fix register name in verbose logging function (git-fixes).
- staging: iio: frequency: ad9832: fix division by zero in ad9832_calc_freqreg() (git-fixes).
- thermal: core: Initialize thermal zones before registering them (git-fixes).
- thermal: intel: int340x: processor: Fix warning during module unload (git-fixes).
- tpm: Lock TPM chip in tpm_pm_suspend() first (bsc#1082555 git-fixes).
- tun: Fix xdp_rxq_info's queue_index when detaching (git-fixes).
- tun: prevent negative ifindex (git-fixes).
- ucounts: fix counter leak in inc_rlimit_get_ucounts() (bsc#1233460).
- usb: chaoskey: Fix possible deadlock chaoskey_list_lock (git-fixes).
- usb: chaoskey: fail open after removal (git-fixes).
- usb: dwc3: gadget: Add missing check for single port RAM in TxFIFO resizing logic (git-fixes).
- usb: dwc3: gadget: Fix checking for number of TRBs left (git-fixes).
- usb: dwc3: gadget: Fix looping of queued SG entries (git-fixes).
- usb: ehci-spear: fix call balance of sehci clk handling routines (git-fixes).
- usb: musb: sunxi: Fix accessing an released usb phy (git-fixes).
- usb: phy: Fix API devm_usb_put_phy() can not release the phy (git-fixes).
- usb: serial: ftdi_sio: Fix atomicity violation in get_serial_info() (git-fixes).
- usb: serial: io_edgeport: fix use after free in debug printk (git-fixes).
- usb: serial: option: add Fibocom FG132 0x0112 composition (stable-fixes).
- usb: serial: option: add Quectel RG650V (stable-fixes).
- usb: serial: qcserial: add support for Sierra Wireless EM86xx (stable-fixes).
- usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() (git-fixes).
- usb: typec: fix unreleased fwnode_handle in typec_port_register_altmodes() (git-fixes).
- usb: using mutex lock and supporting O_NONBLOCK flag in iowarrior_read() (git-fixes).
- usb: xhci: Fix TD invalidation under pending Set TR Dequeue (git-fixes).
- usb: yurex: make waiting on yurex_write interruptible (git-fixes).
- usbip: tools: Fix detach_port() invalid port error path (git-fixes).
- vdpa/mlx5: preserve CVQ vringh index (git-fixes).
- watchdog: mediatek: Make sure system reset gets asserted in mtk_wdt_restart() (git-fixes).
- watchdog: rti: of: honor timeout-sec property (git-fixes).
- wifi: ath10k: Fix memory leak in management tx (git-fixes).
- wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss1 (git-fixes).
- wifi: ath10k: fix invalid VHT parameters in supported_vht_mcs_rate_nss2 (git-fixes).
- wifi: ath11k: Fix invalid ring usage in full monitor mode (git-fixes).
- wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service() (git-fixes).
- wifi: brcm80211: BRCM_TRACING should depend on TRACING (git-fixes).
- wifi: iwlegacy: Clear stale interrupts before resuming device (stable-fixes).
- wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() (git-fixes).
- wifi: iwlwifi: mvm: disconnect station vifs if recovery failed (stable-fixes).
- wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower (git-fixes).
- wifi: mac80211: skip non-uploaded keys in ieee80211_iter_keys (git-fixes).
- wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan() (git-fixes).
- wifi: mwifiex: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- wifi: p54: Use IRQF_NO_AUTOEN flag in request_irq() (git-fixes).
- x86/kvm: fix is_stale_page_fault() (bsc#1221333).
- xhci: Fix Link TRB DMA in command ring stopped completion event (git-fixes).
- xhci: Separate PORT and CAPs macros into dedicated file (stable-fixes).
- xhci: Use pm_runtime_get to prevent RPM on unsupported systems (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-18"/>
	<updated date="2024-12-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1082555">SUSE bug 1082555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218644">SUSE bug 1218644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220382">SUSE bug 1220382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221309">SUSE bug 1221309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221333">SUSE bug 1221333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222364">SUSE bug 1222364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222590">SUSE bug 1222590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223202">SUSE bug 1223202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223656">SUSE bug 1223656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223848">SUSE bug 1223848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223919">SUSE bug 1223919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223942">SUSE bug 1223942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224518">SUSE bug 1224518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224526">SUSE bug 1224526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224574">SUSE bug 1224574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225725">SUSE bug 1225725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225730">SUSE bug 1225730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225742">SUSE bug 1225742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225764">SUSE bug 1225764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225812">SUSE bug 1225812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226560">SUSE bug 1226560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226592">SUSE bug 1226592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226631">SUSE bug 1226631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226748">SUSE bug 1226748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226872">SUSE bug 1226872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227853">SUSE bug 1227853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228410">SUSE bug 1228410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228430">SUSE bug 1228430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228486">SUSE bug 1228486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228650">SUSE bug 1228650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228857">SUSE bug 1228857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229312">SUSE bug 1229312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229429">SUSE bug 1229429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229585">SUSE bug 1229585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229752">SUSE bug 1229752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229808">SUSE bug 1229808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230055">SUSE bug 1230055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230220">SUSE bug 1230220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230231">SUSE bug 1230231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230270">SUSE bug 1230270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230558">SUSE bug 1230558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230827">SUSE bug 1230827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230918">SUSE bug 1230918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231083">SUSE bug 1231083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231089">SUSE bug 1231089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231098">SUSE bug 1231098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231101">SUSE bug 1231101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231108">SUSE bug 1231108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231111">SUSE bug 1231111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231132">SUSE bug 1231132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231135">SUSE bug 1231135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231138">SUSE bug 1231138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231169">SUSE bug 1231169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231178">SUSE bug 1231178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231180">SUSE bug 1231180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231181">SUSE bug 1231181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231187">SUSE bug 1231187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231202">SUSE bug 1231202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231434">SUSE bug 1231434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231441">SUSE bug 1231441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231452">SUSE bug 1231452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231465">SUSE bug 1231465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231474">SUSE bug 1231474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231481">SUSE bug 1231481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231537">SUSE bug 1231537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231541">SUSE bug 1231541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231646">SUSE bug 1231646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231849">SUSE bug 1231849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231856">SUSE bug 1231856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231858">SUSE bug 1231858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231859">SUSE bug 1231859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231864">SUSE bug 1231864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231904">SUSE bug 1231904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231916">SUSE bug 1231916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231920">SUSE bug 1231920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231923">SUSE bug 1231923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231930">SUSE bug 1231930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231931">SUSE bug 1231931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231947">SUSE bug 1231947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231952">SUSE bug 1231952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231953">SUSE bug 1231953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231959">SUSE bug 1231959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231978">SUSE bug 1231978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232013">SUSE bug 1232013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232015">SUSE bug 1232015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232016">SUSE bug 1232016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232017">SUSE bug 1232017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232027">SUSE bug 1232027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232028">SUSE bug 1232028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232047">SUSE bug 1232047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232048">SUSE bug 1232048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232050">SUSE bug 1232050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232056">SUSE bug 1232056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232076">SUSE bug 1232076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232080">SUSE bug 1232080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232094">SUSE bug 1232094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232096">SUSE bug 1232096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232098">SUSE bug 1232098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232111">SUSE bug 1232111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232126">SUSE bug 1232126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232134">SUSE bug 1232134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232135">SUSE bug 1232135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232141">SUSE bug 1232141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232142">SUSE bug 1232142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232147">SUSE bug 1232147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232152">SUSE bug 1232152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232159">SUSE bug 1232159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232162">SUSE bug 1232162</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232165">SUSE bug 1232165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232180">SUSE bug 1232180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232185">SUSE bug 1232185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232187">SUSE bug 1232187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232189">SUSE bug 1232189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232195">SUSE bug 1232195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232198">SUSE bug 1232198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232201">SUSE bug 1232201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232218">SUSE bug 1232218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232224">SUSE bug 1232224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232232">SUSE bug 1232232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232254">SUSE bug 1232254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232255">SUSE bug 1232255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232264">SUSE bug 1232264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232272">SUSE bug 1232272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232279">SUSE bug 1232279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232287">SUSE bug 1232287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232293">SUSE bug 1232293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232312">SUSE bug 1232312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232317">SUSE bug 1232317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232318">SUSE bug 1232318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232333">SUSE bug 1232333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232334">SUSE bug 1232334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232335">SUSE bug 1232335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232339">SUSE bug 1232339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232349">SUSE bug 1232349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232357">SUSE bug 1232357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232359">SUSE bug 1232359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232362">SUSE bug 1232362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232364">SUSE bug 1232364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232370">SUSE bug 1232370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232371">SUSE bug 1232371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232378">SUSE bug 1232378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232385">SUSE bug 1232385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232387">SUSE bug 1232387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232394">SUSE bug 1232394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232413">SUSE bug 1232413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232416">SUSE bug 1232416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232436">SUSE bug 1232436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232483">SUSE bug 1232483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232500">SUSE bug 1232500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232503">SUSE bug 1232503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232504">SUSE bug 1232504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232507">SUSE bug 1232507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232520">SUSE bug 1232520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232552">SUSE bug 1232552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232757">SUSE bug 1232757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232819">SUSE bug 1232819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232860">SUSE bug 1232860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232870">SUSE bug 1232870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232873">SUSE bug 1232873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232877">SUSE bug 1232877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232878">SUSE bug 1232878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232881">SUSE bug 1232881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232884">SUSE bug 1232884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232885">SUSE bug 1232885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232887">SUSE bug 1232887</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232888">SUSE bug 1232888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232890">SUSE bug 1232890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232892">SUSE bug 1232892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232896">SUSE bug 1232896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232897">SUSE bug 1232897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232905">SUSE bug 1232905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232907">SUSE bug 1232907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232919">SUSE bug 1232919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232926">SUSE bug 1232926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232928">SUSE bug 1232928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232935">SUSE bug 1232935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233035">SUSE bug 1233035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233049">SUSE bug 1233049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233051">SUSE bug 1233051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233056">SUSE bug 1233056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233057">SUSE bug 1233057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233061">SUSE bug 1233061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233063">SUSE bug 1233063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233065">SUSE bug 1233065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233067">SUSE bug 1233067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233070">SUSE bug 1233070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233073">SUSE bug 1233073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233074">SUSE bug 1233074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233100">SUSE bug 1233100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233103">SUSE bug 1233103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233104">SUSE bug 1233104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233105">SUSE bug 1233105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233106">SUSE bug 1233106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233107">SUSE bug 1233107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233108">SUSE bug 1233108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233110">SUSE bug 1233110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233111">SUSE bug 1233111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233113">SUSE bug 1233113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233114">SUSE bug 1233114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233117">SUSE bug 1233117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233123">SUSE bug 1233123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233125">SUSE bug 1233125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233129">SUSE bug 1233129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233130">SUSE bug 1233130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233134">SUSE bug 1233134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233135">SUSE bug 1233135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233150">SUSE bug 1233150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233189">SUSE bug 1233189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233191">SUSE bug 1233191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233197">SUSE bug 1233197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233205">SUSE bug 1233205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233206">SUSE bug 1233206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233209">SUSE bug 1233209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233210">SUSE bug 1233210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233211">SUSE bug 1233211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233212">SUSE bug 1233212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233214">SUSE bug 1233214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233216">SUSE bug 1233216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233238">SUSE bug 1233238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233241">SUSE bug 1233241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233253">SUSE bug 1233253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233255">SUSE bug 1233255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233293">SUSE bug 1233293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233350">SUSE bug 1233350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233452">SUSE bug 1233452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233453">SUSE bug 1233453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233454">SUSE bug 1233454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233456">SUSE bug 1233456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233457">SUSE bug 1233457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233458">SUSE bug 1233458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233460">SUSE bug 1233460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233462">SUSE bug 1233462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233463">SUSE bug 1233463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233468">SUSE bug 1233468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233471">SUSE bug 1233471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233476">SUSE bug 1233476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233478">SUSE bug 1233478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233479">SUSE bug 1233479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233481">SUSE bug 1233481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233484">SUSE bug 1233484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233487">SUSE bug 1233487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233490">SUSE bug 1233490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233491">SUSE bug 1233491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233528">SUSE bug 1233528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233548">SUSE bug 1233548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233552">SUSE bug 1233552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233553">SUSE bug 1233553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233554">SUSE bug 1233554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233555">SUSE bug 1233555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233557">SUSE bug 1233557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233560">SUSE bug 1233560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233561">SUSE bug 1233561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233570">SUSE bug 1233570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233577">SUSE bug 1233577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233580">SUSE bug 1233580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233977">SUSE bug 1233977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234012">SUSE bug 1234012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234025">SUSE bug 1234025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234085">SUSE bug 1234085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234093">SUSE bug 1234093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234098">SUSE bug 1234098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234108">SUSE bug 1234108</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47594/">CVE-2021-47594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47594">CVE-2021-47594 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48674/">CVE-2022-48674 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48674">CVE-2022-48674 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48979/">CVE-2022-48979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48979">CVE-2022-48979 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48982/">CVE-2022-48982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48982">CVE-2022-48982 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48983/">CVE-2022-48983 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48983">CVE-2022-48983 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48989/">CVE-2022-48989 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48989">CVE-2022-48989 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48990/">CVE-2022-48990 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48990">CVE-2022-48990 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52915/">CVE-2023-52915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52915">CVE-2023-52915 at NVD</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52917/">CVE-2023-52917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52917">CVE-2023-52917 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52918/">CVE-2023-52918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52918">CVE-2023-52918 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52921/">CVE-2023-52921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52921">CVE-2023-52921 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52922/">CVE-2023-52922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52922">CVE-2023-52922 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26782/">CVE-2024-26782 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26782">CVE-2024-26782 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26906/">CVE-2024-26906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26906">CVE-2024-26906 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26953/">CVE-2024-26953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26953">CVE-2024-26953 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35888/">CVE-2024-35888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35888">CVE-2024-35888 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35937/">CVE-2024-35937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35937">CVE-2024-35937 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35980/">CVE-2024-35980 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35980">CVE-2024-35980 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36484/">CVE-2024-36484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36484">CVE-2024-36484 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36883/">CVE-2024-36883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36883">CVE-2024-36883 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36886/">CVE-2024-36886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36886">CVE-2024-36886 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36905/">CVE-2024-36905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36905">CVE-2024-36905 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36953/">CVE-2024-36953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36953">CVE-2024-36953 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36954/">CVE-2024-36954 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36954">CVE-2024-36954 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38577/">CVE-2024-38577 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38577">CVE-2024-38577 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38589/">CVE-2024-38589 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38589">CVE-2024-38589 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38615/">CVE-2024-38615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38615">CVE-2024-38615 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40997/">CVE-2024-40997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40997">CVE-2024-40997 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-41016/">CVE-2024-41016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41016">CVE-2024-41016 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41023/">CVE-2024-41023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41023">CVE-2024-41023 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41049/">CVE-2024-41049 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41049">CVE-2024-41049 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42131/">CVE-2024-42131 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42131">CVE-2024-42131 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43817/">CVE-2024-43817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43817">CVE-2024-43817 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43897/">CVE-2024-43897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43897">CVE-2024-43897 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44932/">CVE-2024-44932 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44932">CVE-2024-44932 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-44964/">CVE-2024-44964 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44964">CVE-2024-44964 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44995/">CVE-2024-44995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44995">CVE-2024-44995 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46681/">CVE-2024-46681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46681">CVE-2024-46681 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46800/">CVE-2024-46800 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46800">CVE-2024-46800 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46802/">CVE-2024-46802 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46802">CVE-2024-46802 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46804/">CVE-2024-46804 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46804">CVE-2024-46804 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46805/">CVE-2024-46805 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46805">CVE-2024-46805 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46807/">CVE-2024-46807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46807">CVE-2024-46807 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46810/">CVE-2024-46810 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46810">CVE-2024-46810 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46812/">CVE-2024-46812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46812">CVE-2024-46812 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46819/">CVE-2024-46819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46819">CVE-2024-46819 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46821/">CVE-2024-46821 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46821">CVE-2024-46821 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46835/">CVE-2024-46835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46835">CVE-2024-46835 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46842/">CVE-2024-46842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46842">CVE-2024-46842 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46853/">CVE-2024-46853 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46853">CVE-2024-46853 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46859/">CVE-2024-46859 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46859">CVE-2024-46859 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46864/">CVE-2024-46864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46864">CVE-2024-46864 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46871/">CVE-2024-46871 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46871">CVE-2024-46871 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47663/">CVE-2024-47663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47663">CVE-2024-47663 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47665/">CVE-2024-47665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47665">CVE-2024-47665 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47667/">CVE-2024-47667 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47667">CVE-2024-47667 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47669/">CVE-2024-47669 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47669">CVE-2024-47669 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47670/">CVE-2024-47670 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47670">CVE-2024-47670 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-47671/">CVE-2024-47671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47671">CVE-2024-47671 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47679/">CVE-2024-47679 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47679">CVE-2024-47679 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47682/">CVE-2024-47682 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47682">CVE-2024-47682 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47693/">CVE-2024-47693 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47693">CVE-2024-47693 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47695/">CVE-2024-47695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47695">CVE-2024-47695 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47696/">CVE-2024-47696 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47696">CVE-2024-47696 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47697/">CVE-2024-47697 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47697">CVE-2024-47697 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47698/">CVE-2024-47698 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47698">CVE-2024-47698 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47699/">CVE-2024-47699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47699">CVE-2024-47699 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47701/">CVE-2024-47701 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47701">CVE-2024-47701 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47709/">CVE-2024-47709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47709">CVE-2024-47709 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47712/">CVE-2024-47712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47712">CVE-2024-47712 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47713/">CVE-2024-47713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47713">CVE-2024-47713 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47718/">CVE-2024-47718 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47718">CVE-2024-47718 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47723/">CVE-2024-47723 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47723">CVE-2024-47723 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47728/">CVE-2024-47728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47728">CVE-2024-47728 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47735/">CVE-2024-47735 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47735">CVE-2024-47735 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47737/">CVE-2024-47737 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47737">CVE-2024-47737 at NVD</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47742/">CVE-2024-47742 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47742">CVE-2024-47742 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47745/">CVE-2024-47745 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47745">CVE-2024-47745 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47749/">CVE-2024-47749 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47749">CVE-2024-47749 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47756/">CVE-2024-47756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47756">CVE-2024-47756 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47757/">CVE-2024-47757 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47757">CVE-2024-47757 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49850/">CVE-2024-49850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49850">CVE-2024-49850 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49851/">CVE-2024-49851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49851">CVE-2024-49851 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49852/">CVE-2024-49852 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49852">CVE-2024-49852 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49855/">CVE-2024-49855 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49855">CVE-2024-49855 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49861/">CVE-2024-49861 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49861">CVE-2024-49861 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49863/">CVE-2024-49863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49863">CVE-2024-49863 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49868/">CVE-2024-49868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49868">CVE-2024-49868 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49870/">CVE-2024-49870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49870">CVE-2024-49870 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49871/">CVE-2024-49871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49871">CVE-2024-49871 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49875/">CVE-2024-49875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49875">CVE-2024-49875 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49877/">CVE-2024-49877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49877">CVE-2024-49877 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49879/">CVE-2024-49879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49879">CVE-2024-49879 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49884/">CVE-2024-49884 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49884">CVE-2024-49884 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49891/">CVE-2024-49891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49891">CVE-2024-49891 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49900/">CVE-2024-49900 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49900">CVE-2024-49900 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49902/">CVE-2024-49902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49902">CVE-2024-49902 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49903/">CVE-2024-49903 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49903">CVE-2024-49903 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49905/">CVE-2024-49905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49905">CVE-2024-49905 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49907/">CVE-2024-49907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49907">CVE-2024-49907 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49908/">CVE-2024-49908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49908">CVE-2024-49908 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49921/">CVE-2024-49921 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49921">CVE-2024-49921 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49924/">CVE-2024-49924 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49924">CVE-2024-49924 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49925/">CVE-2024-49925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49925">CVE-2024-49925 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49934/">CVE-2024-49934 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49934">CVE-2024-49934 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49935/">CVE-2024-49935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49935">CVE-2024-49935 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49938/">CVE-2024-49938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49938">CVE-2024-49938 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49945/">CVE-2024-49945 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49945">CVE-2024-49945 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49947/">CVE-2024-49947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49947">CVE-2024-49947 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49950/">CVE-2024-49950 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49950">CVE-2024-49950 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49957/">CVE-2024-49957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49957">CVE-2024-49957 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49963/">CVE-2024-49963 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49963">CVE-2024-49963 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49965/">CVE-2024-49965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49965">CVE-2024-49965 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49966/">CVE-2024-49966 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49966">CVE-2024-49966 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49968/">CVE-2024-49968 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49968">CVE-2024-49968 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49981/">CVE-2024-49981 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49981">CVE-2024-49981 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49983/">CVE-2024-49983 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49983">CVE-2024-49983 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49985/">CVE-2024-49985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49985">CVE-2024-49985 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49989/">CVE-2024-49989 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49989">CVE-2024-49989 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50003/">CVE-2024-50003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50003">CVE-2024-50003 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50007/">CVE-2024-50007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50007">CVE-2024-50007 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50008/">CVE-2024-50008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50008">CVE-2024-50008 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50009/">CVE-2024-50009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50009">CVE-2024-50009 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50013/">CVE-2024-50013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50013">CVE-2024-50013 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50017/">CVE-2024-50017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50017">CVE-2024-50017 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50025/">CVE-2024-50025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50025">CVE-2024-50025 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50026/">CVE-2024-50026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50026">CVE-2024-50026 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50031/">CVE-2024-50031 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50031">CVE-2024-50031 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50044/">CVE-2024-50044 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50044">CVE-2024-50044 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50062/">CVE-2024-50062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50062">CVE-2024-50062 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50067/">CVE-2024-50067 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50067">CVE-2024-50067 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50073/">CVE-2024-50073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50073">CVE-2024-50073 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50074/">CVE-2024-50074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50074">CVE-2024-50074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50077/">CVE-2024-50077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50077">CVE-2024-50077 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50078/">CVE-2024-50078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50078">CVE-2024-50078 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50082/">CVE-2024-50082 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50082">CVE-2024-50082 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50089/">CVE-2024-50089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50089">CVE-2024-50089 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50093/">CVE-2024-50093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50093">CVE-2024-50093 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50095/">CVE-2024-50095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50095">CVE-2024-50095 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50096/">CVE-2024-50096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50096">CVE-2024-50096 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50098/">CVE-2024-50098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50098">CVE-2024-50098 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50099/">CVE-2024-50099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50099">CVE-2024-50099 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50103/">CVE-2024-50103 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50103">CVE-2024-50103 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50108/">CVE-2024-50108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50108">CVE-2024-50108 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50110/">CVE-2024-50110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50110">CVE-2024-50110 at NVD</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H" cvss4="4.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-50115/">CVE-2024-50115 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50115">CVE-2024-50115 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50116/">CVE-2024-50116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50116">CVE-2024-50116 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50117/">CVE-2024-50117 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50117">CVE-2024-50117 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50124/">CVE-2024-50124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50124">CVE-2024-50124 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50125/">CVE-2024-50125 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50125">CVE-2024-50125 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50127/">CVE-2024-50127 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50127">CVE-2024-50127 at NVD</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50128/">CVE-2024-50128 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50128">CVE-2024-50128 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50131/">CVE-2024-50131 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50131">CVE-2024-50131 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50134/">CVE-2024-50134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50134">CVE-2024-50134 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50135/">CVE-2024-50135 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50135">CVE-2024-50135 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50138/">CVE-2024-50138 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50138">CVE-2024-50138 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50141/">CVE-2024-50141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50141">CVE-2024-50141 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50146/">CVE-2024-50146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50146">CVE-2024-50146 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50147/">CVE-2024-50147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50147">CVE-2024-50147 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50148/">CVE-2024-50148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50148">CVE-2024-50148 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50150/">CVE-2024-50150 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50150">CVE-2024-50150 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50153/">CVE-2024-50153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50153">CVE-2024-50153 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50154/">CVE-2024-50154 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50154">CVE-2024-50154 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50155/">CVE-2024-50155 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50155">CVE-2024-50155 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50156/">CVE-2024-50156 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50156">CVE-2024-50156 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50160/">CVE-2024-50160 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50160">CVE-2024-50160 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50167/">CVE-2024-50167 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50167">CVE-2024-50167 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50171/">CVE-2024-50171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50171">CVE-2024-50171 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50179/">CVE-2024-50179 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50179">CVE-2024-50179 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50180/">CVE-2024-50180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50180">CVE-2024-50180 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50182/">CVE-2024-50182 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50182">CVE-2024-50182 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50183/">CVE-2024-50183 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50183">CVE-2024-50183 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50184/">CVE-2024-50184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50184">CVE-2024-50184 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50186/">CVE-2024-50186 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50186">CVE-2024-50186 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50187/">CVE-2024-50187 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50187">CVE-2024-50187 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50188/">CVE-2024-50188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50188">CVE-2024-50188 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50189/">CVE-2024-50189 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50189">CVE-2024-50189 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50192/">CVE-2024-50192 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50192">CVE-2024-50192 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50194/">CVE-2024-50194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50194">CVE-2024-50194 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50195/">CVE-2024-50195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50195">CVE-2024-50195 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50196/">CVE-2024-50196 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50196">CVE-2024-50196 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50198/">CVE-2024-50198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50198">CVE-2024-50198 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50201/">CVE-2024-50201 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50201">CVE-2024-50201 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50205/">CVE-2024-50205 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50205">CVE-2024-50205 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50208/">CVE-2024-50208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50208">CVE-2024-50208 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50209/">CVE-2024-50209 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50209">CVE-2024-50209 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50215/">CVE-2024-50215 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50215">CVE-2024-50215 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50218/">CVE-2024-50218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50218">CVE-2024-50218 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50229/">CVE-2024-50229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50229">CVE-2024-50229 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50230/">CVE-2024-50230 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50230">CVE-2024-50230 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50232/">CVE-2024-50232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50232">CVE-2024-50232 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50233/">CVE-2024-50233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50233">CVE-2024-50233 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50234/">CVE-2024-50234 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50234">CVE-2024-50234 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50236/">CVE-2024-50236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50236">CVE-2024-50236 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50237/">CVE-2024-50237 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50237">CVE-2024-50237 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50249/">CVE-2024-50249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50249">CVE-2024-50249 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50255/">CVE-2024-50255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50255">CVE-2024-50255 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50259/">CVE-2024-50259 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50259">CVE-2024-50259 at NVD</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50261/">CVE-2024-50261 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50261">CVE-2024-50261 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50264/">CVE-2024-50264 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50264">CVE-2024-50264 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-50265/">CVE-2024-50265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50265">CVE-2024-50265 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50267/">CVE-2024-50267 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50267">CVE-2024-50267 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50268/">CVE-2024-50268 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50268">CVE-2024-50268 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50269/">CVE-2024-50269 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50269">CVE-2024-50269 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50271/">CVE-2024-50271 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50271">CVE-2024-50271 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50273/">CVE-2024-50273 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50273">CVE-2024-50273 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50274/">CVE-2024-50274 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50274">CVE-2024-50274 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50279/">CVE-2024-50279 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50279">CVE-2024-50279 at NVD</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50282/">CVE-2024-50282 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50282">CVE-2024-50282 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50287/">CVE-2024-50287 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50287">CVE-2024-50287 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-50289/">CVE-2024-50289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50289">CVE-2024-50289 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50290/">CVE-2024-50290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50290">CVE-2024-50290 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50292/">CVE-2024-50292 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50292">CVE-2024-50292 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50295/">CVE-2024-50295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50295">CVE-2024-50295 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50298/">CVE-2024-50298 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50298">CVE-2024-50298 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50301/">CVE-2024-50301 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50301">CVE-2024-50301 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50302/">CVE-2024-50302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50302">CVE-2024-50302 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-53052/">CVE-2024-53052 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53052">CVE-2024-53052 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53058/">CVE-2024-53058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53058">CVE-2024-53058 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53059/">CVE-2024-53059 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53059">CVE-2024-53059 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53060/">CVE-2024-53060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53060">CVE-2024-53060 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53061/">CVE-2024-53061 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53061">CVE-2024-53061 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53063/">CVE-2024-53063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53063">CVE-2024-53063 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53066/">CVE-2024-53066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53066">CVE-2024-53066 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53068/">CVE-2024-53068 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53068">CVE-2024-53068 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-53079/">CVE-2024-53079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53079">CVE-2024-53079 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53085/">CVE-2024-53085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53085">CVE-2024-53085 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53088/">CVE-2024-53088 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53088">CVE-2024-53088 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53104/">CVE-2024-53104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53104">CVE-2024-53104 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53110/">CVE-2024-53110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53110">CVE-2024-53110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958548" comment="cluster-md-kmp-azure-5.14.21-150500.33.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958549" comment="dlm-kmp-azure-5.14.21-150500.33.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958550" comment="gfs2-kmp-azure-5.14.21-150500.33.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958551" comment="kernel-azure-5.14.21-150500.33.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958552" comment="kernel-azure-devel-5.14.21-150500.33.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958553" comment="kernel-azure-extra-5.14.21-150500.33.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958554" comment="kernel-azure-optional-5.14.21-150500.33.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958555" comment="kernel-azure-vdso-5.14.21-150500.33.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958556" comment="kernel-devel-azure-5.14.21-150500.33.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958557" comment="kernel-source-azure-5.14.21-150500.33.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958558" comment="kernel-syms-azure-5.14.21-150500.33.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958559" comment="kselftests-kmp-azure-5.14.21-150500.33.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958560" comment="ocfs2-kmp-azure-5.14.21-150500.33.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958561" comment="reiserfs-kmp-azure-5.14.21-150500.33.75.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5152" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1226586" ref_url="https://bugzilla.suse.com/1226586" source="BUGZILLA"/>
		<reference ref_id="1233420" ref_url="https://bugzilla.suse.com/1233420" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-52616" ref_url="https://www.suse.com/security/cve/CVE-2024-52616/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020033.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2024-52616: Fixed Avahi Wide-Area DNS Predictable Transaction IDs (bsc#1233420)

  Other fixes: 
  - no longer supply bogus services to callbacks (bsc#1226586).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-19"/>
	<updated date="2024-12-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1226586">SUSE bug 1226586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233420">SUSE bug 1233420</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52616/">CVE-2024-52616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52616">CVE-2024-52616 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958566" comment="avahi-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958567" comment="avahi-autoipd-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958568" comment="avahi-compat-howl-devel-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958569" comment="avahi-compat-mDNSResponder-devel-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958570" comment="avahi-lang-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958571" comment="avahi-utils-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958572" comment="avahi-utils-gtk-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958573" comment="libavahi-client3-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958574" comment="libavahi-client3-32bit-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958575" comment="libavahi-common3-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958576" comment="libavahi-common3-32bit-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958577" comment="libavahi-core7-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958578" comment="libavahi-devel-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958579" comment="libavahi-glib-devel-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958580" comment="libavahi-glib1-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958581" comment="libavahi-glib1-32bit-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958582" comment="libavahi-gobject-devel-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958583" comment="libavahi-gobject0-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958584" comment="libavahi-libevent1-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958585" comment="libavahi-qt5-1-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958586" comment="libavahi-qt5-devel-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958587" comment="libavahi-ui-gtk3-0-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958588" comment="libdns_sd-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958589" comment="libdns_sd-32bit-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958590" comment="libhowl0-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958591" comment="python3-avahi-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958592" comment="python3-avahi-gtk-0.8-150400.7.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958593" comment="typelib-1_0-Avahi-0_6-0.8-150400.7.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5153" version="1" class="patch">
	<metadata>
		<title>Recommended update for docker-stable (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1231348" ref_url="https://bugzilla.suse.com/1231348" source="BUGZILLA"/>
		<reference ref_id="1232999" ref_url="https://bugzilla.suse.com/1232999" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-23653" ref_url="https://www.suse.com/security/cve/CVE-2024-23653/" source="CVE"/>
		<reference ref_id="CVE-2024-41110" ref_url="https://www.suse.com/security/cve/CVE-2024-41110/" source="CVE"/>
		<reference ref_id="SUSE-RU-2024:4391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-December/037926.html" source="SUSE-SU"/>
		<description>
This update for docker-stable fixes the following issues:

- Update docker-buildx to v0.19.2. See upstream changelog online at
  &lt;https://github.com/docker/buildx/releases/tag/v0.19.2&gt;.
  Some notable changelogs from the last update:
    * &lt;https://github.com/docker/buildx/releases/tag/v0.19.0&gt;
	* &lt;https://github.com/docker/buildx/releases/tag/v0.18.0&gt;

- Add a new toggle file /etc/docker/suse-secrets-enable which allows users to
  disable the SUSEConnect integration with Docker (which creates special mounts
  in /run/secrets to allow container-suseconnect to authenticate containers
  with registries on registered hosts). bsc#1231348 bsc#1232999
  In order to disable these mounts, just do
    echo 0 &gt; /etc/docker/suse-secrets-enable
  and restart Docker. In order to re-enable them, just do
    echo 1 &gt; /etc/docker/suse-secrets-enable
  and restart Docker. Docker will output information on startup to tell you
  whether the SUSE secrets feature is enabled or not.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-20"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1231348">SUSE bug 1231348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232999">SUSE bug 1232999</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23653/">CVE-2024-23653 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23653">CVE-2024-23653 at NVD</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41110/">CVE-2024-41110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41110">CVE-2024-41110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958676" comment="docker-stable-24.0.9_ce-150000.1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958677" comment="docker-stable-bash-completion-24.0.9_ce-150000.1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958678" comment="docker-stable-fish-completion-24.0.9_ce-150000.1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958679" comment="docker-stable-rootless-extras-24.0.9_ce-150000.1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958680" comment="docker-stable-zsh-completion-24.0.9_ce-150000.1.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5154" version="1" class="patch">
	<metadata>
		<title>Security update for emacs (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1233894" ref_url="https://bugzilla.suse.com/1233894" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-53920" ref_url="https://www.suse.com/security/cve/CVE-2024-53920/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020036.html" source="SUSE-SU"/>
		<description>
This update for emacs fixes the following issues:

  - CVE-2024-53920: Fixed arbitrary code execution via Lisp macro expansion (bsc#1233894)

		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-20"/>
	<updated date="2024-12-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1233894">SUSE bug 1233894</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53920/">CVE-2024-53920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53920">CVE-2024-53920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958681" comment="emacs-27.2-150400.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958682" comment="emacs-el-27.2-150400.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958683" comment="emacs-info-27.2-150400.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958684" comment="emacs-nox-27.2-150400.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958685" comment="emacs-x11-27.2-150400.3.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958686" comment="etags-27.2-150400.3.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5155" version="1" class="patch">
	<metadata>
		<title>Security update for python-aiohttp (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1223098" ref_url="https://bugzilla.suse.com/1223098" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-27306" ref_url="https://www.suse.com/security/cve/CVE-2024-27306/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020042.html" source="SUSE-SU"/>
		<description>
This update for python-aiohttp fixes the following issues:

- CVE-2024-27306: filenames and paths not escaped when generating index pages for static file handling. (bsc#1223098)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-20"/>
	<updated date="2024-12-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1223098">SUSE bug 1223098</bugzilla>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-27306/">CVE-2024-27306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27306">CVE-2024-27306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958687" comment="python-aiohttp-doc-3.6.0-150100.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958688" comment="python3-aiohttp-3.6.0-150100.3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5156" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217974" ref_url="https://bugzilla.suse.com/1217974" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-50761" ref_url="https://www.suse.com/security/cve/CVE-2023-50761/" source="CVE"/>
		<reference ref_id="CVE-2023-50762" ref_url="https://www.suse.com/security/cve/CVE-2023-50762/" source="CVE"/>
		<reference ref_id="CVE-2023-6856" ref_url="https://www.suse.com/security/cve/CVE-2023-6856/" source="CVE"/>
		<reference ref_id="CVE-2023-6857" ref_url="https://www.suse.com/security/cve/CVE-2023-6857/" source="CVE"/>
		<reference ref_id="CVE-2023-6858" ref_url="https://www.suse.com/security/cve/CVE-2023-6858/" source="CVE"/>
		<reference ref_id="CVE-2023-6859" ref_url="https://www.suse.com/security/cve/CVE-2023-6859/" source="CVE"/>
		<reference ref_id="CVE-2023-6860" ref_url="https://www.suse.com/security/cve/CVE-2023-6860/" source="CVE"/>
		<reference ref_id="CVE-2023-6861" ref_url="https://www.suse.com/security/cve/CVE-2023-6861/" source="CVE"/>
		<reference ref_id="CVE-2023-6862" ref_url="https://www.suse.com/security/cve/CVE-2023-6862/" source="CVE"/>
		<reference ref_id="CVE-2023-6863" ref_url="https://www.suse.com/security/cve/CVE-2023-6863/" source="CVE"/>
		<reference ref_id="CVE-2023-6864" ref_url="https://www.suse.com/security/cve/CVE-2023-6864/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017601.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Firefox Extended Support Release 115.6.0 ESR (bsc#1217974):
	* CVE-2023-6856: Heap-buffer-overflow affecting WebGL  DrawElementsInstanced method with Mesa VM driver (bmo#1843782).
	* CVE-2023-6857: Symlinks may resolve to smaller than expected buffers (bmo#1796023).
	* CVE-2023-6858: Heap buffer overflow in nsTextFragment (bmo#1826791).
	* CVE-2023-6859: Use-after-free in PR_GetIdentitiesLayer (bmo#1840144).
	* CVE-2023-6860: Potential sandbox escape due to VideoBridge lack of texture validation (bmo#1854669).
	* CVE-2023-6861: Heap buffer overflow affected nsWindow::PickerOpen(void) in headless mode (bmo#1864118).
	* CVE-2023-6862: Use-after-free in nsDNSService (bsc#1868042).
	* CVE-2023-6863: Undefined behavior in ShutdownObserver() (bmo#1868901).
	* CVE-2023-6864: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6.
	* CVE-2023-50762: Truncated signed text was shown with a valid OpenPGP signature (bmo#1862625).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-07"/>
	<updated date="2024-01-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50761/">CVE-2023-50761 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50761">CVE-2023-50761 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50762/">CVE-2023-50762 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50762">CVE-2023-50762 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6856/">CVE-2023-6856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6856">CVE-2023-6856 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6857/">CVE-2023-6857 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6857">CVE-2023-6857 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6858/">CVE-2023-6858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6858">CVE-2023-6858 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6859/">CVE-2023-6859 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6859">CVE-2023-6859 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6860/">CVE-2023-6860 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6860">CVE-2023-6860 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6861/">CVE-2023-6861 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6861">CVE-2023-6861 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6862/">CVE-2023-6862 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6862">CVE-2023-6862 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6863/">CVE-2023-6863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6863">CVE-2023-6863 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6864/">CVE-2023-6864 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6864">CVE-2023-6864 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009818857" comment="MozillaThunderbird-115.6.0-150200.8.142.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818858" comment="MozillaThunderbird-translations-common-115.6.0-150200.8.142.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818859" comment="MozillaThunderbird-translations-other-115.6.0-150200.8.142.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5157" version="1" class="patch">
	<metadata>
		<title>Security update for aalto-xml, flatten-maven-plugin, jctools, moditect, netty, netty-tcnative (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1047218" ref_url="https://bugzilla.suse.com/1047218" source="BUGZILLA"/>
		<reference ref_id="1233297" ref_url="https://bugzilla.suse.com/1233297" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-47535" ref_url="https://www.suse.com/security/cve/CVE-2024-47535/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020044.html" source="SUSE-SU"/>
		<description>
This update for aalto-xml, flatten-maven-plugin, jctools, moditect, netty, netty-tcnative fixes the following issues:

- CVE-2024-47535: Fixed unsafe reading of large environment files when Netty is loaded by a java application can 
lead to a crash due to the JVM memory limit being exceeded in netty (bsc#1233297)

Other fixes:
- Upgraded netty to upstream version 4.1.115
- Upgraded netty-tcnative to version 2.0.69 Final
- Updated jctools to version 4.0.5
- Updated aalto-xml to version 1.3.3
- Updated moditect to version 1.2.2
- Updated flatten-maven-plugin to version 1.6.0		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-23"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1047218">SUSE bug 1047218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233297">SUSE bug 1233297</bugzilla>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47535/">CVE-2024-47535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47535">CVE-2024-47535 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958840" comment="jctools-4.0.5-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958841" comment="jctools-channels-4.0.5-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958842" comment="jctools-experimental-4.0.5-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958843" comment="jctools-javadoc-4.0.5-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958844" comment="netty-4.1.115-150200.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958845" comment="netty-javadoc-4.1.115-150200.4.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958846" comment="netty-tcnative-2.0.69-150200.3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958847" comment="netty-tcnative-javadoc-2.0.69-150200.3.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5158" version="1" class="patch">
	<metadata>
		<title>Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container, virt-pr-helper-container (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218174" ref_url="https://bugzilla.suse.com/1218174" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2024:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017905.html" source="SUSE-SU"/>
		<description>
This update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container, virt-pr-helper-container fixes the following issues:



Update to version 1.1.1:

  Release notes are on https://github.com/kubevirt/kubevirt/releases/tag/v1.1.1

- Fix seccomp profile for post-copy migration
- Fix firmware path for aarch64 (/usr/share/AAVMF)

- Fix test with initially invalid DataVolume (bsc#1218174)

The containers were also rebuilt against updated go version.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-09"/>
	<updated date="2024-02-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218174">SUSE bug 1218174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846141" comment="kubevirt-container-disk-1.1.1-150500.8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846142" comment="kubevirt-manifests-1.1.1-150500.8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846143" comment="kubevirt-tests-1.1.1-150500.8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846144" comment="kubevirt-virt-api-1.1.1-150500.8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846145" comment="kubevirt-virt-controller-1.1.1-150500.8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846146" comment="kubevirt-virt-exportproxy-1.1.1-150500.8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846147" comment="kubevirt-virt-exportserver-1.1.1-150500.8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846148" comment="kubevirt-virt-handler-1.1.1-150500.8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846149" comment="kubevirt-virt-launcher-1.1.1-150500.8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846150" comment="kubevirt-virt-operator-1.1.1-150500.8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846151" comment="kubevirt-virtctl-1.1.1-150500.8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846152" comment="obs-service-kubevirt_containers_meta-1.1.1-150500.8.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5159" version="1" class="patch">
	<metadata>
		<title>Security update for mozjs78 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1232599" ref_url="https://bugzilla.suse.com/1232599" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-50602" ref_url="https://www.suse.com/security/cve/CVE-2024-50602/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020045.html" source="SUSE-SU"/>
		<description>
This update for mozjs78 fixes the following issues:

  - CVE-2024-50602: Fixed DoS via XML_ResumeParser (bsc#1232599)

		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-23"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1232599">SUSE bug 1232599</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50602/">CVE-2024-50602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50602">CVE-2024-50602 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958848" comment="libmozjs-78-0-78.15.0-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958849" comment="mozjs78-78.15.0-150400.3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958850" comment="mozjs78-devel-78.15.0-150400.3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5160" version="1" class="patch">
	<metadata>
		<title>Security update for gdb (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220490" ref_url="https://bugzilla.suse.com/1220490" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48064" ref_url="https://www.suse.com/security/cve/CVE-2022-48064/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020047.html" source="SUSE-SU"/>
		<description>
This update for gdb fixes the following issues:

Mention changes in GDB 14:

* GDB now supports the AArch64 Scalable Matrix Extension 2
  (SME2), which includes a new 512 bit lookup table register
  named ZT0.
* GDB now supports the AArch64 Scalable Matrix Extension (SME),
  which includes a new matrix register named ZA, a new thread
  register TPIDR2 and a new vector length register SVG
  (streaming vector granule).  GDB also supports tracking ZA
  state across signal frames.  Some features are still under
  development or are dependent on ABI specs that are still in
  alpha stage.  For example, manual function calls with ZA state
  don't have any special handling, and tracking of SVG changes
  based on DWARF information is still not implemented, but there
  are plans to do so in the future.
* GDB now recognizes the NO_COLOR environment variable and
  disables styling according to the spec.  See
  https://no-color.org/.  Styling can be re-enabled with
  'set style enabled on'.
* The AArch64 'org.gnu.gdb.aarch64.pauth' Pointer Authentication
  feature string has been deprecated in favor of the
  'org.gnu.gdb.aarch64.pauth_v2' feature string.
* GDB now has some support for integer types larger than 64 bits.
* Multi-target feature configuration.
  GDB now supports the individual configuration of remote
  targets' feature sets.  Based on the current selection of a
  target, the commands 'set remote &lt;name&gt;-packet (on|off|auto)'
  and 'show remote &lt;name&gt;-packet' can be used to configure a
  target's feature packet and to display its configuration,
  respectively.
* GDB has initial built-in support for the Debugger Adapter
  Protocol.
* For the break command, multiple uses of the 'thread' or 'task'
  keywords will now give an error instead of just using the
  thread or task id from the last instance of the keyword.  E.g.:
    break foo thread 1 thread 2
  will now give an error rather than using 'thread 2'.
* For the watch command, multiple uses of the 'task' keyword will
  now give an error instead of just using the task id from the
  last instance of the keyword.  E.g.:
    watch my_var task 1 task 2
  will now give an error rather than using 'task 2'.  The
  'thread' keyword already gave an error when used multiple times
  with the watch command, this remains unchanged.
* The 'set print elements' setting now helps when printing large
  arrays.  If an array would otherwise exceed max-value-size, but
  'print elements' is set such that the size of elements to print
  is less than or equal to 'max-value-size', GDB will now still
  print the array, however only 'max-value-size' worth of data
  will be added into the value history.
* For both the break and watch commands, it is now invalid to use
  both the 'thread' and 'task' keywords within the same command.
  For example the following commnds will now give an error:
    break foo thread 1 task 1
    watch var thread 2 task 3
* The printf command now accepts a '%V' output format which will
  format an expression just as the 'print' command would.  Print
  options can be placed withing '[...]' after the '%V' to modify
  how the value is printed.  E.g:
    printf '%V', some_array
    printf '%V[-array-indexes on]', some_array
  will print the array without, or with array indexes included,
  just as the array would be printed by the 'print' command.
  This functionality is also available for dprintf when
  dprintf-style is 'gdb'.
* When the printf command requires a string to be fetched from
  the	inferior, GDB now uses the existing 'max-value-size'
  setting to the limit the memory allocated within GDB.  The
  default 'max-value-size' is 64k.  To print longer strings you
  should increase 'max-value-size'.
* The Ada 2022 Enum_Rep and Enum_Val attributes are now
  supported.
* The Ada 2022 target name symbol ('@') is now supported by the
  Ada expression parser.
* The 'list' command now accepts '.' as an argument, which tells
  GDB to print the location around the point of execution within
  the current frame.  If the inferior hasn't started yet, the
  command will print around the beginning of the 'main' function.
* Using the 'list' command with no arguments in a situation where
  the command would attempt to list past the end of the file now
  warns the user that the end of file has been reached, refers
  the user to the newly added '.' argument
* Breakpoints can now be inferior-specific.  This is similar to
  the	existing thread-specific breakpoint support.  Breakpoint
  conditions can include the 'inferior' keyword followed by an
  inferior id (as displayed in the 'info inferiors' output).
  It is invalid to use the 'inferior' keyword with either the
  'thread' or 'task' keywords when creating a breakpoint.
* New convenience function '$_shell', to execute a shell command
  and return the result.  This lets you run shell commands in
  expressions.  Some examples:
   (gdb) p $_shell('true')
   $1 = 0
   (gdb) p $_shell('false')
   $2 = 1
   (gdb) break func if $_shell('some command') == 0
* New commands:

  * set debug breakpoint on|off
    show debug breakpoint
    Print additional debug messages about breakpoint insertion
    and removal.
  * maintenance print record-instruction [ N ]
    Print the recorded information for a given instruction.  If N
    is not given prints how GDB would undo the last instruction
    executed.  If N is negative, prints how GDB would undo the
    N-th previous instruction, and if N is positive, it prints
    how GDB will redo the N-th following instruction.
  * maintenance info frame-unwinders
    List the frame unwinders currently in effect, starting with
    the highest priority.
  * maintenance wait-for-index-cache
    Wait until all pending writes to the index cache have
    completed.
  * set always-read-ctf on|off
    show always-read-ctf
    When off, CTF is only read if DWARF is not present.  When on,
    CTF is read regardless of whether DWARF is present.  Off by
    default.
  * info main
    Get main symbol to identify entry point into program.
  * set tui mouse-events [on|off]
    show tui mouse-events
    When on (default), mouse clicks control the TUI and can be
    accessed by Python extensions.  When off, mouse clicks are
    handled by the terminal, enabling terminal-native text
    selection.

* MI changes:

  * MI version 1 has been removed.
  * mi now reports 'no-history' as a stop reason when hitting the
    end of the reverse execution history.
  * When creating a thread-specific breakpoint using the '-p'
    option, the -break-insert command would report the 'thread'
    field twice in the reply.  The content of both fields was
    always identical.  This has now been fixed; the 'thread'
    field will be reported just once for thread-specific
    breakpoints, or not at all for breakpoints without a thread
    restriction.  The same is also true for the 'task' field of
    an Ada task-specific breakpoint.
    * It is no longer possible to create a thread-specific
    breakpoint for a thread that doesn't exist using
    '-break-insert -p ID'.  Creating breakpoints for
    non-existent threads is not allowed when using the CLI, that
    the MI allowed it was a long standing bug, which has now
    been fixed.
  * The '--simple-values' argument to the
    '-stack-list-arguments','-stack-list-locals',
    '-stack-list-variables', and '-var-list-children' commands now
    takes reference types into account: that is, a value is now
    considered simple if it is neither an array, structure, or
    union, nor a reference to an array, structure, or union.
    (Previously all references were considered simple.)  Support
    for this feature can be verified by using the
    '-list-features' command, which should contain
    'simple-values-ref-types'.
  * The -break-insert command now accepts a '-g thread-group-id'
    option to allow for the creation of inferior-specific
    breakpoints.
  * The bkpt tuple, which appears in breakpoint-created
    notifications, and in the result of the -break-insert
    command can now include an optional 'inferior' field for both
    the main breakpoint, and each location, when the breakpoint
    is inferior-specific.

* Python API:

  * gdb.ThreadExitedEvent added.  Emits a ThreadEvent.
  * The gdb.unwinder.Unwinder.name attribute is now read-only.
  * The name argument passed to gdb.unwinder.Unwinder.__init__
    must now be of type 'str' otherwise a TypeError will be
    raised.
  * The gdb.unwinder.Unwinder.enabled attribute can now only
    accept values of type 'bool'.  Changing this attribute will
    now invalidate GDB's frame-cache, which means GDB will need
    to rebuild its frame-cache when next required - either with,
    or without the particular unwinder, depending on how
    'enabled' was changed.
  * New methods added to the gdb.PendingFrame class.  These
    methods have the same behaviour as the corresponding
    methods on gdb.Frame.  The new methods are:
    * gdb.PendingFrame.name: Return the name for the frame's
      function, or None.
    * gdb.PendingFrame.is_valid: Return True if the pending
      frame object is valid.
    * gdb.PendingFrame.pc: Return the $pc register value for
      this frame.
    * gdb.PendingFrame.language: Return a string containing the
      language for this frame, or None.
    * gdb.PendingFrame.find_sal: Return a gdb.Symtab_and_line
      object for the current location within the pending frame,
      or None.
    * gdb.PendingFrame.block: Return a gdb.Block for the current
      pending frame, or None.
    * gdb.PendingFrame.function: Return a gdb.Symbol for the
      current pending frame, or None.
  * The frame-id passed to gdb.PendingFrame.create_unwind_info
    can now use either an integer or a gdb.Value object for each
    of its 'sp', 'pc', and 'special' attributes.
  * A new class gdb.unwinder.FrameId has been added.  Instances
    of this class are constructed with 'sp' (stack-pointer) and
    'pc' (program-counter) values, and can be used as the
    frame-id when calling gdb.PendingFrame.create_unwind_info.
  * It is now no longer possible to sub-class the
    gdb.disassembler.DisassemblerResult type.
  * The Disassembler API from the gdb.disassembler module has
    been extended to include styling support:
    * The DisassemblerResult class can now be initialized with a
      list of parts.  Each part represents part of the
      disassembled instruction along with the associated style
      information.  This list of parts can be accessed with the
      new DisassemblerResult.parts property.
    * New constants gdb.disassembler.STYLE_* representing all the
      different styles part of an instruction might have.
    * New methods DisassembleInfo.text_part and
      DisassembleInfo.address_part which are used to create the
      new styled parts of a disassembled instruction.
    * Changes are backwards compatible, the older API can still
      be used to disassemble instructions without styling.
  * New function gdb.execute_mi(COMMAND, [ARG]...), that invokes
    a GDB/MI command and returns the output as a Python
    dictionary.
  * New function gdb.block_signals().  This returns a context
    manager that blocks any signals that GDB needs to handle
    itself.
  * New class gdb.Thread.  This is a subclass of threading.Thread
    that calls gdb.block_signals in its 'start' method.
  * gdb.parse_and_eval now has a new 'global_context' parameter.
    This can be used to request that the parse only examine
    global symbols.
  * gdb.Inferior now has a new 'arguments' attribute.  This holds
    the command-line arguments to the inferior, if known.
  * gdb.Inferior now has a new 'main_name' attribute.  This holds
    the name of the inferior's 'main', if known.
  * gdb.Inferior now has new methods 'clear_env', 'set_env', and
    'unset_env'.  These can be used to modify the inferior's
    environment before it is started.
  * gdb.Value now has the 'assign' method.
  * gdb.Value now has the 'to_array' method.  This converts an
    array-like Value to an array.
  * gdb.Progspace now has the new method 'objfile_for_address'.
    This returns the gdb.Objfile, if any, that covers a given
    address.
  * gdb.Breakpoint now has an 'inferior' attribute.  If the
    Breakpoint object is inferior specific then this attribute
    holds the inferior-id (an integer).  If the Breakpoint
    object is not inferior specific, then this field contains
    None.  This field can be written too.
  * gdb.Type now has the 'is_array_like' and 'is_string_like'
    methods.  These reflect GDB's internal idea of whether a
    type might be array- or string-like, even if they do not
    have the corresponding type code.
  * gdb.ValuePrinter is a new class that can be used as the base
    class for the result of applying a pretty-printer.  As a
    base class, it signals to gdb that the printer may implement
    new pretty-printer methods.
  * New attribute Progspace.symbol_file.  This attribute holds
    the gdb.Objfile that corresponds to Progspace.filename (when
    Progspace.filename is not None), otherwise, this attribute is
    itself None.
  * New attribute Progspace.executable_filename.  This attribute
    holds a string containing a file name set by the 'exec-file'
    or 'file' commands, or None if no executable file is set.
    This isn't the exact string passed by the user to these
    commands; the file name will have been partially resolved to
    an absolute file name.
  * A new executable_changed event registry is available.  This
    event emits ExecutableChangedEvent objects, which have
    'progspace' (a gdb.Progspace) and 'reload' (a Boolean)
    attributes.  This event is emitted when
    gdb.Progspace.executable_filename changes.
  * New event registries gdb.events.new_progspace and
    gdb.events.free_progspace, these emit NewProgspaceEvent and
     FreeProgspaceEvent event types respectively.  Both of these
     event types have a single 'progspace' attribute, which is
     the gdb.Progspace that is either being added to GDB, or
     removed from GDB.
  * gdb.LazyString now implements the __str__ method.
  * New method gdb.Frame.static_link that returns the outer
   frame of a nested function frame.

		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-23"/>
	<updated date="2024-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1220490">SUSE bug 1220490</bugzilla>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48064/">CVE-2022-48064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48064">CVE-2022-48064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958851" comment="gdb-14.2-150400.15.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958852" comment="gdb-testresults-14.2-150400.15.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958853" comment="gdbserver-14.2-150400.15.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5161" version="1" class="patch">
	<metadata>
		<title>Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="SUSE-SU-2024:0442-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034177.html" source="SUSE-SU"/>
		<description>
This update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer fixes the following issues:

- Set ExclusiveArch conditionally depending on the distro

- rebuild with current go release.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-09"/>
	<updated date="2024-02-09"/>
	<severity>Important</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846153" comment="containerized-data-importer-api-1.58.0-150500.6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846154" comment="containerized-data-importer-cloner-1.58.0-150500.6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846155" comment="containerized-data-importer-controller-1.58.0-150500.6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846156" comment="containerized-data-importer-importer-1.58.0-150500.6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846157" comment="containerized-data-importer-manifests-1.58.0-150500.6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846158" comment="containerized-data-importer-operator-1.58.0-150500.6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846159" comment="containerized-data-importer-uploadproxy-1.58.0-150500.6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846160" comment="containerized-data-importer-uploadserver-1.58.0-150500.6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846161" comment="obs-service-cdi_containers_meta-1.58.0-150500.6.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5162" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1234795" ref_url="https://bugzilla.suse.com/1234795" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-56378" ref_url="https://www.suse.com/security/cve/CVE-2024-56378/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020050.html" source="SUSE-SU"/>
		<description>
This update for poppler fixes the following issues:

- CVE-2024-56378: out-of-bounds read within JBIG2Bitmap::combine, which can lead to an application crash. (bsc#1234795)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-24"/>
	<updated date="2024-12-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1234795">SUSE bug 1234795</bugzilla>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56378/">CVE-2024-56378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56378">CVE-2024-56378 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009958884" comment="libpoppler-cpp0-23.01.0-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958885" comment="libpoppler-cpp0-32bit-23.01.0-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958886" comment="libpoppler-devel-23.01.0-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958887" comment="libpoppler-glib-devel-23.01.0-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958888" comment="libpoppler-glib8-23.01.0-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958889" comment="libpoppler-glib8-32bit-23.01.0-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958890" comment="libpoppler-qt5-1-23.01.0-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958891" comment="libpoppler-qt5-1-32bit-23.01.0-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958892" comment="libpoppler-qt5-devel-23.01.0-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958893" comment="libpoppler-qt6-3-23.01.0-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958894" comment="libpoppler-qt6-devel-23.01.0-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958895" comment="libpoppler126-23.01.0-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958896" comment="libpoppler126-32bit-23.01.0-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958897" comment="poppler-tools-23.01.0-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958898" comment="typelib-1_0-Poppler-0_18-23.01.0-150500.3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5163" version="1" class="patch">
	<metadata>
		<title>Security update for python-grpcio (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228919" ref_url="https://bugzilla.suse.com/1228919" source="BUGZILLA"/>
		<reference ref_id="1233821" ref_url="https://bugzilla.suse.com/1233821" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-11407" ref_url="https://www.suse.com/security/cve/CVE-2024-11407/" source="CVE"/>
		<reference ref_id="CVE-2024-7246" ref_url="https://www.suse.com/security/cve/CVE-2024-7246/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020053.html" source="SUSE-SU"/>
		<description>
This update for python-grpcio fixes the following issues:

- CVE-2024-11407: data corruption on servers with transmit zero copy enabled. (bsc#1233821)
- CVE-2024-7246: HPACK table poisoning by gRPC clients communicating with a HTTP/2 proxy. (bsc#1228919)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-27"/>
	<updated date="2024-12-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1228919">SUSE bug 1228919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233821">SUSE bug 1233821</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:A/V:X/RE:L/U:Green" href="https://www.suse.com/security/cve/CVE-2024-11407/">CVE-2024-11407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11407">CVE-2024-11407 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-7246/">CVE-2024-7246 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7246">CVE-2024-7246 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009958941" comment="python311-grpcio-1.60.1-150500.12.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5164" version="1" class="patch">
	<metadata>
		<title>Security update for govulncheck-vulndb (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="SUSE-SU-2024:4433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020055.html" source="SUSE-SU"/>
		<description>
This update for govulncheck-vulndb fixes the following issues:

- Update to version 0.0.20241218T202206 2024-12-18T20:22:06Z. (jsc#PED-11136)
  Go CVE Numbering Authority IDs added or updated with aliases:
  * GO-2024-3333

- Update to version 0.0.20241218T163557 2024-12-18T16:35:57Z. (jsc#PED-11136)
  Go CVE Numbering Authority IDs added or updated with aliases:
  * GO-2024-3331 GHSA-9j3m-fr7q-jxfw
  * GO-2024-3334 GHSA-qqc8-rv37-79q5
  * GO-2024-3335 GHSA-xx83-cxmq-x89m
  * GO-2024-3336 GHSA-cwq8-g58r-32hg
  * GO-2024-3337 GHSA-69pr-78gv-7c6h
  * GO-2024-3338 GHSA-826h-p4c3-477p
  * GO-2024-3339 GHSA-8wcc-m6j2-qxvm
  * GO-2024-3340 GHSA-v647-h8jj-fw5r

- Update to version 0.0.20241213T205935 2024-12-13T20:59:35Z. (jsc#PED-11136)
  Go CVE Numbering Authority IDs added or updated with aliases:
  * GO-2022-0635 GHSA-7f33-f4f5-xwgw
  * GO-2022-0646 GHSA-f5pg-7wfw-84q9
  * GO-2022-0828 GHSA-fx8w-mjvm-hvpc
  * GO-2023-2170 GHSA-q78c-gwqw-jcmc
  * GO-2023-2330 GHSA-7fxm-f474-hf8w
  * GO-2024-2901 GHSA-8hqg-whrw-pv92
  * GO-2024-3104 GHSA-846m-99qv-67mg
  * GO-2024-3122 GHSA-q3hw-3gm4-w5cr
  * GO-2024-3140 GHSA-xxxw-3j6h-q7h6
  * GO-2024-3169 GHSA-fhqq-8f65-5xfc
  * GO-2024-3186 GHSA-586p-749j-fhwp
  * GO-2024-3205 GHSA-xhr3-wf7j-h255
  * GO-2024-3218 GHSA-mqr9-hjr8-2m9w
  * GO-2024-3245 GHSA-95j2-w8x7-hm88
  * GO-2024-3248 GHSA-p26r-gfgc-c47h
  * GO-2024-3259 GHSA-p7mv-53f2-4cwj
  * GO-2024-3265 GHSA-gppm-hq3p-h4rp
  * GO-2024-3268 GHSA-r864-28pw-8682
  * GO-2024-3279 GHSA-7225-m954-23v7
  * GO-2024-3282 GHSA-r4pg-vg54-wxx4
  * GO-2024-3286 GHSA-27wf-5967-98gx
  * GO-2024-3293
  * GO-2024-3295 GHSA-55v3-xh23-96gh
  * GO-2024-3302 GHSA-px8v-pp82-rcvr
  * GO-2024-3306 GHSA-7mwh-q3xm-qh6p
  * GO-2024-3312 GHSA-4c49-9fpc-hc3v
  * GO-2024-3313 GHSA-jpmc-7p9c-4rxf
  * GO-2024-3314 GHSA-c2xf-9v2r-r2rx
  * GO-2024-3315
  * GO-2024-3319 GHSA-vmg2-r3xv-r3xf
  * GO-2024-3321 GHSA-v778-237x-gjrc
  * GO-2024-3323 GHSA-25w9-wqfq-gwqx
  * GO-2024-3324 GHSA-4pjc-pwgq-q9jp
  * GO-2024-3325 GHSA-c7xh-gjv4-4jgv
  * GO-2024-3326 GHSA-fqj6-whhx-47p7
  * GO-2024-3327 GHSA-xx68-37v4-4596
  * GO-2024-3330 GHSA-7prj-hgx4-2xc3
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-30"/>
	<updated date="2024-12-30"/>
	<severity>Moderate</severity>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959010" comment="govulncheck-vulndb-0.0.20241218T202206-150000.1.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5165" version="1" class="patch">
	<metadata>
		<title>Security update for grpc (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1228919" ref_url="https://bugzilla.suse.com/1228919" source="BUGZILLA"/>
		<reference ref_id="1233821" ref_url="https://bugzilla.suse.com/1233821" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-11407" ref_url="https://www.suse.com/security/cve/CVE-2024-11407/" source="CVE"/>
		<reference ref_id="CVE-2024-7246" ref_url="https://www.suse.com/security/cve/CVE-2024-7246/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:4436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020057.html" source="SUSE-SU"/>
		<description>
This update for grpc fixes the following issues:

- CVE-2024-7246: HPACK table poisoning by gRPC clients communicating with a HTTP/2 proxy. (bsc#1228919)
- CVE-2024-11407: data corruption on servers with transmit zero copy enabled. (bsc#1233821)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-12-30"/>
	<updated date="2024-12-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1228919">SUSE bug 1228919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233821">SUSE bug 1233821</bugzilla>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:A/V:X/RE:L/U:Green" href="https://www.suse.com/security/cve/CVE-2024-11407/">CVE-2024-11407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11407">CVE-2024-11407 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-7246/">CVE-2024-7246 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7246">CVE-2024-7246 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959011" comment="grpc-devel-1.60.0-150500.11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959012" comment="grpc-source-1.60.0-150500.11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959013" comment="libgrpc++1_60-1.60.0-150500.11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959014" comment="libgrpc1_60-1.60.0-150500.11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959015" comment="libgrpc37-1.60.0-150500.11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959016" comment="libupb37-1.60.0-150500.11.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959017" comment="upb-devel-1.60.0-150500.11.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5166" version="1" class="patch">
	<metadata>
		<title>Security update for suse-build-key (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219123" ref_url="https://bugzilla.suse.com/1219123" source="BUGZILLA"/>
		<reference ref_id="1219189" ref_url="https://bugzilla.suse.com/1219189" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2024:0444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017898.html" source="SUSE-SU"/>
		<description>
This update for suse-build-key fixes the following issues:

This update runs a import-suse-build-key script.

The previous libzypp-post-script based installation is replaced
with a systemd timer and service (bsc#1217215 bsc#1216410 jsc#PED-2777).
  - suse-build-key-import.service
  - suse-build-key-import.timer

It imports the future SUSE Linux Enterprise 15 4096 bit RSA key primary and reserve keys.
After successful import the timer is disabled.

To manually import them you can also run:

# rpm --import /usr/lib/rpm/gnupg/keys/gpg-pubkey-3fa1d6ce-63c9481c.asc
# rpm --import /usr/lib/rpm/gnupg/keys/gpg-pubkey-d588dc46-63c939db.asc

Bugfix added since last update:

- run rpm commands in import script only when libzypp is not 
  active. bsc#1219189 bsc#1219123
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-09"/>
	<updated date="2024-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219123">SUSE bug 1219123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219189">SUSE bug 1219189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846162" comment="suse-build-key-12.0-150000.8.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5167" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217654" ref_url="https://bugzilla.suse.com/1217654" source="BUGZILLA"/>
		<reference ref_id="1219131" ref_url="https://bugzilla.suse.com/1219131" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-50269" ref_url="https://www.suse.com/security/cve/CVE-2023-50269/" source="CVE"/>
		<reference ref_id="CVE-2024-23638" ref_url="https://www.suse.com/security/cve/CVE-2024-23638/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017906.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- CVE-2023-50269: fixed X-Forwarded-For Stack Overflow. (bsc#1217654)
- CVE-2024-23638: fixed Denial of Service attack against Cache Manager error responses. (bsc#1219131)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-13"/>
	<updated date="2024-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217654">SUSE bug 1217654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219131">SUSE bug 1219131</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50269/">CVE-2023-50269 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50269">CVE-2023-50269 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23638/">CVE-2024-23638 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23638">CVE-2024-23638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846388" comment="squid-5.7-150400.3.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5168" version="1" class="patch">
	<metadata>
		<title>Security update for runc (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218894" ref_url="https://bugzilla.suse.com/1218894" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-21626" ref_url="https://www.suse.com/security/cve/CVE-2024-21626/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017910.html" source="SUSE-SU"/>
		<description>
This update for runc fixes the following issues:

- Update to runc v1.1.12 (bsc#1218894)                                                         
                                                                                               
The following CVE was already fixed with the previous release.                                 
                                                                                               
- CVE-2024-21626: Fixed container breakout.                                                                                                                                                    
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-13"/>
	<updated date="2024-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218894">SUSE bug 1218894</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21626/">CVE-2024-21626 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21626">CVE-2024-21626 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846389" comment="runc-1.1.12-150000.61.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5169" version="1" class="patch">
	<metadata>
		<title>Security update for rekor (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218207" ref_url="https://bugzilla.suse.com/1218207" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017909.html" source="SUSE-SU"/>
		<description>
This update for rekor fixes the following issues:

update to 1.3.5 (jsc#SLE-23476):

  - Additional unique index correction
  - Remove timestamp from checkpoint
  - Drop conditional when verifying entry checkpoint
  - Fix panic for DSSE canonicalization
  - Change Redis value for locking mechanism
  - give log timestamps nanosecond precision
  - output trace in slog and override correlation header name

- bumped embedded golang.org/x/crypto/ssh to fix the Terrapin attack CVE-2023-48795 (bsc#1218207)

Updated to 1.3.4:

  * add mysql indexstorage backend
  * add s3 storage for attestations
  * fix: Do not check for pubsub.topics.get on initialization
  * fix optional field in cose schema
  * Update ranges.go
  * update indexstorage interface to reduce roundtrips
  * use a single validator library in rekor-cli
  * Remove go-playground/validator dependency from pkg/pki

Updated to rekor 1.3.3 (jsc#SLE-23476):

  - Update signer flag description
  - update trillian to 1.5.3
  - adds redis_auth
  - Add method to get artifact hash for an entry
  - make e2e tests more usable with docker-compose
  - install go at correct version for codeql

Updated to rekor 1.3.2 (jsc#SLE-23476):


Updated to rekor 1.3.1 (jsc#SLE-23476):

New Features:

  - enable GCP cloud profiling on rekor-server (#1746)
  - move index storage into interface (#1741)
  - add info to readme to denote additional documentation sources (#1722)
  - Add type of ed25519 key for TUF (#1677)
  - Allow parsing base64-encoded TUF metadata and root content (#1671)

  Quality Enhancements:

  - disable quota in trillian in test harness (#1680)

  Bug Fixes:

  - Update contact for code of conduct (#1720)
  - Fix panic when parsing SSH SK pubkeys (#1712)
  - Correct index creation (#1708)
  - docs: fixzes a small typo on the readme (#1686)
  - chore: fix backfill-redis Makefile target (#1685)

Updated to rekor 1.3.0 (jsc#SLE-23476):

  - Update openapi.yaml (#1655)
  - pass transient errors through retrieveLogEntry (#1653)
  - return full entryID on HTTP 409 responses (#1650)
  - feat: Support publishing new log entries to Pub/Sub topics (#1580)
  - Change values of Identity.Raw, add fingerprints (#1628)
  - Extract all subjects from SANs for x509 verifier (#1632)
  - Fix type comment for Identity struct (#1619)
  - Refactor Identities API (#1611)
  - Refactor Verifiers to return multiple keys (#1601)
  - Update checkpoint link (#1597)
  - Use correct log index in inclusion proof (#1599)
  - remove instrumentation library (#1595)

Updated to rekor 1.2.2 (jsc#SLE-23476):

  - pass down error with message instead of nil
  - swap killswitch for 'docker-compose restart'

- CVE-2023-48795: Fixed Terrapin attack in embedded golang.org/x/crypto/ssh (bsc#1218207).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-13"/>
	<updated date="2024-02-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218207">SUSE bug 1218207</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846390" comment="rekor-1.3.5-150400.4.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5170" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219576" ref_url="https://bugzilla.suse.com/1219576" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-25062" ref_url="https://www.suse.com/security/cve/CVE-2024-25062/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0461-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018611.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2024-25062: Fixed use-after-free in XMLReader (bsc#1219576).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-05-29"/>
	<updated date="2024-05-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219576">SUSE bug 1219576</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25062/">CVE-2024-25062 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25062">CVE-2024-25062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846391" comment="python3-libxml2-python-2.9.7-150000.3.66.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5171" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1108281" ref_url="https://bugzilla.suse.com/1108281" source="BUGZILLA"/>
		<reference ref_id="1141539" ref_url="https://bugzilla.suse.com/1141539" source="BUGZILLA"/>
		<reference ref_id="1174649" ref_url="https://bugzilla.suse.com/1174649" source="BUGZILLA"/>
		<reference ref_id="1181674" ref_url="https://bugzilla.suse.com/1181674" source="BUGZILLA"/>
		<reference ref_id="1193285" ref_url="https://bugzilla.suse.com/1193285" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1209834" ref_url="https://bugzilla.suse.com/1209834" source="BUGZILLA"/>
		<reference ref_id="1210443" ref_url="https://bugzilla.suse.com/1210443" source="BUGZILLA"/>
		<reference ref_id="1211515" ref_url="https://bugzilla.suse.com/1211515" source="BUGZILLA"/>
		<reference ref_id="1212091" ref_url="https://bugzilla.suse.com/1212091" source="BUGZILLA"/>
		<reference ref_id="1214377" ref_url="https://bugzilla.suse.com/1214377" source="BUGZILLA"/>
		<reference ref_id="1215275" ref_url="https://bugzilla.suse.com/1215275" source="BUGZILLA"/>
		<reference ref_id="1215885" ref_url="https://bugzilla.suse.com/1215885" source="BUGZILLA"/>
		<reference ref_id="1216441" ref_url="https://bugzilla.suse.com/1216441" source="BUGZILLA"/>
		<reference ref_id="1216559" ref_url="https://bugzilla.suse.com/1216559" source="BUGZILLA"/>
		<reference ref_id="1216702" ref_url="https://bugzilla.suse.com/1216702" source="BUGZILLA"/>
		<reference ref_id="1217895" ref_url="https://bugzilla.suse.com/1217895" source="BUGZILLA"/>
		<reference ref_id="1217987" ref_url="https://bugzilla.suse.com/1217987" source="BUGZILLA"/>
		<reference ref_id="1217988" ref_url="https://bugzilla.suse.com/1217988" source="BUGZILLA"/>
		<reference ref_id="1217989" ref_url="https://bugzilla.suse.com/1217989" source="BUGZILLA"/>
		<reference ref_id="1218005" ref_url="https://bugzilla.suse.com/1218005" source="BUGZILLA"/>
		<reference ref_id="1218447" ref_url="https://bugzilla.suse.com/1218447" source="BUGZILLA"/>
		<reference ref_id="1218527" ref_url="https://bugzilla.suse.com/1218527" source="BUGZILLA"/>
		<reference ref_id="1218659" ref_url="https://bugzilla.suse.com/1218659" source="BUGZILLA"/>
		<reference ref_id="1218713" ref_url="https://bugzilla.suse.com/1218713" source="BUGZILLA"/>
		<reference ref_id="1218723" ref_url="https://bugzilla.suse.com/1218723" source="BUGZILLA"/>
		<reference ref_id="1218730" ref_url="https://bugzilla.suse.com/1218730" source="BUGZILLA"/>
		<reference ref_id="1218738" ref_url="https://bugzilla.suse.com/1218738" source="BUGZILLA"/>
		<reference ref_id="1218752" ref_url="https://bugzilla.suse.com/1218752" source="BUGZILLA"/>
		<reference ref_id="1218757" ref_url="https://bugzilla.suse.com/1218757" source="BUGZILLA"/>
		<reference ref_id="1218768" ref_url="https://bugzilla.suse.com/1218768" source="BUGZILLA"/>
		<reference ref_id="1218778" ref_url="https://bugzilla.suse.com/1218778" source="BUGZILLA"/>
		<reference ref_id="1218779" ref_url="https://bugzilla.suse.com/1218779" source="BUGZILLA"/>
		<reference ref_id="1218804" ref_url="https://bugzilla.suse.com/1218804" source="BUGZILLA"/>
		<reference ref_id="1218832" ref_url="https://bugzilla.suse.com/1218832" source="BUGZILLA"/>
		<reference ref_id="1218836" ref_url="https://bugzilla.suse.com/1218836" source="BUGZILLA"/>
		<reference ref_id="1218916" ref_url="https://bugzilla.suse.com/1218916" source="BUGZILLA"/>
		<reference ref_id="1218948" ref_url="https://bugzilla.suse.com/1218948" source="BUGZILLA"/>
		<reference ref_id="1218958" ref_url="https://bugzilla.suse.com/1218958" source="BUGZILLA"/>
		<reference ref_id="1218968" ref_url="https://bugzilla.suse.com/1218968" source="BUGZILLA"/>
		<reference ref_id="1218997" ref_url="https://bugzilla.suse.com/1218997" source="BUGZILLA"/>
		<reference ref_id="1219006" ref_url="https://bugzilla.suse.com/1219006" source="BUGZILLA"/>
		<reference ref_id="1219012" ref_url="https://bugzilla.suse.com/1219012" source="BUGZILLA"/>
		<reference ref_id="1219013" ref_url="https://bugzilla.suse.com/1219013" source="BUGZILLA"/>
		<reference ref_id="1219014" ref_url="https://bugzilla.suse.com/1219014" source="BUGZILLA"/>
		<reference ref_id="1219053" ref_url="https://bugzilla.suse.com/1219053" source="BUGZILLA"/>
		<reference ref_id="1219067" ref_url="https://bugzilla.suse.com/1219067" source="BUGZILLA"/>
		<reference ref_id="1219120" ref_url="https://bugzilla.suse.com/1219120" source="BUGZILLA"/>
		<reference ref_id="1219128" ref_url="https://bugzilla.suse.com/1219128" source="BUGZILLA"/>
		<reference ref_id="1219136" ref_url="https://bugzilla.suse.com/1219136" source="BUGZILLA"/>
		<reference ref_id="1219285" ref_url="https://bugzilla.suse.com/1219285" source="BUGZILLA"/>
		<reference ref_id="1219349" ref_url="https://bugzilla.suse.com/1219349" source="BUGZILLA"/>
		<reference ref_id="1219412" ref_url="https://bugzilla.suse.com/1219412" source="BUGZILLA"/>
		<reference ref_id="1219429" ref_url="https://bugzilla.suse.com/1219429" source="BUGZILLA"/>
		<reference ref_id="1219434" ref_url="https://bugzilla.suse.com/1219434" source="BUGZILLA"/>
		<reference ref_id="1219490" ref_url="https://bugzilla.suse.com/1219490" source="BUGZILLA"/>
		<reference ref_id="1219512" ref_url="https://bugzilla.suse.com/1219512" source="BUGZILLA"/>
		<reference ref_id="1219568" ref_url="https://bugzilla.suse.com/1219568" source="BUGZILLA"/>
		<reference ref_id="1219582" ref_url="https://bugzilla.suse.com/1219582" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33631" ref_url="https://www.suse.com/security/cve/CVE-2021-33631/" source="CVE"/>
		<reference ref_id="CVE-2023-46838" ref_url="https://www.suse.com/security/cve/CVE-2023-46838/" source="CVE"/>
		<reference ref_id="CVE-2023-47233" ref_url="https://www.suse.com/security/cve/CVE-2023-47233/" source="CVE"/>
		<reference ref_id="CVE-2023-4921" ref_url="https://www.suse.com/security/cve/CVE-2023-4921/" source="CVE"/>
		<reference ref_id="CVE-2023-51042" ref_url="https://www.suse.com/security/cve/CVE-2023-51042/" source="CVE"/>
		<reference ref_id="CVE-2023-51043" ref_url="https://www.suse.com/security/cve/CVE-2023-51043/" source="CVE"/>
		<reference ref_id="CVE-2023-51780" ref_url="https://www.suse.com/security/cve/CVE-2023-51780/" source="CVE"/>
		<reference ref_id="CVE-2023-51782" ref_url="https://www.suse.com/security/cve/CVE-2023-51782/" source="CVE"/>
		<reference ref_id="CVE-2023-6040" ref_url="https://www.suse.com/security/cve/CVE-2023-6040/" source="CVE"/>
		<reference ref_id="CVE-2023-6356" ref_url="https://www.suse.com/security/cve/CVE-2023-6356/" source="CVE"/>
		<reference ref_id="CVE-2023-6531" ref_url="https://www.suse.com/security/cve/CVE-2023-6531/" source="CVE"/>
		<reference ref_id="CVE-2023-6535" ref_url="https://www.suse.com/security/cve/CVE-2023-6535/" source="CVE"/>
		<reference ref_id="CVE-2023-6536" ref_url="https://www.suse.com/security/cve/CVE-2023-6536/" source="CVE"/>
		<reference ref_id="CVE-2023-6915" ref_url="https://www.suse.com/security/cve/CVE-2023-6915/" source="CVE"/>
		<reference ref_id="CVE-2024-0565" ref_url="https://www.suse.com/security/cve/CVE-2024-0565/" source="CVE"/>
		<reference ref_id="CVE-2024-0641" ref_url="https://www.suse.com/security/cve/CVE-2024-0641/" source="CVE"/>
		<reference ref_id="CVE-2024-0775" ref_url="https://www.suse.com/security/cve/CVE-2024-0775/" source="CVE"/>
		<reference ref_id="CVE-2024-1085" ref_url="https://www.suse.com/security/cve/CVE-2024-1085/" source="CVE"/>
		<reference ref_id="CVE-2024-1086" ref_url="https://www.suse.com/security/cve/CVE-2024-1086/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the nft_setelem_catchall_deactivate() function (bsc#1219429).
- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).
- CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128).
- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).
- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).
- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).
- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).
- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).
- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).
- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).
- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275).
- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).
- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).
- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).
- CVE-2024-0641: Fixed a denial of service vulnerability in tipc_crypto_key_revoke in net/tipc/crypto.c (bsc#1218916).
- CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832).
- CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804).
- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).
- CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447).

The following non-security bugs were fixed:

- Store the old kernel changelog entries in kernel-docs package (bsc#1218713).
- ACPI: LPIT: Avoid u32 multiplication overflow (git-fixes).
- ACPI: LPSS: Fix the fractional clock divider flags (git-fixes).
- ACPI: arm64: export acpi_arch_thermal_cpufreq_pctg() (bsc#1214377)
- ACPI: extlog: Clear Extended Error Log status when RAS_CEC handled the error (git-fixes).
- ACPI: processor: reduce CPUFREQ thermal reduction pctg for Tegra241 (bsc#1214377)
- ACPI: property: Allow _DSD buffer data only for byte accessors (git-fixes).
- ACPI: resource: Add another DMI match for the TongFang GMxXGxx (git-fixes).
- ACPI: thermal: Add Thermal fast Sampling Period (_TFP) support (bsc#1214377)
- ACPI: video: check for error while searching for backlight device parent (git-fixes).
- ALSA: hda/conexant: Fix headset auto detect fail in cx8070 and SN6140 (git-fixes).
- ALSA: hda/cs8409: Suppress vmaster control for Dolphin models (git-fixes).
- ALSA: hda/realtek: Add quirks for ASUS Zenbook 2022 Models (git-fixes).
- ALSA: hda/realtek: Enable headset mic on Lenovo M70 Gen5 (git-fixes).
- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on HP ZBook (git-fixes).
- ALSA: hda/realtek: Fix mute and mic-mute LEDs for HP Envy X360 13-ay0xxx (git-fixes).
- ALSA: hda/relatek: Enable Mute LED on HP Laptop 15s-fq2xxx (git-fixes).
- ALSA: hda: Refer to correct stream index at loops (git-fixes).
- ALSA: hda: intel-nhlt: Ignore vbps when looking for DMIC 32 bps format (git-fixes).
- ALSA: oxygen: Fix right channel of capture volume mixer (git-fixes).
- ASoC: Intel: Skylake: Fix mem leak in few functions (git-fixes).
- ASoC: Intel: Skylake: mem leak in skl register function (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Medion Lifetab S10346 (git-fixes).
- ASoC: Intel: glk_rt5682_max98357a: fix board id mismatch (git-fixes).
- ASoC: amd: Add Dell G15 5525 to quirks list (bsc#1219136).
- ASoC: amd: Add check for acp config flags (bsc#1219136).
- ASoC: amd: Add new dmi entries to config entry (bsc#1219136).
- ASoC: amd: Drop da7219_aad_jack_det() usage (bsc#1219136).
- ASoC: amd: Drop empty platform remove function (bsc#1219136).
- ASoC: amd: Update Pink Sardine platform ACP register header (bsc#1219136).
- ASoC: amd: acp-config: Add missing MODULE_DESCRIPTION (git-fixes).
- ASoC: amd: acp-da7219-max98357a: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp-rt5645: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp3x-rt5682-max9836: Configure jack as not detecting Line Out (bsc#1219136).
- ASoC: amd: acp3x-rt5682-max9836: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp: Add TDM slots setting support for ACP I2S controller (bsc#1219136).
- ASoC: amd: acp: Add TDM support for acp i2s stream (bsc#1219136).
- ASoC: amd: acp: Add i2s tdm support in machine driver (bsc#1219136).
- ASoC: amd: acp: Add kcontrols and widgets per-codec in common code (bsc#1219136).
- ASoC: amd: acp: Add missing MODULE_DESCRIPTION in mach-common (git-fixes).
- ASoC: amd: acp: Add new cpu dai's in machine driver (bsc#1219136).
- ASoC: amd: acp: Add setbias level for rt5682s codec in machine driver (bsc#1219136).
- ASoC: amd: acp: Enable i2s tdm support for skyrim platforms (bsc#1219136).
- ASoC: amd: acp: Fix possible UAF in acp_dma_open (bsc#1219136).
- ASoC: amd: acp: Initialize list to store acp_stream during pcm_open (bsc#1219136).
- ASoC: amd: acp: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp: Modify dai_id macros to be more generic (bsc#1219136).
- ASoC: amd: acp: Refactor bit width calculation (bsc#1219136).
- ASoC: amd: acp: Refactor dai format implementation (bsc#1219136).
- ASoC: amd: acp: Refactor i2s clocks programming sequence (bsc#1219136).
- ASoC: amd: acp: add a label to make error path more clean (bsc#1219136).
- ASoC: amd: acp: add acp i2s master clock generation for rembrandt platform (bsc#1219136).
- ASoC: amd: acp: add pm ops support for acp pci driver (bsc#1219136).
- ASoC: amd: acp: add pm ops support for rembrandt platform (bsc#1219136).
- ASoC: amd: acp: clean up some inconsistent indentings (bsc#1219136).
- ASoC: amd: acp: clear pdm dma interrupt mask (bsc#1219136).
- ASoC: amd: acp: delete unnecessary NULL check (bsc#1219136).
- ASoC: amd: acp: export config_acp_dma() and config_pte_for_stream() symbols (bsc#1219136).
- ASoC: amd: acp: fix SND_SOC_AMD_ACP_PCI depdenencies (bsc#1219136).
- ASoC: amd: acp: move pdm macros to common header file (bsc#1219136).
- ASoC: amd: acp: refactor the acp init and de-init sequence (bsc#1219136).
- ASoC: amd: acp: rembrandt: Drop if blocks with always false condition (bsc#1219136).
- ASoC: amd: acp: remove acp poweroff function (bsc#1219136).
- ASoC: amd: acp: remove the redundant acp enable/disable interrupts functions (bsc#1219136).
- ASoC: amd: acp: remove unnecessary NULL checks (bsc#1219136).
- ASoC: amd: acp: store platform device reference created in pci probe call (bsc#1219136).
- ASoC: amd: acp: store the pdm stream channel mask (bsc#1219136).
- ASoC: amd: acp: store xfer_resolution of the stream (bsc#1219136).
- ASoC: amd: acp: switch to use dev_err_probe() (bsc#1219136).
- ASoC: amd: acp: use devm_kcalloc() instead of devm_kzalloc() (bsc#1219136).
- ASoC: amd: acp: use function devm_kcalloc() instead of devm_kzalloc() (bsc#1219136).
- ASoC: amd: add Pink Sardine ACP PCI driver (bsc#1219136).
- ASoC: amd: add Pink Sardine machine driver using dmic (bsc#1219136).
- ASoC: amd: add Pink Sardine platform ACP IP register header (bsc#1219136).
- ASoC: amd: add acp6.2 init/de-init functions (bsc#1219136).
- ASoC: amd: add acp6.2 irq handler (bsc#1219136).
- ASoC: amd: add acp6.2 pci driver pm ops (bsc#1219136).
- ASoC: amd: add acp6.2 pdm driver dma ops (bsc#1219136).
- ASoC: amd: add acp6.2 pdm driver pm ops (bsc#1219136).
- ASoC: amd: add acp6.2 pdm platform driver (bsc#1219136).
- ASoC: amd: add platform devices for acp6.2 pdm driver and dmic driver (bsc#1219136).
- ASoC: amd: create platform device for acp6.2 machine driver (bsc#1219136).
- ASoC: amd: enable Pink Sardine acp6.2 drivers build (bsc#1219136).
- ASoC: amd: enable Pink sardine platform machine driver build (bsc#1219136).
- ASoC: amd: fix ACP version typo mistake (bsc#1219136).
- ASoC: amd: fix spelling mistake: 'i.e' -&gt; 'i.e.' (bsc#1219136).
- ASoC: amd: ps: Add a module parameter to influence pdm_gain (bsc#1219136).
- ASoC: amd: ps: Adjust the gain for PDM DMIC (bsc#1219136).
- ASoC: amd: ps: Fix uninitialized ret in create_acp64_platform_devs() (bsc#1219136).
- ASoC: amd: ps: Move acp63_dev_data strcture from PCI driver (bsc#1219136).
- ASoC: amd: ps: Update copyright notice (bsc#1219136).
- ASoC: amd: ps: add mutex lock for accessing common registers (bsc#1219136).
- ASoC: amd: ps: fix for acp_lock access in pdm driver (bsc#1219136).
- ASoC: amd: ps: implement api to retrieve acp device config (bsc#1219136).
- ASoC: amd: ps: move irq handler registration (bsc#1219136).
- ASoC: amd: ps: refactor acp power on and reset functions (bsc#1219136).
- ASoC: amd: ps: refactor platform device creation logic (bsc#1219136).
- ASoC: amd: ps: remove the register read and write wrappers (bsc#1219136).
- ASoC: amd: ps: remove unused variable (bsc#1219136).
- ASoC: amd: ps: update dev index value in irq handler (bsc#1219136).
- ASoC: amd: ps: update macros with ps platform naming convention (bsc#1219136).
- ASoC: amd: ps: update the acp clock source (bsc#1219136).
- ASoC: amd: ps: use acp_lock to protect common registers in pdm driver (bsc#1219136).
- ASoC: amd: ps: use static function (bsc#1219136).
- ASoC: amd: renoir: Add a module parameter to influence pdm_gain (bsc#1219136).
- ASoC: amd: renoir: Adjust the gain for PDM DMIC (bsc#1219136).
- ASoC: amd: update pm_runtime enable sequence (bsc#1219136).
- ASoC: amd: vangogh: Add check for acp config flags in vangogh platform (bsc#1219136).
- ASoC: amd: vangogh: Make use of DRV_NAME (bsc#1219136).
- ASoC: amd: vangogh: Remove unnecessary init function (bsc#1219136).
- ASoC: amd: vangogh: select CONFIG_SND_AMD_ACP_CONFIG (bsc#1219136).
- ASoC: amd: yc: Add ASUS M3402RA into DMI table (bsc#1219136).
- ASoC: amd: yc: Add ASUS M5402RA into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Alienware m17 R5 AMD into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Asus VivoBook Pro 14 OLED M6400RC to the quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A42) (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A43) (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support Victus by HP Gaming Laptop 15-fb0xxx (8A3E) (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support Victus by HP Laptop 16-e1xxx (8A22) (bsc#1219136).
- ASoC: amd: yc: Add DMI entry to support System76 Pangolin 12 (bsc#1219136).
- ASoC: amd: yc: Add DMI entry to support System76 Pangolin 13 (bsc#1219136).
- ASoC: amd: yc: Add DMI support for new acer/emdoor platforms (bsc#1219136).
- ASoC: amd: yc: Add HP 255 G10 into quirk table (bsc#1219136).
- ASoC: amd: yc: Add Lenovo Thinkbook 14+ 2022 21D0 to quirks table (bsc#1219136).
- ASoC: amd: yc: Add MECHREVO Jiaolong Series MRID6 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Razer Blade 14 2022 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add ThinkBook 14 G5+ ARP to quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add Thinkpad Neo14 to quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add VivoBook Pro 15 to quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add Xiaomi Redmi Book Pro 14 2022 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Xiaomi Redmi Book Pro 15 2022 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add a module parameter to influence pdm_gain (bsc#1219136).
- ASoC: amd: yc: Adding Lenovo ThinkBook 14 Gen 4+ ARA and Lenovo ThinkBook 16 Gen 4+ ARA to the Quirks List (bsc#1219136).
- ASoC: amd: yc: Adjust the gain for PDM DMIC (bsc#1219136).
- ASoC: amd: yc: Fix a non-functional mic on Lenovo 82TL (bsc#1219136).
- ASoC: amd: yc: Fix non-functional mic on ASUS E1504FA (bsc#1219136).
- ASoC: amd: yp: Add OMEN by HP Gaming Laptop 16z-n000 to quirks (bsc#1219136).
- ASoC: codecs: lpass-wsa-macro: fix compander volume hack (git-fixes).
- ASoC: codecs: wcd938x: fix headphones volume controls (git-fixes).
- ASoC: codecs: wcd938x: handle deferred probe (git-fixes).
- ASoC: cs35l33: Fix GPIO name and drop legacy include (git-fixes).
- ASoC: cs43130: Fix incorrect frame delay configuration (git-fixes).
- ASoC: cs43130: Fix the position of const qualifier (git-fixes).
- ASoC: da7219: Support low DC impedance headset (git-fixes).
- ASoC: nau8822: Fix incorrect type in assignment and cast to restricted __be16 (git-fixes).
- ASoC: ops: add correct range check for limiting volume (git-fixes).
- ASoC: rt5645: Drop double EF20 entry from dmi_platform_data[] (git-fixes).
- ASoC: rt5650: add mutex to avoid the jack detection failure (git-fixes).
- ASoC: sun4i-spdif: Fix requirements for H6 (git-fixes).
- ASoC: wm8974: Correct boost mixer inputs (git-fixes).
- Add DMI ID for MSI Bravo 15 B7ED (bsc#1219136).
- Bluetooth: Fix atomicity violation in {min,max}_key_size_set (git-fixes).
- Bluetooth: btmtkuart: fix recv_buf() return value (git-fixes).
- Documentation: Begin a RAS section (jsc#PED-7622).
- EDAC/amd64: Add context struct (jsc#PED-7615).
- EDAC/amd64: Add get_err_info() to pvt-&gt;ops (jsc#PED-7615).
- EDAC/amd64: Add support for AMD heterogeneous Family 19h Model 30h-3Fh (jsc#PED-7616).
- EDAC/amd64: Add support for ECC on family 19h model 60h-7Fh (jsc#PED-7615).
- EDAC/amd64: Add support for family 0x19, models 0x90-9f devices (jsc#PED-7622).
- EDAC/amd64: Allow for DF Indirect Broadcast reads (jsc#PED-7615).
- EDAC/amd64: Cache and use GPU node map (jsc#PED-7616).
- EDAC/amd64: Do not discover ECC symbol size for Family 17h and later (jsc#PED-7615).
- EDAC/amd64: Do not set up EDAC PCI control on Family 17h+ (jsc#PED-7615).
- EDAC/amd64: Document heterogeneous system enumeration (jsc#PED-7616).
- EDAC/amd64: Drop dbam_to_cs() for Family 17h and later (jsc#PED-7615).
- EDAC/amd64: Fix indentation in umc_determine_edac_cap() (jsc#PED-7615).
- EDAC/amd64: Merge struct amd64_family_type into struct amd64_pvt (jsc#PED-7615).
- EDAC/amd64: Remove PCI Function 0 (jsc#PED-7615).
- EDAC/amd64: Remove PCI Function 6 (jsc#PED-7615).
- EDAC/amd64: Remove early_channel_count() (jsc#PED-7615).
- EDAC/amd64: Remove module version string (jsc#PED-7615).
- EDAC/amd64: Remove scrub rate control for Family 17h and later (jsc#PED-7615).
- EDAC/amd64: Rename debug_display_dimm_sizes() (jsc#PED-7615).
- EDAC/amd64: Rename f17h_determine_edac_ctl_cap() (jsc#PED-7615).
- EDAC/amd64: Rework hw_info_{get,put} (jsc#PED-7615).
- EDAC/amd64: Shut up an -Werror,-Wsometimes-uninitialized clang false positive (jsc#PED-7615).
- EDAC/amd64: Split determine_edac_cap() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split determine_memory_type() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split dump_misc_regs() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split ecc_enabled() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split get_csrow_nr_pages() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split init_csrows() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split prep_chip_selects() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split read_base_mask() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split read_mc_regs() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split setup_mci_misc_attrs() into dct/umc functions (jsc#PED-7615).
- EDAC/mc: Add new HBM2 memory type (jsc#PED-7616).
- EDAC/mc: Add support for HBM3 memory type (jsc#PED-7622).
- EDAC/mce_amd: Remove SMCA Extended Error code descriptions (jsc#PED-7622).
- EDAC/thunderx: Fix possible out-of-bounds string access (git-fixes).
- Fix crash in vmw_context_cotables_unref when 3d support is enabled (bsc#1218738)
- HID: i2c-hid-of: fix NULL-deref on failed power up (git-fixes).
- HID: wacom: Correct behavior when processing some confidence == false touches (git-fixes).
- IB/iser: Prevent invalidating wrong MR (git-fixes)
- Input: atkbd - do not skip atkbd_deactivate() when skipping ATKBD_CMD_GETID (git-fixes).
- Input: atkbd - skip ATKBD_CMD_GETID in translated mode (git-fixes).
- Input: atkbd - skip ATKBD_CMD_SETLEDS when skipping ATKBD_CMD_GETID (git-fixes).
- Input: atkbd - use ab83 as id when skipping the getid command (git-fixes).
- Input: bcm5974 - check endpoint type before starting traffic (git-fixes).
- Input: i8042 - add nomux quirk for Acer P459-G2-M (git-fixes).
- Input: xpad - add Razer Wolverine V2 support (git-fixes).
- KVM: SVM: Update EFER software model on CR0 trap for SEV-ES (git-fixes).
- KVM: s390: vsie: Fix STFLE interpretive execution identification (git-fixes bsc#1218997).
- KVM: x86: Mask LVTPC when handling a PMI (jsc#PED-7322).
- Limit kernel-source build to architectures for which the kernel binary is built (bsc#1108281).
- PCI/AER: Configure ECRC only if AER is native (bsc#1218778)
- PCI/P2PDMA: Remove reference to pci_p2pdma_map_sg() (git-fixes).
- PCI: Add ACS quirk for more Zhaoxin Root Ports (git-fixes).
- PCI: keystone: Fix race condition when initializing PHYs (git-fixes).
- PM: hibernate: Enforce ordering during image compression/decompression (git-fixes).
- RDMA/hns: Fix inappropriate err code for unsupported operations (git-fixes)
- RDMA/hns: Fix unnecessary err return when using invalid congest control algorithm (git-fixes)
- RDMA/hns: Remove unnecessary checks for NULL in mtr_alloc_bufs() (git-fixes)
- RDMA/irdma: Add wait for suspend on SQD (git-fixes)
- RDMA/irdma: Avoid free the non-cqp_request scratch (git-fixes)
- RDMA/irdma: Do not modify to SQD on error (git-fixes)
- RDMA/irdma: Fix UAF in irdma_sc_ccq_get_cqe_info() (git-fixes)
- RDMA/irdma: Refactor error handling in create CQP (git-fixes)
- RDMA/rtrs-clt: Fix the max_send_wr setting (git-fixes)
- RDMA/rtrs-clt: Remove the warnings for req in_use check (git-fixes)
- RDMA/rtrs-clt: Start hb after path_up (git-fixes)
- RDMA/rtrs-srv: Check return values while processing info request (git-fixes)
- RDMA/rtrs-srv: Destroy path files after making sure no IOs in-flight (git-fixes)
- RDMA/rtrs-srv: Do not unconditionally enable irq (git-fixes)
- RDMA/rtrs-srv: Free srv_mr iu only when always_invalidate is true (git-fixes)
- RDMA/usnic: Silence uninitialized symbol smatch warnings (git-fixes)
- USB: xhci: workaround for grace period (git-fixes).
- Update config files: enable ASoC AMD PS drivers (bsc#1219136)
- Update patch reference for ax88179 fix (bsc#1218948)
- acpi: property: Let args be NULL in __acpi_node_get_property_reference (git-fixes).
- aio: fix mremap after fork null-deref (git-fixes).
- apparmor: avoid crash when parsed profile name is empty (git-fixes).
- arm64: Add CNT{P,V}CTSS_EL0 alternatives to cnt{p,v}ct_el0 (jsc#PED-4729)
- arm64: Add a capability for FEAT_ECV (jsc#PED-4729) Use cpu_hwcaps PLACEHOLDER_4 for HAS_ECV.
- arm64: alternative: patch alternatives in the vDSO (jsc#PED-4729)
- arm64: dts: armada-3720-turris-mox: set irq type for RTC (git-fixes)
- arm64: dts: imx8mp: imx8mq: Add parkmode-disable-ss-quirk on DWC3 (git-fixes)
- arm64: dts: imx8mq: drop usb3-resume-missing-cas from usb (git-fixes)
- arm64: dts: ls208xa: use a pseudo-bus to constrain usb dma size (git-fixes)
- arm64: dts: rockchip: Expand reg size of vdec node for RK3399 (git-fixes)
- arm64: mm: Always make sw-dirty PTEs hw-dirty in pte_modify (git-fixes)
- arm64: module: move find_section to header (jsc#PED-4729)
- arm64: vdso: Fix 'no previous prototype' warning (jsc#PED-4729)
- arm64: vdso: remove two .altinstructions related symbols (jsc#PED-4729)
- arm64: vdso: use SYS_CNTVCTSS_EL0 for gettimeofday (jsc#PED-4729)
- asix: Add check for usbnet_get_endpoints (git-fixes).
- attr: block mode changes of symlinks (git-fixes).
- badblocks: add helper routines for badblock ranges handling (bsc#1174649).
- badblocks: add more helper structure and routines in badblocks.h (bsc#1174649).
- badblocks: avoid checking invalid range in badblocks_check() (bsc#1174649).
- badblocks: improve badblocks_check() for multiple ranges handling (bsc#1174649).
- badblocks: improve badblocks_clear() for multiple ranges handling (bsc#1174649).
- badblocks: improve badblocks_set() for multiple ranges handling (bsc#1174649).
- badblocks: switch to the improved badblock handling code (bsc#1174649).
- bpf: Limit the number of kprobes when attaching program to multiple kprobes (git-fixes).
- bus: mhi: host: Add alignment check for event ring read pointer (git-fixes).
- bus: mhi: host: Add spinlock to protect WP access when queueing TREs (git-fixes).
- bus: mhi: host: Drop chan lock before queuing buffers (git-fixes).
- ceph: select FS_ENCRYPTION_ALGS if FS_ENCRYPTION (bsc#1219568).
- clk: qcom: gpucc-sm8150: Update the gpu_cc_pll1 config (git-fixes).
- clk: qcom: videocc-sm8150: Add missing PLL config property (git-fixes).
- clk: rockchip: rk3128: Fix HCLK_OTG gate register (git-fixes).
- clk: samsung: Fix kernel-doc comments (git-fixes).
- clk: si5341: fix an error code problem in si5341_output_clk_set_rate (git-fixes).
- clk: zynqmp: Add a check for NULL pointer (git-fixes).
- clk: zynqmp: make bestdiv unsigned (git-fixes).
- clocksource: Skip watchdog check for large watchdog intervals (git-fixes).
- clocksource: disable watchdog checks on TSC when TSC is watchdog (bsc#1215885).
- coresight: etm4x: Add ACPI support in platform driver (bsc#1218779)
- coresight: etm4x: Allocate and device assign 'struct etmv4_drvdata' (bsc#1218779)
- coresight: etm4x: Change etm4_platform_driver driver for MMIO devices (bsc#1218779)
- coresight: etm4x: Drop iomem 'base' argument from etm4_probe() (bsc#1218779)
- coresight: etm4x: Drop pid argument from etm4_probe() (bsc#1218779)
- coresight: etm4x: Ensure valid drvdata and clock before clk_put() (bsc#1218779)
- coresight: platform: acpi: Ignore the absence of graph (bsc#1218779)
- crypto: ccp - fix memleak in ccp_init_dm_workarea (git-fixes).
- crypto: s390/aes - Fix buffer overread in CTR mode (git-fixes).
- crypto: sa2ul - Return crypto_aead_setkey to transfer the error (git-fixes).
- crypto: sahara - do not resize req-&gt;src when doing hash operations (git-fixes).
- crypto: sahara - fix ahash reqsize (git-fixes).
- crypto: sahara - fix ahash selftest failure (git-fixes).
- crypto: sahara - fix cbc selftest failure (git-fixes).
- crypto: sahara - fix processing hash requests with req-&gt;nbytes &amp;lt; sg-&gt;length (git-fixes).
- crypto: sahara - fix processing requests with cryptlen &amp;lt; sg-&gt;length (git-fixes).
- crypto: sahara - fix wait_for_completion_timeout() error handling (git-fixes).
- crypto: sahara - handle zero-length aes requests (git-fixes).
- crypto: sahara - improve error handling in sahara_sha_process() (git-fixes).
- crypto: sahara - remove FLAGS_NEW_KEY logic (git-fixes).
- crypto: scomp - fix req-&gt;dst buffer overflow (git-fixes).
- dma-debug: fix kernel-doc warnings (git-fixes).
- dmaengine: fix NULL pointer in channel unregistration function (git-fixes).
- dmaengine: fix is_slave_direction() return false when DMA_DEV_TO_DEV (git-fixes).
- dmaengine: fsl-dpaa2-qdma: Fix the size of dma pools (git-fixes).
- dmaengine: idxd: Protect int_handle field in hw descriptor (git-fixes).
- dmaengine: ti: k3-udma: Report short packet errors (git-fixes).
- doc/README.KSYMS: Add to repo.
- drivers/amd/pm: fix a use-after-free in kv_parse_power_table (git-fixes).
- drivers: clk: zynqmp: calculate closest mux rate (git-fixes).
- drivers: clk: zynqmp: update divider round rate logic (git-fixes).
- drm/amd/display: Fix tiled display misalignment (git-fixes).
- drm/amd/display: Port DENTIST hang and TDR fixes to OTG disable W/A (git-fixes).
- drm/amd/display: add nv12 bounding box (git-fixes).
- drm/amd/display: get dprefclk ss info from integration info table (git-fixes).
- drm/amd/display: make flip_timestamp_in_us a 64-bit variable (git-fixes).
- drm/amd/display: pbn_div need be updated for hotplug event (git-fixes).
- drm/amd/display: update dcn315 lpddr pstate latency (git-fixes).
- drm/amd/pm/smu7: fix a memleak in smu7_hwmgr_backend_init (git-fixes).
- drm/amd/pm: fix a double-free in amdgpu_parse_extended_power_table (git-fixes).
- drm/amd/pm: fix a double-free in si_dpm_init (git-fixes).
- drm/amd/powerplay: Fix kzalloc parameter 'ATOM_Tonga_PPM_Table' in 'get_platform_power_management_table()' (git-fixes).
- drm/amdgpu/debugfs: fix error code when smc register accessors are NULL (git-fixes).
- drm/amdgpu/pm: Fix the power source flag error (git-fixes).
- drm/amdgpu: Add NULL checks for function pointers (git-fixes).
- drm/amdgpu: Drop 'fence' check in 'to_amdgpu_amdkfd_fence()' (git-fixes).
- drm/amdgpu: Fix '*fw' from request_firmware() not released in 'amdgpu_ucode_request()' (git-fixes).
- drm/amdgpu: Fix cat debugfs amdgpu_regs_didt causes kernel null pointer (git-fixes).
- drm/amdgpu: Fix ecc irq enable/disable unpaired (git-fixes).
- drm/amdgpu: Fix missing error code in 'gmc_v6/7/8/9_0_hw_init()' (git-fixes).
- drm/amdgpu: Fix with right return code '-EIO' in 'amdgpu_gmc_vram_checking()' (git-fixes).
- drm/amdgpu: Let KFD sync with VM fences (git-fixes).
- drm/amdgpu: Release 'adev-&gt;pm.fw' before return in 'amdgpu_device_need_post()' (git-fixes).
- drm/amdgpu: fix ftrace event amdgpu_bo_move always move on same heap (git-fixes).
- drm/amdgpu: skip gpu_info fw loading on navi12 (git-fixes).
- drm/amdkfd: Confirm list is non-empty before utilizing list_first_entry in kfd_topology.c (git-fixes).
- drm/amdkfd: Fix 'node' NULL check in 'svm_range_get_range_boundaries()' (git-fixes).
- drm/amdkfd: Fix iterator used outside loop in 'kfd_add_peer_prop()' (git-fixes).
- drm/amdkfd: Fix lock dependency warning (git-fixes).
- drm/amdkfd: Fix lock dependency warning with srcu (git-fixes).
- drm/amdkfd: Use resource_size() helper function (git-fixes).
- drm/amdkfd: fixes for HMM mem allocation (git-fixes).
- drm/bridge: Fix typo in post_disable() description (git-fixes).
- drm/bridge: anx7625: Ensure bridge is suspended in disable() (git-fixes).
- drm/bridge: cdns-mhdp8546: Fix use of uninitialized variable (git-fixes).
- drm/bridge: nxp-ptn3460: fix i2c_master_send() error checking (git-fixes).
- drm/bridge: nxp-ptn3460: simplify some error checking (git-fixes).
- drm/bridge: parade-ps8640: Ensure bridge is suspended in .post_disable() (git-fixes).
- drm/bridge: parade-ps8640: Make sure we drop the AUX mutex in the error case (git-fixes).
- drm/bridge: parade-ps8640: Wait for HPD when doing an AUX transfer (git-fixes).
- drm/bridge: tc358767: Fix return value on error case (git-fixes).
- drm/bridge: tpd12s015: Drop buggy __exit annotation for remove function (git-fixes).
- drm/crtc: Fix uninit-value bug in drm_mode_setcrtc (git-fixes).
- drm/crtc: fix uninitialized variable use (git-fixes).
- drm/drv: propagate errors from drm_modeset_register_all() (git-fixes).
- drm/exynos: Call drm_atomic_helper_shutdown() at shutdown/unbind time (git-fixes).
- drm/exynos: fix a potential error pointer dereference (git-fixes).
- drm/exynos: fix a wrong error checking (git-fixes).
- drm/exynos: fix accidental on-stack copy of exynos_drm_plane (git-fixes).
- drm/exynos: gsc: minor fix for loop iteration in gsc_runtime_resume (git-fixes).
- drm/framebuffer: Fix use of uninitialized variable (git-fixes).
- drm/mediatek: Return error if MDP RDMA failed to enable the clock (git-fixes).
- drm/msm/dpu: Drop enable and frame_count parameters from dpu_hw_setup_misr() (git-fixes).
- drm/msm/dpu: Ratelimit framedone timeout msgs (git-fixes).
- drm/msm/dpu: Set input_sel bit for INTF (git-fixes).
- drm/msm/dpu: fix writeback programming for YUV cases (git-fixes).
- drm/msm/dpu: rename dpu_encoder_phys_wb_setup_cdp to match its functionality (git-fixes).
- drm/msm/dsi: Enable runtime PM (git-fixes).
- drm/msm/dsi: Use pm_runtime_resume_and_get to prevent refcnt leaks (git-fixes).
- drm/msm/mdp4: flush vblank event on disable (git-fixes).
- drm/nouveau/fence:: fix warning directly dereferencing a rcu pointer (git-fixes).
- drm/panel-edp: Add override_edid_mode quirk for generic edp (git-fixes).
- drm/panel-elida-kd35t133: hold panel in reset for unprepare (git-fixes).
- drm/panel: nt35510: fix typo (git-fixes).
- drm/panfrost: Ignore core_mask for poweroff and disable PWRTRANS irq (git-fixes).
- drm/panfrost: Really power off GPU cores in panfrost_gpu_power_off() (git-fixes).
- drm/radeon/dpm: fix a memleak in sumo_parse_power_table (git-fixes).
- drm/radeon/r100: Fix integer overflow issues in r100_cs_track_check() (git-fixes).
- drm/radeon/r600_cs: Fix possible int overflows in r600_cs_check_reg() (git-fixes).
- drm/radeon/trinity_dpm: fix a memleak in trinity_parse_power_table (git-fixes).
- drm/radeon: check return value of radeon_ring_lock() (git-fixes).
- drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() (git-fixes).
- drm/tidss: Check for K2G in in dispc_softreset() (git-fixes).
- drm/tidss: Fix atomic_flush check (git-fixes).
- drm/tidss: Fix dss reset (git-fixes).
- drm/tidss: Move reset to the end of dispc_init() (git-fixes).
- drm/tidss: Return error value from from softreset (git-fixes).
- drm/tilcdc: Fix irq free on unload (git-fixes).
- drm: Do not unref the same fb many times by mistake due to deadlock handling (git-fixes).
- drm: panel-simple: add missing bus flags for Tianma tm070jvhg[30/33] (git-fixes).
- drm: using mul_u32_u32() requires linux/math64.h (git-fixes).
- dt-bindings: gpio: Remove FSI domain ports on Tegra234 (jsc#PED-6694)
- efi/libstub: Disable PCI DMA before grabbing the EFI memory map (git-fixes).
- eventfd: prevent underflow for eventfd semaphores (git-fixes).
- exfat: fix reporting fs error when reading dir beyond EOF (git-fixes).
- exfat: support handle zero-size directory (git-fixes).
- exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree (git-fixes).
- fbdev: Only disable sysfb on the primary device (bsc#1216441)
- fbdev: Only disable sysfb on the primary device (bsc#1216441) Update an existing patch to fix bsc#1216441.
- fbdev: flush deferred IO before closing (git-fixes).
- fbdev: flush deferred work in fb_deferred_io_fsync() (git-fixes).
- fbdev: imxfb: fix left margin setting (git-fixes).
- fbdev: mmp: Fix typo and wording in code comment (git-fixes).
- firewire: core: correct documentation of fw_csr_string() kernel API (git-fixes).
- firewire: ohci: suppress unexpected system reboot in AMD Ryzen machines and ASM108x/VT630x PCIe cards (git-fixes).
- firmware: ti_sci: Fix an off-by-one in ti_sci_debugfs_create() (git-fixes).
- fjes: fix memleaks in fjes_hw_setup (git-fixes).
- fs/mount_setattr: always cleanup mount_kattr (git-fixes).
- fs: Fix error checking for d_hash_and_lookup() (git-fixes).
- fs: Move notify_change permission checks into may_setattr (git-fixes).
- fs: do not audit the capability check in simple_xattr_list() (git-fixes).
- fs: drop peer group ids under namespace lock (git-fixes).
- fs: indicate request originates from old mount API (git-fixes).
- fs: sendfile handles O_NONBLOCK of out_fd (git-fixes).
- fuse: dax: set fc-&gt;dax to NULL in fuse_dax_conn_free() (bsc#1218659).
- gfs2: Always check inode size of inline inodes (git-fixes).
- gfs2: Cosmetic gfs2_dinode_{in,out} cleanup (git-fixes).
- gfs2: Disable page faults during lockless buffered reads (git-fixes).
- gfs2: Eliminate ip-&gt;i_gh (git-fixes).
- gfs2: Eliminate vestigial HIF_FIRST (git-fixes).
- gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump (git-fixes).
- gfs2: Introduce flag for glock holder auto-demotion (git-fixes).
- gfs2: Move the inode glock locking to gfs2_file_buffered_write (git-fixes).
- gfs2: Remove redundant check from gfs2_glock_dq (git-fixes).
- gfs2: Switch to wait_event in gfs2_logd (git-fixes).
- gfs2: assign rgrp glock before compute_bitstructs (git-fixes).
- gfs2: low-memory forced flush fixes (git-fixes).
- gfs2: release iopen glock early in evict (git-fixes).
- gpio: eic-sprd: Clear interrupt after set the interrupt type (git-fixes).
- gpu/drm/radeon: fix two memleaks in radeon_vm_init (git-fixes).
- hv_netvsc: rndis_filter needs to select NLS (git-fixes).
- hwmon: (corsair-psu) Fix probe when built-in (git-fixes).
- hwrng: core - Fix page fault dead lock on mmap-ed hwrng (git-fixes).
- i2c: rk3x: fix potential spinlock recursion on poll (git-fixes).
- i2c: s3c24xx: fix read transfers in polling mode (git-fixes).
- i2c: s3c24xx: fix transferring more than one message in polling mode (git-fixes).
- iio: adc: ad7091r: Pass iio_dev to event handler (git-fixes).
- iio: adc: ad9467: add mutex to struct ad9467_state (git-fixes).
- iio: adc: ad9467: do not ignore error codes (git-fixes).
- iio: adc: ad9467: fix reset gpio handling (git-fixes).
- ipmi: Use regspacings passed as a module parameter (git-fixes).
- kabi, vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).
- kabi/severities: ignore ASoC AMD acp driver symbols (bsc#1219136)
- kabi/severities: ignore _rtl92c_phy_calculate_bit_shift symbol It's an internal function that shouldn't have been exported
- kdb: Fix a potential buffer overflow in kdb_local() (git-fixes).
- kernel-doc: handle a void function without producing a warning (git-fixes).
- kernel-source: Fix description typo
- kernfs: fix missing kernfs_idr_lock to remove an ID from the IDR (git-fixes).
- leds: aw2013: Select missing dependency REGMAP_I2C (git-fixes).
- leds: ledtrig-tty: Free allocated ttyname buffer on deactivate (git-fixes).
- libapi: Add missing linux/types.h header to get the __u64 type on io.h (git-fixes).
- md: fix bi_status reporting in md_end_clone_io (bsc#1210443).
- media: cx231xx: fix a memleak in cx231xx_init_isoc (git-fixes).
- media: dt-bindings: ov8856: decouple lanes and link frequency from driver (git-fixes).
- media: dvb-frontends: m88ds3103: Fix a memory leak in an error handling path of m88ds3103_probe() (git-fixes).
- media: imx355: Enable runtime PM before registering async sub-device (git-fixes).
- media: ov9734: Enable runtime PM before registering async sub-device (git-fixes).
- media: pvrusb2: fix use after free on context disconnection (git-fixes).
- media: rkisp1: Disable runtime PM in probe error path (git-fixes).
- media: rkisp1: Fix media device memory leak (git-fixes).
- media: rkisp1: Read the ID register at probe time instead of streamon (git-fixes).
- media: videobuf2-dma-sg: fix vmap callback (git-fixes).
- mfd: intel-lpss: Fix the fractional clock divider flags (git-fixes).
- misc: fastrpc: Mark all sessions as invalid in cb_remove (git-fixes).
- mkspec: Include constraints for both multibuild and plain package always There is no need to check for multibuild flag, the constraints can be always generated for both cases.
- mkspec: Use variant in constraints template Constraints are not applied consistently with kernel package variants. Add variant to the constraints template as appropriate, and expand it in mkspec.
- mm: fs: initialize fsdata passed to write_begin/write_end interface (git-fixes).
- mmc: core: Cancel delayed work before releasing host (git-fixes).
- modpost: move __attribute__((format(printf, 2, 3))) to modpost.h (git-fixes).
- mtd: Fix gluebi NULL pointer dereference caused by ftl notifier (git-fixes).
- mtd: rawnand: Increment IFC_TIMEOUT_MSECS for nand controller response (git-fixes).
- mtd: rawnand: pl353: Fix kernel doc (git-fixes).
- mtd: rawnand: rockchip: Add missing title to a kernel doc comment (git-fixes).
- mtd: rawnand: rockchip: Rename a structure (git-fixes).
- net: phy: micrel: populate .soft_reset for KSZ9131 (git-fixes).
- net: usb: ax88179_178a: Bind only to vendor-specific interface (bsc#1218948).
- net: usb: ax88179_178a: avoid two consecutive device resets (bsc#1218948).
- net: usb: ax88179_178a: move priv to driver_priv (git-fixes).
- net: usb: ax88179_178a: remove redundant init code (git-fixes).
- net: usb: ax88179_178a: restore state on resume (bsc#1218948).
- nfc: nci: free rx_data_reassembly skb on NCI device cleanup (git-fixes).
- nfsd4: add refcount for nfsd4_blocked_lock (bsc#1218968 bsc#1219349).
- nfsd: fix RELEASE_LOCKOWNER (bsc#1218968).
- nouveau/tu102: flush all pdbs on vmm flush (git-fixes).
- nouveau/vmm: do not set addr on the fail path to avoid warning (git-fixes).
- nsfs: add compat ioctl handler (git-fixes).
- nvme-loop: always quiesce and cancel commands before destroying admin q (bsc#1211515).
- nvme-pci: add BOGUS_NID for Intel 0a54 device (git-fixes).
- nvme-pci: fix sleeping function called from interrupt context (git-fixes).
- nvme-rdma: Fix transfer length when write_generate/read_verify are 0 (git-fixes).
- nvme-tcp: avoid open-coding nvme_tcp_teardown_admin_queue() (bsc#1211515).
- nvme: fix max_discard_sectors calculation (git-fixes).
- nvme: introduce helper function to get ctrl state (git-fixes).
- nvme: move nvme_stop_keep_alive() back to original position (bsc#1211515).
- nvme: start keep-alive after admin queue setup (bsc#1211515).
- nvme: trace: avoid memcpy overflow warning (git-fixes).
- nvmet: re-fix tracing strncpy() warning (git-fixes).
- of: Fix double free in of_parse_phandle_with_args_map (git-fixes).
- of: unittest: Fix of_count_phandle_with_args() expected value message (git-fixes).
- parport: parport_serial: Add Brainboxes BAR details (git-fixes).
- parport: parport_serial: Add Brainboxes device IDs and geometry (git-fixes).
- perf/x86/intel/uncore: Factor out topology_gidnid_map() (bsc#1218958).
- perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology() (bsc#1218958).
- perf/x86/uncore: Use u64 to replace unsigned for the uncore offsets array (bsc#1219512).
- phy: renesas: rcar-gen3-usb2: Fix returning wrong error code (git-fixes).
- phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP (git-fixes).
- pinctrl: intel: Revert 'Unexport intel_pinctrl_probe()' (git-fixes).
- platform/x86/amd/hsmp: Fix iomem handling (jsc#PED-7620).
- platform/x86/amd/hsmp: add support for metrics tbl (jsc#PED-7620).
- platform/x86/amd/hsmp: create plat specific struct (jsc#PED-7620).
- platform/x86/amd/hsmp: improve the error log (jsc#PED-7620).
- platform/x86: ISST: Reduce noise for missing numa information in logs (bsc#1219285).
- platform/x86: use PLATFORM_DEVID_NONE instead of -1 (jsc#PED-7620).
- power: supply: bq256xx: fix some problem in bq256xx_hw_init (git-fixes).
- power: supply: cw2015: correct time_to_empty units in sysfs (git-fixes).
- powerpc/fadump: reset dump area size if fadump memory reserve fails (bsc#1194869).
- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).
- powerpc/powernv: Add a null pointer check in opal_powercap_init() (bsc#1181674 ltc#189159 git-fixes).
- powerpc/powernv: Add a null pointer check to scom_debug_init_one() (bsc#1194869).
- powerpc/pseries/iommu: enable_ddw incorrectly returns direct mapping for SR-IOV device (bsc#1212091 ltc#199106 git-fixes).
- powerpc/pseries/memhp: Fix access beyond end of drmem array (bsc#1065729).
- powerpc/pseries: fix possible memory leak in ibmebus_bus_init() (bsc#1194869).
- powerpc/pseries: fix potential memory leak in init_cpu_associativity() (bsc#1194869).
- powerpc/xive: Fix endian conversion size (bsc#1194869).
- pstore: ram_core: fix possible overflow in persistent_ram_init_ecc() (git-fixes).
- pwm: Fix out-of-bounds access in of_pwm_single_xlate() (git-fixes).
- pwm: jz4740: Do not use dev_err_probe() in .request() (git-fixes).
- pwm: stm32: Fix enable count for clk in .probe() (git-fixes).
- pwm: stm32: Use hweight32 in stm32_pwm_detect_channels (git-fixes).
- pwm: stm32: Use regmap_clear_bits and regmap_set_bits where applicable (git-fixes).
- r8152: add vendor/device ID pair for ASUS USB-C2500 (git-fixes).
- r8152: add vendor/device ID pair for D-Link DUB-E250 (git-fixes).
- reset: hisilicon: hi6220: fix Wvoid-pointer-to-enum-cast warning (git-fixes).
- ring-buffer/Documentation: Add documentation on buffer_percent file (git-fixes).
- ring-buffer: Do not record in NMI if the arch does not support cmpxchg in NMI (git-fixes).
- s390/dasd: fix double module refcount decrement (bsc#1141539).
- s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1219006).
- s390/vfio-ap: always filter entire AP matrix (git-fixes bsc#1219012).
- s390/vfio-ap: let on_scan_complete() callback filter matrix and update guest's APCB (git-fixes bsc#1219014).
- s390/vfio-ap: loop over the shadow APCB when filtering guest's AP configuration (git-fixes bsc#1219013).
- s390/vfio-ap: unpin pages on gisc registration failure (git-fixes bsc#1218723).
- s390: vfio-ap: tighten the NIB validity check (git-fixes).
- sched/isolation: add cpu_is_isolated() API (bsc#1217895).
- scsi: be2iscsi: Fix a memleak in beiscsi_init_wrb_handle() (git-fixes).
- scsi: bnx2fc: Fix skb double free in bnx2fc_rcv() (git-fixes).
- scsi: core: Always send batch on reset or error handling command (git-fixes).
- scsi: fnic: Return error if vmalloc() failed (git-fixes).
- scsi: hisi_sas: Correct the number of global debugfs registers (git-fixes).
- scsi: hisi_sas: Fix normally completed I/O analysed as failed (git-fixes).
- scsi: hisi_sas: Fix warnings detected by sparse (git-fixes).
- scsi: hisi_sas: Modify v3 HW SATA completion error processing (git-fixes).
- scsi: hisi_sas: Modify v3 HW SSP underflow error processing (git-fixes).
- scsi: hisi_sas: Rename HISI_SAS_{RESET -&gt; RESETTING}_BIT (git-fixes).
- scsi: hisi_sas: Replace with standard error code return value (git-fixes).
- scsi: hisi_sas: Rollback some operations if FLR failed (git-fixes).
- scsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs (git-fixes).
- scsi: ibmvfc: Fix erroneous use of rtas_busy_delay with hcall return code (git-fixes).
- scsi: ibmvfc: Implement channel queue depth and event buffer accounting (bsc#1209834 ltc#202097).
- scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (bsc#1209834 ltc#202097).
- scsi: iscsi: Rename iscsi_set_param() to iscsi_if_set_param() (git-fixes).
- scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (git-fixes).
- scsi: lpfc: Change VMID driver load time parameters to read only (bsc#1219582).
- scsi: lpfc: Move determination of vmid_flag after VMID reinitialization completes (bsc#1219582).
- scsi: lpfc: Reinitialize an NPIV's VMID data structures after FDISC (bsc#1219582).
- scsi: lpfc: Update lpfc version to 14.2.0.17 (bsc#1219582).
- scsi: megaraid_sas: Fix deadlock on firmware crashdump (git-fixes).
- scsi: megaraid_sas: Increase register read retry rount from 3 to 30 for selected registers (git-fixes).
- scsi: mpt3sas: Fix an outdated comment (git-fixes).
- scsi: mpt3sas: Fix in error path (git-fixes).
- scsi: mpt3sas: Fix loop logic (bsc#1219067).
- scsi: mpt3sas: Fix loop logic (git-fixes).
- scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command (git-fixes).
- scsi: pm80xx: Use phy-specific SAS address when sending PHY_START command (git-fixes).
- scsi: qla2xxx: Fix system crash due to bad pointer access (git-fixes).
- selftests/net: fix grep checking for fib_nexthop_multiprefix (git-fixes).
- serial: 8250: omap: Do not skip resource freeing if pm_runtime_resume_and_get() failed (git-fixes).
- serial: core: Fix atomicity violation in uart_tiocmget (git-fixes).
- serial: imx: Correct clock error message in function probe() (git-fixes).
- serial: imx: fix tx statemachine deadlock (git-fixes).
- serial: max310x: fail probe if clock crystal is unstable (git-fixes).
- serial: max310x: improve crystal stable clock detection (git-fixes).
- serial: max310x: set default value when reading clock ready bit (git-fixes).
- serial: sc16is7xx: add check for unsupported SPI modes during probe (git-fixes).
- serial: sc16is7xx: set safe default SPI clock frequency (git-fixes).
- serial: sccnxp: Improve error message if regulator_disable() fails (git-fixes).
- shmem: use ramfs_kill_sb() for kill_sb method of ramfs-based tmpfs (git-fixes).
- software node: Let args be NULL in software_node_get_reference_args (git-fixes).
- spi: spi-zynqmp-gqspi: fix driver kconfig dependencies (git-fixes).
- swiotlb-xen: provide the 'max_mapping_size' method (git-fixes).
- swiotlb: fix a braino in the alignment check fix (bsc#1216559).
- swiotlb: fix slot alignment checks (bsc#1216559).
- trace,smp: Add tracepoints around remotelly called functions (bsc#1217895).
- tracefs: Add missing lockdown check to tracefs_create_dir() (git-fixes).
- tracing/trigger: Fix to return error if failed to alloc snapshot (git-fixes).
- tracing: Add size check when printing trace_marker output (git-fixes).
- tracing: Ensure visibility when inserting an element into tracing_map (git-fixes).
- tracing: Fix uaf issue when open the hist or hist_debug file (git-fixes).
- tracing: Have large events show up as '[LINE TOO BIG]' instead of nothing (git-fixes).
- ubifs: Check @c-&gt;dirty_[n|p]n_cnt and @c-&gt;nroot state under @c-&gt;lp_mutex (git-fixes).
- ubifs: ubifs_link: Fix wrong name len calculating when UBIFS is encrypted (git-fixes).
- ubifs: ubifs_symlink: Fix memleak of inode-&gt;i_link in error path (git-fixes).
- uio: Fix use-after-free in uio_open (git-fixes).
- usb: cdns3: Fix uvc fail when DMA cross 4k boundery since sg enabled (git-fixes).
- usb: cdns3: fix uvc failure work since sg support enabled (git-fixes).
- usb: chipidea: wait controller resume finished for wakeup irq (git-fixes).
- usb: dwc: ep0: Update request status in dwc3_ep0_stall_restart (git-fixes).
- usb: fsl-mph-dr-of: mark fsl_usb2_mpc5121_init() static (git-fixes).
- usb: host: xhci-plat: Add support for XHCI_SG_TRB_CACHE_SIZE_QUIRK (git-fixes).
- usb: mon: Fix atomicity violation in mon_bin_vma_fault (git-fixes).
- usb: otg numberpad exception (bsc#1218527).
- usb: phy: mxs: remove CONFIG_USB_OTG condition for mxs_phy_is_otg_host() (git-fixes).
- usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes).
- usb: ucsi: Add missing ppm_lock (git-fixes).
- usb: ucsi_acpi: Fix command completion handling (git-fixes).
- usb: xhci-mtk: fix a short packet issue of gen1 isoc-in transfer (git-fixes).
- usr/Kconfig: fix typos of 'its' (git-fixes).
- vfs: make freeze_super abort when sync_filesystem returns error (git-fixes).
- vhost: Allow null msg.size on VHOST_IOTLB_INVALIDATE (git-fixes).
- virtio-mmio: fix memory leak of vm_dev (git-fixes).
- virtio_balloon: Fix endless deflation and inflation on arm64 (git-fixes).
- vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).
- vsock/virtio: Fix unsigned integer wrap around in virtio_transport_has_space() (git-fixes).
- watchdog/hpwdt: Only claim UNKNOWN NMI if from iLO (git-fixes).
- watchdog: bcm2835_wdt: Fix WDIOC_SETTIMEOUT handling (git-fixes).
- watchdog: rti_wdt: Drop runtime pm reference count when watchdog is unused (git-fixes).
- watchdog: set cdev owner before adding (git-fixes).
- wifi: ath11k: Defer on rproc_get failure (git-fixes).
- wifi: cfg80211: lock wiphy mutex for rfkill poll (git-fixes).
- wifi: iwlwifi: mvm: send TX path flush in rfkill (git-fixes).
- wifi: iwlwifi: mvm: set siso/mimo chains to 1 in FW SMPS request (git-fixes).
- wifi: iwlwifi: pcie: avoid a NULL pointer dereference (git-fixes).
- wifi: libertas: stop selecting wext (git-fixes).
- wifi: mt76: fix broken precal loading from MTD for mt7915 (git-fixes).
- wifi: mt76: mt7921s: fix workqueue problem causes STA association fail (git-fixes).
- wifi: mwifiex: configure BSSID consistently when starting AP (git-fixes).
- wifi: rtlwifi: Convert LNKCTL change to PCIe cap RMW accessors (git-fixes).
- wifi: rtlwifi: Remove bogus and dangerous ASPM disable/enable code (git-fixes).
- wifi: rtlwifi: add calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8188ee: phy: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192c: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192ce: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192cu: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192de: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192ee: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192se: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8821ae: phy: fix an undefined bitwise shift behavior (git-fixes).
- wifi: rtw88: fix RX filter in FIF_ALLMULTI flag (git-fixes).
- x86/MCE/AMD, EDAC/mce_amd: Decode UMC_V2 ECC errors (jsc#PED-7616).
- x86/MCE/AMD: Add new MA_LLC, USR_DP, and USR_CP bank types (jsc#PED-7622).
- x86/MCE/AMD: Split amd_mce_is_memory_error() (jsc#PED-7623).
- x86/amd_nb: Add AMD Family MI300 PCI IDs (jsc#PED-7622).
- x86/amd_nb: Add MI200 PCI IDs (jsc#PED-7616).
- x86/cpu: Merge Intel and AMD ppin_init() functions (jsc#PED-7615).
- x86/cpu: Read/save PPIN MSR during initialization (jsc#PED-7615).
- x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285).
- x86/hyperv: Fix the detection of E820_TYPE_PRAM in a Gen2 VM (git-fixes).
- x86/hyperv: Use atomic_try_cmpxchg() to micro-optimize hv_nmi_unknown() (git-fixes).
- x86/mce: Cleanup mce_usable_address() (jsc#PED-7623).
- x86/mce: Define amd_mce_usable_address() (jsc#PED-7623).
- xen-pciback: Consider INTx disabled when MSI/MSI-X is enabled (git-fixes).
- xen/events: fix delayed eoi list handling (git-fixes).
- xhci: Add grace period after xHC start to prevent premature runtime suspend (git-fixes).
- xhci: cleanup xhci_hub_control port references (git-fixes).
- xhci: pass port pointer as parameter to xhci_set_port_power() (git-fixes).
- xhci: track port suspend state correctly in unsuccessful resume cases (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-14"/>
	<updated date="2024-02-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108281">SUSE bug 1108281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141539">SUSE bug 1141539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174649">SUSE bug 1174649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181674">SUSE bug 1181674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193285">SUSE bug 1193285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209834">SUSE bug 1209834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210443">SUSE bug 1210443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211515">SUSE bug 1211515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212091">SUSE bug 1212091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214377">SUSE bug 1214377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215275">SUSE bug 1215275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215885">SUSE bug 1215885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216441">SUSE bug 1216441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216559">SUSE bug 1216559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216702">SUSE bug 1216702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217895">SUSE bug 1217895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217987">SUSE bug 1217987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217988">SUSE bug 1217988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217989">SUSE bug 1217989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218005">SUSE bug 1218005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218447">SUSE bug 1218447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218527">SUSE bug 1218527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218659">SUSE bug 1218659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218713">SUSE bug 1218713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218723">SUSE bug 1218723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218730">SUSE bug 1218730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218738">SUSE bug 1218738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218752">SUSE bug 1218752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218757">SUSE bug 1218757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218768">SUSE bug 1218768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218778">SUSE bug 1218778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218779">SUSE bug 1218779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218804">SUSE bug 1218804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218832">SUSE bug 1218832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218836">SUSE bug 1218836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218916">SUSE bug 1218916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218948">SUSE bug 1218948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218958">SUSE bug 1218958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218968">SUSE bug 1218968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218997">SUSE bug 1218997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219006">SUSE bug 1219006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219012">SUSE bug 1219012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219013">SUSE bug 1219013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219014">SUSE bug 1219014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219053">SUSE bug 1219053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219067">SUSE bug 1219067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219120">SUSE bug 1219120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219128">SUSE bug 1219128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219136">SUSE bug 1219136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219285">SUSE bug 1219285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219349">SUSE bug 1219349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219412">SUSE bug 1219412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219429">SUSE bug 1219429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219434">SUSE bug 1219434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219490">SUSE bug 1219490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219512">SUSE bug 1219512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219568">SUSE bug 1219568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219582">SUSE bug 1219582</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33631/">CVE-2021-33631 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33631">CVE-2021-33631 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46838/">CVE-2023-46838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46838">CVE-2023-46838 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47233/">CVE-2023-47233 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47233">CVE-2023-47233 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4921/">CVE-2023-4921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4921">CVE-2023-4921 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51042/">CVE-2023-51042 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51042">CVE-2023-51042 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51043/">CVE-2023-51043 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51043">CVE-2023-51043 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51780/">CVE-2023-51780 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51780">CVE-2023-51780 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51782/">CVE-2023-51782 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51782">CVE-2023-51782 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-6040/">CVE-2023-6040 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6040">CVE-2023-6040 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6356/">CVE-2023-6356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6356">CVE-2023-6356 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6531/">CVE-2023-6531 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6531">CVE-2023-6531 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6535/">CVE-2023-6535 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6535">CVE-2023-6535 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6536/">CVE-2023-6536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6536">CVE-2023-6536 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6915/">CVE-2023-6915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6915">CVE-2023-6915 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0565/">CVE-2024-0565 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0565">CVE-2024-0565 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0641/">CVE-2024-0641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0641">CVE-2024-0641 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0775/">CVE-2024-0775 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0775">CVE-2024-0775 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1085/">CVE-2024-1085 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1085">CVE-2024-1085 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1086/">CVE-2024-1086 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1086">CVE-2024-1086 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846392" comment="cluster-md-kmp-rt-5.14.21-150500.13.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846393" comment="dlm-kmp-rt-5.14.21-150500.13.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846394" comment="gfs2-kmp-rt-5.14.21-150500.13.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846395" comment="kernel-devel-rt-5.14.21-150500.13.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846396" comment="kernel-rt-5.14.21-150500.13.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846397" comment="kernel-rt-devel-5.14.21-150500.13.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846398" comment="kernel-rt-extra-5.14.21-150500.13.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846399" comment="kernel-rt-livepatch-5.14.21-150500.13.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846400" comment="kernel-rt-livepatch-devel-5.14.21-150500.13.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846401" comment="kernel-rt-optional-5.14.21-150500.13.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846402" comment="kernel-rt-vdso-5.14.21-150500.13.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846403" comment="kernel-rt_debug-5.14.21-150500.13.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846404" comment="kernel-rt_debug-devel-5.14.21-150500.13.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846405" comment="kernel-rt_debug-livepatch-devel-5.14.21-150500.13.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846406" comment="kernel-rt_debug-vdso-5.14.21-150500.13.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846407" comment="kernel-source-rt-5.14.21-150500.13.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846408" comment="kernel-syms-rt-5.14.21-150500.13.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846409" comment="kselftests-kmp-rt-5.14.21-150500.13.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846410" comment="ocfs2-kmp-rt-5.14.21-150500.13.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846411" comment="reiserfs-kmp-rt-5.14.21-150500.13.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5172" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216118" ref_url="https://bugzilla.suse.com/1216118" source="BUGZILLA"/>
		<reference ref_id="1216119" ref_url="https://bugzilla.suse.com/1216119" source="BUGZILLA"/>
		<reference ref_id="1216120" ref_url="https://bugzilla.suse.com/1216120" source="BUGZILLA"/>
		<reference ref_id="1217402" ref_url="https://bugzilla.suse.com/1217402" source="BUGZILLA"/>
		<reference ref_id="1217649" ref_url="https://bugzilla.suse.com/1217649" source="BUGZILLA"/>
		<reference ref_id="1217768" ref_url="https://bugzilla.suse.com/1217768" source="BUGZILLA"/>
		<reference ref_id="1219208" ref_url="https://bugzilla.suse.com/1219208" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-42794" ref_url="https://www.suse.com/security/cve/CVE-2023-42794/" source="CVE"/>
		<reference ref_id="CVE-2023-42795" ref_url="https://www.suse.com/security/cve/CVE-2023-42795/" source="CVE"/>
		<reference ref_id="CVE-2023-45648" ref_url="https://www.suse.com/security/cve/CVE-2023-45648/" source="CVE"/>
		<reference ref_id="CVE-2023-46589" ref_url="https://www.suse.com/security/cve/CVE-2023-46589/" source="CVE"/>
		<reference ref_id="CVE-2024-22029" ref_url="https://www.suse.com/security/cve/CVE-2024-22029/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017913.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

Updated to Tomcat 9.0.85:

- CVE-2023-45648: Improve trailer header parsing (bsc#1216118).
- CVE-2023-42794: FileUpload: remove tmp files to avoid DoS on Windows (bsc#1216120).
- CVE-2023-42795: Improve handling of failures during recycle() methods (bsc#1216119).
- CVE-2023-46589: Fixed HTTP request smuggling due to incorrect headers parsing (bsc#1217649)
- CVE-2024-22029: Fixed escalation to root from tomcat user via %post script. (bsc#1219208)
    
The following non-security issues were fixed:

- Fixed the file permissions for server.xml (bsc#1217768, bsc#1217402).

Find the full release notes at:

https://tomcat.apache.org/tomcat-9.0-doc/changelog.html
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-14"/>
	<updated date="2024-02-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216118">SUSE bug 1216118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216119">SUSE bug 1216119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216120">SUSE bug 1216120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217402">SUSE bug 1217402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217649">SUSE bug 1217649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217768">SUSE bug 1217768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219208">SUSE bug 1219208</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42794/">CVE-2023-42794 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42794">CVE-2023-42794 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-42795/">CVE-2023-42795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42795">CVE-2023-42795 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45648/">CVE-2023-45648 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45648">CVE-2023-45648 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46589/">CVE-2023-46589 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46589">CVE-2023-46589 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22029/">CVE-2024-22029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22029">CVE-2024-22029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846412" comment="tomcat-9.0.85-150200.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846413" comment="tomcat-admin-webapps-9.0.85-150200.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846414" comment="tomcat-docs-webapp-9.0.85-150200.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846415" comment="tomcat-el-3_0-api-9.0.85-150200.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846416" comment="tomcat-embed-9.0.85-150200.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846417" comment="tomcat-javadoc-9.0.85-150200.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846418" comment="tomcat-jsp-2_3-api-9.0.85-150200.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846419" comment="tomcat-jsvc-9.0.85-150200.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846420" comment="tomcat-lib-9.0.85-150200.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846421" comment="tomcat-servlet-4_0-api-9.0.85-150200.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846422" comment="tomcat-webapps-9.0.85-150200.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5173" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat10 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219208" ref_url="https://bugzilla.suse.com/1219208" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-22029" ref_url="https://www.suse.com/security/cve/CVE-2024-22029/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017912.html" source="SUSE-SU"/>
		<description>
This update for tomcat10 fixes the following issues:

- CVE-2024-22029: Fixed escalation to root from tomcat user via %post script. (bsc#1219208)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-14"/>
	<updated date="2024-02-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219208">SUSE bug 1219208</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22029/">CVE-2024-22029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22029">CVE-2024-22029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846423" comment="tomcat10-10.1.18-150200.5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846424" comment="tomcat10-admin-webapps-10.1.18-150200.5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846425" comment="tomcat10-docs-webapp-10.1.18-150200.5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846426" comment="tomcat10-el-5_0-api-10.1.18-150200.5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846427" comment="tomcat10-embed-10.1.18-150200.5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846428" comment="tomcat10-jsp-3_1-api-10.1.18-150200.5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846429" comment="tomcat10-jsvc-10.1.18-150200.5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846430" comment="tomcat10-lib-10.1.18-150200.5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846431" comment="tomcat10-servlet-6_0-api-10.1.18-150200.5.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846432" comment="tomcat10-webapps-10.1.18-150200.5.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5174" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openj9 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217214" ref_url="https://bugzilla.suse.com/1217214" source="BUGZILLA"/>
		<reference ref_id="1218903" ref_url="https://bugzilla.suse.com/1218903" source="BUGZILLA"/>
		<reference ref_id="1218905" ref_url="https://bugzilla.suse.com/1218905" source="BUGZILLA"/>
		<reference ref_id="1218906" ref_url="https://bugzilla.suse.com/1218906" source="BUGZILLA"/>
		<reference ref_id="1218907" ref_url="https://bugzilla.suse.com/1218907" source="BUGZILLA"/>
		<reference ref_id="1218909" ref_url="https://bugzilla.suse.com/1218909" source="BUGZILLA"/>
		<reference ref_id="1218911" ref_url="https://bugzilla.suse.com/1218911" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5676" ref_url="https://www.suse.com/security/cve/CVE-2023-5676/" source="CVE"/>
		<reference ref_id="CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918/" source="CVE"/>
		<reference ref_id="CVE-2024-20919" ref_url="https://www.suse.com/security/cve/CVE-2024-20919/" source="CVE"/>
		<reference ref_id="CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921/" source="CVE"/>
		<reference ref_id="CVE-2024-20926" ref_url="https://www.suse.com/security/cve/CVE-2024-20926/" source="CVE"/>
		<reference ref_id="CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945/" source="CVE"/>
		<reference ref_id="CVE-2024-20952" ref_url="https://www.suse.com/security/cve/CVE-2024-20952/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034224.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openj9 fixes the following issues:

Update to OpenJDK 8u402 build 06 with OpenJ9 0.43.0 virtual machine

* Including OpenJ9 0.41.0 fixes of CVE-2023-5676, bsc#1217214
* CVE-2024-20918 (bsc#1218907), CVE-2024-20919 (bsc#1218903),
  CVE-2024-20921 (bsc#1218905), CVE-2024-20926 (bsc#1218906),
  CVE-2024-20945 (bsc#1218909), CVE-2024-20952 (bsc#1218911)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-15"/>
	<updated date="2024-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217214">SUSE bug 1217214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218903">SUSE bug 1218903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218905">SUSE bug 1218905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218906">SUSE bug 1218906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218907">SUSE bug 1218907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218909">SUSE bug 1218909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218911">SUSE bug 1218911</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5676/">CVE-2023-5676 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5676">CVE-2023-5676 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20919/">CVE-2024-20919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20919">CVE-2024-20919 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20926/">CVE-2024-20926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20926">CVE-2024-20926 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20952/">CVE-2024-20952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846433" comment="java-1_8_0-openj9-1.8.0.402-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846434" comment="java-1_8_0-openj9-accessibility-1.8.0.402-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846435" comment="java-1_8_0-openj9-demo-1.8.0.402-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846436" comment="java-1_8_0-openj9-devel-1.8.0.402-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846437" comment="java-1_8_0-openj9-headless-1.8.0.402-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846438" comment="java-1_8_0-openj9-javadoc-1.8.0.402-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846439" comment="java-1_8_0-openj9-src-1.8.0.402-150200.3.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5175" version="1" class="patch">
	<metadata>
		<title>Security update for SUSE Manager Client Tools (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1192154" ref_url="https://bugzilla.suse.com/1192154" source="BUGZILLA"/>
		<reference ref_id="1192696" ref_url="https://bugzilla.suse.com/1192696" source="BUGZILLA"/>
		<reference ref_id="1193492" ref_url="https://bugzilla.suse.com/1193492" source="BUGZILLA"/>
		<reference ref_id="1193686" ref_url="https://bugzilla.suse.com/1193686" source="BUGZILLA"/>
		<reference ref_id="1200480" ref_url="https://bugzilla.suse.com/1200480" source="BUGZILLA"/>
		<reference ref_id="1204023" ref_url="https://bugzilla.suse.com/1204023" source="BUGZILLA"/>
		<reference ref_id="1218843" ref_url="https://bugzilla.suse.com/1218843" source="BUGZILLA"/>
		<reference ref_id="1218844" ref_url="https://bugzilla.suse.com/1218844" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7753" ref_url="https://www.suse.com/security/cve/CVE-2020-7753/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<reference ref_id="CVE-2021-43138" ref_url="https://www.suse.com/security/cve/CVE-2021-43138/" source="CVE"/>
		<reference ref_id="CVE-2021-43798" ref_url="https://www.suse.com/security/cve/CVE-2021-43798/" source="CVE"/>
		<reference ref_id="CVE-2021-43815" ref_url="https://www.suse.com/security/cve/CVE-2021-43815/" source="CVE"/>
		<reference ref_id="CVE-2022-0155" ref_url="https://www.suse.com/security/cve/CVE-2022-0155/" source="CVE"/>
		<reference ref_id="CVE-2022-41715" ref_url="https://www.suse.com/security/cve/CVE-2022-41715/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017931.html" source="SUSE-SU"/>
		<description>

This update fixes the following issues:

golang-github-lusitaniae-apache_exporter:

- Do not strip if SUSE Linux Enterprise 15 SP3
- Exclude debug for Red Hat Enterprise Linux &gt;= 8
- Build with Go &gt;= 1.20 when the OS is not Red Hat Enterprise Linux

mgr-daemon:

- Version 4.3.8-1
  * Update translation strings

prometheus-postgres_exporter:

- Remove duplicated call to systemd requirements
- Do not build debug if Red Hat Enterprise Linux &gt;= 8
- Do not strip if SUSE Linux Enterprise 15 SP3
- Build at least with with Go &gt;= 1.18 on Red Hat Enterprise Linux
- Build with Go &gt;= 1.20 elsewhere

spacecmd:

- Version 4.3.26-1
  * Update translation strings

spacewalk-client-tools:

- Version 4.3.18-1
  * Update translation strings

uyuni-proxy-systemd-services:

- Version 4.3.10-1
  * Update the image version
- Version 4.3.9-1
  * Integrate the containerized proxy into the usual rel-eng workflow

		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-15"/>
	<updated date="2024-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192154">SUSE bug 1192154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192696">SUSE bug 1192696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193492">SUSE bug 1193492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193686">SUSE bug 1193686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200480">SUSE bug 1200480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204023">SUSE bug 1204023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218843">SUSE bug 1218843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218844">SUSE bug 1218844</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7753/">CVE-2020-7753 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7753">CVE-2020-7753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3807">CVE-2021-3807 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3918">CVE-2021-3918 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43138/">CVE-2021-43138 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43138">CVE-2021-43138 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43798/">CVE-2021-43798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43798">CVE-2021-43798 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-43815/">CVE-2021-43815 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43815">CVE-2021-43815 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0155/">CVE-2022-0155 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0155">CVE-2022-0155 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41715/">CVE-2022-41715 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41715">CVE-2022-41715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846440" comment="golang-github-lusitaniae-apache_exporter-1.0.0-150000.1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846441" comment="prometheus-postgres_exporter-0.10.1-150000.1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846442" comment="spacecmd-4.3.26-150000.3.113.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5176" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1193948" ref_url="https://bugzilla.suse.com/1193948" source="BUGZILLA"/>
		<reference ref_id="1211649" ref_url="https://bugzilla.suse.com/1211649" source="BUGZILLA"/>
		<reference ref_id="1215963" ref_url="https://bugzilla.suse.com/1215963" source="BUGZILLA"/>
		<reference ref_id="1216284" ref_url="https://bugzilla.suse.com/1216284" source="BUGZILLA"/>
		<reference ref_id="1219430" ref_url="https://bugzilla.suse.com/1219430" source="BUGZILLA"/>
		<reference ref_id="1219431" ref_url="https://bugzilla.suse.com/1219431" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-22231" ref_url="https://www.suse.com/security/cve/CVE-2024-22231/" source="CVE"/>
		<reference ref_id="CVE-2024-22232" ref_url="https://www.suse.com/security/cve/CVE-2024-22232/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017926.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

Security issues fixed:

- CVE-2024-22231: Prevent directory traversal when creating syndic cache directory
  on the master (bsc#1219430)
- CVE-2024-22232: Prevent directory traversal attacks in the master's serve_file
  method (bsc#1219431)

Bugs fixed:

- Ensure that pillar refresh loads beacons from pillar without restart
- Fix the aptpkg.py unit test failure
- Prefer unittest.mock to python-mock in test suite
- Enable 'KeepAlive' probes for Salt SSH executions (bsc#1211649)
- Revert changes to set Salt configured user early in the stack (bsc#1216284)
- Align behavior of some modules when using salt-call via symlink (bsc#1215963)
- Fix gitfs '__env__' and improve cache cleaning (bsc#1193948)
- Remove python-boto dependency for the python3-salt-testsuite package for Tumbleweed
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-15"/>
	<updated date="2024-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193948">SUSE bug 1193948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211649">SUSE bug 1211649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215963">SUSE bug 1215963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216284">SUSE bug 1216284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219430">SUSE bug 1219430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219431">SUSE bug 1219431</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-22231/">CVE-2024-22231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22231">CVE-2024-22231 at NVD</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-22232/">CVE-2024-22232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22232">CVE-2024-22232 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846443" comment="python3-salt-3006.0-150500.4.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846444" comment="salt-3006.0-150500.4.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846445" comment="salt-api-3006.0-150500.4.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846446" comment="salt-bash-completion-3006.0-150500.4.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846447" comment="salt-cloud-3006.0-150500.4.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846448" comment="salt-doc-3006.0-150500.4.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846449" comment="salt-fish-completion-3006.0-150500.4.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846450" comment="salt-master-3006.0-150500.4.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846451" comment="salt-minion-3006.0-150500.4.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846452" comment="salt-proxy-3006.0-150500.4.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846453" comment="salt-ssh-3006.0-150500.4.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846454" comment="salt-standalone-formulas-configuration-3006.0-150500.4.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846455" comment="salt-syndic-3006.0-150500.4.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846456" comment="salt-transactional-update-3006.0-150500.4.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846457" comment="salt-zsh-completion-3006.0-150500.4.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5177" version="1" class="patch">
	<metadata>
		<title>Recommended update for grafana (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1192154" ref_url="https://bugzilla.suse.com/1192154" source="BUGZILLA"/>
		<reference ref_id="1192696" ref_url="https://bugzilla.suse.com/1192696" source="BUGZILLA"/>
		<reference ref_id="1200480" ref_url="https://bugzilla.suse.com/1200480" source="BUGZILLA"/>
		<reference ref_id="1218843" ref_url="https://bugzilla.suse.com/1218843" source="BUGZILLA"/>
		<reference ref_id="1218844" ref_url="https://bugzilla.suse.com/1218844" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7753" ref_url="https://www.suse.com/security/cve/CVE-2020-7753/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<reference ref_id="CVE-2021-43138" ref_url="https://www.suse.com/security/cve/CVE-2021-43138/" source="CVE"/>
		<reference ref_id="CVE-2022-0155" ref_url="https://www.suse.com/security/cve/CVE-2022-0155/" source="CVE"/>
		<reference ref_id="SUSE-RU-2024:0511-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034231.html" source="SUSE-SU"/>
		<description>
This update for grafana fixes the following issues:

- Fixed changelog entries for the Bugzilla trackers related to previously implemented security fixes 
  (no source code changes)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-15"/>
	<updated date="2024-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192154">SUSE bug 1192154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192696">SUSE bug 1192696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200480">SUSE bug 1200480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218843">SUSE bug 1218843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218844">SUSE bug 1218844</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7753/">CVE-2020-7753 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7753">CVE-2020-7753 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3807">CVE-2021-3807 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3918">CVE-2021-3918 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43138/">CVE-2021-43138 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43138">CVE-2021-43138 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0155/">CVE-2022-0155 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0155">CVE-2022-0155 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846565" comment="grafana-9.5.8-150200.3.53.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5178" version="1" class="patch">
	<metadata>
		<title>Security update for golang-github-prometheus-alertmanager (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218838" ref_url="https://bugzilla.suse.com/1218838" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-40577" ref_url="https://www.suse.com/security/cve/CVE-2023-40577/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017925.html" source="SUSE-SU"/>
		<description>
This update for golang-github-prometheus-alertmanager fixes the following issues:
    
golang-github-prometheus-alertmanager was updated from version 0.23.0 to 0.26.0 (jsc#PED-7353):

- Version 0.26.0:
  * Security fixes:
    +  CVE-2023-40577: Fix stored XSS via the /api/v1/alerts endpoint in the Alertmanager UI (bsc#1218838)
  * Other changes and bugs fixed:
    + Configuration: Fix empty list of receivers and inhibit_rules would cause the alertmanager to crash
    + Templating: Fixed a race condition when using the title function. It is now race-safe
    + API: Fixed duplicate receiver names in the api/v2/receivers API endpoint
    + API: Attempting to delete a silence now returns the correct status code, 404 instead of 500
    + Clustering: Fixes a panic when tls_client_config is empty
    + Webhook: url is now marked as a secret. It will no longer show up in the logs as clear-text
    + Metrics: New label reason for alertmanager_notifications_failed_total metric to indicate the type of error of the
      alert delivery
    + Clustering: New flag --cluster.label, to help to block any traffic that is not meant for the cluster
    + Integrations: Add Microsoft Teams as a supported integration
- Version 0.25.0:
  * Fail configuration loading if api_key and api_key_file are defined at the same time
  * Fix the alertmanager_alerts metric to avoid counting resolved alerts as active. Also added a new
    alertmanager_marked_alerts metric that retain the old behavior
  * Trim contents of Slack API URLs when reading from files
  * amtool: Avoid panic when the label value matcher is empty
  * Fail configuration loading if api_url is empty for OpsGenie
  * Fix email template for resolved notifications
  * Add proxy_url support for OAuth2 in HTTP client configuration
  * Reload TLS certificate and key from disk when updated
  * Add Discord integration
  * Add Webex integration
  * Add min_version support to select the minimum TLS version in HTTP client configuration
  * Add max_version support to select the maximum TLS version in HTTP client configuration
  * Emit warning logs when truncating messages in notifications
  * Support HEAD method for the /-/healty and /-/ready endpoints
  * Add support for reading global and local SMTP passwords from files
  * UI: Add 'Link' button to alerts in list
  * UI: Allow to choose the first day of the week as Sunday or Monday
- Version 0.24.0:
  * Fix HTTP client configuration for the SNS receiver
  * Fix unclosed file descriptor after reading the silences snapshot file
  * Fix field names for mute_time_intervals in JSON marshaling
  * Ensure that the root route doesn't have any matchers
  * Truncate the message's title to 1024 chars to avoid hitting Slack limits
  * Fix the default HTML email template (email.default.html) to match with the canonical source
  * Detect SNS FIFO topic based on the rendered value
  * Avoid deleting and recreating a silence when an update is possible
  * api/v2: Return 200 OK when deleting an expired silence
  * amtool: Fix the silence's end date when adding a silence. The end date is (start date + duration) while it used to
    be (current time + duration). The new behavior is consistent with the update operation
  * Add the /api/v2 prefix to all endpoints in the OpenAPI specification and generated client code
  * Add --cluster.tls-config experimental flag to secure cluster traffic via mutual TLS
  * Add Telegram integration
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-15"/>
	<updated date="2024-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218838">SUSE bug 1218838</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-40577/">CVE-2023-40577 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40577">CVE-2023-40577 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846458" comment="golang-github-prometheus-alertmanager-0.26.0-150100.4.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5179" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1108281" ref_url="https://bugzilla.suse.com/1108281" source="BUGZILLA"/>
		<reference ref_id="1141539" ref_url="https://bugzilla.suse.com/1141539" source="BUGZILLA"/>
		<reference ref_id="1174649" ref_url="https://bugzilla.suse.com/1174649" source="BUGZILLA"/>
		<reference ref_id="1181674" ref_url="https://bugzilla.suse.com/1181674" source="BUGZILLA"/>
		<reference ref_id="1193285" ref_url="https://bugzilla.suse.com/1193285" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1209834" ref_url="https://bugzilla.suse.com/1209834" source="BUGZILLA"/>
		<reference ref_id="1210443" ref_url="https://bugzilla.suse.com/1210443" source="BUGZILLA"/>
		<reference ref_id="1211515" ref_url="https://bugzilla.suse.com/1211515" source="BUGZILLA"/>
		<reference ref_id="1212091" ref_url="https://bugzilla.suse.com/1212091" source="BUGZILLA"/>
		<reference ref_id="1214377" ref_url="https://bugzilla.suse.com/1214377" source="BUGZILLA"/>
		<reference ref_id="1215275" ref_url="https://bugzilla.suse.com/1215275" source="BUGZILLA"/>
		<reference ref_id="1215885" ref_url="https://bugzilla.suse.com/1215885" source="BUGZILLA"/>
		<reference ref_id="1216441" ref_url="https://bugzilla.suse.com/1216441" source="BUGZILLA"/>
		<reference ref_id="1216559" ref_url="https://bugzilla.suse.com/1216559" source="BUGZILLA"/>
		<reference ref_id="1216702" ref_url="https://bugzilla.suse.com/1216702" source="BUGZILLA"/>
		<reference ref_id="1217895" ref_url="https://bugzilla.suse.com/1217895" source="BUGZILLA"/>
		<reference ref_id="1217987" ref_url="https://bugzilla.suse.com/1217987" source="BUGZILLA"/>
		<reference ref_id="1217988" ref_url="https://bugzilla.suse.com/1217988" source="BUGZILLA"/>
		<reference ref_id="1217989" ref_url="https://bugzilla.suse.com/1217989" source="BUGZILLA"/>
		<reference ref_id="1218005" ref_url="https://bugzilla.suse.com/1218005" source="BUGZILLA"/>
		<reference ref_id="1218447" ref_url="https://bugzilla.suse.com/1218447" source="BUGZILLA"/>
		<reference ref_id="1218527" ref_url="https://bugzilla.suse.com/1218527" source="BUGZILLA"/>
		<reference ref_id="1218659" ref_url="https://bugzilla.suse.com/1218659" source="BUGZILLA"/>
		<reference ref_id="1218689" ref_url="https://bugzilla.suse.com/1218689" source="BUGZILLA"/>
		<reference ref_id="1218713" ref_url="https://bugzilla.suse.com/1218713" source="BUGZILLA"/>
		<reference ref_id="1218723" ref_url="https://bugzilla.suse.com/1218723" source="BUGZILLA"/>
		<reference ref_id="1218730" ref_url="https://bugzilla.suse.com/1218730" source="BUGZILLA"/>
		<reference ref_id="1218738" ref_url="https://bugzilla.suse.com/1218738" source="BUGZILLA"/>
		<reference ref_id="1218752" ref_url="https://bugzilla.suse.com/1218752" source="BUGZILLA"/>
		<reference ref_id="1218757" ref_url="https://bugzilla.suse.com/1218757" source="BUGZILLA"/>
		<reference ref_id="1218768" ref_url="https://bugzilla.suse.com/1218768" source="BUGZILLA"/>
		<reference ref_id="1218778" ref_url="https://bugzilla.suse.com/1218778" source="BUGZILLA"/>
		<reference ref_id="1218779" ref_url="https://bugzilla.suse.com/1218779" source="BUGZILLA"/>
		<reference ref_id="1218804" ref_url="https://bugzilla.suse.com/1218804" source="BUGZILLA"/>
		<reference ref_id="1218832" ref_url="https://bugzilla.suse.com/1218832" source="BUGZILLA"/>
		<reference ref_id="1218836" ref_url="https://bugzilla.suse.com/1218836" source="BUGZILLA"/>
		<reference ref_id="1218916" ref_url="https://bugzilla.suse.com/1218916" source="BUGZILLA"/>
		<reference ref_id="1218948" ref_url="https://bugzilla.suse.com/1218948" source="BUGZILLA"/>
		<reference ref_id="1218958" ref_url="https://bugzilla.suse.com/1218958" source="BUGZILLA"/>
		<reference ref_id="1218968" ref_url="https://bugzilla.suse.com/1218968" source="BUGZILLA"/>
		<reference ref_id="1218997" ref_url="https://bugzilla.suse.com/1218997" source="BUGZILLA"/>
		<reference ref_id="1219006" ref_url="https://bugzilla.suse.com/1219006" source="BUGZILLA"/>
		<reference ref_id="1219012" ref_url="https://bugzilla.suse.com/1219012" source="BUGZILLA"/>
		<reference ref_id="1219013" ref_url="https://bugzilla.suse.com/1219013" source="BUGZILLA"/>
		<reference ref_id="1219014" ref_url="https://bugzilla.suse.com/1219014" source="BUGZILLA"/>
		<reference ref_id="1219053" ref_url="https://bugzilla.suse.com/1219053" source="BUGZILLA"/>
		<reference ref_id="1219067" ref_url="https://bugzilla.suse.com/1219067" source="BUGZILLA"/>
		<reference ref_id="1219120" ref_url="https://bugzilla.suse.com/1219120" source="BUGZILLA"/>
		<reference ref_id="1219128" ref_url="https://bugzilla.suse.com/1219128" source="BUGZILLA"/>
		<reference ref_id="1219136" ref_url="https://bugzilla.suse.com/1219136" source="BUGZILLA"/>
		<reference ref_id="1219285" ref_url="https://bugzilla.suse.com/1219285" source="BUGZILLA"/>
		<reference ref_id="1219349" ref_url="https://bugzilla.suse.com/1219349" source="BUGZILLA"/>
		<reference ref_id="1219412" ref_url="https://bugzilla.suse.com/1219412" source="BUGZILLA"/>
		<reference ref_id="1219429" ref_url="https://bugzilla.suse.com/1219429" source="BUGZILLA"/>
		<reference ref_id="1219434" ref_url="https://bugzilla.suse.com/1219434" source="BUGZILLA"/>
		<reference ref_id="1219490" ref_url="https://bugzilla.suse.com/1219490" source="BUGZILLA"/>
		<reference ref_id="1219512" ref_url="https://bugzilla.suse.com/1219512" source="BUGZILLA"/>
		<reference ref_id="1219568" ref_url="https://bugzilla.suse.com/1219568" source="BUGZILLA"/>
		<reference ref_id="1219582" ref_url="https://bugzilla.suse.com/1219582" source="BUGZILLA"/>
		<reference ref_id="1219608" ref_url="https://bugzilla.suse.com/1219608" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33631" ref_url="https://www.suse.com/security/cve/CVE-2021-33631/" source="CVE"/>
		<reference ref_id="CVE-2023-46838" ref_url="https://www.suse.com/security/cve/CVE-2023-46838/" source="CVE"/>
		<reference ref_id="CVE-2023-47233" ref_url="https://www.suse.com/security/cve/CVE-2023-47233/" source="CVE"/>
		<reference ref_id="CVE-2023-4921" ref_url="https://www.suse.com/security/cve/CVE-2023-4921/" source="CVE"/>
		<reference ref_id="CVE-2023-51042" ref_url="https://www.suse.com/security/cve/CVE-2023-51042/" source="CVE"/>
		<reference ref_id="CVE-2023-51043" ref_url="https://www.suse.com/security/cve/CVE-2023-51043/" source="CVE"/>
		<reference ref_id="CVE-2023-51780" ref_url="https://www.suse.com/security/cve/CVE-2023-51780/" source="CVE"/>
		<reference ref_id="CVE-2023-51782" ref_url="https://www.suse.com/security/cve/CVE-2023-51782/" source="CVE"/>
		<reference ref_id="CVE-2023-6040" ref_url="https://www.suse.com/security/cve/CVE-2023-6040/" source="CVE"/>
		<reference ref_id="CVE-2023-6356" ref_url="https://www.suse.com/security/cve/CVE-2023-6356/" source="CVE"/>
		<reference ref_id="CVE-2023-6531" ref_url="https://www.suse.com/security/cve/CVE-2023-6531/" source="CVE"/>
		<reference ref_id="CVE-2023-6535" ref_url="https://www.suse.com/security/cve/CVE-2023-6535/" source="CVE"/>
		<reference ref_id="CVE-2023-6536" ref_url="https://www.suse.com/security/cve/CVE-2023-6536/" source="CVE"/>
		<reference ref_id="CVE-2023-6915" ref_url="https://www.suse.com/security/cve/CVE-2023-6915/" source="CVE"/>
		<reference ref_id="CVE-2024-0340" ref_url="https://www.suse.com/security/cve/CVE-2024-0340/" source="CVE"/>
		<reference ref_id="CVE-2024-0565" ref_url="https://www.suse.com/security/cve/CVE-2024-0565/" source="CVE"/>
		<reference ref_id="CVE-2024-0641" ref_url="https://www.suse.com/security/cve/CVE-2024-0641/" source="CVE"/>
		<reference ref_id="CVE-2024-0775" ref_url="https://www.suse.com/security/cve/CVE-2024-0775/" source="CVE"/>
		<reference ref_id="CVE-2024-1085" ref_url="https://www.suse.com/security/cve/CVE-2024-1085/" source="CVE"/>
		<reference ref_id="CVE-2024-1086" ref_url="https://www.suse.com/security/cve/CVE-2024-1086/" source="CVE"/>
		<reference ref_id="CVE-2024-24860" ref_url="https://www.suse.com/security/cve/CVE-2024-24860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the nft_setelem_catchall_deactivate() function (bsc#1219429).
- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).
- CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128).
- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).
- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).
- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).
- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).
- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).
- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).
- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).
- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275).
- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).
- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).
- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).
- CVE-2024-0641: Fixed a denial of service vulnerability in tipc_crypto_key_revoke in net/tipc/crypto.c (bsc#1218916).
- CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832).
- CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804).
- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).
- CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447).
- CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg() (bsc#1218689).
- CVE-2024-24860: Fixed a denial of service caused by a race condition in {min,max}_key_size_set() (bsc#1219608).

The following non-security bugs were fixed:

- Store the old kernel changelog entries in kernel-docs package (bsc#1218713).
- Documentation: RAS: Add index and address translation section (jsc#PED-7618).
- ACPI: LPIT: Avoid u32 multiplication overflow (git-fixes).
- ACPI: LPSS: Fix the fractional clock divider flags (git-fixes).
- ACPI: arm64: export acpi_arch_thermal_cpufreq_pctg() (bsc#1214377)
- ACPI: extlog: Clear Extended Error Log status when RAS_CEC handled the error (git-fixes).
- ACPI: processor: reduce CPUFREQ thermal reduction pctg for Tegra241 (bsc#1214377)
- ACPI: property: Allow _DSD buffer data only for byte accessors (git-fixes).
- ACPI: resource: Add another DMI match for the TongFang GMxXGxx (git-fixes).
- ACPI: thermal: Add Thermal fast Sampling Period (_TFP) support (bsc#1214377)
- ACPI: video: check for error while searching for backlight device parent (git-fixes).
- ALSA: hda/conexant: Fix headset auto detect fail in cx8070 and SN6140 (git-fixes).
- ALSA: hda/cs8409: Suppress vmaster control for Dolphin models (git-fixes).
- ALSA: hda/realtek: Add quirks for ASUS Zenbook 2022 Models (git-fixes).
- ALSA: hda/realtek: Enable headset mic on Lenovo M70 Gen5 (git-fixes).
- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on HP ZBook (git-fixes).
- ALSA: hda/realtek: Fix mute and mic-mute LEDs for HP Envy X360 13-ay0xxx (git-fixes).
- ALSA: hda/relatek: Enable Mute LED on HP Laptop 15s-fq2xxx (git-fixes).
- ALSA: hda: Refer to correct stream index at loops (git-fixes).
- ALSA: hda: intel-nhlt: Ignore vbps when looking for DMIC 32 bps format (git-fixes).
- ALSA: oxygen: Fix right channel of capture volume mixer (git-fixes).
- ASoC: Intel: Skylake: Fix mem leak in few functions (git-fixes).
- ASoC: Intel: Skylake: mem leak in skl register function (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Medion Lifetab S10346 (git-fixes).
- ASoC: Intel: glk_rt5682_max98357a: fix board id mismatch (git-fixes).
- ASoC: amd: Add Dell G15 5525 to quirks list (bsc#1219136).
- ASoC: amd: Add check for acp config flags (bsc#1219136).
- ASoC: amd: Add new dmi entries to config entry (bsc#1219136).
- ASoC: amd: Drop da7219_aad_jack_det() usage (bsc#1219136).
- ASoC: amd: Drop empty platform remove function (bsc#1219136).
- ASoC: amd: Update Pink Sardine platform ACP register header (bsc#1219136).
- ASoC: amd: acp-config: Add missing MODULE_DESCRIPTION (git-fixes).
- ASoC: amd: acp-da7219-max98357a: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp-rt5645: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp3x-rt5682-max9836: Configure jack as not detecting Line Out (bsc#1219136).
- ASoC: amd: acp3x-rt5682-max9836: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp: Add TDM slots setting support for ACP I2S controller (bsc#1219136).
- ASoC: amd: acp: Add TDM support for acp i2s stream (bsc#1219136).
- ASoC: amd: acp: Add i2s tdm support in machine driver (bsc#1219136).
- ASoC: amd: acp: Add kcontrols and widgets per-codec in common code (bsc#1219136).
- ASoC: amd: acp: Add missing MODULE_DESCRIPTION in mach-common (git-fixes).
- ASoC: amd: acp: Add new cpu dai's in machine driver (bsc#1219136).
- ASoC: amd: acp: Add setbias level for rt5682s codec in machine driver (bsc#1219136).
- ASoC: amd: acp: Enable i2s tdm support for skyrim platforms (bsc#1219136).
- ASoC: amd: acp: Fix possible UAF in acp_dma_open (bsc#1219136).
- ASoC: amd: acp: Initialize list to store acp_stream during pcm_open (bsc#1219136).
- ASoC: amd: acp: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp: Modify dai_id macros to be more generic (bsc#1219136).
- ASoC: amd: acp: Refactor bit width calculation (bsc#1219136).
- ASoC: amd: acp: Refactor dai format implementation (bsc#1219136).
- ASoC: amd: acp: Refactor i2s clocks programming sequence (bsc#1219136).
- ASoC: amd: acp: add a label to make error path more clean (bsc#1219136).
- ASoC: amd: acp: add acp i2s master clock generation for rembrandt platform (bsc#1219136).
- ASoC: amd: acp: add pm ops support for acp pci driver (bsc#1219136).
- ASoC: amd: acp: add pm ops support for rembrandt platform (bsc#1219136).
- ASoC: amd: acp: clean up some inconsistent indentings (bsc#1219136).
- ASoC: amd: acp: clear pdm dma interrupt mask (bsc#1219136).
- ASoC: amd: acp: delete unnecessary NULL check (bsc#1219136).
- ASoC: amd: acp: export config_acp_dma() and config_pte_for_stream() symbols (bsc#1219136).
- ASoC: amd: acp: fix SND_SOC_AMD_ACP_PCI depdenencies (bsc#1219136).
- ASoC: amd: acp: move pdm macros to common header file (bsc#1219136).
- ASoC: amd: acp: refactor the acp init and de-init sequence (bsc#1219136).
- ASoC: amd: acp: rembrandt: Drop if blocks with always false condition (bsc#1219136).
- ASoC: amd: acp: remove acp poweroff function (bsc#1219136).
- ASoC: amd: acp: remove the redundant acp enable/disable interrupts functions (bsc#1219136).
- ASoC: amd: acp: remove unnecessary NULL checks (bsc#1219136).
- ASoC: amd: acp: store platform device reference created in pci probe call (bsc#1219136).
- ASoC: amd: acp: store the pdm stream channel mask (bsc#1219136).
- ASoC: amd: acp: store xfer_resolution of the stream (bsc#1219136).
- ASoC: amd: acp: switch to use dev_err_probe() (bsc#1219136).
- ASoC: amd: acp: use devm_kcalloc() instead of devm_kzalloc() (bsc#1219136).
- ASoC: amd: acp: use function devm_kcalloc() instead of devm_kzalloc() (bsc#1219136).
- ASoC: amd: add Pink Sardine ACP PCI driver (bsc#1219136).
- ASoC: amd: add Pink Sardine machine driver using dmic (bsc#1219136).
- ASoC: amd: add Pink Sardine platform ACP IP register header (bsc#1219136).
- ASoC: amd: add acp6.2 init/de-init functions (bsc#1219136).
- ASoC: amd: add acp6.2 irq handler (bsc#1219136).
- ASoC: amd: add acp6.2 pci driver pm ops (bsc#1219136).
- ASoC: amd: add acp6.2 pdm driver dma ops (bsc#1219136).
- ASoC: amd: add acp6.2 pdm driver pm ops (bsc#1219136).
- ASoC: amd: add acp6.2 pdm platform driver (bsc#1219136).
- ASoC: amd: add platform devices for acp6.2 pdm driver and dmic driver (bsc#1219136).
- ASoC: amd: create platform device for acp6.2 machine driver (bsc#1219136).
- ASoC: amd: enable Pink Sardine acp6.2 drivers build (bsc#1219136).
- ASoC: amd: enable Pink sardine platform machine driver build (bsc#1219136).
- ASoC: amd: fix ACP version typo mistake (bsc#1219136).
- ASoC: amd: fix spelling mistake: 'i.e' -&gt; 'i.e.' (bsc#1219136).
- ASoC: amd: ps: Add a module parameter to influence pdm_gain (bsc#1219136).
- ASoC: amd: ps: Adjust the gain for PDM DMIC (bsc#1219136).
- ASoC: amd: ps: Fix uninitialized ret in create_acp64_platform_devs() (bsc#1219136).
- ASoC: amd: ps: Move acp63_dev_data strcture from PCI driver (bsc#1219136).
- ASoC: amd: ps: Update copyright notice (bsc#1219136).
- ASoC: amd: ps: add mutex lock for accessing common registers (bsc#1219136).
- ASoC: amd: ps: fix for acp_lock access in pdm driver (bsc#1219136).
- ASoC: amd: ps: implement api to retrieve acp device config (bsc#1219136).
- ASoC: amd: ps: move irq handler registration (bsc#1219136).
- ASoC: amd: ps: refactor acp power on and reset functions (bsc#1219136).
- ASoC: amd: ps: refactor platform device creation logic (bsc#1219136).
- ASoC: amd: ps: remove the register read and write wrappers (bsc#1219136).
- ASoC: amd: ps: remove unused variable (bsc#1219136).
- ASoC: amd: ps: update dev index value in irq handler (bsc#1219136).
- ASoC: amd: ps: update macros with ps platform naming convention (bsc#1219136).
- ASoC: amd: ps: update the acp clock source (bsc#1219136).
- ASoC: amd: ps: use acp_lock to protect common registers in pdm driver (bsc#1219136).
- ASoC: amd: ps: use static function (bsc#1219136).
- ASoC: amd: renoir: Add a module parameter to influence pdm_gain (bsc#1219136).
- ASoC: amd: renoir: Adjust the gain for PDM DMIC (bsc#1219136).
- ASoC: amd: update pm_runtime enable sequence (bsc#1219136).
- ASoC: amd: vangogh: Add check for acp config flags in vangogh platform (bsc#1219136).
- ASoC: amd: vangogh: Make use of DRV_NAME (bsc#1219136).
- ASoC: amd: vangogh: Remove unnecessary init function (bsc#1219136).
- ASoC: amd: vangogh: select CONFIG_SND_AMD_ACP_CONFIG (bsc#1219136).
- ASoC: amd: yc: Add ASUS M3402RA into DMI table (bsc#1219136).
- ASoC: amd: yc: Add ASUS M5402RA into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Alienware m17 R5 AMD into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Asus VivoBook Pro 14 OLED M6400RC to the quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A42) (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A43) (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support Victus by HP Gaming Laptop 15-fb0xxx (8A3E) (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support Victus by HP Laptop 16-e1xxx (8A22) (bsc#1219136).
- ASoC: amd: yc: Add DMI entry to support System76 Pangolin 12 (bsc#1219136).
- ASoC: amd: yc: Add DMI entry to support System76 Pangolin 13 (bsc#1219136).
- ASoC: amd: yc: Add DMI support for new acer/emdoor platforms (bsc#1219136).
- ASoC: amd: yc: Add HP 255 G10 into quirk table (bsc#1219136).
- ASoC: amd: yc: Add Lenovo Thinkbook 14+ 2022 21D0 to quirks table (bsc#1219136).
- ASoC: amd: yc: Add MECHREVO Jiaolong Series MRID6 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Razer Blade 14 2022 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add ThinkBook 14 G5+ ARP to quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add Thinkpad Neo14 to quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add VivoBook Pro 15 to quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add Xiaomi Redmi Book Pro 14 2022 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Xiaomi Redmi Book Pro 15 2022 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add a module parameter to influence pdm_gain (bsc#1219136).
- ASoC: amd: yc: Adding Lenovo ThinkBook 14 Gen 4+ ARA and Lenovo ThinkBook 16 Gen 4+ ARA to the Quirks List (bsc#1219136).
- ASoC: amd: yc: Adjust the gain for PDM DMIC (bsc#1219136).
- ASoC: amd: yc: Fix a non-functional mic on Lenovo 82TL (bsc#1219136).
- ASoC: amd: yc: Fix non-functional mic on ASUS E1504FA (bsc#1219136).
- ASoC: amd: yp: Add OMEN by HP Gaming Laptop 16z-n000 to quirks (bsc#1219136).
- ASoC: codecs: lpass-wsa-macro: fix compander volume hack (git-fixes).
- ASoC: codecs: wcd938x: fix headphones volume controls (git-fixes).
- ASoC: codecs: wcd938x: handle deferred probe (git-fixes).
- ASoC: cs35l33: Fix GPIO name and drop legacy include (git-fixes).
- ASoC: cs43130: Fix incorrect frame delay configuration (git-fixes).
- ASoC: cs43130: Fix the position of const qualifier (git-fixes).
- ASoC: da7219: Support low DC impedance headset (git-fixes).
- ASoC: nau8822: Fix incorrect type in assignment and cast to restricted __be16 (git-fixes).
- ASoC: ops: add correct range check for limiting volume (git-fixes).
- ASoC: rt5645: Drop double EF20 entry from dmi_platform_data[] (git-fixes).
- ASoC: rt5650: add mutex to avoid the jack detection failure (git-fixes).
- ASoC: sun4i-spdif: Fix requirements for H6 (git-fixes).
- ASoC: wm8974: Correct boost mixer inputs (git-fixes).
- Add DMI ID for MSI Bravo 15 B7ED (bsc#1219136).
- Bluetooth: Fix atomicity violation in {min,max}_key_size_set (git-fixes).
- Bluetooth: btmtkuart: fix recv_buf() return value (git-fixes).
- Documentation: Begin a RAS section (jsc#PED-7622).
- EDAC/amd64: Add MI300 row retirement support (jsc#PED-7618).
- EDAC/amd64: Add context struct (jsc#PED-7615).
- EDAC/amd64: Add get_err_info() to pvt-&gt;ops (jsc#PED-7615).
- EDAC/amd64: Add support for AMD heterogeneous Family 19h Model 30h-3Fh (jsc#PED-7616).
- EDAC/amd64: Add support for ECC on family 19h model 60h-7Fh (jsc#PED-7615).
- EDAC/amd64: Add support for family 0x19, models 0x90-9f devices (jsc#PED-7622).
- EDAC/amd64: Allow for DF Indirect Broadcast reads (jsc#PED-7615).
- EDAC/amd64: Cache and use GPU node map (jsc#PED-7616).
- EDAC/amd64: Do not discover ECC symbol size for Family 17h and later (jsc#PED-7615).
- EDAC/amd64: Do not set up EDAC PCI control on Family 17h+ (jsc#PED-7615).
- EDAC/amd64: Document heterogeneous system enumeration (jsc#PED-7616).
- EDAC/amd64: Drop dbam_to_cs() for Family 17h and later (jsc#PED-7615).
- EDAC/amd64: Fix indentation in umc_determine_edac_cap() (jsc#PED-7615).
- EDAC/amd64: Merge struct amd64_family_type into struct amd64_pvt (jsc#PED-7615).
- EDAC/amd64: Remove PCI Function 0 (jsc#PED-7615).
- EDAC/amd64: Remove PCI Function 6 (jsc#PED-7615).
- EDAC/amd64: Remove early_channel_count() (jsc#PED-7615).
- EDAC/amd64: Remove module version string (jsc#PED-7615).
- EDAC/amd64: Remove scrub rate control for Family 17h and later (jsc#PED-7615).
- EDAC/amd64: Rename debug_display_dimm_sizes() (jsc#PED-7615).
- EDAC/amd64: Rename f17h_determine_edac_ctl_cap() (jsc#PED-7615).
- EDAC/amd64: Rework hw_info_{get,put} (jsc#PED-7615).
- EDAC/amd64: Shut up an -Werror,-Wsometimes-uninitialized clang false positive (jsc#PED-7615).
- EDAC/amd64: Split determine_edac_cap() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split determine_memory_type() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split dump_misc_regs() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split ecc_enabled() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split get_csrow_nr_pages() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split init_csrows() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split prep_chip_selects() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split read_base_mask() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split read_mc_regs() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split setup_mci_misc_attrs() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Use new AMD Address Translation Library (jsc#PED-7618).
- EDAC/mc: Add new HBM2 memory type (jsc#PED-7616).
- EDAC/mc: Add support for HBM3 memory type (jsc#PED-7622).
- EDAC/mce_amd: Remove SMCA Extended Error code descriptions (jsc#PED-7622).
- EDAC/thunderx: Fix possible out-of-bounds string access (git-fixes).
- Fix crash in vmw_context_cotables_unref when 3d support is enabled (bsc#1218738)
- HID: i2c-hid-of: fix NULL-deref on failed power up (git-fixes).
- HID: wacom: Correct behavior when processing some confidence == false touches (git-fixes).
- IB/iser: Prevent invalidating wrong MR (git-fixes)
- Input: atkbd - do not skip atkbd_deactivate() when skipping ATKBD_CMD_GETID (git-fixes).
- Input: atkbd - skip ATKBD_CMD_GETID in translated mode (git-fixes).
- Input: atkbd - skip ATKBD_CMD_SETLEDS when skipping ATKBD_CMD_GETID (git-fixes).
- Input: atkbd - use ab83 as id when skipping the getid command (git-fixes).
- Input: bcm5974 - check endpoint type before starting traffic (git-fixes).
- Input: i8042 - add nomux quirk for Acer P459-G2-M (git-fixes).
- Input: xpad - add Razer Wolverine V2 support (git-fixes).
- KVM: SVM: Update EFER software model on CR0 trap for SEV-ES (git-fixes).
- KVM: s390: vsie: Fix STFLE interpretive execution identification (git-fixes bsc#1218997).
- KVM: x86: Mask LVTPC when handling a PMI (jsc#PED-7322).
- PCI/AER: Configure ECRC only if AER is native (bsc#1218778)
- PCI/P2PDMA: Remove reference to pci_p2pdma_map_sg() (git-fixes).
- PCI: Add ACS quirk for more Zhaoxin Root Ports (git-fixes).
- PCI: keystone: Fix race condition when initializing PHYs (git-fixes).
- PM: hibernate: Enforce ordering during image compression/decompression (git-fixes).
- RAS/AMD/ATL: Add MI300 DRAM to normalized address translation support (jsc#PED-7618).
- RAS/AMD/ATL: Add MI300 support (jsc#PED-7618).
- RAS/AMD/ATL: Fix array overflow in get_logical_coh_st_fabric_id_mi300() (jsc#PED-7618).
- RAS: Introduce AMD Address Translation Library (jsc#PED-7618).
- RDMA/hns: Fix inappropriate err code for unsupported operations (git-fixes)
- RDMA/hns: Fix unnecessary err return when using invalid congest control algorithm (git-fixes)
- RDMA/hns: Remove unnecessary checks for NULL in mtr_alloc_bufs() (git-fixes)
- RDMA/irdma: Add wait for suspend on SQD (git-fixes)
- RDMA/irdma: Avoid free the non-cqp_request scratch (git-fixes)
- RDMA/irdma: Do not modify to SQD on error (git-fixes)
- RDMA/irdma: Fix UAF in irdma_sc_ccq_get_cqe_info() (git-fixes)
- RDMA/irdma: Refactor error handling in create CQP (git-fixes)
- RDMA/rtrs-clt: Fix the max_send_wr setting (git-fixes)
- RDMA/rtrs-clt: Remove the warnings for req in_use check (git-fixes)
- RDMA/rtrs-clt: Start hb after path_up (git-fixes)
- RDMA/rtrs-srv: Check return values while processing info request (git-fixes)
- RDMA/rtrs-srv: Destroy path files after making sure no IOs in-flight (git-fixes)
- RDMA/rtrs-srv: Do not unconditionally enable irq (git-fixes)
- RDMA/rtrs-srv: Free srv_mr iu only when always_invalidate is true (git-fixes)
- RDMA/usnic: Silence uninitialized symbol smatch warnings (git-fixes)
- USB: xhci: workaround for grace period (git-fixes).
- Update config files: enable ASoC AMD PS drivers (bsc#1219136)
- acpi: property: Let args be NULL in __acpi_node_get_property_reference (git-fixes).
- aio: fix mremap after fork null-deref (git-fixes).
- apparmor: avoid crash when parsed profile name is empty (git-fixes).
- arm64: Add CNT{P,V}CTSS_EL0 alternatives to cnt{p,v}ct_el0 (jsc#PED-4729)
- arm64: Add a capability for FEAT_ECV (jsc#PED-4729) Use cpu_hwcaps PLACEHOLDER_4 for HAS_ECV.
- arm64: alternative: patch alternatives in the vDSO (jsc#PED-4729)
- arm64: dts: armada-3720-turris-mox: set irq type for RTC (git-fixes)
- arm64: dts: imx8mp: imx8mq: Add parkmode-disable-ss-quirk on DWC3 (git-fixes)
- arm64: dts: imx8mq: drop usb3-resume-missing-cas from usb (git-fixes)
- arm64: dts: ls208xa: use a pseudo-bus to constrain usb dma size (git-fixes)
- arm64: dts: rockchip: Expand reg size of vdec node for RK3399 (git-fixes)
- arm64: mm: Always make sw-dirty PTEs hw-dirty in pte_modify (git-fixes)
- arm64: module: move find_section to header (jsc#PED-4729)
- arm64: vdso: Fix 'no previous prototype' warning (jsc#PED-4729)
- arm64: vdso: remove two .altinstructions related symbols (jsc#PED-4729)
- arm64: vdso: use SYS_CNTVCTSS_EL0 for gettimeofday (jsc#PED-4729)
- asix: Add check for usbnet_get_endpoints (git-fixes).
- attr: block mode changes of symlinks (git-fixes).
- badblocks: add helper routines for badblock ranges handling (bsc#1174649).
- badblocks: add more helper structure and routines in badblocks.h (bsc#1174649).
- badblocks: avoid checking invalid range in badblocks_check() (bsc#1174649).
- badblocks: improve badblocks_check() for multiple ranges handling (bsc#1174649).
- badblocks: improve badblocks_clear() for multiple ranges handling (bsc#1174649).
- badblocks: improve badblocks_set() for multiple ranges handling (bsc#1174649).
- badblocks: switch to the improved badblock handling code (bsc#1174649).
- bpf: Limit the number of kprobes when attaching program to multiple kprobes (git-fixes).
- bus: mhi: host: Add alignment check for event ring read pointer (git-fixes).
- bus: mhi: host: Add spinlock to protect WP access when queueing TREs (git-fixes).
- bus: mhi: host: Drop chan lock before queuing buffers (git-fixes).
- ceph: select FS_ENCRYPTION_ALGS if FS_ENCRYPTION (bsc#1219568).
- clk: qcom: gpucc-sm8150: Update the gpu_cc_pll1 config (git-fixes).
- clk: qcom: videocc-sm8150: Add missing PLL config property (git-fixes).
- clk: rockchip: rk3128: Fix HCLK_OTG gate register (git-fixes).
- clk: samsung: Fix kernel-doc comments (git-fixes).
- clk: si5341: fix an error code problem in si5341_output_clk_set_rate (git-fixes).
- clk: zynqmp: Add a check for NULL pointer (git-fixes).
- clk: zynqmp: make bestdiv unsigned (git-fixes).
- clocksource: Skip watchdog check for large watchdog intervals (git-fixes).
- clocksource: disable watchdog checks on TSC when TSC is watchdog (bsc#1215885).
- coresight: etm4x: Add ACPI support in platform driver (bsc#1218779)
- coresight: etm4x: Allocate and device assign 'struct etmv4_drvdata' (bsc#1218779)
- coresight: etm4x: Change etm4_platform_driver driver for MMIO devices (bsc#1218779)
- coresight: etm4x: Drop iomem 'base' argument from etm4_probe() (bsc#1218779)
- coresight: etm4x: Drop pid argument from etm4_probe() (bsc#1218779)
- coresight: etm4x: Ensure valid drvdata and clock before clk_put() (bsc#1218779)
- coresight: platform: acpi: Ignore the absence of graph (bsc#1218779)
- crypto: ccp - fix memleak in ccp_init_dm_workarea (git-fixes).
- crypto: s390/aes - Fix buffer overread in CTR mode (git-fixes).
- crypto: sa2ul - Return crypto_aead_setkey to transfer the error (git-fixes).
- crypto: sahara - do not resize req-&gt;src when doing hash operations (git-fixes).
- crypto: sahara - fix ahash reqsize (git-fixes).
- crypto: sahara - fix ahash selftest failure (git-fixes).
- crypto: sahara - fix cbc selftest failure (git-fixes).
- crypto: sahara - fix processing hash requests with req-&gt;nbytes &amp;lt; sg-&gt;length (git-fixes).
- crypto: sahara - fix processing requests with cryptlen &amp;lt; sg-&gt;length (git-fixes).
- crypto: sahara - fix wait_for_completion_timeout() error handling (git-fixes).
- crypto: sahara - handle zero-length aes requests (git-fixes).
- crypto: sahara - improve error handling in sahara_sha_process() (git-fixes).
- crypto: sahara - remove FLAGS_NEW_KEY logic (git-fixes).
- crypto: scomp - fix req-&gt;dst buffer overflow (git-fixes).
- dma-debug: fix kernel-doc warnings (git-fixes).
- dmaengine: fix NULL pointer in channel unregistration function (git-fixes).
- dmaengine: fix is_slave_direction() return false when DMA_DEV_TO_DEV (git-fixes).
- dmaengine: fsl-dpaa2-qdma: Fix the size of dma pools (git-fixes).
- dmaengine: idxd: Protect int_handle field in hw descriptor (git-fixes).
- dmaengine: ti: k3-udma: Report short packet errors (git-fixes).
- doc/README.KSYMS: Add to repo.
- drivers/amd/pm: fix a use-after-free in kv_parse_power_table (git-fixes).
- drivers: clk: zynqmp: calculate closest mux rate (git-fixes).
- drivers: clk: zynqmp: update divider round rate logic (git-fixes).
- drm/amd/display: Fix tiled display misalignment (git-fixes).
- drm/amd/display: Port DENTIST hang and TDR fixes to OTG disable W/A (git-fixes).
- drm/amd/display: add nv12 bounding box (git-fixes).
- drm/amd/display: get dprefclk ss info from integration info table (git-fixes).
- drm/amd/display: make flip_timestamp_in_us a 64-bit variable (git-fixes).
- drm/amd/display: pbn_div need be updated for hotplug event (git-fixes).
- drm/amd/display: update dcn315 lpddr pstate latency (git-fixes).
- drm/amd/pm/smu7: fix a memleak in smu7_hwmgr_backend_init (git-fixes).
- drm/amd/pm: fix a double-free in amdgpu_parse_extended_power_table (git-fixes).
- drm/amd/pm: fix a double-free in si_dpm_init (git-fixes).
- drm/amd/powerplay: Fix kzalloc parameter 'ATOM_Tonga_PPM_Table' in 'get_platform_power_management_table()' (git-fixes).
- drm/amdgpu/debugfs: fix error code when smc register accessors are NULL (git-fixes).
- drm/amdgpu/pm: Fix the power source flag error (git-fixes).
- drm/amdgpu: Add NULL checks for function pointers (git-fixes).
- drm/amdgpu: Drop 'fence' check in 'to_amdgpu_amdkfd_fence()' (git-fixes).
- drm/amdgpu: Fix '*fw' from request_firmware() not released in 'amdgpu_ucode_request()' (git-fixes).
- drm/amdgpu: Fix cat debugfs amdgpu_regs_didt causes kernel null pointer (git-fixes).
- drm/amdgpu: Fix ecc irq enable/disable unpaired (git-fixes).
- drm/amdgpu: Fix missing error code in 'gmc_v6/7/8/9_0_hw_init()' (git-fixes).
- drm/amdgpu: Fix with right return code '-EIO' in 'amdgpu_gmc_vram_checking()' (git-fixes).
- drm/amdgpu: Let KFD sync with VM fences (git-fixes).
- drm/amdgpu: Release 'adev-&gt;pm.fw' before return in 'amdgpu_device_need_post()' (git-fixes).
- drm/amdgpu: fix ftrace event amdgpu_bo_move always move on same heap (git-fixes).
- drm/amdgpu: skip gpu_info fw loading on navi12 (git-fixes).
- drm/amdkfd: Confirm list is non-empty before utilizing list_first_entry in kfd_topology.c (git-fixes).
- drm/amdkfd: Fix 'node' NULL check in 'svm_range_get_range_boundaries()' (git-fixes).
- drm/amdkfd: Fix iterator used outside loop in 'kfd_add_peer_prop()' (git-fixes).
- drm/amdkfd: Fix lock dependency warning (git-fixes).
- drm/amdkfd: Fix lock dependency warning with srcu (git-fixes).
- drm/amdkfd: Use resource_size() helper function (git-fixes).
- drm/amdkfd: fixes for HMM mem allocation (git-fixes).
- drm/bridge: Fix typo in post_disable() description (git-fixes).
- drm/bridge: anx7625: Ensure bridge is suspended in disable() (git-fixes).
- drm/bridge: cdns-mhdp8546: Fix use of uninitialized variable (git-fixes).
- drm/bridge: nxp-ptn3460: fix i2c_master_send() error checking (git-fixes).
- drm/bridge: nxp-ptn3460: simplify some error checking (git-fixes).
- drm/bridge: parade-ps8640: Ensure bridge is suspended in .post_disable() (git-fixes).
- drm/bridge: parade-ps8640: Make sure we drop the AUX mutex in the error case (git-fixes).
- drm/bridge: parade-ps8640: Wait for HPD when doing an AUX transfer (git-fixes).
- drm/bridge: tc358767: Fix return value on error case (git-fixes).
- drm/bridge: tpd12s015: Drop buggy __exit annotation for remove function (git-fixes).
- drm/crtc: Fix uninit-value bug in drm_mode_setcrtc (git-fixes).
- drm/crtc: fix uninitialized variable use (git-fixes).
- drm/drv: propagate errors from drm_modeset_register_all() (git-fixes).
- drm/exynos: Call drm_atomic_helper_shutdown() at shutdown/unbind time (git-fixes).
- drm/exynos: fix a potential error pointer dereference (git-fixes).
- drm/exynos: fix a wrong error checking (git-fixes).
- drm/exynos: fix accidental on-stack copy of exynos_drm_plane (git-fixes).
- drm/exynos: gsc: minor fix for loop iteration in gsc_runtime_resume (git-fixes).
- drm/framebuffer: Fix use of uninitialized variable (git-fixes).
- drm/mediatek: Return error if MDP RDMA failed to enable the clock (git-fixes).
- drm/msm/dpu: Drop enable and frame_count parameters from dpu_hw_setup_misr() (git-fixes).
- drm/msm/dpu: Ratelimit framedone timeout msgs (git-fixes).
- drm/msm/dpu: Set input_sel bit for INTF (git-fixes).
- drm/msm/dpu: fix writeback programming for YUV cases (git-fixes).
- drm/msm/dpu: rename dpu_encoder_phys_wb_setup_cdp to match its functionality (git-fixes).
- drm/msm/dsi: Enable runtime PM (git-fixes).
- drm/msm/dsi: Use pm_runtime_resume_and_get to prevent refcnt leaks (git-fixes).
- drm/msm/mdp4: flush vblank event on disable (git-fixes).
- drm/nouveau/fence:: fix warning directly dereferencing a rcu pointer (git-fixes).
- drm/panel-edp: Add override_edid_mode quirk for generic edp (git-fixes).
- drm/panel-elida-kd35t133: hold panel in reset for unprepare (git-fixes).
- drm/panel: nt35510: fix typo (git-fixes).
- drm/panfrost: Ignore core_mask for poweroff and disable PWRTRANS irq (git-fixes).
- drm/panfrost: Really power off GPU cores in panfrost_gpu_power_off() (git-fixes).
- drm/radeon/dpm: fix a memleak in sumo_parse_power_table (git-fixes).
- drm/radeon/r100: Fix integer overflow issues in r100_cs_track_check() (git-fixes).
- drm/radeon/r600_cs: Fix possible int overflows in r600_cs_check_reg() (git-fixes).
- drm/radeon/trinity_dpm: fix a memleak in trinity_parse_power_table (git-fixes).
- drm/radeon: check return value of radeon_ring_lock() (git-fixes).
- drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() (git-fixes).
- drm/tidss: Check for K2G in in dispc_softreset() (git-fixes).
- drm/tidss: Fix atomic_flush check (git-fixes).
- drm/tidss: Fix dss reset (git-fixes).
- drm/tidss: Move reset to the end of dispc_init() (git-fixes).
- drm/tidss: Return error value from from softreset (git-fixes).
- drm/tilcdc: Fix irq free on unload (git-fixes).
- drm: Do not unref the same fb many times by mistake due to deadlock handling (git-fixes).
- drm: panel-simple: add missing bus flags for Tianma tm070jvhg[30/33] (git-fixes).
- drm: using mul_u32_u32() requires linux/math64.h (git-fixes).
- dt-bindings: gpio: Remove FSI domain ports on Tegra234 (jsc#PED-6694)
- efi/libstub: Disable PCI DMA before grabbing the EFI memory map (git-fixes).
- eventfd: prevent underflow for eventfd semaphores (git-fixes).
- exfat: fix reporting fs error when reading dir beyond EOF (git-fixes).
- exfat: support handle zero-size directory (git-fixes).
- exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree (git-fixes).
- fbdev: Only disable sysfb on the primary device (bsc#1216441)
- fbdev: flush deferred IO before closing (git-fixes).
- fbdev: flush deferred work in fb_deferred_io_fsync() (git-fixes).
- fbdev: imxfb: fix left margin setting (git-fixes).
- fbdev: mmp: Fix typo and wording in code comment (git-fixes).
- firewire: core: correct documentation of fw_csr_string() kernel API (git-fixes).
- firewire: ohci: suppress unexpected system reboot in AMD Ryzen machines and ASM108x/VT630x PCIe cards (git-fixes).
- firmware: ti_sci: Fix an off-by-one in ti_sci_debugfs_create() (git-fixes).
- fjes: fix memleaks in fjes_hw_setup (git-fixes).
- fs/mount_setattr: always cleanup mount_kattr (git-fixes).
- fs: Fix error checking for d_hash_and_lookup() (git-fixes).
- fs: Move notify_change permission checks into may_setattr (git-fixes).
- fs: do not audit the capability check in simple_xattr_list() (git-fixes).
- fs: drop peer group ids under namespace lock (git-fixes).
- fs: indicate request originates from old mount API (git-fixes).
- fs: sendfile handles O_NONBLOCK of out_fd (git-fixes).
- fuse: dax: set fc-&gt;dax to NULL in fuse_dax_conn_free() (bsc#1218659).
- gfs2: Always check inode size of inline inodes (git-fixes).
- gfs2: Cosmetic gfs2_dinode_{in,out} cleanup (git-fixes).
- gfs2: Disable page faults during lockless buffered reads (git-fixes).
- gfs2: Eliminate ip-&gt;i_gh (git-fixes).
- gfs2: Eliminate vestigial HIF_FIRST (git-fixes).
- gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump (git-fixes).
- gfs2: Introduce flag for glock holder auto-demotion (git-fixes).
- gfs2: Move the inode glock locking to gfs2_file_buffered_write (git-fixes).
- gfs2: Remove redundant check from gfs2_glock_dq (git-fixes).
- gfs2: Switch to wait_event in gfs2_logd (git-fixes).
- gfs2: assign rgrp glock before compute_bitstructs (git-fixes).
- gfs2: low-memory forced flush fixes (git-fixes).
- gfs2: release iopen glock early in evict (git-fixes).
- gpio: eic-sprd: Clear interrupt after set the interrupt type (git-fixes).
- gpu/drm/radeon: fix two memleaks in radeon_vm_init (git-fixes).
- hv_netvsc: rndis_filter needs to select NLS (git-fixes).
- hwmon: (corsair-psu) Fix probe when built-in (git-fixes).
- hwrng: core - Fix page fault dead lock on mmap-ed hwrng (git-fixes).
- i2c: rk3x: fix potential spinlock recursion on poll (git-fixes).
- i2c: s3c24xx: fix read transfers in polling mode (git-fixes).
- i2c: s3c24xx: fix transferring more than one message in polling mode (git-fixes).
- iio: adc: ad7091r: Pass iio_dev to event handler (git-fixes).
- iio: adc: ad9467: add mutex to struct ad9467_state (git-fixes).
- iio: adc: ad9467: do not ignore error codes (git-fixes).
- iio: adc: ad9467: fix reset gpio handling (git-fixes).
- ipmi: Use regspacings passed as a module parameter (git-fixes).
- kabi, vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).
- kabi/severities: ignore ASoC AMD acp driver symbols (bsc#1219136)
- kabi/severities: ignore _rtl92c_phy_calculate_bit_shift symbol It's an internal function that shouldn't have been exported
- kdb: Fix a potential buffer overflow in kdb_local() (git-fixes).
- kernel-doc: handle a void function without producing a warning (git-fixes).
- kernel-source: Fix description typo
- kernfs: fix missing kernfs_idr_lock to remove an ID from the IDR (git-fixes).
- leds: aw2013: Select missing dependency REGMAP_I2C (git-fixes).
- leds: ledtrig-tty: Free allocated ttyname buffer on deactivate (git-fixes).
- libapi: Add missing linux/types.h header to get the __u64 type on io.h (git-fixes).
- md: fix bi_status reporting in md_end_clone_io (bsc#1210443).
- media: cx231xx: fix a memleak in cx231xx_init_isoc (git-fixes).
- media: dt-bindings: ov8856: decouple lanes and link frequency from driver (git-fixes).
- media: dvb-frontends: m88ds3103: Fix a memory leak in an error handling path of m88ds3103_probe() (git-fixes).
- media: imx355: Enable runtime PM before registering async sub-device (git-fixes).
- media: ov9734: Enable runtime PM before registering async sub-device (git-fixes).
- media: pvrusb2: fix use after free on context disconnection (git-fixes).
- media: rkisp1: Disable runtime PM in probe error path (git-fixes).
- media: rkisp1: Fix media device memory leak (git-fixes).
- media: rkisp1: Read the ID register at probe time instead of streamon (git-fixes).
- media: videobuf2-dma-sg: fix vmap callback (git-fixes).
- mfd: intel-lpss: Fix the fractional clock divider flags (git-fixes).
- misc: fastrpc: Mark all sessions as invalid in cb_remove (git-fixes).
- mm: fs: initialize fsdata passed to write_begin/write_end interface (git-fixes).
- mmc: core: Cancel delayed work before releasing host (git-fixes).
- modpost: move __attribute__((format(printf, 2, 3))) to modpost.h (git-fixes).
- mtd: Fix gluebi NULL pointer dereference caused by ftl notifier (git-fixes).
- mtd: rawnand: Increment IFC_TIMEOUT_MSECS for nand controller response (git-fixes).
- mtd: rawnand: pl353: Fix kernel doc (git-fixes).
- mtd: rawnand: rockchip: Add missing title to a kernel doc comment (git-fixes).
- mtd: rawnand: rockchip: Rename a structure (git-fixes).
- net: phy: micrel: populate .soft_reset for KSZ9131 (git-fixes).
- net: usb: ax88179_178a: Bind only to vendor-specific interface (bsc#1218948).
- net: usb: ax88179_178a: avoid two consecutive device resets (bsc#1218948).
- net: usb: ax88179_178a: move priv to driver_priv (git-fixes).
- net: usb: ax88179_178a: remove redundant init code (git-fixes).
- net: usb: ax88179_178a: restore state on resume (bsc#1218948).
- nfc: nci: free rx_data_reassembly skb on NCI device cleanup (git-fixes).
- nfsd4: add refcount for nfsd4_blocked_lock (bsc#1218968 bsc#1219349).
- nfsd: fix RELEASE_LOCKOWNER (bsc#1218968).
- nouveau/tu102: flush all pdbs on vmm flush (git-fixes).
- nouveau/vmm: do not set addr on the fail path to avoid warning (git-fixes).
- nsfs: add compat ioctl handler (git-fixes).
- nvme-loop: always quiesce and cancel commands before destroying admin q (bsc#1211515).
- nvme-pci: add BOGUS_NID for Intel 0a54 device (git-fixes).
- nvme-pci: fix sleeping function called from interrupt context (git-fixes).
- nvme-rdma: Fix transfer length when write_generate/read_verify are 0 (git-fixes).
- nvme-tcp: avoid open-coding nvme_tcp_teardown_admin_queue() (bsc#1211515).
- nvme: fix max_discard_sectors calculation (git-fixes).
- nvme: introduce helper function to get ctrl state (git-fixes).
- nvme: move nvme_stop_keep_alive() back to original position (bsc#1211515).
- nvme: start keep-alive after admin queue setup (bsc#1211515).
- nvme: trace: avoid memcpy overflow warning (git-fixes).
- nvmet: re-fix tracing strncpy() warning (git-fixes).
- of: Fix double free in of_parse_phandle_with_args_map (git-fixes).
- of: unittest: Fix of_count_phandle_with_args() expected value message (git-fixes).
- parport: parport_serial: Add Brainboxes BAR details (git-fixes).
- parport: parport_serial: Add Brainboxes device IDs and geometry (git-fixes).
- perf/x86/intel/uncore: Factor out topology_gidnid_map() (bsc#1218958).
- perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology() (bsc#1218958).
- perf/x86/uncore: Use u64 to replace unsigned for the uncore offsets array (bsc#1219512).
- phy: renesas: rcar-gen3-usb2: Fix returning wrong error code (git-fixes).
- phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP (git-fixes).
- pinctrl: intel: Revert 'Unexport intel_pinctrl_probe()' (git-fixes).
- platform/x86/amd/hsmp: Fix iomem handling (jsc#PED-7620).
- platform/x86/amd/hsmp: add support for metrics tbl (jsc#PED-7620).
- platform/x86/amd/hsmp: create plat specific struct (jsc#PED-7620).
- platform/x86/amd/hsmp: improve the error log (jsc#PED-7620).
- platform/x86: ISST: Reduce noise for missing numa information in logs (bsc#1219285).
- platform/x86: use PLATFORM_DEVID_NONE instead of -1 (jsc#PED-7620).
- power: supply: bq256xx: fix some problem in bq256xx_hw_init (git-fixes).
- power: supply: cw2015: correct time_to_empty units in sysfs (git-fixes).
- powerpc/fadump: reset dump area size if fadump memory reserve fails (bsc#1194869).
- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).
- powerpc/powernv: Add a null pointer check in opal_powercap_init() (bsc#1181674 ltc#189159 git-fixes).
- powerpc/powernv: Add a null pointer check to scom_debug_init_one() (bsc#1194869).
- powerpc/pseries/iommu: enable_ddw incorrectly returns direct mapping for SR-IOV device (bsc#1212091 ltc#199106 git-fixes).
- powerpc/pseries/memhp: Fix access beyond end of drmem array (bsc#1065729).
- powerpc/pseries: fix possible memory leak in ibmebus_bus_init() (bsc#1194869).
- powerpc/pseries: fix potential memory leak in init_cpu_associativity() (bsc#1194869).
- powerpc/xive: Fix endian conversion size (bsc#1194869).
- pstore: ram_core: fix possible overflow in persistent_ram_init_ecc() (git-fixes).
- pwm: Fix out-of-bounds access in of_pwm_single_xlate() (git-fixes).
- pwm: jz4740: Do not use dev_err_probe() in .request() (git-fixes).
- pwm: stm32: Fix enable count for clk in .probe() (git-fixes).
- pwm: stm32: Use hweight32 in stm32_pwm_detect_channels (git-fixes).
- pwm: stm32: Use regmap_clear_bits and regmap_set_bits where applicable (git-fixes).
- r8152: add vendor/device ID pair for ASUS USB-C2500 (git-fixes).
- r8152: add vendor/device ID pair for D-Link DUB-E250 (git-fixes).
- reset: hisilicon: hi6220: fix Wvoid-pointer-to-enum-cast warning (git-fixes).
- ring-buffer/Documentation: Add documentation on buffer_percent file (git-fixes).
- ring-buffer: Do not record in NMI if the arch does not support cmpxchg in NMI (git-fixes).
- s390/dasd: fix double module refcount decrement (bsc#1141539).
- s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1219006).
- s390/vfio-ap: always filter entire AP matrix (git-fixes bsc#1219012).
- s390/vfio-ap: let on_scan_complete() callback filter matrix and update guest's APCB (git-fixes bsc#1219014).
- s390/vfio-ap: loop over the shadow APCB when filtering guest's AP configuration (git-fixes bsc#1219013).
- s390/vfio-ap: unpin pages on gisc registration failure (git-fixes bsc#1218723).
- s390: vfio-ap: tighten the NIB validity check (git-fixes).
- sched/isolation: add cpu_is_isolated() API (bsc#1217895).
- scripts/kernel-doc: restore warning for Excess struct/union (git-fixes).
- scsi: be2iscsi: Fix a memleak in beiscsi_init_wrb_handle() (git-fixes).
- scsi: bnx2fc: Fix skb double free in bnx2fc_rcv() (git-fixes).
- scsi: core: Always send batch on reset or error handling command (git-fixes).
- scsi: fnic: Return error if vmalloc() failed (git-fixes).
- scsi: hisi_sas: Correct the number of global debugfs registers (git-fixes).
- scsi: hisi_sas: Fix normally completed I/O analysed as failed (git-fixes).
- scsi: hisi_sas: Fix warnings detected by sparse (git-fixes).
- scsi: hisi_sas: Modify v3 HW SATA completion error processing (git-fixes).
- scsi: hisi_sas: Modify v3 HW SSP underflow error processing (git-fixes).
- scsi: hisi_sas: Rename HISI_SAS_{RESET -&gt; RESETTING}_BIT (git-fixes).
- scsi: hisi_sas: Replace with standard error code return value (git-fixes).
- scsi: hisi_sas: Rollback some operations if FLR failed (git-fixes).
- scsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs (git-fixes).
- scsi: ibmvfc: Fix erroneous use of rtas_busy_delay with hcall return code (git-fixes).
- scsi: ibmvfc: Implement channel queue depth and event buffer accounting (bsc#1209834 ltc#202097).
- scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (bsc#1209834 ltc#202097).
- scsi: iscsi: Rename iscsi_set_param() to iscsi_if_set_param() (git-fixes).
- scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (git-fixes).
- scsi: lpfc: Change VMID driver load time parameters to read only (bsc#1219582).
- scsi: lpfc: Move determination of vmid_flag after VMID reinitialization completes (bsc#1219582).
- scsi: lpfc: Reinitialize an NPIV's VMID data structures after FDISC (bsc#1219582).
- scsi: lpfc: Update lpfc version to 14.2.0.17 (bsc#1219582).
- scsi: megaraid_sas: Fix deadlock on firmware crashdump (git-fixes).
- scsi: megaraid_sas: Increase register read retry rount from 3 to 30 for selected registers (git-fixes).
- scsi: mpt3sas: Fix an outdated comment (git-fixes).
- scsi: mpt3sas: Fix in error path (git-fixes).
- scsi: mpt3sas: Fix loop logic (bsc#1219067).
- scsi: mpt3sas: Fix loop logic (git-fixes).
- scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command (git-fixes).
- scsi: pm80xx: Use phy-specific SAS address when sending PHY_START command (git-fixes).
- scsi: qla2xxx: Fix system crash due to bad pointer access (git-fixes).
- selftests/net: fix grep checking for fib_nexthop_multiprefix (git-fixes).
- serial: 8250: omap: Do not skip resource freeing if pm_runtime_resume_and_get() failed (git-fixes).
- serial: core: Fix atomicity violation in uart_tiocmget (git-fixes).
- serial: imx: Correct clock error message in function probe() (git-fixes).
- serial: imx: fix tx statemachine deadlock (git-fixes).
- serial: max310x: fail probe if clock crystal is unstable (git-fixes).
- serial: max310x: improve crystal stable clock detection (git-fixes).
- serial: max310x: set default value when reading clock ready bit (git-fixes).
- serial: sc16is7xx: add check for unsupported SPI modes during probe (git-fixes).
- serial: sc16is7xx: set safe default SPI clock frequency (git-fixes).
- serial: sccnxp: Improve error message if regulator_disable() fails (git-fixes).
- shmem: use ramfs_kill_sb() for kill_sb method of ramfs-based tmpfs (git-fixes).
- software node: Let args be NULL in software_node_get_reference_args (git-fixes).
- spi: spi-zynqmp-gqspi: fix driver kconfig dependencies (git-fixes).
- swiotlb-xen: provide the 'max_mapping_size' method (git-fixes).
- swiotlb: fix a braino in the alignment check fix (bsc#1216559).
- swiotlb: fix slot alignment checks (bsc#1216559).
- trace,smp: Add tracepoints around remotelly called functions (bsc#1217895).
- tracefs: Add missing lockdown check to tracefs_create_dir() (git-fixes).
- tracing/trigger: Fix to return error if failed to alloc snapshot (git-fixes).
- tracing: Add size check when printing trace_marker output (git-fixes).
- tracing: Ensure visibility when inserting an element into tracing_map (git-fixes).
- tracing: Fix uaf issue when open the hist or hist_debug file (git-fixes).
- tracing: Have large events show up as '[LINE TOO BIG]' instead of nothing (git-fixes).
- ubifs: Check @c-&gt;dirty_[n|p]n_cnt and @c-&gt;nroot state under @c-&gt;lp_mutex (git-fixes).
- ubifs: ubifs_link: Fix wrong name len calculating when UBIFS is encrypted (git-fixes).
- ubifs: ubifs_symlink: Fix memleak of inode-&gt;i_link in error path (git-fixes).
- uio: Fix use-after-free in uio_open (git-fixes).
- usb: cdns3: Fix uvc fail when DMA cross 4k boundery since sg enabled (git-fixes).
- usb: cdns3: fix uvc failure work since sg support enabled (git-fixes).
- usb: chipidea: wait controller resume finished for wakeup irq (git-fixes).
- usb: dwc: ep0: Update request status in dwc3_ep0_stall_restart (git-fixes).
- usb: fsl-mph-dr-of: mark fsl_usb2_mpc5121_init() static (git-fixes).
- usb: host: xhci-plat: Add support for XHCI_SG_TRB_CACHE_SIZE_QUIRK (git-fixes).
- usb: mon: Fix atomicity violation in mon_bin_vma_fault (git-fixes).
- usb: otg numberpad exception (bsc#1218527).
- usb: phy: mxs: remove CONFIG_USB_OTG condition for mxs_phy_is_otg_host() (git-fixes).
- usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes).
- usb: ucsi: Add missing ppm_lock (git-fixes).
- usb: ucsi_acpi: Fix command completion handling (git-fixes).
- usb: xhci-mtk: fix a short packet issue of gen1 isoc-in transfer (git-fixes).
- usr/Kconfig: fix typos of 'its' (git-fixes).
- vfs: make freeze_super abort when sync_filesystem returns error (git-fixes).
- vhost: Allow null msg.size on VHOST_IOTLB_INVALIDATE (git-fixes).
- virtio-mmio: fix memory leak of vm_dev (git-fixes).
- virtio_balloon: Fix endless deflation and inflation on arm64 (git-fixes).
- vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).
- vsock/virtio: Fix unsigned integer wrap around in virtio_transport_has_space() (git-fixes).
- watchdog/hpwdt: Only claim UNKNOWN NMI if from iLO (git-fixes).
- watchdog: bcm2835_wdt: Fix WDIOC_SETTIMEOUT handling (git-fixes).
- watchdog: rti_wdt: Drop runtime pm reference count when watchdog is unused (git-fixes).
- watchdog: set cdev owner before adding (git-fixes).
- wifi: ath11k: Defer on rproc_get failure (git-fixes).
- wifi: cfg80211: lock wiphy mutex for rfkill poll (git-fixes).
- wifi: iwlwifi: mvm: send TX path flush in rfkill (git-fixes).
- wifi: iwlwifi: mvm: set siso/mimo chains to 1 in FW SMPS request (git-fixes).
- wifi: iwlwifi: pcie: avoid a NULL pointer dereference (git-fixes).
- wifi: libertas: stop selecting wext (git-fixes).
- wifi: mt76: fix broken precal loading from MTD for mt7915 (git-fixes).
- wifi: mt76: mt7921s: fix workqueue problem causes STA association fail (git-fixes).
- wifi: mwifiex: configure BSSID consistently when starting AP (git-fixes).
- wifi: rtlwifi: Convert LNKCTL change to PCIe cap RMW accessors (git-fixes).
- wifi: rtlwifi: Remove bogus and dangerous ASPM disable/enable code (git-fixes).
- wifi: rtlwifi: add calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8188ee: phy: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192c: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192ce: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192cu: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192de: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192ee: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192se: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8821ae: phy: fix an undefined bitwise shift behavior (git-fixes).
- wifi: rtw88: fix RX filter in FIF_ALLMULTI flag (git-fixes).
- x86/MCE/AMD, EDAC/mce_amd: Decode UMC_V2 ECC errors (jsc#PED-7616).
- x86/MCE/AMD: Add new MA_LLC, USR_DP, and USR_CP bank types (jsc#PED-7622).
- x86/MCE/AMD: Split amd_mce_is_memory_error() (jsc#PED-7623).
- x86/amd_nb: Add AMD Family MI300 PCI IDs (jsc#PED-7622).
- x86/amd_nb: Add MI200 PCI IDs (jsc#PED-7616).
- x86/cpu: Merge Intel and AMD ppin_init() functions (jsc#PED-7615).
- x86/cpu: Read/save PPIN MSR during initialization (jsc#PED-7615).
- x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285).
- x86/hyperv: Fix the detection of E820_TYPE_PRAM in a Gen2 VM (git-fixes).
- x86/hyperv: Use atomic_try_cmpxchg() to micro-optimize hv_nmi_unknown() (git-fixes).
- x86/mce: Cleanup mce_usable_address() (jsc#PED-7623).
- x86/mce: Define amd_mce_usable_address() (jsc#PED-7623).
- xen-pciback: Consider INTx disabled when MSI/MSI-X is enabled (git-fixes).
- xen/events: fix delayed eoi list handling (git-fixes).
- xhci: Add grace period after xHC start to prevent premature runtime suspend (git-fixes).
- xhci: cleanup xhci_hub_control port references (git-fixes).
- xhci: pass port pointer as parameter to xhci_set_port_power() (git-fixes).
- xhci: track port suspend state correctly in unsuccessful resume cases (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-15"/>
	<updated date="2024-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108281">SUSE bug 1108281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141539">SUSE bug 1141539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174649">SUSE bug 1174649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181674">SUSE bug 1181674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193285">SUSE bug 1193285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209834">SUSE bug 1209834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210443">SUSE bug 1210443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211515">SUSE bug 1211515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212091">SUSE bug 1212091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214377">SUSE bug 1214377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215275">SUSE bug 1215275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215885">SUSE bug 1215885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216441">SUSE bug 1216441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216559">SUSE bug 1216559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216702">SUSE bug 1216702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217895">SUSE bug 1217895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217987">SUSE bug 1217987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217988">SUSE bug 1217988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217989">SUSE bug 1217989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218005">SUSE bug 1218005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218447">SUSE bug 1218447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218527">SUSE bug 1218527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218659">SUSE bug 1218659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218689">SUSE bug 1218689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218713">SUSE bug 1218713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218723">SUSE bug 1218723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218730">SUSE bug 1218730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218738">SUSE bug 1218738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218752">SUSE bug 1218752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218757">SUSE bug 1218757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218768">SUSE bug 1218768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218778">SUSE bug 1218778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218779">SUSE bug 1218779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218804">SUSE bug 1218804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218832">SUSE bug 1218832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218836">SUSE bug 1218836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218916">SUSE bug 1218916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218948">SUSE bug 1218948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218958">SUSE bug 1218958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218968">SUSE bug 1218968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218997">SUSE bug 1218997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219006">SUSE bug 1219006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219012">SUSE bug 1219012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219013">SUSE bug 1219013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219014">SUSE bug 1219014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219053">SUSE bug 1219053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219067">SUSE bug 1219067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219120">SUSE bug 1219120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219128">SUSE bug 1219128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219136">SUSE bug 1219136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219285">SUSE bug 1219285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219349">SUSE bug 1219349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219412">SUSE bug 1219412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219429">SUSE bug 1219429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219434">SUSE bug 1219434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219490">SUSE bug 1219490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219512">SUSE bug 1219512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219568">SUSE bug 1219568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219582">SUSE bug 1219582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219608">SUSE bug 1219608</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33631/">CVE-2021-33631 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33631">CVE-2021-33631 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46838/">CVE-2023-46838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46838">CVE-2023-46838 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47233/">CVE-2023-47233 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47233">CVE-2023-47233 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4921/">CVE-2023-4921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4921">CVE-2023-4921 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51042/">CVE-2023-51042 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51042">CVE-2023-51042 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51043/">CVE-2023-51043 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51043">CVE-2023-51043 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51780/">CVE-2023-51780 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51780">CVE-2023-51780 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51782/">CVE-2023-51782 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51782">CVE-2023-51782 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-6040/">CVE-2023-6040 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6040">CVE-2023-6040 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6356/">CVE-2023-6356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6356">CVE-2023-6356 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6531/">CVE-2023-6531 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6531">CVE-2023-6531 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6535/">CVE-2023-6535 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6535">CVE-2023-6535 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6536/">CVE-2023-6536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6536">CVE-2023-6536 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6915/">CVE-2023-6915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6915">CVE-2023-6915 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-0340/">CVE-2024-0340 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0340">CVE-2024-0340 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0565/">CVE-2024-0565 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0565">CVE-2024-0565 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0641/">CVE-2024-0641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0641">CVE-2024-0641 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0775/">CVE-2024-0775 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0775">CVE-2024-0775 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1085/">CVE-2024-1085 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1085">CVE-2024-1085 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1086/">CVE-2024-1086 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1086">CVE-2024-1086 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24860/">CVE-2024-24860 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24860">CVE-2024-24860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846459" comment="cluster-md-kmp-azure-5.14.21-150500.33.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846460" comment="dlm-kmp-azure-5.14.21-150500.33.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846461" comment="gfs2-kmp-azure-5.14.21-150500.33.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846462" comment="kernel-azure-5.14.21-150500.33.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846463" comment="kernel-azure-devel-5.14.21-150500.33.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846464" comment="kernel-azure-extra-5.14.21-150500.33.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846465" comment="kernel-azure-livepatch-devel-5.14.21-150500.33.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846466" comment="kernel-azure-optional-5.14.21-150500.33.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846467" comment="kernel-azure-vdso-5.14.21-150500.33.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846468" comment="kernel-devel-azure-5.14.21-150500.33.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846469" comment="kernel-source-azure-5.14.21-150500.33.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846470" comment="kernel-syms-azure-5.14.21-150500.33.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846471" comment="kselftests-kmp-azure-5.14.21-150500.33.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846472" comment="ocfs2-kmp-azure-5.14.21-150500.33.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846473" comment="reiserfs-kmp-azure-5.14.21-150500.33.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5180" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1108281" ref_url="https://bugzilla.suse.com/1108281" source="BUGZILLA"/>
		<reference ref_id="1141539" ref_url="https://bugzilla.suse.com/1141539" source="BUGZILLA"/>
		<reference ref_id="1174649" ref_url="https://bugzilla.suse.com/1174649" source="BUGZILLA"/>
		<reference ref_id="1181674" ref_url="https://bugzilla.suse.com/1181674" source="BUGZILLA"/>
		<reference ref_id="1193285" ref_url="https://bugzilla.suse.com/1193285" source="BUGZILLA"/>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1209834" ref_url="https://bugzilla.suse.com/1209834" source="BUGZILLA"/>
		<reference ref_id="1210443" ref_url="https://bugzilla.suse.com/1210443" source="BUGZILLA"/>
		<reference ref_id="1211515" ref_url="https://bugzilla.suse.com/1211515" source="BUGZILLA"/>
		<reference ref_id="1212091" ref_url="https://bugzilla.suse.com/1212091" source="BUGZILLA"/>
		<reference ref_id="1214377" ref_url="https://bugzilla.suse.com/1214377" source="BUGZILLA"/>
		<reference ref_id="1215275" ref_url="https://bugzilla.suse.com/1215275" source="BUGZILLA"/>
		<reference ref_id="1215885" ref_url="https://bugzilla.suse.com/1215885" source="BUGZILLA"/>
		<reference ref_id="1216441" ref_url="https://bugzilla.suse.com/1216441" source="BUGZILLA"/>
		<reference ref_id="1216559" ref_url="https://bugzilla.suse.com/1216559" source="BUGZILLA"/>
		<reference ref_id="1216702" ref_url="https://bugzilla.suse.com/1216702" source="BUGZILLA"/>
		<reference ref_id="1217895" ref_url="https://bugzilla.suse.com/1217895" source="BUGZILLA"/>
		<reference ref_id="1217987" ref_url="https://bugzilla.suse.com/1217987" source="BUGZILLA"/>
		<reference ref_id="1217988" ref_url="https://bugzilla.suse.com/1217988" source="BUGZILLA"/>
		<reference ref_id="1217989" ref_url="https://bugzilla.suse.com/1217989" source="BUGZILLA"/>
		<reference ref_id="1218005" ref_url="https://bugzilla.suse.com/1218005" source="BUGZILLA"/>
		<reference ref_id="1218447" ref_url="https://bugzilla.suse.com/1218447" source="BUGZILLA"/>
		<reference ref_id="1218527" ref_url="https://bugzilla.suse.com/1218527" source="BUGZILLA"/>
		<reference ref_id="1218659" ref_url="https://bugzilla.suse.com/1218659" source="BUGZILLA"/>
		<reference ref_id="1218689" ref_url="https://bugzilla.suse.com/1218689" source="BUGZILLA"/>
		<reference ref_id="1218713" ref_url="https://bugzilla.suse.com/1218713" source="BUGZILLA"/>
		<reference ref_id="1218723" ref_url="https://bugzilla.suse.com/1218723" source="BUGZILLA"/>
		<reference ref_id="1218730" ref_url="https://bugzilla.suse.com/1218730" source="BUGZILLA"/>
		<reference ref_id="1218752" ref_url="https://bugzilla.suse.com/1218752" source="BUGZILLA"/>
		<reference ref_id="1218757" ref_url="https://bugzilla.suse.com/1218757" source="BUGZILLA"/>
		<reference ref_id="1218768" ref_url="https://bugzilla.suse.com/1218768" source="BUGZILLA"/>
		<reference ref_id="1218778" ref_url="https://bugzilla.suse.com/1218778" source="BUGZILLA"/>
		<reference ref_id="1218779" ref_url="https://bugzilla.suse.com/1218779" source="BUGZILLA"/>
		<reference ref_id="1218804" ref_url="https://bugzilla.suse.com/1218804" source="BUGZILLA"/>
		<reference ref_id="1218832" ref_url="https://bugzilla.suse.com/1218832" source="BUGZILLA"/>
		<reference ref_id="1218836" ref_url="https://bugzilla.suse.com/1218836" source="BUGZILLA"/>
		<reference ref_id="1218916" ref_url="https://bugzilla.suse.com/1218916" source="BUGZILLA"/>
		<reference ref_id="1218948" ref_url="https://bugzilla.suse.com/1218948" source="BUGZILLA"/>
		<reference ref_id="1218958" ref_url="https://bugzilla.suse.com/1218958" source="BUGZILLA"/>
		<reference ref_id="1218968" ref_url="https://bugzilla.suse.com/1218968" source="BUGZILLA"/>
		<reference ref_id="1218997" ref_url="https://bugzilla.suse.com/1218997" source="BUGZILLA"/>
		<reference ref_id="1219006" ref_url="https://bugzilla.suse.com/1219006" source="BUGZILLA"/>
		<reference ref_id="1219012" ref_url="https://bugzilla.suse.com/1219012" source="BUGZILLA"/>
		<reference ref_id="1219013" ref_url="https://bugzilla.suse.com/1219013" source="BUGZILLA"/>
		<reference ref_id="1219014" ref_url="https://bugzilla.suse.com/1219014" source="BUGZILLA"/>
		<reference ref_id="1219053" ref_url="https://bugzilla.suse.com/1219053" source="BUGZILLA"/>
		<reference ref_id="1219067" ref_url="https://bugzilla.suse.com/1219067" source="BUGZILLA"/>
		<reference ref_id="1219120" ref_url="https://bugzilla.suse.com/1219120" source="BUGZILLA"/>
		<reference ref_id="1219128" ref_url="https://bugzilla.suse.com/1219128" source="BUGZILLA"/>
		<reference ref_id="1219136" ref_url="https://bugzilla.suse.com/1219136" source="BUGZILLA"/>
		<reference ref_id="1219285" ref_url="https://bugzilla.suse.com/1219285" source="BUGZILLA"/>
		<reference ref_id="1219349" ref_url="https://bugzilla.suse.com/1219349" source="BUGZILLA"/>
		<reference ref_id="1219412" ref_url="https://bugzilla.suse.com/1219412" source="BUGZILLA"/>
		<reference ref_id="1219429" ref_url="https://bugzilla.suse.com/1219429" source="BUGZILLA"/>
		<reference ref_id="1219434" ref_url="https://bugzilla.suse.com/1219434" source="BUGZILLA"/>
		<reference ref_id="1219490" ref_url="https://bugzilla.suse.com/1219490" source="BUGZILLA"/>
		<reference ref_id="1219512" ref_url="https://bugzilla.suse.com/1219512" source="BUGZILLA"/>
		<reference ref_id="1219568" ref_url="https://bugzilla.suse.com/1219568" source="BUGZILLA"/>
		<reference ref_id="1219582" ref_url="https://bugzilla.suse.com/1219582" source="BUGZILLA"/>
		<reference ref_id="1219608" ref_url="https://bugzilla.suse.com/1219608" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33631" ref_url="https://www.suse.com/security/cve/CVE-2021-33631/" source="CVE"/>
		<reference ref_id="CVE-2023-46838" ref_url="https://www.suse.com/security/cve/CVE-2023-46838/" source="CVE"/>
		<reference ref_id="CVE-2023-47233" ref_url="https://www.suse.com/security/cve/CVE-2023-47233/" source="CVE"/>
		<reference ref_id="CVE-2023-4921" ref_url="https://www.suse.com/security/cve/CVE-2023-4921/" source="CVE"/>
		<reference ref_id="CVE-2023-51042" ref_url="https://www.suse.com/security/cve/CVE-2023-51042/" source="CVE"/>
		<reference ref_id="CVE-2023-51043" ref_url="https://www.suse.com/security/cve/CVE-2023-51043/" source="CVE"/>
		<reference ref_id="CVE-2023-51780" ref_url="https://www.suse.com/security/cve/CVE-2023-51780/" source="CVE"/>
		<reference ref_id="CVE-2023-51782" ref_url="https://www.suse.com/security/cve/CVE-2023-51782/" source="CVE"/>
		<reference ref_id="CVE-2023-6040" ref_url="https://www.suse.com/security/cve/CVE-2023-6040/" source="CVE"/>
		<reference ref_id="CVE-2023-6356" ref_url="https://www.suse.com/security/cve/CVE-2023-6356/" source="CVE"/>
		<reference ref_id="CVE-2023-6531" ref_url="https://www.suse.com/security/cve/CVE-2023-6531/" source="CVE"/>
		<reference ref_id="CVE-2023-6535" ref_url="https://www.suse.com/security/cve/CVE-2023-6535/" source="CVE"/>
		<reference ref_id="CVE-2023-6536" ref_url="https://www.suse.com/security/cve/CVE-2023-6536/" source="CVE"/>
		<reference ref_id="CVE-2023-6915" ref_url="https://www.suse.com/security/cve/CVE-2023-6915/" source="CVE"/>
		<reference ref_id="CVE-2024-0340" ref_url="https://www.suse.com/security/cve/CVE-2024-0340/" source="CVE"/>
		<reference ref_id="CVE-2024-0565" ref_url="https://www.suse.com/security/cve/CVE-2024-0565/" source="CVE"/>
		<reference ref_id="CVE-2024-0641" ref_url="https://www.suse.com/security/cve/CVE-2024-0641/" source="CVE"/>
		<reference ref_id="CVE-2024-0775" ref_url="https://www.suse.com/security/cve/CVE-2024-0775/" source="CVE"/>
		<reference ref_id="CVE-2024-1085" ref_url="https://www.suse.com/security/cve/CVE-2024-1085/" source="CVE"/>
		<reference ref_id="CVE-2024-1086" ref_url="https://www.suse.com/security/cve/CVE-2024-1086/" source="CVE"/>
		<reference ref_id="CVE-2024-24860" ref_url="https://www.suse.com/security/cve/CVE-2024-24860/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-1085: Fixed nf_tables use-after-free vulnerability in the nft_setelem_catchall_deactivate() function (bsc#1219429).
- CVE-2024-1086: Fixed a use-after-free vulnerability inside the nf_tables component that could have been exploited to achieve local privilege escalation (bsc#1219434).
- CVE-2023-51042: Fixed use-after-free in amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c (bsc#1219128).
- CVE-2023-51780: Fixed a use-after-free in do_vcc_ioctl in net/atm/ioctl.c, because of a vcc_recvmsg race condition (bsc#1218730).
- CVE-2023-46838: Fixed an issue with Xen netback processing of zero-length transmit fragment (bsc#1218836).
- CVE-2021-33631: Fixed an integer overflow in ext4_write_inline_data_end() (bsc#1219412).
- CVE-2023-6535: Fixed a NULL pointer dereference in nvmet_tcp_execute_request (bsc#1217988).
- CVE-2023-6536: Fixed a NULL pointer dereference in __nvmet_req_complete (bsc#1217989).
- CVE-2023-6356: Fixed a NULL pointer dereference in nvmet_tcp_build_pdu_iovec (bsc#1217987).
- CVE-2023-47233: Fixed a use-after-free in the device unplugging (disconnect the USB by hotplug) code inside the brcm80211 component (bsc#1216702).
- CVE-2023-4921: Fixed a use-after-free vulnerability in the QFQ network scheduler which could be exploited to achieve local privilege escalation (bsc#1215275).
- CVE-2023-51043: Fixed use-after-free during a race condition between a nonblocking atomic commit and a driver unload in drivers/gpu/drm/drm_atomic.c (bsc#1219120).
- CVE-2024-0775: Fixed use-after-free in __ext4_remount in fs/ext4/super.c that could allow a local user to cause an information leak problem while freeing the old quota file names before a potential failure (bsc#1219053).
- CVE-2023-6040: Fixed an out-of-bounds access vulnerability while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function (bsc#1218752).
- CVE-2024-0641: Fixed a denial of service vulnerability in tipc_crypto_key_revoke in net/tipc/crypto.c (bsc#1218916).
- CVE-2024-0565: Fixed an out-of-bounds memory read flaw in receive_encrypted_standard in fs/smb/client/smb2ops.c (bsc#1218832).
- CVE-2023-6915: Fixed a NULL pointer dereference problem in ida_free in lib/idr.c (bsc#1218804).
- CVE-2023-51782: Fixed use-after-free in rose_ioctl in net/rose/af_rose.c because of a rose_accept race condition (bsc#1218757).
- CVE-2023-6531: Fixed a use-after-free flaw due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic()on the socket that the SKB is queued on (bsc#1218447).
- CVE-2024-0340: Fixed information disclosure in vhost/vhost.c:vhost_new_msg() (bsc#1218689).
- CVE-2024-24860: Fixed a denial of service caused by a race condition in {min,max}_key_size_set() (bsc#1219608).

The following non-security bugs were fixed:

- Documentation: RAS: Add index and address translation section (jsc#PED-7618).
- ACPI: LPIT: Avoid u32 multiplication overflow (git-fixes).
- ACPI: LPSS: Fix the fractional clock divider flags (git-fixes).
- ACPI: arm64: export acpi_arch_thermal_cpufreq_pctg() (bsc#1214377)
- ACPI: extlog: Clear Extended Error Log status when RAS_CEC handled the error (git-fixes).
- ACPI: processor: reduce CPUFREQ thermal reduction pctg for Tegra241 (bsc#1214377)
- ACPI: property: Allow _DSD buffer data only for byte accessors (git-fixes).
- ACPI: resource: Add another DMI match for the TongFang GMxXGxx (git-fixes).
- ACPI: thermal: Add Thermal fast Sampling Period (_TFP) support (bsc#1214377)
- ACPI: video: check for error while searching for backlight device parent (git-fixes).
- ALSA: hda/conexant: Fix headset auto detect fail in cx8070 and SN6140 (git-fixes).
- ALSA: hda/cs8409: Suppress vmaster control for Dolphin models (git-fixes).
- ALSA: hda/realtek: Add quirks for ASUS Zenbook 2022 Models (git-fixes).
- ALSA: hda/realtek: Enable headset mic on Lenovo M70 Gen5 (git-fixes).
- ALSA: hda/realtek: Enable mute/micmute LEDs and limit mic boost on HP ZBook (git-fixes).
- ALSA: hda/realtek: Fix mute and mic-mute LEDs for HP Envy X360 13-ay0xxx (git-fixes).
- ALSA: hda/relatek: Enable Mute LED on HP Laptop 15s-fq2xxx (git-fixes).
- ALSA: hda: Refer to correct stream index at loops (git-fixes).
- ALSA: hda: intel-nhlt: Ignore vbps when looking for DMIC 32 bps format (git-fixes).
- ALSA: oxygen: Fix right channel of capture volume mixer (git-fixes).
- ASoC: Intel: Skylake: Fix mem leak in few functions (git-fixes).
- ASoC: Intel: Skylake: mem leak in skl register function (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Medion Lifetab S10346 (git-fixes).
- ASoC: Intel: glk_rt5682_max98357a: fix board id mismatch (git-fixes).
- ASoC: amd: Add Dell G15 5525 to quirks list (bsc#1219136).
- ASoC: amd: Add check for acp config flags (bsc#1219136).
- ASoC: amd: Add new dmi entries to config entry (bsc#1219136).
- ASoC: amd: Drop da7219_aad_jack_det() usage (bsc#1219136).
- ASoC: amd: Drop empty platform remove function (bsc#1219136).
- ASoC: amd: Update Pink Sardine platform ACP register header (bsc#1219136).
- ASoC: amd: acp-config: Add missing MODULE_DESCRIPTION (git-fixes).
- ASoC: amd: acp-da7219-max98357a: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp-rt5645: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp3x-rt5682-max9836: Configure jack as not detecting Line Out (bsc#1219136).
- ASoC: amd: acp3x-rt5682-max9836: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp: Add TDM slots setting support for ACP I2S controller (bsc#1219136).
- ASoC: amd: acp: Add TDM support for acp i2s stream (bsc#1219136).
- ASoC: amd: acp: Add i2s tdm support in machine driver (bsc#1219136).
- ASoC: amd: acp: Add kcontrols and widgets per-codec in common code (bsc#1219136).
- ASoC: amd: acp: Add missing MODULE_DESCRIPTION in mach-common (git-fixes).
- ASoC: amd: acp: Add new cpu dai's in machine driver (bsc#1219136).
- ASoC: amd: acp: Add setbias level for rt5682s codec in machine driver (bsc#1219136).
- ASoC: amd: acp: Enable i2s tdm support for skyrim platforms (bsc#1219136).
- ASoC: amd: acp: Fix possible UAF in acp_dma_open (bsc#1219136).
- ASoC: amd: acp: Initialize list to store acp_stream during pcm_open (bsc#1219136).
- ASoC: amd: acp: Map missing jack kcontrols (bsc#1219136).
- ASoC: amd: acp: Modify dai_id macros to be more generic (bsc#1219136).
- ASoC: amd: acp: Refactor bit width calculation (bsc#1219136).
- ASoC: amd: acp: Refactor dai format implementation (bsc#1219136).
- ASoC: amd: acp: Refactor i2s clocks programming sequence (bsc#1219136).
- ASoC: amd: acp: add a label to make error path more clean (bsc#1219136).
- ASoC: amd: acp: add acp i2s master clock generation for rembrandt platform (bsc#1219136).
- ASoC: amd: acp: add pm ops support for acp pci driver (bsc#1219136).
- ASoC: amd: acp: add pm ops support for rembrandt platform (bsc#1219136).
- ASoC: amd: acp: clean up some inconsistent indentings (bsc#1219136).
- ASoC: amd: acp: clear pdm dma interrupt mask (bsc#1219136).
- ASoC: amd: acp: delete unnecessary NULL check (bsc#1219136).
- ASoC: amd: acp: export config_acp_dma() and config_pte_for_stream() symbols (bsc#1219136).
- ASoC: amd: acp: fix SND_SOC_AMD_ACP_PCI depdenencies (bsc#1219136).
- ASoC: amd: acp: move pdm macros to common header file (bsc#1219136).
- ASoC: amd: acp: refactor the acp init and de-init sequence (bsc#1219136).
- ASoC: amd: acp: rembrandt: Drop if blocks with always false condition (bsc#1219136).
- ASoC: amd: acp: remove acp poweroff function (bsc#1219136).
- ASoC: amd: acp: remove the redundant acp enable/disable interrupts functions (bsc#1219136).
- ASoC: amd: acp: remove unnecessary NULL checks (bsc#1219136).
- ASoC: amd: acp: store platform device reference created in pci probe call (bsc#1219136).
- ASoC: amd: acp: store the pdm stream channel mask (bsc#1219136).
- ASoC: amd: acp: store xfer_resolution of the stream (bsc#1219136).
- ASoC: amd: acp: switch to use dev_err_probe() (bsc#1219136).
- ASoC: amd: acp: use devm_kcalloc() instead of devm_kzalloc() (bsc#1219136).
- ASoC: amd: acp: use function devm_kcalloc() instead of devm_kzalloc() (bsc#1219136).
- ASoC: amd: add Pink Sardine ACP PCI driver (bsc#1219136).
- ASoC: amd: add Pink Sardine machine driver using dmic (bsc#1219136).
- ASoC: amd: add Pink Sardine platform ACP IP register header (bsc#1219136).
- ASoC: amd: add acp6.2 init/de-init functions (bsc#1219136).
- ASoC: amd: add acp6.2 irq handler (bsc#1219136).
- ASoC: amd: add acp6.2 pci driver pm ops (bsc#1219136).
- ASoC: amd: add acp6.2 pdm driver dma ops (bsc#1219136).
- ASoC: amd: add acp6.2 pdm driver pm ops (bsc#1219136).
- ASoC: amd: add acp6.2 pdm platform driver (bsc#1219136).
- ASoC: amd: add platform devices for acp6.2 pdm driver and dmic driver (bsc#1219136).
- ASoC: amd: create platform device for acp6.2 machine driver (bsc#1219136).
- ASoC: amd: enable Pink Sardine acp6.2 drivers build (bsc#1219136).
- ASoC: amd: enable Pink sardine platform machine driver build (bsc#1219136).
- ASoC: amd: fix ACP version typo mistake (bsc#1219136).
- ASoC: amd: fix spelling mistake: 'i.e' -&gt; 'i.e.' (bsc#1219136).
- ASoC: amd: ps: Add a module parameter to influence pdm_gain (bsc#1219136).
- ASoC: amd: ps: Adjust the gain for PDM DMIC (bsc#1219136).
- ASoC: amd: ps: Fix uninitialized ret in create_acp64_platform_devs() (bsc#1219136).
- ASoC: amd: ps: Move acp63_dev_data strcture from PCI driver (bsc#1219136).
- ASoC: amd: ps: Update copyright notice (bsc#1219136).
- ASoC: amd: ps: add mutex lock for accessing common registers (bsc#1219136).
- ASoC: amd: ps: fix for acp_lock access in pdm driver (bsc#1219136).
- ASoC: amd: ps: implement api to retrieve acp device config (bsc#1219136).
- ASoC: amd: ps: move irq handler registration (bsc#1219136).
- ASoC: amd: ps: refactor acp power on and reset functions (bsc#1219136).
- ASoC: amd: ps: refactor platform device creation logic (bsc#1219136).
- ASoC: amd: ps: remove the register read and write wrappers (bsc#1219136).
- ASoC: amd: ps: remove unused variable (bsc#1219136).
- ASoC: amd: ps: update dev index value in irq handler (bsc#1219136).
- ASoC: amd: ps: update macros with ps platform naming convention (bsc#1219136).
- ASoC: amd: ps: update the acp clock source (bsc#1219136).
- ASoC: amd: ps: use acp_lock to protect common registers in pdm driver (bsc#1219136).
- ASoC: amd: ps: use static function (bsc#1219136).
- ASoC: amd: renoir: Add a module parameter to influence pdm_gain (bsc#1219136).
- ASoC: amd: renoir: Adjust the gain for PDM DMIC (bsc#1219136).
- ASoC: amd: update pm_runtime enable sequence (bsc#1219136).
- ASoC: amd: vangogh: Add check for acp config flags in vangogh platform (bsc#1219136).
- ASoC: amd: vangogh: Make use of DRV_NAME (bsc#1219136).
- ASoC: amd: vangogh: Remove unnecessary init function (bsc#1219136).
- ASoC: amd: vangogh: select CONFIG_SND_AMD_ACP_CONFIG (bsc#1219136).
- ASoC: amd: yc: Add ASUS M3402RA into DMI table (bsc#1219136).
- ASoC: amd: yc: Add ASUS M5402RA into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Alienware m17 R5 AMD into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Asus VivoBook Pro 14 OLED M6400RC to the quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A42) (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support HP OMEN 16-n0xxx (8A43) (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support Victus by HP Gaming Laptop 15-fb0xxx (8A3E) (bsc#1219136).
- ASoC: amd: yc: Add DMI entries to support Victus by HP Laptop 16-e1xxx (8A22) (bsc#1219136).
- ASoC: amd: yc: Add DMI entry to support System76 Pangolin 12 (bsc#1219136).
- ASoC: amd: yc: Add DMI entry to support System76 Pangolin 13 (bsc#1219136).
- ASoC: amd: yc: Add DMI support for new acer/emdoor platforms (bsc#1219136).
- ASoC: amd: yc: Add HP 255 G10 into quirk table (bsc#1219136).
- ASoC: amd: yc: Add Lenovo Thinkbook 14+ 2022 21D0 to quirks table (bsc#1219136).
- ASoC: amd: yc: Add MECHREVO Jiaolong Series MRID6 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Razer Blade 14 2022 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add ThinkBook 14 G5+ ARP to quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add Thinkpad Neo14 to quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add VivoBook Pro 15 to quirks list for acp6x (bsc#1219136).
- ASoC: amd: yc: Add Xiaomi Redmi Book Pro 14 2022 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add Xiaomi Redmi Book Pro 15 2022 into DMI table (bsc#1219136).
- ASoC: amd: yc: Add a module parameter to influence pdm_gain (bsc#1219136).
- ASoC: amd: yc: Adding Lenovo ThinkBook 14 Gen 4+ ARA and Lenovo ThinkBook 16 Gen 4+ ARA to the Quirks List (bsc#1219136).
- ASoC: amd: yc: Adjust the gain for PDM DMIC (bsc#1219136).
- ASoC: amd: yc: Fix a non-functional mic on Lenovo 82TL (bsc#1219136).
- ASoC: amd: yc: Fix non-functional mic on ASUS E1504FA (bsc#1219136).
- ASoC: amd: yp: Add OMEN by HP Gaming Laptop 16z-n000 to quirks (bsc#1219136).
- ASoC: codecs: lpass-wsa-macro: fix compander volume hack (git-fixes).
- ASoC: codecs: wcd938x: fix headphones volume controls (git-fixes).
- ASoC: codecs: wcd938x: handle deferred probe (git-fixes).
- ASoC: cs35l33: Fix GPIO name and drop legacy include (git-fixes).
- ASoC: cs43130: Fix incorrect frame delay configuration (git-fixes).
- ASoC: cs43130: Fix the position of const qualifier (git-fixes).
- ASoC: da7219: Support low DC impedance headset (git-fixes).
- ASoC: nau8822: Fix incorrect type in assignment and cast to restricted __be16 (git-fixes).
- ASoC: ops: add correct range check for limiting volume (git-fixes).
- ASoC: rt5645: Drop double EF20 entry from dmi_platform_data[] (git-fixes).
- ASoC: rt5650: add mutex to avoid the jack detection failure (git-fixes).
- ASoC: sun4i-spdif: Fix requirements for H6 (git-fixes).
- ASoC: wm8974: Correct boost mixer inputs (git-fixes).
- Add DMI ID for MSI Bravo 15 B7ED (bsc#1219136).
- Bluetooth: Fix atomicity violation in {min,max}_key_size_set (git-fixes).
- Bluetooth: btmtkuart: fix recv_buf() return value (git-fixes).
- Documentation: Begin a RAS section (jsc#PED-7622).
- EDAC/amd64: Add MI300 row retirement support (jsc#PED-7618).
- EDAC/amd64: Add context struct (jsc#PED-7615).
- EDAC/amd64: Add get_err_info() to pvt-&gt;ops (jsc#PED-7615).
- EDAC/amd64: Add support for AMD heterogeneous Family 19h Model 30h-3Fh (jsc#PED-7616).
- EDAC/amd64: Add support for ECC on family 19h model 60h-7Fh (jsc#PED-7615).
- EDAC/amd64: Add support for family 0x19, models 0x90-9f devices (jsc#PED-7622).
- EDAC/amd64: Allow for DF Indirect Broadcast reads (jsc#PED-7615).
- EDAC/amd64: Cache and use GPU node map (jsc#PED-7616).
- EDAC/amd64: Do not discover ECC symbol size for Family 17h and later (jsc#PED-7615).
- EDAC/amd64: Do not set up EDAC PCI control on Family 17h+ (jsc#PED-7615).
- EDAC/amd64: Document heterogeneous system enumeration (jsc#PED-7616).
- EDAC/amd64: Drop dbam_to_cs() for Family 17h and later (jsc#PED-7615).
- EDAC/amd64: Fix indentation in umc_determine_edac_cap() (jsc#PED-7615).
- EDAC/amd64: Merge struct amd64_family_type into struct amd64_pvt (jsc#PED-7615).
- EDAC/amd64: Remove PCI Function 0 (jsc#PED-7615).
- EDAC/amd64: Remove PCI Function 6 (jsc#PED-7615).
- EDAC/amd64: Remove early_channel_count() (jsc#PED-7615).
- EDAC/amd64: Remove module version string (jsc#PED-7615).
- EDAC/amd64: Remove scrub rate control for Family 17h and later (jsc#PED-7615).
- EDAC/amd64: Rename debug_display_dimm_sizes() (jsc#PED-7615).
- EDAC/amd64: Rename f17h_determine_edac_ctl_cap() (jsc#PED-7615).
- EDAC/amd64: Rework hw_info_{get,put} (jsc#PED-7615).
- EDAC/amd64: Shut up an -Werror,-Wsometimes-uninitialized clang false positive (jsc#PED-7615).
- EDAC/amd64: Split determine_edac_cap() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split determine_memory_type() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split dump_misc_regs() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split ecc_enabled() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split get_csrow_nr_pages() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split init_csrows() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split prep_chip_selects() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split read_base_mask() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split read_mc_regs() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Split setup_mci_misc_attrs() into dct/umc functions (jsc#PED-7615).
- EDAC/amd64: Use new AMD Address Translation Library (jsc#PED-7618).
- EDAC/mc: Add new HBM2 memory type (jsc#PED-7616).
- EDAC/mc: Add support for HBM3 memory type (jsc#PED-7622).
- EDAC/mce_amd: Remove SMCA Extended Error code descriptions (jsc#PED-7622).
- EDAC/thunderx: Fix possible out-of-bounds string access (git-fixes).
- HID: i2c-hid-of: fix NULL-deref on failed power up (git-fixes).
- HID: wacom: Correct behavior when processing some confidence == false touches (git-fixes).
- IB/iser: Prevent invalidating wrong MR (git-fixes)
- Input: atkbd - do not skip atkbd_deactivate() when skipping ATKBD_CMD_GETID (git-fixes).
- Input: atkbd - skip ATKBD_CMD_GETID in translated mode (git-fixes).
- Input: atkbd - skip ATKBD_CMD_SETLEDS when skipping ATKBD_CMD_GETID (git-fixes).
- Input: atkbd - use ab83 as id when skipping the getid command (git-fixes).
- Input: bcm5974 - check endpoint type before starting traffic (git-fixes).
- Input: i8042 - add nomux quirk for Acer P459-G2-M (git-fixes).
- Input: xpad - add Razer Wolverine V2 support (git-fixes).
- KVM: SVM: Update EFER software model on CR0 trap for SEV-ES (git-fixes).
- KVM: s390: vsie: Fix STFLE interpretive execution identification (git-fixes bsc#1218997).
- KVM: x86: Mask LVTPC when handling a PMI (jsc#PED-7322).
- Limit kernel-source build to architectures for which the kernel binary is built (bsc#1108281).
- PCI/AER: Configure ECRC only if AER is native (bsc#1218778)
- PCI/P2PDMA: Remove reference to pci_p2pdma_map_sg() (git-fixes).
- PCI: Add ACS quirk for more Zhaoxin Root Ports (git-fixes).
- PCI: keystone: Fix race condition when initializing PHYs (git-fixes).
- PM: hibernate: Enforce ordering during image compression/decompression (git-fixes).
- RAS/AMD/ATL: Add MI300 DRAM to normalized address translation support (jsc#PED-7618).
- RAS/AMD/ATL: Add MI300 support (jsc#PED-7618).
- RAS/AMD/ATL: Fix array overflow in get_logical_coh_st_fabric_id_mi300() (jsc#PED-7618).
- RAS: Introduce AMD Address Translation Library (jsc#PED-7618).
- RDMA/hns: Fix inappropriate err code for unsupported operations (git-fixes)
- RDMA/hns: Fix unnecessary err return when using invalid congest control algorithm (git-fixes)
- RDMA/hns: Remove unnecessary checks for NULL in mtr_alloc_bufs() (git-fixes)
- RDMA/irdma: Add wait for suspend on SQD (git-fixes)
- RDMA/irdma: Avoid free the non-cqp_request scratch (git-fixes)
- RDMA/irdma: Do not modify to SQD on error (git-fixes)
- RDMA/irdma: Fix UAF in irdma_sc_ccq_get_cqe_info() (git-fixes)
- RDMA/irdma: Refactor error handling in create CQP (git-fixes)
- RDMA/rtrs-clt: Fix the max_send_wr setting (git-fixes)
- RDMA/rtrs-clt: Remove the warnings for req in_use check (git-fixes)
- RDMA/rtrs-clt: Start hb after path_up (git-fixes)
- RDMA/rtrs-srv: Check return values while processing info request (git-fixes)
- RDMA/rtrs-srv: Destroy path files after making sure no IOs in-flight (git-fixes)
- RDMA/rtrs-srv: Do not unconditionally enable irq (git-fixes)
- RDMA/rtrs-srv: Free srv_mr iu only when always_invalidate is true (git-fixes)
- RDMA/usnic: Silence uninitialized symbol smatch warnings (git-fixes)
- USB: xhci: workaround for grace period (git-fixes).
- Update config files: enable ASoC AMD PS drivers (bsc#1219136)
- Update patch reference for ax88179 fix (bsc#1218948)
- acpi: property: Let args be NULL in __acpi_node_get_property_reference (git-fixes).
- aio: fix mremap after fork null-deref (git-fixes).
- apparmor: avoid crash when parsed profile name is empty (git-fixes).
- arm64: Add CNT{P,V}CTSS_EL0 alternatives to cnt{p,v}ct_el0 (jsc#PED-4729)
- arm64: Add a capability for FEAT_ECV (jsc#PED-4729) Use cpu_hwcaps PLACEHOLDER_4 for HAS_ECV.
- arm64: alternative: patch alternatives in the vDSO (jsc#PED-4729)
- arm64: dts: armada-3720-turris-mox: set irq type for RTC (git-fixes)
- arm64: dts: imx8mp: imx8mq: Add parkmode-disable-ss-quirk on DWC3 (git-fixes)
- arm64: dts: imx8mq: drop usb3-resume-missing-cas from usb (git-fixes)
- arm64: dts: ls208xa: use a pseudo-bus to constrain usb dma size (git-fixes)
- arm64: dts: rockchip: Expand reg size of vdec node for RK3399 (git-fixes)
- arm64: mm: Always make sw-dirty PTEs hw-dirty in pte_modify (git-fixes)
- arm64: module: move find_section to header (jsc#PED-4729)
- arm64: vdso: Fix 'no previous prototype' warning (jsc#PED-4729)
- arm64: vdso: remove two .altinstructions related symbols (jsc#PED-4729)
- arm64: vdso: use SYS_CNTVCTSS_EL0 for gettimeofday (jsc#PED-4729)
- asix: Add check for usbnet_get_endpoints (git-fixes).
- attr: block mode changes of symlinks (git-fixes).
- badblocks: add helper routines for badblock ranges handling (bsc#1174649).
- badblocks: add more helper structure and routines in badblocks.h (bsc#1174649).
- badblocks: avoid checking invalid range in badblocks_check() (bsc#1174649).
- badblocks: improve badblocks_check() for multiple ranges handling (bsc#1174649).
- badblocks: improve badblocks_clear() for multiple ranges handling (bsc#1174649).
- badblocks: improve badblocks_set() for multiple ranges handling (bsc#1174649).
- badblocks: switch to the improved badblock handling code (bsc#1174649).
- bpf: Limit the number of kprobes when attaching program to multiple kprobes (git-fixes).
- bus: mhi: host: Add alignment check for event ring read pointer (git-fixes).
- bus: mhi: host: Add spinlock to protect WP access when queueing TREs (git-fixes).
- bus: mhi: host: Drop chan lock before queuing buffers (git-fixes).
- ceph: select FS_ENCRYPTION_ALGS if FS_ENCRYPTION (bsc#1219568).
- clk: qcom: gpucc-sm8150: Update the gpu_cc_pll1 config (git-fixes).
- clk: qcom: videocc-sm8150: Add missing PLL config property (git-fixes).
- clk: rockchip: rk3128: Fix HCLK_OTG gate register (git-fixes).
- clk: samsung: Fix kernel-doc comments (git-fixes).
- clk: si5341: fix an error code problem in si5341_output_clk_set_rate (git-fixes).
- clk: zynqmp: Add a check for NULL pointer (git-fixes).
- clk: zynqmp: make bestdiv unsigned (git-fixes).
- clocksource: Skip watchdog check for large watchdog intervals (git-fixes).
- clocksource: disable watchdog checks on TSC when TSC is watchdog (bsc#1215885).
- coresight: etm4x: Add ACPI support in platform driver (bsc#1218779)
- coresight: etm4x: Allocate and device assign 'struct etmv4_drvdata' (bsc#1218779)
- coresight: etm4x: Change etm4_platform_driver driver for MMIO devices (bsc#1218779)
- coresight: etm4x: Drop iomem 'base' argument from etm4_probe() (bsc#1218779)
- coresight: etm4x: Drop pid argument from etm4_probe() (bsc#1218779)
- coresight: etm4x: Ensure valid drvdata and clock before clk_put() (bsc#1218779)
- coresight: platform: acpi: Ignore the absence of graph (bsc#1218779)
- crypto: ccp - fix memleak in ccp_init_dm_workarea (git-fixes).
- crypto: s390/aes - Fix buffer overread in CTR mode (git-fixes).
- crypto: sa2ul - Return crypto_aead_setkey to transfer the error (git-fixes).
- crypto: sahara - do not resize req-&gt;src when doing hash operations (git-fixes).
- crypto: sahara - fix ahash reqsize (git-fixes).
- crypto: sahara - fix ahash selftest failure (git-fixes).
- crypto: sahara - fix cbc selftest failure (git-fixes).
- crypto: sahara - fix processing hash requests with req-&gt;nbytes &amp;lt; sg-&gt;length (git-fixes).
- crypto: sahara - fix processing requests with cryptlen &amp;lt; sg-&gt;length (git-fixes).
- crypto: sahara - fix wait_for_completion_timeout() error handling (git-fixes).
- crypto: sahara - handle zero-length aes requests (git-fixes).
- crypto: sahara - improve error handling in sahara_sha_process() (git-fixes).
- crypto: sahara - remove FLAGS_NEW_KEY logic (git-fixes).
- crypto: scomp - fix req-&gt;dst buffer overflow (git-fixes).
- dma-debug: fix kernel-doc warnings (git-fixes).
- dmaengine: fix NULL pointer in channel unregistration function (git-fixes).
- dmaengine: fix is_slave_direction() return false when DMA_DEV_TO_DEV (git-fixes).
- dmaengine: fsl-dpaa2-qdma: Fix the size of dma pools (git-fixes).
- dmaengine: idxd: Protect int_handle field in hw descriptor (git-fixes).
- dmaengine: ti: k3-udma: Report short packet errors (git-fixes).
- doc/README.KSYMS: Add to repo.
- docs: Store the old kernel changelog entries in kernel-docs package (bsc#1218713).
- drivers/amd/pm: fix a use-after-free in kv_parse_power_table (git-fixes).
- drivers: clk: zynqmp: calculate closest mux rate (git-fixes).
- drivers: clk: zynqmp: update divider round rate logic (git-fixes).
- drm/amd/display: Fix tiled display misalignment (git-fixes).
- drm/amd/display: Port DENTIST hang and TDR fixes to OTG disable W/A (git-fixes).
- drm/amd/display: add nv12 bounding box (git-fixes).
- drm/amd/display: get dprefclk ss info from integration info table (git-fixes).
- drm/amd/display: make flip_timestamp_in_us a 64-bit variable (git-fixes).
- drm/amd/display: pbn_div need be updated for hotplug event (git-fixes).
- drm/amd/display: update dcn315 lpddr pstate latency (git-fixes).
- drm/amd/pm/smu7: fix a memleak in smu7_hwmgr_backend_init (git-fixes).
- drm/amd/pm: fix a double-free in amdgpu_parse_extended_power_table (git-fixes).
- drm/amd/pm: fix a double-free in si_dpm_init (git-fixes).
- drm/amd/powerplay: Fix kzalloc parameter 'ATOM_Tonga_PPM_Table' in 'get_platform_power_management_table()' (git-fixes).
- drm/amdgpu/debugfs: fix error code when smc register accessors are NULL (git-fixes).
- drm/amdgpu/pm: Fix the power source flag error (git-fixes).
- drm/amdgpu: Add NULL checks for function pointers (git-fixes).
- drm/amdgpu: Drop 'fence' check in 'to_amdgpu_amdkfd_fence()' (git-fixes).
- drm/amdgpu: Fix '*fw' from request_firmware() not released in 'amdgpu_ucode_request()' (git-fixes).
- drm/amdgpu: Fix cat debugfs amdgpu_regs_didt causes kernel null pointer (git-fixes).
- drm/amdgpu: Fix ecc irq enable/disable unpaired (git-fixes).
- drm/amdgpu: Fix missing error code in 'gmc_v6/7/8/9_0_hw_init()' (git-fixes).
- drm/amdgpu: Fix with right return code '-EIO' in 'amdgpu_gmc_vram_checking()' (git-fixes).
- drm/amdgpu: Let KFD sync with VM fences (git-fixes).
- drm/amdgpu: Release 'adev-&gt;pm.fw' before return in 'amdgpu_device_need_post()' (git-fixes).
- drm/amdgpu: fix ftrace event amdgpu_bo_move always move on same heap (git-fixes).
- drm/amdgpu: skip gpu_info fw loading on navi12 (git-fixes).
- drm/amdkfd: Confirm list is non-empty before utilizing list_first_entry in kfd_topology.c (git-fixes).
- drm/amdkfd: Fix 'node' NULL check in 'svm_range_get_range_boundaries()' (git-fixes).
- drm/amdkfd: Fix iterator used outside loop in 'kfd_add_peer_prop()' (git-fixes).
- drm/amdkfd: Fix lock dependency warning (git-fixes).
- drm/amdkfd: Fix lock dependency warning with srcu (git-fixes).
- drm/amdkfd: Use resource_size() helper function (git-fixes).
- drm/amdkfd: fixes for HMM mem allocation (git-fixes).
- drm/bridge: Fix typo in post_disable() description (git-fixes).
- drm/bridge: anx7625: Ensure bridge is suspended in disable() (git-fixes).
- drm/bridge: cdns-mhdp8546: Fix use of uninitialized variable (git-fixes).
- drm/bridge: nxp-ptn3460: fix i2c_master_send() error checking (git-fixes).
- drm/bridge: nxp-ptn3460: simplify some error checking (git-fixes).
- drm/bridge: parade-ps8640: Ensure bridge is suspended in .post_disable() (git-fixes).
- drm/bridge: parade-ps8640: Make sure we drop the AUX mutex in the error case (git-fixes).
- drm/bridge: parade-ps8640: Wait for HPD when doing an AUX transfer (git-fixes).
- drm/bridge: tc358767: Fix return value on error case (git-fixes).
- drm/bridge: tpd12s015: Drop buggy __exit annotation for remove function (git-fixes).
- drm/crtc: Fix uninit-value bug in drm_mode_setcrtc (git-fixes).
- drm/crtc: fix uninitialized variable use (git-fixes).
- drm/drv: propagate errors from drm_modeset_register_all() (git-fixes).
- drm/exynos: Call drm_atomic_helper_shutdown() at shutdown/unbind time (git-fixes).
- drm/exynos: fix a potential error pointer dereference (git-fixes).
- drm/exynos: fix a wrong error checking (git-fixes).
- drm/exynos: fix accidental on-stack copy of exynos_drm_plane (git-fixes).
- drm/exynos: gsc: minor fix for loop iteration in gsc_runtime_resume (git-fixes).
- drm/framebuffer: Fix use of uninitialized variable (git-fixes).
- drm/mediatek: Return error if MDP RDMA failed to enable the clock (git-fixes).
- drm/msm/dpu: Drop enable and frame_count parameters from dpu_hw_setup_misr() (git-fixes).
- drm/msm/dpu: Ratelimit framedone timeout msgs (git-fixes).
- drm/msm/dpu: Set input_sel bit for INTF (git-fixes).
- drm/msm/dpu: fix writeback programming for YUV cases (git-fixes).
- drm/msm/dpu: rename dpu_encoder_phys_wb_setup_cdp to match its functionality (git-fixes).
- drm/msm/dsi: Enable runtime PM (git-fixes).
- drm/msm/dsi: Use pm_runtime_resume_and_get to prevent refcnt leaks (git-fixes).
- drm/msm/mdp4: flush vblank event on disable (git-fixes).
- drm/nouveau/fence:: fix warning directly dereferencing a rcu pointer (git-fixes).
- drm/panel-edp: Add override_edid_mode quirk for generic edp (git-fixes).
- drm/panel-elida-kd35t133: hold panel in reset for unprepare (git-fixes).
- drm/panel: nt35510: fix typo (git-fixes).
- drm/panfrost: Ignore core_mask for poweroff and disable PWRTRANS irq (git-fixes).
- drm/panfrost: Really power off GPU cores in panfrost_gpu_power_off() (git-fixes).
- drm/radeon/dpm: fix a memleak in sumo_parse_power_table (git-fixes).
- drm/radeon/r100: Fix integer overflow issues in r100_cs_track_check() (git-fixes).
- drm/radeon/r600_cs: Fix possible int overflows in r600_cs_check_reg() (git-fixes).
- drm/radeon/trinity_dpm: fix a memleak in trinity_parse_power_table (git-fixes).
- drm/radeon: check return value of radeon_ring_lock() (git-fixes).
- drm/radeon: check the alloc_workqueue return value in radeon_crtc_init() (git-fixes).
- drm/tidss: Check for K2G in in dispc_softreset() (git-fixes).
- drm/tidss: Fix atomic_flush check (git-fixes).
- drm/tidss: Fix dss reset (git-fixes).
- drm/tidss: Move reset to the end of dispc_init() (git-fixes).
- drm/tidss: Return error value from from softreset (git-fixes).
- drm/tilcdc: Fix irq free on unload (git-fixes).
- drm: Do not unref the same fb many times by mistake due to deadlock handling (git-fixes).
- drm: panel-simple: add missing bus flags for Tianma tm070jvhg[30/33] (git-fixes).
- drm: using mul_u32_u32() requires linux/math64.h (git-fixes).
- dt-bindings: gpio: Remove FSI domain ports on Tegra234 (jsc#PED-6694)
- efi/libstub: Disable PCI DMA before grabbing the EFI memory map (git-fixes).
- eventfd: prevent underflow for eventfd semaphores (git-fixes).
- exfat: fix reporting fs error when reading dir beyond EOF (git-fixes).
- exfat: support handle zero-size directory (git-fixes).
- exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree (git-fixes).
- fbdev: Only disable sysfb on the primary device (bsc#1216441)
- fbdev: Only disable sysfb on the primary device (bsc#1216441) Update an existing patch to fix bsc#1216441.
- fbdev: flush deferred IO before closing (git-fixes).
- fbdev: flush deferred work in fb_deferred_io_fsync() (git-fixes).
- fbdev: imxfb: fix left margin setting (git-fixes).
- fbdev: mmp: Fix typo and wording in code comment (git-fixes).
- firewire: core: correct documentation of fw_csr_string() kernel API (git-fixes).
- firewire: ohci: suppress unexpected system reboot in AMD Ryzen machines and ASM108x/VT630x PCIe cards (git-fixes).
- firmware: ti_sci: Fix an off-by-one in ti_sci_debugfs_create() (git-fixes).
- fjes: fix memleaks in fjes_hw_setup (git-fixes).
- fs/mount_setattr: always cleanup mount_kattr (git-fixes).
- fs: Fix error checking for d_hash_and_lookup() (git-fixes).
- fs: Move notify_change permission checks into may_setattr (git-fixes).
- fs: do not audit the capability check in simple_xattr_list() (git-fixes).
- fs: drop peer group ids under namespace lock (git-fixes).
- fs: indicate request originates from old mount API (git-fixes).
- fs: sendfile handles O_NONBLOCK of out_fd (git-fixes).
- fuse: dax: set fc-&gt;dax to NULL in fuse_dax_conn_free() (bsc#1218659).
- gfs2: Always check inode size of inline inodes (git-fixes).
- gfs2: Cosmetic gfs2_dinode_{in,out} cleanup (git-fixes).
- gfs2: Disable page faults during lockless buffered reads (git-fixes).
- gfs2: Eliminate ip-&gt;i_gh (git-fixes).
- gfs2: Eliminate vestigial HIF_FIRST (git-fixes).
- gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump (git-fixes).
- gfs2: Introduce flag for glock holder auto-demotion (git-fixes).
- gfs2: Move the inode glock locking to gfs2_file_buffered_write (git-fixes).
- gfs2: Remove redundant check from gfs2_glock_dq (git-fixes).
- gfs2: Switch to wait_event in gfs2_logd (git-fixes).
- gfs2: assign rgrp glock before compute_bitstructs (git-fixes).
- gfs2: low-memory forced flush fixes (git-fixes).
- gfs2: release iopen glock early in evict (git-fixes).
- gpio: eic-sprd: Clear interrupt after set the interrupt type (git-fixes).
- gpu/drm/radeon: fix two memleaks in radeon_vm_init (git-fixes).
- hv_netvsc: rndis_filter needs to select NLS (git-fixes).
- hwmon: (corsair-psu) Fix probe when built-in (git-fixes).
- hwrng: core - Fix page fault dead lock on mmap-ed hwrng (git-fixes).
- i2c: rk3x: fix potential spinlock recursion on poll (git-fixes).
- i2c: s3c24xx: fix read transfers in polling mode (git-fixes).
- i2c: s3c24xx: fix transferring more than one message in polling mode (git-fixes).
- iio: adc: ad7091r: Pass iio_dev to event handler (git-fixes).
- iio: adc: ad9467: add mutex to struct ad9467_state (git-fixes).
- iio: adc: ad9467: do not ignore error codes (git-fixes).
- iio: adc: ad9467: fix reset gpio handling (git-fixes).
- ipmi: Use regspacings passed as a module parameter (git-fixes).
- kabi, vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).
- kabi/severities: ignore ASoC AMD acp driver symbols (bsc#1219136)
- kdb: Fix a potential buffer overflow in kdb_local() (git-fixes).
- kernel-doc: handle a void function without producing a warning (git-fixes).
- kernfs: fix missing kernfs_idr_lock to remove an ID from the IDR (git-fixes).
- leds: aw2013: Select missing dependency REGMAP_I2C (git-fixes).
- leds: ledtrig-tty: Free allocated ttyname buffer on deactivate (git-fixes).
- libapi: Add missing linux/types.h header to get the __u64 type on io.h (git-fixes).
- md: fix bi_status reporting in md_end_clone_io (bsc#1210443).
- media: cx231xx: fix a memleak in cx231xx_init_isoc (git-fixes).
- media: dt-bindings: ov8856: decouple lanes and link frequency from driver (git-fixes).
- media: dvb-frontends: m88ds3103: Fix a memory leak in an error handling path of m88ds3103_probe() (git-fixes).
- media: imx355: Enable runtime PM before registering async sub-device (git-fixes).
- media: ov9734: Enable runtime PM before registering async sub-device (git-fixes).
- media: pvrusb2: fix use after free on context disconnection (git-fixes).
- media: rkisp1: Disable runtime PM in probe error path (git-fixes).
- media: rkisp1: Fix media device memory leak (git-fixes).
- media: rkisp1: Read the ID register at probe time instead of streamon (git-fixes).
- media: videobuf2-dma-sg: fix vmap callback (git-fixes).
- mfd: intel-lpss: Fix the fractional clock divider flags (git-fixes).
- misc: fastrpc: Mark all sessions as invalid in cb_remove (git-fixes).
- mm: fs: initialize fsdata passed to write_begin/write_end interface (git-fixes).
- mmc: core: Cancel delayed work before releasing host (git-fixes).
- modpost: move __attribute__((format(printf, 2, 3))) to modpost.h (git-fixes).
- mtd: Fix gluebi NULL pointer dereference caused by ftl notifier (git-fixes).
- mtd: rawnand: Increment IFC_TIMEOUT_MSECS for nand controller response (git-fixes).
- mtd: rawnand: pl353: Fix kernel doc (git-fixes).
- mtd: rawnand: rockchip: Add missing title to a kernel doc comment (git-fixes).
- mtd: rawnand: rockchip: Rename a structure (git-fixes).
- net: phy: micrel: populate .soft_reset for KSZ9131 (git-fixes).
- net: usb: ax88179_178a: Bind only to vendor-specific interface (bsc#1218948).
- net: usb: ax88179_178a: avoid two consecutive device resets (bsc#1218948).
- net: usb: ax88179_178a: move priv to driver_priv (git-fixes).
- net: usb: ax88179_178a: remove redundant init code (git-fixes).
- net: usb: ax88179_178a: restore state on resume (bsc#1218948).
- nfc: nci: free rx_data_reassembly skb on NCI device cleanup (git-fixes).
- nfsd4: add refcount for nfsd4_blocked_lock (bsc#1218968 bsc#1219349).
- nfsd: fix RELEASE_LOCKOWNER (bsc#1218968).
- nouveau/tu102: flush all pdbs on vmm flush (git-fixes).
- nouveau/vmm: do not set addr on the fail path to avoid warning (git-fixes).
- nsfs: add compat ioctl handler (git-fixes).
- nvme-loop: always quiesce and cancel commands before destroying admin q (bsc#1211515).
- nvme-pci: add BOGUS_NID for Intel 0a54 device (git-fixes).
- nvme-pci: fix sleeping function called from interrupt context (git-fixes).
- nvme-rdma: Fix transfer length when write_generate/read_verify are 0 (git-fixes).
- nvme-tcp: avoid open-coding nvme_tcp_teardown_admin_queue() (bsc#1211515).
- nvme: fix max_discard_sectors calculation (git-fixes).
- nvme: introduce helper function to get ctrl state (git-fixes).
- nvme: move nvme_stop_keep_alive() back to original position (bsc#1211515).
- nvme: start keep-alive after admin queue setup (bsc#1211515).
- nvme: trace: avoid memcpy overflow warning (git-fixes).
- nvmet: re-fix tracing strncpy() warning (git-fixes).
- of: Fix double free in of_parse_phandle_with_args_map (git-fixes).
- of: unittest: Fix of_count_phandle_with_args() expected value message (git-fixes).
- parport: parport_serial: Add Brainboxes BAR details (git-fixes).
- parport: parport_serial: Add Brainboxes device IDs and geometry (git-fixes).
- pci: Drop PCI vmd patches that caused a regression (bsc#1218005)
- perf/x86/intel/uncore: Factor out topology_gidnid_map() (bsc#1218958).
- perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology() (bsc#1218958).
- perf/x86/uncore: Use u64 to replace unsigned for the uncore offsets array (bsc#1219512).
- phy: renesas: rcar-gen3-usb2: Fix returning wrong error code (git-fixes).
- phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP (git-fixes).
- pinctrl: intel: Revert 'Unexport intel_pinctrl_probe()' (git-fixes).
- platform/x86/amd/hsmp: Fix iomem handling (jsc#PED-7620).
- platform/x86/amd/hsmp: add support for metrics tbl (jsc#PED-7620).
- platform/x86/amd/hsmp: create plat specific struct (jsc#PED-7620).
- platform/x86/amd/hsmp: improve the error log (jsc#PED-7620).
- platform/x86: ISST: Reduce noise for missing numa information in logs (bsc#1219285).
- platform/x86: use PLATFORM_DEVID_NONE instead of -1 (jsc#PED-7620).
- power: supply: bq256xx: fix some problem in bq256xx_hw_init (git-fixes).
- power: supply: cw2015: correct time_to_empty units in sysfs (git-fixes).
- powerpc/fadump: reset dump area size if fadump memory reserve fails (bsc#1194869).
- powerpc/powernv: Add a null pointer check in opal_event_init() (bsc#1065729).
- powerpc/powernv: Add a null pointer check in opal_powercap_init() (bsc#1181674 ltc#189159 git-fixes).
- powerpc/powernv: Add a null pointer check to scom_debug_init_one() (bsc#1194869).
- powerpc/pseries/iommu: enable_ddw incorrectly returns direct mapping for SR-IOV device (bsc#1212091 ltc#199106 git-fixes).
- powerpc/pseries/memhp: Fix access beyond end of drmem array (bsc#1065729).
- powerpc/pseries: fix possible memory leak in ibmebus_bus_init() (bsc#1194869).
- powerpc/pseries: fix potential memory leak in init_cpu_associativity() (bsc#1194869).
- powerpc/xive: Fix endian conversion size (bsc#1194869).
- pstore: ram_core: fix possible overflow in persistent_ram_init_ecc() (git-fixes).
- pwm: Fix out-of-bounds access in of_pwm_single_xlate() (git-fixes).
- pwm: jz4740: Do not use dev_err_probe() in .request() (git-fixes).
- pwm: stm32: Fix enable count for clk in .probe() (git-fixes).
- pwm: stm32: Use hweight32 in stm32_pwm_detect_channels (git-fixes).
- pwm: stm32: Use regmap_clear_bits and regmap_set_bits where applicable (git-fixes).
- r8152: add vendor/device ID pair for ASUS USB-C2500 (git-fixes).
- r8152: add vendor/device ID pair for D-Link DUB-E250 (git-fixes).
- reset: hisilicon: hi6220: fix Wvoid-pointer-to-enum-cast warning (git-fixes).
- ring-buffer/Documentation: Add documentation on buffer_percent file (git-fixes).
- ring-buffer: Do not record in NMI if the arch does not support cmpxchg in NMI (git-fixes).
- s390/dasd: fix double module refcount decrement (bsc#1141539).
- s390/pci: fix max size calculation in zpci_memcpy_toio() (git-fixes bsc#1219006).
- s390/vfio-ap: always filter entire AP matrix (git-fixes bsc#1219012).
- s390/vfio-ap: let on_scan_complete() callback filter matrix and update guest's APCB (git-fixes bsc#1219014).
- s390/vfio-ap: loop over the shadow APCB when filtering guest's AP configuration (git-fixes bsc#1219013).
- s390/vfio-ap: unpin pages on gisc registration failure (git-fixes bsc#1218723).
- sched/isolation: add cpu_is_isolated() API (bsc#1217895).
- scripts/kernel-doc: restore warning for Excess struct/union (git-fixes).
- scsi: be2iscsi: Fix a memleak in beiscsi_init_wrb_handle() (git-fixes).
- scsi: bnx2fc: Fix skb double free in bnx2fc_rcv() (git-fixes).
- scsi: core: Always send batch on reset or error handling command (git-fixes).
- scsi: fnic: Return error if vmalloc() failed (git-fixes).
- scsi: hisi_sas: Correct the number of global debugfs registers (git-fixes).
- scsi: hisi_sas: Fix normally completed I/O analysed as failed (git-fixes).
- scsi: hisi_sas: Fix warnings detected by sparse (git-fixes).
- scsi: hisi_sas: Modify v3 HW SATA completion error processing (git-fixes).
- scsi: hisi_sas: Modify v3 HW SSP underflow error processing (git-fixes).
- scsi: hisi_sas: Rename HISI_SAS_{RESET -&gt; RESETTING}_BIT (git-fixes).
- scsi: hisi_sas: Replace with standard error code return value (git-fixes).
- scsi: hisi_sas: Rollback some operations if FLR failed (git-fixes).
- scsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs (git-fixes).
- scsi: ibmvfc: Fix erroneous use of rtas_busy_delay with hcall return code (git-fixes).
- scsi: ibmvfc: Implement channel queue depth and event buffer accounting (bsc#1209834 ltc#202097).
- scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool (bsc#1209834 ltc#202097).
- scsi: iscsi: Rename iscsi_set_param() to iscsi_if_set_param() (git-fixes).
- scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (git-fixes).
- scsi: lpfc: Change VMID driver load time parameters to read only (bsc#1219582).
- scsi: lpfc: Move determination of vmid_flag after VMID reinitialization completes (bsc#1219582).
- scsi: lpfc: Reinitialize an NPIV's VMID data structures after FDISC (bsc#1219582).
- scsi: lpfc: Update lpfc version to 14.2.0.17 (bsc#1219582).
- scsi: megaraid_sas: Fix deadlock on firmware crashdump (git-fixes).
- scsi: megaraid_sas: Increase register read retry rount from 3 to 30 for selected registers (git-fixes).
- scsi: mpt3sas: Fix an outdated comment (git-fixes).
- scsi: mpt3sas: Fix in error path (git-fixes).
- scsi: mpt3sas: Fix loop logic (bsc#1219067).
- scsi: mpt3sas: Fix loop logic (git-fixes).
- scsi: pm80xx: Avoid leaking tags when processing OPC_INB_SET_CONTROLLER_CONFIG command (git-fixes).
- scsi: pm80xx: Use phy-specific SAS address when sending PHY_START command (git-fixes).
- scsi: qla2xxx: Fix system crash due to bad pointer access (git-fixes).
- selftests/net: fix grep checking for fib_nexthop_multiprefix (git-fixes).
- serial: 8250: omap: Do not skip resource freeing if pm_runtime_resume_and_get() failed (git-fixes).
- serial: core: Fix atomicity violation in uart_tiocmget (git-fixes).
- serial: imx: Correct clock error message in function probe() (git-fixes).
- serial: imx: fix tx statemachine deadlock (git-fixes).
- serial: max310x: fail probe if clock crystal is unstable (git-fixes).
- serial: max310x: improve crystal stable clock detection (git-fixes).
- serial: max310x: set default value when reading clock ready bit (git-fixes).
- serial: sc16is7xx: add check for unsupported SPI modes during probe (git-fixes).
- serial: sc16is7xx: set safe default SPI clock frequency (git-fixes).
- serial: sccnxp: Improve error message if regulator_disable() fails (git-fixes).
- series.conf: the patch is not in git and breaks series_insert.py
- shmem: use ramfs_kill_sb() for kill_sb method of ramfs-based tmpfs (git-fixes).
- software node: Let args be NULL in software_node_get_reference_args (git-fixes).
- spi: spi-zynqmp-gqspi: fix driver kconfig dependencies (git-fixes).
- swiotlb-xen: provide the 'max_mapping_size' method (git-fixes).
- swiotlb: fix a braino in the alignment check fix (bsc#1216559).
- swiotlb: fix slot alignment checks (bsc#1216559).
- trace,smp: Add tracepoints around remotelly called functions (bsc#1217895).
- tracefs: Add missing lockdown check to tracefs_create_dir() (git-fixes).
- tracing/trigger: Fix to return error if failed to alloc snapshot (git-fixes).
- tracing: Add size check when printing trace_marker output (git-fixes).
- tracing: Ensure visibility when inserting an element into tracing_map (git-fixes).
- tracing: Fix uaf issue when open the hist or hist_debug file (git-fixes).
- tracing: Have large events show up as '[LINE TOO BIG]' instead of nothing (git-fixes).
- tracing: Increase trace array ref count on enable and filter files (bsc#1219490).
- ubifs: Check @c-&gt;dirty_[n|p]n_cnt and @c-&gt;nroot state under @c-&gt;lp_mutex (git-fixes).
- ubifs: ubifs_link: Fix wrong name len calculating when UBIFS is encrypted (git-fixes).
- ubifs: ubifs_symlink: Fix memleak of inode-&gt;i_link in error path (git-fixes).
- uio: Fix use-after-free in uio_open (git-fixes).
- usb: cdns3: Fix uvc fail when DMA cross 4k boundery since sg enabled (git-fixes).
- usb: cdns3: fix uvc failure work since sg support enabled (git-fixes).
- usb: chipidea: wait controller resume finished for wakeup irq (git-fixes).
- usb: dwc: ep0: Update request status in dwc3_ep0_stall_restart (git-fixes).
- usb: fsl-mph-dr-of: mark fsl_usb2_mpc5121_init() static (git-fixes).
- usb: host: xhci-plat: Add support for XHCI_SG_TRB_CACHE_SIZE_QUIRK (git-fixes).
- usb: mon: Fix atomicity violation in mon_bin_vma_fault (git-fixes).
- usb: otg numberpad exception (bsc#1218527).
- usb: phy: mxs: remove CONFIG_USB_OTG condition for mxs_phy_is_otg_host() (git-fixes).
- usb: typec: class: fix typec_altmode_put_partner to put plugs (git-fixes).
- usb: ucsi: Add missing ppm_lock (git-fixes).
- usb: ucsi_acpi: Fix command completion handling (git-fixes).
- usb: xhci-mtk: fix a short packet issue of gen1 isoc-in transfer (git-fixes).
- usr/Kconfig: fix typos of 'its' (git-fixes).
- vfs: make freeze_super abort when sync_filesystem returns error (git-fixes).
- vhost: Allow null msg.size on VHOST_IOTLB_INVALIDATE (git-fixes).
- virtio-mmio: fix memory leak of vm_dev (git-fixes).
- virtio_balloon: Fix endless deflation and inflation on arm64 (git-fixes).
- vmstat: skip periodic vmstat update for isolated CPUs (bsc#1217895).
- vsock/virtio: Fix unsigned integer wrap around in virtio_transport_has_space() (git-fixes).
- watchdog/hpwdt: Only claim UNKNOWN NMI if from iLO (git-fixes).
- watchdog: bcm2835_wdt: Fix WDIOC_SETTIMEOUT handling (git-fixes).
- watchdog: rti_wdt: Drop runtime pm reference count when watchdog is unused (git-fixes).
- watchdog: set cdev owner before adding (git-fixes).
- wifi: ath11k: Defer on rproc_get failure (git-fixes).
- wifi: cfg80211: lock wiphy mutex for rfkill poll (git-fixes).
- wifi: iwlwifi: mvm: send TX path flush in rfkill (git-fixes).
- wifi: iwlwifi: mvm: set siso/mimo chains to 1 in FW SMPS request (git-fixes).
- wifi: iwlwifi: pcie: avoid a NULL pointer dereference (git-fixes).
- wifi: libertas: stop selecting wext (git-fixes).
- wifi: mt76: fix broken precal loading from MTD for mt7915 (git-fixes).
- wifi: mt76: mt7921s: fix workqueue problem causes STA association fail (git-fixes).
- wifi: mwifiex: configure BSSID consistently when starting AP (git-fixes).
- wifi: rtlwifi: Convert LNKCTL change to PCIe cap RMW accessors (git-fixes).
- wifi: rtlwifi: Remove bogus and dangerous ASPM disable/enable code (git-fixes).
- wifi: rtlwifi: add calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8188ee: phy: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192c: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192ce: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192cu: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192de: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192ee: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8192se: using calculate_bit_shift() (git-fixes).
- wifi: rtlwifi: rtl8821ae: phy: fix an undefined bitwise shift behavior (git-fixes).
- wifi: rtw88: fix RX filter in FIF_ALLMULTI flag (git-fixes).
- x86/MCE/AMD, EDAC/mce_amd: Decode UMC_V2 ECC errors (jsc#PED-7616).
- x86/MCE/AMD: Add new MA_LLC, USR_DP, and USR_CP bank types (jsc#PED-7622).
- x86/MCE/AMD: Split amd_mce_is_memory_error() (jsc#PED-7623).
- x86/amd_nb: Add AMD Family MI300 PCI IDs (jsc#PED-7622).
- x86/amd_nb: Add MI200 PCI IDs (jsc#PED-7616).
- x86/cpu: Merge Intel and AMD ppin_init() functions (jsc#PED-7615).
- x86/cpu: Read/save PPIN MSR during initialization (jsc#PED-7615).
- x86/entry/ia32: Ensure s32 is sign extended to s64 (bsc#1193285).
- x86/hyperv: Fix the detection of E820_TYPE_PRAM in a Gen2 VM (git-fixes).
- x86/hyperv: Use atomic_try_cmpxchg() to micro-optimize hv_nmi_unknown() (git-fixes).
- x86/mce: Cleanup mce_usable_address() (jsc#PED-7623).
- x86/mce: Define amd_mce_usable_address() (jsc#PED-7623).
- xen-pciback: Consider INTx disabled when MSI/MSI-X is enabled (git-fixes).
- xen/events: fix delayed eoi list handling (git-fixes).
- xhci: Add grace period after xHC start to prevent premature runtime suspend (git-fixes).
- xhci: cleanup xhci_hub_control port references (git-fixes).
- xhci: pass port pointer as parameter to xhci_set_port_power() (git-fixes).
- xhci: track port suspend state correctly in unsuccessful resume cases (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-15"/>
	<updated date="2024-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108281">SUSE bug 1108281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141539">SUSE bug 1141539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174649">SUSE bug 1174649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181674">SUSE bug 1181674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193285">SUSE bug 1193285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209834">SUSE bug 1209834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210443">SUSE bug 1210443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211515">SUSE bug 1211515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212091">SUSE bug 1212091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214377">SUSE bug 1214377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215275">SUSE bug 1215275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215885">SUSE bug 1215885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216441">SUSE bug 1216441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216559">SUSE bug 1216559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216702">SUSE bug 1216702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217895">SUSE bug 1217895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217987">SUSE bug 1217987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217988">SUSE bug 1217988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217989">SUSE bug 1217989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218005">SUSE bug 1218005</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218447">SUSE bug 1218447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218527">SUSE bug 1218527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218659">SUSE bug 1218659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218689">SUSE bug 1218689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218713">SUSE bug 1218713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218723">SUSE bug 1218723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218730">SUSE bug 1218730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218752">SUSE bug 1218752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218757">SUSE bug 1218757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218768">SUSE bug 1218768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218778">SUSE bug 1218778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218779">SUSE bug 1218779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218804">SUSE bug 1218804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218832">SUSE bug 1218832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218836">SUSE bug 1218836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218916">SUSE bug 1218916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218948">SUSE bug 1218948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218958">SUSE bug 1218958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218968">SUSE bug 1218968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218997">SUSE bug 1218997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219006">SUSE bug 1219006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219012">SUSE bug 1219012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219013">SUSE bug 1219013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219014">SUSE bug 1219014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219053">SUSE bug 1219053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219067">SUSE bug 1219067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219120">SUSE bug 1219120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219128">SUSE bug 1219128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219136">SUSE bug 1219136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219285">SUSE bug 1219285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219349">SUSE bug 1219349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219412">SUSE bug 1219412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219429">SUSE bug 1219429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219434">SUSE bug 1219434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219490">SUSE bug 1219490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219512">SUSE bug 1219512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219568">SUSE bug 1219568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219582">SUSE bug 1219582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219608">SUSE bug 1219608</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33631/">CVE-2021-33631 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33631">CVE-2021-33631 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46838/">CVE-2023-46838 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46838">CVE-2023-46838 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47233/">CVE-2023-47233 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47233">CVE-2023-47233 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4921/">CVE-2023-4921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4921">CVE-2023-4921 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51042/">CVE-2023-51042 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51042">CVE-2023-51042 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51043/">CVE-2023-51043 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51043">CVE-2023-51043 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51780/">CVE-2023-51780 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51780">CVE-2023-51780 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51782/">CVE-2023-51782 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51782">CVE-2023-51782 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-6040/">CVE-2023-6040 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6040">CVE-2023-6040 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6356/">CVE-2023-6356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6356">CVE-2023-6356 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6531/">CVE-2023-6531 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6531">CVE-2023-6531 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6535/">CVE-2023-6535 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6535">CVE-2023-6535 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6536/">CVE-2023-6536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6536">CVE-2023-6536 at NVD</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6915/">CVE-2023-6915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6915">CVE-2023-6915 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-0340/">CVE-2024-0340 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0340">CVE-2024-0340 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0565/">CVE-2024-0565 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0565">CVE-2024-0565 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0641/">CVE-2024-0641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0641">CVE-2024-0641 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0775/">CVE-2024-0775 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0775">CVE-2024-0775 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1085/">CVE-2024-1085 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1085">CVE-2024-1085 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1086/">CVE-2024-1086 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1086">CVE-2024-1086 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24860/">CVE-2024-24860 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24860">CVE-2024-24860 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846474" comment="cluster-md-kmp-64kb-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846475" comment="cluster-md-kmp-default-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846476" comment="dlm-kmp-64kb-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846477" comment="dlm-kmp-default-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846478" comment="dtb-allwinner-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846479" comment="dtb-altera-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846480" comment="dtb-amazon-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846481" comment="dtb-amd-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846482" comment="dtb-amlogic-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846483" comment="dtb-apm-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846484" comment="dtb-apple-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846485" comment="dtb-arm-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846486" comment="dtb-broadcom-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846487" comment="dtb-cavium-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846488" comment="dtb-exynos-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846489" comment="dtb-freescale-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846490" comment="dtb-hisilicon-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846491" comment="dtb-lg-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846492" comment="dtb-marvell-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846493" comment="dtb-mediatek-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846494" comment="dtb-nvidia-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846495" comment="dtb-qcom-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846496" comment="dtb-renesas-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846497" comment="dtb-rockchip-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846498" comment="dtb-socionext-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846499" comment="dtb-sprd-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846500" comment="dtb-xilinx-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846501" comment="gfs2-kmp-64kb-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846502" comment="gfs2-kmp-default-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846503" comment="kernel-64kb-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846504" comment="kernel-64kb-devel-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846505" comment="kernel-64kb-extra-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846506" comment="kernel-64kb-livepatch-devel-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846507" comment="kernel-64kb-optional-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846508" comment="kernel-debug-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846509" comment="kernel-debug-devel-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846510" comment="kernel-debug-livepatch-devel-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846511" comment="kernel-debug-vdso-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846512" comment="kernel-default-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846513" comment="kernel-default-base-5.14.21-150500.55.49.1.150500.6.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846514" comment="kernel-default-base-rebuild-5.14.21-150500.55.49.1.150500.6.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846515" comment="kernel-default-devel-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846516" comment="kernel-default-extra-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846517" comment="kernel-default-livepatch-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846518" comment="kernel-default-livepatch-devel-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846519" comment="kernel-default-optional-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846520" comment="kernel-default-vdso-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846521" comment="kernel-devel-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846522" comment="kernel-docs-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846523" comment="kernel-docs-html-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846524" comment="kernel-kvmsmall-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846525" comment="kernel-kvmsmall-devel-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846526" comment="kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846527" comment="kernel-kvmsmall-vdso-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846528" comment="kernel-macros-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846529" comment="kernel-obs-build-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846530" comment="kernel-obs-qa-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846531" comment="kernel-source-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846532" comment="kernel-source-vanilla-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846533" comment="kernel-syms-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846534" comment="kernel-zfcpdump-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846535" comment="kselftests-kmp-64kb-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846536" comment="kselftests-kmp-default-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846537" comment="ocfs2-kmp-64kb-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846538" comment="ocfs2-kmp-default-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846539" comment="reiserfs-kmp-64kb-5.14.21-150500.55.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846540" comment="reiserfs-kmp-default-5.14.21-150500.55.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5181" version="1" class="patch">
	<metadata>
		<title>Security update for libaom (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218429" ref_url="https://bugzilla.suse.com/1218429" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-6879" ref_url="https://www.suse.com/security/cve/CVE-2023-6879/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017940.html" source="SUSE-SU"/>
		<description>
This update for libaom fixes the following issues:

- CVE-2023-6879: Fixed a heap buffer overflow when increasing the
  video frame resolution (bsc#1218429).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-15"/>
	<updated date="2024-02-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218429">SUSE bug 1218429</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6879/">CVE-2023-6879 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6879">CVE-2023-6879 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009818863" comment="aom-tools-3.2.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818864" comment="libaom-devel-3.2.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818865" comment="libaom-devel-doc-3.2.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818866" comment="libaom3-3.2.0-150400.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818867" comment="libaom3-32bit-3.2.0-150400.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5182" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219679" ref_url="https://bugzilla.suse.com/1219679" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0985" ref_url="https://www.suse.com/security/cve/CVE-2024-0985/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017945.html" source="SUSE-SU"/>
		<description>
This update for postgresql13 fixes the following issues:

Upgrade to 13.14:

- CVE-2024-0985: Tighten security restrictions within REFRESH MATERIALIZED VIEW CONCURRENTLY (bsc#1219679).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-16"/>
	<updated date="2024-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219679">SUSE bug 1219679</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0985/">CVE-2024-0985 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846541" comment="postgresql13-13.14-150200.5.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846542" comment="postgresql13-contrib-13.14-150200.5.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846543" comment="postgresql13-devel-13.14-150200.5.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846544" comment="postgresql13-docs-13.14-150200.5.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846545" comment="postgresql13-llvmjit-13.14-150200.5.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846546" comment="postgresql13-llvmjit-devel-13.14-150200.5.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846547" comment="postgresql13-plperl-13.14-150200.5.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846548" comment="postgresql13-plpython-13.14-150200.5.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846549" comment="postgresql13-pltcl-13.14-150200.5.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846550" comment="postgresql13-server-13.14-150200.5.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846551" comment="postgresql13-server-devel-13.14-150200.5.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846552" comment="postgresql13-test-13.14-150200.5.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5183" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219679" ref_url="https://bugzilla.suse.com/1219679" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0985" ref_url="https://www.suse.com/security/cve/CVE-2024-0985/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017942.html" source="SUSE-SU"/>
		<description>
This update for postgresql12 fixes the following issues:

Upgrade to 12.18:

- CVE-2024-0985: Tighten security restrictions within REFRESH MATERIALIZED VIEW CONCURRENTLY (bsc#1219679).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-16"/>
	<updated date="2024-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219679">SUSE bug 1219679</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0985/">CVE-2024-0985 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009846553" comment="postgresql12-12.18-150200.8.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846554" comment="postgresql12-contrib-12.18-150200.8.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846555" comment="postgresql12-devel-12.18-150200.8.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846556" comment="postgresql12-docs-12.18-150200.8.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846557" comment="postgresql12-llvmjit-12.18-150200.8.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846558" comment="postgresql12-llvmjit-devel-12.18-150200.8.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846559" comment="postgresql12-plperl-12.18-150200.8.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846560" comment="postgresql12-plpython-12.18-150200.8.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846561" comment="postgresql12-pltcl-12.18-150200.8.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846562" comment="postgresql12-server-12.18-150200.8.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846563" comment="postgresql12-server-devel-12.18-150200.8.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009846564" comment="postgresql12-test-12.18-150200.8.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5184" version="1" class="patch">
	<metadata>
		<title>Security update for dpdk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1202903" ref_url="https://bugzilla.suse.com/1202903" source="BUGZILLA"/>
		<reference ref_id="1219187" ref_url="https://bugzilla.suse.com/1219187" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-2132" ref_url="https://www.suse.com/security/cve/CVE-2022-2132/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017948.html" source="SUSE-SU"/>
		<description>
This update for dpdk fixes the following issues:

- Fixed a regression caused by incomplete fix for CVE-2022-2132 (bsc#1219187).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-19"/>
	<updated date="2024-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202903">SUSE bug 1202903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219187">SUSE bug 1219187</bugzilla>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2132/">CVE-2022-2132 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2132">CVE-2022-2132 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009847370" comment="dpdk-19.11.10-150500.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847371" comment="dpdk-devel-19.11.10-150500.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847372" comment="dpdk-doc-19.11.10-150500.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847373" comment="dpdk-examples-19.11.10-150500.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847374" comment="dpdk-kmp-default-19.11.10_k5.14.21_150500.55.44-150500.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847375" comment="dpdk-thunderx-19.11.10-150500.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847376" comment="dpdk-thunderx-devel-19.11.10-150500.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847377" comment="dpdk-thunderx-doc-19.11.10-150500.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847378" comment="dpdk-thunderx-examples-19.11.10-150500.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847379" comment="dpdk-thunderx-kmp-default-19.11.10_k5.14.21_150500.55.44-150500.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847380" comment="dpdk-thunderx-tools-19.11.10-150500.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847381" comment="dpdk-tools-19.11.10-150500.5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847382" comment="libdpdk-20_0-19.11.10-150500.5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5185" version="1" class="patch">
	<metadata>
		<title>Security update for hdf5 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1011205" ref_url="https://bugzilla.suse.com/1011205" source="BUGZILLA"/>
		<reference ref_id="1093641" ref_url="https://bugzilla.suse.com/1093641" source="BUGZILLA"/>
		<reference ref_id="1125882" ref_url="https://bugzilla.suse.com/1125882" source="BUGZILLA"/>
		<reference ref_id="1167400" ref_url="https://bugzilla.suse.com/1167400" source="BUGZILLA"/>
		<reference ref_id="1207973" ref_url="https://bugzilla.suse.com/1207973" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-4332" ref_url="https://www.suse.com/security/cve/CVE-2016-4332/" source="CVE"/>
		<reference ref_id="CVE-2018-11202" ref_url="https://www.suse.com/security/cve/CVE-2018-11202/" source="CVE"/>
		<reference ref_id="CVE-2019-8396" ref_url="https://www.suse.com/security/cve/CVE-2019-8396/" source="CVE"/>
		<reference ref_id="CVE-2020-10812" ref_url="https://www.suse.com/security/cve/CVE-2020-10812/" source="CVE"/>
		<reference ref_id="CVE-2021-37501" ref_url="https://www.suse.com/security/cve/CVE-2021-37501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017975.html" source="SUSE-SU"/>
		<description>
This update for hdf5 fixes the following issues:

Updated to version 1.10.11

  * Changed the error handling for a not found path in the find
    plugin process.
  * Fixed CVE-2018-11202, a malformed file could result in chunk
    index memory leaks.
  * Fixed a file space allocation bug in the parallel library for
    chunked datasets.
  * Fixed an assertion failure in Parallel HDF5 when a file can't
    be created due to an invalid library version bounds setting.
  * Fixed an assertion in a previous fix for CVE-2016-4332.
  * Fixed segfault on file close in h5debug which fails with a core
    dump on a file that has an illegal file size in its cache image.
    Fixes HDFFV-11052, CVE-2020-10812.
  * Fixed memory leaks that could occur when reading a dataset from
    a malformed file.
  * Fixed a bug in H5Ocopy that could generate invalid HDF5 files
  * Fixed potential heap buffer overflow in decoding of link info
    message.
  * Fixed potential buffer overrun issues in some object header
    decode routines.
  * Fixed a heap buffer overflow that occurs when reading from
    a dataset with a compact layout within a malformed HDF5 file.
  * Fixed CVE-2019-8396, malformed HDF5 files where content does
    not match expected size.
  * Fixed memory leak when running h5dump with proof of
    vulnerability file.
  * Added option --no-compact-subset to h5diff.

Fixes since 1.10.10:

  * Fixed a memory corruption when reading from dataset using a
    hyperslab selection in file dataspace and a point selection
    memory dataspace.
  * Fix CVE-2021-37501
  * Fixed an issue with variable length attributes.
  * Fixed an issue with hyperslab selections where an incorrect
    combined selection was produced.
  * Fixed an issue with attribute type conversion with compound
    datatypes.
  * Modified H5Fstart_swmr_write() to preserve DAPL properties.
  * Converted an assertion on (possibly corrupt) file contents to
    a normal error check.
  * Fixed memory leak with variable-length fill value in
    H5O_fill_convert().
  * Fix h5repack to only print output when verbose option is
    selected.

Fixes since 1.10.9:

  * Several improvements to parallel compression feature,
    including:
    + Improved support for collective I/O (for both writes and
      reads).
    + Reduction of copying of application data buffers passed to
      H5Dwrite.
    + Addition of support for incremental file space allocation
      for filtered datasets created in parallel.
    + Addition of support for HDF5's 'don't filter partial edge
      chunks' flag
    + Addition of proper support for HDF5 fill values with the
      feature.
    + Addition of 'H5_HAVE_PARALLEL_FILTERED_WRITES' macro to
      H5pubconf.h
      so HDF5 applications can determine at compile-time whether
      the feature is available.
    + Addition of simple examples
  * h5repack added an optional verbose value for reporting R/W
    timing.
  * Fixed a metadata cache bug when resizing a pinned/protected
    cache entry.
  * Fixed a problem with the H5_VERS_RELEASE check in the
    H5check_version function.
  * Unified handling of collective metadata reads to correctly fix
    old bugs.
  * Fixed several potential MPI deadlocks in library failure
    conditions.
  * Fixed an issue with collective metadata reads being permanently
    disabled after a dataset chunk lookup operation.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-20"/>
	<updated date="2024-02-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1011205">SUSE bug 1011205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1093641">SUSE bug 1093641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125882">SUSE bug 1125882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167400">SUSE bug 1167400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207973">SUSE bug 1207973</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2016-4332/">CVE-2016-4332 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2016-4332">CVE-2016-4332 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11202/">CVE-2018-11202 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-11202">CVE-2018-11202 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8396/">CVE-2019-8396 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-8396">CVE-2019-8396 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10812/">CVE-2020-10812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10812">CVE-2020-10812 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-37501/">CVE-2021-37501 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-37501">CVE-2021-37501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009847486" comment="hdf5-gnu-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847487" comment="hdf5-gnu-hpc-devel-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847488" comment="hdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847489" comment="hdf5-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847490" comment="hdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847491" comment="hdf5-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847492" comment="hdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847493" comment="hdf5-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847494" comment="hdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847495" comment="hdf5-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847496" comment="hdf5-hpc-examples-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847497" comment="hdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847498" comment="hdf5_1_10_11-gnu-hpc-devel-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847499" comment="hdf5_1_10_11-gnu-hpc-devel-static-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847500" comment="hdf5_1_10_11-gnu-hpc-module-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847501" comment="hdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847502" comment="hdf5_1_10_11-gnu-mpich-hpc-devel-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847503" comment="hdf5_1_10_11-gnu-mpich-hpc-devel-static-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847504" comment="hdf5_1_10_11-gnu-mpich-hpc-module-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847505" comment="hdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847506" comment="hdf5_1_10_11-gnu-mvapich2-hpc-devel-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847507" comment="hdf5_1_10_11-gnu-mvapich2-hpc-devel-static-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847508" comment="hdf5_1_10_11-gnu-mvapich2-hpc-module-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847509" comment="hdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847510" comment="hdf5_1_10_11-gnu-openmpi3-hpc-devel-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847511" comment="hdf5_1_10_11-gnu-openmpi3-hpc-devel-static-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847512" comment="hdf5_1_10_11-gnu-openmpi3-hpc-module-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847513" comment="hdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847514" comment="hdf5_1_10_11-gnu-openmpi4-hpc-devel-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847515" comment="hdf5_1_10_11-gnu-openmpi4-hpc-devel-static-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847516" comment="hdf5_1_10_11-gnu-openmpi4-hpc-module-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847517" comment="hdf5_1_10_11-hpc-examples-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847518" comment="libhdf5-gnu-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847519" comment="libhdf5-gnu-mpich-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847520" comment="libhdf5-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847521" comment="libhdf5-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847522" comment="libhdf5-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847523" comment="libhdf5_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847524" comment="libhdf5_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847525" comment="libhdf5_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847526" comment="libhdf5_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847527" comment="libhdf5_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847528" comment="libhdf5_cpp-gnu-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847529" comment="libhdf5_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847530" comment="libhdf5_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847531" comment="libhdf5_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847532" comment="libhdf5_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847533" comment="libhdf5_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847534" comment="libhdf5_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847535" comment="libhdf5_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847536" comment="libhdf5_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847537" comment="libhdf5_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847538" comment="libhdf5_fortran-gnu-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847539" comment="libhdf5_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847540" comment="libhdf5_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847541" comment="libhdf5_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847542" comment="libhdf5_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847543" comment="libhdf5_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847544" comment="libhdf5_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847545" comment="libhdf5_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847546" comment="libhdf5_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847547" comment="libhdf5_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847548" comment="libhdf5_hl-gnu-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847549" comment="libhdf5_hl-gnu-mpich-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847550" comment="libhdf5_hl-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847551" comment="libhdf5_hl-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847552" comment="libhdf5_hl-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847553" comment="libhdf5_hl_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847554" comment="libhdf5_hl_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847555" comment="libhdf5_hl_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847556" comment="libhdf5_hl_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847557" comment="libhdf5_hl_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847558" comment="libhdf5_hl_cpp-gnu-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847559" comment="libhdf5_hl_cpp-gnu-mpich-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847560" comment="libhdf5_hl_cpp-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847561" comment="libhdf5_hl_cpp-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847562" comment="libhdf5_hl_cpp-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847563" comment="libhdf5_hl_cpp_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847564" comment="libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847565" comment="libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847566" comment="libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847567" comment="libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847568" comment="libhdf5_hl_fortran-gnu-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847569" comment="libhdf5_hl_fortran-gnu-mpich-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847570" comment="libhdf5_hl_fortran-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847571" comment="libhdf5_hl_fortran-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847572" comment="libhdf5_hl_fortran-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847573" comment="libhdf5hl_fortran_1_10_11-gnu-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847574" comment="libhdf5hl_fortran_1_10_11-gnu-mpich-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847575" comment="libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847576" comment="libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc-1.10.11-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847577" comment="libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc-1.10.11-150400.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5186" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219113" ref_url="https://bugzilla.suse.com/1219113" source="BUGZILLA"/>
		<reference ref_id="1219604" ref_url="https://bugzilla.suse.com/1219604" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-1745" ref_url="https://www.suse.com/security/cve/CVE-2014-1745/" source="CVE"/>
		<reference ref_id="CVE-2023-40414" ref_url="https://www.suse.com/security/cve/CVE-2023-40414/" source="CVE"/>
		<reference ref_id="CVE-2023-42833" ref_url="https://www.suse.com/security/cve/CVE-2023-42833/" source="CVE"/>
		<reference ref_id="CVE-2024-23206" ref_url="https://www.suse.com/security/cve/CVE-2024-23206/" source="CVE"/>
		<reference ref_id="CVE-2024-23213" ref_url="https://www.suse.com/security/cve/CVE-2024-23213/" source="CVE"/>
		<reference ref_id="CVE-2024-23222" ref_url="https://www.suse.com/security/cve/CVE-2024-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017970.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.42.5 (bsc#1219604):

- CVE-2024-23222: Fixed processing maliciously crafted web content that may have led to arbitrary code execution (bsc#1219113).
- CVE-2024-23206: Fixed fingerprint user via maliciously crafted webpages (bsc#1219604).
- CVE-2024-23213: Fixed processing web content that may have led to arbitrary code execution (bsc#1219604).
- CVE-2023-40414: Fixed processing web content that may have led to arbitrary code execution (bsc#1219604).
- CVE-2014-1745: Fixed denial-of-service or potentially disclose memory contents while processing maliciously crafted files (bsc#1219604).
- CVE-2023-42833: Fixed processing web content that may have led to arbitrary code execution (bsc#1219604).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-20"/>
	<updated date="2024-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219113">SUSE bug 1219113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219604">SUSE bug 1219604</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-1745/">CVE-2014-1745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1745">CVE-2014-1745 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40414/">CVE-2023-40414 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40414">CVE-2023-40414 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42833/">CVE-2023-42833 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42833">CVE-2023-42833 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23206/">CVE-2024-23206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23206">CVE-2024-23206 at NVD</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23213/">CVE-2024-23213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23213">CVE-2024-23213 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23222/">CVE-2024-23222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23222">CVE-2024-23222 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009847578" comment="WebKitGTK-4.0-lang-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847579" comment="WebKitGTK-4.1-lang-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847580" comment="WebKitGTK-6.0-lang-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847581" comment="libjavascriptcoregtk-4_0-18-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847582" comment="libjavascriptcoregtk-4_0-18-32bit-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847583" comment="libjavascriptcoregtk-4_1-0-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847584" comment="libjavascriptcoregtk-4_1-0-32bit-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847585" comment="libjavascriptcoregtk-6_0-1-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847586" comment="libwebkit2gtk-4_0-37-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847587" comment="libwebkit2gtk-4_0-37-32bit-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847588" comment="libwebkit2gtk-4_1-0-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847589" comment="libwebkit2gtk-4_1-0-32bit-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847590" comment="libwebkitgtk-6_0-4-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847591" comment="typelib-1_0-JavaScriptCore-4_0-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847592" comment="typelib-1_0-JavaScriptCore-4_1-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847593" comment="typelib-1_0-JavaScriptCore-6_0-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847594" comment="typelib-1_0-WebKit-6_0-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847595" comment="typelib-1_0-WebKit2-4_0-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847596" comment="typelib-1_0-WebKit2-4_1-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847597" comment="typelib-1_0-WebKit2WebExtension-4_0-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847598" comment="typelib-1_0-WebKit2WebExtension-4_1-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847599" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847600" comment="webkit-jsc-4-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847601" comment="webkit-jsc-4.1-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847602" comment="webkit-jsc-6.0-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847603" comment="webkit2gtk-4_0-injected-bundles-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847604" comment="webkit2gtk-4_1-injected-bundles-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847605" comment="webkit2gtk3-devel-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847606" comment="webkit2gtk3-minibrowser-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847607" comment="webkit2gtk3-soup2-devel-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847608" comment="webkit2gtk3-soup2-minibrowser-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847609" comment="webkit2gtk4-devel-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847610" comment="webkit2gtk4-minibrowser-2.42.5-150400.4.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847611" comment="webkitgtk-6_0-injected-bundles-2.42.5-150400.4.75.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5187" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219243" ref_url="https://bugzilla.suse.com/1219243" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0727" ref_url="https://www.suse.com/security/cve/CVE-2024-0727/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017969.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2024-0727: Denial of service when processing a maliciously formatted PKCS12 file (bsc#1219243).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-20"/>
	<updated date="2024-02-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219243">SUSE bug 1219243</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-0727/">CVE-2024-0727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0727">CVE-2024-0727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009847612" comment="libopenssl-1_1-devel-1.1.1l-150500.17.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847613" comment="libopenssl-1_1-devel-32bit-1.1.1l-150500.17.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847614" comment="libopenssl1_1-1.1.1l-150500.17.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847615" comment="libopenssl1_1-32bit-1.1.1l-150500.17.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847616" comment="libopenssl1_1-hmac-1.1.1l-150500.17.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847617" comment="libopenssl1_1-hmac-32bit-1.1.1l-150500.17.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847618" comment="openssl-1_1-1.1.1l-150500.17.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847619" comment="openssl-1_1-doc-1.1.1l-150500.17.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5188" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql16 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219679" ref_url="https://bugzilla.suse.com/1219679" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0985" ref_url="https://www.suse.com/security/cve/CVE-2024-0985/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017968.html" source="SUSE-SU"/>
		<description>
This update for postgresql16 fixes the following issues:

Upgrade to 16.2:

- CVE-2024-0985: Tighten security restrictions within REFRESH MATERIALIZED VIEW CONCURRENTLY (bsc#1219679).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-20"/>
	<updated date="2024-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219679">SUSE bug 1219679</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0985/">CVE-2024-0985 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009847620" comment="libecpg6-16.2-150200.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847621" comment="libecpg6-32bit-16.2-150200.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847622" comment="libpq5-16.2-150200.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847623" comment="libpq5-32bit-16.2-150200.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847624" comment="postgresql16-16.2-150200.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847625" comment="postgresql16-contrib-16.2-150200.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847626" comment="postgresql16-devel-16.2-150200.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847627" comment="postgresql16-devel-mini-16.2-150200.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847628" comment="postgresql16-docs-16.2-150200.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847629" comment="postgresql16-llvmjit-16.2-150200.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847630" comment="postgresql16-llvmjit-devel-16.2-150200.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847631" comment="postgresql16-plperl-16.2-150200.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847632" comment="postgresql16-plpython-16.2-150200.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847633" comment="postgresql16-pltcl-16.2-150200.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847634" comment="postgresql16-server-16.2-150200.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847635" comment="postgresql16-server-devel-16.2-150200.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847636" comment="postgresql16-test-16.2-150200.5.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5189" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql15 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219679" ref_url="https://bugzilla.suse.com/1219679" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0985" ref_url="https://www.suse.com/security/cve/CVE-2024-0985/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017967.html" source="SUSE-SU"/>
		<description>
This update for postgresql15 fixes the following issues:

Upgrade to 15.6:

- CVE-2024-0985: Tighten security restrictions within REFRESH MATERIALIZED VIEW CONCURRENTLY (bsc#1219679).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-20"/>
	<updated date="2024-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219679">SUSE bug 1219679</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0985/">CVE-2024-0985 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009847637" comment="postgresql15-15.6-150200.5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847638" comment="postgresql15-contrib-15.6-150200.5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847639" comment="postgresql15-devel-15.6-150200.5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847640" comment="postgresql15-docs-15.6-150200.5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847641" comment="postgresql15-llvmjit-15.6-150200.5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847642" comment="postgresql15-llvmjit-devel-15.6-150200.5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847643" comment="postgresql15-plperl-15.6-150200.5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847644" comment="postgresql15-plpython-15.6-150200.5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847645" comment="postgresql15-pltcl-15.6-150200.5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847646" comment="postgresql15-server-15.6-150200.5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847647" comment="postgresql15-server-devel-15.6-150200.5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847648" comment="postgresql15-test-15.6-150200.5.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5190" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql14 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219679" ref_url="https://bugzilla.suse.com/1219679" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0985" ref_url="https://www.suse.com/security/cve/CVE-2024-0985/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017966.html" source="SUSE-SU"/>
		<description>
This update for postgresql14 fixes the following issues:

Upgrade to 14.11:

- CVE-2024-0985: Tighten security restrictions within REFRESH MATERIALIZED VIEW CONCURRENTLY (bsc#1219679).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-20"/>
	<updated date="2024-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219679">SUSE bug 1219679</bugzilla>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0985/">CVE-2024-0985 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009847649" comment="postgresql14-14.11-150200.5.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847650" comment="postgresql14-contrib-14.11-150200.5.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847651" comment="postgresql14-devel-14.11-150200.5.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847652" comment="postgresql14-docs-14.11-150200.5.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847653" comment="postgresql14-llvmjit-14.11-150200.5.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847654" comment="postgresql14-llvmjit-devel-14.11-150200.5.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847655" comment="postgresql14-plperl-14.11-150200.5.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847656" comment="postgresql14-plpython-14.11-150200.5.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847657" comment="postgresql14-pltcl-14.11-150200.5.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847658" comment="postgresql14-server-14.11-150200.5.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847659" comment="postgresql14-server-devel-14.11-150200.5.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847660" comment="postgresql14-test-14.11-150200.5.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5191" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219059" ref_url="https://bugzilla.suse.com/1219059" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-22563" ref_url="https://www.suse.com/security/cve/CVE-2024-22563/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017965.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:

- CVE-2024-22563: Fixed memory leak via the function xmalloc__ in /lib/util.c (bsc#1219059).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-20"/>
	<updated date="2024-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219059">SUSE bug 1219059</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22563/">CVE-2024-22563 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22563">CVE-2024-22563 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009847661" comment="libopenvswitch-2_14-0-2.14.2-150400.24.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847662" comment="libovn-20_06-0-20.06.2-150400.24.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847663" comment="openvswitch-2.14.2-150400.24.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847664" comment="openvswitch-devel-2.14.2-150400.24.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847665" comment="openvswitch-doc-2.14.2-150400.24.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847666" comment="openvswitch-ipsec-2.14.2-150400.24.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847667" comment="openvswitch-pki-2.14.2-150400.24.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847668" comment="openvswitch-test-2.14.2-150400.24.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847669" comment="openvswitch-vtep-2.14.2-150400.24.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847670" comment="ovn-20.06.2-150400.24.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847671" comment="ovn-central-20.06.2-150400.24.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847672" comment="ovn-devel-20.06.2-150400.24.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847673" comment="ovn-doc-20.06.2-150400.24.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847674" comment="ovn-docker-20.06.2-150400.24.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847675" comment="ovn-host-20.06.2-150400.24.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847676" comment="ovn-vtep-20.06.2-150400.24.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847677" comment="python3-ovs-2.14.2-150400.24.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5192" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219576" ref_url="https://bugzilla.suse.com/1219576" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-25062" ref_url="https://www.suse.com/security/cve/CVE-2024-25062/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017963.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2024-25062: Fixed use-after-free in XMLReader (bsc#1219576).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-20"/>
	<updated date="2024-02-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219576">SUSE bug 1219576</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25062/">CVE-2024-25062 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25062">CVE-2024-25062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009847678" comment="libxml2-2-2.10.3-150500.5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847679" comment="libxml2-2-32bit-2.10.3-150500.5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847680" comment="libxml2-devel-2.10.3-150500.5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847681" comment="libxml2-devel-32bit-2.10.3-150500.5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847682" comment="libxml2-doc-2.10.3-150500.5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847683" comment="libxml2-tools-2.10.3-150500.5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847684" comment="python3-libxml2-2.10.3-150500.5.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847685" comment="python311-libxml2-2.10.3-150500.5.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5193" version="1" class="patch">
	<metadata>
		<title>Security update for python-pycryptodomex (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218564" ref_url="https://bugzilla.suse.com/1218564" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-52323" ref_url="https://www.suse.com/security/cve/CVE-2023-52323/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017961.html" source="SUSE-SU"/>
		<description>
This update for python-pycryptodomex fixes the following issues:

- CVE-2023-52323: Fixed a side-channel in the OAEP decryption, exploitable by a Manger attack (bsc#1218564).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-20"/>
	<updated date="2024-02-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218564">SUSE bug 1218564</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52323/">CVE-2023-52323 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52323">CVE-2023-52323 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847686" comment="python3-pycryptodomex-3.9.9-150300.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5194" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218971" ref_url="https://bugzilla.suse.com/1218971" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017960.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

- Always add the KEX pseudo-methods 'ext-info-c' and 'kex-strict-c-v00@openssh.com'
  when configuring custom method list. [bsc#1218971, CVE-2023-48795]

  * The strict-kex extension is announced in the list of available
    KEX methods. However, when the default KEX method list is modified
    or replaced, the extension is not added back automatically.

		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-20"/>
	<updated date="2024-02-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218971">SUSE bug 1218971</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009847687" comment="libssh2-1-1.11.0-150000.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847688" comment="libssh2-1-32bit-1.11.0-150000.4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009847689" comment="libssh2-devel-1.11.0-150000.4.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5195" version="1" class="patch">
	<metadata>
		<title>Recommended update for Java (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1215973" ref_url="https://bugzilla.suse.com/1215973" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-37460" ref_url="https://www.suse.com/security/cve/CVE-2023-37460/" source="CVE"/>
		<reference ref_id="SUSE-RU-2024:0560-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034327.html" source="SUSE-SU"/>
		<description>
This update for Java fixes the following issues:

plexus-archiver was updated from version 4.2.1 to 4.8.0:

- Changes of 4.8.0:

  * Security issues fixed:

    + CVE-2023-37460: Avoid override target symlink by standard file in AbstractUnArchiver (bsc#1215973)

  * New features and improvements:

    + Added tzst alias for tar.zst archiver/unarchived

  * Bugs fixed:

    + Detect permissions for addFile

  * Maintenance:

    + Removed public modifier from JUnit 5 tests
    + Use https in scm/url
    + Removed junit-jupiter-engine from project dependencies
    + Removed parent and reports menu from site
    + Cleanup after 'veryLargeJar' test
    + Override project.url

- Changes of 4.7.1:

  * Bugs fixed:

    + Don't apply umask on unknown perms (Win)

- Changes of 4.7.0:

  * New features and improvements:

    + add umask support and use 022 in RB mode
    + Use NIO Files for creating temporary files
    + Deprecate the JAR Index feature (JDK-8302819)
    + Added Archiver aliases for tar.*

  * Maintenance:

    + Use JUnit TempDir to manage temporary files in tests
    + Override uId and gId for Tar in test
    + Bump maven-resources-plugin from 2.7 to 3.3.1

- Changes of 4.6.3:

  * New features and improvements:

    + Fixed path traversal vulnerability
      The vulnerability affects only directories whose name begins
      with the same prefix as the destination directory. For example
      malicious archive may extract file in /opt/directory instead
      of /opt/dir.

- Changes of 4.6.2:

  * Bugs fixed:

    + Fixed regression in handling symbolic links

- Changes of 4.6.1:

  * Bugs fixed:

    + Normalize file separators before warning about equal archive entries

- Changes of 4.6.0:

  * New features and improvements:

    + keep file/directory permissions in Reproducible Builds mode

- Changes of 4.5.0:

  * New features and improvements:

    + Added zstd (un)archiver support

  * Bugs fixed:

    + Fixed UnArchiver#isOverwrite not working as expected

- Changes of 4.4.0:

  * New features and improvements:

    + Drop legacy plexus API and use only JSR330 components

- Changes of 4.3.0:

  * New features and improvements:

    + Require Java 8
    + Refactor to use FileTime API
    + Rename setTime method to setZipEntryTime
    + Convert InputStreamSupplier to lambdas

  * Bugs fixed:

    + Reproducible Builds not working when using modular jar

- Changes of 4.2.7:

  * New features and improvements:

    + Respect order of META-INF/ and META-INF/MANIFEST.MF entries in a JAR file

- Changes of 4.2.6:

  * New features and improvements:

    + FileInputStream, FileOutputStream, FileReader and FileWriter are no longer used
    + Code cleanup

- Changes of 4.2.5:

  * New features and improvements:
    + Speed improvements

  * Bugs fixed:

    + Fixed use of a mismatching Unicode path extra field in zip unarchiving

- Changes of 4.2.4:

  * Bugs fixed:

    + Fixed unjustified warning about casing for directory entries

- Changes of 4.2.2:

  * Bugs fixed:

    + DirectoryArchiver fails for symlinks if a parent directory doesn't exist

objectweb-asm was updated to version 9.6:

- Changes of version 9.6:

  * New Opcodes.V22 constant for Java 22

  * Bugs fixed:

    + Analyzer produces frames that have different locals than those detected by JRE bytecode verifier
    + Invalid stackmap generated when the instruction stream has new instruction after invokespecial to &lt;init&gt;
    + Analyzer can fail to catch thrown exceptions
    + `asm-analysis` Frame allocates an array unnecessarily inside `executeInvokeInsn`
    + Fixed bug in `CheckFrameAnalyzer` with static methods

- Changes of version 9.5:

  * New Opcodes.V21 constant for Java 21
  * New readBytecodeInstructionOffset hook in ClassReader
  * Added more detailed exception messages
  * Javadoc improvements and fixes

  * Bugs fixed:

    + Silent removal of zero-valued entries from the line-number table

- Changes of version 9.4:

  * Changes:

    + New Opcodes.V20 constant for Java 20
    + Added more checks in CheckClassAdapter
    + Javadoc improvements and fixes
    + `module-info` classes can be built without Gradle and Bnd
    + Parent POM updated to `org.ow2:ow2:1.5.1`

  * Bugs fixed:

    +`CheckClassAdapter` is no longer transparent for MAXLOCALS
    + Added public `getDelegate` method to all visitor classes
    + Analyzer does not compute optimal maxLocals for static methods
    + Fixed `SignatureWriter` when a generic type has a depth over 30
    + Skip remap inner class name if not changed in Remapper

maven-archiver was updated from version 3.5.0 to 3.6.1:

- Changes of 3.6.1:

  * New Features:

    + Deprecated the JAR Index feature (JDK-8302819)

  * Task:

    + Refreshed download page
    + Prefer JDK features over plexus-utils, plexus-io

- Changes of 3.6.0:

  * Task:

    + Require Java 8
    + Drop m-shared-utils from deps

maven-assembly-plugin was updated from version 3.3.0 to 3.6.0:

- Changes of 3.6.0:

  * Bugs fixed:

    + finalName as readonly parameter makes common usecases very complicated
    + Symbolic links get copied with absolute path
    + Warning if using Maven 3.9.1
    + Minimal default Manifest configuration of jar archiver should be respected

  * New Features:

    + Support Zstandard compression format

  * Improvements:

    + In RB mode, apply 022 umask to ignore environment group write umask
    + Added system requirements history

  * Task:
    + Dropped deprecated repository element
    + Support running build on Java 20
    + Refresh download page
    + Cleanup declared dependencies
    + Avoid using deprecated methods of `plexus-archiver`

- Changes of 3.5.0:

  * Bugs fixed:

    + File permissions removed during assembly:single since 3.2.0

- Changes of 3.4.2:

  * Bugs fixed:

    + Fixed Excludes filtering

  * Task:

    + Fixed examples to refer to https instead of http

- Changes of 3.4.1:

  * Bugs fixed:

    + Fixed error build with shared assemblies

- Changes of 3.4.0:

  * Bugs fixed:

    + dependencySet includes filter with classifier breaks include of artifacts without classifier

  * Task:

    + Speed improvements
    + Update plugin (requires Maven 3.2.5+)
    + Assembly plugin resolves too much, even plugins used to build dependencies
    + Deprecated the repository element in assembly descriptor
    + Upgraded to Java 8, drop unused dependencies

maven-common-artifact-filters was updated from version 3.0.1 to 3.3.2:

- Changes of 3.3.2:

  * Bugs fixed:

    + PatternIncludesArtifactFilters raising NPE for patterns w/ wildcards and artifactoid w/ null on any coordinate

- Changes of 3.3.1:

  * Bugs fixed:

    + Pattern w/ 4 elements may be GATV or GATC

- Changes of 3.3.0:

  * Bugs fixed:

    + null passed to DependencyFilter in EclipseAetherFilterTransformerTest
    + PatternIncludesArtifactFilter#include(Artifact)
    + Common Artifact Filters pattern parsing with classifier is broken

  * Task:

    + Sanitized dependencies
    + Upgraded to Maven Parent 36, to Maven 3.2.5, to Java 8 and clean up dependencies

- Changes of 3.2.0:

  * Improvements:

    + Big speed improvements for patterns that do not contain any wildcard

- Changes of 3.1.1:

  * Bugs fixed:

    + Updated JIRA URL for maven-common-artifact-filters

  * Improvements:

    + Made build Reproducible

- Changes of 3.1.0:

  * Bugs fixed:

    + Several filters do not preserve order of artifacts filtered

maven-compiler-plugin was updated from version 3.10.1 to 3.11.0:

Changes of 3.11.0:

  * New features and improvements:

    + Added a useModulePath switch to the testCompile mojo
    + Allow dependency exclusions for 'annotationProcessorPaths'
    + Use maven-resolver to resolve 'annotationProcessorPaths' dependencies
    + Upgrade plexus-compiler to improve compiling message
    + compileSourceRoots parameter should be writable
    + Change showWarnings to true by default
    + Warn about warn-config conflicting values
    + Update default source/target from 1.7 to 1.8
    + Display recompilation causes
    + Added some parameter to pattern from stale source calculation
    + Added dedicated option for implicit javac flag

  * Bugs fixed:

    + Fixed incorrect detection of dependency change
    + Test with Maven 3.9.0 and fix the failing IT
    + Resolved all annotation processor dependencies together
    + Defining maven.compiler.release as empty string ends with NumberFormatException in testCompileMojo
    + Fixed missing dirs in createMissingPackageInfoClasses
    + Set Xcludes in config passed to actual compiler

maven-dependency-analyzer was updated from version 1.10 to 1.13.2:

- Changes of 1.13.2:

  * Changes and bugs fixed:

    + Made mvn dependency:analyze work with OpenJDK 11
    + Fixed jdk8 incompatibility at runtime (NoSuchMethodError)
    + Upgraded asm to 8.0.1
    + Use try with resources to avoid leaks
    + dependency:analyze recommends test scope for test-only artifacts that have non-test scope
    + remove reference to deprecated public mutable field
    + Updated JIRA URL
    + dependency:analyze should recommend narrower scope where possible
    + Remove dependency on jmock
    + Inline deprecated field
    + Added more JavaDoc
    + Handle different classes from same artifact used by model and test code
    + Included class names in used undeclared dependencies
    + Check maximum allowed Maven version
    + Get rid of maven-plugin-testing-tools for IT test
    + Require Maven 3.2.5+
    + Analyze project classes only once
    + Fixed array parsing
    + CONSTANT_METHOD_TYPE should not add to classes
    + Inner classes are in same compilation unit as container class
    + Upgraded Parent to 36
    + Cleanup IT tests
    + Replace Codehaus Plexus utils with java.nio.file.Files and Apache Commons
    + Fixed bug with 'non-test scoped test only dependencies found'
    + Bump asm from 9.4 to 9.5
    + Refresh download page
    + Upgrade Parent to 39
    + Build on JDK 19, 20
    + Prefer JDK classes to Plexus utils
    + Replaced System.out by logger
    + Fixed java.lang.RuntimeException: Unknown constant pool type
    + Switched to JUnit 5
    + Dependency improvements

maven-dependency-plugin was updated from version 3.1.2 to 3.6.0:

- Changes in 3.6.0:

  * Bugs fixed:

    + Obsolete example of -Dverbose on web page
    + Unsupported verbose option still appears in docs
    + dependency:go-offline does not use repositories from parent pom in reactor build
    + Fixed possible NPE
    + `dependency:analyze-only` goal fails on OpenJDK 14
    + FileWriter and FileReader should be replaced
    + Dependency Plugin go-offline doesn't respect artifact classifier
    + analyze-only failed: Unsupported class file major version 60 (Java 16)
    + analyze-only failed: Unsupported class file major version 61 (Java 17)
    + copy-dependencies fails when using excludeScope=test
    + mvn dependency:analyze detected wrong transitive dependency
    + dependency plugin does not work with JDK 16
    + skip dependency analyze in ear packaging
    + Non-test dependency reported as Non-test scoped test only dependency
    + 'Dependency not found' with 3.2.0 and Java-17 while analyzing
    + Tree plugin does not terminate with 3.2.0
    + Minor improvement - continue
    + analyze-only failed: PermittedSubclasses requires ASM9
    + Broken Link to 'Introduction to Dependency Mechanism Page'
    + Sealed classes not supported
    + Dependency tree in verbose mode for war is empty
    + Javadoc was not updated to reflect that :tree's verbose option is now ok
    + error dependency:list (caused by postgresql dependency)
    + :list-classes does not skip if skip is set
    + :list-classes does not use GAV parameters

  * New Features:

    + Reintroduce the verbose option for dependency:tree
    + List classes in a given artifact
    + dependency:analyze should recommend narrower scope where possible
    + Added analyze parameter 'ignoreUnusedRuntime'
    + Allow ignoring non-test-scoped dependencies
    + Added a &lt;stripType&gt; option to unpack goals
    + Allow auto-ignore of all non-test scoped dependencies used only in test scope

  * Improvements:

    + Unused method o.a.m.p.d.t.TreeMojo.containsVersion
    + Minor improvements
    + GitHub Action build improvement
    + dependency:analyze should list the classes that cause a used undeclared dependency
    + Improve documentation of analyze - Non-test scoped
    + Turn warnings into errors instead of failOnWarning
    + maven-dependency-plugin should leverage plexus-build-api to support IDEs
    + TestListClassesMojo logs too much
    + Use outputDirectory from AbstractMavenReport
    + Removed not used dependencies / Replace parts
    + list-repositories - improvements
    + warns about depending on plexus-container-default
    + Replace AnalyzeReportView with a new AnalyzeReportRenderer

  * Task:

    + Removed no longer required exclusions
    + Java 1.8 as minimum
    + Explicitly start and end tables with Doxia Sinks in report renderers
    + Replace Maven shared StringUtils with Commons Lang3
    + Removed unused and ignored parameter - useJvmChmod
    + Removed custom plexus configuration
    + Code refactor - UnpackUtil
    + Refresh download page

maven-dependency-tree was updated from version 3.0.1 to 3.2.1:

- Changes in 3.2.1:

  * Bugs fixed:

    + DependencyCollectorBuilder does not collect dependencies when artifact has 'war' packaging
    + Transitive provided dependencies are not removed from collected dependency graph

  * New Features:

    + DependencyCollectorBuilder more configurable

  * Improvements:

    + DependencyGraphBuilder does not provide verbose tree
    + DependencyGraphBuilders shouldn't need reactorProjects for resolving dependencies
    + Maven31DependencyGraphBuilder should not download dependencies other than the pom
    + Fixed `plexus-component-annotation` in line with `plexus-component-metadata`
    + Upgraded parent to 31
    + Added functionality to collect raw dependencies in Maven 3+
    + Annotate DependencyNodes with dependency management metadata
    + Require Java 8
    + Upgrade `org.eclipse.aether:aether-util` dependency in org.apache.maven.shared:maven-dependency-tree
    + Added Exclusions to DependencyNode
    + Made build Reproducible
    + Migrate plexus component to JSR-330
    + Drop maven 3.0 compatibility

  * Dependency upgrade:

    + Upgrade shared-component to version 33
    + Upgrade Parent to 36
    + Bump maven-shared-components from 36 to 37

- Removed unnecessary dependency on xmvn tools and parent pom

maven-enforcer was updated to version 3.4.1:

- Update to version 3.4.1:

  * Bugs fixed:

    + In a multi module project 'bannedDependencies' rule tries to resolve project artifacts from external repository
    + Require Release Dependencies ignorant about aggregator build
    + banDuplicatePomDependencyVersions does not check managementDependencies
    + Beanshell rule is not thread-safe
    + RequireSnapshotVersion not compatible with CI Friendly Versions (${revision})
    + NPE when using new &lt;?m2e execute ?&gt; syntax with maven-enforcer-plugin
    + Broken links on Maven Enforcer Plugin site
    + RequirePluginVersions not recognizing versions-from-properties
    + [REGRESSION] RequirePluginVersions fails when versions are inherited
    + requireFilesExist rule should be case sensitive
    + Broken Links on Project Home Page
    + TestRequireOS uses hamcrest via transitive dependency
    + plexus-container-default in enforcer-api is very outdated
    + classifier not included in output of failes RequireUpperBoundDeps test
    + Exclusions are not considered when looking at parent for requireReleaseDeps
    + requireUpperBoundDeps does not fail when packaging is 'war'
    + DependencyConvergence in 3.0.0 fails on provided scoped dependencies
    + NPE on requireReleaseDeps with non-matching includes
    + RequireUpperBoundDeps now follow scope provided transitive dependencies
    + Use currently build artifacts in IT tests
    + requireReleaseDeps does not support optional dependencies or runtime scope
    + Enforcer 3.0.0 breaks with Maven 3.8.4
    + Version 3.1.0 is not enforcing bannedDependencies rules
    + DependencyConvergence treats provided dependencies are runtime dependencies
    + Plugin shouldn't use NullPointerException for non-exceptional code flow
    + NPE in RequirePluginVersions
    + ReactorModuleConvergence not cached in reactor
    + RequireUpperBoundDeps fails on provided dependencies since 3.2.1
    + Problematic dependency resolution by new 'banDynamicVersions' rule
    + banTransitiveDependencies: failing if a transitive dependencies has another version than the resolved one
    + Filtering dependency tree by scope
    + Upgrading to 3.0.0 causes 'Could not build dependency tree' with repositories some unknown protocol
    + DependencyConvergence in 3.1.0 fails when using version ranges
    + Semantics of 'ignores' parameter of 'banDynamicVersions' is inverted
    + Omission of 'excludedScopes' parameter of 'banDynamicVersions' causes NPE
    + ENFORCER: plugin-info and mojo pages not found

  * New Features:

    + requireUpperBounds deps should have includes
    + Introduce RequireTextFileChecksum with line separator normalization
    + allow no rules
    + show rules processed
    + DependencyConvergence should support including/excluding certain dependencies
    + Support declaring external banned dependencies in an external file/URL
    + Maven enforcer rule which checks that all dependencies have an explicit scope set
    + Maven enforcer rule which checks that all dependencies in dependencyManagement don't have an explicit scope set
    + Rule for no version ranges, version placeholders or SNAPSHOT versions
    + Allow one of many files in RequireFiles rules to pass
    + Skip specific rules
    + New Enforcer API
    + New Enforcer API - RuleConfigProvider
    + Move Built-In Rules to new API

  * Improvements:

    + wildcard ignore in requireReleaseDeps
    + Improve documentation about writing own Enforcer Rule
    + RequireActiveProfile should respect inherited activated profiles
    + Upgrade maven-dependency-tree to 3.x
    + Improve dependency resolving in multiple modules project
    + requireUpperBoundDeps: add [&lt;scope&gt;] and colors to the output
    + Example for writing a custom rule should be upgraded
    + Along with JavaVersion, allow enforcement of the JavaVendor
    + Included Java vendor in display-info output
    + requireMavenVersion x.y.z is processed as (,x.y.z] instead of [x.y.z,)
    + Consistently format artifacts same as dependency:tree
    + Made build Reproducible
    + Added support for excludes/includes in requireJavaVendor rule
    + Introduce Maven Enforcer Extension
    + Extends RequirePluginVersions with banMavenDefaults
    + Shared GitHub Actions
    + Log at ERROR level when &lt;fail&gt; is set
    + Reuse getDependenciesToCheck results across rules
    + Violation messages can be really hard to find in a multi module project
    + Clarify class loading for custom Enforcer rules
    + Using junit jupiter bom instead of single artifacts.
    + Get rid of maven-dependency-tree dependency
    + Allow 8 as JDK version for requireJavaVersion
    + Improve error message for rule 'requireJavaVersion'
    + Include Java Home in Message for Java Rule Failures
    + Manage all Maven Core dependencies as provided
    + Mange rules configuration by plugin
    + Deprecate 'rules' property and introduce 'enforcer.rules' as a replacement
    + Change success message from executed to passed
    + EnforcerLogger: Provide isDebugEnabled(), isErrorEnabled(), isWarnEnabled() and isInfoEnabled()
    + Properly declare dependencies

  * Test:

    + Regression test for dependency convergence problem fixed in 3.0.0

  * Task:

    + Removed reference to travis or switch to travis.com
    + Fixed maven assembly links
    + Require Java 8
    + Verify working with Maven 4
    + Code cleanup
    + Refresh download page
    + Deprecate display-info mojo
    + Refresh site descriptors
    + Superfluous blanks in BanDuplicatePomDependencyVersions
    + Rename ResolveUtil to ResolverUtil

 maven-plugin-tools was updated from version 3.6.0 to version 3.9.0:

 - Changes of version 3.9.0:

  * Bugs fixed:

    + Fixed *-mojo.xml (in PluginXdocGenerator) is overwritten when multiple locales are defined
    + Generated table by PluginXdocGenerator does not contain default attributes

  * Improvements:

    + Omit empty line in generated help goal output if plugin description is empty
    + Use Plexus I18N rather than fiddling with

  * Task:

    + Removed reporting from maven-plugin-plugin: create maven-plugin-report-plugin

  * Dependency upgrade:

    + Upgrade plugins and components (in ITs)

- Changes of version 3.8.2:

  * Improvements:

    + Used Resolver API, get rid of localRepository

  * Dependency upgrade:

    + Bump httpcore from 4.4.15 to 4.4.16
    + Bump httpclient from 4.5.13 to 4.5.14
    + Bump antVersion from 1.10.12 to 1.10.13
    + Bump slf4jVersion from 1.7.5 to 1.7.36
    + Bump plexus-java from 1.1.1 to 1.1.2
    + Bump plexus-archiver from 4.6.1 to 4.6.3
    + Bump jsoup from 1.15.3 to 1.15.4
    + Bump asmVersion from 9.4 to 9.5
    + Bump assertj-core from 3.23.1 to 3.24.2

- Changes of version 3.8.1:

  * Bugs fixed:

    + Javadoc reference containing a link label with spaces are not detected
    + JavadocLinkGenerator.createLink: Support nested binary class names
    + ERROR during build of m-plugin-report-p and m-plugin-p: Dependencies in wrong scope
    + 'Executes as an aggregator plugin' documentation: s/plugin/goal/
    + Maven scope warning should be logged at WARN level
    + Fixed Temporary File Information Disclosure Vulnerability

  * New features:

    + Support mojos using the new maven v4 api

  * Improvements:

    + Plugin descriptor should contain the requiredJavaVersion/requiredMavenVersion
    + Execute annotation only supports standard lifecycle phases due to use of enum
    + Clarify deprecation of all extractors but the maven-plugin-tools-annotations

  * Dependency upgrade:

    + Update to Maven Parent POM 39
    + Bump junit-bom from 5.9.1 to 5.9.2
    + Bump plexus-archiver from 4.5.0 to 4.6.1

- Changes of version 3.7.1:
  * Bugs fixed:

    + Maven scope warning should be logged at WARN level

- Changes of version 3.7.0:

  * Bugs fixed:

    + The plugin descriptor generated by plugin:descriptor does not consider @ see javadoc taglets
    + Report-Mojo doesn't respect input encoding
    + Generating site reports for plugin results in
      NoSuchMethodError
    + JDK Requirements in plugin-info.html: Consider property 'maven.compiler.release'
    + Parameters documentation inheriting @ since from Mojo can be confusing
    + Don't emit warning for missing javadoc URL of primitives
    + Don't emit warning for missing javadoc URI if no javadoc sources are configured
    + Parameter description should be taken from annotated item

  * New Features:

    + Added link to javadoc in configuration description page for user defined types of Mojos.
    + Allow only @ Deprecated annotation without @ deprecated javadoc tag
    + add system requirements history section
    + report: allow to generate usage section in plugin-info.html with true
    + Allow @ Parameter on setters methods
    + Extract plugin report into its own plugin
    + report: Expose generics information of Collection and Map types

  * Improvement:

    + plugin-info.html should contain a better Usage section
    + Do not overwrite generate files with no content change
    + Upgrade to JUnit 5 and @ Inject annotations
    + Support for java 20 - ASM 9.4
    + Don't print empty Memory, Disk Space in System Requirements
    + simplification in helpmojo build
    + Get rid of plexus-compiler-manager from tests
    + Use Maven core artifacts in provided scope
    + report and descriptor goal need to evaluate Javadoc comments differently
    + Allow to reference aggregator javadoc from plugin report

  * Task:

    + Detect legacy/javadoc Mojo definitions, warn to use Java 5 annotations
    + Update level to Java 8
    + Deprecate scripting support for mojos
    + Deprecate requirements parameter in report Mojo
    + Removed duplicate code from PluginReport
    + Prepare for Doxia (Sitetools) 2.0.0
    + Fixed documentation for maven-plugin-report-plugin
    + Removed deprecated items from new maven-plugin-report-plugin
    + Improve site build
    + Improve dependency management
    + Plugin generator generation fails when the parent class comes from a different project

  * Dependency upgrade:

    + Upgrade Maven Reporting API/Impl to 3.1.0
    + Upgrade Parent to 36
    + Upgrade project dependencies after JDK 1.8
    + Bump maven-parent from 36 to 37
    + Upgrade Maven Reporting API to 3.1.1/Maven Reporting Impl to 3.2.0
    + Upgrade plexus-utils to 3.5.0

- Changes of version 3.6.4:

  * Restored compatibility with Maven 3 ecosystem
  * Upgraded dependencies

- Changes of version 3.6.3:

  * Added prerequisites to plugin pom
  * Exclude dependency in provided scope from plugin descriptor
  * Get rid of String.format use
  * Fixed this logging as well
  * Simplify documentation
  * Exclude maven-archiver and maven-jxr from warning

- Changes of version 3.6.2:

  * Deprecated unused requiresReports flag
  * Check that Maven dependencies are provided scope
  * Update ITs
  * Use shared gh action
  * Deprecate unsupported Mojo descriptor items
  * Weed out ITs
  * Upgrade to maven 3.x and avoid using deprecated API
  * Drop legacy dependencies
  * Use shared gh action - v1
  * Fixed wording in javadoc

- Changes of version 3.6.1:

  * What's Changed:
  * Added missing @OverRide and make methods static
  * Upgraded to JUnit 4.12
  * Upgraded parent POM and other dependencies
  * Updated plugins
  * Upgraded Doxia Sitetools to 1.9.2 to remove dependency on Struts
  * removed Maven 2 info
  * Removed unneeded dependency
  * Tighten the dependency tree
  * Ignore .checkstyle
  * Strict dependencies for maven-plugin-tools-annotations
  * Improved @execute(goal...) docs
  * Improve @execute(lifecycle...) docs

plexus-compiler was updated from version 2.11.1 to 2.14.2:

- Changes of 2.14.2:

  * Removed:

    + Drop J2ObjC compiler

  * New features and improvements:

    + Update AspectJ Compiler to 1.9.21 to support Java 21
    + Require JDK 17 for build
    + Improve locking on JavacCompiler
    + Include 'parameter' and 'preview' describe log
    + Switch to SISU annotations and plugin, fixes #217
    + Support jdk 21
    + Require Maven 3.5.4+
    + Require Java 11 for plexus-compiler-eclipse an
      javac-errorprone and aspectj compilers
    + Added support to run its with Java 20

  * Bugs fixed:

    + Fixed javac memory leak
    + Validate zip file names before extracting (Zip Slip)
    + Restore AbstractCompiler#getLogger() method
    + Return empty list for not existing source root location
    + Improve javac error output parsing

- Changes of 2.13.0:

  * New features and improvements:

    + Fully ignore any possible jdk bug
    + MCOMPILER-402: Added implicitOption to CompilerConfiguration
    + Added a custom compile argument
      replaceProcessorPathWithProcessorModulePath to force the
      plugin replace processorPath with processormodulepath
    + describe compiler configuration on run
    + simplify 'Compiling' info message: display relative path

  * Bugs fixed:

    + Respect CompilerConfiguration.sourceFiles in
      EclipseJavaCompiler
    + Avoid NPE in AspectJCompilerTest on AspectJ 1.9.8+

  * Dependency updates:

    + Bump maven-surefire-plugin from 3.0.0-M5 to 3.0.0-M6
    + Bump error_prone_core from 2.11.0 to 2.13.1
    + Bump github/codeql-action from 1 to 2
    + Bump ecj from 3.28.0 to 3.29.0
    + Bump release-drafter/release-drafter from 5.18.1 to 5.19.0
    + Bump ecj from 3.29.0 to 3.30.0
    + Bump maven-invoker-plugin from 3.2.2 to 3.3.0
    + Bump maven-enforcer-plugin from 3.0.0 to 3.1.0
    + Bump error_prone_core from 2.13.1 to 2.14.0
    + Bump maven-surefire-plugin from 3.0.0-M6 to 3.0.0-M7
    + Bump ecj from 3.31.0 to 3.32.0
    + Bump junit-bom from 5.9.0 to 5.9.1
    + Bump ecj from 3.30.0 to 3.31.0
    + Bump groovy from 3.0.12 to 3.0.13
    + Bump groovy-json from 3.0.12 to 3.0.13
    + Bump groovy-xml from 3.0.12 to 3.0.13
    + Bump animal-sniffer-maven-plugin from 1.21 to 1.22
    + Bump error_prone_core from 2.14.0 to 2.15.0
    + Bump junit-bom from 5.8.2 to 5.9.0
    + Bump groovy-xml from 3.0.11 to 3.0.12
    + Bump groovy-json from 3.0.11 to 3.0.12
    + Bump groovy from 3.0.11 to 3.0.12

  * Maintenance:

    + Require Maven 3.2.5
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-21"/>
	<updated date="2024-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1215973">SUSE bug 1215973</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37460/">CVE-2023-37460 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37460">CVE-2023-37460 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848338" comment="maven-archiver-3.6.1-150200.3.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848339" comment="maven-archiver-javadoc-3.6.1-150200.3.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848340" comment="maven-assembly-plugin-3.6.0-150200.3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848341" comment="maven-assembly-plugin-javadoc-3.6.0-150200.3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848342" comment="maven-common-artifact-filters-3.3.2-150200.3.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848343" comment="maven-common-artifact-filters-javadoc-3.3.2-150200.3.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848344" comment="maven-compiler-plugin-3.11.0-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848345" comment="maven-compiler-plugin-bootstrap-3.11.0-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848346" comment="maven-compiler-plugin-javadoc-3.11.0-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848347" comment="maven-dependency-analyzer-1.13.2-150200.3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848348" comment="maven-dependency-analyzer-javadoc-1.13.2-150200.3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848349" comment="maven-dependency-plugin-3.6.0-150200.3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848350" comment="maven-dependency-plugin-javadoc-3.6.0-150200.3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848351" comment="maven-dependency-tree-3.2.1-150200.3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848352" comment="maven-dependency-tree-javadoc-3.2.1-150200.3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848353" comment="maven-enforcer-3.4.1-150200.3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848354" comment="maven-enforcer-api-3.4.1-150200.3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848355" comment="maven-enforcer-javadoc-3.4.1-150200.3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848356" comment="maven-enforcer-plugin-3.4.1-150200.3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848357" comment="maven-enforcer-rules-3.4.1-150200.3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848358" comment="maven-plugin-annotations-3.9.0-150200.3.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848359" comment="maven-plugin-plugin-3.9.0-150200.3.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848360" comment="maven-plugin-plugin-bootstrap-3.9.0-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848361" comment="maven-plugin-plugin-javadoc-3.9.0-150200.3.7.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848362" comment="maven-plugin-tools-annotations-3.9.0-150200.3.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848363" comment="maven-plugin-tools-ant-3.9.0-150200.3.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848364" comment="maven-plugin-tools-api-3.9.0-150200.3.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848365" comment="maven-plugin-tools-beanshell-3.9.0-150200.3.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848366" comment="maven-plugin-tools-generators-3.9.0-150200.3.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848367" comment="maven-plugin-tools-java-3.9.0-150200.3.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848368" comment="maven-plugin-tools-javadoc-3.9.0-150200.3.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848369" comment="maven-plugin-tools-model-3.9.0-150200.3.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848370" comment="maven-script-ant-3.9.0-150200.3.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848371" comment="maven-script-beanshell-3.9.0-150200.3.7.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848372" comment="objectweb-asm-9.6-150200.3.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848373" comment="objectweb-asm-javadoc-9.6-150200.3.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848374" comment="plexus-archiver-4.8.0-150200.3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848375" comment="plexus-archiver-javadoc-4.8.0-150200.3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848376" comment="plexus-compiler-2.14.2-150200.3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848377" comment="plexus-compiler-extras-2.14.2-150200.3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848378" comment="plexus-compiler-javadoc-2.14.2-150200.3.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5196" version="1" class="patch">
	<metadata>
		<title>Security update for eclipse-jgit, jsch (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1209646" ref_url="https://bugzilla.suse.com/1209646" source="BUGZILLA"/>
		<reference ref_id="1211955" ref_url="https://bugzilla.suse.com/1211955" source="BUGZILLA"/>
		<reference ref_id="1215298" ref_url="https://bugzilla.suse.com/1215298" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4759" ref_url="https://www.suse.com/security/cve/CVE-2023-4759/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017598.html" source="SUSE-SU"/>
		<description>
This update for eclipse-jgit, jsch fixes the following issues:

Security fix:
- CVE-2023-4759: Fixed an arbitrary file overwrite which might have occurred with a specially crafted git repository and a case-insensitive filesystem. (bsc#1215298)

Other fixes:
jsch was updated to version 0.2.9:
- Added support for various algorithms
- Migrated from `com.jcraft:jsch` to `com.github.mwiede:jsch` fork (bsc#1211955):
  * Alias to the old artifact since the new one is drop-in
    replacement
  * Keep the old OSGi bundle symbolic name to avoid extensive
    patching of eclipse stack
- Updated to version 0.2.9:
  * For the full list of changes please consult the upstream changelogs below for each version updated:
    + https://github.com/mwiede/jsch/releases/tag/jsch-0.2.9
    + https://github.com/mwiede/jsch/releases/tag/jsch-0.2.8
    + https://github.com/mwiede/jsch/releases/tag/jsch-0.2.7
    + https://github.com/mwiede/jsch/releases/tag/jsch-0.2.6
    + https://github.com/mwiede/jsch/releases/tag/jsch-0.2.5
    + https://github.com/mwiede/jsch/releases/tag/jsch-0.2.4
    + https://github.com/mwiede/jsch/releases/tag/jsch-0.2.3
    + https://github.com/mwiede/jsch/releases/tag/jsch-0.2.2
    + https://github.com/mwiede/jsch/releases/tag/jsch-0.2.1
    + https://github.com/mwiede/jsch/releases/tag/jsch-0.2.0
    + https://github.com/mwiede/jsch/releases/tag/jsch-0.1.71
    + https://github.com/mwiede/jsch/releases/tag/jsch-0.1.70
    + https://github.com/mwiede/jsch/releases/tag/jsch-0.1.69
    + https://github.com/mwiede/jsch/releases/tag/jsch-0.1.68
    + https://github.com/mwiede/jsch/releases/tag/jsch-0.1.67
    + https://github.com/mwiede/jsch/releases/tag/jsch-0.1.66
    + https://github.com/mwiede/jsch/releases/tag/jsch-0.1.65
    + https://github.com/mwiede/jsch/releases/tag/jsch-0.1.64
    + https://github.com/mwiede/jsch/releases/tag/jsch-0.1.63
    + https://github.com/mwiede/jsch/releases/tag/jsch-0.1.62
    + https://github.com/mwiede/jsch/releases/tag/jsch-0.1.61
    + https://github.com/mwiede/jsch/releases/tag/jsch-0.1.60
    + https://github.com/mwiede/jsch/releases/tag/jsch-0.1.59
    + https://github.com/mwiede/jsch/releases/tag/jsch-0.1.58
    + https://github.com/mwiede/jsch/releases/tag/jsch-0.1.57
    + https://github.com/mwiede/jsch/releases/tag/jsch-0.1.56

eclipse-jgit:

- Craft the jgit script from the real Main class of the jar file instead of using a jar launcher (bsc#1209646)

		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-08"/>
	<updated date="2024-01-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1209646">SUSE bug 1209646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211955">SUSE bug 1211955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215298">SUSE bug 1215298</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4759/">CVE-2023-4759 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4759">CVE-2023-4759 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009801087" comment="eclipse-jgit-5.11.0-150200.3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801090" comment="jsch-0.2.9-150200.11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801091" comment="jsch-demo-0.2.9-150200.11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009801092" comment="jsch-javadoc-0.2.9-150200.11.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5197" version="1" class="patch">
	<metadata>
		<title>Security update for abseil-cpp, grpc, opencensus-proto, protobuf, python-abseil, python-grpcio, re2 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1133277" ref_url="https://bugzilla.suse.com/1133277" source="BUGZILLA"/>
		<reference ref_id="1182659" ref_url="https://bugzilla.suse.com/1182659" source="BUGZILLA"/>
		<reference ref_id="1203378" ref_url="https://bugzilla.suse.com/1203378" source="BUGZILLA"/>
		<reference ref_id="1208794" ref_url="https://bugzilla.suse.com/1208794" source="BUGZILLA"/>
		<reference ref_id="1212180" ref_url="https://bugzilla.suse.com/1212180" source="BUGZILLA"/>
		<reference ref_id="1212182" ref_url="https://bugzilla.suse.com/1212182" source="BUGZILLA"/>
		<reference ref_id="1214148" ref_url="https://bugzilla.suse.com/1214148" source="BUGZILLA"/>
		<reference ref_id="1215334" ref_url="https://bugzilla.suse.com/1215334" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-32731" ref_url="https://www.suse.com/security/cve/CVE-2023-32731/" source="CVE"/>
		<reference ref_id="CVE-2023-32732" ref_url="https://www.suse.com/security/cve/CVE-2023-32732/" source="CVE"/>
		<reference ref_id="CVE-2023-33953" ref_url="https://www.suse.com/security/cve/CVE-2023-33953/" source="CVE"/>
		<reference ref_id="CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487/" source="CVE"/>
		<reference ref_id="CVE-2023-4785" ref_url="https://www.suse.com/security/cve/CVE-2023-4785/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017985.html" source="SUSE-SU"/>
		<description>
This update for abseil-cpp, grpc, opencensus-proto, protobuf, python-abseil, python-grpcio, re2 fixes the following issues:

abseil-cpp was updated to:

Update to 20230802.1:

* Add StdcppWaiter to the end of the list of waiter implementations

Update to 20230802.0

  What's New:

  * Added the nullability library for designating the expected
    nullability of pointers. Currently these serve as annotations
    only, but it is expected that compilers will one day be able
    to use these annotations for diagnostic purposes.
  * Added the prefetch library as a portable layer for moving data
    into caches before it is read.
  * Abseil's hash tables now detect many more programming errors
    in debug and sanitizer builds.
  * Abseil's synchronization objects now differentiate absolute
    waits (when passed an absl::Time) from relative waits (when
    passed an absl::Duration) when the underlying platform supports
    differentiating these cases. This only makes a difference when
    system clocks are adjusted.
  * Abseil's flag parsing library includes additional methods that
    make it easier to use when another library also expects to be
    able to parse flags.
  * absl::string_view is now available as a smaller target,
    @com_google_absl//absl/strings:string_view, so that users may
    use this library without depending on the much larger
    @com_google_absl//absl/strings target.

Update to 20230125.3

Details can be found on:

    https://github.com/abseil/abseil-cpp/releases/tag/20230125.3

Update to 20230125.2

What's New:

    The Abseil logging library has been released. This library
    provides facilities for writing short text messages about the
    status of a program to stderr, disk files, or other sinks
    (via an extension API). See the logging library documentation
    for more information.
      An extension point, AbslStringify(), allows user-defined types
    to seamlessly work with Abseil's string formatting functions
    like absl::StrCat() and absl::StrFormat().
      A library for computing CRC32C checksums has been added.
      Floating-point parsing now uses the Eisel-Lemire algorithm,
    which provides a significant speed improvement.
      The flags library now provides suggestions for the closest
    flag(s) in the case of misspelled flags.
      Using CMake to install Abseil now makes the installed artifacts
    (in particular absl/base/options.h) reflect the compiled ABI.

  Breaking Changes:

    Abseil now requires at least C++14 and follows Google's Foundational
    C++ Support Policy. See this table for a list of currently supported
    versions compilers, platforms, and build tools.
      The legacy spellings of the thread annotation macros/functions
    (e.g. GUARDED_BY()) have been removed by default in favor of the
    ABSL_ prefixed versions (e.g. ABSL_GUARDED_BY()) due to clashes with
    other libraries. The compatibility macro ABSL_LEGACY_THREAD_ANNOTATIONS
    can be defined on the compile command-line to temporarily restore these
    spellings, but this compatibility macro will be removed in the future.

  Known Issues

    The Abseil logging library in this release is not a feature-complete
    replacement for glog yet. VLOG and DFATAL are examples of features
    that have not yet been released.

Update to version 20220623.0

  What's New:

  * Added absl::AnyInvocable, a move-only function type.
  * Added absl::CordBuffer, a type for buffering data for eventual inclusion an
    absl::Cord, which is useful for writing zero-copy code.
  * Added support for command-line flags of type absl::optional&lt;T&gt;.

  Breaking Changes:

  * CMake builds now use the flag ABSL_BUILD_TESTING (default: OFF) to control
    whether or not unit tests are built.
  * The ABSL_DEPRECATED macro now works with the GCC compiler. GCC users that
    are experiencing new warnings can use -Wno-deprecated-declatations silence
	the warnings or use -Wno-error=deprecated-declarations to see warnings but
	not fail the build.
  * ABSL_CONST_INIT uses the C++20 keyword constinit when available. Some
    compilers are more strict about where this keyword must appear compared to
	the pre-C++20 implementation.
  * Bazel builds now depend on the bazelbuild/bazel-skylib repository.
    See Abseil's WORKSPACE file for an example of how to add this dependency.

  Other:

  * This will be the last release to support C++11. Future releases will require at least C++14.

grpc was updated to 1.60:

Update to release 1.60

* Implemented dualstack IPv4 and IPv6 backend support, as per
  draft gRFC A61. xDS support currently guarded by
  GRPC_EXPERIMENTAL_XDS_DUALSTACK_ENDPOINTS env var.
* Support for setting proxy for addresses.
* Add v1 reflection.

update to 1.59.3:

* Security - Revocation: Crl backport to 1.59. (#34926)

Update to release 1.59.2

* Fixes for CVE-2023-44487

Update to version 1.59.1:

* C++: Fix MakeCordFromSlice memory bug (gh#grpc/grpc#34552).

Update to version 1.59.0:

* xds ssa: Remove environment variable protection for stateful
  affinity (gh#grpc/grpc#34435).
* c-ares: fix spin loop bug when c-ares gives up on a socket
  that still has data left in its read buffer
  (gh#grpc/grpc#34185).
* Deps: Adding upb as a submodule (gh#grpc/grpc#34199).
* EventEngine: Update Cancel contract on closure deletion
  timeline (gh#grpc/grpc#34167).
* csharp codegen: Handle empty base_namespace option value to
  fix gh#grpc/grpc#34113 (gh#grpc/grpc#34137).
* Ruby:
  - replace strdup with gpr_strdup (gh#grpc/grpc#34177).
  - drop ruby 2.6 support (gh#grpc/grpc#34198).

Update to release 1.58.1

* Reintroduced c-ares 1.14 or later support

Update to release 1.58

* ruby extension: remove unnecessary background thread startup
  wait logic that interferes with forking

Update to release 1.57 (CVE-2023-4785, bsc#1215334, CVE-2023-33953, bsc#1214148)

* EventEngine: Change GetDNSResolver to return
  absl::StatusOr&lt;std::unique_ptr&lt;DNSResolver&gt;&gt;.
* Improve server handling of file descriptor exhaustion.
* Add a channel argument to set DSCP on streams.

Update to release 1.56.2

* Improve server handling of file descriptor exhaustion

Update to release 1.56.0 (CVE-2023-32731, bsc#1212180)

* core: Add support for vsock transport.
* EventEngine: Change TXT lookup result type to
  std::vector&lt;std::string&gt;.
* C++/Authz: support customizable audit functionality for
  authorization policy.

Update to release 1.54.1

* Bring declarations and definitions to be in sync

Update to release 1.54 (CVE-2023-32732, bsc#1212182)

* XDS: enable XDS federation by default
* TlsCreds: Support revocation of intermediate in chain

Update to release 1.51.1

* Only a macOS/aarch64-related change

Update to release 1.51

* c-ares DNS resolver: fix logical race between resolution
  timeout/cancellation and fd readability.
* Remove support for pthread TLS

Update to release 1.50.0

* Core

  - Derive EventEngine from std::enable_shared_from_this. (#31060)
  - Revert 'Revert '[chttp2] fix stream leak with queued flow control
    update and absence of writes (#30907)' (#30991)'. (#30992)
  - [chttp2] fix stream leak with queued flow control update and absence of writes. (#30907)
  - Remove gpr_codegen. (#30899)
  - client_channel: allow LB policy to communicate update errors to resolver. (#30809)
  - FaultInjection: Fix random number generation. (#30623)

* C++

  - OpenCensus Plugin: Add measure and views for started RPCs. (#31034)

* C#

  - Grpc.Tools: Parse warnings from libprotobuf (fix #27502). (#30371)
  - Grpc.Tools add support for env variable GRPC_PROTOC_PLUGIN (fix #27099). (#30411)
  - Grpc.Tools document AdditionalImportDirs. (#30405)
  - Fix OutputOptions and GrpcOutputOptions (issue #25950). (#30410)

Update to release 1.49.1

* All

  - Update protobuf to v21.6 on 1.49.x. (#31028)

* Ruby

  - Backport 'Fix ruby windows ucrt build #31051' to 1.49.x. (#31053)

Update to release 1.49.0

* Core
  - Backport: 'stabilize the C2P resolver URI scheme' to v1.49.x. (#30654)
  - Bump core version. (#30588)
  - Update OpenCensus to HEAD. (#30567)
  - Update protobuf submodule to 3.21.5. (#30548)
  - Update third_party/protobuf to 3.21.4. (#30377)
  - [core] Remove GRPC_INITIAL_METADATA_CORKED flag. (#30443)
  - HTTP2: Fix keepalive time throttling. (#30164)
  - Use AnyInvocable in EventEngine APIs. (#30220)

* Python

  - Add type stub generation support to grpcio-tools. (#30498)

Update to release 1.48.1

* Backport EventEngine Forkables

Update to release 1.48.0
 
* C++14 is now required
* xDS: Workaround to get gRPC clients working with istio

Update to release 1.46.3

* backport: xds: use federation env var to guard new-style
  resource name parsing (#29725) #29727

Update to release 1.46

* Added HTTP/1.1 support in httpcli
* HTTP2: Add graceful goaway

Update to release 1.45.2

* Various fixes related to XDS
* HTTP2: Should not run cancelling logic on servers when
  receiving GOAWAY

Update to release 1.45.1

* Switched to epoll1 as a default polling engine for Linux

Update to version 1.45.0:

* Core:

  - Backport 'Include ADS stream error in XDS error updates
    (#29014)' to 1.45.x [gh#grpc/grpc#29121].
  - Bump core version to 23.0.0 for upcoming release
    [gh#grpc/grpc#29026].
  - Fix memory leak in HTTP request security handshake
    cancellation [gh#grpc/grpc#28971].
  - CompositeChannelCredentials: Comparator implementation
    [gh#grpc/grpc#28902].
  - Delete custom iomgr [gh#grpc/grpc#28816].
  - Implement transparent retries [gh#grpc/grpc#28548].
  - Uniquify channel args keys [gh#grpc/grpc#28799].
  - Set trailing_metadata_available for recv_initial_metadata
    ops when generating a fake status [gh#grpc/grpc#28827].
  - Eliminate gRPC insecure build [gh#grpc/grpc#25586].
  - Fix for a racy WorkSerializer shutdown [gh#grpc/grpc#28769].
  - InsecureCredentials: singleton object [gh#grpc/grpc#28777].
  - Add http cancel api [gh#grpc/grpc#28354].
  - Memory leak fix on windows in grpc_tcp_create()
    [gh#grpc/grpc#27457].
  - xDS: Rbac filter updates [gh#grpc/grpc#28568].

* C++

  - Bump the minimum gcc to 5 [gh#grpc/grpc#28786].
  - Add experimental API for CRL checking support to gRPC C++
    TlsCredentials [gh#grpc/grpc#28407].

Update to release 1.44.0

* Add a trace to list which filters are contained in a
  channel stack.
* Remove grpc_httpcli_context.
* xDS: Add support for RBAC HTTP filter.
* API to cancel grpc_resolve_address.

Update to version 1.43.2:

* Fix google-c2p-experimental issue (gh#grpc/grpc#28692).

Changes from version 1.43.0:

* Core:

  - Remove redundant work serializer usage in c-ares windows
    code (gh#grpc/grpc#28016).
  - Support RDS updates on the server (gh#grpc/grpc#27851).
  - Use WorkSerializer in XdsClient to propagate updates in a
    synchronized manner (gh#grpc/grpc#27975).
  - Support Custom Post-handshake Verification in TlsCredentials
    (gh#grpc/grpc#25631).
  - Reintroduce the EventEngine default factory
    (gh#grpc/grpc#27920).
  - Assert Android API &gt;= v21 (gh#grpc/grpc#27943).
  - Add support for abstract unix domain sockets
    (gh#grpc/grpc#27906).
* C++:

  - OpenCensus: Move metadata storage to arena
    (gh#grpc/grpc#27948).

* [C#] Add nullable type attributes to Grpc.Core.Api
  (gh#grpc/grpc#27887).
- Update package name libgrpc++1 to libgrpc++1_43 in keeping with
  updated so number.

Update to release 1.41.0

* xDS: Remove environmental variable guard for security.
* xDS Security: Use new way to fetch certificate provider
  plugin instance config.
* xDS server serving status: Use a struct to allow more fields
  to be added in the future.

Update to release 1.39.1

* Fix C# protoc plugin argument parsing on 1.39.x

Update to version 1.39.0:

* Core

  - Initialize tcp_posix for CFStream when needed
    (gh#grpc/grpc#26530).
  - Update boringssl submodule (gh#grpc/grpc#26520).
  - Fix backup poller races (gh#grpc/grpc#26446).
  - Use default port 443 in HTTP CONNECT request
    (gh#grpc/grpc#26331).
* C++

  - New iomgr implementation backed by the EventEngine API
    (gh#grpc/grpc#26026).
  - async_unary_call: add a Destroy method, called by
    std::default_delete (gh#grpc/grpc#26389).
  - De-experimentalize C++ callback API (gh#grpc/grpc#25728).

* PHP: stop reading composer.json file just to read the version
  string (gh#grpc/grpc#26156).

* Ruby: Set XDS user agent in ruby via macros
  (gh#grpc/grpc#26268).

Update to release 1.38.0

* Invalidate ExecCtx now before computing timeouts in all
  repeating timer events using a WorkSerializer or combiner.
* Fix use-after-unref bug in fault_injection_filter
* New gRPC EventEngine Interface
* Allow the AWS_DEFAULT_REGION environment variable
* s/OnServingStatusChange/OnServingStatusUpdate/

Update to release 1.37.1

* Use URI form of address for channelz listen node
* Implementation CSDS (xDS Config Dump)
* xDS status notifier
* Remove CAS loops in global subchannel pool and simplify
  subchannel refcounting

Update to release 1.36.4

* A fix for DNS SRV lookups on Windows

Update to 1.36.1:

* Core:
  * Remove unnecessary internal pollset set in c-ares DNS resolver
  * Support Default Root Certs in Tls Credentials
  * back-port: add env var protection for google-c2p resolver
* C++:
  * Move third party identity C++ api out of experimental namespace
  * refactor!: change error_details functions to templates
  * Support ServerContext for callback API
* PHP:
  * support for PSM security
  * fixed segfault on reused call object
  * fixed phpunit 8 warnings
* Python:
  * Implement Python Client and Server xDS Creds

Update to version 1.34.1:

* Backport 'Lazily import grpc_tools when using runtime
  stub/message generation' to 1.34.x (gh#grpc/grpc#25011).
* Backport 'do not use &lt;PublicSign&gt;true&lt;/PublicSign&gt; on
  non-windows' to 1.34.x (gh#grpc/grpc#24995).

Update to version 1.34.0:

* Core:

- Protect xds security code with the environment variable
    'GRPC_XDS_EXPERIMENTAL_SECURITY_SUPPORT'
    (gh#grpc/grpc#24782).
  - Add support for 'unix-abstract:' URIs to support abstract
    unix domain sockets (gh#grpc/grpc#24500).
  - Increment Index when parsing not plumbed SAN fields
    (gh#grpc/grpc#24601).
  - Revert 'Revert 'Deprecate
    GRPC_ARG_HTTP2_MIN_SENT_PING_INTERVAL_WITHOUT_DATA_MS''
    (gh#grpc/grpc#24518).
  - xds: Set status code to INVALID_ARGUMENT when NACKing
    (gh#grpc/grpc#24516).
  - Include stddef.h in address_sorting.h (gh#grpc/grpc#24514).
  - xds: Add support for case_sensitive option in RouteMatch
    (gh#grpc/grpc#24381).
* C++:
  - Fix --define=grpc_no_xds=true builds (gh#grpc/grpc#24503).
  - Experimental support and tests for
    CreateCustomInsecureChannelWithInterceptorsFromFd
    (gh#grpc/grpc#24362).

Update to release 1.33.2

* Deprecate GRPC_ARG_HTTP2_MIN_SENT_PING_INTERVAL_WITHOUT_DATA_MS.
* Expose Cronet error message to the application layer.
* Remove grpc_channel_ping from surface API.
* Do not send BDP pings if there is no receive side activity.

Update to version 1.33.1

* Core

  - Deprecate
    GRPC_ARG_HTTP2_MIN_SENT_PING_INTERVAL_WITHOUT_DATA_MS
    (gh#grpc/grpc#24063).
  - Expose Cronet error message to the application layer
    (gh#grpc/grpc#24083).
  - Remove grpc_channel_ping from surface API
    (gh#grpc/grpc#23894).
  - Do not send BDP pings if there is no receive side activity
    (gh#grpc/grpc#22997).

* C++

  - Makefile: only support building deps from submodule
    (gh#grpc/grpc#23957).

- Add new subpackages - libupb and upb-devel. Currently, grpc
  sources include also upb sources. Before this change, libupb and
  upb-devel used to be included in a separate package - upb.

Update to version 1.32.0:

* Core
  - Remove stream from stalled lists on remove_stream
    (gh#grpc/grpc#23984).
  - Do not cancel RPC if send metadata size if larger than
    peer's limit (gh#grpc/grpc#23806).
  - Don't consider receiving non-OK status as an error for HTTP2
    (gh#grpc/grpc#19545).
  - Keepalive throttling (gh#grpc/grpc#23313).
  - Include the target_uri in 'target uri is not valid' error
    messages (gh#grpc/grpc#23782).
  - Fix 'cannot send compressed message large than 1024B' in
    cronet_transport (gh#grpc/grpc#23219).
  - Receive SETTINGS frame on clients before declaring
    subchannel READY (gh#grpc/grpc#23636).
  - Enabled GPR_ABSEIL_SYNC (gh#grpc/grpc#23372).
  - Experimental xDS v3 support (gh#grpc/grpc#23281).

* C++

  - Upgrade bazel used for all tests to 2.2.0
    (gh#grpc/grpc#23902).
  - Remove test targets and test helper libraries from Makefile
    (gh#grpc/grpc#23813).
  - Fix repeated builds broken by re2's cmake
    (gh#grpc/grpc#23587).
  - Log the peer address of grpc_cli CallMethod RPCs to stderr
    (gh#grpc/grpc#23557).

opencensus-proto was updated to 0.3.0+git.20200721:

- Update to version 0.3.0+git.20200721:

  * Bump version to 0.3.0
  * Generate Go types using  protocolbuffers/protobuf-go (#218)
  * Load proto_library() rule. (#216)

- Update to version 0.2.1+git.20190826:

  * Remove grpc_java dependency and java_proto rules. (#214)
  * Add C++ targets, especially for gRPC services. (#212)
  * Upgrade bazel and dependencies to latest. (#211)
  * Bring back bazel cache to make CI faster. (#210)
  * Travis: don't require sudo for bazel installation. (#209)

- Update to version 0.2.1:

  * Add grpc-gateway for metrics service. (#205)
  * Pin bazel version in travis builds (#207)
  * Update gen-go files (#199)
  * Add Web JS as a LibraryInfo.Language option (#198)
  * Set up Python packaging for PyPI release. (#197)
  * Add tracestate to links. (#191)
  * Python proto file generator and generated proto files (#196)
  * Ruby proto file generator and generated proto files (#192)
  * Add py_proto_library() rules for envoy/api. (#194)
  * Gradle: Upgrade dependency versions. (#193)
  * Update release versions for readme. (#189)
  * Start 0.3.0 development cycle
  * Update gen-go files. (#187)
  * Revert 'Start 0.3.0 development cycle (#167)' (#183)
  * Revert optimization for metric descriptor and bucket options for now. (#184)
  * Constant sampler: add option to always follow the parent's decision. (#182)
  * Document that all maximum values must be specified. (#181)
  * Fix typo in bucket bounds. (#178)
  * Restrict people who can approve reviews. This is to ensure code quality. (#177)
  * Use bazel cache to make CI faster. (#176)
  * Add grpc generated files to the idea plugin. (#175)
  * Add Resource to Span (#174)
  * time is required (#170)
  * Upgrade protobuf dependency to v3.6.1.3. (#173)
  * assume Ok Status when not set (#171)
  * Minor comments fixes (#160)
  * Start 0.3.0 development cycle (#167)
  * Update gen-go files. (#162)
  * Update releasing instruction. (#163)
  * Fix Travis build. (#165)
  * Add OpenApi doc for trace agent grpc-gateway (#157)
  * Add command to generate OpenApi/Swagger doc for grpc-gateway (#156)
  * Update gen-go files (#155)
  * Add trace export grpc-gateway config (#77)
  * Fix bazel build after bazel upgrade (#154)
  * README: Add gitter, javadoc and godoc badge. (#151)
  * Update release versions for README. (#150)
  * Start 0.2.0 development cycle
  * Add resource and metrics_service proto to mkgogen. Re-generate gen-go files. (#147)
  * Add resource to protocol (#137)
  * Fix generating the javadoc. (#144)
  * Metrics/TimeSeries: start time should not be included while end time should. (#142)
  * README: Add instructions on using opencensus_proto with Bazel. (#140)
  * agent/README: update package info. (#138)
  * Agent: Add metrics service. (#136)
  * Tracing: Add default limits to TraceConfig. (#133)
  * Remove a stale TODO. (#134)
  * README: Add a note about go_proto_library rules. (#135)
  * add golang bazel build support (#132)
  * Remove exporter protos from mkgogen. (#128)
  * Update README and RELEASING. (#130)
  * Change histogram buckets definition to be OpenMetrics compatible. (#121)
  * Remove exporter/v1 protos. (#124)
  * Clean up the README for Agent proto. (#126)
  * Change Quantiles to ValuesAtPercentile. (#122)
  * Extend the TraceService service to support export/config for multiple Applications. (#119)
  * Add specifications on Agent implementation details. (#112)
  * Update gitignore (#118)
  * Remove maven support. Not used. (#116)
  * Add gauge distribution. (#117)
  * Add support for Summary type and value. (#110)
  * Add Maven status and instructions on adding dependencies. (#115)
  * Bump version to 0.0.3-SNAPSHOT
  * Bump version to 0.0.2
  * Update gen-go files. (#114)
  * Gradle: Add missing source and javadoc rules. (#113)
  * Add support for float attributes. (#98)
  * Change from mean to sum in distribution. (#109)
  * Bump version to v0.0.2-SNAPSHOT
  * Bump version to v0.0.1
  * Add releasing instructions in RELEASING.md. (#106)
  * Add Gradle build rules for generating gRPC service and releasing to Maven. (#102)
  * Re-organize proto directory structure. (#103)
  * Update gen-go files. (#101)
  * Add a note about interceptors of other libraries. (#94)
  * agent/common/v1: use exporter_version, core_library_version in LibraryInfo (#100)
  * opencensus/proto: add default Agent port to README (#97)
  * Update the message names for Config RPC. (#93)
  * Add details about agent protocol in the README. (#88)
  * Update gen-go files. (#92)
  * agent/trace/v1: fix signature for Config and comments too (#91)
  * Update gen-go files. (#86)
  * Make tracestate a list instead of a map to preserve ordering. (#84)
  * Allow MetricDescriptor to be sent only the first time. (#78)
  * Update mkgogen.sh. (#85)
  * Add agent trace service proto definitions. (#79)
  * Update proto and gen-go package names. (#83)
  * Add agent/common proto and BUILD. (#81)
  *  Add trace_config.proto. (#80)
  * Build exporters with maven. (#76)
  * Make clear that cumulative int/float can go only up. (#75)
  * Add tracestate field to the Span proto. (#74)
  * gradle wrapper --gradle-version 4.9 (#72)
  * Change from multiple types of timeseries to have one. (#71)
  * Move exemplars in the Bucket. (#70)
  * Update gen-go files. (#69)
  * Move metrics in the top level directory. (#68)
  * Remove Range from Distribution. No backend supports this. (#67)
  * Remove unused MetricSet message. (#66)
  * Metrics: Add Exemplar to DistributionValue. (#62)
  * Gauge vs Cumulative. (#65)
  * Clarifying comment about bucket boundaries. (#64)
  * Make MetricDescriptor.Type capture the type of the value as well. (#63)
  * Regenerate the Go artifacts (#61)
  * Add export service proto (#60)

- Initial version 20180523

protobuf was updated to 25.1:

update to 25.1:

  * Raise warnings for deprecated python syntax usages
  * Add support for extensions in CRuby, JRuby, and FFI Ruby
  * Add support for options in CRuby, JRuby and FFI (#14594)

update to 25.0:

  * Implement proto2/proto3 with editions
  * Defines Protobuf compiler version strings as macros and
    separates out suffix string definition.
  * Add utf8_validation feature back to the global feature set.
  * Setting up version updater to prepare for poison pills and
    embedding version info into C++, Python and Java gencode.
  * Merge the protobuf and upb Bazel repos
  * Editions: Introduce functionality to protoc for generating
    edition feature set defaults.
  * Editions: Migrate edition strings to enum in C++ code.
  * Create a reflection helper for ExtensionIdentifier.
  * Editions: Provide an API for C++ generators to specify their
    features.
  * Editions: Refactor feature resolution to use an intermediate
    message.
  * Publish extension declarations with declaration
    verifications.
  * Editions: Stop propagating partially resolved feature sets to
    plugins.
  * Editions: Migrate string_field_validation to a C++ feature
  * Editions: Include defaults for any features in the generated
    pool.
  * Protoc: parser rejects explicit use of map_entry option
  * Protoc: validate that reserved range start is before end
  * Protoc: support identifiers as reserved names in addition to
    string literals (only in editions)
  * Drop support for Bazel 5.
  * Allow code generators to specify whether or not they support
    editions.
C++:
  * Set `PROTOBUF_EXPORT` on
    `InternalOutOfLineDeleteMessageLite()`
  * Update stale checked-in files
  * Apply PROTOBUF_NOINLINE to declarations of some functions
    that want it.
  * Implement proto2/proto3 with editions
  * Make JSON UTF-8 boundary check inclusive of the largest
    possible UTF-8 character.
  * Reduce `Map::size_type` to 32-bits. Protobuf containers can't
    have more than that
  * Defines Protobuf compiler version strings as macros and
    separates out suffix string definition.
  * Add `ABSL_ATTRIBUTE_LIFETIME_BOUND` attribute on generated
    oneof accessors.
  * Fix bug in reflection based Swap of map fields.
  * Add utf8_validation feature back to the global feature set.
  * Setting up version updater to prepare for poison pills and
    embedding version info into C++, Python and Java gencode.
  * Add prefetching to arena allocations.
  * Add `ABSL_ATTRIBUTE_LIFETIME_BOUND` attribute on generated
    repeated and map field accessors.
  * Editions: Migrate edition strings to enum in C++ code.
  * Create a reflection helper for ExtensionIdentifier.
  * Editions: Provide an API for C++ generators to specify their
    features.
  * Add `ABSL_ATTRIBUTE_LIFETIME_BOUND` attribute on generated
    string field accessors.
  * Editions: Refactor feature resolution to use an intermediate
    message.
  * Fixes for 32-bit MSVC.
  * Publish extension declarations with declaration
    verifications.
  * Export the constants in protobuf's any.h to support DLL
    builds.
  * Implement AbslStringify for the Descriptor family of types.
  * Add `ABSL_ATTRIBUTE_LIFETIME_BOUND` attribute on generated
    message field accessors.
  * Editions: Stop propagating partially resolved feature sets to
    plugins.
  * Editions: Migrate string_field_validation to a C++ feature
  * Editions: Include defaults for any features in the generated
    pool.
  * Introduce C++ feature for UTF8 validation.
  * Protoc: validate that reserved range start is before end
  * Remove option to disable the table-driven parser in protoc.
  * Lock down ctype=CORD in proto file.
  * Support split repeated fields.
  * In OSS mode omit some extern template specializations.
  * Allow code generators to specify whether or not they support
    editions.
Java:
  * Implement proto2/proto3 with editions
  * Remove synthetic oneofs from Java gencode field accessor
    tables.
  * Timestamps.parse: Add error handling for invalid
    hours/minutes in the timezone offset.
  * Defines Protobuf compiler version strings as macros and
    separates out suffix string definition.
  * Add `ABSL_ATTRIBUTE_LIFETIME_BOUND` attribute on generated
    oneof accessors.
  * Add missing debugging version info to Protobuf Java gencode
    when multiple files are generated.
  * Fix a bad cast in putBuilderIfAbsent when already present due
    to using the result of put() directly (which is null if it
    currently has no value)
  * Setting up version updater to prepare for poison pills and
    embedding version info into C++, Python and Java gencode.
  * Fix a NPE in putBuilderIfAbsent due to using the result of
    put() directly (which is null if it currently has no value)
  * Update Kotlin compiler to escape package names
  * Add MapFieldBuilder and change codegen to generate it and the
    put{field}BuilderIfAbsent method.
  * Introduce recursion limit in Java text format parsing
  * Consider the protobuf.Any invalid if typeUrl.split('/')
    returns an empty array.
  * Mark `FieldDescriptor.hasOptionalKeyword()` as deprecated.
  * Fixed Python memory leak in map lookup.
  * Loosen upb for json name conflict check in proto2 between
    json name and field
  * Defines Protobuf compiler version strings as macros and
    separates out suffix string definition.
  * Add `ABSL_ATTRIBUTE_LIFETIME_BOUND` attribute on generated
    oneof accessors.
  * Ensure Timestamp.ToDatetime(tz) has correct offset
  * Do not check required field for upb python MergeFrom
  * Setting up version updater to prepare for poison pills and
    embedding version info into C++, Python and Java gencode.
  * Merge the protobuf and upb Bazel repos
  * Comparing a proto message with an object of unknown returns
    NotImplemented
  * Emit __slots__ in pyi output as a tuple rather than a list
    for --pyi_out.
  * Fix a bug that strips options from descriptor.proto in
    Python.
  * Raise warings for message.UnknownFields() usages and navigate
    to the new add
  * Add protobuf python keyword support in path for stub
    generator.
  * Add tuple support to set Struct
  * ### Python C-Extension (Default)
  * Comparing a proto message with an object of unknown returns
    NotImplemented
  * Check that ffi-compiler loads before using it to define
    tasks.
UPB (Python/PHP/Ruby C-Extension):
  * Include .inc files directly instead of through a filegroup
  * Loosen upb for json name conflict check in proto2 between
    json name and field
  * Add utf8_validation feature back to the global feature set.
  * Do not check required field for upb python MergeFrom
  * Merge the protobuf and upb Bazel repos
  * Added malloc_trim() calls to Python allocator so RSS will
    decrease when memory is freed
  * Upb: fix a Python memory leak in ByteSize()
  * Support ASAN detection on clang
  * Upb: bugfix for importing a proto3 enum from within a proto2
    file
  * Expose methods needed by Ruby FFI using UPB_API
  * Fix `PyUpb_Message_MergeInternal` segfault

- Build with source and target levels 8
  * fixes build with JDK21
- Install the pom file with the new %%mvn_install_pom macro
- Do not install the pom-only artifacts, since the %%mvn_install_pom
  macro resolves the variables at the install time

update to 23.4:

  * Add dllexport_decl for generated default instance.
  * Deps: Update Guava to 32.0.1

update to 23.3:

  C++:

  * Regenerate stale files
  * Use the same ABI for static and shared libraries on non-
    Windows platforms
  * Add a workaround for GCC constexpr bug
  Objective-C:
  * Regenerate stale files
  UPB (Python/PHP/Ruby C-Extension)
  * Fixed a bug in `upb_Map_Delete()` that caused crashes in
    map.delete(k) for Ruby when string-keyed maps were in use.

  Compiler:
  * Add missing header to Objective-c generator
  * Add a workaround for GCC constexpr bug

  Java:
  * Rollback of: Simplify protobuf Java message builder by
    removing methods that calls the super class only.

  Csharp:
  * [C#] Replace regex that validates descriptor names

update to 22.5:

  C++:
  * Add missing cstdint header
  * Fix: missing -DPROTOBUF_USE_DLLS in pkg-config (#12700)
  * Avoid using string(JOIN..., which requires cmake 3.12
  * Explicitly include GTest package in examples
  * Bump Abseil submodule to 20230125.3 (#12660)

update to 22.4:

  C++:
  * Fix libprotoc: export useful symbols from .so

  Python:
  * Fix bug in _internal_copy_files where the rule would fail in
    downstream repositories.

  Other:
  * Bump utf8_range to version with working pkg-config (#12584)
  * Fix declared dependencies for pkg-config
  * Update abseil dependency and reorder dependencies to ensure
    we use the version specified in protobuf_deps.
  * Turn off clang::musttail on i386

update to v22.3

  UPB (Python/PHP/Ruby C-Extension):
  * Remove src prefix from proto import
  * Fix .gitmodules to use the correct absl branch
  * Remove erroneous dependency on googletest

update to 22.2:

  Java:
  * Add version to intra proto dependencies and add kotlin stdlib
    dependency
  * Add $ back for osgi header
  * Remove $ in pom files

update to 22.1:
  * Add visibility of plugin.proto to python directory
  * Strip 'src' from file name of plugin.proto
  * Add OSGi headers to pom files.
  * Remove errorprone dependency from kotlin protos.
  * Version protoc according to the compiler version number.

- update to 22.0:

  * This version includes breaking changes to: Cpp.
    Please refer to the migration guide for information:
    https://protobuf.dev/support/migration/#compiler-22
  * [Cpp] Migrate to Abseil's logging library.
  * [Cpp] `proto2::Map::value_type` changes to `std::pair`.
  * [Cpp] Mark final ZeroCopyInputStream, ZeroCopyOutputStream,
    and DefaultFieldComparator classes.
  * [Cpp] Add a dependency on Abseil (#10416)
  * [Cpp] Remove all autotools usage (#10132)
  * [Cpp] Add C++20 reserved keywords
  * [Cpp] Dropped C++11 Support
  * [Cpp] Delete Arena::Init
  * [Cpp] Replace JSON parser with new implementation
  * [Cpp] Make RepeatedField::GetArena non-const in order to
    support split RepeatedFields.
  * long list of bindings specific fixes see
    https://github.com/protocolbuffers/protobuf/releases/tag/v22.0

update to v21.12:

* Python:
  * Fix broken enum ranges (#11171)
  * Stop requiring extension fields to have a sythetic oneof (#11091)
  * Python runtime 4.21.10 not works generated code can not load valid
    proto.

update to 21.11:

* Python:
  * Add license file to pypi wheels (#10936)
  * Fix round-trip bug (#10158)

update to 21.10::

* Java:
  * Use bit-field int values in buildPartial to skip work on unset groups of
    fields. (#10960)
  * Mark nested builder as clean after clear is called (#10984)

update to 21.9:
  * Ruby:
      * Replace libc strdup usage with internal impl to restore musl compat (#10818)
      * Auto capitalize enums name in Ruby (#10454) (#10763)
  * Other:
      * Fix for grpc.tools #17995 &amp; protobuf #7474 (handle UTF-8 paths in argumentfile) (#10721)
  * C++:
      * 21.x No longer define no_threadlocal on OpenBSD (#10743)
  * Java:
      * Mark default instance as immutable first to avoid race during static initialization of default instances (#10771)
      * Refactoring java full runtime to reuse sub-message builders and prepare to
        migrate parsing logic from parse constructor to builder.
      * Move proto wireformat parsing functionality from the private 'parsing
        constructor' to the Builder class.
      * Change the Lite runtime to prefer merging from the wireformat into mutable
        messages rather than building up a new immutable object before merging. This
        way results in fewer allocations and copy operations.
      * Make message-type extensions merge from wire-format instead of building up
        instances and merging afterwards. This has much better performance.
      * Fix TextFormat parser to build up recurring (but supposedly not repeated)
        sub-messages directly from text rather than building a new sub-message and
        merging the fully formed message into the existing field.

update to 21.6:
  C++:
  * Reduce memory consumption of MessageSet parsing

update to 21.5:

  PHP:
  * Added getContainingOneof and getRealContainingOneof to descriptor.
  * fix PHP readonly legacy files for nested messages

  Python:

  * Fixed comparison of maps in Python.

- update to 21.4:

  * Reduce the required alignment of ArenaString from 8 to 4

- update to 21.3:

  * C++:
    * Add header search paths to Protobuf-C++.podspec (#10024)
    * Fixed Visual Studio constinit errors (#10232)
    * Fix #9947: make the ABI compatible between debug and non-debug builds (#10271)
  * UPB:
    * Allow empty package names (fixes behavior regression in 4.21.0)
    * Fix a SEGV bug when comparing a non-materialized sub-message (#10208)
    * Fix several bugs in descriptor mapping containers (eg. descriptor.services_by_name)
      * for x in mapping now yields keys rather than values, to match Python
        conventions and the behavior of the old library.
      * Lookup operations now correctly reject unhashable types as map keys.
      * We implement repr() to use the same format as dict.
    * Fix maps to use the ScalarMapContainer class when appropriate
    * Fix bug when parsing an unknown value in a proto2 enum extension (protocolbuffers/upb#717)
  * PHP:
    * Add 'readonly' as a keyword for PHP and add previous classnames to descriptor pool (#10041)
  * Python:
    * Make //:protobuf_python and //:well_known_types_py_pb2 public (#10118)
  * Bazel:
     * Add back a filegroup for :well_known_protos (#10061)

Update to 21.2:
- C++:
  - cmake: Call get_filename_component() with DIRECTORY mode instead of PATH mode (#9614)
  - Escape GetObject macro inside protoc-generated code (#9739)
  - Update CMake configuration to add a dependency on Abseil (#9793)
  - Fix cmake install targets (#9822)
  - Use __constinit only in GCC 12.2 and up (#9936)
- Java:
  - Update protobuf_version.bzl to separate protoc and per-language java … (#9900)
- Python:
  - Increment python major version to 4 in version.json for python upb (#9926)
  - The C extension module for Python has been rewritten to use the upb library.
  - This is expected to deliver significant performance benefits, especially when
    parsing large payloads. There are some minor breaking changes, but these
    should not impact most users. For more information see:
    https://developers.google.com/protocol-buffers/docs/news/2022-05-06#python-updates
- PHP:
  - [PHP] fix PHP build system (#9571)
  - Fix building packaged PHP extension (#9727)
  - fix: reserve 'ReadOnly' keyword for PHP 8.1 and add compatibility (#9633)
  - fix: phpdoc syntax for repeatedfield parameters (#9784)
  - fix: phpdoc for repeatedfield (#9783)
  - Change enum string name for reserved words (#9780)
  - chore: [PHP] fix phpdoc for MapField keys (#9536)
  - Fixed PHP SEGV by not writing to shared memory for zend_class_entry. (#9996)
- Ruby:
  - Allow pre-compiled binaries for ruby 3.1.0 (#9566)
  - Implement respond_to? in RubyMessage (#9677)
  - [Ruby] Fix RepeatedField#last, #first inconsistencies (#9722)
  - Do not use range based UTF-8 validation in truffleruby (#9769)
  - Improve range handling logic of RepeatedField (#9799)
- Other:
  - Fix invalid dependency manifest when using descriptor_set_out (#9647)
  - Remove duplicate java generated code (#9909)

- Update to 3.20.1:

  - PHP:
    - Fix building packaged PHP extension (#9727)
    - Fixed composer.json to only advertise compatibility with
      PHP 7.0+. (#9819)
  - Ruby:
    - Disable the aarch64 build on macOS until it can be fixed. (#9816)
  - Other:
    - Fix versioning issues in 3.20.0

- Update to 3.20.1:
  - Ruby:
    - Dropped Ruby 2.3 and 2.4 support for CI and releases.
      (#9311)
    - Added Ruby 3.1 support for CI and releases (#9566).
    - Message.decode/encode: Add recursion_limit option
      (#9218/#9486)
    - Allocate with xrealloc()/xfree() so message allocation is
      visible to the
    - Ruby GC. In certain tests this leads to much lower memory
      usage due to more
    - frequent GC runs (#9586).
    - Fix conversion of singleton classes in Ruby (#9342)
    - Suppress warning for intentional circular require (#9556)
    - JSON will now output shorter strings for double and float
      fields when possible
    - without losing precision.
    - Encoding and decoding of binary format will now work
      properly on big-endian
    - systems.
    - UTF-8 verification was fixed to properly reject surrogate
      code points.
    - Unknown enums for proto2 protos now properly implement
      proto2's behavior of
    - putting such values in unknown fields.
  - Java:
    - Revert 'Standardize on Array copyOf' (#9400)
    - Resolve more java field accessor name conflicts (#8198)
    - Fix parseFrom to only throw InvalidProtocolBufferException
    - InvalidProtocolBufferException now allows arbitrary wrapped
      Exception types.
    - Fix bug in FieldSet.Builder.mergeFrom
    - Flush CodedOutputStream also flushes underlying
      OutputStream
    - When oneof case is the same and the field type is Message,
      merge the
    - subfield. (previously it was replaced.)’
    - Add @CheckReturnValue to some protobuf types
    - Report original exceptions when parsing JSON
    - Add more info to @deprecated javadoc for set/get/has
      methods
    - Fix initialization bug in doc comment line numbers
    - Fix comments for message set wire format.
  - Kotlin:
    - Add test scope to kotlin-test for protobuf-kotlin-lite
      (#9518)
    - Add orNull extensions for optional message fields.
    - Add orNull extensions to all proto3 message fields.
  - Python:
    - Dropped support for Python &lt; 3.7 (#9480)
    - Protoc is now able to generate python stubs (.pyi) with
      --pyi_out
    - Pin multibuild scripts to get manylinux1 wheels back
      (#9216)
    - Fix type annotations of some Duration and Timestamp
      methods.
    - Repeated field containers are now generic in field types
      and could be used in type annotations.
    - Protobuf python generated codes are simplified. Descriptors
      and message classes' definitions are now dynamic created in
      internal/builder.py.
    - Insertion Points for messages classes are discarded.
    - has_presence is added for FieldDescriptor in python
    - Loosen indexing type requirements to allow valid index()
      implementations rather than only PyLongObjects.
    - Fix the deepcopy bug caused by not copying
      message_listener.
    - Added python JSON parse recursion limit (default 100)
    - Path info is added for python JSON parse errors
    - Pure python repeated scalar fields will not able to pickle.
      Convert to list first.
    - Timestamp.ToDatetime() now accepts an optional tzinfo
      parameter. If specified, the function returns
      a timezone-aware datetime in the given time zone. If
      omitted or None, the function returns a timezone-naive UTC
      datetime (as previously).
    - Adds client_streaming and server_streaming fields to
      MethodDescriptor.
    - Add 'ensure_ascii' parameter to json_format.MessageToJson.
      This allows smaller JSON serializations with UTF-8 or other
      non-ASCII encodings.
    - Added experimental support for directly assigning numpy
      scalars and array.
    - Improve the calculation of public_dependencies in
      DescriptorPool.
    - [Breaking Change] Disallow setting fields to numpy
      singleton arrays or repeated fields to numpy
      multi-dimensional arrays. Numpy arrays should be indexed or
      flattened explicitly before assignment.
  - Compiler:
    - Migrate IsDefault(const std::string*) and
      UnsafeSetDefault(const std::string*)
    - Implement strong qualified tags for TaggedPtr
    - Rework allocations to power-of-two byte sizes.
    - Migrate IsDefault(const std::string*) and
      UnsafeSetDefault(const std::string*)
    - Implement strong qualified tags for TaggedPtr
    - Make TaggedPtr Set...() calls explicitly spell out the
      content type.
    - Check for parsing error before verifying UTF8.
    - Enforce a maximum message nesting limit of 32 in the
      descriptor builder to
    - guard against stack overflows
    - Fixed bugs in operators for RepeatedPtrIterator
    - Assert a maximum map alignment for allocated values
    - Fix proto1 group extension protodb parsing error
    - Do not log/report the same descriptor symbol multiple
      times if it contains
    - more than one invalid character.
    - Add UnknownFieldSet::SerializeToString and
      SerializeToCodedStream.
    - Remove explicit default pointers and deprecated API from
      protocol compiler
  - Arenas:
    - Change Repeated*Field to reuse memory when using arenas.
    - Implements pbarenaz for profiling proto arenas
    - Introduce CreateString() and CreateArenaString() for
      cleaner semantics
    - Fix unreferenced parameter for MSVC builds
    - Add UnsafeSetAllocated to be used for one-of string
      fields.
    - Make Arena::AllocateAligned() a public function.
    - Determine if ArenaDtor related code generation is
      necessary in one place.
    - Implement on demand register ArenaDtor for
      InlinedStringField
  - C++:
    - Enable testing via CTest (#8737)
    - Add option to use external GTest in CMake (#8736)
    - CMake: Set correct sonames for libprotobuf-lite.so and
      libprotoc.so (#8635) (#9529)
    - Add cmake option protobuf_INSTALL to not install files
      (#7123)
    - CMake: Allow custom plugin options e.g. to generate mocks
      (#9105)
    - CMake: Use linker version scripts (#9545)
    - Manually *struct Cord fields to work better with arenas.
    - Manually destruct map fields.
    - Generate narrower code
    - Fix #9378 by removing
    - shadowed cached_size field
    - Remove GetPointer() and explicit nullptr defaults.
    - Add proto_h flag for speeding up large builds
    - Add missing overload for reference wrapped fields.
    - Add MergedDescriptorDatabase::FindAllFileNames()
    - RepeatedField now defines an iterator type instead of
      using a pointer.
    - Remove obsolete macros GOOGLE_PROTOBUF_HAS_ONEOF and
      GOOGLE_PROTOBUF_HAS_ARENAS.
  - PHP:
    - Fix: add missing reserved classnames (#9458)
    - PHP 8.1 compatibility (#9370)
  - C#:
    - Fix trim warnings (#9182)
    - Fixes NullReferenceException when accessing
      FieldDescriptor.IsPacked (#9430)
    - Add ToProto() method to all descriptor classes (#9426)
    - Add an option to preserve proto names in JsonFormatter
      (#6307)
  - Objective-C:
    - Add prefix_to_proto_package_mappings_path option. (#9498)
    - Rename proto_package_to_prefix_mappings_path to
      package_to_prefix_mappings_path. (#9552)
    - Add a generation option to control use of forward
      declarations in headers. (#9568)

- update to 3.19.4:
  Python:
    * Make libprotobuf symbols local on OSX to fix issue #9395 (#9435)
  Ruby:
    * Fixed a data loss bug that could occur when the number of optional fields
      in a message is an exact multiple of 32
  PHP:
    * Fixed a data loss bug that could occur when the number of optional fields
      in a message is an exact multiple of 32.

- Update to 3.19.3:
  C++:
    * Make proto2::Message::DiscardUnknownFields() non-virtual
    * Separate RepeatedPtrField into its own header file
    * For default floating point values of 0, consider all bits significant
    * Fix shadowing warnings
    * Fix for issue #8484, constant initialization doesn't compile in msvc clang-cl environment
  Java:
    * Improve performance characteristics of UnknownFieldSet parsing
    * For default floating point values of 0, consider all bits significant
    * Annotate //java/com/google/protobuf/util/... with nullness annotations
    * Use ArrayList copy constructor
  Bazel:
    * Ensure that release archives contain everything needed for Bazel
    * Align dependency handling with Bazel best practices
  Javascript:
    * Fix ReferenceError: window is not defined when getting the global object
  Ruby:
    * Fix memory leak in MessageClass.encode
    * Override Map.clone to use Map's dup method
    * Ruby: build extensions for arm64-darwin
    * Add class method Timestamp.from_time to ruby well known types
    * Adopt pure ruby DSL implementation for JRuby
    * Add size to Map class
    * Fix for descriptor_pb.rb: google/protobuf should be required first
  Python:
    * Proto2 DecodeError now includes message name in error message
    * Make MessageToDict convert map keys to strings
    * Add python-requires in setup.py
    * Add python 3.10

- Update to 3.17.3:
  C++
  * Introduce FieldAccessListener.
  * Stop emitting boilerplate {Copy/Merge}From in each ProtoBuf class
  * Provide stable versions of SortAndUnique().
  * Make sure to cache proto3 optional message fields when they are cleared.
  * Expose UnsafeArena methods to Reflection.
  * Use std::string::empty() rather than std::string::size() &gt; 0.
  * [Protoc] C++ Resolved an issue where NO_DESTROY and CONSTINIT are in incorrect order (#8296)
  * Fix PROTOBUF_CONSTINIT macro redefinition (#8323)
  * Delete StringPiecePod (#8353)
  * Create a CMake option to control whether or not RTTI is enabled (#8347)
  * Make util::Status more similar to absl::Status (#8405)
  * The ::pb namespace is no longer exposed due to conflicts.
  * Allow MessageDifferencer::TreatAsSet() (and friends) to override previous
  calls instead of crashing.
  * Reduce the size of generated proto headers for protos with string or
  bytes fields.
  * Move arena() operation on uncommon path to out-of-line routine
  * For iterator-pair function parameter types, take both iterators by value.
  * Code-space savings and perhaps some modest performance improvements in
  * RepeatedPtrField.
  * Eliminate nullptr check from every tag parse.
  * Remove unused _$name$cached_byte_size fields.
  * Serialize extension ranges together when not broken by a proto field in the
  middle.
  * Do out-of-line allocation and deallocation of string object in ArenaString.
  * Streamline ParseContext::ParseMessage to avoid code bloat and improve
  performance.
  * New member functions RepeatedField::Assign, RepeatedPtrField::{Add, Assign}.
  on an error path.
  * util::DefaultFieldComparator will be final in a future version of protobuf.
  * Subclasses should inherit from SimpleFieldComparator instead.
  Kotlin
  * Introduce support for Kotlin protos (#8272)
  * Restrict extension setter and getter operators to non-nullable T.
  Java
  * Fixed parser to check that we are at a proper limit when a sub-message has
  finished parsing.
  * updating GSON and Guava to more recent versions (#8524)
  * Reduce the time spent evaluating isExtensionNumber by storing the extension
  ranges in a TreeMap for faster queries. This is particularly relevant for
  protos which define a large number of extension ranges, for example when
  each tag is defined as an extension.
  * Fix java bytecode estimation logic for optional fields.
  * Optimize Descriptor.isExtensionNumber.
  * deps: update JUnit and Truth (#8319)
  * Detect invalid overflow of byteLimit and return InvalidProtocolBufferException as documented.
  * Exceptions thrown while reading from an InputStream in parseFrom are now
  included as causes.
  * Support potentially more efficient proto parsing from RopeByteStrings.
  * Clarify runtime of ByteString.Output.toStringBuffer().
  * Added UnsafeByteOperations to protobuf-lite (#8426)
  Python:
  * Add MethodDescriptor.CopyToProto() (#8327)
  * Remove unused python_protobuf.{cc,h} (#8513)
  * Start publishing python aarch64 manylinux wheels normally (#8530)
  * Fix constness issue detected by MSVC standard conforming mode (#8568)
  * Make JSON parsing match C++ and Java when multiple fields from the same
  oneof are present and all but one is null.
  * Fix some constness / char literal issues being found by MSVC standard conforming mode (#8344)
  * Switch on 'new' buffer API (#8339)
  * Enable crosscompiling aarch64 python wheels under dockcross manylinux docker image (#8280)
  * Fixed a bug in text format where a trailing colon was printed for repeated field.
  * When TextFormat encounters a duplicate message map key, replace the current
  one instead of merging.
  Ruby:
  * Add support for proto3 json_name in compiler and field definitions (#8356)
  * Fixed memory leak of Ruby arena objects. (#8461)
  * Fix source gem compilation (#8471)
  * Fix various exceptions in Ruby on 64-bit Windows (#8563)
  * Fix crash when calculating Message hash values on 64-bit Windows (#8565)
  General:
  * Support M1 (#8557)

Update to 3.15.8:
  - Fixed memory leak of Ruby arena objects (#8461)

Update to 3.15.7:

  C++:
  * Remove the ::pb namespace (alias) (#8423)
  Ruby:
  * Fix unbounded memory growth for Ruby &lt;2.7 (#8429)
  * Fixed message equality in cases where the message type is different (#8434)

update to 3.15.6:

  Ruby:
  * Fixed bug in string comparison logic (#8386)
  * Fixed quadratic memory use in array append (#8379)
  * Fixed SEGV when users pass nil messages (#8363)
  * Fixed quadratic memory usage when appending to arrays (#8364)
  * Ruby &lt;2.7 now uses WeakMap too, which prevents memory leaks. (#8341)
  * Fix for FieldDescriptor.get(msg) (#8330)
  * Bugfix for Message.[] for repeated or map fields (#8313)
  PHP:
  * read_property() handler is not supposed to return NULL (#8362)
  Protocol Compiler
  * Optional fields for proto3 are enabled by default, and no longer require
    the --experimental_allow_proto3_optional flag.
  C++:
  * Do not disable RTTI by default in the CMake build (#8377)
  * Create a CMake option to control whether or not RTTI is enabled (#8361)
  * Fix PROTOBUF_CONSTINIT macro redefinition (#8323)
  * MessageDifferencer: fixed bug when using custom ignore with multiple
    unknown fields
  * Use init_seg in MSVC to push initialization to an earlier phase.
  * Runtime no longer triggers -Wsign-compare warnings.
  * Fixed -Wtautological-constant-out-of-range-compare warning.
  * DynamicCastToGenerated works for nullptr input for even if RTTI is disabled
  * Arena is refactored and optimized.
  * Clarified/specified that the exact value of Arena::SpaceAllocated() is an
    implementation detail users must not rely on. It should not be used in
    unit tests.
  * Change the signature of Any::PackFrom() to return false on error.
  * Add fast reflection getter API for strings.
  * Constant initialize the global message instances
  * Avoid potential for missed wakeup in UnknownFieldSet
  * Now Proto3 Oneof fields have 'has' methods for checking their presence in
    C++.
  * Bugfix for NVCC
  * Return early in _InternalSerialize for empty maps.
  * Adding functionality for outputting map key values in proto path logging
    output (does not affect comparison logic) and stop printing 'value' in the
    path. The modified print functionality is in the
    MessageDifferencer::StreamReporter.
  * Fixed https://github.com/protocolbuffers/protobuf/issues/8129
  * Ensure that null char symbol, package and file names do not result in a
    crash.
  * Constant initialize the global message instances
  * Pretty print 'max' instead of numeric values in reserved ranges.
  * Removed remaining instances of std::is_pod, which is deprecated in C++20.
  * Changes to reduce code size for unknown field handling by making uncommon
    cases out of line.
  * Fix std::is_pod deprecated in C++20 (#7180)
  * Fix some -Wunused-parameter warnings (#8053)
  * Fix detecting file as directory on zOS issue #8051 (#8052)
  * Don't include sys/param.h for _BYTE_ORDER (#8106)
  * remove CMAKE_THREAD_LIBS_INIT from pkgconfig CFLAGS (#8154)
  * Fix TextFormatMapTest.DynamicMessage issue#5136 (#8159)
  * Fix for compiler warning issue#8145 (#8160)
  * fix: support deprecated enums for GCC &lt; 6 (#8164)
  * Fix some warning when compiling with Visual Studio 2019 on x64 target (#8125)
  Python:
  * Provided an override for the reverse() method that will reverse the internal
    collection directly instead of using the other methods of the BaseContainer.
  * MessageFactory.CreateProtoype can be overridden to customize class creation.
  * Fix PyUnknownFields memory leak (#7928)
  * Add macOS big sur compatibility (#8126)
  JavaScript
  * Generate `getDescriptor` methods with `*` as their `this` type.
  * Enforce `let/const` for generated messages.
  * js/binary/utils.js: Fix jspb.utils.joinUnsignedDecimalString to work with
    negative bitsLow and low but non-zero bitsHigh parameter. (#8170)
  PHP:
  * Added support for PHP 8. (#8105)
  * unregister INI entries and fix invalid read on shutdown (#8042)
  * Fix PhpDoc comments for message accessors to include '|null'. (#8136)
  * fix: convert native PHP floats to single precision (#8187)
  * Fixed PHP to support field numbers &gt;=2**28. (#8235)
  * feat: add support for deprecated fields to PHP compiler (#8223)
  * Protect against stack overflow if the user derives from Message. (#8248)
  * Fixed clone for Message, RepeatedField, and MapField. (#8245)
  * Updated upb to allow nonzero offset minutes in JSON timestamps. (#8258)
  Ruby:
  * Added support for Ruby 3. (#8184)
  * Rewrote the data storage layer to be based on upb_msg objects from the
    upb library. This should lead to much better parsing performance,
    particularly for large messages. (#8184).
  * Fill out JRuby support (#7923)
  * [Ruby] Fix: (SIGSEGV) gRPC-Ruby issue on Windows. memory alloc infinite
    recursion/run out of memory (#8195)
  * Fix jruby support to handle messages nested more than 1 level deep (#8194)
  Java:
  * Avoid possible UnsupportedOperationException when using CodedInputSteam
    with a direct ByteBuffer.
  * Make Durations.comparator() and Timestamps.comparator() Serializable.
  * Add more detailed error information for dynamic message field type
    validation failure
  * Removed declarations of functions declared in java_names.h from
    java_helpers.h.
  * Now Proto3 Oneof fields have 'has' methods for checking their presence in
    Java.
  * Annotates Java proto generated *_FIELD_NUMBER constants.
  * Add -assumevalues to remove JvmMemoryAccessor on Android.
  C#:
  * Fix parsing negative Int32Value that crosses segment boundary (#8035)
  * Change ByteString to use memory and support unsafe create without copy (#7645)
  * Optimize MapField serialization by removing MessageAdapter (#8143)
  * Allow FileDescriptors to be parsed with extension registries (#8220)
  * Optimize writing small strings (#8149)

- Updated URL to https://github.com/protocolbuffers/protobuf

Update to v3.14.0

  Protocol Compiler:
  * The proto compiler no longer requires a .proto filename when it is not
    generating code.
  * Added flag `--deterministic_output` to `protoc --encode=...`.
  * Fixed deadlock when using google.protobuf.Any embedded in aggregate options.
  C++:
  * Arenas are now unconditionally enabled. cc_enable_arenas no longer has
    any effect.
  * Removed inlined string support, which is incompatible with arenas.
  * Fix a memory corruption bug in reflection when mixing optional and
    non-optional fields.
  * Make SpaceUsed() calculation more thorough for map fields.
  * Add stack overflow protection for text format with unknown field values.
  * FieldPath::FollowAll() now returns a bool to signal if an out-of-bounds
    error was encountered.
  * Performance improvements for Map.
  * Minor formatting fix when dumping a descriptor to .proto format with
    DebugString.
  * UBSAN fix in RepeatedField
  * When running under ASAN, skip a test that makes huge allocations.
  * Fixed a crash that could happen when creating more than 256 extensions in
    a single message.
  * Fix a crash in BuildFile when passing in invalid descriptor proto.
  * Parser security fix when operating with CodedInputStream.
  * Warn against the use of AllowUnknownExtension.
  * Migrated to C++11 for-range loops instead of index-based loops where
    possible. This fixes a lot of warnings when compiling with -Wsign-compare.
  * Fix segment fault for proto3 optional
  * Adds a CMake option to build `libprotoc` separately
  Java
  * Bugfix in mergeFrom() when a oneof has multiple message fields.
  * Fix RopeByteString.RopeInputStream.read() returning -1 when told to read
    0 bytes when not at EOF.
  * Redefine remove(Object) on primitive repeated field Lists to avoid
    autoboxing.
  * Support '\u' escapes in textformat string literals.
  * Trailing empty spaces are no longer ignored for FieldMask.
  * Fix FieldMaskUtil.subtract to recursively remove mask.
  * Mark enums with `@java.lang.Deprecated` if the proto enum has option
    `deprecated = true;`.
  * Adding forgotten duration.proto to the lite library
  Python:
  * Print google.protobuf.NullValue as null instead of 'NULL_VALUE' when it is
    used outside WKT Value/Struct.
  * Fix bug occurring when attempting to deep copy an enum type in python 3.
  * Add a setuptools extension for generating Python protobufs
  * Remove uses of pkg_resources in non-namespace packages
  * [bazel/py] Omit google/__init__.py from the Protobuf runtime
  * Removed the unnecessary setuptools package dependency for Python package
  * Fix PyUnknownFields memory leak
  PHP:
  * Added support for '==' to the PHP C extension
  * Added `==` operators for Map and Array
  * Native C well-known types
  * Optimized away hex2bin() call in generated code
  * New version of upb, and a new hash function wyhash in third_party
  * add missing hasOneof method to check presence of oneof fields
  Go:
  * Update go_package options to reference google.golang.org/protobuf module.
  C#:
  * annotate ByteString.CopyFrom(ReadOnlySpan&lt;byte&gt;) as SecuritySafeCritical
  * Fix C# optional field reflection when there are regular fields too
  * Fix parsing negative Int32Value that crosses segment boundary
  Javascript:
  * JS: parse (un)packed fields conditionally

Update to version 3.13.0
  PHP:
  * The C extension is completely rewritten. The new C extension has significantly
    better parsing performance and fixes a handful of conformance issues. It will
    also make it easier to add support for more features like proto2 and proto3 presence.
  * The new C extension does not support PHP 5.x. PHP 5.x users can still use pure-PHP.
  C++:
  * Removed deprecated unsafe arena string accessors
  * Enabled heterogeneous lookup for std::string keys in maps.
  * Removed implicit conversion from StringPiece to std::string
  * Fix use-after-destroy bug when the Map is allocated in the arena.
  * Improved the randomness of map ordering
  * Added stack overflow protection for text format with unknown fields
  * Use std::hash for proto maps to help with portability.
  * Added more Windows macros to proto whitelist.
  * Arena constructors for map entry messages are now marked 'explicit'
    (for regular messages they were already explicit).
  * Fix subtle aliasing bug in RepeatedField::Add
  * Fix mismatch between MapEntry ByteSize and Serialize with respect to unset
    fields.
  Python:
  * JSON format conformance fixes:
    * Reject lowercase t for Timestamp json format.
    * Print full_name directly for extensions (no camelCase).
    * Reject boolean values for integer fields.
    * Reject NaN, Infinity, -Infinity that is not quoted.
    * Base64 fixes for bytes fields: accept URL-safe base64 and missing padding.
  * Bugfix for fields/files named 'async' or 'await'.
  * Improved the error message when AttributeError is returned from __getattr__
    in EnumTypeWrapper.
  Java:
  * Fixed a bug where setting optional proto3 enums with setFooValue() would
    not mark the value as present.
  * Add Subtract function to FieldMaskUtil.
  C#:
  * Dropped support for netstandard1.0 (replaced by support for netstandard1.1).
    This was required to modernize the parsing stack to use the `Span&lt;byte&gt;`
    type internally
  * Add `ParseFrom(ReadOnlySequence&lt;byte&gt;)` method to enable GC friendly
    parsing with reduced allocations and buffer copies
  * Add support for serialization directly to a `IBufferWriter&lt;byte&gt;` or
    to a `Span&lt;byte&gt;` to enable GC friendly serialization.
    The new API is available as extension methods on the `IMessage` type
  * Add `GOOGLE_PROTOBUF_REFSTRUCT_COMPATIBILITY_MODE` define to make
    generated code compatible with old C# compilers (pre-roslyn compilers
    from .NET framework and old versions of mono) that do not support
    ref structs. Users that are still on a legacy stack that does
    not support C# 7.2 compiler might need to use the new define
    in their projects to be able to build the newly generated code
  * Due to the major overhaul of parsing and serialization internals,
    it is recommended to regenerate your generated code to achieve the best
    performance (the legacy generated code will still work, but might incur
    a slight performance penalty).

Update to version 3.12.3; notable changes since 3.11.4:

  Protocol Compiler:
  * [experimental] Singular, non-message typed fields in proto3 now support
    presence tracking. This is enabled by adding the 'optional' field label and
    passing the --experimental_allow_proto3_optional flag to protoc.
    * For usage info, see docs/field_presence.md.
    * During this experimental phase, code generators should update to support
      proto3 presence, see docs/implementing_proto3_presence.md for instructions.
  * Allow duplicate symbol names when multiple descriptor sets are passed on
    the command-line, to match the behavior when multiple .proto files are passed.
  * Deterministic `protoc --descriptor_set_out` (#7175)
  Objective-C:
  * Tweak the union used for Extensions to support old generated code. #7573
  * Fix for the :protobuf_objc target in the Bazel BUILD file. (#7538)
  * [experimental] ObjC Proto3 optional support (#7421)
  * Block subclassing of generated classes (#7124)
  * Use references to Obj C classes instead of names in descriptors. (#7026)
  * Revisit how the WKTs are bundled with ObjC. (#7173)
  C++:
  * Simplified the template export macros to fix the build for mingw32. (#7539)
  * [experimental] Added proto3 presence support.
  * New descriptor APIs to support proto3 presence.
  * Enable Arenas by default on all .proto files.
  * Documented that users are not allowed to subclass Message or MessageLite.
  * Mark generated classes as final; inheriting from protos is strongly discouraged.
  * Add stack overflow protection for text format with unknown fields.
  * Add accessors for map key and value FieldDescriptors.
  * Add FieldMaskUtil::FromFieldNumbers().
  * MessageDifferencer: use ParsePartial() on Any fields so the diff does not
    fail when there are missing required fields.
  * ReflectionOps::Merge(): lookup messages in the right factory, if it can.
  * Added Descriptor::WellKnownTypes enum and Descriptor::well_known_type()
    accessor as an easier way of determining if a message is a Well-Known Type.
  * Optimized RepeatedField::Add() when it is used in a loop.
  * Made proto move/swap more efficient.
  * De-virtualize the GetArena() method in MessageLite.
  * Improves performance of json_stream_parser.cc by factor 1000 (#7230)
  * bug: #7076 undefine Windows OUT and OPTIONAL macros (#7087)
  * Fixed a bug in FieldDescriptor::DebugString() that would erroneously print
    an 'optional' label for a field in a oneof.
  * Fix bug in parsing bool extensions that assumed they are always 1 byte.
  * Fix off-by-one error in FieldOptions::ByteSize() when extensions are present.
  * Clarified the comments to show an example of the difference between
    Descriptor::extension and DescriptorPool::FindAllExtensions.
  * Add a compiler option 'code_size' to force optimize_for=code_size on all
    protos where this is possible.
  Ruby:
  * Re-add binary gems for Ruby 2.3 and 2.4. These are EOL upstream, however
    many people still use them and dropping support will require more
    coordination.
  * [experimental] Implemented proto3 presence for Ruby. (#7406)
  * Stop building binary gems for ruby &lt;2.5 (#7453)
  * Fix for wrappers with a zero value (#7195)
  * Fix for JSON serialization of 0/empty-valued wrapper types (#7198)
  * Call 'Class#new' over rb_class_new_instance in decoding (#7352)
  * Build extensions for Ruby 2.7 (#7027)
  * assigning 'nil' to submessage should clear the field. (#7397)
  Java:
  * [experimental] Added proto3 presence support.
  * Mark java enum _VALUE constants as @Deprecated if the enum field is deprecated
  * reduce &lt;clinit&gt; size for enums with allow_alias set to true.
  * Sort map fields alphabetically by the field's key when printing textproto.
  * Fixed a bug in map sorting that appeared in -rc1 and -rc2 (#7508).
  * TextFormat.merge() handles Any as top level type.
  * Throw a descriptive IllegalArgumentException when calling
    getValueDescriptor() on enum special value UNRECOGNIZED instead of
    ArrayIndexOutOfBoundsException.
  * Fixed an issue with JsonFormat.printer() where setting printingEnumsAsInts()
    would override the configuration passed into includingDefaultValueFields().
  * Implement overrides of indexOf() and contains() on primitive lists returned
    for repeated fields to avoid autoboxing the list contents.
  * Add overload to FieldMaskUtil.fromStringList that accepts a descriptor.
  * [bazel] Move Java runtime/toolchains into //java (#7190)
  Python:
  * [experimental] Added proto3 presence support.
  * [experimental] fast import protobuf module, only works with cpp generated code linked in.
  * Truncate 'float' fields to 4 bytes of precision in setters for pure-Python
    implementation (C++ extension was already doing this).
  * Fixed a memory leak in C++ bindings.
  * Added a deprecation warning when code tries to create Descriptor objects
    directly.
  * Fix unintended comparison between bytes and string in descriptor.py.
  * Avoid printing excess digits for float fields in TextFormat.
  * Remove Python 2.5 syntax compatibility from the proto compiler generated _pb2.py module code.
  * Drop 3.3, 3.4 and use single version docker images for all python tests (#7396)
  JavaScript:
  * Fix js message pivot selection (#6813)
  PHP:
  * Persistent Descriptor Pool (#6899)
  * Implement lazy loading of php class for proto messages (#6911)
  * Correct @return in Any.unpack docblock (#7089)
  * Ignore unknown enum value when ignore_unknown specified (#7455)
  C#:
  * [experimental] Add support for proto3 presence fields in C# (#7382)
  * Mark GetOption API as obsolete and expose the 'GetOptions()' method on descriptors instead (#7491)
  * Remove Has/Clear members for C# message fields in proto2 (#7429)
  * Enforce recursion depth checking for unknown fields (#7132)
  * Fix conformance test failures for Google.Protobuf (#6910)
  * Cleanup various bits of Google.Protobuf (#6674)
  * Fix latest ArgumentException for C# extensions (#6938)
  * Remove unnecessary branch from ReadTag (#7289)
  Other:
  * Add a proto_lang_toolchain for javalite (#6882)
  * [bazel] Update gtest and deprecate //external:{gtest,gtest_main} (#7237)
  * Add application note for explicit presence tracking. (#7390)
  * Howto doc for implementing proto3 presence in a code generator. (#7407)

Update to version 3.11.4; notable changes since 3.9.2:

  * C++: Make serialization method naming consistent
  * C++: Moved ShutdownProtobufLibrary() to message_lite.h. For
         backward compatibility a declaration is still available
         in stubs/common.h, but users should prefer message_lite.h
  * C++: Removed non-namespace macro EXPECT_OK()
  * C++: Removed mathlimits.h from stubs in favor of using
         std::numeric_limits from C++11
  * C++: Support direct pickling of nested messages
  * C++: Disable extension code gen for C#
  * C++: Switch the proto parser to the faster MOMI parser
  * C++: Unused imports of files defining descriptor extensions
         will now be reported
  * C++: Add proto2::util::RemoveSubranges to remove multiple
         subranges in linear time
  * C++: Support 32 bit values for ProtoStreamObjectWriter to Struct
  * C++: Removed the internal-only header coded_stream_inl.h and
         the internal-only methods defined there
  * C++: Enforced no SWIG wrapping of descriptor_database.h
         (other headers already had this restriction)
  * C++: Implementation of the equivalent of the MOMI parser for
         serialization. This removes one of the two serialization
         routines, by making the fast array serialization routine
         completely general. SerializeToCodedStream can now be
         implemented in terms of the much much faster array
         serialization. The array serialization regresses slightly,
         but when array serialization is not possible this wins big
  * C++: Add move constructor for Reflection's SetString
  * Java: Remove the usage of MethodHandle, so that Android users
          prior to API version 26 can use protobuf-java
  * Java: Publish ProGuard config for javalite
  * Java: Include unknown fields when merging proto3 messages in
          Java lite builders
  * Java: Have oneof enums implement a separate interface (other
          than EnumLite) for clarity
  * Java: Opensource Android Memory Accessors
  * Java: Change ProtobufArrayList to use Object[] instead of
          ArrayList for 5-10% faster parsing
  * Java: Make a copy of JsonFormat.TypeRegistry at the protobuf
          top level package. This will eventually replace
          JsonFormat.TypeRegistry
  * Java: Add Automatic-Module-Name entries to the Manifest
  * Python: Add float_precision option in json format printer
  * Python: Optionally print bytes fields as messages in unknown
            fields, if possible
  * Python: Experimental code gen (fast import protobuf module)
            which only work with cpp generated code linked in
  * Python: Add descriptor methods in descriptor_pool are deprecated
  * Python: Added delitem for Python extension dict
  * JavaScript: Remove guard for Symbol iterator for jspb.Map
  * JavaScript: Remove deprecated boolean option to getResultBase64String()
  * JavaScript: Change the parameter types of binaryReaderFn in
                ExtensionFieldBinaryInfo to (number, ?, ?)
  * JavaScript: Create dates.ts and time_of_days.ts to mirror Java
                versions. This is a near-identical conversion of
                c.g.type.util.{Dates,TimeOfDays} respectively
  * JavaScript: Migrate moneys to TypeScript
  * PHP: Increase php7.4 compatibility
  * PHP: Implement lazy loading of php class for proto messages
  * Ruby: Support hashes for struct initializers
  * C#: Experimental proto2 support is now officially available
  * C#: Change _Extensions property to normal body rather than expression
  * Objective C: Remove OSReadLittle* due to alignment requirements
  * Other: Override CocoaPods module to lowercase
  * further bugfixes and optimisations
- Install LICENSE
- Drop protobuf-libs as it is just workaround for rpmlint issue
  * python bindings now require recent python-google-apputils
  * Released memory allocated by InitializeDefaultRepeatedFields()
    and GetEmptyString(). Some memory sanitizers reported them
  * Updated DynamicMessage.setField() to handle repeated enum
  * Fixed a bug that caused NullPointerException to be thrown when
    converting manually constructed FileDescriptorProto to
  * Added oneofs(unions) feature. Fields in the same oneof will
  * Files, services, enums, messages, methods and enum values
  * Added Support for list values, including lists of mesaages,
  * Added SwapFields() in reflection API to swap a subset of
  * Repeated primitive extensions are now packable. The
    it is possible to switch a repeated extension field to
  * writeTo() method in ByteString can now write a substring to
  * java_generate_equals_and_hash can now be used with the
  * A new C++-backed extension module (aka 'cpp api v2') that
    replaces the old ('cpp api v1') one. Much faster than the
    pure Python code. This one resolves many bugs and is
  mosh reqires it

python-abseil was udpated:

version update to 1.4.0
  New:
    (testing) Added @flagsaver.as_parsed: this allows saving/restoring flags
    using string values as if parsed from the command line and will also reflect
    other flag states after command line parsing, e.g. .present is set.
  Changed:
    (logging) If no log dir is specified logging.find_log_dir() now falls back
    to tempfile.gettempdir() instead of /tmp/.
  Fixed:
    (flags) Additional kwargs (e.g. short_name=) to DEFINE_multi_enum_class
    are now correctly passed to the underlying Flag object.

version update to 1.2.0
  *   Fixed a crash in Python 3.11 when `TempFileCleanup.SUCCESS` is used.
  *   `Flag` instances now raise an error if used in a bool context. This prevents
      the occasional mistake of testing an instance for truthiness rather than
      testing `flag.value`.
  *   `absl-py` no longer depends on `six`.

Update to version 1.0.0 
  * absl-py no longer supports Python 2.7, 3.4, 3.5. All versions
    have reached end-of-life for more than a year now.
  * New releases will be tagged as vX.Y.Z instead of pypi-vX.Y.Z in
    the git repo going forward.

- Release notes for 0.15.0

  * (testing) #128: When running bazel with its --test_filter=
    flag, it now treats the filters as unittest's -k flag in Python
    3.7+.

- Release notes for 0.14.1

  * Top-level LICENSE file is now exported in bazel.

- Release notes for 0.14.0

  * #171: Creating argparse_flags.ArgumentParser with
    argument_default= no longer raises an exception when other
    absl.flags flags are defined.
  * #173: absltest now correctly sets up test filtering and fail
    fast flags when an explicit argv= parameter is passed to
    absltest.main.

- Release notes for 0.13.0
  * (app) Type annotations for public app interfaces.
  * (testing) Added new decorator @absltest.skipThisClass to
    indicate a class contains shared functionality to be used as a
    base class for other TestCases, and therefore should be
    skipped.
  * (app) Annotated the flag_parser paramteter of run as
    keyword-only. This keyword-only constraint will be enforced at
    runtime in a future release.
  * (app, flags) Flag validations now include all errors from
    disjoint flag sets, instead of fail fast upon first error from
    all validators. Multiple validators on the same flag still
    fails fast.
- Release notes for 0.12.0
  * (flags) Made EnumClassSerializer and EnumClassListSerializer
    public.
  * (flags) Added a required: Optional[bool] = False parameter to
    DEFINE_* functions.
  * (testing) flagsaver overrides can now be specified in terms of
    FlagHolder.
  * (testing) parameterized.product: Allows testing a method over
    cartesian product of parameters values, specified as a
    sequences of values for each parameter or as kwargs-like dicts
    of parameter values.
  * (testing) Added public flag holders for --test_srcdir and
    --test_tmpdir. Users should use absltest.TEST_SRCDIR.value and
    absltest.TEST_TMPDIR.value instead of FLAGS.test_srcdir and
    FLAGS.test_tmpdir.
  * (flags) Made CsvListSerializer respect its delimiter argument.

- Add Provides python-absl-py

python-grpcuio was updated:

- Update to version 1.60.0:
  * No python specfic changes.

- Update to version 1.59.2:
  * No python specific changes.

- Update to version 1.59.0:
  * [Python 3.12] Support Python 3.12 (gh#grpc/grpc#34398).
  * [Python 3.12] Deprecate distutil (gh#grpc/grpc#34186).

- Update to version 1.58.0:
  * [Bazel] Enable grpcio-reflection to be used via Bazel
    (gh#grpc/grpc#31013).
  * [packaging] Publish xds-protos as part of the standard package
    pipeline (gh#grpc/grpc#33797).

- Update to version 1.57.0: (CVE-2023-4785, bsc#1215334, CVE-2023-33953, bsc#1214148)
  * [posix] Enable systemd sockets for libsystemd&gt;=233
    (gh#grpc/grpc#32671).
  * [python O11Y] Initial Implementation (gh#grpc/grpc#32974).
- Build with LTO (don't set _lto_cflags to %nil).
- No need to pass '-std=c++17' to build CFLAGS.

- Update to version 1.56.2:

  * [WRR] backport (gh#grpc/grpc#33694) to 1.56
    (gh#grpc/grpc#33698)
  * [backport][iomgr][EventEngine] Improve server handling of
    file descriptor exhaustion (gh#grpc/grpc#33667)
- Switch build to pip/wheel.
- Use system abseil with '-std=c++17' to prevent undefined symbol
  eg. with python-grpcio-tools (_ZN3re23RE213GlobalReplaceEPNSt7__
  cxx1112basic_stringIcSt11char_traitsIcESaIcEEERKS0_N4absl12lts_
  2023012511string_viewE)

- Upstream only supports python &gt;= 3.7, so adjust BuildRequires
  accordingly.

- Add %{?sle15_python_module_pythons}

- Update to version 1.56.0: (CVE-2023-32731, bsc#1212180)
  * [aio types] Fix some grpc.aio python types
    (gh#grpc/grpc#32475).

- Update to version 1.55.0:
  * [EventEngine] Disable EventEngine polling in gRPC Python
    (gh#grpc/grpc#33279) (gh#grpc/grpc#33320).
  * [Bazel Python3.11] Update Bazel dependencies for Python 3.11
    (gh#grpc/grpc#33318) (gh#grpc/grpc#33319).
- Drop Requires: python-six; not required any more.
- Switch Suggests to Recommends.

- Update to version 1.54.0: (CVE-2023-32732, bsc#1212182)
  * Fix DeprecationWarning when calling asyncio.get_event_loop()
    (gh#grpc/grpc#32533).
  * Remove references to deprecated syntax field
    (gh#grpc/grpc#32497).

- Update to version 1.51.1:
  * No Linux specific changes.
- Changes from version 1.51.0:
  * Fix lack of cooldown between poll attempts
    (gh#grpc/grpc#31550).
  * Remove enum and future (gh#grpc/grpc#31381).
  * [Remove Six] Remove dependency on six (gh#grpc/grpc#31340).
  * Update xds-protos package to pull in protobuf 4.X
    (gh#grpc/grpc#31113).

- Update to version 1.50.0:
  * Support Python 3.11. [gh#grpc/grpc#30818].

- Update to version 1.49.1
  * Support Python 3.11. (#30818)
  * Add type stub generation support to grpcio-tools. (#30498)

- Update to version 1.48.0:
  * [Aio] Ensure Core channel closes when deallocated
    [gh#grpc/grpc#29797].
  * [Aio] Fix the wait_for_termination return value
    [gh#grpc/grpc#29795].

- update to 1.46.3:
  * backport: xds: use federation env var to guard new-style resource name parsing
  * This release contains refinements, improvements, and bug fixes. 

- Update to version 1.46.0:
  * Add Python GCF Distribtest [gh#grpc/grpc#29303].
  * Add Python Reflection Client [gh#grpc/grpc#29085].
  * Revert 'Fix prefork handler register's default behavior'
    [gh#grpc/grpc#29229].
  * Fix prefork handler register's default behavior
    [gh#grpc/grpc#29103].
  * Fix fetching CXX variable in setup.py [gh#grpc/grpc#28873].

- Update to version 1.45.0:
  * Reimplement Gevent Integration [gh#grpc/grpc#28276].
  * Support musllinux binary wheels on x64 and x86
    [gh#grpc/grpc#28092].
  * Increase the Python protobuf requirement to &gt;=3.12.0
    [gh#grpc/grpc#28604].
- Build with system re2; add BuildRequires: pkgconfig(re2).

- Update to version 1.44.0:

  * Add python async example for hellostreamingworld using
    generator (gh#grpc/grpc#27343).
  * Disable __wrap_memcpy hack for Python builds
    (gh#grpc/grpc#28410).
  * Bump Bazel Python Cython dependency to 0.29.26
    (gh#grpc/grpc#28398).
  * Fix libatomic linking on Raspberry Pi OS Bullseye
    (gh#grpc/grpc#28041).
  * Allow generated proto sources in remote repositories for
    py_proto_library (gh#grpc/grpc#28103).

- Update to version 1.43.0:
  * [Aio] Validate the input type for set_trailing_metadata and
    abort (gh#grpc/grpc#27958).

- update to 1.41.1:
  * This is release 1.41.0 (goat) of gRPC Core. 

- Update to version 1.41.0:
  * Add Python 3.10 support and drop 3.5 (gh#grpc/grpc#26074).
  * [Aio] Remove custom IO manager support (gh#grpc/grpc#27090).

- Update to version 1.39.0:
  * Python AIO: Match continuation typing on Interceptors
    (gh#grpc/grpc#26500).
  * Workaround #26279 by publishing manylinux_2_24 wheels instead
    of manylinux2014 on aarch64 (gh#grpc/grpc#26430).
  * Fix zlib unistd.h import problem (gh#grpc/grpc#26374).
  * Handle gevent exception in gevent poller (gh#grpc/grpc#26058).

- Update to version 1.38.1:
  * Backport gh#grpc/grpc#26430 and gh#grpc/grpc#26435 to v1.38.x
    (gh#grpc/grpc#26436).

- Update to version 1.38.0:
  * Add grpcio-admin Python package (gh#grpc/grpc#26166).
  * Add CSDS API to Python (gh#grpc/grpc#26114).
  * Expose code and details from context on the server side
    (gh#grpc/grpc#25457).
  * Explicitly import importlib.abc; required on Python 3.10.
    Fixes #26062 (gh#grpc/grpc#26083).
  * Fix potential deadlock on the GIL in AuthMetdataPlugin
    (gh#grpc/grpc#26009).
  * Introduce new Python package 'xds_protos'
    (gh#grpc/grpc#25975).
  * Remove async mark for set_trailing_metadata interface
    (gh#grpc/grpc#25814).

- Update to version 1.37.1:
  * No user visible changes.
- Changes from version 1.37.0:
  * Clarify Guarantees about grpc.Future Interface
    (gh#grpc/grpc#25383).
  * [Aio] Add time_remaining method to ServicerContext
    (gh#grpc/grpc#25719).
  * Standardize all environment variable boolean configuration in
    python's setup.py (gh#grpc/grpc#25444).
  * Fix Signal Safety Issue (gh#grpc/grpc#25394).

- Update to version 1.36.1:
  * Core: back-port: add env var protection for google-c2p
    resolver (gh#grpc/grpc#25569).

- Update to version 1.35.0:
  * Implement Python Client and Server xDS Creds.
    (gh#grpc/grpc#25365)
  * Add %define _lto_cflags %{nil} (bsc#1182659) (rh#1893533)
  * Link roots.pem to ca-bundle.pem from ca-certificates package

- Update to version 1.34.1:
  * Backport 'Lazily import grpc_tools when using runtime
    stub/message generation' to 1.34.x (gh#grpc/grpc#25011).

- Update to version 1.34.0:
  * Incur setuptools as an dependency for grpcio_tools
    (gh#grpc/grpc#24752).
  * Stop the spamming log generated by ctrl-c for AsyncIO server
    (gh#grpc/grpc#24718).
  * [gRPC Easy] Make Well-Known Types Available to Runtime Protos
    (gh#grpc/grpc#24478).
  * Bump MACOSX_DEPLOYMENT_TARGET to 10.10 for Python
    (gh#grpc/grpc#24480).
  * Make Python 2 an optional dependency for Bazel build
    (gh#grpc/grpc#24407).
  * [Linux] [macOS] Support pre-compiled Python 3.9 wheels
    (gh#grpc/grpc#24356).

- Update to version 1.33.2:

  * [Backport] Implement grpc.Future interface in
    SingleThreadedRendezvous (gh#grpc/grpc#24574).

- Update to version 1.33.1:

  * [Backport] Make Python 2 an optional dependency for Bazel
    build (gh#grpc/grpc#24452).
  * Allow asyncio API to be imported as grpc.aio.
    (gh#grpc/grpc#24289).
  * [gRPC Easy] Fix import errors on Windows (gh#grpc/grpc#24124).
  * Make version check for importlib.abc in grpcio-tools more
    stringent (gh#grpc/grpc#24098).

Added re2 package in version 2024-02-01.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-21"/>
	<updated date="2024-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1133277">SUSE bug 1133277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182659">SUSE bug 1182659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203378">SUSE bug 1203378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208794">SUSE bug 1208794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212180">SUSE bug 1212180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212182">SUSE bug 1212182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214148">SUSE bug 1214148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215334">SUSE bug 1215334</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32731/">CVE-2023-32731 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32731">CVE-2023-32731 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-32732/">CVE-2023-32732 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32732">CVE-2023-32732 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-33953/">CVE-2023-33953 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33953">CVE-2023-33953 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4785/">CVE-2023-4785 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4785">CVE-2023-4785 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848273" comment="abseil-cpp-devel-20230802.1-150400.10.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848274" comment="grpc-devel-1.60.0-150400.8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848275" comment="grpc-source-1.60.0-150400.8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848276" comment="libabsl2308_0_0-20230802.1-150400.10.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848277" comment="libabsl2308_0_0-32bit-20230802.1-150400.10.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848278" comment="libgrpc++1_60-1.60.0-150400.8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848279" comment="libgrpc1_60-1.60.0-150400.8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848280" comment="libgrpc37-1.60.0-150400.8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848281" comment="libprotobuf-lite25_1_0-25.1-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848282" comment="libprotobuf-lite25_1_0-32bit-25.1-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848283" comment="libprotobuf25_1_0-25.1-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848284" comment="libprotobuf25_1_0-32bit-25.1-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848285" comment="libprotoc25_1_0-25.1-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848286" comment="libprotoc25_1_0-32bit-25.1-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848287" comment="libre2-11-20240201-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848288" comment="libre2-11-32bit-20240201-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848289" comment="libupb37-1.60.0-150400.8.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848290" comment="opencensus-proto-source-0.3.0+git.20200721-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848291" comment="protobuf-devel-25.1-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848292" comment="protobuf-java-25.1-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848293" comment="python311-abseil-1.4.0-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848294" comment="python311-grpcio-1.60.0-150400.9.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848295" comment="python311-protobuf-4.25.1-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848296" comment="re2-devel-20240201-150400.9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848297" comment="upb-devel-1.60.0-150400.8.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5198" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219823" ref_url="https://bugzilla.suse.com/1219823" source="BUGZILLA"/>
		<reference ref_id="1219826" ref_url="https://bugzilla.suse.com/1219826" source="BUGZILLA"/>
		<reference ref_id="1219851" ref_url="https://bugzilla.suse.com/1219851" source="BUGZILLA"/>
		<reference ref_id="1219852" ref_url="https://bugzilla.suse.com/1219852" source="BUGZILLA"/>
		<reference ref_id="1219853" ref_url="https://bugzilla.suse.com/1219853" source="BUGZILLA"/>
		<reference ref_id="1219854" ref_url="https://bugzilla.suse.com/1219854" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-4408" ref_url="https://www.suse.com/security/cve/CVE-2023-4408/" source="CVE"/>
		<reference ref_id="CVE-2023-50387" ref_url="https://www.suse.com/security/cve/CVE-2023-50387/" source="CVE"/>
		<reference ref_id="CVE-2023-50868" ref_url="https://www.suse.com/security/cve/CVE-2023-50868/" source="CVE"/>
		<reference ref_id="CVE-2023-5517" ref_url="https://www.suse.com/security/cve/CVE-2023-5517/" source="CVE"/>
		<reference ref_id="CVE-2023-5679" ref_url="https://www.suse.com/security/cve/CVE-2023-5679/" source="CVE"/>
		<reference ref_id="CVE-2023-6516" ref_url="https://www.suse.com/security/cve/CVE-2023-6516/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017984.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

Update to release 9.16.48:

- CVE-2023-50387: Fixed a denial-of-service caused by DNS messages containing a lot of DNSSEC signatures (bsc#1219823).
- CVE-2023-50868: Fixed a denial-of-service caused by NSEC3 closest encloser proof (bsc#1219826).
- CVE-2023-4408: Fixed a denial-of-service caused by DNS messages with many different names (bsc#1219851).
- CVE-2023-5517: Fixed a possible crash when nxdomain-redirect was enabled (bsc#1219852).
- CVE-2023-5679: Fixed a possible crash when bad interaction between DNS64 and serve-stale, when both of these features are enabled (bsc#1219853).
- CVE-2023-6516: Fixed excessive memory consumption when continuously trigger the cache database maintenance (bsc#1219854).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-21"/>
	<updated date="2024-02-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219823">SUSE bug 1219823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219826">SUSE bug 1219826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219851">SUSE bug 1219851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219852">SUSE bug 1219852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219853">SUSE bug 1219853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219854">SUSE bug 1219854</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4408/">CVE-2023-4408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4408">CVE-2023-4408 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50387/">CVE-2023-50387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50868/">CVE-2023-50868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5517/">CVE-2023-5517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5517">CVE-2023-5517 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5679/">CVE-2023-5679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5679">CVE-2023-5679 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6516/">CVE-2023-6516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6516">CVE-2023-6516 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848298" comment="bind-9.16.48-150500.8.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848299" comment="bind-doc-9.16.48-150500.8.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848300" comment="bind-utils-9.16.48-150500.8.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848301" comment="python3-bind-9.16.48-150500.8.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5199" version="1" class="patch">
	<metadata>
		<title>Security update for python-aiohttp, python-time-machine (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217174" ref_url="https://bugzilla.suse.com/1217174" source="BUGZILLA"/>
		<reference ref_id="1217181" ref_url="https://bugzilla.suse.com/1217181" source="BUGZILLA"/>
		<reference ref_id="1217782" ref_url="https://bugzilla.suse.com/1217782" source="BUGZILLA"/>
		<reference ref_id="1219341" ref_url="https://bugzilla.suse.com/1219341" source="BUGZILLA"/>
		<reference ref_id="1219342" ref_url="https://bugzilla.suse.com/1219342" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-47627" ref_url="https://www.suse.com/security/cve/CVE-2023-47627/" source="CVE"/>
		<reference ref_id="CVE-2023-47641" ref_url="https://www.suse.com/security/cve/CVE-2023-47641/" source="CVE"/>
		<reference ref_id="CVE-2024-23334" ref_url="https://www.suse.com/security/cve/CVE-2024-23334/" source="CVE"/>
		<reference ref_id="CVE-2024-23829" ref_url="https://www.suse.com/security/cve/CVE-2024-23829/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017982.html" source="SUSE-SU"/>
		<description>
This update for python-aiohttp, python-time-machine fixes the following issues:

python-aiohttp was updated to version 3.9.3:

* Fixed backwards compatibility breakage (in 3.9.2) of ``ssl`` parameter
  when set outside of ``ClientSession`` (e.g. directly in ``TCPConnector``)
* Improved test suite handling of paths and temp files to consistently
  use pathlib and pytest fixtures.

From version 3.9.2 (bsc#1219341, CVE-2024-23334, bsc#1219342, CVE-2024-23829):

* Fixed server-side websocket connection leak.
* Fixed ``web.FileResponse`` doing blocking I/O in the event loop.
* Fixed double compress when compression enabled and compressed file
  exists in server file responses.
* Added runtime type check for ``ClientSession`` ``timeout`` parameter.
* Fixed an unhandled exception in the Python HTTP parser on header lines
  starting with a colon.
* Improved validation of paths for static resources requests to the server.
* Added support for passing :py:data:`True` to ``ssl`` parameter in
  ``ClientSession`` while deprecating :py:data:`None`.
* Fixed an unhandled exception in the Python HTTP parser on header lines
  starting with a colon.
* Fixed examples of ``fallback_charset_resolver`` function in the
  :doc:`client_advanced` document.
* The Sphinx setup was updated to avoid showing the empty
  changelog draft section in the tagged release documentation
  builds on Read The Docs.
* The changelog categorization was made clearer. The contributors can
  now mark their fragment files more accurately.
* Updated :ref:`contributing/Tests coverage &lt;aiohttp-contributing&gt;`
  section to show how we use ``codecov``.
* Replaced all ``tmpdir`` fixtures with ``tmp_path`` in test suite.

- Disable broken tests with openssl 3.2 and python &lt; 3.11 bsc#1217782

update to 3.9.1:

* Fixed importing aiohttp under PyPy on Windows.
* Fixed async concurrency safety in websocket compressor.
* Fixed ``ClientResponse.close()`` releasing the connection
  instead of closing.
* Fixed a regression where connection may get closed during
  upgrade. -- by :user:`Dreamsorcerer`
* Fixed messages being reported as upgraded without an Upgrade
  header in Python parser. -- by :user:`Dreamsorcerer`

update to 3.9.0: (bsc#1217684, CVE-2023-49081, bsc#1217682, CVE-2023-49082)

* Introduced ``AppKey`` for static typing support of
  ``Application`` storage.
* Added a graceful shutdown period which allows pending tasks
  to complete before the application's cleanup is called.
* Added `handler_cancellation`_ parameter to cancel web handler on
  client disconnection.
* This (optionally) reintroduces a feature removed in a
  previous release.
* Recommended for those looking for an extra level of
  protection against denial-of-service attacks.
* Added support for setting response header parameters
  ``max_line_size`` and ``max_field_size``.
* Added ``auto_decompress`` parameter to
  ``ClientSession.request`` to override
  ``ClientSession._auto_decompress``.
* Changed ``raise_for_status`` to allow a coroutine.
* Added client brotli compression support (optional with
  runtime check).
* Added ``client_max_size`` to ``BaseRequest.clone()`` to allow
  overriding the request body size. -- :user:`anesabml`.
* Added a middleware type alias
  ``aiohttp.typedefs.Middleware``.
* Exported ``HTTPMove`` which can be used to catch any
  redirection request that has a location -- :user:`dreamsorcerer`.
* Changed the ``path`` parameter in ``web.run_app()`` to accept
  a ``pathlib.Path`` object.
* Performance: Skipped filtering ``CookieJar`` when the jar is
  empty or all cookies have expired.
* Performance: Only check origin if insecure scheme and there
  are origins to treat as secure, in
  ``CookieJar.filter_cookies()``.
* Performance: Used timestamp instead of ``datetime`` to
  achieve faster cookie expiration in ``CookieJar``.
* Added support for passing a custom server name parameter to
  HTTPS connection.
* Added support for using Basic Auth credentials from
  :file:`.netrc` file when making HTTP requests with the
* :py:class:`~aiohttp.ClientSession` ``trust_env`` argument is
  set to ``True``. -- by :user:`yuvipanda`.
* Turned access log into no-op when the logger is disabled.
* Added typing information to ``RawResponseMessage``. -- by
  :user:`Gobot1234`
* Removed ``async-timeout`` for Python 3.11+ (replaced with
  ``asyncio.timeout()`` on newer releases).
* Added support for ``brotlicffi`` as an alternative to
  ``brotli`` (fixing Brotli support on PyPy).
* Added ``WebSocketResponse.get_extra_info()`` to access a
  protocol transport's extra info.
* Allow ``link`` argument to be set to None/empty in HTTP 451
  exception.
* Fixed client timeout not working when incoming data is always
  available without waiting. -- by :user:`Dreamsorcerer`.
* Fixed ``readuntil`` to work with a delimiter of more than one
  character.
* Added ``__repr__`` to ``EmptyStreamReader`` to avoid
  ``AttributeError``.
* Fixed bug when using ``TCPConnector`` with
  ``ttl_dns_cache=0``.
* Fixed response returned from expect handler being thrown
  away. -- by :user:`Dreamsorcerer`
* Avoided raising ``UnicodeDecodeError`` in multipart and in
  HTTP headers parsing.
* Changed ``sock_read`` timeout to start after writing has
  finished, avoiding read timeouts caused by an unfinished
  write. -- by :user:`dtrifiro`
* Fixed missing query in tracing method URLs when using
  ``yarl`` 1.9+.
* Changed max 32-bit timestamp to an aware datetime object, for
  consistency with the non-32-bit one, and to avoid a
  ``DeprecationWarning`` on Python 3.12.
* Fixed ``EmptyStreamReader.iter_chunks()`` never ending.
* Fixed a rare ``RuntimeError: await wasn't used with future``
  exception.
* Fixed issue with insufficient HTTP method and version
  validation.
* Added check to validate that absolute URIs have schemes.
* Fixed unhandled exception when Python HTTP parser encounters
  unpaired Unicode surrogates.
* Updated parser to disallow invalid characters in header field
  names and stop accepting LF as a request line separator.
* Fixed Python HTTP parser not treating 204/304/1xx as an empty
  body.
* Ensure empty body response for 1xx/204/304 per RFC 9112 sec
  6.3.
* Fixed an issue when a client request is closed before
  completing a chunked payload. -- by :user:`Dreamsorcerer`
* Edge Case Handling for ResponseParser for missing reason
  value.
* Fixed ``ClientWebSocketResponse.close_code`` being
  erroneously set to ``None`` when there are concurrent async
  tasks receiving data and closing the connection.
* Added HTTP method validation.
* Fixed arbitrary sequence types being allowed to inject values
  via version parameter. -- by :user:`Dreamsorcerer`
* Performance: Fixed increase in latency with small messages
  from websocket compression changes.
* Improved Documentation
* Fixed the `ClientResponse.release`'s type in the doc. Changed
  from `comethod` to `method`.
* Added information on behavior of base_url parameter in
  `ClientSession`.
* Completed ``trust_env`` parameter description to honor
  ``wss_proxy``, ``ws_proxy`` or ``no_proxy`` env.
* Dropped Python 3.6 support.
* Dropped Python 3.7 support. -- by :user:`Dreamsorcerer`
* Removed support for abandoned ``tokio`` event loop.
* Made ``print`` argument in ``run_app()`` optional.
* Improved performance of ``ceil_timeout`` in some cases.
* Changed importing Gunicorn to happen on-demand, decreasing
  import time by ~53%. -- :user:`Dreamsorcerer`
* Improved import time by replacing ``http.server`` with
  ``http.HTTPStatus``.
* Fixed annotation of ``ssl`` parameter to disallow ``True``.

update to 3.8.6 (bsc#1217181, CVE-2023-47627):

* Security bugfixes
* https://github.com/aio-libs/aiohttp/security/advisories/GHSA-
  pjjw-qhg8-p2p9.
* https://github.com/aio-libs/aiohttp/security/advisories/GHSA-
  gfw2-4jvh-wgfg.
* Added ``fallback_charset_resolver`` parameter in
  ``ClientSession`` to allow a user-supplied
  character set detection function.
  Character set detection will no longer be included in 3.9 as
  a default. If this feature is needed,
  please use `fallback_charset_resolver
  the client
* Fixed ``PermissionError`` when ``.netrc`` is unreadable due
  to permissions.
* Fixed output of parsing errors
* Fixed sorting in ``filter_cookies`` to use cookie with
  longest path.

Release 3.8.0 (2021-10-31) (bsc#1217174, CVE-2023-47641)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-21"/>
	<updated date="2024-02-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217174">SUSE bug 1217174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217181">SUSE bug 1217181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217782">SUSE bug 1217782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219341">SUSE bug 1219341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219342">SUSE bug 1219342</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-47627/">CVE-2023-47627 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47627">CVE-2023-47627 at NVD</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-47641/">CVE-2023-47641 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47641">CVE-2023-47641 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23334/">CVE-2024-23334 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23334">CVE-2024-23334 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-23829/">CVE-2024-23829 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23829">CVE-2024-23829 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848302" comment="python311-aiohttp-3.9.3-150400.10.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5200" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218504" ref_url="https://bugzilla.suse.com/1218504" source="BUGZILLA"/>
		<reference ref_id="1218505" ref_url="https://bugzilla.suse.com/1218505" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0208" ref_url="https://www.suse.com/security/cve/CVE-2024-0208/" source="CVE"/>
		<reference ref_id="CVE-2024-0209" ref_url="https://www.suse.com/security/cve/CVE-2024-0209/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017595.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

- Updated to Wireshark 3.6.20:

  - CVE-2024-0208: Fixed a crash in the GVCP dissector (bsc#1218504).
  - CVE-2024-0209: Fixed a crash in the IEEE 1609.2 dissector (bsc#1218505).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-08"/>
	<updated date="2024-01-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218504">SUSE bug 1218504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218505">SUSE bug 1218505</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0208/">CVE-2024-0208 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0208">CVE-2024-0208 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0209/">CVE-2024-0209 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0209">CVE-2024-0209 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009818576" comment="libwireshark15-3.6.20-150000.3.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818577" comment="libwiretap12-3.6.20-150000.3.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818578" comment="libwsutil13-3.6.20-150000.3.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818579" comment="wireshark-3.6.20-150000.3.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818580" comment="wireshark-devel-3.6.20-150000.3.109.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818581" comment="wireshark-ui-qt-3.6.20-150000.3.109.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5201" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210638" ref_url="https://bugzilla.suse.com/1210638" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017987.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2023-27043: Fixed incorrectly parses e-mail addresses which contain a special character (bsc#1210638).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-21"/>
	<updated date="2024-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1210638">SUSE bug 1210638</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848303" comment="libpython3_6m1_0-3.6.15-150300.10.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848304" comment="libpython3_6m1_0-32bit-3.6.15-150300.10.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848305" comment="python3-3.6.15-150300.10.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848306" comment="python3-base-3.6.15-150300.10.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848307" comment="python3-curses-3.6.15-150300.10.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848308" comment="python3-dbm-3.6.15-150300.10.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848309" comment="python3-devel-3.6.15-150300.10.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848310" comment="python3-doc-3.6.15-150300.10.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848311" comment="python3-doc-devhelp-3.6.15-150300.10.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848312" comment="python3-idle-3.6.15-150300.10.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848313" comment="python3-testsuite-3.6.15-150300.10.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848314" comment="python3-tk-3.6.15-150300.10.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848315" comment="python3-tools-3.6.15-150300.10.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5202" version="1" class="patch">
	<metadata>
		<title>Security update for docker (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219267" ref_url="https://bugzilla.suse.com/1219267" source="BUGZILLA"/>
		<reference ref_id="1219268" ref_url="https://bugzilla.suse.com/1219268" source="BUGZILLA"/>
		<reference ref_id="1219438" ref_url="https://bugzilla.suse.com/1219438" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-23651" ref_url="https://www.suse.com/security/cve/CVE-2024-23651/" source="CVE"/>
		<reference ref_id="CVE-2024-23652" ref_url="https://www.suse.com/security/cve/CVE-2024-23652/" source="CVE"/>
		<reference ref_id="CVE-2024-23653" ref_url="https://www.suse.com/security/cve/CVE-2024-23653/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017990.html" source="SUSE-SU"/>
		<description>
This update for docker fixes the following issues:

Vendor latest buildkit v0.11 including bugfixes for the following:

* CVE-2024-23653: BuildKit API doesn't validate entitlement on container creation (bsc#1219438).
* CVE-2024-23652: Fixed arbitrary deletion of files (bsc#1219268).
* CVE-2024-23651: Fixed race condition in mount (bsc#1219267).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2024-02-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219267">SUSE bug 1219267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219268">SUSE bug 1219268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219438">SUSE bug 1219438</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23651/">CVE-2024-23651 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23651">CVE-2024-23651 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23652/">CVE-2024-23652 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23652">CVE-2024-23652 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23653/">CVE-2024-23653 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23653">CVE-2024-23653 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848579" comment="docker-24.0.7_ce-150000.193.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848580" comment="docker-bash-completion-24.0.7_ce-150000.193.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848581" comment="docker-fish-completion-24.0.7_ce-150000.193.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848582" comment="docker-rootless-extras-24.0.7_ce-150000.193.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848583" comment="docker-zsh-completion-24.0.7_ce-150000.193.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5203" version="1" class="patch">
	<metadata>
		<title>Security update for python-uamqp (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219867" ref_url="https://bugzilla.suse.com/1219867" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-25110" ref_url="https://www.suse.com/security/cve/CVE-2024-25110/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017995.html" source="SUSE-SU"/>
		<description>
This update for python-uamqp fixes the following issues:

- CVE-2024-25110: Fixed a use-after-free in open_get_offered_capabilities() (bsc#1219867).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2024-02-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219867">SUSE bug 1219867</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25110/">CVE-2024-25110 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25110">CVE-2024-25110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848584" comment="python3-uamqp-1.5.3-150100.4.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5204" version="1" class="patch">
	<metadata>
		<title>Security update for php-composer2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219757" ref_url="https://bugzilla.suse.com/1219757" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-24821" ref_url="https://www.suse.com/security/cve/CVE-2024-24821/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017994.html" source="SUSE-SU"/>
		<description>
This update for php-composer2 fixes the following issues:

- CVE-2024-24821: Fixed potential arbitrary code execution when Composer is invoked within a directory with tampered files (bsc#1219757).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2024-02-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219757">SUSE bug 1219757</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-24821/">CVE-2024-24821 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24821">CVE-2024-24821 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848585" comment="php-composer2-2.2.3-150400.3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5205" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219213" ref_url="https://bugzilla.suse.com/1219213" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-52356" ref_url="https://www.suse.com/security/cve/CVE-2023-52356/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017992.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2023-52356: Fixed segfault in TIFFReadRGBATileExt() (bsc#1219213).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2024-02-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219213">SUSE bug 1219213</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52356/">CVE-2023-52356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52356">CVE-2023-52356 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848586" comment="libtiff-devel-4.0.9-150000.45.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848587" comment="libtiff-devel-32bit-4.0.9-150000.45.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848588" comment="libtiff5-4.0.9-150000.45.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848589" comment="libtiff5-32bit-4.0.9-150000.45.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848590" comment="tiff-4.0.9-150000.45.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5206" version="1" class="patch">
	<metadata>
		<title>Security update for python310 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1210638" ref_url="https://bugzilla.suse.com/1210638" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0595-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034358.html" source="SUSE-SU"/>
		<description>
This update for python310 fixes the following issues:

- CVE-2023-27043: Fixed incorrectly parser of e-mail addresses which contain a special character (bsc#1210638).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2024-02-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1210638">SUSE bug 1210638</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848591" comment="libpython3_10-1_0-3.10.13-150400.4.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848592" comment="libpython3_10-1_0-32bit-3.10.13-150400.4.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848593" comment="python310-3.10.13-150400.4.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848594" comment="python310-32bit-3.10.13-150400.4.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848595" comment="python310-base-3.10.13-150400.4.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848596" comment="python310-base-32bit-3.10.13-150400.4.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848597" comment="python310-curses-3.10.13-150400.4.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848598" comment="python310-dbm-3.10.13-150400.4.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848599" comment="python310-devel-3.10.13-150400.4.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848600" comment="python310-doc-3.10.13-150400.4.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848601" comment="python310-doc-devhelp-3.10.13-150400.4.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848602" comment="python310-idle-3.10.13-150400.4.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848603" comment="python310-testsuite-3.10.13-150400.4.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848604" comment="python310-tk-3.10.13-150400.4.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848605" comment="python310-tools-3.10.13-150400.4.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5207" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218215" ref_url="https://bugzilla.suse.com/1218215" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-51385" ref_url="https://www.suse.com/security/cve/CVE-2023-51385/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017998.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2023-51385: Limit the use of shell metacharacters in host- and
  user names to avoid command injection. (bsc#1218215)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2024-02-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218215">SUSE bug 1218215</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-51385/">CVE-2023-51385 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51385">CVE-2023-51385 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848606" comment="openssh-8.4p1-150300.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848607" comment="openssh-askpass-gnome-8.4p1-150300.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848608" comment="openssh-cavs-8.4p1-150300.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848609" comment="openssh-clients-8.4p1-150300.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848610" comment="openssh-common-8.4p1-150300.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848611" comment="openssh-fips-8.4p1-150300.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848612" comment="openssh-helpers-8.4p1-150300.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848613" comment="openssh-server-8.4p1-150300.3.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5208" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1216198" ref_url="https://bugzilla.suse.com/1216198" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-5388" ref_url="https://www.suse.com/security/cve/CVE-2023-5388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017997.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Update to NSS 3.90.2:

- CVE-2023-5388: Fixed timing attack against RSA decryption in TLS (bsc#1216198)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2024-02-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1216198">SUSE bug 1216198</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5388/">CVE-2023-5388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5388">CVE-2023-5388 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848614" comment="libfreebl3-3.90.2-150400.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848615" comment="libfreebl3-32bit-3.90.2-150400.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848616" comment="libsoftokn3-3.90.2-150400.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848617" comment="libsoftokn3-32bit-3.90.2-150400.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848618" comment="mozilla-nss-3.90.2-150400.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848619" comment="mozilla-nss-32bit-3.90.2-150400.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848620" comment="mozilla-nss-certs-3.90.2-150400.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848621" comment="mozilla-nss-certs-32bit-3.90.2-150400.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848622" comment="mozilla-nss-devel-3.90.2-150400.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848623" comment="mozilla-nss-sysinit-3.90.2-150400.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848624" comment="mozilla-nss-sysinit-32bit-3.90.2-150400.3.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848625" comment="mozilla-nss-tools-3.90.2-150400.3.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5209" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218127" ref_url="https://bugzilla.suse.com/1218127" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017579.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

- CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity (Terrapin Attack) (bsc#1218127).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-02"/>
	<updated date="2024-01-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218127">SUSE bug 1218127</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009817534" comment="libssh2-1-1.11.0-150000.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817535" comment="libssh2-1-32bit-1.11.0-150000.4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009817536" comment="libssh2-devel-1.11.0-150000.4.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5210" version="1" class="patch">
	<metadata>
		<title>Security update for python-pycryptodome (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218564" ref_url="https://bugzilla.suse.com/1218564" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-52323" ref_url="https://www.suse.com/security/cve/CVE-2023-52323/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018003.html" source="SUSE-SU"/>
		<description>
This update for python-pycryptodome fixes the following issues:

- CVE-2023-52323: Fixed side-channel leakage in RSA decryption by using constant-time (faster) padding decoding for OAEP (bsc#1218564).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-23"/>
	<updated date="2024-02-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218564">SUSE bug 1218564</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52323/">CVE-2023-52323 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52323">CVE-2023-52323 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848772" comment="python3-pycryptodome-3.9.0-150200.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5211" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1184272" ref_url="https://bugzilla.suse.com/1184272" source="BUGZILLA"/>
		<reference ref_id="1220048" ref_url="https://bugzilla.suse.com/1220048" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-1546" ref_url="https://www.suse.com/security/cve/CVE-2024-1546/" source="CVE"/>
		<reference ref_id="CVE-2024-1547" ref_url="https://www.suse.com/security/cve/CVE-2024-1547/" source="CVE"/>
		<reference ref_id="CVE-2024-1548" ref_url="https://www.suse.com/security/cve/CVE-2024-1548/" source="CVE"/>
		<reference ref_id="CVE-2024-1549" ref_url="https://www.suse.com/security/cve/CVE-2024-1549/" source="CVE"/>
		<reference ref_id="CVE-2024-1550" ref_url="https://www.suse.com/security/cve/CVE-2024-1550/" source="CVE"/>
		<reference ref_id="CVE-2024-1551" ref_url="https://www.suse.com/security/cve/CVE-2024-1551/" source="CVE"/>
		<reference ref_id="CVE-2024-1552" ref_url="https://www.suse.com/security/cve/CVE-2024-1552/" source="CVE"/>
		<reference ref_id="CVE-2024-1553" ref_url="https://www.suse.com/security/cve/CVE-2024-1553/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018006.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 115.8.0 ESR (MFSA 2024-06) (bsc#1220048):

- CVE-2024-1546: Out-of-bounds memory read in networking channels
- CVE-2024-1547: Alert dialog could have been spoofed on another site
- CVE-2024-1548: Fullscreen Notification could have been hidden by select element
- CVE-2024-1549: Custom cursor could obscure the permission dialog
- CVE-2024-1550: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants
- CVE-2024-1551: Multipart HTTP Responses would accept the Set-Cookie header in response parts
- CVE-2024-1552: Incorrect code generation on 32-bit ARM devices
- CVE-2024-1553: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8

- Recommend libfido2-udev on codestreams that exist, in order to try
  to get security keys (e.g. Yubikeys) work out of the box. (bsc#1184272)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-23"/>
	<updated date="2024-02-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184272">SUSE bug 1184272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220048">SUSE bug 1220048</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1546/">CVE-2024-1546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1546">CVE-2024-1546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1547/">CVE-2024-1547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1547">CVE-2024-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1548/">CVE-2024-1548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1548">CVE-2024-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1549/">CVE-2024-1549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1549">CVE-2024-1549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1550/">CVE-2024-1550 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1550">CVE-2024-1550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1551/">CVE-2024-1551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1551">CVE-2024-1551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1552/">CVE-2024-1552 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1552">CVE-2024-1552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1553/">CVE-2024-1553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1553">CVE-2024-1553 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848773" comment="MozillaFirefox-115.8.0-150200.152.126.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848774" comment="MozillaFirefox-branding-upstream-115.8.0-150200.152.126.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848775" comment="MozillaFirefox-devel-115.8.0-150200.152.126.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848776" comment="MozillaFirefox-translations-common-115.8.0-150200.152.126.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848777" comment="MozillaFirefox-translations-other-115.8.0-150200.152.126.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5212" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220048" ref_url="https://bugzilla.suse.com/1220048" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-1546" ref_url="https://www.suse.com/security/cve/CVE-2024-1546/" source="CVE"/>
		<reference ref_id="CVE-2024-1547" ref_url="https://www.suse.com/security/cve/CVE-2024-1547/" source="CVE"/>
		<reference ref_id="CVE-2024-1548" ref_url="https://www.suse.com/security/cve/CVE-2024-1548/" source="CVE"/>
		<reference ref_id="CVE-2024-1549" ref_url="https://www.suse.com/security/cve/CVE-2024-1549/" source="CVE"/>
		<reference ref_id="CVE-2024-1550" ref_url="https://www.suse.com/security/cve/CVE-2024-1550/" source="CVE"/>
		<reference ref_id="CVE-2024-1551" ref_url="https://www.suse.com/security/cve/CVE-2024-1551/" source="CVE"/>
		<reference ref_id="CVE-2024-1552" ref_url="https://www.suse.com/security/cve/CVE-2024-1552/" source="CVE"/>
		<reference ref_id="CVE-2024-1553" ref_url="https://www.suse.com/security/cve/CVE-2024-1553/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018005.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Mozilla Thunderbird 115.8 (bsc#1220048):

- CVE-2024-1546: Out-of-bounds memory read in networking channels
- CVE-2024-1547: Alert dialog could have been spoofed on another site
- CVE-2024-1548: Fullscreen Notification could have been hidden by select element
- CVE-2024-1549: Custom cursor could obscure the permission dialog
- CVE-2024-1550: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants
- CVE-2024-1551: Multipart HTTP Responses would accept the Set-Cookie header in response parts
- CVE-2024-1552: Incorrect code generation on 32-bit ARM devices
- CVE-2024-1553: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-23"/>
	<updated date="2024-02-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220048">SUSE bug 1220048</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1546/">CVE-2024-1546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1546">CVE-2024-1546 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1547/">CVE-2024-1547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1547">CVE-2024-1547 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1548/">CVE-2024-1548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1548">CVE-2024-1548 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1549/">CVE-2024-1549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1549">CVE-2024-1549 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1550/">CVE-2024-1550 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1550">CVE-2024-1550 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1551/">CVE-2024-1551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1551">CVE-2024-1551 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1552/">CVE-2024-1552 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1552">CVE-2024-1552 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1553/">CVE-2024-1553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1553">CVE-2024-1553 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848778" comment="MozillaThunderbird-115.8.0-150200.8.148.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848779" comment="MozillaThunderbird-translations-common-115.8.0-150200.8.148.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848780" comment="MozillaThunderbird-translations-other-115.8.0-150200.8.148.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5213" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218903" ref_url="https://bugzilla.suse.com/1218903" source="BUGZILLA"/>
		<reference ref_id="1218905" ref_url="https://bugzilla.suse.com/1218905" source="BUGZILLA"/>
		<reference ref_id="1218906" ref_url="https://bugzilla.suse.com/1218906" source="BUGZILLA"/>
		<reference ref_id="1218907" ref_url="https://bugzilla.suse.com/1218907" source="BUGZILLA"/>
		<reference ref_id="1218908" ref_url="https://bugzilla.suse.com/1218908" source="BUGZILLA"/>
		<reference ref_id="1218909" ref_url="https://bugzilla.suse.com/1218909" source="BUGZILLA"/>
		<reference ref_id="1218911" ref_url="https://bugzilla.suse.com/1218911" source="BUGZILLA"/>
		<reference ref_id="1219843" ref_url="https://bugzilla.suse.com/1219843" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-33850" ref_url="https://www.suse.com/security/cve/CVE-2023-33850/" source="CVE"/>
		<reference ref_id="CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918/" source="CVE"/>
		<reference ref_id="CVE-2024-20919" ref_url="https://www.suse.com/security/cve/CVE-2024-20919/" source="CVE"/>
		<reference ref_id="CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921/" source="CVE"/>
		<reference ref_id="CVE-2024-20926" ref_url="https://www.suse.com/security/cve/CVE-2024-20926/" source="CVE"/>
		<reference ref_id="CVE-2024-20932" ref_url="https://www.suse.com/security/cve/CVE-2024-20932/" source="CVE"/>
		<reference ref_id="CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945/" source="CVE"/>
		<reference ref_id="CVE-2024-20952" ref_url="https://www.suse.com/security/cve/CVE-2024-20952/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018007.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update to Java 8.0 Service Refresh 8 Fix Pack 20: [bsc#1219843]

Security fixes:

- CVE-2023-33850: Fixed information disclosure vulnerability due to the consumed GSKit library (bsc#1219843).
- CVE-2024-20932: Fixed incorrect handling of ZIP files with duplicate entries (bsc#1218908).
- CVE-2024-20952: Fixed RSA padding issue and timing side-channel attack against TLS (bsc#1218911).
- CVE-2024-20918: Fixed array out-of-bounds access due to missing range check in C1 compiler (bsc#1218907).
- CVE-2024-20921: Fixed range check loop optimization issue (bsc#1218905).
- CVE-2024-20919: Fixed JVM class file verifier flaw allows unverified bytecode execution (bsc#1218903).
- CVE-2024-20926: Fixed arbitrary Java code execution in Nashorn (bsc#1218906).
- CVE-2024-20945: Fixed logging of digital signature private keys (bsc#1218909).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-26"/>
	<updated date="2024-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218903">SUSE bug 1218903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218905">SUSE bug 1218905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218906">SUSE bug 1218906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218907">SUSE bug 1218907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218908">SUSE bug 1218908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218909">SUSE bug 1218909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218911">SUSE bug 1218911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219843">SUSE bug 1219843</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2023-33850/">CVE-2023-33850 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33850">CVE-2023-33850 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20919/">CVE-2024-20919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20919">CVE-2024-20919 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20926/">CVE-2024-20926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20926">CVE-2024-20926 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20932/">CVE-2024-20932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20932">CVE-2024-20932 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20952/">CVE-2024-20952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848915" comment="java-1_8_0-ibm-1.8.0_sr8.20-150000.3.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848916" comment="java-1_8_0-ibm-32bit-1.8.0_sr8.20-150000.3.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848917" comment="java-1_8_0-ibm-alsa-1.8.0_sr8.20-150000.3.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848918" comment="java-1_8_0-ibm-demo-1.8.0_sr8.20-150000.3.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848919" comment="java-1_8_0-ibm-devel-1.8.0_sr8.20-150000.3.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848920" comment="java-1_8_0-ibm-devel-32bit-1.8.0_sr8.20-150000.3.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848921" comment="java-1_8_0-ibm-plugin-1.8.0_sr8.20-150000.3.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009848922" comment="java-1_8_0-ibm-src-1.8.0_sr8.20-150000.3.86.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5214" version="1" class="patch">
	<metadata>
		<title>Security update for qt6-base (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218413" ref_url="https://bugzilla.suse.com/1218413" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-51714" ref_url="https://www.suse.com/security/cve/CVE-2023-51714/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0063-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-January/033591.html" source="SUSE-SU"/>
		<description>
This update for qt6-base fixes the following issues:

- CVE-2023-51714: Fixed an incorrect integer overflow check (bsc#1218413).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-08"/>
	<updated date="2024-01-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218413">SUSE bug 1218413</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-51714/">CVE-2023-51714 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51714">CVE-2023-51714 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009818521" comment="libQt6Concurrent6-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818522" comment="libQt6Core6-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818523" comment="libQt6DBus6-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818524" comment="libQt6Gui6-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818525" comment="libQt6Network6-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818526" comment="libQt6OpenGL6-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818527" comment="libQt6OpenGLWidgets6-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818528" comment="libQt6PrintSupport6-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818529" comment="libQt6Sql6-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818530" comment="libQt6Test6-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818531" comment="libQt6Widgets6-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818532" comment="libQt6Xml6-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818533" comment="qt6-base-common-devel-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818534" comment="qt6-base-devel-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818535" comment="qt6-base-docs-html-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818536" comment="qt6-base-docs-qch-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818537" comment="qt6-base-examples-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818538" comment="qt6-base-private-devel-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818539" comment="qt6-concurrent-devel-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818540" comment="qt6-core-devel-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818541" comment="qt6-core-private-devel-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818542" comment="qt6-dbus-devel-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818543" comment="qt6-dbus-private-devel-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818544" comment="qt6-docs-common-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818545" comment="qt6-gui-devel-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818546" comment="qt6-gui-private-devel-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818547" comment="qt6-kmssupport-devel-static-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818548" comment="qt6-kmssupport-private-devel-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818549" comment="qt6-network-devel-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818550" comment="qt6-network-private-devel-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818551" comment="qt6-network-tls-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818552" comment="qt6-networkinformation-glib-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818553" comment="qt6-networkinformation-nm-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818554" comment="qt6-opengl-devel-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818555" comment="qt6-opengl-private-devel-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818556" comment="qt6-openglwidgets-devel-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818557" comment="qt6-platformsupport-devel-static-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818558" comment="qt6-platformsupport-private-devel-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818559" comment="qt6-platformtheme-gtk3-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818560" comment="qt6-platformtheme-xdgdesktopportal-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818561" comment="qt6-printsupport-cups-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818562" comment="qt6-printsupport-devel-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818563" comment="qt6-printsupport-private-devel-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818564" comment="qt6-sql-devel-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818565" comment="qt6-sql-mysql-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818566" comment="qt6-sql-postgresql-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818567" comment="qt6-sql-private-devel-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818568" comment="qt6-sql-sqlite-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818569" comment="qt6-sql-unixODBC-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818570" comment="qt6-test-devel-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818571" comment="qt6-test-private-devel-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818572" comment="qt6-widgets-devel-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818573" comment="qt6-widgets-private-devel-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818574" comment="qt6-xml-devel-6.4.2-150500.3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009818575" comment="qt6-xml-private-devel-6.4.2-150500.3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5215" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218862" ref_url="https://bugzilla.suse.com/1218862" source="BUGZILLA"/>
		<reference ref_id="1218865" ref_url="https://bugzilla.suse.com/1218865" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0553" ref_url="https://www.suse.com/security/cve/CVE-2024-0553/" source="CVE"/>
		<reference ref_id="CVE-2024-0567" ref_url="https://www.suse.com/security/cve/CVE-2024-0567/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018038.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

- CVE-2024-0567: Fixed an incorrect rejection of certificate chains
  with distributed trust (bsc#1218862).
- CVE-2024-0553: Fixed a timing attack against the RSA-PSK key
  exchange, which could lead to the leakage of sensitive data
  (bsc#1218865).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-27"/>
	<updated date="2024-02-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218862">SUSE bug 1218862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218865">SUSE bug 1218865</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-0553/">CVE-2024-0553 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0553">CVE-2024-0553 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0567/">CVE-2024-0567 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0567">CVE-2024-0567 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009848999" comment="gnutls-3.7.3-150400.4.41.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849000" comment="gnutls-guile-3.7.3-150400.4.41.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849001" comment="libgnutls-devel-3.7.3-150400.4.41.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849002" comment="libgnutls-devel-32bit-3.7.3-150400.4.41.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849003" comment="libgnutls30-3.7.3-150400.4.41.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849004" comment="libgnutls30-32bit-3.7.3-150400.4.41.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849005" comment="libgnutls30-hmac-3.7.3-150400.4.41.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849006" comment="libgnutls30-hmac-32bit-3.7.3-150400.4.41.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849007" comment="libgnutlsxx-devel-3.7.3-150400.4.41.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849008" comment="libgnutlsxx28-3.7.3-150400.4.41.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5216" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs20 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219152" ref_url="https://bugzilla.suse.com/1219152" source="BUGZILLA"/>
		<reference ref_id="1219724" ref_url="https://bugzilla.suse.com/1219724" source="BUGZILLA"/>
		<reference ref_id="1219992" ref_url="https://bugzilla.suse.com/1219992" source="BUGZILLA"/>
		<reference ref_id="1219993" ref_url="https://bugzilla.suse.com/1219993" source="BUGZILLA"/>
		<reference ref_id="1219994" ref_url="https://bugzilla.suse.com/1219994" source="BUGZILLA"/>
		<reference ref_id="1219995" ref_url="https://bugzilla.suse.com/1219995" source="BUGZILLA"/>
		<reference ref_id="1219997" ref_url="https://bugzilla.suse.com/1219997" source="BUGZILLA"/>
		<reference ref_id="1219998" ref_url="https://bugzilla.suse.com/1219998" source="BUGZILLA"/>
		<reference ref_id="1219999" ref_url="https://bugzilla.suse.com/1219999" source="BUGZILLA"/>
		<reference ref_id="1220014" ref_url="https://bugzilla.suse.com/1220014" source="BUGZILLA"/>
		<reference ref_id="1220017" ref_url="https://bugzilla.suse.com/1220017" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46809" ref_url="https://www.suse.com/security/cve/CVE-2023-46809/" source="CVE"/>
		<reference ref_id="CVE-2024-21890" ref_url="https://www.suse.com/security/cve/CVE-2024-21890/" source="CVE"/>
		<reference ref_id="CVE-2024-21891" ref_url="https://www.suse.com/security/cve/CVE-2024-21891/" source="CVE"/>
		<reference ref_id="CVE-2024-21892" ref_url="https://www.suse.com/security/cve/CVE-2024-21892/" source="CVE"/>
		<reference ref_id="CVE-2024-21896" ref_url="https://www.suse.com/security/cve/CVE-2024-21896/" source="CVE"/>
		<reference ref_id="CVE-2024-22017" ref_url="https://www.suse.com/security/cve/CVE-2024-22017/" source="CVE"/>
		<reference ref_id="CVE-2024-22019" ref_url="https://www.suse.com/security/cve/CVE-2024-22019/" source="CVE"/>
		<reference ref_id="CVE-2024-22025" ref_url="https://www.suse.com/security/cve/CVE-2024-22025/" source="CVE"/>
		<reference ref_id="CVE-2024-24758" ref_url="https://www.suse.com/security/cve/CVE-2024-24758/" source="CVE"/>
		<reference ref_id="CVE-2024-24806" ref_url="https://www.suse.com/security/cve/CVE-2024-24806/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018059.html" source="SUSE-SU"/>
		<description>
This update for nodejs20 fixes the following issues:

Update to 20.11.1: (security updates)

* CVE-2024-21892: Code injection and privilege escalation through Linux capabilities (bsc#1219992).
* CVE-2024-22019: http: Reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (bsc#1219993).
* CVE-2024-21896: Path traversal by monkey-patching Buffer internals (bsc#1219994).j
* CVE-2024-22017: setuid() does not drop all privileges due to io_uring (bsc#1219995).
* CVE-2023-46809: Node.js is vulnerable to the Marvin Attack (timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding) (bsc#1219997).
* CVE-2024-21891: Multiple permission model bypasses due to improper path traversal sequence sanitization (bsc#1219998).
* CVE-2024-21890: Improper handling of wildcards in --allow-fs-read and --allow-fs-write (bsc#1219999).
* CVE-2024-22025: Denial of Service by resource exhaustion in fetch() brotli decoding (bsc#1220014).
* CVE-2024-24758: undici version 5.28.3 (bsc#1220017).
* CVE-2024-24806: libuv version 1.48.0 (bsc#1219724).

Update to 20.11.0:

* esm: add import.meta.dirname and import.meta.filename
* fs: add c++ fast path for writeFileSync utf8
* module: remove useCustomLoadersIfPresent flag
* module: bootstrap module loaders in shadow realm
* src: add --disable-warning option
* src: create per isolate proxy env template
* src: make process binding data weak
* stream: use Array for Readable buffer
* stream: optimize creation
* test_runner: adds built in lcov reporter
* test_runner: add Date to the supported mock APIs
* test_runner, cli: add --test-timeout flag

Update to 20.10.0:

* --experimental-default-type flag to flip module defaults
* The new flag --experimental-detect-module can be used to automatically run ES modules when their syntax can be detected.
* Added flush option in file system functions for fs.writeFile functions
* Added experimental WebSocket client
* vm: fix V8 compilation cache support for vm.Script. This fixes performance regression since v16.x when support for importModuleDynamically was added to vm.Script
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-02-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219152">SUSE bug 1219152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219724">SUSE bug 1219724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219992">SUSE bug 1219992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219993">SUSE bug 1219993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219994">SUSE bug 1219994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219995">SUSE bug 1219995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219997">SUSE bug 1219997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219998">SUSE bug 1219998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219999">SUSE bug 1219999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220014">SUSE bug 1220014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220017">SUSE bug 1220017</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46809/">CVE-2023-46809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46809">CVE-2023-46809 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21890/">CVE-2024-21890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21890">CVE-2024-21890 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21891/">CVE-2024-21891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21891">CVE-2024-21891 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21892/">CVE-2024-21892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21892">CVE-2024-21892 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21896/">CVE-2024-21896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21896">CVE-2024-21896 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22017/">CVE-2024-22017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22017">CVE-2024-22017 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22019/">CVE-2024-22019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22019">CVE-2024-22019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22025/">CVE-2024-22025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22025">CVE-2024-22025 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-24758/">CVE-2024-24758 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24758">CVE-2024-24758 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-24806/">CVE-2024-24806 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24806">CVE-2024-24806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849070" comment="corepack20-20.11.1-150500.11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849071" comment="nodejs20-20.11.1-150500.11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849072" comment="nodejs20-devel-20.11.1-150500.11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849073" comment="nodejs20-docs-20.11.1-150500.11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849074" comment="npm20-20.11.1-150500.11.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5217" version="1" class="patch">
	<metadata>
		<title>Security update for freerdp (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219049" ref_url="https://bugzilla.suse.com/1219049" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-22211" ref_url="https://www.suse.com/security/cve/CVE-2024-22211/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018056.html" source="SUSE-SU"/>
		<description>
This update for freerdp fixes the following issues:

- CVE-2024-22211: Fixed am integer overflow in freerdp_bitmap_planar_context_reset() (bsc#1219049).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-02-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219049">SUSE bug 1219049</bugzilla>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-22211/">CVE-2024-22211 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22211">CVE-2024-22211 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849206" comment="freerdp-2.4.0-150400.3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849207" comment="freerdp-devel-2.4.0-150400.3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849208" comment="freerdp-proxy-2.4.0-150400.3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849209" comment="freerdp-server-2.4.0-150400.3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849210" comment="freerdp-wayland-2.4.0-150400.3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849211" comment="libfreerdp2-2.4.0-150400.3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849212" comment="libuwac0-0-2.4.0-150400.3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849213" comment="libwinpr2-2.4.0-150400.3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849214" comment="uwac0-0-devel-2.4.0-150400.3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849215" comment="winpr2-devel-2.4.0-150400.3.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5218" version="1" class="patch">
	<metadata>
		<title>Security update for rear27a (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1202352" ref_url="https://bugzilla.suse.com/1202352" source="BUGZILLA"/>
		<reference ref_id="1218728" ref_url="https://bugzilla.suse.com/1218728" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-23301" ref_url="https://www.suse.com/security/cve/CVE-2024-23301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018062.html" source="SUSE-SU"/>
		<description>
This update for rear27a fixes the following issues:

- CVE-2024-23301: Fixed world-readable initrd with GRUB_RESCUE=Y (bsc#1218728).

Bug fixes:

- Fix mkinitrd dependency issue by installing dracut-mkinitrd-deprecated (see bsc#1202352).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-28"/>
	<updated date="2024-02-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1202352">SUSE bug 1202352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218728">SUSE bug 1218728</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23301/">CVE-2024-23301 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23301">CVE-2024-23301 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849216" comment="rear27a-2.7-150500.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5219" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Low)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217969" ref_url="https://bugzilla.suse.com/1217969" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-39804" ref_url="https://www.suse.com/security/cve/CVE-2023-39804/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0070-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-January/033622.html" source="SUSE-SU"/>
		<description>
This update for tar fixes the following issues:

- CVE-2023-39804: Fixed  extension attributes in PAX archives incorrect hanling (bsc#1217969).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-09"/>
	<updated date="2024-01-09"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1217969">SUSE bug 1217969</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39804/">CVE-2023-39804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39804">CVE-2023-39804 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009816485" comment="tar-1.34-150000.3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816486" comment="tar-backup-scripts-1.34-150000.3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816487" comment="tar-doc-1.34-150000.3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816488" comment="tar-lang-1.34-150000.3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816489" comment="tar-rmt-1.34-150000.3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009816490" comment="tar-tests-1.34-150000.3.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5220" version="1" class="patch">
	<metadata>
		<title>Security update for Java (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220068" ref_url="https://bugzilla.suse.com/1220068" source="BUGZILLA"/>
		<reference ref_id="1220070" ref_url="https://bugzilla.suse.com/1220070" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-25710" ref_url="https://www.suse.com/security/cve/CVE-2024-25710/" source="CVE"/>
		<reference ref_id="CVE-2024-26308" ref_url="https://www.suse.com/security/cve/CVE-2024-26308/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018073.html" source="SUSE-SU"/>
		<description>
This update for Java fixes the following issues:

apache-commons-codec was updated to version 1.16.1:

- Changes in version 1.16.1:

  * New features:

    + Added Maven property project.build.outputTimestamp for build reproducibility

  * Bugs fixed:

    + Correct error in Base64 Javadoc
    + Added minimum Java version in changes.xml
    + Documentation update for the org.apache.commons.codec.digest.* package
    + Precompile regular expression in UnixCrypt.crypt(byte[], String)
    + Fixed possible IndexOutOfBoundException in PhoneticEngine.encode method
    + Fixed possible ArrayIndexOutOfBoundsException in QuotedPrintableCodec.encodeQuotedPrintable() method
    + Fixed possible StringIndexOutOfBoundException in MatchRatingApproachEncoder.encode() method
    + Fixed possible ArrayIndexOutOfBoundException in RefinedSoundex.getMappingCode()
    + Fixed possible IndexOutOfBoundsException in PercentCodec.insertAlwaysEncodeChars() method
    + Deprecated UnixCrypt 0-argument constructor
    + Deprecated Md5Crypt 0-argument constructor
    + Deprecated Crypt 0-argument constructor
    + Deprecated StringUtils 0-argument constructor
    + Deprecated Resources 0-argument constructor
    + Deprecated Charsets 0-argument constructor
    + Deprecated CharEncoding 0-argument constructor

- Changes in version 1.16.0:

  * Remove duplicated words from Javadocs
  * Use Standard Charset object
  * Use String.contains() functions
  * Avoid use toString() or substring() in favor of a simplified expression
  * Fixed byte-skipping in Base16 decoding
  * Fixed several typos, improve writing in some javadocs
  * BaseNCodecOutputStream.eof() should not throw IOException.
  * Javadoc improvements and cleanups.
  * Deprecated BaseNCodec.isWhiteSpace(byte) and use Character.isWhitespace(int).
  * Added support for Blake3 family of hashes
  * Added github/codeql-action
  * Bump actions/cache from v2 to v3.0.10
  * Bump actions/setup-java from v1.4.1 to 3.5.1
  * Bump actions/checkout from 2.3.2 to 3.1.0
  * Bump commons-parent from 52 to 58
  * Bump junit from 4.13.1 to 5.9.1
  * Bump Java 7 to 8.
  * Bump japicmp-maven-plugin from 0.14.3 to 0.17.1.
  * Bump jacoco-maven-plugin from 0.8.5 to 0.8.8 (Fixes Java 15 builds).
  * Bump maven-surefire-plugin from 2.22.2 to 3.0.0-M7
  * Bump maven-javadoc-plugin from 3.2.0 to 3.4.1.
  * Bump animal-sniffer-maven-plugin from 1.19 to 1.22.
  * Bump maven-pmd-plugin from 3.13.0 to 3.19.0
  * Bump pmd from 6.47.0 to 6.52.0.
  * Bump maven-checkstyle-plugin from 2.17 to 3.2.0
  * Bump checkstyle from 8.45.1 to 9.3
  * Bump taglist-maven-plugin from 2.4 to 3.0.0
  * Bump jacoco-maven-plugin from 0.8.7 to 0.8.8.

apache-commons-compress was updated to version 1.26:

- Changes in version 1.26:

  * Security issues fixed:

    + CVE-2024-26308: Fixed allocation of Resources Without Limits or Throttling vulnerability in 
      Apache Commons Compress (bsc#1220068)
    + CVE-2024-25710: Fixed loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in 
      Apache Commons Compress (bsc#1220070)

  * New Features:

    + Added and use ZipFile.builder(), ZipFile.Builder, and deprecate constructors
    + Added and use SevenZFile.builder(), SevenZFile.Builder, and deprecate constructors
    + Added and use ArchiveInputStream.getCharset()
    + Added and use ArchiveEntry.resolveIn(Path)
    + Added Maven property project.build.outputTimestamp for build reproducibility

  * Bugs fixed:
  
    + Check for invalid PAX values in TarArchiveEntry
    + Fixed zero size headers in ArjInputStream
    + Fixes and tests for ArInputStream
    + Fixes for dump file parsing
    + Improved CPIO exception detection and handling
    + Deprecated SkipShieldingInputStream without replacement (nolonger used)
    + Reuse commons-codec, don't duplicate class PureJavaCrc32C (removed package-private class)
    + Reuse commons-codec, don't duplicate class XXHash32 (deprecated class)
    + Reuse commons-io, don't duplicate class Charsets (deprecated class)
    + Reuse commons-io, don't duplicate class IOUtils (deprecated methods)
    + Reuse commons-io, don't duplicate class BoundedInputStream (deprecated class)
    + Reuse commons-io, don't duplicate class FileTimes (deprecated TimeUtils methods)
    + Reuse Arrays.equals(byte[], byte[]) and deprecate ArchiveUtils.isEqual(byte[], byte[])
    + Added a null-check for the class loader of OsgiUtils
    + Added a null-check in Pack200.newInstance(String, String)
    + Deprecated ChecksumCalculatingInputStream in favor of java.util.zip.CheckedInputStream
    + Deprecated CRC32VerifyingInputStream.CRC32VerifyingInputStream(InputStream, long, int)
    + FramedSnappyCompressorOutputStream produces incorrect output when writing a large buffer
    + Fixed TAR directory entries being misinterpreted as files
    + Deprecated unused method FileNameUtils.getBaseName(String)
    + Deprecated unused method FileNameUtils.getExtension(String)
    + ArchiveInputStream.BoundedInputStream.read() incorrectly adds 1 for EOF to the bytes read count
    + Deprecated IOUtils.read(File, byte[])
    + Deprecated IOUtils.copyRange(InputStream, long, OutputStream, int)
    + ZipArchiveOutputStream multi archive updates metadata in incorrect file
    + Deprecated ByteUtils.InputStreamByteSupplier
    + Deprecated ByteUtils.fromLittleEndian(InputStream, int)
    + Deprecated ByteUtils.toLittleEndian(DataOutput, long, int)
    + Reduce duplication by having ArchiveInputStream extend FilterInputStream
    + Support preamble garbage in ZipArchiveInputStream
    + Fixed formatting the lowest expressable DOS time
    + Dropped  reflection from ExtraFieldUtils static initialization
    + Preserve exception causation in ExtraFieldUtils.register(Class)

- Changes in version 1.25:

  * For the full list of changes please consult:
    https://commons.apache.org/proper/commons-compress/changes-report.html#a1.25.0

- Changes in version 1.24:

  * For the full list of changes please consult:
    https://commons.apache.org/proper/commons-compress/changes-report.html#a1.24.0

- Changes in version 1.23:

  * For the full list of changes please consult:
    https://commons.apache.org/proper/commons-compress/changes-report.html#a1.23.0

- Changes in version 1.22:

  * For the full list of changes please consult:
    https://commons.apache.org/proper/commons-compress/changes-report.html#a1.22

apache-commons-io was updated to version 2.15.1:

- Changes in version 2.15.1:

  * For the full list of changes please consult:
    https://commons.apache.org/proper/commons-io/changes-report.html#a2.15.1

- Changes in version 2.15.0:

  * For the full list of changes please consult:
    https://commons.apache.org/proper/commons-io/changes-report.html#a2.15.0

- Changes in version 2.14.0:

  * For the full list of changes please consult:
    https://commons.apache.org/proper/commons-io/changes-report.html#a2.14.0

javapackages-meta:

- Syncing the version with javapackages-tools 6.2.0
- Remove unnecessary dependencies

maven was updated to version 3.9.6:

- Changes in version 3.9.6:

  * Bugs fixed:

    + Error message when modelVersion is 4.0 is confusing

  * Improvements:

    + Colorize transfer messages
    + Support ${project.basedir} in file profile activation
    + Allow to exclude plugins from validation

  * Tasks:

    + Maven Resolver Provider classes ctor change
    + Undeprecate wrongly deprecated repository metadata
    + Deprecated `org.apache.maven.repository.internal.MavenResolverModule`
    + maven-resolver-provider: introduce NAME constants.

  * Dependency upgrade:

    + Updated  to Resolver 1.9.16
    + Upgraded Sisu version to 0.9.0.M2
    + Upgraded Resolver version to 1.9.18
    + Upgraded to parent POM 41
    + Upgraded default plugin bindings

maven-assembly-plugin:

- Explicitely require commons-io:commons-io and commons-codec:common-codes artifacts that are optional in
  apache-commons-compress

maven-doxia was updated to version 1.12.0:

  * Changes in version 1.12.0:

    + Upgraded to FOP 2.2
    + Fixed rendering links and paragraphs inside tables
    + Rewrite .md and .markdown links to .html
    + Upgraded HttpComponents: httpclient to 4.5.8 and httpcore to 4.4.11
    + Escape links to xml based figureGraphics image elements
    + SECURITY: Use HTTPS to resolve dependencies in Maven Build
    + Removed old Maven 1 and 2 info
    + Updated commons-lang to 3.8.1
    + Dropped  dependency to outdated Log4j
    + Fixed Java 7 compatibility that was broken
    + Import tests from maven-site-plugin
    + Fixed crosslinks starting with a dot in markdown files
    + Replace deprecated class from commons-lang
    + Fill in some generic types

maven-doxia-sitetools was updated to version 1.11.1:

- Changes in version 1.11.1:

  * Bugs fixed:

    + CLIRR can't find previous version

  * Improvements:

    + Removed all &amp;#xA0; in default-site-macros.vm and replace by a space
    + Improved documentation on site.xml inheritance vs interpolation

  * Tasks:

    + Deprecated Doxia Sitetools Doc Renderer

  * Dependency upgrade:

    + Fixed javadoc issues with JDK 8 when generating documentation
    + Wrong coordinates for jai_core: hyphen should be underscore
    + Use latest JUnit version 4.13.2
    + Upgraded Plexus Utils to 3.3.0
    + Upgraded Plexus Interpolation to 1.26
    + Upgraded Maven Doxia to 1.10
    + Upgraded Maven Doxia to 1.11.1

maven-jar-plugin was updated to version 3.3.0:

- Changes in version 3.3.0:

  * Bugs fixed:

    + outputTimestamp not applied to module-info; breaks reproducible builds

  * Task:

    + Updated plugin (requires Maven 3.2.5+)
    + Java 8 as minimum

  * Dependency upgrade:

    + Upgraded Plexus Utils to 3.3.1
    + Removed override for Plexus Archiver to fix order of META-INF/ and META-INF/MANIFEST.MF entries
    + Upgraded Parent to 36
    + Updated Plexus Utils to 3.4.2
    + Upgraded Parent to 37

maven-jar-plugin was updated to version 3.6.0:

- Changes from version 3.6.0:

  * Bugs fixed:

    + Setting maven.javadoc.isoffline seems to have no effect
    + javadoc site is broken for projects that contain modules
    + Alternative doclet page points to an SEO spammy page
    + [REGRESSION] Transitive dependencies of docletArtifact missing
    + Unresolvable link in javadoc tag with value ResourcesBundleMojo#getAttachmentClassifier() found in
      ResourcesBundleMojo
    + IOException --&gt; NullPointerException in JavadocUtil.copyResource
    + JavadocReportTest.testExceptions is broken
    + javadoc creates invalid --patch-module statements
    + javadoc plugin can not deal with transitive filename based modules

  * Improvements:

    + Clean up deprecated and unpreferred methods in JavadocUtil
    + Cleanup dependency declarations as best possible
    + Allow building javadoc 'the old fashioned way' after Java 8

  * Tasks:

    + Dropped  use of deprecated localRepository mojo
      parameter
    + Make build pass with Java 20
    + Refresh download page

  * Dependency upgrade:

    + Updated  to commons-io 2.13.0
    + Updated  plexus-archiver from 4.7.1 to 4.8.0
    + Upgraded Parent to 40

- Changes from version 3.5.0:

  * Bugs fixed:

    + Invalid anchors in Javadoc and plugin mojo
    + Plugin duplicates classes in Java 8 all-classes lists
    + javadoc site creation ignores configuration parameters

  * Improvements:

    + Deprecated parameter 'stylesheet'
    + Parse stderr output and suppress informational lines
    + Link to Javadoc references from JDK 17
    + Migrate components to JSR 330, get rid of maven-artifact-transfer, update to parent 37

  * Tasks:

    + Removed remains of org.codehaus.doxia.sink.Sink

  * Dependency upgrades:

    + Upgraded plugins in ITs
    + Upgraded to Maven 3.2.5
    + Updated  Maven Archiver to 3.6.0
    + Upgraded Maven Reporting API to 3.1.1/Complete
      with Maven Reporting Impl 3.2.0
    + Upgraded commons-text to 1.10.0
    + Upgraded Parent to 39
    + Upgraded plugins and components

maven-reporting-api was updated to version 3.1.1:

- Restore binary compat for MavenReport

maven-reporting-impl was updated to version 3.2.0:

- Changes in version 3.2.0:

  * Improvement:

    + Render with a skin when report is run in standalone mode

  * Dependency upgrades:

    + Upgraded Maven Reporting API to 3.1.1
    + Upgraded plugins and components in project and ITs

maven-resolver was updated to version 1.9.18:

- Changes in version 1.9.18:

  * Bugs fixed:

    + Sporadic AccessDeniedEx on Windows
    + Undo FileUtils changes that altered non-Windows execution path

  * Improvements:

    + Native transport should retry on HTTP 429 (Retry-After)

  * Task:

    + Deprecated Guice modules
    + Get rid of component name string literals, make them constants and reusable
    + Expose configuration for inhibiting Expect-Continue handshake in 1.x
    + Refresh download page
    + Resolver should not override given HTTP transport default use of expect-continue handshake

maven-resources-plugin was updated to version 3.3.1:

- Changes in version 3.3.1:

  * Bugs fixed:

    + Resource plugin's handling of symbolic links changed in 3.0.x, broke existing behavior
    + Resource copying not using specified encoding
    + java.nio.charset.MalformedInputException: Input length = 1
    + Filtering of Maven properties with long names is not working after transition from 2.6 to 3.2.0
    + Valid location for directory parameter is always required
    + Symlinks cause copying resources to fail
    + FileUtils.copyFile() fails with source file having `lastModified = 0`

  * New Features:

    + Added ability to flatten folder structure into target directory when copying resources

  * Improvements:

    + Make tests jar reproducible
    + Describe from and to in 'Copying xresources' info message

  * Task:

    + Dropped  plexus legacy
    + Updated  to parent POM 39, reformat sources
    + Updated  plugin (requires Maven 3.2.5+)
    + Require Java 8

  * Dependency upgrade:

    + Upgraded maven-plugin parent to 36
    + Upgraded Maven Filtering to 3.3.0
    + Upgraded plexus-utils to 3.5.1
    + Upgraded to maven-filtering 3.3.1

sbt:

- Fixed RPM package build with maven 3.9.6 and maven-resolver 1.9.18

xmvn:

- Modify the xmvn-install script to work with new apache-commons-compress
- Recompiling RPM package to resolve package building issues with maven-lib
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2024-02-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220068">SUSE bug 1220068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220070">SUSE bug 1220070</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25710/">CVE-2024-25710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25710">CVE-2024-25710 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26308/">CVE-2024-26308 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26308">CVE-2024-26308 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849491" comment="apache-commons-codec-1.16.1-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849492" comment="apache-commons-codec-javadoc-1.16.1-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849493" comment="apache-commons-compress-1.26.0-150200.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849494" comment="apache-commons-compress-javadoc-1.26.0-150200.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849495" comment="apache-commons-configuration2-2.9.0-150200.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849496" comment="apache-commons-configuration2-javadoc-2.9.0-150200.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849497" comment="apache-commons-io-2.15.1-150200.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849498" comment="apache-commons-io-javadoc-2.15.1-150200.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849499" comment="gradle-local-6.2.0-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849500" comment="ivy-local-6.2.0-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849501" comment="maven-3.9.6-150200.4.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849502" comment="maven-assembly-plugin-3.6.0-150200.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849503" comment="maven-assembly-plugin-javadoc-3.6.0-150200.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849504" comment="maven-doxia-core-1.12.0-150200.4.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849505" comment="maven-doxia-javadoc-1.12.0-150200.4.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849506" comment="maven-doxia-logging-api-1.12.0-150200.4.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849507" comment="maven-doxia-module-apt-1.12.0-150200.4.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849508" comment="maven-doxia-module-confluence-1.12.0-150200.4.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849509" comment="maven-doxia-module-docbook-simple-1.12.0-150200.4.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849510" comment="maven-doxia-module-fml-1.12.0-150200.4.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849511" comment="maven-doxia-module-fo-1.12.0-150200.4.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849512" comment="maven-doxia-module-latex-1.12.0-150200.4.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849513" comment="maven-doxia-module-rtf-1.12.0-150200.4.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849514" comment="maven-doxia-module-twiki-1.12.0-150200.4.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849515" comment="maven-doxia-module-xdoc-1.12.0-150200.4.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849516" comment="maven-doxia-module-xhtml-1.12.0-150200.4.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849517" comment="maven-doxia-module-xhtml5-1.12.0-150200.4.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849518" comment="maven-doxia-sink-api-1.12.0-150200.4.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849519" comment="maven-doxia-sitetools-1.11.1-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849520" comment="maven-doxia-sitetools-javadoc-1.11.1-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849521" comment="maven-doxia-test-docs-1.12.0-150200.4.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849522" comment="maven-jar-plugin-3.3.0-150200.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849523" comment="maven-jar-plugin-bootstrap-3.3.0-150200.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849524" comment="maven-jar-plugin-javadoc-3.3.0-150200.3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849525" comment="maven-javadoc-3.9.6-150200.4.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849526" comment="maven-javadoc-plugin-3.6.0-150200.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849527" comment="maven-javadoc-plugin-bootstrap-3.6.0-150200.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849528" comment="maven-javadoc-plugin-javadoc-3.6.0-150200.4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849529" comment="maven-lib-3.9.6-150200.4.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849530" comment="maven-local-6.2.0-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849531" comment="maven-reporting-api-3.1.1-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849532" comment="maven-reporting-api-javadoc-3.1.1-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849533" comment="maven-reporting-impl-3.2.0-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849534" comment="maven-reporting-impl-javadoc-3.2.0-150200.4.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849535" comment="maven-resolver-1.9.18-150200.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849536" comment="maven-resolver-api-1.9.18-150200.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849537" comment="maven-resolver-connector-basic-1.9.18-150200.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849538" comment="maven-resolver-impl-1.9.18-150200.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849539" comment="maven-resolver-javadoc-1.9.18-150200.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849540" comment="maven-resolver-named-locks-1.9.18-150200.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849541" comment="maven-resolver-spi-1.9.18-150200.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849542" comment="maven-resolver-test-util-1.9.18-150200.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849543" comment="maven-resolver-transport-classpath-1.9.18-150200.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849544" comment="maven-resolver-transport-file-1.9.18-150200.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849545" comment="maven-resolver-transport-http-1.9.18-150200.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849546" comment="maven-resolver-transport-wagon-1.9.18-150200.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849547" comment="maven-resolver-util-1.9.18-150200.3.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849548" comment="maven-resources-plugin-3.3.1-150200.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849549" comment="maven-resources-plugin-bootstrap-3.3.1-150200.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849550" comment="maven-resources-plugin-javadoc-3.3.1-150200.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849551" comment="sbt-0.13.18-150200.4.19.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849552" comment="sbt-bootstrap-0.13.18-150200.4.19.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849553" comment="xmvn-4.2.0-150200.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849554" comment="xmvn-api-4.2.0-150200.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849555" comment="xmvn-connector-4.2.0-150200.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849556" comment="xmvn-connector-javadoc-4.2.0-150200.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849557" comment="xmvn-core-4.2.0-150200.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849558" comment="xmvn-install-4.2.0-150200.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849559" comment="xmvn-minimal-4.2.0-150200.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849560" comment="xmvn-mojo-4.2.0-150200.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849561" comment="xmvn-mojo-javadoc-4.2.0-150200.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849562" comment="xmvn-parent-4.2.0-150200.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849563" comment="xmvn-resolve-4.2.0-150200.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849564" comment="xmvn-subst-4.2.0-150200.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849565" comment="xmvn-tools-javadoc-4.2.0-150200.3.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5221" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs18 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219724" ref_url="https://bugzilla.suse.com/1219724" source="BUGZILLA"/>
		<reference ref_id="1219992" ref_url="https://bugzilla.suse.com/1219992" source="BUGZILLA"/>
		<reference ref_id="1219993" ref_url="https://bugzilla.suse.com/1219993" source="BUGZILLA"/>
		<reference ref_id="1219997" ref_url="https://bugzilla.suse.com/1219997" source="BUGZILLA"/>
		<reference ref_id="1220014" ref_url="https://bugzilla.suse.com/1220014" source="BUGZILLA"/>
		<reference ref_id="1220017" ref_url="https://bugzilla.suse.com/1220017" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46809" ref_url="https://www.suse.com/security/cve/CVE-2023-46809/" source="CVE"/>
		<reference ref_id="CVE-2024-21892" ref_url="https://www.suse.com/security/cve/CVE-2024-21892/" source="CVE"/>
		<reference ref_id="CVE-2024-22019" ref_url="https://www.suse.com/security/cve/CVE-2024-22019/" source="CVE"/>
		<reference ref_id="CVE-2024-22025" ref_url="https://www.suse.com/security/cve/CVE-2024-22025/" source="CVE"/>
		<reference ref_id="CVE-2024-24758" ref_url="https://www.suse.com/security/cve/CVE-2024-24758/" source="CVE"/>
		<reference ref_id="CVE-2024-24806" ref_url="https://www.suse.com/security/cve/CVE-2024-24806/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0730-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034494.html" source="SUSE-SU"/>
		<description>
This update for nodejs18 fixes the following issues:

Update to 18.19.1: (security updates)

* CVE-2024-21892: Code injection and privilege escalation through Linux capabilities (bsc#1219992).
* CVE-2024-22019: http: Reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (bsc#1219993).
* CVE-2023-46809: Node.js is vulnerable to the Marvin Attack (timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding) (bsc#1219997).
* CVE-2024-22025: Denial of Service by resource exhaustion in fetch() brotli decoding (bsc#1220014).
* CVE-2024-24758: undici version 5.28.3 (bsc#1220017).
* CVE-2024-24806: libuv version 1.48.0 (bsc#1219724).

Update to LTS version 18.19.0

* deps: npm updates to 10.x
* esm:
  + Leverage loaders when resolving subsequent loaders
  + import.meta.resolve unflagged
  + --experimental-default-type flag to flip module defaults
		</description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2024-02-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219724">SUSE bug 1219724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219992">SUSE bug 1219992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219993">SUSE bug 1219993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219997">SUSE bug 1219997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220014">SUSE bug 1220014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220017">SUSE bug 1220017</bugzilla>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46809/">CVE-2023-46809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46809">CVE-2023-46809 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21892/">CVE-2024-21892 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21892">CVE-2024-21892 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22019/">CVE-2024-22019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22019">CVE-2024-22019 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22025/">CVE-2024-22025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22025">CVE-2024-22025 at NVD</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-24758/">CVE-2024-24758 at SUSE</cve>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24758">CVE-2024-24758 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-24806/">CVE-2024-24806 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24806">CVE-2024-24806 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849566" comment="corepack18-18.19.1-150400.9.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849567" comment="nodejs18-18.19.1-150400.9.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849568" comment="nodejs18-devel-18.19.1-150400.9.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849569" comment="nodejs18-docs-18.19.1-150400.9.18.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849570" comment="npm18-18.19.1-150400.9.18.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5222" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219465" ref_url="https://bugzilla.suse.com/1219465" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3966" ref_url="https://www.suse.com/security/cve/CVE-2023-3966/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018085.html" source="SUSE-SU"/>
		<description>
This update for openvswitch3 fixes the following issues:

- CVE-2023-3966: Fixed invalid memory access in Geneve with HW offload (bsc#1219465).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219465">SUSE bug 1219465</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3966/">CVE-2023-3966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-3966">CVE-2023-3966 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849722" comment="libopenvswitch-3_1-0-3.1.0-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849723" comment="libovn-23_03-0-23.03.0-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849724" comment="openvswitch3-3.1.0-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849725" comment="openvswitch3-devel-3.1.0-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849726" comment="openvswitch3-doc-3.1.0-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849727" comment="openvswitch3-ipsec-3.1.0-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849728" comment="openvswitch3-pki-3.1.0-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849729" comment="openvswitch3-test-3.1.0-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849730" comment="openvswitch3-vtep-3.1.0-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849731" comment="ovn3-23.03.0-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849732" comment="ovn3-central-23.03.0-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849733" comment="ovn3-devel-23.03.0-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849734" comment="ovn3-doc-23.03.0-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849735" comment="ovn3-docker-23.03.0-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849736" comment="ovn3-host-23.03.0-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849737" comment="ovn3-vtep-23.03.0-150500.3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849738" comment="python3-ovs3-3.1.0-150500.3.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5223" version="1" class="patch">
	<metadata>
		<title>Security update for sendmail (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218351" ref_url="https://bugzilla.suse.com/1218351" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-51765" ref_url="https://www.suse.com/security/cve/CVE-2023-51765/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018086.html" source="SUSE-SU"/>
		<description>
This update for sendmail fixes the following issues:

- CVE-2023-51765: Fixed new SMTP smuggling attack. (bsc#1218351)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2024-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218351">SUSE bug 1218351</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-51765/">CVE-2023-51765 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51765">CVE-2023-51765 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849739" comment="libmilter-doc-8.15.2-150000.8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849740" comment="libmilter1_0-8.15.2-150000.8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849741" comment="rmail-8.15.2-150000.8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849742" comment="sendmail-8.15.2-150000.8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849743" comment="sendmail-devel-8.15.2-150000.8.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849744" comment="sendmail-starttls-8.15.2-150000.8.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5224" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_auth_openidc (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219911" ref_url="https://bugzilla.suse.com/1219911" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-24814" ref_url="https://www.suse.com/security/cve/CVE-2024-24814/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018090.html" source="SUSE-SU"/>
		<description>
This update for apache2-mod_auth_openidc fixes the following issues:

- CVE-2024-24814: Fixed a denial of service when using `OIDCSessionType client-cookie` and manipulating cookies (bsc#1219911).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-05"/>
	<updated date="2024-03-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219911">SUSE bug 1219911</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24814/">CVE-2024-24814 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24814">CVE-2024-24814 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849745" comment="apache2-mod_auth_openidc-2.3.8-150100.3.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5225" version="1" class="patch">
	<metadata>
		<title>Security update for hawk2 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1206217" ref_url="https://bugzilla.suse.com/1206217" source="BUGZILLA"/>
		<reference ref_id="1207930" ref_url="https://bugzilla.suse.com/1207930" source="BUGZILLA"/>
		<reference ref_id="1208533" ref_url="https://bugzilla.suse.com/1208533" source="BUGZILLA"/>
		<reference ref_id="1213454" ref_url="https://bugzilla.suse.com/1213454" source="BUGZILLA"/>
		<reference ref_id="1215438" ref_url="https://bugzilla.suse.com/1215438" source="BUGZILLA"/>
		<reference ref_id="1215976" ref_url="https://bugzilla.suse.com/1215976" source="BUGZILLA"/>
		<reference ref_id="1216508" ref_url="https://bugzilla.suse.com/1216508" source="BUGZILLA"/>
		<reference ref_id="1216571" ref_url="https://bugzilla.suse.com/1216571" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2024:0076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017613.html" source="SUSE-SU"/>
		<description>
This update for hawk2 fixes the following issues:

- Fixed HttpOnly secure flag by default (bsc#1216508).
- Fixed CSRF in errors_controller.rb protection (bsc#1216571).

Update to version 2.6.4+git.1702030539.5fb7d91b:

- Fix mime type issue in MS windows (bsc#1215438)
- Parametrize CORS Access-Control-Allow-Origin header (bsc#1213454)
- Tests: upgrate tests for ruby3.2 (tumbleweed) (bsc#1215976)
- Upgrade for ruby3.2 (tumbleweed) (bsc#1215976)
- Forbid special symbols in the category (bsc#1206217)
- Fix the sass-rails version on ~5.0 (bsc#1208533)
- Don't delete the private key if the public key is missing (bsc#1207930)
- make-sle155-compatible.patch . No bsc, it's for backwards compatibility.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-01-10"/>
	<updated date="2024-01-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1206217">SUSE bug 1206217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207930">SUSE bug 1207930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208533">SUSE bug 1208533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213454">SUSE bug 1213454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215438">SUSE bug 1215438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215976">SUSE bug 1215976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216508">SUSE bug 1216508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216571">SUSE bug 1216571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009815954" comment="hawk2-2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5226" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220210" ref_url="https://bugzilla.suse.com/1220210" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-26130" ref_url="https://www.suse.com/security/cve/CVE-2024-26130/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018093.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2024-26130: Fixed NULL pointer dereference in pkcs12.serialize_key_and_certificates() (bsc#1220210).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-05"/>
	<updated date="2024-03-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1220210">SUSE bug 1220210</bugzilla>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26130/">CVE-2024-26130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26130">CVE-2024-26130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849746" comment="python311-cryptography-41.0.3-150400.16.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5227" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219975" ref_url="https://bugzilla.suse.com/1219975" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-52160" ref_url="https://www.suse.com/security/cve/CVE-2023-52160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018092.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2023-52160: Bypassing WiFi Authentication (bsc#1219975).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-05"/>
	<updated date="2024-03-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219975">SUSE bug 1219975</bugzilla>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52160/">CVE-2023-52160 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52160">CVE-2023-52160 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849747" comment="wpa_supplicant-2.10-150500.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849748" comment="wpa_supplicant-gui-2.10-150500.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5228" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-rack (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220239" ref_url="https://bugzilla.suse.com/1220239" source="BUGZILLA"/>
		<reference ref_id="1220242" ref_url="https://bugzilla.suse.com/1220242" source="BUGZILLA"/>
		<reference ref_id="1220248" ref_url="https://bugzilla.suse.com/1220248" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-25126" ref_url="https://www.suse.com/security/cve/CVE-2024-25126/" source="CVE"/>
		<reference ref_id="CVE-2024-26141" ref_url="https://www.suse.com/security/cve/CVE-2024-26141/" source="CVE"/>
		<reference ref_id="CVE-2024-26146" ref_url="https://www.suse.com/security/cve/CVE-2024-26146/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018091.html" source="SUSE-SU"/>
		<description>
This update for rubygem-rack fixes the following issues:

- CVE-2024-25126: Fixed a denial-of-service vulnerability in Rack Content-Type parsing (bsc#1220239).
- CVE-2024-26141: Fixed a denial-of-service vulnerability in Range request header parsing (bsc#1220242).
- CVE-2024-26146: Fixed a denial-of-service vulnerability in Rack headers parsing routine (bsc#1220248).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-05"/>
	<updated date="2024-03-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220239">SUSE bug 1220239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220242">SUSE bug 1220242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220248">SUSE bug 1220248</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25126/">CVE-2024-25126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25126">CVE-2024-25126 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26141/">CVE-2024-26141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26141">CVE-2024-26141 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26146/">CVE-2024-26146 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26146">CVE-2024-26146 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849749" comment="ruby2.5-rubygem-rack-2.0.8-150000.3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849750" comment="ruby2.5-rubygem-rack-doc-2.0.8-150000.3.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849751" comment="ruby2.5-rubygem-rack-testsuite-2.0.8-150000.3.21.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5229" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220552" ref_url="https://bugzilla.suse.com/1220552" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-42265" ref_url="https://www.suse.com/security/cve/CVE-2022-42265/" source="CVE"/>
		<reference ref_id="CVE-2024-0074" ref_url="https://www.suse.com/security/cve/CVE-2024-0074/" source="CVE"/>
		<reference ref_id="CVE-2024-0075" ref_url="https://www.suse.com/security/cve/CVE-2024-0075/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018095.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware-nvidia-gspx-G06, nvidia-open-driver-G06-signed fixes the following issues:

Update to 550.54.14:

* Added vGPU Host and vGPU Guest support. For vGPU Host, please
  refer to the README.vgpu packaged in the vGPU Host Package for
  more details.
Security issues fixed:

* CVE-2024-0074: A user could trigger a NULL ptr dereference.
* CVE-2024-0075: A user could overwrite the end of a buffer, leading to crashes or code execution.
* CVE-2022-42265: A unprivileged user could trigger an integer overflow which could lead to crashes or code execution. 


- create /run/udev/static_node-tags/uaccess/nvidia${devid} symlinks
  also during modprobing the nvidia module; this changes the issue
  of not having access to /dev/nvidia${devid}, when gfxcard has
  been replaced by a different gfx card after installing the driver
- provide nvidia-open-driver-G06-kmp (jsc#PED-7117)

  This makes it easy to replace the package from nVidia's
  CUDA repository with this presigned package

		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-05"/>
	<updated date="2024-03-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220552">SUSE bug 1220552</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-42265/">CVE-2022-42265 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42265">CVE-2022-42265 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0074/">CVE-2024-0074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0074">CVE-2024-0074 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0075/">CVE-2024-0075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0075">CVE-2024-0075 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849752" comment="kernel-firmware-nvidia-gspx-G06-550.54.14-150500.11.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849753" comment="nvidia-open-driver-G06-signed-64kb-devel-550.54.14-150500.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849754" comment="nvidia-open-driver-G06-signed-azure-devel-550.54.14-150500.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849755" comment="nvidia-open-driver-G06-signed-default-devel-550.54.14-150500.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849756" comment="nvidia-open-driver-G06-signed-kmp-64kb-550.54.14_k5.14.21_150500.55.49-150500.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849757" comment="nvidia-open-driver-G06-signed-kmp-azure-550.54.14_k5.14.21_150500.33.34-150500.3.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849758" comment="nvidia-open-driver-G06-signed-kmp-default-550.54.14_k5.14.21_150500.55.49-150500.3.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5230" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql-jdbc (Critical)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220644" ref_url="https://bugzilla.suse.com/1220644" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-1597" ref_url="https://www.suse.com/security/cve/CVE-2024-1597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018094.html" source="SUSE-SU"/>
		<description>
This update for postgresql-jdbc fixes the following issues:

- CVE-2024-1597: Fixed SQL Injection via line comment generation (bsc#1220644).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-05"/>
	<updated date="2024-03-05"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1220644">SUSE bug 1220644</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1597/">CVE-2024-1597 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1597">CVE-2024-1597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849759" comment="postgresql-jdbc-42.2.25-150400.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849760" comment="postgresql-jdbc-javadoc-42.2.25-150400.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5231" version="1" class="patch">
	<metadata>
		<title>Security update for python311 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1210638" ref_url="https://bugzilla.suse.com/1210638" source="BUGZILLA"/>
		<reference ref_id="1219666" ref_url="https://bugzilla.suse.com/1219666" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043/" source="CVE"/>
		<reference ref_id="CVE-2023-6597" ref_url="https://www.suse.com/security/cve/CVE-2023-6597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018101.html" source="SUSE-SU"/>
		<description>
This update for python311 fixes the following issues:

- CVE-2023-6597: Fixed symlink bug in cleanup of tempfile.TemporaryDirectory (bsc#1219666).
- CVE-2023-27043: Fixed incorrect e-mqil parsing (bsc#1210638).
- CVE-2022-25236: Fixed an expat vulnerability by supporting expat &gt;= 2.4.4 (bsc#1212015).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-06"/>
	<updated date="2024-03-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210638">SUSE bug 1210638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219666">SUSE bug 1219666</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6597/">CVE-2023-6597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6597">CVE-2023-6597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849893" comment="libpython3_11-1_0-3.11.8-150400.9.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849894" comment="libpython3_11-1_0-32bit-3.11.8-150400.9.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849895" comment="python311-3.11.8-150400.9.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849896" comment="python311-32bit-3.11.8-150400.9.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849897" comment="python311-base-3.11.8-150400.9.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849898" comment="python311-base-32bit-3.11.8-150400.9.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849899" comment="python311-curses-3.11.8-150400.9.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849900" comment="python311-dbm-3.11.8-150400.9.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849901" comment="python311-devel-3.11.8-150400.9.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849902" comment="python311-doc-3.11.8-150400.9.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849903" comment="python311-doc-devhelp-3.11.8-150400.9.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849904" comment="python311-idle-3.11.8-150400.9.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849905" comment="python311-testsuite-3.11.8-150400.9.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849906" comment="python311-tk-3.11.8-150400.9.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849907" comment="python311-tools-3.11.8-150400.9.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5232" version="1" class="patch">
	<metadata>
		<title>Security update for python39 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1210638" ref_url="https://bugzilla.suse.com/1210638" source="BUGZILLA"/>
		<reference ref_id="1212015" ref_url="https://bugzilla.suse.com/1212015" source="BUGZILLA"/>
		<reference ref_id="1214692" ref_url="https://bugzilla.suse.com/1214692" source="BUGZILLA"/>
		<reference ref_id="1215454" ref_url="https://bugzilla.suse.com/1215454" source="BUGZILLA"/>
		<reference ref_id="1219666" ref_url="https://bugzilla.suse.com/1219666" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043/" source="CVE"/>
		<reference ref_id="CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217/" source="CVE"/>
		<reference ref_id="CVE-2023-6597" ref_url="https://www.suse.com/security/cve/CVE-2023-6597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018103.html" source="SUSE-SU"/>
		<description>
This update for python39 fixes the following issues:

- CVE-2023-6597: Fixed symlink bug in cleanup of tempfile.TemporaryDirectory (bsc#1219666).
- CVE-2023-27043: Fixed incorrect e-mqil parsing (bsc#1210638).
- CVE-2023-40217: Fixed a ssl.SSLSocket TLS bypass vulnerability where data is sent unencrypted (bsc#1214692).
- CVE-2022-25236: Fixed an expat vulnerability by supporting expat &gt;= 2.4.4 (bsc#1212015).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-06"/>
	<updated date="2024-03-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210638">SUSE bug 1210638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212015">SUSE bug 1212015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214692">SUSE bug 1214692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215454">SUSE bug 1215454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219666">SUSE bug 1219666</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25236">CVE-2022-25236 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6597/">CVE-2023-6597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6597">CVE-2023-6597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849950" comment="libpython3_9-1_0-3.9.18-150300.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849951" comment="libpython3_9-1_0-32bit-3.9.18-150300.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849952" comment="python39-3.9.18-150300.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849953" comment="python39-32bit-3.9.18-150300.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849954" comment="python39-base-3.9.18-150300.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849955" comment="python39-base-32bit-3.9.18-150300.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849956" comment="python39-curses-3.9.18-150300.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849957" comment="python39-dbm-3.9.18-150300.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849958" comment="python39-devel-3.9.18-150300.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849959" comment="python39-doc-3.9.18-150300.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849960" comment="python39-doc-devhelp-3.9.18-150300.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849961" comment="python39-idle-3.9.18-150300.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849962" comment="python39-testsuite-3.9.18-150300.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849963" comment="python39-tk-3.9.18-150300.4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849964" comment="python39-tools-3.9.18-150300.4.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5233" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1198880" ref_url="https://bugzilla.suse.com/1198880" source="BUGZILLA"/>
		<reference ref_id="1200551" ref_url="https://bugzilla.suse.com/1200551" source="BUGZILLA"/>
		<reference ref_id="1217390" ref_url="https://bugzilla.suse.com/1217390" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-40633" ref_url="https://www.suse.com/security/cve/CVE-2021-40633/" source="CVE"/>
		<reference ref_id="CVE-2022-28506" ref_url="https://www.suse.com/security/cve/CVE-2022-28506/" source="CVE"/>
		<reference ref_id="CVE-2023-48161" ref_url="https://www.suse.com/security/cve/CVE-2023-48161/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018107.html" source="SUSE-SU"/>
		<description>
This update for giflib fixes the following issues:

Update to version 5.2.2

* Fixes for CVE-2023-48161 (bsc#1217390), CVE-2022-28506 (bsc#1198880)
* #138 Documentation for obsolete utilities still installed
* #139: Typo in 'LZW image data' page ('110_2 = 4_10')
* #140: Typo in 'LZW image data' page ('LWZ')
* #141: Typo in 'Bits and bytes' page ('filed')
* Note as already fixed SF issue #143: cannot compile under mingw
* #144: giflib-5.2.1 cannot be build on windows and other platforms using c89
* #145: Remove manual pages installation for binaries that are not installed too
* #146: [PATCH] Limit installed man pages to binaries, move giflib to section 7
* #147 [PATCH] Fixes to doc/whatsinagif/ content
* #148: heap Out of Bound Read in gif2rgb.c:298 DumpScreen2RGB
* Declared no-info on SF issue #150: There is a denial of service vulnerability in GIFLIB 5.2.1
* Declared Won't-fix on SF issue 149: Out of source builds no longer possible
* #151: A heap-buffer-overflow in gif2rgb.c:294:45
* #152: Fix some typos on the html documentation and man pages
* #153: Fix segmentation faults due to non correct checking for args
* #154: Recover the giffilter manual page
* #155: Add gifsponge docs
* #157: An OutofMemory-Exception or Memory Leak in gif2rgb
* #158: There is a null pointer problem in gif2rgb
* #159 A heap-buffer-overflow in GIFLIB5.2.1 DumpScreen2RGB() in gif2rgb.c:298:45
* #163: detected memory leaks in openbsd_reallocarray giflib/openbsd-reallocarray.c
* #164: detected memory leaks in GifMakeMapObject giflib/gifalloc.c
* #166: a read zero page leads segment fault in getarg.c and memory leaks in gif2rgb.c and gifmalloc.c
* #167: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function at Line 321 of gif2rgb.c
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-06"/>
	<updated date="2024-03-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198880">SUSE bug 1198880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200551">SUSE bug 1200551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217390">SUSE bug 1217390</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-40633/">CVE-2021-40633 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40633">CVE-2021-40633 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-28506/">CVE-2022-28506 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28506">CVE-2022-28506 at NVD</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-48161/">CVE-2023-48161 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48161">CVE-2023-48161 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009849965" comment="giflib-devel-5.2.2-150000.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849966" comment="giflib-devel-32bit-5.2.2-150000.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849967" comment="giflib-progs-5.2.2-150000.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849968" comment="libgif7-5.2.2-150000.4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009849969" comment="libgif7-32bit-5.2.2-150000.4.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5234" version="1" class="patch">
	<metadata>
		<title>Security update for google-oauth-java-client (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1199188" ref_url="https://bugzilla.suse.com/1199188" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22573" ref_url="https://www.suse.com/security/cve/CVE-2021-22573/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0806-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-March/034574.html" source="SUSE-SU"/>
		<description>
This update for google-oauth-java-client fixes the following issues:

- CVE-2021-22573: Fixed token signature not verified (bsc#1199188).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-03-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1199188">SUSE bug 1199188</bugzilla>
	<cve href="https://www.suse.com/security/cve/CVE-2021-22573/">CVE-2021-22573 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22573">CVE-2021-22573 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850240" comment="google-oauth-java-client-1.22.0-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850241" comment="google-oauth-java-client-java6-1.22.0-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850242" comment="google-oauth-java-client-javadoc-1.22.0-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850243" comment="google-oauth-java-client-parent-1.22.0-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850244" comment="google-oauth-java-client-servlet-1.22.0-150200.3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5235" version="1" class="patch">
	<metadata>
		<title>Security update for xmlgraphics-batik (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1204704" ref_url="https://bugzilla.suse.com/1204704" source="BUGZILLA"/>
		<reference ref_id="1204709" ref_url="https://bugzilla.suse.com/1204709" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-41704" ref_url="https://www.suse.com/security/cve/CVE-2022-41704/" source="CVE"/>
		<reference ref_id="CVE-2022-42890" ref_url="https://www.suse.com/security/cve/CVE-2022-42890/" source="CVE"/>
		<reference ref_id="CVE-2022-44729" ref_url="https://www.suse.com/security/cve/CVE-2022-44729/" source="CVE"/>
		<reference ref_id="CVE-2022-44730" ref_url="https://www.suse.com/security/cve/CVE-2022-44730/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-March/034578.html" source="SUSE-SU"/>
		<description>
This update for xmlgraphics-batik fixes the following issues:

- CVE-2022-41704: Fixed information disclosure vulnerability in Apache Batik (bsc#1204704).
- CVE-2022-42890: Fixed information disclosure vulnerability in Apache Batik (bsc#1204709).
- CVE-2022-44730: Fixed Server-Side Request Forgery.
- CVE-2022-44729: Fixed Server-Side Request Forgery.

Upgrade to version 1.17.
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2024-03-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1204704">SUSE bug 1204704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204709">SUSE bug 1204709</bugzilla>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41704/">CVE-2022-41704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41704">CVE-2022-41704 at NVD</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42890/">CVE-2022-42890 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42890">CVE-2022-42890 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-44729/">CVE-2022-44729 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44729">CVE-2022-44729 at NVD</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2022-44730/">CVE-2022-44730 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44730">CVE-2022-44730 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850245" comment="xmlgraphics-batik-1.17-150200.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850246" comment="xmlgraphics-batik-css-1.17-150200.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850247" comment="xmlgraphics-batik-demo-1.17-150200.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850248" comment="xmlgraphics-batik-javadoc-1.17-150200.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850249" comment="xmlgraphics-batik-rasterizer-1.17-150200.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850250" comment="xmlgraphics-batik-slideshow-1.17-150200.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850251" comment="xmlgraphics-batik-squiggle-1.17-150200.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850252" comment="xmlgraphics-batik-svgpp-1.17-150200.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850253" comment="xmlgraphics-batik-ttf2svg-1.17-150200.4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5236" version="1" class="patch">
	<metadata>
		<title>Security update for go1.21 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1212475" ref_url="https://bugzilla.suse.com/1212475" source="BUGZILLA"/>
		<reference ref_id="1219988" ref_url="https://bugzilla.suse.com/1219988" source="BUGZILLA"/>
		<reference ref_id="1220999" ref_url="https://bugzilla.suse.com/1220999" source="BUGZILLA"/>
		<reference ref_id="1221000" ref_url="https://bugzilla.suse.com/1221000" source="BUGZILLA"/>
		<reference ref_id="1221001" ref_url="https://bugzilla.suse.com/1221001" source="BUGZILLA"/>
		<reference ref_id="1221002" ref_url="https://bugzilla.suse.com/1221002" source="BUGZILLA"/>
		<reference ref_id="1221003" ref_url="https://bugzilla.suse.com/1221003" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45289" ref_url="https://www.suse.com/security/cve/CVE-2023-45289/" source="CVE"/>
		<reference ref_id="CVE-2023-45290" ref_url="https://www.suse.com/security/cve/CVE-2023-45290/" source="CVE"/>
		<reference ref_id="CVE-2024-24783" ref_url="https://www.suse.com/security/cve/CVE-2024-24783/" source="CVE"/>
		<reference ref_id="CVE-2024-24784" ref_url="https://www.suse.com/security/cve/CVE-2024-24784/" source="CVE"/>
		<reference ref_id="CVE-2024-24785" ref_url="https://www.suse.com/security/cve/CVE-2024-24785/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018121.html" source="SUSE-SU"/>
		<description>
This update for go1.21 fixes the following issues:

- Upgrade go to version 1.21.8
- CVE-2023-45289: net/http, net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect (bsc#1221000)
- CVE-2023-45290: net/http: memory exhaustion in Request.ParseMultipartForm (bsc#1221001)
- CVE-2024-24783: crypto/x509: Verify panics on certificates with an unknown public key algorithm (bsc#1220999)
- CVE-2024-24784: net/mail: comments in display names are incorrectly handled (bsc#1221002)
- CVE-2024-24785: html/template: errors returned from MarshalJSON methods may break template escaping (bsc#1221003)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-08"/>
	<updated date="2024-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1212475">SUSE bug 1212475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219988">SUSE bug 1219988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220999">SUSE bug 1220999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221000">SUSE bug 1221000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221001">SUSE bug 1221001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221002">SUSE bug 1221002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221003">SUSE bug 1221003</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45289/">CVE-2023-45289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45289">CVE-2023-45289 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45290/">CVE-2023-45290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45290">CVE-2023-45290 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24783/">CVE-2024-24783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24783">CVE-2024-24783 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24784/">CVE-2024-24784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24784">CVE-2024-24784 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24785/">CVE-2024-24785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24785">CVE-2024-24785 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850295" comment="go1.21-1.21.8-150000.1.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850296" comment="go1.21-doc-1.21.8-150000.1.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850297" comment="go1.21-race-1.21.8-150000.1.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5237" version="1" class="patch">
	<metadata>
		<title>Security update for go1.22 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218424" ref_url="https://bugzilla.suse.com/1218424" source="BUGZILLA"/>
		<reference ref_id="1219988" ref_url="https://bugzilla.suse.com/1219988" source="BUGZILLA"/>
		<reference ref_id="1220999" ref_url="https://bugzilla.suse.com/1220999" source="BUGZILLA"/>
		<reference ref_id="1221000" ref_url="https://bugzilla.suse.com/1221000" source="BUGZILLA"/>
		<reference ref_id="1221001" ref_url="https://bugzilla.suse.com/1221001" source="BUGZILLA"/>
		<reference ref_id="1221002" ref_url="https://bugzilla.suse.com/1221002" source="BUGZILLA"/>
		<reference ref_id="1221003" ref_url="https://bugzilla.suse.com/1221003" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-45289" ref_url="https://www.suse.com/security/cve/CVE-2023-45289/" source="CVE"/>
		<reference ref_id="CVE-2023-45290" ref_url="https://www.suse.com/security/cve/CVE-2023-45290/" source="CVE"/>
		<reference ref_id="CVE-2024-24783" ref_url="https://www.suse.com/security/cve/CVE-2024-24783/" source="CVE"/>
		<reference ref_id="CVE-2024-24784" ref_url="https://www.suse.com/security/cve/CVE-2024-24784/" source="CVE"/>
		<reference ref_id="CVE-2024-24785" ref_url="https://www.suse.com/security/cve/CVE-2024-24785/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018122.html" source="SUSE-SU"/>
		<description>
This update for go1.22 fixes the following issues:

- Upgrade go to version 1.22.1
- CVE-2023-45289: net/http, net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect (bsc#1221000)
- CVE-2023-45290: net/http: memory exhaustion in Request.ParseMultipartForm (bsc#1221001)
- CVE-2024-24783: crypto/x509: Verify panics on certificates with an unknown public key algorithm (bsc#1220999)
- CVE-2024-24784: net/mail: comments in display names are incorrectly handled (bsc#1221002)
- CVE-2024-24785: html/template: errors returned from MarshalJSON methods may break template escaping (bsc#1221003)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-08"/>
	<updated date="2024-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218424">SUSE bug 1218424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219988">SUSE bug 1219988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220999">SUSE bug 1220999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221000">SUSE bug 1221000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221001">SUSE bug 1221001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221002">SUSE bug 1221002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221003">SUSE bug 1221003</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45289/">CVE-2023-45289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45289">CVE-2023-45289 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45290/">CVE-2023-45290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45290">CVE-2023-45290 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24783/">CVE-2024-24783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24783">CVE-2024-24783 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24784/">CVE-2024-24784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24784">CVE-2024-24784 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24785/">CVE-2024-24785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24785">CVE-2024-24785 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850298" comment="go1.22-1.22.1-150000.1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850299" comment="go1.22-doc-1.22.1-150000.1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850300" comment="go1.22-race-1.22.1-150000.1.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5238" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-3 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219243" ref_url="https://bugzilla.suse.com/1219243" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0727" ref_url="https://www.suse.com/security/cve/CVE-2024-0727/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018129.html" source="SUSE-SU"/>
		<description>
This update for openssl-3 fixes the following issues:

- CVE-2024-0727: Denial of service when processing a maliciously formatted PKCS12 file (bsc#1219243).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-08"/>
	<updated date="2024-03-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219243">SUSE bug 1219243</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-0727/">CVE-2024-0727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0727">CVE-2024-0727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850301" comment="libopenssl-3-devel-3.0.8-150500.5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850302" comment="libopenssl-3-devel-32bit-3.0.8-150500.5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850303" comment="libopenssl3-3.0.8-150500.5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850304" comment="libopenssl3-32bit-3.0.8-150500.5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850305" comment="openssl-3-3.0.8-150500.5.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850306" comment="openssl-3-doc-3.0.8-150500.5.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5239" version="1" class="patch">
	<metadata>
		<title>Security update for jetty-minimal (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220437" ref_url="https://bugzilla.suse.com/1220437" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-22201" ref_url="https://www.suse.com/security/cve/CVE-2024-22201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018126.html" source="SUSE-SU"/>
		<description>
This update for jetty-minimal fixes the following issues:

- CVE-2024-22201: Fixed denial-of-service via HTTP/2 connection leak (bsc#1220437).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-08"/>
	<updated date="2024-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220437">SUSE bug 1220437</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22201/">CVE-2024-22201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22201">CVE-2024-22201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850307" comment="jetty-annotations-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850308" comment="jetty-ant-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850309" comment="jetty-cdi-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850310" comment="jetty-client-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850311" comment="jetty-continuation-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850312" comment="jetty-deploy-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850313" comment="jetty-fcgi-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850314" comment="jetty-http-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850315" comment="jetty-http-spi-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850316" comment="jetty-io-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850317" comment="jetty-jaas-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850318" comment="jetty-jmx-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850319" comment="jetty-jndi-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850320" comment="jetty-jsp-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850321" comment="jetty-minimal-javadoc-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850322" comment="jetty-openid-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850323" comment="jetty-plus-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850324" comment="jetty-proxy-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850325" comment="jetty-quickstart-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850326" comment="jetty-rewrite-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850327" comment="jetty-security-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850328" comment="jetty-server-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850329" comment="jetty-servlet-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850330" comment="jetty-servlets-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850331" comment="jetty-start-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850332" comment="jetty-util-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850333" comment="jetty-util-ajax-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850334" comment="jetty-webapp-9.4.54-150200.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850335" comment="jetty-xml-9.4.54-150200.3.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5240" version="1" class="patch">
	<metadata>
		<title>Security update for python310 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219666" ref_url="https://bugzilla.suse.com/1219666" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-6597" ref_url="https://www.suse.com/security/cve/CVE-2023-6597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018123.html" source="SUSE-SU"/>
		<description>
This update for python310 fixes the following issues:

- CVE-2023-6597: Fixed symlink bug in cleanup of tempfile.TemporaryDirectory (bsc#1219666).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-08"/>
	<updated date="2024-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219666">SUSE bug 1219666</bugzilla>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6597/">CVE-2023-6597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6597">CVE-2023-6597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850336" comment="libpython3_10-1_0-3.10.13-150400.4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850337" comment="libpython3_10-1_0-32bit-3.10.13-150400.4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850338" comment="python310-3.10.13-150400.4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850339" comment="python310-32bit-3.10.13-150400.4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850340" comment="python310-base-3.10.13-150400.4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850341" comment="python310-base-32bit-3.10.13-150400.4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850342" comment="python310-curses-3.10.13-150400.4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850343" comment="python310-dbm-3.10.13-150400.4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850344" comment="python310-devel-3.10.13-150400.4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850345" comment="python310-doc-3.10.13-150400.4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850346" comment="python310-doc-devhelp-3.10.13-150400.4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850347" comment="python310-idle-3.10.13-150400.4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850348" comment="python310-testsuite-3.10.13-150400.4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850349" comment="python310-tk-3.10.13-150400.4.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850350" comment="python310-tools-3.10.13-150400.4.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5241" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1218851" ref_url="https://bugzilla.suse.com/1218851" source="BUGZILLA"/>
		<reference ref_id="1219080" ref_url="https://bugzilla.suse.com/1219080" source="BUGZILLA"/>
		<reference ref_id="1219885" ref_url="https://bugzilla.suse.com/1219885" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-46839" ref_url="https://www.suse.com/security/cve/CVE-2023-46839/" source="CVE"/>
		<reference ref_id="CVE-2023-46840" ref_url="https://www.suse.com/security/cve/CVE-2023-46840/" source="CVE"/>
		<reference ref_id="CVE-2023-46841" ref_url="https://www.suse.com/security/cve/CVE-2023-46841/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018142.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2023-46839: Fixed memory access through PCI device with phantom functions (XSA-449) (bsc#1218851).
- CVE-2023-46840: Fixed Failure to quarantine devices in !HVM builds (XSA-450) (bsc#1219080).
- CVE-2023-46841: Fixed shadow stack vs exceptions from emulation stubs (XSA-451) (bsc#1219885).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-11"/>
	<updated date="2024-03-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218851">SUSE bug 1218851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219080">SUSE bug 1219080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219885">SUSE bug 1219885</bugzilla>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-46839/">CVE-2023-46839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46839">CVE-2023-46839 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46840/">CVE-2023-46840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46840">CVE-2023-46840 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46841/">CVE-2023-46841 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46841">CVE-2023-46841 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850421" comment="xen-4.17.3_06-150500.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850422" comment="xen-devel-4.17.3_06-150500.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850423" comment="xen-doc-html-4.17.3_06-150500.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850424" comment="xen-libs-4.17.3_06-150500.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850425" comment="xen-libs-32bit-4.17.3_06-150500.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850426" comment="xen-tools-4.17.3_06-150500.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850427" comment="xen-tools-domU-4.17.3_06-150500.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850428" comment="xen-tools-xendomains-wait-disk-4.17.3_06-150500.3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5242" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_0_0 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219243" ref_url="https://bugzilla.suse.com/1219243" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0727" ref_url="https://www.suse.com/security/cve/CVE-2024-0727/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018141.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_0_0 fixes the following issues:

- CVE-2024-0727: Denial of service when processing a maliciously formatted PKCS12 file (bsc#1219243).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-11"/>
	<updated date="2024-03-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219243">SUSE bug 1219243</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-0727/">CVE-2024-0727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0727">CVE-2024-0727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850429" comment="libopenssl-1_0_0-devel-1.0.2p-150000.3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850430" comment="libopenssl-1_0_0-devel-32bit-1.0.2p-150000.3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850431" comment="libopenssl10-1.0.2p-150000.3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850432" comment="libopenssl1_0_0-1.0.2p-150000.3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850433" comment="libopenssl1_0_0-32bit-1.0.2p-150000.3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850434" comment="libopenssl1_0_0-hmac-1.0.2p-150000.3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850435" comment="libopenssl1_0_0-hmac-32bit-1.0.2p-150000.3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850436" comment="libopenssl1_0_0-steam-1.0.2p-150000.3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850437" comment="libopenssl1_0_0-steam-32bit-1.0.2p-150000.3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850438" comment="openssl-1_0_0-1.0.2p-150000.3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850439" comment="openssl-1_0_0-cavs-1.0.2p-150000.3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850440" comment="openssl-1_0_0-doc-1.0.2p-150000.3.91.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5243" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218903" ref_url="https://bugzilla.suse.com/1218903" source="BUGZILLA"/>
		<reference ref_id="1218905" ref_url="https://bugzilla.suse.com/1218905" source="BUGZILLA"/>
		<reference ref_id="1218906" ref_url="https://bugzilla.suse.com/1218906" source="BUGZILLA"/>
		<reference ref_id="1218907" ref_url="https://bugzilla.suse.com/1218907" source="BUGZILLA"/>
		<reference ref_id="1218909" ref_url="https://bugzilla.suse.com/1218909" source="BUGZILLA"/>
		<reference ref_id="1218911" ref_url="https://bugzilla.suse.com/1218911" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918/" source="CVE"/>
		<reference ref_id="CVE-2024-20919" ref_url="https://www.suse.com/security/cve/CVE-2024-20919/" source="CVE"/>
		<reference ref_id="CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921/" source="CVE"/>
		<reference ref_id="CVE-2024-20926" ref_url="https://www.suse.com/security/cve/CVE-2024-20926/" source="CVE"/>
		<reference ref_id="CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945/" source="CVE"/>
		<reference ref_id="CVE-2024-20952" ref_url="https://www.suse.com/security/cve/CVE-2024-20952/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018149.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- CVE-2024-20952: Fixed RSA padding issue and timing side-channel attack against TLS (8317547) (bsc#1218911).
- CVE-2024-20921: Fixed range check loop optimization issue (8314307) (bsc#1218905).
- CVE-2024-20926: Fixed rbitrary Java code execution in Nashorn (8314284) (bsc#1218906).
- CVE-2024-20919: Fixed JVM class file verifier flaw allows unverified byte code execution (8314295) (bsc#1218903).
- CVE-2024-20918: Fixed array out-of-bounds access due to missing range check in C1 compiler (8314468) (bsc#1218907).
- CVE-2024-20945: Fixed logging of digital signature private keys (8316976) (bsc#1218909).

Update to version jdk8u402 (icedtea-3.30.0).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-12"/>
	<updated date="2024-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1218903">SUSE bug 1218903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218905">SUSE bug 1218905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218906">SUSE bug 1218906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218907">SUSE bug 1218907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218909">SUSE bug 1218909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218911">SUSE bug 1218911</bugzilla>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20919/">CVE-2024-20919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20919">CVE-2024-20919 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20926/">CVE-2024-20926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20926">CVE-2024-20926 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20952/">CVE-2024-20952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850474" comment="java-1_8_0-openjdk-1.8.0.402-150000.3.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850475" comment="java-1_8_0-openjdk-accessibility-1.8.0.402-150000.3.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850476" comment="java-1_8_0-openjdk-demo-1.8.0.402-150000.3.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850477" comment="java-1_8_0-openjdk-devel-1.8.0.402-150000.3.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850478" comment="java-1_8_0-openjdk-headless-1.8.0.402-150000.3.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850479" comment="java-1_8_0-openjdk-javadoc-1.8.0.402-150000.3.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850480" comment="java-1_8_0-openjdk-src-1.8.0.402-150000.3.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5244" version="1" class="patch">
	<metadata>
		<title>Security update for axis (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218605" ref_url="https://bugzilla.suse.com/1218605" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-51441" ref_url="https://www.suse.com/security/cve/CVE-2023-51441/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018146.html" source="SUSE-SU"/>
		<description>
This update for axis fixes the following issues:


- CVE-2023-51441: Fixed SSRF when untrusted input is passed to the service admin HTTP API (bsc#1218605).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-12"/>
	<updated date="2024-03-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218605">SUSE bug 1218605</bugzilla>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-51441/">CVE-2023-51441 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51441">CVE-2023-51441 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850481" comment="axis-1.4-150200.13.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850482" comment="axis-manual-1.4-150200.13.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5245" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1206453" ref_url="https://bugzilla.suse.com/1206453" source="BUGZILLA"/>
		<reference ref_id="1209412" ref_url="https://bugzilla.suse.com/1209412" source="BUGZILLA"/>
		<reference ref_id="1216776" ref_url="https://bugzilla.suse.com/1216776" source="BUGZILLA"/>
		<reference ref_id="1217927" ref_url="https://bugzilla.suse.com/1217927" source="BUGZILLA"/>
		<reference ref_id="1218195" ref_url="https://bugzilla.suse.com/1218195" source="BUGZILLA"/>
		<reference ref_id="1218216" ref_url="https://bugzilla.suse.com/1218216" source="BUGZILLA"/>
		<reference ref_id="1218450" ref_url="https://bugzilla.suse.com/1218450" source="BUGZILLA"/>
		<reference ref_id="1218527" ref_url="https://bugzilla.suse.com/1218527" source="BUGZILLA"/>
		<reference ref_id="1218562" ref_url="https://bugzilla.suse.com/1218562" source="BUGZILLA"/>
		<reference ref_id="1218663" ref_url="https://bugzilla.suse.com/1218663" source="BUGZILLA"/>
		<reference ref_id="1218915" ref_url="https://bugzilla.suse.com/1218915" source="BUGZILLA"/>
		<reference ref_id="1219126" ref_url="https://bugzilla.suse.com/1219126" source="BUGZILLA"/>
		<reference ref_id="1219127" ref_url="https://bugzilla.suse.com/1219127" source="BUGZILLA"/>
		<reference ref_id="1219141" ref_url="https://bugzilla.suse.com/1219141" source="BUGZILLA"/>
		<reference ref_id="1219146" ref_url="https://bugzilla.suse.com/1219146" source="BUGZILLA"/>
		<reference ref_id="1219295" ref_url="https://bugzilla.suse.com/1219295" source="BUGZILLA"/>
		<reference ref_id="1219443" ref_url="https://bugzilla.suse.com/1219443" source="BUGZILLA"/>
		<reference ref_id="1219653" ref_url="https://bugzilla.suse.com/1219653" source="BUGZILLA"/>
		<reference ref_id="1219827" ref_url="https://bugzilla.suse.com/1219827" source="BUGZILLA"/>
		<reference ref_id="1219835" ref_url="https://bugzilla.suse.com/1219835" source="BUGZILLA"/>
		<reference ref_id="1219839" ref_url="https://bugzilla.suse.com/1219839" source="BUGZILLA"/>
		<reference ref_id="1219840" ref_url="https://bugzilla.suse.com/1219840" source="BUGZILLA"/>
		<reference ref_id="1219934" ref_url="https://bugzilla.suse.com/1219934" source="BUGZILLA"/>
		<reference ref_id="1220003" ref_url="https://bugzilla.suse.com/1220003" source="BUGZILLA"/>
		<reference ref_id="1220009" ref_url="https://bugzilla.suse.com/1220009" source="BUGZILLA"/>
		<reference ref_id="1220021" ref_url="https://bugzilla.suse.com/1220021" source="BUGZILLA"/>
		<reference ref_id="1220030" ref_url="https://bugzilla.suse.com/1220030" source="BUGZILLA"/>
		<reference ref_id="1220106" ref_url="https://bugzilla.suse.com/1220106" source="BUGZILLA"/>
		<reference ref_id="1220140" ref_url="https://bugzilla.suse.com/1220140" source="BUGZILLA"/>
		<reference ref_id="1220187" ref_url="https://bugzilla.suse.com/1220187" source="BUGZILLA"/>
		<reference ref_id="1220238" ref_url="https://bugzilla.suse.com/1220238" source="BUGZILLA"/>
		<reference ref_id="1220240" ref_url="https://bugzilla.suse.com/1220240" source="BUGZILLA"/>
		<reference ref_id="1220241" ref_url="https://bugzilla.suse.com/1220241" source="BUGZILLA"/>
		<reference ref_id="1220243" ref_url="https://bugzilla.suse.com/1220243" source="BUGZILLA"/>
		<reference ref_id="1220250" ref_url="https://bugzilla.suse.com/1220250" source="BUGZILLA"/>
		<reference ref_id="1220251" ref_url="https://bugzilla.suse.com/1220251" source="BUGZILLA"/>
		<reference ref_id="1220253" ref_url="https://bugzilla.suse.com/1220253" source="BUGZILLA"/>
		<reference ref_id="1220254" ref_url="https://bugzilla.suse.com/1220254" source="BUGZILLA"/>
		<reference ref_id="1220255" ref_url="https://bugzilla.suse.com/1220255" source="BUGZILLA"/>
		<reference ref_id="1220257" ref_url="https://bugzilla.suse.com/1220257" source="BUGZILLA"/>
		<reference ref_id="1220267" ref_url="https://bugzilla.suse.com/1220267" source="BUGZILLA"/>
		<reference ref_id="1220277" ref_url="https://bugzilla.suse.com/1220277" source="BUGZILLA"/>
		<reference ref_id="1220317" ref_url="https://bugzilla.suse.com/1220317" source="BUGZILLA"/>
		<reference ref_id="1220325" ref_url="https://bugzilla.suse.com/1220325" source="BUGZILLA"/>
		<reference ref_id="1220326" ref_url="https://bugzilla.suse.com/1220326" source="BUGZILLA"/>
		<reference ref_id="1220328" ref_url="https://bugzilla.suse.com/1220328" source="BUGZILLA"/>
		<reference ref_id="1220330" ref_url="https://bugzilla.suse.com/1220330" source="BUGZILLA"/>
		<reference ref_id="1220335" ref_url="https://bugzilla.suse.com/1220335" source="BUGZILLA"/>
		<reference ref_id="1220344" ref_url="https://bugzilla.suse.com/1220344" source="BUGZILLA"/>
		<reference ref_id="1220348" ref_url="https://bugzilla.suse.com/1220348" source="BUGZILLA"/>
		<reference ref_id="1220350" ref_url="https://bugzilla.suse.com/1220350" source="BUGZILLA"/>
		<reference ref_id="1220364" ref_url="https://bugzilla.suse.com/1220364" source="BUGZILLA"/>
		<reference ref_id="1220392" ref_url="https://bugzilla.suse.com/1220392" source="BUGZILLA"/>
		<reference ref_id="1220393" ref_url="https://bugzilla.suse.com/1220393" source="BUGZILLA"/>
		<reference ref_id="1220398" ref_url="https://bugzilla.suse.com/1220398" source="BUGZILLA"/>
		<reference ref_id="1220409" ref_url="https://bugzilla.suse.com/1220409" source="BUGZILLA"/>
		<reference ref_id="1220433" ref_url="https://bugzilla.suse.com/1220433" source="BUGZILLA"/>
		<reference ref_id="1220444" ref_url="https://bugzilla.suse.com/1220444" source="BUGZILLA"/>
		<reference ref_id="1220457" ref_url="https://bugzilla.suse.com/1220457" source="BUGZILLA"/>
		<reference ref_id="1220459" ref_url="https://bugzilla.suse.com/1220459" source="BUGZILLA"/>
		<reference ref_id="1220469" ref_url="https://bugzilla.suse.com/1220469" source="BUGZILLA"/>
		<reference ref_id="1220649" ref_url="https://bugzilla.suse.com/1220649" source="BUGZILLA"/>
		<reference ref_id="1220735" ref_url="https://bugzilla.suse.com/1220735" source="BUGZILLA"/>
		<reference ref_id="1220736" ref_url="https://bugzilla.suse.com/1220736" source="BUGZILLA"/>
		<reference ref_id="1220796" ref_url="https://bugzilla.suse.com/1220796" source="BUGZILLA"/>
		<reference ref_id="1220825" ref_url="https://bugzilla.suse.com/1220825" source="BUGZILLA"/>
		<reference ref_id="1220845" ref_url="https://bugzilla.suse.com/1220845" source="BUGZILLA"/>
		<reference ref_id="1220848" ref_url="https://bugzilla.suse.com/1220848" source="BUGZILLA"/>
		<reference ref_id="1220917" ref_url="https://bugzilla.suse.com/1220917" source="BUGZILLA"/>
		<reference ref_id="1220930" ref_url="https://bugzilla.suse.com/1220930" source="BUGZILLA"/>
		<reference ref_id="1220931" ref_url="https://bugzilla.suse.com/1220931" source="BUGZILLA"/>
		<reference ref_id="1220933" ref_url="https://bugzilla.suse.com/1220933" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25162" ref_url="https://www.suse.com/security/cve/CVE-2019-25162/" source="CVE"/>
		<reference ref_id="CVE-2021-46923" ref_url="https://www.suse.com/security/cve/CVE-2021-46923/" source="CVE"/>
		<reference ref_id="CVE-2021-46924" ref_url="https://www.suse.com/security/cve/CVE-2021-46924/" source="CVE"/>
		<reference ref_id="CVE-2021-46932" ref_url="https://www.suse.com/security/cve/CVE-2021-46932/" source="CVE"/>
		<reference ref_id="CVE-2021-46934" ref_url="https://www.suse.com/security/cve/CVE-2021-46934/" source="CVE"/>
		<reference ref_id="CVE-2021-47083" ref_url="https://www.suse.com/security/cve/CVE-2021-47083/" source="CVE"/>
		<reference ref_id="CVE-2022-48627" ref_url="https://www.suse.com/security/cve/CVE-2022-48627/" source="CVE"/>
		<reference ref_id="CVE-2022-48628" ref_url="https://www.suse.com/security/cve/CVE-2022-48628/" source="CVE"/>
		<reference ref_id="CVE-2023-5197" ref_url="https://www.suse.com/security/cve/CVE-2023-5197/" source="CVE"/>
		<reference ref_id="CVE-2023-52340" ref_url="https://www.suse.com/security/cve/CVE-2023-52340/" source="CVE"/>
		<reference ref_id="CVE-2023-52429" ref_url="https://www.suse.com/security/cve/CVE-2023-52429/" source="CVE"/>
		<reference ref_id="CVE-2023-52439" ref_url="https://www.suse.com/security/cve/CVE-2023-52439/" source="CVE"/>
		<reference ref_id="CVE-2023-52443" ref_url="https://www.suse.com/security/cve/CVE-2023-52443/" source="CVE"/>
		<reference ref_id="CVE-2023-52445" ref_url="https://www.suse.com/security/cve/CVE-2023-52445/" source="CVE"/>
		<reference ref_id="CVE-2023-52447" ref_url="https://www.suse.com/security/cve/CVE-2023-52447/" source="CVE"/>
		<reference ref_id="CVE-2023-52448" ref_url="https://www.suse.com/security/cve/CVE-2023-52448/" source="CVE"/>
		<reference ref_id="CVE-2023-52449" ref_url="https://www.suse.com/security/cve/CVE-2023-52449/" source="CVE"/>
		<reference ref_id="CVE-2023-52451" ref_url="https://www.suse.com/security/cve/CVE-2023-52451/" source="CVE"/>
		<reference ref_id="CVE-2023-52452" ref_url="https://www.suse.com/security/cve/CVE-2023-52452/" source="CVE"/>
		<reference ref_id="CVE-2023-52456" ref_url="https://www.suse.com/security/cve/CVE-2023-52456/" source="CVE"/>
		<reference ref_id="CVE-2023-52457" ref_url="https://www.suse.com/security/cve/CVE-2023-52457/" source="CVE"/>
		<reference ref_id="CVE-2023-52462" ref_url="https://www.suse.com/security/cve/CVE-2023-52462/" source="CVE"/>
		<reference ref_id="CVE-2023-52463" ref_url="https://www.suse.com/security/cve/CVE-2023-52463/" source="CVE"/>
		<reference ref_id="CVE-2023-52464" ref_url="https://www.suse.com/security/cve/CVE-2023-52464/" source="CVE"/>
		<reference ref_id="CVE-2023-52467" ref_url="https://www.suse.com/security/cve/CVE-2023-52467/" source="CVE"/>
		<reference ref_id="CVE-2023-52475" ref_url="https://www.suse.com/security/cve/CVE-2023-52475/" source="CVE"/>
		<reference ref_id="CVE-2023-52478" ref_url="https://www.suse.com/security/cve/CVE-2023-52478/" source="CVE"/>
		<reference ref_id="CVE-2023-52482" ref_url="https://www.suse.com/security/cve/CVE-2023-52482/" source="CVE"/>
		<reference ref_id="CVE-2023-52530" ref_url="https://www.suse.com/security/cve/CVE-2023-52530/" source="CVE"/>
		<reference ref_id="CVE-2023-52531" ref_url="https://www.suse.com/security/cve/CVE-2023-52531/" source="CVE"/>
		<reference ref_id="CVE-2023-52559" ref_url="https://www.suse.com/security/cve/CVE-2023-52559/" source="CVE"/>
		<reference ref_id="CVE-2023-6270" ref_url="https://www.suse.com/security/cve/CVE-2023-6270/" source="CVE"/>
		<reference ref_id="CVE-2023-6817" ref_url="https://www.suse.com/security/cve/CVE-2023-6817/" source="CVE"/>
		<reference ref_id="CVE-2024-0607" ref_url="https://www.suse.com/security/cve/CVE-2024-0607/" source="CVE"/>
		<reference ref_id="CVE-2024-1151" ref_url="https://www.suse.com/security/cve/CVE-2024-1151/" source="CVE"/>
		<reference ref_id="CVE-2024-23849" ref_url="https://www.suse.com/security/cve/CVE-2024-23849/" source="CVE"/>
		<reference ref_id="CVE-2024-23850" ref_url="https://www.suse.com/security/cve/CVE-2024-23850/" source="CVE"/>
		<reference ref_id="CVE-2024-23851" ref_url="https://www.suse.com/security/cve/CVE-2024-23851/" source="CVE"/>
		<reference ref_id="CVE-2024-25744" ref_url="https://www.suse.com/security/cve/CVE-2024-25744/" source="CVE"/>
		<reference ref_id="CVE-2024-26585" ref_url="https://www.suse.com/security/cve/CVE-2024-26585/" source="CVE"/>
		<reference ref_id="CVE-2024-26586" ref_url="https://www.suse.com/security/cve/CVE-2024-26586/" source="CVE"/>
		<reference ref_id="CVE-2024-26589" ref_url="https://www.suse.com/security/cve/CVE-2024-26589/" source="CVE"/>
		<reference ref_id="CVE-2024-26591" ref_url="https://www.suse.com/security/cve/CVE-2024-26591/" source="CVE"/>
		<reference ref_id="CVE-2024-26593" ref_url="https://www.suse.com/security/cve/CVE-2024-26593/" source="CVE"/>
		<reference ref_id="CVE-2024-26595" ref_url="https://www.suse.com/security/cve/CVE-2024-26595/" source="CVE"/>
		<reference ref_id="CVE-2024-26598" ref_url="https://www.suse.com/security/cve/CVE-2024-26598/" source="CVE"/>
		<reference ref_id="CVE-2024-26602" ref_url="https://www.suse.com/security/cve/CVE-2024-26602/" source="CVE"/>
		<reference ref_id="CVE-2024-26603" ref_url="https://www.suse.com/security/cve/CVE-2024-26603/" source="CVE"/>
		<reference ref_id="CVE-2024-26607" ref_url="https://www.suse.com/security/cve/CVE-2024-26607/" source="CVE"/>
		<reference ref_id="CVE-2024-26622" ref_url="https://www.suse.com/security/cve/CVE-2024-26622/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 Azure kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2023-6270: Fixed a use-after-free bug in aoecmd_cfg_pkts (bsc#1218562).
- CVE-2023-52559: Fixed a bug by avoiding memory allocation in iommu_suspend (bsc#1220933).
- CVE-2023-52462: Fixed a security check for attempt to corrupt spilled pointer (bsc#1220325).
- CVE-2023-52467: Fixed a null pointer dereference in of_syscon_register (bsc#1220433).
- CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328).
- CVE-2023-52530: Fixed a potential key use-after-free in wifi mac80211 (bsc#1220930).
- CVE-2024-26607: Fixed a probing race issue in sii902x: (bsc#1220736).
- CVE-2024-26591: Fixed re-attachment branch in bpf_tracing_prog_attach  (bsc#1220254).
- CVE-2024-26589: Fixed out of bounds read due to variable offset alu on PTR_TO_FLOW_KEYS (bsc#1220255).
- CVE-2024-26585: Fixed race between tx work scheduling and socket close  (bsc#1220187).
- CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU (bsc#1219295).
- CVE-2024-0607: Fixed 64-bit load issue in  nft_byteorder_eval() (bsc#1218915).
- CVE-2023-6817: Fixed use-after-free in nft_pipapo_walk (bsc#1218195).
- CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220825).
- CVE-2024-23850: Fixed double free of anonymous device after snapshot  creation failure (bsc#1219126).
- CVE-2023-52452: Fixed Fix accesses to uninit stack slots (bsc#1220257).
- CVE-2023-52457: Fixed skipped resource freeing if  pm_runtime_resume_and_get() failed (bsc#1220350).
- CVE-2023-52456: Fixed tx statemachine deadlock (bsc#1220364).
- CVE-2023-52451: Fixed access beyond end of drmem array  (bsc#1220250).
- CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround  (bsc#1220251).
- CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier  (bsc#1220238).
- CVE-2021-46923: Fixed reference leakage in fs/mount_setattr (bsc#1220457).
- CVE-2024-26598: Fixed potential UAF in LPI translation  cache (bsc#1220326).
- CVE-2024-26603: Fixed infinite loop via #PF handling (bsc#1220335).
- CVE-2023-52445: Fixed use after free on context disconnection (bsc#1220241).
- CVE-2023-52439: Fixed use-after-free in uio_open (bsc#1220140).
- CVE-2023-52443: Fixed crash when parsed profile name is empty  (bsc#1220240).
- CVE-2024-26593: Fixed block process call transactions (bsc#1220009).
- CVE-2024-26586: Fixed stack corruption (bsc#1220243).
- CVE-2024-26595: Fixed NULL pointer dereference in  error path (bsc#1220344).
- CVE-2023-52464: Fixed possible out-of-bounds string access (bsc#1220330)
- CVE-2023-52448: Fixed kernel NULL pointer dereference in gfs2_rgrp_dump  (bsc#1220253).
- CVE-2024-1151: Fixed unlimited number of recursions from action  sets (bsc#1219835).
- CVE-2023-5197: Fixed se-after-free due to addition and removal of rules from chain bindings within the same transaction (bsc#1218216).
- CVE-2024-23849: Fixed array-index-out-of-bounds in rds_cmsg_recv  (bsc#1219127).
- CVE-2023-52429: Fixed potential DoS in dm_table_create in drivers/md/dm-table.c (bsc#1219827).
- CVE-2024-23851: Fixed crash in copy_params in drivers/md/dm-ioctl.c (bsc#1219146).

The following non-security bugs were fixed:

- ACPI: APEI: set memory failure flags as MF_ACTION_REQUIRED on synchronous events (git-fixes).
- ACPI: button: Add lid disable DMI quirk for Nextbook Ares 8A (git-fixes).
- ACPI: extlog: fix NULL pointer dereference check (git-fixes).
- ACPI: resource: Add ASUS model S5402ZA to quirks (git-fixes).
- ACPI: resource: Skip IRQ override on ASUS ExpertBook B1502CBA (git-fixes).
- ACPI: resource: Skip IRQ override on Asus Expertbook B2402CBA (git-fixes).
- ACPI: video: Add backlight=native DMI quirk for Apple iMac11,3 (git-fixes).
- ACPI: video: Add backlight=native DMI quirk for Apple iMac12,1 and iMac12,2 (git-fixes).
- ACPI: video: Add backlight=native DMI quirk for Lenovo ThinkPad X131e (3371 AMD version) (git-fixes).
- ACPI: video: Add quirk for the Colorful X15 AT 23 Laptop (git-fixes).
- afs: fix the usage of read_seqbegin_or_lock() in afs_find_server*() (git-fixes).
- afs: fix the usage of read_seqbegin_or_lock() in afs_lookup_volume_rcu() (git-fixes).
- afs: Hide silly-rename files from userspace (git-fixes).
- afs: Increase buffer size in afs_update_volume_status() (git-fixes).
- ahci: asm1166: correct count of reported ports (git-fixes).
- ALSA: Drop leftover snd-rtctimer stuff from Makefile (git-fixes).
- ALSA: firewire-lib: fix to check cycle continuity (git-fixes).
- ALSA: hda/conexant: Add quirk for SWS JS201D (git-fixes).
- ALSA: hda/realtek: Apply headset jack quirk for non-bass alc287 thinkpads (git-fixes).
- ALSA: hda/realtek: cs35l41: Fix device ID / model name (git-fixes).
- ALSA: hda/realtek: cs35l41: Fix order and duplicates in quirks table (git-fixes).
- ALSA: hda/realtek: Enable headset mic on Vaio VJFE-ADL (git-fixes).
- ALSA: hda/realtek: Enable Mute LED on HP Laptop 14-fq0xxx (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LED For HP mt645 (git-fixes).
- ALSA: hda/realtek: fix mute/micmute LEDs for HP ZBook Power (git-fixes).
- ALSA: hda/realtek: Fix the external mic not being recognised for Acer Swift 1 SF114-32 (git-fixes).
- ALSA: usb-audio: Add a quirk for Yamaha YIT-W12TX transmitter (git-fixes).
- ALSA: usb-audio: Add delay quirk for MOTU M Series 2nd revision (git-fixes).
- ALSA: usb-audio: add quirk for RODE NT-USB+ (git-fixes).
- ALSA: usb-audio: Check presence of valid altsetting control (git-fixes).
- ALSA: usb-audio: Ignore clock selector errors for single connection (git-fixes).
- ALSA: usb-audio: More relaxed check of MIDI jack names (git-fixes).
- ALSA: usb-audio: Sort quirk table entries (git-fixes).
- arm64: entry: fix ARM64_WORKAROUND_SPECULATIVE_UNPRIV_LOAD (bsc#1219443)
- arm64: entry: Preserve/restore X29 even for compat tasks (bsc#1219443)
- arm64: entry: Simplify tramp_alias macro and tramp_exit routine (bsc#1219443)
- arm64: errata: Add Cortex-A510 speculative unprivileged load (bsc#1219443) Enable workaround.
- arm64: errata: Add Cortex-A520 speculative unprivileged load (bsc#1219443) Enable workaround without kABI break.
- arm64: errata: Mitigate Ampere1 erratum AC03_CPU_38 at stage-2 (git-fixes) Enable AMPERE_ERRATUM_AC03_CPU_38 workaround without kABI break
- arm64: irq: set the correct node for shadow call stack (git-fixes)
- arm64: irq: set the correct node for VMAP stack (git-fixes)
- arm64: Rename ARM64_WORKAROUND_2966298 (bsc#1219443)
- arm64: Subscribe Microsoft Azure Cobalt 100 to ARM Neoverse N2 errata (git-fixes)
- ASoC: doc: Fix undefined SND_SOC_DAPM_NOPM argument (git-fixes).
- ASoC: rt5645: Fix deadlock in rt5645_jack_detect_work() (git-fixes).
- ASoC: SOF: IPC3: fix message bounds on ipc ops (git-fixes).
- ASoC: sunxi: sun4i-spdif: Add support for Allwinner H616 (git-fixes).
- atm: idt77252: fix a memleak in open_card_ubr0 (git-fixes).
- Bluetooth: Avoid potential use-after-free in hci_error_reset (git-fixes).
- Bluetooth: Enforce validation on max value of connection interval (git-fixes).
- Bluetooth: hci_event: Fix handling of HCI_EV_IO_CAPA_REQUEST (git-fixes).
- Bluetooth: hci_event: Fix wrongly recorded wakeup BD_ADDR (git-fixes).
- Bluetooth: hci_sync: Check the correct flag before starting a scan (git-fixes).
- Bluetooth: hci_sync: Fix accept_list when attempting to suspend (git-fixes).
- Bluetooth: L2CAP: Fix possible multiple reject send (git-fixes).
- Bluetooth: qca: Fix wrong event type for patch config command (git-fixes).
- bpf: Fix verification of indirect var-off stack access (git-fixes).
- bpf: Fix verification of indirect var-off stack access (git-fixes).
- bpf: Guard stack limits against 32bit overflow (git-fixes).
- bpf: Guard stack limits against 32bit overflow (git-fixes).
- bpf: Minor logging improvement (bsc#1220257).
- bus: moxtet: Add spi device table (git-fixes).
- cachefiles: fix memory leak in cachefiles_add_cache() (bsc#1220267).
- can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER) (git-fixes).
- crypto: api - Disallow identical driver names (git-fixes).
- crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked (git-fixes).
- crypto: octeontx2 - Fix cptvf driver cleanup (git-fixes).
- crypto: stm32/crc32 - fix parsing list of devices (git-fixes).
- dmaengine: fsl-qdma: Fix a memory leak related to the queue command DMA (git-fixes).
- dmaengine: fsl-qdma: fix SoC may hang on 16 byte unaligned read (git-fixes).
- dmaengine: fsl-qdma: increase size of 'irq_name' (git-fixes).
- dmaengine: fsl-qdma: init irq after reg initialization (git-fixes).
- dmaengine: ptdma: use consistent DMA masks (git-fixes).
- dmaengine: shdma: increase size of 'dev_id' (git-fixes).
- dmaengine: ti: edma: Add some null pointer checks to the edma_probe (git-fixes).
- driver core: Fix device_link_flag_is_sync_state_only() (git-fixes).
- drm/amd/display: Fix memory leak in dm_sw_fini() (git-fixes).
- drm/amd/display: Fix possible buffer overflow in 'find_dcfclk_for_voltage()' (git-fixes).
- drm/amd/display: Fix possible NULL dereference on device remove/driver unload (git-fixes).
- drm/amd/display: Increase frame-larger-than for all display_mode_vba files (git-fixes).
- drm/amd/display: increased min_dcfclk_mhz and min_fclk_mhz (git-fixes).
- drm/amd/display: Preserve original aspect ratio in create stream (git-fixes).
- drm/amdgpu: reset gpu for s3 suspend abort case (git-fixes).
- drm/amdgpu: skip to program GFXDEC registers for suspend abort (git-fixes).
- drm/amdgpu/display: Initialize gamma correction mode variable in dcn30_get_gamcor_current() (git-fixes).
- drm/buddy: fix range bias (git-fixes).
- drm/crtc: fix uninitialized variable use even harder (git-fixes).
- drm/i915/gvt: Fix uninitialized variable in handle_mmio() (git-fixes).
- drm/msm/dp: return correct Colorimetry for DP_TEST_DYNAMIC_RANGE_CEA case (git-fixes).
- drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup (git-fixes).
- drm/msms/dp: fixed link clock divider bits be over written in BPC unknown case (git-fixes).
- drm/prime: Support page array &gt;= 4GB (git-fixes).
- drm/syncobj: call drm_syncobj_fence_add_wait when WAIT_AVAILABLE flag is set (git-fixes).
- drm/ttm: Fix an invalid freeing on already freed page in error path (git-fixes).
- efi: Do not add memblocks for soft-reserved memory (git-fixes).
- efi: runtime: Fix potential overflow of soft-reserved region size (git-fixes).
- efi/capsule-loader: fix incorrect allocation size (git-fixes).
- fbcon: always restore the old font data in fbcon_do_set_font() (git-fixes).
- fbdev: savage: Error out if pixclock equals zero (git-fixes).
- fbdev: sis: Error out if pixclock equals zero (git-fixes).
- firewire: core: send bus reset promptly on gap count error (git-fixes).
- fs: dlm: fix build with CONFIG_IPV6 disabled (git-fixes).
- fs: JFS: UBSAN: array-index-out-of-bounds in dbAdjTree (git-fixes).
- gpio: 74x164: Enable output pins after registers are reset (git-fixes).
- gpio: fix resource unwinding order in error path (git-fixes).
- gpiolib: acpi: Ignore touchpad wakeup on GPD G1619-04 (git-fixes).
- gpiolib: Fix the error path order in gpiochip_add_data_with_key() (git-fixes).
- HID: apple: Add 2021 magic keyboard FN key mapping (git-fixes).
- HID: apple: Add support for the 2021 Magic Keyboard (git-fixes).
- HID: wacom: Do not register input devices until after hid_hw_start (git-fixes).
- HID: wacom: generic: Avoid reporting a serial of '0' to userspace (git-fixes).
- hwmon: (aspeed-pwm-tacho) mutex for tach reading (git-fixes).
- hwmon: (coretemp) Enlarge per package core count limit (git-fixes).
- hwmon: (coretemp) Fix bogus core_id to attr name mapping (git-fixes).
- hwmon: (coretemp) Fix out-of-bounds memory access (git-fixes).
- i2c: i801: Fix block process call transactions (git-fixes).
- i2c: i801: Remove i801_set_block_buffer_mode (git-fixes).
- i2c: imx: Add timer for handling the stop condition (git-fixes).
- i2c: imx: when being a target, mark the last read as processed (git-fixes).
- i3c: master: cdns: Update maximum prescaler value for i2c clock (git-fixes).
- IB/hfi1: Fix a memleak in init_credit_return (git-fixes)
- IB/hfi1: Fix sdma.h tx-&gt;num_descs off-by-one error (git-fixes)
- iio: accel: bma400: Fix a compilation problem (git-fixes).
- iio: adc: ad7091r: Set alert bit in config register (git-fixes).
- iio: core: fix memleak in iio_device_register_sysfs (git-fixes).
- iio: hid-sensor-als: Return 0 for HID_USAGE_SENSOR_TIME_TIMESTAMP (git-fixes).
- iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC (git-fixes).
- Input: i8042 - add Fujitsu Lifebook E5411 to i8042 quirk table (git-fixes).
- Input: i8042 - add Fujitsu Lifebook U728 to i8042 quirk table (git-fixes).
- Input: i8042 - add quirk for Fujitsu Lifebook A574/H (git-fixes).
- Input: i8042 - fix strange behavior of touchpad on Clevo NS70PU (git-fixes).
- Input: iqs269a - switch to DEFINE_SIMPLE_DEV_PM_OPS() and pm_sleep_ptr() (git-fixes).
- Input: pm8941-powerkey - fix debounce on gen2+ PMICs (git-fixes).
- Input: pm8941-pwrkey - add software key press debouncing support (git-fixes).
- Input: pm8941-pwrkey - add support for PON GEN3 base addresses (git-fixes).
- Input: xpad - add Lenovo Legion Go controllers (git-fixes).
- Input: xpad - add Lenovo Legion Go controllers (git-fixes).
- irqchip/gic-v3-its: Fix GICv4.1 VPE affinity update (git-fixes).
- irqchip/irq-brcmstb-l2: Add write memory barrier before exit (git-fixes).
- jfs: fix array-index-out-of-bounds in dbAdjTree (git-fixes).
- jfs: fix array-index-out-of-bounds in diNewExt (git-fixes).
- jfs: fix slab-out-of-bounds Read in dtSearch (git-fixes).
- jfs: fix uaf in jfs_evict_inode (git-fixes).
- kbuild: Fix changing ELF file type for output of gen_btf for big endian (git-fixes).
- KVM: s390: fix cc for successful PQAP (git-fixes bsc#1219839).
- KVM: s390: fix setting of fpc register (git-fixes bsc#1220392).
- KVM: s390: vsie: fix race during shadow creation (git-fixes bsc#1220393).
- KVM: VMX: Move VERW closer to VMentry for MDS mitigation (git-fixes).
- KVM: VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH (git-fixes).
- lan78xx: enable auto speed configuration for LAN7850 if no EEPROM is detected (git-commit).
- lan78xx: enable auto speed configuration for LAN7850 if no EEPROM is detected (git-fixes).
- leds: trigger: panic: Do not register panic notifier if creating the trigger failed (git-fixes).
- lib/stackdepot: add depot_fetch_stack helper (jsc-PED#7423).
- lib/stackdepot: add refcount for records (jsc-PED#7423).
- lib/stackdepot: Fix first entry having a 0-handle (jsc-PED#7423).
- lib/stackdepot: Move stack_record struct definition into the header (jsc-PED#7423).
- libsubcmd: Fix memory leak in uniq() (git-fixes).
- md: Do not ignore suspended array in md_check_recovery() (git-fixes).
- md: do not leave 'MD_RECOVERY_FROZEN' in error path of md_set_readonly() (git-fixes).
- md: introduce md_ro_state (git-fixes).
- md: Make sure md_do_sync() will set MD_RECOVERY_DONE (git-fixes).
- md: Whenassemble the array, consult the superblock of the freshest device (git-fixes).
- md/raid10: check slab-out-of-bounds in md_bitmap_get_counter (git-fixes).
- md/raid5: release batch_last before waiting for another stripe_head (git-fixes).
- md/raid6: use valid sector values to determine if an I/O should wait on the reshape (git-fixes).
- media: ddbridge: fix an error code problem in ddb_probe (git-fixes).
- media: ir_toy: fix a memleak in irtoy_tx (git-fixes).
- media: rc: bpf attach/detach requires write permission (git-fixes).
- media: rockchip: rga: fix swizzling for RGB formats (git-fixes).
- media: stk1160: Fixed high volume of stk1160_dbg messages (git-fixes).
- mfd: syscon: Fix null pointer dereference in of_syscon_register() (git-fixes).
- mm,page_owner: Display all stacks and their count (jsc-PED#7423).
- mm,page_owner: Filter out stacks by a threshold (jsc-PED#7423).
- mm,page_owner: Implement the tracking of the stacks count (jsc-PED#7423).
- mm,page_owner: Maintain own list of stack_records structs (jsc-PED#7423).
- mm,page_owner: Update Documentation regarding page_owner_stacks (jsc-PED#7423).
- mm: memory-failure: fix potential unexpected return value from unpoison_memory() (git-fixes).
- mm/hwpoison: fix unpoison_memory() (bsc#1218663).
- mm/hwpoison: mf_mutex for soft offline and unpoison (bsc#1218663).
- mm/hwpoison: remove MF_MSG_BUDDY_2ND and MF_MSG_POISONED_HUGE (bsc#1218663).
- mmc: core: Fix eMMC initialization with 1-bit bus connection (git-fixes).
- mmc: core: Use mrq.sbc in close-ended ffu (git-fixes).
- mmc: mmc_spi: remove custom DMA mapped buffers (git-fixes).
- mmc: sdhci-xenon: add timeout for PHY init complete (git-fixes).
- mmc: sdhci-xenon: fix PHY init clock stability (git-fixes).
- mmc: slot-gpio: Allow non-sleeping GPIO ro (git-fixes).
- modpost: trim leading spaces when processing source files list (git-fixes).
- mtd: spinand: gigadevice: Fix the get ecc status issue (git-fixes).
- net: usb: dm9601: fix wrong return value in dm9601_mdio_read (git-fixes).
- net: usb: dm9601: fix wrong return value in dm9601_mdio_read (git-fixes).
- netfs, fscache: Prevent Oops in fscache_put_cache() (bsc#1220003).
- nilfs2: fix data corruption in dsync block recovery for small block sizes (git-fixes).
- nilfs2: replace WARN_ONs for invalid DAT metadata block requests (git-fixes).
- nouveau: fix function cast warnings (git-fixes).
- nouveau/svm: fix kvcalloc() argument order (git-fixes).
- ntfs: check overflow when iterating ATTR_RECORDs (git-fixes).
- ntfs: fix use-after-free in ntfs_attr_find() (git-fixes).
- nvme-fabrics: fix I/O connect error handling (git-fixes).
- nvme-host: fix the updating of the firmware version (git-fixes).
- PCI: Add no PM reset quirk for NVIDIA Spectrum devices (git-fixes).
- PCI: Add PCI_HEADER_TYPE_MFD definition (bsc#1220021).
- PCI: Fix 64GT/s effective data rate calculation (git-fixes).
- PCI: Only override AMD USB controller if required (git-fixes).
- PCI: switchtec: Fix stdev_release() crash after surprise hot remove (git-fixes).
- PCI/AER: Decode Requester ID when no error info found (git-fixes).
- platform/x86: thinkpad_acpi: Only update profile if successfully converted (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the TECLAST X16 Plus tablet (git-fixes).
- platform/x86: touchscreen_dmi: Allow partial (prefix) matches for ACPI names (git-fixes).
- PM: core: Remove unnecessary (void *) conversions (git-fixes).
- PM: runtime: Have devm_pm_runtime_enable() handle pm_runtime_dont_use_autosuspend() (git-fixes).
- PNP: ACPI: fix fortify warning (git-fixes).
- power: supply: bq27xxx-i2c: Do not free non existing IRQ (git-fixes).
- powerpc: add crtsavres.o to always-y instead of extra-y (bsc#1194869).
- powerpc: Do not include lppaca.h in paca.h (bsc#1194869).
- powerpc/64: Set task pt_regs-&gt;link to the LR value on scv entry (bsc#1194869).
- powerpc/powernv: Fix fortify source warnings in opal-prd.c (bsc#1194869).
- powerpc/pseries: Add a clear modifier to ibm,pa/pi-features parser (bsc#1220348).
- powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT (bsc#1194869).
- powerpc/pseries: Set CPU_FTR_DBELL according to ibm,pi-features (bsc#1220348).
- powerpc/watchpoint: Disable pagefaults when getting user instruction (bsc#1194869).
- powerpc/watchpoints: Annotate atomic context in more places (bsc#1194869).
- powerpc/watchpoints: Disable preemption in thread_change_pc() (bsc#1194869).
- pstore/ram: Fix crash when setting number of cpus to an odd number (git-fixes).
- RAS: Introduce a FRU memory poison manager (jsc#PED-7618).
- RAS/AMD/ATL: Add MI300 row retirement support (jsc#PED-7618).
- RAS/AMD/ATL: Fix bit overflow in denorm_addr_df4_np2() (git-fixes).
- RDMA/bnxt_re: Add a missing check in bnxt_qplib_query_srq (git-fixes)
- RDMA/bnxt_re: Return error for SRQ resize (git-fixes)
- RDMA/core: Fix uninit-value access in ib_get_eth_speed() (bsc#1219934).
- RDMA/core: Get IB width and speed from netdev (bsc#1219934).
- RDMA/irdma: Add AE for too many RNRS (git-fixes)
- RDMA/irdma: Fix KASAN issue with tasklet (git-fixes)
- RDMA/irdma: Set the CQ read threshold for GEN 1 (git-fixes)
- RDMA/irdma: Validate max_send_wr and max_recv_wr (git-fixes)
- RDMA/qedr: Fix qedr_create_user_qp error flow (git-fixes)
- RDMA/srpt: fix function pointer cast warnings (git-fixes)
- RDMA/srpt: Support specifying the srpt_service_guid parameter (git-fixes)
- regulator: core: Only increment use_count when enable_count changes (git-fixes).
- regulator: pwm-regulator: Add validity checks in continuous .get_voltage (git-fixes).
- Revert 'drm/amd: flush any delayed gfxoff on suspend entry' (git-fixes).
- Revert 'drm/amd/display: increased min_dcfclk_mhz and min_fclk_mhz' (git-fixes).
- Revert 'drm/amd/pm: resolve reboot exception for si oland' (git-fixes).
- ring-buffer: Clean ring_buffer_poll_wait() error return (git-fixes).
- s390: use the correct count for __iowrite64_copy() (git-fixes bsc#1220317).
- s390/qeth: Fix potential loss of L3-IP@ in case of network issues (git-fixes bsc#1219840).
- sched/membarrier: reduce the ability to hammer on sys_membarrier (git-fixes).
- scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler (git-fixes).
- scsi: core: Move scsi_host_busy() out of host lock if it is for per-command (git-fixes).
- scsi: fnic: Move fnic_fnic_flush_tx() to a work queue (git-fixes bsc#1219141).
- scsi: hisi_sas: Prevent parallel FLR and controller reset (git-fixes).
- scsi: ibmvfc: Limit max hw queues by num_online_cpus() (bsc#1220106).
- scsi: ibmvfc: Open-code reset loop for target reset (bsc#1220106).
- scsi: isci: Fix an error code problem in isci_io_request_build() (git-fixes).
- scsi: lpfc: Add condition to delete ndlp object after sending BLS_RJT to an ABTS (bsc#1220021).
- scsi: lpfc: Allow lpfc_plogi_confirm_nport() logic to execute for Fabric nodes (bsc#1220021).
- scsi: lpfc: Change lpfc_vport fc_flag member into a bitmask (bsc#1220021).
- scsi: lpfc: Change lpfc_vport load_flag member into a bitmask (bsc#1220021).
- scsi: lpfc: Change nlp state statistic counters into atomic_t (bsc#1220021).
- scsi: lpfc: Copyright updates for 14.4.0.0 patches (bsc#1220021).
- scsi: lpfc: Fix failure to delete vports when discovery is in progress (bsc#1220021).
- scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc() (bsc#1220021).
- scsi: lpfc: Initialize status local variable in lpfc_sli4_repost_sgl_list() (bsc#1220021).
- scsi: lpfc: Move handling of reset congestion statistics events (bsc#1220021).
- scsi: lpfc: Protect vport fc_nodes list with an explicit spin lock (bsc#1220021).
- scsi: lpfc: Remove D_ID swap log message from trace event logger (bsc#1220021).
- scsi: lpfc: Remove NLP_RCV_PLOGI early return during RSCN processing for ndlps (bsc#1220021).
- scsi: lpfc: Remove shost_lock protection for fc_host_port shost APIs (bsc#1220021).
- scsi: lpfc: Replace deprecated strncpy() with strscpy() (bsc#1220021).
- scsi: lpfc: Save FPIN frequency statistics upon receipt of peer cgn notifications (bsc#1220021).
- scsi: lpfc: Update lpfc version to 14.4.0.0 (bsc#1220021).
- scsi: lpfc: Use PCI_HEADER_TYPE_MFD instead of literal (bsc#1220021).
- scsi: lpfc: Use sg_dma_len() API to get struct scatterlist's length (bsc#1220021).
- scsi: mpi3mr: Refresh sdev queue depth after controller reset (git-fixes).
- scsi: Revert 'scsi: fcoe: Fix potential deadlock on &amp;fip-&gt;ctlr_lock' (git-fixes bsc#1219141).
- serial: 8250: Remove serial_rs485 sanitization from em485 (git-fixes).
- spi-mxs: Fix chipselect glitch (git-fixes).
- spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected (git-fixes).
- spi: ppc4xx: Drop write-only variable (git-fixes).
- spi: sh-msiof: avoid integer overflow in constants (git-fixes).
- staging: iio: ad5933: fix type mismatch regression (git-fixes).
- tcp: fix tcp_mtup_probe_success vs wrong snd_cwnd (bsc#1218450).
- tomoyo: fix UAF write bug in tomoyo_write_control() (git-fixes).
- topology: Fix up build warning in topology_is_visible() (jsc#PED-7618).
- topology/sysfs: Add format parameter to macro defining 'show' functions for proc (jsc#PED-7618).
- topology/sysfs: Add PPIN in sysfs under cpu topology (jsc#PED-7618).
- topology/sysfs: Hide PPIN on systems that do not support it (jsc#PED-7618).
- tracing: Fix wasted memory in saved_cmdlines logic (git-fixes).
- tracing: Inform kmemleak of saved_cmdlines allocation (git-fixes).
- tracing/probes: Fix to show a parse error for bad type for $comm (git-fixes).
- tty: allow TIOCSLCKTRMIOS with CAP_CHECKPOINT_RESTORE (git-fixes).
- UBSAN: array-index-out-of-bounds in dtSplitRoot (git-fixes).
- usb: cdns: readd old API (git-fixes).
- usb: cdns3: fix memory double free when handle zero packet (git-fixes).
- usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() (git-fixes).
- usb: cdns3: Modify the return value of cdns_set_active () to void when CONFIG_PM_SLEEP is disabled (git-fixes).
- usb: cdns3: Put the cdns set active part outside the spin lock (git-fixes).
- usb: cdnsp: blocked some cdns3 specific code (git-fixes).
- usb: cdnsp: fixed issue with incorrect detecting CDNSP family controllers (git-fixes).
- usb: dwc3: gadget: Do not disconnect if not started (git-fixes).
- usb: dwc3: gadget: Handle EP0 request dequeuing properly (git-fixes).
- usb: dwc3: gadget: Ignore End Transfer delay on teardown (git-fixes).
- usb: dwc3: gadget: Queue PM runtime idle on disconnect event (git-fixes).
- usb: dwc3: gadget: Refactor EP0 forced stall/restart into a separate API (git-fixes).
- usb: dwc3: gadget: Submit endxfer command if delayed during disconnect (git-fixes).
- usb: dwc3: host: Set XHCI_SG_TRB_CACHE_SIZE_QUIRK (git-fixes).
- usb: f_mass_storage: forbid async queue when shutdown happen (git-fixes).
- usb: f_mass_storage: forbid async queue when shutdown happen (git-fixes).
- usb: gadget: core: Add missing kerneldoc for vbus_work (git-fixes).
- usb: gadget: core: adjust uevent timing on gadget unbind (git-fixes).
- usb: Gadget: core: Help prevent panic during UVC unconfigure (git-fixes).
- usb: gadget: core: remove unbalanced mutex_unlock in usb_gadget_activate (git-fixes).
- usb: gadget: f_hid: fix report descriptor allocation (git-fixes).
- usb: gadget: Fix obscure lockdep violation for udc_mutex (git-fixes).
- usb: gadget: Fix use-after-free Read in usb_udc_uevent() (git-fixes).
- usb: gadget: fsl_qe_udc: validate endpoint index for ch9 udc (git-fixes).
- usb: gadget: ncm: Avoid dropping datagrams of properly parsed NTBs (git-fixes).
- usb: gadget: udc: core: Offload usb_udc_vbus_handler processing (git-fixes).
- usb: gadget: udc: core: Prevent soft_connect_store() race (git-fixes).
- usb: gadget: udc: Handle gadget_connect failure during bind operation (git-fixes).
- usb: hub: check for alternate port before enabling A_ALT_HNP_SUPPORT (bsc#1218527).
- usb: hub: Replace hardcoded quirk value with BIT() macro (git-fixes).
- usb: hub: Replace hardcoded quirk value with BIT() macro (git-fixes).
- usb: roles: do not get/set_role() when usb_role_switch is unregistered (git-fixes).
- usb: roles: fix NULL pointer issue when put module's reference (git-fixes).
- usb: serial: cp210x: add ID for IMST iM871A-USB (git-fixes).
- usb: serial: option: add Fibocom FM101-GL variant (git-fixes).
- usb: serial: qcserial: add new usb-id for Dell Wireless DW5826e (git-fixes).
- watchdog: it87_wdt: Keep WDTCTRL bit 3 unmodified for IT8784/IT8786 (git-fixes).
- wifi: ath11k: fix registration of 6Ghz-only phy without the full channel range (git-fixes).
- wifi: ath9k: Fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() (git-fixes).
- wifi: cfg80211: fix missing interfaces when dumping (git-fixes).
- wifi: cfg80211: fix RCU dereference in __cfg80211_bss_update (git-fixes).
- wifi: cfg80211: free beacon_ies when overridden from hidden BSS (git-fixes).
- wifi: iwlwifi: Fix some error codes (git-fixes).
- wifi: iwlwifi: mvm: avoid baid size integer overflow (git-fixes).
- wifi: iwlwifi: uninitialized variable in iwl_acpi_get_ppag_table() (git-fixes).
- wifi: mac80211: adding missing drv_mgd_complete_tx() call (git-fixes).
- wifi: mac80211: fix race condition on enabling fast-xmit (git-fixes).
- wifi: nl80211: reject iftype change with mesh ID change (git-fixes).
- wifi: rt2x00: restart beacon queue when hardware reset (git-fixes).
- wifi: rtl8xxxu: Add additional USB IDs for RTL8192EU devices (git-fixes).
- wifi: rtlwifi: rtl8723{be,ae}: using calculate_bit_shift() (git-fixes).
- wifi: wext-core: Fix -Wstringop-overflow warning in ioctl_standard_iw_point() (git-fixes).
- x86/asm: Add _ASM_RIP() macro for x86-64 (%rip) suffix (git-fixes).
- x86/bugs: Add asm helpers for executing VERW (git-fixes).
- x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key (git-fixes). Also add mds_user_clear to kABI severities since it's strictly mitigation related so should be low risk.
- x86/cpu: X86_FEATURE_INTEL_PPIN finally had a CPUID bit (jsc#PED-7618).
- x86/entry_32: Add VERW just before userspace transition (git-fixes).
- x86/entry_64: Add VERW just before userspace transition (git-fixes).
- x86/mm: Fix memory encryption features advertisement (bsc#1206453).
- xfs: remove unused fields from struct xbtree_ifakeroot (git-fixes).
- xfs: short circuit xfs_growfs_data_private() if delta is zero (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-12"/>
	<updated date="2024-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206453">SUSE bug 1206453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209412">SUSE bug 1209412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216776">SUSE bug 1216776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217927">SUSE bug 1217927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218195">SUSE bug 1218195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218216">SUSE bug 1218216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218450">SUSE bug 1218450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218527">SUSE bug 1218527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218562">SUSE bug 1218562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218663">SUSE bug 1218663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218915">SUSE bug 1218915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219126">SUSE bug 1219126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219127">SUSE bug 1219127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219141">SUSE bug 1219141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219146">SUSE bug 1219146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219295">SUSE bug 1219295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219443">SUSE bug 1219443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219653">SUSE bug 1219653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219827">SUSE bug 1219827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219835">SUSE bug 1219835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219839">SUSE bug 1219839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219840">SUSE bug 1219840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219934">SUSE bug 1219934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220003">SUSE bug 1220003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220009">SUSE bug 1220009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220021">SUSE bug 1220021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220030">SUSE bug 1220030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220106">SUSE bug 1220106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220140">SUSE bug 1220140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220187">SUSE bug 1220187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220238">SUSE bug 1220238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220240">SUSE bug 1220240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220241">SUSE bug 1220241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220243">SUSE bug 1220243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220250">SUSE bug 1220250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220251">SUSE bug 1220251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220253">SUSE bug 1220253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220254">SUSE bug 1220254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220255">SUSE bug 1220255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220257">SUSE bug 1220257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220267">SUSE bug 1220267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220277">SUSE bug 1220277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220317">SUSE bug 1220317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220325">SUSE bug 1220325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220326">SUSE bug 1220326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220328">SUSE bug 1220328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220330">SUSE bug 1220330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220335">SUSE bug 1220335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220344">SUSE bug 1220344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220348">SUSE bug 1220348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220350">SUSE bug 1220350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220364">SUSE bug 1220364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220392">SUSE bug 1220392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220393">SUSE bug 1220393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220398">SUSE bug 1220398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220409">SUSE bug 1220409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220433">SUSE bug 1220433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220444">SUSE bug 1220444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220457">SUSE bug 1220457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220459">SUSE bug 1220459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220469">SUSE bug 1220469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220649">SUSE bug 1220649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220735">SUSE bug 1220735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220736">SUSE bug 1220736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220796">SUSE bug 1220796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220825">SUSE bug 1220825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220845">SUSE bug 1220845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220848">SUSE bug 1220848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220917">SUSE bug 1220917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220930">SUSE bug 1220930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220931">SUSE bug 1220931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220933">SUSE bug 1220933</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25162/">CVE-2019-25162 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25162">CVE-2019-25162 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46923/">CVE-2021-46923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46923">CVE-2021-46923 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46924/">CVE-2021-46924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46924">CVE-2021-46924 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46932/">CVE-2021-46932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46932">CVE-2021-46932 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46934/">CVE-2021-46934 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46934">CVE-2021-46934 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47083/">CVE-2021-47083 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47083">CVE-2021-47083 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48627/">CVE-2022-48627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48627">CVE-2022-48627 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48628/">CVE-2022-48628 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48628">CVE-2022-48628 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-5197/">CVE-2023-5197 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5197">CVE-2023-5197 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52340/">CVE-2023-52340 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52340">CVE-2023-52340 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52429/">CVE-2023-52429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52429">CVE-2023-52429 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52439/">CVE-2023-52439 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52439">CVE-2023-52439 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52443/">CVE-2023-52443 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52443">CVE-2023-52443 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52445/">CVE-2023-52445 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52445">CVE-2023-52445 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52447/">CVE-2023-52447 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52447">CVE-2023-52447 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52448/">CVE-2023-52448 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52448">CVE-2023-52448 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52449/">CVE-2023-52449 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52449">CVE-2023-52449 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52451/">CVE-2023-52451 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52451">CVE-2023-52451 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52452/">CVE-2023-52452 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52452">CVE-2023-52452 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52456/">CVE-2023-52456 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52456">CVE-2023-52456 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52457/">CVE-2023-52457 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52457">CVE-2023-52457 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-52462/">CVE-2023-52462 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52462">CVE-2023-52462 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52463/">CVE-2023-52463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52463">CVE-2023-52463 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52464/">CVE-2023-52464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52464">CVE-2023-52464 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52467/">CVE-2023-52467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52467">CVE-2023-52467 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52475/">CVE-2023-52475 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52475">CVE-2023-52475 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52478/">CVE-2023-52478 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52478">CVE-2023-52478 at NVD</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52482/">CVE-2023-52482 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52482">CVE-2023-52482 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52530/">CVE-2023-52530 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52530">CVE-2023-52530 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52531/">CVE-2023-52531 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52531">CVE-2023-52531 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52559/">CVE-2023-52559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52559">CVE-2023-52559 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6270/">CVE-2023-6270 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6270">CVE-2023-6270 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6817/">CVE-2023-6817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6817">CVE-2023-6817 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-0607/">CVE-2024-0607 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0607">CVE-2024-0607 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1151/">CVE-2024-1151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1151">CVE-2024-1151 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23849/">CVE-2024-23849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23849">CVE-2024-23849 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23850/">CVE-2024-23850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23850">CVE-2024-23850 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23851/">CVE-2024-23851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23851">CVE-2024-23851 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25744/">CVE-2024-25744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25744">CVE-2024-25744 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26585/">CVE-2024-26585 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26585">CVE-2024-26585 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26586/">CVE-2024-26586 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26586">CVE-2024-26586 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26589/">CVE-2024-26589 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26589">CVE-2024-26589 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26591/">CVE-2024-26591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26591">CVE-2024-26591 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26593/">CVE-2024-26593 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26593">CVE-2024-26593 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26595/">CVE-2024-26595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26595">CVE-2024-26595 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26598/">CVE-2024-26598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26598">CVE-2024-26598 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26602/">CVE-2024-26602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26602">CVE-2024-26602 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26603/">CVE-2024-26603 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26603">CVE-2024-26603 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26607/">CVE-2024-26607 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26607">CVE-2024-26607 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26622/">CVE-2024-26622 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26622">CVE-2024-26622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850483" comment="cluster-md-kmp-azure-5.14.21-150500.33.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850484" comment="dlm-kmp-azure-5.14.21-150500.33.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850485" comment="gfs2-kmp-azure-5.14.21-150500.33.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850486" comment="kernel-azure-5.14.21-150500.33.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850487" comment="kernel-azure-devel-5.14.21-150500.33.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850488" comment="kernel-azure-extra-5.14.21-150500.33.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850489" comment="kernel-azure-livepatch-devel-5.14.21-150500.33.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850490" comment="kernel-azure-optional-5.14.21-150500.33.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850491" comment="kernel-azure-vdso-5.14.21-150500.33.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850492" comment="kernel-devel-azure-5.14.21-150500.33.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850493" comment="kernel-source-azure-5.14.21-150500.33.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850494" comment="kernel-syms-azure-5.14.21-150500.33.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850495" comment="kselftests-kmp-azure-5.14.21-150500.33.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850496" comment="ocfs2-kmp-azure-5.14.21-150500.33.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850497" comment="reiserfs-kmp-azure-5.14.21-150500.33.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5246" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1206453" ref_url="https://bugzilla.suse.com/1206453" source="BUGZILLA"/>
		<reference ref_id="1209412" ref_url="https://bugzilla.suse.com/1209412" source="BUGZILLA"/>
		<reference ref_id="1213456" ref_url="https://bugzilla.suse.com/1213456" source="BUGZILLA"/>
		<reference ref_id="1216776" ref_url="https://bugzilla.suse.com/1216776" source="BUGZILLA"/>
		<reference ref_id="1217927" ref_url="https://bugzilla.suse.com/1217927" source="BUGZILLA"/>
		<reference ref_id="1218195" ref_url="https://bugzilla.suse.com/1218195" source="BUGZILLA"/>
		<reference ref_id="1218216" ref_url="https://bugzilla.suse.com/1218216" source="BUGZILLA"/>
		<reference ref_id="1218450" ref_url="https://bugzilla.suse.com/1218450" source="BUGZILLA"/>
		<reference ref_id="1218527" ref_url="https://bugzilla.suse.com/1218527" source="BUGZILLA"/>
		<reference ref_id="1218663" ref_url="https://bugzilla.suse.com/1218663" source="BUGZILLA"/>
		<reference ref_id="1218915" ref_url="https://bugzilla.suse.com/1218915" source="BUGZILLA"/>
		<reference ref_id="1219126" ref_url="https://bugzilla.suse.com/1219126" source="BUGZILLA"/>
		<reference ref_id="1219127" ref_url="https://bugzilla.suse.com/1219127" source="BUGZILLA"/>
		<reference ref_id="1219141" ref_url="https://bugzilla.suse.com/1219141" source="BUGZILLA"/>
		<reference ref_id="1219146" ref_url="https://bugzilla.suse.com/1219146" source="BUGZILLA"/>
		<reference ref_id="1219295" ref_url="https://bugzilla.suse.com/1219295" source="BUGZILLA"/>
		<reference ref_id="1219443" ref_url="https://bugzilla.suse.com/1219443" source="BUGZILLA"/>
		<reference ref_id="1219653" ref_url="https://bugzilla.suse.com/1219653" source="BUGZILLA"/>
		<reference ref_id="1219827" ref_url="https://bugzilla.suse.com/1219827" source="BUGZILLA"/>
		<reference ref_id="1219835" ref_url="https://bugzilla.suse.com/1219835" source="BUGZILLA"/>
		<reference ref_id="1219839" ref_url="https://bugzilla.suse.com/1219839" source="BUGZILLA"/>
		<reference ref_id="1219840" ref_url="https://bugzilla.suse.com/1219840" source="BUGZILLA"/>
		<reference ref_id="1219934" ref_url="https://bugzilla.suse.com/1219934" source="BUGZILLA"/>
		<reference ref_id="1220003" ref_url="https://bugzilla.suse.com/1220003" source="BUGZILLA"/>
		<reference ref_id="1220009" ref_url="https://bugzilla.suse.com/1220009" source="BUGZILLA"/>
		<reference ref_id="1220021" ref_url="https://bugzilla.suse.com/1220021" source="BUGZILLA"/>
		<reference ref_id="1220030" ref_url="https://bugzilla.suse.com/1220030" source="BUGZILLA"/>
		<reference ref_id="1220106" ref_url="https://bugzilla.suse.com/1220106" source="BUGZILLA"/>
		<reference ref_id="1220140" ref_url="https://bugzilla.suse.com/1220140" source="BUGZILLA"/>
		<reference ref_id="1220187" ref_url="https://bugzilla.suse.com/1220187" source="BUGZILLA"/>
		<reference ref_id="1220238" ref_url="https://bugzilla.suse.com/1220238" source="BUGZILLA"/>
		<reference ref_id="1220240" ref_url="https://bugzilla.suse.com/1220240" source="BUGZILLA"/>
		<reference ref_id="1220241" ref_url="https://bugzilla.suse.com/1220241" source="BUGZILLA"/>
		<reference ref_id="1220243" ref_url="https://bugzilla.suse.com/1220243" source="BUGZILLA"/>
		<reference ref_id="1220250" ref_url="https://bugzilla.suse.com/1220250" source="BUGZILLA"/>
		<reference ref_id="1220251" ref_url="https://bugzilla.suse.com/1220251" source="BUGZILLA"/>
		<reference ref_id="1220253" ref_url="https://bugzilla.suse.com/1220253" source="BUGZILLA"/>
		<reference ref_id="1220254" ref_url="https://bugzilla.suse.com/1220254" source="BUGZILLA"/>
		<reference ref_id="1220255" ref_url="https://bugzilla.suse.com/1220255" source="BUGZILLA"/>
		<reference ref_id="1220257" ref_url="https://bugzilla.suse.com/1220257" source="BUGZILLA"/>
		<reference ref_id="1220267" ref_url="https://bugzilla.suse.com/1220267" source="BUGZILLA"/>
		<reference ref_id="1220277" ref_url="https://bugzilla.suse.com/1220277" source="BUGZILLA"/>
		<reference ref_id="1220317" ref_url="https://bugzilla.suse.com/1220317" source="BUGZILLA"/>
		<reference ref_id="1220326" ref_url="https://bugzilla.suse.com/1220326" source="BUGZILLA"/>
		<reference ref_id="1220328" ref_url="https://bugzilla.suse.com/1220328" source="BUGZILLA"/>
		<reference ref_id="1220330" ref_url="https://bugzilla.suse.com/1220330" source="BUGZILLA"/>
		<reference ref_id="1220335" ref_url="https://bugzilla.suse.com/1220335" source="BUGZILLA"/>
		<reference ref_id="1220344" ref_url="https://bugzilla.suse.com/1220344" source="BUGZILLA"/>
		<reference ref_id="1220348" ref_url="https://bugzilla.suse.com/1220348" source="BUGZILLA"/>
		<reference ref_id="1220350" ref_url="https://bugzilla.suse.com/1220350" source="BUGZILLA"/>
		<reference ref_id="1220364" ref_url="https://bugzilla.suse.com/1220364" source="BUGZILLA"/>
		<reference ref_id="1220392" ref_url="https://bugzilla.suse.com/1220392" source="BUGZILLA"/>
		<reference ref_id="1220393" ref_url="https://bugzilla.suse.com/1220393" source="BUGZILLA"/>
		<reference ref_id="1220398" ref_url="https://bugzilla.suse.com/1220398" source="BUGZILLA"/>
		<reference ref_id="1220409" ref_url="https://bugzilla.suse.com/1220409" source="BUGZILLA"/>
		<reference ref_id="1220444" ref_url="https://bugzilla.suse.com/1220444" source="BUGZILLA"/>
		<reference ref_id="1220457" ref_url="https://bugzilla.suse.com/1220457" source="BUGZILLA"/>
		<reference ref_id="1220459" ref_url="https://bugzilla.suse.com/1220459" source="BUGZILLA"/>
		<reference ref_id="1220649" ref_url="https://bugzilla.suse.com/1220649" source="BUGZILLA"/>
		<reference ref_id="1220796" ref_url="https://bugzilla.suse.com/1220796" source="BUGZILLA"/>
		<reference ref_id="1220825" ref_url="https://bugzilla.suse.com/1220825" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25162" ref_url="https://www.suse.com/security/cve/CVE-2019-25162/" source="CVE"/>
		<reference ref_id="CVE-2021-46923" ref_url="https://www.suse.com/security/cve/CVE-2021-46923/" source="CVE"/>
		<reference ref_id="CVE-2021-46924" ref_url="https://www.suse.com/security/cve/CVE-2021-46924/" source="CVE"/>
		<reference ref_id="CVE-2021-46932" ref_url="https://www.suse.com/security/cve/CVE-2021-46932/" source="CVE"/>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<reference ref_id="CVE-2023-5197" ref_url="https://www.suse.com/security/cve/CVE-2023-5197/" source="CVE"/>
		<reference ref_id="CVE-2023-52340" ref_url="https://www.suse.com/security/cve/CVE-2023-52340/" source="CVE"/>
		<reference ref_id="CVE-2023-52429" ref_url="https://www.suse.com/security/cve/CVE-2023-52429/" source="CVE"/>
		<reference ref_id="CVE-2023-52439" ref_url="https://www.suse.com/security/cve/CVE-2023-52439/" source="CVE"/>
		<reference ref_id="CVE-2023-52443" ref_url="https://www.suse.com/security/cve/CVE-2023-52443/" source="CVE"/>
		<reference ref_id="CVE-2023-52445" ref_url="https://www.suse.com/security/cve/CVE-2023-52445/" source="CVE"/>
		<reference ref_id="CVE-2023-52447" ref_url="https://www.suse.com/security/cve/CVE-2023-52447/" source="CVE"/>
		<reference ref_id="CVE-2023-52448" ref_url="https://www.suse.com/security/cve/CVE-2023-52448/" source="CVE"/>
		<reference ref_id="CVE-2023-52449" ref_url="https://www.suse.com/security/cve/CVE-2023-52449/" source="CVE"/>
		<reference ref_id="CVE-2023-52451" ref_url="https://www.suse.com/security/cve/CVE-2023-52451/" source="CVE"/>
		<reference ref_id="CVE-2023-52452" ref_url="https://www.suse.com/security/cve/CVE-2023-52452/" source="CVE"/>
		<reference ref_id="CVE-2023-52456" ref_url="https://www.suse.com/security/cve/CVE-2023-52456/" source="CVE"/>
		<reference ref_id="CVE-2023-52457" ref_url="https://www.suse.com/security/cve/CVE-2023-52457/" source="CVE"/>
		<reference ref_id="CVE-2023-52463" ref_url="https://www.suse.com/security/cve/CVE-2023-52463/" source="CVE"/>
		<reference ref_id="CVE-2023-52464" ref_url="https://www.suse.com/security/cve/CVE-2023-52464/" source="CVE"/>
		<reference ref_id="CVE-2023-52475" ref_url="https://www.suse.com/security/cve/CVE-2023-52475/" source="CVE"/>
		<reference ref_id="CVE-2023-52478" ref_url="https://www.suse.com/security/cve/CVE-2023-52478/" source="CVE"/>
		<reference ref_id="CVE-2023-6817" ref_url="https://www.suse.com/security/cve/CVE-2023-6817/" source="CVE"/>
		<reference ref_id="CVE-2024-0607" ref_url="https://www.suse.com/security/cve/CVE-2024-0607/" source="CVE"/>
		<reference ref_id="CVE-2024-1151" ref_url="https://www.suse.com/security/cve/CVE-2024-1151/" source="CVE"/>
		<reference ref_id="CVE-2024-23849" ref_url="https://www.suse.com/security/cve/CVE-2024-23849/" source="CVE"/>
		<reference ref_id="CVE-2024-23850" ref_url="https://www.suse.com/security/cve/CVE-2024-23850/" source="CVE"/>
		<reference ref_id="CVE-2024-23851" ref_url="https://www.suse.com/security/cve/CVE-2024-23851/" source="CVE"/>
		<reference ref_id="CVE-2024-25744" ref_url="https://www.suse.com/security/cve/CVE-2024-25744/" source="CVE"/>
		<reference ref_id="CVE-2024-26585" ref_url="https://www.suse.com/security/cve/CVE-2024-26585/" source="CVE"/>
		<reference ref_id="CVE-2024-26586" ref_url="https://www.suse.com/security/cve/CVE-2024-26586/" source="CVE"/>
		<reference ref_id="CVE-2024-26589" ref_url="https://www.suse.com/security/cve/CVE-2024-26589/" source="CVE"/>
		<reference ref_id="CVE-2024-26591" ref_url="https://www.suse.com/security/cve/CVE-2024-26591/" source="CVE"/>
		<reference ref_id="CVE-2024-26593" ref_url="https://www.suse.com/security/cve/CVE-2024-26593/" source="CVE"/>
		<reference ref_id="CVE-2024-26595" ref_url="https://www.suse.com/security/cve/CVE-2024-26595/" source="CVE"/>
		<reference ref_id="CVE-2024-26598" ref_url="https://www.suse.com/security/cve/CVE-2024-26598/" source="CVE"/>
		<reference ref_id="CVE-2024-26602" ref_url="https://www.suse.com/security/cve/CVE-2024-26602/" source="CVE"/>
		<reference ref_id="CVE-2024-26603" ref_url="https://www.suse.com/security/cve/CVE-2024-26603/" source="CVE"/>
		<reference ref_id="CVE-2024-26622" ref_url="https://www.suse.com/security/cve/CVE-2024-26622/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2019-25162: Fixed a potential use after free (bsc#1220409).
- CVE-2021-46923: Fixed reference leakage in fs/mount_setattr (bsc#1220457).
- CVE-2021-46924: Fixed fix memory leak in device probe and remove (bsc#1220459)
- CVE-2021-46932: Fixed missing work initialization before device registration (bsc#1220444)
- CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
- CVE-2023-5197: Fixed se-after-free due to addition and removal of rules from chain bindings within the same transaction (bsc#1218216).
- CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU (bsc#1219295).
- CVE-2023-52429: Fixed potential DoS in dm_table_create in drivers/md/dm-table.c (bsc#1219827).
- CVE-2023-52439: Fixed use-after-free in uio_open (bsc#1220140).
- CVE-2023-52443: Fixed crash when parsed profile name is empty  (bsc#1220240).
- CVE-2023-52445: Fixed use after free on context disconnection (bsc#1220241).
- CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround  (bsc#1220251).
- CVE-2023-52448: Fixed kernel NULL pointer dereference in gfs2_rgrp_dump  (bsc#1220253).
- CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier  (bsc#1220238).
- CVE-2023-52451: Fixed access beyond end of drmem array  (bsc#1220250).
- CVE-2023-52452: Fixed Fix accesses to uninit stack slots (bsc#1220257).
- CVE-2023-52456: Fixed tx statemachine deadlock (bsc#1220364).
- CVE-2023-52457: Fixed skipped resource freeing if  pm_runtime_resume_and_get() failed (bsc#1220350).
- CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328).
- CVE-2023-52464: Fixed possible out-of-bounds string access (bsc#1220330)
- CVE-2023-52475: Fixed use-after-free in powermate_config_complete (bsc#1220649)
- CVE-2023-52478: Fixed kernel crash on receiver USB disconnect (bsc#1220796)
- CVE-2023-6817: Fixed use-after-free in nft_pipapo_walk (bsc#1218195).
- CVE-2024-0607: Fixed 64-bit load issue in  nft_byteorder_eval() (bsc#1218915).
- CVE-2024-1151: Fixed unlimited number of recursions from action  sets (bsc#1219835).
- CVE-2024-23849: Fixed array-index-out-of-bounds in rds_cmsg_recv  (bsc#1219127).
- CVE-2024-23850: Fixed double free of anonymous device after snapshot  creation failure (bsc#1219126).
- CVE-2024-23851: Fixed crash in copy_params in drivers/md/dm-ioctl.c (bsc#1219146).
- CVE-2024-25744: Fixed Security issue with int 80 interrupt vector (bsc#1217927).
- CVE-2024-26585: Fixed race between tx work scheduling and socket close  (bsc#1220187).
- CVE-2024-26586: Fixed stack corruption (bsc#1220243).
- CVE-2024-26589: Fixed out of bounds read due to variable offset alu on PTR_TO_FLOW_KEYS (bsc#1220255).
- CVE-2024-26591: Fixed re-attachment branch in bpf_tracing_prog_attach  (bsc#1220254).
- CVE-2024-26593: Fixed block process call transactions (bsc#1220009).
- CVE-2024-26595: Fixed NULL pointer dereference in  error path (bsc#1220344).
- CVE-2024-26598: Fixed potential UAF in LPI translation  cache (bsc#1220326).
- CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398).
- CVE-2024-26603: Fixed infinite loop via #PF handling (bsc#1220335).
- CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220825).

The following non-security bugs were fixed:

- acpi: apei: set memory failure flags as mf_action_required on synchronous events (git-fixes).
- acpi: button: add lid disable dmi quirk for nextbook ares 8a (git-fixes).
- acpi: extlog: fix null pointer dereference check (git-fixes).
- acpi: resource: add asus model s5402za to quirks (git-fixes).
- acpi: resource: skip irq override on asus expertbook b1502cba (git-fixes).
- acpi: resource: skip irq override on asus expertbook b2402cba (git-fixes).
- acpi: video: add backlight=native dmi quirk for apple imac11,3 (git-fixes).
- acpi: video: add backlight=native dmi quirk for apple imac12,1 and imac12,2 (git-fixes).
- acpi: video: add backlight=native dmi quirk for lenovo thinkpad x131e (3371 amd version) (git-fixes).
- acpi: video: add quirk for the colorful x15 at 23 laptop (git-fixes).
- add reference to recently released cve
- afs: fix the usage of read_seqbegin_or_lock() in afs_find_server*() (git-fixes).
- afs: fix the usage of read_seqbegin_or_lock() in afs_lookup_volume_rcu() (git-fixes).
- afs: hide silly-rename files from userspace (git-fixes).
- afs: increase buffer size in afs_update_volume_status() (git-fixes).
- ahci: asm1166: correct count of reported ports (git-fixes).
- alsa: drop leftover snd-rtctimer stuff from makefile (git-fixes).
- alsa: firewire-lib: fix to check cycle continuity (git-fixes).
- alsa: hda/conexant: add quirk for sws js201d (git-fixes).
- alsa: hda/realtek: apply headset jack quirk for non-bass alc287 thinkpads (git-fixes).
- alsa: hda/realtek: cs35l41: fix device id / model name (git-fixes).
- alsa: hda/realtek: cs35l41: fix order and duplicates in quirks table (git-fixes).
- alsa: hda/realtek: enable headset mic on vaio vjfe-adl (git-fixes).
- alsa: hda/realtek: enable mute led on hp laptop 14-fq0xxx (git-fixes).
- alsa: hda/realtek: fix mute/micmute led for hp mt645 (git-fixes).
- alsa: hda/realtek: fix mute/micmute leds for hp zbook power (git-fixes).
- alsa: hda/realtek: fix the external mic not being recognised for acer swift 1 sf114-32 (git-fixes).
- alsa: usb-audio: add a quirk for yamaha yit-w12tx transmitter (git-fixes).
- alsa: usb-audio: add delay quirk for motu m series 2nd revision (git-fixes).
- alsa: usb-audio: add quirk for rode nt-usb+ (git-fixes).
- alsa: usb-audio: check presence of valid altsetting control (git-fixes).
- alsa: usb-audio: ignore clock selector errors for single connection (git-fixes).
- alsa: usb-audio: more relaxed check of midi jack names (git-fixes).
- alsa: usb-audio: sort quirk table entries (git-fixes).
- arm64: entry: fix arm64_workaround_speculative_unpriv_load (bsc#1219443)
- arm64: entry: preserve/restore x29 even for compat tasks (bsc#1219443)
- arm64: entry: simplify tramp_alias macro and tramp_exit routine (bsc#1219443)
- arm64: errata: add cortex-a510 speculative unprivileged load (bsc#1219443) enable workaround.
- arm64: errata: add cortex-a520 speculative unprivileged load (bsc#1219443) enable workaround without kabi break.
- arm64: errata: mitigate ampere1 erratum ac03_cpu_38 at stage-2 (git-fixes) enable ampere_erratum_ac03_cpu_38 workaround without kabi break
- arm64: irq: set the correct node for shadow call stack (git-fixes)
- arm64: irq: set the correct node for vmap stack (git-fixes)
- arm64: rename arm64_workaround_2966298 (bsc#1219443)
- arm64: subscribe microsoft azure cobalt 100 to arm neoverse n2 errata (git-fixes)
- asoc: doc: fix undefined snd_soc_dapm_nopm argument (git-fixes).
- asoc: rt5645: fix deadlock in rt5645_jack_detect_work() (git-fixes).
- asoc: sof: ipc3: fix message bounds on ipc ops (git-fixes).
- asoc: sunxi: sun4i-spdif: add support for allwinner h616 (git-fixes).
- atm: idt77252: fix a memleak in open_card_ubr0 (git-fixes).
- bluetooth: avoid potential use-after-free in hci_error_reset (git-fixes).
- bluetooth: enforce validation on max value of connection interval (git-fixes).
- bluetooth: hci_event: fix handling of hci_ev_io_capa_request (git-fixes).
- bluetooth: hci_event: fix wrongly recorded wakeup bd_addr (git-fixes).
- bluetooth: hci_sync: check the correct flag before starting a scan (git-fixes).
- bluetooth: hci_sync: fix accept_list when attempting to suspend (git-fixes).
- bluetooth: l2cap: fix possible multiple reject send (git-fixes).
- bluetooth: qca: fix wrong event type for patch config command (git-fixes).
- bpf: fix verification of indirect var-off stack access (git-fixes).
- bpf: guard stack limits against 32bit overflow (git-fixes).
- bpf: minor logging improvement (bsc#1220257).
- bus: moxtet: add spi device table (git-fixes).
- cachefiles: fix memory leak in cachefiles_add_cache() (bsc#1220267).
- can: j1939: fix uaf in j1939_sk_match_filter during setsockopt(so_j1939_filter) (git-fixes).
- crypto: api - disallow identical driver names (git-fixes).
- crypto: ccp - fix null pointer dereference in __sev_platform_shutdown_locked (git-fixes).
- crypto: octeontx2 - fix cptvf driver cleanup (git-fixes).
- crypto: stm32/crc32 - fix parsing list of devices (git-fixes).
- dmaengine: fsl-qdma: fix a memory leak related to the queue command dma (git-fixes).
- dmaengine: fsl-qdma: fix soc may hang on 16 byte unaligned read (git-fixes).
- dmaengine: fsl-qdma: increase size of 'irq_name' (git-fixes).
- dmaengine: fsl-qdma: init irq after reg initialization (git-fixes).
- dmaengine: ptdma: use consistent dma masks (git-fixes).
- dmaengine: shdma: increase size of 'dev_id' (git-fixes).
- dmaengine: ti: edma: add some null pointer checks to the edma_probe (git-fixes).
- driver core: fix device_link_flag_is_sync_state_only() (git-fixes).
- drm/amd/display: fix memory leak in dm_sw_fini() (git-fixes).
- drm/amd/display: fix possible buffer overflow in 'find_dcfclk_for_voltage()' (git-fixes).
- drm/amd/display: fix possible null dereference on device remove/driver unload (git-fixes).
- drm/amd/display: increase frame-larger-than for all display_mode_vba files (git-fixes).
- drm/amd/display: increased min_dcfclk_mhz and min_fclk_mhz (git-fixes).
- drm/amd/display: preserve original aspect ratio in create stream (git-fixes).
- drm/amdgpu/display: initialize gamma correction mode variable in dcn30_get_gamcor_current() (git-fixes).
- drm/amdgpu: reset gpu for s3 suspend abort case (git-fixes).
- drm/amdgpu: skip to program gfxdec registers for suspend abort (git-fixes).
- drm/buddy: fix range bias (git-fixes).
- drm/crtc: fix uninitialized variable use even harder (git-fixes).
- drm/i915/gvt: fix uninitialized variable in handle_mmio() (git-fixes).
- drm/msm/dp: return correct colorimetry for dp_test_dynamic_range_cea case (git-fixes).
- drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup (git-fixes).
- drm/msms/dp: fixed link clock divider bits be over written in bpc unknown case (git-fixes).
- drm/prime: support page array &gt;= 4gb (git-fixes).
- drm/syncobj: call drm_syncobj_fence_add_wait when wait_available flag is set (git-fixes).
- drm/ttm: fix an invalid freeing on already freed page in error path (git-fixes).
- drop bcm5974 input patch causing a regression (bsc#1220030)
- efi/capsule-loader: fix incorrect allocation size (git-fixes).
- efi: do not add memblocks for soft-reserved memory (git-fixes).
- efi: runtime: fix potential overflow of soft-reserved region size (git-fixes).
- fbcon: always restore the old font data in fbcon_do_set_font() (git-fixes).
- fbdev: savage: error out if pixclock equals zero (git-fixes).
- fbdev: sis: error out if pixclock equals zero (git-fixes).
- firewire: core: send bus reset promptly on gap count error (git-fixes).
- fs: dlm: fix build with config_ipv6 disabled (git-fixes).
- fs:jfs:ubsan:array-index-out-of-bounds in dbadjtree (git-fixes).
- gpio: 74x164: enable output pins after registers are reset (git-fixes).
- gpio: fix resource unwinding order in error path (git-fixes).
- gpiolib: acpi: ignore touchpad wakeup on gpd g1619-04 (git-fixes).
- gpiolib: fix the error path order in gpiochip_add_data_with_key() (git-fixes).
- hid: apple: add 2021 magic keyboard fn key mapping (git-fixes).
- hid: apple: add support for the 2021 magic keyboard (git-fixes).
- hid: wacom: do not register input devices until after hid_hw_start (git-fixes).
- hid: wacom: generic: avoid reporting a serial of '0' to userspace (git-fixes).
- hwmon: (aspeed-pwm-tacho) mutex for tach reading (git-fixes).
- hwmon: (coretemp) enlarge per package core count limit (git-fixes).
- hwmon: (coretemp) fix bogus core_id to attr name mapping (git-fixes).
- hwmon: (coretemp) fix out-of-bounds memory access (git-fixes).
- i2c: i801: fix block process call transactions (git-fixes).
- i2c: i801: remove i801_set_block_buffer_mode (git-fixes).
- i2c: imx: add timer for handling the stop condition (git-fixes).
- i2c: imx: when being a target, mark the last read as processed (git-fixes).
- i3c: master: cdns: update maximum prescaler value for i2c clock (git-fixes).
- ib/hfi1: fix a memleak in init_credit_return (git-fixes)
- ib/hfi1: fix sdma.h tx-&gt;num_descs off-by-one error (git-fixes)
- iio: accel: bma400: fix a compilation problem (git-fixes).
- iio: adc: ad7091r: set alert bit in config register (git-fixes).
- iio: core: fix memleak in iio_device_register_sysfs (git-fixes).
- iio: hid-sensor-als: return 0 for hid_usage_sensor_time_timestamp (git-fixes).
- iio: magnetometer: rm3100: add boundary check for the value read from rm3100_reg_tmrc (git-fixes).
- input: iqs269a - switch to define_simple_dev_pm_ops() and pm_sleep_ptr() (git-fixes).
- input: xpad - add lenovo legion go controllers (git-fixes).
- irqchip/gic-v3-its: fix gicv4.1 vpe affinity update (git-fixes).
- irqchip/irq-brcmstb-l2: add write memory barrier before exit (git-fixes).
- jfs: fix array-index-out-of-bounds in dbadjtree (git-fixes).
- jfs: fix array-index-out-of-bounds in dinewext (git-fixes).
- jfs: fix slab-out-of-bounds read in dtsearch (git-fixes).
- jfs: fix uaf in jfs_evict_inode (git-fixes).
- kbuild: fix changing elf file type for output of gen_btf for big endian (git-fixes).
- kvm: s390: fix cc for successful pqap (git-fixes bsc#1219839).
- kvm: s390: fix setting of fpc register (git-fixes bsc#1220392).
- kvm: s390: vsie: fix race during shadow creation (git-fixes bsc#1220393).
- kvm: vmx: move verw closer to vmentry for mds mitigation (git-fixes).
- kvm: vmx: use bt+jnc, i.e. eflags.cf to select vmresume vs. vmlaunch (git-fixes).
- lan78xx: enable auto speed configuration for lan7850 if no eeprom is detected (git-fixes).
- leds: trigger: panic: do not register panic notifier if creating the trigger failed (git-fixes).
- lib/stackdepot: add depot_fetch_stack helper (jsc-ped#7423).
- lib/stackdepot: add refcount for records (jsc-ped#7423).
- lib/stackdepot: fix first entry having a 0-handle (jsc-ped#7423).
- lib/stackdepot: move stack_record struct definition into the header (jsc-ped#7423).
- libsubcmd: fix memory leak in uniq() (git-fixes).
- media: ddbridge: fix an error code problem in ddb_probe (git-fixes).
- media: ir_toy: fix a memleak in irtoy_tx (git-fixes).
- media: rc: bpf attach/detach requires write permission (git-fixes).
- media: rockchip: rga: fix swizzling for rgb formats (git-fixes).
- media: stk1160: fixed high volume of stk1160_dbg messages (git-fixes).
- mfd: syscon: fix null pointer dereference in of_syscon_register() (git-fixes).
- mm,page_owner: display all stacks and their count (jsc-ped#7423).
- mm,page_owner: filter out stacks by a threshold (jsc-ped#7423).
- mm,page_owner: implement the tracking of the stacks count (jsc-ped#7423).
- mm,page_owner: maintain own list of stack_records structs (jsc-ped#7423).
- mm,page_owner: update documentation regarding page_owner_stacks (jsc-ped#7423).
- mm/hwpoison: fix unpoison_memory() (bsc#1218663).
- mm/hwpoison: mf_mutex for soft offline and unpoison (bsc#1218663).
- mm/hwpoison: remove mf_msg_buddy_2nd and mf_msg_poisoned_huge (bsc#1218663).
- mm: memory-failure: fix potential unexpected return value from unpoison_memory() (git-fixes).
- mmc: core: fix emmc initialization with 1-bit bus connection (git-fixes).
- mmc: core: use mrq.sbc in close-ended ffu (git-fixes).
- mmc: mmc_spi: remove custom dma mapped buffers (git-fixes).
- mmc: sdhci-xenon: add timeout for phy init complete (git-fixes).
- mmc: sdhci-xenon: fix phy init clock stability (git-fixes).
- mmc: slot-gpio: allow non-sleeping gpio ro (git-fixes).
- modpost: trim leading spaces when processing source files list (git-fixes).
- mtd: spinand: gigadevice: fix the get ecc status issue (git-fixes).
- net: usb: dm9601: fix wrong return value in dm9601_mdio_read (git-fixes).
- netfs, fscache: prevent oops in fscache_put_cache() (bsc#1220003).
- nilfs2: fix data corruption in dsync block recovery for small block sizes (git-fixes).
- nilfs2: replace warn_ons for invalid dat metadata block requests (git-fixes).
- nouveau/svm: fix kvcalloc() argument order (git-fixes).
- nouveau: fix function cast warnings (git-fixes).
- ntfs: check overflow when iterating attr_records (git-fixes).
- ntfs: fix use-after-free in ntfs_attr_find() (git-fixes).
- nvme-fabrics: fix i/o connect error handling (git-fixes).
- nvme-host: fix the updating of the firmware version (git-fixes).
- pci/aer: decode requester id when no error info found (git-fixes).
- pci: add no pm reset quirk for nvidia spectrum devices (git-fixes).
- pci: add pci_header_type_mfd definition (bsc#1220021).
- pci: fix 64gt/s effective data rate calculation (git-fixes).
- pci: only override amd usb controller if required (git-fixes).
- pci: switchtec: fix stdev_release() crash after surprise hot remove (git-fixes).
- platform/x86: thinkpad_acpi: only update profile if successfully converted (git-fixes).
- platform/x86: touchscreen_dmi: add info for the teclast x16 plus tablet (git-fixes).
- platform/x86: touchscreen_dmi: allow partial (prefix) matches for acpi names (git-fixes).
- pm: core: remove unnecessary (void *) conversions (git-fixes).
- pm: runtime: have devm_pm_runtime_enable() handle pm_runtime_dont_use_autosuspend() (git-fixes).
- pnp: acpi: fix fortify warning (git-fixes).
- power: supply: bq27xxx-i2c: do not free non existing irq (git-fixes).
- powerpc/64: set task pt_regs-&gt;link to the lr value on scv entry (bsc#1194869).
- powerpc/powernv: fix fortify source warnings in opal-prd.c (bsc#1194869).
- powerpc/pseries: add a clear modifier to ibm,pa/pi-features parser (bsc#1220348).
- powerpc/pseries: rework lppaca_shared_proc() to avoid debug_preempt (bsc#1194869).
- powerpc/pseries: set cpu_ftr_dbell according to ibm,pi-features (bsc#1220348).
- powerpc/watchpoint: disable pagefaults when getting user instruction (bsc#1194869).
- powerpc/watchpoints: annotate atomic context in more places (bsc#1194869).
- powerpc/watchpoints: disable preemption in thread_change_pc() (bsc#1194869).
- powerpc: add crtsavres.o to always-y instead of extra-y (bsc#1194869).
- powerpc: do not include lppaca.h in paca.h (bsc#1194869).
- pstore/ram: fix crash when setting number of cpus to an odd number (git-fixes).
- ras/amd/atl: add mi300 row retirement support (jsc#ped-7618).
- ras/amd/atl: fix bit overflow in denorm_addr_df4_np2() (git-fixes).
- ras: introduce a fru memory poison manager (jsc#ped-7618).
- rdma/bnxt_re: add a missing check in bnxt_qplib_query_srq (git-fixes)
- rdma/bnxt_re: return error for srq resize (git-fixes)
- rdma/core: fix uninit-value access in ib_get_eth_speed() (bsc#1219934).
- rdma/core: get ib width and speed from netdev (bsc#1219934).
- rdma/irdma: add ae for too many rnrs (git-fixes)
- rdma/irdma: fix kasan issue with tasklet (git-fixes)
- rdma/irdma: set the cq read threshold for gen 1 (git-fixes)
- rdma/irdma: validate max_send_wr and max_recv_wr (git-fixes)
- rdma/qedr: fix qedr_create_user_qp error flow (git-fixes)
- rdma/srpt: fix function pointer cast warnings (git-fixes)
- rdma/srpt: support specifying the srpt_service_guid parameter (git-fixes)
- refresh patches.suse/dm_blk_ioctl-implement-path-failover-for-sg_io (bsc#1216776, bsc#1220277)
- regulator: core: only increment use_count when enable_count changes (git-fixes).
- regulator: pwm-regulator: add validity checks in continuous .get_voltage (git-fixes).
- revert 'drm/amd/display: increased min_dcfclk_mhz and min_fclk_mhz' (git-fixes).
- revert 'drm/amd/pm: resolve reboot exception for si oland' (git-fixes).
- revert 'drm/amd: flush any delayed gfxoff on suspend entry' (git-fixes).
- rpm/kernel-binary.spec.in: install scripts/gdb when enabled in config (bsc#1219653) they are put into -devel subpackage. and a proper link to /usr/share/gdb/auto-load/ is created.
- s390/qeth: fix potential loss of l3-ip@ in case of network issues (git-fixes bsc#1219840).
- s390: use the correct count for __iowrite64_copy() (git-fixes bsc#1220317).
- sched/membarrier: reduce the ability to hammer on sys_membarrier (git-fixes).
- scsi: core: move scsi_host_busy() out of host lock for waking up eh handler (git-fixes).
- scsi: core: move scsi_host_busy() out of host lock if it is for per-command (git-fixes).
- scsi: fnic: move fnic_fnic_flush_tx() to a work queue (git-fixes bsc#1219141).
- scsi: hisi_sas: prevent parallel flr and controller reset (git-fixes).
- scsi: ibmvfc: limit max hw queues by num_online_cpus() (bsc#1220106).
- scsi: ibmvfc: open-code reset loop for target reset (bsc#1220106).
- scsi: isci: fix an error code problem in isci_io_request_build() (git-fixes).
- scsi: lpfc: add condition to delete ndlp object after sending bls_rjt to an abts (bsc#1220021).
- scsi: lpfc: allow lpfc_plogi_confirm_nport() logic to execute for fabric nodes (bsc#1220021).
- scsi: lpfc: change lpfc_vport fc_flag member into a bitmask (bsc#1220021).
- scsi: lpfc: change lpfc_vport load_flag member into a bitmask (bsc#1220021).
- scsi: lpfc: change nlp state statistic counters into atomic_t (bsc#1220021).
- scsi: lpfc: copyright updates for 14.4.0.0 patches (bsc#1220021).
- scsi: lpfc: fix failure to delete vports when discovery is in progress (bsc#1220021).
- scsi: lpfc: fix possible memory leak in lpfc_rcv_padisc() (bsc#1220021).
- scsi: lpfc: initialize status local variable in lpfc_sli4_repost_sgl_list() (bsc#1220021).
- scsi: lpfc: move handling of reset congestion statistics events (bsc#1220021).
- scsi: lpfc: protect vport fc_nodes list with an explicit spin lock (bsc#1220021).
- scsi: lpfc: remove d_id swap log message from trace event logger (bsc#1220021).
- scsi: lpfc: remove nlp_rcv_plogi early return during rscn processing for ndlps (bsc#1220021).
- scsi: lpfc: remove shost_lock protection for fc_host_port shost apis (bsc#1220021).
- scsi: lpfc: replace deprecated strncpy() with strscpy() (bsc#1220021).
- scsi: lpfc: save fpin frequency statistics upon receipt of peer cgn notifications (bsc#1220021).
- scsi: lpfc: update lpfc version to 14.4.0.0 (bsc#1220021).
- scsi: lpfc: use pci_header_type_mfd instead of literal (bsc#1220021).
- scsi: lpfc: use sg_dma_len() api to get struct scatterlist's length (bsc#1220021).
- scsi: mpi3mr: refresh sdev queue depth after controller reset (git-fixes).
- scsi: revert 'scsi: fcoe: fix potential deadlock on &amp;fip-&gt;ctlr_lock' (git-fixes bsc#1219141).
- serial: 8250: remove serial_rs485 sanitization from em485 (git-fixes).
- spi-mxs: fix chipselect glitch (git-fixes).
- spi: hisi-sfc-v3xx: return irq_none if no interrupts were detected (git-fixes).
- spi: ppc4xx: drop write-only variable (git-fixes).
- spi: sh-msiof: avoid integer overflow in constants (git-fixes).
- staging: iio: ad5933: fix type mismatch regression (git-fixes).
- supported.conf: remove external flag from ibm supported modules. (bsc#1209412)
- tcp: fix tcp_mtup_probe_success vs wrong snd_cwnd (bsc#1218450).
- tomoyo: fix uaf write bug in tomoyo_write_control() (git-fixes).
- topology/sysfs: add format parameter to macro defining 'show' functions for proc (jsc#ped-7618).
- topology/sysfs: add ppin in sysfs under cpu topology (jsc#ped-7618).
- tty: allow tiocslcktrmios with cap_checkpoint_restore (git-fixes).
- ubsan: array-index-out-of-bounds in dtsplitroot (git-fixes).
- usb: cdns3: fix memory double free when handle zero packet (git-fixes).
- usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() (git-fixes).
- usb: cdns3: modify the return value of cdns_set_active () to void when config_pm_sleep is disabled (git-fixes).
- usb: cdns3: put the cdns set active part outside the spin lock (git-fixes).
- usb: cdns: readd old api (git-fixes).
- usb: cdnsp: blocked some cdns3 specific code (git-fixes).
- usb: cdnsp: fixed issue with incorrect detecting cdnsp family controllers (git-fixes).
- usb: dwc3: gadget: do not disconnect if not started (git-fixes).
- usb: dwc3: gadget: handle ep0 request dequeuing properly (git-fixes).
- usb: dwc3: gadget: ignore end transfer delay on teardown (git-fixes).
- usb: dwc3: gadget: queue pm runtime idle on disconnect event (git-fixes).
- usb: dwc3: gadget: refactor ep0 forced stall/restart into a separate api (git-fixes).
- usb: dwc3: gadget: submit endxfer command if delayed during disconnect (git-fixes).
- usb: dwc3: host: set xhci_sg_trb_cache_size_quirk (git-fixes).
- usb: f_mass_storage: forbid async queue when shutdown happen (git-fixes).
- usb: gadget: core: add missing kerneldoc for vbus_work (git-fixes).
- usb: gadget: core: adjust uevent timing on gadget unbind (git-fixes).
- usb: gadget: core: help prevent panic during uvc unconfigure (git-fixes).
- usb: gadget: core: remove unbalanced mutex_unlock in usb_gadget_activate (git-fixes).
- usb: gadget: f_hid: fix report descriptor allocation (git-fixes).
- usb: gadget: fix obscure lockdep violation for udc_mutex (git-fixes).
- usb: gadget: fix use-after-free read in usb_udc_uevent() (git-fixes).
- usb: gadget: fsl_qe_udc: validate endpoint index for ch9 udc (git-fixes).
- usb: gadget: ncm: avoid dropping datagrams of properly parsed ntbs (git-fixes).
- usb: gadget: udc: core: offload usb_udc_vbus_handler processing (git-fixes).
- usb: gadget: udc: core: prevent soft_connect_store() race (git-fixes).
- usb: gadget: udc: handle gadget_connect failure during bind operation (git-fixes).
- usb: hub: check for alternate port before enabling a_alt_hnp_support (bsc#1218527).
- usb: hub: replace hardcoded quirk value with bit() macro (git-fixes).
- usb: roles: do not get/set_role() when usb_role_switch is unregistered (git-fixes).
- usb: roles: fix null pointer issue when put module's reference (git-fixes).
- usb: serial: cp210x: add id for imst im871a-usb (git-fixes).
- usb: serial: option: add fibocom fm101-gl variant (git-fixes).
- usb: serial: qcserial: add new usb-id for dell wireless dw5826e (git-fixes).
- watchdog: it87_wdt: keep wdtctrl bit 3 unmodified for it8784/it8786 (git-fixes).
- wifi: ath11k: fix registration of 6ghz-only phy without the full channel range (git-fixes).
- wifi: ath9k: fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() (git-fixes).
- wifi: cfg80211: fix missing interfaces when dumping (git-fixes).
- wifi: cfg80211: free beacon_ies when overridden from hidden bss (git-fixes).
- wifi: iwlwifi: fix some error codes (git-fixes).
- wifi: iwlwifi: mvm: avoid baid size integer overflow (git-fixes).
- wifi: iwlwifi: uninitialized variable in iwl_acpi_get_ppag_table() (git-fixes).
- wifi: mac80211: adding missing drv_mgd_complete_tx() call (git-fixes).
- wifi: mac80211: fix race condition on enabling fast-xmit (git-fixes).
- wifi: nl80211: reject iftype change with mesh id change (git-fixes).
- wifi: rt2x00: restart beacon queue when hardware reset (git-fixes).
- wifi: rtl8xxxu: add additional usb ids for rtl8192eu devices (git-fixes).
- wifi: rtlwifi: rtl8723{be,ae}: using calculate_bit_shift() (git-fixes).
- wifi: wext-core: fix -wstringop-overflow warning in ioctl_standard_iw_point() (git-fixes).
- x86/asm: add _asm_rip() macro for x86-64 (%rip) suffix (git-fixes).
- x86/bugs: add asm helpers for executing verw (git-fixes).
- x86/bugs: use alternative() instead of mds_user_clear static key (git-fixes). also add mds_user_clear to kabi severities since it's strictly mitigation related so should be low risk.
- x86/cpu: x86_feature_intel_ppin finally had a cpuid bit (jsc#ped-7618).
- x86/entry_32: add verw just before userspace transition (git-fixes).
- x86/entry_64: add verw just before userspace transition (git-fixes).
- x86/mm: fix memory encryption features advertisement (bsc#1206453).
- xfs: remove unused fields from struct xbtree_ifakeroot (git-fixes).
- xfs: short circuit xfs_growfs_data_private() if delta is zero (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-03-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206453">SUSE bug 1206453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209412">SUSE bug 1209412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213456">SUSE bug 1213456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216776">SUSE bug 1216776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217927">SUSE bug 1217927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218195">SUSE bug 1218195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218216">SUSE bug 1218216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218450">SUSE bug 1218450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218527">SUSE bug 1218527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218663">SUSE bug 1218663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218915">SUSE bug 1218915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219126">SUSE bug 1219126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219127">SUSE bug 1219127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219141">SUSE bug 1219141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219146">SUSE bug 1219146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219295">SUSE bug 1219295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219443">SUSE bug 1219443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219653">SUSE bug 1219653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219827">SUSE bug 1219827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219835">SUSE bug 1219835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219839">SUSE bug 1219839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219840">SUSE bug 1219840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219934">SUSE bug 1219934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220003">SUSE bug 1220003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220009">SUSE bug 1220009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220021">SUSE bug 1220021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220030">SUSE bug 1220030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220106">SUSE bug 1220106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220140">SUSE bug 1220140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220187">SUSE bug 1220187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220238">SUSE bug 1220238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220240">SUSE bug 1220240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220241">SUSE bug 1220241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220243">SUSE bug 1220243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220250">SUSE bug 1220250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220251">SUSE bug 1220251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220253">SUSE bug 1220253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220254">SUSE bug 1220254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220255">SUSE bug 1220255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220257">SUSE bug 1220257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220267">SUSE bug 1220267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220277">SUSE bug 1220277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220317">SUSE bug 1220317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220326">SUSE bug 1220326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220328">SUSE bug 1220328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220330">SUSE bug 1220330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220335">SUSE bug 1220335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220344">SUSE bug 1220344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220348">SUSE bug 1220348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220350">SUSE bug 1220350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220364">SUSE bug 1220364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220392">SUSE bug 1220392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220393">SUSE bug 1220393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220398">SUSE bug 1220398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220409">SUSE bug 1220409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220444">SUSE bug 1220444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220457">SUSE bug 1220457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220459">SUSE bug 1220459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220649">SUSE bug 1220649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220796">SUSE bug 1220796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220825">SUSE bug 1220825</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25162/">CVE-2019-25162 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25162">CVE-2019-25162 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46923/">CVE-2021-46923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46923">CVE-2021-46923 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46924/">CVE-2021-46924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46924">CVE-2021-46924 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46932/">CVE-2021-46932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46932">CVE-2021-46932 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-5197/">CVE-2023-5197 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5197">CVE-2023-5197 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52340/">CVE-2023-52340 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52340">CVE-2023-52340 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52429/">CVE-2023-52429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52429">CVE-2023-52429 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52439/">CVE-2023-52439 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52439">CVE-2023-52439 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52443/">CVE-2023-52443 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52443">CVE-2023-52443 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52445/">CVE-2023-52445 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52445">CVE-2023-52445 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52447/">CVE-2023-52447 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52447">CVE-2023-52447 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52448/">CVE-2023-52448 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52448">CVE-2023-52448 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52449/">CVE-2023-52449 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52449">CVE-2023-52449 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52451/">CVE-2023-52451 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52451">CVE-2023-52451 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52452/">CVE-2023-52452 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52452">CVE-2023-52452 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52456/">CVE-2023-52456 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52456">CVE-2023-52456 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52457/">CVE-2023-52457 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52457">CVE-2023-52457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52463/">CVE-2023-52463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52463">CVE-2023-52463 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52464/">CVE-2023-52464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52464">CVE-2023-52464 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52475/">CVE-2023-52475 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52475">CVE-2023-52475 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52478/">CVE-2023-52478 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52478">CVE-2023-52478 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6817/">CVE-2023-6817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6817">CVE-2023-6817 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-0607/">CVE-2024-0607 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0607">CVE-2024-0607 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1151/">CVE-2024-1151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1151">CVE-2024-1151 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23849/">CVE-2024-23849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23849">CVE-2024-23849 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23850/">CVE-2024-23850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23850">CVE-2024-23850 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23851/">CVE-2024-23851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23851">CVE-2024-23851 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25744/">CVE-2024-25744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25744">CVE-2024-25744 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26585/">CVE-2024-26585 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26585">CVE-2024-26585 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26586/">CVE-2024-26586 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26586">CVE-2024-26586 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26589/">CVE-2024-26589 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26589">CVE-2024-26589 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26591/">CVE-2024-26591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26591">CVE-2024-26591 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26593/">CVE-2024-26593 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26593">CVE-2024-26593 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26595/">CVE-2024-26595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26595">CVE-2024-26595 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26598/">CVE-2024-26598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26598">CVE-2024-26598 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26602/">CVE-2024-26602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26602">CVE-2024-26602 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26603/">CVE-2024-26603 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26603">CVE-2024-26603 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26622/">CVE-2024-26622 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26622">CVE-2024-26622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850498" comment="cluster-md-kmp-64kb-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850499" comment="cluster-md-kmp-default-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850500" comment="dlm-kmp-64kb-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850501" comment="dlm-kmp-default-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850502" comment="dtb-allwinner-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850503" comment="dtb-altera-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850504" comment="dtb-amazon-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850505" comment="dtb-amd-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850506" comment="dtb-amlogic-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850507" comment="dtb-apm-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850508" comment="dtb-apple-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850509" comment="dtb-arm-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850510" comment="dtb-broadcom-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850511" comment="dtb-cavium-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850512" comment="dtb-exynos-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850513" comment="dtb-freescale-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850514" comment="dtb-hisilicon-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850515" comment="dtb-lg-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850516" comment="dtb-marvell-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850517" comment="dtb-mediatek-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850518" comment="dtb-nvidia-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850519" comment="dtb-qcom-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850520" comment="dtb-renesas-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850521" comment="dtb-rockchip-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850522" comment="dtb-socionext-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850523" comment="dtb-sprd-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850524" comment="dtb-xilinx-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850525" comment="gfs2-kmp-64kb-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850526" comment="gfs2-kmp-default-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850527" comment="kernel-64kb-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850528" comment="kernel-64kb-devel-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850529" comment="kernel-64kb-extra-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850530" comment="kernel-64kb-livepatch-devel-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850531" comment="kernel-64kb-optional-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850532" comment="kernel-debug-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850533" comment="kernel-debug-devel-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850534" comment="kernel-debug-livepatch-devel-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850535" comment="kernel-debug-vdso-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850536" comment="kernel-default-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850537" comment="kernel-default-base-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850538" comment="kernel-default-base-rebuild-5.14.21-150500.55.52.1.150500.6.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850539" comment="kernel-default-devel-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850540" comment="kernel-default-extra-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850541" comment="kernel-default-livepatch-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850542" comment="kernel-default-livepatch-devel-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850543" comment="kernel-default-optional-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850544" comment="kernel-default-vdso-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850545" comment="kernel-devel-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850546" comment="kernel-docs-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850547" comment="kernel-docs-html-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850548" comment="kernel-kvmsmall-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850549" comment="kernel-kvmsmall-devel-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850550" comment="kernel-kvmsmall-livepatch-devel-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850551" comment="kernel-kvmsmall-vdso-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850552" comment="kernel-macros-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850553" comment="kernel-obs-build-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850554" comment="kernel-obs-qa-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850555" comment="kernel-source-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850556" comment="kernel-source-vanilla-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850557" comment="kernel-syms-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850558" comment="kernel-zfcpdump-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850559" comment="kselftests-kmp-64kb-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850560" comment="kselftests-kmp-default-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850561" comment="ocfs2-kmp-64kb-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850562" comment="ocfs2-kmp-default-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850563" comment="reiserfs-kmp-64kb-5.14.21-150500.55.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850564" comment="reiserfs-kmp-default-5.14.21-150500.55.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5247" version="1" class="patch">
	<metadata>
		<title>Security update for fontforge (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220404" ref_url="https://bugzilla.suse.com/1220404" source="BUGZILLA"/>
		<reference ref_id="1220405" ref_url="https://bugzilla.suse.com/1220405" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-25081" ref_url="https://www.suse.com/security/cve/CVE-2024-25081/" source="CVE"/>
		<reference ref_id="CVE-2024-25082" ref_url="https://www.suse.com/security/cve/CVE-2024-25082/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018156.html" source="SUSE-SU"/>
		<description>
This update for fontforge fixes the following issues:

- CVE-2024-25081: Fixed command injection via crafted filenames (bsc#1220404).
- CVE-2024-25082: Fixed command injection via crafted archives or compressed files (bsc#1220405).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-03-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220404">SUSE bug 1220404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220405">SUSE bug 1220405</bugzilla>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25081/">CVE-2024-25081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25081">CVE-2024-25081 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25082/">CVE-2024-25082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25082">CVE-2024-25082 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850609" comment="fontforge-20200314-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850610" comment="fontforge-devel-20200314-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850611" comment="fontforge-doc-20200314-150200.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5248" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217445" ref_url="https://bugzilla.suse.com/1217445" source="BUGZILLA"/>
		<reference ref_id="1217589" ref_url="https://bugzilla.suse.com/1217589" source="BUGZILLA"/>
		<reference ref_id="1218866" ref_url="https://bugzilla.suse.com/1218866" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2024:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018164.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

Security issues fixed:

- qsort: harden handling of degenerated / non transient compare function (bsc#1218866)

Other issues fixed:

- getaddrinfo: translate ENOMEM to EAI_MEMORY (bsc#1217589, BZ #31163)
- aarch64: correct CFI in rawmemchr (bsc#1217445, BZ #31113)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-03-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1217445">SUSE bug 1217445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217589">SUSE bug 1217589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218866">SUSE bug 1218866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009850990" comment="glibc-2.31-150300.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850991" comment="glibc-32bit-2.31-150300.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850992" comment="glibc-devel-2.31-150300.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850993" comment="glibc-devel-32bit-2.31-150300.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850994" comment="glibc-devel-static-2.31-150300.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850995" comment="glibc-devel-static-32bit-2.31-150300.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850996" comment="glibc-extra-2.31-150300.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850997" comment="glibc-html-2.31-150300.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850677" comment="glibc-i18ndata-2.31-150300.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850678" comment="glibc-info-2.31-150300.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850679" comment="glibc-lang-2.31-150300.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850998" comment="glibc-locale-2.31-150300.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009850999" comment="glibc-locale-base-2.31-150300.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851000" comment="glibc-locale-base-32bit-2.31-150300.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851001" comment="glibc-profile-2.31-150300.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851002" comment="glibc-profile-32bit-2.31-150300.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851003" comment="glibc-utils-2.31-150300.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851004" comment="glibc-utils-32bit-2.31-150300.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851005" comment="nscd-2.31-150300.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5249" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1221134" ref_url="https://bugzilla.suse.com/1221134" source="BUGZILLA"/>
		<reference ref_id="1221151" ref_url="https://bugzilla.suse.com/1221151" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-42465" ref_url="https://www.suse.com/security/cve/CVE-2023-42465/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018160.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- CVE-2023-42465: Fixed issues introduced by first patches (bsc#1221151, bsc#1221134).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-13"/>
	<updated date="2024-03-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221134">SUSE bug 1221134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221151">SUSE bug 1221151</bugzilla>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42465/">CVE-2023-42465 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42465">CVE-2023-42465 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851006" comment="sudo-1.9.12p1-150500.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851007" comment="sudo-devel-1.9.12p1-150500.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851008" comment="sudo-plugin-python-1.9.12p1-150500.7.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851009" comment="sudo-test-1.9.12p1-150500.7.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5250" version="1" class="patch">
	<metadata>
		<title>Security update for spectre-meltdown-checker (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018179.html" source="SUSE-SU"/>
		<description>
This update for spectre-meltdown-checker fixes the following issues:

- updated to 0.46
  This release mainly focuses on the detection of the new Zenbleed
  (CVE-2023-20593) vulnerability, among few other changes that were in
  line waiting for a release:
  - feat: detect the vulnerability and mitigation of Zenbleed (CVE-2023-20593)
  - feat: add the linux-firmware repository as another source for CPU microcode versions
  - feat: arm: add Neoverse-N2, Neoverse-V1 and Neoverse-V2
  - fix: docker: adding missing utils (#433)
  - feat: add support for Guix System kernel
  - fix: rewrite SQL to be sqlite3 &gt;= 3.41 compatible (#443)
  - fix: a /devnull file was mistakenly created on the filesystem
  - fix: fwdb: ignore MCEdb versions where an official Intel version exists (fixes #430)

- updated to 0.45
  - arm64: phytium: Add CPU Implementer Phytium
  - arm64: variant 4: detect ssbd mitigation from kernel img, system.map or kconfig
  - chore: ensure vars are set before being dereferenced (set -u compat)
  - chore: fix indentation
  - chore: fwdb: update to v220+i20220208
  - chore: only attempt to load msr and cpuid module once
  - chore: read_cpuid: use named constants
  - chore: readme: framapic is gone, host the screenshots on GitHub
  - chore: replace 'Vulnerable to' by 'Affected by' in the hw section
  - chore: speculative execution -&gt; transient execution
  - chore: update fwdb to v222+i20220208
  - chore: update Intel Family 6 models
  - chore: wording: model not vulnerable -&gt; model not affected
  - doc: add an FAQ entry about CVE support
  - doc: add an FAQ.md and update the README.md accordingly
  - doc: more FAQ and README
  - doc: readme: make the FAQ entry more visible
  - feat: add --allow-msr-write, no longer write by default (#385), detect when writing is denied
  - feat: add --cpu, apply changes to (read|write)_msr, update fwdb to v221+i20220208
  - feat: add subleaf != 0 support for read_cpuid
  - feat: arm: add Cortex A77 and Neoverse-N1 (fixes #371)
  - feat: bsd: for unimplemented CVEs, at least report when CPU is not affected
  - feat: hw check: add IPRED, RRSBA, BHI features check
  - feat: implement detection for MCEPSC under BSD
  - feat: set default TMPDIR for Android (#415)
  - fix: extract_kernel: don't overwrite kernel_err if already set
  - fix: has_vmm false positive with pcp
  - fix: is_ucode_blacklisted: fix some model names
  - fix: mcedb: v191 changed the MCE table format
  - fix: refuse to run under MacOS and ESXi
  - fix: retpoline: detection on 5.15.28+ (#420)
  - fix: variant4: added case where prctl ssbd status is tagged as 'unknown'
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-14"/>
	<updated date="2024-03-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851037" comment="spectre-meltdown-checker-0.46-150100.3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5251" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1221054" ref_url="https://bugzilla.suse.com/1221054" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-1936" ref_url="https://www.suse.com/security/cve/CVE-2024-1936/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018174.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Security Vulnerabilities fixed in Thunderbird 115.8.1 (bsc#1221054):

- CVE-2024-1936: Fixed leaking of encrypted email subjects to other conversations (MFSA 2024-11) (bsc#1221054). 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-14"/>
	<updated date="2024-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1221054">SUSE bug 1221054</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1936/">CVE-2024-1936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1936">CVE-2024-1936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851038" comment="MozillaThunderbird-115.8.1-150200.8.151.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851039" comment="MozillaThunderbird-translations-common-115.8.1-150200.8.151.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851040" comment="MozillaThunderbird-translations-other-115.8.1-150200.8.151.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5252" version="1" class="patch">
	<metadata>
		<title>Security update for gdb (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1068950" ref_url="https://bugzilla.suse.com/1068950" source="BUGZILLA"/>
		<reference ref_id="1081527" ref_url="https://bugzilla.suse.com/1081527" source="BUGZILLA"/>
		<reference ref_id="1211052" ref_url="https://bugzilla.suse.com/1211052" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-16829" ref_url="https://www.suse.com/security/cve/CVE-2017-16829/" source="CVE"/>
		<reference ref_id="CVE-2018-7208" ref_url="https://www.suse.com/security/cve/CVE-2018-7208/" source="CVE"/>
		<reference ref_id="CVE-2022-48064" ref_url="https://www.suse.com/security/cve/CVE-2022-48064/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018169.html" source="SUSE-SU"/>
		<description>
This update for gdb fixes the following issues:

- Drop libdebuginfod1 BuildRequires/Recommends. The former isn't
  needed because there's a build requirement on libdebuginfod-devel
  already, which will pull the shared library. And the latter,
  because it's bogus since RPM auto generated dependency will take
  care of that requirement.

gdb was released in 13.2:

* This version of GDB includes the following changes and enhancements:

  * Support for the following new targets has been added in both GDB and GDBserver:

        * GNU/Linux/LoongArch (gdbserver) loongarch*-*-linux*
        * GNU/Linux/CSKY (gdbserver) csky*-*linux* 

  * The Windows native target now supports target async.
  * Floating-point support has now been added on LoongArch GNU/Linux.
  * New commands:

        * set print nibbles [on|off]
        * show print nibbles

        * This controls whether the 'print/t' command will display binary values in groups of four bits, known as 'nibbles'. The default is 'off'.
          Various styling-related commands. See the gdb/NEWS file for more details.
          Various maintenance commands. These are normally aimed at GDB experts or developers. See the gdb/NEWS file for more details. 

  * Python API improvements:

          * New Python API for instruction disassembly.

          * The new attribute 'locations' of gdb.Breakpoint returns a list of gdb.BreakpointLocation objects specifying the locations where the breakpoint is inserted into the debuggee.
          * New Python type gdb.BreakpointLocation.
          * New function gdb.format_address(ADDRESS, PROGSPACE, ARCHITECTURE) that formats ADDRESS as 'address '
          * New function gdb.current_language that returns the name of the current language. Unlike gdb.parameter('language'), this will never return 'auto'.
          * New function gdb.print_options that returns a dictionary of the prevailing print options, in the form accepted by gdb.Value.format_string.
          * New method gdb.Frame.language that returns the name of the frame's language.
          * gdb.Value.format_string now uses the format provided by 'print', if it is called during a 'print' or other similar operation.
          * gdb.Value.format_string now accepts the 'summary' keyword. This can be used to request a shorter representation of a value, the way that 'set print frame-arguments scalars' does.
          * The gdb.register_window_type method now restricts the set of acceptable window names. The first character of a window's name must start with a character in the set [a-zA-Z], every subsequent character of a window's name must be in the set [-_.a-zA-Z0-9]. 
   * GDB/MI changes:

          * MI version 1 is deprecated, and will be removed in GDB 14.
          * The async record stating the stopped reason 'breakpoint-hit' now contains an optional field locno. 

   * Miscellaneous improvements:

          * gdb now supports zstd compressed debug sections (ELFCOMPRESS_ZSTD) for ELF.
          * New convenience variable $_inferior_thread_count contains the number of live threads in the current inferior.
          * New convenience variables $_hit_bpnum and $_hit_locno, set to the breakpoint number and the breakpoint location number of the breakpoint last hit.
          * The 'info breakpoints' now displays enabled breakpoint locations of disabled breakpoints as in the 'y-' state.
          * The format of 'disassemble /r' and 'record instruction-history /r' has changed to match the layout of GNU objdump when disassembling.

          * A new format '/b' has been introduce to provide the old behavior of '/r'.
          * The TUI no longer styles the source and assembly code highlighted by the current position indicator by default. You can however re-enable styling using the new 'set style tui-current-position' command.
          * It is now possible to use the 'document' command to document user-defined commands.
          * Support for memory tag data for AArch64 MTE. 

   * Support Removal notices:

          * DBX mode has been removed.
          * Support for building against Python version 2 has been removed. It is now only possible to build GDB against Python 3.
          * Support for the following commands has been removed:

          * set debug aix-solib on|off
          * show debug aix-solib
          * set debug solib-frv on|off
          * show debug solib-frv

          * Use the 'set/show debug solib' commands instead. 

See the NEWS file for a more complete and detailed list of what this release includes. 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-14"/>
	<updated date="2024-03-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1068950">SUSE bug 1068950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081527">SUSE bug 1081527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211052">SUSE bug 1211052</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16829/">CVE-2017-16829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16829">CVE-2017-16829 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7208/">CVE-2018-7208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-7208">CVE-2018-7208 at NVD</cve>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48064/">CVE-2022-48064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48064">CVE-2022-48064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851041" comment="gdb-13.2-150400.15.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851042" comment="gdb-testresults-13.2-150400.15.14.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851043" comment="gdbserver-13.2-150400.15.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5253" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1214691" ref_url="https://bugzilla.suse.com/1214691" source="BUGZILLA"/>
		<reference ref_id="1219666" ref_url="https://bugzilla.suse.com/1219666" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-48566" ref_url="https://www.suse.com/security/cve/CVE-2022-48566/" source="CVE"/>
		<reference ref_id="CVE-2023-6597" ref_url="https://www.suse.com/security/cve/CVE-2023-6597/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018166.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2023-6597: Fixed symlink bug in cleanup of tempfile.TemporaryDirectory (bsc#1219666).
- CVE-2022-48566: Make compare_digest more constant-time (bsc#1214691).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-14"/>
	<updated date="2024-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1214691">SUSE bug 1214691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219666">SUSE bug 1219666</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-48566/">CVE-2022-48566 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48566">CVE-2022-48566 at NVD</cve>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6597/">CVE-2023-6597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6597">CVE-2023-6597 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851044" comment="libpython3_6m1_0-3.6.15-150300.10.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851045" comment="libpython3_6m1_0-32bit-3.6.15-150300.10.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851046" comment="python3-3.6.15-150300.10.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851047" comment="python3-base-3.6.15-150300.10.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851048" comment="python3-curses-3.6.15-150300.10.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851049" comment="python3-dbm-3.6.15-150300.10.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851050" comment="python3-devel-3.6.15-150300.10.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851051" comment="python3-doc-3.6.15-150300.10.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851052" comment="python3-doc-devhelp-3.6.15-150300.10.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851053" comment="python3-idle-3.6.15-150300.10.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851054" comment="python3-testsuite-3.6.15-150300.10.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851055" comment="python3-tk-3.6.15-150300.10.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851056" comment="python3-tools-3.6.15-150300.10.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5254" version="1" class="patch">
	<metadata>
		<title>Security update for python-Django (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220358" ref_url="https://bugzilla.suse.com/1220358" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-27351" ref_url="https://www.suse.com/security/cve/CVE-2024-27351/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018165.html" source="SUSE-SU"/>
		<description>
This update for python-Django fixes the following issues:

- CVE-2024-27351: Fixed a regular expression DoS in django.utils.text.Truncator.words (bsc#1220358)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-14"/>
	<updated date="2024-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220358">SUSE bug 1220358</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27351/">CVE-2024-27351 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27351">CVE-2024-27351 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851057" comment="python3-Django-2.0.7-150000.1.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5255" version="1" class="patch">
	<metadata>
		<title>Security update for 389-ds (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219836" ref_url="https://bugzilla.suse.com/1219836" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-1062" ref_url="https://www.suse.com/security/cve/CVE-2024-1062/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018180.html" source="SUSE-SU"/>
		<description>
This update for 389-ds fixes the following issues:

- CVE-2024-1062: Fixed possible denial of service when audit logging is enabled (bsc#1219836).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-03-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219836">SUSE bug 1219836</bugzilla>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1062/">CVE-2024-1062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1062">CVE-2024-1062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851426" comment="389-ds-2.2.8~git65.347aae6-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851427" comment="389-ds-devel-2.2.8~git65.347aae6-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851428" comment="389-ds-snmp-2.2.8~git65.347aae6-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851429" comment="lib389-2.2.8~git65.347aae6-150500.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851430" comment="libsvrcore0-2.2.8~git65.347aae6-150500.3.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5256" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1194869" ref_url="https://bugzilla.suse.com/1194869" source="BUGZILLA"/>
		<reference ref_id="1206453" ref_url="https://bugzilla.suse.com/1206453" source="BUGZILLA"/>
		<reference ref_id="1209412" ref_url="https://bugzilla.suse.com/1209412" source="BUGZILLA"/>
		<reference ref_id="1213456" ref_url="https://bugzilla.suse.com/1213456" source="BUGZILLA"/>
		<reference ref_id="1216776" ref_url="https://bugzilla.suse.com/1216776" source="BUGZILLA"/>
		<reference ref_id="1217927" ref_url="https://bugzilla.suse.com/1217927" source="BUGZILLA"/>
		<reference ref_id="1218195" ref_url="https://bugzilla.suse.com/1218195" source="BUGZILLA"/>
		<reference ref_id="1218216" ref_url="https://bugzilla.suse.com/1218216" source="BUGZILLA"/>
		<reference ref_id="1218450" ref_url="https://bugzilla.suse.com/1218450" source="BUGZILLA"/>
		<reference ref_id="1218527" ref_url="https://bugzilla.suse.com/1218527" source="BUGZILLA"/>
		<reference ref_id="1218663" ref_url="https://bugzilla.suse.com/1218663" source="BUGZILLA"/>
		<reference ref_id="1218915" ref_url="https://bugzilla.suse.com/1218915" source="BUGZILLA"/>
		<reference ref_id="1219126" ref_url="https://bugzilla.suse.com/1219126" source="BUGZILLA"/>
		<reference ref_id="1219127" ref_url="https://bugzilla.suse.com/1219127" source="BUGZILLA"/>
		<reference ref_id="1219141" ref_url="https://bugzilla.suse.com/1219141" source="BUGZILLA"/>
		<reference ref_id="1219146" ref_url="https://bugzilla.suse.com/1219146" source="BUGZILLA"/>
		<reference ref_id="1219295" ref_url="https://bugzilla.suse.com/1219295" source="BUGZILLA"/>
		<reference ref_id="1219443" ref_url="https://bugzilla.suse.com/1219443" source="BUGZILLA"/>
		<reference ref_id="1219653" ref_url="https://bugzilla.suse.com/1219653" source="BUGZILLA"/>
		<reference ref_id="1219827" ref_url="https://bugzilla.suse.com/1219827" source="BUGZILLA"/>
		<reference ref_id="1219835" ref_url="https://bugzilla.suse.com/1219835" source="BUGZILLA"/>
		<reference ref_id="1219839" ref_url="https://bugzilla.suse.com/1219839" source="BUGZILLA"/>
		<reference ref_id="1219840" ref_url="https://bugzilla.suse.com/1219840" source="BUGZILLA"/>
		<reference ref_id="1219934" ref_url="https://bugzilla.suse.com/1219934" source="BUGZILLA"/>
		<reference ref_id="1220003" ref_url="https://bugzilla.suse.com/1220003" source="BUGZILLA"/>
		<reference ref_id="1220009" ref_url="https://bugzilla.suse.com/1220009" source="BUGZILLA"/>
		<reference ref_id="1220021" ref_url="https://bugzilla.suse.com/1220021" source="BUGZILLA"/>
		<reference ref_id="1220030" ref_url="https://bugzilla.suse.com/1220030" source="BUGZILLA"/>
		<reference ref_id="1220106" ref_url="https://bugzilla.suse.com/1220106" source="BUGZILLA"/>
		<reference ref_id="1220140" ref_url="https://bugzilla.suse.com/1220140" source="BUGZILLA"/>
		<reference ref_id="1220187" ref_url="https://bugzilla.suse.com/1220187" source="BUGZILLA"/>
		<reference ref_id="1220238" ref_url="https://bugzilla.suse.com/1220238" source="BUGZILLA"/>
		<reference ref_id="1220240" ref_url="https://bugzilla.suse.com/1220240" source="BUGZILLA"/>
		<reference ref_id="1220241" ref_url="https://bugzilla.suse.com/1220241" source="BUGZILLA"/>
		<reference ref_id="1220243" ref_url="https://bugzilla.suse.com/1220243" source="BUGZILLA"/>
		<reference ref_id="1220250" ref_url="https://bugzilla.suse.com/1220250" source="BUGZILLA"/>
		<reference ref_id="1220251" ref_url="https://bugzilla.suse.com/1220251" source="BUGZILLA"/>
		<reference ref_id="1220253" ref_url="https://bugzilla.suse.com/1220253" source="BUGZILLA"/>
		<reference ref_id="1220254" ref_url="https://bugzilla.suse.com/1220254" source="BUGZILLA"/>
		<reference ref_id="1220255" ref_url="https://bugzilla.suse.com/1220255" source="BUGZILLA"/>
		<reference ref_id="1220257" ref_url="https://bugzilla.suse.com/1220257" source="BUGZILLA"/>
		<reference ref_id="1220267" ref_url="https://bugzilla.suse.com/1220267" source="BUGZILLA"/>
		<reference ref_id="1220277" ref_url="https://bugzilla.suse.com/1220277" source="BUGZILLA"/>
		<reference ref_id="1220317" ref_url="https://bugzilla.suse.com/1220317" source="BUGZILLA"/>
		<reference ref_id="1220326" ref_url="https://bugzilla.suse.com/1220326" source="BUGZILLA"/>
		<reference ref_id="1220328" ref_url="https://bugzilla.suse.com/1220328" source="BUGZILLA"/>
		<reference ref_id="1220330" ref_url="https://bugzilla.suse.com/1220330" source="BUGZILLA"/>
		<reference ref_id="1220335" ref_url="https://bugzilla.suse.com/1220335" source="BUGZILLA"/>
		<reference ref_id="1220344" ref_url="https://bugzilla.suse.com/1220344" source="BUGZILLA"/>
		<reference ref_id="1220348" ref_url="https://bugzilla.suse.com/1220348" source="BUGZILLA"/>
		<reference ref_id="1220350" ref_url="https://bugzilla.suse.com/1220350" source="BUGZILLA"/>
		<reference ref_id="1220364" ref_url="https://bugzilla.suse.com/1220364" source="BUGZILLA"/>
		<reference ref_id="1220392" ref_url="https://bugzilla.suse.com/1220392" source="BUGZILLA"/>
		<reference ref_id="1220393" ref_url="https://bugzilla.suse.com/1220393" source="BUGZILLA"/>
		<reference ref_id="1220398" ref_url="https://bugzilla.suse.com/1220398" source="BUGZILLA"/>
		<reference ref_id="1220409" ref_url="https://bugzilla.suse.com/1220409" source="BUGZILLA"/>
		<reference ref_id="1220444" ref_url="https://bugzilla.suse.com/1220444" source="BUGZILLA"/>
		<reference ref_id="1220457" ref_url="https://bugzilla.suse.com/1220457" source="BUGZILLA"/>
		<reference ref_id="1220459" ref_url="https://bugzilla.suse.com/1220459" source="BUGZILLA"/>
		<reference ref_id="1220649" ref_url="https://bugzilla.suse.com/1220649" source="BUGZILLA"/>
		<reference ref_id="1220796" ref_url="https://bugzilla.suse.com/1220796" source="BUGZILLA"/>
		<reference ref_id="1220825" ref_url="https://bugzilla.suse.com/1220825" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25162" ref_url="https://www.suse.com/security/cve/CVE-2019-25162/" source="CVE"/>
		<reference ref_id="CVE-2021-46923" ref_url="https://www.suse.com/security/cve/CVE-2021-46923/" source="CVE"/>
		<reference ref_id="CVE-2021-46924" ref_url="https://www.suse.com/security/cve/CVE-2021-46924/" source="CVE"/>
		<reference ref_id="CVE-2021-46932" ref_url="https://www.suse.com/security/cve/CVE-2021-46932/" source="CVE"/>
		<reference ref_id="CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746/" source="CVE"/>
		<reference ref_id="CVE-2023-5197" ref_url="https://www.suse.com/security/cve/CVE-2023-5197/" source="CVE"/>
		<reference ref_id="CVE-2023-52340" ref_url="https://www.suse.com/security/cve/CVE-2023-52340/" source="CVE"/>
		<reference ref_id="CVE-2023-52429" ref_url="https://www.suse.com/security/cve/CVE-2023-52429/" source="CVE"/>
		<reference ref_id="CVE-2023-52439" ref_url="https://www.suse.com/security/cve/CVE-2023-52439/" source="CVE"/>
		<reference ref_id="CVE-2023-52443" ref_url="https://www.suse.com/security/cve/CVE-2023-52443/" source="CVE"/>
		<reference ref_id="CVE-2023-52445" ref_url="https://www.suse.com/security/cve/CVE-2023-52445/" source="CVE"/>
		<reference ref_id="CVE-2023-52447" ref_url="https://www.suse.com/security/cve/CVE-2023-52447/" source="CVE"/>
		<reference ref_id="CVE-2023-52448" ref_url="https://www.suse.com/security/cve/CVE-2023-52448/" source="CVE"/>
		<reference ref_id="CVE-2023-52449" ref_url="https://www.suse.com/security/cve/CVE-2023-52449/" source="CVE"/>
		<reference ref_id="CVE-2023-52451" ref_url="https://www.suse.com/security/cve/CVE-2023-52451/" source="CVE"/>
		<reference ref_id="CVE-2023-52452" ref_url="https://www.suse.com/security/cve/CVE-2023-52452/" source="CVE"/>
		<reference ref_id="CVE-2023-52456" ref_url="https://www.suse.com/security/cve/CVE-2023-52456/" source="CVE"/>
		<reference ref_id="CVE-2023-52457" ref_url="https://www.suse.com/security/cve/CVE-2023-52457/" source="CVE"/>
		<reference ref_id="CVE-2023-52463" ref_url="https://www.suse.com/security/cve/CVE-2023-52463/" source="CVE"/>
		<reference ref_id="CVE-2023-52464" ref_url="https://www.suse.com/security/cve/CVE-2023-52464/" source="CVE"/>
		<reference ref_id="CVE-2023-52475" ref_url="https://www.suse.com/security/cve/CVE-2023-52475/" source="CVE"/>
		<reference ref_id="CVE-2023-52478" ref_url="https://www.suse.com/security/cve/CVE-2023-52478/" source="CVE"/>
		<reference ref_id="CVE-2023-6817" ref_url="https://www.suse.com/security/cve/CVE-2023-6817/" source="CVE"/>
		<reference ref_id="CVE-2024-0607" ref_url="https://www.suse.com/security/cve/CVE-2024-0607/" source="CVE"/>
		<reference ref_id="CVE-2024-1151" ref_url="https://www.suse.com/security/cve/CVE-2024-1151/" source="CVE"/>
		<reference ref_id="CVE-2024-23849" ref_url="https://www.suse.com/security/cve/CVE-2024-23849/" source="CVE"/>
		<reference ref_id="CVE-2024-23850" ref_url="https://www.suse.com/security/cve/CVE-2024-23850/" source="CVE"/>
		<reference ref_id="CVE-2024-23851" ref_url="https://www.suse.com/security/cve/CVE-2024-23851/" source="CVE"/>
		<reference ref_id="CVE-2024-25744" ref_url="https://www.suse.com/security/cve/CVE-2024-25744/" source="CVE"/>
		<reference ref_id="CVE-2024-26585" ref_url="https://www.suse.com/security/cve/CVE-2024-26585/" source="CVE"/>
		<reference ref_id="CVE-2024-26586" ref_url="https://www.suse.com/security/cve/CVE-2024-26586/" source="CVE"/>
		<reference ref_id="CVE-2024-26589" ref_url="https://www.suse.com/security/cve/CVE-2024-26589/" source="CVE"/>
		<reference ref_id="CVE-2024-26591" ref_url="https://www.suse.com/security/cve/CVE-2024-26591/" source="CVE"/>
		<reference ref_id="CVE-2024-26593" ref_url="https://www.suse.com/security/cve/CVE-2024-26593/" source="CVE"/>
		<reference ref_id="CVE-2024-26595" ref_url="https://www.suse.com/security/cve/CVE-2024-26595/" source="CVE"/>
		<reference ref_id="CVE-2024-26598" ref_url="https://www.suse.com/security/cve/CVE-2024-26598/" source="CVE"/>
		<reference ref_id="CVE-2024-26602" ref_url="https://www.suse.com/security/cve/CVE-2024-26602/" source="CVE"/>
		<reference ref_id="CVE-2024-26603" ref_url="https://www.suse.com/security/cve/CVE-2024-26603/" source="CVE"/>
		<reference ref_id="CVE-2024-26622" ref_url="https://www.suse.com/security/cve/CVE-2024-26622/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2019-25162: Fixed a potential use after free (bsc#1220409).
- CVE-2021-46923: Fixed reference leakage in fs/mount_setattr (bsc#1220457).
- CVE-2021-46924: Fixed fix memory leak in device probe and remove (bsc#1220459)
- CVE-2021-46932: Fixed missing work initialization before device registration (bsc#1220444)
- CVE-2023-28746: Fixed Register File Data Sampling (bsc#1213456).
- CVE-2023-5197: Fixed se-after-free due to addition and removal of rules from chain bindings within the same transaction (bsc#1218216).
- CVE-2023-52340: Fixed ICMPv6 “Packet Too Big” packets force a DoS of the Linux kernel by forcing 100% CPU (bsc#1219295).
- CVE-2023-52429: Fixed potential DoS in dm_table_create in drivers/md/dm-table.c (bsc#1219827).
- CVE-2023-52439: Fixed use-after-free in uio_open (bsc#1220140).
- CVE-2023-52443: Fixed crash when parsed profile name is empty  (bsc#1220240).
- CVE-2023-52445: Fixed use after free on context disconnection (bsc#1220241).
- CVE-2023-52447: Fixed map_fd_put_ptr() signature kABI workaround  (bsc#1220251).
- CVE-2023-52448: Fixed kernel NULL pointer dereference in gfs2_rgrp_dump  (bsc#1220253).
- CVE-2023-52449: Fixed gluebi NULL pointer dereference caused by ftl notifier  (bsc#1220238).
- CVE-2023-52451: Fixed access beyond end of drmem array  (bsc#1220250).
- CVE-2023-52452: Fixed Fix accesses to uninit stack slots (bsc#1220257).
- CVE-2023-52456: Fixed tx statemachine deadlock (bsc#1220364).
- CVE-2023-52457: Fixed skipped resource freeing if  pm_runtime_resume_and_get() failed (bsc#1220350).
- CVE-2023-52463: Fixed null pointer dereference in efivarfs (bsc#1220328).
- CVE-2023-52464: Fixed possible out-of-bounds string access (bsc#1220330)
- CVE-2023-52475: Fixed use-after-free in powermate_config_complete (bsc#1220649)
- CVE-2023-52478: Fixed kernel crash on receiver USB disconnect (bsc#1220796)
- CVE-2023-6817: Fixed use-after-free in nft_pipapo_walk (bsc#1218195).
- CVE-2024-0607: Fixed 64-bit load issue in  nft_byteorder_eval() (bsc#1218915).
- CVE-2024-1151: Fixed unlimited number of recursions from action  sets (bsc#1219835).
- CVE-2024-23849: Fixed array-index-out-of-bounds in rds_cmsg_recv  (bsc#1219127).
- CVE-2024-23850: Fixed double free of anonymous device after snapshot  creation failure (bsc#1219126).
- CVE-2024-23851: Fixed crash in copy_params in drivers/md/dm-ioctl.c (bsc#1219146).
- CVE-2024-25744: Fixed Security issue with int 80 interrupt vector (bsc#1217927).
- CVE-2024-26585: Fixed race between tx work scheduling and socket close  (bsc#1220187).
- CVE-2024-26586: Fixed stack corruption (bsc#1220243).
- CVE-2024-26589: Fixed out of bounds read due to variable offset alu on PTR_TO_FLOW_KEYS (bsc#1220255).
- CVE-2024-26591: Fixed re-attachment branch in bpf_tracing_prog_attach  (bsc#1220254).
- CVE-2024-26593: Fixed block process call transactions (bsc#1220009).
- CVE-2024-26595: Fixed NULL pointer dereference in  error path (bsc#1220344).
- CVE-2024-26598: Fixed potential UAF in LPI translation  cache (bsc#1220326).
- CVE-2024-26602: Fixed overall slowdowns with sys_membarrier (bsc1220398).
- CVE-2024-26603: Fixed infinite loop via #PF handling (bsc#1220335).
- CVE-2024-26622: Fixed UAF write bug in tomoyo_write_control() (bsc#1220825).

The following non-security bugs were fixed:

- acpi: apei: set memory failure flags as mf_action_required on synchronous events (git-fixes).
- acpi: button: add lid disable dmi quirk for nextbook ares 8a (git-fixes).
- acpi: extlog: fix null pointer dereference check (git-fixes).
- acpi: resource: add asus model s5402za to quirks (git-fixes).
- acpi: resource: skip irq override on asus expertbook b1502cba (git-fixes).
- acpi: resource: skip irq override on asus expertbook b2402cba (git-fixes).
- acpi: video: add backlight=native dmi quirk for apple imac11,3 (git-fixes).
- acpi: video: add backlight=native dmi quirk for apple imac12,1 and imac12,2 (git-fixes).
- acpi: video: add backlight=native dmi quirk for lenovo thinkpad x131e (3371 amd version) (git-fixes).
- acpi: video: add quirk for the colorful x15 at 23 laptop (git-fixes).
- add reference to recently released cve
- afs: fix the usage of read_seqbegin_or_lock() in afs_find_server*() (git-fixes).
- afs: fix the usage of read_seqbegin_or_lock() in afs_lookup_volume_rcu() (git-fixes).
- afs: hide silly-rename files from userspace (git-fixes).
- afs: increase buffer size in afs_update_volume_status() (git-fixes).
- ahci: asm1166: correct count of reported ports (git-fixes).
- alsa: drop leftover snd-rtctimer stuff from makefile (git-fixes).
- alsa: firewire-lib: fix to check cycle continuity (git-fixes).
- alsa: hda/conexant: add quirk for sws js201d (git-fixes).
- alsa: hda/realtek: apply headset jack quirk for non-bass alc287 thinkpads (git-fixes).
- alsa: hda/realtek: cs35l41: fix device id / model name (git-fixes).
- alsa: hda/realtek: cs35l41: fix order and duplicates in quirks table (git-fixes).
- alsa: hda/realtek: enable headset mic on vaio vjfe-adl (git-fixes).
- alsa: hda/realtek: enable mute led on hp laptop 14-fq0xxx (git-fixes).
- alsa: hda/realtek: fix mute/micmute led for hp mt645 (git-fixes).
- alsa: hda/realtek: fix mute/micmute leds for hp zbook power (git-fixes).
- alsa: hda/realtek: fix the external mic not being recognised for acer swift 1 sf114-32 (git-fixes).
- alsa: usb-audio: add a quirk for yamaha yit-w12tx transmitter (git-fixes).
- alsa: usb-audio: add delay quirk for motu m series 2nd revision (git-fixes).
- alsa: usb-audio: add quirk for rode nt-usb+ (git-fixes).
- alsa: usb-audio: check presence of valid altsetting control (git-fixes).
- alsa: usb-audio: ignore clock selector errors for single connection (git-fixes).
- alsa: usb-audio: more relaxed check of midi jack names (git-fixes).
- alsa: usb-audio: sort quirk table entries (git-fixes).
- arm64: entry: fix arm64_workaround_speculative_unpriv_load (bsc#1219443)
- arm64: entry: preserve/restore x29 even for compat tasks (bsc#1219443)
- arm64: entry: simplify tramp_alias macro and tramp_exit routine (bsc#1219443)
- arm64: errata: add cortex-a510 speculative unprivileged load (bsc#1219443) enable workaround.
- arm64: errata: add cortex-a520 speculative unprivileged load (bsc#1219443) enable workaround without kabi break.
- arm64: errata: mitigate ampere1 erratum ac03_cpu_38 at stage-2 (git-fixes) enable ampere_erratum_ac03_cpu_38 workaround without kabi break
- arm64: irq: set the correct node for shadow call stack (git-fixes)
- arm64: irq: set the correct node for vmap stack (git-fixes)
- arm64: rename arm64_workaround_2966298 (bsc#1219443)
- arm64: subscribe microsoft azure cobalt 100 to arm neoverse n2 errata (git-fixes)
- asoc: doc: fix undefined snd_soc_dapm_nopm argument (git-fixes).
- asoc: rt5645: fix deadlock in rt5645_jack_detect_work() (git-fixes).
- asoc: sof: ipc3: fix message bounds on ipc ops (git-fixes).
- asoc: sunxi: sun4i-spdif: add support for allwinner h616 (git-fixes).
- atm: idt77252: fix a memleak in open_card_ubr0 (git-fixes).
- bluetooth: avoid potential use-after-free in hci_error_reset (git-fixes).
- bluetooth: enforce validation on max value of connection interval (git-fixes).
- bluetooth: hci_event: fix handling of hci_ev_io_capa_request (git-fixes).
- bluetooth: hci_event: fix wrongly recorded wakeup bd_addr (git-fixes).
- bluetooth: hci_sync: check the correct flag before starting a scan (git-fixes).
- bluetooth: hci_sync: fix accept_list when attempting to suspend (git-fixes).
- bluetooth: l2cap: fix possible multiple reject send (git-fixes).
- bluetooth: qca: fix wrong event type for patch config command (git-fixes).
- bpf: fix verification of indirect var-off stack access (git-fixes).
- bpf: guard stack limits against 32bit overflow (git-fixes).
- bpf: minor logging improvement (bsc#1220257).
- bus: moxtet: add spi device table (git-fixes).
- cachefiles: fix memory leak in cachefiles_add_cache() (bsc#1220267).
- can: j1939: fix uaf in j1939_sk_match_filter during setsockopt(so_j1939_filter) (git-fixes).
- crypto: api - disallow identical driver names (git-fixes).
- crypto: ccp - fix null pointer dereference in __sev_platform_shutdown_locked (git-fixes).
- crypto: octeontx2 - fix cptvf driver cleanup (git-fixes).
- crypto: stm32/crc32 - fix parsing list of devices (git-fixes).
- dmaengine: fsl-qdma: fix a memory leak related to the queue command dma (git-fixes).
- dmaengine: fsl-qdma: fix soc may hang on 16 byte unaligned read (git-fixes).
- dmaengine: fsl-qdma: increase size of 'irq_name' (git-fixes).
- dmaengine: fsl-qdma: init irq after reg initialization (git-fixes).
- dmaengine: ptdma: use consistent dma masks (git-fixes).
- dmaengine: shdma: increase size of 'dev_id' (git-fixes).
- dmaengine: ti: edma: add some null pointer checks to the edma_probe (git-fixes).
- driver core: fix device_link_flag_is_sync_state_only() (git-fixes).
- drm/amd/display: fix memory leak in dm_sw_fini() (git-fixes).
- drm/amd/display: fix possible buffer overflow in 'find_dcfclk_for_voltage()' (git-fixes).
- drm/amd/display: fix possible null dereference on device remove/driver unload (git-fixes).
- drm/amd/display: increase frame-larger-than for all display_mode_vba files (git-fixes).
- drm/amd/display: increased min_dcfclk_mhz and min_fclk_mhz (git-fixes).
- drm/amd/display: preserve original aspect ratio in create stream (git-fixes).
- drm/amdgpu/display: initialize gamma correction mode variable in dcn30_get_gamcor_current() (git-fixes).
- drm/amdgpu: reset gpu for s3 suspend abort case (git-fixes).
- drm/amdgpu: skip to program gfxdec registers for suspend abort (git-fixes).
- drm/buddy: fix range bias (git-fixes).
- drm/crtc: fix uninitialized variable use even harder (git-fixes).
- drm/i915/gvt: fix uninitialized variable in handle_mmio() (git-fixes).
- drm/msm/dp: return correct colorimetry for dp_test_dynamic_range_cea case (git-fixes).
- drm/msm/dpu: check for valid hw_pp in dpu_encoder_helper_phys_cleanup (git-fixes).
- drm/msms/dp: fixed link clock divider bits be over written in bpc unknown case (git-fixes).
- drm/prime: support page array &gt;= 4gb (git-fixes).
- drm/syncobj: call drm_syncobj_fence_add_wait when wait_available flag is set (git-fixes).
- drm/ttm: fix an invalid freeing on already freed page in error path (git-fixes).
- drop bcm5974 input patch causing a regression (bsc#1220030)
- efi/capsule-loader: fix incorrect allocation size (git-fixes).
- efi: do not add memblocks for soft-reserved memory (git-fixes).
- efi: runtime: fix potential overflow of soft-reserved region size (git-fixes).
- fbcon: always restore the old font data in fbcon_do_set_font() (git-fixes).
- fbdev: savage: error out if pixclock equals zero (git-fixes).
- fbdev: sis: error out if pixclock equals zero (git-fixes).
- firewire: core: send bus reset promptly on gap count error (git-fixes).
- fs: dlm: fix build with config_ipv6 disabled (git-fixes).
- fs:jfs:ubsan:array-index-out-of-bounds in dbadjtree (git-fixes).
- gpio: 74x164: enable output pins after registers are reset (git-fixes).
- gpio: fix resource unwinding order in error path (git-fixes).
- gpiolib: acpi: ignore touchpad wakeup on gpd g1619-04 (git-fixes).
- gpiolib: fix the error path order in gpiochip_add_data_with_key() (git-fixes).
- hid: apple: add 2021 magic keyboard fn key mapping (git-fixes).
- hid: apple: add support for the 2021 magic keyboard (git-fixes).
- hid: wacom: do not register input devices until after hid_hw_start (git-fixes).
- hid: wacom: generic: avoid reporting a serial of '0' to userspace (git-fixes).
- hwmon: (aspeed-pwm-tacho) mutex for tach reading (git-fixes).
- hwmon: (coretemp) enlarge per package core count limit (git-fixes).
- hwmon: (coretemp) fix bogus core_id to attr name mapping (git-fixes).
- hwmon: (coretemp) fix out-of-bounds memory access (git-fixes).
- i2c: i801: fix block process call transactions (git-fixes).
- i2c: i801: remove i801_set_block_buffer_mode (git-fixes).
- i2c: imx: add timer for handling the stop condition (git-fixes).
- i2c: imx: when being a target, mark the last read as processed (git-fixes).
- i3c: master: cdns: update maximum prescaler value for i2c clock (git-fixes).
- ib/hfi1: fix a memleak in init_credit_return (git-fixes)
- ib/hfi1: fix sdma.h tx-&gt;num_descs off-by-one error (git-fixes)
- iio: accel: bma400: fix a compilation problem (git-fixes).
- iio: adc: ad7091r: set alert bit in config register (git-fixes).
- iio: core: fix memleak in iio_device_register_sysfs (git-fixes).
- iio: hid-sensor-als: return 0 for hid_usage_sensor_time_timestamp (git-fixes).
- iio: magnetometer: rm3100: add boundary check for the value read from rm3100_reg_tmrc (git-fixes).
- input: iqs269a - switch to define_simple_dev_pm_ops() and pm_sleep_ptr() (git-fixes).
- input: xpad - add lenovo legion go controllers (git-fixes).
- irqchip/irq-brcmstb-l2: add write memory barrier before exit (git-fixes).
- jfs: fix array-index-out-of-bounds in dbadjtree (git-fixes).
- jfs: fix array-index-out-of-bounds in dinewext (git-fixes).
- jfs: fix slab-out-of-bounds read in dtsearch (git-fixes).
- jfs: fix uaf in jfs_evict_inode (git-fixes).
- kbuild: fix changing elf file type for output of gen_btf for big endian (git-fixes).
- kvm: s390: fix cc for successful pqap (git-fixes bsc#1219839).
- kvm: s390: fix setting of fpc register (git-fixes bsc#1220392).
- kvm: s390: vsie: fix race during shadow creation (git-fixes bsc#1220393).
- kvm: vmx: move verw closer to vmentry for mds mitigation (git-fixes).
- kvm: vmx: use bt+jnc, i.e. eflags.cf to select vmresume vs. vmlaunch (git-fixes).
- lan78xx: enable auto speed configuration for lan7850 if no eeprom is detected (git-fixes).
- leds: trigger: panic: do not register panic notifier if creating the trigger failed (git-fixes).
- lib/stackdepot: add depot_fetch_stack helper (jsc-ped#7423).
- lib/stackdepot: add refcount for records (jsc-ped#7423).
- lib/stackdepot: fix first entry having a 0-handle (jsc-ped#7423).
- lib/stackdepot: move stack_record struct definition into the header (jsc-ped#7423).
- libsubcmd: fix memory leak in uniq() (git-fixes).
- media: ddbridge: fix an error code problem in ddb_probe (git-fixes).
- media: ir_toy: fix a memleak in irtoy_tx (git-fixes).
- media: rc: bpf attach/detach requires write permission (git-fixes).
- media: rockchip: rga: fix swizzling for rgb formats (git-fixes).
- media: stk1160: fixed high volume of stk1160_dbg messages (git-fixes).
- mfd: syscon: fix null pointer dereference in of_syscon_register() (git-fixes).
- mm,page_owner: display all stacks and their count (jsc-ped#7423).
- mm,page_owner: filter out stacks by a threshold (jsc-ped#7423).
- mm,page_owner: implement the tracking of the stacks count (jsc-ped#7423).
- mm,page_owner: maintain own list of stack_records structs (jsc-ped#7423).
- mm,page_owner: update documentation regarding page_owner_stacks (jsc-ped#7423).
- mm/hwpoison: fix unpoison_memory() (bsc#1218663).
- mm/hwpoison: mf_mutex for soft offline and unpoison (bsc#1218663).
- mm/hwpoison: remove mf_msg_buddy_2nd and mf_msg_poisoned_huge (bsc#1218663).
- mm: memory-failure: fix potential unexpected return value from unpoison_memory() (git-fixes).
- mmc: core: fix emmc initialization with 1-bit bus connection (git-fixes).
- mmc: core: use mrq.sbc in close-ended ffu (git-fixes).
- mmc: mmc_spi: remove custom dma mapped buffers (git-fixes).
- mmc: sdhci-xenon: add timeout for phy init complete (git-fixes).
- mmc: sdhci-xenon: fix phy init clock stability (git-fixes).
- mmc: slot-gpio: allow non-sleeping gpio ro (git-fixes).
- modpost: trim leading spaces when processing source files list (git-fixes).
- mtd: spinand: gigadevice: fix the get ecc status issue (git-fixes).
- net: usb: dm9601: fix wrong return value in dm9601_mdio_read (git-fixes).
- netfs, fscache: prevent oops in fscache_put_cache() (bsc#1220003).
- nilfs2: fix data corruption in dsync block recovery for small block sizes (git-fixes).
- nilfs2: replace warn_ons for invalid dat metadata block requests (git-fixes).
- nouveau/svm: fix kvcalloc() argument order (git-fixes).
- nouveau: fix function cast warnings (git-fixes).
- ntfs: check overflow when iterating attr_records (git-fixes).
- ntfs: fix use-after-free in ntfs_attr_find() (git-fixes).
- nvme-fabrics: fix i/o connect error handling (git-fixes).
- nvme-host: fix the updating of the firmware version (git-fixes).
- pci/aer: decode requester id when no error info found (git-fixes).
- pci: add no pm reset quirk for nvidia spectrum devices (git-fixes).
- pci: add pci_header_type_mfd definition (bsc#1220021).
- pci: fix 64gt/s effective data rate calculation (git-fixes).
- pci: only override amd usb controller if required (git-fixes).
- pci: switchtec: fix stdev_release() crash after surprise hot remove (git-fixes).
- platform/x86: thinkpad_acpi: only update profile if successfully converted (git-fixes).
- platform/x86: touchscreen_dmi: add info for the teclast x16 plus tablet (git-fixes).
- platform/x86: touchscreen_dmi: allow partial (prefix) matches for acpi names (git-fixes).
- pm: core: remove unnecessary (void *) conversions (git-fixes).
- pm: runtime: have devm_pm_runtime_enable() handle pm_runtime_dont_use_autosuspend() (git-fixes).
- pnp: acpi: fix fortify warning (git-fixes).
- power: supply: bq27xxx-i2c: do not free non existing irq (git-fixes).
- powerpc/64: set task pt_regs-&gt;link to the lr value on scv entry (bsc#1194869).
- powerpc/powernv: fix fortify source warnings in opal-prd.c (bsc#1194869).
- powerpc/pseries: add a clear modifier to ibm,pa/pi-features parser (bsc#1220348).
- powerpc/pseries: rework lppaca_shared_proc() to avoid debug_preempt (bsc#1194869).
- powerpc/pseries: set cpu_ftr_dbell according to ibm,pi-features (bsc#1220348).
- powerpc/watchpoint: disable pagefaults when getting user instruction (bsc#1194869).
- powerpc/watchpoints: annotate atomic context in more places (bsc#1194869).
- powerpc/watchpoints: disable preemption in thread_change_pc() (bsc#1194869).
- powerpc: add crtsavres.o to always-y instead of extra-y (bsc#1194869).
- powerpc: do not include lppaca.h in paca.h (bsc#1194869).
- pstore/ram: fix crash when setting number of cpus to an odd number (git-fixes).
- ras/amd/atl: add mi300 row retirement support (jsc#ped-7618).
- ras/amd/atl: fix bit overflow in denorm_addr_df4_np2() (git-fixes).
- ras: introduce a fru memory poison manager (jsc#ped-7618).
- rdma/bnxt_re: add a missing check in bnxt_qplib_query_srq (git-fixes)
- rdma/bnxt_re: return error for srq resize (git-fixes)
- rdma/core: fix uninit-value access in ib_get_eth_speed() (bsc#1219934).
- rdma/core: get ib width and speed from netdev (bsc#1219934).
- rdma/irdma: add ae for too many rnrs (git-fixes)
- rdma/irdma: fix kasan issue with tasklet (git-fixes)
- rdma/irdma: set the cq read threshold for gen 1 (git-fixes)
- rdma/irdma: validate max_send_wr and max_recv_wr (git-fixes)
- rdma/qedr: fix qedr_create_user_qp error flow (git-fixes)
- rdma/srpt: fix function pointer cast warnings (git-fixes)
- rdma/srpt: support specifying the srpt_service_guid parameter (git-fixes)
- refresh patches.suse/dm_blk_ioctl-implement-path-failover-for-sg_io. (bsc#1216776, bsc#1220277)
- regulator: core: only increment use_count when enable_count changes (git-fixes).
- regulator: pwm-regulator: add validity checks in continuous .get_voltage (git-fixes).
- revert 'drm/amd/display: increased min_dcfclk_mhz and min_fclk_mhz' (git-fixes).
- revert 'drm/amd/pm: resolve reboot exception for si oland' (git-fixes).
- revert 'drm/amd: flush any delayed gfxoff on suspend entry' (git-fixes).
- rpm/kernel-binary.spec.in: install scripts/gdb when enabled in config (bsc#1219653) they are put into -devel subpackage. and a proper link to /usr/share/gdb/auto-load/ is created.
- s390/qeth: fix potential loss of l3-ip@ in case of network issues (git-fixes bsc#1219840).
- s390: use the correct count for __iowrite64_copy() (git-fixes bsc#1220317).
- sched/membarrier: reduce the ability to hammer on sys_membarrier (git-fixes).
- scsi: core: move scsi_host_busy() out of host lock for waking up eh handler (git-fixes).
- scsi: core: move scsi_host_busy() out of host lock if it is for per-command (git-fixes).
- scsi: fnic: move fnic_fnic_flush_tx() to a work queue (git-fixes bsc#1219141).
- scsi: hisi_sas: prevent parallel flr and controller reset (git-fixes).
- scsi: ibmvfc: limit max hw queues by num_online_cpus() (bsc#1220106).
- scsi: ibmvfc: open-code reset loop for target reset (bsc#1220106).
- scsi: isci: fix an error code problem in isci_io_request_build() (git-fixes).
- scsi: lpfc: add condition to delete ndlp object after sending bls_rjt to an abts (bsc#1220021).
- scsi: lpfc: allow lpfc_plogi_confirm_nport() logic to execute for fabric nodes (bsc#1220021).
- scsi: lpfc: change lpfc_vport fc_flag member into a bitmask (bsc#1220021).
- scsi: lpfc: change lpfc_vport load_flag member into a bitmask (bsc#1220021).
- scsi: lpfc: change nlp state statistic counters into atomic_t (bsc#1220021).
- scsi: lpfc: copyright updates for 14.4.0.0 patches (bsc#1220021).
- scsi: lpfc: fix failure to delete vports when discovery is in progress (bsc#1220021).
- scsi: lpfc: fix possible memory leak in lpfc_rcv_padisc() (bsc#1220021).
- scsi: lpfc: initialize status local variable in lpfc_sli4_repost_sgl_list() (bsc#1220021).
- scsi: lpfc: move handling of reset congestion statistics events (bsc#1220021).
- scsi: lpfc: protect vport fc_nodes list with an explicit spin lock (bsc#1220021).
- scsi: lpfc: remove d_id swap log message from trace event logger (bsc#1220021).
- scsi: lpfc: remove nlp_rcv_plogi early return during rscn processing for ndlps (bsc#1220021).
- scsi: lpfc: remove shost_lock protection for fc_host_port shost apis (bsc#1220021).
- scsi: lpfc: replace deprecated strncpy() with strscpy() (bsc#1220021).
- scsi: lpfc: save fpin frequency statistics upon receipt of peer cgn notifications (bsc#1220021).
- scsi: lpfc: update lpfc version to 14.4.0.0 (bsc#1220021).
- scsi: lpfc: use pci_header_type_mfd instead of literal (bsc#1220021).
- scsi: lpfc: use sg_dma_len() api to get struct scatterlist's length (bsc#1220021).
- scsi: mpi3mr: refresh sdev queue depth after controller reset (git-fixes).
- scsi: revert 'scsi: fcoe: fix potential deadlock on &amp;fip-&gt;ctlr_lock' (git-fixes bsc#1219141).
- serial: 8250: remove serial_rs485 sanitization from em485 (git-fixes).
- spi-mxs: fix chipselect glitch (git-fixes).
- spi: hisi-sfc-v3xx: return irq_none if no interrupts were detected (git-fixes).
- spi: ppc4xx: drop write-only variable (git-fixes).
- spi: sh-msiof: avoid integer overflow in constants (git-fixes).
- staging: iio: ad5933: fix type mismatch regression (git-fixes).
- supported.conf: remove external flag from ibm supported modules. (bsc#1209412)
- tcp: fix tcp_mtup_probe_success vs wrong snd_cwnd (bsc#1218450).
- tomoyo: fix uaf write bug in tomoyo_write_control() (git-fixes).
- topology/sysfs: add format parameter to macro defining 'show' functions for proc (jsc#ped-7618).
- topology/sysfs: add ppin in sysfs under cpu topology (jsc#ped-7618).
- tty: allow tiocslcktrmios with cap_checkpoint_restore (git-fixes).
- ubsan: array-index-out-of-bounds in dtsplitroot (git-fixes).
- usb: cdns3: fix memory double free when handle zero packet (git-fixes).
- usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable() (git-fixes).
- usb: cdns3: modify the return value of cdns_set_active () to void when config_pm_sleep is disabled (git-fixes).
- usb: cdns3: put the cdns set active part outside the spin lock (git-fixes).
- usb: cdns: readd old api (git-fixes).
- usb: cdnsp: blocked some cdns3 specific code (git-fixes).
- usb: cdnsp: fixed issue with incorrect detecting cdnsp family controllers (git-fixes).
- usb: dwc3: gadget: do not disconnect if not started (git-fixes).
- usb: dwc3: gadget: handle ep0 request dequeuing properly (git-fixes).
- usb: dwc3: gadget: ignore end transfer delay on teardown (git-fixes).
- usb: dwc3: gadget: queue pm runtime idle on disconnect event (git-fixes).
- usb: dwc3: gadget: refactor ep0 forced stall/restart into a separate api (git-fixes).
- usb: dwc3: gadget: submit endxfer command if delayed during disconnect (git-fixes).
- usb: dwc3: host: set xhci_sg_trb_cache_size_quirk (git-fixes).
- usb: f_mass_storage: forbid async queue when shutdown happen (git-fixes).
- usb: gadget: core: add missing kerneldoc for vbus_work (git-fixes).
- usb: gadget: core: adjust uevent timing on gadget unbind (git-fixes).
- usb: gadget: core: help prevent panic during uvc unconfigure (git-fixes).
- usb: gadget: core: remove unbalanced mutex_unlock in usb_gadget_activate (git-fixes).
- usb: gadget: f_hid: fix report descriptor allocation (git-fixes).
- usb: gadget: fix obscure lockdep violation for udc_mutex (git-fixes).
- usb: gadget: fix use-after-free read in usb_udc_uevent() (git-fixes).
- usb: gadget: fsl_qe_udc: validate endpoint index for ch9 udc (git-fixes).
- usb: gadget: ncm: avoid dropping datagrams of properly parsed ntbs (git-fixes).
- usb: gadget: udc: core: offload usb_udc_vbus_handler processing (git-fixes).
- usb: gadget: udc: core: prevent soft_connect_store() race (git-fixes).
- usb: gadget: udc: handle gadget_connect failure during bind operation (git-fixes).
- usb: hub: check for alternate port before enabling a_alt_hnp_support (bsc#1218527).
- usb: hub: replace hardcoded quirk value with bit() macro (git-fixes).
- usb: roles: do not get/set_role() when usb_role_switch is unregistered (git-fixes).
- usb: roles: fix null pointer issue when put module's reference (git-fixes).
- usb: serial: cp210x: add id for imst im871a-usb (git-fixes).
- usb: serial: option: add fibocom fm101-gl variant (git-fixes).
- usb: serial: qcserial: add new usb-id for dell wireless dw5826e (git-fixes).
- watchdog: it87_wdt: keep wdtctrl bit 3 unmodified for it8784/it8786 (git-fixes).
- wifi: ath11k: fix registration of 6ghz-only phy without the full channel range (git-fixes).
- wifi: ath9k: fix potential array-index-out-of-bounds read in ath9k_htc_txstatus() (git-fixes).
- wifi: cfg80211: fix missing interfaces when dumping (git-fixes).
- wifi: cfg80211: fix rcu dereference in __cfg80211_bss_update (git-fixes).
- wifi: cfg80211: free beacon_ies when overridden from hidden bss (git-fixes).
- wifi: iwlwifi: fix some error codes (git-fixes).
- wifi: iwlwifi: mvm: avoid baid size integer overflow (git-fixes).
- wifi: iwlwifi: uninitialized variable in iwl_acpi_get_ppag_table() (git-fixes).
- wifi: mac80211: adding missing drv_mgd_complete_tx() call (git-fixes).
- wifi: mac80211: fix race condition on enabling fast-xmit (git-fixes).
- wifi: nl80211: reject iftype change with mesh id change (git-fixes).
- wifi: rt2x00: restart beacon queue when hardware reset (git-fixes).
- wifi: rtl8xxxu: add additional usb ids for rtl8192eu devices (git-fixes).
- wifi: rtlwifi: rtl8723{be,ae}: using calculate_bit_shift() (git-fixes).
- wifi: wext-core: fix -wstringop-overflow warning in ioctl_standard_iw_point() (git-fixes).
- x86/asm: add _asm_rip() macro for x86-64 (%rip) suffix (git-fixes).
- x86/bugs: add asm helpers for executing verw (git-fixes).
- x86/bugs: use alternative() instead of mds_user_clear static key (git-fixes). also add mds_user_clear to kabi severities since it's strictly mitigation related so should be low risk.
- x86/cpu: x86_feature_intel_ppin finally had a cpuid bit (jsc#ped-7618).
- x86/entry_32: add verw just before userspace transition (git-fixes).
- x86/entry_64: add verw just before userspace transition (git-fixes).
- x86/mm: fix memory encryption features advertisement (bsc#1206453).
- xfs: remove unused fields from struct xbtree_ifakeroot (git-fixes).
- xfs: short circuit xfs_growfs_data_private() if delta is zero (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-15"/>
	<updated date="2024-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194869">SUSE bug 1194869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206453">SUSE bug 1206453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209412">SUSE bug 1209412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213456">SUSE bug 1213456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216776">SUSE bug 1216776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217927">SUSE bug 1217927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218195">SUSE bug 1218195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218216">SUSE bug 1218216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218450">SUSE bug 1218450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218527">SUSE bug 1218527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218663">SUSE bug 1218663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218915">SUSE bug 1218915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219126">SUSE bug 1219126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219127">SUSE bug 1219127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219141">SUSE bug 1219141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219146">SUSE bug 1219146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219295">SUSE bug 1219295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219443">SUSE bug 1219443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219653">SUSE bug 1219653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219827">SUSE bug 1219827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219835">SUSE bug 1219835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219839">SUSE bug 1219839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219840">SUSE bug 1219840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219934">SUSE bug 1219934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220003">SUSE bug 1220003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220009">SUSE bug 1220009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220021">SUSE bug 1220021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220030">SUSE bug 1220030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220106">SUSE bug 1220106</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220140">SUSE bug 1220140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220187">SUSE bug 1220187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220238">SUSE bug 1220238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220240">SUSE bug 1220240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220241">SUSE bug 1220241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220243">SUSE bug 1220243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220250">SUSE bug 1220250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220251">SUSE bug 1220251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220253">SUSE bug 1220253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220254">SUSE bug 1220254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220255">SUSE bug 1220255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220257">SUSE bug 1220257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220267">SUSE bug 1220267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220277">SUSE bug 1220277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220317">SUSE bug 1220317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220326">SUSE bug 1220326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220328">SUSE bug 1220328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220330">SUSE bug 1220330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220335">SUSE bug 1220335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220344">SUSE bug 1220344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220348">SUSE bug 1220348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220350">SUSE bug 1220350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220364">SUSE bug 1220364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220392">SUSE bug 1220392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220393">SUSE bug 1220393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220398">SUSE bug 1220398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220409">SUSE bug 1220409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220444">SUSE bug 1220444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220457">SUSE bug 1220457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220459">SUSE bug 1220459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220649">SUSE bug 1220649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220796">SUSE bug 1220796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220825">SUSE bug 1220825</bugzilla>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25162/">CVE-2019-25162 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25162">CVE-2019-25162 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46923/">CVE-2021-46923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46923">CVE-2021-46923 at NVD</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-46924/">CVE-2021-46924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46924">CVE-2021-46924 at NVD</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46932/">CVE-2021-46932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46932">CVE-2021-46932 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-5197/">CVE-2023-5197 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5197">CVE-2023-5197 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52340/">CVE-2023-52340 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52340">CVE-2023-52340 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52429/">CVE-2023-52429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52429">CVE-2023-52429 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52439/">CVE-2023-52439 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52439">CVE-2023-52439 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52443/">CVE-2023-52443 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52443">CVE-2023-52443 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52445/">CVE-2023-52445 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52445">CVE-2023-52445 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52447/">CVE-2023-52447 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52447">CVE-2023-52447 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52448/">CVE-2023-52448 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52448">CVE-2023-52448 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52449/">CVE-2023-52449 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52449">CVE-2023-52449 at NVD</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52451/">CVE-2023-52451 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52451">CVE-2023-52451 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52452/">CVE-2023-52452 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52452">CVE-2023-52452 at NVD</cve>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52456/">CVE-2023-52456 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52456">CVE-2023-52456 at NVD</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52457/">CVE-2023-52457 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52457">CVE-2023-52457 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52463/">CVE-2023-52463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52463">CVE-2023-52463 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52464/">CVE-2023-52464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52464">CVE-2023-52464 at NVD</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52475/">CVE-2023-52475 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52475">CVE-2023-52475 at NVD</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52478/">CVE-2023-52478 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52478">CVE-2023-52478 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6817/">CVE-2023-6817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6817">CVE-2023-6817 at NVD</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-0607/">CVE-2024-0607 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0607">CVE-2024-0607 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1151/">CVE-2024-1151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1151">CVE-2024-1151 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23849/">CVE-2024-23849 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23849">CVE-2024-23849 at NVD</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23850/">CVE-2024-23850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23850">CVE-2024-23850 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23851/">CVE-2024-23851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23851">CVE-2024-23851 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25744/">CVE-2024-25744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25744">CVE-2024-25744 at NVD</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26585/">CVE-2024-26585 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26585">CVE-2024-26585 at NVD</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26586/">CVE-2024-26586 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26586">CVE-2024-26586 at NVD</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26589/">CVE-2024-26589 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26589">CVE-2024-26589 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26591/">CVE-2024-26591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26591">CVE-2024-26591 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26593/">CVE-2024-26593 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26593">CVE-2024-26593 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26595/">CVE-2024-26595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26595">CVE-2024-26595 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26598/">CVE-2024-26598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26598">CVE-2024-26598 at NVD</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26602/">CVE-2024-26602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26602">CVE-2024-26602 at NVD</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26603/">CVE-2024-26603 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26603">CVE-2024-26603 at NVD</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26622/">CVE-2024-26622 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26622">CVE-2024-26622 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851431" comment="cluster-md-kmp-rt-5.14.21-150500.13.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851432" comment="dlm-kmp-rt-5.14.21-150500.13.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851433" comment="gfs2-kmp-rt-5.14.21-150500.13.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851434" comment="kernel-devel-rt-5.14.21-150500.13.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851435" comment="kernel-rt-5.14.21-150500.13.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851436" comment="kernel-rt-devel-5.14.21-150500.13.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851437" comment="kernel-rt-extra-5.14.21-150500.13.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851438" comment="kernel-rt-livepatch-5.14.21-150500.13.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851439" comment="kernel-rt-livepatch-devel-5.14.21-150500.13.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851440" comment="kernel-rt-optional-5.14.21-150500.13.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851441" comment="kernel-rt-vdso-5.14.21-150500.13.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851442" comment="kernel-rt_debug-5.14.21-150500.13.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851443" comment="kernel-rt_debug-devel-5.14.21-150500.13.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851444" comment="kernel-rt_debug-livepatch-devel-5.14.21-150500.13.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851445" comment="kernel-rt_debug-vdso-5.14.21-150500.13.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851446" comment="kernel-source-rt-5.14.21-150500.13.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851447" comment="kernel-syms-rt-5.14.21-150500.13.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851448" comment="kselftests-kmp-rt-5.14.21-150500.13.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851449" comment="ocfs2-kmp-rt-5.14.21-150500.13.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851450" comment="reiserfs-kmp-rt-5.14.21-150500.13.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5257" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219357" ref_url="https://bugzilla.suse.com/1219357" source="BUGZILLA"/>
		<reference ref_id="1219554" ref_url="https://bugzilla.suse.com/1219554" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36773" ref_url="https://www.suse.com/security/cve/CVE-2020-36773/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018208.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- Fixed segfaults in gs_heap_free_object() — ref:_00D1igLOd._500Tr4BRgx:ref (bsc#1219357).

Previously fixed security issue:

- CVE-2020-36773: Fixed out-of-bounds write and use-after-free in devices/vector/gdevtxtw.c (for txtwrite) (bsc#1219554). 
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-18"/>
	<updated date="2024-03-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219357">SUSE bug 1219357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219554">SUSE bug 1219554</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36773/">CVE-2020-36773 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36773">CVE-2020-36773 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851552" comment="ghostscript-9.52-150000.185.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851553" comment="ghostscript-devel-9.52-150000.185.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851554" comment="ghostscript-x11-9.52-150000.185.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5258" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219465" ref_url="https://bugzilla.suse.com/1219465" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-3966" ref_url="https://www.suse.com/security/cve/CVE-2023-3966/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018200.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:

- CVE-2023-3966: Fixed invalid memory access in Geneve with HW offload (bsc#1219465).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-19"/>
	<updated date="2024-03-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1219465">SUSE bug 1219465</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3966/">CVE-2023-3966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-3966">CVE-2023-3966 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851700" comment="libopenvswitch-2_14-0-2.14.2-150400.24.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851701" comment="libovn-20_06-0-20.06.2-150400.24.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851702" comment="openvswitch-2.14.2-150400.24.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851703" comment="openvswitch-devel-2.14.2-150400.24.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851704" comment="openvswitch-doc-2.14.2-150400.24.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851705" comment="openvswitch-ipsec-2.14.2-150400.24.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851706" comment="openvswitch-pki-2.14.2-150400.24.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851707" comment="openvswitch-test-2.14.2-150400.24.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851708" comment="openvswitch-vtep-2.14.2-150400.24.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851709" comment="ovn-20.06.2-150400.24.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851710" comment="ovn-central-20.06.2-150400.24.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851711" comment="ovn-devel-20.06.2-150400.24.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851712" comment="ovn-doc-20.06.2-150400.24.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851713" comment="ovn-docker-20.06.2-150400.24.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851714" comment="ovn-host-20.06.2-150400.24.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851715" comment="ovn-vtep-20.06.2-150400.24.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851716" comment="python3-ovs-2.14.2-150400.24.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5259" version="1" class="patch">
	<metadata>
		<title>Security update for python-uamqp (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1217782" ref_url="https://bugzilla.suse.com/1217782" source="BUGZILLA"/>
		<reference ref_id="1220535" ref_url="https://bugzilla.suse.com/1220535" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-27099" ref_url="https://www.suse.com/security/cve/CVE-2024-27099/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018197.html" source="SUSE-SU"/>
		<description>
This update for python-uamqp fixes the following issues:

- CVE-2024-27099: Fixed potential double-free in link_frame_received() (bsc#1220535).

Bug fixes:

- Fixed compatibility with OpenSSL 3.x (bsc#1217782)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-20"/>
	<updated date="2024-03-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1217782">SUSE bug 1217782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220535">SUSE bug 1220535</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27099/">CVE-2024-27099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27099">CVE-2024-27099 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851787" comment="python3-uamqp-1.5.3-150100.4.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5260" version="1" class="patch">
	<metadata>
		<title>Security update for dav1d (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220100" ref_url="https://bugzilla.suse.com/1220100" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-1580" ref_url="https://www.suse.com/security/cve/CVE-2024-1580/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018194.html" source="SUSE-SU"/>
		<description>
This update for dav1d fixes the following issues:

- CVE-2024-1580: Fixed tile_start_off calculations for extremely large frame sizes (bsc#1220100).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-21"/>
	<updated date="2024-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1220100">SUSE bug 1220100</bugzilla>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-1580/">CVE-2024-1580 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1580">CVE-2024-1580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851805" comment="dav1d-1.0.0-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851806" comment="dav1d-devel-1.0.0-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851807" comment="libdav1d6-1.0.0-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851808" comment="libdav1d6-32bit-1.0.0-150500.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5261" version="1" class="patch">
	<metadata>
		<title>Security update for indent (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1219210" ref_url="https://bugzilla.suse.com/1219210" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-0911" ref_url="https://www.suse.com/security/cve/CVE-2024-0911/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018193.html" source="SUSE-SU"/>
		<description>
This update for indent fixes the following issues:

- CVE-2024-0911: Fixed heap-based buffer overflow in set_buf_break() (bsc#1219210).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-21"/>
	<updated date="2024-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1219210">SUSE bug 1219210</bugzilla>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0911/">CVE-2024-0911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0911">CVE-2024-0911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851809" comment="indent-2.2.11-150000.3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5262" version="1" class="patch">
	<metadata>
		<title>Security update for zziplib (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1154002" ref_url="https://bugzilla.suse.com/1154002" source="BUGZILLA"/>
		<reference ref_id="1187526" ref_url="https://bugzilla.suse.com/1187526" source="BUGZILLA"/>
		<reference ref_id="1214577" ref_url="https://bugzilla.suse.com/1214577" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-18442" ref_url="https://www.suse.com/security/cve/CVE-2020-18442/" source="CVE"/>
		<reference ref_id="CVE-2020-18770" ref_url="https://www.suse.com/security/cve/CVE-2020-18770/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018191.html" source="SUSE-SU"/>
		<description>
This update for zziplib fixes the following issues:

Security issue fixed:

- CVE-2020-18442: Fixed infinite loop in zzip_file_read() as used in unzzip_cat_file() (bsc#1187526).
- CVE-2020-18770: Fixed denial-of-service in function zzip_disk_entry_to_file_header in mmapped.c (bsc#1214577).

Non-security issue fixed:

- Implement an error message with a condition by checking the return value of a function call. (bsc#1154002)
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-22"/>
	<updated date="2024-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1154002">SUSE bug 1154002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187526">SUSE bug 1187526</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214577">SUSE bug 1214577</bugzilla>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-18442/">CVE-2020-18442 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18442">CVE-2020-18442 at NVD</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-18770/">CVE-2020-18770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18770">CVE-2020-18770 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851827" comment="libzzip-0-13-0.13.69-150000.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851828" comment="libzzip-0-13-32bit-0.13.69-150000.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851829" comment="zziplib-devel-0.13.69-150000.3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851830" comment="zziplib-devel-32bit-0.13.69-150000.3.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5263" version="1" class="patch">
	<metadata>
		<title>Security update for jbcrypt, trilead-ssh2 (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218198" ref_url="https://bugzilla.suse.com/1218198" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018189.html" source="SUSE-SU"/>
		<description>
This update for jbcrypt, trilead-ssh2 fixes the following issues:

- CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity aka Terrapin Attack (bsc#1218198).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-22"/>
	<updated date="2024-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218198">SUSE bug 1218198</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851831" comment="trilead-ssh2-217.293.v56de4d4d3515-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851832" comment="trilead-ssh2-javadoc-217.293.v56de4d4d3515-150200.3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5264" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1213590" ref_url="https://bugzilla.suse.com/1213590" source="BUGZILLA"/>
		<reference ref_id="1214686" ref_url="https://bugzilla.suse.com/1214686" source="BUGZILLA"/>
		<reference ref_id="1214687" ref_url="https://bugzilla.suse.com/1214687" source="BUGZILLA"/>
		<reference ref_id="1221187" ref_url="https://bugzilla.suse.com/1221187" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-38288" ref_url="https://www.suse.com/security/cve/CVE-2023-38288/" source="CVE"/>
		<reference ref_id="CVE-2023-40745" ref_url="https://www.suse.com/security/cve/CVE-2023-40745/" source="CVE"/>
		<reference ref_id="CVE-2023-41175" ref_url="https://www.suse.com/security/cve/CVE-2023-41175/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018188.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2023-41175: Fixed potential integer overflow in raw2tiff.c (bsc#1214686).
- CVE-2023-38288: Fixed potential integer overflow in raw2tiff.c (bsc#1213590).
- CVE-2023-40745: Fixed integer overflow in tiffcp.c (bsc#1214687).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-22"/>
	<updated date="2024-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1213590">SUSE bug 1213590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214686">SUSE bug 1214686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214687">SUSE bug 1214687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221187">SUSE bug 1221187</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38288/">CVE-2023-38288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38288">CVE-2023-38288 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40745/">CVE-2023-40745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40745">CVE-2023-40745 at NVD</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-41175/">CVE-2023-41175 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41175">CVE-2023-41175 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851833" comment="libtiff-devel-4.0.9-150000.45.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851834" comment="libtiff-devel-32bit-4.0.9-150000.45.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851835" comment="libtiff5-4.0.9-150000.45.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851836" comment="libtiff5-32bit-4.0.9-150000.45.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851837" comment="tiff-4.0.9-150000.45.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5265" version="1" class="patch">
	<metadata>
		<title>Security update for jsch-agent-proxy (Moderate)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1218198" ref_url="https://bugzilla.suse.com/1218198" source="BUGZILLA"/>
		<reference ref_id="CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018187.html" source="SUSE-SU"/>
		<description>
This update for jsch-agent-proxy fixes the following issues:

- CVE-2023-48795: Fixed prefix truncation breaking ssh channel integrity aka Terrapin Attack (bsc#1218198).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-22"/>
	<updated date="2024-03-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1218198">SUSE bug 1218198</bugzilla>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009851838" comment="jsch-agent-proxy-connector-factory-0.0.9-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851839" comment="jsch-agent-proxy-core-0.0.9-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851840" comment="jsch-agent-proxy-javadoc-0.0.9-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851841" comment="jsch-agent-proxy-jsch-0.0.9-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851842" comment="jsch-agent-proxy-pageant-0.0.9-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851843" comment="jsch-agent-proxy-sshagent-0.0.9-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851844" comment="jsch-agent-proxy-usocket-jna-0.0.9-150200.3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009851845" comment="jsch-agent-proxy-usocket-nc-0.0.9-150200.3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5266" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1220770" ref_url="https://bugzilla.suse.com/1220770" source="BUGZILLA"/>
		<reference ref_id="1220771" ref_url="https://bugzilla.suse.com/1220771" source="BUGZILLA"/>
		<reference ref_id="1220772" ref_url="https://bugzilla.suse.com/1220772" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-26458" ref_url="https://www.suse.com/security/cve/CVE-2024-26458/" source="CVE"/>
		<reference ref_id="CVE-2024-26461" ref_url="https://www.suse.com/security/cve/CVE-2024-26461/" source="CVE"/>
		<reference ref_id="CVE-2024-26462" ref_url="https://www.suse.com/security/cve/CVE-2024-26462/" source="CVE"/>
		<reference ref_id="SUSE-SU-2024:0997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-March/034770.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following issues:

- CVE-2024-26458: Fixed memory leak at /krb5/src/lib/rpc/pmap_rmt.c (bsc#1220770).
- CVE-2024-26461: Fixed memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c (bsc#1220771).
- CVE-2024-26462: Fixed memory leak at /krb5/src/kdc/ndr.c (bsc#1220772).
		</description>
<advisory from="security@suse.de">
	<issued date="2024-03-26"/>
	<updated date="2024-03-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1220770">SUSE bug 1220770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220771">SUSE bug 1220771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220772">SUSE bug 1220772</bugzilla>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26458/">CVE-2024-26458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26458">CVE-2024-26458 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26461/">CVE-2024-26461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26461">CVE-2024-26461 at NVD</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26462/">CVE-2024-26462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26462">CVE-2024-26462 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009852039" comment="krb5-1.20.1-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852040" comment="krb5-32bit-1.20.1-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852041" comment="krb5-client-1.20.1-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852042" comment="krb5-devel-1.20.1-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852043" comment="krb5-devel-32bit-1.20.1-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852044" comment="krb5-plugin-kdb-ldap-1.20.1-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852045" comment="krb5-plugin-preauth-otp-1.20.1-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852046" comment="krb5-plugin-preauth-pkinit-1.20.1-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852047" comment="krb5-plugin-preauth-spake-1.20.1-150500.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009852048" comment="krb5-server-1.20.1-150500.3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5267" version="1" class="patch">
	<metadata>
		<title>Security update for python-Jinja2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1234809" ref_url="https://bugzilla.suse.com/1234809" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-56326" ref_url="https://www.suse.com/security/cve/CVE-2024-56326/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020066.html" source="SUSE-SU"/>
		<description>
This update for python-Jinja2 fixes the following issues:

  - CVE-2024-56326: Fixed sandbox breakout through indirect reference to format method (bsc#1234809)

		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-01-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1234809">SUSE bug 1234809</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-56326/">CVE-2024-56326 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56326">CVE-2024-56326 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009959153" comment="python-Jinja2-emacs-2.10.1-150000.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959154" comment="python-Jinja2-vim-2.10.1-150000.3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959155" comment="python3-Jinja2-2.10.1-150000.3.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:5268" version="1" class="patch">
	<metadata>
		<title>Security update for python-Jinja2 (Important)</title>
		<affected family="unix">
			<platform>openSUSE Leap 15.5</platform>
		</affected>
		<reference ref_id="1234808" ref_url="https://bugzilla.suse.com/1234808" source="BUGZILLA"/>
		<reference ref_id="1234809" ref_url="https://bugzilla.suse.com/1234809" source="BUGZILLA"/>
		<reference ref_id="CVE-2024-56201" ref_url="https://www.suse.com/security/cve/CVE-2024-56201/" source="CVE"/>
		<reference ref_id="CVE-2024-56326" ref_url="https://www.suse.com/security/cve/CVE-2024-56326/" source="CVE"/>
		<reference ref_id="SUSE-SU-2025:0006-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HPNJF5YIZCFWIYFLQBGRUQ2IHXCRQPMO/" source="SUSE-SU"/>
		<description>
This update for python-Jinja2 fixes the following issues:

  - CVE-2024-56201: Fixed sandbox breakout through malicious content and filename of a template (bsc#1234808)
  - CVE-2024-56326: Fixed sandbox breakout through indirect reference to format method (bsc#1234809)

		</description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-01-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1234808">SUSE bug 1234808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234809">SUSE bug 1234809</bugzilla>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-56201/">CVE-2024-56201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56201">CVE-2024-56201 at NVD</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-56326/">CVE-2024-56326 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56326">CVE-2024-56326 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:opensuse:leap:15.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009752682" comment="openSUSE Leap 15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009959054" comment="python311-Jinja2-3.1.2-150400.12.11.1 is installed"/>
	</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771633" version="1" comment="opera is &lt;90.0.4480.84-lp155.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752682" version="1" comment="openSUSE-release is ==15.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771634" version="1" comment="opera is &lt;99.0.4788.13-lp155.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771635" version="1" comment="chromedriver is &lt;114.0.5735.106-bp155.2.4.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771636" version="1" comment="chromium is &lt;114.0.5735.106-bp155.2.4.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771637" version="1" comment="syncthing is &lt;1.23.5-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771638" version="1" comment="syncthing-relaysrv is &lt;1.23.5-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771639" version="1" comment="chromedriver is &lt;114.0.5735.133-bp155.2.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771640" version="1" comment="chromium is &lt;114.0.5735.133-bp155.2.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771597" version="1" comment="chromedriver is &lt;114.0.5735.198-bp155.2.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771598" version="1" comment="chromium is &lt;114.0.5735.198-bp155.2.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771599" version="1" comment="gifsicle is &lt;1.94-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771641" version="1" comment="libjxl-devel is &lt;0.8.2-bp155.2.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771642" version="1" comment="libjxl-tools is &lt;0.8.2-bp155.2.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771643" version="1" comment="libjxl0_8 is &lt;0.8.2-bp155.2.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771644" version="1" comment="libjxl0_8-64bit is &lt;0.8.2-bp155.2.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771600" version="1" comment="xonotic is &lt;0.8.6-bp155.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771601" version="1" comment="xonotic-data is &lt;0.8.6-bp155.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771602" version="1" comment="xonotic-server is &lt;0.8.6-bp155.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771645" version="1" comment="keepass is &lt;2.54-bp155.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771714" version="1" comment="caja-extension-nextcloud is &lt;3.8.0-bp155.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771715" version="1" comment="cloudproviders-extension-nextcloud is &lt;3.8.0-bp155.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771716" version="1" comment="libnextcloudsync-devel is &lt;3.8.0-bp155.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771717" version="1" comment="libnextcloudsync0 is &lt;3.8.0-bp155.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771718" version="1" comment="nautilus-extension-nextcloud is &lt;3.8.0-bp155.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771719" version="1" comment="nemo-extension-nextcloud is &lt;3.8.0-bp155.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771720" version="1" comment="nextcloud-desktop is &lt;3.8.0-bp155.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771721" version="1" comment="nextcloud-desktop-doc is &lt;3.8.0-bp155.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771722" version="1" comment="nextcloud-desktop-dolphin is &lt;3.8.0-bp155.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771723" version="1" comment="nextcloud-desktop-lang is &lt;3.8.0-bp155.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771840" version="1" comment="python3-Django1 is &lt;1.11.29-bp155.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773688" version="1" comment="zabbix-agent is &lt;4.0.47-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773689" version="1" comment="zabbix-java-gateway is &lt;4.0.47-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773690" version="1" comment="zabbix-phpfrontend is &lt;4.0.47-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773691" version="1" comment="zabbix-proxy is &lt;4.0.47-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773692" version="1" comment="zabbix-proxy-mysql is &lt;4.0.47-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773693" version="1" comment="zabbix-proxy-postgresql is &lt;4.0.47-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773694" version="1" comment="zabbix-proxy-sqlite is &lt;4.0.47-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773695" version="1" comment="zabbix-server is &lt;4.0.47-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773696" version="1" comment="zabbix-server-mysql is &lt;4.0.47-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773697" version="1" comment="zabbix-server-postgresql is &lt;4.0.47-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774766" version="1" comment="chromedriver is &lt;115.0.5790.102-bp155.2.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774767" version="1" comment="chromium is &lt;115.0.5790.102-bp155.2.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776231" version="1" comment="libredwg-devel is &lt;0.12.5.5907-bp155.3.3.1 for aarch64,i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776232" version="1" comment="libredwg-tools is &lt;0.12.5.5907-bp155.3.3.1 for aarch64,i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776233" version="1" comment="libredwg0 is &lt;0.12.5.5907-bp155.3.3.1 for aarch64,i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777076" version="1" comment="amanda is &lt;3.5.2-bp155.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777465" version="1" comment="trytond is &lt;6.0.34-bp155.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777466" version="1" comment="python3-virtualbox is &lt;7.0.10-lp155.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777467" version="1" comment="virtualbox is &lt;7.0.10-lp155.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777468" version="1" comment="virtualbox-devel is &lt;7.0.10-lp155.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777469" version="1" comment="virtualbox-guest-desktop-icons is &lt;7.0.10-lp155.2.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777470" version="1" comment="virtualbox-guest-source is &lt;7.0.10-lp155.2.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777471" version="1" comment="virtualbox-guest-tools is &lt;7.0.10-lp155.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777472" version="1" comment="virtualbox-host-source is &lt;7.0.10-lp155.2.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777473" version="1" comment="virtualbox-kmp-default is &lt;7.0.10_k5.14.21_150500.55.7-lp155.2.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777474" version="1" comment="virtualbox-qt is &lt;7.0.10-lp155.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777475" version="1" comment="virtualbox-vnc is &lt;7.0.10-lp155.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777476" version="1" comment="virtualbox-websrv is &lt;7.0.10-lp155.2.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777496" version="1" comment="chromedriver is &lt;115.0.5790.170-bp155.2.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777497" version="1" comment="chromium is &lt;115.0.5790.170-bp155.2.16.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777504" version="1" comment="perl-Net-Netmask is &lt;1.9022-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778290" version="1" comment="kitty is &lt;0.29.2-bp155.3.3.2 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778291" version="1" comment="kitty-shell-integration is &lt;0.29.2-bp155.3.3.2 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778293" version="1" comment="kitty-terminfo is &lt;0.29.2-bp155.3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778591" version="1" comment="opensuse-welcome is &lt;0.1.9+git.35.4b9444a-bp155.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778592" version="1" comment="opensuse-welcome-lang is &lt;0.1.9+git.35.4b9444a-bp155.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778856" version="1" comment="perl-HTTP-Tiny is &lt;0.086-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779033" version="1" comment="perl-Cpanel-JSON-XS is &lt;4.36-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779334" version="1" comment="python3-mitmproxy is &lt;3.0.4-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779339" version="1" comment="chromedriver is &lt;116.0.5845.96-bp155.2.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779340" version="1" comment="chromium is &lt;116.0.5845.96-bp155.2.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779772" version="1" comment="chromedriver is &lt;116.0.5845.110-bp155.2.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779773" version="1" comment="chromium is &lt;116.0.5845.110-bp155.2.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781699" version="1" comment="chromedriver is &lt;116.0.5845.140-bp155.2.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781700" version="1" comment="chromium is &lt;116.0.5845.140-bp155.2.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791588" version="1" comment="chromedriver is &lt;116.0.5845.179-bp155.2.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791589" version="1" comment="chromium is &lt;116.0.5845.179-bp155.2.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794704" version="1" comment="chromedriver is &lt;116.0.5845.187-bp155.2.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794705" version="1" comment="chromium is &lt;116.0.5845.187-bp155.2.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795739" version="1" comment="chromedriver is &lt;116.0.5845.187-bp155.2.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795740" version="1" comment="chromium is &lt;116.0.5845.187-bp155.2.34.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796618" version="1" comment="chromedriver is &lt;117.0.5938.88-bp155.2.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796619" version="1" comment="chromium is &lt;117.0.5938.88-bp155.2.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798656" version="1" comment="opera is &lt;102.0.4880.40-lp155.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798691" version="1" comment="renderdoc is &lt;1.24-bp155.2.3.1 for aarch64,i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798692" version="1" comment="renderdoc-devel is &lt;1.24-bp155.2.3.1 for aarch64,i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798693" version="1" comment="libmodsecurity3 is &lt;3.0.10-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798694" version="1" comment="libmodsecurity3-32bit is &lt;3.0.10-bp155.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798695" version="1" comment="libmodsecurity3-64bit is &lt;3.0.10-bp155.3.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798696" version="1" comment="modsecurity is &lt;3.0.10-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798697" version="1" comment="modsecurity-devel is &lt;3.0.10-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798698" version="1" comment="python3-GitPython is &lt;3.1.12.1610074031.f653af66-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798699" version="1" comment="python3-CairoSVG is &lt;2.5.2-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798657" version="1" comment="tcpreplay is &lt;4.4.4-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798879" version="1" comment="cacti is &lt;1.2.25-bp155.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798880" version="1" comment="cacti-spine is &lt;1.2.25-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799524" version="1" comment="chromedriver is &lt;117.0.5938.132-bp155.2.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799525" version="1" comment="chromium is &lt;117.0.5938.132-bp155.2.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799725" version="1" comment="seamonkey is &lt;2.53.17.1-bp155.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799726" version="1" comment="seamonkey-dom-inspector is &lt;2.53.17.1-bp155.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799727" version="1" comment="seamonkey-irc is &lt;2.53.17.1-bp155.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799728" version="1" comment="roundcubemail is &lt;1.6.3-bp155.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800152" version="1" comment="chromedriver is &lt;117.0.5938.149-bp155.2.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800153" version="1" comment="chromium is &lt;117.0.5938.149-bp155.2.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800127" version="1" comment="exim is &lt;4.94.2-bp155.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800128" version="1" comment="eximon is &lt;4.94.2-bp155.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800129" version="1" comment="eximstats-html is &lt;4.94.2-bp155.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801147" version="1" comment="opera is &lt;103.0.4928.16-lp155.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801575" version="1" comment="chromedriver is &lt;118.0.5993.70-bp155.2.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801576" version="1" comment="chromium is &lt;118.0.5993.70-bp155.2.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802335" version="1" comment="exim is &lt;4.94.2-bp155.5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802336" version="1" comment="eximon is &lt;4.94.2-bp155.5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802337" version="1" comment="eximstats-html is &lt;4.94.2-bp155.5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802507" version="1" comment="rxvt-unicode is &lt;9.31-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802520" version="1" comment="bluetuith is &lt;0.1.7-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802508" version="1" comment="chromedriver is &lt;118.0.5993.88-bp155.2.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802509" version="1" comment="chromium is &lt;118.0.5993.88-bp155.2.49.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802620" version="1" comment="gpp is &lt;2.28-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803328" version="1" comment="chromedriver is &lt;118.0.5993.117-bp155.2.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803329" version="1" comment="chromium is &lt;118.0.5993.117-bp155.2.52.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803413" version="1" comment="libsox3 is &lt;14.4.2-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803414" version="1" comment="sox is &lt;14.4.2-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803415" version="1" comment="sox-devel is &lt;14.4.2-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803768" version="1" comment="python3-bugzilla is &lt;3.2.0-bp155.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804022" version="1" comment="opera is &lt;104.0.4944.23-lp155.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808424" version="1" comment="roundcubemail is &lt;1.6.4-bp155.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808853" version="1" comment="ruby2.5-rubygem-railties-5.2 is &lt;5.2.3-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808855" version="1" comment="ruby2.5-rubygem-railties-doc-5.2 is &lt;5.2.3-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808849" version="1" comment="ruby2.5-rubygem-activesupport-5.2 is &lt;5.2.3-bp155.3.5.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808850" version="1" comment="ruby2.5-rubygem-activesupport-doc-5.2 is &lt;5.2.3-bp155.3.5.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809021" version="1" comment="python3-virtualbox is &lt;7.0.12-lp155.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809022" version="1" comment="virtualbox is &lt;7.0.12-lp155.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809023" version="1" comment="virtualbox-devel is &lt;7.0.12-lp155.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809024" version="1" comment="virtualbox-guest-desktop-icons is &lt;7.0.12-lp155.2.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809025" version="1" comment="virtualbox-guest-source is &lt;7.0.12-lp155.2.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809026" version="1" comment="virtualbox-guest-tools is &lt;7.0.12-lp155.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809027" version="1" comment="virtualbox-host-source is &lt;7.0.12-lp155.2.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809028" version="1" comment="virtualbox-kmp-default is &lt;7.0.12_k5.14.21_150500.55.31-lp155.2.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809029" version="1" comment="virtualbox-qt is &lt;7.0.12-lp155.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809030" version="1" comment="virtualbox-vnc is &lt;7.0.12-lp155.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809031" version="1" comment="virtualbox-websrv is &lt;7.0.12-lp155.2.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809032" version="1" comment="opera is &lt;104.0.4944.36-lp155.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809612" version="1" comment="tor is &lt;0.4.8.8-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809880" version="1" comment="mupdf is &lt;1.21.1-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809881" version="1" comment="mupdf-devel-static is &lt;1.21.1-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809882" version="1" comment="libvlc5 is &lt;3.0.20-bp155.2.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809883" version="1" comment="libvlccore9 is &lt;3.0.20-bp155.2.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809884" version="1" comment="vlc is &lt;3.0.20-bp155.2.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809885" version="1" comment="vlc-codec-gstreamer is &lt;3.0.20-bp155.2.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809886" version="1" comment="vlc-devel is &lt;3.0.20-bp155.2.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809887" version="1" comment="vlc-jack is &lt;3.0.20-bp155.2.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809888" version="1" comment="vlc-lang is &lt;3.0.20-bp155.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809889" version="1" comment="vlc-noX is &lt;3.0.20-bp155.2.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809890" version="1" comment="vlc-opencv is &lt;3.0.20-bp155.2.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809891" version="1" comment="vlc-qt is &lt;3.0.20-bp155.2.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809892" version="1" comment="vlc-vdpau is &lt;3.0.20-bp155.2.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810276" version="1" comment="chromedriver is &lt;119.0.6045.123-bp155.2.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810277" version="1" comment="chromium is &lt;119.0.6045.123-bp155.2.55.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810278" version="1" comment="gn is &lt;0.20231023-bp155.5.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810300" version="1" comment="connman is &lt;1.42-bp155.4.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810301" version="1" comment="connman-client is &lt;1.42-bp155.4.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810302" version="1" comment="connman-devel is &lt;1.42-bp155.4.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810303" version="1" comment="connman-doc is &lt;1.42-bp155.4.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810304" version="1" comment="connman-nmcompat is &lt;1.42-bp155.4.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810305" version="1" comment="connman-plugin-hh2serial-gps is &lt;1.42-bp155.4.3.1 for aarch64,i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810306" version="1" comment="connman-plugin-iospm is &lt;1.42-bp155.4.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810307" version="1" comment="connman-plugin-l2tp is &lt;1.42-bp155.4.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810308" version="1" comment="connman-plugin-openvpn is &lt;1.42-bp155.4.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810309" version="1" comment="connman-plugin-polkit is &lt;1.42-bp155.4.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810310" version="1" comment="connman-plugin-pptp is &lt;1.42-bp155.4.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810311" version="1" comment="connman-plugin-tist is &lt;1.42-bp155.4.3.1 for aarch64,i586,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810312" version="1" comment="connman-plugin-vpnc is &lt;1.42-bp155.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810313" version="1" comment="connman-plugin-wireguard is &lt;1.42-bp155.4.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810314" version="1" comment="connman-test is &lt;1.42-bp155.4.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810389" version="1" comment="jhead is &lt;3.06.0.1-bp155.5.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810416" version="1" comment="chromedriver is &lt;119.0.6045.159-bp155.2.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810417" version="1" comment="chromium is &lt;119.0.6045.159-bp155.2.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811246" version="1" comment="python311-yt-dlp is &lt;2023.11.14-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811247" version="1" comment="yt-dlp is &lt;2023.11.14-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811248" version="1" comment="yt-dlp-bash-completion is &lt;2023.11.14-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811249" version="1" comment="yt-dlp-fish-completion is &lt;2023.11.14-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811250" version="1" comment="yt-dlp-zsh-completion is &lt;2023.11.14-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813098" version="1" comment="gstreamer-plugins-bad is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813099" version="1" comment="gstreamer-plugins-bad-32bit is &lt;1.22.0-lp155.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813100" version="1" comment="gstreamer-plugins-bad-64bit is &lt;1.22.0-lp155.3.4.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813101" version="1" comment="gstreamer-plugins-bad-chromaprint is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813102" version="1" comment="gstreamer-plugins-bad-chromaprint-32bit is &lt;1.22.0-lp155.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813103" version="1" comment="gstreamer-plugins-bad-chromaprint-64bit is &lt;1.22.0-lp155.3.4.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813104" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813105" version="1" comment="gstreamer-plugins-bad-fluidsynth is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813106" version="1" comment="gstreamer-plugins-bad-fluidsynth-32bit is &lt;1.22.0-lp155.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813107" version="1" comment="gstreamer-plugins-bad-fluidsynth-64bit is &lt;1.22.0-lp155.3.4.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813108" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.22.0-lp155.3.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813109" version="1" comment="gstreamer-transcoder is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813110" version="1" comment="gstreamer-transcoder-devel is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813111" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813112" version="1" comment="libgstadaptivedemux-1_0-0-32bit is &lt;1.22.0-lp155.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813113" version="1" comment="libgstadaptivedemux-1_0-0-64bit is &lt;1.22.0-lp155.3.4.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813114" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813115" version="1" comment="libgstbadaudio-1_0-0-32bit is &lt;1.22.0-lp155.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813116" version="1" comment="libgstbadaudio-1_0-0-64bit is &lt;1.22.0-lp155.3.4.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813117" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813118" version="1" comment="libgstbasecamerabinsrc-1_0-0-32bit is &lt;1.22.0-lp155.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813119" version="1" comment="libgstbasecamerabinsrc-1_0-0-64bit is &lt;1.22.0-lp155.3.4.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813120" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813121" version="1" comment="libgstcodecparsers-1_0-0-32bit is &lt;1.22.0-lp155.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813122" version="1" comment="libgstcodecparsers-1_0-0-64bit is &lt;1.22.0-lp155.3.4.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813123" version="1" comment="libgstcodecs-1_0-0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813124" version="1" comment="libgstcodecs-1_0-0-32bit is &lt;1.22.0-lp155.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813125" version="1" comment="libgstcodecs-1_0-0-64bit is &lt;1.22.0-lp155.3.4.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813126" version="1" comment="libgstcuda-1_0-0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813127" version="1" comment="libgstcuda-1_0-0-32bit is &lt;1.22.0-lp155.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813128" version="1" comment="libgstcuda-1_0-0-64bit is &lt;1.22.0-lp155.3.4.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813129" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813130" version="1" comment="libgstinsertbin-1_0-0-32bit is &lt;1.22.0-lp155.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813131" version="1" comment="libgstinsertbin-1_0-0-64bit is &lt;1.22.0-lp155.3.4.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813132" version="1" comment="libgstisoff-1_0-0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813133" version="1" comment="libgstisoff-1_0-0-32bit is &lt;1.22.0-lp155.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813134" version="1" comment="libgstisoff-1_0-0-64bit is &lt;1.22.0-lp155.3.4.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813135" version="1" comment="libgstmpegts-1_0-0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813136" version="1" comment="libgstmpegts-1_0-0-32bit is &lt;1.22.0-lp155.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813137" version="1" comment="libgstmpegts-1_0-0-64bit is &lt;1.22.0-lp155.3.4.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813138" version="1" comment="libgstphotography-1_0-0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813139" version="1" comment="libgstphotography-1_0-0-32bit is &lt;1.22.0-lp155.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813140" version="1" comment="libgstphotography-1_0-0-64bit is &lt;1.22.0-lp155.3.4.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813141" version="1" comment="libgstplay-1_0-0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813142" version="1" comment="libgstplay-1_0-0-32bit is &lt;1.22.0-lp155.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813143" version="1" comment="libgstplay-1_0-0-64bit is &lt;1.22.0-lp155.3.4.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813144" version="1" comment="libgstplayer-1_0-0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813145" version="1" comment="libgstplayer-1_0-0-32bit is &lt;1.22.0-lp155.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813146" version="1" comment="libgstplayer-1_0-0-64bit is &lt;1.22.0-lp155.3.4.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813147" version="1" comment="libgstsctp-1_0-0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813148" version="1" comment="libgstsctp-1_0-0-32bit is &lt;1.22.0-lp155.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813149" version="1" comment="libgstsctp-1_0-0-64bit is &lt;1.22.0-lp155.3.4.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813150" version="1" comment="libgsttranscoder-1_0-0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813151" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813152" version="1" comment="libgsturidownloader-1_0-0-32bit is &lt;1.22.0-lp155.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813153" version="1" comment="libgsturidownloader-1_0-0-64bit is &lt;1.22.0-lp155.3.4.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813154" version="1" comment="libgstva-1_0-0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813155" version="1" comment="libgstva-1_0-0-32bit is &lt;1.22.0-lp155.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813156" version="1" comment="libgstva-1_0-0-64bit is &lt;1.22.0-lp155.3.4.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813157" version="1" comment="libgstvulkan-1_0-0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813158" version="1" comment="libgstvulkan-1_0-0-32bit is &lt;1.22.0-lp155.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813159" version="1" comment="libgstvulkan-1_0-0-64bit is &lt;1.22.0-lp155.3.4.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813160" version="1" comment="libgstwayland-1_0-0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813161" version="1" comment="libgstwayland-1_0-0-32bit is &lt;1.22.0-lp155.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813162" version="1" comment="libgstwayland-1_0-0-64bit is &lt;1.22.0-lp155.3.4.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813163" version="1" comment="libgstwebrtc-1_0-0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813164" version="1" comment="libgstwebrtc-1_0-0-32bit is &lt;1.22.0-lp155.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813165" version="1" comment="libgstwebrtc-1_0-0-64bit is &lt;1.22.0-lp155.3.4.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813166" version="1" comment="libgstwebrtcnice-1_0-0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813167" version="1" comment="libgstwebrtcnice-1_0-0-32bit is &lt;1.22.0-lp155.3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813168" version="1" comment="libgstwebrtcnice-1_0-0-64bit is &lt;1.22.0-lp155.3.4.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813169" version="1" comment="typelib-1_0-CudaGst-1_0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813170" version="1" comment="typelib-1_0-GstBadAudio-1_0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813171" version="1" comment="typelib-1_0-GstCodecs-1_0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813172" version="1" comment="typelib-1_0-GstCuda-1_0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813173" version="1" comment="typelib-1_0-GstInsertBin-1_0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813174" version="1" comment="typelib-1_0-GstMpegts-1_0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813175" version="1" comment="typelib-1_0-GstPlay-1_0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813176" version="1" comment="typelib-1_0-GstPlayer-1_0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813177" version="1" comment="typelib-1_0-GstTranscoder-1_0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813178" version="1" comment="typelib-1_0-GstVa-1_0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813179" version="1" comment="typelib-1_0-GstVulkan-1_0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813180" version="1" comment="typelib-1_0-GstVulkanWayland-1_0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813181" version="1" comment="typelib-1_0-GstVulkanXCB-1_0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813182" version="1" comment="typelib-1_0-GstWebRTC-1_0 is &lt;1.22.0-lp155.3.4.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813802" version="1" comment="optipng is &lt;0.7.8-bp155.5.5.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814077" version="1" comment="opera is &lt;105.0.4970.21-lp155.3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813982" version="1" comment="chromedriver is &lt;119.0.6045.199-bp155.2.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813983" version="1" comment="chromium is &lt;119.0.6045.199-bp155.2.61.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814744" version="1" comment="python3-Django1 is &lt;1.11.29-bp155.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815372" version="1" comment="libtorrent-rasterbar-devel is &lt;2.0.9-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815373" version="1" comment="libtorrent-rasterbar-doc is &lt;2.0.9-bp155.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815374" version="1" comment="libtorrent-rasterbar2_0 is &lt;2.0.9-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815375" version="1" comment="python3-libtorrent-rasterbar is &lt;2.0.9-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815376" version="1" comment="qbittorrent is &lt;4.6.2-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815377" version="1" comment="qbittorrent-nox is &lt;4.6.2-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815777" version="1" comment="opera is &lt;105.0.4970.34-lp155.3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816822" version="1" comment="fish is &lt;3.3.1-bp155.4.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816823" version="1" comment="fish-devel is &lt;3.3.1-bp155.4.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817198" version="1" comment="gstreamer-plugins-bad is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817199" version="1" comment="gstreamer-plugins-bad-32bit is &lt;1.22.0-lp155.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817200" version="1" comment="gstreamer-plugins-bad-64bit is &lt;1.22.0-lp155.3.7.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817201" version="1" comment="gstreamer-plugins-bad-chromaprint is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817202" version="1" comment="gstreamer-plugins-bad-chromaprint-32bit is &lt;1.22.0-lp155.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817203" version="1" comment="gstreamer-plugins-bad-chromaprint-64bit is &lt;1.22.0-lp155.3.7.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817204" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817205" version="1" comment="gstreamer-plugins-bad-fluidsynth is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817206" version="1" comment="gstreamer-plugins-bad-fluidsynth-32bit is &lt;1.22.0-lp155.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817207" version="1" comment="gstreamer-plugins-bad-fluidsynth-64bit is &lt;1.22.0-lp155.3.7.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817208" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.22.0-lp155.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817209" version="1" comment="gstreamer-transcoder is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817210" version="1" comment="gstreamer-transcoder-devel is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817211" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817212" version="1" comment="libgstadaptivedemux-1_0-0-32bit is &lt;1.22.0-lp155.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817213" version="1" comment="libgstadaptivedemux-1_0-0-64bit is &lt;1.22.0-lp155.3.7.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817214" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817215" version="1" comment="libgstbadaudio-1_0-0-32bit is &lt;1.22.0-lp155.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817216" version="1" comment="libgstbadaudio-1_0-0-64bit is &lt;1.22.0-lp155.3.7.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817217" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817218" version="1" comment="libgstbasecamerabinsrc-1_0-0-32bit is &lt;1.22.0-lp155.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817219" version="1" comment="libgstbasecamerabinsrc-1_0-0-64bit is &lt;1.22.0-lp155.3.7.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817220" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817221" version="1" comment="libgstcodecparsers-1_0-0-32bit is &lt;1.22.0-lp155.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817222" version="1" comment="libgstcodecparsers-1_0-0-64bit is &lt;1.22.0-lp155.3.7.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817223" version="1" comment="libgstcodecs-1_0-0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817224" version="1" comment="libgstcodecs-1_0-0-32bit is &lt;1.22.0-lp155.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817225" version="1" comment="libgstcodecs-1_0-0-64bit is &lt;1.22.0-lp155.3.7.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817226" version="1" comment="libgstcuda-1_0-0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817227" version="1" comment="libgstcuda-1_0-0-32bit is &lt;1.22.0-lp155.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817228" version="1" comment="libgstcuda-1_0-0-64bit is &lt;1.22.0-lp155.3.7.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817229" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817230" version="1" comment="libgstinsertbin-1_0-0-32bit is &lt;1.22.0-lp155.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817231" version="1" comment="libgstinsertbin-1_0-0-64bit is &lt;1.22.0-lp155.3.7.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817232" version="1" comment="libgstisoff-1_0-0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817233" version="1" comment="libgstisoff-1_0-0-32bit is &lt;1.22.0-lp155.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817234" version="1" comment="libgstisoff-1_0-0-64bit is &lt;1.22.0-lp155.3.7.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817235" version="1" comment="libgstmpegts-1_0-0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817236" version="1" comment="libgstmpegts-1_0-0-32bit is &lt;1.22.0-lp155.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817237" version="1" comment="libgstmpegts-1_0-0-64bit is &lt;1.22.0-lp155.3.7.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817238" version="1" comment="libgstphotography-1_0-0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817239" version="1" comment="libgstphotography-1_0-0-32bit is &lt;1.22.0-lp155.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817240" version="1" comment="libgstphotography-1_0-0-64bit is &lt;1.22.0-lp155.3.7.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817241" version="1" comment="libgstplay-1_0-0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817242" version="1" comment="libgstplay-1_0-0-32bit is &lt;1.22.0-lp155.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817243" version="1" comment="libgstplay-1_0-0-64bit is &lt;1.22.0-lp155.3.7.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817244" version="1" comment="libgstplayer-1_0-0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817245" version="1" comment="libgstplayer-1_0-0-32bit is &lt;1.22.0-lp155.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817246" version="1" comment="libgstplayer-1_0-0-64bit is &lt;1.22.0-lp155.3.7.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817247" version="1" comment="libgstsctp-1_0-0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817248" version="1" comment="libgstsctp-1_0-0-32bit is &lt;1.22.0-lp155.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817249" version="1" comment="libgstsctp-1_0-0-64bit is &lt;1.22.0-lp155.3.7.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817250" version="1" comment="libgsttranscoder-1_0-0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817251" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817252" version="1" comment="libgsturidownloader-1_0-0-32bit is &lt;1.22.0-lp155.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817253" version="1" comment="libgsturidownloader-1_0-0-64bit is &lt;1.22.0-lp155.3.7.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817254" version="1" comment="libgstva-1_0-0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817255" version="1" comment="libgstva-1_0-0-32bit is &lt;1.22.0-lp155.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817256" version="1" comment="libgstva-1_0-0-64bit is &lt;1.22.0-lp155.3.7.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817257" version="1" comment="libgstvulkan-1_0-0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817258" version="1" comment="libgstvulkan-1_0-0-32bit is &lt;1.22.0-lp155.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817259" version="1" comment="libgstvulkan-1_0-0-64bit is &lt;1.22.0-lp155.3.7.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817260" version="1" comment="libgstwayland-1_0-0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817261" version="1" comment="libgstwayland-1_0-0-32bit is &lt;1.22.0-lp155.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817262" version="1" comment="libgstwayland-1_0-0-64bit is &lt;1.22.0-lp155.3.7.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817263" version="1" comment="libgstwebrtc-1_0-0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817264" version="1" comment="libgstwebrtc-1_0-0-32bit is &lt;1.22.0-lp155.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817265" version="1" comment="libgstwebrtc-1_0-0-64bit is &lt;1.22.0-lp155.3.7.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817266" version="1" comment="libgstwebrtcnice-1_0-0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817267" version="1" comment="libgstwebrtcnice-1_0-0-32bit is &lt;1.22.0-lp155.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817268" version="1" comment="libgstwebrtcnice-1_0-0-64bit is &lt;1.22.0-lp155.3.7.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817269" version="1" comment="typelib-1_0-CudaGst-1_0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817270" version="1" comment="typelib-1_0-GstBadAudio-1_0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817271" version="1" comment="typelib-1_0-GstCodecs-1_0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817272" version="1" comment="typelib-1_0-GstCuda-1_0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817273" version="1" comment="typelib-1_0-GstInsertBin-1_0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817274" version="1" comment="typelib-1_0-GstMpegts-1_0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817275" version="1" comment="typelib-1_0-GstPlay-1_0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817276" version="1" comment="typelib-1_0-GstPlayer-1_0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817277" version="1" comment="typelib-1_0-GstTranscoder-1_0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817278" version="1" comment="typelib-1_0-GstVa-1_0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817279" version="1" comment="typelib-1_0-GstVulkan-1_0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817280" version="1" comment="typelib-1_0-GstVulkanWayland-1_0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817281" version="1" comment="typelib-1_0-GstVulkanXCB-1_0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817282" version="1" comment="typelib-1_0-GstWebRTC-1_0 is &lt;1.22.0-lp155.3.7.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817683" version="1" comment="putty is &lt;0.80-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818010" version="1" comment="cppcheck is &lt;2.12.1-bp155.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818011" version="1" comment="cppcheck-gui is &lt;2.12.1-bp155.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818241" version="1" comment="zabbix-agent is &lt;4.0.50-bp155.3.9.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818242" version="1" comment="zabbix-java-gateway is &lt;4.0.50-bp155.3.9.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818243" version="1" comment="zabbix-phpfrontend is &lt;4.0.50-bp155.3.9.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818244" version="1" comment="zabbix-proxy is &lt;4.0.50-bp155.3.9.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818245" version="1" comment="zabbix-proxy-mysql is &lt;4.0.50-bp155.3.9.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818246" version="1" comment="zabbix-proxy-postgresql is &lt;4.0.50-bp155.3.9.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818247" version="1" comment="zabbix-proxy-sqlite is &lt;4.0.50-bp155.3.9.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818248" version="1" comment="zabbix-server is &lt;4.0.50-bp155.3.9.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818249" version="1" comment="zabbix-server-mysql is &lt;4.0.50-bp155.3.9.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818250" version="1" comment="zabbix-server-postgresql is &lt;4.0.50-bp155.3.9.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818362" version="1" comment="proftpd is &lt;1.3.8b-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818363" version="1" comment="proftpd-devel is &lt;1.3.8b-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818364" version="1" comment="proftpd-doc is &lt;1.3.8b-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818365" version="1" comment="proftpd-lang is &lt;1.3.8b-bp155.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818366" version="1" comment="proftpd-ldap is &lt;1.3.8b-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818367" version="1" comment="proftpd-mysql is &lt;1.3.8b-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818368" version="1" comment="proftpd-pgsql is &lt;1.3.8b-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818369" version="1" comment="proftpd-radius is &lt;1.3.8b-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818370" version="1" comment="proftpd-sqlite is &lt;1.3.8b-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818384" version="1" comment="deepin-compressor is &lt;5.12.13-bp155.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818385" version="1" comment="deepin-compressor-lang is &lt;5.12.13-bp155.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854005" version="1" comment="sngrep is &lt;1.8.1-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854690" version="1" comment="opera is &lt;109.0.5097.38-lp155.3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855406" version="1" comment="putty is &lt;0.81-bp155.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855608" version="1" comment="perl-CryptX is &lt;0.80.0-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857737" version="1" comment="dcmtk is &lt;3.6.8-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857738" version="1" comment="dcmtk-devel is &lt;3.6.8-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857739" version="1" comment="libdcmtk18 is &lt;3.6.8-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858166" version="1" comment="pdns-recursor is &lt;4.8.8-bp155.2.6.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858669" version="1" comment="apache2-mod_php81 is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858670" version="1" comment="php81 is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858671" version="1" comment="php81-bcmath is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858672" version="1" comment="php81-bz2 is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858673" version="1" comment="php81-calendar is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858674" version="1" comment="php81-cli is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858675" version="1" comment="php81-ctype is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858676" version="1" comment="php81-curl is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858677" version="1" comment="php81-dba is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858678" version="1" comment="php81-devel is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858679" version="1" comment="php81-dom is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858680" version="1" comment="php81-embed is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858681" version="1" comment="php81-enchant is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858682" version="1" comment="php81-exif is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858683" version="1" comment="php81-fastcgi is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858684" version="1" comment="php81-ffi is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858685" version="1" comment="php81-fileinfo is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858686" version="1" comment="php81-fpm is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858687" version="1" comment="php81-fpm-apache is &lt;8.1.28-bp155.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858688" version="1" comment="php81-ftp is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858689" version="1" comment="php81-gd is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858690" version="1" comment="php81-gettext is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858691" version="1" comment="php81-gmp is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858692" version="1" comment="php81-iconv is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858693" version="1" comment="php81-intl is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858694" version="1" comment="php81-ldap is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858695" version="1" comment="php81-mbstring is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858696" version="1" comment="php81-mysql is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858697" version="1" comment="php81-odbc is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858698" version="1" comment="php81-opcache is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858699" version="1" comment="php81-openssl is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858700" version="1" comment="php81-pcntl is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858701" version="1" comment="php81-pdo is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858702" version="1" comment="php81-pgsql is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858703" version="1" comment="php81-phar is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858704" version="1" comment="php81-posix is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858705" version="1" comment="php81-readline is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858706" version="1" comment="php81-shmop is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858707" version="1" comment="php81-snmp is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858708" version="1" comment="php81-soap is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858709" version="1" comment="php81-sockets is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858710" version="1" comment="php81-sodium is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858711" version="1" comment="php81-sqlite is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858712" version="1" comment="php81-sysvmsg is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858713" version="1" comment="php81-sysvsem is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858714" version="1" comment="php81-sysvshm is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858715" version="1" comment="php81-test is &lt;8.1.28-bp155.8.3 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858716" version="1" comment="php81-tidy is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858717" version="1" comment="php81-tokenizer is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858718" version="1" comment="php81-xmlreader is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858719" version="1" comment="php81-xmlwriter is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858720" version="1" comment="php81-xsl is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858721" version="1" comment="php81-zip is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858722" version="1" comment="php81-zlib is &lt;8.1.28-bp155.8.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859182" version="1" comment="python3-python-jose is &lt;3.0.1-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860178" version="1" comment="tinyproxy is &lt;1.11.2-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860475" version="1" comment="python3-Pillow is &lt;8.4.0-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860476" version="1" comment="python3-Pillow-tk is &lt;8.4.0-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861423" version="1" comment="opera is &lt;110.0.5130.23-lp155.3.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818995" version="1" comment="libopusfile0 is &lt;0.12-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818996" version="1" comment="opusfile-devel is &lt;0.12-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861608" version="1" comment="git-cliff is &lt;2.2.2-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861609" version="1" comment="git-cliff-bash-completion is &lt;2.2.2-bp155.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861610" version="1" comment="git-cliff-fish-completion is &lt;2.2.2-bp155.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861611" version="1" comment="git-cliff-zsh-completion is &lt;2.2.2-bp155.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861617" version="1" comment="python3-Pillow is &lt;8.4.0-bp155.3.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861618" version="1" comment="python3-Pillow-tk is &lt;8.4.0-bp155.3.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861866" version="1" comment="gitui is &lt;0.26.2-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861867" version="1" comment="chromedriver is &lt;125.0.6422.60-bp155.2.82.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861868" version="1" comment="chromium is &lt;125.0.6422.60-bp155.2.82.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861953" version="1" comment="chromedriver is &lt;125.0.6422.76-bp155.2.85.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861954" version="1" comment="chromium is &lt;125.0.6422.76-bp155.2.85.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862117" version="1" comment="libQt6NetworkAuth6 is &lt;6.4.2-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862118" version="1" comment="qt6-networkauth-devel is &lt;6.4.2-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862119" version="1" comment="qt6-networkauth-docs-html is &lt;6.4.2-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862120" version="1" comment="qt6-networkauth-docs-qch is &lt;6.4.2-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862121" version="1" comment="qt6-networkauth-examples is &lt;6.4.2-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862122" version="1" comment="qt6-networkauth-private-devel is &lt;6.4.2-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862227" version="1" comment="cJSON-devel is &lt;1.7.18-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862228" version="1" comment="libcjson1 is &lt;1.7.18-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862241" version="1" comment="chromedriver is &lt;125.0.6422.112-bp155.2.88.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862242" version="1" comment="chromium is &lt;125.0.6422.112-bp155.2.88.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862243" version="1" comment="opera is &lt;110.0.5130.39-lp155.3.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862244" version="1" comment="libQt5NetworkAuth5 is &lt;5.15.2+kde2-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862245" version="1" comment="libQt5NetworkAuth5-32bit is &lt;5.15.2+kde2-bp155.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862246" version="1" comment="libQt5NetworkAuth5-64bit is &lt;5.15.2+kde2-bp155.3.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862247" version="1" comment="libqt5-qtnetworkauth-devel is &lt;5.15.2+kde2-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862248" version="1" comment="libqt5-qtnetworkauth-devel-32bit is &lt;5.15.2+kde2-bp155.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862249" version="1" comment="libqt5-qtnetworkauth-devel-64bit is &lt;5.15.2+kde2-bp155.3.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862250" version="1" comment="libqt5-qtnetworkauth-examples is &lt;5.15.2+kde2-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862251" version="1" comment="libqt5-qtnetworkauth-private-headers-devel is &lt;5.15.2+kde2-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862546" version="1" comment="gifsicle is &lt;1.95-bp155.3.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862547" version="1" comment="libredwg-devel is &lt;0.12.5.6924-bp155.3.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862548" version="1" comment="libredwg-tools is &lt;0.12.5.6924-bp155.3.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862549" version="1" comment="libredwg0 is &lt;0.12.5.6924-bp155.3.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863568" version="1" comment="chromedriver is &lt;125.0.6422.141-bp155.2.91.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863569" version="1" comment="chromium is &lt;125.0.6422.141-bp155.2.91.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863570" version="1" comment="python3-python-jose is &lt;3.0.1-bp155.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864048" version="1" comment="libhtp-devel is &lt;0.5.42-bp156.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864049" version="1" comment="libhtp2 is &lt;0.5.42-bp156.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864161" version="1" comment="gmenudbusmenuproxy is &lt;5.27.9-bp155.2.6.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864162" version="1" comment="plasma5-session is &lt;5.27.9-bp155.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864163" version="1" comment="plasma5-session-wayland is &lt;5.27.9-bp155.2.6.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864164" version="1" comment="plasma5-workspace is &lt;5.27.9-bp155.2.6.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864165" version="1" comment="plasma5-workspace-devel is &lt;5.27.9-bp155.2.6.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864166" version="1" comment="plasma5-workspace-lang is &lt;5.27.9-bp155.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864167" version="1" comment="plasma5-workspace-libs is &lt;5.27.9-bp155.2.6.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864168" version="1" comment="xembedsniproxy is &lt;5.27.9-bp155.2.6.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865335" version="1" comment="nano is &lt;7.2-bp156.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865336" version="1" comment="nano-lang is &lt;7.2-bp156.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819171" version="1" comment="opera is &lt;106.0.4998.28-lp155.3.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867981" version="1" comment="gdcm is &lt;3.0.24-bp155.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867982" version="1" comment="gdcm-applications is &lt;3.0.24-bp155.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867983" version="1" comment="gdcm-devel is &lt;3.0.24-bp155.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867984" version="1" comment="gdcm-examples is &lt;3.0.24-bp155.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867985" version="1" comment="libgdcm3_0 is &lt;3.0.24-bp155.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867986" version="1" comment="libsocketxx1_2 is &lt;3.0.24-bp155.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867987" version="1" comment="python3-gdcm is &lt;3.0.24-bp155.2.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819233" version="1" comment="python3-django-grappelli is &lt;2.14.4-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871420" version="1" comment="python3-Js2Py is &lt;0.70-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871635" version="1" comment="opera is &lt;111.0.5168.43-lp155.3.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871645" version="1" comment="kbfs is &lt;6.2.8-bp156.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871646" version="1" comment="kbfs-git is &lt;6.2.8-bp156.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871647" version="1" comment="kbfs-tool is &lt;6.2.8-bp156.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871648" version="1" comment="keybase-client is &lt;6.2.8-bp156.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873751" version="1" comment="obs-service-download_url is &lt;0.2.1-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818387" version="1" comment="opera is &lt;106.0.4998.19-lp155.3.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819596" version="1" comment="chromedriver is &lt;120.0.6099.216-bp155.2.64.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819597" version="1" comment="chromium is &lt;120.0.6099.216-bp155.2.64.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874034" version="1" comment="Botan is &lt;2.19.5-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874035" version="1" comment="Botan-doc is &lt;2.19.5-bp155.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874036" version="1" comment="libbotan-2-19 is &lt;2.19.5-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874037" version="1" comment="libbotan-2-19-32bit is &lt;2.19.5-bp155.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874038" version="1" comment="libbotan-2-19-64bit is &lt;2.19.5-bp155.2.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874039" version="1" comment="libbotan-devel is &lt;2.19.5-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874040" version="1" comment="libbotan-devel-32bit is &lt;2.19.5-bp155.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874041" version="1" comment="libbotan-devel-64bit is &lt;2.19.5-bp155.2.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874042" version="1" comment="python3-botan is &lt;2.19.5-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874751" version="1" comment="chromedriver is &lt;126.0.6478.126-bp156.2.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874752" version="1" comment="chromium is &lt;126.0.6478.126-bp156.2.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874753" version="1" comment="opera is &lt;112.0.5197.25-lp155.3.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819598" version="1" comment="perl-Spreadsheet-ParseXLSX is &lt;0.290.0-bp155.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875030" version="1" comment="global is &lt;6.6.9-bp156.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875031" version="1" comment="caddy is &lt;2.8.4-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875032" version="1" comment="caddy-bash-completion is &lt;2.8.4-bp155.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875033" version="1" comment="caddy-fish-completion is &lt;2.8.4-bp155.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875034" version="1" comment="caddy-zsh-completion is &lt;2.8.4-bp155.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875035" version="1" comment="chromedriver is &lt;126.0.6478.182-bp156.2.11.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875036" version="1" comment="chromium is &lt;126.0.6478.182-bp156.2.11.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875462" version="1" comment="python3-sentry-sdk is &lt;0.14.4-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875463" version="1" comment="exim is &lt;4.97.1-bp155.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875464" version="1" comment="eximon is &lt;4.97.1-bp155.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875465" version="1" comment="eximstats-html is &lt;4.97.1-bp155.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876318" version="1" comment="python3-nltk is &lt;3.7-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876377" version="1" comment="kbfs is &lt;6.2.8-bp156.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876378" version="1" comment="kbfs-git is &lt;6.2.8-bp156.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876379" version="1" comment="kbfs-tool is &lt;6.2.8-bp156.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876380" version="1" comment="keybase-client is &lt;6.2.8-bp156.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876439" version="1" comment="assimp-devel is &lt;5.3.1-bp156.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876440" version="1" comment="libassimp5 is &lt;5.3.1-bp156.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876441" version="1" comment="gh is &lt;2.53.0-bp155.2.12.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876442" version="1" comment="gh-bash-completion is &lt;2.53.0-bp155.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876443" version="1" comment="gh-fish-completion is &lt;2.53.0-bp155.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876444" version="1" comment="gh-zsh-completion is &lt;2.53.0-bp155.2.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819762" version="1" comment="libuev-devel is &lt;2.4.1-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819763" version="1" comment="libuev3 is &lt;2.4.1-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877954" version="1" comment="jupyter-notebook is &lt;5.7.11-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877955" version="1" comment="jupyter-notebook-doc is &lt;5.7.11-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877956" version="1" comment="jupyter-notebook-lang is &lt;5.7.11-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877957" version="1" comment="jupyter-notebook-latex is &lt;5.7.11-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877958" version="1" comment="python3-notebook is &lt;5.7.11-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877959" version="1" comment="python3-notebook-lang is &lt;5.7.11-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879831" version="1" comment="python3-aiosmtpd is &lt;1.2.1-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879832" version="1" comment="apptainer is &lt;1.3.0-bp155.3.3.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879833" version="1" comment="apptainer-leap is &lt;1.3.0-bp155.3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879834" version="1" comment="apptainer-sle15_5 is &lt;1.3.0-bp155.3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879835" version="1" comment="apptainer-sle15_6 is &lt;1.3.0-bp155.3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879836" version="1" comment="libsquashfuse0 is &lt;0.5.0-bp155.2.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879837" version="1" comment="squashfuse is &lt;0.5.0-bp155.2.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879838" version="1" comment="squashfuse-devel is &lt;0.5.0-bp155.2.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879839" version="1" comment="squashfuse-tools is &lt;0.5.0-bp155.2.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879840" version="1" comment="sngrep is &lt;1.8.1-bp155.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819764" version="1" comment="chromedriver is &lt;120.0.6099.224-bp155.2.67.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819765" version="1" comment="chromium is &lt;120.0.6099.224-bp155.2.67.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880180" version="1" comment="libtsk19 is &lt;4.12.1-bp155.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880181" version="1" comment="sleuthkit is &lt;4.12.1-bp155.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880182" version="1" comment="sleuthkit-devel is &lt;4.12.1-bp155.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880188" version="1" comment="opera is &lt;112.0.5197.53-lp155.3.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880189" version="1" comment="python3-Pillow is &lt;8.4.0-bp155.3.9.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880190" version="1" comment="python3-Pillow-tk is &lt;8.4.0-bp155.3.9.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880191" version="1" comment="chromedriver is &lt;127.0.6533.119-bp156.2.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880192" version="1" comment="chromium is &lt;127.0.6533.119-bp156.2.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880193" version="1" comment="gn is &lt;0.20240730-bp156.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880194" version="1" comment="rust-bindgen is &lt;0.69.1-bp156.2.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880822" version="1" comment="roundcubemail is &lt;1.6.7-bp155.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880905" version="1" comment="chromedriver is &lt;128.0.6613.84-bp156.2.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880906" version="1" comment="chromium is &lt;128.0.6613.84-bp156.2.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819963" version="1" comment="seamonkey is &lt;2.53.18.1-bp155.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819964" version="1" comment="seamonkey-dom-inspector is &lt;2.53.18.1-bp155.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819965" version="1" comment="seamonkey-irc is &lt;2.53.18.1-bp155.2.15.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880907" version="1" comment="apache2-mod_php81 is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880908" version="1" comment="php81 is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880909" version="1" comment="php81-bcmath is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880910" version="1" comment="php81-bz2 is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880911" version="1" comment="php81-calendar is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880912" version="1" comment="php81-cli is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880913" version="1" comment="php81-ctype is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880914" version="1" comment="php81-curl is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880915" version="1" comment="php81-dba is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880916" version="1" comment="php81-devel is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880917" version="1" comment="php81-dom is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880918" version="1" comment="php81-embed is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880919" version="1" comment="php81-enchant is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880920" version="1" comment="php81-exif is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880921" version="1" comment="php81-fastcgi is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880922" version="1" comment="php81-ffi is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880923" version="1" comment="php81-fileinfo is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880924" version="1" comment="php81-fpm is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880925" version="1" comment="php81-fpm-apache is &lt;8.1.29-bp155.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880926" version="1" comment="php81-ftp is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880927" version="1" comment="php81-gd is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880928" version="1" comment="php81-gettext is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880929" version="1" comment="php81-gmp is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880930" version="1" comment="php81-iconv is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880931" version="1" comment="php81-intl is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880932" version="1" comment="php81-ldap is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880933" version="1" comment="php81-mbstring is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880934" version="1" comment="php81-mysql is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880935" version="1" comment="php81-odbc is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880936" version="1" comment="php81-opcache is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880937" version="1" comment="php81-openssl is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880938" version="1" comment="php81-pcntl is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880939" version="1" comment="php81-pdo is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880940" version="1" comment="php81-pgsql is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880941" version="1" comment="php81-phar is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880942" version="1" comment="php81-posix is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880943" version="1" comment="php81-readline is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880944" version="1" comment="php81-shmop is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880945" version="1" comment="php81-snmp is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880946" version="1" comment="php81-soap is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880947" version="1" comment="php81-sockets is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880948" version="1" comment="php81-sodium is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880949" version="1" comment="php81-sqlite is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880950" version="1" comment="php81-sysvmsg is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880951" version="1" comment="php81-sysvsem is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880952" version="1" comment="php81-sysvshm is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880953" version="1" comment="php81-test is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880954" version="1" comment="php81-tidy is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880955" version="1" comment="php81-tokenizer is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880956" version="1" comment="php81-xmlreader is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880957" version="1" comment="php81-xmlwriter is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880958" version="1" comment="php81-xsl is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880959" version="1" comment="php81-zip is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880960" version="1" comment="php81-zlib is &lt;8.1.29-bp155.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881504" version="1" comment="chromedriver is &lt;128.0.6613.113-bp156.2.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881505" version="1" comment="chromium is &lt;128.0.6613.113-bp156.2.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881506" version="1" comment="trivy is &lt;0.54.1-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940215" version="1" comment="rust-bindgen is &lt;0.70.1-bp156.5.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940220" version="1" comment="cacti is &lt;1.2.27-bp155.2.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940221" version="1" comment="cacti-spine is &lt;1.2.27-bp155.2.9.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941118" version="1" comment="opera is &lt;113.0.5230.32-lp155.3.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941422" version="1" comment="chromedriver is &lt;128.0.6613.119-bp155.2.111.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941423" version="1" comment="chromium is &lt;128.0.6613.119-bp155.2.111.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942640" version="1" comment="chromedriver is &lt;128.0.6613.137-bp156.2.26.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942641" version="1" comment="chromium is &lt;128.0.6613.137-bp156.2.26.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942642" version="1" comment="htmldoc is &lt;1.9.16-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942752" version="1" comment="gstreamer-plugins-bad is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942753" version="1" comment="gstreamer-plugins-bad-32bit is &lt;1.22.0-lp155.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942754" version="1" comment="gstreamer-plugins-bad-64bit is &lt;1.22.0-lp155.3.10.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942755" version="1" comment="gstreamer-plugins-bad-chromaprint is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942756" version="1" comment="gstreamer-plugins-bad-chromaprint-32bit is &lt;1.22.0-lp155.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942757" version="1" comment="gstreamer-plugins-bad-chromaprint-64bit is &lt;1.22.0-lp155.3.10.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942758" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942759" version="1" comment="gstreamer-plugins-bad-fluidsynth is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942760" version="1" comment="gstreamer-plugins-bad-fluidsynth-32bit is &lt;1.22.0-lp155.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942761" version="1" comment="gstreamer-plugins-bad-fluidsynth-64bit is &lt;1.22.0-lp155.3.10.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942762" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.22.0-lp155.3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942763" version="1" comment="gstreamer-transcoder is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942764" version="1" comment="gstreamer-transcoder-devel is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942765" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942766" version="1" comment="libgstadaptivedemux-1_0-0-32bit is &lt;1.22.0-lp155.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942767" version="1" comment="libgstadaptivedemux-1_0-0-64bit is &lt;1.22.0-lp155.3.10.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942768" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942769" version="1" comment="libgstbadaudio-1_0-0-32bit is &lt;1.22.0-lp155.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942770" version="1" comment="libgstbadaudio-1_0-0-64bit is &lt;1.22.0-lp155.3.10.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942771" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942772" version="1" comment="libgstbasecamerabinsrc-1_0-0-32bit is &lt;1.22.0-lp155.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942773" version="1" comment="libgstbasecamerabinsrc-1_0-0-64bit is &lt;1.22.0-lp155.3.10.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942774" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942775" version="1" comment="libgstcodecparsers-1_0-0-32bit is &lt;1.22.0-lp155.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942776" version="1" comment="libgstcodecparsers-1_0-0-64bit is &lt;1.22.0-lp155.3.10.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942777" version="1" comment="libgstcodecs-1_0-0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942778" version="1" comment="libgstcodecs-1_0-0-32bit is &lt;1.22.0-lp155.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942779" version="1" comment="libgstcodecs-1_0-0-64bit is &lt;1.22.0-lp155.3.10.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942780" version="1" comment="libgstcuda-1_0-0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942781" version="1" comment="libgstcuda-1_0-0-32bit is &lt;1.22.0-lp155.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942782" version="1" comment="libgstcuda-1_0-0-64bit is &lt;1.22.0-lp155.3.10.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942783" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942784" version="1" comment="libgstinsertbin-1_0-0-32bit is &lt;1.22.0-lp155.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942785" version="1" comment="libgstinsertbin-1_0-0-64bit is &lt;1.22.0-lp155.3.10.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942786" version="1" comment="libgstisoff-1_0-0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942787" version="1" comment="libgstisoff-1_0-0-32bit is &lt;1.22.0-lp155.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942788" version="1" comment="libgstisoff-1_0-0-64bit is &lt;1.22.0-lp155.3.10.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942789" version="1" comment="libgstmpegts-1_0-0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942790" version="1" comment="libgstmpegts-1_0-0-32bit is &lt;1.22.0-lp155.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942791" version="1" comment="libgstmpegts-1_0-0-64bit is &lt;1.22.0-lp155.3.10.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942792" version="1" comment="libgstphotography-1_0-0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942793" version="1" comment="libgstphotography-1_0-0-32bit is &lt;1.22.0-lp155.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942794" version="1" comment="libgstphotography-1_0-0-64bit is &lt;1.22.0-lp155.3.10.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942795" version="1" comment="libgstplay-1_0-0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942796" version="1" comment="libgstplay-1_0-0-32bit is &lt;1.22.0-lp155.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942797" version="1" comment="libgstplay-1_0-0-64bit is &lt;1.22.0-lp155.3.10.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942798" version="1" comment="libgstplayer-1_0-0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942799" version="1" comment="libgstplayer-1_0-0-32bit is &lt;1.22.0-lp155.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942800" version="1" comment="libgstplayer-1_0-0-64bit is &lt;1.22.0-lp155.3.10.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942801" version="1" comment="libgstsctp-1_0-0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942802" version="1" comment="libgstsctp-1_0-0-32bit is &lt;1.22.0-lp155.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942803" version="1" comment="libgstsctp-1_0-0-64bit is &lt;1.22.0-lp155.3.10.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942804" version="1" comment="libgsttranscoder-1_0-0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942805" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942806" version="1" comment="libgsturidownloader-1_0-0-32bit is &lt;1.22.0-lp155.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942807" version="1" comment="libgsturidownloader-1_0-0-64bit is &lt;1.22.0-lp155.3.10.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942808" version="1" comment="libgstva-1_0-0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942809" version="1" comment="libgstva-1_0-0-32bit is &lt;1.22.0-lp155.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942810" version="1" comment="libgstva-1_0-0-64bit is &lt;1.22.0-lp155.3.10.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942811" version="1" comment="libgstvulkan-1_0-0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942812" version="1" comment="libgstvulkan-1_0-0-32bit is &lt;1.22.0-lp155.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942813" version="1" comment="libgstvulkan-1_0-0-64bit is &lt;1.22.0-lp155.3.10.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942814" version="1" comment="libgstwayland-1_0-0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942815" version="1" comment="libgstwayland-1_0-0-32bit is &lt;1.22.0-lp155.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942816" version="1" comment="libgstwayland-1_0-0-64bit is &lt;1.22.0-lp155.3.10.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942817" version="1" comment="libgstwebrtc-1_0-0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942818" version="1" comment="libgstwebrtc-1_0-0-32bit is &lt;1.22.0-lp155.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942819" version="1" comment="libgstwebrtc-1_0-0-64bit is &lt;1.22.0-lp155.3.10.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942820" version="1" comment="libgstwebrtcnice-1_0-0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942821" version="1" comment="libgstwebrtcnice-1_0-0-32bit is &lt;1.22.0-lp155.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942822" version="1" comment="libgstwebrtcnice-1_0-0-64bit is &lt;1.22.0-lp155.3.10.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942823" version="1" comment="typelib-1_0-CudaGst-1_0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942824" version="1" comment="typelib-1_0-GstBadAudio-1_0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942825" version="1" comment="typelib-1_0-GstCodecs-1_0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942826" version="1" comment="typelib-1_0-GstCuda-1_0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942827" version="1" comment="typelib-1_0-GstInsertBin-1_0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942828" version="1" comment="typelib-1_0-GstMpegts-1_0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942829" version="1" comment="typelib-1_0-GstPlay-1_0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942830" version="1" comment="typelib-1_0-GstPlayer-1_0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942831" version="1" comment="typelib-1_0-GstTranscoder-1_0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942832" version="1" comment="typelib-1_0-GstVa-1_0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942833" version="1" comment="typelib-1_0-GstVulkan-1_0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942834" version="1" comment="typelib-1_0-GstVulkanWayland-1_0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942835" version="1" comment="typelib-1_0-GstVulkanXCB-1_0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942836" version="1" comment="typelib-1_0-GstWebRTC-1_0 is &lt;1.22.0-lp155.3.10.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943443" version="1" comment="gstreamer-plugins-bad is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943444" version="1" comment="gstreamer-plugins-bad-32bit is &lt;1.22.0-lp155.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943445" version="1" comment="gstreamer-plugins-bad-64bit is &lt;1.22.0-lp155.3.14.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943446" version="1" comment="gstreamer-plugins-bad-chromaprint is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943447" version="1" comment="gstreamer-plugins-bad-chromaprint-32bit is &lt;1.22.0-lp155.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943448" version="1" comment="gstreamer-plugins-bad-chromaprint-64bit is &lt;1.22.0-lp155.3.14.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943449" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943450" version="1" comment="gstreamer-plugins-bad-fluidsynth is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943451" version="1" comment="gstreamer-plugins-bad-fluidsynth-32bit is &lt;1.22.0-lp155.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943452" version="1" comment="gstreamer-plugins-bad-fluidsynth-64bit is &lt;1.22.0-lp155.3.14.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943453" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.22.0-lp155.3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943454" version="1" comment="gstreamer-transcoder is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943455" version="1" comment="gstreamer-transcoder-devel is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943456" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943457" version="1" comment="libgstadaptivedemux-1_0-0-32bit is &lt;1.22.0-lp155.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943458" version="1" comment="libgstadaptivedemux-1_0-0-64bit is &lt;1.22.0-lp155.3.14.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943459" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943460" version="1" comment="libgstbadaudio-1_0-0-32bit is &lt;1.22.0-lp155.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943461" version="1" comment="libgstbadaudio-1_0-0-64bit is &lt;1.22.0-lp155.3.14.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943462" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943463" version="1" comment="libgstbasecamerabinsrc-1_0-0-32bit is &lt;1.22.0-lp155.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943464" version="1" comment="libgstbasecamerabinsrc-1_0-0-64bit is &lt;1.22.0-lp155.3.14.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943465" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943466" version="1" comment="libgstcodecparsers-1_0-0-32bit is &lt;1.22.0-lp155.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943467" version="1" comment="libgstcodecparsers-1_0-0-64bit is &lt;1.22.0-lp155.3.14.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943468" version="1" comment="libgstcodecs-1_0-0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943469" version="1" comment="libgstcodecs-1_0-0-32bit is &lt;1.22.0-lp155.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943470" version="1" comment="libgstcodecs-1_0-0-64bit is &lt;1.22.0-lp155.3.14.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943471" version="1" comment="libgstcuda-1_0-0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943472" version="1" comment="libgstcuda-1_0-0-32bit is &lt;1.22.0-lp155.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943473" version="1" comment="libgstcuda-1_0-0-64bit is &lt;1.22.0-lp155.3.14.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943474" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943475" version="1" comment="libgstinsertbin-1_0-0-32bit is &lt;1.22.0-lp155.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943476" version="1" comment="libgstinsertbin-1_0-0-64bit is &lt;1.22.0-lp155.3.14.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943477" version="1" comment="libgstisoff-1_0-0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943478" version="1" comment="libgstisoff-1_0-0-32bit is &lt;1.22.0-lp155.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943479" version="1" comment="libgstisoff-1_0-0-64bit is &lt;1.22.0-lp155.3.14.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943480" version="1" comment="libgstmpegts-1_0-0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943481" version="1" comment="libgstmpegts-1_0-0-32bit is &lt;1.22.0-lp155.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943482" version="1" comment="libgstmpegts-1_0-0-64bit is &lt;1.22.0-lp155.3.14.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943483" version="1" comment="libgstphotography-1_0-0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943484" version="1" comment="libgstphotography-1_0-0-32bit is &lt;1.22.0-lp155.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943485" version="1" comment="libgstphotography-1_0-0-64bit is &lt;1.22.0-lp155.3.14.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943486" version="1" comment="libgstplay-1_0-0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943487" version="1" comment="libgstplay-1_0-0-32bit is &lt;1.22.0-lp155.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943488" version="1" comment="libgstplay-1_0-0-64bit is &lt;1.22.0-lp155.3.14.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943489" version="1" comment="libgstplayer-1_0-0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943490" version="1" comment="libgstplayer-1_0-0-32bit is &lt;1.22.0-lp155.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943491" version="1" comment="libgstplayer-1_0-0-64bit is &lt;1.22.0-lp155.3.14.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943492" version="1" comment="libgstsctp-1_0-0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943493" version="1" comment="libgstsctp-1_0-0-32bit is &lt;1.22.0-lp155.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943494" version="1" comment="libgstsctp-1_0-0-64bit is &lt;1.22.0-lp155.3.14.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943495" version="1" comment="libgsttranscoder-1_0-0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943496" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943497" version="1" comment="libgsturidownloader-1_0-0-32bit is &lt;1.22.0-lp155.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943498" version="1" comment="libgsturidownloader-1_0-0-64bit is &lt;1.22.0-lp155.3.14.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943499" version="1" comment="libgstva-1_0-0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943500" version="1" comment="libgstva-1_0-0-32bit is &lt;1.22.0-lp155.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943501" version="1" comment="libgstva-1_0-0-64bit is &lt;1.22.0-lp155.3.14.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943502" version="1" comment="libgstvulkan-1_0-0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943503" version="1" comment="libgstvulkan-1_0-0-32bit is &lt;1.22.0-lp155.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943504" version="1" comment="libgstvulkan-1_0-0-64bit is &lt;1.22.0-lp155.3.14.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943505" version="1" comment="libgstwayland-1_0-0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943506" version="1" comment="libgstwayland-1_0-0-32bit is &lt;1.22.0-lp155.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943507" version="1" comment="libgstwayland-1_0-0-64bit is &lt;1.22.0-lp155.3.14.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943508" version="1" comment="libgstwebrtc-1_0-0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943509" version="1" comment="libgstwebrtc-1_0-0-32bit is &lt;1.22.0-lp155.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943510" version="1" comment="libgstwebrtc-1_0-0-64bit is &lt;1.22.0-lp155.3.14.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943511" version="1" comment="libgstwebrtcnice-1_0-0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943512" version="1" comment="libgstwebrtcnice-1_0-0-32bit is &lt;1.22.0-lp155.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943513" version="1" comment="libgstwebrtcnice-1_0-0-64bit is &lt;1.22.0-lp155.3.14.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943514" version="1" comment="typelib-1_0-CudaGst-1_0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943515" version="1" comment="typelib-1_0-GstBadAudio-1_0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943516" version="1" comment="typelib-1_0-GstCodecs-1_0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943517" version="1" comment="typelib-1_0-GstCuda-1_0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943518" version="1" comment="typelib-1_0-GstInsertBin-1_0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943519" version="1" comment="typelib-1_0-GstMpegts-1_0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943520" version="1" comment="typelib-1_0-GstPlay-1_0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943521" version="1" comment="typelib-1_0-GstPlayer-1_0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943522" version="1" comment="typelib-1_0-GstTranscoder-1_0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943523" version="1" comment="typelib-1_0-GstVa-1_0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943524" version="1" comment="typelib-1_0-GstVulkan-1_0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943525" version="1" comment="typelib-1_0-GstVulkanWayland-1_0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943526" version="1" comment="typelib-1_0-GstVulkanXCB-1_0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943527" version="1" comment="typelib-1_0-GstWebRTC-1_0 is &lt;1.22.0-lp155.3.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844296" version="1" comment="cacti is &lt;1.2.26-bp155.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844297" version="1" comment="cacti-spine is &lt;1.2.26-bp155.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944462" version="1" comment="chromedriver is &lt;129.0.6668.58-bp155.2.117.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944463" version="1" comment="chromium is &lt;129.0.6668.58-bp155.2.117.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945286" version="1" comment="chromedriver is &lt;129.0.6668.70-bp155.2.120.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945287" version="1" comment="chromium is &lt;129.0.6668.70-bp155.2.120.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945820" version="1" comment="opera is &lt;114.0.5282.21-lp156.2.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945821" version="1" comment="chromedriver is &lt;129.0.6668.89-bp156.2.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945822" version="1" comment="chromium is &lt;129.0.6668.89-bp156.2.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946149" version="1" comment="roundcubemail is &lt;1.6.8-bp156.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844298" version="1" comment="opera is &lt;106.0.4998.52-lp155.3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947251" version="1" comment="ntpd-rs is &lt;1.2.3-bp155.2.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947252" version="1" comment="ntpd-rs-common is &lt;1.2.3-bp155.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947345" version="1" comment="chromedriver is &lt;129.0.6668.100-bp156.2.38.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947346" version="1" comment="chromium is &lt;129.0.6668.100-bp156.2.38.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947912" version="1" comment="chromedriver is &lt;130.0.6723.58-bp156.2.41.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947913" version="1" comment="chromium is &lt;130.0.6723.58-bp156.2.41.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948598" version="1" comment="chromedriver is &lt;130.0.6723.69-bp156.2.44.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948599" version="1" comment="chromium is &lt;130.0.6723.69-bp156.2.44.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948667" version="1" comment="liblxc-devel is &lt;6.0.2-bp156.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948668" version="1" comment="liblxc1 is &lt;6.0.2-bp156.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948669" version="1" comment="lxc is &lt;6.0.2-bp156.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948670" version="1" comment="lxc-bash-completion is &lt;6.0.2-bp156.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948671" version="1" comment="lxc-ja-doc is &lt;6.0.2-bp156.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948672" version="1" comment="lxc-ko-doc is &lt;6.0.2-bp156.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948673" version="1" comment="pam_cgfs is &lt;6.0.2-bp156.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948674" version="1" comment="Botan is &lt;2.19.5-bp156.3.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948675" version="1" comment="Botan-doc is &lt;2.19.5-bp156.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948676" version="1" comment="libbotan-2-19 is &lt;2.19.5-bp156.3.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948677" version="1" comment="libbotan-2-19-32bit is &lt;2.19.5-bp156.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948678" version="1" comment="libbotan-2-19-64bit is &lt;2.19.5-bp156.3.6.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948679" version="1" comment="libbotan-devel is &lt;2.19.5-bp156.3.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948680" version="1" comment="libbotan-devel-32bit is &lt;2.19.5-bp156.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948681" version="1" comment="libbotan-devel-64bit is &lt;2.19.5-bp156.3.6.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948682" version="1" comment="python3-botan is &lt;2.19.5-bp156.3.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950796" version="1" comment="xsd is &lt;4.1.0-bp156.5.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950797" version="1" comment="xsd-doc is &lt;4.1.0-bp156.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950798" version="1" comment="libmosquitto1 is &lt;2.0.20-bp156.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950799" version="1" comment="libmosquittopp1 is &lt;2.0.20-bp156.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950800" version="1" comment="mosquitto is &lt;2.0.20-bp156.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950801" version="1" comment="mosquitto-clients is &lt;2.0.20-bp156.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950802" version="1" comment="mosquitto-devel is &lt;2.0.20-bp156.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950986" version="1" comment="chromedriver is &lt;130.0.6723.91-bp155.2.135.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950987" version="1" comment="chromium is &lt;130.0.6723.91-bp155.2.135.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950988" version="1" comment="htmldoc is &lt;1.9.16-bp155.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951068" version="1" comment="python3-mysql-connector-python is &lt;9.1.0-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951069" version="1" comment="jupyter-jupyterlab is &lt;2.2.10-bp156.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951070" version="1" comment="python3-jupyterlab is &lt;2.2.10-bp156.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951071" version="1" comment="kmail-account-wizard is &lt;23.08.5-bp156.2.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951072" version="1" comment="kmail-account-wizard-lang is &lt;23.08.5-bp156.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951426" version="1" comment="chromedriver is &lt;130.0.6723.116-bp155.2.138.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951427" version="1" comment="chromium is &lt;130.0.6723.116-bp155.2.138.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844808" version="1" comment="tinyssh is &lt;20240101-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951976" version="1" comment="python3-PyPDF2 is &lt;1.26.0-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844809" version="1" comment="libmbedcrypto7 is &lt;2.28.7-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844810" version="1" comment="libmbedcrypto7-32bit is &lt;2.28.7-bp155.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844811" version="1" comment="libmbedcrypto7-64bit is &lt;2.28.7-bp155.2.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844812" version="1" comment="libmbedtls14 is &lt;2.28.7-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844813" version="1" comment="libmbedtls14-32bit is &lt;2.28.7-bp155.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844814" version="1" comment="libmbedtls14-64bit is &lt;2.28.7-bp155.2.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844815" version="1" comment="libmbedx509-1 is &lt;2.28.7-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844816" version="1" comment="libmbedx509-1-32bit is &lt;2.28.7-bp155.2.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844817" version="1" comment="libmbedx509-1-64bit is &lt;2.28.7-bp155.2.3.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844818" version="1" comment="mbedtls-devel is &lt;2.28.7-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953978" version="1" comment="icinga2 is &lt;2.13.10-bp155.3.3.1 for aarch64,i586,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953979" version="1" comment="icinga2-bin is &lt;2.13.10-bp155.3.3.1 for aarch64,i586,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953980" version="1" comment="icinga2-common is &lt;2.13.10-bp155.3.3.1 for aarch64,i586,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953981" version="1" comment="icinga2-doc is &lt;2.13.10-bp155.3.3.1 for aarch64,i586,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953982" version="1" comment="icinga2-ido-mysql is &lt;2.13.10-bp155.3.3.1 for aarch64,i586,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953983" version="1" comment="icinga2-ido-pgsql is &lt;2.13.10-bp155.3.3.1 for aarch64,i586,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953984" version="1" comment="nano-icinga2 is &lt;2.13.10-bp155.3.3.1 for aarch64,i586,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953985" version="1" comment="vim-icinga2 is &lt;2.13.10-bp155.3.3.1 for aarch64,i586,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954020" version="1" comment="chromedriver is &lt;131.0.6778.69-bp155.2.141.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954021" version="1" comment="chromium is &lt;131.0.6778.69-bp155.2.141.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954747" version="1" comment="chromedriver is &lt;131.0.6778.85-bp155.2.144.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954748" version="1" comment="chromium is &lt;131.0.6778.85-bp155.2.144.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955244" version="1" comment="seamonkey is &lt;2.53.19-bp155.2.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955245" version="1" comment="seamonkey-dom-inspector is &lt;2.53.19-bp155.2.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955246" version="1" comment="seamonkey-irc is &lt;2.53.19-bp155.2.23.1 for i586,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955247" version="1" comment="cobbler is &lt;3.3.7-bp155.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955248" version="1" comment="cobbler-tests is &lt;3.3.7-bp155.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955249" version="1" comment="cobbler-tests-containers is &lt;3.3.7-bp155.2.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956224" version="1" comment="opera is &lt;115.0.5322.68-lp156.2.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957150" version="1" comment="radare2 is &lt;5.9.8-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957151" version="1" comment="radare2-devel is &lt;5.9.8-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957152" version="1" comment="radare2-zsh-completion is &lt;5.9.8-bp155.2.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957153" version="1" comment="libQt6Pdf6 is &lt;6.4.2-bp155.2.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957154" version="1" comment="libQt6PdfQuick6 is &lt;6.4.2-bp155.2.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957155" version="1" comment="libQt6PdfWidgets6 is &lt;6.4.2-bp155.2.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957156" version="1" comment="libQt6WebEngineCore6 is &lt;6.4.2-bp155.2.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957157" version="1" comment="libQt6WebEngineQuick6 is &lt;6.4.2-bp155.2.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957158" version="1" comment="libQt6WebEngineWidgets6 is &lt;6.4.2-bp155.2.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957159" version="1" comment="qt6-pdf-devel is &lt;6.4.2-bp155.2.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957160" version="1" comment="qt6-pdf-imports is &lt;6.4.2-bp155.2.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957161" version="1" comment="qt6-pdf-private-devel is &lt;6.4.2-bp155.2.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957162" version="1" comment="qt6-pdfquick-devel is &lt;6.4.2-bp155.2.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957163" version="1" comment="qt6-pdfquick-private-devel is &lt;6.4.2-bp155.2.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957164" version="1" comment="qt6-pdfwidgets-devel is &lt;6.4.2-bp155.2.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957165" version="1" comment="qt6-pdfwidgets-private-devel is &lt;6.4.2-bp155.2.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957166" version="1" comment="qt6-webengine is &lt;6.4.2-bp155.2.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957167" version="1" comment="qt6-webengine-docs-html is &lt;6.4.2-bp155.2.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957168" version="1" comment="qt6-webengine-docs-qch is &lt;6.4.2-bp155.2.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957169" version="1" comment="qt6-webengine-examples is &lt;6.4.2-bp155.2.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957170" version="1" comment="qt6-webengine-imports is &lt;6.4.2-bp155.2.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957171" version="1" comment="qt6-webenginecore-devel is &lt;6.4.2-bp155.2.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957172" version="1" comment="qt6-webenginecore-private-devel is &lt;6.4.2-bp155.2.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957173" version="1" comment="qt6-webenginequick-devel is &lt;6.4.2-bp155.2.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957174" version="1" comment="qt6-webenginequick-private-devel is &lt;6.4.2-bp155.2.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957175" version="1" comment="qt6-webenginewidgets-devel is &lt;6.4.2-bp155.2.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957176" version="1" comment="qt6-webenginewidgets-private-devel is &lt;6.4.2-bp155.2.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957538" version="1" comment="chromedriver is &lt;131.0.6778.108-bp155.2.147.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957539" version="1" comment="chromium is &lt;131.0.6778.108-bp155.2.147.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958159" version="1" comment="chromedriver is &lt;131.0.6778.139-bp156.2.62.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958160" version="1" comment="chromium is &lt;131.0.6778.139-bp156.2.62.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958730" version="1" comment="python3-python-sql is &lt;1.5.1-bp155.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958731" version="1" comment="python311-python-sql is &lt;1.5.1-bp155.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958732" version="1" comment="python3-xhtml2pdf is &lt;0.2.4-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958944" version="1" comment="chromedriver is &lt;131.0.6778.204-bp156.2.65.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958945" version="1" comment="chromium is &lt;131.0.6778.204-bp156.2.65.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846380" version="1" comment="hugin is &lt;2023.0.0-bp155.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846381" version="1" comment="pdns-recursor is &lt;4.8.6-bp155.2.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846382" version="1" comment="bitcoin-qt5 is &lt;26.0-bp155.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846383" version="1" comment="bitcoin-test is &lt;26.0-bp155.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846384" version="1" comment="bitcoin-utils is &lt;26.0-bp155.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846385" version="1" comment="bitcoind is &lt;26.0-bp155.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846386" version="1" comment="libbitcoinconsensus-devel is &lt;26.0-bp155.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846387" version="1" comment="libbitcoinconsensus0 is &lt;26.0-bp155.2.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847369" version="1" comment="opera is &lt;107.0.5045.21-lp155.3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847484" version="1" comment="syncthing is &lt;1.27.3-bp155.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847485" version="1" comment="syncthing-relaysrv is &lt;1.27.3-bp155.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849712" version="1" comment="zabbix-agent is &lt;4.0.50-bp155.3.12.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849713" version="1" comment="zabbix-java-gateway is &lt;4.0.50-bp155.3.12.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849714" version="1" comment="zabbix-phpfrontend is &lt;4.0.50-bp155.3.12.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849715" version="1" comment="zabbix-proxy is &lt;4.0.50-bp155.3.12.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849716" version="1" comment="zabbix-proxy-mysql is &lt;4.0.50-bp155.3.12.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849717" version="1" comment="zabbix-proxy-postgresql is &lt;4.0.50-bp155.3.12.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849718" version="1" comment="zabbix-proxy-sqlite is &lt;4.0.50-bp155.3.12.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849719" version="1" comment="zabbix-server is &lt;4.0.50-bp155.3.12.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849720" version="1" comment="zabbix-server-mysql is &lt;4.0.50-bp155.3.12.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849721" version="1" comment="zabbix-server-postgresql is &lt;4.0.50-bp155.3.12.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818412" version="1" comment="exim is &lt;4.97.1-bp155.5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818413" version="1" comment="eximon is &lt;4.97.1-bp155.5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818414" version="1" comment="eximstats-html is &lt;4.97.1-bp155.5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818415" version="1" comment="proftpd is &lt;1.3.8b-bp155.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818416" version="1" comment="proftpd-devel is &lt;1.3.8b-bp155.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818417" version="1" comment="proftpd-doc is &lt;1.3.8b-bp155.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818418" version="1" comment="proftpd-lang is &lt;1.3.8b-bp155.2.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818419" version="1" comment="proftpd-ldap is &lt;1.3.8b-bp155.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818420" version="1" comment="proftpd-mysql is &lt;1.3.8b-bp155.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818421" version="1" comment="proftpd-pgsql is &lt;1.3.8b-bp155.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818422" version="1" comment="proftpd-radius is &lt;1.3.8b-bp155.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818423" version="1" comment="proftpd-sqlite is &lt;1.3.8b-bp155.2.6.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850420" version="1" comment="python3-Django1 is &lt;1.11.29-bp155.4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851425" version="1" comment="python3-rpyc is &lt;4.1.5-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851520" version="1" comment="chromedriver is &lt;122.0.6261.128-bp155.2.75.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851521" version="1" comment="chromium is &lt;122.0.6261.128-bp155.2.75.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851522" version="1" comment="clang17 is &lt;17.0.6-bp155.2.2 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851523" version="1" comment="clang17-devel is &lt;17.0.6-bp155.2.2 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851524" version="1" comment="clang17-doc is &lt;17.0.6-bp155.2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851525" version="1" comment="libLLVM17 is &lt;17.0.6-bp155.2.2 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851526" version="1" comment="libLLVM17-32bit is &lt;17.0.6-bp155.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851527" version="1" comment="libLLVM17-64bit is &lt;17.0.6-bp155.2.2 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851528" version="1" comment="libLTO17 is &lt;17.0.6-bp155.2.2 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851529" version="1" comment="libclang-cpp17 is &lt;17.0.6-bp155.2.2 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851530" version="1" comment="libclang-cpp17-32bit is &lt;17.0.6-bp155.2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851531" version="1" comment="libclang-cpp17-64bit is &lt;17.0.6-bp155.2.2 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851532" version="1" comment="liblldb17 is &lt;17.0.6-bp155.2.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851533" version="1" comment="libomp17-devel is &lt;17.0.6-bp155.2.2 for aarch64,i586,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851534" version="1" comment="lld17 is &lt;17.0.6-bp155.2.2 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851535" version="1" comment="lldb17 is &lt;17.0.6-bp155.2.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851536" version="1" comment="lldb17-devel is &lt;17.0.6-bp155.2.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851537" version="1" comment="llvm17 is &lt;17.0.6-bp155.2.2 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851538" version="1" comment="llvm17-devel is &lt;17.0.6-bp155.2.2 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851539" version="1" comment="llvm17-doc is &lt;17.0.6-bp155.2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851540" version="1" comment="llvm17-gold is &lt;17.0.6-bp155.2.2 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851541" version="1" comment="llvm17-libc++-devel is &lt;17.0.6-bp155.2.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851542" version="1" comment="llvm17-libc++1 is &lt;17.0.6-bp155.2.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851543" version="1" comment="llvm17-libc++abi-devel is &lt;17.0.6-bp155.2.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851544" version="1" comment="llvm17-libc++abi1 is &lt;17.0.6-bp155.2.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851545" version="1" comment="llvm17-libclang13 is &lt;17.0.6-bp155.2.2 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851546" version="1" comment="llvm17-opt-viewer is &lt;17.0.6-bp155.2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851547" version="1" comment="llvm17-polly is &lt;17.0.6-bp155.2.2 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851548" version="1" comment="llvm17-polly-devel is &lt;17.0.6-bp155.2.2 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851549" version="1" comment="llvm17-vim-plugins is &lt;17.0.6-bp155.2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851550" version="1" comment="python3-clang17 is &lt;17.0.6-bp155.2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851551" version="1" comment="python3-lldb17 is &lt;17.0.6-bp155.2.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852405" version="1" comment="minidlna is &lt;1.3.3-bp155.2.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852638" version="1" comment="kanidm is &lt;1.1.0~rc16~git6.e51d0de-bp155.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852639" version="1" comment="kanidm-clients is &lt;1.1.0~rc16~git6.e51d0de-bp155.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852640" version="1" comment="kanidm-docs is &lt;1.1.0~rc16~git6.e51d0de-bp155.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852641" version="1" comment="kanidm-server is &lt;1.1.0~rc16~git6.e51d0de-bp155.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852642" version="1" comment="kanidm-unixd-clients is &lt;1.1.0~rc16~git6.e51d0de-bp155.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852643" version="1" comment="opera is &lt;108.0.5067.40-lp155.3.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959148" version="1" comment="ruby2.5-rubygem-aes_key_wrap is &lt;1.1.0-bp155.2.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959149" version="1" comment="ruby2.5-rubygem-aes_key_wrap-doc is &lt;1.1.0-bp155.2.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959150" version="1" comment="ruby2.5-rubygem-json-jwt is &lt;1.16.6-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959151" version="1" comment="ruby2.5-rubygem-json-jwt-doc is &lt;1.16.6-bp155.3.3.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959152" version="1" comment="python311-django-ckeditor is &lt;6.7.2-bp155.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717344" version="1" comment="net-snmp is &lt;5.9.3-150300.15.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717345" version="1" comment="net-snmp-devel is &lt;5.9.3-150300.15.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717468" version="1" comment="net-snmp-devel-32bit is &lt;5.9.3-150300.15.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717346" version="1" comment="perl-SNMP is &lt;5.9.3-150300.15.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717469" version="1" comment="python3-net-snmp is &lt;5.9.3-150300.15.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717347" version="1" comment="snmp-mibs is &lt;5.9.3-150300.15.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755110" version="1" comment="netty is &lt;4.1.90-150200.4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755111" version="1" comment="netty-javadoc is &lt;4.1.90-150200.4.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755112" version="1" comment="netty-poms is &lt;4.1.90-150200.4.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755113" version="1" comment="netty-tcnative is &lt;2.0.59-150200.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755114" version="1" comment="netty-tcnative-javadoc is &lt;2.0.59-150200.3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757067" version="1" comment="gdk-pixbuf-loader-libheif is &lt;1.12.0-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757068" version="1" comment="libheif-devel is &lt;1.12.0-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757069" version="1" comment="libheif1 is &lt;1.12.0-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757070" version="1" comment="libheif1-32bit is &lt;1.12.0-150400.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758942" version="1" comment="curl is &lt;8.0.1-150400.5.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758943" version="1" comment="libcurl-devel is &lt;8.0.1-150400.5.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758944" version="1" comment="libcurl-devel-32bit is &lt;8.0.1-150400.5.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758945" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758946" version="1" comment="libcurl4-32bit is &lt;8.0.1-150400.5.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758947" version="1" comment="cups-filters is &lt;1.25.0-150200.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758948" version="1" comment="cups-filters-devel is &lt;1.25.0-150200.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756453" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.372-150000.3.79.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756454" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.372-150000.3.79.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756455" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.372-150000.3.79.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756456" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.372-150000.3.79.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756457" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.372-150000.3.79.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756458" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.372-150000.3.79.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756459" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.372-150000.3.79.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758961" version="1" comment="ucode-intel is &lt;20230512-150200.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758962" version="1" comment="libopenvswitch-2_14-0 is &lt;2.14.2-150400.24.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758963" version="1" comment="libovn-20_06-0 is &lt;20.06.2-150400.24.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758964" version="1" comment="openvswitch is &lt;2.14.2-150400.24.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758965" version="1" comment="openvswitch-devel is &lt;2.14.2-150400.24.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758966" version="1" comment="openvswitch-doc is &lt;2.14.2-150400.24.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758967" version="1" comment="openvswitch-ipsec is &lt;2.14.2-150400.24.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758968" version="1" comment="openvswitch-pki is &lt;2.14.2-150400.24.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758969" version="1" comment="openvswitch-test is &lt;2.14.2-150400.24.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758970" version="1" comment="openvswitch-vtep is &lt;2.14.2-150400.24.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758971" version="1" comment="ovn is &lt;20.06.2-150400.24.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758972" version="1" comment="ovn-central is &lt;20.06.2-150400.24.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758973" version="1" comment="ovn-devel is &lt;20.06.2-150400.24.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758974" version="1" comment="ovn-doc is &lt;20.06.2-150400.24.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758975" version="1" comment="ovn-docker is &lt;20.06.2-150400.24.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758976" version="1" comment="ovn-host is &lt;20.06.2-150400.24.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758977" version="1" comment="ovn-vtep is &lt;20.06.2-150400.24.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758978" version="1" comment="python3-ovs is &lt;2.14.2-150400.24.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757058" version="1" comment="terraform-provider-aws is &lt;3.11.0-150200.6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757059" version="1" comment="terraform-provider-null is &lt;3.0.0-150200.6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757420" version="1" comment="python3-Flask is &lt;1.0.4-150400.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757421" version="1" comment="python3-Flask-doc is &lt;1.0.4-150400.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757060" version="1" comment="geoipupdate is &lt;4.2.2-150000.1.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757061" version="1" comment="geoipupdate-legacy is &lt;4.2.2-150000.1.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758258" version="1" comment="libkpathsea6 is &lt;6.3.3-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758259" version="1" comment="libptexenc1 is &lt;1.3.9-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758260" version="1" comment="libsynctex2 is &lt;1.21-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758261" version="1" comment="libtexlua53-5 is &lt;5.3.6-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758262" version="1" comment="libtexluajit2 is &lt;2.1.0beta3-150400.31.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758263" version="1" comment="perl-biber is &lt;2021.20210325.svn30357-150400.31.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758264" version="1" comment="texlive is &lt;2021.20210325-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758265" version="1" comment="texlive-a2ping-bin is &lt;2021.20210325.svn27321-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758266" version="1" comment="texlive-accfonts-bin is &lt;2021.20210325.svn12688-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758267" version="1" comment="texlive-adhocfilelist-bin is &lt;2021.20210325.svn28038-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758268" version="1" comment="texlive-afm2pl-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758269" version="1" comment="texlive-albatross-bin is &lt;2021.20210325.svn57089-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758270" version="1" comment="texlive-aleph-bin is &lt;2021.20210325.svn58378-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758271" version="1" comment="texlive-amstex-bin is &lt;2021.20210325.svn3006-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758272" version="1" comment="texlive-arara-bin is &lt;2021.20210325.svn29036-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758273" version="1" comment="texlive-asymptote-bin is &lt;2021.20210325.svn57890-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758274" version="1" comment="texlive-attachfile2-bin is &lt;2021.20210325.svn52909-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758275" version="1" comment="texlive-authorindex-bin is &lt;2021.20210325.svn18790-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758276" version="1" comment="texlive-autosp-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758277" version="1" comment="texlive-axodraw2-bin is &lt;2021.20210325.svn58378-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758278" version="1" comment="texlive-bib2gls-bin is &lt;2021.20210325.svn45266-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758279" version="1" comment="texlive-biber-bin is &lt;2021.20210325.svn57273-150400.31.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758280" version="1" comment="texlive-bibexport-bin is &lt;2021.20210325.svn16219-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758281" version="1" comment="texlive-bibtex-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758282" version="1" comment="texlive-bibtex8-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758283" version="1" comment="texlive-bibtexu-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758284" version="1" comment="texlive-bin-devel is &lt;2021.20210325-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758285" version="1" comment="texlive-bundledoc-bin is &lt;2021.20210325.svn17794-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758286" version="1" comment="texlive-cachepic-bin is &lt;2021.20210325.svn15543-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758287" version="1" comment="texlive-checkcites-bin is &lt;2021.20210325.svn25623-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758288" version="1" comment="texlive-checklistings-bin is &lt;2021.20210325.svn38300-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758289" version="1" comment="texlive-chklref-bin is &lt;2021.20210325.svn52631-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758290" version="1" comment="texlive-chktex-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758291" version="1" comment="texlive-cjk-gs-integrate-bin is &lt;2021.20210325.svn37223-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758292" version="1" comment="texlive-cjkutils-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758293" version="1" comment="texlive-clojure-pamphlet-bin is &lt;2021.20210325.svn51944-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758294" version="1" comment="texlive-cluttex-bin is &lt;2021.20210325.svn48871-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758295" version="1" comment="texlive-context-bin is &lt;2021.20210325.svn34112-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758296" version="1" comment="texlive-convbkmk-bin is &lt;2021.20210325.svn30408-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758297" version="1" comment="texlive-crossrefware-bin is &lt;2021.20210325.svn45927-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758298" version="1" comment="texlive-cslatex-bin is &lt;2021.20210325.svn3006-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758299" version="1" comment="texlive-csplain-bin is &lt;2021.20210325.svn50528-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758300" version="1" comment="texlive-ctan-o-mat-bin is &lt;2021.20210325.svn46996-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758301" version="1" comment="texlive-ctanbib-bin is &lt;2021.20210325.svn48478-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758302" version="1" comment="texlive-ctanify-bin is &lt;2021.20210325.svn24061-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758303" version="1" comment="texlive-ctanupload-bin is &lt;2021.20210325.svn23866-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758304" version="1" comment="texlive-ctie-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758305" version="1" comment="texlive-cweb-bin is &lt;2021.20210325.svn58136-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758306" version="1" comment="texlive-cyrillic-bin-bin is &lt;2021.20210325.svn53554-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758307" version="1" comment="texlive-de-macro-bin is &lt;2021.20210325.svn17399-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758308" version="1" comment="texlive-detex-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758309" version="1" comment="texlive-diadia-bin is &lt;2021.20210325.svn37645-150400.31.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758310" version="1" comment="texlive-dosepsbin-bin is &lt;2021.20210325.svn24759-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758311" version="1" comment="texlive-dtl-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758312" version="1" comment="texlive-dtxgen-bin is &lt;2021.20210325.svn29031-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758313" version="1" comment="texlive-dviasm-bin is &lt;2021.20210325.svn8329-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758314" version="1" comment="texlive-dvicopy-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758315" version="1" comment="texlive-dvidvi-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758316" version="1" comment="texlive-dviinfox-bin is &lt;2021.20210325.svn44515-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758317" version="1" comment="texlive-dviljk-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758318" version="1" comment="texlive-dviout-util-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758319" version="1" comment="texlive-dvipdfmx-bin is &lt;2021.20210325.svn58535-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758320" version="1" comment="texlive-dvipng-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758321" version="1" comment="texlive-dvipos-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758322" version="1" comment="texlive-dvips-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758323" version="1" comment="texlive-dvisvgm-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758324" version="1" comment="texlive-eplain-bin is &lt;2021.20210325.svn3006-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758325" version="1" comment="texlive-epspdf-bin is &lt;2021.20210325.svn29050-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758326" version="1" comment="texlive-epstopdf-bin is &lt;2021.20210325.svn18336-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758327" version="1" comment="texlive-exceltex-bin is &lt;2021.20210325.svn25860-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758328" version="1" comment="texlive-fig4latex-bin is &lt;2021.20210325.svn14752-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758329" version="1" comment="texlive-findhyph-bin is &lt;2021.20210325.svn14758-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758330" version="1" comment="texlive-fontinst-bin is &lt;2021.20210325.svn53554-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758331" version="1" comment="texlive-fontools-bin is &lt;2021.20210325.svn25997-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758332" version="1" comment="texlive-fontware-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758333" version="1" comment="texlive-fragmaster-bin is &lt;2021.20210325.svn13663-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758334" version="1" comment="texlive-getmap-bin is &lt;2021.20210325.svn34971-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758335" version="1" comment="texlive-git-latexdiff-bin is &lt;2021.20210325.svn54732-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758336" version="1" comment="texlive-glossaries-bin is &lt;2021.20210325.svn37813-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758337" version="1" comment="texlive-gregoriotex-bin is &lt;2021.20210325.svn58378-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758338" version="1" comment="texlive-gsftopk-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758339" version="1" comment="texlive-hyperxmp-bin is &lt;2021.20210325.svn56984-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758340" version="1" comment="texlive-jadetex-bin is &lt;2021.20210325.svn3006-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758341" version="1" comment="texlive-jfmutil-bin is &lt;2021.20210325.svn44835-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758342" version="1" comment="texlive-ketcindy-bin is &lt;2021.20210325.svn49033-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758343" version="1" comment="texlive-kotex-utils-bin is &lt;2021.20210325.svn32101-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758344" version="1" comment="texlive-kpathsea-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758345" version="1" comment="texlive-kpathsea-devel is &lt;6.3.3-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758346" version="1" comment="texlive-l3build-bin is &lt;2021.20210325.svn46894-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758347" version="1" comment="texlive-lacheck-bin is &lt;2021.20210325.svn53999-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758348" version="1" comment="texlive-latex-bin-bin is &lt;2021.20210325.svn54358-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758349" version="1" comment="texlive-latex-bin-dev-bin is &lt;2021.20210325.svn53999-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758350" version="1" comment="texlive-latex-git-log-bin is &lt;2021.20210325.svn30983-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758351" version="1" comment="texlive-latex-papersize-bin is &lt;2021.20210325.svn42296-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758352" version="1" comment="texlive-latex2man-bin is &lt;2021.20210325.svn13663-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758353" version="1" comment="texlive-latex2nemeth-bin is &lt;2021.20210325.svn42300-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758354" version="1" comment="texlive-latexdiff-bin is &lt;2021.20210325.svn16420-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758355" version="1" comment="texlive-latexfileversion-bin is &lt;2021.20210325.svn25012-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758356" version="1" comment="texlive-latexindent-bin is &lt;2021.20210325.svn32150-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758357" version="1" comment="texlive-latexmk-bin is &lt;2021.20210325.svn10937-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758358" version="1" comment="texlive-latexpand-bin is &lt;2021.20210325.svn27025-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758359" version="1" comment="texlive-lcdftypetools-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758360" version="1" comment="texlive-light-latex-make-bin is &lt;2021.20210325.svn56352-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758361" version="1" comment="texlive-lilyglyphs-bin is &lt;2021.20210325.svn31696-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758362" version="1" comment="texlive-listbib-bin is &lt;2021.20210325.svn26126-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758363" version="1" comment="texlive-listings-ext-bin is &lt;2021.20210325.svn15093-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758364" version="1" comment="texlive-lollipop-bin is &lt;2021.20210325.svn41465-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758365" version="1" comment="texlive-ltxfileinfo-bin is &lt;2021.20210325.svn29005-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758366" version="1" comment="texlive-ltximg-bin is &lt;2021.20210325.svn32346-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758367" version="1" comment="texlive-luahbtex-bin is &lt;2021.20210325.svn58535-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758368" version="1" comment="texlive-luajittex-bin is &lt;2021.20210325.svn58535-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758369" version="1" comment="texlive-luaotfload-bin is &lt;2021.20210325.svn34647-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758370" version="1" comment="texlive-luatex-bin is &lt;2021.20210325.svn58535-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758371" version="1" comment="texlive-lwarp-bin is &lt;2021.20210325.svn43292-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758372" version="1" comment="texlive-m-tx-bin is &lt;2021.20210325.svn50281-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758373" version="1" comment="texlive-make4ht-bin is &lt;2021.20210325.svn37750-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758374" version="1" comment="texlive-makedtx-bin is &lt;2021.20210325.svn38769-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758375" version="1" comment="texlive-makeindex-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758376" version="1" comment="texlive-match_parens-bin is &lt;2021.20210325.svn23500-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758377" version="1" comment="texlive-mathspic-bin is &lt;2021.20210325.svn23661-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758378" version="1" comment="texlive-metafont-bin is &lt;2021.20210325.svn58378-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758379" version="1" comment="texlive-metapost-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758380" version="1" comment="texlive-mex-bin is &lt;2021.20210325.svn3006-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758381" version="1" comment="texlive-mf2pt1-bin is &lt;2021.20210325.svn23406-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758382" version="1" comment="texlive-mflua-bin is &lt;2021.20210325.svn58535-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758383" version="1" comment="texlive-mfware-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758384" version="1" comment="texlive-mkgrkindex-bin is &lt;2021.20210325.svn14428-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758385" version="1" comment="texlive-mkjobtexmf-bin is &lt;2021.20210325.svn8457-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758386" version="1" comment="texlive-mkpic-bin is &lt;2021.20210325.svn33688-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758387" version="1" comment="texlive-mltex-bin is &lt;2021.20210325.svn3006-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758388" version="1" comment="texlive-mptopdf-bin is &lt;2021.20210325.svn18674-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758389" version="1" comment="texlive-multibibliography-bin is &lt;2021.20210325.svn30534-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758390" version="1" comment="texlive-musixtex-bin is &lt;2021.20210325.svn37026-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758391" version="1" comment="texlive-musixtnt-bin is &lt;2021.20210325.svn50281-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758392" version="1" comment="texlive-omegaware-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758393" version="1" comment="texlive-optex-bin is &lt;2021.20210325.svn53804-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758394" version="1" comment="texlive-patgen-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758395" version="1" comment="texlive-pax-bin is &lt;2021.20210325.svn10843-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758396" version="1" comment="texlive-pdfbook2-bin is &lt;2021.20210325.svn37537-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758397" version="1" comment="texlive-pdfcrop-bin is &lt;2021.20210325.svn14387-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758398" version="1" comment="texlive-pdfjam-bin is &lt;2021.20210325.svn52858-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758399" version="1" comment="texlive-pdflatexpicscale-bin is &lt;2021.20210325.svn41779-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758400" version="1" comment="texlive-pdftex-bin is &lt;2021.20210325.svn58535-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758401" version="1" comment="texlive-pdftex-quiet-bin is &lt;2021.20210325.svn49140-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758402" version="1" comment="texlive-pdftosrc-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758403" version="1" comment="texlive-pdfxup-bin is &lt;2021.20210325.svn40690-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758404" version="1" comment="texlive-pedigree-perl-bin is &lt;2021.20210325.svn25962-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758405" version="1" comment="texlive-perltex-bin is &lt;2021.20210325.svn16181-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758406" version="1" comment="texlive-petri-nets-bin is &lt;2021.20210325.svn39165-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758407" version="1" comment="texlive-pfarrei-bin is &lt;2021.20210325.svn29348-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758408" version="1" comment="texlive-pkfix-bin is &lt;2021.20210325.svn13364-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758409" version="1" comment="texlive-pkfix-helper-bin is &lt;2021.20210325.svn13663-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758410" version="1" comment="texlive-platex-bin is &lt;2021.20210325.svn52800-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758411" version="1" comment="texlive-pmx-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758412" version="1" comment="texlive-pmxchords-bin is &lt;2021.20210325.svn32405-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758413" version="1" comment="texlive-ps2eps-bin is &lt;2021.20210325.svn50281-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758414" version="1" comment="texlive-ps2pk-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758415" version="1" comment="texlive-pst-pdf-bin is &lt;2021.20210325.svn7838-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758416" version="1" comment="texlive-pst2pdf-bin is &lt;2021.20210325.svn29333-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758417" version="1" comment="texlive-ptex-bin is &lt;2021.20210325.svn58378-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758418" version="1" comment="texlive-ptex-fontmaps-bin is &lt;2021.20210325.svn44206-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758419" version="1" comment="texlive-ptex2pdf-bin is &lt;2021.20210325.svn29335-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758420" version="1" comment="texlive-ptexenc-devel is &lt;1.3.9-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758421" version="1" comment="texlive-purifyeps-bin is &lt;2021.20210325.svn13663-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758422" version="1" comment="texlive-pygmentex-bin is &lt;2021.20210325.svn34996-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758423" version="1" comment="texlive-pythontex-bin is &lt;2021.20210325.svn31638-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758424" version="1" comment="texlive-rubik-bin is &lt;2021.20210325.svn32919-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758425" version="1" comment="texlive-scripts-bin is &lt;2021.20210325.svn55172-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758426" version="1" comment="texlive-scripts-extra-bin is &lt;2021.20210325.svn53577-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758427" version="1" comment="texlive-seetexk-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758428" version="1" comment="texlive-spix-bin is &lt;2021.20210325.svn55933-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758429" version="1" comment="texlive-splitindex-bin is &lt;2021.20210325.svn29688-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758430" version="1" comment="texlive-srcredact-bin is &lt;2021.20210325.svn38710-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758431" version="1" comment="texlive-sty2dtx-bin is &lt;2021.20210325.svn21215-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758432" version="1" comment="texlive-svn-multi-bin is &lt;2021.20210325.svn13663-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758433" version="1" comment="texlive-synctex-bin is &lt;2021.20210325.svn58136-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758434" version="1" comment="texlive-synctex-devel is &lt;1.21-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758435" version="1" comment="texlive-tex-bin is &lt;2021.20210325.svn58378-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758436" version="1" comment="texlive-tex4ebook-bin is &lt;2021.20210325.svn37771-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758437" version="1" comment="texlive-tex4ht-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758438" version="1" comment="texlive-texcount-bin is &lt;2021.20210325.svn13013-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758439" version="1" comment="texlive-texdef-bin is &lt;2021.20210325.svn45011-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758440" version="1" comment="texlive-texdiff-bin is &lt;2021.20210325.svn15506-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758441" version="1" comment="texlive-texdirflatten-bin is &lt;2021.20210325.svn12782-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758442" version="1" comment="texlive-texdoc-bin is &lt;2021.20210325.svn47948-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758443" version="1" comment="texlive-texdoctk-bin is &lt;2021.20210325.svn29741-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758444" version="1" comment="texlive-texfot-bin is &lt;2021.20210325.svn33155-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758445" version="1" comment="texlive-texliveonfly-bin is &lt;2021.20210325.svn24062-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758446" version="1" comment="texlive-texloganalyser-bin is &lt;2021.20210325.svn13663-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758447" version="1" comment="texlive-texlua-devel is &lt;5.3.6-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758448" version="1" comment="texlive-texluajit-devel is &lt;2.1.0beta3-150400.31.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758449" version="1" comment="texlive-texosquery-bin is &lt;2021.20210325.svn43596-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758450" version="1" comment="texlive-texplate-bin is &lt;2021.20210325.svn53444-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758451" version="1" comment="texlive-texsis-bin is &lt;2021.20210325.svn3006-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758452" version="1" comment="texlive-texware-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758453" version="1" comment="texlive-thumbpdf-bin is &lt;2021.20210325.svn6898-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758454" version="1" comment="texlive-tie-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758455" version="1" comment="texlive-tikztosvg-bin is &lt;2021.20210325.svn55132-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758456" version="1" comment="texlive-tpic2pdftex-bin is &lt;2021.20210325.svn50281-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758457" version="1" comment="texlive-ttfutils-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758458" version="1" comment="texlive-typeoutfileinfo-bin is &lt;2021.20210325.svn25648-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758459" version="1" comment="texlive-ulqda-bin is &lt;2021.20210325.svn13663-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758460" version="1" comment="texlive-uplatex-bin is &lt;2021.20210325.svn52800-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758461" version="1" comment="texlive-uptex-bin is &lt;2021.20210325.svn58378-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758462" version="1" comment="texlive-urlbst-bin is &lt;2021.20210325.svn23262-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758463" version="1" comment="texlive-velthuis-bin is &lt;2021.20210325.svn50281-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758464" version="1" comment="texlive-vlna-bin is &lt;2021.20210325.svn50281-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758465" version="1" comment="texlive-vpe-bin is &lt;2021.20210325.svn6897-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758466" version="1" comment="texlive-web-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758467" version="1" comment="texlive-webquiz-bin is &lt;2021.20210325.svn50419-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758468" version="1" comment="texlive-wordcount-bin is &lt;2021.20210325.svn46165-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758469" version="1" comment="texlive-xdvi-bin is &lt;2021.20210325.svn58378-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758470" version="1" comment="texlive-xelatex-dev-bin is &lt;2021.20210325.svn53999-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758471" version="1" comment="texlive-xetex-bin is &lt;2021.20210325.svn58378-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758472" version="1" comment="texlive-xindex-bin is &lt;2021.20210325.svn49312-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758473" version="1" comment="texlive-xml2pmx-bin is &lt;2021.20210325.svn57878-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758474" version="1" comment="texlive-xmltex-bin is &lt;2021.20210325.svn3006-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758475" version="1" comment="texlive-xpdfopen-bin is &lt;2021.20210325.svn52917-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758476" version="1" comment="texlive-yplan-bin is &lt;2021.20210325.svn34398-150400.31.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761815" version="1" comment="libopenvswitch-2_14-0 is &lt;2.14.2-150400.24.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761816" version="1" comment="libovn-20_06-0 is &lt;20.06.2-150400.24.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761817" version="1" comment="openvswitch is &lt;2.14.2-150400.24.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761818" version="1" comment="openvswitch-devel is &lt;2.14.2-150400.24.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761819" version="1" comment="openvswitch-doc is &lt;2.14.2-150400.24.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761820" version="1" comment="openvswitch-ipsec is &lt;2.14.2-150400.24.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761821" version="1" comment="openvswitch-pki is &lt;2.14.2-150400.24.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761822" version="1" comment="openvswitch-test is &lt;2.14.2-150400.24.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761823" version="1" comment="openvswitch-vtep is &lt;2.14.2-150400.24.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761824" version="1" comment="ovn is &lt;20.06.2-150400.24.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761825" version="1" comment="ovn-central is &lt;20.06.2-150400.24.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761826" version="1" comment="ovn-devel is &lt;20.06.2-150400.24.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761827" version="1" comment="ovn-doc is &lt;20.06.2-150400.24.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761828" version="1" comment="ovn-docker is &lt;20.06.2-150400.24.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761829" version="1" comment="ovn-host is &lt;20.06.2-150400.24.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761830" version="1" comment="ovn-vtep is &lt;20.06.2-150400.24.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761831" version="1" comment="python3-ovs is &lt;2.14.2-150400.24.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757062" version="1" comment="golang-github-vpenso-prometheus_slurm_exporter is &lt;0.19-150300.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009757419" version="1" comment="distribution-registry is &lt;2.8.2-150400.9.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009762638" version="1" comment="go1.18-openssl is &lt;1.18.10.1-150000.1.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009762639" version="1" comment="go1.18-openssl-doc is &lt;1.18.10.1-150000.1.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009762640" version="1" comment="go1.18-openssl-race is &lt;1.18.10.1-150000.1.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761834" version="1" comment="c-ares-devel is &lt;1.19.1-150000.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761835" version="1" comment="c-ares-utils is &lt;1.19.1-150000.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761836" version="1" comment="libcares2 is &lt;1.19.1-150000.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761837" version="1" comment="libcares2-32bit is &lt;1.19.1-150000.3.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763511" version="1" comment="libwireshark15 is &lt;3.6.14-150000.3.92.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763512" version="1" comment="libwiretap12 is &lt;3.6.14-150000.3.92.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763513" version="1" comment="libwsutil13 is &lt;3.6.14-150000.3.92.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763514" version="1" comment="wireshark is &lt;3.6.14-150000.3.92.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763515" version="1" comment="wireshark-devel is &lt;3.6.14-150000.3.92.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763516" version="1" comment="wireshark-ui-qt is &lt;3.6.14-150000.3.92.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763699" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-150000.3.76.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763700" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2p-150000.3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763701" version="1" comment="libopenssl10 is &lt;1.0.2p-150000.3.76.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763702" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-150000.3.76.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763703" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-150000.3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763704" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2p-150000.3.76.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763705" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2p-150000.3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763706" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2p-150000.3.76.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763707" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2p-150000.3.76.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763708" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-150000.3.76.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763709" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2p-150000.3.76.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763710" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2p-150000.3.76.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763290" version="1" comment="libtiff-devel is &lt;4.0.9-150000.45.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763291" version="1" comment="libtiff-devel-32bit is &lt;4.0.9-150000.45.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763292" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763293" version="1" comment="libtiff5-32bit is &lt;4.0.9-150000.45.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763294" version="1" comment="tiff is &lt;4.0.9-150000.45.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763734" version="1" comment="ImageMagick is &lt;7.1.0.9-150400.6.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763735" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.0.9-150400.6.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763736" version="1" comment="ImageMagick-config-7-upstream is &lt;7.1.0.9-150400.6.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763737" version="1" comment="ImageMagick-devel is &lt;7.1.0.9-150400.6.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763738" version="1" comment="ImageMagick-devel-32bit is &lt;7.1.0.9-150400.6.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763739" version="1" comment="ImageMagick-doc is &lt;7.1.0.9-150400.6.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763740" version="1" comment="ImageMagick-extra is &lt;7.1.0.9-150400.6.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763741" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.0.9-150400.6.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763742" version="1" comment="libMagick++-7_Q16HDRI5-32bit is &lt;7.1.0.9-150400.6.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763743" version="1" comment="libMagick++-devel is &lt;7.1.0.9-150400.6.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763744" version="1" comment="libMagick++-devel-32bit is &lt;7.1.0.9-150400.6.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763745" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.0.9-150400.6.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763746" version="1" comment="libMagickCore-7_Q16HDRI10-32bit is &lt;7.1.0.9-150400.6.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763747" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.0.9-150400.6.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763748" version="1" comment="libMagickWand-7_Q16HDRI10-32bit is &lt;7.1.0.9-150400.6.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763749" version="1" comment="perl-PerlMagick is &lt;7.1.0.9-150400.6.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764083" version="1" comment="cups is &lt;2.2.7-150000.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764084" version="1" comment="cups-client is &lt;2.2.7-150000.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764085" version="1" comment="cups-config is &lt;2.2.7-150000.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764086" version="1" comment="cups-ddk is &lt;2.2.7-150000.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764087" version="1" comment="cups-devel is &lt;2.2.7-150000.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764088" version="1" comment="cups-devel-32bit is &lt;2.2.7-150000.3.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764089" version="1" comment="libcups2 is &lt;2.2.7-150000.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764090" version="1" comment="libcups2-32bit is &lt;2.2.7-150000.3.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764091" version="1" comment="libcupscgi1 is &lt;2.2.7-150000.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764092" version="1" comment="libcupscgi1-32bit is &lt;2.2.7-150000.3.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764093" version="1" comment="libcupsimage2 is &lt;2.2.7-150000.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764094" version="1" comment="libcupsimage2-32bit is &lt;2.2.7-150000.3.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764095" version="1" comment="libcupsmime1 is &lt;2.2.7-150000.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764096" version="1" comment="libcupsmime1-32bit is &lt;2.2.7-150000.3.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764097" version="1" comment="libcupsppdc1 is &lt;2.2.7-150000.3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764098" version="1" comment="libcupsppdc1-32bit is &lt;2.2.7-150000.3.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761849" version="1" comment="apache-commons-fileupload is &lt;1.5-150200.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761850" version="1" comment="apache-commons-fileupload-javadoc is &lt;1.5-150200.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763295" version="1" comment="google-cloud-sap-agent is &lt;1.5.1-150100.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764622" version="1" comment="libpython3_10-1_0 is &lt;3.10.11-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764623" version="1" comment="libpython3_10-1_0-32bit is &lt;3.10.11-150400.4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764624" version="1" comment="python310 is &lt;3.10.11-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764625" version="1" comment="python310-32bit is &lt;3.10.11-150400.4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764626" version="1" comment="python310-base is &lt;3.10.11-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764627" version="1" comment="python310-base-32bit is &lt;3.10.11-150400.4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764628" version="1" comment="python310-curses is &lt;3.10.11-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764629" version="1" comment="python310-dbm is &lt;3.10.11-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764630" version="1" comment="python310-devel is &lt;3.10.11-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764631" version="1" comment="python310-doc is &lt;3.10.11-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764632" version="1" comment="python310-doc-devhelp is &lt;3.10.11-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764633" version="1" comment="python310-idle is &lt;3.10.11-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764634" version="1" comment="python310-testsuite is &lt;3.10.11-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764635" version="1" comment="python310-tk is &lt;3.10.11-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764636" version="1" comment="python310-tools is &lt;3.10.11-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764394" version="1" comment="libwebp-devel is &lt;1.0.3-150200.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764395" version="1" comment="libwebp-devel-32bit is &lt;1.0.3-150200.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764396" version="1" comment="libwebp-tools is &lt;1.0.3-150200.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764397" version="1" comment="libwebp7 is &lt;1.0.3-150200.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764398" version="1" comment="libwebp7-32bit is &lt;1.0.3-150200.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764399" version="1" comment="libwebpdecoder3 is &lt;1.0.3-150200.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764400" version="1" comment="libwebpdecoder3-32bit is &lt;1.0.3-150200.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764401" version="1" comment="libwebpdemux2 is &lt;1.0.3-150200.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764402" version="1" comment="libwebpdemux2-32bit is &lt;1.0.3-150200.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764403" version="1" comment="libwebpmux3 is &lt;1.0.3-150200.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764404" version="1" comment="libwebpmux3-32bit is &lt;1.0.3-150200.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763280" version="1" comment="libmariadbd-devel is &lt;10.6.13-150400.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763281" version="1" comment="libmariadbd19 is &lt;10.6.13-150400.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763282" version="1" comment="mariadb is &lt;10.6.13-150400.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763283" version="1" comment="mariadb-bench is &lt;10.6.13-150400.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763284" version="1" comment="mariadb-client is &lt;10.6.13-150400.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763285" version="1" comment="mariadb-errormessages is &lt;10.6.13-150400.3.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763286" version="1" comment="mariadb-galera is &lt;10.6.13-150400.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763287" version="1" comment="mariadb-rpm-macros is &lt;10.6.13-150400.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763288" version="1" comment="mariadb-test is &lt;10.6.13-150400.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763289" version="1" comment="mariadb-tools is &lt;10.6.13-150400.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763719" version="1" comment="libldap-2_4-2 is &lt;2.4.46-150200.14.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763720" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.46-150200.14.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763721" version="1" comment="libldap-data is &lt;2.4.46-150200.14.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763722" version="1" comment="openldap2 is &lt;2.4.46-150200.14.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763723" version="1" comment="openldap2-back-meta is &lt;2.4.46-150200.14.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763724" version="1" comment="openldap2-back-perl is &lt;2.4.46-150200.14.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763725" version="1" comment="openldap2-back-sock is &lt;2.4.46-150200.14.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763726" version="1" comment="openldap2-back-sql is &lt;2.4.46-150200.14.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763727" version="1" comment="openldap2-client is &lt;2.4.46-150200.14.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763728" version="1" comment="openldap2-contrib is &lt;2.4.46-150200.14.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763729" version="1" comment="openldap2-devel is &lt;2.4.46-150200.14.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763730" version="1" comment="openldap2-devel-32bit is &lt;2.4.46-150200.14.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763731" version="1" comment="openldap2-devel-static is &lt;2.4.46-150200.14.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763732" version="1" comment="openldap2-doc is &lt;2.4.46-150200.14.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763733" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-150200.14.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764604" version="1" comment="MozillaFirefox is &lt;102.12.0-150200.152.90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764605" version="1" comment="MozillaFirefox-branding-upstream is &lt;102.12.0-150200.152.90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764606" version="1" comment="MozillaFirefox-devel is &lt;102.12.0-150200.152.90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764607" version="1" comment="MozillaFirefox-translations-common is &lt;102.12.0-150200.152.90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764608" version="1" comment="MozillaFirefox-translations-other is &lt;102.12.0-150200.152.90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765043" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr8.5-150000.3.74.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765044" version="1" comment="java-1_8_0-ibm-32bit is &lt;1.8.0_sr8.5-150000.3.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765045" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr8.5-150000.3.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765046" version="1" comment="java-1_8_0-ibm-demo is &lt;1.8.0_sr8.5-150000.3.74.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765047" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr8.5-150000.3.74.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765048" version="1" comment="java-1_8_0-ibm-devel-32bit is &lt;1.8.0_sr8.5-150000.3.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765049" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr8.5-150000.3.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765050" version="1" comment="java-1_8_0-ibm-src is &lt;1.8.0_sr8.5-150000.3.74.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761838" version="1" comment="tomcat is &lt;9.0.75-150200.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761839" version="1" comment="tomcat-admin-webapps is &lt;9.0.75-150200.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761840" version="1" comment="tomcat-docs-webapp is &lt;9.0.75-150200.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761841" version="1" comment="tomcat-el-3_0-api is &lt;9.0.75-150200.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761842" version="1" comment="tomcat-embed is &lt;9.0.75-150200.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761843" version="1" comment="tomcat-javadoc is &lt;9.0.75-150200.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761844" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.75-150200.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761845" version="1" comment="tomcat-jsvc is &lt;9.0.75-150200.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761846" version="1" comment="tomcat-lib is &lt;9.0.75-150200.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761847" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.75-150200.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761848" version="1" comment="tomcat-webapps is &lt;9.0.75-150200.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764393" version="1" comment="rekor is &lt;1.2.1-150400.4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764602" version="1" comment="opensc is &lt;0.22.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764603" version="1" comment="opensc-32bit is &lt;0.22.0-150400.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764609" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764610" version="1" comment="libpython3_6m1_0-32bit is &lt;3.6.15-150300.10.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764611" version="1" comment="python3 is &lt;3.6.15-150300.10.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764612" version="1" comment="python3-base is &lt;3.6.15-150300.10.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764613" version="1" comment="python3-curses is &lt;3.6.15-150300.10.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764614" version="1" comment="python3-dbm is &lt;3.6.15-150300.10.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764615" version="1" comment="python3-devel is &lt;3.6.15-150300.10.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764616" version="1" comment="python3-doc is &lt;3.6.15-150300.10.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764617" version="1" comment="python3-doc-devhelp is &lt;3.6.15-150300.10.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764618" version="1" comment="python3-idle is &lt;3.6.15-150300.10.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764619" version="1" comment="python3-testsuite is &lt;3.6.15-150300.10.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764620" version="1" comment="python3-tk is &lt;3.6.15-150300.10.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764621" version="1" comment="python3-tools is &lt;3.6.15-150300.10.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765201" version="1" comment="frr is &lt;8.4-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765202" version="1" comment="frr-devel is &lt;8.4-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765203" version="1" comment="libfrr0 is &lt;8.4-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765204" version="1" comment="libfrr_pb0 is &lt;8.4-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765205" version="1" comment="libfrrcares0 is &lt;8.4-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765206" version="1" comment="libfrrfpm_pb0 is &lt;8.4-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765207" version="1" comment="libfrrospfapiclient0 is &lt;8.4-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765208" version="1" comment="libfrrsnmp0 is &lt;8.4-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765209" version="1" comment="libfrrzmq0 is &lt;8.4-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765210" version="1" comment="libmlag_pb0 is &lt;8.4-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765051" version="1" comment="go1.19 is &lt;1.19.10-150000.1.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765052" version="1" comment="go1.19-doc is &lt;1.19.10-150000.1.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765125" version="1" comment="go1.19-race is &lt;1.19.10-150000.1.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765054" version="1" comment="go1.20 is &lt;1.20.5-150000.1.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765055" version="1" comment="go1.20-doc is &lt;1.20.5-150000.1.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765056" version="1" comment="go1.20-race is &lt;1.20.5-150000.1.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765060" version="1" comment="kernel-vanilla is &lt;4.12.14-150100.197.148.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765061" version="1" comment="kernel-vanilla-base is &lt;4.12.14-150100.197.148.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765062" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-150100.197.148.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765063" version="1" comment="kernel-vanilla-livepatch-devel is &lt;4.12.14-150100.197.148.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768640" version="1" comment="xen is &lt;4.17.1_04-150500.3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768641" version="1" comment="xen-devel is &lt;4.17.1_04-150500.3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768642" version="1" comment="xen-doc-html is &lt;4.17.1_04-150500.3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768643" version="1" comment="xen-libs is &lt;4.17.1_04-150500.3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768644" version="1" comment="xen-libs-32bit is &lt;4.17.1_04-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768645" version="1" comment="xen-tools is &lt;4.17.1_04-150500.3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768646" version="1" comment="xen-tools-domU is &lt;4.17.1_04-150500.3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767936" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.17.1_04-150500.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765211" version="1" comment="libopenvswitch-3_1-0 is &lt;3.1.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765212" version="1" comment="libovn-23_03-0 is &lt;23.03.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765213" version="1" comment="openvswitch3 is &lt;3.1.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765214" version="1" comment="openvswitch3-devel is &lt;3.1.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768647" version="1" comment="openvswitch3-doc is &lt;3.1.0-150500.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765215" version="1" comment="openvswitch3-ipsec is &lt;3.1.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765216" version="1" comment="openvswitch3-pki is &lt;3.1.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765217" version="1" comment="openvswitch3-test is &lt;3.1.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765218" version="1" comment="openvswitch3-vtep is &lt;3.1.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765219" version="1" comment="ovn3 is &lt;23.03.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765220" version="1" comment="ovn3-central is &lt;23.03.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765221" version="1" comment="ovn3-devel is &lt;23.03.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768648" version="1" comment="ovn3-doc is &lt;23.03.0-150500.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765222" version="1" comment="ovn3-docker is &lt;23.03.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765223" version="1" comment="ovn3-host is &lt;23.03.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765224" version="1" comment="ovn3-vtep is &lt;23.03.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765225" version="1" comment="python3-ovs3 is &lt;3.1.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760668" version="1" comment="jetty-annotations is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760669" version="1" comment="jetty-ant is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760670" version="1" comment="jetty-cdi is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760671" version="1" comment="jetty-client is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760672" version="1" comment="jetty-continuation is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760673" version="1" comment="jetty-deploy is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760674" version="1" comment="jetty-fcgi is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760675" version="1" comment="jetty-http is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760676" version="1" comment="jetty-http-spi is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760677" version="1" comment="jetty-io is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760678" version="1" comment="jetty-jaas is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760679" version="1" comment="jetty-jmx is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760680" version="1" comment="jetty-jndi is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760681" version="1" comment="jetty-jsp is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760682" version="1" comment="jetty-minimal-javadoc is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760683" version="1" comment="jetty-openid is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760684" version="1" comment="jetty-plus is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760685" version="1" comment="jetty-proxy is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760686" version="1" comment="jetty-quickstart is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760687" version="1" comment="jetty-rewrite is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760688" version="1" comment="jetty-security is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760689" version="1" comment="jetty-server is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760690" version="1" comment="jetty-servlet is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760691" version="1" comment="jetty-servlets is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760692" version="1" comment="jetty-start is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760693" version="1" comment="jetty-util is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760694" version="1" comment="jetty-util-ajax is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760695" version="1" comment="jetty-webapp is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009760696" version="1" comment="jetty-xml is &lt;9.4.51-150200.3.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767679" version="1" comment="kubernetes1.18-client is &lt;1.18.10-150200.5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767680" version="1" comment="kubernetes1.18-client-common is &lt;1.18.10-150200.5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768649" version="1" comment="kubernetes1.23-apiserver is &lt;1.23.17-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767929" version="1" comment="kubernetes1.23-client is &lt;1.23.17-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768650" version="1" comment="kubernetes1.23-client-bash-completion is &lt;1.23.17-150500.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767930" version="1" comment="kubernetes1.23-client-common is &lt;1.23.17-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768651" version="1" comment="kubernetes1.23-client-fish-completion is &lt;1.23.17-150500.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768652" version="1" comment="kubernetes1.23-controller-manager is &lt;1.23.17-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768653" version="1" comment="kubernetes1.23-kubeadm is &lt;1.23.17-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768654" version="1" comment="kubernetes1.23-kubelet is &lt;1.23.17-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768655" version="1" comment="kubernetes1.23-kubelet-common is &lt;1.23.17-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768656" version="1" comment="kubernetes1.23-proxy is &lt;1.23.17-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768657" version="1" comment="kubernetes1.23-scheduler is &lt;1.23.17-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768658" version="1" comment="kubernetes1.24-apiserver is &lt;1.24.13-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767931" version="1" comment="kubernetes1.24-client is &lt;1.24.13-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768659" version="1" comment="kubernetes1.24-client-bash-completion is &lt;1.24.13-150500.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767932" version="1" comment="kubernetes1.24-client-common is &lt;1.24.13-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768660" version="1" comment="kubernetes1.24-client-fish-completion is &lt;1.24.13-150500.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768661" version="1" comment="kubernetes1.24-controller-manager is &lt;1.24.13-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768662" version="1" comment="kubernetes1.24-kubeadm is &lt;1.24.13-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768663" version="1" comment="kubernetes1.24-kubelet is &lt;1.24.13-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768664" version="1" comment="kubernetes1.24-kubelet-common is &lt;1.24.13-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768665" version="1" comment="kubernetes1.24-proxy is &lt;1.24.13-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768666" version="1" comment="kubernetes1.24-scheduler is &lt;1.24.13-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009766952" version="1" comment="bluez is &lt;5.65-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768667" version="1" comment="bluez-auto-enable-devices is &lt;5.65-150500.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768668" version="1" comment="bluez-cups is &lt;5.65-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768669" version="1" comment="bluez-deprecated is &lt;5.65-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009766955" version="1" comment="bluez-devel is &lt;5.65-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768670" version="1" comment="bluez-devel-32bit is &lt;5.65-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768671" version="1" comment="bluez-obexd is &lt;5.65-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768672" version="1" comment="bluez-test is &lt;5.65-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009766953" version="1" comment="bluez-zsh-completion is &lt;5.65-150500.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009766954" version="1" comment="libbluetooth3 is &lt;5.65-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768673" version="1" comment="libbluetooth3-32bit is &lt;5.65-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765285" version="1" comment="python3-reportlab is &lt;3.4.0-150000.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767683" version="1" comment="python-ply-doc is &lt;3.10-150000.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767684" version="1" comment="python3-jmespath is &lt;0.9.3-150000.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767685" version="1" comment="python3-ply is &lt;3.10-150000.3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767687" version="1" comment="python3-simplejson is &lt;3.17.2-150300.3.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764582" version="1" comment="grafana is &lt;9.5.1-150200.3.41.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758950" version="1" comment="dracut-saltboot is &lt;0.1.1681904360.84ef141-150000.1.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009758958" version="1" comment="spacecmd is &lt;4.3.21-150000.3.98.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009179867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767081" version="1" comment="wire is &lt;0.5.0-150000.1.12.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767681" version="1" comment="python3-pyzmq is &lt;17.1.2-150000.3.5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767682" version="1" comment="python3-pyzmq-devel is &lt;17.1.2-150000.3.5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763509" version="1" comment="firewalld-prometheus-config is &lt;0.1-150100.4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009763510" version="1" comment="golang-github-prometheus-prometheus is &lt;2.37.6-150100.4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009181880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009766710" version="1" comment="rustup is &lt;1.26.0~0-150400.3.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767117" version="1" comment="libvmtools-devel is &lt;12.2.0-150300.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767118" version="1" comment="libvmtools0 is &lt;12.2.0-150300.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767119" version="1" comment="open-vm-tools is &lt;12.2.0-150300.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767120" version="1" comment="open-vm-tools-desktop is &lt;12.2.0-150300.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767121" version="1" comment="open-vm-tools-salt-minion is &lt;12.2.0-150300.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767122" version="1" comment="open-vm-tools-sdmp is &lt;12.2.0-150300.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767123" version="1" comment="ntp is &lt;4.2.8p17-150000.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767124" version="1" comment="ntp-doc is &lt;4.2.8p17-150000.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767709" version="1" comment="apache2-mod_php8 is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767710" version="1" comment="php8 is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767711" version="1" comment="php8-bcmath is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767712" version="1" comment="php8-bz2 is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767713" version="1" comment="php8-calendar is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767714" version="1" comment="php8-cli is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767715" version="1" comment="php8-ctype is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767716" version="1" comment="php8-curl is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767717" version="1" comment="php8-dba is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767718" version="1" comment="php8-devel is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767719" version="1" comment="php8-dom is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767720" version="1" comment="php8-embed is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767721" version="1" comment="php8-enchant is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767722" version="1" comment="php8-exif is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767723" version="1" comment="php8-fastcgi is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767724" version="1" comment="php8-fileinfo is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767725" version="1" comment="php8-fpm is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767726" version="1" comment="php8-ftp is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767727" version="1" comment="php8-gd is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767728" version="1" comment="php8-gettext is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767729" version="1" comment="php8-gmp is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767730" version="1" comment="php8-iconv is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767731" version="1" comment="php8-intl is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767732" version="1" comment="php8-ldap is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767733" version="1" comment="php8-mbstring is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767734" version="1" comment="php8-mysql is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767735" version="1" comment="php8-odbc is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767736" version="1" comment="php8-opcache is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767737" version="1" comment="php8-openssl is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767738" version="1" comment="php8-pcntl is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767739" version="1" comment="php8-pdo is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767740" version="1" comment="php8-pgsql is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767741" version="1" comment="php8-phar is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767742" version="1" comment="php8-posix is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767743" version="1" comment="php8-readline is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767744" version="1" comment="php8-shmop is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767745" version="1" comment="php8-snmp is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767746" version="1" comment="php8-soap is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767747" version="1" comment="php8-sockets is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767748" version="1" comment="php8-sodium is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767749" version="1" comment="php8-sqlite is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767750" version="1" comment="php8-sysvmsg is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767751" version="1" comment="php8-sysvsem is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767752" version="1" comment="php8-sysvshm is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767753" version="1" comment="php8-test is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767754" version="1" comment="php8-tidy is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767755" version="1" comment="php8-tokenizer is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767756" version="1" comment="php8-xmlreader is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767757" version="1" comment="php8-xmlwriter is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767758" version="1" comment="php8-xsl is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767759" version="1" comment="php8-zip is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767760" version="1" comment="php8-zlib is &lt;8.0.29-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009766641" version="1" comment="MozillaThunderbird is &lt;102.12.0-150200.8.121.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009766642" version="1" comment="MozillaThunderbird-translations-common is &lt;102.12.0-150200.8.121.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009766643" version="1" comment="MozillaThunderbird-translations-other is &lt;102.12.0-150200.8.121.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767702" version="1" comment="libX11-6 is &lt;1.6.5-150000.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767703" version="1" comment="libX11-6-32bit is &lt;1.6.5-150000.3.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767704" version="1" comment="libX11-data is &lt;1.6.5-150000.3.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767705" version="1" comment="libX11-devel is &lt;1.6.5-150000.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767706" version="1" comment="libX11-devel-32bit is &lt;1.6.5-150000.3.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767707" version="1" comment="libX11-xcb1 is &lt;1.6.5-150000.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767708" version="1" comment="libX11-xcb1-32bit is &lt;1.6.5-150000.3.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769103" version="1" comment="cups is &lt;2.2.7-150000.3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769104" version="1" comment="cups-client is &lt;2.2.7-150000.3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769105" version="1" comment="cups-config is &lt;2.2.7-150000.3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769106" version="1" comment="cups-ddk is &lt;2.2.7-150000.3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769107" version="1" comment="cups-devel is &lt;2.2.7-150000.3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769108" version="1" comment="cups-devel-32bit is &lt;2.2.7-150000.3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769109" version="1" comment="libcups2 is &lt;2.2.7-150000.3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769110" version="1" comment="libcups2-32bit is &lt;2.2.7-150000.3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769111" version="1" comment="libcupscgi1 is &lt;2.2.7-150000.3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769112" version="1" comment="libcupscgi1-32bit is &lt;2.2.7-150000.3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769113" version="1" comment="libcupsimage2 is &lt;2.2.7-150000.3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769114" version="1" comment="libcupsimage2-32bit is &lt;2.2.7-150000.3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769115" version="1" comment="libcupsmime1 is &lt;2.2.7-150000.3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769116" version="1" comment="libcupsmime1-32bit is &lt;2.2.7-150000.3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769117" version="1" comment="libcupsppdc1 is &lt;2.2.7-150000.3.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769118" version="1" comment="libcupsppdc1-32bit is &lt;2.2.7-150000.3.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768698" version="1" comment="google-cloud-sap-agent is &lt;1.5.1-150100.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764518" version="1" comment="dav1d is &lt;1.0.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764487" version="1" comment="dav1d-devel is &lt;1.0.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764488" version="1" comment="libdav1d6 is &lt;1.0.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768674" version="1" comment="libdav1d6-32bit is &lt;1.0.0-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764637" version="1" comment="python3-sqlparse is &lt;0.4.2-150300.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764828" version="1" comment="libopenssl-3-devel is &lt;3.0.8-150500.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768677" version="1" comment="libopenssl-3-devel-32bit is &lt;3.0.8-150500.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764829" version="1" comment="libopenssl3 is &lt;3.0.8-150500.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768678" version="1" comment="libopenssl3-32bit is &lt;3.0.8-150500.5.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764830" version="1" comment="openssl-3 is &lt;3.0.8-150500.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768679" version="1" comment="openssl-3-doc is &lt;3.0.8-150500.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765282" version="1" comment="cloud-init is &lt;23.1-150100.8.63.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765283" version="1" comment="cloud-init-config-suse is &lt;23.1-150100.8.63.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765284" version="1" comment="cloud-init-doc is &lt;23.1-150100.8.63.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768621" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-150000.3.79.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768622" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2p-150000.3.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768623" version="1" comment="libopenssl10 is &lt;1.0.2p-150000.3.79.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768624" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-150000.3.79.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768625" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-150000.3.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768626" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2p-150000.3.79.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768627" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2p-150000.3.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768628" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2p-150000.3.79.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768629" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2p-150000.3.79.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768630" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-150000.3.79.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768631" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2p-150000.3.79.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768632" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2p-150000.3.79.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764638" version="1" comment="libpython3_9-1_0 is &lt;3.9.16-150300.4.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764639" version="1" comment="libpython3_9-1_0-32bit is &lt;3.9.16-150300.4.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764640" version="1" comment="python39 is &lt;3.9.16-150300.4.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764641" version="1" comment="python39-32bit is &lt;3.9.16-150300.4.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764642" version="1" comment="python39-base is &lt;3.9.16-150300.4.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764643" version="1" comment="python39-base-32bit is &lt;3.9.16-150300.4.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764644" version="1" comment="python39-curses is &lt;3.9.16-150300.4.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764645" version="1" comment="python39-dbm is &lt;3.9.16-150300.4.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764646" version="1" comment="python39-devel is &lt;3.9.16-150300.4.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764647" version="1" comment="python39-doc is &lt;3.9.16-150300.4.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764648" version="1" comment="python39-doc-devhelp is &lt;3.9.16-150300.4.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764649" version="1" comment="python39-idle is &lt;3.9.16-150300.4.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764650" version="1" comment="python39-testsuite is &lt;3.9.16-150300.4.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764651" version="1" comment="python39-tk is &lt;3.9.16-150300.4.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764652" version="1" comment="python39-tools is &lt;3.9.16-150300.4.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768685" version="1" comment="cluster-md-kmp-azure is &lt;5.14.21-150500.33.3.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768686" version="1" comment="dlm-kmp-azure is &lt;5.14.21-150500.33.3.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768687" version="1" comment="gfs2-kmp-azure is &lt;5.14.21-150500.33.3.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009766964" version="1" comment="kernel-azure is &lt;5.14.21-150500.33.3.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009766965" version="1" comment="kernel-azure-devel is &lt;5.14.21-150500.33.3.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768688" version="1" comment="kernel-azure-extra is &lt;5.14.21-150500.33.3.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768689" version="1" comment="kernel-azure-livepatch-devel is &lt;5.14.21-150500.33.3.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768690" version="1" comment="kernel-azure-optional is &lt;5.14.21-150500.33.3.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768691" version="1" comment="kernel-azure-vdso is &lt;5.14.21-150500.33.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009766966" version="1" comment="kernel-devel-azure is &lt;5.14.21-150500.33.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009766967" version="1" comment="kernel-source-azure is &lt;5.14.21-150500.33.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009766968" version="1" comment="kernel-syms-azure is &lt;5.14.21-150500.33.3.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768692" version="1" comment="kselftests-kmp-azure is &lt;5.14.21-150500.33.3.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768693" version="1" comment="ocfs2-kmp-azure is &lt;5.14.21-150500.33.3.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768694" version="1" comment="reiserfs-kmp-azure is &lt;5.14.21-150500.33.3.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767082" version="1" comment="WebKit2GTK-4.0-lang is &lt;2.38.6-150400.4.42.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767083" version="1" comment="WebKit2GTK-4.1-lang is &lt;2.38.6-150400.4.42.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767084" version="1" comment="WebKit2GTK-5.0-lang is &lt;2.38.6-150400.4.42.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767085" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767086" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.38.6-150400.4.42.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767087" version="1" comment="libjavascriptcoregtk-4_1-0 is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767088" version="1" comment="libjavascriptcoregtk-4_1-0-32bit is &lt;2.38.6-150400.4.42.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767089" version="1" comment="libjavascriptcoregtk-5_0-0 is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767090" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767091" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.38.6-150400.4.42.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767092" version="1" comment="libwebkit2gtk-4_1-0 is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767093" version="1" comment="libwebkit2gtk-4_1-0-32bit is &lt;2.38.6-150400.4.42.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767094" version="1" comment="libwebkit2gtk-5_0-0 is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767095" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767096" version="1" comment="typelib-1_0-JavaScriptCore-4_1 is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767097" version="1" comment="typelib-1_0-JavaScriptCore-5_0 is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767098" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767099" version="1" comment="typelib-1_0-WebKit2-4_1 is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767100" version="1" comment="typelib-1_0-WebKit2-5_0 is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767101" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767102" version="1" comment="typelib-1_0-WebKit2WebExtension-4_1 is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767103" version="1" comment="typelib-1_0-WebKit2WebExtension-5_0 is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767104" version="1" comment="webkit-jsc-4 is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767105" version="1" comment="webkit-jsc-4.1 is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767106" version="1" comment="webkit-jsc-5.0 is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767107" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767108" version="1" comment="webkit2gtk-4_1-injected-bundles is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767109" version="1" comment="webkit2gtk-5_0-injected-bundles is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767110" version="1" comment="webkit2gtk3-devel is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767111" version="1" comment="webkit2gtk3-minibrowser is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767112" version="1" comment="webkit2gtk3-soup2-devel is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767113" version="1" comment="webkit2gtk3-soup2-minibrowser is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767114" version="1" comment="webkit2gtk4-devel is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767115" version="1" comment="webkit2gtk4-minibrowser is &lt;2.38.6-150400.4.42.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769136" version="1" comment="amazon-ssm-agent is &lt;3.1.1260.0-150000.5.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765226" version="1" comment="libvirt is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765227" version="1" comment="libvirt-client is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765228" version="1" comment="libvirt-client-qemu is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765229" version="1" comment="libvirt-daemon is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765230" version="1" comment="libvirt-daemon-config-network is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765231" version="1" comment="libvirt-daemon-config-nwfilter is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765232" version="1" comment="libvirt-daemon-driver-interface is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765233" version="1" comment="libvirt-daemon-driver-libxl is &lt;9.0.0-150500.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768680" version="1" comment="libvirt-daemon-driver-lxc is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765234" version="1" comment="libvirt-daemon-driver-network is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765235" version="1" comment="libvirt-daemon-driver-nodedev is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765236" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765237" version="1" comment="libvirt-daemon-driver-qemu is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765238" version="1" comment="libvirt-daemon-driver-secret is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765239" version="1" comment="libvirt-daemon-driver-storage is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765240" version="1" comment="libvirt-daemon-driver-storage-core is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765241" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768681" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765242" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765243" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765244" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765245" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765246" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;9.0.0-150500.6.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765247" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765248" version="1" comment="libvirt-daemon-hooks is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768682" version="1" comment="libvirt-daemon-lxc is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765249" version="1" comment="libvirt-daemon-qemu is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765250" version="1" comment="libvirt-daemon-xen is &lt;9.0.0-150500.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765251" version="1" comment="libvirt-devel is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768683" version="1" comment="libvirt-devel-32bit is &lt;9.0.0-150500.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765252" version="1" comment="libvirt-doc is &lt;9.0.0-150500.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765124" version="1" comment="libvirt-libs is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765253" version="1" comment="libvirt-lock-sanlock is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765254" version="1" comment="libvirt-nss is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768684" version="1" comment="wireshark-plugin-libvirt is &lt;9.0.0-150500.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769149" version="1" comment="kubernetes1.24-apiserver is &lt;1.24.15-150500.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769150" version="1" comment="kubernetes1.24-client is &lt;1.24.15-150500.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769151" version="1" comment="kubernetes1.24-client-bash-completion is &lt;1.24.15-150500.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769152" version="1" comment="kubernetes1.24-client-common is &lt;1.24.15-150500.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769153" version="1" comment="kubernetes1.24-client-fish-completion is &lt;1.24.15-150500.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769154" version="1" comment="kubernetes1.24-controller-manager is &lt;1.24.15-150500.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769155" version="1" comment="kubernetes1.24-kubeadm is &lt;1.24.15-150500.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769156" version="1" comment="kubernetes1.24-kubelet is &lt;1.24.15-150500.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769157" version="1" comment="kubernetes1.24-kubelet-common is &lt;1.24.15-150500.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769158" version="1" comment="kubernetes1.24-proxy is &lt;1.24.15-150500.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769159" version="1" comment="kubernetes1.24-scheduler is &lt;1.24.15-150500.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769130" version="1" comment="cosign is &lt;2.0.1-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769329" version="1" comment="corepack18 is &lt;18.16.1-150400.9.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769330" version="1" comment="nodejs18 is &lt;18.16.1-150400.9.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769331" version="1" comment="nodejs18-devel is &lt;18.16.1-150400.9.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769332" version="1" comment="nodejs18-docs is &lt;18.16.1-150400.9.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769333" version="1" comment="npm18 is &lt;18.16.1-150400.9.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769160" version="1" comment="kubernetes1.23-apiserver is &lt;1.23.17-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769161" version="1" comment="kubernetes1.23-client is &lt;1.23.17-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769162" version="1" comment="kubernetes1.23-client-bash-completion is &lt;1.23.17-150500.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769163" version="1" comment="kubernetes1.23-client-common is &lt;1.23.17-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769164" version="1" comment="kubernetes1.23-client-fish-completion is &lt;1.23.17-150500.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769165" version="1" comment="kubernetes1.23-controller-manager is &lt;1.23.17-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769166" version="1" comment="kubernetes1.23-kubeadm is &lt;1.23.17-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769167" version="1" comment="kubernetes1.23-kubelet is &lt;1.23.17-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769168" version="1" comment="kubernetes1.23-kubelet-common is &lt;1.23.17-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769169" version="1" comment="kubernetes1.23-proxy is &lt;1.23.17-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769170" version="1" comment="kubernetes1.23-scheduler is &lt;1.23.17-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769135" version="1" comment="rekor is &lt;1.2.1-150400.4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768695" version="1" comment="libiniparser-devel is &lt;4.1-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768696" version="1" comment="libiniparser1 is &lt;4.1-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768697" version="1" comment="libiniparser1-32bit is &lt;4.1-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768636" version="1" comment="terraform-provider-aws is &lt;3.11.0-150200.6.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768637" version="1" comment="terraform-provider-helm is &lt;2.9.0-150200.6.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768638" version="1" comment="terraform-provider-null is &lt;3.0.0-150200.6.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803032" version="1" comment="dnsdist is &lt;1.8.0-150400.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770390" version="1" comment="libluajit-5_1-2 is &lt;2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770391" version="1" comment="libluajit-5_1-2-32bit is &lt;2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770392" version="1" comment="luajit is &lt;2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770393" version="1" comment="luajit-devel is &lt;2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768138" version="1" comment="amazon-ecs-init is &lt;1.53.0-150100.4.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769963" version="1" comment="libcap-devel is &lt;2.63-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769964" version="1" comment="libcap-progs is &lt;2.63-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769965" version="1" comment="libcap2 is &lt;2.63-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769966" version="1" comment="libcap2-32bit is &lt;2.63-150400.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769967" version="1" comment="libpsx2 is &lt;2.63-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769968" version="1" comment="libpsx2-32bit is &lt;2.63-150400.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768634" version="1" comment="kubernetes1.18-client is &lt;1.18.10-150200.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768635" version="1" comment="kubernetes1.18-client-common is &lt;1.18.10-150200.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769930" version="1" comment="libpython3_11-1_0 is &lt;3.11.3-150400.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769931" version="1" comment="libpython3_11-1_0-32bit is &lt;3.11.3-150400.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769932" version="1" comment="python311 is &lt;3.11.3-150400.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769933" version="1" comment="python311-32bit is &lt;3.11.3-150400.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769934" version="1" comment="python311-base is &lt;3.11.3-150400.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769935" version="1" comment="python311-base-32bit is &lt;3.11.3-150400.9.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769936" version="1" comment="python311-curses is &lt;3.11.3-150400.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769937" version="1" comment="python311-dbm is &lt;3.11.3-150400.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769938" version="1" comment="python311-devel is &lt;3.11.3-150400.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769939" version="1" comment="python311-doc is &lt;3.11.3-150400.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769940" version="1" comment="python311-doc-devhelp is &lt;3.11.3-150400.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769941" version="1" comment="python311-idle is &lt;3.11.3-150400.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769942" version="1" comment="python311-testsuite is &lt;3.11.3-150400.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769943" version="1" comment="python311-tk is &lt;3.11.3-150400.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769944" version="1" comment="python311-tools is &lt;3.11.3-150400.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770257" version="1" comment="libQt6Concurrent6 is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770258" version="1" comment="libQt6Core6 is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770259" version="1" comment="libQt6DBus6 is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770260" version="1" comment="libQt6Gui6 is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770261" version="1" comment="libQt6Network6 is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770262" version="1" comment="libQt6OpenGL6 is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770263" version="1" comment="libQt6OpenGLWidgets6 is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770264" version="1" comment="libQt6PrintSupport6 is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770265" version="1" comment="libQt6Sql6 is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770266" version="1" comment="libQt6Test6 is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770267" version="1" comment="libQt6Widgets6 is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770268" version="1" comment="libQt6Xml6 is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770269" version="1" comment="qt6-base-common-devel is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770270" version="1" comment="qt6-base-devel is &lt;6.4.2-150500.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770271" version="1" comment="qt6-base-docs-html is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770272" version="1" comment="qt6-base-docs-qch is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770273" version="1" comment="qt6-base-examples is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770274" version="1" comment="qt6-base-private-devel is &lt;6.4.2-150500.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770275" version="1" comment="qt6-concurrent-devel is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770276" version="1" comment="qt6-core-devel is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770277" version="1" comment="qt6-core-private-devel is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770278" version="1" comment="qt6-dbus-devel is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770279" version="1" comment="qt6-dbus-private-devel is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770280" version="1" comment="qt6-docs-common is &lt;6.4.2-150500.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770281" version="1" comment="qt6-gui-devel is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770282" version="1" comment="qt6-gui-private-devel is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770283" version="1" comment="qt6-kmssupport-devel-static is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770284" version="1" comment="qt6-kmssupport-private-devel is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770285" version="1" comment="qt6-network-devel is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770286" version="1" comment="qt6-network-private-devel is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770287" version="1" comment="qt6-network-tls is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770288" version="1" comment="qt6-networkinformation-glib is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770289" version="1" comment="qt6-networkinformation-nm is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770290" version="1" comment="qt6-opengl-devel is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770291" version="1" comment="qt6-opengl-private-devel is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770292" version="1" comment="qt6-openglwidgets-devel is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770293" version="1" comment="qt6-platformsupport-devel-static is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770294" version="1" comment="qt6-platformsupport-private-devel is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770295" version="1" comment="qt6-platformtheme-gtk3 is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770296" version="1" comment="qt6-platformtheme-xdgdesktopportal is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770297" version="1" comment="qt6-printsupport-cups is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770298" version="1" comment="qt6-printsupport-devel is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770299" version="1" comment="qt6-printsupport-private-devel is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770300" version="1" comment="qt6-sql-devel is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770301" version="1" comment="qt6-sql-mysql is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770302" version="1" comment="qt6-sql-postgresql is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770303" version="1" comment="qt6-sql-private-devel is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770304" version="1" comment="qt6-sql-sqlite is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770305" version="1" comment="qt6-sql-unixODBC is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770306" version="1" comment="qt6-test-devel is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770307" version="1" comment="qt6-test-private-devel is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770308" version="1" comment="qt6-widgets-devel is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770309" version="1" comment="qt6-widgets-private-devel is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770310" version="1" comment="qt6-xml-devel is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770311" version="1" comment="qt6-xml-private-devel is &lt;6.4.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770254" version="1" comment="rmt-server is &lt;2.13-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770255" version="1" comment="rmt-server-config is &lt;2.13-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770256" version="1" comment="rmt-server-pubcloud is &lt;2.13-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770676" version="1" comment="libdwarf-devel is &lt;20161124-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770677" version="1" comment="libdwarf-devel-static is &lt;20161124-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770678" version="1" comment="libdwarf-doc is &lt;20161124-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770679" version="1" comment="libdwarf-tools is &lt;20161124-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770680" version="1" comment="libdwarf1 is &lt;20161124-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769978" version="1" comment="prometheus-sap_host_exporter is &lt;0.6.0+git.1685628435.48c4099-150200.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769979" version="1" comment="prometheus-ha_cluster_exporter is &lt;1.3.3+git.1683650163.1000ba6-150200.3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770942" version="1" comment="cluster-md-kmp-rt is &lt;5.14.21-150500.13.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770943" version="1" comment="dlm-kmp-rt is &lt;5.14.21-150500.13.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770944" version="1" comment="gfs2-kmp-rt is &lt;5.14.21-150500.13.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770945" version="1" comment="kernel-devel-rt is &lt;5.14.21-150500.13.5.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770946" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770947" version="1" comment="kernel-rt-devel is &lt;5.14.21-150500.13.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770948" version="1" comment="kernel-rt-extra is &lt;5.14.21-150500.13.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770949" version="1" comment="kernel-rt-livepatch is &lt;5.14.21-150500.13.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770950" version="1" comment="kernel-rt-livepatch-devel is &lt;5.14.21-150500.13.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770951" version="1" comment="kernel-rt-optional is &lt;5.14.21-150500.13.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770952" version="1" comment="kernel-rt-vdso is &lt;5.14.21-150500.13.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770953" version="1" comment="kernel-rt_debug is &lt;5.14.21-150500.13.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770954" version="1" comment="kernel-rt_debug-devel is &lt;5.14.21-150500.13.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770955" version="1" comment="kernel-rt_debug-livepatch-devel is &lt;5.14.21-150500.13.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770956" version="1" comment="kernel-rt_debug-vdso is &lt;5.14.21-150500.13.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770957" version="1" comment="kernel-source-rt is &lt;5.14.21-150500.13.5.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770958" version="1" comment="kernel-syms-rt is &lt;5.14.21-150500.13.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770959" version="1" comment="kselftests-kmp-rt is &lt;5.14.21-150500.13.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770960" version="1" comment="ocfs2-kmp-rt is &lt;5.14.21-150500.13.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770961" version="1" comment="reiserfs-kmp-rt is &lt;5.14.21-150500.13.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769137" version="1" comment="geoipupdate is &lt;4.2.2-150000.1.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769138" version="1" comment="geoipupdate-legacy is &lt;4.2.2-150000.1.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769975" version="1" comment="librabbitmq-devel is &lt;0.10.0-150300.5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769976" version="1" comment="librabbitmq4 is &lt;0.10.0-150300.5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769977" version="1" comment="rabbitmq-c-tools is &lt;0.10.0-150300.5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770485" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770486" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770487" version="1" comment="libQt5Concurrent-devel is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770488" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770489" version="1" comment="libQt5Concurrent5 is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770490" version="1" comment="libQt5Concurrent5-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770491" version="1" comment="libQt5Core-devel is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770492" version="1" comment="libQt5Core-devel-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770493" version="1" comment="libQt5Core-private-headers-devel is &lt;5.15.8+kde185-150500.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770494" version="1" comment="libQt5Core5 is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770495" version="1" comment="libQt5Core5-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770496" version="1" comment="libQt5DBus-devel is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770497" version="1" comment="libQt5DBus-devel-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770498" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.15.8+kde185-150500.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770499" version="1" comment="libQt5DBus5 is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770500" version="1" comment="libQt5DBus5-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770501" version="1" comment="libQt5Gui-devel is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770502" version="1" comment="libQt5Gui-devel-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770503" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.15.8+kde185-150500.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770504" version="1" comment="libQt5Gui5 is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770505" version="1" comment="libQt5Gui5-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770506" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770507" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.15.8+kde185-150500.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770508" version="1" comment="libQt5Network-devel is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770509" version="1" comment="libQt5Network-devel-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770510" version="1" comment="libQt5Network-private-headers-devel is &lt;5.15.8+kde185-150500.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770511" version="1" comment="libQt5Network5 is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770512" version="1" comment="libQt5Network5-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770513" version="1" comment="libQt5OpenGL-devel is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770514" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770515" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.15.8+kde185-150500.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770516" version="1" comment="libQt5OpenGL5 is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770517" version="1" comment="libQt5OpenGL5-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770518" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770519" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770520" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770521" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770522" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770523" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.15.8+kde185-150500.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770524" version="1" comment="libQt5PrintSupport-devel is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770525" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770526" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.15.8+kde185-150500.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770527" version="1" comment="libQt5PrintSupport5 is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770528" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770529" version="1" comment="libQt5Sql-devel is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770530" version="1" comment="libQt5Sql-devel-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770531" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.15.8+kde185-150500.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770532" version="1" comment="libQt5Sql5 is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770533" version="1" comment="libQt5Sql5-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770534" version="1" comment="libQt5Sql5-mysql is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770535" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770536" version="1" comment="libQt5Sql5-postgresql is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770537" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770538" version="1" comment="libQt5Sql5-sqlite is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770539" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770540" version="1" comment="libQt5Sql5-unixODBC is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770541" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770542" version="1" comment="libQt5Test-devel is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770543" version="1" comment="libQt5Test-devel-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770544" version="1" comment="libQt5Test-private-headers-devel is &lt;5.15.8+kde185-150500.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770545" version="1" comment="libQt5Test5 is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770546" version="1" comment="libQt5Test5-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770547" version="1" comment="libQt5Widgets-devel is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770548" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770549" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.15.8+kde185-150500.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770550" version="1" comment="libQt5Widgets5 is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770551" version="1" comment="libQt5Widgets5-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770552" version="1" comment="libQt5Xml-devel is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770553" version="1" comment="libQt5Xml-devel-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770554" version="1" comment="libQt5Xml5 is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770555" version="1" comment="libQt5Xml5-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770556" version="1" comment="libqt5-qtbase-common-devel is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770557" version="1" comment="libqt5-qtbase-devel is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770558" version="1" comment="libqt5-qtbase-examples is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770559" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.15.8+kde185-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770560" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770561" version="1" comment="libqt5-qtbase-platformtheme-xdgdesktopportal is &lt;5.15.8+kde185-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770562" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.15.8+kde185-150500.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767142" version="1" comment="apache2-mod_php7 is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767143" version="1" comment="php7 is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767144" version="1" comment="php7-bcmath is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767145" version="1" comment="php7-bz2 is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767146" version="1" comment="php7-calendar is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767147" version="1" comment="php7-cli is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767148" version="1" comment="php7-ctype is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767149" version="1" comment="php7-curl is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767150" version="1" comment="php7-dba is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767151" version="1" comment="php7-devel is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767152" version="1" comment="php7-dom is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767153" version="1" comment="php7-embed is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767154" version="1" comment="php7-enchant is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767155" version="1" comment="php7-exif is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767156" version="1" comment="php7-fastcgi is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767157" version="1" comment="php7-fileinfo is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767158" version="1" comment="php7-fpm is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767159" version="1" comment="php7-ftp is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767160" version="1" comment="php7-gd is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767161" version="1" comment="php7-gettext is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767162" version="1" comment="php7-gmp is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767163" version="1" comment="php7-iconv is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767164" version="1" comment="php7-intl is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767165" version="1" comment="php7-json is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767166" version="1" comment="php7-ldap is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767167" version="1" comment="php7-mbstring is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767168" version="1" comment="php7-mysql is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767169" version="1" comment="php7-odbc is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767170" version="1" comment="php7-opcache is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767171" version="1" comment="php7-openssl is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767172" version="1" comment="php7-pcntl is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767173" version="1" comment="php7-pdo is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767174" version="1" comment="php7-pgsql is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767175" version="1" comment="php7-phar is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767176" version="1" comment="php7-posix is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767177" version="1" comment="php7-readline is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767178" version="1" comment="php7-shmop is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767179" version="1" comment="php7-snmp is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767180" version="1" comment="php7-soap is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767181" version="1" comment="php7-sockets is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767182" version="1" comment="php7-sodium is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767183" version="1" comment="php7-sqlite is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767184" version="1" comment="php7-sysvmsg is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767185" version="1" comment="php7-sysvsem is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767186" version="1" comment="php7-sysvshm is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767187" version="1" comment="php7-test is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767188" version="1" comment="php7-tidy is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767189" version="1" comment="php7-tokenizer is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767190" version="1" comment="php7-xmlreader is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767191" version="1" comment="php7-xmlrpc is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767192" version="1" comment="php7-xmlwriter is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767193" version="1" comment="php7-xsl is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767194" version="1" comment="php7-zip is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767195" version="1" comment="php7-zlib is &lt;7.4.33-150400.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770405" version="1" comment="ghostscript is &lt;9.52-150000.167.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770406" version="1" comment="ghostscript-devel is &lt;9.52-150000.167.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770407" version="1" comment="ghostscript-x11 is &lt;9.52-150000.167.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770846" version="1" comment="kernel-vanilla is &lt;4.12.14-150100.197.151.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770847" version="1" comment="kernel-vanilla-base is &lt;4.12.14-150100.197.151.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770848" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-150100.197.151.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770849" version="1" comment="kernel-vanilla-livepatch-devel is &lt;4.12.14-150100.197.151.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771329" version="1" comment="bind is &lt;9.16.42-150500.8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771330" version="1" comment="bind-doc is &lt;9.16.42-150500.8.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771331" version="1" comment="bind-utils is &lt;9.16.42-150500.8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771332" version="1" comment="python3-bind is &lt;9.16.42-150500.8.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771998" version="1" comment="python3-Django is &lt;2.0.7-150000.1.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769317" version="1" comment="bouncycastle is &lt;1.74-150200.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769318" version="1" comment="bouncycastle-javadoc is &lt;1.74-150200.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769334" version="1" comment="bouncycastle-jmail is &lt;1.74-150200.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769319" version="1" comment="bouncycastle-mail is &lt;1.74-150200.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769320" version="1" comment="bouncycastle-pg is &lt;1.74-150200.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769321" version="1" comment="bouncycastle-pkix is &lt;1.74-150200.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769322" version="1" comment="bouncycastle-tls is &lt;1.74-150200.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769323" version="1" comment="bouncycastle-util is &lt;1.74-150200.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771919" version="1" comment="go1.19 is &lt;1.19.11-150000.1.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771920" version="1" comment="go1.19-doc is &lt;1.19.11-150000.1.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771925" version="1" comment="go1.19-race is &lt;1.19.11-150000.1.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771922" version="1" comment="go1.20 is &lt;1.20.6-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771923" version="1" comment="go1.20-doc is &lt;1.20.6-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771924" version="1" comment="go1.20-race is &lt;1.20.6-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770929" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr8.6-150000.3.77.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770930" version="1" comment="java-1_8_0-ibm-32bit is &lt;1.8.0_sr8.6-150000.3.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770931" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr8.6-150000.3.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770932" version="1" comment="java-1_8_0-ibm-demo is &lt;1.8.0_sr8.6-150000.3.77.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770933" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr8.6-150000.3.77.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770934" version="1" comment="java-1_8_0-ibm-devel-32bit is &lt;1.8.0_sr8.6-150000.3.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770935" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr8.6-150000.3.77.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770936" version="1" comment="java-1_8_0-ibm-src is &lt;1.8.0_sr8.6-150000.3.77.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767761" version="1" comment="python3-requests is &lt;2.24.0-150300.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771841" version="1" comment="cluster-md-kmp-64kb is &lt;5.14.21-150500.55.7.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771842" version="1" comment="cluster-md-kmp-default is &lt;5.14.21-150500.55.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771843" version="1" comment="dlm-kmp-64kb is &lt;5.14.21-150500.55.7.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771844" version="1" comment="dlm-kmp-default is &lt;5.14.21-150500.55.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771845" version="1" comment="dtb-allwinner is &lt;5.14.21-150500.55.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771846" version="1" comment="dtb-altera is &lt;5.14.21-150500.55.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771847" version="1" comment="dtb-amazon is &lt;5.14.21-150500.55.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771848" version="1" comment="dtb-amd is &lt;5.14.21-150500.55.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771849" version="1" comment="dtb-amlogic is &lt;5.14.21-150500.55.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771850" version="1" comment="dtb-apm is &lt;5.14.21-150500.55.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771851" version="1" comment="dtb-apple is &lt;5.14.21-150500.55.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771852" version="1" comment="dtb-arm is &lt;5.14.21-150500.55.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771853" version="1" comment="dtb-broadcom is &lt;5.14.21-150500.55.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771854" version="1" comment="dtb-cavium is &lt;5.14.21-150500.55.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771855" version="1" comment="dtb-exynos is &lt;5.14.21-150500.55.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771856" version="1" comment="dtb-freescale is &lt;5.14.21-150500.55.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771857" version="1" comment="dtb-hisilicon is &lt;5.14.21-150500.55.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771858" version="1" comment="dtb-lg is &lt;5.14.21-150500.55.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771859" version="1" comment="dtb-marvell is &lt;5.14.21-150500.55.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771860" version="1" comment="dtb-mediatek is &lt;5.14.21-150500.55.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771861" version="1" comment="dtb-nvidia is &lt;5.14.21-150500.55.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771862" version="1" comment="dtb-qcom is &lt;5.14.21-150500.55.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771863" version="1" comment="dtb-renesas is &lt;5.14.21-150500.55.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771864" version="1" comment="dtb-rockchip is &lt;5.14.21-150500.55.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771865" version="1" comment="dtb-socionext is &lt;5.14.21-150500.55.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771866" version="1" comment="dtb-sprd is &lt;5.14.21-150500.55.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771867" version="1" comment="dtb-xilinx is &lt;5.14.21-150500.55.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771868" version="1" comment="gfs2-kmp-64kb is &lt;5.14.21-150500.55.7.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771869" version="1" comment="gfs2-kmp-default is &lt;5.14.21-150500.55.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771870" version="1" comment="kernel-64kb is &lt;5.14.21-150500.55.7.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771871" version="1" comment="kernel-64kb-devel is &lt;5.14.21-150500.55.7.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771872" version="1" comment="kernel-64kb-extra is &lt;5.14.21-150500.55.7.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771873" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.14.21-150500.55.7.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771874" version="1" comment="kernel-64kb-optional is &lt;5.14.21-150500.55.7.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771875" version="1" comment="kernel-debug is &lt;5.14.21-150500.55.7.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771876" version="1" comment="kernel-debug-devel is &lt;5.14.21-150500.55.7.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771877" version="1" comment="kernel-debug-livepatch-devel is &lt;5.14.21-150500.55.7.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771878" version="1" comment="kernel-debug-vdso is &lt;5.14.21-150500.55.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771879" version="1" comment="kernel-default is &lt;5.14.21-150500.55.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771880" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.7.1.150500.6.2.5 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771881" version="1" comment="kernel-default-base-rebuild is &lt;5.14.21-150500.55.7.1.150500.6.2.5 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771882" version="1" comment="kernel-default-devel is &lt;5.14.21-150500.55.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771883" version="1" comment="kernel-default-extra is &lt;5.14.21-150500.55.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771884" version="1" comment="kernel-default-livepatch is &lt;5.14.21-150500.55.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771885" version="1" comment="kernel-default-livepatch-devel is &lt;5.14.21-150500.55.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771886" version="1" comment="kernel-default-optional is &lt;5.14.21-150500.55.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771887" version="1" comment="kernel-default-vdso is &lt;5.14.21-150500.55.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771888" version="1" comment="kernel-devel is &lt;5.14.21-150500.55.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771889" version="1" comment="kernel-docs is &lt;5.14.21-150500.55.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771890" version="1" comment="kernel-docs-html is &lt;5.14.21-150500.55.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771891" version="1" comment="kernel-kvmsmall is &lt;5.14.21-150500.55.7.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771892" version="1" comment="kernel-kvmsmall-devel is &lt;5.14.21-150500.55.7.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771893" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.14.21-150500.55.7.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771894" version="1" comment="kernel-kvmsmall-vdso is &lt;5.14.21-150500.55.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771895" version="1" comment="kernel-macros is &lt;5.14.21-150500.55.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771896" version="1" comment="kernel-obs-build is &lt;5.14.21-150500.55.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771897" version="1" comment="kernel-obs-qa is &lt;5.14.21-150500.55.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771898" version="1" comment="kernel-source is &lt;5.14.21-150500.55.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771899" version="1" comment="kernel-source-vanilla is &lt;5.14.21-150500.55.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771900" version="1" comment="kernel-syms is &lt;5.14.21-150500.55.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771901" version="1" comment="kernel-zfcpdump is &lt;5.14.21-150500.55.7.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771902" version="1" comment="kselftests-kmp-64kb is &lt;5.14.21-150500.55.7.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771903" version="1" comment="kselftests-kmp-default is &lt;5.14.21-150500.55.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771904" version="1" comment="ocfs2-kmp-64kb is &lt;5.14.21-150500.55.7.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771905" version="1" comment="ocfs2-kmp-default is &lt;5.14.21-150500.55.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771906" version="1" comment="reiserfs-kmp-64kb is &lt;5.14.21-150500.55.7.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771907" version="1" comment="reiserfs-kmp-default is &lt;5.14.21-150500.55.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769140" version="1" comment="dbus-1 is &lt;1.12.2-150400.18.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769141" version="1" comment="dbus-1-devel is &lt;1.12.2-150400.18.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769142" version="1" comment="dbus-1-devel-32bit is &lt;1.12.2-150400.18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769143" version="1" comment="dbus-1-devel-doc is &lt;1.12.2-150400.18.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769144" version="1" comment="dbus-1-x11 is &lt;1.12.2-150400.18.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769145" version="1" comment="libdbus-1-3 is &lt;1.12.2-150400.18.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769146" version="1" comment="libdbus-1-3-32bit is &lt;1.12.2-150400.18.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767125" version="1" comment="ImageMagick is &lt;7.1.0.9-150400.6.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767126" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.0.9-150400.6.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767127" version="1" comment="ImageMagick-config-7-upstream is &lt;7.1.0.9-150400.6.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767128" version="1" comment="ImageMagick-devel is &lt;7.1.0.9-150400.6.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767129" version="1" comment="ImageMagick-devel-32bit is &lt;7.1.0.9-150400.6.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767130" version="1" comment="ImageMagick-doc is &lt;7.1.0.9-150400.6.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767131" version="1" comment="ImageMagick-extra is &lt;7.1.0.9-150400.6.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767132" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.0.9-150400.6.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767133" version="1" comment="libMagick++-7_Q16HDRI5-32bit is &lt;7.1.0.9-150400.6.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767134" version="1" comment="libMagick++-devel is &lt;7.1.0.9-150400.6.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767135" version="1" comment="libMagick++-devel-32bit is &lt;7.1.0.9-150400.6.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767136" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.0.9-150400.6.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767137" version="1" comment="libMagickCore-7_Q16HDRI10-32bit is &lt;7.1.0.9-150400.6.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767138" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.0.9-150400.6.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767139" version="1" comment="libMagickWand-7_Q16HDRI10-32bit is &lt;7.1.0.9-150400.6.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009767140" version="1" comment="perl-PerlMagick is &lt;7.1.0.9-150400.6.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771311" version="1" comment="perl is &lt;5.26.1-150300.17.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771312" version="1" comment="perl-32bit is &lt;5.26.1-150300.17.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771313" version="1" comment="perl-base is &lt;5.26.1-150300.17.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771314" version="1" comment="perl-base-32bit is &lt;5.26.1-150300.17.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771315" version="1" comment="perl-core-DB_File is &lt;5.26.1-150300.17.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771316" version="1" comment="perl-core-DB_File-32bit is &lt;5.26.1-150300.17.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771317" version="1" comment="perl-doc is &lt;5.26.1-150300.17.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771603" version="1" comment="libpython3_10-1_0 is &lt;3.10.12-150400.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771604" version="1" comment="libpython3_10-1_0-32bit is &lt;3.10.12-150400.4.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771605" version="1" comment="python310 is &lt;3.10.12-150400.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771606" version="1" comment="python310-32bit is &lt;3.10.12-150400.4.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771607" version="1" comment="python310-base is &lt;3.10.12-150400.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771608" version="1" comment="python310-base-32bit is &lt;3.10.12-150400.4.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771609" version="1" comment="python310-curses is &lt;3.10.12-150400.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771610" version="1" comment="python310-dbm is &lt;3.10.12-150400.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771611" version="1" comment="python310-devel is &lt;3.10.12-150400.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771612" version="1" comment="python310-doc is &lt;3.10.12-150400.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771613" version="1" comment="python310-doc-devhelp is &lt;3.10.12-150400.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771614" version="1" comment="python310-idle is &lt;3.10.12-150400.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771615" version="1" comment="python310-testsuite is &lt;3.10.12-150400.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771616" version="1" comment="python310-tk is &lt;3.10.12-150400.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771617" version="1" comment="python310-tools is &lt;3.10.12-150400.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771913" version="1" comment="MozillaFirefox is &lt;115.0-150200.152.93.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771914" version="1" comment="MozillaFirefox-branding-SLE is &lt;115-150200.9.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771915" version="1" comment="MozillaFirefox-branding-upstream is &lt;115.0-150200.152.93.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771916" version="1" comment="MozillaFirefox-devel is &lt;115.0-150200.152.93.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771917" version="1" comment="MozillaFirefox-translations-common is &lt;115.0-150200.152.93.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771918" version="1" comment="MozillaFirefox-translations-other is &lt;115.0-150200.152.93.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772228" version="1" comment="curl is &lt;8.0.1-150400.5.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772229" version="1" comment="libcurl-devel is &lt;8.0.1-150400.5.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772230" version="1" comment="libcurl-devel-32bit is &lt;8.0.1-150400.5.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772231" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772232" version="1" comment="libcurl4-32bit is &lt;8.0.1-150400.5.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771768" version="1" comment="cluster-md-kmp-azure is &lt;5.14.21-150500.33.6.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771769" version="1" comment="dlm-kmp-azure is &lt;5.14.21-150500.33.6.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771770" version="1" comment="gfs2-kmp-azure is &lt;5.14.21-150500.33.6.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771771" version="1" comment="kernel-azure is &lt;5.14.21-150500.33.6.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771772" version="1" comment="kernel-azure-devel is &lt;5.14.21-150500.33.6.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771773" version="1" comment="kernel-azure-extra is &lt;5.14.21-150500.33.6.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771774" version="1" comment="kernel-azure-livepatch-devel is &lt;5.14.21-150500.33.6.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771775" version="1" comment="kernel-azure-optional is &lt;5.14.21-150500.33.6.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771776" version="1" comment="kernel-azure-vdso is &lt;5.14.21-150500.33.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771777" version="1" comment="kernel-devel-azure is &lt;5.14.21-150500.33.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771778" version="1" comment="kernel-source-azure is &lt;5.14.21-150500.33.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771779" version="1" comment="kernel-syms-azure is &lt;5.14.21-150500.33.6.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771780" version="1" comment="kselftests-kmp-azure is &lt;5.14.21-150500.33.6.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771781" version="1" comment="ocfs2-kmp-azure is &lt;5.14.21-150500.33.6.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771782" version="1" comment="reiserfs-kmp-azure is &lt;5.14.21-150500.33.6.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771307" version="1" comment="python3-azure-core is &lt;1.23.1-150100.3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771308" version="1" comment="python3-azure-storage-blob is &lt;12.13.1-150100.3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770205" version="1" comment="grafana is &lt;9.5.5-150200.3.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768332" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150500.17.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768675" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1l-150500.17.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768333" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150500.17.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768334" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1l-150500.17.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768335" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150500.17.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768336" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1l-150500.17.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768337" version="1" comment="openssl-1_1 is &lt;1.1.1l-150500.17.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009768676" version="1" comment="openssl-1_1-doc is &lt;1.1.1l-150500.17.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772174" version="1" comment="redis is &lt;6.2.6-150400.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772191" version="1" comment="redis7 is &lt;7.0.8-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772867" version="1" comment="ctdb is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772868" version="1" comment="ctdb-pcp-pmda is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772869" version="1" comment="libsamba-policy-devel is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772870" version="1" comment="libsamba-policy-python3-devel is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772871" version="1" comment="libsamba-policy0-python3 is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772872" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772873" version="1" comment="samba is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772874" version="1" comment="samba-ceph is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772875" version="1" comment="samba-client is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772876" version="1" comment="samba-client-32bit is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772877" version="1" comment="samba-client-libs is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772878" version="1" comment="samba-client-libs-32bit is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772879" version="1" comment="samba-devel is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772880" version="1" comment="samba-devel-32bit is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772881" version="1" comment="samba-doc is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772882" version="1" comment="samba-gpupdate is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772883" version="1" comment="samba-ldb-ldap is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772884" version="1" comment="samba-libs is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772885" version="1" comment="samba-libs-32bit is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772886" version="1" comment="samba-libs-python3 is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772887" version="1" comment="samba-libs-python3-32bit is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772888" version="1" comment="samba-python3 is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772889" version="1" comment="samba-test is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772890" version="1" comment="samba-tool is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772891" version="1" comment="samba-winbind is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772892" version="1" comment="samba-winbind-libs is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772893" version="1" comment="samba-winbind-libs-32bit is &lt;4.17.9+git.367.dae41ffdd1f-150500.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769147" version="1" comment="python311-pip is &lt;22.3.1-150400.17.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772520" version="1" comment="libpython3_11-1_0 is &lt;3.11.4-150400.9.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772521" version="1" comment="libpython3_11-1_0-32bit is &lt;3.11.4-150400.9.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772522" version="1" comment="python311 is &lt;3.11.4-150400.9.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772523" version="1" comment="python311-32bit is &lt;3.11.4-150400.9.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772524" version="1" comment="python311-base is &lt;3.11.4-150400.9.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772525" version="1" comment="python311-base-32bit is &lt;3.11.4-150400.9.15.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772526" version="1" comment="python311-curses is &lt;3.11.4-150400.9.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772527" version="1" comment="python311-dbm is &lt;3.11.4-150400.9.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772528" version="1" comment="python311-devel is &lt;3.11.4-150400.9.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772529" version="1" comment="python311-doc is &lt;3.11.4-150400.9.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772530" version="1" comment="python311-doc-devhelp is &lt;3.11.4-150400.9.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772531" version="1" comment="python311-idle is &lt;3.11.4-150400.9.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772532" version="1" comment="python311-testsuite is &lt;3.11.4-150400.9.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772533" version="1" comment="python311-tk is &lt;3.11.4-150400.9.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772534" version="1" comment="python311-tools is &lt;3.11.4-150400.9.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772775" version="1" comment="openssh is &lt;8.4p1-150300.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772776" version="1" comment="openssh-askpass-gnome is &lt;8.4p1-150300.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772777" version="1" comment="openssh-cavs is &lt;8.4p1-150300.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772778" version="1" comment="openssh-clients is &lt;8.4p1-150300.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772779" version="1" comment="openssh-common is &lt;8.4p1-150300.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772780" version="1" comment="openssh-fips is &lt;8.4p1-150300.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772781" version="1" comment="openssh-helpers is &lt;8.4p1-150300.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772782" version="1" comment="openssh-server is &lt;8.4p1-150300.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771618" version="1" comment="libpython3_9-1_0 is &lt;3.9.17-150300.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771619" version="1" comment="libpython3_9-1_0-32bit is &lt;3.9.17-150300.4.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771620" version="1" comment="python39 is &lt;3.9.17-150300.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771621" version="1" comment="python39-32bit is &lt;3.9.17-150300.4.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771622" version="1" comment="python39-base is &lt;3.9.17-150300.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771623" version="1" comment="python39-base-32bit is &lt;3.9.17-150300.4.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771624" version="1" comment="python39-curses is &lt;3.9.17-150300.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771625" version="1" comment="python39-dbm is &lt;3.9.17-150300.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771626" version="1" comment="python39-devel is &lt;3.9.17-150300.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771627" version="1" comment="python39-doc is &lt;3.9.17-150300.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771628" version="1" comment="python39-doc-devhelp is &lt;3.9.17-150300.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771629" version="1" comment="python39-idle is &lt;3.9.17-150300.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771630" version="1" comment="python39-testsuite is &lt;3.9.17-150300.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771631" version="1" comment="python39-tk is &lt;3.9.17-150300.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771632" version="1" comment="python39-tools is &lt;3.9.17-150300.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772538" version="1" comment="MozillaFirefox is &lt;115.0.2-150200.152.96.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772539" version="1" comment="MozillaFirefox-branding-upstream is &lt;115.0.2-150200.152.96.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772540" version="1" comment="MozillaFirefox-devel is &lt;115.0.2-150200.152.96.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772541" version="1" comment="MozillaFirefox-translations-common is &lt;115.0.2-150200.152.96.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772542" version="1" comment="MozillaFirefox-translations-other is &lt;115.0.2-150200.152.96.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772572" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150500.17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772573" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1l-150500.17.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772574" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150500.17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772575" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1l-150500.17.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772576" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150500.17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772577" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1l-150500.17.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772578" version="1" comment="openssl-1_1 is &lt;1.1.1l-150500.17.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772579" version="1" comment="openssl-1_1-doc is &lt;1.1.1l-150500.17.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772972" version="1" comment="libQt5Svg5 is &lt;5.15.8+kde8-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772973" version="1" comment="libQt5Svg5-32bit is &lt;5.15.8+kde8-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772974" version="1" comment="libqt5-qtsvg-devel is &lt;5.15.8+kde8-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772975" version="1" comment="libqt5-qtsvg-devel-32bit is &lt;5.15.8+kde8-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772976" version="1" comment="libqt5-qtsvg-examples is &lt;5.15.8+kde8-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772977" version="1" comment="libqt5-qtsvg-private-headers-devel is &lt;5.15.8+kde8-150500.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772175" version="1" comment="python3-scipy_1_2_0-gnu-hpc is &lt;1.2.0-150100.4.6.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769969" version="1" comment="netty is &lt;4.1.94-150200.4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769970" version="1" comment="netty-javadoc is &lt;4.1.94-150200.4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769971" version="1" comment="netty-poms is &lt;4.1.94-150200.4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769972" version="1" comment="netty-tcnative is &lt;2.0.61-150200.3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769973" version="1" comment="netty-tcnative-javadoc is &lt;2.0.61-150200.3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764658" version="1" comment="mysql-connector-java is &lt;8.0.33-150200.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772772" version="1" comment="iperf is &lt;3.5-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772773" version="1" comment="iperf-devel is &lt;3.5-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772774" version="1" comment="libiperf0 is &lt;3.5-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772072" version="1" comment="conmon is &lt;2.1.7-150500.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772535" version="1" comment="go1.20-openssl is &lt;1.20.6.1-150000.1.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772536" version="1" comment="go1.20-openssl-doc is &lt;1.20.6.1-150000.1.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772537" version="1" comment="go1.20-openssl-race is &lt;1.20.6.1-150000.1.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772566" version="1" comment="libopenssl-3-devel is &lt;3.0.8-150500.5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772567" version="1" comment="libopenssl-3-devel-32bit is &lt;3.0.8-150500.5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772568" version="1" comment="libopenssl3 is &lt;3.0.8-150500.5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772569" version="1" comment="libopenssl3-32bit is &lt;3.0.8-150500.5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772570" version="1" comment="openssl-3 is &lt;3.0.8-150500.5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772571" version="1" comment="openssl-3-doc is &lt;3.0.8-150500.5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772894" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772895" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772896" version="1" comment="libQt5Concurrent-devel is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772897" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772898" version="1" comment="libQt5Concurrent5 is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772899" version="1" comment="libQt5Concurrent5-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772900" version="1" comment="libQt5Core-devel is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772901" version="1" comment="libQt5Core-devel-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772902" version="1" comment="libQt5Core-private-headers-devel is &lt;5.15.8+kde185-150500.4.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772903" version="1" comment="libQt5Core5 is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772904" version="1" comment="libQt5Core5-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772905" version="1" comment="libQt5DBus-devel is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772906" version="1" comment="libQt5DBus-devel-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772907" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.15.8+kde185-150500.4.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772908" version="1" comment="libQt5DBus5 is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772909" version="1" comment="libQt5DBus5-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772910" version="1" comment="libQt5Gui-devel is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772911" version="1" comment="libQt5Gui-devel-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772912" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.15.8+kde185-150500.4.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772913" version="1" comment="libQt5Gui5 is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772914" version="1" comment="libQt5Gui5-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772915" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772916" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.15.8+kde185-150500.4.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772917" version="1" comment="libQt5Network-devel is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772918" version="1" comment="libQt5Network-devel-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772919" version="1" comment="libQt5Network-private-headers-devel is &lt;5.15.8+kde185-150500.4.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772920" version="1" comment="libQt5Network5 is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772921" version="1" comment="libQt5Network5-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772922" version="1" comment="libQt5OpenGL-devel is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772923" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772924" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.15.8+kde185-150500.4.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772925" version="1" comment="libQt5OpenGL5 is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772926" version="1" comment="libQt5OpenGL5-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772927" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772928" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772929" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772930" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772931" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772932" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.15.8+kde185-150500.4.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772933" version="1" comment="libQt5PrintSupport-devel is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772934" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772935" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.15.8+kde185-150500.4.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772936" version="1" comment="libQt5PrintSupport5 is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772937" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772938" version="1" comment="libQt5Sql-devel is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772939" version="1" comment="libQt5Sql-devel-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772940" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.15.8+kde185-150500.4.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772941" version="1" comment="libQt5Sql5 is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772942" version="1" comment="libQt5Sql5-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772943" version="1" comment="libQt5Sql5-mysql is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772944" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772945" version="1" comment="libQt5Sql5-postgresql is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772946" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772947" version="1" comment="libQt5Sql5-sqlite is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772948" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772949" version="1" comment="libQt5Sql5-unixODBC is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772950" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772951" version="1" comment="libQt5Test-devel is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772952" version="1" comment="libQt5Test-devel-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772953" version="1" comment="libQt5Test-private-headers-devel is &lt;5.15.8+kde185-150500.4.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772954" version="1" comment="libQt5Test5 is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772955" version="1" comment="libQt5Test5-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772956" version="1" comment="libQt5Widgets-devel is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772957" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772958" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.15.8+kde185-150500.4.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772959" version="1" comment="libQt5Widgets5 is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772960" version="1" comment="libQt5Widgets5-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772961" version="1" comment="libQt5Xml-devel is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772962" version="1" comment="libQt5Xml-devel-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772963" version="1" comment="libQt5Xml5 is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772964" version="1" comment="libQt5Xml5-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772965" version="1" comment="libqt5-qtbase-common-devel is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772966" version="1" comment="libqt5-qtbase-devel is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772967" version="1" comment="libqt5-qtbase-examples is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772968" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.15.8+kde185-150500.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772969" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772970" version="1" comment="libqt5-qtbase-platformtheme-xdgdesktopportal is &lt;5.15.8+kde185-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772971" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.15.8+kde185-150500.4.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774985" version="1" comment="kernel-firmware is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774986" version="1" comment="kernel-firmware-all is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774987" version="1" comment="kernel-firmware-amdgpu is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774988" version="1" comment="kernel-firmware-ath10k is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774989" version="1" comment="kernel-firmware-ath11k is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774990" version="1" comment="kernel-firmware-atheros is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774991" version="1" comment="kernel-firmware-bluetooth is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774992" version="1" comment="kernel-firmware-bnx2 is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774993" version="1" comment="kernel-firmware-brcm is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774994" version="1" comment="kernel-firmware-chelsio is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774995" version="1" comment="kernel-firmware-dpaa2 is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774996" version="1" comment="kernel-firmware-i915 is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774997" version="1" comment="kernel-firmware-intel is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774998" version="1" comment="kernel-firmware-iwlwifi is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774999" version="1" comment="kernel-firmware-liquidio is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775000" version="1" comment="kernel-firmware-marvell is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775001" version="1" comment="kernel-firmware-media is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775002" version="1" comment="kernel-firmware-mediatek is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775003" version="1" comment="kernel-firmware-mellanox is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775004" version="1" comment="kernel-firmware-mwifiex is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775005" version="1" comment="kernel-firmware-network is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775006" version="1" comment="kernel-firmware-nfp is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775007" version="1" comment="kernel-firmware-nvidia is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775008" version="1" comment="kernel-firmware-platform is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775009" version="1" comment="kernel-firmware-prestera is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775010" version="1" comment="kernel-firmware-qcom is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775011" version="1" comment="kernel-firmware-qlogic is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775012" version="1" comment="kernel-firmware-radeon is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775013" version="1" comment="kernel-firmware-realtek is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775014" version="1" comment="kernel-firmware-serial is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775015" version="1" comment="kernel-firmware-sound is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775016" version="1" comment="kernel-firmware-ti is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775017" version="1" comment="kernel-firmware-ueagle is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775018" version="1" comment="kernel-firmware-usb-network is &lt;20230724-150500.3.3.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775019" version="1" comment="ucode-amd is &lt;20230724-150500.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773749" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.52.10-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773750" version="1" comment="gdk-pixbuf-loader-rsvg-32bit is &lt;2.52.10-150400.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773751" version="1" comment="librsvg-2-2 is &lt;2.52.10-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773752" version="1" comment="librsvg-2-2-32bit is &lt;2.52.10-150400.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773753" version="1" comment="librsvg-devel is &lt;2.52.10-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773754" version="1" comment="rsvg-convert is &lt;2.52.10-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773755" version="1" comment="rsvg-thumbnailer is &lt;2.52.10-150400.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773756" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.52.10-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775314" version="1" comment="java-17-openjdk is &lt;17.0.8.0-150400.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775315" version="1" comment="java-17-openjdk-demo is &lt;17.0.8.0-150400.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775316" version="1" comment="java-17-openjdk-devel is &lt;17.0.8.0-150400.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775317" version="1" comment="java-17-openjdk-headless is &lt;17.0.8.0-150400.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775318" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.8.0-150400.3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775319" version="1" comment="java-17-openjdk-jmods is &lt;17.0.8.0-150400.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775320" version="1" comment="java-17-openjdk-src is &lt;17.0.8.0-150400.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774950" version="1" comment="libvirt is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774951" version="1" comment="libvirt-client is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774952" version="1" comment="libvirt-client-qemu is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774953" version="1" comment="libvirt-daemon is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774954" version="1" comment="libvirt-daemon-config-network is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774955" version="1" comment="libvirt-daemon-config-nwfilter is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774956" version="1" comment="libvirt-daemon-driver-interface is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774957" version="1" comment="libvirt-daemon-driver-libxl is &lt;9.0.0-150500.6.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774958" version="1" comment="libvirt-daemon-driver-lxc is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774959" version="1" comment="libvirt-daemon-driver-network is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774960" version="1" comment="libvirt-daemon-driver-nodedev is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774961" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774962" version="1" comment="libvirt-daemon-driver-qemu is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774963" version="1" comment="libvirt-daemon-driver-secret is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774964" version="1" comment="libvirt-daemon-driver-storage is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774965" version="1" comment="libvirt-daemon-driver-storage-core is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774966" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774967" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774968" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774969" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774970" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774971" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774972" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;9.0.0-150500.6.11.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774973" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774974" version="1" comment="libvirt-daemon-hooks is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774975" version="1" comment="libvirt-daemon-lxc is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774976" version="1" comment="libvirt-daemon-qemu is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774977" version="1" comment="libvirt-daemon-xen is &lt;9.0.0-150500.6.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774978" version="1" comment="libvirt-devel is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774979" version="1" comment="libvirt-devel-32bit is &lt;9.0.0-150500.6.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774980" version="1" comment="libvirt-doc is &lt;9.0.0-150500.6.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774981" version="1" comment="libvirt-libs is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774982" version="1" comment="libvirt-lock-sanlock is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774983" version="1" comment="libvirt-nss is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774984" version="1" comment="wireshark-plugin-libvirt is &lt;9.0.0-150500.6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775321" version="1" comment="MozillaThunderbird is &lt;115.0.1-150200.8.124.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775322" version="1" comment="MozillaThunderbird-translations-common is &lt;115.0.1-150200.8.124.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775323" version="1" comment="MozillaThunderbird-translations-other is &lt;115.0.1-150200.8.124.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775351" version="1" comment="qemu is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775352" version="1" comment="qemu-SLOF is &lt;7.1.0-150500.49.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775353" version="1" comment="qemu-accel-qtest is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775354" version="1" comment="qemu-accel-tcg-x86 is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775355" version="1" comment="qemu-arm is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775356" version="1" comment="qemu-audio-alsa is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775357" version="1" comment="qemu-audio-dbus is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775358" version="1" comment="qemu-audio-jack is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775359" version="1" comment="qemu-audio-pa is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775360" version="1" comment="qemu-audio-spice is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775361" version="1" comment="qemu-block-curl is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775362" version="1" comment="qemu-block-dmg is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775363" version="1" comment="qemu-block-gluster is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775364" version="1" comment="qemu-block-iscsi is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775365" version="1" comment="qemu-block-nfs is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775366" version="1" comment="qemu-block-rbd is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775367" version="1" comment="qemu-block-ssh is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775368" version="1" comment="qemu-chardev-baum is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775369" version="1" comment="qemu-chardev-spice is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775370" version="1" comment="qemu-extra is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775371" version="1" comment="qemu-guest-agent is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775372" version="1" comment="qemu-hw-display-qxl is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775373" version="1" comment="qemu-hw-display-virtio-gpu is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775374" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775375" version="1" comment="qemu-hw-display-virtio-vga is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775376" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775377" version="1" comment="qemu-hw-usb-host is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775378" version="1" comment="qemu-hw-usb-redirect is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775379" version="1" comment="qemu-hw-usb-smartcard is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775380" version="1" comment="qemu-ipxe is &lt;1.0.0+-150500.49.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775381" version="1" comment="qemu-ivshmem-tools is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775382" version="1" comment="qemu-ksm is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775383" version="1" comment="qemu-kvm is &lt;7.1.0-150500.49.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775384" version="1" comment="qemu-lang is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775385" version="1" comment="qemu-microvm is &lt;7.1.0-150500.49.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775386" version="1" comment="qemu-ppc is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775387" version="1" comment="qemu-s390x is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775388" version="1" comment="qemu-seabios is &lt;1.16.0_0_gd239552-150500.49.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775389" version="1" comment="qemu-sgabios is &lt;8-150500.49.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775390" version="1" comment="qemu-skiboot is &lt;7.1.0-150500.49.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775391" version="1" comment="qemu-tools is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775392" version="1" comment="qemu-ui-curses is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775393" version="1" comment="qemu-ui-dbus is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775394" version="1" comment="qemu-ui-gtk is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775395" version="1" comment="qemu-ui-opengl is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775396" version="1" comment="qemu-ui-spice-app is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775397" version="1" comment="qemu-ui-spice-core is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775398" version="1" comment="qemu-vgabios is &lt;1.16.0_0_gd239552-150500.49.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775399" version="1" comment="qemu-vhost-user-gpu is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775400" version="1" comment="qemu-x86 is &lt;7.1.0-150500.49.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769728" version="1" comment="libxmltooling-devel is &lt;3.1.0-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769729" version="1" comment="libxmltooling-lite9 is &lt;3.1.0-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769730" version="1" comment="libxmltooling9 is &lt;3.1.0-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769731" version="1" comment="xmltooling-schemas is &lt;3.1.0-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769299" version="1" comment="guava is &lt;32.0.1-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769300" version="1" comment="guava-javadoc is &lt;32.0.1-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769301" version="1" comment="guava-testlib is &lt;32.0.1-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772551" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-150000.3.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772552" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2p-150000.3.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772553" version="1" comment="libopenssl10 is &lt;1.0.2p-150000.3.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772554" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-150000.3.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772555" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-150000.3.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772556" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2p-150000.3.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772557" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2p-150000.3.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772558" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2p-150000.3.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772559" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2p-150000.3.82.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772560" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-150000.3.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772561" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2p-150000.3.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772562" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2p-150000.3.82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773767" version="1" comment="python3-salt is &lt;3006.0-150500.4.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773768" version="1" comment="salt is &lt;3006.0-150500.4.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773769" version="1" comment="salt-api is &lt;3006.0-150500.4.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773770" version="1" comment="salt-bash-completion is &lt;3006.0-150500.4.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773771" version="1" comment="salt-cloud is &lt;3006.0-150500.4.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773772" version="1" comment="salt-doc is &lt;3006.0-150500.4.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773773" version="1" comment="salt-fish-completion is &lt;3006.0-150500.4.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773774" version="1" comment="salt-master is &lt;3006.0-150500.4.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773775" version="1" comment="salt-minion is &lt;3006.0-150500.4.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773776" version="1" comment="salt-proxy is &lt;3006.0-150500.4.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773777" version="1" comment="salt-ssh is &lt;3006.0-150500.4.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773778" version="1" comment="salt-standalone-formulas-configuration is &lt;3006.0-150500.4.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773779" version="1" comment="salt-syndic is &lt;3006.0-150500.4.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773780" version="1" comment="salt-tests is &lt;3006.0-150500.4.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773781" version="1" comment="salt-transactional-update is &lt;3006.0-150500.4.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773782" version="1" comment="salt-zsh-completion is &lt;3006.0-150500.4.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773713" version="1" comment="prometheus-blackbox_exporter is &lt;0.24.0-150000.1.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773714" version="1" comment="python3-tornado is &lt;4.5.3-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773715" version="1" comment="spacecmd is &lt;4.3.22-150000.3.101.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773716" version="1" comment="system-user-prometheus is &lt;1.0.0-150000.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775743" version="1" comment="MozillaFirefox is &lt;115.1.0-150200.152.99.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775744" version="1" comment="MozillaFirefox-branding-upstream is &lt;115.1.0-150200.152.99.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775745" version="1" comment="MozillaFirefox-devel is &lt;115.1.0-150200.152.99.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775746" version="1" comment="MozillaFirefox-translations-common is &lt;115.1.0-150200.152.99.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775747" version="1" comment="MozillaFirefox-translations-other is &lt;115.1.0-150200.152.99.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772563" version="1" comment="jtidy is &lt;8.0-150200.11.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772564" version="1" comment="jtidy-javadoc is &lt;8.0-150200.11.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772565" version="1" comment="jtidy-scripts is &lt;8.0-150200.11.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775849" version="1" comment="cluster-md-kmp-64kb is &lt;5.14.21-150500.55.12.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775850" version="1" comment="cluster-md-kmp-default is &lt;5.14.21-150500.55.12.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775851" version="1" comment="dlm-kmp-64kb is &lt;5.14.21-150500.55.12.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775852" version="1" comment="dlm-kmp-default is &lt;5.14.21-150500.55.12.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775853" version="1" comment="dtb-allwinner is &lt;5.14.21-150500.55.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775854" version="1" comment="dtb-altera is &lt;5.14.21-150500.55.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775855" version="1" comment="dtb-amazon is &lt;5.14.21-150500.55.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775856" version="1" comment="dtb-amd is &lt;5.14.21-150500.55.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775857" version="1" comment="dtb-amlogic is &lt;5.14.21-150500.55.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775858" version="1" comment="dtb-apm is &lt;5.14.21-150500.55.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775859" version="1" comment="dtb-apple is &lt;5.14.21-150500.55.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775860" version="1" comment="dtb-arm is &lt;5.14.21-150500.55.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775861" version="1" comment="dtb-broadcom is &lt;5.14.21-150500.55.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775862" version="1" comment="dtb-cavium is &lt;5.14.21-150500.55.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775863" version="1" comment="dtb-exynos is &lt;5.14.21-150500.55.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775864" version="1" comment="dtb-freescale is &lt;5.14.21-150500.55.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775865" version="1" comment="dtb-hisilicon is &lt;5.14.21-150500.55.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775866" version="1" comment="dtb-lg is &lt;5.14.21-150500.55.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775867" version="1" comment="dtb-marvell is &lt;5.14.21-150500.55.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775868" version="1" comment="dtb-mediatek is &lt;5.14.21-150500.55.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775869" version="1" comment="dtb-nvidia is &lt;5.14.21-150500.55.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775870" version="1" comment="dtb-qcom is &lt;5.14.21-150500.55.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775871" version="1" comment="dtb-renesas is &lt;5.14.21-150500.55.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775872" version="1" comment="dtb-rockchip is &lt;5.14.21-150500.55.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775873" version="1" comment="dtb-socionext is &lt;5.14.21-150500.55.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775874" version="1" comment="dtb-sprd is &lt;5.14.21-150500.55.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775875" version="1" comment="dtb-xilinx is &lt;5.14.21-150500.55.12.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775876" version="1" comment="gfs2-kmp-64kb is &lt;5.14.21-150500.55.12.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775877" version="1" comment="gfs2-kmp-default is &lt;5.14.21-150500.55.12.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775878" version="1" comment="kernel-64kb is &lt;5.14.21-150500.55.12.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775879" version="1" comment="kernel-64kb-devel is &lt;5.14.21-150500.55.12.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775880" version="1" comment="kernel-64kb-extra is &lt;5.14.21-150500.55.12.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775881" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.14.21-150500.55.12.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775882" version="1" comment="kernel-64kb-optional is &lt;5.14.21-150500.55.12.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775883" version="1" comment="kernel-debug is &lt;5.14.21-150500.55.12.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775884" version="1" comment="kernel-debug-devel is &lt;5.14.21-150500.55.12.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775885" version="1" comment="kernel-debug-livepatch-devel is &lt;5.14.21-150500.55.12.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775886" version="1" comment="kernel-debug-vdso is &lt;5.14.21-150500.55.12.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775887" version="1" comment="kernel-default is &lt;5.14.21-150500.55.12.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775888" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.12.1.150500.6.4.2 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775889" version="1" comment="kernel-default-base-rebuild is &lt;5.14.21-150500.55.12.1.150500.6.4.2 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775890" version="1" comment="kernel-default-devel is &lt;5.14.21-150500.55.12.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775891" version="1" comment="kernel-default-extra is &lt;5.14.21-150500.55.12.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775892" version="1" comment="kernel-default-livepatch is &lt;5.14.21-150500.55.12.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775893" version="1" comment="kernel-default-livepatch-devel is &lt;5.14.21-150500.55.12.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775894" version="1" comment="kernel-default-optional is &lt;5.14.21-150500.55.12.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775895" version="1" comment="kernel-default-vdso is &lt;5.14.21-150500.55.12.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775896" version="1" comment="kernel-devel is &lt;5.14.21-150500.55.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775897" version="1" comment="kernel-docs is &lt;5.14.21-150500.55.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775898" version="1" comment="kernel-docs-html is &lt;5.14.21-150500.55.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775899" version="1" comment="kernel-kvmsmall is &lt;5.14.21-150500.55.12.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775900" version="1" comment="kernel-kvmsmall-devel is &lt;5.14.21-150500.55.12.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775901" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.14.21-150500.55.12.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775902" version="1" comment="kernel-kvmsmall-vdso is &lt;5.14.21-150500.55.12.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775903" version="1" comment="kernel-macros is &lt;5.14.21-150500.55.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775904" version="1" comment="kernel-obs-build is &lt;5.14.21-150500.55.12.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775905" version="1" comment="kernel-obs-qa is &lt;5.14.21-150500.55.12.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775906" version="1" comment="kernel-source is &lt;5.14.21-150500.55.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775907" version="1" comment="kernel-source-vanilla is &lt;5.14.21-150500.55.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775908" version="1" comment="kernel-syms is &lt;5.14.21-150500.55.12.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775909" version="1" comment="kernel-zfcpdump is &lt;5.14.21-150500.55.12.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775910" version="1" comment="kselftests-kmp-64kb is &lt;5.14.21-150500.55.12.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775911" version="1" comment="kselftests-kmp-default is &lt;5.14.21-150500.55.12.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775912" version="1" comment="ocfs2-kmp-64kb is &lt;5.14.21-150500.55.12.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775913" version="1" comment="ocfs2-kmp-default is &lt;5.14.21-150500.55.12.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775914" version="1" comment="reiserfs-kmp-64kb is &lt;5.14.21-150500.55.12.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775915" version="1" comment="reiserfs-kmp-default is &lt;5.14.21-150500.55.12.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775834" version="1" comment="cluster-md-kmp-azure is &lt;5.14.21-150500.33.11.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775835" version="1" comment="dlm-kmp-azure is &lt;5.14.21-150500.33.11.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775836" version="1" comment="gfs2-kmp-azure is &lt;5.14.21-150500.33.11.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775837" version="1" comment="kernel-azure is &lt;5.14.21-150500.33.11.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775838" version="1" comment="kernel-azure-devel is &lt;5.14.21-150500.33.11.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775839" version="1" comment="kernel-azure-extra is &lt;5.14.21-150500.33.11.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775840" version="1" comment="kernel-azure-livepatch-devel is &lt;5.14.21-150500.33.11.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775841" version="1" comment="kernel-azure-optional is &lt;5.14.21-150500.33.11.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775842" version="1" comment="kernel-azure-vdso is &lt;5.14.21-150500.33.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775843" version="1" comment="kernel-devel-azure is &lt;5.14.21-150500.33.11.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775844" version="1" comment="kernel-source-azure is &lt;5.14.21-150500.33.11.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775845" version="1" comment="kernel-syms-azure is &lt;5.14.21-150500.33.11.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775846" version="1" comment="kselftests-kmp-azure is &lt;5.14.21-150500.33.11.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775847" version="1" comment="ocfs2-kmp-azure is &lt;5.14.21-150500.33.11.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775848" version="1" comment="reiserfs-kmp-azure is &lt;5.14.21-150500.33.11.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776225" version="1" comment="go1.20 is &lt;1.20.7-150000.1.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776226" version="1" comment="go1.20-doc is &lt;1.20.7-150000.1.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776227" version="1" comment="go1.20-race is &lt;1.20.7-150000.1.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009766904" version="1" comment="xtrans is &lt;1.3.5-150000.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776298" version="1" comment="libQt6Concurrent6 is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776260" version="1" comment="libQt6Core6 is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776261" version="1" comment="libQt6DBus6 is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776262" version="1" comment="libQt6Gui6 is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776263" version="1" comment="libQt6Network6 is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776264" version="1" comment="libQt6OpenGL6 is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776299" version="1" comment="libQt6OpenGLWidgets6 is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776300" version="1" comment="libQt6PrintSupport6 is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776301" version="1" comment="libQt6Sql6 is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776302" version="1" comment="libQt6Test6 is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776265" version="1" comment="libQt6Widgets6 is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776303" version="1" comment="libQt6Xml6 is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776304" version="1" comment="qt6-base-common-devel is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776305" version="1" comment="qt6-base-devel is &lt;6.4.2-150500.3.7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774438" version="1" comment="qt6-base-docs-html is &lt;6.4.2-150500.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774439" version="1" comment="qt6-base-docs-qch is &lt;6.4.2-150500.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776592" version="1" comment="qt6-base-examples is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776593" version="1" comment="qt6-base-private-devel is &lt;6.4.2-150500.3.7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776306" version="1" comment="qt6-concurrent-devel is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776307" version="1" comment="qt6-core-devel is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776308" version="1" comment="qt6-core-private-devel is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776309" version="1" comment="qt6-dbus-devel is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776594" version="1" comment="qt6-dbus-private-devel is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776595" version="1" comment="qt6-docs-common is &lt;6.4.2-150500.3.7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776310" version="1" comment="qt6-gui-devel is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776311" version="1" comment="qt6-gui-private-devel is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776312" version="1" comment="qt6-kmssupport-devel-static is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776313" version="1" comment="qt6-kmssupport-private-devel is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776314" version="1" comment="qt6-network-devel is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776596" version="1" comment="qt6-network-private-devel is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776266" version="1" comment="qt6-network-tls is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776597" version="1" comment="qt6-networkinformation-glib is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776598" version="1" comment="qt6-networkinformation-nm is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776315" version="1" comment="qt6-opengl-devel is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776316" version="1" comment="qt6-opengl-private-devel is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776317" version="1" comment="qt6-openglwidgets-devel is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776318" version="1" comment="qt6-platformsupport-devel-static is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776599" version="1" comment="qt6-platformsupport-private-devel is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776600" version="1" comment="qt6-platformtheme-gtk3 is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776601" version="1" comment="qt6-platformtheme-xdgdesktopportal is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776602" version="1" comment="qt6-printsupport-cups is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776319" version="1" comment="qt6-printsupport-devel is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776603" version="1" comment="qt6-printsupport-private-devel is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776320" version="1" comment="qt6-sql-devel is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776604" version="1" comment="qt6-sql-mysql is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776605" version="1" comment="qt6-sql-postgresql is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776606" version="1" comment="qt6-sql-private-devel is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776321" version="1" comment="qt6-sql-sqlite is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776607" version="1" comment="qt6-sql-unixODBC is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776322" version="1" comment="qt6-test-devel is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776608" version="1" comment="qt6-test-private-devel is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776323" version="1" comment="qt6-widgets-devel is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776324" version="1" comment="qt6-widgets-private-devel is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776325" version="1" comment="qt6-xml-devel is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776609" version="1" comment="qt6-xml-private-devel is &lt;6.4.2-150500.3.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777025" version="1" comment="MozillaThunderbird is &lt;115.1.0-150200.8.127.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777026" version="1" comment="MozillaThunderbird-translations-common is &lt;115.1.0-150200.8.127.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777027" version="1" comment="MozillaThunderbird-translations-other is &lt;115.1.0-150200.8.127.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776515" version="1" comment="ruby2.5-rubygem-actionpack-5_1 is &lt;5.1.4-150000.3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776516" version="1" comment="ruby2.5-rubygem-actionpack-doc-5_1 is &lt;5.1.4-150000.3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772770" version="1" comment="libcjose-devel is &lt;0.6.1-150100.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772771" version="1" comment="libcjose0 is &lt;0.6.1-150100.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776669" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150500.17.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776670" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1l-150500.17.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776671" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150500.17.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776672" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1l-150500.17.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776673" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150500.17.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776674" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1l-150500.17.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776675" version="1" comment="openssl-1_1 is &lt;1.1.1l-150500.17.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776676" version="1" comment="openssl-1_1-doc is &lt;1.1.1l-150500.17.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776663" version="1" comment="libopenssl-3-devel is &lt;3.0.8-150500.5.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776664" version="1" comment="libopenssl-3-devel-32bit is &lt;3.0.8-150500.5.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776665" version="1" comment="libopenssl3 is &lt;3.0.8-150500.5.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776666" version="1" comment="libopenssl3-32bit is &lt;3.0.8-150500.5.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776667" version="1" comment="openssl-3 is &lt;3.0.8-150500.5.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776668" version="1" comment="openssl-3-doc is &lt;3.0.8-150500.5.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776517" version="1" comment="keylime-agent is &lt;6.3.2-150400.4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776518" version="1" comment="keylime-config is &lt;6.3.2-150400.4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776519" version="1" comment="keylime-firewalld is &lt;6.3.2-150400.4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776662" version="1" comment="keylime-logrotate is &lt;6.3.2-150400.4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776520" version="1" comment="keylime-registrar is &lt;6.3.2-150400.4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776521" version="1" comment="keylime-tpm_cert_store is &lt;6.3.2-150400.4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776522" version="1" comment="keylime-verifier is &lt;6.3.2-150400.4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776523" version="1" comment="python3-keylime is &lt;6.3.2-150400.4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776658" version="1" comment="gstreamer-plugins-ugly is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776659" version="1" comment="gstreamer-plugins-ugly-32bit is &lt;1.22.0-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776660" version="1" comment="gstreamer-plugins-ugly-lang is &lt;1.22.0-150500.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776649" version="1" comment="gstreamer-plugins-good is &lt;1.22.0-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776650" version="1" comment="gstreamer-plugins-good-32bit is &lt;1.22.0-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776651" version="1" comment="gstreamer-plugins-good-extra is &lt;1.22.0-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776652" version="1" comment="gstreamer-plugins-good-extra-32bit is &lt;1.22.0-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776653" version="1" comment="gstreamer-plugins-good-gtk is &lt;1.22.0-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776654" version="1" comment="gstreamer-plugins-good-jack is &lt;1.22.0-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776655" version="1" comment="gstreamer-plugins-good-jack-32bit is &lt;1.22.0-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776656" version="1" comment="gstreamer-plugins-good-lang is &lt;1.22.0-150500.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776657" version="1" comment="gstreamer-plugins-good-qtqml is &lt;1.22.0-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776610" version="1" comment="gstreamer-plugins-base is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776611" version="1" comment="gstreamer-plugins-base-32bit is &lt;1.22.0-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776612" version="1" comment="gstreamer-plugins-base-devel is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776613" version="1" comment="gstreamer-plugins-base-devel-32bit is &lt;1.22.0-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776614" version="1" comment="gstreamer-plugins-base-lang is &lt;1.22.0-150500.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776615" version="1" comment="libgstallocators-1_0-0 is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776616" version="1" comment="libgstallocators-1_0-0-32bit is &lt;1.22.0-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776617" version="1" comment="libgstapp-1_0-0 is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776618" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.22.0-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776619" version="1" comment="libgstaudio-1_0-0 is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776326" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.22.0-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776620" version="1" comment="libgstfft-1_0-0 is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776621" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.22.0-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776622" version="1" comment="libgstgl-1_0-0 is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776623" version="1" comment="libgstgl-1_0-0-32bit is &lt;1.22.0-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776624" version="1" comment="libgstpbutils-1_0-0 is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776625" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.22.0-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776626" version="1" comment="libgstriff-1_0-0 is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776627" version="1" comment="libgstriff-1_0-0-32bit is &lt;1.22.0-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776628" version="1" comment="libgstrtp-1_0-0 is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776629" version="1" comment="libgstrtp-1_0-0-32bit is &lt;1.22.0-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776630" version="1" comment="libgstrtsp-1_0-0 is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776631" version="1" comment="libgstrtsp-1_0-0-32bit is &lt;1.22.0-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776632" version="1" comment="libgstsdp-1_0-0 is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776633" version="1" comment="libgstsdp-1_0-0-32bit is &lt;1.22.0-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776634" version="1" comment="libgsttag-1_0-0 is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776327" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.22.0-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776635" version="1" comment="libgstvideo-1_0-0 is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776328" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.22.0-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776636" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776637" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776638" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776639" version="1" comment="typelib-1_0-GstGL-1_0 is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776640" version="1" comment="typelib-1_0-GstGLEGL-1_0 is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776641" version="1" comment="typelib-1_0-GstGLWayland-1_0 is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776642" version="1" comment="typelib-1_0-GstGLX11-1_0 is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776643" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776644" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776645" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776646" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776647" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776648" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.22.0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777622" version="1" comment="cargo1.71 is &lt;1.71.1-150400.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777623" version="1" comment="rust1.71 is &lt;1.71.1-150400.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772168" version="1" comment="libwireshark15 is &lt;3.6.15-150000.3.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772169" version="1" comment="libwiretap12 is &lt;3.6.15-150000.3.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772170" version="1" comment="libwsutil13 is &lt;3.6.15-150000.3.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772171" version="1" comment="wireshark is &lt;3.6.15-150000.3.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772172" version="1" comment="wireshark-devel is &lt;3.6.15-150000.3.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772173" version="1" comment="wireshark-ui-qt is &lt;3.6.15-150000.3.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775916" version="1" comment="gstreamer-plugin-pipewire is &lt;0.3.64-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775917" version="1" comment="libpipewire-0_3-0 is &lt;0.3.64-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775918" version="1" comment="libpipewire-0_3-0-32bit is &lt;0.3.64-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775919" version="1" comment="pipewire is &lt;0.3.64-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775920" version="1" comment="pipewire-alsa is &lt;0.3.64-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775921" version="1" comment="pipewire-alsa-32bit is &lt;0.3.64-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775922" version="1" comment="pipewire-devel is &lt;0.3.64-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775923" version="1" comment="pipewire-doc is &lt;0.3.64-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775924" version="1" comment="pipewire-lang is &lt;0.3.64-150500.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775925" version="1" comment="pipewire-libjack-0_3 is &lt;0.3.64-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775926" version="1" comment="pipewire-libjack-0_3-32bit is &lt;0.3.64-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775927" version="1" comment="pipewire-libjack-0_3-devel is &lt;0.3.64-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775928" version="1" comment="pipewire-module-x11-0_3 is &lt;0.3.64-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775929" version="1" comment="pipewire-modules-0_3 is &lt;0.3.64-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775930" version="1" comment="pipewire-modules-0_3-32bit is &lt;0.3.64-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775931" version="1" comment="pipewire-pulseaudio is &lt;0.3.64-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775932" version="1" comment="pipewire-spa-plugins-0_2 is &lt;0.3.64-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775933" version="1" comment="pipewire-spa-plugins-0_2-32bit is &lt;0.3.64-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775934" version="1" comment="pipewire-spa-tools is &lt;0.3.64-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775935" version="1" comment="pipewire-tools is &lt;0.3.64-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776222" version="1" comment="go1.19 is &lt;1.19.12-150000.1.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776223" version="1" comment="go1.19-doc is &lt;1.19.12-150000.1.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776661" version="1" comment="go1.19-race is &lt;1.19.12-150000.1.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772176" version="1" comment="python3-scipy is &lt;1.3.3-150200.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772177" version="1" comment="python3-scipy-gnu-hpc is &lt;1.3.3-150200.5.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772178" version="1" comment="python3-scipy_1_3_3-gnu-hpc is &lt;1.3.3-150200.5.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778181" version="1" comment="cloud-init is &lt;23.1-150100.8.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778182" version="1" comment="cloud-init-config-suse is &lt;23.1-150100.8.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778183" version="1" comment="cloud-init-doc is &lt;23.1-150100.8.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774414" version="1" comment="java-11-openjdk is &lt;11.0.20.0-150000.3.99.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774415" version="1" comment="java-11-openjdk-demo is &lt;11.0.20.0-150000.3.99.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774416" version="1" comment="java-11-openjdk-devel is &lt;11.0.20.0-150000.3.99.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774417" version="1" comment="java-11-openjdk-headless is &lt;11.0.20.0-150000.3.99.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774418" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.20.0-150000.3.99.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774419" version="1" comment="java-11-openjdk-jmods is &lt;11.0.20.0-150000.3.99.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774420" version="1" comment="java-11-openjdk-src is &lt;11.0.20.0-150000.3.99.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777903" version="1" comment="kernel-firmware is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777904" version="1" comment="kernel-firmware-all is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777905" version="1" comment="kernel-firmware-amdgpu is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777906" version="1" comment="kernel-firmware-ath10k is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777907" version="1" comment="kernel-firmware-ath11k is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777908" version="1" comment="kernel-firmware-atheros is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777909" version="1" comment="kernel-firmware-bluetooth is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777910" version="1" comment="kernel-firmware-bnx2 is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777911" version="1" comment="kernel-firmware-brcm is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777912" version="1" comment="kernel-firmware-chelsio is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777913" version="1" comment="kernel-firmware-dpaa2 is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777914" version="1" comment="kernel-firmware-i915 is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777915" version="1" comment="kernel-firmware-intel is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777916" version="1" comment="kernel-firmware-iwlwifi is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777917" version="1" comment="kernel-firmware-liquidio is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777918" version="1" comment="kernel-firmware-marvell is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777919" version="1" comment="kernel-firmware-media is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777920" version="1" comment="kernel-firmware-mediatek is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777921" version="1" comment="kernel-firmware-mellanox is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777922" version="1" comment="kernel-firmware-mwifiex is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777923" version="1" comment="kernel-firmware-network is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777924" version="1" comment="kernel-firmware-nfp is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777925" version="1" comment="kernel-firmware-nvidia is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777926" version="1" comment="kernel-firmware-platform is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777927" version="1" comment="kernel-firmware-prestera is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777928" version="1" comment="kernel-firmware-qcom is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777929" version="1" comment="kernel-firmware-qlogic is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777930" version="1" comment="kernel-firmware-radeon is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777931" version="1" comment="kernel-firmware-realtek is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777932" version="1" comment="kernel-firmware-serial is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777933" version="1" comment="kernel-firmware-sound is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777934" version="1" comment="kernel-firmware-ti is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777935" version="1" comment="kernel-firmware-ueagle is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777936" version="1" comment="kernel-firmware-usb-network is &lt;20230724-150500.3.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777937" version="1" comment="ucode-amd is &lt;20230724-150500.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771708" version="1" comment="libyajl-devel is &lt;2.1.0-150000.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771709" version="1" comment="libyajl-devel-32bit is &lt;2.1.0-150000.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771710" version="1" comment="libyajl-devel-static is &lt;2.1.0-150000.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771711" version="1" comment="libyajl2 is &lt;2.1.0-150000.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771712" version="1" comment="libyajl2-32bit is &lt;2.1.0-150000.4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771713" version="1" comment="yajl is &lt;2.1.0-150000.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778255" version="1" comment="cluster-md-kmp-rt is &lt;5.14.21-150500.13.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778256" version="1" comment="dlm-kmp-rt is &lt;5.14.21-150500.13.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778257" version="1" comment="gfs2-kmp-rt is &lt;5.14.21-150500.13.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778258" version="1" comment="kernel-devel-rt is &lt;5.14.21-150500.13.11.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778259" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778260" version="1" comment="kernel-rt-devel is &lt;5.14.21-150500.13.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778261" version="1" comment="kernel-rt-extra is &lt;5.14.21-150500.13.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778262" version="1" comment="kernel-rt-livepatch is &lt;5.14.21-150500.13.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778263" version="1" comment="kernel-rt-livepatch-devel is &lt;5.14.21-150500.13.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778264" version="1" comment="kernel-rt-optional is &lt;5.14.21-150500.13.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778265" version="1" comment="kernel-rt-vdso is &lt;5.14.21-150500.13.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778266" version="1" comment="kernel-rt_debug is &lt;5.14.21-150500.13.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778267" version="1" comment="kernel-rt_debug-devel is &lt;5.14.21-150500.13.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778268" version="1" comment="kernel-rt_debug-livepatch-devel is &lt;5.14.21-150500.13.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778269" version="1" comment="kernel-rt_debug-vdso is &lt;5.14.21-150500.13.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778270" version="1" comment="kernel-source-rt is &lt;5.14.21-150500.13.11.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778271" version="1" comment="kernel-syms-rt is &lt;5.14.21-150500.13.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778272" version="1" comment="kselftests-kmp-rt is &lt;5.14.21-150500.13.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778273" version="1" comment="ocfs2-kmp-rt is &lt;5.14.21-150500.13.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778274" version="1" comment="reiserfs-kmp-rt is &lt;5.14.21-150500.13.11.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778466" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.372-150200.3.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778467" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.372-150200.3.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778468" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.372-150200.3.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778469" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.372-150200.3.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778470" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.372-150200.3.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778471" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.372-150200.3.33.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778472" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.372-150200.3.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778188" version="1" comment="cluster-md-kmp-64kb is &lt;5.14.21-150500.55.19.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778189" version="1" comment="cluster-md-kmp-default is &lt;5.14.21-150500.55.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778190" version="1" comment="dlm-kmp-64kb is &lt;5.14.21-150500.55.19.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778191" version="1" comment="dlm-kmp-default is &lt;5.14.21-150500.55.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778192" version="1" comment="dtb-allwinner is &lt;5.14.21-150500.55.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778193" version="1" comment="dtb-altera is &lt;5.14.21-150500.55.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778194" version="1" comment="dtb-amazon is &lt;5.14.21-150500.55.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778195" version="1" comment="dtb-amd is &lt;5.14.21-150500.55.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778196" version="1" comment="dtb-amlogic is &lt;5.14.21-150500.55.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778197" version="1" comment="dtb-apm is &lt;5.14.21-150500.55.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778198" version="1" comment="dtb-apple is &lt;5.14.21-150500.55.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778199" version="1" comment="dtb-arm is &lt;5.14.21-150500.55.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778200" version="1" comment="dtb-broadcom is &lt;5.14.21-150500.55.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778201" version="1" comment="dtb-cavium is &lt;5.14.21-150500.55.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778202" version="1" comment="dtb-exynos is &lt;5.14.21-150500.55.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778203" version="1" comment="dtb-freescale is &lt;5.14.21-150500.55.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778204" version="1" comment="dtb-hisilicon is &lt;5.14.21-150500.55.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778205" version="1" comment="dtb-lg is &lt;5.14.21-150500.55.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778206" version="1" comment="dtb-marvell is &lt;5.14.21-150500.55.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778207" version="1" comment="dtb-mediatek is &lt;5.14.21-150500.55.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778208" version="1" comment="dtb-nvidia is &lt;5.14.21-150500.55.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778209" version="1" comment="dtb-qcom is &lt;5.14.21-150500.55.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778210" version="1" comment="dtb-renesas is &lt;5.14.21-150500.55.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778211" version="1" comment="dtb-rockchip is &lt;5.14.21-150500.55.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778212" version="1" comment="dtb-socionext is &lt;5.14.21-150500.55.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778213" version="1" comment="dtb-sprd is &lt;5.14.21-150500.55.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778214" version="1" comment="dtb-xilinx is &lt;5.14.21-150500.55.19.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778215" version="1" comment="gfs2-kmp-64kb is &lt;5.14.21-150500.55.19.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778216" version="1" comment="gfs2-kmp-default is &lt;5.14.21-150500.55.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778217" version="1" comment="kernel-64kb is &lt;5.14.21-150500.55.19.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778218" version="1" comment="kernel-64kb-devel is &lt;5.14.21-150500.55.19.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778219" version="1" comment="kernel-64kb-extra is &lt;5.14.21-150500.55.19.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778220" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.14.21-150500.55.19.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778221" version="1" comment="kernel-64kb-optional is &lt;5.14.21-150500.55.19.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778222" version="1" comment="kernel-debug is &lt;5.14.21-150500.55.19.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778223" version="1" comment="kernel-debug-devel is &lt;5.14.21-150500.55.19.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778224" version="1" comment="kernel-debug-livepatch-devel is &lt;5.14.21-150500.55.19.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778225" version="1" comment="kernel-debug-vdso is &lt;5.14.21-150500.55.19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778226" version="1" comment="kernel-default is &lt;5.14.21-150500.55.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778227" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.19.1.150500.6.6.4 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778228" version="1" comment="kernel-default-base-rebuild is &lt;5.14.21-150500.55.19.1.150500.6.6.4 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778229" version="1" comment="kernel-default-devel is &lt;5.14.21-150500.55.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778230" version="1" comment="kernel-default-extra is &lt;5.14.21-150500.55.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778231" version="1" comment="kernel-default-livepatch is &lt;5.14.21-150500.55.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778232" version="1" comment="kernel-default-livepatch-devel is &lt;5.14.21-150500.55.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778233" version="1" comment="kernel-default-optional is &lt;5.14.21-150500.55.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778234" version="1" comment="kernel-default-vdso is &lt;5.14.21-150500.55.19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778235" version="1" comment="kernel-devel is &lt;5.14.21-150500.55.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778236" version="1" comment="kernel-docs is &lt;5.14.21-150500.55.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778237" version="1" comment="kernel-docs-html is &lt;5.14.21-150500.55.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778238" version="1" comment="kernel-kvmsmall is &lt;5.14.21-150500.55.19.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778239" version="1" comment="kernel-kvmsmall-devel is &lt;5.14.21-150500.55.19.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778240" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.14.21-150500.55.19.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778241" version="1" comment="kernel-kvmsmall-vdso is &lt;5.14.21-150500.55.19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778242" version="1" comment="kernel-macros is &lt;5.14.21-150500.55.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778243" version="1" comment="kernel-obs-build is &lt;5.14.21-150500.55.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778244" version="1" comment="kernel-obs-qa is &lt;5.14.21-150500.55.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778245" version="1" comment="kernel-source is &lt;5.14.21-150500.55.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778246" version="1" comment="kernel-source-vanilla is &lt;5.14.21-150500.55.19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778247" version="1" comment="kernel-syms is &lt;5.14.21-150500.55.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778248" version="1" comment="kernel-zfcpdump is &lt;5.14.21-150500.55.19.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778249" version="1" comment="kselftests-kmp-64kb is &lt;5.14.21-150500.55.19.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778250" version="1" comment="kselftests-kmp-default is &lt;5.14.21-150500.55.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778251" version="1" comment="ocfs2-kmp-64kb is &lt;5.14.21-150500.55.19.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778252" version="1" comment="ocfs2-kmp-default is &lt;5.14.21-150500.55.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778253" version="1" comment="reiserfs-kmp-64kb is &lt;5.14.21-150500.55.19.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778254" version="1" comment="reiserfs-kmp-default is &lt;5.14.21-150500.55.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777759" version="1" comment="krb5 is &lt;1.20.1-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777760" version="1" comment="krb5-32bit is &lt;1.20.1-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777761" version="1" comment="krb5-client is &lt;1.20.1-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777762" version="1" comment="krb5-devel is &lt;1.20.1-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777763" version="1" comment="krb5-devel-32bit is &lt;1.20.1-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777764" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.20.1-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777765" version="1" comment="krb5-plugin-preauth-otp is &lt;1.20.1-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777766" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.20.1-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777767" version="1" comment="krb5-plugin-preauth-spake is &lt;1.20.1-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777768" version="1" comment="krb5-server is &lt;1.20.1-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773717" version="1" comment="libpcre2-16-0 is &lt;10.39-150400.4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773718" version="1" comment="libpcre2-16-0-32bit is &lt;10.39-150400.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773719" version="1" comment="libpcre2-32-0 is &lt;10.39-150400.4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773720" version="1" comment="libpcre2-32-0-32bit is &lt;10.39-150400.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773721" version="1" comment="libpcre2-8-0 is &lt;10.39-150400.4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773722" version="1" comment="libpcre2-8-0-32bit is &lt;10.39-150400.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773723" version="1" comment="libpcre2-posix2 is &lt;10.39-150400.4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773724" version="1" comment="libpcre2-posix2-32bit is &lt;10.39-150400.4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773725" version="1" comment="pcre2-devel is &lt;10.39-150400.4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773726" version="1" comment="pcre2-devel-static is &lt;10.39-150400.4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773727" version="1" comment="pcre2-doc is &lt;10.39-150400.4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009773728" version="1" comment="pcre2-tools is &lt;10.39-150400.4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778941" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.382-150200.3.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778942" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.382-150200.3.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778943" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.382-150200.3.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778944" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.382-150200.3.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778945" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.382-150200.3.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778946" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.382-150200.3.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778947" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.382-150200.3.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777610" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-150000.3.85.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777611" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2p-150000.3.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777612" version="1" comment="libopenssl10 is &lt;1.0.2p-150000.3.85.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777613" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-150000.3.85.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777614" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-150000.3.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777615" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2p-150000.3.85.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777616" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2p-150000.3.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777617" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2p-150000.3.85.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777618" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2p-150000.3.85.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777619" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-150000.3.85.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777620" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2p-150000.3.85.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777621" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2p-150000.3.85.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778993" version="1" comment="postgresql13 is &lt;13.12-150200.5.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778994" version="1" comment="postgresql13-contrib is &lt;13.12-150200.5.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778995" version="1" comment="postgresql13-devel is &lt;13.12-150200.5.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778996" version="1" comment="postgresql13-docs is &lt;13.12-150200.5.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778997" version="1" comment="postgresql13-llvmjit is &lt;13.12-150200.5.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778998" version="1" comment="postgresql13-llvmjit-devel is &lt;13.12-150200.5.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778999" version="1" comment="postgresql13-plperl is &lt;13.12-150200.5.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779000" version="1" comment="postgresql13-plpython is &lt;13.12-150200.5.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779001" version="1" comment="postgresql13-pltcl is &lt;13.12-150200.5.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779002" version="1" comment="postgresql13-server is &lt;13.12-150200.5.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779003" version="1" comment="postgresql13-server-devel is &lt;13.12-150200.5.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779004" version="1" comment="postgresql13-test is &lt;13.12-150200.5.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779005" version="1" comment="libecpg6 is &lt;15.4-150200.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779006" version="1" comment="libecpg6-32bit is &lt;15.4-150200.5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779007" version="1" comment="libpq5 is &lt;15.4-150200.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779008" version="1" comment="libpq5-32bit is &lt;15.4-150200.5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779009" version="1" comment="postgresql15 is &lt;15.4-150200.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779010" version="1" comment="postgresql15-contrib is &lt;15.4-150200.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779011" version="1" comment="postgresql15-devel is &lt;15.4-150200.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779012" version="1" comment="postgresql15-docs is &lt;15.4-150200.5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779013" version="1" comment="postgresql15-llvmjit is &lt;15.4-150200.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779014" version="1" comment="postgresql15-llvmjit-devel is &lt;15.4-150200.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779015" version="1" comment="postgresql15-plperl is &lt;15.4-150200.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779016" version="1" comment="postgresql15-plpython is &lt;15.4-150200.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779017" version="1" comment="postgresql15-pltcl is &lt;15.4-150200.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779018" version="1" comment="postgresql15-server is &lt;15.4-150200.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779019" version="1" comment="postgresql15-server-devel is &lt;15.4-150200.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779020" version="1" comment="postgresql15-test is &lt;15.4-150200.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779021" version="1" comment="postgresql14 is &lt;14.9-150200.5.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779022" version="1" comment="postgresql14-contrib is &lt;14.9-150200.5.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779023" version="1" comment="postgresql14-devel is &lt;14.9-150200.5.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779024" version="1" comment="postgresql14-docs is &lt;14.9-150200.5.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779025" version="1" comment="postgresql14-llvmjit is &lt;14.9-150200.5.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779026" version="1" comment="postgresql14-llvmjit-devel is &lt;14.9-150200.5.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779027" version="1" comment="postgresql14-plperl is &lt;14.9-150200.5.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779028" version="1" comment="postgresql14-plpython is &lt;14.9-150200.5.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779029" version="1" comment="postgresql14-pltcl is &lt;14.9-150200.5.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779030" version="1" comment="postgresql14-server is &lt;14.9-150200.5.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779031" version="1" comment="postgresql14-server-devel is &lt;14.9-150200.5.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779032" version="1" comment="postgresql14-test is &lt;14.9-150200.5.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775785" version="1" comment="re2c is &lt;1.0.3-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771765" version="1" comment="python3-configobj is &lt;5.0.6-150000.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778275" version="1" comment="cluster-md-kmp-azure is &lt;5.14.21-150500.33.14.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778276" version="1" comment="dlm-kmp-azure is &lt;5.14.21-150500.33.14.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778277" version="1" comment="gfs2-kmp-azure is &lt;5.14.21-150500.33.14.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778278" version="1" comment="kernel-azure is &lt;5.14.21-150500.33.14.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778279" version="1" comment="kernel-azure-devel is &lt;5.14.21-150500.33.14.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778280" version="1" comment="kernel-azure-extra is &lt;5.14.21-150500.33.14.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778281" version="1" comment="kernel-azure-livepatch-devel is &lt;5.14.21-150500.33.14.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778282" version="1" comment="kernel-azure-optional is &lt;5.14.21-150500.33.14.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778283" version="1" comment="kernel-azure-vdso is &lt;5.14.21-150500.33.14.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778284" version="1" comment="kernel-devel-azure is &lt;5.14.21-150500.33.14.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778285" version="1" comment="kernel-source-azure is &lt;5.14.21-150500.33.14.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778286" version="1" comment="kernel-syms-azure is &lt;5.14.21-150500.33.14.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778287" version="1" comment="kselftests-kmp-azure is &lt;5.14.21-150500.33.14.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778288" version="1" comment="ocfs2-kmp-azure is &lt;5.14.21-150500.33.14.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778289" version="1" comment="reiserfs-kmp-azure is &lt;5.14.21-150500.33.14.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778176" version="1" comment="corepack18 is &lt;18.17.1-150400.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778177" version="1" comment="nodejs18 is &lt;18.17.1-150400.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778178" version="1" comment="nodejs18-devel is &lt;18.17.1-150400.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778179" version="1" comment="nodejs18-docs is &lt;18.17.1-150400.9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778180" version="1" comment="npm18 is &lt;18.17.1-150400.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778161" version="1" comment="ucode-intel is &lt;20230808-150200.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778960" version="1" comment="postgresql12 is &lt;12.16-150200.8.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778961" version="1" comment="postgresql12-contrib is &lt;12.16-150200.8.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778962" version="1" comment="postgresql12-devel is &lt;12.16-150200.8.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778963" version="1" comment="postgresql12-docs is &lt;12.16-150200.8.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778964" version="1" comment="postgresql12-llvmjit is &lt;12.16-150200.8.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778965" version="1" comment="postgresql12-llvmjit-devel is &lt;12.16-150200.8.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778966" version="1" comment="postgresql12-plperl is &lt;12.16-150200.8.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778967" version="1" comment="postgresql12-plpython is &lt;12.16-150200.8.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778968" version="1" comment="postgresql12-pltcl is &lt;12.16-150200.8.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778969" version="1" comment="postgresql12-server is &lt;12.16-150200.8.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778970" version="1" comment="postgresql12-server-devel is &lt;12.16-150200.8.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778971" version="1" comment="postgresql12-test is &lt;12.16-150200.8.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778849" version="1" comment="commons-compiler is &lt;3.1.10-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778857" version="1" comment="commons-compiler-jdk is &lt;3.1.10-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778850" version="1" comment="janino is &lt;3.1.10-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778851" version="1" comment="janino-javadoc is &lt;3.1.10-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779610" version="1" comment="kernel-vanilla is &lt;4.12.14-150100.197.154.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779611" version="1" comment="kernel-vanilla-base is &lt;4.12.14-150100.197.154.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779612" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-150100.197.154.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779613" version="1" comment="kernel-vanilla-livepatch-devel is &lt;4.12.14-150100.197.154.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779630" version="1" comment="postfix is &lt;3.7.3-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779634" version="1" comment="postfix-bdb is &lt;3.7.3-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779635" version="1" comment="postfix-bdb-lmdb is &lt;3.7.3-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779631" version="1" comment="postfix-devel is &lt;3.7.3-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779632" version="1" comment="postfix-doc is &lt;3.7.3-150500.3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779633" version="1" comment="postfix-ldap is &lt;3.7.3-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779636" version="1" comment="postfix-mysql is &lt;3.7.3-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781021" version="1" comment="postfix-postgresql is &lt;3.7.3-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778972" version="1" comment="erlang is &lt;22.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778973" version="1" comment="erlang-debugger is &lt;22.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778974" version="1" comment="erlang-debugger-src is &lt;22.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778975" version="1" comment="erlang-dialyzer is &lt;22.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778976" version="1" comment="erlang-dialyzer-src is &lt;22.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778977" version="1" comment="erlang-diameter is &lt;22.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778978" version="1" comment="erlang-diameter-src is &lt;22.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778979" version="1" comment="erlang-doc is &lt;22.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778980" version="1" comment="erlang-epmd is &lt;22.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778981" version="1" comment="erlang-et is &lt;22.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778982" version="1" comment="erlang-et-src is &lt;22.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778983" version="1" comment="erlang-jinterface is &lt;22.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778984" version="1" comment="erlang-jinterface-src is &lt;22.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778985" version="1" comment="erlang-observer is &lt;22.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778986" version="1" comment="erlang-observer-src is &lt;22.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778987" version="1" comment="erlang-reltool is &lt;22.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778988" version="1" comment="erlang-reltool-src is &lt;22.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778989" version="1" comment="erlang-src is &lt;22.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778990" version="1" comment="erlang-wx is &lt;22.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778991" version="1" comment="erlang-wx-src is &lt;22.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779938" version="1" comment="libreoffice is &lt;7.5.4.1-150400.17.12.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779939" version="1" comment="libreoffice-base is &lt;7.5.4.1-150400.17.12.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779940" version="1" comment="libreoffice-base-drivers-postgresql is &lt;7.5.4.1-150400.17.12.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779941" version="1" comment="libreoffice-branding-upstream is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779942" version="1" comment="libreoffice-calc is &lt;7.5.4.1-150400.17.12.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779943" version="1" comment="libreoffice-calc-extensions is &lt;7.5.4.1-150400.17.12.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779944" version="1" comment="libreoffice-draw is &lt;7.5.4.1-150400.17.12.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779945" version="1" comment="libreoffice-filters-optional is &lt;7.5.4.1-150400.17.12.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779946" version="1" comment="libreoffice-gdb-pretty-printers is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779947" version="1" comment="libreoffice-glade is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779948" version="1" comment="libreoffice-gnome is &lt;7.5.4.1-150400.17.12.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779949" version="1" comment="libreoffice-gtk3 is &lt;7.5.4.1-150400.17.12.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779950" version="1" comment="libreoffice-icon-themes is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779951" version="1" comment="libreoffice-impress is &lt;7.5.4.1-150400.17.12.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779952" version="1" comment="libreoffice-l10n-af is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779953" version="1" comment="libreoffice-l10n-am is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779954" version="1" comment="libreoffice-l10n-ar is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779955" version="1" comment="libreoffice-l10n-as is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779956" version="1" comment="libreoffice-l10n-ast is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779957" version="1" comment="libreoffice-l10n-be is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779958" version="1" comment="libreoffice-l10n-bg is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779959" version="1" comment="libreoffice-l10n-bn is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779960" version="1" comment="libreoffice-l10n-bn_IN is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779961" version="1" comment="libreoffice-l10n-bo is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779962" version="1" comment="libreoffice-l10n-br is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779963" version="1" comment="libreoffice-l10n-brx is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779964" version="1" comment="libreoffice-l10n-bs is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779965" version="1" comment="libreoffice-l10n-ca is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779966" version="1" comment="libreoffice-l10n-ca_valencia is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779967" version="1" comment="libreoffice-l10n-ckb is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779968" version="1" comment="libreoffice-l10n-cs is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779969" version="1" comment="libreoffice-l10n-cy is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779970" version="1" comment="libreoffice-l10n-da is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779971" version="1" comment="libreoffice-l10n-de is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779972" version="1" comment="libreoffice-l10n-dgo is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779973" version="1" comment="libreoffice-l10n-dsb is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779974" version="1" comment="libreoffice-l10n-dz is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779975" version="1" comment="libreoffice-l10n-el is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779976" version="1" comment="libreoffice-l10n-en is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779977" version="1" comment="libreoffice-l10n-en_GB is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779978" version="1" comment="libreoffice-l10n-en_ZA is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779979" version="1" comment="libreoffice-l10n-eo is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779980" version="1" comment="libreoffice-l10n-es is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779981" version="1" comment="libreoffice-l10n-et is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779982" version="1" comment="libreoffice-l10n-eu is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779983" version="1" comment="libreoffice-l10n-fa is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779984" version="1" comment="libreoffice-l10n-fi is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779985" version="1" comment="libreoffice-l10n-fr is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779986" version="1" comment="libreoffice-l10n-fur is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779987" version="1" comment="libreoffice-l10n-fy is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779988" version="1" comment="libreoffice-l10n-ga is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779989" version="1" comment="libreoffice-l10n-gd is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779990" version="1" comment="libreoffice-l10n-gl is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779991" version="1" comment="libreoffice-l10n-gu is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779992" version="1" comment="libreoffice-l10n-gug is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779993" version="1" comment="libreoffice-l10n-he is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779994" version="1" comment="libreoffice-l10n-hi is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779995" version="1" comment="libreoffice-l10n-hr is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779996" version="1" comment="libreoffice-l10n-hsb is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779997" version="1" comment="libreoffice-l10n-hu is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779998" version="1" comment="libreoffice-l10n-id is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779999" version="1" comment="libreoffice-l10n-is is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780000" version="1" comment="libreoffice-l10n-it is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780001" version="1" comment="libreoffice-l10n-ja is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780002" version="1" comment="libreoffice-l10n-ka is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780003" version="1" comment="libreoffice-l10n-kab is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780004" version="1" comment="libreoffice-l10n-kk is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780005" version="1" comment="libreoffice-l10n-km is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780006" version="1" comment="libreoffice-l10n-kmr_Latn is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780007" version="1" comment="libreoffice-l10n-kn is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780008" version="1" comment="libreoffice-l10n-ko is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780009" version="1" comment="libreoffice-l10n-kok is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780010" version="1" comment="libreoffice-l10n-ks is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780011" version="1" comment="libreoffice-l10n-lb is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780012" version="1" comment="libreoffice-l10n-lo is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780013" version="1" comment="libreoffice-l10n-lt is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780014" version="1" comment="libreoffice-l10n-lv is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780015" version="1" comment="libreoffice-l10n-mai is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780016" version="1" comment="libreoffice-l10n-mk is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780017" version="1" comment="libreoffice-l10n-ml is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780018" version="1" comment="libreoffice-l10n-mn is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780019" version="1" comment="libreoffice-l10n-mni is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780020" version="1" comment="libreoffice-l10n-mr is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780021" version="1" comment="libreoffice-l10n-my is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780022" version="1" comment="libreoffice-l10n-nb is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780023" version="1" comment="libreoffice-l10n-ne is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780024" version="1" comment="libreoffice-l10n-nl is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780025" version="1" comment="libreoffice-l10n-nn is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780026" version="1" comment="libreoffice-l10n-nr is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780027" version="1" comment="libreoffice-l10n-nso is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780028" version="1" comment="libreoffice-l10n-oc is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780029" version="1" comment="libreoffice-l10n-om is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780030" version="1" comment="libreoffice-l10n-or is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780031" version="1" comment="libreoffice-l10n-pa is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780032" version="1" comment="libreoffice-l10n-pl is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780033" version="1" comment="libreoffice-l10n-pt_BR is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780034" version="1" comment="libreoffice-l10n-pt_PT is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780035" version="1" comment="libreoffice-l10n-ro is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780036" version="1" comment="libreoffice-l10n-ru is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780037" version="1" comment="libreoffice-l10n-rw is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780038" version="1" comment="libreoffice-l10n-sa_IN is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780039" version="1" comment="libreoffice-l10n-sat is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780040" version="1" comment="libreoffice-l10n-sd is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780041" version="1" comment="libreoffice-l10n-si is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780042" version="1" comment="libreoffice-l10n-sid is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780043" version="1" comment="libreoffice-l10n-sk is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780044" version="1" comment="libreoffice-l10n-sl is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780045" version="1" comment="libreoffice-l10n-sq is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780046" version="1" comment="libreoffice-l10n-sr is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780047" version="1" comment="libreoffice-l10n-ss is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780048" version="1" comment="libreoffice-l10n-st is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780049" version="1" comment="libreoffice-l10n-sv is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780050" version="1" comment="libreoffice-l10n-sw_TZ is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780051" version="1" comment="libreoffice-l10n-szl is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780052" version="1" comment="libreoffice-l10n-ta is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780053" version="1" comment="libreoffice-l10n-te is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780054" version="1" comment="libreoffice-l10n-tg is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780055" version="1" comment="libreoffice-l10n-th is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780056" version="1" comment="libreoffice-l10n-tn is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780057" version="1" comment="libreoffice-l10n-tr is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780058" version="1" comment="libreoffice-l10n-ts is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780059" version="1" comment="libreoffice-l10n-tt is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780060" version="1" comment="libreoffice-l10n-ug is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780061" version="1" comment="libreoffice-l10n-uk is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780062" version="1" comment="libreoffice-l10n-uz is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780063" version="1" comment="libreoffice-l10n-ve is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780064" version="1" comment="libreoffice-l10n-vec is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780065" version="1" comment="libreoffice-l10n-vi is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780066" version="1" comment="libreoffice-l10n-xh is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780067" version="1" comment="libreoffice-l10n-zh_CN is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780068" version="1" comment="libreoffice-l10n-zh_TW is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780069" version="1" comment="libreoffice-l10n-zu is &lt;7.5.4.1-150400.17.12.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780070" version="1" comment="libreoffice-librelogo is &lt;7.5.4.1-150400.17.12.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780071" version="1" comment="libreoffice-mailmerge is &lt;7.5.4.1-150400.17.12.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780072" version="1" comment="libreoffice-math is &lt;7.5.4.1-150400.17.12.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780073" version="1" comment="libreoffice-officebean is &lt;7.5.4.1-150400.17.12.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780074" version="1" comment="libreoffice-pyuno is &lt;7.5.4.1-150400.17.12.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780075" version="1" comment="libreoffice-qt5 is &lt;7.5.4.1-150400.17.12.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780076" version="1" comment="libreoffice-sdk is &lt;7.5.4.1-150400.17.12.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780077" version="1" comment="libreoffice-sdk-doc is &lt;7.5.4.1-150400.17.12.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780078" version="1" comment="libreoffice-writer is &lt;7.5.4.1-150400.17.12.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780079" version="1" comment="libreoffice-writer-extensions is &lt;7.5.4.1-150400.17.12.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780080" version="1" comment="libreofficekit is &lt;7.5.4.1-150400.17.12.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780081" version="1" comment="libreofficekit-devel is &lt;7.5.4.1-150400.17.12.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780082" version="1" comment="libxmlsec1-1 is &lt;1.2.37-150400.14.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780083" version="1" comment="libxmlsec1-gcrypt1 is &lt;1.2.37-150400.14.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780084" version="1" comment="libxmlsec1-gnutls1 is &lt;1.2.37-150400.14.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780085" version="1" comment="libxmlsec1-nss1 is &lt;1.2.37-150400.14.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780086" version="1" comment="libxmlsec1-openssl1 is &lt;1.2.37-150400.14.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780087" version="1" comment="xmlsec1 is &lt;1.2.37-150400.14.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780088" version="1" comment="xmlsec1-devel is &lt;1.2.37-150400.14.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780089" version="1" comment="xmlsec1-gcrypt-devel is &lt;1.2.37-150400.14.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780090" version="1" comment="xmlsec1-gnutls-devel is &lt;1.2.37-150400.14.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780091" version="1" comment="xmlsec1-nss-devel is &lt;1.2.37-150400.14.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780092" version="1" comment="xmlsec1-openssl-devel is &lt;1.2.37-150400.14.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777734" version="1" comment="WebKitGTK-4.0-lang is &lt;2.40.5-150400.4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777735" version="1" comment="WebKitGTK-4.1-lang is &lt;2.40.5-150400.4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777736" version="1" comment="WebKitGTK-6.0-lang is &lt;2.40.5-150400.4.45.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777585" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777586" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.40.5-150400.4.45.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777737" version="1" comment="libjavascriptcoregtk-4_0-18-64bit is &lt;2.40.5-150400.4.45.3 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777587" version="1" comment="libjavascriptcoregtk-4_1-0 is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777588" version="1" comment="libjavascriptcoregtk-4_1-0-32bit is &lt;2.40.5-150400.4.45.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777738" version="1" comment="libjavascriptcoregtk-4_1-0-64bit is &lt;2.40.5-150400.4.45.3 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777739" version="1" comment="libjavascriptcoregtk-6_0-1 is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777589" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777590" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.40.5-150400.4.45.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777740" version="1" comment="libwebkit2gtk-4_0-37-64bit is &lt;2.40.5-150400.4.45.3 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777591" version="1" comment="libwebkit2gtk-4_1-0 is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777592" version="1" comment="libwebkit2gtk-4_1-0-32bit is &lt;2.40.5-150400.4.45.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777741" version="1" comment="libwebkit2gtk-4_1-0-64bit is &lt;2.40.5-150400.4.45.3 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777742" version="1" comment="libwebkitgtk-6_0-4 is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777593" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777594" version="1" comment="typelib-1_0-JavaScriptCore-4_1 is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777743" version="1" comment="typelib-1_0-JavaScriptCore-6_0 is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777744" version="1" comment="typelib-1_0-WebKit-6_0 is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777595" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777596" version="1" comment="typelib-1_0-WebKit2-4_1 is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777597" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777598" version="1" comment="typelib-1_0-WebKit2WebExtension-4_1 is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777745" version="1" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777599" version="1" comment="webkit-jsc-4 is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777600" version="1" comment="webkit-jsc-4.1 is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777746" version="1" comment="webkit-jsc-6.0 is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777601" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777602" version="1" comment="webkit2gtk-4_1-injected-bundles is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777603" version="1" comment="webkit2gtk3-devel is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777604" version="1" comment="webkit2gtk3-minibrowser is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777605" version="1" comment="webkit2gtk3-soup2-devel is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777606" version="1" comment="webkit2gtk3-soup2-minibrowser is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777607" version="1" comment="webkit2gtk4-devel is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777608" version="1" comment="webkit2gtk4-minibrowser is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777747" version="1" comment="webkitgtk-6_0-injected-bundles is &lt;2.40.5-150400.4.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779457" version="1" comment="indent is &lt;2.2.11-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774892" version="1" comment="ghostscript is &lt;9.52-150000.170.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774893" version="1" comment="ghostscript-devel is &lt;9.52-150000.170.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009774894" version="1" comment="ghostscript-x11 is &lt;9.52-150000.170.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777748" version="1" comment="gawk is &lt;4.2.1-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779458" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr8.10-150000.3.80.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779459" version="1" comment="java-1_8_0-ibm-32bit is &lt;1.8.0_sr8.10-150000.3.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779460" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr8.10-150000.3.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779461" version="1" comment="java-1_8_0-ibm-demo is &lt;1.8.0_sr8.10-150000.3.80.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779462" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr8.10-150000.3.80.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779463" version="1" comment="java-1_8_0-ibm-devel-32bit is &lt;1.8.0_sr8.10-150000.3.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779464" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr8.10-150000.3.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779465" version="1" comment="java-1_8_0-ibm-src is &lt;1.8.0_sr8.10-150000.3.80.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777004" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.382-150000.3.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777005" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.382-150000.3.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777006" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.382-150000.3.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777007" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.382-150000.3.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777008" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.382-150000.3.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777009" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.382-150000.3.82.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777010" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.382-150000.3.82.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778593" version="1" comment="xen is &lt;4.17.2_02-150500.3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778594" version="1" comment="xen-devel is &lt;4.17.2_02-150500.3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778595" version="1" comment="xen-doc-html is &lt;4.17.2_02-150500.3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778596" version="1" comment="xen-libs is &lt;4.17.2_02-150500.3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778597" version="1" comment="xen-libs-32bit is &lt;4.17.2_02-150500.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778598" version="1" comment="xen-tools is &lt;4.17.2_02-150500.3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778599" version="1" comment="xen-tools-domU is &lt;4.17.2_02-150500.3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778600" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.17.2_02-150500.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778601" version="1" comment="ca-certificates-mozilla is &lt;2.62-150200.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778602" version="1" comment="ca-certificates-mozilla-prebuilt is &lt;2.62-150200.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779345" version="1" comment="clamav is &lt;0.103.9-150000.3.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779346" version="1" comment="clamav-devel is &lt;0.103.9-150000.3.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779347" version="1" comment="libclamav9 is &lt;0.103.9-150000.3.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779348" version="1" comment="libfreshclam2 is &lt;0.103.9-150000.3.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779590" version="1" comment="freetype2-devel is &lt;2.10.4-150000.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779591" version="1" comment="freetype2-devel-32bit is &lt;2.10.4-150000.4.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779592" version="1" comment="freetype2-profile-tti35 is &lt;2.10.4-150000.4.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779593" version="1" comment="ft2demos is &lt;2.10.4-150000.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779594" version="1" comment="ftbench is &lt;2.10.4-150000.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779595" version="1" comment="ftdiff is &lt;2.10.4-150000.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779596" version="1" comment="ftdump is &lt;2.10.4-150000.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779597" version="1" comment="ftgamma is &lt;2.10.4-150000.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779598" version="1" comment="ftgrid is &lt;2.10.4-150000.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779599" version="1" comment="ftinspect is &lt;2.10.4-150000.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779600" version="1" comment="ftlint is &lt;2.10.4-150000.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779601" version="1" comment="ftmulti is &lt;2.10.4-150000.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779602" version="1" comment="ftstring is &lt;2.10.4-150000.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779603" version="1" comment="ftvalid is &lt;2.10.4-150000.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779604" version="1" comment="ftview is &lt;2.10.4-150000.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779605" version="1" comment="libfreetype6 is &lt;2.10.4-150000.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779606" version="1" comment="libfreetype6-32bit is &lt;2.10.4-150000.4.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778992" version="1" comment="haproxy is &lt;2.4.22+git0.f8e3218e2-150400.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778852" version="1" comment="libprocps7 is &lt;3.3.15-150000.7.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778853" version="1" comment="procps is &lt;3.3.15-150000.7.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009778854" version="1" comment="procps-devel is &lt;3.3.15-150000.7.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779240" version="1" comment="gvim is &lt;9.0.1632-150500.20.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779241" version="1" comment="vim is &lt;9.0.1632-150500.20.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779242" version="1" comment="vim-data is &lt;9.0.1632-150500.20.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779243" version="1" comment="vim-data-common is &lt;9.0.1632-150500.20.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779244" version="1" comment="vim-small is &lt;9.0.1632-150500.20.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781012" version="1" comment="libvmtools-devel is &lt;12.2.0-150300.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781013" version="1" comment="libvmtools0 is &lt;12.2.0-150300.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781014" version="1" comment="open-vm-tools is &lt;12.2.0-150300.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781015" version="1" comment="open-vm-tools-containerinfo is &lt;12.2.0-150300.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781016" version="1" comment="open-vm-tools-desktop is &lt;12.2.0-150300.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781017" version="1" comment="open-vm-tools-salt-minion is &lt;12.2.0-150300.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781018" version="1" comment="open-vm-tools-sdmp is &lt;12.2.0-150300.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779881" version="1" comment="exempi-tools is &lt;2.4.5-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779882" version="1" comment="libexempi-devel is &lt;2.4.5-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779883" version="1" comment="libexempi3 is &lt;2.4.5-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779884" version="1" comment="libexempi3-32bit is &lt;2.4.5-150000.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780894" version="1" comment="MozillaFirefox is &lt;115.2.0-150200.152.102.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780895" version="1" comment="MozillaFirefox-branding-upstream is &lt;115.2.0-150200.152.102.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780896" version="1" comment="MozillaFirefox-devel is &lt;115.2.0-150200.152.102.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780897" version="1" comment="MozillaFirefox-translations-common is &lt;115.2.0-150200.152.102.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780898" version="1" comment="MozillaFirefox-translations-other is &lt;115.2.0-150200.152.102.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780852" version="1" comment="djvulibre is &lt;3.5.27-150200.11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780853" version="1" comment="djvulibre-doc is &lt;3.5.27-150200.11.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780854" version="1" comment="libdjvulibre-devel is &lt;3.5.27-150200.11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780855" version="1" comment="libdjvulibre21 is &lt;3.5.27-150200.11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780900" version="1" comment="amazon-ecs-init is &lt;1.53.0-150100.4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781663" version="1" comment="keylime-agent is &lt;6.3.2-150400.4.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781664" version="1" comment="keylime-config is &lt;6.3.2-150400.4.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781665" version="1" comment="keylime-firewalld is &lt;6.3.2-150400.4.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781678" version="1" comment="keylime-logrotate is &lt;6.3.2-150400.4.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781666" version="1" comment="keylime-registrar is &lt;6.3.2-150400.4.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781667" version="1" comment="keylime-tpm_cert_store is &lt;6.3.2-150400.4.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781668" version="1" comment="keylime-verifier is &lt;6.3.2-150400.4.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781669" version="1" comment="python3-keylime is &lt;6.3.2-150400.4.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780899" version="1" comment="sccache is &lt;0.4.2~3-150400.3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780782" version="1" comment="gsl_2_4-gnu-hpc is &lt;2.4-150100.9.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780783" version="1" comment="gsl_2_4-gnu-hpc-devel is &lt;2.4-150100.9.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780784" version="1" comment="gsl_2_4-gnu-hpc-doc is &lt;2.4-150100.9.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780785" version="1" comment="gsl_2_4-gnu-hpc-examples is &lt;2.4-150100.9.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780786" version="1" comment="gsl_2_4-gnu-hpc-module is &lt;2.4-150100.9.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780788" version="1" comment="libgsl_2_4-gnu-hpc is &lt;2.4-150100.9.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780789" version="1" comment="libgslcblas_2_4-gnu-hpc is &lt;2.4-150100.9.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779829" version="1" comment="apache2-mod_php8 is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779830" version="1" comment="php8 is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779831" version="1" comment="php8-bcmath is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779832" version="1" comment="php8-bz2 is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779833" version="1" comment="php8-calendar is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779834" version="1" comment="php8-cli is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779835" version="1" comment="php8-ctype is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779836" version="1" comment="php8-curl is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779837" version="1" comment="php8-dba is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779838" version="1" comment="php8-devel is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779839" version="1" comment="php8-dom is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779840" version="1" comment="php8-embed is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779841" version="1" comment="php8-enchant is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779842" version="1" comment="php8-exif is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779843" version="1" comment="php8-fastcgi is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779844" version="1" comment="php8-fileinfo is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779845" version="1" comment="php8-fpm is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779846" version="1" comment="php8-ftp is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779847" version="1" comment="php8-gd is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779848" version="1" comment="php8-gettext is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779849" version="1" comment="php8-gmp is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779850" version="1" comment="php8-iconv is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779851" version="1" comment="php8-intl is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779852" version="1" comment="php8-ldap is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779853" version="1" comment="php8-mbstring is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779854" version="1" comment="php8-mysql is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779855" version="1" comment="php8-odbc is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779856" version="1" comment="php8-opcache is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779857" version="1" comment="php8-openssl is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779858" version="1" comment="php8-pcntl is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779859" version="1" comment="php8-pdo is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779860" version="1" comment="php8-pgsql is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779861" version="1" comment="php8-phar is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779862" version="1" comment="php8-posix is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779863" version="1" comment="php8-readline is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779864" version="1" comment="php8-shmop is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779865" version="1" comment="php8-snmp is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779866" version="1" comment="php8-soap is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779867" version="1" comment="php8-sockets is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779868" version="1" comment="php8-sodium is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779869" version="1" comment="php8-sqlite is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779870" version="1" comment="php8-sysvmsg is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779871" version="1" comment="php8-sysvsem is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779872" version="1" comment="php8-sysvshm is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779873" version="1" comment="php8-test is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779874" version="1" comment="php8-tidy is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779875" version="1" comment="php8-tokenizer is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779876" version="1" comment="php8-xmlreader is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779877" version="1" comment="php8-xmlwriter is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779878" version="1" comment="php8-xsl is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779879" version="1" comment="php8-zip is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779880" version="1" comment="php8-zlib is &lt;8.0.30-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781458" version="1" comment="busybox-adduser is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781459" version="1" comment="busybox-attr is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781460" version="1" comment="busybox-bc is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781461" version="1" comment="busybox-bind-utils is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781462" version="1" comment="busybox-bzip2 is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781463" version="1" comment="busybox-coreutils is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781464" version="1" comment="busybox-cpio is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781465" version="1" comment="busybox-diffutils is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781466" version="1" comment="busybox-dos2unix is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781467" version="1" comment="busybox-ed is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781468" version="1" comment="busybox-findutils is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781469" version="1" comment="busybox-gawk is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781470" version="1" comment="busybox-grep is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781471" version="1" comment="busybox-gzip is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781472" version="1" comment="busybox-hostname is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781473" version="1" comment="busybox-iproute2 is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781474" version="1" comment="busybox-iputils is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781475" version="1" comment="busybox-kbd is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781476" version="1" comment="busybox-kmod is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781477" version="1" comment="busybox-less is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781478" version="1" comment="busybox-links is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781479" version="1" comment="busybox-man is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781480" version="1" comment="busybox-misc is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781481" version="1" comment="busybox-ncurses-utils is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781482" version="1" comment="busybox-net-tools is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781483" version="1" comment="busybox-netcat is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781484" version="1" comment="busybox-patch is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781485" version="1" comment="busybox-policycoreutils is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781486" version="1" comment="busybox-procps is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781487" version="1" comment="busybox-psmisc is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781488" version="1" comment="busybox-sed is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781489" version="1" comment="busybox-selinux-tools is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781490" version="1" comment="busybox-sendmail is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781491" version="1" comment="busybox-sh is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781492" version="1" comment="busybox-sharutils is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781494" version="1" comment="busybox-syslogd is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781495" version="1" comment="busybox-sysvinit-tools is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781496" version="1" comment="busybox-tar is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781497" version="1" comment="busybox-telnet is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781499" version="1" comment="busybox-tftp is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781500" version="1" comment="busybox-time is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781501" version="1" comment="busybox-traceroute is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781502" version="1" comment="busybox-tunctl is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781503" version="1" comment="busybox-unzip is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781504" version="1" comment="busybox-util-linux is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781505" version="1" comment="busybox-vi is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781506" version="1" comment="busybox-vlan is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781508" version="1" comment="busybox-wget is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781509" version="1" comment="busybox-which is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781510" version="1" comment="busybox-whois is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781511" version="1" comment="busybox-xz is &lt;1.35.0-150400.4.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781000" version="1" comment="kubernetes1.18-client is &lt;1.18.10-150200.5.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781001" version="1" comment="kubernetes1.18-client-common is &lt;1.18.10-150200.5.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781405" version="1" comment="docker is &lt;24.0.5_ce-150000.185.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781406" version="1" comment="docker-bash-completion is &lt;24.0.5_ce-150000.185.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781407" version="1" comment="docker-fish-completion is &lt;24.0.5_ce-150000.185.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781408" version="1" comment="docker-zsh-completion is &lt;24.0.5_ce-150000.185.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781008" version="1" comment="amazon-ssm-agent is &lt;3.1.1260.0-150000.5.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779774" version="1" comment="apache2-mod_php7 is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779775" version="1" comment="php7 is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779776" version="1" comment="php7-bcmath is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779777" version="1" comment="php7-bz2 is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779778" version="1" comment="php7-calendar is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779779" version="1" comment="php7-cli is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779780" version="1" comment="php7-ctype is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779781" version="1" comment="php7-curl is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779782" version="1" comment="php7-dba is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779783" version="1" comment="php7-devel is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779784" version="1" comment="php7-dom is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779785" version="1" comment="php7-embed is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779786" version="1" comment="php7-enchant is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779787" version="1" comment="php7-exif is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779788" version="1" comment="php7-fastcgi is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779789" version="1" comment="php7-fileinfo is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779790" version="1" comment="php7-fpm is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779791" version="1" comment="php7-ftp is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779792" version="1" comment="php7-gd is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779793" version="1" comment="php7-gettext is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779794" version="1" comment="php7-gmp is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779795" version="1" comment="php7-iconv is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779796" version="1" comment="php7-intl is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779797" version="1" comment="php7-json is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779798" version="1" comment="php7-ldap is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779799" version="1" comment="php7-mbstring is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779800" version="1" comment="php7-mysql is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779801" version="1" comment="php7-odbc is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779802" version="1" comment="php7-opcache is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779803" version="1" comment="php7-openssl is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779804" version="1" comment="php7-pcntl is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779805" version="1" comment="php7-pdo is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779806" version="1" comment="php7-pgsql is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779807" version="1" comment="php7-phar is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779808" version="1" comment="php7-posix is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779809" version="1" comment="php7-readline is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779810" version="1" comment="php7-shmop is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779811" version="1" comment="php7-snmp is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779812" version="1" comment="php7-soap is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779813" version="1" comment="php7-sockets is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779814" version="1" comment="php7-sodium is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779815" version="1" comment="php7-sqlite is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779816" version="1" comment="php7-sysvmsg is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779817" version="1" comment="php7-sysvsem is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779818" version="1" comment="php7-sysvshm is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779819" version="1" comment="php7-test is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779820" version="1" comment="php7-tidy is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779821" version="1" comment="php7-tokenizer is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779822" version="1" comment="php7-xmlreader is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779823" version="1" comment="php7-xmlrpc is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779824" version="1" comment="php7-xmlwriter is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779825" version="1" comment="php7-xsl is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779826" version="1" comment="php7-zip is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779827" version="1" comment="php7-zlib is &lt;7.4.33-150400.4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779885" version="1" comment="libssh2-1 is &lt;1.9.0-150000.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779886" version="1" comment="libssh2-1-32bit is &lt;1.9.0-150000.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779887" version="1" comment="libssh2-devel is &lt;1.9.0-150000.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780856" version="1" comment="WebKitGTK-4.0-lang is &lt;2.40.5-150400.4.48.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780857" version="1" comment="WebKitGTK-4.1-lang is &lt;2.40.5-150400.4.48.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780858" version="1" comment="WebKitGTK-6.0-lang is &lt;2.40.5-150400.4.48.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780859" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780860" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.40.5-150400.4.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780861" version="1" comment="libjavascriptcoregtk-4_0-18-64bit is &lt;2.40.5-150400.4.48.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780862" version="1" comment="libjavascriptcoregtk-4_1-0 is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780863" version="1" comment="libjavascriptcoregtk-4_1-0-32bit is &lt;2.40.5-150400.4.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780864" version="1" comment="libjavascriptcoregtk-4_1-0-64bit is &lt;2.40.5-150400.4.48.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780865" version="1" comment="libjavascriptcoregtk-6_0-1 is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780866" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780867" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.40.5-150400.4.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780868" version="1" comment="libwebkit2gtk-4_0-37-64bit is &lt;2.40.5-150400.4.48.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780869" version="1" comment="libwebkit2gtk-4_1-0 is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780870" version="1" comment="libwebkit2gtk-4_1-0-32bit is &lt;2.40.5-150400.4.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780871" version="1" comment="libwebkit2gtk-4_1-0-64bit is &lt;2.40.5-150400.4.48.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780872" version="1" comment="libwebkitgtk-6_0-4 is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780873" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780874" version="1" comment="typelib-1_0-JavaScriptCore-4_1 is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780875" version="1" comment="typelib-1_0-JavaScriptCore-6_0 is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780876" version="1" comment="typelib-1_0-WebKit-6_0 is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780877" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780878" version="1" comment="typelib-1_0-WebKit2-4_1 is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780879" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780880" version="1" comment="typelib-1_0-WebKit2WebExtension-4_1 is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780881" version="1" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780882" version="1" comment="webkit-jsc-4 is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780883" version="1" comment="webkit-jsc-4.1 is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780884" version="1" comment="webkit-jsc-6.0 is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780885" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780886" version="1" comment="webkit2gtk-4_1-injected-bundles is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780887" version="1" comment="webkit2gtk3-devel is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780888" version="1" comment="webkit2gtk3-minibrowser is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780889" version="1" comment="webkit2gtk3-soup2-devel is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780890" version="1" comment="webkit2gtk3-soup2-minibrowser is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780891" version="1" comment="webkit2gtk4-devel is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780892" version="1" comment="webkit2gtk4-minibrowser is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780893" version="1" comment="webkitgtk-6_0-injected-bundles is &lt;2.40.5-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781007" version="1" comment="rekor is &lt;1.2.1-150400.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781317" version="1" comment="geoipupdate is &lt;4.2.2-150000.1.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781318" version="1" comment="geoipupdate-legacy is &lt;4.2.2-150000.1.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781005" version="1" comment="skopeo is &lt;1.12.0-150300.11.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781384" version="1" comment="icu73_2 is &lt;73.2-150000.1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781385" version="1" comment="libicu73_2 is &lt;73.2-150000.1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781386" version="1" comment="libicu73_2-bedata is &lt;73.2-150000.1.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781387" version="1" comment="libicu73_2-devel is &lt;73.2-150000.1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781388" version="1" comment="libicu73_2-doc is &lt;73.2-150000.1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781389" version="1" comment="libicu73_2-ledata is &lt;73.2-150000.1.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781003" version="1" comment="terraform-provider-helm is &lt;2.9.0-150200.6.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781004" version="1" comment="terraform-provider-null is &lt;3.0.0-150200.6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781002" version="1" comment="terraform-provider-aws is &lt;3.11.0-150200.6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794715" version="1" comment="MozillaFirefox is &lt;115.2.1-150200.152.105.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794716" version="1" comment="MozillaFirefox-branding-upstream is &lt;115.2.1-150200.152.105.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794717" version="1" comment="MozillaFirefox-devel is &lt;115.2.1-150200.152.105.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794718" version="1" comment="MozillaFirefox-translations-common is &lt;115.2.1-150200.152.105.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794719" version="1" comment="MozillaFirefox-translations-other is &lt;115.2.1-150200.152.105.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795106" version="1" comment="libwebp-devel is &lt;1.0.3-150200.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795107" version="1" comment="libwebp-devel-32bit is &lt;1.0.3-150200.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795108" version="1" comment="libwebp-tools is &lt;1.0.3-150200.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795109" version="1" comment="libwebp7 is &lt;1.0.3-150200.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795110" version="1" comment="libwebp7-32bit is &lt;1.0.3-150200.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795111" version="1" comment="libwebpdecoder3 is &lt;1.0.3-150200.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795112" version="1" comment="libwebpdecoder3-32bit is &lt;1.0.3-150200.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795113" version="1" comment="libwebpdemux2 is &lt;1.0.3-150200.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795114" version="1" comment="libwebpdemux2-32bit is &lt;1.0.3-150200.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795115" version="1" comment="libwebpmux3 is &lt;1.0.3-150200.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795116" version="1" comment="libwebpmux3-32bit is &lt;1.0.3-150200.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780808" version="1" comment="flac is &lt;1.3.2-150000.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780809" version="1" comment="flac-devel is &lt;1.3.2-150000.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780810" version="1" comment="flac-devel-32bit is &lt;1.3.2-150000.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780811" version="1" comment="flac-doc is &lt;1.3.2-150000.3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780812" version="1" comment="libFLAC++6 is &lt;1.3.2-150000.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780813" version="1" comment="libFLAC++6-32bit is &lt;1.3.2-150000.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780814" version="1" comment="libFLAC8 is &lt;1.3.2-150000.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009780815" version="1" comment="libFLAC8-32bit is &lt;1.3.2-150000.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795204" version="1" comment="cluster-md-kmp-azure is &lt;5.14.21-150500.33.17.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795205" version="1" comment="dlm-kmp-azure is &lt;5.14.21-150500.33.17.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795206" version="1" comment="gfs2-kmp-azure is &lt;5.14.21-150500.33.17.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795207" version="1" comment="kernel-azure is &lt;5.14.21-150500.33.17.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795208" version="1" comment="kernel-azure-devel is &lt;5.14.21-150500.33.17.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795209" version="1" comment="kernel-azure-extra is &lt;5.14.21-150500.33.17.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795210" version="1" comment="kernel-azure-livepatch-devel is &lt;5.14.21-150500.33.17.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795211" version="1" comment="kernel-azure-optional is &lt;5.14.21-150500.33.17.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795212" version="1" comment="kernel-azure-vdso is &lt;5.14.21-150500.33.17.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795213" version="1" comment="kernel-devel-azure is &lt;5.14.21-150500.33.17.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795214" version="1" comment="kernel-source-azure is &lt;5.14.21-150500.33.17.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795215" version="1" comment="kernel-syms-azure is &lt;5.14.21-150500.33.17.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795216" version="1" comment="kselftests-kmp-azure is &lt;5.14.21-150500.33.17.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795217" version="1" comment="ocfs2-kmp-azure is &lt;5.14.21-150500.33.17.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795218" version="1" comment="reiserfs-kmp-azure is &lt;5.14.21-150500.33.17.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795933" version="1" comment="cpp12 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796078" version="1" comment="cross-aarch64-gcc12-bootstrap is &lt;12.3.0+git1204-150000.1.16.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796079" version="1" comment="cross-arm-gcc12 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796080" version="1" comment="cross-arm-gcc12-icecream-backend is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796081" version="1" comment="cross-arm-none-gcc12-bootstrap is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796082" version="1" comment="cross-avr-gcc12-bootstrap is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796083" version="1" comment="cross-epiphany-gcc12-bootstrap is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796084" version="1" comment="cross-hppa-gcc12 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796085" version="1" comment="cross-hppa-gcc12-bootstrap is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796086" version="1" comment="cross-hppa-gcc12-icecream-backend is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796087" version="1" comment="cross-m68k-gcc12 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796088" version="1" comment="cross-m68k-gcc12-icecream-backend is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796089" version="1" comment="cross-mips-gcc12 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796090" version="1" comment="cross-mips-gcc12-icecream-backend is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795934" version="1" comment="cross-nvptx-gcc12 is &lt;12.3.0+git1204-150000.1.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795935" version="1" comment="cross-nvptx-newlib12-devel is &lt;12.3.0+git1204-150000.1.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796091" version="1" comment="cross-ppc64-gcc12 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796092" version="1" comment="cross-ppc64-gcc12-icecream-backend is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796093" version="1" comment="cross-ppc64le-gcc12 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796094" version="1" comment="cross-ppc64le-gcc12-icecream-backend is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796095" version="1" comment="cross-riscv64-elf-gcc12-bootstrap is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796096" version="1" comment="cross-riscv64-gcc12-bootstrap is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796097" version="1" comment="cross-rx-gcc12-bootstrap is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796098" version="1" comment="cross-s390x-gcc12 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796099" version="1" comment="cross-s390x-gcc12-icecream-backend is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796100" version="1" comment="cross-sparc-gcc12 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796101" version="1" comment="cross-sparc64-gcc12 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796102" version="1" comment="cross-sparc64-gcc12-icecream-backend is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796103" version="1" comment="cross-sparcv9-gcc12-icecream-backend is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796104" version="1" comment="cross-x86_64-gcc12 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796105" version="1" comment="cross-x86_64-gcc12-icecream-backend is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795936" version="1" comment="gcc12 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796106" version="1" comment="gcc12-32bit is &lt;12.3.0+git1204-150000.1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795938" version="1" comment="gcc12-PIE is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795939" version="1" comment="gcc12-ada is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796107" version="1" comment="gcc12-ada-32bit is &lt;12.3.0+git1204-150000.1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795941" version="1" comment="gcc12-c++ is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796108" version="1" comment="gcc12-c++-32bit is &lt;12.3.0+git1204-150000.1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795943" version="1" comment="gcc12-d is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796109" version="1" comment="gcc12-d-32bit is &lt;12.3.0+git1204-150000.1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795945" version="1" comment="gcc12-fortran is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796110" version="1" comment="gcc12-fortran-32bit is &lt;12.3.0+git1204-150000.1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795947" version="1" comment="gcc12-go is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796111" version="1" comment="gcc12-go-32bit is &lt;12.3.0+git1204-150000.1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795949" version="1" comment="gcc12-info is &lt;12.3.0+git1204-150000.1.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795950" version="1" comment="gcc12-locale is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795951" version="1" comment="gcc12-obj-c++ is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796112" version="1" comment="gcc12-obj-c++-32bit is &lt;12.3.0+git1204-150000.1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795953" version="1" comment="gcc12-objc is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796113" version="1" comment="gcc12-objc-32bit is &lt;12.3.0+git1204-150000.1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795955" version="1" comment="gcc12-testresults is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795956" version="1" comment="libada12 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796114" version="1" comment="libada12-32bit is &lt;12.3.0+git1204-150000.1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795958" version="1" comment="libasan8 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796115" version="1" comment="libasan8-32bit is &lt;12.3.0+git1204-150000.1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795960" version="1" comment="libatomic1 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795961" version="1" comment="libatomic1-32bit is &lt;12.3.0+git1204-150000.1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795962" version="1" comment="libgcc_s1 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795963" version="1" comment="libgcc_s1-32bit is &lt;12.3.0+git1204-150000.1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795964" version="1" comment="libgdruntime3 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796116" version="1" comment="libgdruntime3-32bit is &lt;12.3.0+git1204-150000.1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795966" version="1" comment="libgfortran5 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795967" version="1" comment="libgfortran5-32bit is &lt;12.3.0+git1204-150000.1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795968" version="1" comment="libgo21 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796117" version="1" comment="libgo21-32bit is &lt;12.3.0+git1204-150000.1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795970" version="1" comment="libgomp1 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795971" version="1" comment="libgomp1-32bit is &lt;12.3.0+git1204-150000.1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795972" version="1" comment="libgphobos3 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796118" version="1" comment="libgphobos3-32bit is &lt;12.3.0+git1204-150000.1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795974" version="1" comment="libhwasan0 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795975" version="1" comment="libitm1 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795976" version="1" comment="libitm1-32bit is &lt;12.3.0+git1204-150000.1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795977" version="1" comment="liblsan0 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795978" version="1" comment="libobjc4 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795979" version="1" comment="libobjc4-32bit is &lt;12.3.0+git1204-150000.1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795980" version="1" comment="libquadmath0 is &lt;12.3.0+git1204-150000.1.16.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795981" version="1" comment="libquadmath0-32bit is &lt;12.3.0+git1204-150000.1.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795982" version="1" comment="libstdc++6 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795983" version="1" comment="libstdc++6-32bit is &lt;12.3.0+git1204-150000.1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795984" version="1" comment="libstdc++6-devel-gcc12 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796119" version="1" comment="libstdc++6-devel-gcc12-32bit is &lt;12.3.0+git1204-150000.1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795986" version="1" comment="libstdc++6-locale is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795987" version="1" comment="libstdc++6-pp is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796120" version="1" comment="libstdc++6-pp-32bit is &lt;12.3.0+git1204-150000.1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795989" version="1" comment="libtsan2 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795990" version="1" comment="libubsan1 is &lt;12.3.0+git1204-150000.1.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795991" version="1" comment="libubsan1-32bit is &lt;12.3.0+git1204-150000.1.16.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795065" version="1" comment="MozillaThunderbird is &lt;115.2.2-150200.8.130.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795066" version="1" comment="MozillaThunderbird-translations-common is &lt;115.2.2-150200.8.130.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795067" version="1" comment="MozillaThunderbird-translations-other is &lt;115.2.2-150200.8.130.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781730" version="1" comment="libxml2-2 is &lt;2.10.3-150500.5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781731" version="1" comment="libxml2-2-32bit is &lt;2.10.3-150500.5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781732" version="1" comment="libxml2-devel is &lt;2.10.3-150500.5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781733" version="1" comment="libxml2-devel-32bit is &lt;2.10.3-150500.5.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781734" version="1" comment="libxml2-doc is &lt;2.10.3-150500.5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781735" version="1" comment="libxml2-tools is &lt;2.10.3-150500.5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781736" version="1" comment="python3-libxml2 is &lt;2.10.3-150500.5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781737" version="1" comment="python311-libxml2 is &lt;2.10.3-150500.5.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794965" version="1" comment="kernel-vanilla is &lt;4.12.14-150100.197.157.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794966" version="1" comment="kernel-vanilla-base is &lt;4.12.14-150100.197.157.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794967" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-150100.197.157.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794968" version="1" comment="kernel-vanilla-livepatch-devel is &lt;4.12.14-150100.197.157.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795832" version="1" comment="cpp7 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795833" version="1" comment="cross-aarch64-gcc7 is &lt;7.5.0+r278197-150000.4.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795834" version="1" comment="cross-aarch64-gcc7-icecream-backend is &lt;7.5.0+r278197-150000.4.35.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795835" version="1" comment="cross-arm-gcc7 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795836" version="1" comment="cross-arm-none-gcc7-bootstrap is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795837" version="1" comment="cross-avr-gcc7-bootstrap is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795838" version="1" comment="cross-epiphany-gcc7-bootstrap is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795839" version="1" comment="cross-hppa-gcc7 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795840" version="1" comment="cross-hppa-gcc7-icecream-backend is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795841" version="1" comment="cross-i386-gcc7 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795842" version="1" comment="cross-i386-gcc7-icecream-backend is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795843" version="1" comment="cross-m68k-gcc7 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795844" version="1" comment="cross-m68k-gcc7-icecream-backend is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795845" version="1" comment="cross-mips-gcc7 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795846" version="1" comment="cross-mips-gcc7-icecream-backend is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795847" version="1" comment="cross-nvptx-gcc7 is &lt;7.5.0+r278197-150000.4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795848" version="1" comment="cross-nvptx-newlib7-devel is &lt;7.5.0+r278197-150000.4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795849" version="1" comment="cross-ppc64-gcc7 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795850" version="1" comment="cross-ppc64-gcc7-icecream-backend is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795851" version="1" comment="cross-ppc64le-gcc7 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795852" version="1" comment="cross-ppc64le-gcc7-icecream-backend is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795853" version="1" comment="cross-rx-gcc7-bootstrap is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795854" version="1" comment="cross-s390x-gcc7 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795855" version="1" comment="cross-s390x-gcc7-icecream-backend is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795856" version="1" comment="cross-sparc-gcc7 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795857" version="1" comment="cross-sparc64-gcc7 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795858" version="1" comment="cross-sparc64-gcc7-icecream-backend is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795859" version="1" comment="cross-sparcv9-gcc7-icecream-backend is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795860" version="1" comment="cross-x86_64-gcc7 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795861" version="1" comment="cross-x86_64-gcc7-icecream-backend is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795862" version="1" comment="gcc7 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795863" version="1" comment="gcc7-32bit is &lt;7.5.0+r278197-150000.4.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795864" version="1" comment="gcc7-ada is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795865" version="1" comment="gcc7-ada-32bit is &lt;7.5.0+r278197-150000.4.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795866" version="1" comment="gcc7-c++ is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795867" version="1" comment="gcc7-c++-32bit is &lt;7.5.0+r278197-150000.4.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795868" version="1" comment="gcc7-fortran is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795869" version="1" comment="gcc7-fortran-32bit is &lt;7.5.0+r278197-150000.4.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795870" version="1" comment="gcc7-go is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795871" version="1" comment="gcc7-go-32bit is &lt;7.5.0+r278197-150000.4.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795872" version="1" comment="gcc7-info is &lt;7.5.0+r278197-150000.4.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795873" version="1" comment="gcc7-locale is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795874" version="1" comment="gcc7-obj-c++ is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795875" version="1" comment="gcc7-obj-c++-32bit is &lt;7.5.0+r278197-150000.4.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795876" version="1" comment="gcc7-objc is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795877" version="1" comment="gcc7-objc-32bit is &lt;7.5.0+r278197-150000.4.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795878" version="1" comment="gcc7-testresults is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795879" version="1" comment="libada7 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795880" version="1" comment="libada7-32bit is &lt;7.5.0+r278197-150000.4.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795881" version="1" comment="libasan4 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795882" version="1" comment="libasan4-32bit is &lt;7.5.0+r278197-150000.4.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795883" version="1" comment="libatomic1-gcc7 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795884" version="1" comment="libatomic1-gcc7-32bit is &lt;7.5.0+r278197-150000.4.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795885" version="1" comment="libcilkrts5 is &lt;7.5.0+r278197-150000.4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795886" version="1" comment="libcilkrts5-32bit is &lt;7.5.0+r278197-150000.4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795887" version="1" comment="libgcc_s1-gcc7 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795888" version="1" comment="libgcc_s1-gcc7-32bit is &lt;7.5.0+r278197-150000.4.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795889" version="1" comment="libgfortran4 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795890" version="1" comment="libgfortran4-32bit is &lt;7.5.0+r278197-150000.4.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795891" version="1" comment="libgo11 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795892" version="1" comment="libgo11-32bit is &lt;7.5.0+r278197-150000.4.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795893" version="1" comment="libgomp1-gcc7 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795894" version="1" comment="libgomp1-gcc7-32bit is &lt;7.5.0+r278197-150000.4.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795895" version="1" comment="libitm1-gcc7 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795896" version="1" comment="libitm1-gcc7-32bit is &lt;7.5.0+r278197-150000.4.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795897" version="1" comment="liblsan0-gcc7 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795898" version="1" comment="libmpx2-gcc7 is &lt;7.5.0+r278197-150000.4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795899" version="1" comment="libmpx2-gcc7-32bit is &lt;7.5.0+r278197-150000.4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795900" version="1" comment="libmpxwrappers2-gcc7 is &lt;7.5.0+r278197-150000.4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795901" version="1" comment="libmpxwrappers2-gcc7-32bit is &lt;7.5.0+r278197-150000.4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795902" version="1" comment="libobjc4-gcc7 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795903" version="1" comment="libobjc4-gcc7-32bit is &lt;7.5.0+r278197-150000.4.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795904" version="1" comment="libquadmath0-gcc7 is &lt;7.5.0+r278197-150000.4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795905" version="1" comment="libquadmath0-gcc7-32bit is &lt;7.5.0+r278197-150000.4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795906" version="1" comment="libstdc++6-devel-gcc7 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795907" version="1" comment="libstdc++6-devel-gcc7-32bit is &lt;7.5.0+r278197-150000.4.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795908" version="1" comment="libstdc++6-gcc7 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795909" version="1" comment="libstdc++6-gcc7-32bit is &lt;7.5.0+r278197-150000.4.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795910" version="1" comment="libstdc++6-gcc7-locale is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795911" version="1" comment="libtsan0-gcc7 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795912" version="1" comment="libubsan0 is &lt;7.5.0+r278197-150000.4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795913" version="1" comment="libubsan0-32bit is &lt;7.5.0+r278197-150000.4.35.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781701" version="1" comment="python3-libxml2-python is &lt;2.9.7-150000.3.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782292" version="1" comment="go1.20 is &lt;1.20.8-150000.1.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782293" version="1" comment="go1.20-doc is &lt;1.20.8-150000.1.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782294" version="1" comment="go1.20-race is &lt;1.20.8-150000.1.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786201" version="1" comment="go1.21 is &lt;1.21.1-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786202" version="1" comment="go1.21-doc is &lt;1.21.1-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786203" version="1" comment="go1.21-race is &lt;1.21.1-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796838" version="1" comment="cups is &lt;2.2.7-150000.3.51.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796839" version="1" comment="cups-client is &lt;2.2.7-150000.3.51.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796840" version="1" comment="cups-config is &lt;2.2.7-150000.3.51.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796841" version="1" comment="cups-ddk is &lt;2.2.7-150000.3.51.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796842" version="1" comment="cups-devel is &lt;2.2.7-150000.3.51.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796843" version="1" comment="cups-devel-32bit is &lt;2.2.7-150000.3.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796844" version="1" comment="libcups2 is &lt;2.2.7-150000.3.51.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796845" version="1" comment="libcups2-32bit is &lt;2.2.7-150000.3.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796846" version="1" comment="libcupscgi1 is &lt;2.2.7-150000.3.51.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796847" version="1" comment="libcupscgi1-32bit is &lt;2.2.7-150000.3.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796848" version="1" comment="libcupsimage2 is &lt;2.2.7-150000.3.51.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796849" version="1" comment="libcupsimage2-32bit is &lt;2.2.7-150000.3.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796850" version="1" comment="libcupsmime1 is &lt;2.2.7-150000.3.51.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796851" version="1" comment="libcupsmime1-32bit is &lt;2.2.7-150000.3.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796852" version="1" comment="libcupsppdc1 is &lt;2.2.7-150000.3.51.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796853" version="1" comment="libcupsppdc1-32bit is &lt;2.2.7-150000.3.51.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782125" version="1" comment="libpython3_9-1_0 is &lt;3.9.18-150300.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782126" version="1" comment="libpython3_9-1_0-32bit is &lt;3.9.18-150300.4.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782127" version="1" comment="python39 is &lt;3.9.18-150300.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782128" version="1" comment="python39-32bit is &lt;3.9.18-150300.4.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782129" version="1" comment="python39-base is &lt;3.9.18-150300.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782130" version="1" comment="python39-base-32bit is &lt;3.9.18-150300.4.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782131" version="1" comment="python39-curses is &lt;3.9.18-150300.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782132" version="1" comment="python39-dbm is &lt;3.9.18-150300.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782133" version="1" comment="python39-devel is &lt;3.9.18-150300.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782134" version="1" comment="python39-doc is &lt;3.9.18-150300.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782135" version="1" comment="python39-doc-devhelp is &lt;3.9.18-150300.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782136" version="1" comment="python39-idle is &lt;3.9.18-150300.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782137" version="1" comment="python39-testsuite is &lt;3.9.18-150300.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782138" version="1" comment="python39-tk is &lt;3.9.18-150300.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782139" version="1" comment="python39-tools is &lt;3.9.18-150300.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796865" version="1" comment="frr is &lt;8.4-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796866" version="1" comment="frr-devel is &lt;8.4-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796867" version="1" comment="libfrr0 is &lt;8.4-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796868" version="1" comment="libfrr_pb0 is &lt;8.4-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796869" version="1" comment="libfrrcares0 is &lt;8.4-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796870" version="1" comment="libfrrfpm_pb0 is &lt;8.4-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796871" version="1" comment="libfrrospfapiclient0 is &lt;8.4-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796872" version="1" comment="libfrrsnmp0 is &lt;8.4-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796873" version="1" comment="libfrrzmq0 is &lt;8.4-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796874" version="1" comment="libmlag_pb0 is &lt;8.4-150500.4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781738" version="1" comment="libopenvswitch-3_1-0 is &lt;3.1.0-150500.3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781739" version="1" comment="libovn-23_03-0 is &lt;23.03.0-150500.3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781740" version="1" comment="openvswitch3 is &lt;3.1.0-150500.3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781741" version="1" comment="openvswitch3-devel is &lt;3.1.0-150500.3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781742" version="1" comment="openvswitch3-doc is &lt;3.1.0-150500.3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781743" version="1" comment="openvswitch3-ipsec is &lt;3.1.0-150500.3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781744" version="1" comment="openvswitch3-pki is &lt;3.1.0-150500.3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781745" version="1" comment="openvswitch3-test is &lt;3.1.0-150500.3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781746" version="1" comment="openvswitch3-vtep is &lt;3.1.0-150500.3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781747" version="1" comment="ovn3 is &lt;23.03.0-150500.3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781748" version="1" comment="ovn3-central is &lt;23.03.0-150500.3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781749" version="1" comment="ovn3-devel is &lt;23.03.0-150500.3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781750" version="1" comment="ovn3-doc is &lt;23.03.0-150500.3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781751" version="1" comment="ovn3-docker is &lt;23.03.0-150500.3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781752" version="1" comment="ovn3-host is &lt;23.03.0-150500.3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781753" version="1" comment="ovn3-vtep is &lt;23.03.0-150500.3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781754" version="1" comment="python3-ovs3 is &lt;3.1.0-150500.3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782301" version="1" comment="redis7 is &lt;7.0.8-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781425" version="1" comment="ruby2.5-rubygem-rails-html-sanitizer is &lt;1.0.4-150000.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781426" version="1" comment="ruby2.5-rubygem-rails-html-sanitizer-doc is &lt;1.0.4-150000.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781427" version="1" comment="ruby2.5-rubygem-rails-html-sanitizer-testsuite is &lt;1.0.4-150000.4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782106" version="1" comment="cargo is &lt;1.72.0-150400.24.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782107" version="1" comment="cargo1.72 is &lt;1.72.0-150400.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782108" version="1" comment="rust is &lt;1.72.0-150400.24.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782109" version="1" comment="rust1.72 is &lt;1.72.0-150400.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795068" version="1" comment="WebKitGTK-4.0-lang is &lt;2.40.5-150400.4.51.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795069" version="1" comment="WebKitGTK-4.1-lang is &lt;2.40.5-150400.4.51.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795070" version="1" comment="WebKitGTK-6.0-lang is &lt;2.40.5-150400.4.51.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795071" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795072" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.40.5-150400.4.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795073" version="1" comment="libjavascriptcoregtk-4_0-18-64bit is &lt;2.40.5-150400.4.51.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795074" version="1" comment="libjavascriptcoregtk-4_1-0 is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795075" version="1" comment="libjavascriptcoregtk-4_1-0-32bit is &lt;2.40.5-150400.4.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795076" version="1" comment="libjavascriptcoregtk-4_1-0-64bit is &lt;2.40.5-150400.4.51.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795077" version="1" comment="libjavascriptcoregtk-6_0-1 is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795078" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795079" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.40.5-150400.4.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795080" version="1" comment="libwebkit2gtk-4_0-37-64bit is &lt;2.40.5-150400.4.51.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795081" version="1" comment="libwebkit2gtk-4_1-0 is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795082" version="1" comment="libwebkit2gtk-4_1-0-32bit is &lt;2.40.5-150400.4.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795083" version="1" comment="libwebkit2gtk-4_1-0-64bit is &lt;2.40.5-150400.4.51.1 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795084" version="1" comment="libwebkitgtk-6_0-4 is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795085" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795086" version="1" comment="typelib-1_0-JavaScriptCore-4_1 is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795087" version="1" comment="typelib-1_0-JavaScriptCore-6_0 is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795088" version="1" comment="typelib-1_0-WebKit-6_0 is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795089" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795090" version="1" comment="typelib-1_0-WebKit2-4_1 is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795091" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795092" version="1" comment="typelib-1_0-WebKit2WebExtension-4_1 is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795093" version="1" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795094" version="1" comment="webkit-jsc-4 is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795095" version="1" comment="webkit-jsc-4.1 is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795096" version="1" comment="webkit-jsc-6.0 is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795097" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795098" version="1" comment="webkit2gtk-4_1-injected-bundles is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795099" version="1" comment="webkit2gtk3-devel is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795100" version="1" comment="webkit2gtk3-minibrowser is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795101" version="1" comment="webkit2gtk3-soup2-devel is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795102" version="1" comment="webkit2gtk3-soup2-minibrowser is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795103" version="1" comment="webkit2gtk4-devel is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795104" version="1" comment="webkit2gtk4-minibrowser is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795105" version="1" comment="webkitgtk-6_0-injected-bundles is &lt;2.40.5-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779888" version="1" comment="libwireshark15 is &lt;3.6.16-150000.3.100.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779889" version="1" comment="libwiretap12 is &lt;3.6.16-150000.3.100.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779890" version="1" comment="libwsutil13 is &lt;3.6.16-150000.3.100.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779891" version="1" comment="wireshark is &lt;3.6.16-150000.3.100.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779892" version="1" comment="wireshark-devel is &lt;3.6.16-150000.3.100.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779893" version="1" comment="wireshark-ui-qt is &lt;3.6.16-150000.3.100.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781320" version="1" comment="wire is &lt;0.5.0-150000.1.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797400" version="1" comment="ruby2.5-rubygem-actionview-5_1 is &lt;5.1.4-150000.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797401" version="1" comment="ruby2.5-rubygem-actionview-doc-5_1 is &lt;5.1.4-150000.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781009" version="1" comment="containerd is &lt;1.6.21-150000.95.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781010" version="1" comment="containerd-ctr is &lt;1.6.21-150000.95.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781020" version="1" comment="containerd-devel is &lt;1.6.21-150000.95.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781428" version="1" comment="ffmpeg is &lt;3.4.2-150200.11.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781429" version="1" comment="ffmpeg-private-devel is &lt;3.4.2-150200.11.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781430" version="1" comment="libavcodec-devel is &lt;3.4.2-150200.11.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781431" version="1" comment="libavcodec57 is &lt;3.4.2-150200.11.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781432" version="1" comment="libavcodec57-32bit is &lt;3.4.2-150200.11.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781433" version="1" comment="libavdevice-devel is &lt;3.4.2-150200.11.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781434" version="1" comment="libavdevice57 is &lt;3.4.2-150200.11.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781435" version="1" comment="libavdevice57-32bit is &lt;3.4.2-150200.11.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781436" version="1" comment="libavfilter-devel is &lt;3.4.2-150200.11.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781437" version="1" comment="libavfilter6 is &lt;3.4.2-150200.11.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781438" version="1" comment="libavfilter6-32bit is &lt;3.4.2-150200.11.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781439" version="1" comment="libavformat-devel is &lt;3.4.2-150200.11.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781440" version="1" comment="libavformat57 is &lt;3.4.2-150200.11.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781441" version="1" comment="libavformat57-32bit is &lt;3.4.2-150200.11.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781442" version="1" comment="libavresample-devel is &lt;3.4.2-150200.11.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781443" version="1" comment="libavresample3 is &lt;3.4.2-150200.11.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781444" version="1" comment="libavresample3-32bit is &lt;3.4.2-150200.11.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781445" version="1" comment="libavutil-devel is &lt;3.4.2-150200.11.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781446" version="1" comment="libavutil55 is &lt;3.4.2-150200.11.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781447" version="1" comment="libavutil55-32bit is &lt;3.4.2-150200.11.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781448" version="1" comment="libpostproc-devel is &lt;3.4.2-150200.11.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781449" version="1" comment="libpostproc54 is &lt;3.4.2-150200.11.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781450" version="1" comment="libpostproc54-32bit is &lt;3.4.2-150200.11.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781451" version="1" comment="libswresample-devel is &lt;3.4.2-150200.11.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781452" version="1" comment="libswresample2 is &lt;3.4.2-150200.11.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781453" version="1" comment="libswresample2-32bit is &lt;3.4.2-150200.11.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781454" version="1" comment="libswscale-devel is &lt;3.4.2-150200.11.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781455" version="1" comment="libswscale4 is &lt;3.4.2-150200.11.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781456" version="1" comment="libswscale4-32bit is &lt;3.4.2-150200.11.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798700" version="1" comment="busybox-static is &lt;1.35.0-150500.10.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798701" version="1" comment="busybox-testsuite is &lt;1.35.0-150500.10.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798702" version="1" comment="busybox-warewulf3 is &lt;1.35.0-150500.10.3.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797864" version="1" comment="bind is &lt;9.16.44-150500.8.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797865" version="1" comment="bind-doc is &lt;9.16.44-150500.8.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797866" version="1" comment="bind-utils is &lt;9.16.44-150500.8.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797867" version="1" comment="python3-bind is &lt;9.16.44-150500.8.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781703" version="1" comment="supportutils is &lt;3.1.26-150300.7.35.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796801" version="1" comment="curl is &lt;8.0.1-150400.5.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796802" version="1" comment="libcurl-devel is &lt;8.0.1-150400.5.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796803" version="1" comment="libcurl-devel-32bit is &lt;8.0.1-150400.5.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796804" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796805" version="1" comment="libcurl4-32bit is &lt;8.0.1-150400.5.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782110" version="1" comment="libpython3_10-1_0 is &lt;3.10.13-150400.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782111" version="1" comment="libpython3_10-1_0-32bit is &lt;3.10.13-150400.4.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782112" version="1" comment="python310 is &lt;3.10.13-150400.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782113" version="1" comment="python310-32bit is &lt;3.10.13-150400.4.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782114" version="1" comment="python310-base is &lt;3.10.13-150400.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782115" version="1" comment="python310-base-32bit is &lt;3.10.13-150400.4.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782116" version="1" comment="python310-curses is &lt;3.10.13-150400.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782117" version="1" comment="python310-dbm is &lt;3.10.13-150400.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782118" version="1" comment="python310-devel is &lt;3.10.13-150400.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782119" version="1" comment="python310-doc is &lt;3.10.13-150400.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782120" version="1" comment="python310-doc-devhelp is &lt;3.10.13-150400.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782121" version="1" comment="python310-idle is &lt;3.10.13-150400.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782122" version="1" comment="python310-testsuite is &lt;3.10.13-150400.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782123" version="1" comment="python310-tk is &lt;3.10.13-150400.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782124" version="1" comment="python310-tools is &lt;3.10.13-150400.4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791590" version="1" comment="binutils is &lt;2.41-150100.7.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791591" version="1" comment="binutils-devel is &lt;2.41-150100.7.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791592" version="1" comment="binutils-devel-32bit is &lt;2.41-150100.7.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791593" version="1" comment="binutils-gold is &lt;2.41-150100.7.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791594" version="1" comment="cross-aarch64-binutils is &lt;2.41-150100.7.46.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791595" version="1" comment="cross-arm-binutils is &lt;2.41-150100.7.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791596" version="1" comment="cross-avr-binutils is &lt;2.41-150100.7.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791597" version="1" comment="cross-epiphany-binutils is &lt;2.41-150100.7.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791598" version="1" comment="cross-hppa-binutils is &lt;2.41-150100.7.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791599" version="1" comment="cross-hppa64-binutils is &lt;2.41-150100.7.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791600" version="1" comment="cross-i386-binutils is &lt;2.41-150100.7.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791601" version="1" comment="cross-ia64-binutils is &lt;2.41-150100.7.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791602" version="1" comment="cross-m68k-binutils is &lt;2.41-150100.7.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791603" version="1" comment="cross-mips-binutils is &lt;2.41-150100.7.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791604" version="1" comment="cross-ppc-binutils is &lt;2.41-150100.7.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791605" version="1" comment="cross-ppc64-binutils is &lt;2.41-150100.7.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791606" version="1" comment="cross-ppc64le-binutils is &lt;2.41-150100.7.46.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791607" version="1" comment="cross-riscv64-binutils is &lt;2.41-150100.7.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791608" version="1" comment="cross-rx-binutils is &lt;2.41-150100.7.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791609" version="1" comment="cross-s390-binutils is &lt;2.41-150100.7.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791610" version="1" comment="cross-s390x-binutils is &lt;2.41-150100.7.46.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791611" version="1" comment="cross-sparc-binutils is &lt;2.41-150100.7.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791612" version="1" comment="cross-sparc64-binutils is &lt;2.41-150100.7.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791613" version="1" comment="cross-spu-binutils is &lt;2.41-150100.7.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791614" version="1" comment="cross-x86_64-binutils is &lt;2.41-150100.7.46.1 for aarch64,ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791623" version="1" comment="cross-xtensa-binutils is &lt;2.41-150100.7.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791615" version="1" comment="libctf-nobfd0 is &lt;2.41-150100.7.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791616" version="1" comment="libctf0 is &lt;2.41-150100.7.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791617" version="1" comment="mutt is &lt;1.10.1-150000.3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791618" version="1" comment="mutt-doc is &lt;1.10.1-150000.3.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791619" version="1" comment="mutt-lang is &lt;1.10.1-150000.3.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009791620" version="1" comment="python3-brotlipy is &lt;0.7.0-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009187010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794727" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794728" version="1" comment="libpython3_6m1_0-32bit is &lt;3.6.15-150300.10.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794729" version="1" comment="python3 is &lt;3.6.15-150300.10.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794730" version="1" comment="python3-base is &lt;3.6.15-150300.10.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794731" version="1" comment="python3-curses is &lt;3.6.15-150300.10.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794732" version="1" comment="python3-dbm is &lt;3.6.15-150300.10.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794733" version="1" comment="python3-devel is &lt;3.6.15-150300.10.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794734" version="1" comment="python3-doc is &lt;3.6.15-150300.10.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794735" version="1" comment="python3-doc-devhelp is &lt;3.6.15-150300.10.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794736" version="1" comment="python3-idle is &lt;3.6.15-150300.10.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794737" version="1" comment="python3-testsuite is &lt;3.6.15-150300.10.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794738" version="1" comment="python3-tk is &lt;3.6.15-150300.10.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794739" version="1" comment="python3-tools is &lt;3.6.15-150300.10.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796822" version="1" comment="libpainter0 is &lt;0.9.13.1-150200.4.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796823" version="1" comment="librfxencode0 is &lt;0.9.13.1-150200.4.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796824" version="1" comment="xrdp is &lt;0.9.13.1-150200.4.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796825" version="1" comment="xrdp-devel is &lt;0.9.13.1-150200.4.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796857" version="1" comment="xen is &lt;4.17.2_04-150500.3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796858" version="1" comment="xen-devel is &lt;4.17.2_04-150500.3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796859" version="1" comment="xen-doc-html is &lt;4.17.2_04-150500.3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796860" version="1" comment="xen-libs is &lt;4.17.2_04-150500.3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796861" version="1" comment="xen-libs-32bit is &lt;4.17.2_04-150500.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796862" version="1" comment="xen-tools is &lt;4.17.2_04-150500.3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796863" version="1" comment="xen-tools-domU is &lt;4.17.2_04-150500.3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796864" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.17.2_04-150500.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796834" version="1" comment="exempi-tools is &lt;2.4.5-150000.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796835" version="1" comment="libexempi-devel is &lt;2.4.5-150000.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796836" version="1" comment="libexempi3 is &lt;2.4.5-150000.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796837" version="1" comment="libexempi3-32bit is &lt;2.4.5-150000.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797776" version="1" comment="libvmtools-devel is &lt;12.3.0-150300.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797777" version="1" comment="libvmtools0 is &lt;12.3.0-150300.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797778" version="1" comment="open-vm-tools is &lt;12.3.0-150300.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797779" version="1" comment="open-vm-tools-containerinfo is &lt;12.3.0-150300.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797780" version="1" comment="open-vm-tools-desktop is &lt;12.3.0-150300.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797781" version="1" comment="open-vm-tools-salt-minion is &lt;12.3.0-150300.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797782" version="1" comment="open-vm-tools-sdmp is &lt;12.3.0-150300.37.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797393" version="1" comment="libfpm_pb0 is &lt;1.1.1-150400.12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797394" version="1" comment="libospf0 is &lt;1.1.1-150400.12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797395" version="1" comment="libospfapiclient0 is &lt;1.1.1-150400.12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797396" version="1" comment="libquagga_pb0 is &lt;1.1.1-150400.12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797397" version="1" comment="libzebra1 is &lt;1.1.1-150400.12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797398" version="1" comment="quagga is &lt;1.1.1-150400.12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797399" version="1" comment="quagga-devel is &lt;1.1.1-150400.12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798668" version="1" comment="go1.20-openssl is &lt;1.20.8.1-150000.1.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798669" version="1" comment="go1.20-openssl-doc is &lt;1.20.8.1-150000.1.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798670" version="1" comment="go1.20-openssl-race is &lt;1.20.8.1-150000.1.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798671" version="1" comment="go1.19-openssl is &lt;1.19.13.1-150000.1.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798672" version="1" comment="go1.19-openssl-doc is &lt;1.19.13.1-150000.1.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798673" version="1" comment="go1.19-openssl-race is &lt;1.19.13.1-150000.1.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796770" version="1" comment="gsl is &lt;2.6-150200.3.4.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796771" version="1" comment="gsl-devel is &lt;2.6-150200.3.4.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796772" version="1" comment="gsl-doc is &lt;2.6-150200.3.4.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796773" version="1" comment="gsl-examples is &lt;2.6-150200.3.4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796774" version="1" comment="gsl-gnu-hpc is &lt;2.6-150200.3.4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796775" version="1" comment="gsl-gnu-hpc-devel is &lt;2.6-150200.3.4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796776" version="1" comment="gsl-gnu-hpc-doc is &lt;2.6-150200.3.4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796777" version="1" comment="gsl_2_6-gnu-hpc is &lt;2.6-150200.3.4.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796778" version="1" comment="gsl_2_6-gnu-hpc-devel is &lt;2.6-150200.3.4.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796779" version="1" comment="gsl_2_6-gnu-hpc-doc is &lt;2.6-150200.3.4.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796780" version="1" comment="gsl_2_6-gnu-hpc-examples is &lt;2.6-150200.3.4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009176519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796781" version="1" comment="gsl_2_6-gnu-hpc-module is &lt;2.6-150200.3.4.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796782" version="1" comment="libgsl-gnu-hpc is &lt;2.6-150200.3.4.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796783" version="1" comment="libgsl25 is &lt;2.6-150200.3.4.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796784" version="1" comment="libgsl_2_6-gnu-hpc is &lt;2.6-150200.3.4.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796785" version="1" comment="libgslcblas-gnu-hpc is &lt;2.6-150200.3.4.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796786" version="1" comment="libgslcblas0 is &lt;2.6-150200.3.4.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796787" version="1" comment="libgslcblas_2_6-gnu-hpc is &lt;2.6-150200.3.4.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794706" version="1" comment="libmca_common_dstore1 is &lt;3.2.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794707" version="1" comment="libpmix2 is &lt;3.2.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794708" version="1" comment="pmix is &lt;3.2.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794709" version="1" comment="pmix-devel is &lt;3.2.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794710" version="1" comment="pmix-headers is &lt;3.2.3-150300.3.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794711" version="1" comment="pmix-mca-params is &lt;3.2.3-150300.3.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794712" version="1" comment="pmix-plugin-munge is &lt;3.2.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794713" version="1" comment="pmix-plugins is &lt;3.2.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794714" version="1" comment="pmix-test is &lt;3.2.3-150300.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797421" version="1" comment="python3-salt is &lt;3006.0-150500.4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797422" version="1" comment="salt is &lt;3006.0-150500.4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797423" version="1" comment="salt-api is &lt;3006.0-150500.4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797424" version="1" comment="salt-bash-completion is &lt;3006.0-150500.4.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797425" version="1" comment="salt-cloud is &lt;3006.0-150500.4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797426" version="1" comment="salt-doc is &lt;3006.0-150500.4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797427" version="1" comment="salt-fish-completion is &lt;3006.0-150500.4.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797428" version="1" comment="salt-master is &lt;3006.0-150500.4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797429" version="1" comment="salt-minion is &lt;3006.0-150500.4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797430" version="1" comment="salt-proxy is &lt;3006.0-150500.4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797431" version="1" comment="salt-ssh is &lt;3006.0-150500.4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797432" version="1" comment="salt-standalone-formulas-configuration is &lt;3006.0-150500.4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797433" version="1" comment="salt-syndic is &lt;3006.0-150500.4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797434" version="1" comment="salt-tests is &lt;3006.0-150500.4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797435" version="1" comment="salt-transactional-update is &lt;3006.0-150500.4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797436" version="1" comment="salt-zsh-completion is &lt;3006.0-150500.4.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796620" version="1" comment="golang-github-QubitProducts-exporter_exporter is &lt;0.4.0-150000.1.18.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796621" version="1" comment="golang-github-lusitaniae-apache_exporter is &lt;1.0.0-150000.1.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796622" version="1" comment="prometheus-blackbox_exporter is &lt;0.24.0-150000.1.23.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796623" version="1" comment="prometheus-postgres_exporter is &lt;0.10.1-150000.1.14.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796624" version="1" comment="spacecmd is &lt;4.3.23-150000.3.104.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796625" version="1" comment="supportutils-plugin-susemanager-client is &lt;4.3.3-150000.3.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795914" version="1" comment="grafana is &lt;9.5.5-150200.3.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798892" version="1" comment="iperf is &lt;3.15-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798893" version="1" comment="iperf-devel is &lt;3.15-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798894" version="1" comment="libiperf0 is &lt;3.15-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796788" version="1" comment="golang-github-prometheus-alertmanager is &lt;0.23.0-150100.4.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796789" version="1" comment="golang-github-prometheus-node_exporter is &lt;1.5.0-150100.3.26.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794749" version="1" comment="doxygen2man is &lt;2.0.6+20220323.758044b-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794750" version="1" comment="libqb-devel is &lt;2.0.6+20220323.758044b-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794751" version="1" comment="libqb-devel-32bit is &lt;2.0.6+20220323.758044b-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794752" version="1" comment="libqb-tests is &lt;2.0.6+20220323.758044b-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794753" version="1" comment="libqb-tools is &lt;2.0.6+20220323.758044b-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794754" version="1" comment="libqb100 is &lt;2.0.6+20220323.758044b-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794755" version="1" comment="libqb100-32bit is &lt;2.0.6+20220323.758044b-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797855" version="1" comment="MozillaFirefox is &lt;115.3.0-150200.152.108.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797856" version="1" comment="MozillaFirefox-branding-upstream is &lt;115.3.0-150200.152.108.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797857" version="1" comment="MozillaFirefox-devel is &lt;115.3.0-150200.152.108.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797858" version="1" comment="MozillaFirefox-translations-common is &lt;115.3.0-150200.152.108.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009797859" version="1" comment="MozillaFirefox-translations-other is &lt;115.3.0-150200.152.108.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795050" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-150000.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795051" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-150000.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795052" version="1" comment="python is &lt;2.7.18-150000.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795053" version="1" comment="python-32bit is &lt;2.7.18-150000.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795054" version="1" comment="python-base is &lt;2.7.18-150000.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795055" version="1" comment="python-base-32bit is &lt;2.7.18-150000.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795056" version="1" comment="python-curses is &lt;2.7.18-150000.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795057" version="1" comment="python-demo is &lt;2.7.18-150000.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795058" version="1" comment="python-devel is &lt;2.7.18-150000.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795059" version="1" comment="python-doc is &lt;2.7.18-150000.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795060" version="1" comment="python-doc-pdf is &lt;2.7.18-150000.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795061" version="1" comment="python-gdbm is &lt;2.7.18-150000.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795062" version="1" comment="python-idle is &lt;2.7.18-150000.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795063" version="1" comment="python-tk is &lt;2.7.18-150000.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795064" version="1" comment="python-xml is &lt;2.7.18-150000.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796626" version="1" comment="libpython3_11-1_0 is &lt;3.11.5-150400.9.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796627" version="1" comment="libpython3_11-1_0-32bit is &lt;3.11.5-150400.9.20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796628" version="1" comment="python311 is &lt;3.11.5-150400.9.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796629" version="1" comment="python311-32bit is &lt;3.11.5-150400.9.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796630" version="1" comment="python311-base is &lt;3.11.5-150400.9.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796631" version="1" comment="python311-base-32bit is &lt;3.11.5-150400.9.20.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796632" version="1" comment="python311-curses is &lt;3.11.5-150400.9.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796633" version="1" comment="python311-dbm is &lt;3.11.5-150400.9.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796634" version="1" comment="python311-devel is &lt;3.11.5-150400.9.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796635" version="1" comment="python311-doc is &lt;3.11.5-150400.9.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796636" version="1" comment="python311-doc-devhelp is &lt;3.11.5-150400.9.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796637" version="1" comment="python311-idle is &lt;3.11.5-150400.9.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796638" version="1" comment="python311-testsuite is &lt;3.11.5-150400.9.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796639" version="1" comment="python311-tk is &lt;3.11.5-150400.9.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796640" version="1" comment="python311-tools is &lt;3.11.5-150400.9.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799301" version="1" comment="libvpx-devel is &lt;1.11.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799302" version="1" comment="libvpx7 is &lt;1.11.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799303" version="1" comment="libvpx7-32bit is &lt;1.11.0-150400.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799304" version="1" comment="vpx-tools is &lt;1.11.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799621" version="1" comment="MozillaFirefox is &lt;115.3.1-150200.152.111.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799622" version="1" comment="MozillaFirefox-branding-upstream is &lt;115.3.1-150200.152.111.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799623" version="1" comment="MozillaFirefox-devel is &lt;115.3.1-150200.152.111.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799624" version="1" comment="MozillaFirefox-translations-common is &lt;115.3.1-150200.152.111.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799625" version="1" comment="MozillaFirefox-translations-other is &lt;115.3.1-150200.152.111.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781383" version="1" comment="runc is &lt;1.1.8-150000.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782286" version="1" comment="libeconf-devel is &lt;0.5.2-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782287" version="1" comment="libeconf-utils is &lt;0.5.2-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782288" version="1" comment="libeconf0 is &lt;0.5.2-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782289" version="1" comment="libeconf0-32bit is &lt;0.5.2-150400.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798666" version="1" comment="ruby2.5-rubygem-puma is &lt;4.3.12-150000.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798667" version="1" comment="ruby2.5-rubygem-puma-doc is &lt;4.3.12-150000.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799822" version="1" comment="libX11-6 is &lt;1.6.5-150000.3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799823" version="1" comment="libX11-6-32bit is &lt;1.6.5-150000.3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799824" version="1" comment="libX11-data is &lt;1.6.5-150000.3.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799825" version="1" comment="libX11-devel is &lt;1.6.5-150000.3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799826" version="1" comment="libX11-devel-32bit is &lt;1.6.5-150000.3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799827" version="1" comment="libX11-xcb1 is &lt;1.6.5-150000.3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799828" version="1" comment="libX11-xcb1-32bit is &lt;1.6.5-150000.3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799829" version="1" comment="libXpm-devel is &lt;3.5.12-150000.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799830" version="1" comment="libXpm-devel-32bit is &lt;3.5.12-150000.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799831" version="1" comment="libXpm-tools is &lt;3.5.12-150000.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799832" version="1" comment="libXpm4 is &lt;3.5.12-150000.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799833" version="1" comment="libXpm4-32bit is &lt;3.5.12-150000.3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796641" version="1" comment="libraw-devel is &lt;0.20.2-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796642" version="1" comment="libraw-devel-static is &lt;0.20.2-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796643" version="1" comment="libraw-tools is &lt;0.20.2-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796644" version="1" comment="libraw20 is &lt;0.20.2-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796645" version="1" comment="libraw20-32bit is &lt;0.20.2-150400.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798703" version="1" comment="cluster-md-kmp-64kb is &lt;5.14.21-150500.55.28.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798704" version="1" comment="cluster-md-kmp-default is &lt;5.14.21-150500.55.28.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798705" version="1" comment="dlm-kmp-64kb is &lt;5.14.21-150500.55.28.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798706" version="1" comment="dlm-kmp-default is &lt;5.14.21-150500.55.28.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798707" version="1" comment="dtb-allwinner is &lt;5.14.21-150500.55.28.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798708" version="1" comment="dtb-altera is &lt;5.14.21-150500.55.28.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798709" version="1" comment="dtb-amazon is &lt;5.14.21-150500.55.28.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798710" version="1" comment="dtb-amd is &lt;5.14.21-150500.55.28.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798711" version="1" comment="dtb-amlogic is &lt;5.14.21-150500.55.28.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798712" version="1" comment="dtb-apm is &lt;5.14.21-150500.55.28.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798713" version="1" comment="dtb-apple is &lt;5.14.21-150500.55.28.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798714" version="1" comment="dtb-arm is &lt;5.14.21-150500.55.28.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798715" version="1" comment="dtb-broadcom is &lt;5.14.21-150500.55.28.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798716" version="1" comment="dtb-cavium is &lt;5.14.21-150500.55.28.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798717" version="1" comment="dtb-exynos is &lt;5.14.21-150500.55.28.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798718" version="1" comment="dtb-freescale is &lt;5.14.21-150500.55.28.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798719" version="1" comment="dtb-hisilicon is &lt;5.14.21-150500.55.28.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798720" version="1" comment="dtb-lg is &lt;5.14.21-150500.55.28.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798721" version="1" comment="dtb-marvell is &lt;5.14.21-150500.55.28.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798722" version="1" comment="dtb-mediatek is &lt;5.14.21-150500.55.28.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798723" version="1" comment="dtb-nvidia is &lt;5.14.21-150500.55.28.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798724" version="1" comment="dtb-qcom is &lt;5.14.21-150500.55.28.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798725" version="1" comment="dtb-renesas is &lt;5.14.21-150500.55.28.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798726" version="1" comment="dtb-rockchip is &lt;5.14.21-150500.55.28.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798727" version="1" comment="dtb-socionext is &lt;5.14.21-150500.55.28.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798728" version="1" comment="dtb-sprd is &lt;5.14.21-150500.55.28.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798729" version="1" comment="dtb-xilinx is &lt;5.14.21-150500.55.28.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798730" version="1" comment="gfs2-kmp-64kb is &lt;5.14.21-150500.55.28.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798731" version="1" comment="gfs2-kmp-default is &lt;5.14.21-150500.55.28.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798732" version="1" comment="kernel-64kb is &lt;5.14.21-150500.55.28.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798733" version="1" comment="kernel-64kb-devel is &lt;5.14.21-150500.55.28.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798734" version="1" comment="kernel-64kb-extra is &lt;5.14.21-150500.55.28.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798735" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.14.21-150500.55.28.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798736" version="1" comment="kernel-64kb-optional is &lt;5.14.21-150500.55.28.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798737" version="1" comment="kernel-debug is &lt;5.14.21-150500.55.28.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798738" version="1" comment="kernel-debug-devel is &lt;5.14.21-150500.55.28.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798739" version="1" comment="kernel-debug-livepatch-devel is &lt;5.14.21-150500.55.28.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798740" version="1" comment="kernel-debug-vdso is &lt;5.14.21-150500.55.28.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798741" version="1" comment="kernel-default is &lt;5.14.21-150500.55.28.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798742" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.28.1.150500.6.11.2 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798743" version="1" comment="kernel-default-base-rebuild is &lt;5.14.21-150500.55.28.1.150500.6.11.2 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798744" version="1" comment="kernel-default-devel is &lt;5.14.21-150500.55.28.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798745" version="1" comment="kernel-default-extra is &lt;5.14.21-150500.55.28.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798746" version="1" comment="kernel-default-livepatch is &lt;5.14.21-150500.55.28.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798747" version="1" comment="kernel-default-livepatch-devel is &lt;5.14.21-150500.55.28.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798748" version="1" comment="kernel-default-optional is &lt;5.14.21-150500.55.28.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798749" version="1" comment="kernel-default-vdso is &lt;5.14.21-150500.55.28.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798750" version="1" comment="kernel-devel is &lt;5.14.21-150500.55.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798751" version="1" comment="kernel-docs is &lt;5.14.21-150500.55.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798752" version="1" comment="kernel-docs-html is &lt;5.14.21-150500.55.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798753" version="1" comment="kernel-kvmsmall is &lt;5.14.21-150500.55.28.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798754" version="1" comment="kernel-kvmsmall-devel is &lt;5.14.21-150500.55.28.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798755" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.14.21-150500.55.28.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798756" version="1" comment="kernel-kvmsmall-vdso is &lt;5.14.21-150500.55.28.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798757" version="1" comment="kernel-macros is &lt;5.14.21-150500.55.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798758" version="1" comment="kernel-obs-build is &lt;5.14.21-150500.55.28.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798759" version="1" comment="kernel-obs-qa is &lt;5.14.21-150500.55.28.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798760" version="1" comment="kernel-source is &lt;5.14.21-150500.55.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798761" version="1" comment="kernel-source-vanilla is &lt;5.14.21-150500.55.28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798762" version="1" comment="kernel-syms is &lt;5.14.21-150500.55.28.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798763" version="1" comment="kernel-zfcpdump is &lt;5.14.21-150500.55.28.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798764" version="1" comment="kselftests-kmp-64kb is &lt;5.14.21-150500.55.28.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798765" version="1" comment="kselftests-kmp-default is &lt;5.14.21-150500.55.28.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798766" version="1" comment="ocfs2-kmp-64kb is &lt;5.14.21-150500.55.28.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798767" version="1" comment="ocfs2-kmp-default is &lt;5.14.21-150500.55.28.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798768" version="1" comment="reiserfs-kmp-64kb is &lt;5.14.21-150500.55.28.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798769" version="1" comment="reiserfs-kmp-default is &lt;5.14.21-150500.55.28.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799717" version="1" comment="python3-reportlab is &lt;3.4.0-150000.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796806" version="1" comment="ghostscript is &lt;9.52-150000.173.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796807" version="1" comment="ghostscript-devel is &lt;9.52-150000.173.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796808" version="1" comment="ghostscript-x11 is &lt;9.52-150000.173.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799335" version="1" comment="cluster-md-kmp-rt is &lt;5.14.21-150500.13.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799336" version="1" comment="dlm-kmp-rt is &lt;5.14.21-150500.13.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799337" version="1" comment="gfs2-kmp-rt is &lt;5.14.21-150500.13.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799338" version="1" comment="kernel-devel-rt is &lt;5.14.21-150500.13.18.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799339" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799340" version="1" comment="kernel-rt-devel is &lt;5.14.21-150500.13.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799341" version="1" comment="kernel-rt-extra is &lt;5.14.21-150500.13.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799342" version="1" comment="kernel-rt-livepatch is &lt;5.14.21-150500.13.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799343" version="1" comment="kernel-rt-livepatch-devel is &lt;5.14.21-150500.13.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799344" version="1" comment="kernel-rt-optional is &lt;5.14.21-150500.13.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799345" version="1" comment="kernel-rt-vdso is &lt;5.14.21-150500.13.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799346" version="1" comment="kernel-rt_debug is &lt;5.14.21-150500.13.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799347" version="1" comment="kernel-rt_debug-devel is &lt;5.14.21-150500.13.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799348" version="1" comment="kernel-rt_debug-livepatch-devel is &lt;5.14.21-150500.13.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799349" version="1" comment="kernel-rt_debug-vdso is &lt;5.14.21-150500.13.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799350" version="1" comment="kernel-source-rt is &lt;5.14.21-150500.13.18.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799351" version="1" comment="kernel-syms-rt is &lt;5.14.21-150500.13.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799352" version="1" comment="kselftests-kmp-rt is &lt;5.14.21-150500.13.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799353" version="1" comment="ocfs2-kmp-rt is &lt;5.14.21-150500.13.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799354" version="1" comment="reiserfs-kmp-rt is &lt;5.14.21-150500.13.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798895" version="1" comment="libnghttp2-14 is &lt;1.40.0-150200.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798896" version="1" comment="libnghttp2-14-32bit is &lt;1.40.0-150200.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798897" version="1" comment="libnghttp2-devel is &lt;1.40.0-150200.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798898" version="1" comment="libnghttp2_asio-devel is &lt;1.40.0-150200.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798899" version="1" comment="libnghttp2_asio1 is &lt;1.40.0-150200.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798900" version="1" comment="libnghttp2_asio1-32bit is &lt;1.40.0-150200.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798901" version="1" comment="nghttp2 is &lt;1.40.0-150200.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798902" version="1" comment="python3-nghttp2 is &lt;1.40.0-150200.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799834" version="1" comment="yq is &lt;4.35.2-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799835" version="1" comment="yq-bash-completion is &lt;4.35.2-150500.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799836" version="1" comment="yq-fish-completion is &lt;4.35.2-150500.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799837" version="1" comment="yq-zsh-completion is &lt;4.35.2-150500.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800273" version="1" comment="MozillaThunderbird is &lt;115.3.1-150200.8.133.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800274" version="1" comment="MozillaThunderbird-translations-common is &lt;115.3.1-150200.8.133.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800275" version="1" comment="MozillaThunderbird-translations-other is &lt;115.3.1-150200.8.133.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800298" version="1" comment="go1.21 is &lt;1.21.2-150000.1.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800299" version="1" comment="go1.21-doc is &lt;1.21.2-150000.1.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800300" version="1" comment="go1.21-race is &lt;1.21.2-150000.1.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800301" version="1" comment="go1.20 is &lt;1.20.9-150000.1.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800302" version="1" comment="go1.20-doc is &lt;1.20.9-150000.1.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800303" version="1" comment="go1.20-race is &lt;1.20.9-150000.1.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800154" version="1" comment="conmon is &lt;2.1.7-150500.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782290" version="1" comment="login_defs is &lt;4.8.1-150400.10.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782291" version="1" comment="shadow is &lt;4.8.1-150400.10.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800738" version="1" comment="cluster-md-kmp-rt is &lt;5.14.21-150500.13.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800739" version="1" comment="dlm-kmp-rt is &lt;5.14.21-150500.13.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800740" version="1" comment="gfs2-kmp-rt is &lt;5.14.21-150500.13.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800741" version="1" comment="kernel-devel-rt is &lt;5.14.21-150500.13.21.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800742" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800743" version="1" comment="kernel-rt-devel is &lt;5.14.21-150500.13.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800744" version="1" comment="kernel-rt-extra is &lt;5.14.21-150500.13.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800745" version="1" comment="kernel-rt-livepatch is &lt;5.14.21-150500.13.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800746" version="1" comment="kernel-rt-livepatch-devel is &lt;5.14.21-150500.13.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800747" version="1" comment="kernel-rt-optional is &lt;5.14.21-150500.13.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800748" version="1" comment="kernel-rt-vdso is &lt;5.14.21-150500.13.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800749" version="1" comment="kernel-rt_debug is &lt;5.14.21-150500.13.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800750" version="1" comment="kernel-rt_debug-devel is &lt;5.14.21-150500.13.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800751" version="1" comment="kernel-rt_debug-livepatch-devel is &lt;5.14.21-150500.13.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800752" version="1" comment="kernel-rt_debug-vdso is &lt;5.14.21-150500.13.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800753" version="1" comment="kernel-source-rt is &lt;5.14.21-150500.13.21.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800754" version="1" comment="kernel-syms-rt is &lt;5.14.21-150500.13.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800755" version="1" comment="kselftests-kmp-rt is &lt;5.14.21-150500.13.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800756" version="1" comment="ocfs2-kmp-rt is &lt;5.14.21-150500.13.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800757" version="1" comment="reiserfs-kmp-rt is &lt;5.14.21-150500.13.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799718" version="1" comment="php-composer2 is &lt;2.2.3-150400.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801103" version="1" comment="curl is &lt;8.0.1-150400.5.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801104" version="1" comment="libcurl-devel is &lt;8.0.1-150400.5.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801105" version="1" comment="libcurl-devel-32bit is &lt;8.0.1-150400.5.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801106" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801107" version="1" comment="libcurl4-32bit is &lt;8.0.1-150400.5.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801170" version="1" comment="ctdb is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801171" version="1" comment="ctdb-pcp-pmda is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801172" version="1" comment="libsamba-policy-devel is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801173" version="1" comment="libsamba-policy-python3-devel is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801174" version="1" comment="libsamba-policy0-python3 is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801175" version="1" comment="libsamba-policy0-python3-32bit is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801176" version="1" comment="samba is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801177" version="1" comment="samba-ceph is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801178" version="1" comment="samba-client is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801179" version="1" comment="samba-client-32bit is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801180" version="1" comment="samba-client-libs is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801181" version="1" comment="samba-client-libs-32bit is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801182" version="1" comment="samba-devel is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801183" version="1" comment="samba-devel-32bit is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801184" version="1" comment="samba-doc is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801185" version="1" comment="samba-gpupdate is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801186" version="1" comment="samba-ldb-ldap is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801187" version="1" comment="samba-libs is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801188" version="1" comment="samba-libs-32bit is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801189" version="1" comment="samba-libs-python3 is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801190" version="1" comment="samba-libs-python3-32bit is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801191" version="1" comment="samba-python3 is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801192" version="1" comment="samba-test is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801193" version="1" comment="samba-tool is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801194" version="1" comment="samba-winbind is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801195" version="1" comment="samba-winbind-libs is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801196" version="1" comment="samba-winbind-libs-32bit is &lt;4.17.9+git.421.abde31ca5c2-150500.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800276" version="1" comment="ImageMagick is &lt;7.1.0.9-150400.6.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800277" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.0.9-150400.6.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800278" version="1" comment="ImageMagick-config-7-upstream is &lt;7.1.0.9-150400.6.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800279" version="1" comment="ImageMagick-devel is &lt;7.1.0.9-150400.6.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800280" version="1" comment="ImageMagick-devel-32bit is &lt;7.1.0.9-150400.6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800281" version="1" comment="ImageMagick-doc is &lt;7.1.0.9-150400.6.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800282" version="1" comment="ImageMagick-extra is &lt;7.1.0.9-150400.6.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800283" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.0.9-150400.6.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800284" version="1" comment="libMagick++-7_Q16HDRI5-32bit is &lt;7.1.0.9-150400.6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800285" version="1" comment="libMagick++-devel is &lt;7.1.0.9-150400.6.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800286" version="1" comment="libMagick++-devel-32bit is &lt;7.1.0.9-150400.6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800287" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.0.9-150400.6.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800288" version="1" comment="libMagickCore-7_Q16HDRI10-32bit is &lt;7.1.0.9-150400.6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800289" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.0.9-150400.6.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800290" version="1" comment="libMagickWand-7_Q16HDRI10-32bit is &lt;7.1.0.9-150400.6.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800291" version="1" comment="perl-PerlMagick is &lt;7.1.0.9-150400.6.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801197" version="1" comment="xen is &lt;4.17.2_06-150500.3.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801198" version="1" comment="xen-devel is &lt;4.17.2_06-150500.3.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801199" version="1" comment="xen-doc-html is &lt;4.17.2_06-150500.3.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801200" version="1" comment="xen-libs is &lt;4.17.2_06-150500.3.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801201" version="1" comment="xen-libs-32bit is &lt;4.17.2_06-150500.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801202" version="1" comment="xen-tools is &lt;4.17.2_06-150500.3.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801203" version="1" comment="xen-tools-domU is &lt;4.17.2_06-150500.3.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801204" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.17.2_06-150500.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800722" version="1" comment="cluster-md-kmp-azure is &lt;5.14.21-150500.33.20.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800723" version="1" comment="dlm-kmp-azure is &lt;5.14.21-150500.33.20.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800724" version="1" comment="gfs2-kmp-azure is &lt;5.14.21-150500.33.20.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800725" version="1" comment="kernel-azure is &lt;5.14.21-150500.33.20.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800726" version="1" comment="kernel-azure-devel is &lt;5.14.21-150500.33.20.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800727" version="1" comment="kernel-azure-extra is &lt;5.14.21-150500.33.20.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800728" version="1" comment="kernel-azure-livepatch-devel is &lt;5.14.21-150500.33.20.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800729" version="1" comment="kernel-azure-optional is &lt;5.14.21-150500.33.20.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800730" version="1" comment="kernel-azure-vdso is &lt;5.14.21-150500.33.20.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800731" version="1" comment="kernel-devel-azure is &lt;5.14.21-150500.33.20.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800732" version="1" comment="kernel-source-azure is &lt;5.14.21-150500.33.20.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800733" version="1" comment="kernel-syms-azure is &lt;5.14.21-150500.33.20.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800734" version="1" comment="kselftests-kmp-azure is &lt;5.14.21-150500.33.20.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800735" version="1" comment="ocfs2-kmp-azure is &lt;5.14.21-150500.33.20.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800736" version="1" comment="reiserfs-kmp-azure is &lt;5.14.21-150500.33.20.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799838" version="1" comment="rage-encryption is &lt;0.9.2+0-150500.3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799839" version="1" comment="rage-encryption-bash-completion is &lt;0.9.2+0-150500.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801097" version="1" comment="go1.20 is &lt;1.20.10-150000.1.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801098" version="1" comment="go1.20-doc is &lt;1.20.10-150000.1.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801099" version="1" comment="go1.20-race is &lt;1.20.10-150000.1.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801100" version="1" comment="go1.21 is &lt;1.21.3-150000.1.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801101" version="1" comment="go1.21-doc is &lt;1.21.3-150000.1.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801102" version="1" comment="go1.21-race is &lt;1.21.3-150000.1.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800655" version="1" comment="cluster-md-kmp-64kb is &lt;5.14.21-150500.55.31.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800656" version="1" comment="cluster-md-kmp-default is &lt;5.14.21-150500.55.31.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800657" version="1" comment="dlm-kmp-64kb is &lt;5.14.21-150500.55.31.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800658" version="1" comment="dlm-kmp-default is &lt;5.14.21-150500.55.31.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800659" version="1" comment="dtb-allwinner is &lt;5.14.21-150500.55.31.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800660" version="1" comment="dtb-altera is &lt;5.14.21-150500.55.31.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800661" version="1" comment="dtb-amazon is &lt;5.14.21-150500.55.31.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800662" version="1" comment="dtb-amd is &lt;5.14.21-150500.55.31.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800663" version="1" comment="dtb-amlogic is &lt;5.14.21-150500.55.31.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800664" version="1" comment="dtb-apm is &lt;5.14.21-150500.55.31.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800665" version="1" comment="dtb-apple is &lt;5.14.21-150500.55.31.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800666" version="1" comment="dtb-arm is &lt;5.14.21-150500.55.31.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800667" version="1" comment="dtb-broadcom is &lt;5.14.21-150500.55.31.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800668" version="1" comment="dtb-cavium is &lt;5.14.21-150500.55.31.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800669" version="1" comment="dtb-exynos is &lt;5.14.21-150500.55.31.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800670" version="1" comment="dtb-freescale is &lt;5.14.21-150500.55.31.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800671" version="1" comment="dtb-hisilicon is &lt;5.14.21-150500.55.31.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800672" version="1" comment="dtb-lg is &lt;5.14.21-150500.55.31.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800673" version="1" comment="dtb-marvell is &lt;5.14.21-150500.55.31.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800674" version="1" comment="dtb-mediatek is &lt;5.14.21-150500.55.31.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800675" version="1" comment="dtb-nvidia is &lt;5.14.21-150500.55.31.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800676" version="1" comment="dtb-qcom is &lt;5.14.21-150500.55.31.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800677" version="1" comment="dtb-renesas is &lt;5.14.21-150500.55.31.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800678" version="1" comment="dtb-rockchip is &lt;5.14.21-150500.55.31.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800679" version="1" comment="dtb-socionext is &lt;5.14.21-150500.55.31.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800680" version="1" comment="dtb-sprd is &lt;5.14.21-150500.55.31.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800681" version="1" comment="dtb-xilinx is &lt;5.14.21-150500.55.31.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800682" version="1" comment="gfs2-kmp-64kb is &lt;5.14.21-150500.55.31.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800683" version="1" comment="gfs2-kmp-default is &lt;5.14.21-150500.55.31.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800684" version="1" comment="kernel-64kb is &lt;5.14.21-150500.55.31.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800685" version="1" comment="kernel-64kb-devel is &lt;5.14.21-150500.55.31.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800686" version="1" comment="kernel-64kb-extra is &lt;5.14.21-150500.55.31.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800687" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.14.21-150500.55.31.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800688" version="1" comment="kernel-64kb-optional is &lt;5.14.21-150500.55.31.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800689" version="1" comment="kernel-debug is &lt;5.14.21-150500.55.31.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800690" version="1" comment="kernel-debug-devel is &lt;5.14.21-150500.55.31.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800691" version="1" comment="kernel-debug-livepatch-devel is &lt;5.14.21-150500.55.31.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800692" version="1" comment="kernel-debug-vdso is &lt;5.14.21-150500.55.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800693" version="1" comment="kernel-default is &lt;5.14.21-150500.55.31.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800694" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.31.1.150500.6.13.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800695" version="1" comment="kernel-default-base-rebuild is &lt;5.14.21-150500.55.31.1.150500.6.13.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800696" version="1" comment="kernel-default-devel is &lt;5.14.21-150500.55.31.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800697" version="1" comment="kernel-default-extra is &lt;5.14.21-150500.55.31.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800698" version="1" comment="kernel-default-livepatch is &lt;5.14.21-150500.55.31.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800699" version="1" comment="kernel-default-livepatch-devel is &lt;5.14.21-150500.55.31.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800700" version="1" comment="kernel-default-optional is &lt;5.14.21-150500.55.31.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800701" version="1" comment="kernel-default-vdso is &lt;5.14.21-150500.55.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800702" version="1" comment="kernel-devel is &lt;5.14.21-150500.55.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800703" version="1" comment="kernel-docs is &lt;5.14.21-150500.55.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800704" version="1" comment="kernel-docs-html is &lt;5.14.21-150500.55.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800705" version="1" comment="kernel-kvmsmall is &lt;5.14.21-150500.55.31.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800706" version="1" comment="kernel-kvmsmall-devel is &lt;5.14.21-150500.55.31.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800707" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.14.21-150500.55.31.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800708" version="1" comment="kernel-kvmsmall-vdso is &lt;5.14.21-150500.55.31.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800709" version="1" comment="kernel-macros is &lt;5.14.21-150500.55.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800710" version="1" comment="kernel-obs-build is &lt;5.14.21-150500.55.31.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800711" version="1" comment="kernel-obs-qa is &lt;5.14.21-150500.55.31.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800712" version="1" comment="kernel-source is &lt;5.14.21-150500.55.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800713" version="1" comment="kernel-source-vanilla is &lt;5.14.21-150500.55.31.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800714" version="1" comment="kernel-syms is &lt;5.14.21-150500.55.31.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800715" version="1" comment="kernel-zfcpdump is &lt;5.14.21-150500.55.31.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800716" version="1" comment="kselftests-kmp-64kb is &lt;5.14.21-150500.55.31.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800717" version="1" comment="kselftests-kmp-default is &lt;5.14.21-150500.55.31.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800718" version="1" comment="ocfs2-kmp-64kb is &lt;5.14.21-150500.55.31.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800719" version="1" comment="ocfs2-kmp-default is &lt;5.14.21-150500.55.31.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800720" version="1" comment="reiserfs-kmp-64kb is &lt;5.14.21-150500.55.31.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800721" version="1" comment="reiserfs-kmp-default is &lt;5.14.21-150500.55.31.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801169" version="1" comment="cni-plugins is &lt;1.1.1-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800737" version="1" comment="cni is &lt;1.1.2-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800539" version="1" comment="libwireshark15 is &lt;3.6.17-150000.3.103.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800540" version="1" comment="libwiretap12 is &lt;3.6.17-150000.3.103.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800541" version="1" comment="libwsutil13 is &lt;3.6.17-150000.3.103.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800542" version="1" comment="wireshark is &lt;3.6.17-150000.3.103.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800543" version="1" comment="wireshark-devel is &lt;3.6.17-150000.3.103.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800544" version="1" comment="wireshark-ui-qt is &lt;3.6.17-150000.3.103.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801095" version="1" comment="opensc is &lt;0.22.0-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801096" version="1" comment="opensc-32bit is &lt;0.22.0-150400.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802140" version="1" comment="libcue-devel is &lt;2.1.0-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802141" version="1" comment="libcue2 is &lt;2.1.0-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799556" version="1" comment="python-gevent-doc is &lt;1.2.2-150000.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799557" version="1" comment="python3-gevent is &lt;1.2.2-150000.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802013" version="1" comment="python3-Django is &lt;2.0.7-150000.1.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801618" version="1" comment="buildah is &lt;1.29.1-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800538" version="1" comment="python3-urllib3 is &lt;1.25.10-150300.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799697" version="1" comment="erlang is &lt;23.3.4.19-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799698" version="1" comment="erlang-debugger is &lt;23.3.4.19-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799699" version="1" comment="erlang-debugger-src is &lt;23.3.4.19-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799700" version="1" comment="erlang-dialyzer is &lt;23.3.4.19-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799701" version="1" comment="erlang-dialyzer-src is &lt;23.3.4.19-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799702" version="1" comment="erlang-diameter is &lt;23.3.4.19-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799703" version="1" comment="erlang-diameter-src is &lt;23.3.4.19-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799704" version="1" comment="erlang-doc is &lt;23.3.4.19-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799705" version="1" comment="erlang-epmd is &lt;23.3.4.19-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799706" version="1" comment="erlang-et is &lt;23.3.4.19-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799707" version="1" comment="erlang-et-src is &lt;23.3.4.19-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799708" version="1" comment="erlang-jinterface is &lt;23.3.4.19-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799709" version="1" comment="erlang-jinterface-src is &lt;23.3.4.19-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799710" version="1" comment="erlang-observer is &lt;23.3.4.19-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799711" version="1" comment="erlang-observer-src is &lt;23.3.4.19-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799712" version="1" comment="erlang-reltool is &lt;23.3.4.19-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799713" version="1" comment="erlang-reltool-src is &lt;23.3.4.19-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799714" version="1" comment="erlang-src is &lt;23.3.4.19-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799715" version="1" comment="erlang-wx is &lt;23.3.4.19-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799716" version="1" comment="erlang-wx-src is &lt;23.3.4.19-150300.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800130" version="1" comment="glibc is &lt;2.31-150300.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800131" version="1" comment="glibc-32bit is &lt;2.31-150300.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800132" version="1" comment="glibc-devel is &lt;2.31-150300.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800133" version="1" comment="glibc-devel-32bit is &lt;2.31-150300.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800134" version="1" comment="glibc-devel-static is &lt;2.31-150300.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800135" version="1" comment="glibc-devel-static-32bit is &lt;2.31-150300.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800136" version="1" comment="glibc-extra is &lt;2.31-150300.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800137" version="1" comment="glibc-html is &lt;2.31-150300.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800138" version="1" comment="glibc-i18ndata is &lt;2.31-150300.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800139" version="1" comment="glibc-info is &lt;2.31-150300.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800140" version="1" comment="glibc-lang is &lt;2.31-150300.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800141" version="1" comment="glibc-locale is &lt;2.31-150300.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800142" version="1" comment="glibc-locale-base is &lt;2.31-150300.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800143" version="1" comment="glibc-locale-base-32bit is &lt;2.31-150300.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800144" version="1" comment="glibc-profile is &lt;2.31-150300.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800145" version="1" comment="glibc-profile-32bit is &lt;2.31-150300.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800146" version="1" comment="glibc-utils is &lt;2.31-150300.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800147" version="1" comment="glibc-utils-32bit is &lt;2.31-150300.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800148" version="1" comment="nscd is &lt;2.31-150300.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802115" version="1" comment="libnss_slurm2_20_02 is &lt;20.02.7-150100.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802116" version="1" comment="libpmi0_20_02 is &lt;20.02.7-150100.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802117" version="1" comment="perl-slurm_20_02 is &lt;20.02.7-150100.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802118" version="1" comment="slurm_20_02 is &lt;20.02.7-150100.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802119" version="1" comment="slurm_20_02-auth-none is &lt;20.02.7-150100.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802120" version="1" comment="slurm_20_02-config is &lt;20.02.7-150100.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802121" version="1" comment="slurm_20_02-config-man is &lt;20.02.7-150100.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802122" version="1" comment="slurm_20_02-cray is &lt;20.02.7-150100.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802123" version="1" comment="slurm_20_02-devel is &lt;20.02.7-150100.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802124" version="1" comment="slurm_20_02-doc is &lt;20.02.7-150100.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802125" version="1" comment="slurm_20_02-hdf5 is &lt;20.02.7-150100.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802126" version="1" comment="slurm_20_02-lua is &lt;20.02.7-150100.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802127" version="1" comment="slurm_20_02-munge is &lt;20.02.7-150100.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802128" version="1" comment="slurm_20_02-node is &lt;20.02.7-150100.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802129" version="1" comment="slurm_20_02-openlava is &lt;20.02.7-150100.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802130" version="1" comment="slurm_20_02-pam_slurm is &lt;20.02.7-150100.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802131" version="1" comment="slurm_20_02-plugins is &lt;20.02.7-150100.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802132" version="1" comment="slurm_20_02-rest is &lt;20.02.7-150100.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802133" version="1" comment="slurm_20_02-seff is &lt;20.02.7-150100.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802134" version="1" comment="slurm_20_02-sjstat is &lt;20.02.7-150100.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802135" version="1" comment="slurm_20_02-slurmdbd is &lt;20.02.7-150100.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802136" version="1" comment="slurm_20_02-sql is &lt;20.02.7-150100.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802137" version="1" comment="slurm_20_02-sview is &lt;20.02.7-150100.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802146" version="1" comment="slurm_20_02-testsuite is &lt;20.02.7-150100.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802138" version="1" comment="slurm_20_02-torque is &lt;20.02.7-150100.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802139" version="1" comment="slurm_20_02-webdoc is &lt;20.02.7-150100.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801577" version="1" comment="helm is &lt;3.13.1-150000.1.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801578" version="1" comment="helm-bash-completion is &lt;3.13.1-150000.1.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801579" version="1" comment="helm-fish-completion is &lt;3.13.1-150000.1.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801580" version="1" comment="helm-zsh-completion is &lt;3.13.1-150000.1.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801949" version="1" comment="tomcat is &lt;9.0.82-150200.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801950" version="1" comment="tomcat-admin-webapps is &lt;9.0.82-150200.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801951" version="1" comment="tomcat-docs-webapp is &lt;9.0.82-150200.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801952" version="1" comment="tomcat-el-3_0-api is &lt;9.0.82-150200.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801953" version="1" comment="tomcat-embed is &lt;9.0.82-150200.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801954" version="1" comment="tomcat-javadoc is &lt;9.0.82-150200.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801955" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.82-150200.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801956" version="1" comment="tomcat-jsvc is &lt;9.0.82-150200.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801957" version="1" comment="tomcat-lib is &lt;9.0.82-150200.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801958" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.82-150200.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801959" version="1" comment="tomcat-webapps is &lt;9.0.82-150200.46.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802108" version="1" comment="corepack18 is &lt;18.18.2-150400.9.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802109" version="1" comment="nodejs18 is &lt;18.18.2-150400.9.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802110" version="1" comment="nodejs18-devel is &lt;18.18.2-150400.9.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802111" version="1" comment="nodejs18-docs is &lt;18.18.2-150400.9.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802112" version="1" comment="npm18 is &lt;18.18.2-150400.9.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802011" version="1" comment="suse-module-tools is &lt;15.5.3-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802012" version="1" comment="suse-module-tools-legacy is &lt;15.5.3-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801148" version="1" comment="grub2 is &lt;2.06-150500.29.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801149" version="1" comment="grub2-arm64-efi is &lt;2.06-150500.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801150" version="1" comment="grub2-arm64-efi-debug is &lt;2.06-150500.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801151" version="1" comment="grub2-arm64-efi-extras is &lt;2.06-150500.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801152" version="1" comment="grub2-branding-upstream is &lt;2.06-150500.29.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801153" version="1" comment="grub2-i386-pc is &lt;2.06-150500.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801154" version="1" comment="grub2-i386-pc-debug is &lt;2.06-150500.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801155" version="1" comment="grub2-i386-pc-extras is &lt;2.06-150500.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801156" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.06-150500.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801157" version="1" comment="grub2-powerpc-ieee1275-debug is &lt;2.06-150500.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801158" version="1" comment="grub2-powerpc-ieee1275-extras is &lt;2.06-150500.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801159" version="1" comment="grub2-s390x-emu is &lt;2.06-150500.29.8.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801160" version="1" comment="grub2-s390x-emu-debug is &lt;2.06-150500.29.8.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801161" version="1" comment="grub2-s390x-emu-extras is &lt;2.06-150500.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801162" version="1" comment="grub2-snapper-plugin is &lt;2.06-150500.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801163" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.06-150500.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801164" version="1" comment="grub2-x86_64-efi is &lt;2.06-150500.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801165" version="1" comment="grub2-x86_64-efi-debug is &lt;2.06-150500.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801166" version="1" comment="grub2-x86_64-efi-extras is &lt;2.06-150500.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801167" version="1" comment="grub2-x86_64-xen is &lt;2.06-150500.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801168" version="1" comment="grub2-x86_64-xen-extras is &lt;2.06-150500.29.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801788" version="1" comment="cpp13 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800995" version="1" comment="cross-nvptx-gcc13 is &lt;13.2.1+git7813-150000.1.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009800996" version="1" comment="cross-nvptx-newlib13-devel is &lt;13.2.1+git7813-150000.1.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801789" version="1" comment="gcc13 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801790" version="1" comment="gcc13-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801791" version="1" comment="gcc13-PIE is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801792" version="1" comment="gcc13-ada is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801793" version="1" comment="gcc13-ada-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801794" version="1" comment="gcc13-c++ is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801795" version="1" comment="gcc13-c++-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801796" version="1" comment="gcc13-d is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801797" version="1" comment="gcc13-d-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801798" version="1" comment="gcc13-fortran is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801799" version="1" comment="gcc13-fortran-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801800" version="1" comment="gcc13-go is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801801" version="1" comment="gcc13-go-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801802" version="1" comment="gcc13-info is &lt;13.2.1+git7813-150000.1.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801803" version="1" comment="gcc13-locale is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801804" version="1" comment="gcc13-m2 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801805" version="1" comment="gcc13-m2-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801806" version="1" comment="gcc13-obj-c++ is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801807" version="1" comment="gcc13-obj-c++-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801808" version="1" comment="gcc13-objc is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801809" version="1" comment="gcc13-objc-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801810" version="1" comment="libada13 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801811" version="1" comment="libada13-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801812" version="1" comment="libasan8 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801813" version="1" comment="libasan8-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801814" version="1" comment="libatomic1 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801815" version="1" comment="libatomic1-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801816" version="1" comment="libgcc_s1 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801817" version="1" comment="libgcc_s1-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801818" version="1" comment="libgdruntime4 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801819" version="1" comment="libgdruntime4-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801820" version="1" comment="libgfortran5 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801821" version="1" comment="libgfortran5-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801822" version="1" comment="libgo22 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801823" version="1" comment="libgo22-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801824" version="1" comment="libgomp1 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801825" version="1" comment="libgomp1-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801826" version="1" comment="libgphobos4 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801827" version="1" comment="libgphobos4-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801828" version="1" comment="libhwasan0 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801829" version="1" comment="libitm1 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801830" version="1" comment="libitm1-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801831" version="1" comment="liblsan0 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801832" version="1" comment="libm2cor18 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801833" version="1" comment="libm2cor18-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801834" version="1" comment="libm2iso18 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801835" version="1" comment="libm2iso18-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801836" version="1" comment="libm2log18 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801837" version="1" comment="libm2log18-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801838" version="1" comment="libm2min18 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801839" version="1" comment="libm2min18-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801840" version="1" comment="libm2pim18 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801841" version="1" comment="libm2pim18-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801842" version="1" comment="libobjc4 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801843" version="1" comment="libobjc4-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801844" version="1" comment="libquadmath0 is &lt;13.2.1+git7813-150000.1.3.3 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801845" version="1" comment="libquadmath0-32bit is &lt;13.2.1+git7813-150000.1.3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801846" version="1" comment="libstdc++6 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801847" version="1" comment="libstdc++6-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801848" version="1" comment="libstdc++6-devel-gcc13 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801849" version="1" comment="libstdc++6-devel-gcc13-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801850" version="1" comment="libstdc++6-locale is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801851" version="1" comment="libstdc++6-pp is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801852" version="1" comment="libstdc++6-pp-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801853" version="1" comment="libtsan2 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801854" version="1" comment="libubsan1 is &lt;13.2.1+git7813-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801855" version="1" comment="libubsan1-32bit is &lt;13.2.1+git7813-150000.1.3.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801611" version="1" comment="netty is &lt;4.1.100-150200.4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801612" version="1" comment="netty-javadoc is &lt;4.1.100-150200.4.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801613" version="1" comment="netty-poms is &lt;4.1.100-150200.4.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801614" version="1" comment="netty-tcnative is &lt;2.0.62-150200.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801615" version="1" comment="netty-tcnative-javadoc is &lt;2.0.62-150200.3.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802672" version="1" comment="libruby2_5-2_5 is &lt;2.5.9-150000.4.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802673" version="1" comment="ruby2.5 is &lt;2.5.9-150000.4.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802674" version="1" comment="ruby2.5-devel is &lt;2.5.9-150000.4.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802675" version="1" comment="ruby2.5-devel-extra is &lt;2.5.9-150000.4.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802676" version="1" comment="ruby2.5-doc is &lt;2.5.9-150000.4.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802677" version="1" comment="ruby2.5-doc-ri is &lt;2.5.9-150000.4.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802678" version="1" comment="ruby2.5-stdlib is &lt;2.5.9-150000.4.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752683" version="1" comment="corepack18 is &lt;18.13.0-150400.9.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752684" version="1" comment="nodejs18 is &lt;18.13.0-150400.9.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752685" version="1" comment="nodejs18-devel is &lt;18.13.0-150400.9.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737226" version="1" comment="nodejs18-docs is &lt;18.13.0-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752686" version="1" comment="npm18 is &lt;18.13.0-150400.9.3.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803256" version="1" comment="libopenssl-3-devel is &lt;3.0.8-150500.5.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803257" version="1" comment="libopenssl-3-devel-32bit is &lt;3.0.8-150500.5.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803258" version="1" comment="libopenssl3 is &lt;3.0.8-150500.5.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803259" version="1" comment="libopenssl3-32bit is &lt;3.0.8-150500.5.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803260" version="1" comment="openssl-3 is &lt;3.0.8-150500.5.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803261" version="1" comment="openssl-3-doc is &lt;3.0.8-150500.5.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803262" version="1" comment="libssh2-1 is &lt;1.11.0-150000.4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803250" version="1" comment="libssh2-1-32bit is &lt;1.11.0-150000.4.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803251" version="1" comment="libssh2-devel is &lt;1.11.0-150000.4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802352" version="1" comment="java-11-openjdk is &lt;11.0.21.0-150000.3.107.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802353" version="1" comment="java-11-openjdk-demo is &lt;11.0.21.0-150000.3.107.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802354" version="1" comment="java-11-openjdk-devel is &lt;11.0.21.0-150000.3.107.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802355" version="1" comment="java-11-openjdk-headless is &lt;11.0.21.0-150000.3.107.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802356" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.21.0-150000.3.107.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802357" version="1" comment="java-11-openjdk-jmods is &lt;11.0.21.0-150000.3.107.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802358" version="1" comment="java-11-openjdk-src is &lt;11.0.21.0-150000.3.107.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802646" version="1" comment="libnghttp2-14 is &lt;1.40.0-150200.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802532" version="1" comment="libnghttp2-14-32bit is &lt;1.40.0-150200.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802647" version="1" comment="libnghttp2-devel is &lt;1.40.0-150200.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802648" version="1" comment="libnghttp2_asio-devel is &lt;1.40.0-150200.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802649" version="1" comment="libnghttp2_asio1 is &lt;1.40.0-150200.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802650" version="1" comment="libnghttp2_asio1-32bit is &lt;1.40.0-150200.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802651" version="1" comment="nghttp2 is &lt;1.40.0-150200.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802652" version="1" comment="python3-nghttp2 is &lt;1.40.0-150200.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801582" version="1" comment="jetty-annotations is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801583" version="1" comment="jetty-ant is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801584" version="1" comment="jetty-cdi is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801585" version="1" comment="jetty-client is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801586" version="1" comment="jetty-continuation is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801587" version="1" comment="jetty-deploy is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801588" version="1" comment="jetty-fcgi is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801589" version="1" comment="jetty-http is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801590" version="1" comment="jetty-http-spi is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801591" version="1" comment="jetty-io is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801592" version="1" comment="jetty-jaas is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801593" version="1" comment="jetty-jmx is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801594" version="1" comment="jetty-jndi is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801595" version="1" comment="jetty-jsp is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801596" version="1" comment="jetty-minimal-javadoc is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801597" version="1" comment="jetty-openid is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801598" version="1" comment="jetty-plus is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801599" version="1" comment="jetty-proxy is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801600" version="1" comment="jetty-quickstart is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801601" version="1" comment="jetty-rewrite is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801602" version="1" comment="jetty-security is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801603" version="1" comment="jetty-server is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801604" version="1" comment="jetty-servlet is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801605" version="1" comment="jetty-servlets is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801606" version="1" comment="jetty-start is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801607" version="1" comment="jetty-util is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801608" version="1" comment="jetty-util-ajax is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801609" version="1" comment="jetty-webapp is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801610" version="1" comment="jetty-xml is &lt;9.4.53-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802694" version="1" comment="MozillaFirefox is &lt;115.4.0-150200.152.114.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802695" version="1" comment="MozillaFirefox-branding-upstream is &lt;115.4.0-150200.152.114.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802696" version="1" comment="MozillaFirefox-devel is &lt;115.4.0-150200.152.114.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802697" version="1" comment="MozillaFirefox-translations-common is &lt;115.4.0-150200.152.114.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802698" version="1" comment="MozillaFirefox-translations-other is &lt;115.4.0-150200.152.114.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802521" version="1" comment="libminizip1 is &lt;1.2.13-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802522" version="1" comment="libminizip1-32bit is &lt;1.2.13-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802523" version="1" comment="libz1 is &lt;1.2.13-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802524" version="1" comment="libz1-32bit is &lt;1.2.13-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802525" version="1" comment="minizip-devel is &lt;1.2.13-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802526" version="1" comment="zlib-devel is &lt;1.2.13-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802527" version="1" comment="zlib-devel-32bit is &lt;1.2.13-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802528" version="1" comment="zlib-devel-static is &lt;1.2.13-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802529" version="1" comment="zlib-devel-static-32bit is &lt;1.2.13-150500.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802530" version="1" comment="zlib-testsuite is &lt;1.2.13-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802679" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-150000.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802680" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-150000.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802681" version="1" comment="python is &lt;2.7.18-150000.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802682" version="1" comment="python-32bit is &lt;2.7.18-150000.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802683" version="1" comment="python-base is &lt;2.7.18-150000.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802684" version="1" comment="python-base-32bit is &lt;2.7.18-150000.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802685" version="1" comment="python-curses is &lt;2.7.18-150000.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802686" version="1" comment="python-demo is &lt;2.7.18-150000.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802687" version="1" comment="python-devel is &lt;2.7.18-150000.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802688" version="1" comment="python-doc is &lt;2.7.18-150000.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802689" version="1" comment="python-doc-pdf is &lt;2.7.18-150000.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802690" version="1" comment="python-gdbm is &lt;2.7.18-150000.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802691" version="1" comment="python-idle is &lt;2.7.18-150000.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802692" version="1" comment="python-tk is &lt;2.7.18-150000.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802693" version="1" comment="python-xml is &lt;2.7.18-150000.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803403" version="1" comment="libnbd is &lt;1.18.1-150300.8.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803404" version="1" comment="libnbd-bash-completion is &lt;1.18.1-150300.8.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803405" version="1" comment="libnbd-devel is &lt;1.18.1-150300.8.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803406" version="1" comment="libnbd0 is &lt;1.18.1-150300.8.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803407" version="1" comment="nbdfuse is &lt;1.18.1-150300.8.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803416" version="1" comment="python3-libnbd is &lt;1.18.1-150300.8.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802653" version="1" comment="libzck-devel is &lt;1.1.16-150400.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802654" version="1" comment="libzck1 is &lt;1.1.16-150400.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802655" version="1" comment="zchunk is &lt;1.1.16-150400.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803758" version="1" comment="libvmtools-devel is &lt;12.3.0-150300.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803759" version="1" comment="libvmtools0 is &lt;12.3.0-150300.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803760" version="1" comment="open-vm-tools is &lt;12.3.0-150300.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803761" version="1" comment="open-vm-tools-containerinfo is &lt;12.3.0-150300.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803762" version="1" comment="open-vm-tools-desktop is &lt;12.3.0-150300.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803763" version="1" comment="open-vm-tools-salt-minion is &lt;12.3.0-150300.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803764" version="1" comment="open-vm-tools-sdmp is &lt;12.3.0-150300.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802704" version="1" comment="vorbis-tools is &lt;1.4.0-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802705" version="1" comment="vorbis-tools-lang is &lt;1.4.0-150000.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807383" version="1" comment="xorg-x11-server is &lt;21.1.4-150500.7.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807384" version="1" comment="xorg-x11-server-Xvfb is &lt;21.1.4-150500.7.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807385" version="1" comment="xorg-x11-server-extra is &lt;21.1.4-150500.7.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807386" version="1" comment="xorg-x11-server-sdk is &lt;21.1.4-150500.7.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807387" version="1" comment="xorg-x11-server-source is &lt;21.1.4-150500.7.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803756" version="1" comment="python311-Werkzeug is &lt;2.3.6-150400.6.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802665" version="1" comment="java-17-openjdk is &lt;17.0.9.0-150400.3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802666" version="1" comment="java-17-openjdk-demo is &lt;17.0.9.0-150400.3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802667" version="1" comment="java-17-openjdk-devel is &lt;17.0.9.0-150400.3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802668" version="1" comment="java-17-openjdk-headless is &lt;17.0.9.0-150400.3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802669" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.9.0-150400.3.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802670" version="1" comment="java-17-openjdk-jmods is &lt;17.0.9.0-150400.3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802671" version="1" comment="java-17-openjdk-src is &lt;17.0.9.0-150400.3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802703" version="1" comment="redis is &lt;6.2.6-150400.3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803105" version="1" comment="libpoppler-cpp0 is &lt;23.01.0-150500.3.5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803106" version="1" comment="libpoppler-cpp0-32bit is &lt;23.01.0-150500.3.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803107" version="1" comment="libpoppler-devel is &lt;23.01.0-150500.3.5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803108" version="1" comment="libpoppler-glib-devel is &lt;23.01.0-150500.3.5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803109" version="1" comment="libpoppler-glib8 is &lt;23.01.0-150500.3.5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803110" version="1" comment="libpoppler-glib8-32bit is &lt;23.01.0-150500.3.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803111" version="1" comment="libpoppler-qt5-1 is &lt;23.01.0-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803112" version="1" comment="libpoppler-qt5-1-32bit is &lt;23.01.0-150500.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803113" version="1" comment="libpoppler-qt5-devel is &lt;23.01.0-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803114" version="1" comment="libpoppler-qt6-3 is &lt;23.01.0-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803115" version="1" comment="libpoppler-qt6-devel is &lt;23.01.0-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803116" version="1" comment="libpoppler126 is &lt;23.01.0-150500.3.5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803117" version="1" comment="libpoppler126-32bit is &lt;23.01.0-150500.3.5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803118" version="1" comment="poppler-tools is &lt;23.01.0-150500.3.5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803119" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;23.01.0-150500.3.5.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803333" version="1" comment="WebKitGTK-4.0-lang is &lt;2.42.1-150400.4.57.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803334" version="1" comment="WebKitGTK-4.1-lang is &lt;2.42.1-150400.4.57.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803335" version="1" comment="WebKitGTK-6.0-lang is &lt;2.42.1-150400.4.57.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803336" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.42.1-150400.4.57.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803337" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.42.1-150400.4.57.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803338" version="1" comment="libjavascriptcoregtk-4_0-18-64bit is &lt;2.42.1-150400.4.57.2 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803339" version="1" comment="libjavascriptcoregtk-4_1-0 is &lt;2.42.1-150400.4.57.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803340" version="1" comment="libjavascriptcoregtk-4_1-0-32bit is &lt;2.42.1-150400.4.57.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803341" version="1" comment="libjavascriptcoregtk-4_1-0-64bit is &lt;2.42.1-150400.4.57.2 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803342" version="1" comment="libjavascriptcoregtk-6_0-1 is &lt;2.42.1-150400.4.57.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803343" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.42.1-150400.4.57.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803344" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.42.1-150400.4.57.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803345" version="1" comment="libwebkit2gtk-4_0-37-64bit is &lt;2.42.1-150400.4.57.2 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803346" version="1" comment="libwebkit2gtk-4_1-0 is &lt;2.42.1-150400.4.57.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803347" version="1" comment="libwebkit2gtk-4_1-0-32bit is &lt;2.42.1-150400.4.57.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803348" version="1" comment="libwebkit2gtk-4_1-0-64bit is &lt;2.42.1-150400.4.57.2 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803349" version="1" comment="libwebkitgtk-6_0-4 is &lt;2.42.1-150400.4.57.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803350" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.42.1-150400.4.57.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803351" version="1" comment="typelib-1_0-JavaScriptCore-4_1 is &lt;2.42.1-150400.4.57.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803352" version="1" comment="typelib-1_0-JavaScriptCore-6_0 is &lt;2.42.1-150400.4.57.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803353" version="1" comment="typelib-1_0-WebKit-6_0 is &lt;2.42.1-150400.4.57.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803354" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.42.1-150400.4.57.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803355" version="1" comment="typelib-1_0-WebKit2-4_1 is &lt;2.42.1-150400.4.57.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803356" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.42.1-150400.4.57.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803357" version="1" comment="typelib-1_0-WebKit2WebExtension-4_1 is &lt;2.42.1-150400.4.57.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803358" version="1" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is &lt;2.42.1-150400.4.57.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803359" version="1" comment="webkit-jsc-4 is &lt;2.42.1-150400.4.57.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803360" version="1" comment="webkit-jsc-4.1 is &lt;2.42.1-150400.4.57.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803361" version="1" comment="webkit-jsc-6.0 is &lt;2.42.1-150400.4.57.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803362" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.42.1-150400.4.57.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803363" version="1" comment="webkit2gtk-4_1-injected-bundles is &lt;2.42.1-150400.4.57.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803364" version="1" comment="webkit2gtk3-devel is &lt;2.42.1-150400.4.57.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803365" version="1" comment="webkit2gtk3-minibrowser is &lt;2.42.1-150400.4.57.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803366" version="1" comment="webkit2gtk3-soup2-devel is &lt;2.42.1-150400.4.57.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803367" version="1" comment="webkit2gtk3-soup2-minibrowser is &lt;2.42.1-150400.4.57.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803368" version="1" comment="webkit2gtk4-devel is &lt;2.42.1-150400.4.57.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803369" version="1" comment="webkit2gtk4-minibrowser is &lt;2.42.1-150400.4.57.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803370" version="1" comment="webkitgtk-6_0-injected-bundles is &lt;2.42.1-150400.4.57.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803720" version="1" comment="MozillaThunderbird is &lt;115.4.1-150200.8.136.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803721" version="1" comment="MozillaThunderbird-translations-common is &lt;115.4.1-150200.8.136.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803722" version="1" comment="MozillaThunderbird-translations-other is &lt;115.4.1-150200.8.136.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807381" version="1" comment="xwayland is &lt;22.1.5-150500.7.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807382" version="1" comment="xwayland-devel is &lt;22.1.5-150500.7.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801986" version="1" comment="libnss_slurm2_20_11 is &lt;20.11.9-150200.6.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801987" version="1" comment="libpmi0_20_11 is &lt;20.11.9-150200.6.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801988" version="1" comment="perl-slurm_20_11 is &lt;20.11.9-150200.6.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801989" version="1" comment="slurm_20_11 is &lt;20.11.9-150200.6.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801990" version="1" comment="slurm_20_11-auth-none is &lt;20.11.9-150200.6.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801991" version="1" comment="slurm_20_11-config is &lt;20.11.9-150200.6.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801992" version="1" comment="slurm_20_11-config-man is &lt;20.11.9-150200.6.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801993" version="1" comment="slurm_20_11-cray is &lt;20.11.9-150200.6.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801994" version="1" comment="slurm_20_11-devel is &lt;20.11.9-150200.6.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801995" version="1" comment="slurm_20_11-doc is &lt;20.11.9-150200.6.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801996" version="1" comment="slurm_20_11-hdf5 is &lt;20.11.9-150200.6.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801997" version="1" comment="slurm_20_11-lua is &lt;20.11.9-150200.6.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801998" version="1" comment="slurm_20_11-munge is &lt;20.11.9-150200.6.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801999" version="1" comment="slurm_20_11-node is &lt;20.11.9-150200.6.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802000" version="1" comment="slurm_20_11-openlava is &lt;20.11.9-150200.6.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802001" version="1" comment="slurm_20_11-pam_slurm is &lt;20.11.9-150200.6.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802002" version="1" comment="slurm_20_11-plugins is &lt;20.11.9-150200.6.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802003" version="1" comment="slurm_20_11-rest is &lt;20.11.9-150200.6.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802004" version="1" comment="slurm_20_11-seff is &lt;20.11.9-150200.6.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802005" version="1" comment="slurm_20_11-sjstat is &lt;20.11.9-150200.6.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802006" version="1" comment="slurm_20_11-slurmdbd is &lt;20.11.9-150200.6.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802007" version="1" comment="slurm_20_11-sql is &lt;20.11.9-150200.6.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802008" version="1" comment="slurm_20_11-sview is &lt;20.11.9-150200.6.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802009" version="1" comment="slurm_20_11-torque is &lt;20.11.9-150200.6.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802010" version="1" comment="slurm_20_11-webdoc is &lt;20.11.9-150200.6.13.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803090" version="1" comment="libsndfile-devel is &lt;1.0.28-150000.5.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803091" version="1" comment="libsndfile-progs is &lt;1.0.28-150000.5.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803092" version="1" comment="libsndfile1 is &lt;1.0.28-150000.5.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803093" version="1" comment="libsndfile1-32bit is &lt;1.0.28-150000.5.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808142" version="1" comment="libnss_slurm2 is &lt;23.02.5-150500.5.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808143" version="1" comment="libpmi0 is &lt;23.02.5-150500.5.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808144" version="1" comment="libslurm39 is &lt;23.02.5-150500.5.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808145" version="1" comment="perl-slurm is &lt;23.02.5-150500.5.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808146" version="1" comment="slurm is &lt;23.02.5-150500.5.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808147" version="1" comment="slurm-auth-none is &lt;23.02.5-150500.5.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808148" version="1" comment="slurm-config is &lt;23.02.5-150500.5.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808149" version="1" comment="slurm-config-man is &lt;23.02.5-150500.5.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808150" version="1" comment="slurm-cray is &lt;23.02.5-150500.5.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808151" version="1" comment="slurm-devel is &lt;23.02.5-150500.5.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808152" version="1" comment="slurm-doc is &lt;23.02.5-150500.5.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808153" version="1" comment="slurm-hdf5 is &lt;23.02.5-150500.5.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808154" version="1" comment="slurm-lua is &lt;23.02.5-150500.5.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808155" version="1" comment="slurm-munge is &lt;23.02.5-150500.5.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808156" version="1" comment="slurm-node is &lt;23.02.5-150500.5.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808157" version="1" comment="slurm-openlava is &lt;23.02.5-150500.5.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808158" version="1" comment="slurm-pam_slurm is &lt;23.02.5-150500.5.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808159" version="1" comment="slurm-plugin-ext-sensors-rrd is &lt;23.02.5-150500.5.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808161" version="1" comment="slurm-plugins is &lt;23.02.5-150500.5.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808162" version="1" comment="slurm-rest is &lt;23.02.5-150500.5.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808163" version="1" comment="slurm-seff is &lt;23.02.5-150500.5.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808164" version="1" comment="slurm-sjstat is &lt;23.02.5-150500.5.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808165" version="1" comment="slurm-slurmdbd is &lt;23.02.5-150500.5.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808166" version="1" comment="slurm-sql is &lt;23.02.5-150500.5.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808167" version="1" comment="slurm-sview is &lt;23.02.5-150500.5.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808168" version="1" comment="slurm-testsuite is &lt;23.02.5-150500.5.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808170" version="1" comment="slurm-torque is &lt;23.02.5-150500.5.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808171" version="1" comment="slurm-webdoc is &lt;23.02.5-150500.5.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808492" version="1" comment="cluster-md-kmp-rt is &lt;5.14.21-150500.13.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808493" version="1" comment="dlm-kmp-rt is &lt;5.14.21-150500.13.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808494" version="1" comment="gfs2-kmp-rt is &lt;5.14.21-150500.13.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808495" version="1" comment="kernel-devel-rt is &lt;5.14.21-150500.13.24.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808496" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808497" version="1" comment="kernel-rt-devel is &lt;5.14.21-150500.13.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808498" version="1" comment="kernel-rt-extra is &lt;5.14.21-150500.13.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808499" version="1" comment="kernel-rt-livepatch is &lt;5.14.21-150500.13.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808500" version="1" comment="kernel-rt-livepatch-devel is &lt;5.14.21-150500.13.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808501" version="1" comment="kernel-rt-optional is &lt;5.14.21-150500.13.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808502" version="1" comment="kernel-rt-vdso is &lt;5.14.21-150500.13.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808503" version="1" comment="kernel-rt_debug is &lt;5.14.21-150500.13.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808504" version="1" comment="kernel-rt_debug-devel is &lt;5.14.21-150500.13.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808505" version="1" comment="kernel-rt_debug-livepatch-devel is &lt;5.14.21-150500.13.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808506" version="1" comment="kernel-rt_debug-vdso is &lt;5.14.21-150500.13.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808507" version="1" comment="kernel-source-rt is &lt;5.14.21-150500.13.24.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808508" version="1" comment="kernel-syms-rt is &lt;5.14.21-150500.13.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808509" version="1" comment="kselftests-kmp-rt is &lt;5.14.21-150500.13.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808510" version="1" comment="ocfs2-kmp-rt is &lt;5.14.21-150500.13.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808511" version="1" comment="reiserfs-kmp-rt is &lt;5.14.21-150500.13.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808406" version="1" comment="kernel-vanilla is &lt;4.12.14-150100.197.160.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808407" version="1" comment="kernel-vanilla-base is &lt;4.12.14-150100.197.160.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808408" version="1" comment="kernel-vanilla-devel is &lt;4.12.14-150100.197.160.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808409" version="1" comment="kernel-vanilla-livepatch-devel is &lt;4.12.14-150100.197.160.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807731" version="1" comment="apache-ivy is &lt;2.5.2-150200.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807732" version="1" comment="apache-ivy-javadoc is &lt;2.5.2-150200.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807726" version="1" comment="libtiff-devel is &lt;4.0.9-150000.45.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807727" version="1" comment="libtiff-devel-32bit is &lt;4.0.9-150000.45.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807728" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807729" version="1" comment="libtiff5-32bit is &lt;4.0.9-150000.45.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807730" version="1" comment="tiff is &lt;4.0.9-150000.45.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808425" version="1" comment="cluster-md-kmp-64kb is &lt;5.14.21-150500.55.36.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808426" version="1" comment="cluster-md-kmp-default is &lt;5.14.21-150500.55.36.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808427" version="1" comment="dlm-kmp-64kb is &lt;5.14.21-150500.55.36.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808428" version="1" comment="dlm-kmp-default is &lt;5.14.21-150500.55.36.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808429" version="1" comment="dtb-allwinner is &lt;5.14.21-150500.55.36.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808430" version="1" comment="dtb-altera is &lt;5.14.21-150500.55.36.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808431" version="1" comment="dtb-amazon is &lt;5.14.21-150500.55.36.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808432" version="1" comment="dtb-amd is &lt;5.14.21-150500.55.36.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808433" version="1" comment="dtb-amlogic is &lt;5.14.21-150500.55.36.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808434" version="1" comment="dtb-apm is &lt;5.14.21-150500.55.36.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808435" version="1" comment="dtb-apple is &lt;5.14.21-150500.55.36.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808436" version="1" comment="dtb-arm is &lt;5.14.21-150500.55.36.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808437" version="1" comment="dtb-broadcom is &lt;5.14.21-150500.55.36.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808438" version="1" comment="dtb-cavium is &lt;5.14.21-150500.55.36.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808439" version="1" comment="dtb-exynos is &lt;5.14.21-150500.55.36.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808440" version="1" comment="dtb-freescale is &lt;5.14.21-150500.55.36.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808441" version="1" comment="dtb-hisilicon is &lt;5.14.21-150500.55.36.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808442" version="1" comment="dtb-lg is &lt;5.14.21-150500.55.36.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808443" version="1" comment="dtb-marvell is &lt;5.14.21-150500.55.36.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808444" version="1" comment="dtb-mediatek is &lt;5.14.21-150500.55.36.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808445" version="1" comment="dtb-nvidia is &lt;5.14.21-150500.55.36.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808446" version="1" comment="dtb-qcom is &lt;5.14.21-150500.55.36.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808447" version="1" comment="dtb-renesas is &lt;5.14.21-150500.55.36.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808448" version="1" comment="dtb-rockchip is &lt;5.14.21-150500.55.36.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808449" version="1" comment="dtb-socionext is &lt;5.14.21-150500.55.36.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808450" version="1" comment="dtb-sprd is &lt;5.14.21-150500.55.36.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808451" version="1" comment="dtb-xilinx is &lt;5.14.21-150500.55.36.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808452" version="1" comment="gfs2-kmp-64kb is &lt;5.14.21-150500.55.36.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808453" version="1" comment="gfs2-kmp-default is &lt;5.14.21-150500.55.36.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808454" version="1" comment="kernel-64kb is &lt;5.14.21-150500.55.36.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808455" version="1" comment="kernel-64kb-devel is &lt;5.14.21-150500.55.36.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808456" version="1" comment="kernel-64kb-extra is &lt;5.14.21-150500.55.36.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808457" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.14.21-150500.55.36.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808458" version="1" comment="kernel-64kb-optional is &lt;5.14.21-150500.55.36.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808459" version="1" comment="kernel-debug is &lt;5.14.21-150500.55.36.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808460" version="1" comment="kernel-debug-devel is &lt;5.14.21-150500.55.36.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808461" version="1" comment="kernel-debug-livepatch-devel is &lt;5.14.21-150500.55.36.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808462" version="1" comment="kernel-debug-vdso is &lt;5.14.21-150500.55.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808463" version="1" comment="kernel-default is &lt;5.14.21-150500.55.36.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808464" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.36.1.150500.6.15.3 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808465" version="1" comment="kernel-default-base-rebuild is &lt;5.14.21-150500.55.36.1.150500.6.15.3 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808466" version="1" comment="kernel-default-devel is &lt;5.14.21-150500.55.36.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808467" version="1" comment="kernel-default-extra is &lt;5.14.21-150500.55.36.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808468" version="1" comment="kernel-default-livepatch is &lt;5.14.21-150500.55.36.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808469" version="1" comment="kernel-default-livepatch-devel is &lt;5.14.21-150500.55.36.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808470" version="1" comment="kernel-default-optional is &lt;5.14.21-150500.55.36.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808471" version="1" comment="kernel-default-vdso is &lt;5.14.21-150500.55.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808472" version="1" comment="kernel-devel is &lt;5.14.21-150500.55.36.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808473" version="1" comment="kernel-docs is &lt;5.14.21-150500.55.36.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808474" version="1" comment="kernel-docs-html is &lt;5.14.21-150500.55.36.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808475" version="1" comment="kernel-kvmsmall is &lt;5.14.21-150500.55.36.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808476" version="1" comment="kernel-kvmsmall-devel is &lt;5.14.21-150500.55.36.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808477" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.14.21-150500.55.36.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808478" version="1" comment="kernel-kvmsmall-vdso is &lt;5.14.21-150500.55.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808479" version="1" comment="kernel-macros is &lt;5.14.21-150500.55.36.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808480" version="1" comment="kernel-obs-build is &lt;5.14.21-150500.55.36.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808481" version="1" comment="kernel-obs-qa is &lt;5.14.21-150500.55.36.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808482" version="1" comment="kernel-source is &lt;5.14.21-150500.55.36.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808483" version="1" comment="kernel-source-vanilla is &lt;5.14.21-150500.55.36.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808484" version="1" comment="kernel-syms is &lt;5.14.21-150500.55.36.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808485" version="1" comment="kernel-zfcpdump is &lt;5.14.21-150500.55.36.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808486" version="1" comment="kselftests-kmp-64kb is &lt;5.14.21-150500.55.36.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808487" version="1" comment="kselftests-kmp-default is &lt;5.14.21-150500.55.36.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808488" version="1" comment="ocfs2-kmp-64kb is &lt;5.14.21-150500.55.36.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808489" version="1" comment="ocfs2-kmp-default is &lt;5.14.21-150500.55.36.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808490" version="1" comment="reiserfs-kmp-64kb is &lt;5.14.21-150500.55.36.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808491" version="1" comment="reiserfs-kmp-default is &lt;5.14.21-150500.55.36.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808388" version="1" comment="squid is &lt;5.7-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809131" version="1" comment="python3-salt is &lt;3006.0-150500.4.24.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809132" version="1" comment="salt is &lt;3006.0-150500.4.24.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809133" version="1" comment="salt-api is &lt;3006.0-150500.4.24.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809134" version="1" comment="salt-bash-completion is &lt;3006.0-150500.4.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809135" version="1" comment="salt-cloud is &lt;3006.0-150500.4.24.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809136" version="1" comment="salt-doc is &lt;3006.0-150500.4.24.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809137" version="1" comment="salt-fish-completion is &lt;3006.0-150500.4.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809138" version="1" comment="salt-master is &lt;3006.0-150500.4.24.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809139" version="1" comment="salt-minion is &lt;3006.0-150500.4.24.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809140" version="1" comment="salt-proxy is &lt;3006.0-150500.4.24.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809141" version="1" comment="salt-ssh is &lt;3006.0-150500.4.24.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809142" version="1" comment="salt-standalone-formulas-configuration is &lt;3006.0-150500.4.24.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809143" version="1" comment="salt-syndic is &lt;3006.0-150500.4.24.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809144" version="1" comment="salt-transactional-update is &lt;3006.0-150500.4.24.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809145" version="1" comment="salt-zsh-completion is &lt;3006.0-150500.4.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809115" version="1" comment="python3-simplejson is &lt;3.17.2-150300.3.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809086" version="1" comment="cluster-md-kmp-azure is &lt;5.14.21-150500.33.23.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809087" version="1" comment="dlm-kmp-azure is &lt;5.14.21-150500.33.23.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809088" version="1" comment="gfs2-kmp-azure is &lt;5.14.21-150500.33.23.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808885" version="1" comment="kernel-azure is &lt;5.14.21-150500.33.23.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808886" version="1" comment="kernel-azure-devel is &lt;5.14.21-150500.33.23.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809089" version="1" comment="kernel-azure-extra is &lt;5.14.21-150500.33.23.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809090" version="1" comment="kernel-azure-livepatch-devel is &lt;5.14.21-150500.33.23.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809091" version="1" comment="kernel-azure-optional is &lt;5.14.21-150500.33.23.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809092" version="1" comment="kernel-azure-vdso is &lt;5.14.21-150500.33.23.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808887" version="1" comment="kernel-devel-azure is &lt;5.14.21-150500.33.23.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808888" version="1" comment="kernel-source-azure is &lt;5.14.21-150500.33.23.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808889" version="1" comment="kernel-syms-azure is &lt;5.14.21-150500.33.23.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809093" version="1" comment="kselftests-kmp-azure is &lt;5.14.21-150500.33.23.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809094" version="1" comment="ocfs2-kmp-azure is &lt;5.14.21-150500.33.23.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809095" version="1" comment="reiserfs-kmp-azure is &lt;5.14.21-150500.33.23.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803752" version="1" comment="clamav is &lt;0.103.11-150000.3.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803753" version="1" comment="clamav-devel is &lt;0.103.11-150000.3.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803754" version="1" comment="libclamav9 is &lt;0.103.11-150000.3.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803755" version="1" comment="libfreshclam2 is &lt;0.103.11-150000.3.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809081" version="1" comment="kernel-firmware-nvidia-gspx-G06 is &lt;535.129.03-150500.11.9.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809082" version="1" comment="nvidia-open-driver-G06-signed-64kb-devel is &lt;535.129.03-150500.3.13.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808883" version="1" comment="nvidia-open-driver-G06-signed-azure-devel is &lt;535.129.03-150500.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809083" version="1" comment="nvidia-open-driver-G06-signed-default-devel is &lt;535.129.03-150500.3.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809084" version="1" comment="nvidia-open-driver-G06-signed-kmp-64kb is &lt;535.129.03_k5.14.21_150500.55.31-150500.3.13.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808884" version="1" comment="nvidia-open-driver-G06-signed-kmp-azure is &lt;535.129.03_k5.14.21_150500.33.20-150500.3.13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809085" version="1" comment="nvidia-open-driver-G06-signed-kmp-default is &lt;535.129.03_k5.14.21_150500.55.31-150500.3.13.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807373" version="1" comment="apache2 is &lt;2.4.51-150400.6.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807374" version="1" comment="apache2-devel is &lt;2.4.51-150400.6.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807375" version="1" comment="apache2-doc is &lt;2.4.51-150400.6.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807376" version="1" comment="apache2-event is &lt;2.4.51-150400.6.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807377" version="1" comment="apache2-example-pages is &lt;2.4.51-150400.6.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807378" version="1" comment="apache2-prefork is &lt;2.4.51-150400.6.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807379" version="1" comment="apache2-utils is &lt;2.4.51-150400.6.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807380" version="1" comment="apache2-worker is &lt;2.4.51-150400.6.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803088" version="1" comment="xterm is &lt;330-150200.11.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803089" version="1" comment="xterm-bin is &lt;330-150200.11.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807724" version="1" comment="w3m is &lt;0.5.3+git20230121-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807725" version="1" comment="w3m-inline-image is &lt;0.5.3+git20230121-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810296" version="1" comment="ucode-intel is &lt;20231113-150200.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808848" version="1" comment="exfatprogs is &lt;1.0.4-150300.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809792" version="1" comment="postgresql12 is &lt;12.17-150200.8.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809793" version="1" comment="postgresql12-contrib is &lt;12.17-150200.8.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809794" version="1" comment="postgresql12-devel is &lt;12.17-150200.8.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809795" version="1" comment="postgresql12-docs is &lt;12.17-150200.8.54.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809796" version="1" comment="postgresql12-llvmjit is &lt;12.17-150200.8.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809797" version="1" comment="postgresql12-llvmjit-devel is &lt;12.17-150200.8.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809798" version="1" comment="postgresql12-plperl is &lt;12.17-150200.8.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809799" version="1" comment="postgresql12-plpython is &lt;12.17-150200.8.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809800" version="1" comment="postgresql12-pltcl is &lt;12.17-150200.8.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809801" version="1" comment="postgresql12-server is &lt;12.17-150200.8.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809802" version="1" comment="postgresql12-server-devel is &lt;12.17-150200.8.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809803" version="1" comment="postgresql12-test is &lt;12.17-150200.8.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809780" version="1" comment="postgresql13 is &lt;13.13-150200.5.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809781" version="1" comment="postgresql13-contrib is &lt;13.13-150200.5.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809782" version="1" comment="postgresql13-devel is &lt;13.13-150200.5.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809783" version="1" comment="postgresql13-docs is &lt;13.13-150200.5.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809784" version="1" comment="postgresql13-llvmjit is &lt;13.13-150200.5.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809785" version="1" comment="postgresql13-llvmjit-devel is &lt;13.13-150200.5.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809786" version="1" comment="postgresql13-plperl is &lt;13.13-150200.5.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809787" version="1" comment="postgresql13-plpython is &lt;13.13-150200.5.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809788" version="1" comment="postgresql13-pltcl is &lt;13.13-150200.5.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809789" version="1" comment="postgresql13-server is &lt;13.13-150200.5.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809790" version="1" comment="postgresql13-server-devel is &lt;13.13-150200.5.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809791" version="1" comment="postgresql13-test is &lt;13.13-150200.5.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809311" version="1" comment="cpp13 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809312" version="1" comment="cross-nvptx-gcc13 is &lt;13.2.1+git7813-150000.1.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809313" version="1" comment="cross-nvptx-newlib13-devel is &lt;13.2.1+git7813-150000.1.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809314" version="1" comment="gcc13 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809315" version="1" comment="gcc13-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809316" version="1" comment="gcc13-PIE is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809317" version="1" comment="gcc13-ada is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809318" version="1" comment="gcc13-ada-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809319" version="1" comment="gcc13-c++ is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809320" version="1" comment="gcc13-c++-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809321" version="1" comment="gcc13-d is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809322" version="1" comment="gcc13-d-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809323" version="1" comment="gcc13-fortran is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809324" version="1" comment="gcc13-fortran-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809325" version="1" comment="gcc13-go is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809326" version="1" comment="gcc13-go-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809327" version="1" comment="gcc13-info is &lt;13.2.1+git7813-150000.1.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809328" version="1" comment="gcc13-locale is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809329" version="1" comment="gcc13-m2 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809330" version="1" comment="gcc13-m2-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809331" version="1" comment="gcc13-obj-c++ is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809332" version="1" comment="gcc13-obj-c++-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809333" version="1" comment="gcc13-objc is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809334" version="1" comment="gcc13-objc-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809335" version="1" comment="libada13 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809336" version="1" comment="libada13-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809337" version="1" comment="libasan8 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809338" version="1" comment="libasan8-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809339" version="1" comment="libatomic1 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809340" version="1" comment="libatomic1-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809341" version="1" comment="libgcc_s1 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809342" version="1" comment="libgcc_s1-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809343" version="1" comment="libgdruntime4 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809344" version="1" comment="libgdruntime4-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809345" version="1" comment="libgfortran5 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809346" version="1" comment="libgfortran5-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809347" version="1" comment="libgo22 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809348" version="1" comment="libgo22-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809349" version="1" comment="libgomp1 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809350" version="1" comment="libgomp1-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809351" version="1" comment="libgphobos4 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809352" version="1" comment="libgphobos4-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809353" version="1" comment="libhwasan0 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809354" version="1" comment="libitm1 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809355" version="1" comment="libitm1-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809356" version="1" comment="liblsan0 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809357" version="1" comment="libm2cor18 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809358" version="1" comment="libm2cor18-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809359" version="1" comment="libm2iso18 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809360" version="1" comment="libm2iso18-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809361" version="1" comment="libm2log18 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809362" version="1" comment="libm2log18-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809363" version="1" comment="libm2min18 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809364" version="1" comment="libm2min18-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809365" version="1" comment="libm2pim18 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809366" version="1" comment="libm2pim18-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809367" version="1" comment="libobjc4 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809368" version="1" comment="libobjc4-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809369" version="1" comment="libquadmath0 is &lt;13.2.1+git7813-150000.1.6.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809370" version="1" comment="libquadmath0-32bit is &lt;13.2.1+git7813-150000.1.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809371" version="1" comment="libstdc++6 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809372" version="1" comment="libstdc++6-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809373" version="1" comment="libstdc++6-devel-gcc13 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809374" version="1" comment="libstdc++6-devel-gcc13-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809375" version="1" comment="libstdc++6-locale is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809376" version="1" comment="libstdc++6-pp is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809377" version="1" comment="libstdc++6-pp-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809378" version="1" comment="libtsan2 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809379" version="1" comment="libubsan1 is &lt;13.2.1+git7813-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809380" version="1" comment="libubsan1-32bit is &lt;13.2.1+git7813-150000.1.6.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810471" version="1" comment="libnbd is &lt;1.18.1-150300.8.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810472" version="1" comment="libnbd-bash-completion is &lt;1.18.1-150300.8.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810473" version="1" comment="libnbd-devel is &lt;1.18.1-150300.8.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810474" version="1" comment="libnbd0 is &lt;1.18.1-150300.8.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810475" version="1" comment="nbdfuse is &lt;1.18.1-150300.8.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810497" version="1" comment="python3-libnbd is &lt;1.18.1-150300.8.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810388" version="1" comment="python3-libxml2-python is &lt;2.9.7-150000.3.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809862" version="1" comment="python3-Pillow is &lt;7.2.0-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809863" version="1" comment="python3-Pillow-tk is &lt;7.2.0-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803402" version="1" comment="python3-urllib3 is &lt;1.25.10-150300.4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809848" version="1" comment="go1.21-openssl is &lt;1.21.4.1-150000.1.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809849" version="1" comment="go1.21-openssl-doc is &lt;1.21.4.1-150000.1.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809850" version="1" comment="go1.21-openssl-race is &lt;1.21.4.1-150000.1.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809851" version="1" comment="go1.20 is &lt;1.20.11-150000.1.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809852" version="1" comment="go1.20-doc is &lt;1.20.11-150000.1.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809853" version="1" comment="go1.20-race is &lt;1.20.11-150000.1.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809854" version="1" comment="go1.21 is &lt;1.21.4-150000.1.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809855" version="1" comment="go1.21-doc is &lt;1.21.4-150000.1.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809856" version="1" comment="go1.21-race is &lt;1.21.4-150000.1.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809857" version="1" comment="go1.20-openssl is &lt;1.20.11.1-150000.1.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809858" version="1" comment="go1.20-openssl-doc is &lt;1.20.11.1-150000.1.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809859" version="1" comment="go1.20-openssl-race is &lt;1.20.11.1-150000.1.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807734" version="1" comment="frr is &lt;8.4-150500.4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807735" version="1" comment="frr-devel is &lt;8.4-150500.4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807736" version="1" comment="libfrr0 is &lt;8.4-150500.4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807737" version="1" comment="libfrr_pb0 is &lt;8.4-150500.4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807738" version="1" comment="libfrrcares0 is &lt;8.4-150500.4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807739" version="1" comment="libfrrfpm_pb0 is &lt;8.4-150500.4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807740" version="1" comment="libfrrospfapiclient0 is &lt;8.4-150500.4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807741" version="1" comment="libfrrsnmp0 is &lt;8.4-150500.4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807742" version="1" comment="libfrrzmq0 is &lt;8.4-150500.4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807743" version="1" comment="libmlag_pb0 is &lt;8.4-150500.4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810481" version="1" comment="xen is &lt;4.17.2_08-150500.3.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810482" version="1" comment="xen-devel is &lt;4.17.2_08-150500.3.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810483" version="1" comment="xen-doc-html is &lt;4.17.2_08-150500.3.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810484" version="1" comment="xen-libs is &lt;4.17.2_08-150500.3.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810485" version="1" comment="xen-libs-32bit is &lt;4.17.2_08-150500.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810486" version="1" comment="xen-tools is &lt;4.17.2_08-150500.3.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810487" version="1" comment="xen-tools-domU is &lt;4.17.2_08-150500.3.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810488" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.17.2_08-150500.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809768" version="1" comment="postgresql14 is &lt;14.10-150200.5.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809769" version="1" comment="postgresql14-contrib is &lt;14.10-150200.5.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809770" version="1" comment="postgresql14-devel is &lt;14.10-150200.5.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809771" version="1" comment="postgresql14-docs is &lt;14.10-150200.5.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809772" version="1" comment="postgresql14-llvmjit is &lt;14.10-150200.5.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809773" version="1" comment="postgresql14-llvmjit-devel is &lt;14.10-150200.5.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809774" version="1" comment="postgresql14-plperl is &lt;14.10-150200.5.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809775" version="1" comment="postgresql14-plpython is &lt;14.10-150200.5.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809776" version="1" comment="postgresql14-pltcl is &lt;14.10-150200.5.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809777" version="1" comment="postgresql14-server is &lt;14.10-150200.5.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809778" version="1" comment="postgresql14-server-devel is &lt;14.10-150200.5.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809779" version="1" comment="postgresql14-test is &lt;14.10-150200.5.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809727" version="1" comment="libecpg6 is &lt;16.1-150200.5.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809728" version="1" comment="libecpg6-32bit is &lt;16.1-150200.5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809729" version="1" comment="libpq5 is &lt;16.1-150200.5.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809730" version="1" comment="libpq5-32bit is &lt;16.1-150200.5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809893" version="1" comment="postgresql is &lt;16-150500.10.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809894" version="1" comment="postgresql-contrib is &lt;16-150500.10.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809895" version="1" comment="postgresql-devel is &lt;16-150500.10.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809896" version="1" comment="postgresql-docs is &lt;16-150500.10.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809897" version="1" comment="postgresql-llvmjit is &lt;16-150500.10.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809898" version="1" comment="postgresql-llvmjit-devel is &lt;16-150500.10.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809899" version="1" comment="postgresql-plperl is &lt;16-150500.10.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809900" version="1" comment="postgresql-plpython is &lt;16-150500.10.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809901" version="1" comment="postgresql-pltcl is &lt;16-150500.10.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809902" version="1" comment="postgresql-server is &lt;16-150500.10.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809903" version="1" comment="postgresql-server-devel is &lt;16-150500.10.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809904" version="1" comment="postgresql-test is &lt;16-150500.10.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809743" version="1" comment="postgresql15 is &lt;15.5-150200.5.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809744" version="1" comment="postgresql15-contrib is &lt;15.5-150200.5.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809745" version="1" comment="postgresql15-devel is &lt;15.5-150200.5.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809746" version="1" comment="postgresql15-docs is &lt;15.5-150200.5.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809747" version="1" comment="postgresql15-llvmjit is &lt;15.5-150200.5.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809748" version="1" comment="postgresql15-llvmjit-devel is &lt;15.5-150200.5.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809749" version="1" comment="postgresql15-plperl is &lt;15.5-150200.5.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809750" version="1" comment="postgresql15-plpython is &lt;15.5-150200.5.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809751" version="1" comment="postgresql15-pltcl is &lt;15.5-150200.5.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809752" version="1" comment="postgresql15-server is &lt;15.5-150200.5.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809753" version="1" comment="postgresql15-server-devel is &lt;15.5-150200.5.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809754" version="1" comment="postgresql15-test is &lt;15.5-150200.5.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809755" version="1" comment="postgresql16 is &lt;16.1-150200.5.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809756" version="1" comment="postgresql16-contrib is &lt;16.1-150200.5.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809757" version="1" comment="postgresql16-devel is &lt;16.1-150200.5.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809758" version="1" comment="postgresql16-devel-mini is &lt;16.1-150200.5.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809759" version="1" comment="postgresql16-docs is &lt;16.1-150200.5.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809760" version="1" comment="postgresql16-llvmjit is &lt;16.1-150200.5.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809761" version="1" comment="postgresql16-llvmjit-devel is &lt;16.1-150200.5.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809762" version="1" comment="postgresql16-plperl is &lt;16.1-150200.5.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809763" version="1" comment="postgresql16-plpython is &lt;16.1-150200.5.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809764" version="1" comment="postgresql16-pltcl is &lt;16.1-150200.5.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809765" version="1" comment="postgresql16-server is &lt;16.1-150200.5.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809766" version="1" comment="postgresql16-server-devel is &lt;16.1-150200.5.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809767" version="1" comment="postgresql16-test is &lt;16.1-150200.5.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811399" version="1" comment="frozen-devel is &lt;1.1.1-150400.9.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811400" version="1" comment="libixion-0_18-0 is &lt;0.18.1-150400.14.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811401" version="1" comment="libixion-devel is &lt;0.18.1-150400.14.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811402" version="1" comment="libixion-tools is &lt;0.18.1-150400.14.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811403" version="1" comment="liborcus-0_18-0 is &lt;0.18.1-150400.13.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811404" version="1" comment="liborcus-devel is &lt;0.18.1-150400.13.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811405" version="1" comment="liborcus-tools is &lt;0.18.1-150400.13.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811406" version="1" comment="libreoffice is &lt;7.6.2.1-150400.17.17.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811407" version="1" comment="libreoffice-base is &lt;7.6.2.1-150400.17.17.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811408" version="1" comment="libreoffice-base-drivers-postgresql is &lt;7.6.2.1-150400.17.17.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811409" version="1" comment="libreoffice-branding-upstream is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811410" version="1" comment="libreoffice-calc is &lt;7.6.2.1-150400.17.17.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811411" version="1" comment="libreoffice-calc-extensions is &lt;7.6.2.1-150400.17.17.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811412" version="1" comment="libreoffice-draw is &lt;7.6.2.1-150400.17.17.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811413" version="1" comment="libreoffice-filters-optional is &lt;7.6.2.1-150400.17.17.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811414" version="1" comment="libreoffice-gdb-pretty-printers is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811415" version="1" comment="libreoffice-glade is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811416" version="1" comment="libreoffice-gnome is &lt;7.6.2.1-150400.17.17.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811417" version="1" comment="libreoffice-gtk3 is &lt;7.6.2.1-150400.17.17.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811418" version="1" comment="libreoffice-icon-themes is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811419" version="1" comment="libreoffice-impress is &lt;7.6.2.1-150400.17.17.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811420" version="1" comment="libreoffice-l10n-af is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811421" version="1" comment="libreoffice-l10n-am is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811422" version="1" comment="libreoffice-l10n-ar is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811423" version="1" comment="libreoffice-l10n-as is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811424" version="1" comment="libreoffice-l10n-ast is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811425" version="1" comment="libreoffice-l10n-be is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811426" version="1" comment="libreoffice-l10n-bg is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811427" version="1" comment="libreoffice-l10n-bn is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811428" version="1" comment="libreoffice-l10n-bn_IN is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811429" version="1" comment="libreoffice-l10n-bo is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811430" version="1" comment="libreoffice-l10n-br is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811431" version="1" comment="libreoffice-l10n-brx is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811432" version="1" comment="libreoffice-l10n-bs is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811433" version="1" comment="libreoffice-l10n-ca is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811434" version="1" comment="libreoffice-l10n-ca_valencia is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811435" version="1" comment="libreoffice-l10n-ckb is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811436" version="1" comment="libreoffice-l10n-cs is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811437" version="1" comment="libreoffice-l10n-cy is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811438" version="1" comment="libreoffice-l10n-da is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811439" version="1" comment="libreoffice-l10n-de is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811440" version="1" comment="libreoffice-l10n-dgo is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811441" version="1" comment="libreoffice-l10n-dsb is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811442" version="1" comment="libreoffice-l10n-dz is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811443" version="1" comment="libreoffice-l10n-el is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811444" version="1" comment="libreoffice-l10n-en is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811445" version="1" comment="libreoffice-l10n-en_GB is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811446" version="1" comment="libreoffice-l10n-en_ZA is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811447" version="1" comment="libreoffice-l10n-eo is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811448" version="1" comment="libreoffice-l10n-es is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811449" version="1" comment="libreoffice-l10n-et is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811450" version="1" comment="libreoffice-l10n-eu is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811451" version="1" comment="libreoffice-l10n-fa is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811452" version="1" comment="libreoffice-l10n-fi is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811453" version="1" comment="libreoffice-l10n-fr is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811454" version="1" comment="libreoffice-l10n-fur is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811455" version="1" comment="libreoffice-l10n-fy is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811456" version="1" comment="libreoffice-l10n-ga is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811457" version="1" comment="libreoffice-l10n-gd is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811458" version="1" comment="libreoffice-l10n-gl is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811459" version="1" comment="libreoffice-l10n-gu is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811460" version="1" comment="libreoffice-l10n-gug is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811461" version="1" comment="libreoffice-l10n-he is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811462" version="1" comment="libreoffice-l10n-hi is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811463" version="1" comment="libreoffice-l10n-hr is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811464" version="1" comment="libreoffice-l10n-hsb is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811465" version="1" comment="libreoffice-l10n-hu is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811466" version="1" comment="libreoffice-l10n-id is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811467" version="1" comment="libreoffice-l10n-is is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811468" version="1" comment="libreoffice-l10n-it is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811469" version="1" comment="libreoffice-l10n-ja is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811470" version="1" comment="libreoffice-l10n-ka is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811471" version="1" comment="libreoffice-l10n-kab is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811472" version="1" comment="libreoffice-l10n-kk is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811473" version="1" comment="libreoffice-l10n-km is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811474" version="1" comment="libreoffice-l10n-kmr_Latn is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811475" version="1" comment="libreoffice-l10n-kn is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811476" version="1" comment="libreoffice-l10n-ko is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811477" version="1" comment="libreoffice-l10n-kok is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811478" version="1" comment="libreoffice-l10n-ks is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811479" version="1" comment="libreoffice-l10n-lb is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811480" version="1" comment="libreoffice-l10n-lo is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811481" version="1" comment="libreoffice-l10n-lt is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811482" version="1" comment="libreoffice-l10n-lv is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811483" version="1" comment="libreoffice-l10n-mai is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811484" version="1" comment="libreoffice-l10n-mk is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811485" version="1" comment="libreoffice-l10n-ml is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811486" version="1" comment="libreoffice-l10n-mn is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811487" version="1" comment="libreoffice-l10n-mni is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811488" version="1" comment="libreoffice-l10n-mr is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811489" version="1" comment="libreoffice-l10n-my is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811490" version="1" comment="libreoffice-l10n-nb is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811491" version="1" comment="libreoffice-l10n-ne is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811492" version="1" comment="libreoffice-l10n-nl is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811493" version="1" comment="libreoffice-l10n-nn is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811494" version="1" comment="libreoffice-l10n-nr is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811495" version="1" comment="libreoffice-l10n-nso is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811496" version="1" comment="libreoffice-l10n-oc is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811497" version="1" comment="libreoffice-l10n-om is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811498" version="1" comment="libreoffice-l10n-or is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811499" version="1" comment="libreoffice-l10n-pa is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811500" version="1" comment="libreoffice-l10n-pl is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811501" version="1" comment="libreoffice-l10n-pt_BR is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811502" version="1" comment="libreoffice-l10n-pt_PT is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811503" version="1" comment="libreoffice-l10n-ro is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811504" version="1" comment="libreoffice-l10n-ru is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811505" version="1" comment="libreoffice-l10n-rw is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811506" version="1" comment="libreoffice-l10n-sa_IN is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811507" version="1" comment="libreoffice-l10n-sat is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811508" version="1" comment="libreoffice-l10n-sd is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811509" version="1" comment="libreoffice-l10n-si is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811510" version="1" comment="libreoffice-l10n-sid is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811511" version="1" comment="libreoffice-l10n-sk is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811512" version="1" comment="libreoffice-l10n-sl is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811513" version="1" comment="libreoffice-l10n-sq is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811514" version="1" comment="libreoffice-l10n-sr is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811515" version="1" comment="libreoffice-l10n-ss is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811516" version="1" comment="libreoffice-l10n-st is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811517" version="1" comment="libreoffice-l10n-sv is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811518" version="1" comment="libreoffice-l10n-sw_TZ is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811519" version="1" comment="libreoffice-l10n-szl is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811520" version="1" comment="libreoffice-l10n-ta is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811521" version="1" comment="libreoffice-l10n-te is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811522" version="1" comment="libreoffice-l10n-tg is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811523" version="1" comment="libreoffice-l10n-th is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811524" version="1" comment="libreoffice-l10n-tn is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811525" version="1" comment="libreoffice-l10n-tr is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811526" version="1" comment="libreoffice-l10n-ts is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811527" version="1" comment="libreoffice-l10n-tt is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811528" version="1" comment="libreoffice-l10n-ug is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811529" version="1" comment="libreoffice-l10n-uk is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811530" version="1" comment="libreoffice-l10n-uz is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811531" version="1" comment="libreoffice-l10n-ve is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811532" version="1" comment="libreoffice-l10n-vec is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811533" version="1" comment="libreoffice-l10n-vi is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811534" version="1" comment="libreoffice-l10n-xh is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811535" version="1" comment="libreoffice-l10n-zh_CN is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811536" version="1" comment="libreoffice-l10n-zh_TW is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811537" version="1" comment="libreoffice-l10n-zu is &lt;7.6.2.1-150400.17.17.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811538" version="1" comment="libreoffice-librelogo is &lt;7.6.2.1-150400.17.17.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811539" version="1" comment="libreoffice-mailmerge is &lt;7.6.2.1-150400.17.17.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811540" version="1" comment="libreoffice-math is &lt;7.6.2.1-150400.17.17.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811541" version="1" comment="libreoffice-officebean is &lt;7.6.2.1-150400.17.17.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811542" version="1" comment="libreoffice-pyuno is &lt;7.6.2.1-150400.17.17.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811543" version="1" comment="libreoffice-qt5 is &lt;7.6.2.1-150400.17.17.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811544" version="1" comment="libreoffice-sdk is &lt;7.6.2.1-150400.17.17.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811545" version="1" comment="libreoffice-sdk-doc is &lt;7.6.2.1-150400.17.17.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811546" version="1" comment="libreoffice-writer is &lt;7.6.2.1-150400.17.17.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811547" version="1" comment="libreoffice-writer-extensions is &lt;7.6.2.1-150400.17.17.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811548" version="1" comment="libreofficekit is &lt;7.6.2.1-150400.17.17.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811549" version="1" comment="libreofficekit-devel is &lt;7.6.2.1-150400.17.17.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811550" version="1" comment="mdds-2_1-devel is &lt;2.1.1-150400.9.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811551" version="1" comment="python3-libixion is &lt;0.18.1-150400.14.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811552" version="1" comment="python3-liborcus is &lt;0.18.1-150400.13.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810835" version="1" comment="ucode-intel is &lt;20231114-150200.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809804" version="1" comment="avahi is &lt;0.8-150400.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809805" version="1" comment="avahi-autoipd is &lt;0.8-150400.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809806" version="1" comment="avahi-compat-howl-devel is &lt;0.8-150400.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809807" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.8-150400.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809808" version="1" comment="avahi-lang is &lt;0.8-150400.7.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809809" version="1" comment="avahi-utils is &lt;0.8-150400.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809810" version="1" comment="avahi-utils-gtk is &lt;0.8-150400.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809811" version="1" comment="libavahi-client3 is &lt;0.8-150400.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809812" version="1" comment="libavahi-client3-32bit is &lt;0.8-150400.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809813" version="1" comment="libavahi-common3 is &lt;0.8-150400.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809814" version="1" comment="libavahi-common3-32bit is &lt;0.8-150400.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809815" version="1" comment="libavahi-core7 is &lt;0.8-150400.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809816" version="1" comment="libavahi-devel is &lt;0.8-150400.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809817" version="1" comment="libavahi-glib-devel is &lt;0.8-150400.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809818" version="1" comment="libavahi-glib1 is &lt;0.8-150400.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809819" version="1" comment="libavahi-glib1-32bit is &lt;0.8-150400.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809820" version="1" comment="libavahi-gobject-devel is &lt;0.8-150400.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809821" version="1" comment="libavahi-gobject0 is &lt;0.8-150400.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809822" version="1" comment="libavahi-libevent1 is &lt;0.8-150400.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809823" version="1" comment="libavahi-qt5-1 is &lt;0.8-150400.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809824" version="1" comment="libavahi-qt5-devel is &lt;0.8-150400.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809825" version="1" comment="libavahi-ui-gtk3-0 is &lt;0.8-150400.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809826" version="1" comment="libdns_sd is &lt;0.8-150400.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809827" version="1" comment="libdns_sd-32bit is &lt;0.8-150400.7.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809828" version="1" comment="libhowl0 is &lt;0.8-150400.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809829" version="1" comment="python3-avahi is &lt;0.8-150400.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809830" version="1" comment="python3-avahi-gtk is &lt;0.8-150400.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809831" version="1" comment="typelib-1_0-Avahi-0_6 is &lt;0.8-150400.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810356" version="1" comment="libxml2-2 is &lt;2.10.3-150500.5.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810357" version="1" comment="libxml2-2-32bit is &lt;2.10.3-150500.5.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810358" version="1" comment="libxml2-devel is &lt;2.10.3-150500.5.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810359" version="1" comment="libxml2-devel-32bit is &lt;2.10.3-150500.5.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810360" version="1" comment="libxml2-doc is &lt;2.10.3-150500.5.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810361" version="1" comment="libxml2-tools is &lt;2.10.3-150500.5.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810362" version="1" comment="python3-libxml2 is &lt;2.10.3-150500.5.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810363" version="1" comment="python311-libxml2 is &lt;2.10.3-150500.5.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810441" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.392-150000.3.85.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810442" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.392-150000.3.85.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810443" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.392-150000.3.85.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810444" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.392-150000.3.85.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810445" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.392-150000.3.85.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810446" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.392-150000.3.85.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810447" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.392-150000.3.85.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809861" version="1" comment="apache2-mod_jk is &lt;1.2.49-150100.6.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810448" version="1" comment="python3-setuptools is &lt;44.1.1-150400.9.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810449" version="1" comment="python3-setuptools-test is &lt;44.1.1-150400.9.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810450" version="1" comment="python3-setuptools-wheel is &lt;44.1.1-150400.9.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810489" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150500.17.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810490" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1l-150500.17.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810491" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150500.17.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810492" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1l-150500.17.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810493" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150500.17.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810494" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1l-150500.17.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810495" version="1" comment="openssl-1_1 is &lt;1.1.1l-150500.17.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810496" version="1" comment="openssl-1_1-doc is &lt;1.1.1l-150500.17.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810451" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-150000.3.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810452" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2p-150000.3.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810453" version="1" comment="libopenssl10 is &lt;1.0.2p-150000.3.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810454" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-150000.3.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810455" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-150000.3.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810456" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2p-150000.3.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810457" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2p-150000.3.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810458" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2p-150000.3.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810459" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2p-150000.3.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810460" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-150000.3.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810461" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2p-150000.3.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810462" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2p-150000.3.88.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803371" version="1" comment="maven is &lt;3.9.4-150200.4.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803372" version="1" comment="maven-javadoc is &lt;3.9.4-150200.4.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803373" version="1" comment="maven-lib is &lt;3.9.4-150200.4.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803374" version="1" comment="maven-resolver is &lt;1.9.15-150200.3.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803375" version="1" comment="maven-resolver-api is &lt;1.9.15-150200.3.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803376" version="1" comment="maven-resolver-connector-basic is &lt;1.9.15-150200.3.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803377" version="1" comment="maven-resolver-impl is &lt;1.9.15-150200.3.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803378" version="1" comment="maven-resolver-javadoc is &lt;1.9.15-150200.3.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803379" version="1" comment="maven-resolver-named-locks is &lt;1.9.15-150200.3.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803380" version="1" comment="maven-resolver-spi is &lt;1.9.15-150200.3.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803381" version="1" comment="maven-resolver-test-util is &lt;1.9.15-150200.3.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803382" version="1" comment="maven-resolver-transport-classpath is &lt;1.9.15-150200.3.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803383" version="1" comment="maven-resolver-transport-file is &lt;1.9.15-150200.3.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803384" version="1" comment="maven-resolver-transport-http is &lt;1.9.15-150200.3.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803385" version="1" comment="maven-resolver-transport-wagon is &lt;1.9.15-150200.3.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803386" version="1" comment="maven-resolver-util is &lt;1.9.15-150200.3.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803387" version="1" comment="sbt is &lt;0.13.18-150200.4.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803388" version="1" comment="sbt-bootstrap is &lt;0.13.18-150200.4.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803389" version="1" comment="xmvn is &lt;4.2.0-150200.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803390" version="1" comment="xmvn-api is &lt;4.2.0-150200.3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803391" version="1" comment="xmvn-connector is &lt;4.2.0-150200.3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803392" version="1" comment="xmvn-connector-javadoc is &lt;4.2.0-150200.3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803393" version="1" comment="xmvn-core is &lt;4.2.0-150200.3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803394" version="1" comment="xmvn-install is &lt;4.2.0-150200.3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803395" version="1" comment="xmvn-minimal is &lt;4.2.0-150200.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803396" version="1" comment="xmvn-mojo is &lt;4.2.0-150200.3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803397" version="1" comment="xmvn-mojo-javadoc is &lt;4.2.0-150200.3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803398" version="1" comment="xmvn-parent is &lt;4.2.0-150200.3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803399" version="1" comment="xmvn-resolve is &lt;4.2.0-150200.3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803400" version="1" comment="xmvn-subst is &lt;4.2.0-150200.3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803401" version="1" comment="xmvn-tools-javadoc is &lt;4.2.0-150200.3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810294" version="1" comment="python311-Pillow is &lt;9.5.0-150400.5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810295" version="1" comment="python311-Pillow-tk is &lt;9.5.0-150400.5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811579" version="1" comment="strongswan is &lt;5.9.11-150500.5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811580" version="1" comment="strongswan-doc is &lt;5.9.11-150500.5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811581" version="1" comment="strongswan-hmac is &lt;5.9.11-150500.5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811582" version="1" comment="strongswan-ipsec is &lt;5.9.11-150500.5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811583" version="1" comment="strongswan-libs0 is &lt;5.9.11-150500.5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811584" version="1" comment="strongswan-mysql is &lt;5.9.11-150500.5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811585" version="1" comment="strongswan-nm is &lt;5.9.11-150500.5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811586" version="1" comment="strongswan-sqlite is &lt;5.9.11-150500.5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811393" version="1" comment="squid is &lt;5.7-150400.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811378" version="1" comment="MozillaFirefox is &lt;115.5.0-150200.152.117.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811379" version="1" comment="MozillaFirefox-branding-upstream is &lt;115.5.0-150200.152.117.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811380" version="1" comment="MozillaFirefox-devel is &lt;115.5.0-150200.152.117.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811381" version="1" comment="MozillaFirefox-translations-common is &lt;115.5.0-150200.152.117.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811382" version="1" comment="MozillaFirefox-translations-other is &lt;115.5.0-150200.152.117.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812242" version="1" comment="gvim is &lt;9.0.2103-150500.20.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812243" version="1" comment="vim is &lt;9.0.2103-150500.20.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812244" version="1" comment="vim-data is &lt;9.0.2103-150500.20.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812245" version="1" comment="vim-data-common is &lt;9.0.2103-150500.20.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812246" version="1" comment="vim-small is &lt;9.0.2103-150500.20.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812153" version="1" comment="WebKitGTK-4.0-lang is &lt;2.42.2-150400.4.64.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812154" version="1" comment="WebKitGTK-4.1-lang is &lt;2.42.2-150400.4.64.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812155" version="1" comment="WebKitGTK-6.0-lang is &lt;2.42.2-150400.4.64.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812156" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812157" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.42.2-150400.4.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812158" version="1" comment="libjavascriptcoregtk-4_0-18-64bit is &lt;2.42.2-150400.4.64.2 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812159" version="1" comment="libjavascriptcoregtk-4_1-0 is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812160" version="1" comment="libjavascriptcoregtk-4_1-0-32bit is &lt;2.42.2-150400.4.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812161" version="1" comment="libjavascriptcoregtk-4_1-0-64bit is &lt;2.42.2-150400.4.64.2 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812162" version="1" comment="libjavascriptcoregtk-6_0-1 is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812163" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812164" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.42.2-150400.4.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812165" version="1" comment="libwebkit2gtk-4_0-37-64bit is &lt;2.42.2-150400.4.64.2 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812166" version="1" comment="libwebkit2gtk-4_1-0 is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812167" version="1" comment="libwebkit2gtk-4_1-0-32bit is &lt;2.42.2-150400.4.64.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812168" version="1" comment="libwebkit2gtk-4_1-0-64bit is &lt;2.42.2-150400.4.64.2 for aarch64_ilp32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812169" version="1" comment="libwebkitgtk-6_0-4 is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812170" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812171" version="1" comment="typelib-1_0-JavaScriptCore-4_1 is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812172" version="1" comment="typelib-1_0-JavaScriptCore-6_0 is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812173" version="1" comment="typelib-1_0-WebKit-6_0 is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812174" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812175" version="1" comment="typelib-1_0-WebKit2-4_1 is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812176" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812177" version="1" comment="typelib-1_0-WebKit2WebExtension-4_1 is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812178" version="1" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812179" version="1" comment="webkit-jsc-4 is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812180" version="1" comment="webkit-jsc-4.1 is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812181" version="1" comment="webkit-jsc-6.0 is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812182" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812183" version="1" comment="webkit2gtk-4_1-injected-bundles is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812184" version="1" comment="webkit2gtk3-devel is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812185" version="1" comment="webkit2gtk3-minibrowser is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812186" version="1" comment="webkit2gtk3-soup2-devel is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812187" version="1" comment="webkit2gtk3-soup2-minibrowser is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812188" version="1" comment="webkit2gtk4-devel is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812189" version="1" comment="webkit2gtk4-minibrowser is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812190" version="1" comment="webkitgtk-6_0-injected-bundles is &lt;2.42.2-150400.4.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811385" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr8.15-150000.3.83.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811386" version="1" comment="java-1_8_0-ibm-32bit is &lt;1.8.0_sr8.15-150000.3.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811387" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr8.15-150000.3.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811388" version="1" comment="java-1_8_0-ibm-demo is &lt;1.8.0_sr8.15-150000.3.83.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811389" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr8.15-150000.3.83.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811390" version="1" comment="java-1_8_0-ibm-devel-32bit is &lt;1.8.0_sr8.15-150000.3.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811391" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr8.15-150000.3.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811392" version="1" comment="java-1_8_0-ibm-src is &lt;1.8.0_sr8.15-150000.3.83.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811361" version="1" comment="libopenvswitch-2_14-0 is &lt;2.14.2-150400.24.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811362" version="1" comment="libovn-20_06-0 is &lt;20.06.2-150400.24.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811363" version="1" comment="openvswitch is &lt;2.14.2-150400.24.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811364" version="1" comment="openvswitch-devel is &lt;2.14.2-150400.24.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811365" version="1" comment="openvswitch-doc is &lt;2.14.2-150400.24.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811366" version="1" comment="openvswitch-ipsec is &lt;2.14.2-150400.24.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811367" version="1" comment="openvswitch-pki is &lt;2.14.2-150400.24.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811368" version="1" comment="openvswitch-test is &lt;2.14.2-150400.24.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811369" version="1" comment="openvswitch-vtep is &lt;2.14.2-150400.24.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811370" version="1" comment="ovn is &lt;20.06.2-150400.24.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811371" version="1" comment="ovn-central is &lt;20.06.2-150400.24.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811372" version="1" comment="ovn-devel is &lt;20.06.2-150400.24.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811373" version="1" comment="ovn-doc is &lt;20.06.2-150400.24.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811374" version="1" comment="ovn-docker is &lt;20.06.2-150400.24.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811375" version="1" comment="ovn-host is &lt;20.06.2-150400.24.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811376" version="1" comment="ovn-vtep is &lt;20.06.2-150400.24.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811377" version="1" comment="python3-ovs is &lt;2.14.2-150400.24.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812149" version="1" comment="libpainter0 is &lt;0.9.13.1-150200.4.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812150" version="1" comment="librfxencode0 is &lt;0.9.13.1-150200.4.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812151" version="1" comment="xrdp is &lt;0.9.13.1-150200.4.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812152" version="1" comment="xrdp-devel is &lt;0.9.13.1-150200.4.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812214" version="1" comment="libnss_slurm2 is &lt;23.02.6-150500.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812215" version="1" comment="libpmi0 is &lt;23.02.6-150500.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812216" version="1" comment="libslurm39 is &lt;23.02.6-150500.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812217" version="1" comment="perl-slurm is &lt;23.02.6-150500.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812218" version="1" comment="slurm is &lt;23.02.6-150500.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812219" version="1" comment="slurm-auth-none is &lt;23.02.6-150500.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812220" version="1" comment="slurm-config is &lt;23.02.6-150500.5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812221" version="1" comment="slurm-config-man is &lt;23.02.6-150500.5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812222" version="1" comment="slurm-cray is &lt;23.02.6-150500.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812223" version="1" comment="slurm-devel is &lt;23.02.6-150500.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812224" version="1" comment="slurm-doc is &lt;23.02.6-150500.5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812225" version="1" comment="slurm-hdf5 is &lt;23.02.6-150500.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812226" version="1" comment="slurm-lua is &lt;23.02.6-150500.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812227" version="1" comment="slurm-munge is &lt;23.02.6-150500.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812228" version="1" comment="slurm-node is &lt;23.02.6-150500.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812229" version="1" comment="slurm-openlava is &lt;23.02.6-150500.5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812230" version="1" comment="slurm-pam_slurm is &lt;23.02.6-150500.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812231" version="1" comment="slurm-plugin-ext-sensors-rrd is &lt;23.02.6-150500.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812232" version="1" comment="slurm-plugins is &lt;23.02.6-150500.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812233" version="1" comment="slurm-rest is &lt;23.02.6-150500.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812234" version="1" comment="slurm-seff is &lt;23.02.6-150500.5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812235" version="1" comment="slurm-sjstat is &lt;23.02.6-150500.5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812236" version="1" comment="slurm-slurmdbd is &lt;23.02.6-150500.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812237" version="1" comment="slurm-sql is &lt;23.02.6-150500.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812238" version="1" comment="slurm-sview is &lt;23.02.6-150500.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812239" version="1" comment="slurm-testsuite is &lt;23.02.6-150500.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812240" version="1" comment="slurm-torque is &lt;23.02.6-150500.5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812241" version="1" comment="slurm-webdoc is &lt;23.02.6-150500.5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812934" version="1" comment="libnss_slurm2_22_05 is &lt;22.05.10-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812935" version="1" comment="libpmi0_22_05 is &lt;22.05.10-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812936" version="1" comment="libslurm38 is &lt;22.05.10-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812937" version="1" comment="perl-slurm_22_05 is &lt;22.05.10-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812938" version="1" comment="slurm_22_05 is &lt;22.05.10-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812939" version="1" comment="slurm_22_05-auth-none is &lt;22.05.10-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812940" version="1" comment="slurm_22_05-config is &lt;22.05.10-150300.7.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812941" version="1" comment="slurm_22_05-config-man is &lt;22.05.10-150300.7.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812942" version="1" comment="slurm_22_05-cray is &lt;22.05.10-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812943" version="1" comment="slurm_22_05-devel is &lt;22.05.10-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812944" version="1" comment="slurm_22_05-doc is &lt;22.05.10-150300.7.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812945" version="1" comment="slurm_22_05-hdf5 is &lt;22.05.10-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812946" version="1" comment="slurm_22_05-lua is &lt;22.05.10-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812947" version="1" comment="slurm_22_05-munge is &lt;22.05.10-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812948" version="1" comment="slurm_22_05-node is &lt;22.05.10-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812949" version="1" comment="slurm_22_05-openlava is &lt;22.05.10-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812950" version="1" comment="slurm_22_05-pam_slurm is &lt;22.05.10-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812951" version="1" comment="slurm_22_05-plugins is &lt;22.05.10-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812952" version="1" comment="slurm_22_05-rest is &lt;22.05.10-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812953" version="1" comment="slurm_22_05-seff is &lt;22.05.10-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812954" version="1" comment="slurm_22_05-sjstat is &lt;22.05.10-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812955" version="1" comment="slurm_22_05-slurmdbd is &lt;22.05.10-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812956" version="1" comment="slurm_22_05-sql is &lt;22.05.10-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812957" version="1" comment="slurm_22_05-sview is &lt;22.05.10-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812958" version="1" comment="slurm_22_05-testsuite is &lt;22.05.10-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812959" version="1" comment="slurm_22_05-torque is &lt;22.05.10-150300.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812960" version="1" comment="slurm_22_05-webdoc is &lt;22.05.10-150300.7.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812121" version="1" comment="libxerces-c-3_2 is &lt;3.2.3-150300.3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812122" version="1" comment="libxerces-c-3_2-32bit is &lt;3.2.3-150300.3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812123" version="1" comment="libxerces-c-devel is &lt;3.2.3-150300.3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812124" version="1" comment="xerces-c is &lt;3.2.3-150300.3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812125" version="1" comment="xerces-c-doc is &lt;3.2.3-150300.3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812195" version="1" comment="MozillaThunderbird is &lt;115.5.0-150200.8.139.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812196" version="1" comment="MozillaThunderbird-translations-common is &lt;115.5.0-150200.8.139.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812197" version="1" comment="MozillaThunderbird-translations-other is &lt;115.5.0-150200.8.139.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803757" version="1" comment="squashfs is &lt;4.6.1-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810836" version="1" comment="python3-Twisted is &lt;22.2.0-150400.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810837" version="1" comment="python311-Twisted is &lt;22.10.0-150400.5.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810838" version="1" comment="python311-Twisted-all_non_platform is &lt;22.10.0-150400.5.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810839" version="1" comment="python311-Twisted-conch is &lt;22.10.0-150400.5.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810840" version="1" comment="python311-Twisted-conch_nacl is &lt;22.10.0-150400.5.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810841" version="1" comment="python311-Twisted-contextvars is &lt;22.10.0-150400.5.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810842" version="1" comment="python311-Twisted-http2 is &lt;22.10.0-150400.5.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810843" version="1" comment="python311-Twisted-serial is &lt;22.10.0-150400.5.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810844" version="1" comment="python311-Twisted-tls is &lt;22.10.0-150400.5.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813787" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.392-150200.3.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813788" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.392-150200.3.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813789" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.392-150200.3.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813790" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.392-150200.3.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813791" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.392-150200.3.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813792" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.392-150200.3.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813793" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.392-150200.3.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812928" version="1" comment="libsqlite3-0 is &lt;3.44.0-150000.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812929" version="1" comment="libsqlite3-0-32bit is &lt;3.44.0-150000.3.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812930" version="1" comment="sqlite3 is &lt;3.44.0-150000.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812931" version="1" comment="sqlite3-devel is &lt;3.44.0-150000.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812932" version="1" comment="sqlite3-doc is &lt;3.44.0-150000.3.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812933" version="1" comment="sqlite3-tcl is &lt;3.44.0-150000.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813336" version="1" comment="traceroute is &lt;2.0.21-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813391" version="1" comment="kubevirt-container-disk is &lt;1.1.0-150500.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813392" version="1" comment="kubevirt-manifests is &lt;1.1.0-150500.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813393" version="1" comment="kubevirt-tests is &lt;1.1.0-150500.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813394" version="1" comment="kubevirt-virt-api is &lt;1.1.0-150500.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813395" version="1" comment="kubevirt-virt-controller is &lt;1.1.0-150500.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813396" version="1" comment="kubevirt-virt-exportproxy is &lt;1.1.0-150500.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813397" version="1" comment="kubevirt-virt-exportserver is &lt;1.1.0-150500.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813398" version="1" comment="kubevirt-virt-handler is &lt;1.1.0-150500.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813399" version="1" comment="kubevirt-virt-launcher is &lt;1.1.0-150500.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813400" version="1" comment="kubevirt-virt-operator is &lt;1.1.0-150500.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813401" version="1" comment="kubevirt-virtctl is &lt;1.1.0-150500.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813402" version="1" comment="obs-service-kubevirt_containers_meta is &lt;1.1.0-150500.8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813339" version="1" comment="libopenssl-3-devel is &lt;3.0.8-150500.5.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813340" version="1" comment="libopenssl-3-devel-32bit is &lt;3.0.8-150500.5.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813341" version="1" comment="libopenssl3 is &lt;3.0.8-150500.5.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813342" version="1" comment="libopenssl3-32bit is &lt;3.0.8-150500.5.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813343" version="1" comment="openssl-3 is &lt;3.0.8-150500.5.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813344" version="1" comment="openssl-3-doc is &lt;3.0.8-150500.5.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814062" version="1" comment="haproxy is &lt;2.4.22+git0.f8e3218e2-150400.3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813403" version="1" comment="containerized-data-importer-api is &lt;1.58.0-150500.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813404" version="1" comment="containerized-data-importer-cloner is &lt;1.58.0-150500.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813405" version="1" comment="containerized-data-importer-controller is &lt;1.58.0-150500.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813406" version="1" comment="containerized-data-importer-importer is &lt;1.58.0-150500.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813407" version="1" comment="containerized-data-importer-manifests is &lt;1.58.0-150500.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813408" version="1" comment="containerized-data-importer-operator is &lt;1.58.0-150500.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813409" version="1" comment="containerized-data-importer-uploadproxy is &lt;1.58.0-150500.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813410" version="1" comment="containerized-data-importer-uploadserver is &lt;1.58.0-150500.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813411" version="1" comment="obs-service-cdi_containers_meta is &lt;1.58.0-150500.6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814369" version="1" comment="libopenvswitch-3_1-0 is &lt;3.1.0-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814370" version="1" comment="libovn-23_03-0 is &lt;23.03.0-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814371" version="1" comment="openvswitch3 is &lt;3.1.0-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814372" version="1" comment="openvswitch3-devel is &lt;3.1.0-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814373" version="1" comment="openvswitch3-doc is &lt;3.1.0-150500.3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814374" version="1" comment="openvswitch3-ipsec is &lt;3.1.0-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814375" version="1" comment="openvswitch3-pki is &lt;3.1.0-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814376" version="1" comment="openvswitch3-test is &lt;3.1.0-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814377" version="1" comment="openvswitch3-vtep is &lt;3.1.0-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814378" version="1" comment="ovn3 is &lt;23.03.0-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814379" version="1" comment="ovn3-central is &lt;23.03.0-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814380" version="1" comment="ovn3-devel is &lt;23.03.0-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814381" version="1" comment="ovn3-doc is &lt;23.03.0-150500.3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814382" version="1" comment="ovn3-docker is &lt;23.03.0-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814383" version="1" comment="ovn3-host is &lt;23.03.0-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814384" version="1" comment="ovn3-vtep is &lt;23.03.0-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814385" version="1" comment="python3-ovs3 is &lt;3.1.0-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815099" version="1" comment="curl is &lt;8.0.1-150400.5.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815100" version="1" comment="libcurl-devel is &lt;8.0.1-150400.5.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815101" version="1" comment="libcurl-devel-32bit is &lt;8.0.1-150400.5.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815102" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815103" version="1" comment="libcurl4-32bit is &lt;8.0.1-150400.5.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815140" version="1" comment="kernel-firmware is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815141" version="1" comment="kernel-firmware-all is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815142" version="1" comment="kernel-firmware-amdgpu is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815143" version="1" comment="kernel-firmware-ath10k is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815144" version="1" comment="kernel-firmware-ath11k is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815145" version="1" comment="kernel-firmware-atheros is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815146" version="1" comment="kernel-firmware-bluetooth is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815147" version="1" comment="kernel-firmware-bnx2 is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815148" version="1" comment="kernel-firmware-brcm is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815149" version="1" comment="kernel-firmware-chelsio is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815150" version="1" comment="kernel-firmware-dpaa2 is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815151" version="1" comment="kernel-firmware-i915 is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815152" version="1" comment="kernel-firmware-intel is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815153" version="1" comment="kernel-firmware-iwlwifi is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815154" version="1" comment="kernel-firmware-liquidio is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815155" version="1" comment="kernel-firmware-marvell is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815156" version="1" comment="kernel-firmware-media is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815157" version="1" comment="kernel-firmware-mediatek is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815158" version="1" comment="kernel-firmware-mellanox is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815159" version="1" comment="kernel-firmware-mwifiex is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815160" version="1" comment="kernel-firmware-network is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815161" version="1" comment="kernel-firmware-nfp is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815162" version="1" comment="kernel-firmware-nvidia is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815163" version="1" comment="kernel-firmware-platform is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815164" version="1" comment="kernel-firmware-prestera is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815165" version="1" comment="kernel-firmware-qcom is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815166" version="1" comment="kernel-firmware-qlogic is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815167" version="1" comment="kernel-firmware-radeon is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815168" version="1" comment="kernel-firmware-realtek is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815169" version="1" comment="kernel-firmware-serial is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815170" version="1" comment="kernel-firmware-sound is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815171" version="1" comment="kernel-firmware-ti is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815172" version="1" comment="kernel-firmware-ueagle is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815173" version="1" comment="kernel-firmware-usb-network is &lt;20230724-150500.3.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815174" version="1" comment="ucode-amd is &lt;20230724-150500.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814351" version="1" comment="libopenvswitch-2_14-0 is &lt;2.14.2-150400.24.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814352" version="1" comment="libovn-20_06-0 is &lt;20.06.2-150400.24.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814353" version="1" comment="openvswitch is &lt;2.14.2-150400.24.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814354" version="1" comment="openvswitch-devel is &lt;2.14.2-150400.24.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814355" version="1" comment="openvswitch-doc is &lt;2.14.2-150400.24.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814356" version="1" comment="openvswitch-ipsec is &lt;2.14.2-150400.24.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814357" version="1" comment="openvswitch-pki is &lt;2.14.2-150400.24.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814358" version="1" comment="openvswitch-test is &lt;2.14.2-150400.24.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814359" version="1" comment="openvswitch-vtep is &lt;2.14.2-150400.24.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814360" version="1" comment="ovn is &lt;20.06.2-150400.24.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814361" version="1" comment="ovn-central is &lt;20.06.2-150400.24.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814362" version="1" comment="ovn-devel is &lt;20.06.2-150400.24.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814363" version="1" comment="ovn-doc is &lt;20.06.2-150400.24.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814364" version="1" comment="ovn-docker is &lt;20.06.2-150400.24.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814365" version="1" comment="ovn-host is &lt;20.06.2-150400.24.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814366" version="1" comment="ovn-vtep is &lt;20.06.2-150400.24.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814367" version="1" comment="python3-ovs is &lt;2.14.2-150400.24.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814156" version="1" comment="qemu is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814157" version="1" comment="qemu-SLOF is &lt;7.1.0-150500.49.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814158" version="1" comment="qemu-accel-qtest is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814159" version="1" comment="qemu-accel-tcg-x86 is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814160" version="1" comment="qemu-arm is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814161" version="1" comment="qemu-audio-alsa is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814162" version="1" comment="qemu-audio-dbus is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814163" version="1" comment="qemu-audio-jack is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814164" version="1" comment="qemu-audio-pa is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814165" version="1" comment="qemu-audio-spice is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814166" version="1" comment="qemu-block-curl is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814167" version="1" comment="qemu-block-dmg is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814168" version="1" comment="qemu-block-gluster is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814169" version="1" comment="qemu-block-iscsi is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814170" version="1" comment="qemu-block-nfs is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814171" version="1" comment="qemu-block-rbd is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814172" version="1" comment="qemu-block-ssh is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814173" version="1" comment="qemu-chardev-baum is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814174" version="1" comment="qemu-chardev-spice is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814175" version="1" comment="qemu-extra is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814176" version="1" comment="qemu-guest-agent is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814177" version="1" comment="qemu-hw-display-qxl is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814178" version="1" comment="qemu-hw-display-virtio-gpu is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814179" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814180" version="1" comment="qemu-hw-display-virtio-vga is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814181" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814182" version="1" comment="qemu-hw-usb-host is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814183" version="1" comment="qemu-hw-usb-redirect is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814184" version="1" comment="qemu-hw-usb-smartcard is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814185" version="1" comment="qemu-ipxe is &lt;1.0.0+-150500.49.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814186" version="1" comment="qemu-ivshmem-tools is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814187" version="1" comment="qemu-ksm is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814188" version="1" comment="qemu-kvm is &lt;7.1.0-150500.49.9.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814189" version="1" comment="qemu-lang is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814190" version="1" comment="qemu-microvm is &lt;7.1.0-150500.49.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814191" version="1" comment="qemu-ppc is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814192" version="1" comment="qemu-s390x is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814193" version="1" comment="qemu-seabios is &lt;1.16.0_0_gd239552-150500.49.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814194" version="1" comment="qemu-sgabios is &lt;8-150500.49.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814195" version="1" comment="qemu-skiboot is &lt;7.1.0-150500.49.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814196" version="1" comment="qemu-tools is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814197" version="1" comment="qemu-ui-curses is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814198" version="1" comment="qemu-ui-dbus is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814199" version="1" comment="qemu-ui-gtk is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814200" version="1" comment="qemu-ui-opengl is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814201" version="1" comment="qemu-ui-spice-app is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814202" version="1" comment="qemu-ui-spice-core is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814203" version="1" comment="qemu-vgabios is &lt;1.16.0_0_gd239552-150500.49.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814204" version="1" comment="qemu-vhost-user-gpu is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814205" version="1" comment="qemu-x86 is &lt;7.1.0-150500.49.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814863" version="1" comment="frr is &lt;8.4-150500.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814864" version="1" comment="frr-devel is &lt;8.4-150500.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814865" version="1" comment="libfrr0 is &lt;8.4-150500.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814866" version="1" comment="libfrr_pb0 is &lt;8.4-150500.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814867" version="1" comment="libfrrcares0 is &lt;8.4-150500.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814868" version="1" comment="libfrrfpm_pb0 is &lt;8.4-150500.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814869" version="1" comment="libfrrospfapiclient0 is &lt;8.4-150500.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814870" version="1" comment="libfrrsnmp0 is &lt;8.4-150500.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814871" version="1" comment="libfrrzmq0 is &lt;8.4-150500.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814872" version="1" comment="libmlag_pb0 is &lt;8.4-150500.4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813335" version="1" comment="suse-build-key is &lt;12.0-150000.8.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815009" version="1" comment="gimp is &lt;2.10.30-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815010" version="1" comment="gimp-devel is &lt;2.10.30-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815011" version="1" comment="gimp-lang is &lt;2.10.30-150400.3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815012" version="1" comment="gimp-plugin-aa is &lt;2.10.30-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815013" version="1" comment="libgimp-2_0-0 is &lt;2.10.30-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815014" version="1" comment="libgimp-2_0-0-32bit is &lt;2.10.30-150400.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815015" version="1" comment="libgimpui-2_0-0 is &lt;2.10.30-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815016" version="1" comment="libgimpui-2_0-0-32bit is &lt;2.10.30-150400.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815008" version="1" comment="squid is &lt;5.7-150400.3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815091" version="1" comment="go1.20 is &lt;1.20.12-150000.1.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815092" version="1" comment="go1.20-doc is &lt;1.20.12-150000.1.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815093" version="1" comment="go1.20-race is &lt;1.20.12-150000.1.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815094" version="1" comment="go1.21 is &lt;1.21.5-150000.1.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815095" version="1" comment="go1.21-doc is &lt;1.21.5-150000.1.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815096" version="1" comment="go1.21-race is &lt;1.21.5-150000.1.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811394" version="1" comment="hplip is &lt;3.21.10-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811395" version="1" comment="hplip-devel is &lt;3.21.10-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811396" version="1" comment="hplip-hpijs is &lt;3.21.10-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811397" version="1" comment="hplip-sane is &lt;3.21.10-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811398" version="1" comment="hplip-scan-utils is &lt;3.21.10-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813757" version="1" comment="containerd is &lt;1.7.8-150000.103.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813758" version="1" comment="containerd-ctr is &lt;1.7.8-150000.103.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813803" version="1" comment="containerd-devel is &lt;1.7.8-150000.103.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813765" version="1" comment="runc is &lt;1.1.10-150000.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814873" version="1" comment="cluster-md-kmp-64kb is &lt;5.14.21-150500.55.39.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814874" version="1" comment="cluster-md-kmp-default is &lt;5.14.21-150500.55.39.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814875" version="1" comment="dlm-kmp-64kb is &lt;5.14.21-150500.55.39.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814876" version="1" comment="dlm-kmp-default is &lt;5.14.21-150500.55.39.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814877" version="1" comment="dtb-allwinner is &lt;5.14.21-150500.55.39.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814878" version="1" comment="dtb-altera is &lt;5.14.21-150500.55.39.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814879" version="1" comment="dtb-amazon is &lt;5.14.21-150500.55.39.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814880" version="1" comment="dtb-amd is &lt;5.14.21-150500.55.39.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814881" version="1" comment="dtb-amlogic is &lt;5.14.21-150500.55.39.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814882" version="1" comment="dtb-apm is &lt;5.14.21-150500.55.39.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814883" version="1" comment="dtb-apple is &lt;5.14.21-150500.55.39.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814884" version="1" comment="dtb-arm is &lt;5.14.21-150500.55.39.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814885" version="1" comment="dtb-broadcom is &lt;5.14.21-150500.55.39.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814886" version="1" comment="dtb-cavium is &lt;5.14.21-150500.55.39.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814887" version="1" comment="dtb-exynos is &lt;5.14.21-150500.55.39.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814888" version="1" comment="dtb-freescale is &lt;5.14.21-150500.55.39.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814889" version="1" comment="dtb-hisilicon is &lt;5.14.21-150500.55.39.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814890" version="1" comment="dtb-lg is &lt;5.14.21-150500.55.39.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814891" version="1" comment="dtb-marvell is &lt;5.14.21-150500.55.39.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814892" version="1" comment="dtb-mediatek is &lt;5.14.21-150500.55.39.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814893" version="1" comment="dtb-nvidia is &lt;5.14.21-150500.55.39.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814894" version="1" comment="dtb-qcom is &lt;5.14.21-150500.55.39.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814895" version="1" comment="dtb-renesas is &lt;5.14.21-150500.55.39.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814896" version="1" comment="dtb-rockchip is &lt;5.14.21-150500.55.39.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814897" version="1" comment="dtb-socionext is &lt;5.14.21-150500.55.39.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814898" version="1" comment="dtb-sprd is &lt;5.14.21-150500.55.39.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814899" version="1" comment="dtb-xilinx is &lt;5.14.21-150500.55.39.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814900" version="1" comment="gfs2-kmp-64kb is &lt;5.14.21-150500.55.39.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814901" version="1" comment="gfs2-kmp-default is &lt;5.14.21-150500.55.39.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814902" version="1" comment="kernel-64kb is &lt;5.14.21-150500.55.39.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814903" version="1" comment="kernel-64kb-devel is &lt;5.14.21-150500.55.39.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814904" version="1" comment="kernel-64kb-extra is &lt;5.14.21-150500.55.39.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814905" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.14.21-150500.55.39.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814906" version="1" comment="kernel-64kb-optional is &lt;5.14.21-150500.55.39.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814907" version="1" comment="kernel-debug is &lt;5.14.21-150500.55.39.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814908" version="1" comment="kernel-debug-devel is &lt;5.14.21-150500.55.39.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814909" version="1" comment="kernel-debug-livepatch-devel is &lt;5.14.21-150500.55.39.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814910" version="1" comment="kernel-debug-vdso is &lt;5.14.21-150500.55.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814911" version="1" comment="kernel-default is &lt;5.14.21-150500.55.39.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814912" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.39.1.150500.6.17.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814913" version="1" comment="kernel-default-base-rebuild is &lt;5.14.21-150500.55.39.1.150500.6.17.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814914" version="1" comment="kernel-default-devel is &lt;5.14.21-150500.55.39.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814915" version="1" comment="kernel-default-extra is &lt;5.14.21-150500.55.39.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814916" version="1" comment="kernel-default-livepatch is &lt;5.14.21-150500.55.39.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814917" version="1" comment="kernel-default-livepatch-devel is &lt;5.14.21-150500.55.39.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814918" version="1" comment="kernel-default-optional is &lt;5.14.21-150500.55.39.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814919" version="1" comment="kernel-default-vdso is &lt;5.14.21-150500.55.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814920" version="1" comment="kernel-devel is &lt;5.14.21-150500.55.39.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814921" version="1" comment="kernel-docs is &lt;5.14.21-150500.55.39.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814922" version="1" comment="kernel-docs-html is &lt;5.14.21-150500.55.39.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814923" version="1" comment="kernel-kvmsmall is &lt;5.14.21-150500.55.39.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814924" version="1" comment="kernel-kvmsmall-devel is &lt;5.14.21-150500.55.39.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814925" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.14.21-150500.55.39.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814926" version="1" comment="kernel-kvmsmall-vdso is &lt;5.14.21-150500.55.39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814927" version="1" comment="kernel-macros is &lt;5.14.21-150500.55.39.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814928" version="1" comment="kernel-obs-build is &lt;5.14.21-150500.55.39.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814929" version="1" comment="kernel-obs-qa is &lt;5.14.21-150500.55.39.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814930" version="1" comment="kernel-source is &lt;5.14.21-150500.55.39.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814931" version="1" comment="kernel-source-vanilla is &lt;5.14.21-150500.55.39.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814932" version="1" comment="kernel-syms is &lt;5.14.21-150500.55.39.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814933" version="1" comment="kernel-zfcpdump is &lt;5.14.21-150500.55.39.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814934" version="1" comment="kselftests-kmp-64kb is &lt;5.14.21-150500.55.39.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814935" version="1" comment="kselftests-kmp-default is &lt;5.14.21-150500.55.39.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814936" version="1" comment="ocfs2-kmp-64kb is &lt;5.14.21-150500.55.39.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814937" version="1" comment="ocfs2-kmp-default is &lt;5.14.21-150500.55.39.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814938" version="1" comment="reiserfs-kmp-64kb is &lt;5.14.21-150500.55.39.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814939" version="1" comment="reiserfs-kmp-default is &lt;5.14.21-150500.55.39.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815422" version="1" comment="cluster-md-kmp-rt is &lt;5.14.21-150500.13.27.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815423" version="1" comment="dlm-kmp-rt is &lt;5.14.21-150500.13.27.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815424" version="1" comment="gfs2-kmp-rt is &lt;5.14.21-150500.13.27.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815425" version="1" comment="kernel-devel-rt is &lt;5.14.21-150500.13.27.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815426" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.27.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815427" version="1" comment="kernel-rt-devel is &lt;5.14.21-150500.13.27.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815428" version="1" comment="kernel-rt-extra is &lt;5.14.21-150500.13.27.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815429" version="1" comment="kernel-rt-livepatch is &lt;5.14.21-150500.13.27.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815430" version="1" comment="kernel-rt-livepatch-devel is &lt;5.14.21-150500.13.27.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815431" version="1" comment="kernel-rt-optional is &lt;5.14.21-150500.13.27.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815432" version="1" comment="kernel-rt-vdso is &lt;5.14.21-150500.13.27.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815433" version="1" comment="kernel-rt_debug is &lt;5.14.21-150500.13.27.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815434" version="1" comment="kernel-rt_debug-devel is &lt;5.14.21-150500.13.27.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815435" version="1" comment="kernel-rt_debug-livepatch-devel is &lt;5.14.21-150500.13.27.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815436" version="1" comment="kernel-rt_debug-vdso is &lt;5.14.21-150500.13.27.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815437" version="1" comment="kernel-source-rt is &lt;5.14.21-150500.13.27.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815438" version="1" comment="kernel-syms-rt is &lt;5.14.21-150500.13.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815439" version="1" comment="kselftests-kmp-rt is &lt;5.14.21-150500.13.27.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815440" version="1" comment="ocfs2-kmp-rt is &lt;5.14.21-150500.13.27.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815441" version="1" comment="reiserfs-kmp-rt is &lt;5.14.21-150500.13.27.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815442" version="1" comment="cluster-md-kmp-azure is &lt;5.14.21-150500.33.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815443" version="1" comment="dlm-kmp-azure is &lt;5.14.21-150500.33.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815444" version="1" comment="gfs2-kmp-azure is &lt;5.14.21-150500.33.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815445" version="1" comment="kernel-azure is &lt;5.14.21-150500.33.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815446" version="1" comment="kernel-azure-devel is &lt;5.14.21-150500.33.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815447" version="1" comment="kernel-azure-extra is &lt;5.14.21-150500.33.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815448" version="1" comment="kernel-azure-livepatch-devel is &lt;5.14.21-150500.33.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815449" version="1" comment="kernel-azure-optional is &lt;5.14.21-150500.33.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815450" version="1" comment="kernel-azure-vdso is &lt;5.14.21-150500.33.26.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815451" version="1" comment="kernel-devel-azure is &lt;5.14.21-150500.33.26.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815452" version="1" comment="kernel-source-azure is &lt;5.14.21-150500.33.26.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815453" version="1" comment="kernel-syms-azure is &lt;5.14.21-150500.33.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815454" version="1" comment="kselftests-kmp-azure is &lt;5.14.21-150500.33.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815455" version="1" comment="ocfs2-kmp-azure is &lt;5.14.21-150500.33.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815456" version="1" comment="reiserfs-kmp-azure is &lt;5.14.21-150500.33.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816162" version="1" comment="xorg-x11-server is &lt;21.1.4-150500.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816163" version="1" comment="xorg-x11-server-Xvfb is &lt;21.1.4-150500.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816164" version="1" comment="xorg-x11-server-extra is &lt;21.1.4-150500.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816165" version="1" comment="xorg-x11-server-sdk is &lt;21.1.4-150500.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816166" version="1" comment="xorg-x11-server-source is &lt;21.1.4-150500.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816167" version="1" comment="xwayland is &lt;22.1.5-150500.7.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816168" version="1" comment="xwayland-devel is &lt;22.1.5-150500.7.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815717" version="1" comment="WebKitGTK-4.0-lang is &lt;2.42.3-150400.4.67.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815718" version="1" comment="WebKitGTK-4.1-lang is &lt;2.42.3-150400.4.67.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815719" version="1" comment="WebKitGTK-6.0-lang is &lt;2.42.3-150400.4.67.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815720" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815721" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.42.3-150400.4.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815722" version="1" comment="libjavascriptcoregtk-4_1-0 is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815723" version="1" comment="libjavascriptcoregtk-4_1-0-32bit is &lt;2.42.3-150400.4.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815724" version="1" comment="libjavascriptcoregtk-6_0-1 is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815725" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815726" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.42.3-150400.4.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815727" version="1" comment="libwebkit2gtk-4_1-0 is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815728" version="1" comment="libwebkit2gtk-4_1-0-32bit is &lt;2.42.3-150400.4.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815729" version="1" comment="libwebkitgtk-6_0-4 is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815730" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815731" version="1" comment="typelib-1_0-JavaScriptCore-4_1 is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815732" version="1" comment="typelib-1_0-JavaScriptCore-6_0 is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815733" version="1" comment="typelib-1_0-WebKit-6_0 is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815734" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815735" version="1" comment="typelib-1_0-WebKit2-4_1 is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815736" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815737" version="1" comment="typelib-1_0-WebKit2WebExtension-4_1 is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815738" version="1" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815739" version="1" comment="webkit-jsc-4 is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815740" version="1" comment="webkit-jsc-4.1 is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815741" version="1" comment="webkit-jsc-6.0 is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815742" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815743" version="1" comment="webkit2gtk-4_1-injected-bundles is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815744" version="1" comment="webkit2gtk3-devel is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815745" version="1" comment="webkit2gtk3-minibrowser is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815746" version="1" comment="webkit2gtk3-soup2-devel is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815747" version="1" comment="webkit2gtk3-soup2-minibrowser is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815748" version="1" comment="webkit2gtk4-devel is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815749" version="1" comment="webkit2gtk4-minibrowser is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815750" version="1" comment="webkitgtk-6_0-injected-bundles is &lt;2.42.3-150400.4.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813785" version="1" comment="python311-cryptography is &lt;41.0.3-150400.16.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813786" version="1" comment="python3-cryptography is &lt;3.3.2-150400.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815947" version="1" comment="tracker-miner-files is &lt;3.2.2-150400.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815948" version="1" comment="tracker-miners is &lt;3.2.2-150400.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815949" version="1" comment="tracker-miners-lang is &lt;3.2.2-150400.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815409" version="1" comment="libtiff-devel is &lt;4.0.9-150000.45.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815410" version="1" comment="libtiff-devel-32bit is &lt;4.0.9-150000.45.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815411" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815412" version="1" comment="libtiff5-32bit is &lt;4.0.9-150000.45.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815413" version="1" comment="tiff is &lt;4.0.9-150000.45.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809860" version="1" comment="cosign is &lt;2.2.1-150400.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816148" version="1" comment="libncurses5 is &lt;6.1-150000.5.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816149" version="1" comment="libncurses5-32bit is &lt;6.1-150000.5.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816150" version="1" comment="libncurses6 is &lt;6.1-150000.5.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816151" version="1" comment="libncurses6-32bit is &lt;6.1-150000.5.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816152" version="1" comment="ncurses-devel is &lt;6.1-150000.5.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816153" version="1" comment="ncurses-devel-32bit is &lt;6.1-150000.5.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816154" version="1" comment="ncurses-utils is &lt;6.1-150000.5.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816155" version="1" comment="ncurses5-devel is &lt;6.1-150000.5.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816156" version="1" comment="ncurses5-devel-32bit is &lt;6.1-150000.5.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816157" version="1" comment="tack is &lt;6.1-150000.5.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816158" version="1" comment="terminfo is &lt;6.1-150000.5.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816159" version="1" comment="terminfo-base is &lt;6.1-150000.5.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816160" version="1" comment="terminfo-iterm is &lt;6.1-150000.5.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816161" version="1" comment="terminfo-screen is &lt;6.1-150000.5.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810845" version="1" comment="freerdp is &lt;2.4.0-150400.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810846" version="1" comment="freerdp-devel is &lt;2.4.0-150400.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810847" version="1" comment="freerdp-proxy is &lt;2.4.0-150400.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810848" version="1" comment="freerdp-server is &lt;2.4.0-150400.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810849" version="1" comment="freerdp-wayland is &lt;2.4.0-150400.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810850" version="1" comment="libfreerdp2 is &lt;2.4.0-150400.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810851" version="1" comment="libuwac0-0 is &lt;2.4.0-150400.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810852" version="1" comment="libwinpr2 is &lt;2.4.0-150400.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810853" version="1" comment="uwac0-0-devel is &lt;2.4.0-150400.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810854" version="1" comment="winpr2-devel is &lt;2.4.0-150400.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816746" version="1" comment="libsass-3_6_5-1 is &lt;3.6.5-150200.4.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816747" version="1" comment="libsass-devel is &lt;3.6.5-150200.4.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814835" version="1" comment="avahi is &lt;0.8-150400.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814836" version="1" comment="avahi-autoipd is &lt;0.8-150400.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814837" version="1" comment="avahi-compat-howl-devel is &lt;0.8-150400.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814838" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.8-150400.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814839" version="1" comment="avahi-lang is &lt;0.8-150400.7.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814840" version="1" comment="avahi-utils is &lt;0.8-150400.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814841" version="1" comment="avahi-utils-gtk is &lt;0.8-150400.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814842" version="1" comment="libavahi-client3 is &lt;0.8-150400.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814843" version="1" comment="libavahi-client3-32bit is &lt;0.8-150400.7.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814844" version="1" comment="libavahi-common3 is &lt;0.8-150400.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814845" version="1" comment="libavahi-common3-32bit is &lt;0.8-150400.7.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814846" version="1" comment="libavahi-core7 is &lt;0.8-150400.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814847" version="1" comment="libavahi-devel is &lt;0.8-150400.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814848" version="1" comment="libavahi-glib-devel is &lt;0.8-150400.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814849" version="1" comment="libavahi-glib1 is &lt;0.8-150400.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814850" version="1" comment="libavahi-glib1-32bit is &lt;0.8-150400.7.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814851" version="1" comment="libavahi-gobject-devel is &lt;0.8-150400.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814852" version="1" comment="libavahi-gobject0 is &lt;0.8-150400.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814853" version="1" comment="libavahi-libevent1 is &lt;0.8-150400.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814854" version="1" comment="libavahi-qt5-1 is &lt;0.8-150400.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814855" version="1" comment="libavahi-qt5-devel is &lt;0.8-150400.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814856" version="1" comment="libavahi-ui-gtk3-0 is &lt;0.8-150400.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814857" version="1" comment="libdns_sd is &lt;0.8-150400.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814858" version="1" comment="libdns_sd-32bit is &lt;0.8-150400.7.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814859" version="1" comment="libhowl0 is &lt;0.8-150400.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814860" version="1" comment="python3-avahi is &lt;0.8-150400.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814861" version="1" comment="python3-avahi-gtk is &lt;0.8-150400.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814862" version="1" comment="typelib-1_0-Avahi-0_6 is &lt;0.8-150400.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816827" version="1" comment="openssh is &lt;8.4p1-150300.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816828" version="1" comment="openssh-askpass-gnome is &lt;8.4p1-150300.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816829" version="1" comment="openssh-cavs is &lt;8.4p1-150300.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816830" version="1" comment="openssh-clients is &lt;8.4p1-150300.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816831" version="1" comment="openssh-common is &lt;8.4p1-150300.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816832" version="1" comment="openssh-fips is &lt;8.4p1-150300.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816833" version="1" comment="openssh-helpers is &lt;8.4p1-150300.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816834" version="1" comment="openssh-server is &lt;8.4p1-150300.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812203" version="1" comment="python-aiohttp-doc is &lt;3.6.0-150100.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812204" version="1" comment="python3-aiohttp is &lt;3.6.0-150100.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815955" version="1" comment="ghostscript is &lt;9.52-150000.177.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815956" version="1" comment="ghostscript-devel is &lt;9.52-150000.177.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815957" version="1" comment="ghostscript-x11 is &lt;9.52-150000.177.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816493" version="1" comment="xorg-x11-server is &lt;21.1.4-150500.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816494" version="1" comment="xorg-x11-server-Xvfb is &lt;21.1.4-150500.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816495" version="1" comment="xorg-x11-server-extra is &lt;21.1.4-150500.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816496" version="1" comment="xorg-x11-server-sdk is &lt;21.1.4-150500.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816497" version="1" comment="xorg-x11-server-source is &lt;21.1.4-150500.7.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816835" version="1" comment="MozillaFirefox is &lt;115.6.0-150200.152.120.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816836" version="1" comment="MozillaFirefox-branding-upstream is &lt;115.6.0-150200.152.120.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816837" version="1" comment="MozillaFirefox-devel is &lt;115.6.0-150200.152.120.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816838" version="1" comment="MozillaFirefox-translations-common is &lt;115.6.0-150200.152.120.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816839" version="1" comment="MozillaFirefox-translations-other is &lt;115.6.0-150200.152.120.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816498" version="1" comment="go1.20-openssl is &lt;1.20.12.1-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816499" version="1" comment="go1.20-openssl-doc is &lt;1.20.12.1-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816500" version="1" comment="go1.20-openssl-race is &lt;1.20.12.1-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816501" version="1" comment="go1.21-openssl is &lt;1.21.5.1-150000.1.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816502" version="1" comment="go1.21-openssl-doc is &lt;1.21.5.1-150000.1.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816503" version="1" comment="go1.21-openssl-race is &lt;1.21.5.1-150000.1.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817537" version="1" comment="libreoffice is &lt;7.6.2.1-150400.17.20.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817538" version="1" comment="libreoffice-base is &lt;7.6.2.1-150400.17.20.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817539" version="1" comment="libreoffice-base-drivers-postgresql is &lt;7.6.2.1-150400.17.20.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817540" version="1" comment="libreoffice-branding-upstream is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817541" version="1" comment="libreoffice-calc is &lt;7.6.2.1-150400.17.20.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817542" version="1" comment="libreoffice-calc-extensions is &lt;7.6.2.1-150400.17.20.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817543" version="1" comment="libreoffice-draw is &lt;7.6.2.1-150400.17.20.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817544" version="1" comment="libreoffice-filters-optional is &lt;7.6.2.1-150400.17.20.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817545" version="1" comment="libreoffice-gdb-pretty-printers is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817546" version="1" comment="libreoffice-glade is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817547" version="1" comment="libreoffice-gnome is &lt;7.6.2.1-150400.17.20.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817548" version="1" comment="libreoffice-gtk3 is &lt;7.6.2.1-150400.17.20.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817549" version="1" comment="libreoffice-icon-themes is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817550" version="1" comment="libreoffice-impress is &lt;7.6.2.1-150400.17.20.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817551" version="1" comment="libreoffice-l10n-af is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817552" version="1" comment="libreoffice-l10n-am is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817553" version="1" comment="libreoffice-l10n-ar is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817554" version="1" comment="libreoffice-l10n-as is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817555" version="1" comment="libreoffice-l10n-ast is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817556" version="1" comment="libreoffice-l10n-be is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817557" version="1" comment="libreoffice-l10n-bg is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817558" version="1" comment="libreoffice-l10n-bn is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817559" version="1" comment="libreoffice-l10n-bn_IN is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817560" version="1" comment="libreoffice-l10n-bo is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817561" version="1" comment="libreoffice-l10n-br is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817562" version="1" comment="libreoffice-l10n-brx is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817563" version="1" comment="libreoffice-l10n-bs is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817564" version="1" comment="libreoffice-l10n-ca is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817565" version="1" comment="libreoffice-l10n-ca_valencia is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817566" version="1" comment="libreoffice-l10n-ckb is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817567" version="1" comment="libreoffice-l10n-cs is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817568" version="1" comment="libreoffice-l10n-cy is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817569" version="1" comment="libreoffice-l10n-da is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817570" version="1" comment="libreoffice-l10n-de is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817571" version="1" comment="libreoffice-l10n-dgo is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817572" version="1" comment="libreoffice-l10n-dsb is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817573" version="1" comment="libreoffice-l10n-dz is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817574" version="1" comment="libreoffice-l10n-el is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817575" version="1" comment="libreoffice-l10n-en is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817576" version="1" comment="libreoffice-l10n-en_GB is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817577" version="1" comment="libreoffice-l10n-en_ZA is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817578" version="1" comment="libreoffice-l10n-eo is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817579" version="1" comment="libreoffice-l10n-es is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817580" version="1" comment="libreoffice-l10n-et is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817581" version="1" comment="libreoffice-l10n-eu is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817582" version="1" comment="libreoffice-l10n-fa is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817583" version="1" comment="libreoffice-l10n-fi is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817584" version="1" comment="libreoffice-l10n-fr is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817585" version="1" comment="libreoffice-l10n-fur is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817586" version="1" comment="libreoffice-l10n-fy is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817587" version="1" comment="libreoffice-l10n-ga is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817588" version="1" comment="libreoffice-l10n-gd is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817589" version="1" comment="libreoffice-l10n-gl is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817590" version="1" comment="libreoffice-l10n-gu is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817591" version="1" comment="libreoffice-l10n-gug is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817592" version="1" comment="libreoffice-l10n-he is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817593" version="1" comment="libreoffice-l10n-hi is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817594" version="1" comment="libreoffice-l10n-hr is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817595" version="1" comment="libreoffice-l10n-hsb is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817596" version="1" comment="libreoffice-l10n-hu is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817597" version="1" comment="libreoffice-l10n-id is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817598" version="1" comment="libreoffice-l10n-is is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817599" version="1" comment="libreoffice-l10n-it is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817600" version="1" comment="libreoffice-l10n-ja is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817601" version="1" comment="libreoffice-l10n-ka is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817602" version="1" comment="libreoffice-l10n-kab is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817603" version="1" comment="libreoffice-l10n-kk is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817604" version="1" comment="libreoffice-l10n-km is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817605" version="1" comment="libreoffice-l10n-kmr_Latn is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817606" version="1" comment="libreoffice-l10n-kn is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817607" version="1" comment="libreoffice-l10n-ko is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817608" version="1" comment="libreoffice-l10n-kok is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817609" version="1" comment="libreoffice-l10n-ks is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817610" version="1" comment="libreoffice-l10n-lb is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817611" version="1" comment="libreoffice-l10n-lo is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817612" version="1" comment="libreoffice-l10n-lt is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817613" version="1" comment="libreoffice-l10n-lv is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817614" version="1" comment="libreoffice-l10n-mai is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817615" version="1" comment="libreoffice-l10n-mk is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817616" version="1" comment="libreoffice-l10n-ml is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817617" version="1" comment="libreoffice-l10n-mn is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817618" version="1" comment="libreoffice-l10n-mni is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817619" version="1" comment="libreoffice-l10n-mr is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817620" version="1" comment="libreoffice-l10n-my is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817621" version="1" comment="libreoffice-l10n-nb is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817622" version="1" comment="libreoffice-l10n-ne is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817623" version="1" comment="libreoffice-l10n-nl is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817624" version="1" comment="libreoffice-l10n-nn is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817625" version="1" comment="libreoffice-l10n-nr is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817626" version="1" comment="libreoffice-l10n-nso is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817627" version="1" comment="libreoffice-l10n-oc is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817628" version="1" comment="libreoffice-l10n-om is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817629" version="1" comment="libreoffice-l10n-or is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817630" version="1" comment="libreoffice-l10n-pa is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817631" version="1" comment="libreoffice-l10n-pl is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817632" version="1" comment="libreoffice-l10n-pt_BR is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817633" version="1" comment="libreoffice-l10n-pt_PT is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817634" version="1" comment="libreoffice-l10n-ro is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817635" version="1" comment="libreoffice-l10n-ru is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817636" version="1" comment="libreoffice-l10n-rw is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817637" version="1" comment="libreoffice-l10n-sa_IN is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817638" version="1" comment="libreoffice-l10n-sat is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817639" version="1" comment="libreoffice-l10n-sd is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817640" version="1" comment="libreoffice-l10n-si is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817641" version="1" comment="libreoffice-l10n-sid is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817642" version="1" comment="libreoffice-l10n-sk is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817643" version="1" comment="libreoffice-l10n-sl is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817644" version="1" comment="libreoffice-l10n-sq is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817645" version="1" comment="libreoffice-l10n-sr is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817646" version="1" comment="libreoffice-l10n-ss is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817647" version="1" comment="libreoffice-l10n-st is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817648" version="1" comment="libreoffice-l10n-sv is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817649" version="1" comment="libreoffice-l10n-sw_TZ is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817650" version="1" comment="libreoffice-l10n-szl is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817651" version="1" comment="libreoffice-l10n-ta is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817652" version="1" comment="libreoffice-l10n-te is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817653" version="1" comment="libreoffice-l10n-tg is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817654" version="1" comment="libreoffice-l10n-th is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817655" version="1" comment="libreoffice-l10n-tn is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817656" version="1" comment="libreoffice-l10n-tr is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817657" version="1" comment="libreoffice-l10n-ts is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817658" version="1" comment="libreoffice-l10n-tt is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817659" version="1" comment="libreoffice-l10n-ug is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817660" version="1" comment="libreoffice-l10n-uk is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817661" version="1" comment="libreoffice-l10n-uz is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817662" version="1" comment="libreoffice-l10n-ve is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817663" version="1" comment="libreoffice-l10n-vec is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817664" version="1" comment="libreoffice-l10n-vi is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817665" version="1" comment="libreoffice-l10n-xh is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817666" version="1" comment="libreoffice-l10n-zh_CN is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817667" version="1" comment="libreoffice-l10n-zh_TW is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817668" version="1" comment="libreoffice-l10n-zu is &lt;7.6.2.1-150400.17.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817669" version="1" comment="libreoffice-librelogo is &lt;7.6.2.1-150400.17.20.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817670" version="1" comment="libreoffice-mailmerge is &lt;7.6.2.1-150400.17.20.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817671" version="1" comment="libreoffice-math is &lt;7.6.2.1-150400.17.20.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817672" version="1" comment="libreoffice-officebean is &lt;7.6.2.1-150400.17.20.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817673" version="1" comment="libreoffice-pyuno is &lt;7.6.2.1-150400.17.20.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817674" version="1" comment="libreoffice-qt5 is &lt;7.6.2.1-150400.17.20.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817675" version="1" comment="libreoffice-sdk is &lt;7.6.2.1-150400.17.20.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817676" version="1" comment="libreoffice-sdk-doc is &lt;7.6.2.1-150400.17.20.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817677" version="1" comment="libreoffice-writer is &lt;7.6.2.1-150400.17.20.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817678" version="1" comment="libreoffice-writer-extensions is &lt;7.6.2.1-150400.17.20.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817679" version="1" comment="libreofficekit is &lt;7.6.2.1-150400.17.20.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817680" version="1" comment="libreofficekit-devel is &lt;7.6.2.1-150400.17.20.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816491" version="1" comment="xwayland is &lt;22.1.5-150500.7.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816492" version="1" comment="xwayland-devel is &lt;22.1.5-150500.7.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815940" version="1" comment="docker is &lt;24.0.7_ce-150000.190.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815941" version="1" comment="docker-bash-completion is &lt;24.0.7_ce-150000.190.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815942" version="1" comment="docker-fish-completion is &lt;24.0.7_ce-150000.190.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815943" version="1" comment="docker-rootless-extras is &lt;24.0.7_ce-150000.190.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815944" version="1" comment="docker-zsh-completion is &lt;24.0.7_ce-150000.190.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815945" version="1" comment="rootlesskit is &lt;1.1.1-150000.1.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812205" version="1" comment="libwireshark15 is &lt;3.6.19-150000.3.106.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812206" version="1" comment="libwiretap12 is &lt;3.6.19-150000.3.106.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812207" version="1" comment="libwsutil13 is &lt;3.6.19-150000.3.106.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812208" version="1" comment="wireshark is &lt;3.6.19-150000.3.106.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812209" version="1" comment="wireshark-devel is &lt;3.6.19-150000.3.106.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812210" version="1" comment="wireshark-ui-qt is &lt;3.6.19-150000.3.106.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812191" version="1" comment="erlang-rabbitmq-client is &lt;3.8.11-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812192" version="1" comment="rabbitmq-server is &lt;3.8.11-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812193" version="1" comment="rabbitmq-server-plugins is &lt;3.8.11-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817359" version="1" comment="xen is &lt;4.17.3_02-150500.3.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817360" version="1" comment="xen-devel is &lt;4.17.3_02-150500.3.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817361" version="1" comment="xen-doc-html is &lt;4.17.3_02-150500.3.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817362" version="1" comment="xen-libs is &lt;4.17.3_02-150500.3.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817363" version="1" comment="xen-libs-32bit is &lt;4.17.3_02-150500.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817364" version="1" comment="xen-tools is &lt;4.17.3_02-150500.3.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817365" version="1" comment="xen-tools-domU is &lt;4.17.3_02-150500.3.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817366" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.17.3_02-150500.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817527" version="1" comment="libzbar-devel is &lt;0.23.1-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817528" version="1" comment="libzbar0 is &lt;0.23.1-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817529" version="1" comment="libzbar0-32bit is &lt;0.23.1-150300.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817530" version="1" comment="libzbarqt-devel is &lt;0.23.1-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817531" version="1" comment="libzbarqt0 is &lt;0.23.1-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817532" version="1" comment="libzbarqt0-32bit is &lt;0.23.1-150300.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817533" version="1" comment="zbar is &lt;0.23.1-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814625" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814626" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814627" version="1" comment="libQt5Concurrent-devel is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814628" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814629" version="1" comment="libQt5Concurrent5 is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814630" version="1" comment="libQt5Concurrent5-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814631" version="1" comment="libQt5Core-devel is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814632" version="1" comment="libQt5Core-devel-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814633" version="1" comment="libQt5Core-private-headers-devel is &lt;5.15.8+kde185-150500.4.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814634" version="1" comment="libQt5Core5 is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814635" version="1" comment="libQt5Core5-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814636" version="1" comment="libQt5DBus-devel is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814637" version="1" comment="libQt5DBus-devel-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814638" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.15.8+kde185-150500.4.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814639" version="1" comment="libQt5DBus5 is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814640" version="1" comment="libQt5DBus5-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814641" version="1" comment="libQt5Gui-devel is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814642" version="1" comment="libQt5Gui-devel-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814643" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.15.8+kde185-150500.4.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814644" version="1" comment="libQt5Gui5 is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814645" version="1" comment="libQt5Gui5-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814646" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814647" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.15.8+kde185-150500.4.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814648" version="1" comment="libQt5Network-devel is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814649" version="1" comment="libQt5Network-devel-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814650" version="1" comment="libQt5Network-private-headers-devel is &lt;5.15.8+kde185-150500.4.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814651" version="1" comment="libQt5Network5 is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814652" version="1" comment="libQt5Network5-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814653" version="1" comment="libQt5OpenGL-devel is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814654" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814655" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.15.8+kde185-150500.4.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814656" version="1" comment="libQt5OpenGL5 is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814657" version="1" comment="libQt5OpenGL5-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814658" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814659" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814660" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814661" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814662" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814663" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.15.8+kde185-150500.4.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814664" version="1" comment="libQt5PrintSupport-devel is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814665" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814666" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.15.8+kde185-150500.4.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814667" version="1" comment="libQt5PrintSupport5 is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814668" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814669" version="1" comment="libQt5Sql-devel is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814670" version="1" comment="libQt5Sql-devel-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814671" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.15.8+kde185-150500.4.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814672" version="1" comment="libQt5Sql5 is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814673" version="1" comment="libQt5Sql5-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814674" version="1" comment="libQt5Sql5-mysql is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814675" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814676" version="1" comment="libQt5Sql5-postgresql is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814677" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814678" version="1" comment="libQt5Sql5-sqlite is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814679" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814680" version="1" comment="libQt5Sql5-unixODBC is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814681" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814682" version="1" comment="libQt5Test-devel is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814683" version="1" comment="libQt5Test-devel-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814684" version="1" comment="libQt5Test-private-headers-devel is &lt;5.15.8+kde185-150500.4.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814685" version="1" comment="libQt5Test5 is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814686" version="1" comment="libQt5Test5-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814687" version="1" comment="libQt5Widgets-devel is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814688" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814689" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.15.8+kde185-150500.4.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814690" version="1" comment="libQt5Widgets5 is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814691" version="1" comment="libQt5Widgets5-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814692" version="1" comment="libQt5Xml-devel is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814693" version="1" comment="libQt5Xml-devel-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814694" version="1" comment="libQt5Xml5 is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814695" version="1" comment="libQt5Xml5-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814696" version="1" comment="libqt5-qtbase-common-devel is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814697" version="1" comment="libqt5-qtbase-devel is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814698" version="1" comment="libqt5-qtbase-examples is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814699" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.15.8+kde185-150500.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814700" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814701" version="1" comment="libqt5-qtbase-platformtheme-xdgdesktopportal is &lt;5.15.8+kde185-150500.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814702" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.15.8+kde185-150500.4.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817749" version="1" comment="libtinyxml0 is &lt;2.6.2-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817750" version="1" comment="tinyxml-devel is &lt;2.6.2-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817751" version="1" comment="tinyxml-docs is &lt;2.6.2-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817752" version="1" comment="ppp is &lt;2.4.7-150000.5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817753" version="1" comment="ppp-devel is &lt;2.4.7-150000.5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817754" version="1" comment="ppp-modem is &lt;2.4.7-150000.5.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817522" version="1" comment="jbigkit is &lt;2.1-150000.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817523" version="1" comment="libjbig-devel is &lt;2.1-150000.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817524" version="1" comment="libjbig-devel-32bit is &lt;2.1-150000.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817525" version="1" comment="libjbig2 is &lt;2.1-150000.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817526" version="1" comment="libjbig2-32bit is &lt;2.1-150000.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813390" version="1" comment="distribution-registry is &lt;2.8.3-150400.9.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817925" version="1" comment="postfix is &lt;3.7.3-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817926" version="1" comment="postfix-bdb is &lt;3.7.3-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817927" version="1" comment="postfix-bdb-lmdb is &lt;3.7.3-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817928" version="1" comment="postfix-devel is &lt;3.7.3-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817929" version="1" comment="postfix-doc is &lt;3.7.3-150500.3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817930" version="1" comment="postfix-ldap is &lt;3.7.3-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817931" version="1" comment="postfix-mysql is &lt;3.7.3-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817932" version="1" comment="postfix-postgresql is &lt;3.7.3-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814063" version="1" comment="gnutls is &lt;3.7.3-150400.4.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814064" version="1" comment="gnutls-guile is &lt;3.7.3-150400.4.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814065" version="1" comment="libgnutls-devel is &lt;3.7.3-150400.4.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814066" version="1" comment="libgnutls-devel-32bit is &lt;3.7.3-150400.4.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814067" version="1" comment="libgnutls30 is &lt;3.7.3-150400.4.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814068" version="1" comment="libgnutls30-32bit is &lt;3.7.3-150400.4.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814069" version="1" comment="libgnutls30-hmac is &lt;3.7.3-150400.4.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814070" version="1" comment="libgnutls30-hmac-32bit is &lt;3.7.3-150400.4.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814071" version="1" comment="libgnutlsxx-devel is &lt;3.7.3-150400.4.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814072" version="1" comment="libgnutlsxx28 is &lt;3.7.3-150400.4.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009812194" version="1" comment="python311-pip is &lt;22.3.1-150400.17.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851991" version="1" comment="MozillaFirefox is &lt;115.9.1-150200.152.131.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851992" version="1" comment="MozillaFirefox-branding-upstream is &lt;115.9.1-150200.152.131.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851993" version="1" comment="MozillaFirefox-devel is &lt;115.9.1-150200.152.131.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851994" version="1" comment="MozillaFirefox-translations-common is &lt;115.9.1-150200.152.131.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851995" version="1" comment="MozillaFirefox-translations-other is &lt;115.9.1-150200.152.131.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851996" version="1" comment="libpython3_9-1_0 is &lt;3.9.19-150300.4.41.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851997" version="1" comment="libpython3_9-1_0-32bit is &lt;3.9.19-150300.4.41.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851998" version="1" comment="python39 is &lt;3.9.19-150300.4.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851999" version="1" comment="python39-32bit is &lt;3.9.19-150300.4.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852000" version="1" comment="python39-base is &lt;3.9.19-150300.4.41.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852001" version="1" comment="python39-base-32bit is &lt;3.9.19-150300.4.41.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852002" version="1" comment="python39-curses is &lt;3.9.19-150300.4.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852003" version="1" comment="python39-dbm is &lt;3.9.19-150300.4.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852004" version="1" comment="python39-devel is &lt;3.9.19-150300.4.41.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852005" version="1" comment="python39-doc is &lt;3.9.19-150300.4.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852006" version="1" comment="python39-doc-devhelp is &lt;3.9.19-150300.4.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852007" version="1" comment="python39-idle is &lt;3.9.19-150300.4.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852008" version="1" comment="python39-testsuite is &lt;3.9.19-150300.4.41.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852009" version="1" comment="python39-tk is &lt;3.9.19-150300.4.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852010" version="1" comment="python39-tools is &lt;3.9.19-150300.4.41.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852011" version="1" comment="avahi is &lt;0.8-150400.7.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852012" version="1" comment="avahi-autoipd is &lt;0.8-150400.7.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852013" version="1" comment="avahi-compat-howl-devel is &lt;0.8-150400.7.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852014" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.8-150400.7.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852015" version="1" comment="avahi-lang is &lt;0.8-150400.7.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852016" version="1" comment="avahi-utils is &lt;0.8-150400.7.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852017" version="1" comment="avahi-utils-gtk is &lt;0.8-150400.7.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852018" version="1" comment="libavahi-client3 is &lt;0.8-150400.7.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852019" version="1" comment="libavahi-client3-32bit is &lt;0.8-150400.7.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852020" version="1" comment="libavahi-common3 is &lt;0.8-150400.7.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852021" version="1" comment="libavahi-common3-32bit is &lt;0.8-150400.7.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852022" version="1" comment="libavahi-core7 is &lt;0.8-150400.7.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852023" version="1" comment="libavahi-devel is &lt;0.8-150400.7.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852024" version="1" comment="libavahi-glib-devel is &lt;0.8-150400.7.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852025" version="1" comment="libavahi-glib1 is &lt;0.8-150400.7.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852026" version="1" comment="libavahi-glib1-32bit is &lt;0.8-150400.7.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852027" version="1" comment="libavahi-gobject-devel is &lt;0.8-150400.7.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852028" version="1" comment="libavahi-gobject0 is &lt;0.8-150400.7.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852029" version="1" comment="libavahi-libevent1 is &lt;0.8-150400.7.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852030" version="1" comment="libavahi-qt5-1 is &lt;0.8-150400.7.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852031" version="1" comment="libavahi-qt5-devel is &lt;0.8-150400.7.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852032" version="1" comment="libavahi-ui-gtk3-0 is &lt;0.8-150400.7.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852033" version="1" comment="libdns_sd is &lt;0.8-150400.7.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852034" version="1" comment="libdns_sd-32bit is &lt;0.8-150400.7.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852035" version="1" comment="libhowl0 is &lt;0.8-150400.7.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852036" version="1" comment="python3-avahi is &lt;0.8-150400.7.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852037" version="1" comment="python3-avahi-gtk is &lt;0.8-150400.7.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852038" version="1" comment="typelib-1_0-Avahi-0_6 is &lt;0.8-150400.7.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819231" version="1" comment="ruby2.5-rubygem-actionpack-5_1 is &lt;5.1.4-150000.3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819232" version="1" comment="ruby2.5-rubygem-actionpack-doc-5_1 is &lt;5.1.4-150000.3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852406" version="1" comment="PackageKit is &lt;1.2.4-150400.3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852407" version="1" comment="PackageKit-backend-dnf is &lt;1.2.4-150400.3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852408" version="1" comment="PackageKit-backend-zypp is &lt;1.2.4-150400.3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852409" version="1" comment="PackageKit-branding-upstream is &lt;1.2.4-150400.3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852410" version="1" comment="PackageKit-devel is &lt;1.2.4-150400.3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852411" version="1" comment="PackageKit-gstreamer-plugin is &lt;1.2.4-150400.3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852412" version="1" comment="PackageKit-gtk3-module is &lt;1.2.4-150400.3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852413" version="1" comment="PackageKit-lang is &lt;1.2.4-150400.3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852414" version="1" comment="libpackagekit-glib2-18 is &lt;1.2.4-150400.3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852415" version="1" comment="libpackagekit-glib2-18-32bit is &lt;1.2.4-150400.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852416" version="1" comment="libpackagekit-glib2-devel is &lt;1.2.4-150400.3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852417" version="1" comment="libpackagekit-glib2-devel-32bit is &lt;1.2.4-150400.3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852418" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;1.2.4-150400.3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852614" version="1" comment="python3-python-qpid-proton is &lt;0.38.0-150000.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852615" version="1" comment="qpid-proton-devel is &lt;0.38.0-150000.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852616" version="1" comment="qpid-proton-devel-doc is &lt;0.38.0-150000.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852664" version="1" comment="netty is &lt;4.1.108-150200.4.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852665" version="1" comment="netty-javadoc is &lt;4.1.108-150200.4.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852666" version="1" comment="netty-poms is &lt;4.1.108-150200.4.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852667" version="1" comment="netty-tcnative is &lt;2.0.65-150200.3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852668" version="1" comment="netty-tcnative-javadoc is &lt;2.0.65-150200.3.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852669" version="1" comment="perl-DBD-SQLite is &lt;1.66-150300.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819599" version="1" comment="xorg-x11-server is &lt;21.1.4-150500.7.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819600" version="1" comment="xorg-x11-server-Xvfb is &lt;21.1.4-150500.7.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819601" version="1" comment="xorg-x11-server-extra is &lt;21.1.4-150500.7.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819602" version="1" comment="xorg-x11-server-sdk is &lt;21.1.4-150500.7.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819603" version="1" comment="xorg-x11-server-source is &lt;21.1.4-150500.7.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852723" version="1" comment="libvirt is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852724" version="1" comment="libvirt-client is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852725" version="1" comment="libvirt-client-qemu is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852726" version="1" comment="libvirt-daemon is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852727" version="1" comment="libvirt-daemon-config-network is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852728" version="1" comment="libvirt-daemon-config-nwfilter is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852729" version="1" comment="libvirt-daemon-driver-interface is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852730" version="1" comment="libvirt-daemon-driver-libxl is &lt;9.0.0-150500.6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852731" version="1" comment="libvirt-daemon-driver-lxc is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852732" version="1" comment="libvirt-daemon-driver-network is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852733" version="1" comment="libvirt-daemon-driver-nodedev is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852734" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852735" version="1" comment="libvirt-daemon-driver-qemu is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852736" version="1" comment="libvirt-daemon-driver-secret is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852737" version="1" comment="libvirt-daemon-driver-storage is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852738" version="1" comment="libvirt-daemon-driver-storage-core is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852739" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852740" version="1" comment="libvirt-daemon-driver-storage-gluster is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852741" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852742" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852743" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852744" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852745" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;9.0.0-150500.6.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852746" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852747" version="1" comment="libvirt-daemon-hooks is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852748" version="1" comment="libvirt-daemon-lxc is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852749" version="1" comment="libvirt-daemon-qemu is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852750" version="1" comment="libvirt-daemon-xen is &lt;9.0.0-150500.6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852751" version="1" comment="libvirt-devel is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852752" version="1" comment="libvirt-devel-32bit is &lt;9.0.0-150500.6.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852753" version="1" comment="libvirt-doc is &lt;9.0.0-150500.6.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852754" version="1" comment="libvirt-libs is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852755" version="1" comment="libvirt-lock-sanlock is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852756" version="1" comment="libvirt-nss is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852757" version="1" comment="wireshark-plugin-libvirt is &lt;9.0.0-150500.6.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852758" version="1" comment="xen is &lt;4.17.3_08-150500.3.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852759" version="1" comment="xen-devel is &lt;4.17.3_08-150500.3.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852760" version="1" comment="xen-doc-html is &lt;4.17.3_08-150500.3.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852761" version="1" comment="xen-libs is &lt;4.17.3_08-150500.3.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852762" version="1" comment="xen-libs-32bit is &lt;4.17.3_08-150500.3.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852763" version="1" comment="xen-tools is &lt;4.17.3_08-150500.3.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852764" version="1" comment="xen-tools-domU is &lt;4.17.3_08-150500.3.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852765" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.17.3_08-150500.3.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852766" version="1" comment="qemu is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852767" version="1" comment="qemu-SLOF is &lt;7.1.0-150500.49.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852768" version="1" comment="qemu-accel-qtest is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852769" version="1" comment="qemu-accel-tcg-x86 is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852770" version="1" comment="qemu-arm is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852771" version="1" comment="qemu-audio-alsa is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852772" version="1" comment="qemu-audio-dbus is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852773" version="1" comment="qemu-audio-jack is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852774" version="1" comment="qemu-audio-pa is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852775" version="1" comment="qemu-audio-spice is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852776" version="1" comment="qemu-block-curl is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852777" version="1" comment="qemu-block-dmg is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852778" version="1" comment="qemu-block-gluster is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852779" version="1" comment="qemu-block-iscsi is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852780" version="1" comment="qemu-block-nfs is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852781" version="1" comment="qemu-block-rbd is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852782" version="1" comment="qemu-block-ssh is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852783" version="1" comment="qemu-chardev-baum is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852784" version="1" comment="qemu-chardev-spice is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852785" version="1" comment="qemu-extra is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852786" version="1" comment="qemu-guest-agent is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852787" version="1" comment="qemu-hw-display-qxl is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852788" version="1" comment="qemu-hw-display-virtio-gpu is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852789" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852790" version="1" comment="qemu-hw-display-virtio-vga is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852791" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852792" version="1" comment="qemu-hw-usb-host is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852793" version="1" comment="qemu-hw-usb-redirect is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852794" version="1" comment="qemu-hw-usb-smartcard is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852795" version="1" comment="qemu-ipxe is &lt;1.0.0+-150500.49.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852796" version="1" comment="qemu-ivshmem-tools is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852797" version="1" comment="qemu-ksm is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852798" version="1" comment="qemu-kvm is &lt;7.1.0-150500.49.12.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852799" version="1" comment="qemu-lang is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852800" version="1" comment="qemu-microvm is &lt;7.1.0-150500.49.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852801" version="1" comment="qemu-ppc is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852802" version="1" comment="qemu-s390x is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852803" version="1" comment="qemu-seabios is &lt;1.16.0_0_gd239552-150500.49.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852804" version="1" comment="qemu-sgabios is &lt;8-150500.49.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852805" version="1" comment="qemu-skiboot is &lt;7.1.0-150500.49.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852806" version="1" comment="qemu-tools is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852807" version="1" comment="qemu-ui-curses is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852808" version="1" comment="qemu-ui-dbus is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852809" version="1" comment="qemu-ui-gtk is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852810" version="1" comment="qemu-ui-opengl is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852811" version="1" comment="qemu-ui-spice-app is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852812" version="1" comment="qemu-ui-spice-core is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852813" version="1" comment="qemu-vgabios is &lt;1.16.0_0_gd239552-150500.49.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852814" version="1" comment="qemu-vhost-user-gpu is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852815" version="1" comment="qemu-x86 is &lt;7.1.0-150500.49.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853175" version="1" comment="squid is &lt;5.7-150400.3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853252" version="1" comment="gpars-bootstrap is &lt;1.2.1-150200.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853253" version="1" comment="gradle is &lt;4.4.1-150200.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853254" version="1" comment="gradle-bootstrap is &lt;4.4.1-150200.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853255" version="1" comment="groovy-bootstrap is &lt;2.4.21-150200.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853256" version="1" comment="go1.22 is &lt;1.22.2-150000.1.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853257" version="1" comment="go1.22-doc is &lt;1.22.2-150000.1.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853258" version="1" comment="go1.22-race is &lt;1.22.2-150000.1.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853259" version="1" comment="go1.21 is &lt;1.21.9-150000.1.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853260" version="1" comment="go1.21-doc is &lt;1.21.9-150000.1.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853261" version="1" comment="go1.21-race is &lt;1.21.9-150000.1.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853305" version="1" comment="expat is &lt;2.4.4-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853306" version="1" comment="libexpat-devel is &lt;2.4.4-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853307" version="1" comment="libexpat-devel-32bit is &lt;2.4.4-150400.3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853308" version="1" comment="libexpat1 is &lt;2.4.4-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853309" version="1" comment="libexpat1-32bit is &lt;2.4.4-150400.3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853310" version="1" comment="libncurses5 is &lt;6.1-150000.5.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853311" version="1" comment="libncurses5-32bit is &lt;6.1-150000.5.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853312" version="1" comment="libncurses6 is &lt;6.1-150000.5.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853313" version="1" comment="libncurses6-32bit is &lt;6.1-150000.5.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853314" version="1" comment="ncurses-devel is &lt;6.1-150000.5.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853315" version="1" comment="ncurses-devel-32bit is &lt;6.1-150000.5.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853316" version="1" comment="ncurses-utils is &lt;6.1-150000.5.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853317" version="1" comment="ncurses5-devel is &lt;6.1-150000.5.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853318" version="1" comment="ncurses5-devel-32bit is &lt;6.1-150000.5.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853319" version="1" comment="tack is &lt;6.1-150000.5.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853320" version="1" comment="terminfo is &lt;6.1-150000.5.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853321" version="1" comment="terminfo-base is &lt;6.1-150000.5.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853322" version="1" comment="terminfo-iterm is &lt;6.1-150000.5.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853323" version="1" comment="terminfo-screen is &lt;6.1-150000.5.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853324" version="1" comment="c-ares-devel is &lt;1.19.1-150000.3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853325" version="1" comment="c-ares-utils is &lt;1.19.1-150000.3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853326" version="1" comment="libcares2 is &lt;1.19.1-150000.3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853327" version="1" comment="libcares2-32bit is &lt;1.19.1-150000.3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853328" version="1" comment="helm is &lt;3.13.3-150000.1.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853329" version="1" comment="helm-bash-completion is &lt;3.13.3-150000.1.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853330" version="1" comment="helm-fish-completion is &lt;3.13.3-150000.1.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853331" version="1" comment="helm-zsh-completion is &lt;3.13.3-150000.1.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853332" version="1" comment="ucode-intel is &lt;20240312-150200.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819604" version="1" comment="xwayland is &lt;22.1.5-150500.7.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819605" version="1" comment="xwayland-devel is &lt;22.1.5-150500.7.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853333" version="1" comment="buildah is &lt;1.34.1-150500.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853334" version="1" comment="podman is &lt;4.8.3-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853335" version="1" comment="podman-docker is &lt;4.8.3-150500.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853336" version="1" comment="podman-remote is &lt;4.8.3-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853337" version="1" comment="podmansh is &lt;4.8.3-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853338" version="1" comment="MozillaThunderbird is &lt;115.9.0-150200.8.154.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853339" version="1" comment="MozillaThunderbird-translations-common is &lt;115.9.0-150200.8.154.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853340" version="1" comment="MozillaThunderbird-translations-other is &lt;115.9.0-150200.8.154.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819606" version="1" comment="cluster-md-kmp-rt is &lt;5.14.21-150500.13.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819607" version="1" comment="dlm-kmp-rt is &lt;5.14.21-150500.13.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819608" version="1" comment="gfs2-kmp-rt is &lt;5.14.21-150500.13.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819609" version="1" comment="kernel-devel-rt is &lt;5.14.21-150500.13.30.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819610" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819611" version="1" comment="kernel-rt-devel is &lt;5.14.21-150500.13.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819612" version="1" comment="kernel-rt-extra is &lt;5.14.21-150500.13.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819613" version="1" comment="kernel-rt-livepatch is &lt;5.14.21-150500.13.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819614" version="1" comment="kernel-rt-livepatch-devel is &lt;5.14.21-150500.13.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819615" version="1" comment="kernel-rt-optional is &lt;5.14.21-150500.13.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819616" version="1" comment="kernel-rt-vdso is &lt;5.14.21-150500.13.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819617" version="1" comment="kernel-rt_debug is &lt;5.14.21-150500.13.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819618" version="1" comment="kernel-rt_debug-devel is &lt;5.14.21-150500.13.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819619" version="1" comment="kernel-rt_debug-livepatch-devel is &lt;5.14.21-150500.13.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819620" version="1" comment="kernel-rt_debug-vdso is &lt;5.14.21-150500.13.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819621" version="1" comment="kernel-source-rt is &lt;5.14.21-150500.13.30.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819622" version="1" comment="kernel-syms-rt is &lt;5.14.21-150500.13.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819623" version="1" comment="kselftests-kmp-rt is &lt;5.14.21-150500.13.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819624" version="1" comment="ocfs2-kmp-rt is &lt;5.14.21-150500.13.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819625" version="1" comment="reiserfs-kmp-rt is &lt;5.14.21-150500.13.30.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853341" version="1" comment="curl is &lt;8.0.1-150400.5.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853342" version="1" comment="libcurl-devel is &lt;8.0.1-150400.5.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853343" version="1" comment="libcurl-devel-32bit is &lt;8.0.1-150400.5.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853344" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853345" version="1" comment="libcurl4-32bit is &lt;8.0.1-150400.5.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853346" version="1" comment="python3-Pillow is &lt;7.2.0-150300.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853347" version="1" comment="python3-Pillow-tk is &lt;7.2.0-150300.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853348" version="1" comment="containerized-data-importer-api is &lt;1.58.0-150500.6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853349" version="1" comment="containerized-data-importer-cloner is &lt;1.58.0-150500.6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853350" version="1" comment="containerized-data-importer-controller is &lt;1.58.0-150500.6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853351" version="1" comment="containerized-data-importer-importer is &lt;1.58.0-150500.6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853352" version="1" comment="containerized-data-importer-manifests is &lt;1.58.0-150500.6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853353" version="1" comment="containerized-data-importer-operator is &lt;1.58.0-150500.6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853354" version="1" comment="containerized-data-importer-uploadproxy is &lt;1.58.0-150500.6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853355" version="1" comment="containerized-data-importer-uploadserver is &lt;1.58.0-150500.6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853356" version="1" comment="obs-service-cdi_containers_meta is &lt;1.58.0-150500.6.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853357" version="1" comment="kubevirt-container-disk is &lt;1.1.1-150500.8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853358" version="1" comment="kubevirt-manifests is &lt;1.1.1-150500.8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853359" version="1" comment="kubevirt-tests is &lt;1.1.1-150500.8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853360" version="1" comment="kubevirt-virt-api is &lt;1.1.1-150500.8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853361" version="1" comment="kubevirt-virt-controller is &lt;1.1.1-150500.8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853362" version="1" comment="kubevirt-virt-exportproxy is &lt;1.1.1-150500.8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853363" version="1" comment="kubevirt-virt-exportserver is &lt;1.1.1-150500.8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853364" version="1" comment="kubevirt-virt-handler is &lt;1.1.1-150500.8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853365" version="1" comment="kubevirt-virt-launcher is &lt;1.1.1-150500.8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853366" version="1" comment="kubevirt-virt-operator is &lt;1.1.1-150500.8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853367" version="1" comment="kubevirt-virtctl is &lt;1.1.1-150500.8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853368" version="1" comment="obs-service-kubevirt_containers_meta is &lt;1.1.1-150500.8.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853369" version="1" comment="libpython3_10-1_0 is &lt;3.10.14-150400.4.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853370" version="1" comment="libpython3_10-1_0-32bit is &lt;3.10.14-150400.4.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853371" version="1" comment="python310 is &lt;3.10.14-150400.4.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853372" version="1" comment="python310-32bit is &lt;3.10.14-150400.4.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853373" version="1" comment="python310-base is &lt;3.10.14-150400.4.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853374" version="1" comment="python310-base-32bit is &lt;3.10.14-150400.4.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853375" version="1" comment="python310-curses is &lt;3.10.14-150400.4.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853376" version="1" comment="python310-dbm is &lt;3.10.14-150400.4.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853377" version="1" comment="python310-devel is &lt;3.10.14-150400.4.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853378" version="1" comment="python310-doc is &lt;3.10.14-150400.4.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853379" version="1" comment="python310-doc-devhelp is &lt;3.10.14-150400.4.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853380" version="1" comment="python310-idle is &lt;3.10.14-150400.4.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853381" version="1" comment="python310-testsuite is &lt;3.10.14-150400.4.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853382" version="1" comment="python310-tk is &lt;3.10.14-150400.4.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853383" version="1" comment="python310-tools is &lt;3.10.14-150400.4.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853384" version="1" comment="kubernetes1.23-apiserver is &lt;1.23.17-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853385" version="1" comment="kubernetes1.23-client is &lt;1.23.17-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853386" version="1" comment="kubernetes1.23-client-bash-completion is &lt;1.23.17-150500.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853387" version="1" comment="kubernetes1.23-client-common is &lt;1.23.17-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853388" version="1" comment="kubernetes1.23-client-fish-completion is &lt;1.23.17-150500.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853389" version="1" comment="kubernetes1.23-controller-manager is &lt;1.23.17-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853390" version="1" comment="kubernetes1.23-kubeadm is &lt;1.23.17-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853391" version="1" comment="kubernetes1.23-kubelet is &lt;1.23.17-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853392" version="1" comment="kubernetes1.23-kubelet-common is &lt;1.23.17-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853393" version="1" comment="kubernetes1.23-proxy is &lt;1.23.17-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853394" version="1" comment="kubernetes1.23-scheduler is &lt;1.23.17-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853395" version="1" comment="kubernetes1.24-apiserver is &lt;1.24.17-150500.3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853396" version="1" comment="kubernetes1.24-client is &lt;1.24.17-150500.3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853397" version="1" comment="kubernetes1.24-client-bash-completion is &lt;1.24.17-150500.3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853398" version="1" comment="kubernetes1.24-client-common is &lt;1.24.17-150500.3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853399" version="1" comment="kubernetes1.24-client-fish-completion is &lt;1.24.17-150500.3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853400" version="1" comment="kubernetes1.24-controller-manager is &lt;1.24.17-150500.3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853401" version="1" comment="kubernetes1.24-kubeadm is &lt;1.24.17-150500.3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853402" version="1" comment="kubernetes1.24-kubelet is &lt;1.24.17-150500.3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853403" version="1" comment="kubernetes1.24-kubelet-common is &lt;1.24.17-150500.3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853404" version="1" comment="kubernetes1.24-proxy is &lt;1.24.17-150500.3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853405" version="1" comment="kubernetes1.24-scheduler is &lt;1.24.17-150500.3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853406" version="1" comment="kubernetes1.25-client is &lt;1.25.16-150400.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853407" version="1" comment="kubernetes1.25-client-common is &lt;1.25.16-150400.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853408" version="1" comment="kubernetes1.26-client is &lt;1.26.14-150400.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853409" version="1" comment="kubernetes1.26-client-common is &lt;1.26.14-150400.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853410" version="1" comment="libnghttp2-14 is &lt;1.40.0-150200.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853411" version="1" comment="libnghttp2-14-32bit is &lt;1.40.0-150200.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853412" version="1" comment="libnghttp2-devel is &lt;1.40.0-150200.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853413" version="1" comment="libnghttp2_asio-devel is &lt;1.40.0-150200.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853414" version="1" comment="libnghttp2_asio1 is &lt;1.40.0-150200.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853415" version="1" comment="libnghttp2_asio1-32bit is &lt;1.40.0-150200.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853416" version="1" comment="nghttp2 is &lt;1.40.0-150200.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853417" version="1" comment="python3-nghttp2 is &lt;1.40.0-150200.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853729" version="1" comment="libblkid-devel is &lt;2.37.4-150500.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853730" version="1" comment="libblkid-devel-32bit is &lt;2.37.4-150500.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853731" version="1" comment="libblkid-devel-static is &lt;2.37.4-150500.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853732" version="1" comment="libblkid1 is &lt;2.37.4-150500.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853733" version="1" comment="libblkid1-32bit is &lt;2.37.4-150500.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853734" version="1" comment="libfdisk-devel is &lt;2.37.4-150500.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853735" version="1" comment="libfdisk-devel-32bit is &lt;2.37.4-150500.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853736" version="1" comment="libfdisk-devel-static is &lt;2.37.4-150500.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853737" version="1" comment="libfdisk1 is &lt;2.37.4-150500.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853738" version="1" comment="libfdisk1-32bit is &lt;2.37.4-150500.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853739" version="1" comment="libmount-devel is &lt;2.37.4-150500.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853740" version="1" comment="libmount-devel-32bit is &lt;2.37.4-150500.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853741" version="1" comment="libmount-devel-static is &lt;2.37.4-150500.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853742" version="1" comment="libmount1 is &lt;2.37.4-150500.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853743" version="1" comment="libmount1-32bit is &lt;2.37.4-150500.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853744" version="1" comment="libsmartcols-devel is &lt;2.37.4-150500.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853745" version="1" comment="libsmartcols-devel-32bit is &lt;2.37.4-150500.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853746" version="1" comment="libsmartcols-devel-static is &lt;2.37.4-150500.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853747" version="1" comment="libsmartcols1 is &lt;2.37.4-150500.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853748" version="1" comment="libsmartcols1-32bit is &lt;2.37.4-150500.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853749" version="1" comment="libuuid-devel is &lt;2.37.4-150500.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853750" version="1" comment="libuuid-devel-32bit is &lt;2.37.4-150500.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853751" version="1" comment="libuuid-devel-static is &lt;2.37.4-150500.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853752" version="1" comment="libuuid1 is &lt;2.37.4-150500.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853753" version="1" comment="libuuid1-32bit is &lt;2.37.4-150500.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853754" version="1" comment="python3-libmount is &lt;2.37.4-150500.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853755" version="1" comment="util-linux is &lt;2.37.4-150500.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853756" version="1" comment="util-linux-lang is &lt;2.37.4-150500.9.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853757" version="1" comment="util-linux-systemd is &lt;2.37.4-150500.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853758" version="1" comment="uuidd is &lt;2.37.4-150500.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853759" version="1" comment="libQt6Concurrent6 is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853760" version="1" comment="libQt6Core6 is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853761" version="1" comment="libQt6DBus6 is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853762" version="1" comment="libQt6Gui6 is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853763" version="1" comment="libQt6Network6 is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853764" version="1" comment="libQt6OpenGL6 is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853765" version="1" comment="libQt6OpenGLWidgets6 is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853766" version="1" comment="libQt6PrintSupport6 is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853767" version="1" comment="libQt6Sql6 is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853768" version="1" comment="libQt6Test6 is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853769" version="1" comment="libQt6Widgets6 is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853770" version="1" comment="libQt6Xml6 is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853771" version="1" comment="qt6-base-common-devel is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853772" version="1" comment="qt6-base-devel is &lt;6.4.2-150500.3.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853773" version="1" comment="qt6-base-docs-html is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853774" version="1" comment="qt6-base-docs-qch is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853775" version="1" comment="qt6-base-examples is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853776" version="1" comment="qt6-base-private-devel is &lt;6.4.2-150500.3.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853777" version="1" comment="qt6-concurrent-devel is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853778" version="1" comment="qt6-core-devel is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853779" version="1" comment="qt6-core-private-devel is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853780" version="1" comment="qt6-dbus-devel is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853781" version="1" comment="qt6-dbus-private-devel is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853782" version="1" comment="qt6-docs-common is &lt;6.4.2-150500.3.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853783" version="1" comment="qt6-gui-devel is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853784" version="1" comment="qt6-gui-private-devel is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853785" version="1" comment="qt6-kmssupport-devel-static is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853786" version="1" comment="qt6-kmssupport-private-devel is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853787" version="1" comment="qt6-network-devel is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853788" version="1" comment="qt6-network-private-devel is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853789" version="1" comment="qt6-network-tls is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853790" version="1" comment="qt6-networkinformation-glib is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853791" version="1" comment="qt6-networkinformation-nm is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853792" version="1" comment="qt6-opengl-devel is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853793" version="1" comment="qt6-opengl-private-devel is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853794" version="1" comment="qt6-openglwidgets-devel is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853795" version="1" comment="qt6-platformsupport-devel-static is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853796" version="1" comment="qt6-platformsupport-private-devel is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853797" version="1" comment="qt6-platformtheme-gtk3 is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853798" version="1" comment="qt6-platformtheme-xdgdesktopportal is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853799" version="1" comment="qt6-printsupport-cups is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853800" version="1" comment="qt6-printsupport-devel is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853801" version="1" comment="qt6-printsupport-private-devel is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853802" version="1" comment="qt6-sql-devel is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853803" version="1" comment="qt6-sql-mysql is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853804" version="1" comment="qt6-sql-postgresql is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853805" version="1" comment="qt6-sql-private-devel is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853806" version="1" comment="qt6-sql-sqlite is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853807" version="1" comment="qt6-sql-unixODBC is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853808" version="1" comment="qt6-test-devel is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853809" version="1" comment="qt6-test-private-devel is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853810" version="1" comment="qt6-widgets-devel is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853811" version="1" comment="qt6-widgets-private-devel is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853812" version="1" comment="qt6-xml-devel is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853813" version="1" comment="qt6-xml-private-devel is &lt;6.4.2-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854006" version="1" comment="less is &lt;590-150400.3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854111" version="1" comment="tomcat10 is &lt;10.1.20-150200.5.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854112" version="1" comment="tomcat10-admin-webapps is &lt;10.1.20-150200.5.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854113" version="1" comment="tomcat10-docs-webapp is &lt;10.1.20-150200.5.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854114" version="1" comment="tomcat10-el-5_0-api is &lt;10.1.20-150200.5.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854115" version="1" comment="tomcat10-embed is &lt;10.1.20-150200.5.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854116" version="1" comment="tomcat10-jsp-3_1-api is &lt;10.1.20-150200.5.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854117" version="1" comment="tomcat10-jsvc is &lt;10.1.20-150200.5.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854118" version="1" comment="tomcat10-lib is &lt;10.1.20-150200.5.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854119" version="1" comment="tomcat10-servlet-6_0-api is &lt;10.1.20-150200.5.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854120" version="1" comment="tomcat10-webapps is &lt;10.1.20-150200.5.22.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854388" version="1" comment="perl-Net-CIDR-Lite is &lt;0.21-150100.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854389" version="1" comment="python311-Pillow is &lt;9.5.0-150400.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854390" version="1" comment="python311-Pillow-tk is &lt;9.5.0-150400.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854391" version="1" comment="xorg-x11-server is &lt;21.1.4-150500.7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854392" version="1" comment="xorg-x11-server-Xvfb is &lt;21.1.4-150500.7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854393" version="1" comment="xorg-x11-server-extra is &lt;21.1.4-150500.7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854394" version="1" comment="xorg-x11-server-sdk is &lt;21.1.4-150500.7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854395" version="1" comment="xorg-x11-server-source is &lt;21.1.4-150500.7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854396" version="1" comment="xwayland is &lt;22.1.5-150500.7.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854397" version="1" comment="xwayland-devel is &lt;22.1.5-150500.7.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854398" version="1" comment="WebKitGTK-4.0-lang is &lt;2.44.0-150400.4.78.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854399" version="1" comment="WebKitGTK-4.1-lang is &lt;2.44.0-150400.4.78.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854400" version="1" comment="WebKitGTK-6.0-lang is &lt;2.44.0-150400.4.78.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854401" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854402" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.44.0-150400.4.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854403" version="1" comment="libjavascriptcoregtk-4_1-0 is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854404" version="1" comment="libjavascriptcoregtk-4_1-0-32bit is &lt;2.44.0-150400.4.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854405" version="1" comment="libjavascriptcoregtk-6_0-1 is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854406" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854407" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.44.0-150400.4.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854408" version="1" comment="libwebkit2gtk-4_1-0 is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854409" version="1" comment="libwebkit2gtk-4_1-0-32bit is &lt;2.44.0-150400.4.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854410" version="1" comment="libwebkitgtk-6_0-4 is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854411" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854412" version="1" comment="typelib-1_0-JavaScriptCore-4_1 is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854413" version="1" comment="typelib-1_0-JavaScriptCore-6_0 is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854414" version="1" comment="typelib-1_0-WebKit-6_0 is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854415" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854416" version="1" comment="typelib-1_0-WebKit2-4_1 is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854417" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854418" version="1" comment="typelib-1_0-WebKit2WebExtension-4_1 is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854419" version="1" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854420" version="1" comment="webkit-jsc-4 is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854421" version="1" comment="webkit-jsc-4.1 is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854422" version="1" comment="webkit-jsc-6.0 is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854423" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854424" version="1" comment="webkit2gtk-4_1-injected-bundles is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854425" version="1" comment="webkit2gtk3-devel is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854426" version="1" comment="webkit2gtk3-minibrowser is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854427" version="1" comment="webkit2gtk3-soup2-devel is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854428" version="1" comment="webkit2gtk3-soup2-minibrowser is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854429" version="1" comment="webkit2gtk4-devel is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854430" version="1" comment="webkit2gtk4-minibrowser is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854431" version="1" comment="webkitgtk-6_0-injected-bundles is &lt;2.44.0-150400.4.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854432" version="1" comment="gnutls is &lt;3.7.3-150400.4.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854433" version="1" comment="gnutls-guile is &lt;3.7.3-150400.4.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854434" version="1" comment="libgnutls-devel is &lt;3.7.3-150400.4.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854435" version="1" comment="libgnutls-devel-32bit is &lt;3.7.3-150400.4.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854436" version="1" comment="libgnutls30 is &lt;3.7.3-150400.4.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854437" version="1" comment="libgnutls30-32bit is &lt;3.7.3-150400.4.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854438" version="1" comment="libgnutls30-hmac is &lt;3.7.3-150400.4.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854439" version="1" comment="libgnutls30-hmac-32bit is &lt;3.7.3-150400.4.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854440" version="1" comment="libgnutlsxx-devel is &lt;3.7.3-150400.4.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854441" version="1" comment="libgnutlsxx28 is &lt;3.7.3-150400.4.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817911" version="1" comment="cloud-init is &lt;23.3-150100.8.71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817912" version="1" comment="cloud-init-config-suse is &lt;23.3-150100.8.71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817913" version="1" comment="cloud-init-doc is &lt;23.3-150100.8.71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854716" version="1" comment="gvim is &lt;9.1.0111-150500.20.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854717" version="1" comment="vim is &lt;9.1.0111-150500.20.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854718" version="1" comment="vim-data is &lt;9.1.0111-150500.20.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854719" version="1" comment="vim-data-common is &lt;9.1.0111-150500.20.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854720" version="1" comment="vim-small is &lt;9.1.0111-150500.20.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854721" version="1" comment="emacs is &lt;27.2-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854722" version="1" comment="emacs-el is &lt;27.2-150400.3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854723" version="1" comment="emacs-info is &lt;27.2-150400.3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854724" version="1" comment="emacs-nox is &lt;27.2-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854725" version="1" comment="emacs-x11 is &lt;27.2-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854726" version="1" comment="etags is &lt;27.2-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854727" version="1" comment="xen is &lt;4.17.4_02-150500.3.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854728" version="1" comment="xen-devel is &lt;4.17.4_02-150500.3.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854729" version="1" comment="xen-doc-html is &lt;4.17.4_02-150500.3.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854730" version="1" comment="xen-libs is &lt;4.17.4_02-150500.3.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854731" version="1" comment="xen-libs-32bit is &lt;4.17.4_02-150500.3.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854732" version="1" comment="xen-tools is &lt;4.17.4_02-150500.3.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854733" version="1" comment="xen-tools-domU is &lt;4.17.4_02-150500.3.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854734" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.17.4_02-150500.3.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854735" version="1" comment="corepack20 is &lt;20.12.1-150500.11.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854736" version="1" comment="nodejs20 is &lt;20.12.1-150500.11.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854737" version="1" comment="nodejs20-devel is &lt;20.12.1-150500.11.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854738" version="1" comment="nodejs20-docs is &lt;20.12.1-150500.11.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854739" version="1" comment="npm20 is &lt;20.12.1-150500.11.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854839" version="1" comment="eclipse-contributor-tools is &lt;4.15-150200.4.16.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854840" version="1" comment="eclipse-emf-core is &lt;2.22.0-150200.4.9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854841" version="1" comment="eclipse-emf-core-bootstrap is &lt;2.22.0-150200.4.9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854842" version="1" comment="eclipse-emf-runtime is &lt;2.22.0-150200.4.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854843" version="1" comment="eclipse-emf-sdk is &lt;2.22.0-150200.4.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854844" version="1" comment="eclipse-emf-xsd is &lt;2.22.0-150200.4.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854845" version="1" comment="eclipse-equinox-osgi is &lt;4.15-150200.4.16.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854846" version="1" comment="eclipse-equinox-osgi-bootstrap is &lt;4.15-150200.4.16.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854847" version="1" comment="eclipse-jdt is &lt;4.15-150200.4.16.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854848" version="1" comment="eclipse-jdt-bootstrap is &lt;4.15-150200.4.16.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854849" version="1" comment="eclipse-p2-discovery is &lt;4.15-150200.4.16.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854850" version="1" comment="eclipse-p2-discovery-bootstrap is &lt;4.15-150200.4.16.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854851" version="1" comment="eclipse-pde is &lt;4.15-150200.4.16.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854852" version="1" comment="eclipse-pde-bootstrap is &lt;4.15-150200.4.16.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854853" version="1" comment="eclipse-platform is &lt;4.15-150200.4.16.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854854" version="1" comment="eclipse-platform-bootstrap is &lt;4.15-150200.4.16.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854855" version="1" comment="eclipse-swt is &lt;4.15-150200.4.16.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854856" version="1" comment="eclipse-swt-bootstrap is &lt;4.15-150200.4.16.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854857" version="1" comment="maven-failsafe-plugin is &lt;2.22.2-150200.3.9.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854858" version="1" comment="maven-failsafe-plugin-bootstrap is &lt;2.22.2-150200.3.9.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854859" version="1" comment="maven-surefire is &lt;2.22.2-150200.3.9.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854860" version="1" comment="maven-surefire-javadoc is &lt;2.22.2-150200.3.9.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854861" version="1" comment="maven-surefire-plugin is &lt;2.22.2-150200.3.9.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854862" version="1" comment="maven-surefire-plugin-bootstrap is &lt;2.22.2-150200.3.9.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854863" version="1" comment="maven-surefire-plugins-javadoc is &lt;2.22.2-150200.3.9.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854864" version="1" comment="maven-surefire-provider-junit is &lt;2.22.2-150200.3.9.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854865" version="1" comment="maven-surefire-provider-junit5 is &lt;2.22.2-150200.3.9.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854866" version="1" comment="maven-surefire-provider-junit5-javadoc is &lt;2.22.2-150200.3.9.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854867" version="1" comment="maven-surefire-provider-testng is &lt;2.22.2-150200.3.9.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854868" version="1" comment="maven-surefire-report-parser is &lt;2.22.2-150200.3.9.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854869" version="1" comment="maven-surefire-report-plugin is &lt;2.22.2-150200.3.9.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854870" version="1" comment="maven-surefire-report-plugin-bootstrap is &lt;2.22.2-150200.3.9.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854871" version="1" comment="tycho is &lt;1.6.0-150200.4.9.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854872" version="1" comment="tycho-bootstrap is &lt;1.6.0-150200.4.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854873" version="1" comment="tycho-javadoc is &lt;1.6.0-150200.4.9.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854874" version="1" comment="corepack18 is &lt;18.20.1-150400.9.21.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854875" version="1" comment="nodejs18 is &lt;18.20.1-150400.9.21.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854876" version="1" comment="nodejs18-devel is &lt;18.20.1-150400.9.21.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854877" version="1" comment="nodejs18-docs is &lt;18.20.1-150400.9.21.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854878" version="1" comment="npm18 is &lt;18.20.1-150400.9.21.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854879" version="1" comment="libkpathsea6 is &lt;6.3.3-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854880" version="1" comment="libptexenc1 is &lt;1.3.9-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854881" version="1" comment="libsynctex2 is &lt;1.21-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854882" version="1" comment="libtexlua53-5 is &lt;5.3.6-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854883" version="1" comment="libtexluajit2 is &lt;2.1.0beta3-150400.31.6.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854884" version="1" comment="perl-biber is &lt;2021.20210325.svn30357-150400.31.6.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854885" version="1" comment="texlive is &lt;2021.20210325-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854886" version="1" comment="texlive-a2ping-bin is &lt;2021.20210325.svn27321-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854887" version="1" comment="texlive-accfonts-bin is &lt;2021.20210325.svn12688-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854888" version="1" comment="texlive-adhocfilelist-bin is &lt;2021.20210325.svn28038-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854889" version="1" comment="texlive-afm2pl-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854890" version="1" comment="texlive-albatross-bin is &lt;2021.20210325.svn57089-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854891" version="1" comment="texlive-aleph-bin is &lt;2021.20210325.svn58378-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854892" version="1" comment="texlive-amstex-bin is &lt;2021.20210325.svn3006-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854893" version="1" comment="texlive-arara-bin is &lt;2021.20210325.svn29036-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854894" version="1" comment="texlive-asymptote-bin is &lt;2021.20210325.svn57890-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854895" version="1" comment="texlive-attachfile2-bin is &lt;2021.20210325.svn52909-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854896" version="1" comment="texlive-authorindex-bin is &lt;2021.20210325.svn18790-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854897" version="1" comment="texlive-autosp-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854898" version="1" comment="texlive-axodraw2-bin is &lt;2021.20210325.svn58378-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854899" version="1" comment="texlive-bib2gls-bin is &lt;2021.20210325.svn45266-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854900" version="1" comment="texlive-biber-bin is &lt;2021.20210325.svn57273-150400.31.6.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854901" version="1" comment="texlive-bibexport-bin is &lt;2021.20210325.svn16219-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854902" version="1" comment="texlive-bibtex-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854903" version="1" comment="texlive-bibtex8-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854904" version="1" comment="texlive-bibtexu-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854905" version="1" comment="texlive-bin-devel is &lt;2021.20210325-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854906" version="1" comment="texlive-bundledoc-bin is &lt;2021.20210325.svn17794-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854907" version="1" comment="texlive-cachepic-bin is &lt;2021.20210325.svn15543-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854908" version="1" comment="texlive-checkcites-bin is &lt;2021.20210325.svn25623-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854909" version="1" comment="texlive-checklistings-bin is &lt;2021.20210325.svn38300-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854910" version="1" comment="texlive-chklref-bin is &lt;2021.20210325.svn52631-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854911" version="1" comment="texlive-chktex-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854912" version="1" comment="texlive-cjk-gs-integrate-bin is &lt;2021.20210325.svn37223-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854913" version="1" comment="texlive-cjkutils-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854914" version="1" comment="texlive-clojure-pamphlet-bin is &lt;2021.20210325.svn51944-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854915" version="1" comment="texlive-cluttex-bin is &lt;2021.20210325.svn48871-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854916" version="1" comment="texlive-context-bin is &lt;2021.20210325.svn34112-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854917" version="1" comment="texlive-convbkmk-bin is &lt;2021.20210325.svn30408-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854918" version="1" comment="texlive-crossrefware-bin is &lt;2021.20210325.svn45927-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854919" version="1" comment="texlive-cslatex-bin is &lt;2021.20210325.svn3006-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854920" version="1" comment="texlive-csplain-bin is &lt;2021.20210325.svn50528-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854921" version="1" comment="texlive-ctan-o-mat-bin is &lt;2021.20210325.svn46996-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854922" version="1" comment="texlive-ctanbib-bin is &lt;2021.20210325.svn48478-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854923" version="1" comment="texlive-ctanify-bin is &lt;2021.20210325.svn24061-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854924" version="1" comment="texlive-ctanupload-bin is &lt;2021.20210325.svn23866-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854925" version="1" comment="texlive-ctie-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854926" version="1" comment="texlive-cweb-bin is &lt;2021.20210325.svn58136-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854927" version="1" comment="texlive-cyrillic-bin-bin is &lt;2021.20210325.svn53554-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854928" version="1" comment="texlive-de-macro-bin is &lt;2021.20210325.svn17399-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854929" version="1" comment="texlive-detex-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854930" version="1" comment="texlive-diadia-bin is &lt;2021.20210325.svn37645-150400.31.6.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854931" version="1" comment="texlive-dosepsbin-bin is &lt;2021.20210325.svn24759-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854932" version="1" comment="texlive-dtl-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854933" version="1" comment="texlive-dtxgen-bin is &lt;2021.20210325.svn29031-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854934" version="1" comment="texlive-dviasm-bin is &lt;2021.20210325.svn8329-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854935" version="1" comment="texlive-dvicopy-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854936" version="1" comment="texlive-dvidvi-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854937" version="1" comment="texlive-dviinfox-bin is &lt;2021.20210325.svn44515-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854938" version="1" comment="texlive-dviljk-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854939" version="1" comment="texlive-dviout-util-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854940" version="1" comment="texlive-dvipdfmx-bin is &lt;2021.20210325.svn58535-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854941" version="1" comment="texlive-dvipng-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854942" version="1" comment="texlive-dvipos-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854943" version="1" comment="texlive-dvips-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854944" version="1" comment="texlive-dvisvgm-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854945" version="1" comment="texlive-eplain-bin is &lt;2021.20210325.svn3006-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854946" version="1" comment="texlive-epspdf-bin is &lt;2021.20210325.svn29050-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854947" version="1" comment="texlive-epstopdf-bin is &lt;2021.20210325.svn18336-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854948" version="1" comment="texlive-exceltex-bin is &lt;2021.20210325.svn25860-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854949" version="1" comment="texlive-fig4latex-bin is &lt;2021.20210325.svn14752-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854950" version="1" comment="texlive-findhyph-bin is &lt;2021.20210325.svn14758-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854951" version="1" comment="texlive-fontinst-bin is &lt;2021.20210325.svn53554-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854952" version="1" comment="texlive-fontools-bin is &lt;2021.20210325.svn25997-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854953" version="1" comment="texlive-fontware-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854954" version="1" comment="texlive-fragmaster-bin is &lt;2021.20210325.svn13663-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854955" version="1" comment="texlive-getmap-bin is &lt;2021.20210325.svn34971-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854956" version="1" comment="texlive-git-latexdiff-bin is &lt;2021.20210325.svn54732-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854957" version="1" comment="texlive-glossaries-bin is &lt;2021.20210325.svn37813-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854958" version="1" comment="texlive-gregoriotex-bin is &lt;2021.20210325.svn58378-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854959" version="1" comment="texlive-gsftopk-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854960" version="1" comment="texlive-hyperxmp-bin is &lt;2021.20210325.svn56984-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854961" version="1" comment="texlive-jadetex-bin is &lt;2021.20210325.svn3006-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854962" version="1" comment="texlive-jfmutil-bin is &lt;2021.20210325.svn44835-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854963" version="1" comment="texlive-ketcindy-bin is &lt;2021.20210325.svn49033-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854964" version="1" comment="texlive-kotex-utils-bin is &lt;2021.20210325.svn32101-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854965" version="1" comment="texlive-kpathsea-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854966" version="1" comment="texlive-kpathsea-devel is &lt;6.3.3-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854967" version="1" comment="texlive-l3build-bin is &lt;2021.20210325.svn46894-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854968" version="1" comment="texlive-lacheck-bin is &lt;2021.20210325.svn53999-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854969" version="1" comment="texlive-latex-bin-bin is &lt;2021.20210325.svn54358-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854970" version="1" comment="texlive-latex-bin-dev-bin is &lt;2021.20210325.svn53999-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854971" version="1" comment="texlive-latex-git-log-bin is &lt;2021.20210325.svn30983-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854972" version="1" comment="texlive-latex-papersize-bin is &lt;2021.20210325.svn42296-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854973" version="1" comment="texlive-latex2man-bin is &lt;2021.20210325.svn13663-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854974" version="1" comment="texlive-latex2nemeth-bin is &lt;2021.20210325.svn42300-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854975" version="1" comment="texlive-latexdiff-bin is &lt;2021.20210325.svn16420-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854976" version="1" comment="texlive-latexfileversion-bin is &lt;2021.20210325.svn25012-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854977" version="1" comment="texlive-latexindent-bin is &lt;2021.20210325.svn32150-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854978" version="1" comment="texlive-latexmk-bin is &lt;2021.20210325.svn10937-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854979" version="1" comment="texlive-latexpand-bin is &lt;2021.20210325.svn27025-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854980" version="1" comment="texlive-lcdftypetools-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854981" version="1" comment="texlive-light-latex-make-bin is &lt;2021.20210325.svn56352-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854982" version="1" comment="texlive-lilyglyphs-bin is &lt;2021.20210325.svn31696-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854983" version="1" comment="texlive-listbib-bin is &lt;2021.20210325.svn26126-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854984" version="1" comment="texlive-listings-ext-bin is &lt;2021.20210325.svn15093-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854985" version="1" comment="texlive-lollipop-bin is &lt;2021.20210325.svn41465-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854986" version="1" comment="texlive-ltxfileinfo-bin is &lt;2021.20210325.svn29005-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854987" version="1" comment="texlive-ltximg-bin is &lt;2021.20210325.svn32346-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854988" version="1" comment="texlive-luahbtex-bin is &lt;2021.20210325.svn58535-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854989" version="1" comment="texlive-luajittex-bin is &lt;2021.20210325.svn58535-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854990" version="1" comment="texlive-luaotfload-bin is &lt;2021.20210325.svn34647-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854991" version="1" comment="texlive-luatex-bin is &lt;2021.20210325.svn58535-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854992" version="1" comment="texlive-lwarp-bin is &lt;2021.20210325.svn43292-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854993" version="1" comment="texlive-m-tx-bin is &lt;2021.20210325.svn50281-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854994" version="1" comment="texlive-make4ht-bin is &lt;2021.20210325.svn37750-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854995" version="1" comment="texlive-makedtx-bin is &lt;2021.20210325.svn38769-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854996" version="1" comment="texlive-makeindex-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854997" version="1" comment="texlive-match_parens-bin is &lt;2021.20210325.svn23500-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854998" version="1" comment="texlive-mathspic-bin is &lt;2021.20210325.svn23661-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854999" version="1" comment="texlive-metafont-bin is &lt;2021.20210325.svn58378-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855000" version="1" comment="texlive-metapost-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855001" version="1" comment="texlive-mex-bin is &lt;2021.20210325.svn3006-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855002" version="1" comment="texlive-mf2pt1-bin is &lt;2021.20210325.svn23406-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855003" version="1" comment="texlive-mflua-bin is &lt;2021.20210325.svn58535-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855004" version="1" comment="texlive-mfware-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855005" version="1" comment="texlive-mkgrkindex-bin is &lt;2021.20210325.svn14428-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855006" version="1" comment="texlive-mkjobtexmf-bin is &lt;2021.20210325.svn8457-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855007" version="1" comment="texlive-mkpic-bin is &lt;2021.20210325.svn33688-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855008" version="1" comment="texlive-mltex-bin is &lt;2021.20210325.svn3006-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855009" version="1" comment="texlive-mptopdf-bin is &lt;2021.20210325.svn18674-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855010" version="1" comment="texlive-multibibliography-bin is &lt;2021.20210325.svn30534-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855011" version="1" comment="texlive-musixtex-bin is &lt;2021.20210325.svn37026-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855012" version="1" comment="texlive-musixtnt-bin is &lt;2021.20210325.svn50281-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855013" version="1" comment="texlive-omegaware-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855014" version="1" comment="texlive-optex-bin is &lt;2021.20210325.svn53804-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855015" version="1" comment="texlive-patgen-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855016" version="1" comment="texlive-pax-bin is &lt;2021.20210325.svn10843-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855017" version="1" comment="texlive-pdfbook2-bin is &lt;2021.20210325.svn37537-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855018" version="1" comment="texlive-pdfcrop-bin is &lt;2021.20210325.svn14387-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855019" version="1" comment="texlive-pdfjam-bin is &lt;2021.20210325.svn52858-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855020" version="1" comment="texlive-pdflatexpicscale-bin is &lt;2021.20210325.svn41779-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855021" version="1" comment="texlive-pdftex-bin is &lt;2021.20210325.svn58535-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855022" version="1" comment="texlive-pdftex-quiet-bin is &lt;2021.20210325.svn49140-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855023" version="1" comment="texlive-pdftosrc-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855024" version="1" comment="texlive-pdfxup-bin is &lt;2021.20210325.svn40690-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855025" version="1" comment="texlive-pedigree-perl-bin is &lt;2021.20210325.svn25962-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855026" version="1" comment="texlive-perltex-bin is &lt;2021.20210325.svn16181-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855027" version="1" comment="texlive-petri-nets-bin is &lt;2021.20210325.svn39165-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855028" version="1" comment="texlive-pfarrei-bin is &lt;2021.20210325.svn29348-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855029" version="1" comment="texlive-pkfix-bin is &lt;2021.20210325.svn13364-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855030" version="1" comment="texlive-pkfix-helper-bin is &lt;2021.20210325.svn13663-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855031" version="1" comment="texlive-platex-bin is &lt;2021.20210325.svn52800-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855032" version="1" comment="texlive-pmx-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855033" version="1" comment="texlive-pmxchords-bin is &lt;2021.20210325.svn32405-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855034" version="1" comment="texlive-ps2eps-bin is &lt;2021.20210325.svn50281-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855035" version="1" comment="texlive-ps2pk-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855036" version="1" comment="texlive-pst-pdf-bin is &lt;2021.20210325.svn7838-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855037" version="1" comment="texlive-pst2pdf-bin is &lt;2021.20210325.svn29333-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855038" version="1" comment="texlive-ptex-bin is &lt;2021.20210325.svn58378-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855039" version="1" comment="texlive-ptex-fontmaps-bin is &lt;2021.20210325.svn44206-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855040" version="1" comment="texlive-ptex2pdf-bin is &lt;2021.20210325.svn29335-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855041" version="1" comment="texlive-ptexenc-devel is &lt;1.3.9-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855042" version="1" comment="texlive-purifyeps-bin is &lt;2021.20210325.svn13663-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855043" version="1" comment="texlive-pygmentex-bin is &lt;2021.20210325.svn34996-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855044" version="1" comment="texlive-pythontex-bin is &lt;2021.20210325.svn31638-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855045" version="1" comment="texlive-rubik-bin is &lt;2021.20210325.svn32919-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855046" version="1" comment="texlive-scripts-bin is &lt;2021.20210325.svn55172-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855047" version="1" comment="texlive-scripts-extra-bin is &lt;2021.20210325.svn53577-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855048" version="1" comment="texlive-seetexk-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855049" version="1" comment="texlive-spix-bin is &lt;2021.20210325.svn55933-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855050" version="1" comment="texlive-splitindex-bin is &lt;2021.20210325.svn29688-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855051" version="1" comment="texlive-srcredact-bin is &lt;2021.20210325.svn38710-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855052" version="1" comment="texlive-sty2dtx-bin is &lt;2021.20210325.svn21215-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855053" version="1" comment="texlive-svn-multi-bin is &lt;2021.20210325.svn13663-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855054" version="1" comment="texlive-synctex-bin is &lt;2021.20210325.svn58136-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855055" version="1" comment="texlive-synctex-devel is &lt;1.21-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855056" version="1" comment="texlive-tex-bin is &lt;2021.20210325.svn58378-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855057" version="1" comment="texlive-tex4ebook-bin is &lt;2021.20210325.svn37771-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855058" version="1" comment="texlive-tex4ht-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855059" version="1" comment="texlive-texcount-bin is &lt;2021.20210325.svn13013-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855060" version="1" comment="texlive-texdef-bin is &lt;2021.20210325.svn45011-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855061" version="1" comment="texlive-texdiff-bin is &lt;2021.20210325.svn15506-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855062" version="1" comment="texlive-texdirflatten-bin is &lt;2021.20210325.svn12782-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855063" version="1" comment="texlive-texdoc-bin is &lt;2021.20210325.svn47948-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855064" version="1" comment="texlive-texdoctk-bin is &lt;2021.20210325.svn29741-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855065" version="1" comment="texlive-texfot-bin is &lt;2021.20210325.svn33155-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855066" version="1" comment="texlive-texliveonfly-bin is &lt;2021.20210325.svn24062-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855067" version="1" comment="texlive-texloganalyser-bin is &lt;2021.20210325.svn13663-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855068" version="1" comment="texlive-texlua-devel is &lt;5.3.6-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855069" version="1" comment="texlive-texluajit-devel is &lt;2.1.0beta3-150400.31.6.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855070" version="1" comment="texlive-texosquery-bin is &lt;2021.20210325.svn43596-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855071" version="1" comment="texlive-texplate-bin is &lt;2021.20210325.svn53444-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855072" version="1" comment="texlive-texsis-bin is &lt;2021.20210325.svn3006-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855073" version="1" comment="texlive-texware-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855074" version="1" comment="texlive-thumbpdf-bin is &lt;2021.20210325.svn6898-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855075" version="1" comment="texlive-tie-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855076" version="1" comment="texlive-tikztosvg-bin is &lt;2021.20210325.svn55132-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855077" version="1" comment="texlive-tpic2pdftex-bin is &lt;2021.20210325.svn50281-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855078" version="1" comment="texlive-ttfutils-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855079" version="1" comment="texlive-typeoutfileinfo-bin is &lt;2021.20210325.svn25648-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855080" version="1" comment="texlive-ulqda-bin is &lt;2021.20210325.svn13663-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855081" version="1" comment="texlive-uplatex-bin is &lt;2021.20210325.svn52800-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855082" version="1" comment="texlive-uptex-bin is &lt;2021.20210325.svn58378-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855083" version="1" comment="texlive-urlbst-bin is &lt;2021.20210325.svn23262-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855084" version="1" comment="texlive-velthuis-bin is &lt;2021.20210325.svn50281-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855085" version="1" comment="texlive-vlna-bin is &lt;2021.20210325.svn50281-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855086" version="1" comment="texlive-vpe-bin is &lt;2021.20210325.svn6897-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855087" version="1" comment="texlive-web-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855088" version="1" comment="texlive-webquiz-bin is &lt;2021.20210325.svn50419-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855089" version="1" comment="texlive-wordcount-bin is &lt;2021.20210325.svn46165-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855090" version="1" comment="texlive-xdvi-bin is &lt;2021.20210325.svn58378-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855091" version="1" comment="texlive-xelatex-dev-bin is &lt;2021.20210325.svn53999-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855092" version="1" comment="texlive-xetex-bin is &lt;2021.20210325.svn58378-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855093" version="1" comment="texlive-xindex-bin is &lt;2021.20210325.svn49312-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855094" version="1" comment="texlive-xml2pmx-bin is &lt;2021.20210325.svn57878-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855095" version="1" comment="texlive-xmltex-bin is &lt;2021.20210325.svn3006-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855096" version="1" comment="texlive-xpdfopen-bin is &lt;2021.20210325.svn52917-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855097" version="1" comment="texlive-yplan-bin is &lt;2021.20210325.svn34398-150400.31.6.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855098" version="1" comment="kubevirt-container-disk is &lt;1.1.1-150500.8.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855099" version="1" comment="kubevirt-manifests is &lt;1.1.1-150500.8.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855100" version="1" comment="kubevirt-tests is &lt;1.1.1-150500.8.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855101" version="1" comment="kubevirt-virt-api is &lt;1.1.1-150500.8.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855102" version="1" comment="kubevirt-virt-controller is &lt;1.1.1-150500.8.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855103" version="1" comment="kubevirt-virt-exportproxy is &lt;1.1.1-150500.8.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855104" version="1" comment="kubevirt-virt-exportserver is &lt;1.1.1-150500.8.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855105" version="1" comment="kubevirt-virt-handler is &lt;1.1.1-150500.8.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855106" version="1" comment="kubevirt-virt-launcher is &lt;1.1.1-150500.8.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855107" version="1" comment="kubevirt-virt-operator is &lt;1.1.1-150500.8.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855108" version="1" comment="kubevirt-virtctl is &lt;1.1.1-150500.8.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855109" version="1" comment="obs-service-kubevirt_containers_meta is &lt;1.1.1-150500.8.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855316" version="1" comment="pgadmin4 is &lt;4.30-150300.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855317" version="1" comment="pgadmin4-doc is &lt;4.30-150300.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855318" version="1" comment="pgadmin4-web is &lt;4.30-150300.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855319" version="1" comment="pgadmin4-web-uwsgi is &lt;4.30-150300.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855320" version="1" comment="apache-commons-daemon is &lt;1.3.4-150200.11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855321" version="1" comment="apache-commons-daemon-javadoc is &lt;1.3.4-150200.11.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855322" version="1" comment="apache-commons-daemon-jsvc is &lt;1.3.4-150200.11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855323" version="1" comment="apache-commons-dbcp is &lt;2.1.1-150200.10.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855324" version="1" comment="apache-commons-dbcp-javadoc is &lt;2.1.1-150200.10.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855325" version="1" comment="apache-commons-pool2 is &lt;2.4.2-150200.11.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855326" version="1" comment="apache-commons-pool2-javadoc is &lt;2.4.2-150200.11.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855327" version="1" comment="geronimo-annotation-1_0-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855328" version="1" comment="geronimo-commonj-1_1-apis is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855329" version="1" comment="geronimo-corba-1_0-apis is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855330" version="1" comment="geronimo-corba-2_3-apis is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855331" version="1" comment="geronimo-ejb-2_1-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855332" version="1" comment="geronimo-ejb-3_0-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855333" version="1" comment="geronimo-el-1_0-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855334" version="1" comment="geronimo-interceptor-3_0-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855335" version="1" comment="geronimo-j2ee-1_4-apis is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855336" version="1" comment="geronimo-j2ee-connector-1_5-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855337" version="1" comment="geronimo-j2ee-deployment-1_1-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855338" version="1" comment="geronimo-j2ee-management-1_0-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855339" version="1" comment="geronimo-j2ee-management-1_1-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855340" version="1" comment="geronimo-jacc-1_0-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855341" version="1" comment="geronimo-jacc-1_1-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855342" version="1" comment="geronimo-jaf-1_0_2-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855343" version="1" comment="geronimo-jaf-1_1-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855344" version="1" comment="geronimo-javaee-deployment-1_1-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855345" version="1" comment="geronimo-javamail-1_3_1-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855346" version="1" comment="geronimo-javamail-1_4-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855347" version="1" comment="geronimo-jaxr-1_0-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855348" version="1" comment="geronimo-jaxrpc-1_1-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855349" version="1" comment="geronimo-jms-1_1-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855350" version="1" comment="geronimo-jpa-3_0-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855351" version="1" comment="geronimo-jsp-2_0-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855352" version="1" comment="geronimo-jsp-2_1-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855353" version="1" comment="geronimo-jta-1_0_1B-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855354" version="1" comment="geronimo-jta-1_1-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855355" version="1" comment="geronimo-qname-1_1-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855356" version="1" comment="geronimo-saaj-1_1-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855357" version="1" comment="geronimo-servlet-2_4-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855358" version="1" comment="geronimo-servlet-2_5-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855359" version="1" comment="geronimo-stax-1_0-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855360" version="1" comment="geronimo-ws-metadata-2_0-api is &lt;1.2-150200.15.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855361" version="1" comment="jakarta-taglibs-standard is &lt;1.1.1-150000.4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855362" version="1" comment="jakarta-taglibs-standard-javadoc is &lt;1.1.1-150000.4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855363" version="1" comment="tomcat is &lt;9.0.87-150200.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855364" version="1" comment="tomcat-admin-webapps is &lt;9.0.87-150200.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855365" version="1" comment="tomcat-docs-webapp is &lt;9.0.87-150200.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855366" version="1" comment="tomcat-el-3_0-api is &lt;9.0.87-150200.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855367" version="1" comment="tomcat-embed is &lt;9.0.87-150200.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855368" version="1" comment="tomcat-javadoc is &lt;9.0.87-150200.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855369" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.87-150200.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855370" version="1" comment="tomcat-jsvc is &lt;9.0.87-150200.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855371" version="1" comment="tomcat-lib is &lt;9.0.87-150200.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855372" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.87-150200.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855373" version="1" comment="tomcat-webapps is &lt;9.0.87-150200.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855407" version="1" comment="libwireshark15 is &lt;3.6.22-150000.3.112.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855408" version="1" comment="libwiretap12 is &lt;3.6.22-150000.3.112.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855409" version="1" comment="libwsutil13 is &lt;3.6.22-150000.3.112.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855410" version="1" comment="wireshark is &lt;3.6.22-150000.3.112.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855411" version="1" comment="wireshark-devel is &lt;3.6.22-150000.3.112.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855412" version="1" comment="wireshark-ui-qt is &lt;3.6.22-150000.3.112.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855413" version="1" comment="MozillaFirefox is &lt;115.10.0-150200.152.134.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855414" version="1" comment="MozillaFirefox-branding-upstream is &lt;115.10.0-150200.152.134.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855415" version="1" comment="MozillaFirefox-devel is &lt;115.10.0-150200.152.134.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855416" version="1" comment="MozillaFirefox-translations-common is &lt;115.10.0-150200.152.134.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855417" version="1" comment="MozillaFirefox-translations-other is &lt;115.10.0-150200.152.134.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855418" version="1" comment="graphviz is &lt;2.48.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855419" version="1" comment="graphviz-devel is &lt;2.48.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855420" version="1" comment="graphviz-doc is &lt;2.48.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855421" version="1" comment="graphviz-gd is &lt;2.48.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855422" version="1" comment="graphviz-gnome is &lt;2.48.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855423" version="1" comment="graphviz-guile is &lt;2.48.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855424" version="1" comment="graphviz-gvedit is &lt;2.48.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855425" version="1" comment="graphviz-java is &lt;2.48.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855426" version="1" comment="graphviz-lua is &lt;2.48.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855427" version="1" comment="graphviz-perl is &lt;2.48.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855428" version="1" comment="graphviz-php is &lt;2.48.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855429" version="1" comment="graphviz-plugins-core is &lt;2.48.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855430" version="1" comment="graphviz-ruby is &lt;2.48.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855431" version="1" comment="graphviz-smyrna is &lt;2.48.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855432" version="1" comment="graphviz-tcl is &lt;2.48.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855433" version="1" comment="graphviz-webp is &lt;2.48.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855434" version="1" comment="graphviz-x11 is &lt;2.48.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855435" version="1" comment="libgraphviz6 is &lt;2.48.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855436" version="1" comment="python3-gv is &lt;2.48.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819718" version="1" comment="pam is &lt;1.3.0-150000.6.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819712" version="1" comment="pam-32bit is &lt;1.3.0-150000.6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819719" version="1" comment="pam-devel is &lt;1.3.0-150000.6.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819714" version="1" comment="pam-devel-32bit is &lt;1.3.0-150000.6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819715" version="1" comment="pam-doc is &lt;1.3.0-150000.6.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819720" version="1" comment="pam-extra is &lt;1.3.0-150000.6.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819717" version="1" comment="pam-extra-32bit is &lt;1.3.0-150000.6.66.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855730" version="1" comment="apache-commons-configuration2 is &lt;2.10.1-150200.5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855731" version="1" comment="apache-commons-configuration2-javadoc is &lt;2.10.1-150200.5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855732" version="1" comment="shim is &lt;15.8-150300.4.20.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855733" version="1" comment="glibc is &lt;2.31-150300.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855734" version="1" comment="glibc-32bit is &lt;2.31-150300.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855735" version="1" comment="glibc-devel is &lt;2.31-150300.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855736" version="1" comment="glibc-devel-32bit is &lt;2.31-150300.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855737" version="1" comment="glibc-devel-static is &lt;2.31-150300.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855738" version="1" comment="glibc-devel-static-32bit is &lt;2.31-150300.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855739" version="1" comment="glibc-extra is &lt;2.31-150300.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855740" version="1" comment="glibc-html is &lt;2.31-150300.74.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855741" version="1" comment="glibc-i18ndata is &lt;2.31-150300.74.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855742" version="1" comment="glibc-info is &lt;2.31-150300.74.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855743" version="1" comment="glibc-lang is &lt;2.31-150300.74.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855744" version="1" comment="glibc-locale is &lt;2.31-150300.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855745" version="1" comment="glibc-locale-base is &lt;2.31-150300.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855746" version="1" comment="glibc-locale-base-32bit is &lt;2.31-150300.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855747" version="1" comment="glibc-profile is &lt;2.31-150300.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855748" version="1" comment="glibc-profile-32bit is &lt;2.31-150300.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855749" version="1" comment="glibc-utils is &lt;2.31-150300.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855750" version="1" comment="glibc-utils-32bit is &lt;2.31-150300.74.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855751" version="1" comment="nscd is &lt;2.31-150300.74.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855752" version="1" comment="libpolkit-agent-1-0 is &lt;121-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855753" version="1" comment="libpolkit-agent-1-0-32bit is &lt;121-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855754" version="1" comment="libpolkit-gobject-1-0 is &lt;121-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855755" version="1" comment="libpolkit-gobject-1-0-32bit is &lt;121-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855756" version="1" comment="pkexec is &lt;121-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855757" version="1" comment="polkit is &lt;121-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855758" version="1" comment="polkit-devel is &lt;121-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855759" version="1" comment="polkit-doc is &lt;121-150500.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855760" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;121-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855761" version="1" comment="apache-commons-configuration is &lt;1.10-150200.3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855762" version="1" comment="apache-commons-configuration-javadoc is &lt;1.10-150200.3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818443" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818444" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818445" version="1" comment="libQt5Concurrent-devel is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818446" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818447" version="1" comment="libQt5Concurrent5 is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818448" version="1" comment="libQt5Concurrent5-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818449" version="1" comment="libQt5Core-devel is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818450" version="1" comment="libQt5Core-devel-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818451" version="1" comment="libQt5Core-private-headers-devel is &lt;5.15.8+kde185-150500.4.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818452" version="1" comment="libQt5Core5 is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818453" version="1" comment="libQt5Core5-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818454" version="1" comment="libQt5DBus-devel is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818455" version="1" comment="libQt5DBus-devel-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818456" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.15.8+kde185-150500.4.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818457" version="1" comment="libQt5DBus5 is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818458" version="1" comment="libQt5DBus5-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818459" version="1" comment="libQt5Gui-devel is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818460" version="1" comment="libQt5Gui-devel-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818461" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.15.8+kde185-150500.4.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818462" version="1" comment="libQt5Gui5 is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818463" version="1" comment="libQt5Gui5-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818464" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818465" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.15.8+kde185-150500.4.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818466" version="1" comment="libQt5Network-devel is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818467" version="1" comment="libQt5Network-devel-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818468" version="1" comment="libQt5Network-private-headers-devel is &lt;5.15.8+kde185-150500.4.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818469" version="1" comment="libQt5Network5 is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818470" version="1" comment="libQt5Network5-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818471" version="1" comment="libQt5OpenGL-devel is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818472" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818473" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.15.8+kde185-150500.4.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818474" version="1" comment="libQt5OpenGL5 is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818475" version="1" comment="libQt5OpenGL5-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818476" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818477" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818478" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818479" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818480" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818481" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.15.8+kde185-150500.4.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818482" version="1" comment="libQt5PrintSupport-devel is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818483" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818484" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.15.8+kde185-150500.4.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818485" version="1" comment="libQt5PrintSupport5 is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818486" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818487" version="1" comment="libQt5Sql-devel is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818488" version="1" comment="libQt5Sql-devel-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818489" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.15.8+kde185-150500.4.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818490" version="1" comment="libQt5Sql5 is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818491" version="1" comment="libQt5Sql5-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818492" version="1" comment="libQt5Sql5-mysql is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818493" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818494" version="1" comment="libQt5Sql5-postgresql is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818495" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818496" version="1" comment="libQt5Sql5-sqlite is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818497" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818498" version="1" comment="libQt5Sql5-unixODBC is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818499" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818500" version="1" comment="libQt5Test-devel is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818501" version="1" comment="libQt5Test-devel-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818502" version="1" comment="libQt5Test-private-headers-devel is &lt;5.15.8+kde185-150500.4.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818503" version="1" comment="libQt5Test5 is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818504" version="1" comment="libQt5Test5-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818505" version="1" comment="libQt5Widgets-devel is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818506" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818507" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.15.8+kde185-150500.4.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818508" version="1" comment="libQt5Widgets5 is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818509" version="1" comment="libQt5Widgets5-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818510" version="1" comment="libQt5Xml-devel is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818511" version="1" comment="libQt5Xml-devel-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818512" version="1" comment="libQt5Xml5 is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818513" version="1" comment="libQt5Xml5-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818514" version="1" comment="libqt5-qtbase-common-devel is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818515" version="1" comment="libqt5-qtbase-devel is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818516" version="1" comment="libqt5-qtbase-examples is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818517" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.15.8+kde185-150500.4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818518" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818519" version="1" comment="libqt5-qtbase-platformtheme-xdgdesktopportal is &lt;5.15.8+kde185-150500.4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818520" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.15.8+kde185-150500.4.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819301" version="1" comment="libssh-config is &lt;0.9.8-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819302" version="1" comment="libssh-devel is &lt;0.9.8-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819303" version="1" comment="libssh4 is &lt;0.9.8-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819304" version="1" comment="libssh4-32bit is &lt;0.9.8-150400.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855867" version="1" comment="opensc is &lt;0.22.0-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855868" version="1" comment="opensc-32bit is &lt;0.22.0-150400.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855869" version="1" comment="kubernetes1.24-apiserver is &lt;1.24.17-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855870" version="1" comment="kubernetes1.24-client is &lt;1.24.17-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855871" version="1" comment="kubernetes1.24-client-bash-completion is &lt;1.24.17-150500.3.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855872" version="1" comment="kubernetes1.24-client-common is &lt;1.24.17-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855873" version="1" comment="kubernetes1.24-client-fish-completion is &lt;1.24.17-150500.3.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855874" version="1" comment="kubernetes1.24-controller-manager is &lt;1.24.17-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855875" version="1" comment="kubernetes1.24-kubeadm is &lt;1.24.17-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855876" version="1" comment="kubernetes1.24-kubelet is &lt;1.24.17-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855877" version="1" comment="kubernetes1.24-kubelet-common is &lt;1.24.17-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855878" version="1" comment="kubernetes1.24-proxy is &lt;1.24.17-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855879" version="1" comment="kubernetes1.24-scheduler is &lt;1.24.17-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855880" version="1" comment="kubernetes1.23-apiserver is &lt;1.23.17-150500.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855881" version="1" comment="kubernetes1.23-client is &lt;1.23.17-150500.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855882" version="1" comment="kubernetes1.23-client-bash-completion is &lt;1.23.17-150500.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855883" version="1" comment="kubernetes1.23-client-common is &lt;1.23.17-150500.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855884" version="1" comment="kubernetes1.23-client-fish-completion is &lt;1.23.17-150500.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855885" version="1" comment="kubernetes1.23-controller-manager is &lt;1.23.17-150500.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855886" version="1" comment="kubernetes1.23-kubeadm is &lt;1.23.17-150500.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855887" version="1" comment="kubernetes1.23-kubelet is &lt;1.23.17-150500.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855888" version="1" comment="kubernetes1.23-kubelet-common is &lt;1.23.17-150500.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855889" version="1" comment="kubernetes1.23-proxy is &lt;1.23.17-150500.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855890" version="1" comment="kubernetes1.23-scheduler is &lt;1.23.17-150500.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819766" version="1" comment="cluster-md-kmp-azure is &lt;5.14.21-150500.33.29.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819767" version="1" comment="dlm-kmp-azure is &lt;5.14.21-150500.33.29.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819768" version="1" comment="gfs2-kmp-azure is &lt;5.14.21-150500.33.29.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819769" version="1" comment="kernel-azure is &lt;5.14.21-150500.33.29.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819770" version="1" comment="kernel-azure-devel is &lt;5.14.21-150500.33.29.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819771" version="1" comment="kernel-azure-extra is &lt;5.14.21-150500.33.29.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819772" version="1" comment="kernel-azure-livepatch-devel is &lt;5.14.21-150500.33.29.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819773" version="1" comment="kernel-azure-optional is &lt;5.14.21-150500.33.29.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819774" version="1" comment="kernel-azure-vdso is &lt;5.14.21-150500.33.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819775" version="1" comment="kernel-devel-azure is &lt;5.14.21-150500.33.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819776" version="1" comment="kernel-source-azure is &lt;5.14.21-150500.33.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819777" version="1" comment="kernel-syms-azure is &lt;5.14.21-150500.33.29.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819778" version="1" comment="kselftests-kmp-azure is &lt;5.14.21-150500.33.29.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819779" version="1" comment="ocfs2-kmp-azure is &lt;5.14.21-150500.33.29.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819780" version="1" comment="reiserfs-kmp-azure is &lt;5.14.21-150500.33.29.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857740" version="1" comment="MozillaThunderbird is &lt;115.10.1-150200.8.157.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857741" version="1" comment="MozillaThunderbird-translations-common is &lt;115.10.1-150200.8.157.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857742" version="1" comment="MozillaThunderbird-translations-other is &lt;115.10.1-150200.8.157.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857743" version="1" comment="qemu is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857744" version="1" comment="qemu-SLOF is &lt;7.1.0-150500.49.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857745" version="1" comment="qemu-accel-qtest is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857746" version="1" comment="qemu-accel-tcg-x86 is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857747" version="1" comment="qemu-arm is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857748" version="1" comment="qemu-audio-alsa is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857749" version="1" comment="qemu-audio-dbus is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857750" version="1" comment="qemu-audio-jack is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857751" version="1" comment="qemu-audio-pa is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857752" version="1" comment="qemu-audio-spice is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857753" version="1" comment="qemu-block-curl is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857754" version="1" comment="qemu-block-dmg is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857755" version="1" comment="qemu-block-gluster is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857756" version="1" comment="qemu-block-iscsi is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857757" version="1" comment="qemu-block-nfs is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857758" version="1" comment="qemu-block-rbd is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857759" version="1" comment="qemu-block-ssh is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857760" version="1" comment="qemu-chardev-baum is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857761" version="1" comment="qemu-chardev-spice is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857762" version="1" comment="qemu-extra is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857763" version="1" comment="qemu-guest-agent is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857764" version="1" comment="qemu-hw-display-qxl is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857765" version="1" comment="qemu-hw-display-virtio-gpu is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857766" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857767" version="1" comment="qemu-hw-display-virtio-vga is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857768" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857769" version="1" comment="qemu-hw-usb-host is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857770" version="1" comment="qemu-hw-usb-redirect is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857771" version="1" comment="qemu-hw-usb-smartcard is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857772" version="1" comment="qemu-ipxe is &lt;1.0.0+-150500.49.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857773" version="1" comment="qemu-ivshmem-tools is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857774" version="1" comment="qemu-ksm is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857775" version="1" comment="qemu-kvm is &lt;7.1.0-150500.49.15.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857776" version="1" comment="qemu-lang is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857777" version="1" comment="qemu-microvm is &lt;7.1.0-150500.49.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857778" version="1" comment="qemu-ppc is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857779" version="1" comment="qemu-s390x is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857780" version="1" comment="qemu-seabios is &lt;1.16.0_0_gd239552-150500.49.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857781" version="1" comment="qemu-sgabios is &lt;8-150500.49.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857782" version="1" comment="qemu-skiboot is &lt;7.1.0-150500.49.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857783" version="1" comment="qemu-tools is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857784" version="1" comment="qemu-ui-curses is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857785" version="1" comment="qemu-ui-dbus is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857786" version="1" comment="qemu-ui-gtk is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857787" version="1" comment="qemu-ui-opengl is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857788" version="1" comment="qemu-ui-spice-app is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857789" version="1" comment="qemu-ui-spice-core is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857790" version="1" comment="qemu-vgabios is &lt;1.16.0_0_gd239552-150500.49.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857791" version="1" comment="qemu-vhost-user-gpu is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857792" version="1" comment="qemu-x86 is &lt;7.1.0-150500.49.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857793" version="1" comment="python3-idna is &lt;2.6-150000.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857888" version="1" comment="python311-gunicorn is &lt;20.1.0-150400.12.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857889" version="1" comment="apache2-mod_php7 is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857890" version="1" comment="php7 is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857891" version="1" comment="php7-bcmath is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857892" version="1" comment="php7-bz2 is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857893" version="1" comment="php7-calendar is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857894" version="1" comment="php7-cli is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857895" version="1" comment="php7-ctype is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857896" version="1" comment="php7-curl is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857897" version="1" comment="php7-dba is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857898" version="1" comment="php7-devel is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857899" version="1" comment="php7-dom is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857900" version="1" comment="php7-embed is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857901" version="1" comment="php7-enchant is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857902" version="1" comment="php7-exif is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857903" version="1" comment="php7-fastcgi is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857904" version="1" comment="php7-fileinfo is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857905" version="1" comment="php7-fpm is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857906" version="1" comment="php7-ftp is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857907" version="1" comment="php7-gd is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857908" version="1" comment="php7-gettext is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857909" version="1" comment="php7-gmp is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857910" version="1" comment="php7-iconv is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857911" version="1" comment="php7-intl is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857912" version="1" comment="php7-json is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857913" version="1" comment="php7-ldap is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857914" version="1" comment="php7-mbstring is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857915" version="1" comment="php7-mysql is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857916" version="1" comment="php7-odbc is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857917" version="1" comment="php7-opcache is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857918" version="1" comment="php7-openssl is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857919" version="1" comment="php7-pcntl is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857920" version="1" comment="php7-pdo is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857921" version="1" comment="php7-pgsql is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857922" version="1" comment="php7-phar is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857923" version="1" comment="php7-posix is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857924" version="1" comment="php7-readline is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857925" version="1" comment="php7-shmop is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857926" version="1" comment="php7-snmp is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857927" version="1" comment="php7-soap is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857928" version="1" comment="php7-sockets is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857929" version="1" comment="php7-sodium is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857930" version="1" comment="php7-sqlite is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857931" version="1" comment="php7-sysvmsg is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857932" version="1" comment="php7-sysvsem is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857933" version="1" comment="php7-sysvshm is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857934" version="1" comment="php7-test is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857935" version="1" comment="php7-tidy is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857936" version="1" comment="php7-tokenizer is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857937" version="1" comment="php7-xmlreader is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857938" version="1" comment="php7-xmlrpc is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857939" version="1" comment="php7-xmlwriter is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857940" version="1" comment="php7-xsl is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857941" version="1" comment="php7-zip is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857942" version="1" comment="php7-zlib is &lt;7.4.33-150400.4.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857943" version="1" comment="apache2-mod_php8 is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857944" version="1" comment="php8 is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857945" version="1" comment="php8-bcmath is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857946" version="1" comment="php8-bz2 is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857947" version="1" comment="php8-calendar is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857948" version="1" comment="php8-cli is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857949" version="1" comment="php8-ctype is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857950" version="1" comment="php8-curl is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857951" version="1" comment="php8-dba is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857952" version="1" comment="php8-devel is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857953" version="1" comment="php8-dom is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857954" version="1" comment="php8-embed is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857955" version="1" comment="php8-enchant is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857956" version="1" comment="php8-exif is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857957" version="1" comment="php8-fastcgi is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857958" version="1" comment="php8-fileinfo is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857959" version="1" comment="php8-fpm is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857960" version="1" comment="php8-ftp is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857961" version="1" comment="php8-gd is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857962" version="1" comment="php8-gettext is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857963" version="1" comment="php8-gmp is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857964" version="1" comment="php8-iconv is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857965" version="1" comment="php8-intl is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857966" version="1" comment="php8-ldap is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857967" version="1" comment="php8-mbstring is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857968" version="1" comment="php8-mysql is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857969" version="1" comment="php8-odbc is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857970" version="1" comment="php8-opcache is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857971" version="1" comment="php8-openssl is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857972" version="1" comment="php8-pcntl is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857973" version="1" comment="php8-pdo is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857974" version="1" comment="php8-pgsql is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857975" version="1" comment="php8-phar is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857976" version="1" comment="php8-posix is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857977" version="1" comment="php8-readline is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857978" version="1" comment="php8-shmop is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857979" version="1" comment="php8-snmp is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857980" version="1" comment="php8-soap is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857981" version="1" comment="php8-sockets is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857982" version="1" comment="php8-sodium is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857983" version="1" comment="php8-sqlite is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857984" version="1" comment="php8-sysvmsg is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857985" version="1" comment="php8-sysvsem is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857986" version="1" comment="php8-sysvshm is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857987" version="1" comment="php8-test is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857988" version="1" comment="php8-tidy is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857989" version="1" comment="php8-tokenizer is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857990" version="1" comment="php8-xmlreader is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857991" version="1" comment="php8-xmlwriter is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857992" version="1" comment="php8-xsl is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857993" version="1" comment="php8-zip is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857994" version="1" comment="php8-zlib is &lt;8.0.30-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857995" version="1" comment="openCryptoki is &lt;3.23.0-150500.3.3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857996" version="1" comment="openCryptoki-64bit is &lt;3.23.0-150500.3.3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857997" version="1" comment="openCryptoki-devel is &lt;3.23.0-150500.3.3.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858075" version="1" comment="python-M2Crypto-doc is &lt;0.40.0-150400.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858076" version="1" comment="python311-M2Crypto is &lt;0.40.0-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858077" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.412-150000.3.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858078" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.412-150000.3.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858079" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.412-150000.3.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858080" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.412-150000.3.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858081" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.412-150000.3.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858082" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.412-150000.3.91.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858083" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.412-150000.3.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858084" version="1" comment="frr is &lt;8.4-150500.4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858085" version="1" comment="frr-devel is &lt;8.4-150500.4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858086" version="1" comment="libfrr0 is &lt;8.4-150500.4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858087" version="1" comment="libfrr_pb0 is &lt;8.4-150500.4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858088" version="1" comment="libfrrcares0 is &lt;8.4-150500.4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858089" version="1" comment="libfrrfpm_pb0 is &lt;8.4-150500.4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858090" version="1" comment="libfrrospfapiclient0 is &lt;8.4-150500.4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858091" version="1" comment="libfrrsnmp0 is &lt;8.4-150500.4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858092" version="1" comment="libfrrzmq0 is &lt;8.4-150500.4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858093" version="1" comment="libmlag_pb0 is &lt;8.4-150500.4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858167" version="1" comment="jasper is &lt;2.0.14-150000.3.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858168" version="1" comment="libjasper-devel is &lt;2.0.14-150000.3.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858169" version="1" comment="libjasper4 is &lt;2.0.14-150000.3.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858170" version="1" comment="libjasper4-32bit is &lt;2.0.14-150000.3.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858171" version="1" comment="cluster-md-kmp-rt is &lt;5.14.21-150500.13.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858172" version="1" comment="dlm-kmp-rt is &lt;5.14.21-150500.13.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858173" version="1" comment="gfs2-kmp-rt is &lt;5.14.21-150500.13.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858174" version="1" comment="kernel-devel-rt is &lt;5.14.21-150500.13.47.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858175" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858176" version="1" comment="kernel-rt-devel is &lt;5.14.21-150500.13.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858177" version="1" comment="kernel-rt-extra is &lt;5.14.21-150500.13.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858178" version="1" comment="kernel-rt-livepatch is &lt;5.14.21-150500.13.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858179" version="1" comment="kernel-rt-livepatch-devel is &lt;5.14.21-150500.13.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858180" version="1" comment="kernel-rt-optional is &lt;5.14.21-150500.13.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858181" version="1" comment="kernel-rt-vdso is &lt;5.14.21-150500.13.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858182" version="1" comment="kernel-rt_debug is &lt;5.14.21-150500.13.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858183" version="1" comment="kernel-rt_debug-devel is &lt;5.14.21-150500.13.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858184" version="1" comment="kernel-rt_debug-livepatch-devel is &lt;5.14.21-150500.13.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858185" version="1" comment="kernel-rt_debug-vdso is &lt;5.14.21-150500.13.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858186" version="1" comment="kernel-source-rt is &lt;5.14.21-150500.13.47.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858187" version="1" comment="kernel-syms-rt is &lt;5.14.21-150500.13.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858188" version="1" comment="kselftests-kmp-rt is &lt;5.14.21-150500.13.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858189" version="1" comment="ocfs2-kmp-rt is &lt;5.14.21-150500.13.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858190" version="1" comment="reiserfs-kmp-rt is &lt;5.14.21-150500.13.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858191" version="1" comment="ffmpeg is &lt;3.4.2-150200.11.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858192" version="1" comment="ffmpeg-private-devel is &lt;3.4.2-150200.11.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858193" version="1" comment="libavcodec-devel is &lt;3.4.2-150200.11.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858194" version="1" comment="libavcodec57 is &lt;3.4.2-150200.11.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858195" version="1" comment="libavcodec57-32bit is &lt;3.4.2-150200.11.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858196" version="1" comment="libavdevice-devel is &lt;3.4.2-150200.11.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858197" version="1" comment="libavdevice57 is &lt;3.4.2-150200.11.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858198" version="1" comment="libavdevice57-32bit is &lt;3.4.2-150200.11.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858199" version="1" comment="libavfilter-devel is &lt;3.4.2-150200.11.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858200" version="1" comment="libavfilter6 is &lt;3.4.2-150200.11.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858201" version="1" comment="libavfilter6-32bit is &lt;3.4.2-150200.11.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858202" version="1" comment="libavformat-devel is &lt;3.4.2-150200.11.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858203" version="1" comment="libavformat57 is &lt;3.4.2-150200.11.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858204" version="1" comment="libavformat57-32bit is &lt;3.4.2-150200.11.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858205" version="1" comment="libavresample-devel is &lt;3.4.2-150200.11.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858206" version="1" comment="libavresample3 is &lt;3.4.2-150200.11.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858207" version="1" comment="libavresample3-32bit is &lt;3.4.2-150200.11.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858208" version="1" comment="libavutil-devel is &lt;3.4.2-150200.11.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858209" version="1" comment="libavutil55 is &lt;3.4.2-150200.11.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858210" version="1" comment="libavutil55-32bit is &lt;3.4.2-150200.11.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858211" version="1" comment="libpostproc-devel is &lt;3.4.2-150200.11.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858212" version="1" comment="libpostproc54 is &lt;3.4.2-150200.11.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858213" version="1" comment="libpostproc54-32bit is &lt;3.4.2-150200.11.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858214" version="1" comment="libswresample-devel is &lt;3.4.2-150200.11.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858215" version="1" comment="libswresample2 is &lt;3.4.2-150200.11.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858216" version="1" comment="libswresample2-32bit is &lt;3.4.2-150200.11.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858217" version="1" comment="libswscale-devel is &lt;3.4.2-150200.11.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858218" version="1" comment="libswscale4 is &lt;3.4.2-150200.11.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858219" version="1" comment="libswscale4-32bit is &lt;3.4.2-150200.11.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858220" version="1" comment="ffmpeg-4 is &lt;4.4-150400.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858221" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.4-150400.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858222" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.4-150400.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858223" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.4-150400.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858224" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.4-150400.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858225" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.4-150400.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858226" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.4-150400.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858227" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.4-150400.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858228" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.4-150400.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858229" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.4-150400.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858230" version="1" comment="ffmpeg-4-private-devel is &lt;4.4-150400.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858231" version="1" comment="libavcodec58_134 is &lt;4.4-150400.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858232" version="1" comment="libavcodec58_134-32bit is &lt;4.4-150400.3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858233" version="1" comment="libavdevice58_13 is &lt;4.4-150400.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858234" version="1" comment="libavdevice58_13-32bit is &lt;4.4-150400.3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858235" version="1" comment="libavfilter7_110 is &lt;4.4-150400.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858236" version="1" comment="libavfilter7_110-32bit is &lt;4.4-150400.3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858237" version="1" comment="libavformat58_76 is &lt;4.4-150400.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858238" version="1" comment="libavformat58_76-32bit is &lt;4.4-150400.3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858239" version="1" comment="libavresample4_0 is &lt;4.4-150400.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858240" version="1" comment="libavresample4_0-32bit is &lt;4.4-150400.3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858241" version="1" comment="libavutil56_70 is &lt;4.4-150400.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858242" version="1" comment="libavutil56_70-32bit is &lt;4.4-150400.3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858243" version="1" comment="libpostproc55_9 is &lt;4.4-150400.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858244" version="1" comment="libpostproc55_9-32bit is &lt;4.4-150400.3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858245" version="1" comment="libswresample3_9 is &lt;4.4-150400.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858246" version="1" comment="libswresample3_9-32bit is &lt;4.4-150400.3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858247" version="1" comment="libswscale5_9 is &lt;4.4-150400.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858248" version="1" comment="libswscale5_9-32bit is &lt;4.4-150400.3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858494" version="1" comment="cluster-md-kmp-64kb is &lt;5.14.21-150500.55.59.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858495" version="1" comment="cluster-md-kmp-default is &lt;5.14.21-150500.55.59.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858496" version="1" comment="dlm-kmp-64kb is &lt;5.14.21-150500.55.59.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858497" version="1" comment="dlm-kmp-default is &lt;5.14.21-150500.55.59.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858498" version="1" comment="dtb-allwinner is &lt;5.14.21-150500.55.59.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858499" version="1" comment="dtb-altera is &lt;5.14.21-150500.55.59.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858500" version="1" comment="dtb-amazon is &lt;5.14.21-150500.55.59.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858501" version="1" comment="dtb-amd is &lt;5.14.21-150500.55.59.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858502" version="1" comment="dtb-amlogic is &lt;5.14.21-150500.55.59.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858503" version="1" comment="dtb-apm is &lt;5.14.21-150500.55.59.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858504" version="1" comment="dtb-apple is &lt;5.14.21-150500.55.59.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858505" version="1" comment="dtb-arm is &lt;5.14.21-150500.55.59.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858506" version="1" comment="dtb-broadcom is &lt;5.14.21-150500.55.59.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858507" version="1" comment="dtb-cavium is &lt;5.14.21-150500.55.59.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858508" version="1" comment="dtb-exynos is &lt;5.14.21-150500.55.59.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858509" version="1" comment="dtb-freescale is &lt;5.14.21-150500.55.59.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858510" version="1" comment="dtb-hisilicon is &lt;5.14.21-150500.55.59.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858511" version="1" comment="dtb-lg is &lt;5.14.21-150500.55.59.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858512" version="1" comment="dtb-marvell is &lt;5.14.21-150500.55.59.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858513" version="1" comment="dtb-mediatek is &lt;5.14.21-150500.55.59.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858514" version="1" comment="dtb-nvidia is &lt;5.14.21-150500.55.59.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858515" version="1" comment="dtb-qcom is &lt;5.14.21-150500.55.59.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858516" version="1" comment="dtb-renesas is &lt;5.14.21-150500.55.59.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858517" version="1" comment="dtb-rockchip is &lt;5.14.21-150500.55.59.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858518" version="1" comment="dtb-socionext is &lt;5.14.21-150500.55.59.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858519" version="1" comment="dtb-sprd is &lt;5.14.21-150500.55.59.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858520" version="1" comment="dtb-xilinx is &lt;5.14.21-150500.55.59.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858521" version="1" comment="gfs2-kmp-64kb is &lt;5.14.21-150500.55.59.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858522" version="1" comment="gfs2-kmp-default is &lt;5.14.21-150500.55.59.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858523" version="1" comment="kernel-64kb is &lt;5.14.21-150500.55.59.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858524" version="1" comment="kernel-64kb-devel is &lt;5.14.21-150500.55.59.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858525" version="1" comment="kernel-64kb-extra is &lt;5.14.21-150500.55.59.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858526" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.14.21-150500.55.59.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858527" version="1" comment="kernel-64kb-optional is &lt;5.14.21-150500.55.59.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858528" version="1" comment="kernel-debug is &lt;5.14.21-150500.55.59.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858529" version="1" comment="kernel-debug-devel is &lt;5.14.21-150500.55.59.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858530" version="1" comment="kernel-debug-livepatch-devel is &lt;5.14.21-150500.55.59.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858531" version="1" comment="kernel-debug-vdso is &lt;5.14.21-150500.55.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858532" version="1" comment="kernel-default is &lt;5.14.21-150500.55.59.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858533" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.59.1.150500.6.25.7 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858534" version="1" comment="kernel-default-base-rebuild is &lt;5.14.21-150500.55.59.1.150500.6.25.7 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858535" version="1" comment="kernel-default-devel is &lt;5.14.21-150500.55.59.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858536" version="1" comment="kernel-default-extra is &lt;5.14.21-150500.55.59.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858537" version="1" comment="kernel-default-livepatch is &lt;5.14.21-150500.55.59.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858538" version="1" comment="kernel-default-livepatch-devel is &lt;5.14.21-150500.55.59.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858539" version="1" comment="kernel-default-optional is &lt;5.14.21-150500.55.59.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858540" version="1" comment="kernel-default-vdso is &lt;5.14.21-150500.55.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858541" version="1" comment="kernel-devel is &lt;5.14.21-150500.55.59.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858542" version="1" comment="kernel-docs is &lt;5.14.21-150500.55.59.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858543" version="1" comment="kernel-docs-html is &lt;5.14.21-150500.55.59.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858544" version="1" comment="kernel-kvmsmall is &lt;5.14.21-150500.55.59.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858545" version="1" comment="kernel-kvmsmall-devel is &lt;5.14.21-150500.55.59.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858546" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.14.21-150500.55.59.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858547" version="1" comment="kernel-kvmsmall-vdso is &lt;5.14.21-150500.55.59.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858548" version="1" comment="kernel-macros is &lt;5.14.21-150500.55.59.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858549" version="1" comment="kernel-obs-build is &lt;5.14.21-150500.55.59.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858550" version="1" comment="kernel-obs-qa is &lt;5.14.21-150500.55.59.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858551" version="1" comment="kernel-source is &lt;5.14.21-150500.55.59.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858552" version="1" comment="kernel-source-vanilla is &lt;5.14.21-150500.55.59.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858553" version="1" comment="kernel-syms is &lt;5.14.21-150500.55.59.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858554" version="1" comment="kernel-zfcpdump is &lt;5.14.21-150500.55.59.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858555" version="1" comment="kselftests-kmp-64kb is &lt;5.14.21-150500.55.59.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858556" version="1" comment="kselftests-kmp-default is &lt;5.14.21-150500.55.59.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858557" version="1" comment="ocfs2-kmp-64kb is &lt;5.14.21-150500.55.59.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858558" version="1" comment="ocfs2-kmp-default is &lt;5.14.21-150500.55.59.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858559" version="1" comment="reiserfs-kmp-64kb is &lt;5.14.21-150500.55.59.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858560" version="1" comment="reiserfs-kmp-default is &lt;5.14.21-150500.55.59.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858723" version="1" comment="cosign is &lt;2.2.4-150400.3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858782" version="1" comment="cluster-md-kmp-azure is &lt;5.14.21-150500.33.48.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858783" version="1" comment="dlm-kmp-azure is &lt;5.14.21-150500.33.48.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858784" version="1" comment="gfs2-kmp-azure is &lt;5.14.21-150500.33.48.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858785" version="1" comment="kernel-azure is &lt;5.14.21-150500.33.48.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858786" version="1" comment="kernel-azure-devel is &lt;5.14.21-150500.33.48.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858787" version="1" comment="kernel-azure-extra is &lt;5.14.21-150500.33.48.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858788" version="1" comment="kernel-azure-livepatch-devel is &lt;5.14.21-150500.33.48.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858789" version="1" comment="kernel-azure-optional is &lt;5.14.21-150500.33.48.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858790" version="1" comment="kernel-azure-vdso is &lt;5.14.21-150500.33.48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858791" version="1" comment="kernel-devel-azure is &lt;5.14.21-150500.33.48.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858792" version="1" comment="kernel-source-azure is &lt;5.14.21-150500.33.48.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858793" version="1" comment="kernel-syms-azure is &lt;5.14.21-150500.33.48.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858794" version="1" comment="kselftests-kmp-azure is &lt;5.14.21-150500.33.48.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858795" version="1" comment="ocfs2-kmp-azure is &lt;5.14.21-150500.33.48.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858796" version="1" comment="reiserfs-kmp-azure is &lt;5.14.21-150500.33.48.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858929" version="1" comment="skopeo is &lt;1.14.2-150300.11.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858930" version="1" comment="java-11-openjdk is &lt;11.0.23.0-150000.3.113.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858931" version="1" comment="java-11-openjdk-demo is &lt;11.0.23.0-150000.3.113.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858932" version="1" comment="java-11-openjdk-devel is &lt;11.0.23.0-150000.3.113.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858933" version="1" comment="java-11-openjdk-headless is &lt;11.0.23.0-150000.3.113.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858934" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.23.0-150000.3.113.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858935" version="1" comment="java-11-openjdk-jmods is &lt;11.0.23.0-150000.3.113.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858936" version="1" comment="java-11-openjdk-src is &lt;11.0.23.0-150000.3.113.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858937" version="1" comment="java-17-openjdk is &lt;17.0.11.0-150400.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858938" version="1" comment="java-17-openjdk-demo is &lt;17.0.11.0-150400.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858939" version="1" comment="java-17-openjdk-devel is &lt;17.0.11.0-150400.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858940" version="1" comment="java-17-openjdk-headless is &lt;17.0.11.0-150400.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858941" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.11.0-150400.3.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858942" version="1" comment="java-17-openjdk-jmods is &lt;17.0.11.0-150400.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858943" version="1" comment="java-17-openjdk-src is &lt;17.0.11.0-150400.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858944" version="1" comment="POS_Image-Graphical7 is &lt;0.1.1710765237.46af599-150000.1.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858945" version="1" comment="POS_Image-JeOS7 is &lt;0.1.1710765237.46af599-150000.1.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858946" version="1" comment="ansible is &lt;2.9.27-150000.1.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858947" version="1" comment="ansible-doc is &lt;2.9.27-150000.1.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858948" version="1" comment="ansible-test is &lt;2.9.27-150000.1.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858949" version="1" comment="dracut-saltboot is &lt;0.1.1710765237.46af599-150000.1.53.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858950" version="1" comment="golang-github-prometheus-promu is &lt;0.14.0-150000.3.18.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858951" version="1" comment="spacecmd is &lt;4.3.27-150000.3.116.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858952" version="1" comment="grafana is &lt;9.5.18-150200.3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858953" version="1" comment="mybatis is &lt;3.5.6-150200.5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858954" version="1" comment="mybatis-javadoc is &lt;3.5.6-150200.5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858955" version="1" comment="flatpak is &lt;1.14.5-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858956" version="1" comment="flatpak-devel is &lt;1.14.5-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858957" version="1" comment="flatpak-remote-flathub is &lt;1.14.5-150500.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858958" version="1" comment="flatpak-zsh-completion is &lt;1.14.5-150500.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858959" version="1" comment="libflatpak0 is &lt;1.14.5-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858960" version="1" comment="system-user-flatpak is &lt;1.14.5-150500.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858961" version="1" comment="typelib-1_0-Flatpak-1_0 is &lt;1.14.5-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859183" version="1" comment="bouncycastle is &lt;1.78.1-150200.3.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859184" version="1" comment="bouncycastle-javadoc is &lt;1.78.1-150200.3.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859185" version="1" comment="bouncycastle-jmail is &lt;1.78.1-150200.3.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859186" version="1" comment="bouncycastle-mail is &lt;1.78.1-150200.3.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859187" version="1" comment="bouncycastle-pg is &lt;1.78.1-150200.3.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859188" version="1" comment="bouncycastle-pkix is &lt;1.78.1-150200.3.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859189" version="1" comment="bouncycastle-tls is &lt;1.78.1-150200.3.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859190" version="1" comment="bouncycastle-util is &lt;1.78.1-150200.3.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859379" version="1" comment="libpython3_11-1_0 is &lt;3.11.9-150400.9.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859380" version="1" comment="libpython3_11-1_0-32bit is &lt;3.11.9-150400.9.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859381" version="1" comment="python311 is &lt;3.11.9-150400.9.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859382" version="1" comment="python311-32bit is &lt;3.11.9-150400.9.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859383" version="1" comment="python311-base is &lt;3.11.9-150400.9.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859384" version="1" comment="python311-base-32bit is &lt;3.11.9-150400.9.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859385" version="1" comment="python311-curses is &lt;3.11.9-150400.9.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859386" version="1" comment="python311-dbm is &lt;3.11.9-150400.9.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859387" version="1" comment="python311-devel is &lt;3.11.9-150400.9.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859388" version="1" comment="python311-doc is &lt;3.11.9-150400.9.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859389" version="1" comment="python311-doc-devhelp is &lt;3.11.9-150400.9.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859390" version="1" comment="python311-idle is &lt;3.11.9-150400.9.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859391" version="1" comment="python311-testsuite is &lt;3.11.9-150400.9.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859392" version="1" comment="python311-tk is &lt;3.11.9-150400.9.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859393" version="1" comment="python311-tools is &lt;3.11.9-150400.9.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859394" version="1" comment="python3-rpm is &lt;4.14.3-150400.59.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859395" version="1" comment="python311-rpm is &lt;4.14.3-150400.59.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859396" version="1" comment="rpm is &lt;4.14.3-150400.59.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859397" version="1" comment="rpm-32bit is &lt;4.14.3-150400.59.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859398" version="1" comment="rpm-build is &lt;4.14.3-150400.59.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859399" version="1" comment="rpm-devel is &lt;4.14.3-150400.59.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859400" version="1" comment="rpm-ndb is &lt;4.14.3-150400.59.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859401" version="1" comment="rpm-ndb-32bit is &lt;4.14.3-150400.59.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818860" version="1" comment="libcryptopp-devel is &lt;8.6.0-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818861" version="1" comment="libcryptopp8_6_0 is &lt;8.6.0-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818862" version="1" comment="libcryptopp8_6_0-32bit is &lt;8.6.0-150400.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859633" version="1" comment="python3-pymongo is &lt;3.11.0-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859634" version="1" comment="libipa_hbac-devel is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859635" version="1" comment="libipa_hbac0 is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859636" version="1" comment="libnfsidmap-sss is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859637" version="1" comment="libsss_certmap-devel is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859638" version="1" comment="libsss_certmap0 is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859639" version="1" comment="libsss_idmap-devel is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859640" version="1" comment="libsss_idmap0 is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859641" version="1" comment="libsss_nss_idmap-devel is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859642" version="1" comment="libsss_nss_idmap0 is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859643" version="1" comment="libsss_simpleifp-devel is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859644" version="1" comment="libsss_simpleifp0 is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859645" version="1" comment="python3-ipa_hbac is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859646" version="1" comment="python3-sss-murmur is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859647" version="1" comment="python3-sss_nss_idmap is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859648" version="1" comment="python3-sssd-config is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859649" version="1" comment="sssd is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859650" version="1" comment="sssd-ad is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859651" version="1" comment="sssd-common is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859652" version="1" comment="sssd-common-32bit is &lt;2.5.2-150500.10.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859653" version="1" comment="sssd-dbus is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859654" version="1" comment="sssd-ipa is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859655" version="1" comment="sssd-kcm is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859656" version="1" comment="sssd-krb5 is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859657" version="1" comment="sssd-krb5-common is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859658" version="1" comment="sssd-ldap is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859659" version="1" comment="sssd-proxy is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859660" version="1" comment="sssd-tools is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859661" version="1" comment="sssd-winbind-idmap is &lt;2.5.2-150500.10.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818425" version="1" comment="perl-Spreadsheet-ParseExcel is &lt;0.65-150000.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860179" version="1" comment="go1.22 is &lt;1.22.3-150000.1.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860180" version="1" comment="go1.22-doc is &lt;1.22.3-150000.1.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860181" version="1" comment="go1.22-race is &lt;1.22.3-150000.1.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860182" version="1" comment="go1.21 is &lt;1.21.10-150000.1.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860183" version="1" comment="go1.21-doc is &lt;1.21.10-150000.1.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860184" version="1" comment="go1.21-race is &lt;1.21.10-150000.1.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860185" version="1" comment="ghostscript is &lt;9.52-150000.188.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860186" version="1" comment="ghostscript-devel is &lt;9.52-150000.188.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860187" version="1" comment="ghostscript-x11 is &lt;9.52-150000.188.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860188" version="1" comment="python311-Werkzeug is &lt;2.3.6-150400.6.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860189" version="1" comment="ffmpeg-4 is &lt;4.4-150400.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860190" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.4-150400.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860191" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.4-150400.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860192" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.4-150400.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860193" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.4-150400.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860194" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.4-150400.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860195" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.4-150400.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860196" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.4-150400.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860197" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.4-150400.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860198" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.4-150400.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860199" version="1" comment="ffmpeg-4-private-devel is &lt;4.4-150400.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860200" version="1" comment="libavcodec58_134 is &lt;4.4-150400.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860201" version="1" comment="libavcodec58_134-32bit is &lt;4.4-150400.3.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860202" version="1" comment="libavdevice58_13 is &lt;4.4-150400.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860203" version="1" comment="libavdevice58_13-32bit is &lt;4.4-150400.3.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860204" version="1" comment="libavfilter7_110 is &lt;4.4-150400.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860205" version="1" comment="libavfilter7_110-32bit is &lt;4.4-150400.3.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860206" version="1" comment="libavformat58_76 is &lt;4.4-150400.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860207" version="1" comment="libavformat58_76-32bit is &lt;4.4-150400.3.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860208" version="1" comment="libavresample4_0 is &lt;4.4-150400.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860209" version="1" comment="libavresample4_0-32bit is &lt;4.4-150400.3.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860210" version="1" comment="libavutil56_70 is &lt;4.4-150400.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860211" version="1" comment="libavutil56_70-32bit is &lt;4.4-150400.3.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860212" version="1" comment="libpostproc55_9 is &lt;4.4-150400.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860213" version="1" comment="libpostproc55_9-32bit is &lt;4.4-150400.3.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860214" version="1" comment="libswresample3_9 is &lt;4.4-150400.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860215" version="1" comment="libswresample3_9-32bit is &lt;4.4-150400.3.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860216" version="1" comment="libswscale5_9 is &lt;4.4-150400.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860217" version="1" comment="libswscale5_9-32bit is &lt;4.4-150400.3.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860218" version="1" comment="ffmpeg is &lt;3.4.2-150200.11.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860219" version="1" comment="ffmpeg-private-devel is &lt;3.4.2-150200.11.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860220" version="1" comment="libavcodec-devel is &lt;3.4.2-150200.11.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860221" version="1" comment="libavcodec57 is &lt;3.4.2-150200.11.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860222" version="1" comment="libavcodec57-32bit is &lt;3.4.2-150200.11.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860223" version="1" comment="libavdevice-devel is &lt;3.4.2-150200.11.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860224" version="1" comment="libavdevice57 is &lt;3.4.2-150200.11.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860225" version="1" comment="libavdevice57-32bit is &lt;3.4.2-150200.11.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860226" version="1" comment="libavfilter-devel is &lt;3.4.2-150200.11.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860227" version="1" comment="libavfilter6 is &lt;3.4.2-150200.11.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860228" version="1" comment="libavfilter6-32bit is &lt;3.4.2-150200.11.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860229" version="1" comment="libavformat-devel is &lt;3.4.2-150200.11.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860230" version="1" comment="libavformat57 is &lt;3.4.2-150200.11.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860231" version="1" comment="libavformat57-32bit is &lt;3.4.2-150200.11.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860232" version="1" comment="libavresample-devel is &lt;3.4.2-150200.11.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860233" version="1" comment="libavresample3 is &lt;3.4.2-150200.11.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860234" version="1" comment="libavresample3-32bit is &lt;3.4.2-150200.11.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860235" version="1" comment="libavutil-devel is &lt;3.4.2-150200.11.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860236" version="1" comment="libavutil55 is &lt;3.4.2-150200.11.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860237" version="1" comment="libavutil55-32bit is &lt;3.4.2-150200.11.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860238" version="1" comment="libpostproc-devel is &lt;3.4.2-150200.11.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860239" version="1" comment="libpostproc54 is &lt;3.4.2-150200.11.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860240" version="1" comment="libpostproc54-32bit is &lt;3.4.2-150200.11.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860241" version="1" comment="libswresample-devel is &lt;3.4.2-150200.11.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860242" version="1" comment="libswresample2 is &lt;3.4.2-150200.11.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860243" version="1" comment="libswresample2-32bit is &lt;3.4.2-150200.11.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860244" version="1" comment="libswscale-devel is &lt;3.4.2-150200.11.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860245" version="1" comment="libswscale4 is &lt;3.4.2-150200.11.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860246" version="1" comment="libswscale4-32bit is &lt;3.4.2-150200.11.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860247" version="1" comment="less is &lt;590-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819781" version="1" comment="cluster-md-kmp-64kb is &lt;5.14.21-150500.55.44.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819782" version="1" comment="cluster-md-kmp-default is &lt;5.14.21-150500.55.44.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819783" version="1" comment="dlm-kmp-64kb is &lt;5.14.21-150500.55.44.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819784" version="1" comment="dlm-kmp-default is &lt;5.14.21-150500.55.44.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819785" version="1" comment="dtb-allwinner is &lt;5.14.21-150500.55.44.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819786" version="1" comment="dtb-altera is &lt;5.14.21-150500.55.44.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819787" version="1" comment="dtb-amazon is &lt;5.14.21-150500.55.44.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819788" version="1" comment="dtb-amd is &lt;5.14.21-150500.55.44.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819789" version="1" comment="dtb-amlogic is &lt;5.14.21-150500.55.44.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819790" version="1" comment="dtb-apm is &lt;5.14.21-150500.55.44.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819791" version="1" comment="dtb-apple is &lt;5.14.21-150500.55.44.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819792" version="1" comment="dtb-arm is &lt;5.14.21-150500.55.44.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819793" version="1" comment="dtb-broadcom is &lt;5.14.21-150500.55.44.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819794" version="1" comment="dtb-cavium is &lt;5.14.21-150500.55.44.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819795" version="1" comment="dtb-exynos is &lt;5.14.21-150500.55.44.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819796" version="1" comment="dtb-freescale is &lt;5.14.21-150500.55.44.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819797" version="1" comment="dtb-hisilicon is &lt;5.14.21-150500.55.44.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819798" version="1" comment="dtb-lg is &lt;5.14.21-150500.55.44.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819799" version="1" comment="dtb-marvell is &lt;5.14.21-150500.55.44.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819800" version="1" comment="dtb-mediatek is &lt;5.14.21-150500.55.44.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819801" version="1" comment="dtb-nvidia is &lt;5.14.21-150500.55.44.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819802" version="1" comment="dtb-qcom is &lt;5.14.21-150500.55.44.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819803" version="1" comment="dtb-renesas is &lt;5.14.21-150500.55.44.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819804" version="1" comment="dtb-rockchip is &lt;5.14.21-150500.55.44.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819805" version="1" comment="dtb-socionext is &lt;5.14.21-150500.55.44.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819806" version="1" comment="dtb-sprd is &lt;5.14.21-150500.55.44.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819807" version="1" comment="dtb-xilinx is &lt;5.14.21-150500.55.44.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819808" version="1" comment="gfs2-kmp-64kb is &lt;5.14.21-150500.55.44.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819809" version="1" comment="gfs2-kmp-default is &lt;5.14.21-150500.55.44.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819810" version="1" comment="kernel-64kb is &lt;5.14.21-150500.55.44.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819811" version="1" comment="kernel-64kb-devel is &lt;5.14.21-150500.55.44.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819812" version="1" comment="kernel-64kb-extra is &lt;5.14.21-150500.55.44.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819813" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.14.21-150500.55.44.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819814" version="1" comment="kernel-64kb-optional is &lt;5.14.21-150500.55.44.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819815" version="1" comment="kernel-debug is &lt;5.14.21-150500.55.44.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819816" version="1" comment="kernel-debug-devel is &lt;5.14.21-150500.55.44.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819817" version="1" comment="kernel-debug-livepatch-devel is &lt;5.14.21-150500.55.44.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819818" version="1" comment="kernel-debug-vdso is &lt;5.14.21-150500.55.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819819" version="1" comment="kernel-default is &lt;5.14.21-150500.55.44.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819820" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.44.1.150500.6.19.2 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819821" version="1" comment="kernel-default-base-rebuild is &lt;5.14.21-150500.55.44.1.150500.6.19.2 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819822" version="1" comment="kernel-default-devel is &lt;5.14.21-150500.55.44.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819823" version="1" comment="kernel-default-extra is &lt;5.14.21-150500.55.44.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819824" version="1" comment="kernel-default-livepatch is &lt;5.14.21-150500.55.44.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819825" version="1" comment="kernel-default-livepatch-devel is &lt;5.14.21-150500.55.44.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819826" version="1" comment="kernel-default-optional is &lt;5.14.21-150500.55.44.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819827" version="1" comment="kernel-default-vdso is &lt;5.14.21-150500.55.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819828" version="1" comment="kernel-devel is &lt;5.14.21-150500.55.44.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819829" version="1" comment="kernel-docs is &lt;5.14.21-150500.55.44.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819830" version="1" comment="kernel-docs-html is &lt;5.14.21-150500.55.44.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819831" version="1" comment="kernel-kvmsmall is &lt;5.14.21-150500.55.44.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819832" version="1" comment="kernel-kvmsmall-devel is &lt;5.14.21-150500.55.44.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819833" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.14.21-150500.55.44.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819834" version="1" comment="kernel-kvmsmall-vdso is &lt;5.14.21-150500.55.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819835" version="1" comment="kernel-macros is &lt;5.14.21-150500.55.44.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819836" version="1" comment="kernel-obs-build is &lt;5.14.21-150500.55.44.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819837" version="1" comment="kernel-obs-qa is &lt;5.14.21-150500.55.44.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819838" version="1" comment="kernel-source is &lt;5.14.21-150500.55.44.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819839" version="1" comment="kernel-source-vanilla is &lt;5.14.21-150500.55.44.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819840" version="1" comment="kernel-syms is &lt;5.14.21-150500.55.44.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819841" version="1" comment="kernel-zfcpdump is &lt;5.14.21-150500.55.44.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819842" version="1" comment="kselftests-kmp-64kb is &lt;5.14.21-150500.55.44.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819843" version="1" comment="kselftests-kmp-default is &lt;5.14.21-150500.55.44.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819844" version="1" comment="ocfs2-kmp-64kb is &lt;5.14.21-150500.55.44.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819845" version="1" comment="ocfs2-kmp-default is &lt;5.14.21-150500.55.44.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819846" version="1" comment="reiserfs-kmp-64kb is &lt;5.14.21-150500.55.44.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819847" version="1" comment="reiserfs-kmp-default is &lt;5.14.21-150500.55.44.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860248" version="1" comment="python3-Pillow is &lt;7.2.0-150300.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860249" version="1" comment="python3-Pillow-tk is &lt;7.2.0-150300.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860250" version="1" comment="python-Werkzeug-doc is &lt;0.14.1-150100.6.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860251" version="1" comment="freerdp is &lt;2.4.0-150400.3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860252" version="1" comment="freerdp-devel is &lt;2.4.0-150400.3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860253" version="1" comment="freerdp-proxy is &lt;2.4.0-150400.3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860254" version="1" comment="freerdp-server is &lt;2.4.0-150400.3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860255" version="1" comment="freerdp-wayland is &lt;2.4.0-150400.3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860256" version="1" comment="libfreerdp2 is &lt;2.4.0-150400.3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860257" version="1" comment="libuwac0-0 is &lt;2.4.0-150400.3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860258" version="1" comment="libwinpr2 is &lt;2.4.0-150400.3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860259" version="1" comment="uwac0-0-devel is &lt;2.4.0-150400.3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860260" version="1" comment="winpr2-devel is &lt;2.4.0-150400.3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860477" version="1" comment="python3-Werkzeug is &lt;1.0.1-150300.3.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860565" version="1" comment="libopenssl-3-devel is &lt;3.0.8-150500.5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860566" version="1" comment="libopenssl-3-devel-32bit is &lt;3.0.8-150500.5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860567" version="1" comment="libopenssl3 is &lt;3.0.8-150500.5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860568" version="1" comment="libopenssl3-32bit is &lt;3.0.8-150500.5.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860569" version="1" comment="openssl-3 is &lt;3.0.8-150500.5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860570" version="1" comment="openssl-3-doc is &lt;3.0.8-150500.5.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860571" version="1" comment="libtss2-esys0 is &lt;3.1.0-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860572" version="1" comment="libtss2-esys0-32bit is &lt;3.1.0-150400.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860573" version="1" comment="libtss2-fapi1 is &lt;3.1.0-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860574" version="1" comment="libtss2-fapi1-32bit is &lt;3.1.0-150400.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860575" version="1" comment="libtss2-mu0 is &lt;3.1.0-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860576" version="1" comment="libtss2-mu0-32bit is &lt;3.1.0-150400.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860577" version="1" comment="libtss2-rc0 is &lt;3.1.0-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860578" version="1" comment="libtss2-rc0-32bit is &lt;3.1.0-150400.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860579" version="1" comment="libtss2-sys1 is &lt;3.1.0-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860580" version="1" comment="libtss2-sys1-32bit is &lt;3.1.0-150400.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860581" version="1" comment="libtss2-tcti-cmd0 is &lt;3.1.0-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860582" version="1" comment="libtss2-tcti-cmd0-32bit is &lt;3.1.0-150400.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860583" version="1" comment="libtss2-tcti-device0 is &lt;3.1.0-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860584" version="1" comment="libtss2-tcti-device0-32bit is &lt;3.1.0-150400.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860585" version="1" comment="libtss2-tcti-mssim0 is &lt;3.1.0-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860586" version="1" comment="libtss2-tcti-mssim0-32bit is &lt;3.1.0-150400.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860587" version="1" comment="libtss2-tcti-pcap0 is &lt;3.1.0-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860588" version="1" comment="libtss2-tcti-swtpm0 is &lt;3.1.0-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860589" version="1" comment="libtss2-tcti-swtpm0-32bit is &lt;3.1.0-150400.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860590" version="1" comment="libtss2-tctildr0 is &lt;3.1.0-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860591" version="1" comment="libtss2-tctildr0-32bit is &lt;3.1.0-150400.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860592" version="1" comment="tpm2-0-tss is &lt;3.1.0-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860593" version="1" comment="tpm2-0-tss-devel is &lt;3.1.0-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860594" version="1" comment="tpm2.0-tools is &lt;5.2-150400.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860595" version="1" comment="libcrc32c-devel is &lt;1.1.2-150400.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860596" version="1" comment="libcrc32c1 is &lt;1.1.2-150400.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860597" version="1" comment="libprotobuf-lite25_1_0 is &lt;25.1-150400.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860598" version="1" comment="libprotobuf-lite25_1_0-32bit is &lt;25.1-150400.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860599" version="1" comment="libprotobuf25_1_0-32bit is &lt;25.1-150400.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860600" version="1" comment="libprotoc25_1_0 is &lt;25.1-150400.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860601" version="1" comment="libprotoc25_1_0-32bit is &lt;25.1-150400.9.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860602" version="1" comment="protobuf-devel is &lt;25.1-150400.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860603" version="1" comment="protobuf-java is &lt;25.1-150400.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860604" version="1" comment="python311-apipkg is &lt;3.0.1-150400.12.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860605" version="1" comment="python311-cachetools is &lt;5.3.1-150400.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860606" version="1" comment="python311-certifi is &lt;2023.7.22-150400.12.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860607" version="1" comment="python311-cffi is &lt;1.15.1-150400.8.7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860608" version="1" comment="python311-charset-normalizer is &lt;3.1.0-150400.9.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860609" version="1" comment="python311-cryptography is &lt;41.0.3-150400.16.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860610" version="1" comment="python311-google-api-core is &lt;2.15.0-150400.5.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860611" version="1" comment="python311-google-auth is &lt;2.27.0-150400.6.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860612" version="1" comment="python311-google-cloud-appengine-logging is &lt;1.4.0-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860613" version="1" comment="python311-google-cloud-artifact-registry is &lt;1.11.0-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860614" version="1" comment="python311-google-cloud-audit-log is &lt;0.2.5-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860615" version="1" comment="python311-google-cloud-build is &lt;3.22.0-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860616" version="1" comment="python311-google-cloud-compute is &lt;1.15.0-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860617" version="1" comment="python311-google-cloud-core is &lt;2.4.1-150400.5.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860618" version="1" comment="python311-google-cloud-dns is &lt;0.35.0-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860619" version="1" comment="python311-google-cloud-domains is &lt;1.7.1-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860620" version="1" comment="python311-google-cloud-iam is &lt;2.13.0-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860621" version="1" comment="python311-google-cloud-kms is &lt;2.21.0-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860622" version="1" comment="python311-google-cloud-kms-inventory is &lt;0.2.2-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860623" version="1" comment="python311-google-cloud-logging is &lt;3.9.0-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860624" version="1" comment="python311-google-cloud-run is &lt;0.10.1-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860625" version="1" comment="python311-google-cloud-secret-manager is &lt;2.17.0-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860626" version="1" comment="python311-google-cloud-service-directory is &lt;1.11.1-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860627" version="1" comment="python311-google-cloud-spanner is &lt;3.40.1-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860628" version="1" comment="python311-google-cloud-storage is &lt;2.14.0-150400.10.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860629" version="1" comment="python311-google-cloud-vpc-access is &lt;1.10.0-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860630" version="1" comment="python311-google-crc32c is &lt;1.5.0-150400.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860631" version="1" comment="python311-google-resumable-media is &lt;2.7.0-150400.10.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860632" version="1" comment="python311-googleapis-common-protos is &lt;1.62.0-150400.10.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860633" version="1" comment="python311-grpc-google-iam-v1 is &lt;0.13.0-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860634" version="1" comment="python311-grpcio is &lt;1.60.1-150400.9.7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860635" version="1" comment="python311-grpcio-status is &lt;1.60.1-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860636" version="1" comment="python311-idna is &lt;3.4-150400.11.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860637" version="1" comment="python311-iniconfig is &lt;2.0.0-150400.10.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860638" version="1" comment="python311-proto-plus is &lt;1.23.0-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860639" version="1" comment="python311-protobuf is &lt;4.25.1-150400.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860640" version="1" comment="python311-py is &lt;1.11.0-150400.12.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860641" version="1" comment="python311-pyOpenSSL is &lt;23.2.0-150400.3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860642" version="1" comment="python311-pyasn1 is &lt;0.5.0-150400.12.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860643" version="1" comment="python311-pyasn1-modules is &lt;0.3.0-150400.12.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860644" version="1" comment="python311-pycparser is &lt;2.21-150400.12.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860645" version="1" comment="python311-pytz is &lt;2023.3-150400.6.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860646" version="1" comment="python311-requests is &lt;2.31.0-150400.6.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860647" version="1" comment="python311-rsa is &lt;4.9-150400.12.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860648" version="1" comment="python311-setuptools is &lt;67.7.2-150400.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860649" version="1" comment="python311-sqlparse is &lt;0.4.4-150400.6.4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860650" version="1" comment="python311-urllib3 is &lt;2.0.7-150400.7.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860651" version="1" comment="python-paramiko-doc is &lt;3.4.0-150400.13.10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860652" version="1" comment="python-tqdm-bash-completion is &lt;4.66.1-150400.9.7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860653" version="1" comment="python311-Automat is &lt;22.10.0-150400.3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860654" version="1" comment="python311-Deprecated is &lt;1.2.14-150400.10.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860866" version="1" comment="python311-Fabric is &lt;3.2.2-150400.10.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860867" version="1" comment="python311-PyGithub is &lt;1.57-150400.10.4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860655" version="1" comment="python311-PyJWT is &lt;2.8.0-150400.8.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860656" version="1" comment="python311-Pygments is &lt;2.15.1-150400.7.7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860657" version="1" comment="python311-Twisted is &lt;22.10.0-150400.5.17.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860658" version="1" comment="python311-Twisted-all_non_platform is &lt;22.10.0-150400.5.17.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860659" version="1" comment="python311-Twisted-conch is &lt;22.10.0-150400.5.17.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860660" version="1" comment="python311-Twisted-conch_nacl is &lt;22.10.0-150400.5.17.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860661" version="1" comment="python311-Twisted-contextvars is &lt;22.10.0-150400.5.17.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860662" version="1" comment="python311-Twisted-http2 is &lt;22.10.0-150400.5.17.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860663" version="1" comment="python311-Twisted-serial is &lt;22.10.0-150400.5.17.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860664" version="1" comment="python311-Twisted-tls is &lt;22.10.0-150400.5.17.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860665" version="1" comment="python311-aiohttp is &lt;3.9.3-150400.10.18.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860666" version="1" comment="python311-aiosignal is &lt;1.3.1-150400.9.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860868" version="1" comment="python311-antlr4-python3-runtime is &lt;4.13.1-150400.10.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860667" version="1" comment="python311-argcomplete is &lt;3.3.0-150400.12.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860869" version="1" comment="python311-asgiref is &lt;3.6.0-150400.9.7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860668" version="1" comment="python311-async_timeout is &lt;4.0.2-150400.10.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860870" version="1" comment="python311-avro is &lt;1.11.3-150400.10.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860669" version="1" comment="python311-blinker is &lt;1.6.2-150400.12.7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860670" version="1" comment="python311-chardet is &lt;5.2.0-150400.13.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860671" version="1" comment="python311-constantly is &lt;15.1.0-150400.12.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860672" version="1" comment="python311-decorator is &lt;5.1.1-150400.12.7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860673" version="1" comment="python311-distro is &lt;1.9.0-150400.12.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860871" version="1" comment="python311-docker is &lt;7.0.0-150400.8.4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860872" version="1" comment="python311-fakeredis is &lt;2.21.0-150400.9.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860873" version="1" comment="python311-fixedint is &lt;0.2.0-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860674" version="1" comment="python311-fluidity-sm is &lt;0.2.0-150400.10.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860675" version="1" comment="python311-frozenlist is &lt;1.3.3-150400.9.7.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860874" version="1" comment="python311-httplib2 is &lt;0.22.0-150400.10.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860875" version="1" comment="python311-httpretty is &lt;1.1.4-150400.11.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860676" version="1" comment="python311-humanfriendly is &lt;10.0-150400.13.7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860677" version="1" comment="python311-hyperlink is &lt;21.0.0-150400.12.7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860678" version="1" comment="python311-importlib-metadata is &lt;6.8.0-150400.10.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860679" version="1" comment="python311-incremental is &lt;22.10.0-150400.3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860680" version="1" comment="python311-invoke is &lt;2.1.2-150400.10.7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860681" version="1" comment="python311-isodate is &lt;0.6.1-150400.12.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860876" version="1" comment="python311-javaproperties is &lt;0.8.1-150400.10.4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860877" version="1" comment="python311-jsondiff is &lt;2.0.0-150400.10.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860878" version="1" comment="python311-knack is &lt;0.11.0-150400.10.4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860682" version="1" comment="python311-lexicon is &lt;2.0.1-150400.10.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860879" version="1" comment="python311-marshmallow is &lt;3.20.2-150400.9.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860683" version="1" comment="python311-multidict is &lt;6.0.4-150400.7.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860684" version="1" comment="python311-oauthlib is &lt;3.2.2-150400.12.7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860880" version="1" comment="python311-opencensus is &lt;0.11.4-150400.10.6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860881" version="1" comment="python311-opencensus-context is &lt;0.1.3-150400.10.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860882" version="1" comment="python311-opencensus-ext-threading is &lt;0.1.2-150400.10.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860685" version="1" comment="python311-opentelemetry-api is &lt;1.23.0-150400.10.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860883" version="1" comment="python311-opentelemetry-sdk is &lt;1.23.0-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860884" version="1" comment="python311-opentelemetry-semantic-conventions is &lt;0.44b0-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860885" version="1" comment="python311-opentelemetry-test-utils is &lt;0.44b0-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860686" version="1" comment="python311-paramiko is &lt;3.4.0-150400.13.10.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860687" version="1" comment="python311-pathspec is &lt;0.11.1-150400.9.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860688" version="1" comment="python311-pip is &lt;22.3.1-150400.17.16.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860689" version="1" comment="python311-pkginfo is &lt;1.9.6-150400.7.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860690" version="1" comment="python311-portalocker is &lt;2.7.0-150400.10.7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860691" version="1" comment="python311-psutil is &lt;5.9.5-150400.6.9.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860886" version="1" comment="python311-pycomposefile is &lt;0.0.30-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860887" version="1" comment="python311-pydash is &lt;6.0.2-150400.9.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860692" version="1" comment="python311-pyparsing is &lt;3.0.9-150400.5.7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860888" version="1" comment="python311-redis is &lt;5.0.1-150400.12.4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860693" version="1" comment="python311-requests-oauthlib is &lt;1.3.1-150400.12.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860889" version="1" comment="python311-retrying is &lt;1.3.4-150400.12.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860694" version="1" comment="python311-scp is &lt;0.14.5-150400.12.7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860890" version="1" comment="python311-semver is &lt;3.0.2-150400.10.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860695" version="1" comment="python311-service_identity is &lt;23.1.0-150400.8.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860696" version="1" comment="python311-sortedcontainers is &lt;2.4.0-150400.8.7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860891" version="1" comment="python311-sshtunnel is &lt;0.4.0-150400.5.4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860892" version="1" comment="python311-strictyaml is &lt;1.7.3-150400.9.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860893" version="1" comment="python311-sure is &lt;2.0.1-150400.12.4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860697" version="1" comment="python311-tabulate is &lt;0.9.0-150400.11.7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860698" version="1" comment="python311-tqdm is &lt;4.66.1-150400.9.7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860699" version="1" comment="python311-typing_extensions is &lt;4.5.0-150400.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860894" version="1" comment="python311-vcrpy is &lt;6.0.1-150400.7.4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860700" version="1" comment="python311-websocket-client is &lt;1.5.1-150400.13.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860701" version="1" comment="python311-wheel is &lt;0.40.0-150400.13.7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860702" version="1" comment="python311-wrapt is &lt;1.15.0-150400.12.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860895" version="1" comment="python311-xmltodict is &lt;0.13.0-150400.12.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860703" version="1" comment="python311-yarl is &lt;1.9.2-150400.8.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860704" version="1" comment="python311-zipp is &lt;3.15.0-150400.10.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860705" version="1" comment="python311-zope.interface is &lt;6.0-150400.12.7.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860706" version="1" comment="cluster-md-kmp-azure is &lt;5.14.21-150500.33.51.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860707" version="1" comment="dlm-kmp-azure is &lt;5.14.21-150500.33.51.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860708" version="1" comment="gfs2-kmp-azure is &lt;5.14.21-150500.33.51.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860709" version="1" comment="kernel-azure is &lt;5.14.21-150500.33.51.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860710" version="1" comment="kernel-azure-devel is &lt;5.14.21-150500.33.51.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860711" version="1" comment="kernel-azure-extra is &lt;5.14.21-150500.33.51.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860712" version="1" comment="kernel-azure-livepatch-devel is &lt;5.14.21-150500.33.51.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860713" version="1" comment="kernel-azure-optional is &lt;5.14.21-150500.33.51.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860714" version="1" comment="kernel-azure-vdso is &lt;5.14.21-150500.33.51.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860715" version="1" comment="kernel-devel-azure is &lt;5.14.21-150500.33.51.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860716" version="1" comment="kernel-source-azure is &lt;5.14.21-150500.33.51.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860717" version="1" comment="kernel-syms-azure is &lt;5.14.21-150500.33.51.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860718" version="1" comment="kselftests-kmp-azure is &lt;5.14.21-150500.33.51.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860719" version="1" comment="ocfs2-kmp-azure is &lt;5.14.21-150500.33.51.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860720" version="1" comment="reiserfs-kmp-azure is &lt;5.14.21-150500.33.51.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861105" version="1" comment="libecpg6 is &lt;16.3-150200.5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861106" version="1" comment="libecpg6-32bit is &lt;16.3-150200.5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861107" version="1" comment="libpq5 is &lt;16.3-150200.5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861108" version="1" comment="libpq5-32bit is &lt;16.3-150200.5.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861109" version="1" comment="postgresql16 is &lt;16.3-150200.5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861110" version="1" comment="postgresql16-contrib is &lt;16.3-150200.5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861111" version="1" comment="postgresql16-devel is &lt;16.3-150200.5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861112" version="1" comment="postgresql16-devel-mini is &lt;16.3-150200.5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861113" version="1" comment="postgresql16-docs is &lt;16.3-150200.5.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861114" version="1" comment="postgresql16-llvmjit is &lt;16.3-150200.5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861115" version="1" comment="postgresql16-llvmjit-devel is &lt;16.3-150200.5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861116" version="1" comment="postgresql16-plperl is &lt;16.3-150200.5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861117" version="1" comment="postgresql16-plpython is &lt;16.3-150200.5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861118" version="1" comment="postgresql16-pltcl is &lt;16.3-150200.5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861119" version="1" comment="postgresql16-server is &lt;16.3-150200.5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861120" version="1" comment="postgresql16-server-devel is &lt;16.3-150200.5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861121" version="1" comment="postgresql16-test is &lt;16.3-150200.5.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861122" version="1" comment="cluster-md-kmp-64kb is &lt;5.14.21-150500.55.62.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861123" version="1" comment="cluster-md-kmp-default is &lt;5.14.21-150500.55.62.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861124" version="1" comment="dlm-kmp-64kb is &lt;5.14.21-150500.55.62.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861125" version="1" comment="dlm-kmp-default is &lt;5.14.21-150500.55.62.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861126" version="1" comment="dtb-allwinner is &lt;5.14.21-150500.55.62.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861127" version="1" comment="dtb-altera is &lt;5.14.21-150500.55.62.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861128" version="1" comment="dtb-amazon is &lt;5.14.21-150500.55.62.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861129" version="1" comment="dtb-amd is &lt;5.14.21-150500.55.62.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861130" version="1" comment="dtb-amlogic is &lt;5.14.21-150500.55.62.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861131" version="1" comment="dtb-apm is &lt;5.14.21-150500.55.62.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861132" version="1" comment="dtb-apple is &lt;5.14.21-150500.55.62.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861133" version="1" comment="dtb-arm is &lt;5.14.21-150500.55.62.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861134" version="1" comment="dtb-broadcom is &lt;5.14.21-150500.55.62.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861135" version="1" comment="dtb-cavium is &lt;5.14.21-150500.55.62.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861136" version="1" comment="dtb-exynos is &lt;5.14.21-150500.55.62.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861137" version="1" comment="dtb-freescale is &lt;5.14.21-150500.55.62.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861138" version="1" comment="dtb-hisilicon is &lt;5.14.21-150500.55.62.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861139" version="1" comment="dtb-lg is &lt;5.14.21-150500.55.62.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861140" version="1" comment="dtb-marvell is &lt;5.14.21-150500.55.62.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861141" version="1" comment="dtb-mediatek is &lt;5.14.21-150500.55.62.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861142" version="1" comment="dtb-nvidia is &lt;5.14.21-150500.55.62.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861143" version="1" comment="dtb-qcom is &lt;5.14.21-150500.55.62.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861144" version="1" comment="dtb-renesas is &lt;5.14.21-150500.55.62.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861145" version="1" comment="dtb-rockchip is &lt;5.14.21-150500.55.62.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861146" version="1" comment="dtb-socionext is &lt;5.14.21-150500.55.62.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861147" version="1" comment="dtb-sprd is &lt;5.14.21-150500.55.62.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861148" version="1" comment="dtb-xilinx is &lt;5.14.21-150500.55.62.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861149" version="1" comment="gfs2-kmp-64kb is &lt;5.14.21-150500.55.62.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861150" version="1" comment="gfs2-kmp-default is &lt;5.14.21-150500.55.62.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861151" version="1" comment="kernel-64kb is &lt;5.14.21-150500.55.62.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861152" version="1" comment="kernel-64kb-devel is &lt;5.14.21-150500.55.62.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861153" version="1" comment="kernel-64kb-extra is &lt;5.14.21-150500.55.62.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861154" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.14.21-150500.55.62.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861155" version="1" comment="kernel-64kb-optional is &lt;5.14.21-150500.55.62.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861156" version="1" comment="kernel-debug is &lt;5.14.21-150500.55.62.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861157" version="1" comment="kernel-debug-devel is &lt;5.14.21-150500.55.62.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861158" version="1" comment="kernel-debug-livepatch-devel is &lt;5.14.21-150500.55.62.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861159" version="1" comment="kernel-debug-vdso is &lt;5.14.21-150500.55.62.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861160" version="1" comment="kernel-default is &lt;5.14.21-150500.55.62.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861161" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.62.2.150500.6.27.2 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861162" version="1" comment="kernel-default-base-rebuild is &lt;5.14.21-150500.55.62.2.150500.6.27.2 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861163" version="1" comment="kernel-default-devel is &lt;5.14.21-150500.55.62.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861164" version="1" comment="kernel-default-extra is &lt;5.14.21-150500.55.62.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861165" version="1" comment="kernel-default-livepatch is &lt;5.14.21-150500.55.62.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861166" version="1" comment="kernel-default-livepatch-devel is &lt;5.14.21-150500.55.62.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861167" version="1" comment="kernel-default-optional is &lt;5.14.21-150500.55.62.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861168" version="1" comment="kernel-default-vdso is &lt;5.14.21-150500.55.62.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861169" version="1" comment="kernel-devel is &lt;5.14.21-150500.55.62.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861170" version="1" comment="kernel-docs is &lt;5.14.21-150500.55.62.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861171" version="1" comment="kernel-docs-html is &lt;5.14.21-150500.55.62.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861172" version="1" comment="kernel-kvmsmall is &lt;5.14.21-150500.55.62.2 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861173" version="1" comment="kernel-kvmsmall-devel is &lt;5.14.21-150500.55.62.2 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861174" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.14.21-150500.55.62.2 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861175" version="1" comment="kernel-kvmsmall-vdso is &lt;5.14.21-150500.55.62.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861176" version="1" comment="kernel-macros is &lt;5.14.21-150500.55.62.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861177" version="1" comment="kernel-obs-build is &lt;5.14.21-150500.55.62.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861178" version="1" comment="kernel-obs-qa is &lt;5.14.21-150500.55.62.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861179" version="1" comment="kernel-source is &lt;5.14.21-150500.55.62.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861180" version="1" comment="kernel-source-vanilla is &lt;5.14.21-150500.55.62.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861181" version="1" comment="kernel-syms is &lt;5.14.21-150500.55.62.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861182" version="1" comment="kernel-zfcpdump is &lt;5.14.21-150500.55.62.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861183" version="1" comment="kselftests-kmp-64kb is &lt;5.14.21-150500.55.62.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861184" version="1" comment="kselftests-kmp-default is &lt;5.14.21-150500.55.62.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861185" version="1" comment="ocfs2-kmp-64kb is &lt;5.14.21-150500.55.62.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861186" version="1" comment="ocfs2-kmp-default is &lt;5.14.21-150500.55.62.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861187" version="1" comment="reiserfs-kmp-64kb is &lt;5.14.21-150500.55.62.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861188" version="1" comment="reiserfs-kmp-default is &lt;5.14.21-150500.55.62.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861189" version="1" comment="cluster-md-kmp-rt is &lt;5.14.21-150500.13.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861190" version="1" comment="dlm-kmp-rt is &lt;5.14.21-150500.13.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861191" version="1" comment="gfs2-kmp-rt is &lt;5.14.21-150500.13.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861192" version="1" comment="kernel-devel-rt is &lt;5.14.21-150500.13.52.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861193" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861194" version="1" comment="kernel-rt-devel is &lt;5.14.21-150500.13.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861195" version="1" comment="kernel-rt-extra is &lt;5.14.21-150500.13.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861196" version="1" comment="kernel-rt-livepatch is &lt;5.14.21-150500.13.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861197" version="1" comment="kernel-rt-livepatch-devel is &lt;5.14.21-150500.13.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861198" version="1" comment="kernel-rt-optional is &lt;5.14.21-150500.13.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861199" version="1" comment="kernel-rt-vdso is &lt;5.14.21-150500.13.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861200" version="1" comment="kernel-rt_debug is &lt;5.14.21-150500.13.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861201" version="1" comment="kernel-rt_debug-devel is &lt;5.14.21-150500.13.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861202" version="1" comment="kernel-rt_debug-livepatch-devel is &lt;5.14.21-150500.13.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861203" version="1" comment="kernel-rt_debug-vdso is &lt;5.14.21-150500.13.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861204" version="1" comment="kernel-source-rt is &lt;5.14.21-150500.13.52.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861205" version="1" comment="kernel-syms-rt is &lt;5.14.21-150500.13.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861206" version="1" comment="kselftests-kmp-rt is &lt;5.14.21-150500.13.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861207" version="1" comment="ocfs2-kmp-rt is &lt;5.14.21-150500.13.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861208" version="1" comment="reiserfs-kmp-rt is &lt;5.14.21-150500.13.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861535" version="1" comment="python3-Pillow is &lt;7.2.0-150300.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861536" version="1" comment="python3-Pillow-tk is &lt;7.2.0-150300.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819172" version="1" comment="python311-aiohttp is &lt;3.8.6-150400.10.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861635" version="1" comment="libpython3_10-1_0 is &lt;3.10.14-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861636" version="1" comment="libpython3_10-1_0-32bit is &lt;3.10.14-150400.4.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861637" version="1" comment="python310 is &lt;3.10.14-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861638" version="1" comment="python310-32bit is &lt;3.10.14-150400.4.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861639" version="1" comment="python310-base is &lt;3.10.14-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861640" version="1" comment="python310-base-32bit is &lt;3.10.14-150400.4.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861641" version="1" comment="python310-curses is &lt;3.10.14-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861642" version="1" comment="python310-dbm is &lt;3.10.14-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861643" version="1" comment="python310-devel is &lt;3.10.14-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861644" version="1" comment="python310-doc is &lt;3.10.14-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861645" version="1" comment="python310-doc-devhelp is &lt;3.10.14-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861646" version="1" comment="python310-idle is &lt;3.10.14-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861647" version="1" comment="python310-testsuite is &lt;3.10.14-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861648" version="1" comment="python310-tk is &lt;3.10.14-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861649" version="1" comment="python310-tools is &lt;3.10.14-150400.4.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861650" version="1" comment="cairo-devel is &lt;1.16.0-150400.11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861651" version="1" comment="cairo-devel-32bit is &lt;1.16.0-150400.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861652" version="1" comment="cairo-tools is &lt;1.16.0-150400.11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861653" version="1" comment="libcairo-gobject2 is &lt;1.16.0-150400.11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861654" version="1" comment="libcairo-gobject2-32bit is &lt;1.16.0-150400.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861655" version="1" comment="libcairo-script-interpreter2 is &lt;1.16.0-150400.11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861656" version="1" comment="libcairo-script-interpreter2-32bit is &lt;1.16.0-150400.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861657" version="1" comment="libcairo2 is &lt;1.16.0-150400.11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861658" version="1" comment="libcairo2-32bit is &lt;1.16.0-150400.11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820042" version="1" comment="libopenssl-3-devel is &lt;3.0.8-150500.5.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820043" version="1" comment="libopenssl-3-devel-32bit is &lt;3.0.8-150500.5.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820044" version="1" comment="libopenssl3 is &lt;3.0.8-150500.5.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820045" version="1" comment="libopenssl3-32bit is &lt;3.0.8-150500.5.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820046" version="1" comment="openssl-3 is &lt;3.0.8-150500.5.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820047" version="1" comment="openssl-3-doc is &lt;3.0.8-150500.5.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861869" version="1" comment="perl is &lt;5.26.1-150300.17.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861870" version="1" comment="perl-32bit is &lt;5.26.1-150300.17.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861871" version="1" comment="perl-base is &lt;5.26.1-150300.17.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861872" version="1" comment="perl-base-32bit is &lt;5.26.1-150300.17.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861873" version="1" comment="perl-core-DB_File is &lt;5.26.1-150300.17.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861874" version="1" comment="perl-core-DB_File-32bit is &lt;5.26.1-150300.17.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861875" version="1" comment="perl-doc is &lt;5.26.1-150300.17.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861955" version="1" comment="python311-sqlparse is &lt;0.4.4-150400.6.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861956" version="1" comment="postgresql14 is &lt;14.12-150200.5.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861957" version="1" comment="postgresql14-contrib is &lt;14.12-150200.5.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861958" version="1" comment="postgresql14-devel is &lt;14.12-150200.5.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861959" version="1" comment="postgresql14-docs is &lt;14.12-150200.5.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861960" version="1" comment="postgresql14-llvmjit is &lt;14.12-150200.5.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861961" version="1" comment="postgresql14-llvmjit-devel is &lt;14.12-150200.5.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861962" version="1" comment="postgresql14-plperl is &lt;14.12-150200.5.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861963" version="1" comment="postgresql14-plpython is &lt;14.12-150200.5.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861964" version="1" comment="postgresql14-pltcl is &lt;14.12-150200.5.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861965" version="1" comment="postgresql14-server is &lt;14.12-150200.5.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861966" version="1" comment="postgresql14-server-devel is &lt;14.12-150200.5.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861967" version="1" comment="postgresql14-test is &lt;14.12-150200.5.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861968" version="1" comment="MozillaFirefox is &lt;115.11.0-150200.152.137.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861969" version="1" comment="MozillaFirefox-branding-upstream is &lt;115.11.0-150200.152.137.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861970" version="1" comment="MozillaFirefox-devel is &lt;115.11.0-150200.152.137.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861971" version="1" comment="MozillaFirefox-translations-common is &lt;115.11.0-150200.152.137.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861972" version="1" comment="MozillaFirefox-translations-other is &lt;115.11.0-150200.152.137.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862123" version="1" comment="ucode-intel is &lt;20240514-150200.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862124" version="1" comment="postgresql15 is &lt;15.7-150200.5.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862125" version="1" comment="postgresql15-contrib is &lt;15.7-150200.5.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862126" version="1" comment="postgresql15-devel is &lt;15.7-150200.5.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862127" version="1" comment="postgresql15-docs is &lt;15.7-150200.5.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862128" version="1" comment="postgresql15-llvmjit is &lt;15.7-150200.5.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862129" version="1" comment="postgresql15-llvmjit-devel is &lt;15.7-150200.5.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862130" version="1" comment="postgresql15-plperl is &lt;15.7-150200.5.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862131" version="1" comment="postgresql15-plpython is &lt;15.7-150200.5.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862132" version="1" comment="postgresql15-pltcl is &lt;15.7-150200.5.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862133" version="1" comment="postgresql15-server is &lt;15.7-150200.5.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862134" version="1" comment="postgresql15-server-devel is &lt;15.7-150200.5.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862135" version="1" comment="postgresql15-test is &lt;15.7-150200.5.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862252" version="1" comment="cluster-md-kmp-64kb is &lt;5.14.21-150500.55.65.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862253" version="1" comment="cluster-md-kmp-default is &lt;5.14.21-150500.55.65.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862254" version="1" comment="dlm-kmp-64kb is &lt;5.14.21-150500.55.65.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862255" version="1" comment="dlm-kmp-default is &lt;5.14.21-150500.55.65.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862256" version="1" comment="dtb-allwinner is &lt;5.14.21-150500.55.65.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862257" version="1" comment="dtb-altera is &lt;5.14.21-150500.55.65.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862258" version="1" comment="dtb-amazon is &lt;5.14.21-150500.55.65.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862259" version="1" comment="dtb-amd is &lt;5.14.21-150500.55.65.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862260" version="1" comment="dtb-amlogic is &lt;5.14.21-150500.55.65.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862261" version="1" comment="dtb-apm is &lt;5.14.21-150500.55.65.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862262" version="1" comment="dtb-apple is &lt;5.14.21-150500.55.65.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862263" version="1" comment="dtb-arm is &lt;5.14.21-150500.55.65.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862264" version="1" comment="dtb-broadcom is &lt;5.14.21-150500.55.65.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862265" version="1" comment="dtb-cavium is &lt;5.14.21-150500.55.65.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862266" version="1" comment="dtb-exynos is &lt;5.14.21-150500.55.65.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862267" version="1" comment="dtb-freescale is &lt;5.14.21-150500.55.65.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862268" version="1" comment="dtb-hisilicon is &lt;5.14.21-150500.55.65.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862269" version="1" comment="dtb-lg is &lt;5.14.21-150500.55.65.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862270" version="1" comment="dtb-marvell is &lt;5.14.21-150500.55.65.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862271" version="1" comment="dtb-mediatek is &lt;5.14.21-150500.55.65.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862272" version="1" comment="dtb-nvidia is &lt;5.14.21-150500.55.65.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862273" version="1" comment="dtb-qcom is &lt;5.14.21-150500.55.65.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862274" version="1" comment="dtb-renesas is &lt;5.14.21-150500.55.65.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862275" version="1" comment="dtb-rockchip is &lt;5.14.21-150500.55.65.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862276" version="1" comment="dtb-socionext is &lt;5.14.21-150500.55.65.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862277" version="1" comment="dtb-sprd is &lt;5.14.21-150500.55.65.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862278" version="1" comment="dtb-xilinx is &lt;5.14.21-150500.55.65.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862279" version="1" comment="gfs2-kmp-64kb is &lt;5.14.21-150500.55.65.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862280" version="1" comment="gfs2-kmp-default is &lt;5.14.21-150500.55.65.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862281" version="1" comment="kernel-64kb is &lt;5.14.21-150500.55.65.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862282" version="1" comment="kernel-64kb-devel is &lt;5.14.21-150500.55.65.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862283" version="1" comment="kernel-64kb-extra is &lt;5.14.21-150500.55.65.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862284" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.14.21-150500.55.65.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862285" version="1" comment="kernel-64kb-optional is &lt;5.14.21-150500.55.65.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862286" version="1" comment="kernel-debug is &lt;5.14.21-150500.55.65.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862287" version="1" comment="kernel-debug-devel is &lt;5.14.21-150500.55.65.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862288" version="1" comment="kernel-debug-livepatch-devel is &lt;5.14.21-150500.55.65.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862289" version="1" comment="kernel-debug-vdso is &lt;5.14.21-150500.55.65.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862290" version="1" comment="kernel-default is &lt;5.14.21-150500.55.65.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862291" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.65.1.150500.6.29.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862292" version="1" comment="kernel-default-base-rebuild is &lt;5.14.21-150500.55.65.1.150500.6.29.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862293" version="1" comment="kernel-default-devel is &lt;5.14.21-150500.55.65.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862294" version="1" comment="kernel-default-extra is &lt;5.14.21-150500.55.65.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862295" version="1" comment="kernel-default-livepatch is &lt;5.14.21-150500.55.65.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862296" version="1" comment="kernel-default-livepatch-devel is &lt;5.14.21-150500.55.65.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862297" version="1" comment="kernel-default-optional is &lt;5.14.21-150500.55.65.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862298" version="1" comment="kernel-default-vdso is &lt;5.14.21-150500.55.65.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862299" version="1" comment="kernel-devel is &lt;5.14.21-150500.55.65.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862300" version="1" comment="kernel-docs is &lt;5.14.21-150500.55.65.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862301" version="1" comment="kernel-docs-html is &lt;5.14.21-150500.55.65.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862302" version="1" comment="kernel-kvmsmall is &lt;5.14.21-150500.55.65.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862303" version="1" comment="kernel-kvmsmall-devel is &lt;5.14.21-150500.55.65.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862304" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.14.21-150500.55.65.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862305" version="1" comment="kernel-kvmsmall-vdso is &lt;5.14.21-150500.55.65.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862306" version="1" comment="kernel-macros is &lt;5.14.21-150500.55.65.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862307" version="1" comment="kernel-obs-build is &lt;5.14.21-150500.55.65.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862308" version="1" comment="kernel-obs-qa is &lt;5.14.21-150500.55.65.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862309" version="1" comment="kernel-source is &lt;5.14.21-150500.55.65.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862310" version="1" comment="kernel-source-vanilla is &lt;5.14.21-150500.55.65.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862311" version="1" comment="kernel-syms is &lt;5.14.21-150500.55.65.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862312" version="1" comment="kernel-zfcpdump is &lt;5.14.21-150500.55.65.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862313" version="1" comment="kselftests-kmp-64kb is &lt;5.14.21-150500.55.65.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862314" version="1" comment="kselftests-kmp-default is &lt;5.14.21-150500.55.65.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862315" version="1" comment="ocfs2-kmp-64kb is &lt;5.14.21-150500.55.65.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862316" version="1" comment="ocfs2-kmp-default is &lt;5.14.21-150500.55.65.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862317" version="1" comment="reiserfs-kmp-64kb is &lt;5.14.21-150500.55.65.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862318" version="1" comment="reiserfs-kmp-default is &lt;5.14.21-150500.55.65.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862319" version="1" comment="libopenssl-3-devel is &lt;3.0.8-150500.5.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862320" version="1" comment="libopenssl-3-devel-32bit is &lt;3.0.8-150500.5.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862321" version="1" comment="libopenssl3 is &lt;3.0.8-150500.5.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862322" version="1" comment="libopenssl3-32bit is &lt;3.0.8-150500.5.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862323" version="1" comment="openssl-3 is &lt;3.0.8-150500.5.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862324" version="1" comment="openssl-3-doc is &lt;3.0.8-150500.5.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862325" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.412-150200.3.45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862326" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.412-150200.3.45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862327" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.412-150200.3.45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862328" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.412-150200.3.45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862329" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.412-150200.3.45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862330" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.412-150200.3.45.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862331" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.412-150200.3.45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862383" version="1" comment="cluster-md-kmp-azure is &lt;5.14.21-150500.33.54.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862384" version="1" comment="dlm-kmp-azure is &lt;5.14.21-150500.33.54.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862385" version="1" comment="gfs2-kmp-azure is &lt;5.14.21-150500.33.54.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862386" version="1" comment="kernel-azure is &lt;5.14.21-150500.33.54.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862387" version="1" comment="kernel-azure-devel is &lt;5.14.21-150500.33.54.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862388" version="1" comment="kernel-azure-extra is &lt;5.14.21-150500.33.54.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862389" version="1" comment="kernel-azure-livepatch-devel is &lt;5.14.21-150500.33.54.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862390" version="1" comment="kernel-azure-optional is &lt;5.14.21-150500.33.54.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862391" version="1" comment="kernel-azure-vdso is &lt;5.14.21-150500.33.54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862392" version="1" comment="kernel-devel-azure is &lt;5.14.21-150500.33.54.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862393" version="1" comment="kernel-source-azure is &lt;5.14.21-150500.33.54.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862394" version="1" comment="kernel-syms-azure is &lt;5.14.21-150500.33.54.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862395" version="1" comment="kselftests-kmp-azure is &lt;5.14.21-150500.33.54.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862396" version="1" comment="ocfs2-kmp-azure is &lt;5.14.21-150500.33.54.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862397" version="1" comment="reiserfs-kmp-azure is &lt;5.14.21-150500.33.54.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862398" version="1" comment="xdg-desktop-portal is &lt;1.16.0-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862399" version="1" comment="xdg-desktop-portal-devel is &lt;1.16.0-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862400" version="1" comment="xdg-desktop-portal-lang is &lt;1.16.0-150500.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862401" version="1" comment="git is &lt;2.35.3-150300.10.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862402" version="1" comment="git-arch is &lt;2.35.3-150300.10.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862403" version="1" comment="git-core is &lt;2.35.3-150300.10.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862404" version="1" comment="git-credential-gnome-keyring is &lt;2.35.3-150300.10.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862405" version="1" comment="git-credential-libsecret is &lt;2.35.3-150300.10.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862406" version="1" comment="git-cvs is &lt;2.35.3-150300.10.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862407" version="1" comment="git-daemon is &lt;2.35.3-150300.10.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862408" version="1" comment="git-doc is &lt;2.35.3-150300.10.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862409" version="1" comment="git-email is &lt;2.35.3-150300.10.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862410" version="1" comment="git-gui is &lt;2.35.3-150300.10.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862411" version="1" comment="git-p4 is &lt;2.35.3-150300.10.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862412" version="1" comment="git-svn is &lt;2.35.3-150300.10.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862413" version="1" comment="git-web is &lt;2.35.3-150300.10.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862414" version="1" comment="gitk is &lt;2.35.3-150300.10.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862415" version="1" comment="perl-Git is &lt;2.35.3-150300.10.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862416" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150500.17.28.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862417" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1l-150500.17.28.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862418" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150500.17.28.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862419" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1l-150500.17.28.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862420" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150500.17.28.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862421" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1l-150500.17.28.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862422" version="1" comment="openssl-1_1 is &lt;1.1.1l-150500.17.28.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862423" version="1" comment="openssl-1_1-doc is &lt;1.1.1l-150500.17.28.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862550" version="1" comment="cluster-md-kmp-rt is &lt;5.14.21-150500.13.55.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862551" version="1" comment="dlm-kmp-rt is &lt;5.14.21-150500.13.55.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862552" version="1" comment="gfs2-kmp-rt is &lt;5.14.21-150500.13.55.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862553" version="1" comment="kernel-devel-rt is &lt;5.14.21-150500.13.55.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862554" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.55.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862555" version="1" comment="kernel-rt-devel is &lt;5.14.21-150500.13.55.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862556" version="1" comment="kernel-rt-extra is &lt;5.14.21-150500.13.55.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862557" version="1" comment="kernel-rt-livepatch is &lt;5.14.21-150500.13.55.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862558" version="1" comment="kernel-rt-livepatch-devel is &lt;5.14.21-150500.13.55.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862559" version="1" comment="kernel-rt-optional is &lt;5.14.21-150500.13.55.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862560" version="1" comment="kernel-rt-vdso is &lt;5.14.21-150500.13.55.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862561" version="1" comment="kernel-rt_debug is &lt;5.14.21-150500.13.55.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862562" version="1" comment="kernel-rt_debug-devel is &lt;5.14.21-150500.13.55.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862563" version="1" comment="kernel-rt_debug-livepatch-devel is &lt;5.14.21-150500.13.55.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862564" version="1" comment="kernel-rt_debug-vdso is &lt;5.14.21-150500.13.55.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862565" version="1" comment="kernel-source-rt is &lt;5.14.21-150500.13.55.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862566" version="1" comment="kernel-syms-rt is &lt;5.14.21-150500.13.55.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862567" version="1" comment="kselftests-kmp-rt is &lt;5.14.21-150500.13.55.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862568" version="1" comment="ocfs2-kmp-rt is &lt;5.14.21-150500.13.55.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862569" version="1" comment="reiserfs-kmp-rt is &lt;5.14.21-150500.13.55.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844239" version="1" comment="bluez is &lt;5.65-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844240" version="1" comment="bluez-auto-enable-devices is &lt;5.65-150500.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844241" version="1" comment="bluez-cups is &lt;5.65-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844242" version="1" comment="bluez-deprecated is &lt;5.65-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844243" version="1" comment="bluez-devel is &lt;5.65-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844244" version="1" comment="bluez-devel-32bit is &lt;5.65-150500.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844245" version="1" comment="bluez-obexd is &lt;5.65-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844246" version="1" comment="bluez-test is &lt;5.65-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844247" version="1" comment="bluez-zsh-completion is &lt;5.65-150500.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844248" version="1" comment="libbluetooth3 is &lt;5.65-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844249" version="1" comment="libbluetooth3-32bit is &lt;5.65-150500.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862570" version="1" comment="gio-branding-upstream is &lt;2.70.5-150400.3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862571" version="1" comment="glib2-devel is &lt;2.70.5-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862572" version="1" comment="glib2-devel-32bit is &lt;2.70.5-150400.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862573" version="1" comment="glib2-devel-static is &lt;2.70.5-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862574" version="1" comment="glib2-doc is &lt;2.70.5-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862575" version="1" comment="glib2-lang is &lt;2.70.5-150400.3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862576" version="1" comment="glib2-tests-devel is &lt;2.70.5-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862577" version="1" comment="glib2-tools is &lt;2.70.5-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862578" version="1" comment="glib2-tools-32bit is &lt;2.70.5-150400.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862579" version="1" comment="libgio-2_0-0 is &lt;2.70.5-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862580" version="1" comment="libgio-2_0-0-32bit is &lt;2.70.5-150400.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862581" version="1" comment="libglib-2_0-0 is &lt;2.70.5-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862582" version="1" comment="libglib-2_0-0-32bit is &lt;2.70.5-150400.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862583" version="1" comment="libgmodule-2_0-0 is &lt;2.70.5-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862584" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.70.5-150400.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862585" version="1" comment="libgobject-2_0-0 is &lt;2.70.5-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862586" version="1" comment="libgobject-2_0-0-32bit is &lt;2.70.5-150400.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862587" version="1" comment="libgthread-2_0-0 is &lt;2.70.5-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862588" version="1" comment="libgthread-2_0-0-32bit is &lt;2.70.5-150400.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862589" version="1" comment="warewulf4 is &lt;4.5.2-150500.6.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862590" version="1" comment="warewulf4-man is &lt;4.5.2-150500.6.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862591" version="1" comment="warewulf4-overlay is &lt;4.5.2-150500.6.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862592" version="1" comment="warewulf4-overlay-slurm is &lt;4.5.2-150500.6.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844253" version="1" comment="tmux is &lt;3.3a-150300.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844250" version="1" comment="python3-Pillow is &lt;7.2.0-150300.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844251" version="1" comment="python3-Pillow-tk is &lt;7.2.0-150300.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863199" version="1" comment="python3-PyMySQL is &lt;0.7.11-150000.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863200" version="1" comment="freerdp is &lt;2.4.0-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863201" version="1" comment="freerdp-devel is &lt;2.4.0-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863202" version="1" comment="freerdp-proxy is &lt;2.4.0-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863203" version="1" comment="freerdp-server is &lt;2.4.0-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863204" version="1" comment="freerdp-wayland is &lt;2.4.0-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863205" version="1" comment="libfreerdp2 is &lt;2.4.0-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863206" version="1" comment="libuwac0-0 is &lt;2.4.0-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863207" version="1" comment="libwinpr2 is &lt;2.4.0-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863208" version="1" comment="uwac0-0-devel is &lt;2.4.0-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863209" version="1" comment="winpr2-devel is &lt;2.4.0-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863210" version="1" comment="python311-requests is &lt;2.31.0-150400.6.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863211" version="1" comment="MozillaThunderbird is &lt;115.11.0-150200.8.160.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863212" version="1" comment="MozillaThunderbird-translations-common is &lt;115.11.0-150200.8.160.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863213" version="1" comment="MozillaThunderbird-translations-other is &lt;115.11.0-150200.8.160.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863214" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr8.25-150000.3.89.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863215" version="1" comment="java-1_8_0-ibm-32bit is &lt;1.8.0_sr8.25-150000.3.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863216" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr8.25-150000.3.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863217" version="1" comment="java-1_8_0-ibm-demo is &lt;1.8.0_sr8.25-150000.3.89.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863218" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr8.25-150000.3.89.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863219" version="1" comment="java-1_8_0-ibm-devel-32bit is &lt;1.8.0_sr8.25-150000.3.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863220" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr8.25-150000.3.89.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863221" version="1" comment="java-1_8_0-ibm-src is &lt;1.8.0_sr8.25-150000.3.89.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863222" version="1" comment="liburiparser1 is &lt;0.8.5-150000.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863223" version="1" comment="liburiparser1-32bit is &lt;0.8.5-150000.3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863224" version="1" comment="uriparser is &lt;0.8.5-150000.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863225" version="1" comment="uriparser-devel is &lt;0.8.5-150000.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863226" version="1" comment="python3-sqlparse is &lt;0.4.2-150300.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863227" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-150000.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863228" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-150000.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863229" version="1" comment="python is &lt;2.7.18-150000.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863230" version="1" comment="python-32bit is &lt;2.7.18-150000.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863231" version="1" comment="python-base is &lt;2.7.18-150000.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863232" version="1" comment="python-base-32bit is &lt;2.7.18-150000.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863233" version="1" comment="python-curses is &lt;2.7.18-150000.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863234" version="1" comment="python-demo is &lt;2.7.18-150000.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863235" version="1" comment="python-devel is &lt;2.7.18-150000.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863236" version="1" comment="python-doc is &lt;2.7.18-150000.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863237" version="1" comment="python-doc-pdf is &lt;2.7.18-150000.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863238" version="1" comment="python-gdbm is &lt;2.7.18-150000.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863239" version="1" comment="python-idle is &lt;2.7.18-150000.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863240" version="1" comment="python-tk is &lt;2.7.18-150000.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863241" version="1" comment="python-xml is &lt;2.7.18-150000.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863242" version="1" comment="python-Jinja2-emacs is &lt;2.10.1-150000.3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863243" version="1" comment="python-Jinja2-vim is &lt;2.10.1-150000.3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863244" version="1" comment="python3-Jinja2 is &lt;2.10.1-150000.3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863245" version="1" comment="python311-Jinja2 is &lt;3.1.2-150400.12.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863246" version="1" comment="libwireshark15 is &lt;3.6.23-150000.3.115.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863247" version="1" comment="libwiretap12 is &lt;3.6.23-150000.3.115.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863248" version="1" comment="libwsutil13 is &lt;3.6.23-150000.3.115.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863249" version="1" comment="wireshark is &lt;3.6.23-150000.3.115.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863250" version="1" comment="wireshark-devel is &lt;3.6.23-150000.3.115.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863251" version="1" comment="wireshark-ui-qt is &lt;3.6.23-150000.3.115.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863252" version="1" comment="python311-aiohttp is &lt;3.9.3-150400.10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863253" version="1" comment="fwupdate is &lt;12-150100.11.15.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863254" version="1" comment="fwupdate-devel is &lt;12-150100.11.15.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863255" version="1" comment="fwupdate-efi is &lt;12-150100.11.15.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863256" version="1" comment="libfwup1 is &lt;12-150100.11.15.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863257" version="1" comment="apache2 is &lt;2.4.51-150400.6.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863258" version="1" comment="apache2-devel is &lt;2.4.51-150400.6.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863259" version="1" comment="apache2-doc is &lt;2.4.51-150400.6.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863260" version="1" comment="apache2-event is &lt;2.4.51-150400.6.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863261" version="1" comment="apache2-example-pages is &lt;2.4.51-150400.6.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863262" version="1" comment="apache2-prefork is &lt;2.4.51-150400.6.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863263" version="1" comment="apache2-utils is &lt;2.4.51-150400.6.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863264" version="1" comment="apache2-worker is &lt;2.4.51-150400.6.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863265" version="1" comment="python-tqdm-bash-completion is &lt;4.66.4-150400.9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863266" version="1" comment="python311-tqdm is &lt;4.66.4-150400.9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863396" version="1" comment="apiguardian is &lt;1.1.2-150200.3.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863397" version="1" comment="apiguardian-javadoc is &lt;1.1.2-150200.3.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863398" version="1" comment="assertj-core is &lt;3.25.3-150200.5.4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863399" version="1" comment="byte-buddy is &lt;1.14.16-150200.5.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863400" version="1" comment="dom4j is &lt;2.1.4-150200.12.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863401" version="1" comment="dom4j-demo is &lt;2.1.4-150200.12.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863402" version="1" comment="dom4j-javadoc is &lt;2.1.4-150200.12.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863403" version="1" comment="hamcrest is &lt;2.2-150200.12.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863404" version="1" comment="hamcrest-javadoc is &lt;2.2-150200.12.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863405" version="1" comment="jaxen is &lt;2.0.0-150200.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863406" version="1" comment="jdom is &lt;1.1.3-150200.12.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863407" version="1" comment="jopt-simple is &lt;5.0.4-150200.3.4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863408" version="1" comment="jopt-simple-javadoc is &lt;5.0.4-150200.3.4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863409" version="1" comment="junit is &lt;4.13.2-150200.3.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863410" version="1" comment="junit-javadoc is &lt;4.13.2-150200.3.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863411" version="1" comment="junit-manual is &lt;4.13.2-150200.3.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863412" version="1" comment="junit5 is &lt;5.10.2-150200.3.10.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863413" version="1" comment="junit5-bom is &lt;5.10.2-150200.3.10.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863414" version="1" comment="junit5-guide is &lt;5.10.2-150200.3.10.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863415" version="1" comment="junit5-javadoc is &lt;5.10.2-150200.3.10.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863416" version="1" comment="junit5-minimal is &lt;5.10.2-150200.3.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863417" version="1" comment="objectweb-asm is &lt;9.7-150200.3.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863418" version="1" comment="objectweb-asm-javadoc is &lt;9.7-150200.3.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863419" version="1" comment="open-test-reporting-events is &lt;0.1.0~M2-150200.5.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863420" version="1" comment="open-test-reporting-schema is &lt;0.1.0~M2-150200.5.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863421" version="1" comment="saxpath is &lt;1.0-150200.5.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863422" version="1" comment="xom is &lt;1.3.9-150200.5.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863423" version="1" comment="python3-requests is &lt;2.25.1-150300.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863424" version="1" comment="gstreamer-plugins-base is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863425" version="1" comment="gstreamer-plugins-base-32bit is &lt;1.22.0-150500.3.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863426" version="1" comment="gstreamer-plugins-base-devel is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863427" version="1" comment="gstreamer-plugins-base-devel-32bit is &lt;1.22.0-150500.3.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863428" version="1" comment="gstreamer-plugins-base-lang is &lt;1.22.0-150500.3.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863429" version="1" comment="libgstallocators-1_0-0 is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863430" version="1" comment="libgstallocators-1_0-0-32bit is &lt;1.22.0-150500.3.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863431" version="1" comment="libgstapp-1_0-0 is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863432" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.22.0-150500.3.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863433" version="1" comment="libgstaudio-1_0-0 is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863434" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.22.0-150500.3.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863435" version="1" comment="libgstfft-1_0-0 is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863436" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.22.0-150500.3.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863437" version="1" comment="libgstgl-1_0-0 is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863438" version="1" comment="libgstgl-1_0-0-32bit is &lt;1.22.0-150500.3.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863439" version="1" comment="libgstpbutils-1_0-0 is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863440" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.22.0-150500.3.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863441" version="1" comment="libgstriff-1_0-0 is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863442" version="1" comment="libgstriff-1_0-0-32bit is &lt;1.22.0-150500.3.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863443" version="1" comment="libgstrtp-1_0-0 is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863444" version="1" comment="libgstrtp-1_0-0-32bit is &lt;1.22.0-150500.3.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863445" version="1" comment="libgstrtsp-1_0-0 is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863446" version="1" comment="libgstrtsp-1_0-0-32bit is &lt;1.22.0-150500.3.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863447" version="1" comment="libgstsdp-1_0-0 is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863448" version="1" comment="libgstsdp-1_0-0-32bit is &lt;1.22.0-150500.3.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863449" version="1" comment="libgsttag-1_0-0 is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863450" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.22.0-150500.3.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863451" version="1" comment="libgstvideo-1_0-0 is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863452" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.22.0-150500.3.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863453" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863454" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863455" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863456" version="1" comment="typelib-1_0-GstGL-1_0 is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863457" version="1" comment="typelib-1_0-GstGLEGL-1_0 is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863458" version="1" comment="typelib-1_0-GstGLWayland-1_0 is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863459" version="1" comment="typelib-1_0-GstGLX11-1_0 is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863460" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863461" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863462" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863463" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863464" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863465" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.22.0-150500.3.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863571" version="1" comment="glibc is &lt;2.31-150300.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863572" version="1" comment="glibc-32bit is &lt;2.31-150300.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863573" version="1" comment="glibc-devel is &lt;2.31-150300.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863574" version="1" comment="glibc-devel-32bit is &lt;2.31-150300.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863575" version="1" comment="glibc-devel-static is &lt;2.31-150300.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863576" version="1" comment="glibc-devel-static-32bit is &lt;2.31-150300.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863577" version="1" comment="glibc-extra is &lt;2.31-150300.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863578" version="1" comment="glibc-html is &lt;2.31-150300.83.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863579" version="1" comment="glibc-i18ndata is &lt;2.31-150300.83.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863580" version="1" comment="glibc-info is &lt;2.31-150300.83.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863581" version="1" comment="glibc-lang is &lt;2.31-150300.83.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863582" version="1" comment="glibc-locale is &lt;2.31-150300.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863583" version="1" comment="glibc-locale-base is &lt;2.31-150300.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863584" version="1" comment="glibc-locale-base-32bit is &lt;2.31-150300.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863585" version="1" comment="glibc-profile is &lt;2.31-150300.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863586" version="1" comment="glibc-profile-32bit is &lt;2.31-150300.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863587" version="1" comment="glibc-utils is &lt;2.31-150300.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863588" version="1" comment="glibc-utils-32bit is &lt;2.31-150300.83.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863589" version="1" comment="nscd is &lt;2.31-150300.83.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863590" version="1" comment="squid is &lt;5.7-150400.3.29.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863591" version="1" comment="ffmpeg-4 is &lt;4.4-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863592" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.4-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863593" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.4-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863594" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.4-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863595" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.4-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863596" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.4-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863597" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.4-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863598" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.4-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863599" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.4-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863600" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.4-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863601" version="1" comment="ffmpeg-4-private-devel is &lt;4.4-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863602" version="1" comment="libavcodec58_134 is &lt;4.4-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863603" version="1" comment="libavcodec58_134-32bit is &lt;4.4-150400.3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863604" version="1" comment="libavdevice58_13 is &lt;4.4-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863605" version="1" comment="libavdevice58_13-32bit is &lt;4.4-150400.3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863606" version="1" comment="libavfilter7_110 is &lt;4.4-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863607" version="1" comment="libavfilter7_110-32bit is &lt;4.4-150400.3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863608" version="1" comment="libavformat58_76 is &lt;4.4-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863609" version="1" comment="libavformat58_76-32bit is &lt;4.4-150400.3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863610" version="1" comment="libavresample4_0 is &lt;4.4-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863611" version="1" comment="libavresample4_0-32bit is &lt;4.4-150400.3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863612" version="1" comment="libavutil56_70 is &lt;4.4-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863613" version="1" comment="libavutil56_70-32bit is &lt;4.4-150400.3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863614" version="1" comment="libpostproc55_9 is &lt;4.4-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863615" version="1" comment="libpostproc55_9-32bit is &lt;4.4-150400.3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863616" version="1" comment="libswresample3_9 is &lt;4.4-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863617" version="1" comment="libswresample3_9-32bit is &lt;4.4-150400.3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863618" version="1" comment="libswscale5_9 is &lt;4.4-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863619" version="1" comment="libswscale5_9-32bit is &lt;4.4-150400.3.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863620" version="1" comment="ffmpeg is &lt;3.4.2-150200.11.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863621" version="1" comment="ffmpeg-private-devel is &lt;3.4.2-150200.11.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863622" version="1" comment="libavcodec-devel is &lt;3.4.2-150200.11.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863623" version="1" comment="libavcodec57 is &lt;3.4.2-150200.11.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863624" version="1" comment="libavcodec57-32bit is &lt;3.4.2-150200.11.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863625" version="1" comment="libavdevice-devel is &lt;3.4.2-150200.11.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863626" version="1" comment="libavdevice57 is &lt;3.4.2-150200.11.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863627" version="1" comment="libavdevice57-32bit is &lt;3.4.2-150200.11.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863628" version="1" comment="libavfilter-devel is &lt;3.4.2-150200.11.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863629" version="1" comment="libavfilter6 is &lt;3.4.2-150200.11.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863630" version="1" comment="libavfilter6-32bit is &lt;3.4.2-150200.11.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863631" version="1" comment="libavformat-devel is &lt;3.4.2-150200.11.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863632" version="1" comment="libavformat57 is &lt;3.4.2-150200.11.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863633" version="1" comment="libavformat57-32bit is &lt;3.4.2-150200.11.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863634" version="1" comment="libavresample-devel is &lt;3.4.2-150200.11.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863635" version="1" comment="libavresample3 is &lt;3.4.2-150200.11.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863636" version="1" comment="libavresample3-32bit is &lt;3.4.2-150200.11.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863637" version="1" comment="libavutil-devel is &lt;3.4.2-150200.11.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863638" version="1" comment="libavutil55 is &lt;3.4.2-150200.11.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863639" version="1" comment="libavutil55-32bit is &lt;3.4.2-150200.11.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863640" version="1" comment="libpostproc-devel is &lt;3.4.2-150200.11.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863641" version="1" comment="libpostproc54 is &lt;3.4.2-150200.11.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863642" version="1" comment="libpostproc54-32bit is &lt;3.4.2-150200.11.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863643" version="1" comment="libswresample-devel is &lt;3.4.2-150200.11.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863644" version="1" comment="libswresample2 is &lt;3.4.2-150200.11.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863645" version="1" comment="libswresample2-32bit is &lt;3.4.2-150200.11.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863646" version="1" comment="libswscale-devel is &lt;3.4.2-150200.11.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863647" version="1" comment="libswscale4 is &lt;3.4.2-150200.11.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009863648" version="1" comment="libswscale4-32bit is &lt;3.4.2-150200.11.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864937" version="1" comment="python311-docker is &lt;7.0.0-150400.8.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864779" version="1" comment="python3-docker is &lt;4.2.0-150200.3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864780" version="1" comment="python311-idna is &lt;3.4-150400.11.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865177" version="1" comment="python3-Brotli is &lt;1.0.7-150200.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865178" version="1" comment="go1.21 is &lt;1.21.11-150000.1.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865179" version="1" comment="go1.21-doc is &lt;1.21.11-150000.1.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865180" version="1" comment="go1.21-race is &lt;1.21.11-150000.1.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865181" version="1" comment="go1.22 is &lt;1.22.4-150000.1.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865182" version="1" comment="go1.22-doc is &lt;1.22.4-150000.1.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865183" version="1" comment="go1.22-race is &lt;1.22.4-150000.1.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865184" version="1" comment="frr is &lt;8.4-150500.4.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865185" version="1" comment="frr-devel is &lt;8.4-150500.4.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865186" version="1" comment="libfrr0 is &lt;8.4-150500.4.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865187" version="1" comment="libfrr_pb0 is &lt;8.4-150500.4.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865188" version="1" comment="libfrrcares0 is &lt;8.4-150500.4.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865189" version="1" comment="libfrrfpm_pb0 is &lt;8.4-150500.4.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865190" version="1" comment="libfrrospfapiclient0 is &lt;8.4-150500.4.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865191" version="1" comment="libfrrsnmp0 is &lt;8.4-150500.4.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865192" version="1" comment="libfrrzmq0 is &lt;8.4-150500.4.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865193" version="1" comment="libmlag_pb0 is &lt;8.4-150500.4.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865337" version="1" comment="rmt-server is &lt;2.17-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865338" version="1" comment="rmt-server-config is &lt;2.17-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865339" version="1" comment="rmt-server-pubcloud is &lt;2.17-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865340" version="1" comment="libpoppler-cpp0 is &lt;23.01.0-150500.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865341" version="1" comment="libpoppler-cpp0-32bit is &lt;23.01.0-150500.3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865342" version="1" comment="libpoppler-devel is &lt;23.01.0-150500.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865343" version="1" comment="libpoppler-glib-devel is &lt;23.01.0-150500.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865344" version="1" comment="libpoppler-glib8 is &lt;23.01.0-150500.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865345" version="1" comment="libpoppler-glib8-32bit is &lt;23.01.0-150500.3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865346" version="1" comment="libpoppler-qt5-1 is &lt;23.01.0-150500.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865347" version="1" comment="libpoppler-qt5-1-32bit is &lt;23.01.0-150500.3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865348" version="1" comment="libpoppler-qt5-devel is &lt;23.01.0-150500.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865349" version="1" comment="libpoppler-qt6-3 is &lt;23.01.0-150500.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865350" version="1" comment="libpoppler-qt6-devel is &lt;23.01.0-150500.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865351" version="1" comment="libpoppler126 is &lt;23.01.0-150500.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865352" version="1" comment="libpoppler126-32bit is &lt;23.01.0-150500.3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865353" version="1" comment="poppler-tools is &lt;23.01.0-150500.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865354" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;23.01.0-150500.3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865355" version="1" comment="iperf is &lt;3.17.1-150000.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865356" version="1" comment="iperf-devel is &lt;3.17.1-150000.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865357" version="1" comment="libiperf0 is &lt;3.17.1-150000.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865358" version="1" comment="aws-nitro-enclaves-binaryblobs-upstream is &lt;1.3.0~git1.db34c02-150400.3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865359" version="1" comment="aws-nitro-enclaves-cli is &lt;1.3.0~git1.db34c02-150400.3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865360" version="1" comment="system-group-ne is &lt;1.3.0~git1.db34c02-150400.3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865361" version="1" comment="libmariadbd-devel is &lt;10.6.18-150400.3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865362" version="1" comment="libmariadbd19 is &lt;10.6.18-150400.3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865363" version="1" comment="mariadb is &lt;10.6.18-150400.3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865364" version="1" comment="mariadb-bench is &lt;10.6.18-150400.3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865365" version="1" comment="mariadb-client is &lt;10.6.18-150400.3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865366" version="1" comment="mariadb-errormessages is &lt;10.6.18-150400.3.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865367" version="1" comment="mariadb-galera is &lt;10.6.18-150400.3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865368" version="1" comment="mariadb-rpm-macros is &lt;10.6.18-150400.3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865369" version="1" comment="mariadb-test is &lt;10.6.18-150400.3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865370" version="1" comment="mariadb-tools is &lt;10.6.18-150400.3.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865371" version="1" comment="skopeo is &lt;1.14.4-150300.11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865372" version="1" comment="containerized-data-importer-api is &lt;1.58.0-150500.6.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865373" version="1" comment="containerized-data-importer-cloner is &lt;1.58.0-150500.6.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865374" version="1" comment="containerized-data-importer-controller is &lt;1.58.0-150500.6.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865375" version="1" comment="containerized-data-importer-importer is &lt;1.58.0-150500.6.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865376" version="1" comment="containerized-data-importer-manifests is &lt;1.58.0-150500.6.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865377" version="1" comment="containerized-data-importer-operator is &lt;1.58.0-150500.6.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865378" version="1" comment="containerized-data-importer-uploadproxy is &lt;1.58.0-150500.6.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865379" version="1" comment="containerized-data-importer-uploadserver is &lt;1.58.0-150500.6.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865380" version="1" comment="obs-service-cdi_containers_meta is &lt;1.58.0-150500.6.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865381" version="1" comment="kernel-firmware-nvidia-gspx-G06 is &lt;550.90.07-150500.11.29.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865382" version="1" comment="nvidia-open-driver-G06-signed-64kb-devel is &lt;550.90.07-150500.3.47.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865383" version="1" comment="nvidia-open-driver-G06-signed-azure-devel is &lt;550.90.07-150500.3.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865384" version="1" comment="nvidia-open-driver-G06-signed-default-devel is &lt;550.90.07-150500.3.47.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865385" version="1" comment="nvidia-open-driver-G06-signed-kmp-64kb is &lt;550.90.07_k5.14.21_150500.55.65-150500.3.47.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865386" version="1" comment="nvidia-open-driver-G06-signed-kmp-azure is &lt;550.90.07_k5.14.21_150500.33.54-150500.3.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865387" version="1" comment="nvidia-open-driver-G06-signed-kmp-default is &lt;550.90.07_k5.14.21_150500.55.65-150500.3.47.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865388" version="1" comment="libunbound8 is &lt;1.20.0-150100.10.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865389" version="1" comment="unbound is &lt;1.20.0-150100.10.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865390" version="1" comment="unbound-anchor is &lt;1.20.0-150100.10.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865391" version="1" comment="unbound-devel is &lt;1.20.0-150100.10.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865392" version="1" comment="unbound-munin is &lt;1.20.0-150100.10.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865393" version="1" comment="unbound-python is &lt;1.20.0-150100.10.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844252" version="1" comment="redis7 is &lt;7.0.8-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865599" version="1" comment="cups is &lt;2.2.7-150000.3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865600" version="1" comment="cups-client is &lt;2.2.7-150000.3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865601" version="1" comment="cups-config is &lt;2.2.7-150000.3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865602" version="1" comment="cups-ddk is &lt;2.2.7-150000.3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865603" version="1" comment="cups-devel is &lt;2.2.7-150000.3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865604" version="1" comment="cups-devel-32bit is &lt;2.2.7-150000.3.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865605" version="1" comment="libcups2 is &lt;2.2.7-150000.3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865606" version="1" comment="libcups2-32bit is &lt;2.2.7-150000.3.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865607" version="1" comment="libcupscgi1 is &lt;2.2.7-150000.3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865608" version="1" comment="libcupscgi1-32bit is &lt;2.2.7-150000.3.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865609" version="1" comment="libcupsimage2 is &lt;2.2.7-150000.3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865610" version="1" comment="libcupsimage2-32bit is &lt;2.2.7-150000.3.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865611" version="1" comment="libcupsmime1 is &lt;2.2.7-150000.3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865612" version="1" comment="libcupsmime1-32bit is &lt;2.2.7-150000.3.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865613" version="1" comment="libcupsppdc1 is &lt;2.2.7-150000.3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865614" version="1" comment="libcupsppdc1-32bit is &lt;2.2.7-150000.3.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865615" version="1" comment="cluster-md-kmp-rt is &lt;5.14.21-150500.13.58.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865616" version="1" comment="dlm-kmp-rt is &lt;5.14.21-150500.13.58.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865617" version="1" comment="gfs2-kmp-rt is &lt;5.14.21-150500.13.58.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865618" version="1" comment="kernel-devel-rt is &lt;5.14.21-150500.13.58.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865619" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.58.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865620" version="1" comment="kernel-rt-devel is &lt;5.14.21-150500.13.58.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865621" version="1" comment="kernel-rt-extra is &lt;5.14.21-150500.13.58.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865622" version="1" comment="kernel-rt-livepatch is &lt;5.14.21-150500.13.58.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865623" version="1" comment="kernel-rt-livepatch-devel is &lt;5.14.21-150500.13.58.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865624" version="1" comment="kernel-rt-optional is &lt;5.14.21-150500.13.58.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865625" version="1" comment="kernel-rt-vdso is &lt;5.14.21-150500.13.58.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865626" version="1" comment="kernel-rt_debug is &lt;5.14.21-150500.13.58.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865627" version="1" comment="kernel-rt_debug-devel is &lt;5.14.21-150500.13.58.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865628" version="1" comment="kernel-rt_debug-livepatch-devel is &lt;5.14.21-150500.13.58.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865629" version="1" comment="kernel-rt_debug-vdso is &lt;5.14.21-150500.13.58.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865630" version="1" comment="kernel-source-rt is &lt;5.14.21-150500.13.58.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865631" version="1" comment="kernel-syms-rt is &lt;5.14.21-150500.13.58.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865632" version="1" comment="kselftests-kmp-rt is &lt;5.14.21-150500.13.58.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865633" version="1" comment="ocfs2-kmp-rt is &lt;5.14.21-150500.13.58.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865634" version="1" comment="reiserfs-kmp-rt is &lt;5.14.21-150500.13.58.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865725" version="1" comment="cluster-md-kmp-azure is &lt;5.14.21-150500.33.57.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865726" version="1" comment="dlm-kmp-azure is &lt;5.14.21-150500.33.57.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865727" version="1" comment="gfs2-kmp-azure is &lt;5.14.21-150500.33.57.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865728" version="1" comment="kernel-azure is &lt;5.14.21-150500.33.57.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865729" version="1" comment="kernel-azure-devel is &lt;5.14.21-150500.33.57.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865730" version="1" comment="kernel-azure-extra is &lt;5.14.21-150500.33.57.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865731" version="1" comment="kernel-azure-livepatch-devel is &lt;5.14.21-150500.33.57.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865732" version="1" comment="kernel-azure-optional is &lt;5.14.21-150500.33.57.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865733" version="1" comment="kernel-azure-vdso is &lt;5.14.21-150500.33.57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865734" version="1" comment="kernel-devel-azure is &lt;5.14.21-150500.33.57.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865735" version="1" comment="kernel-source-azure is &lt;5.14.21-150500.33.57.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865736" version="1" comment="kernel-syms-azure is &lt;5.14.21-150500.33.57.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865737" version="1" comment="kselftests-kmp-azure is &lt;5.14.21-150500.33.57.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865738" version="1" comment="ocfs2-kmp-azure is &lt;5.14.21-150500.33.57.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865739" version="1" comment="reiserfs-kmp-azure is &lt;5.14.21-150500.33.57.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865740" version="1" comment="libopenssl-3-devel is &lt;3.0.8-150500.5.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865741" version="1" comment="libopenssl-3-devel-32bit is &lt;3.0.8-150500.5.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865742" version="1" comment="libopenssl3 is &lt;3.0.8-150500.5.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865743" version="1" comment="libopenssl3-32bit is &lt;3.0.8-150500.5.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865744" version="1" comment="openssl-3 is &lt;3.0.8-150500.5.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865745" version="1" comment="openssl-3-doc is &lt;3.0.8-150500.5.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865746" version="1" comment="libtiff-devel is &lt;4.0.9-150000.45.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865747" version="1" comment="libtiff-devel-32bit is &lt;4.0.9-150000.45.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865748" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865749" version="1" comment="libtiff5-32bit is &lt;4.0.9-150000.45.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865750" version="1" comment="tiff is &lt;4.0.9-150000.45.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865751" version="1" comment="python3-scikit-learn is &lt;0.23.2-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865822" version="1" comment="podman is &lt;4.9.5-150500.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865823" version="1" comment="podman-docker is &lt;4.9.5-150500.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865824" version="1" comment="podman-remote is &lt;4.9.5-150500.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865825" version="1" comment="podmansh is &lt;4.9.5-150500.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867239" version="1" comment="apache2-mod_php7 is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867240" version="1" comment="php7 is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867241" version="1" comment="php7-bcmath is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867242" version="1" comment="php7-bz2 is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867243" version="1" comment="php7-calendar is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867244" version="1" comment="php7-cli is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867245" version="1" comment="php7-ctype is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867246" version="1" comment="php7-curl is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867247" version="1" comment="php7-dba is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867248" version="1" comment="php7-devel is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867249" version="1" comment="php7-dom is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867250" version="1" comment="php7-embed is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867251" version="1" comment="php7-enchant is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867252" version="1" comment="php7-exif is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867253" version="1" comment="php7-fastcgi is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867254" version="1" comment="php7-fileinfo is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867255" version="1" comment="php7-fpm is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867256" version="1" comment="php7-ftp is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867257" version="1" comment="php7-gd is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867258" version="1" comment="php7-gettext is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867259" version="1" comment="php7-gmp is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867260" version="1" comment="php7-iconv is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867261" version="1" comment="php7-intl is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867262" version="1" comment="php7-json is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867263" version="1" comment="php7-ldap is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867264" version="1" comment="php7-mbstring is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867265" version="1" comment="php7-mysql is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867266" version="1" comment="php7-odbc is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867267" version="1" comment="php7-opcache is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867268" version="1" comment="php7-openssl is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867269" version="1" comment="php7-pcntl is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867270" version="1" comment="php7-pdo is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867271" version="1" comment="php7-pgsql is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867272" version="1" comment="php7-phar is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867273" version="1" comment="php7-posix is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867274" version="1" comment="php7-readline is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867275" version="1" comment="php7-shmop is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867276" version="1" comment="php7-snmp is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867277" version="1" comment="php7-soap is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867278" version="1" comment="php7-sockets is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867279" version="1" comment="php7-sodium is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867280" version="1" comment="php7-sqlite is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867281" version="1" comment="php7-sysvmsg is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867282" version="1" comment="php7-sysvsem is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867283" version="1" comment="php7-sysvshm is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867284" version="1" comment="php7-test is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867285" version="1" comment="php7-tidy is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867286" version="1" comment="php7-tokenizer is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867287" version="1" comment="php7-xmlreader is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867288" version="1" comment="php7-xmlrpc is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867289" version="1" comment="php7-xmlwriter is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867290" version="1" comment="php7-xsl is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867291" version="1" comment="php7-zip is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867292" version="1" comment="php7-zlib is &lt;7.4.33-150400.4.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867293" version="1" comment="apache2-mod_php8 is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867294" version="1" comment="php8 is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867295" version="1" comment="php8-bcmath is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867296" version="1" comment="php8-bz2 is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867297" version="1" comment="php8-calendar is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867298" version="1" comment="php8-cli is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867299" version="1" comment="php8-ctype is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867300" version="1" comment="php8-curl is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867301" version="1" comment="php8-dba is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867302" version="1" comment="php8-devel is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867303" version="1" comment="php8-dom is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867304" version="1" comment="php8-embed is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867305" version="1" comment="php8-enchant is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867306" version="1" comment="php8-exif is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867307" version="1" comment="php8-fastcgi is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867308" version="1" comment="php8-fileinfo is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867309" version="1" comment="php8-fpm is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867310" version="1" comment="php8-ftp is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867311" version="1" comment="php8-gd is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867312" version="1" comment="php8-gettext is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867313" version="1" comment="php8-gmp is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867314" version="1" comment="php8-iconv is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867315" version="1" comment="php8-intl is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867316" version="1" comment="php8-ldap is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867317" version="1" comment="php8-mbstring is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867318" version="1" comment="php8-mysql is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867319" version="1" comment="php8-odbc is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867320" version="1" comment="php8-opcache is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867321" version="1" comment="php8-openssl is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867322" version="1" comment="php8-pcntl is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867323" version="1" comment="php8-pdo is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867324" version="1" comment="php8-pgsql is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867325" version="1" comment="php8-phar is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867326" version="1" comment="php8-posix is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867327" version="1" comment="php8-readline is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867328" version="1" comment="php8-shmop is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867329" version="1" comment="php8-snmp is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867330" version="1" comment="php8-soap is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867331" version="1" comment="php8-sockets is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867332" version="1" comment="php8-sodium is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867333" version="1" comment="php8-sqlite is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867334" version="1" comment="php8-sysvmsg is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867335" version="1" comment="php8-sysvsem is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867336" version="1" comment="php8-sysvshm is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867337" version="1" comment="php8-test is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867338" version="1" comment="php8-tidy is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867339" version="1" comment="php8-tokenizer is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867340" version="1" comment="php8-xmlreader is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867341" version="1" comment="php8-xmlwriter is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867342" version="1" comment="php8-xsl is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867343" version="1" comment="php8-zip is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867344" version="1" comment="php8-zlib is &lt;8.0.30-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844299" version="1" comment="python311-Pillow is &lt;9.5.0-150400.5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844300" version="1" comment="python311-Pillow-tk is &lt;9.5.0-150400.5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867988" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150500.17.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867989" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1l-150500.17.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867990" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150500.17.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867991" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1l-150500.17.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867992" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150500.17.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867993" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1l-150500.17.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867994" version="1" comment="openssl-1_1 is &lt;1.1.1l-150500.17.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867995" version="1" comment="openssl-1_1-doc is &lt;1.1.1l-150500.17.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867996" version="1" comment="aom-tools is &lt;3.2.0-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867997" version="1" comment="libaom-devel is &lt;3.2.0-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867998" version="1" comment="libaom-devel-doc is &lt;3.2.0-150400.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867999" version="1" comment="libaom3 is &lt;3.2.0-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868000" version="1" comment="libaom3-32bit is &lt;3.2.0-150400.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868001" version="1" comment="MozillaFirefox is &lt;115.12.0-150200.152.140.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868002" version="1" comment="MozillaFirefox-branding-upstream is &lt;115.12.0-150200.152.140.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868003" version="1" comment="MozillaFirefox-devel is &lt;115.12.0-150200.152.140.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868004" version="1" comment="MozillaFirefox-translations-common is &lt;115.12.0-150200.152.140.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868005" version="1" comment="MozillaFirefox-translations-other is &lt;115.12.0-150200.152.140.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868006" version="1" comment="booth is &lt;1.0+20220815.f40c2d5-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868007" version="1" comment="booth-test is &lt;1.0+20220815.f40c2d5-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868008" version="1" comment="WebKitGTK-4.0-lang is &lt;2.44.2-150400.4.83.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868009" version="1" comment="WebKitGTK-4.1-lang is &lt;2.44.2-150400.4.83.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868010" version="1" comment="WebKitGTK-6.0-lang is &lt;2.44.2-150400.4.83.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868011" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868012" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.44.2-150400.4.83.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868013" version="1" comment="libjavascriptcoregtk-4_1-0 is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868014" version="1" comment="libjavascriptcoregtk-4_1-0-32bit is &lt;2.44.2-150400.4.83.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868015" version="1" comment="libjavascriptcoregtk-6_0-1 is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868016" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868017" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.44.2-150400.4.83.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868018" version="1" comment="libwebkit2gtk-4_1-0 is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868019" version="1" comment="libwebkit2gtk-4_1-0-32bit is &lt;2.44.2-150400.4.83.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868020" version="1" comment="libwebkitgtk-6_0-4 is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868021" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868022" version="1" comment="typelib-1_0-JavaScriptCore-4_1 is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868023" version="1" comment="typelib-1_0-JavaScriptCore-6_0 is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868024" version="1" comment="typelib-1_0-WebKit-6_0 is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868025" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868026" version="1" comment="typelib-1_0-WebKit2-4_1 is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868027" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868028" version="1" comment="typelib-1_0-WebKit2WebExtension-4_1 is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868029" version="1" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868030" version="1" comment="webkit-jsc-4 is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868031" version="1" comment="webkit-jsc-4.1 is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868032" version="1" comment="webkit-jsc-6.0 is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868033" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868034" version="1" comment="webkit2gtk-4_1-injected-bundles is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868035" version="1" comment="webkit2gtk3-devel is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868036" version="1" comment="webkit2gtk3-minibrowser is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868037" version="1" comment="webkit2gtk3-soup2-devel is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868038" version="1" comment="webkit2gtk3-soup2-minibrowser is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868039" version="1" comment="webkit2gtk4-devel is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868040" version="1" comment="webkit2gtk4-minibrowser is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868041" version="1" comment="webkitgtk-6_0-injected-bundles is &lt;2.44.2-150400.4.83.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868042" version="1" comment="MozillaThunderbird is &lt;115.12.0-150200.8.163.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868043" version="1" comment="MozillaThunderbird-translations-common is &lt;115.12.0-150200.8.163.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868044" version="1" comment="MozillaThunderbird-translations-other is &lt;115.12.0-150200.8.163.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868205" version="1" comment="gdk-pixbuf-devel is &lt;2.42.12-150400.5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868206" version="1" comment="gdk-pixbuf-devel-32bit is &lt;2.42.12-150400.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868207" version="1" comment="gdk-pixbuf-lang is &lt;2.42.12-150400.5.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868208" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.42.12-150400.5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868209" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.42.12-150400.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868210" version="1" comment="gdk-pixbuf-thumbnailer is &lt;2.42.12-150400.5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868211" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.42.12-150400.5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868212" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.42.12-150400.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868213" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.42.12-150400.5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868214" version="1" comment="typelib-1_0-GdkPixdata-2_0 is &lt;2.42.12-150400.5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844301" version="1" comment="tomcat10 is &lt;10.1.18-150200.5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844302" version="1" comment="tomcat10-admin-webapps is &lt;10.1.18-150200.5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844303" version="1" comment="tomcat10-docs-webapp is &lt;10.1.18-150200.5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844304" version="1" comment="tomcat10-el-5_0-api is &lt;10.1.18-150200.5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844305" version="1" comment="tomcat10-embed is &lt;10.1.18-150200.5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844306" version="1" comment="tomcat10-jsp-3_1-api is &lt;10.1.18-150200.5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844307" version="1" comment="tomcat10-jsvc is &lt;10.1.18-150200.5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844308" version="1" comment="tomcat10-lib is &lt;10.1.18-150200.5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844309" version="1" comment="tomcat10-servlet-6_0-api is &lt;10.1.18-150200.5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844310" version="1" comment="tomcat10-webapps is &lt;10.1.18-150200.5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844311" version="1" comment="erlang is &lt;23.3.4.19-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844312" version="1" comment="erlang-debugger is &lt;23.3.4.19-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844313" version="1" comment="erlang-debugger-src is &lt;23.3.4.19-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844314" version="1" comment="erlang-dialyzer is &lt;23.3.4.19-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844315" version="1" comment="erlang-dialyzer-src is &lt;23.3.4.19-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844316" version="1" comment="erlang-diameter is &lt;23.3.4.19-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844317" version="1" comment="erlang-diameter-src is &lt;23.3.4.19-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844318" version="1" comment="erlang-doc is &lt;23.3.4.19-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844319" version="1" comment="erlang-epmd is &lt;23.3.4.19-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844320" version="1" comment="erlang-et is &lt;23.3.4.19-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844321" version="1" comment="erlang-et-src is &lt;23.3.4.19-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844322" version="1" comment="erlang-jinterface is &lt;23.3.4.19-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844323" version="1" comment="erlang-jinterface-src is &lt;23.3.4.19-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844324" version="1" comment="erlang-observer is &lt;23.3.4.19-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844325" version="1" comment="erlang-observer-src is &lt;23.3.4.19-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844326" version="1" comment="erlang-reltool is &lt;23.3.4.19-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844327" version="1" comment="erlang-reltool-src is &lt;23.3.4.19-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844328" version="1" comment="erlang-src is &lt;23.3.4.19-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844329" version="1" comment="erlang-wx is &lt;23.3.4.19-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844330" version="1" comment="erlang-wx-src is &lt;23.3.4.19-150300.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868215" version="1" comment="libopencc2 is &lt;1.0.5-150000.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868216" version="1" comment="opencc is &lt;1.0.5-150000.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868217" version="1" comment="opencc-data is &lt;1.0.5-150000.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868218" version="1" comment="opencc-devel is &lt;1.0.5-150000.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868402" version="1" comment="php-composer2 is &lt;2.2.3-150400.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868403" version="1" comment="containerd is &lt;1.7.17-150000.111.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868404" version="1" comment="containerd-ctr is &lt;1.7.17-150000.111.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868405" version="1" comment="containerd-devel is &lt;1.7.17-150000.111.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844331" version="1" comment="xwayland is &lt;22.1.5-150500.7.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844332" version="1" comment="xwayland-devel is &lt;22.1.5-150500.7.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868532" version="1" comment="libpodofo-devel is &lt;0.9.6-150300.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868533" version="1" comment="libpodofo0_9_6 is &lt;0.9.6-150300.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868534" version="1" comment="podofo is &lt;0.9.6-150300.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868535" version="1" comment="gnome-settings-daemon is &lt;41.0-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868536" version="1" comment="gnome-settings-daemon-devel is &lt;41.0-150500.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868537" version="1" comment="gnome-settings-daemon-lang is &lt;41.0-150500.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868654" version="1" comment="bsdtar is &lt;3.5.1-150400.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868655" version="1" comment="libarchive-devel is &lt;3.5.1-150400.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868656" version="1" comment="libarchive13 is &lt;3.5.1-150400.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868657" version="1" comment="libarchive13-32bit is &lt;3.5.1-150400.3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868691" version="1" comment="wget is &lt;1.20.3-150000.3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868692" version="1" comment="wget-lang is &lt;1.20.3-150000.3.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868693" version="1" comment="glade-catalog-vte is &lt;0.66.2-150400.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868694" version="1" comment="libvte-2_91-0 is &lt;0.66.2-150400.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868695" version="1" comment="typelib-1_0-Vte-2.91 is &lt;0.66.2-150400.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868696" version="1" comment="vte-devel is &lt;0.66.2-150400.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868697" version="1" comment="vte-lang is &lt;0.66.2-150400.3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868698" version="1" comment="vte-tools is &lt;0.66.2-150400.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868802" version="1" comment="libntfs-3g-devel is &lt;2022.5.17-150000.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868803" version="1" comment="libntfs-3g87 is &lt;2022.5.17-150000.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868804" version="1" comment="ntfs-3g is &lt;2022.5.17-150000.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868805" version="1" comment="ntfsprogs is &lt;2022.5.17-150000.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868806" version="1" comment="ntfsprogs-extra is &lt;2022.5.17-150000.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868985" version="1" comment="cluster-md-kmp-64kb is &lt;5.14.21-150500.55.68.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868986" version="1" comment="cluster-md-kmp-default is &lt;5.14.21-150500.55.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868987" version="1" comment="dlm-kmp-64kb is &lt;5.14.21-150500.55.68.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868988" version="1" comment="dlm-kmp-default is &lt;5.14.21-150500.55.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868989" version="1" comment="dtb-allwinner is &lt;5.14.21-150500.55.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868990" version="1" comment="dtb-altera is &lt;5.14.21-150500.55.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868991" version="1" comment="dtb-amazon is &lt;5.14.21-150500.55.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868992" version="1" comment="dtb-amd is &lt;5.14.21-150500.55.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868993" version="1" comment="dtb-amlogic is &lt;5.14.21-150500.55.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868994" version="1" comment="dtb-apm is &lt;5.14.21-150500.55.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868995" version="1" comment="dtb-apple is &lt;5.14.21-150500.55.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868996" version="1" comment="dtb-arm is &lt;5.14.21-150500.55.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868997" version="1" comment="dtb-broadcom is &lt;5.14.21-150500.55.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868998" version="1" comment="dtb-cavium is &lt;5.14.21-150500.55.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868999" version="1" comment="dtb-exynos is &lt;5.14.21-150500.55.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869000" version="1" comment="dtb-freescale is &lt;5.14.21-150500.55.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869001" version="1" comment="dtb-hisilicon is &lt;5.14.21-150500.55.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869002" version="1" comment="dtb-lg is &lt;5.14.21-150500.55.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869003" version="1" comment="dtb-marvell is &lt;5.14.21-150500.55.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869004" version="1" comment="dtb-mediatek is &lt;5.14.21-150500.55.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869005" version="1" comment="dtb-nvidia is &lt;5.14.21-150500.55.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869006" version="1" comment="dtb-qcom is &lt;5.14.21-150500.55.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869007" version="1" comment="dtb-renesas is &lt;5.14.21-150500.55.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869008" version="1" comment="dtb-rockchip is &lt;5.14.21-150500.55.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869009" version="1" comment="dtb-socionext is &lt;5.14.21-150500.55.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869010" version="1" comment="dtb-sprd is &lt;5.14.21-150500.55.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869011" version="1" comment="dtb-xilinx is &lt;5.14.21-150500.55.68.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869012" version="1" comment="gfs2-kmp-64kb is &lt;5.14.21-150500.55.68.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869013" version="1" comment="gfs2-kmp-default is &lt;5.14.21-150500.55.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869014" version="1" comment="kernel-64kb is &lt;5.14.21-150500.55.68.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869015" version="1" comment="kernel-64kb-devel is &lt;5.14.21-150500.55.68.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869016" version="1" comment="kernel-64kb-extra is &lt;5.14.21-150500.55.68.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869017" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.14.21-150500.55.68.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869018" version="1" comment="kernel-64kb-optional is &lt;5.14.21-150500.55.68.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869019" version="1" comment="kernel-debug is &lt;5.14.21-150500.55.68.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869020" version="1" comment="kernel-debug-devel is &lt;5.14.21-150500.55.68.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869021" version="1" comment="kernel-debug-livepatch-devel is &lt;5.14.21-150500.55.68.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869022" version="1" comment="kernel-debug-vdso is &lt;5.14.21-150500.55.68.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869023" version="1" comment="kernel-default is &lt;5.14.21-150500.55.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869024" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.68.1.150500.6.31.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869025" version="1" comment="kernel-default-base-rebuild is &lt;5.14.21-150500.55.68.1.150500.6.31.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869026" version="1" comment="kernel-default-devel is &lt;5.14.21-150500.55.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869027" version="1" comment="kernel-default-extra is &lt;5.14.21-150500.55.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869028" version="1" comment="kernel-default-livepatch is &lt;5.14.21-150500.55.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869029" version="1" comment="kernel-default-livepatch-devel is &lt;5.14.21-150500.55.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869030" version="1" comment="kernel-default-optional is &lt;5.14.21-150500.55.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869031" version="1" comment="kernel-default-vdso is &lt;5.14.21-150500.55.68.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869032" version="1" comment="kernel-devel is &lt;5.14.21-150500.55.68.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869033" version="1" comment="kernel-docs is &lt;5.14.21-150500.55.68.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869034" version="1" comment="kernel-docs-html is &lt;5.14.21-150500.55.68.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869035" version="1" comment="kernel-kvmsmall is &lt;5.14.21-150500.55.68.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869036" version="1" comment="kernel-kvmsmall-devel is &lt;5.14.21-150500.55.68.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869037" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.14.21-150500.55.68.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869038" version="1" comment="kernel-kvmsmall-vdso is &lt;5.14.21-150500.55.68.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869039" version="1" comment="kernel-macros is &lt;5.14.21-150500.55.68.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869040" version="1" comment="kernel-obs-build is &lt;5.14.21-150500.55.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869041" version="1" comment="kernel-obs-qa is &lt;5.14.21-150500.55.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869042" version="1" comment="kernel-source is &lt;5.14.21-150500.55.68.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869043" version="1" comment="kernel-source-vanilla is &lt;5.14.21-150500.55.68.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869044" version="1" comment="kernel-syms is &lt;5.14.21-150500.55.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869045" version="1" comment="kernel-zfcpdump is &lt;5.14.21-150500.55.68.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869046" version="1" comment="kselftests-kmp-64kb is &lt;5.14.21-150500.55.68.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869047" version="1" comment="kselftests-kmp-default is &lt;5.14.21-150500.55.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869048" version="1" comment="ocfs2-kmp-64kb is &lt;5.14.21-150500.55.68.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869049" version="1" comment="ocfs2-kmp-default is &lt;5.14.21-150500.55.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869050" version="1" comment="reiserfs-kmp-64kb is &lt;5.14.21-150500.55.68.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869051" version="1" comment="reiserfs-kmp-default is &lt;5.14.21-150500.55.68.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869052" version="1" comment="hdf5-gnu-hpc is &lt;1.10.11-150400.3.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869053" version="1" comment="hdf5-gnu-hpc-devel is &lt;1.10.11-150400.3.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869054" version="1" comment="hdf5-gnu-mpich-hpc is &lt;1.10.11-150400.3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869055" version="1" comment="hdf5-gnu-mpich-hpc-devel is &lt;1.10.11-150400.3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869056" version="1" comment="hdf5-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869057" version="1" comment="hdf5-gnu-mvapich2-hpc-devel is &lt;1.10.11-150400.3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869058" version="1" comment="hdf5-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869059" version="1" comment="hdf5-gnu-openmpi3-hpc-devel is &lt;1.10.11-150400.3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869060" version="1" comment="hdf5-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869061" version="1" comment="hdf5-gnu-openmpi4-hpc-devel is &lt;1.10.11-150400.3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869062" version="1" comment="hdf5-hpc-examples is &lt;1.10.11-150400.3.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869063" version="1" comment="hdf5_1_10_11-gnu-hpc is &lt;1.10.11-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869064" version="1" comment="hdf5_1_10_11-gnu-hpc-devel is &lt;1.10.11-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869065" version="1" comment="hdf5_1_10_11-gnu-hpc-devel-static is &lt;1.10.11-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869066" version="1" comment="hdf5_1_10_11-gnu-hpc-module is &lt;1.10.11-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869067" version="1" comment="hdf5_1_10_11-gnu-mpich-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869068" version="1" comment="hdf5_1_10_11-gnu-mpich-hpc-devel is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869069" version="1" comment="hdf5_1_10_11-gnu-mpich-hpc-devel-static is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869070" version="1" comment="hdf5_1_10_11-gnu-mpich-hpc-module is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869071" version="1" comment="hdf5_1_10_11-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869072" version="1" comment="hdf5_1_10_11-gnu-mvapich2-hpc-devel is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869073" version="1" comment="hdf5_1_10_11-gnu-mvapich2-hpc-devel-static is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869074" version="1" comment="hdf5_1_10_11-gnu-mvapich2-hpc-module is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869075" version="1" comment="hdf5_1_10_11-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869076" version="1" comment="hdf5_1_10_11-gnu-openmpi3-hpc-devel is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869077" version="1" comment="hdf5_1_10_11-gnu-openmpi3-hpc-devel-static is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869078" version="1" comment="hdf5_1_10_11-gnu-openmpi3-hpc-module is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869079" version="1" comment="hdf5_1_10_11-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869080" version="1" comment="hdf5_1_10_11-gnu-openmpi4-hpc-devel is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869081" version="1" comment="hdf5_1_10_11-gnu-openmpi4-hpc-devel-static is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869082" version="1" comment="hdf5_1_10_11-gnu-openmpi4-hpc-module is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869083" version="1" comment="hdf5_1_10_11-hpc-examples is &lt;1.10.11-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869084" version="1" comment="libhdf5-gnu-hpc is &lt;1.10.11-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869085" version="1" comment="libhdf5-gnu-mpich-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869086" version="1" comment="libhdf5-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869087" version="1" comment="libhdf5-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869088" version="1" comment="libhdf5-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869089" version="1" comment="libhdf5_1_10_11-gnu-hpc is &lt;1.10.11-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869090" version="1" comment="libhdf5_1_10_11-gnu-mpich-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869091" version="1" comment="libhdf5_1_10_11-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869092" version="1" comment="libhdf5_1_10_11-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869093" version="1" comment="libhdf5_1_10_11-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869094" version="1" comment="libhdf5_cpp-gnu-hpc is &lt;1.10.11-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869095" version="1" comment="libhdf5_cpp-gnu-mpich-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869096" version="1" comment="libhdf5_cpp-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869097" version="1" comment="libhdf5_cpp-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869098" version="1" comment="libhdf5_cpp-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869099" version="1" comment="libhdf5_cpp_1_10_11-gnu-hpc is &lt;1.10.11-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869100" version="1" comment="libhdf5_cpp_1_10_11-gnu-mpich-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869101" version="1" comment="libhdf5_cpp_1_10_11-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869102" version="1" comment="libhdf5_cpp_1_10_11-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869103" version="1" comment="libhdf5_cpp_1_10_11-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869104" version="1" comment="libhdf5_fortran-gnu-hpc is &lt;1.10.11-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869105" version="1" comment="libhdf5_fortran-gnu-mpich-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869106" version="1" comment="libhdf5_fortran-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869107" version="1" comment="libhdf5_fortran-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869108" version="1" comment="libhdf5_fortran-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869109" version="1" comment="libhdf5_fortran_1_10_11-gnu-hpc is &lt;1.10.11-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869110" version="1" comment="libhdf5_fortran_1_10_11-gnu-mpich-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869111" version="1" comment="libhdf5_fortran_1_10_11-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869112" version="1" comment="libhdf5_fortran_1_10_11-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869113" version="1" comment="libhdf5_fortran_1_10_11-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869114" version="1" comment="libhdf5_hl-gnu-hpc is &lt;1.10.11-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869115" version="1" comment="libhdf5_hl-gnu-mpich-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869116" version="1" comment="libhdf5_hl-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869117" version="1" comment="libhdf5_hl-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869118" version="1" comment="libhdf5_hl-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869119" version="1" comment="libhdf5_hl_1_10_11-gnu-hpc is &lt;1.10.11-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869120" version="1" comment="libhdf5_hl_1_10_11-gnu-mpich-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869121" version="1" comment="libhdf5_hl_1_10_11-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869122" version="1" comment="libhdf5_hl_1_10_11-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869123" version="1" comment="libhdf5_hl_1_10_11-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869124" version="1" comment="libhdf5_hl_cpp-gnu-hpc is &lt;1.10.11-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869125" version="1" comment="libhdf5_hl_cpp-gnu-mpich-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869126" version="1" comment="libhdf5_hl_cpp-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869127" version="1" comment="libhdf5_hl_cpp-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869128" version="1" comment="libhdf5_hl_cpp-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869129" version="1" comment="libhdf5_hl_cpp_1_10_11-gnu-hpc is &lt;1.10.11-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869130" version="1" comment="libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869131" version="1" comment="libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869132" version="1" comment="libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869133" version="1" comment="libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869134" version="1" comment="libhdf5_hl_fortran-gnu-hpc is &lt;1.10.11-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869135" version="1" comment="libhdf5_hl_fortran-gnu-mpich-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869136" version="1" comment="libhdf5_hl_fortran-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869137" version="1" comment="libhdf5_hl_fortran-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869138" version="1" comment="libhdf5_hl_fortran-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869139" version="1" comment="libhdf5hl_fortran_1_10_11-gnu-hpc is &lt;1.10.11-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869140" version="1" comment="libhdf5hl_fortran_1_10_11-gnu-mpich-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869141" version="1" comment="libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869142" version="1" comment="libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869143" version="1" comment="libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.17.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869144" version="1" comment="libmca_common_dstore1 is &lt;3.2.3-150300.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869145" version="1" comment="libopenmpi4-gnu-hpc is &lt;4.1.4-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869146" version="1" comment="libopenmpi_4_1_4-gnu-hpc is &lt;4.1.4-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869147" version="1" comment="libpmix2 is &lt;3.2.3-150300.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869148" version="1" comment="lua51-luaposix is &lt;34.1.1-150200.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869149" version="1" comment="lua51-luaterm is &lt;0.07-150000.5.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869150" version="1" comment="lua53-luaposix is &lt;34.1.1-150200.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869151" version="1" comment="lua53-luaterm is &lt;0.07-150000.5.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869152" version="1" comment="luaposix-doc is &lt;34.1.1-150200.3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869153" version="1" comment="mpich is &lt;4.0.2-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869154" version="1" comment="mpich-devel is &lt;4.0.2-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869155" version="1" comment="mpich-gnu-hpc is &lt;4.0.2-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869156" version="1" comment="mpich-gnu-hpc-devel is &lt;4.0.2-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869157" version="1" comment="mpich-gnu-hpc-devel-static is &lt;4.0.2-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869158" version="1" comment="mpich-gnu-hpc-macros-devel is &lt;4.0.2-150500.3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869159" version="1" comment="mpich-ofi is &lt;4.0.2-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869160" version="1" comment="mpich-ofi-devel is &lt;4.0.2-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869161" version="1" comment="mpich-ofi-gnu-hpc is &lt;4.0.2-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869162" version="1" comment="mpich-ofi-gnu-hpc-devel is &lt;4.0.2-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869163" version="1" comment="mpich-ofi-gnu-hpc-devel-static is &lt;4.0.2-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869164" version="1" comment="mpich-ofi-gnu-hpc-macros-devel is &lt;4.0.2-150500.3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869165" version="1" comment="mpich-ofi_4_0_2-gnu-hpc is &lt;4.0.2-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869166" version="1" comment="mpich-ofi_4_0_2-gnu-hpc-devel is &lt;4.0.2-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869167" version="1" comment="mpich-ofi_4_0_2-gnu-hpc-devel-static is &lt;4.0.2-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869168" version="1" comment="mpich-ofi_4_0_2-gnu-hpc-macros-devel is &lt;4.0.2-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869169" version="1" comment="mpich_4_0_2-gnu-hpc is &lt;4.0.2-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869170" version="1" comment="mpich_4_0_2-gnu-hpc-devel is &lt;4.0.2-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869171" version="1" comment="mpich_4_0_2-gnu-hpc-devel-static is &lt;4.0.2-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869172" version="1" comment="mpich_4_0_2-gnu-hpc-macros-devel is &lt;4.0.2-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869173" version="1" comment="mvapich2 is &lt;2.3.7-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869174" version="1" comment="mvapich2-devel is &lt;2.3.7-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869175" version="1" comment="mvapich2-devel-static is &lt;2.3.7-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869176" version="1" comment="mvapich2-doc is &lt;2.3.7-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869177" version="1" comment="mvapich2-gnu-hpc is &lt;2.3.7-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869178" version="1" comment="mvapich2-gnu-hpc-devel is &lt;2.3.7-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869179" version="1" comment="mvapich2-gnu-hpc-doc is &lt;2.3.7-150500.3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869180" version="1" comment="mvapich2-gnu-hpc-macros-devel is &lt;2.3.7-150500.3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869181" version="1" comment="mvapich2-psm is &lt;2.3.7-150500.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869182" version="1" comment="mvapich2-psm-devel is &lt;2.3.7-150500.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869183" version="1" comment="mvapich2-psm-devel-static is &lt;2.3.7-150500.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869184" version="1" comment="mvapich2-psm-doc is &lt;2.3.7-150500.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869185" version="1" comment="mvapich2-psm-gnu-hpc is &lt;2.3.7-150500.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869186" version="1" comment="mvapich2-psm-gnu-hpc-devel is &lt;2.3.7-150500.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869187" version="1" comment="mvapich2-psm-gnu-hpc-doc is &lt;2.3.7-150500.3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869188" version="1" comment="mvapich2-psm-gnu-hpc-macros-devel is &lt;2.3.7-150500.3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869189" version="1" comment="mvapich2-psm2 is &lt;2.3.7-150500.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869190" version="1" comment="mvapich2-psm2-devel is &lt;2.3.7-150500.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869191" version="1" comment="mvapich2-psm2-devel-static is &lt;2.3.7-150500.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869192" version="1" comment="mvapich2-psm2-doc is &lt;2.3.7-150500.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869193" version="1" comment="mvapich2-psm2-gnu-hpc is &lt;2.3.7-150500.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869194" version="1" comment="mvapich2-psm2-gnu-hpc-devel is &lt;2.3.7-150500.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869195" version="1" comment="mvapich2-psm2-gnu-hpc-doc is &lt;2.3.7-150500.3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869196" version="1" comment="mvapich2-psm2-gnu-hpc-macros-devel is &lt;2.3.7-150500.3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869197" version="1" comment="mvapich2-psm2_2_3_7-gnu-hpc is &lt;2.3.7-150500.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869198" version="1" comment="mvapich2-psm2_2_3_7-gnu-hpc-devel is &lt;2.3.7-150500.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869199" version="1" comment="mvapich2-psm2_2_3_7-gnu-hpc-devel-static is &lt;2.3.7-150500.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869200" version="1" comment="mvapich2-psm2_2_3_7-gnu-hpc-doc is &lt;2.3.7-150500.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869201" version="1" comment="mvapich2-psm2_2_3_7-gnu-hpc-macros-devel is &lt;2.3.7-150500.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869202" version="1" comment="mvapich2-psm_2_3_7-gnu-hpc is &lt;2.3.7-150500.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869203" version="1" comment="mvapich2-psm_2_3_7-gnu-hpc-devel is &lt;2.3.7-150500.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869204" version="1" comment="mvapich2-psm_2_3_7-gnu-hpc-devel-static is &lt;2.3.7-150500.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869205" version="1" comment="mvapich2-psm_2_3_7-gnu-hpc-doc is &lt;2.3.7-150500.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869206" version="1" comment="mvapich2-psm_2_3_7-gnu-hpc-macros-devel is &lt;2.3.7-150500.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869207" version="1" comment="mvapich2_2_3_7-gnu-hpc is &lt;2.3.7-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869208" version="1" comment="mvapich2_2_3_7-gnu-hpc-devel is &lt;2.3.7-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869209" version="1" comment="mvapich2_2_3_7-gnu-hpc-devel-static is &lt;2.3.7-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869210" version="1" comment="mvapich2_2_3_7-gnu-hpc-doc is &lt;2.3.7-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869211" version="1" comment="mvapich2_2_3_7-gnu-hpc-macros-devel is &lt;2.3.7-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869212" version="1" comment="openmpi4 is &lt;4.1.4-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869213" version="1" comment="openmpi4-config is &lt;4.1.4-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869214" version="1" comment="openmpi4-devel is &lt;4.1.4-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869215" version="1" comment="openmpi4-docs is &lt;4.1.4-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869216" version="1" comment="openmpi4-gnu-hpc is &lt;4.1.4-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869217" version="1" comment="openmpi4-gnu-hpc-devel is &lt;4.1.4-150500.3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869218" version="1" comment="openmpi4-gnu-hpc-devel-static is &lt;4.1.4-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869219" version="1" comment="openmpi4-gnu-hpc-docs is &lt;4.1.4-150500.3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869220" version="1" comment="openmpi4-gnu-hpc-macros-devel is &lt;4.1.4-150500.3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869221" version="1" comment="openmpi4-libs is &lt;4.1.4-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869222" version="1" comment="openmpi4-libs-32bit is &lt;4.1.4-150500.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869223" version="1" comment="openmpi4-macros-devel is &lt;4.1.4-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869224" version="1" comment="openmpi4-testsuite is &lt;4.1.4-150500.3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869225" version="1" comment="openmpi_4_1_4-gnu-hpc is &lt;4.1.4-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869226" version="1" comment="openmpi_4_1_4-gnu-hpc-devel is &lt;4.1.4-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869227" version="1" comment="openmpi_4_1_4-gnu-hpc-devel-static is &lt;4.1.4-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869228" version="1" comment="openmpi_4_1_4-gnu-hpc-docs is &lt;4.1.4-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869229" version="1" comment="openmpi_4_1_4-gnu-hpc-macros-devel is &lt;4.1.4-150500.3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869230" version="1" comment="openmpi_4_1_4-gnu-hpc-testsuite is &lt;4.1.4-150500.3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869231" version="1" comment="pmix is &lt;3.2.3-150300.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869232" version="1" comment="pmix-devel is &lt;3.2.3-150300.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869233" version="1" comment="pmix-headers is &lt;3.2.3-150300.3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869234" version="1" comment="pmix-mca-params is &lt;3.2.3-150300.3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869235" version="1" comment="pmix-plugin-munge is &lt;3.2.3-150300.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869236" version="1" comment="pmix-plugins is &lt;3.2.3-150300.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869237" version="1" comment="pmix-test is &lt;3.2.3-150300.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869238" version="1" comment="ghostscript is &lt;9.52-150000.191.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869239" version="1" comment="ghostscript-devel is &lt;9.52-150000.191.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869240" version="1" comment="ghostscript-x11 is &lt;9.52-150000.191.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844519" version="1" comment="apache-parent is &lt;31-150200.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844520" version="1" comment="apache-sshd is &lt;2.12.0-150200.5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844521" version="1" comment="apache-sshd-javadoc is &lt;2.12.0-150200.5.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870179" version="1" comment="kubevirt-container-disk is &lt;1.1.1-150500.8.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870180" version="1" comment="kubevirt-manifests is &lt;1.1.1-150500.8.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870181" version="1" comment="kubevirt-tests is &lt;1.1.1-150500.8.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870182" version="1" comment="kubevirt-virt-api is &lt;1.1.1-150500.8.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870183" version="1" comment="kubevirt-virt-controller is &lt;1.1.1-150500.8.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870184" version="1" comment="kubevirt-virt-exportproxy is &lt;1.1.1-150500.8.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870185" version="1" comment="kubevirt-virt-exportserver is &lt;1.1.1-150500.8.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870186" version="1" comment="kubevirt-virt-handler is &lt;1.1.1-150500.8.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870187" version="1" comment="kubevirt-virt-launcher is &lt;1.1.1-150500.8.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870188" version="1" comment="kubevirt-virt-operator is &lt;1.1.1-150500.8.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870189" version="1" comment="kubevirt-virtctl is &lt;1.1.1-150500.8.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870190" version="1" comment="obs-service-kubevirt_containers_meta is &lt;1.1.1-150500.8.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870203" version="1" comment="libpython3_10-1_0 is &lt;3.10.14-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870204" version="1" comment="libpython3_10-1_0-32bit is &lt;3.10.14-150400.4.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870205" version="1" comment="python310 is &lt;3.10.14-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870206" version="1" comment="python310-32bit is &lt;3.10.14-150400.4.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870207" version="1" comment="python310-base is &lt;3.10.14-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870208" version="1" comment="python310-base-32bit is &lt;3.10.14-150400.4.51.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870209" version="1" comment="python310-curses is &lt;3.10.14-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870210" version="1" comment="python310-dbm is &lt;3.10.14-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870211" version="1" comment="python310-devel is &lt;3.10.14-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870212" version="1" comment="python310-doc is &lt;3.10.14-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870213" version="1" comment="python310-doc-devhelp is &lt;3.10.14-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870214" version="1" comment="python310-idle is &lt;3.10.14-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870215" version="1" comment="python310-testsuite is &lt;3.10.14-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870216" version="1" comment="python310-tk is &lt;3.10.14-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870217" version="1" comment="python310-tools is &lt;3.10.14-150400.4.51.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870288" version="1" comment="libreoffice is &lt;24.2.4.2-150500.20.6.5 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870289" version="1" comment="libreoffice-base is &lt;24.2.4.2-150500.20.6.5 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870290" version="1" comment="libreoffice-base-drivers-postgresql is &lt;24.2.4.2-150500.20.6.5 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870291" version="1" comment="libreoffice-branding-upstream is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870292" version="1" comment="libreoffice-calc is &lt;24.2.4.2-150500.20.6.5 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870293" version="1" comment="libreoffice-calc-extensions is &lt;24.2.4.2-150500.20.6.5 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870294" version="1" comment="libreoffice-draw is &lt;24.2.4.2-150500.20.6.5 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870295" version="1" comment="libreoffice-filters-optional is &lt;24.2.4.2-150500.20.6.5 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870296" version="1" comment="libreoffice-gdb-pretty-printers is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870297" version="1" comment="libreoffice-glade is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870298" version="1" comment="libreoffice-gnome is &lt;24.2.4.2-150500.20.6.5 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870299" version="1" comment="libreoffice-gtk3 is &lt;24.2.4.2-150500.20.6.5 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870300" version="1" comment="libreoffice-icon-themes is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870301" version="1" comment="libreoffice-impress is &lt;24.2.4.2-150500.20.6.5 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870302" version="1" comment="libreoffice-l10n-af is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870303" version="1" comment="libreoffice-l10n-am is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870304" version="1" comment="libreoffice-l10n-ar is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870305" version="1" comment="libreoffice-l10n-as is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870306" version="1" comment="libreoffice-l10n-ast is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870307" version="1" comment="libreoffice-l10n-be is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870308" version="1" comment="libreoffice-l10n-bg is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870309" version="1" comment="libreoffice-l10n-bn is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870310" version="1" comment="libreoffice-l10n-bn_IN is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870311" version="1" comment="libreoffice-l10n-bo is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870312" version="1" comment="libreoffice-l10n-br is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870313" version="1" comment="libreoffice-l10n-brx is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870314" version="1" comment="libreoffice-l10n-bs is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870315" version="1" comment="libreoffice-l10n-ca is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870316" version="1" comment="libreoffice-l10n-ca_valencia is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870317" version="1" comment="libreoffice-l10n-ckb is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870318" version="1" comment="libreoffice-l10n-cs is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870319" version="1" comment="libreoffice-l10n-cy is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870320" version="1" comment="libreoffice-l10n-da is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870321" version="1" comment="libreoffice-l10n-de is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870322" version="1" comment="libreoffice-l10n-dgo is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870323" version="1" comment="libreoffice-l10n-dsb is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870324" version="1" comment="libreoffice-l10n-dz is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870325" version="1" comment="libreoffice-l10n-el is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870326" version="1" comment="libreoffice-l10n-en is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870327" version="1" comment="libreoffice-l10n-en_GB is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870328" version="1" comment="libreoffice-l10n-en_ZA is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870329" version="1" comment="libreoffice-l10n-eo is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870330" version="1" comment="libreoffice-l10n-es is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870331" version="1" comment="libreoffice-l10n-et is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870332" version="1" comment="libreoffice-l10n-eu is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870333" version="1" comment="libreoffice-l10n-fa is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870334" version="1" comment="libreoffice-l10n-fi is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870335" version="1" comment="libreoffice-l10n-fr is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870336" version="1" comment="libreoffice-l10n-fur is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870337" version="1" comment="libreoffice-l10n-fy is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870338" version="1" comment="libreoffice-l10n-ga is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870339" version="1" comment="libreoffice-l10n-gd is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870340" version="1" comment="libreoffice-l10n-gl is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870341" version="1" comment="libreoffice-l10n-gu is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870342" version="1" comment="libreoffice-l10n-gug is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870343" version="1" comment="libreoffice-l10n-he is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870344" version="1" comment="libreoffice-l10n-hi is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870345" version="1" comment="libreoffice-l10n-hr is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870346" version="1" comment="libreoffice-l10n-hsb is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870347" version="1" comment="libreoffice-l10n-hu is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870348" version="1" comment="libreoffice-l10n-id is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870349" version="1" comment="libreoffice-l10n-is is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870350" version="1" comment="libreoffice-l10n-it is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870351" version="1" comment="libreoffice-l10n-ja is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870352" version="1" comment="libreoffice-l10n-ka is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870353" version="1" comment="libreoffice-l10n-kab is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870354" version="1" comment="libreoffice-l10n-kk is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870355" version="1" comment="libreoffice-l10n-km is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870356" version="1" comment="libreoffice-l10n-kmr_Latn is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870357" version="1" comment="libreoffice-l10n-kn is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870358" version="1" comment="libreoffice-l10n-ko is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870359" version="1" comment="libreoffice-l10n-kok is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870360" version="1" comment="libreoffice-l10n-ks is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870361" version="1" comment="libreoffice-l10n-lb is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870362" version="1" comment="libreoffice-l10n-lo is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870363" version="1" comment="libreoffice-l10n-lt is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870364" version="1" comment="libreoffice-l10n-lv is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870365" version="1" comment="libreoffice-l10n-mai is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870366" version="1" comment="libreoffice-l10n-mk is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870367" version="1" comment="libreoffice-l10n-ml is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870368" version="1" comment="libreoffice-l10n-mn is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870369" version="1" comment="libreoffice-l10n-mni is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870370" version="1" comment="libreoffice-l10n-mr is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870371" version="1" comment="libreoffice-l10n-my is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870372" version="1" comment="libreoffice-l10n-nb is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870373" version="1" comment="libreoffice-l10n-ne is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870374" version="1" comment="libreoffice-l10n-nl is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870375" version="1" comment="libreoffice-l10n-nn is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870376" version="1" comment="libreoffice-l10n-nr is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870377" version="1" comment="libreoffice-l10n-nso is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870378" version="1" comment="libreoffice-l10n-oc is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870379" version="1" comment="libreoffice-l10n-om is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870380" version="1" comment="libreoffice-l10n-or is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870381" version="1" comment="libreoffice-l10n-pa is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870382" version="1" comment="libreoffice-l10n-pl is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870383" version="1" comment="libreoffice-l10n-pt_BR is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870384" version="1" comment="libreoffice-l10n-pt_PT is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870385" version="1" comment="libreoffice-l10n-ro is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870386" version="1" comment="libreoffice-l10n-ru is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870387" version="1" comment="libreoffice-l10n-rw is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870388" version="1" comment="libreoffice-l10n-sa_IN is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870389" version="1" comment="libreoffice-l10n-sat is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870390" version="1" comment="libreoffice-l10n-sd is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870391" version="1" comment="libreoffice-l10n-si is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870392" version="1" comment="libreoffice-l10n-sid is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870393" version="1" comment="libreoffice-l10n-sk is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870394" version="1" comment="libreoffice-l10n-sl is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870395" version="1" comment="libreoffice-l10n-sq is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870396" version="1" comment="libreoffice-l10n-sr is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870397" version="1" comment="libreoffice-l10n-ss is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870398" version="1" comment="libreoffice-l10n-st is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870399" version="1" comment="libreoffice-l10n-sv is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870400" version="1" comment="libreoffice-l10n-sw_TZ is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870401" version="1" comment="libreoffice-l10n-szl is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870402" version="1" comment="libreoffice-l10n-ta is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870403" version="1" comment="libreoffice-l10n-te is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870404" version="1" comment="libreoffice-l10n-tg is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870405" version="1" comment="libreoffice-l10n-th is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870406" version="1" comment="libreoffice-l10n-tn is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870407" version="1" comment="libreoffice-l10n-tr is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870408" version="1" comment="libreoffice-l10n-ts is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870409" version="1" comment="libreoffice-l10n-tt is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870410" version="1" comment="libreoffice-l10n-ug is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870411" version="1" comment="libreoffice-l10n-uk is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870412" version="1" comment="libreoffice-l10n-uz is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870413" version="1" comment="libreoffice-l10n-ve is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870414" version="1" comment="libreoffice-l10n-vec is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870415" version="1" comment="libreoffice-l10n-vi is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870416" version="1" comment="libreoffice-l10n-xh is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870417" version="1" comment="libreoffice-l10n-zh_CN is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870418" version="1" comment="libreoffice-l10n-zh_TW is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870419" version="1" comment="libreoffice-l10n-zu is &lt;24.2.4.2-150500.20.6.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870420" version="1" comment="libreoffice-librelogo is &lt;24.2.4.2-150500.20.6.5 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870421" version="1" comment="libreoffice-mailmerge is &lt;24.2.4.2-150500.20.6.5 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870422" version="1" comment="libreoffice-math is &lt;24.2.4.2-150500.20.6.5 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870423" version="1" comment="libreoffice-officebean is &lt;24.2.4.2-150500.20.6.5 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870424" version="1" comment="libreoffice-pyuno is &lt;24.2.4.2-150500.20.6.5 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870425" version="1" comment="libreoffice-qt5 is &lt;24.2.4.2-150500.20.6.5 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870426" version="1" comment="libreoffice-sdk is &lt;24.2.4.2-150500.20.6.5 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870427" version="1" comment="libreoffice-sdk-doc is &lt;24.2.4.2-150500.20.6.5 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870428" version="1" comment="libreoffice-writer is &lt;24.2.4.2-150500.20.6.5 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870429" version="1" comment="libreoffice-writer-extensions is &lt;24.2.4.2-150500.20.6.5 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870430" version="1" comment="libreofficekit is &lt;24.2.4.2-150500.20.6.5 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870431" version="1" comment="libreofficekit-devel is &lt;24.2.4.2-150500.20.6.5 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870432" version="1" comment="python3-libxml2-python is &lt;2.9.7-150000.3.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870433" version="1" comment="squid is &lt;5.7-150400.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870434" version="1" comment="libpython3_9-1_0 is &lt;3.9.19-150300.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870435" version="1" comment="libpython3_9-1_0-32bit is &lt;3.9.19-150300.4.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870436" version="1" comment="python39 is &lt;3.9.19-150300.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870437" version="1" comment="python39-32bit is &lt;3.9.19-150300.4.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870438" version="1" comment="python39-base is &lt;3.9.19-150300.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870439" version="1" comment="python39-base-32bit is &lt;3.9.19-150300.4.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870440" version="1" comment="python39-curses is &lt;3.9.19-150300.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870441" version="1" comment="python39-dbm is &lt;3.9.19-150300.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870442" version="1" comment="python39-devel is &lt;3.9.19-150300.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870443" version="1" comment="python39-doc is &lt;3.9.19-150300.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870444" version="1" comment="python39-doc-devhelp is &lt;3.9.19-150300.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870445" version="1" comment="python39-idle is &lt;3.9.19-150300.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870446" version="1" comment="python39-testsuite is &lt;3.9.19-150300.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870447" version="1" comment="python39-tk is &lt;3.9.19-150300.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870448" version="1" comment="python39-tools is &lt;3.9.19-150300.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870449" version="1" comment="libpodofo-devel is &lt;0.9.6-150300.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870450" version="1" comment="libpodofo0_9_6 is &lt;0.9.6-150300.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870451" version="1" comment="podofo is &lt;0.9.6-150300.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870452" version="1" comment="libndp is &lt;1.6-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870453" version="1" comment="libndp-devel is &lt;1.6-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870454" version="1" comment="libndp0 is &lt;1.6-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871333" version="1" comment="podman is &lt;4.9.5-150500.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871334" version="1" comment="podman-docker is &lt;4.9.5-150500.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871335" version="1" comment="podman-remote is &lt;4.9.5-150500.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871336" version="1" comment="podmansh is &lt;4.9.5-150500.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844522" version="1" comment="MozillaFirefox is &lt;115.7.0-150200.152.123.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844523" version="1" comment="MozillaFirefox-branding-upstream is &lt;115.7.0-150200.152.123.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844524" version="1" comment="MozillaFirefox-devel is &lt;115.7.0-150200.152.123.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844525" version="1" comment="MozillaFirefox-translations-common is &lt;115.7.0-150200.152.123.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844526" version="1" comment="MozillaFirefox-translations-other is &lt;115.7.0-150200.152.123.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871337" version="1" comment="libxml2-2 is &lt;2.10.3-150500.5.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871338" version="1" comment="libxml2-2-32bit is &lt;2.10.3-150500.5.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871339" version="1" comment="libxml2-devel is &lt;2.10.3-150500.5.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871340" version="1" comment="libxml2-devel-32bit is &lt;2.10.3-150500.5.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871341" version="1" comment="libxml2-doc is &lt;2.10.3-150500.5.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871342" version="1" comment="libxml2-tools is &lt;2.10.3-150500.5.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871343" version="1" comment="python3-libxml2 is &lt;2.10.3-150500.5.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871344" version="1" comment="python311-libxml2 is &lt;2.10.3-150500.5.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871345" version="1" comment="ghostscript is &lt;9.52-150000.194.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871346" version="1" comment="ghostscript-devel is &lt;9.52-150000.194.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871347" version="1" comment="ghostscript-x11 is &lt;9.52-150000.194.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871421" version="1" comment="krb5 is &lt;1.20.1-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871422" version="1" comment="krb5-32bit is &lt;1.20.1-150500.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871423" version="1" comment="krb5-client is &lt;1.20.1-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871424" version="1" comment="krb5-devel is &lt;1.20.1-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871425" version="1" comment="krb5-devel-32bit is &lt;1.20.1-150500.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871426" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.20.1-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871427" version="1" comment="krb5-plugin-preauth-otp is &lt;1.20.1-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871428" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.20.1-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871429" version="1" comment="krb5-plugin-preauth-spake is &lt;1.20.1-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871430" version="1" comment="krb5-server is &lt;1.20.1-150500.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871593" version="1" comment="go1.21 is &lt;1.21.12-150000.1.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871594" version="1" comment="go1.21-doc is &lt;1.21.12-150000.1.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871595" version="1" comment="go1.21-race is &lt;1.21.12-150000.1.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871596" version="1" comment="go1.22 is &lt;1.22.5-150000.1.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871597" version="1" comment="go1.22-doc is &lt;1.22.5-150000.1.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871598" version="1" comment="go1.22-race is &lt;1.22.5-150000.1.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871649" version="1" comment="netty3 is &lt;3.10.6-150200.3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871650" version="1" comment="netty3-javadoc is &lt;3.10.6-150200.3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871651" version="1" comment="python311-urllib3 is &lt;2.0.7-150400.7.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871652" version="1" comment="libpoppler-cpp0 is &lt;23.01.0-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871653" version="1" comment="libpoppler-cpp0-32bit is &lt;23.01.0-150500.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871654" version="1" comment="libpoppler-devel is &lt;23.01.0-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871655" version="1" comment="libpoppler-glib-devel is &lt;23.01.0-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871656" version="1" comment="libpoppler-glib8 is &lt;23.01.0-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871657" version="1" comment="libpoppler-glib8-32bit is &lt;23.01.0-150500.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871658" version="1" comment="libpoppler-qt5-1 is &lt;23.01.0-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871659" version="1" comment="libpoppler-qt5-1-32bit is &lt;23.01.0-150500.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871660" version="1" comment="libpoppler-qt5-devel is &lt;23.01.0-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871661" version="1" comment="libpoppler-qt6-3 is &lt;23.01.0-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871662" version="1" comment="libpoppler-qt6-devel is &lt;23.01.0-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871663" version="1" comment="libpoppler126 is &lt;23.01.0-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871664" version="1" comment="libpoppler126-32bit is &lt;23.01.0-150500.3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871665" version="1" comment="poppler-tools is &lt;23.01.0-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871666" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;23.01.0-150500.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871878" version="1" comment="freeradius-server is &lt;3.0.25-150400.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871879" version="1" comment="freeradius-server-devel is &lt;3.0.25-150400.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871880" version="1" comment="freeradius-server-doc is &lt;3.0.25-150400.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871881" version="1" comment="freeradius-server-krb5 is &lt;3.0.25-150400.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871882" version="1" comment="freeradius-server-ldap is &lt;3.0.25-150400.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871883" version="1" comment="freeradius-server-ldap-schemas is &lt;3.0.25-150400.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871884" version="1" comment="freeradius-server-libs is &lt;3.0.25-150400.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871885" version="1" comment="freeradius-server-mysql is &lt;3.0.25-150400.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871886" version="1" comment="freeradius-server-perl is &lt;3.0.25-150400.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871887" version="1" comment="freeradius-server-postgresql is &lt;3.0.25-150400.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871888" version="1" comment="freeradius-server-python3 is &lt;3.0.25-150400.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871889" version="1" comment="freeradius-server-sqlite is &lt;3.0.25-150400.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871890" version="1" comment="freeradius-server-utils is &lt;3.0.25-150400.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871891" version="1" comment="cluster-md-kmp-azure is &lt;5.14.21-150500.33.60.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871892" version="1" comment="dlm-kmp-azure is &lt;5.14.21-150500.33.60.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871893" version="1" comment="gfs2-kmp-azure is &lt;5.14.21-150500.33.60.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871894" version="1" comment="kernel-azure is &lt;5.14.21-150500.33.60.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871895" version="1" comment="kernel-azure-devel is &lt;5.14.21-150500.33.60.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871896" version="1" comment="kernel-azure-extra is &lt;5.14.21-150500.33.60.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871897" version="1" comment="kernel-azure-livepatch-devel is &lt;5.14.21-150500.33.60.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871898" version="1" comment="kernel-azure-optional is &lt;5.14.21-150500.33.60.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871899" version="1" comment="kernel-azure-vdso is &lt;5.14.21-150500.33.60.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871900" version="1" comment="kernel-devel-azure is &lt;5.14.21-150500.33.60.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871901" version="1" comment="kernel-source-azure is &lt;5.14.21-150500.33.60.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871902" version="1" comment="kernel-syms-azure is &lt;5.14.21-150500.33.60.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871903" version="1" comment="kselftests-kmp-azure is &lt;5.14.21-150500.33.60.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871904" version="1" comment="ocfs2-kmp-azure is &lt;5.14.21-150500.33.60.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871905" version="1" comment="reiserfs-kmp-azure is &lt;5.14.21-150500.33.60.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819403" version="1" comment="cpio is &lt;2.13-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819404" version="1" comment="cpio-lang is &lt;2.13-150400.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819405" version="1" comment="cpio-mt is &lt;2.13-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872345" version="1" comment="cluster-md-kmp-rt is &lt;5.14.21-150500.13.61.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872346" version="1" comment="dlm-kmp-rt is &lt;5.14.21-150500.13.61.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872347" version="1" comment="gfs2-kmp-rt is &lt;5.14.21-150500.13.61.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872348" version="1" comment="kernel-devel-rt is &lt;5.14.21-150500.13.61.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872349" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.61.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872350" version="1" comment="kernel-rt-devel is &lt;5.14.21-150500.13.61.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872351" version="1" comment="kernel-rt-extra is &lt;5.14.21-150500.13.61.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872352" version="1" comment="kernel-rt-livepatch is &lt;5.14.21-150500.13.61.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872353" version="1" comment="kernel-rt-livepatch-devel is &lt;5.14.21-150500.13.61.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872354" version="1" comment="kernel-rt-optional is &lt;5.14.21-150500.13.61.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872355" version="1" comment="kernel-rt-vdso is &lt;5.14.21-150500.13.61.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872356" version="1" comment="kernel-rt_debug is &lt;5.14.21-150500.13.61.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872357" version="1" comment="kernel-rt_debug-devel is &lt;5.14.21-150500.13.61.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872358" version="1" comment="kernel-rt_debug-livepatch-devel is &lt;5.14.21-150500.13.61.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872359" version="1" comment="kernel-rt_debug-vdso is &lt;5.14.21-150500.13.61.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872360" version="1" comment="kernel-source-rt is &lt;5.14.21-150500.13.61.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872361" version="1" comment="kernel-syms-rt is &lt;5.14.21-150500.13.61.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872362" version="1" comment="kselftests-kmp-rt is &lt;5.14.21-150500.13.61.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872363" version="1" comment="ocfs2-kmp-rt is &lt;5.14.21-150500.13.61.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872364" version="1" comment="reiserfs-kmp-rt is &lt;5.14.21-150500.13.61.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872591" version="1" comment="MozillaFirefox is &lt;115.13.0-150200.152.143.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872592" version="1" comment="MozillaFirefox-branding-upstream is &lt;115.13.0-150200.152.143.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872593" version="1" comment="MozillaFirefox-devel is &lt;115.13.0-150200.152.143.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872594" version="1" comment="MozillaFirefox-translations-common is &lt;115.13.0-150200.152.143.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872595" version="1" comment="MozillaFirefox-translations-other is &lt;115.13.0-150200.152.143.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872596" version="1" comment="python311-zipp is &lt;3.15.0-150400.10.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872597" version="1" comment="libonig4 is &lt;6.7.0-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872598" version="1" comment="oniguruma-devel is &lt;6.7.0-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872599" version="1" comment="libvpx-devel is &lt;1.11.0-150400.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872600" version="1" comment="libvpx7 is &lt;1.11.0-150400.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872601" version="1" comment="libvpx7-32bit is &lt;1.11.0-150400.3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872602" version="1" comment="vpx-tools is &lt;1.11.0-150400.3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844621" version="1" comment="jasper is &lt;2.0.14-150000.3.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844622" version="1" comment="libjasper-devel is &lt;2.0.14-150000.3.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844623" version="1" comment="libjasper4 is &lt;2.0.14-150000.3.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844624" version="1" comment="libjasper4-32bit is &lt;2.0.14-150000.3.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872603" version="1" comment="tomcat10 is &lt;10.1.25-150200.5.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872604" version="1" comment="tomcat10-admin-webapps is &lt;10.1.25-150200.5.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872605" version="1" comment="tomcat10-docs-webapp is &lt;10.1.25-150200.5.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872606" version="1" comment="tomcat10-el-5_0-api is &lt;10.1.25-150200.5.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872607" version="1" comment="tomcat10-embed is &lt;10.1.25-150200.5.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872608" version="1" comment="tomcat10-jsp-3_1-api is &lt;10.1.25-150200.5.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872609" version="1" comment="tomcat10-jsvc is &lt;10.1.25-150200.5.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872610" version="1" comment="tomcat10-lib is &lt;10.1.25-150200.5.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872611" version="1" comment="tomcat10-servlet-6_0-api is &lt;10.1.25-150200.5.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872612" version="1" comment="tomcat10-webapps is &lt;10.1.25-150200.5.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872995" version="1" comment="libpython3_11-1_0 is &lt;3.11.9-150400.9.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872996" version="1" comment="libpython3_11-1_0-32bit is &lt;3.11.9-150400.9.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872997" version="1" comment="python311 is &lt;3.11.9-150400.9.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872998" version="1" comment="python311-32bit is &lt;3.11.9-150400.9.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872999" version="1" comment="python311-base is &lt;3.11.9-150400.9.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873000" version="1" comment="python311-base-32bit is &lt;3.11.9-150400.9.29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873001" version="1" comment="python311-curses is &lt;3.11.9-150400.9.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873002" version="1" comment="python311-dbm is &lt;3.11.9-150400.9.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873003" version="1" comment="python311-devel is &lt;3.11.9-150400.9.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873004" version="1" comment="python311-doc is &lt;3.11.9-150400.9.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873005" version="1" comment="python311-doc-devhelp is &lt;3.11.9-150400.9.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873006" version="1" comment="python311-idle is &lt;3.11.9-150400.9.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873007" version="1" comment="python311-testsuite is &lt;3.11.9-150400.9.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873008" version="1" comment="python311-tk is &lt;3.11.9-150400.9.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873009" version="1" comment="python311-tools is &lt;3.11.9-150400.9.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873010" version="1" comment="MozillaThunderbird is &lt;115.12.2-150200.8.168.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873011" version="1" comment="MozillaThunderbird-translations-common is &lt;115.12.2-150200.8.168.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873012" version="1" comment="MozillaThunderbird-translations-other is &lt;115.12.2-150200.8.168.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844625" version="1" comment="MozillaThunderbird is &lt;115.7.0-150200.8.145.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844626" version="1" comment="MozillaThunderbird-translations-common is &lt;115.7.0-150200.8.145.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844627" version="1" comment="MozillaThunderbird-translations-other is &lt;115.7.0-150200.8.145.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844628" version="1" comment="rear23a is &lt;2.3.a-150300.21.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873752" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873753" version="1" comment="libpython3_6m1_0-32bit is &lt;3.6.15-150300.10.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873754" version="1" comment="python3 is &lt;3.6.15-150300.10.65.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873755" version="1" comment="python3-base is &lt;3.6.15-150300.10.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873756" version="1" comment="python3-curses is &lt;3.6.15-150300.10.65.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873757" version="1" comment="python3-dbm is &lt;3.6.15-150300.10.65.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873758" version="1" comment="python3-devel is &lt;3.6.15-150300.10.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873759" version="1" comment="python3-doc is &lt;3.6.15-150300.10.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873760" version="1" comment="python3-doc-devhelp is &lt;3.6.15-150300.10.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873761" version="1" comment="python3-idle is &lt;3.6.15-150300.10.65.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873762" version="1" comment="python3-testsuite is &lt;3.6.15-150300.10.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873763" version="1" comment="python3-tk is &lt;3.6.15-150300.10.65.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873764" version="1" comment="python3-tools is &lt;3.6.15-150300.10.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873765" version="1" comment="tomcat is &lt;9.0.91-150200.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873766" version="1" comment="tomcat-admin-webapps is &lt;9.0.91-150200.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873767" version="1" comment="tomcat-docs-webapp is &lt;9.0.91-150200.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873768" version="1" comment="tomcat-el-3_0-api is &lt;9.0.91-150200.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873769" version="1" comment="tomcat-embed is &lt;9.0.91-150200.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873770" version="1" comment="tomcat-javadoc is &lt;9.0.91-150200.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873771" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.91-150200.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873772" version="1" comment="tomcat-jsvc is &lt;9.0.91-150200.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873773" version="1" comment="tomcat-lib is &lt;9.0.91-150200.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873774" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.91-150200.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873775" version="1" comment="tomcat-webapps is &lt;9.0.91-150200.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844629" version="1" comment="xorg-x11-server is &lt;21.1.4-150500.7.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844630" version="1" comment="xorg-x11-server-Xvfb is &lt;21.1.4-150500.7.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844631" version="1" comment="xorg-x11-server-extra is &lt;21.1.4-150500.7.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844632" version="1" comment="xorg-x11-server-sdk is &lt;21.1.4-150500.7.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844633" version="1" comment="xorg-x11-server-source is &lt;21.1.4-150500.7.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844634" version="1" comment="sevctl is &lt;0.4.3-150500.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874178" version="1" comment="corepack18 is &lt;18.20.4-150400.9.24.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874179" version="1" comment="nodejs18 is &lt;18.20.4-150400.9.24.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874180" version="1" comment="nodejs18-devel is &lt;18.20.4-150400.9.24.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874181" version="1" comment="nodejs18-docs is &lt;18.20.4-150400.9.24.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874182" version="1" comment="npm18 is &lt;18.20.4-150400.9.24.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874183" version="1" comment="corepack20 is &lt;20.15.1-150500.11.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874184" version="1" comment="nodejs20 is &lt;20.15.1-150500.11.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874185" version="1" comment="nodejs20-devel is &lt;20.15.1-150500.11.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874186" version="1" comment="nodejs20-docs is &lt;20.15.1-150500.11.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874187" version="1" comment="npm20 is &lt;20.15.1-150500.11.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874188" version="1" comment="python3-Django is &lt;2.0.7-150000.1.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874754" version="1" comment="emacs is &lt;27.2-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874755" version="1" comment="emacs-el is &lt;27.2-150400.3.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874756" version="1" comment="emacs-info is &lt;27.2-150400.3.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874757" version="1" comment="emacs-nox is &lt;27.2-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874758" version="1" comment="emacs-x11 is &lt;27.2-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874759" version="1" comment="etags is &lt;27.2-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874760" version="1" comment="mockito is &lt;5.11.0-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874761" version="1" comment="mockito-javadoc is &lt;5.11.0-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874762" version="1" comment="snakeyaml is &lt;2.2-150200.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874763" version="1" comment="snakeyaml-javadoc is &lt;2.2-150200.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874764" version="1" comment="testng is &lt;7.10.1-150200.3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874765" version="1" comment="testng-javadoc is &lt;7.10.1-150200.3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877148" version="1" comment="python3-Django is &lt;2.0.7-150000.1.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877149" version="1" comment="gnome-extensions is &lt;41.9-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877150" version="1" comment="gnome-shell is &lt;41.9-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877151" version="1" comment="gnome-shell-calendar is &lt;41.9-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877152" version="1" comment="gnome-shell-devel is &lt;41.9-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877153" version="1" comment="gnome-shell-lang is &lt;41.9-150400.3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877154" version="1" comment="libgit2-1_3 is &lt;1.3.0-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877155" version="1" comment="libgit2-1_3-32bit is &lt;1.3.0-150400.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877156" version="1" comment="libgit2-devel is &lt;1.3.0-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877201" version="1" comment="apache2 is &lt;2.4.51-150400.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877202" version="1" comment="apache2-devel is &lt;2.4.51-150400.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877203" version="1" comment="apache2-doc is &lt;2.4.51-150400.6.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877204" version="1" comment="apache2-event is &lt;2.4.51-150400.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877205" version="1" comment="apache2-example-pages is &lt;2.4.51-150400.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877206" version="1" comment="apache2-prefork is &lt;2.4.51-150400.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877207" version="1" comment="apache2-utils is &lt;2.4.51-150400.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877208" version="1" comment="apache2-worker is &lt;2.4.51-150400.6.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877209" version="1" comment="p7zip is &lt;16.02-150200.14.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877210" version="1" comment="p7zip-doc is &lt;16.02-150200.14.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877211" version="1" comment="p7zip-full is &lt;16.02-150200.14.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877212" version="1" comment="python311-dnspython is &lt;2.3.0-150400.12.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877213" version="1" comment="ghostscript is &lt;9.52-150000.197.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877214" version="1" comment="ghostscript-devel is &lt;9.52-150000.197.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877215" version="1" comment="ghostscript-x11 is &lt;9.52-150000.197.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877216" version="1" comment="java-17-openjdk is &lt;17.0.12.0-150400.3.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877217" version="1" comment="java-17-openjdk-demo is &lt;17.0.12.0-150400.3.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877218" version="1" comment="java-17-openjdk-devel is &lt;17.0.12.0-150400.3.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877219" version="1" comment="java-17-openjdk-headless is &lt;17.0.12.0-150400.3.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877220" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.12.0-150400.3.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877221" version="1" comment="java-17-openjdk-jmods is &lt;17.0.12.0-150400.3.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877222" version="1" comment="java-17-openjdk-src is &lt;17.0.12.0-150400.3.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877223" version="1" comment="java-11-openjdk is &lt;11.0.24.0-150000.3.116.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877224" version="1" comment="java-11-openjdk-demo is &lt;11.0.24.0-150000.3.116.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877225" version="1" comment="java-11-openjdk-devel is &lt;11.0.24.0-150000.3.116.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877226" version="1" comment="java-11-openjdk-headless is &lt;11.0.24.0-150000.3.116.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877227" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.24.0-150000.3.116.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877228" version="1" comment="java-11-openjdk-jmods is &lt;11.0.24.0-150000.3.116.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877229" version="1" comment="java-11-openjdk-src is &lt;11.0.24.0-150000.3.116.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877230" version="1" comment="espeak-ng is &lt;1.50-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877231" version="1" comment="espeak-ng-compat is &lt;1.50-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877232" version="1" comment="espeak-ng-compat-devel is &lt;1.50-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877233" version="1" comment="espeak-ng-devel is &lt;1.50-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877234" version="1" comment="libespeak-ng1 is &lt;1.50-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877235" version="1" comment="xen is &lt;4.17.4_04-150500.3.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877236" version="1" comment="xen-devel is &lt;4.17.4_04-150500.3.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877237" version="1" comment="xen-doc-html is &lt;4.17.4_04-150500.3.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877238" version="1" comment="xen-libs is &lt;4.17.4_04-150500.3.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877239" version="1" comment="xen-libs-32bit is &lt;4.17.4_04-150500.3.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877240" version="1" comment="xen-tools is &lt;4.17.4_04-150500.3.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877241" version="1" comment="xen-tools-domU is &lt;4.17.4_04-150500.3.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877242" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.17.4_04-150500.3.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877243" version="1" comment="python3-dnspython is &lt;1.15.0-150000.3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877244" version="1" comment="git is &lt;2.35.3-150300.10.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877245" version="1" comment="git-arch is &lt;2.35.3-150300.10.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877246" version="1" comment="git-core is &lt;2.35.3-150300.10.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877247" version="1" comment="git-credential-gnome-keyring is &lt;2.35.3-150300.10.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877248" version="1" comment="git-credential-libsecret is &lt;2.35.3-150300.10.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877249" version="1" comment="git-cvs is &lt;2.35.3-150300.10.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877250" version="1" comment="git-daemon is &lt;2.35.3-150300.10.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877251" version="1" comment="git-doc is &lt;2.35.3-150300.10.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877252" version="1" comment="git-email is &lt;2.35.3-150300.10.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877253" version="1" comment="git-gui is &lt;2.35.3-150300.10.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877254" version="1" comment="git-p4 is &lt;2.35.3-150300.10.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877255" version="1" comment="git-svn is &lt;2.35.3-150300.10.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877256" version="1" comment="git-web is &lt;2.35.3-150300.10.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877257" version="1" comment="gitk is &lt;2.35.3-150300.10.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877258" version="1" comment="perl-Git is &lt;2.35.3-150300.10.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877259" version="1" comment="login_defs is &lt;4.8.1-150400.10.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877260" version="1" comment="shadow is &lt;4.8.1-150400.10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844727" version="1" comment="xen is &lt;4.17.3_04-150500.3.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844728" version="1" comment="xen-devel is &lt;4.17.3_04-150500.3.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844729" version="1" comment="xen-doc-html is &lt;4.17.3_04-150500.3.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844730" version="1" comment="xen-libs is &lt;4.17.3_04-150500.3.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844731" version="1" comment="xen-libs-32bit is &lt;4.17.3_04-150500.3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844732" version="1" comment="xen-tools is &lt;4.17.3_04-150500.3.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844733" version="1" comment="xen-tools-domU is &lt;4.17.3_04-150500.3.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844734" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.17.3_04-150500.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877261" version="1" comment="gtk2-branding-upstream is &lt;2.24.33-150400.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877262" version="1" comment="gtk2-data is &lt;2.24.33-150400.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877263" version="1" comment="gtk2-devel is &lt;2.24.33-150400.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877264" version="1" comment="gtk2-devel-32bit is &lt;2.24.33-150400.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877265" version="1" comment="gtk2-immodule-amharic is &lt;2.24.33-150400.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877266" version="1" comment="gtk2-immodule-amharic-32bit is &lt;2.24.33-150400.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877267" version="1" comment="gtk2-immodule-inuktitut is &lt;2.24.33-150400.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877268" version="1" comment="gtk2-immodule-inuktitut-32bit is &lt;2.24.33-150400.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877269" version="1" comment="gtk2-immodule-multipress is &lt;2.24.33-150400.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877270" version="1" comment="gtk2-immodule-multipress-32bit is &lt;2.24.33-150400.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877271" version="1" comment="gtk2-immodule-thai is &lt;2.24.33-150400.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877272" version="1" comment="gtk2-immodule-thai-32bit is &lt;2.24.33-150400.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877273" version="1" comment="gtk2-immodule-tigrigna is &lt;2.24.33-150400.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877274" version="1" comment="gtk2-immodule-tigrigna-32bit is &lt;2.24.33-150400.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877275" version="1" comment="gtk2-immodule-vietnamese is &lt;2.24.33-150400.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877276" version="1" comment="gtk2-immodule-vietnamese-32bit is &lt;2.24.33-150400.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877277" version="1" comment="gtk2-immodule-xim is &lt;2.24.33-150400.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877278" version="1" comment="gtk2-immodule-xim-32bit is &lt;2.24.33-150400.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877279" version="1" comment="gtk2-lang is &lt;2.24.33-150400.4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877280" version="1" comment="gtk2-tools is &lt;2.24.33-150400.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877281" version="1" comment="gtk2-tools-32bit is &lt;2.24.33-150400.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877282" version="1" comment="libgtk-2_0-0 is &lt;2.24.33-150400.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877283" version="1" comment="libgtk-2_0-0-32bit is &lt;2.24.33-150400.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877284" version="1" comment="typelib-1_0-Gtk-2_0 is &lt;2.24.33-150400.4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877285" version="1" comment="gettext-its-gtk3 is &lt;3.24.34-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877286" version="1" comment="gtk3-branding-upstream is &lt;3.24.34-150400.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877287" version="1" comment="gtk3-data is &lt;3.24.34-150400.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877288" version="1" comment="gtk3-devel is &lt;3.24.34-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877289" version="1" comment="gtk3-devel-32bit is &lt;3.24.34-150400.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877290" version="1" comment="gtk3-devel-doc is &lt;3.24.34-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877291" version="1" comment="gtk3-immodule-amharic is &lt;3.24.34-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877292" version="1" comment="gtk3-immodule-amharic-32bit is &lt;3.24.34-150400.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877293" version="1" comment="gtk3-immodule-broadway is &lt;3.24.34-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877294" version="1" comment="gtk3-immodule-inuktitut is &lt;3.24.34-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877295" version="1" comment="gtk3-immodule-inuktitut-32bit is &lt;3.24.34-150400.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877296" version="1" comment="gtk3-immodule-multipress is &lt;3.24.34-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877297" version="1" comment="gtk3-immodule-multipress-32bit is &lt;3.24.34-150400.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877298" version="1" comment="gtk3-immodule-thai is &lt;3.24.34-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877299" version="1" comment="gtk3-immodule-thai-32bit is &lt;3.24.34-150400.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877300" version="1" comment="gtk3-immodule-tigrigna is &lt;3.24.34-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877301" version="1" comment="gtk3-immodule-tigrigna-32bit is &lt;3.24.34-150400.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877302" version="1" comment="gtk3-immodule-vietnamese is &lt;3.24.34-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877303" version="1" comment="gtk3-immodule-vietnamese-32bit is &lt;3.24.34-150400.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877304" version="1" comment="gtk3-immodule-wayland is &lt;3.24.34-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877305" version="1" comment="gtk3-immodule-wayland-32bit is &lt;3.24.34-150400.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877306" version="1" comment="gtk3-immodule-xim is &lt;3.24.34-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877307" version="1" comment="gtk3-immodule-xim-32bit is &lt;3.24.34-150400.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877308" version="1" comment="gtk3-lang is &lt;3.24.34-150400.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877309" version="1" comment="gtk3-schema is &lt;3.24.34-150400.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877310" version="1" comment="gtk3-tools is &lt;3.24.34-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877311" version="1" comment="gtk3-tools-32bit is &lt;3.24.34-150400.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877312" version="1" comment="libgtk-3-0 is &lt;3.24.34-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877313" version="1" comment="libgtk-3-0-32bit is &lt;3.24.34-150400.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877314" version="1" comment="typelib-1_0-Gtk-3_0 is &lt;3.24.34-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877315" version="1" comment="python3-urllib3 is &lt;1.25.10-150300.4.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877316" version="1" comment="liborc-0_4-0 is &lt;0.4.28-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877317" version="1" comment="liborc-0_4-0-32bit is &lt;0.4.28-150000.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877318" version="1" comment="orc is &lt;0.4.28-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877319" version="1" comment="orc-doc is &lt;0.4.28-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877320" version="1" comment="containerized-data-importer-api is &lt;1.59.0-150500.6.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877321" version="1" comment="containerized-data-importer-cloner is &lt;1.59.0-150500.6.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877322" version="1" comment="containerized-data-importer-controller is &lt;1.59.0-150500.6.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877323" version="1" comment="containerized-data-importer-importer is &lt;1.59.0-150500.6.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877324" version="1" comment="containerized-data-importer-manifests is &lt;1.59.0-150500.6.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877325" version="1" comment="containerized-data-importer-operator is &lt;1.59.0-150500.6.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877326" version="1" comment="containerized-data-importer-uploadproxy is &lt;1.59.0-150500.6.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877327" version="1" comment="containerized-data-importer-uploadserver is &lt;1.59.0-150500.6.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877328" version="1" comment="obs-service-cdi_containers_meta is &lt;1.59.0-150500.6.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877329" version="1" comment="kubevirt-container-disk is &lt;1.2.2-150500.8.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877330" version="1" comment="kubevirt-manifests is &lt;1.2.2-150500.8.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877331" version="1" comment="kubevirt-tests is &lt;1.2.2-150500.8.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877332" version="1" comment="kubevirt-virt-api is &lt;1.2.2-150500.8.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877333" version="1" comment="kubevirt-virt-controller is &lt;1.2.2-150500.8.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877334" version="1" comment="kubevirt-virt-exportproxy is &lt;1.2.2-150500.8.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877335" version="1" comment="kubevirt-virt-exportserver is &lt;1.2.2-150500.8.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877336" version="1" comment="kubevirt-virt-handler is &lt;1.2.2-150500.8.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877337" version="1" comment="kubevirt-virt-launcher is &lt;1.2.2-150500.8.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877338" version="1" comment="kubevirt-virt-operator is &lt;1.2.2-150500.8.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877339" version="1" comment="kubevirt-virtctl is &lt;1.2.2-150500.8.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877340" version="1" comment="obs-service-kubevirt_containers_meta is &lt;1.2.2-150500.8.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877720" version="1" comment="libfreebl3 is &lt;3.101.2-150400.3.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877721" version="1" comment="libfreebl3-32bit is &lt;3.101.2-150400.3.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877722" version="1" comment="libsoftokn3 is &lt;3.101.2-150400.3.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877723" version="1" comment="libsoftokn3-32bit is &lt;3.101.2-150400.3.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877724" version="1" comment="mozilla-nss is &lt;3.101.2-150400.3.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877725" version="1" comment="mozilla-nss-32bit is &lt;3.101.2-150400.3.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877726" version="1" comment="mozilla-nss-certs is &lt;3.101.2-150400.3.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877727" version="1" comment="mozilla-nss-certs-32bit is &lt;3.101.2-150400.3.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877728" version="1" comment="mozilla-nss-devel is &lt;3.101.2-150400.3.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877729" version="1" comment="mozilla-nss-sysinit is &lt;3.101.2-150400.3.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877730" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.101.2-150400.3.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877731" version="1" comment="mozilla-nss-tools is &lt;3.101.2-150400.3.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878078" version="1" comment="dri3proto-devel is &lt;1.2-150100.6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844819" version="1" comment="libnss_slurm2_20_02 is &lt;20.02.7-150100.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844820" version="1" comment="libpmi0_20_02 is &lt;20.02.7-150100.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844821" version="1" comment="perl-slurm_20_02 is &lt;20.02.7-150100.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844822" version="1" comment="slurm_20_02 is &lt;20.02.7-150100.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844823" version="1" comment="slurm_20_02-auth-none is &lt;20.02.7-150100.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844824" version="1" comment="slurm_20_02-config is &lt;20.02.7-150100.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844825" version="1" comment="slurm_20_02-config-man is &lt;20.02.7-150100.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844826" version="1" comment="slurm_20_02-cray is &lt;20.02.7-150100.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844827" version="1" comment="slurm_20_02-devel is &lt;20.02.7-150100.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844828" version="1" comment="slurm_20_02-doc is &lt;20.02.7-150100.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844829" version="1" comment="slurm_20_02-hdf5 is &lt;20.02.7-150100.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844830" version="1" comment="slurm_20_02-lua is &lt;20.02.7-150100.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844831" version="1" comment="slurm_20_02-munge is &lt;20.02.7-150100.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844832" version="1" comment="slurm_20_02-node is &lt;20.02.7-150100.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844833" version="1" comment="slurm_20_02-openlava is &lt;20.02.7-150100.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844834" version="1" comment="slurm_20_02-pam_slurm is &lt;20.02.7-150100.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844835" version="1" comment="slurm_20_02-plugins is &lt;20.02.7-150100.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844836" version="1" comment="slurm_20_02-rest is &lt;20.02.7-150100.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844837" version="1" comment="slurm_20_02-seff is &lt;20.02.7-150100.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844838" version="1" comment="slurm_20_02-sjstat is &lt;20.02.7-150100.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844839" version="1" comment="slurm_20_02-slurmdbd is &lt;20.02.7-150100.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844840" version="1" comment="slurm_20_02-sql is &lt;20.02.7-150100.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844841" version="1" comment="slurm_20_02-sview is &lt;20.02.7-150100.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844842" version="1" comment="slurm_20_02-testsuite is &lt;20.02.7-150100.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844843" version="1" comment="slurm_20_02-torque is &lt;20.02.7-150100.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844844" version="1" comment="slurm_20_02-webdoc is &lt;20.02.7-150100.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878079" version="1" comment="patch is &lt;2.7.6-150000.5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878080" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.422-150000.3.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878081" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.422-150000.3.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878082" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.422-150000.3.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878083" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.422-150000.3.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878084" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.422-150000.3.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878085" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.422-150000.3.97.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878086" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.422-150000.3.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878087" version="1" comment="libnbd is &lt;1.18.5-150300.8.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878088" version="1" comment="libnbd-bash-completion is &lt;1.18.5-150300.8.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878089" version="1" comment="libnbd-devel is &lt;1.18.5-150300.8.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878090" version="1" comment="libnbd0 is &lt;1.18.5-150300.8.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878091" version="1" comment="nbdfuse is &lt;1.18.5-150300.8.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878092" version="1" comment="python3-libnbd is &lt;1.18.5-150300.8.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878093" version="1" comment="MozillaThunderbird is &lt;115.13.0-150200.8.171.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878094" version="1" comment="MozillaThunderbird-translations-common is &lt;115.13.0-150200.8.171.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878095" version="1" comment="MozillaThunderbird-translations-other is &lt;115.13.0-150200.8.171.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878213" version="1" comment="ffmpeg-4 is &lt;4.4-150400.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878214" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.4-150400.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878215" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.4-150400.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878216" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.4-150400.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878217" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.4-150400.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878218" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.4-150400.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878219" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.4-150400.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878220" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.4-150400.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878221" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.4-150400.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878222" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.4-150400.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878223" version="1" comment="ffmpeg-4-private-devel is &lt;4.4-150400.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878224" version="1" comment="libavcodec58_134 is &lt;4.4-150400.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878225" version="1" comment="libavcodec58_134-32bit is &lt;4.4-150400.3.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878226" version="1" comment="libavdevice58_13 is &lt;4.4-150400.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878227" version="1" comment="libavdevice58_13-32bit is &lt;4.4-150400.3.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878228" version="1" comment="libavfilter7_110 is &lt;4.4-150400.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878229" version="1" comment="libavfilter7_110-32bit is &lt;4.4-150400.3.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878230" version="1" comment="libavformat58_76 is &lt;4.4-150400.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878231" version="1" comment="libavformat58_76-32bit is &lt;4.4-150400.3.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878232" version="1" comment="libavresample4_0 is &lt;4.4-150400.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878233" version="1" comment="libavresample4_0-32bit is &lt;4.4-150400.3.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878234" version="1" comment="libavutil56_70 is &lt;4.4-150400.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878235" version="1" comment="libavutil56_70-32bit is &lt;4.4-150400.3.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878236" version="1" comment="libpostproc55_9 is &lt;4.4-150400.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878237" version="1" comment="libpostproc55_9-32bit is &lt;4.4-150400.3.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878238" version="1" comment="libswresample3_9 is &lt;4.4-150400.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878239" version="1" comment="libswresample3_9-32bit is &lt;4.4-150400.3.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878240" version="1" comment="libswscale5_9 is &lt;4.4-150400.3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878241" version="1" comment="libswscale5_9-32bit is &lt;4.4-150400.3.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878242" version="1" comment="login_defs is &lt;4.8.1-150400.10.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878243" version="1" comment="shadow is &lt;4.8.1-150400.10.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878244" version="1" comment="ffmpeg is &lt;3.4.2-150200.11.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878245" version="1" comment="ffmpeg-private-devel is &lt;3.4.2-150200.11.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878246" version="1" comment="libavcodec-devel is &lt;3.4.2-150200.11.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878247" version="1" comment="libavcodec57 is &lt;3.4.2-150200.11.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878248" version="1" comment="libavcodec57-32bit is &lt;3.4.2-150200.11.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878249" version="1" comment="libavdevice-devel is &lt;3.4.2-150200.11.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878250" version="1" comment="libavdevice57 is &lt;3.4.2-150200.11.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878251" version="1" comment="libavdevice57-32bit is &lt;3.4.2-150200.11.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878252" version="1" comment="libavfilter-devel is &lt;3.4.2-150200.11.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878253" version="1" comment="libavfilter6 is &lt;3.4.2-150200.11.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878254" version="1" comment="libavfilter6-32bit is &lt;3.4.2-150200.11.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878255" version="1" comment="libavformat-devel is &lt;3.4.2-150200.11.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878256" version="1" comment="libavformat57 is &lt;3.4.2-150200.11.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878257" version="1" comment="libavformat57-32bit is &lt;3.4.2-150200.11.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878258" version="1" comment="libavresample-devel is &lt;3.4.2-150200.11.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878259" version="1" comment="libavresample3 is &lt;3.4.2-150200.11.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878260" version="1" comment="libavresample3-32bit is &lt;3.4.2-150200.11.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878261" version="1" comment="libavutil-devel is &lt;3.4.2-150200.11.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878262" version="1" comment="libavutil55 is &lt;3.4.2-150200.11.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878263" version="1" comment="libavutil55-32bit is &lt;3.4.2-150200.11.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878264" version="1" comment="libpostproc-devel is &lt;3.4.2-150200.11.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878265" version="1" comment="libpostproc54 is &lt;3.4.2-150200.11.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878266" version="1" comment="libpostproc54-32bit is &lt;3.4.2-150200.11.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878267" version="1" comment="libswresample-devel is &lt;3.4.2-150200.11.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878268" version="1" comment="libswresample2 is &lt;3.4.2-150200.11.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878269" version="1" comment="libswresample2-32bit is &lt;3.4.2-150200.11.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878270" version="1" comment="libswscale-devel is &lt;3.4.2-150200.11.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878271" version="1" comment="libswscale4 is &lt;3.4.2-150200.11.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878272" version="1" comment="libswscale4-32bit is &lt;3.4.2-150200.11.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878273" version="1" comment="python3-Django is &lt;2.0.7-150000.1.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844845" version="1" comment="libnss_slurm2_22_05 is &lt;22.05.11-150300.7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844846" version="1" comment="libpmi0_22_05 is &lt;22.05.11-150300.7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844847" version="1" comment="libslurm38 is &lt;22.05.11-150300.7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844848" version="1" comment="perl-slurm_22_05 is &lt;22.05.11-150300.7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844849" version="1" comment="slurm_22_05 is &lt;22.05.11-150300.7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844850" version="1" comment="slurm_22_05-auth-none is &lt;22.05.11-150300.7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844851" version="1" comment="slurm_22_05-config is &lt;22.05.11-150300.7.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844852" version="1" comment="slurm_22_05-config-man is &lt;22.05.11-150300.7.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844853" version="1" comment="slurm_22_05-cray is &lt;22.05.11-150300.7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844854" version="1" comment="slurm_22_05-devel is &lt;22.05.11-150300.7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844855" version="1" comment="slurm_22_05-doc is &lt;22.05.11-150300.7.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844856" version="1" comment="slurm_22_05-hdf5 is &lt;22.05.11-150300.7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844857" version="1" comment="slurm_22_05-lua is &lt;22.05.11-150300.7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844858" version="1" comment="slurm_22_05-munge is &lt;22.05.11-150300.7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844859" version="1" comment="slurm_22_05-node is &lt;22.05.11-150300.7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844860" version="1" comment="slurm_22_05-openlava is &lt;22.05.11-150300.7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844861" version="1" comment="slurm_22_05-pam_slurm is &lt;22.05.11-150300.7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844862" version="1" comment="slurm_22_05-plugins is &lt;22.05.11-150300.7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844863" version="1" comment="slurm_22_05-rest is &lt;22.05.11-150300.7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844864" version="1" comment="slurm_22_05-seff is &lt;22.05.11-150300.7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844865" version="1" comment="slurm_22_05-sjstat is &lt;22.05.11-150300.7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844866" version="1" comment="slurm_22_05-slurmdbd is &lt;22.05.11-150300.7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844867" version="1" comment="slurm_22_05-sql is &lt;22.05.11-150300.7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844868" version="1" comment="slurm_22_05-sview is &lt;22.05.11-150300.7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844869" version="1" comment="slurm_22_05-testsuite is &lt;22.05.11-150300.7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844870" version="1" comment="slurm_22_05-torque is &lt;22.05.11-150300.7.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844871" version="1" comment="slurm_22_05-webdoc is &lt;22.05.11-150300.7.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844872" version="1" comment="libnss_slurm2 is &lt;23.02.7-150500.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844873" version="1" comment="libpmi0 is &lt;23.02.7-150500.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844874" version="1" comment="libslurm39 is &lt;23.02.7-150500.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844875" version="1" comment="perl-slurm is &lt;23.02.7-150500.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844876" version="1" comment="slurm is &lt;23.02.7-150500.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844877" version="1" comment="slurm-auth-none is &lt;23.02.7-150500.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844878" version="1" comment="slurm-config is &lt;23.02.7-150500.5.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844879" version="1" comment="slurm-config-man is &lt;23.02.7-150500.5.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844880" version="1" comment="slurm-cray is &lt;23.02.7-150500.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844881" version="1" comment="slurm-devel is &lt;23.02.7-150500.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844882" version="1" comment="slurm-doc is &lt;23.02.7-150500.5.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844883" version="1" comment="slurm-hdf5 is &lt;23.02.7-150500.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844884" version="1" comment="slurm-lua is &lt;23.02.7-150500.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844885" version="1" comment="slurm-munge is &lt;23.02.7-150500.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844886" version="1" comment="slurm-node is &lt;23.02.7-150500.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844887" version="1" comment="slurm-openlava is &lt;23.02.7-150500.5.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844888" version="1" comment="slurm-pam_slurm is &lt;23.02.7-150500.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844889" version="1" comment="slurm-plugin-ext-sensors-rrd is &lt;23.02.7-150500.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844890" version="1" comment="slurm-plugins is &lt;23.02.7-150500.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844891" version="1" comment="slurm-rest is &lt;23.02.7-150500.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844892" version="1" comment="slurm-seff is &lt;23.02.7-150500.5.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844893" version="1" comment="slurm-sjstat is &lt;23.02.7-150500.5.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844894" version="1" comment="slurm-slurmdbd is &lt;23.02.7-150500.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844895" version="1" comment="slurm-sql is &lt;23.02.7-150500.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844896" version="1" comment="slurm-sview is &lt;23.02.7-150500.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844897" version="1" comment="slurm-testsuite is &lt;23.02.7-150500.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844898" version="1" comment="slurm-torque is &lt;23.02.7-150500.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844899" version="1" comment="slurm-webdoc is &lt;23.02.7-150500.5.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878571" version="1" comment="kubernetes1.23-apiserver is &lt;1.23.17-150500.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878572" version="1" comment="kubernetes1.23-client is &lt;1.23.17-150500.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878573" version="1" comment="kubernetes1.23-client-bash-completion is &lt;1.23.17-150500.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878574" version="1" comment="kubernetes1.23-client-common is &lt;1.23.17-150500.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878575" version="1" comment="kubernetes1.23-client-fish-completion is &lt;1.23.17-150500.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878576" version="1" comment="kubernetes1.23-controller-manager is &lt;1.23.17-150500.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878577" version="1" comment="kubernetes1.23-kubeadm is &lt;1.23.17-150500.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878578" version="1" comment="kubernetes1.23-kubelet is &lt;1.23.17-150500.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878579" version="1" comment="kubernetes1.23-kubelet-common is &lt;1.23.17-150500.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878580" version="1" comment="kubernetes1.23-proxy is &lt;1.23.17-150500.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878581" version="1" comment="kubernetes1.23-scheduler is &lt;1.23.17-150500.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878582" version="1" comment="kubernetes1.24-apiserver is &lt;1.24.17-150500.3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878583" version="1" comment="kubernetes1.24-client is &lt;1.24.17-150500.3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878584" version="1" comment="kubernetes1.24-client-bash-completion is &lt;1.24.17-150500.3.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878585" version="1" comment="kubernetes1.24-client-common is &lt;1.24.17-150500.3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878586" version="1" comment="kubernetes1.24-client-fish-completion is &lt;1.24.17-150500.3.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878587" version="1" comment="kubernetes1.24-controller-manager is &lt;1.24.17-150500.3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878588" version="1" comment="kubernetes1.24-kubeadm is &lt;1.24.17-150500.3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878589" version="1" comment="kubernetes1.24-kubelet is &lt;1.24.17-150500.3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878590" version="1" comment="kubernetes1.24-kubelet-common is &lt;1.24.17-150500.3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878591" version="1" comment="kubernetes1.24-proxy is &lt;1.24.17-150500.3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878592" version="1" comment="kubernetes1.24-scheduler is &lt;1.24.17-150500.3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878668" version="1" comment="python3-Twisted is &lt;22.2.0-150400.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878669" version="1" comment="python3-Django is &lt;2.0.7-150000.1.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878670" version="1" comment="bind is &lt;9.16.50-150500.8.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878671" version="1" comment="bind-doc is &lt;9.16.50-150500.8.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878672" version="1" comment="bind-utils is &lt;9.16.50-150500.8.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878673" version="1" comment="python3-bind is &lt;9.16.50-150500.8.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878674" version="1" comment="ca-certificates-mozilla is &lt;2.68-150200.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878675" version="1" comment="ca-certificates-mozilla-prebuilt is &lt;2.68-150200.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878780" version="1" comment="libQt6Concurrent6 is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878781" version="1" comment="libQt6Core6 is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878782" version="1" comment="libQt6DBus6 is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878783" version="1" comment="libQt6Gui6 is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878784" version="1" comment="libQt6Network6 is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878785" version="1" comment="libQt6OpenGL6 is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878786" version="1" comment="libQt6OpenGLWidgets6 is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878787" version="1" comment="libQt6PrintSupport6 is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878788" version="1" comment="libQt6Sql6 is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878789" version="1" comment="libQt6Test6 is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878790" version="1" comment="libQt6Widgets6 is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878791" version="1" comment="libQt6Xml6 is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878792" version="1" comment="qt6-base-common-devel is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878793" version="1" comment="qt6-base-devel is &lt;6.4.2-150500.3.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878794" version="1" comment="qt6-base-docs-html is &lt;6.4.2-150500.3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878795" version="1" comment="qt6-base-docs-qch is &lt;6.4.2-150500.3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878796" version="1" comment="qt6-base-examples is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878797" version="1" comment="qt6-base-private-devel is &lt;6.4.2-150500.3.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878798" version="1" comment="qt6-concurrent-devel is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878799" version="1" comment="qt6-core-devel is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878800" version="1" comment="qt6-core-private-devel is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878801" version="1" comment="qt6-dbus-devel is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878802" version="1" comment="qt6-dbus-private-devel is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878803" version="1" comment="qt6-docs-common is &lt;6.4.2-150500.3.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878804" version="1" comment="qt6-gui-devel is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878805" version="1" comment="qt6-gui-private-devel is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878806" version="1" comment="qt6-kmssupport-devel-static is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878807" version="1" comment="qt6-kmssupport-private-devel is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878808" version="1" comment="qt6-network-devel is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878809" version="1" comment="qt6-network-private-devel is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878810" version="1" comment="qt6-network-tls is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878811" version="1" comment="qt6-networkinformation-glib is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878812" version="1" comment="qt6-networkinformation-nm is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878813" version="1" comment="qt6-opengl-devel is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878814" version="1" comment="qt6-opengl-private-devel is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878815" version="1" comment="qt6-openglwidgets-devel is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878816" version="1" comment="qt6-platformsupport-devel-static is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878817" version="1" comment="qt6-platformsupport-private-devel is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878818" version="1" comment="qt6-platformtheme-gtk3 is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878819" version="1" comment="qt6-platformtheme-xdgdesktopportal is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878820" version="1" comment="qt6-printsupport-cups is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878821" version="1" comment="qt6-printsupport-devel is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878822" version="1" comment="qt6-printsupport-private-devel is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878823" version="1" comment="qt6-sql-devel is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878824" version="1" comment="qt6-sql-mysql is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878825" version="1" comment="qt6-sql-postgresql is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878826" version="1" comment="qt6-sql-private-devel is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878827" version="1" comment="qt6-sql-sqlite is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878828" version="1" comment="qt6-sql-unixODBC is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878829" version="1" comment="qt6-test-devel is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878830" version="1" comment="qt6-test-private-devel is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878831" version="1" comment="qt6-widgets-devel is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878832" version="1" comment="qt6-widgets-private-devel is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878833" version="1" comment="qt6-xml-devel is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878834" version="1" comment="qt6-xml-private-devel is &lt;6.4.2-150500.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844900" version="1" comment="libnss_slurm2_20_11 is &lt;20.11.9-150200.6.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844901" version="1" comment="libpmi0_20_11 is &lt;20.11.9-150200.6.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844902" version="1" comment="perl-slurm_20_11 is &lt;20.11.9-150200.6.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844903" version="1" comment="slurm_20_11 is &lt;20.11.9-150200.6.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844904" version="1" comment="slurm_20_11-auth-none is &lt;20.11.9-150200.6.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844905" version="1" comment="slurm_20_11-config is &lt;20.11.9-150200.6.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844906" version="1" comment="slurm_20_11-config-man is &lt;20.11.9-150200.6.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844907" version="1" comment="slurm_20_11-cray is &lt;20.11.9-150200.6.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844908" version="1" comment="slurm_20_11-devel is &lt;20.11.9-150200.6.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844909" version="1" comment="slurm_20_11-doc is &lt;20.11.9-150200.6.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844910" version="1" comment="slurm_20_11-hdf5 is &lt;20.11.9-150200.6.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844911" version="1" comment="slurm_20_11-lua is &lt;20.11.9-150200.6.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844912" version="1" comment="slurm_20_11-munge is &lt;20.11.9-150200.6.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844913" version="1" comment="slurm_20_11-node is &lt;20.11.9-150200.6.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844914" version="1" comment="slurm_20_11-openlava is &lt;20.11.9-150200.6.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844915" version="1" comment="slurm_20_11-pam_slurm is &lt;20.11.9-150200.6.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844916" version="1" comment="slurm_20_11-plugins is &lt;20.11.9-150200.6.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844917" version="1" comment="slurm_20_11-rest is &lt;20.11.9-150200.6.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844918" version="1" comment="slurm_20_11-seff is &lt;20.11.9-150200.6.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844919" version="1" comment="slurm_20_11-sjstat is &lt;20.11.9-150200.6.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844920" version="1" comment="slurm_20_11-slurmdbd is &lt;20.11.9-150200.6.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844921" version="1" comment="slurm_20_11-sql is &lt;20.11.9-150200.6.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844922" version="1" comment="slurm_20_11-sview is &lt;20.11.9-150200.6.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844923" version="1" comment="slurm_20_11-torque is &lt;20.11.9-150200.6.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844924" version="1" comment="slurm_20_11-webdoc is &lt;20.11.9-150200.6.16.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878835" version="1" comment="python311-Twisted is &lt;22.10.0-150400.5.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878836" version="1" comment="python311-Twisted-all_non_platform is &lt;22.10.0-150400.5.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878837" version="1" comment="python311-Twisted-conch is &lt;22.10.0-150400.5.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878838" version="1" comment="python311-Twisted-conch_nacl is &lt;22.10.0-150400.5.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878839" version="1" comment="python311-Twisted-contextvars is &lt;22.10.0-150400.5.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878840" version="1" comment="python311-Twisted-http2 is &lt;22.10.0-150400.5.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878841" version="1" comment="python311-Twisted-serial is &lt;22.10.0-150400.5.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878842" version="1" comment="python311-Twisted-tls is &lt;22.10.0-150400.5.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878843" version="1" comment="python-gunicorn-doc is &lt;19.7.1-150000.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878844" version="1" comment="python3-gunicorn is &lt;19.7.1-150000.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878845" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878846" version="1" comment="libQt5Bootstrap-devel-static-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878847" version="1" comment="libQt5Concurrent-devel is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878848" version="1" comment="libQt5Concurrent-devel-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878849" version="1" comment="libQt5Concurrent5 is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878850" version="1" comment="libQt5Concurrent5-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878851" version="1" comment="libQt5Core-devel is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878852" version="1" comment="libQt5Core-devel-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878853" version="1" comment="libQt5Core-private-headers-devel is &lt;5.15.8+kde185-150500.4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878854" version="1" comment="libQt5Core5 is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878855" version="1" comment="libQt5Core5-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878856" version="1" comment="libQt5DBus-devel is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878857" version="1" comment="libQt5DBus-devel-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878858" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.15.8+kde185-150500.4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878859" version="1" comment="libQt5DBus5 is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878860" version="1" comment="libQt5DBus5-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878861" version="1" comment="libQt5Gui-devel is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878862" version="1" comment="libQt5Gui-devel-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878863" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.15.8+kde185-150500.4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878864" version="1" comment="libQt5Gui5 is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878865" version="1" comment="libQt5Gui5-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878866" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878867" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.15.8+kde185-150500.4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878868" version="1" comment="libQt5Network-devel is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878869" version="1" comment="libQt5Network-devel-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878870" version="1" comment="libQt5Network-private-headers-devel is &lt;5.15.8+kde185-150500.4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878871" version="1" comment="libQt5Network5 is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878872" version="1" comment="libQt5Network5-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878873" version="1" comment="libQt5OpenGL-devel is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878874" version="1" comment="libQt5OpenGL-devel-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878875" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.15.8+kde185-150500.4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878876" version="1" comment="libQt5OpenGL5 is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878877" version="1" comment="libQt5OpenGL5-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878878" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878879" version="1" comment="libQt5OpenGLExtensions-devel-static-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878880" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878881" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878882" version="1" comment="libQt5PlatformSupport-devel-static-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878883" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.15.8+kde185-150500.4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878884" version="1" comment="libQt5PrintSupport-devel is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878885" version="1" comment="libQt5PrintSupport-devel-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878886" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.15.8+kde185-150500.4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878887" version="1" comment="libQt5PrintSupport5 is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878888" version="1" comment="libQt5PrintSupport5-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878889" version="1" comment="libQt5Sql-devel is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878890" version="1" comment="libQt5Sql-devel-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878891" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.15.8+kde185-150500.4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878892" version="1" comment="libQt5Sql5 is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878893" version="1" comment="libQt5Sql5-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878894" version="1" comment="libQt5Sql5-mysql is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878895" version="1" comment="libQt5Sql5-mysql-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878896" version="1" comment="libQt5Sql5-postgresql is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878897" version="1" comment="libQt5Sql5-postgresql-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878898" version="1" comment="libQt5Sql5-sqlite is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878899" version="1" comment="libQt5Sql5-sqlite-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878900" version="1" comment="libQt5Sql5-unixODBC is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878901" version="1" comment="libQt5Sql5-unixODBC-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878902" version="1" comment="libQt5Test-devel is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878903" version="1" comment="libQt5Test-devel-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878904" version="1" comment="libQt5Test-private-headers-devel is &lt;5.15.8+kde185-150500.4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878905" version="1" comment="libQt5Test5 is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878906" version="1" comment="libQt5Test5-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878907" version="1" comment="libQt5Widgets-devel is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878908" version="1" comment="libQt5Widgets-devel-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878909" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.15.8+kde185-150500.4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878910" version="1" comment="libQt5Widgets5 is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878911" version="1" comment="libQt5Widgets5-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878912" version="1" comment="libQt5Xml-devel is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878913" version="1" comment="libQt5Xml-devel-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878914" version="1" comment="libQt5Xml5 is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878915" version="1" comment="libQt5Xml5-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878916" version="1" comment="libqt5-qtbase-common-devel is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878917" version="1" comment="libqt5-qtbase-devel is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878918" version="1" comment="libqt5-qtbase-examples is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878919" version="1" comment="libqt5-qtbase-examples-32bit is &lt;5.15.8+kde185-150500.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878920" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878921" version="1" comment="libqt5-qtbase-platformtheme-xdgdesktopportal is &lt;5.15.8+kde185-150500.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878922" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.15.8+kde185-150500.4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879132" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150500.17.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879133" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1l-150500.17.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879134" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150500.17.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879135" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1l-150500.17.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879136" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150500.17.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879137" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1l-150500.17.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879138" version="1" comment="openssl-1_1 is &lt;1.1.1l-150500.17.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879139" version="1" comment="openssl-1_1-doc is &lt;1.1.1l-150500.17.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879140" version="1" comment="cluster-md-kmp-rt is &lt;5.14.21-150500.13.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879141" version="1" comment="dlm-kmp-rt is &lt;5.14.21-150500.13.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879142" version="1" comment="gfs2-kmp-rt is &lt;5.14.21-150500.13.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879143" version="1" comment="kernel-devel-rt is &lt;5.14.21-150500.13.64.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879144" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879145" version="1" comment="kernel-rt-devel is &lt;5.14.21-150500.13.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879146" version="1" comment="kernel-rt-extra is &lt;5.14.21-150500.13.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879147" version="1" comment="kernel-rt-livepatch is &lt;5.14.21-150500.13.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879148" version="1" comment="kernel-rt-livepatch-devel is &lt;5.14.21-150500.13.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879149" version="1" comment="kernel-rt-optional is &lt;5.14.21-150500.13.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879150" version="1" comment="kernel-rt-vdso is &lt;5.14.21-150500.13.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879151" version="1" comment="kernel-rt_debug is &lt;5.14.21-150500.13.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879152" version="1" comment="kernel-rt_debug-devel is &lt;5.14.21-150500.13.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879153" version="1" comment="kernel-rt_debug-livepatch-devel is &lt;5.14.21-150500.13.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879154" version="1" comment="kernel-rt_debug-vdso is &lt;5.14.21-150500.13.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879155" version="1" comment="kernel-source-rt is &lt;5.14.21-150500.13.64.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879156" version="1" comment="kernel-syms-rt is &lt;5.14.21-150500.13.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879157" version="1" comment="kselftests-kmp-rt is &lt;5.14.21-150500.13.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879158" version="1" comment="ocfs2-kmp-rt is &lt;5.14.21-150500.13.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879159" version="1" comment="reiserfs-kmp-rt is &lt;5.14.21-150500.13.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879480" version="1" comment="python39-setuptools is &lt;44.1.1-150300.7.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879481" version="1" comment="python310-setuptools is &lt;67.6.1-150400.4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879482" version="1" comment="python3-Pillow is &lt;7.2.0-150300.3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879483" version="1" comment="python3-Pillow-tk is &lt;7.2.0-150300.3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879658" version="1" comment="kubernetes1.25-client is &lt;1.25.16-150400.9.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879659" version="1" comment="kubernetes1.25-client-common is &lt;1.25.16-150400.9.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879841" version="1" comment="cluster-md-kmp-64kb is &lt;5.14.21-150500.55.73.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879842" version="1" comment="cluster-md-kmp-default is &lt;5.14.21-150500.55.73.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879843" version="1" comment="dlm-kmp-64kb is &lt;5.14.21-150500.55.73.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879844" version="1" comment="dlm-kmp-default is &lt;5.14.21-150500.55.73.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879845" version="1" comment="dtb-allwinner is &lt;5.14.21-150500.55.73.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879846" version="1" comment="dtb-altera is &lt;5.14.21-150500.55.73.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879847" version="1" comment="dtb-amazon is &lt;5.14.21-150500.55.73.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879848" version="1" comment="dtb-amd is &lt;5.14.21-150500.55.73.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879849" version="1" comment="dtb-amlogic is &lt;5.14.21-150500.55.73.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879850" version="1" comment="dtb-apm is &lt;5.14.21-150500.55.73.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879851" version="1" comment="dtb-apple is &lt;5.14.21-150500.55.73.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879852" version="1" comment="dtb-arm is &lt;5.14.21-150500.55.73.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879853" version="1" comment="dtb-broadcom is &lt;5.14.21-150500.55.73.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879854" version="1" comment="dtb-cavium is &lt;5.14.21-150500.55.73.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879855" version="1" comment="dtb-exynos is &lt;5.14.21-150500.55.73.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879856" version="1" comment="dtb-freescale is &lt;5.14.21-150500.55.73.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879857" version="1" comment="dtb-hisilicon is &lt;5.14.21-150500.55.73.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879858" version="1" comment="dtb-lg is &lt;5.14.21-150500.55.73.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879859" version="1" comment="dtb-marvell is &lt;5.14.21-150500.55.73.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879860" version="1" comment="dtb-mediatek is &lt;5.14.21-150500.55.73.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879861" version="1" comment="dtb-nvidia is &lt;5.14.21-150500.55.73.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879862" version="1" comment="dtb-qcom is &lt;5.14.21-150500.55.73.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879863" version="1" comment="dtb-renesas is &lt;5.14.21-150500.55.73.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879864" version="1" comment="dtb-rockchip is &lt;5.14.21-150500.55.73.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879865" version="1" comment="dtb-socionext is &lt;5.14.21-150500.55.73.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879866" version="1" comment="dtb-sprd is &lt;5.14.21-150500.55.73.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879867" version="1" comment="dtb-xilinx is &lt;5.14.21-150500.55.73.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879868" version="1" comment="gfs2-kmp-64kb is &lt;5.14.21-150500.55.73.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879869" version="1" comment="gfs2-kmp-default is &lt;5.14.21-150500.55.73.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879870" version="1" comment="kernel-64kb is &lt;5.14.21-150500.55.73.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879871" version="1" comment="kernel-64kb-devel is &lt;5.14.21-150500.55.73.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879872" version="1" comment="kernel-64kb-extra is &lt;5.14.21-150500.55.73.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879873" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.14.21-150500.55.73.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879874" version="1" comment="kernel-64kb-optional is &lt;5.14.21-150500.55.73.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879875" version="1" comment="kernel-debug is &lt;5.14.21-150500.55.73.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879876" version="1" comment="kernel-debug-devel is &lt;5.14.21-150500.55.73.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879877" version="1" comment="kernel-debug-livepatch-devel is &lt;5.14.21-150500.55.73.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879878" version="1" comment="kernel-debug-vdso is &lt;5.14.21-150500.55.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879879" version="1" comment="kernel-default is &lt;5.14.21-150500.55.73.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879880" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.73.1.150500.6.33.8 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879881" version="1" comment="kernel-default-base-rebuild is &lt;5.14.21-150500.55.73.1.150500.6.33.8 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879882" version="1" comment="kernel-default-devel is &lt;5.14.21-150500.55.73.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879883" version="1" comment="kernel-default-extra is &lt;5.14.21-150500.55.73.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879884" version="1" comment="kernel-default-livepatch is &lt;5.14.21-150500.55.73.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879885" version="1" comment="kernel-default-livepatch-devel is &lt;5.14.21-150500.55.73.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879886" version="1" comment="kernel-default-optional is &lt;5.14.21-150500.55.73.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879887" version="1" comment="kernel-default-vdso is &lt;5.14.21-150500.55.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879888" version="1" comment="kernel-devel is &lt;5.14.21-150500.55.73.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879889" version="1" comment="kernel-docs is &lt;5.14.21-150500.55.73.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879890" version="1" comment="kernel-docs-html is &lt;5.14.21-150500.55.73.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879891" version="1" comment="kernel-kvmsmall is &lt;5.14.21-150500.55.73.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879892" version="1" comment="kernel-kvmsmall-devel is &lt;5.14.21-150500.55.73.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879893" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.14.21-150500.55.73.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879894" version="1" comment="kernel-kvmsmall-vdso is &lt;5.14.21-150500.55.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879895" version="1" comment="kernel-macros is &lt;5.14.21-150500.55.73.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879896" version="1" comment="kernel-obs-build is &lt;5.14.21-150500.55.73.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879897" version="1" comment="kernel-obs-qa is &lt;5.14.21-150500.55.73.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879898" version="1" comment="kernel-source is &lt;5.14.21-150500.55.73.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879899" version="1" comment="kernel-source-vanilla is &lt;5.14.21-150500.55.73.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879900" version="1" comment="kernel-syms is &lt;5.14.21-150500.55.73.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879901" version="1" comment="kernel-zfcpdump is &lt;5.14.21-150500.55.73.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879902" version="1" comment="kselftests-kmp-64kb is &lt;5.14.21-150500.55.73.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879903" version="1" comment="kselftests-kmp-default is &lt;5.14.21-150500.55.73.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879904" version="1" comment="ocfs2-kmp-64kb is &lt;5.14.21-150500.55.73.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879905" version="1" comment="ocfs2-kmp-default is &lt;5.14.21-150500.55.73.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879906" version="1" comment="reiserfs-kmp-64kb is &lt;5.14.21-150500.55.73.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879907" version="1" comment="reiserfs-kmp-default is &lt;5.14.21-150500.55.73.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879908" version="1" comment="cluster-md-kmp-azure is &lt;5.14.21-150500.33.63.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879909" version="1" comment="dlm-kmp-azure is &lt;5.14.21-150500.33.63.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879910" version="1" comment="gfs2-kmp-azure is &lt;5.14.21-150500.33.63.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879911" version="1" comment="kernel-azure is &lt;5.14.21-150500.33.63.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879912" version="1" comment="kernel-azure-devel is &lt;5.14.21-150500.33.63.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879913" version="1" comment="kernel-azure-extra is &lt;5.14.21-150500.33.63.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879914" version="1" comment="kernel-azure-livepatch-devel is &lt;5.14.21-150500.33.63.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879915" version="1" comment="kernel-azure-optional is &lt;5.14.21-150500.33.63.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879916" version="1" comment="kernel-azure-vdso is &lt;5.14.21-150500.33.63.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879917" version="1" comment="kernel-devel-azure is &lt;5.14.21-150500.33.63.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879918" version="1" comment="kernel-source-azure is &lt;5.14.21-150500.33.63.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879919" version="1" comment="kernel-syms-azure is &lt;5.14.21-150500.33.63.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879920" version="1" comment="kselftests-kmp-azure is &lt;5.14.21-150500.33.63.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879921" version="1" comment="ocfs2-kmp-azure is &lt;5.14.21-150500.33.63.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879922" version="1" comment="reiserfs-kmp-azure is &lt;5.14.21-150500.33.63.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845170" version="1" comment="runc is &lt;1.1.11-150000.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880243" version="1" comment="osc is &lt;1.9.0-150400.10.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880267" version="1" comment="libpython3_10-1_0 is &lt;3.10.14-150400.4.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880268" version="1" comment="libpython3_10-1_0-32bit is &lt;3.10.14-150400.4.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880269" version="1" comment="python310 is &lt;3.10.14-150400.4.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880270" version="1" comment="python310-32bit is &lt;3.10.14-150400.4.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880271" version="1" comment="python310-base is &lt;3.10.14-150400.4.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880272" version="1" comment="python310-base-32bit is &lt;3.10.14-150400.4.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880273" version="1" comment="python310-curses is &lt;3.10.14-150400.4.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880274" version="1" comment="python310-dbm is &lt;3.10.14-150400.4.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880275" version="1" comment="python310-devel is &lt;3.10.14-150400.4.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880276" version="1" comment="python310-doc is &lt;3.10.14-150400.4.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880277" version="1" comment="python310-doc-devhelp is &lt;3.10.14-150400.4.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880278" version="1" comment="python310-idle is &lt;3.10.14-150400.4.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880279" version="1" comment="python310-testsuite is &lt;3.10.14-150400.4.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880280" version="1" comment="python310-tk is &lt;3.10.14-150400.4.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880281" version="1" comment="python310-tools is &lt;3.10.14-150400.4.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817824" version="1" comment="libcryptopp-devel is &lt;8.6.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817825" version="1" comment="libcryptopp8_6_0 is &lt;8.6.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817826" version="1" comment="libcryptopp8_6_0-32bit is &lt;8.6.0-150400.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880961" version="1" comment="MozillaFirefox is &lt;128.1.0-150200.152.146.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880962" version="1" comment="MozillaFirefox-branding-SLE is &lt;128-150200.9.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880963" version="1" comment="MozillaFirefox-branding-upstream is &lt;128.1.0-150200.152.146.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880964" version="1" comment="MozillaFirefox-devel is &lt;128.1.0-150200.152.146.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880965" version="1" comment="MozillaFirefox-translations-common is &lt;128.1.0-150200.152.146.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880966" version="1" comment="MozillaFirefox-translations-other is &lt;128.1.0-150200.152.146.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881243" version="1" comment="libopenssl-3-devel is &lt;3.0.8-150500.5.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881244" version="1" comment="libopenssl-3-devel-32bit is &lt;3.0.8-150500.5.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881245" version="1" comment="libopenssl3 is &lt;3.0.8-150500.5.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881246" version="1" comment="libopenssl3-32bit is &lt;3.0.8-150500.5.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881247" version="1" comment="openssl-3 is &lt;3.0.8-150500.5.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881248" version="1" comment="openssl-3-doc is &lt;3.0.8-150500.5.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845171" version="1" comment="cpio is &lt;2.13-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845172" version="1" comment="cpio-lang is &lt;2.13-150400.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845173" version="1" comment="cpio-mt is &lt;2.13-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881385" version="1" comment="python3-setuptools is &lt;44.1.1-150400.9.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881386" version="1" comment="python3-setuptools-test is &lt;44.1.1-150400.9.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881387" version="1" comment="python3-setuptools-wheel is &lt;44.1.1-150400.9.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881388" version="1" comment="python311-setuptools is &lt;67.7.2-150400.3.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940222" version="1" comment="libunbound8 is &lt;1.20.0-150100.10.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940223" version="1" comment="unbound is &lt;1.20.0-150100.10.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940224" version="1" comment="unbound-anchor is &lt;1.20.0-150100.10.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940225" version="1" comment="unbound-devel is &lt;1.20.0-150100.10.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940226" version="1" comment="unbound-munin is &lt;1.20.0-150100.10.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940227" version="1" comment="unbound-python is &lt;1.20.0-150100.10.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940228" version="1" comment="xen is &lt;4.17.5_02-150500.3.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940229" version="1" comment="xen-devel is &lt;4.17.5_02-150500.3.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940230" version="1" comment="xen-doc-html is &lt;4.17.5_02-150500.3.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940231" version="1" comment="xen-libs is &lt;4.17.5_02-150500.3.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940232" version="1" comment="xen-libs-32bit is &lt;4.17.5_02-150500.3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940233" version="1" comment="xen-tools is &lt;4.17.5_02-150500.3.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940234" version="1" comment="xen-tools-domU is &lt;4.17.5_02-150500.3.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940235" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.17.5_02-150500.3.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940236" version="1" comment="libpython3_9-1_0 is &lt;3.9.19-150300.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940237" version="1" comment="libpython3_9-1_0-32bit is &lt;3.9.19-150300.4.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940238" version="1" comment="python39 is &lt;3.9.19-150300.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940239" version="1" comment="python39-32bit is &lt;3.9.19-150300.4.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940240" version="1" comment="python39-base is &lt;3.9.19-150300.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940241" version="1" comment="python39-base-32bit is &lt;3.9.19-150300.4.49.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940242" version="1" comment="python39-curses is &lt;3.9.19-150300.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940243" version="1" comment="python39-dbm is &lt;3.9.19-150300.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940244" version="1" comment="python39-devel is &lt;3.9.19-150300.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940245" version="1" comment="python39-doc is &lt;3.9.19-150300.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940246" version="1" comment="python39-doc-devhelp is &lt;3.9.19-150300.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940247" version="1" comment="python39-idle is &lt;3.9.19-150300.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940248" version="1" comment="python39-testsuite is &lt;3.9.19-150300.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940249" version="1" comment="python39-tk is &lt;3.9.19-150300.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940250" version="1" comment="python39-tools is &lt;3.9.19-150300.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940251" version="1" comment="qemu is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940252" version="1" comment="qemu-SLOF is &lt;7.1.0-150500.49.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940253" version="1" comment="qemu-accel-qtest is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940254" version="1" comment="qemu-accel-tcg-x86 is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940255" version="1" comment="qemu-arm is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940256" version="1" comment="qemu-audio-alsa is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940257" version="1" comment="qemu-audio-dbus is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940258" version="1" comment="qemu-audio-jack is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940259" version="1" comment="qemu-audio-pa is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940260" version="1" comment="qemu-audio-spice is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940261" version="1" comment="qemu-block-curl is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940262" version="1" comment="qemu-block-dmg is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940263" version="1" comment="qemu-block-gluster is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940264" version="1" comment="qemu-block-iscsi is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940265" version="1" comment="qemu-block-nfs is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940266" version="1" comment="qemu-block-rbd is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940267" version="1" comment="qemu-block-ssh is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940268" version="1" comment="qemu-chardev-baum is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940269" version="1" comment="qemu-chardev-spice is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940270" version="1" comment="qemu-extra is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940271" version="1" comment="qemu-guest-agent is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940272" version="1" comment="qemu-hw-display-qxl is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940273" version="1" comment="qemu-hw-display-virtio-gpu is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940274" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940275" version="1" comment="qemu-hw-display-virtio-vga is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940276" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940277" version="1" comment="qemu-hw-usb-host is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940278" version="1" comment="qemu-hw-usb-redirect is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940279" version="1" comment="qemu-hw-usb-smartcard is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940280" version="1" comment="qemu-ipxe is &lt;1.0.0+-150500.49.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940281" version="1" comment="qemu-ivshmem-tools is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940282" version="1" comment="qemu-ksm is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940283" version="1" comment="qemu-kvm is &lt;7.1.0-150500.49.18.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940284" version="1" comment="qemu-lang is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940285" version="1" comment="qemu-microvm is &lt;7.1.0-150500.49.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940286" version="1" comment="qemu-ppc is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940287" version="1" comment="qemu-s390x is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940288" version="1" comment="qemu-seabios is &lt;1.16.0_0_gd239552-150500.49.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940289" version="1" comment="qemu-sgabios is &lt;8-150500.49.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940290" version="1" comment="qemu-skiboot is &lt;7.1.0-150500.49.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940291" version="1" comment="qemu-tools is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940292" version="1" comment="qemu-ui-curses is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940293" version="1" comment="qemu-ui-dbus is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940294" version="1" comment="qemu-ui-gtk is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940295" version="1" comment="qemu-ui-opengl is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940296" version="1" comment="qemu-ui-spice-app is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940297" version="1" comment="qemu-ui-spice-core is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940298" version="1" comment="qemu-vgabios is &lt;1.16.0_0_gd239552-150500.49.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940299" version="1" comment="qemu-vhost-user-gpu is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940300" version="1" comment="qemu-x86 is &lt;7.1.0-150500.49.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940301" version="1" comment="libQt5Quick3D5 is &lt;5.15.8+kde1-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940302" version="1" comment="libQt5Quick3DAssetImport5 is &lt;5.15.8+kde1-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940303" version="1" comment="libqt5-qtquick3d-devel is &lt;5.15.8+kde1-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940304" version="1" comment="libqt5-qtquick3d-examples is &lt;5.15.8+kde1-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940305" version="1" comment="libqt5-qtquick3d-imports is &lt;5.15.8+kde1-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940306" version="1" comment="libqt5-qtquick3d-private-headers-devel is &lt;5.15.8+kde1-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940307" version="1" comment="libqt5-qtquick3d-tools is &lt;5.15.8+kde1-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940308" version="1" comment="libQt53DAnimation-devel is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940309" version="1" comment="libQt53DAnimation5 is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940310" version="1" comment="libQt53DCore-devel is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940311" version="1" comment="libQt53DCore5 is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940312" version="1" comment="libQt53DExtras-devel is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940313" version="1" comment="libQt53DExtras5 is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940314" version="1" comment="libQt53DInput-devel is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940315" version="1" comment="libQt53DInput5 is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940316" version="1" comment="libQt53DLogic-devel is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940317" version="1" comment="libQt53DLogic5 is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940318" version="1" comment="libQt53DQuick-devel is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940319" version="1" comment="libQt53DQuick5 is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940320" version="1" comment="libQt53DQuickAnimation-devel is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940321" version="1" comment="libQt53DQuickAnimation5 is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940322" version="1" comment="libQt53DQuickExtras-devel is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940323" version="1" comment="libQt53DQuickExtras5 is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940324" version="1" comment="libQt53DQuickInput-devel is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940325" version="1" comment="libQt53DQuickInput5 is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940326" version="1" comment="libQt53DQuickRender-devel is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940327" version="1" comment="libQt53DQuickRender5 is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940328" version="1" comment="libQt53DQuickScene2D-devel is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940329" version="1" comment="libQt53DQuickScene2D5 is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940330" version="1" comment="libQt53DRender-devel is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940331" version="1" comment="libQt53DRender5 is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940332" version="1" comment="libqt5-qt3d-devel is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940333" version="1" comment="libqt5-qt3d-examples is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940334" version="1" comment="libqt5-qt3d-imports is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940335" version="1" comment="libqt5-qt3d-private-headers-devel is &lt;5.15.8+kde0-150500.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940336" version="1" comment="libqt5-qt3d-tools is &lt;5.15.8+kde0-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940337" version="1" comment="curl is &lt;8.0.1-150400.5.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940338" version="1" comment="libcurl-devel is &lt;8.0.1-150400.5.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940339" version="1" comment="libcurl-devel-32bit is &lt;8.0.1-150400.5.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940340" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940341" version="1" comment="libcurl4-32bit is &lt;8.0.1-150400.5.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940342" version="1" comment="kernel-firmware is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940343" version="1" comment="kernel-firmware-all is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940344" version="1" comment="kernel-firmware-amdgpu is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940345" version="1" comment="kernel-firmware-ath10k is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940346" version="1" comment="kernel-firmware-ath11k is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940347" version="1" comment="kernel-firmware-atheros is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940348" version="1" comment="kernel-firmware-bluetooth is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940349" version="1" comment="kernel-firmware-bnx2 is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940350" version="1" comment="kernel-firmware-brcm is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940351" version="1" comment="kernel-firmware-chelsio is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940352" version="1" comment="kernel-firmware-dpaa2 is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940353" version="1" comment="kernel-firmware-i915 is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940354" version="1" comment="kernel-firmware-intel is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940355" version="1" comment="kernel-firmware-iwlwifi is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940356" version="1" comment="kernel-firmware-liquidio is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940357" version="1" comment="kernel-firmware-marvell is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940358" version="1" comment="kernel-firmware-media is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940359" version="1" comment="kernel-firmware-mediatek is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940360" version="1" comment="kernel-firmware-mellanox is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940361" version="1" comment="kernel-firmware-mwifiex is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940362" version="1" comment="kernel-firmware-network is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940363" version="1" comment="kernel-firmware-nfp is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940364" version="1" comment="kernel-firmware-nvidia is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940365" version="1" comment="kernel-firmware-platform is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940366" version="1" comment="kernel-firmware-prestera is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940367" version="1" comment="kernel-firmware-qcom is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940368" version="1" comment="kernel-firmware-qlogic is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940369" version="1" comment="kernel-firmware-radeon is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940370" version="1" comment="kernel-firmware-realtek is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940371" version="1" comment="kernel-firmware-serial is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940372" version="1" comment="kernel-firmware-sound is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940373" version="1" comment="kernel-firmware-ti is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940374" version="1" comment="kernel-firmware-ueagle is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940375" version="1" comment="kernel-firmware-usb-network is &lt;20230724-150500.3.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940376" version="1" comment="ucode-amd is &lt;20230724-150500.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940377" version="1" comment="389-ds is &lt;2.2.10~git2.345056d3-150500.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940378" version="1" comment="389-ds-devel is &lt;2.2.10~git2.345056d3-150500.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940379" version="1" comment="389-ds-snmp is &lt;2.2.10~git2.345056d3-150500.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940380" version="1" comment="lib389 is &lt;2.2.10~git2.345056d3-150500.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940381" version="1" comment="libsvrcore0 is &lt;2.2.10~git2.345056d3-150500.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940382" version="1" comment="libzzip-0-13 is &lt;0.13.69-150000.3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940383" version="1" comment="libzzip-0-13-32bit is &lt;0.13.69-150000.3.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940384" version="1" comment="zziplib-devel is &lt;0.13.69-150000.3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940385" version="1" comment="zziplib-devel-32bit is &lt;0.13.69-150000.3.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940522" version="1" comment="gio-branding-upstream is &lt;2.70.5-150400.3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940523" version="1" comment="glib2-devel is &lt;2.70.5-150400.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940524" version="1" comment="glib2-devel-32bit is &lt;2.70.5-150400.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940525" version="1" comment="glib2-devel-static is &lt;2.70.5-150400.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940526" version="1" comment="glib2-doc is &lt;2.70.5-150400.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940527" version="1" comment="glib2-lang is &lt;2.70.5-150400.3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940528" version="1" comment="glib2-tests-devel is &lt;2.70.5-150400.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940529" version="1" comment="glib2-tools is &lt;2.70.5-150400.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940530" version="1" comment="glib2-tools-32bit is &lt;2.70.5-150400.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940531" version="1" comment="libgio-2_0-0 is &lt;2.70.5-150400.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940532" version="1" comment="libgio-2_0-0-32bit is &lt;2.70.5-150400.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940533" version="1" comment="libglib-2_0-0 is &lt;2.70.5-150400.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940534" version="1" comment="libglib-2_0-0-32bit is &lt;2.70.5-150400.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940535" version="1" comment="libgmodule-2_0-0 is &lt;2.70.5-150400.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940536" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.70.5-150400.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940537" version="1" comment="libgobject-2_0-0 is &lt;2.70.5-150400.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940538" version="1" comment="libgobject-2_0-0-32bit is &lt;2.70.5-150400.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940539" version="1" comment="libgthread-2_0-0 is &lt;2.70.5-150400.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940540" version="1" comment="libgthread-2_0-0-32bit is &lt;2.70.5-150400.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940541" version="1" comment="go1.21-openssl is &lt;1.21.13.1-150000.1.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940542" version="1" comment="go1.21-openssl-doc is &lt;1.21.13.1-150000.1.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940543" version="1" comment="go1.21-openssl-race is &lt;1.21.13.1-150000.1.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940544" version="1" comment="WebKitGTK-4.0-lang is &lt;2.44.3-150400.4.88.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940545" version="1" comment="WebKitGTK-4.1-lang is &lt;2.44.3-150400.4.88.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940546" version="1" comment="WebKitGTK-6.0-lang is &lt;2.44.3-150400.4.88.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940547" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940548" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.44.3-150400.4.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940549" version="1" comment="libjavascriptcoregtk-4_1-0 is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940550" version="1" comment="libjavascriptcoregtk-4_1-0-32bit is &lt;2.44.3-150400.4.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940551" version="1" comment="libjavascriptcoregtk-6_0-1 is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940552" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940553" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.44.3-150400.4.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940554" version="1" comment="libwebkit2gtk-4_1-0 is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940555" version="1" comment="libwebkit2gtk-4_1-0-32bit is &lt;2.44.3-150400.4.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940556" version="1" comment="libwebkitgtk-6_0-4 is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940557" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940558" version="1" comment="typelib-1_0-JavaScriptCore-4_1 is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940559" version="1" comment="typelib-1_0-JavaScriptCore-6_0 is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940560" version="1" comment="typelib-1_0-WebKit-6_0 is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940561" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940562" version="1" comment="typelib-1_0-WebKit2-4_1 is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940563" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940564" version="1" comment="typelib-1_0-WebKit2WebExtension-4_1 is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940565" version="1" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940566" version="1" comment="webkit-jsc-4 is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940567" version="1" comment="webkit-jsc-4.1 is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940568" version="1" comment="webkit-jsc-6.0 is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940569" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940570" version="1" comment="webkit2gtk-4_1-injected-bundles is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940571" version="1" comment="webkit2gtk3-devel is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940572" version="1" comment="webkit2gtk3-minibrowser is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940573" version="1" comment="webkit2gtk3-soup2-devel is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940574" version="1" comment="webkit2gtk3-soup2-minibrowser is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940575" version="1" comment="webkit2gtk4-devel is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940576" version="1" comment="webkit2gtk4-minibrowser is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940577" version="1" comment="webkitgtk-6_0-injected-bundles is &lt;2.44.3-150400.4.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940578" version="1" comment="kubernetes1.26-client is &lt;1.26.15-150400.9.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940579" version="1" comment="kubernetes1.26-client-common is &lt;1.26.15-150400.9.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940580" version="1" comment="ucode-intel is &lt;20240813-150200.44.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940581" version="1" comment="kubernetes1.28-client is &lt;1.28.13-150400.9.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940582" version="1" comment="kubernetes1.28-client-common is &lt;1.28.13-150400.9.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940583" version="1" comment="kubernetes1.27-client is &lt;1.27.16-150400.9.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940584" version="1" comment="kubernetes1.27-client-common is &lt;1.27.16-150400.9.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940585" version="1" comment="bubblewrap is &lt;0.8.0-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940586" version="1" comment="bubblewrap-zsh-completion is &lt;0.8.0-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940587" version="1" comment="flatpak is &lt;1.14.5-150500.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940588" version="1" comment="flatpak-devel is &lt;1.14.5-150500.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940589" version="1" comment="flatpak-remote-flathub is &lt;1.14.5-150500.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940590" version="1" comment="flatpak-zsh-completion is &lt;1.14.5-150500.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940591" version="1" comment="libflatpak0 is &lt;1.14.5-150500.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940592" version="1" comment="system-user-flatpak is &lt;1.14.5-150500.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940593" version="1" comment="typelib-1_0-Flatpak-1_0 is &lt;1.14.5-150500.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940594" version="1" comment="libopenssl-3-devel is &lt;3.0.8-150500.5.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940595" version="1" comment="libopenssl-3-devel-32bit is &lt;3.0.8-150500.5.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940596" version="1" comment="libopenssl3 is &lt;3.0.8-150500.5.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940597" version="1" comment="libopenssl3-32bit is &lt;3.0.8-150500.5.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940598" version="1" comment="openssl-3 is &lt;3.0.8-150500.5.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940599" version="1" comment="openssl-3-doc is &lt;3.0.8-150500.5.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940600" version="1" comment="frr is &lt;8.4-150500.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940601" version="1" comment="frr-devel is &lt;8.4-150500.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940602" version="1" comment="libfrr0 is &lt;8.4-150500.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940603" version="1" comment="libfrr_pb0 is &lt;8.4-150500.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940604" version="1" comment="libfrrcares0 is &lt;8.4-150500.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940605" version="1" comment="libfrrfpm_pb0 is &lt;8.4-150500.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940606" version="1" comment="libfrrospfapiclient0 is &lt;8.4-150500.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940607" version="1" comment="libfrrsnmp0 is &lt;8.4-150500.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940608" version="1" comment="libfrrzmq0 is &lt;8.4-150500.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940609" version="1" comment="libmlag_pb0 is &lt;8.4-150500.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940610" version="1" comment="python311-aiohttp is &lt;3.9.3-150400.10.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940611" version="1" comment="MozillaThunderbird is &lt;115.14.0-150200.8.174.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940612" version="1" comment="MozillaThunderbird-translations-common is &lt;115.14.0-150200.8.174.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940613" version="1" comment="MozillaThunderbird-translations-other is &lt;115.14.0-150200.8.174.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940614" version="1" comment="ffmpeg is &lt;3.4.2-150200.11.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940615" version="1" comment="ffmpeg-private-devel is &lt;3.4.2-150200.11.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940616" version="1" comment="libavcodec-devel is &lt;3.4.2-150200.11.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940617" version="1" comment="libavcodec57 is &lt;3.4.2-150200.11.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940618" version="1" comment="libavcodec57-32bit is &lt;3.4.2-150200.11.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940619" version="1" comment="libavdevice-devel is &lt;3.4.2-150200.11.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940620" version="1" comment="libavdevice57 is &lt;3.4.2-150200.11.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940621" version="1" comment="libavdevice57-32bit is &lt;3.4.2-150200.11.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940622" version="1" comment="libavfilter-devel is &lt;3.4.2-150200.11.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940623" version="1" comment="libavfilter6 is &lt;3.4.2-150200.11.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940624" version="1" comment="libavfilter6-32bit is &lt;3.4.2-150200.11.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940625" version="1" comment="libavformat-devel is &lt;3.4.2-150200.11.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940626" version="1" comment="libavformat57 is &lt;3.4.2-150200.11.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940627" version="1" comment="libavformat57-32bit is &lt;3.4.2-150200.11.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940628" version="1" comment="libavresample-devel is &lt;3.4.2-150200.11.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940629" version="1" comment="libavresample3 is &lt;3.4.2-150200.11.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940630" version="1" comment="libavresample3-32bit is &lt;3.4.2-150200.11.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940631" version="1" comment="libavutil-devel is &lt;3.4.2-150200.11.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940632" version="1" comment="libavutil55 is &lt;3.4.2-150200.11.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940633" version="1" comment="libavutil55-32bit is &lt;3.4.2-150200.11.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940634" version="1" comment="libpostproc-devel is &lt;3.4.2-150200.11.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940635" version="1" comment="libpostproc54 is &lt;3.4.2-150200.11.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940636" version="1" comment="libpostproc54-32bit is &lt;3.4.2-150200.11.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940637" version="1" comment="libswresample-devel is &lt;3.4.2-150200.11.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940638" version="1" comment="libswresample2 is &lt;3.4.2-150200.11.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940639" version="1" comment="libswresample2-32bit is &lt;3.4.2-150200.11.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940640" version="1" comment="libswscale-devel is &lt;3.4.2-150200.11.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940641" version="1" comment="libswscale4 is &lt;3.4.2-150200.11.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940642" version="1" comment="libswscale4-32bit is &lt;3.4.2-150200.11.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940643" version="1" comment="libtiff-devel is &lt;4.0.9-150000.45.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940644" version="1" comment="libtiff-devel-32bit is &lt;4.0.9-150000.45.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940645" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940646" version="1" comment="libtiff5-32bit is &lt;4.0.9-150000.45.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940647" version="1" comment="tiff is &lt;4.0.9-150000.45.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940648" version="1" comment="python-WebOb-doc is &lt;1.7.4-150000.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940649" version="1" comment="python3-WebOb is &lt;1.7.4-150000.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940650" version="1" comment="dovecot23 is &lt;2.3.15-150200.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940651" version="1" comment="dovecot23-backend-mysql is &lt;2.3.15-150200.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940652" version="1" comment="dovecot23-backend-pgsql is &lt;2.3.15-150200.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940653" version="1" comment="dovecot23-backend-sqlite is &lt;2.3.15-150200.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940654" version="1" comment="dovecot23-devel is &lt;2.3.15-150200.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940655" version="1" comment="dovecot23-fts is &lt;2.3.15-150200.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940656" version="1" comment="dovecot23-fts-lucene is &lt;2.3.15-150200.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940657" version="1" comment="dovecot23-fts-solr is &lt;2.3.15-150200.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940658" version="1" comment="dovecot23-fts-squat is &lt;2.3.15-150200.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940659" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-150000.3.94.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940660" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2p-150000.3.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940661" version="1" comment="libopenssl10 is &lt;1.0.2p-150000.3.94.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940662" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-150000.3.94.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940663" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-150000.3.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940664" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2p-150000.3.94.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940665" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2p-150000.3.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940666" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2p-150000.3.94.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940667" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2p-150000.3.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940668" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-150000.3.94.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940669" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2p-150000.3.94.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940670" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2p-150000.3.94.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940671" version="1" comment="docker is &lt;25.0.6_ce-150000.207.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940672" version="1" comment="docker-bash-completion is &lt;25.0.6_ce-150000.207.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940673" version="1" comment="docker-fish-completion is &lt;25.0.6_ce-150000.207.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940674" version="1" comment="docker-rootless-extras is &lt;25.0.6_ce-150000.207.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940675" version="1" comment="docker-zsh-completion is &lt;25.0.6_ce-150000.207.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941071" version="1" comment="python3-Django is &lt;2.0.7-150000.1.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941072" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.422-150200.3.48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941073" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.422-150200.3.48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941074" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.422-150200.3.48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941075" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.422-150200.3.48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941076" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.422-150200.3.48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941077" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.422-150200.3.48.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941078" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.422-150200.3.48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941119" version="1" comment="libsystemd0 is &lt;249.17-150400.8.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941120" version="1" comment="libsystemd0-32bit is &lt;249.17-150400.8.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941121" version="1" comment="libudev1 is &lt;249.17-150400.8.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941122" version="1" comment="libudev1-32bit is &lt;249.17-150400.8.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941123" version="1" comment="nss-myhostname is &lt;249.17-150400.8.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941124" version="1" comment="nss-myhostname-32bit is &lt;249.17-150400.8.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941125" version="1" comment="nss-systemd is &lt;249.17-150400.8.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941126" version="1" comment="systemd is &lt;249.17-150400.8.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941127" version="1" comment="systemd-32bit is &lt;249.17-150400.8.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941128" version="1" comment="systemd-container is &lt;249.17-150400.8.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941129" version="1" comment="systemd-coredump is &lt;249.17-150400.8.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941130" version="1" comment="systemd-devel is &lt;249.17-150400.8.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941131" version="1" comment="systemd-doc is &lt;249.17-150400.8.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941132" version="1" comment="systemd-experimental is &lt;249.17-150400.8.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941133" version="1" comment="systemd-journal-remote is &lt;249.17-150400.8.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941134" version="1" comment="systemd-lang is &lt;249.17-150400.8.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941135" version="1" comment="systemd-network is &lt;249.17-150400.8.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941136" version="1" comment="systemd-portable is &lt;249.17-150400.8.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941137" version="1" comment="systemd-sysvinit is &lt;249.17-150400.8.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941138" version="1" comment="systemd-testsuite is &lt;249.17-150400.8.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941139" version="1" comment="udev is &lt;249.17-150400.8.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941424" version="1" comment="buildah is &lt;1.35.4-150500.3.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941425" version="1" comment="postgresql12 is &lt;12.20-150200.8.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941426" version="1" comment="postgresql12-contrib is &lt;12.20-150200.8.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941427" version="1" comment="postgresql12-devel is &lt;12.20-150200.8.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941428" version="1" comment="postgresql12-docs is &lt;12.20-150200.8.63.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941429" version="1" comment="postgresql12-llvmjit is &lt;12.20-150200.8.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941430" version="1" comment="postgresql12-llvmjit-devel is &lt;12.20-150200.8.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941431" version="1" comment="postgresql12-plperl is &lt;12.20-150200.8.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941432" version="1" comment="postgresql12-plpython is &lt;12.20-150200.8.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941433" version="1" comment="postgresql12-pltcl is &lt;12.20-150200.8.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941434" version="1" comment="postgresql12-server is &lt;12.20-150200.8.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941435" version="1" comment="postgresql12-server-devel is &lt;12.20-150200.8.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941436" version="1" comment="postgresql12-test is &lt;12.20-150200.8.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941437" version="1" comment="kubernetes1.26-client is &lt;1.26.15-150400.9.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941438" version="1" comment="kubernetes1.26-client-common is &lt;1.26.15-150400.9.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941439" version="1" comment="MozillaFirefox is &lt;128.2.0-150200.152.149.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941440" version="1" comment="MozillaFirefox-branding-upstream is &lt;128.2.0-150200.152.149.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941441" version="1" comment="MozillaFirefox-devel is &lt;128.2.0-150200.152.149.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941442" version="1" comment="MozillaFirefox-translations-common is &lt;128.2.0-150200.152.149.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941443" version="1" comment="MozillaFirefox-translations-other is &lt;128.2.0-150200.152.149.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941444" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr8.30-150000.3.92.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941445" version="1" comment="java-1_8_0-ibm-32bit is &lt;1.8.0_sr8.30-150000.3.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941446" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr8.30-150000.3.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941447" version="1" comment="java-1_8_0-ibm-demo is &lt;1.8.0_sr8.30-150000.3.92.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941448" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr8.30-150000.3.92.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941449" version="1" comment="java-1_8_0-ibm-devel-32bit is &lt;1.8.0_sr8.30-150000.3.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941450" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr8.30-150000.3.92.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941451" version="1" comment="java-1_8_0-ibm-src is &lt;1.8.0_sr8.30-150000.3.92.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941452" version="1" comment="gradle is &lt;4.4.1-150200.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941602" version="1" comment="postgresql15 is &lt;15.8-150200.5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941603" version="1" comment="postgresql15-contrib is &lt;15.8-150200.5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941604" version="1" comment="postgresql15-devel is &lt;15.8-150200.5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941605" version="1" comment="postgresql15-docs is &lt;15.8-150200.5.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941606" version="1" comment="postgresql15-llvmjit is &lt;15.8-150200.5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941607" version="1" comment="postgresql15-llvmjit-devel is &lt;15.8-150200.5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941608" version="1" comment="postgresql15-plperl is &lt;15.8-150200.5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941609" version="1" comment="postgresql15-plpython is &lt;15.8-150200.5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941610" version="1" comment="postgresql15-pltcl is &lt;15.8-150200.5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941611" version="1" comment="postgresql15-server is &lt;15.8-150200.5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941612" version="1" comment="postgresql15-server-devel is &lt;15.8-150200.5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941613" version="1" comment="postgresql15-test is &lt;15.8-150200.5.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941614" version="1" comment="postgresql14 is &lt;14.13-150200.5.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941615" version="1" comment="postgresql14-contrib is &lt;14.13-150200.5.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941616" version="1" comment="postgresql14-devel is &lt;14.13-150200.5.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941617" version="1" comment="postgresql14-docs is &lt;14.13-150200.5.47.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941618" version="1" comment="postgresql14-llvmjit is &lt;14.13-150200.5.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941619" version="1" comment="postgresql14-llvmjit-devel is &lt;14.13-150200.5.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941620" version="1" comment="postgresql14-plperl is &lt;14.13-150200.5.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941621" version="1" comment="postgresql14-plpython is &lt;14.13-150200.5.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941622" version="1" comment="postgresql14-pltcl is &lt;14.13-150200.5.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941623" version="1" comment="postgresql14-server is &lt;14.13-150200.5.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941624" version="1" comment="postgresql14-server-devel is &lt;14.13-150200.5.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941625" version="1" comment="postgresql14-test is &lt;14.13-150200.5.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809832" version="1" comment="liboath-devel is &lt;2.6.2-150000.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809833" version="1" comment="liboath0 is &lt;2.6.2-150000.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809834" version="1" comment="libopenconnect5 is &lt;9.12-150400.15.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809835" version="1" comment="libpskc-devel is &lt;2.6.2-150000.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809836" version="1" comment="libpskc0 is &lt;2.6.2-150000.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809837" version="1" comment="libstoken1 is &lt;0.81-150400.13.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809838" version="1" comment="oath-toolkit is &lt;2.6.2-150000.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809839" version="1" comment="oath-toolkit-xml is &lt;2.6.2-150000.3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809840" version="1" comment="openconnect is &lt;9.12-150400.15.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809841" version="1" comment="openconnect-devel is &lt;9.12-150400.15.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809842" version="1" comment="openconnect-doc is &lt;9.12-150400.15.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809843" version="1" comment="openconnect-lang is &lt;9.12-150400.15.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809844" version="1" comment="pam_oath is &lt;2.6.2-150000.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809845" version="1" comment="stoken is &lt;0.81-150400.13.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809846" version="1" comment="stoken-devel is &lt;0.81-150400.13.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809847" version="1" comment="stoken-gui is &lt;0.81-150400.13.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941626" version="1" comment="libecpg6 is &lt;16.4-150200.5.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941627" version="1" comment="libecpg6-32bit is &lt;16.4-150200.5.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941628" version="1" comment="libpq5 is &lt;16.4-150200.5.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941629" version="1" comment="libpq5-32bit is &lt;16.4-150200.5.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941630" version="1" comment="postgresql16 is &lt;16.4-150200.5.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941631" version="1" comment="postgresql16-contrib is &lt;16.4-150200.5.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941632" version="1" comment="postgresql16-devel is &lt;16.4-150200.5.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941633" version="1" comment="postgresql16-devel-mini is &lt;16.4-150200.5.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941634" version="1" comment="postgresql16-docs is &lt;16.4-150200.5.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941635" version="1" comment="postgresql16-llvmjit is &lt;16.4-150200.5.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941636" version="1" comment="postgresql16-llvmjit-devel is &lt;16.4-150200.5.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941637" version="1" comment="postgresql16-plperl is &lt;16.4-150200.5.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941638" version="1" comment="postgresql16-plpython is &lt;16.4-150200.5.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941639" version="1" comment="postgresql16-pltcl is &lt;16.4-150200.5.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941640" version="1" comment="postgresql16-server is &lt;16.4-150200.5.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941641" version="1" comment="postgresql16-server-devel is &lt;16.4-150200.5.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941642" version="1" comment="postgresql16-test is &lt;16.4-150200.5.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941643" version="1" comment="postgresql13 is &lt;13.16-150200.5.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941644" version="1" comment="postgresql13-contrib is &lt;13.16-150200.5.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941645" version="1" comment="postgresql13-devel is &lt;13.16-150200.5.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941646" version="1" comment="postgresql13-docs is &lt;13.16-150200.5.61.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941647" version="1" comment="postgresql13-llvmjit is &lt;13.16-150200.5.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941648" version="1" comment="postgresql13-llvmjit-devel is &lt;13.16-150200.5.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941649" version="1" comment="postgresql13-plperl is &lt;13.16-150200.5.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941650" version="1" comment="postgresql13-plpython is &lt;13.16-150200.5.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941651" version="1" comment="postgresql13-pltcl is &lt;13.16-150200.5.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941652" version="1" comment="postgresql13-server is &lt;13.16-150200.5.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941653" version="1" comment="postgresql13-server-devel is &lt;13.16-150200.5.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941654" version="1" comment="postgresql13-test is &lt;13.16-150200.5.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941655" version="1" comment="apache2 is &lt;2.4.51-150400.6.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941656" version="1" comment="apache2-devel is &lt;2.4.51-150400.6.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941657" version="1" comment="apache2-doc is &lt;2.4.51-150400.6.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941658" version="1" comment="apache2-event is &lt;2.4.51-150400.6.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941659" version="1" comment="apache2-example-pages is &lt;2.4.51-150400.6.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941660" version="1" comment="apache2-prefork is &lt;2.4.51-150400.6.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941661" version="1" comment="apache2-utils is &lt;2.4.51-150400.6.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941662" version="1" comment="apache2-worker is &lt;2.4.51-150400.6.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941977" version="1" comment="python3-Django is &lt;2.0.7-150000.1.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941978" version="1" comment="cluster-md-kmp-azure is &lt;5.14.21-150500.33.66.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941979" version="1" comment="dlm-kmp-azure is &lt;5.14.21-150500.33.66.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941980" version="1" comment="gfs2-kmp-azure is &lt;5.14.21-150500.33.66.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941981" version="1" comment="kernel-azure is &lt;5.14.21-150500.33.66.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941982" version="1" comment="kernel-azure-devel is &lt;5.14.21-150500.33.66.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941983" version="1" comment="kernel-azure-extra is &lt;5.14.21-150500.33.66.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941984" version="1" comment="kernel-azure-livepatch-devel is &lt;5.14.21-150500.33.66.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941985" version="1" comment="kernel-azure-optional is &lt;5.14.21-150500.33.66.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941986" version="1" comment="kernel-azure-vdso is &lt;5.14.21-150500.33.66.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941987" version="1" comment="kernel-devel-azure is &lt;5.14.21-150500.33.66.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941988" version="1" comment="kernel-source-azure is &lt;5.14.21-150500.33.66.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941989" version="1" comment="kernel-syms-azure is &lt;5.14.21-150500.33.66.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941990" version="1" comment="kselftests-kmp-azure is &lt;5.14.21-150500.33.66.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941991" version="1" comment="ocfs2-kmp-azure is &lt;5.14.21-150500.33.66.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941992" version="1" comment="reiserfs-kmp-azure is &lt;5.14.21-150500.33.66.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845294" version="1" comment="libxerces-c-3_2 is &lt;3.2.3-150300.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845295" version="1" comment="libxerces-c-3_2-32bit is &lt;3.2.3-150300.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845296" version="1" comment="libxerces-c-devel is &lt;3.2.3-150300.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845297" version="1" comment="xerces-c is &lt;3.2.3-150300.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845298" version="1" comment="xerces-c-doc is &lt;3.2.3-150300.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942286" version="1" comment="libpython3_11-1_0 is &lt;3.11.9-150400.9.32.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942287" version="1" comment="libpython3_11-1_0-32bit is &lt;3.11.9-150400.9.32.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942288" version="1" comment="python311 is &lt;3.11.9-150400.9.32.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942289" version="1" comment="python311-32bit is &lt;3.11.9-150400.9.32.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942290" version="1" comment="python311-base is &lt;3.11.9-150400.9.32.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942291" version="1" comment="python311-base-32bit is &lt;3.11.9-150400.9.32.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942292" version="1" comment="python311-curses is &lt;3.11.9-150400.9.32.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942293" version="1" comment="python311-dbm is &lt;3.11.9-150400.9.32.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942294" version="1" comment="python311-devel is &lt;3.11.9-150400.9.32.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942295" version="1" comment="python311-doc is &lt;3.11.9-150400.9.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942296" version="1" comment="python311-doc-devhelp is &lt;3.11.9-150400.9.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942297" version="1" comment="python311-idle is &lt;3.11.9-150400.9.32.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942298" version="1" comment="python311-testsuite is &lt;3.11.9-150400.9.32.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942299" version="1" comment="python311-tk is &lt;3.11.9-150400.9.32.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942300" version="1" comment="python311-tools is &lt;3.11.9-150400.9.32.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942301" version="1" comment="cluster-md-kmp-rt is &lt;5.14.21-150500.13.67.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942302" version="1" comment="dlm-kmp-rt is &lt;5.14.21-150500.13.67.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942303" version="1" comment="gfs2-kmp-rt is &lt;5.14.21-150500.13.67.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942304" version="1" comment="kernel-devel-rt is &lt;5.14.21-150500.13.67.3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942305" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.67.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942306" version="1" comment="kernel-rt-devel is &lt;5.14.21-150500.13.67.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942307" version="1" comment="kernel-rt-extra is &lt;5.14.21-150500.13.67.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942308" version="1" comment="kernel-rt-livepatch is &lt;5.14.21-150500.13.67.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942309" version="1" comment="kernel-rt-livepatch-devel is &lt;5.14.21-150500.13.67.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942310" version="1" comment="kernel-rt-optional is &lt;5.14.21-150500.13.67.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942311" version="1" comment="kernel-rt-vdso is &lt;5.14.21-150500.13.67.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942312" version="1" comment="kernel-rt_debug is &lt;5.14.21-150500.13.67.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942313" version="1" comment="kernel-rt_debug-devel is &lt;5.14.21-150500.13.67.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942314" version="1" comment="kernel-rt_debug-livepatch-devel is &lt;5.14.21-150500.13.67.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942315" version="1" comment="kernel-rt_debug-vdso is &lt;5.14.21-150500.13.67.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942316" version="1" comment="kernel-source-rt is &lt;5.14.21-150500.13.67.3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942317" version="1" comment="kernel-syms-rt is &lt;5.14.21-150500.13.67.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942318" version="1" comment="kselftests-kmp-rt is &lt;5.14.21-150500.13.67.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942319" version="1" comment="ocfs2-kmp-rt is &lt;5.14.21-150500.13.67.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942320" version="1" comment="reiserfs-kmp-rt is &lt;5.14.21-150500.13.67.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845299" version="1" comment="java-11-openjdk is &lt;11.0.22.0-150000.3.110.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845300" version="1" comment="java-11-openjdk-demo is &lt;11.0.22.0-150000.3.110.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845301" version="1" comment="java-11-openjdk-devel is &lt;11.0.22.0-150000.3.110.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845302" version="1" comment="java-11-openjdk-headless is &lt;11.0.22.0-150000.3.110.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845303" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.22.0-150000.3.110.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845304" version="1" comment="java-11-openjdk-jmods is &lt;11.0.22.0-150000.3.110.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845305" version="1" comment="java-11-openjdk-src is &lt;11.0.22.0-150000.3.110.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942321" version="1" comment="libpcap-devel is &lt;1.10.1-150400.3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942322" version="1" comment="libpcap-devel-32bit is &lt;1.10.1-150400.3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942323" version="1" comment="libpcap-devel-static is &lt;1.10.1-150400.3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942324" version="1" comment="libpcap1 is &lt;1.10.1-150400.3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942325" version="1" comment="libpcap1-32bit is &lt;1.10.1-150400.3.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942326" version="1" comment="curl is &lt;8.0.1-150400.5.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942327" version="1" comment="libcurl-devel is &lt;8.0.1-150400.5.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942328" version="1" comment="libcurl-devel-32bit is &lt;8.0.1-150400.5.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942329" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942330" version="1" comment="libcurl4-32bit is &lt;8.0.1-150400.5.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942416" version="1" comment="go1.22 is &lt;1.22.7-150000.1.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942417" version="1" comment="go1.22-doc is &lt;1.22.7-150000.1.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942418" version="1" comment="go1.22-race is &lt;1.22.7-150000.1.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942419" version="1" comment="go1.23 is &lt;1.23.1-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942420" version="1" comment="go1.23-doc is &lt;1.23.1-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942421" version="1" comment="go1.23-race is &lt;1.23.1-150000.1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942422" version="1" comment="expat is &lt;2.4.4-150400.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942423" version="1" comment="libexpat-devel is &lt;2.4.4-150400.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942424" version="1" comment="libexpat-devel-32bit is &lt;2.4.4-150400.3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942425" version="1" comment="libexpat1 is &lt;2.4.4-150400.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942426" version="1" comment="libexpat1-32bit is &lt;2.4.4-150400.3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942427" version="1" comment="containerd is &lt;1.7.21-150000.117.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942428" version="1" comment="containerd-ctr is &lt;1.7.21-150000.117.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942429" version="1" comment="containerd-devel is &lt;1.7.21-150000.117.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942430" version="1" comment="runc is &lt;1.1.14-150000.70.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845595" version="1" comment="python3-uamqp is &lt;1.5.3-150100.4.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845596" version="1" comment="java-17-openjdk is &lt;17.0.10.0-150400.3.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845597" version="1" comment="java-17-openjdk-demo is &lt;17.0.10.0-150400.3.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845598" version="1" comment="java-17-openjdk-devel is &lt;17.0.10.0-150400.3.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845599" version="1" comment="java-17-openjdk-headless is &lt;17.0.10.0-150400.3.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845600" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.10.0-150400.3.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845601" version="1" comment="java-17-openjdk-jmods is &lt;17.0.10.0-150400.3.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845602" version="1" comment="java-17-openjdk-src is &lt;17.0.10.0-150400.3.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942837" version="1" comment="spacecmd is &lt;5.0.9-150000.3.124.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819305" version="1" comment="bouncycastle is &lt;1.77-150200.3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819306" version="1" comment="bouncycastle-javadoc is &lt;1.77-150200.3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819307" version="1" comment="bouncycastle-jmail is &lt;1.77-150200.3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819308" version="1" comment="bouncycastle-mail is &lt;1.77-150200.3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819309" version="1" comment="bouncycastle-pg is &lt;1.77-150200.3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819310" version="1" comment="bouncycastle-pkix is &lt;1.77-150200.3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819311" version="1" comment="bouncycastle-tls is &lt;1.77-150200.3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819312" version="1" comment="bouncycastle-util is &lt;1.77-150200.3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819313" version="1" comment="jsch is &lt;0.2.15-150200.11.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819314" version="1" comment="jsch-demo is &lt;0.2.15-150200.11.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819315" version="1" comment="jsch-javadoc is &lt;0.2.15-150200.11.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942838" version="1" comment="firewalld-prometheus-config is &lt;0.1-150100.4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942839" version="1" comment="golang-github-prometheus-prometheus is &lt;2.45.6-150100.4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942840" version="1" comment="libvpl is &lt;2023.0.0-150500.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942841" version="1" comment="libvpl-devel is &lt;2023.0.0-150500.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942842" version="1" comment="libvpl2 is &lt;2023.0.0-150500.3.2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845603" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-150000.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845604" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-150000.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845605" version="1" comment="python is &lt;2.7.18-150000.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845606" version="1" comment="python-32bit is &lt;2.7.18-150000.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845607" version="1" comment="python-base is &lt;2.7.18-150000.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845608" version="1" comment="python-base-32bit is &lt;2.7.18-150000.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845609" version="1" comment="python-curses is &lt;2.7.18-150000.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845610" version="1" comment="python-demo is &lt;2.7.18-150000.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845611" version="1" comment="python-devel is &lt;2.7.18-150000.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845612" version="1" comment="python-doc is &lt;2.7.18-150000.60.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845613" version="1" comment="python-doc-pdf is &lt;2.7.18-150000.60.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845614" version="1" comment="python-gdbm is &lt;2.7.18-150000.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845615" version="1" comment="python-idle is &lt;2.7.18-150000.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845616" version="1" comment="python-tk is &lt;2.7.18-150000.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845617" version="1" comment="python-xml is &lt;2.7.18-150000.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943081" version="1" comment="python3-dnspython is &lt;1.15.0-150000.3.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818424" version="1" comment="python311-aiohttp is &lt;3.8.5-150400.10.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943082" version="1" comment="clamav is &lt;0.103.12-150000.3.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943083" version="1" comment="clamav-devel is &lt;0.103.12-150000.3.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943084" version="1" comment="libclamav9 is &lt;0.103.12-150000.3.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943085" version="1" comment="libfreshclam2 is &lt;0.103.12-150000.3.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943528" version="1" comment="ucode-intel is &lt;20240910-150200.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943529" version="1" comment="libwireshark15 is &lt;3.6.24-150000.3.118.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943530" version="1" comment="libwiretap12 is &lt;3.6.24-150000.3.118.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943531" version="1" comment="libwsutil13 is &lt;3.6.24-150000.3.118.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943532" version="1" comment="wireshark is &lt;3.6.24-150000.3.118.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943533" version="1" comment="wireshark-devel is &lt;3.6.24-150000.3.118.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943534" version="1" comment="wireshark-ui-qt is &lt;3.6.24-150000.3.118.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943535" version="1" comment="cluster-md-kmp-rt is &lt;5.14.21-150500.13.70.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943536" version="1" comment="dlm-kmp-rt is &lt;5.14.21-150500.13.70.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943537" version="1" comment="gfs2-kmp-rt is &lt;5.14.21-150500.13.70.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943538" version="1" comment="kernel-devel-rt is &lt;5.14.21-150500.13.70.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943539" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.70.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943540" version="1" comment="kernel-rt-devel is &lt;5.14.21-150500.13.70.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943541" version="1" comment="kernel-rt-extra is &lt;5.14.21-150500.13.70.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943542" version="1" comment="kernel-rt-livepatch is &lt;5.14.21-150500.13.70.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943543" version="1" comment="kernel-rt-livepatch-devel is &lt;5.14.21-150500.13.70.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943544" version="1" comment="kernel-rt-optional is &lt;5.14.21-150500.13.70.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943545" version="1" comment="kernel-rt-vdso is &lt;5.14.21-150500.13.70.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943546" version="1" comment="kernel-rt_debug is &lt;5.14.21-150500.13.70.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943547" version="1" comment="kernel-rt_debug-devel is &lt;5.14.21-150500.13.70.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943548" version="1" comment="kernel-rt_debug-livepatch-devel is &lt;5.14.21-150500.13.70.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943549" version="1" comment="kernel-rt_debug-vdso is &lt;5.14.21-150500.13.70.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943550" version="1" comment="kernel-source-rt is &lt;5.14.21-150500.13.70.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943551" version="1" comment="kernel-syms-rt is &lt;5.14.21-150500.13.70.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943552" version="1" comment="kselftests-kmp-rt is &lt;5.14.21-150500.13.70.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943553" version="1" comment="ocfs2-kmp-rt is &lt;5.14.21-150500.13.70.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943554" version="1" comment="reiserfs-kmp-rt is &lt;5.14.21-150500.13.70.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943555" version="1" comment="libmfx is &lt;22.6.1-150500.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943556" version="1" comment="libmfx1 is &lt;22.6.1-150500.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943557" version="1" comment="kubernetes1.24-apiserver is &lt;1.24.17-150500.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943558" version="1" comment="kubernetes1.24-client is &lt;1.24.17-150500.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943559" version="1" comment="kubernetes1.24-client-bash-completion is &lt;1.24.17-150500.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943560" version="1" comment="kubernetes1.24-client-common is &lt;1.24.17-150500.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943561" version="1" comment="kubernetes1.24-client-fish-completion is &lt;1.24.17-150500.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943562" version="1" comment="kubernetes1.24-controller-manager is &lt;1.24.17-150500.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943563" version="1" comment="kubernetes1.24-kubeadm is &lt;1.24.17-150500.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943564" version="1" comment="kubernetes1.24-kubelet is &lt;1.24.17-150500.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943565" version="1" comment="kubernetes1.24-kubelet-common is &lt;1.24.17-150500.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943566" version="1" comment="kubernetes1.24-proxy is &lt;1.24.17-150500.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943567" version="1" comment="kubernetes1.24-scheduler is &lt;1.24.17-150500.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943568" version="1" comment="kubernetes1.25-client is &lt;1.25.16-150400.9.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943569" version="1" comment="kubernetes1.25-client-common is &lt;1.25.16-150400.9.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943570" version="1" comment="python311-azure-identity is &lt;1.15.0-150400.11.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943945" version="1" comment="libpython3_10-1_0 is &lt;3.10.15-150400.4.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943946" version="1" comment="libpython3_10-1_0-32bit is &lt;3.10.15-150400.4.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943947" version="1" comment="python310 is &lt;3.10.15-150400.4.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943948" version="1" comment="python310-32bit is &lt;3.10.15-150400.4.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943949" version="1" comment="python310-base is &lt;3.10.15-150400.4.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943950" version="1" comment="python310-base-32bit is &lt;3.10.15-150400.4.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943951" version="1" comment="python310-curses is &lt;3.10.15-150400.4.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943952" version="1" comment="python310-dbm is &lt;3.10.15-150400.4.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943953" version="1" comment="python310-devel is &lt;3.10.15-150400.4.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943954" version="1" comment="python310-doc is &lt;3.10.15-150400.4.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943955" version="1" comment="python310-doc-devhelp is &lt;3.10.15-150400.4.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943956" version="1" comment="python310-idle is &lt;3.10.15-150400.4.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943957" version="1" comment="python310-testsuite is &lt;3.10.15-150400.4.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943958" version="1" comment="python310-tk is &lt;3.10.15-150400.4.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943959" version="1" comment="python310-tools is &lt;3.10.15-150400.4.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943960" version="1" comment="ffmpeg-4 is &lt;4.4-150400.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943961" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.4-150400.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943962" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.4-150400.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943963" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.4-150400.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943964" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.4-150400.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943965" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.4-150400.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943966" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.4-150400.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943967" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.4-150400.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943968" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.4-150400.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943969" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.4-150400.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943970" version="1" comment="ffmpeg-4-private-devel is &lt;4.4-150400.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943971" version="1" comment="libavcodec58_134 is &lt;4.4-150400.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943972" version="1" comment="libavcodec58_134-32bit is &lt;4.4-150400.3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943973" version="1" comment="libavdevice58_13 is &lt;4.4-150400.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943974" version="1" comment="libavdevice58_13-32bit is &lt;4.4-150400.3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943975" version="1" comment="libavfilter7_110 is &lt;4.4-150400.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943976" version="1" comment="libavfilter7_110-32bit is &lt;4.4-150400.3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943977" version="1" comment="libavformat58_76 is &lt;4.4-150400.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943978" version="1" comment="libavformat58_76-32bit is &lt;4.4-150400.3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943979" version="1" comment="libavresample4_0 is &lt;4.4-150400.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943980" version="1" comment="libavresample4_0-32bit is &lt;4.4-150400.3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943981" version="1" comment="libavutil56_70 is &lt;4.4-150400.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943982" version="1" comment="libavutil56_70-32bit is &lt;4.4-150400.3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943983" version="1" comment="libpostproc55_9 is &lt;4.4-150400.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943984" version="1" comment="libpostproc55_9-32bit is &lt;4.4-150400.3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943985" version="1" comment="libswresample3_9 is &lt;4.4-150400.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943986" version="1" comment="libswresample3_9-32bit is &lt;4.4-150400.3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943987" version="1" comment="libswscale5_9 is &lt;4.4-150400.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943988" version="1" comment="libswscale5_9-32bit is &lt;4.4-150400.3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818388" version="1" comment="python-aiohttp-doc is &lt;3.6.0-150100.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818389" version="1" comment="python3-aiohttp is &lt;3.6.0-150100.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944127" version="1" comment="rage-encryption is &lt;0.10.0+0-150500.3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944128" version="1" comment="rage-encryption-bash-completion is &lt;0.10.0+0-150500.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944464" version="1" comment="libpython3_9-1_0 is &lt;3.9.20-150300.4.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944465" version="1" comment="libpython3_9-1_0-32bit is &lt;3.9.20-150300.4.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944466" version="1" comment="python39 is &lt;3.9.20-150300.4.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944467" version="1" comment="python39-32bit is &lt;3.9.20-150300.4.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944468" version="1" comment="python39-base is &lt;3.9.20-150300.4.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944469" version="1" comment="python39-base-32bit is &lt;3.9.20-150300.4.52.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944470" version="1" comment="python39-curses is &lt;3.9.20-150300.4.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944471" version="1" comment="python39-dbm is &lt;3.9.20-150300.4.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944472" version="1" comment="python39-devel is &lt;3.9.20-150300.4.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944473" version="1" comment="python39-doc is &lt;3.9.20-150300.4.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944474" version="1" comment="python39-doc-devhelp is &lt;3.9.20-150300.4.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944475" version="1" comment="python39-idle is &lt;3.9.20-150300.4.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944476" version="1" comment="python39-testsuite is &lt;3.9.20-150300.4.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944477" version="1" comment="python39-tk is &lt;3.9.20-150300.4.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944478" version="1" comment="python39-tools is &lt;3.9.20-150300.4.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944479" version="1" comment="libpython3_11-1_0 is &lt;3.11.10-150400.9.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944480" version="1" comment="libpython3_11-1_0-32bit is &lt;3.11.10-150400.9.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944481" version="1" comment="python311 is &lt;3.11.10-150400.9.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944482" version="1" comment="python311-32bit is &lt;3.11.10-150400.9.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944483" version="1" comment="python311-base is &lt;3.11.10-150400.9.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944484" version="1" comment="python311-base-32bit is &lt;3.11.10-150400.9.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944485" version="1" comment="python311-curses is &lt;3.11.10-150400.9.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944486" version="1" comment="python311-dbm is &lt;3.11.10-150400.9.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944487" version="1" comment="python311-devel is &lt;3.11.10-150400.9.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944488" version="1" comment="python311-doc is &lt;3.11.10-150400.9.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944489" version="1" comment="python311-doc-devhelp is &lt;3.11.10-150400.9.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944490" version="1" comment="python311-idle is &lt;3.11.10-150400.9.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944491" version="1" comment="python311-testsuite is &lt;3.11.10-150400.9.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944492" version="1" comment="python311-tk is &lt;3.11.10-150400.9.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944493" version="1" comment="python311-tools is &lt;3.11.10-150400.9.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944494" version="1" comment="xen is &lt;4.17.5_04-150500.3.39.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944495" version="1" comment="xen-devel is &lt;4.17.5_04-150500.3.39.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944496" version="1" comment="xen-doc-html is &lt;4.17.5_04-150500.3.39.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944497" version="1" comment="xen-libs is &lt;4.17.5_04-150500.3.39.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944498" version="1" comment="xen-libs-32bit is &lt;4.17.5_04-150500.3.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944499" version="1" comment="xen-tools is &lt;4.17.5_04-150500.3.39.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944500" version="1" comment="xen-tools-domU is &lt;4.17.5_04-150500.3.39.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944501" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.17.5_04-150500.3.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944502" version="1" comment="apr-devel is &lt;1.6.3-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944503" version="1" comment="libapr1 is &lt;1.6.3-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944713" version="1" comment="opensc is &lt;0.22.0-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944714" version="1" comment="opensc-32bit is &lt;0.22.0-150400.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944794" version="1" comment="kubernetes1.24-apiserver is &lt;1.24.17-150500.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944795" version="1" comment="kubernetes1.24-client is &lt;1.24.17-150500.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944796" version="1" comment="kubernetes1.24-client-bash-completion is &lt;1.24.17-150500.3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944797" version="1" comment="kubernetes1.24-client-common is &lt;1.24.17-150500.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944798" version="1" comment="kubernetes1.24-client-fish-completion is &lt;1.24.17-150500.3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944799" version="1" comment="kubernetes1.24-controller-manager is &lt;1.24.17-150500.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944800" version="1" comment="kubernetes1.24-kubeadm is &lt;1.24.17-150500.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944801" version="1" comment="kubernetes1.24-kubelet is &lt;1.24.17-150500.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944802" version="1" comment="kubernetes1.24-kubelet-common is &lt;1.24.17-150500.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944803" version="1" comment="kubernetes1.24-proxy is &lt;1.24.17-150500.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944804" version="1" comment="kubernetes1.24-scheduler is &lt;1.24.17-150500.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944805" version="1" comment="kubernetes1.28-client is &lt;1.28.13-150400.9.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944806" version="1" comment="kubernetes1.28-client-common is &lt;1.28.13-150400.9.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944807" version="1" comment="kubernetes1.27-client is &lt;1.27.16-150400.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944808" version="1" comment="kubernetes1.27-client-common is &lt;1.27.16-150400.9.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944809" version="1" comment="kubernetes1.26-client is &lt;1.26.15-150400.9.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944810" version="1" comment="kubernetes1.26-client-common is &lt;1.26.15-150400.9.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944811" version="1" comment="kubernetes1.25-client is &lt;1.25.16-150400.9.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944812" version="1" comment="kubernetes1.25-client-common is &lt;1.25.16-150400.9.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945010" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945011" version="1" comment="libpython3_6m1_0-32bit is &lt;3.6.15-150300.10.72.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945012" version="1" comment="python3 is &lt;3.6.15-150300.10.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945013" version="1" comment="python3-base is &lt;3.6.15-150300.10.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945014" version="1" comment="python3-curses is &lt;3.6.15-150300.10.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945015" version="1" comment="python3-dbm is &lt;3.6.15-150300.10.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945016" version="1" comment="python3-devel is &lt;3.6.15-150300.10.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945017" version="1" comment="python3-doc is &lt;3.6.15-150300.10.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945018" version="1" comment="python3-doc-devhelp is &lt;3.6.15-150300.10.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945019" version="1" comment="python3-idle is &lt;3.6.15-150300.10.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945020" version="1" comment="python3-testsuite is &lt;3.6.15-150300.10.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945021" version="1" comment="python3-tk is &lt;3.6.15-150300.10.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945022" version="1" comment="python3-tools is &lt;3.6.15-150300.10.72.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945023" version="1" comment="libfpm_pb0 is &lt;1.1.1-150400.12.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945024" version="1" comment="libospf0 is &lt;1.1.1-150400.12.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945025" version="1" comment="libospfapiclient0 is &lt;1.1.1-150400.12.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945026" version="1" comment="libquagga_pb0 is &lt;1.1.1-150400.12.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945027" version="1" comment="libzebra1 is &lt;1.1.1-150400.12.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945028" version="1" comment="quagga is &lt;1.1.1-150400.12.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945029" version="1" comment="quagga-devel is &lt;1.1.1-150400.12.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945030" version="1" comment="cluster-md-kmp-64kb is &lt;5.14.21-150500.55.80.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945031" version="1" comment="cluster-md-kmp-default is &lt;5.14.21-150500.55.80.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945032" version="1" comment="dlm-kmp-64kb is &lt;5.14.21-150500.55.80.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945033" version="1" comment="dlm-kmp-default is &lt;5.14.21-150500.55.80.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945034" version="1" comment="dtb-allwinner is &lt;5.14.21-150500.55.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945035" version="1" comment="dtb-altera is &lt;5.14.21-150500.55.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945036" version="1" comment="dtb-amazon is &lt;5.14.21-150500.55.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945037" version="1" comment="dtb-amd is &lt;5.14.21-150500.55.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945038" version="1" comment="dtb-amlogic is &lt;5.14.21-150500.55.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945039" version="1" comment="dtb-apm is &lt;5.14.21-150500.55.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945040" version="1" comment="dtb-apple is &lt;5.14.21-150500.55.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945041" version="1" comment="dtb-arm is &lt;5.14.21-150500.55.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945042" version="1" comment="dtb-broadcom is &lt;5.14.21-150500.55.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945043" version="1" comment="dtb-cavium is &lt;5.14.21-150500.55.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945044" version="1" comment="dtb-exynos is &lt;5.14.21-150500.55.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945045" version="1" comment="dtb-freescale is &lt;5.14.21-150500.55.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945046" version="1" comment="dtb-hisilicon is &lt;5.14.21-150500.55.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945047" version="1" comment="dtb-lg is &lt;5.14.21-150500.55.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945048" version="1" comment="dtb-marvell is &lt;5.14.21-150500.55.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945049" version="1" comment="dtb-mediatek is &lt;5.14.21-150500.55.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945050" version="1" comment="dtb-nvidia is &lt;5.14.21-150500.55.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945051" version="1" comment="dtb-qcom is &lt;5.14.21-150500.55.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945052" version="1" comment="dtb-renesas is &lt;5.14.21-150500.55.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945053" version="1" comment="dtb-rockchip is &lt;5.14.21-150500.55.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945054" version="1" comment="dtb-socionext is &lt;5.14.21-150500.55.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945055" version="1" comment="dtb-sprd is &lt;5.14.21-150500.55.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945056" version="1" comment="dtb-xilinx is &lt;5.14.21-150500.55.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945057" version="1" comment="gfs2-kmp-64kb is &lt;5.14.21-150500.55.80.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945058" version="1" comment="gfs2-kmp-default is &lt;5.14.21-150500.55.80.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945059" version="1" comment="kernel-64kb is &lt;5.14.21-150500.55.80.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945060" version="1" comment="kernel-64kb-devel is &lt;5.14.21-150500.55.80.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945061" version="1" comment="kernel-64kb-extra is &lt;5.14.21-150500.55.80.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945062" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.14.21-150500.55.80.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945063" version="1" comment="kernel-64kb-optional is &lt;5.14.21-150500.55.80.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945064" version="1" comment="kernel-debug is &lt;5.14.21-150500.55.80.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945065" version="1" comment="kernel-debug-devel is &lt;5.14.21-150500.55.80.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945066" version="1" comment="kernel-debug-livepatch-devel is &lt;5.14.21-150500.55.80.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945067" version="1" comment="kernel-debug-vdso is &lt;5.14.21-150500.55.80.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945068" version="1" comment="kernel-default is &lt;5.14.21-150500.55.80.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945069" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.80.2.150500.6.35.6 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945070" version="1" comment="kernel-default-base-rebuild is &lt;5.14.21-150500.55.80.2.150500.6.35.6 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945071" version="1" comment="kernel-default-devel is &lt;5.14.21-150500.55.80.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945072" version="1" comment="kernel-default-extra is &lt;5.14.21-150500.55.80.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945073" version="1" comment="kernel-default-livepatch is &lt;5.14.21-150500.55.80.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945074" version="1" comment="kernel-default-livepatch-devel is &lt;5.14.21-150500.55.80.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945075" version="1" comment="kernel-default-optional is &lt;5.14.21-150500.55.80.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945076" version="1" comment="kernel-default-vdso is &lt;5.14.21-150500.55.80.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945077" version="1" comment="kernel-devel is &lt;5.14.21-150500.55.80.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945078" version="1" comment="kernel-docs is &lt;5.14.21-150500.55.80.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945079" version="1" comment="kernel-docs-html is &lt;5.14.21-150500.55.80.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945080" version="1" comment="kernel-kvmsmall is &lt;5.14.21-150500.55.80.2 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945081" version="1" comment="kernel-kvmsmall-devel is &lt;5.14.21-150500.55.80.2 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945082" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.14.21-150500.55.80.2 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945083" version="1" comment="kernel-kvmsmall-vdso is &lt;5.14.21-150500.55.80.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945084" version="1" comment="kernel-macros is &lt;5.14.21-150500.55.80.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945085" version="1" comment="kernel-obs-build is &lt;5.14.21-150500.55.80.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945086" version="1" comment="kernel-obs-qa is &lt;5.14.21-150500.55.80.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945087" version="1" comment="kernel-source is &lt;5.14.21-150500.55.80.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945088" version="1" comment="kernel-source-vanilla is &lt;5.14.21-150500.55.80.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945089" version="1" comment="kernel-syms is &lt;5.14.21-150500.55.80.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945090" version="1" comment="kernel-zfcpdump is &lt;5.14.21-150500.55.80.2 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945091" version="1" comment="kselftests-kmp-64kb is &lt;5.14.21-150500.55.80.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945092" version="1" comment="kselftests-kmp-default is &lt;5.14.21-150500.55.80.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945093" version="1" comment="ocfs2-kmp-64kb is &lt;5.14.21-150500.55.80.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945094" version="1" comment="ocfs2-kmp-default is &lt;5.14.21-150500.55.80.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945095" version="1" comment="reiserfs-kmp-64kb is &lt;5.14.21-150500.55.80.2 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945096" version="1" comment="reiserfs-kmp-default is &lt;5.14.21-150500.55.80.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818089" version="1" comment="python-paramiko-doc is &lt;3.4.0-150400.13.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818090" version="1" comment="python311-paramiko is &lt;3.4.0-150400.13.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945288" version="1" comment="libopenssl-3-devel is &lt;3.0.8-150500.5.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945289" version="1" comment="libopenssl-3-devel-32bit is &lt;3.0.8-150500.5.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945290" version="1" comment="libopenssl3 is &lt;3.0.8-150500.5.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945291" version="1" comment="libopenssl3-32bit is &lt;3.0.8-150500.5.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945292" version="1" comment="openssl-3 is &lt;3.0.8-150500.5.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945293" version="1" comment="openssl-3-doc is &lt;3.0.8-150500.5.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945353" version="1" comment="MozillaThunderbird is &lt;128.2.3-150200.8.177.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945354" version="1" comment="MozillaThunderbird-translations-common is &lt;128.2.3-150200.8.177.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945355" version="1" comment="MozillaThunderbird-translations-other is &lt;128.2.3-150200.8.177.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945485" version="1" comment="MozillaFirefox is &lt;128.3.0-150200.152.152.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945486" version="1" comment="MozillaFirefox-branding-upstream is &lt;128.3.0-150200.152.152.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945487" version="1" comment="MozillaFirefox-devel is &lt;128.3.0-150200.152.152.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945488" version="1" comment="MozillaFirefox-translations-common is &lt;128.3.0-150200.152.152.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945489" version="1" comment="MozillaFirefox-translations-other is &lt;128.3.0-150200.152.152.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945532" version="1" comment="cups-filters is &lt;1.25.0-150200.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945533" version="1" comment="cups-filters-devel is &lt;1.25.0-150200.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945835" version="1" comment="jenkins-json-lib is &lt;2.4-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945836" version="1" comment="json-lib is &lt;2.4-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945837" version="1" comment="json-lib-javadoc is &lt;2.4-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945838" version="1" comment="buildah is &lt;1.35.4-150500.3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945839" version="1" comment="podman is &lt;4.9.5-150500.3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945840" version="1" comment="podman-docker is &lt;4.9.5-150500.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945841" version="1" comment="podman-remote is &lt;4.9.5-150500.3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945842" version="1" comment="podmansh is &lt;4.9.5-150500.3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945843" version="1" comment="Mesa is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945844" version="1" comment="Mesa-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945845" version="1" comment="Mesa-KHR-devel is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945846" version="1" comment="Mesa-devel is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945847" version="1" comment="Mesa-dri is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945848" version="1" comment="Mesa-dri-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945849" version="1" comment="Mesa-dri-devel is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945850" version="1" comment="Mesa-dri-nouveau is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945851" version="1" comment="Mesa-dri-nouveau-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945852" version="1" comment="Mesa-dri-vc4 is &lt;22.3.5-150500.77.5.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945853" version="1" comment="Mesa-gallium is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945854" version="1" comment="Mesa-gallium-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945855" version="1" comment="Mesa-libEGL-devel is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945856" version="1" comment="Mesa-libEGL-devel-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945857" version="1" comment="Mesa-libEGL1 is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945858" version="1" comment="Mesa-libEGL1-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945859" version="1" comment="Mesa-libGL-devel is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945860" version="1" comment="Mesa-libGL-devel-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945861" version="1" comment="Mesa-libGL1 is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945862" version="1" comment="Mesa-libGL1-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945863" version="1" comment="Mesa-libGLESv1_CM-devel is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945864" version="1" comment="Mesa-libGLESv1_CM-devel-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945865" version="1" comment="Mesa-libGLESv2-devel is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945866" version="1" comment="Mesa-libGLESv2-devel-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945867" version="1" comment="Mesa-libGLESv3-devel is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945868" version="1" comment="Mesa-libOpenCL is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945869" version="1" comment="Mesa-libd3d is &lt;22.3.5-150500.77.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945870" version="1" comment="Mesa-libd3d-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945871" version="1" comment="Mesa-libd3d-devel is &lt;22.3.5-150500.77.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945872" version="1" comment="Mesa-libd3d-devel-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945873" version="1" comment="Mesa-libglapi-devel is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945874" version="1" comment="Mesa-libglapi-devel-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945875" version="1" comment="Mesa-libglapi0 is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945876" version="1" comment="Mesa-libglapi0-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945877" version="1" comment="Mesa-libva is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945878" version="1" comment="Mesa-vulkan-device-select is &lt;22.3.5-150500.77.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945879" version="1" comment="Mesa-vulkan-device-select-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945880" version="1" comment="Mesa-vulkan-overlay is &lt;22.3.5-150500.77.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945881" version="1" comment="Mesa-vulkan-overlay-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945882" version="1" comment="libOSMesa-devel is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945883" version="1" comment="libOSMesa-devel-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945884" version="1" comment="libOSMesa8 is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945885" version="1" comment="libOSMesa8-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945886" version="1" comment="libgbm-devel is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945887" version="1" comment="libgbm-devel-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945888" version="1" comment="libgbm1 is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945889" version="1" comment="libgbm1-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945890" version="1" comment="libvdpau_nouveau is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945891" version="1" comment="libvdpau_nouveau-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945892" version="1" comment="libvdpau_r300 is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945893" version="1" comment="libvdpau_r300-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945894" version="1" comment="libvdpau_r600 is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945895" version="1" comment="libvdpau_r600-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945896" version="1" comment="libvdpau_radeonsi is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945897" version="1" comment="libvdpau_radeonsi-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945898" version="1" comment="libvdpau_virtio_gpu is &lt;22.3.5-150500.77.5.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945899" version="1" comment="libvdpau_virtio_gpu-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945900" version="1" comment="libvulkan_broadcom is &lt;22.3.5-150500.77.5.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945901" version="1" comment="libvulkan_freedreno is &lt;22.3.5-150500.77.5.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945902" version="1" comment="libvulkan_intel is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945903" version="1" comment="libvulkan_intel-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945904" version="1" comment="libvulkan_lvp is &lt;22.3.5-150500.77.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945905" version="1" comment="libvulkan_radeon is &lt;22.3.5-150500.77.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945906" version="1" comment="libvulkan_radeon-32bit is &lt;22.3.5-150500.77.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945907" version="1" comment="libxatracker-devel is &lt;1.0.0-150500.77.5.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945908" version="1" comment="libxatracker2 is &lt;1.0.0-150500.77.5.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945909" version="1" comment="redis7 is &lt;7.0.8-150500.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945910" version="1" comment="libpodofo-devel is &lt;0.9.6-150300.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945911" version="1" comment="libpodofo0_9_6 is &lt;0.9.6-150300.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945912" version="1" comment="podofo is &lt;0.9.6-150300.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945913" version="1" comment="pgadmin4 is &lt;4.30-150300.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945914" version="1" comment="pgadmin4-doc is &lt;4.30-150300.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945915" version="1" comment="pgadmin4-web is &lt;4.30-150300.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945916" version="1" comment="pgadmin4-web-uwsgi is &lt;4.30-150300.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946150" version="1" comment="libmozjs-78-0 is &lt;78.15.0-150400.3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946151" version="1" comment="mozjs78 is &lt;78.15.0-150400.3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946152" version="1" comment="mozjs78-devel is &lt;78.15.0-150400.3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946153" version="1" comment="cluster-md-kmp-64kb is &lt;5.14.21-150500.55.83.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946154" version="1" comment="cluster-md-kmp-default is &lt;5.14.21-150500.55.83.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946155" version="1" comment="dlm-kmp-64kb is &lt;5.14.21-150500.55.83.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946156" version="1" comment="dlm-kmp-default is &lt;5.14.21-150500.55.83.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946157" version="1" comment="dtb-allwinner is &lt;5.14.21-150500.55.83.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946158" version="1" comment="dtb-altera is &lt;5.14.21-150500.55.83.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946159" version="1" comment="dtb-amazon is &lt;5.14.21-150500.55.83.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946160" version="1" comment="dtb-amd is &lt;5.14.21-150500.55.83.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946161" version="1" comment="dtb-amlogic is &lt;5.14.21-150500.55.83.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946162" version="1" comment="dtb-apm is &lt;5.14.21-150500.55.83.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946163" version="1" comment="dtb-apple is &lt;5.14.21-150500.55.83.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946164" version="1" comment="dtb-arm is &lt;5.14.21-150500.55.83.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946165" version="1" comment="dtb-broadcom is &lt;5.14.21-150500.55.83.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946166" version="1" comment="dtb-cavium is &lt;5.14.21-150500.55.83.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946167" version="1" comment="dtb-exynos is &lt;5.14.21-150500.55.83.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946168" version="1" comment="dtb-freescale is &lt;5.14.21-150500.55.83.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946169" version="1" comment="dtb-hisilicon is &lt;5.14.21-150500.55.83.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946170" version="1" comment="dtb-lg is &lt;5.14.21-150500.55.83.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946171" version="1" comment="dtb-marvell is &lt;5.14.21-150500.55.83.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946172" version="1" comment="dtb-mediatek is &lt;5.14.21-150500.55.83.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946173" version="1" comment="dtb-nvidia is &lt;5.14.21-150500.55.83.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946174" version="1" comment="dtb-qcom is &lt;5.14.21-150500.55.83.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946175" version="1" comment="dtb-renesas is &lt;5.14.21-150500.55.83.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946176" version="1" comment="dtb-rockchip is &lt;5.14.21-150500.55.83.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946177" version="1" comment="dtb-socionext is &lt;5.14.21-150500.55.83.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946178" version="1" comment="dtb-sprd is &lt;5.14.21-150500.55.83.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946179" version="1" comment="dtb-xilinx is &lt;5.14.21-150500.55.83.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946180" version="1" comment="gfs2-kmp-64kb is &lt;5.14.21-150500.55.83.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946181" version="1" comment="gfs2-kmp-default is &lt;5.14.21-150500.55.83.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946182" version="1" comment="kernel-64kb is &lt;5.14.21-150500.55.83.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946183" version="1" comment="kernel-64kb-devel is &lt;5.14.21-150500.55.83.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946184" version="1" comment="kernel-64kb-extra is &lt;5.14.21-150500.55.83.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946185" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.14.21-150500.55.83.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946186" version="1" comment="kernel-64kb-optional is &lt;5.14.21-150500.55.83.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946187" version="1" comment="kernel-debug is &lt;5.14.21-150500.55.83.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946188" version="1" comment="kernel-debug-devel is &lt;5.14.21-150500.55.83.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946189" version="1" comment="kernel-debug-livepatch-devel is &lt;5.14.21-150500.55.83.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946190" version="1" comment="kernel-debug-vdso is &lt;5.14.21-150500.55.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946191" version="1" comment="kernel-default is &lt;5.14.21-150500.55.83.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946192" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.83.1.150500.6.37.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946193" version="1" comment="kernel-default-base-rebuild is &lt;5.14.21-150500.55.83.1.150500.6.37.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946194" version="1" comment="kernel-default-devel is &lt;5.14.21-150500.55.83.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946195" version="1" comment="kernel-default-extra is &lt;5.14.21-150500.55.83.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946196" version="1" comment="kernel-default-livepatch is &lt;5.14.21-150500.55.83.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946197" version="1" comment="kernel-default-livepatch-devel is &lt;5.14.21-150500.55.83.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946198" version="1" comment="kernel-default-optional is &lt;5.14.21-150500.55.83.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946199" version="1" comment="kernel-default-vdso is &lt;5.14.21-150500.55.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946200" version="1" comment="kernel-devel is &lt;5.14.21-150500.55.83.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946201" version="1" comment="kernel-docs is &lt;5.14.21-150500.55.83.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946202" version="1" comment="kernel-docs-html is &lt;5.14.21-150500.55.83.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946203" version="1" comment="kernel-kvmsmall is &lt;5.14.21-150500.55.83.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946204" version="1" comment="kernel-kvmsmall-devel is &lt;5.14.21-150500.55.83.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946205" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.14.21-150500.55.83.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946206" version="1" comment="kernel-kvmsmall-vdso is &lt;5.14.21-150500.55.83.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946207" version="1" comment="kernel-macros is &lt;5.14.21-150500.55.83.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946208" version="1" comment="kernel-obs-build is &lt;5.14.21-150500.55.83.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946209" version="1" comment="kernel-obs-qa is &lt;5.14.21-150500.55.83.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946210" version="1" comment="kernel-source is &lt;5.14.21-150500.55.83.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946211" version="1" comment="kernel-source-vanilla is &lt;5.14.21-150500.55.83.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946212" version="1" comment="kernel-syms is &lt;5.14.21-150500.55.83.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946213" version="1" comment="kernel-zfcpdump is &lt;5.14.21-150500.55.83.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946214" version="1" comment="kselftests-kmp-64kb is &lt;5.14.21-150500.55.83.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946215" version="1" comment="kselftests-kmp-default is &lt;5.14.21-150500.55.83.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946216" version="1" comment="ocfs2-kmp-64kb is &lt;5.14.21-150500.55.83.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946217" version="1" comment="ocfs2-kmp-default is &lt;5.14.21-150500.55.83.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946218" version="1" comment="reiserfs-kmp-64kb is &lt;5.14.21-150500.55.83.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946219" version="1" comment="reiserfs-kmp-default is &lt;5.14.21-150500.55.83.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946220" version="1" comment="redis is &lt;6.2.6-150400.3.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946472" version="1" comment="libreoffice is &lt;24.8.1.2-150500.20.11.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946473" version="1" comment="libreoffice-base is &lt;24.8.1.2-150500.20.11.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946474" version="1" comment="libreoffice-base-drivers-firebird is &lt;24.8.1.2-150500.20.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946475" version="1" comment="libreoffice-base-drivers-postgresql is &lt;24.8.1.2-150500.20.11.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946476" version="1" comment="libreoffice-branding-upstream is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946477" version="1" comment="libreoffice-calc is &lt;24.8.1.2-150500.20.11.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946478" version="1" comment="libreoffice-calc-extensions is &lt;24.8.1.2-150500.20.11.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946479" version="1" comment="libreoffice-draw is &lt;24.8.1.2-150500.20.11.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946480" version="1" comment="libreoffice-filters-optional is &lt;24.8.1.2-150500.20.11.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946481" version="1" comment="libreoffice-gdb-pretty-printers is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946482" version="1" comment="libreoffice-glade is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946483" version="1" comment="libreoffice-gnome is &lt;24.8.1.2-150500.20.11.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946484" version="1" comment="libreoffice-gtk3 is &lt;24.8.1.2-150500.20.11.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946485" version="1" comment="libreoffice-icon-themes is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946486" version="1" comment="libreoffice-impress is &lt;24.8.1.2-150500.20.11.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946487" version="1" comment="libreoffice-l10n-af is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946488" version="1" comment="libreoffice-l10n-am is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946489" version="1" comment="libreoffice-l10n-ar is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946490" version="1" comment="libreoffice-l10n-as is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946491" version="1" comment="libreoffice-l10n-ast is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946492" version="1" comment="libreoffice-l10n-be is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946493" version="1" comment="libreoffice-l10n-bg is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946494" version="1" comment="libreoffice-l10n-bn is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946495" version="1" comment="libreoffice-l10n-bn_IN is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946496" version="1" comment="libreoffice-l10n-bo is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946497" version="1" comment="libreoffice-l10n-br is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946498" version="1" comment="libreoffice-l10n-brx is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946499" version="1" comment="libreoffice-l10n-bs is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946500" version="1" comment="libreoffice-l10n-ca is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946501" version="1" comment="libreoffice-l10n-ca_valencia is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946502" version="1" comment="libreoffice-l10n-ckb is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946503" version="1" comment="libreoffice-l10n-cs is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946504" version="1" comment="libreoffice-l10n-cy is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946505" version="1" comment="libreoffice-l10n-da is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946506" version="1" comment="libreoffice-l10n-de is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946507" version="1" comment="libreoffice-l10n-dgo is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946508" version="1" comment="libreoffice-l10n-dsb is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946509" version="1" comment="libreoffice-l10n-dz is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946510" version="1" comment="libreoffice-l10n-el is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946511" version="1" comment="libreoffice-l10n-en is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946512" version="1" comment="libreoffice-l10n-en_GB is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946513" version="1" comment="libreoffice-l10n-en_ZA is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946514" version="1" comment="libreoffice-l10n-eo is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946515" version="1" comment="libreoffice-l10n-es is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946516" version="1" comment="libreoffice-l10n-et is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946517" version="1" comment="libreoffice-l10n-eu is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946518" version="1" comment="libreoffice-l10n-fa is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946519" version="1" comment="libreoffice-l10n-fi is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946520" version="1" comment="libreoffice-l10n-fr is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946521" version="1" comment="libreoffice-l10n-fur is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946522" version="1" comment="libreoffice-l10n-fy is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946523" version="1" comment="libreoffice-l10n-ga is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946524" version="1" comment="libreoffice-l10n-gd is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946525" version="1" comment="libreoffice-l10n-gl is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946526" version="1" comment="libreoffice-l10n-gu is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946527" version="1" comment="libreoffice-l10n-gug is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946528" version="1" comment="libreoffice-l10n-he is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946529" version="1" comment="libreoffice-l10n-hi is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946530" version="1" comment="libreoffice-l10n-hr is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946531" version="1" comment="libreoffice-l10n-hsb is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946532" version="1" comment="libreoffice-l10n-hu is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946533" version="1" comment="libreoffice-l10n-id is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946534" version="1" comment="libreoffice-l10n-is is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946535" version="1" comment="libreoffice-l10n-it is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946536" version="1" comment="libreoffice-l10n-ja is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946537" version="1" comment="libreoffice-l10n-ka is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946538" version="1" comment="libreoffice-l10n-kab is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946539" version="1" comment="libreoffice-l10n-kk is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946540" version="1" comment="libreoffice-l10n-km is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946541" version="1" comment="libreoffice-l10n-kmr_Latn is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946542" version="1" comment="libreoffice-l10n-kn is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946543" version="1" comment="libreoffice-l10n-ko is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946544" version="1" comment="libreoffice-l10n-kok is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946545" version="1" comment="libreoffice-l10n-ks is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946546" version="1" comment="libreoffice-l10n-lb is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946547" version="1" comment="libreoffice-l10n-lo is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946548" version="1" comment="libreoffice-l10n-lt is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946549" version="1" comment="libreoffice-l10n-lv is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946550" version="1" comment="libreoffice-l10n-mai is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946551" version="1" comment="libreoffice-l10n-mk is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946552" version="1" comment="libreoffice-l10n-ml is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946553" version="1" comment="libreoffice-l10n-mn is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946554" version="1" comment="libreoffice-l10n-mni is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946555" version="1" comment="libreoffice-l10n-mr is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946556" version="1" comment="libreoffice-l10n-my is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946557" version="1" comment="libreoffice-l10n-nb is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946558" version="1" comment="libreoffice-l10n-ne is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946559" version="1" comment="libreoffice-l10n-nl is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946560" version="1" comment="libreoffice-l10n-nn is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946561" version="1" comment="libreoffice-l10n-nr is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946562" version="1" comment="libreoffice-l10n-nso is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946563" version="1" comment="libreoffice-l10n-oc is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946564" version="1" comment="libreoffice-l10n-om is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946565" version="1" comment="libreoffice-l10n-or is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946566" version="1" comment="libreoffice-l10n-pa is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946567" version="1" comment="libreoffice-l10n-pl is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946568" version="1" comment="libreoffice-l10n-pt_BR is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946569" version="1" comment="libreoffice-l10n-pt_PT is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946570" version="1" comment="libreoffice-l10n-ro is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946571" version="1" comment="libreoffice-l10n-ru is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946572" version="1" comment="libreoffice-l10n-rw is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946573" version="1" comment="libreoffice-l10n-sa_IN is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946574" version="1" comment="libreoffice-l10n-sat is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946575" version="1" comment="libreoffice-l10n-sd is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946576" version="1" comment="libreoffice-l10n-si is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946577" version="1" comment="libreoffice-l10n-sid is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946578" version="1" comment="libreoffice-l10n-sk is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946579" version="1" comment="libreoffice-l10n-sl is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946580" version="1" comment="libreoffice-l10n-sq is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946581" version="1" comment="libreoffice-l10n-sr is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946582" version="1" comment="libreoffice-l10n-ss is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946583" version="1" comment="libreoffice-l10n-st is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946584" version="1" comment="libreoffice-l10n-sv is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946585" version="1" comment="libreoffice-l10n-sw_TZ is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946586" version="1" comment="libreoffice-l10n-szl is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946587" version="1" comment="libreoffice-l10n-ta is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946588" version="1" comment="libreoffice-l10n-te is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946589" version="1" comment="libreoffice-l10n-tg is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946590" version="1" comment="libreoffice-l10n-th is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946591" version="1" comment="libreoffice-l10n-tn is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946592" version="1" comment="libreoffice-l10n-tr is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946593" version="1" comment="libreoffice-l10n-ts is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946594" version="1" comment="libreoffice-l10n-tt is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946595" version="1" comment="libreoffice-l10n-ug is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946596" version="1" comment="libreoffice-l10n-uk is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946597" version="1" comment="libreoffice-l10n-uz is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946598" version="1" comment="libreoffice-l10n-ve is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946599" version="1" comment="libreoffice-l10n-vec is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946600" version="1" comment="libreoffice-l10n-vi is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946601" version="1" comment="libreoffice-l10n-xh is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946602" version="1" comment="libreoffice-l10n-zh_CN is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946603" version="1" comment="libreoffice-l10n-zh_TW is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946604" version="1" comment="libreoffice-l10n-zu is &lt;24.8.1.2-150500.20.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946605" version="1" comment="libreoffice-librelogo is &lt;24.8.1.2-150500.20.11.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946606" version="1" comment="libreoffice-mailmerge is &lt;24.8.1.2-150500.20.11.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946607" version="1" comment="libreoffice-math is &lt;24.8.1.2-150500.20.11.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946608" version="1" comment="libreoffice-officebean is &lt;24.8.1.2-150500.20.11.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946609" version="1" comment="libreoffice-pyuno is &lt;24.8.1.2-150500.20.11.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946610" version="1" comment="libreoffice-qt5 is &lt;24.8.1.2-150500.20.11.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946611" version="1" comment="libreoffice-sdk is &lt;24.8.1.2-150500.20.11.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946612" version="1" comment="libreoffice-sdk-doc is &lt;24.8.1.2-150500.20.11.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946613" version="1" comment="libreoffice-writer is &lt;24.8.1.2-150500.20.11.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946614" version="1" comment="libreoffice-writer-extensions is &lt;24.8.1.2-150500.20.11.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946615" version="1" comment="libreofficekit is &lt;24.8.1.2-150500.20.11.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946616" version="1" comment="libreofficekit-devel is &lt;24.8.1.2-150500.20.11.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946617" version="1" comment="cluster-md-kmp-azure is &lt;5.14.21-150500.33.69.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946618" version="1" comment="dlm-kmp-azure is &lt;5.14.21-150500.33.69.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946619" version="1" comment="gfs2-kmp-azure is &lt;5.14.21-150500.33.69.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946620" version="1" comment="kernel-azure is &lt;5.14.21-150500.33.69.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946621" version="1" comment="kernel-azure-devel is &lt;5.14.21-150500.33.69.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946622" version="1" comment="kernel-azure-extra is &lt;5.14.21-150500.33.69.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946623" version="1" comment="kernel-azure-livepatch-devel is &lt;5.14.21-150500.33.69.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946624" version="1" comment="kernel-azure-optional is &lt;5.14.21-150500.33.69.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946625" version="1" comment="kernel-azure-vdso is &lt;5.14.21-150500.33.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946626" version="1" comment="kernel-devel-azure is &lt;5.14.21-150500.33.69.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946627" version="1" comment="kernel-source-azure is &lt;5.14.21-150500.33.69.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946628" version="1" comment="kernel-syms-azure is &lt;5.14.21-150500.33.69.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946629" version="1" comment="kselftests-kmp-azure is &lt;5.14.21-150500.33.69.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946630" version="1" comment="ocfs2-kmp-azure is &lt;5.14.21-150500.33.69.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946631" version="1" comment="reiserfs-kmp-azure is &lt;5.14.21-150500.33.69.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946632" version="1" comment="cluster-md-kmp-rt is &lt;5.14.21-150500.13.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946633" version="1" comment="dlm-kmp-rt is &lt;5.14.21-150500.13.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946634" version="1" comment="gfs2-kmp-rt is &lt;5.14.21-150500.13.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946635" version="1" comment="kernel-devel-rt is &lt;5.14.21-150500.13.73.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946636" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946637" version="1" comment="kernel-rt-devel is &lt;5.14.21-150500.13.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946638" version="1" comment="kernel-rt-extra is &lt;5.14.21-150500.13.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946639" version="1" comment="kernel-rt-livepatch is &lt;5.14.21-150500.13.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946640" version="1" comment="kernel-rt-livepatch-devel is &lt;5.14.21-150500.13.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946641" version="1" comment="kernel-rt-optional is &lt;5.14.21-150500.13.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946642" version="1" comment="kernel-rt-vdso is &lt;5.14.21-150500.13.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946643" version="1" comment="kernel-rt_debug is &lt;5.14.21-150500.13.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946644" version="1" comment="kernel-rt_debug-devel is &lt;5.14.21-150500.13.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946645" version="1" comment="kernel-rt_debug-livepatch-devel is &lt;5.14.21-150500.13.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946646" version="1" comment="kernel-rt_debug-vdso is &lt;5.14.21-150500.13.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946647" version="1" comment="kernel-source-rt is &lt;5.14.21-150500.13.73.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946648" version="1" comment="kernel-syms-rt is &lt;5.14.21-150500.13.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946649" version="1" comment="kselftests-kmp-rt is &lt;5.14.21-150500.13.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946650" version="1" comment="ocfs2-kmp-rt is &lt;5.14.21-150500.13.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946651" version="1" comment="reiserfs-kmp-rt is &lt;5.14.21-150500.13.73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947253" version="1" comment="python311-requests is &lt;2.31.0-150400.6.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947254" version="1" comment="OpenIPMI is &lt;2.0.31-150400.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947255" version="1" comment="OpenIPMI-devel is &lt;2.0.31-150400.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947256" version="1" comment="OpenIPMI-python3 is &lt;2.0.31-150400.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947257" version="1" comment="libOpenIPMI0 is &lt;2.0.31-150400.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947347" version="1" comment="MozillaFirefox is &lt;128.3.1-150200.152.155.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947348" version="1" comment="MozillaFirefox-branding-upstream is &lt;128.3.1-150200.152.155.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947349" version="1" comment="MozillaFirefox-devel is &lt;128.3.1-150200.152.155.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947350" version="1" comment="MozillaFirefox-translations-common is &lt;128.3.1-150200.152.155.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947351" version="1" comment="MozillaFirefox-translations-other is &lt;128.3.1-150200.152.155.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947413" version="1" comment="MozillaThunderbird is &lt;128.3.0-150200.8.182.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947414" version="1" comment="MozillaThunderbird-translations-common is &lt;128.3.0-150200.8.182.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947415" version="1" comment="MozillaThunderbird-translations-other is &lt;128.3.0-150200.8.182.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947416" version="1" comment="keepalived is &lt;2.2.2-150500.8.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947543" version="1" comment="ruby2.5-rubygem-puma is &lt;4.3.12-150000.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947544" version="1" comment="ruby2.5-rubygem-puma-doc is &lt;4.3.12-150000.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947545" version="1" comment="libunbound8 is &lt;1.20.0-150100.10.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947546" version="1" comment="unbound is &lt;1.20.0-150100.10.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947547" version="1" comment="unbound-anchor is &lt;1.20.0-150100.10.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947548" version="1" comment="unbound-devel is &lt;1.20.0-150100.10.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947549" version="1" comment="unbound-munin is &lt;1.20.0-150100.10.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947550" version="1" comment="unbound-python is &lt;1.20.0-150100.10.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947551" version="1" comment="etcd is &lt;3.5.12-150000.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947552" version="1" comment="etcdctl is &lt;3.5.12-150000.7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947553" version="1" comment="apache2-mod_php8 is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947554" version="1" comment="php8 is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947555" version="1" comment="php8-bcmath is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947556" version="1" comment="php8-bz2 is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947557" version="1" comment="php8-calendar is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947558" version="1" comment="php8-cli is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947559" version="1" comment="php8-ctype is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947560" version="1" comment="php8-curl is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947561" version="1" comment="php8-dba is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947562" version="1" comment="php8-devel is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947563" version="1" comment="php8-dom is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947564" version="1" comment="php8-embed is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947565" version="1" comment="php8-enchant is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947566" version="1" comment="php8-exif is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947567" version="1" comment="php8-fastcgi is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947568" version="1" comment="php8-fileinfo is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947569" version="1" comment="php8-fpm is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947570" version="1" comment="php8-ftp is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947571" version="1" comment="php8-gd is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947572" version="1" comment="php8-gettext is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947573" version="1" comment="php8-gmp is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947574" version="1" comment="php8-iconv is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947575" version="1" comment="php8-intl is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947576" version="1" comment="php8-ldap is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947577" version="1" comment="php8-mbstring is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947578" version="1" comment="php8-mysql is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947579" version="1" comment="php8-odbc is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947580" version="1" comment="php8-opcache is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947581" version="1" comment="php8-openssl is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947582" version="1" comment="php8-pcntl is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947583" version="1" comment="php8-pdo is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947584" version="1" comment="php8-pgsql is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947585" version="1" comment="php8-phar is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947586" version="1" comment="php8-posix is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947587" version="1" comment="php8-readline is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947588" version="1" comment="php8-shmop is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947589" version="1" comment="php8-snmp is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947590" version="1" comment="php8-soap is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947591" version="1" comment="php8-sockets is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947592" version="1" comment="php8-sodium is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947593" version="1" comment="php8-sqlite is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947594" version="1" comment="php8-sysvmsg is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947595" version="1" comment="php8-sysvsem is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947596" version="1" comment="php8-sysvshm is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947597" version="1" comment="php8-test is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947598" version="1" comment="php8-tidy is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947599" version="1" comment="php8-tokenizer is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947600" version="1" comment="php8-xmlreader is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947601" version="1" comment="php8-xmlwriter is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947602" version="1" comment="php8-xsl is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947603" version="1" comment="php8-zip is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947604" version="1" comment="php8-zlib is &lt;8.0.30-150400.4.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947914" version="1" comment="jetty-annotations is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947915" version="1" comment="jetty-ant is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947916" version="1" comment="jetty-cdi is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947917" version="1" comment="jetty-client is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947918" version="1" comment="jetty-continuation is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947919" version="1" comment="jetty-deploy is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947920" version="1" comment="jetty-fcgi is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947921" version="1" comment="jetty-http is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947922" version="1" comment="jetty-http-spi is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947923" version="1" comment="jetty-io is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947924" version="1" comment="jetty-jaas is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947925" version="1" comment="jetty-jmx is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947926" version="1" comment="jetty-jndi is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947927" version="1" comment="jetty-jsp is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947928" version="1" comment="jetty-minimal-javadoc is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947929" version="1" comment="jetty-openid is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947930" version="1" comment="jetty-plus is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947931" version="1" comment="jetty-proxy is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947932" version="1" comment="jetty-quickstart is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947933" version="1" comment="jetty-rewrite is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947934" version="1" comment="jetty-security is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947935" version="1" comment="jetty-server is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947936" version="1" comment="jetty-servlet is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947937" version="1" comment="jetty-servlets is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947938" version="1" comment="jetty-start is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947939" version="1" comment="jetty-util is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947940" version="1" comment="jetty-util-ajax is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947941" version="1" comment="jetty-webapp is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947942" version="1" comment="jetty-xml is &lt;9.4.56-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947943" version="1" comment="buildah is &lt;1.35.4-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947944" version="1" comment="MozillaThunderbird is &lt;128.3.1-150200.8.185.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947945" version="1" comment="MozillaThunderbird-translations-common is &lt;128.3.1-150200.8.185.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947946" version="1" comment="MozillaThunderbird-translations-other is &lt;128.3.1-150200.8.185.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947947" version="1" comment="apache2-mod_php7 is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947948" version="1" comment="php7 is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947949" version="1" comment="php7-bcmath is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947950" version="1" comment="php7-bz2 is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947951" version="1" comment="php7-calendar is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947952" version="1" comment="php7-cli is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947953" version="1" comment="php7-ctype is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947954" version="1" comment="php7-curl is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947955" version="1" comment="php7-dba is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947956" version="1" comment="php7-devel is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947957" version="1" comment="php7-dom is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947958" version="1" comment="php7-embed is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947959" version="1" comment="php7-enchant is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947960" version="1" comment="php7-exif is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947961" version="1" comment="php7-fastcgi is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947962" version="1" comment="php7-fileinfo is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947963" version="1" comment="php7-fpm is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947964" version="1" comment="php7-ftp is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947965" version="1" comment="php7-gd is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947966" version="1" comment="php7-gettext is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947967" version="1" comment="php7-gmp is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947968" version="1" comment="php7-iconv is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947969" version="1" comment="php7-intl is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947970" version="1" comment="php7-json is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947971" version="1" comment="php7-ldap is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947972" version="1" comment="php7-mbstring is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947973" version="1" comment="php7-mysql is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947974" version="1" comment="php7-odbc is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947975" version="1" comment="php7-opcache is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947976" version="1" comment="php7-openssl is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947977" version="1" comment="php7-pcntl is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947978" version="1" comment="php7-pdo is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947979" version="1" comment="php7-pgsql is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947980" version="1" comment="php7-phar is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947981" version="1" comment="php7-posix is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947982" version="1" comment="php7-readline is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947983" version="1" comment="php7-shmop is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947984" version="1" comment="php7-snmp is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947985" version="1" comment="php7-soap is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947986" version="1" comment="php7-sockets is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947987" version="1" comment="php7-sodium is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947988" version="1" comment="php7-sqlite is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947989" version="1" comment="php7-sysvmsg is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947990" version="1" comment="php7-sysvsem is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947991" version="1" comment="php7-sysvshm is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947992" version="1" comment="php7-test is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947993" version="1" comment="php7-tidy is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947994" version="1" comment="php7-tokenizer is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947995" version="1" comment="php7-xmlreader is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947996" version="1" comment="php7-xmlrpc is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947997" version="1" comment="php7-xmlwriter is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947998" version="1" comment="php7-xsl is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947999" version="1" comment="php7-zip is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948000" version="1" comment="php7-zlib is &lt;7.4.33-150400.4.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948306" version="1" comment="podman is &lt;4.9.5-150500.3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948307" version="1" comment="podman-docker is &lt;4.9.5-150500.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948308" version="1" comment="podman-remote is &lt;4.9.5-150500.3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948309" version="1" comment="podmansh is &lt;4.9.5-150500.3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948329" version="1" comment="libprotobuf-lite25_1_0 is &lt;25.1-150500.12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948330" version="1" comment="libprotobuf-lite25_1_0-32bit is &lt;25.1-150500.12.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948331" version="1" comment="libprotobuf25_1_0 is &lt;25.1-150500.12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948332" version="1" comment="libprotobuf25_1_0-32bit is &lt;25.1-150500.12.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948333" version="1" comment="libprotoc25_1_0 is &lt;25.1-150500.12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948334" version="1" comment="libprotoc25_1_0-32bit is &lt;25.1-150500.12.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948335" version="1" comment="protobuf-devel is &lt;25.1-150500.12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948336" version="1" comment="protobuf-java is &lt;25.1-150500.12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948337" version="1" comment="python311-protobuf is &lt;4.25.1-150500.12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948454" version="1" comment="podman is &lt;4.9.5-150500.3.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948455" version="1" comment="podman-docker is &lt;4.9.5-150500.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948456" version="1" comment="podman-remote is &lt;4.9.5-150500.3.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948457" version="1" comment="podmansh is &lt;4.9.5-150500.3.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948458" version="1" comment="buildah is &lt;1.35.4-150500.3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948600" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150500.17.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948601" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1l-150500.17.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948602" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150500.17.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948603" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1l-150500.17.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948604" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150500.17.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948605" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1l-150500.17.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948606" version="1" comment="openssl-1_1 is &lt;1.1.1l-150500.17.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948607" version="1" comment="openssl-1_1-doc is &lt;1.1.1l-150500.17.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948608" version="1" comment="libopenssl-3-devel is &lt;3.0.8-150500.5.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948609" version="1" comment="libopenssl-3-devel-32bit is &lt;3.0.8-150500.5.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948610" version="1" comment="libopenssl3 is &lt;3.0.8-150500.5.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948611" version="1" comment="libopenssl3-32bit is &lt;3.0.8-150500.5.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948612" version="1" comment="openssl-3 is &lt;3.0.8-150500.5.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948613" version="1" comment="openssl-3-doc is &lt;3.0.8-150500.5.48.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948627" version="1" comment="go1.22-openssl is &lt;1.22.7.1-150000.1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948628" version="1" comment="go1.22-openssl-doc is &lt;1.22.7.1-150000.1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948629" version="1" comment="go1.22-openssl-race is &lt;1.22.7.1-150000.1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948630" version="1" comment="go1.23-openssl is &lt;1.23.2.2-150000.1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948631" version="1" comment="go1.23-openssl-doc is &lt;1.23.2.2-150000.1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948632" version="1" comment="go1.23-openssl-race is &lt;1.23.2.2-150000.1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948683" version="1" comment="libpcp-devel is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948684" version="1" comment="libpcp3 is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948685" version="1" comment="libpcp_gui2 is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948686" version="1" comment="libpcp_import1 is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948687" version="1" comment="libpcp_mmv1 is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948688" version="1" comment="libpcp_trace2 is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948689" version="1" comment="libpcp_web1 is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948690" version="1" comment="pcp is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948691" version="1" comment="pcp-conf is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948692" version="1" comment="pcp-devel is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948693" version="1" comment="pcp-doc is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948694" version="1" comment="pcp-export-pcp2elasticsearch is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948695" version="1" comment="pcp-export-pcp2graphite is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948696" version="1" comment="pcp-export-pcp2influxdb is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948697" version="1" comment="pcp-export-pcp2json is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948698" version="1" comment="pcp-export-pcp2spark is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948699" version="1" comment="pcp-export-pcp2xml is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948700" version="1" comment="pcp-export-pcp2zabbix is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948701" version="1" comment="pcp-gui is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948702" version="1" comment="pcp-import-collectl2pcp is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948703" version="1" comment="pcp-import-ganglia2pcp is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948704" version="1" comment="pcp-import-iostat2pcp is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948705" version="1" comment="pcp-import-mrtg2pcp is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948706" version="1" comment="pcp-import-sar2pcp is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948707" version="1" comment="pcp-pmda-activemq is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948708" version="1" comment="pcp-pmda-apache is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948709" version="1" comment="pcp-pmda-bash is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948710" version="1" comment="pcp-pmda-bonding is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948711" version="1" comment="pcp-pmda-cifs is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948712" version="1" comment="pcp-pmda-cisco is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948713" version="1" comment="pcp-pmda-dbping is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948714" version="1" comment="pcp-pmda-dm is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948715" version="1" comment="pcp-pmda-docker is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948716" version="1" comment="pcp-pmda-ds389 is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948717" version="1" comment="pcp-pmda-ds389log is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948718" version="1" comment="pcp-pmda-elasticsearch is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948719" version="1" comment="pcp-pmda-gfs2 is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948720" version="1" comment="pcp-pmda-gluster is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948721" version="1" comment="pcp-pmda-gpfs is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948722" version="1" comment="pcp-pmda-gpsd is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948723" version="1" comment="pcp-pmda-hacluster is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948724" version="1" comment="pcp-pmda-haproxy is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948725" version="1" comment="pcp-pmda-infiniband is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948726" version="1" comment="pcp-pmda-json is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948727" version="1" comment="pcp-pmda-lmsensors is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948728" version="1" comment="pcp-pmda-logger is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948729" version="1" comment="pcp-pmda-lustre is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948730" version="1" comment="pcp-pmda-lustrecomm is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948731" version="1" comment="pcp-pmda-mailq is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948732" version="1" comment="pcp-pmda-memcache is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948733" version="1" comment="pcp-pmda-mic is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948734" version="1" comment="pcp-pmda-mounts is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948735" version="1" comment="pcp-pmda-mysql is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948736" version="1" comment="pcp-pmda-named is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948737" version="1" comment="pcp-pmda-netcheck is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948738" version="1" comment="pcp-pmda-netfilter is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948739" version="1" comment="pcp-pmda-news is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948740" version="1" comment="pcp-pmda-nfsclient is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948741" version="1" comment="pcp-pmda-nginx is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948742" version="1" comment="pcp-pmda-nutcracker is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948743" version="1" comment="pcp-pmda-nvidia-gpu is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948744" version="1" comment="pcp-pmda-openmetrics is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948745" version="1" comment="pcp-pmda-openvswitch is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948746" version="1" comment="pcp-pmda-oracle is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948747" version="1" comment="pcp-pmda-pdns is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948748" version="1" comment="pcp-pmda-perfevent is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948749" version="1" comment="pcp-pmda-postfix is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948750" version="1" comment="pcp-pmda-rabbitmq is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948751" version="1" comment="pcp-pmda-redis is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948752" version="1" comment="pcp-pmda-roomtemp is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948753" version="1" comment="pcp-pmda-rsyslog is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948754" version="1" comment="pcp-pmda-samba is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948755" version="1" comment="pcp-pmda-sendmail is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948756" version="1" comment="pcp-pmda-shping is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948757" version="1" comment="pcp-pmda-slurm is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948758" version="1" comment="pcp-pmda-smart is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948759" version="1" comment="pcp-pmda-snmp is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948760" version="1" comment="pcp-pmda-sockets is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948761" version="1" comment="pcp-pmda-summary is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948762" version="1" comment="pcp-pmda-systemd is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948763" version="1" comment="pcp-pmda-trace is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948764" version="1" comment="pcp-pmda-unbound is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948765" version="1" comment="pcp-pmda-weblog is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948766" version="1" comment="pcp-pmda-zimbra is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948767" version="1" comment="pcp-pmda-zswap is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948768" version="1" comment="pcp-system-tools is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948769" version="1" comment="pcp-testsuite is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948770" version="1" comment="pcp-zeroconf is &lt;6.2.0-150500.8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948771" version="1" comment="perl-PCP-LogImport is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948772" version="1" comment="perl-PCP-LogSummary is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948773" version="1" comment="perl-PCP-MMV is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948774" version="1" comment="perl-PCP-PMDA is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948775" version="1" comment="python3-pcp is &lt;6.2.0-150500.8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948776" version="1" comment="xorg-x11-server is &lt;21.1.4-150500.7.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948777" version="1" comment="xorg-x11-server-Xvfb is &lt;21.1.4-150500.7.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948778" version="1" comment="xorg-x11-server-extra is &lt;21.1.4-150500.7.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948779" version="1" comment="xorg-x11-server-sdk is &lt;21.1.4-150500.7.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948780" version="1" comment="xorg-x11-server-source is &lt;21.1.4-150500.7.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948781" version="1" comment="xwayland is &lt;22.1.5-150500.7.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948782" version="1" comment="xwayland-devel is &lt;22.1.5-150500.7.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948783" version="1" comment="go1.21-openssl is &lt;1.21.13.4-150000.1.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948784" version="1" comment="go1.21-openssl-doc is &lt;1.21.13.4-150000.1.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948785" version="1" comment="go1.21-openssl-race is &lt;1.21.13.4-150000.1.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948786" version="1" comment="python311-Werkzeug is &lt;2.3.6-150400.6.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948787" version="1" comment="govulncheck-vulndb is &lt;0.0.20241028T152002-150000.1.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950294" version="1" comment="389-ds is &lt;2.2.10~git18.20ce9289-150500.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950295" version="1" comment="389-ds-devel is &lt;2.2.10~git18.20ce9289-150500.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950296" version="1" comment="389-ds-snmp is &lt;2.2.10~git18.20ce9289-150500.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950297" version="1" comment="lib389 is &lt;2.2.10~git18.20ce9289-150500.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950298" version="1" comment="libsvrcore0 is &lt;2.2.10~git18.20ce9289-150500.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950388" version="1" comment="apache2-mod_uwsgi is &lt;2.0.19.1-150400.8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950389" version="1" comment="uwsgi is &lt;2.0.19.1-150400.8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950390" version="1" comment="uwsgi-emperor_pg is &lt;2.0.19.1-150400.8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950391" version="1" comment="uwsgi-emperor_zeromq is &lt;2.0.19.1-150400.8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950392" version="1" comment="uwsgi-gevent is &lt;2.0.19.1-150400.8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950393" version="1" comment="uwsgi-glusterfs is &lt;2.0.19.1-150400.8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950394" version="1" comment="uwsgi-greenlet is &lt;2.0.19.1-150400.8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950395" version="1" comment="uwsgi-jvm is &lt;2.0.19.1-150400.8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950396" version="1" comment="uwsgi-ldap is &lt;2.0.19.1-150400.8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950397" version="1" comment="uwsgi-libffi is &lt;2.0.19.1-150400.8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950398" version="1" comment="uwsgi-logzmq is &lt;2.0.19.1-150400.8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950399" version="1" comment="uwsgi-lua is &lt;2.0.19.1-150400.8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950400" version="1" comment="uwsgi-pam is &lt;2.0.19.1-150400.8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950401" version="1" comment="uwsgi-php7 is &lt;2.0.19.1-150400.8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950402" version="1" comment="uwsgi-psgi is &lt;2.0.19.1-150400.8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950403" version="1" comment="uwsgi-pypy is &lt;2.0.19.1-150400.8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950404" version="1" comment="uwsgi-python3 is &lt;2.0.19.1-150400.8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950405" version="1" comment="uwsgi-sqlite3 is &lt;2.0.19.1-150400.8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950406" version="1" comment="uwsgi-xslt is &lt;2.0.19.1-150400.8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950407" version="1" comment="cups-filters is &lt;1.25.0-150200.3.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950408" version="1" comment="cups-filters-devel is &lt;1.25.0-150200.3.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950409" version="1" comment="apache2 is &lt;2.4.51-150400.6.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950410" version="1" comment="apache2-devel is &lt;2.4.51-150400.6.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950411" version="1" comment="apache2-doc is &lt;2.4.51-150400.6.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950412" version="1" comment="apache2-event is &lt;2.4.51-150400.6.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950413" version="1" comment="apache2-example-pages is &lt;2.4.51-150400.6.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950414" version="1" comment="apache2-prefork is &lt;2.4.51-150400.6.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950415" version="1" comment="apache2-utils is &lt;2.4.51-150400.6.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950416" version="1" comment="apache2-worker is &lt;2.4.51-150400.6.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950417" version="1" comment="WebKitGTK-4.0-lang is &lt;2.46.0-150400.4.91.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950418" version="1" comment="WebKitGTK-4.1-lang is &lt;2.46.0-150400.4.91.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950419" version="1" comment="WebKitGTK-6.0-lang is &lt;2.46.0-150400.4.91.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950420" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950421" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.46.0-150400.4.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950422" version="1" comment="libjavascriptcoregtk-4_1-0 is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950423" version="1" comment="libjavascriptcoregtk-4_1-0-32bit is &lt;2.46.0-150400.4.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950424" version="1" comment="libjavascriptcoregtk-6_0-1 is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950425" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950426" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.46.0-150400.4.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950427" version="1" comment="libwebkit2gtk-4_1-0 is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950428" version="1" comment="libwebkit2gtk-4_1-0-32bit is &lt;2.46.0-150400.4.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950429" version="1" comment="libwebkitgtk-6_0-4 is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950430" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950431" version="1" comment="typelib-1_0-JavaScriptCore-4_1 is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950432" version="1" comment="typelib-1_0-JavaScriptCore-6_0 is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950433" version="1" comment="typelib-1_0-WebKit-6_0 is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950434" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950435" version="1" comment="typelib-1_0-WebKit2-4_1 is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950436" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950437" version="1" comment="typelib-1_0-WebKit2WebExtension-4_1 is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950438" version="1" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950439" version="1" comment="webkit-jsc-4 is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950440" version="1" comment="webkit-jsc-4.1 is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950441" version="1" comment="webkit-jsc-6.0 is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950442" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950443" version="1" comment="webkit2gtk-4_1-injected-bundles is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950444" version="1" comment="webkit2gtk3-devel is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950445" version="1" comment="webkit2gtk3-minibrowser is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950446" version="1" comment="webkit2gtk3-soup2-devel is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950447" version="1" comment="webkit2gtk3-soup2-minibrowser is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950448" version="1" comment="webkit2gtk4-devel is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950449" version="1" comment="webkit2gtk4-minibrowser is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950450" version="1" comment="webkitgtk-6_0-injected-bundles is &lt;2.46.0-150400.4.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950451" version="1" comment="ruby2.5-rubygem-bundler is &lt;1.16.1-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950452" version="1" comment="ruby2.5-rubygem-bundler-doc is &lt;1.16.1-150000.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950453" version="1" comment="libruby2_5-2_5 is &lt;2.5.9-150000.4.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950454" version="1" comment="ruby2.5 is &lt;2.5.9-150000.4.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950455" version="1" comment="ruby2.5-devel is &lt;2.5.9-150000.4.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950456" version="1" comment="ruby2.5-devel-extra is &lt;2.5.9-150000.4.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950457" version="1" comment="ruby2.5-doc is &lt;2.5.9-150000.4.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950458" version="1" comment="ruby2.5-doc-ri is &lt;2.5.9-150000.4.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950459" version="1" comment="ruby2.5-stdlib is &lt;2.5.9-150000.4.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950460" version="1" comment="java-11-openjdk is &lt;11.0.25.0-150000.3.119.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950461" version="1" comment="java-11-openjdk-demo is &lt;11.0.25.0-150000.3.119.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950462" version="1" comment="java-11-openjdk-devel is &lt;11.0.25.0-150000.3.119.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950463" version="1" comment="java-11-openjdk-headless is &lt;11.0.25.0-150000.3.119.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950464" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.25.0-150000.3.119.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950465" version="1" comment="java-11-openjdk-jmods is &lt;11.0.25.0-150000.3.119.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950466" version="1" comment="java-11-openjdk-src is &lt;11.0.25.0-150000.3.119.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950467" version="1" comment="python311-waitress is &lt;2.1.2-150400.12.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950468" version="1" comment="python311-waitress-doc is &lt;2.1.2-150400.12.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950469" version="1" comment="ruby2.5-rubygem-actionpack-5_1 is &lt;5.1.4-150000.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950470" version="1" comment="ruby2.5-rubygem-actionpack-doc-5_1 is &lt;5.1.4-150000.3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950471" version="1" comment="ruby2.5-rubygem-actionmailer-5_1 is &lt;5.1.4-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950472" version="1" comment="ruby2.5-rubygem-actionmailer-doc-5_1 is &lt;5.1.4-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950473" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950474" version="1" comment="libpython3_6m1_0-32bit is &lt;3.6.15-150300.10.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950475" version="1" comment="python3 is &lt;3.6.15-150300.10.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950476" version="1" comment="python3-base is &lt;3.6.15-150300.10.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950477" version="1" comment="python3-curses is &lt;3.6.15-150300.10.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950478" version="1" comment="python3-dbm is &lt;3.6.15-150300.10.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950479" version="1" comment="python3-devel is &lt;3.6.15-150300.10.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950480" version="1" comment="python3-doc is &lt;3.6.15-150300.10.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950481" version="1" comment="python3-doc-devhelp is &lt;3.6.15-150300.10.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950482" version="1" comment="python3-idle is &lt;3.6.15-150300.10.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950483" version="1" comment="python3-testsuite is &lt;3.6.15-150300.10.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950484" version="1" comment="python3-tk is &lt;3.6.15-150300.10.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950485" version="1" comment="python3-tools is &lt;3.6.15-150300.10.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950854" version="1" comment="MozillaFirefox is &lt;128.4.0-150200.152.158.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950855" version="1" comment="MozillaFirefox-branding-upstream is &lt;128.4.0-150200.152.158.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950856" version="1" comment="MozillaFirefox-devel is &lt;128.4.0-150200.152.158.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950857" version="1" comment="MozillaFirefox-translations-common is &lt;128.4.0-150200.152.158.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950858" version="1" comment="MozillaFirefox-translations-other is &lt;128.4.0-150200.152.158.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950989" version="1" comment="govulncheck-vulndb is &lt;0.0.20241030T212825-150000.1.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951073" version="1" comment="gsf-office-thumbnailer is &lt;1.14.50-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951074" version="1" comment="libgsf-1-114 is &lt;1.14.50-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951075" version="1" comment="libgsf-1-114-32bit is &lt;1.14.50-150400.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951076" version="1" comment="libgsf-devel is &lt;1.14.50-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951077" version="1" comment="libgsf-lang is &lt;1.14.50-150400.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951078" version="1" comment="libgsf-tools is &lt;1.14.50-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951079" version="1" comment="typelib-1_0-Gsf-1 is &lt;1.14.50-150400.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951080" version="1" comment="gradle is &lt;4.4.1-150200.3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951081" version="1" comment="libpython3_10-1_0 is &lt;3.10.15-150400.4.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951082" version="1" comment="libpython3_10-1_0-32bit is &lt;3.10.15-150400.4.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951083" version="1" comment="python310 is &lt;3.10.15-150400.4.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951084" version="1" comment="python310-32bit is &lt;3.10.15-150400.4.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951085" version="1" comment="python310-base is &lt;3.10.15-150400.4.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951086" version="1" comment="python310-base-32bit is &lt;3.10.15-150400.4.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951087" version="1" comment="python310-curses is &lt;3.10.15-150400.4.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951088" version="1" comment="python310-dbm is &lt;3.10.15-150400.4.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951089" version="1" comment="python310-devel is &lt;3.10.15-150400.4.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951090" version="1" comment="python310-doc is &lt;3.10.15-150400.4.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951091" version="1" comment="python310-doc-devhelp is &lt;3.10.15-150400.4.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951092" version="1" comment="python310-idle is &lt;3.10.15-150400.4.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951093" version="1" comment="python310-testsuite is &lt;3.10.15-150400.4.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951094" version="1" comment="python310-tk is &lt;3.10.15-150400.4.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951095" version="1" comment="python310-tools is &lt;3.10.15-150400.4.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951096" version="1" comment="curl is &lt;8.0.1-150400.5.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951097" version="1" comment="libcurl-devel is &lt;8.0.1-150400.5.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951098" version="1" comment="libcurl-devel-32bit is &lt;8.0.1-150400.5.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951099" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951100" version="1" comment="libcurl4-32bit is &lt;8.0.1-150400.5.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951347" version="1" comment="ghostscript is &lt;9.52-150000.200.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951348" version="1" comment="ghostscript-devel is &lt;9.52-150000.200.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951349" version="1" comment="ghostscript-x11 is &lt;9.52-150000.200.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951350" version="1" comment="libpython3_9-1_0 is &lt;3.9.20-150300.4.55.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951351" version="1" comment="libpython3_9-1_0-32bit is &lt;3.9.20-150300.4.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951352" version="1" comment="python39 is &lt;3.9.20-150300.4.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951353" version="1" comment="python39-32bit is &lt;3.9.20-150300.4.55.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951354" version="1" comment="python39-base is &lt;3.9.20-150300.4.55.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951355" version="1" comment="python39-base-32bit is &lt;3.9.20-150300.4.55.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951356" version="1" comment="python39-curses is &lt;3.9.20-150300.4.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951357" version="1" comment="python39-dbm is &lt;3.9.20-150300.4.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951358" version="1" comment="python39-devel is &lt;3.9.20-150300.4.55.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951359" version="1" comment="python39-doc is &lt;3.9.20-150300.4.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951360" version="1" comment="python39-doc-devhelp is &lt;3.9.20-150300.4.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951361" version="1" comment="python39-idle is &lt;3.9.20-150300.4.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951362" version="1" comment="python39-testsuite is &lt;3.9.20-150300.4.55.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951363" version="1" comment="python39-tk is &lt;3.9.20-150300.4.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951364" version="1" comment="python39-tools is &lt;3.9.20-150300.4.55.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951428" version="1" comment="qemu is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951429" version="1" comment="qemu-SLOF is &lt;7.1.0-150500.49.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951430" version="1" comment="qemu-accel-qtest is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951431" version="1" comment="qemu-accel-tcg-x86 is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951432" version="1" comment="qemu-arm is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951433" version="1" comment="qemu-audio-alsa is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951434" version="1" comment="qemu-audio-dbus is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951435" version="1" comment="qemu-audio-jack is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951436" version="1" comment="qemu-audio-pa is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951437" version="1" comment="qemu-audio-spice is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951438" version="1" comment="qemu-block-curl is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951439" version="1" comment="qemu-block-dmg is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951440" version="1" comment="qemu-block-gluster is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951441" version="1" comment="qemu-block-iscsi is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951442" version="1" comment="qemu-block-nfs is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951443" version="1" comment="qemu-block-rbd is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951444" version="1" comment="qemu-block-ssh is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951445" version="1" comment="qemu-chardev-baum is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951446" version="1" comment="qemu-chardev-spice is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951447" version="1" comment="qemu-extra is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951448" version="1" comment="qemu-guest-agent is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951449" version="1" comment="qemu-hw-display-qxl is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951450" version="1" comment="qemu-hw-display-virtio-gpu is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951451" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951452" version="1" comment="qemu-hw-display-virtio-vga is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951453" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951454" version="1" comment="qemu-hw-usb-host is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951455" version="1" comment="qemu-hw-usb-redirect is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951456" version="1" comment="qemu-hw-usb-smartcard is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951457" version="1" comment="qemu-ipxe is &lt;1.0.0+-150500.49.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951458" version="1" comment="qemu-ivshmem-tools is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951459" version="1" comment="qemu-ksm is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951460" version="1" comment="qemu-kvm is &lt;7.1.0-150500.49.24.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951461" version="1" comment="qemu-lang is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951462" version="1" comment="qemu-microvm is &lt;7.1.0-150500.49.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951463" version="1" comment="qemu-ppc is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951464" version="1" comment="qemu-s390x is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951465" version="1" comment="qemu-seabios is &lt;1.16.0_0_gd239552-150500.49.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951466" version="1" comment="qemu-sgabios is &lt;8-150500.49.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951467" version="1" comment="qemu-skiboot is &lt;7.1.0-150500.49.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951468" version="1" comment="qemu-tools is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951469" version="1" comment="qemu-ui-curses is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951470" version="1" comment="qemu-ui-dbus is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951471" version="1" comment="qemu-ui-gtk is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951472" version="1" comment="qemu-ui-opengl is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951473" version="1" comment="qemu-ui-spice-app is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951474" version="1" comment="qemu-ui-spice-core is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951475" version="1" comment="qemu-vgabios is &lt;1.16.0_0_gd239552-150500.49.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951476" version="1" comment="qemu-vhost-user-gpu is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951477" version="1" comment="qemu-x86 is &lt;7.1.0-150500.49.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951478" version="1" comment="govulncheck-vulndb is &lt;0.0.20241104T154416-150000.1.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951479" version="1" comment="libpython3_11-1_0 is &lt;3.11.10-150400.9.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951480" version="1" comment="libpython3_11-1_0-32bit is &lt;3.11.10-150400.9.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951481" version="1" comment="python311 is &lt;3.11.10-150400.9.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951482" version="1" comment="python311-32bit is &lt;3.11.10-150400.9.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951483" version="1" comment="python311-base is &lt;3.11.10-150400.9.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951484" version="1" comment="python311-base-32bit is &lt;3.11.10-150400.9.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951485" version="1" comment="python311-curses is &lt;3.11.10-150400.9.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951486" version="1" comment="python311-dbm is &lt;3.11.10-150400.9.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951487" version="1" comment="python311-devel is &lt;3.11.10-150400.9.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951488" version="1" comment="python311-doc is &lt;3.11.10-150400.9.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951489" version="1" comment="python311-doc-devhelp is &lt;3.11.10-150400.9.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951490" version="1" comment="python311-idle is &lt;3.11.10-150400.9.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951491" version="1" comment="python311-testsuite is &lt;3.11.10-150400.9.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951492" version="1" comment="python311-tk is &lt;3.11.10-150400.9.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951493" version="1" comment="python311-tools is &lt;3.11.10-150400.9.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951494" version="1" comment="gdk-pixbuf-loader-libheif is &lt;1.12.0-150400.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951495" version="1" comment="libheif-devel is &lt;1.12.0-150400.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951496" version="1" comment="libheif1 is &lt;1.12.0-150400.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951497" version="1" comment="libheif1-32bit is &lt;1.12.0-150400.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951752" version="1" comment="apache2 is &lt;2.4.51-150400.6.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951753" version="1" comment="apache2-devel is &lt;2.4.51-150400.6.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951754" version="1" comment="apache2-doc is &lt;2.4.51-150400.6.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951755" version="1" comment="apache2-event is &lt;2.4.51-150400.6.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951756" version="1" comment="apache2-example-pages is &lt;2.4.51-150400.6.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951757" version="1" comment="apache2-prefork is &lt;2.4.51-150400.6.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951758" version="1" comment="apache2-utils is &lt;2.4.51-150400.6.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951759" version="1" comment="apache2-worker is &lt;2.4.51-150400.6.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951760" version="1" comment="java-17-openjdk is &lt;17.0.13.0-150400.3.48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951761" version="1" comment="java-17-openjdk-demo is &lt;17.0.13.0-150400.3.48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951762" version="1" comment="java-17-openjdk-devel is &lt;17.0.13.0-150400.3.48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951763" version="1" comment="java-17-openjdk-headless is &lt;17.0.13.0-150400.3.48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951764" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.13.0-150400.3.48.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951765" version="1" comment="java-17-openjdk-jmods is &lt;17.0.13.0-150400.3.48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951766" version="1" comment="java-17-openjdk-src is &lt;17.0.13.0-150400.3.48.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951843" version="1" comment="apache-commons-lang3 is &lt;3.16.0-150200.3.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951844" version="1" comment="apache-commons-lang3-javadoc is &lt;3.16.0-150200.3.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951845" version="1" comment="bcel is &lt;6.10.0-150200.11.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951846" version="1" comment="mojo-parent is &lt;82-150200.3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951847" version="1" comment="netty3 is &lt;3.10.6-150200.3.13.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951848" version="1" comment="netty3-javadoc is &lt;3.10.6-150200.3.13.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951849" version="1" comment="xalan-j2 is &lt;2.7.3-150200.11.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951850" version="1" comment="xalan-j2-demo is &lt;2.7.3-150200.11.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951851" version="1" comment="xalan-j2-manual is &lt;2.7.3-150200.11.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951852" version="1" comment="xalan-j2-xsltc is &lt;2.7.3-150200.11.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951853" version="1" comment="xerces-j2 is &lt;2.12.2-150200.3.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951854" version="1" comment="xerces-j2-demo is &lt;2.12.2-150200.3.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951855" version="1" comment="xerces-j2-javadoc is &lt;2.12.2-150200.3.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951977" version="1" comment="xen is &lt;4.17.5_06-150500.3.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951978" version="1" comment="xen-devel is &lt;4.17.5_06-150500.3.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951979" version="1" comment="xen-doc-html is &lt;4.17.5_06-150500.3.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951980" version="1" comment="xen-libs is &lt;4.17.5_06-150500.3.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951981" version="1" comment="xen-libs-32bit is &lt;4.17.5_06-150500.3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951982" version="1" comment="xen-tools is &lt;4.17.5_06-150500.3.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951983" version="1" comment="xen-tools-domU is &lt;4.17.5_06-150500.3.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951984" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.17.5_06-150500.3.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952003" version="1" comment="cluster-md-kmp-azure is &lt;5.14.21-150500.33.72.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952004" version="1" comment="dlm-kmp-azure is &lt;5.14.21-150500.33.72.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952005" version="1" comment="gfs2-kmp-azure is &lt;5.14.21-150500.33.72.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952006" version="1" comment="kernel-azure is &lt;5.14.21-150500.33.72.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952007" version="1" comment="kernel-azure-devel is &lt;5.14.21-150500.33.72.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952008" version="1" comment="kernel-azure-extra is &lt;5.14.21-150500.33.72.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952009" version="1" comment="kernel-azure-livepatch-devel is &lt;5.14.21-150500.33.72.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952010" version="1" comment="kernel-azure-optional is &lt;5.14.21-150500.33.72.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952011" version="1" comment="kernel-azure-vdso is &lt;5.14.21-150500.33.72.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952012" version="1" comment="kernel-devel-azure is &lt;5.14.21-150500.33.72.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952013" version="1" comment="kernel-source-azure is &lt;5.14.21-150500.33.72.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952014" version="1" comment="kernel-syms-azure is &lt;5.14.21-150500.33.72.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952015" version="1" comment="kselftests-kmp-azure is &lt;5.14.21-150500.33.72.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952016" version="1" comment="ocfs2-kmp-azure is &lt;5.14.21-150500.33.72.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952017" version="1" comment="reiserfs-kmp-azure is &lt;5.14.21-150500.33.72.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952018" version="1" comment="cluster-md-kmp-rt is &lt;5.14.21-150500.13.76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952019" version="1" comment="dlm-kmp-rt is &lt;5.14.21-150500.13.76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952020" version="1" comment="gfs2-kmp-rt is &lt;5.14.21-150500.13.76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952021" version="1" comment="kernel-devel-rt is &lt;5.14.21-150500.13.76.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952022" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952023" version="1" comment="kernel-rt-devel is &lt;5.14.21-150500.13.76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952024" version="1" comment="kernel-rt-extra is &lt;5.14.21-150500.13.76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952025" version="1" comment="kernel-rt-livepatch is &lt;5.14.21-150500.13.76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952026" version="1" comment="kernel-rt-livepatch-devel is &lt;5.14.21-150500.13.76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952027" version="1" comment="kernel-rt-optional is &lt;5.14.21-150500.13.76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952028" version="1" comment="kernel-rt-vdso is &lt;5.14.21-150500.13.76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952029" version="1" comment="kernel-rt_debug is &lt;5.14.21-150500.13.76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952030" version="1" comment="kernel-rt_debug-devel is &lt;5.14.21-150500.13.76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952031" version="1" comment="kernel-rt_debug-livepatch-devel is &lt;5.14.21-150500.13.76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952032" version="1" comment="kernel-rt_debug-vdso is &lt;5.14.21-150500.13.76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952033" version="1" comment="kernel-source-rt is &lt;5.14.21-150500.13.76.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952034" version="1" comment="kernel-syms-rt is &lt;5.14.21-150500.13.76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952035" version="1" comment="kselftests-kmp-rt is &lt;5.14.21-150500.13.76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952036" version="1" comment="ocfs2-kmp-rt is &lt;5.14.21-150500.13.76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952037" version="1" comment="reiserfs-kmp-rt is &lt;5.14.21-150500.13.76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952325" version="1" comment="python3-wxPython is &lt;4.1.1-150400.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952326" version="1" comment="python3-wxPython-lang is &lt;4.1.1-150400.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952327" version="1" comment="apache2 is &lt;2.4.51-150400.6.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952328" version="1" comment="apache2-devel is &lt;2.4.51-150400.6.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952329" version="1" comment="apache2-doc is &lt;2.4.51-150400.6.43.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952330" version="1" comment="apache2-event is &lt;2.4.51-150400.6.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952331" version="1" comment="apache2-example-pages is &lt;2.4.51-150400.6.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952332" version="1" comment="apache2-prefork is &lt;2.4.51-150400.6.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952333" version="1" comment="apache2-utils is &lt;2.4.51-150400.6.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009952334" version="1" comment="apache2-worker is &lt;2.4.51-150400.6.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818055" version="1" comment="WebKitGTK-4.0-lang is &lt;2.42.4-150400.4.70.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818056" version="1" comment="WebKitGTK-4.1-lang is &lt;2.42.4-150400.4.70.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818057" version="1" comment="WebKitGTK-6.0-lang is &lt;2.42.4-150400.4.70.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818058" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818059" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.42.4-150400.4.70.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818060" version="1" comment="libjavascriptcoregtk-4_1-0 is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818061" version="1" comment="libjavascriptcoregtk-4_1-0-32bit is &lt;2.42.4-150400.4.70.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818062" version="1" comment="libjavascriptcoregtk-6_0-1 is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818063" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818064" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.42.4-150400.4.70.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818065" version="1" comment="libwebkit2gtk-4_1-0 is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818066" version="1" comment="libwebkit2gtk-4_1-0-32bit is &lt;2.42.4-150400.4.70.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818067" version="1" comment="libwebkitgtk-6_0-4 is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818068" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818069" version="1" comment="typelib-1_0-JavaScriptCore-4_1 is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818070" version="1" comment="typelib-1_0-JavaScriptCore-6_0 is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818071" version="1" comment="typelib-1_0-WebKit-6_0 is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818072" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818073" version="1" comment="typelib-1_0-WebKit2-4_1 is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818074" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818075" version="1" comment="typelib-1_0-WebKit2WebExtension-4_1 is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818076" version="1" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818077" version="1" comment="webkit-jsc-4 is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818078" version="1" comment="webkit-jsc-4.1 is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818079" version="1" comment="webkit-jsc-6.0 is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818080" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818081" version="1" comment="webkit2gtk-4_1-injected-bundles is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818082" version="1" comment="webkit2gtk3-devel is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818083" version="1" comment="webkit2gtk3-minibrowser is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818084" version="1" comment="webkit2gtk3-soup2-devel is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818085" version="1" comment="webkit2gtk3-soup2-minibrowser is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818086" version="1" comment="webkit2gtk4-devel is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818087" version="1" comment="webkit2gtk4-minibrowser is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818088" version="1" comment="webkitgtk-6_0-injected-bundles is &lt;2.42.4-150400.4.70.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953317" version="1" comment="golang-github-lusitaniae-apache_exporter is &lt;1.0.8-150000.1.23.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953318" version="1" comment="golang-github-prometheus-promu is &lt;0.16.0-150000.3.21.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953319" version="1" comment="spacecmd is &lt;5.0.10-150000.3.127.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953320" version="1" comment="wire is &lt;0.6.0-150000.1.17.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953321" version="1" comment="expat is &lt;2.4.4-150400.3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953322" version="1" comment="libexpat-devel is &lt;2.4.4-150400.3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953323" version="1" comment="libexpat-devel-32bit is &lt;2.4.4-150400.3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953324" version="1" comment="libexpat1 is &lt;2.4.4-150400.3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953325" version="1" comment="libexpat1-32bit is &lt;2.4.4-150400.3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953326" version="1" comment="httpcomponents-client is &lt;4.5.14-150200.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953327" version="1" comment="httpcomponents-client-cache is &lt;4.5.14-150200.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953328" version="1" comment="httpcomponents-client-javadoc is &lt;4.5.14-150200.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953329" version="1" comment="httpcomponents-core is &lt;4.4.14-150200.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953330" version="1" comment="httpcomponents-core-javadoc is &lt;4.4.14-150200.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953452" version="1" comment="bea-stax is &lt;1.2.0-150200.11.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953453" version="1" comment="bea-stax-api is &lt;1.2.0-150200.11.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953454" version="1" comment="xstream is &lt;1.4.21-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953455" version="1" comment="xstream-benchmark is &lt;1.4.21-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953456" version="1" comment="xstream-javadoc is &lt;1.4.21-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953457" version="1" comment="xstream-parent is &lt;1.4.21-150200.3.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954022" version="1" comment="govulncheck-vulndb is &lt;0.0.20241112T145010-150000.1.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954749" version="1" comment="MozillaThunderbird is &lt;128.4.3-150200.8.188.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954750" version="1" comment="MozillaThunderbird-translations-common is &lt;128.4.3-150200.8.188.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954751" version="1" comment="MozillaThunderbird-translations-other is &lt;128.4.3-150200.8.188.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954845" version="1" comment="ucode-intel is &lt;20241112-150200.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954846" version="1" comment="javapackages-filesystem is &lt;6.3.4-150200.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954847" version="1" comment="javapackages-gradle is &lt;6.3.4-150200.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954848" version="1" comment="javapackages-ivy is &lt;6.3.4-150200.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954849" version="1" comment="javapackages-local is &lt;6.3.4-150200.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954850" version="1" comment="javapackages-tools is &lt;6.3.4-150200.3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954851" version="1" comment="python3-javapackages is &lt;6.3.4-150200.3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954852" version="1" comment="xmlgraphics-batik is &lt;1.18-150200.4.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954853" version="1" comment="xmlgraphics-batik-css is &lt;1.18-150200.4.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954854" version="1" comment="xmlgraphics-batik-demo is &lt;1.18-150200.4.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954855" version="1" comment="xmlgraphics-batik-javadoc is &lt;1.18-150200.4.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954856" version="1" comment="xmlgraphics-batik-rasterizer is &lt;1.18-150200.4.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954857" version="1" comment="xmlgraphics-batik-slideshow is &lt;1.18-150200.4.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954858" version="1" comment="xmlgraphics-batik-squiggle is &lt;1.18-150200.4.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954859" version="1" comment="xmlgraphics-batik-svgpp is &lt;1.18-150200.4.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954860" version="1" comment="xmlgraphics-batik-ttf2svg is &lt;1.18-150200.4.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954861" version="1" comment="xmlgraphics-commons is &lt;2.10-150200.3.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954862" version="1" comment="xmlgraphics-commons-javadoc is &lt;2.10-150200.3.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954863" version="1" comment="xmlgraphics-fop is &lt;2.10-150200.13.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955049" version="1" comment="hplip is &lt;3.21.10-150400.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955050" version="1" comment="hplip-devel is &lt;3.21.10-150400.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955051" version="1" comment="hplip-hpijs is &lt;3.21.10-150400.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955052" version="1" comment="hplip-sane is &lt;3.21.10-150400.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955053" version="1" comment="hplip-scan-utils is &lt;3.21.10-150400.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955054" version="1" comment="python311-aiohttp is &lt;3.9.3-150400.10.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955055" version="1" comment="gio-branding-upstream is &lt;2.70.5-150400.3.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955056" version="1" comment="glib2-devel is &lt;2.70.5-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955057" version="1" comment="glib2-devel-32bit is &lt;2.70.5-150400.3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955058" version="1" comment="glib2-devel-static is &lt;2.70.5-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955059" version="1" comment="glib2-doc is &lt;2.70.5-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955060" version="1" comment="glib2-lang is &lt;2.70.5-150400.3.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955061" version="1" comment="glib2-tests-devel is &lt;2.70.5-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955062" version="1" comment="glib2-tools is &lt;2.70.5-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955063" version="1" comment="glib2-tools-32bit is &lt;2.70.5-150400.3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955064" version="1" comment="libgio-2_0-0 is &lt;2.70.5-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955065" version="1" comment="libgio-2_0-0-32bit is &lt;2.70.5-150400.3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955066" version="1" comment="libglib-2_0-0 is &lt;2.70.5-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955067" version="1" comment="libglib-2_0-0-32bit is &lt;2.70.5-150400.3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955068" version="1" comment="libgmodule-2_0-0 is &lt;2.70.5-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955069" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.70.5-150400.3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955070" version="1" comment="libgobject-2_0-0 is &lt;2.70.5-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955071" version="1" comment="libgobject-2_0-0-32bit is &lt;2.70.5-150400.3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955072" version="1" comment="libgthread-2_0-0 is &lt;2.70.5-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955073" version="1" comment="libgthread-2_0-0-32bit is &lt;2.70.5-150400.3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955250" version="1" comment="MozillaFirefox is &lt;128.5.0-150200.152.161.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955251" version="1" comment="MozillaFirefox-branding-upstream is &lt;128.5.0-150200.152.161.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955252" version="1" comment="MozillaFirefox-devel is &lt;128.5.0-150200.152.161.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955253" version="1" comment="MozillaFirefox-translations-common is &lt;128.5.0-150200.152.161.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955254" version="1" comment="MozillaFirefox-translations-other is &lt;128.5.0-150200.152.161.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955255" version="1" comment="ovmf is &lt;202208-150500.6.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955256" version="1" comment="ovmf-tools is &lt;202208-150500.6.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955257" version="1" comment="qemu-ovmf-ia32 is &lt;202208-150500.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955258" version="1" comment="qemu-ovmf-x86_64 is &lt;202208-150500.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955259" version="1" comment="qemu-ovmf-x86_64-debug is &lt;202208-150500.6.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955260" version="1" comment="qemu-uefi-aarch32 is &lt;202208-150500.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955261" version="1" comment="qemu-uefi-aarch64 is &lt;202208-150500.6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955262" version="1" comment="frr is &lt;8.5.6-150500.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955263" version="1" comment="frr-devel is &lt;8.5.6-150500.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955264" version="1" comment="libfrr0 is &lt;8.5.6-150500.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955265" version="1" comment="libfrr_pb0 is &lt;8.5.6-150500.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955266" version="1" comment="libfrrcares0 is &lt;8.5.6-150500.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955267" version="1" comment="libfrrfpm_pb0 is &lt;8.5.6-150500.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955268" version="1" comment="libfrrospfapiclient0 is &lt;8.5.6-150500.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955269" version="1" comment="libfrrsnmp0 is &lt;8.5.6-150500.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955270" version="1" comment="libfrrzmq0 is &lt;8.5.6-150500.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955271" version="1" comment="libmlag_pb0 is &lt;8.5.6-150500.4.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955272" version="1" comment="python311-virtualenv is &lt;20.22.0-150400.9.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955273" version="1" comment="postgresql12 is &lt;12.22-150200.8.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955274" version="1" comment="postgresql12-contrib is &lt;12.22-150200.8.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955275" version="1" comment="postgresql12-devel is &lt;12.22-150200.8.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955276" version="1" comment="postgresql12-docs is &lt;12.22-150200.8.66.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955277" version="1" comment="postgresql12-llvmjit is &lt;12.22-150200.8.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955278" version="1" comment="postgresql12-llvmjit-devel is &lt;12.22-150200.8.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955279" version="1" comment="postgresql12-plperl is &lt;12.22-150200.8.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955280" version="1" comment="postgresql12-plpython is &lt;12.22-150200.8.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955281" version="1" comment="postgresql12-pltcl is &lt;12.22-150200.8.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955282" version="1" comment="postgresql12-server is &lt;12.22-150200.8.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955283" version="1" comment="postgresql12-server-devel is &lt;12.22-150200.8.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955284" version="1" comment="postgresql12-test is &lt;12.22-150200.8.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955285" version="1" comment="tomcat10 is &lt;10.1.33-150200.5.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955286" version="1" comment="tomcat10-admin-webapps is &lt;10.1.33-150200.5.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955287" version="1" comment="tomcat10-docs-webapp is &lt;10.1.33-150200.5.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955288" version="1" comment="tomcat10-el-5_0-api is &lt;10.1.33-150200.5.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955289" version="1" comment="tomcat10-embed is &lt;10.1.33-150200.5.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955290" version="1" comment="tomcat10-jsp-3_1-api is &lt;10.1.33-150200.5.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955291" version="1" comment="tomcat10-jsvc is &lt;10.1.33-150200.5.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955292" version="1" comment="tomcat10-lib is &lt;10.1.33-150200.5.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955293" version="1" comment="tomcat10-servlet-6_0-api is &lt;10.1.33-150200.5.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955294" version="1" comment="tomcat10-webapps is &lt;10.1.33-150200.5.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955295" version="1" comment="tomcat is &lt;9.0.97-150200.71.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955296" version="1" comment="tomcat-admin-webapps is &lt;9.0.97-150200.71.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955297" version="1" comment="tomcat-docs-webapp is &lt;9.0.97-150200.71.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955298" version="1" comment="tomcat-el-3_0-api is &lt;9.0.97-150200.71.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955299" version="1" comment="tomcat-embed is &lt;9.0.97-150200.71.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955300" version="1" comment="tomcat-javadoc is &lt;9.0.97-150200.71.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955301" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.97-150200.71.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955302" version="1" comment="tomcat-jsvc is &lt;9.0.97-150200.71.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955303" version="1" comment="tomcat-lib is &lt;9.0.97-150200.71.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955304" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.97-150200.71.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955305" version="1" comment="tomcat-webapps is &lt;9.0.97-150200.71.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955306" version="1" comment="python3-waitress is &lt;1.4.3-150000.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955307" version="1" comment="libuv-devel is &lt;1.44.2-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955308" version="1" comment="libuv1 is &lt;1.44.2-150500.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955309" version="1" comment="libuv1-32bit is &lt;1.44.2-150500.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955527" version="1" comment="python-aiohttp-doc is &lt;3.6.0-150100.3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955528" version="1" comment="python3-aiohttp is &lt;3.6.0-150100.3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955529" version="1" comment="WebKitGTK-4.0-lang is &lt;2.46.3-150400.4.97.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955530" version="1" comment="WebKitGTK-4.1-lang is &lt;2.46.3-150400.4.97.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955531" version="1" comment="WebKitGTK-6.0-lang is &lt;2.46.3-150400.4.97.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955532" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955533" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.46.3-150400.4.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955534" version="1" comment="libjavascriptcoregtk-4_1-0 is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955535" version="1" comment="libjavascriptcoregtk-4_1-0-32bit is &lt;2.46.3-150400.4.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955536" version="1" comment="libjavascriptcoregtk-6_0-1 is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955537" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955538" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.46.3-150400.4.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955539" version="1" comment="libwebkit2gtk-4_1-0 is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955540" version="1" comment="libwebkit2gtk-4_1-0-32bit is &lt;2.46.3-150400.4.97.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955541" version="1" comment="libwebkitgtk-6_0-4 is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955542" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955543" version="1" comment="typelib-1_0-JavaScriptCore-4_1 is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955544" version="1" comment="typelib-1_0-JavaScriptCore-6_0 is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955545" version="1" comment="typelib-1_0-WebKit-6_0 is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955546" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955547" version="1" comment="typelib-1_0-WebKit2-4_1 is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955548" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955549" version="1" comment="typelib-1_0-WebKit2WebExtension-4_1 is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955550" version="1" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955551" version="1" comment="webkit-jsc-4 is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955552" version="1" comment="webkit-jsc-4.1 is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955553" version="1" comment="webkit-jsc-6.0 is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955554" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955555" version="1" comment="webkit2gtk-4_1-injected-bundles is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955556" version="1" comment="webkit2gtk3-devel is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955557" version="1" comment="webkit2gtk3-minibrowser is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955558" version="1" comment="webkit2gtk3-soup2-devel is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955559" version="1" comment="webkit2gtk3-soup2-minibrowser is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955560" version="1" comment="webkit2gtk4-devel is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955561" version="1" comment="webkit2gtk4-minibrowser is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955562" version="1" comment="webkitgtk-6_0-injected-bundles is &lt;2.46.3-150400.4.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955692" version="1" comment="libpython3_9-1_0 is &lt;3.9.20-150300.4.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955693" version="1" comment="libpython3_9-1_0-32bit is &lt;3.9.20-150300.4.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955694" version="1" comment="python39 is &lt;3.9.20-150300.4.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955695" version="1" comment="python39-32bit is &lt;3.9.20-150300.4.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955696" version="1" comment="python39-base is &lt;3.9.20-150300.4.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955697" version="1" comment="python39-base-32bit is &lt;3.9.20-150300.4.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955698" version="1" comment="python39-curses is &lt;3.9.20-150300.4.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955699" version="1" comment="python39-dbm is &lt;3.9.20-150300.4.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955700" version="1" comment="python39-devel is &lt;3.9.20-150300.4.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955701" version="1" comment="python39-doc is &lt;3.9.20-150300.4.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955702" version="1" comment="python39-doc-devhelp is &lt;3.9.20-150300.4.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955703" version="1" comment="python39-idle is &lt;3.9.20-150300.4.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955704" version="1" comment="python39-testsuite is &lt;3.9.20-150300.4.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955705" version="1" comment="python39-tk is &lt;3.9.20-150300.4.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955706" version="1" comment="python39-tools is &lt;3.9.20-150300.4.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955707" version="1" comment="python311-tornado6 is &lt;6.3.2-150400.9.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955708" version="1" comment="wget is &lt;1.20.3-150000.3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955709" version="1" comment="wget-lang is &lt;1.20.3-150000.3.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955895" version="1" comment="apache2-mod_php7 is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955896" version="1" comment="php7 is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955897" version="1" comment="php7-bcmath is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955898" version="1" comment="php7-bz2 is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955899" version="1" comment="php7-calendar is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955900" version="1" comment="php7-cli is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955901" version="1" comment="php7-ctype is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955902" version="1" comment="php7-curl is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955903" version="1" comment="php7-dba is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955904" version="1" comment="php7-devel is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955905" version="1" comment="php7-dom is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955906" version="1" comment="php7-embed is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955907" version="1" comment="php7-enchant is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955908" version="1" comment="php7-exif is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955909" version="1" comment="php7-fastcgi is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955910" version="1" comment="php7-fileinfo is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955911" version="1" comment="php7-fpm is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955912" version="1" comment="php7-ftp is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955913" version="1" comment="php7-gd is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955914" version="1" comment="php7-gettext is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955915" version="1" comment="php7-gmp is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955916" version="1" comment="php7-iconv is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955917" version="1" comment="php7-intl is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955918" version="1" comment="php7-json is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955919" version="1" comment="php7-ldap is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955920" version="1" comment="php7-mbstring is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955921" version="1" comment="php7-mysql is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955922" version="1" comment="php7-odbc is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955923" version="1" comment="php7-opcache is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955924" version="1" comment="php7-openssl is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955925" version="1" comment="php7-pcntl is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955926" version="1" comment="php7-pdo is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955927" version="1" comment="php7-pgsql is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955928" version="1" comment="php7-phar is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955929" version="1" comment="php7-posix is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955930" version="1" comment="php7-readline is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955931" version="1" comment="php7-shmop is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955932" version="1" comment="php7-snmp is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955933" version="1" comment="php7-soap is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955934" version="1" comment="php7-sockets is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955935" version="1" comment="php7-sodium is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955936" version="1" comment="php7-sqlite is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955937" version="1" comment="php7-sysvmsg is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955938" version="1" comment="php7-sysvsem is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955939" version="1" comment="php7-sysvshm is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955940" version="1" comment="php7-test is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955941" version="1" comment="php7-tidy is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955942" version="1" comment="php7-tokenizer is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955943" version="1" comment="php7-xmlreader is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955944" version="1" comment="php7-xmlrpc is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955945" version="1" comment="php7-xmlwriter is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955946" version="1" comment="php7-xsl is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955947" version="1" comment="php7-zip is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955948" version="1" comment="php7-zlib is &lt;7.4.33-150400.4.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955949" version="1" comment="MozillaThunderbird is &lt;128.5.0-150200.8.191.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955950" version="1" comment="MozillaThunderbird-translations-common is &lt;128.5.0-150200.8.191.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955951" version="1" comment="MozillaThunderbird-translations-other is &lt;128.5.0-150200.8.191.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955952" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-150000.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955953" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.18-150000.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955954" version="1" comment="python is &lt;2.7.18-150000.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955955" version="1" comment="python-32bit is &lt;2.7.18-150000.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955956" version="1" comment="python-base is &lt;2.7.18-150000.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955957" version="1" comment="python-base-32bit is &lt;2.7.18-150000.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955958" version="1" comment="python-curses is &lt;2.7.18-150000.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955959" version="1" comment="python-demo is &lt;2.7.18-150000.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955960" version="1" comment="python-devel is &lt;2.7.18-150000.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955961" version="1" comment="python-doc is &lt;2.7.18-150000.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955962" version="1" comment="python-doc-pdf is &lt;2.7.18-150000.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955963" version="1" comment="python-gdbm is &lt;2.7.18-150000.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955964" version="1" comment="python-idle is &lt;2.7.18-150000.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955965" version="1" comment="python-tk is &lt;2.7.18-150000.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955966" version="1" comment="python-xml is &lt;2.7.18-150000.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955967" version="1" comment="libpython3_10-1_0 is &lt;3.10.15-150400.4.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955968" version="1" comment="libpython3_10-1_0-32bit is &lt;3.10.15-150400.4.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955969" version="1" comment="python310 is &lt;3.10.15-150400.4.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955970" version="1" comment="python310-32bit is &lt;3.10.15-150400.4.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955971" version="1" comment="python310-base is &lt;3.10.15-150400.4.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955972" version="1" comment="python310-base-32bit is &lt;3.10.15-150400.4.63.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955973" version="1" comment="python310-curses is &lt;3.10.15-150400.4.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955974" version="1" comment="python310-dbm is &lt;3.10.15-150400.4.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955975" version="1" comment="python310-devel is &lt;3.10.15-150400.4.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955976" version="1" comment="python310-doc is &lt;3.10.15-150400.4.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955977" version="1" comment="python310-doc-devhelp is &lt;3.10.15-150400.4.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955978" version="1" comment="python310-idle is &lt;3.10.15-150400.4.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955979" version="1" comment="python310-testsuite is &lt;3.10.15-150400.4.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955980" version="1" comment="python310-tk is &lt;3.10.15-150400.4.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955981" version="1" comment="python310-tools is &lt;3.10.15-150400.4.63.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956225" version="1" comment="libecpg6 is &lt;17.2-150200.5.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956226" version="1" comment="libecpg6-32bit is &lt;17.2-150200.5.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956227" version="1" comment="libpq5 is &lt;17.2-150200.5.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956228" version="1" comment="libpq5-32bit is &lt;17.2-150200.5.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956229" version="1" comment="postgresql is &lt;17-150500.10.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956230" version="1" comment="postgresql-contrib is &lt;17-150500.10.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956231" version="1" comment="postgresql-devel is &lt;17-150500.10.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956232" version="1" comment="postgresql-docs is &lt;17-150500.10.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956233" version="1" comment="postgresql-llvmjit is &lt;17-150500.10.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956234" version="1" comment="postgresql-llvmjit-devel is &lt;17-150500.10.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956235" version="1" comment="postgresql-plperl is &lt;17-150500.10.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956236" version="1" comment="postgresql-plpython is &lt;17-150500.10.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956237" version="1" comment="postgresql-pltcl is &lt;17-150500.10.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956238" version="1" comment="postgresql-server is &lt;17-150500.10.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956239" version="1" comment="postgresql-server-devel is &lt;17-150500.10.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956240" version="1" comment="postgresql-test is &lt;17-150500.10.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956241" version="1" comment="postgresql16 is &lt;16.6-150200.5.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956242" version="1" comment="postgresql16-contrib is &lt;16.6-150200.5.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956243" version="1" comment="postgresql16-devel is &lt;16.6-150200.5.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956244" version="1" comment="postgresql16-docs is &lt;16.6-150200.5.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956245" version="1" comment="postgresql16-llvmjit is &lt;16.6-150200.5.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956246" version="1" comment="postgresql16-llvmjit-devel is &lt;16.6-150200.5.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956247" version="1" comment="postgresql16-plperl is &lt;16.6-150200.5.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956248" version="1" comment="postgresql16-plpython is &lt;16.6-150200.5.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956249" version="1" comment="postgresql16-pltcl is &lt;16.6-150200.5.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956250" version="1" comment="postgresql16-server is &lt;16.6-150200.5.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956251" version="1" comment="postgresql16-server-devel is &lt;16.6-150200.5.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956252" version="1" comment="postgresql16-test is &lt;16.6-150200.5.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956253" version="1" comment="postgresql17 is &lt;17.2-150200.5.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956254" version="1" comment="postgresql17-contrib is &lt;17.2-150200.5.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956255" version="1" comment="postgresql17-devel is &lt;17.2-150200.5.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956256" version="1" comment="postgresql17-docs is &lt;17.2-150200.5.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956257" version="1" comment="postgresql17-llvmjit is &lt;17.2-150200.5.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956258" version="1" comment="postgresql17-llvmjit-devel is &lt;17.2-150200.5.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956259" version="1" comment="postgresql17-plperl is &lt;17.2-150200.5.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956260" version="1" comment="postgresql17-plpython is &lt;17.2-150200.5.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956261" version="1" comment="postgresql17-pltcl is &lt;17.2-150200.5.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956262" version="1" comment="postgresql17-server is &lt;17.2-150200.5.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956263" version="1" comment="postgresql17-server-devel is &lt;17.2-150200.5.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956264" version="1" comment="postgresql17-test is &lt;17.2-150200.5.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956265" version="1" comment="postgresql15 is &lt;15.10-150200.5.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956266" version="1" comment="postgresql15-contrib is &lt;15.10-150200.5.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956267" version="1" comment="postgresql15-devel is &lt;15.10-150200.5.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956268" version="1" comment="postgresql15-docs is &lt;15.10-150200.5.33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956269" version="1" comment="postgresql15-llvmjit is &lt;15.10-150200.5.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956270" version="1" comment="postgresql15-llvmjit-devel is &lt;15.10-150200.5.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956271" version="1" comment="postgresql15-plperl is &lt;15.10-150200.5.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956272" version="1" comment="postgresql15-plpython is &lt;15.10-150200.5.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956273" version="1" comment="postgresql15-pltcl is &lt;15.10-150200.5.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956274" version="1" comment="postgresql15-server is &lt;15.10-150200.5.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956275" version="1" comment="postgresql15-server-devel is &lt;15.10-150200.5.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956276" version="1" comment="postgresql15-test is &lt;15.10-150200.5.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956277" version="1" comment="postgresql13 is &lt;13.18-150200.5.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956278" version="1" comment="postgresql13-contrib is &lt;13.18-150200.5.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956279" version="1" comment="postgresql13-devel is &lt;13.18-150200.5.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956280" version="1" comment="postgresql13-docs is &lt;13.18-150200.5.64.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956281" version="1" comment="postgresql13-llvmjit is &lt;13.18-150200.5.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956282" version="1" comment="postgresql13-llvmjit-devel is &lt;13.18-150200.5.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956283" version="1" comment="postgresql13-plperl is &lt;13.18-150200.5.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956284" version="1" comment="postgresql13-plpython is &lt;13.18-150200.5.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956285" version="1" comment="postgresql13-pltcl is &lt;13.18-150200.5.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956286" version="1" comment="postgresql13-server is &lt;13.18-150200.5.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956287" version="1" comment="postgresql13-server-devel is &lt;13.18-150200.5.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956288" version="1" comment="postgresql13-test is &lt;13.18-150200.5.64.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956289" version="1" comment="postgresql14 is &lt;14.15-150200.5.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956290" version="1" comment="postgresql14-contrib is &lt;14.15-150200.5.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956291" version="1" comment="postgresql14-devel is &lt;14.15-150200.5.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956292" version="1" comment="postgresql14-docs is &lt;14.15-150200.5.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956293" version="1" comment="postgresql14-llvmjit is &lt;14.15-150200.5.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956294" version="1" comment="postgresql14-llvmjit-devel is &lt;14.15-150200.5.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956295" version="1" comment="postgresql14-plperl is &lt;14.15-150200.5.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956296" version="1" comment="postgresql14-plpython is &lt;14.15-150200.5.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956297" version="1" comment="postgresql14-pltcl is &lt;14.15-150200.5.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956298" version="1" comment="postgresql14-server is &lt;14.15-150200.5.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956299" version="1" comment="postgresql14-server-devel is &lt;14.15-150200.5.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956300" version="1" comment="postgresql14-test is &lt;14.15-150200.5.50.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956569" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956570" version="1" comment="libpython3_6m1_0-32bit is &lt;3.6.15-150300.10.78.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956571" version="1" comment="python3 is &lt;3.6.15-150300.10.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956572" version="1" comment="python3-base is &lt;3.6.15-150300.10.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956573" version="1" comment="python3-curses is &lt;3.6.15-150300.10.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956574" version="1" comment="python3-dbm is &lt;3.6.15-150300.10.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956575" version="1" comment="python3-devel is &lt;3.6.15-150300.10.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956576" version="1" comment="python3-doc is &lt;3.6.15-150300.10.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956577" version="1" comment="python3-doc-devhelp is &lt;3.6.15-150300.10.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956578" version="1" comment="python3-idle is &lt;3.6.15-150300.10.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956579" version="1" comment="python3-testsuite is &lt;3.6.15-150300.10.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956580" version="1" comment="python3-tk is &lt;3.6.15-150300.10.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956581" version="1" comment="python3-tools is &lt;3.6.15-150300.10.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956582" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.432-150000.3.100.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956583" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.432-150000.3.100.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956584" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.432-150000.3.100.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956585" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.432-150000.3.100.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956586" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.432-150000.3.100.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956587" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.432-150000.3.100.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956588" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.432-150000.3.100.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956589" version="1" comment="docker-stable is &lt;24.0.9_ce-150000.1.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956590" version="1" comment="docker-stable-bash-completion is &lt;24.0.9_ce-150000.1.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956591" version="1" comment="docker-stable-fish-completion is &lt;24.0.9_ce-150000.1.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956592" version="1" comment="docker-stable-rootless-extras is &lt;24.0.9_ce-150000.1.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956593" version="1" comment="docker-stable-zsh-completion is &lt;24.0.9_ce-150000.1.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956594" version="1" comment="obs-scm-bridge is &lt;0.5.4-150100.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956595" version="1" comment="helm is &lt;3.16.3-150000.1.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956596" version="1" comment="helm-bash-completion is &lt;3.16.3-150000.1.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956597" version="1" comment="helm-fish-completion is &lt;3.16.3-150000.1.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956598" version="1" comment="helm-zsh-completion is &lt;3.16.3-150000.1.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956599" version="1" comment="apache2-mod_php8 is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956600" version="1" comment="php8 is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956601" version="1" comment="php8-bcmath is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956602" version="1" comment="php8-bz2 is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956603" version="1" comment="php8-calendar is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956604" version="1" comment="php8-cli is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956605" version="1" comment="php8-ctype is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956606" version="1" comment="php8-curl is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956607" version="1" comment="php8-dba is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956608" version="1" comment="php8-devel is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956609" version="1" comment="php8-dom is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956610" version="1" comment="php8-embed is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956611" version="1" comment="php8-enchant is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956612" version="1" comment="php8-exif is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956613" version="1" comment="php8-fastcgi is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956614" version="1" comment="php8-fileinfo is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956615" version="1" comment="php8-fpm is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956616" version="1" comment="php8-ftp is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956617" version="1" comment="php8-gd is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956618" version="1" comment="php8-gettext is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956619" version="1" comment="php8-gmp is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956620" version="1" comment="php8-iconv is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956621" version="1" comment="php8-intl is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956622" version="1" comment="php8-ldap is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956623" version="1" comment="php8-mbstring is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956624" version="1" comment="php8-mysql is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956625" version="1" comment="php8-odbc is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956626" version="1" comment="php8-opcache is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956627" version="1" comment="php8-openssl is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956628" version="1" comment="php8-pcntl is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956629" version="1" comment="php8-pdo is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956630" version="1" comment="php8-pgsql is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956631" version="1" comment="php8-phar is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956632" version="1" comment="php8-posix is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956633" version="1" comment="php8-readline is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956634" version="1" comment="php8-shmop is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956635" version="1" comment="php8-snmp is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956636" version="1" comment="php8-soap is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956637" version="1" comment="php8-sockets is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956638" version="1" comment="php8-sodium is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956639" version="1" comment="php8-sqlite is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956640" version="1" comment="php8-sysvmsg is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956641" version="1" comment="php8-sysvsem is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956642" version="1" comment="php8-sysvshm is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956643" version="1" comment="php8-test is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956644" version="1" comment="php8-tidy is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956645" version="1" comment="php8-tokenizer is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956646" version="1" comment="php8-xmlreader is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956647" version="1" comment="php8-xmlwriter is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956648" version="1" comment="php8-xsl is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956649" version="1" comment="php8-zip is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956650" version="1" comment="php8-zlib is &lt;8.0.30-150400.4.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846013" version="1" comment="avif-tools is &lt;0.9.3-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846014" version="1" comment="gdk-pixbuf-loader-libavif is &lt;0.9.3-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846015" version="1" comment="libavif-devel is &lt;0.9.3-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846016" version="1" comment="libavif13 is &lt;0.9.3-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846017" version="1" comment="libavif13-32bit is &lt;0.9.3-150400.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957540" version="1" comment="govulncheck-vulndb is &lt;0.0.20241209T183251-150000.1.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846018" version="1" comment="cosign is &lt;2.2.3-150400.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957541" version="1" comment="corepack20 is &lt;20.18.1-150500.11.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957542" version="1" comment="nodejs20 is &lt;20.18.1-150500.11.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957543" version="1" comment="nodejs20-devel is &lt;20.18.1-150500.11.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957544" version="1" comment="nodejs20-docs is &lt;20.18.1-150500.11.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957545" version="1" comment="npm20 is &lt;20.18.1-150500.11.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957546" version="1" comment="corepack18 is &lt;18.20.5-150400.9.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957547" version="1" comment="nodejs18 is &lt;18.20.5-150400.9.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957548" version="1" comment="nodejs18-devel is &lt;18.20.5-150400.9.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957549" version="1" comment="nodejs18-docs is &lt;18.20.5-150400.9.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957550" version="1" comment="npm18 is &lt;18.20.5-150400.9.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957551" version="1" comment="socat is &lt;1.8.0.0-150400.14.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957552" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr8.35-150000.3.95.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957553" version="1" comment="java-1_8_0-ibm-32bit is &lt;1.8.0_sr8.35-150000.3.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957554" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr8.35-150000.3.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957555" version="1" comment="java-1_8_0-ibm-demo is &lt;1.8.0_sr8.35-150000.3.95.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957556" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr8.35-150000.3.95.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957557" version="1" comment="java-1_8_0-ibm-devel-32bit is &lt;1.8.0_sr8.35-150000.3.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957558" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr8.35-150000.3.95.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957559" version="1" comment="java-1_8_0-ibm-src is &lt;1.8.0_sr8.35-150000.3.95.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957796" version="1" comment="cluster-md-kmp-rt is &lt;5.14.21-150500.13.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957797" version="1" comment="dlm-kmp-rt is &lt;5.14.21-150500.13.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957798" version="1" comment="gfs2-kmp-rt is &lt;5.14.21-150500.13.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957799" version="1" comment="kernel-devel-rt is &lt;5.14.21-150500.13.79.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957800" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957801" version="1" comment="kernel-rt-devel is &lt;5.14.21-150500.13.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957802" version="1" comment="kernel-rt-extra is &lt;5.14.21-150500.13.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957803" version="1" comment="kernel-rt-livepatch is &lt;5.14.21-150500.13.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957804" version="1" comment="kernel-rt-livepatch-devel is &lt;5.14.21-150500.13.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957805" version="1" comment="kernel-rt-optional is &lt;5.14.21-150500.13.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957806" version="1" comment="kernel-rt-vdso is &lt;5.14.21-150500.13.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957807" version="1" comment="kernel-rt_debug is &lt;5.14.21-150500.13.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957808" version="1" comment="kernel-rt_debug-devel is &lt;5.14.21-150500.13.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957809" version="1" comment="kernel-rt_debug-vdso is &lt;5.14.21-150500.13.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957810" version="1" comment="kernel-source-rt is &lt;5.14.21-150500.13.79.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957811" version="1" comment="kernel-syms-rt is &lt;5.14.21-150500.13.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957812" version="1" comment="kselftests-kmp-rt is &lt;5.14.21-150500.13.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957813" version="1" comment="ocfs2-kmp-rt is &lt;5.14.21-150500.13.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957814" version="1" comment="reiserfs-kmp-rt is &lt;5.14.21-150500.13.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958161" version="1" comment="MozillaFirefox is &lt;128.5.1-150200.152.164.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958162" version="1" comment="MozillaFirefox-branding-upstream is &lt;128.5.1-150200.152.164.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958163" version="1" comment="MozillaFirefox-devel is &lt;128.5.1-150200.152.164.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958164" version="1" comment="MozillaFirefox-translations-common is &lt;128.5.1-150200.152.164.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958165" version="1" comment="MozillaFirefox-translations-other is &lt;128.5.1-150200.152.164.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958166" version="1" comment="MozillaThunderbird is &lt;128.5.2-150200.8.194.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958167" version="1" comment="MozillaThunderbird-translations-common is &lt;128.5.2-150200.8.194.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958168" version="1" comment="MozillaThunderbird-translations-other is &lt;128.5.2-150200.8.194.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958169" version="1" comment="python311-aiohttp is &lt;3.9.3-150400.10.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958170" version="1" comment="python-aiohttp-doc is &lt;3.6.0-150100.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958171" version="1" comment="python3-aiohttp is &lt;3.6.0-150100.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958172" version="1" comment="aws-iam-authenticator is &lt;0.5.3-150000.1.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958173" version="1" comment="gvim is &lt;9.1.0836-150500.20.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958174" version="1" comment="vim is &lt;9.1.0836-150500.20.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958175" version="1" comment="vim-data is &lt;9.1.0836-150500.20.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958176" version="1" comment="vim-data-common is &lt;9.1.0836-150500.20.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958177" version="1" comment="vim-small is &lt;9.1.0836-150500.20.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958178" version="1" comment="aom-tools is &lt;3.7.1-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958179" version="1" comment="libaom-devel is &lt;3.7.1-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958180" version="1" comment="libaom-devel-doc is &lt;3.7.1-150400.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958181" version="1" comment="libaom3 is &lt;3.7.1-150400.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958182" version="1" comment="libaom3-32bit is &lt;3.7.1-150400.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958183" version="1" comment="libyuv-devel is &lt;20230517+a377993-150400.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958184" version="1" comment="libyuv-tools is &lt;20230517+a377993-150400.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958185" version="1" comment="libyuv0 is &lt;20230517+a377993-150400.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958186" version="1" comment="libyuv0-32bit is &lt;20230517+a377993-150400.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958280" version="1" comment="libsoup-2_4-1 is &lt;2.74.2-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958281" version="1" comment="libsoup-2_4-1-32bit is &lt;2.74.2-150400.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958282" version="1" comment="libsoup2-devel is &lt;2.74.2-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958283" version="1" comment="libsoup2-devel-32bit is &lt;2.74.2-150400.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958284" version="1" comment="libsoup2-lang is &lt;2.74.2-150400.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958285" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.74.2-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846019" version="1" comment="libnetpbm-devel is &lt;10.80.1-150000.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846020" version="1" comment="libnetpbm11 is &lt;10.80.1-150000.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846021" version="1" comment="libnetpbm11-32bit is &lt;10.80.1-150000.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846022" version="1" comment="netpbm is &lt;10.80.1-150000.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846023" version="1" comment="netpbm-vulnerable is &lt;10.80.1-150000.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958286" version="1" comment="libsoup-3_0-0 is &lt;3.0.4-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958287" version="1" comment="libsoup-3_0-0-32bit is &lt;3.0.4-150400.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958288" version="1" comment="libsoup-devel is &lt;3.0.4-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958289" version="1" comment="libsoup-devel-32bit is &lt;3.0.4-150400.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958290" version="1" comment="libsoup-lang is &lt;3.0.4-150400.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958291" version="1" comment="typelib-1_0-Soup-3_0 is &lt;3.0.4-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958292" version="1" comment="curl is &lt;8.0.1-150400.5.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958293" version="1" comment="libcurl-devel is &lt;8.0.1-150400.5.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958294" version="1" comment="libcurl-devel-32bit is &lt;8.0.1-150400.5.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958295" version="1" comment="libcurl4 is &lt;8.0.1-150400.5.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958296" version="1" comment="libcurl4-32bit is &lt;8.0.1-150400.5.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958297" version="1" comment="docker is &lt;26.1.5_ce-150000.212.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958298" version="1" comment="docker-bash-completion is &lt;26.1.5_ce-150000.212.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958299" version="1" comment="docker-fish-completion is &lt;26.1.5_ce-150000.212.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958300" version="1" comment="docker-rootless-extras is &lt;26.1.5_ce-150000.212.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958301" version="1" comment="docker-zsh-completion is &lt;26.1.5_ce-150000.212.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958302" version="1" comment="cluster-md-kmp-64kb is &lt;5.14.21-150500.55.88.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958303" version="1" comment="cluster-md-kmp-default is &lt;5.14.21-150500.55.88.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958304" version="1" comment="dlm-kmp-64kb is &lt;5.14.21-150500.55.88.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958305" version="1" comment="dlm-kmp-default is &lt;5.14.21-150500.55.88.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958306" version="1" comment="dtb-allwinner is &lt;5.14.21-150500.55.88.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958307" version="1" comment="dtb-altera is &lt;5.14.21-150500.55.88.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958308" version="1" comment="dtb-amazon is &lt;5.14.21-150500.55.88.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958309" version="1" comment="dtb-amd is &lt;5.14.21-150500.55.88.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958310" version="1" comment="dtb-amlogic is &lt;5.14.21-150500.55.88.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958311" version="1" comment="dtb-apm is &lt;5.14.21-150500.55.88.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958312" version="1" comment="dtb-apple is &lt;5.14.21-150500.55.88.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958313" version="1" comment="dtb-arm is &lt;5.14.21-150500.55.88.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958314" version="1" comment="dtb-broadcom is &lt;5.14.21-150500.55.88.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958315" version="1" comment="dtb-cavium is &lt;5.14.21-150500.55.88.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958316" version="1" comment="dtb-exynos is &lt;5.14.21-150500.55.88.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958317" version="1" comment="dtb-freescale is &lt;5.14.21-150500.55.88.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958318" version="1" comment="dtb-hisilicon is &lt;5.14.21-150500.55.88.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958319" version="1" comment="dtb-lg is &lt;5.14.21-150500.55.88.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958320" version="1" comment="dtb-marvell is &lt;5.14.21-150500.55.88.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958321" version="1" comment="dtb-mediatek is &lt;5.14.21-150500.55.88.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958322" version="1" comment="dtb-nvidia is &lt;5.14.21-150500.55.88.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958323" version="1" comment="dtb-qcom is &lt;5.14.21-150500.55.88.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958324" version="1" comment="dtb-renesas is &lt;5.14.21-150500.55.88.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958325" version="1" comment="dtb-rockchip is &lt;5.14.21-150500.55.88.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958326" version="1" comment="dtb-socionext is &lt;5.14.21-150500.55.88.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958327" version="1" comment="dtb-sprd is &lt;5.14.21-150500.55.88.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958328" version="1" comment="dtb-xilinx is &lt;5.14.21-150500.55.88.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958329" version="1" comment="gfs2-kmp-64kb is &lt;5.14.21-150500.55.88.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958330" version="1" comment="gfs2-kmp-default is &lt;5.14.21-150500.55.88.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958331" version="1" comment="kernel-64kb is &lt;5.14.21-150500.55.88.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958332" version="1" comment="kernel-64kb-devel is &lt;5.14.21-150500.55.88.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958333" version="1" comment="kernel-64kb-extra is &lt;5.14.21-150500.55.88.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958334" version="1" comment="kernel-64kb-optional is &lt;5.14.21-150500.55.88.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958335" version="1" comment="kernel-debug is &lt;5.14.21-150500.55.88.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958336" version="1" comment="kernel-debug-devel is &lt;5.14.21-150500.55.88.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958337" version="1" comment="kernel-debug-vdso is &lt;5.14.21-150500.55.88.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958338" version="1" comment="kernel-default is &lt;5.14.21-150500.55.88.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958339" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.88.1.150500.6.39.4 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958340" version="1" comment="kernel-default-base-rebuild is &lt;5.14.21-150500.55.88.1.150500.6.39.4 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958341" version="1" comment="kernel-default-devel is &lt;5.14.21-150500.55.88.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958342" version="1" comment="kernel-default-extra is &lt;5.14.21-150500.55.88.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958343" version="1" comment="kernel-default-livepatch is &lt;5.14.21-150500.55.88.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958344" version="1" comment="kernel-default-livepatch-devel is &lt;5.14.21-150500.55.88.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958345" version="1" comment="kernel-default-optional is &lt;5.14.21-150500.55.88.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958346" version="1" comment="kernel-default-vdso is &lt;5.14.21-150500.55.88.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958347" version="1" comment="kernel-devel is &lt;5.14.21-150500.55.88.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958348" version="1" comment="kernel-docs is &lt;5.14.21-150500.55.88.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958349" version="1" comment="kernel-docs-html is &lt;5.14.21-150500.55.88.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958350" version="1" comment="kernel-kvmsmall is &lt;5.14.21-150500.55.88.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958351" version="1" comment="kernel-kvmsmall-devel is &lt;5.14.21-150500.55.88.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958352" version="1" comment="kernel-kvmsmall-vdso is &lt;5.14.21-150500.55.88.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958353" version="1" comment="kernel-macros is &lt;5.14.21-150500.55.88.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958354" version="1" comment="kernel-obs-build is &lt;5.14.21-150500.55.88.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958355" version="1" comment="kernel-obs-qa is &lt;5.14.21-150500.55.88.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958356" version="1" comment="kernel-source is &lt;5.14.21-150500.55.88.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958357" version="1" comment="kernel-source-vanilla is &lt;5.14.21-150500.55.88.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958358" version="1" comment="kernel-syms is &lt;5.14.21-150500.55.88.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958359" version="1" comment="kernel-zfcpdump is &lt;5.14.21-150500.55.88.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958360" version="1" comment="kselftests-kmp-64kb is &lt;5.14.21-150500.55.88.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958361" version="1" comment="kselftests-kmp-default is &lt;5.14.21-150500.55.88.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958362" version="1" comment="ocfs2-kmp-64kb is &lt;5.14.21-150500.55.88.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958363" version="1" comment="ocfs2-kmp-default is &lt;5.14.21-150500.55.88.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958364" version="1" comment="reiserfs-kmp-64kb is &lt;5.14.21-150500.55.88.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958365" version="1" comment="reiserfs-kmp-default is &lt;5.14.21-150500.55.88.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958366" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.14.1-150400.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958367" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.14.1-150400.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958368" version="1" comment="subversion is &lt;1.14.1-150400.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958369" version="1" comment="subversion-bash-completion is &lt;1.14.1-150400.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958370" version="1" comment="subversion-devel is &lt;1.14.1-150400.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958371" version="1" comment="subversion-perl is &lt;1.14.1-150400.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958372" version="1" comment="subversion-python is &lt;1.14.1-150400.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958373" version="1" comment="subversion-ruby is &lt;1.14.1-150400.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958374" version="1" comment="subversion-server is &lt;1.14.1-150400.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958375" version="1" comment="subversion-tools is &lt;1.14.1-150400.5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958548" version="1" comment="cluster-md-kmp-azure is &lt;5.14.21-150500.33.75.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958549" version="1" comment="dlm-kmp-azure is &lt;5.14.21-150500.33.75.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958550" version="1" comment="gfs2-kmp-azure is &lt;5.14.21-150500.33.75.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958551" version="1" comment="kernel-azure is &lt;5.14.21-150500.33.75.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958552" version="1" comment="kernel-azure-devel is &lt;5.14.21-150500.33.75.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958553" version="1" comment="kernel-azure-extra is &lt;5.14.21-150500.33.75.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958554" version="1" comment="kernel-azure-optional is &lt;5.14.21-150500.33.75.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958555" version="1" comment="kernel-azure-vdso is &lt;5.14.21-150500.33.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958556" version="1" comment="kernel-devel-azure is &lt;5.14.21-150500.33.75.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958557" version="1" comment="kernel-source-azure is &lt;5.14.21-150500.33.75.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958558" version="1" comment="kernel-syms-azure is &lt;5.14.21-150500.33.75.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958559" version="1" comment="kselftests-kmp-azure is &lt;5.14.21-150500.33.75.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958560" version="1" comment="ocfs2-kmp-azure is &lt;5.14.21-150500.33.75.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958561" version="1" comment="reiserfs-kmp-azure is &lt;5.14.21-150500.33.75.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958566" version="1" comment="avahi is &lt;0.8-150400.7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958567" version="1" comment="avahi-autoipd is &lt;0.8-150400.7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958568" version="1" comment="avahi-compat-howl-devel is &lt;0.8-150400.7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958569" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.8-150400.7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958570" version="1" comment="avahi-lang is &lt;0.8-150400.7.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958571" version="1" comment="avahi-utils is &lt;0.8-150400.7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958572" version="1" comment="avahi-utils-gtk is &lt;0.8-150400.7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958573" version="1" comment="libavahi-client3 is &lt;0.8-150400.7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958574" version="1" comment="libavahi-client3-32bit is &lt;0.8-150400.7.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958575" version="1" comment="libavahi-common3 is &lt;0.8-150400.7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958576" version="1" comment="libavahi-common3-32bit is &lt;0.8-150400.7.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958577" version="1" comment="libavahi-core7 is &lt;0.8-150400.7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958578" version="1" comment="libavahi-devel is &lt;0.8-150400.7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958579" version="1" comment="libavahi-glib-devel is &lt;0.8-150400.7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958580" version="1" comment="libavahi-glib1 is &lt;0.8-150400.7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958581" version="1" comment="libavahi-glib1-32bit is &lt;0.8-150400.7.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958582" version="1" comment="libavahi-gobject-devel is &lt;0.8-150400.7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958583" version="1" comment="libavahi-gobject0 is &lt;0.8-150400.7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958584" version="1" comment="libavahi-libevent1 is &lt;0.8-150400.7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958585" version="1" comment="libavahi-qt5-1 is &lt;0.8-150400.7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958586" version="1" comment="libavahi-qt5-devel is &lt;0.8-150400.7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958587" version="1" comment="libavahi-ui-gtk3-0 is &lt;0.8-150400.7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958588" version="1" comment="libdns_sd is &lt;0.8-150400.7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958589" version="1" comment="libdns_sd-32bit is &lt;0.8-150400.7.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958590" version="1" comment="libhowl0 is &lt;0.8-150400.7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958591" version="1" comment="python3-avahi is &lt;0.8-150400.7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958592" version="1" comment="python3-avahi-gtk is &lt;0.8-150400.7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958593" version="1" comment="typelib-1_0-Avahi-0_6 is &lt;0.8-150400.7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958676" version="1" comment="docker-stable is &lt;24.0.9_ce-150000.1.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958677" version="1" comment="docker-stable-bash-completion is &lt;24.0.9_ce-150000.1.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958678" version="1" comment="docker-stable-fish-completion is &lt;24.0.9_ce-150000.1.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958679" version="1" comment="docker-stable-rootless-extras is &lt;24.0.9_ce-150000.1.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958680" version="1" comment="docker-stable-zsh-completion is &lt;24.0.9_ce-150000.1.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958681" version="1" comment="emacs is &lt;27.2-150400.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958682" version="1" comment="emacs-el is &lt;27.2-150400.3.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958683" version="1" comment="emacs-info is &lt;27.2-150400.3.20.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958684" version="1" comment="emacs-nox is &lt;27.2-150400.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958685" version="1" comment="emacs-x11 is &lt;27.2-150400.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958686" version="1" comment="etags is &lt;27.2-150400.3.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958687" version="1" comment="python-aiohttp-doc is &lt;3.6.0-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958688" version="1" comment="python3-aiohttp is &lt;3.6.0-150100.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818857" version="1" comment="MozillaThunderbird is &lt;115.6.0-150200.8.142.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818858" version="1" comment="MozillaThunderbird-translations-common is &lt;115.6.0-150200.8.142.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818859" version="1" comment="MozillaThunderbird-translations-other is &lt;115.6.0-150200.8.142.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958840" version="1" comment="jctools is &lt;4.0.5-150200.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958841" version="1" comment="jctools-channels is &lt;4.0.5-150200.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958842" version="1" comment="jctools-experimental is &lt;4.0.5-150200.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958843" version="1" comment="jctools-javadoc is &lt;4.0.5-150200.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958844" version="1" comment="netty is &lt;4.1.115-150200.4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958845" version="1" comment="netty-javadoc is &lt;4.1.115-150200.4.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958846" version="1" comment="netty-tcnative is &lt;2.0.69-150200.3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958847" version="1" comment="netty-tcnative-javadoc is &lt;2.0.69-150200.3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846141" version="1" comment="kubevirt-container-disk is &lt;1.1.1-150500.8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846142" version="1" comment="kubevirt-manifests is &lt;1.1.1-150500.8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846143" version="1" comment="kubevirt-tests is &lt;1.1.1-150500.8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846144" version="1" comment="kubevirt-virt-api is &lt;1.1.1-150500.8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846145" version="1" comment="kubevirt-virt-controller is &lt;1.1.1-150500.8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846146" version="1" comment="kubevirt-virt-exportproxy is &lt;1.1.1-150500.8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846147" version="1" comment="kubevirt-virt-exportserver is &lt;1.1.1-150500.8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846148" version="1" comment="kubevirt-virt-handler is &lt;1.1.1-150500.8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846149" version="1" comment="kubevirt-virt-launcher is &lt;1.1.1-150500.8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846150" version="1" comment="kubevirt-virt-operator is &lt;1.1.1-150500.8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846151" version="1" comment="kubevirt-virtctl is &lt;1.1.1-150500.8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846152" version="1" comment="obs-service-kubevirt_containers_meta is &lt;1.1.1-150500.8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958848" version="1" comment="libmozjs-78-0 is &lt;78.15.0-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958849" version="1" comment="mozjs78 is &lt;78.15.0-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958850" version="1" comment="mozjs78-devel is &lt;78.15.0-150400.3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958851" version="1" comment="gdb is &lt;14.2-150400.15.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958852" version="1" comment="gdb-testresults is &lt;14.2-150400.15.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958853" version="1" comment="gdbserver is &lt;14.2-150400.15.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846153" version="1" comment="containerized-data-importer-api is &lt;1.58.0-150500.6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846154" version="1" comment="containerized-data-importer-cloner is &lt;1.58.0-150500.6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846155" version="1" comment="containerized-data-importer-controller is &lt;1.58.0-150500.6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846156" version="1" comment="containerized-data-importer-importer is &lt;1.58.0-150500.6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846157" version="1" comment="containerized-data-importer-manifests is &lt;1.58.0-150500.6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846158" version="1" comment="containerized-data-importer-operator is &lt;1.58.0-150500.6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846159" version="1" comment="containerized-data-importer-uploadproxy is &lt;1.58.0-150500.6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846160" version="1" comment="containerized-data-importer-uploadserver is &lt;1.58.0-150500.6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846161" version="1" comment="obs-service-cdi_containers_meta is &lt;1.58.0-150500.6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958884" version="1" comment="libpoppler-cpp0 is &lt;23.01.0-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958885" version="1" comment="libpoppler-cpp0-32bit is &lt;23.01.0-150500.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958886" version="1" comment="libpoppler-devel is &lt;23.01.0-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958887" version="1" comment="libpoppler-glib-devel is &lt;23.01.0-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958888" version="1" comment="libpoppler-glib8 is &lt;23.01.0-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958889" version="1" comment="libpoppler-glib8-32bit is &lt;23.01.0-150500.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958890" version="1" comment="libpoppler-qt5-1 is &lt;23.01.0-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958891" version="1" comment="libpoppler-qt5-1-32bit is &lt;23.01.0-150500.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958892" version="1" comment="libpoppler-qt5-devel is &lt;23.01.0-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958893" version="1" comment="libpoppler-qt6-3 is &lt;23.01.0-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958894" version="1" comment="libpoppler-qt6-devel is &lt;23.01.0-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958895" version="1" comment="libpoppler126 is &lt;23.01.0-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958896" version="1" comment="libpoppler126-32bit is &lt;23.01.0-150500.3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958897" version="1" comment="poppler-tools is &lt;23.01.0-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958898" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;23.01.0-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958941" version="1" comment="python311-grpcio is &lt;1.60.1-150500.12.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959010" version="1" comment="govulncheck-vulndb is &lt;0.0.20241218T202206-150000.1.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959011" version="1" comment="grpc-devel is &lt;1.60.0-150500.11.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959012" version="1" comment="grpc-source is &lt;1.60.0-150500.11.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959013" version="1" comment="libgrpc++1_60 is &lt;1.60.0-150500.11.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959014" version="1" comment="libgrpc1_60 is &lt;1.60.0-150500.11.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959015" version="1" comment="libgrpc37 is &lt;1.60.0-150500.11.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959016" version="1" comment="libupb37 is &lt;1.60.0-150500.11.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959017" version="1" comment="upb-devel is &lt;1.60.0-150500.11.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846162" version="1" comment="suse-build-key is &lt;12.0-150000.8.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846388" version="1" comment="squid is &lt;5.7-150400.3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846389" version="1" comment="runc is &lt;1.1.12-150000.61.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846390" version="1" comment="rekor is &lt;1.3.5-150400.4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846391" version="1" comment="python3-libxml2-python is &lt;2.9.7-150000.3.66.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846392" version="1" comment="cluster-md-kmp-rt is &lt;5.14.21-150500.13.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846393" version="1" comment="dlm-kmp-rt is &lt;5.14.21-150500.13.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846394" version="1" comment="gfs2-kmp-rt is &lt;5.14.21-150500.13.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846395" version="1" comment="kernel-devel-rt is &lt;5.14.21-150500.13.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846396" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846397" version="1" comment="kernel-rt-devel is &lt;5.14.21-150500.13.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846398" version="1" comment="kernel-rt-extra is &lt;5.14.21-150500.13.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846399" version="1" comment="kernel-rt-livepatch is &lt;5.14.21-150500.13.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846400" version="1" comment="kernel-rt-livepatch-devel is &lt;5.14.21-150500.13.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846401" version="1" comment="kernel-rt-optional is &lt;5.14.21-150500.13.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846402" version="1" comment="kernel-rt-vdso is &lt;5.14.21-150500.13.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846403" version="1" comment="kernel-rt_debug is &lt;5.14.21-150500.13.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846404" version="1" comment="kernel-rt_debug-devel is &lt;5.14.21-150500.13.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846405" version="1" comment="kernel-rt_debug-livepatch-devel is &lt;5.14.21-150500.13.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846406" version="1" comment="kernel-rt_debug-vdso is &lt;5.14.21-150500.13.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846407" version="1" comment="kernel-source-rt is &lt;5.14.21-150500.13.35.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846408" version="1" comment="kernel-syms-rt is &lt;5.14.21-150500.13.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846409" version="1" comment="kselftests-kmp-rt is &lt;5.14.21-150500.13.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846410" version="1" comment="ocfs2-kmp-rt is &lt;5.14.21-150500.13.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846411" version="1" comment="reiserfs-kmp-rt is &lt;5.14.21-150500.13.35.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846412" version="1" comment="tomcat is &lt;9.0.85-150200.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846413" version="1" comment="tomcat-admin-webapps is &lt;9.0.85-150200.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846414" version="1" comment="tomcat-docs-webapp is &lt;9.0.85-150200.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846415" version="1" comment="tomcat-el-3_0-api is &lt;9.0.85-150200.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846416" version="1" comment="tomcat-embed is &lt;9.0.85-150200.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846417" version="1" comment="tomcat-javadoc is &lt;9.0.85-150200.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846418" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.85-150200.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846419" version="1" comment="tomcat-jsvc is &lt;9.0.85-150200.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846420" version="1" comment="tomcat-lib is &lt;9.0.85-150200.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846421" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.85-150200.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846422" version="1" comment="tomcat-webapps is &lt;9.0.85-150200.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846423" version="1" comment="tomcat10 is &lt;10.1.18-150200.5.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846424" version="1" comment="tomcat10-admin-webapps is &lt;10.1.18-150200.5.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846425" version="1" comment="tomcat10-docs-webapp is &lt;10.1.18-150200.5.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846426" version="1" comment="tomcat10-el-5_0-api is &lt;10.1.18-150200.5.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846427" version="1" comment="tomcat10-embed is &lt;10.1.18-150200.5.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846428" version="1" comment="tomcat10-jsp-3_1-api is &lt;10.1.18-150200.5.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846429" version="1" comment="tomcat10-jsvc is &lt;10.1.18-150200.5.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846430" version="1" comment="tomcat10-lib is &lt;10.1.18-150200.5.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846431" version="1" comment="tomcat10-servlet-6_0-api is &lt;10.1.18-150200.5.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846432" version="1" comment="tomcat10-webapps is &lt;10.1.18-150200.5.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846433" version="1" comment="java-1_8_0-openj9 is &lt;1.8.0.402-150200.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846434" version="1" comment="java-1_8_0-openj9-accessibility is &lt;1.8.0.402-150200.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846435" version="1" comment="java-1_8_0-openj9-demo is &lt;1.8.0.402-150200.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846436" version="1" comment="java-1_8_0-openj9-devel is &lt;1.8.0.402-150200.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846437" version="1" comment="java-1_8_0-openj9-headless is &lt;1.8.0.402-150200.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846438" version="1" comment="java-1_8_0-openj9-javadoc is &lt;1.8.0.402-150200.3.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846439" version="1" comment="java-1_8_0-openj9-src is &lt;1.8.0.402-150200.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846440" version="1" comment="golang-github-lusitaniae-apache_exporter is &lt;1.0.0-150000.1.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846441" version="1" comment="prometheus-postgres_exporter is &lt;0.10.1-150000.1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846442" version="1" comment="spacecmd is &lt;4.3.26-150000.3.113.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846443" version="1" comment="python3-salt is &lt;3006.0-150500.4.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846444" version="1" comment="salt is &lt;3006.0-150500.4.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846445" version="1" comment="salt-api is &lt;3006.0-150500.4.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846446" version="1" comment="salt-bash-completion is &lt;3006.0-150500.4.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846447" version="1" comment="salt-cloud is &lt;3006.0-150500.4.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846448" version="1" comment="salt-doc is &lt;3006.0-150500.4.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846449" version="1" comment="salt-fish-completion is &lt;3006.0-150500.4.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846450" version="1" comment="salt-master is &lt;3006.0-150500.4.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846451" version="1" comment="salt-minion is &lt;3006.0-150500.4.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846452" version="1" comment="salt-proxy is &lt;3006.0-150500.4.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846453" version="1" comment="salt-ssh is &lt;3006.0-150500.4.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846454" version="1" comment="salt-standalone-formulas-configuration is &lt;3006.0-150500.4.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846455" version="1" comment="salt-syndic is &lt;3006.0-150500.4.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846456" version="1" comment="salt-transactional-update is &lt;3006.0-150500.4.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846457" version="1" comment="salt-zsh-completion is &lt;3006.0-150500.4.29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846565" version="1" comment="grafana is &lt;9.5.8-150200.3.53.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846458" version="1" comment="golang-github-prometheus-alertmanager is &lt;0.26.0-150100.4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846459" version="1" comment="cluster-md-kmp-azure is &lt;5.14.21-150500.33.34.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846460" version="1" comment="dlm-kmp-azure is &lt;5.14.21-150500.33.34.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846461" version="1" comment="gfs2-kmp-azure is &lt;5.14.21-150500.33.34.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846462" version="1" comment="kernel-azure is &lt;5.14.21-150500.33.34.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846463" version="1" comment="kernel-azure-devel is &lt;5.14.21-150500.33.34.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846464" version="1" comment="kernel-azure-extra is &lt;5.14.21-150500.33.34.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846465" version="1" comment="kernel-azure-livepatch-devel is &lt;5.14.21-150500.33.34.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846466" version="1" comment="kernel-azure-optional is &lt;5.14.21-150500.33.34.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846467" version="1" comment="kernel-azure-vdso is &lt;5.14.21-150500.33.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846468" version="1" comment="kernel-devel-azure is &lt;5.14.21-150500.33.34.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846469" version="1" comment="kernel-source-azure is &lt;5.14.21-150500.33.34.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846470" version="1" comment="kernel-syms-azure is &lt;5.14.21-150500.33.34.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846471" version="1" comment="kselftests-kmp-azure is &lt;5.14.21-150500.33.34.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846472" version="1" comment="ocfs2-kmp-azure is &lt;5.14.21-150500.33.34.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846473" version="1" comment="reiserfs-kmp-azure is &lt;5.14.21-150500.33.34.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846474" version="1" comment="cluster-md-kmp-64kb is &lt;5.14.21-150500.55.49.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846475" version="1" comment="cluster-md-kmp-default is &lt;5.14.21-150500.55.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846476" version="1" comment="dlm-kmp-64kb is &lt;5.14.21-150500.55.49.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846477" version="1" comment="dlm-kmp-default is &lt;5.14.21-150500.55.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846478" version="1" comment="dtb-allwinner is &lt;5.14.21-150500.55.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846479" version="1" comment="dtb-altera is &lt;5.14.21-150500.55.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846480" version="1" comment="dtb-amazon is &lt;5.14.21-150500.55.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846481" version="1" comment="dtb-amd is &lt;5.14.21-150500.55.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846482" version="1" comment="dtb-amlogic is &lt;5.14.21-150500.55.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846483" version="1" comment="dtb-apm is &lt;5.14.21-150500.55.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846484" version="1" comment="dtb-apple is &lt;5.14.21-150500.55.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846485" version="1" comment="dtb-arm is &lt;5.14.21-150500.55.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846486" version="1" comment="dtb-broadcom is &lt;5.14.21-150500.55.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846487" version="1" comment="dtb-cavium is &lt;5.14.21-150500.55.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846488" version="1" comment="dtb-exynos is &lt;5.14.21-150500.55.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846489" version="1" comment="dtb-freescale is &lt;5.14.21-150500.55.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846490" version="1" comment="dtb-hisilicon is &lt;5.14.21-150500.55.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846491" version="1" comment="dtb-lg is &lt;5.14.21-150500.55.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846492" version="1" comment="dtb-marvell is &lt;5.14.21-150500.55.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846493" version="1" comment="dtb-mediatek is &lt;5.14.21-150500.55.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846494" version="1" comment="dtb-nvidia is &lt;5.14.21-150500.55.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846495" version="1" comment="dtb-qcom is &lt;5.14.21-150500.55.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846496" version="1" comment="dtb-renesas is &lt;5.14.21-150500.55.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846497" version="1" comment="dtb-rockchip is &lt;5.14.21-150500.55.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846498" version="1" comment="dtb-socionext is &lt;5.14.21-150500.55.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846499" version="1" comment="dtb-sprd is &lt;5.14.21-150500.55.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846500" version="1" comment="dtb-xilinx is &lt;5.14.21-150500.55.49.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846501" version="1" comment="gfs2-kmp-64kb is &lt;5.14.21-150500.55.49.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846502" version="1" comment="gfs2-kmp-default is &lt;5.14.21-150500.55.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846503" version="1" comment="kernel-64kb is &lt;5.14.21-150500.55.49.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846504" version="1" comment="kernel-64kb-devel is &lt;5.14.21-150500.55.49.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846505" version="1" comment="kernel-64kb-extra is &lt;5.14.21-150500.55.49.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846506" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.14.21-150500.55.49.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846507" version="1" comment="kernel-64kb-optional is &lt;5.14.21-150500.55.49.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846508" version="1" comment="kernel-debug is &lt;5.14.21-150500.55.49.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846509" version="1" comment="kernel-debug-devel is &lt;5.14.21-150500.55.49.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846510" version="1" comment="kernel-debug-livepatch-devel is &lt;5.14.21-150500.55.49.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846511" version="1" comment="kernel-debug-vdso is &lt;5.14.21-150500.55.49.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846512" version="1" comment="kernel-default is &lt;5.14.21-150500.55.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846513" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.49.1.150500.6.21.2 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846514" version="1" comment="kernel-default-base-rebuild is &lt;5.14.21-150500.55.49.1.150500.6.21.2 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846515" version="1" comment="kernel-default-devel is &lt;5.14.21-150500.55.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846516" version="1" comment="kernel-default-extra is &lt;5.14.21-150500.55.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846517" version="1" comment="kernel-default-livepatch is &lt;5.14.21-150500.55.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846518" version="1" comment="kernel-default-livepatch-devel is &lt;5.14.21-150500.55.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846519" version="1" comment="kernel-default-optional is &lt;5.14.21-150500.55.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846520" version="1" comment="kernel-default-vdso is &lt;5.14.21-150500.55.49.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846521" version="1" comment="kernel-devel is &lt;5.14.21-150500.55.49.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846522" version="1" comment="kernel-docs is &lt;5.14.21-150500.55.49.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846523" version="1" comment="kernel-docs-html is &lt;5.14.21-150500.55.49.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846524" version="1" comment="kernel-kvmsmall is &lt;5.14.21-150500.55.49.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846525" version="1" comment="kernel-kvmsmall-devel is &lt;5.14.21-150500.55.49.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846526" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.14.21-150500.55.49.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846527" version="1" comment="kernel-kvmsmall-vdso is &lt;5.14.21-150500.55.49.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846528" version="1" comment="kernel-macros is &lt;5.14.21-150500.55.49.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846529" version="1" comment="kernel-obs-build is &lt;5.14.21-150500.55.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846530" version="1" comment="kernel-obs-qa is &lt;5.14.21-150500.55.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846531" version="1" comment="kernel-source is &lt;5.14.21-150500.55.49.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846532" version="1" comment="kernel-source-vanilla is &lt;5.14.21-150500.55.49.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846533" version="1" comment="kernel-syms is &lt;5.14.21-150500.55.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846534" version="1" comment="kernel-zfcpdump is &lt;5.14.21-150500.55.49.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846535" version="1" comment="kselftests-kmp-64kb is &lt;5.14.21-150500.55.49.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846536" version="1" comment="kselftests-kmp-default is &lt;5.14.21-150500.55.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846537" version="1" comment="ocfs2-kmp-64kb is &lt;5.14.21-150500.55.49.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846538" version="1" comment="ocfs2-kmp-default is &lt;5.14.21-150500.55.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846539" version="1" comment="reiserfs-kmp-64kb is &lt;5.14.21-150500.55.49.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846540" version="1" comment="reiserfs-kmp-default is &lt;5.14.21-150500.55.49.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818863" version="1" comment="aom-tools is &lt;3.2.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818864" version="1" comment="libaom-devel is &lt;3.2.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818865" version="1" comment="libaom-devel-doc is &lt;3.2.0-150400.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818866" version="1" comment="libaom3 is &lt;3.2.0-150400.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818867" version="1" comment="libaom3-32bit is &lt;3.2.0-150400.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846541" version="1" comment="postgresql13 is &lt;13.14-150200.5.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846542" version="1" comment="postgresql13-contrib is &lt;13.14-150200.5.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846543" version="1" comment="postgresql13-devel is &lt;13.14-150200.5.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846544" version="1" comment="postgresql13-docs is &lt;13.14-150200.5.53.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846545" version="1" comment="postgresql13-llvmjit is &lt;13.14-150200.5.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846546" version="1" comment="postgresql13-llvmjit-devel is &lt;13.14-150200.5.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846547" version="1" comment="postgresql13-plperl is &lt;13.14-150200.5.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846548" version="1" comment="postgresql13-plpython is &lt;13.14-150200.5.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846549" version="1" comment="postgresql13-pltcl is &lt;13.14-150200.5.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846550" version="1" comment="postgresql13-server is &lt;13.14-150200.5.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846551" version="1" comment="postgresql13-server-devel is &lt;13.14-150200.5.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846552" version="1" comment="postgresql13-test is &lt;13.14-150200.5.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846553" version="1" comment="postgresql12 is &lt;12.18-150200.8.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846554" version="1" comment="postgresql12-contrib is &lt;12.18-150200.8.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846555" version="1" comment="postgresql12-devel is &lt;12.18-150200.8.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846556" version="1" comment="postgresql12-docs is &lt;12.18-150200.8.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846557" version="1" comment="postgresql12-llvmjit is &lt;12.18-150200.8.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846558" version="1" comment="postgresql12-llvmjit-devel is &lt;12.18-150200.8.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846559" version="1" comment="postgresql12-plperl is &lt;12.18-150200.8.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846560" version="1" comment="postgresql12-plpython is &lt;12.18-150200.8.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846561" version="1" comment="postgresql12-pltcl is &lt;12.18-150200.8.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846562" version="1" comment="postgresql12-server is &lt;12.18-150200.8.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846563" version="1" comment="postgresql12-server-devel is &lt;12.18-150200.8.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846564" version="1" comment="postgresql12-test is &lt;12.18-150200.8.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847370" version="1" comment="dpdk is &lt;19.11.10-150500.5.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847371" version="1" comment="dpdk-devel is &lt;19.11.10-150500.5.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847372" version="1" comment="dpdk-doc is &lt;19.11.10-150500.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847373" version="1" comment="dpdk-examples is &lt;19.11.10-150500.5.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847374" version="1" comment="dpdk-kmp-default is &lt;19.11.10_k5.14.21_150500.55.44-150500.5.3.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847375" version="1" comment="dpdk-thunderx is &lt;19.11.10-150500.5.3.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847376" version="1" comment="dpdk-thunderx-devel is &lt;19.11.10-150500.5.3.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847377" version="1" comment="dpdk-thunderx-doc is &lt;19.11.10-150500.5.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847378" version="1" comment="dpdk-thunderx-examples is &lt;19.11.10-150500.5.3.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847379" version="1" comment="dpdk-thunderx-kmp-default is &lt;19.11.10_k5.14.21_150500.55.44-150500.5.3.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847380" version="1" comment="dpdk-thunderx-tools is &lt;19.11.10-150500.5.3.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847381" version="1" comment="dpdk-tools is &lt;19.11.10-150500.5.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847382" version="1" comment="libdpdk-20_0 is &lt;19.11.10-150500.5.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847486" version="1" comment="hdf5-gnu-hpc is &lt;1.10.11-150400.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847487" version="1" comment="hdf5-gnu-hpc-devel is &lt;1.10.11-150400.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847488" version="1" comment="hdf5-gnu-mpich-hpc is &lt;1.10.11-150400.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847489" version="1" comment="hdf5-gnu-mpich-hpc-devel is &lt;1.10.11-150400.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847490" version="1" comment="hdf5-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847491" version="1" comment="hdf5-gnu-mvapich2-hpc-devel is &lt;1.10.11-150400.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847492" version="1" comment="hdf5-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847493" version="1" comment="hdf5-gnu-openmpi3-hpc-devel is &lt;1.10.11-150400.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847494" version="1" comment="hdf5-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847495" version="1" comment="hdf5-gnu-openmpi4-hpc-devel is &lt;1.10.11-150400.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847496" version="1" comment="hdf5-hpc-examples is &lt;1.10.11-150400.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847497" version="1" comment="hdf5_1_10_11-gnu-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847498" version="1" comment="hdf5_1_10_11-gnu-hpc-devel is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847499" version="1" comment="hdf5_1_10_11-gnu-hpc-devel-static is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847500" version="1" comment="hdf5_1_10_11-gnu-hpc-module is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847501" version="1" comment="hdf5_1_10_11-gnu-mpich-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847502" version="1" comment="hdf5_1_10_11-gnu-mpich-hpc-devel is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847503" version="1" comment="hdf5_1_10_11-gnu-mpich-hpc-devel-static is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847504" version="1" comment="hdf5_1_10_11-gnu-mpich-hpc-module is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847505" version="1" comment="hdf5_1_10_11-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847506" version="1" comment="hdf5_1_10_11-gnu-mvapich2-hpc-devel is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847507" version="1" comment="hdf5_1_10_11-gnu-mvapich2-hpc-devel-static is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847508" version="1" comment="hdf5_1_10_11-gnu-mvapich2-hpc-module is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847509" version="1" comment="hdf5_1_10_11-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847510" version="1" comment="hdf5_1_10_11-gnu-openmpi3-hpc-devel is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847511" version="1" comment="hdf5_1_10_11-gnu-openmpi3-hpc-devel-static is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847512" version="1" comment="hdf5_1_10_11-gnu-openmpi3-hpc-module is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847513" version="1" comment="hdf5_1_10_11-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847514" version="1" comment="hdf5_1_10_11-gnu-openmpi4-hpc-devel is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847515" version="1" comment="hdf5_1_10_11-gnu-openmpi4-hpc-devel-static is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847516" version="1" comment="hdf5_1_10_11-gnu-openmpi4-hpc-module is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847517" version="1" comment="hdf5_1_10_11-hpc-examples is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847518" version="1" comment="libhdf5-gnu-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847519" version="1" comment="libhdf5-gnu-mpich-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847520" version="1" comment="libhdf5-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847521" version="1" comment="libhdf5-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847522" version="1" comment="libhdf5-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847523" version="1" comment="libhdf5_1_10_11-gnu-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847524" version="1" comment="libhdf5_1_10_11-gnu-mpich-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847525" version="1" comment="libhdf5_1_10_11-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847526" version="1" comment="libhdf5_1_10_11-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847527" version="1" comment="libhdf5_1_10_11-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847528" version="1" comment="libhdf5_cpp-gnu-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847529" version="1" comment="libhdf5_cpp-gnu-mpich-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847530" version="1" comment="libhdf5_cpp-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847531" version="1" comment="libhdf5_cpp-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847532" version="1" comment="libhdf5_cpp-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847533" version="1" comment="libhdf5_cpp_1_10_11-gnu-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847534" version="1" comment="libhdf5_cpp_1_10_11-gnu-mpich-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847535" version="1" comment="libhdf5_cpp_1_10_11-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847536" version="1" comment="libhdf5_cpp_1_10_11-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847537" version="1" comment="libhdf5_cpp_1_10_11-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847538" version="1" comment="libhdf5_fortran-gnu-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847539" version="1" comment="libhdf5_fortran-gnu-mpich-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847540" version="1" comment="libhdf5_fortran-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847541" version="1" comment="libhdf5_fortran-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847542" version="1" comment="libhdf5_fortran-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847543" version="1" comment="libhdf5_fortran_1_10_11-gnu-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847544" version="1" comment="libhdf5_fortran_1_10_11-gnu-mpich-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847545" version="1" comment="libhdf5_fortran_1_10_11-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847546" version="1" comment="libhdf5_fortran_1_10_11-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847547" version="1" comment="libhdf5_fortran_1_10_11-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847548" version="1" comment="libhdf5_hl-gnu-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847549" version="1" comment="libhdf5_hl-gnu-mpich-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847550" version="1" comment="libhdf5_hl-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847551" version="1" comment="libhdf5_hl-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847552" version="1" comment="libhdf5_hl-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847553" version="1" comment="libhdf5_hl_1_10_11-gnu-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847554" version="1" comment="libhdf5_hl_1_10_11-gnu-mpich-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847555" version="1" comment="libhdf5_hl_1_10_11-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847556" version="1" comment="libhdf5_hl_1_10_11-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847557" version="1" comment="libhdf5_hl_1_10_11-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847558" version="1" comment="libhdf5_hl_cpp-gnu-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847559" version="1" comment="libhdf5_hl_cpp-gnu-mpich-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847560" version="1" comment="libhdf5_hl_cpp-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847561" version="1" comment="libhdf5_hl_cpp-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847562" version="1" comment="libhdf5_hl_cpp-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847563" version="1" comment="libhdf5_hl_cpp_1_10_11-gnu-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847564" version="1" comment="libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847565" version="1" comment="libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847566" version="1" comment="libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847567" version="1" comment="libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847568" version="1" comment="libhdf5_hl_fortran-gnu-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847569" version="1" comment="libhdf5_hl_fortran-gnu-mpich-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847570" version="1" comment="libhdf5_hl_fortran-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847571" version="1" comment="libhdf5_hl_fortran-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847572" version="1" comment="libhdf5_hl_fortran-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847573" version="1" comment="libhdf5hl_fortran_1_10_11-gnu-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847574" version="1" comment="libhdf5hl_fortran_1_10_11-gnu-mpich-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847575" version="1" comment="libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847576" version="1" comment="libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847577" version="1" comment="libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc is &lt;1.10.11-150400.3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847578" version="1" comment="WebKitGTK-4.0-lang is &lt;2.42.5-150400.4.75.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847579" version="1" comment="WebKitGTK-4.1-lang is &lt;2.42.5-150400.4.75.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847580" version="1" comment="WebKitGTK-6.0-lang is &lt;2.42.5-150400.4.75.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847581" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847582" version="1" comment="libjavascriptcoregtk-4_0-18-32bit is &lt;2.42.5-150400.4.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847583" version="1" comment="libjavascriptcoregtk-4_1-0 is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847584" version="1" comment="libjavascriptcoregtk-4_1-0-32bit is &lt;2.42.5-150400.4.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847585" version="1" comment="libjavascriptcoregtk-6_0-1 is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847586" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847587" version="1" comment="libwebkit2gtk-4_0-37-32bit is &lt;2.42.5-150400.4.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847588" version="1" comment="libwebkit2gtk-4_1-0 is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847589" version="1" comment="libwebkit2gtk-4_1-0-32bit is &lt;2.42.5-150400.4.75.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847590" version="1" comment="libwebkitgtk-6_0-4 is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847591" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847592" version="1" comment="typelib-1_0-JavaScriptCore-4_1 is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847593" version="1" comment="typelib-1_0-JavaScriptCore-6_0 is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847594" version="1" comment="typelib-1_0-WebKit-6_0 is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847595" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847596" version="1" comment="typelib-1_0-WebKit2-4_1 is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847597" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847598" version="1" comment="typelib-1_0-WebKit2WebExtension-4_1 is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847599" version="1" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847600" version="1" comment="webkit-jsc-4 is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847601" version="1" comment="webkit-jsc-4.1 is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847602" version="1" comment="webkit-jsc-6.0 is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847603" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847604" version="1" comment="webkit2gtk-4_1-injected-bundles is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847605" version="1" comment="webkit2gtk3-devel is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847606" version="1" comment="webkit2gtk3-minibrowser is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847607" version="1" comment="webkit2gtk3-soup2-devel is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847608" version="1" comment="webkit2gtk3-soup2-minibrowser is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847609" version="1" comment="webkit2gtk4-devel is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847610" version="1" comment="webkit2gtk4-minibrowser is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847611" version="1" comment="webkitgtk-6_0-injected-bundles is &lt;2.42.5-150400.4.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847612" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1l-150500.17.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847613" version="1" comment="libopenssl-1_1-devel-32bit is &lt;1.1.1l-150500.17.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847614" version="1" comment="libopenssl1_1 is &lt;1.1.1l-150500.17.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847615" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1l-150500.17.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847616" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1l-150500.17.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847617" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1l-150500.17.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847618" version="1" comment="openssl-1_1 is &lt;1.1.1l-150500.17.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847619" version="1" comment="openssl-1_1-doc is &lt;1.1.1l-150500.17.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847620" version="1" comment="libecpg6 is &lt;16.2-150200.5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847621" version="1" comment="libecpg6-32bit is &lt;16.2-150200.5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847622" version="1" comment="libpq5 is &lt;16.2-150200.5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847623" version="1" comment="libpq5-32bit is &lt;16.2-150200.5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847624" version="1" comment="postgresql16 is &lt;16.2-150200.5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847625" version="1" comment="postgresql16-contrib is &lt;16.2-150200.5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847626" version="1" comment="postgresql16-devel is &lt;16.2-150200.5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847627" version="1" comment="postgresql16-devel-mini is &lt;16.2-150200.5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847628" version="1" comment="postgresql16-docs is &lt;16.2-150200.5.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847629" version="1" comment="postgresql16-llvmjit is &lt;16.2-150200.5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847630" version="1" comment="postgresql16-llvmjit-devel is &lt;16.2-150200.5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847631" version="1" comment="postgresql16-plperl is &lt;16.2-150200.5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847632" version="1" comment="postgresql16-plpython is &lt;16.2-150200.5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847633" version="1" comment="postgresql16-pltcl is &lt;16.2-150200.5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847634" version="1" comment="postgresql16-server is &lt;16.2-150200.5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847635" version="1" comment="postgresql16-server-devel is &lt;16.2-150200.5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847636" version="1" comment="postgresql16-test is &lt;16.2-150200.5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847637" version="1" comment="postgresql15 is &lt;15.6-150200.5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847638" version="1" comment="postgresql15-contrib is &lt;15.6-150200.5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847639" version="1" comment="postgresql15-devel is &lt;15.6-150200.5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847640" version="1" comment="postgresql15-docs is &lt;15.6-150200.5.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847641" version="1" comment="postgresql15-llvmjit is &lt;15.6-150200.5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847642" version="1" comment="postgresql15-llvmjit-devel is &lt;15.6-150200.5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847643" version="1" comment="postgresql15-plperl is &lt;15.6-150200.5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847644" version="1" comment="postgresql15-plpython is &lt;15.6-150200.5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847645" version="1" comment="postgresql15-pltcl is &lt;15.6-150200.5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847646" version="1" comment="postgresql15-server is &lt;15.6-150200.5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847647" version="1" comment="postgresql15-server-devel is &lt;15.6-150200.5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847648" version="1" comment="postgresql15-test is &lt;15.6-150200.5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847649" version="1" comment="postgresql14 is &lt;14.11-150200.5.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847650" version="1" comment="postgresql14-contrib is &lt;14.11-150200.5.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847651" version="1" comment="postgresql14-devel is &lt;14.11-150200.5.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847652" version="1" comment="postgresql14-docs is &lt;14.11-150200.5.39.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847653" version="1" comment="postgresql14-llvmjit is &lt;14.11-150200.5.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847654" version="1" comment="postgresql14-llvmjit-devel is &lt;14.11-150200.5.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847655" version="1" comment="postgresql14-plperl is &lt;14.11-150200.5.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847656" version="1" comment="postgresql14-plpython is &lt;14.11-150200.5.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847657" version="1" comment="postgresql14-pltcl is &lt;14.11-150200.5.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847658" version="1" comment="postgresql14-server is &lt;14.11-150200.5.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847659" version="1" comment="postgresql14-server-devel is &lt;14.11-150200.5.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847660" version="1" comment="postgresql14-test is &lt;14.11-150200.5.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847661" version="1" comment="libopenvswitch-2_14-0 is &lt;2.14.2-150400.24.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847662" version="1" comment="libovn-20_06-0 is &lt;20.06.2-150400.24.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847663" version="1" comment="openvswitch is &lt;2.14.2-150400.24.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847664" version="1" comment="openvswitch-devel is &lt;2.14.2-150400.24.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847665" version="1" comment="openvswitch-doc is &lt;2.14.2-150400.24.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847666" version="1" comment="openvswitch-ipsec is &lt;2.14.2-150400.24.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847667" version="1" comment="openvswitch-pki is &lt;2.14.2-150400.24.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847668" version="1" comment="openvswitch-test is &lt;2.14.2-150400.24.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847669" version="1" comment="openvswitch-vtep is &lt;2.14.2-150400.24.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847670" version="1" comment="ovn is &lt;20.06.2-150400.24.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847671" version="1" comment="ovn-central is &lt;20.06.2-150400.24.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847672" version="1" comment="ovn-devel is &lt;20.06.2-150400.24.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847673" version="1" comment="ovn-doc is &lt;20.06.2-150400.24.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847674" version="1" comment="ovn-docker is &lt;20.06.2-150400.24.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847675" version="1" comment="ovn-host is &lt;20.06.2-150400.24.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847676" version="1" comment="ovn-vtep is &lt;20.06.2-150400.24.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847677" version="1" comment="python3-ovs is &lt;2.14.2-150400.24.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847678" version="1" comment="libxml2-2 is &lt;2.10.3-150500.5.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847679" version="1" comment="libxml2-2-32bit is &lt;2.10.3-150500.5.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847680" version="1" comment="libxml2-devel is &lt;2.10.3-150500.5.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847681" version="1" comment="libxml2-devel-32bit is &lt;2.10.3-150500.5.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847682" version="1" comment="libxml2-doc is &lt;2.10.3-150500.5.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847683" version="1" comment="libxml2-tools is &lt;2.10.3-150500.5.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847684" version="1" comment="python3-libxml2 is &lt;2.10.3-150500.5.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847685" version="1" comment="python311-libxml2 is &lt;2.10.3-150500.5.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847686" version="1" comment="python3-pycryptodomex is &lt;3.9.9-150300.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847687" version="1" comment="libssh2-1 is &lt;1.11.0-150000.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847688" version="1" comment="libssh2-1-32bit is &lt;1.11.0-150000.4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009847689" version="1" comment="libssh2-devel is &lt;1.11.0-150000.4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848338" version="1" comment="maven-archiver is &lt;3.6.1-150200.3.7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848339" version="1" comment="maven-archiver-javadoc is &lt;3.6.1-150200.3.7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848340" version="1" comment="maven-assembly-plugin is &lt;3.6.0-150200.3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848341" version="1" comment="maven-assembly-plugin-javadoc is &lt;3.6.0-150200.3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848342" version="1" comment="maven-common-artifact-filters is &lt;3.3.2-150200.3.7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848343" version="1" comment="maven-common-artifact-filters-javadoc is &lt;3.3.2-150200.3.7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848344" version="1" comment="maven-compiler-plugin is &lt;3.11.0-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848345" version="1" comment="maven-compiler-plugin-bootstrap is &lt;3.11.0-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848346" version="1" comment="maven-compiler-plugin-javadoc is &lt;3.11.0-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848347" version="1" comment="maven-dependency-analyzer is &lt;1.13.2-150200.3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848348" version="1" comment="maven-dependency-analyzer-javadoc is &lt;1.13.2-150200.3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848349" version="1" comment="maven-dependency-plugin is &lt;3.6.0-150200.3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848350" version="1" comment="maven-dependency-plugin-javadoc is &lt;3.6.0-150200.3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848351" version="1" comment="maven-dependency-tree is &lt;3.2.1-150200.3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848352" version="1" comment="maven-dependency-tree-javadoc is &lt;3.2.1-150200.3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848353" version="1" comment="maven-enforcer is &lt;3.4.1-150200.3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848354" version="1" comment="maven-enforcer-api is &lt;3.4.1-150200.3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848355" version="1" comment="maven-enforcer-javadoc is &lt;3.4.1-150200.3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848356" version="1" comment="maven-enforcer-plugin is &lt;3.4.1-150200.3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848357" version="1" comment="maven-enforcer-rules is &lt;3.4.1-150200.3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848358" version="1" comment="maven-plugin-annotations is &lt;3.9.0-150200.3.7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848359" version="1" comment="maven-plugin-plugin is &lt;3.9.0-150200.3.7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848360" version="1" comment="maven-plugin-plugin-bootstrap is &lt;3.9.0-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848361" version="1" comment="maven-plugin-plugin-javadoc is &lt;3.9.0-150200.3.7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848362" version="1" comment="maven-plugin-tools-annotations is &lt;3.9.0-150200.3.7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848363" version="1" comment="maven-plugin-tools-ant is &lt;3.9.0-150200.3.7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848364" version="1" comment="maven-plugin-tools-api is &lt;3.9.0-150200.3.7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848365" version="1" comment="maven-plugin-tools-beanshell is &lt;3.9.0-150200.3.7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848366" version="1" comment="maven-plugin-tools-generators is &lt;3.9.0-150200.3.7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848367" version="1" comment="maven-plugin-tools-java is &lt;3.9.0-150200.3.7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848368" version="1" comment="maven-plugin-tools-javadoc is &lt;3.9.0-150200.3.7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848369" version="1" comment="maven-plugin-tools-model is &lt;3.9.0-150200.3.7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848370" version="1" comment="maven-script-ant is &lt;3.9.0-150200.3.7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848371" version="1" comment="maven-script-beanshell is &lt;3.9.0-150200.3.7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848372" version="1" comment="objectweb-asm is &lt;9.6-150200.3.11.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848373" version="1" comment="objectweb-asm-javadoc is &lt;9.6-150200.3.11.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848374" version="1" comment="plexus-archiver is &lt;4.8.0-150200.3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848375" version="1" comment="plexus-archiver-javadoc is &lt;4.8.0-150200.3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848376" version="1" comment="plexus-compiler is &lt;2.14.2-150200.3.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848377" version="1" comment="plexus-compiler-extras is &lt;2.14.2-150200.3.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848378" version="1" comment="plexus-compiler-javadoc is &lt;2.14.2-150200.3.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801087" version="1" comment="eclipse-jgit is &lt;5.11.0-150200.3.15.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801090" version="1" comment="jsch is &lt;0.2.9-150200.11.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801091" version="1" comment="jsch-demo is &lt;0.2.9-150200.11.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009801092" version="1" comment="jsch-javadoc is &lt;0.2.9-150200.11.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848273" version="1" comment="abseil-cpp-devel is &lt;20230802.1-150400.10.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848274" version="1" comment="grpc-devel is &lt;1.60.0-150400.8.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848275" version="1" comment="grpc-source is &lt;1.60.0-150400.8.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848276" version="1" comment="libabsl2308_0_0 is &lt;20230802.1-150400.10.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848277" version="1" comment="libabsl2308_0_0-32bit is &lt;20230802.1-150400.10.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848278" version="1" comment="libgrpc++1_60 is &lt;1.60.0-150400.8.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848279" version="1" comment="libgrpc1_60 is &lt;1.60.0-150400.8.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848280" version="1" comment="libgrpc37 is &lt;1.60.0-150400.8.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848281" version="1" comment="libprotobuf-lite25_1_0 is &lt;25.1-150400.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848282" version="1" comment="libprotobuf-lite25_1_0-32bit is &lt;25.1-150400.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848283" version="1" comment="libprotobuf25_1_0 is &lt;25.1-150400.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848284" version="1" comment="libprotobuf25_1_0-32bit is &lt;25.1-150400.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848285" version="1" comment="libprotoc25_1_0 is &lt;25.1-150400.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848286" version="1" comment="libprotoc25_1_0-32bit is &lt;25.1-150400.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848287" version="1" comment="libre2-11 is &lt;20240201-150400.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848288" version="1" comment="libre2-11-32bit is &lt;20240201-150400.9.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848289" version="1" comment="libupb37 is &lt;1.60.0-150400.8.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848290" version="1" comment="opencensus-proto-source is &lt;0.3.0+git.20200721-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848291" version="1" comment="protobuf-devel is &lt;25.1-150400.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848292" version="1" comment="protobuf-java is &lt;25.1-150400.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848293" version="1" comment="python311-abseil is &lt;1.4.0-150400.9.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848294" version="1" comment="python311-grpcio is &lt;1.60.0-150400.9.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848295" version="1" comment="python311-protobuf is &lt;4.25.1-150400.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848296" version="1" comment="re2-devel is &lt;20240201-150400.9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848297" version="1" comment="upb-devel is &lt;1.60.0-150400.8.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848298" version="1" comment="bind is &lt;9.16.48-150500.8.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848299" version="1" comment="bind-doc is &lt;9.16.48-150500.8.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848300" version="1" comment="bind-utils is &lt;9.16.48-150500.8.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848301" version="1" comment="python3-bind is &lt;9.16.48-150500.8.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848302" version="1" comment="python311-aiohttp is &lt;3.9.3-150400.10.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818576" version="1" comment="libwireshark15 is &lt;3.6.20-150000.3.109.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818577" version="1" comment="libwiretap12 is &lt;3.6.20-150000.3.109.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818578" version="1" comment="libwsutil13 is &lt;3.6.20-150000.3.109.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818579" version="1" comment="wireshark is &lt;3.6.20-150000.3.109.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818580" version="1" comment="wireshark-devel is &lt;3.6.20-150000.3.109.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818581" version="1" comment="wireshark-ui-qt is &lt;3.6.20-150000.3.109.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848303" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848304" version="1" comment="libpython3_6m1_0-32bit is &lt;3.6.15-150300.10.54.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848305" version="1" comment="python3 is &lt;3.6.15-150300.10.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848306" version="1" comment="python3-base is &lt;3.6.15-150300.10.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848307" version="1" comment="python3-curses is &lt;3.6.15-150300.10.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848308" version="1" comment="python3-dbm is &lt;3.6.15-150300.10.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848309" version="1" comment="python3-devel is &lt;3.6.15-150300.10.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848310" version="1" comment="python3-doc is &lt;3.6.15-150300.10.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848311" version="1" comment="python3-doc-devhelp is &lt;3.6.15-150300.10.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848312" version="1" comment="python3-idle is &lt;3.6.15-150300.10.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848313" version="1" comment="python3-testsuite is &lt;3.6.15-150300.10.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848314" version="1" comment="python3-tk is &lt;3.6.15-150300.10.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848315" version="1" comment="python3-tools is &lt;3.6.15-150300.10.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848579" version="1" comment="docker is &lt;24.0.7_ce-150000.193.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848580" version="1" comment="docker-bash-completion is &lt;24.0.7_ce-150000.193.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848581" version="1" comment="docker-fish-completion is &lt;24.0.7_ce-150000.193.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848582" version="1" comment="docker-rootless-extras is &lt;24.0.7_ce-150000.193.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848583" version="1" comment="docker-zsh-completion is &lt;24.0.7_ce-150000.193.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848584" version="1" comment="python3-uamqp is &lt;1.5.3-150100.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848585" version="1" comment="php-composer2 is &lt;2.2.3-150400.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848586" version="1" comment="libtiff-devel is &lt;4.0.9-150000.45.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848587" version="1" comment="libtiff-devel-32bit is &lt;4.0.9-150000.45.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848588" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848589" version="1" comment="libtiff5-32bit is &lt;4.0.9-150000.45.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848590" version="1" comment="tiff is &lt;4.0.9-150000.45.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848591" version="1" comment="libpython3_10-1_0 is &lt;3.10.13-150400.4.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848592" version="1" comment="libpython3_10-1_0-32bit is &lt;3.10.13-150400.4.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848593" version="1" comment="python310 is &lt;3.10.13-150400.4.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848594" version="1" comment="python310-32bit is &lt;3.10.13-150400.4.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848595" version="1" comment="python310-base is &lt;3.10.13-150400.4.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848596" version="1" comment="python310-base-32bit is &lt;3.10.13-150400.4.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848597" version="1" comment="python310-curses is &lt;3.10.13-150400.4.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848598" version="1" comment="python310-dbm is &lt;3.10.13-150400.4.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848599" version="1" comment="python310-devel is &lt;3.10.13-150400.4.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848600" version="1" comment="python310-doc is &lt;3.10.13-150400.4.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848601" version="1" comment="python310-doc-devhelp is &lt;3.10.13-150400.4.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848602" version="1" comment="python310-idle is &lt;3.10.13-150400.4.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848603" version="1" comment="python310-testsuite is &lt;3.10.13-150400.4.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848604" version="1" comment="python310-tk is &lt;3.10.13-150400.4.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848605" version="1" comment="python310-tools is &lt;3.10.13-150400.4.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848606" version="1" comment="openssh is &lt;8.4p1-150300.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848607" version="1" comment="openssh-askpass-gnome is &lt;8.4p1-150300.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848608" version="1" comment="openssh-cavs is &lt;8.4p1-150300.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848609" version="1" comment="openssh-clients is &lt;8.4p1-150300.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848610" version="1" comment="openssh-common is &lt;8.4p1-150300.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848611" version="1" comment="openssh-fips is &lt;8.4p1-150300.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848612" version="1" comment="openssh-helpers is &lt;8.4p1-150300.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848613" version="1" comment="openssh-server is &lt;8.4p1-150300.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848614" version="1" comment="libfreebl3 is &lt;3.90.2-150400.3.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848615" version="1" comment="libfreebl3-32bit is &lt;3.90.2-150400.3.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848616" version="1" comment="libsoftokn3 is &lt;3.90.2-150400.3.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848617" version="1" comment="libsoftokn3-32bit is &lt;3.90.2-150400.3.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848618" version="1" comment="mozilla-nss is &lt;3.90.2-150400.3.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848619" version="1" comment="mozilla-nss-32bit is &lt;3.90.2-150400.3.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848620" version="1" comment="mozilla-nss-certs is &lt;3.90.2-150400.3.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848621" version="1" comment="mozilla-nss-certs-32bit is &lt;3.90.2-150400.3.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848622" version="1" comment="mozilla-nss-devel is &lt;3.90.2-150400.3.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848623" version="1" comment="mozilla-nss-sysinit is &lt;3.90.2-150400.3.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848624" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.90.2-150400.3.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848625" version="1" comment="mozilla-nss-tools is &lt;3.90.2-150400.3.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817534" version="1" comment="libssh2-1 is &lt;1.11.0-150000.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817535" version="1" comment="libssh2-1-32bit is &lt;1.11.0-150000.4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817536" version="1" comment="libssh2-devel is &lt;1.11.0-150000.4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848772" version="1" comment="python3-pycryptodome is &lt;3.9.0-150200.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848773" version="1" comment="MozillaFirefox is &lt;115.8.0-150200.152.126.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848774" version="1" comment="MozillaFirefox-branding-upstream is &lt;115.8.0-150200.152.126.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848775" version="1" comment="MozillaFirefox-devel is &lt;115.8.0-150200.152.126.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848776" version="1" comment="MozillaFirefox-translations-common is &lt;115.8.0-150200.152.126.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848777" version="1" comment="MozillaFirefox-translations-other is &lt;115.8.0-150200.152.126.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848778" version="1" comment="MozillaThunderbird is &lt;115.8.0-150200.8.148.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848779" version="1" comment="MozillaThunderbird-translations-common is &lt;115.8.0-150200.8.148.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848780" version="1" comment="MozillaThunderbird-translations-other is &lt;115.8.0-150200.8.148.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848915" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr8.20-150000.3.86.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848916" version="1" comment="java-1_8_0-ibm-32bit is &lt;1.8.0_sr8.20-150000.3.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848917" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr8.20-150000.3.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848918" version="1" comment="java-1_8_0-ibm-demo is &lt;1.8.0_sr8.20-150000.3.86.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848919" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr8.20-150000.3.86.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848920" version="1" comment="java-1_8_0-ibm-devel-32bit is &lt;1.8.0_sr8.20-150000.3.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848921" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr8.20-150000.3.86.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848922" version="1" comment="java-1_8_0-ibm-src is &lt;1.8.0_sr8.20-150000.3.86.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818521" version="1" comment="libQt6Concurrent6 is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818522" version="1" comment="libQt6Core6 is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818523" version="1" comment="libQt6DBus6 is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818524" version="1" comment="libQt6Gui6 is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818525" version="1" comment="libQt6Network6 is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818526" version="1" comment="libQt6OpenGL6 is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818527" version="1" comment="libQt6OpenGLWidgets6 is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818528" version="1" comment="libQt6PrintSupport6 is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818529" version="1" comment="libQt6Sql6 is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818530" version="1" comment="libQt6Test6 is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818531" version="1" comment="libQt6Widgets6 is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818532" version="1" comment="libQt6Xml6 is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818533" version="1" comment="qt6-base-common-devel is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818534" version="1" comment="qt6-base-devel is &lt;6.4.2-150500.3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818535" version="1" comment="qt6-base-docs-html is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818536" version="1" comment="qt6-base-docs-qch is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818537" version="1" comment="qt6-base-examples is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818538" version="1" comment="qt6-base-private-devel is &lt;6.4.2-150500.3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818539" version="1" comment="qt6-concurrent-devel is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818540" version="1" comment="qt6-core-devel is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818541" version="1" comment="qt6-core-private-devel is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818542" version="1" comment="qt6-dbus-devel is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818543" version="1" comment="qt6-dbus-private-devel is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818544" version="1" comment="qt6-docs-common is &lt;6.4.2-150500.3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818545" version="1" comment="qt6-gui-devel is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818546" version="1" comment="qt6-gui-private-devel is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818547" version="1" comment="qt6-kmssupport-devel-static is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818548" version="1" comment="qt6-kmssupport-private-devel is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818549" version="1" comment="qt6-network-devel is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818550" version="1" comment="qt6-network-private-devel is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818551" version="1" comment="qt6-network-tls is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818552" version="1" comment="qt6-networkinformation-glib is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818553" version="1" comment="qt6-networkinformation-nm is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818554" version="1" comment="qt6-opengl-devel is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818555" version="1" comment="qt6-opengl-private-devel is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818556" version="1" comment="qt6-openglwidgets-devel is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818557" version="1" comment="qt6-platformsupport-devel-static is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818558" version="1" comment="qt6-platformsupport-private-devel is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818559" version="1" comment="qt6-platformtheme-gtk3 is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818560" version="1" comment="qt6-platformtheme-xdgdesktopportal is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818561" version="1" comment="qt6-printsupport-cups is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818562" version="1" comment="qt6-printsupport-devel is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818563" version="1" comment="qt6-printsupport-private-devel is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818564" version="1" comment="qt6-sql-devel is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818565" version="1" comment="qt6-sql-mysql is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818566" version="1" comment="qt6-sql-postgresql is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818567" version="1" comment="qt6-sql-private-devel is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818568" version="1" comment="qt6-sql-sqlite is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818569" version="1" comment="qt6-sql-unixODBC is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818570" version="1" comment="qt6-test-devel is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818571" version="1" comment="qt6-test-private-devel is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818572" version="1" comment="qt6-widgets-devel is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818573" version="1" comment="qt6-widgets-private-devel is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818574" version="1" comment="qt6-xml-devel is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818575" version="1" comment="qt6-xml-private-devel is &lt;6.4.2-150500.3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848999" version="1" comment="gnutls is &lt;3.7.3-150400.4.41.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849000" version="1" comment="gnutls-guile is &lt;3.7.3-150400.4.41.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849001" version="1" comment="libgnutls-devel is &lt;3.7.3-150400.4.41.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849002" version="1" comment="libgnutls-devel-32bit is &lt;3.7.3-150400.4.41.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849003" version="1" comment="libgnutls30 is &lt;3.7.3-150400.4.41.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849004" version="1" comment="libgnutls30-32bit is &lt;3.7.3-150400.4.41.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849005" version="1" comment="libgnutls30-hmac is &lt;3.7.3-150400.4.41.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849006" version="1" comment="libgnutls30-hmac-32bit is &lt;3.7.3-150400.4.41.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849007" version="1" comment="libgnutlsxx-devel is &lt;3.7.3-150400.4.41.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849008" version="1" comment="libgnutlsxx28 is &lt;3.7.3-150400.4.41.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849070" version="1" comment="corepack20 is &lt;20.11.1-150500.11.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849071" version="1" comment="nodejs20 is &lt;20.11.1-150500.11.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849072" version="1" comment="nodejs20-devel is &lt;20.11.1-150500.11.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849073" version="1" comment="nodejs20-docs is &lt;20.11.1-150500.11.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849074" version="1" comment="npm20 is &lt;20.11.1-150500.11.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849206" version="1" comment="freerdp is &lt;2.4.0-150400.3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849207" version="1" comment="freerdp-devel is &lt;2.4.0-150400.3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849208" version="1" comment="freerdp-proxy is &lt;2.4.0-150400.3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849209" version="1" comment="freerdp-server is &lt;2.4.0-150400.3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849210" version="1" comment="freerdp-wayland is &lt;2.4.0-150400.3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849211" version="1" comment="libfreerdp2 is &lt;2.4.0-150400.3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849212" version="1" comment="libuwac0-0 is &lt;2.4.0-150400.3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849213" version="1" comment="libwinpr2 is &lt;2.4.0-150400.3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849214" version="1" comment="uwac0-0-devel is &lt;2.4.0-150400.3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849215" version="1" comment="winpr2-devel is &lt;2.4.0-150400.3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849216" version="1" comment="rear27a is &lt;2.7-150500.3.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816485" version="1" comment="tar is &lt;1.34-150000.3.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816486" version="1" comment="tar-backup-scripts is &lt;1.34-150000.3.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816487" version="1" comment="tar-doc is &lt;1.34-150000.3.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816488" version="1" comment="tar-lang is &lt;1.34-150000.3.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816489" version="1" comment="tar-rmt is &lt;1.34-150000.3.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816490" version="1" comment="tar-tests is &lt;1.34-150000.3.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849491" version="1" comment="apache-commons-codec is &lt;1.16.1-150200.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849492" version="1" comment="apache-commons-codec-javadoc is &lt;1.16.1-150200.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849493" version="1" comment="apache-commons-compress is &lt;1.26.0-150200.3.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849494" version="1" comment="apache-commons-compress-javadoc is &lt;1.26.0-150200.3.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849495" version="1" comment="apache-commons-configuration2 is &lt;2.9.0-150200.5.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849496" version="1" comment="apache-commons-configuration2-javadoc is &lt;2.9.0-150200.5.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849497" version="1" comment="apache-commons-io is &lt;2.15.1-150200.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849498" version="1" comment="apache-commons-io-javadoc is &lt;2.15.1-150200.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849499" version="1" comment="gradle-local is &lt;6.2.0-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849500" version="1" comment="ivy-local is &lt;6.2.0-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849501" version="1" comment="maven is &lt;3.9.6-150200.4.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849502" version="1" comment="maven-assembly-plugin is &lt;3.6.0-150200.3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849503" version="1" comment="maven-assembly-plugin-javadoc is &lt;3.6.0-150200.3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849504" version="1" comment="maven-doxia-core is &lt;1.12.0-150200.4.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849505" version="1" comment="maven-doxia-javadoc is &lt;1.12.0-150200.4.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849506" version="1" comment="maven-doxia-logging-api is &lt;1.12.0-150200.4.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849507" version="1" comment="maven-doxia-module-apt is &lt;1.12.0-150200.4.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849508" version="1" comment="maven-doxia-module-confluence is &lt;1.12.0-150200.4.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849509" version="1" comment="maven-doxia-module-docbook-simple is &lt;1.12.0-150200.4.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849510" version="1" comment="maven-doxia-module-fml is &lt;1.12.0-150200.4.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849511" version="1" comment="maven-doxia-module-fo is &lt;1.12.0-150200.4.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849512" version="1" comment="maven-doxia-module-latex is &lt;1.12.0-150200.4.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849513" version="1" comment="maven-doxia-module-rtf is &lt;1.12.0-150200.4.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849514" version="1" comment="maven-doxia-module-twiki is &lt;1.12.0-150200.4.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849515" version="1" comment="maven-doxia-module-xdoc is &lt;1.12.0-150200.4.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849516" version="1" comment="maven-doxia-module-xhtml is &lt;1.12.0-150200.4.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849517" version="1" comment="maven-doxia-module-xhtml5 is &lt;1.12.0-150200.4.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849518" version="1" comment="maven-doxia-sink-api is &lt;1.12.0-150200.4.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849519" version="1" comment="maven-doxia-sitetools is &lt;1.11.1-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849520" version="1" comment="maven-doxia-sitetools-javadoc is &lt;1.11.1-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849521" version="1" comment="maven-doxia-test-docs is &lt;1.12.0-150200.4.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849522" version="1" comment="maven-jar-plugin is &lt;3.3.0-150200.3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849523" version="1" comment="maven-jar-plugin-bootstrap is &lt;3.3.0-150200.3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849524" version="1" comment="maven-jar-plugin-javadoc is &lt;3.3.0-150200.3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849525" version="1" comment="maven-javadoc is &lt;3.9.6-150200.4.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849526" version="1" comment="maven-javadoc-plugin is &lt;3.6.0-150200.4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849527" version="1" comment="maven-javadoc-plugin-bootstrap is &lt;3.6.0-150200.4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849528" version="1" comment="maven-javadoc-plugin-javadoc is &lt;3.6.0-150200.4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849529" version="1" comment="maven-lib is &lt;3.9.6-150200.4.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849530" version="1" comment="maven-local is &lt;6.2.0-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849531" version="1" comment="maven-reporting-api is &lt;3.1.1-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849532" version="1" comment="maven-reporting-api-javadoc is &lt;3.1.1-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849533" version="1" comment="maven-reporting-impl is &lt;3.2.0-150200.4.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849534" version="1" comment="maven-reporting-impl-javadoc is &lt;3.2.0-150200.4.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849535" version="1" comment="maven-resolver is &lt;1.9.18-150200.3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849536" version="1" comment="maven-resolver-api is &lt;1.9.18-150200.3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849537" version="1" comment="maven-resolver-connector-basic is &lt;1.9.18-150200.3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849538" version="1" comment="maven-resolver-impl is &lt;1.9.18-150200.3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849539" version="1" comment="maven-resolver-javadoc is &lt;1.9.18-150200.3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849540" version="1" comment="maven-resolver-named-locks is &lt;1.9.18-150200.3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849541" version="1" comment="maven-resolver-spi is &lt;1.9.18-150200.3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849542" version="1" comment="maven-resolver-test-util is &lt;1.9.18-150200.3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849543" version="1" comment="maven-resolver-transport-classpath is &lt;1.9.18-150200.3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849544" version="1" comment="maven-resolver-transport-file is &lt;1.9.18-150200.3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849545" version="1" comment="maven-resolver-transport-http is &lt;1.9.18-150200.3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849546" version="1" comment="maven-resolver-transport-wagon is &lt;1.9.18-150200.3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849547" version="1" comment="maven-resolver-util is &lt;1.9.18-150200.3.17.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849548" version="1" comment="maven-resources-plugin is &lt;3.3.1-150200.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849549" version="1" comment="maven-resources-plugin-bootstrap is &lt;3.3.1-150200.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849550" version="1" comment="maven-resources-plugin-javadoc is &lt;3.3.1-150200.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849551" version="1" comment="sbt is &lt;0.13.18-150200.4.19.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849552" version="1" comment="sbt-bootstrap is &lt;0.13.18-150200.4.19.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849553" version="1" comment="xmvn is &lt;4.2.0-150200.3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849554" version="1" comment="xmvn-api is &lt;4.2.0-150200.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849555" version="1" comment="xmvn-connector is &lt;4.2.0-150200.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849556" version="1" comment="xmvn-connector-javadoc is &lt;4.2.0-150200.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849557" version="1" comment="xmvn-core is &lt;4.2.0-150200.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849558" version="1" comment="xmvn-install is &lt;4.2.0-150200.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849559" version="1" comment="xmvn-minimal is &lt;4.2.0-150200.3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849560" version="1" comment="xmvn-mojo is &lt;4.2.0-150200.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849561" version="1" comment="xmvn-mojo-javadoc is &lt;4.2.0-150200.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849562" version="1" comment="xmvn-parent is &lt;4.2.0-150200.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849563" version="1" comment="xmvn-resolve is &lt;4.2.0-150200.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849564" version="1" comment="xmvn-subst is &lt;4.2.0-150200.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849565" version="1" comment="xmvn-tools-javadoc is &lt;4.2.0-150200.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849566" version="1" comment="corepack18 is &lt;18.19.1-150400.9.18.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849567" version="1" comment="nodejs18 is &lt;18.19.1-150400.9.18.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849568" version="1" comment="nodejs18-devel is &lt;18.19.1-150400.9.18.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849569" version="1" comment="nodejs18-docs is &lt;18.19.1-150400.9.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849570" version="1" comment="npm18 is &lt;18.19.1-150400.9.18.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849722" version="1" comment="libopenvswitch-3_1-0 is &lt;3.1.0-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849723" version="1" comment="libovn-23_03-0 is &lt;23.03.0-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849724" version="1" comment="openvswitch3 is &lt;3.1.0-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849725" version="1" comment="openvswitch3-devel is &lt;3.1.0-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849726" version="1" comment="openvswitch3-doc is &lt;3.1.0-150500.3.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849727" version="1" comment="openvswitch3-ipsec is &lt;3.1.0-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849728" version="1" comment="openvswitch3-pki is &lt;3.1.0-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849729" version="1" comment="openvswitch3-test is &lt;3.1.0-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849730" version="1" comment="openvswitch3-vtep is &lt;3.1.0-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849731" version="1" comment="ovn3 is &lt;23.03.0-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849732" version="1" comment="ovn3-central is &lt;23.03.0-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849733" version="1" comment="ovn3-devel is &lt;23.03.0-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849734" version="1" comment="ovn3-doc is &lt;23.03.0-150500.3.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849735" version="1" comment="ovn3-docker is &lt;23.03.0-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849736" version="1" comment="ovn3-host is &lt;23.03.0-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849737" version="1" comment="ovn3-vtep is &lt;23.03.0-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849738" version="1" comment="python3-ovs3 is &lt;3.1.0-150500.3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849739" version="1" comment="libmilter-doc is &lt;8.15.2-150000.8.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849740" version="1" comment="libmilter1_0 is &lt;8.15.2-150000.8.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849741" version="1" comment="rmail is &lt;8.15.2-150000.8.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849742" version="1" comment="sendmail is &lt;8.15.2-150000.8.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849743" version="1" comment="sendmail-devel is &lt;8.15.2-150000.8.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849744" version="1" comment="sendmail-starttls is &lt;8.15.2-150000.8.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849745" version="1" comment="apache2-mod_auth_openidc is &lt;2.3.8-150100.3.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815954" version="1" comment="hawk2 is &lt;2.6.4+git.1702030539.5fb7d91b-150000.3.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849746" version="1" comment="python311-cryptography is &lt;41.0.3-150400.16.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849747" version="1" comment="wpa_supplicant is &lt;2.10-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849748" version="1" comment="wpa_supplicant-gui is &lt;2.10-150500.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849749" version="1" comment="ruby2.5-rubygem-rack is &lt;2.0.8-150000.3.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849750" version="1" comment="ruby2.5-rubygem-rack-doc is &lt;2.0.8-150000.3.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849751" version="1" comment="ruby2.5-rubygem-rack-testsuite is &lt;2.0.8-150000.3.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849752" version="1" comment="kernel-firmware-nvidia-gspx-G06 is &lt;550.54.14-150500.11.18.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849753" version="1" comment="nvidia-open-driver-G06-signed-64kb-devel is &lt;550.54.14-150500.3.36.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849754" version="1" comment="nvidia-open-driver-G06-signed-azure-devel is &lt;550.54.14-150500.3.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849755" version="1" comment="nvidia-open-driver-G06-signed-default-devel is &lt;550.54.14-150500.3.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849756" version="1" comment="nvidia-open-driver-G06-signed-kmp-64kb is &lt;550.54.14_k5.14.21_150500.55.49-150500.3.36.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849757" version="1" comment="nvidia-open-driver-G06-signed-kmp-azure is &lt;550.54.14_k5.14.21_150500.33.34-150500.3.36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849758" version="1" comment="nvidia-open-driver-G06-signed-kmp-default is &lt;550.54.14_k5.14.21_150500.55.49-150500.3.36.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849759" version="1" comment="postgresql-jdbc is &lt;42.2.25-150400.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849760" version="1" comment="postgresql-jdbc-javadoc is &lt;42.2.25-150400.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849893" version="1" comment="libpython3_11-1_0 is &lt;3.11.8-150400.9.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849894" version="1" comment="libpython3_11-1_0-32bit is &lt;3.11.8-150400.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849895" version="1" comment="python311 is &lt;3.11.8-150400.9.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849896" version="1" comment="python311-32bit is &lt;3.11.8-150400.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849897" version="1" comment="python311-base is &lt;3.11.8-150400.9.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849898" version="1" comment="python311-base-32bit is &lt;3.11.8-150400.9.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849899" version="1" comment="python311-curses is &lt;3.11.8-150400.9.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849900" version="1" comment="python311-dbm is &lt;3.11.8-150400.9.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849901" version="1" comment="python311-devel is &lt;3.11.8-150400.9.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849902" version="1" comment="python311-doc is &lt;3.11.8-150400.9.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849903" version="1" comment="python311-doc-devhelp is &lt;3.11.8-150400.9.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849904" version="1" comment="python311-idle is &lt;3.11.8-150400.9.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849905" version="1" comment="python311-testsuite is &lt;3.11.8-150400.9.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849906" version="1" comment="python311-tk is &lt;3.11.8-150400.9.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849907" version="1" comment="python311-tools is &lt;3.11.8-150400.9.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849950" version="1" comment="libpython3_9-1_0 is &lt;3.9.18-150300.4.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849951" version="1" comment="libpython3_9-1_0-32bit is &lt;3.9.18-150300.4.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849952" version="1" comment="python39 is &lt;3.9.18-150300.4.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849953" version="1" comment="python39-32bit is &lt;3.9.18-150300.4.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849954" version="1" comment="python39-base is &lt;3.9.18-150300.4.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849955" version="1" comment="python39-base-32bit is &lt;3.9.18-150300.4.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849956" version="1" comment="python39-curses is &lt;3.9.18-150300.4.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849957" version="1" comment="python39-dbm is &lt;3.9.18-150300.4.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849958" version="1" comment="python39-devel is &lt;3.9.18-150300.4.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849959" version="1" comment="python39-doc is &lt;3.9.18-150300.4.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849960" version="1" comment="python39-doc-devhelp is &lt;3.9.18-150300.4.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849961" version="1" comment="python39-idle is &lt;3.9.18-150300.4.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849962" version="1" comment="python39-testsuite is &lt;3.9.18-150300.4.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849963" version="1" comment="python39-tk is &lt;3.9.18-150300.4.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849964" version="1" comment="python39-tools is &lt;3.9.18-150300.4.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849965" version="1" comment="giflib-devel is &lt;5.2.2-150000.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849966" version="1" comment="giflib-devel-32bit is &lt;5.2.2-150000.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849967" version="1" comment="giflib-progs is &lt;5.2.2-150000.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849968" version="1" comment="libgif7 is &lt;5.2.2-150000.4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849969" version="1" comment="libgif7-32bit is &lt;5.2.2-150000.4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850240" version="1" comment="google-oauth-java-client is &lt;1.22.0-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850241" version="1" comment="google-oauth-java-client-java6 is &lt;1.22.0-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850242" version="1" comment="google-oauth-java-client-javadoc is &lt;1.22.0-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850243" version="1" comment="google-oauth-java-client-parent is &lt;1.22.0-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850244" version="1" comment="google-oauth-java-client-servlet is &lt;1.22.0-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850245" version="1" comment="xmlgraphics-batik is &lt;1.17-150200.4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850246" version="1" comment="xmlgraphics-batik-css is &lt;1.17-150200.4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850247" version="1" comment="xmlgraphics-batik-demo is &lt;1.17-150200.4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850248" version="1" comment="xmlgraphics-batik-javadoc is &lt;1.17-150200.4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850249" version="1" comment="xmlgraphics-batik-rasterizer is &lt;1.17-150200.4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850250" version="1" comment="xmlgraphics-batik-slideshow is &lt;1.17-150200.4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850251" version="1" comment="xmlgraphics-batik-squiggle is &lt;1.17-150200.4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850252" version="1" comment="xmlgraphics-batik-svgpp is &lt;1.17-150200.4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850253" version="1" comment="xmlgraphics-batik-ttf2svg is &lt;1.17-150200.4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850295" version="1" comment="go1.21 is &lt;1.21.8-150000.1.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850296" version="1" comment="go1.21-doc is &lt;1.21.8-150000.1.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850297" version="1" comment="go1.21-race is &lt;1.21.8-150000.1.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850298" version="1" comment="go1.22 is &lt;1.22.1-150000.1.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850299" version="1" comment="go1.22-doc is &lt;1.22.1-150000.1.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850300" version="1" comment="go1.22-race is &lt;1.22.1-150000.1.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850301" version="1" comment="libopenssl-3-devel is &lt;3.0.8-150500.5.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850302" version="1" comment="libopenssl-3-devel-32bit is &lt;3.0.8-150500.5.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850303" version="1" comment="libopenssl3 is &lt;3.0.8-150500.5.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850304" version="1" comment="libopenssl3-32bit is &lt;3.0.8-150500.5.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850305" version="1" comment="openssl-3 is &lt;3.0.8-150500.5.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850306" version="1" comment="openssl-3-doc is &lt;3.0.8-150500.5.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850307" version="1" comment="jetty-annotations is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850308" version="1" comment="jetty-ant is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850309" version="1" comment="jetty-cdi is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850310" version="1" comment="jetty-client is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850311" version="1" comment="jetty-continuation is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850312" version="1" comment="jetty-deploy is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850313" version="1" comment="jetty-fcgi is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850314" version="1" comment="jetty-http is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850315" version="1" comment="jetty-http-spi is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850316" version="1" comment="jetty-io is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850317" version="1" comment="jetty-jaas is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850318" version="1" comment="jetty-jmx is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850319" version="1" comment="jetty-jndi is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850320" version="1" comment="jetty-jsp is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850321" version="1" comment="jetty-minimal-javadoc is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850322" version="1" comment="jetty-openid is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850323" version="1" comment="jetty-plus is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850324" version="1" comment="jetty-proxy is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850325" version="1" comment="jetty-quickstart is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850326" version="1" comment="jetty-rewrite is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850327" version="1" comment="jetty-security is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850328" version="1" comment="jetty-server is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850329" version="1" comment="jetty-servlet is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850330" version="1" comment="jetty-servlets is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850331" version="1" comment="jetty-start is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850332" version="1" comment="jetty-util is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850333" version="1" comment="jetty-util-ajax is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850334" version="1" comment="jetty-webapp is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850335" version="1" comment="jetty-xml is &lt;9.4.54-150200.3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850336" version="1" comment="libpython3_10-1_0 is &lt;3.10.13-150400.4.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850337" version="1" comment="libpython3_10-1_0-32bit is &lt;3.10.13-150400.4.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850338" version="1" comment="python310 is &lt;3.10.13-150400.4.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850339" version="1" comment="python310-32bit is &lt;3.10.13-150400.4.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850340" version="1" comment="python310-base is &lt;3.10.13-150400.4.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850341" version="1" comment="python310-base-32bit is &lt;3.10.13-150400.4.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850342" version="1" comment="python310-curses is &lt;3.10.13-150400.4.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850343" version="1" comment="python310-dbm is &lt;3.10.13-150400.4.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850344" version="1" comment="python310-devel is &lt;3.10.13-150400.4.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850345" version="1" comment="python310-doc is &lt;3.10.13-150400.4.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850346" version="1" comment="python310-doc-devhelp is &lt;3.10.13-150400.4.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850347" version="1" comment="python310-idle is &lt;3.10.13-150400.4.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850348" version="1" comment="python310-testsuite is &lt;3.10.13-150400.4.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850349" version="1" comment="python310-tk is &lt;3.10.13-150400.4.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850350" version="1" comment="python310-tools is &lt;3.10.13-150400.4.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850421" version="1" comment="xen is &lt;4.17.3_06-150500.3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850422" version="1" comment="xen-devel is &lt;4.17.3_06-150500.3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850423" version="1" comment="xen-doc-html is &lt;4.17.3_06-150500.3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850424" version="1" comment="xen-libs is &lt;4.17.3_06-150500.3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850425" version="1" comment="xen-libs-32bit is &lt;4.17.3_06-150500.3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850426" version="1" comment="xen-tools is &lt;4.17.3_06-150500.3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850427" version="1" comment="xen-tools-domU is &lt;4.17.3_06-150500.3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850428" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.17.3_06-150500.3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850429" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-150000.3.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850430" version="1" comment="libopenssl-1_0_0-devel-32bit is &lt;1.0.2p-150000.3.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850431" version="1" comment="libopenssl10 is &lt;1.0.2p-150000.3.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850432" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-150000.3.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850433" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2p-150000.3.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850434" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2p-150000.3.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850435" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2p-150000.3.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850436" version="1" comment="libopenssl1_0_0-steam is &lt;1.0.2p-150000.3.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850437" version="1" comment="libopenssl1_0_0-steam-32bit is &lt;1.0.2p-150000.3.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850438" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-150000.3.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850439" version="1" comment="openssl-1_0_0-cavs is &lt;1.0.2p-150000.3.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850440" version="1" comment="openssl-1_0_0-doc is &lt;1.0.2p-150000.3.91.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850474" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.402-150000.3.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850475" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.402-150000.3.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850476" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.402-150000.3.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850477" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.402-150000.3.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850478" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.402-150000.3.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850479" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.402-150000.3.88.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850480" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.402-150000.3.88.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850481" version="1" comment="axis is &lt;1.4-150200.13.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850482" version="1" comment="axis-manual is &lt;1.4-150200.13.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850483" version="1" comment="cluster-md-kmp-azure is &lt;5.14.21-150500.33.37.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850484" version="1" comment="dlm-kmp-azure is &lt;5.14.21-150500.33.37.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850485" version="1" comment="gfs2-kmp-azure is &lt;5.14.21-150500.33.37.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850486" version="1" comment="kernel-azure is &lt;5.14.21-150500.33.37.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850487" version="1" comment="kernel-azure-devel is &lt;5.14.21-150500.33.37.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850488" version="1" comment="kernel-azure-extra is &lt;5.14.21-150500.33.37.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850489" version="1" comment="kernel-azure-livepatch-devel is &lt;5.14.21-150500.33.37.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850490" version="1" comment="kernel-azure-optional is &lt;5.14.21-150500.33.37.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850491" version="1" comment="kernel-azure-vdso is &lt;5.14.21-150500.33.37.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850492" version="1" comment="kernel-devel-azure is &lt;5.14.21-150500.33.37.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850493" version="1" comment="kernel-source-azure is &lt;5.14.21-150500.33.37.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850494" version="1" comment="kernel-syms-azure is &lt;5.14.21-150500.33.37.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850495" version="1" comment="kselftests-kmp-azure is &lt;5.14.21-150500.33.37.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850496" version="1" comment="ocfs2-kmp-azure is &lt;5.14.21-150500.33.37.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850497" version="1" comment="reiserfs-kmp-azure is &lt;5.14.21-150500.33.37.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850498" version="1" comment="cluster-md-kmp-64kb is &lt;5.14.21-150500.55.52.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850499" version="1" comment="cluster-md-kmp-default is &lt;5.14.21-150500.55.52.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850500" version="1" comment="dlm-kmp-64kb is &lt;5.14.21-150500.55.52.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850501" version="1" comment="dlm-kmp-default is &lt;5.14.21-150500.55.52.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850502" version="1" comment="dtb-allwinner is &lt;5.14.21-150500.55.52.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850503" version="1" comment="dtb-altera is &lt;5.14.21-150500.55.52.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850504" version="1" comment="dtb-amazon is &lt;5.14.21-150500.55.52.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850505" version="1" comment="dtb-amd is &lt;5.14.21-150500.55.52.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850506" version="1" comment="dtb-amlogic is &lt;5.14.21-150500.55.52.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850507" version="1" comment="dtb-apm is &lt;5.14.21-150500.55.52.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850508" version="1" comment="dtb-apple is &lt;5.14.21-150500.55.52.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850509" version="1" comment="dtb-arm is &lt;5.14.21-150500.55.52.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850510" version="1" comment="dtb-broadcom is &lt;5.14.21-150500.55.52.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850511" version="1" comment="dtb-cavium is &lt;5.14.21-150500.55.52.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850512" version="1" comment="dtb-exynos is &lt;5.14.21-150500.55.52.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850513" version="1" comment="dtb-freescale is &lt;5.14.21-150500.55.52.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850514" version="1" comment="dtb-hisilicon is &lt;5.14.21-150500.55.52.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850515" version="1" comment="dtb-lg is &lt;5.14.21-150500.55.52.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850516" version="1" comment="dtb-marvell is &lt;5.14.21-150500.55.52.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850517" version="1" comment="dtb-mediatek is &lt;5.14.21-150500.55.52.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850518" version="1" comment="dtb-nvidia is &lt;5.14.21-150500.55.52.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850519" version="1" comment="dtb-qcom is &lt;5.14.21-150500.55.52.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850520" version="1" comment="dtb-renesas is &lt;5.14.21-150500.55.52.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850521" version="1" comment="dtb-rockchip is &lt;5.14.21-150500.55.52.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850522" version="1" comment="dtb-socionext is &lt;5.14.21-150500.55.52.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850523" version="1" comment="dtb-sprd is &lt;5.14.21-150500.55.52.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850524" version="1" comment="dtb-xilinx is &lt;5.14.21-150500.55.52.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850525" version="1" comment="gfs2-kmp-64kb is &lt;5.14.21-150500.55.52.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850526" version="1" comment="gfs2-kmp-default is &lt;5.14.21-150500.55.52.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850527" version="1" comment="kernel-64kb is &lt;5.14.21-150500.55.52.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850528" version="1" comment="kernel-64kb-devel is &lt;5.14.21-150500.55.52.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850529" version="1" comment="kernel-64kb-extra is &lt;5.14.21-150500.55.52.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850530" version="1" comment="kernel-64kb-livepatch-devel is &lt;5.14.21-150500.55.52.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850531" version="1" comment="kernel-64kb-optional is &lt;5.14.21-150500.55.52.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850532" version="1" comment="kernel-debug is &lt;5.14.21-150500.55.52.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850533" version="1" comment="kernel-debug-devel is &lt;5.14.21-150500.55.52.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850534" version="1" comment="kernel-debug-livepatch-devel is &lt;5.14.21-150500.55.52.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850535" version="1" comment="kernel-debug-vdso is &lt;5.14.21-150500.55.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850536" version="1" comment="kernel-default is &lt;5.14.21-150500.55.52.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850537" version="1" comment="kernel-default-base is &lt;5.14.21-150500.55.52.1.150500.6.23.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850538" version="1" comment="kernel-default-base-rebuild is &lt;5.14.21-150500.55.52.1.150500.6.23.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850539" version="1" comment="kernel-default-devel is &lt;5.14.21-150500.55.52.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850540" version="1" comment="kernel-default-extra is &lt;5.14.21-150500.55.52.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850541" version="1" comment="kernel-default-livepatch is &lt;5.14.21-150500.55.52.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850542" version="1" comment="kernel-default-livepatch-devel is &lt;5.14.21-150500.55.52.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850543" version="1" comment="kernel-default-optional is &lt;5.14.21-150500.55.52.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850544" version="1" comment="kernel-default-vdso is &lt;5.14.21-150500.55.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850545" version="1" comment="kernel-devel is &lt;5.14.21-150500.55.52.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850546" version="1" comment="kernel-docs is &lt;5.14.21-150500.55.52.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850547" version="1" comment="kernel-docs-html is &lt;5.14.21-150500.55.52.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850548" version="1" comment="kernel-kvmsmall is &lt;5.14.21-150500.55.52.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850549" version="1" comment="kernel-kvmsmall-devel is &lt;5.14.21-150500.55.52.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850550" version="1" comment="kernel-kvmsmall-livepatch-devel is &lt;5.14.21-150500.55.52.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850551" version="1" comment="kernel-kvmsmall-vdso is &lt;5.14.21-150500.55.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850552" version="1" comment="kernel-macros is &lt;5.14.21-150500.55.52.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850553" version="1" comment="kernel-obs-build is &lt;5.14.21-150500.55.52.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850554" version="1" comment="kernel-obs-qa is &lt;5.14.21-150500.55.52.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850555" version="1" comment="kernel-source is &lt;5.14.21-150500.55.52.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850556" version="1" comment="kernel-source-vanilla is &lt;5.14.21-150500.55.52.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850557" version="1" comment="kernel-syms is &lt;5.14.21-150500.55.52.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850558" version="1" comment="kernel-zfcpdump is &lt;5.14.21-150500.55.52.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850559" version="1" comment="kselftests-kmp-64kb is &lt;5.14.21-150500.55.52.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850560" version="1" comment="kselftests-kmp-default is &lt;5.14.21-150500.55.52.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850561" version="1" comment="ocfs2-kmp-64kb is &lt;5.14.21-150500.55.52.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850562" version="1" comment="ocfs2-kmp-default is &lt;5.14.21-150500.55.52.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850563" version="1" comment="reiserfs-kmp-64kb is &lt;5.14.21-150500.55.52.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850564" version="1" comment="reiserfs-kmp-default is &lt;5.14.21-150500.55.52.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850609" version="1" comment="fontforge is &lt;20200314-150200.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850610" version="1" comment="fontforge-devel is &lt;20200314-150200.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850611" version="1" comment="fontforge-doc is &lt;20200314-150200.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850990" version="1" comment="glibc is &lt;2.31-150300.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850991" version="1" comment="glibc-32bit is &lt;2.31-150300.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850992" version="1" comment="glibc-devel is &lt;2.31-150300.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850993" version="1" comment="glibc-devel-32bit is &lt;2.31-150300.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850994" version="1" comment="glibc-devel-static is &lt;2.31-150300.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850995" version="1" comment="glibc-devel-static-32bit is &lt;2.31-150300.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850996" version="1" comment="glibc-extra is &lt;2.31-150300.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850997" version="1" comment="glibc-html is &lt;2.31-150300.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850677" version="1" comment="glibc-i18ndata is &lt;2.31-150300.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850678" version="1" comment="glibc-info is &lt;2.31-150300.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850679" version="1" comment="glibc-lang is &lt;2.31-150300.68.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850998" version="1" comment="glibc-locale is &lt;2.31-150300.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850999" version="1" comment="glibc-locale-base is &lt;2.31-150300.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851000" version="1" comment="glibc-locale-base-32bit is &lt;2.31-150300.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851001" version="1" comment="glibc-profile is &lt;2.31-150300.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851002" version="1" comment="glibc-profile-32bit is &lt;2.31-150300.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851003" version="1" comment="glibc-utils is &lt;2.31-150300.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851004" version="1" comment="glibc-utils-32bit is &lt;2.31-150300.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851005" version="1" comment="nscd is &lt;2.31-150300.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851006" version="1" comment="sudo is &lt;1.9.12p1-150500.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851007" version="1" comment="sudo-devel is &lt;1.9.12p1-150500.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851008" version="1" comment="sudo-plugin-python is &lt;1.9.12p1-150500.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851009" version="1" comment="sudo-test is &lt;1.9.12p1-150500.7.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851037" version="1" comment="spectre-meltdown-checker is &lt;0.46-150100.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851038" version="1" comment="MozillaThunderbird is &lt;115.8.1-150200.8.151.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851039" version="1" comment="MozillaThunderbird-translations-common is &lt;115.8.1-150200.8.151.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851040" version="1" comment="MozillaThunderbird-translations-other is &lt;115.8.1-150200.8.151.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851041" version="1" comment="gdb is &lt;13.2-150400.15.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851042" version="1" comment="gdb-testresults is &lt;13.2-150400.15.14.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851043" version="1" comment="gdbserver is &lt;13.2-150400.15.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851044" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-150300.10.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851045" version="1" comment="libpython3_6m1_0-32bit is &lt;3.6.15-150300.10.57.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851046" version="1" comment="python3 is &lt;3.6.15-150300.10.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851047" version="1" comment="python3-base is &lt;3.6.15-150300.10.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851048" version="1" comment="python3-curses is &lt;3.6.15-150300.10.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851049" version="1" comment="python3-dbm is &lt;3.6.15-150300.10.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851050" version="1" comment="python3-devel is &lt;3.6.15-150300.10.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851051" version="1" comment="python3-doc is &lt;3.6.15-150300.10.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851052" version="1" comment="python3-doc-devhelp is &lt;3.6.15-150300.10.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851053" version="1" comment="python3-idle is &lt;3.6.15-150300.10.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851054" version="1" comment="python3-testsuite is &lt;3.6.15-150300.10.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851055" version="1" comment="python3-tk is &lt;3.6.15-150300.10.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851056" version="1" comment="python3-tools is &lt;3.6.15-150300.10.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851057" version="1" comment="python3-Django is &lt;2.0.7-150000.1.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851426" version="1" comment="389-ds is &lt;2.2.8~git65.347aae6-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851427" version="1" comment="389-ds-devel is &lt;2.2.8~git65.347aae6-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851428" version="1" comment="389-ds-snmp is &lt;2.2.8~git65.347aae6-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851429" version="1" comment="lib389 is &lt;2.2.8~git65.347aae6-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851430" version="1" comment="libsvrcore0 is &lt;2.2.8~git65.347aae6-150500.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851431" version="1" comment="cluster-md-kmp-rt is &lt;5.14.21-150500.13.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851432" version="1" comment="dlm-kmp-rt is &lt;5.14.21-150500.13.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851433" version="1" comment="gfs2-kmp-rt is &lt;5.14.21-150500.13.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851434" version="1" comment="kernel-devel-rt is &lt;5.14.21-150500.13.38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851435" version="1" comment="kernel-rt is &lt;5.14.21-150500.13.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851436" version="1" comment="kernel-rt-devel is &lt;5.14.21-150500.13.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851437" version="1" comment="kernel-rt-extra is &lt;5.14.21-150500.13.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851438" version="1" comment="kernel-rt-livepatch is &lt;5.14.21-150500.13.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851439" version="1" comment="kernel-rt-livepatch-devel is &lt;5.14.21-150500.13.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851440" version="1" comment="kernel-rt-optional is &lt;5.14.21-150500.13.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851441" version="1" comment="kernel-rt-vdso is &lt;5.14.21-150500.13.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851442" version="1" comment="kernel-rt_debug is &lt;5.14.21-150500.13.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851443" version="1" comment="kernel-rt_debug-devel is &lt;5.14.21-150500.13.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851444" version="1" comment="kernel-rt_debug-livepatch-devel is &lt;5.14.21-150500.13.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851445" version="1" comment="kernel-rt_debug-vdso is &lt;5.14.21-150500.13.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851446" version="1" comment="kernel-source-rt is &lt;5.14.21-150500.13.38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851447" version="1" comment="kernel-syms-rt is &lt;5.14.21-150500.13.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851448" version="1" comment="kselftests-kmp-rt is &lt;5.14.21-150500.13.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851449" version="1" comment="ocfs2-kmp-rt is &lt;5.14.21-150500.13.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851450" version="1" comment="reiserfs-kmp-rt is &lt;5.14.21-150500.13.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851552" version="1" comment="ghostscript is &lt;9.52-150000.185.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851553" version="1" comment="ghostscript-devel is &lt;9.52-150000.185.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851554" version="1" comment="ghostscript-x11 is &lt;9.52-150000.185.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851700" version="1" comment="libopenvswitch-2_14-0 is &lt;2.14.2-150400.24.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851701" version="1" comment="libovn-20_06-0 is &lt;20.06.2-150400.24.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851702" version="1" comment="openvswitch is &lt;2.14.2-150400.24.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851703" version="1" comment="openvswitch-devel is &lt;2.14.2-150400.24.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851704" version="1" comment="openvswitch-doc is &lt;2.14.2-150400.24.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851705" version="1" comment="openvswitch-ipsec is &lt;2.14.2-150400.24.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851706" version="1" comment="openvswitch-pki is &lt;2.14.2-150400.24.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851707" version="1" comment="openvswitch-test is &lt;2.14.2-150400.24.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851708" version="1" comment="openvswitch-vtep is &lt;2.14.2-150400.24.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851709" version="1" comment="ovn is &lt;20.06.2-150400.24.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851710" version="1" comment="ovn-central is &lt;20.06.2-150400.24.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851711" version="1" comment="ovn-devel is &lt;20.06.2-150400.24.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851712" version="1" comment="ovn-doc is &lt;20.06.2-150400.24.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851713" version="1" comment="ovn-docker is &lt;20.06.2-150400.24.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851714" version="1" comment="ovn-host is &lt;20.06.2-150400.24.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851715" version="1" comment="ovn-vtep is &lt;20.06.2-150400.24.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851716" version="1" comment="python3-ovs is &lt;2.14.2-150400.24.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851787" version="1" comment="python3-uamqp is &lt;1.5.3-150100.4.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851805" version="1" comment="dav1d is &lt;1.0.0-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851806" version="1" comment="dav1d-devel is &lt;1.0.0-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851807" version="1" comment="libdav1d6 is &lt;1.0.0-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851808" version="1" comment="libdav1d6-32bit is &lt;1.0.0-150500.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851809" version="1" comment="indent is &lt;2.2.11-150000.3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851827" version="1" comment="libzzip-0-13 is &lt;0.13.69-150000.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851828" version="1" comment="libzzip-0-13-32bit is &lt;0.13.69-150000.3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851829" version="1" comment="zziplib-devel is &lt;0.13.69-150000.3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851830" version="1" comment="zziplib-devel-32bit is &lt;0.13.69-150000.3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851831" version="1" comment="trilead-ssh2 is &lt;217.293.v56de4d4d3515-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851832" version="1" comment="trilead-ssh2-javadoc is &lt;217.293.v56de4d4d3515-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851833" version="1" comment="libtiff-devel is &lt;4.0.9-150000.45.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851834" version="1" comment="libtiff-devel-32bit is &lt;4.0.9-150000.45.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851835" version="1" comment="libtiff5 is &lt;4.0.9-150000.45.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851836" version="1" comment="libtiff5-32bit is &lt;4.0.9-150000.45.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851837" version="1" comment="tiff is &lt;4.0.9-150000.45.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851838" version="1" comment="jsch-agent-proxy-connector-factory is &lt;0.0.9-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851839" version="1" comment="jsch-agent-proxy-core is &lt;0.0.9-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851840" version="1" comment="jsch-agent-proxy-javadoc is &lt;0.0.9-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851841" version="1" comment="jsch-agent-proxy-jsch is &lt;0.0.9-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851842" version="1" comment="jsch-agent-proxy-pageant is &lt;0.0.9-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851843" version="1" comment="jsch-agent-proxy-sshagent is &lt;0.0.9-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851844" version="1" comment="jsch-agent-proxy-usocket-jna is &lt;0.0.9-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851845" version="1" comment="jsch-agent-proxy-usocket-nc is &lt;0.0.9-150200.3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852039" version="1" comment="krb5 is &lt;1.20.1-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852040" version="1" comment="krb5-32bit is &lt;1.20.1-150500.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852041" version="1" comment="krb5-client is &lt;1.20.1-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852042" version="1" comment="krb5-devel is &lt;1.20.1-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852043" version="1" comment="krb5-devel-32bit is &lt;1.20.1-150500.3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852044" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.20.1-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852045" version="1" comment="krb5-plugin-preauth-otp is &lt;1.20.1-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852046" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.20.1-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852047" version="1" comment="krb5-plugin-preauth-spake is &lt;1.20.1-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852048" version="1" comment="krb5-server is &lt;1.20.1-150500.3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959153" version="1" comment="python-Jinja2-emacs is &lt;2.10.1-150000.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959154" version="1" comment="python-Jinja2-vim is &lt;2.10.1-150000.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959155" version="1" comment="python3-Jinja2 is &lt;2.10.1-150000.3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959054" version="1" comment="python311-Jinja2 is &lt;3.1.2-150400.12.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229440"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openSUSE-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromedriver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syncthing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syncthing-relaysrv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gifsicle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjxl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjxl-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjxl0_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjxl0_8-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xonotic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xonotic-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xonotic-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keepass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caja-extension-nextcloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloudproviders-extension-nextcloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnextcloudsync-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnextcloudsync0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-extension-nextcloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nemo-extension-nextcloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nextcloud-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nextcloud-desktop-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nextcloud-desktop-dolphin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nextcloud-desktop-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Django1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-java-gateway</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-phpfrontend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-proxy-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-proxy-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-proxy-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-server-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zabbix-server-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libredwg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libredwg-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libredwg0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amanda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trytond</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-virtualbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-desktop-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-host-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-vnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-websrv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Net-Netmask</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kitty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kitty-shell-integration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kitty-terminfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensuse-welcome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensuse-welcome-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTTP-Tiny</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cpanel-JSON-XS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-mitmproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>renderdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>renderdoc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodsecurity3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodsecurity3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodsecurity3-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>modsecurity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>modsecurity-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-GitPython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-CairoSVG</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpreplay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cacti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cacti-spine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-dom-inspector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-irc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>roundcubemail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eximon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eximstats-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rxvt-unicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluetuith</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsox3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-bugzilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-railties-5.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-railties-doc-5.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-activesupport-5.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-activesupport-doc-5.2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mupdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mupdf-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvlc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvlccore9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-codec-gstreamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-noX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-opencv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-vdpau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-nmcompat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-hh2serial-gps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-iospm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-l2tp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-openvpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-polkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-pptp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-tist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-vpnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-plugin-wireguard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>connman-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jhead</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-yt-dlp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yt-dlp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yt-dlp-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yt-dlp-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yt-dlp-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-chromaprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-chromaprint-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-chromaprint-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-fluidsynth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-fluidsynth-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-fluidsynth-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-transcoder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-transcoder-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstadaptivedemux-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstadaptivedemux-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstadaptivedemux-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadaudio-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadaudio-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecs-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecs-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecs-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcuda-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcuda-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcuda-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinsertbin-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinsertbin-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinsertbin-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstisoff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstisoff-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstisoff-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmpegts-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmpegts-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmpegts-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstplay-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstplay-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstplay-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstplayer-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstplayer-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstplayer-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsctp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsctp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsctp-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttranscoder-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsturidownloader-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsturidownloader-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsturidownloader-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstva-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstva-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstva-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvulkan-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvulkan-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvulkan-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwayland-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwayland-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwayland-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwebrtc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwebrtc-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwebrtc-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwebrtcnice-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwebrtcnice-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwebrtcnice-1_0-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-CudaGst-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstBadAudio-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstCodecs-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstCuda-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstInsertBin-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstMpegts-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstPlay-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstPlayer-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstTranscoder-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVa-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVulkan-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVulkanWayland-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVulkanXCB-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstWebRTC-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>optipng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtorrent-rasterbar-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtorrent-rasterbar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtorrent-rasterbar2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libtorrent-rasterbar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qbittorrent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qbittorrent-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fish-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>putty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cppcheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cppcheck-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-radius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>deepin-compressor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>deepin-compressor-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sngrep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-CryptX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dcmtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dcmtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcmtk18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-recursor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php81</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-ffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-fpm-apache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-opcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-phar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-sodium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php81-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-python-jose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tinyproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Pillow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Pillow-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopusfile0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opusfile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cliff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cliff-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cliff-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cliff-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6NetworkAuth6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-networkauth-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-networkauth-docs-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-networkauth-docs-qch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-networkauth-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-networkauth-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cJSON-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcjson1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5NetworkAuth5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5NetworkAuth5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5NetworkAuth5-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtnetworkauth-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtnetworkauth-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtnetworkauth-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtnetworkauth-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtnetworkauth-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhtp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhtp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmenudbusmenuproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma5-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma5-session-wayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma5-workspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma5-workspace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma5-workspace-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasma5-workspace-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xembedsniproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nano</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nano-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdcm-applications</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdcm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdcm-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdcm3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsocketxx1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-gdcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-django-grappelli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Js2Py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbfs-git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbfs-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keybase-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-download_url</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Botan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Botan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-2-19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-2-19-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-2-19-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbotan-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-botan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Spreadsheet-ParseXLSX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>global</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caddy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caddy-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caddy-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caddy-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sentry-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-nltk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>assimp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libassimp5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gh-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gh-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gh-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuev3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-notebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-notebook-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-notebook-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-notebook-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-notebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-notebook-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-aiosmtpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apptainer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apptainer-leap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apptainer-sle15_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apptainer-sle15_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsquashfuse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squashfuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squashfuse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squashfuse-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsk19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sleuthkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sleuthkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-bindgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trivy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htmldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntpd-rs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntpd-rs-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblxc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblxc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxc-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxc-ja-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxc-ko-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_cgfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xsd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmosquitto1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmosquittopp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mosquitto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mosquitto-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mosquitto-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-mysql-connector-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jupyter-jupyterlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-jupyterlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kmail-account-wizard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kmail-account-wizard-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tinyssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-PyPDF2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedcrypto7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedcrypto7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedcrypto7-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedtls14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedtls14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedtls14-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedx509-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedx509-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmbedx509-1-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mbedtls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2-ido-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icinga2-ido-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nano-icinga2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-icinga2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cobbler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cobbler-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cobbler-tests-containers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>radare2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>radare2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>radare2-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Pdf6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6PdfQuick6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6PdfWidgets6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6WebEngineCore6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6WebEngineQuick6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6WebEngineWidgets6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-pdf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-pdf-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-pdf-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-pdfquick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-pdfquick-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-pdfwidgets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-pdfwidgets-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-webengine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-webengine-docs-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-webengine-docs-qch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-webengine-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-webengine-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-webenginecore-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-webenginecore-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-webenginequick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-webenginequick-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-webenginewidgets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-webenginewidgets-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-python-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-python-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-xhtml2pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bitcoin-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bitcoin-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bitcoin-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bitcoind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbitcoinconsensus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbitcoinconsensus0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rpyc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clang17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clang17-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clang17-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libLLVM17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libLLVM17-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libLLVM17-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libLTO17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libclang-cpp17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libclang-cpp17-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libclang-cpp17-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblldb17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libomp17-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lld17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lldb17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lldb17-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>llvm17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>llvm17-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>llvm17-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>llvm17-gold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>llvm17-libc++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>llvm17-libc++1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>llvm17-libc++abi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>llvm17-libc++abi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>llvm17-libclang13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>llvm17-opt-viewer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>llvm17-polly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>llvm17-polly-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>llvm17-vim-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-clang17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-lldb17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minidlna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kanidm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kanidm-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kanidm-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kanidm-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kanidm-unixd-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-aes_key_wrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-aes_key_wrap-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-json-jwt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-json-jwt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-django-ckeditor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SNMP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netty-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netty-poms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netty-tcnative</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netty-tcnative-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-libheif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenvswitch-2_14-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libovn-20_06-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-pki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-vtep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-central</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-vtep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ovs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terraform-provider-aws</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terraform-provider-null</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Flask</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Flask-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geoipupdate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geoipupdate-legacy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkpathsea6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libptexenc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsynctex2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtexlua53-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtexluajit2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-biber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-a2ping-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-accfonts-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adhocfilelist-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-afm2pl-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-albatross-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aleph-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amstex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arara-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asymptote-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-attachfile2-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-authorindex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autosp-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-axodraw2-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bib2gls-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biber-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibexport-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex8-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtexu-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bundledoc-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cachepic-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-checkcites-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-checklistings-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chklref-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chktex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk-gs-integrate-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjkutils-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clojure-pamphlet-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cluttex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-convbkmk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crossrefware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cslatex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csplain-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctan-o-mat-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctanbib-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctanify-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctanupload-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctie-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cweb-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyrillic-bin-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-de-macro-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-detex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diadia-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dosepsbin-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtl-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtxgen-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviasm-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvicopy-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvidvi-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviinfox-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviljk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviout-util-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipdfmx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipng-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipos-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvips-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvisvgm-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eplain-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epspdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epstopdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exceltex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fig4latex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-findhyph-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontinst-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontools-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fragmaster-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-getmap-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-git-latexdiff-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gregoriotex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gsftopk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyperxmp-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jadetex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jfmutil-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ketcindy-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kotex-utils-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3build-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lacheck-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-bin-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-bin-dev-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-git-log-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-papersize-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2man-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2nemeth-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexdiff-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexfileversion-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexindent-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexmk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexpand-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lcdftypetools-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-light-latex-make-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lilyglyphs-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listbib-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listings-ext-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lollipop-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxfileinfo-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltximg-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luahbtex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luajittex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaotfload-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lwarp-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-m-tx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-make4ht-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makedtx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeindex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-match_parens-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathspic-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metafont-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mf2pt1-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflua-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkgrkindex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkjobtexmf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkpic-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mltex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mptopdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multibibliography-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixtex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixtnt-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-omegaware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-optex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-patgen-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pax-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfbook2-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfcrop-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfjam-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdflatexpicscale-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex-quiet-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftosrc-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfxup-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pedigree-perl-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-perltex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-petri-nets-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pfarrei-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pkfix-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pkfix-helper-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-platex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pmx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pmxchords-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ps2eps-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ps2pk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-pdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst2pdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex-fontmaps-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex2pdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptexenc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-purifyeps-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pygmentex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pythontex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rubik-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scripts-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scripts-extra-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seetexk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spix-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-splitindex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-srcredact-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sty2dtx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svn-multi-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-synctex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-synctex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ebook-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ht-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texcount-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdef-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdiff-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdirflatten-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdoc-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdoctk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texfot-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texliveonfly-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texloganalyser-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlua-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texluajit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texosquery-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texplate-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texsis-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumbpdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tie-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikztosvg-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tpic2pdftex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ttfutils-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typeoutfileinfo-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ulqda-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uplatex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uptex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-urlbst-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-velthuis-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vlna-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vpe-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-web-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-webquiz-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wordcount-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xdvi-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xelatex-dev-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xindex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xml2pmx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpdfopen-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yplan-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-vpenso-prometheus_slurm_exporter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>distribution-registry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.18-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.18-openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.18-openssl-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-ares-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-ares-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-ui-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_0_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_0_0-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-steam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-steam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_0_0-cavs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_0_0-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-SUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-7_Q16HDRI5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-7_Q16HDRI5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-7_Q16HDRI10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-7_Q16HDRI10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-7_Q16HDRI10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-7_Q16HDRI10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PerlMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-ddk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcups2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcups2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupscgi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupscgi1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsimage2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsimage2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsmime1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsmime1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsppdc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsppdc1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-fileupload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-fileupload-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-cloud-sap-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_10-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_10-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-doc-devhelp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpdecoder3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpdecoder3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpdemux2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpdemux2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpmux3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpmux3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadbd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadbd19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-galera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-sock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-ppolicy-check-password</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-el-3_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsp-2_3-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-4_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rekor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_6m1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_6m1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-doc-devhelp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>frr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>frr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrr_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrrcares0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrrfpm_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrrospfapiclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrrsnmp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfrrzmq0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmlag_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.19-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.19-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.20-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.20-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla-livepatch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-domU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-xendomains-wait-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenvswitch-3_1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libovn-23_03-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch3-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch3-pki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch3-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch3-vtep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn3-central</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn3-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn3-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn3-vtep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ovs3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-annotations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-ant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-cdi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-continuation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-deploy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-fcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-http</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-http-spi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-io</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-jaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-jmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-jndi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-jsp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-minimal-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-openid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-plus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-quickstart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-rewrite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-security</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-servlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-servlets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-start</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-util-ajax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.18-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.18-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.23-apiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.23-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.23-client-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.23-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.23-client-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.23-controller-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.23-kubeadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.23-kubelet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.23-kubelet-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.23-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.23-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.24-apiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.24-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.24-client-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.24-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.24-client-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.24-controller-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.24-kubeadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.24-kubelet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.24-kubelet-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.24-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.24-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-auto-enable-devices</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-deprecated</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-obexd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbluetooth3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbluetooth3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-reportlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ply-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-jmespath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ply</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-simplejson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut-saltboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacecmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wire</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyzmq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyzmq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewalld-prometheus-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-prometheus-prometheus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rustup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-salt-minion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-sdmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-opcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-phar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-sodium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dav1d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dav1d-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdav1d6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdav1d6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sqlparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-3-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init-config-suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_9-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_9-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-doc-devhelp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-md-kmp-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlm-kmp-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure-livepatch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure-vdso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kselftests-kmp-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>reiserfs-kmp-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>WebKit2GTK-4.0-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>WebKit2GTK-4.1-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>WebKit2GTK-5.0-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_0-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_0-18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_1-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-5_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_0-37</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_0-37-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_1-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-5_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-5_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2-5_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2WebExtension-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2WebExtension-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2WebExtension-5_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit-jsc-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit-jsc-4.1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit-jsc-5.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk-4_0-injected-bundles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk-4_1-injected-bundles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk-5_0-injected-bundles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-minibrowser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-soup2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-soup2-minibrowser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk4-minibrowser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amazon-ssm-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-interface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-libxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nodedev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-secret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-gluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi-direct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-logical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-lock-sanlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-plugin-libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cosign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corepack18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs18-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs18-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiniparser-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiniparser1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiniparser1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terraform-provider-helm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsdist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libluajit-5_1-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libluajit-5_1-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>luajit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>luajit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amazon-ecs-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpsx2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpsx2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_11-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_11-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-doc-devhelp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Concurrent6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Core6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6DBus6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Gui6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Network6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6OpenGL6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6OpenGLWidgets6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6PrintSupport6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Sql6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Test6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Widgets6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt6Xml6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-base-common-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-base-docs-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-base-docs-qch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-base-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-base-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-concurrent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-core-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-dbus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-dbus-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-docs-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-gui-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-gui-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-kmssupport-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-kmssupport-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-network-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-network-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-network-tls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-networkinformation-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-networkinformation-nm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-opengl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-opengl-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-openglwidgets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-platformsupport-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-platformsupport-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-platformtheme-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-platformtheme-xdgdesktopportal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-printsupport-cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-printsupport-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-printsupport-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-sql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-sql-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-sql-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-sql-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-sql-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-sql-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-test-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-test-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-widgets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-widgets-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-xml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt6-xml-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmt-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmt-server-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmt-server-pubcloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdwarf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdwarf-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdwarf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdwarf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdwarf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>prometheus-sap_host_exporter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>prometheus-ha_cluster_exporter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-md-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlm-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-livepatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-livepatch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-vdso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_debug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_debug-livepatch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_debug-vdso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kselftests-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>reiserfs-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librabbitmq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librabbitmq4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-c-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Bootstrap-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Bootstrap-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5KmsSupport-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5KmsSupport-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGLExtensions-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGLExtensions-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformHeaders-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformSupport-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformSupport-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformSupport-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-mysql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-postgresql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-sqlite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-common-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-examples-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-platformtheme-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-platformtheme-xdgdesktopportal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-opcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-phar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sodium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-jmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-mail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-pg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-pkix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-tls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-md-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-md-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlm-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlm-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-allwinner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-altera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-amazon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-amd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-amlogic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-apm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-apple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-broadcom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-cavium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-exynos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-freescale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-hisilicon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-lg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-marvell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-mediatek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-nvidia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-qcom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-renesas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-rockchip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-socionext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-sprd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-xilinx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-64kb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-64kb-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-64kb-livepatch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-64kb-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-livepatch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-vdso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base-rebuild</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-livepatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-livepatch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-vdso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kvmsmall</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kvmsmall-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kvmsmall-livepatch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kvmsmall-vdso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-obs-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-obs-qa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-vanilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-zfcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kselftests-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kselftests-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>reiserfs-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>reiserfs-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-core-DB_File</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-core-DB_File-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-SLE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-azure-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-azure-storage-blob</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>redis7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-pcp-pmda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy-python3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy0-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy0-python3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ceph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-gpupdate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ldb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-python3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-cavs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Svg5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Svg5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-scipy_1_2_0-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-connector-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iperf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iperf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiperf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conmon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.20-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.20-openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.20-openssl-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-amdgpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ath10k</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ath11k</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-atheros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-bnx2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-brcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-chelsio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-dpaa2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-i915</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-iwlwifi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-liquidio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-marvell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-media</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-mediatek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-mellanox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-mwifiex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-nfp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-nvidia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-platform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-prestera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-qcom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-qlogic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-radeon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-realtek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-serial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-sound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-ueagle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-usb-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-amd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-convert</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-thumbnailer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Rsvg-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-SLOF</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-accel-qtest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-accel-tcg-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-spice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-dmg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-gluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-nfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-chardev-baum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-chardev-spice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-qxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-gpu-pci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-vga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-s390x-virtio-gpu-ccw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-usb-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-usb-redirect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-usb-smartcard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ipxe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ivshmem-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ksm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-microvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ppc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-s390x</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-seabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-sgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-skiboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-opengl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-spice-app</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-spice-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vhost-user-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmltooling-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmltooling-lite9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmltooling9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmltooling-schemas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guava</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guava-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guava-testlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-cloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-master</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-minion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-standalone-formulas-configuration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-syndic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-transactional-update</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>prometheus-blackbox_exporter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tornado</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-user-prometheus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jtidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jtidy-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jtidy-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xtrans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-actionpack-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-actionpack-doc-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcjose-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcjose0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-firewalld</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-registrar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-tpm_cert_store</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-verifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-keylime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-ugly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-ugly-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-ugly-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-extra-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-jack-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-qtqml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstfft-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstfft-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtsp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtsp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsdp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsdp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAllocators-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstApp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAudio-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstGL-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstGLEGL-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstGLWayland-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstGLX11-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstPbutils-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRtp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRtsp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstSdp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstTag-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVideo-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo1.71</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.71</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugin-pipewire</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpipewire-0_3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpipewire-0_3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-alsa-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-libjack-0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-libjack-0_3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-libjack-0_3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-module-x11-0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-modules-0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-modules-0_3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-pulseaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-spa-plugins-0_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-spa-plugins-0_2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-spa-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-scipy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-scipy-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-scipy_1_3_3-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyajl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyajl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyajl-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyajl2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyajl2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yajl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openj9-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-kdb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-pkinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-spake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-16-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-16-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-32-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-32-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-8-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-8-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-posix2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-posix2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-llvmjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-llvmjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-llvmjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>re2c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-configobj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-llvmjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>commons-compiler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>commons-compiler-jdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>janino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>janino-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-bdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-bdb-lmdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-debugger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-debugger-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-dialyzer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-dialyzer-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-diameter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-diameter-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-epmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-et-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-jinterface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-jinterface-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-observer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-observer-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-reltool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-reltool-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-wx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-wx-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-filters-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gdb-pretty-printers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-glade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-themes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-af</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-am</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-as</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-be</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bn_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-br</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-brx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ca_valencia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ckb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-dgo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-dsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-dz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-eo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-eu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-he</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-id</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-is</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kmr_Latn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-my</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ne</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-oc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-om</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-or</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt_PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-rw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sa_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-si</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-st</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sw_TZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-szl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-te</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-uz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-vec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-xh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh_TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-librelogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-mailmerge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-officebean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-pyuno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-sdk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreofficekit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreofficekit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmlsec1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmlsec1-gcrypt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmlsec1-gnutls1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmlsec1-nss1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmlsec1-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-gcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-gnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlsec1-openssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>WebKitGTK-4.0-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>WebKitGTK-4.1-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>WebKitGTK-6.0-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_0-18-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_1-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-6_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_0-37-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_1-0-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-6_0-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-6_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit-6_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKitWebProcessExtension-6_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit-jsc-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkitgtk-6_0-injected-bundles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>indent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gawk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ca-certificates-mozilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ca-certificates-mozilla-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libclamav9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreshclam2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-profile-tti35</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ft2demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftbench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftgamma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftgrid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftinspect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftlint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftmulti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftvalid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprocps7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-small</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-containerinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exempi-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexempi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexempi3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexempi3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>djvulibre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>djvulibre-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdjvulibre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdjvulibre21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sccache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsl_2_4-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsl_2_4-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsl_2_4-gnu-hpc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsl_2_4-gnu-hpc-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsl_2_4-gnu-hpc-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsl_2_4-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgslcblas_2_4-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-adduser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-attr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-bc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-coreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-diffutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-dos2unix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-ed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-findutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-gawk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-grep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-hostname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-iproute2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-iputils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-kbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-kmod</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-less</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-links</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-misc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-ncurses-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-net-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-netcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-patch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-policycoreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-procps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-psmisc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-sed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-selinux-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-sendmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-sh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-sharutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-syslogd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-sysvinit-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-telnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-tftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-time</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-traceroute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-tunctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-unzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-vlan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-which</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-whois</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-xz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skopeo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu73_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu73_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu73_2-bedata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu73_2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu73_2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu73_2-ledata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-aarch64-gcc12-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-arm-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-arm-gcc12-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-arm-none-gcc12-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-avr-gcc12-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-epiphany-gcc12-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-hppa-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-hppa-gcc12-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-hppa-gcc12-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-m68k-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-m68k-gcc12-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-mips-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-mips-gcc12-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-nvptx-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-nvptx-newlib12-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc64-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc64-gcc12-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc64le-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc64le-gcc12-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-riscv64-elf-gcc12-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-riscv64-gcc12-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-rx-gcc12-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-s390x-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-s390x-gcc12-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-sparc-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-sparc64-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-sparc64-gcc12-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-sparcv9-gcc12-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-x86_64-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-x86_64-gcc12-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-PIE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-ada</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-ada-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-d-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-go-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-obj-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-obj-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-objc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-objc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc12-testresults</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdruntime3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdruntime3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo21-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgphobos3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgphobos3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhwasan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-aarch64-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-aarch64-gcc7-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-arm-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-arm-none-gcc7-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-avr-gcc7-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-epiphany-gcc7-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-hppa-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-hppa-gcc7-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-i386-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-i386-gcc7-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-m68k-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-m68k-gcc7-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-mips-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-mips-gcc7-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-nvptx-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-nvptx-newlib7-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc64-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc64-gcc7-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc64le-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc64le-gcc7-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-rx-gcc7-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-s390x-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-s390x-gcc7-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-sparc-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-sparc64-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-sparc64-gcc7-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-sparcv9-gcc7-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-x86_64-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-x86_64-gcc7-icecream-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-ada</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-ada-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-go-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-obj-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-obj-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-objc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-objc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-testresults</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcilkrts5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcilkrts5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblsan0-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpx2-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpx2-gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpxwrappers2-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpxwrappers2-gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4-gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-gcc7-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan0-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libxml2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.21-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.21-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-rails-html-sanitizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-rails-html-sanitizer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-rails-html-sanitizer-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo1.72</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust1.72</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-actionview-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-actionview-doc-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd-ctr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec57</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec57-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice57</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice57-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat57</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat57-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil55</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil55-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc54</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc54-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-warewulf3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supportutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-gold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-aarch64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-arm-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-avr-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-epiphany-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-hppa-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-hppa64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-i386-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ia64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-m68k-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-mips-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc64le-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-riscv64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-rx-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-s390-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-s390x-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-sparc-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-sparc64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-spu-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-x86_64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-xtensa-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libctf-nobfd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libctf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-brotlipy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpainter0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librfxencode0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfpm_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libospf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libospfapiclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquagga_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzebra1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.19-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.19-openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.19-openssl-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsl-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsl-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsl-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsl-gnu-hpc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsl_2_6-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsl_2_6-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsl_2_6-gnu-hpc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsl_2_6-gnu-hpc-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsl_2_6-gnu-hpc-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsl-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsl25</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsl_2_6-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgslcblas-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgslcblas0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgslcblas_2_6-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmca_common_dstore1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpmix2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pmix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pmix-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pmix-headers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pmix-mca-params</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pmix-plugin-munge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pmix-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pmix-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-QubitProducts-exporter_exporter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-lusitaniae-apache_exporter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>prometheus-postgres_exporter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supportutils-plugin-susemanager-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-prometheus-alertmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-prometheus-node_exporter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>doxygen2man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb100</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb100-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vpx-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeconf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeconf-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeconf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeconf0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-puma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-puma-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2_asio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2_asio1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2_asio1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nghttp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-nghttp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yq-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yq-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yq-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>login_defs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-composer2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rage-encryption</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rage-encryption-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cni-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcue-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcue2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gevent-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-gevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>buildah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnss_slurm2_20_02</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpmi0_20_02</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-slurm_20_02</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-auth-none</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-config-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-cray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-hdf5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-munge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-node</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-openlava</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-pam_slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-rest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-seff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-sjstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-slurmdbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-sview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-torque</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_02-webdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suse-module-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suse-module-tools-legacy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-arm64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-arm64-efi-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-arm64-efi-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-powerpc-ieee1275</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-powerpc-ieee1275-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-powerpc-ieee1275-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-s390x-emu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-s390x-emu-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-s390x-emu-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-snapper-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-systemd-sleep-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-nvptx-gcc13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-nvptx-newlib13-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-PIE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-ada</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-ada-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-d-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-go-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-m2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-m2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-obj-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-obj-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-objc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc13-objc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdruntime4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdruntime4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo22-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgphobos4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgphobos4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libm2cor18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libm2cor18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libm2iso18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libm2iso18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libm2log18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libm2log18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libm2min18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libm2min18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libm2pim18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libm2pim18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby2_5-2_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-devel-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-stdlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminizip1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminizip1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minizip-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnbd-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnbd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnbd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdfuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libnbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzck-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzck1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zchunk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xvfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Werkzeug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-cpp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-cpp0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt5-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt5-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt6-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt6-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler126</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler126-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Poppler-0_18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xwayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xwayland-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnss_slurm2_20_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpmi0_20_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-slurm_20_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-auth-none</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-config-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-cray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-hdf5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-munge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-node</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-openlava</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-pam_slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-rest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-seff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-sjstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-slurmdbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-sview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-torque</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-webdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnss_slurm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpmi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslurm39</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-auth-none</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-config-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-cray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-hdf5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-munge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-node</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-openlava</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-pam_slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-plugin-ext-sensors-rrd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-rest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-seff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-sjstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-slurmdbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-sview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-torque</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-webdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-ivy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-ivy-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware-nvidia-gspx-G06</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G06-signed-64kb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G06-signed-azure-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G06-signed-default-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G06-signed-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G06-signed-kmp-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvidia-open-driver-G06-signed-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-event</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-example-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-prefork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>w3m</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>w3m-inline-image</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exfatprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.21-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.21-openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.21-openssl-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-llvmjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-devel-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-llvmjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>frozen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-0_18-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-0_18-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mdds-2_1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libixion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-liborcus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-autoipd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-howl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-mDNSResponder-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-utils-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-gobject-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-gobject0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-libevent1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-qt5-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-qt5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-ui-gtk3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhowl0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-avahi-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Avahi-0_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_jk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resolver-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resolver-connector-basic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resolver-impl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resolver-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resolver-named-locks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resolver-spi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resolver-test-util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resolver-transport-classpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resolver-transport-file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resolver-transport-http</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resolver-transport-wagon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resolver-util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sbt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sbt-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn-connector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn-connector-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn-mojo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn-mojo-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn-resolve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn-subst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmvn-tools-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Pillow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Pillow-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-libs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-nm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnss_slurm2_22_05</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpmi0_22_05</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslurm38</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-slurm_22_05</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_22_05</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_22_05-auth-none</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_22_05-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_22_05-config-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_22_05-cray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_22_05-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_22_05-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_22_05-hdf5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_22_05-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_22_05-munge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_22_05-node</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_22_05-openlava</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_22_05-pam_slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_22_05-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_22_05-rest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_22_05-seff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_22_05-sjstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_22_05-slurmdbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_22_05-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_22_05-sview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_22_05-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_22_05-torque</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_22_05-webdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-c-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squashfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Twisted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Twisted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Twisted-all_non_platform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Twisted-conch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Twisted-conch_nacl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Twisted-contextvars</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Twisted-http2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Twisted-serial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Twisted-tls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>traceroute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-container-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-manifests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-controller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-exportproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-exportserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-handler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-launcher</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-operator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virtctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-kubevirt_containers_meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-cloner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-controller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-importer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-manifests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-operator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-uploadproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-uploadserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-cdi_containers_meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suse-build-key</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-plugin-aa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimp-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimp-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpui-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpui-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-hpijs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-sane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-scan-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tracker-miner-files</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tracker-miners</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tracker-miners-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-iterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-wayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuwac0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwinpr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwac0-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>winpr2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsass-3_6_5-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsass-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-aiohttp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-aiohttp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-rootless-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rootlesskit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-rabbitmq-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzbar-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzbar0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzbar0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzbarqt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzbarqt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzbarqt0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zbar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtinyxml0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tinyxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tinyxml-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp-modem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jbigkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-backend-dnf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-backend-zypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gstreamer-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gtk3-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-PackageKitGlib-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-python-qpid-proton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qpid-proton-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qpid-proton-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBD-SQLite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpars-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gradle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gradle-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.22-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.22-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podmansh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.25-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.25-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.26-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.26-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libmount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuidd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>less</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-el-5_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-jsp-3_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-jsvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-servlet-6_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Net-CIDR-Lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corepack20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs20-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs20-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-contributor-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-emf-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-emf-core-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-emf-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-emf-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-emf-xsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-equinox-osgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-equinox-osgi-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-jdt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-jdt-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-p2-discovery</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-p2-discovery-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-pde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-pde-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-platform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-platform-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-swt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-swt-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-failsafe-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-failsafe-plugin-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-surefire</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-surefire-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-surefire-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-surefire-plugin-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-surefire-plugins-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-surefire-provider-junit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-surefire-provider-junit5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-surefire-provider-junit5-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-surefire-provider-testng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-surefire-report-parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-surefire-report-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-surefire-report-plugin-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tycho</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tycho-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tycho-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pgadmin4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pgadmin4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pgadmin4-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pgadmin4-web-uwsgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-daemon-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-daemon-jsvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-dbcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-dbcp-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-pool2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-pool2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-annotation-1_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-commonj-1_1-apis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-corba-1_0-apis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-corba-2_3-apis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-ejb-2_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-ejb-3_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-el-1_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-interceptor-3_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-j2ee-1_4-apis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-j2ee-connector-1_5-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-j2ee-deployment-1_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-j2ee-management-1_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-j2ee-management-1_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-jacc-1_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-jacc-1_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-jaf-1_0_2-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-jaf-1_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-javaee-deployment-1_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-javamail-1_3_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-javamail-1_4-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-jaxr-1_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-jaxrpc-1_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-jms-1_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-jpa-3_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-jsp-2_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-jsp-2_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-jta-1_0_1B-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-jta-1_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-qname-1_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-saaj-1_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-servlet-2_4-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-servlet-2_5-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-stax-1_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>geronimo-ws-metadata-2_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gvedit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-php</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-plugins-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-smyrna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-webp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphviz6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-gv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-extra-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-configuration2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-configuration2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit-agent-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit-agent-1-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit-gobject-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit-gobject-1-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pkexec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Polkit-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-configuration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-configuration-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-gunicorn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-M2Crypto-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-M2Crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavcodec-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavdevice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavfilter-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavformat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavresample-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavutil-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libpostproc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libswresample-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libswscale-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec58_134</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec58_134-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice58_13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice58_13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter7_110</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter7_110-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat58_76</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat58_76-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample4_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil56_70</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil56_70-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc55_9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc55_9-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample3_9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample3_9-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale5_9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale5_9-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Image-Graphical7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Image-JeOS7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-prometheus-promu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mybatis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mybatis-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-remote-flathub</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libflatpak0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-user-flatpak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Flatpak-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-ndb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-ndb-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptopp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptopp8_6_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptopp8_6_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pymongo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnfsidmap-sss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_simpleifp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_simpleifp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ipa_hbac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sss-murmur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sss_nss_idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sssd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-common-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-kcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-winbind-idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Spreadsheet-ParseExcel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Werkzeug-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Werkzeug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-esys0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-esys0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-fapi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-fapi1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-mu0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-mu0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-rc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-rc0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-sys1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-sys1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-cmd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-cmd0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-device0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-device0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-mssim0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-mssim0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-pcap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-swtpm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tcti-swtpm0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tctildr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtss2-tctildr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2-0-tss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2-0-tss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2.0-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrc32c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrc32c1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-lite25_1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-lite25_1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf25_1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotoc25_1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotoc25_1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-apipkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-cachetools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-certifi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-cffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-charset-normalizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-google-api-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-google-auth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-google-cloud-appengine-logging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-google-cloud-artifact-registry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-google-cloud-audit-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-google-cloud-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-google-cloud-compute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-google-cloud-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-google-cloud-dns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-google-cloud-domains</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-google-cloud-iam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-google-cloud-kms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-google-cloud-kms-inventory</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-google-cloud-logging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-google-cloud-run</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-google-cloud-secret-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-google-cloud-service-directory</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-google-cloud-spanner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-google-cloud-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-google-cloud-vpc-access</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-google-crc32c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-google-resumable-media</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-googleapis-common-protos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-grpc-google-iam-v1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-grpcio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-grpcio-status</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-idna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-iniconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-proto-plus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-protobuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pyasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pyasn1-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pycparser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pytz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-sqlparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-paramiko-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tqdm-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Automat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Deprecated</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Fabric</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-PyGithub</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-PyJWT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Pygments</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-aiohttp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-aiosignal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-antlr4-python3-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-argcomplete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-asgiref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-async_timeout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-avro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-blinker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-chardet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-constantly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-decorator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-distro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-fakeredis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-fixedint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-fluidity-sm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-frozenlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-httpretty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-humanfriendly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-hyperlink</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-importlib-metadata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-incremental</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-invoke</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-isodate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-javaproperties</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-jsondiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-knack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-lexicon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-marshmallow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-multidict</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-oauthlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-opencensus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-opencensus-context</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-opencensus-ext-threading</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-opentelemetry-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-opentelemetry-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-opentelemetry-semantic-conventions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-opentelemetry-test-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-paramiko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pathspec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pkginfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-portalocker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-psutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pycomposefile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pydash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-pyparsing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-requests-oauthlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-retrying</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-scp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-semver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-service_identity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-sortedcontainers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-sshtunnel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-strictyaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-sure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-tabulate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-tqdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-typing_extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-vcrpy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-websocket-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-wrapt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-xmltodict</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-yarl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-zipp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-zope.interface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-script-interpreter2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-script-interpreter2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-arch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-credential-gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-credential-libsecret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-email</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-p4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gio-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tests-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>warewulf4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>warewulf4-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>warewulf4-overlay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>warewulf4-overlay-slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tmux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-PyMySQL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liburiparser1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liburiparser1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uriparser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uriparser-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Jinja2-emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Jinja2-vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupdate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupdate-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupdate-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfwup1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apiguardian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apiguardian-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>assertj-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>byte-buddy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dom4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dom4j-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dom4j-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hamcrest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hamcrest-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jaxen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jdom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jopt-simple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jopt-simple-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>junit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>junit-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>junit-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>junit5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>junit5-bom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>junit5-guide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>junit5-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>junit5-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>objectweb-asm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>objectweb-asm-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-test-reporting-events</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-test-reporting-schema</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>saxpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Brotli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aws-nitro-enclaves-binaryblobs-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aws-nitro-enclaves-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-group-ne</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunbound8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-anchor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-munin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-scikit-learn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aom-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaom-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaom-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaom3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaom3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>booth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>booth-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-thumbnailer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixbuf-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixdata-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencc-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpodofo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpodofo0_9_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podofo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsdtar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glade-catalog-vte</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvte-2_91-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Vte-2.91</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libntfs-3g-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libntfs-3g87</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfs-3g</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfsprogs-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-gnu-mpich-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-gnu-mvapich2-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-gnu-openmpi3-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-gnu-openmpi4-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5-hpc-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_11-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_11-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_11-gnu-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_11-gnu-hpc-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_11-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_11-gnu-mpich-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_11-gnu-mpich-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_11-gnu-mpich-hpc-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_11-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_11-gnu-mvapich2-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_11-gnu-mvapich2-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_11-gnu-mvapich2-hpc-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_11-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_11-gnu-openmpi3-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_11-gnu-openmpi3-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_11-gnu-openmpi3-hpc-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_11-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_11-gnu-openmpi4-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_11-gnu-openmpi4-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_11-gnu-openmpi4-hpc-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdf5_1_10_11-hpc-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_1_10_11-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_1_10_11-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_1_10_11-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_1_10_11-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_1_10_11-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_cpp-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_cpp-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_cpp-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_cpp-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_cpp-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_cpp_1_10_11-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_cpp_1_10_11-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_cpp_1_10_11-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_cpp_1_10_11-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_cpp_1_10_11-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_fortran-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_fortran-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_fortran-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_fortran-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_fortran-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_fortran_1_10_11-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_fortran_1_10_11-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_fortran_1_10_11-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_fortran_1_10_11-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_fortran_1_10_11-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_1_10_11-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_1_10_11-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_1_10_11-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_1_10_11-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_1_10_11-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_cpp-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_cpp-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_cpp-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_cpp-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_cpp-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_cpp_1_10_11-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_cpp_1_10_11-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_cpp_1_10_11-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_cpp_1_10_11-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_cpp_1_10_11-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_fortran-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_fortran-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_fortran-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_fortran-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5_hl_fortran-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5hl_fortran_1_10_11-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5hl_fortran_1_10_11-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5hl_fortran_1_10_11-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5hl_fortran_1_10_11-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhdf5hl_fortran_1_10_11-gnu-openmpi4-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenmpi4-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenmpi_4_1_4-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua51-luaposix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua51-luaterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua53-luaposix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua53-luaterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>luaposix-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpich</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpich-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpich-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpich-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpich-gnu-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpich-gnu-hpc-macros-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpich-ofi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpich-ofi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpich-ofi-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpich-ofi-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpich-ofi-gnu-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpich-ofi-gnu-hpc-macros-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpich-ofi_4_0_2-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpich-ofi_4_0_2-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpich-ofi_4_0_2-gnu-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpich-ofi_4_0_2-gnu-hpc-macros-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpich_4_0_2-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpich_4_0_2-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpich_4_0_2-gnu-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpich_4_0_2-gnu-hpc-macros-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-gnu-hpc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-gnu-hpc-macros-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-psm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-psm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-psm-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-psm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-psm-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-psm-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-psm-gnu-hpc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-psm-gnu-hpc-macros-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-psm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-psm2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-psm2-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-psm2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-psm2-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-psm2-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-psm2-gnu-hpc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-psm2-gnu-hpc-macros-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-psm2_2_3_7-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-psm2_2_3_7-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-psm2_2_3_7-gnu-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-psm2_2_3_7-gnu-hpc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-psm2_2_3_7-gnu-hpc-macros-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-psm_2_3_7-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-psm_2_3_7-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-psm_2_3_7-gnu-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-psm_2_3_7-gnu-hpc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-psm_2_3_7-gnu-hpc-macros-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2_2_3_7-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2_2_3_7-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2_2_3_7-gnu-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2_2_3_7-gnu-hpc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2_2_3_7-gnu-hpc-macros-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpi4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpi4-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpi4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpi4-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpi4-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpi4-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpi4-gnu-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpi4-gnu-hpc-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpi4-gnu-hpc-macros-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpi4-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpi4-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpi4-macros-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpi4-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpi_4_1_4-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpi_4_1_4-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpi_4_1_4-gnu-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpi_4_1_4-gnu-hpc-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpi_4_1_4-gnu-hpc-macros-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpi_4_1_4-gnu-hpc-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-sshd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-sshd-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netty3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netty3-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-ldap-schemas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-mt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libonig4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oniguruma-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rear23a</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sevctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mockito</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mockito-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snakeyaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snakeyaml-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>testng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>testng-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-1_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-1_3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p7zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p7zip-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p7zip-full</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-dnspython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>espeak-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>espeak-ng-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>espeak-ng-compat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>espeak-ng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libespeak-ng1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-dnspython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-amharic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-amharic-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-inuktitut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-inuktitut-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-multipress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-multipress-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-thai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-thai-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-tigrigna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-tigrigna-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-vietnamese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-vietnamese-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-xim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-xim-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gtk-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-its-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-amharic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-amharic-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-broadway</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-inuktitut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-inuktitut-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-multipress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-multipress-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-thai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-thai-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-tigrigna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-tigrigna-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-vietnamese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-vietnamese-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-wayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-wayland-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-xim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-xim-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-schema</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gtk-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborc-0_4-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborc-0_4-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dri3proto-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gunicorn-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-gunicorn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python39-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python310-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Quick3D5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Quick3DAssetImport5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtquick3d-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtquick3d-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtquick3d-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtquick3d-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtquick3d-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DAnimation-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DAnimation5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DCore-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DCore5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DExtras-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DExtras5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DInput-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DInput5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DLogic-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DLogic5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DQuick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DQuick5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DQuickAnimation-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DQuickAnimation5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DQuickExtras-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DQuickExtras5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DQuickInput-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DQuickInput5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DQuickRender-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DQuickRender5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DQuickScene2D-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DQuickScene2D5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DRender-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt53DRender5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qt3d-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qt3d-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qt3d-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qt3d-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qt3d-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lib389</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvrcore0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzzip-0-13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzzip-0-13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.28-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.28-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.27-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes1.27-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bubblewrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bubblewrap-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-WebOb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-WebOb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-backend-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-backend-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts-lucene</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts-solr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts-squat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-myhostname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-myhostname-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-coredump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-experimental</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-journal-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-portable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboath-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenconnect5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpskc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpskc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstoken1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oath-toolkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oath-toolkit-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_oath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stoken</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stoken-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stoken-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.23-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.23-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-uamqp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpl2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmfx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmfx1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-azure-identity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jenkins-json-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>json-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>json-lib-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-KHR-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri-nouveau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri-nouveau-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri-vc4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-gallium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-gallium-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv1_CM-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv1_CM-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libOpenCL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libd3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libd3d-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libd3d-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libd3d-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libva</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-vulkan-device-select</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-vulkan-device-select-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-vulkan-overlay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-vulkan-overlay-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOSMesa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOSMesa-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOSMesa8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOSMesa8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_nouveau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_nouveau-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_r300</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_r300-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_r600</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_r600-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_radeonsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_radeonsi-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_virtio_gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_virtio_gpu-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvulkan_broadcom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvulkan_freedreno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvulkan_intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvulkan_intel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvulkan_lvp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvulkan_radeon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvulkan_radeon-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxatracker-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxatracker2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmozjs-78-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozjs78</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozjs78-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenIPMI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenIPMI-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenIPMI-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenIPMI0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keepalived</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etcd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etcdctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf25_1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.22-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.22-openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.22-openssl-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.23-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.23-openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.23-openssl-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_gui2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_import1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_mmv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_trace2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_web1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-conf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2graphite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2influxdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2spark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2zabbix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-collectl2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-ganglia2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-iostat2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-mrtg2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-sar2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-activemq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-apache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bonding</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-cifs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-cisco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-dbping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-dm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-ds389</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-ds389log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gpfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gpsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-hacluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-infiniband</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lmsensors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-logger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lustre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lustrecomm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mailq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-memcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mounts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-named</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-netcheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-netfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-news</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nfsclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nutcracker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nvidia-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-openmetrics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-openvswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-pdns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-perfevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-postfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-rabbitmq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-roomtemp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-sendmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-shping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-smart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-summary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-weblog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-zimbra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-zswap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-system-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-zeroconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogImport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogSummary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-MMV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-PMDA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>govulncheck-vulndb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_uwsgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-emperor_pg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-emperor_zeromq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-gevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-glusterfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-greenlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-jvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-libffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-logzmq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-php7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-psgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-pypy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwsgi-xslt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-bundler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-bundler-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-waitress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-waitress-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-actionmailer-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-actionmailer-doc-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gsf-office-thumbnailer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsf-1-114</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsf-1-114-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsf-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gsf-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-lang3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-lang3-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mojo-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-xsltc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-wxPython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-wxPython-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpcomponents-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpcomponents-client-cache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpcomponents-client-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpcomponents-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpcomponents-core-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bea-stax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bea-stax-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xstream-benchmark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xstream-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xstream-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>javapackages-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>javapackages-gradle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>javapackages-ivy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>javapackages-local</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>javapackages-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-javapackages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-css</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-rasterizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-slideshow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-squiggle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-svgpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-batik-ttf2svg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-commons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-commons-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmlgraphics-fop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovmf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-ia32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-x86_64-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-uefi-aarch32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-uefi-aarch64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-virtualenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-waitress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuv1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-tornado6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-llvmjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-stable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-stable-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-stable-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-stable-rootless-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-stable-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-scm-bridge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avif-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-libavif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavif-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavif13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavif13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>socat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aws-iam-authenticator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyuv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyuv-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyuv0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyuv0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Soup-2_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm-vulnerable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-3_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Soup-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvn_auth_gnome_keyring-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvn_auth_kwallet-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jctools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jctools-channels</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jctools-experimental</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jctools-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb-testresults</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdbserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grpc-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgrpc++1_60</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgrpc1_60</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgrpc37</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupb37</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>upb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-thunderx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-thunderx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-thunderx-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-thunderx-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-thunderx-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-thunderx-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdpdk-20_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pycryptodomex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-archiver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-archiver-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-assembly-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-assembly-plugin-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-common-artifact-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-common-artifact-filters-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-compiler-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-compiler-plugin-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-compiler-plugin-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-dependency-analyzer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-dependency-analyzer-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-dependency-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-dependency-plugin-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-dependency-tree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-dependency-tree-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-enforcer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-enforcer-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-enforcer-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-enforcer-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-enforcer-rules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-annotations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-plugin-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-plugin-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-tools-annotations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-tools-ant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-tools-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-tools-beanshell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-tools-generators</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-tools-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-tools-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-plugin-tools-model</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-script-ant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-script-beanshell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-archiver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-archiver-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-compiler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-compiler-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plexus-compiler-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eclipse-jgit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>abseil-cpp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl2308_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabsl2308_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libre2-11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libre2-11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencensus-proto-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python311-abseil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>re2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pycryptodome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rear27a</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-backup-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-rmt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-codec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-codec-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-compress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-compress-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-io</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-io-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gradle-local</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ivy-local</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-logging-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-module-apt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-module-confluence</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-module-docbook-simple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-module-fml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-module-fo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-module-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-module-rtf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-module-twiki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-module-xdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-module-xhtml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-module-xhtml5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-sink-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-sitetools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-sitetools-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-doxia-test-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-jar-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-jar-plugin-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-jar-plugin-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-javadoc-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-javadoc-plugin-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-javadoc-plugin-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-local</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-reporting-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-reporting-api-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-reporting-impl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-reporting-impl-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resources-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resources-plugin-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>maven-resources-plugin-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmilter-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmilter1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail-starttls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_auth_openidc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hawk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-rack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-rack-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-rack-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-jdbc-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgif7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgif7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-oauth-java-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-oauth-java-client-java6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-oauth-java-client-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-oauth-java-client-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-oauth-java-client-servlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>axis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>axis-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontforge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontforge-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontforge-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-plugin-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spectre-meltdown-checker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trilead-ssh2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trilead-ssh2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-agent-proxy-connector-factory</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-agent-proxy-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-agent-proxy-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-agent-proxy-jsch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-agent-proxy-pageant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-agent-proxy-sshagent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-agent-proxy-usocket-jna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsch-agent-proxy-usocket-nc</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:90.0.4480.84-lp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">15.5</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:99.0.4788.13-lp155.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:114.0.5735.106-bp155.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.5-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:114.0.5735.133-bp155.2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:114.0.5735.198-bp155.2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.94-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.2-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.2-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.6-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.6-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.54-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.0-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.0-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.29-bp155.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.47-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.0.5790.102-bp155.2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5.5907-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.2-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.34-bp155.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.10-lp155.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.10-lp155.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.10_k5.14.21_150500.55.7-lp155.2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.0.5790.170-bp155.2.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9022-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.29.2-bp155.3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.29.2-bp155.3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.9+git.35.4b9444a-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.9+git.35.4b9444a-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.086-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.36-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:116.0.5845.96-bp155.2.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:116.0.5845.110-bp155.2.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:116.0.5845.140-bp155.2.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009187001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:116.0.5845.179-bp155.2.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:116.0.5845.187-bp155.2.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:116.0.5845.187-bp155.2.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:117.0.5938.88-bp155.2.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.0.4880.40-lp155.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.10-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.10-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.10-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.12.1610074031.f653af66-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.4-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.25-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.25-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:117.0.5938.132-bp155.2.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.53.17.1-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:117.0.5938.149-bp155.2.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.94.2-bp155.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:103.0.4928.16-lp155.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:118.0.5993.70-bp155.2.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.94.2-bp155.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.31-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.7-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:118.0.5993.88-bp155.2.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:118.0.5993.117-bp155.2.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.4.2-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:104.0.4944.23-lp155.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.4-bp155.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.3-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.3-bp155.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.12-lp155.2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.12-lp155.2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.12_k5.14.21_150500.55.31-lp155.2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:104.0.4944.36-lp155.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.8.8-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.20-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.20-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:119.0.6045.123-bp155.2.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20231023-bp155.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42-bp155.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42-bp155.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42-bp155.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.06.0.1-bp155.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:119.0.6045.159-bp155.2.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.11.14-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-lp155.3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-lp155.3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-lp155.3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-lp155.3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.8-bp155.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:105.0.4970.21-lp155.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:119.0.6045.199-bp155.2.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.29-bp155.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.9-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:105.0.4970.34-lp155.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1-bp155.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-lp155.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-lp155.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-lp155.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-lp155.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.80-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.1-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.50-bp155.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.8b-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.8b-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.13-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.13-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:109.0.5097.38-lp155.3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.81-bp155.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.80.0-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.8-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.8-bp155.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.28-bp155.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.28-bp155.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.28-bp155.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.2-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.0-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:110.0.5130.23-lp155.3.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.0-bp155.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.2-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:125.0.6422.60-bp155.2.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:125.0.6422.76-bp155.2.85.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.2-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.18-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:125.0.6422.112-bp155.2.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:110.0.5130.39-lp155.3.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.2+kde2-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.2+kde2-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.2+kde2-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.2+kde2-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.95-bp155.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.5.6924-bp155.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:125.0.6422.141-bp155.2.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-bp155.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.42-bp156.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.27.9-bp155.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.27.9-bp155.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-bp156.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2-bp156.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:106.0.4998.28-lp155.3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.24-bp155.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.4-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.70-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:111.0.5168.43-lp155.3.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.8-bp156.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.1-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:106.0.4998.19-lp155.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:120.0.6099.216-bp155.2.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.5-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.5-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.5-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.5-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:126.0.6478.126-bp156.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:112.0.5197.25-lp155.3.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.290.0-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.9-bp156.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.4-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.4-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:126.0.6478.182-bp156.2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.4-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.97.1-bp155.5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.8-bp156.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1-bp156.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.53.0-bp155.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.53.0-bp155.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.11-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-bp155.3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-bp155.3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-bp155.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-bp155.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:120.0.6099.224-bp155.2.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.1-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:112.0.5197.53-lp155.3.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.0-bp155.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:127.0.6533.119-bp156.2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20240730-bp156.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.69.1-bp156.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.7-bp155.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.0.6613.84-bp156.2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.53.18.1-bp155.2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.29-bp155.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.29-bp155.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.0.6613.113-bp156.2.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.54.1-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.70.1-bp156.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.27-bp155.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.27-bp155.2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:113.0.5230.32-lp155.3.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.0.6613.119-bp155.2.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.0.6613.137-bp156.2.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.16-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-lp155.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-lp155.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-lp155.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-lp155.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-lp155.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-lp155.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-lp155.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-lp155.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.26-bp155.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.26-bp155.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:129.0.6668.58-bp155.2.117.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:129.0.6668.70-bp155.2.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:114.0.5282.21-lp156.2.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:129.0.6668.89-bp156.2.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-bp156.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:106.0.4998.52-lp155.3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-bp155.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.3-bp155.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:129.0.6668.100-bp156.2.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:130.0.6723.58-bp156.2.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:130.0.6723.69-bp156.2.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.2-bp156.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.2-bp156.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.5-bp156.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.5-bp156.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.5-bp156.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.5-bp156.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.0-bp156.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.0-bp156.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.20-bp156.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:130.0.6723.91-bp155.2.135.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.16-bp155.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.0-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.10-bp156.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.08.5-bp156.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:23.08.5-bp156.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:130.0.6723.116-bp155.2.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240101-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.0-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.7-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.7-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.7-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.10-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:131.0.6778.69-bp155.2.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:131.0.6778.85-bp155.2.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i586|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.53.19-bp155.2.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.7-bp155.2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.0.5322.68-lp156.2.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.8-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.8-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.2-bp155.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:131.0.6778.108-bp155.2.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:131.0.6778.139-bp156.2.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-bp155.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.4-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:131.0.6778.204-bp156.2.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.0.0-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.6-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.0-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:107.0.5045.21-lp155.3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.3-bp155.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.50-bp155.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.97.1-bp155.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.8b-bp155.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.8b-bp155.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.29-bp155.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.5-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:122.0.6261.128-bp155.2.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.6-bp155.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.6-bp155.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.6-bp155.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.6-bp155.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.6-bp155.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.6-bp155.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-bp155.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0~rc16~git6.e51d0de-bp155.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:108.0.5067.40-lp155.3.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-bp155.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.6-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.2-bp155.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.3-150300.15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.3-150300.15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.90-150200.4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.90-150200.4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.59-150200.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.59-150200.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-150400.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-150400.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.0-150200.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.372-150000.3.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.372-150000.3.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230512-150200.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.2-150400.24.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.06.2-150400.24.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.2-150400.24.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.06.2-150400.24.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.0-150200.6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-150200.6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2-150000.1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.3-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.6-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0beta3-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn30357-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn27321-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn12688-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn28038-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn57878-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn57089-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn58378-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn3006-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29036-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn57890-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn52909-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn18790-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn45266-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn57273-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn16219-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn17794-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn15543-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn25623-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn38300-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn52631-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn37223-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn51944-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn48871-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn34112-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn30408-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn45927-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn50528-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn46996-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn48478-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn24061-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn23866-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn58136-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn53554-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn17399-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn37645-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn24759-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29031-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn8329-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn44515-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn58535-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29050-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn18336-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn25860-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn14752-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn14758-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn25997-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn13663-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn34971-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn54732-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn37813-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn56984-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn44835-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn49033-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn32101-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn46894-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn53999-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn54358-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn30983-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn42296-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn42300-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn16420-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn25012-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn32150-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn10937-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn27025-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn56352-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn31696-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn26126-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn15093-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn41465-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29005-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn32346-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn34647-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn43292-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn50281-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn37750-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn38769-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn23500-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn23661-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn23406-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn14428-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn8457-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn33688-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn18674-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn30534-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn37026-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn53804-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn10843-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn37537-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn14387-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn52858-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn41779-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn49140-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn40690-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn25962-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn16181-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn39165-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29348-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn13364-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn52800-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn32405-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn7838-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29333-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn44206-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29335-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn34996-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn31638-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn32919-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn55172-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn53577-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn55933-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29688-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn38710-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn21215-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn37771-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn13013-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn45011-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn15506-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn12782-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn47948-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29741-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn33155-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn24062-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn43596-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn53444-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn6898-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn55132-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn25648-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn23262-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn6897-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn50419-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn46165-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn49312-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn52917-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn34398-150400.31.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.2-150400.24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.06.2-150400.24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.2-150400.24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.06.2-150400.24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19-150300.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.2-150400.9.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.10.1-150000.1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.10.1-150000.1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.1-150000.3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.1-150000.3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.14-150000.3.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-150000.3.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-150000.3.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-150000.3.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0.9-150400.6.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0.9-150400.6.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0.9-150400.6.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-150000.3.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-150000.3.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-150100.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.11-150400.4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.11-150400.4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-150200.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-150200.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.6.13-150400.3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.6.13-150400.3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-150200.14.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-150200.14.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-150200.14.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-150200.14.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.12.0-150200.152.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr8.5-150000.3.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr8.5-150000.3.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.75-150200.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-150400.4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4-150500.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.10-150000.1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.5-150000.1.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.1_04-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.1_04-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.1_04-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.03.0-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:23.03.0-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009180668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.51-150200.3.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.10-150200.5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.17-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.17-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.13-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.13-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.65-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.65-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.65-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-150000.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10-150000.3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.3-150000.3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.2-150300.3.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.1-150200.3.41.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.1681904360.84ef141-150000.1.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009179867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.21-150000.3.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-150000.1.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.1.2-150000.3.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1-150100.4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009181880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37.6-150100.4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.0~0-150400.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.0-150300.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.0-150300.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p17-150000.4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.29-150400.4.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.12.0-150200.8.121.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-150000.3.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-150000.3.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-150100.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-150300.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.1-150100.8.63.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-150000.3.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-150000.3.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-150000.3.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.16-150300.4.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.16-150300.4.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.6-150400.4.42.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.6-150400.4.42.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.6-150400.4.42.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1260.0-150000.5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0-150500.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0-150500.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0-150500.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0-150500.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.15-150500.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.15-150500.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-150400.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.16.1-150400.9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.16.1-150400.9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.17-150500.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.17-150500.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-150400.4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-150500.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-150500.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.0-150200.6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.0-150200.6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-150200.6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0~beta3+git.1624618403.e9577376-150400.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.53.0-150100.4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.63-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.63-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.10-150200.5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.3-150400.9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.3-150400.9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.2-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.2-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20161124-150000.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0+git.1685628435.48c4099-150200.4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3+git.1683650163.1000ba6-150200.3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2-150000.1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.0-150300.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.8+kde185-150500.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.8+kde185-150500.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.8+kde185-150500.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.33-150400.4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-150000.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.42-150500.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.42-150500.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-150000.1.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.74-150200.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.11-150000.1.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.6-150000.1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr8.6-150000.3.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr8.6-150000.3.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.7.1.150500.6.2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-150400.18.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-150400.18.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-150400.18.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0.9-150400.6.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0.9-150400.6.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0.9-150400.6.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.1-150300.17.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.1-150300.17.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.1-150300.17.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.12-150400.4.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.12-150400.4.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.0-150200.152.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115-150200.9.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.0-150200.152.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.1-150100.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.13.1-150100.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.5-150200.3.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.6-150400.3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.8-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.9+git.367.dae41ffdd1f-150500.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.9+git.367.dae41ffdd1f-150500.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.9+git.367.dae41ffdd1f-150500.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.9+git.367.dae41ffdd1f-150500.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3.1-150400.17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.4-150400.9.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.4-150400.9.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.4-150400.9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.4-150400.9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.4-150400.9.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4p1-150300.3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.17-150300.4.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.17-150300.4.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.0.2-150200.152.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.0.2-150200.152.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.8+kde8-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.8+kde8-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.8+kde8-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-150100.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.94-150200.4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.94-150200.4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.61-150200.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.61-150200.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.33-150200.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.7-150500.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.6.1-150000.1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.8+kde185-150500.4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.8+kde185-150500.4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.8+kde185-150500.4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20230724-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.52.10-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.52.10-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.52.10-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.8.0-150400.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.8.0-150400.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0-150500.6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0-150500.6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0-150500.6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0-150500.6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.0.1-150200.8.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150500.49.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0_0_gd239552-150500.49.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150500.49.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:32.0.1-150200.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-150000.3.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-150000.3.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-150000.3.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-150500.4.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-150500.4.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.0-150000.1.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.3-150000.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.22-150000.3.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-150000.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.1.0-150200.152.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.1.0-150200.152.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0-150200.11.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.12.1.150500.6.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.7-150000.1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.2-150500.3.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.2-150500.3.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.2-150500.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.1.0-150200.8.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-150000.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-150100.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.2-150400.4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-150500.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-150500.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-150500.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.71.1-150400.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150000.3.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.64-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.64-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.64-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.12-150000.1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-150200.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-150200.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.1-150100.8.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.20.0-150000.3.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.20.0-150000.3.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20230724-150500.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-150000.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-150000.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.372-150200.3.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.372-150200.3.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.19.1.150500.6.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.39-150400.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.39-150400.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.39-150400.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.382-150200.3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.382-150200.3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-150000.3.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-150000.3.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-150000.3.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.12-150200.5.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.12-150200.5.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.4-150200.5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.4-150200.5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.4-150200.5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.9-150200.5.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.9-150200.5.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.6-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.17.1-150400.9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.17.1-150400.9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230808-150200.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.16-150200.8.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.16-150200.8.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.10-150200.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-150500.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-150500.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3-150300.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.4.1-150400.17.12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.4.1-150400.17.12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.37-150400.14.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.5-150400.4.45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.5-150400.4.45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.5-150400.4.45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.5-150400.4.45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.11-150000.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-150000.170.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr8.10-150000.3.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr8.10-150000.3.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.382-150000.3.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.382-150000.3.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.2_02-150500.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.2_02-150500.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.2_02-150500.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62-150200.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.9-150000.3.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.4-150000.4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.4-150000.4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.4-150000.4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.22+git0.f8e3218e2-150400.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.15-150000.7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1632-150500.20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1632-150500.20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.0-150300.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.0-150300.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5-150000.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5-150000.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.2.0-150200.152.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.2.0-150200.152.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.27-150200.11.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.27-150200.11.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.53.0-150100.4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.2-150400.4.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2~3-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4-150100.9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4-150100.9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.30-150400.4.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35.0-150400.4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.10-150200.5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.5_ce-150000.185.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.5_ce-150000.185.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1260.0-150000.5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.33-150400.4.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-150000.4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-150000.4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.5-150400.4.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.5-150400.4.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.5-150400.4.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.5-150400.4.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-150400.4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.2-150000.1.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-150300.11.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:73.2-150000.1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:73.2-150000.1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.0-150200.6.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-150200.6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.0-150200.6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.2.1-150200.152.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.2.1-150200.152.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-150200.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-150200.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-150000.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-150000.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-150000.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.0+git1204-150000.1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.0+git1204-150000.1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.0+git1204-150000.1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.0+git1204-150000.1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.0+git1204-150000.1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.0+git1204-150000.1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.0+git1204-150000.1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.0+git1204-150000.1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.0+git1204-150000.1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.0+git1204-150000.1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.2.2-150200.8.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.3-150500.5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.3-150500.5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.3-150500.5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.0+r278197-150000.4.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.0+r278197-150000.4.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.0+r278197-150000.4.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.0+r278197-150000.4.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.0+r278197-150000.4.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.0+r278197-150000.4.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.0+r278197-150000.4.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.0+r278197-150000.4.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-150000.3.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.8-150000.1.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-150000.1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-150000.3.51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-150000.3.51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-150300.4.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-150300.4.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4-150500.4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-150500.3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.03.0-150500.3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-150500.3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:23.03.0-150500.3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.8-150500.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-150000.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.72.0-150400.24.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.72.0-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.5-150400.4.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.5-150400.4.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.5-150400.4.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.5-150400.4.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.16-150000.3.100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-150000.1.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-150000.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.21-150000.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150200.11.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150200.11.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35.0-150500.10.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35.0-150500.10.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.44-150500.8.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.44-150500.8.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.26-150300.7.35.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.13-150400.4.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.13-150400.4.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009187002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41-150100.7.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009187003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41-150100.7.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009187004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41-150100.7.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009187005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41-150100.7.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009187006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41-150100.7.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009187007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41-150100.7.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009187008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-150000.3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009187009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-150000.3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009187010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.13.1-150200.4.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.2_04-150500.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.2_04-150500.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.2_04-150500.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5-150000.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5-150000.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.0-150300.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.0-150300.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-150400.12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.8.1-150000.1.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.13.1-150000.1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-150200.3.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009176519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-150200.3.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-150300.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-150300.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-150500.4.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-150500.4.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.0-150000.1.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-150000.1.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.0-150000.1.23.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.1-150000.1.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.23-150000.3.104.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.3-150000.3.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.5-150200.3.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15-150000.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.0-150100.4.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-150100.3.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6+20220323.758044b-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6+20220323.758044b-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.3.0-150200.152.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.3.0-150200.152.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.5-150400.9.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.5-150400.9.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.5-150400.9.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.5-150400.9.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.3.1-150200.152.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.3.1-150200.152.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.8-150000.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.2-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.2-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.12-150000.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-150000.3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.12-150000.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.12-150000.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20.2-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20.2-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.28.1.150500.6.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-150000.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-150000.173.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-150200.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-150200.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.35.2-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.35.2-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.3.1-150200.8.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.2-150000.1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.9-150000.1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.7-150500.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150400.10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150400.10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.9+git.421.abde31ca5c2-150500.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.9+git.421.abde31ca5c2-150500.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.9+git.421.abde31ca5c2-150500.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.9+git.421.abde31ca5c2-150500.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0.9-150400.6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0.9-150400.6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0.9-150400.6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.2_06-150500.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.2_06-150500.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.2_06-150500.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.2+0-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.2+0-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.10-150000.1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.3-150000.1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.31.1.150500.6.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-150500.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.2-150500.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.17-150000.3.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-150000.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-150000.1.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.29.1-150500.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-150300.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.3.4.19-150300.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.02.7-150100.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.1-150000.1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.1-150000.1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.82-150200.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.18.2-150400.9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.18.2-150400.9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.5.3-150500.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-150500.29.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-150500.29.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-150500.29.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2.1+git7813-150000.1.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2.1+git7813-150000.1.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2.1+git7813-150000.1.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2.1+git7813-150000.1.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2.1+git7813-150000.1.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2.1+git7813-150000.1.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2.1+git7813-150000.1.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2.1+git7813-150000.1.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.100-150200.4.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.100-150200.4.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.62-150200.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.62-150200.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-150000.4.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-150000.4.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.13.0-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.13.0-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-150000.4.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-150000.4.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.21.0-150000.3.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.21.0-150000.3.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-150200.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-150200.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.53-150200.3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.4.0-150200.152.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.4.0-150200.152.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-150500.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-150500.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.1-150300.8.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.1-150300.8.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.16-150400.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.0-150300.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.3.0-150300.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.4-150500.7.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.6-150400.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.9.0-150400.3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.9.0-150400.3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.6-150400.3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.01.0-150500.3.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.01.0-150500.3.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.01.0-150500.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.01.0-150500.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.1-150400.4.57.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.1-150400.4.57.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.1-150400.4.57.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.1-150400.4.57.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.1-150400.4.57.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.1-150400.4.57.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.4.1-150200.8.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.1.5-150500.7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.9-150200.6.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.28-150000.5.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.28-150000.5.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.02.5-150500.5.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:23.02.5-150500.5.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.36.1.150500.6.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7-150400.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-150500.4.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-150500.4.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.2-150300.3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.11-150000.3.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:535.129.03-150500.11.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:535.129.03-150500.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:535.129.03-150500.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:535.129.03-150500.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:535.129.03_k5.14.21_150500.55.31-150500.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:535.129.03_k5.14.21_150500.33.20-150500.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:535.129.03_k5.14.21_150500.55.31-150500.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-150400.6.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-150400.6.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:330-150200.11.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3+git20230121-150000.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20231113-150200.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.4-150300.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.17-150200.8.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.17-150200.8.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.13-150200.5.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.13-150200.5.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2.1+git7813-150000.1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2.1+git7813-150000.1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2.1+git7813-150000.1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2.1+git7813-150000.1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2.1+git7813-150000.1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2.1+git7813-150000.1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2.1+git7813-150000.1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.1-150300.8.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.1-150300.8.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-150000.3.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.0-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-150300.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.4.1-150000.1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-150000.1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.4-150000.1.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11.1-150000.1.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4-150500.4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.2_08-150500.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.2_08-150500.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.2_08-150500.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.10-150200.5.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.10-150200.5.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1-150200.5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1-150200.5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16-150500.10.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.5-150200.5.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.5-150200.5.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1-150200.5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-150400.9.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18.1-150400.14.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18.1-150400.13.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6.2.1-150400.17.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6.2.1-150400.17.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-150400.9.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20231114-150200.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.3-150500.5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.3-150500.5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.3-150500.5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.392-150000.3.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.392-150000.3.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.49-150100.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:44.1.1-150400.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-150000.3.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-150000.3.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-150000.3.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.4-150200.4.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.4-150200.4.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.15-150200.3.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.18-150200.4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-150200.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-150200.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.0-150400.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.11-150500.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.11-150500.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7-150400.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.5.0-150200.152.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.5.0-150200.152.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.2103-150500.20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.2103-150500.20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.2-150400.4.64.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.2-150400.4.64.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.2-150400.4.64.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64_ilp32)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.2-150400.4.64.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr8.15-150000.3.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr8.15-150000.3.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.2-150400.24.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.06.2-150400.24.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.2-150400.24.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.06.2-150400.24.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.13.1-150200.4.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.02.6-150500.5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:23.02.6-150500.5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.05.10-150300.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.05.10-150300.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-150300.3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-150300.3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.5.0-150200.8.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.2.0-150400.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.10.0-150400.5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.392-150200.3.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.392-150200.3.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-150000.3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-150000.3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.44.0-150000.3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.21-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-150500.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.22+git0.f8e3218e2-150400.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.58.0-150500.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-150500.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.03.0-150500.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-150500.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:23.03.0-150500.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20230724-150500.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.2-150400.24.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.06.2-150400.24.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.2-150400.24.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.06.2-150400.24.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150500.49.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0_0_gd239552-150500.49.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150500.49.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4-150500.4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0-150000.8.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.30-150400.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.30-150400.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.30-150400.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7-150400.3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.12-150000.1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.5-150000.1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.10-150400.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.8-150000.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.10-150000.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.39.1.150500.6.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.4-150500.7.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.1.5-150500.7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.3-150400.4.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.3-150400.4.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.3-150400.4.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:41.0.3-150400.16.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-150400.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-150400.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-150400.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-150400.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-150000.5.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-150000.5.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-150400.3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.5-150200.4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4p1-150300.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.0-150100.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-150000.177.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.4-150500.7.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.6.0-150200.152.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.6.0-150200.152.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.12.1-150000.1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.5.1-150000.1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6.2.1-150400.17.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.6.2.1-150400.17.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.1.5-150500.7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.7_ce-150000.190.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.7_ce-150000.190.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-150000.1.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.19-150000.3.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.11-150300.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.3_02-150500.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.3_02-150500.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.3_02-150500.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.1-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.1-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.8+kde185-150500.4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.8+kde185-150500.4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.8+kde185-150500.4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-150000.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-150000.5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.7-150000.5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-150000.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1-150000.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.3-150400.9.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-150500.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-150500.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-150400.4.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-150400.4.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3.1-150400.17.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.9.1-150200.152.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.9.1-150200.152.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.19-150300.4.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.19-150300.4.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.19-150300.4.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.19-150300.4.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-150000.3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-150400.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-150400.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.4-150400.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.38.0-150000.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.38.0-150000.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.108-150200.4.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.108-150200.4.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.65-150200.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.65-150200.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.66-150300.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.4-150500.7.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0-150500.6.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0-150500.6.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0-150500.6.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0-150500.6.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.3_08-150500.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.3_08-150500.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.3_08-150500.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150500.49.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0_0_gd239552-150500.49.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150500.49.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7-150400.3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1-150200.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.21-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.2-150000.1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.9-150000.1.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-150400.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-150400.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-150000.5.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-150000.5.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.1-150000.3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.1-150000.3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.3-150000.1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.3-150000.1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240312-150200.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.1.5-150500.7.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34.1-150500.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.3-150500.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.3-150500.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.9.0-150200.8.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.0-150300.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.58.0-150500.6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-150500.8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.14-150400.4.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.14-150400.4.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.17-150500.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.17-150500.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.17-150500.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.17-150500.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.16-150400.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.14-150400.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-150200.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-150200.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37.4-150500.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37.4-150500.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37.4-150500.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.2-150500.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.2-150500.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:590-150400.3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.20-150200.5.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21-150100.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.0-150400.5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.4-150500.7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.1.5-150500.7.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.44.0-150400.4.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.44.0-150400.4.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.44.0-150400.4.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-150400.4.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-150400.4.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.3-150100.8.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.0111-150500.20.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.0111-150500.20.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-150400.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-150400.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.4_02-150500.3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.4_02-150500.3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.4_02-150500.3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.12.1-150500.11.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.12.1-150500.11.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15-150200.4.16.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.0-150200.4.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.0-150200.4.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15-150200.4.16.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15-150200.4.16.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15-150200.4.16.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.22.2-150200.3.9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-150200.4.9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.0-150200.4.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.20.1-150400.9.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.20.1-150400.9.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.3-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.6-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0beta3-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn30357-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn27321-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn12688-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn28038-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn57878-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn57089-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn58378-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn3006-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29036-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn57890-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn52909-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn18790-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn45266-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn57273-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn16219-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn17794-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn15543-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn25623-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn38300-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn52631-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn37223-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn51944-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn48871-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn34112-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn30408-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn45927-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn50528-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn46996-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn48478-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn24061-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn23866-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn58136-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn53554-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn17399-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn37645-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn24759-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29031-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn8329-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn44515-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn58535-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29050-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn18336-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn25860-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn14752-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn14758-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn25997-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn13663-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn34971-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn54732-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn37813-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn56984-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn44835-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn49033-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn32101-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn46894-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn53999-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn54358-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn30983-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn42296-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn42300-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn16420-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn25012-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn32150-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn10937-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn27025-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn56352-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn31696-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn26126-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn15093-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn41465-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29005-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn32346-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn34647-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn43292-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn50281-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn37750-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn38769-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn23500-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn23661-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn23406-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn14428-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn8457-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn33688-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn18674-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn30534-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn37026-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn53804-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn10843-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn37537-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn14387-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn52858-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn41779-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn49140-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn40690-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn25962-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn16181-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn39165-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29348-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn13364-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn52800-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn32405-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn7838-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29333-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn44206-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29335-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn34996-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn31638-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn32919-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn55172-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn53577-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn55933-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29688-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn38710-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn21215-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn37771-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn13013-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn45011-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn15506-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn12782-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn47948-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn29741-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn33155-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn24062-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn43596-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn53444-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn6898-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn55132-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn25648-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn23262-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn6897-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn50419-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn46165-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn49312-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn52917-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.20210325.svn34398-150400.31.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-150500.8.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.30-150300.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.30-150300.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-150200.11.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-150200.11.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-150200.10.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-150200.11.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-150200.15.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-150000.4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.87-150200.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.22-150000.3.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.10.0-150200.152.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.10.0-150200.152.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.0-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-150000.6.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-150000.6.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-150000.6.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-150200.5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.8-150300.4.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:121-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:121-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:121-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-150200.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.8+kde185-150500.4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.8+kde185-150500.4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.8+kde185-150500.4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.8-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.17-150500.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.17-150500.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.17-150500.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.17-150500.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.10.1-150200.8.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150500.49.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0_0_gd239552-150500.49.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150500.49.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.1.0-150400.12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.33-150400.4.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.30-150400.4.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.23.0-150500.3.3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.40.0-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.40.0-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.412-150000.3.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.412-150000.3.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4-150500.4.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-150000.3.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-150000.3.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150200.11.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150200.11.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4-150400.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4-150400.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.59.1.150500.6.25.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.4-150400.3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.2-150300.11.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.23.0-150000.3.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.23.0-150000.3.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.11.0-150400.3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.11.0-150400.3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.1710765237.46af599-150000.1.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.27-150000.1.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.1710765237.46af599-150000.1.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-150000.3.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.27-150000.3.116.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.18-150200.3.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.6-150200.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.5-150500.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.5-150500.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.78.1-150200.3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.9-150400.9.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.9-150400.9.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3-150400.59.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.3-150400.59.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.6.0-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.6.0-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.0-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-150500.10.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-150500.10.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.65-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.3-150000.1.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.10-150000.1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-150000.188.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.6-150400.6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4-150400.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4-150400.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150200.11.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150200.11.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:590-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.44.1.150500.6.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.0-150300.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.1-150100.6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-150400.3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-150300.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-150400.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.2-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.1-150400.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.1-150400.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-150400.12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.1-150400.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.7.22-150400.12.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.1-150400.8.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-150400.9.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:41.0.3-150400.16.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.0-150400.5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.27.0-150400.6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.5-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.0-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-150400.5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.35.0-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.0-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.21.0-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.2-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.0-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.1-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17.0-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.1-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40.1-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.0-150400.10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.0-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-150400.10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.62.0-150400.10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.0-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.60.1-150400.9.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.60.1-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4-150400.11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-150400.10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.0-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25.1-150400.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-150400.12.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:23.2.0-150400.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-150400.12.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-150400.12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.21-150400.12.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.3-150400.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31.0-150400.6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-150400.12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:67.7.2-150400.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.4-150400.6.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-150400.7.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-150400.13.10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.66.1-150400.9.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.10.0-150400.3.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.14-150400.10.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-150400.10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.57-150400.10.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.0-150400.8.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.1-150400.7.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.10.0-150400.5.17.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.3-150400.10.18.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-150400.9.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1-150400.10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-150400.12.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.0-150400.9.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-150400.10.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.3-150400.10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-150400.12.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.0-150400.13.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.1.0-150400.12.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-150400.12.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-150400.12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.0-150400.8.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.21.0-150400.9.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.0-150400.10.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-150400.9.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-150400.10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.4-150400.11.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0-150400.13.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.0-150400.12.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.8.0-150400.10.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-150400.10.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-150400.12.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.1-150400.10.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-150400.10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.0-150400.10.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-150400.10.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-150400.9.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.4-150400.7.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-150400.12.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.4-150400.10.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.3-150400.10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.2-150400.10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.0-150400.10.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.44b0-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.1-150400.9.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3.1-150400.17.16.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.6-150400.7.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-150400.10.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.5-150400.6.9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.30-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.2-150400.9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.9-150400.5.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.1-150400.12.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-150400.12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.4-150400.12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.5-150400.12.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-150400.10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:23.1.0-150400.8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-150400.8.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.0-150400.5.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.3-150400.9.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-150400.12.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-150400.11.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.0-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.1-150400.7.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-150400.13.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.40.0-150400.13.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-150400.12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.0-150400.12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2-150400.8.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.0-150400.10.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0-150400.12.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.3-150200.5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.3-150200.5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.3-150200.5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.62.2.150500.6.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.0-150300.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.6-150400.10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.14-150400.4.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.14-150400.4.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0-150400.11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0-150400.11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.1-150300.17.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.1-150300.17.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.1-150300.17.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.4-150400.6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.12-150200.5.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.12-150200.5.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.11.0-150200.152.137.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.11.0-150200.152.137.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240514-150200.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.7-150200.5.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.7-150200.5.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.65.1.150500.6.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.412-150200.3.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.412-150200.3.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0-150500.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0-150500.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35.3-150300.10.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35.3-150300.10.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.65-150500.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.65-150500.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.65-150500.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.70.5-150400.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.70.5-150400.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.70.5-150400.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.2-150500.6.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.2-150500.6.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3a-150300.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.0-150300.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.11-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-150400.3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31.0-150400.6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.11.0-150200.8.160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr8.25-150000.3.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr8.25-150000.3.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.5-150000.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.5-150000.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-150300.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-150000.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-150400.12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.23-150000.3.115.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.3-150400.10.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12-150100.11.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-150400.6.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-150400.6.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.66.4-150400.9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.2-150200.3.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.25.3-150200.5.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.16-150200.5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.4-150200.12.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2-150200.12.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-150200.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-150200.12.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.4-150200.3.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.2-150200.3.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.2-150200.3.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.10.2-150200.3.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.7-150200.3.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1.0~M2-150200.5.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-150200.5.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-150200.5.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25.1-150300.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-150500.3.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-150500.3.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-150500.3.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7-150400.3.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4-150400.3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4-150400.3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150200.11.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150200.11.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.0-150400.8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-150200.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4-150400.11.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.7-150200.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.11-150000.1.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.4-150000.1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4-150500.4.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-150500.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.01.0-150500.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.01.0-150500.3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.17.1-150000.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0~git1.db34c02-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.6.18-150400.3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.6.18-150400.3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.4-150300.11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.58.0-150500.6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.90.07-150500.11.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.90.07-150500.3.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.90.07-150500.3.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.90.07-150500.3.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.90.07_k5.14.21_150500.55.65-150500.3.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.90.07_k5.14.21_150500.33.54-150500.3.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.90.07_k5.14.21_150500.55.65-150500.3.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.0-150100.10.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.0-150100.10.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.8-150500.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-150000.3.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-150000.3.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.2-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150500.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150500.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.33-150400.4.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.30-150400.4.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.0-150400.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.12.0-150200.152.140.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.12.0-150200.152.140.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0+20220815.f40c2d5-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.44.2-150400.4.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.44.2-150400.4.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.44.2-150400.4.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.12.0-150200.8.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.12-150400.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.12-150400.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.12-150400.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.18-150200.5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.3.4.19-150300.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-150000.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3-150400.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.17-150000.111.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.17-150000.111.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.1.5-150500.7.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-150300.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:41.0-150500.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.0-150500.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.1-150400.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.1-150400.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-150000.3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-150000.3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.66.2-150400.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.66.2-150400.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2022.5.17-150000.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.68.1.150500.6.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.11-150400.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.11-150400.3.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.11-150400.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.11-150400.3.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-150300.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.4-150500.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:34.1.1-150200.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.07-150000.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:34.1.1-150200.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-150500.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-150500.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-150500.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-150500.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.7-150500.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.4-150500.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.4-150500.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-150300.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-150000.191.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:31-150200.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.0-150200.5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-150500.8.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.14-150400.4.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.14-150400.4.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.2.4.2-150500.20.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.2.4.2-150500.20.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-150000.3.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7-150400.3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.19-150300.4.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.19-150300.4.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-150300.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150500.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150500.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.7.0-150200.152.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.7.0-150200.152.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.3-150500.5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.3-150500.5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.3-150500.5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-150000.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-150500.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-150500.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.12-150000.1.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.5-150000.1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.6-150200.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-150400.7.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.01.0-150500.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.01.0-150500.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.25-150400.4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.13.0-150200.152.143.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.13.0-150200.152.143.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.15.0-150400.10.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.7.0-150000.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-150400.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-150400.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-150000.3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-150000.3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.25-150200.5.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.9-150400.9.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.9-150400.9.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.12.2-150200.8.168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.7.0-150200.8.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.a-150300.21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.65.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.91-150200.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.4-150500.7.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.3-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.20.4-150400.9.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.20.4-150400.9.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.15.1-150500.11.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.15.1-150500.11.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-150000.1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-150400.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-150400.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11.0-150200.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2-150200.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.10.1-150200.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-150000.1.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:41.9-150400.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.9-150400.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-150400.6.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-150400.6.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.02-150200.14.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.02-150200.14.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.0-150400.12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-150000.197.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.12.0-150400.3.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.12.0-150400.3.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.24.0-150000.3.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.24.0-150000.3.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.50-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.4_04-150500.3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.4_04-150500.3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.4_04-150500.3.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-150000.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35.3-150300.10.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35.3-150300.10.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150400.10.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150400.10.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.3_04-150500.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.3_04-150500.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.3_04-150500.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.33-150400.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.33-150400.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.33-150400.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24.34-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24.34-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24.34-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-150300.4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.28-150000.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.28-150000.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.59.0-150500.6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-150500.8.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.101.2-150400.3.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.101.2-150400.3.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-150100.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.02.7-150100.3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-150000.5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.422-150000.3.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.422-150000.3.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.5-150300.8.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.5-150300.8.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.13.0-150200.8.171.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4-150400.3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4-150400.3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150400.10.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.1-150400.10.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150200.11.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150200.11.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-150000.1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.05.11-150300.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.05.11-150300.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.02.7-150500.5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:23.02.7-150500.5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.17-150500.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.17-150500.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.17-150500.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.17-150500.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.2.0-150400.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-150000.1.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.50-150500.8.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.50-150500.8.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68-150200.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.2-150500.3.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.2-150500.3.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.2-150500.3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.9-150200.6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.10.0-150400.5.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19.7.1-150000.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.8+kde185-150500.4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.8+kde185-150500.4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.8+kde185-150500.4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:44.1.1-150300.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:67.6.1-150400.4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.0-150300.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.16-150400.9.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.73.1.150500.6.33.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.73.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.11-150000.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-150400.10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.14-150400.4.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.14-150400.4.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.6.0-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.6.0-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.1.0-150200.152.146.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128-150200.9.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:128.1.0-150200.152.146.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:44.1.1-150400.9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:67.7.2-150400.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.0-150100.10.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.0-150100.10.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5_02-150500.3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5_02-150500.3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5_02-150500.3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.19-150300.4.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.19-150300.4.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150500.49.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0_0_gd239552-150500.49.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150500.49.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.8+kde1-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.8+kde0-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.8+kde0-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20230724-150500.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.10~git2.345056d3-150500.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.69-150000.3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.69-150000.3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.70.5-150400.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.70.5-150400.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.70.5-150400.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.13.1-150000.1.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.44.3-150400.4.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.44.3-150400.4.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.44.3-150400.4.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.15-150400.9.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240813-150200.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28.13-150400.9.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.16-150400.9.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.0-150500.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.5-150500.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.5-150500.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4-150500.4.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.3-150400.10.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.14.0-150200.8.174.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150200.11.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150200.11.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.15-150200.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-150000.3.94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-150000.3.94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-150000.3.94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.0.6_ce-150000.207.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.0.6_ce-150000.207.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-150000.1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.422-150200.3.48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.422-150200.3.48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:249.17-150400.8.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:249.17-150400.8.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:249.17-150400.8.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35.4-150500.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.20-150200.8.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.20-150200.8.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.15-150400.9.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.2.0-150200.152.149.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:128.2.0-150200.152.149.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr8.30-150000.3.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr8.30-150000.3.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1-150200.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.8-150200.5.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.8-150200.5.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.13-150200.5.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.13-150200.5.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-150000.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.12-150400.15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.81-150400.13.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.2-150000.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.12-150400.15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.4-150200.5.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.4-150200.5.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.4-150200.5.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.16-150200.5.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.16-150200.5.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-150400.6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-150400.6.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-150000.1.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-150300.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-150300.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.9-150400.9.32.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.9-150400.9.32.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.9-150400.9.32.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.9-150400.9.32.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.9-150400.9.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.67.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.67.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.22.0-150000.3.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.22.0-150000.3.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-150400.3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-150400.3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.7-150000.1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.1-150000.1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-150400.3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-150400.3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.21-150000.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.14-150000.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-150100.4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.10.0-150400.3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.10.0-150400.3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.9-150000.3.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.77-150200.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.15-150200.11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.1-150100.4.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.45.6-150100.4.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2023.0.0-150500.3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-150000.3.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.5-150400.10.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.12-150000.3.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240910-150200.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.24-150000.3.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.70.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.70.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.6.1-150500.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.17-150500.3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.17-150500.3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.16-150400.9.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-150400.11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.15-150400.4.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.15-150400.4.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4-150400.3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4-150400.3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.0-150100.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.0+0-150500.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.0+0-150500.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.20-150300.4.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.20-150300.4.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.10-150400.9.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.10-150400.9.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5_04-150500.3.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5_04-150500.3.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5_04-150500.3.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-150000.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-150400.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-150400.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.17-150500.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.17-150500.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28.13-150400.9.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.16-150400.9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.15-150400.9.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.16-150400.9.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-150400.12.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.80.2.150500.6.35.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-150400.13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.2.3-150200.8.177.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.3.0-150200.152.152.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:128.3.0-150200.152.152.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.0-150200.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4-150200.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35.4-150500.3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150500.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150500.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3.5-150500.77.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3.5-150500.77.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3.5-150500.77.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3.5-150500.77.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3.5-150500.77.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-150500.77.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.8-150500.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.6-150300.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.30-150300.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.30-150300.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.15.0-150400.3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.83.1.150500.6.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.6-150400.3.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.8.1.2-150500.20.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.8.1.2-150500.20.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.8.1.2-150500.20.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31.0-150400.6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.31-150400.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.3.1-150200.152.155.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:128.3.1-150200.152.155.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.3.0-150200.8.182.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.2-150500.8.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.12-150000.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.0-150100.10.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.0-150100.10.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.12-150000.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.30-150400.4.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.56-150200.3.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35.4-150500.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.3.1-150200.8.185.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.33-150400.4.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150500.3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150500.3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.1-150500.12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.1-150500.12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25.1-150500.12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150500.3.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.5-150500.3.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35.4-150500.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.7.1-150000.1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.2.2-150000.1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150500.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150500.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150500.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.4-150500.7.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.1.5-150500.7.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.13.4-150000.1.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.6-150400.6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20241028T152002-150000.1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.10~git18.20ce9289-150500.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.19.1-150400.8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.0-150200.3.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-150400.6.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-150400.6.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.0-150400.4.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.0-150400.4.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.0-150400.4.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-150000.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-150000.4.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-150000.4.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.25.0-150000.3.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.25.0-150000.3.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-150400.12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-150000.3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.4.0-150200.152.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:128.4.0-150200.152.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20241030T212825-150000.1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.50-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.50-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.50-150400.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1-150200.3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.15-150400.4.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.15-150400.4.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-150000.200.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.20-150300.4.55.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.20-150300.4.55.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.20-150300.4.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.20-150300.4.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-150500.49.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.0-150500.49.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.0_0_gd239552-150500.49.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150500.49.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20241104T154416-150000.1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.10-150400.9.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.10-150400.9.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.10-150400.9.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-150400.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-150400.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-150400.6.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-150400.6.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.13.0-150400.3.48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.13.0-150400.3.48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.0-150200.3.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.10.0-150200.11.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:82-150200.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.6-150200.3.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.3-150200.11.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.2-150200.3.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5_06-150500.3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5_06-150500.3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5_06-150500.3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.1-150400.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-150400.6.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-150400.6.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.4-150400.4.70.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.4-150400.4.70.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.4-150400.4.70.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-150000.1.23.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-150000.3.21.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.0.10-150000.3.127.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-150000.1.17.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-150400.3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.4-150400.3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.14-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.14-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-150200.11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.21-150200.3.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20241112T145010-150000.1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.4.3-150200.8.188.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20241112-150200.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.4-150200.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.4-150200.3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18-150200.4.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-150200.3.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-150200.13.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.10-150400.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.3-150400.10.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.70.5-150400.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.70.5-150400.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.70.5-150400.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.5.0-150200.152.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:128.5.0-150200.152.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:202208-150500.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:202208-150500.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:202208-150500.6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5.6-150500.4.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.22.0-150400.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22-150200.8.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22-150200.8.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.33-150200.5.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.97-150200.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-150000.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.44.2-150500.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.44.2-150500.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.0-150100.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.3-150400.4.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.3-150400.4.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.3-150400.4.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.20-150300.4.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.20-150300.4.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.2-150400.9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-150000.3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-150000.3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.33-150400.4.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.5.0-150200.8.191.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.15-150400.4.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.15-150400.4.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.2-150200.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.2-150200.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17-150500.10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.6-150200.5.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.6-150200.5.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.2-150200.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.10-150200.5.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.10-150200.5.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.18-150200.5.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.18-150200.5.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.15-150200.5.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.15-150200.5.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.432-150000.3.100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.432-150000.3.100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.9_ce-150000.1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.9_ce-150000.1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.4-150100.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.3-150000.1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.3-150000.1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.30-150400.4.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.3-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.3-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20241209T183251-150000.1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3-150400.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.18.1-150500.11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.18.1-150500.11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.20.5-150400.9.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.20.5-150400.9.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.0-150400.14.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr8.35-150000.3.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr8.35-150000.3.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.5.1-150200.152.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:128.5.1-150200.152.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.5.2-150200.8.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.3-150400.10.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.0-150100.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.3-150000.1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.0836-150500.20.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.1.0836-150500.20.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.1-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.1-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.1-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230517+a377993-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230517+a377993-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.2-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.2-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.2-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.80.1-150000.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.80.1-150000.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-150400.5.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.1.5_ce-150000.212.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:26.1.5_ce-150000.212.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.88.1.150500.6.39.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-150400.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-150400.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-150400.7.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.9_ce-150000.1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.9_ce-150000.1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-150400.3.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-150400.3.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.0-150100.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.6.0-150200.8.142.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.5-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.115-150200.4.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.115-150200.4.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.69-150200.3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.69-150200.3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1-150500.8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.15.0-150400.3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.2-150400.15.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.58.0-150500.6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.01.0-150500.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.01.0-150500.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.60.1-150500.12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20241218T202206-150000.1.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.60.0-150500.11.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.60.0-150500.11.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0-150000.8.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7-150400.3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-150000.61.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-150400.4.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-150000.3.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.85-150200.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.18-150200.5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.402-150200.3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.402-150200.3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-150000.1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.1-150000.1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.26-150000.3.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-150500.4.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-150500.4.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.8-150200.3.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.26.0-150100.4.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.49.1.150500.6.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-150400.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.14-150200.5.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.14-150200.5.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.18-150200.8.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.18-150200.8.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.10-150500.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.10-150500.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.10_k5.14.21_150500.55.44-150500.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.10-150500.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.10_k5.14.21_150500.55.44-150500.5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.11-150400.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.11-150400.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.5-150400.4.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.5-150400.4.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.5-150400.4.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1l-150500.17.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.2-150200.5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.2-150200.5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.2-150200.5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.6-150200.5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.6-150200.5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.11-150200.5.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.11-150200.5.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.2-150400.24.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.06.2-150400.24.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.2-150400.24.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.06.2-150400.24.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.3-150500.5.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.3-150500.5.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.3-150500.5.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.9-150300.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-150000.4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-150000.4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-150200.3.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.0-150200.3.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-150200.3.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.0-150200.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.2-150200.3.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.1-150200.3.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-150200.3.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.0-150200.3.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.0-150200.3.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.0-150200.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6-150200.3.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.8.0-150200.3.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.2-150200.3.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.11.0-150200.3.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.9-150200.11.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230802.1-150400.10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.60.0-150400.8.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.60.0-150400.8.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230802.1-150400.10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.1-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.1-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240201-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240201-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0+git.20200721-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.60.0-150400.9.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25.1-150400.9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.48-150500.8.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.48-150500.8.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.3-150400.10.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.20-150000.3.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.7_ce-150000.193.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.7_ce-150000.193.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-150100.4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.3-150400.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.13-150400.4.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.13-150400.4.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4p1-150300.3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.90.2-150400.3.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.90.2-150400.3.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-150000.4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-150000.4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.0-150200.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.8.0-150200.152.126.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:115.8.0-150200.152.126.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.8.0-150200.8.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr8.20-150000.3.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr8.20-150000.3.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.2-150500.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.2-150500.3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-150400.4.41.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.3-150400.4.41.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.1-150500.11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.1-150500.11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-150400.3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-150000.3.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-150000.3.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.0-150200.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.0-150200.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.15.1-150200.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-150200.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.6-150200.4.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.0-150200.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-150200.4.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.1-150200.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.0-150200.3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.6-150200.4.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.0-150200.4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-150200.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-150200.4.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.18-150200.3.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1-150200.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.18-150200.4.19.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-150200.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-150200.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.19.1-150400.9.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.19.1-150400.9.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-150500.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.03.0-150500.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.0-150500.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:23.03.0-150500.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.15.2-150000.8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.15.2-150000.8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-150100.3.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.4+git.1702030539.5fb7d91b-150000.3.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:41.0.3-150400.16.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-150500.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-150000.3.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.54.14-150500.11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.54.14-150500.3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.54.14-150500.3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.54.14-150500.3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.54.14_k5.14.21_150500.55.49-150500.3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.54.14_k5.14.21_150500.33.34-150500.3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:550.54.14_k5.14.21_150500.55.49-150500.3.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:42.2.25-150400.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.8-150400.9.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.8-150400.9.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-150300.4.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-150300.4.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-150000.4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-150000.4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.0-150200.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-150200.4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.8-150000.1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-150000.1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-150500.5.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.54-150200.3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.13-150400.4.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.13-150400.4.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.3_06-150500.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.3_06-150500.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.3_06-150500.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-150000.3.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-150000.3.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-150000.3.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.402-150000.3.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.402-150000.3.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4-150200.13.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.33.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.52.1.150500.6.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200314-150200.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200314-150200.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31-150300.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.12p1-150500.7.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.46-150100.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.8.1-150200.8.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2-150400.15.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2-150400.15.14.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-150300.10.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-150000.1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.8~git65.347aae6-150500.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.13.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-150000.185.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.2-150400.24.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.06.2-150400.24.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.2-150400.24.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.06.2-150400.24.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-150100.4.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-150500.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-150500.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.11-150000.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.69-150000.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.69-150000.3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:217.293.v56de4d4d3515-150200.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-150000.45.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.9-150200.3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-150500.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-150500.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-150000.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-150400.12.11.1</evr>
  </rpminfo_state>
</states>
</oval_definitions>
